Action not permitted
Modal body text goes here.
Modal Title
Modal Body
CVE-2022-2905 (GCVE-0-2022-2905)
Vulnerability from cvelistv5
Published
2022-09-09 00:00
      Modified
2024-08-03 00:53
      
          Severity ?
        
        
          VLAI Severity ?
        
        
          EPSS score ?
        
        CWE
          
        Summary
An out-of-bounds memory read flaw was found in the Linux kernel's BPF subsystem in how a user calls the bpf_tail_call function with a key larger than the max_entries of the map. This flaw allows a local user to gain unauthorized access to data.
            
          
        References
          | URL | Tags | ||||||||||||||||||||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
| 
 | |||||||||||||||||||||||||||
{
  "containers": {
    "adp": [
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-03T00:53:00.453Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "tags": [
              "x_transferred"
            ],
            "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2121800"
          },
          {
            "tags": [
              "x_transferred"
            ],
            "url": "https://lore.kernel.org/bpf/984b37f9fdf7ac36831d2137415a4a915744c1b6.1661462653.git.daniel%40iogearbox.net/"
          },
          {
            "name": "[debian-lts-announce] 20221101 [SECURITY] [DLA 3173-1] linux-5.10 security update",
            "tags": [
              "mailing-list",
              "x_transferred"
            ],
            "url": "https://lists.debian.org/debian-lts-announce/2022/11/msg00001.html"
          }
        ],
        "title": "CVE Program Container"
      }
    ],
    "cna": {
      "affected": [
        {
          "product": "kernel",
          "vendor": "n/a",
          "versions": [
            {
              "status": "affected",
              "version": "Linux kernel 6.0-rc4"
            }
          ]
        }
      ],
      "descriptions": [
        {
          "lang": "en",
          "value": "An out-of-bounds memory read flaw was found in the Linux kernel\u0027s BPF subsystem in how a user calls the bpf_tail_call function with a key larger than the max_entries of the map. This flaw allows a local user to gain unauthorized access to data."
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "cweId": "CWE-125",
              "description": "CWE-125",
              "lang": "en",
              "type": "CWE"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2022-11-01T00:00:00",
        "orgId": "53f830b8-0a3f-465b-8143-3b8a9948e749",
        "shortName": "redhat"
      },
      "references": [
        {
          "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2121800"
        },
        {
          "url": "https://lore.kernel.org/bpf/984b37f9fdf7ac36831d2137415a4a915744c1b6.1661462653.git.daniel%40iogearbox.net/"
        },
        {
          "name": "[debian-lts-announce] 20221101 [SECURITY] [DLA 3173-1] linux-5.10 security update",
          "tags": [
            "mailing-list"
          ],
          "url": "https://lists.debian.org/debian-lts-announce/2022/11/msg00001.html"
        }
      ]
    }
  },
  "cveMetadata": {
    "assignerOrgId": "53f830b8-0a3f-465b-8143-3b8a9948e749",
    "assignerShortName": "redhat",
    "cveId": "CVE-2022-2905",
    "datePublished": "2022-09-09T00:00:00",
    "dateReserved": "2022-08-19T00:00:00",
    "dateUpdated": "2024-08-03T00:53:00.453Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1",
  "vulnerability-lookup:meta": {
    "nvd": "{\"cve\":{\"id\":\"CVE-2022-2905\",\"sourceIdentifier\":\"secalert@redhat.com\",\"published\":\"2022-09-09T15:15:10.170\",\"lastModified\":\"2024-11-21T07:01:54.340\",\"vulnStatus\":\"Modified\",\"cveTags\":[],\"descriptions\":[{\"lang\":\"en\",\"value\":\"An out-of-bounds memory read flaw was found in the Linux kernel\u0027s BPF subsystem in how a user calls the bpf_tail_call function with a key larger than the max_entries of the map. This flaw allows a local user to gain unauthorized access to data.\"},{\"lang\":\"es\",\"value\":\"Se ha encontrado un fallo de lectura de memoria fuera de l\u00edmites en el subsistema BPF del kernel de Linux en la forma en que un usuario llama a la funci\u00f3n bpf_tail_call con una clave mayor que el max_entries del mapa. Este fallo permite a un usuario local conseguir acceso no autorizado a los datos\"}],\"metrics\":{\"cvssMetricV31\":[{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"cvssData\":{\"version\":\"3.1\",\"vectorString\":\"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N\",\"baseScore\":5.5,\"baseSeverity\":\"MEDIUM\",\"attackVector\":\"LOCAL\",\"attackComplexity\":\"LOW\",\"privilegesRequired\":\"LOW\",\"userInteraction\":\"NONE\",\"scope\":\"UNCHANGED\",\"confidentialityImpact\":\"HIGH\",\"integrityImpact\":\"NONE\",\"availabilityImpact\":\"NONE\"},\"exploitabilityScore\":1.8,\"impactScore\":3.6}]},\"weaknesses\":[{\"source\":\"secalert@redhat.com\",\"type\":\"Secondary\",\"description\":[{\"lang\":\"en\",\"value\":\"CWE-125\"}]},{\"source\":\"nvd@nist.gov\",\"type\":\"Secondary\",\"description\":[{\"lang\":\"en\",\"value\":\"CWE-125\"}]}],\"configurations\":[{\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*\",\"versionEndExcluding\":\"6.0\",\"matchCriteriaId\":\"87B81C9D-7173-4FFB-97BC-9C41AB20A53C\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:6.0:rc1:*:*:*:*:*:*\",\"matchCriteriaId\":\"E8BD11A3-8643-49B6-BADE-5029A0117325\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:6.0:rc2:*:*:*:*:*:*\",\"matchCriteriaId\":\"5F0AD220-F6A9-4012-8636-155F1B841FAD\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:6.0:rc3:*:*:*:*:*:*\",\"matchCriteriaId\":\"A46498B3-78E1-4623-AAE1-94D29A42BE4E\"}]}]},{\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:redhat:enterprise_linux:8.0:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"F4CFF558-3C47-480D-A2F0-BABF26042943\"}]}]},{\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:debian:debian_linux:10.0:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"07B237A9-69A3-4A9C-9DA0-4E06BD37AE73\"}]}]}],\"references\":[{\"url\":\"https://bugzilla.redhat.com/show_bug.cgi?id=2121800\",\"source\":\"secalert@redhat.com\",\"tags\":[\"Exploit\",\"Issue Tracking\",\"Patch\",\"Third Party Advisory\"]},{\"url\":\"https://lists.debian.org/debian-lts-announce/2022/11/msg00001.html\",\"source\":\"secalert@redhat.com\",\"tags\":[\"Mailing List\",\"Third Party Advisory\"]},{\"url\":\"https://lore.kernel.org/bpf/984b37f9fdf7ac36831d2137415a4a915744c1b6.1661462653.git.daniel%40iogearbox.net/\",\"source\":\"secalert@redhat.com\"},{\"url\":\"https://bugzilla.redhat.com/show_bug.cgi?id=2121800\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Exploit\",\"Issue Tracking\",\"Patch\",\"Third Party Advisory\"]},{\"url\":\"https://lists.debian.org/debian-lts-announce/2022/11/msg00001.html\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Mailing List\",\"Third Party Advisory\"]},{\"url\":\"https://lore.kernel.org/bpf/984b37f9fdf7ac36831d2137415a4a915744c1b6.1661462653.git.daniel%40iogearbox.net/\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"}]}}"
  }
}
  suse-su-2022:3609-1
Vulnerability from csaf_suse
Published
2022-10-18 09:44
    Modified
2022-10-18 09:44
    Summary
Security update for the Linux Kernel
    Notes
Title of the patch
Security update for the Linux Kernel
    Description of the patch
The SUSE Linux Enterprise 15 SP3 Azure kernel was updated to receive various security and bugfixes.
The following security bugs were fixed:
- CVE-2022-39190: Fixed an issue that was discovered in net/netfilter/nf_tables_api.c and could cause a denial of service upon binding to an already bound chain (bnc#1203117).
- CVE-2022-39188: Fixed race condition in include/asm-generic/tlb.h where a device driver can free a page while it still has stale TLB entries (bnc#1203107).
- CVE-2022-36879: Fixed an issue in xfrm_expand_policies in net/xfrm/xfrm_policy.c where a refcount could be dropped twice (bnc#1201948).
- CVE-2022-3028: Fixed race condition that was found in the IP framework for transforming packets (XFRM subsystem) (bnc#1202898).
- CVE-2022-2977: Fixed reference counting for struct tpm_chip (bsc#1202672).
- CVE-2022-2905: Fixed tnum_range usage on array range checking for poke descriptors (bsc#1202564, bsc#1202860).
- CVE-2022-2663: Fixed an issue that was found in nf_conntrack_irc where the message handling could be confused and incorrectly matches the message (bnc#1202097).
- CVE-2022-2639: Fixed an integer coercion error that was found in the openvswitch kernel module (bnc#1202154).
- CVE-2022-26373: Fixed non-transparent sharing of return predictor targets between contexts in some Intel Processors (bnc#1201726).
- CVE-2022-2588: Fixed use-after-free in cls_route (bsc#1202096).
- CVE-2022-20369: Fixed out of bounds write in v4l2_m2m_querybuf of v4l2-mem2mem.c (bnc#1202347).
- CVE-2022-20368: Fixed slab-out-of-bounds access in packet_recvmsg() (bsc#1202346).
- CVE-2021-4203: Fixed use-after-free read flaw that was found in sock_getsockopt() in net/core/sock.c due to SO_PEERCRED and SO_PEERGROUPS race with listen() (bnc#1194535).
- CVE-2021-4155: Fixed a data leak flaw that was found in the way XFS_IOC_ALLOCSP IOCTL in the XFS filesystem (bnc#1194272).
- CVE-2020-36516: Fixed an issue in the mixed IPID assignment method where an attacker was able to inject data into or terminate a victim's TCP session (bnc#1196616).
- CVE-2020-27784: Fixed a vulnerability that was found in printer_ioctl() printer_ioctl() when accessing a deallocated instance (bnc#1202895).
- CVE-2016-3695: Fixed an issue inside the einj_error_inject function in drivers/acpi/apei/einj.c that allowed users to simulate hardware errors and consequently cause a denial of service (bnc#1023051).
- CVE-2022-3303: Fixed a race condition in the sound subsystem due to improper locking (bnc#1203769).
- CVE-2022-41218: Fixed an use-after-free caused by refcount races in drivers/media/dvb-core/dmxdev.c (bnc#1202960).
- CVE-2022-3239: Fixed an use-after-free in the video4linux driver that could lead a local user to able to crash the system or escalate their privileges (bnc#1203552).
- CVE-2022-41848: Fixed a race condition and resultant use-after-free if a physically proximate attacker removes a PCMCIA device while calling ioctl (bnc#1203987).
- CVE-2022-41849: Fixed a race condition and resultant use-after-free if a physically proximate attacker removes a USB device while calling open (bnc#1203992).
- CVE-2022-2586: Fixed a use-after-free which can be triggered when a nft table is deleted (bnc#1202095).
- CVE-2022-41222: Fixed a use-after-free via a stale TLB because an rmap lock is not held during a PUD move (bnc#1203622).
- CVE-2022-2503: Fixed a bug in dm-verity, device-mapper table reloads allowed users with root privileges to switch out the target with an equivalent dm-linear target and bypass verification till reboot. This allowed root to bypass LoadPin and can be used to load untrusted and unverified kernel modules and firmware, which implies arbitrary kernel execution and persistence for peripherals that do not verify firmware updates (bnc#1202677).
- CVE-2020-16119: Fixed a use-after-free vulnerability exploitable by a local attacker due to reuse of a DCCP socket. (bnc#1177471)
The following non-security bugs were fixed:
- ACPI: APEI: Better fix to avoid spamming the console with old error logs (git-fixes).
- ACPI: CPPC: Do not prevent CPPC from working in the future (git-fixes).
- ACPI: EC: Remove duplicate ThinkPad X1 Carbon 6th entry from DMI quirks (git-fixes).
- ACPI: LPSS: Fix missing check in register_device_clock() (git-fixes).
- ACPI: PM: save NVS memory for Lenovo G40-45 (git-fixes).
- ACPI: processor: Remove freq Qos request for all CPUs (git-fixes).
- ACPI: property: Return type of acpi_add_nondev_subnodes() should be bool (git-fixes).
- ACPI: video: Force backlight native for some TongFang devices (git-fixes).
- ACPI: video: Shortening quirk list by identifying Clevo by board_name only (git-fixes).
- ALSA: aloop: Fix random zeros in capture data when using jiffies timer (git-fixes).
- ALSA: bcd2000: Fix a UAF bug on the error path of probing (git-fixes).
- ALSA: emu10k1: Fix out of bounds access in snd_emu10k1_pcm_channel_alloc() (git-fixes).
- ALSA: hda/cirrus - support for iMac 12,1 model (git-fixes).
- ALSA: hda/conexant: Add quirk for LENOVO 20149 Notebook model (git-fixes).
- ALSA: hda/realtek: Add a quirk for HP OMEN 15 (8786) mute LED (git-fixes).
- ALSA: hda/realtek: Add mute LED quirk for HP Omen laptop (git-fixes).
- ALSA: hda/realtek: Add new alc285-hp-amp-init model (git-fixes).
- ALSA: hda/realtek: Add quirk for another Asus K42JZ model (git-fixes).
- ALSA: hda/realtek: Add quirk for Clevo L140PU (git-fixes).
- ALSA: hda/realtek: Add quirk for Clevo NP50PNJ (git-fixes).
- ALSA: hda/realtek: Add quirk for Clevo NP70PNJ (git-fixes).
- ALSA: hda/realtek: Add quirk for Clevo NP70PNP (git-fixes).
- ALSA: hda/realtek: Add quirk for Clevo NS50PU (git-fixes).
- ALSA: hda/realtek: Add quirk for Clevo NV45PZ (git-fixes).
- ALSA: hda/realtek: Add quirk for Dell Latitude 7520 (git-fixes).
- ALSA: hda/realtek: Add quirk for HP Dev One (git-fixes).
- ALSA: hda/realtek: Add quirk for HP Spectre x360 15-eb0xxx (git-fixes).
- ALSA: hda/realtek: Add quirk for the Framework Laptop (git-fixes).
- ALSA: hda/realtek: Add quirk for TongFang devices with pop noise (git-fixes).
- ALSA: hda/realtek: Fix deadlock by COEF mutex (git-fixes).
- ALSA: hda/realtek: Fix headset mic for Acer SF313-51 (git-fixes).
- ALSA: hda/realtek: Fix LED on HP ProBook 435 G7 (git-fixes).
- ALSA: hda/realtek: fix mute/micmute LEDs for a HP ProBook (git-fixes).
- ALSA: hda/realtek: fix mute/micmute LEDs for HP machines (git-fixes).
- ALSA: hda/realtek: fix right sounds and mute/micmute LEDs for HP machine (git-fixes).
- ALSA: hda/realtek: fix right sounds and mute/micmute LEDs for HP machines (git-fixes).
- ALSA: hda/realtek: Re-arrange quirk table entries (git-fixes).
- ALSA: info: Fix llseek return value when using callback (git-fixes).
- ALSA: seq: Fix data-race at module auto-loading (git-fixes).
- ALSA: seq: oss: Fix data-race for max_midi_devs access (git-fixes).
- ALSA: usb-audio: Fix an out-of-bounds bug in __snd_usb_parse_audio_interface() (git-fixes).
- ALSA: usb-audio: fix spelling mistakes (git-fixes).
- ALSA: usb-audio: Inform the delayed registration more properly (git-fixes).
- ALSA: usb-audio: More comprehensive mixer map for ASUS ROG Zenith II (git-fixes).
- ALSA: usb-audio: Register card again for iface over delayed_register option (git-fixes).
- ALSA: usb-audio: Split endpoint setups for hw_params and prepare (git-fixes).
- ARM: 9077/1: PLT: Move struct plt_entries definition to header (git-fixes).
- ARM: 9078/1: Add warn suppress parameter to arm_gen_branch_link() (git-fixes).
- ARM: 9079/1: ftrace: Add MODULE_PLTS support (git-fixes).
- ARM: 9098/1: ftrace: MODULE_PLT: Fix build problem without DYNAMIC_FTRACE (git-fixes).
- arm64: cpufeature: Allow different PMU versions in ID_DFR0_EL1 (git-fixes)
- arm64: dts: allwinner: A64 Sopine: phy-mode rgmii-id (git-fixes)
- arm64: dts: allwinner: a64-sopine-baseboard: change RGMII mode to (bsc#1202341)
- arm64: dts: allwinner: H5: NanoPi Neo Plus2: phy-mode rgmii-id (git-fixes)
- arm64: dts: rockchip: Pull up wlan wake# on Gru-Bob (git-fixes)
- arm64: dts: rockchip: Remove 'enable-active-low' from rk3399-puma (git-fixes)
- arm64: dts: rockchip: Set RK3399-Gru PCLK_EDP to 24 MHz (git-fixes)
- arm64: dts: uniphier: Fix USB interrupts for PXs3 SoC (git-fixes)
- arm64: kexec_file: use more system keyrings to verify kernel image signature (bsc#1196444).
- arm64: mm: Always update TCR_EL1 from __cpu_set_tcr_t0sz() (git-fixes)
- arm64: mm: fix p?d_leaf() (git-fixes)
- arm64: mm: use a 48-bit ID map when possible on 52-bit VA builds (git-fixes)
- arm64: mm: Validate hotplug range before creating linear mapping (git-fixes)
- arm64: signal: nofpsimd: Do not allocate fp/simd context when not available (git-fixes).
- arm64: tegra: Fix SDMMC1 CD on P2888 (git-fixes)
- arm64: tegra: Remove non existent Tegra194 reset (git-fixes)
- arm64: tlb: fix the TTL value of tlb_get_level (git-fixes)
- asm-generic: sections: refactor memory_intersects (git-fixes).
- ASoC: audio-graph-card: Add of_node_put() in fail path (git-fixes).
- ASoC: codecs: da7210: add check for i2c_add_driver (git-fixes).
- ASoC: codecs: msm8916-wcd-digital: move gains from SX_TLV to S8_TLV (git-fixes).
- ASoC: codecs: wcd9335: move gains from SX_TLV to S8_TLV (git-fixes).
- ASoC: mt6797-mt6351: Fix refcount leak in mt6797_mt6351_dev_probe (git-fixes).
- ASoC: qcom: q6dsp: Fix an off-by-one in q6adm_alloc_copp() (git-fixes).
- ASoC: SOF: debug: Fix potential buffer overflow by snprintf() (git-fixes).
- ASoC: tas2770: Allow mono streams (git-fixes).
- ata: libata-eh: Add missing command name (git-fixes).
- ath10k: do not enforce interrupt trigger type (git-fixes).
- ath10k: Fix error handling in ath10k_setup_msa_resources (git-fixes).
- atm: idt77252: fix use-after-free bugs caused by tst_timer (git-fixes).
- blk-iocost: clamp inuse and skip noops in __propagate_weights() (bsc#1202722).
- blk-iocost: fix operation ordering in iocg_wake_fn() (bsc#1202720).
- blk-iocost: fix weight updates of inner active iocgs (bsc#1202717).
- blk-iocost: rename propagate_active_weights() to propagate_weights() (bsc#1202722).
- blktrace: fix blk_rq_merge documentation (git-fixes).
- Bluetooth: hci_intel: Add check for platform_driver_register (git-fixes).
- Bluetooth: L2CAP: Fix build errors in some archs (git-fixes).
- Bluetooth: L2CAP: Fix l2cap_global_chan_by_psm regression (git-fixes).
- Bluetooth: L2CAP: Fix use-after-free caused by l2cap_chan_put (git-fixes).
- Bluetooth: MGMT: Fixes build warnings with C=1 (git-fixes).
- bpf: Compile out btf_parse_module() if module BTF is not enabled (git-fixes).
- bus: hisi_lpc: fix missing platform_device_put() in hisi_lpc_acpi_probe() (git-fixes).
- can: Break loopback loop on loopback documentation (git-fixes).
- can: ems_usb: fix clang's -Wunaligned-access warning (git-fixes).
- can: error: specify the values of data[5..7] of CAN error frames (git-fixes).
- can: hi311x: do not report txerr and rxerr during bus-off (git-fixes).
- can: kvaser_usb_hydra: do not report txerr and rxerr during bus-off (git-fixes).
- can: kvaser_usb_leaf: do not report txerr and rxerr during bus-off (git-fixes).
- can: m_can: process interrupt only when not runtime suspended (git-fixes).
- can: pch_can: do not report txerr and rxerr during bus-off (git-fixes).
- can: pch_can: pch_can_error(): initialize errc before using it (git-fixes).
- can: rcar_can: do not report txerr and rxerr during bus-off (git-fixes).
- can: sja1000: do not report txerr and rxerr during bus-off (git-fixes).
- can: sun4i_can: do not report txerr and rxerr during bus-off (git-fixes).
- can: usb_8dev: do not report txerr and rxerr during bus-off (git-fixes).
- ceph: do not leak snap_rwsem in handle_cap_grant (bsc#1202810).
- ceph: do not truncate file in atomic_open (bsc#1202811).
- cgroup: cgroup_get_from_id() must check the looked-up kn is a directory (bsc#1203906).
- cgroup: Trace event cgroup id fields should be u64 (git-fixes).
- cgroup: Use separate src/dst nodes when preloading css_sets for migration (bsc#1201610).
- clk: bcm: rpi: Fix error handling of raspberrypi_fw_get_rate (git-fixes).
- clk: core: Fix runtime PM sequence in clk_core_unprepare() (git-fixes).
- clk: core: Honor CLK_OPS_PARENT_ENABLE for clk gate ops (git-fixes).
- clk: qcom: camcc-sdm845: Fix topology around titan_top power domain (git-fixes).
- clk: qcom: clk-krait: unlock spin after mux completion (git-fixes).
- clk: qcom: ipq8074: dont disable gcc_sleep_clk_src (git-fixes).
- clk: qcom: ipq8074: fix NSS core PLL-s (git-fixes).
- clk: qcom: ipq8074: fix NSS port frequency tables (git-fixes).
- clk: qcom: ipq8074: set BRANCH_HALT_DELAY flag for UBI clocks (git-fixes).
- clk: qcom: ipq8074: SW workaround for UBI32 PLL lock (git-fixes).
- clk: renesas: r9a06g032: Fix UART clkgrp bitsel (git-fixes).
- clk: rockchip: add sclk_mac_lbtest to rk3188_critical_clocks (git-fixes).
- coresight: cti: Correct the parameter for pm_runtime_put (git-fixes).
- crypto: arm64/gcm - Select AEAD for GHASH_ARM64_CE (git-fixes)
- crypto: arm64/poly1305 - fix a read out-of-bound (git-fixes)
- devlink: Fix use-after-free after a failed reload (git-fixes).
- dm raid: fix KASAN warning in raid5_add_disks (git-fixes).
- dmaengine: sprd: Cleanup in .remove() after pm_runtime_get_sync() failed (git-fixes).
- dpaa2-eth: unregister the netdev before disconnecting from the PHY (git-fixes).
- driver core: Do not probe devices after bus_type.match() probe deferral (git-fixes).
- driver core: fix potential deadlock in __driver_attach (git-fixes).
- drm: adv7511: override i2c address of cec before accessing it (git-fixes).
- drm: bridge: adv7511: Add check for mipi_dsi_driver_register (git-fixes).
- drm: bridge: sii8620: fix possible off-by-one (git-fixes).
- drm/amd/display: Enable building new display engine with KCOV enabled (git-fixes).
- drm/amdgpu: Check BO's requested pinning domains against its preferred_domains (git-fixes).
- drm/amdgpu: Check num_gfx_rings for gfx v9_0 rb setup (git-fixes).
- drm/amdgpu: mmVM_L2_CNTL3 register not initialized correctly (git-fixes).
- drm/amdgpu: remove useless condition in amdgpu_job_stop_all_jobs_on_sched() (git-fixes).
- drm/bridge: tc358767: Make sure Refclk clock are enabled (git-fixes).
- drm/doc: Fix comment typo (git-fixes).
- drm/exynos/exynos7_drm_decon: free resources when clk_set_parent() failed (git-fixes).
- drm/gem: Fix GEM handle release errors (git-fixes).
- drm/gem: Properly annotate WW context on drm_gem_lock_reservations() error (git-fixes).
- drm/i915/glk: ECS Liva Q2 needs GLK HDMI port timing quirk (git-fixes).
- drm/i915/reg: Fix spelling mistake 'Unsupport' -> 'Unsupported' (git-fixes).
- drm/mcde: Fix refcount leak in mcde_dsi_bind (git-fixes).
- drm/mediatek: Add pull-down MIPI operation in mtk_dsi_poweroff function (git-fixes).
- drm/mediatek: dpi: Only enable dpi after the bridge is enabled (git-fixes).
- drm/mediatek: dpi: Remove output format of YUV (git-fixes).
- drm/meson: Correct OSD1 global alpha value (git-fixes).
- drm/meson: Fix OSD1 RGB to YCbCr coefficient (git-fixes).
- drm/meson: Fix overflow implicit truncation warnings (git-fixes).
- drm/meson: Fix refcount bugs in meson_vpu_has_available_connectors() (git-fixes).
- drm/mipi-dbi: align max_chunk to 2 in spi_transfer (git-fixes).
- drm/msm/dsi: Fix number of regulators for msm8996_dsi_cfg (git-fixes).
- drm/msm/dsi: Fix number of regulators for SDM660 (git-fixes).
- drm/msm/dsi: fix the inconsistent indenting (git-fixes).
- drm/msm/hdmi: enable core-vcc/core-vdda-supply for 8996 platform (git-fixes).
- drm/msm/mdp5: Fix global state lock backoff (git-fixes).
- drm/msm/rd: Fix FIFO-full deadlock (git-fixes).
- drm/nouveau: fix another off-by-one in nvbios_addr (git-fixes).
- drm/radeon: add a force flush to delay work when radeon (git-fixes).
- drm/radeon: fix incorrrect SPDX-License-Identifiers (git-fixes).
- drm/radeon: fix potential buffer overflow in ni_set_mc_special_registers() (git-fixes).
- drm/rockchip: Fix an error handling path rockchip_dp_probe() (git-fixes).
- drm/rockchip: vop: Do not crash for invalid duplicate_state() (git-fixes).
- drm/st7735r: Fix module autoloading for Okaya RH128128T (git-fixes).
- drm/sun4i: dsi: Prevent underflow when computing packet sizes (git-fixes).
- drm/vc4: dsi: Add correct stop condition to vc4_dsi_encoder_disable iteration (git-fixes).
- drm/vc4: dsi: Correct DSI divider calculations (git-fixes).
- drm/vc4: dsi: Correct pixel order for DSI0 (git-fixes).
- drm/vc4: hdmi: Correct HDMI timing registers for interlaced modes (git-fixes).
- drm/vc4: hdmi: Fix timings for interlaced modes (git-fixes).
- drm/vc4: plane: Fix margin calculations for the right/bottom edges (git-fixes).
- drm/vc4: plane: Remove subpixel positioning check (git-fixes).
- efi: capsule-loader: Fix use-after-free in efi_capsule_write (git-fixes).
- ehea: fix error return code in ehea_restart_qps() (git-fixes).
- enetc: Fix endianness issues for enetc_qos (git-fixes).
- ethernet: sun: niu: fix missing checks of niu_pci_eeprom_read() (git-fixes).
- ext4: add reserved GDT blocks check (bsc#1202712).
- ext4: do not set SB_ACTIVE in ext4_orphan_cleanup() (bsc#1202708).
- ext4: do not use the orphan list when migrating an inode (bsc#1197756).
- ext4: Fix BUG_ON in ext4_bread when write quota data (bsc#1197755).
- ext4: fix bug_on in ext4_writepages (bsc#1200872).
- ext4: fix error handling code in add_new_gdb (bsc#1179722).
- ext4: fix error handling in ext4_restore_inline_data() (bsc#1197757).
- ext4: fix invalid inode checksum (bsc#1179723).
- ext4: fix loff_t overflow in ext4_max_bitmap_size() (bsc#1202709).
- ext4: fix overhead calculation to account for the reserved gdt blocks (bsc#1200869).
- ext4: fix potential infinite loop in ext4_dx_readdir() (bsc#1191662).
- ext4: fix race when reusing xattr blocks (bsc#1198971).
- ext4: fix symlink file size not match to file content (bsc#1200868).
- ext4: fix use-after-free in ext4_rename_dir_prepare (bsc#1200871).
- ext4: fix use-after-free in ext4_search_dir (bsc#1202710).
- ext4: fix warning in ext4_handle_inode_extension (bsc#1202711).
- ext4: force overhead calculation if the s_overhead_cluster makes no sense (bsc#1200870).
- ext4: recover csum seed of tmp_inode after migrating to extents (bsc#1202713).
- ext4: remove EA inode entry from mbcache on inode eviction (bsc#1198971).
- ext4: unindent codeblock in ext4_xattr_block_set() (bsc#1198971).
- fbcon: Fix boundary checks for fbcon=vc:n1-n2 parameters (git-fixes).
- fbdev: chipsfb: Add missing pci_disable_device() in chipsfb_pci_init() (git-fixes).
- fbdev: fb_pm2fb: Avoid potential divide by zero error (git-fixes).
- firmware: tegra: bpmp: Do only aligned access to IPC memory area (git-fixes).
- Fix parsing of rpm/macros.kernel-source on SLE12 (bsc#1201019).
- fpga: altera-pr-ip: fix unsigned comparison with less than zero (git-fixes).
- fs-writeback: writeback_sb_inodes: Recalculate 'wrote' according skipped pages (bsc#1200873).
- ftrace: Fix NULL pointer dereference in is_ftrace_trampoline when ftrace is dead (git-fixes).
- fuse: ioctl: translate ENOSYS (bsc#1203136).
- fuse: limit nsec (bsc#1203135).
- fuse: Remove the control interface for virtio-fs (bsc#1203137).
- gadgetfs: ep_io - wait until IRQ finishes (git-fixes).
- geneve: do not use RT_TOS for IPv6 flowlabel (git-fixes).
- geneve: fix TOS inheriting for ipv4 (git-fixes).
- gpio: gpiolib-of: Fix refcount bugs in of_mm_gpiochip_add_data() (git-fixes).
- gpio: mpc8xxx: Fix support for IRQ_TYPE_LEVEL_LOW flow_type in mpc85xx (git-fixes).
- gpio: pca953x: Add mutex_lock for regcache sync in PM (git-fixes).
- HID: alps: Declare U1_UNICORN_LEGACY support (git-fixes).
- HID: cp2112: prevent a buffer overflow in cp2112_xfer() (git-fixes).
- HID: intel-ish-hid: ishtp: Fix ishtp client sending disordered message (git-fixes).
- HID: ishtp-hid-clientHID: ishtp-hid-client: Fix comment typo (git-fixes).
- HID: steam: Prevent NULL pointer dereference in steam_{recv,send}_report (git-fixes).
- HID: wacom: Do not register pad_input for touch switch (git-fixes).
- HID: wacom: Only report rotation for art pen (git-fixes).
- hv_netvsc: Load and store the proper (NBL_HASH_INFO) per-packet info (bsc#1202701).
- hwmon: (gpio-fan) Fix array out of bounds access (git-fixes).
- i2c: cadence: Support PEC for SMBus block read (git-fixes).
- i2c: Fix a potential use after free (git-fixes).
- i2c: imx: Make sure to unregister adapter on remove() (git-fixes).
- i2c: mux-gpmux: Add of_node_put() when breaking out of loop (git-fixes).
- ice: report supported and advertised autoneg using PHY capabilities (git-fixes).
- ieee802154: cc2520: add rc code in cc2520_tx() (git-fixes).
- ieee802154/adf7242: defer destroy_workqueue call (git-fixes).
- iio: accel: bma220: Fix alignment for DMA safety (git-fixes).
- iio: accel: sca3000: Fix alignment for DMA safety (git-fixes).
- iio: adc: ad7266: Fix alignment for DMA safety (git-fixes).
- iio: adc: ad7298: Fix alignment for DMA safety (git-fixes).
- iio: adc: ad7476: Fix alignment for DMA safety (git-fixes).
- iio: adc: ad7766: Fix alignment for DMA safety (git-fixes).
- iio: adc: ad7768-1: Fix alignment for DMA safety (git-fixes).
- iio: adc: ad7887: Fix alignment for DMA safety (git-fixes).
- iio: adc: hi8435: Fix alignment for DMA safety (git-fixes).
- iio: adc: ltc2497: Fix alignment for DMA safety (git-fixes).
- iio: adc: max1027: Fix alignment for DMA safety (git-fixes).
- iio: adc: max11100: Fix alignment for DMA safety (git-fixes).
- iio: adc: max1118: Fix alignment for DMA safety (git-fixes).
- iio: adc: mcp320x: Fix alignment for DMA safety (git-fixes).
- iio: adc: mcp3911: make use of the sign bit (git-fixes).
- iio: adc: mcp3911: use correct formula for AD conversion (git-fixes).
- iio: adc: ti-adc0832: Fix alignment for DMA safety (git-fixes).
- iio: adc: ti-adc084s021: Fix alignment for DMA safety (git-fixes).
- iio: adc: ti-adc12138: Fix alignment for DMA safety (git-fixes).
- iio: adc: ti-adc128s052: Fix alignment for DMA safety (git-fixes).
- iio: adc: ti-adc161s626: Fix alignment for DMA safety (git-fixes).
- iio: adc: ti-ads124s08: Fix alignment for DMA safety (git-fixes).
- iio: adc: ti-ads7950: Fix alignment for DMA safety (git-fixes).
- iio: adc: ti-ads8344: Fix alignment for DMA safety (git-fixes).
- iio: adc: ti-ads8688: Fix alignment for DMA safety (git-fixes).
- iio: adc: ti-tlc4541: Fix alignment for DMA safety (git-fixes).
- iio: amplifiers: ad8366: Fix alignment for DMA safety (git-fixes).
- iio: core: Fix IIO_ALIGN and rename as it was not sufficiently large (git-fixes).
- iio: dac: ad5064: Fix alignment for DMA safety (git-fixes).
- iio: dac: ad5360: Fix alignment for DMA safety (git-fixes).
- iio: dac: ad5421: Fix alignment for DMA safety (git-fixes).
- iio: dac: ad5449: Fix alignment for DMA safety (git-fixes).
- iio: dac: ad5504: Fix alignment for DMA safety (git-fixes).
- iio: dac: ad5755: Fix alignment for DMA safety (git-fixes).
- iio: dac: ad5761: Fix alignment for DMA safety (git-fixes).
- iio: dac: ad5764: Fix alignment for DMA safety (git-fixes).
- iio: dac: ad5791: Fix alignment for DMA saftey (git-fixes).
- iio: dac: ad7303: Fix alignment for DMA safety (git-fixes).
- iio: dac: ad8801: Fix alignment for DMA safety (git-fixes).
- iio: dac: mcp4922: Fix alignment for DMA safety (git-fixes).
- iio: dac: ti-dac082s085: Fix alignment for DMA safety (git-fixes).
- iio: dac: ti-dac5571: Fix alignment for DMA safety (git-fixes).
- iio: dac: ti-dac7311: Fix alignment for DMA safety (git-fixes).
- iio: dac: ti-dac7612: Fix alignment for DMA safety (git-fixes).
- iio: frequency: ad9523: Fix alignment for DMA safety (git-fixes).
- iio: frequency: adf4350: Fix alignment for DMA safety (git-fixes).
- iio: frequency: adf4371: Fix alignment for DMA safety (git-fixes).
- iio: gyro: adis16080: Fix alignment for DMA safety (git-fixes).
- iio: gyro: adis16130: Fix alignment for DMA safety (git-fixes).
- iio: gyro: adxrs450: Fix alignment for DMA safety (git-fixes).
- iio: gyro: fxas210002c: Fix alignment for DMA safety (git-fixes).
- iio: light: isl29028: Fix the warning in isl29028_remove() (git-fixes).
- iio: potentiometer: ad5272: Fix alignment for DMA safety (git-fixes).
- iio: potentiometer: max5481: Fix alignment for DMA safety (git-fixes).
- iio: potentiometer: mcp41010: Fix alignment for DMA safety (git-fixes).
- iio: potentiometer: mcp4131: Fix alignment for DMA safety (git-fixes).
- iio: proximity: as3935: Fix alignment for DMA safety (git-fixes).
- iio: resolver: ad2s1200: Fix alignment for DMA safety (git-fixes).
- iio: resolver: ad2s90: Fix alignment for DMA safety (git-fixes).
- ima: force signature verification when CONFIG_KEXEC_SIG is configured (bsc#1203737).
- Input: iforce - add support for Boeder Force Feedback Wheel (git-fixes).
- Input: iforce - wake up after clearing IFORCE_XMIT_RUNNING flag (git-fixes).
- Input: melfas_mip4 - fix return value check in mip4_probe() (git-fixes).
- Input: rk805-pwrkey - fix module autoloading (git-fixes).
- Input: snvs_pwrkey - fix SNVS_HPVIDR1 register address (git-fixes).
- intel_th: Fix a resource leak in an error handling path (git-fixes).
- intel_th: msu-sink: Potential dereference of null pointer (git-fixes).
- intel_th: msu: Fix vmalloced buffers (git-fixes).
- intel_th: pci: Add Meteor Lake-P support (git-fixes).
- intel_th: pci: Add Raptor Lake-S CPU support (git-fixes).
- intel_th: pci: Add Raptor Lake-S PCH support (git-fixes).
- iommu/amd: Simplify and Consolidate Virtual APIC (AVIC) Enablement (git-fixes).
- iommu/arm-smmu: qcom_iommu: Add of_node_put() when breaking out of loop (git-fixes).
- iommu/exynos: Handle failed IOMMU device registration properly (git-fixes).
- iommu/iova: Improve 32-bit free space estimate (git-fixes).
- iommu/ipmmu-vmsa: Check for error num after setting mask (git-fixes).
- iommu/mediatek: Add list_del in mtk_iommu_remove (git-fixes).
- iommu/msm: Fix an incorrect NULL check on list iterator (git-fixes).
- iommu/omap: Fix regression in probe for NULL pointer dereference (git-fixes).
- iommu/vt-d: avoid invalid memory access via node_online(NUMA_NO_NODE) (git-fixes).
- iommu/vt-d: Calculate mask for non-aligned flushes (git-fixes).
- iommu/vt-d: Fix PCI bus rescan device hot add (git-fixes).
- iommu/vt-d: Fix RID2PASID setup/teardown failure (git-fixes).
- ipheth: fix EOVERFLOW in ipheth_rcvbulk_callback (git-fixes).
- ipmi: ssif: initialize ssif_info->client early (git-fixes).
- ixgbevf: add correct exception tracing for XDP (git-fixes).
- jbd2: fix assertion 'jh->b_frozen_data == NULL' failure when journal aborted (bsc#1202716).
- jbd2: fix outstanding credits assert in jbd2_journal_commit_transaction() (bsc#1202715).
- jfs: fix GPF in diFree (bsc#1203389).
- JFS: fix memleak in jfs_mount (git-fixes).
- JFS: more checks for invalid superblock (git-fixes).
- jfs: prevent NULL deref in diFree (bsc#1203389).
- kABI: cgroup: Restore KABI of css_set (bsc#1201610).
- kABI: x86: kexec: hide new include from genksyms (bsc#1196444).
- kabi/severities: add stmmac driver local sumbols
- kexec: clean up arch_kexec_kernel_verify_sig (bsc#1196444).
- kexec: do not verify the signature without the lockdown or mandatory signature (bsc#1203737).
- kexec: drop weak attribute from arch_kexec_apply_relocations[_add] (bsc#1196444).
- kexec: drop weak attribute from functions (bsc#1196444).
- kexec: drop weak attribute from functions (bsc#1196444).
- kexec: KEYS, s390: Make use of built-in and secondary keyring for signature verification (bsc#1196444).
- kexec: KEYS: make the code in bzImage64_verify_sig generic (bsc#1196444).
- kfifo: fix kfifo_to_user() return type (git-fixes).
- kfifo: fix ternary sign extension bugs (git-fixes).
- KVM: arm64: Avoid setting the upper 32 bits of TCR_EL2 and CPTR_EL2 (bsc#1201442)
- KVM: nVMX: Let userspace set nVMX MSR to any _host_ supported value (git-fixes).
- KVM: nVMX: Snapshot pre-VM-Enter BNDCFGS for !nested_run_pending case (git-fixes).
- KVM: nVMX: Snapshot pre-VM-Enter DEBUGCTL for !nested_run_pending case (git-fixes).
- KVM: PPC: Book3S HV: Context tracking exit guest context before enabling irqs (bsc#1065729).
- KVM: PPC: Book3S HV: Prevent POWER7/8 TLB flush flushing SLB (bsc#1156395).
- KVM: PPC: Book3S HV: Use GLOBAL_TOC for kvmppc_h_set_dabr/xdabr() (bsc#1156395).
- KVM: PPC: Fix vmx/vsx mixup in mmio emulation (bsc#1156395).
- KVM: PPC: Use arch_get_random_seed_long instead of powernv variant (bsc#1156395).
- KVM: VMX: Refuse to load kvm_intel if EPT and NX are disabled (git-fixes).
- KVM: x86: accept userspace interrupt only if no event is injected (git-fixes).
- KVM: x86: Mark TSS busy during LTR emulation _after_ all fault checks (git-fixes).
- KVM: x86: Set error code to segment selector on LLDT/LTR non-canonical #GP (git-fixes).
- lib: bitmap: provide devm_bitmap_alloc() and devm_bitmap_zalloc() (git-fixes).
- lib/list_debug.c: Detect uninitialized lists (git-fixes).
- lightnvm: Remove lightnvm implemenation (bsc#1191881 bsc#1201420 ZDI-CAN-17325).
- list: add 'list_del_init_careful()' to go with 'list_empty_careful()' (bsc#1202745).
- locking/lockdep: Avoid potential access of invalid memory in lock_class (git-fixes).
- loop: Fix missing discard support when using LOOP_CONFIGURE (bsc#1202718).
- mbcache: add functions to delete entry if unused (bsc#1198971).
- mbcache: do not reclaim used entries (bsc#1198971).
- md-raid10: fix KASAN warning (git-fixes).
- md: call __md_stop_writes in md_stop (git-fixes).
- md: unlock mddev before reap sync_thread in action_store (bsc#1197659).
- md/bitmap: do not set sb values if can't pass sanity check (bsc#1197158).
- media: hdpvr: fix error value returns in hdpvr_read (git-fixes).
- media: rc: increase rc-mm tolerance and add debug message (git-fixes).
- media: rtl28xxu: add missing sleep before probing slave demod (git-fixes).
- media: rtl28xxu: Add support for PROlectrix DV107669 DVB-T dongle (git-fixes).
- media: rtl28xxu: set keymap for Astrometa DVB-T2 (git-fixes).
- media: smipcie: fix interrupt handling and IR timeout (git-fixes).
- media: tw686x: Register the irq at the end of probe (git-fixes).
- media: usb: dvb-usb-v2: rtl28xxu: convert to use i2c_new_client_device() (git-fixes).
- media: v4l2-mem2mem: always consider OUTPUT queue during poll (git-fixes).
- media: v4l2-mem2mem: reorder checks in v4l2_m2m_poll() (git-fixes).
- mediatek: mt76: mac80211: Fix missing of_node_put() in mt76_led_init() (git-fixes).
- memstick/ms_block: Fix a memory leak (git-fixes).
- memstick/ms_block: Fix some incorrect memory allocation (git-fixes).
- meson-mx-socinfo: Fix refcount leak in meson_mx_socinfo_init (git-fixes).
- mfd: max77620: Fix refcount leak in max77620_initialise_fps (git-fixes).
- mfd: t7l66xb: Drop platform disable callback (git-fixes).
- misc: fastrpc: fix memory corruption on open (git-fixes).
- misc: fastrpc: fix memory corruption on probe (git-fixes).
- misc: rtsx: Fix an error handling path in rtsx_pci_probe() (git-fixes).
- mm: bdi: initialize bdi_min_ratio when bdi is unregistered (bsc#1197763).
- mm: fix page reference leak in soft_offline_page() (git fixes (mm/memory-failure)).
- mm: memcontrol: fix potential oom_lock recursion deadlock (bsc#1202447).
- mm: pagewalk: Fix race between unmap and page walker (git-fixes, bsc#1203159).
- mm: proc: smaps_rollup: do not stall write attempts on mmap_lock (bsc#1201990).
- mm: rmap: Fix anon_vma->degree ambiguity leading to double-reuse (git-fixes, bsc#1203098).
- mm: smaps*: extend smap_gather_stats to support specified beginning (bsc#1201990).
- mmap locking API: add mmap_lock_is_contended() (bsc#1201990).
- mmc: cavium-octeon: Add of_node_put() when breaking out of loop (git-fixes).
- mmc: cavium-thunderx: Add of_node_put() when breaking out of loop (git-fixes).
- mmc: pxamci: Fix an error handling path in pxamci_probe() (git-fixes).
- mmc: pxamci: Fix another error handling path in pxamci_probe() (git-fixes).
- mmc: sdhci-of-at91: fix set_uhs_signaling rewriting of MC1R (git-fixes).
- mmc: sdhci-of-esdhc: Fix refcount leak in esdhc_signal_voltage_switch (git-fixes).
- module: Ignore _GLOBAL_OFFSET_TABLE_ when warning for undefined symbols (git-fixes).
- mt76: mt76x02u: fix possible memory leak in __mt76x02u_mcu_send_msg (git-fixes).
- mt7601u: add USB device ID for some versions of XiaoDu WiFi Dongle (git-fixes).
- mtd: maps: Fix refcount leak in ap_flash_init (git-fixes).
- mtd: maps: Fix refcount leak in of_flash_probe_versatile (git-fixes).
- mtd: partitions: Fix refcount leak in parse_redboot_of (git-fixes).
- mtd: rawnand: meson: Fix a potential double free issue (git-fixes).
- mtd: sm_ftl: Fix deadlock caused by cancel_work_sync in sm_release (git-fixes).
- mtd: st_spi_fsm: Add a clk_disable_unprepare() in .probe()'s error path (git-fixes).
- net_sched: cls_route: disallow handle of 0 (bsc#1202393).
- net: bcmgenet: Add mdio-bcm-unimac soft dependency (git-fixes).
- net: cpsw: add missing of_node_put() in cpsw_probe_dt() (git-fixes).
- net: cpsw: Properly initialise struct page_pool_params (git-fixes).
- net: davinci_emac: Fix incorrect masking of tx and rx error channel (git-fixes).
- net: dsa: b53: fix an off by one in checking 'vlan->vid' (git-fixes).
- net: dsa: felix: suppress -EPROBE_DEFER errors (git-fixes).
- net: dsa: mt7530: fix VLAN traffic leaks (git-fixes).
- net: enetc: report software timestamping via SO_TIMESTAMPING (git-fixes).
- net: enetc: unmap DMA in enetc_send_cmd() (git-fixes).
- net: enetc: Use pci_release_region() to release some resources (git-fixes).
- net: ethernet: aeroflex: fix UAF in greth_of_remove (git-fixes).
- net: ethernet: ezchip: fix error handling (git-fixes).
- net: ethernet: ezchip: fix UAF in nps_enet_remove (git-fixes).
- net: ethernet: ezchip: remove redundant check (git-fixes).
- net: ethernet: fix potential use-after-free in ec_bhf_remove (git-fixes).
- net: ethernet: ti: cpsw_ale: Fix access to un-initialized memory (git-fixes).
- net: fec_ptp: add clock rate zero check (git-fixes).
- net: fec: fix the potential memory leak in fec_enet_init() (git-fixes).
- net: ftgmac100: Fix crash when removing driver (git-fixes).
- net: hdlc_x25: Return meaningful error code in x25_open (git-fixes).
- net: hns: Fix kernel-doc (git-fixes).
- net: lantiq: fix memory corruption in RX ring (git-fixes).
- net: lapbether: Prevent racing when checking whether the netif is running (git-fixes).
- net: mana: Add rmb after checking owner bits (git-fixes).
- net: mana: Add support of XDP_REDIRECT action (bug#1201310, jsc#PED-529).
- net: mana: Add the Linux MANA PF driver (bug#1201309, jsc#PED-529).
- net: moxa: Use devm_platform_get_and_ioremap_resource() (git-fixes).
- net: mscc: ocelot: correctly report the timestamping RX filters in ethtool (git-fixes).
- net: mscc: ocelot: do not downgrade timestamping RX filters in SIOCSHWTSTAMP (git-fixes).
- net: mvpp2: fix interrupt mask/unmask skip condition (git-fixes).
- net: netcp: Fix an error message (git-fixes).
- net: pch_gbe: Propagate error from devm_gpio_request_one() (git-fixes).
- net: rose: fix netdev reference changes (git-fixes).
- net: sock: tracing: Fix sock_exceed_buf_limit not to dereference stale pointer (git-fixes).
- net: stmicro: handle clk_prepare() failure during init (git-fixes).
- net: stmmac: disable clocks in stmmac_remove_config_dt() (git-fixes).
- net: stmmac: dwmac1000: Fix extended MAC address registers definition (git-fixes).
- net: stmmac: Modify configuration method of EEE timers (git-fixes).
- net: stmmac: Use resolved link config in mac_link_up() (git-fixes).
- net: vmxnet3: fix possible NULL pointer dereference in vmxnet3_rq_cleanup() (bsc#1200431).
- net: vmxnet3: fix possible use-after-free bugs in vmxnet3_rq_alloc_rx_buf() (bsc#1200431).
- net: vmxnet3: remove multiple false checks in vmxnet3_ethtool.c (bsc#1200431).
- net:emac/emac-mac: Fix a use after free in emac_mac_tx_buf_send (git-fixes).
- net:enetc: allocate CBD ring data memory using DMA coherent methods (git-fixes).
- net/mlx5e: Check for needed capability for cvlan matching (git-fixes).
- net/sonic: Fix a resource leak in an error handling path in 'jazz_sonic_probe()' (git-fixes).
- NFS: Do not decrease the value of seq_nr_highest_sent (git-fixes).
- NFS: fix nfs_path in case of a rename retry (git-fixes).
- NFS: Fix races in the legacy idmapper upcall (git-fixes).
- NFS: Fix second deadlock in nfs4_evict_inode() (git-fixes).
- NFS: Handle NFS4ERR_DELAY replies to OP_SEQUENCE correctly (git-fixes).
- NFS: nfs4_proc_set_acl needs to restore NFS_CAP_UIDGID_NOMAP on error (git-fixes).
- NFS: RECLAIM_COMPLETE must handle EACCES (git-fixes).
- NFS: support EXCHGID4_FLAG_SUPP_FENCE_OPS 4.2 EXCHANGE_ID flag (git-fixes).
- NFSD: Add missing NFSv2 .pc_func methods (git-fixes).
- NFSD: Clamp WRITE offsets (git-fixes).
- NFSD: Fix offset type in I/O trace points (git-fixes).
- NFSD: Fix possible sleep during nfsd4_release_lockowner() (git-fixes).
- NFSD: fix use-after-free due to delegation race (git-fixes).
- NFSD: prevent integer overflow on 32 bit systems (git-fixes).
- NFSD: prevent underflow in nfssvc_decode_writeargs() (git-fixes).
- NTB: ntb_tool: uninitialized heap data in tool_fn_write() (git-fixes).
- nvme-fabrics: parse nvme connect Linux error codes (bsc#1201865).
- nvme-rdma: Handle number of queue changes (bsc#1201865).
- nvme-tcp: fix UAF when detecting digest errors (bsc#1200313 bsc#1201489).
- nvme-tcp: Handle number of queue changes (bsc#1201865).
- nvme: fix RCU hole that allowed for endless looping in multipath round robin (bsc#1202636).
- nvmet: Expose max queues to configfs (bsc#1201865).
- objtool: Add support for intra-function calls (bsc#1202396).
- objtool: Make handle_insn_ops() unconditional (bsc#1202396).
- objtool: Remove INSN_STACK (bsc#1202396).
- objtool: Rework allocating stack_ops on decode (bsc#1202396).
- objtool: Support multiple stack_op per instruction (bsc#1202396).
- ocfs2: drop acl cache for directories too (bsc#1191667).
- ocfs2: fix crash when initialize filecheck kobj fails (bsc#1197920).
- ocfs2: mount fails with buffer overflow in strlen (bsc#1197760).
- octeontx2-af: fix infinite loop in unmapping NPC counter (git-fixes).
- of: fdt: fix off-by-one error in unflatten_dt_nodes() (git-fixes).
- of/device: Fix up of_dma_configure_id() stub (git-fixes).
- PCI: Add ACS quirk for Broadcom BCM5750x NICs (git-fixes).
- PCI: dwc: Add unroll iATU space support to dw_pcie_disable_atu() (git-fixes).
- PCI: dwc: Always enable CDM check if 'snps,enable-cdm-check' exists (git-fixes).
- PCI: dwc: Deallocate EPC memory on dw_pcie_ep_init() errors (git-fixes).
- PCI: dwc: Disable outbound windows only for controllers using iATU (git-fixes).
- PCI: dwc: Stop link on host_init errors and de-initialization (git-fixes).
- PCI: hv: Fix hv_arch_irq_unmask() for multi-MSI (bsc#1200845).
- PCI: hv: Fix interrupt mapping for multi-MSI (bsc#1200845).
- PCI: hv: Fix multi-MSI to allow more than one MSI vector (bsc#1200845).
- PCI: hv: Make the code arch neutral by adding arch specific interfaces (bsc#1200845).
- PCI: hv: Only reuse existing IRTE allocation for Multi-MSI (bsc#1200845).
- PCI: hv: Reuse existing IRTE allocation in compose_msi_msg() (bsc#1200845).
- PCI: qcom: Fix pipe clock imbalance (git-fixes).
- PCI: qcom: Power on PHY before IPQ8074 DBI register accesses (git-fixes).
- PCI: qcom: Set up rev 2.1.0 PARF_PHY before enabling clocks (git-fixes).
- PCI: tegra194: Fix link up retry sequence (git-fixes).
- PCI: tegra194: Fix PM error handling in tegra_pcie_config_ep() (git-fixes).
- PCI: tegra194: Fix Root Port interrupt handling (git-fixes).
- PCI/ACPI: Guard ARM64-specific mcfg_quirks (git-fixes).
- PCI/portdrv: Do not disable AER reporting in get_port_device_capability() (git-fixes).
- perf bench: Share some global variables to fix build with gcc 10 (git-fixes).
- pinctrl: nomadik: Fix refcount leak in nmk_pinctrl_dt_subnode_to_map (git-fixes).
- pinctrl: qcom: msm8916: Allow CAMSS GP clocks to be muxed (git-fixes).
- pinctrl: rockchip: Enhance support for IRQ_TYPE_EDGE_BOTH (git-fixes).
- pinctrl: sunxi: Add I/O bias setting for H6 R-PIO (git-fixes).
- pinctrl/rockchip: fix gpio device creation (git-fixes).
- platform/olpc: Fix uninitialized data in debugfs write (git-fixes).
- platform/x86: acer-wmi: Acer Aspire One AOD270/Packard Bell Dot keymap fixes (git-fixes).
- platform/x86: pmc_atom: Fix SLP_TYPx bitfield mask (git-fixes).
- PM: runtime: Remove link state checks in rpm_get/put_supplier() (git-fixes).
- powerpc: define get_cycles macro for arch-override (bsc#1065729).
- powerpc: Enable execve syscall exit tracepoint (bsc#1065729).
- powerpc: powernv: kABI: add back powernv_get_random_long (bsc#1065729).
- powerpc/drmem: Make lmb_size 64 bit (bsc#1203424 ltc#199544).
- powerpc/memhotplug: Make lmb size 64bit (bsc#1203424 ltc#199544).
- powerpc/perf: Optimize clearing the pending PMI and remove WARN_ON for PMI check in power_pmu_disable (bsc#1156395).
- powerpc/powernv: Avoid crashing if rng is NULL (bsc#1065729).
- powerpc/powernv: delay rng platform device creation until later in boot (bsc#1065729).
- powerpc/powernv: rename remaining rng powernv_ functions to pnv_ (bsc#1065729).
- powerpc/powernv: Staticify functions without prototypes (bsc#1065729).
- powerpc/powernv: wire up rng during setup_arch (bsc#1065729).
- powerpc/powernv/kvm: Use darn for H_RANDOM on Power9 (bsc#1065729).
- powerpc/pseries: wire up rng during setup_arch() (bsc#1065729).
- powerpc/xive: Fix refcount leak in xive_get_max_prio (git-fixess).
- ppc64/kdump: Limit kdump base to 512MB (bsc#1203410 ltc#199904).
- profiling: fix shift too large makes kernel panic (git-fixes).
- profiling: fix shift-out-of-bounds bugs (git fixes).
- psi: Fix uaf issue when psi trigger is destroyed while being polled (bsc#1203909).
- qlcnic: Add null check after calling netdev_alloc_skb (git-fixes).
- random: fix crash on multiple early calls to add_bootloader_randomness() (git-fixes).
- random: remove useless header comment (git fixes).
- ratelimit: Fix data-races in ___ratelimit() (git-fixes).
- regulator: core: Clean up on enable failure (git-fixes).
- regulator: of: Fix refcount leak bug in of_get_regulation_constraints() (git-fixes).
- reiserfs: fix handling of -EOPNOTSUPP in reiserfs_for_each_xattr (bsc#1202714).
- remoteproc: qcom: q6v5-mss: add powerdomains to MSM8996 config (git-fixes).
- remoteproc: qcom: wcnss: Fix handling of IRQs (git-fixes).
- s390/crash: fix incorrect number of bytes to copy to user space (git-fixes).
- s390/crash: make copy_oldmem_page() return number of bytes copied (git-fixes).
- s390/mm: do not trigger write fault when vma does not allow VM_WRITE (git-fixes).
- s390/mm: fix 2KB pgtable release race (git-fixes).
- s390/ptrace: pass invalid syscall numbers to tracing (bsc#1192594 LTC#197522).
- s390/qeth: cache link_info for ethtool (bsc#1202984 LTC#199607).
- s390/qeth: clean up default cases for ethtool link mode (bsc#1202984 LTC#199607).
- s390/qeth: improve QUERY CARD INFO processing (bsc#1202984 LTC#199607).
- s390/qeth: improve selection of ethtool link modes (bsc#1202984 LTC#199607).
- s390/qeth: set static link info during initialization (bsc#1202984 LTC#199607).
- s390/qeth: tolerate error when querying card info (bsc#1202984 LTC#199607).
- s390/qeth: use QUERY OAT for initial link info (bsc#1202984 LTC#199607).
- sched/debug: Remove mpol_get/put and task_lock/unlock from (git-fixes)
- sched/fair: Revise comment about lb decision matrix (git fixes (sched/fair)).
- sched/membarrier: fix missing local execution of ipi_sync_rq_state() (git fixes (sched/membarrier)).
- scsi: core: Fix bad pointer dereference when ehandler kthread is invalid (git-fixes).
- scsi: lpfc: Add missing destroy_workqueue() in error path (bsc#1203939).
- scsi: lpfc: Add missing free iocb and nlp kref put for early return VMID cases (bsc#1203939).
- scsi: lpfc: Add reporting capability for Link Degrade Signaling (bsc#1203939).
- scsi: lpfc: Add warning notification period to CMF_SYNC_WQE (bsc#1203063).
- scsi: lpfc: Check the return value of alloc_workqueue() (bsc#1203063).
- scsi: lpfc: Copyright updates for 14.2.0.6 patches (bsc#1203063).
- scsi: lpfc: Fix FLOGI ACC with wrong SID in PT2PT topology (bsc#1203939).
- scsi: lpfc: Fix mbuf pool resource detected as busy at driver unload (bsc#1203939).
- scsi: lpfc: Fix multiple NVMe remoteport registration calls for the same NPort ID (bsc#1203939).
- scsi: lpfc: Fix null ndlp ptr dereference in abnormal exit path for GFT_ID (bsc#1203063).
- scsi: lpfc: Fix prli_fc4_req checks in PRLI handling (bsc#1203939).
- scsi: lpfc: Fix unsolicited FLOGI receive handling during PT2PT discovery (bsc#1203063).
- scsi: lpfc: Fix various issues reported by tools (bsc#1203939).
- scsi: lpfc: Move scsi_host_template outside dynamically allocated/freed phba (bsc#1185032 bsc#1203939).
- scsi: lpfc: Remove SANDiags related code (bsc#1203063).
- scsi: lpfc: Remove the unneeded result variable (bsc#1203939).
- scsi: lpfc: Remove unneeded result variable (bsc#1203939).
- scsi: lpfc: Rename mp/bmp dma buffers to rq/rsp in lpfc_fdmi_cmd (bsc#1203939).
- scsi: lpfc: Return DID_TRANSPORT_DISRUPTED instead of DID_REQUEUE (bsc#1203939).
- scsi: lpfc: Rework FDMI attribute registration for unintential padding (bsc#1203939).
- scsi: lpfc: Rework lpfc_fdmi_cmd() routine for cleanup and consistency (bsc#1203939).
- scsi: lpfc: Rework MIB Rx Monitor debug info logic (bsc#1203063).
- scsi: lpfc: Update congestion mode logging for Emulex SAN Manager application (bsc#1203939).
- scsi: lpfc: Update lpfc version to 14.2.0.6 (bsc#1203063).
- scsi: lpfc: Update lpfc version to 14.2.0.7 (bsc#1203939).
- scsi: mpt3sas: Fix use-after-free warning (git-fixes).
- scsi: qla2xxx: Add debugfs create/delete helpers (bsc#1203935).
- scsi: qla2xxx: Add NVMe parameters support in Auxiliary Image Status (bsc#1203935).
- scsi: qla2xxx: Always wait for qlt_sess_work_fn() from qlt_stop_phase1() (bsc#1203935).
- scsi: qla2xxx: Avoid flush_scheduled_work() usage (bsc#1203935).
- scsi: qla2xxx: Disable ATIO interrupt coalesce for quad port ISP27XX (bsc#1203935).
- scsi: qla2xxx: Drop DID_TARGET_FAILURE use (bsc#1203935).
- scsi: qla2xxx: Fix memory leak in __qlt_24xx_handle_abts() (bsc#1203935).
- scsi: qla2xxx: Fix response queue handler reading stale packets (bsc#1203935).
- scsi: qla2xxx: Log message 'skipping scsi_scan_host()' as informational (bsc#1203935).
- scsi: qla2xxx: Remove unused declarations for qla2xxx (bsc#1203935).
- scsi: qla2xxx: Remove unused del_sess_list field (bsc#1203935).
- scsi: qla2xxx: Remove unused qlt_tmr_work() (bsc#1203935).
- scsi: qla2xxx: Revert 'scsi: qla2xxx: Fix response queue handler reading stale packets' (bsc#1203935).
- scsi: qla2xxx: Update version to 10.02.07.900-k (bsc#1203935).
- scsi: sg: Allow waiting for commands to complete on removed device (git-fixes).
- scsi: smartpqi: Fix DMA direction for RAID requests (git-fixes).
- scsi: smartpqi: Shorten drive visibility after removal (bsc#1200622).
- scsi: smartpqi: Update LUN reset handler (bsc#1200622).
- selftests: futex: Use variable MAKE instead of make (git-fixes).
- serial: 8250_dw: Store LSR into lsr_saved_flags in dw8250_tx_wait_empty() (git-fixes).
- serial: fsl_lpuart: RS485 RTS polariy is inverse (git-fixes).
- serial: mvebu-uart: uart2 error bits clearing (git-fixes).
- serial: tegra: Change lower tolerance baud rate limit for tegra20 and tegra30 (git-fixes).
- soc: brcmstb: pm-arm: Fix refcount leak and __iomem leak bugs (git-fixes).
- soc: fsl: guts: machine variable might be unset (git-fixes).
- soundwire: bus_type: fix remove and shutdown support (git-fixes).
- spi: Fix incorrect cs_setup delay handling (git-fixes).
- spi: spi-rspi: Fix PIO fallback on RZ platforms (git-fixes).
- spi: synquacer: Add missing clk_disable_unprepare() (git-fixes).
- spmi: trace: fix stack-out-of-bound access in SPMI tracing functions (git-fixes).
- squashfs: fix divide error in calculate_skip() (git-fixes).
- staging: rtl8192u: Fix sleep in atomic context bug in dm_fsync_timer_callback (git-fixes).
- staging: rtl8712: fix use after free bugs (git-fixes).
- SUNRPC reverting d03727b248d0 ('NFSv4 fix CLOSE not waiting for direct IO compeletion') (git-fixes).
- SUNRPC: Clean up scheduling of autoclose (git-fixes).
- SUNRPC: Do not call connect() more than once on a TCP socket (git-fixes).
- SUNRPC: Do not dereference xprt->snd_task if it's a cookie (git-fixes).
- SUNRPC: Do not leak sockets in xs_local_connect() (git-fixes).
- SUNRPC: fix expiry of auth creds (git-fixes).
- SUNRPC: Fix misplaced barrier in call_decode (git-fixes).
- SUNRPC: Fix READ_PLUS crasher (git-fixes).
- SUNRPC: Partial revert of commit 6f9f17287e78 (git-fixes).
- SUNRPC: Prevent immediate close+reconnect (git-fixes).
- SUNRPC: Reinitialise the backchannel request buffers before reuse (git-fixes).
- SUNRPC: RPC level errors should set task->tk_rpc_status (git-fixes).
- svcrdma: Hold private mutex while invoking rdma_accept() (git-fixes).
- tee: optee: Fix incorrect page free bug (git-fixes).
- thermal: Fix NULL pointer dereferences in of_thermal_ functions (git-fixes).
- thermal: sysfs: Fix cooling_device_stats_setup() error code path (git-fixes).
- thermal/tools/tmon: Include pthread and time headers in tmon.h (git-fixes).
- thunderbolt: Use the actual buffer in tb_async_error() (git-fixes).
- tick/nohz: Use WARN_ON_ONCE() to prevent console saturation (git fixes (kernel/time)).
- tools/thermal: Fix possible path truncations (git-fixes).
- tracing: Add ustring operation to filtering string pointers (git-fixes).
- tracing: hold caller_addr to hardirq_{enable,disable}_ip (git-fixes).
- tracing/histogram: Fix a potential memory leak for kstrdup() (git-fixes).
- tracing/histograms: Fix memory leak problem (git-fixes).
- tracing/probes: Have kprobes and uprobes use $COMM too (git-fixes).
- tty: serial: Fix refcount leak bug in ucc_uart.c (git-fixes).
- tty: serial: lpuart: disable flow control while waiting for the transmit engine to complete (git-fixes).
- tty: vt: initialize unicode screen buffer (git-fixes).
- USB: cdc-acm: Add Icom PMR F3400 support (0c26:0020) (git-fixes).
- USB: core: Fix RST error in hub.c (git-fixes).
- USB: core: Prevent nested device-reset calls (git-fixes).
- USB: dwc2: fix wrong order of phy_power_on and phy_init (git-fixes).
- USB: dwc3: add cancelled reasons for dwc3 requests (git-fixes).
- USB: dwc3: disable USB core PHY management (git-fixes).
- USB: dwc3: ep0: Fix delay status handling (git-fixes).
- USB: dwc3: gadget: END_TRANSFER before CLEAR_STALL command (git-fixes).
- USB: dwc3: gadget: Fix IN endpoint max packet size allocation (git-fixes).
- USB: dwc3: gadget: Refactor dwc3_gadget_ep_dequeue (git-fixes).
- USB: dwc3: gadget: Remove FS bInterval_m1 limitation (git-fixes).
- USB: dwc3: gadget: Remove unnecessary checks (git-fixes).
- USB: dwc3: gadget: Replace list_for_each_entry_safe() if using giveback (git-fixes).
- USB: dwc3: gadget: Store resource index of start cmd (git-fixes).
- USB: dwc3: qcom: fix missing optional irq warnings.
- USB: dwc3: Switch to platform_get_irq_byname_optional() (git-fixes).
- USB: ehci: handshake CMD_RUN instead of STS_HALT (git-fixes).
- USB: Follow-up to SPDX identifiers addition - remove now useless comments (git-fixes).
- USB: gadget: mass_storage: Fix cdrom data transfers on MAC-OS (git-fixes).
- USB: gadget: u_audio: fix race condition on endpoint stop (git-fixes).
- USB: gadget: udc-xilinx: replace memcpy with memcpy_toio (git-fixes).
- USB: gadget: udc: amd5536 depends on HAS_DMA (git-fixes).
- USB: gadget: uvc: call uvc uvcg_warn on completed status instead of uvcg_info (git-fixes).
- USB: host: Fix refcount leak in ehci_hcd_ppc_of_probe (git-fixes).
- USB: host: ohci-ppc-of: Fix refcount leak bug (git-fixes).
- USB: host: xhci: use snprintf() in xhci_decode_trb() (git-fixes).
- USB: ohci-nxp: Fix refcount leak in ohci_hcd_nxp_probe (git-fixes).
- USB: otg-fsm: Fix hrtimer list corruption (git-fixes).
- USB: renesas: Fix refcount leak bug (git-fixes).
- USB: serial: ch341: fix disabled rx timer on older devices (git-fixes).
- USB: serial: ch341: fix lost character on LCR updates (git-fixes).
- USB: serial: ch341: name prescaler, divisor registers (git-fixes).
- USB: serial: cp210x: add Decagon UCA device id (git-fixes).
- USB: serial: fix tty-port initialized comments (git-fixes).
- USB: serial: ftdi_sio: add Omron CS1W-CIF31 device id (git-fixes).
- USB: serial: option: add Quectel EM060K modem (git-fixes).
- USB: serial: option: add support for Cinterion MV32-WA/WB RmNet mode (git-fixes).
- USB: serial: option: add support for OPPO R11 diag port (git-fixes).
- USB: storage: Add ASUS <0x0b05:0x1932> to IGNORE_UAS (git-fixes).
- USB: storage: Add ignore-residue quirk for NXP PN7462AU (git-fixes).
- USB: struct usb_device: hide new member (git-fixes).
- USB: typec: altmodes/displayport: correct pin assignment for UFP receptacles (git-fixes).
- USB: typec: ucsi: Acknowledge the GET_ERROR_STATUS command completion (git-fixes).
- USB: xhci: tegra: Fix error check (git-fixes).
- usbnet: Fix linkwatch use-after-free on disconnect (git-fixes).
- usbnet: Fix memory leak in usbnet_disconnect() (git-fixes).
- usbnet: smsc95xx: Fix deadlock on runtime resume (git-fixes).
- vboxguest: Do not use devm for irq (git-fixes).
- vfio/ccw: Remove UUID from s390 debug log (git-fixes).
- video: fbdev: amba-clcd: Fix refcount leak bugs (git-fixes).
- video: fbdev: arkfb: Check the size of screen before memset_io() (git-fixes).
- video: fbdev: arkfb: Fix a divide-by-zero bug in ark_set_pixclock() (git-fixes).
- video: fbdev: i740fb: Check the argument of i740_calc_vclk() (git-fixes).
- video: fbdev: s3fb: Check the size of screen before memset_io() (git-fixes).
- video: fbdev: sis: fix typos in SiS_GetModeID() (git-fixes).
- video: fbdev: vt8623fb: Check the size of screen before memset_io() (git-fixes).
- virtio_net: fix memory leak inside XPD_TX with mergeable (git-fixes).
- virtio-gpu: fix a missing check to avoid NULL dereference (git-fixes).
- virtio-net: fix the race between refill work and close (git-fixes).
- VMCI: Add support for ARM64 (bsc#1199291, jsc#SLE-24635).
- VMCI: Check exclusive_vectors when freeing interrupt 1 (bsc#1199291, jsc#SLE-24635).
- VMCI: dma dg: add MMIO access to registers (bsc#1199291, jsc#SLE-24635).
- VMCI: dma dg: add support for DMA datagrams receive (bsc#1199291, jsc#SLE-24635).
- VMCI: dma dg: add support for DMA datagrams sends (bsc#1199291, jsc#SLE-24635).
- VMCI: dma dg: allocate send and receive buffers for DMA datagrams (bsc#1199291, jsc#SLE-24635).
- VMCI: dma dg: detect DMA datagram capability (bsc#1199291, jsc#SLE-24635).
- VMCI: dma dg: register dummy IRQ handlers for DMA datagrams (bsc#1199291, jsc#SLE-24635).
- VMCI: dma dg: set OS page size (bsc#1199291, jsc#SLE-24635).
- VMCI: dma dg: whitespace formatting change for vmci register defines (bsc#1199291, jsc#SLE-24635).
- VMCI: Enforce queuepair max size for IOCTL_VMCI_QUEUEPAIR_ALLOC (bsc#1199291, jsc#SLE-24635).
- VMCI: Fix some error handling paths in vmci_guest_probe_device() (bsc#1199291, jsc#SLE-24635).
- VMCI: Release notification_bitmap in error path (bsc#1199291, jsc#SLE-24635).
- vmxnet3: add command to set ring buffer sizes (bsc#1200431).
- vmxnet3: add support for capability registers (bsc#1200431).
- vmxnet3: add support for large passthrough BAR register (bsc#1200431).
- vmxnet3: add support for out of order rx completion (bsc#1200431).
- vmxnet3: disable overlay offloads if UPT device does not support (bsc#1200431).
- vmxnet3: do not reschedule napi for rx processing (bsc#1200431).
- vmxnet3: do not stop tx queues after netif_device_detach() (bsc#1200431).
- vmxnet3: Implement ethtool's get_channels command (bsc#1200431).
- vmxnet3: limit number of TXDs used for TSO packet (bsc#1200431).
- vmxnet3: prepare for version 7 changes (bsc#1200431).
- vmxnet3: Record queue number to incoming packets (bsc#1200431).
- vmxnet3: Remove useless DMA-32 fallback configuration (bsc#1200431).
- vmxnet3: switch from 'pci_' to 'dma_' API (bsc#1200431).
- vmxnet3: update to version 7 (bsc#1200431).
- vmxnet3: use ext1 field to indicate encapsulated packet (bsc#1200431).
- vsock: Fix memory leak in vsock_connect() (git-fixes).
- vsock: Set socket state back to SS_UNCONNECTED in vsock_connect_timeout() (git-fixes).
- vt: Clear selection before changing the font (git-fixes).
- vt: selection, introduce vc_is_sel (git-fixes).
- watchdog: armada_37xx_wdt: check the return value of devm_ioremap() in armada_37xx_wdt_probe() (git-fixes).
- watchdog: wdat_wdt: Set the min and max timeout values properly (bsc#1194023).
- wifi: cfg80211: debugfs: fix return type in ht40allow_map_read() (git-fixes).
- wifi: iwlegacy: 4965: corrected fix for potential off-by-one overflow in il4965_rs_fill_link_cmd() (git-fixes).
- wifi: iwlegacy: 4965: fix potential off-by-one overflow in il4965_rs_fill_link_cmd() (git-fixes).
- wifi: iwlwifi: mvm: fix double list_add at iwl_mvm_mac_wake_tx_queue (git-fixes).
- wifi: libertas: Fix possible refcount leak in if_usb_probe() (git-fixes).
- wifi: mac80211_hwsim: add back erroneously removed cast (git-fixes).
- wifi: mac80211_hwsim: fix race condition in pending packet (git-fixes).
- wifi: mac80211_hwsim: use 32-bit skb cookie (git-fixes).
- wifi: mac80211: Do not finalize CSA in IBSS mode if state is disconnected (git-fixes).
- wifi: p54: add missing parentheses in p54_flush() (git-fixes).
- wifi: p54: Fix an error handling path in p54spi_probe() (git-fixes).
- wifi: rtlwifi: fix error codes in rtl_debugfs_set_write_h2c() (git-fixes).
- wifi: wil6210: debugfs: fix info leak in wil_write_file_wmi() (git-fixes).
- wifi: wil6210: debugfs: fix uninitialized variable use in `wil_write_file_wmi()` (git-fixes).
- x86/bugs: Reenable retbleed=off While for older kernels the return thunks are statically built in and cannot be dynamically patched out, retbleed=off should still work so that it can be disabled.
- x86/kexec: fix memory leak of elf header buffer (bsc#1196444).
- x86/olpc: fix 'logical not is only applied to the left hand side' (git-fixes).
- x86/xen: Remove undefined behavior in setup_features() (git-fixes).
- xen/xenbus: fix return type in xenbus_file_read() (git-fixes).
- xfs: bunmapi has unnecessary AG lock ordering issues (git-fixes).
- xfs: check sb_meta_uuid for dabuf buffer recovery (bsc#1202577).
- xfs: Fix assert failure in xfs_setattr_size() (git-fixes).
- xfs: make xfs_rtalloc_query_range input parameters const (git-fixes).
- xfs: mark a data structure sick if there are cross-referencing errors (git-fixes).
- xfs: only reset incore inode health state flags when reclaiming an inode (git-fixes).
- xfs: prevent a UAF when log IO errors race with unmount (git-fixes).
- xfs: use kmem_cache_free() for kmem_cache objects (git-fixes).
- xprtrdma: Fix cwnd update ordering (git-fixes).
- xprtrdma: Fix XDRBUF_SPARSE_PAGES support (git-fixes).
    Patchnames
SUSE-2022-3609,SUSE-SLE-Module-Public-Cloud-15-SP3-2022-3609,openSUSE-SLE-15.3-2022-3609
    Terms of use
CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).
    {
  "document": {
    "aggregate_severity": {
      "namespace": "https://www.suse.com/support/security/rating/",
      "text": "important"
    },
    "category": "csaf_security_advisory",
    "csaf_version": "2.0",
    "distribution": {
      "text": "Copyright 2024 SUSE LLC. All rights reserved.",
      "tlp": {
        "label": "WHITE",
        "url": "https://www.first.org/tlp/"
      }
    },
    "lang": "en",
    "notes": [
      {
        "category": "summary",
        "text": "Security update for the Linux Kernel",
        "title": "Title of the patch"
      },
      {
        "category": "description",
        "text": "\nThe SUSE Linux Enterprise 15 SP3 Azure kernel was updated to receive various security and bugfixes.\n\n\nThe following security bugs were fixed:\n\n- CVE-2022-39190: Fixed an issue that was discovered in net/netfilter/nf_tables_api.c and could cause a denial of service upon binding to an already bound chain (bnc#1203117).\n- CVE-2022-39188: Fixed race condition in include/asm-generic/tlb.h where a device driver can free a page while it still has stale TLB entries (bnc#1203107).\n- CVE-2022-36879: Fixed an issue in xfrm_expand_policies in net/xfrm/xfrm_policy.c where a refcount could be dropped twice (bnc#1201948).\n- CVE-2022-3028: Fixed race condition that was found in the IP framework for transforming packets (XFRM subsystem) (bnc#1202898).\n- CVE-2022-2977: Fixed reference counting for struct tpm_chip (bsc#1202672).\n- CVE-2022-2905: Fixed tnum_range usage on array range checking for poke descriptors (bsc#1202564, bsc#1202860).\n- CVE-2022-2663: Fixed an issue that was found in nf_conntrack_irc where the message handling could be confused and incorrectly matches the message (bnc#1202097).\n- CVE-2022-2639: Fixed an integer coercion error that was found in the openvswitch kernel module (bnc#1202154).\n- CVE-2022-26373: Fixed non-transparent sharing of return predictor targets between contexts in some Intel Processors (bnc#1201726).\n- CVE-2022-2588: Fixed use-after-free in cls_route (bsc#1202096).\n- CVE-2022-20369: Fixed out of bounds write in v4l2_m2m_querybuf of v4l2-mem2mem.c (bnc#1202347).\n- CVE-2022-20368: Fixed slab-out-of-bounds access in packet_recvmsg() (bsc#1202346).\n- CVE-2021-4203: Fixed use-after-free read flaw that was found in sock_getsockopt() in net/core/sock.c due to SO_PEERCRED and SO_PEERGROUPS race with listen() (bnc#1194535).\n- CVE-2021-4155: Fixed a data leak flaw that was found in the way XFS_IOC_ALLOCSP IOCTL in the XFS filesystem (bnc#1194272).\n- CVE-2020-36516: Fixed an issue in the mixed IPID assignment method where an attacker was able to inject data into or terminate a victim\u0027s TCP session (bnc#1196616).\n- CVE-2020-27784: Fixed a vulnerability that was found in printer_ioctl() printer_ioctl() when accessing a deallocated instance (bnc#1202895).\n- CVE-2016-3695: Fixed an issue inside the einj_error_inject function in drivers/acpi/apei/einj.c that allowed users to simulate hardware errors and consequently cause a denial of service (bnc#1023051).\n- CVE-2022-3303: Fixed a race condition in the sound subsystem due to improper locking (bnc#1203769).\n- CVE-2022-41218: Fixed an use-after-free caused by refcount races in drivers/media/dvb-core/dmxdev.c (bnc#1202960).\n- CVE-2022-3239: Fixed an use-after-free in the video4linux driver that could lead a local user to able to crash the system or escalate their privileges (bnc#1203552).\n- CVE-2022-41848: Fixed a race condition and resultant use-after-free if a physically proximate attacker removes a PCMCIA device while calling ioctl (bnc#1203987).\n- CVE-2022-41849: Fixed a race condition and resultant use-after-free if a physically proximate attacker removes a USB device while calling open (bnc#1203992).\n- CVE-2022-2586: Fixed a use-after-free which can be triggered when a nft table is deleted (bnc#1202095).\n- CVE-2022-41222: Fixed a use-after-free via a stale TLB because an rmap lock is not held during a PUD move (bnc#1203622).\n- CVE-2022-2503: Fixed a bug in dm-verity, device-mapper table reloads allowed users with root privileges to switch out the target with an equivalent dm-linear target and bypass verification till reboot. This allowed root to bypass LoadPin and can be used to load untrusted and unverified kernel modules and firmware, which implies arbitrary kernel execution and persistence for peripherals that do not verify firmware updates (bnc#1202677).\n- CVE-2020-16119: Fixed a use-after-free vulnerability exploitable by a local attacker due to reuse of a DCCP socket. (bnc#1177471)\n\nThe following non-security bugs were fixed:\n\n- ACPI: APEI: Better fix to avoid spamming the console with old error logs (git-fixes).\n- ACPI: CPPC: Do not prevent CPPC from working in the future (git-fixes).\n- ACPI: EC: Remove duplicate ThinkPad X1 Carbon 6th entry from DMI quirks (git-fixes).\n- ACPI: LPSS: Fix missing check in register_device_clock() (git-fixes).\n- ACPI: PM: save NVS memory for Lenovo G40-45 (git-fixes).\n- ACPI: processor: Remove freq Qos request for all CPUs (git-fixes).\n- ACPI: property: Return type of acpi_add_nondev_subnodes() should be bool (git-fixes).\n- ACPI: video: Force backlight native for some TongFang devices (git-fixes).\n- ACPI: video: Shortening quirk list by identifying Clevo by board_name only (git-fixes).\n- ALSA: aloop: Fix random zeros in capture data when using jiffies timer (git-fixes).\n- ALSA: bcd2000: Fix a UAF bug on the error path of probing (git-fixes).\n- ALSA: emu10k1: Fix out of bounds access in snd_emu10k1_pcm_channel_alloc() (git-fixes).\n- ALSA: hda/cirrus - support for iMac 12,1 model (git-fixes).\n- ALSA: hda/conexant: Add quirk for LENOVO 20149 Notebook model (git-fixes).\n- ALSA: hda/realtek: Add a quirk for HP OMEN 15 (8786) mute LED (git-fixes).\n- ALSA: hda/realtek: Add mute LED quirk for HP Omen laptop (git-fixes).\n- ALSA: hda/realtek: Add new alc285-hp-amp-init model (git-fixes).\n- ALSA: hda/realtek: Add quirk for another Asus K42JZ model (git-fixes).\n- ALSA: hda/realtek: Add quirk for Clevo L140PU (git-fixes).\n- ALSA: hda/realtek: Add quirk for Clevo NP50PNJ (git-fixes).\n- ALSA: hda/realtek: Add quirk for Clevo NP70PNJ (git-fixes).\n- ALSA: hda/realtek: Add quirk for Clevo NP70PNP (git-fixes).\n- ALSA: hda/realtek: Add quirk for Clevo NS50PU (git-fixes).\n- ALSA: hda/realtek: Add quirk for Clevo NV45PZ (git-fixes).\n- ALSA: hda/realtek: Add quirk for Dell Latitude 7520 (git-fixes).\n- ALSA: hda/realtek: Add quirk for HP Dev One (git-fixes).\n- ALSA: hda/realtek: Add quirk for HP Spectre x360 15-eb0xxx (git-fixes).\n- ALSA: hda/realtek: Add quirk for the Framework Laptop (git-fixes).\n- ALSA: hda/realtek: Add quirk for TongFang devices with pop noise (git-fixes).\n- ALSA: hda/realtek: Fix deadlock by COEF mutex (git-fixes).\n- ALSA: hda/realtek: Fix headset mic for Acer SF313-51 (git-fixes).\n- ALSA: hda/realtek: Fix LED on HP ProBook 435 G7 (git-fixes).\n- ALSA: hda/realtek: fix mute/micmute LEDs for a HP ProBook (git-fixes).\n- ALSA: hda/realtek: fix mute/micmute LEDs for HP machines (git-fixes).\n- ALSA: hda/realtek: fix right sounds and mute/micmute LEDs for HP machine (git-fixes).\n- ALSA: hda/realtek: fix right sounds and mute/micmute LEDs for HP machines (git-fixes).\n- ALSA: hda/realtek: Re-arrange quirk table entries (git-fixes).\n- ALSA: info: Fix llseek return value when using callback (git-fixes).\n- ALSA: seq: Fix data-race at module auto-loading (git-fixes).\n- ALSA: seq: oss: Fix data-race for max_midi_devs access (git-fixes).\n- ALSA: usb-audio: Fix an out-of-bounds bug in __snd_usb_parse_audio_interface() (git-fixes).\n- ALSA: usb-audio: fix spelling mistakes (git-fixes).\n- ALSA: usb-audio: Inform the delayed registration more properly (git-fixes).\n- ALSA: usb-audio: More comprehensive mixer map for ASUS ROG Zenith II (git-fixes).\n- ALSA: usb-audio: Register card again for iface over delayed_register option (git-fixes).\n- ALSA: usb-audio: Split endpoint setups for hw_params and prepare (git-fixes).\n- ARM: 9077/1: PLT: Move struct plt_entries definition to header (git-fixes).\n- ARM: 9078/1: Add warn suppress parameter to arm_gen_branch_link() (git-fixes).\n- ARM: 9079/1: ftrace: Add MODULE_PLTS support (git-fixes).\n- ARM: 9098/1: ftrace: MODULE_PLT: Fix build problem without DYNAMIC_FTRACE (git-fixes).\n- arm64: cpufeature: Allow different PMU versions in ID_DFR0_EL1 (git-fixes)\n- arm64: dts: allwinner: A64 Sopine: phy-mode rgmii-id (git-fixes)\n- arm64: dts: allwinner: a64-sopine-baseboard: change RGMII mode to (bsc#1202341)\n- arm64: dts: allwinner: H5: NanoPi Neo Plus2: phy-mode rgmii-id (git-fixes)\n- arm64: dts: rockchip: Pull up wlan wake# on Gru-Bob (git-fixes)\n- arm64: dts: rockchip: Remove \u0027enable-active-low\u0027 from rk3399-puma (git-fixes)\n- arm64: dts: rockchip: Set RK3399-Gru PCLK_EDP to 24 MHz (git-fixes)\n- arm64: dts: uniphier: Fix USB interrupts for PXs3 SoC (git-fixes)\n- arm64: kexec_file: use more system keyrings to verify kernel image signature (bsc#1196444).\n- arm64: mm: Always update TCR_EL1 from __cpu_set_tcr_t0sz() (git-fixes)\n- arm64: mm: fix p?d_leaf() (git-fixes)\n- arm64: mm: use a 48-bit ID map when possible on 52-bit VA builds (git-fixes)\n- arm64: mm: Validate hotplug range before creating linear mapping (git-fixes)\n- arm64: signal: nofpsimd: Do not allocate fp/simd context when not available (git-fixes).\n- arm64: tegra: Fix SDMMC1 CD on P2888 (git-fixes)\n- arm64: tegra: Remove non existent Tegra194 reset (git-fixes)\n- arm64: tlb: fix the TTL value of tlb_get_level (git-fixes)\n- asm-generic: sections: refactor memory_intersects (git-fixes).\n- ASoC: audio-graph-card: Add of_node_put() in fail path (git-fixes).\n- ASoC: codecs: da7210: add check for i2c_add_driver (git-fixes).\n- ASoC: codecs: msm8916-wcd-digital: move gains from SX_TLV to S8_TLV (git-fixes).\n- ASoC: codecs: wcd9335: move gains from SX_TLV to S8_TLV (git-fixes).\n- ASoC: mt6797-mt6351: Fix refcount leak in mt6797_mt6351_dev_probe (git-fixes).\n- ASoC: qcom: q6dsp: Fix an off-by-one in q6adm_alloc_copp() (git-fixes).\n- ASoC: SOF: debug: Fix potential buffer overflow by snprintf() (git-fixes).\n- ASoC: tas2770: Allow mono streams (git-fixes).\n- ata: libata-eh: Add missing command name (git-fixes).\n- ath10k: do not enforce interrupt trigger type (git-fixes).\n- ath10k: Fix error handling in ath10k_setup_msa_resources (git-fixes).\n- atm: idt77252: fix use-after-free bugs caused by tst_timer (git-fixes).\n- blk-iocost: clamp inuse and skip noops in __propagate_weights() (bsc#1202722).\n- blk-iocost: fix operation ordering in iocg_wake_fn() (bsc#1202720).\n- blk-iocost: fix weight updates of inner active iocgs (bsc#1202717).\n- blk-iocost: rename propagate_active_weights() to propagate_weights() (bsc#1202722).\n- blktrace: fix blk_rq_merge documentation (git-fixes).\n- Bluetooth: hci_intel: Add check for platform_driver_register (git-fixes).\n- Bluetooth: L2CAP: Fix build errors in some archs (git-fixes).\n- Bluetooth: L2CAP: Fix l2cap_global_chan_by_psm regression (git-fixes).\n- Bluetooth: L2CAP: Fix use-after-free caused by l2cap_chan_put (git-fixes).\n- Bluetooth: MGMT: Fixes build warnings with C=1 (git-fixes).\n- bpf: Compile out btf_parse_module() if module BTF is not enabled (git-fixes).\n- bus: hisi_lpc: fix missing platform_device_put() in hisi_lpc_acpi_probe() (git-fixes).\n- can: Break loopback loop on loopback documentation (git-fixes).\n- can: ems_usb: fix clang\u0027s -Wunaligned-access warning (git-fixes).\n- can: error: specify the values of data[5..7] of CAN error frames (git-fixes).\n- can: hi311x: do not report txerr and rxerr during bus-off (git-fixes).\n- can: kvaser_usb_hydra: do not report txerr and rxerr during bus-off (git-fixes).\n- can: kvaser_usb_leaf: do not report txerr and rxerr during bus-off (git-fixes).\n- can: m_can: process interrupt only when not runtime suspended (git-fixes).\n- can: pch_can: do not report txerr and rxerr during bus-off (git-fixes).\n- can: pch_can: pch_can_error(): initialize errc before using it (git-fixes).\n- can: rcar_can: do not report txerr and rxerr during bus-off (git-fixes).\n- can: sja1000: do not report txerr and rxerr during bus-off (git-fixes).\n- can: sun4i_can: do not report txerr and rxerr during bus-off (git-fixes).\n- can: usb_8dev: do not report txerr and rxerr during bus-off (git-fixes).\n- ceph: do not leak snap_rwsem in handle_cap_grant (bsc#1202810).\n- ceph: do not truncate file in atomic_open (bsc#1202811).\n- cgroup: cgroup_get_from_id() must check the looked-up kn is a directory (bsc#1203906).\n- cgroup: Trace event cgroup id fields should be u64 (git-fixes).\n- cgroup: Use separate src/dst nodes when preloading css_sets for migration (bsc#1201610).\n- clk: bcm: rpi: Fix error handling of raspberrypi_fw_get_rate (git-fixes).\n- clk: core: Fix runtime PM sequence in clk_core_unprepare() (git-fixes).\n- clk: core: Honor CLK_OPS_PARENT_ENABLE for clk gate ops (git-fixes).\n- clk: qcom: camcc-sdm845: Fix topology around titan_top power domain (git-fixes).\n- clk: qcom: clk-krait: unlock spin after mux completion (git-fixes).\n- clk: qcom: ipq8074: dont disable gcc_sleep_clk_src (git-fixes).\n- clk: qcom: ipq8074: fix NSS core PLL-s (git-fixes).\n- clk: qcom: ipq8074: fix NSS port frequency tables (git-fixes).\n- clk: qcom: ipq8074: set BRANCH_HALT_DELAY flag for UBI clocks (git-fixes).\n- clk: qcom: ipq8074: SW workaround for UBI32 PLL lock (git-fixes).\n- clk: renesas: r9a06g032: Fix UART clkgrp bitsel (git-fixes).\n- clk: rockchip: add sclk_mac_lbtest to rk3188_critical_clocks (git-fixes).\n- coresight: cti: Correct the parameter for pm_runtime_put (git-fixes).\n- crypto: arm64/gcm - Select AEAD for GHASH_ARM64_CE (git-fixes)\n- crypto: arm64/poly1305 - fix a read out-of-bound (git-fixes)\n- devlink: Fix use-after-free after a failed reload (git-fixes).\n- dm raid: fix KASAN warning in raid5_add_disks (git-fixes).\n- dmaengine: sprd: Cleanup in .remove() after pm_runtime_get_sync() failed (git-fixes).\n- dpaa2-eth: unregister the netdev before disconnecting from the PHY (git-fixes).\n- driver core: Do not probe devices after bus_type.match() probe deferral (git-fixes).\n- driver core: fix potential deadlock in __driver_attach (git-fixes).\n- drm: adv7511: override i2c address of cec before accessing it (git-fixes).\n- drm: bridge: adv7511: Add check for mipi_dsi_driver_register (git-fixes).\n- drm: bridge: sii8620: fix possible off-by-one (git-fixes).\n- drm/amd/display: Enable building new display engine with KCOV enabled (git-fixes).\n- drm/amdgpu: Check BO\u0027s requested pinning domains against its preferred_domains (git-fixes).\n- drm/amdgpu: Check num_gfx_rings for gfx v9_0 rb setup (git-fixes).\n- drm/amdgpu: mmVM_L2_CNTL3 register not initialized correctly (git-fixes).\n- drm/amdgpu: remove useless condition in amdgpu_job_stop_all_jobs_on_sched() (git-fixes).\n- drm/bridge: tc358767: Make sure Refclk clock are enabled (git-fixes).\n- drm/doc: Fix comment typo (git-fixes).\n- drm/exynos/exynos7_drm_decon: free resources when clk_set_parent() failed (git-fixes).\n- drm/gem: Fix GEM handle release errors (git-fixes).\n- drm/gem: Properly annotate WW context on drm_gem_lock_reservations() error (git-fixes).\n- drm/i915/glk: ECS Liva Q2 needs GLK HDMI port timing quirk (git-fixes).\n- drm/i915/reg: Fix spelling mistake \u0027Unsupport\u0027 -\u003e \u0027Unsupported\u0027 (git-fixes).\n- drm/mcde: Fix refcount leak in mcde_dsi_bind (git-fixes).\n- drm/mediatek: Add pull-down MIPI operation in mtk_dsi_poweroff function (git-fixes).\n- drm/mediatek: dpi: Only enable dpi after the bridge is enabled (git-fixes).\n- drm/mediatek: dpi: Remove output format of YUV (git-fixes).\n- drm/meson: Correct OSD1 global alpha value (git-fixes).\n- drm/meson: Fix OSD1 RGB to YCbCr coefficient (git-fixes).\n- drm/meson: Fix overflow implicit truncation warnings (git-fixes).\n- drm/meson: Fix refcount bugs in meson_vpu_has_available_connectors() (git-fixes).\n- drm/mipi-dbi: align max_chunk to 2 in spi_transfer (git-fixes).\n- drm/msm/dsi: Fix number of regulators for msm8996_dsi_cfg (git-fixes).\n- drm/msm/dsi: Fix number of regulators for SDM660 (git-fixes).\n- drm/msm/dsi: fix the inconsistent indenting (git-fixes).\n- drm/msm/hdmi: enable core-vcc/core-vdda-supply for 8996 platform (git-fixes).\n- drm/msm/mdp5: Fix global state lock backoff (git-fixes).\n- drm/msm/rd: Fix FIFO-full deadlock (git-fixes).\n- drm/nouveau: fix another off-by-one in nvbios_addr (git-fixes).\n- drm/radeon: add a force flush to delay work when radeon (git-fixes).\n- drm/radeon: fix incorrrect SPDX-License-Identifiers (git-fixes).\n- drm/radeon: fix potential buffer overflow in ni_set_mc_special_registers() (git-fixes).\n- drm/rockchip: Fix an error handling path rockchip_dp_probe() (git-fixes).\n- drm/rockchip: vop: Do not crash for invalid duplicate_state() (git-fixes).\n- drm/st7735r: Fix module autoloading for Okaya RH128128T (git-fixes).\n- drm/sun4i: dsi: Prevent underflow when computing packet sizes (git-fixes).\n- drm/vc4: dsi: Add correct stop condition to vc4_dsi_encoder_disable iteration (git-fixes).\n- drm/vc4: dsi: Correct DSI divider calculations (git-fixes).\n- drm/vc4: dsi: Correct pixel order for DSI0 (git-fixes).\n- drm/vc4: hdmi: Correct HDMI timing registers for interlaced modes (git-fixes).\n- drm/vc4: hdmi: Fix timings for interlaced modes (git-fixes).\n- drm/vc4: plane: Fix margin calculations for the right/bottom edges (git-fixes).\n- drm/vc4: plane: Remove subpixel positioning check (git-fixes).\n- efi: capsule-loader: Fix use-after-free in efi_capsule_write (git-fixes).\n- ehea: fix error return code in ehea_restart_qps() (git-fixes).\n- enetc: Fix endianness issues for enetc_qos (git-fixes).\n- ethernet: sun: niu: fix missing checks of niu_pci_eeprom_read() (git-fixes).\n- ext4: add reserved GDT blocks check (bsc#1202712).\n- ext4: do not set SB_ACTIVE in ext4_orphan_cleanup() (bsc#1202708).\n- ext4: do not use the orphan list when migrating an inode (bsc#1197756).\n- ext4: Fix BUG_ON in ext4_bread when write quota data (bsc#1197755).\n- ext4: fix bug_on in ext4_writepages (bsc#1200872).\n- ext4: fix error handling code in add_new_gdb (bsc#1179722).\n- ext4: fix error handling in ext4_restore_inline_data() (bsc#1197757).\n- ext4: fix invalid inode checksum (bsc#1179723).\n- ext4: fix loff_t overflow in ext4_max_bitmap_size() (bsc#1202709).\n- ext4: fix overhead calculation to account for the reserved gdt blocks (bsc#1200869).\n- ext4: fix potential infinite loop in ext4_dx_readdir() (bsc#1191662).\n- ext4: fix race when reusing xattr blocks (bsc#1198971).\n- ext4: fix symlink file size not match to file content (bsc#1200868).\n- ext4: fix use-after-free in ext4_rename_dir_prepare (bsc#1200871).\n- ext4: fix use-after-free in ext4_search_dir (bsc#1202710).\n- ext4: fix warning in ext4_handle_inode_extension (bsc#1202711).\n- ext4: force overhead calculation if the s_overhead_cluster makes no sense (bsc#1200870).\n- ext4: recover csum seed of tmp_inode after migrating to extents (bsc#1202713).\n- ext4: remove EA inode entry from mbcache on inode eviction (bsc#1198971).\n- ext4: unindent codeblock in ext4_xattr_block_set() (bsc#1198971).\n- fbcon: Fix boundary checks for fbcon=vc:n1-n2 parameters (git-fixes).\n- fbdev: chipsfb: Add missing pci_disable_device() in chipsfb_pci_init() (git-fixes).\n- fbdev: fb_pm2fb: Avoid potential divide by zero error (git-fixes).\n- firmware: tegra: bpmp: Do only aligned access to IPC memory area (git-fixes).\n- Fix parsing of rpm/macros.kernel-source on SLE12 (bsc#1201019).\n- fpga: altera-pr-ip: fix unsigned comparison with less than zero (git-fixes).\n- fs-writeback: writeback_sb_inodes: Recalculate \u0027wrote\u0027 according skipped pages (bsc#1200873).\n- ftrace: Fix NULL pointer dereference in is_ftrace_trampoline when ftrace is dead (git-fixes).\n- fuse: ioctl: translate ENOSYS (bsc#1203136).\n- fuse: limit nsec (bsc#1203135).\n- fuse: Remove the control interface for virtio-fs (bsc#1203137).\n- gadgetfs: ep_io - wait until IRQ finishes (git-fixes).\n- geneve: do not use RT_TOS for IPv6 flowlabel (git-fixes).\n- geneve: fix TOS inheriting for ipv4 (git-fixes).\n- gpio: gpiolib-of: Fix refcount bugs in of_mm_gpiochip_add_data() (git-fixes).\n- gpio: mpc8xxx: Fix support for IRQ_TYPE_LEVEL_LOW flow_type in mpc85xx (git-fixes).\n- gpio: pca953x: Add mutex_lock for regcache sync in PM (git-fixes).\n- HID: alps: Declare U1_UNICORN_LEGACY support (git-fixes).\n- HID: cp2112: prevent a buffer overflow in cp2112_xfer() (git-fixes).\n- HID: intel-ish-hid: ishtp: Fix ishtp client sending disordered message (git-fixes).\n- HID: ishtp-hid-clientHID: ishtp-hid-client: Fix comment typo (git-fixes).\n- HID: steam: Prevent NULL pointer dereference in steam_{recv,send}_report (git-fixes).\n- HID: wacom: Do not register pad_input for touch switch (git-fixes).\n- HID: wacom: Only report rotation for art pen (git-fixes).\n- hv_netvsc: Load and store the proper (NBL_HASH_INFO) per-packet info (bsc#1202701).\n- hwmon: (gpio-fan) Fix array out of bounds access (git-fixes).\n- i2c: cadence: Support PEC for SMBus block read (git-fixes).\n- i2c: Fix a potential use after free (git-fixes).\n- i2c: imx: Make sure to unregister adapter on remove() (git-fixes).\n- i2c: mux-gpmux: Add of_node_put() when breaking out of loop (git-fixes).\n- ice: report supported and advertised autoneg using PHY capabilities (git-fixes).\n- ieee802154: cc2520: add rc code in cc2520_tx() (git-fixes).\n- ieee802154/adf7242: defer destroy_workqueue call (git-fixes).\n- iio: accel: bma220: Fix alignment for DMA safety (git-fixes).\n- iio: accel: sca3000: Fix alignment for DMA safety (git-fixes).\n- iio: adc: ad7266: Fix alignment for DMA safety (git-fixes).\n- iio: adc: ad7298: Fix alignment for DMA safety (git-fixes).\n- iio: adc: ad7476: Fix alignment for DMA safety (git-fixes).\n- iio: adc: ad7766: Fix alignment for DMA safety (git-fixes).\n- iio: adc: ad7768-1: Fix alignment for DMA safety (git-fixes).\n- iio: adc: ad7887: Fix alignment for DMA safety (git-fixes).\n- iio: adc: hi8435: Fix alignment for DMA safety (git-fixes).\n- iio: adc: ltc2497: Fix alignment for DMA safety (git-fixes).\n- iio: adc: max1027: Fix alignment for DMA safety (git-fixes).\n- iio: adc: max11100: Fix alignment for DMA safety (git-fixes).\n- iio: adc: max1118: Fix alignment for DMA safety (git-fixes).\n- iio: adc: mcp320x: Fix alignment for DMA safety (git-fixes).\n- iio: adc: mcp3911: make use of the sign bit (git-fixes).\n- iio: adc: mcp3911: use correct formula for AD conversion (git-fixes).\n- iio: adc: ti-adc0832: Fix alignment for DMA safety (git-fixes).\n- iio: adc: ti-adc084s021: Fix alignment for DMA safety (git-fixes).\n- iio: adc: ti-adc12138: Fix alignment for DMA safety (git-fixes).\n- iio: adc: ti-adc128s052: Fix alignment for DMA safety (git-fixes).\n- iio: adc: ti-adc161s626: Fix alignment for DMA safety (git-fixes).\n- iio: adc: ti-ads124s08: Fix alignment for DMA safety (git-fixes).\n- iio: adc: ti-ads7950: Fix alignment for DMA safety (git-fixes).\n- iio: adc: ti-ads8344: Fix alignment for DMA safety (git-fixes).\n- iio: adc: ti-ads8688: Fix alignment for DMA safety (git-fixes).\n- iio: adc: ti-tlc4541: Fix alignment for DMA safety (git-fixes).\n- iio: amplifiers: ad8366: Fix alignment for DMA safety (git-fixes).\n- iio: core: Fix IIO_ALIGN and rename as it was not sufficiently large (git-fixes).\n- iio: dac: ad5064: Fix alignment for DMA safety (git-fixes).\n- iio: dac: ad5360: Fix alignment for DMA safety (git-fixes).\n- iio: dac: ad5421: Fix alignment for DMA safety (git-fixes).\n- iio: dac: ad5449: Fix alignment for DMA safety (git-fixes).\n- iio: dac: ad5504: Fix alignment for DMA safety (git-fixes).\n- iio: dac: ad5755: Fix alignment for DMA safety (git-fixes).\n- iio: dac: ad5761: Fix alignment for DMA safety (git-fixes).\n- iio: dac: ad5764: Fix alignment for DMA safety (git-fixes).\n- iio: dac: ad5791: Fix alignment for DMA saftey (git-fixes).\n- iio: dac: ad7303: Fix alignment for DMA safety (git-fixes).\n- iio: dac: ad8801: Fix alignment for DMA safety (git-fixes).\n- iio: dac: mcp4922: Fix alignment for DMA safety (git-fixes).\n- iio: dac: ti-dac082s085: Fix alignment for DMA safety (git-fixes).\n- iio: dac: ti-dac5571: Fix alignment for DMA safety (git-fixes).\n- iio: dac: ti-dac7311: Fix alignment for DMA safety (git-fixes).\n- iio: dac: ti-dac7612: Fix alignment for DMA safety (git-fixes).\n- iio: frequency: ad9523: Fix alignment for DMA safety (git-fixes).\n- iio: frequency: adf4350: Fix alignment for DMA safety (git-fixes).\n- iio: frequency: adf4371: Fix alignment for DMA safety (git-fixes).\n- iio: gyro: adis16080: Fix alignment for DMA safety (git-fixes).\n- iio: gyro: adis16130: Fix alignment for DMA safety (git-fixes).\n- iio: gyro: adxrs450: Fix alignment for DMA safety (git-fixes).\n- iio: gyro: fxas210002c: Fix alignment for DMA safety (git-fixes).\n- iio: light: isl29028: Fix the warning in isl29028_remove() (git-fixes).\n- iio: potentiometer: ad5272: Fix alignment for DMA safety (git-fixes).\n- iio: potentiometer: max5481: Fix alignment for DMA safety (git-fixes).\n- iio: potentiometer: mcp41010: Fix alignment for DMA safety (git-fixes).\n- iio: potentiometer: mcp4131: Fix alignment for DMA safety (git-fixes).\n- iio: proximity: as3935: Fix alignment for DMA safety (git-fixes).\n- iio: resolver: ad2s1200: Fix alignment for DMA safety (git-fixes).\n- iio: resolver: ad2s90: Fix alignment for DMA safety (git-fixes).\n- ima: force signature verification when CONFIG_KEXEC_SIG is configured (bsc#1203737).\n- Input: iforce - add support for Boeder Force Feedback Wheel (git-fixes).\n- Input: iforce - wake up after clearing IFORCE_XMIT_RUNNING flag (git-fixes).\n- Input: melfas_mip4 - fix return value check in mip4_probe() (git-fixes).\n- Input: rk805-pwrkey - fix module autoloading (git-fixes).\n- Input: snvs_pwrkey - fix SNVS_HPVIDR1 register address (git-fixes).\n- intel_th: Fix a resource leak in an error handling path (git-fixes).\n- intel_th: msu-sink: Potential dereference of null pointer (git-fixes).\n- intel_th: msu: Fix vmalloced buffers (git-fixes).\n- intel_th: pci: Add Meteor Lake-P support (git-fixes).\n- intel_th: pci: Add Raptor Lake-S CPU support (git-fixes).\n- intel_th: pci: Add Raptor Lake-S PCH support (git-fixes).\n- iommu/amd: Simplify and Consolidate Virtual APIC (AVIC) Enablement (git-fixes).\n- iommu/arm-smmu: qcom_iommu: Add of_node_put() when breaking out of loop (git-fixes).\n- iommu/exynos: Handle failed IOMMU device registration properly (git-fixes).\n- iommu/iova: Improve 32-bit free space estimate (git-fixes).\n- iommu/ipmmu-vmsa: Check for error num after setting mask (git-fixes).\n- iommu/mediatek: Add list_del in mtk_iommu_remove (git-fixes).\n- iommu/msm: Fix an incorrect NULL check on list iterator (git-fixes).\n- iommu/omap: Fix regression in probe for NULL pointer dereference (git-fixes).\n- iommu/vt-d: avoid invalid memory access via node_online(NUMA_NO_NODE) (git-fixes).\n- iommu/vt-d: Calculate mask for non-aligned flushes (git-fixes).\n- iommu/vt-d: Fix PCI bus rescan device hot add (git-fixes).\n- iommu/vt-d: Fix RID2PASID setup/teardown failure (git-fixes).\n- ipheth: fix EOVERFLOW in ipheth_rcvbulk_callback (git-fixes).\n- ipmi: ssif: initialize ssif_info-\u003eclient early (git-fixes).\n- ixgbevf: add correct exception tracing for XDP (git-fixes).\n- jbd2: fix assertion \u0027jh-\u003eb_frozen_data == NULL\u0027 failure when journal aborted (bsc#1202716).\n- jbd2: fix outstanding credits assert in jbd2_journal_commit_transaction() (bsc#1202715).\n- jfs: fix GPF in diFree (bsc#1203389).\n- JFS: fix memleak in jfs_mount (git-fixes).\n- JFS: more checks for invalid superblock (git-fixes).\n- jfs: prevent NULL deref in diFree (bsc#1203389).\n- kABI: cgroup: Restore KABI of css_set (bsc#1201610).\n- kABI: x86: kexec: hide new include from genksyms (bsc#1196444).\n- kabi/severities: add stmmac driver local sumbols\n- kexec: clean up arch_kexec_kernel_verify_sig (bsc#1196444).\n- kexec: do not verify the signature without the lockdown or mandatory signature (bsc#1203737).\n- kexec: drop weak attribute from arch_kexec_apply_relocations[_add] (bsc#1196444).\n- kexec: drop weak attribute from functions (bsc#1196444).\n- kexec: drop weak attribute from functions (bsc#1196444).\n- kexec: KEYS, s390: Make use of built-in and secondary keyring for signature verification (bsc#1196444).\n- kexec: KEYS: make the code in bzImage64_verify_sig generic (bsc#1196444).\n- kfifo: fix kfifo_to_user() return type (git-fixes).\n- kfifo: fix ternary sign extension bugs (git-fixes).\n- KVM: arm64: Avoid setting the upper 32 bits of TCR_EL2 and CPTR_EL2 (bsc#1201442)\n- KVM: nVMX: Let userspace set nVMX MSR to any _host_ supported value (git-fixes).\n- KVM: nVMX: Snapshot pre-VM-Enter BNDCFGS for !nested_run_pending case (git-fixes).\n- KVM: nVMX: Snapshot pre-VM-Enter DEBUGCTL for !nested_run_pending case (git-fixes).\n- KVM: PPC: Book3S HV: Context tracking exit guest context before enabling irqs (bsc#1065729).\n- KVM: PPC: Book3S HV: Prevent POWER7/8 TLB flush flushing SLB (bsc#1156395).\n- KVM: PPC: Book3S HV: Use GLOBAL_TOC for kvmppc_h_set_dabr/xdabr() (bsc#1156395).\n- KVM: PPC: Fix vmx/vsx mixup in mmio emulation (bsc#1156395).\n- KVM: PPC: Use arch_get_random_seed_long instead of powernv variant (bsc#1156395).\n- KVM: VMX: Refuse to load kvm_intel if EPT and NX are disabled (git-fixes).\n- KVM: x86: accept userspace interrupt only if no event is injected (git-fixes).\n- KVM: x86: Mark TSS busy during LTR emulation _after_ all fault checks (git-fixes).\n- KVM: x86: Set error code to segment selector on LLDT/LTR non-canonical #GP (git-fixes).\n- lib: bitmap: provide devm_bitmap_alloc() and devm_bitmap_zalloc() (git-fixes).\n- lib/list_debug.c: Detect uninitialized lists (git-fixes).\n- lightnvm: Remove lightnvm implemenation (bsc#1191881 bsc#1201420 ZDI-CAN-17325).\n- list: add \u0027list_del_init_careful()\u0027 to go with \u0027list_empty_careful()\u0027 (bsc#1202745).\n- locking/lockdep: Avoid potential access of invalid memory in lock_class (git-fixes).\n- loop: Fix missing discard support when using LOOP_CONFIGURE (bsc#1202718).\n- mbcache: add functions to delete entry if unused (bsc#1198971).\n- mbcache: do not reclaim used entries (bsc#1198971).\n- md-raid10: fix KASAN warning (git-fixes).\n- md: call __md_stop_writes in md_stop (git-fixes).\n- md: unlock mddev before reap sync_thread in action_store (bsc#1197659).\n- md/bitmap: do not set sb values if can\u0027t pass sanity check (bsc#1197158).\n- media: hdpvr: fix error value returns in hdpvr_read (git-fixes).\n- media: rc: increase rc-mm tolerance and add debug message (git-fixes).\n- media: rtl28xxu: add missing sleep before probing slave demod (git-fixes).\n- media: rtl28xxu: Add support for PROlectrix DV107669 DVB-T dongle (git-fixes).\n- media: rtl28xxu: set keymap for Astrometa DVB-T2 (git-fixes).\n- media: smipcie: fix interrupt handling and IR timeout (git-fixes).\n- media: tw686x: Register the irq at the end of probe (git-fixes).\n- media: usb: dvb-usb-v2: rtl28xxu: convert to use i2c_new_client_device() (git-fixes).\n- media: v4l2-mem2mem: always consider OUTPUT queue during poll (git-fixes).\n- media: v4l2-mem2mem: reorder checks in v4l2_m2m_poll() (git-fixes).\n- mediatek: mt76: mac80211: Fix missing of_node_put() in mt76_led_init() (git-fixes).\n- memstick/ms_block: Fix a memory leak (git-fixes).\n- memstick/ms_block: Fix some incorrect memory allocation (git-fixes).\n- meson-mx-socinfo: Fix refcount leak in meson_mx_socinfo_init (git-fixes).\n- mfd: max77620: Fix refcount leak in max77620_initialise_fps (git-fixes).\n- mfd: t7l66xb: Drop platform disable callback (git-fixes).\n- misc: fastrpc: fix memory corruption on open (git-fixes).\n- misc: fastrpc: fix memory corruption on probe (git-fixes).\n- misc: rtsx: Fix an error handling path in rtsx_pci_probe() (git-fixes).\n- mm: bdi: initialize bdi_min_ratio when bdi is unregistered (bsc#1197763).\n- mm: fix page reference leak in soft_offline_page() (git fixes (mm/memory-failure)).\n- mm: memcontrol: fix potential oom_lock recursion deadlock (bsc#1202447).\n- mm: pagewalk: Fix race between unmap and page walker (git-fixes, bsc#1203159).\n- mm: proc: smaps_rollup: do not stall write attempts on mmap_lock (bsc#1201990).\n- mm: rmap: Fix anon_vma-\u003edegree ambiguity leading to double-reuse (git-fixes, bsc#1203098).\n- mm: smaps*: extend smap_gather_stats to support specified beginning (bsc#1201990).\n- mmap locking API: add mmap_lock_is_contended() (bsc#1201990).\n- mmc: cavium-octeon: Add of_node_put() when breaking out of loop (git-fixes).\n- mmc: cavium-thunderx: Add of_node_put() when breaking out of loop (git-fixes).\n- mmc: pxamci: Fix an error handling path in pxamci_probe() (git-fixes).\n- mmc: pxamci: Fix another error handling path in pxamci_probe() (git-fixes).\n- mmc: sdhci-of-at91: fix set_uhs_signaling rewriting of MC1R (git-fixes).\n- mmc: sdhci-of-esdhc: Fix refcount leak in esdhc_signal_voltage_switch (git-fixes).\n- module: Ignore _GLOBAL_OFFSET_TABLE_ when warning for undefined symbols (git-fixes).\n- mt76: mt76x02u: fix possible memory leak in __mt76x02u_mcu_send_msg (git-fixes).\n- mt7601u: add USB device ID for some versions of XiaoDu WiFi Dongle (git-fixes).\n- mtd: maps: Fix refcount leak in ap_flash_init (git-fixes).\n- mtd: maps: Fix refcount leak in of_flash_probe_versatile (git-fixes).\n- mtd: partitions: Fix refcount leak in parse_redboot_of (git-fixes).\n- mtd: rawnand: meson: Fix a potential double free issue (git-fixes).\n- mtd: sm_ftl: Fix deadlock caused by cancel_work_sync in sm_release (git-fixes).\n- mtd: st_spi_fsm: Add a clk_disable_unprepare() in .probe()\u0027s error path (git-fixes).\n- net_sched: cls_route: disallow handle of 0 (bsc#1202393).\n- net: bcmgenet: Add mdio-bcm-unimac soft dependency (git-fixes).\n- net: cpsw: add missing of_node_put() in cpsw_probe_dt() (git-fixes).\n- net: cpsw: Properly initialise struct page_pool_params (git-fixes).\n- net: davinci_emac: Fix incorrect masking of tx and rx error channel (git-fixes).\n- net: dsa: b53: fix an off by one in checking \u0027vlan-\u003evid\u0027 (git-fixes).\n- net: dsa: felix: suppress -EPROBE_DEFER errors (git-fixes).\n- net: dsa: mt7530: fix VLAN traffic leaks (git-fixes).\n- net: enetc: report software timestamping via SO_TIMESTAMPING (git-fixes).\n- net: enetc: unmap DMA in enetc_send_cmd() (git-fixes).\n- net: enetc: Use pci_release_region() to release some resources (git-fixes).\n- net: ethernet: aeroflex: fix UAF in greth_of_remove (git-fixes).\n- net: ethernet: ezchip: fix error handling (git-fixes).\n- net: ethernet: ezchip: fix UAF in nps_enet_remove (git-fixes).\n- net: ethernet: ezchip: remove redundant check (git-fixes).\n- net: ethernet: fix potential use-after-free in ec_bhf_remove (git-fixes).\n- net: ethernet: ti: cpsw_ale: Fix access to un-initialized memory (git-fixes).\n- net: fec_ptp: add clock rate zero check (git-fixes).\n- net: fec: fix the potential memory leak in fec_enet_init() (git-fixes).\n- net: ftgmac100: Fix crash when removing driver (git-fixes).\n- net: hdlc_x25: Return meaningful error code in x25_open (git-fixes).\n- net: hns: Fix kernel-doc (git-fixes).\n- net: lantiq: fix memory corruption in RX ring (git-fixes).\n- net: lapbether: Prevent racing when checking whether the netif is running (git-fixes).\n- net: mana: Add rmb after checking owner bits (git-fixes).\n- net: mana: Add support of XDP_REDIRECT action (bug#1201310, jsc#PED-529).\n- net: mana: Add the Linux MANA PF driver (bug#1201309, jsc#PED-529).\n- net: moxa: Use devm_platform_get_and_ioremap_resource() (git-fixes).\n- net: mscc: ocelot: correctly report the timestamping RX filters in ethtool (git-fixes).\n- net: mscc: ocelot: do not downgrade timestamping RX filters in SIOCSHWTSTAMP (git-fixes).\n- net: mvpp2: fix interrupt mask/unmask skip condition (git-fixes).\n- net: netcp: Fix an error message (git-fixes).\n- net: pch_gbe: Propagate error from devm_gpio_request_one() (git-fixes).\n- net: rose: fix netdev reference changes (git-fixes).\n- net: sock: tracing: Fix sock_exceed_buf_limit not to dereference stale pointer (git-fixes).\n- net: stmicro: handle clk_prepare() failure during init (git-fixes).\n- net: stmmac: disable clocks in stmmac_remove_config_dt() (git-fixes).\n- net: stmmac: dwmac1000: Fix extended MAC address registers definition (git-fixes).\n- net: stmmac: Modify configuration method of EEE timers (git-fixes).\n- net: stmmac: Use resolved link config in mac_link_up() (git-fixes).\n- net: vmxnet3: fix possible NULL pointer dereference in vmxnet3_rq_cleanup() (bsc#1200431).\n- net: vmxnet3: fix possible use-after-free bugs in vmxnet3_rq_alloc_rx_buf() (bsc#1200431).\n- net: vmxnet3: remove multiple false checks in vmxnet3_ethtool.c (bsc#1200431).\n- net:emac/emac-mac: Fix a use after free in emac_mac_tx_buf_send (git-fixes).\n- net:enetc: allocate CBD ring data memory using DMA coherent methods (git-fixes).\n- net/mlx5e: Check for needed capability for cvlan matching (git-fixes).\n- net/sonic: Fix a resource leak in an error handling path in \u0027jazz_sonic_probe()\u0027 (git-fixes).\n- NFS: Do not decrease the value of seq_nr_highest_sent (git-fixes).\n- NFS: fix nfs_path in case of a rename retry (git-fixes).\n- NFS: Fix races in the legacy idmapper upcall (git-fixes).\n- NFS: Fix second deadlock in nfs4_evict_inode() (git-fixes).\n- NFS: Handle NFS4ERR_DELAY replies to OP_SEQUENCE correctly (git-fixes).\n- NFS: nfs4_proc_set_acl needs to restore NFS_CAP_UIDGID_NOMAP on error (git-fixes).\n- NFS: RECLAIM_COMPLETE must handle EACCES (git-fixes).\n- NFS: support EXCHGID4_FLAG_SUPP_FENCE_OPS 4.2 EXCHANGE_ID flag (git-fixes).\n- NFSD: Add missing NFSv2 .pc_func methods (git-fixes).\n- NFSD: Clamp WRITE offsets (git-fixes).\n- NFSD: Fix offset type in I/O trace points (git-fixes).\n- NFSD: Fix possible sleep during nfsd4_release_lockowner() (git-fixes).\n- NFSD: fix use-after-free due to delegation race (git-fixes).\n- NFSD: prevent integer overflow on 32 bit systems (git-fixes).\n- NFSD: prevent underflow in nfssvc_decode_writeargs() (git-fixes).\n- NTB: ntb_tool: uninitialized heap data in tool_fn_write() (git-fixes).\n- nvme-fabrics: parse nvme connect Linux error codes (bsc#1201865).\n- nvme-rdma: Handle number of queue changes (bsc#1201865).\n- nvme-tcp: fix UAF when detecting digest errors (bsc#1200313 bsc#1201489).\n- nvme-tcp: Handle number of queue changes (bsc#1201865).\n- nvme: fix RCU hole that allowed for endless looping in multipath round robin (bsc#1202636).\n- nvmet: Expose max queues to configfs (bsc#1201865).\n- objtool: Add support for intra-function calls (bsc#1202396).\n- objtool: Make handle_insn_ops() unconditional (bsc#1202396).\n- objtool: Remove INSN_STACK (bsc#1202396).\n- objtool: Rework allocating stack_ops on decode (bsc#1202396).\n- objtool: Support multiple stack_op per instruction (bsc#1202396).\n- ocfs2: drop acl cache for directories too (bsc#1191667).\n- ocfs2: fix crash when initialize filecheck kobj fails (bsc#1197920).\n- ocfs2: mount fails with buffer overflow in strlen (bsc#1197760).\n- octeontx2-af: fix infinite loop in unmapping NPC counter (git-fixes).\n- of: fdt: fix off-by-one error in unflatten_dt_nodes() (git-fixes).\n- of/device: Fix up of_dma_configure_id() stub (git-fixes).\n- PCI: Add ACS quirk for Broadcom BCM5750x NICs (git-fixes).\n- PCI: dwc: Add unroll iATU space support to dw_pcie_disable_atu() (git-fixes).\n- PCI: dwc: Always enable CDM check if \u0027snps,enable-cdm-check\u0027 exists (git-fixes).\n- PCI: dwc: Deallocate EPC memory on dw_pcie_ep_init() errors (git-fixes).\n- PCI: dwc: Disable outbound windows only for controllers using iATU (git-fixes).\n- PCI: dwc: Stop link on host_init errors and de-initialization (git-fixes).\n- PCI: hv: Fix hv_arch_irq_unmask() for multi-MSI (bsc#1200845).\n- PCI: hv: Fix interrupt mapping for multi-MSI (bsc#1200845).\n- PCI: hv: Fix multi-MSI to allow more than one MSI vector (bsc#1200845).\n- PCI: hv: Make the code arch neutral by adding arch specific interfaces (bsc#1200845).\n- PCI: hv: Only reuse existing IRTE allocation for Multi-MSI (bsc#1200845).\n- PCI: hv: Reuse existing IRTE allocation in compose_msi_msg() (bsc#1200845).\n- PCI: qcom: Fix pipe clock imbalance (git-fixes).\n- PCI: qcom: Power on PHY before IPQ8074 DBI register accesses (git-fixes).\n- PCI: qcom: Set up rev 2.1.0 PARF_PHY before enabling clocks (git-fixes).\n- PCI: tegra194: Fix link up retry sequence (git-fixes).\n- PCI: tegra194: Fix PM error handling in tegra_pcie_config_ep() (git-fixes).\n- PCI: tegra194: Fix Root Port interrupt handling (git-fixes).\n- PCI/ACPI: Guard ARM64-specific mcfg_quirks (git-fixes).\n- PCI/portdrv: Do not disable AER reporting in get_port_device_capability() (git-fixes).\n- perf bench: Share some global variables to fix build with gcc 10 (git-fixes).\n- pinctrl: nomadik: Fix refcount leak in nmk_pinctrl_dt_subnode_to_map (git-fixes).\n- pinctrl: qcom: msm8916: Allow CAMSS GP clocks to be muxed (git-fixes).\n- pinctrl: rockchip: Enhance support for IRQ_TYPE_EDGE_BOTH (git-fixes).\n- pinctrl: sunxi: Add I/O bias setting for H6 R-PIO (git-fixes).\n- pinctrl/rockchip: fix gpio device creation (git-fixes).\n- platform/olpc: Fix uninitialized data in debugfs write (git-fixes).\n- platform/x86: acer-wmi: Acer Aspire One AOD270/Packard Bell Dot keymap fixes (git-fixes).\n- platform/x86: pmc_atom: Fix SLP_TYPx bitfield mask (git-fixes).\n- PM: runtime: Remove link state checks in rpm_get/put_supplier() (git-fixes).\n- powerpc: define get_cycles macro for arch-override (bsc#1065729).\n- powerpc: Enable execve syscall exit tracepoint (bsc#1065729).\n- powerpc: powernv: kABI: add back powernv_get_random_long (bsc#1065729).\n- powerpc/drmem: Make lmb_size 64 bit (bsc#1203424 ltc#199544).\n- powerpc/memhotplug: Make lmb size 64bit (bsc#1203424 ltc#199544).\n- powerpc/perf: Optimize clearing the pending PMI and remove WARN_ON for PMI check in power_pmu_disable (bsc#1156395).\n- powerpc/powernv: Avoid crashing if rng is NULL (bsc#1065729).\n- powerpc/powernv: delay rng platform device creation until later in boot (bsc#1065729).\n- powerpc/powernv: rename remaining rng powernv_ functions to pnv_ (bsc#1065729).\n- powerpc/powernv: Staticify functions without prototypes (bsc#1065729).\n- powerpc/powernv: wire up rng during setup_arch (bsc#1065729).\n- powerpc/powernv/kvm: Use darn for H_RANDOM on Power9 (bsc#1065729).\n- powerpc/pseries: wire up rng during setup_arch() (bsc#1065729).\n- powerpc/xive: Fix refcount leak in xive_get_max_prio (git-fixess).\n- ppc64/kdump: Limit kdump base to 512MB (bsc#1203410 ltc#199904).\n- profiling: fix shift too large makes kernel panic (git-fixes).\n- profiling: fix shift-out-of-bounds bugs (git fixes).\n- psi: Fix uaf issue when psi trigger is destroyed while being polled (bsc#1203909).\n- qlcnic: Add null check after calling netdev_alloc_skb (git-fixes).\n- random: fix crash on multiple early calls to add_bootloader_randomness() (git-fixes).\n- random: remove useless header comment (git fixes).\n- ratelimit: Fix data-races in ___ratelimit() (git-fixes).\n- regulator: core: Clean up on enable failure (git-fixes).\n- regulator: of: Fix refcount leak bug in of_get_regulation_constraints() (git-fixes).\n- reiserfs: fix handling of -EOPNOTSUPP in reiserfs_for_each_xattr (bsc#1202714).\n- remoteproc: qcom: q6v5-mss: add powerdomains to MSM8996 config (git-fixes).\n- remoteproc: qcom: wcnss: Fix handling of IRQs (git-fixes).\n- s390/crash: fix incorrect number of bytes to copy to user space (git-fixes).\n- s390/crash: make copy_oldmem_page() return number of bytes copied (git-fixes).\n- s390/mm: do not trigger write fault when vma does not allow VM_WRITE (git-fixes).\n- s390/mm: fix 2KB pgtable release race (git-fixes).\n- s390/ptrace: pass invalid syscall numbers to tracing (bsc#1192594 LTC#197522).\n- s390/qeth: cache link_info for ethtool (bsc#1202984 LTC#199607).\n- s390/qeth: clean up default cases for ethtool link mode (bsc#1202984 LTC#199607).\n- s390/qeth: improve QUERY CARD INFO processing (bsc#1202984 LTC#199607).\n- s390/qeth: improve selection of ethtool link modes (bsc#1202984 LTC#199607).\n- s390/qeth: set static link info during initialization (bsc#1202984 LTC#199607).\n- s390/qeth: tolerate error when querying card info (bsc#1202984 LTC#199607).\n- s390/qeth: use QUERY OAT for initial link info (bsc#1202984 LTC#199607).\n- sched/debug: Remove mpol_get/put and task_lock/unlock from (git-fixes)\n- sched/fair: Revise comment about lb decision matrix (git fixes (sched/fair)).\n- sched/membarrier: fix missing local execution of ipi_sync_rq_state() (git fixes (sched/membarrier)).\n- scsi: core: Fix bad pointer dereference when ehandler kthread is invalid (git-fixes).\n- scsi: lpfc: Add missing destroy_workqueue() in error path (bsc#1203939).\n- scsi: lpfc: Add missing free iocb and nlp kref put for early return VMID cases (bsc#1203939).\n- scsi: lpfc: Add reporting capability for Link Degrade Signaling (bsc#1203939).\n- scsi: lpfc: Add warning notification period to CMF_SYNC_WQE (bsc#1203063).\n- scsi: lpfc: Check the return value of alloc_workqueue() (bsc#1203063).\n- scsi: lpfc: Copyright updates for 14.2.0.6 patches (bsc#1203063).\n- scsi: lpfc: Fix FLOGI ACC with wrong SID in PT2PT topology (bsc#1203939).\n- scsi: lpfc: Fix mbuf pool resource detected as busy at driver unload (bsc#1203939).\n- scsi: lpfc: Fix multiple NVMe remoteport registration calls for the same NPort ID (bsc#1203939).\n- scsi: lpfc: Fix null ndlp ptr dereference in abnormal exit path for GFT_ID (bsc#1203063).\n- scsi: lpfc: Fix prli_fc4_req checks in PRLI handling (bsc#1203939).\n- scsi: lpfc: Fix unsolicited FLOGI receive handling during PT2PT discovery (bsc#1203063).\n- scsi: lpfc: Fix various issues reported by tools (bsc#1203939).\n- scsi: lpfc: Move scsi_host_template outside dynamically allocated/freed phba (bsc#1185032 bsc#1203939).\n- scsi: lpfc: Remove SANDiags related code (bsc#1203063).\n- scsi: lpfc: Remove the unneeded result variable (bsc#1203939).\n- scsi: lpfc: Remove unneeded result variable (bsc#1203939).\n- scsi: lpfc: Rename mp/bmp dma buffers to rq/rsp in lpfc_fdmi_cmd (bsc#1203939).\n- scsi: lpfc: Return DID_TRANSPORT_DISRUPTED instead of DID_REQUEUE (bsc#1203939).\n- scsi: lpfc: Rework FDMI attribute registration for unintential padding (bsc#1203939).\n- scsi: lpfc: Rework lpfc_fdmi_cmd() routine for cleanup and consistency (bsc#1203939).\n- scsi: lpfc: Rework MIB Rx Monitor debug info logic (bsc#1203063).\n- scsi: lpfc: Update congestion mode logging for Emulex SAN Manager application (bsc#1203939).\n- scsi: lpfc: Update lpfc version to 14.2.0.6 (bsc#1203063).\n- scsi: lpfc: Update lpfc version to 14.2.0.7 (bsc#1203939).\n- scsi: mpt3sas: Fix use-after-free warning (git-fixes).\n- scsi: qla2xxx: Add debugfs create/delete helpers (bsc#1203935).\n- scsi: qla2xxx: Add NVMe parameters support in Auxiliary Image Status (bsc#1203935).\n- scsi: qla2xxx: Always wait for qlt_sess_work_fn() from qlt_stop_phase1() (bsc#1203935).\n- scsi: qla2xxx: Avoid flush_scheduled_work() usage (bsc#1203935).\n- scsi: qla2xxx: Disable ATIO interrupt coalesce for quad port ISP27XX (bsc#1203935).\n- scsi: qla2xxx: Drop DID_TARGET_FAILURE use (bsc#1203935).\n- scsi: qla2xxx: Fix memory leak in __qlt_24xx_handle_abts() (bsc#1203935).\n- scsi: qla2xxx: Fix response queue handler reading stale packets (bsc#1203935).\n- scsi: qla2xxx: Log message \u0027skipping scsi_scan_host()\u0027 as informational (bsc#1203935).\n- scsi: qla2xxx: Remove unused declarations for qla2xxx (bsc#1203935).\n- scsi: qla2xxx: Remove unused del_sess_list field (bsc#1203935).\n- scsi: qla2xxx: Remove unused qlt_tmr_work() (bsc#1203935).\n- scsi: qla2xxx: Revert \u0027scsi: qla2xxx: Fix response queue handler reading stale packets\u0027 (bsc#1203935).\n- scsi: qla2xxx: Update version to 10.02.07.900-k (bsc#1203935).\n- scsi: sg: Allow waiting for commands to complete on removed device (git-fixes).\n- scsi: smartpqi: Fix DMA direction for RAID requests (git-fixes).\n- scsi: smartpqi: Shorten drive visibility after removal (bsc#1200622).\n- scsi: smartpqi: Update LUN reset handler (bsc#1200622).\n- selftests: futex: Use variable MAKE instead of make (git-fixes).\n- serial: 8250_dw: Store LSR into lsr_saved_flags in dw8250_tx_wait_empty() (git-fixes).\n- serial: fsl_lpuart: RS485 RTS polariy is inverse (git-fixes).\n- serial: mvebu-uart: uart2 error bits clearing (git-fixes).\n- serial: tegra: Change lower tolerance baud rate limit for tegra20 and tegra30 (git-fixes).\n- soc: brcmstb: pm-arm: Fix refcount leak and __iomem leak bugs (git-fixes).\n- soc: fsl: guts: machine variable might be unset (git-fixes).\n- soundwire: bus_type: fix remove and shutdown support (git-fixes).\n- spi: Fix incorrect cs_setup delay handling (git-fixes).\n- spi: spi-rspi: Fix PIO fallback on RZ platforms (git-fixes).\n- spi: synquacer: Add missing clk_disable_unprepare() (git-fixes).\n- spmi: trace: fix stack-out-of-bound access in SPMI tracing functions (git-fixes).\n- squashfs: fix divide error in calculate_skip() (git-fixes).\n- staging: rtl8192u: Fix sleep in atomic context bug in dm_fsync_timer_callback (git-fixes).\n- staging: rtl8712: fix use after free bugs (git-fixes).\n- SUNRPC reverting d03727b248d0 (\u0027NFSv4 fix CLOSE not waiting for direct IO compeletion\u0027) (git-fixes).\n- SUNRPC: Clean up scheduling of autoclose (git-fixes).\n- SUNRPC: Do not call connect() more than once on a TCP socket (git-fixes).\n- SUNRPC: Do not dereference xprt-\u003esnd_task if it\u0027s a cookie (git-fixes).\n- SUNRPC: Do not leak sockets in xs_local_connect() (git-fixes).\n- SUNRPC: fix expiry of auth creds (git-fixes).\n- SUNRPC: Fix misplaced barrier in call_decode (git-fixes).\n- SUNRPC: Fix READ_PLUS crasher (git-fixes).\n- SUNRPC: Partial revert of commit 6f9f17287e78 (git-fixes).\n- SUNRPC: Prevent immediate close+reconnect (git-fixes).\n- SUNRPC: Reinitialise the backchannel request buffers before reuse (git-fixes).\n- SUNRPC: RPC level errors should set task-\u003etk_rpc_status (git-fixes).\n- svcrdma: Hold private mutex while invoking rdma_accept() (git-fixes).\n- tee: optee: Fix incorrect page free bug (git-fixes).\n- thermal: Fix NULL pointer dereferences in of_thermal_ functions (git-fixes).\n- thermal: sysfs: Fix cooling_device_stats_setup() error code path (git-fixes).\n- thermal/tools/tmon: Include pthread and time headers in tmon.h (git-fixes).\n- thunderbolt: Use the actual buffer in tb_async_error() (git-fixes).\n- tick/nohz: Use WARN_ON_ONCE() to prevent console saturation (git fixes (kernel/time)).\n- tools/thermal: Fix possible path truncations (git-fixes).\n- tracing: Add ustring operation to filtering string pointers (git-fixes).\n- tracing: hold caller_addr to hardirq_{enable,disable}_ip (git-fixes).\n- tracing/histogram: Fix a potential memory leak for kstrdup() (git-fixes).\n- tracing/histograms: Fix memory leak problem (git-fixes).\n- tracing/probes: Have kprobes and uprobes use $COMM too (git-fixes).\n- tty: serial: Fix refcount leak bug in ucc_uart.c (git-fixes).\n- tty: serial: lpuart: disable flow control while waiting for the transmit engine to complete (git-fixes).\n- tty: vt: initialize unicode screen buffer (git-fixes).\n- USB: cdc-acm: Add Icom PMR F3400 support (0c26:0020) (git-fixes).\n- USB: core: Fix RST error in hub.c (git-fixes).\n- USB: core: Prevent nested device-reset calls (git-fixes).\n- USB: dwc2: fix wrong order of phy_power_on and phy_init (git-fixes).\n- USB: dwc3: add cancelled reasons for dwc3 requests (git-fixes).\n- USB: dwc3: disable USB core PHY management (git-fixes).\n- USB: dwc3: ep0: Fix delay status handling (git-fixes).\n- USB: dwc3: gadget: END_TRANSFER before CLEAR_STALL command (git-fixes).\n- USB: dwc3: gadget: Fix IN endpoint max packet size allocation (git-fixes).\n- USB: dwc3: gadget: Refactor dwc3_gadget_ep_dequeue (git-fixes).\n- USB: dwc3: gadget: Remove FS bInterval_m1 limitation (git-fixes).\n- USB: dwc3: gadget: Remove unnecessary checks (git-fixes).\n- USB: dwc3: gadget: Replace list_for_each_entry_safe() if using giveback (git-fixes).\n- USB: dwc3: gadget: Store resource index of start cmd (git-fixes).\n- USB: dwc3: qcom: fix missing optional irq warnings.\n- USB: dwc3: Switch to platform_get_irq_byname_optional() (git-fixes).\n- USB: ehci: handshake CMD_RUN instead of STS_HALT (git-fixes).\n- USB: Follow-up to SPDX identifiers addition - remove now useless comments (git-fixes).\n- USB: gadget: mass_storage: Fix cdrom data transfers on MAC-OS (git-fixes).\n- USB: gadget: u_audio: fix race condition on endpoint stop (git-fixes).\n- USB: gadget: udc-xilinx: replace memcpy with memcpy_toio (git-fixes).\n- USB: gadget: udc: amd5536 depends on HAS_DMA (git-fixes).\n- USB: gadget: uvc: call uvc uvcg_warn on completed status instead of uvcg_info (git-fixes).\n- USB: host: Fix refcount leak in ehci_hcd_ppc_of_probe (git-fixes).\n- USB: host: ohci-ppc-of: Fix refcount leak bug (git-fixes).\n- USB: host: xhci: use snprintf() in xhci_decode_trb() (git-fixes).\n- USB: ohci-nxp: Fix refcount leak in ohci_hcd_nxp_probe (git-fixes).\n- USB: otg-fsm: Fix hrtimer list corruption (git-fixes).\n- USB: renesas: Fix refcount leak bug (git-fixes).\n- USB: serial: ch341: fix disabled rx timer on older devices (git-fixes).\n- USB: serial: ch341: fix lost character on LCR updates (git-fixes).\n- USB: serial: ch341: name prescaler, divisor registers (git-fixes).\n- USB: serial: cp210x: add Decagon UCA device id (git-fixes).\n- USB: serial: fix tty-port initialized comments (git-fixes).\n- USB: serial: ftdi_sio: add Omron CS1W-CIF31 device id (git-fixes).\n- USB: serial: option: add Quectel EM060K modem (git-fixes).\n- USB: serial: option: add support for Cinterion MV32-WA/WB RmNet mode (git-fixes).\n- USB: serial: option: add support for OPPO R11 diag port (git-fixes).\n- USB: storage: Add ASUS \u0026lt;0x0b05:0x1932\u003e to IGNORE_UAS (git-fixes).\n- USB: storage: Add ignore-residue quirk for NXP PN7462AU (git-fixes).\n- USB: struct usb_device: hide new member (git-fixes).\n- USB: typec: altmodes/displayport: correct pin assignment for UFP receptacles (git-fixes).\n- USB: typec: ucsi: Acknowledge the GET_ERROR_STATUS command completion (git-fixes).\n- USB: xhci: tegra: Fix error check (git-fixes).\n- usbnet: Fix linkwatch use-after-free on disconnect (git-fixes).\n- usbnet: Fix memory leak in usbnet_disconnect() (git-fixes).\n- usbnet: smsc95xx: Fix deadlock on runtime resume (git-fixes).\n- vboxguest: Do not use devm for irq (git-fixes).\n- vfio/ccw: Remove UUID from s390 debug log (git-fixes).\n- video: fbdev: amba-clcd: Fix refcount leak bugs (git-fixes).\n- video: fbdev: arkfb: Check the size of screen before memset_io() (git-fixes).\n- video: fbdev: arkfb: Fix a divide-by-zero bug in ark_set_pixclock() (git-fixes).\n- video: fbdev: i740fb: Check the argument of i740_calc_vclk() (git-fixes).\n- video: fbdev: s3fb: Check the size of screen before memset_io() (git-fixes).\n- video: fbdev: sis: fix typos in SiS_GetModeID() (git-fixes).\n- video: fbdev: vt8623fb: Check the size of screen before memset_io() (git-fixes).\n- virtio_net: fix memory leak inside XPD_TX with mergeable (git-fixes).\n- virtio-gpu: fix a missing check to avoid NULL dereference (git-fixes).\n- virtio-net: fix the race between refill work and close (git-fixes).\n- VMCI: Add support for ARM64 (bsc#1199291, jsc#SLE-24635).\n- VMCI: Check exclusive_vectors when freeing interrupt 1 (bsc#1199291, jsc#SLE-24635).\n- VMCI: dma dg: add MMIO access to registers (bsc#1199291, jsc#SLE-24635).\n- VMCI: dma dg: add support for DMA datagrams receive (bsc#1199291, jsc#SLE-24635).\n- VMCI: dma dg: add support for DMA datagrams sends (bsc#1199291, jsc#SLE-24635).\n- VMCI: dma dg: allocate send and receive buffers for DMA datagrams (bsc#1199291, jsc#SLE-24635).\n- VMCI: dma dg: detect DMA datagram capability (bsc#1199291, jsc#SLE-24635).\n- VMCI: dma dg: register dummy IRQ handlers for DMA datagrams (bsc#1199291, jsc#SLE-24635).\n- VMCI: dma dg: set OS page size (bsc#1199291, jsc#SLE-24635).\n- VMCI: dma dg: whitespace formatting change for vmci register defines (bsc#1199291, jsc#SLE-24635).\n- VMCI: Enforce queuepair max size for IOCTL_VMCI_QUEUEPAIR_ALLOC (bsc#1199291, jsc#SLE-24635).\n- VMCI: Fix some error handling paths in vmci_guest_probe_device() (bsc#1199291, jsc#SLE-24635).\n- VMCI: Release notification_bitmap in error path (bsc#1199291, jsc#SLE-24635).\n- vmxnet3: add command to set ring buffer sizes (bsc#1200431).\n- vmxnet3: add support for capability registers (bsc#1200431).\n- vmxnet3: add support for large passthrough BAR register (bsc#1200431).\n- vmxnet3: add support for out of order rx completion (bsc#1200431).\n- vmxnet3: disable overlay offloads if UPT device does not support (bsc#1200431).\n- vmxnet3: do not reschedule napi for rx processing (bsc#1200431).\n- vmxnet3: do not stop tx queues after netif_device_detach() (bsc#1200431).\n- vmxnet3: Implement ethtool\u0027s get_channels command (bsc#1200431).\n- vmxnet3: limit number of TXDs used for TSO packet (bsc#1200431).\n- vmxnet3: prepare for version 7 changes (bsc#1200431).\n- vmxnet3: Record queue number to incoming packets (bsc#1200431).\n- vmxnet3: Remove useless DMA-32 fallback configuration (bsc#1200431).\n- vmxnet3: switch from \u0027pci_\u0027 to \u0027dma_\u0027 API (bsc#1200431).\n- vmxnet3: update to version 7 (bsc#1200431).\n- vmxnet3: use ext1 field to indicate encapsulated packet (bsc#1200431).\n- vsock: Fix memory leak in vsock_connect() (git-fixes).\n- vsock: Set socket state back to SS_UNCONNECTED in vsock_connect_timeout() (git-fixes).\n- vt: Clear selection before changing the font (git-fixes).\n- vt: selection, introduce vc_is_sel (git-fixes).\n- watchdog: armada_37xx_wdt: check the return value of devm_ioremap() in armada_37xx_wdt_probe() (git-fixes).\n- watchdog: wdat_wdt: Set the min and max timeout values properly (bsc#1194023).\n- wifi: cfg80211: debugfs: fix return type in ht40allow_map_read() (git-fixes).\n- wifi: iwlegacy: 4965: corrected fix for potential off-by-one overflow in il4965_rs_fill_link_cmd() (git-fixes).\n- wifi: iwlegacy: 4965: fix potential off-by-one overflow in il4965_rs_fill_link_cmd() (git-fixes).\n- wifi: iwlwifi: mvm: fix double list_add at iwl_mvm_mac_wake_tx_queue (git-fixes).\n- wifi: libertas: Fix possible refcount leak in if_usb_probe() (git-fixes).\n- wifi: mac80211_hwsim: add back erroneously removed cast (git-fixes).\n- wifi: mac80211_hwsim: fix race condition in pending packet (git-fixes).\n- wifi: mac80211_hwsim: use 32-bit skb cookie (git-fixes).\n- wifi: mac80211: Do not finalize CSA in IBSS mode if state is disconnected (git-fixes).\n- wifi: p54: add missing parentheses in p54_flush() (git-fixes).\n- wifi: p54: Fix an error handling path in p54spi_probe() (git-fixes).\n- wifi: rtlwifi: fix error codes in rtl_debugfs_set_write_h2c() (git-fixes).\n- wifi: wil6210: debugfs: fix info leak in wil_write_file_wmi() (git-fixes).\n- wifi: wil6210: debugfs: fix uninitialized variable use in `wil_write_file_wmi()` (git-fixes).\n- x86/bugs: Reenable retbleed=off While for older kernels the return thunks are statically built in and cannot be dynamically patched out, retbleed=off should still work so that it can be disabled.\n- x86/kexec: fix memory leak of elf header buffer (bsc#1196444).\n- x86/olpc: fix \u0027logical not is only applied to the left hand side\u0027 (git-fixes).\n- x86/xen: Remove undefined behavior in setup_features() (git-fixes).\n- xen/xenbus: fix return type in xenbus_file_read() (git-fixes).\n- xfs: bunmapi has unnecessary AG lock ordering issues (git-fixes).\n- xfs: check sb_meta_uuid for dabuf buffer recovery (bsc#1202577).\n- xfs: Fix assert failure in xfs_setattr_size() (git-fixes).\n- xfs: make xfs_rtalloc_query_range input parameters const (git-fixes).\n- xfs: mark a data structure sick if there are cross-referencing errors (git-fixes).\n- xfs: only reset incore inode health state flags when reclaiming an inode (git-fixes).\n- xfs: prevent a UAF when log IO errors race with unmount (git-fixes).\n- xfs: use kmem_cache_free() for kmem_cache objects (git-fixes).\n- xprtrdma: Fix cwnd update ordering (git-fixes).\n- xprtrdma: Fix XDRBUF_SPARSE_PAGES support (git-fixes).\n",
        "title": "Description of the patch"
      },
      {
        "category": "details",
        "text": "SUSE-2022-3609,SUSE-SLE-Module-Public-Cloud-15-SP3-2022-3609,openSUSE-SLE-15.3-2022-3609",
        "title": "Patchnames"
      },
      {
        "category": "legal_disclaimer",
        "text": "CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).",
        "title": "Terms of use"
      }
    ],
    "publisher": {
      "category": "vendor",
      "contact_details": "https://www.suse.com/support/security/contact/",
      "name": "SUSE Product Security Team",
      "namespace": "https://www.suse.com/"
    },
    "references": [
      {
        "category": "external",
        "summary": "SUSE ratings",
        "url": "https://www.suse.com/support/security/rating/"
      },
      {
        "category": "self",
        "summary": "URL of this CSAF notice",
        "url": "https://ftp.suse.com/pub/projects/security/csaf/suse-su-2022_3609-1.json"
      },
      {
        "category": "self",
        "summary": "URL for SUSE-SU-2022:3609-1",
        "url": "https://www.suse.com/support/update/announcement/2022/suse-su-20223609-1/"
      },
      {
        "category": "self",
        "summary": "E-Mail link for SUSE-SU-2022:3609-1",
        "url": "https://lists.suse.com/pipermail/sle-security-updates/2022-October/012557.html"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1023051",
        "url": "https://bugzilla.suse.com/1023051"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1065729",
        "url": "https://bugzilla.suse.com/1065729"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1156395",
        "url": "https://bugzilla.suse.com/1156395"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1177471",
        "url": "https://bugzilla.suse.com/1177471"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1179722",
        "url": "https://bugzilla.suse.com/1179722"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1179723",
        "url": "https://bugzilla.suse.com/1179723"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1181862",
        "url": "https://bugzilla.suse.com/1181862"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1185032",
        "url": "https://bugzilla.suse.com/1185032"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1191662",
        "url": "https://bugzilla.suse.com/1191662"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1191667",
        "url": "https://bugzilla.suse.com/1191667"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1191881",
        "url": "https://bugzilla.suse.com/1191881"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1192594",
        "url": "https://bugzilla.suse.com/1192594"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1194023",
        "url": "https://bugzilla.suse.com/1194023"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1194272",
        "url": "https://bugzilla.suse.com/1194272"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1194535",
        "url": "https://bugzilla.suse.com/1194535"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1196444",
        "url": "https://bugzilla.suse.com/1196444"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1196616",
        "url": "https://bugzilla.suse.com/1196616"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1196867",
        "url": "https://bugzilla.suse.com/1196867"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1197158",
        "url": "https://bugzilla.suse.com/1197158"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1197659",
        "url": "https://bugzilla.suse.com/1197659"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1197755",
        "url": "https://bugzilla.suse.com/1197755"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1197756",
        "url": "https://bugzilla.suse.com/1197756"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1197757",
        "url": "https://bugzilla.suse.com/1197757"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1197760",
        "url": "https://bugzilla.suse.com/1197760"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1197763",
        "url": "https://bugzilla.suse.com/1197763"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1197920",
        "url": "https://bugzilla.suse.com/1197920"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1198971",
        "url": "https://bugzilla.suse.com/1198971"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1199255",
        "url": "https://bugzilla.suse.com/1199255"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1199291",
        "url": "https://bugzilla.suse.com/1199291"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1200084",
        "url": "https://bugzilla.suse.com/1200084"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1200313",
        "url": "https://bugzilla.suse.com/1200313"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1200431",
        "url": "https://bugzilla.suse.com/1200431"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1200622",
        "url": "https://bugzilla.suse.com/1200622"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1200845",
        "url": "https://bugzilla.suse.com/1200845"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1200868",
        "url": "https://bugzilla.suse.com/1200868"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1200869",
        "url": "https://bugzilla.suse.com/1200869"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1200870",
        "url": "https://bugzilla.suse.com/1200870"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1200871",
        "url": "https://bugzilla.suse.com/1200871"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1200872",
        "url": "https://bugzilla.suse.com/1200872"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1200873",
        "url": "https://bugzilla.suse.com/1200873"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1201019",
        "url": "https://bugzilla.suse.com/1201019"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1201309",
        "url": "https://bugzilla.suse.com/1201309"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1201310",
        "url": "https://bugzilla.suse.com/1201310"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1201420",
        "url": "https://bugzilla.suse.com/1201420"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1201442",
        "url": "https://bugzilla.suse.com/1201442"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1201489",
        "url": "https://bugzilla.suse.com/1201489"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1201610",
        "url": "https://bugzilla.suse.com/1201610"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1201645",
        "url": "https://bugzilla.suse.com/1201645"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1201705",
        "url": "https://bugzilla.suse.com/1201705"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1201726",
        "url": "https://bugzilla.suse.com/1201726"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1201865",
        "url": "https://bugzilla.suse.com/1201865"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1201948",
        "url": "https://bugzilla.suse.com/1201948"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1201990",
        "url": "https://bugzilla.suse.com/1201990"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1202095",
        "url": "https://bugzilla.suse.com/1202095"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1202096",
        "url": "https://bugzilla.suse.com/1202096"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1202097",
        "url": "https://bugzilla.suse.com/1202097"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1202154",
        "url": "https://bugzilla.suse.com/1202154"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1202341",
        "url": "https://bugzilla.suse.com/1202341"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1202346",
        "url": "https://bugzilla.suse.com/1202346"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1202347",
        "url": "https://bugzilla.suse.com/1202347"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1202385",
        "url": "https://bugzilla.suse.com/1202385"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1202393",
        "url": "https://bugzilla.suse.com/1202393"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1202396",
        "url": "https://bugzilla.suse.com/1202396"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1202447",
        "url": "https://bugzilla.suse.com/1202447"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1202577",
        "url": "https://bugzilla.suse.com/1202577"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1202636",
        "url": "https://bugzilla.suse.com/1202636"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1202672",
        "url": "https://bugzilla.suse.com/1202672"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1202677",
        "url": "https://bugzilla.suse.com/1202677"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1202701",
        "url": "https://bugzilla.suse.com/1202701"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1202708",
        "url": "https://bugzilla.suse.com/1202708"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1202709",
        "url": "https://bugzilla.suse.com/1202709"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1202710",
        "url": "https://bugzilla.suse.com/1202710"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1202711",
        "url": "https://bugzilla.suse.com/1202711"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1202712",
        "url": "https://bugzilla.suse.com/1202712"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1202713",
        "url": "https://bugzilla.suse.com/1202713"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1202714",
        "url": "https://bugzilla.suse.com/1202714"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1202715",
        "url": "https://bugzilla.suse.com/1202715"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1202716",
        "url": "https://bugzilla.suse.com/1202716"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1202717",
        "url": "https://bugzilla.suse.com/1202717"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1202718",
        "url": "https://bugzilla.suse.com/1202718"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1202720",
        "url": "https://bugzilla.suse.com/1202720"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1202722",
        "url": "https://bugzilla.suse.com/1202722"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1202745",
        "url": "https://bugzilla.suse.com/1202745"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1202756",
        "url": "https://bugzilla.suse.com/1202756"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1202810",
        "url": "https://bugzilla.suse.com/1202810"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1202811",
        "url": "https://bugzilla.suse.com/1202811"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1202860",
        "url": "https://bugzilla.suse.com/1202860"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1202895",
        "url": "https://bugzilla.suse.com/1202895"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1202898",
        "url": "https://bugzilla.suse.com/1202898"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1202960",
        "url": "https://bugzilla.suse.com/1202960"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1202984",
        "url": "https://bugzilla.suse.com/1202984"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1203063",
        "url": "https://bugzilla.suse.com/1203063"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1203098",
        "url": "https://bugzilla.suse.com/1203098"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1203107",
        "url": "https://bugzilla.suse.com/1203107"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1203116",
        "url": "https://bugzilla.suse.com/1203116"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1203117",
        "url": "https://bugzilla.suse.com/1203117"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1203135",
        "url": "https://bugzilla.suse.com/1203135"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1203136",
        "url": "https://bugzilla.suse.com/1203136"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1203137",
        "url": "https://bugzilla.suse.com/1203137"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1203159",
        "url": "https://bugzilla.suse.com/1203159"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1203313",
        "url": "https://bugzilla.suse.com/1203313"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1203389",
        "url": "https://bugzilla.suse.com/1203389"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1203410",
        "url": "https://bugzilla.suse.com/1203410"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1203424",
        "url": "https://bugzilla.suse.com/1203424"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1203552",
        "url": "https://bugzilla.suse.com/1203552"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1203622",
        "url": "https://bugzilla.suse.com/1203622"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1203737",
        "url": "https://bugzilla.suse.com/1203737"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1203769",
        "url": "https://bugzilla.suse.com/1203769"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1203906",
        "url": "https://bugzilla.suse.com/1203906"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1203909",
        "url": "https://bugzilla.suse.com/1203909"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1203933",
        "url": "https://bugzilla.suse.com/1203933"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1203935",
        "url": "https://bugzilla.suse.com/1203935"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1203939",
        "url": "https://bugzilla.suse.com/1203939"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1203987",
        "url": "https://bugzilla.suse.com/1203987"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1203992",
        "url": "https://bugzilla.suse.com/1203992"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2016-3695 page",
        "url": "https://www.suse.com/security/cve/CVE-2016-3695/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2020-16119 page",
        "url": "https://www.suse.com/security/cve/CVE-2020-16119/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2020-27784 page",
        "url": "https://www.suse.com/security/cve/CVE-2020-27784/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2020-36516 page",
        "url": "https://www.suse.com/security/cve/CVE-2020-36516/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2021-4155 page",
        "url": "https://www.suse.com/security/cve/CVE-2021-4155/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2021-4203 page",
        "url": "https://www.suse.com/security/cve/CVE-2021-4203/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2022-20368 page",
        "url": "https://www.suse.com/security/cve/CVE-2022-20368/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2022-20369 page",
        "url": "https://www.suse.com/security/cve/CVE-2022-20369/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2022-2503 page",
        "url": "https://www.suse.com/security/cve/CVE-2022-2503/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2022-2586 page",
        "url": "https://www.suse.com/security/cve/CVE-2022-2586/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2022-2588 page",
        "url": "https://www.suse.com/security/cve/CVE-2022-2588/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2022-26373 page",
        "url": "https://www.suse.com/security/cve/CVE-2022-26373/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2022-2639 page",
        "url": "https://www.suse.com/security/cve/CVE-2022-2639/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2022-2663 page",
        "url": "https://www.suse.com/security/cve/CVE-2022-2663/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2022-2905 page",
        "url": "https://www.suse.com/security/cve/CVE-2022-2905/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2022-2977 page",
        "url": "https://www.suse.com/security/cve/CVE-2022-2977/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2022-3028 page",
        "url": "https://www.suse.com/security/cve/CVE-2022-3028/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2022-3239 page",
        "url": "https://www.suse.com/security/cve/CVE-2022-3239/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2022-3303 page",
        "url": "https://www.suse.com/security/cve/CVE-2022-3303/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2022-36879 page",
        "url": "https://www.suse.com/security/cve/CVE-2022-36879/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2022-39188 page",
        "url": "https://www.suse.com/security/cve/CVE-2022-39188/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2022-39190 page",
        "url": "https://www.suse.com/security/cve/CVE-2022-39190/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2022-41218 page",
        "url": "https://www.suse.com/security/cve/CVE-2022-41218/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2022-41222 page",
        "url": "https://www.suse.com/security/cve/CVE-2022-41222/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2022-41848 page",
        "url": "https://www.suse.com/security/cve/CVE-2022-41848/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2022-41849 page",
        "url": "https://www.suse.com/security/cve/CVE-2022-41849/"
      }
    ],
    "title": "Security update for the Linux Kernel",
    "tracking": {
      "current_release_date": "2022-10-18T09:44:53Z",
      "generator": {
        "date": "2022-10-18T09:44:53Z",
        "engine": {
          "name": "cve-database.git:bin/generate-csaf.pl",
          "version": "1"
        }
      },
      "id": "SUSE-SU-2022:3609-1",
      "initial_release_date": "2022-10-18T09:44:53Z",
      "revision_history": [
        {
          "date": "2022-10-18T09:44:53Z",
          "number": "1",
          "summary": "Current version"
        }
      ],
      "status": "final",
      "version": "1"
    }
  },
  "product_tree": {
    "branches": [
      {
        "branches": [
          {
            "branches": [
              {
                "category": "product_version",
                "name": "kernel-devel-azure-5.3.18-150300.38.80.1.noarch",
                "product": {
                  "name": "kernel-devel-azure-5.3.18-150300.38.80.1.noarch",
                  "product_id": "kernel-devel-azure-5.3.18-150300.38.80.1.noarch"
                }
              },
              {
                "category": "product_version",
                "name": "kernel-source-azure-5.3.18-150300.38.80.1.noarch",
                "product": {
                  "name": "kernel-source-azure-5.3.18-150300.38.80.1.noarch",
                  "product_id": "kernel-source-azure-5.3.18-150300.38.80.1.noarch"
                }
              }
            ],
            "category": "architecture",
            "name": "noarch"
          },
          {
            "branches": [
              {
                "category": "product_version",
                "name": "cluster-md-kmp-azure-5.3.18-150300.38.80.1.x86_64",
                "product": {
                  "name": "cluster-md-kmp-azure-5.3.18-150300.38.80.1.x86_64",
                  "product_id": "cluster-md-kmp-azure-5.3.18-150300.38.80.1.x86_64"
                }
              },
              {
                "category": "product_version",
                "name": "dlm-kmp-azure-5.3.18-150300.38.80.1.x86_64",
                "product": {
                  "name": "dlm-kmp-azure-5.3.18-150300.38.80.1.x86_64",
                  "product_id": "dlm-kmp-azure-5.3.18-150300.38.80.1.x86_64"
                }
              },
              {
                "category": "product_version",
                "name": "gfs2-kmp-azure-5.3.18-150300.38.80.1.x86_64",
                "product": {
                  "name": "gfs2-kmp-azure-5.3.18-150300.38.80.1.x86_64",
                  "product_id": "gfs2-kmp-azure-5.3.18-150300.38.80.1.x86_64"
                }
              },
              {
                "category": "product_version",
                "name": "kernel-azure-5.3.18-150300.38.80.1.x86_64",
                "product": {
                  "name": "kernel-azure-5.3.18-150300.38.80.1.x86_64",
                  "product_id": "kernel-azure-5.3.18-150300.38.80.1.x86_64"
                }
              },
              {
                "category": "product_version",
                "name": "kernel-azure-devel-5.3.18-150300.38.80.1.x86_64",
                "product": {
                  "name": "kernel-azure-devel-5.3.18-150300.38.80.1.x86_64",
                  "product_id": "kernel-azure-devel-5.3.18-150300.38.80.1.x86_64"
                }
              },
              {
                "category": "product_version",
                "name": "kernel-azure-extra-5.3.18-150300.38.80.1.x86_64",
                "product": {
                  "name": "kernel-azure-extra-5.3.18-150300.38.80.1.x86_64",
                  "product_id": "kernel-azure-extra-5.3.18-150300.38.80.1.x86_64"
                }
              },
              {
                "category": "product_version",
                "name": "kernel-azure-livepatch-devel-5.3.18-150300.38.80.1.x86_64",
                "product": {
                  "name": "kernel-azure-livepatch-devel-5.3.18-150300.38.80.1.x86_64",
                  "product_id": "kernel-azure-livepatch-devel-5.3.18-150300.38.80.1.x86_64"
                }
              },
              {
                "category": "product_version",
                "name": "kernel-azure-optional-5.3.18-150300.38.80.1.x86_64",
                "product": {
                  "name": "kernel-azure-optional-5.3.18-150300.38.80.1.x86_64",
                  "product_id": "kernel-azure-optional-5.3.18-150300.38.80.1.x86_64"
                }
              },
              {
                "category": "product_version",
                "name": "kernel-syms-azure-5.3.18-150300.38.80.1.x86_64",
                "product": {
                  "name": "kernel-syms-azure-5.3.18-150300.38.80.1.x86_64",
                  "product_id": "kernel-syms-azure-5.3.18-150300.38.80.1.x86_64"
                }
              },
              {
                "category": "product_version",
                "name": "kselftests-kmp-azure-5.3.18-150300.38.80.1.x86_64",
                "product": {
                  "name": "kselftests-kmp-azure-5.3.18-150300.38.80.1.x86_64",
                  "product_id": "kselftests-kmp-azure-5.3.18-150300.38.80.1.x86_64"
                }
              },
              {
                "category": "product_version",
                "name": "ocfs2-kmp-azure-5.3.18-150300.38.80.1.x86_64",
                "product": {
                  "name": "ocfs2-kmp-azure-5.3.18-150300.38.80.1.x86_64",
                  "product_id": "ocfs2-kmp-azure-5.3.18-150300.38.80.1.x86_64"
                }
              },
              {
                "category": "product_version",
                "name": "reiserfs-kmp-azure-5.3.18-150300.38.80.1.x86_64",
                "product": {
                  "name": "reiserfs-kmp-azure-5.3.18-150300.38.80.1.x86_64",
                  "product_id": "reiserfs-kmp-azure-5.3.18-150300.38.80.1.x86_64"
                }
              }
            ],
            "category": "architecture",
            "name": "x86_64"
          },
          {
            "branches": [
              {
                "category": "product_name",
                "name": "SUSE Linux Enterprise Module for Public Cloud 15 SP3",
                "product": {
                  "name": "SUSE Linux Enterprise Module for Public Cloud 15 SP3",
                  "product_id": "SUSE Linux Enterprise Module for Public Cloud 15 SP3",
                  "product_identification_helper": {
                    "cpe": "cpe:/o:suse:sle-module-public-cloud:15:sp3"
                  }
                }
              },
              {
                "category": "product_name",
                "name": "openSUSE Leap 15.3",
                "product": {
                  "name": "openSUSE Leap 15.3",
                  "product_id": "openSUSE Leap 15.3",
                  "product_identification_helper": {
                    "cpe": "cpe:/o:opensuse:leap:15.3"
                  }
                }
              }
            ],
            "category": "product_family",
            "name": "SUSE Linux Enterprise"
          }
        ],
        "category": "vendor",
        "name": "SUSE"
      }
    ],
    "relationships": [
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-azure-5.3.18-150300.38.80.1.x86_64 as component of SUSE Linux Enterprise Module for Public Cloud 15 SP3",
          "product_id": "SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-azure-5.3.18-150300.38.80.1.x86_64"
        },
        "product_reference": "kernel-azure-5.3.18-150300.38.80.1.x86_64",
        "relates_to_product_reference": "SUSE Linux Enterprise Module for Public Cloud 15 SP3"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-azure-devel-5.3.18-150300.38.80.1.x86_64 as component of SUSE Linux Enterprise Module for Public Cloud 15 SP3",
          "product_id": "SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-azure-devel-5.3.18-150300.38.80.1.x86_64"
        },
        "product_reference": "kernel-azure-devel-5.3.18-150300.38.80.1.x86_64",
        "relates_to_product_reference": "SUSE Linux Enterprise Module for Public Cloud 15 SP3"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-devel-azure-5.3.18-150300.38.80.1.noarch as component of SUSE Linux Enterprise Module for Public Cloud 15 SP3",
          "product_id": "SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-devel-azure-5.3.18-150300.38.80.1.noarch"
        },
        "product_reference": "kernel-devel-azure-5.3.18-150300.38.80.1.noarch",
        "relates_to_product_reference": "SUSE Linux Enterprise Module for Public Cloud 15 SP3"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-source-azure-5.3.18-150300.38.80.1.noarch as component of SUSE Linux Enterprise Module for Public Cloud 15 SP3",
          "product_id": "SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-source-azure-5.3.18-150300.38.80.1.noarch"
        },
        "product_reference": "kernel-source-azure-5.3.18-150300.38.80.1.noarch",
        "relates_to_product_reference": "SUSE Linux Enterprise Module for Public Cloud 15 SP3"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-syms-azure-5.3.18-150300.38.80.1.x86_64 as component of SUSE Linux Enterprise Module for Public Cloud 15 SP3",
          "product_id": "SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-syms-azure-5.3.18-150300.38.80.1.x86_64"
        },
        "product_reference": "kernel-syms-azure-5.3.18-150300.38.80.1.x86_64",
        "relates_to_product_reference": "SUSE Linux Enterprise Module for Public Cloud 15 SP3"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "cluster-md-kmp-azure-5.3.18-150300.38.80.1.x86_64 as component of openSUSE Leap 15.3",
          "product_id": "openSUSE Leap 15.3:cluster-md-kmp-azure-5.3.18-150300.38.80.1.x86_64"
        },
        "product_reference": "cluster-md-kmp-azure-5.3.18-150300.38.80.1.x86_64",
        "relates_to_product_reference": "openSUSE Leap 15.3"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "dlm-kmp-azure-5.3.18-150300.38.80.1.x86_64 as component of openSUSE Leap 15.3",
          "product_id": "openSUSE Leap 15.3:dlm-kmp-azure-5.3.18-150300.38.80.1.x86_64"
        },
        "product_reference": "dlm-kmp-azure-5.3.18-150300.38.80.1.x86_64",
        "relates_to_product_reference": "openSUSE Leap 15.3"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "gfs2-kmp-azure-5.3.18-150300.38.80.1.x86_64 as component of openSUSE Leap 15.3",
          "product_id": "openSUSE Leap 15.3:gfs2-kmp-azure-5.3.18-150300.38.80.1.x86_64"
        },
        "product_reference": "gfs2-kmp-azure-5.3.18-150300.38.80.1.x86_64",
        "relates_to_product_reference": "openSUSE Leap 15.3"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-azure-5.3.18-150300.38.80.1.x86_64 as component of openSUSE Leap 15.3",
          "product_id": "openSUSE Leap 15.3:kernel-azure-5.3.18-150300.38.80.1.x86_64"
        },
        "product_reference": "kernel-azure-5.3.18-150300.38.80.1.x86_64",
        "relates_to_product_reference": "openSUSE Leap 15.3"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-azure-devel-5.3.18-150300.38.80.1.x86_64 as component of openSUSE Leap 15.3",
          "product_id": "openSUSE Leap 15.3:kernel-azure-devel-5.3.18-150300.38.80.1.x86_64"
        },
        "product_reference": "kernel-azure-devel-5.3.18-150300.38.80.1.x86_64",
        "relates_to_product_reference": "openSUSE Leap 15.3"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-azure-extra-5.3.18-150300.38.80.1.x86_64 as component of openSUSE Leap 15.3",
          "product_id": "openSUSE Leap 15.3:kernel-azure-extra-5.3.18-150300.38.80.1.x86_64"
        },
        "product_reference": "kernel-azure-extra-5.3.18-150300.38.80.1.x86_64",
        "relates_to_product_reference": "openSUSE Leap 15.3"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-azure-livepatch-devel-5.3.18-150300.38.80.1.x86_64 as component of openSUSE Leap 15.3",
          "product_id": "openSUSE Leap 15.3:kernel-azure-livepatch-devel-5.3.18-150300.38.80.1.x86_64"
        },
        "product_reference": "kernel-azure-livepatch-devel-5.3.18-150300.38.80.1.x86_64",
        "relates_to_product_reference": "openSUSE Leap 15.3"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-azure-optional-5.3.18-150300.38.80.1.x86_64 as component of openSUSE Leap 15.3",
          "product_id": "openSUSE Leap 15.3:kernel-azure-optional-5.3.18-150300.38.80.1.x86_64"
        },
        "product_reference": "kernel-azure-optional-5.3.18-150300.38.80.1.x86_64",
        "relates_to_product_reference": "openSUSE Leap 15.3"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-devel-azure-5.3.18-150300.38.80.1.noarch as component of openSUSE Leap 15.3",
          "product_id": "openSUSE Leap 15.3:kernel-devel-azure-5.3.18-150300.38.80.1.noarch"
        },
        "product_reference": "kernel-devel-azure-5.3.18-150300.38.80.1.noarch",
        "relates_to_product_reference": "openSUSE Leap 15.3"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-source-azure-5.3.18-150300.38.80.1.noarch as component of openSUSE Leap 15.3",
          "product_id": "openSUSE Leap 15.3:kernel-source-azure-5.3.18-150300.38.80.1.noarch"
        },
        "product_reference": "kernel-source-azure-5.3.18-150300.38.80.1.noarch",
        "relates_to_product_reference": "openSUSE Leap 15.3"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-syms-azure-5.3.18-150300.38.80.1.x86_64 as component of openSUSE Leap 15.3",
          "product_id": "openSUSE Leap 15.3:kernel-syms-azure-5.3.18-150300.38.80.1.x86_64"
        },
        "product_reference": "kernel-syms-azure-5.3.18-150300.38.80.1.x86_64",
        "relates_to_product_reference": "openSUSE Leap 15.3"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kselftests-kmp-azure-5.3.18-150300.38.80.1.x86_64 as component of openSUSE Leap 15.3",
          "product_id": "openSUSE Leap 15.3:kselftests-kmp-azure-5.3.18-150300.38.80.1.x86_64"
        },
        "product_reference": "kselftests-kmp-azure-5.3.18-150300.38.80.1.x86_64",
        "relates_to_product_reference": "openSUSE Leap 15.3"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "ocfs2-kmp-azure-5.3.18-150300.38.80.1.x86_64 as component of openSUSE Leap 15.3",
          "product_id": "openSUSE Leap 15.3:ocfs2-kmp-azure-5.3.18-150300.38.80.1.x86_64"
        },
        "product_reference": "ocfs2-kmp-azure-5.3.18-150300.38.80.1.x86_64",
        "relates_to_product_reference": "openSUSE Leap 15.3"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "reiserfs-kmp-azure-5.3.18-150300.38.80.1.x86_64 as component of openSUSE Leap 15.3",
          "product_id": "openSUSE Leap 15.3:reiserfs-kmp-azure-5.3.18-150300.38.80.1.x86_64"
        },
        "product_reference": "reiserfs-kmp-azure-5.3.18-150300.38.80.1.x86_64",
        "relates_to_product_reference": "openSUSE Leap 15.3"
      }
    ]
  },
  "vulnerabilities": [
    {
      "cve": "CVE-2016-3695",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2016-3695"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "The einj_error_inject function in drivers/acpi/apei/einj.c in the Linux kernel allows local users to simulate hardware errors and consequently cause a denial of service by leveraging failure to disable APEI error injection through EINJ when securelevel is set.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-azure-5.3.18-150300.38.80.1.x86_64",
          "SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-azure-devel-5.3.18-150300.38.80.1.x86_64",
          "SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-devel-azure-5.3.18-150300.38.80.1.noarch",
          "SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-source-azure-5.3.18-150300.38.80.1.noarch",
          "SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-syms-azure-5.3.18-150300.38.80.1.x86_64",
          "openSUSE Leap 15.3:cluster-md-kmp-azure-5.3.18-150300.38.80.1.x86_64",
          "openSUSE Leap 15.3:dlm-kmp-azure-5.3.18-150300.38.80.1.x86_64",
          "openSUSE Leap 15.3:gfs2-kmp-azure-5.3.18-150300.38.80.1.x86_64",
          "openSUSE Leap 15.3:kernel-azure-5.3.18-150300.38.80.1.x86_64",
          "openSUSE Leap 15.3:kernel-azure-devel-5.3.18-150300.38.80.1.x86_64",
          "openSUSE Leap 15.3:kernel-azure-extra-5.3.18-150300.38.80.1.x86_64",
          "openSUSE Leap 15.3:kernel-azure-livepatch-devel-5.3.18-150300.38.80.1.x86_64",
          "openSUSE Leap 15.3:kernel-azure-optional-5.3.18-150300.38.80.1.x86_64",
          "openSUSE Leap 15.3:kernel-devel-azure-5.3.18-150300.38.80.1.noarch",
          "openSUSE Leap 15.3:kernel-source-azure-5.3.18-150300.38.80.1.noarch",
          "openSUSE Leap 15.3:kernel-syms-azure-5.3.18-150300.38.80.1.x86_64",
          "openSUSE Leap 15.3:kselftests-kmp-azure-5.3.18-150300.38.80.1.x86_64",
          "openSUSE Leap 15.3:ocfs2-kmp-azure-5.3.18-150300.38.80.1.x86_64",
          "openSUSE Leap 15.3:reiserfs-kmp-azure-5.3.18-150300.38.80.1.x86_64"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2016-3695",
          "url": "https://www.suse.com/security/cve/CVE-2016-3695"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1023051 for CVE-2016-3695",
          "url": "https://bugzilla.suse.com/1023051"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-azure-5.3.18-150300.38.80.1.x86_64",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-azure-devel-5.3.18-150300.38.80.1.x86_64",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-devel-azure-5.3.18-150300.38.80.1.noarch",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-source-azure-5.3.18-150300.38.80.1.noarch",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-syms-azure-5.3.18-150300.38.80.1.x86_64",
            "openSUSE Leap 15.3:cluster-md-kmp-azure-5.3.18-150300.38.80.1.x86_64",
            "openSUSE Leap 15.3:dlm-kmp-azure-5.3.18-150300.38.80.1.x86_64",
            "openSUSE Leap 15.3:gfs2-kmp-azure-5.3.18-150300.38.80.1.x86_64",
            "openSUSE Leap 15.3:kernel-azure-5.3.18-150300.38.80.1.x86_64",
            "openSUSE Leap 15.3:kernel-azure-devel-5.3.18-150300.38.80.1.x86_64",
            "openSUSE Leap 15.3:kernel-azure-extra-5.3.18-150300.38.80.1.x86_64",
            "openSUSE Leap 15.3:kernel-azure-livepatch-devel-5.3.18-150300.38.80.1.x86_64",
            "openSUSE Leap 15.3:kernel-azure-optional-5.3.18-150300.38.80.1.x86_64",
            "openSUSE Leap 15.3:kernel-devel-azure-5.3.18-150300.38.80.1.noarch",
            "openSUSE Leap 15.3:kernel-source-azure-5.3.18-150300.38.80.1.noarch",
            "openSUSE Leap 15.3:kernel-syms-azure-5.3.18-150300.38.80.1.x86_64",
            "openSUSE Leap 15.3:kselftests-kmp-azure-5.3.18-150300.38.80.1.x86_64",
            "openSUSE Leap 15.3:ocfs2-kmp-azure-5.3.18-150300.38.80.1.x86_64",
            "openSUSE Leap 15.3:reiserfs-kmp-azure-5.3.18-150300.38.80.1.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 2.2,
            "baseSeverity": "LOW",
            "vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:R/S:U/C:N/I:N/A:L",
            "version": "3.1"
          },
          "products": [
            "SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-azure-5.3.18-150300.38.80.1.x86_64",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-azure-devel-5.3.18-150300.38.80.1.x86_64",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-devel-azure-5.3.18-150300.38.80.1.noarch",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-source-azure-5.3.18-150300.38.80.1.noarch",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-syms-azure-5.3.18-150300.38.80.1.x86_64",
            "openSUSE Leap 15.3:cluster-md-kmp-azure-5.3.18-150300.38.80.1.x86_64",
            "openSUSE Leap 15.3:dlm-kmp-azure-5.3.18-150300.38.80.1.x86_64",
            "openSUSE Leap 15.3:gfs2-kmp-azure-5.3.18-150300.38.80.1.x86_64",
            "openSUSE Leap 15.3:kernel-azure-5.3.18-150300.38.80.1.x86_64",
            "openSUSE Leap 15.3:kernel-azure-devel-5.3.18-150300.38.80.1.x86_64",
            "openSUSE Leap 15.3:kernel-azure-extra-5.3.18-150300.38.80.1.x86_64",
            "openSUSE Leap 15.3:kernel-azure-livepatch-devel-5.3.18-150300.38.80.1.x86_64",
            "openSUSE Leap 15.3:kernel-azure-optional-5.3.18-150300.38.80.1.x86_64",
            "openSUSE Leap 15.3:kernel-devel-azure-5.3.18-150300.38.80.1.noarch",
            "openSUSE Leap 15.3:kernel-source-azure-5.3.18-150300.38.80.1.noarch",
            "openSUSE Leap 15.3:kernel-syms-azure-5.3.18-150300.38.80.1.x86_64",
            "openSUSE Leap 15.3:kselftests-kmp-azure-5.3.18-150300.38.80.1.x86_64",
            "openSUSE Leap 15.3:ocfs2-kmp-azure-5.3.18-150300.38.80.1.x86_64",
            "openSUSE Leap 15.3:reiserfs-kmp-azure-5.3.18-150300.38.80.1.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2022-10-18T09:44:53Z",
          "details": "low"
        }
      ],
      "title": "CVE-2016-3695"
    },
    {
      "cve": "CVE-2020-16119",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2020-16119"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "Use-after-free vulnerability in the Linux kernel exploitable by a local attacker due to reuse of a DCCP socket with an attached dccps_hc_tx_ccid object as a listener after being released. Fixed in Ubuntu Linux kernel 5.4.0-51.56, 5.3.0-68.63, 4.15.0-121.123, 4.4.0-193.224, 3.13.0.182.191 and 3.2.0-149.196.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-azure-5.3.18-150300.38.80.1.x86_64",
          "SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-azure-devel-5.3.18-150300.38.80.1.x86_64",
          "SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-devel-azure-5.3.18-150300.38.80.1.noarch",
          "SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-source-azure-5.3.18-150300.38.80.1.noarch",
          "SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-syms-azure-5.3.18-150300.38.80.1.x86_64",
          "openSUSE Leap 15.3:cluster-md-kmp-azure-5.3.18-150300.38.80.1.x86_64",
          "openSUSE Leap 15.3:dlm-kmp-azure-5.3.18-150300.38.80.1.x86_64",
          "openSUSE Leap 15.3:gfs2-kmp-azure-5.3.18-150300.38.80.1.x86_64",
          "openSUSE Leap 15.3:kernel-azure-5.3.18-150300.38.80.1.x86_64",
          "openSUSE Leap 15.3:kernel-azure-devel-5.3.18-150300.38.80.1.x86_64",
          "openSUSE Leap 15.3:kernel-azure-extra-5.3.18-150300.38.80.1.x86_64",
          "openSUSE Leap 15.3:kernel-azure-livepatch-devel-5.3.18-150300.38.80.1.x86_64",
          "openSUSE Leap 15.3:kernel-azure-optional-5.3.18-150300.38.80.1.x86_64",
          "openSUSE Leap 15.3:kernel-devel-azure-5.3.18-150300.38.80.1.noarch",
          "openSUSE Leap 15.3:kernel-source-azure-5.3.18-150300.38.80.1.noarch",
          "openSUSE Leap 15.3:kernel-syms-azure-5.3.18-150300.38.80.1.x86_64",
          "openSUSE Leap 15.3:kselftests-kmp-azure-5.3.18-150300.38.80.1.x86_64",
          "openSUSE Leap 15.3:ocfs2-kmp-azure-5.3.18-150300.38.80.1.x86_64",
          "openSUSE Leap 15.3:reiserfs-kmp-azure-5.3.18-150300.38.80.1.x86_64"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2020-16119",
          "url": "https://www.suse.com/security/cve/CVE-2020-16119"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1177471 for CVE-2020-16119",
          "url": "https://bugzilla.suse.com/1177471"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1177742 for CVE-2020-16119",
          "url": "https://bugzilla.suse.com/1177742"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-azure-5.3.18-150300.38.80.1.x86_64",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-azure-devel-5.3.18-150300.38.80.1.x86_64",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-devel-azure-5.3.18-150300.38.80.1.noarch",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-source-azure-5.3.18-150300.38.80.1.noarch",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-syms-azure-5.3.18-150300.38.80.1.x86_64",
            "openSUSE Leap 15.3:cluster-md-kmp-azure-5.3.18-150300.38.80.1.x86_64",
            "openSUSE Leap 15.3:dlm-kmp-azure-5.3.18-150300.38.80.1.x86_64",
            "openSUSE Leap 15.3:gfs2-kmp-azure-5.3.18-150300.38.80.1.x86_64",
            "openSUSE Leap 15.3:kernel-azure-5.3.18-150300.38.80.1.x86_64",
            "openSUSE Leap 15.3:kernel-azure-devel-5.3.18-150300.38.80.1.x86_64",
            "openSUSE Leap 15.3:kernel-azure-extra-5.3.18-150300.38.80.1.x86_64",
            "openSUSE Leap 15.3:kernel-azure-livepatch-devel-5.3.18-150300.38.80.1.x86_64",
            "openSUSE Leap 15.3:kernel-azure-optional-5.3.18-150300.38.80.1.x86_64",
            "openSUSE Leap 15.3:kernel-devel-azure-5.3.18-150300.38.80.1.noarch",
            "openSUSE Leap 15.3:kernel-source-azure-5.3.18-150300.38.80.1.noarch",
            "openSUSE Leap 15.3:kernel-syms-azure-5.3.18-150300.38.80.1.x86_64",
            "openSUSE Leap 15.3:kselftests-kmp-azure-5.3.18-150300.38.80.1.x86_64",
            "openSUSE Leap 15.3:ocfs2-kmp-azure-5.3.18-150300.38.80.1.x86_64",
            "openSUSE Leap 15.3:reiserfs-kmp-azure-5.3.18-150300.38.80.1.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 7.8,
            "baseSeverity": "HIGH",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
            "version": "3.1"
          },
          "products": [
            "SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-azure-5.3.18-150300.38.80.1.x86_64",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-azure-devel-5.3.18-150300.38.80.1.x86_64",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-devel-azure-5.3.18-150300.38.80.1.noarch",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-source-azure-5.3.18-150300.38.80.1.noarch",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-syms-azure-5.3.18-150300.38.80.1.x86_64",
            "openSUSE Leap 15.3:cluster-md-kmp-azure-5.3.18-150300.38.80.1.x86_64",
            "openSUSE Leap 15.3:dlm-kmp-azure-5.3.18-150300.38.80.1.x86_64",
            "openSUSE Leap 15.3:gfs2-kmp-azure-5.3.18-150300.38.80.1.x86_64",
            "openSUSE Leap 15.3:kernel-azure-5.3.18-150300.38.80.1.x86_64",
            "openSUSE Leap 15.3:kernel-azure-devel-5.3.18-150300.38.80.1.x86_64",
            "openSUSE Leap 15.3:kernel-azure-extra-5.3.18-150300.38.80.1.x86_64",
            "openSUSE Leap 15.3:kernel-azure-livepatch-devel-5.3.18-150300.38.80.1.x86_64",
            "openSUSE Leap 15.3:kernel-azure-optional-5.3.18-150300.38.80.1.x86_64",
            "openSUSE Leap 15.3:kernel-devel-azure-5.3.18-150300.38.80.1.noarch",
            "openSUSE Leap 15.3:kernel-source-azure-5.3.18-150300.38.80.1.noarch",
            "openSUSE Leap 15.3:kernel-syms-azure-5.3.18-150300.38.80.1.x86_64",
            "openSUSE Leap 15.3:kselftests-kmp-azure-5.3.18-150300.38.80.1.x86_64",
            "openSUSE Leap 15.3:ocfs2-kmp-azure-5.3.18-150300.38.80.1.x86_64",
            "openSUSE Leap 15.3:reiserfs-kmp-azure-5.3.18-150300.38.80.1.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2022-10-18T09:44:53Z",
          "details": "important"
        }
      ],
      "title": "CVE-2020-16119"
    },
    {
      "cve": "CVE-2020-27784",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2020-27784"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "A vulnerability was found in the Linux kernel, where accessing a deallocated instance in printer_ioctl() printer_ioctl() tries to access of a printer_dev instance. However, use-after-free arises because it had been freed by gprinter_free().",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-azure-5.3.18-150300.38.80.1.x86_64",
          "SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-azure-devel-5.3.18-150300.38.80.1.x86_64",
          "SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-devel-azure-5.3.18-150300.38.80.1.noarch",
          "SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-source-azure-5.3.18-150300.38.80.1.noarch",
          "SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-syms-azure-5.3.18-150300.38.80.1.x86_64",
          "openSUSE Leap 15.3:cluster-md-kmp-azure-5.3.18-150300.38.80.1.x86_64",
          "openSUSE Leap 15.3:dlm-kmp-azure-5.3.18-150300.38.80.1.x86_64",
          "openSUSE Leap 15.3:gfs2-kmp-azure-5.3.18-150300.38.80.1.x86_64",
          "openSUSE Leap 15.3:kernel-azure-5.3.18-150300.38.80.1.x86_64",
          "openSUSE Leap 15.3:kernel-azure-devel-5.3.18-150300.38.80.1.x86_64",
          "openSUSE Leap 15.3:kernel-azure-extra-5.3.18-150300.38.80.1.x86_64",
          "openSUSE Leap 15.3:kernel-azure-livepatch-devel-5.3.18-150300.38.80.1.x86_64",
          "openSUSE Leap 15.3:kernel-azure-optional-5.3.18-150300.38.80.1.x86_64",
          "openSUSE Leap 15.3:kernel-devel-azure-5.3.18-150300.38.80.1.noarch",
          "openSUSE Leap 15.3:kernel-source-azure-5.3.18-150300.38.80.1.noarch",
          "openSUSE Leap 15.3:kernel-syms-azure-5.3.18-150300.38.80.1.x86_64",
          "openSUSE Leap 15.3:kselftests-kmp-azure-5.3.18-150300.38.80.1.x86_64",
          "openSUSE Leap 15.3:ocfs2-kmp-azure-5.3.18-150300.38.80.1.x86_64",
          "openSUSE Leap 15.3:reiserfs-kmp-azure-5.3.18-150300.38.80.1.x86_64"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2020-27784",
          "url": "https://www.suse.com/security/cve/CVE-2020-27784"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1202895 for CVE-2020-27784",
          "url": "https://bugzilla.suse.com/1202895"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-azure-5.3.18-150300.38.80.1.x86_64",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-azure-devel-5.3.18-150300.38.80.1.x86_64",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-devel-azure-5.3.18-150300.38.80.1.noarch",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-source-azure-5.3.18-150300.38.80.1.noarch",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-syms-azure-5.3.18-150300.38.80.1.x86_64",
            "openSUSE Leap 15.3:cluster-md-kmp-azure-5.3.18-150300.38.80.1.x86_64",
            "openSUSE Leap 15.3:dlm-kmp-azure-5.3.18-150300.38.80.1.x86_64",
            "openSUSE Leap 15.3:gfs2-kmp-azure-5.3.18-150300.38.80.1.x86_64",
            "openSUSE Leap 15.3:kernel-azure-5.3.18-150300.38.80.1.x86_64",
            "openSUSE Leap 15.3:kernel-azure-devel-5.3.18-150300.38.80.1.x86_64",
            "openSUSE Leap 15.3:kernel-azure-extra-5.3.18-150300.38.80.1.x86_64",
            "openSUSE Leap 15.3:kernel-azure-livepatch-devel-5.3.18-150300.38.80.1.x86_64",
            "openSUSE Leap 15.3:kernel-azure-optional-5.3.18-150300.38.80.1.x86_64",
            "openSUSE Leap 15.3:kernel-devel-azure-5.3.18-150300.38.80.1.noarch",
            "openSUSE Leap 15.3:kernel-source-azure-5.3.18-150300.38.80.1.noarch",
            "openSUSE Leap 15.3:kernel-syms-azure-5.3.18-150300.38.80.1.x86_64",
            "openSUSE Leap 15.3:kselftests-kmp-azure-5.3.18-150300.38.80.1.x86_64",
            "openSUSE Leap 15.3:ocfs2-kmp-azure-5.3.18-150300.38.80.1.x86_64",
            "openSUSE Leap 15.3:reiserfs-kmp-azure-5.3.18-150300.38.80.1.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 4,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:L/AC:H/PR:H/UI:R/S:U/C:N/I:N/A:H",
            "version": "3.1"
          },
          "products": [
            "SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-azure-5.3.18-150300.38.80.1.x86_64",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-azure-devel-5.3.18-150300.38.80.1.x86_64",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-devel-azure-5.3.18-150300.38.80.1.noarch",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-source-azure-5.3.18-150300.38.80.1.noarch",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-syms-azure-5.3.18-150300.38.80.1.x86_64",
            "openSUSE Leap 15.3:cluster-md-kmp-azure-5.3.18-150300.38.80.1.x86_64",
            "openSUSE Leap 15.3:dlm-kmp-azure-5.3.18-150300.38.80.1.x86_64",
            "openSUSE Leap 15.3:gfs2-kmp-azure-5.3.18-150300.38.80.1.x86_64",
            "openSUSE Leap 15.3:kernel-azure-5.3.18-150300.38.80.1.x86_64",
            "openSUSE Leap 15.3:kernel-azure-devel-5.3.18-150300.38.80.1.x86_64",
            "openSUSE Leap 15.3:kernel-azure-extra-5.3.18-150300.38.80.1.x86_64",
            "openSUSE Leap 15.3:kernel-azure-livepatch-devel-5.3.18-150300.38.80.1.x86_64",
            "openSUSE Leap 15.3:kernel-azure-optional-5.3.18-150300.38.80.1.x86_64",
            "openSUSE Leap 15.3:kernel-devel-azure-5.3.18-150300.38.80.1.noarch",
            "openSUSE Leap 15.3:kernel-source-azure-5.3.18-150300.38.80.1.noarch",
            "openSUSE Leap 15.3:kernel-syms-azure-5.3.18-150300.38.80.1.x86_64",
            "openSUSE Leap 15.3:kselftests-kmp-azure-5.3.18-150300.38.80.1.x86_64",
            "openSUSE Leap 15.3:ocfs2-kmp-azure-5.3.18-150300.38.80.1.x86_64",
            "openSUSE Leap 15.3:reiserfs-kmp-azure-5.3.18-150300.38.80.1.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2022-10-18T09:44:53Z",
          "details": "low"
        }
      ],
      "title": "CVE-2020-27784"
    },
    {
      "cve": "CVE-2020-36516",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2020-36516"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "An issue was discovered in the Linux kernel through 5.16.11. The mixed IPID assignment method with the hash-based IPID assignment policy allows an off-path attacker to inject data into a victim\u0027s TCP session or terminate that session.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-azure-5.3.18-150300.38.80.1.x86_64",
          "SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-azure-devel-5.3.18-150300.38.80.1.x86_64",
          "SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-devel-azure-5.3.18-150300.38.80.1.noarch",
          "SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-source-azure-5.3.18-150300.38.80.1.noarch",
          "SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-syms-azure-5.3.18-150300.38.80.1.x86_64",
          "openSUSE Leap 15.3:cluster-md-kmp-azure-5.3.18-150300.38.80.1.x86_64",
          "openSUSE Leap 15.3:dlm-kmp-azure-5.3.18-150300.38.80.1.x86_64",
          "openSUSE Leap 15.3:gfs2-kmp-azure-5.3.18-150300.38.80.1.x86_64",
          "openSUSE Leap 15.3:kernel-azure-5.3.18-150300.38.80.1.x86_64",
          "openSUSE Leap 15.3:kernel-azure-devel-5.3.18-150300.38.80.1.x86_64",
          "openSUSE Leap 15.3:kernel-azure-extra-5.3.18-150300.38.80.1.x86_64",
          "openSUSE Leap 15.3:kernel-azure-livepatch-devel-5.3.18-150300.38.80.1.x86_64",
          "openSUSE Leap 15.3:kernel-azure-optional-5.3.18-150300.38.80.1.x86_64",
          "openSUSE Leap 15.3:kernel-devel-azure-5.3.18-150300.38.80.1.noarch",
          "openSUSE Leap 15.3:kernel-source-azure-5.3.18-150300.38.80.1.noarch",
          "openSUSE Leap 15.3:kernel-syms-azure-5.3.18-150300.38.80.1.x86_64",
          "openSUSE Leap 15.3:kselftests-kmp-azure-5.3.18-150300.38.80.1.x86_64",
          "openSUSE Leap 15.3:ocfs2-kmp-azure-5.3.18-150300.38.80.1.x86_64",
          "openSUSE Leap 15.3:reiserfs-kmp-azure-5.3.18-150300.38.80.1.x86_64"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2020-36516",
          "url": "https://www.suse.com/security/cve/CVE-2020-36516"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1196616 for CVE-2020-36516",
          "url": "https://bugzilla.suse.com/1196616"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1196867 for CVE-2020-36516",
          "url": "https://bugzilla.suse.com/1196867"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1204092 for CVE-2020-36516",
          "url": "https://bugzilla.suse.com/1204092"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1204183 for CVE-2020-36516",
          "url": "https://bugzilla.suse.com/1204183"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-azure-5.3.18-150300.38.80.1.x86_64",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-azure-devel-5.3.18-150300.38.80.1.x86_64",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-devel-azure-5.3.18-150300.38.80.1.noarch",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-source-azure-5.3.18-150300.38.80.1.noarch",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-syms-azure-5.3.18-150300.38.80.1.x86_64",
            "openSUSE Leap 15.3:cluster-md-kmp-azure-5.3.18-150300.38.80.1.x86_64",
            "openSUSE Leap 15.3:dlm-kmp-azure-5.3.18-150300.38.80.1.x86_64",
            "openSUSE Leap 15.3:gfs2-kmp-azure-5.3.18-150300.38.80.1.x86_64",
            "openSUSE Leap 15.3:kernel-azure-5.3.18-150300.38.80.1.x86_64",
            "openSUSE Leap 15.3:kernel-azure-devel-5.3.18-150300.38.80.1.x86_64",
            "openSUSE Leap 15.3:kernel-azure-extra-5.3.18-150300.38.80.1.x86_64",
            "openSUSE Leap 15.3:kernel-azure-livepatch-devel-5.3.18-150300.38.80.1.x86_64",
            "openSUSE Leap 15.3:kernel-azure-optional-5.3.18-150300.38.80.1.x86_64",
            "openSUSE Leap 15.3:kernel-devel-azure-5.3.18-150300.38.80.1.noarch",
            "openSUSE Leap 15.3:kernel-source-azure-5.3.18-150300.38.80.1.noarch",
            "openSUSE Leap 15.3:kernel-syms-azure-5.3.18-150300.38.80.1.x86_64",
            "openSUSE Leap 15.3:kselftests-kmp-azure-5.3.18-150300.38.80.1.x86_64",
            "openSUSE Leap 15.3:ocfs2-kmp-azure-5.3.18-150300.38.80.1.x86_64",
            "openSUSE Leap 15.3:reiserfs-kmp-azure-5.3.18-150300.38.80.1.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 8.1,
            "baseSeverity": "HIGH",
            "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:H",
            "version": "3.1"
          },
          "products": [
            "SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-azure-5.3.18-150300.38.80.1.x86_64",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-azure-devel-5.3.18-150300.38.80.1.x86_64",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-devel-azure-5.3.18-150300.38.80.1.noarch",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-source-azure-5.3.18-150300.38.80.1.noarch",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-syms-azure-5.3.18-150300.38.80.1.x86_64",
            "openSUSE Leap 15.3:cluster-md-kmp-azure-5.3.18-150300.38.80.1.x86_64",
            "openSUSE Leap 15.3:dlm-kmp-azure-5.3.18-150300.38.80.1.x86_64",
            "openSUSE Leap 15.3:gfs2-kmp-azure-5.3.18-150300.38.80.1.x86_64",
            "openSUSE Leap 15.3:kernel-azure-5.3.18-150300.38.80.1.x86_64",
            "openSUSE Leap 15.3:kernel-azure-devel-5.3.18-150300.38.80.1.x86_64",
            "openSUSE Leap 15.3:kernel-azure-extra-5.3.18-150300.38.80.1.x86_64",
            "openSUSE Leap 15.3:kernel-azure-livepatch-devel-5.3.18-150300.38.80.1.x86_64",
            "openSUSE Leap 15.3:kernel-azure-optional-5.3.18-150300.38.80.1.x86_64",
            "openSUSE Leap 15.3:kernel-devel-azure-5.3.18-150300.38.80.1.noarch",
            "openSUSE Leap 15.3:kernel-source-azure-5.3.18-150300.38.80.1.noarch",
            "openSUSE Leap 15.3:kernel-syms-azure-5.3.18-150300.38.80.1.x86_64",
            "openSUSE Leap 15.3:kselftests-kmp-azure-5.3.18-150300.38.80.1.x86_64",
            "openSUSE Leap 15.3:ocfs2-kmp-azure-5.3.18-150300.38.80.1.x86_64",
            "openSUSE Leap 15.3:reiserfs-kmp-azure-5.3.18-150300.38.80.1.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2022-10-18T09:44:53Z",
          "details": "important"
        }
      ],
      "title": "CVE-2020-36516"
    },
    {
      "cve": "CVE-2021-4155",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2021-4155"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "A data leak flaw was found in the way XFS_IOC_ALLOCSP IOCTL in the XFS filesystem allowed for size increase of files with unaligned size. A local attacker could use this flaw to leak data on the XFS filesystem otherwise not accessible to them.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-azure-5.3.18-150300.38.80.1.x86_64",
          "SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-azure-devel-5.3.18-150300.38.80.1.x86_64",
          "SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-devel-azure-5.3.18-150300.38.80.1.noarch",
          "SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-source-azure-5.3.18-150300.38.80.1.noarch",
          "SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-syms-azure-5.3.18-150300.38.80.1.x86_64",
          "openSUSE Leap 15.3:cluster-md-kmp-azure-5.3.18-150300.38.80.1.x86_64",
          "openSUSE Leap 15.3:dlm-kmp-azure-5.3.18-150300.38.80.1.x86_64",
          "openSUSE Leap 15.3:gfs2-kmp-azure-5.3.18-150300.38.80.1.x86_64",
          "openSUSE Leap 15.3:kernel-azure-5.3.18-150300.38.80.1.x86_64",
          "openSUSE Leap 15.3:kernel-azure-devel-5.3.18-150300.38.80.1.x86_64",
          "openSUSE Leap 15.3:kernel-azure-extra-5.3.18-150300.38.80.1.x86_64",
          "openSUSE Leap 15.3:kernel-azure-livepatch-devel-5.3.18-150300.38.80.1.x86_64",
          "openSUSE Leap 15.3:kernel-azure-optional-5.3.18-150300.38.80.1.x86_64",
          "openSUSE Leap 15.3:kernel-devel-azure-5.3.18-150300.38.80.1.noarch",
          "openSUSE Leap 15.3:kernel-source-azure-5.3.18-150300.38.80.1.noarch",
          "openSUSE Leap 15.3:kernel-syms-azure-5.3.18-150300.38.80.1.x86_64",
          "openSUSE Leap 15.3:kselftests-kmp-azure-5.3.18-150300.38.80.1.x86_64",
          "openSUSE Leap 15.3:ocfs2-kmp-azure-5.3.18-150300.38.80.1.x86_64",
          "openSUSE Leap 15.3:reiserfs-kmp-azure-5.3.18-150300.38.80.1.x86_64"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2021-4155",
          "url": "https://www.suse.com/security/cve/CVE-2021-4155"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1194272 for CVE-2021-4155",
          "url": "https://bugzilla.suse.com/1194272"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1199255 for CVE-2021-4155",
          "url": "https://bugzilla.suse.com/1199255"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1200084 for CVE-2021-4155",
          "url": "https://bugzilla.suse.com/1200084"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-azure-5.3.18-150300.38.80.1.x86_64",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-azure-devel-5.3.18-150300.38.80.1.x86_64",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-devel-azure-5.3.18-150300.38.80.1.noarch",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-source-azure-5.3.18-150300.38.80.1.noarch",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-syms-azure-5.3.18-150300.38.80.1.x86_64",
            "openSUSE Leap 15.3:cluster-md-kmp-azure-5.3.18-150300.38.80.1.x86_64",
            "openSUSE Leap 15.3:dlm-kmp-azure-5.3.18-150300.38.80.1.x86_64",
            "openSUSE Leap 15.3:gfs2-kmp-azure-5.3.18-150300.38.80.1.x86_64",
            "openSUSE Leap 15.3:kernel-azure-5.3.18-150300.38.80.1.x86_64",
            "openSUSE Leap 15.3:kernel-azure-devel-5.3.18-150300.38.80.1.x86_64",
            "openSUSE Leap 15.3:kernel-azure-extra-5.3.18-150300.38.80.1.x86_64",
            "openSUSE Leap 15.3:kernel-azure-livepatch-devel-5.3.18-150300.38.80.1.x86_64",
            "openSUSE Leap 15.3:kernel-azure-optional-5.3.18-150300.38.80.1.x86_64",
            "openSUSE Leap 15.3:kernel-devel-azure-5.3.18-150300.38.80.1.noarch",
            "openSUSE Leap 15.3:kernel-source-azure-5.3.18-150300.38.80.1.noarch",
            "openSUSE Leap 15.3:kernel-syms-azure-5.3.18-150300.38.80.1.x86_64",
            "openSUSE Leap 15.3:kselftests-kmp-azure-5.3.18-150300.38.80.1.x86_64",
            "openSUSE Leap 15.3:ocfs2-kmp-azure-5.3.18-150300.38.80.1.x86_64",
            "openSUSE Leap 15.3:reiserfs-kmp-azure-5.3.18-150300.38.80.1.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 5.5,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N",
            "version": "3.1"
          },
          "products": [
            "SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-azure-5.3.18-150300.38.80.1.x86_64",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-azure-devel-5.3.18-150300.38.80.1.x86_64",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-devel-azure-5.3.18-150300.38.80.1.noarch",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-source-azure-5.3.18-150300.38.80.1.noarch",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-syms-azure-5.3.18-150300.38.80.1.x86_64",
            "openSUSE Leap 15.3:cluster-md-kmp-azure-5.3.18-150300.38.80.1.x86_64",
            "openSUSE Leap 15.3:dlm-kmp-azure-5.3.18-150300.38.80.1.x86_64",
            "openSUSE Leap 15.3:gfs2-kmp-azure-5.3.18-150300.38.80.1.x86_64",
            "openSUSE Leap 15.3:kernel-azure-5.3.18-150300.38.80.1.x86_64",
            "openSUSE Leap 15.3:kernel-azure-devel-5.3.18-150300.38.80.1.x86_64",
            "openSUSE Leap 15.3:kernel-azure-extra-5.3.18-150300.38.80.1.x86_64",
            "openSUSE Leap 15.3:kernel-azure-livepatch-devel-5.3.18-150300.38.80.1.x86_64",
            "openSUSE Leap 15.3:kernel-azure-optional-5.3.18-150300.38.80.1.x86_64",
            "openSUSE Leap 15.3:kernel-devel-azure-5.3.18-150300.38.80.1.noarch",
            "openSUSE Leap 15.3:kernel-source-azure-5.3.18-150300.38.80.1.noarch",
            "openSUSE Leap 15.3:kernel-syms-azure-5.3.18-150300.38.80.1.x86_64",
            "openSUSE Leap 15.3:kselftests-kmp-azure-5.3.18-150300.38.80.1.x86_64",
            "openSUSE Leap 15.3:ocfs2-kmp-azure-5.3.18-150300.38.80.1.x86_64",
            "openSUSE Leap 15.3:reiserfs-kmp-azure-5.3.18-150300.38.80.1.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2022-10-18T09:44:53Z",
          "details": "moderate"
        }
      ],
      "title": "CVE-2021-4155"
    },
    {
      "cve": "CVE-2021-4203",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2021-4203"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "A use-after-free read flaw was found in sock_getsockopt() in net/core/sock.c due to SO_PEERCRED and SO_PEERGROUPS race with listen() (and connect()) in the Linux kernel. In this flaw, an attacker with a user privileges may crash the system or leak internal kernel information.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-azure-5.3.18-150300.38.80.1.x86_64",
          "SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-azure-devel-5.3.18-150300.38.80.1.x86_64",
          "SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-devel-azure-5.3.18-150300.38.80.1.noarch",
          "SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-source-azure-5.3.18-150300.38.80.1.noarch",
          "SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-syms-azure-5.3.18-150300.38.80.1.x86_64",
          "openSUSE Leap 15.3:cluster-md-kmp-azure-5.3.18-150300.38.80.1.x86_64",
          "openSUSE Leap 15.3:dlm-kmp-azure-5.3.18-150300.38.80.1.x86_64",
          "openSUSE Leap 15.3:gfs2-kmp-azure-5.3.18-150300.38.80.1.x86_64",
          "openSUSE Leap 15.3:kernel-azure-5.3.18-150300.38.80.1.x86_64",
          "openSUSE Leap 15.3:kernel-azure-devel-5.3.18-150300.38.80.1.x86_64",
          "openSUSE Leap 15.3:kernel-azure-extra-5.3.18-150300.38.80.1.x86_64",
          "openSUSE Leap 15.3:kernel-azure-livepatch-devel-5.3.18-150300.38.80.1.x86_64",
          "openSUSE Leap 15.3:kernel-azure-optional-5.3.18-150300.38.80.1.x86_64",
          "openSUSE Leap 15.3:kernel-devel-azure-5.3.18-150300.38.80.1.noarch",
          "openSUSE Leap 15.3:kernel-source-azure-5.3.18-150300.38.80.1.noarch",
          "openSUSE Leap 15.3:kernel-syms-azure-5.3.18-150300.38.80.1.x86_64",
          "openSUSE Leap 15.3:kselftests-kmp-azure-5.3.18-150300.38.80.1.x86_64",
          "openSUSE Leap 15.3:ocfs2-kmp-azure-5.3.18-150300.38.80.1.x86_64",
          "openSUSE Leap 15.3:reiserfs-kmp-azure-5.3.18-150300.38.80.1.x86_64"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2021-4203",
          "url": "https://www.suse.com/security/cve/CVE-2021-4203"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1194535 for CVE-2021-4203",
          "url": "https://bugzilla.suse.com/1194535"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-azure-5.3.18-150300.38.80.1.x86_64",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-azure-devel-5.3.18-150300.38.80.1.x86_64",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-devel-azure-5.3.18-150300.38.80.1.noarch",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-source-azure-5.3.18-150300.38.80.1.noarch",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-syms-azure-5.3.18-150300.38.80.1.x86_64",
            "openSUSE Leap 15.3:cluster-md-kmp-azure-5.3.18-150300.38.80.1.x86_64",
            "openSUSE Leap 15.3:dlm-kmp-azure-5.3.18-150300.38.80.1.x86_64",
            "openSUSE Leap 15.3:gfs2-kmp-azure-5.3.18-150300.38.80.1.x86_64",
            "openSUSE Leap 15.3:kernel-azure-5.3.18-150300.38.80.1.x86_64",
            "openSUSE Leap 15.3:kernel-azure-devel-5.3.18-150300.38.80.1.x86_64",
            "openSUSE Leap 15.3:kernel-azure-extra-5.3.18-150300.38.80.1.x86_64",
            "openSUSE Leap 15.3:kernel-azure-livepatch-devel-5.3.18-150300.38.80.1.x86_64",
            "openSUSE Leap 15.3:kernel-azure-optional-5.3.18-150300.38.80.1.x86_64",
            "openSUSE Leap 15.3:kernel-devel-azure-5.3.18-150300.38.80.1.noarch",
            "openSUSE Leap 15.3:kernel-source-azure-5.3.18-150300.38.80.1.noarch",
            "openSUSE Leap 15.3:kernel-syms-azure-5.3.18-150300.38.80.1.x86_64",
            "openSUSE Leap 15.3:kselftests-kmp-azure-5.3.18-150300.38.80.1.x86_64",
            "openSUSE Leap 15.3:ocfs2-kmp-azure-5.3.18-150300.38.80.1.x86_64",
            "openSUSE Leap 15.3:reiserfs-kmp-azure-5.3.18-150300.38.80.1.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 5.8,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:L/A:L",
            "version": "3.1"
          },
          "products": [
            "SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-azure-5.3.18-150300.38.80.1.x86_64",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-azure-devel-5.3.18-150300.38.80.1.x86_64",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-devel-azure-5.3.18-150300.38.80.1.noarch",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-source-azure-5.3.18-150300.38.80.1.noarch",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-syms-azure-5.3.18-150300.38.80.1.x86_64",
            "openSUSE Leap 15.3:cluster-md-kmp-azure-5.3.18-150300.38.80.1.x86_64",
            "openSUSE Leap 15.3:dlm-kmp-azure-5.3.18-150300.38.80.1.x86_64",
            "openSUSE Leap 15.3:gfs2-kmp-azure-5.3.18-150300.38.80.1.x86_64",
            "openSUSE Leap 15.3:kernel-azure-5.3.18-150300.38.80.1.x86_64",
            "openSUSE Leap 15.3:kernel-azure-devel-5.3.18-150300.38.80.1.x86_64",
            "openSUSE Leap 15.3:kernel-azure-extra-5.3.18-150300.38.80.1.x86_64",
            "openSUSE Leap 15.3:kernel-azure-livepatch-devel-5.3.18-150300.38.80.1.x86_64",
            "openSUSE Leap 15.3:kernel-azure-optional-5.3.18-150300.38.80.1.x86_64",
            "openSUSE Leap 15.3:kernel-devel-azure-5.3.18-150300.38.80.1.noarch",
            "openSUSE Leap 15.3:kernel-source-azure-5.3.18-150300.38.80.1.noarch",
            "openSUSE Leap 15.3:kernel-syms-azure-5.3.18-150300.38.80.1.x86_64",
            "openSUSE Leap 15.3:kselftests-kmp-azure-5.3.18-150300.38.80.1.x86_64",
            "openSUSE Leap 15.3:ocfs2-kmp-azure-5.3.18-150300.38.80.1.x86_64",
            "openSUSE Leap 15.3:reiserfs-kmp-azure-5.3.18-150300.38.80.1.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2022-10-18T09:44:53Z",
          "details": "moderate"
        }
      ],
      "title": "CVE-2021-4203"
    },
    {
      "cve": "CVE-2022-20368",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2022-20368"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "Product: AndroidVersions: Android kernelAndroid ID: A-224546354References: Upstream kernel",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-azure-5.3.18-150300.38.80.1.x86_64",
          "SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-azure-devel-5.3.18-150300.38.80.1.x86_64",
          "SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-devel-azure-5.3.18-150300.38.80.1.noarch",
          "SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-source-azure-5.3.18-150300.38.80.1.noarch",
          "SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-syms-azure-5.3.18-150300.38.80.1.x86_64",
          "openSUSE Leap 15.3:cluster-md-kmp-azure-5.3.18-150300.38.80.1.x86_64",
          "openSUSE Leap 15.3:dlm-kmp-azure-5.3.18-150300.38.80.1.x86_64",
          "openSUSE Leap 15.3:gfs2-kmp-azure-5.3.18-150300.38.80.1.x86_64",
          "openSUSE Leap 15.3:kernel-azure-5.3.18-150300.38.80.1.x86_64",
          "openSUSE Leap 15.3:kernel-azure-devel-5.3.18-150300.38.80.1.x86_64",
          "openSUSE Leap 15.3:kernel-azure-extra-5.3.18-150300.38.80.1.x86_64",
          "openSUSE Leap 15.3:kernel-azure-livepatch-devel-5.3.18-150300.38.80.1.x86_64",
          "openSUSE Leap 15.3:kernel-azure-optional-5.3.18-150300.38.80.1.x86_64",
          "openSUSE Leap 15.3:kernel-devel-azure-5.3.18-150300.38.80.1.noarch",
          "openSUSE Leap 15.3:kernel-source-azure-5.3.18-150300.38.80.1.noarch",
          "openSUSE Leap 15.3:kernel-syms-azure-5.3.18-150300.38.80.1.x86_64",
          "openSUSE Leap 15.3:kselftests-kmp-azure-5.3.18-150300.38.80.1.x86_64",
          "openSUSE Leap 15.3:ocfs2-kmp-azure-5.3.18-150300.38.80.1.x86_64",
          "openSUSE Leap 15.3:reiserfs-kmp-azure-5.3.18-150300.38.80.1.x86_64"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2022-20368",
          "url": "https://www.suse.com/security/cve/CVE-2022-20368"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1202346 for CVE-2022-20368",
          "url": "https://bugzilla.suse.com/1202346"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1212311 for CVE-2022-20368",
          "url": "https://bugzilla.suse.com/1212311"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-azure-5.3.18-150300.38.80.1.x86_64",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-azure-devel-5.3.18-150300.38.80.1.x86_64",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-devel-azure-5.3.18-150300.38.80.1.noarch",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-source-azure-5.3.18-150300.38.80.1.noarch",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-syms-azure-5.3.18-150300.38.80.1.x86_64",
            "openSUSE Leap 15.3:cluster-md-kmp-azure-5.3.18-150300.38.80.1.x86_64",
            "openSUSE Leap 15.3:dlm-kmp-azure-5.3.18-150300.38.80.1.x86_64",
            "openSUSE Leap 15.3:gfs2-kmp-azure-5.3.18-150300.38.80.1.x86_64",
            "openSUSE Leap 15.3:kernel-azure-5.3.18-150300.38.80.1.x86_64",
            "openSUSE Leap 15.3:kernel-azure-devel-5.3.18-150300.38.80.1.x86_64",
            "openSUSE Leap 15.3:kernel-azure-extra-5.3.18-150300.38.80.1.x86_64",
            "openSUSE Leap 15.3:kernel-azure-livepatch-devel-5.3.18-150300.38.80.1.x86_64",
            "openSUSE Leap 15.3:kernel-azure-optional-5.3.18-150300.38.80.1.x86_64",
            "openSUSE Leap 15.3:kernel-devel-azure-5.3.18-150300.38.80.1.noarch",
            "openSUSE Leap 15.3:kernel-source-azure-5.3.18-150300.38.80.1.noarch",
            "openSUSE Leap 15.3:kernel-syms-azure-5.3.18-150300.38.80.1.x86_64",
            "openSUSE Leap 15.3:kselftests-kmp-azure-5.3.18-150300.38.80.1.x86_64",
            "openSUSE Leap 15.3:ocfs2-kmp-azure-5.3.18-150300.38.80.1.x86_64",
            "openSUSE Leap 15.3:reiserfs-kmp-azure-5.3.18-150300.38.80.1.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 5.5,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
            "version": "3.1"
          },
          "products": [
            "SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-azure-5.3.18-150300.38.80.1.x86_64",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-azure-devel-5.3.18-150300.38.80.1.x86_64",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-devel-azure-5.3.18-150300.38.80.1.noarch",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-source-azure-5.3.18-150300.38.80.1.noarch",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-syms-azure-5.3.18-150300.38.80.1.x86_64",
            "openSUSE Leap 15.3:cluster-md-kmp-azure-5.3.18-150300.38.80.1.x86_64",
            "openSUSE Leap 15.3:dlm-kmp-azure-5.3.18-150300.38.80.1.x86_64",
            "openSUSE Leap 15.3:gfs2-kmp-azure-5.3.18-150300.38.80.1.x86_64",
            "openSUSE Leap 15.3:kernel-azure-5.3.18-150300.38.80.1.x86_64",
            "openSUSE Leap 15.3:kernel-azure-devel-5.3.18-150300.38.80.1.x86_64",
            "openSUSE Leap 15.3:kernel-azure-extra-5.3.18-150300.38.80.1.x86_64",
            "openSUSE Leap 15.3:kernel-azure-livepatch-devel-5.3.18-150300.38.80.1.x86_64",
            "openSUSE Leap 15.3:kernel-azure-optional-5.3.18-150300.38.80.1.x86_64",
            "openSUSE Leap 15.3:kernel-devel-azure-5.3.18-150300.38.80.1.noarch",
            "openSUSE Leap 15.3:kernel-source-azure-5.3.18-150300.38.80.1.noarch",
            "openSUSE Leap 15.3:kernel-syms-azure-5.3.18-150300.38.80.1.x86_64",
            "openSUSE Leap 15.3:kselftests-kmp-azure-5.3.18-150300.38.80.1.x86_64",
            "openSUSE Leap 15.3:ocfs2-kmp-azure-5.3.18-150300.38.80.1.x86_64",
            "openSUSE Leap 15.3:reiserfs-kmp-azure-5.3.18-150300.38.80.1.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2022-10-18T09:44:53Z",
          "details": "moderate"
        }
      ],
      "title": "CVE-2022-20368"
    },
    {
      "cve": "CVE-2022-20369",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2022-20369"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "In v4l2_m2m_querybuf of v4l2-mem2mem.c, there is a possible out of bounds write due to improper input validation. This could lead to local escalation of privilege with System execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android kernelAndroid ID: A-223375145References: Upstream kernel",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-azure-5.3.18-150300.38.80.1.x86_64",
          "SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-azure-devel-5.3.18-150300.38.80.1.x86_64",
          "SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-devel-azure-5.3.18-150300.38.80.1.noarch",
          "SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-source-azure-5.3.18-150300.38.80.1.noarch",
          "SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-syms-azure-5.3.18-150300.38.80.1.x86_64",
          "openSUSE Leap 15.3:cluster-md-kmp-azure-5.3.18-150300.38.80.1.x86_64",
          "openSUSE Leap 15.3:dlm-kmp-azure-5.3.18-150300.38.80.1.x86_64",
          "openSUSE Leap 15.3:gfs2-kmp-azure-5.3.18-150300.38.80.1.x86_64",
          "openSUSE Leap 15.3:kernel-azure-5.3.18-150300.38.80.1.x86_64",
          "openSUSE Leap 15.3:kernel-azure-devel-5.3.18-150300.38.80.1.x86_64",
          "openSUSE Leap 15.3:kernel-azure-extra-5.3.18-150300.38.80.1.x86_64",
          "openSUSE Leap 15.3:kernel-azure-livepatch-devel-5.3.18-150300.38.80.1.x86_64",
          "openSUSE Leap 15.3:kernel-azure-optional-5.3.18-150300.38.80.1.x86_64",
          "openSUSE Leap 15.3:kernel-devel-azure-5.3.18-150300.38.80.1.noarch",
          "openSUSE Leap 15.3:kernel-source-azure-5.3.18-150300.38.80.1.noarch",
          "openSUSE Leap 15.3:kernel-syms-azure-5.3.18-150300.38.80.1.x86_64",
          "openSUSE Leap 15.3:kselftests-kmp-azure-5.3.18-150300.38.80.1.x86_64",
          "openSUSE Leap 15.3:ocfs2-kmp-azure-5.3.18-150300.38.80.1.x86_64",
          "openSUSE Leap 15.3:reiserfs-kmp-azure-5.3.18-150300.38.80.1.x86_64"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2022-20369",
          "url": "https://www.suse.com/security/cve/CVE-2022-20369"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1202347 for CVE-2022-20369",
          "url": "https://bugzilla.suse.com/1202347"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1212321 for CVE-2022-20369",
          "url": "https://bugzilla.suse.com/1212321"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-azure-5.3.18-150300.38.80.1.x86_64",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-azure-devel-5.3.18-150300.38.80.1.x86_64",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-devel-azure-5.3.18-150300.38.80.1.noarch",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-source-azure-5.3.18-150300.38.80.1.noarch",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-syms-azure-5.3.18-150300.38.80.1.x86_64",
            "openSUSE Leap 15.3:cluster-md-kmp-azure-5.3.18-150300.38.80.1.x86_64",
            "openSUSE Leap 15.3:dlm-kmp-azure-5.3.18-150300.38.80.1.x86_64",
            "openSUSE Leap 15.3:gfs2-kmp-azure-5.3.18-150300.38.80.1.x86_64",
            "openSUSE Leap 15.3:kernel-azure-5.3.18-150300.38.80.1.x86_64",
            "openSUSE Leap 15.3:kernel-azure-devel-5.3.18-150300.38.80.1.x86_64",
            "openSUSE Leap 15.3:kernel-azure-extra-5.3.18-150300.38.80.1.x86_64",
            "openSUSE Leap 15.3:kernel-azure-livepatch-devel-5.3.18-150300.38.80.1.x86_64",
            "openSUSE Leap 15.3:kernel-azure-optional-5.3.18-150300.38.80.1.x86_64",
            "openSUSE Leap 15.3:kernel-devel-azure-5.3.18-150300.38.80.1.noarch",
            "openSUSE Leap 15.3:kernel-source-azure-5.3.18-150300.38.80.1.noarch",
            "openSUSE Leap 15.3:kernel-syms-azure-5.3.18-150300.38.80.1.x86_64",
            "openSUSE Leap 15.3:kselftests-kmp-azure-5.3.18-150300.38.80.1.x86_64",
            "openSUSE Leap 15.3:ocfs2-kmp-azure-5.3.18-150300.38.80.1.x86_64",
            "openSUSE Leap 15.3:reiserfs-kmp-azure-5.3.18-150300.38.80.1.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 5.5,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
            "version": "3.1"
          },
          "products": [
            "SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-azure-5.3.18-150300.38.80.1.x86_64",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-azure-devel-5.3.18-150300.38.80.1.x86_64",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-devel-azure-5.3.18-150300.38.80.1.noarch",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-source-azure-5.3.18-150300.38.80.1.noarch",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-syms-azure-5.3.18-150300.38.80.1.x86_64",
            "openSUSE Leap 15.3:cluster-md-kmp-azure-5.3.18-150300.38.80.1.x86_64",
            "openSUSE Leap 15.3:dlm-kmp-azure-5.3.18-150300.38.80.1.x86_64",
            "openSUSE Leap 15.3:gfs2-kmp-azure-5.3.18-150300.38.80.1.x86_64",
            "openSUSE Leap 15.3:kernel-azure-5.3.18-150300.38.80.1.x86_64",
            "openSUSE Leap 15.3:kernel-azure-devel-5.3.18-150300.38.80.1.x86_64",
            "openSUSE Leap 15.3:kernel-azure-extra-5.3.18-150300.38.80.1.x86_64",
            "openSUSE Leap 15.3:kernel-azure-livepatch-devel-5.3.18-150300.38.80.1.x86_64",
            "openSUSE Leap 15.3:kernel-azure-optional-5.3.18-150300.38.80.1.x86_64",
            "openSUSE Leap 15.3:kernel-devel-azure-5.3.18-150300.38.80.1.noarch",
            "openSUSE Leap 15.3:kernel-source-azure-5.3.18-150300.38.80.1.noarch",
            "openSUSE Leap 15.3:kernel-syms-azure-5.3.18-150300.38.80.1.x86_64",
            "openSUSE Leap 15.3:kselftests-kmp-azure-5.3.18-150300.38.80.1.x86_64",
            "openSUSE Leap 15.3:ocfs2-kmp-azure-5.3.18-150300.38.80.1.x86_64",
            "openSUSE Leap 15.3:reiserfs-kmp-azure-5.3.18-150300.38.80.1.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2022-10-18T09:44:53Z",
          "details": "moderate"
        }
      ],
      "title": "CVE-2022-20369"
    },
    {
      "cve": "CVE-2022-2503",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2022-2503"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "Dm-verity is used for extending root-of-trust to root filesystems. LoadPin builds on this property to restrict module/firmware loads to just the trusted root filesystem. Device-mapper table reloads currently allow users with root privileges to switch out the target with an equivalent dm-linear target and bypass verification till reboot. This allows root to bypass LoadPin and can be used to load untrusted and unverified kernel modules and firmware, which implies arbitrary kernel execution and persistence for peripherals that do not verify firmware updates. We recommend upgrading past commit 4caae58406f8ceb741603eee460d79bacca9b1b5",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-azure-5.3.18-150300.38.80.1.x86_64",
          "SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-azure-devel-5.3.18-150300.38.80.1.x86_64",
          "SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-devel-azure-5.3.18-150300.38.80.1.noarch",
          "SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-source-azure-5.3.18-150300.38.80.1.noarch",
          "SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-syms-azure-5.3.18-150300.38.80.1.x86_64",
          "openSUSE Leap 15.3:cluster-md-kmp-azure-5.3.18-150300.38.80.1.x86_64",
          "openSUSE Leap 15.3:dlm-kmp-azure-5.3.18-150300.38.80.1.x86_64",
          "openSUSE Leap 15.3:gfs2-kmp-azure-5.3.18-150300.38.80.1.x86_64",
          "openSUSE Leap 15.3:kernel-azure-5.3.18-150300.38.80.1.x86_64",
          "openSUSE Leap 15.3:kernel-azure-devel-5.3.18-150300.38.80.1.x86_64",
          "openSUSE Leap 15.3:kernel-azure-extra-5.3.18-150300.38.80.1.x86_64",
          "openSUSE Leap 15.3:kernel-azure-livepatch-devel-5.3.18-150300.38.80.1.x86_64",
          "openSUSE Leap 15.3:kernel-azure-optional-5.3.18-150300.38.80.1.x86_64",
          "openSUSE Leap 15.3:kernel-devel-azure-5.3.18-150300.38.80.1.noarch",
          "openSUSE Leap 15.3:kernel-source-azure-5.3.18-150300.38.80.1.noarch",
          "openSUSE Leap 15.3:kernel-syms-azure-5.3.18-150300.38.80.1.x86_64",
          "openSUSE Leap 15.3:kselftests-kmp-azure-5.3.18-150300.38.80.1.x86_64",
          "openSUSE Leap 15.3:ocfs2-kmp-azure-5.3.18-150300.38.80.1.x86_64",
          "openSUSE Leap 15.3:reiserfs-kmp-azure-5.3.18-150300.38.80.1.x86_64"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2022-2503",
          "url": "https://www.suse.com/security/cve/CVE-2022-2503"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1202677 for CVE-2022-2503",
          "url": "https://bugzilla.suse.com/1202677"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-azure-5.3.18-150300.38.80.1.x86_64",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-azure-devel-5.3.18-150300.38.80.1.x86_64",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-devel-azure-5.3.18-150300.38.80.1.noarch",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-source-azure-5.3.18-150300.38.80.1.noarch",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-syms-azure-5.3.18-150300.38.80.1.x86_64",
            "openSUSE Leap 15.3:cluster-md-kmp-azure-5.3.18-150300.38.80.1.x86_64",
            "openSUSE Leap 15.3:dlm-kmp-azure-5.3.18-150300.38.80.1.x86_64",
            "openSUSE Leap 15.3:gfs2-kmp-azure-5.3.18-150300.38.80.1.x86_64",
            "openSUSE Leap 15.3:kernel-azure-5.3.18-150300.38.80.1.x86_64",
            "openSUSE Leap 15.3:kernel-azure-devel-5.3.18-150300.38.80.1.x86_64",
            "openSUSE Leap 15.3:kernel-azure-extra-5.3.18-150300.38.80.1.x86_64",
            "openSUSE Leap 15.3:kernel-azure-livepatch-devel-5.3.18-150300.38.80.1.x86_64",
            "openSUSE Leap 15.3:kernel-azure-optional-5.3.18-150300.38.80.1.x86_64",
            "openSUSE Leap 15.3:kernel-devel-azure-5.3.18-150300.38.80.1.noarch",
            "openSUSE Leap 15.3:kernel-source-azure-5.3.18-150300.38.80.1.noarch",
            "openSUSE Leap 15.3:kernel-syms-azure-5.3.18-150300.38.80.1.x86_64",
            "openSUSE Leap 15.3:kselftests-kmp-azure-5.3.18-150300.38.80.1.x86_64",
            "openSUSE Leap 15.3:ocfs2-kmp-azure-5.3.18-150300.38.80.1.x86_64",
            "openSUSE Leap 15.3:reiserfs-kmp-azure-5.3.18-150300.38.80.1.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 6.7,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H",
            "version": "3.1"
          },
          "products": [
            "SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-azure-5.3.18-150300.38.80.1.x86_64",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-azure-devel-5.3.18-150300.38.80.1.x86_64",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-devel-azure-5.3.18-150300.38.80.1.noarch",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-source-azure-5.3.18-150300.38.80.1.noarch",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-syms-azure-5.3.18-150300.38.80.1.x86_64",
            "openSUSE Leap 15.3:cluster-md-kmp-azure-5.3.18-150300.38.80.1.x86_64",
            "openSUSE Leap 15.3:dlm-kmp-azure-5.3.18-150300.38.80.1.x86_64",
            "openSUSE Leap 15.3:gfs2-kmp-azure-5.3.18-150300.38.80.1.x86_64",
            "openSUSE Leap 15.3:kernel-azure-5.3.18-150300.38.80.1.x86_64",
            "openSUSE Leap 15.3:kernel-azure-devel-5.3.18-150300.38.80.1.x86_64",
            "openSUSE Leap 15.3:kernel-azure-extra-5.3.18-150300.38.80.1.x86_64",
            "openSUSE Leap 15.3:kernel-azure-livepatch-devel-5.3.18-150300.38.80.1.x86_64",
            "openSUSE Leap 15.3:kernel-azure-optional-5.3.18-150300.38.80.1.x86_64",
            "openSUSE Leap 15.3:kernel-devel-azure-5.3.18-150300.38.80.1.noarch",
            "openSUSE Leap 15.3:kernel-source-azure-5.3.18-150300.38.80.1.noarch",
            "openSUSE Leap 15.3:kernel-syms-azure-5.3.18-150300.38.80.1.x86_64",
            "openSUSE Leap 15.3:kselftests-kmp-azure-5.3.18-150300.38.80.1.x86_64",
            "openSUSE Leap 15.3:ocfs2-kmp-azure-5.3.18-150300.38.80.1.x86_64",
            "openSUSE Leap 15.3:reiserfs-kmp-azure-5.3.18-150300.38.80.1.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2022-10-18T09:44:53Z",
          "details": "moderate"
        }
      ],
      "title": "CVE-2022-2503"
    },
    {
      "cve": "CVE-2022-2586",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2022-2586"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "It was discovered that a nft object or expression could reference a nft set on a different nft table, leading to a use-after-free once that table was deleted.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-azure-5.3.18-150300.38.80.1.x86_64",
          "SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-azure-devel-5.3.18-150300.38.80.1.x86_64",
          "SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-devel-azure-5.3.18-150300.38.80.1.noarch",
          "SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-source-azure-5.3.18-150300.38.80.1.noarch",
          "SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-syms-azure-5.3.18-150300.38.80.1.x86_64",
          "openSUSE Leap 15.3:cluster-md-kmp-azure-5.3.18-150300.38.80.1.x86_64",
          "openSUSE Leap 15.3:dlm-kmp-azure-5.3.18-150300.38.80.1.x86_64",
          "openSUSE Leap 15.3:gfs2-kmp-azure-5.3.18-150300.38.80.1.x86_64",
          "openSUSE Leap 15.3:kernel-azure-5.3.18-150300.38.80.1.x86_64",
          "openSUSE Leap 15.3:kernel-azure-devel-5.3.18-150300.38.80.1.x86_64",
          "openSUSE Leap 15.3:kernel-azure-extra-5.3.18-150300.38.80.1.x86_64",
          "openSUSE Leap 15.3:kernel-azure-livepatch-devel-5.3.18-150300.38.80.1.x86_64",
          "openSUSE Leap 15.3:kernel-azure-optional-5.3.18-150300.38.80.1.x86_64",
          "openSUSE Leap 15.3:kernel-devel-azure-5.3.18-150300.38.80.1.noarch",
          "openSUSE Leap 15.3:kernel-source-azure-5.3.18-150300.38.80.1.noarch",
          "openSUSE Leap 15.3:kernel-syms-azure-5.3.18-150300.38.80.1.x86_64",
          "openSUSE Leap 15.3:kselftests-kmp-azure-5.3.18-150300.38.80.1.x86_64",
          "openSUSE Leap 15.3:ocfs2-kmp-azure-5.3.18-150300.38.80.1.x86_64",
          "openSUSE Leap 15.3:reiserfs-kmp-azure-5.3.18-150300.38.80.1.x86_64"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2022-2586",
          "url": "https://www.suse.com/security/cve/CVE-2022-2586"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1202095 for CVE-2022-2586",
          "url": "https://bugzilla.suse.com/1202095"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1209719 for CVE-2022-2586",
          "url": "https://bugzilla.suse.com/1209719"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-azure-5.3.18-150300.38.80.1.x86_64",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-azure-devel-5.3.18-150300.38.80.1.x86_64",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-devel-azure-5.3.18-150300.38.80.1.noarch",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-source-azure-5.3.18-150300.38.80.1.noarch",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-syms-azure-5.3.18-150300.38.80.1.x86_64",
            "openSUSE Leap 15.3:cluster-md-kmp-azure-5.3.18-150300.38.80.1.x86_64",
            "openSUSE Leap 15.3:dlm-kmp-azure-5.3.18-150300.38.80.1.x86_64",
            "openSUSE Leap 15.3:gfs2-kmp-azure-5.3.18-150300.38.80.1.x86_64",
            "openSUSE Leap 15.3:kernel-azure-5.3.18-150300.38.80.1.x86_64",
            "openSUSE Leap 15.3:kernel-azure-devel-5.3.18-150300.38.80.1.x86_64",
            "openSUSE Leap 15.3:kernel-azure-extra-5.3.18-150300.38.80.1.x86_64",
            "openSUSE Leap 15.3:kernel-azure-livepatch-devel-5.3.18-150300.38.80.1.x86_64",
            "openSUSE Leap 15.3:kernel-azure-optional-5.3.18-150300.38.80.1.x86_64",
            "openSUSE Leap 15.3:kernel-devel-azure-5.3.18-150300.38.80.1.noarch",
            "openSUSE Leap 15.3:kernel-source-azure-5.3.18-150300.38.80.1.noarch",
            "openSUSE Leap 15.3:kernel-syms-azure-5.3.18-150300.38.80.1.x86_64",
            "openSUSE Leap 15.3:kselftests-kmp-azure-5.3.18-150300.38.80.1.x86_64",
            "openSUSE Leap 15.3:ocfs2-kmp-azure-5.3.18-150300.38.80.1.x86_64",
            "openSUSE Leap 15.3:reiserfs-kmp-azure-5.3.18-150300.38.80.1.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 6.7,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H",
            "version": "3.1"
          },
          "products": [
            "SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-azure-5.3.18-150300.38.80.1.x86_64",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-azure-devel-5.3.18-150300.38.80.1.x86_64",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-devel-azure-5.3.18-150300.38.80.1.noarch",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-source-azure-5.3.18-150300.38.80.1.noarch",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-syms-azure-5.3.18-150300.38.80.1.x86_64",
            "openSUSE Leap 15.3:cluster-md-kmp-azure-5.3.18-150300.38.80.1.x86_64",
            "openSUSE Leap 15.3:dlm-kmp-azure-5.3.18-150300.38.80.1.x86_64",
            "openSUSE Leap 15.3:gfs2-kmp-azure-5.3.18-150300.38.80.1.x86_64",
            "openSUSE Leap 15.3:kernel-azure-5.3.18-150300.38.80.1.x86_64",
            "openSUSE Leap 15.3:kernel-azure-devel-5.3.18-150300.38.80.1.x86_64",
            "openSUSE Leap 15.3:kernel-azure-extra-5.3.18-150300.38.80.1.x86_64",
            "openSUSE Leap 15.3:kernel-azure-livepatch-devel-5.3.18-150300.38.80.1.x86_64",
            "openSUSE Leap 15.3:kernel-azure-optional-5.3.18-150300.38.80.1.x86_64",
            "openSUSE Leap 15.3:kernel-devel-azure-5.3.18-150300.38.80.1.noarch",
            "openSUSE Leap 15.3:kernel-source-azure-5.3.18-150300.38.80.1.noarch",
            "openSUSE Leap 15.3:kernel-syms-azure-5.3.18-150300.38.80.1.x86_64",
            "openSUSE Leap 15.3:kselftests-kmp-azure-5.3.18-150300.38.80.1.x86_64",
            "openSUSE Leap 15.3:ocfs2-kmp-azure-5.3.18-150300.38.80.1.x86_64",
            "openSUSE Leap 15.3:reiserfs-kmp-azure-5.3.18-150300.38.80.1.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2022-10-18T09:44:53Z",
          "details": "moderate"
        }
      ],
      "title": "CVE-2022-2586"
    },
    {
      "cve": "CVE-2022-2588",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2022-2588"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "It was discovered that the cls_route filter implementation in the Linux kernel would not remove an old filter from the hashtable before freeing it if its handle had the value 0.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-azure-5.3.18-150300.38.80.1.x86_64",
          "SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-azure-devel-5.3.18-150300.38.80.1.x86_64",
          "SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-devel-azure-5.3.18-150300.38.80.1.noarch",
          "SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-source-azure-5.3.18-150300.38.80.1.noarch",
          "SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-syms-azure-5.3.18-150300.38.80.1.x86_64",
          "openSUSE Leap 15.3:cluster-md-kmp-azure-5.3.18-150300.38.80.1.x86_64",
          "openSUSE Leap 15.3:dlm-kmp-azure-5.3.18-150300.38.80.1.x86_64",
          "openSUSE Leap 15.3:gfs2-kmp-azure-5.3.18-150300.38.80.1.x86_64",
          "openSUSE Leap 15.3:kernel-azure-5.3.18-150300.38.80.1.x86_64",
          "openSUSE Leap 15.3:kernel-azure-devel-5.3.18-150300.38.80.1.x86_64",
          "openSUSE Leap 15.3:kernel-azure-extra-5.3.18-150300.38.80.1.x86_64",
          "openSUSE Leap 15.3:kernel-azure-livepatch-devel-5.3.18-150300.38.80.1.x86_64",
          "openSUSE Leap 15.3:kernel-azure-optional-5.3.18-150300.38.80.1.x86_64",
          "openSUSE Leap 15.3:kernel-devel-azure-5.3.18-150300.38.80.1.noarch",
          "openSUSE Leap 15.3:kernel-source-azure-5.3.18-150300.38.80.1.noarch",
          "openSUSE Leap 15.3:kernel-syms-azure-5.3.18-150300.38.80.1.x86_64",
          "openSUSE Leap 15.3:kselftests-kmp-azure-5.3.18-150300.38.80.1.x86_64",
          "openSUSE Leap 15.3:ocfs2-kmp-azure-5.3.18-150300.38.80.1.x86_64",
          "openSUSE Leap 15.3:reiserfs-kmp-azure-5.3.18-150300.38.80.1.x86_64"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2022-2588",
          "url": "https://www.suse.com/security/cve/CVE-2022-2588"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1202096 for CVE-2022-2588",
          "url": "https://bugzilla.suse.com/1202096"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1203613 for CVE-2022-2588",
          "url": "https://bugzilla.suse.com/1203613"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1204183 for CVE-2022-2588",
          "url": "https://bugzilla.suse.com/1204183"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1209225 for CVE-2022-2588",
          "url": "https://bugzilla.suse.com/1209225"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-azure-5.3.18-150300.38.80.1.x86_64",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-azure-devel-5.3.18-150300.38.80.1.x86_64",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-devel-azure-5.3.18-150300.38.80.1.noarch",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-source-azure-5.3.18-150300.38.80.1.noarch",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-syms-azure-5.3.18-150300.38.80.1.x86_64",
            "openSUSE Leap 15.3:cluster-md-kmp-azure-5.3.18-150300.38.80.1.x86_64",
            "openSUSE Leap 15.3:dlm-kmp-azure-5.3.18-150300.38.80.1.x86_64",
            "openSUSE Leap 15.3:gfs2-kmp-azure-5.3.18-150300.38.80.1.x86_64",
            "openSUSE Leap 15.3:kernel-azure-5.3.18-150300.38.80.1.x86_64",
            "openSUSE Leap 15.3:kernel-azure-devel-5.3.18-150300.38.80.1.x86_64",
            "openSUSE Leap 15.3:kernel-azure-extra-5.3.18-150300.38.80.1.x86_64",
            "openSUSE Leap 15.3:kernel-azure-livepatch-devel-5.3.18-150300.38.80.1.x86_64",
            "openSUSE Leap 15.3:kernel-azure-optional-5.3.18-150300.38.80.1.x86_64",
            "openSUSE Leap 15.3:kernel-devel-azure-5.3.18-150300.38.80.1.noarch",
            "openSUSE Leap 15.3:kernel-source-azure-5.3.18-150300.38.80.1.noarch",
            "openSUSE Leap 15.3:kernel-syms-azure-5.3.18-150300.38.80.1.x86_64",
            "openSUSE Leap 15.3:kselftests-kmp-azure-5.3.18-150300.38.80.1.x86_64",
            "openSUSE Leap 15.3:ocfs2-kmp-azure-5.3.18-150300.38.80.1.x86_64",
            "openSUSE Leap 15.3:reiserfs-kmp-azure-5.3.18-150300.38.80.1.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 7.8,
            "baseSeverity": "HIGH",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
            "version": "3.1"
          },
          "products": [
            "SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-azure-5.3.18-150300.38.80.1.x86_64",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-azure-devel-5.3.18-150300.38.80.1.x86_64",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-devel-azure-5.3.18-150300.38.80.1.noarch",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-source-azure-5.3.18-150300.38.80.1.noarch",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-syms-azure-5.3.18-150300.38.80.1.x86_64",
            "openSUSE Leap 15.3:cluster-md-kmp-azure-5.3.18-150300.38.80.1.x86_64",
            "openSUSE Leap 15.3:dlm-kmp-azure-5.3.18-150300.38.80.1.x86_64",
            "openSUSE Leap 15.3:gfs2-kmp-azure-5.3.18-150300.38.80.1.x86_64",
            "openSUSE Leap 15.3:kernel-azure-5.3.18-150300.38.80.1.x86_64",
            "openSUSE Leap 15.3:kernel-azure-devel-5.3.18-150300.38.80.1.x86_64",
            "openSUSE Leap 15.3:kernel-azure-extra-5.3.18-150300.38.80.1.x86_64",
            "openSUSE Leap 15.3:kernel-azure-livepatch-devel-5.3.18-150300.38.80.1.x86_64",
            "openSUSE Leap 15.3:kernel-azure-optional-5.3.18-150300.38.80.1.x86_64",
            "openSUSE Leap 15.3:kernel-devel-azure-5.3.18-150300.38.80.1.noarch",
            "openSUSE Leap 15.3:kernel-source-azure-5.3.18-150300.38.80.1.noarch",
            "openSUSE Leap 15.3:kernel-syms-azure-5.3.18-150300.38.80.1.x86_64",
            "openSUSE Leap 15.3:kselftests-kmp-azure-5.3.18-150300.38.80.1.x86_64",
            "openSUSE Leap 15.3:ocfs2-kmp-azure-5.3.18-150300.38.80.1.x86_64",
            "openSUSE Leap 15.3:reiserfs-kmp-azure-5.3.18-150300.38.80.1.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2022-10-18T09:44:53Z",
          "details": "important"
        }
      ],
      "title": "CVE-2022-2588"
    },
    {
      "cve": "CVE-2022-26373",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2022-26373"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "Non-transparent sharing of return predictor targets between contexts in some Intel(R) Processors may allow an authorized user to potentially enable information disclosure via local access.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-azure-5.3.18-150300.38.80.1.x86_64",
          "SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-azure-devel-5.3.18-150300.38.80.1.x86_64",
          "SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-devel-azure-5.3.18-150300.38.80.1.noarch",
          "SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-source-azure-5.3.18-150300.38.80.1.noarch",
          "SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-syms-azure-5.3.18-150300.38.80.1.x86_64",
          "openSUSE Leap 15.3:cluster-md-kmp-azure-5.3.18-150300.38.80.1.x86_64",
          "openSUSE Leap 15.3:dlm-kmp-azure-5.3.18-150300.38.80.1.x86_64",
          "openSUSE Leap 15.3:gfs2-kmp-azure-5.3.18-150300.38.80.1.x86_64",
          "openSUSE Leap 15.3:kernel-azure-5.3.18-150300.38.80.1.x86_64",
          "openSUSE Leap 15.3:kernel-azure-devel-5.3.18-150300.38.80.1.x86_64",
          "openSUSE Leap 15.3:kernel-azure-extra-5.3.18-150300.38.80.1.x86_64",
          "openSUSE Leap 15.3:kernel-azure-livepatch-devel-5.3.18-150300.38.80.1.x86_64",
          "openSUSE Leap 15.3:kernel-azure-optional-5.3.18-150300.38.80.1.x86_64",
          "openSUSE Leap 15.3:kernel-devel-azure-5.3.18-150300.38.80.1.noarch",
          "openSUSE Leap 15.3:kernel-source-azure-5.3.18-150300.38.80.1.noarch",
          "openSUSE Leap 15.3:kernel-syms-azure-5.3.18-150300.38.80.1.x86_64",
          "openSUSE Leap 15.3:kselftests-kmp-azure-5.3.18-150300.38.80.1.x86_64",
          "openSUSE Leap 15.3:ocfs2-kmp-azure-5.3.18-150300.38.80.1.x86_64",
          "openSUSE Leap 15.3:reiserfs-kmp-azure-5.3.18-150300.38.80.1.x86_64"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2022-26373",
          "url": "https://www.suse.com/security/cve/CVE-2022-26373"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1201726 for CVE-2022-26373",
          "url": "https://bugzilla.suse.com/1201726"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1209619 for CVE-2022-26373",
          "url": "https://bugzilla.suse.com/1209619"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-azure-5.3.18-150300.38.80.1.x86_64",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-azure-devel-5.3.18-150300.38.80.1.x86_64",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-devel-azure-5.3.18-150300.38.80.1.noarch",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-source-azure-5.3.18-150300.38.80.1.noarch",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-syms-azure-5.3.18-150300.38.80.1.x86_64",
            "openSUSE Leap 15.3:cluster-md-kmp-azure-5.3.18-150300.38.80.1.x86_64",
            "openSUSE Leap 15.3:dlm-kmp-azure-5.3.18-150300.38.80.1.x86_64",
            "openSUSE Leap 15.3:gfs2-kmp-azure-5.3.18-150300.38.80.1.x86_64",
            "openSUSE Leap 15.3:kernel-azure-5.3.18-150300.38.80.1.x86_64",
            "openSUSE Leap 15.3:kernel-azure-devel-5.3.18-150300.38.80.1.x86_64",
            "openSUSE Leap 15.3:kernel-azure-extra-5.3.18-150300.38.80.1.x86_64",
            "openSUSE Leap 15.3:kernel-azure-livepatch-devel-5.3.18-150300.38.80.1.x86_64",
            "openSUSE Leap 15.3:kernel-azure-optional-5.3.18-150300.38.80.1.x86_64",
            "openSUSE Leap 15.3:kernel-devel-azure-5.3.18-150300.38.80.1.noarch",
            "openSUSE Leap 15.3:kernel-source-azure-5.3.18-150300.38.80.1.noarch",
            "openSUSE Leap 15.3:kernel-syms-azure-5.3.18-150300.38.80.1.x86_64",
            "openSUSE Leap 15.3:kselftests-kmp-azure-5.3.18-150300.38.80.1.x86_64",
            "openSUSE Leap 15.3:ocfs2-kmp-azure-5.3.18-150300.38.80.1.x86_64",
            "openSUSE Leap 15.3:reiserfs-kmp-azure-5.3.18-150300.38.80.1.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 5.5,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N",
            "version": "3.1"
          },
          "products": [
            "SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-azure-5.3.18-150300.38.80.1.x86_64",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-azure-devel-5.3.18-150300.38.80.1.x86_64",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-devel-azure-5.3.18-150300.38.80.1.noarch",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-source-azure-5.3.18-150300.38.80.1.noarch",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-syms-azure-5.3.18-150300.38.80.1.x86_64",
            "openSUSE Leap 15.3:cluster-md-kmp-azure-5.3.18-150300.38.80.1.x86_64",
            "openSUSE Leap 15.3:dlm-kmp-azure-5.3.18-150300.38.80.1.x86_64",
            "openSUSE Leap 15.3:gfs2-kmp-azure-5.3.18-150300.38.80.1.x86_64",
            "openSUSE Leap 15.3:kernel-azure-5.3.18-150300.38.80.1.x86_64",
            "openSUSE Leap 15.3:kernel-azure-devel-5.3.18-150300.38.80.1.x86_64",
            "openSUSE Leap 15.3:kernel-azure-extra-5.3.18-150300.38.80.1.x86_64",
            "openSUSE Leap 15.3:kernel-azure-livepatch-devel-5.3.18-150300.38.80.1.x86_64",
            "openSUSE Leap 15.3:kernel-azure-optional-5.3.18-150300.38.80.1.x86_64",
            "openSUSE Leap 15.3:kernel-devel-azure-5.3.18-150300.38.80.1.noarch",
            "openSUSE Leap 15.3:kernel-source-azure-5.3.18-150300.38.80.1.noarch",
            "openSUSE Leap 15.3:kernel-syms-azure-5.3.18-150300.38.80.1.x86_64",
            "openSUSE Leap 15.3:kselftests-kmp-azure-5.3.18-150300.38.80.1.x86_64",
            "openSUSE Leap 15.3:ocfs2-kmp-azure-5.3.18-150300.38.80.1.x86_64",
            "openSUSE Leap 15.3:reiserfs-kmp-azure-5.3.18-150300.38.80.1.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2022-10-18T09:44:53Z",
          "details": "moderate"
        }
      ],
      "title": "CVE-2022-26373"
    },
    {
      "cve": "CVE-2022-2639",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2022-2639"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "An integer coercion error was found in the openvswitch kernel module. Given a sufficiently large number of actions, while copying and reserving memory for a new action of a new flow, the reserve_sfa_size() function does not return -EMSGSIZE as expected, potentially leading to an out-of-bounds write access. This flaw allows a local user to crash or potentially escalate their privileges on the system.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-azure-5.3.18-150300.38.80.1.x86_64",
          "SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-azure-devel-5.3.18-150300.38.80.1.x86_64",
          "SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-devel-azure-5.3.18-150300.38.80.1.noarch",
          "SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-source-azure-5.3.18-150300.38.80.1.noarch",
          "SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-syms-azure-5.3.18-150300.38.80.1.x86_64",
          "openSUSE Leap 15.3:cluster-md-kmp-azure-5.3.18-150300.38.80.1.x86_64",
          "openSUSE Leap 15.3:dlm-kmp-azure-5.3.18-150300.38.80.1.x86_64",
          "openSUSE Leap 15.3:gfs2-kmp-azure-5.3.18-150300.38.80.1.x86_64",
          "openSUSE Leap 15.3:kernel-azure-5.3.18-150300.38.80.1.x86_64",
          "openSUSE Leap 15.3:kernel-azure-devel-5.3.18-150300.38.80.1.x86_64",
          "openSUSE Leap 15.3:kernel-azure-extra-5.3.18-150300.38.80.1.x86_64",
          "openSUSE Leap 15.3:kernel-azure-livepatch-devel-5.3.18-150300.38.80.1.x86_64",
          "openSUSE Leap 15.3:kernel-azure-optional-5.3.18-150300.38.80.1.x86_64",
          "openSUSE Leap 15.3:kernel-devel-azure-5.3.18-150300.38.80.1.noarch",
          "openSUSE Leap 15.3:kernel-source-azure-5.3.18-150300.38.80.1.noarch",
          "openSUSE Leap 15.3:kernel-syms-azure-5.3.18-150300.38.80.1.x86_64",
          "openSUSE Leap 15.3:kselftests-kmp-azure-5.3.18-150300.38.80.1.x86_64",
          "openSUSE Leap 15.3:ocfs2-kmp-azure-5.3.18-150300.38.80.1.x86_64",
          "openSUSE Leap 15.3:reiserfs-kmp-azure-5.3.18-150300.38.80.1.x86_64"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2022-2639",
          "url": "https://www.suse.com/security/cve/CVE-2022-2639"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1202154 for CVE-2022-2639",
          "url": "https://bugzilla.suse.com/1202154"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-azure-5.3.18-150300.38.80.1.x86_64",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-azure-devel-5.3.18-150300.38.80.1.x86_64",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-devel-azure-5.3.18-150300.38.80.1.noarch",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-source-azure-5.3.18-150300.38.80.1.noarch",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-syms-azure-5.3.18-150300.38.80.1.x86_64",
            "openSUSE Leap 15.3:cluster-md-kmp-azure-5.3.18-150300.38.80.1.x86_64",
            "openSUSE Leap 15.3:dlm-kmp-azure-5.3.18-150300.38.80.1.x86_64",
            "openSUSE Leap 15.3:gfs2-kmp-azure-5.3.18-150300.38.80.1.x86_64",
            "openSUSE Leap 15.3:kernel-azure-5.3.18-150300.38.80.1.x86_64",
            "openSUSE Leap 15.3:kernel-azure-devel-5.3.18-150300.38.80.1.x86_64",
            "openSUSE Leap 15.3:kernel-azure-extra-5.3.18-150300.38.80.1.x86_64",
            "openSUSE Leap 15.3:kernel-azure-livepatch-devel-5.3.18-150300.38.80.1.x86_64",
            "openSUSE Leap 15.3:kernel-azure-optional-5.3.18-150300.38.80.1.x86_64",
            "openSUSE Leap 15.3:kernel-devel-azure-5.3.18-150300.38.80.1.noarch",
            "openSUSE Leap 15.3:kernel-source-azure-5.3.18-150300.38.80.1.noarch",
            "openSUSE Leap 15.3:kernel-syms-azure-5.3.18-150300.38.80.1.x86_64",
            "openSUSE Leap 15.3:kselftests-kmp-azure-5.3.18-150300.38.80.1.x86_64",
            "openSUSE Leap 15.3:ocfs2-kmp-azure-5.3.18-150300.38.80.1.x86_64",
            "openSUSE Leap 15.3:reiserfs-kmp-azure-5.3.18-150300.38.80.1.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 6.1,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:H",
            "version": "3.1"
          },
          "products": [
            "SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-azure-5.3.18-150300.38.80.1.x86_64",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-azure-devel-5.3.18-150300.38.80.1.x86_64",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-devel-azure-5.3.18-150300.38.80.1.noarch",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-source-azure-5.3.18-150300.38.80.1.noarch",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-syms-azure-5.3.18-150300.38.80.1.x86_64",
            "openSUSE Leap 15.3:cluster-md-kmp-azure-5.3.18-150300.38.80.1.x86_64",
            "openSUSE Leap 15.3:dlm-kmp-azure-5.3.18-150300.38.80.1.x86_64",
            "openSUSE Leap 15.3:gfs2-kmp-azure-5.3.18-150300.38.80.1.x86_64",
            "openSUSE Leap 15.3:kernel-azure-5.3.18-150300.38.80.1.x86_64",
            "openSUSE Leap 15.3:kernel-azure-devel-5.3.18-150300.38.80.1.x86_64",
            "openSUSE Leap 15.3:kernel-azure-extra-5.3.18-150300.38.80.1.x86_64",
            "openSUSE Leap 15.3:kernel-azure-livepatch-devel-5.3.18-150300.38.80.1.x86_64",
            "openSUSE Leap 15.3:kernel-azure-optional-5.3.18-150300.38.80.1.x86_64",
            "openSUSE Leap 15.3:kernel-devel-azure-5.3.18-150300.38.80.1.noarch",
            "openSUSE Leap 15.3:kernel-source-azure-5.3.18-150300.38.80.1.noarch",
            "openSUSE Leap 15.3:kernel-syms-azure-5.3.18-150300.38.80.1.x86_64",
            "openSUSE Leap 15.3:kselftests-kmp-azure-5.3.18-150300.38.80.1.x86_64",
            "openSUSE Leap 15.3:ocfs2-kmp-azure-5.3.18-150300.38.80.1.x86_64",
            "openSUSE Leap 15.3:reiserfs-kmp-azure-5.3.18-150300.38.80.1.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2022-10-18T09:44:53Z",
          "details": "moderate"
        }
      ],
      "title": "CVE-2022-2639"
    },
    {
      "cve": "CVE-2022-2663",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2022-2663"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "An issue was found in the Linux kernel in nf_conntrack_irc where the message handling can be confused and incorrectly matches the message. A firewall may be able to be bypassed when users are using unencrypted IRC with nf_conntrack_irc configured.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-azure-5.3.18-150300.38.80.1.x86_64",
          "SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-azure-devel-5.3.18-150300.38.80.1.x86_64",
          "SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-devel-azure-5.3.18-150300.38.80.1.noarch",
          "SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-source-azure-5.3.18-150300.38.80.1.noarch",
          "SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-syms-azure-5.3.18-150300.38.80.1.x86_64",
          "openSUSE Leap 15.3:cluster-md-kmp-azure-5.3.18-150300.38.80.1.x86_64",
          "openSUSE Leap 15.3:dlm-kmp-azure-5.3.18-150300.38.80.1.x86_64",
          "openSUSE Leap 15.3:gfs2-kmp-azure-5.3.18-150300.38.80.1.x86_64",
          "openSUSE Leap 15.3:kernel-azure-5.3.18-150300.38.80.1.x86_64",
          "openSUSE Leap 15.3:kernel-azure-devel-5.3.18-150300.38.80.1.x86_64",
          "openSUSE Leap 15.3:kernel-azure-extra-5.3.18-150300.38.80.1.x86_64",
          "openSUSE Leap 15.3:kernel-azure-livepatch-devel-5.3.18-150300.38.80.1.x86_64",
          "openSUSE Leap 15.3:kernel-azure-optional-5.3.18-150300.38.80.1.x86_64",
          "openSUSE Leap 15.3:kernel-devel-azure-5.3.18-150300.38.80.1.noarch",
          "openSUSE Leap 15.3:kernel-source-azure-5.3.18-150300.38.80.1.noarch",
          "openSUSE Leap 15.3:kernel-syms-azure-5.3.18-150300.38.80.1.x86_64",
          "openSUSE Leap 15.3:kselftests-kmp-azure-5.3.18-150300.38.80.1.x86_64",
          "openSUSE Leap 15.3:ocfs2-kmp-azure-5.3.18-150300.38.80.1.x86_64",
          "openSUSE Leap 15.3:reiserfs-kmp-azure-5.3.18-150300.38.80.1.x86_64"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2022-2663",
          "url": "https://www.suse.com/security/cve/CVE-2022-2663"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1202097 for CVE-2022-2663",
          "url": "https://bugzilla.suse.com/1202097"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1212299 for CVE-2022-2663",
          "url": "https://bugzilla.suse.com/1212299"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-azure-5.3.18-150300.38.80.1.x86_64",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-azure-devel-5.3.18-150300.38.80.1.x86_64",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-devel-azure-5.3.18-150300.38.80.1.noarch",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-source-azure-5.3.18-150300.38.80.1.noarch",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-syms-azure-5.3.18-150300.38.80.1.x86_64",
            "openSUSE Leap 15.3:cluster-md-kmp-azure-5.3.18-150300.38.80.1.x86_64",
            "openSUSE Leap 15.3:dlm-kmp-azure-5.3.18-150300.38.80.1.x86_64",
            "openSUSE Leap 15.3:gfs2-kmp-azure-5.3.18-150300.38.80.1.x86_64",
            "openSUSE Leap 15.3:kernel-azure-5.3.18-150300.38.80.1.x86_64",
            "openSUSE Leap 15.3:kernel-azure-devel-5.3.18-150300.38.80.1.x86_64",
            "openSUSE Leap 15.3:kernel-azure-extra-5.3.18-150300.38.80.1.x86_64",
            "openSUSE Leap 15.3:kernel-azure-livepatch-devel-5.3.18-150300.38.80.1.x86_64",
            "openSUSE Leap 15.3:kernel-azure-optional-5.3.18-150300.38.80.1.x86_64",
            "openSUSE Leap 15.3:kernel-devel-azure-5.3.18-150300.38.80.1.noarch",
            "openSUSE Leap 15.3:kernel-source-azure-5.3.18-150300.38.80.1.noarch",
            "openSUSE Leap 15.3:kernel-syms-azure-5.3.18-150300.38.80.1.x86_64",
            "openSUSE Leap 15.3:kselftests-kmp-azure-5.3.18-150300.38.80.1.x86_64",
            "openSUSE Leap 15.3:ocfs2-kmp-azure-5.3.18-150300.38.80.1.x86_64",
            "openSUSE Leap 15.3:reiserfs-kmp-azure-5.3.18-150300.38.80.1.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 5.9,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:N",
            "version": "3.1"
          },
          "products": [
            "SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-azure-5.3.18-150300.38.80.1.x86_64",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-azure-devel-5.3.18-150300.38.80.1.x86_64",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-devel-azure-5.3.18-150300.38.80.1.noarch",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-source-azure-5.3.18-150300.38.80.1.noarch",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-syms-azure-5.3.18-150300.38.80.1.x86_64",
            "openSUSE Leap 15.3:cluster-md-kmp-azure-5.3.18-150300.38.80.1.x86_64",
            "openSUSE Leap 15.3:dlm-kmp-azure-5.3.18-150300.38.80.1.x86_64",
            "openSUSE Leap 15.3:gfs2-kmp-azure-5.3.18-150300.38.80.1.x86_64",
            "openSUSE Leap 15.3:kernel-azure-5.3.18-150300.38.80.1.x86_64",
            "openSUSE Leap 15.3:kernel-azure-devel-5.3.18-150300.38.80.1.x86_64",
            "openSUSE Leap 15.3:kernel-azure-extra-5.3.18-150300.38.80.1.x86_64",
            "openSUSE Leap 15.3:kernel-azure-livepatch-devel-5.3.18-150300.38.80.1.x86_64",
            "openSUSE Leap 15.3:kernel-azure-optional-5.3.18-150300.38.80.1.x86_64",
            "openSUSE Leap 15.3:kernel-devel-azure-5.3.18-150300.38.80.1.noarch",
            "openSUSE Leap 15.3:kernel-source-azure-5.3.18-150300.38.80.1.noarch",
            "openSUSE Leap 15.3:kernel-syms-azure-5.3.18-150300.38.80.1.x86_64",
            "openSUSE Leap 15.3:kselftests-kmp-azure-5.3.18-150300.38.80.1.x86_64",
            "openSUSE Leap 15.3:ocfs2-kmp-azure-5.3.18-150300.38.80.1.x86_64",
            "openSUSE Leap 15.3:reiserfs-kmp-azure-5.3.18-150300.38.80.1.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2022-10-18T09:44:53Z",
          "details": "moderate"
        }
      ],
      "title": "CVE-2022-2663"
    },
    {
      "cve": "CVE-2022-2905",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2022-2905"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "An out-of-bounds memory read flaw was found in the Linux kernel\u0027s BPF subsystem in how a user calls the bpf_tail_call function with a key larger than the max_entries of the map. This flaw allows a local user to gain unauthorized access to data.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-azure-5.3.18-150300.38.80.1.x86_64",
          "SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-azure-devel-5.3.18-150300.38.80.1.x86_64",
          "SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-devel-azure-5.3.18-150300.38.80.1.noarch",
          "SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-source-azure-5.3.18-150300.38.80.1.noarch",
          "SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-syms-azure-5.3.18-150300.38.80.1.x86_64",
          "openSUSE Leap 15.3:cluster-md-kmp-azure-5.3.18-150300.38.80.1.x86_64",
          "openSUSE Leap 15.3:dlm-kmp-azure-5.3.18-150300.38.80.1.x86_64",
          "openSUSE Leap 15.3:gfs2-kmp-azure-5.3.18-150300.38.80.1.x86_64",
          "openSUSE Leap 15.3:kernel-azure-5.3.18-150300.38.80.1.x86_64",
          "openSUSE Leap 15.3:kernel-azure-devel-5.3.18-150300.38.80.1.x86_64",
          "openSUSE Leap 15.3:kernel-azure-extra-5.3.18-150300.38.80.1.x86_64",
          "openSUSE Leap 15.3:kernel-azure-livepatch-devel-5.3.18-150300.38.80.1.x86_64",
          "openSUSE Leap 15.3:kernel-azure-optional-5.3.18-150300.38.80.1.x86_64",
          "openSUSE Leap 15.3:kernel-devel-azure-5.3.18-150300.38.80.1.noarch",
          "openSUSE Leap 15.3:kernel-source-azure-5.3.18-150300.38.80.1.noarch",
          "openSUSE Leap 15.3:kernel-syms-azure-5.3.18-150300.38.80.1.x86_64",
          "openSUSE Leap 15.3:kselftests-kmp-azure-5.3.18-150300.38.80.1.x86_64",
          "openSUSE Leap 15.3:ocfs2-kmp-azure-5.3.18-150300.38.80.1.x86_64",
          "openSUSE Leap 15.3:reiserfs-kmp-azure-5.3.18-150300.38.80.1.x86_64"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2022-2905",
          "url": "https://www.suse.com/security/cve/CVE-2022-2905"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1202860 for CVE-2022-2905",
          "url": "https://bugzilla.suse.com/1202860"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-azure-5.3.18-150300.38.80.1.x86_64",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-azure-devel-5.3.18-150300.38.80.1.x86_64",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-devel-azure-5.3.18-150300.38.80.1.noarch",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-source-azure-5.3.18-150300.38.80.1.noarch",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-syms-azure-5.3.18-150300.38.80.1.x86_64",
            "openSUSE Leap 15.3:cluster-md-kmp-azure-5.3.18-150300.38.80.1.x86_64",
            "openSUSE Leap 15.3:dlm-kmp-azure-5.3.18-150300.38.80.1.x86_64",
            "openSUSE Leap 15.3:gfs2-kmp-azure-5.3.18-150300.38.80.1.x86_64",
            "openSUSE Leap 15.3:kernel-azure-5.3.18-150300.38.80.1.x86_64",
            "openSUSE Leap 15.3:kernel-azure-devel-5.3.18-150300.38.80.1.x86_64",
            "openSUSE Leap 15.3:kernel-azure-extra-5.3.18-150300.38.80.1.x86_64",
            "openSUSE Leap 15.3:kernel-azure-livepatch-devel-5.3.18-150300.38.80.1.x86_64",
            "openSUSE Leap 15.3:kernel-azure-optional-5.3.18-150300.38.80.1.x86_64",
            "openSUSE Leap 15.3:kernel-devel-azure-5.3.18-150300.38.80.1.noarch",
            "openSUSE Leap 15.3:kernel-source-azure-5.3.18-150300.38.80.1.noarch",
            "openSUSE Leap 15.3:kernel-syms-azure-5.3.18-150300.38.80.1.x86_64",
            "openSUSE Leap 15.3:kselftests-kmp-azure-5.3.18-150300.38.80.1.x86_64",
            "openSUSE Leap 15.3:ocfs2-kmp-azure-5.3.18-150300.38.80.1.x86_64",
            "openSUSE Leap 15.3:reiserfs-kmp-azure-5.3.18-150300.38.80.1.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 6.2,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N",
            "version": "3.1"
          },
          "products": [
            "SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-azure-5.3.18-150300.38.80.1.x86_64",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-azure-devel-5.3.18-150300.38.80.1.x86_64",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-devel-azure-5.3.18-150300.38.80.1.noarch",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-source-azure-5.3.18-150300.38.80.1.noarch",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-syms-azure-5.3.18-150300.38.80.1.x86_64",
            "openSUSE Leap 15.3:cluster-md-kmp-azure-5.3.18-150300.38.80.1.x86_64",
            "openSUSE Leap 15.3:dlm-kmp-azure-5.3.18-150300.38.80.1.x86_64",
            "openSUSE Leap 15.3:gfs2-kmp-azure-5.3.18-150300.38.80.1.x86_64",
            "openSUSE Leap 15.3:kernel-azure-5.3.18-150300.38.80.1.x86_64",
            "openSUSE Leap 15.3:kernel-azure-devel-5.3.18-150300.38.80.1.x86_64",
            "openSUSE Leap 15.3:kernel-azure-extra-5.3.18-150300.38.80.1.x86_64",
            "openSUSE Leap 15.3:kernel-azure-livepatch-devel-5.3.18-150300.38.80.1.x86_64",
            "openSUSE Leap 15.3:kernel-azure-optional-5.3.18-150300.38.80.1.x86_64",
            "openSUSE Leap 15.3:kernel-devel-azure-5.3.18-150300.38.80.1.noarch",
            "openSUSE Leap 15.3:kernel-source-azure-5.3.18-150300.38.80.1.noarch",
            "openSUSE Leap 15.3:kernel-syms-azure-5.3.18-150300.38.80.1.x86_64",
            "openSUSE Leap 15.3:kselftests-kmp-azure-5.3.18-150300.38.80.1.x86_64",
            "openSUSE Leap 15.3:ocfs2-kmp-azure-5.3.18-150300.38.80.1.x86_64",
            "openSUSE Leap 15.3:reiserfs-kmp-azure-5.3.18-150300.38.80.1.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2022-10-18T09:44:53Z",
          "details": "moderate"
        }
      ],
      "title": "CVE-2022-2905"
    },
    {
      "cve": "CVE-2022-2977",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2022-2977"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "A flaw was found in the Linux kernel implementation of proxied virtualized TPM devices. On a system where virtualized TPM devices are configured (this is not the default) a local attacker can create a use-after-free and create a situation where it may be possible to escalate privileges on the system.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-azure-5.3.18-150300.38.80.1.x86_64",
          "SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-azure-devel-5.3.18-150300.38.80.1.x86_64",
          "SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-devel-azure-5.3.18-150300.38.80.1.noarch",
          "SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-source-azure-5.3.18-150300.38.80.1.noarch",
          "SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-syms-azure-5.3.18-150300.38.80.1.x86_64",
          "openSUSE Leap 15.3:cluster-md-kmp-azure-5.3.18-150300.38.80.1.x86_64",
          "openSUSE Leap 15.3:dlm-kmp-azure-5.3.18-150300.38.80.1.x86_64",
          "openSUSE Leap 15.3:gfs2-kmp-azure-5.3.18-150300.38.80.1.x86_64",
          "openSUSE Leap 15.3:kernel-azure-5.3.18-150300.38.80.1.x86_64",
          "openSUSE Leap 15.3:kernel-azure-devel-5.3.18-150300.38.80.1.x86_64",
          "openSUSE Leap 15.3:kernel-azure-extra-5.3.18-150300.38.80.1.x86_64",
          "openSUSE Leap 15.3:kernel-azure-livepatch-devel-5.3.18-150300.38.80.1.x86_64",
          "openSUSE Leap 15.3:kernel-azure-optional-5.3.18-150300.38.80.1.x86_64",
          "openSUSE Leap 15.3:kernel-devel-azure-5.3.18-150300.38.80.1.noarch",
          "openSUSE Leap 15.3:kernel-source-azure-5.3.18-150300.38.80.1.noarch",
          "openSUSE Leap 15.3:kernel-syms-azure-5.3.18-150300.38.80.1.x86_64",
          "openSUSE Leap 15.3:kselftests-kmp-azure-5.3.18-150300.38.80.1.x86_64",
          "openSUSE Leap 15.3:ocfs2-kmp-azure-5.3.18-150300.38.80.1.x86_64",
          "openSUSE Leap 15.3:reiserfs-kmp-azure-5.3.18-150300.38.80.1.x86_64"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2022-2977",
          "url": "https://www.suse.com/security/cve/CVE-2022-2977"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1202672 for CVE-2022-2977",
          "url": "https://bugzilla.suse.com/1202672"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-azure-5.3.18-150300.38.80.1.x86_64",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-azure-devel-5.3.18-150300.38.80.1.x86_64",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-devel-azure-5.3.18-150300.38.80.1.noarch",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-source-azure-5.3.18-150300.38.80.1.noarch",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-syms-azure-5.3.18-150300.38.80.1.x86_64",
            "openSUSE Leap 15.3:cluster-md-kmp-azure-5.3.18-150300.38.80.1.x86_64",
            "openSUSE Leap 15.3:dlm-kmp-azure-5.3.18-150300.38.80.1.x86_64",
            "openSUSE Leap 15.3:gfs2-kmp-azure-5.3.18-150300.38.80.1.x86_64",
            "openSUSE Leap 15.3:kernel-azure-5.3.18-150300.38.80.1.x86_64",
            "openSUSE Leap 15.3:kernel-azure-devel-5.3.18-150300.38.80.1.x86_64",
            "openSUSE Leap 15.3:kernel-azure-extra-5.3.18-150300.38.80.1.x86_64",
            "openSUSE Leap 15.3:kernel-azure-livepatch-devel-5.3.18-150300.38.80.1.x86_64",
            "openSUSE Leap 15.3:kernel-azure-optional-5.3.18-150300.38.80.1.x86_64",
            "openSUSE Leap 15.3:kernel-devel-azure-5.3.18-150300.38.80.1.noarch",
            "openSUSE Leap 15.3:kernel-source-azure-5.3.18-150300.38.80.1.noarch",
            "openSUSE Leap 15.3:kernel-syms-azure-5.3.18-150300.38.80.1.x86_64",
            "openSUSE Leap 15.3:kselftests-kmp-azure-5.3.18-150300.38.80.1.x86_64",
            "openSUSE Leap 15.3:ocfs2-kmp-azure-5.3.18-150300.38.80.1.x86_64",
            "openSUSE Leap 15.3:reiserfs-kmp-azure-5.3.18-150300.38.80.1.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 4.2,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:R/S:U/C:N/I:N/A:H",
            "version": "3.1"
          },
          "products": [
            "SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-azure-5.3.18-150300.38.80.1.x86_64",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-azure-devel-5.3.18-150300.38.80.1.x86_64",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-devel-azure-5.3.18-150300.38.80.1.noarch",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-source-azure-5.3.18-150300.38.80.1.noarch",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-syms-azure-5.3.18-150300.38.80.1.x86_64",
            "openSUSE Leap 15.3:cluster-md-kmp-azure-5.3.18-150300.38.80.1.x86_64",
            "openSUSE Leap 15.3:dlm-kmp-azure-5.3.18-150300.38.80.1.x86_64",
            "openSUSE Leap 15.3:gfs2-kmp-azure-5.3.18-150300.38.80.1.x86_64",
            "openSUSE Leap 15.3:kernel-azure-5.3.18-150300.38.80.1.x86_64",
            "openSUSE Leap 15.3:kernel-azure-devel-5.3.18-150300.38.80.1.x86_64",
            "openSUSE Leap 15.3:kernel-azure-extra-5.3.18-150300.38.80.1.x86_64",
            "openSUSE Leap 15.3:kernel-azure-livepatch-devel-5.3.18-150300.38.80.1.x86_64",
            "openSUSE Leap 15.3:kernel-azure-optional-5.3.18-150300.38.80.1.x86_64",
            "openSUSE Leap 15.3:kernel-devel-azure-5.3.18-150300.38.80.1.noarch",
            "openSUSE Leap 15.3:kernel-source-azure-5.3.18-150300.38.80.1.noarch",
            "openSUSE Leap 15.3:kernel-syms-azure-5.3.18-150300.38.80.1.x86_64",
            "openSUSE Leap 15.3:kselftests-kmp-azure-5.3.18-150300.38.80.1.x86_64",
            "openSUSE Leap 15.3:ocfs2-kmp-azure-5.3.18-150300.38.80.1.x86_64",
            "openSUSE Leap 15.3:reiserfs-kmp-azure-5.3.18-150300.38.80.1.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2022-10-18T09:44:53Z",
          "details": "moderate"
        }
      ],
      "title": "CVE-2022-2977"
    },
    {
      "cve": "CVE-2022-3028",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2022-3028"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "A race condition was found in the Linux kernel\u0027s IP framework for transforming packets (XFRM subsystem) when multiple calls to xfrm_probe_algs occurred simultaneously. This flaw could allow a local attacker to potentially trigger an out-of-bounds write or leak kernel heap memory by performing an out-of-bounds read and copying it into a socket.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-azure-5.3.18-150300.38.80.1.x86_64",
          "SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-azure-devel-5.3.18-150300.38.80.1.x86_64",
          "SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-devel-azure-5.3.18-150300.38.80.1.noarch",
          "SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-source-azure-5.3.18-150300.38.80.1.noarch",
          "SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-syms-azure-5.3.18-150300.38.80.1.x86_64",
          "openSUSE Leap 15.3:cluster-md-kmp-azure-5.3.18-150300.38.80.1.x86_64",
          "openSUSE Leap 15.3:dlm-kmp-azure-5.3.18-150300.38.80.1.x86_64",
          "openSUSE Leap 15.3:gfs2-kmp-azure-5.3.18-150300.38.80.1.x86_64",
          "openSUSE Leap 15.3:kernel-azure-5.3.18-150300.38.80.1.x86_64",
          "openSUSE Leap 15.3:kernel-azure-devel-5.3.18-150300.38.80.1.x86_64",
          "openSUSE Leap 15.3:kernel-azure-extra-5.3.18-150300.38.80.1.x86_64",
          "openSUSE Leap 15.3:kernel-azure-livepatch-devel-5.3.18-150300.38.80.1.x86_64",
          "openSUSE Leap 15.3:kernel-azure-optional-5.3.18-150300.38.80.1.x86_64",
          "openSUSE Leap 15.3:kernel-devel-azure-5.3.18-150300.38.80.1.noarch",
          "openSUSE Leap 15.3:kernel-source-azure-5.3.18-150300.38.80.1.noarch",
          "openSUSE Leap 15.3:kernel-syms-azure-5.3.18-150300.38.80.1.x86_64",
          "openSUSE Leap 15.3:kselftests-kmp-azure-5.3.18-150300.38.80.1.x86_64",
          "openSUSE Leap 15.3:ocfs2-kmp-azure-5.3.18-150300.38.80.1.x86_64",
          "openSUSE Leap 15.3:reiserfs-kmp-azure-5.3.18-150300.38.80.1.x86_64"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2022-3028",
          "url": "https://www.suse.com/security/cve/CVE-2022-3028"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1202898 for CVE-2022-3028",
          "url": "https://bugzilla.suse.com/1202898"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1212296 for CVE-2022-3028",
          "url": "https://bugzilla.suse.com/1212296"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-azure-5.3.18-150300.38.80.1.x86_64",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-azure-devel-5.3.18-150300.38.80.1.x86_64",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-devel-azure-5.3.18-150300.38.80.1.noarch",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-source-azure-5.3.18-150300.38.80.1.noarch",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-syms-azure-5.3.18-150300.38.80.1.x86_64",
            "openSUSE Leap 15.3:cluster-md-kmp-azure-5.3.18-150300.38.80.1.x86_64",
            "openSUSE Leap 15.3:dlm-kmp-azure-5.3.18-150300.38.80.1.x86_64",
            "openSUSE Leap 15.3:gfs2-kmp-azure-5.3.18-150300.38.80.1.x86_64",
            "openSUSE Leap 15.3:kernel-azure-5.3.18-150300.38.80.1.x86_64",
            "openSUSE Leap 15.3:kernel-azure-devel-5.3.18-150300.38.80.1.x86_64",
            "openSUSE Leap 15.3:kernel-azure-extra-5.3.18-150300.38.80.1.x86_64",
            "openSUSE Leap 15.3:kernel-azure-livepatch-devel-5.3.18-150300.38.80.1.x86_64",
            "openSUSE Leap 15.3:kernel-azure-optional-5.3.18-150300.38.80.1.x86_64",
            "openSUSE Leap 15.3:kernel-devel-azure-5.3.18-150300.38.80.1.noarch",
            "openSUSE Leap 15.3:kernel-source-azure-5.3.18-150300.38.80.1.noarch",
            "openSUSE Leap 15.3:kernel-syms-azure-5.3.18-150300.38.80.1.x86_64",
            "openSUSE Leap 15.3:kselftests-kmp-azure-5.3.18-150300.38.80.1.x86_64",
            "openSUSE Leap 15.3:ocfs2-kmp-azure-5.3.18-150300.38.80.1.x86_64",
            "openSUSE Leap 15.3:reiserfs-kmp-azure-5.3.18-150300.38.80.1.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 6.7,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H",
            "version": "3.1"
          },
          "products": [
            "SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-azure-5.3.18-150300.38.80.1.x86_64",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-azure-devel-5.3.18-150300.38.80.1.x86_64",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-devel-azure-5.3.18-150300.38.80.1.noarch",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-source-azure-5.3.18-150300.38.80.1.noarch",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-syms-azure-5.3.18-150300.38.80.1.x86_64",
            "openSUSE Leap 15.3:cluster-md-kmp-azure-5.3.18-150300.38.80.1.x86_64",
            "openSUSE Leap 15.3:dlm-kmp-azure-5.3.18-150300.38.80.1.x86_64",
            "openSUSE Leap 15.3:gfs2-kmp-azure-5.3.18-150300.38.80.1.x86_64",
            "openSUSE Leap 15.3:kernel-azure-5.3.18-150300.38.80.1.x86_64",
            "openSUSE Leap 15.3:kernel-azure-devel-5.3.18-150300.38.80.1.x86_64",
            "openSUSE Leap 15.3:kernel-azure-extra-5.3.18-150300.38.80.1.x86_64",
            "openSUSE Leap 15.3:kernel-azure-livepatch-devel-5.3.18-150300.38.80.1.x86_64",
            "openSUSE Leap 15.3:kernel-azure-optional-5.3.18-150300.38.80.1.x86_64",
            "openSUSE Leap 15.3:kernel-devel-azure-5.3.18-150300.38.80.1.noarch",
            "openSUSE Leap 15.3:kernel-source-azure-5.3.18-150300.38.80.1.noarch",
            "openSUSE Leap 15.3:kernel-syms-azure-5.3.18-150300.38.80.1.x86_64",
            "openSUSE Leap 15.3:kselftests-kmp-azure-5.3.18-150300.38.80.1.x86_64",
            "openSUSE Leap 15.3:ocfs2-kmp-azure-5.3.18-150300.38.80.1.x86_64",
            "openSUSE Leap 15.3:reiserfs-kmp-azure-5.3.18-150300.38.80.1.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2022-10-18T09:44:53Z",
          "details": "moderate"
        }
      ],
      "title": "CVE-2022-3028"
    },
    {
      "cve": "CVE-2022-3239",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2022-3239"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "A flaw use after free in the Linux kernel video4linux driver was found in the way user triggers em28xx_usb_probe() for the Empia 28xx based TV cards. A local user could use this flaw to crash the system or potentially escalate their privileges on the system.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-azure-5.3.18-150300.38.80.1.x86_64",
          "SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-azure-devel-5.3.18-150300.38.80.1.x86_64",
          "SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-devel-azure-5.3.18-150300.38.80.1.noarch",
          "SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-source-azure-5.3.18-150300.38.80.1.noarch",
          "SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-syms-azure-5.3.18-150300.38.80.1.x86_64",
          "openSUSE Leap 15.3:cluster-md-kmp-azure-5.3.18-150300.38.80.1.x86_64",
          "openSUSE Leap 15.3:dlm-kmp-azure-5.3.18-150300.38.80.1.x86_64",
          "openSUSE Leap 15.3:gfs2-kmp-azure-5.3.18-150300.38.80.1.x86_64",
          "openSUSE Leap 15.3:kernel-azure-5.3.18-150300.38.80.1.x86_64",
          "openSUSE Leap 15.3:kernel-azure-devel-5.3.18-150300.38.80.1.x86_64",
          "openSUSE Leap 15.3:kernel-azure-extra-5.3.18-150300.38.80.1.x86_64",
          "openSUSE Leap 15.3:kernel-azure-livepatch-devel-5.3.18-150300.38.80.1.x86_64",
          "openSUSE Leap 15.3:kernel-azure-optional-5.3.18-150300.38.80.1.x86_64",
          "openSUSE Leap 15.3:kernel-devel-azure-5.3.18-150300.38.80.1.noarch",
          "openSUSE Leap 15.3:kernel-source-azure-5.3.18-150300.38.80.1.noarch",
          "openSUSE Leap 15.3:kernel-syms-azure-5.3.18-150300.38.80.1.x86_64",
          "openSUSE Leap 15.3:kselftests-kmp-azure-5.3.18-150300.38.80.1.x86_64",
          "openSUSE Leap 15.3:ocfs2-kmp-azure-5.3.18-150300.38.80.1.x86_64",
          "openSUSE Leap 15.3:reiserfs-kmp-azure-5.3.18-150300.38.80.1.x86_64"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2022-3239",
          "url": "https://www.suse.com/security/cve/CVE-2022-3239"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1203552 for CVE-2022-3239",
          "url": "https://bugzilla.suse.com/1203552"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-azure-5.3.18-150300.38.80.1.x86_64",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-azure-devel-5.3.18-150300.38.80.1.x86_64",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-devel-azure-5.3.18-150300.38.80.1.noarch",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-source-azure-5.3.18-150300.38.80.1.noarch",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-syms-azure-5.3.18-150300.38.80.1.x86_64",
            "openSUSE Leap 15.3:cluster-md-kmp-azure-5.3.18-150300.38.80.1.x86_64",
            "openSUSE Leap 15.3:dlm-kmp-azure-5.3.18-150300.38.80.1.x86_64",
            "openSUSE Leap 15.3:gfs2-kmp-azure-5.3.18-150300.38.80.1.x86_64",
            "openSUSE Leap 15.3:kernel-azure-5.3.18-150300.38.80.1.x86_64",
            "openSUSE Leap 15.3:kernel-azure-devel-5.3.18-150300.38.80.1.x86_64",
            "openSUSE Leap 15.3:kernel-azure-extra-5.3.18-150300.38.80.1.x86_64",
            "openSUSE Leap 15.3:kernel-azure-livepatch-devel-5.3.18-150300.38.80.1.x86_64",
            "openSUSE Leap 15.3:kernel-azure-optional-5.3.18-150300.38.80.1.x86_64",
            "openSUSE Leap 15.3:kernel-devel-azure-5.3.18-150300.38.80.1.noarch",
            "openSUSE Leap 15.3:kernel-source-azure-5.3.18-150300.38.80.1.noarch",
            "openSUSE Leap 15.3:kernel-syms-azure-5.3.18-150300.38.80.1.x86_64",
            "openSUSE Leap 15.3:kselftests-kmp-azure-5.3.18-150300.38.80.1.x86_64",
            "openSUSE Leap 15.3:ocfs2-kmp-azure-5.3.18-150300.38.80.1.x86_64",
            "openSUSE Leap 15.3:reiserfs-kmp-azure-5.3.18-150300.38.80.1.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 6.4,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H",
            "version": "3.1"
          },
          "products": [
            "SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-azure-5.3.18-150300.38.80.1.x86_64",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-azure-devel-5.3.18-150300.38.80.1.x86_64",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-devel-azure-5.3.18-150300.38.80.1.noarch",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-source-azure-5.3.18-150300.38.80.1.noarch",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-syms-azure-5.3.18-150300.38.80.1.x86_64",
            "openSUSE Leap 15.3:cluster-md-kmp-azure-5.3.18-150300.38.80.1.x86_64",
            "openSUSE Leap 15.3:dlm-kmp-azure-5.3.18-150300.38.80.1.x86_64",
            "openSUSE Leap 15.3:gfs2-kmp-azure-5.3.18-150300.38.80.1.x86_64",
            "openSUSE Leap 15.3:kernel-azure-5.3.18-150300.38.80.1.x86_64",
            "openSUSE Leap 15.3:kernel-azure-devel-5.3.18-150300.38.80.1.x86_64",
            "openSUSE Leap 15.3:kernel-azure-extra-5.3.18-150300.38.80.1.x86_64",
            "openSUSE Leap 15.3:kernel-azure-livepatch-devel-5.3.18-150300.38.80.1.x86_64",
            "openSUSE Leap 15.3:kernel-azure-optional-5.3.18-150300.38.80.1.x86_64",
            "openSUSE Leap 15.3:kernel-devel-azure-5.3.18-150300.38.80.1.noarch",
            "openSUSE Leap 15.3:kernel-source-azure-5.3.18-150300.38.80.1.noarch",
            "openSUSE Leap 15.3:kernel-syms-azure-5.3.18-150300.38.80.1.x86_64",
            "openSUSE Leap 15.3:kselftests-kmp-azure-5.3.18-150300.38.80.1.x86_64",
            "openSUSE Leap 15.3:ocfs2-kmp-azure-5.3.18-150300.38.80.1.x86_64",
            "openSUSE Leap 15.3:reiserfs-kmp-azure-5.3.18-150300.38.80.1.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2022-10-18T09:44:53Z",
          "details": "moderate"
        }
      ],
      "title": "CVE-2022-3239"
    },
    {
      "cve": "CVE-2022-3303",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2022-3303"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "A race condition flaw was found in the Linux kernel sound subsystem due to improper locking. It could lead to a NULL pointer dereference while handling the SNDCTL_DSP_SYNC ioctl. A privileged local user (root or member of the audio group) could use this flaw to crash the system, resulting in a denial of service condition",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-azure-5.3.18-150300.38.80.1.x86_64",
          "SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-azure-devel-5.3.18-150300.38.80.1.x86_64",
          "SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-devel-azure-5.3.18-150300.38.80.1.noarch",
          "SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-source-azure-5.3.18-150300.38.80.1.noarch",
          "SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-syms-azure-5.3.18-150300.38.80.1.x86_64",
          "openSUSE Leap 15.3:cluster-md-kmp-azure-5.3.18-150300.38.80.1.x86_64",
          "openSUSE Leap 15.3:dlm-kmp-azure-5.3.18-150300.38.80.1.x86_64",
          "openSUSE Leap 15.3:gfs2-kmp-azure-5.3.18-150300.38.80.1.x86_64",
          "openSUSE Leap 15.3:kernel-azure-5.3.18-150300.38.80.1.x86_64",
          "openSUSE Leap 15.3:kernel-azure-devel-5.3.18-150300.38.80.1.x86_64",
          "openSUSE Leap 15.3:kernel-azure-extra-5.3.18-150300.38.80.1.x86_64",
          "openSUSE Leap 15.3:kernel-azure-livepatch-devel-5.3.18-150300.38.80.1.x86_64",
          "openSUSE Leap 15.3:kernel-azure-optional-5.3.18-150300.38.80.1.x86_64",
          "openSUSE Leap 15.3:kernel-devel-azure-5.3.18-150300.38.80.1.noarch",
          "openSUSE Leap 15.3:kernel-source-azure-5.3.18-150300.38.80.1.noarch",
          "openSUSE Leap 15.3:kernel-syms-azure-5.3.18-150300.38.80.1.x86_64",
          "openSUSE Leap 15.3:kselftests-kmp-azure-5.3.18-150300.38.80.1.x86_64",
          "openSUSE Leap 15.3:ocfs2-kmp-azure-5.3.18-150300.38.80.1.x86_64",
          "openSUSE Leap 15.3:reiserfs-kmp-azure-5.3.18-150300.38.80.1.x86_64"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2022-3303",
          "url": "https://www.suse.com/security/cve/CVE-2022-3303"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1203769 for CVE-2022-3303",
          "url": "https://bugzilla.suse.com/1203769"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1212304 for CVE-2022-3303",
          "url": "https://bugzilla.suse.com/1212304"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-azure-5.3.18-150300.38.80.1.x86_64",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-azure-devel-5.3.18-150300.38.80.1.x86_64",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-devel-azure-5.3.18-150300.38.80.1.noarch",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-source-azure-5.3.18-150300.38.80.1.noarch",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-syms-azure-5.3.18-150300.38.80.1.x86_64",
            "openSUSE Leap 15.3:cluster-md-kmp-azure-5.3.18-150300.38.80.1.x86_64",
            "openSUSE Leap 15.3:dlm-kmp-azure-5.3.18-150300.38.80.1.x86_64",
            "openSUSE Leap 15.3:gfs2-kmp-azure-5.3.18-150300.38.80.1.x86_64",
            "openSUSE Leap 15.3:kernel-azure-5.3.18-150300.38.80.1.x86_64",
            "openSUSE Leap 15.3:kernel-azure-devel-5.3.18-150300.38.80.1.x86_64",
            "openSUSE Leap 15.3:kernel-azure-extra-5.3.18-150300.38.80.1.x86_64",
            "openSUSE Leap 15.3:kernel-azure-livepatch-devel-5.3.18-150300.38.80.1.x86_64",
            "openSUSE Leap 15.3:kernel-azure-optional-5.3.18-150300.38.80.1.x86_64",
            "openSUSE Leap 15.3:kernel-devel-azure-5.3.18-150300.38.80.1.noarch",
            "openSUSE Leap 15.3:kernel-source-azure-5.3.18-150300.38.80.1.noarch",
            "openSUSE Leap 15.3:kernel-syms-azure-5.3.18-150300.38.80.1.x86_64",
            "openSUSE Leap 15.3:kselftests-kmp-azure-5.3.18-150300.38.80.1.x86_64",
            "openSUSE Leap 15.3:ocfs2-kmp-azure-5.3.18-150300.38.80.1.x86_64",
            "openSUSE Leap 15.3:reiserfs-kmp-azure-5.3.18-150300.38.80.1.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 4.4,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H",
            "version": "3.1"
          },
          "products": [
            "SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-azure-5.3.18-150300.38.80.1.x86_64",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-azure-devel-5.3.18-150300.38.80.1.x86_64",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-devel-azure-5.3.18-150300.38.80.1.noarch",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-source-azure-5.3.18-150300.38.80.1.noarch",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-syms-azure-5.3.18-150300.38.80.1.x86_64",
            "openSUSE Leap 15.3:cluster-md-kmp-azure-5.3.18-150300.38.80.1.x86_64",
            "openSUSE Leap 15.3:dlm-kmp-azure-5.3.18-150300.38.80.1.x86_64",
            "openSUSE Leap 15.3:gfs2-kmp-azure-5.3.18-150300.38.80.1.x86_64",
            "openSUSE Leap 15.3:kernel-azure-5.3.18-150300.38.80.1.x86_64",
            "openSUSE Leap 15.3:kernel-azure-devel-5.3.18-150300.38.80.1.x86_64",
            "openSUSE Leap 15.3:kernel-azure-extra-5.3.18-150300.38.80.1.x86_64",
            "openSUSE Leap 15.3:kernel-azure-livepatch-devel-5.3.18-150300.38.80.1.x86_64",
            "openSUSE Leap 15.3:kernel-azure-optional-5.3.18-150300.38.80.1.x86_64",
            "openSUSE Leap 15.3:kernel-devel-azure-5.3.18-150300.38.80.1.noarch",
            "openSUSE Leap 15.3:kernel-source-azure-5.3.18-150300.38.80.1.noarch",
            "openSUSE Leap 15.3:kernel-syms-azure-5.3.18-150300.38.80.1.x86_64",
            "openSUSE Leap 15.3:kselftests-kmp-azure-5.3.18-150300.38.80.1.x86_64",
            "openSUSE Leap 15.3:ocfs2-kmp-azure-5.3.18-150300.38.80.1.x86_64",
            "openSUSE Leap 15.3:reiserfs-kmp-azure-5.3.18-150300.38.80.1.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2022-10-18T09:44:53Z",
          "details": "moderate"
        }
      ],
      "title": "CVE-2022-3303"
    },
    {
      "cve": "CVE-2022-36879",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2022-36879"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "An issue was discovered in the Linux kernel through 5.18.14. xfrm_expand_policies in net/xfrm/xfrm_policy.c can cause a refcount to be dropped twice.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-azure-5.3.18-150300.38.80.1.x86_64",
          "SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-azure-devel-5.3.18-150300.38.80.1.x86_64",
          "SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-devel-azure-5.3.18-150300.38.80.1.noarch",
          "SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-source-azure-5.3.18-150300.38.80.1.noarch",
          "SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-syms-azure-5.3.18-150300.38.80.1.x86_64",
          "openSUSE Leap 15.3:cluster-md-kmp-azure-5.3.18-150300.38.80.1.x86_64",
          "openSUSE Leap 15.3:dlm-kmp-azure-5.3.18-150300.38.80.1.x86_64",
          "openSUSE Leap 15.3:gfs2-kmp-azure-5.3.18-150300.38.80.1.x86_64",
          "openSUSE Leap 15.3:kernel-azure-5.3.18-150300.38.80.1.x86_64",
          "openSUSE Leap 15.3:kernel-azure-devel-5.3.18-150300.38.80.1.x86_64",
          "openSUSE Leap 15.3:kernel-azure-extra-5.3.18-150300.38.80.1.x86_64",
          "openSUSE Leap 15.3:kernel-azure-livepatch-devel-5.3.18-150300.38.80.1.x86_64",
          "openSUSE Leap 15.3:kernel-azure-optional-5.3.18-150300.38.80.1.x86_64",
          "openSUSE Leap 15.3:kernel-devel-azure-5.3.18-150300.38.80.1.noarch",
          "openSUSE Leap 15.3:kernel-source-azure-5.3.18-150300.38.80.1.noarch",
          "openSUSE Leap 15.3:kernel-syms-azure-5.3.18-150300.38.80.1.x86_64",
          "openSUSE Leap 15.3:kselftests-kmp-azure-5.3.18-150300.38.80.1.x86_64",
          "openSUSE Leap 15.3:ocfs2-kmp-azure-5.3.18-150300.38.80.1.x86_64",
          "openSUSE Leap 15.3:reiserfs-kmp-azure-5.3.18-150300.38.80.1.x86_64"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2022-36879",
          "url": "https://www.suse.com/security/cve/CVE-2022-36879"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1201948 for CVE-2022-36879",
          "url": "https://bugzilla.suse.com/1201948"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1212327 for CVE-2022-36879",
          "url": "https://bugzilla.suse.com/1212327"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-azure-5.3.18-150300.38.80.1.x86_64",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-azure-devel-5.3.18-150300.38.80.1.x86_64",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-devel-azure-5.3.18-150300.38.80.1.noarch",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-source-azure-5.3.18-150300.38.80.1.noarch",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-syms-azure-5.3.18-150300.38.80.1.x86_64",
            "openSUSE Leap 15.3:cluster-md-kmp-azure-5.3.18-150300.38.80.1.x86_64",
            "openSUSE Leap 15.3:dlm-kmp-azure-5.3.18-150300.38.80.1.x86_64",
            "openSUSE Leap 15.3:gfs2-kmp-azure-5.3.18-150300.38.80.1.x86_64",
            "openSUSE Leap 15.3:kernel-azure-5.3.18-150300.38.80.1.x86_64",
            "openSUSE Leap 15.3:kernel-azure-devel-5.3.18-150300.38.80.1.x86_64",
            "openSUSE Leap 15.3:kernel-azure-extra-5.3.18-150300.38.80.1.x86_64",
            "openSUSE Leap 15.3:kernel-azure-livepatch-devel-5.3.18-150300.38.80.1.x86_64",
            "openSUSE Leap 15.3:kernel-azure-optional-5.3.18-150300.38.80.1.x86_64",
            "openSUSE Leap 15.3:kernel-devel-azure-5.3.18-150300.38.80.1.noarch",
            "openSUSE Leap 15.3:kernel-source-azure-5.3.18-150300.38.80.1.noarch",
            "openSUSE Leap 15.3:kernel-syms-azure-5.3.18-150300.38.80.1.x86_64",
            "openSUSE Leap 15.3:kselftests-kmp-azure-5.3.18-150300.38.80.1.x86_64",
            "openSUSE Leap 15.3:ocfs2-kmp-azure-5.3.18-150300.38.80.1.x86_64",
            "openSUSE Leap 15.3:reiserfs-kmp-azure-5.3.18-150300.38.80.1.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 4.1,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:N/I:N/A:H",
            "version": "3.1"
          },
          "products": [
            "SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-azure-5.3.18-150300.38.80.1.x86_64",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-azure-devel-5.3.18-150300.38.80.1.x86_64",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-devel-azure-5.3.18-150300.38.80.1.noarch",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-source-azure-5.3.18-150300.38.80.1.noarch",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-syms-azure-5.3.18-150300.38.80.1.x86_64",
            "openSUSE Leap 15.3:cluster-md-kmp-azure-5.3.18-150300.38.80.1.x86_64",
            "openSUSE Leap 15.3:dlm-kmp-azure-5.3.18-150300.38.80.1.x86_64",
            "openSUSE Leap 15.3:gfs2-kmp-azure-5.3.18-150300.38.80.1.x86_64",
            "openSUSE Leap 15.3:kernel-azure-5.3.18-150300.38.80.1.x86_64",
            "openSUSE Leap 15.3:kernel-azure-devel-5.3.18-150300.38.80.1.x86_64",
            "openSUSE Leap 15.3:kernel-azure-extra-5.3.18-150300.38.80.1.x86_64",
            "openSUSE Leap 15.3:kernel-azure-livepatch-devel-5.3.18-150300.38.80.1.x86_64",
            "openSUSE Leap 15.3:kernel-azure-optional-5.3.18-150300.38.80.1.x86_64",
            "openSUSE Leap 15.3:kernel-devel-azure-5.3.18-150300.38.80.1.noarch",
            "openSUSE Leap 15.3:kernel-source-azure-5.3.18-150300.38.80.1.noarch",
            "openSUSE Leap 15.3:kernel-syms-azure-5.3.18-150300.38.80.1.x86_64",
            "openSUSE Leap 15.3:kselftests-kmp-azure-5.3.18-150300.38.80.1.x86_64",
            "openSUSE Leap 15.3:ocfs2-kmp-azure-5.3.18-150300.38.80.1.x86_64",
            "openSUSE Leap 15.3:reiserfs-kmp-azure-5.3.18-150300.38.80.1.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2022-10-18T09:44:53Z",
          "details": "moderate"
        }
      ],
      "title": "CVE-2022-36879"
    },
    {
      "cve": "CVE-2022-39188",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2022-39188"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "An issue was discovered in include/asm-generic/tlb.h in the Linux kernel before 5.19. Because of a race condition (unmap_mapping_range versus munmap), a device driver can free a page while it still has stale TLB entries. This only occurs in situations with VM_PFNMAP VMAs.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-azure-5.3.18-150300.38.80.1.x86_64",
          "SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-azure-devel-5.3.18-150300.38.80.1.x86_64",
          "SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-devel-azure-5.3.18-150300.38.80.1.noarch",
          "SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-source-azure-5.3.18-150300.38.80.1.noarch",
          "SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-syms-azure-5.3.18-150300.38.80.1.x86_64",
          "openSUSE Leap 15.3:cluster-md-kmp-azure-5.3.18-150300.38.80.1.x86_64",
          "openSUSE Leap 15.3:dlm-kmp-azure-5.3.18-150300.38.80.1.x86_64",
          "openSUSE Leap 15.3:gfs2-kmp-azure-5.3.18-150300.38.80.1.x86_64",
          "openSUSE Leap 15.3:kernel-azure-5.3.18-150300.38.80.1.x86_64",
          "openSUSE Leap 15.3:kernel-azure-devel-5.3.18-150300.38.80.1.x86_64",
          "openSUSE Leap 15.3:kernel-azure-extra-5.3.18-150300.38.80.1.x86_64",
          "openSUSE Leap 15.3:kernel-azure-livepatch-devel-5.3.18-150300.38.80.1.x86_64",
          "openSUSE Leap 15.3:kernel-azure-optional-5.3.18-150300.38.80.1.x86_64",
          "openSUSE Leap 15.3:kernel-devel-azure-5.3.18-150300.38.80.1.noarch",
          "openSUSE Leap 15.3:kernel-source-azure-5.3.18-150300.38.80.1.noarch",
          "openSUSE Leap 15.3:kernel-syms-azure-5.3.18-150300.38.80.1.x86_64",
          "openSUSE Leap 15.3:kselftests-kmp-azure-5.3.18-150300.38.80.1.x86_64",
          "openSUSE Leap 15.3:ocfs2-kmp-azure-5.3.18-150300.38.80.1.x86_64",
          "openSUSE Leap 15.3:reiserfs-kmp-azure-5.3.18-150300.38.80.1.x86_64"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2022-39188",
          "url": "https://www.suse.com/security/cve/CVE-2022-39188"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1203107 for CVE-2022-39188",
          "url": "https://bugzilla.suse.com/1203107"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1203116 for CVE-2022-39188",
          "url": "https://bugzilla.suse.com/1203116"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1205313 for CVE-2022-39188",
          "url": "https://bugzilla.suse.com/1205313"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1209225 for CVE-2022-39188",
          "url": "https://bugzilla.suse.com/1209225"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1212326 for CVE-2022-39188",
          "url": "https://bugzilla.suse.com/1212326"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-azure-5.3.18-150300.38.80.1.x86_64",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-azure-devel-5.3.18-150300.38.80.1.x86_64",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-devel-azure-5.3.18-150300.38.80.1.noarch",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-source-azure-5.3.18-150300.38.80.1.noarch",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-syms-azure-5.3.18-150300.38.80.1.x86_64",
            "openSUSE Leap 15.3:cluster-md-kmp-azure-5.3.18-150300.38.80.1.x86_64",
            "openSUSE Leap 15.3:dlm-kmp-azure-5.3.18-150300.38.80.1.x86_64",
            "openSUSE Leap 15.3:gfs2-kmp-azure-5.3.18-150300.38.80.1.x86_64",
            "openSUSE Leap 15.3:kernel-azure-5.3.18-150300.38.80.1.x86_64",
            "openSUSE Leap 15.3:kernel-azure-devel-5.3.18-150300.38.80.1.x86_64",
            "openSUSE Leap 15.3:kernel-azure-extra-5.3.18-150300.38.80.1.x86_64",
            "openSUSE Leap 15.3:kernel-azure-livepatch-devel-5.3.18-150300.38.80.1.x86_64",
            "openSUSE Leap 15.3:kernel-azure-optional-5.3.18-150300.38.80.1.x86_64",
            "openSUSE Leap 15.3:kernel-devel-azure-5.3.18-150300.38.80.1.noarch",
            "openSUSE Leap 15.3:kernel-source-azure-5.3.18-150300.38.80.1.noarch",
            "openSUSE Leap 15.3:kernel-syms-azure-5.3.18-150300.38.80.1.x86_64",
            "openSUSE Leap 15.3:kselftests-kmp-azure-5.3.18-150300.38.80.1.x86_64",
            "openSUSE Leap 15.3:ocfs2-kmp-azure-5.3.18-150300.38.80.1.x86_64",
            "openSUSE Leap 15.3:reiserfs-kmp-azure-5.3.18-150300.38.80.1.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 7,
            "baseSeverity": "HIGH",
            "vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H",
            "version": "3.1"
          },
          "products": [
            "SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-azure-5.3.18-150300.38.80.1.x86_64",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-azure-devel-5.3.18-150300.38.80.1.x86_64",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-devel-azure-5.3.18-150300.38.80.1.noarch",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-source-azure-5.3.18-150300.38.80.1.noarch",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-syms-azure-5.3.18-150300.38.80.1.x86_64",
            "openSUSE Leap 15.3:cluster-md-kmp-azure-5.3.18-150300.38.80.1.x86_64",
            "openSUSE Leap 15.3:dlm-kmp-azure-5.3.18-150300.38.80.1.x86_64",
            "openSUSE Leap 15.3:gfs2-kmp-azure-5.3.18-150300.38.80.1.x86_64",
            "openSUSE Leap 15.3:kernel-azure-5.3.18-150300.38.80.1.x86_64",
            "openSUSE Leap 15.3:kernel-azure-devel-5.3.18-150300.38.80.1.x86_64",
            "openSUSE Leap 15.3:kernel-azure-extra-5.3.18-150300.38.80.1.x86_64",
            "openSUSE Leap 15.3:kernel-azure-livepatch-devel-5.3.18-150300.38.80.1.x86_64",
            "openSUSE Leap 15.3:kernel-azure-optional-5.3.18-150300.38.80.1.x86_64",
            "openSUSE Leap 15.3:kernel-devel-azure-5.3.18-150300.38.80.1.noarch",
            "openSUSE Leap 15.3:kernel-source-azure-5.3.18-150300.38.80.1.noarch",
            "openSUSE Leap 15.3:kernel-syms-azure-5.3.18-150300.38.80.1.x86_64",
            "openSUSE Leap 15.3:kselftests-kmp-azure-5.3.18-150300.38.80.1.x86_64",
            "openSUSE Leap 15.3:ocfs2-kmp-azure-5.3.18-150300.38.80.1.x86_64",
            "openSUSE Leap 15.3:reiserfs-kmp-azure-5.3.18-150300.38.80.1.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2022-10-18T09:44:53Z",
          "details": "moderate"
        }
      ],
      "title": "CVE-2022-39188"
    },
    {
      "cve": "CVE-2022-39190",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2022-39190"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "An issue was discovered in net/netfilter/nf_tables_api.c in the Linux kernel before 5.19.6. A denial of service can occur upon binding to an already bound chain.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-azure-5.3.18-150300.38.80.1.x86_64",
          "SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-azure-devel-5.3.18-150300.38.80.1.x86_64",
          "SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-devel-azure-5.3.18-150300.38.80.1.noarch",
          "SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-source-azure-5.3.18-150300.38.80.1.noarch",
          "SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-syms-azure-5.3.18-150300.38.80.1.x86_64",
          "openSUSE Leap 15.3:cluster-md-kmp-azure-5.3.18-150300.38.80.1.x86_64",
          "openSUSE Leap 15.3:dlm-kmp-azure-5.3.18-150300.38.80.1.x86_64",
          "openSUSE Leap 15.3:gfs2-kmp-azure-5.3.18-150300.38.80.1.x86_64",
          "openSUSE Leap 15.3:kernel-azure-5.3.18-150300.38.80.1.x86_64",
          "openSUSE Leap 15.3:kernel-azure-devel-5.3.18-150300.38.80.1.x86_64",
          "openSUSE Leap 15.3:kernel-azure-extra-5.3.18-150300.38.80.1.x86_64",
          "openSUSE Leap 15.3:kernel-azure-livepatch-devel-5.3.18-150300.38.80.1.x86_64",
          "openSUSE Leap 15.3:kernel-azure-optional-5.3.18-150300.38.80.1.x86_64",
          "openSUSE Leap 15.3:kernel-devel-azure-5.3.18-150300.38.80.1.noarch",
          "openSUSE Leap 15.3:kernel-source-azure-5.3.18-150300.38.80.1.noarch",
          "openSUSE Leap 15.3:kernel-syms-azure-5.3.18-150300.38.80.1.x86_64",
          "openSUSE Leap 15.3:kselftests-kmp-azure-5.3.18-150300.38.80.1.x86_64",
          "openSUSE Leap 15.3:ocfs2-kmp-azure-5.3.18-150300.38.80.1.x86_64",
          "openSUSE Leap 15.3:reiserfs-kmp-azure-5.3.18-150300.38.80.1.x86_64"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2022-39190",
          "url": "https://www.suse.com/security/cve/CVE-2022-39190"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1203117 for CVE-2022-39190",
          "url": "https://bugzilla.suse.com/1203117"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-azure-5.3.18-150300.38.80.1.x86_64",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-azure-devel-5.3.18-150300.38.80.1.x86_64",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-devel-azure-5.3.18-150300.38.80.1.noarch",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-source-azure-5.3.18-150300.38.80.1.noarch",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-syms-azure-5.3.18-150300.38.80.1.x86_64",
            "openSUSE Leap 15.3:cluster-md-kmp-azure-5.3.18-150300.38.80.1.x86_64",
            "openSUSE Leap 15.3:dlm-kmp-azure-5.3.18-150300.38.80.1.x86_64",
            "openSUSE Leap 15.3:gfs2-kmp-azure-5.3.18-150300.38.80.1.x86_64",
            "openSUSE Leap 15.3:kernel-azure-5.3.18-150300.38.80.1.x86_64",
            "openSUSE Leap 15.3:kernel-azure-devel-5.3.18-150300.38.80.1.x86_64",
            "openSUSE Leap 15.3:kernel-azure-extra-5.3.18-150300.38.80.1.x86_64",
            "openSUSE Leap 15.3:kernel-azure-livepatch-devel-5.3.18-150300.38.80.1.x86_64",
            "openSUSE Leap 15.3:kernel-azure-optional-5.3.18-150300.38.80.1.x86_64",
            "openSUSE Leap 15.3:kernel-devel-azure-5.3.18-150300.38.80.1.noarch",
            "openSUSE Leap 15.3:kernel-source-azure-5.3.18-150300.38.80.1.noarch",
            "openSUSE Leap 15.3:kernel-syms-azure-5.3.18-150300.38.80.1.x86_64",
            "openSUSE Leap 15.3:kselftests-kmp-azure-5.3.18-150300.38.80.1.x86_64",
            "openSUSE Leap 15.3:ocfs2-kmp-azure-5.3.18-150300.38.80.1.x86_64",
            "openSUSE Leap 15.3:reiserfs-kmp-azure-5.3.18-150300.38.80.1.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 5.5,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
            "version": "3.1"
          },
          "products": [
            "SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-azure-5.3.18-150300.38.80.1.x86_64",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-azure-devel-5.3.18-150300.38.80.1.x86_64",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-devel-azure-5.3.18-150300.38.80.1.noarch",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-source-azure-5.3.18-150300.38.80.1.noarch",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-syms-azure-5.3.18-150300.38.80.1.x86_64",
            "openSUSE Leap 15.3:cluster-md-kmp-azure-5.3.18-150300.38.80.1.x86_64",
            "openSUSE Leap 15.3:dlm-kmp-azure-5.3.18-150300.38.80.1.x86_64",
            "openSUSE Leap 15.3:gfs2-kmp-azure-5.3.18-150300.38.80.1.x86_64",
            "openSUSE Leap 15.3:kernel-azure-5.3.18-150300.38.80.1.x86_64",
            "openSUSE Leap 15.3:kernel-azure-devel-5.3.18-150300.38.80.1.x86_64",
            "openSUSE Leap 15.3:kernel-azure-extra-5.3.18-150300.38.80.1.x86_64",
            "openSUSE Leap 15.3:kernel-azure-livepatch-devel-5.3.18-150300.38.80.1.x86_64",
            "openSUSE Leap 15.3:kernel-azure-optional-5.3.18-150300.38.80.1.x86_64",
            "openSUSE Leap 15.3:kernel-devel-azure-5.3.18-150300.38.80.1.noarch",
            "openSUSE Leap 15.3:kernel-source-azure-5.3.18-150300.38.80.1.noarch",
            "openSUSE Leap 15.3:kernel-syms-azure-5.3.18-150300.38.80.1.x86_64",
            "openSUSE Leap 15.3:kselftests-kmp-azure-5.3.18-150300.38.80.1.x86_64",
            "openSUSE Leap 15.3:ocfs2-kmp-azure-5.3.18-150300.38.80.1.x86_64",
            "openSUSE Leap 15.3:reiserfs-kmp-azure-5.3.18-150300.38.80.1.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2022-10-18T09:44:53Z",
          "details": "moderate"
        }
      ],
      "title": "CVE-2022-39190"
    },
    {
      "cve": "CVE-2022-41218",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2022-41218"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "In drivers/media/dvb-core/dmxdev.c in the Linux kernel through 5.19.10, there is a use-after-free caused by refcount races, affecting dvb_demux_open and dvb_dmxdev_release.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-azure-5.3.18-150300.38.80.1.x86_64",
          "SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-azure-devel-5.3.18-150300.38.80.1.x86_64",
          "SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-devel-azure-5.3.18-150300.38.80.1.noarch",
          "SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-source-azure-5.3.18-150300.38.80.1.noarch",
          "SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-syms-azure-5.3.18-150300.38.80.1.x86_64",
          "openSUSE Leap 15.3:cluster-md-kmp-azure-5.3.18-150300.38.80.1.x86_64",
          "openSUSE Leap 15.3:dlm-kmp-azure-5.3.18-150300.38.80.1.x86_64",
          "openSUSE Leap 15.3:gfs2-kmp-azure-5.3.18-150300.38.80.1.x86_64",
          "openSUSE Leap 15.3:kernel-azure-5.3.18-150300.38.80.1.x86_64",
          "openSUSE Leap 15.3:kernel-azure-devel-5.3.18-150300.38.80.1.x86_64",
          "openSUSE Leap 15.3:kernel-azure-extra-5.3.18-150300.38.80.1.x86_64",
          "openSUSE Leap 15.3:kernel-azure-livepatch-devel-5.3.18-150300.38.80.1.x86_64",
          "openSUSE Leap 15.3:kernel-azure-optional-5.3.18-150300.38.80.1.x86_64",
          "openSUSE Leap 15.3:kernel-devel-azure-5.3.18-150300.38.80.1.noarch",
          "openSUSE Leap 15.3:kernel-source-azure-5.3.18-150300.38.80.1.noarch",
          "openSUSE Leap 15.3:kernel-syms-azure-5.3.18-150300.38.80.1.x86_64",
          "openSUSE Leap 15.3:kselftests-kmp-azure-5.3.18-150300.38.80.1.x86_64",
          "openSUSE Leap 15.3:ocfs2-kmp-azure-5.3.18-150300.38.80.1.x86_64",
          "openSUSE Leap 15.3:reiserfs-kmp-azure-5.3.18-150300.38.80.1.x86_64"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2022-41218",
          "url": "https://www.suse.com/security/cve/CVE-2022-41218"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1202960 for CVE-2022-41218",
          "url": "https://bugzilla.suse.com/1202960"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1203606 for CVE-2022-41218",
          "url": "https://bugzilla.suse.com/1203606"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1205313 for CVE-2022-41218",
          "url": "https://bugzilla.suse.com/1205313"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1209225 for CVE-2022-41218",
          "url": "https://bugzilla.suse.com/1209225"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-azure-5.3.18-150300.38.80.1.x86_64",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-azure-devel-5.3.18-150300.38.80.1.x86_64",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-devel-azure-5.3.18-150300.38.80.1.noarch",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-source-azure-5.3.18-150300.38.80.1.noarch",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-syms-azure-5.3.18-150300.38.80.1.x86_64",
            "openSUSE Leap 15.3:cluster-md-kmp-azure-5.3.18-150300.38.80.1.x86_64",
            "openSUSE Leap 15.3:dlm-kmp-azure-5.3.18-150300.38.80.1.x86_64",
            "openSUSE Leap 15.3:gfs2-kmp-azure-5.3.18-150300.38.80.1.x86_64",
            "openSUSE Leap 15.3:kernel-azure-5.3.18-150300.38.80.1.x86_64",
            "openSUSE Leap 15.3:kernel-azure-devel-5.3.18-150300.38.80.1.x86_64",
            "openSUSE Leap 15.3:kernel-azure-extra-5.3.18-150300.38.80.1.x86_64",
            "openSUSE Leap 15.3:kernel-azure-livepatch-devel-5.3.18-150300.38.80.1.x86_64",
            "openSUSE Leap 15.3:kernel-azure-optional-5.3.18-150300.38.80.1.x86_64",
            "openSUSE Leap 15.3:kernel-devel-azure-5.3.18-150300.38.80.1.noarch",
            "openSUSE Leap 15.3:kernel-source-azure-5.3.18-150300.38.80.1.noarch",
            "openSUSE Leap 15.3:kernel-syms-azure-5.3.18-150300.38.80.1.x86_64",
            "openSUSE Leap 15.3:kselftests-kmp-azure-5.3.18-150300.38.80.1.x86_64",
            "openSUSE Leap 15.3:ocfs2-kmp-azure-5.3.18-150300.38.80.1.x86_64",
            "openSUSE Leap 15.3:reiserfs-kmp-azure-5.3.18-150300.38.80.1.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 8.4,
            "baseSeverity": "HIGH",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
            "version": "3.1"
          },
          "products": [
            "SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-azure-5.3.18-150300.38.80.1.x86_64",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-azure-devel-5.3.18-150300.38.80.1.x86_64",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-devel-azure-5.3.18-150300.38.80.1.noarch",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-source-azure-5.3.18-150300.38.80.1.noarch",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-syms-azure-5.3.18-150300.38.80.1.x86_64",
            "openSUSE Leap 15.3:cluster-md-kmp-azure-5.3.18-150300.38.80.1.x86_64",
            "openSUSE Leap 15.3:dlm-kmp-azure-5.3.18-150300.38.80.1.x86_64",
            "openSUSE Leap 15.3:gfs2-kmp-azure-5.3.18-150300.38.80.1.x86_64",
            "openSUSE Leap 15.3:kernel-azure-5.3.18-150300.38.80.1.x86_64",
            "openSUSE Leap 15.3:kernel-azure-devel-5.3.18-150300.38.80.1.x86_64",
            "openSUSE Leap 15.3:kernel-azure-extra-5.3.18-150300.38.80.1.x86_64",
            "openSUSE Leap 15.3:kernel-azure-livepatch-devel-5.3.18-150300.38.80.1.x86_64",
            "openSUSE Leap 15.3:kernel-azure-optional-5.3.18-150300.38.80.1.x86_64",
            "openSUSE Leap 15.3:kernel-devel-azure-5.3.18-150300.38.80.1.noarch",
            "openSUSE Leap 15.3:kernel-source-azure-5.3.18-150300.38.80.1.noarch",
            "openSUSE Leap 15.3:kernel-syms-azure-5.3.18-150300.38.80.1.x86_64",
            "openSUSE Leap 15.3:kselftests-kmp-azure-5.3.18-150300.38.80.1.x86_64",
            "openSUSE Leap 15.3:ocfs2-kmp-azure-5.3.18-150300.38.80.1.x86_64",
            "openSUSE Leap 15.3:reiserfs-kmp-azure-5.3.18-150300.38.80.1.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2022-10-18T09:44:53Z",
          "details": "important"
        }
      ],
      "title": "CVE-2022-41218"
    },
    {
      "cve": "CVE-2022-41222",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2022-41222"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "mm/mremap.c in the Linux kernel before 5.13.3 has a use-after-free via a stale TLB because an rmap lock is not held during a PUD move.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-azure-5.3.18-150300.38.80.1.x86_64",
          "SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-azure-devel-5.3.18-150300.38.80.1.x86_64",
          "SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-devel-azure-5.3.18-150300.38.80.1.noarch",
          "SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-source-azure-5.3.18-150300.38.80.1.noarch",
          "SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-syms-azure-5.3.18-150300.38.80.1.x86_64",
          "openSUSE Leap 15.3:cluster-md-kmp-azure-5.3.18-150300.38.80.1.x86_64",
          "openSUSE Leap 15.3:dlm-kmp-azure-5.3.18-150300.38.80.1.x86_64",
          "openSUSE Leap 15.3:gfs2-kmp-azure-5.3.18-150300.38.80.1.x86_64",
          "openSUSE Leap 15.3:kernel-azure-5.3.18-150300.38.80.1.x86_64",
          "openSUSE Leap 15.3:kernel-azure-devel-5.3.18-150300.38.80.1.x86_64",
          "openSUSE Leap 15.3:kernel-azure-extra-5.3.18-150300.38.80.1.x86_64",
          "openSUSE Leap 15.3:kernel-azure-livepatch-devel-5.3.18-150300.38.80.1.x86_64",
          "openSUSE Leap 15.3:kernel-azure-optional-5.3.18-150300.38.80.1.x86_64",
          "openSUSE Leap 15.3:kernel-devel-azure-5.3.18-150300.38.80.1.noarch",
          "openSUSE Leap 15.3:kernel-source-azure-5.3.18-150300.38.80.1.noarch",
          "openSUSE Leap 15.3:kernel-syms-azure-5.3.18-150300.38.80.1.x86_64",
          "openSUSE Leap 15.3:kselftests-kmp-azure-5.3.18-150300.38.80.1.x86_64",
          "openSUSE Leap 15.3:ocfs2-kmp-azure-5.3.18-150300.38.80.1.x86_64",
          "openSUSE Leap 15.3:reiserfs-kmp-azure-5.3.18-150300.38.80.1.x86_64"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2022-41222",
          "url": "https://www.suse.com/security/cve/CVE-2022-41222"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1203622 for CVE-2022-41222",
          "url": "https://bugzilla.suse.com/1203622"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1203624 for CVE-2022-41222",
          "url": "https://bugzilla.suse.com/1203624"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1209225 for CVE-2022-41222",
          "url": "https://bugzilla.suse.com/1209225"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1209476 for CVE-2022-41222",
          "url": "https://bugzilla.suse.com/1209476"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-azure-5.3.18-150300.38.80.1.x86_64",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-azure-devel-5.3.18-150300.38.80.1.x86_64",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-devel-azure-5.3.18-150300.38.80.1.noarch",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-source-azure-5.3.18-150300.38.80.1.noarch",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-syms-azure-5.3.18-150300.38.80.1.x86_64",
            "openSUSE Leap 15.3:cluster-md-kmp-azure-5.3.18-150300.38.80.1.x86_64",
            "openSUSE Leap 15.3:dlm-kmp-azure-5.3.18-150300.38.80.1.x86_64",
            "openSUSE Leap 15.3:gfs2-kmp-azure-5.3.18-150300.38.80.1.x86_64",
            "openSUSE Leap 15.3:kernel-azure-5.3.18-150300.38.80.1.x86_64",
            "openSUSE Leap 15.3:kernel-azure-devel-5.3.18-150300.38.80.1.x86_64",
            "openSUSE Leap 15.3:kernel-azure-extra-5.3.18-150300.38.80.1.x86_64",
            "openSUSE Leap 15.3:kernel-azure-livepatch-devel-5.3.18-150300.38.80.1.x86_64",
            "openSUSE Leap 15.3:kernel-azure-optional-5.3.18-150300.38.80.1.x86_64",
            "openSUSE Leap 15.3:kernel-devel-azure-5.3.18-150300.38.80.1.noarch",
            "openSUSE Leap 15.3:kernel-source-azure-5.3.18-150300.38.80.1.noarch",
            "openSUSE Leap 15.3:kernel-syms-azure-5.3.18-150300.38.80.1.x86_64",
            "openSUSE Leap 15.3:kselftests-kmp-azure-5.3.18-150300.38.80.1.x86_64",
            "openSUSE Leap 15.3:ocfs2-kmp-azure-5.3.18-150300.38.80.1.x86_64",
            "openSUSE Leap 15.3:reiserfs-kmp-azure-5.3.18-150300.38.80.1.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 7,
            "baseSeverity": "HIGH",
            "vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H",
            "version": "3.1"
          },
          "products": [
            "SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-azure-5.3.18-150300.38.80.1.x86_64",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-azure-devel-5.3.18-150300.38.80.1.x86_64",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-devel-azure-5.3.18-150300.38.80.1.noarch",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-source-azure-5.3.18-150300.38.80.1.noarch",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-syms-azure-5.3.18-150300.38.80.1.x86_64",
            "openSUSE Leap 15.3:cluster-md-kmp-azure-5.3.18-150300.38.80.1.x86_64",
            "openSUSE Leap 15.3:dlm-kmp-azure-5.3.18-150300.38.80.1.x86_64",
            "openSUSE Leap 15.3:gfs2-kmp-azure-5.3.18-150300.38.80.1.x86_64",
            "openSUSE Leap 15.3:kernel-azure-5.3.18-150300.38.80.1.x86_64",
            "openSUSE Leap 15.3:kernel-azure-devel-5.3.18-150300.38.80.1.x86_64",
            "openSUSE Leap 15.3:kernel-azure-extra-5.3.18-150300.38.80.1.x86_64",
            "openSUSE Leap 15.3:kernel-azure-livepatch-devel-5.3.18-150300.38.80.1.x86_64",
            "openSUSE Leap 15.3:kernel-azure-optional-5.3.18-150300.38.80.1.x86_64",
            "openSUSE Leap 15.3:kernel-devel-azure-5.3.18-150300.38.80.1.noarch",
            "openSUSE Leap 15.3:kernel-source-azure-5.3.18-150300.38.80.1.noarch",
            "openSUSE Leap 15.3:kernel-syms-azure-5.3.18-150300.38.80.1.x86_64",
            "openSUSE Leap 15.3:kselftests-kmp-azure-5.3.18-150300.38.80.1.x86_64",
            "openSUSE Leap 15.3:ocfs2-kmp-azure-5.3.18-150300.38.80.1.x86_64",
            "openSUSE Leap 15.3:reiserfs-kmp-azure-5.3.18-150300.38.80.1.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2022-10-18T09:44:53Z",
          "details": "moderate"
        }
      ],
      "title": "CVE-2022-41222"
    },
    {
      "cve": "CVE-2022-41848",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2022-41848"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "drivers/char/pcmcia/synclink_cs.c in the Linux kernel through 5.19.12 has a race condition and resultant use-after-free if a physically proximate attacker removes a PCMCIA device while calling ioctl, aka a race condition between mgslpc_ioctl and mgslpc_detach.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-azure-5.3.18-150300.38.80.1.x86_64",
          "SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-azure-devel-5.3.18-150300.38.80.1.x86_64",
          "SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-devel-azure-5.3.18-150300.38.80.1.noarch",
          "SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-source-azure-5.3.18-150300.38.80.1.noarch",
          "SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-syms-azure-5.3.18-150300.38.80.1.x86_64",
          "openSUSE Leap 15.3:cluster-md-kmp-azure-5.3.18-150300.38.80.1.x86_64",
          "openSUSE Leap 15.3:dlm-kmp-azure-5.3.18-150300.38.80.1.x86_64",
          "openSUSE Leap 15.3:gfs2-kmp-azure-5.3.18-150300.38.80.1.x86_64",
          "openSUSE Leap 15.3:kernel-azure-5.3.18-150300.38.80.1.x86_64",
          "openSUSE Leap 15.3:kernel-azure-devel-5.3.18-150300.38.80.1.x86_64",
          "openSUSE Leap 15.3:kernel-azure-extra-5.3.18-150300.38.80.1.x86_64",
          "openSUSE Leap 15.3:kernel-azure-livepatch-devel-5.3.18-150300.38.80.1.x86_64",
          "openSUSE Leap 15.3:kernel-azure-optional-5.3.18-150300.38.80.1.x86_64",
          "openSUSE Leap 15.3:kernel-devel-azure-5.3.18-150300.38.80.1.noarch",
          "openSUSE Leap 15.3:kernel-source-azure-5.3.18-150300.38.80.1.noarch",
          "openSUSE Leap 15.3:kernel-syms-azure-5.3.18-150300.38.80.1.x86_64",
          "openSUSE Leap 15.3:kselftests-kmp-azure-5.3.18-150300.38.80.1.x86_64",
          "openSUSE Leap 15.3:ocfs2-kmp-azure-5.3.18-150300.38.80.1.x86_64",
          "openSUSE Leap 15.3:reiserfs-kmp-azure-5.3.18-150300.38.80.1.x86_64"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2022-41848",
          "url": "https://www.suse.com/security/cve/CVE-2022-41848"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1203987 for CVE-2022-41848",
          "url": "https://bugzilla.suse.com/1203987"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1211484 for CVE-2022-41848",
          "url": "https://bugzilla.suse.com/1211484"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1212317 for CVE-2022-41848",
          "url": "https://bugzilla.suse.com/1212317"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-azure-5.3.18-150300.38.80.1.x86_64",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-azure-devel-5.3.18-150300.38.80.1.x86_64",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-devel-azure-5.3.18-150300.38.80.1.noarch",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-source-azure-5.3.18-150300.38.80.1.noarch",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-syms-azure-5.3.18-150300.38.80.1.x86_64",
            "openSUSE Leap 15.3:cluster-md-kmp-azure-5.3.18-150300.38.80.1.x86_64",
            "openSUSE Leap 15.3:dlm-kmp-azure-5.3.18-150300.38.80.1.x86_64",
            "openSUSE Leap 15.3:gfs2-kmp-azure-5.3.18-150300.38.80.1.x86_64",
            "openSUSE Leap 15.3:kernel-azure-5.3.18-150300.38.80.1.x86_64",
            "openSUSE Leap 15.3:kernel-azure-devel-5.3.18-150300.38.80.1.x86_64",
            "openSUSE Leap 15.3:kernel-azure-extra-5.3.18-150300.38.80.1.x86_64",
            "openSUSE Leap 15.3:kernel-azure-livepatch-devel-5.3.18-150300.38.80.1.x86_64",
            "openSUSE Leap 15.3:kernel-azure-optional-5.3.18-150300.38.80.1.x86_64",
            "openSUSE Leap 15.3:kernel-devel-azure-5.3.18-150300.38.80.1.noarch",
            "openSUSE Leap 15.3:kernel-source-azure-5.3.18-150300.38.80.1.noarch",
            "openSUSE Leap 15.3:kernel-syms-azure-5.3.18-150300.38.80.1.x86_64",
            "openSUSE Leap 15.3:kselftests-kmp-azure-5.3.18-150300.38.80.1.x86_64",
            "openSUSE Leap 15.3:ocfs2-kmp-azure-5.3.18-150300.38.80.1.x86_64",
            "openSUSE Leap 15.3:reiserfs-kmp-azure-5.3.18-150300.38.80.1.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 6.4,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:P/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H",
            "version": "3.1"
          },
          "products": [
            "SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-azure-5.3.18-150300.38.80.1.x86_64",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-azure-devel-5.3.18-150300.38.80.1.x86_64",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-devel-azure-5.3.18-150300.38.80.1.noarch",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-source-azure-5.3.18-150300.38.80.1.noarch",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-syms-azure-5.3.18-150300.38.80.1.x86_64",
            "openSUSE Leap 15.3:cluster-md-kmp-azure-5.3.18-150300.38.80.1.x86_64",
            "openSUSE Leap 15.3:dlm-kmp-azure-5.3.18-150300.38.80.1.x86_64",
            "openSUSE Leap 15.3:gfs2-kmp-azure-5.3.18-150300.38.80.1.x86_64",
            "openSUSE Leap 15.3:kernel-azure-5.3.18-150300.38.80.1.x86_64",
            "openSUSE Leap 15.3:kernel-azure-devel-5.3.18-150300.38.80.1.x86_64",
            "openSUSE Leap 15.3:kernel-azure-extra-5.3.18-150300.38.80.1.x86_64",
            "openSUSE Leap 15.3:kernel-azure-livepatch-devel-5.3.18-150300.38.80.1.x86_64",
            "openSUSE Leap 15.3:kernel-azure-optional-5.3.18-150300.38.80.1.x86_64",
            "openSUSE Leap 15.3:kernel-devel-azure-5.3.18-150300.38.80.1.noarch",
            "openSUSE Leap 15.3:kernel-source-azure-5.3.18-150300.38.80.1.noarch",
            "openSUSE Leap 15.3:kernel-syms-azure-5.3.18-150300.38.80.1.x86_64",
            "openSUSE Leap 15.3:kselftests-kmp-azure-5.3.18-150300.38.80.1.x86_64",
            "openSUSE Leap 15.3:ocfs2-kmp-azure-5.3.18-150300.38.80.1.x86_64",
            "openSUSE Leap 15.3:reiserfs-kmp-azure-5.3.18-150300.38.80.1.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2022-10-18T09:44:53Z",
          "details": "moderate"
        }
      ],
      "title": "CVE-2022-41848"
    },
    {
      "cve": "CVE-2022-41849",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2022-41849"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "drivers/video/fbdev/smscufx.c in the Linux kernel through 5.19.12 has a race condition and resultant use-after-free if a physically proximate attacker removes a USB device while calling open(), aka a race condition between ufx_ops_open and ufx_usb_disconnect.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-azure-5.3.18-150300.38.80.1.x86_64",
          "SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-azure-devel-5.3.18-150300.38.80.1.x86_64",
          "SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-devel-azure-5.3.18-150300.38.80.1.noarch",
          "SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-source-azure-5.3.18-150300.38.80.1.noarch",
          "SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-syms-azure-5.3.18-150300.38.80.1.x86_64",
          "openSUSE Leap 15.3:cluster-md-kmp-azure-5.3.18-150300.38.80.1.x86_64",
          "openSUSE Leap 15.3:dlm-kmp-azure-5.3.18-150300.38.80.1.x86_64",
          "openSUSE Leap 15.3:gfs2-kmp-azure-5.3.18-150300.38.80.1.x86_64",
          "openSUSE Leap 15.3:kernel-azure-5.3.18-150300.38.80.1.x86_64",
          "openSUSE Leap 15.3:kernel-azure-devel-5.3.18-150300.38.80.1.x86_64",
          "openSUSE Leap 15.3:kernel-azure-extra-5.3.18-150300.38.80.1.x86_64",
          "openSUSE Leap 15.3:kernel-azure-livepatch-devel-5.3.18-150300.38.80.1.x86_64",
          "openSUSE Leap 15.3:kernel-azure-optional-5.3.18-150300.38.80.1.x86_64",
          "openSUSE Leap 15.3:kernel-devel-azure-5.3.18-150300.38.80.1.noarch",
          "openSUSE Leap 15.3:kernel-source-azure-5.3.18-150300.38.80.1.noarch",
          "openSUSE Leap 15.3:kernel-syms-azure-5.3.18-150300.38.80.1.x86_64",
          "openSUSE Leap 15.3:kselftests-kmp-azure-5.3.18-150300.38.80.1.x86_64",
          "openSUSE Leap 15.3:ocfs2-kmp-azure-5.3.18-150300.38.80.1.x86_64",
          "openSUSE Leap 15.3:reiserfs-kmp-azure-5.3.18-150300.38.80.1.x86_64"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2022-41849",
          "url": "https://www.suse.com/security/cve/CVE-2022-41849"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1203992 for CVE-2022-41849",
          "url": "https://bugzilla.suse.com/1203992"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1217458 for CVE-2022-41849",
          "url": "https://bugzilla.suse.com/1217458"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-azure-5.3.18-150300.38.80.1.x86_64",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-azure-devel-5.3.18-150300.38.80.1.x86_64",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-devel-azure-5.3.18-150300.38.80.1.noarch",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-source-azure-5.3.18-150300.38.80.1.noarch",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-syms-azure-5.3.18-150300.38.80.1.x86_64",
            "openSUSE Leap 15.3:cluster-md-kmp-azure-5.3.18-150300.38.80.1.x86_64",
            "openSUSE Leap 15.3:dlm-kmp-azure-5.3.18-150300.38.80.1.x86_64",
            "openSUSE Leap 15.3:gfs2-kmp-azure-5.3.18-150300.38.80.1.x86_64",
            "openSUSE Leap 15.3:kernel-azure-5.3.18-150300.38.80.1.x86_64",
            "openSUSE Leap 15.3:kernel-azure-devel-5.3.18-150300.38.80.1.x86_64",
            "openSUSE Leap 15.3:kernel-azure-extra-5.3.18-150300.38.80.1.x86_64",
            "openSUSE Leap 15.3:kernel-azure-livepatch-devel-5.3.18-150300.38.80.1.x86_64",
            "openSUSE Leap 15.3:kernel-azure-optional-5.3.18-150300.38.80.1.x86_64",
            "openSUSE Leap 15.3:kernel-devel-azure-5.3.18-150300.38.80.1.noarch",
            "openSUSE Leap 15.3:kernel-source-azure-5.3.18-150300.38.80.1.noarch",
            "openSUSE Leap 15.3:kernel-syms-azure-5.3.18-150300.38.80.1.x86_64",
            "openSUSE Leap 15.3:kselftests-kmp-azure-5.3.18-150300.38.80.1.x86_64",
            "openSUSE Leap 15.3:ocfs2-kmp-azure-5.3.18-150300.38.80.1.x86_64",
            "openSUSE Leap 15.3:reiserfs-kmp-azure-5.3.18-150300.38.80.1.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 6.3,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:P/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H",
            "version": "3.1"
          },
          "products": [
            "SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-azure-5.3.18-150300.38.80.1.x86_64",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-azure-devel-5.3.18-150300.38.80.1.x86_64",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-devel-azure-5.3.18-150300.38.80.1.noarch",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-source-azure-5.3.18-150300.38.80.1.noarch",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-syms-azure-5.3.18-150300.38.80.1.x86_64",
            "openSUSE Leap 15.3:cluster-md-kmp-azure-5.3.18-150300.38.80.1.x86_64",
            "openSUSE Leap 15.3:dlm-kmp-azure-5.3.18-150300.38.80.1.x86_64",
            "openSUSE Leap 15.3:gfs2-kmp-azure-5.3.18-150300.38.80.1.x86_64",
            "openSUSE Leap 15.3:kernel-azure-5.3.18-150300.38.80.1.x86_64",
            "openSUSE Leap 15.3:kernel-azure-devel-5.3.18-150300.38.80.1.x86_64",
            "openSUSE Leap 15.3:kernel-azure-extra-5.3.18-150300.38.80.1.x86_64",
            "openSUSE Leap 15.3:kernel-azure-livepatch-devel-5.3.18-150300.38.80.1.x86_64",
            "openSUSE Leap 15.3:kernel-azure-optional-5.3.18-150300.38.80.1.x86_64",
            "openSUSE Leap 15.3:kernel-devel-azure-5.3.18-150300.38.80.1.noarch",
            "openSUSE Leap 15.3:kernel-source-azure-5.3.18-150300.38.80.1.noarch",
            "openSUSE Leap 15.3:kernel-syms-azure-5.3.18-150300.38.80.1.x86_64",
            "openSUSE Leap 15.3:kselftests-kmp-azure-5.3.18-150300.38.80.1.x86_64",
            "openSUSE Leap 15.3:ocfs2-kmp-azure-5.3.18-150300.38.80.1.x86_64",
            "openSUSE Leap 15.3:reiserfs-kmp-azure-5.3.18-150300.38.80.1.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2022-10-18T09:44:53Z",
          "details": "moderate"
        }
      ],
      "title": "CVE-2022-41849"
    }
  ]
}
  suse-su-2025:02322-1
Vulnerability from csaf_suse
Published
2025-07-15 14:31
    Modified
2025-07-15 14:31
    Summary
Security update for the Linux Kernel
    Notes
Title of the patch
Security update for the Linux Kernel
    Description of the patch
The SUSE Linux Enterprise 15 SP4 RT kernel was updated to receive various security bugfixes.
The following security bugs were fixed:
- CVE-2021-47557: net/sched: sch_ets: do not peek at classes beyond 'nbands' (bsc#1207361 bsc#1225468).
- CVE-2021-47595: net/sched: sch_ets: do not remove idle classes from the round-robin list (bsc#1207361 bsc#1226552).
- CVE-2023-52924: netfilter: nf_tables: do not skip expired elements during walk (bsc#1236821).
- CVE-2023-52925: netfilter: nf_tables: do not fail inserts if duplicate has expired (bsc#1236822).
- CVE-2024-26808: netfilter: nft_chain_filter: handle NETDEV_UNREGISTER for inet/ingress basechain (bsc#1222634).
- CVE-2024-26924: scsi: lpfc: Release hbalock before calling lpfc_worker_wake_up() (bsc#1225820).
- CVE-2024-27397: kabi: place tstamp needed for nftables set in a hole (bsc#1224095).
- CVE-2024-36978: net: sched: sch_multiq: fix possible OOB write in multiq_tune() (bsc#1226514).
- CVE-2024-46800: sch/netem: fix use after free in netem_dequeue (bsc#1230827).
- CVE-2024-53057: net/sched: stop qdisc_tree_reduce_backlog on TC_H_ROOT (bsc#1233551).
- CVE-2024-53125: bpf: sync_linked_regs() must preserve subreg_def (bsc#1234156).
- CVE-2024-53141: netfilter: ipset: add missing range check in bitmap_ip_uadt (bsc#1234381).
- CVE-2024-56770: sch/netem: fix use after free in netem_dequeue (bsc#1235637).
- CVE-2024-57947: netfilter: nf_set_pipapo: fix initial map fill (bsc#1236333).
- CVE-2025-21700: net: sched: Disallow replacing of child qdisc from one parent to another (bsc#1237159).
- CVE-2025-21702: pfifo_tail_enqueue: Drop new packet when sch->limit == 0 (bsc#1237312).
- CVE-2025-21703: netem: Update sch->q.qlen before qdisc_tree_reduce_backlog() (bsc#1237313).
- CVE-2025-21756: vsock: Orphan socket after transport release (bsc#1238876).
- CVE-2025-23141: KVM: x86: Acquire SRCU in KVM_GET_MP_STATE to protect guest memory accesses (bsc#1242782).
- CVE-2025-37752: net_sched: sch_sfq: move the limit validation (bsc#1242504).
- CVE-2025-37797: net_sched: hfsc: Fix a UAF vulnerability in class handling (bsc#1242417).
- CVE-2025-37823: net_sched: hfsc: Fix a potential UAF in hfsc_dequeue() too (bsc#1242924).
- CVE-2025-37890: net_sched: hfsc: Fix a UAF vulnerability in class with netem as child qdisc (bsc#1243330).
- CVE-2025-37997: netfilter: ipset: fix region locking in hash types (bsc#1243832).
- CVE-2025-38000: sch_hfsc: Fix qlen accounting bug when using peek in hfsc_enqueue() (bsc#1244277).
- CVE-2025-38001: net_sched: hfsc: Address reentrant enqueue adding class to eltree twice (bsc#1244234).
- CVE-2025-38014: dmaengine: idxd: Refactor remove call with idxd_cleanup() helper (bsc#1244732).
- CVE-2025-38083: net_sched: prio: fix a race in prio_tune() (bsc#1245183).
The following non-security bugs were fixed:
- Fix conditional for selecting gcc-13 Fixes: 51dacec21eb1 ('Use gcc-13 for build on SLE16 (jsc#PED-10028).')
- Fix reference in 'net_sched: sch_sfq: use a temporary work area for validating configuration' (bsc#1242504)
- MyBS: Correctly generate build flags for non-multibuild package limit (bsc# 1244241) Fixes: 0999112774fc ('MyBS: Use buildflags to set which package to build')
- MyBS: Do not build kernel-obs-qa with limit_packages Fixes: 58e3f8c34b2b ('bs-upload-kernel: Pass limit_packages also on multibuild')
- MyBS: Simplify qa_expr generation Start with a 0 which makes the expression valid even if there are no QA repositories (currently does not happen). Then separator is always needed.
- Require zstd in kernel-default-devel when module compression is zstd To use ksym-provides tool modules need to be uncompressed. Without zstd at least kernel-default-base does not have provides. Link: https://github.com/openSUSE/rpm-config-SUSE/pull/82
- Test the correct macro to detect RT kernel build Fixes: 470cd1a41502 ('kernel-binary: Support livepatch_rt with merged RT branch')
- Use gcc-13 for build on SLE16 (jsc#PED-10028).
- add nf_tables for iptables non-legacy network handling This is needed for example by docker on the Alpine Linux distribution, but can also be used on openSUSE.
- bs-upload-kernel: Pass limit_packages also on multibuild Fixes: 0999112774fc ('MyBS: Use buildflags to set which package to build') Fixes: 747f601d4156 ('bs-upload-kernel, MyBS, Buildresults: Support multibuild (JSC-SLE#5501, boo#1211226, bsc#1218184)')
- check-for-config-changes: Fix flag name typo
- doc/README.SUSE: Point to the updated version of LKMPG
- hugetlb: unshare some PMDs when splitting VMAs (bsc#1245431).
- kernel-binary: Support livepatch_rt with merged RT branch
- kernel-obs-qa: Use srchash for dependency as well
- kernel-source: Also replace bin/env
- kernel-source: Also update the search to match bin/env Fixes: dc2037cd8f94 ('kernel-source: Also replace bin/env'
- kernel-source: Do not use multiple -r in sed parameters
- kernel-source: Remove log.sh from sources
- mkspec: Exclude rt flavor from kernel-syms dependencies (bsc#1244337).
- mm/hugetlb: fix huge_pmd_unshare() vs GUP-fast race (bsc#1245431).
- mm/hugetlb: unshare page tables during VMA split, not before (bsc#1245431).
- net_sched: sch_fifo: implement lockless __fifo_dump() (bsc#1237312)
- net_sched: sch_sfq: use a temporary work area for validating configuration (bsc#1232504)
- packaging: Patch Makefile to pre-select gcc version (jsc#PED-12251).
- packaging: Turn gcc version into config.sh variable Fixes: 51dacec21eb1 ('Use gcc-13 for build on SLE16 (jsc#PED-10028).')
- powerpc/powernv/memtrace: Fix out of bounds issue in memtrace mmap (bsc#1244309 ltc#213790).
- powerpc/vas: Return -EINVAL if the offset is non-zero in mmap() (bsc#1244309 ltc#213790).
- rpm/check-for-config-changes: Add GCC_ASM_FLAG_OUTPUT_BROKEN
- rpm/check-for-config-changes: Add GCC_ASM_FLAG_OUTPUT_BROKEN Both spellings are actually used
- rpm/check-for-config-changes: add LD_CAN_ to IGNORED_CONFIGS_RE
- rpm/check-for-config-changes: add more to IGNORED_CONFIGS_RE Useful when someone tries (needs) to build the kernel with clang.
- rpm/check-for-config-changes: ignore DRM_MSM_VALIDATE_XML This option is dynamically enabled to build-test different configurations. This makes run_oldconfig.sh complain sporadically for arm64.
- rpm/kernel-binary.spec.in: Also order against update-bootloader (boo#1228659, boo#1240785, boo#1241038).
- rpm/kernel-binary.spec.in: Fix missing 20-kernel-default-extra.conf (bsc#1239986) sle_version was obsoleted for SLE16. It has to be combined with suse_version check.
- rpm/kernel-binary.spec.in: Use OrderWithRequires (boo#1228659 boo#1241038). OrderWithRequires was introduced in rpm 4.9 (ie. SLE12+) to allow a package to inform the order of installation of other package without hard requiring that package. This means our kernel-binary packages no longer need to hard require perl-Bootloader or dracut, resolving the long-commented issue there. This is also needed for udev & systemd-boot to ensure those packages are installed before being called by dracut (boo#1228659)
- rpm/kernel-binary.spec.in: fix KMPs build on 6.13+ (bsc#1234454)
- rpm/kernel-docs.spec.in: Workaround for reproducible builds (bsc#1238303)
- rpm/package-descriptions: Add rt and rt_debug descriptions
- rpm/release-projects: Update the ALP projects again (bsc#1231293).
- rpm/split-modules: Fix optional splitting with usrmerge (bsc#1238570)
- rpm: Stop using is_kotd_qa macro This macro is set by bs-upload-kernel, and a conditional in each spec file is used to determine when to build the spec file. This logic should not really be in the spec file. Previously this was done with package links and package meta for the individula links. However, the use of package links is rejected for packages in git based release projects (nothing to do with git actually, new policy). An alternative to package links is multibuild. However, for multibuild packages package meta cannot be used to set which spec file gets built. Use prjcon buildflags instead, and remove this conditional. Depends on bs-upload-kernel adding the build flag.
- scsi: storvsc: Do not report the host packet status as the hv status (git-fixes).
- scsi: storvsc: Increase the timeouts to storvsc_timeout (bsc#1245455).
- wifi: cfg80211: Add my certificate (bsc#1243001).
- wifi: cfg80211: fix certs build to not depend on file order (bsc#1243001).
    Patchnames
SUSE-2025-2322,SUSE-SLE-Micro-5.3-2025-2322,SUSE-SLE-Micro-5.4-2025-2322
    Terms of use
CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).
    {
  "document": {
    "aggregate_severity": {
      "namespace": "https://www.suse.com/support/security/rating/",
      "text": "important"
    },
    "category": "csaf_security_advisory",
    "csaf_version": "2.0",
    "distribution": {
      "text": "Copyright 2024 SUSE LLC. All rights reserved.",
      "tlp": {
        "label": "WHITE",
        "url": "https://www.first.org/tlp/"
      }
    },
    "lang": "en",
    "notes": [
      {
        "category": "summary",
        "text": "Security update for the Linux Kernel",
        "title": "Title of the patch"
      },
      {
        "category": "description",
        "text": "\nThe SUSE Linux Enterprise 15 SP4 RT kernel was updated to receive various security bugfixes.\n\n\nThe following security bugs were fixed:\n\n- CVE-2021-47557: net/sched: sch_ets: do not peek at classes beyond \u0027nbands\u0027 (bsc#1207361 bsc#1225468).\n- CVE-2021-47595: net/sched: sch_ets: do not remove idle classes from the round-robin list (bsc#1207361 bsc#1226552).\n- CVE-2023-52924: netfilter: nf_tables: do not skip expired elements during walk (bsc#1236821).\n- CVE-2023-52925: netfilter: nf_tables: do not fail inserts if duplicate has expired (bsc#1236822).\n- CVE-2024-26808: netfilter: nft_chain_filter: handle NETDEV_UNREGISTER for inet/ingress basechain (bsc#1222634).\n- CVE-2024-26924: scsi: lpfc: Release hbalock before calling lpfc_worker_wake_up() (bsc#1225820).\n- CVE-2024-27397: kabi: place tstamp needed for nftables set in a hole (bsc#1224095).\n- CVE-2024-36978: net: sched: sch_multiq: fix possible OOB write in multiq_tune() (bsc#1226514).\n- CVE-2024-46800: sch/netem: fix use after free in netem_dequeue (bsc#1230827).\n- CVE-2024-53057: net/sched: stop qdisc_tree_reduce_backlog on TC_H_ROOT (bsc#1233551).\n- CVE-2024-53125: bpf: sync_linked_regs() must preserve subreg_def (bsc#1234156).\n- CVE-2024-53141: netfilter: ipset: add missing range check in bitmap_ip_uadt (bsc#1234381).\n- CVE-2024-56770: sch/netem: fix use after free in netem_dequeue (bsc#1235637).\n- CVE-2024-57947: netfilter: nf_set_pipapo: fix initial map fill (bsc#1236333).\n- CVE-2025-21700: net: sched: Disallow replacing of child qdisc from one parent to another (bsc#1237159).\n- CVE-2025-21702: pfifo_tail_enqueue: Drop new packet when sch-\u003elimit == 0 (bsc#1237312).\n- CVE-2025-21703: netem: Update sch-\u003eq.qlen before qdisc_tree_reduce_backlog() (bsc#1237313).\n- CVE-2025-21756: vsock: Orphan socket after transport release (bsc#1238876).\n- CVE-2025-23141: KVM: x86: Acquire SRCU in KVM_GET_MP_STATE to protect guest memory accesses (bsc#1242782).\n- CVE-2025-37752: net_sched: sch_sfq: move the limit validation (bsc#1242504).\n- CVE-2025-37797: net_sched: hfsc: Fix a UAF vulnerability in class handling (bsc#1242417).\n- CVE-2025-37823: net_sched: hfsc: Fix a potential UAF in hfsc_dequeue() too (bsc#1242924).\n- CVE-2025-37890: net_sched: hfsc: Fix a UAF vulnerability in class with netem as child qdisc (bsc#1243330).\n- CVE-2025-37997: netfilter: ipset: fix region locking in hash types (bsc#1243832).\n- CVE-2025-38000: sch_hfsc: Fix qlen accounting bug when using peek in hfsc_enqueue() (bsc#1244277).\n- CVE-2025-38001: net_sched: hfsc: Address reentrant enqueue adding class to eltree twice (bsc#1244234).\n- CVE-2025-38014: dmaengine: idxd: Refactor remove call with idxd_cleanup() helper (bsc#1244732).\n- CVE-2025-38083: net_sched: prio: fix a race in prio_tune() (bsc#1245183).\n\nThe following non-security bugs were fixed:\n\n- Fix conditional for selecting gcc-13 Fixes: 51dacec21eb1 (\u0027Use gcc-13 for build on SLE16 (jsc#PED-10028).\u0027)\n- Fix reference in \u0027net_sched: sch_sfq: use a temporary work area for validating configuration\u0027 (bsc#1242504)\n- MyBS: Correctly generate build flags for non-multibuild package limit (bsc# 1244241) Fixes: 0999112774fc (\u0027MyBS: Use buildflags to set which package to build\u0027)\n- MyBS: Do not build kernel-obs-qa with limit_packages Fixes: 58e3f8c34b2b (\u0027bs-upload-kernel: Pass limit_packages also on multibuild\u0027)\n- MyBS: Simplify qa_expr generation Start with a 0 which makes the expression valid even if there are no QA repositories (currently does not happen). Then separator is always needed.\n- Require zstd in kernel-default-devel when module compression is zstd To use ksym-provides tool modules need to be uncompressed. Without zstd at least kernel-default-base does not have provides. Link: https://github.com/openSUSE/rpm-config-SUSE/pull/82\n- Test the correct macro to detect RT kernel build Fixes: 470cd1a41502 (\u0027kernel-binary: Support livepatch_rt with merged RT branch\u0027)\n- Use gcc-13 for build on SLE16 (jsc#PED-10028).\n- add nf_tables for iptables non-legacy network handling This is needed for example by docker on the Alpine Linux distribution, but can also be used on openSUSE.\n- bs-upload-kernel: Pass limit_packages also on multibuild Fixes: 0999112774fc (\u0027MyBS: Use buildflags to set which package to build\u0027) Fixes: 747f601d4156 (\u0027bs-upload-kernel, MyBS, Buildresults: Support multibuild (JSC-SLE#5501, boo#1211226, bsc#1218184)\u0027)\n- check-for-config-changes: Fix flag name typo\n- doc/README.SUSE: Point to the updated version of LKMPG\n- hugetlb: unshare some PMDs when splitting VMAs (bsc#1245431).\n- kernel-binary: Support livepatch_rt with merged RT branch\n- kernel-obs-qa: Use srchash for dependency as well\n- kernel-source: Also replace bin/env\n- kernel-source: Also update the search to match bin/env Fixes: dc2037cd8f94 (\u0027kernel-source: Also replace bin/env\u0027\n- kernel-source: Do not use multiple -r in sed parameters\n- kernel-source: Remove log.sh from sources\n- mkspec: Exclude rt flavor from kernel-syms dependencies (bsc#1244337).\n- mm/hugetlb: fix huge_pmd_unshare() vs GUP-fast race (bsc#1245431).\n- mm/hugetlb: unshare page tables during VMA split, not before (bsc#1245431).\n- net_sched: sch_fifo: implement lockless __fifo_dump() (bsc#1237312)\n- net_sched: sch_sfq: use a temporary work area for validating configuration (bsc#1232504)\n- packaging: Patch Makefile to pre-select gcc version (jsc#PED-12251).\n- packaging: Turn gcc version into config.sh variable Fixes: 51dacec21eb1 (\u0027Use gcc-13 for build on SLE16 (jsc#PED-10028).\u0027)\n- powerpc/powernv/memtrace: Fix out of bounds issue in memtrace mmap (bsc#1244309 ltc#213790).\n- powerpc/vas: Return -EINVAL if the offset is non-zero in mmap() (bsc#1244309 ltc#213790).\n- rpm/check-for-config-changes: Add GCC_ASM_FLAG_OUTPUT_BROKEN\n- rpm/check-for-config-changes: Add GCC_ASM_FLAG_OUTPUT_BROKEN Both spellings are actually used\n- rpm/check-for-config-changes: add LD_CAN_ to IGNORED_CONFIGS_RE\n- rpm/check-for-config-changes: add more to IGNORED_CONFIGS_RE Useful when someone tries (needs) to build the kernel with clang.\n- rpm/check-for-config-changes: ignore DRM_MSM_VALIDATE_XML This option is dynamically enabled to build-test different configurations. This makes run_oldconfig.sh complain sporadically for arm64.\n- rpm/kernel-binary.spec.in: Also order against update-bootloader (boo#1228659, boo#1240785, boo#1241038).\n- rpm/kernel-binary.spec.in: Fix missing 20-kernel-default-extra.conf (bsc#1239986) sle_version was obsoleted for SLE16. It has to be combined with suse_version check.\n- rpm/kernel-binary.spec.in: Use OrderWithRequires (boo#1228659 boo#1241038). OrderWithRequires was introduced in rpm 4.9 (ie. SLE12+) to allow a package to inform the order of installation of other package without hard requiring that package. This means our kernel-binary packages no longer need to hard require perl-Bootloader or dracut, resolving the long-commented issue there. This is also needed for udev \u0026 systemd-boot to ensure those packages are installed before being called by dracut (boo#1228659)\n- rpm/kernel-binary.spec.in: fix KMPs build on 6.13+ (bsc#1234454)\n- rpm/kernel-docs.spec.in: Workaround for reproducible builds (bsc#1238303)\n- rpm/package-descriptions: Add rt and rt_debug descriptions\n- rpm/release-projects: Update the ALP projects again (bsc#1231293).\n- rpm/split-modules: Fix optional splitting with usrmerge (bsc#1238570)\n- rpm: Stop using is_kotd_qa macro This macro is set by bs-upload-kernel, and a conditional in each spec file is used to determine when to build the spec file. This logic should not really be in the spec file. Previously this was done with package links and package meta for the individula links. However, the use of package links is rejected for packages in git based release projects (nothing to do with git actually, new policy). An alternative to package links is multibuild. However, for multibuild packages package meta cannot be used to set which spec file gets built. Use prjcon buildflags instead, and remove this conditional. Depends on bs-upload-kernel adding the build flag.\n- scsi: storvsc: Do not report the host packet status as the hv status (git-fixes).\n- scsi: storvsc: Increase the timeouts to storvsc_timeout (bsc#1245455).\n- wifi: cfg80211: Add my certificate (bsc#1243001).\n- wifi: cfg80211: fix certs build to not depend on file order (bsc#1243001).\n",
        "title": "Description of the patch"
      },
      {
        "category": "details",
        "text": "SUSE-2025-2322,SUSE-SLE-Micro-5.3-2025-2322,SUSE-SLE-Micro-5.4-2025-2322",
        "title": "Patchnames"
      },
      {
        "category": "legal_disclaimer",
        "text": "CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).",
        "title": "Terms of use"
      }
    ],
    "publisher": {
      "category": "vendor",
      "contact_details": "https://www.suse.com/support/security/contact/",
      "name": "SUSE Product Security Team",
      "namespace": "https://www.suse.com/"
    },
    "references": [
      {
        "category": "external",
        "summary": "SUSE ratings",
        "url": "https://www.suse.com/support/security/rating/"
      },
      {
        "category": "self",
        "summary": "URL of this CSAF notice",
        "url": "https://ftp.suse.com/pub/projects/security/csaf/suse-su-2025_02322-1.json"
      },
      {
        "category": "self",
        "summary": "URL for SUSE-SU-2025:02322-1",
        "url": "https://www.suse.com/support/update/announcement/2025/suse-su-202502322-1/"
      },
      {
        "category": "self",
        "summary": "E-Mail link for SUSE-SU-2025:02322-1",
        "url": "https://lists.suse.com/pipermail/sle-updates/2025-July/040712.html"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1065729",
        "url": "https://bugzilla.suse.com/1065729"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1156395",
        "url": "https://bugzilla.suse.com/1156395"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1193629",
        "url": "https://bugzilla.suse.com/1193629"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1194869",
        "url": "https://bugzilla.suse.com/1194869"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1198410",
        "url": "https://bugzilla.suse.com/1198410"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1199356",
        "url": "https://bugzilla.suse.com/1199356"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1199487",
        "url": "https://bugzilla.suse.com/1199487"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1201160",
        "url": "https://bugzilla.suse.com/1201160"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1201956",
        "url": "https://bugzilla.suse.com/1201956"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1202094",
        "url": "https://bugzilla.suse.com/1202094"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1202095",
        "url": "https://bugzilla.suse.com/1202095"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1202564",
        "url": "https://bugzilla.suse.com/1202564"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1202716",
        "url": "https://bugzilla.suse.com/1202716"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1202823",
        "url": "https://bugzilla.suse.com/1202823"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1202860",
        "url": "https://bugzilla.suse.com/1202860"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1203197",
        "url": "https://bugzilla.suse.com/1203197"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1203361",
        "url": "https://bugzilla.suse.com/1203361"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1205220",
        "url": "https://bugzilla.suse.com/1205220"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1205514",
        "url": "https://bugzilla.suse.com/1205514"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1206664",
        "url": "https://bugzilla.suse.com/1206664"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1206878",
        "url": "https://bugzilla.suse.com/1206878"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1206880",
        "url": "https://bugzilla.suse.com/1206880"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1207361",
        "url": "https://bugzilla.suse.com/1207361"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1207638",
        "url": "https://bugzilla.suse.com/1207638"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1211226",
        "url": "https://bugzilla.suse.com/1211226"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1212051",
        "url": "https://bugzilla.suse.com/1212051"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1213090",
        "url": "https://bugzilla.suse.com/1213090"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1218184",
        "url": "https://bugzilla.suse.com/1218184"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1218234",
        "url": "https://bugzilla.suse.com/1218234"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1218470",
        "url": "https://bugzilla.suse.com/1218470"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1222634",
        "url": "https://bugzilla.suse.com/1222634"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1223675",
        "url": "https://bugzilla.suse.com/1223675"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1224095",
        "url": "https://bugzilla.suse.com/1224095"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1224597",
        "url": "https://bugzilla.suse.com/1224597"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1225468",
        "url": "https://bugzilla.suse.com/1225468"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1225820",
        "url": "https://bugzilla.suse.com/1225820"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1226514",
        "url": "https://bugzilla.suse.com/1226514"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1226552",
        "url": "https://bugzilla.suse.com/1226552"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1228659",
        "url": "https://bugzilla.suse.com/1228659"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1230827",
        "url": "https://bugzilla.suse.com/1230827"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1231293",
        "url": "https://bugzilla.suse.com/1231293"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1232504",
        "url": "https://bugzilla.suse.com/1232504"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1233551",
        "url": "https://bugzilla.suse.com/1233551"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1234156",
        "url": "https://bugzilla.suse.com/1234156"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1234381",
        "url": "https://bugzilla.suse.com/1234381"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1234454",
        "url": "https://bugzilla.suse.com/1234454"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1235637",
        "url": "https://bugzilla.suse.com/1235637"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1236333",
        "url": "https://bugzilla.suse.com/1236333"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1236821",
        "url": "https://bugzilla.suse.com/1236821"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1236822",
        "url": "https://bugzilla.suse.com/1236822"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1237159",
        "url": "https://bugzilla.suse.com/1237159"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1237312",
        "url": "https://bugzilla.suse.com/1237312"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1237313",
        "url": "https://bugzilla.suse.com/1237313"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1238303",
        "url": "https://bugzilla.suse.com/1238303"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1238526",
        "url": "https://bugzilla.suse.com/1238526"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1238570",
        "url": "https://bugzilla.suse.com/1238570"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1238876",
        "url": "https://bugzilla.suse.com/1238876"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1239986",
        "url": "https://bugzilla.suse.com/1239986"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1240785",
        "url": "https://bugzilla.suse.com/1240785"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1241038",
        "url": "https://bugzilla.suse.com/1241038"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1242221",
        "url": "https://bugzilla.suse.com/1242221"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1242414",
        "url": "https://bugzilla.suse.com/1242414"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1242417",
        "url": "https://bugzilla.suse.com/1242417"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1242504",
        "url": "https://bugzilla.suse.com/1242504"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1242596",
        "url": "https://bugzilla.suse.com/1242596"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1242782",
        "url": "https://bugzilla.suse.com/1242782"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1242924",
        "url": "https://bugzilla.suse.com/1242924"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1243001",
        "url": "https://bugzilla.suse.com/1243001"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1243330",
        "url": "https://bugzilla.suse.com/1243330"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1243543",
        "url": "https://bugzilla.suse.com/1243543"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1243627",
        "url": "https://bugzilla.suse.com/1243627"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1243832",
        "url": "https://bugzilla.suse.com/1243832"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1244114",
        "url": "https://bugzilla.suse.com/1244114"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1244179",
        "url": "https://bugzilla.suse.com/1244179"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1244234",
        "url": "https://bugzilla.suse.com/1244234"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1244241",
        "url": "https://bugzilla.suse.com/1244241"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1244277",
        "url": "https://bugzilla.suse.com/1244277"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1244309",
        "url": "https://bugzilla.suse.com/1244309"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1244337",
        "url": "https://bugzilla.suse.com/1244337"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1244732",
        "url": "https://bugzilla.suse.com/1244732"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1244764",
        "url": "https://bugzilla.suse.com/1244764"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1244765",
        "url": "https://bugzilla.suse.com/1244765"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1244767",
        "url": "https://bugzilla.suse.com/1244767"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1244770",
        "url": "https://bugzilla.suse.com/1244770"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1244771",
        "url": "https://bugzilla.suse.com/1244771"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1244773",
        "url": "https://bugzilla.suse.com/1244773"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1244774",
        "url": "https://bugzilla.suse.com/1244774"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1244776",
        "url": "https://bugzilla.suse.com/1244776"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1244779",
        "url": "https://bugzilla.suse.com/1244779"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1244780",
        "url": "https://bugzilla.suse.com/1244780"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1244781",
        "url": "https://bugzilla.suse.com/1244781"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1244782",
        "url": "https://bugzilla.suse.com/1244782"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1244783",
        "url": "https://bugzilla.suse.com/1244783"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1244784",
        "url": "https://bugzilla.suse.com/1244784"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1244786",
        "url": "https://bugzilla.suse.com/1244786"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1244787",
        "url": "https://bugzilla.suse.com/1244787"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1244788",
        "url": "https://bugzilla.suse.com/1244788"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1244790",
        "url": "https://bugzilla.suse.com/1244790"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1244793",
        "url": "https://bugzilla.suse.com/1244793"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1244794",
        "url": "https://bugzilla.suse.com/1244794"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1244796",
        "url": "https://bugzilla.suse.com/1244796"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1244797",
        "url": "https://bugzilla.suse.com/1244797"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1244798",
        "url": "https://bugzilla.suse.com/1244798"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1244800",
        "url": "https://bugzilla.suse.com/1244800"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1244802",
        "url": "https://bugzilla.suse.com/1244802"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1244804",
        "url": "https://bugzilla.suse.com/1244804"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1244807",
        "url": "https://bugzilla.suse.com/1244807"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1244808",
        "url": "https://bugzilla.suse.com/1244808"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1244811",
        "url": "https://bugzilla.suse.com/1244811"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1244813",
        "url": "https://bugzilla.suse.com/1244813"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1244814",
        "url": "https://bugzilla.suse.com/1244814"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1244815",
        "url": "https://bugzilla.suse.com/1244815"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1244816",
        "url": "https://bugzilla.suse.com/1244816"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1244819",
        "url": "https://bugzilla.suse.com/1244819"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1244820",
        "url": "https://bugzilla.suse.com/1244820"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1244823",
        "url": "https://bugzilla.suse.com/1244823"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1244824",
        "url": "https://bugzilla.suse.com/1244824"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1244825",
        "url": "https://bugzilla.suse.com/1244825"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1244830",
        "url": "https://bugzilla.suse.com/1244830"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1244831",
        "url": "https://bugzilla.suse.com/1244831"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1244832",
        "url": "https://bugzilla.suse.com/1244832"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1244834",
        "url": "https://bugzilla.suse.com/1244834"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1244836",
        "url": "https://bugzilla.suse.com/1244836"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1244838",
        "url": "https://bugzilla.suse.com/1244838"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1244839",
        "url": "https://bugzilla.suse.com/1244839"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1244840",
        "url": "https://bugzilla.suse.com/1244840"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1244841",
        "url": "https://bugzilla.suse.com/1244841"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1244842",
        "url": "https://bugzilla.suse.com/1244842"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1244843",
        "url": "https://bugzilla.suse.com/1244843"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1244845",
        "url": "https://bugzilla.suse.com/1244845"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1244846",
        "url": "https://bugzilla.suse.com/1244846"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1244848",
        "url": "https://bugzilla.suse.com/1244848"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1244849",
        "url": "https://bugzilla.suse.com/1244849"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1244851",
        "url": "https://bugzilla.suse.com/1244851"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1244853",
        "url": "https://bugzilla.suse.com/1244853"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1244854",
        "url": "https://bugzilla.suse.com/1244854"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1244856",
        "url": "https://bugzilla.suse.com/1244856"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1244860",
        "url": "https://bugzilla.suse.com/1244860"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1244861",
        "url": "https://bugzilla.suse.com/1244861"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1244866",
        "url": "https://bugzilla.suse.com/1244866"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1244867",
        "url": "https://bugzilla.suse.com/1244867"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1244868",
        "url": "https://bugzilla.suse.com/1244868"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1244869",
        "url": "https://bugzilla.suse.com/1244869"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1244870",
        "url": "https://bugzilla.suse.com/1244870"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1244871",
        "url": "https://bugzilla.suse.com/1244871"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1244872",
        "url": "https://bugzilla.suse.com/1244872"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1244873",
        "url": "https://bugzilla.suse.com/1244873"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1244875",
        "url": "https://bugzilla.suse.com/1244875"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1244876",
        "url": "https://bugzilla.suse.com/1244876"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1244878",
        "url": "https://bugzilla.suse.com/1244878"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1244879",
        "url": "https://bugzilla.suse.com/1244879"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1244881",
        "url": "https://bugzilla.suse.com/1244881"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1244883",
        "url": "https://bugzilla.suse.com/1244883"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1244884",
        "url": "https://bugzilla.suse.com/1244884"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1244886",
        "url": "https://bugzilla.suse.com/1244886"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1244887",
        "url": "https://bugzilla.suse.com/1244887"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1244890",
        "url": "https://bugzilla.suse.com/1244890"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1244895",
        "url": "https://bugzilla.suse.com/1244895"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1244899",
        "url": "https://bugzilla.suse.com/1244899"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1244900",
        "url": "https://bugzilla.suse.com/1244900"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1244901",
        "url": "https://bugzilla.suse.com/1244901"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1244902",
        "url": "https://bugzilla.suse.com/1244902"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1244903",
        "url": "https://bugzilla.suse.com/1244903"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1244908",
        "url": "https://bugzilla.suse.com/1244908"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1244911",
        "url": "https://bugzilla.suse.com/1244911"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1244915",
        "url": "https://bugzilla.suse.com/1244915"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1244936",
        "url": "https://bugzilla.suse.com/1244936"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1244941",
        "url": "https://bugzilla.suse.com/1244941"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1244942",
        "url": "https://bugzilla.suse.com/1244942"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1244943",
        "url": "https://bugzilla.suse.com/1244943"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1244944",
        "url": "https://bugzilla.suse.com/1244944"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1244945",
        "url": "https://bugzilla.suse.com/1244945"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1244948",
        "url": "https://bugzilla.suse.com/1244948"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1244949",
        "url": "https://bugzilla.suse.com/1244949"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1244950",
        "url": "https://bugzilla.suse.com/1244950"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1244956",
        "url": "https://bugzilla.suse.com/1244956"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1244958",
        "url": "https://bugzilla.suse.com/1244958"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1244959",
        "url": "https://bugzilla.suse.com/1244959"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1244965",
        "url": "https://bugzilla.suse.com/1244965"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1244966",
        "url": "https://bugzilla.suse.com/1244966"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1244967",
        "url": "https://bugzilla.suse.com/1244967"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1244968",
        "url": "https://bugzilla.suse.com/1244968"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1244969",
        "url": "https://bugzilla.suse.com/1244969"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1244970",
        "url": "https://bugzilla.suse.com/1244970"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1244974",
        "url": "https://bugzilla.suse.com/1244974"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1244976",
        "url": "https://bugzilla.suse.com/1244976"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1244977",
        "url": "https://bugzilla.suse.com/1244977"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1244978",
        "url": "https://bugzilla.suse.com/1244978"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1244979",
        "url": "https://bugzilla.suse.com/1244979"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1244983",
        "url": "https://bugzilla.suse.com/1244983"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1244984",
        "url": "https://bugzilla.suse.com/1244984"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1244985",
        "url": "https://bugzilla.suse.com/1244985"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1244986",
        "url": "https://bugzilla.suse.com/1244986"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1244991",
        "url": "https://bugzilla.suse.com/1244991"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1244992",
        "url": "https://bugzilla.suse.com/1244992"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1244993",
        "url": "https://bugzilla.suse.com/1244993"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1245006",
        "url": "https://bugzilla.suse.com/1245006"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1245007",
        "url": "https://bugzilla.suse.com/1245007"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1245009",
        "url": "https://bugzilla.suse.com/1245009"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1245011",
        "url": "https://bugzilla.suse.com/1245011"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1245012",
        "url": "https://bugzilla.suse.com/1245012"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1245018",
        "url": "https://bugzilla.suse.com/1245018"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1245019",
        "url": "https://bugzilla.suse.com/1245019"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1245024",
        "url": "https://bugzilla.suse.com/1245024"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1245028",
        "url": "https://bugzilla.suse.com/1245028"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1245031",
        "url": "https://bugzilla.suse.com/1245031"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1245032",
        "url": "https://bugzilla.suse.com/1245032"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1245033",
        "url": "https://bugzilla.suse.com/1245033"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1245038",
        "url": "https://bugzilla.suse.com/1245038"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1245039",
        "url": "https://bugzilla.suse.com/1245039"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1245041",
        "url": "https://bugzilla.suse.com/1245041"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1245047",
        "url": "https://bugzilla.suse.com/1245047"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1245051",
        "url": "https://bugzilla.suse.com/1245051"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1245057",
        "url": "https://bugzilla.suse.com/1245057"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1245058",
        "url": "https://bugzilla.suse.com/1245058"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1245060",
        "url": "https://bugzilla.suse.com/1245060"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1245062",
        "url": "https://bugzilla.suse.com/1245062"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1245064",
        "url": "https://bugzilla.suse.com/1245064"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1245069",
        "url": "https://bugzilla.suse.com/1245069"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1245072",
        "url": "https://bugzilla.suse.com/1245072"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1245073",
        "url": "https://bugzilla.suse.com/1245073"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1245088",
        "url": "https://bugzilla.suse.com/1245088"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1245089",
        "url": "https://bugzilla.suse.com/1245089"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1245092",
        "url": "https://bugzilla.suse.com/1245092"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1245093",
        "url": "https://bugzilla.suse.com/1245093"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1245098",
        "url": "https://bugzilla.suse.com/1245098"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1245103",
        "url": "https://bugzilla.suse.com/1245103"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1245117",
        "url": "https://bugzilla.suse.com/1245117"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1245118",
        "url": "https://bugzilla.suse.com/1245118"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1245119",
        "url": "https://bugzilla.suse.com/1245119"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1245121",
        "url": "https://bugzilla.suse.com/1245121"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1245122",
        "url": "https://bugzilla.suse.com/1245122"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1245125",
        "url": "https://bugzilla.suse.com/1245125"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1245129",
        "url": "https://bugzilla.suse.com/1245129"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1245131",
        "url": "https://bugzilla.suse.com/1245131"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1245133",
        "url": "https://bugzilla.suse.com/1245133"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1245134",
        "url": "https://bugzilla.suse.com/1245134"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1245135",
        "url": "https://bugzilla.suse.com/1245135"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1245136",
        "url": "https://bugzilla.suse.com/1245136"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1245138",
        "url": "https://bugzilla.suse.com/1245138"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1245139",
        "url": "https://bugzilla.suse.com/1245139"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1245140",
        "url": "https://bugzilla.suse.com/1245140"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1245142",
        "url": "https://bugzilla.suse.com/1245142"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1245146",
        "url": "https://bugzilla.suse.com/1245146"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1245147",
        "url": "https://bugzilla.suse.com/1245147"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1245149",
        "url": "https://bugzilla.suse.com/1245149"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1245152",
        "url": "https://bugzilla.suse.com/1245152"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1245154",
        "url": "https://bugzilla.suse.com/1245154"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1245180",
        "url": "https://bugzilla.suse.com/1245180"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1245183",
        "url": "https://bugzilla.suse.com/1245183"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1245189",
        "url": "https://bugzilla.suse.com/1245189"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1245191",
        "url": "https://bugzilla.suse.com/1245191"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1245195",
        "url": "https://bugzilla.suse.com/1245195"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1245197",
        "url": "https://bugzilla.suse.com/1245197"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1245265",
        "url": "https://bugzilla.suse.com/1245265"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1245348",
        "url": "https://bugzilla.suse.com/1245348"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1245431",
        "url": "https://bugzilla.suse.com/1245431"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1245455",
        "url": "https://bugzilla.suse.com/1245455"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2021-47557 page",
        "url": "https://www.suse.com/security/cve/CVE-2021-47557/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2021-47595 page",
        "url": "https://www.suse.com/security/cve/CVE-2021-47595/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2022-1679 page",
        "url": "https://www.suse.com/security/cve/CVE-2022-1679/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2022-2585 page",
        "url": "https://www.suse.com/security/cve/CVE-2022-2585/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2022-2586 page",
        "url": "https://www.suse.com/security/cve/CVE-2022-2586/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2022-2905 page",
        "url": "https://www.suse.com/security/cve/CVE-2022-2905/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2022-3903 page",
        "url": "https://www.suse.com/security/cve/CVE-2022-3903/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2022-4095 page",
        "url": "https://www.suse.com/security/cve/CVE-2022-4095/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2022-4662 page",
        "url": "https://www.suse.com/security/cve/CVE-2022-4662/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2022-49934 page",
        "url": "https://www.suse.com/security/cve/CVE-2022-49934/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2022-49936 page",
        "url": "https://www.suse.com/security/cve/CVE-2022-49936/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2022-49937 page",
        "url": "https://www.suse.com/security/cve/CVE-2022-49937/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2022-49938 page",
        "url": "https://www.suse.com/security/cve/CVE-2022-49938/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2022-49940 page",
        "url": "https://www.suse.com/security/cve/CVE-2022-49940/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2022-49942 page",
        "url": "https://www.suse.com/security/cve/CVE-2022-49942/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2022-49945 page",
        "url": "https://www.suse.com/security/cve/CVE-2022-49945/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2022-49946 page",
        "url": "https://www.suse.com/security/cve/CVE-2022-49946/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2022-49948 page",
        "url": "https://www.suse.com/security/cve/CVE-2022-49948/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2022-49950 page",
        "url": "https://www.suse.com/security/cve/CVE-2022-49950/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2022-49952 page",
        "url": "https://www.suse.com/security/cve/CVE-2022-49952/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2022-49954 page",
        "url": "https://www.suse.com/security/cve/CVE-2022-49954/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2022-49956 page",
        "url": "https://www.suse.com/security/cve/CVE-2022-49956/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2022-49957 page",
        "url": "https://www.suse.com/security/cve/CVE-2022-49957/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2022-49958 page",
        "url": "https://www.suse.com/security/cve/CVE-2022-49958/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2022-49960 page",
        "url": "https://www.suse.com/security/cve/CVE-2022-49960/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2022-49964 page",
        "url": "https://www.suse.com/security/cve/CVE-2022-49964/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2022-49966 page",
        "url": "https://www.suse.com/security/cve/CVE-2022-49966/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2022-49968 page",
        "url": "https://www.suse.com/security/cve/CVE-2022-49968/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2022-49969 page",
        "url": "https://www.suse.com/security/cve/CVE-2022-49969/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2022-49977 page",
        "url": "https://www.suse.com/security/cve/CVE-2022-49977/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2022-49978 page",
        "url": "https://www.suse.com/security/cve/CVE-2022-49978/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2022-49981 page",
        "url": "https://www.suse.com/security/cve/CVE-2022-49981/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2022-49982 page",
        "url": "https://www.suse.com/security/cve/CVE-2022-49982/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2022-49983 page",
        "url": "https://www.suse.com/security/cve/CVE-2022-49983/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2022-49984 page",
        "url": "https://www.suse.com/security/cve/CVE-2022-49984/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2022-49985 page",
        "url": "https://www.suse.com/security/cve/CVE-2022-49985/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2022-49986 page",
        "url": "https://www.suse.com/security/cve/CVE-2022-49986/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2022-49987 page",
        "url": "https://www.suse.com/security/cve/CVE-2022-49987/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2022-49989 page",
        "url": "https://www.suse.com/security/cve/CVE-2022-49989/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2022-49990 page",
        "url": "https://www.suse.com/security/cve/CVE-2022-49990/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2022-49993 page",
        "url": "https://www.suse.com/security/cve/CVE-2022-49993/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2022-49995 page",
        "url": "https://www.suse.com/security/cve/CVE-2022-49995/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2022-49999 page",
        "url": "https://www.suse.com/security/cve/CVE-2022-49999/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2022-50005 page",
        "url": "https://www.suse.com/security/cve/CVE-2022-50005/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2022-50006 page",
        "url": "https://www.suse.com/security/cve/CVE-2022-50006/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2022-50008 page",
        "url": "https://www.suse.com/security/cve/CVE-2022-50008/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2022-50010 page",
        "url": "https://www.suse.com/security/cve/CVE-2022-50010/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2022-50011 page",
        "url": "https://www.suse.com/security/cve/CVE-2022-50011/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2022-50012 page",
        "url": "https://www.suse.com/security/cve/CVE-2022-50012/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2022-50019 page",
        "url": "https://www.suse.com/security/cve/CVE-2022-50019/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2022-50020 page",
        "url": "https://www.suse.com/security/cve/CVE-2022-50020/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2022-50021 page",
        "url": "https://www.suse.com/security/cve/CVE-2022-50021/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2022-50022 page",
        "url": "https://www.suse.com/security/cve/CVE-2022-50022/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2022-50023 page",
        "url": "https://www.suse.com/security/cve/CVE-2022-50023/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2022-50024 page",
        "url": "https://www.suse.com/security/cve/CVE-2022-50024/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2022-50026 page",
        "url": "https://www.suse.com/security/cve/CVE-2022-50026/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2022-50027 page",
        "url": "https://www.suse.com/security/cve/CVE-2022-50027/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2022-50028 page",
        "url": "https://www.suse.com/security/cve/CVE-2022-50028/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2022-50029 page",
        "url": "https://www.suse.com/security/cve/CVE-2022-50029/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2022-50030 page",
        "url": "https://www.suse.com/security/cve/CVE-2022-50030/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2022-50031 page",
        "url": "https://www.suse.com/security/cve/CVE-2022-50031/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2022-50032 page",
        "url": "https://www.suse.com/security/cve/CVE-2022-50032/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2022-50033 page",
        "url": "https://www.suse.com/security/cve/CVE-2022-50033/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2022-50034 page",
        "url": "https://www.suse.com/security/cve/CVE-2022-50034/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2022-50036 page",
        "url": "https://www.suse.com/security/cve/CVE-2022-50036/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2022-50038 page",
        "url": "https://www.suse.com/security/cve/CVE-2022-50038/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2022-50039 page",
        "url": "https://www.suse.com/security/cve/CVE-2022-50039/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2022-50040 page",
        "url": "https://www.suse.com/security/cve/CVE-2022-50040/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2022-50045 page",
        "url": "https://www.suse.com/security/cve/CVE-2022-50045/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2022-50046 page",
        "url": "https://www.suse.com/security/cve/CVE-2022-50046/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2022-50047 page",
        "url": "https://www.suse.com/security/cve/CVE-2022-50047/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2022-50051 page",
        "url": "https://www.suse.com/security/cve/CVE-2022-50051/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2022-50053 page",
        "url": "https://www.suse.com/security/cve/CVE-2022-50053/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2022-50055 page",
        "url": "https://www.suse.com/security/cve/CVE-2022-50055/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2022-50059 page",
        "url": "https://www.suse.com/security/cve/CVE-2022-50059/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2022-50060 page",
        "url": "https://www.suse.com/security/cve/CVE-2022-50060/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2022-50061 page",
        "url": "https://www.suse.com/security/cve/CVE-2022-50061/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2022-50062 page",
        "url": "https://www.suse.com/security/cve/CVE-2022-50062/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2022-50065 page",
        "url": "https://www.suse.com/security/cve/CVE-2022-50065/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2022-50066 page",
        "url": "https://www.suse.com/security/cve/CVE-2022-50066/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2022-50067 page",
        "url": "https://www.suse.com/security/cve/CVE-2022-50067/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2022-50068 page",
        "url": "https://www.suse.com/security/cve/CVE-2022-50068/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2022-50072 page",
        "url": "https://www.suse.com/security/cve/CVE-2022-50072/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2022-50073 page",
        "url": "https://www.suse.com/security/cve/CVE-2022-50073/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2022-50074 page",
        "url": "https://www.suse.com/security/cve/CVE-2022-50074/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2022-50076 page",
        "url": "https://www.suse.com/security/cve/CVE-2022-50076/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2022-50077 page",
        "url": "https://www.suse.com/security/cve/CVE-2022-50077/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2022-50079 page",
        "url": "https://www.suse.com/security/cve/CVE-2022-50079/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2022-50083 page",
        "url": "https://www.suse.com/security/cve/CVE-2022-50083/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2022-50084 page",
        "url": "https://www.suse.com/security/cve/CVE-2022-50084/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2022-50085 page",
        "url": "https://www.suse.com/security/cve/CVE-2022-50085/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2022-50087 page",
        "url": "https://www.suse.com/security/cve/CVE-2022-50087/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2022-50092 page",
        "url": "https://www.suse.com/security/cve/CVE-2022-50092/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2022-50093 page",
        "url": "https://www.suse.com/security/cve/CVE-2022-50093/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2022-50094 page",
        "url": "https://www.suse.com/security/cve/CVE-2022-50094/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2022-50095 page",
        "url": "https://www.suse.com/security/cve/CVE-2022-50095/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2022-50097 page",
        "url": "https://www.suse.com/security/cve/CVE-2022-50097/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2022-50098 page",
        "url": "https://www.suse.com/security/cve/CVE-2022-50098/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2022-50099 page",
        "url": "https://www.suse.com/security/cve/CVE-2022-50099/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2022-50100 page",
        "url": "https://www.suse.com/security/cve/CVE-2022-50100/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2022-50101 page",
        "url": "https://www.suse.com/security/cve/CVE-2022-50101/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2022-50102 page",
        "url": "https://www.suse.com/security/cve/CVE-2022-50102/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2022-50103 page",
        "url": "https://www.suse.com/security/cve/CVE-2022-50103/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2022-50104 page",
        "url": "https://www.suse.com/security/cve/CVE-2022-50104/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2022-50108 page",
        "url": "https://www.suse.com/security/cve/CVE-2022-50108/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2022-50109 page",
        "url": "https://www.suse.com/security/cve/CVE-2022-50109/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2022-50110 page",
        "url": "https://www.suse.com/security/cve/CVE-2022-50110/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2022-50111 page",
        "url": "https://www.suse.com/security/cve/CVE-2022-50111/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2022-50112 page",
        "url": "https://www.suse.com/security/cve/CVE-2022-50112/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2022-50116 page",
        "url": "https://www.suse.com/security/cve/CVE-2022-50116/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2022-50118 page",
        "url": "https://www.suse.com/security/cve/CVE-2022-50118/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2022-50120 page",
        "url": "https://www.suse.com/security/cve/CVE-2022-50120/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2022-50121 page",
        "url": "https://www.suse.com/security/cve/CVE-2022-50121/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2022-50124 page",
        "url": "https://www.suse.com/security/cve/CVE-2022-50124/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2022-50125 page",
        "url": "https://www.suse.com/security/cve/CVE-2022-50125/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2022-50126 page",
        "url": "https://www.suse.com/security/cve/CVE-2022-50126/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2022-50127 page",
        "url": "https://www.suse.com/security/cve/CVE-2022-50127/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2022-50129 page",
        "url": "https://www.suse.com/security/cve/CVE-2022-50129/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2022-50131 page",
        "url": "https://www.suse.com/security/cve/CVE-2022-50131/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2022-50132 page",
        "url": "https://www.suse.com/security/cve/CVE-2022-50132/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2022-50134 page",
        "url": "https://www.suse.com/security/cve/CVE-2022-50134/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2022-50136 page",
        "url": "https://www.suse.com/security/cve/CVE-2022-50136/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2022-50137 page",
        "url": "https://www.suse.com/security/cve/CVE-2022-50137/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2022-50138 page",
        "url": "https://www.suse.com/security/cve/CVE-2022-50138/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2022-50139 page",
        "url": "https://www.suse.com/security/cve/CVE-2022-50139/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2022-50140 page",
        "url": "https://www.suse.com/security/cve/CVE-2022-50140/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2022-50141 page",
        "url": "https://www.suse.com/security/cve/CVE-2022-50141/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2022-50142 page",
        "url": "https://www.suse.com/security/cve/CVE-2022-50142/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2022-50143 page",
        "url": "https://www.suse.com/security/cve/CVE-2022-50143/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2022-50145 page",
        "url": "https://www.suse.com/security/cve/CVE-2022-50145/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2022-50146 page",
        "url": "https://www.suse.com/security/cve/CVE-2022-50146/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2022-50149 page",
        "url": "https://www.suse.com/security/cve/CVE-2022-50149/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2022-50151 page",
        "url": "https://www.suse.com/security/cve/CVE-2022-50151/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2022-50152 page",
        "url": "https://www.suse.com/security/cve/CVE-2022-50152/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2022-50153 page",
        "url": "https://www.suse.com/security/cve/CVE-2022-50153/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2022-50154 page",
        "url": "https://www.suse.com/security/cve/CVE-2022-50154/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2022-50155 page",
        "url": "https://www.suse.com/security/cve/CVE-2022-50155/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2022-50156 page",
        "url": "https://www.suse.com/security/cve/CVE-2022-50156/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2022-50157 page",
        "url": "https://www.suse.com/security/cve/CVE-2022-50157/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2022-50158 page",
        "url": "https://www.suse.com/security/cve/CVE-2022-50158/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2022-50160 page",
        "url": "https://www.suse.com/security/cve/CVE-2022-50160/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2022-50161 page",
        "url": "https://www.suse.com/security/cve/CVE-2022-50161/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2022-50162 page",
        "url": "https://www.suse.com/security/cve/CVE-2022-50162/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2022-50164 page",
        "url": "https://www.suse.com/security/cve/CVE-2022-50164/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2022-50165 page",
        "url": "https://www.suse.com/security/cve/CVE-2022-50165/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2022-50169 page",
        "url": "https://www.suse.com/security/cve/CVE-2022-50169/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2022-50171 page",
        "url": "https://www.suse.com/security/cve/CVE-2022-50171/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2022-50172 page",
        "url": "https://www.suse.com/security/cve/CVE-2022-50172/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2022-50173 page",
        "url": "https://www.suse.com/security/cve/CVE-2022-50173/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2022-50175 page",
        "url": "https://www.suse.com/security/cve/CVE-2022-50175/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2022-50176 page",
        "url": "https://www.suse.com/security/cve/CVE-2022-50176/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2022-50178 page",
        "url": "https://www.suse.com/security/cve/CVE-2022-50178/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2022-50179 page",
        "url": "https://www.suse.com/security/cve/CVE-2022-50179/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2022-50181 page",
        "url": "https://www.suse.com/security/cve/CVE-2022-50181/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2022-50185 page",
        "url": "https://www.suse.com/security/cve/CVE-2022-50185/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2022-50187 page",
        "url": "https://www.suse.com/security/cve/CVE-2022-50187/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2022-50190 page",
        "url": "https://www.suse.com/security/cve/CVE-2022-50190/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2022-50191 page",
        "url": "https://www.suse.com/security/cve/CVE-2022-50191/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2022-50192 page",
        "url": "https://www.suse.com/security/cve/CVE-2022-50192/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2022-50194 page",
        "url": "https://www.suse.com/security/cve/CVE-2022-50194/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2022-50196 page",
        "url": "https://www.suse.com/security/cve/CVE-2022-50196/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2022-50197 page",
        "url": "https://www.suse.com/security/cve/CVE-2022-50197/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2022-50198 page",
        "url": "https://www.suse.com/security/cve/CVE-2022-50198/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2022-50199 page",
        "url": "https://www.suse.com/security/cve/CVE-2022-50199/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2022-50200 page",
        "url": "https://www.suse.com/security/cve/CVE-2022-50200/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2022-50201 page",
        "url": "https://www.suse.com/security/cve/CVE-2022-50201/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2022-50202 page",
        "url": "https://www.suse.com/security/cve/CVE-2022-50202/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2022-50203 page",
        "url": "https://www.suse.com/security/cve/CVE-2022-50203/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2022-50204 page",
        "url": "https://www.suse.com/security/cve/CVE-2022-50204/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2022-50206 page",
        "url": "https://www.suse.com/security/cve/CVE-2022-50206/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2022-50207 page",
        "url": "https://www.suse.com/security/cve/CVE-2022-50207/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2022-50208 page",
        "url": "https://www.suse.com/security/cve/CVE-2022-50208/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2022-50209 page",
        "url": "https://www.suse.com/security/cve/CVE-2022-50209/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2022-50211 page",
        "url": "https://www.suse.com/security/cve/CVE-2022-50211/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2022-50212 page",
        "url": "https://www.suse.com/security/cve/CVE-2022-50212/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2022-50213 page",
        "url": "https://www.suse.com/security/cve/CVE-2022-50213/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2022-50215 page",
        "url": "https://www.suse.com/security/cve/CVE-2022-50215/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2022-50218 page",
        "url": "https://www.suse.com/security/cve/CVE-2022-50218/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2022-50220 page",
        "url": "https://www.suse.com/security/cve/CVE-2022-50220/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2022-50222 page",
        "url": "https://www.suse.com/security/cve/CVE-2022-50222/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2022-50226 page",
        "url": "https://www.suse.com/security/cve/CVE-2022-50226/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2022-50228 page",
        "url": "https://www.suse.com/security/cve/CVE-2022-50228/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2022-50229 page",
        "url": "https://www.suse.com/security/cve/CVE-2022-50229/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2022-50231 page",
        "url": "https://www.suse.com/security/cve/CVE-2022-50231/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2023-3111 page",
        "url": "https://www.suse.com/security/cve/CVE-2023-3111/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2023-52924 page",
        "url": "https://www.suse.com/security/cve/CVE-2023-52924/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2023-52925 page",
        "url": "https://www.suse.com/security/cve/CVE-2023-52925/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2023-53048 page",
        "url": "https://www.suse.com/security/cve/CVE-2023-53048/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2023-53076 page",
        "url": "https://www.suse.com/security/cve/CVE-2023-53076/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2023-53097 page",
        "url": "https://www.suse.com/security/cve/CVE-2023-53097/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2024-26808 page",
        "url": "https://www.suse.com/security/cve/CVE-2024-26808/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2024-26924 page",
        "url": "https://www.suse.com/security/cve/CVE-2024-26924/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2024-26935 page",
        "url": "https://www.suse.com/security/cve/CVE-2024-26935/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2024-27397 page",
        "url": "https://www.suse.com/security/cve/CVE-2024-27397/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2024-35840 page",
        "url": "https://www.suse.com/security/cve/CVE-2024-35840/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2024-36978 page",
        "url": "https://www.suse.com/security/cve/CVE-2024-36978/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2024-46800 page",
        "url": "https://www.suse.com/security/cve/CVE-2024-46800/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2024-53057 page",
        "url": "https://www.suse.com/security/cve/CVE-2024-53057/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2024-53125 page",
        "url": "https://www.suse.com/security/cve/CVE-2024-53125/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2024-53141 page",
        "url": "https://www.suse.com/security/cve/CVE-2024-53141/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2024-56770 page",
        "url": "https://www.suse.com/security/cve/CVE-2024-56770/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2024-57947 page",
        "url": "https://www.suse.com/security/cve/CVE-2024-57947/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2024-57999 page",
        "url": "https://www.suse.com/security/cve/CVE-2024-57999/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2025-21700 page",
        "url": "https://www.suse.com/security/cve/CVE-2025-21700/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2025-21702 page",
        "url": "https://www.suse.com/security/cve/CVE-2025-21702/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2025-21703 page",
        "url": "https://www.suse.com/security/cve/CVE-2025-21703/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2025-21756 page",
        "url": "https://www.suse.com/security/cve/CVE-2025-21756/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2025-23141 page",
        "url": "https://www.suse.com/security/cve/CVE-2025-23141/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2025-23145 page",
        "url": "https://www.suse.com/security/cve/CVE-2025-23145/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2025-37752 page",
        "url": "https://www.suse.com/security/cve/CVE-2025-37752/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2025-37797 page",
        "url": "https://www.suse.com/security/cve/CVE-2025-37797/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2025-37798 page",
        "url": "https://www.suse.com/security/cve/CVE-2025-37798/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2025-37823 page",
        "url": "https://www.suse.com/security/cve/CVE-2025-37823/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2025-37890 page",
        "url": "https://www.suse.com/security/cve/CVE-2025-37890/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2025-37932 page",
        "url": "https://www.suse.com/security/cve/CVE-2025-37932/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2025-37953 page",
        "url": "https://www.suse.com/security/cve/CVE-2025-37953/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2025-37997 page",
        "url": "https://www.suse.com/security/cve/CVE-2025-37997/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2025-38000 page",
        "url": "https://www.suse.com/security/cve/CVE-2025-38000/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2025-38001 page",
        "url": "https://www.suse.com/security/cve/CVE-2025-38001/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2025-38014 page",
        "url": "https://www.suse.com/security/cve/CVE-2025-38014/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2025-38083 page",
        "url": "https://www.suse.com/security/cve/CVE-2025-38083/"
      }
    ],
    "title": "Security update for the Linux Kernel",
    "tracking": {
      "current_release_date": "2025-07-15T14:31:46Z",
      "generator": {
        "date": "2025-07-15T14:31:46Z",
        "engine": {
          "name": "cve-database.git:bin/generate-csaf.pl",
          "version": "1"
        }
      },
      "id": "SUSE-SU-2025:02322-1",
      "initial_release_date": "2025-07-15T14:31:46Z",
      "revision_history": [
        {
          "date": "2025-07-15T14:31:46Z",
          "number": "1",
          "summary": "Current version"
        }
      ],
      "status": "final",
      "version": "1"
    }
  },
  "product_tree": {
    "branches": [
      {
        "branches": [
          {
            "branches": [
              {
                "category": "product_version",
                "name": "kernel-devel-rt-5.14.21-150400.15.124.1.noarch",
                "product": {
                  "name": "kernel-devel-rt-5.14.21-150400.15.124.1.noarch",
                  "product_id": "kernel-devel-rt-5.14.21-150400.15.124.1.noarch"
                }
              },
              {
                "category": "product_version",
                "name": "kernel-source-rt-5.14.21-150400.15.124.1.noarch",
                "product": {
                  "name": "kernel-source-rt-5.14.21-150400.15.124.1.noarch",
                  "product_id": "kernel-source-rt-5.14.21-150400.15.124.1.noarch"
                }
              }
            ],
            "category": "architecture",
            "name": "noarch"
          },
          {
            "branches": [
              {
                "category": "product_version",
                "name": "cluster-md-kmp-rt-5.14.21-150400.15.124.1.x86_64",
                "product": {
                  "name": "cluster-md-kmp-rt-5.14.21-150400.15.124.1.x86_64",
                  "product_id": "cluster-md-kmp-rt-5.14.21-150400.15.124.1.x86_64"
                }
              },
              {
                "category": "product_version",
                "name": "dlm-kmp-rt-5.14.21-150400.15.124.1.x86_64",
                "product": {
                  "name": "dlm-kmp-rt-5.14.21-150400.15.124.1.x86_64",
                  "product_id": "dlm-kmp-rt-5.14.21-150400.15.124.1.x86_64"
                }
              },
              {
                "category": "product_version",
                "name": "gfs2-kmp-rt-5.14.21-150400.15.124.1.x86_64",
                "product": {
                  "name": "gfs2-kmp-rt-5.14.21-150400.15.124.1.x86_64",
                  "product_id": "gfs2-kmp-rt-5.14.21-150400.15.124.1.x86_64"
                }
              },
              {
                "category": "product_version",
                "name": "kernel-rt-5.14.21-150400.15.124.1.x86_64",
                "product": {
                  "name": "kernel-rt-5.14.21-150400.15.124.1.x86_64",
                  "product_id": "kernel-rt-5.14.21-150400.15.124.1.x86_64"
                }
              },
              {
                "category": "product_version",
                "name": "kernel-rt-devel-5.14.21-150400.15.124.1.x86_64",
                "product": {
                  "name": "kernel-rt-devel-5.14.21-150400.15.124.1.x86_64",
                  "product_id": "kernel-rt-devel-5.14.21-150400.15.124.1.x86_64"
                }
              },
              {
                "category": "product_version",
                "name": "kernel-rt-extra-5.14.21-150400.15.124.1.x86_64",
                "product": {
                  "name": "kernel-rt-extra-5.14.21-150400.15.124.1.x86_64",
                  "product_id": "kernel-rt-extra-5.14.21-150400.15.124.1.x86_64"
                }
              },
              {
                "category": "product_version",
                "name": "kernel-rt-livepatch-5.14.21-150400.15.124.1.x86_64",
                "product": {
                  "name": "kernel-rt-livepatch-5.14.21-150400.15.124.1.x86_64",
                  "product_id": "kernel-rt-livepatch-5.14.21-150400.15.124.1.x86_64"
                }
              },
              {
                "category": "product_version",
                "name": "kernel-rt-livepatch-devel-5.14.21-150400.15.124.1.x86_64",
                "product": {
                  "name": "kernel-rt-livepatch-devel-5.14.21-150400.15.124.1.x86_64",
                  "product_id": "kernel-rt-livepatch-devel-5.14.21-150400.15.124.1.x86_64"
                }
              },
              {
                "category": "product_version",
                "name": "kernel-rt-optional-5.14.21-150400.15.124.1.x86_64",
                "product": {
                  "name": "kernel-rt-optional-5.14.21-150400.15.124.1.x86_64",
                  "product_id": "kernel-rt-optional-5.14.21-150400.15.124.1.x86_64"
                }
              },
              {
                "category": "product_version",
                "name": "kernel-rt_debug-5.14.21-150400.15.124.1.x86_64",
                "product": {
                  "name": "kernel-rt_debug-5.14.21-150400.15.124.1.x86_64",
                  "product_id": "kernel-rt_debug-5.14.21-150400.15.124.1.x86_64"
                }
              },
              {
                "category": "product_version",
                "name": "kernel-rt_debug-devel-5.14.21-150400.15.124.1.x86_64",
                "product": {
                  "name": "kernel-rt_debug-devel-5.14.21-150400.15.124.1.x86_64",
                  "product_id": "kernel-rt_debug-devel-5.14.21-150400.15.124.1.x86_64"
                }
              },
              {
                "category": "product_version",
                "name": "kselftests-kmp-rt-5.14.21-150400.15.124.1.x86_64",
                "product": {
                  "name": "kselftests-kmp-rt-5.14.21-150400.15.124.1.x86_64",
                  "product_id": "kselftests-kmp-rt-5.14.21-150400.15.124.1.x86_64"
                }
              },
              {
                "category": "product_version",
                "name": "ocfs2-kmp-rt-5.14.21-150400.15.124.1.x86_64",
                "product": {
                  "name": "ocfs2-kmp-rt-5.14.21-150400.15.124.1.x86_64",
                  "product_id": "ocfs2-kmp-rt-5.14.21-150400.15.124.1.x86_64"
                }
              },
              {
                "category": "product_version",
                "name": "reiserfs-kmp-rt-5.14.21-150400.15.124.1.x86_64",
                "product": {
                  "name": "reiserfs-kmp-rt-5.14.21-150400.15.124.1.x86_64",
                  "product_id": "reiserfs-kmp-rt-5.14.21-150400.15.124.1.x86_64"
                }
              }
            ],
            "category": "architecture",
            "name": "x86_64"
          },
          {
            "branches": [
              {
                "category": "product_name",
                "name": "SUSE Linux Enterprise Micro 5.3",
                "product": {
                  "name": "SUSE Linux Enterprise Micro 5.3",
                  "product_id": "SUSE Linux Enterprise Micro 5.3",
                  "product_identification_helper": {
                    "cpe": "cpe:/o:suse:sle-micro:5.3"
                  }
                }
              },
              {
                "category": "product_name",
                "name": "SUSE Linux Enterprise Micro 5.4",
                "product": {
                  "name": "SUSE Linux Enterprise Micro 5.4",
                  "product_id": "SUSE Linux Enterprise Micro 5.4",
                  "product_identification_helper": {
                    "cpe": "cpe:/o:suse:sle-micro:5.4"
                  }
                }
              }
            ],
            "category": "product_family",
            "name": "SUSE Linux Enterprise"
          }
        ],
        "category": "vendor",
        "name": "SUSE"
      }
    ],
    "relationships": [
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-rt-5.14.21-150400.15.124.1.x86_64 as component of SUSE Linux Enterprise Micro 5.3",
          "product_id": "SUSE Linux Enterprise Micro 5.3:kernel-rt-5.14.21-150400.15.124.1.x86_64"
        },
        "product_reference": "kernel-rt-5.14.21-150400.15.124.1.x86_64",
        "relates_to_product_reference": "SUSE Linux Enterprise Micro 5.3"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-source-rt-5.14.21-150400.15.124.1.noarch as component of SUSE Linux Enterprise Micro 5.3",
          "product_id": "SUSE Linux Enterprise Micro 5.3:kernel-source-rt-5.14.21-150400.15.124.1.noarch"
        },
        "product_reference": "kernel-source-rt-5.14.21-150400.15.124.1.noarch",
        "relates_to_product_reference": "SUSE Linux Enterprise Micro 5.3"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-rt-5.14.21-150400.15.124.1.x86_64 as component of SUSE Linux Enterprise Micro 5.4",
          "product_id": "SUSE Linux Enterprise Micro 5.4:kernel-rt-5.14.21-150400.15.124.1.x86_64"
        },
        "product_reference": "kernel-rt-5.14.21-150400.15.124.1.x86_64",
        "relates_to_product_reference": "SUSE Linux Enterprise Micro 5.4"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-source-rt-5.14.21-150400.15.124.1.noarch as component of SUSE Linux Enterprise Micro 5.4",
          "product_id": "SUSE Linux Enterprise Micro 5.4:kernel-source-rt-5.14.21-150400.15.124.1.noarch"
        },
        "product_reference": "kernel-source-rt-5.14.21-150400.15.124.1.noarch",
        "relates_to_product_reference": "SUSE Linux Enterprise Micro 5.4"
      }
    ]
  },
  "vulnerabilities": [
    {
      "cve": "CVE-2021-47557",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2021-47557"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "In the Linux kernel, the following vulnerability has been resolved:\n\nnet/sched: sch_ets: don\u0027t peek at classes beyond \u0027nbands\u0027\n\nwhen the number of DRR classes decreases, the round-robin active list can\ncontain elements that have already been freed in ets_qdisc_change(). As a\nconsequence, it\u0027s possible to see a NULL dereference crash, caused by the\nattempt to call cl-\u003eqdisc-\u003eops-\u003epeek(cl-\u003eqdisc) when cl-\u003eqdisc is NULL:\n\n BUG: kernel NULL pointer dereference, address: 0000000000000018\n #PF: supervisor read access in kernel mode\n #PF: error_code(0x0000) - not-present page\n PGD 0 P4D 0\n Oops: 0000 [#1] PREEMPT SMP NOPTI\n CPU: 1 PID: 910 Comm: mausezahn Not tainted 5.16.0-rc1+ #475\n Hardware name: Red Hat KVM, BIOS 1.11.1-4.module+el8.1.0+4066+0f1aadab 04/01/2014\n RIP: 0010:ets_qdisc_dequeue+0x129/0x2c0 [sch_ets]\n Code: c5 01 41 39 ad e4 02 00 00 0f 87 18 ff ff ff 49 8b 85 c0 02 00 00 49 39 c4 0f 84 ba 00 00 00 49 8b ad c0 02 00 00 48 8b 7d 10 \u003c48\u003e 8b 47 18 48 8b 40 38 0f ae e8 ff d0 48 89 c3 48 85 c0 0f 84 9d\n RSP: 0000:ffffbb36c0b5fdd8 EFLAGS: 00010287\n RAX: ffff956678efed30 RBX: 0000000000000000 RCX: 0000000000000000\n RDX: 0000000000000002 RSI: ffffffff9b938dc9 RDI: 0000000000000000\n RBP: ffff956678efed30 R08: e2f3207fe360129c R09: 0000000000000000\n R10: 0000000000000001 R11: 0000000000000001 R12: ffff956678efeac0\n R13: ffff956678efe800 R14: ffff956611545000 R15: ffff95667ac8f100\n FS:  00007f2aa9120740(0000) GS:ffff95667b800000(0000) knlGS:0000000000000000\n CS:  0010 DS: 0000 ES: 0000 CR0: 0000000080050033\n CR2: 0000000000000018 CR3: 000000011070c000 CR4: 0000000000350ee0\n Call Trace:\n  \u003cTASK\u003e\n  qdisc_peek_dequeued+0x29/0x70 [sch_ets]\n  tbf_dequeue+0x22/0x260 [sch_tbf]\n  __qdisc_run+0x7f/0x630\n  net_tx_action+0x290/0x4c0\n  __do_softirq+0xee/0x4f8\n  irq_exit_rcu+0xf4/0x130\n  sysvec_apic_timer_interrupt+0x52/0xc0\n  asm_sysvec_apic_timer_interrupt+0x12/0x20\n RIP: 0033:0x7f2aa7fc9ad4\n Code: b9 ff ff 48 8b 54 24 18 48 83 c4 08 48 89 ee 48 89 df 5b 5d e9 ed fc ff ff 0f 1f 00 66 2e 0f 1f 84 00 00 00 00 00 f3 0f 1e fa \u003c53\u003e 48 83 ec 10 48 8b 05 10 64 33 00 48 8b 00 48 85 c0 0f 85 84 00\n RSP: 002b:00007ffe5d33fab8 EFLAGS: 00000202\n RAX: 0000000000000002 RBX: 0000561f72c31460 RCX: 0000561f72c31720\n RDX: 0000000000000002 RSI: 0000561f72c31722 RDI: 0000561f72c31720\n RBP: 000000000000002a R08: 00007ffe5d33fa40 R09: 0000000000000014\n R10: 0000000000000000 R11: 0000000000000246 R12: 0000561f7187e380\n R13: 0000000000000000 R14: 0000000000000000 R15: 0000561f72c31460\n  \u003c/TASK\u003e\n Modules linked in: sch_ets sch_tbf dummy rfkill iTCO_wdt intel_rapl_msr iTCO_vendor_support intel_rapl_common joydev virtio_balloon lpc_ich i2c_i801 i2c_smbus pcspkr ip_tables xfs libcrc32c crct10dif_pclmul crc32_pclmul crc32c_intel ahci libahci ghash_clmulni_intel serio_raw libata virtio_blk virtio_console virtio_net net_failover failover sunrpc dm_mirror dm_region_hash dm_log dm_mod\n CR2: 0000000000000018\n\nEnsuring that \u0027alist\u0027 was never zeroed [1] was not sufficient, we need to\nremove from the active list those elements that are no more SP nor DRR.\n\n[1] https://lore.kernel.org/netdev/60d274838bf09777f0371253416e8af71360bc08.1633609148.git.dcaratti@redhat.com/\n\nv3: fix race between ets_qdisc_change() and ets_qdisc_dequeue() delisting\n    DRR classes beyond \u0027nbands\u0027 in ets_qdisc_change() with the qdisc lock\n    acquired, thanks to Cong Wang.\n\nv2: when a NULL qdisc is found in the DRR active list, try to dequeue skb\n    from the next list item.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "SUSE Linux Enterprise Micro 5.3:kernel-rt-5.14.21-150400.15.124.1.x86_64",
          "SUSE Linux Enterprise Micro 5.3:kernel-source-rt-5.14.21-150400.15.124.1.noarch",
          "SUSE Linux Enterprise Micro 5.4:kernel-rt-5.14.21-150400.15.124.1.x86_64",
          "SUSE Linux Enterprise Micro 5.4:kernel-source-rt-5.14.21-150400.15.124.1.noarch"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2021-47557",
          "url": "https://www.suse.com/security/cve/CVE-2021-47557"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1225468 for CVE-2021-47557",
          "url": "https://bugzilla.suse.com/1225468"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "SUSE Linux Enterprise Micro 5.3:kernel-rt-5.14.21-150400.15.124.1.x86_64",
            "SUSE Linux Enterprise Micro 5.3:kernel-source-rt-5.14.21-150400.15.124.1.noarch",
            "SUSE Linux Enterprise Micro 5.4:kernel-rt-5.14.21-150400.15.124.1.x86_64",
            "SUSE Linux Enterprise Micro 5.4:kernel-source-rt-5.14.21-150400.15.124.1.noarch"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 5.5,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
            "version": "3.1"
          },
          "products": [
            "SUSE Linux Enterprise Micro 5.3:kernel-rt-5.14.21-150400.15.124.1.x86_64",
            "SUSE Linux Enterprise Micro 5.3:kernel-source-rt-5.14.21-150400.15.124.1.noarch",
            "SUSE Linux Enterprise Micro 5.4:kernel-rt-5.14.21-150400.15.124.1.x86_64",
            "SUSE Linux Enterprise Micro 5.4:kernel-source-rt-5.14.21-150400.15.124.1.noarch"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2025-07-15T14:31:46Z",
          "details": "moderate"
        }
      ],
      "title": "CVE-2021-47557"
    },
    {
      "cve": "CVE-2021-47595",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2021-47595"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "In the Linux kernel, the following vulnerability has been resolved:\n\nnet/sched: sch_ets: don\u0027t remove idle classes from the round-robin list\n\nShuang reported that the following script:\n\n 1) tc qdisc add dev ddd0 handle 10: parent 1: ets bands 8 strict 4 priomap 7 7 7 7 7 7 7 7 7 7 7 7 7 7 7 7\n 2) mausezahn ddd0  -A 10.10.10.1 -B 10.10.10.2 -c 0 -a own -b 00:c1:a0:c1:a0:00 -t udp \u0026\n 3) tc qdisc change dev ddd0 handle 10: ets bands 4 strict 2 quanta 2500 2500 priomap 3 3 3 3 3 3 3 3 3 3 3 3 3 3 3 3\n\ncrashes systematically when line 2) is commented:\n\n list_del corruption, ffff8e028404bd30-\u003enext is LIST_POISON1 (dead000000000100)\n ------------[ cut here ]------------\n kernel BUG at lib/list_debug.c:47!\n invalid opcode: 0000 [#1] PREEMPT SMP NOPTI\n CPU: 0 PID: 954 Comm: tc Not tainted 5.16.0-rc4+ #478\n Hardware name: Red Hat KVM, BIOS 1.11.1-4.module+el8.1.0+4066+0f1aadab 04/01/2014\n RIP: 0010:__list_del_entry_valid.cold.1+0x12/0x47\n Code: fe ff 0f 0b 48 89 c1 4c 89 c6 48 c7 c7 08 42 1b 87 e8 1d c5 fe ff 0f 0b 48 89 fe 48 89 c2 48 c7 c7 98 42 1b 87 e8 09 c5 fe ff \u003c0f\u003e 0b 48 c7 c7 48 43 1b 87 e8 fb c4 fe ff 0f 0b 48 89 f2 48 89 fe\n RSP: 0018:ffffae46807a3888 EFLAGS: 00010246\n RAX: 000000000000004e RBX: 0000000000000007 RCX: 0000000000000202\n RDX: 0000000000000000 RSI: ffffffff871ac536 RDI: 00000000ffffffff\n RBP: ffffae46807a3a10 R08: 0000000000000000 R09: c0000000ffff7fff\n R10: 0000000000000001 R11: ffffae46807a36a8 R12: ffff8e028404b800\n R13: ffff8e028404bd30 R14: dead000000000100 R15: ffff8e02fafa2400\n FS:  00007efdc92e4480(0000) GS:ffff8e02fb600000(0000) knlGS:0000000000000000\n CS:  0010 DS: 0000 ES: 0000 CR0: 0000000080050033\n CR2: 0000000000682f48 CR3: 00000001058be000 CR4: 0000000000350ef0\n Call Trace:\n  \u003cTASK\u003e\n  ets_qdisc_change+0x58b/0xa70 [sch_ets]\n  tc_modify_qdisc+0x323/0x880\n  rtnetlink_rcv_msg+0x169/0x4a0\n  netlink_rcv_skb+0x50/0x100\n  netlink_unicast+0x1a5/0x280\n  netlink_sendmsg+0x257/0x4d0\n  sock_sendmsg+0x5b/0x60\n  ____sys_sendmsg+0x1f2/0x260\n  ___sys_sendmsg+0x7c/0xc0\n  __sys_sendmsg+0x57/0xa0\n  do_syscall_64+0x3a/0x80\n  entry_SYSCALL_64_after_hwframe+0x44/0xae\n RIP: 0033:0x7efdc8031338\n Code: 89 02 48 c7 c0 ff ff ff ff eb b5 0f 1f 80 00 00 00 00 f3 0f 1e fa 48 8d 05 25 43 2c 00 8b 00 85 c0 75 17 b8 2e 00 00 00 0f 05 \u003c48\u003e 3d 00 f0 ff ff 77 58 c3 0f 1f 80 00 00 00 00 41 54 41 89 d4 55\n RSP: 002b:00007ffdf1ce9828 EFLAGS: 00000246 ORIG_RAX: 000000000000002e\n RAX: ffffffffffffffda RBX: 0000000061b37a97 RCX: 00007efdc8031338\n RDX: 0000000000000000 RSI: 00007ffdf1ce9890 RDI: 0000000000000003\n RBP: 0000000000000000 R08: 0000000000000001 R09: 000000000078a940\n R10: 000000000000000c R11: 0000000000000246 R12: 0000000000000001\n R13: 0000000000688880 R14: 0000000000000000 R15: 0000000000000000\n  \u003c/TASK\u003e\n Modules linked in: sch_ets sch_tbf dummy rfkill iTCO_wdt iTCO_vendor_support intel_rapl_msr intel_rapl_common joydev pcspkr i2c_i801 virtio_balloon i2c_smbus lpc_ich ip_tables xfs libcrc32c crct10dif_pclmul crc32_pclmul crc32c_intel serio_raw ghash_clmulni_intel ahci libahci libata virtio_blk virtio_console virtio_net net_failover failover sunrpc dm_mirror dm_region_hash dm_log dm_mod [last unloaded: sch_ets]\n ---[ end trace f35878d1912655c2 ]---\n RIP: 0010:__list_del_entry_valid.cold.1+0x12/0x47\n Code: fe ff 0f 0b 48 89 c1 4c 89 c6 48 c7 c7 08 42 1b 87 e8 1d c5 fe ff 0f 0b 48 89 fe 48 89 c2 48 c7 c7 98 42 1b 87 e8 09 c5 fe ff \u003c0f\u003e 0b 48 c7 c7 48 43 1b 87 e8 fb c4 fe ff 0f 0b 48 89 f2 48 89 fe\n RSP: 0018:ffffae46807a3888 EFLAGS: 00010246\n RAX: 000000000000004e RBX: 0000000000000007 RCX: 0000000000000202\n RDX: 0000000000000000 RSI: ffffffff871ac536 RDI: 00000000ffffffff\n RBP: ffffae46807a3a10 R08: 0000000000000000 R09: c0000000ffff7fff\n R10: 0000000000000001 R11: ffffae46807a36a8 R12: ffff8e028404b800\n R13: ffff8e028404bd30 R14: dead000000000100 R15: ffff8e02fafa2400\n FS:  00007efdc92e4480(0000) GS:ffff8e02fb600000(0000) knlGS:0000000000000000\n CS:  0010 DS: 0000 ES: 0000 CR0: 0000000080050033\n CR2: 000000000\n---truncated---",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "SUSE Linux Enterprise Micro 5.3:kernel-rt-5.14.21-150400.15.124.1.x86_64",
          "SUSE Linux Enterprise Micro 5.3:kernel-source-rt-5.14.21-150400.15.124.1.noarch",
          "SUSE Linux Enterprise Micro 5.4:kernel-rt-5.14.21-150400.15.124.1.x86_64",
          "SUSE Linux Enterprise Micro 5.4:kernel-source-rt-5.14.21-150400.15.124.1.noarch"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2021-47595",
          "url": "https://www.suse.com/security/cve/CVE-2021-47595"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1226552 for CVE-2021-47595",
          "url": "https://bugzilla.suse.com/1226552"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "SUSE Linux Enterprise Micro 5.3:kernel-rt-5.14.21-150400.15.124.1.x86_64",
            "SUSE Linux Enterprise Micro 5.3:kernel-source-rt-5.14.21-150400.15.124.1.noarch",
            "SUSE Linux Enterprise Micro 5.4:kernel-rt-5.14.21-150400.15.124.1.x86_64",
            "SUSE Linux Enterprise Micro 5.4:kernel-source-rt-5.14.21-150400.15.124.1.noarch"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 5.5,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
            "version": "3.1"
          },
          "products": [
            "SUSE Linux Enterprise Micro 5.3:kernel-rt-5.14.21-150400.15.124.1.x86_64",
            "SUSE Linux Enterprise Micro 5.3:kernel-source-rt-5.14.21-150400.15.124.1.noarch",
            "SUSE Linux Enterprise Micro 5.4:kernel-rt-5.14.21-150400.15.124.1.x86_64",
            "SUSE Linux Enterprise Micro 5.4:kernel-source-rt-5.14.21-150400.15.124.1.noarch"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2025-07-15T14:31:46Z",
          "details": "moderate"
        }
      ],
      "title": "CVE-2021-47595"
    },
    {
      "cve": "CVE-2022-1679",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2022-1679"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "A use-after-free flaw was found in the Linux kernel\u0027s Atheros wireless adapter driver in the way a user forces the ath9k_htc_wait_for_target function to fail with some input messages. This flaw allows a local user to crash or potentially escalate their privileges on the system.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "SUSE Linux Enterprise Micro 5.3:kernel-rt-5.14.21-150400.15.124.1.x86_64",
          "SUSE Linux Enterprise Micro 5.3:kernel-source-rt-5.14.21-150400.15.124.1.noarch",
          "SUSE Linux Enterprise Micro 5.4:kernel-rt-5.14.21-150400.15.124.1.x86_64",
          "SUSE Linux Enterprise Micro 5.4:kernel-source-rt-5.14.21-150400.15.124.1.noarch"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2022-1679",
          "url": "https://www.suse.com/security/cve/CVE-2022-1679"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1199487 for CVE-2022-1679",
          "url": "https://bugzilla.suse.com/1199487"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1201080 for CVE-2022-1679",
          "url": "https://bugzilla.suse.com/1201080"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1201832 for CVE-2022-1679",
          "url": "https://bugzilla.suse.com/1201832"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1204132 for CVE-2022-1679",
          "url": "https://bugzilla.suse.com/1204132"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1212316 for CVE-2022-1679",
          "url": "https://bugzilla.suse.com/1212316"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "SUSE Linux Enterprise Micro 5.3:kernel-rt-5.14.21-150400.15.124.1.x86_64",
            "SUSE Linux Enterprise Micro 5.3:kernel-source-rt-5.14.21-150400.15.124.1.noarch",
            "SUSE Linux Enterprise Micro 5.4:kernel-rt-5.14.21-150400.15.124.1.x86_64",
            "SUSE Linux Enterprise Micro 5.4:kernel-source-rt-5.14.21-150400.15.124.1.noarch"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 7,
            "baseSeverity": "HIGH",
            "vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H",
            "version": "3.1"
          },
          "products": [
            "SUSE Linux Enterprise Micro 5.3:kernel-rt-5.14.21-150400.15.124.1.x86_64",
            "SUSE Linux Enterprise Micro 5.3:kernel-source-rt-5.14.21-150400.15.124.1.noarch",
            "SUSE Linux Enterprise Micro 5.4:kernel-rt-5.14.21-150400.15.124.1.x86_64",
            "SUSE Linux Enterprise Micro 5.4:kernel-source-rt-5.14.21-150400.15.124.1.noarch"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2025-07-15T14:31:46Z",
          "details": "moderate"
        }
      ],
      "title": "CVE-2022-1679"
    },
    {
      "cve": "CVE-2022-2585",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2022-2585"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "It was discovered that when exec\u0027ing from a non-leader thread, armed POSIX CPU timers would be left on a list but freed, leading to a use-after-free.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "SUSE Linux Enterprise Micro 5.3:kernel-rt-5.14.21-150400.15.124.1.x86_64",
          "SUSE Linux Enterprise Micro 5.3:kernel-source-rt-5.14.21-150400.15.124.1.noarch",
          "SUSE Linux Enterprise Micro 5.4:kernel-rt-5.14.21-150400.15.124.1.x86_64",
          "SUSE Linux Enterprise Micro 5.4:kernel-source-rt-5.14.21-150400.15.124.1.noarch"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2022-2585",
          "url": "https://www.suse.com/security/cve/CVE-2022-2585"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1202094 for CVE-2022-2585",
          "url": "https://bugzilla.suse.com/1202094"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1202163 for CVE-2022-2585",
          "url": "https://bugzilla.suse.com/1202163"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "SUSE Linux Enterprise Micro 5.3:kernel-rt-5.14.21-150400.15.124.1.x86_64",
            "SUSE Linux Enterprise Micro 5.3:kernel-source-rt-5.14.21-150400.15.124.1.noarch",
            "SUSE Linux Enterprise Micro 5.4:kernel-rt-5.14.21-150400.15.124.1.x86_64",
            "SUSE Linux Enterprise Micro 5.4:kernel-source-rt-5.14.21-150400.15.124.1.noarch"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 8.4,
            "baseSeverity": "HIGH",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
            "version": "3.1"
          },
          "products": [
            "SUSE Linux Enterprise Micro 5.3:kernel-rt-5.14.21-150400.15.124.1.x86_64",
            "SUSE Linux Enterprise Micro 5.3:kernel-source-rt-5.14.21-150400.15.124.1.noarch",
            "SUSE Linux Enterprise Micro 5.4:kernel-rt-5.14.21-150400.15.124.1.x86_64",
            "SUSE Linux Enterprise Micro 5.4:kernel-source-rt-5.14.21-150400.15.124.1.noarch"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2025-07-15T14:31:46Z",
          "details": "important"
        }
      ],
      "title": "CVE-2022-2585"
    },
    {
      "cve": "CVE-2022-2586",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2022-2586"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "It was discovered that a nft object or expression could reference a nft set on a different nft table, leading to a use-after-free once that table was deleted.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "SUSE Linux Enterprise Micro 5.3:kernel-rt-5.14.21-150400.15.124.1.x86_64",
          "SUSE Linux Enterprise Micro 5.3:kernel-source-rt-5.14.21-150400.15.124.1.noarch",
          "SUSE Linux Enterprise Micro 5.4:kernel-rt-5.14.21-150400.15.124.1.x86_64",
          "SUSE Linux Enterprise Micro 5.4:kernel-source-rt-5.14.21-150400.15.124.1.noarch"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2022-2586",
          "url": "https://www.suse.com/security/cve/CVE-2022-2586"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1202095 for CVE-2022-2586",
          "url": "https://bugzilla.suse.com/1202095"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1209719 for CVE-2022-2586",
          "url": "https://bugzilla.suse.com/1209719"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "SUSE Linux Enterprise Micro 5.3:kernel-rt-5.14.21-150400.15.124.1.x86_64",
            "SUSE Linux Enterprise Micro 5.3:kernel-source-rt-5.14.21-150400.15.124.1.noarch",
            "SUSE Linux Enterprise Micro 5.4:kernel-rt-5.14.21-150400.15.124.1.x86_64",
            "SUSE Linux Enterprise Micro 5.4:kernel-source-rt-5.14.21-150400.15.124.1.noarch"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 6.7,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H",
            "version": "3.1"
          },
          "products": [
            "SUSE Linux Enterprise Micro 5.3:kernel-rt-5.14.21-150400.15.124.1.x86_64",
            "SUSE Linux Enterprise Micro 5.3:kernel-source-rt-5.14.21-150400.15.124.1.noarch",
            "SUSE Linux Enterprise Micro 5.4:kernel-rt-5.14.21-150400.15.124.1.x86_64",
            "SUSE Linux Enterprise Micro 5.4:kernel-source-rt-5.14.21-150400.15.124.1.noarch"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2025-07-15T14:31:46Z",
          "details": "moderate"
        }
      ],
      "title": "CVE-2022-2586"
    },
    {
      "cve": "CVE-2022-2905",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2022-2905"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "An out-of-bounds memory read flaw was found in the Linux kernel\u0027s BPF subsystem in how a user calls the bpf_tail_call function with a key larger than the max_entries of the map. This flaw allows a local user to gain unauthorized access to data.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "SUSE Linux Enterprise Micro 5.3:kernel-rt-5.14.21-150400.15.124.1.x86_64",
          "SUSE Linux Enterprise Micro 5.3:kernel-source-rt-5.14.21-150400.15.124.1.noarch",
          "SUSE Linux Enterprise Micro 5.4:kernel-rt-5.14.21-150400.15.124.1.x86_64",
          "SUSE Linux Enterprise Micro 5.4:kernel-source-rt-5.14.21-150400.15.124.1.noarch"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2022-2905",
          "url": "https://www.suse.com/security/cve/CVE-2022-2905"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1202860 for CVE-2022-2905",
          "url": "https://bugzilla.suse.com/1202860"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "SUSE Linux Enterprise Micro 5.3:kernel-rt-5.14.21-150400.15.124.1.x86_64",
            "SUSE Linux Enterprise Micro 5.3:kernel-source-rt-5.14.21-150400.15.124.1.noarch",
            "SUSE Linux Enterprise Micro 5.4:kernel-rt-5.14.21-150400.15.124.1.x86_64",
            "SUSE Linux Enterprise Micro 5.4:kernel-source-rt-5.14.21-150400.15.124.1.noarch"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 6.2,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N",
            "version": "3.1"
          },
          "products": [
            "SUSE Linux Enterprise Micro 5.3:kernel-rt-5.14.21-150400.15.124.1.x86_64",
            "SUSE Linux Enterprise Micro 5.3:kernel-source-rt-5.14.21-150400.15.124.1.noarch",
            "SUSE Linux Enterprise Micro 5.4:kernel-rt-5.14.21-150400.15.124.1.x86_64",
            "SUSE Linux Enterprise Micro 5.4:kernel-source-rt-5.14.21-150400.15.124.1.noarch"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2025-07-15T14:31:46Z",
          "details": "moderate"
        }
      ],
      "title": "CVE-2022-2905"
    },
    {
      "cve": "CVE-2022-3903",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2022-3903"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "An incorrect read request flaw was found in the Infrared Transceiver USB driver in the Linux kernel. This issue occurs when a user attaches a malicious USB device. A local user could use this flaw to starve the resources, causing denial of service or potentially crashing the system.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "SUSE Linux Enterprise Micro 5.3:kernel-rt-5.14.21-150400.15.124.1.x86_64",
          "SUSE Linux Enterprise Micro 5.3:kernel-source-rt-5.14.21-150400.15.124.1.noarch",
          "SUSE Linux Enterprise Micro 5.4:kernel-rt-5.14.21-150400.15.124.1.x86_64",
          "SUSE Linux Enterprise Micro 5.4:kernel-source-rt-5.14.21-150400.15.124.1.noarch"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2022-3903",
          "url": "https://www.suse.com/security/cve/CVE-2022-3903"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1205220 for CVE-2022-3903",
          "url": "https://bugzilla.suse.com/1205220"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1212297 for CVE-2022-3903",
          "url": "https://bugzilla.suse.com/1212297"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "SUSE Linux Enterprise Micro 5.3:kernel-rt-5.14.21-150400.15.124.1.x86_64",
            "SUSE Linux Enterprise Micro 5.3:kernel-source-rt-5.14.21-150400.15.124.1.noarch",
            "SUSE Linux Enterprise Micro 5.4:kernel-rt-5.14.21-150400.15.124.1.x86_64",
            "SUSE Linux Enterprise Micro 5.4:kernel-source-rt-5.14.21-150400.15.124.1.noarch"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 5.5,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
            "version": "3.1"
          },
          "products": [
            "SUSE Linux Enterprise Micro 5.3:kernel-rt-5.14.21-150400.15.124.1.x86_64",
            "SUSE Linux Enterprise Micro 5.3:kernel-source-rt-5.14.21-150400.15.124.1.noarch",
            "SUSE Linux Enterprise Micro 5.4:kernel-rt-5.14.21-150400.15.124.1.x86_64",
            "SUSE Linux Enterprise Micro 5.4:kernel-source-rt-5.14.21-150400.15.124.1.noarch"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2025-07-15T14:31:46Z",
          "details": "moderate"
        }
      ],
      "title": "CVE-2022-3903"
    },
    {
      "cve": "CVE-2022-4095",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2022-4095"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "A use-after-free flaw was found in Linux kernel before 5.19.2. This issue occurs in cmd_hdl_filter in drivers/staging/rtl8712/rtl8712_cmd.c, allowing an attacker to launch a local denial of service attack and gain escalation of privileges.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "SUSE Linux Enterprise Micro 5.3:kernel-rt-5.14.21-150400.15.124.1.x86_64",
          "SUSE Linux Enterprise Micro 5.3:kernel-source-rt-5.14.21-150400.15.124.1.noarch",
          "SUSE Linux Enterprise Micro 5.4:kernel-rt-5.14.21-150400.15.124.1.x86_64",
          "SUSE Linux Enterprise Micro 5.4:kernel-source-rt-5.14.21-150400.15.124.1.noarch"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2022-4095",
          "url": "https://www.suse.com/security/cve/CVE-2022-4095"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1205514 for CVE-2022-4095",
          "url": "https://bugzilla.suse.com/1205514"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1205594 for CVE-2022-4095",
          "url": "https://bugzilla.suse.com/1205594"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1208030 for CVE-2022-4095",
          "url": "https://bugzilla.suse.com/1208030"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1208085 for CVE-2022-4095",
          "url": "https://bugzilla.suse.com/1208085"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1212319 for CVE-2022-4095",
          "url": "https://bugzilla.suse.com/1212319"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "SUSE Linux Enterprise Micro 5.3:kernel-rt-5.14.21-150400.15.124.1.x86_64",
            "SUSE Linux Enterprise Micro 5.3:kernel-source-rt-5.14.21-150400.15.124.1.noarch",
            "SUSE Linux Enterprise Micro 5.4:kernel-rt-5.14.21-150400.15.124.1.x86_64",
            "SUSE Linux Enterprise Micro 5.4:kernel-source-rt-5.14.21-150400.15.124.1.noarch"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 7.8,
            "baseSeverity": "HIGH",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
            "version": "3.1"
          },
          "products": [
            "SUSE Linux Enterprise Micro 5.3:kernel-rt-5.14.21-150400.15.124.1.x86_64",
            "SUSE Linux Enterprise Micro 5.3:kernel-source-rt-5.14.21-150400.15.124.1.noarch",
            "SUSE Linux Enterprise Micro 5.4:kernel-rt-5.14.21-150400.15.124.1.x86_64",
            "SUSE Linux Enterprise Micro 5.4:kernel-source-rt-5.14.21-150400.15.124.1.noarch"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2025-07-15T14:31:46Z",
          "details": "important"
        }
      ],
      "title": "CVE-2022-4095"
    },
    {
      "cve": "CVE-2022-4662",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2022-4662"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "A flaw incorrect access control in the Linux kernel USB core subsystem was found in the way user attaches usb device. A local user could use this flaw to crash the system.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "SUSE Linux Enterprise Micro 5.3:kernel-rt-5.14.21-150400.15.124.1.x86_64",
          "SUSE Linux Enterprise Micro 5.3:kernel-source-rt-5.14.21-150400.15.124.1.noarch",
          "SUSE Linux Enterprise Micro 5.4:kernel-rt-5.14.21-150400.15.124.1.x86_64",
          "SUSE Linux Enterprise Micro 5.4:kernel-source-rt-5.14.21-150400.15.124.1.noarch"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2022-4662",
          "url": "https://www.suse.com/security/cve/CVE-2022-4662"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1206664 for CVE-2022-4662",
          "url": "https://bugzilla.suse.com/1206664"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "SUSE Linux Enterprise Micro 5.3:kernel-rt-5.14.21-150400.15.124.1.x86_64",
            "SUSE Linux Enterprise Micro 5.3:kernel-source-rt-5.14.21-150400.15.124.1.noarch",
            "SUSE Linux Enterprise Micro 5.4:kernel-rt-5.14.21-150400.15.124.1.x86_64",
            "SUSE Linux Enterprise Micro 5.4:kernel-source-rt-5.14.21-150400.15.124.1.noarch"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 4.7,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H",
            "version": "3.1"
          },
          "products": [
            "SUSE Linux Enterprise Micro 5.3:kernel-rt-5.14.21-150400.15.124.1.x86_64",
            "SUSE Linux Enterprise Micro 5.3:kernel-source-rt-5.14.21-150400.15.124.1.noarch",
            "SUSE Linux Enterprise Micro 5.4:kernel-rt-5.14.21-150400.15.124.1.x86_64",
            "SUSE Linux Enterprise Micro 5.4:kernel-source-rt-5.14.21-150400.15.124.1.noarch"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2025-07-15T14:31:46Z",
          "details": "moderate"
        }
      ],
      "title": "CVE-2022-4662"
    },
    {
      "cve": "CVE-2022-49934",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2022-49934"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "In the Linux kernel, the following vulnerability has been resolved:\n\nwifi: mac80211: Fix UAF in ieee80211_scan_rx()\n\nieee80211_scan_rx() tries to access scan_req-\u003eflags after a\nnull check, but a UAF is observed when the scan is completed\nand __ieee80211_scan_completed() executes, which then calls\ncfg80211_scan_done() leading to the freeing of scan_req.\n\nSince scan_req is rcu_dereference()\u0027d, prevent the racing in\n__ieee80211_scan_completed() by ensuring that from mac80211\u0027s\nPOV it is no longer accessed from an RCU read critical section\nbefore we call cfg80211_scan_done().",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "SUSE Linux Enterprise Micro 5.3:kernel-rt-5.14.21-150400.15.124.1.x86_64",
          "SUSE Linux Enterprise Micro 5.3:kernel-source-rt-5.14.21-150400.15.124.1.noarch",
          "SUSE Linux Enterprise Micro 5.4:kernel-rt-5.14.21-150400.15.124.1.x86_64",
          "SUSE Linux Enterprise Micro 5.4:kernel-source-rt-5.14.21-150400.15.124.1.noarch"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2022-49934",
          "url": "https://www.suse.com/security/cve/CVE-2022-49934"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1245051 for CVE-2022-49934",
          "url": "https://bugzilla.suse.com/1245051"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "SUSE Linux Enterprise Micro 5.3:kernel-rt-5.14.21-150400.15.124.1.x86_64",
            "SUSE Linux Enterprise Micro 5.3:kernel-source-rt-5.14.21-150400.15.124.1.noarch",
            "SUSE Linux Enterprise Micro 5.4:kernel-rt-5.14.21-150400.15.124.1.x86_64",
            "SUSE Linux Enterprise Micro 5.4:kernel-source-rt-5.14.21-150400.15.124.1.noarch"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 4.7,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H",
            "version": "3.1"
          },
          "products": [
            "SUSE Linux Enterprise Micro 5.3:kernel-rt-5.14.21-150400.15.124.1.x86_64",
            "SUSE Linux Enterprise Micro 5.3:kernel-source-rt-5.14.21-150400.15.124.1.noarch",
            "SUSE Linux Enterprise Micro 5.4:kernel-rt-5.14.21-150400.15.124.1.x86_64",
            "SUSE Linux Enterprise Micro 5.4:kernel-source-rt-5.14.21-150400.15.124.1.noarch"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2025-07-15T14:31:46Z",
          "details": "moderate"
        }
      ],
      "title": "CVE-2022-49934"
    },
    {
      "cve": "CVE-2022-49936",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2022-49936"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "In the Linux kernel, the following vulnerability has been resolved:\n\nUSB: core: Prevent nested device-reset calls\n\nAutomatic kernel fuzzing revealed a recursive locking violation in\nusb-storage:\n\n============================================\nWARNING: possible recursive locking detected\n5.18.0 #3 Not tainted\n--------------------------------------------\nkworker/1:3/1205 is trying to acquire lock:\nffff888018638db8 (\u0026us_interface_key[i]){+.+.}-{3:3}, at:\nusb_stor_pre_reset+0x35/0x40 drivers/usb/storage/usb.c:230\n\nbut task is already holding lock:\nffff888018638db8 (\u0026us_interface_key[i]){+.+.}-{3:3}, at:\nusb_stor_pre_reset+0x35/0x40 drivers/usb/storage/usb.c:230\n\n...\n\nstack backtrace:\nCPU: 1 PID: 1205 Comm: kworker/1:3 Not tainted 5.18.0 #3\nHardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS\n1.13.0-1ubuntu1.1 04/01/2014\nWorkqueue: usb_hub_wq hub_event\nCall Trace:\n\u003cTASK\u003e\n__dump_stack lib/dump_stack.c:88 [inline]\ndump_stack_lvl+0xcd/0x134 lib/dump_stack.c:106\nprint_deadlock_bug kernel/locking/lockdep.c:2988 [inline]\ncheck_deadlock kernel/locking/lockdep.c:3031 [inline]\nvalidate_chain kernel/locking/lockdep.c:3816 [inline]\n__lock_acquire.cold+0x152/0x3ca kernel/locking/lockdep.c:5053\nlock_acquire kernel/locking/lockdep.c:5665 [inline]\nlock_acquire+0x1ab/0x520 kernel/locking/lockdep.c:5630\n__mutex_lock_common kernel/locking/mutex.c:603 [inline]\n__mutex_lock+0x14f/0x1610 kernel/locking/mutex.c:747\nusb_stor_pre_reset+0x35/0x40 drivers/usb/storage/usb.c:230\nusb_reset_device+0x37d/0x9a0 drivers/usb/core/hub.c:6109\nr871xu_dev_remove+0x21a/0x270 drivers/staging/rtl8712/usb_intf.c:622\nusb_unbind_interface+0x1bd/0x890 drivers/usb/core/driver.c:458\ndevice_remove drivers/base/dd.c:545 [inline]\ndevice_remove+0x11f/0x170 drivers/base/dd.c:537\n__device_release_driver drivers/base/dd.c:1222 [inline]\ndevice_release_driver_internal+0x1a7/0x2f0 drivers/base/dd.c:1248\nusb_driver_release_interface+0x102/0x180 drivers/usb/core/driver.c:627\nusb_forced_unbind_intf+0x4d/0xa0 drivers/usb/core/driver.c:1118\nusb_reset_device+0x39b/0x9a0 drivers/usb/core/hub.c:6114\n\nThis turned out not to be an error in usb-storage but rather a nested\ndevice reset attempt.  That is, as the rtl8712 driver was being\nunbound from a composite device in preparation for an unrelated USB\nreset (that driver does not have pre_reset or post_reset callbacks),\nits -\u003eremove routine called usb_reset_device() -- thus nesting one\nreset call within another.\n\nPerforming a reset as part of disconnect processing is a questionable\npractice at best.  However, the bug report points out that the USB\ncore does not have any protection against nested resets.  Adding a\nreset_in_progress flag and testing it will prevent such errors in the\nfuture.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "SUSE Linux Enterprise Micro 5.3:kernel-rt-5.14.21-150400.15.124.1.x86_64",
          "SUSE Linux Enterprise Micro 5.3:kernel-source-rt-5.14.21-150400.15.124.1.noarch",
          "SUSE Linux Enterprise Micro 5.4:kernel-rt-5.14.21-150400.15.124.1.x86_64",
          "SUSE Linux Enterprise Micro 5.4:kernel-source-rt-5.14.21-150400.15.124.1.noarch"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2022-49936",
          "url": "https://www.suse.com/security/cve/CVE-2022-49936"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1244984 for CVE-2022-49936",
          "url": "https://bugzilla.suse.com/1244984"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "SUSE Linux Enterprise Micro 5.3:kernel-rt-5.14.21-150400.15.124.1.x86_64",
            "SUSE Linux Enterprise Micro 5.3:kernel-source-rt-5.14.21-150400.15.124.1.noarch",
            "SUSE Linux Enterprise Micro 5.4:kernel-rt-5.14.21-150400.15.124.1.x86_64",
            "SUSE Linux Enterprise Micro 5.4:kernel-source-rt-5.14.21-150400.15.124.1.noarch"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 5.5,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
            "version": "3.1"
          },
          "products": [
            "SUSE Linux Enterprise Micro 5.3:kernel-rt-5.14.21-150400.15.124.1.x86_64",
            "SUSE Linux Enterprise Micro 5.3:kernel-source-rt-5.14.21-150400.15.124.1.noarch",
            "SUSE Linux Enterprise Micro 5.4:kernel-rt-5.14.21-150400.15.124.1.x86_64",
            "SUSE Linux Enterprise Micro 5.4:kernel-source-rt-5.14.21-150400.15.124.1.noarch"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2025-07-15T14:31:46Z",
          "details": "moderate"
        }
      ],
      "title": "CVE-2022-49936"
    },
    {
      "cve": "CVE-2022-49937",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2022-49937"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "In the Linux kernel, the following vulnerability has been resolved:\n\nmedia: mceusb: Use new usb_control_msg_*() routines\n\nAutomatic kernel fuzzing led to a WARN about invalid pipe direction in\nthe mceusb driver:\n\n------------[ cut here ]------------\nusb 6-1: BOGUS control dir, pipe 80000380 doesn\u0027t match bRequestType 40\nWARNING: CPU: 0 PID: 2465 at drivers/usb/core/urb.c:410\nusb_submit_urb+0x1326/0x1820 drivers/usb/core/urb.c:410\nModules linked in:\nCPU: 0 PID: 2465 Comm: kworker/0:2 Not tainted 5.19.0-rc4-00208-g69cb6c6556ad #1\nHardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS\n1.13.0-1ubuntu1.1 04/01/2014\nWorkqueue: usb_hub_wq hub_event\nRIP: 0010:usb_submit_urb+0x1326/0x1820 drivers/usb/core/urb.c:410\nCode: 7c 24 40 e8 ac 23 91 fd 48 8b 7c 24 40 e8 b2 70 1b ff 45 89 e8\n44 89 f1 4c 89 e2 48 89 c6 48 c7 c7 a0 30 a9 86 e8 48 07 11 02 \u003c0f\u003e 0b\ne9 1c f0 ff ff e8 7e 23 91 fd 0f b6 1d 63 22 83 05 31 ff 41\nRSP: 0018:ffffc900032becf0 EFLAGS: 00010282\nRAX: 0000000000000000 RBX: ffff8881100f3058 RCX: 0000000000000000\nRDX: ffffc90004961000 RSI: ffff888114c6d580 RDI: fffff52000657d90\nRBP: ffff888105ad90f0 R08: ffffffff812c3638 R09: 0000000000000000\nR10: 0000000000000005 R11: ffffed1023504ef1 R12: ffff888105ad9000\nR13: 0000000000000040 R14: 0000000080000380 R15: ffff88810ba96500\nFS: 0000000000000000(0000) GS:ffff88811a800000(0000) knlGS:0000000000000000\nCS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033\nCR2: 00007ffe810bda58 CR3: 000000010b720000 CR4: 0000000000350ef0\nCall Trace:\n\u003cTASK\u003e\nusb_start_wait_urb+0x101/0x4c0 drivers/usb/core/message.c:58\nusb_internal_control_msg drivers/usb/core/message.c:102 [inline]\nusb_control_msg+0x31c/0x4a0 drivers/usb/core/message.c:153\nmceusb_gen1_init drivers/media/rc/mceusb.c:1431 [inline]\nmceusb_dev_probe+0x258e/0x33f0 drivers/media/rc/mceusb.c:1807\n\nThe reason for the warning is clear enough; the driver sends an\nunusual read request on endpoint 0 but does not set the USB_DIR_IN bit\nin the bRequestType field.\n\nMore importantly, the whole situation can be avoided and the driver\nsimplified by converting it over to the relatively new\nusb_control_msg_recv() and usb_control_msg_send() routines.  That\u0027s\nwhat this fix does.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "SUSE Linux Enterprise Micro 5.3:kernel-rt-5.14.21-150400.15.124.1.x86_64",
          "SUSE Linux Enterprise Micro 5.3:kernel-source-rt-5.14.21-150400.15.124.1.noarch",
          "SUSE Linux Enterprise Micro 5.4:kernel-rt-5.14.21-150400.15.124.1.x86_64",
          "SUSE Linux Enterprise Micro 5.4:kernel-source-rt-5.14.21-150400.15.124.1.noarch"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2022-49937",
          "url": "https://www.suse.com/security/cve/CVE-2022-49937"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1245057 for CVE-2022-49937",
          "url": "https://bugzilla.suse.com/1245057"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "SUSE Linux Enterprise Micro 5.3:kernel-rt-5.14.21-150400.15.124.1.x86_64",
            "SUSE Linux Enterprise Micro 5.3:kernel-source-rt-5.14.21-150400.15.124.1.noarch",
            "SUSE Linux Enterprise Micro 5.4:kernel-rt-5.14.21-150400.15.124.1.x86_64",
            "SUSE Linux Enterprise Micro 5.4:kernel-source-rt-5.14.21-150400.15.124.1.noarch"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 4,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L",
            "version": "3.1"
          },
          "products": [
            "SUSE Linux Enterprise Micro 5.3:kernel-rt-5.14.21-150400.15.124.1.x86_64",
            "SUSE Linux Enterprise Micro 5.3:kernel-source-rt-5.14.21-150400.15.124.1.noarch",
            "SUSE Linux Enterprise Micro 5.4:kernel-rt-5.14.21-150400.15.124.1.x86_64",
            "SUSE Linux Enterprise Micro 5.4:kernel-source-rt-5.14.21-150400.15.124.1.noarch"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2025-07-15T14:31:46Z",
          "details": "moderate"
        }
      ],
      "title": "CVE-2022-49937"
    },
    {
      "cve": "CVE-2022-49938",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2022-49938"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "In the Linux kernel, the following vulnerability has been resolved:\n\ncifs: fix small mempool leak in SMB2_negotiate()\n\nIn some cases of failure (dialect mismatches) in SMB2_negotiate(), after\nthe request is sent, the checks would return -EIO when they should be\nrather setting rc = -EIO and jumping to neg_exit to free the response\nbuffer from mempool.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "SUSE Linux Enterprise Micro 5.3:kernel-rt-5.14.21-150400.15.124.1.x86_64",
          "SUSE Linux Enterprise Micro 5.3:kernel-source-rt-5.14.21-150400.15.124.1.noarch",
          "SUSE Linux Enterprise Micro 5.4:kernel-rt-5.14.21-150400.15.124.1.x86_64",
          "SUSE Linux Enterprise Micro 5.4:kernel-source-rt-5.14.21-150400.15.124.1.noarch"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2022-49938",
          "url": "https://www.suse.com/security/cve/CVE-2022-49938"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1244820 for CVE-2022-49938",
          "url": "https://bugzilla.suse.com/1244820"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "SUSE Linux Enterprise Micro 5.3:kernel-rt-5.14.21-150400.15.124.1.x86_64",
            "SUSE Linux Enterprise Micro 5.3:kernel-source-rt-5.14.21-150400.15.124.1.noarch",
            "SUSE Linux Enterprise Micro 5.4:kernel-rt-5.14.21-150400.15.124.1.x86_64",
            "SUSE Linux Enterprise Micro 5.4:kernel-source-rt-5.14.21-150400.15.124.1.noarch"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 3.3,
            "baseSeverity": "LOW",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L",
            "version": "3.1"
          },
          "products": [
            "SUSE Linux Enterprise Micro 5.3:kernel-rt-5.14.21-150400.15.124.1.x86_64",
            "SUSE Linux Enterprise Micro 5.3:kernel-source-rt-5.14.21-150400.15.124.1.noarch",
            "SUSE Linux Enterprise Micro 5.4:kernel-rt-5.14.21-150400.15.124.1.x86_64",
            "SUSE Linux Enterprise Micro 5.4:kernel-source-rt-5.14.21-150400.15.124.1.noarch"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2025-07-15T14:31:46Z",
          "details": "low"
        }
      ],
      "title": "CVE-2022-49938"
    },
    {
      "cve": "CVE-2022-49940",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2022-49940"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "In the Linux kernel, the following vulnerability has been resolved:\n\ntty: n_gsm: add sanity check for gsm-\u003ereceive in gsm_receive_buf()\n\nA null pointer dereference can happen when attempting to access the\n\"gsm-\u003ereceive()\" function in gsmld_receive_buf(). Currently, the code\nassumes that gsm-\u003erecieve is only called after MUX activation.\nSince the gsmld_receive_buf() function can be accessed without the need to\ninitialize the MUX, the gsm-\u003ereceive() function will not be set and a\nNULL pointer dereference will occur.\n\nFix this by avoiding the call to \"gsm-\u003ereceive()\" in case the function is\nnot initialized by adding a sanity check.\n\nCall Trace:\n \u003cTASK\u003e\n gsmld_receive_buf+0x1c2/0x2f0 drivers/tty/n_gsm.c:2861\n tiocsti drivers/tty/tty_io.c:2293 [inline]\n tty_ioctl+0xa75/0x15d0 drivers/tty/tty_io.c:2692\n vfs_ioctl fs/ioctl.c:51 [inline]\n __do_sys_ioctl fs/ioctl.c:870 [inline]\n __se_sys_ioctl fs/ioctl.c:856 [inline]\n __x64_sys_ioctl+0x193/0x200 fs/ioctl.c:856\n do_syscall_x64 arch/x86/entry/common.c:50 [inline]\n do_syscall_64+0x35/0xb0 arch/x86/entry/common.c:80\n entry_SYSCALL_64_after_hwframe+0x63/0xcd",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "SUSE Linux Enterprise Micro 5.3:kernel-rt-5.14.21-150400.15.124.1.x86_64",
          "SUSE Linux Enterprise Micro 5.3:kernel-source-rt-5.14.21-150400.15.124.1.noarch",
          "SUSE Linux Enterprise Micro 5.4:kernel-rt-5.14.21-150400.15.124.1.x86_64",
          "SUSE Linux Enterprise Micro 5.4:kernel-source-rt-5.14.21-150400.15.124.1.noarch"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2022-49940",
          "url": "https://www.suse.com/security/cve/CVE-2022-49940"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1244866 for CVE-2022-49940",
          "url": "https://bugzilla.suse.com/1244866"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "SUSE Linux Enterprise Micro 5.3:kernel-rt-5.14.21-150400.15.124.1.x86_64",
            "SUSE Linux Enterprise Micro 5.3:kernel-source-rt-5.14.21-150400.15.124.1.noarch",
            "SUSE Linux Enterprise Micro 5.4:kernel-rt-5.14.21-150400.15.124.1.x86_64",
            "SUSE Linux Enterprise Micro 5.4:kernel-source-rt-5.14.21-150400.15.124.1.noarch"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 5.5,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
            "version": "3.1"
          },
          "products": [
            "SUSE Linux Enterprise Micro 5.3:kernel-rt-5.14.21-150400.15.124.1.x86_64",
            "SUSE Linux Enterprise Micro 5.3:kernel-source-rt-5.14.21-150400.15.124.1.noarch",
            "SUSE Linux Enterprise Micro 5.4:kernel-rt-5.14.21-150400.15.124.1.x86_64",
            "SUSE Linux Enterprise Micro 5.4:kernel-source-rt-5.14.21-150400.15.124.1.noarch"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2025-07-15T14:31:46Z",
          "details": "moderate"
        }
      ],
      "title": "CVE-2022-49940"
    },
    {
      "cve": "CVE-2022-49942",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2022-49942"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "In the Linux kernel, the following vulnerability has been resolved:\n\nwifi: mac80211: Don\u0027t finalize CSA in IBSS mode if state is disconnected\n\nWhen we are not connected to a channel, sending channel \"switch\"\nannouncement doesn\u0027t make any sense.\n\nThe BSS list is empty in that case. This causes the for loop in\ncfg80211_get_bss() to be bypassed, so the function returns NULL\n(check line 1424 of net/wireless/scan.c), causing the WARN_ON()\nin ieee80211_ibss_csa_beacon() to get triggered (check line 500\nof net/mac80211/ibss.c), which was consequently reported on the\nsyzkaller dashboard.\n\nThus, check if we have an existing connection before generating\nthe CSA beacon in ieee80211_ibss_finish_csa().",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "SUSE Linux Enterprise Micro 5.3:kernel-rt-5.14.21-150400.15.124.1.x86_64",
          "SUSE Linux Enterprise Micro 5.3:kernel-source-rt-5.14.21-150400.15.124.1.noarch",
          "SUSE Linux Enterprise Micro 5.4:kernel-rt-5.14.21-150400.15.124.1.x86_64",
          "SUSE Linux Enterprise Micro 5.4:kernel-source-rt-5.14.21-150400.15.124.1.noarch"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2022-49942",
          "url": "https://www.suse.com/security/cve/CVE-2022-49942"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1244881 for CVE-2022-49942",
          "url": "https://bugzilla.suse.com/1244881"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "SUSE Linux Enterprise Micro 5.3:kernel-rt-5.14.21-150400.15.124.1.x86_64",
            "SUSE Linux Enterprise Micro 5.3:kernel-source-rt-5.14.21-150400.15.124.1.noarch",
            "SUSE Linux Enterprise Micro 5.4:kernel-rt-5.14.21-150400.15.124.1.x86_64",
            "SUSE Linux Enterprise Micro 5.4:kernel-source-rt-5.14.21-150400.15.124.1.noarch"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 5.5,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
            "version": "3.1"
          },
          "products": [
            "SUSE Linux Enterprise Micro 5.3:kernel-rt-5.14.21-150400.15.124.1.x86_64",
            "SUSE Linux Enterprise Micro 5.3:kernel-source-rt-5.14.21-150400.15.124.1.noarch",
            "SUSE Linux Enterprise Micro 5.4:kernel-rt-5.14.21-150400.15.124.1.x86_64",
            "SUSE Linux Enterprise Micro 5.4:kernel-source-rt-5.14.21-150400.15.124.1.noarch"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2025-07-15T14:31:46Z",
          "details": "moderate"
        }
      ],
      "title": "CVE-2022-49942"
    },
    {
      "cve": "CVE-2022-49945",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2022-49945"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "In the Linux kernel, the following vulnerability has been resolved:\n\nhwmon: (gpio-fan) Fix array out of bounds access\n\nThe driver does not check if the cooling state passed to\ngpio_fan_set_cur_state() exceeds the maximum cooling state as\nstored in fan_data-\u003enum_speeds. Since the cooling state is later\nused as an array index in set_fan_speed(), an array out of bounds\naccess can occur.\nThis can be exploited by setting the state of the thermal cooling device\nto arbitrary values, causing for example a kernel oops when unavailable\nmemory is accessed this way.\n\nExample kernel oops:\n[  807.987276] Unable to handle kernel paging request at virtual address ffffff80d0588064\n[  807.987369] Mem abort info:\n[  807.987398]   ESR = 0x96000005\n[  807.987428]   EC = 0x25: DABT (current EL), IL = 32 bits\n[  807.987477]   SET = 0, FnV = 0\n[  807.987507]   EA = 0, S1PTW = 0\n[  807.987536]   FSC = 0x05: level 1 translation fault\n[  807.987570] Data abort info:\n[  807.987763]   ISV = 0, ISS = 0x00000005\n[  807.987801]   CM = 0, WnR = 0\n[  807.987832] swapper pgtable: 4k pages, 39-bit VAs, pgdp=0000000001165000\n[  807.987872] [ffffff80d0588064] pgd=0000000000000000, p4d=0000000000000000, pud=0000000000000000\n[  807.987961] Internal error: Oops: 96000005 [#1] PREEMPT SMP\n[  807.987992] Modules linked in: cmac algif_hash aes_arm64 algif_skcipher af_alg bnep hci_uart btbcm bluetooth ecdh_generic ecc 8021q garp stp llc snd_soc_hdmi_codec brcmfmac vc4 brcmutil cec drm_kms_helper snd_soc_core cfg80211 snd_compress bcm2835_codec(C) snd_pcm_dmaengine syscopyarea bcm2835_isp(C) bcm2835_v4l2(C) sysfillrect v4l2_mem2mem bcm2835_mmal_vchiq(C) raspberrypi_hwmon sysimgblt videobuf2_dma_contig videobuf2_vmalloc fb_sys_fops videobuf2_memops rfkill videobuf2_v4l2 videobuf2_common i2c_bcm2835 snd_bcm2835(C) videodev snd_pcm snd_timer snd mc vc_sm_cma(C) gpio_fan uio_pdrv_genirq uio drm fuse drm_panel_orientation_quirks backlight ip_tables x_tables ipv6\n[  807.988508] CPU: 0 PID: 1321 Comm: bash Tainted: G         C        5.15.56-v8+ #1575\n[  807.988548] Hardware name: Raspberry Pi 3 Model B Rev 1.2 (DT)\n[  807.988574] pstate: 20000005 (nzCv daif -PAN -UAO -TCO -DIT -SSBS BTYPE=--)\n[  807.988608] pc : set_fan_speed.part.5+0x34/0x80 [gpio_fan]\n[  807.988654] lr : gpio_fan_set_cur_state+0x34/0x50 [gpio_fan]\n[  807.988691] sp : ffffffc008cf3bd0\n[  807.988710] x29: ffffffc008cf3bd0 x28: ffffff80019edac0 x27: 0000000000000000\n[  807.988762] x26: 0000000000000000 x25: 0000000000000000 x24: ffffff800747c920\n[  807.988787] x23: 000000000000000a x22: ffffff800369f000 x21: 000000001999997c\n[  807.988854] x20: ffffff800369f2e8 x19: ffffff8002ae8080 x18: 0000000000000000\n[  807.988877] x17: 0000000000000000 x16: 0000000000000000 x15: 000000559e271b70\n[  807.988938] x14: 0000000000000000 x13: 0000000000000000 x12: 0000000000000000\n[  807.988960] x11: 0000000000000000 x10: ffffffc008cf3c20 x9 : ffffffcfb60c741c\n[  807.989018] x8 : 000000000000000a x7 : 00000000ffffffc9 x6 : 0000000000000009\n[  807.989040] x5 : 000000000000002a x4 : 0000000000000000 x3 : ffffff800369f2e8\n[  807.989062] x2 : 000000000000e780 x1 : 0000000000000001 x0 : ffffff80d0588060\n[  807.989084] Call trace:\n[  807.989091]  set_fan_speed.part.5+0x34/0x80 [gpio_fan]\n[  807.989113]  gpio_fan_set_cur_state+0x34/0x50 [gpio_fan]\n[  807.989199]  cur_state_store+0x84/0xd0\n[  807.989221]  dev_attr_store+0x20/0x38\n[  807.989262]  sysfs_kf_write+0x4c/0x60\n[  807.989282]  kernfs_fop_write_iter+0x130/0x1c0\n[  807.989298]  new_sync_write+0x10c/0x190\n[  807.989315]  vfs_write+0x254/0x378\n[  807.989362]  ksys_write+0x70/0xf8\n[  807.989379]  __arm64_sys_write+0x24/0x30\n[  807.989424]  invoke_syscall+0x4c/0x110\n[  807.989442]  el0_svc_common.constprop.3+0xfc/0x120\n[  807.989458]  do_el0_svc+0x2c/0x90\n[  807.989473]  el0_svc+0x24/0x60\n[  807.989544]  el0t_64_sync_handler+0x90/0xb8\n[  807.989558]  el0t_64_sync+0x1a0/0x1a4\n[  807.989579] Code: b9403801 f9402800 7100003f 8b35cc00 (b9400416)\n[  807.989627] ---[ end t\n---truncated---",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "SUSE Linux Enterprise Micro 5.3:kernel-rt-5.14.21-150400.15.124.1.x86_64",
          "SUSE Linux Enterprise Micro 5.3:kernel-source-rt-5.14.21-150400.15.124.1.noarch",
          "SUSE Linux Enterprise Micro 5.4:kernel-rt-5.14.21-150400.15.124.1.x86_64",
          "SUSE Linux Enterprise Micro 5.4:kernel-source-rt-5.14.21-150400.15.124.1.noarch"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2022-49945",
          "url": "https://www.suse.com/security/cve/CVE-2022-49945"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1244908 for CVE-2022-49945",
          "url": "https://bugzilla.suse.com/1244908"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "SUSE Linux Enterprise Micro 5.3:kernel-rt-5.14.21-150400.15.124.1.x86_64",
            "SUSE Linux Enterprise Micro 5.3:kernel-source-rt-5.14.21-150400.15.124.1.noarch",
            "SUSE Linux Enterprise Micro 5.4:kernel-rt-5.14.21-150400.15.124.1.x86_64",
            "SUSE Linux Enterprise Micro 5.4:kernel-source-rt-5.14.21-150400.15.124.1.noarch"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 6.6,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:H",
            "version": "3.1"
          },
          "products": [
            "SUSE Linux Enterprise Micro 5.3:kernel-rt-5.14.21-150400.15.124.1.x86_64",
            "SUSE Linux Enterprise Micro 5.3:kernel-source-rt-5.14.21-150400.15.124.1.noarch",
            "SUSE Linux Enterprise Micro 5.4:kernel-rt-5.14.21-150400.15.124.1.x86_64",
            "SUSE Linux Enterprise Micro 5.4:kernel-source-rt-5.14.21-150400.15.124.1.noarch"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2025-07-15T14:31:46Z",
          "details": "moderate"
        }
      ],
      "title": "CVE-2022-49945"
    },
    {
      "cve": "CVE-2022-49946",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2022-49946"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "In the Linux kernel, the following vulnerability has been resolved:\n\nclk: bcm: rpi: Prevent out-of-bounds access\n\nThe while loop in raspberrypi_discover_clocks() relies on the assumption\nthat the id of the last clock element is zero. Because this data comes\nfrom the Videocore firmware and it doesn\u0027t guarantuee such a behavior\nthis could lead to out-of-bounds access. So fix this by providing\na sentinel element.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "SUSE Linux Enterprise Micro 5.3:kernel-rt-5.14.21-150400.15.124.1.x86_64",
          "SUSE Linux Enterprise Micro 5.3:kernel-source-rt-5.14.21-150400.15.124.1.noarch",
          "SUSE Linux Enterprise Micro 5.4:kernel-rt-5.14.21-150400.15.124.1.x86_64",
          "SUSE Linux Enterprise Micro 5.4:kernel-source-rt-5.14.21-150400.15.124.1.noarch"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2022-49946",
          "url": "https://www.suse.com/security/cve/CVE-2022-49946"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1244944 for CVE-2022-49946",
          "url": "https://bugzilla.suse.com/1244944"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "SUSE Linux Enterprise Micro 5.3:kernel-rt-5.14.21-150400.15.124.1.x86_64",
            "SUSE Linux Enterprise Micro 5.3:kernel-source-rt-5.14.21-150400.15.124.1.noarch",
            "SUSE Linux Enterprise Micro 5.4:kernel-rt-5.14.21-150400.15.124.1.x86_64",
            "SUSE Linux Enterprise Micro 5.4:kernel-source-rt-5.14.21-150400.15.124.1.noarch"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 5.5,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
            "version": "3.1"
          },
          "products": [
            "SUSE Linux Enterprise Micro 5.3:kernel-rt-5.14.21-150400.15.124.1.x86_64",
            "SUSE Linux Enterprise Micro 5.3:kernel-source-rt-5.14.21-150400.15.124.1.noarch",
            "SUSE Linux Enterprise Micro 5.4:kernel-rt-5.14.21-150400.15.124.1.x86_64",
            "SUSE Linux Enterprise Micro 5.4:kernel-source-rt-5.14.21-150400.15.124.1.noarch"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2025-07-15T14:31:46Z",
          "details": "moderate"
        }
      ],
      "title": "CVE-2022-49946"
    },
    {
      "cve": "CVE-2022-49948",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2022-49948"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "In the Linux kernel, the following vulnerability has been resolved:\n\nvt: Clear selection before changing the font\n\nWhen changing the console font with ioctl(KDFONTOP) the new font size\ncan be bigger than the previous font. A previous selection may thus now\nbe outside of the new screen size and thus trigger out-of-bounds\naccesses to graphics memory if the selection is removed in\nvc_do_resize().\n\nPrevent such out-of-memory accesses by dropping the selection before the\nvarious con_font_set() console handlers are called.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "SUSE Linux Enterprise Micro 5.3:kernel-rt-5.14.21-150400.15.124.1.x86_64",
          "SUSE Linux Enterprise Micro 5.3:kernel-source-rt-5.14.21-150400.15.124.1.noarch",
          "SUSE Linux Enterprise Micro 5.4:kernel-rt-5.14.21-150400.15.124.1.x86_64",
          "SUSE Linux Enterprise Micro 5.4:kernel-source-rt-5.14.21-150400.15.124.1.noarch"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2022-49948",
          "url": "https://www.suse.com/security/cve/CVE-2022-49948"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1245058 for CVE-2022-49948",
          "url": "https://bugzilla.suse.com/1245058"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "SUSE Linux Enterprise Micro 5.3:kernel-rt-5.14.21-150400.15.124.1.x86_64",
            "SUSE Linux Enterprise Micro 5.3:kernel-source-rt-5.14.21-150400.15.124.1.noarch",
            "SUSE Linux Enterprise Micro 5.4:kernel-rt-5.14.21-150400.15.124.1.x86_64",
            "SUSE Linux Enterprise Micro 5.4:kernel-source-rt-5.14.21-150400.15.124.1.noarch"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 5.5,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
            "version": "3.1"
          },
          "products": [
            "SUSE Linux Enterprise Micro 5.3:kernel-rt-5.14.21-150400.15.124.1.x86_64",
            "SUSE Linux Enterprise Micro 5.3:kernel-source-rt-5.14.21-150400.15.124.1.noarch",
            "SUSE Linux Enterprise Micro 5.4:kernel-rt-5.14.21-150400.15.124.1.x86_64",
            "SUSE Linux Enterprise Micro 5.4:kernel-source-rt-5.14.21-150400.15.124.1.noarch"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2025-07-15T14:31:46Z",
          "details": "moderate"
        }
      ],
      "title": "CVE-2022-49948"
    },
    {
      "cve": "CVE-2022-49950",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2022-49950"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "In the Linux kernel, the following vulnerability has been resolved:\n\nmisc: fastrpc: fix memory corruption on open\n\nThe probe session-duplication overflow check incremented the session\ncount also when there were no more available sessions so that memory\nbeyond the fixed-size slab-allocated session array could be corrupted in\nfastrpc_session_alloc() on open().",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "SUSE Linux Enterprise Micro 5.3:kernel-rt-5.14.21-150400.15.124.1.x86_64",
          "SUSE Linux Enterprise Micro 5.3:kernel-source-rt-5.14.21-150400.15.124.1.noarch",
          "SUSE Linux Enterprise Micro 5.4:kernel-rt-5.14.21-150400.15.124.1.x86_64",
          "SUSE Linux Enterprise Micro 5.4:kernel-source-rt-5.14.21-150400.15.124.1.noarch"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2022-49950",
          "url": "https://www.suse.com/security/cve/CVE-2022-49950"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1244958 for CVE-2022-49950",
          "url": "https://bugzilla.suse.com/1244958"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "SUSE Linux Enterprise Micro 5.3:kernel-rt-5.14.21-150400.15.124.1.x86_64",
            "SUSE Linux Enterprise Micro 5.3:kernel-source-rt-5.14.21-150400.15.124.1.noarch",
            "SUSE Linux Enterprise Micro 5.4:kernel-rt-5.14.21-150400.15.124.1.x86_64",
            "SUSE Linux Enterprise Micro 5.4:kernel-source-rt-5.14.21-150400.15.124.1.noarch"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 5.5,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
            "version": "3.1"
          },
          "products": [
            "SUSE Linux Enterprise Micro 5.3:kernel-rt-5.14.21-150400.15.124.1.x86_64",
            "SUSE Linux Enterprise Micro 5.3:kernel-source-rt-5.14.21-150400.15.124.1.noarch",
            "SUSE Linux Enterprise Micro 5.4:kernel-rt-5.14.21-150400.15.124.1.x86_64",
            "SUSE Linux Enterprise Micro 5.4:kernel-source-rt-5.14.21-150400.15.124.1.noarch"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2025-07-15T14:31:46Z",
          "details": "moderate"
        }
      ],
      "title": "CVE-2022-49950"
    },
    {
      "cve": "CVE-2022-49952",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2022-49952"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "In the Linux kernel, the following vulnerability has been resolved:\n\nmisc: fastrpc: fix memory corruption on probe\n\nAdd the missing sanity check on the probed-session count to avoid\ncorrupting memory beyond the fixed-size slab-allocated session array\nwhen there are more than FASTRPC_MAX_SESSIONS sessions defined in the\ndevicetree.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "SUSE Linux Enterprise Micro 5.3:kernel-rt-5.14.21-150400.15.124.1.x86_64",
          "SUSE Linux Enterprise Micro 5.3:kernel-source-rt-5.14.21-150400.15.124.1.noarch",
          "SUSE Linux Enterprise Micro 5.4:kernel-rt-5.14.21-150400.15.124.1.x86_64",
          "SUSE Linux Enterprise Micro 5.4:kernel-source-rt-5.14.21-150400.15.124.1.noarch"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2022-49952",
          "url": "https://www.suse.com/security/cve/CVE-2022-49952"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1244945 for CVE-2022-49952",
          "url": "https://bugzilla.suse.com/1244945"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "SUSE Linux Enterprise Micro 5.3:kernel-rt-5.14.21-150400.15.124.1.x86_64",
            "SUSE Linux Enterprise Micro 5.3:kernel-source-rt-5.14.21-150400.15.124.1.noarch",
            "SUSE Linux Enterprise Micro 5.4:kernel-rt-5.14.21-150400.15.124.1.x86_64",
            "SUSE Linux Enterprise Micro 5.4:kernel-source-rt-5.14.21-150400.15.124.1.noarch"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 5.5,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
            "version": "3.1"
          },
          "products": [
            "SUSE Linux Enterprise Micro 5.3:kernel-rt-5.14.21-150400.15.124.1.x86_64",
            "SUSE Linux Enterprise Micro 5.3:kernel-source-rt-5.14.21-150400.15.124.1.noarch",
            "SUSE Linux Enterprise Micro 5.4:kernel-rt-5.14.21-150400.15.124.1.x86_64",
            "SUSE Linux Enterprise Micro 5.4:kernel-source-rt-5.14.21-150400.15.124.1.noarch"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2025-07-15T14:31:46Z",
          "details": "moderate"
        }
      ],
      "title": "CVE-2022-49952"
    },
    {
      "cve": "CVE-2022-49954",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2022-49954"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "In the Linux kernel, the following vulnerability has been resolved:\n\nInput: iforce - wake up after clearing IFORCE_XMIT_RUNNING flag\n\nsyzbot is reporting hung task at __input_unregister_device() [1], for\niforce_close() waiting at wait_event_interruptible() with dev-\u003emutex held\nis blocking input_disconnect_device() from __input_unregister_device().\n\nIt seems that the cause is simply that commit c2b27ef672992a20 (\"Input:\niforce - wait for command completion when closing the device\") forgot to\ncall wake_up() after clear_bit().\n\nFix this problem by introducing a helper that calls clear_bit() followed\nby wake_up_all().",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "SUSE Linux Enterprise Micro 5.3:kernel-rt-5.14.21-150400.15.124.1.x86_64",
          "SUSE Linux Enterprise Micro 5.3:kernel-source-rt-5.14.21-150400.15.124.1.noarch",
          "SUSE Linux Enterprise Micro 5.4:kernel-rt-5.14.21-150400.15.124.1.x86_64",
          "SUSE Linux Enterprise Micro 5.4:kernel-source-rt-5.14.21-150400.15.124.1.noarch"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2022-49954",
          "url": "https://www.suse.com/security/cve/CVE-2022-49954"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1244976 for CVE-2022-49954",
          "url": "https://bugzilla.suse.com/1244976"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "SUSE Linux Enterprise Micro 5.3:kernel-rt-5.14.21-150400.15.124.1.x86_64",
            "SUSE Linux Enterprise Micro 5.3:kernel-source-rt-5.14.21-150400.15.124.1.noarch",
            "SUSE Linux Enterprise Micro 5.4:kernel-rt-5.14.21-150400.15.124.1.x86_64",
            "SUSE Linux Enterprise Micro 5.4:kernel-source-rt-5.14.21-150400.15.124.1.noarch"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 5.5,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
            "version": "3.1"
          },
          "products": [
            "SUSE Linux Enterprise Micro 5.3:kernel-rt-5.14.21-150400.15.124.1.x86_64",
            "SUSE Linux Enterprise Micro 5.3:kernel-source-rt-5.14.21-150400.15.124.1.noarch",
            "SUSE Linux Enterprise Micro 5.4:kernel-rt-5.14.21-150400.15.124.1.x86_64",
            "SUSE Linux Enterprise Micro 5.4:kernel-source-rt-5.14.21-150400.15.124.1.noarch"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2025-07-15T14:31:46Z",
          "details": "moderate"
        }
      ],
      "title": "CVE-2022-49954"
    },
    {
      "cve": "CVE-2022-49956",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2022-49956"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "In the Linux kernel, the following vulnerability has been resolved:\n\nstaging: rtl8712: fix use after free bugs\n\n_Read/Write_MACREG callbacks are NULL so the read/write_macreg_hdl()\nfunctions don\u0027t do anything except free the \"pcmd\" pointer.  It\nresults in a use after free.  Delete them.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "SUSE Linux Enterprise Micro 5.3:kernel-rt-5.14.21-150400.15.124.1.x86_64",
          "SUSE Linux Enterprise Micro 5.3:kernel-source-rt-5.14.21-150400.15.124.1.noarch",
          "SUSE Linux Enterprise Micro 5.4:kernel-rt-5.14.21-150400.15.124.1.x86_64",
          "SUSE Linux Enterprise Micro 5.4:kernel-source-rt-5.14.21-150400.15.124.1.noarch"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2022-49956",
          "url": "https://www.suse.com/security/cve/CVE-2022-49956"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1244969 for CVE-2022-49956",
          "url": "https://bugzilla.suse.com/1244969"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "SUSE Linux Enterprise Micro 5.3:kernel-rt-5.14.21-150400.15.124.1.x86_64",
            "SUSE Linux Enterprise Micro 5.3:kernel-source-rt-5.14.21-150400.15.124.1.noarch",
            "SUSE Linux Enterprise Micro 5.4:kernel-rt-5.14.21-150400.15.124.1.x86_64",
            "SUSE Linux Enterprise Micro 5.4:kernel-source-rt-5.14.21-150400.15.124.1.noarch"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 5.5,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
            "version": "3.1"
          },
          "products": [
            "SUSE Linux Enterprise Micro 5.3:kernel-rt-5.14.21-150400.15.124.1.x86_64",
            "SUSE Linux Enterprise Micro 5.3:kernel-source-rt-5.14.21-150400.15.124.1.noarch",
            "SUSE Linux Enterprise Micro 5.4:kernel-rt-5.14.21-150400.15.124.1.x86_64",
            "SUSE Linux Enterprise Micro 5.4:kernel-source-rt-5.14.21-150400.15.124.1.noarch"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2025-07-15T14:31:46Z",
          "details": "moderate"
        }
      ],
      "title": "CVE-2022-49956"
    },
    {
      "cve": "CVE-2022-49957",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2022-49957"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "In the Linux kernel, the following vulnerability has been resolved:\n\nkcm: fix strp_init() order and cleanup\n\nstrp_init() is called just a few lines above this csk-\u003esk_user_data\ncheck, it also initializes strp-\u003ework etc., therefore, it is\nunnecessary to call strp_done() to cancel the freshly initialized\nwork.\n\nAnd if sk_user_data is already used by KCM, psock-\u003estrp should not be\ntouched, particularly strp-\u003ework state, so we need to move strp_init()\nafter the csk-\u003esk_user_data check.\n\nThis also makes a lockdep warning reported by syzbot go away.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "SUSE Linux Enterprise Micro 5.3:kernel-rt-5.14.21-150400.15.124.1.x86_64",
          "SUSE Linux Enterprise Micro 5.3:kernel-source-rt-5.14.21-150400.15.124.1.noarch",
          "SUSE Linux Enterprise Micro 5.4:kernel-rt-5.14.21-150400.15.124.1.x86_64",
          "SUSE Linux Enterprise Micro 5.4:kernel-source-rt-5.14.21-150400.15.124.1.noarch"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2022-49957",
          "url": "https://www.suse.com/security/cve/CVE-2022-49957"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1244966 for CVE-2022-49957",
          "url": "https://bugzilla.suse.com/1244966"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "SUSE Linux Enterprise Micro 5.3:kernel-rt-5.14.21-150400.15.124.1.x86_64",
            "SUSE Linux Enterprise Micro 5.3:kernel-source-rt-5.14.21-150400.15.124.1.noarch",
            "SUSE Linux Enterprise Micro 5.4:kernel-rt-5.14.21-150400.15.124.1.x86_64",
            "SUSE Linux Enterprise Micro 5.4:kernel-source-rt-5.14.21-150400.15.124.1.noarch"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 5.5,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
            "version": "3.1"
          },
          "products": [
            "SUSE Linux Enterprise Micro 5.3:kernel-rt-5.14.21-150400.15.124.1.x86_64",
            "SUSE Linux Enterprise Micro 5.3:kernel-source-rt-5.14.21-150400.15.124.1.noarch",
            "SUSE Linux Enterprise Micro 5.4:kernel-rt-5.14.21-150400.15.124.1.x86_64",
            "SUSE Linux Enterprise Micro 5.4:kernel-source-rt-5.14.21-150400.15.124.1.noarch"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2025-07-15T14:31:46Z",
          "details": "moderate"
        }
      ],
      "title": "CVE-2022-49957"
    },
    {
      "cve": "CVE-2022-49958",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2022-49958"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "In the Linux kernel, the following vulnerability has been resolved:\n\nnet/sched: fix netdevice reference leaks in attach_default_qdiscs()\n\nIn attach_default_qdiscs(), if a dev has multiple queues and queue 0 fails\nto attach qdisc because there is no memory in attach_one_default_qdisc().\nThen dev-\u003eqdisc will be noop_qdisc by default. But the other queues may be\nable to successfully attach to default qdisc.\n\nIn this case, the fallback to noqueue process will be triggered. If the\noriginal attached qdisc is not released and a new one is directly\nattached, this will cause netdevice reference leaks.\n\nThe following is the bug log:\n\nveth0: default qdisc (fq_codel) fail, fallback to noqueue\nunregister_netdevice: waiting for veth0 to become free. Usage count = 32\nleaked reference.\n qdisc_alloc+0x12e/0x210\n qdisc_create_dflt+0x62/0x140\n attach_one_default_qdisc.constprop.41+0x44/0x70\n dev_activate+0x128/0x290\n __dev_open+0x12a/0x190\n __dev_change_flags+0x1a2/0x1f0\n dev_change_flags+0x23/0x60\n do_setlink+0x332/0x1150\n __rtnl_newlink+0x52f/0x8e0\n rtnl_newlink+0x43/0x70\n rtnetlink_rcv_msg+0x140/0x3b0\n netlink_rcv_skb+0x50/0x100\n netlink_unicast+0x1bb/0x290\n netlink_sendmsg+0x37c/0x4e0\n sock_sendmsg+0x5f/0x70\n ____sys_sendmsg+0x208/0x280\n\nFix this bug by clearing any non-noop qdiscs that may have been assigned\nbefore trying to re-attach.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "SUSE Linux Enterprise Micro 5.3:kernel-rt-5.14.21-150400.15.124.1.x86_64",
          "SUSE Linux Enterprise Micro 5.3:kernel-source-rt-5.14.21-150400.15.124.1.noarch",
          "SUSE Linux Enterprise Micro 5.4:kernel-rt-5.14.21-150400.15.124.1.x86_64",
          "SUSE Linux Enterprise Micro 5.4:kernel-source-rt-5.14.21-150400.15.124.1.noarch"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2022-49958",
          "url": "https://www.suse.com/security/cve/CVE-2022-49958"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1244974 for CVE-2022-49958",
          "url": "https://bugzilla.suse.com/1244974"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "SUSE Linux Enterprise Micro 5.3:kernel-rt-5.14.21-150400.15.124.1.x86_64",
            "SUSE Linux Enterprise Micro 5.3:kernel-source-rt-5.14.21-150400.15.124.1.noarch",
            "SUSE Linux Enterprise Micro 5.4:kernel-rt-5.14.21-150400.15.124.1.x86_64",
            "SUSE Linux Enterprise Micro 5.4:kernel-source-rt-5.14.21-150400.15.124.1.noarch"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 5.5,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
            "version": "3.1"
          },
          "products": [
            "SUSE Linux Enterprise Micro 5.3:kernel-rt-5.14.21-150400.15.124.1.x86_64",
            "SUSE Linux Enterprise Micro 5.3:kernel-source-rt-5.14.21-150400.15.124.1.noarch",
            "SUSE Linux Enterprise Micro 5.4:kernel-rt-5.14.21-150400.15.124.1.x86_64",
            "SUSE Linux Enterprise Micro 5.4:kernel-source-rt-5.14.21-150400.15.124.1.noarch"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2025-07-15T14:31:46Z",
          "details": "moderate"
        }
      ],
      "title": "CVE-2022-49958"
    },
    {
      "cve": "CVE-2022-49960",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2022-49960"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "In the Linux kernel, the following vulnerability has been resolved:\n\ndrm/i915: fix null pointer dereference\n\nAsus chromebook CX550 crashes during boot on v5.17-rc1 kernel.\nThe root cause is null pointer defeference of bi_next\nin tgl_get_bw_info() in drivers/gpu/drm/i915/display/intel_bw.c.\n\nBUG: kernel NULL pointer dereference, address: 000000000000002e\nPGD 0 P4D 0\nOops: 0002 [#1] PREEMPT SMP NOPTI\nCPU: 0 PID: 1 Comm: swapper/0 Tainted: G     U            5.17.0-rc1\nHardware name: Google Delbin/Delbin, BIOS Google_Delbin.13672.156.3 05/14/2021\nRIP: 0010:tgl_get_bw_info+0x2de/0x510\n...\n[    2.554467] Call Trace:\n[    2.554467]  \u003cTASK\u003e\n[    2.554467]  intel_bw_init_hw+0x14a/0x434\n[    2.554467]  ? _printk+0x59/0x73\n[    2.554467]  ? _dev_err+0x77/0x91\n[    2.554467]  i915_driver_hw_probe+0x329/0x33e\n[    2.554467]  i915_driver_probe+0x4c8/0x638\n[    2.554467]  i915_pci_probe+0xf8/0x14e\n[    2.554467]  ? _raw_spin_unlock_irqrestore+0x12/0x2c\n[    2.554467]  pci_device_probe+0xaa/0x142\n[    2.554467]  really_probe+0x13f/0x2f4\n[    2.554467]  __driver_probe_device+0x9e/0xd3\n[    2.554467]  driver_probe_device+0x24/0x7c\n[    2.554467]  __driver_attach+0xba/0xcf\n[    2.554467]  ? driver_attach+0x1f/0x1f\n[    2.554467]  bus_for_each_dev+0x8c/0xc0\n[    2.554467]  bus_add_driver+0x11b/0x1f7\n[    2.554467]  driver_register+0x60/0xea\n[    2.554467]  ? mipi_dsi_bus_init+0x16/0x16\n[    2.554467]  i915_init+0x2c/0xb9\n[    2.554467]  ? mipi_dsi_bus_init+0x16/0x16\n[    2.554467]  do_one_initcall+0x12e/0x2b3\n[    2.554467]  do_initcall_level+0xd6/0xf3\n[    2.554467]  do_initcalls+0x4e/0x79\n[    2.554467]  kernel_init_freeable+0xed/0x14d\n[    2.554467]  ? rest_init+0xc1/0xc1\n[    2.554467]  kernel_init+0x1a/0x120\n[    2.554467]  ret_from_fork+0x1f/0x30\n[    2.554467]  \u003c/TASK\u003e\n...\nKernel panic - not syncing: Fatal exception\n\n(cherry picked from commit c247cd03898c4c43c3bce6d4014730403bc13032)",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "SUSE Linux Enterprise Micro 5.3:kernel-rt-5.14.21-150400.15.124.1.x86_64",
          "SUSE Linux Enterprise Micro 5.3:kernel-source-rt-5.14.21-150400.15.124.1.noarch",
          "SUSE Linux Enterprise Micro 5.4:kernel-rt-5.14.21-150400.15.124.1.x86_64",
          "SUSE Linux Enterprise Micro 5.4:kernel-source-rt-5.14.21-150400.15.124.1.noarch"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2022-49960",
          "url": "https://www.suse.com/security/cve/CVE-2022-49960"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1244911 for CVE-2022-49960",
          "url": "https://bugzilla.suse.com/1244911"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "SUSE Linux Enterprise Micro 5.3:kernel-rt-5.14.21-150400.15.124.1.x86_64",
            "SUSE Linux Enterprise Micro 5.3:kernel-source-rt-5.14.21-150400.15.124.1.noarch",
            "SUSE Linux Enterprise Micro 5.4:kernel-rt-5.14.21-150400.15.124.1.x86_64",
            "SUSE Linux Enterprise Micro 5.4:kernel-source-rt-5.14.21-150400.15.124.1.noarch"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 4.4,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H",
            "version": "3.1"
          },
          "products": [
            "SUSE Linux Enterprise Micro 5.3:kernel-rt-5.14.21-150400.15.124.1.x86_64",
            "SUSE Linux Enterprise Micro 5.3:kernel-source-rt-5.14.21-150400.15.124.1.noarch",
            "SUSE Linux Enterprise Micro 5.4:kernel-rt-5.14.21-150400.15.124.1.x86_64",
            "SUSE Linux Enterprise Micro 5.4:kernel-source-rt-5.14.21-150400.15.124.1.noarch"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2025-07-15T14:31:46Z",
          "details": "moderate"
        }
      ],
      "title": "CVE-2022-49960"
    },
    {
      "cve": "CVE-2022-49964",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2022-49964"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "In the Linux kernel, the following vulnerability has been resolved:\n\narm64: cacheinfo: Fix incorrect assignment of signed error value to unsigned fw_level\n\nThough acpi_find_last_cache_level() always returned signed value and the\ndocument states it will return any errors caused by lack of a PPTT table,\nit never returned negative values before.\n\nCommit 0c80f9e165f8 (\"ACPI: PPTT: Leave the table mapped for the runtime usage\")\nhowever changed it by returning -ENOENT if no PPTT was found. The value\nreturned from acpi_find_last_cache_level() is then assigned to unsigned\nfw_level.\n\nIt will result in the number of cache leaves calculated incorrectly as\na huge value which will then cause the following warning from __alloc_pages\nas the order would be great than MAX_ORDER because of incorrect and huge\ncache leaves value.\n\n  |  WARNING: CPU: 0 PID: 1 at mm/page_alloc.c:5407 __alloc_pages+0x74/0x314\n  |  Modules linked in:\n  |  CPU: 0 PID: 1 Comm: swapper/0 Not tainted 5.19.0-10393-g7c2a8d3ac4c0 #73\n  |  pstate: 20000005 (nzCv daif -PAN -UAO -TCO -DIT -SSBS BTYPE=--)\n  |  pc : __alloc_pages+0x74/0x314\n  |  lr : alloc_pages+0xe8/0x318\n  |  Call trace:\n  |   __alloc_pages+0x74/0x314\n  |   alloc_pages+0xe8/0x318\n  |   kmalloc_order_trace+0x68/0x1dc\n  |   __kmalloc+0x240/0x338\n  |   detect_cache_attributes+0xe0/0x56c\n  |   update_siblings_masks+0x38/0x284\n  |   store_cpu_topology+0x78/0x84\n  |   smp_prepare_cpus+0x48/0x134\n  |   kernel_init_freeable+0xc4/0x14c\n  |   kernel_init+0x2c/0x1b4\n  |   ret_from_fork+0x10/0x20\n\nFix the same by changing fw_level to be signed integer and return the\nerror from init_cache_level() early in case of error.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "SUSE Linux Enterprise Micro 5.3:kernel-rt-5.14.21-150400.15.124.1.x86_64",
          "SUSE Linux Enterprise Micro 5.3:kernel-source-rt-5.14.21-150400.15.124.1.noarch",
          "SUSE Linux Enterprise Micro 5.4:kernel-rt-5.14.21-150400.15.124.1.x86_64",
          "SUSE Linux Enterprise Micro 5.4:kernel-source-rt-5.14.21-150400.15.124.1.noarch"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2022-49964",
          "url": "https://www.suse.com/security/cve/CVE-2022-49964"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1245064 for CVE-2022-49964",
          "url": "https://bugzilla.suse.com/1245064"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "SUSE Linux Enterprise Micro 5.3:kernel-rt-5.14.21-150400.15.124.1.x86_64",
            "SUSE Linux Enterprise Micro 5.3:kernel-source-rt-5.14.21-150400.15.124.1.noarch",
            "SUSE Linux Enterprise Micro 5.4:kernel-rt-5.14.21-150400.15.124.1.x86_64",
            "SUSE Linux Enterprise Micro 5.4:kernel-source-rt-5.14.21-150400.15.124.1.noarch"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 6.1,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:H",
            "version": "3.1"
          },
          "products": [
            "SUSE Linux Enterprise Micro 5.3:kernel-rt-5.14.21-150400.15.124.1.x86_64",
            "SUSE Linux Enterprise Micro 5.3:kernel-source-rt-5.14.21-150400.15.124.1.noarch",
            "SUSE Linux Enterprise Micro 5.4:kernel-rt-5.14.21-150400.15.124.1.x86_64",
            "SUSE Linux Enterprise Micro 5.4:kernel-source-rt-5.14.21-150400.15.124.1.noarch"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2025-07-15T14:31:46Z",
          "details": "moderate"
        }
      ],
      "title": "CVE-2022-49964"
    },
    {
      "cve": "CVE-2022-49966",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2022-49966"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "In the Linux kernel, the following vulnerability has been resolved:\n\ndrm/amd/pm: add missing -\u003efini_microcode interface for Sienna Cichlid\n\nTo avoid any potential memory leak.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "SUSE Linux Enterprise Micro 5.3:kernel-rt-5.14.21-150400.15.124.1.x86_64",
          "SUSE Linux Enterprise Micro 5.3:kernel-source-rt-5.14.21-150400.15.124.1.noarch",
          "SUSE Linux Enterprise Micro 5.4:kernel-rt-5.14.21-150400.15.124.1.x86_64",
          "SUSE Linux Enterprise Micro 5.4:kernel-source-rt-5.14.21-150400.15.124.1.noarch"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2022-49966",
          "url": "https://www.suse.com/security/cve/CVE-2022-49966"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1245062 for CVE-2022-49966",
          "url": "https://bugzilla.suse.com/1245062"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "SUSE Linux Enterprise Micro 5.3:kernel-rt-5.14.21-150400.15.124.1.x86_64",
            "SUSE Linux Enterprise Micro 5.3:kernel-source-rt-5.14.21-150400.15.124.1.noarch",
            "SUSE Linux Enterprise Micro 5.4:kernel-rt-5.14.21-150400.15.124.1.x86_64",
            "SUSE Linux Enterprise Micro 5.4:kernel-source-rt-5.14.21-150400.15.124.1.noarch"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 4.4,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:L",
            "version": "3.1"
          },
          "products": [
            "SUSE Linux Enterprise Micro 5.3:kernel-rt-5.14.21-150400.15.124.1.x86_64",
            "SUSE Linux Enterprise Micro 5.3:kernel-source-rt-5.14.21-150400.15.124.1.noarch",
            "SUSE Linux Enterprise Micro 5.4:kernel-rt-5.14.21-150400.15.124.1.x86_64",
            "SUSE Linux Enterprise Micro 5.4:kernel-source-rt-5.14.21-150400.15.124.1.noarch"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2025-07-15T14:31:46Z",
          "details": "moderate"
        }
      ],
      "title": "CVE-2022-49966"
    },
    {
      "cve": "CVE-2022-49968",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2022-49968"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "In the Linux kernel, the following vulnerability has been resolved:\n\nieee802154/adf7242: defer destroy_workqueue call\n\nThere is a possible race condition (use-after-free) like below\n\n  (FREE)                     |  (USE)\n  adf7242_remove             |  adf7242_channel\n   cancel_delayed_work_sync  |\n    destroy_workqueue (1)    |   adf7242_cmd_rx\n                             |    mod_delayed_work (2)\n                             |\n\nThe root cause for this race is that the upper layer (ieee802154) is\nunaware of this detaching event and the function adf7242_channel can\nbe called without any checks.\n\nTo fix this, we can add a flag write at the beginning of adf7242_remove\nand add flag check in adf7242_channel. Or we can just defer the\ndestructive operation like other commit 3e0588c291d6 (\"hamradio: defer\nax25 kfree after unregister_netdev\") which let the\nieee802154_unregister_hw() to handle the synchronization. This patch\ntakes the second option.\n\nruns\")",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "SUSE Linux Enterprise Micro 5.3:kernel-rt-5.14.21-150400.15.124.1.x86_64",
          "SUSE Linux Enterprise Micro 5.3:kernel-source-rt-5.14.21-150400.15.124.1.noarch",
          "SUSE Linux Enterprise Micro 5.4:kernel-rt-5.14.21-150400.15.124.1.x86_64",
          "SUSE Linux Enterprise Micro 5.4:kernel-source-rt-5.14.21-150400.15.124.1.noarch"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2022-49968",
          "url": "https://www.suse.com/security/cve/CVE-2022-49968"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1244959 for CVE-2022-49968",
          "url": "https://bugzilla.suse.com/1244959"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "SUSE Linux Enterprise Micro 5.3:kernel-rt-5.14.21-150400.15.124.1.x86_64",
            "SUSE Linux Enterprise Micro 5.3:kernel-source-rt-5.14.21-150400.15.124.1.noarch",
            "SUSE Linux Enterprise Micro 5.4:kernel-rt-5.14.21-150400.15.124.1.x86_64",
            "SUSE Linux Enterprise Micro 5.4:kernel-source-rt-5.14.21-150400.15.124.1.noarch"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 5.5,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
            "version": "3.1"
          },
          "products": [
            "SUSE Linux Enterprise Micro 5.3:kernel-rt-5.14.21-150400.15.124.1.x86_64",
            "SUSE Linux Enterprise Micro 5.3:kernel-source-rt-5.14.21-150400.15.124.1.noarch",
            "SUSE Linux Enterprise Micro 5.4:kernel-rt-5.14.21-150400.15.124.1.x86_64",
            "SUSE Linux Enterprise Micro 5.4:kernel-source-rt-5.14.21-150400.15.124.1.noarch"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2025-07-15T14:31:46Z",
          "details": "moderate"
        }
      ],
      "title": "CVE-2022-49968"
    },
    {
      "cve": "CVE-2022-49969",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2022-49969"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "In the Linux kernel, the following vulnerability has been resolved:\n\ndrm/amd/display: clear optc underflow before turn off odm clock\n\n[Why]\nAfter ODM clock off, optc underflow bit will be kept there always and clear not work.\nWe need to clear that before clock off.\n\n[How]\nClear that if have when clock off.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "SUSE Linux Enterprise Micro 5.3:kernel-rt-5.14.21-150400.15.124.1.x86_64",
          "SUSE Linux Enterprise Micro 5.3:kernel-source-rt-5.14.21-150400.15.124.1.noarch",
          "SUSE Linux Enterprise Micro 5.4:kernel-rt-5.14.21-150400.15.124.1.x86_64",
          "SUSE Linux Enterprise Micro 5.4:kernel-source-rt-5.14.21-150400.15.124.1.noarch"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2022-49969",
          "url": "https://www.suse.com/security/cve/CVE-2022-49969"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1245060 for CVE-2022-49969",
          "url": "https://bugzilla.suse.com/1245060"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "SUSE Linux Enterprise Micro 5.3:kernel-rt-5.14.21-150400.15.124.1.x86_64",
            "SUSE Linux Enterprise Micro 5.3:kernel-source-rt-5.14.21-150400.15.124.1.noarch",
            "SUSE Linux Enterprise Micro 5.4:kernel-rt-5.14.21-150400.15.124.1.x86_64",
            "SUSE Linux Enterprise Micro 5.4:kernel-source-rt-5.14.21-150400.15.124.1.noarch"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 3.3,
            "baseSeverity": "LOW",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L",
            "version": "3.1"
          },
          "products": [
            "SUSE Linux Enterprise Micro 5.3:kernel-rt-5.14.21-150400.15.124.1.x86_64",
            "SUSE Linux Enterprise Micro 5.3:kernel-source-rt-5.14.21-150400.15.124.1.noarch",
            "SUSE Linux Enterprise Micro 5.4:kernel-rt-5.14.21-150400.15.124.1.x86_64",
            "SUSE Linux Enterprise Micro 5.4:kernel-source-rt-5.14.21-150400.15.124.1.noarch"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2025-07-15T14:31:46Z",
          "details": "moderate"
        }
      ],
      "title": "CVE-2022-49969"
    },
    {
      "cve": "CVE-2022-49977",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2022-49977"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "In the Linux kernel, the following vulnerability has been resolved:\n\nftrace: Fix NULL pointer dereference in is_ftrace_trampoline when ftrace is dead\n\nftrace_startup does not remove ops from ftrace_ops_list when\nftrace_startup_enable fails:\n\nregister_ftrace_function\n  ftrace_startup\n    __register_ftrace_function\n      ...\n      add_ftrace_ops(\u0026ftrace_ops_list, ops)\n      ...\n    ...\n    ftrace_startup_enable // if ftrace failed to modify, ftrace_disabled is set to 1\n    ...\n  return 0 // ops is in the ftrace_ops_list.\n\nWhen ftrace_disabled = 1, unregister_ftrace_function simply returns without doing anything:\nunregister_ftrace_function\n  ftrace_shutdown\n    if (unlikely(ftrace_disabled))\n            return -ENODEV;  // return here, __unregister_ftrace_function is not executed,\n                             // as a result, ops is still in the ftrace_ops_list\n    __unregister_ftrace_function\n    ...\n\nIf ops is dynamically allocated, it will be free later, in this case,\nis_ftrace_trampoline accesses NULL pointer:\n\nis_ftrace_trampoline\n  ftrace_ops_trampoline\n    do_for_each_ftrace_op(op, ftrace_ops_list) // OOPS! op may be NULL!\n\nSyzkaller reports as follows:\n[ 1203.506103] BUG: kernel NULL pointer dereference, address: 000000000000010b\n[ 1203.508039] #PF: supervisor read access in kernel mode\n[ 1203.508798] #PF: error_code(0x0000) - not-present page\n[ 1203.509558] PGD 800000011660b067 P4D 800000011660b067 PUD 130fb8067 PMD 0\n[ 1203.510560] Oops: 0000 [#1] SMP KASAN PTI\n[ 1203.511189] CPU: 6 PID: 29532 Comm: syz-executor.2 Tainted: G    B   W         5.10.0 #8\n[ 1203.512324] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS rel-1.14.0-0-g155821a1990b-prebuilt.qemu.org 04/01/2014\n[ 1203.513895] RIP: 0010:is_ftrace_trampoline+0x26/0xb0\n[ 1203.514644] Code: ff eb d3 90 41 55 41 54 49 89 fc 55 53 e8 f2 00 fd ff 48 8b 1d 3b 35 5d 03 e8 e6 00 fd ff 48 8d bb 90 00 00 00 e8 2a 81 26 00 \u003c48\u003e 8b ab 90 00 00 00 48 85 ed 74 1d e8 c9 00 fd ff 48 8d bb 98 00\n[ 1203.518838] RSP: 0018:ffffc900012cf960 EFLAGS: 00010246\n[ 1203.520092] RAX: 0000000000000000 RBX: 000000000000007b RCX: ffffffff8a331866\n[ 1203.521469] RDX: 0000000000000000 RSI: 0000000000000008 RDI: 000000000000010b\n[ 1203.522583] RBP: 0000000000000000 R08: 0000000000000000 R09: ffffffff8df18b07\n[ 1203.523550] R10: fffffbfff1be3160 R11: 0000000000000001 R12: 0000000000478399\n[ 1203.524596] R13: 0000000000000000 R14: ffff888145088000 R15: 0000000000000008\n[ 1203.525634] FS:  00007f429f5f4700(0000) GS:ffff8881daf00000(0000) knlGS:0000000000000000\n[ 1203.526801] CS:  0010 DS: 0000 ES: 0000 CR0: 0000000080050033\n[ 1203.527626] CR2: 000000000000010b CR3: 0000000170e1e001 CR4: 00000000003706e0\n[ 1203.528611] DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000\n[ 1203.529605] DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400\n\nTherefore, when ftrace_startup_enable fails, we need to rollback registration\nprocess and remove ops from ftrace_ops_list.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "SUSE Linux Enterprise Micro 5.3:kernel-rt-5.14.21-150400.15.124.1.x86_64",
          "SUSE Linux Enterprise Micro 5.3:kernel-source-rt-5.14.21-150400.15.124.1.noarch",
          "SUSE Linux Enterprise Micro 5.4:kernel-rt-5.14.21-150400.15.124.1.x86_64",
          "SUSE Linux Enterprise Micro 5.4:kernel-source-rt-5.14.21-150400.15.124.1.noarch"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2022-49977",
          "url": "https://www.suse.com/security/cve/CVE-2022-49977"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1244936 for CVE-2022-49977",
          "url": "https://bugzilla.suse.com/1244936"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "SUSE Linux Enterprise Micro 5.3:kernel-rt-5.14.21-150400.15.124.1.x86_64",
            "SUSE Linux Enterprise Micro 5.3:kernel-source-rt-5.14.21-150400.15.124.1.noarch",
            "SUSE Linux Enterprise Micro 5.4:kernel-rt-5.14.21-150400.15.124.1.x86_64",
            "SUSE Linux Enterprise Micro 5.4:kernel-source-rt-5.14.21-150400.15.124.1.noarch"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 4.4,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H",
            "version": "3.1"
          },
          "products": [
            "SUSE Linux Enterprise Micro 5.3:kernel-rt-5.14.21-150400.15.124.1.x86_64",
            "SUSE Linux Enterprise Micro 5.3:kernel-source-rt-5.14.21-150400.15.124.1.noarch",
            "SUSE Linux Enterprise Micro 5.4:kernel-rt-5.14.21-150400.15.124.1.x86_64",
            "SUSE Linux Enterprise Micro 5.4:kernel-source-rt-5.14.21-150400.15.124.1.noarch"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2025-07-15T14:31:46Z",
          "details": "moderate"
        }
      ],
      "title": "CVE-2022-49977"
    },
    {
      "cve": "CVE-2022-49978",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2022-49978"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "In the Linux kernel, the following vulnerability has been resolved:\n\nfbdev: fb_pm2fb: Avoid potential divide by zero error\n\nIn `do_fb_ioctl()` of fbmem.c, if cmd is FBIOPUT_VSCREENINFO, var will be\ncopied from user, then go through `fb_set_var()` and\n`info-\u003efbops-\u003efb_check_var()` which could may be `pm2fb_check_var()`.\nAlong the path, `var-\u003epixclock` won\u0027t be modified. This function checks\nwhether reciprocal of `var-\u003epixclock` is too high. If `var-\u003epixclock` is\nzero, there will be a divide by zero error. So, it is necessary to check\nwhether denominator is zero to avoid crash. As this bug is found by\nSyzkaller, logs are listed below.\n\ndivide error in pm2fb_check_var\nCall Trace:\n \u003cTASK\u003e\n fb_set_var+0x367/0xeb0 drivers/video/fbdev/core/fbmem.c:1015\n do_fb_ioctl+0x234/0x670 drivers/video/fbdev/core/fbmem.c:1110\n fb_ioctl+0xdd/0x130 drivers/video/fbdev/core/fbmem.c:1189",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "SUSE Linux Enterprise Micro 5.3:kernel-rt-5.14.21-150400.15.124.1.x86_64",
          "SUSE Linux Enterprise Micro 5.3:kernel-source-rt-5.14.21-150400.15.124.1.noarch",
          "SUSE Linux Enterprise Micro 5.4:kernel-rt-5.14.21-150400.15.124.1.x86_64",
          "SUSE Linux Enterprise Micro 5.4:kernel-source-rt-5.14.21-150400.15.124.1.noarch"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2022-49978",
          "url": "https://www.suse.com/security/cve/CVE-2022-49978"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1245195 for CVE-2022-49978",
          "url": "https://bugzilla.suse.com/1245195"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "SUSE Linux Enterprise Micro 5.3:kernel-rt-5.14.21-150400.15.124.1.x86_64",
            "SUSE Linux Enterprise Micro 5.3:kernel-source-rt-5.14.21-150400.15.124.1.noarch",
            "SUSE Linux Enterprise Micro 5.4:kernel-rt-5.14.21-150400.15.124.1.x86_64",
            "SUSE Linux Enterprise Micro 5.4:kernel-source-rt-5.14.21-150400.15.124.1.noarch"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 5.5,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
            "version": "3.1"
          },
          "products": [
            "SUSE Linux Enterprise Micro 5.3:kernel-rt-5.14.21-150400.15.124.1.x86_64",
            "SUSE Linux Enterprise Micro 5.3:kernel-source-rt-5.14.21-150400.15.124.1.noarch",
            "SUSE Linux Enterprise Micro 5.4:kernel-rt-5.14.21-150400.15.124.1.x86_64",
            "SUSE Linux Enterprise Micro 5.4:kernel-source-rt-5.14.21-150400.15.124.1.noarch"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2025-07-15T14:31:46Z",
          "details": "moderate"
        }
      ],
      "title": "CVE-2022-49978"
    },
    {
      "cve": "CVE-2022-49981",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2022-49981"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "In the Linux kernel, the following vulnerability has been resolved:\n\nHID: hidraw: fix memory leak in hidraw_release()\n\nFree the buffered reports before deleting the list entry.\n\nBUG: memory leak\nunreferenced object 0xffff88810e72f180 (size 32):\n  comm \"softirq\", pid 0, jiffies 4294945143 (age 16.080s)\n  hex dump (first 32 bytes):\n    64 f3 c6 6a d1 88 07 04 00 00 00 00 00 00 00 00  d..j............\n    00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00  ................\n  backtrace:\n    [\u003cffffffff814ac6c3\u003e] kmemdup+0x23/0x50 mm/util.c:128\n    [\u003cffffffff8357c1d2\u003e] kmemdup include/linux/fortify-string.h:440 [inline]\n    [\u003cffffffff8357c1d2\u003e] hidraw_report_event+0xa2/0x150 drivers/hid/hidraw.c:521\n    [\u003cffffffff8356ddad\u003e] hid_report_raw_event+0x27d/0x740 drivers/hid/hid-core.c:1992\n    [\u003cffffffff8356e41e\u003e] hid_input_report+0x1ae/0x270 drivers/hid/hid-core.c:2065\n    [\u003cffffffff835f0d3f\u003e] hid_irq_in+0x1ff/0x250 drivers/hid/usbhid/hid-core.c:284\n    [\u003cffffffff82d3c7f9\u003e] __usb_hcd_giveback_urb+0xf9/0x230 drivers/usb/core/hcd.c:1670\n    [\u003cffffffff82d3cc26\u003e] usb_hcd_giveback_urb+0x1b6/0x1d0 drivers/usb/core/hcd.c:1747\n    [\u003cffffffff82ef1e14\u003e] dummy_timer+0x8e4/0x14c0 drivers/usb/gadget/udc/dummy_hcd.c:1988\n    [\u003cffffffff812f50a8\u003e] call_timer_fn+0x38/0x200 kernel/time/timer.c:1474\n    [\u003cffffffff812f5586\u003e] expire_timers kernel/time/timer.c:1519 [inline]\n    [\u003cffffffff812f5586\u003e] __run_timers.part.0+0x316/0x430 kernel/time/timer.c:1790\n    [\u003cffffffff812f56e4\u003e] __run_timers kernel/time/timer.c:1768 [inline]\n    [\u003cffffffff812f56e4\u003e] run_timer_softirq+0x44/0x90 kernel/time/timer.c:1803\n    [\u003cffffffff848000e6\u003e] __do_softirq+0xe6/0x2ea kernel/softirq.c:571\n    [\u003cffffffff81246db0\u003e] invoke_softirq kernel/softirq.c:445 [inline]\n    [\u003cffffffff81246db0\u003e] __irq_exit_rcu kernel/softirq.c:650 [inline]\n    [\u003cffffffff81246db0\u003e] irq_exit_rcu+0xc0/0x110 kernel/softirq.c:662\n    [\u003cffffffff84574f02\u003e] sysvec_apic_timer_interrupt+0xa2/0xd0 arch/x86/kernel/apic/apic.c:1106\n    [\u003cffffffff84600c8b\u003e] asm_sysvec_apic_timer_interrupt+0x1b/0x20 arch/x86/include/asm/idtentry.h:649\n    [\u003cffffffff8458a070\u003e] native_safe_halt arch/x86/include/asm/irqflags.h:51 [inline]\n    [\u003cffffffff8458a070\u003e] arch_safe_halt arch/x86/include/asm/irqflags.h:89 [inline]\n    [\u003cffffffff8458a070\u003e] acpi_safe_halt drivers/acpi/processor_idle.c:111 [inline]\n    [\u003cffffffff8458a070\u003e] acpi_idle_do_entry+0xc0/0xd0 drivers/acpi/processor_idle.c:554",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "SUSE Linux Enterprise Micro 5.3:kernel-rt-5.14.21-150400.15.124.1.x86_64",
          "SUSE Linux Enterprise Micro 5.3:kernel-source-rt-5.14.21-150400.15.124.1.noarch",
          "SUSE Linux Enterprise Micro 5.4:kernel-rt-5.14.21-150400.15.124.1.x86_64",
          "SUSE Linux Enterprise Micro 5.4:kernel-source-rt-5.14.21-150400.15.124.1.noarch"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2022-49981",
          "url": "https://www.suse.com/security/cve/CVE-2022-49981"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1245072 for CVE-2022-49981",
          "url": "https://bugzilla.suse.com/1245072"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "SUSE Linux Enterprise Micro 5.3:kernel-rt-5.14.21-150400.15.124.1.x86_64",
            "SUSE Linux Enterprise Micro 5.3:kernel-source-rt-5.14.21-150400.15.124.1.noarch",
            "SUSE Linux Enterprise Micro 5.4:kernel-rt-5.14.21-150400.15.124.1.x86_64",
            "SUSE Linux Enterprise Micro 5.4:kernel-source-rt-5.14.21-150400.15.124.1.noarch"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 5.5,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
            "version": "3.1"
          },
          "products": [
            "SUSE Linux Enterprise Micro 5.3:kernel-rt-5.14.21-150400.15.124.1.x86_64",
            "SUSE Linux Enterprise Micro 5.3:kernel-source-rt-5.14.21-150400.15.124.1.noarch",
            "SUSE Linux Enterprise Micro 5.4:kernel-rt-5.14.21-150400.15.124.1.x86_64",
            "SUSE Linux Enterprise Micro 5.4:kernel-source-rt-5.14.21-150400.15.124.1.noarch"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2025-07-15T14:31:46Z",
          "details": "moderate"
        }
      ],
      "title": "CVE-2022-49981"
    },
    {
      "cve": "CVE-2022-49982",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2022-49982"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "In the Linux kernel, the following vulnerability has been resolved:\n\nmedia: pvrusb2: fix memory leak in pvr_probe\n\nThe error handling code in pvr2_hdw_create forgets to unregister the\nv4l2 device. When pvr2_hdw_create returns back to pvr2_context_create,\nit calls pvr2_context_destroy to destroy context, but mp-\u003ehdw is NULL,\nwhich leads to that pvr2_hdw_destroy directly returns.\n\nFix this by adding v4l2_device_unregister to decrease the refcount of\nusb interface.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "SUSE Linux Enterprise Micro 5.3:kernel-rt-5.14.21-150400.15.124.1.x86_64",
          "SUSE Linux Enterprise Micro 5.3:kernel-source-rt-5.14.21-150400.15.124.1.noarch",
          "SUSE Linux Enterprise Micro 5.4:kernel-rt-5.14.21-150400.15.124.1.x86_64",
          "SUSE Linux Enterprise Micro 5.4:kernel-source-rt-5.14.21-150400.15.124.1.noarch"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2022-49982",
          "url": "https://www.suse.com/security/cve/CVE-2022-49982"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1245069 for CVE-2022-49982",
          "url": "https://bugzilla.suse.com/1245069"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "SUSE Linux Enterprise Micro 5.3:kernel-rt-5.14.21-150400.15.124.1.x86_64",
            "SUSE Linux Enterprise Micro 5.3:kernel-source-rt-5.14.21-150400.15.124.1.noarch",
            "SUSE Linux Enterprise Micro 5.4:kernel-rt-5.14.21-150400.15.124.1.x86_64",
            "SUSE Linux Enterprise Micro 5.4:kernel-source-rt-5.14.21-150400.15.124.1.noarch"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 5.5,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
            "version": "3.1"
          },
          "products": [
            "SUSE Linux Enterprise Micro 5.3:kernel-rt-5.14.21-150400.15.124.1.x86_64",
            "SUSE Linux Enterprise Micro 5.3:kernel-source-rt-5.14.21-150400.15.124.1.noarch",
            "SUSE Linux Enterprise Micro 5.4:kernel-rt-5.14.21-150400.15.124.1.x86_64",
            "SUSE Linux Enterprise Micro 5.4:kernel-source-rt-5.14.21-150400.15.124.1.noarch"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2025-07-15T14:31:46Z",
          "details": "moderate"
        }
      ],
      "title": "CVE-2022-49982"
    },
    {
      "cve": "CVE-2022-49983",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2022-49983"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "In the Linux kernel, the following vulnerability has been resolved:\n\nudmabuf: Set the DMA mask for the udmabuf device (v2)\n\nIf the DMA mask is not set explicitly, the following warning occurs\nwhen the userspace tries to access the dma-buf via the CPU as\nreported by syzbot here:\n\nWARNING: CPU: 1 PID: 3595 at kernel/dma/mapping.c:188\n__dma_map_sg_attrs+0x181/0x1f0 kernel/dma/mapping.c:188\nModules linked in:\nCPU: 0 PID: 3595 Comm: syz-executor249 Not tainted\n5.17.0-rc2-syzkaller-00316-g0457e5153e0e #0\nHardware name: Google Google Compute Engine/Google Compute Engine, BIOS\nGoogle 01/01/2011\nRIP: 0010:__dma_map_sg_attrs+0x181/0x1f0 kernel/dma/mapping.c:188\nCode: 00 00 00 00 00 fc ff df 48 c1 e8 03 80 3c 10 00 75 71 4c 8b 3d c0\n83 b5 0d e9 db fe ff ff e8 b6 0f 13 00 0f 0b e8 af 0f 13 00 \u003c0f\u003e 0b 45\n   31 e4 e9 54 ff ff ff e8 a0 0f 13 00 49 8d 7f 50 48 b8 00\nRSP: 0018:ffffc90002a07d68 EFLAGS: 00010293\nRAX: 0000000000000000 RBX: 0000000000000000 RCX: 0000000000000000\nRDX: ffff88807e25e2c0 RSI: ffffffff81649e91 RDI: ffff88801b848408\nRBP: ffff88801b848000 R08: 0000000000000002 R09: ffff88801d86c74f\nR10: ffffffff81649d72 R11: 0000000000000001 R12: 0000000000000002\nR13: ffff88801d86c680 R14: 0000000000000001 R15: 0000000000000000\nFS:  0000555556e30300(0000) GS:ffff8880b9d00000(0000)\nknlGS:0000000000000000\nCS:  0010 DS: 0000 ES: 0000 CR0: 0000000080050033\nCR2: 00000000200000cc CR3: 000000001d74a000 CR4: 00000000003506e0\nDR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000\nDR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400\nCall Trace:\n \u003cTASK\u003e\n dma_map_sgtable+0x70/0xf0 kernel/dma/mapping.c:264\n get_sg_table.isra.0+0xe0/0x160 drivers/dma-buf/udmabuf.c:72\n begin_cpu_udmabuf+0x130/0x1d0 drivers/dma-buf/udmabuf.c:126\n dma_buf_begin_cpu_access+0xfd/0x1d0 drivers/dma-buf/dma-buf.c:1164\n dma_buf_ioctl+0x259/0x2b0 drivers/dma-buf/dma-buf.c:363\n vfs_ioctl fs/ioctl.c:51 [inline]\n __do_sys_ioctl fs/ioctl.c:874 [inline]\n __se_sys_ioctl fs/ioctl.c:860 [inline]\n __x64_sys_ioctl+0x193/0x200 fs/ioctl.c:860\n do_syscall_x64 arch/x86/entry/common.c:50 [inline]\n do_syscall_64+0x35/0xb0 arch/x86/entry/common.c:80\n entry_SYSCALL_64_after_hwframe+0x44/0xae\nRIP: 0033:0x7f62fcf530f9\nCode: 28 c3 e8 2a 14 00 00 66 2e 0f 1f 84 00 00 00 00 00 48 89 f8 48 89\nf7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 \u003c48\u003e 3d 01\nf0 ff ff 73 01 c3 48 c7 c1 c0 ff ff ff f7 d8 64 89 01 48\nRSP: 002b:00007ffe3edab9b8 EFLAGS: 00000246 ORIG_RAX: 0000000000000010\nRAX: ffffffffffffffda RBX: 0000000000000000 RCX: 00007f62fcf530f9\nRDX: 0000000020000200 RSI: 0000000040086200 RDI: 0000000000000006\nRBP: 00007f62fcf170e0 R08: 0000000000000000 R09: 0000000000000000\nR10: 0000000000000000 R11: 0000000000000246 R12: 00007f62fcf17170\nR13: 0000000000000000 R14: 0000000000000000 R15: 0000000000000000\n \u003c/TASK\u003e\n\nv2: Dont\u0027t forget to deregister if DMA mask setup fails.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "SUSE Linux Enterprise Micro 5.3:kernel-rt-5.14.21-150400.15.124.1.x86_64",
          "SUSE Linux Enterprise Micro 5.3:kernel-source-rt-5.14.21-150400.15.124.1.noarch",
          "SUSE Linux Enterprise Micro 5.4:kernel-rt-5.14.21-150400.15.124.1.x86_64",
          "SUSE Linux Enterprise Micro 5.4:kernel-source-rt-5.14.21-150400.15.124.1.noarch"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2022-49983",
          "url": "https://www.suse.com/security/cve/CVE-2022-49983"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1245092 for CVE-2022-49983",
          "url": "https://bugzilla.suse.com/1245092"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "SUSE Linux Enterprise Micro 5.3:kernel-rt-5.14.21-150400.15.124.1.x86_64",
            "SUSE Linux Enterprise Micro 5.3:kernel-source-rt-5.14.21-150400.15.124.1.noarch",
            "SUSE Linux Enterprise Micro 5.4:kernel-rt-5.14.21-150400.15.124.1.x86_64",
            "SUSE Linux Enterprise Micro 5.4:kernel-source-rt-5.14.21-150400.15.124.1.noarch"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 5.5,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
            "version": "3.1"
          },
          "products": [
            "SUSE Linux Enterprise Micro 5.3:kernel-rt-5.14.21-150400.15.124.1.x86_64",
            "SUSE Linux Enterprise Micro 5.3:kernel-source-rt-5.14.21-150400.15.124.1.noarch",
            "SUSE Linux Enterprise Micro 5.4:kernel-rt-5.14.21-150400.15.124.1.x86_64",
            "SUSE Linux Enterprise Micro 5.4:kernel-source-rt-5.14.21-150400.15.124.1.noarch"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2025-07-15T14:31:46Z",
          "details": "moderate"
        }
      ],
      "title": "CVE-2022-49983"
    },
    {
      "cve": "CVE-2022-49984",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2022-49984"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "In the Linux kernel, the following vulnerability has been resolved:\n\nHID: steam: Prevent NULL pointer dereference in steam_{recv,send}_report\n\nIt is possible for a malicious device to forgo submitting a Feature\nReport.  The HID Steam driver presently makes no prevision for this\nand de-references the \u0027struct hid_report\u0027 pointer obtained from the\nHID devices without first checking its validity.  Let\u0027s change that.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "SUSE Linux Enterprise Micro 5.3:kernel-rt-5.14.21-150400.15.124.1.x86_64",
          "SUSE Linux Enterprise Micro 5.3:kernel-source-rt-5.14.21-150400.15.124.1.noarch",
          "SUSE Linux Enterprise Micro 5.4:kernel-rt-5.14.21-150400.15.124.1.x86_64",
          "SUSE Linux Enterprise Micro 5.4:kernel-source-rt-5.14.21-150400.15.124.1.noarch"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2022-49984",
          "url": "https://www.suse.com/security/cve/CVE-2022-49984"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1244950 for CVE-2022-49984",
          "url": "https://bugzilla.suse.com/1244950"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "SUSE Linux Enterprise Micro 5.3:kernel-rt-5.14.21-150400.15.124.1.x86_64",
            "SUSE Linux Enterprise Micro 5.3:kernel-source-rt-5.14.21-150400.15.124.1.noarch",
            "SUSE Linux Enterprise Micro 5.4:kernel-rt-5.14.21-150400.15.124.1.x86_64",
            "SUSE Linux Enterprise Micro 5.4:kernel-source-rt-5.14.21-150400.15.124.1.noarch"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 5.5,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
            "version": "3.1"
          },
          "products": [
            "SUSE Linux Enterprise Micro 5.3:kernel-rt-5.14.21-150400.15.124.1.x86_64",
            "SUSE Linux Enterprise Micro 5.3:kernel-source-rt-5.14.21-150400.15.124.1.noarch",
            "SUSE Linux Enterprise Micro 5.4:kernel-rt-5.14.21-150400.15.124.1.x86_64",
            "SUSE Linux Enterprise Micro 5.4:kernel-source-rt-5.14.21-150400.15.124.1.noarch"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2025-07-15T14:31:46Z",
          "details": "moderate"
        }
      ],
      "title": "CVE-2022-49984"
    },
    {
      "cve": "CVE-2022-49985",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2022-49985"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "In the Linux kernel, the following vulnerability has been resolved:\n\nbpf: Don\u0027t use tnum_range on array range checking for poke descriptors\n\nHsin-Wei reported a KASAN splat triggered by their BPF runtime fuzzer which\nis based on a customized syzkaller:\n\n  BUG: KASAN: slab-out-of-bounds in bpf_int_jit_compile+0x1257/0x13f0\n  Read of size 8 at addr ffff888004e90b58 by task syz-executor.0/1489\n  CPU: 1 PID: 1489 Comm: syz-executor.0 Not tainted 5.19.0 #1\n  Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS\n  1.13.0-1ubuntu1.1 04/01/2014\n  Call Trace:\n   \u003cTASK\u003e\n   dump_stack_lvl+0x9c/0xc9\n   print_address_description.constprop.0+0x1f/0x1f0\n   ? bpf_int_jit_compile+0x1257/0x13f0\n   kasan_report.cold+0xeb/0x197\n   ? kvmalloc_node+0x170/0x200\n   ? bpf_int_jit_compile+0x1257/0x13f0\n   bpf_int_jit_compile+0x1257/0x13f0\n   ? arch_prepare_bpf_dispatcher+0xd0/0xd0\n   ? rcu_read_lock_sched_held+0x43/0x70\n   bpf_prog_select_runtime+0x3e8/0x640\n   ? bpf_obj_name_cpy+0x149/0x1b0\n   bpf_prog_load+0x102f/0x2220\n   ? __bpf_prog_put.constprop.0+0x220/0x220\n   ? find_held_lock+0x2c/0x110\n   ? __might_fault+0xd6/0x180\n   ? lock_downgrade+0x6e0/0x6e0\n   ? lock_is_held_type+0xa6/0x120\n   ? __might_fault+0x147/0x180\n   __sys_bpf+0x137b/0x6070\n   ? bpf_perf_link_attach+0x530/0x530\n   ? new_sync_read+0x600/0x600\n   ? __fget_files+0x255/0x450\n   ? lock_downgrade+0x6e0/0x6e0\n   ? fput+0x30/0x1a0\n   ? ksys_write+0x1a8/0x260\n   __x64_sys_bpf+0x7a/0xc0\n   ? syscall_enter_from_user_mode+0x21/0x70\n   do_syscall_64+0x3b/0x90\n   entry_SYSCALL_64_after_hwframe+0x63/0xcd\n  RIP: 0033:0x7f917c4e2c2d\n\nThe problem here is that a range of tnum_range(0, map-\u003emax_entries - 1) has\nlimited ability to represent the concrete tight range with the tnum as the\nset of resulting states from value + mask can result in a superset of the\nactual intended range, and as such a tnum_in(range, reg-\u003evar_off) check may\nyield true when it shouldn\u0027t, for example tnum_range(0, 2) would result in\n00XX -\u003e v = 0000, m = 0011 such that the intended set of {0, 1, 2} is here\nrepresented by a less precise superset of {0, 1, 2, 3}. As the register is\nknown const scalar, really just use the concrete reg-\u003evar_off.value for the\nupper index check.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "SUSE Linux Enterprise Micro 5.3:kernel-rt-5.14.21-150400.15.124.1.x86_64",
          "SUSE Linux Enterprise Micro 5.3:kernel-source-rt-5.14.21-150400.15.124.1.noarch",
          "SUSE Linux Enterprise Micro 5.4:kernel-rt-5.14.21-150400.15.124.1.x86_64",
          "SUSE Linux Enterprise Micro 5.4:kernel-source-rt-5.14.21-150400.15.124.1.noarch"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2022-49985",
          "url": "https://www.suse.com/security/cve/CVE-2022-49985"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1244956 for CVE-2022-49985",
          "url": "https://bugzilla.suse.com/1244956"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "SUSE Linux Enterprise Micro 5.3:kernel-rt-5.14.21-150400.15.124.1.x86_64",
            "SUSE Linux Enterprise Micro 5.3:kernel-source-rt-5.14.21-150400.15.124.1.noarch",
            "SUSE Linux Enterprise Micro 5.4:kernel-rt-5.14.21-150400.15.124.1.x86_64",
            "SUSE Linux Enterprise Micro 5.4:kernel-source-rt-5.14.21-150400.15.124.1.noarch"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 5.5,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
            "version": "3.1"
          },
          "products": [
            "SUSE Linux Enterprise Micro 5.3:kernel-rt-5.14.21-150400.15.124.1.x86_64",
            "SUSE Linux Enterprise Micro 5.3:kernel-source-rt-5.14.21-150400.15.124.1.noarch",
            "SUSE Linux Enterprise Micro 5.4:kernel-rt-5.14.21-150400.15.124.1.x86_64",
            "SUSE Linux Enterprise Micro 5.4:kernel-source-rt-5.14.21-150400.15.124.1.noarch"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2025-07-15T14:31:46Z",
          "details": "moderate"
        }
      ],
      "title": "CVE-2022-49985"
    },
    {
      "cve": "CVE-2022-49986",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2022-49986"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "In the Linux kernel, the following vulnerability has been resolved:\n\nscsi: storvsc: Remove WQ_MEM_RECLAIM from storvsc_error_wq\n\nstorvsc_error_wq workqueue should not be marked as WQ_MEM_RECLAIM as it\ndoesn\u0027t need to make forward progress under memory pressure.  Marking this\nworkqueue as WQ_MEM_RECLAIM may cause deadlock while flushing a\nnon-WQ_MEM_RECLAIM workqueue.  In the current state it causes the following\nwarning:\n\n[   14.506347] ------------[ cut here ]------------\n[   14.506354] workqueue: WQ_MEM_RECLAIM storvsc_error_wq_0:storvsc_remove_lun is flushing !WQ_MEM_RECLAIM events_freezable_power_:disk_events_workfn\n[   14.506360] WARNING: CPU: 0 PID: 8 at \u003c-snip-\u003ekernel/workqueue.c:2623 check_flush_dependency+0xb5/0x130\n[   14.506390] CPU: 0 PID: 8 Comm: kworker/u4:0 Not tainted 5.4.0-1086-azure #91~18.04.1-Ubuntu\n[   14.506391] Hardware name: Microsoft Corporation Virtual Machine/Virtual Machine, BIOS Hyper-V UEFI Release v4.1 05/09/2022\n[   14.506393] Workqueue: storvsc_error_wq_0 storvsc_remove_lun\n[   14.506395] RIP: 0010:check_flush_dependency+0xb5/0x130\n\t\t\u003c-snip-\u003e\n[   14.506408] Call Trace:\n[   14.506412]  __flush_work+0xf1/0x1c0\n[   14.506414]  __cancel_work_timer+0x12f/0x1b0\n[   14.506417]  ? kernfs_put+0xf0/0x190\n[   14.506418]  cancel_delayed_work_sync+0x13/0x20\n[   14.506420]  disk_block_events+0x78/0x80\n[   14.506421]  del_gendisk+0x3d/0x2f0\n[   14.506423]  sr_remove+0x28/0x70\n[   14.506427]  device_release_driver_internal+0xef/0x1c0\n[   14.506428]  device_release_driver+0x12/0x20\n[   14.506429]  bus_remove_device+0xe1/0x150\n[   14.506431]  device_del+0x167/0x380\n[   14.506432]  __scsi_remove_device+0x11d/0x150\n[   14.506433]  scsi_remove_device+0x26/0x40\n[   14.506434]  storvsc_remove_lun+0x40/0x60\n[   14.506436]  process_one_work+0x209/0x400\n[   14.506437]  worker_thread+0x34/0x400\n[   14.506439]  kthread+0x121/0x140\n[   14.506440]  ? process_one_work+0x400/0x400\n[   14.506441]  ? kthread_park+0x90/0x90\n[   14.506443]  ret_from_fork+0x35/0x40\n[   14.506445] ---[ end trace 2d9633159fdc6ee7 ]---",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "SUSE Linux Enterprise Micro 5.3:kernel-rt-5.14.21-150400.15.124.1.x86_64",
          "SUSE Linux Enterprise Micro 5.3:kernel-source-rt-5.14.21-150400.15.124.1.noarch",
          "SUSE Linux Enterprise Micro 5.4:kernel-rt-5.14.21-150400.15.124.1.x86_64",
          "SUSE Linux Enterprise Micro 5.4:kernel-source-rt-5.14.21-150400.15.124.1.noarch"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2022-49986",
          "url": "https://www.suse.com/security/cve/CVE-2022-49986"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1244948 for CVE-2022-49986",
          "url": "https://bugzilla.suse.com/1244948"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "SUSE Linux Enterprise Micro 5.3:kernel-rt-5.14.21-150400.15.124.1.x86_64",
            "SUSE Linux Enterprise Micro 5.3:kernel-source-rt-5.14.21-150400.15.124.1.noarch",
            "SUSE Linux Enterprise Micro 5.4:kernel-rt-5.14.21-150400.15.124.1.x86_64",
            "SUSE Linux Enterprise Micro 5.4:kernel-source-rt-5.14.21-150400.15.124.1.noarch"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 5.5,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
            "version": "3.1"
          },
          "products": [
            "SUSE Linux Enterprise Micro 5.3:kernel-rt-5.14.21-150400.15.124.1.x86_64",
            "SUSE Linux Enterprise Micro 5.3:kernel-source-rt-5.14.21-150400.15.124.1.noarch",
            "SUSE Linux Enterprise Micro 5.4:kernel-rt-5.14.21-150400.15.124.1.x86_64",
            "SUSE Linux Enterprise Micro 5.4:kernel-source-rt-5.14.21-150400.15.124.1.noarch"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2025-07-15T14:31:46Z",
          "details": "moderate"
        }
      ],
      "title": "CVE-2022-49986"
    },
    {
      "cve": "CVE-2022-49987",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2022-49987"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "In the Linux kernel, the following vulnerability has been resolved:\n\nmd: call __md_stop_writes in md_stop\n\nFrom the link [1], we can see raid1d was running even after the path\nraid_dtr -\u003e md_stop -\u003e __md_stop.\n\nLet\u0027s stop write first in destructor to align with normal md-raid to\nfix the KASAN issue.\n\n[1]. https://lore.kernel.org/linux-raid/CAPhsuW5gc4AakdGNdF8ubpezAuDLFOYUO_sfMZcec6hQFm8nhg@mail.gmail.com/T/#m7f12bf90481c02c6d2da68c64aeed4779b7df74a",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "SUSE Linux Enterprise Micro 5.3:kernel-rt-5.14.21-150400.15.124.1.x86_64",
          "SUSE Linux Enterprise Micro 5.3:kernel-source-rt-5.14.21-150400.15.124.1.noarch",
          "SUSE Linux Enterprise Micro 5.4:kernel-rt-5.14.21-150400.15.124.1.x86_64",
          "SUSE Linux Enterprise Micro 5.4:kernel-source-rt-5.14.21-150400.15.124.1.noarch"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2022-49987",
          "url": "https://www.suse.com/security/cve/CVE-2022-49987"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1245024 for CVE-2022-49987",
          "url": "https://bugzilla.suse.com/1245024"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "SUSE Linux Enterprise Micro 5.3:kernel-rt-5.14.21-150400.15.124.1.x86_64",
            "SUSE Linux Enterprise Micro 5.3:kernel-source-rt-5.14.21-150400.15.124.1.noarch",
            "SUSE Linux Enterprise Micro 5.4:kernel-rt-5.14.21-150400.15.124.1.x86_64",
            "SUSE Linux Enterprise Micro 5.4:kernel-source-rt-5.14.21-150400.15.124.1.noarch"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 5.5,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
            "version": "3.1"
          },
          "products": [
            "SUSE Linux Enterprise Micro 5.3:kernel-rt-5.14.21-150400.15.124.1.x86_64",
            "SUSE Linux Enterprise Micro 5.3:kernel-source-rt-5.14.21-150400.15.124.1.noarch",
            "SUSE Linux Enterprise Micro 5.4:kernel-rt-5.14.21-150400.15.124.1.x86_64",
            "SUSE Linux Enterprise Micro 5.4:kernel-source-rt-5.14.21-150400.15.124.1.noarch"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2025-07-15T14:31:46Z",
          "details": "moderate"
        }
      ],
      "title": "CVE-2022-49987"
    },
    {
      "cve": "CVE-2022-49989",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2022-49989"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "In the Linux kernel, the following vulnerability has been resolved:\n\nxen/privcmd: fix error exit of privcmd_ioctl_dm_op()\n\nThe error exit of privcmd_ioctl_dm_op() is calling unlock_pages()\npotentially with pages being NULL, leading to a NULL dereference.\n\nAdditionally lock_pages() doesn\u0027t check for pin_user_pages_fast()\nhaving been completely successful, resulting in potentially not\nlocking all pages into memory. This could result in sporadic failures\nwhen using the related memory in user mode.\n\nFix all of that by calling unlock_pages() always with the real number\nof pinned pages, which will be zero in case pages being NULL, and by\nchecking the number of pages pinned by pin_user_pages_fast() matching\nthe expected number of pages.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "SUSE Linux Enterprise Micro 5.3:kernel-rt-5.14.21-150400.15.124.1.x86_64",
          "SUSE Linux Enterprise Micro 5.3:kernel-source-rt-5.14.21-150400.15.124.1.noarch",
          "SUSE Linux Enterprise Micro 5.4:kernel-rt-5.14.21-150400.15.124.1.x86_64",
          "SUSE Linux Enterprise Micro 5.4:kernel-source-rt-5.14.21-150400.15.124.1.noarch"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2022-49989",
          "url": "https://www.suse.com/security/cve/CVE-2022-49989"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1245007 for CVE-2022-49989",
          "url": "https://bugzilla.suse.com/1245007"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "SUSE Linux Enterprise Micro 5.3:kernel-rt-5.14.21-150400.15.124.1.x86_64",
            "SUSE Linux Enterprise Micro 5.3:kernel-source-rt-5.14.21-150400.15.124.1.noarch",
            "SUSE Linux Enterprise Micro 5.4:kernel-rt-5.14.21-150400.15.124.1.x86_64",
            "SUSE Linux Enterprise Micro 5.4:kernel-source-rt-5.14.21-150400.15.124.1.noarch"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 5.5,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
            "version": "3.1"
          },
          "products": [
            "SUSE Linux Enterprise Micro 5.3:kernel-rt-5.14.21-150400.15.124.1.x86_64",
            "SUSE Linux Enterprise Micro 5.3:kernel-source-rt-5.14.21-150400.15.124.1.noarch",
            "SUSE Linux Enterprise Micro 5.4:kernel-rt-5.14.21-150400.15.124.1.x86_64",
            "SUSE Linux Enterprise Micro 5.4:kernel-source-rt-5.14.21-150400.15.124.1.noarch"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2025-07-15T14:31:46Z",
          "details": "moderate"
        }
      ],
      "title": "CVE-2022-49989"
    },
    {
      "cve": "CVE-2022-49990",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2022-49990"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "In the Linux kernel, the following vulnerability has been resolved:\n\ns390: fix double free of GS and RI CBs on fork() failure\n\nThe pointers for guarded storage and runtime instrumentation control\nblocks are stored in the thread_struct of the associated task. These\npointers are initially copied on fork() via arch_dup_task_struct()\nand then cleared via copy_thread() before fork() returns. If fork()\nhappens to fail after the initial task dup and before copy_thread(),\nthe newly allocated task and associated thread_struct memory are\nfreed via free_task() -\u003e arch_release_task_struct(). This results in\na double free of the guarded storage and runtime info structs\nbecause the fields in the failed task still refer to memory\nassociated with the source task.\n\nThis problem can manifest as a BUG_ON() in set_freepointer() (with\nCONFIG_SLAB_FREELIST_HARDENED enabled) or KASAN splat (if enabled)\nwhen running trinity syscall fuzz tests on s390x. To avoid this\nproblem, clear the associated pointer fields in\narch_dup_task_struct() immediately after the new task is copied.\nNote that the RI flag is still cleared in copy_thread() because it\nresides in thread stack memory and that is where stack info is\ncopied.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "SUSE Linux Enterprise Micro 5.3:kernel-rt-5.14.21-150400.15.124.1.x86_64",
          "SUSE Linux Enterprise Micro 5.3:kernel-source-rt-5.14.21-150400.15.124.1.noarch",
          "SUSE Linux Enterprise Micro 5.4:kernel-rt-5.14.21-150400.15.124.1.x86_64",
          "SUSE Linux Enterprise Micro 5.4:kernel-source-rt-5.14.21-150400.15.124.1.noarch"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2022-49990",
          "url": "https://www.suse.com/security/cve/CVE-2022-49990"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1245006 for CVE-2022-49990",
          "url": "https://bugzilla.suse.com/1245006"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "SUSE Linux Enterprise Micro 5.3:kernel-rt-5.14.21-150400.15.124.1.x86_64",
            "SUSE Linux Enterprise Micro 5.3:kernel-source-rt-5.14.21-150400.15.124.1.noarch",
            "SUSE Linux Enterprise Micro 5.4:kernel-rt-5.14.21-150400.15.124.1.x86_64",
            "SUSE Linux Enterprise Micro 5.4:kernel-source-rt-5.14.21-150400.15.124.1.noarch"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 5.5,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
            "version": "3.1"
          },
          "products": [
            "SUSE Linux Enterprise Micro 5.3:kernel-rt-5.14.21-150400.15.124.1.x86_64",
            "SUSE Linux Enterprise Micro 5.3:kernel-source-rt-5.14.21-150400.15.124.1.noarch",
            "SUSE Linux Enterprise Micro 5.4:kernel-rt-5.14.21-150400.15.124.1.x86_64",
            "SUSE Linux Enterprise Micro 5.4:kernel-source-rt-5.14.21-150400.15.124.1.noarch"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2025-07-15T14:31:46Z",
          "details": "moderate"
        }
      ],
      "title": "CVE-2022-49990"
    },
    {
      "cve": "CVE-2022-49993",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2022-49993"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "In the Linux kernel, the following vulnerability has been resolved:\n\nloop: Check for overflow while configuring loop\n\nThe userspace can configure a loop using an ioctl call, wherein\na configuration of type loop_config is passed (see lo_ioctl()\u0027s\ncase on line 1550 of drivers/block/loop.c). This proceeds to call\nloop_configure() which in turn calls loop_set_status_from_info()\n(see line 1050 of loop.c), passing \u0026config-\u003einfo which is of type\nloop_info64*. This function then sets the appropriate values, like\nthe offset.\n\nloop_device has lo_offset of type loff_t (see line 52 of loop.c),\nwhich is typdef-chained to long long, whereas loop_info64 has\nlo_offset of type __u64 (see line 56 of include/uapi/linux/loop.h).\n\nThe function directly copies offset from info to the device as\nfollows (See line 980 of loop.c):\n\tlo-\u003elo_offset = info-\u003elo_offset;\n\nThis results in an overflow, which triggers a warning in iomap_iter()\ndue to a call to iomap_iter_done() which has:\n\tWARN_ON_ONCE(iter-\u003eiomap.offset \u003e iter-\u003epos);\n\nThus, check for negative value during loop_set_status_from_info().\n\nBug report: https://syzkaller.appspot.com/bug?id=c620fe14aac810396d3c3edc9ad73848bf69a29e",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "SUSE Linux Enterprise Micro 5.3:kernel-rt-5.14.21-150400.15.124.1.x86_64",
          "SUSE Linux Enterprise Micro 5.3:kernel-source-rt-5.14.21-150400.15.124.1.noarch",
          "SUSE Linux Enterprise Micro 5.4:kernel-rt-5.14.21-150400.15.124.1.x86_64",
          "SUSE Linux Enterprise Micro 5.4:kernel-source-rt-5.14.21-150400.15.124.1.noarch"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2022-49993",
          "url": "https://www.suse.com/security/cve/CVE-2022-49993"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1245121 for CVE-2022-49993",
          "url": "https://bugzilla.suse.com/1245121"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "SUSE Linux Enterprise Micro 5.3:kernel-rt-5.14.21-150400.15.124.1.x86_64",
            "SUSE Linux Enterprise Micro 5.3:kernel-source-rt-5.14.21-150400.15.124.1.noarch",
            "SUSE Linux Enterprise Micro 5.4:kernel-rt-5.14.21-150400.15.124.1.x86_64",
            "SUSE Linux Enterprise Micro 5.4:kernel-source-rt-5.14.21-150400.15.124.1.noarch"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 5.5,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
            "version": "3.1"
          },
          "products": [
            "SUSE Linux Enterprise Micro 5.3:kernel-rt-5.14.21-150400.15.124.1.x86_64",
            "SUSE Linux Enterprise Micro 5.3:kernel-source-rt-5.14.21-150400.15.124.1.noarch",
            "SUSE Linux Enterprise Micro 5.4:kernel-rt-5.14.21-150400.15.124.1.x86_64",
            "SUSE Linux Enterprise Micro 5.4:kernel-source-rt-5.14.21-150400.15.124.1.noarch"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2025-07-15T14:31:46Z",
          "details": "moderate"
        }
      ],
      "title": "CVE-2022-49993"
    },
    {
      "cve": "CVE-2022-49995",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2022-49995"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "In the Linux kernel, the following vulnerability has been resolved:\n\nwriteback: avoid use-after-free after removing device\n\nWhen a disk is removed, bdi_unregister gets called to stop further\nwriteback and wait for associated delayed work to complete.  However,\nwb_inode_writeback_end() may schedule bandwidth estimation dwork after\nthis has completed, which can result in the timer attempting to access the\njust freed bdi_writeback.\n\nFix this by checking if the bdi_writeback is alive, similar to when\nscheduling writeback work.\n\nSince this requires wb-\u003ework_lock, and wb_inode_writeback_end() may get\ncalled from interrupt, switch wb-\u003ework_lock to an irqsafe lock.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "SUSE Linux Enterprise Micro 5.3:kernel-rt-5.14.21-150400.15.124.1.x86_64",
          "SUSE Linux Enterprise Micro 5.3:kernel-source-rt-5.14.21-150400.15.124.1.noarch",
          "SUSE Linux Enterprise Micro 5.4:kernel-rt-5.14.21-150400.15.124.1.x86_64",
          "SUSE Linux Enterprise Micro 5.4:kernel-source-rt-5.14.21-150400.15.124.1.noarch"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2022-49995",
          "url": "https://www.suse.com/security/cve/CVE-2022-49995"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1245012 for CVE-2022-49995",
          "url": "https://bugzilla.suse.com/1245012"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "SUSE Linux Enterprise Micro 5.3:kernel-rt-5.14.21-150400.15.124.1.x86_64",
            "SUSE Linux Enterprise Micro 5.3:kernel-source-rt-5.14.21-150400.15.124.1.noarch",
            "SUSE Linux Enterprise Micro 5.4:kernel-rt-5.14.21-150400.15.124.1.x86_64",
            "SUSE Linux Enterprise Micro 5.4:kernel-source-rt-5.14.21-150400.15.124.1.noarch"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 5.5,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
            "version": "3.1"
          },
          "products": [
            "SUSE Linux Enterprise Micro 5.3:kernel-rt-5.14.21-150400.15.124.1.x86_64",
            "SUSE Linux Enterprise Micro 5.3:kernel-source-rt-5.14.21-150400.15.124.1.noarch",
            "SUSE Linux Enterprise Micro 5.4:kernel-rt-5.14.21-150400.15.124.1.x86_64",
            "SUSE Linux Enterprise Micro 5.4:kernel-source-rt-5.14.21-150400.15.124.1.noarch"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2025-07-15T14:31:46Z",
          "details": "moderate"
        }
      ],
      "title": "CVE-2022-49995"
    },
    {
      "cve": "CVE-2022-49999",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2022-49999"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "In the Linux kernel, the following vulnerability has been resolved:\n\nbtrfs: fix space cache corruption and potential double allocations\n\nWhen testing space_cache v2 on a large set of machines, we encountered a\nfew symptoms:\n\n1. \"unable to add free space :-17\" (EEXIST) errors.\n2. Missing free space info items, sometimes caught with a \"missing free\n   space info for X\" error.\n3. Double-accounted space: ranges that were allocated in the extent tree\n   and also marked as free in the free space tree, ranges that were\n   marked as allocated twice in the extent tree, or ranges that were\n   marked as free twice in the free space tree. If the latter made it\n   onto disk, the next reboot would hit the BUG_ON() in\n   add_new_free_space().\n4. On some hosts with no on-disk corruption or error messages, the\n   in-memory space cache (dumped with drgn) disagreed with the free\n   space tree.\n\nAll of these symptoms have the same underlying cause: a race between\ncaching the free space for a block group and returning free space to the\nin-memory space cache for pinned extents causes us to double-add a free\nrange to the space cache. This race exists when free space is cached\nfrom the free space tree (space_cache=v2) or the extent tree\n(nospace_cache, or space_cache=v1 if the cache needs to be regenerated).\nstruct btrfs_block_group::last_byte_to_unpin and struct\nbtrfs_block_group::progress are supposed to protect against this race,\nbut commit d0c2f4fa555e (\"btrfs: make concurrent fsyncs wait less when\nwaiting for a transaction commit\") subtly broke this by allowing\nmultiple transactions to be unpinning extents at the same time.\n\nSpecifically, the race is as follows:\n\n1. An extent is deleted from an uncached block group in transaction A.\n2. btrfs_commit_transaction() is called for transaction A.\n3. btrfs_run_delayed_refs() -\u003e __btrfs_free_extent() runs the delayed\n   ref for the deleted extent.\n4. __btrfs_free_extent() -\u003e do_free_extent_accounting() -\u003e\n   add_to_free_space_tree() adds the deleted extent back to the free\n   space tree.\n5. do_free_extent_accounting() -\u003e btrfs_update_block_group() -\u003e\n   btrfs_cache_block_group() queues up the block group to get cached.\n   block_group-\u003eprogress is set to block_group-\u003estart.\n6. btrfs_commit_transaction() for transaction A calls\n   switch_commit_roots(). It sets block_group-\u003elast_byte_to_unpin to\n   block_group-\u003eprogress, which is block_group-\u003estart because the block\n   group hasn\u0027t been cached yet.\n7. The caching thread gets to our block group. Since the commit roots\n   were already switched, load_free_space_tree() sees the deleted extent\n   as free and adds it to the space cache. It finishes caching and sets\n   block_group-\u003eprogress to U64_MAX.\n8. btrfs_commit_transaction() advances transaction A to\n   TRANS_STATE_SUPER_COMMITTED.\n9. fsync calls btrfs_commit_transaction() for transaction B. Since\n   transaction A is already in TRANS_STATE_SUPER_COMMITTED and the\n   commit is for fsync, it advances.\n10. btrfs_commit_transaction() for transaction B calls\n    switch_commit_roots(). This time, the block group has already been\n    cached, so it sets block_group-\u003elast_byte_to_unpin to U64_MAX.\n11. btrfs_commit_transaction() for transaction A calls\n    btrfs_finish_extent_commit(), which calls unpin_extent_range() for\n    the deleted extent. It sees last_byte_to_unpin set to U64_MAX (by\n    transaction B!), so it adds the deleted extent to the space cache\n    again!\n\nThis explains all of our symptoms above:\n\n* If the sequence of events is exactly as described above, when the free\n  space is re-added in step 11, it will fail with EEXIST.\n* If another thread reallocates the deleted extent in between steps 7\n  and 11, then step 11 will silently re-add that space to the space\n  cache as free even though it is actually allocated. Then, if that\n  space is allocated *again*, the free space tree will be corrupted\n  (namely, the wrong item will be deleted).\n* If we don\u0027t catch this free space tree corr\n---truncated---",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "SUSE Linux Enterprise Micro 5.3:kernel-rt-5.14.21-150400.15.124.1.x86_64",
          "SUSE Linux Enterprise Micro 5.3:kernel-source-rt-5.14.21-150400.15.124.1.noarch",
          "SUSE Linux Enterprise Micro 5.4:kernel-rt-5.14.21-150400.15.124.1.x86_64",
          "SUSE Linux Enterprise Micro 5.4:kernel-source-rt-5.14.21-150400.15.124.1.noarch"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2022-49999",
          "url": "https://www.suse.com/security/cve/CVE-2022-49999"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1245019 for CVE-2022-49999",
          "url": "https://bugzilla.suse.com/1245019"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "SUSE Linux Enterprise Micro 5.3:kernel-rt-5.14.21-150400.15.124.1.x86_64",
            "SUSE Linux Enterprise Micro 5.3:kernel-source-rt-5.14.21-150400.15.124.1.noarch",
            "SUSE Linux Enterprise Micro 5.4:kernel-rt-5.14.21-150400.15.124.1.x86_64",
            "SUSE Linux Enterprise Micro 5.4:kernel-source-rt-5.14.21-150400.15.124.1.noarch"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 5.5,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
            "version": "3.1"
          },
          "products": [
            "SUSE Linux Enterprise Micro 5.3:kernel-rt-5.14.21-150400.15.124.1.x86_64",
            "SUSE Linux Enterprise Micro 5.3:kernel-source-rt-5.14.21-150400.15.124.1.noarch",
            "SUSE Linux Enterprise Micro 5.4:kernel-rt-5.14.21-150400.15.124.1.x86_64",
            "SUSE Linux Enterprise Micro 5.4:kernel-source-rt-5.14.21-150400.15.124.1.noarch"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2025-07-15T14:31:46Z",
          "details": "moderate"
        }
      ],
      "title": "CVE-2022-49999"
    },
    {
      "cve": "CVE-2022-50005",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2022-50005"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "In the Linux kernel, the following vulnerability has been resolved:\n\nnfc: pn533: Fix use-after-free bugs caused by pn532_cmd_timeout\n\nWhen the pn532 uart device is detaching, the pn532_uart_remove()\nis called. But there are no functions in pn532_uart_remove() that\ncould delete the cmd_timeout timer, which will cause use-after-free\nbugs. The process is shown below:\n\n    (thread 1)                  |        (thread 2)\n                                |  pn532_uart_send_frame\npn532_uart_remove               |    mod_timer(\u0026pn532-\u003ecmd_timeout,...)\n  ...                           |    (wait a time)\n  kfree(pn532) //FREE           |    pn532_cmd_timeout\n                                |      pn532_uart_send_frame\n                                |        pn532-\u003e... //USE\n\nThis patch adds del_timer_sync() in pn532_uart_remove() in order to\nprevent the use-after-free bugs. What\u0027s more, the pn53x_unregister_nfc()\nis well synchronized, it sets nfc_dev-\u003eshutting_down to true and there\nare no syscalls could restart the cmd_timeout timer.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "SUSE Linux Enterprise Micro 5.3:kernel-rt-5.14.21-150400.15.124.1.x86_64",
          "SUSE Linux Enterprise Micro 5.3:kernel-source-rt-5.14.21-150400.15.124.1.noarch",
          "SUSE Linux Enterprise Micro 5.4:kernel-rt-5.14.21-150400.15.124.1.x86_64",
          "SUSE Linux Enterprise Micro 5.4:kernel-source-rt-5.14.21-150400.15.124.1.noarch"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2022-50005",
          "url": "https://www.suse.com/security/cve/CVE-2022-50005"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1245011 for CVE-2022-50005",
          "url": "https://bugzilla.suse.com/1245011"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "SUSE Linux Enterprise Micro 5.3:kernel-rt-5.14.21-150400.15.124.1.x86_64",
            "SUSE Linux Enterprise Micro 5.3:kernel-source-rt-5.14.21-150400.15.124.1.noarch",
            "SUSE Linux Enterprise Micro 5.4:kernel-rt-5.14.21-150400.15.124.1.x86_64",
            "SUSE Linux Enterprise Micro 5.4:kernel-source-rt-5.14.21-150400.15.124.1.noarch"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 5.5,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
            "version": "3.1"
          },
          "products": [
            "SUSE Linux Enterprise Micro 5.3:kernel-rt-5.14.21-150400.15.124.1.x86_64",
            "SUSE Linux Enterprise Micro 5.3:kernel-source-rt-5.14.21-150400.15.124.1.noarch",
            "SUSE Linux Enterprise Micro 5.4:kernel-rt-5.14.21-150400.15.124.1.x86_64",
            "SUSE Linux Enterprise Micro 5.4:kernel-source-rt-5.14.21-150400.15.124.1.noarch"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2025-07-15T14:31:46Z",
          "details": "moderate"
        }
      ],
      "title": "CVE-2022-50005"
    },
    {
      "cve": "CVE-2022-50006",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2022-50006"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "In the Linux kernel, the following vulnerability has been resolved:\n\nNFSv4.2 fix problems with __nfs42_ssc_open\n\nA destination server while doing a COPY shouldn\u0027t accept using the\npassed in filehandle if its not a regular filehandle.\n\nIf alloc_file_pseudo() has failed, we need to decrement a reference\non the newly created inode, otherwise it leaks.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "SUSE Linux Enterprise Micro 5.3:kernel-rt-5.14.21-150400.15.124.1.x86_64",
          "SUSE Linux Enterprise Micro 5.3:kernel-source-rt-5.14.21-150400.15.124.1.noarch",
          "SUSE Linux Enterprise Micro 5.4:kernel-rt-5.14.21-150400.15.124.1.x86_64",
          "SUSE Linux Enterprise Micro 5.4:kernel-source-rt-5.14.21-150400.15.124.1.noarch"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2022-50006",
          "url": "https://www.suse.com/security/cve/CVE-2022-50006"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1245018 for CVE-2022-50006",
          "url": "https://bugzilla.suse.com/1245018"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "SUSE Linux Enterprise Micro 5.3:kernel-rt-5.14.21-150400.15.124.1.x86_64",
            "SUSE Linux Enterprise Micro 5.3:kernel-source-rt-5.14.21-150400.15.124.1.noarch",
            "SUSE Linux Enterprise Micro 5.4:kernel-rt-5.14.21-150400.15.124.1.x86_64",
            "SUSE Linux Enterprise Micro 5.4:kernel-source-rt-5.14.21-150400.15.124.1.noarch"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 5.5,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
            "version": "3.1"
          },
          "products": [
            "SUSE Linux Enterprise Micro 5.3:kernel-rt-5.14.21-150400.15.124.1.x86_64",
            "SUSE Linux Enterprise Micro 5.3:kernel-source-rt-5.14.21-150400.15.124.1.noarch",
            "SUSE Linux Enterprise Micro 5.4:kernel-rt-5.14.21-150400.15.124.1.x86_64",
            "SUSE Linux Enterprise Micro 5.4:kernel-source-rt-5.14.21-150400.15.124.1.noarch"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2025-07-15T14:31:46Z",
          "details": "moderate"
        }
      ],
      "title": "CVE-2022-50006"
    },
    {
      "cve": "CVE-2022-50008",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2022-50008"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "In the Linux kernel, the following vulnerability has been resolved:\n\nkprobes: don\u0027t call disarm_kprobe() for disabled kprobes\n\nThe assumption in __disable_kprobe() is wrong, and it could try to disarm\nan already disarmed kprobe and fire the WARN_ONCE() below. [0]  We can\neasily reproduce this issue.\n\n1. Write 0 to /sys/kernel/debug/kprobes/enabled.\n\n  # echo 0 \u003e /sys/kernel/debug/kprobes/enabled\n\n2. Run execsnoop.  At this time, one kprobe is disabled.\n\n  # /usr/share/bcc/tools/execsnoop \u0026\n  [1] 2460\n  PCOMM            PID    PPID   RET ARGS\n\n  # cat /sys/kernel/debug/kprobes/list\n  ffffffff91345650  r  __x64_sys_execve+0x0    [FTRACE]\n  ffffffff91345650  k  __x64_sys_execve+0x0    [DISABLED][FTRACE]\n\n3. Write 1 to /sys/kernel/debug/kprobes/enabled, which changes\n   kprobes_all_disarmed to false but does not arm the disabled kprobe.\n\n  # echo 1 \u003e /sys/kernel/debug/kprobes/enabled\n\n  # cat /sys/kernel/debug/kprobes/list\n  ffffffff91345650  r  __x64_sys_execve+0x0    [FTRACE]\n  ffffffff91345650  k  __x64_sys_execve+0x0    [DISABLED][FTRACE]\n\n4. Kill execsnoop, when __disable_kprobe() calls disarm_kprobe() for the\n   disabled kprobe and hits the WARN_ONCE() in __disarm_kprobe_ftrace().\n\n  # fg\n  /usr/share/bcc/tools/execsnoop\n  ^C\n\nActually, WARN_ONCE() is fired twice, and __unregister_kprobe_top() misses\nsome cleanups and leaves the aggregated kprobe in the hash table.  Then,\n__unregister_trace_kprobe() initialises tk-\u003erp.kp.list and creates an\ninfinite loop like this.\n\n  aggregated kprobe.list -\u003e kprobe.list -.\n                                     ^    |\n                                     \u0027.__.\u0027\n\nIn this situation, these commands fall into the infinite loop and result\nin RCU stall or soft lockup.\n\n  cat /sys/kernel/debug/kprobes/list : show_kprobe_addr() enters into the\n                                       infinite loop with RCU.\n\n  /usr/share/bcc/tools/execsnoop : warn_kprobe_rereg() holds kprobe_mutex,\n                                   and __get_valid_kprobe() is stuck in\n\t\t\t\t   the loop.\n\nTo avoid the issue, make sure we don\u0027t call disarm_kprobe() for disabled\nkprobes.\n\n[0]\nFailed to disarm kprobe-ftrace at __x64_sys_execve+0x0/0x40 (error -2)\nWARNING: CPU: 6 PID: 2460 at kernel/kprobes.c:1130 __disarm_kprobe_ftrace.isra.19 (kernel/kprobes.c:1129)\nModules linked in: ena\nCPU: 6 PID: 2460 Comm: execsnoop Not tainted 5.19.0+ #28\nHardware name: Amazon EC2 c5.2xlarge/, BIOS 1.0 10/16/2017\nRIP: 0010:__disarm_kprobe_ftrace.isra.19 (kernel/kprobes.c:1129)\nCode: 24 8b 02 eb c1 80 3d c4 83 f2 01 00 75 d4 48 8b 75 00 89 c2 48 c7 c7 90 fa 0f 92 89 04 24 c6 05 ab 83 01 e8 e4 94 f0 ff \u003c0f\u003e 0b 8b 04 24 eb b1 89 c6 48 c7 c7 60 fa 0f 92 89 04 24 e8 cc 94\nRSP: 0018:ffff9e6ec154bd98 EFLAGS: 00010282\nRAX: 0000000000000000 RBX: ffffffff930f7b00 RCX: 0000000000000001\nRDX: 0000000080000001 RSI: ffffffff921461c5 RDI: 00000000ffffffff\nRBP: ffff89c504286da8 R08: 0000000000000000 R09: c0000000fffeffff\nR10: 0000000000000000 R11: ffff9e6ec154bc28 R12: ffff89c502394e40\nR13: ffff89c502394c00 R14: ffff9e6ec154bc00 R15: 0000000000000000\nFS:  00007fe800398740(0000) GS:ffff89c812d80000(0000) knlGS:0000000000000000\nCS:  0010 DS: 0000 ES: 0000 CR0: 0000000080050033\nCR2: 000000c00057f010 CR3: 0000000103b54006 CR4: 00000000007706e0\nDR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000\nDR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400\nPKRU: 55555554\nCall Trace:\n\u003cTASK\u003e\n __disable_kprobe (kernel/kprobes.c:1716)\n disable_kprobe (kernel/kprobes.c:2392)\n __disable_trace_kprobe (kernel/trace/trace_kprobe.c:340)\n disable_trace_kprobe (kernel/trace/trace_kprobe.c:429)\n perf_trace_event_unreg.isra.2 (./include/linux/tracepoint.h:93 kernel/trace/trace_event_perf.c:168)\n perf_kprobe_destroy (kernel/trace/trace_event_perf.c:295)\n _free_event (kernel/events/core.c:4971)\n perf_event_release_kernel (kernel/events/core.c:5176)\n perf_release (kernel/events/core.c:5186)\n __fput (fs/file_table.c:321)\n task_work_run (./include/linux/\n---truncated---",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "SUSE Linux Enterprise Micro 5.3:kernel-rt-5.14.21-150400.15.124.1.x86_64",
          "SUSE Linux Enterprise Micro 5.3:kernel-source-rt-5.14.21-150400.15.124.1.noarch",
          "SUSE Linux Enterprise Micro 5.4:kernel-rt-5.14.21-150400.15.124.1.x86_64",
          "SUSE Linux Enterprise Micro 5.4:kernel-source-rt-5.14.21-150400.15.124.1.noarch"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2022-50008",
          "url": "https://www.suse.com/security/cve/CVE-2022-50008"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1245009 for CVE-2022-50008",
          "url": "https://bugzilla.suse.com/1245009"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "SUSE Linux Enterprise Micro 5.3:kernel-rt-5.14.21-150400.15.124.1.x86_64",
            "SUSE Linux Enterprise Micro 5.3:kernel-source-rt-5.14.21-150400.15.124.1.noarch",
            "SUSE Linux Enterprise Micro 5.4:kernel-rt-5.14.21-150400.15.124.1.x86_64",
            "SUSE Linux Enterprise Micro 5.4:kernel-source-rt-5.14.21-150400.15.124.1.noarch"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 5.5,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
            "version": "3.1"
          },
          "products": [
            "SUSE Linux Enterprise Micro 5.3:kernel-rt-5.14.21-150400.15.124.1.x86_64",
            "SUSE Linux Enterprise Micro 5.3:kernel-source-rt-5.14.21-150400.15.124.1.noarch",
            "SUSE Linux Enterprise Micro 5.4:kernel-rt-5.14.21-150400.15.124.1.x86_64",
            "SUSE Linux Enterprise Micro 5.4:kernel-source-rt-5.14.21-150400.15.124.1.noarch"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2025-07-15T14:31:46Z",
          "details": "moderate"
        }
      ],
      "title": "CVE-2022-50008"
    },
    {
      "cve": "CVE-2022-50010",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2022-50010"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "In the Linux kernel, the following vulnerability has been resolved:\n\nvideo: fbdev: i740fb: Check the argument of i740_calc_vclk()\n\nSince the user can control the arguments of the ioctl() from the user\nspace, under special arguments that may result in a divide-by-zero bug.\n\nIf the user provides an improper \u0027pixclock\u0027 value that makes the argumet\nof i740_calc_vclk() less than \u0027I740_RFREQ_FIX\u0027, it will cause a\ndivide-by-zero bug in:\n    drivers/video/fbdev/i740fb.c:353 p_best = min(15, ilog2(I740_MAX_VCO_FREQ / (freq / I740_RFREQ_FIX)));\n\nThe following log can reveal it:\n\ndivide error: 0000 [#1] PREEMPT SMP KASAN PTI\nRIP: 0010:i740_calc_vclk drivers/video/fbdev/i740fb.c:353 [inline]\nRIP: 0010:i740fb_decode_var drivers/video/fbdev/i740fb.c:646 [inline]\nRIP: 0010:i740fb_set_par+0x163f/0x3b70 drivers/video/fbdev/i740fb.c:742\nCall Trace:\n fb_set_var+0x604/0xeb0 drivers/video/fbdev/core/fbmem.c:1034\n do_fb_ioctl+0x234/0x670 drivers/video/fbdev/core/fbmem.c:1110\n fb_ioctl+0xdd/0x130 drivers/video/fbdev/core/fbmem.c:1189\n\nFix this by checking the argument of i740_calc_vclk() first.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "SUSE Linux Enterprise Micro 5.3:kernel-rt-5.14.21-150400.15.124.1.x86_64",
          "SUSE Linux Enterprise Micro 5.3:kernel-source-rt-5.14.21-150400.15.124.1.noarch",
          "SUSE Linux Enterprise Micro 5.4:kernel-rt-5.14.21-150400.15.124.1.x86_64",
          "SUSE Linux Enterprise Micro 5.4:kernel-source-rt-5.14.21-150400.15.124.1.noarch"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2022-50010",
          "url": "https://www.suse.com/security/cve/CVE-2022-50010"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1245122 for CVE-2022-50010",
          "url": "https://bugzilla.suse.com/1245122"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "SUSE Linux Enterprise Micro 5.3:kernel-rt-5.14.21-150400.15.124.1.x86_64",
            "SUSE Linux Enterprise Micro 5.3:kernel-source-rt-5.14.21-150400.15.124.1.noarch",
            "SUSE Linux Enterprise Micro 5.4:kernel-rt-5.14.21-150400.15.124.1.x86_64",
            "SUSE Linux Enterprise Micro 5.4:kernel-source-rt-5.14.21-150400.15.124.1.noarch"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 5.5,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
            "version": "3.1"
          },
          "products": [
            "SUSE Linux Enterprise Micro 5.3:kernel-rt-5.14.21-150400.15.124.1.x86_64",
            "SUSE Linux Enterprise Micro 5.3:kernel-source-rt-5.14.21-150400.15.124.1.noarch",
            "SUSE Linux Enterprise Micro 5.4:kernel-rt-5.14.21-150400.15.124.1.x86_64",
            "SUSE Linux Enterprise Micro 5.4:kernel-source-rt-5.14.21-150400.15.124.1.noarch"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2025-07-15T14:31:46Z",
          "details": "moderate"
        }
      ],
      "title": "CVE-2022-50010"
    },
    {
      "cve": "CVE-2022-50011",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2022-50011"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "In the Linux kernel, the following vulnerability has been resolved:\n\nvenus: pm_helpers: Fix warning in OPP during probe\n\nFix the following WARN triggered during Venus driver probe on\n5.19.0-rc8-next-20220728:\n\n WARNING: CPU: 7 PID: 339 at drivers/opp/core.c:2471 dev_pm_opp_set_config+0x49c/0x610\n Modules linked in: qcom_spmi_adc5 rtc_pm8xxx qcom_spmi_adc_tm5 leds_qcom_lpg led_class_multicolor\n  qcom_pon qcom_vadc_common venus_core(+) qcom_spmi_temp_alarm v4l2_mem2mem videobuf2_v4l2 msm(+)\n  videobuf2_common crct10dif_ce spi_geni_qcom snd_soc_sm8250 i2c_qcom_geni gpu_sched\n  snd_soc_qcom_common videodev qcom_q6v5_pas soundwire_qcom drm_dp_aux_bus qcom_stats\n  drm_display_helper qcom_pil_info soundwire_bus snd_soc_lpass_va_macro mc qcom_q6v5\n  phy_qcom_snps_femto_v2 qcom_rng snd_soc_lpass_macro_common snd_soc_lpass_wsa_macro\n  lpass_gfm_sm8250 slimbus qcom_sysmon qcom_common qcom_glink_smem qmi_helpers\n  qcom_wdt mdt_loader socinfo icc_osm_l3 display_connector\n  drm_kms_helper qnoc_sm8250 drm fuse ip_tables x_tables ipv6\n CPU: 7 PID: 339 Comm: systemd-udevd Not tainted 5.19.0-rc8-next-20220728 #4\n Hardware name: Qualcomm Technologies, Inc. Robotics RB5 (DT)\n pstate: 80400005 (Nzcv daif +PAN -UAO -TCO -DIT -SSBS BTYPE=--)\n pc : dev_pm_opp_set_config+0x49c/0x610\n lr : dev_pm_opp_set_config+0x58/0x610\n sp : ffff8000093c3710\n x29: ffff8000093c3710 x28: ffffbca3959d82b8 x27: ffff8000093c3d00\n x26: ffffbca3959d8e08 x25: ffff4396cac98118 x24: ffff4396c0e24810\n x23: ffff4396c4272c40 x22: ffff4396c0e24810 x21: ffff8000093c3810\n x20: ffff4396cac36800 x19: ffff4396cac96800 x18: 0000000000000000\n x17: 0000000000000003 x16: ffffbca3f4edf198 x15: 0000001cba64a858\n x14: 0000000000000180 x13: 000000000000017e x12: 0000000000000000\n x11: 0000000000000002 x10: 0000000000000a60 x9 : ffff8000093c35c0\n x8 : ffff4396c4273700 x7 : ffff43983efca6c0 x6 : ffff43983efca640\n x5 : 00000000410fd0d0 x4 : ffff4396c4272c40 x3 : ffffbca3f5d1e008\n x2 : 0000000000000000 x1 : ffff4396c2421600 x0 : ffff4396cac96860\n Call trace:\n  dev_pm_opp_set_config+0x49c/0x610\n  devm_pm_opp_set_config+0x18/0x70\n  vcodec_domains_get+0xb8/0x1638 [venus_core]\n  core_get_v4+0x1d8/0x218 [venus_core]\n  venus_probe+0xf4/0x468 [venus_core]\n  platform_probe+0x68/0xd8\n  really_probe+0xbc/0x2a8\n  __driver_probe_device+0x78/0xe0\n  driver_probe_device+0x3c/0xf0\n  __driver_attach+0x70/0x120\n  bus_for_each_dev+0x70/0xc0\n  driver_attach+0x24/0x30\n  bus_add_driver+0x150/0x200\n  driver_register+0x64/0x120\n  __platform_driver_register+0x28/0x38\n  qcom_venus_driver_init+0x24/0x1000 [venus_core]\n  do_one_initcall+0x54/0x1c8\n  do_init_module+0x44/0x1d0\n  load_module+0x16c8/0x1aa0\n  __do_sys_finit_module+0xbc/0x110\n  __arm64_sys_finit_module+0x20/0x30\n  invoke_syscall+0x44/0x108\n  el0_svc_common.constprop.0+0xcc/0xf0\n  do_el0_svc+0x2c/0xb8\n  el0_svc+0x2c/0x88\n  el0t_64_sync_handler+0xb8/0xc0\n  el0t_64_sync+0x18c/0x190\n  qcom-venus: probe of aa00000.video-codec failed with error -16\n\nThe fix is re-ordering the code related to OPP core. The OPP core\nexpects all configuration options to be provided before the OPP\ntable is added.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "SUSE Linux Enterprise Micro 5.3:kernel-rt-5.14.21-150400.15.124.1.x86_64",
          "SUSE Linux Enterprise Micro 5.3:kernel-source-rt-5.14.21-150400.15.124.1.noarch",
          "SUSE Linux Enterprise Micro 5.4:kernel-rt-5.14.21-150400.15.124.1.x86_64",
          "SUSE Linux Enterprise Micro 5.4:kernel-source-rt-5.14.21-150400.15.124.1.noarch"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2022-50011",
          "url": "https://www.suse.com/security/cve/CVE-2022-50011"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1244915 for CVE-2022-50011",
          "url": "https://bugzilla.suse.com/1244915"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "SUSE Linux Enterprise Micro 5.3:kernel-rt-5.14.21-150400.15.124.1.x86_64",
            "SUSE Linux Enterprise Micro 5.3:kernel-source-rt-5.14.21-150400.15.124.1.noarch",
            "SUSE Linux Enterprise Micro 5.4:kernel-rt-5.14.21-150400.15.124.1.x86_64",
            "SUSE Linux Enterprise Micro 5.4:kernel-source-rt-5.14.21-150400.15.124.1.noarch"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 5.5,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
            "version": "3.1"
          },
          "products": [
            "SUSE Linux Enterprise Micro 5.3:kernel-rt-5.14.21-150400.15.124.1.x86_64",
            "SUSE Linux Enterprise Micro 5.3:kernel-source-rt-5.14.21-150400.15.124.1.noarch",
            "SUSE Linux Enterprise Micro 5.4:kernel-rt-5.14.21-150400.15.124.1.x86_64",
            "SUSE Linux Enterprise Micro 5.4:kernel-source-rt-5.14.21-150400.15.124.1.noarch"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2025-07-15T14:31:46Z",
          "details": "moderate"
        }
      ],
      "title": "CVE-2022-50011"
    },
    {
      "cve": "CVE-2022-50012",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2022-50012"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "In the Linux kernel, the following vulnerability has been resolved:\n\npowerpc/64: Init jump labels before parse_early_param()\n\nOn 64-bit, calling jump_label_init() in setup_feature_keys() is too\nlate because static keys may be used in subroutines of\nparse_early_param() which is again subroutine of early_init_devtree().\n\nFor example booting with \"threadirqs\":\n\n  static_key_enable_cpuslocked(): static key \u00270xc000000002953260\u0027 used before call to jump_label_init()\n  WARNING: CPU: 0 PID: 0 at kernel/jump_label.c:166 static_key_enable_cpuslocked+0xfc/0x120\n  ...\n  NIP static_key_enable_cpuslocked+0xfc/0x120\n  LR  static_key_enable_cpuslocked+0xf8/0x120\n  Call Trace:\n    static_key_enable_cpuslocked+0xf8/0x120 (unreliable)\n    static_key_enable+0x30/0x50\n    setup_forced_irqthreads+0x28/0x40\n    do_early_param+0xa0/0x108\n    parse_args+0x290/0x4e0\n    parse_early_options+0x48/0x5c\n    parse_early_param+0x58/0x84\n    early_init_devtree+0xd4/0x518\n    early_setup+0xb4/0x214\n\nSo call jump_label_init() just before parse_early_param() in\nearly_init_devtree().\n\n[mpe: Add call trace to change log and minor wording edits.]",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "SUSE Linux Enterprise Micro 5.3:kernel-rt-5.14.21-150400.15.124.1.x86_64",
          "SUSE Linux Enterprise Micro 5.3:kernel-source-rt-5.14.21-150400.15.124.1.noarch",
          "SUSE Linux Enterprise Micro 5.4:kernel-rt-5.14.21-150400.15.124.1.x86_64",
          "SUSE Linux Enterprise Micro 5.4:kernel-source-rt-5.14.21-150400.15.124.1.noarch"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2022-50012",
          "url": "https://www.suse.com/security/cve/CVE-2022-50012"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1245125 for CVE-2022-50012",
          "url": "https://bugzilla.suse.com/1245125"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "SUSE Linux Enterprise Micro 5.3:kernel-rt-5.14.21-150400.15.124.1.x86_64",
            "SUSE Linux Enterprise Micro 5.3:kernel-source-rt-5.14.21-150400.15.124.1.noarch",
            "SUSE Linux Enterprise Micro 5.4:kernel-rt-5.14.21-150400.15.124.1.x86_64",
            "SUSE Linux Enterprise Micro 5.4:kernel-source-rt-5.14.21-150400.15.124.1.noarch"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 5.5,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
            "version": "3.1"
          },
          "products": [
            "SUSE Linux Enterprise Micro 5.3:kernel-rt-5.14.21-150400.15.124.1.x86_64",
            "SUSE Linux Enterprise Micro 5.3:kernel-source-rt-5.14.21-150400.15.124.1.noarch",
            "SUSE Linux Enterprise Micro 5.4:kernel-rt-5.14.21-150400.15.124.1.x86_64",
            "SUSE Linux Enterprise Micro 5.4:kernel-source-rt-5.14.21-150400.15.124.1.noarch"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2025-07-15T14:31:46Z",
          "details": "moderate"
        }
      ],
      "title": "CVE-2022-50012"
    },
    {
      "cve": "CVE-2022-50019",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2022-50019"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "In the Linux kernel, the following vulnerability has been resolved:\n\ntty: serial: Fix refcount leak bug in ucc_uart.c\n\nIn soc_info(), of_find_node_by_type() will return a node pointer\nwith refcount incremented. We should use of_node_put() when it is\nnot used anymore.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "SUSE Linux Enterprise Micro 5.3:kernel-rt-5.14.21-150400.15.124.1.x86_64",
          "SUSE Linux Enterprise Micro 5.3:kernel-source-rt-5.14.21-150400.15.124.1.noarch",
          "SUSE Linux Enterprise Micro 5.4:kernel-rt-5.14.21-150400.15.124.1.x86_64",
          "SUSE Linux Enterprise Micro 5.4:kernel-source-rt-5.14.21-150400.15.124.1.noarch"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2022-50019",
          "url": "https://www.suse.com/security/cve/CVE-2022-50019"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1245098 for CVE-2022-50019",
          "url": "https://bugzilla.suse.com/1245098"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "SUSE Linux Enterprise Micro 5.3:kernel-rt-5.14.21-150400.15.124.1.x86_64",
            "SUSE Linux Enterprise Micro 5.3:kernel-source-rt-5.14.21-150400.15.124.1.noarch",
            "SUSE Linux Enterprise Micro 5.4:kernel-rt-5.14.21-150400.15.124.1.x86_64",
            "SUSE Linux Enterprise Micro 5.4:kernel-source-rt-5.14.21-150400.15.124.1.noarch"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 5.5,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
            "version": "3.1"
          },
          "products": [
            "SUSE Linux Enterprise Micro 5.3:kernel-rt-5.14.21-150400.15.124.1.x86_64",
            "SUSE Linux Enterprise Micro 5.3:kernel-source-rt-5.14.21-150400.15.124.1.noarch",
            "SUSE Linux Enterprise Micro 5.4:kernel-rt-5.14.21-150400.15.124.1.x86_64",
            "SUSE Linux Enterprise Micro 5.4:kernel-source-rt-5.14.21-150400.15.124.1.noarch"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2025-07-15T14:31:46Z",
          "details": "moderate"
        }
      ],
      "title": "CVE-2022-50019"
    },
    {
      "cve": "CVE-2022-50020",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2022-50020"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "In the Linux kernel, the following vulnerability has been resolved:\n\next4: avoid resizing to a partial cluster size\n\nThis patch avoids an attempt to resize the filesystem to an\nunaligned cluster boundary.  An online resize to a size that is not\nintegral to cluster size results in the last iteration attempting to\ngrow the fs by a negative amount, which trips a BUG_ON and leaves the fs\nwith a corrupted in-memory superblock.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "SUSE Linux Enterprise Micro 5.3:kernel-rt-5.14.21-150400.15.124.1.x86_64",
          "SUSE Linux Enterprise Micro 5.3:kernel-source-rt-5.14.21-150400.15.124.1.noarch",
          "SUSE Linux Enterprise Micro 5.4:kernel-rt-5.14.21-150400.15.124.1.x86_64",
          "SUSE Linux Enterprise Micro 5.4:kernel-source-rt-5.14.21-150400.15.124.1.noarch"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2022-50020",
          "url": "https://www.suse.com/security/cve/CVE-2022-50020"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1245129 for CVE-2022-50020",
          "url": "https://bugzilla.suse.com/1245129"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1245130 for CVE-2022-50020",
          "url": "https://bugzilla.suse.com/1245130"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "SUSE Linux Enterprise Micro 5.3:kernel-rt-5.14.21-150400.15.124.1.x86_64",
            "SUSE Linux Enterprise Micro 5.3:kernel-source-rt-5.14.21-150400.15.124.1.noarch",
            "SUSE Linux Enterprise Micro 5.4:kernel-rt-5.14.21-150400.15.124.1.x86_64",
            "SUSE Linux Enterprise Micro 5.4:kernel-source-rt-5.14.21-150400.15.124.1.noarch"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 6,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:H/A:H",
            "version": "3.1"
          },
          "products": [
            "SUSE Linux Enterprise Micro 5.3:kernel-rt-5.14.21-150400.15.124.1.x86_64",
            "SUSE Linux Enterprise Micro 5.3:kernel-source-rt-5.14.21-150400.15.124.1.noarch",
            "SUSE Linux Enterprise Micro 5.4:kernel-rt-5.14.21-150400.15.124.1.x86_64",
            "SUSE Linux Enterprise Micro 5.4:kernel-source-rt-5.14.21-150400.15.124.1.noarch"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2025-07-15T14:31:46Z",
          "details": "moderate"
        }
      ],
      "title": "CVE-2022-50020"
    },
    {
      "cve": "CVE-2022-50021",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2022-50021"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "In the Linux kernel, the following vulnerability has been resolved:\n\next4: block range must be validated before use in ext4_mb_clear_bb()\n\nBlock range to free is validated in ext4_free_blocks() using\next4_inode_block_valid() and then it\u0027s passed to ext4_mb_clear_bb().\nHowever in some situations on bigalloc file system the range might be\nadjusted after the validation in ext4_free_blocks() which can lead to\ntroubles on corrupted file systems such as one found by syzkaller that\nresulted in the following BUG\n\nkernel BUG at fs/ext4/ext4.h:3319!\nPREEMPT SMP NOPTI\nCPU: 28 PID: 4243 Comm: repro Kdump: loaded Not tainted 5.19.0-rc6+ #1\nHardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.15.0-1.fc35 04/01/2014\nRIP: 0010:ext4_free_blocks+0x95e/0xa90\nCall Trace:\n \u003cTASK\u003e\n ? lock_timer_base+0x61/0x80\n ? __es_remove_extent+0x5a/0x760\n ? __mod_timer+0x256/0x380\n ? ext4_ind_truncate_ensure_credits+0x90/0x220\n ext4_clear_blocks+0x107/0x1b0\n ext4_free_data+0x15b/0x170\n ext4_ind_truncate+0x214/0x2c0\n ? _raw_spin_unlock+0x15/0x30\n ? ext4_discard_preallocations+0x15a/0x410\n ? ext4_journal_check_start+0xe/0x90\n ? __ext4_journal_start_sb+0x2f/0x110\n ext4_truncate+0x1b5/0x460\n ? __ext4_journal_start_sb+0x2f/0x110\n ext4_evict_inode+0x2b4/0x6f0\n evict+0xd0/0x1d0\n ext4_enable_quotas+0x11f/0x1f0\n ext4_orphan_cleanup+0x3de/0x430\n ? proc_create_seq_private+0x43/0x50\n ext4_fill_super+0x295f/0x3ae0\n ? snprintf+0x39/0x40\n ? sget_fc+0x19c/0x330\n ? ext4_reconfigure+0x850/0x850\n get_tree_bdev+0x16d/0x260\n vfs_get_tree+0x25/0xb0\n path_mount+0x431/0xa70\n __x64_sys_mount+0xe2/0x120\n do_syscall_64+0x5b/0x80\n ? do_user_addr_fault+0x1e2/0x670\n ? exc_page_fault+0x70/0x170\n entry_SYSCALL_64_after_hwframe+0x46/0xb0\nRIP: 0033:0x7fdf4e512ace\n\nFix it by making sure that the block range is properly validated before\nused every time it changes in ext4_free_blocks() or ext4_mb_clear_bb().",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "SUSE Linux Enterprise Micro 5.3:kernel-rt-5.14.21-150400.15.124.1.x86_64",
          "SUSE Linux Enterprise Micro 5.3:kernel-source-rt-5.14.21-150400.15.124.1.noarch",
          "SUSE Linux Enterprise Micro 5.4:kernel-rt-5.14.21-150400.15.124.1.x86_64",
          "SUSE Linux Enterprise Micro 5.4:kernel-source-rt-5.14.21-150400.15.124.1.noarch"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2022-50021",
          "url": "https://www.suse.com/security/cve/CVE-2022-50021"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1245180 for CVE-2022-50021",
          "url": "https://bugzilla.suse.com/1245180"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "SUSE Linux Enterprise Micro 5.3:kernel-rt-5.14.21-150400.15.124.1.x86_64",
            "SUSE Linux Enterprise Micro 5.3:kernel-source-rt-5.14.21-150400.15.124.1.noarch",
            "SUSE Linux Enterprise Micro 5.4:kernel-rt-5.14.21-150400.15.124.1.x86_64",
            "SUSE Linux Enterprise Micro 5.4:kernel-source-rt-5.14.21-150400.15.124.1.noarch"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 6.1,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:H",
            "version": "3.1"
          },
          "products": [
            "SUSE Linux Enterprise Micro 5.3:kernel-rt-5.14.21-150400.15.124.1.x86_64",
            "SUSE Linux Enterprise Micro 5.3:kernel-source-rt-5.14.21-150400.15.124.1.noarch",
            "SUSE Linux Enterprise Micro 5.4:kernel-rt-5.14.21-150400.15.124.1.x86_64",
            "SUSE Linux Enterprise Micro 5.4:kernel-source-rt-5.14.21-150400.15.124.1.noarch"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2025-07-15T14:31:46Z",
          "details": "moderate"
        }
      ],
      "title": "CVE-2022-50021"
    },
    {
      "cve": "CVE-2022-50022",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2022-50022"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "In the Linux kernel, the following vulnerability has been resolved:\n\ndrivers:md:fix a potential use-after-free bug\n\nIn line 2884, \"raid5_release_stripe(sh);\" drops the reference to sh and\nmay cause sh to be released. However, sh is subsequently used in lines\n2886 \"if (sh-\u003ebatch_head \u0026\u0026 sh != sh-\u003ebatch_head)\". This may result in an\nuse-after-free bug.\n\nIt can be fixed by moving \"raid5_release_stripe(sh);\" to the bottom of\nthe function.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "SUSE Linux Enterprise Micro 5.3:kernel-rt-5.14.21-150400.15.124.1.x86_64",
          "SUSE Linux Enterprise Micro 5.3:kernel-source-rt-5.14.21-150400.15.124.1.noarch",
          "SUSE Linux Enterprise Micro 5.4:kernel-rt-5.14.21-150400.15.124.1.x86_64",
          "SUSE Linux Enterprise Micro 5.4:kernel-source-rt-5.14.21-150400.15.124.1.noarch"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2022-50022",
          "url": "https://www.suse.com/security/cve/CVE-2022-50022"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1245131 for CVE-2022-50022",
          "url": "https://bugzilla.suse.com/1245131"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "SUSE Linux Enterprise Micro 5.3:kernel-rt-5.14.21-150400.15.124.1.x86_64",
            "SUSE Linux Enterprise Micro 5.3:kernel-source-rt-5.14.21-150400.15.124.1.noarch",
            "SUSE Linux Enterprise Micro 5.4:kernel-rt-5.14.21-150400.15.124.1.x86_64",
            "SUSE Linux Enterprise Micro 5.4:kernel-source-rt-5.14.21-150400.15.124.1.noarch"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 6.6,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:H",
            "version": "3.1"
          },
          "products": [
            "SUSE Linux Enterprise Micro 5.3:kernel-rt-5.14.21-150400.15.124.1.x86_64",
            "SUSE Linux Enterprise Micro 5.3:kernel-source-rt-5.14.21-150400.15.124.1.noarch",
            "SUSE Linux Enterprise Micro 5.4:kernel-rt-5.14.21-150400.15.124.1.x86_64",
            "SUSE Linux Enterprise Micro 5.4:kernel-source-rt-5.14.21-150400.15.124.1.noarch"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2025-07-15T14:31:46Z",
          "details": "moderate"
        }
      ],
      "title": "CVE-2022-50022"
    },
    {
      "cve": "CVE-2022-50023",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2022-50023"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "In the Linux kernel, the following vulnerability has been resolved:\n\ndmaengine: dw-axi-dmac: ignore interrupt if no descriptor\n\nIf the channel has no descriptor and the interrupt is raised then the\nkernel will OOPS. Check the result of vchan_next_desc() in the handler\naxi_chan_block_xfer_complete() to avoid the error happening.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "SUSE Linux Enterprise Micro 5.3:kernel-rt-5.14.21-150400.15.124.1.x86_64",
          "SUSE Linux Enterprise Micro 5.3:kernel-source-rt-5.14.21-150400.15.124.1.noarch",
          "SUSE Linux Enterprise Micro 5.4:kernel-rt-5.14.21-150400.15.124.1.x86_64",
          "SUSE Linux Enterprise Micro 5.4:kernel-source-rt-5.14.21-150400.15.124.1.noarch"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2022-50023",
          "url": "https://www.suse.com/security/cve/CVE-2022-50023"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1245134 for CVE-2022-50023",
          "url": "https://bugzilla.suse.com/1245134"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "SUSE Linux Enterprise Micro 5.3:kernel-rt-5.14.21-150400.15.124.1.x86_64",
            "SUSE Linux Enterprise Micro 5.3:kernel-source-rt-5.14.21-150400.15.124.1.noarch",
            "SUSE Linux Enterprise Micro 5.4:kernel-rt-5.14.21-150400.15.124.1.x86_64",
            "SUSE Linux Enterprise Micro 5.4:kernel-source-rt-5.14.21-150400.15.124.1.noarch"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 5.5,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
            "version": "3.1"
          },
          "products": [
            "SUSE Linux Enterprise Micro 5.3:kernel-rt-5.14.21-150400.15.124.1.x86_64",
            "SUSE Linux Enterprise Micro 5.3:kernel-source-rt-5.14.21-150400.15.124.1.noarch",
            "SUSE Linux Enterprise Micro 5.4:kernel-rt-5.14.21-150400.15.124.1.x86_64",
            "SUSE Linux Enterprise Micro 5.4:kernel-source-rt-5.14.21-150400.15.124.1.noarch"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2025-07-15T14:31:46Z",
          "details": "moderate"
        }
      ],
      "title": "CVE-2022-50023"
    },
    {
      "cve": "CVE-2022-50024",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2022-50024"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "In the Linux kernel, the following vulnerability has been resolved:\n\ndmaengine: dw-axi-dmac: do not print NULL LLI during error\n\nDuring debugging we have seen an issue where axi_chan_dump_lli()\nis passed a NULL LLI pointer which ends up causing an OOPS due\nto trying to get fields from it. Simply print NULL LLI and exit\nto avoid this.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "SUSE Linux Enterprise Micro 5.3:kernel-rt-5.14.21-150400.15.124.1.x86_64",
          "SUSE Linux Enterprise Micro 5.3:kernel-source-rt-5.14.21-150400.15.124.1.noarch",
          "SUSE Linux Enterprise Micro 5.4:kernel-rt-5.14.21-150400.15.124.1.x86_64",
          "SUSE Linux Enterprise Micro 5.4:kernel-source-rt-5.14.21-150400.15.124.1.noarch"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2022-50024",
          "url": "https://www.suse.com/security/cve/CVE-2022-50024"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1245133 for CVE-2022-50024",
          "url": "https://bugzilla.suse.com/1245133"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "SUSE Linux Enterprise Micro 5.3:kernel-rt-5.14.21-150400.15.124.1.x86_64",
            "SUSE Linux Enterprise Micro 5.3:kernel-source-rt-5.14.21-150400.15.124.1.noarch",
            "SUSE Linux Enterprise Micro 5.4:kernel-rt-5.14.21-150400.15.124.1.x86_64",
            "SUSE Linux Enterprise Micro 5.4:kernel-source-rt-5.14.21-150400.15.124.1.noarch"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 5.5,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
            "version": "3.1"
          },
          "products": [
            "SUSE Linux Enterprise Micro 5.3:kernel-rt-5.14.21-150400.15.124.1.x86_64",
            "SUSE Linux Enterprise Micro 5.3:kernel-source-rt-5.14.21-150400.15.124.1.noarch",
            "SUSE Linux Enterprise Micro 5.4:kernel-rt-5.14.21-150400.15.124.1.x86_64",
            "SUSE Linux Enterprise Micro 5.4:kernel-source-rt-5.14.21-150400.15.124.1.noarch"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2025-07-15T14:31:46Z",
          "details": "moderate"
        }
      ],
      "title": "CVE-2022-50024"
    },
    {
      "cve": "CVE-2022-50026",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2022-50026"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "In the Linux kernel, the following vulnerability has been resolved:\n\nhabanalabs/gaudi: fix shift out of bounds\n\nWhen validating NIC queues, queue offset calculation must be\nperformed only for NIC queues.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "SUSE Linux Enterprise Micro 5.3:kernel-rt-5.14.21-150400.15.124.1.x86_64",
          "SUSE Linux Enterprise Micro 5.3:kernel-source-rt-5.14.21-150400.15.124.1.noarch",
          "SUSE Linux Enterprise Micro 5.4:kernel-rt-5.14.21-150400.15.124.1.x86_64",
          "SUSE Linux Enterprise Micro 5.4:kernel-source-rt-5.14.21-150400.15.124.1.noarch"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2022-50026",
          "url": "https://www.suse.com/security/cve/CVE-2022-50026"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1245088 for CVE-2022-50026",
          "url": "https://bugzilla.suse.com/1245088"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "SUSE Linux Enterprise Micro 5.3:kernel-rt-5.14.21-150400.15.124.1.x86_64",
            "SUSE Linux Enterprise Micro 5.3:kernel-source-rt-5.14.21-150400.15.124.1.noarch",
            "SUSE Linux Enterprise Micro 5.4:kernel-rt-5.14.21-150400.15.124.1.x86_64",
            "SUSE Linux Enterprise Micro 5.4:kernel-source-rt-5.14.21-150400.15.124.1.noarch"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 5.5,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
            "version": "3.1"
          },
          "products": [
            "SUSE Linux Enterprise Micro 5.3:kernel-rt-5.14.21-150400.15.124.1.x86_64",
            "SUSE Linux Enterprise Micro 5.3:kernel-source-rt-5.14.21-150400.15.124.1.noarch",
            "SUSE Linux Enterprise Micro 5.4:kernel-rt-5.14.21-150400.15.124.1.x86_64",
            "SUSE Linux Enterprise Micro 5.4:kernel-source-rt-5.14.21-150400.15.124.1.noarch"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2025-07-15T14:31:46Z",
          "details": "moderate"
        }
      ],
      "title": "CVE-2022-50026"
    },
    {
      "cve": "CVE-2022-50027",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2022-50027"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "In the Linux kernel, the following vulnerability has been resolved:\n\nscsi: lpfc: Fix possible memory leak when failing to issue CMF WQE\n\nThere is no corresponding free routine if lpfc_sli4_issue_wqe fails to\nissue the CMF WQE in lpfc_issue_cmf_sync_wqe.\n\nIf ret_val is non-zero, then free the iocbq request structure.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "SUSE Linux Enterprise Micro 5.3:kernel-rt-5.14.21-150400.15.124.1.x86_64",
          "SUSE Linux Enterprise Micro 5.3:kernel-source-rt-5.14.21-150400.15.124.1.noarch",
          "SUSE Linux Enterprise Micro 5.4:kernel-rt-5.14.21-150400.15.124.1.x86_64",
          "SUSE Linux Enterprise Micro 5.4:kernel-source-rt-5.14.21-150400.15.124.1.noarch"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2022-50027",
          "url": "https://www.suse.com/security/cve/CVE-2022-50027"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1245073 for CVE-2022-50027",
          "url": "https://bugzilla.suse.com/1245073"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "SUSE Linux Enterprise Micro 5.3:kernel-rt-5.14.21-150400.15.124.1.x86_64",
            "SUSE Linux Enterprise Micro 5.3:kernel-source-rt-5.14.21-150400.15.124.1.noarch",
            "SUSE Linux Enterprise Micro 5.4:kernel-rt-5.14.21-150400.15.124.1.x86_64",
            "SUSE Linux Enterprise Micro 5.4:kernel-source-rt-5.14.21-150400.15.124.1.noarch"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 5.5,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
            "version": "3.1"
          },
          "products": [
            "SUSE Linux Enterprise Micro 5.3:kernel-rt-5.14.21-150400.15.124.1.x86_64",
            "SUSE Linux Enterprise Micro 5.3:kernel-source-rt-5.14.21-150400.15.124.1.noarch",
            "SUSE Linux Enterprise Micro 5.4:kernel-rt-5.14.21-150400.15.124.1.x86_64",
            "SUSE Linux Enterprise Micro 5.4:kernel-source-rt-5.14.21-150400.15.124.1.noarch"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2025-07-15T14:31:46Z",
          "details": "moderate"
        }
      ],
      "title": "CVE-2022-50027"
    },
    {
      "cve": "CVE-2022-50028",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2022-50028"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "In the Linux kernel, the following vulnerability has been resolved:\n\ngadgetfs: ep_io - wait until IRQ finishes\n\nafter usb_ep_queue() if wait_for_completion_interruptible() is\ninterrupted we need to wait until IRQ gets finished.\n\nOtherwise complete() from epio_complete() can corrupt stack.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "SUSE Linux Enterprise Micro 5.3:kernel-rt-5.14.21-150400.15.124.1.x86_64",
          "SUSE Linux Enterprise Micro 5.3:kernel-source-rt-5.14.21-150400.15.124.1.noarch",
          "SUSE Linux Enterprise Micro 5.4:kernel-rt-5.14.21-150400.15.124.1.x86_64",
          "SUSE Linux Enterprise Micro 5.4:kernel-source-rt-5.14.21-150400.15.124.1.noarch"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2022-50028",
          "url": "https://www.suse.com/security/cve/CVE-2022-50028"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1245135 for CVE-2022-50028",
          "url": "https://bugzilla.suse.com/1245135"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "SUSE Linux Enterprise Micro 5.3:kernel-rt-5.14.21-150400.15.124.1.x86_64",
            "SUSE Linux Enterprise Micro 5.3:kernel-source-rt-5.14.21-150400.15.124.1.noarch",
            "SUSE Linux Enterprise Micro 5.4:kernel-rt-5.14.21-150400.15.124.1.x86_64",
            "SUSE Linux Enterprise Micro 5.4:kernel-source-rt-5.14.21-150400.15.124.1.noarch"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 6.1,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:H",
            "version": "3.1"
          },
          "products": [
            "SUSE Linux Enterprise Micro 5.3:kernel-rt-5.14.21-150400.15.124.1.x86_64",
            "SUSE Linux Enterprise Micro 5.3:kernel-source-rt-5.14.21-150400.15.124.1.noarch",
            "SUSE Linux Enterprise Micro 5.4:kernel-rt-5.14.21-150400.15.124.1.x86_64",
            "SUSE Linux Enterprise Micro 5.4:kernel-source-rt-5.14.21-150400.15.124.1.noarch"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2025-07-15T14:31:46Z",
          "details": "moderate"
        }
      ],
      "title": "CVE-2022-50028"
    },
    {
      "cve": "CVE-2022-50029",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2022-50029"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "In the Linux kernel, the following vulnerability has been resolved:\n\nclk: qcom: ipq8074: dont disable gcc_sleep_clk_src\n\nOnce the usb sleep clocks are disabled, clock framework is trying to\ndisable the sleep clock source also.\n\nHowever, it seems that it cannot be disabled and trying to do so produces:\n[  245.436390] ------------[ cut here ]------------\n[  245.441233] gcc_sleep_clk_src status stuck at \u0027on\u0027\n[  245.441254] WARNING: CPU: 2 PID: 223 at clk_branch_wait+0x130/0x140\n[  245.450435] Modules linked in: xhci_plat_hcd xhci_hcd dwc3 dwc3_qcom leds_gpio\n[  245.456601] CPU: 2 PID: 223 Comm: sh Not tainted 5.18.0-rc4 #215\n[  245.463889] Hardware name: Xiaomi AX9000 (DT)\n[  245.470050] pstate: 204000c5 (nzCv daIF +PAN -UAO -TCO -DIT -SSBS BTYPE=--)\n[  245.474307] pc : clk_branch_wait+0x130/0x140\n[  245.481073] lr : clk_branch_wait+0x130/0x140\n[  245.485588] sp : ffffffc009f2bad0\n[  245.489838] x29: ffffffc009f2bad0 x28: ffffff8003e6c800 x27: 0000000000000000\n[  245.493057] x26: 0000000000000000 x25: 0000000000000000 x24: ffffff800226ef20\n[  245.500175] x23: ffffffc0089ff550 x22: 0000000000000000 x21: ffffffc008476ad0\n[  245.507294] x20: 0000000000000000 x19: ffffffc00965ac70 x18: fffffffffffc51a7\n[  245.514413] x17: 68702e3030303837 x16: 3a6d726f6674616c x15: ffffffc089f2b777\n[  245.521531] x14: ffffffc0095c9d18 x13: 0000000000000129 x12: 0000000000000129\n[  245.528649] x11: 00000000ffffffea x10: ffffffc009621d18 x9 : 0000000000000001\n[  245.535767] x8 : 0000000000000001 x7 : 0000000000017fe8 x6 : 0000000000000001\n[  245.542885] x5 : ffffff803fdca6d8 x4 : 0000000000000000 x3 : 0000000000000027\n[  245.550002] x2 : 0000000000000027 x1 : 0000000000000023 x0 : 0000000000000026\n[  245.557122] Call trace:\n[  245.564229]  clk_branch_wait+0x130/0x140\n[  245.566490]  clk_branch2_disable+0x2c/0x40\n[  245.570656]  clk_core_disable+0x60/0xb0\n[  245.574561]  clk_core_disable+0x68/0xb0\n[  245.578293]  clk_disable+0x30/0x50\n[  245.582113]  dwc3_qcom_remove+0x60/0xc0 [dwc3_qcom]\n[  245.585588]  platform_remove+0x28/0x60\n[  245.590361]  device_remove+0x4c/0x80\n[  245.594179]  device_release_driver_internal+0x1dc/0x230\n[  245.597914]  device_driver_detach+0x18/0x30\n[  245.602861]  unbind_store+0xec/0x110\n[  245.607027]  drv_attr_store+0x24/0x40\n[  245.610847]  sysfs_kf_write+0x44/0x60\n[  245.614405]  kernfs_fop_write_iter+0x128/0x1c0\n[  245.618052]  new_sync_write+0xc0/0x130\n[  245.622391]  vfs_write+0x1d4/0x2a0\n[  245.626123]  ksys_write+0x58/0xe0\n[  245.629508]  __arm64_sys_write+0x1c/0x30\n[  245.632895]  invoke_syscall.constprop.0+0x5c/0x110\n[  245.636890]  do_el0_svc+0xa0/0x150\n[  245.641488]  el0_svc+0x18/0x60\n[  245.644872]  el0t_64_sync_handler+0xa4/0x130\n[  245.647914]  el0t_64_sync+0x174/0x178\n[  245.652340] ---[ end trace 0000000000000000 ]---\n\nSo, add CLK_IS_CRITICAL flag to the clock so that the kernel won\u0027t try\nto disable the sleep clock.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "SUSE Linux Enterprise Micro 5.3:kernel-rt-5.14.21-150400.15.124.1.x86_64",
          "SUSE Linux Enterprise Micro 5.3:kernel-source-rt-5.14.21-150400.15.124.1.noarch",
          "SUSE Linux Enterprise Micro 5.4:kernel-rt-5.14.21-150400.15.124.1.x86_64",
          "SUSE Linux Enterprise Micro 5.4:kernel-source-rt-5.14.21-150400.15.124.1.noarch"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2022-50029",
          "url": "https://www.suse.com/security/cve/CVE-2022-50029"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1245146 for CVE-2022-50029",
          "url": "https://bugzilla.suse.com/1245146"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "SUSE Linux Enterprise Micro 5.3:kernel-rt-5.14.21-150400.15.124.1.x86_64",
            "SUSE Linux Enterprise Micro 5.3:kernel-source-rt-5.14.21-150400.15.124.1.noarch",
            "SUSE Linux Enterprise Micro 5.4:kernel-rt-5.14.21-150400.15.124.1.x86_64",
            "SUSE Linux Enterprise Micro 5.4:kernel-source-rt-5.14.21-150400.15.124.1.noarch"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 5.5,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
            "version": "3.1"
          },
          "products": [
            "SUSE Linux Enterprise Micro 5.3:kernel-rt-5.14.21-150400.15.124.1.x86_64",
            "SUSE Linux Enterprise Micro 5.3:kernel-source-rt-5.14.21-150400.15.124.1.noarch",
            "SUSE Linux Enterprise Micro 5.4:kernel-rt-5.14.21-150400.15.124.1.x86_64",
            "SUSE Linux Enterprise Micro 5.4:kernel-source-rt-5.14.21-150400.15.124.1.noarch"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2025-07-15T14:31:46Z",
          "details": "moderate"
        }
      ],
      "title": "CVE-2022-50029"
    },
    {
      "cve": "CVE-2022-50030",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2022-50030"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "In the Linux kernel, the following vulnerability has been resolved:\n\nscsi: lpfc: Prevent buffer overflow crashes in debugfs with malformed user input\n\nMalformed user input to debugfs results in buffer overflow crashes.  Adapt\ninput string lengths to fit within internal buffers, leaving space for NULL\nterminators.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "SUSE Linux Enterprise Micro 5.3:kernel-rt-5.14.21-150400.15.124.1.x86_64",
          "SUSE Linux Enterprise Micro 5.3:kernel-source-rt-5.14.21-150400.15.124.1.noarch",
          "SUSE Linux Enterprise Micro 5.4:kernel-rt-5.14.21-150400.15.124.1.x86_64",
          "SUSE Linux Enterprise Micro 5.4:kernel-source-rt-5.14.21-150400.15.124.1.noarch"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2022-50030",
          "url": "https://www.suse.com/security/cve/CVE-2022-50030"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1245265 for CVE-2022-50030",
          "url": "https://bugzilla.suse.com/1245265"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "SUSE Linux Enterprise Micro 5.3:kernel-rt-5.14.21-150400.15.124.1.x86_64",
            "SUSE Linux Enterprise Micro 5.3:kernel-source-rt-5.14.21-150400.15.124.1.noarch",
            "SUSE Linux Enterprise Micro 5.4:kernel-rt-5.14.21-150400.15.124.1.x86_64",
            "SUSE Linux Enterprise Micro 5.4:kernel-source-rt-5.14.21-150400.15.124.1.noarch"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 6.4,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H",
            "version": "3.1"
          },
          "products": [
            "SUSE Linux Enterprise Micro 5.3:kernel-rt-5.14.21-150400.15.124.1.x86_64",
            "SUSE Linux Enterprise Micro 5.3:kernel-source-rt-5.14.21-150400.15.124.1.noarch",
            "SUSE Linux Enterprise Micro 5.4:kernel-rt-5.14.21-150400.15.124.1.x86_64",
            "SUSE Linux Enterprise Micro 5.4:kernel-source-rt-5.14.21-150400.15.124.1.noarch"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2025-07-15T14:31:46Z",
          "details": "important"
        }
      ],
      "title": "CVE-2022-50030"
    },
    {
      "cve": "CVE-2022-50031",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2022-50031"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "In the Linux kernel, the following vulnerability has been resolved:\n\nscsi: iscsi: Fix HW conn removal use after free\n\nIf qla4xxx doesn\u0027t remove the connection before the session, the iSCSI\nclass tries to remove the connection for it. We were doing a\niscsi_put_conn() in the iter function which is not needed and will result\nin a use after free because iscsi_remove_conn() will free the connection.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "SUSE Linux Enterprise Micro 5.3:kernel-rt-5.14.21-150400.15.124.1.x86_64",
          "SUSE Linux Enterprise Micro 5.3:kernel-source-rt-5.14.21-150400.15.124.1.noarch",
          "SUSE Linux Enterprise Micro 5.4:kernel-rt-5.14.21-150400.15.124.1.x86_64",
          "SUSE Linux Enterprise Micro 5.4:kernel-source-rt-5.14.21-150400.15.124.1.noarch"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2022-50031",
          "url": "https://www.suse.com/security/cve/CVE-2022-50031"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1245118 for CVE-2022-50031",
          "url": "https://bugzilla.suse.com/1245118"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "SUSE Linux Enterprise Micro 5.3:kernel-rt-5.14.21-150400.15.124.1.x86_64",
            "SUSE Linux Enterprise Micro 5.3:kernel-source-rt-5.14.21-150400.15.124.1.noarch",
            "SUSE Linux Enterprise Micro 5.4:kernel-rt-5.14.21-150400.15.124.1.x86_64",
            "SUSE Linux Enterprise Micro 5.4:kernel-source-rt-5.14.21-150400.15.124.1.noarch"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 5.5,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
            "version": "3.1"
          },
          "products": [
            "SUSE Linux Enterprise Micro 5.3:kernel-rt-5.14.21-150400.15.124.1.x86_64",
            "SUSE Linux Enterprise Micro 5.3:kernel-source-rt-5.14.21-150400.15.124.1.noarch",
            "SUSE Linux Enterprise Micro 5.4:kernel-rt-5.14.21-150400.15.124.1.x86_64",
            "SUSE Linux Enterprise Micro 5.4:kernel-source-rt-5.14.21-150400.15.124.1.noarch"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2025-07-15T14:31:46Z",
          "details": "moderate"
        }
      ],
      "title": "CVE-2022-50031"
    },
    {
      "cve": "CVE-2022-50032",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2022-50032"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "In the Linux kernel, the following vulnerability has been resolved:\n\nusb: renesas: Fix refcount leak bug\n\nIn usbhs_rza1_hardware_init(), of_find_node_by_name() will return\na node pointer with refcount incremented. We should use of_node_put()\nwhen it is not used anymore.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "SUSE Linux Enterprise Micro 5.3:kernel-rt-5.14.21-150400.15.124.1.x86_64",
          "SUSE Linux Enterprise Micro 5.3:kernel-source-rt-5.14.21-150400.15.124.1.noarch",
          "SUSE Linux Enterprise Micro 5.4:kernel-rt-5.14.21-150400.15.124.1.x86_64",
          "SUSE Linux Enterprise Micro 5.4:kernel-source-rt-5.14.21-150400.15.124.1.noarch"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2022-50032",
          "url": "https://www.suse.com/security/cve/CVE-2022-50032"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1245103 for CVE-2022-50032",
          "url": "https://bugzilla.suse.com/1245103"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "SUSE Linux Enterprise Micro 5.3:kernel-rt-5.14.21-150400.15.124.1.x86_64",
            "SUSE Linux Enterprise Micro 5.3:kernel-source-rt-5.14.21-150400.15.124.1.noarch",
            "SUSE Linux Enterprise Micro 5.4:kernel-rt-5.14.21-150400.15.124.1.x86_64",
            "SUSE Linux Enterprise Micro 5.4:kernel-source-rt-5.14.21-150400.15.124.1.noarch"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 5.5,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
            "version": "3.1"
          },
          "products": [
            "SUSE Linux Enterprise Micro 5.3:kernel-rt-5.14.21-150400.15.124.1.x86_64",
            "SUSE Linux Enterprise Micro 5.3:kernel-source-rt-5.14.21-150400.15.124.1.noarch",
            "SUSE Linux Enterprise Micro 5.4:kernel-rt-5.14.21-150400.15.124.1.x86_64",
            "SUSE Linux Enterprise Micro 5.4:kernel-source-rt-5.14.21-150400.15.124.1.noarch"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2025-07-15T14:31:46Z",
          "details": "moderate"
        }
      ],
      "title": "CVE-2022-50032"
    },
    {
      "cve": "CVE-2022-50033",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2022-50033"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "In the Linux kernel, the following vulnerability has been resolved:\n\nusb: host: ohci-ppc-of: Fix refcount leak bug\n\nIn ohci_hcd_ppc_of_probe(), of_find_compatible_node() will return\na node pointer with refcount incremented. We should use of_node_put()\nwhen it is not used anymore.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "SUSE Linux Enterprise Micro 5.3:kernel-rt-5.14.21-150400.15.124.1.x86_64",
          "SUSE Linux Enterprise Micro 5.3:kernel-source-rt-5.14.21-150400.15.124.1.noarch",
          "SUSE Linux Enterprise Micro 5.4:kernel-rt-5.14.21-150400.15.124.1.x86_64",
          "SUSE Linux Enterprise Micro 5.4:kernel-source-rt-5.14.21-150400.15.124.1.noarch"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2022-50033",
          "url": "https://www.suse.com/security/cve/CVE-2022-50033"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1245139 for CVE-2022-50033",
          "url": "https://bugzilla.suse.com/1245139"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "SUSE Linux Enterprise Micro 5.3:kernel-rt-5.14.21-150400.15.124.1.x86_64",
            "SUSE Linux Enterprise Micro 5.3:kernel-source-rt-5.14.21-150400.15.124.1.noarch",
            "SUSE Linux Enterprise Micro 5.4:kernel-rt-5.14.21-150400.15.124.1.x86_64",
            "SUSE Linux Enterprise Micro 5.4:kernel-source-rt-5.14.21-150400.15.124.1.noarch"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 5.5,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
            "version": "3.1"
          },
          "products": [
            "SUSE Linux Enterprise Micro 5.3:kernel-rt-5.14.21-150400.15.124.1.x86_64",
            "SUSE Linux Enterprise Micro 5.3:kernel-source-rt-5.14.21-150400.15.124.1.noarch",
            "SUSE Linux Enterprise Micro 5.4:kernel-rt-5.14.21-150400.15.124.1.x86_64",
            "SUSE Linux Enterprise Micro 5.4:kernel-source-rt-5.14.21-150400.15.124.1.noarch"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2025-07-15T14:31:46Z",
          "details": "moderate"
        }
      ],
      "title": "CVE-2022-50033"
    },
    {
      "cve": "CVE-2022-50034",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2022-50034"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "In the Linux kernel, the following vulnerability has been resolved:\n\nusb: cdns3 fix use-after-free at workaround 2\n\nBUG: KFENCE: use-after-free read in __list_del_entry_valid+0x10/0xac\n\ncdns3_wa2_remove_old_request()\n{\n\t...\n\tkfree(priv_req-\u003erequest.buf);\n\tcdns3_gadget_ep_free_request(\u0026priv_ep-\u003eendpoint, \u0026priv_req-\u003erequest);\n\tlist_del_init(\u0026priv_req-\u003elist);\n\t^^^ use after free\n\t...\n}\n\ncdns3_gadget_ep_free_request() free the space pointed by priv_req,\nbut priv_req is used in the following list_del_init().\n\nThis patch move list_del_init() before cdns3_gadget_ep_free_request().",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "SUSE Linux Enterprise Micro 5.3:kernel-rt-5.14.21-150400.15.124.1.x86_64",
          "SUSE Linux Enterprise Micro 5.3:kernel-source-rt-5.14.21-150400.15.124.1.noarch",
          "SUSE Linux Enterprise Micro 5.4:kernel-rt-5.14.21-150400.15.124.1.x86_64",
          "SUSE Linux Enterprise Micro 5.4:kernel-source-rt-5.14.21-150400.15.124.1.noarch"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2022-50034",
          "url": "https://www.suse.com/security/cve/CVE-2022-50034"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1245089 for CVE-2022-50034",
          "url": "https://bugzilla.suse.com/1245089"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "SUSE Linux Enterprise Micro 5.3:kernel-rt-5.14.21-150400.15.124.1.x86_64",
            "SUSE Linux Enterprise Micro 5.3:kernel-source-rt-5.14.21-150400.15.124.1.noarch",
            "SUSE Linux Enterprise Micro 5.4:kernel-rt-5.14.21-150400.15.124.1.x86_64",
            "SUSE Linux Enterprise Micro 5.4:kernel-source-rt-5.14.21-150400.15.124.1.noarch"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 5.5,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
            "version": "3.1"
          },
          "products": [
            "SUSE Linux Enterprise Micro 5.3:kernel-rt-5.14.21-150400.15.124.1.x86_64",
            "SUSE Linux Enterprise Micro 5.3:kernel-source-rt-5.14.21-150400.15.124.1.noarch",
            "SUSE Linux Enterprise Micro 5.4:kernel-rt-5.14.21-150400.15.124.1.x86_64",
            "SUSE Linux Enterprise Micro 5.4:kernel-source-rt-5.14.21-150400.15.124.1.noarch"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2025-07-15T14:31:46Z",
          "details": "moderate"
        }
      ],
      "title": "CVE-2022-50034"
    },
    {
      "cve": "CVE-2022-50036",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2022-50036"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "In the Linux kernel, the following vulnerability has been resolved:\n\ndrm/sun4i: dsi: Prevent underflow when computing packet sizes\n\nCurrently, the packet overhead is subtracted using unsigned arithmetic.\nWith a short sync pulse, this could underflow and wrap around to near\nthe maximal u16 value. Fix this by using signed subtraction. The call to\nmax() will correctly handle any negative numbers that are produced.\n\nApply the same fix to the other timings, even though those subtractions\nare less likely to underflow.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "SUSE Linux Enterprise Micro 5.3:kernel-rt-5.14.21-150400.15.124.1.x86_64",
          "SUSE Linux Enterprise Micro 5.3:kernel-source-rt-5.14.21-150400.15.124.1.noarch",
          "SUSE Linux Enterprise Micro 5.4:kernel-rt-5.14.21-150400.15.124.1.x86_64",
          "SUSE Linux Enterprise Micro 5.4:kernel-source-rt-5.14.21-150400.15.124.1.noarch"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2022-50036",
          "url": "https://www.suse.com/security/cve/CVE-2022-50036"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1244941 for CVE-2022-50036",
          "url": "https://bugzilla.suse.com/1244941"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "SUSE Linux Enterprise Micro 5.3:kernel-rt-5.14.21-150400.15.124.1.x86_64",
            "SUSE Linux Enterprise Micro 5.3:kernel-source-rt-5.14.21-150400.15.124.1.noarch",
            "SUSE Linux Enterprise Micro 5.4:kernel-rt-5.14.21-150400.15.124.1.x86_64",
            "SUSE Linux Enterprise Micro 5.4:kernel-source-rt-5.14.21-150400.15.124.1.noarch"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 5.5,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
            "version": "3.1"
          },
          "products": [
            "SUSE Linux Enterprise Micro 5.3:kernel-rt-5.14.21-150400.15.124.1.x86_64",
            "SUSE Linux Enterprise Micro 5.3:kernel-source-rt-5.14.21-150400.15.124.1.noarch",
            "SUSE Linux Enterprise Micro 5.4:kernel-rt-5.14.21-150400.15.124.1.x86_64",
            "SUSE Linux Enterprise Micro 5.4:kernel-source-rt-5.14.21-150400.15.124.1.noarch"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2025-07-15T14:31:46Z",
          "details": "moderate"
        }
      ],
      "title": "CVE-2022-50036"
    },
    {
      "cve": "CVE-2022-50038",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2022-50038"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "In the Linux kernel, the following vulnerability has been resolved:\n\ndrm/meson: Fix refcount bugs in meson_vpu_has_available_connectors()\n\nIn this function, there are two refcount leak bugs:\n(1) when breaking out of for_each_endpoint_of_node(), we need call\nthe of_node_put() for the \u0027ep\u0027;\n(2) we should call of_node_put() for the reference returned by\nof_graph_get_remote_port() when it is not used anymore.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "SUSE Linux Enterprise Micro 5.3:kernel-rt-5.14.21-150400.15.124.1.x86_64",
          "SUSE Linux Enterprise Micro 5.3:kernel-source-rt-5.14.21-150400.15.124.1.noarch",
          "SUSE Linux Enterprise Micro 5.4:kernel-rt-5.14.21-150400.15.124.1.x86_64",
          "SUSE Linux Enterprise Micro 5.4:kernel-source-rt-5.14.21-150400.15.124.1.noarch"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2022-50038",
          "url": "https://www.suse.com/security/cve/CVE-2022-50038"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1244943 for CVE-2022-50038",
          "url": "https://bugzilla.suse.com/1244943"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "SUSE Linux Enterprise Micro 5.3:kernel-rt-5.14.21-150400.15.124.1.x86_64",
            "SUSE Linux Enterprise Micro 5.3:kernel-source-rt-5.14.21-150400.15.124.1.noarch",
            "SUSE Linux Enterprise Micro 5.4:kernel-rt-5.14.21-150400.15.124.1.x86_64",
            "SUSE Linux Enterprise Micro 5.4:kernel-source-rt-5.14.21-150400.15.124.1.noarch"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 5.5,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
            "version": "3.1"
          },
          "products": [
            "SUSE Linux Enterprise Micro 5.3:kernel-rt-5.14.21-150400.15.124.1.x86_64",
            "SUSE Linux Enterprise Micro 5.3:kernel-source-rt-5.14.21-150400.15.124.1.noarch",
            "SUSE Linux Enterprise Micro 5.4:kernel-rt-5.14.21-150400.15.124.1.x86_64",
            "SUSE Linux Enterprise Micro 5.4:kernel-source-rt-5.14.21-150400.15.124.1.noarch"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2025-07-15T14:31:46Z",
          "details": "moderate"
        }
      ],
      "title": "CVE-2022-50038"
    },
    {
      "cve": "CVE-2022-50039",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2022-50039"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "In the Linux kernel, the following vulnerability has been resolved:\n\nstmmac: intel: Add a missing clk_disable_unprepare() call in intel_eth_pci_remove()\n\nCommit 09f012e64e4b (\"stmmac: intel: Fix clock handling on error and remove\npaths\") removed this clk_disable_unprepare()\n\nThis was partly revert by commit ac322f86b56c (\"net: stmmac: Fix clock\nhandling on remove path\") which removed this clk_disable_unprepare()\nbecause:\n\"\n   While unloading the dwmac-intel driver, clk_disable_unprepare() is\n   being called twice in stmmac_dvr_remove() and\n   intel_eth_pci_remove(). This causes kernel panic on the second call.\n\"\n\nHowever later on, commit 5ec55823438e8 (\"net: stmmac: add clocks management\nfor gmac driver\") has updated stmmac_dvr_remove() which do not call\nclk_disable_unprepare() anymore.\n\nSo this call should now be called from intel_eth_pci_remove().",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "SUSE Linux Enterprise Micro 5.3:kernel-rt-5.14.21-150400.15.124.1.x86_64",
          "SUSE Linux Enterprise Micro 5.3:kernel-source-rt-5.14.21-150400.15.124.1.noarch",
          "SUSE Linux Enterprise Micro 5.4:kernel-rt-5.14.21-150400.15.124.1.x86_64",
          "SUSE Linux Enterprise Micro 5.4:kernel-source-rt-5.14.21-150400.15.124.1.noarch"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2022-50039",
          "url": "https://www.suse.com/security/cve/CVE-2022-50039"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1244942 for CVE-2022-50039",
          "url": "https://bugzilla.suse.com/1244942"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "SUSE Linux Enterprise Micro 5.3:kernel-rt-5.14.21-150400.15.124.1.x86_64",
            "SUSE Linux Enterprise Micro 5.3:kernel-source-rt-5.14.21-150400.15.124.1.noarch",
            "SUSE Linux Enterprise Micro 5.4:kernel-rt-5.14.21-150400.15.124.1.x86_64",
            "SUSE Linux Enterprise Micro 5.4:kernel-source-rt-5.14.21-150400.15.124.1.noarch"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 5.5,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
            "version": "3.1"
          },
          "products": [
            "SUSE Linux Enterprise Micro 5.3:kernel-rt-5.14.21-150400.15.124.1.x86_64",
            "SUSE Linux Enterprise Micro 5.3:kernel-source-rt-5.14.21-150400.15.124.1.noarch",
            "SUSE Linux Enterprise Micro 5.4:kernel-rt-5.14.21-150400.15.124.1.x86_64",
            "SUSE Linux Enterprise Micro 5.4:kernel-source-rt-5.14.21-150400.15.124.1.noarch"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2025-07-15T14:31:46Z",
          "details": "moderate"
        }
      ],
      "title": "CVE-2022-50039"
    },
    {
      "cve": "CVE-2022-50040",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2022-50040"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "In the Linux kernel, the following vulnerability has been resolved:\n\nnet: dsa: sja1105: fix buffer overflow in sja1105_setup_devlink_regions()\n\nIf an error occurs in dsa_devlink_region_create(), then \u0027priv-\u003eregions\u0027\narray will be accessed by negative index \u0027-1\u0027.\n\nFound by Linux Verification Center (linuxtesting.org) with SVACE.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "SUSE Linux Enterprise Micro 5.3:kernel-rt-5.14.21-150400.15.124.1.x86_64",
          "SUSE Linux Enterprise Micro 5.3:kernel-source-rt-5.14.21-150400.15.124.1.noarch",
          "SUSE Linux Enterprise Micro 5.4:kernel-rt-5.14.21-150400.15.124.1.x86_64",
          "SUSE Linux Enterprise Micro 5.4:kernel-source-rt-5.14.21-150400.15.124.1.noarch"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2022-50040",
          "url": "https://www.suse.com/security/cve/CVE-2022-50040"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1244949 for CVE-2022-50040",
          "url": "https://bugzilla.suse.com/1244949"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "SUSE Linux Enterprise Micro 5.3:kernel-rt-5.14.21-150400.15.124.1.x86_64",
            "SUSE Linux Enterprise Micro 5.3:kernel-source-rt-5.14.21-150400.15.124.1.noarch",
            "SUSE Linux Enterprise Micro 5.4:kernel-rt-5.14.21-150400.15.124.1.x86_64",
            "SUSE Linux Enterprise Micro 5.4:kernel-source-rt-5.14.21-150400.15.124.1.noarch"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 5.5,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
            "version": "3.1"
          },
          "products": [
            "SUSE Linux Enterprise Micro 5.3:kernel-rt-5.14.21-150400.15.124.1.x86_64",
            "SUSE Linux Enterprise Micro 5.3:kernel-source-rt-5.14.21-150400.15.124.1.noarch",
            "SUSE Linux Enterprise Micro 5.4:kernel-rt-5.14.21-150400.15.124.1.x86_64",
            "SUSE Linux Enterprise Micro 5.4:kernel-source-rt-5.14.21-150400.15.124.1.noarch"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2025-07-15T14:31:46Z",
          "details": "moderate"
        }
      ],
      "title": "CVE-2022-50040"
    },
    {
      "cve": "CVE-2022-50045",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2022-50045"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "In the Linux kernel, the following vulnerability has been resolved:\n\npowerpc/pci: Fix get_phb_number() locking\n\nThe recent change to get_phb_number() causes a DEBUG_ATOMIC_SLEEP\nwarning on some systems:\n\n  BUG: sleeping function called from invalid context at kernel/locking/mutex.c:580\n  in_atomic(): 1, irqs_disabled(): 0, non_block: 0, pid: 1, name: swapper\n  preempt_count: 1, expected: 0\n  RCU nest depth: 0, expected: 0\n  1 lock held by swapper/1:\n   #0: c157efb0 (hose_spinlock){+.+.}-{2:2}, at: pcibios_alloc_controller+0x64/0x220\n  Preemption disabled at:\n  [\u003c00000000\u003e] 0x0\n  CPU: 0 PID: 1 Comm: swapper Not tainted 5.19.0-yocto-standard+ #1\n  Call Trace:\n  [d101dc90] [c073b264] dump_stack_lvl+0x50/0x8c (unreliable)\n  [d101dcb0] [c0093b70] __might_resched+0x258/0x2a8\n  [d101dcd0] [c0d3e634] __mutex_lock+0x6c/0x6ec\n  [d101dd50] [c0a84174] of_alias_get_id+0x50/0xf4\n  [d101dd80] [c002ec78] pcibios_alloc_controller+0x1b8/0x220\n  [d101ddd0] [c140c9dc] pmac_pci_init+0x198/0x784\n  [d101de50] [c140852c] discover_phbs+0x30/0x4c\n  [d101de60] [c0007fd4] do_one_initcall+0x94/0x344\n  [d101ded0] [c1403b40] kernel_init_freeable+0x1a8/0x22c\n  [d101df10] [c00086e0] kernel_init+0x34/0x160\n  [d101df30] [c001b334] ret_from_kernel_thread+0x5c/0x64\n\nThis is because pcibios_alloc_controller() holds hose_spinlock but\nof_alias_get_id() takes of_mutex which can sleep.\n\nThe hose_spinlock protects the phb_bitmap, and also the hose_list, but\nit doesn\u0027t need to be held while get_phb_number() calls the OF routines,\nbecause those are only looking up information in the device tree.\n\nSo fix it by having get_phb_number() take the hose_spinlock itself, only\nwhere required, and then dropping the lock before returning.\npcibios_alloc_controller() then needs to take the lock again before the\nlist_add() but that\u0027s safe, the order of the list is not important.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "SUSE Linux Enterprise Micro 5.3:kernel-rt-5.14.21-150400.15.124.1.x86_64",
          "SUSE Linux Enterprise Micro 5.3:kernel-source-rt-5.14.21-150400.15.124.1.noarch",
          "SUSE Linux Enterprise Micro 5.4:kernel-rt-5.14.21-150400.15.124.1.x86_64",
          "SUSE Linux Enterprise Micro 5.4:kernel-source-rt-5.14.21-150400.15.124.1.noarch"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2022-50045",
          "url": "https://www.suse.com/security/cve/CVE-2022-50045"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1244967 for CVE-2022-50045",
          "url": "https://bugzilla.suse.com/1244967"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "SUSE Linux Enterprise Micro 5.3:kernel-rt-5.14.21-150400.15.124.1.x86_64",
            "SUSE Linux Enterprise Micro 5.3:kernel-source-rt-5.14.21-150400.15.124.1.noarch",
            "SUSE Linux Enterprise Micro 5.4:kernel-rt-5.14.21-150400.15.124.1.x86_64",
            "SUSE Linux Enterprise Micro 5.4:kernel-source-rt-5.14.21-150400.15.124.1.noarch"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 5.5,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
            "version": "3.1"
          },
          "products": [
            "SUSE Linux Enterprise Micro 5.3:kernel-rt-5.14.21-150400.15.124.1.x86_64",
            "SUSE Linux Enterprise Micro 5.3:kernel-source-rt-5.14.21-150400.15.124.1.noarch",
            "SUSE Linux Enterprise Micro 5.4:kernel-rt-5.14.21-150400.15.124.1.x86_64",
            "SUSE Linux Enterprise Micro 5.4:kernel-source-rt-5.14.21-150400.15.124.1.noarch"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2025-07-15T14:31:46Z",
          "details": "moderate"
        }
      ],
      "title": "CVE-2022-50045"
    },
    {
      "cve": "CVE-2022-50046",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2022-50046"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "In the Linux kernel, the following vulnerability has been resolved:\n\nnet/sunrpc: fix potential memory leaks in rpc_sysfs_xprt_state_change()\n\nThe issue happens on some error handling paths. When the function\nfails to grab the object `xprt`, it simply returns 0, forgetting to\ndecrease the reference count of another object `xps`, which is\nincreased by rpc_sysfs_xprt_kobj_get_xprt_switch(), causing refcount\nleaks. Also, the function forgets to check whether `xps` is valid\nbefore using it, which may result in NULL-dereferencing issues.\n\nFix it by adding proper error handling code when either `xprt` or\n`xps` is NULL.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "SUSE Linux Enterprise Micro 5.3:kernel-rt-5.14.21-150400.15.124.1.x86_64",
          "SUSE Linux Enterprise Micro 5.3:kernel-source-rt-5.14.21-150400.15.124.1.noarch",
          "SUSE Linux Enterprise Micro 5.4:kernel-rt-5.14.21-150400.15.124.1.x86_64",
          "SUSE Linux Enterprise Micro 5.4:kernel-source-rt-5.14.21-150400.15.124.1.noarch"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2022-50046",
          "url": "https://www.suse.com/security/cve/CVE-2022-50046"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1244991 for CVE-2022-50046",
          "url": "https://bugzilla.suse.com/1244991"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "SUSE Linux Enterprise Micro 5.3:kernel-rt-5.14.21-150400.15.124.1.x86_64",
            "SUSE Linux Enterprise Micro 5.3:kernel-source-rt-5.14.21-150400.15.124.1.noarch",
            "SUSE Linux Enterprise Micro 5.4:kernel-rt-5.14.21-150400.15.124.1.x86_64",
            "SUSE Linux Enterprise Micro 5.4:kernel-source-rt-5.14.21-150400.15.124.1.noarch"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 5.5,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
            "version": "3.1"
          },
          "products": [
            "SUSE Linux Enterprise Micro 5.3:kernel-rt-5.14.21-150400.15.124.1.x86_64",
            "SUSE Linux Enterprise Micro 5.3:kernel-source-rt-5.14.21-150400.15.124.1.noarch",
            "SUSE Linux Enterprise Micro 5.4:kernel-rt-5.14.21-150400.15.124.1.x86_64",
            "SUSE Linux Enterprise Micro 5.4:kernel-source-rt-5.14.21-150400.15.124.1.noarch"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2025-07-15T14:31:46Z",
          "details": "moderate"
        }
      ],
      "title": "CVE-2022-50046"
    },
    {
      "cve": "CVE-2022-50047",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2022-50047"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "In the Linux kernel, the following vulnerability has been resolved:\n\nnet: dsa: mv88e6060: prevent crash on an unused port\n\nIf the port isn\u0027t a CPU port nor a user port, \u0027cpu_dp\u0027\nis a null pointer and a crash happened on dereferencing\nit in mv88e6060_setup_port():\n\n[    9.575872] Unable to handle kernel NULL pointer dereference at virtual address 00000014\n...\n[    9.942216]  mv88e6060_setup from dsa_register_switch+0x814/0xe84\n[    9.948616]  dsa_register_switch from mdio_probe+0x2c/0x54\n[    9.954433]  mdio_probe from really_probe.part.0+0x98/0x2a0\n[    9.960375]  really_probe.part.0 from driver_probe_device+0x30/0x10c\n[    9.967029]  driver_probe_device from __device_attach_driver+0xb8/0x13c\n[    9.973946]  __device_attach_driver from bus_for_each_drv+0x90/0xe0\n[    9.980509]  bus_for_each_drv from __device_attach+0x110/0x184\n[    9.986632]  __device_attach from bus_probe_device+0x8c/0x94\n[    9.992577]  bus_probe_device from deferred_probe_work_func+0x78/0xa8\n[    9.999311]  deferred_probe_work_func from process_one_work+0x290/0x73c\n[   10.006292]  process_one_work from worker_thread+0x30/0x4b8\n[   10.012155]  worker_thread from kthread+0xd4/0x10c\n[   10.017238]  kthread from ret_from_fork+0x14/0x3c",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "SUSE Linux Enterprise Micro 5.3:kernel-rt-5.14.21-150400.15.124.1.x86_64",
          "SUSE Linux Enterprise Micro 5.3:kernel-source-rt-5.14.21-150400.15.124.1.noarch",
          "SUSE Linux Enterprise Micro 5.4:kernel-rt-5.14.21-150400.15.124.1.x86_64",
          "SUSE Linux Enterprise Micro 5.4:kernel-source-rt-5.14.21-150400.15.124.1.noarch"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2022-50047",
          "url": "https://www.suse.com/security/cve/CVE-2022-50047"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1244993 for CVE-2022-50047",
          "url": "https://bugzilla.suse.com/1244993"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "SUSE Linux Enterprise Micro 5.3:kernel-rt-5.14.21-150400.15.124.1.x86_64",
            "SUSE Linux Enterprise Micro 5.3:kernel-source-rt-5.14.21-150400.15.124.1.noarch",
            "SUSE Linux Enterprise Micro 5.4:kernel-rt-5.14.21-150400.15.124.1.x86_64",
            "SUSE Linux Enterprise Micro 5.4:kernel-source-rt-5.14.21-150400.15.124.1.noarch"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 5.5,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
            "version": "3.1"
          },
          "products": [
            "SUSE Linux Enterprise Micro 5.3:kernel-rt-5.14.21-150400.15.124.1.x86_64",
            "SUSE Linux Enterprise Micro 5.3:kernel-source-rt-5.14.21-150400.15.124.1.noarch",
            "SUSE Linux Enterprise Micro 5.4:kernel-rt-5.14.21-150400.15.124.1.x86_64",
            "SUSE Linux Enterprise Micro 5.4:kernel-source-rt-5.14.21-150400.15.124.1.noarch"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2025-07-15T14:31:46Z",
          "details": "moderate"
        }
      ],
      "title": "CVE-2022-50047"
    },
    {
      "cve": "CVE-2022-50051",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2022-50051"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "In the Linux kernel, the following vulnerability has been resolved:\n\nASoC: SOF: debug: Fix potential buffer overflow by snprintf()\n\nsnprintf() returns the would-be-filled size when the string overflows\nthe given buffer size, hence using this value may result in the buffer\noverflow (although it\u0027s unrealistic).\n\nThis patch replaces with a safer version, scnprintf() for papering\nover such a potential issue.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "SUSE Linux Enterprise Micro 5.3:kernel-rt-5.14.21-150400.15.124.1.x86_64",
          "SUSE Linux Enterprise Micro 5.3:kernel-source-rt-5.14.21-150400.15.124.1.noarch",
          "SUSE Linux Enterprise Micro 5.4:kernel-rt-5.14.21-150400.15.124.1.x86_64",
          "SUSE Linux Enterprise Micro 5.4:kernel-source-rt-5.14.21-150400.15.124.1.noarch"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2022-50051",
          "url": "https://www.suse.com/security/cve/CVE-2022-50051"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1245041 for CVE-2022-50051",
          "url": "https://bugzilla.suse.com/1245041"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "SUSE Linux Enterprise Micro 5.3:kernel-rt-5.14.21-150400.15.124.1.x86_64",
            "SUSE Linux Enterprise Micro 5.3:kernel-source-rt-5.14.21-150400.15.124.1.noarch",
            "SUSE Linux Enterprise Micro 5.4:kernel-rt-5.14.21-150400.15.124.1.x86_64",
            "SUSE Linux Enterprise Micro 5.4:kernel-source-rt-5.14.21-150400.15.124.1.noarch"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 5.5,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
            "version": "3.1"
          },
          "products": [
            "SUSE Linux Enterprise Micro 5.3:kernel-rt-5.14.21-150400.15.124.1.x86_64",
            "SUSE Linux Enterprise Micro 5.3:kernel-source-rt-5.14.21-150400.15.124.1.noarch",
            "SUSE Linux Enterprise Micro 5.4:kernel-rt-5.14.21-150400.15.124.1.x86_64",
            "SUSE Linux Enterprise Micro 5.4:kernel-source-rt-5.14.21-150400.15.124.1.noarch"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2025-07-15T14:31:46Z",
          "details": "moderate"
        }
      ],
      "title": "CVE-2022-50051"
    },
    {
      "cve": "CVE-2022-50053",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2022-50053"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "In the Linux kernel, the following vulnerability has been resolved:\n\niavf: Fix reset error handling\n\nDo not call iavf_close in iavf_reset_task error handling. Doing so can\nlead to double call of napi_disable, which can lead to deadlock there.\nRemoving VF would lead to iavf_remove task being stuck, because it\nrequires crit_lock, which is held by iavf_close.\nCall iavf_disable_vf if reset fail, so that driver will clean up\nremaining invalid resources.\nDuring rapid VF resets, HW can fail to setup VF mailbox. Wrong\nerror handling can lead to iavf_remove being stuck with:\n[ 5218.999087] iavf 0000:82:01.0: Failed to init adminq: -53\n...\n[ 5267.189211] INFO: task repro.sh:11219 blocked for more than 30 seconds.\n[ 5267.189520]       Tainted: G S          E     5.18.0-04958-ga54ce3703613-dirty #1\n[ 5267.189764] \"echo 0 \u003e /proc/sys/kernel/hung_task_timeout_secs\" disables this message.\n[ 5267.190062] task:repro.sh        state:D stack:    0 pid:11219 ppid:  8162 flags:0x00000000\n[ 5267.190347] Call Trace:\n[ 5267.190647]  \u003cTASK\u003e\n[ 5267.190927]  __schedule+0x460/0x9f0\n[ 5267.191264]  schedule+0x44/0xb0\n[ 5267.191563]  schedule_preempt_disabled+0x14/0x20\n[ 5267.191890]  __mutex_lock.isra.12+0x6e3/0xac0\n[ 5267.192237]  ? iavf_remove+0xf9/0x6c0 [iavf]\n[ 5267.192565]  iavf_remove+0x12a/0x6c0 [iavf]\n[ 5267.192911]  ? _raw_spin_unlock_irqrestore+0x1e/0x40\n[ 5267.193285]  pci_device_remove+0x36/0xb0\n[ 5267.193619]  device_release_driver_internal+0xc1/0x150\n[ 5267.193974]  pci_stop_bus_device+0x69/0x90\n[ 5267.194361]  pci_stop_and_remove_bus_device+0xe/0x20\n[ 5267.194735]  pci_iov_remove_virtfn+0xba/0x120\n[ 5267.195130]  sriov_disable+0x2f/0xe0\n[ 5267.195506]  ice_free_vfs+0x7d/0x2f0 [ice]\n[ 5267.196056]  ? pci_get_device+0x4f/0x70\n[ 5267.196496]  ice_sriov_configure+0x78/0x1a0 [ice]\n[ 5267.196995]  sriov_numvfs_store+0xfe/0x140\n[ 5267.197466]  kernfs_fop_write_iter+0x12e/0x1c0\n[ 5267.197918]  new_sync_write+0x10c/0x190\n[ 5267.198404]  vfs_write+0x24e/0x2d0\n[ 5267.198886]  ksys_write+0x5c/0xd0\n[ 5267.199367]  do_syscall_64+0x3a/0x80\n[ 5267.199827]  entry_SYSCALL_64_after_hwframe+0x46/0xb0\n[ 5267.200317] RIP: 0033:0x7f5b381205c8\n[ 5267.200814] RSP: 002b:00007fff8c7e8c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000001\n[ 5267.201981] RAX: ffffffffffffffda RBX: 0000000000000002 RCX: 00007f5b381205c8\n[ 5267.202620] RDX: 0000000000000002 RSI: 00005569420ee900 RDI: 0000000000000001\n[ 5267.203426] RBP: 00005569420ee900 R08: 000000000000000a R09: 00007f5b38180820\n[ 5267.204327] R10: 000000000000000a R11: 0000000000000246 R12: 00007f5b383c06e0\n[ 5267.205193] R13: 0000000000000002 R14: 00007f5b383bb880 R15: 0000000000000002\n[ 5267.206041]  \u003c/TASK\u003e\n[ 5267.206970] Kernel panic - not syncing: hung_task: blocked tasks\n[ 5267.207809] CPU: 48 PID: 551 Comm: khungtaskd Kdump: loaded Tainted: G S          E     5.18.0-04958-ga54ce3703613-dirty #1\n[ 5267.208726] Hardware name: Dell Inc. PowerEdge R730/0WCJNT, BIOS 2.11.0 11/02/2019\n[ 5267.209623] Call Trace:\n[ 5267.210569]  \u003cTASK\u003e\n[ 5267.211480]  dump_stack_lvl+0x33/0x42\n[ 5267.212472]  panic+0x107/0x294\n[ 5267.213467]  watchdog.cold.8+0xc/0xbb\n[ 5267.214413]  ? proc_dohung_task_timeout_secs+0x30/0x30\n[ 5267.215511]  kthread+0xf4/0x120\n[ 5267.216459]  ? kthread_complete_and_exit+0x20/0x20\n[ 5267.217505]  ret_from_fork+0x22/0x30\n[ 5267.218459]  \u003c/TASK\u003e",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "SUSE Linux Enterprise Micro 5.3:kernel-rt-5.14.21-150400.15.124.1.x86_64",
          "SUSE Linux Enterprise Micro 5.3:kernel-source-rt-5.14.21-150400.15.124.1.noarch",
          "SUSE Linux Enterprise Micro 5.4:kernel-rt-5.14.21-150400.15.124.1.x86_64",
          "SUSE Linux Enterprise Micro 5.4:kernel-source-rt-5.14.21-150400.15.124.1.noarch"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2022-50053",
          "url": "https://www.suse.com/security/cve/CVE-2022-50053"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1245038 for CVE-2022-50053",
          "url": "https://bugzilla.suse.com/1245038"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "SUSE Linux Enterprise Micro 5.3:kernel-rt-5.14.21-150400.15.124.1.x86_64",
            "SUSE Linux Enterprise Micro 5.3:kernel-source-rt-5.14.21-150400.15.124.1.noarch",
            "SUSE Linux Enterprise Micro 5.4:kernel-rt-5.14.21-150400.15.124.1.x86_64",
            "SUSE Linux Enterprise Micro 5.4:kernel-source-rt-5.14.21-150400.15.124.1.noarch"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 5.5,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
            "version": "3.1"
          },
          "products": [
            "SUSE Linux Enterprise Micro 5.3:kernel-rt-5.14.21-150400.15.124.1.x86_64",
            "SUSE Linux Enterprise Micro 5.3:kernel-source-rt-5.14.21-150400.15.124.1.noarch",
            "SUSE Linux Enterprise Micro 5.4:kernel-rt-5.14.21-150400.15.124.1.x86_64",
            "SUSE Linux Enterprise Micro 5.4:kernel-source-rt-5.14.21-150400.15.124.1.noarch"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2025-07-15T14:31:46Z",
          "details": "moderate"
        }
      ],
      "title": "CVE-2022-50053"
    },
    {
      "cve": "CVE-2022-50055",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2022-50055"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "In the Linux kernel, the following vulnerability has been resolved:\n\niavf: Fix adminq error handling\n\niavf_alloc_asq_bufs/iavf_alloc_arq_bufs allocates with dma_alloc_coherent\nmemory for VF mailbox.\nFree DMA regions for both ASQ and ARQ in case error happens during\nconfiguration of ASQ/ARQ registers.\nWithout this change it is possible to see when unloading interface:\n74626.583369: dma_debug_device_change: device driver has pending DMA allocations while released from device [count=32]\nOne of leaked entries details: [device address=0x0000000b27ff9000] [size=4096 bytes] [mapped with DMA_BIDIRECTIONAL] [mapped as coherent]",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "SUSE Linux Enterprise Micro 5.3:kernel-rt-5.14.21-150400.15.124.1.x86_64",
          "SUSE Linux Enterprise Micro 5.3:kernel-source-rt-5.14.21-150400.15.124.1.noarch",
          "SUSE Linux Enterprise Micro 5.4:kernel-rt-5.14.21-150400.15.124.1.x86_64",
          "SUSE Linux Enterprise Micro 5.4:kernel-source-rt-5.14.21-150400.15.124.1.noarch"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2022-50055",
          "url": "https://www.suse.com/security/cve/CVE-2022-50055"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1245039 for CVE-2022-50055",
          "url": "https://bugzilla.suse.com/1245039"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "SUSE Linux Enterprise Micro 5.3:kernel-rt-5.14.21-150400.15.124.1.x86_64",
            "SUSE Linux Enterprise Micro 5.3:kernel-source-rt-5.14.21-150400.15.124.1.noarch",
            "SUSE Linux Enterprise Micro 5.4:kernel-rt-5.14.21-150400.15.124.1.x86_64",
            "SUSE Linux Enterprise Micro 5.4:kernel-source-rt-5.14.21-150400.15.124.1.noarch"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 5.5,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
            "version": "3.1"
          },
          "products": [
            "SUSE Linux Enterprise Micro 5.3:kernel-rt-5.14.21-150400.15.124.1.x86_64",
            "SUSE Linux Enterprise Micro 5.3:kernel-source-rt-5.14.21-150400.15.124.1.noarch",
            "SUSE Linux Enterprise Micro 5.4:kernel-rt-5.14.21-150400.15.124.1.x86_64",
            "SUSE Linux Enterprise Micro 5.4:kernel-source-rt-5.14.21-150400.15.124.1.noarch"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2025-07-15T14:31:46Z",
          "details": "moderate"
        }
      ],
      "title": "CVE-2022-50055"
    },
    {
      "cve": "CVE-2022-50059",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2022-50059"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "In the Linux kernel, the following vulnerability has been resolved:\n\nceph: don\u0027t leak snap_rwsem in handle_cap_grant\n\nWhen handle_cap_grant is called on an IMPORT op, then the snap_rwsem is\nheld and the function is expected to release it before returning. It\ncurrently fails to do that in all cases which could lead to a deadlock.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "SUSE Linux Enterprise Micro 5.3:kernel-rt-5.14.21-150400.15.124.1.x86_64",
          "SUSE Linux Enterprise Micro 5.3:kernel-source-rt-5.14.21-150400.15.124.1.noarch",
          "SUSE Linux Enterprise Micro 5.4:kernel-rt-5.14.21-150400.15.124.1.x86_64",
          "SUSE Linux Enterprise Micro 5.4:kernel-source-rt-5.14.21-150400.15.124.1.noarch"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2022-50059",
          "url": "https://www.suse.com/security/cve/CVE-2022-50059"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1245031 for CVE-2022-50059",
          "url": "https://bugzilla.suse.com/1245031"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "SUSE Linux Enterprise Micro 5.3:kernel-rt-5.14.21-150400.15.124.1.x86_64",
            "SUSE Linux Enterprise Micro 5.3:kernel-source-rt-5.14.21-150400.15.124.1.noarch",
            "SUSE Linux Enterprise Micro 5.4:kernel-rt-5.14.21-150400.15.124.1.x86_64",
            "SUSE Linux Enterprise Micro 5.4:kernel-source-rt-5.14.21-150400.15.124.1.noarch"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 5.5,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
            "version": "3.1"
          },
          "products": [
            "SUSE Linux Enterprise Micro 5.3:kernel-rt-5.14.21-150400.15.124.1.x86_64",
            "SUSE Linux Enterprise Micro 5.3:kernel-source-rt-5.14.21-150400.15.124.1.noarch",
            "SUSE Linux Enterprise Micro 5.4:kernel-rt-5.14.21-150400.15.124.1.x86_64",
            "SUSE Linux Enterprise Micro 5.4:kernel-source-rt-5.14.21-150400.15.124.1.noarch"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2025-07-15T14:31:46Z",
          "details": "moderate"
        }
      ],
      "title": "CVE-2022-50059"
    },
    {
      "cve": "CVE-2022-50060",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2022-50060"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "In the Linux kernel, the following vulnerability has been resolved:\n\nocteontx2-af: Fix mcam entry resource leak\n\nThe teardown sequence in FLR handler returns if no NIX LF\nis attached to PF/VF because it indicates that graceful\nshutdown of resources already happened. But there is a\nchance of all allocated MCAM entries not being freed by\nPF/VF. Hence free mcam entries even in case of detached LF.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "SUSE Linux Enterprise Micro 5.3:kernel-rt-5.14.21-150400.15.124.1.x86_64",
          "SUSE Linux Enterprise Micro 5.3:kernel-source-rt-5.14.21-150400.15.124.1.noarch",
          "SUSE Linux Enterprise Micro 5.4:kernel-rt-5.14.21-150400.15.124.1.x86_64",
          "SUSE Linux Enterprise Micro 5.4:kernel-source-rt-5.14.21-150400.15.124.1.noarch"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2022-50060",
          "url": "https://www.suse.com/security/cve/CVE-2022-50060"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1245032 for CVE-2022-50060",
          "url": "https://bugzilla.suse.com/1245032"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "SUSE Linux Enterprise Micro 5.3:kernel-rt-5.14.21-150400.15.124.1.x86_64",
            "SUSE Linux Enterprise Micro 5.3:kernel-source-rt-5.14.21-150400.15.124.1.noarch",
            "SUSE Linux Enterprise Micro 5.4:kernel-rt-5.14.21-150400.15.124.1.x86_64",
            "SUSE Linux Enterprise Micro 5.4:kernel-source-rt-5.14.21-150400.15.124.1.noarch"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 5.5,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
            "version": "3.1"
          },
          "products": [
            "SUSE Linux Enterprise Micro 5.3:kernel-rt-5.14.21-150400.15.124.1.x86_64",
            "SUSE Linux Enterprise Micro 5.3:kernel-source-rt-5.14.21-150400.15.124.1.noarch",
            "SUSE Linux Enterprise Micro 5.4:kernel-rt-5.14.21-150400.15.124.1.x86_64",
            "SUSE Linux Enterprise Micro 5.4:kernel-source-rt-5.14.21-150400.15.124.1.noarch"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2025-07-15T14:31:46Z",
          "details": "moderate"
        }
      ],
      "title": "CVE-2022-50060"
    },
    {
      "cve": "CVE-2022-50061",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2022-50061"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "In the Linux kernel, the following vulnerability has been resolved:\n\npinctrl: nomadik: Fix refcount leak in nmk_pinctrl_dt_subnode_to_map\n\nof_parse_phandle() returns a node pointer with refcount\nincremented, we should use of_node_put() on it when not need anymore.\nAdd missing of_node_put() to avoid refcount leak.\"",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "SUSE Linux Enterprise Micro 5.3:kernel-rt-5.14.21-150400.15.124.1.x86_64",
          "SUSE Linux Enterprise Micro 5.3:kernel-source-rt-5.14.21-150400.15.124.1.noarch",
          "SUSE Linux Enterprise Micro 5.4:kernel-rt-5.14.21-150400.15.124.1.x86_64",
          "SUSE Linux Enterprise Micro 5.4:kernel-source-rt-5.14.21-150400.15.124.1.noarch"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2022-50061",
          "url": "https://www.suse.com/security/cve/CVE-2022-50061"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1245033 for CVE-2022-50061",
          "url": "https://bugzilla.suse.com/1245033"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "SUSE Linux Enterprise Micro 5.3:kernel-rt-5.14.21-150400.15.124.1.x86_64",
            "SUSE Linux Enterprise Micro 5.3:kernel-source-rt-5.14.21-150400.15.124.1.noarch",
            "SUSE Linux Enterprise Micro 5.4:kernel-rt-5.14.21-150400.15.124.1.x86_64",
            "SUSE Linux Enterprise Micro 5.4:kernel-source-rt-5.14.21-150400.15.124.1.noarch"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 5.5,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
            "version": "3.1"
          },
          "products": [
            "SUSE Linux Enterprise Micro 5.3:kernel-rt-5.14.21-150400.15.124.1.x86_64",
            "SUSE Linux Enterprise Micro 5.3:kernel-source-rt-5.14.21-150400.15.124.1.noarch",
            "SUSE Linux Enterprise Micro 5.4:kernel-rt-5.14.21-150400.15.124.1.x86_64",
            "SUSE Linux Enterprise Micro 5.4:kernel-source-rt-5.14.21-150400.15.124.1.noarch"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2025-07-15T14:31:46Z",
          "details": "moderate"
        }
      ],
      "title": "CVE-2022-50061"
    },
    {
      "cve": "CVE-2022-50062",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2022-50062"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "In the Linux kernel, the following vulnerability has been resolved:\n\nnet: bgmac: Fix a BUG triggered by wrong bytes_compl\n\nOn one of our machines we got:\n\nkernel BUG at lib/dynamic_queue_limits.c:27!\nInternal error: Oops - BUG: 0 [#1] PREEMPT SMP ARM\nCPU: 0 PID: 1166 Comm: irq/41-bgmac Tainted: G        W  O    4.14.275-rt132 #1\nHardware name: BRCM XGS iProc\ntask: ee3415c0 task.stack: ee32a000\nPC is at dql_completed+0x168/0x178\nLR is at bgmac_poll+0x18c/0x6d8\npc : [\u003cc03b9430\u003e]    lr : [\u003cc04b5a18\u003e]    psr: 800a0313\nsp : ee32be14  ip : 000005ea  fp : 00000bd4\nr10: ee558500  r9 : c0116298  r8 : 00000002\nr7 : 00000000  r6 : ef128810  r5 : 01993267  r4 : 01993851\nr3 : ee558000  r2 : 000070e1  r1 : 00000bd4  r0 : ee52c180\nFlags: Nzcv  IRQs on  FIQs on  Mode SVC_32  ISA ARM  Segment none\nControl: 12c5387d  Table: 8e88c04a  DAC: 00000051\nProcess irq/41-bgmac (pid: 1166, stack limit = 0xee32a210)\nStack: (0xee32be14 to 0xee32c000)\nbe00:                                              ee558520 ee52c100 ef128810\nbe20: 00000000 00000002 c0116298 c04b5a18 00000000 c0a0c8c4 c0951780 00000040\nbe40: c0701780 ee558500 ee55d520 ef05b340 ef6f9780 ee558520 00000001 00000040\nbe60: ffffe000 c0a56878 ef6fa040 c0952040 0000012c c0528744 ef6f97b0 fffcfb6a\nbe80: c0a04104 2eda8000 c0a0c4ec c0a0d368 ee32bf44 c0153534 ee32be98 ee32be98\nbea0: ee32bea0 ee32bea0 ee32bea8 ee32bea8 00000000 c01462e4 ffffe000 ef6f22a8\nbec0: ffffe000 00000008 ee32bee4 c0147430 ffffe000 c094a2a8 00000003 ffffe000\nbee0: c0a54528 00208040 0000000c c0a0c8c4 c0a65980 c0124d3c 00000008 ee558520\nbf00: c094a23c c0a02080 00000000 c07a9910 ef136970 ef136970 ee30a440 ef136900\nbf20: ee30a440 00000001 ef136900 ee30a440 c016d990 00000000 c0108db0 c012500c\nbf40: ef136900 c016da14 ee30a464 ffffe000 00000001 c016dd14 00000000 c016db28\nbf60: ffffe000 ee21a080 ee30a400 00000000 ee32a000 ee30a440 c016dbfc ee25fd70\nbf80: ee21a09c c013edcc ee32a000 ee30a400 c013ec7c 00000000 00000000 00000000\nbfa0: 00000000 00000000 00000000 c0108470 00000000 00000000 00000000 00000000\nbfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000\nbfe0: 00000000 00000000 00000000 00000000 00000013 00000000 00000000 00000000\n[\u003cc03b9430\u003e] (dql_completed) from [\u003cc04b5a18\u003e] (bgmac_poll+0x18c/0x6d8)\n[\u003cc04b5a18\u003e] (bgmac_poll) from [\u003cc0528744\u003e] (net_rx_action+0x1c4/0x494)\n[\u003cc0528744\u003e] (net_rx_action) from [\u003cc0124d3c\u003e] (do_current_softirqs+0x1ec/0x43c)\n[\u003cc0124d3c\u003e] (do_current_softirqs) from [\u003cc012500c\u003e] (__local_bh_enable+0x80/0x98)\n[\u003cc012500c\u003e] (__local_bh_enable) from [\u003cc016da14\u003e] (irq_forced_thread_fn+0x84/0x98)\n[\u003cc016da14\u003e] (irq_forced_thread_fn) from [\u003cc016dd14\u003e] (irq_thread+0x118/0x1c0)\n[\u003cc016dd14\u003e] (irq_thread) from [\u003cc013edcc\u003e] (kthread+0x150/0x158)\n[\u003cc013edcc\u003e] (kthread) from [\u003cc0108470\u003e] (ret_from_fork+0x14/0x24)\nCode: a83f15e0 0200001a 0630a0e1 c3ffffea (f201f0e7)\n\nThe issue seems similar to commit 90b3b339364c (\"net: hisilicon: Fix a BUG\ntrigered by wrong bytes_compl\") and potentially introduced by commit\nb38c83dd0866 (\"bgmac: simplify tx ring index handling\").\n\nIf there is an RX interrupt between setting ring-\u003eend\nand netdev_sent_queue() we can hit the BUG_ON as bgmac_dma_tx_free()\ncan miscalculate the queue size while called from bgmac_poll().\n\nThe machine which triggered the BUG runs a v4.14 RT kernel - but the issue\nseems present in mainline too.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "SUSE Linux Enterprise Micro 5.3:kernel-rt-5.14.21-150400.15.124.1.x86_64",
          "SUSE Linux Enterprise Micro 5.3:kernel-source-rt-5.14.21-150400.15.124.1.noarch",
          "SUSE Linux Enterprise Micro 5.4:kernel-rt-5.14.21-150400.15.124.1.x86_64",
          "SUSE Linux Enterprise Micro 5.4:kernel-source-rt-5.14.21-150400.15.124.1.noarch"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2022-50062",
          "url": "https://www.suse.com/security/cve/CVE-2022-50062"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1245028 for CVE-2022-50062",
          "url": "https://bugzilla.suse.com/1245028"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "SUSE Linux Enterprise Micro 5.3:kernel-rt-5.14.21-150400.15.124.1.x86_64",
            "SUSE Linux Enterprise Micro 5.3:kernel-source-rt-5.14.21-150400.15.124.1.noarch",
            "SUSE Linux Enterprise Micro 5.4:kernel-rt-5.14.21-150400.15.124.1.x86_64",
            "SUSE Linux Enterprise Micro 5.4:kernel-source-rt-5.14.21-150400.15.124.1.noarch"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 5.5,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
            "version": "3.1"
          },
          "products": [
            "SUSE Linux Enterprise Micro 5.3:kernel-rt-5.14.21-150400.15.124.1.x86_64",
            "SUSE Linux Enterprise Micro 5.3:kernel-source-rt-5.14.21-150400.15.124.1.noarch",
            "SUSE Linux Enterprise Micro 5.4:kernel-rt-5.14.21-150400.15.124.1.x86_64",
            "SUSE Linux Enterprise Micro 5.4:kernel-source-rt-5.14.21-150400.15.124.1.noarch"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2025-07-15T14:31:46Z",
          "details": "moderate"
        }
      ],
      "title": "CVE-2022-50062"
    },
    {
      "cve": "CVE-2022-50065",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2022-50065"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "In the Linux kernel, the following vulnerability has been resolved:\n\nvirtio_net: fix memory leak inside XPD_TX with mergeable\n\nWhen we call xdp_convert_buff_to_frame() to get xdpf, if it returns\nNULL, we should check if xdp_page was allocated by xdp_linearize_page().\nIf it is newly allocated, it should be freed here alone. Just like any\nother \"goto err_xdp\".",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "SUSE Linux Enterprise Micro 5.3:kernel-rt-5.14.21-150400.15.124.1.x86_64",
          "SUSE Linux Enterprise Micro 5.3:kernel-source-rt-5.14.21-150400.15.124.1.noarch",
          "SUSE Linux Enterprise Micro 5.4:kernel-rt-5.14.21-150400.15.124.1.x86_64",
          "SUSE Linux Enterprise Micro 5.4:kernel-source-rt-5.14.21-150400.15.124.1.noarch"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2022-50065",
          "url": "https://www.suse.com/security/cve/CVE-2022-50065"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1244986 for CVE-2022-50065",
          "url": "https://bugzilla.suse.com/1244986"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "SUSE Linux Enterprise Micro 5.3:kernel-rt-5.14.21-150400.15.124.1.x86_64",
            "SUSE Linux Enterprise Micro 5.3:kernel-source-rt-5.14.21-150400.15.124.1.noarch",
            "SUSE Linux Enterprise Micro 5.4:kernel-rt-5.14.21-150400.15.124.1.x86_64",
            "SUSE Linux Enterprise Micro 5.4:kernel-source-rt-5.14.21-150400.15.124.1.noarch"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 5.5,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
            "version": "3.1"
          },
          "products": [
            "SUSE Linux Enterprise Micro 5.3:kernel-rt-5.14.21-150400.15.124.1.x86_64",
            "SUSE Linux Enterprise Micro 5.3:kernel-source-rt-5.14.21-150400.15.124.1.noarch",
            "SUSE Linux Enterprise Micro 5.4:kernel-rt-5.14.21-150400.15.124.1.x86_64",
            "SUSE Linux Enterprise Micro 5.4:kernel-source-rt-5.14.21-150400.15.124.1.noarch"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2025-07-15T14:31:46Z",
          "details": "moderate"
        }
      ],
      "title": "CVE-2022-50065"
    },
    {
      "cve": "CVE-2022-50066",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2022-50066"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "In the Linux kernel, the following vulnerability has been resolved:\n\nnet: atlantic: fix aq_vec index out of range error\n\nThe final update statement of the for loop exceeds the array range, the\ndereference of self-\u003eaq_vec[i] is not checked and then leads to the\nindex out of range error.\nAlso fixed this kind of coding style in other for loop.\n\n[   97.937604] UBSAN: array-index-out-of-bounds in drivers/net/ethernet/aquantia/atlantic/aq_nic.c:1404:48\n[   97.937607] index 8 is out of range for type \u0027aq_vec_s *[8]\u0027\n[   97.937608] CPU: 38 PID: 3767 Comm: kworker/u256:18 Not tainted 5.19.0+ #2\n[   97.937610] Hardware name: Dell Inc. Precision 7865 Tower/, BIOS 1.0.0 06/12/2022\n[   97.937611] Workqueue: events_unbound async_run_entry_fn\n[   97.937616] Call Trace:\n[   97.937617]  \u003cTASK\u003e\n[   97.937619]  dump_stack_lvl+0x49/0x63\n[   97.937624]  dump_stack+0x10/0x16\n[   97.937626]  ubsan_epilogue+0x9/0x3f\n[   97.937627]  __ubsan_handle_out_of_bounds.cold+0x44/0x49\n[   97.937629]  ? __scm_send+0x348/0x440\n[   97.937632]  ? aq_vec_stop+0x72/0x80 [atlantic]\n[   97.937639]  aq_nic_stop+0x1b6/0x1c0 [atlantic]\n[   97.937644]  aq_suspend_common+0x88/0x90 [atlantic]\n[   97.937648]  aq_pm_suspend_poweroff+0xe/0x20 [atlantic]\n[   97.937653]  pci_pm_suspend+0x7e/0x1a0\n[   97.937655]  ? pci_pm_suspend_noirq+0x2b0/0x2b0\n[   97.937657]  dpm_run_callback+0x54/0x190\n[   97.937660]  __device_suspend+0x14c/0x4d0\n[   97.937661]  async_suspend+0x23/0x70\n[   97.937663]  async_run_entry_fn+0x33/0x120\n[   97.937664]  process_one_work+0x21f/0x3f0\n[   97.937666]  worker_thread+0x4a/0x3c0\n[   97.937668]  ? process_one_work+0x3f0/0x3f0\n[   97.937669]  kthread+0xf0/0x120\n[   97.937671]  ? kthread_complete_and_exit+0x20/0x20\n[   97.937672]  ret_from_fork+0x22/0x30\n[   97.937676]  \u003c/TASK\u003e\n\nv2. fixed \"warning: variable \u0027aq_vec\u0027 set but not used\"\n\nv3. simplified a for loop",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "SUSE Linux Enterprise Micro 5.3:kernel-rt-5.14.21-150400.15.124.1.x86_64",
          "SUSE Linux Enterprise Micro 5.3:kernel-source-rt-5.14.21-150400.15.124.1.noarch",
          "SUSE Linux Enterprise Micro 5.4:kernel-rt-5.14.21-150400.15.124.1.x86_64",
          "SUSE Linux Enterprise Micro 5.4:kernel-source-rt-5.14.21-150400.15.124.1.noarch"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2022-50066",
          "url": "https://www.suse.com/security/cve/CVE-2022-50066"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1244985 for CVE-2022-50066",
          "url": "https://bugzilla.suse.com/1244985"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "SUSE Linux Enterprise Micro 5.3:kernel-rt-5.14.21-150400.15.124.1.x86_64",
            "SUSE Linux Enterprise Micro 5.3:kernel-source-rt-5.14.21-150400.15.124.1.noarch",
            "SUSE Linux Enterprise Micro 5.4:kernel-rt-5.14.21-150400.15.124.1.x86_64",
            "SUSE Linux Enterprise Micro 5.4:kernel-source-rt-5.14.21-150400.15.124.1.noarch"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 5.5,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
            "version": "3.1"
          },
          "products": [
            "SUSE Linux Enterprise Micro 5.3:kernel-rt-5.14.21-150400.15.124.1.x86_64",
            "SUSE Linux Enterprise Micro 5.3:kernel-source-rt-5.14.21-150400.15.124.1.noarch",
            "SUSE Linux Enterprise Micro 5.4:kernel-rt-5.14.21-150400.15.124.1.x86_64",
            "SUSE Linux Enterprise Micro 5.4:kernel-source-rt-5.14.21-150400.15.124.1.noarch"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2025-07-15T14:31:46Z",
          "details": "moderate"
        }
      ],
      "title": "CVE-2022-50066"
    },
    {
      "cve": "CVE-2022-50067",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2022-50067"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "In the Linux kernel, the following vulnerability has been resolved:\n\nbtrfs: unset reloc control if transaction commit fails in prepare_to_relocate()\n\nIn btrfs_relocate_block_group(), the rc is allocated.  Then\nbtrfs_relocate_block_group() calls\n\nrelocate_block_group()\n  prepare_to_relocate()\n    set_reloc_control()\n\nthat assigns rc to the variable fs_info-\u003ereloc_ctl. When\nprepare_to_relocate() returns, it calls\n\nbtrfs_commit_transaction()\n  btrfs_start_dirty_block_groups()\n    btrfs_alloc_path()\n      kmem_cache_zalloc()\n\nwhich may fail for example (or other errors could happen). When the\nfailure occurs, btrfs_relocate_block_group() detects the error and frees\nrc and doesn\u0027t set fs_info-\u003ereloc_ctl to NULL. After that, in\nbtrfs_init_reloc_root(), rc is retrieved from fs_info-\u003ereloc_ctl and\nthen used, which may cause a use-after-free bug.\n\nThis possible bug can be triggered by calling btrfs_ioctl_balance()\nbefore calling btrfs_ioctl_defrag().\n\nTo fix this possible bug, in prepare_to_relocate(), check if\nbtrfs_commit_transaction() fails. If the failure occurs,\nunset_reloc_control() is called to set fs_info-\u003ereloc_ctl to NULL.\n\nThe error log in our fault-injection testing is shown as follows:\n\n  [   58.751070] BUG: KASAN: use-after-free in btrfs_init_reloc_root+0x7ca/0x920 [btrfs]\n  ...\n  [   58.753577] Call Trace:\n  ...\n  [   58.755800]  kasan_report+0x45/0x60\n  [   58.756066]  btrfs_init_reloc_root+0x7ca/0x920 [btrfs]\n  [   58.757304]  record_root_in_trans+0x792/0xa10 [btrfs]\n  [   58.757748]  btrfs_record_root_in_trans+0x463/0x4f0 [btrfs]\n  [   58.758231]  start_transaction+0x896/0x2950 [btrfs]\n  [   58.758661]  btrfs_defrag_root+0x250/0xc00 [btrfs]\n  [   58.759083]  btrfs_ioctl_defrag+0x467/0xa00 [btrfs]\n  [   58.759513]  btrfs_ioctl+0x3c95/0x114e0 [btrfs]\n  ...\n  [   58.768510] Allocated by task 23683:\n  [   58.768777]  ____kasan_kmalloc+0xb5/0xf0\n  [   58.769069]  __kmalloc+0x227/0x3d0\n  [   58.769325]  alloc_reloc_control+0x10a/0x3d0 [btrfs]\n  [   58.769755]  btrfs_relocate_block_group+0x7aa/0x1e20 [btrfs]\n  [   58.770228]  btrfs_relocate_chunk+0xf1/0x760 [btrfs]\n  [   58.770655]  __btrfs_balance+0x1326/0x1f10 [btrfs]\n  [   58.771071]  btrfs_balance+0x3150/0x3d30 [btrfs]\n  [   58.771472]  btrfs_ioctl_balance+0xd84/0x1410 [btrfs]\n  [   58.771902]  btrfs_ioctl+0x4caa/0x114e0 [btrfs]\n  ...\n  [   58.773337] Freed by task 23683:\n  ...\n  [   58.774815]  kfree+0xda/0x2b0\n  [   58.775038]  free_reloc_control+0x1d6/0x220 [btrfs]\n  [   58.775465]  btrfs_relocate_block_group+0x115c/0x1e20 [btrfs]\n  [   58.775944]  btrfs_relocate_chunk+0xf1/0x760 [btrfs]\n  [   58.776369]  __btrfs_balance+0x1326/0x1f10 [btrfs]\n  [   58.776784]  btrfs_balance+0x3150/0x3d30 [btrfs]\n  [   58.777185]  btrfs_ioctl_balance+0xd84/0x1410 [btrfs]\n  [   58.777621]  btrfs_ioctl+0x4caa/0x114e0 [btrfs]\n  ...",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "SUSE Linux Enterprise Micro 5.3:kernel-rt-5.14.21-150400.15.124.1.x86_64",
          "SUSE Linux Enterprise Micro 5.3:kernel-source-rt-5.14.21-150400.15.124.1.noarch",
          "SUSE Linux Enterprise Micro 5.4:kernel-rt-5.14.21-150400.15.124.1.x86_64",
          "SUSE Linux Enterprise Micro 5.4:kernel-source-rt-5.14.21-150400.15.124.1.noarch"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2022-50067",
          "url": "https://www.suse.com/security/cve/CVE-2022-50067"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1245047 for CVE-2022-50067",
          "url": "https://bugzilla.suse.com/1245047"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "SUSE Linux Enterprise Micro 5.3:kernel-rt-5.14.21-150400.15.124.1.x86_64",
            "SUSE Linux Enterprise Micro 5.3:kernel-source-rt-5.14.21-150400.15.124.1.noarch",
            "SUSE Linux Enterprise Micro 5.4:kernel-rt-5.14.21-150400.15.124.1.x86_64",
            "SUSE Linux Enterprise Micro 5.4:kernel-source-rt-5.14.21-150400.15.124.1.noarch"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 5.5,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
            "version": "3.1"
          },
          "products": [
            "SUSE Linux Enterprise Micro 5.3:kernel-rt-5.14.21-150400.15.124.1.x86_64",
            "SUSE Linux Enterprise Micro 5.3:kernel-source-rt-5.14.21-150400.15.124.1.noarch",
            "SUSE Linux Enterprise Micro 5.4:kernel-rt-5.14.21-150400.15.124.1.x86_64",
            "SUSE Linux Enterprise Micro 5.4:kernel-source-rt-5.14.21-150400.15.124.1.noarch"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2025-07-15T14:31:46Z",
          "details": "moderate"
        }
      ],
      "title": "CVE-2022-50067"
    },
    {
      "cve": "CVE-2022-50068",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2022-50068"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "In the Linux kernel, the following vulnerability has been resolved:\n\ndrm/ttm: Fix dummy res NULL ptr deref bug\n\nCheck the bo-\u003eresource value before accessing the resource\nmem_type.\n\nv2: Fix commit description unwrapped warning\n\n\u003clog snip\u003e\n[   40.191227][  T184] general protection fault, probably for non-canonical address 0xdffffc0000000002: 0000 [#1] SMP KASAN PTI\n[   40.192995][  T184] KASAN: null-ptr-deref in range [0x0000000000000010-0x0000000000000017]\n[   40.194411][  T184] CPU: 1 PID: 184 Comm: systemd-udevd Not tainted 5.19.0-rc4-00721-gb297c22b7070 #1\n[   40.196063][  T184] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.16.0-debian-1.16.0-4 04/01/2014\n[   40.199605][  T184] RIP: 0010:ttm_bo_validate+0x1b3/0x240 [ttm]\n[   40.200754][  T184] Code: e8 72 c5 ff ff 83 f8 b8 74 d4 85 c0 75 54 49 8b 9e 58 01 00 00 48 b8 00 00 00 00 00 fc ff df 48 8d 7b 10 48 89 fa 48 c1 ea 03 \u003c0f\u003e b6 04 02 84 c0 74 04 3c 03 7e 44 8b 53 10 31 c0 85 d2 0f 85 58\n[   40.203685][  T184] RSP: 0018:ffffc900006df0c8 EFLAGS: 00010202\n[   40.204630][  T184] RAX: dffffc0000000000 RBX: 0000000000000000 RCX: 1ffff1102f4bb71b\n[   40.205864][  T184] RDX: 0000000000000002 RSI: ffffc900006df208 RDI: 0000000000000010\n[   40.207102][  T184] RBP: 1ffff920000dbe1a R08: ffffc900006df208 R09: 0000000000000000\n[   40.208394][  T184] R10: ffff88817a5f0000 R11: 0000000000000001 R12: ffffc900006df110\n[   40.209692][  T184] R13: ffffc900006df0f0 R14: ffff88817a5db800 R15: ffffc900006df208\n[   40.210862][  T184] FS:  00007f6b1d16e8c0(0000) GS:ffff88839d700000(0000) knlGS:0000000000000000\n[   40.212250][  T184] CS:  0010 DS: 0000 ES: 0000 CR0: 0000000080050033\n[   40.213275][  T184] CR2: 000055a1001d4ff0 CR3: 00000001700f4000 CR4: 00000000000006e0\n[   40.214469][  T184] Call Trace:\n[   40.214974][  T184]  \u003cTASK\u003e\n[   40.215438][  T184]  ? ttm_bo_bounce_temp_buffer+0x140/0x140 [ttm]\n[   40.216572][  T184]  ? mutex_spin_on_owner+0x240/0x240\n[   40.217456][  T184]  ? drm_vma_offset_add+0xaa/0x100 [drm]\n[   40.218457][  T184]  ttm_bo_init_reserved+0x3d6/0x540 [ttm]\n[   40.219410][  T184]  ? shmem_get_inode+0x744/0x980\n[   40.220231][  T184]  ttm_bo_init_validate+0xb1/0x200 [ttm]\n[   40.221172][  T184]  ? bo_driver_evict_flags+0x340/0x340 [drm_vram_helper]\n[   40.222530][  T184]  ? ttm_bo_init_reserved+0x540/0x540 [ttm]\n[   40.223643][  T184]  ? __do_sys_finit_module+0x11a/0x1c0\n[   40.224654][  T184]  ? __shmem_file_setup+0x102/0x280\n[   40.234764][  T184]  drm_gem_vram_create+0x305/0x480 [drm_vram_helper]\n[   40.235766][  T184]  ? bo_driver_evict_flags+0x340/0x340 [drm_vram_helper]\n[   40.236846][  T184]  ? __kasan_slab_free+0x108/0x180\n[   40.237650][  T184]  drm_gem_vram_fill_create_dumb+0x134/0x340 [drm_vram_helper]\n[   40.238864][  T184]  ? local_pci_probe+0xdf/0x180\n[   40.239674][  T184]  ? drmm_vram_helper_init+0x400/0x400 [drm_vram_helper]\n[   40.240826][  T184]  drm_client_framebuffer_create+0x19c/0x400 [drm]\n[   40.241955][  T184]  ? drm_client_buffer_delete+0x200/0x200 [drm]\n[   40.243001][  T184]  ? drm_client_pick_crtcs+0x554/0xb80 [drm]\n[   40.244030][  T184]  drm_fb_helper_generic_probe+0x23f/0x940 [drm_kms_helper]\n[   40.245226][  T184]  ? __cond_resched+0x1c/0xc0\n[   40.245987][  T184]  ? drm_fb_helper_memory_range_to_clip+0x180/0x180 [drm_kms_helper]\n[   40.247316][  T184]  ? mutex_unlock+0x80/0x100\n[   40.248005][  T184]  ? __mutex_unlock_slowpath+0x2c0/0x2c0\n[   40.249083][  T184]  drm_fb_helper_single_fb_probe+0x907/0xf00 [drm_kms_helper]\n[   40.250314][  T184]  ? drm_fb_helper_check_var+0x1180/0x1180 [drm_kms_helper]\n[   40.251540][  T184]  ? __cond_resched+0x1c/0xc0\n[   40.252321][  T184]  ? mutex_lock+0x9f/0x100\n[   40.253062][  T184]  __drm_fb_helper_initial_config_and_unlock+0xb9/0x2c0 [drm_kms_helper]\n[   40.254394][  T184]  drm_fbdev_client_hotplug+0x56f/0x840 [drm_kms_helper]\n[   40.255477][  T184]  drm_fbdev_generic_setup+0x165/0x3c0 [drm_kms_helper]\n[   40.256607][  T184]  bochs_pci_probe+0x6b7/0x900 [bochs]\n[   \n---truncated---",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "SUSE Linux Enterprise Micro 5.3:kernel-rt-5.14.21-150400.15.124.1.x86_64",
          "SUSE Linux Enterprise Micro 5.3:kernel-source-rt-5.14.21-150400.15.124.1.noarch",
          "SUSE Linux Enterprise Micro 5.4:kernel-rt-5.14.21-150400.15.124.1.x86_64",
          "SUSE Linux Enterprise Micro 5.4:kernel-source-rt-5.14.21-150400.15.124.1.noarch"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2022-50068",
          "url": "https://www.suse.com/security/cve/CVE-2022-50068"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1245142 for CVE-2022-50068",
          "url": "https://bugzilla.suse.com/1245142"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "SUSE Linux Enterprise Micro 5.3:kernel-rt-5.14.21-150400.15.124.1.x86_64",
            "SUSE Linux Enterprise Micro 5.3:kernel-source-rt-5.14.21-150400.15.124.1.noarch",
            "SUSE Linux Enterprise Micro 5.4:kernel-rt-5.14.21-150400.15.124.1.x86_64",
            "SUSE Linux Enterprise Micro 5.4:kernel-source-rt-5.14.21-150400.15.124.1.noarch"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 5.5,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
            "version": "3.1"
          },
          "products": [
            "SUSE Linux Enterprise Micro 5.3:kernel-rt-5.14.21-150400.15.124.1.x86_64",
            "SUSE Linux Enterprise Micro 5.3:kernel-source-rt-5.14.21-150400.15.124.1.noarch",
            "SUSE Linux Enterprise Micro 5.4:kernel-rt-5.14.21-150400.15.124.1.x86_64",
            "SUSE Linux Enterprise Micro 5.4:kernel-source-rt-5.14.21-150400.15.124.1.noarch"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2025-07-15T14:31:46Z",
          "details": "moderate"
        }
      ],
      "title": "CVE-2022-50068"
    },
    {
      "cve": "CVE-2022-50072",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2022-50072"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "In the Linux kernel, the following vulnerability has been resolved:\n\nNFSv4/pnfs: Fix a use-after-free bug in open\n\nIf someone cancels the open RPC call, then we must not try to free\neither the open slot or the layoutget operation arguments, since they\nare likely still in use by the hung RPC call.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "SUSE Linux Enterprise Micro 5.3:kernel-rt-5.14.21-150400.15.124.1.x86_64",
          "SUSE Linux Enterprise Micro 5.3:kernel-source-rt-5.14.21-150400.15.124.1.noarch",
          "SUSE Linux Enterprise Micro 5.4:kernel-rt-5.14.21-150400.15.124.1.x86_64",
          "SUSE Linux Enterprise Micro 5.4:kernel-source-rt-5.14.21-150400.15.124.1.noarch"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2022-50072",
          "url": "https://www.suse.com/security/cve/CVE-2022-50072"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1244979 for CVE-2022-50072",
          "url": "https://bugzilla.suse.com/1244979"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "SUSE Linux Enterprise Micro 5.3:kernel-rt-5.14.21-150400.15.124.1.x86_64",
            "SUSE Linux Enterprise Micro 5.3:kernel-source-rt-5.14.21-150400.15.124.1.noarch",
            "SUSE Linux Enterprise Micro 5.4:kernel-rt-5.14.21-150400.15.124.1.x86_64",
            "SUSE Linux Enterprise Micro 5.4:kernel-source-rt-5.14.21-150400.15.124.1.noarch"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 5.5,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
            "version": "3.1"
          },
          "products": [
            "SUSE Linux Enterprise Micro 5.3:kernel-rt-5.14.21-150400.15.124.1.x86_64",
            "SUSE Linux Enterprise Micro 5.3:kernel-source-rt-5.14.21-150400.15.124.1.noarch",
            "SUSE Linux Enterprise Micro 5.4:kernel-rt-5.14.21-150400.15.124.1.x86_64",
            "SUSE Linux Enterprise Micro 5.4:kernel-source-rt-5.14.21-150400.15.124.1.noarch"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2025-07-15T14:31:46Z",
          "details": "moderate"
        }
      ],
      "title": "CVE-2022-50072"
    },
    {
      "cve": "CVE-2022-50073",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2022-50073"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "In the Linux kernel, the following vulnerability has been resolved:\n\nnet: tap: NULL pointer derefence in dev_parse_header_protocol when skb-\u003edev is null\n\nFixes a NULL pointer derefence bug triggered from tap driver.\nWhen tap_get_user calls virtio_net_hdr_to_skb the skb-\u003edev is null\n(in tap.c skb-\u003edev is set after the call to virtio_net_hdr_to_skb)\nvirtio_net_hdr_to_skb calls dev_parse_header_protocol which\nneeds skb-\u003edev field to be valid.\n\nThe line that trigers the bug is in dev_parse_header_protocol\n(dev is at offset 0x10 from skb and is stored in RAX register)\n  if (!dev-\u003eheader_ops || !dev-\u003eheader_ops-\u003eparse_protocol)\n  22e1:   mov    0x10(%rbx),%rax\n  22e5:\t  mov    0x230(%rax),%rax\n\nSetting skb-\u003edev before the call in tap.c fixes the issue.\n\nBUG: kernel NULL pointer dereference, address: 0000000000000230\nRIP: 0010:virtio_net_hdr_to_skb.constprop.0+0x335/0x410 [tap]\nCode: c0 0f 85 b7 fd ff ff eb d4 41 39 c6 77 cf 29 c6 48 89 df 44 01 f6 e8 7a 79 83 c1 48 85 c0 0f 85 d9 fd ff ff eb b7 48 8b 43 10 \u003c48\u003e 8b 80 30 02 00 00 48 85 c0 74 55 48 8b 40 28 48 85 c0 74 4c 48\nRSP: 0018:ffffc90005c27c38 EFLAGS: 00010246\nRAX: 0000000000000000 RBX: ffff888298f25300 RCX: 0000000000000010\nRDX: 0000000000000005 RSI: ffffc90005c27cb6 RDI: ffff888298f25300\nRBP: ffffc90005c27c80 R08: 00000000ffffffea R09: 00000000000007e8\nR10: ffff88858ec77458 R11: 0000000000000000 R12: 0000000000000001\nR13: 0000000000000014 R14: ffffc90005c27e08 R15: ffffc90005c27cb6\nFS:  0000000000000000(0000) GS:ffff88858ec40000(0000) knlGS:0000000000000000\nCS:  0010 DS: 0000 ES: 0000 CR0: 0000000080050033\nCR2: 0000000000000230 CR3: 0000000281408006 CR4: 00000000003706e0\nCall Trace:\n tap_get_user+0x3f1/0x540 [tap]\n tap_sendmsg+0x56/0x362 [tap]\n ? get_tx_bufs+0xc2/0x1e0 [vhost_net]\n handle_tx_copy+0x114/0x670 [vhost_net]\n handle_tx+0xb0/0xe0 [vhost_net]\n handle_tx_kick+0x15/0x20 [vhost_net]\n vhost_worker+0x7b/0xc0 [vhost]\n ? vhost_vring_call_reset+0x40/0x40 [vhost]\n kthread+0xfa/0x120\n ? kthread_complete_and_exit+0x20/0x20\n ret_from_fork+0x1f/0x30",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "SUSE Linux Enterprise Micro 5.3:kernel-rt-5.14.21-150400.15.124.1.x86_64",
          "SUSE Linux Enterprise Micro 5.3:kernel-source-rt-5.14.21-150400.15.124.1.noarch",
          "SUSE Linux Enterprise Micro 5.4:kernel-rt-5.14.21-150400.15.124.1.x86_64",
          "SUSE Linux Enterprise Micro 5.4:kernel-source-rt-5.14.21-150400.15.124.1.noarch"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2022-50073",
          "url": "https://www.suse.com/security/cve/CVE-2022-50073"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1244978 for CVE-2022-50073",
          "url": "https://bugzilla.suse.com/1244978"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "SUSE Linux Enterprise Micro 5.3:kernel-rt-5.14.21-150400.15.124.1.x86_64",
            "SUSE Linux Enterprise Micro 5.3:kernel-source-rt-5.14.21-150400.15.124.1.noarch",
            "SUSE Linux Enterprise Micro 5.4:kernel-rt-5.14.21-150400.15.124.1.x86_64",
            "SUSE Linux Enterprise Micro 5.4:kernel-source-rt-5.14.21-150400.15.124.1.noarch"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 5.5,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
            "version": "3.1"
          },
          "products": [
            "SUSE Linux Enterprise Micro 5.3:kernel-rt-5.14.21-150400.15.124.1.x86_64",
            "SUSE Linux Enterprise Micro 5.3:kernel-source-rt-5.14.21-150400.15.124.1.noarch",
            "SUSE Linux Enterprise Micro 5.4:kernel-rt-5.14.21-150400.15.124.1.x86_64",
            "SUSE Linux Enterprise Micro 5.4:kernel-source-rt-5.14.21-150400.15.124.1.noarch"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2025-07-15T14:31:46Z",
          "details": "moderate"
        }
      ],
      "title": "CVE-2022-50073"
    },
    {
      "cve": "CVE-2022-50074",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2022-50074"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "In the Linux kernel, the following vulnerability has been resolved:\n\napparmor: Fix memleak in aa_simple_write_to_buffer()\n\nWhen copy_from_user failed, the memory is freed by kvfree. however the\nmanagement struct and data blob are allocated independently, so only\nkvfree(data) cause a memleak issue here. Use aa_put_loaddata(data) to\nfix this issue.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "SUSE Linux Enterprise Micro 5.3:kernel-rt-5.14.21-150400.15.124.1.x86_64",
          "SUSE Linux Enterprise Micro 5.3:kernel-source-rt-5.14.21-150400.15.124.1.noarch",
          "SUSE Linux Enterprise Micro 5.4:kernel-rt-5.14.21-150400.15.124.1.x86_64",
          "SUSE Linux Enterprise Micro 5.4:kernel-source-rt-5.14.21-150400.15.124.1.noarch"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2022-50074",
          "url": "https://www.suse.com/security/cve/CVE-2022-50074"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1244965 for CVE-2022-50074",
          "url": "https://bugzilla.suse.com/1244965"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "SUSE Linux Enterprise Micro 5.3:kernel-rt-5.14.21-150400.15.124.1.x86_64",
            "SUSE Linux Enterprise Micro 5.3:kernel-source-rt-5.14.21-150400.15.124.1.noarch",
            "SUSE Linux Enterprise Micro 5.4:kernel-rt-5.14.21-150400.15.124.1.x86_64",
            "SUSE Linux Enterprise Micro 5.4:kernel-source-rt-5.14.21-150400.15.124.1.noarch"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 5.5,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
            "version": "3.1"
          },
          "products": [
            "SUSE Linux Enterprise Micro 5.3:kernel-rt-5.14.21-150400.15.124.1.x86_64",
            "SUSE Linux Enterprise Micro 5.3:kernel-source-rt-5.14.21-150400.15.124.1.noarch",
            "SUSE Linux Enterprise Micro 5.4:kernel-rt-5.14.21-150400.15.124.1.x86_64",
            "SUSE Linux Enterprise Micro 5.4:kernel-source-rt-5.14.21-150400.15.124.1.noarch"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2025-07-15T14:31:46Z",
          "details": "moderate"
        }
      ],
      "title": "CVE-2022-50074"
    },
    {
      "cve": "CVE-2022-50076",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2022-50076"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "In the Linux kernel, the following vulnerability has been resolved:\n\ncifs: Fix memory leak on the deferred close\n\nxfstests on smb21 report kmemleak as below:\n\n  unreferenced object 0xffff8881767d6200 (size 64):\n    comm \"xfs_io\", pid 1284, jiffies 4294777434 (age 20.789s)\n    hex dump (first 32 bytes):\n      80 5a d0 11 81 88 ff ff 78 8a aa 63 81 88 ff ff  .Z......x..c....\n      00 71 99 76 81 88 ff ff 00 00 00 00 00 00 00 00  .q.v............\n    backtrace:\n      [\u003c00000000ad04e6ea\u003e] cifs_close+0x92/0x2c0\n      [\u003c0000000028b93c82\u003e] __fput+0xff/0x3f0\n      [\u003c00000000d8116851\u003e] task_work_run+0x85/0xc0\n      [\u003c0000000027e14f9e\u003e] do_exit+0x5e5/0x1240\n      [\u003c00000000fb492b95\u003e] do_group_exit+0x58/0xe0\n      [\u003c00000000129a32d9\u003e] __x64_sys_exit_group+0x28/0x30\n      [\u003c00000000e3f7d8e9\u003e] do_syscall_64+0x35/0x80\n      [\u003c00000000102e8a0b\u003e] entry_SYSCALL_64_after_hwframe+0x46/0xb0\n\nWhen cancel the deferred close work, we should also cleanup the struct\ncifs_deferred_close.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "SUSE Linux Enterprise Micro 5.3:kernel-rt-5.14.21-150400.15.124.1.x86_64",
          "SUSE Linux Enterprise Micro 5.3:kernel-source-rt-5.14.21-150400.15.124.1.noarch",
          "SUSE Linux Enterprise Micro 5.4:kernel-rt-5.14.21-150400.15.124.1.x86_64",
          "SUSE Linux Enterprise Micro 5.4:kernel-source-rt-5.14.21-150400.15.124.1.noarch"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2022-50076",
          "url": "https://www.suse.com/security/cve/CVE-2022-50076"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1244983 for CVE-2022-50076",
          "url": "https://bugzilla.suse.com/1244983"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "SUSE Linux Enterprise Micro 5.3:kernel-rt-5.14.21-150400.15.124.1.x86_64",
            "SUSE Linux Enterprise Micro 5.3:kernel-source-rt-5.14.21-150400.15.124.1.noarch",
            "SUSE Linux Enterprise Micro 5.4:kernel-rt-5.14.21-150400.15.124.1.x86_64",
            "SUSE Linux Enterprise Micro 5.4:kernel-source-rt-5.14.21-150400.15.124.1.noarch"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 5.5,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
            "version": "3.1"
          },
          "products": [
            "SUSE Linux Enterprise Micro 5.3:kernel-rt-5.14.21-150400.15.124.1.x86_64",
            "SUSE Linux Enterprise Micro 5.3:kernel-source-rt-5.14.21-150400.15.124.1.noarch",
            "SUSE Linux Enterprise Micro 5.4:kernel-rt-5.14.21-150400.15.124.1.x86_64",
            "SUSE Linux Enterprise Micro 5.4:kernel-source-rt-5.14.21-150400.15.124.1.noarch"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2025-07-15T14:31:46Z",
          "details": "moderate"
        }
      ],
      "title": "CVE-2022-50076"
    },
    {
      "cve": "CVE-2022-50077",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2022-50077"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "In the Linux kernel, the following vulnerability has been resolved:\n\napparmor: fix reference count leak in aa_pivotroot()\n\nThe aa_pivotroot() function has a reference counting bug in a specific\npath. When aa_replace_current_label() returns on success, the function\nforgets to decrement the reference count of \"target\", which is\nincreased earlier by build_pivotroot(), causing a reference leak.\n\nFix it by decreasing the refcount of \"target\" in that path.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "SUSE Linux Enterprise Micro 5.3:kernel-rt-5.14.21-150400.15.124.1.x86_64",
          "SUSE Linux Enterprise Micro 5.3:kernel-source-rt-5.14.21-150400.15.124.1.noarch",
          "SUSE Linux Enterprise Micro 5.4:kernel-rt-5.14.21-150400.15.124.1.x86_64",
          "SUSE Linux Enterprise Micro 5.4:kernel-source-rt-5.14.21-150400.15.124.1.noarch"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2022-50077",
          "url": "https://www.suse.com/security/cve/CVE-2022-50077"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1244977 for CVE-2022-50077",
          "url": "https://bugzilla.suse.com/1244977"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "SUSE Linux Enterprise Micro 5.3:kernel-rt-5.14.21-150400.15.124.1.x86_64",
            "SUSE Linux Enterprise Micro 5.3:kernel-source-rt-5.14.21-150400.15.124.1.noarch",
            "SUSE Linux Enterprise Micro 5.4:kernel-rt-5.14.21-150400.15.124.1.x86_64",
            "SUSE Linux Enterprise Micro 5.4:kernel-source-rt-5.14.21-150400.15.124.1.noarch"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 5.5,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
            "version": "3.1"
          },
          "products": [
            "SUSE Linux Enterprise Micro 5.3:kernel-rt-5.14.21-150400.15.124.1.x86_64",
            "SUSE Linux Enterprise Micro 5.3:kernel-source-rt-5.14.21-150400.15.124.1.noarch",
            "SUSE Linux Enterprise Micro 5.4:kernel-rt-5.14.21-150400.15.124.1.x86_64",
            "SUSE Linux Enterprise Micro 5.4:kernel-source-rt-5.14.21-150400.15.124.1.noarch"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2025-07-15T14:31:46Z",
          "details": "moderate"
        }
      ],
      "title": "CVE-2022-50077"
    },
    {
      "cve": "CVE-2022-50079",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2022-50079"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "In the Linux kernel, the following vulnerability has been resolved:\n\ndrm/amd/display: Check correct bounds for stream encoder instances for DCN303\n\n[Why \u0026 How]\neng_id for DCN303 cannot be more than 1, since we have only two\ninstances of stream encoders.\n\nCheck the correct boundary condition for engine ID for DCN303 prevent\nthe potential out of bounds access.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "SUSE Linux Enterprise Micro 5.3:kernel-rt-5.14.21-150400.15.124.1.x86_64",
          "SUSE Linux Enterprise Micro 5.3:kernel-source-rt-5.14.21-150400.15.124.1.noarch",
          "SUSE Linux Enterprise Micro 5.4:kernel-rt-5.14.21-150400.15.124.1.x86_64",
          "SUSE Linux Enterprise Micro 5.4:kernel-source-rt-5.14.21-150400.15.124.1.noarch"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2022-50079",
          "url": "https://www.suse.com/security/cve/CVE-2022-50079"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1244970 for CVE-2022-50079",
          "url": "https://bugzilla.suse.com/1244970"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "SUSE Linux Enterprise Micro 5.3:kernel-rt-5.14.21-150400.15.124.1.x86_64",
            "SUSE Linux Enterprise Micro 5.3:kernel-source-rt-5.14.21-150400.15.124.1.noarch",
            "SUSE Linux Enterprise Micro 5.4:kernel-rt-5.14.21-150400.15.124.1.x86_64",
            "SUSE Linux Enterprise Micro 5.4:kernel-source-rt-5.14.21-150400.15.124.1.noarch"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 5.5,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
            "version": "3.1"
          },
          "products": [
            "SUSE Linux Enterprise Micro 5.3:kernel-rt-5.14.21-150400.15.124.1.x86_64",
            "SUSE Linux Enterprise Micro 5.3:kernel-source-rt-5.14.21-150400.15.124.1.noarch",
            "SUSE Linux Enterprise Micro 5.4:kernel-rt-5.14.21-150400.15.124.1.x86_64",
            "SUSE Linux Enterprise Micro 5.4:kernel-source-rt-5.14.21-150400.15.124.1.noarch"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2025-07-15T14:31:46Z",
          "details": "moderate"
        }
      ],
      "title": "CVE-2022-50079"
    },
    {
      "cve": "CVE-2022-50083",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2022-50083"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "In the Linux kernel, the following vulnerability has been resolved:\n\next4: add EXT4_INODE_HAS_XATTR_SPACE macro in xattr.h\n\nWhen adding an xattr to an inode, we must ensure that the inode_size is\nnot less than EXT4_GOOD_OLD_INODE_SIZE + extra_isize + pad. Otherwise,\nthe end position may be greater than the start position, resulting in UAF.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "SUSE Linux Enterprise Micro 5.3:kernel-rt-5.14.21-150400.15.124.1.x86_64",
          "SUSE Linux Enterprise Micro 5.3:kernel-source-rt-5.14.21-150400.15.124.1.noarch",
          "SUSE Linux Enterprise Micro 5.4:kernel-rt-5.14.21-150400.15.124.1.x86_64",
          "SUSE Linux Enterprise Micro 5.4:kernel-source-rt-5.14.21-150400.15.124.1.noarch"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2022-50083",
          "url": "https://www.suse.com/security/cve/CVE-2022-50083"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1244968 for CVE-2022-50083",
          "url": "https://bugzilla.suse.com/1244968"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "SUSE Linux Enterprise Micro 5.3:kernel-rt-5.14.21-150400.15.124.1.x86_64",
            "SUSE Linux Enterprise Micro 5.3:kernel-source-rt-5.14.21-150400.15.124.1.noarch",
            "SUSE Linux Enterprise Micro 5.4:kernel-rt-5.14.21-150400.15.124.1.x86_64",
            "SUSE Linux Enterprise Micro 5.4:kernel-source-rt-5.14.21-150400.15.124.1.noarch"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 5.5,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
            "version": "3.1"
          },
          "products": [
            "SUSE Linux Enterprise Micro 5.3:kernel-rt-5.14.21-150400.15.124.1.x86_64",
            "SUSE Linux Enterprise Micro 5.3:kernel-source-rt-5.14.21-150400.15.124.1.noarch",
            "SUSE Linux Enterprise Micro 5.4:kernel-rt-5.14.21-150400.15.124.1.x86_64",
            "SUSE Linux Enterprise Micro 5.4:kernel-source-rt-5.14.21-150400.15.124.1.noarch"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2025-07-15T14:31:46Z",
          "details": "moderate"
        }
      ],
      "title": "CVE-2022-50083"
    },
    {
      "cve": "CVE-2022-50084",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2022-50084"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "In the Linux kernel, the following vulnerability has been resolved:\n\ndm raid: fix address sanitizer warning in raid_status\n\nThere is this warning when using a kernel with the address sanitizer\nand running this testsuite:\nhttps://gitlab.com/cki-project/kernel-tests/-/tree/main/storage/swraid/scsi_raid\n\n==================================================================\nBUG: KASAN: slab-out-of-bounds in raid_status+0x1747/0x2820 [dm_raid]\nRead of size 4 at addr ffff888079d2c7e8 by task lvcreate/13319\nCPU: 0 PID: 13319 Comm: lvcreate Not tainted 5.18.0-0.rc3.\u003csnip\u003e #1\nHardware name: Red Hat KVM, BIOS 0.5.1 01/01/2011\nCall Trace:\n \u003cTASK\u003e\n dump_stack_lvl+0x6a/0x9c\n print_address_description.constprop.0+0x1f/0x1e0\n print_report.cold+0x55/0x244\n kasan_report+0xc9/0x100\n raid_status+0x1747/0x2820 [dm_raid]\n dm_ima_measure_on_table_load+0x4b8/0xca0 [dm_mod]\n table_load+0x35c/0x630 [dm_mod]\n ctl_ioctl+0x411/0x630 [dm_mod]\n dm_ctl_ioctl+0xa/0x10 [dm_mod]\n __x64_sys_ioctl+0x12a/0x1a0\n do_syscall_64+0x5b/0x80\n\nThe warning is caused by reading conf-\u003emax_nr_stripes in raid_status. The\ncode in raid_status reads mddev-\u003eprivate, casts it to struct r5conf and\nreads the entry max_nr_stripes.\n\nHowever, if we have different raid type than 4/5/6, mddev-\u003eprivate\ndoesn\u0027t point to struct r5conf; it may point to struct r0conf, struct\nr1conf, struct r10conf or struct mpconf. If we cast a pointer to one\nof these structs to struct r5conf, we will be reading invalid memory\nand KASAN warns about it.\n\nFix this bug by reading struct r5conf only if raid type is 4, 5 or 6.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "SUSE Linux Enterprise Micro 5.3:kernel-rt-5.14.21-150400.15.124.1.x86_64",
          "SUSE Linux Enterprise Micro 5.3:kernel-source-rt-5.14.21-150400.15.124.1.noarch",
          "SUSE Linux Enterprise Micro 5.4:kernel-rt-5.14.21-150400.15.124.1.x86_64",
          "SUSE Linux Enterprise Micro 5.4:kernel-source-rt-5.14.21-150400.15.124.1.noarch"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2022-50084",
          "url": "https://www.suse.com/security/cve/CVE-2022-50084"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1245117 for CVE-2022-50084",
          "url": "https://bugzilla.suse.com/1245117"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "SUSE Linux Enterprise Micro 5.3:kernel-rt-5.14.21-150400.15.124.1.x86_64",
            "SUSE Linux Enterprise Micro 5.3:kernel-source-rt-5.14.21-150400.15.124.1.noarch",
            "SUSE Linux Enterprise Micro 5.4:kernel-rt-5.14.21-150400.15.124.1.x86_64",
            "SUSE Linux Enterprise Micro 5.4:kernel-source-rt-5.14.21-150400.15.124.1.noarch"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 5.5,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
            "version": "3.1"
          },
          "products": [
            "SUSE Linux Enterprise Micro 5.3:kernel-rt-5.14.21-150400.15.124.1.x86_64",
            "SUSE Linux Enterprise Micro 5.3:kernel-source-rt-5.14.21-150400.15.124.1.noarch",
            "SUSE Linux Enterprise Micro 5.4:kernel-rt-5.14.21-150400.15.124.1.x86_64",
            "SUSE Linux Enterprise Micro 5.4:kernel-source-rt-5.14.21-150400.15.124.1.noarch"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2025-07-15T14:31:46Z",
          "details": "moderate"
        }
      ],
      "title": "CVE-2022-50084"
    },
    {
      "cve": "CVE-2022-50085",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2022-50085"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "In the Linux kernel, the following vulnerability has been resolved:\n\ndm raid: fix address sanitizer warning in raid_resume\n\nThere is a KASAN warning in raid_resume when running the lvm test\nlvconvert-raid.sh. The reason for the warning is that mddev-\u003eraid_disks\nis greater than rs-\u003eraid_disks, so the loop touches one entry beyond\nthe allocated length.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "SUSE Linux Enterprise Micro 5.3:kernel-rt-5.14.21-150400.15.124.1.x86_64",
          "SUSE Linux Enterprise Micro 5.3:kernel-source-rt-5.14.21-150400.15.124.1.noarch",
          "SUSE Linux Enterprise Micro 5.4:kernel-rt-5.14.21-150400.15.124.1.x86_64",
          "SUSE Linux Enterprise Micro 5.4:kernel-source-rt-5.14.21-150400.15.124.1.noarch"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2022-50085",
          "url": "https://www.suse.com/security/cve/CVE-2022-50085"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1245147 for CVE-2022-50085",
          "url": "https://bugzilla.suse.com/1245147"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "SUSE Linux Enterprise Micro 5.3:kernel-rt-5.14.21-150400.15.124.1.x86_64",
            "SUSE Linux Enterprise Micro 5.3:kernel-source-rt-5.14.21-150400.15.124.1.noarch",
            "SUSE Linux Enterprise Micro 5.4:kernel-rt-5.14.21-150400.15.124.1.x86_64",
            "SUSE Linux Enterprise Micro 5.4:kernel-source-rt-5.14.21-150400.15.124.1.noarch"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 6.6,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:P/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
            "version": "3.1"
          },
          "products": [
            "SUSE Linux Enterprise Micro 5.3:kernel-rt-5.14.21-150400.15.124.1.x86_64",
            "SUSE Linux Enterprise Micro 5.3:kernel-source-rt-5.14.21-150400.15.124.1.noarch",
            "SUSE Linux Enterprise Micro 5.4:kernel-rt-5.14.21-150400.15.124.1.x86_64",
            "SUSE Linux Enterprise Micro 5.4:kernel-source-rt-5.14.21-150400.15.124.1.noarch"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2025-07-15T14:31:46Z",
          "details": "moderate"
        }
      ],
      "title": "CVE-2022-50085"
    },
    {
      "cve": "CVE-2022-50087",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2022-50087"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "In the Linux kernel, the following vulnerability has been resolved:\n\nfirmware: arm_scpi: Ensure scpi_info is not assigned if the probe fails\n\nWhen scpi probe fails, at any point, we need to ensure that the scpi_info\nis not set and will remain NULL until the probe succeeds. If it is not\ntaken care, then it could result use-after-free as the value is exported\nvia get_scpi_ops() and could refer to a memory allocated via devm_kzalloc()\nbut freed when the probe fails.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "SUSE Linux Enterprise Micro 5.3:kernel-rt-5.14.21-150400.15.124.1.x86_64",
          "SUSE Linux Enterprise Micro 5.3:kernel-source-rt-5.14.21-150400.15.124.1.noarch",
          "SUSE Linux Enterprise Micro 5.4:kernel-rt-5.14.21-150400.15.124.1.x86_64",
          "SUSE Linux Enterprise Micro 5.4:kernel-source-rt-5.14.21-150400.15.124.1.noarch"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2022-50087",
          "url": "https://www.suse.com/security/cve/CVE-2022-50087"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1245119 for CVE-2022-50087",
          "url": "https://bugzilla.suse.com/1245119"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1245294 for CVE-2022-50087",
          "url": "https://bugzilla.suse.com/1245294"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "SUSE Linux Enterprise Micro 5.3:kernel-rt-5.14.21-150400.15.124.1.x86_64",
            "SUSE Linux Enterprise Micro 5.3:kernel-source-rt-5.14.21-150400.15.124.1.noarch",
            "SUSE Linux Enterprise Micro 5.4:kernel-rt-5.14.21-150400.15.124.1.x86_64",
            "SUSE Linux Enterprise Micro 5.4:kernel-source-rt-5.14.21-150400.15.124.1.noarch"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 7,
            "baseSeverity": "HIGH",
            "vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H",
            "version": "3.1"
          },
          "products": [
            "SUSE Linux Enterprise Micro 5.3:kernel-rt-5.14.21-150400.15.124.1.x86_64",
            "SUSE Linux Enterprise Micro 5.3:kernel-source-rt-5.14.21-150400.15.124.1.noarch",
            "SUSE Linux Enterprise Micro 5.4:kernel-rt-5.14.21-150400.15.124.1.x86_64",
            "SUSE Linux Enterprise Micro 5.4:kernel-source-rt-5.14.21-150400.15.124.1.noarch"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2025-07-15T14:31:46Z",
          "details": "important"
        }
      ],
      "title": "CVE-2022-50087"
    },
    {
      "cve": "CVE-2022-50092",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2022-50092"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "In the Linux kernel, the following vulnerability has been resolved:\n\ndm thin: fix use-after-free crash in dm_sm_register_threshold_callback\n\nFault inject on pool metadata device reports:\n  BUG: KASAN: use-after-free in dm_pool_register_metadata_threshold+0x40/0x80\n  Read of size 8 at addr ffff8881b9d50068 by task dmsetup/950\n\n  CPU: 7 PID: 950 Comm: dmsetup Tainted: G        W         5.19.0-rc6 #1\n  Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.14.0-1.fc33 04/01/2014\n  Call Trace:\n   \u003cTASK\u003e\n   dump_stack_lvl+0x34/0x44\n   print_address_description.constprop.0.cold+0xeb/0x3f4\n   kasan_report.cold+0xe6/0x147\n   dm_pool_register_metadata_threshold+0x40/0x80\n   pool_ctr+0xa0a/0x1150\n   dm_table_add_target+0x2c8/0x640\n   table_load+0x1fd/0x430\n   ctl_ioctl+0x2c4/0x5a0\n   dm_ctl_ioctl+0xa/0x10\n   __x64_sys_ioctl+0xb3/0xd0\n   do_syscall_64+0x35/0x80\n   entry_SYSCALL_64_after_hwframe+0x46/0xb0\n\nThis can be easily reproduced using:\n  echo offline \u003e /sys/block/sda/device/state\n  dd if=/dev/zero of=/dev/mapper/thin bs=4k count=10\n  dmsetup load pool --table \"0 20971520 thin-pool /dev/sda /dev/sdb 128 0 0\"\n\nIf a metadata commit fails, the transaction will be aborted and the\nmetadata space maps will be destroyed. If a DM table reload then\nhappens for this failed thin-pool, a use-after-free will occur in\ndm_sm_register_threshold_callback (called from\ndm_pool_register_metadata_threshold).\n\nFix this by in dm_pool_register_metadata_threshold() by returning the\n-EINVAL error if the thin-pool is in fail mode. Also fail pool_ctr()\nwith a new error message: \"Error registering metadata threshold\".",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "SUSE Linux Enterprise Micro 5.3:kernel-rt-5.14.21-150400.15.124.1.x86_64",
          "SUSE Linux Enterprise Micro 5.3:kernel-source-rt-5.14.21-150400.15.124.1.noarch",
          "SUSE Linux Enterprise Micro 5.4:kernel-rt-5.14.21-150400.15.124.1.x86_64",
          "SUSE Linux Enterprise Micro 5.4:kernel-source-rt-5.14.21-150400.15.124.1.noarch"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2022-50092",
          "url": "https://www.suse.com/security/cve/CVE-2022-50092"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1244848 for CVE-2022-50092",
          "url": "https://bugzilla.suse.com/1244848"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "SUSE Linux Enterprise Micro 5.3:kernel-rt-5.14.21-150400.15.124.1.x86_64",
            "SUSE Linux Enterprise Micro 5.3:kernel-source-rt-5.14.21-150400.15.124.1.noarch",
            "SUSE Linux Enterprise Micro 5.4:kernel-rt-5.14.21-150400.15.124.1.x86_64",
            "SUSE Linux Enterprise Micro 5.4:kernel-source-rt-5.14.21-150400.15.124.1.noarch"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 5.5,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
            "version": "3.1"
          },
          "products": [
            "SUSE Linux Enterprise Micro 5.3:kernel-rt-5.14.21-150400.15.124.1.x86_64",
            "SUSE Linux Enterprise Micro 5.3:kernel-source-rt-5.14.21-150400.15.124.1.noarch",
            "SUSE Linux Enterprise Micro 5.4:kernel-rt-5.14.21-150400.15.124.1.x86_64",
            "SUSE Linux Enterprise Micro 5.4:kernel-source-rt-5.14.21-150400.15.124.1.noarch"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2025-07-15T14:31:46Z",
          "details": "moderate"
        }
      ],
      "title": "CVE-2022-50092"
    },
    {
      "cve": "CVE-2022-50093",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2022-50093"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "In the Linux kernel, the following vulnerability has been resolved:\n\niommu/vt-d: avoid invalid memory access via node_online(NUMA_NO_NODE)\n\nKASAN reports:\n\n[ 4.668325][ T0] BUG: KASAN: wild-memory-access in dmar_parse_one_rhsa (arch/x86/include/asm/bitops.h:214 arch/x86/include/asm/bitops.h:226 include/asm-generic/bitops/instrumented-non-atomic.h:142 include/linux/nodemask.h:415 drivers/iommu/intel/dmar.c:497)\n[    4.676149][    T0] Read of size 8 at addr 1fffffff85115558 by task swapper/0/0\n[    4.683454][    T0]\n[    4.685638][    T0] CPU: 0 PID: 0 Comm: swapper/0 Not tainted 5.19.0-rc3-00004-g0e862838f290 #1\n[    4.694331][    T0] Hardware name: Supermicro SYS-5018D-FN4T/X10SDV-8C-TLN4F, BIOS 1.1 03/02/2016\n[    4.703196][    T0] Call Trace:\n[    4.706334][    T0]  \u003cTASK\u003e\n[ 4.709133][ T0] ? dmar_parse_one_rhsa (arch/x86/include/asm/bitops.h:214 arch/x86/include/asm/bitops.h:226 include/asm-generic/bitops/instrumented-non-atomic.h:142 include/linux/nodemask.h:415 drivers/iommu/intel/dmar.c:497)\n\nafter converting the type of the first argument (@nr, bit number)\nof arch_test_bit() from `long` to `unsigned long`[0].\n\nUnder certain conditions (for example, when ACPI NUMA is disabled\nvia command line), pxm_to_node() can return %NUMA_NO_NODE (-1).\nIt is valid \u0027magic\u0027 number of NUMA node, but not valid bit number\nto use in bitops.\nnode_online() eventually descends to test_bit() without checking\nfor the input, assuming it\u0027s on caller side (which might be good\nfor perf-critical tasks). There, -1 becomes %ULONG_MAX which leads\nto an insane array index when calculating bit position in memory.\n\nFor now, add an explicit check for @node being not %NUMA_NO_NODE\nbefore calling test_bit(). The actual logics didn\u0027t change here\nat all.\n\n[0] https://github.com/norov/linux/commit/0e862838f290147ea9c16db852d8d494b552d38d",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "SUSE Linux Enterprise Micro 5.3:kernel-rt-5.14.21-150400.15.124.1.x86_64",
          "SUSE Linux Enterprise Micro 5.3:kernel-source-rt-5.14.21-150400.15.124.1.noarch",
          "SUSE Linux Enterprise Micro 5.4:kernel-rt-5.14.21-150400.15.124.1.x86_64",
          "SUSE Linux Enterprise Micro 5.4:kernel-source-rt-5.14.21-150400.15.124.1.noarch"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2022-50093",
          "url": "https://www.suse.com/security/cve/CVE-2022-50093"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1244849 for CVE-2022-50093",
          "url": "https://bugzilla.suse.com/1244849"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "SUSE Linux Enterprise Micro 5.3:kernel-rt-5.14.21-150400.15.124.1.x86_64",
            "SUSE Linux Enterprise Micro 5.3:kernel-source-rt-5.14.21-150400.15.124.1.noarch",
            "SUSE Linux Enterprise Micro 5.4:kernel-rt-5.14.21-150400.15.124.1.x86_64",
            "SUSE Linux Enterprise Micro 5.4:kernel-source-rt-5.14.21-150400.15.124.1.noarch"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 5.5,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
            "version": "3.1"
          },
          "products": [
            "SUSE Linux Enterprise Micro 5.3:kernel-rt-5.14.21-150400.15.124.1.x86_64",
            "SUSE Linux Enterprise Micro 5.3:kernel-source-rt-5.14.21-150400.15.124.1.noarch",
            "SUSE Linux Enterprise Micro 5.4:kernel-rt-5.14.21-150400.15.124.1.x86_64",
            "SUSE Linux Enterprise Micro 5.4:kernel-source-rt-5.14.21-150400.15.124.1.noarch"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2025-07-15T14:31:46Z",
          "details": "moderate"
        }
      ],
      "title": "CVE-2022-50093"
    },
    {
      "cve": "CVE-2022-50094",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2022-50094"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "In the Linux kernel, the following vulnerability has been resolved:\n\nspmi: trace: fix stack-out-of-bound access in SPMI tracing functions\n\ntrace_spmi_write_begin() and trace_spmi_read_end() both call\nmemcpy() with a length of \"len + 1\".  This leads to one extra\nbyte being read beyond the end of the specified buffer.  Fix\nthis out-of-bound memory access by using a length of \"len\"\ninstead.\n\nHere is a KASAN log showing the issue:\n\nBUG: KASAN: stack-out-of-bounds in trace_event_raw_event_spmi_read_end+0x1d0/0x234\nRead of size 2 at addr ffffffc0265b7540 by task thermal@2.0-ser/1314\n...\nCall trace:\n dump_backtrace+0x0/0x3e8\n show_stack+0x2c/0x3c\n dump_stack_lvl+0xdc/0x11c\n print_address_description+0x74/0x384\n kasan_report+0x188/0x268\n kasan_check_range+0x270/0x2b0\n memcpy+0x90/0xe8\n trace_event_raw_event_spmi_read_end+0x1d0/0x234\n spmi_read_cmd+0x294/0x3ac\n spmi_ext_register_readl+0x84/0x9c\n regmap_spmi_ext_read+0x144/0x1b0 [regmap_spmi]\n _regmap_raw_read+0x40c/0x754\n regmap_raw_read+0x3a0/0x514\n regmap_bulk_read+0x418/0x494\n adc5_gen3_poll_wait_hs+0xe8/0x1e0 [qcom_spmi_adc5_gen3]\n ...\n __arm64_sys_read+0x4c/0x60\n invoke_syscall+0x80/0x218\n el0_svc_common+0xec/0x1c8\n ...\n\naddr ffffffc0265b7540 is located in stack of task thermal@2.0-ser/1314 at offset 32 in frame:\n adc5_gen3_poll_wait_hs+0x0/0x1e0 [qcom_spmi_adc5_gen3]\n\nthis frame has 1 object:\n [32, 33) \u0027status\u0027\n\nMemory state around the buggy address:\n ffffffc0265b7400: 00 00 00 00 00 00 00 00 00 00 00 00 f1 f1 f1 f1\n ffffffc0265b7480: 04 f3 f3 f3 00 00 00 00 00 00 00 00 00 00 00 00\n\u003effffffc0265b7500: 00 00 00 00 f1 f1 f1 f1 01 f3 f3 f3 00 00 00 00\n                                           ^\n ffffffc0265b7580: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00\n ffffffc0265b7600: f1 f1 f1 f1 01 f2 07 f2 f2 f2 01 f3 00 00 00 00\n==================================================================",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "SUSE Linux Enterprise Micro 5.3:kernel-rt-5.14.21-150400.15.124.1.x86_64",
          "SUSE Linux Enterprise Micro 5.3:kernel-source-rt-5.14.21-150400.15.124.1.noarch",
          "SUSE Linux Enterprise Micro 5.4:kernel-rt-5.14.21-150400.15.124.1.x86_64",
          "SUSE Linux Enterprise Micro 5.4:kernel-source-rt-5.14.21-150400.15.124.1.noarch"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2022-50094",
          "url": "https://www.suse.com/security/cve/CVE-2022-50094"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1244851 for CVE-2022-50094",
          "url": "https://bugzilla.suse.com/1244851"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "SUSE Linux Enterprise Micro 5.3:kernel-rt-5.14.21-150400.15.124.1.x86_64",
            "SUSE Linux Enterprise Micro 5.3:kernel-source-rt-5.14.21-150400.15.124.1.noarch",
            "SUSE Linux Enterprise Micro 5.4:kernel-rt-5.14.21-150400.15.124.1.x86_64",
            "SUSE Linux Enterprise Micro 5.4:kernel-source-rt-5.14.21-150400.15.124.1.noarch"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 5.5,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
            "version": "3.1"
          },
          "products": [
            "SUSE Linux Enterprise Micro 5.3:kernel-rt-5.14.21-150400.15.124.1.x86_64",
            "SUSE Linux Enterprise Micro 5.3:kernel-source-rt-5.14.21-150400.15.124.1.noarch",
            "SUSE Linux Enterprise Micro 5.4:kernel-rt-5.14.21-150400.15.124.1.x86_64",
            "SUSE Linux Enterprise Micro 5.4:kernel-source-rt-5.14.21-150400.15.124.1.noarch"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2025-07-15T14:31:46Z",
          "details": "moderate"
        }
      ],
      "title": "CVE-2022-50094"
    },
    {
      "cve": "CVE-2022-50095",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2022-50095"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "In the Linux kernel, the following vulnerability has been resolved:\n\nposix-cpu-timers: Cleanup CPU timers before freeing them during exec\n\nCommit 55e8c8eb2c7b (\"posix-cpu-timers: Store a reference to a pid not a\ntask\") started looking up tasks by PID when deleting a CPU timer.\n\nWhen a non-leader thread calls execve, it will switch PIDs with the leader\nprocess. Then, as it calls exit_itimers, posix_cpu_timer_del cannot find\nthe task because the timer still points out to the old PID.\n\nThat means that armed timers won\u0027t be disarmed, that is, they won\u0027t be\nremoved from the timerqueue_list. exit_itimers will still release their\nmemory, and when that list is later processed, it leads to a\nuse-after-free.\n\nClean up the timers from the de-threaded task before freeing them. This\nprevents a reported use-after-free.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "SUSE Linux Enterprise Micro 5.3:kernel-rt-5.14.21-150400.15.124.1.x86_64",
          "SUSE Linux Enterprise Micro 5.3:kernel-source-rt-5.14.21-150400.15.124.1.noarch",
          "SUSE Linux Enterprise Micro 5.4:kernel-rt-5.14.21-150400.15.124.1.x86_64",
          "SUSE Linux Enterprise Micro 5.4:kernel-source-rt-5.14.21-150400.15.124.1.noarch"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2022-50095",
          "url": "https://www.suse.com/security/cve/CVE-2022-50095"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1244846 for CVE-2022-50095",
          "url": "https://bugzilla.suse.com/1244846"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "SUSE Linux Enterprise Micro 5.3:kernel-rt-5.14.21-150400.15.124.1.x86_64",
            "SUSE Linux Enterprise Micro 5.3:kernel-source-rt-5.14.21-150400.15.124.1.noarch",
            "SUSE Linux Enterprise Micro 5.4:kernel-rt-5.14.21-150400.15.124.1.x86_64",
            "SUSE Linux Enterprise Micro 5.4:kernel-source-rt-5.14.21-150400.15.124.1.noarch"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 5.5,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
            "version": "3.1"
          },
          "products": [
            "SUSE Linux Enterprise Micro 5.3:kernel-rt-5.14.21-150400.15.124.1.x86_64",
            "SUSE Linux Enterprise Micro 5.3:kernel-source-rt-5.14.21-150400.15.124.1.noarch",
            "SUSE Linux Enterprise Micro 5.4:kernel-rt-5.14.21-150400.15.124.1.x86_64",
            "SUSE Linux Enterprise Micro 5.4:kernel-source-rt-5.14.21-150400.15.124.1.noarch"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2025-07-15T14:31:46Z",
          "details": "moderate"
        }
      ],
      "title": "CVE-2022-50095"
    },
    {
      "cve": "CVE-2022-50097",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2022-50097"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "In the Linux kernel, the following vulnerability has been resolved:\n\nvideo: fbdev: s3fb: Check the size of screen before memset_io()\n\nIn the function s3fb_set_par(), the value of \u0027screen_size\u0027 is\ncalculated by the user input. If the user provides the improper value,\nthe value of \u0027screen_size\u0027 may larger than \u0027info-\u003escreen_size\u0027, which\nmay cause the following bug:\n\n[   54.083733] BUG: unable to handle page fault for address: ffffc90003000000\n[   54.083742] #PF: supervisor write access in kernel mode\n[   54.083744] #PF: error_code(0x0002) - not-present page\n[   54.083760] RIP: 0010:memset_orig+0x33/0xb0\n[   54.083782] Call Trace:\n[   54.083788]  s3fb_set_par+0x1ec6/0x4040\n[   54.083806]  fb_set_var+0x604/0xeb0\n[   54.083836]  do_fb_ioctl+0x234/0x670\n\nFix the this by checking the value of \u0027screen_size\u0027 before memset_io().",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "SUSE Linux Enterprise Micro 5.3:kernel-rt-5.14.21-150400.15.124.1.x86_64",
          "SUSE Linux Enterprise Micro 5.3:kernel-source-rt-5.14.21-150400.15.124.1.noarch",
          "SUSE Linux Enterprise Micro 5.4:kernel-rt-5.14.21-150400.15.124.1.x86_64",
          "SUSE Linux Enterprise Micro 5.4:kernel-source-rt-5.14.21-150400.15.124.1.noarch"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2022-50097",
          "url": "https://www.suse.com/security/cve/CVE-2022-50097"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1244845 for CVE-2022-50097",
          "url": "https://bugzilla.suse.com/1244845"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "SUSE Linux Enterprise Micro 5.3:kernel-rt-5.14.21-150400.15.124.1.x86_64",
            "SUSE Linux Enterprise Micro 5.3:kernel-source-rt-5.14.21-150400.15.124.1.noarch",
            "SUSE Linux Enterprise Micro 5.4:kernel-rt-5.14.21-150400.15.124.1.x86_64",
            "SUSE Linux Enterprise Micro 5.4:kernel-source-rt-5.14.21-150400.15.124.1.noarch"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 5.5,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
            "version": "3.1"
          },
          "products": [
            "SUSE Linux Enterprise Micro 5.3:kernel-rt-5.14.21-150400.15.124.1.x86_64",
            "SUSE Linux Enterprise Micro 5.3:kernel-source-rt-5.14.21-150400.15.124.1.noarch",
            "SUSE Linux Enterprise Micro 5.4:kernel-rt-5.14.21-150400.15.124.1.x86_64",
            "SUSE Linux Enterprise Micro 5.4:kernel-source-rt-5.14.21-150400.15.124.1.noarch"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2025-07-15T14:31:46Z",
          "details": "moderate"
        }
      ],
      "title": "CVE-2022-50097"
    },
    {
      "cve": "CVE-2022-50098",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2022-50098"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "In the Linux kernel, the following vulnerability has been resolved:\n\nscsi: qla2xxx: Fix crash due to stale SRB access around I/O timeouts\n\nEnsure SRB is returned during I/O timeout error escalation. If that is not\npossible fail the escalation path.\n\nFollowing crash stack was seen:\n\nBUG: unable to handle kernel paging request at 0000002f56aa90f8\nIP: qla_chk_edif_rx_sa_delete_pending+0x14/0x30 [qla2xxx]\nCall Trace:\n ? qla2x00_status_entry+0x19f/0x1c50 [qla2xxx]\n ? qla2x00_start_sp+0x116/0x1170 [qla2xxx]\n ? dma_pool_alloc+0x1d6/0x210\n ? mempool_alloc+0x54/0x130\n ? qla24xx_process_response_queue+0x548/0x12b0 [qla2xxx]\n ? qla_do_work+0x2d/0x40 [qla2xxx]\n ? process_one_work+0x14c/0x390",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "SUSE Linux Enterprise Micro 5.3:kernel-rt-5.14.21-150400.15.124.1.x86_64",
          "SUSE Linux Enterprise Micro 5.3:kernel-source-rt-5.14.21-150400.15.124.1.noarch",
          "SUSE Linux Enterprise Micro 5.4:kernel-rt-5.14.21-150400.15.124.1.x86_64",
          "SUSE Linux Enterprise Micro 5.4:kernel-source-rt-5.14.21-150400.15.124.1.noarch"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2022-50098",
          "url": "https://www.suse.com/security/cve/CVE-2022-50098"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1244841 for CVE-2022-50098",
          "url": "https://bugzilla.suse.com/1244841"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "SUSE Linux Enterprise Micro 5.3:kernel-rt-5.14.21-150400.15.124.1.x86_64",
            "SUSE Linux Enterprise Micro 5.3:kernel-source-rt-5.14.21-150400.15.124.1.noarch",
            "SUSE Linux Enterprise Micro 5.4:kernel-rt-5.14.21-150400.15.124.1.x86_64",
            "SUSE Linux Enterprise Micro 5.4:kernel-source-rt-5.14.21-150400.15.124.1.noarch"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 5.5,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
            "version": "3.1"
          },
          "products": [
            "SUSE Linux Enterprise Micro 5.3:kernel-rt-5.14.21-150400.15.124.1.x86_64",
            "SUSE Linux Enterprise Micro 5.3:kernel-source-rt-5.14.21-150400.15.124.1.noarch",
            "SUSE Linux Enterprise Micro 5.4:kernel-rt-5.14.21-150400.15.124.1.x86_64",
            "SUSE Linux Enterprise Micro 5.4:kernel-source-rt-5.14.21-150400.15.124.1.noarch"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2025-07-15T14:31:46Z",
          "details": "moderate"
        }
      ],
      "title": "CVE-2022-50098"
    },
    {
      "cve": "CVE-2022-50099",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2022-50099"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "In the Linux kernel, the following vulnerability has been resolved:\n\nvideo: fbdev: arkfb: Check the size of screen before memset_io()\n\nIn the function arkfb_set_par(), the value of \u0027screen_size\u0027 is\ncalculated by the user input. If the user provides the improper value,\nthe value of \u0027screen_size\u0027 may larger than \u0027info-\u003escreen_size\u0027, which\nmay cause the following bug:\n\n[  659.399066] BUG: unable to handle page fault for address: ffffc90003000000\n[  659.399077] #PF: supervisor write access in kernel mode\n[  659.399079] #PF: error_code(0x0002) - not-present page\n[  659.399094] RIP: 0010:memset_orig+0x33/0xb0\n[  659.399116] Call Trace:\n[  659.399122]  arkfb_set_par+0x143f/0x24c0\n[  659.399130]  fb_set_var+0x604/0xeb0\n[  659.399161]  do_fb_ioctl+0x234/0x670\n[  659.399189]  fb_ioctl+0xdd/0x130\n\nFix the this by checking the value of \u0027screen_size\u0027 before memset_io().",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "SUSE Linux Enterprise Micro 5.3:kernel-rt-5.14.21-150400.15.124.1.x86_64",
          "SUSE Linux Enterprise Micro 5.3:kernel-source-rt-5.14.21-150400.15.124.1.noarch",
          "SUSE Linux Enterprise Micro 5.4:kernel-rt-5.14.21-150400.15.124.1.x86_64",
          "SUSE Linux Enterprise Micro 5.4:kernel-source-rt-5.14.21-150400.15.124.1.noarch"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2022-50099",
          "url": "https://www.suse.com/security/cve/CVE-2022-50099"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1244842 for CVE-2022-50099",
          "url": "https://bugzilla.suse.com/1244842"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "SUSE Linux Enterprise Micro 5.3:kernel-rt-5.14.21-150400.15.124.1.x86_64",
            "SUSE Linux Enterprise Micro 5.3:kernel-source-rt-5.14.21-150400.15.124.1.noarch",
            "SUSE Linux Enterprise Micro 5.4:kernel-rt-5.14.21-150400.15.124.1.x86_64",
            "SUSE Linux Enterprise Micro 5.4:kernel-source-rt-5.14.21-150400.15.124.1.noarch"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 5.5,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
            "version": "3.1"
          },
          "products": [
            "SUSE Linux Enterprise Micro 5.3:kernel-rt-5.14.21-150400.15.124.1.x86_64",
            "SUSE Linux Enterprise Micro 5.3:kernel-source-rt-5.14.21-150400.15.124.1.noarch",
            "SUSE Linux Enterprise Micro 5.4:kernel-rt-5.14.21-150400.15.124.1.x86_64",
            "SUSE Linux Enterprise Micro 5.4:kernel-source-rt-5.14.21-150400.15.124.1.noarch"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2025-07-15T14:31:46Z",
          "details": "moderate"
        }
      ],
      "title": "CVE-2022-50099"
    },
    {
      "cve": "CVE-2022-50100",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2022-50100"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "In the Linux kernel, the following vulnerability has been resolved:\n\nsched/core: Do not requeue task on CPU excluded from cpus_mask\n\nThe following warning was triggered on a large machine early in boot on\na distribution kernel but the same problem should also affect mainline.\n\n   WARNING: CPU: 439 PID: 10 at ../kernel/workqueue.c:2231 process_one_work+0x4d/0x440\n   Call Trace:\n    \u003cTASK\u003e\n    rescuer_thread+0x1f6/0x360\n    kthread+0x156/0x180\n    ret_from_fork+0x22/0x30\n    \u003c/TASK\u003e\n\nCommit c6e7bd7afaeb (\"sched/core: Optimize ttwu() spinning on p-\u003eon_cpu\")\noptimises ttwu by queueing a task that is descheduling on the wakelist,\nbut does not check if the task descheduling is still allowed to run on that CPU.\n\nIn this warning, the problematic task is a workqueue rescue thread which\nchecks if the rescue is for a per-cpu workqueue and running on the wrong CPU.\nWhile this is early in boot and it should be possible to create workers,\nthe rescue thread may still used if the MAYDAY_INITIAL_TIMEOUT is reached\nor MAYDAY_INTERVAL and on a sufficiently large machine, the rescue\nthread is being used frequently.\n\nTracing confirmed that the task should have migrated properly using the\nstopper thread to handle the migration. However, a parallel wakeup from udev\nrunning on another CPU that does not share CPU cache observes p-\u003eon_cpu and\nuses task_cpu(p), queues the task on the old CPU and triggers the warning.\n\nCheck that the wakee task that is descheduling is still allowed to run\non its current CPU and if not, wait for the descheduling to complete\nand select an allowed CPU.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "SUSE Linux Enterprise Micro 5.3:kernel-rt-5.14.21-150400.15.124.1.x86_64",
          "SUSE Linux Enterprise Micro 5.3:kernel-source-rt-5.14.21-150400.15.124.1.noarch",
          "SUSE Linux Enterprise Micro 5.4:kernel-rt-5.14.21-150400.15.124.1.x86_64",
          "SUSE Linux Enterprise Micro 5.4:kernel-source-rt-5.14.21-150400.15.124.1.noarch"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2022-50100",
          "url": "https://www.suse.com/security/cve/CVE-2022-50100"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1244843 for CVE-2022-50100",
          "url": "https://bugzilla.suse.com/1244843"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "SUSE Linux Enterprise Micro 5.3:kernel-rt-5.14.21-150400.15.124.1.x86_64",
            "SUSE Linux Enterprise Micro 5.3:kernel-source-rt-5.14.21-150400.15.124.1.noarch",
            "SUSE Linux Enterprise Micro 5.4:kernel-rt-5.14.21-150400.15.124.1.x86_64",
            "SUSE Linux Enterprise Micro 5.4:kernel-source-rt-5.14.21-150400.15.124.1.noarch"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 5.5,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
            "version": "3.1"
          },
          "products": [
            "SUSE Linux Enterprise Micro 5.3:kernel-rt-5.14.21-150400.15.124.1.x86_64",
            "SUSE Linux Enterprise Micro 5.3:kernel-source-rt-5.14.21-150400.15.124.1.noarch",
            "SUSE Linux Enterprise Micro 5.4:kernel-rt-5.14.21-150400.15.124.1.x86_64",
            "SUSE Linux Enterprise Micro 5.4:kernel-source-rt-5.14.21-150400.15.124.1.noarch"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2025-07-15T14:31:46Z",
          "details": "moderate"
        }
      ],
      "title": "CVE-2022-50100"
    },
    {
      "cve": "CVE-2022-50101",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2022-50101"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "In the Linux kernel, the following vulnerability has been resolved:\n\nvideo: fbdev: vt8623fb: Check the size of screen before memset_io()\n\nIn the function vt8623fb_set_par(), the value of \u0027screen_size\u0027 is\ncalculated by the user input. If the user provides the improper value,\nthe value of \u0027screen_size\u0027 may larger than \u0027info-\u003escreen_size\u0027, which\nmay cause the following bug:\n\n[  583.339036] BUG: unable to handle page fault for address: ffffc90005000000\n[  583.339049] #PF: supervisor write access in kernel mode\n[  583.339052] #PF: error_code(0x0002) - not-present page\n[  583.339074] RIP: 0010:memset_orig+0x33/0xb0\n[  583.339110] Call Trace:\n[  583.339118]  vt8623fb_set_par+0x11cd/0x21e0\n[  583.339146]  fb_set_var+0x604/0xeb0\n[  583.339181]  do_fb_ioctl+0x234/0x670\n[  583.339209]  fb_ioctl+0xdd/0x130\n\nFix the this by checking the value of \u0027screen_size\u0027 before memset_io().",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "SUSE Linux Enterprise Micro 5.3:kernel-rt-5.14.21-150400.15.124.1.x86_64",
          "SUSE Linux Enterprise Micro 5.3:kernel-source-rt-5.14.21-150400.15.124.1.noarch",
          "SUSE Linux Enterprise Micro 5.4:kernel-rt-5.14.21-150400.15.124.1.x86_64",
          "SUSE Linux Enterprise Micro 5.4:kernel-source-rt-5.14.21-150400.15.124.1.noarch"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2022-50101",
          "url": "https://www.suse.com/security/cve/CVE-2022-50101"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1244839 for CVE-2022-50101",
          "url": "https://bugzilla.suse.com/1244839"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "SUSE Linux Enterprise Micro 5.3:kernel-rt-5.14.21-150400.15.124.1.x86_64",
            "SUSE Linux Enterprise Micro 5.3:kernel-source-rt-5.14.21-150400.15.124.1.noarch",
            "SUSE Linux Enterprise Micro 5.4:kernel-rt-5.14.21-150400.15.124.1.x86_64",
            "SUSE Linux Enterprise Micro 5.4:kernel-source-rt-5.14.21-150400.15.124.1.noarch"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 5.5,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
            "version": "3.1"
          },
          "products": [
            "SUSE Linux Enterprise Micro 5.3:kernel-rt-5.14.21-150400.15.124.1.x86_64",
            "SUSE Linux Enterprise Micro 5.3:kernel-source-rt-5.14.21-150400.15.124.1.noarch",
            "SUSE Linux Enterprise Micro 5.4:kernel-rt-5.14.21-150400.15.124.1.x86_64",
            "SUSE Linux Enterprise Micro 5.4:kernel-source-rt-5.14.21-150400.15.124.1.noarch"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2025-07-15T14:31:46Z",
          "details": "moderate"
        }
      ],
      "title": "CVE-2022-50101"
    },
    {
      "cve": "CVE-2022-50102",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2022-50102"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "In the Linux kernel, the following vulnerability has been resolved:\n\nvideo: fbdev: arkfb: Fix a divide-by-zero bug in ark_set_pixclock()\n\nSince the user can control the arguments of the ioctl() from the user\nspace, under special arguments that may result in a divide-by-zero bug\nin:\n  drivers/video/fbdev/arkfb.c:784: ark_set_pixclock(info, (hdiv * info-\u003evar.pixclock) / hmul);\nwith hdiv=1, pixclock=1 and hmul=2 you end up with (1*1)/2 = (int) 0.\nand then in:\n  drivers/video/fbdev/arkfb.c:504: rv = dac_set_freq(par-\u003edac, 0, 1000000000 / pixclock);\nwe\u0027ll get a division-by-zero.\n\nThe following log can reveal it:\n\ndivide error: 0000 [#1] PREEMPT SMP KASAN PTI\nRIP: 0010:ark_set_pixclock drivers/video/fbdev/arkfb.c:504 [inline]\nRIP: 0010:arkfb_set_par+0x10fc/0x24c0 drivers/video/fbdev/arkfb.c:784\nCall Trace:\n fb_set_var+0x604/0xeb0 drivers/video/fbdev/core/fbmem.c:1034\n do_fb_ioctl+0x234/0x670 drivers/video/fbdev/core/fbmem.c:1110\n fb_ioctl+0xdd/0x130 drivers/video/fbdev/core/fbmem.c:1189\n\nFix this by checking the argument of ark_set_pixclock() first.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "SUSE Linux Enterprise Micro 5.3:kernel-rt-5.14.21-150400.15.124.1.x86_64",
          "SUSE Linux Enterprise Micro 5.3:kernel-source-rt-5.14.21-150400.15.124.1.noarch",
          "SUSE Linux Enterprise Micro 5.4:kernel-rt-5.14.21-150400.15.124.1.x86_64",
          "SUSE Linux Enterprise Micro 5.4:kernel-source-rt-5.14.21-150400.15.124.1.noarch"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2022-50102",
          "url": "https://www.suse.com/security/cve/CVE-2022-50102"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1244838 for CVE-2022-50102",
          "url": "https://bugzilla.suse.com/1244838"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "SUSE Linux Enterprise Micro 5.3:kernel-rt-5.14.21-150400.15.124.1.x86_64",
            "SUSE Linux Enterprise Micro 5.3:kernel-source-rt-5.14.21-150400.15.124.1.noarch",
            "SUSE Linux Enterprise Micro 5.4:kernel-rt-5.14.21-150400.15.124.1.x86_64",
            "SUSE Linux Enterprise Micro 5.4:kernel-source-rt-5.14.21-150400.15.124.1.noarch"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 5.5,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
            "version": "3.1"
          },
          "products": [
            "SUSE Linux Enterprise Micro 5.3:kernel-rt-5.14.21-150400.15.124.1.x86_64",
            "SUSE Linux Enterprise Micro 5.3:kernel-source-rt-5.14.21-150400.15.124.1.noarch",
            "SUSE Linux Enterprise Micro 5.4:kernel-rt-5.14.21-150400.15.124.1.x86_64",
            "SUSE Linux Enterprise Micro 5.4:kernel-source-rt-5.14.21-150400.15.124.1.noarch"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2025-07-15T14:31:46Z",
          "details": "moderate"
        }
      ],
      "title": "CVE-2022-50102"
    },
    {
      "cve": "CVE-2022-50103",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2022-50103"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "In the Linux kernel, the following vulnerability has been resolved:\n\nsched, cpuset: Fix dl_cpu_busy() panic due to empty cs-\u003ecpus_allowed\n\nWith cgroup v2, the cpuset\u0027s cpus_allowed mask can be empty indicating\nthat the cpuset will just use the effective CPUs of its parent. So\ncpuset_can_attach() can call task_can_attach() with an empty mask.\nThis can lead to cpumask_any_and() returns nr_cpu_ids causing the call\nto dl_bw_of() to crash due to percpu value access of an out of bound\nCPU value. For example:\n\n\t[80468.182258] BUG: unable to handle page fault for address: ffffffff8b6648b0\n\t  :\n\t[80468.191019] RIP: 0010:dl_cpu_busy+0x30/0x2b0\n\t  :\n\t[80468.207946] Call Trace:\n\t[80468.208947]  cpuset_can_attach+0xa0/0x140\n\t[80468.209953]  cgroup_migrate_execute+0x8c/0x490\n\t[80468.210931]  cgroup_update_dfl_csses+0x254/0x270\n\t[80468.211898]  cgroup_subtree_control_write+0x322/0x400\n\t[80468.212854]  kernfs_fop_write_iter+0x11c/0x1b0\n\t[80468.213777]  new_sync_write+0x11f/0x1b0\n\t[80468.214689]  vfs_write+0x1eb/0x280\n\t[80468.215592]  ksys_write+0x5f/0xe0\n\t[80468.216463]  do_syscall_64+0x5c/0x80\n\t[80468.224287]  entry_SYSCALL_64_after_hwframe+0x44/0xae\n\nFix that by using effective_cpus instead. For cgroup v1, effective_cpus\nis the same as cpus_allowed. For v2, effective_cpus is the real cpumask\nto be used by tasks within the cpuset anyway.\n\nAlso update task_can_attach()\u0027s 2nd argument name to cs_effective_cpus to\nreflect the change. In addition, a check is added to task_can_attach()\nto guard against the possibility that cpumask_any_and() may return a\nvalue \u003e= nr_cpu_ids.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "SUSE Linux Enterprise Micro 5.3:kernel-rt-5.14.21-150400.15.124.1.x86_64",
          "SUSE Linux Enterprise Micro 5.3:kernel-source-rt-5.14.21-150400.15.124.1.noarch",
          "SUSE Linux Enterprise Micro 5.4:kernel-rt-5.14.21-150400.15.124.1.x86_64",
          "SUSE Linux Enterprise Micro 5.4:kernel-source-rt-5.14.21-150400.15.124.1.noarch"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2022-50103",
          "url": "https://www.suse.com/security/cve/CVE-2022-50103"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1244840 for CVE-2022-50103",
          "url": "https://bugzilla.suse.com/1244840"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "SUSE Linux Enterprise Micro 5.3:kernel-rt-5.14.21-150400.15.124.1.x86_64",
            "SUSE Linux Enterprise Micro 5.3:kernel-source-rt-5.14.21-150400.15.124.1.noarch",
            "SUSE Linux Enterprise Micro 5.4:kernel-rt-5.14.21-150400.15.124.1.x86_64",
            "SUSE Linux Enterprise Micro 5.4:kernel-source-rt-5.14.21-150400.15.124.1.noarch"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 5.5,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
            "version": "3.1"
          },
          "products": [
            "SUSE Linux Enterprise Micro 5.3:kernel-rt-5.14.21-150400.15.124.1.x86_64",
            "SUSE Linux Enterprise Micro 5.3:kernel-source-rt-5.14.21-150400.15.124.1.noarch",
            "SUSE Linux Enterprise Micro 5.4:kernel-rt-5.14.21-150400.15.124.1.x86_64",
            "SUSE Linux Enterprise Micro 5.4:kernel-source-rt-5.14.21-150400.15.124.1.noarch"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2025-07-15T14:31:46Z",
          "details": "moderate"
        }
      ],
      "title": "CVE-2022-50103"
    },
    {
      "cve": "CVE-2022-50104",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2022-50104"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "In the Linux kernel, the following vulnerability has been resolved:\n\npowerpc/xive: Fix refcount leak in xive_get_max_prio\n\nof_find_node_by_path() returns a node pointer with\nrefcount incremented, we should use of_node_put() on it when done.\nAdd missing of_node_put() to avoid refcount leak.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "SUSE Linux Enterprise Micro 5.3:kernel-rt-5.14.21-150400.15.124.1.x86_64",
          "SUSE Linux Enterprise Micro 5.3:kernel-source-rt-5.14.21-150400.15.124.1.noarch",
          "SUSE Linux Enterprise Micro 5.4:kernel-rt-5.14.21-150400.15.124.1.x86_64",
          "SUSE Linux Enterprise Micro 5.4:kernel-source-rt-5.14.21-150400.15.124.1.noarch"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2022-50104",
          "url": "https://www.suse.com/security/cve/CVE-2022-50104"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1244836 for CVE-2022-50104",
          "url": "https://bugzilla.suse.com/1244836"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "SUSE Linux Enterprise Micro 5.3:kernel-rt-5.14.21-150400.15.124.1.x86_64",
            "SUSE Linux Enterprise Micro 5.3:kernel-source-rt-5.14.21-150400.15.124.1.noarch",
            "SUSE Linux Enterprise Micro 5.4:kernel-rt-5.14.21-150400.15.124.1.x86_64",
            "SUSE Linux Enterprise Micro 5.4:kernel-source-rt-5.14.21-150400.15.124.1.noarch"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 5.5,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
            "version": "3.1"
          },
          "products": [
            "SUSE Linux Enterprise Micro 5.3:kernel-rt-5.14.21-150400.15.124.1.x86_64",
            "SUSE Linux Enterprise Micro 5.3:kernel-source-rt-5.14.21-150400.15.124.1.noarch",
            "SUSE Linux Enterprise Micro 5.4:kernel-rt-5.14.21-150400.15.124.1.x86_64",
            "SUSE Linux Enterprise Micro 5.4:kernel-source-rt-5.14.21-150400.15.124.1.noarch"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2025-07-15T14:31:46Z",
          "details": "moderate"
        }
      ],
      "title": "CVE-2022-50104"
    },
    {
      "cve": "CVE-2022-50108",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2022-50108"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "In the Linux kernel, the following vulnerability has been resolved:\n\nmfd: max77620: Fix refcount leak in max77620_initialise_fps\n\nof_get_child_by_name() returns a node pointer with refcount\nincremented, we should use of_node_put() on it when not need anymore.\nAdd missing of_node_put() to avoid refcount leak.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "SUSE Linux Enterprise Micro 5.3:kernel-rt-5.14.21-150400.15.124.1.x86_64",
          "SUSE Linux Enterprise Micro 5.3:kernel-source-rt-5.14.21-150400.15.124.1.noarch",
          "SUSE Linux Enterprise Micro 5.4:kernel-rt-5.14.21-150400.15.124.1.x86_64",
          "SUSE Linux Enterprise Micro 5.4:kernel-source-rt-5.14.21-150400.15.124.1.noarch"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2022-50108",
          "url": "https://www.suse.com/security/cve/CVE-2022-50108"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1244834 for CVE-2022-50108",
          "url": "https://bugzilla.suse.com/1244834"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "SUSE Linux Enterprise Micro 5.3:kernel-rt-5.14.21-150400.15.124.1.x86_64",
            "SUSE Linux Enterprise Micro 5.3:kernel-source-rt-5.14.21-150400.15.124.1.noarch",
            "SUSE Linux Enterprise Micro 5.4:kernel-rt-5.14.21-150400.15.124.1.x86_64",
            "SUSE Linux Enterprise Micro 5.4:kernel-source-rt-5.14.21-150400.15.124.1.noarch"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 5.5,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
            "version": "3.1"
          },
          "products": [
            "SUSE Linux Enterprise Micro 5.3:kernel-rt-5.14.21-150400.15.124.1.x86_64",
            "SUSE Linux Enterprise Micro 5.3:kernel-source-rt-5.14.21-150400.15.124.1.noarch",
            "SUSE Linux Enterprise Micro 5.4:kernel-rt-5.14.21-150400.15.124.1.x86_64",
            "SUSE Linux Enterprise Micro 5.4:kernel-source-rt-5.14.21-150400.15.124.1.noarch"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2025-07-15T14:31:46Z",
          "details": "moderate"
        }
      ],
      "title": "CVE-2022-50108"
    },
    {
      "cve": "CVE-2022-50109",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2022-50109"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "In the Linux kernel, the following vulnerability has been resolved:\n\nvideo: fbdev: amba-clcd: Fix refcount leak bugs\n\nIn clcdfb_of_init_display(), we should call of_node_put() for the\nreferences returned by of_graph_get_next_endpoint() and\nof_graph_get_remote_port_parent() which have increased the refcount.\n\nBesides, we should call of_node_put() both in fail path or when\nthe references are not used anymore.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "SUSE Linux Enterprise Micro 5.3:kernel-rt-5.14.21-150400.15.124.1.x86_64",
          "SUSE Linux Enterprise Micro 5.3:kernel-source-rt-5.14.21-150400.15.124.1.noarch",
          "SUSE Linux Enterprise Micro 5.4:kernel-rt-5.14.21-150400.15.124.1.x86_64",
          "SUSE Linux Enterprise Micro 5.4:kernel-source-rt-5.14.21-150400.15.124.1.noarch"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2022-50109",
          "url": "https://www.suse.com/security/cve/CVE-2022-50109"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1244884 for CVE-2022-50109",
          "url": "https://bugzilla.suse.com/1244884"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "SUSE Linux Enterprise Micro 5.3:kernel-rt-5.14.21-150400.15.124.1.x86_64",
            "SUSE Linux Enterprise Micro 5.3:kernel-source-rt-5.14.21-150400.15.124.1.noarch",
            "SUSE Linux Enterprise Micro 5.4:kernel-rt-5.14.21-150400.15.124.1.x86_64",
            "SUSE Linux Enterprise Micro 5.4:kernel-source-rt-5.14.21-150400.15.124.1.noarch"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 5.5,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
            "version": "3.1"
          },
          "products": [
            "SUSE Linux Enterprise Micro 5.3:kernel-rt-5.14.21-150400.15.124.1.x86_64",
            "SUSE Linux Enterprise Micro 5.3:kernel-source-rt-5.14.21-150400.15.124.1.noarch",
            "SUSE Linux Enterprise Micro 5.4:kernel-rt-5.14.21-150400.15.124.1.x86_64",
            "SUSE Linux Enterprise Micro 5.4:kernel-source-rt-5.14.21-150400.15.124.1.noarch"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2025-07-15T14:31:46Z",
          "details": "moderate"
        }
      ],
      "title": "CVE-2022-50109"
    },
    {
      "cve": "CVE-2022-50110",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2022-50110"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "In the Linux kernel, the following vulnerability has been resolved:\n\nwatchdog: sp5100_tco: Fix a memory leak of EFCH MMIO resource\n\nUnlike release_mem_region(), a call to release_resource() does not\nfree the resource, so it has to be freed explicitly to avoid a memory\nleak.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "SUSE Linux Enterprise Micro 5.3:kernel-rt-5.14.21-150400.15.124.1.x86_64",
          "SUSE Linux Enterprise Micro 5.3:kernel-source-rt-5.14.21-150400.15.124.1.noarch",
          "SUSE Linux Enterprise Micro 5.4:kernel-rt-5.14.21-150400.15.124.1.x86_64",
          "SUSE Linux Enterprise Micro 5.4:kernel-source-rt-5.14.21-150400.15.124.1.noarch"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2022-50110",
          "url": "https://www.suse.com/security/cve/CVE-2022-50110"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1244830 for CVE-2022-50110",
          "url": "https://bugzilla.suse.com/1244830"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "SUSE Linux Enterprise Micro 5.3:kernel-rt-5.14.21-150400.15.124.1.x86_64",
            "SUSE Linux Enterprise Micro 5.3:kernel-source-rt-5.14.21-150400.15.124.1.noarch",
            "SUSE Linux Enterprise Micro 5.4:kernel-rt-5.14.21-150400.15.124.1.x86_64",
            "SUSE Linux Enterprise Micro 5.4:kernel-source-rt-5.14.21-150400.15.124.1.noarch"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 5.5,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
            "version": "3.1"
          },
          "products": [
            "SUSE Linux Enterprise Micro 5.3:kernel-rt-5.14.21-150400.15.124.1.x86_64",
            "SUSE Linux Enterprise Micro 5.3:kernel-source-rt-5.14.21-150400.15.124.1.noarch",
            "SUSE Linux Enterprise Micro 5.4:kernel-rt-5.14.21-150400.15.124.1.x86_64",
            "SUSE Linux Enterprise Micro 5.4:kernel-source-rt-5.14.21-150400.15.124.1.noarch"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2025-07-15T14:31:46Z",
          "details": "moderate"
        }
      ],
      "title": "CVE-2022-50110"
    },
    {
      "cve": "CVE-2022-50111",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2022-50111"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "In the Linux kernel, the following vulnerability has been resolved:\n\nASoC: mt6359: Fix refcount leak bug\n\nIn mt6359_parse_dt() and mt6359_accdet_parse_dt(), we should call\nof_node_put() for the reference returned by of_get_child_by_name()\nwhich has increased the refcount.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "SUSE Linux Enterprise Micro 5.3:kernel-rt-5.14.21-150400.15.124.1.x86_64",
          "SUSE Linux Enterprise Micro 5.3:kernel-source-rt-5.14.21-150400.15.124.1.noarch",
          "SUSE Linux Enterprise Micro 5.4:kernel-rt-5.14.21-150400.15.124.1.x86_64",
          "SUSE Linux Enterprise Micro 5.4:kernel-source-rt-5.14.21-150400.15.124.1.noarch"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2022-50111",
          "url": "https://www.suse.com/security/cve/CVE-2022-50111"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1244831 for CVE-2022-50111",
          "url": "https://bugzilla.suse.com/1244831"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "SUSE Linux Enterprise Micro 5.3:kernel-rt-5.14.21-150400.15.124.1.x86_64",
            "SUSE Linux Enterprise Micro 5.3:kernel-source-rt-5.14.21-150400.15.124.1.noarch",
            "SUSE Linux Enterprise Micro 5.4:kernel-rt-5.14.21-150400.15.124.1.x86_64",
            "SUSE Linux Enterprise Micro 5.4:kernel-source-rt-5.14.21-150400.15.124.1.noarch"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 5.5,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
            "version": "3.1"
          },
          "products": [
            "SUSE Linux Enterprise Micro 5.3:kernel-rt-5.14.21-150400.15.124.1.x86_64",
            "SUSE Linux Enterprise Micro 5.3:kernel-source-rt-5.14.21-150400.15.124.1.noarch",
            "SUSE Linux Enterprise Micro 5.4:kernel-rt-5.14.21-150400.15.124.1.x86_64",
            "SUSE Linux Enterprise Micro 5.4:kernel-source-rt-5.14.21-150400.15.124.1.noarch"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2025-07-15T14:31:46Z",
          "details": "moderate"
        }
      ],
      "title": "CVE-2022-50111"
    },
    {
      "cve": "CVE-2022-50112",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2022-50112"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "In the Linux kernel, the following vulnerability has been resolved:\n\nrpmsg: qcom_smd: Fix refcount leak in qcom_smd_parse_edge\n\nof_parse_phandle() returns a node pointer with refcount\nincremented, we should use of_node_put() on it when done.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "SUSE Linux Enterprise Micro 5.3:kernel-rt-5.14.21-150400.15.124.1.x86_64",
          "SUSE Linux Enterprise Micro 5.3:kernel-source-rt-5.14.21-150400.15.124.1.noarch",
          "SUSE Linux Enterprise Micro 5.4:kernel-rt-5.14.21-150400.15.124.1.x86_64",
          "SUSE Linux Enterprise Micro 5.4:kernel-source-rt-5.14.21-150400.15.124.1.noarch"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2022-50112",
          "url": "https://www.suse.com/security/cve/CVE-2022-50112"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1244832 for CVE-2022-50112",
          "url": "https://bugzilla.suse.com/1244832"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "SUSE Linux Enterprise Micro 5.3:kernel-rt-5.14.21-150400.15.124.1.x86_64",
            "SUSE Linux Enterprise Micro 5.3:kernel-source-rt-5.14.21-150400.15.124.1.noarch",
            "SUSE Linux Enterprise Micro 5.4:kernel-rt-5.14.21-150400.15.124.1.x86_64",
            "SUSE Linux Enterprise Micro 5.4:kernel-source-rt-5.14.21-150400.15.124.1.noarch"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 5.5,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
            "version": "3.1"
          },
          "products": [
            "SUSE Linux Enterprise Micro 5.3:kernel-rt-5.14.21-150400.15.124.1.x86_64",
            "SUSE Linux Enterprise Micro 5.3:kernel-source-rt-5.14.21-150400.15.124.1.noarch",
            "SUSE Linux Enterprise Micro 5.4:kernel-rt-5.14.21-150400.15.124.1.x86_64",
            "SUSE Linux Enterprise Micro 5.4:kernel-source-rt-5.14.21-150400.15.124.1.noarch"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2025-07-15T14:31:46Z",
          "details": "moderate"
        }
      ],
      "title": "CVE-2022-50112"
    },
    {
      "cve": "CVE-2022-50116",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2022-50116"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "In the Linux kernel, the following vulnerability has been resolved:\n\ntty: n_gsm: fix deadlock and link starvation in outgoing data path\n\nThe current implementation queues up new control and user packets as needed\nand processes this queue down to the ldisc in the same code path.\nThat means that the upper and the lower layer are hard coupled in the code.\nDue to this deadlocks can happen as seen below while transmitting data,\nespecially during ldisc congestion. Furthermore, the data channels starve\nthe control channel on high transmission load on the ldisc.\n\nIntroduce an additional control channel data queue to prevent timeouts and\nlink hangups during ldisc congestion. This is being processed before the\nuser channel data queue in gsm_data_kick(), i.e. with the highest priority.\nPut the queue to ldisc data path into a workqueue and trigger it whenever\nnew data has been put into the transmission queue. Change\ngsm_dlci_data_sweep() accordingly to fill up the transmission queue until\nTX_THRESH_HI. This solves the locking issue, keeps latency low and provides\ngood performance on high data load.\nNote that now all packets from a DLCI are removed from the internal queue\nif the associated DLCI was closed. This ensures that no data is sent by the\nintroduced write task to an already closed DLCI.\n\nBUG: spinlock recursion on CPU#0, test_v24_loop/124\n lock: serial8250_ports+0x3a8/0x7500, .magic: dead4ead, .owner: test_v24_loop/124, .owner_cpu: 0\nCPU: 0 PID: 124 Comm: test_v24_loop Tainted: G           O      5.18.0-rc2 #3\nHardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.15.0-1 04/01/2014\nCall Trace:\n \u003cIRQ\u003e\n dump_stack_lvl+0x34/0x44\n do_raw_spin_lock+0x76/0xa0\n _raw_spin_lock_irqsave+0x72/0x80\n uart_write_room+0x3b/0xc0\n gsm_data_kick+0x14b/0x240 [n_gsm]\n gsmld_write_wakeup+0x35/0x70 [n_gsm]\n tty_wakeup+0x53/0x60\n tty_port_default_wakeup+0x1b/0x30\n serial8250_tx_chars+0x12f/0x220\n serial8250_handle_irq.part.0+0xfe/0x150\n serial8250_default_handle_irq+0x48/0x80\n serial8250_interrupt+0x56/0xa0\n __handle_irq_event_percpu+0x78/0x1f0\n handle_irq_event+0x34/0x70\n handle_fasteoi_irq+0x90/0x1e0\n __common_interrupt+0x69/0x100\n common_interrupt+0x48/0xc0\n asm_common_interrupt+0x1e/0x40\nRIP: 0010:__do_softirq+0x83/0x34e\nCode: 2a 0a ff 0f b7 ed c7 44 24 10 0a 00 00 00 48 c7 c7 51 2a 64 82 e8 2d\ne2 d5 ff 65 66 c7 05 83 af 1e 7e 00 00 fb b8 ff ff ff ff \u003c49\u003e c7 c2 40 61\n80 82 0f bc c5 41 89 c4 41 83 c4 01 0f 84 e6 00 00\nRSP: 0018:ffffc90000003f98 EFLAGS: 00000286\nRAX: 00000000ffffffff RBX: 0000000000000000 RCX: 0000000000000000\nRDX: 0000000000000000 RSI: ffffffff82642a51 RDI: ffffffff825bb5e7\nRBP: 0000000000000200 R08: 00000008de3271a8 R09: 0000000000000000\nR10: 0000000000000001 R11: 0000000000000000 R12: 0000000000000000\nR13: 0000000000000030 R14: 0000000000000000 R15: 0000000000000000\n ? __do_softirq+0x73/0x34e\n irq_exit_rcu+0xb5/0x100\n common_interrupt+0xa4/0xc0\n \u003c/IRQ\u003e\n \u003cTASK\u003e\n asm_common_interrupt+0x1e/0x40\nRIP: 0010:_raw_spin_unlock_irqrestore+0x2e/0x50\nCode: 00 55 48 89 fd 48 83 c7 18 53 48 89 f3 48 8b 74 24 10 e8 85 28 36 ff\n48 89 ef e8 cd 58 36 ff 80 e7 02 74 01 fb bf 01 00 00 00 \u003ce8\u003e 3d 97 33 ff\n65 8b 05 96 23 2b 7e 85 c0 74 03 5b 5d c3 0f 1f 44\nRSP: 0018:ffffc9000020fd08 EFLAGS: 00000202\nRAX: 0000000000000000 RBX: 0000000000000246 RCX: 0000000000000000\nRDX: 0000000000000004 RSI: ffffffff8257fd74 RDI: 0000000000000001\nRBP: ffff8880057de3a0 R08: 00000008de233000 R09: 0000000000000000\nR10: 0000000000000001 R11: 0000000000000000 R12: 0000000000000000\nR13: 0000000000000100 R14: 0000000000000202 R15: ffff8880057df0b8\n ? _raw_spin_unlock_irqrestore+0x23/0x50\n gsmtty_write+0x65/0x80 [n_gsm]\n n_tty_write+0x33f/0x530\n ? swake_up_all+0xe0/0xe0\n file_tty_write.constprop.0+0x1b1/0x320\n ? n_tty_flush_buffer+0xb0/0xb0\n new_sync_write+0x10c/0x190\n vfs_write+0x282/0x310\n ksys_write+0x68/0xe0\n do_syscall_64+0x3b/0x90\n entry_SYSCALL_64_after_hwframe+0x44/0xae\nRIP: 0033:0x7f3e5e35c15c\nCode: 8b 7c 24 08 89 c5 e8 c5 ff ff ff 89 ef 89 44 24\n---truncated---",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "SUSE Linux Enterprise Micro 5.3:kernel-rt-5.14.21-150400.15.124.1.x86_64",
          "SUSE Linux Enterprise Micro 5.3:kernel-source-rt-5.14.21-150400.15.124.1.noarch",
          "SUSE Linux Enterprise Micro 5.4:kernel-rt-5.14.21-150400.15.124.1.x86_64",
          "SUSE Linux Enterprise Micro 5.4:kernel-source-rt-5.14.21-150400.15.124.1.noarch"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2022-50116",
          "url": "https://www.suse.com/security/cve/CVE-2022-50116"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1244824 for CVE-2022-50116",
          "url": "https://bugzilla.suse.com/1244824"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "SUSE Linux Enterprise Micro 5.3:kernel-rt-5.14.21-150400.15.124.1.x86_64",
            "SUSE Linux Enterprise Micro 5.3:kernel-source-rt-5.14.21-150400.15.124.1.noarch",
            "SUSE Linux Enterprise Micro 5.4:kernel-rt-5.14.21-150400.15.124.1.x86_64",
            "SUSE Linux Enterprise Micro 5.4:kernel-source-rt-5.14.21-150400.15.124.1.noarch"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 5.5,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
            "version": "3.1"
          },
          "products": [
            "SUSE Linux Enterprise Micro 5.3:kernel-rt-5.14.21-150400.15.124.1.x86_64",
            "SUSE Linux Enterprise Micro 5.3:kernel-source-rt-5.14.21-150400.15.124.1.noarch",
            "SUSE Linux Enterprise Micro 5.4:kernel-rt-5.14.21-150400.15.124.1.x86_64",
            "SUSE Linux Enterprise Micro 5.4:kernel-source-rt-5.14.21-150400.15.124.1.noarch"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2025-07-15T14:31:46Z",
          "details": "moderate"
        }
      ],
      "title": "CVE-2022-50116"
    },
    {
      "cve": "CVE-2022-50118",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2022-50118"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "In the Linux kernel, the following vulnerability has been resolved:\n\npowerpc/perf: Optimize clearing the pending PMI and remove WARN_ON for PMI check in power_pmu_disable\n\ncommit 2c9ac51b850d (\"powerpc/perf: Fix PMU callbacks to clear\npending PMI before resetting an overflown PMC\") added a new\nfunction \"pmi_irq_pending\" in hw_irq.h. This function is to check\nif there is a PMI marked as pending in Paca (PACA_IRQ_PMI).This is\nused in power_pmu_disable in a WARN_ON. The intention here is to\nprovide a warning if there is PMI pending, but no counter is found\noverflown.\n\nDuring some of the perf runs, below warning is hit:\n\nWARNING: CPU: 36 PID: 0 at arch/powerpc/perf/core-book3s.c:1332 power_pmu_disable+0x25c/0x2c0\n Modules linked in:\n -----\n\n NIP [c000000000141c3c] power_pmu_disable+0x25c/0x2c0\n LR [c000000000141c8c] power_pmu_disable+0x2ac/0x2c0\n Call Trace:\n [c000000baffcfb90] [c000000000141c8c] power_pmu_disable+0x2ac/0x2c0 (unreliable)\n [c000000baffcfc10] [c0000000003e2f8c] perf_pmu_disable+0x4c/0x60\n [c000000baffcfc30] [c0000000003e3344] group_sched_out.part.124+0x44/0x100\n [c000000baffcfc80] [c0000000003e353c] __perf_event_disable+0x13c/0x240\n [c000000baffcfcd0] [c0000000003dd334] event_function+0xc4/0x140\n [c000000baffcfd20] [c0000000003d855c] remote_function+0x7c/0xa0\n [c000000baffcfd50] [c00000000026c394] flush_smp_call_function_queue+0xd4/0x300\n [c000000baffcfde0] [c000000000065b24] smp_ipi_demux_relaxed+0xa4/0x100\n [c000000baffcfe20] [c0000000000cb2b0] xive_muxed_ipi_action+0x20/0x40\n [c000000baffcfe40] [c000000000207c3c] __handle_irq_event_percpu+0x8c/0x250\n [c000000baffcfee0] [c000000000207e2c] handle_irq_event_percpu+0x2c/0xa0\n [c000000baffcff10] [c000000000210a04] handle_percpu_irq+0x84/0xc0\n [c000000baffcff40] [c000000000205f14] generic_handle_irq+0x54/0x80\n [c000000baffcff60] [c000000000015740] __do_irq+0x90/0x1d0\n [c000000baffcff90] [c000000000016990] __do_IRQ+0xc0/0x140\n [c0000009732f3940] [c000000bafceaca8] 0xc000000bafceaca8\n [c0000009732f39d0] [c000000000016b78] do_IRQ+0x168/0x1c0\n [c0000009732f3a00] [c0000000000090c8] hardware_interrupt_common_virt+0x218/0x220\n\nThis means that there is no PMC overflown among the active events\nin the PMU, but there is a PMU pending in Paca. The function\n\"any_pmc_overflown\" checks the PMCs on active events in\ncpuhw-\u003en_events. Code snippet:\n\n\u003c\u003c\u003e\u003e\nif (any_pmc_overflown(cpuhw))\n \tclear_pmi_irq_pending();\n else\n \tWARN_ON(pmi_irq_pending());\n\u003c\u003c\u003e\u003e\n\nHere the PMC overflown is not from active event. Example: When we do\nperf record, default cycles and instructions will be running on PMC6\nand PMC5 respectively. It could happen that overflowed event is currently\nnot active and pending PMI is for the inactive event. Debug logs from\ntrace_printk:\n\n\u003c\u003c\u003e\u003e\nany_pmc_overflown: idx is 5: pmc value is 0xd9a\npower_pmu_disable: PMC1: 0x0, PMC2: 0x0, PMC3: 0x0, PMC4: 0x0, PMC5: 0xd9a, PMC6: 0x80002011\n\u003c\u003c\u003e\u003e\n\nHere active PMC (from idx) is PMC5 , but overflown PMC is PMC6(0x80002011).\nWhen we handle PMI interrupt for such cases, if the PMC overflown is\nfrom inactive event, it will be ignored. Reference commit:\ncommit bc09c219b2e6 (\"powerpc/perf: Fix finding overflowed PMC in interrupt\")\n\nPatch addresses two changes:\n1) Fix 1 : Removal of warning ( WARN_ON(pmi_irq_pending()); )\n   We were printing warning if no PMC is found overflown among active PMU\n   events, but PMI pending in PACA. But this could happen in cases where\n   PMC overflown is not in active PMC. An inactive event could have caused\n   the overflow. Hence the warning is not needed. To know pending PMI is\n   from an inactive event, we need to loop through all PMC\u0027s which will\n   cause more SPR reads via mfspr and increase in context switch. Also in\n   existing function: perf_event_interrupt, already we ignore PMI\u0027s\n   overflown when it is from an inactive PMC.\n\n2) Fix 2: optimization in clearing pending PMI.\n   Currently we check for any active PMC overflown before clearing PMI\n   pending in Paca. This is causing additional SP\n---truncated---",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "SUSE Linux Enterprise Micro 5.3:kernel-rt-5.14.21-150400.15.124.1.x86_64",
          "SUSE Linux Enterprise Micro 5.3:kernel-source-rt-5.14.21-150400.15.124.1.noarch",
          "SUSE Linux Enterprise Micro 5.4:kernel-rt-5.14.21-150400.15.124.1.x86_64",
          "SUSE Linux Enterprise Micro 5.4:kernel-source-rt-5.14.21-150400.15.124.1.noarch"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2022-50118",
          "url": "https://www.suse.com/security/cve/CVE-2022-50118"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1244825 for CVE-2022-50118",
          "url": "https://bugzilla.suse.com/1244825"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "SUSE Linux Enterprise Micro 5.3:kernel-rt-5.14.21-150400.15.124.1.x86_64",
            "SUSE Linux Enterprise Micro 5.3:kernel-source-rt-5.14.21-150400.15.124.1.noarch",
            "SUSE Linux Enterprise Micro 5.4:kernel-rt-5.14.21-150400.15.124.1.x86_64",
            "SUSE Linux Enterprise Micro 5.4:kernel-source-rt-5.14.21-150400.15.124.1.noarch"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 5.5,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
            "version": "3.1"
          },
          "products": [
            "SUSE Linux Enterprise Micro 5.3:kernel-rt-5.14.21-150400.15.124.1.x86_64",
            "SUSE Linux Enterprise Micro 5.3:kernel-source-rt-5.14.21-150400.15.124.1.noarch",
            "SUSE Linux Enterprise Micro 5.4:kernel-rt-5.14.21-150400.15.124.1.x86_64",
            "SUSE Linux Enterprise Micro 5.4:kernel-source-rt-5.14.21-150400.15.124.1.noarch"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2025-07-15T14:31:46Z",
          "details": "moderate"
        }
      ],
      "title": "CVE-2022-50118"
    },
    {
      "cve": "CVE-2022-50120",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2022-50120"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "In the Linux kernel, the following vulnerability has been resolved:\n\nremoteproc: imx_rproc: Fix refcount leak in imx_rproc_addr_init\n\nof_parse_phandle() returns a node pointer with refcount\nincremented, we should use of_node_put() on it when not needed anymore.\nThis function has two paths missing of_node_put().",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "SUSE Linux Enterprise Micro 5.3:kernel-rt-5.14.21-150400.15.124.1.x86_64",
          "SUSE Linux Enterprise Micro 5.3:kernel-source-rt-5.14.21-150400.15.124.1.noarch",
          "SUSE Linux Enterprise Micro 5.4:kernel-rt-5.14.21-150400.15.124.1.x86_64",
          "SUSE Linux Enterprise Micro 5.4:kernel-source-rt-5.14.21-150400.15.124.1.noarch"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2022-50120",
          "url": "https://www.suse.com/security/cve/CVE-2022-50120"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1244819 for CVE-2022-50120",
          "url": "https://bugzilla.suse.com/1244819"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "SUSE Linux Enterprise Micro 5.3:kernel-rt-5.14.21-150400.15.124.1.x86_64",
            "SUSE Linux Enterprise Micro 5.3:kernel-source-rt-5.14.21-150400.15.124.1.noarch",
            "SUSE Linux Enterprise Micro 5.4:kernel-rt-5.14.21-150400.15.124.1.x86_64",
            "SUSE Linux Enterprise Micro 5.4:kernel-source-rt-5.14.21-150400.15.124.1.noarch"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 5.5,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
            "version": "3.1"
          },
          "products": [
            "SUSE Linux Enterprise Micro 5.3:kernel-rt-5.14.21-150400.15.124.1.x86_64",
            "SUSE Linux Enterprise Micro 5.3:kernel-source-rt-5.14.21-150400.15.124.1.noarch",
            "SUSE Linux Enterprise Micro 5.4:kernel-rt-5.14.21-150400.15.124.1.x86_64",
            "SUSE Linux Enterprise Micro 5.4:kernel-source-rt-5.14.21-150400.15.124.1.noarch"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2025-07-15T14:31:46Z",
          "details": "moderate"
        }
      ],
      "title": "CVE-2022-50120"
    },
    {
      "cve": "CVE-2022-50121",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2022-50121"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "In the Linux kernel, the following vulnerability has been resolved:\n\nremoteproc: k3-r5: Fix refcount leak in k3_r5_cluster_of_init\n\nEvery iteration of for_each_available_child_of_node() decrements\nthe reference count of the previous node.\nWhen breaking early from a for_each_available_child_of_node() loop,\nwe need to explicitly call of_node_put() on the child node.\nAdd missing of_node_put() to avoid refcount leak.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "SUSE Linux Enterprise Micro 5.3:kernel-rt-5.14.21-150400.15.124.1.x86_64",
          "SUSE Linux Enterprise Micro 5.3:kernel-source-rt-5.14.21-150400.15.124.1.noarch",
          "SUSE Linux Enterprise Micro 5.4:kernel-rt-5.14.21-150400.15.124.1.x86_64",
          "SUSE Linux Enterprise Micro 5.4:kernel-source-rt-5.14.21-150400.15.124.1.noarch"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2022-50121",
          "url": "https://www.suse.com/security/cve/CVE-2022-50121"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1244823 for CVE-2022-50121",
          "url": "https://bugzilla.suse.com/1244823"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "SUSE Linux Enterprise Micro 5.3:kernel-rt-5.14.21-150400.15.124.1.x86_64",
            "SUSE Linux Enterprise Micro 5.3:kernel-source-rt-5.14.21-150400.15.124.1.noarch",
            "SUSE Linux Enterprise Micro 5.4:kernel-rt-5.14.21-150400.15.124.1.x86_64",
            "SUSE Linux Enterprise Micro 5.4:kernel-source-rt-5.14.21-150400.15.124.1.noarch"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 5.5,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
            "version": "3.1"
          },
          "products": [
            "SUSE Linux Enterprise Micro 5.3:kernel-rt-5.14.21-150400.15.124.1.x86_64",
            "SUSE Linux Enterprise Micro 5.3:kernel-source-rt-5.14.21-150400.15.124.1.noarch",
            "SUSE Linux Enterprise Micro 5.4:kernel-rt-5.14.21-150400.15.124.1.x86_64",
            "SUSE Linux Enterprise Micro 5.4:kernel-source-rt-5.14.21-150400.15.124.1.noarch"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2025-07-15T14:31:46Z",
          "details": "moderate"
        }
      ],
      "title": "CVE-2022-50121"
    },
    {
      "cve": "CVE-2022-50124",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2022-50124"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "In the Linux kernel, the following vulnerability has been resolved:\n\nASoC: mt6797-mt6351: Fix refcount leak in mt6797_mt6351_dev_probe\n\nof_parse_phandle() returns a node pointer with refcount\nincremented, we should use of_node_put() on it when not need anymore.\nAdd missing of_node_put() to avoid refcount leak.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "SUSE Linux Enterprise Micro 5.3:kernel-rt-5.14.21-150400.15.124.1.x86_64",
          "SUSE Linux Enterprise Micro 5.3:kernel-source-rt-5.14.21-150400.15.124.1.noarch",
          "SUSE Linux Enterprise Micro 5.4:kernel-rt-5.14.21-150400.15.124.1.x86_64",
          "SUSE Linux Enterprise Micro 5.4:kernel-source-rt-5.14.21-150400.15.124.1.noarch"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2022-50124",
          "url": "https://www.suse.com/security/cve/CVE-2022-50124"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1244816 for CVE-2022-50124",
          "url": "https://bugzilla.suse.com/1244816"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "SUSE Linux Enterprise Micro 5.3:kernel-rt-5.14.21-150400.15.124.1.x86_64",
            "SUSE Linux Enterprise Micro 5.3:kernel-source-rt-5.14.21-150400.15.124.1.noarch",
            "SUSE Linux Enterprise Micro 5.4:kernel-rt-5.14.21-150400.15.124.1.x86_64",
            "SUSE Linux Enterprise Micro 5.4:kernel-source-rt-5.14.21-150400.15.124.1.noarch"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 5.5,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
            "version": "3.1"
          },
          "products": [
            "SUSE Linux Enterprise Micro 5.3:kernel-rt-5.14.21-150400.15.124.1.x86_64",
            "SUSE Linux Enterprise Micro 5.3:kernel-source-rt-5.14.21-150400.15.124.1.noarch",
            "SUSE Linux Enterprise Micro 5.4:kernel-rt-5.14.21-150400.15.124.1.x86_64",
            "SUSE Linux Enterprise Micro 5.4:kernel-source-rt-5.14.21-150400.15.124.1.noarch"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2025-07-15T14:31:46Z",
          "details": "moderate"
        }
      ],
      "title": "CVE-2022-50124"
    },
    {
      "cve": "CVE-2022-50125",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2022-50125"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "In the Linux kernel, the following vulnerability has been resolved:\n\nASoC: cros_ec_codec: Fix refcount leak in cros_ec_codec_platform_probe\n\nof_parse_phandle() returns a node pointer with refcount\nincremented, we should use of_node_put() on it when not need anymore.\nAdd missing of_node_put() to avoid refcount leak.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "SUSE Linux Enterprise Micro 5.3:kernel-rt-5.14.21-150400.15.124.1.x86_64",
          "SUSE Linux Enterprise Micro 5.3:kernel-source-rt-5.14.21-150400.15.124.1.noarch",
          "SUSE Linux Enterprise Micro 5.4:kernel-rt-5.14.21-150400.15.124.1.x86_64",
          "SUSE Linux Enterprise Micro 5.4:kernel-source-rt-5.14.21-150400.15.124.1.noarch"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2022-50125",
          "url": "https://www.suse.com/security/cve/CVE-2022-50125"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1244814 for CVE-2022-50125",
          "url": "https://bugzilla.suse.com/1244814"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "SUSE Linux Enterprise Micro 5.3:kernel-rt-5.14.21-150400.15.124.1.x86_64",
            "SUSE Linux Enterprise Micro 5.3:kernel-source-rt-5.14.21-150400.15.124.1.noarch",
            "SUSE Linux Enterprise Micro 5.4:kernel-rt-5.14.21-150400.15.124.1.x86_64",
            "SUSE Linux Enterprise Micro 5.4:kernel-source-rt-5.14.21-150400.15.124.1.noarch"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 5.5,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
            "version": "3.1"
          },
          "products": [
            "SUSE Linux Enterprise Micro 5.3:kernel-rt-5.14.21-150400.15.124.1.x86_64",
            "SUSE Linux Enterprise Micro 5.3:kernel-source-rt-5.14.21-150400.15.124.1.noarch",
            "SUSE Linux Enterprise Micro 5.4:kernel-rt-5.14.21-150400.15.124.1.x86_64",
            "SUSE Linux Enterprise Micro 5.4:kernel-source-rt-5.14.21-150400.15.124.1.noarch"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2025-07-15T14:31:46Z",
          "details": "moderate"
        }
      ],
      "title": "CVE-2022-50125"
    },
    {
      "cve": "CVE-2022-50126",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2022-50126"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "In the Linux kernel, the following vulnerability has been resolved:\n\njbd2: fix assertion \u0027jh-\u003eb_frozen_data == NULL\u0027 failure when journal aborted\n\nFollowing process will fail assertion \u0027jh-\u003eb_frozen_data == NULL\u0027 in\njbd2_journal_dirty_metadata():\n\n                   jbd2_journal_commit_transaction\nunlink(dir/a)\n jh-\u003eb_transaction = trans1\n jh-\u003eb_jlist = BJ_Metadata\n                    journal-\u003ej_running_transaction = NULL\n                    trans1-\u003et_state = T_COMMIT\nunlink(dir/b)\n handle-\u003eh_trans = trans2\n do_get_write_access\n  jh-\u003eb_modified = 0\n  jh-\u003eb_frozen_data = frozen_buffer\n  jh-\u003eb_next_transaction = trans2\n jbd2_journal_dirty_metadata\n  is_handle_aborted\n   is_journal_aborted // return false\n\n           --\u003e jbd2 abort \u003c--\n\n                     while (commit_transaction-\u003et_buffers)\n                      if (is_journal_aborted)\n                       jbd2_journal_refile_buffer\n                        __jbd2_journal_refile_buffer\n                         WRITE_ONCE(jh-\u003eb_transaction,\n\t\t\t\t\t\tjh-\u003eb_next_transaction)\n                         WRITE_ONCE(jh-\u003eb_next_transaction, NULL)\n                         __jbd2_journal_file_buffer(jh, BJ_Reserved)\n        J_ASSERT_JH(jh, jh-\u003eb_frozen_data == NULL) // assertion failure !\n\nThe reproducer (See detail in [Link]) reports:\n ------------[ cut here ]------------\n kernel BUG at fs/jbd2/transaction.c:1629!\n invalid opcode: 0000 [#1] PREEMPT SMP\n CPU: 2 PID: 584 Comm: unlink Tainted: G        W\n 5.19.0-rc6-00115-g4a57a8400075-dirty #697\n RIP: 0010:jbd2_journal_dirty_metadata+0x3c5/0x470\n RSP: 0018:ffffc90000be7ce0 EFLAGS: 00010202\n Call Trace:\n  \u003cTASK\u003e\n  __ext4_handle_dirty_metadata+0xa0/0x290\n  ext4_handle_dirty_dirblock+0x10c/0x1d0\n  ext4_delete_entry+0x104/0x200\n  __ext4_unlink+0x22b/0x360\n  ext4_unlink+0x275/0x390\n  vfs_unlink+0x20b/0x4c0\n  do_unlinkat+0x42f/0x4c0\n  __x64_sys_unlink+0x37/0x50\n  do_syscall_64+0x35/0x80\n\nAfter journal aborting, __jbd2_journal_refile_buffer() is executed with\nholding @jh-\u003eb_state_lock, we can fix it by moving \u0027is_handle_aborted()\u0027\ninto the area protected by @jh-\u003eb_state_lock.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "SUSE Linux Enterprise Micro 5.3:kernel-rt-5.14.21-150400.15.124.1.x86_64",
          "SUSE Linux Enterprise Micro 5.3:kernel-source-rt-5.14.21-150400.15.124.1.noarch",
          "SUSE Linux Enterprise Micro 5.4:kernel-rt-5.14.21-150400.15.124.1.x86_64",
          "SUSE Linux Enterprise Micro 5.4:kernel-source-rt-5.14.21-150400.15.124.1.noarch"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2022-50126",
          "url": "https://www.suse.com/security/cve/CVE-2022-50126"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1244813 for CVE-2022-50126",
          "url": "https://bugzilla.suse.com/1244813"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "SUSE Linux Enterprise Micro 5.3:kernel-rt-5.14.21-150400.15.124.1.x86_64",
            "SUSE Linux Enterprise Micro 5.3:kernel-source-rt-5.14.21-150400.15.124.1.noarch",
            "SUSE Linux Enterprise Micro 5.4:kernel-rt-5.14.21-150400.15.124.1.x86_64",
            "SUSE Linux Enterprise Micro 5.4:kernel-source-rt-5.14.21-150400.15.124.1.noarch"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 5.5,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
            "version": "3.1"
          },
          "products": [
            "SUSE Linux Enterprise Micro 5.3:kernel-rt-5.14.21-150400.15.124.1.x86_64",
            "SUSE Linux Enterprise Micro 5.3:kernel-source-rt-5.14.21-150400.15.124.1.noarch",
            "SUSE Linux Enterprise Micro 5.4:kernel-rt-5.14.21-150400.15.124.1.x86_64",
            "SUSE Linux Enterprise Micro 5.4:kernel-source-rt-5.14.21-150400.15.124.1.noarch"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2025-07-15T14:31:46Z",
          "details": "moderate"
        }
      ],
      "title": "CVE-2022-50126"
    },
    {
      "cve": "CVE-2022-50127",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2022-50127"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "In the Linux kernel, the following vulnerability has been resolved:\n\nRDMA/rxe: Fix error unwind in rxe_create_qp()\n\nIn the function rxe_create_qp(), rxe_qp_from_init() is called to\ninitialize qp, internally things like the spin locks are not setup until\nrxe_qp_init_req().\n\nIf an error occures before this point then the unwind will call\nrxe_cleanup() and eventually to rxe_qp_do_cleanup()/rxe_cleanup_task()\nwhich will oops when trying to access the uninitialized spinlock.\n\nMove the spinlock initializations earlier before any failures.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "SUSE Linux Enterprise Micro 5.3:kernel-rt-5.14.21-150400.15.124.1.x86_64",
          "SUSE Linux Enterprise Micro 5.3:kernel-source-rt-5.14.21-150400.15.124.1.noarch",
          "SUSE Linux Enterprise Micro 5.4:kernel-rt-5.14.21-150400.15.124.1.x86_64",
          "SUSE Linux Enterprise Micro 5.4:kernel-source-rt-5.14.21-150400.15.124.1.noarch"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2022-50127",
          "url": "https://www.suse.com/security/cve/CVE-2022-50127"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1244815 for CVE-2022-50127",
          "url": "https://bugzilla.suse.com/1244815"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "SUSE Linux Enterprise Micro 5.3:kernel-rt-5.14.21-150400.15.124.1.x86_64",
            "SUSE Linux Enterprise Micro 5.3:kernel-source-rt-5.14.21-150400.15.124.1.noarch",
            "SUSE Linux Enterprise Micro 5.4:kernel-rt-5.14.21-150400.15.124.1.x86_64",
            "SUSE Linux Enterprise Micro 5.4:kernel-source-rt-5.14.21-150400.15.124.1.noarch"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 5.5,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
            "version": "3.1"
          },
          "products": [
            "SUSE Linux Enterprise Micro 5.3:kernel-rt-5.14.21-150400.15.124.1.x86_64",
            "SUSE Linux Enterprise Micro 5.3:kernel-source-rt-5.14.21-150400.15.124.1.noarch",
            "SUSE Linux Enterprise Micro 5.4:kernel-rt-5.14.21-150400.15.124.1.x86_64",
            "SUSE Linux Enterprise Micro 5.4:kernel-source-rt-5.14.21-150400.15.124.1.noarch"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2025-07-15T14:31:46Z",
          "details": "moderate"
        }
      ],
      "title": "CVE-2022-50127"
    },
    {
      "cve": "CVE-2022-50129",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2022-50129"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "In the Linux kernel, the following vulnerability has been resolved:\n\nRDMA/srpt: Fix a use-after-free\n\nChange the LIO port members inside struct srpt_port from regular members\ninto pointers. Allocate the LIO port data structures from inside\nsrpt_make_tport() and free these from inside srpt_make_tport(). Keep\nstruct srpt_device as long as either an RDMA port or a LIO target port is\nassociated with it. This patch decouples the lifetime of struct srpt_port\n(controlled by the RDMA core) and struct srpt_port_id (controlled by LIO).\nThis patch fixes the following KASAN complaint:\n\n  BUG: KASAN: use-after-free in srpt_enable_tpg+0x31/0x70 [ib_srpt]\n  Read of size 8 at addr ffff888141cc34b8 by task check/5093\n\n  Call Trace:\n   \u003cTASK\u003e\n   show_stack+0x4e/0x53\n   dump_stack_lvl+0x51/0x66\n   print_address_description.constprop.0.cold+0xea/0x41e\n   print_report.cold+0x90/0x205\n   kasan_report+0xb9/0xf0\n   __asan_load8+0x69/0x90\n   srpt_enable_tpg+0x31/0x70 [ib_srpt]\n   target_fabric_tpg_base_enable_store+0xe2/0x140 [target_core_mod]\n   configfs_write_iter+0x18b/0x210\n   new_sync_write+0x1f2/0x2f0\n   vfs_write+0x3e3/0x540\n   ksys_write+0xbb/0x140\n   __x64_sys_write+0x42/0x50\n   do_syscall_64+0x34/0x80\n   entry_SYSCALL_64_after_hwframe+0x46/0xb0\n   \u003c/TASK\u003e",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "SUSE Linux Enterprise Micro 5.3:kernel-rt-5.14.21-150400.15.124.1.x86_64",
          "SUSE Linux Enterprise Micro 5.3:kernel-source-rt-5.14.21-150400.15.124.1.noarch",
          "SUSE Linux Enterprise Micro 5.4:kernel-rt-5.14.21-150400.15.124.1.x86_64",
          "SUSE Linux Enterprise Micro 5.4:kernel-source-rt-5.14.21-150400.15.124.1.noarch"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2022-50129",
          "url": "https://www.suse.com/security/cve/CVE-2022-50129"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1244811 for CVE-2022-50129",
          "url": "https://bugzilla.suse.com/1244811"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "SUSE Linux Enterprise Micro 5.3:kernel-rt-5.14.21-150400.15.124.1.x86_64",
            "SUSE Linux Enterprise Micro 5.3:kernel-source-rt-5.14.21-150400.15.124.1.noarch",
            "SUSE Linux Enterprise Micro 5.4:kernel-rt-5.14.21-150400.15.124.1.x86_64",
            "SUSE Linux Enterprise Micro 5.4:kernel-source-rt-5.14.21-150400.15.124.1.noarch"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 5.5,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
            "version": "3.1"
          },
          "products": [
            "SUSE Linux Enterprise Micro 5.3:kernel-rt-5.14.21-150400.15.124.1.x86_64",
            "SUSE Linux Enterprise Micro 5.3:kernel-source-rt-5.14.21-150400.15.124.1.noarch",
            "SUSE Linux Enterprise Micro 5.4:kernel-rt-5.14.21-150400.15.124.1.x86_64",
            "SUSE Linux Enterprise Micro 5.4:kernel-source-rt-5.14.21-150400.15.124.1.noarch"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2025-07-15T14:31:46Z",
          "details": "moderate"
        }
      ],
      "title": "CVE-2022-50129"
    },
    {
      "cve": "CVE-2022-50131",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2022-50131"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "In the Linux kernel, the following vulnerability has been resolved:\n\nHID: mcp2221: prevent a buffer overflow in mcp_smbus_write()\n\nSmatch Warning:\ndrivers/hid/hid-mcp2221.c:388 mcp_smbus_write() error: __memcpy()\n\u0027\u0026mcp-\u003etxbuf[5]\u0027 too small (59 vs 255)\ndrivers/hid/hid-mcp2221.c:388 mcp_smbus_write() error: __memcpy() \u0027buf\u0027\ntoo small (34 vs 255)\n\nThe \u0027len\u0027 variable can take a value between 0-255 as it can come from\ndata-\u003eblock[0] and it is user data. So add an bound check to prevent a\nbuffer overflow in memcpy().",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "SUSE Linux Enterprise Micro 5.3:kernel-rt-5.14.21-150400.15.124.1.x86_64",
          "SUSE Linux Enterprise Micro 5.3:kernel-source-rt-5.14.21-150400.15.124.1.noarch",
          "SUSE Linux Enterprise Micro 5.4:kernel-rt-5.14.21-150400.15.124.1.x86_64",
          "SUSE Linux Enterprise Micro 5.4:kernel-source-rt-5.14.21-150400.15.124.1.noarch"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2022-50131",
          "url": "https://www.suse.com/security/cve/CVE-2022-50131"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1244807 for CVE-2022-50131",
          "url": "https://bugzilla.suse.com/1244807"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "SUSE Linux Enterprise Micro 5.3:kernel-rt-5.14.21-150400.15.124.1.x86_64",
            "SUSE Linux Enterprise Micro 5.3:kernel-source-rt-5.14.21-150400.15.124.1.noarch",
            "SUSE Linux Enterprise Micro 5.4:kernel-rt-5.14.21-150400.15.124.1.x86_64",
            "SUSE Linux Enterprise Micro 5.4:kernel-source-rt-5.14.21-150400.15.124.1.noarch"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 5.5,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
            "version": "3.1"
          },
          "products": [
            "SUSE Linux Enterprise Micro 5.3:kernel-rt-5.14.21-150400.15.124.1.x86_64",
            "SUSE Linux Enterprise Micro 5.3:kernel-source-rt-5.14.21-150400.15.124.1.noarch",
            "SUSE Linux Enterprise Micro 5.4:kernel-rt-5.14.21-150400.15.124.1.x86_64",
            "SUSE Linux Enterprise Micro 5.4:kernel-source-rt-5.14.21-150400.15.124.1.noarch"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2025-07-15T14:31:46Z",
          "details": "moderate"
        }
      ],
      "title": "CVE-2022-50131"
    },
    {
      "cve": "CVE-2022-50132",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2022-50132"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "In the Linux kernel, the following vulnerability has been resolved:\n\nusb: cdns3: change place of \u0027priv_ep\u0027 assignment in cdns3_gadget_ep_dequeue(), cdns3_gadget_ep_enable()\n\nIf \u0027ep\u0027 is NULL, result of ep_to_cdns3_ep(ep) is invalid pointer\nand its dereference with priv_ep-\u003ecdns3_dev may cause panic.\n\nFound by Linux Verification Center (linuxtesting.org) with SVACE.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "SUSE Linux Enterprise Micro 5.3:kernel-rt-5.14.21-150400.15.124.1.x86_64",
          "SUSE Linux Enterprise Micro 5.3:kernel-source-rt-5.14.21-150400.15.124.1.noarch",
          "SUSE Linux Enterprise Micro 5.4:kernel-rt-5.14.21-150400.15.124.1.x86_64",
          "SUSE Linux Enterprise Micro 5.4:kernel-source-rt-5.14.21-150400.15.124.1.noarch"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2022-50132",
          "url": "https://www.suse.com/security/cve/CVE-2022-50132"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1244808 for CVE-2022-50132",
          "url": "https://bugzilla.suse.com/1244808"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "SUSE Linux Enterprise Micro 5.3:kernel-rt-5.14.21-150400.15.124.1.x86_64",
            "SUSE Linux Enterprise Micro 5.3:kernel-source-rt-5.14.21-150400.15.124.1.noarch",
            "SUSE Linux Enterprise Micro 5.4:kernel-rt-5.14.21-150400.15.124.1.x86_64",
            "SUSE Linux Enterprise Micro 5.4:kernel-source-rt-5.14.21-150400.15.124.1.noarch"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 5.5,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
            "version": "3.1"
          },
          "products": [
            "SUSE Linux Enterprise Micro 5.3:kernel-rt-5.14.21-150400.15.124.1.x86_64",
            "SUSE Linux Enterprise Micro 5.3:kernel-source-rt-5.14.21-150400.15.124.1.noarch",
            "SUSE Linux Enterprise Micro 5.4:kernel-rt-5.14.21-150400.15.124.1.x86_64",
            "SUSE Linux Enterprise Micro 5.4:kernel-source-rt-5.14.21-150400.15.124.1.noarch"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2025-07-15T14:31:46Z",
          "details": "moderate"
        }
      ],
      "title": "CVE-2022-50132"
    },
    {
      "cve": "CVE-2022-50134",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2022-50134"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "In the Linux kernel, the following vulnerability has been resolved:\n\nRDMA/hfi1: fix potential memory leak in setup_base_ctxt()\n\nsetup_base_ctxt() allocates a memory chunk for uctxt-\u003egroups with\nhfi1_alloc_ctxt_rcv_groups(). When init_user_ctxt() fails, uctxt-\u003egroups\nis not released, which will lead to a memory leak.\n\nWe should release the uctxt-\u003egroups with hfi1_free_ctxt_rcv_groups()\nwhen init_user_ctxt() fails.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "SUSE Linux Enterprise Micro 5.3:kernel-rt-5.14.21-150400.15.124.1.x86_64",
          "SUSE Linux Enterprise Micro 5.3:kernel-source-rt-5.14.21-150400.15.124.1.noarch",
          "SUSE Linux Enterprise Micro 5.4:kernel-rt-5.14.21-150400.15.124.1.x86_64",
          "SUSE Linux Enterprise Micro 5.4:kernel-source-rt-5.14.21-150400.15.124.1.noarch"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2022-50134",
          "url": "https://www.suse.com/security/cve/CVE-2022-50134"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1244802 for CVE-2022-50134",
          "url": "https://bugzilla.suse.com/1244802"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "SUSE Linux Enterprise Micro 5.3:kernel-rt-5.14.21-150400.15.124.1.x86_64",
            "SUSE Linux Enterprise Micro 5.3:kernel-source-rt-5.14.21-150400.15.124.1.noarch",
            "SUSE Linux Enterprise Micro 5.4:kernel-rt-5.14.21-150400.15.124.1.x86_64",
            "SUSE Linux Enterprise Micro 5.4:kernel-source-rt-5.14.21-150400.15.124.1.noarch"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 5.5,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
            "version": "3.1"
          },
          "products": [
            "SUSE Linux Enterprise Micro 5.3:kernel-rt-5.14.21-150400.15.124.1.x86_64",
            "SUSE Linux Enterprise Micro 5.3:kernel-source-rt-5.14.21-150400.15.124.1.noarch",
            "SUSE Linux Enterprise Micro 5.4:kernel-rt-5.14.21-150400.15.124.1.x86_64",
            "SUSE Linux Enterprise Micro 5.4:kernel-source-rt-5.14.21-150400.15.124.1.noarch"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2025-07-15T14:31:46Z",
          "details": "moderate"
        }
      ],
      "title": "CVE-2022-50134"
    },
    {
      "cve": "CVE-2022-50136",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2022-50136"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "In the Linux kernel, the following vulnerability has been resolved:\n\nRDMA/siw: Fix duplicated reported IW_CM_EVENT_CONNECT_REPLY event\n\nIf siw_recv_mpa_rr returns -EAGAIN, it means that the MPA reply hasn\u0027t\nbeen received completely, and should not report IW_CM_EVENT_CONNECT_REPLY\nin this case. This may trigger a call trace in iw_cm. A simple way to\ntrigger this:\n server: ib_send_lat\n client: ib_send_lat -R \u003cserver_ip\u003e\n\nThe call trace looks like this:\n\n kernel BUG at drivers/infiniband/core/iwcm.c:894!\n invalid opcode: 0000 [#1] PREEMPT SMP NOPTI\n \u003c...\u003e\n Workqueue: iw_cm_wq cm_work_handler [iw_cm]\n Call Trace:\n  \u003cTASK\u003e\n  cm_work_handler+0x1dd/0x370 [iw_cm]\n  process_one_work+0x1e2/0x3b0\n  worker_thread+0x49/0x2e0\n  ? rescuer_thread+0x370/0x370\n  kthread+0xe5/0x110\n  ? kthread_complete_and_exit+0x20/0x20\n  ret_from_fork+0x1f/0x30\n  \u003c/TASK\u003e",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "SUSE Linux Enterprise Micro 5.3:kernel-rt-5.14.21-150400.15.124.1.x86_64",
          "SUSE Linux Enterprise Micro 5.3:kernel-source-rt-5.14.21-150400.15.124.1.noarch",
          "SUSE Linux Enterprise Micro 5.4:kernel-rt-5.14.21-150400.15.124.1.x86_64",
          "SUSE Linux Enterprise Micro 5.4:kernel-source-rt-5.14.21-150400.15.124.1.noarch"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2022-50136",
          "url": "https://www.suse.com/security/cve/CVE-2022-50136"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1244804 for CVE-2022-50136",
          "url": "https://bugzilla.suse.com/1244804"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "SUSE Linux Enterprise Micro 5.3:kernel-rt-5.14.21-150400.15.124.1.x86_64",
            "SUSE Linux Enterprise Micro 5.3:kernel-source-rt-5.14.21-150400.15.124.1.noarch",
            "SUSE Linux Enterprise Micro 5.4:kernel-rt-5.14.21-150400.15.124.1.x86_64",
            "SUSE Linux Enterprise Micro 5.4:kernel-source-rt-5.14.21-150400.15.124.1.noarch"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 5.5,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
            "version": "3.1"
          },
          "products": [
            "SUSE Linux Enterprise Micro 5.3:kernel-rt-5.14.21-150400.15.124.1.x86_64",
            "SUSE Linux Enterprise Micro 5.3:kernel-source-rt-5.14.21-150400.15.124.1.noarch",
            "SUSE Linux Enterprise Micro 5.4:kernel-rt-5.14.21-150400.15.124.1.x86_64",
            "SUSE Linux Enterprise Micro 5.4:kernel-source-rt-5.14.21-150400.15.124.1.noarch"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2025-07-15T14:31:46Z",
          "details": "moderate"
        }
      ],
      "title": "CVE-2022-50136"
    },
    {
      "cve": "CVE-2022-50137",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2022-50137"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "In the Linux kernel, the following vulnerability has been resolved:\n\nRDMA/irdma: Fix a window for use-after-free\n\nDuring a destroy CQ an interrupt may cause processing of a CQE after CQ\nresources are freed by irdma_cq_free_rsrc(). Fix this by moving the call\nto irdma_cq_free_rsrc() after the irdma_sc_cleanup_ceqes(), which is\ncalled under the cq_lock.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "SUSE Linux Enterprise Micro 5.3:kernel-rt-5.14.21-150400.15.124.1.x86_64",
          "SUSE Linux Enterprise Micro 5.3:kernel-source-rt-5.14.21-150400.15.124.1.noarch",
          "SUSE Linux Enterprise Micro 5.4:kernel-rt-5.14.21-150400.15.124.1.x86_64",
          "SUSE Linux Enterprise Micro 5.4:kernel-source-rt-5.14.21-150400.15.124.1.noarch"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2022-50137",
          "url": "https://www.suse.com/security/cve/CVE-2022-50137"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1244800 for CVE-2022-50137",
          "url": "https://bugzilla.suse.com/1244800"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "SUSE Linux Enterprise Micro 5.3:kernel-rt-5.14.21-150400.15.124.1.x86_64",
            "SUSE Linux Enterprise Micro 5.3:kernel-source-rt-5.14.21-150400.15.124.1.noarch",
            "SUSE Linux Enterprise Micro 5.4:kernel-rt-5.14.21-150400.15.124.1.x86_64",
            "SUSE Linux Enterprise Micro 5.4:kernel-source-rt-5.14.21-150400.15.124.1.noarch"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 5.5,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
            "version": "3.1"
          },
          "products": [
            "SUSE Linux Enterprise Micro 5.3:kernel-rt-5.14.21-150400.15.124.1.x86_64",
            "SUSE Linux Enterprise Micro 5.3:kernel-source-rt-5.14.21-150400.15.124.1.noarch",
            "SUSE Linux Enterprise Micro 5.4:kernel-rt-5.14.21-150400.15.124.1.x86_64",
            "SUSE Linux Enterprise Micro 5.4:kernel-source-rt-5.14.21-150400.15.124.1.noarch"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2025-07-15T14:31:46Z",
          "details": "moderate"
        }
      ],
      "title": "CVE-2022-50137"
    },
    {
      "cve": "CVE-2022-50138",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2022-50138"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "In the Linux kernel, the following vulnerability has been resolved:\n\nRDMA/qedr: Fix potential memory leak in __qedr_alloc_mr()\n\n__qedr_alloc_mr() allocates a memory chunk for \"mr-\u003einfo.pbl_table\" with\ninit_mr_info(). When rdma_alloc_tid() and rdma_register_tid() fail, \"mr\"\nis released while \"mr-\u003einfo.pbl_table\" is not released, which will lead\nto a memory leak.\n\nWe should release the \"mr-\u003einfo.pbl_table\" with qedr_free_pbl() when error\noccurs to fix the memory leak.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "SUSE Linux Enterprise Micro 5.3:kernel-rt-5.14.21-150400.15.124.1.x86_64",
          "SUSE Linux Enterprise Micro 5.3:kernel-source-rt-5.14.21-150400.15.124.1.noarch",
          "SUSE Linux Enterprise Micro 5.4:kernel-rt-5.14.21-150400.15.124.1.x86_64",
          "SUSE Linux Enterprise Micro 5.4:kernel-source-rt-5.14.21-150400.15.124.1.noarch"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2022-50138",
          "url": "https://www.suse.com/security/cve/CVE-2022-50138"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1244797 for CVE-2022-50138",
          "url": "https://bugzilla.suse.com/1244797"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "SUSE Linux Enterprise Micro 5.3:kernel-rt-5.14.21-150400.15.124.1.x86_64",
            "SUSE Linux Enterprise Micro 5.3:kernel-source-rt-5.14.21-150400.15.124.1.noarch",
            "SUSE Linux Enterprise Micro 5.4:kernel-rt-5.14.21-150400.15.124.1.x86_64",
            "SUSE Linux Enterprise Micro 5.4:kernel-source-rt-5.14.21-150400.15.124.1.noarch"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 5.5,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
            "version": "3.1"
          },
          "products": [
            "SUSE Linux Enterprise Micro 5.3:kernel-rt-5.14.21-150400.15.124.1.x86_64",
            "SUSE Linux Enterprise Micro 5.3:kernel-source-rt-5.14.21-150400.15.124.1.noarch",
            "SUSE Linux Enterprise Micro 5.4:kernel-rt-5.14.21-150400.15.124.1.x86_64",
            "SUSE Linux Enterprise Micro 5.4:kernel-source-rt-5.14.21-150400.15.124.1.noarch"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2025-07-15T14:31:46Z",
          "details": "moderate"
        }
      ],
      "title": "CVE-2022-50138"
    },
    {
      "cve": "CVE-2022-50139",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2022-50139"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "In the Linux kernel, the following vulnerability has been resolved:\n\nusb: aspeed-vhub: Fix refcount leak bug in ast_vhub_init_desc()\n\nWe should call of_node_put() for the reference returned by\nof_get_child_by_name() which has increased the refcount.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "SUSE Linux Enterprise Micro 5.3:kernel-rt-5.14.21-150400.15.124.1.x86_64",
          "SUSE Linux Enterprise Micro 5.3:kernel-source-rt-5.14.21-150400.15.124.1.noarch",
          "SUSE Linux Enterprise Micro 5.4:kernel-rt-5.14.21-150400.15.124.1.x86_64",
          "SUSE Linux Enterprise Micro 5.4:kernel-source-rt-5.14.21-150400.15.124.1.noarch"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2022-50139",
          "url": "https://www.suse.com/security/cve/CVE-2022-50139"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1244798 for CVE-2022-50139",
          "url": "https://bugzilla.suse.com/1244798"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "SUSE Linux Enterprise Micro 5.3:kernel-rt-5.14.21-150400.15.124.1.x86_64",
            "SUSE Linux Enterprise Micro 5.3:kernel-source-rt-5.14.21-150400.15.124.1.noarch",
            "SUSE Linux Enterprise Micro 5.4:kernel-rt-5.14.21-150400.15.124.1.x86_64",
            "SUSE Linux Enterprise Micro 5.4:kernel-source-rt-5.14.21-150400.15.124.1.noarch"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 5.5,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
            "version": "3.1"
          },
          "products": [
            "SUSE Linux Enterprise Micro 5.3:kernel-rt-5.14.21-150400.15.124.1.x86_64",
            "SUSE Linux Enterprise Micro 5.3:kernel-source-rt-5.14.21-150400.15.124.1.noarch",
            "SUSE Linux Enterprise Micro 5.4:kernel-rt-5.14.21-150400.15.124.1.x86_64",
            "SUSE Linux Enterprise Micro 5.4:kernel-source-rt-5.14.21-150400.15.124.1.noarch"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2025-07-15T14:31:46Z",
          "details": "moderate"
        }
      ],
      "title": "CVE-2022-50139"
    },
    {
      "cve": "CVE-2022-50140",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2022-50140"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "In the Linux kernel, the following vulnerability has been resolved:\n\nmemstick/ms_block: Fix a memory leak\n\n\u0027erased_blocks_bitmap\u0027 is never freed. As it is allocated at the same time\nas \u0027used_blocks_bitmap\u0027, it is likely that it should be freed also at the\nsame time.\n\nAdd the corresponding bitmap_free() in msb_data_clear().",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "SUSE Linux Enterprise Micro 5.3:kernel-rt-5.14.21-150400.15.124.1.x86_64",
          "SUSE Linux Enterprise Micro 5.3:kernel-source-rt-5.14.21-150400.15.124.1.noarch",
          "SUSE Linux Enterprise Micro 5.4:kernel-rt-5.14.21-150400.15.124.1.x86_64",
          "SUSE Linux Enterprise Micro 5.4:kernel-source-rt-5.14.21-150400.15.124.1.noarch"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2022-50140",
          "url": "https://www.suse.com/security/cve/CVE-2022-50140"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1244793 for CVE-2022-50140",
          "url": "https://bugzilla.suse.com/1244793"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "SUSE Linux Enterprise Micro 5.3:kernel-rt-5.14.21-150400.15.124.1.x86_64",
            "SUSE Linux Enterprise Micro 5.3:kernel-source-rt-5.14.21-150400.15.124.1.noarch",
            "SUSE Linux Enterprise Micro 5.4:kernel-rt-5.14.21-150400.15.124.1.x86_64",
            "SUSE Linux Enterprise Micro 5.4:kernel-source-rt-5.14.21-150400.15.124.1.noarch"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 5.5,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
            "version": "3.1"
          },
          "products": [
            "SUSE Linux Enterprise Micro 5.3:kernel-rt-5.14.21-150400.15.124.1.x86_64",
            "SUSE Linux Enterprise Micro 5.3:kernel-source-rt-5.14.21-150400.15.124.1.noarch",
            "SUSE Linux Enterprise Micro 5.4:kernel-rt-5.14.21-150400.15.124.1.x86_64",
            "SUSE Linux Enterprise Micro 5.4:kernel-source-rt-5.14.21-150400.15.124.1.noarch"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2025-07-15T14:31:46Z",
          "details": "moderate"
        }
      ],
      "title": "CVE-2022-50140"
    },
    {
      "cve": "CVE-2022-50141",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2022-50141"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "In the Linux kernel, the following vulnerability has been resolved:\n\nmmc: sdhci-of-esdhc: Fix refcount leak in esdhc_signal_voltage_switch\n\nof_find_matching_node() returns a node pointer with refcount\nincremented, we should use of_node_put() on it when not need anymore.\nAdd missing of_node_put() to avoid refcount leak.\nof_node_put() checks null pointer.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "SUSE Linux Enterprise Micro 5.3:kernel-rt-5.14.21-150400.15.124.1.x86_64",
          "SUSE Linux Enterprise Micro 5.3:kernel-source-rt-5.14.21-150400.15.124.1.noarch",
          "SUSE Linux Enterprise Micro 5.4:kernel-rt-5.14.21-150400.15.124.1.x86_64",
          "SUSE Linux Enterprise Micro 5.4:kernel-source-rt-5.14.21-150400.15.124.1.noarch"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2022-50141",
          "url": "https://www.suse.com/security/cve/CVE-2022-50141"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1244794 for CVE-2022-50141",
          "url": "https://bugzilla.suse.com/1244794"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "SUSE Linux Enterprise Micro 5.3:kernel-rt-5.14.21-150400.15.124.1.x86_64",
            "SUSE Linux Enterprise Micro 5.3:kernel-source-rt-5.14.21-150400.15.124.1.noarch",
            "SUSE Linux Enterprise Micro 5.4:kernel-rt-5.14.21-150400.15.124.1.x86_64",
            "SUSE Linux Enterprise Micro 5.4:kernel-source-rt-5.14.21-150400.15.124.1.noarch"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 5.5,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
            "version": "3.1"
          },
          "products": [
            "SUSE Linux Enterprise Micro 5.3:kernel-rt-5.14.21-150400.15.124.1.x86_64",
            "SUSE Linux Enterprise Micro 5.3:kernel-source-rt-5.14.21-150400.15.124.1.noarch",
            "SUSE Linux Enterprise Micro 5.4:kernel-rt-5.14.21-150400.15.124.1.x86_64",
            "SUSE Linux Enterprise Micro 5.4:kernel-source-rt-5.14.21-150400.15.124.1.noarch"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2025-07-15T14:31:46Z",
          "details": "moderate"
        }
      ],
      "title": "CVE-2022-50141"
    },
    {
      "cve": "CVE-2022-50142",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2022-50142"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "In the Linux kernel, the following vulnerability has been resolved:\n\nintel_th: msu: Fix vmalloced buffers\n\nAfter commit f5ff79fddf0e (\"dma-mapping: remove CONFIG_DMA_REMAP\") there\u0027s\na chance of DMA buffer getting allocated via vmalloc(), which messes up\nthe mmapping code:\n\n\u003e RIP: msc_mmap_fault [intel_th_msu]\n\u003e Call Trace:\n\u003e  \u003cTASK\u003e\n\u003e  __do_fault\n\u003e  do_fault\n...\n\nFix this by accounting for vmalloc possibility.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "SUSE Linux Enterprise Micro 5.3:kernel-rt-5.14.21-150400.15.124.1.x86_64",
          "SUSE Linux Enterprise Micro 5.3:kernel-source-rt-5.14.21-150400.15.124.1.noarch",
          "SUSE Linux Enterprise Micro 5.4:kernel-rt-5.14.21-150400.15.124.1.x86_64",
          "SUSE Linux Enterprise Micro 5.4:kernel-source-rt-5.14.21-150400.15.124.1.noarch"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2022-50142",
          "url": "https://www.suse.com/security/cve/CVE-2022-50142"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1244796 for CVE-2022-50142",
          "url": "https://bugzilla.suse.com/1244796"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "SUSE Linux Enterprise Micro 5.3:kernel-rt-5.14.21-150400.15.124.1.x86_64",
            "SUSE Linux Enterprise Micro 5.3:kernel-source-rt-5.14.21-150400.15.124.1.noarch",
            "SUSE Linux Enterprise Micro 5.4:kernel-rt-5.14.21-150400.15.124.1.x86_64",
            "SUSE Linux Enterprise Micro 5.4:kernel-source-rt-5.14.21-150400.15.124.1.noarch"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 5.5,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
            "version": "3.1"
          },
          "products": [
            "SUSE Linux Enterprise Micro 5.3:kernel-rt-5.14.21-150400.15.124.1.x86_64",
            "SUSE Linux Enterprise Micro 5.3:kernel-source-rt-5.14.21-150400.15.124.1.noarch",
            "SUSE Linux Enterprise Micro 5.4:kernel-rt-5.14.21-150400.15.124.1.x86_64",
            "SUSE Linux Enterprise Micro 5.4:kernel-source-rt-5.14.21-150400.15.124.1.noarch"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2025-07-15T14:31:46Z",
          "details": "moderate"
        }
      ],
      "title": "CVE-2022-50142"
    },
    {
      "cve": "CVE-2022-50143",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2022-50143"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "In the Linux kernel, the following vulnerability has been resolved:\n\nintel_th: Fix a resource leak in an error handling path\n\nIf an error occurs after calling \u0027pci_alloc_irq_vectors()\u0027,\n\u0027pci_free_irq_vectors()\u0027 must be called as already done in the remove\nfunction.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "SUSE Linux Enterprise Micro 5.3:kernel-rt-5.14.21-150400.15.124.1.x86_64",
          "SUSE Linux Enterprise Micro 5.3:kernel-source-rt-5.14.21-150400.15.124.1.noarch",
          "SUSE Linux Enterprise Micro 5.4:kernel-rt-5.14.21-150400.15.124.1.x86_64",
          "SUSE Linux Enterprise Micro 5.4:kernel-source-rt-5.14.21-150400.15.124.1.noarch"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2022-50143",
          "url": "https://www.suse.com/security/cve/CVE-2022-50143"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1244790 for CVE-2022-50143",
          "url": "https://bugzilla.suse.com/1244790"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "SUSE Linux Enterprise Micro 5.3:kernel-rt-5.14.21-150400.15.124.1.x86_64",
            "SUSE Linux Enterprise Micro 5.3:kernel-source-rt-5.14.21-150400.15.124.1.noarch",
            "SUSE Linux Enterprise Micro 5.4:kernel-rt-5.14.21-150400.15.124.1.x86_64",
            "SUSE Linux Enterprise Micro 5.4:kernel-source-rt-5.14.21-150400.15.124.1.noarch"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 5.5,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
            "version": "3.1"
          },
          "products": [
            "SUSE Linux Enterprise Micro 5.3:kernel-rt-5.14.21-150400.15.124.1.x86_64",
            "SUSE Linux Enterprise Micro 5.3:kernel-source-rt-5.14.21-150400.15.124.1.noarch",
            "SUSE Linux Enterprise Micro 5.4:kernel-rt-5.14.21-150400.15.124.1.x86_64",
            "SUSE Linux Enterprise Micro 5.4:kernel-source-rt-5.14.21-150400.15.124.1.noarch"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2025-07-15T14:31:46Z",
          "details": "moderate"
        }
      ],
      "title": "CVE-2022-50143"
    },
    {
      "cve": "CVE-2022-50145",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2022-50145"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "In the Linux kernel, the following vulnerability has been resolved:\n\ndmaengine: sf-pdma: Add multithread support for a DMA channel\n\nWhen we get a DMA channel and try to use it in multiple threads it\nwill cause oops and hanging the system.\n\n% echo 64 \u003e /sys/module/dmatest/parameters/threads_per_chan\n% echo 10000 \u003e /sys/module/dmatest/parameters/iterations\n% echo 1 \u003e /sys/module/dmatest/parameters/run\n[   89.480664] Unable to handle kernel NULL pointer dereference at virtual\n               address 00000000000000a0\n[   89.488725] Oops [#1]\n[   89.494708] CPU: 2 PID: 1008 Comm: dma0chan0-copy0 Not tainted\n               5.17.0-rc5\n[   89.509385] epc : vchan_find_desc+0x32/0x46\n[   89.513553]  ra : sf_pdma_tx_status+0xca/0xd6\n\nThis happens because of data race. Each thread rewrite channels\u0027s\ndescriptor as soon as device_prep_dma_memcpy() is called. It leads to the\nsituation when the driver thinks that it uses right descriptor that\nactually is freed or substituted for other one.\n\nWith current fixes a descriptor changes its value only when it has\nbeen used. A new descriptor is acquired from vc-\u003edesc_issued queue that\nis already filled with descriptors that are ready to be sent. Threads\nhave no direct access to DMA channel descriptor. Now it is just possible\nto queue a descriptor for further processing.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "SUSE Linux Enterprise Micro 5.3:kernel-rt-5.14.21-150400.15.124.1.x86_64",
          "SUSE Linux Enterprise Micro 5.3:kernel-source-rt-5.14.21-150400.15.124.1.noarch",
          "SUSE Linux Enterprise Micro 5.4:kernel-rt-5.14.21-150400.15.124.1.x86_64",
          "SUSE Linux Enterprise Micro 5.4:kernel-source-rt-5.14.21-150400.15.124.1.noarch"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2022-50145",
          "url": "https://www.suse.com/security/cve/CVE-2022-50145"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1244787 for CVE-2022-50145",
          "url": "https://bugzilla.suse.com/1244787"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "SUSE Linux Enterprise Micro 5.3:kernel-rt-5.14.21-150400.15.124.1.x86_64",
            "SUSE Linux Enterprise Micro 5.3:kernel-source-rt-5.14.21-150400.15.124.1.noarch",
            "SUSE Linux Enterprise Micro 5.4:kernel-rt-5.14.21-150400.15.124.1.x86_64",
            "SUSE Linux Enterprise Micro 5.4:kernel-source-rt-5.14.21-150400.15.124.1.noarch"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 5.5,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
            "version": "3.1"
          },
          "products": [
            "SUSE Linux Enterprise Micro 5.3:kernel-rt-5.14.21-150400.15.124.1.x86_64",
            "SUSE Linux Enterprise Micro 5.3:kernel-source-rt-5.14.21-150400.15.124.1.noarch",
            "SUSE Linux Enterprise Micro 5.4:kernel-rt-5.14.21-150400.15.124.1.x86_64",
            "SUSE Linux Enterprise Micro 5.4:kernel-source-rt-5.14.21-150400.15.124.1.noarch"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2025-07-15T14:31:46Z",
          "details": "moderate"
        }
      ],
      "title": "CVE-2022-50145"
    },
    {
      "cve": "CVE-2022-50146",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2022-50146"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "In the Linux kernel, the following vulnerability has been resolved:\n\nPCI: dwc: Deallocate EPC memory on dw_pcie_ep_init() errors\n\nIf dw_pcie_ep_init() fails to perform any action after the EPC memory is\ninitialized and the MSI memory region is allocated, the latter parts won\u0027t\nbe undone thus causing a memory leak.  Add a cleanup-on-error path to fix\nthese leaks.\n\n[bhelgaas: commit log]",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "SUSE Linux Enterprise Micro 5.3:kernel-rt-5.14.21-150400.15.124.1.x86_64",
          "SUSE Linux Enterprise Micro 5.3:kernel-source-rt-5.14.21-150400.15.124.1.noarch",
          "SUSE Linux Enterprise Micro 5.4:kernel-rt-5.14.21-150400.15.124.1.x86_64",
          "SUSE Linux Enterprise Micro 5.4:kernel-source-rt-5.14.21-150400.15.124.1.noarch"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2022-50146",
          "url": "https://www.suse.com/security/cve/CVE-2022-50146"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1244788 for CVE-2022-50146",
          "url": "https://bugzilla.suse.com/1244788"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "SUSE Linux Enterprise Micro 5.3:kernel-rt-5.14.21-150400.15.124.1.x86_64",
            "SUSE Linux Enterprise Micro 5.3:kernel-source-rt-5.14.21-150400.15.124.1.noarch",
            "SUSE Linux Enterprise Micro 5.4:kernel-rt-5.14.21-150400.15.124.1.x86_64",
            "SUSE Linux Enterprise Micro 5.4:kernel-source-rt-5.14.21-150400.15.124.1.noarch"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 5.5,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
            "version": "3.1"
          },
          "products": [
            "SUSE Linux Enterprise Micro 5.3:kernel-rt-5.14.21-150400.15.124.1.x86_64",
            "SUSE Linux Enterprise Micro 5.3:kernel-source-rt-5.14.21-150400.15.124.1.noarch",
            "SUSE Linux Enterprise Micro 5.4:kernel-rt-5.14.21-150400.15.124.1.x86_64",
            "SUSE Linux Enterprise Micro 5.4:kernel-source-rt-5.14.21-150400.15.124.1.noarch"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2025-07-15T14:31:46Z",
          "details": "moderate"
        }
      ],
      "title": "CVE-2022-50146"
    },
    {
      "cve": "CVE-2022-50149",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2022-50149"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "In the Linux kernel, the following vulnerability has been resolved:\n\ndriver core: fix potential deadlock in __driver_attach\n\nIn __driver_attach function, There are also AA deadlock problem,\nlike the commit b232b02bf3c2 (\"driver core: fix deadlock in\n__device_attach\").\n\nstack like commit b232b02bf3c2 (\"driver core: fix deadlock in\n__device_attach\").\nlist below:\n    In __driver_attach function, The lock holding logic is as follows:\n    ...\n    __driver_attach\n    if (driver_allows_async_probing(drv))\n      device_lock(dev)      // get lock dev\n        async_schedule_dev(__driver_attach_async_helper, dev); // func\n          async_schedule_node\n            async_schedule_node_domain(func)\n              entry = kzalloc(sizeof(struct async_entry), GFP_ATOMIC);\n              /* when fail or work limit, sync to execute func, but\n                 __driver_attach_async_helper will get lock dev as\n                 will, which will lead to A-A deadlock.  */\n              if (!entry || atomic_read(\u0026entry_count) \u003e MAX_WORK) {\n                func;\n              else\n                queue_work_node(node, system_unbound_wq, \u0026entry-\u003ework)\n      device_unlock(dev)\n\n    As above show, when it is allowed to do async probes, because of\n    out of memory or work limit, async work is not be allowed, to do\n    sync execute instead. it will lead to A-A deadlock because of\n    __driver_attach_async_helper getting lock dev.\n\nReproduce:\nand it can be reproduce by make the condition\n(if (!entry || atomic_read(\u0026entry_count) \u003e MAX_WORK)) untenable, like\nbelow:\n\n[  370.785650] \"echo 0 \u003e /proc/sys/kernel/hung_task_timeout_secs\" disables\nthis message.\n[  370.787154] task:swapper/0       state:D stack:    0 pid:    1 ppid:\n0 flags:0x00004000\n[  370.788865] Call Trace:\n[  370.789374]  \u003cTASK\u003e\n[  370.789841]  __schedule+0x482/0x1050\n[  370.790613]  schedule+0x92/0x1a0\n[  370.791290]  schedule_preempt_disabled+0x2c/0x50\n[  370.792256]  __mutex_lock.isra.0+0x757/0xec0\n[  370.793158]  __mutex_lock_slowpath+0x1f/0x30\n[  370.794079]  mutex_lock+0x50/0x60\n[  370.794795]  __device_driver_lock+0x2f/0x70\n[  370.795677]  ? driver_probe_device+0xd0/0xd0\n[  370.796576]  __driver_attach_async_helper+0x1d/0xd0\n[  370.797318]  ? driver_probe_device+0xd0/0xd0\n[  370.797957]  async_schedule_node_domain+0xa5/0xc0\n[  370.798652]  async_schedule_node+0x19/0x30\n[  370.799243]  __driver_attach+0x246/0x290\n[  370.799828]  ? driver_allows_async_probing+0xa0/0xa0\n[  370.800548]  bus_for_each_dev+0x9d/0x130\n[  370.801132]  driver_attach+0x22/0x30\n[  370.801666]  bus_add_driver+0x290/0x340\n[  370.802246]  driver_register+0x88/0x140\n[  370.802817]  ? virtio_scsi_init+0x116/0x116\n[  370.803425]  scsi_register_driver+0x1a/0x30\n[  370.804057]  init_sd+0x184/0x226\n[  370.804533]  do_one_initcall+0x71/0x3a0\n[  370.805107]  kernel_init_freeable+0x39a/0x43a\n[  370.805759]  ? rest_init+0x150/0x150\n[  370.806283]  kernel_init+0x26/0x230\n[  370.806799]  ret_from_fork+0x1f/0x30\n\nTo fix the deadlock, move the async_schedule_dev outside device_lock,\nas we can see, in async_schedule_node_domain, the parameter of\nqueue_work_node is system_unbound_wq, so it can accept concurrent\noperations. which will also not change the code logic, and will\nnot lead to deadlock.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "SUSE Linux Enterprise Micro 5.3:kernel-rt-5.14.21-150400.15.124.1.x86_64",
          "SUSE Linux Enterprise Micro 5.3:kernel-source-rt-5.14.21-150400.15.124.1.noarch",
          "SUSE Linux Enterprise Micro 5.4:kernel-rt-5.14.21-150400.15.124.1.x86_64",
          "SUSE Linux Enterprise Micro 5.4:kernel-source-rt-5.14.21-150400.15.124.1.noarch"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2022-50149",
          "url": "https://www.suse.com/security/cve/CVE-2022-50149"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1244883 for CVE-2022-50149",
          "url": "https://bugzilla.suse.com/1244883"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "SUSE Linux Enterprise Micro 5.3:kernel-rt-5.14.21-150400.15.124.1.x86_64",
            "SUSE Linux Enterprise Micro 5.3:kernel-source-rt-5.14.21-150400.15.124.1.noarch",
            "SUSE Linux Enterprise Micro 5.4:kernel-rt-5.14.21-150400.15.124.1.x86_64",
            "SUSE Linux Enterprise Micro 5.4:kernel-source-rt-5.14.21-150400.15.124.1.noarch"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 5.5,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
            "version": "3.1"
          },
          "products": [
            "SUSE Linux Enterprise Micro 5.3:kernel-rt-5.14.21-150400.15.124.1.x86_64",
            "SUSE Linux Enterprise Micro 5.3:kernel-source-rt-5.14.21-150400.15.124.1.noarch",
            "SUSE Linux Enterprise Micro 5.4:kernel-rt-5.14.21-150400.15.124.1.x86_64",
            "SUSE Linux Enterprise Micro 5.4:kernel-source-rt-5.14.21-150400.15.124.1.noarch"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2025-07-15T14:31:46Z",
          "details": "moderate"
        }
      ],
      "title": "CVE-2022-50149"
    },
    {
      "cve": "CVE-2022-50151",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2022-50151"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "In the Linux kernel, the following vulnerability has been resolved:\n\nusb: cdns3: fix random warning message when driver load\n\nWarning log:\n[    4.141392] Unexpected gfp: 0x4 (GFP_DMA32). Fixing up to gfp: 0xa20 (GFP_ATOMIC). Fix your code!\n[    4.150340] CPU: 1 PID: 175 Comm: 1-0050 Not tainted 5.15.5-00039-g2fd9ae1b568c #20\n[    4.158010] Hardware name: Freescale i.MX8QXP MEK (DT)\n[    4.163155] Call trace:\n[    4.165600]  dump_backtrace+0x0/0x1b0\n[    4.169286]  show_stack+0x18/0x68\n[    4.172611]  dump_stack_lvl+0x68/0x84\n[    4.176286]  dump_stack+0x18/0x34\n[    4.179613]  kmalloc_fix_flags+0x60/0x88\n[    4.183550]  new_slab+0x334/0x370\n[    4.186878]  ___slab_alloc.part.108+0x4d4/0x748\n[    4.191419]  __slab_alloc.isra.109+0x30/0x78\n[    4.195702]  kmem_cache_alloc+0x40c/0x420\n[    4.199725]  dma_pool_alloc+0xac/0x1f8\n[    4.203486]  cdns3_allocate_trb_pool+0xb4/0xd0\n\npool_alloc_page(struct dma_pool *pool, gfp_t mem_flags)\n{\n\t...\n\tpage = kmalloc(sizeof(*page), mem_flags);\n\tpage-\u003evaddr = dma_alloc_coherent(pool-\u003edev, pool-\u003eallocation,\n\t\t\t\t\t \u0026page-\u003edma, mem_flags);\n\t...\n}\n\nkmalloc was called with mem_flags, which is passed down in\ncdns3_allocate_trb_pool() and have GFP_DMA32 flags.\nkmall_fix_flags() report warning.\n\nGFP_DMA32 is not useful at all. dma_alloc_coherent() will handle\nDMA memory region correctly by pool-\u003edev. GFP_DMA32 can be removed\nsafely.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "SUSE Linux Enterprise Micro 5.3:kernel-rt-5.14.21-150400.15.124.1.x86_64",
          "SUSE Linux Enterprise Micro 5.3:kernel-source-rt-5.14.21-150400.15.124.1.noarch",
          "SUSE Linux Enterprise Micro 5.4:kernel-rt-5.14.21-150400.15.124.1.x86_64",
          "SUSE Linux Enterprise Micro 5.4:kernel-source-rt-5.14.21-150400.15.124.1.noarch"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2022-50151",
          "url": "https://www.suse.com/security/cve/CVE-2022-50151"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1245093 for CVE-2022-50151",
          "url": "https://bugzilla.suse.com/1245093"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "SUSE Linux Enterprise Micro 5.3:kernel-rt-5.14.21-150400.15.124.1.x86_64",
            "SUSE Linux Enterprise Micro 5.3:kernel-source-rt-5.14.21-150400.15.124.1.noarch",
            "SUSE Linux Enterprise Micro 5.4:kernel-rt-5.14.21-150400.15.124.1.x86_64",
            "SUSE Linux Enterprise Micro 5.4:kernel-source-rt-5.14.21-150400.15.124.1.noarch"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 5.5,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
            "version": "3.1"
          },
          "products": [
            "SUSE Linux Enterprise Micro 5.3:kernel-rt-5.14.21-150400.15.124.1.x86_64",
            "SUSE Linux Enterprise Micro 5.3:kernel-source-rt-5.14.21-150400.15.124.1.noarch",
            "SUSE Linux Enterprise Micro 5.4:kernel-rt-5.14.21-150400.15.124.1.x86_64",
            "SUSE Linux Enterprise Micro 5.4:kernel-source-rt-5.14.21-150400.15.124.1.noarch"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2025-07-15T14:31:46Z",
          "details": "moderate"
        }
      ],
      "title": "CVE-2022-50151"
    },
    {
      "cve": "CVE-2022-50152",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2022-50152"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "In the Linux kernel, the following vulnerability has been resolved:\n\nusb: ohci-nxp: Fix refcount leak in ohci_hcd_nxp_probe\n\nof_parse_phandle() returns a node pointer with refcount\nincremented, we should use of_node_put() on it when not need anymore.\nAdd missing of_node_put() to avoid refcount leak.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "SUSE Linux Enterprise Micro 5.3:kernel-rt-5.14.21-150400.15.124.1.x86_64",
          "SUSE Linux Enterprise Micro 5.3:kernel-source-rt-5.14.21-150400.15.124.1.noarch",
          "SUSE Linux Enterprise Micro 5.4:kernel-rt-5.14.21-150400.15.124.1.x86_64",
          "SUSE Linux Enterprise Micro 5.4:kernel-source-rt-5.14.21-150400.15.124.1.noarch"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2022-50152",
          "url": "https://www.suse.com/security/cve/CVE-2022-50152"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1244783 for CVE-2022-50152",
          "url": "https://bugzilla.suse.com/1244783"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "SUSE Linux Enterprise Micro 5.3:kernel-rt-5.14.21-150400.15.124.1.x86_64",
            "SUSE Linux Enterprise Micro 5.3:kernel-source-rt-5.14.21-150400.15.124.1.noarch",
            "SUSE Linux Enterprise Micro 5.4:kernel-rt-5.14.21-150400.15.124.1.x86_64",
            "SUSE Linux Enterprise Micro 5.4:kernel-source-rt-5.14.21-150400.15.124.1.noarch"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 5.5,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
            "version": "3.1"
          },
          "products": [
            "SUSE Linux Enterprise Micro 5.3:kernel-rt-5.14.21-150400.15.124.1.x86_64",
            "SUSE Linux Enterprise Micro 5.3:kernel-source-rt-5.14.21-150400.15.124.1.noarch",
            "SUSE Linux Enterprise Micro 5.4:kernel-rt-5.14.21-150400.15.124.1.x86_64",
            "SUSE Linux Enterprise Micro 5.4:kernel-source-rt-5.14.21-150400.15.124.1.noarch"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2025-07-15T14:31:46Z",
          "details": "moderate"
        }
      ],
      "title": "CVE-2022-50152"
    },
    {
      "cve": "CVE-2022-50153",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2022-50153"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "In the Linux kernel, the following vulnerability has been resolved:\n\nusb: host: Fix refcount leak in ehci_hcd_ppc_of_probe\n\nof_find_compatible_node() returns a node pointer with refcount\nincremented, we should use of_node_put() on it when done.\nAdd missing of_node_put() to avoid refcount leak.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "SUSE Linux Enterprise Micro 5.3:kernel-rt-5.14.21-150400.15.124.1.x86_64",
          "SUSE Linux Enterprise Micro 5.3:kernel-source-rt-5.14.21-150400.15.124.1.noarch",
          "SUSE Linux Enterprise Micro 5.4:kernel-rt-5.14.21-150400.15.124.1.x86_64",
          "SUSE Linux Enterprise Micro 5.4:kernel-source-rt-5.14.21-150400.15.124.1.noarch"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2022-50153",
          "url": "https://www.suse.com/security/cve/CVE-2022-50153"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1244786 for CVE-2022-50153",
          "url": "https://bugzilla.suse.com/1244786"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "SUSE Linux Enterprise Micro 5.3:kernel-rt-5.14.21-150400.15.124.1.x86_64",
            "SUSE Linux Enterprise Micro 5.3:kernel-source-rt-5.14.21-150400.15.124.1.noarch",
            "SUSE Linux Enterprise Micro 5.4:kernel-rt-5.14.21-150400.15.124.1.x86_64",
            "SUSE Linux Enterprise Micro 5.4:kernel-source-rt-5.14.21-150400.15.124.1.noarch"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 5.5,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
            "version": "3.1"
          },
          "products": [
            "SUSE Linux Enterprise Micro 5.3:kernel-rt-5.14.21-150400.15.124.1.x86_64",
            "SUSE Linux Enterprise Micro 5.3:kernel-source-rt-5.14.21-150400.15.124.1.noarch",
            "SUSE Linux Enterprise Micro 5.4:kernel-rt-5.14.21-150400.15.124.1.x86_64",
            "SUSE Linux Enterprise Micro 5.4:kernel-source-rt-5.14.21-150400.15.124.1.noarch"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2025-07-15T14:31:46Z",
          "details": "moderate"
        }
      ],
      "title": "CVE-2022-50153"
    },
    {
      "cve": "CVE-2022-50154",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2022-50154"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "In the Linux kernel, the following vulnerability has been resolved:\n\nPCI: mediatek-gen3: Fix refcount leak in mtk_pcie_init_irq_domains()\n\nof_get_child_by_name() returns a node pointer with refcount incremented, so\nwe should use of_node_put() on it when we don\u0027t need it anymore.\n\nAdd missing of_node_put() to avoid refcount leak.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "SUSE Linux Enterprise Micro 5.3:kernel-rt-5.14.21-150400.15.124.1.x86_64",
          "SUSE Linux Enterprise Micro 5.3:kernel-source-rt-5.14.21-150400.15.124.1.noarch",
          "SUSE Linux Enterprise Micro 5.4:kernel-rt-5.14.21-150400.15.124.1.x86_64",
          "SUSE Linux Enterprise Micro 5.4:kernel-source-rt-5.14.21-150400.15.124.1.noarch"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2022-50154",
          "url": "https://www.suse.com/security/cve/CVE-2022-50154"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1244784 for CVE-2022-50154",
          "url": "https://bugzilla.suse.com/1244784"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "SUSE Linux Enterprise Micro 5.3:kernel-rt-5.14.21-150400.15.124.1.x86_64",
            "SUSE Linux Enterprise Micro 5.3:kernel-source-rt-5.14.21-150400.15.124.1.noarch",
            "SUSE Linux Enterprise Micro 5.4:kernel-rt-5.14.21-150400.15.124.1.x86_64",
            "SUSE Linux Enterprise Micro 5.4:kernel-source-rt-5.14.21-150400.15.124.1.noarch"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 5.5,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
            "version": "3.1"
          },
          "products": [
            "SUSE Linux Enterprise Micro 5.3:kernel-rt-5.14.21-150400.15.124.1.x86_64",
            "SUSE Linux Enterprise Micro 5.3:kernel-source-rt-5.14.21-150400.15.124.1.noarch",
            "SUSE Linux Enterprise Micro 5.4:kernel-rt-5.14.21-150400.15.124.1.x86_64",
            "SUSE Linux Enterprise Micro 5.4:kernel-source-rt-5.14.21-150400.15.124.1.noarch"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2025-07-15T14:31:46Z",
          "details": "moderate"
        }
      ],
      "title": "CVE-2022-50154"
    },
    {
      "cve": "CVE-2022-50155",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2022-50155"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "In the Linux kernel, the following vulnerability has been resolved:\n\nmtd: parsers: ofpart: Fix refcount leak in bcm4908_partitions_fw_offset\n\nof_find_node_by_path() returns a node pointer with refcount incremented,\nwe should use of_node_put() on it when not need anymore.\nAdd missing of_node_put() to avoid refcount leak.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "SUSE Linux Enterprise Micro 5.3:kernel-rt-5.14.21-150400.15.124.1.x86_64",
          "SUSE Linux Enterprise Micro 5.3:kernel-source-rt-5.14.21-150400.15.124.1.noarch",
          "SUSE Linux Enterprise Micro 5.4:kernel-rt-5.14.21-150400.15.124.1.x86_64",
          "SUSE Linux Enterprise Micro 5.4:kernel-source-rt-5.14.21-150400.15.124.1.noarch"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2022-50155",
          "url": "https://www.suse.com/security/cve/CVE-2022-50155"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1244781 for CVE-2022-50155",
          "url": "https://bugzilla.suse.com/1244781"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "SUSE Linux Enterprise Micro 5.3:kernel-rt-5.14.21-150400.15.124.1.x86_64",
            "SUSE Linux Enterprise Micro 5.3:kernel-source-rt-5.14.21-150400.15.124.1.noarch",
            "SUSE Linux Enterprise Micro 5.4:kernel-rt-5.14.21-150400.15.124.1.x86_64",
            "SUSE Linux Enterprise Micro 5.4:kernel-source-rt-5.14.21-150400.15.124.1.noarch"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 5.5,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
            "version": "3.1"
          },
          "products": [
            "SUSE Linux Enterprise Micro 5.3:kernel-rt-5.14.21-150400.15.124.1.x86_64",
            "SUSE Linux Enterprise Micro 5.3:kernel-source-rt-5.14.21-150400.15.124.1.noarch",
            "SUSE Linux Enterprise Micro 5.4:kernel-rt-5.14.21-150400.15.124.1.x86_64",
            "SUSE Linux Enterprise Micro 5.4:kernel-source-rt-5.14.21-150400.15.124.1.noarch"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2025-07-15T14:31:46Z",
          "details": "moderate"
        }
      ],
      "title": "CVE-2022-50155"
    },
    {
      "cve": "CVE-2022-50156",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2022-50156"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "In the Linux kernel, the following vulnerability has been resolved:\n\nHID: cp2112: prevent a buffer overflow in cp2112_xfer()\n\nSmatch warnings:\ndrivers/hid/hid-cp2112.c:793 cp2112_xfer() error: __memcpy()\n\u0027data-\u003eblock[1]\u0027 too small (33 vs 255)\ndrivers/hid/hid-cp2112.c:793 cp2112_xfer() error: __memcpy() \u0027buf\u0027 too\nsmall (64 vs 255)\n\nThe \u0027read_length\u0027 variable is provided by \u0027data-\u003eblock[0]\u0027 which comes\nfrom user and it(read_length) can take a value between 0-255. Add an\nupper bound to \u0027read_length\u0027 variable to prevent a buffer overflow in\nmemcpy().",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "SUSE Linux Enterprise Micro 5.3:kernel-rt-5.14.21-150400.15.124.1.x86_64",
          "SUSE Linux Enterprise Micro 5.3:kernel-source-rt-5.14.21-150400.15.124.1.noarch",
          "SUSE Linux Enterprise Micro 5.4:kernel-rt-5.14.21-150400.15.124.1.x86_64",
          "SUSE Linux Enterprise Micro 5.4:kernel-source-rt-5.14.21-150400.15.124.1.noarch"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2022-50156",
          "url": "https://www.suse.com/security/cve/CVE-2022-50156"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1244782 for CVE-2022-50156",
          "url": "https://bugzilla.suse.com/1244782"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "SUSE Linux Enterprise Micro 5.3:kernel-rt-5.14.21-150400.15.124.1.x86_64",
            "SUSE Linux Enterprise Micro 5.3:kernel-source-rt-5.14.21-150400.15.124.1.noarch",
            "SUSE Linux Enterprise Micro 5.4:kernel-rt-5.14.21-150400.15.124.1.x86_64",
            "SUSE Linux Enterprise Micro 5.4:kernel-source-rt-5.14.21-150400.15.124.1.noarch"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 5.5,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
            "version": "3.1"
          },
          "products": [
            "SUSE Linux Enterprise Micro 5.3:kernel-rt-5.14.21-150400.15.124.1.x86_64",
            "SUSE Linux Enterprise Micro 5.3:kernel-source-rt-5.14.21-150400.15.124.1.noarch",
            "SUSE Linux Enterprise Micro 5.4:kernel-rt-5.14.21-150400.15.124.1.x86_64",
            "SUSE Linux Enterprise Micro 5.4:kernel-source-rt-5.14.21-150400.15.124.1.noarch"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2025-07-15T14:31:46Z",
          "details": "moderate"
        }
      ],
      "title": "CVE-2022-50156"
    },
    {
      "cve": "CVE-2022-50157",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2022-50157"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "In the Linux kernel, the following vulnerability has been resolved:\n\nPCI: microchip: Fix refcount leak in mc_pcie_init_irq_domains()\n\nof_get_next_child() returns a node pointer with refcount incremented, so we\nshould use of_node_put() on it when we don\u0027t need it anymore.\n\nmc_pcie_init_irq_domains() only calls of_node_put() in the normal path,\nmissing it in some error paths.  Add missing of_node_put() to avoid\nrefcount leak.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "SUSE Linux Enterprise Micro 5.3:kernel-rt-5.14.21-150400.15.124.1.x86_64",
          "SUSE Linux Enterprise Micro 5.3:kernel-source-rt-5.14.21-150400.15.124.1.noarch",
          "SUSE Linux Enterprise Micro 5.4:kernel-rt-5.14.21-150400.15.124.1.x86_64",
          "SUSE Linux Enterprise Micro 5.4:kernel-source-rt-5.14.21-150400.15.124.1.noarch"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2022-50157",
          "url": "https://www.suse.com/security/cve/CVE-2022-50157"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1244780 for CVE-2022-50157",
          "url": "https://bugzilla.suse.com/1244780"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "SUSE Linux Enterprise Micro 5.3:kernel-rt-5.14.21-150400.15.124.1.x86_64",
            "SUSE Linux Enterprise Micro 5.3:kernel-source-rt-5.14.21-150400.15.124.1.noarch",
            "SUSE Linux Enterprise Micro 5.4:kernel-rt-5.14.21-150400.15.124.1.x86_64",
            "SUSE Linux Enterprise Micro 5.4:kernel-source-rt-5.14.21-150400.15.124.1.noarch"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 5.5,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
            "version": "3.1"
          },
          "products": [
            "SUSE Linux Enterprise Micro 5.3:kernel-rt-5.14.21-150400.15.124.1.x86_64",
            "SUSE Linux Enterprise Micro 5.3:kernel-source-rt-5.14.21-150400.15.124.1.noarch",
            "SUSE Linux Enterprise Micro 5.4:kernel-rt-5.14.21-150400.15.124.1.x86_64",
            "SUSE Linux Enterprise Micro 5.4:kernel-source-rt-5.14.21-150400.15.124.1.noarch"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2025-07-15T14:31:46Z",
          "details": "moderate"
        }
      ],
      "title": "CVE-2022-50157"
    },
    {
      "cve": "CVE-2022-50158",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2022-50158"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "In the Linux kernel, the following vulnerability has been resolved:\n\nmtd: partitions: Fix refcount leak in parse_redboot_of\n\nof_get_child_by_name() returns a node pointer with refcount\nincremented, we should use of_node_put() on it when not need anymore.\nAdd missing of_node_put() to avoid refcount leak.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "SUSE Linux Enterprise Micro 5.3:kernel-rt-5.14.21-150400.15.124.1.x86_64",
          "SUSE Linux Enterprise Micro 5.3:kernel-source-rt-5.14.21-150400.15.124.1.noarch",
          "SUSE Linux Enterprise Micro 5.4:kernel-rt-5.14.21-150400.15.124.1.x86_64",
          "SUSE Linux Enterprise Micro 5.4:kernel-source-rt-5.14.21-150400.15.124.1.noarch"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2022-50158",
          "url": "https://www.suse.com/security/cve/CVE-2022-50158"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1244779 for CVE-2022-50158",
          "url": "https://bugzilla.suse.com/1244779"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "SUSE Linux Enterprise Micro 5.3:kernel-rt-5.14.21-150400.15.124.1.x86_64",
            "SUSE Linux Enterprise Micro 5.3:kernel-source-rt-5.14.21-150400.15.124.1.noarch",
            "SUSE Linux Enterprise Micro 5.4:kernel-rt-5.14.21-150400.15.124.1.x86_64",
            "SUSE Linux Enterprise Micro 5.4:kernel-source-rt-5.14.21-150400.15.124.1.noarch"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 5.5,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
            "version": "3.1"
          },
          "products": [
            "SUSE Linux Enterprise Micro 5.3:kernel-rt-5.14.21-150400.15.124.1.x86_64",
            "SUSE Linux Enterprise Micro 5.3:kernel-source-rt-5.14.21-150400.15.124.1.noarch",
            "SUSE Linux Enterprise Micro 5.4:kernel-rt-5.14.21-150400.15.124.1.x86_64",
            "SUSE Linux Enterprise Micro 5.4:kernel-source-rt-5.14.21-150400.15.124.1.noarch"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2025-07-15T14:31:46Z",
          "details": "moderate"
        }
      ],
      "title": "CVE-2022-50158"
    },
    {
      "cve": "CVE-2022-50160",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2022-50160"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "In the Linux kernel, the following vulnerability has been resolved:\n\nmtd: maps: Fix refcount leak in ap_flash_init\n\nof_find_matching_node() returns a node pointer with refcount\nincremented, we should use of_node_put() on it when not need anymore.\nAdd missing of_node_put() to avoid refcount leak.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "SUSE Linux Enterprise Micro 5.3:kernel-rt-5.14.21-150400.15.124.1.x86_64",
          "SUSE Linux Enterprise Micro 5.3:kernel-source-rt-5.14.21-150400.15.124.1.noarch",
          "SUSE Linux Enterprise Micro 5.4:kernel-rt-5.14.21-150400.15.124.1.x86_64",
          "SUSE Linux Enterprise Micro 5.4:kernel-source-rt-5.14.21-150400.15.124.1.noarch"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2022-50160",
          "url": "https://www.suse.com/security/cve/CVE-2022-50160"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1244776 for CVE-2022-50160",
          "url": "https://bugzilla.suse.com/1244776"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "SUSE Linux Enterprise Micro 5.3:kernel-rt-5.14.21-150400.15.124.1.x86_64",
            "SUSE Linux Enterprise Micro 5.3:kernel-source-rt-5.14.21-150400.15.124.1.noarch",
            "SUSE Linux Enterprise Micro 5.4:kernel-rt-5.14.21-150400.15.124.1.x86_64",
            "SUSE Linux Enterprise Micro 5.4:kernel-source-rt-5.14.21-150400.15.124.1.noarch"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 5.5,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
            "version": "3.1"
          },
          "products": [
            "SUSE Linux Enterprise Micro 5.3:kernel-rt-5.14.21-150400.15.124.1.x86_64",
            "SUSE Linux Enterprise Micro 5.3:kernel-source-rt-5.14.21-150400.15.124.1.noarch",
            "SUSE Linux Enterprise Micro 5.4:kernel-rt-5.14.21-150400.15.124.1.x86_64",
            "SUSE Linux Enterprise Micro 5.4:kernel-source-rt-5.14.21-150400.15.124.1.noarch"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2025-07-15T14:31:46Z",
          "details": "moderate"
        }
      ],
      "title": "CVE-2022-50160"
    },
    {
      "cve": "CVE-2022-50161",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2022-50161"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "In the Linux kernel, the following vulnerability has been resolved:\n\nmtd: maps: Fix refcount leak in of_flash_probe_versatile\n\nof_find_matching_node_and_match() returns a node pointer with refcount\nincremented, we should use of_node_put() on it when not need anymore.\nAdd missing of_node_put() to avoid refcount leak.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "SUSE Linux Enterprise Micro 5.3:kernel-rt-5.14.21-150400.15.124.1.x86_64",
          "SUSE Linux Enterprise Micro 5.3:kernel-source-rt-5.14.21-150400.15.124.1.noarch",
          "SUSE Linux Enterprise Micro 5.4:kernel-rt-5.14.21-150400.15.124.1.x86_64",
          "SUSE Linux Enterprise Micro 5.4:kernel-source-rt-5.14.21-150400.15.124.1.noarch"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2022-50161",
          "url": "https://www.suse.com/security/cve/CVE-2022-50161"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1244774 for CVE-2022-50161",
          "url": "https://bugzilla.suse.com/1244774"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "SUSE Linux Enterprise Micro 5.3:kernel-rt-5.14.21-150400.15.124.1.x86_64",
            "SUSE Linux Enterprise Micro 5.3:kernel-source-rt-5.14.21-150400.15.124.1.noarch",
            "SUSE Linux Enterprise Micro 5.4:kernel-rt-5.14.21-150400.15.124.1.x86_64",
            "SUSE Linux Enterprise Micro 5.4:kernel-source-rt-5.14.21-150400.15.124.1.noarch"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 5.5,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
            "version": "3.1"
          },
          "products": [
            "SUSE Linux Enterprise Micro 5.3:kernel-rt-5.14.21-150400.15.124.1.x86_64",
            "SUSE Linux Enterprise Micro 5.3:kernel-source-rt-5.14.21-150400.15.124.1.noarch",
            "SUSE Linux Enterprise Micro 5.4:kernel-rt-5.14.21-150400.15.124.1.x86_64",
            "SUSE Linux Enterprise Micro 5.4:kernel-source-rt-5.14.21-150400.15.124.1.noarch"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2025-07-15T14:31:46Z",
          "details": "moderate"
        }
      ],
      "title": "CVE-2022-50161"
    },
    {
      "cve": "CVE-2022-50162",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2022-50162"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "In the Linux kernel, the following vulnerability has been resolved:\n\nwifi: libertas: Fix possible refcount leak in if_usb_probe()\n\nusb_get_dev will be called before lbs_get_firmware_async which means that\nusb_put_dev need to be called when lbs_get_firmware_async fails.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "SUSE Linux Enterprise Micro 5.3:kernel-rt-5.14.21-150400.15.124.1.x86_64",
          "SUSE Linux Enterprise Micro 5.3:kernel-source-rt-5.14.21-150400.15.124.1.noarch",
          "SUSE Linux Enterprise Micro 5.4:kernel-rt-5.14.21-150400.15.124.1.x86_64",
          "SUSE Linux Enterprise Micro 5.4:kernel-source-rt-5.14.21-150400.15.124.1.noarch"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2022-50162",
          "url": "https://www.suse.com/security/cve/CVE-2022-50162"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1244773 for CVE-2022-50162",
          "url": "https://bugzilla.suse.com/1244773"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "SUSE Linux Enterprise Micro 5.3:kernel-rt-5.14.21-150400.15.124.1.x86_64",
            "SUSE Linux Enterprise Micro 5.3:kernel-source-rt-5.14.21-150400.15.124.1.noarch",
            "SUSE Linux Enterprise Micro 5.4:kernel-rt-5.14.21-150400.15.124.1.x86_64",
            "SUSE Linux Enterprise Micro 5.4:kernel-source-rt-5.14.21-150400.15.124.1.noarch"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 5.5,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
            "version": "3.1"
          },
          "products": [
            "SUSE Linux Enterprise Micro 5.3:kernel-rt-5.14.21-150400.15.124.1.x86_64",
            "SUSE Linux Enterprise Micro 5.3:kernel-source-rt-5.14.21-150400.15.124.1.noarch",
            "SUSE Linux Enterprise Micro 5.4:kernel-rt-5.14.21-150400.15.124.1.x86_64",
            "SUSE Linux Enterprise Micro 5.4:kernel-source-rt-5.14.21-150400.15.124.1.noarch"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2025-07-15T14:31:46Z",
          "details": "moderate"
        }
      ],
      "title": "CVE-2022-50162"
    },
    {
      "cve": "CVE-2022-50164",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2022-50164"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "In the Linux kernel, the following vulnerability has been resolved:\n\nwifi: iwlwifi: mvm: fix double list_add at iwl_mvm_mac_wake_tx_queue\n\nAfter successfull station association, if station queues are disabled for\nsome reason, the related lists are not emptied. So if some new element is\nadded to the list in iwl_mvm_mac_wake_tx_queue, it can match with the old\none and produce a BUG like this:\n\n[   46.535263] list_add corruption. prev-\u003enext should be next (ffff94c1c318a360), but was 0000000000000000. (prev=ffff94c1d02d3388).\n[   46.535283] ------------[ cut here ]------------\n[   46.535284] kernel BUG at lib/list_debug.c:26!\n[   46.535290] invalid opcode: 0000 [#1] PREEMPT SMP PTI\n[   46.585304] CPU: 0 PID: 623 Comm: wpa_supplicant Not tainted 5.19.0-rc3+ #1\n[   46.592380] Hardware name: Dell Inc. Inspiron 660s/0478VN       , BIOS A07 08/24/2012\n[   46.600336] RIP: 0010:__list_add_valid.cold+0x3d/0x3f\n[   46.605475] Code: f2 4c 89 c1 48 89 fe 48 c7 c7 c8 40 67 93 e8 20 cc fd ff 0f 0b 48 89 d1 4c 89 c6 4c 89 ca 48 c7 c7 70 40 67 93 e8 09 cc fd ff \u003c0f\u003e 0b 48 89 fe 48 c7 c7 00 41 67 93 e8 f8 cb fd ff 0f 0b 48 89 d1\n[   46.624469] RSP: 0018:ffffb20800ab76d8 EFLAGS: 00010286\n[   46.629854] RAX: 0000000000000075 RBX: ffff94c1c318a0e0 RCX: 0000000000000000\n[   46.637105] RDX: 0000000000000201 RSI: ffffffff9365e100 RDI: 00000000ffffffff\n[   46.644356] RBP: ffff94c1c5f43370 R08: 0000000000000075 R09: 3064316334396666\n[   46.651607] R10: 3364323064316334 R11: 39666666663d7665 R12: ffff94c1c5f43388\n[   46.658857] R13: ffff94c1d02d3388 R14: ffff94c1c318a360 R15: ffff94c1cf2289c0\n[   46.666108] FS:  00007f65634ff7c0(0000) GS:ffff94c1da200000(0000) knlGS:0000000000000000\n[   46.674331] CS:  0010 DS: 0000 ES: 0000 CR0: 0000000080050033\n[   46.680170] CR2: 00007f7dfe984460 CR3: 000000010e894003 CR4: 00000000000606f0\n[   46.687422] Call Trace:\n[   46.689906]  \u003cTASK\u003e\n[   46.691950]  iwl_mvm_mac_wake_tx_queue+0xec/0x15c [iwlmvm]\n[   46.697601]  ieee80211_queue_skb+0x4b3/0x720 [mac80211]\n[   46.702973]  ? sta_info_get+0x46/0x60 [mac80211]\n[   46.707703]  ieee80211_tx+0xad/0x110 [mac80211]\n[   46.712355]  __ieee80211_tx_skb_tid_band+0x71/0x90 [mac80211]\n...\n\nIn order to avoid this problem, we must also remove the related lists when\nstation queues are disabled.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "SUSE Linux Enterprise Micro 5.3:kernel-rt-5.14.21-150400.15.124.1.x86_64",
          "SUSE Linux Enterprise Micro 5.3:kernel-source-rt-5.14.21-150400.15.124.1.noarch",
          "SUSE Linux Enterprise Micro 5.4:kernel-rt-5.14.21-150400.15.124.1.x86_64",
          "SUSE Linux Enterprise Micro 5.4:kernel-source-rt-5.14.21-150400.15.124.1.noarch"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2022-50164",
          "url": "https://www.suse.com/security/cve/CVE-2022-50164"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1244770 for CVE-2022-50164",
          "url": "https://bugzilla.suse.com/1244770"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "SUSE Linux Enterprise Micro 5.3:kernel-rt-5.14.21-150400.15.124.1.x86_64",
            "SUSE Linux Enterprise Micro 5.3:kernel-source-rt-5.14.21-150400.15.124.1.noarch",
            "SUSE Linux Enterprise Micro 5.4:kernel-rt-5.14.21-150400.15.124.1.x86_64",
            "SUSE Linux Enterprise Micro 5.4:kernel-source-rt-5.14.21-150400.15.124.1.noarch"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 5.5,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
            "version": "3.1"
          },
          "products": [
            "SUSE Linux Enterprise Micro 5.3:kernel-rt-5.14.21-150400.15.124.1.x86_64",
            "SUSE Linux Enterprise Micro 5.3:kernel-source-rt-5.14.21-150400.15.124.1.noarch",
            "SUSE Linux Enterprise Micro 5.4:kernel-rt-5.14.21-150400.15.124.1.x86_64",
            "SUSE Linux Enterprise Micro 5.4:kernel-source-rt-5.14.21-150400.15.124.1.noarch"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2025-07-15T14:31:46Z",
          "details": "moderate"
        }
      ],
      "title": "CVE-2022-50164"
    },
    {
      "cve": "CVE-2022-50165",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2022-50165"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "In the Linux kernel, the following vulnerability has been resolved:\n\nwifi: wil6210: debugfs: fix uninitialized variable use in `wil_write_file_wmi()`\n\nCommit 7a4836560a61 changes simple_write_to_buffer() with memdup_user()\nbut it forgets to change the value to be returned that came from\nsimple_write_to_buffer() call. It results in the following warning:\n\n  warning: variable \u0027rc\u0027 is uninitialized when used here [-Wuninitialized]\n           return rc;\n                  ^~\n\nRemove rc variable and just return the passed in length if the\nmemdup_user() succeeds.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "SUSE Linux Enterprise Micro 5.3:kernel-rt-5.14.21-150400.15.124.1.x86_64",
          "SUSE Linux Enterprise Micro 5.3:kernel-source-rt-5.14.21-150400.15.124.1.noarch",
          "SUSE Linux Enterprise Micro 5.4:kernel-rt-5.14.21-150400.15.124.1.x86_64",
          "SUSE Linux Enterprise Micro 5.4:kernel-source-rt-5.14.21-150400.15.124.1.noarch"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2022-50165",
          "url": "https://www.suse.com/security/cve/CVE-2022-50165"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1244771 for CVE-2022-50165",
          "url": "https://bugzilla.suse.com/1244771"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "SUSE Linux Enterprise Micro 5.3:kernel-rt-5.14.21-150400.15.124.1.x86_64",
            "SUSE Linux Enterprise Micro 5.3:kernel-source-rt-5.14.21-150400.15.124.1.noarch",
            "SUSE Linux Enterprise Micro 5.4:kernel-rt-5.14.21-150400.15.124.1.x86_64",
            "SUSE Linux Enterprise Micro 5.4:kernel-source-rt-5.14.21-150400.15.124.1.noarch"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 4.4,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H",
            "version": "3.1"
          },
          "products": [
            "SUSE Linux Enterprise Micro 5.3:kernel-rt-5.14.21-150400.15.124.1.x86_64",
            "SUSE Linux Enterprise Micro 5.3:kernel-source-rt-5.14.21-150400.15.124.1.noarch",
            "SUSE Linux Enterprise Micro 5.4:kernel-rt-5.14.21-150400.15.124.1.x86_64",
            "SUSE Linux Enterprise Micro 5.4:kernel-source-rt-5.14.21-150400.15.124.1.noarch"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2025-07-15T14:31:46Z",
          "details": "moderate"
        }
      ],
      "title": "CVE-2022-50165"
    },
    {
      "cve": "CVE-2022-50169",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2022-50169"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "In the Linux kernel, the following vulnerability has been resolved:\n\nwifi: wil6210: debugfs: fix info leak in wil_write_file_wmi()\n\nThe simple_write_to_buffer() function will succeed if even a single\nbyte is initialized.  However, we need to initialize the whole buffer\nto prevent information leaks.  Just use memdup_user().",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "SUSE Linux Enterprise Micro 5.3:kernel-rt-5.14.21-150400.15.124.1.x86_64",
          "SUSE Linux Enterprise Micro 5.3:kernel-source-rt-5.14.21-150400.15.124.1.noarch",
          "SUSE Linux Enterprise Micro 5.4:kernel-rt-5.14.21-150400.15.124.1.x86_64",
          "SUSE Linux Enterprise Micro 5.4:kernel-source-rt-5.14.21-150400.15.124.1.noarch"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2022-50169",
          "url": "https://www.suse.com/security/cve/CVE-2022-50169"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1244767 for CVE-2022-50169",
          "url": "https://bugzilla.suse.com/1244767"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "SUSE Linux Enterprise Micro 5.3:kernel-rt-5.14.21-150400.15.124.1.x86_64",
            "SUSE Linux Enterprise Micro 5.3:kernel-source-rt-5.14.21-150400.15.124.1.noarch",
            "SUSE Linux Enterprise Micro 5.4:kernel-rt-5.14.21-150400.15.124.1.x86_64",
            "SUSE Linux Enterprise Micro 5.4:kernel-source-rt-5.14.21-150400.15.124.1.noarch"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 5.5,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
            "version": "3.1"
          },
          "products": [
            "SUSE Linux Enterprise Micro 5.3:kernel-rt-5.14.21-150400.15.124.1.x86_64",
            "SUSE Linux Enterprise Micro 5.3:kernel-source-rt-5.14.21-150400.15.124.1.noarch",
            "SUSE Linux Enterprise Micro 5.4:kernel-rt-5.14.21-150400.15.124.1.x86_64",
            "SUSE Linux Enterprise Micro 5.4:kernel-source-rt-5.14.21-150400.15.124.1.noarch"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2025-07-15T14:31:46Z",
          "details": "moderate"
        }
      ],
      "title": "CVE-2022-50169"
    },
    {
      "cve": "CVE-2022-50171",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2022-50171"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "In the Linux kernel, the following vulnerability has been resolved:\n\ncrypto: hisilicon/sec - don\u0027t sleep when in softirq\n\nWhen kunpeng920 encryption driver is used to deencrypt and decrypt\npackets during the softirq, it is not allowed to use mutex lock. The\nkernel will report the following error:\n\nBUG: scheduling while atomic: swapper/57/0/0x00000300\nCall trace:\ndump_backtrace+0x0/0x1e4\nshow_stack+0x20/0x2c\ndump_stack+0xd8/0x140\n__schedule_bug+0x68/0x80\n__schedule+0x728/0x840\nschedule+0x50/0xe0\nschedule_preempt_disabled+0x18/0x24\n__mutex_lock.constprop.0+0x594/0x5dc\n__mutex_lock_slowpath+0x1c/0x30\nmutex_lock+0x50/0x60\nsec_request_init+0x8c/0x1a0 [hisi_sec2]\nsec_process+0x28/0x1ac [hisi_sec2]\nsec_skcipher_crypto+0xf4/0x1d4 [hisi_sec2]\nsec_skcipher_encrypt+0x1c/0x30 [hisi_sec2]\ncrypto_skcipher_encrypt+0x2c/0x40\ncrypto_authenc_encrypt+0xc8/0xfc [authenc]\ncrypto_aead_encrypt+0x2c/0x40\nechainiv_encrypt+0x144/0x1a0 [echainiv]\ncrypto_aead_encrypt+0x2c/0x40\nesp_output_tail+0x348/0x5c0 [esp4]\nesp_output+0x120/0x19c [esp4]\nxfrm_output_one+0x25c/0x4d4\nxfrm_output_resume+0x6c/0x1fc\nxfrm_output+0xac/0x3c0\nxfrm4_output+0x64/0x130\nip_build_and_send_pkt+0x158/0x20c\ntcp_v4_send_synack+0xdc/0x1f0\ntcp_conn_request+0x7d0/0x994\ntcp_v4_conn_request+0x58/0x6c\ntcp_v6_conn_request+0xf0/0x100\ntcp_rcv_state_process+0x1cc/0xd60\ntcp_v4_do_rcv+0x10c/0x250\ntcp_v4_rcv+0xfc4/0x10a4\nip_protocol_deliver_rcu+0xf4/0x200\nip_local_deliver_finish+0x58/0x70\nip_local_deliver+0x68/0x120\nip_sublist_rcv_finish+0x70/0x94\nip_list_rcv_finish.constprop.0+0x17c/0x1d0\nip_sublist_rcv+0x40/0xb0\nip_list_rcv+0x140/0x1dc\n__netif_receive_skb_list_core+0x154/0x28c\n__netif_receive_skb_list+0x120/0x1a0\nnetif_receive_skb_list_internal+0xe4/0x1f0\nnapi_complete_done+0x70/0x1f0\ngro_cell_poll+0x9c/0xb0\nnapi_poll+0xcc/0x264\nnet_rx_action+0xd4/0x21c\n__do_softirq+0x130/0x358\nirq_exit+0x11c/0x13c\n__handle_domain_irq+0x88/0xf0\ngic_handle_irq+0x78/0x2c0\nel1_irq+0xb8/0x140\narch_cpu_idle+0x18/0x40\ndefault_idle_call+0x5c/0x1c0\ncpuidle_idle_call+0x174/0x1b0\ndo_idle+0xc8/0x160\ncpu_startup_entry+0x30/0x11c\nsecondary_start_kernel+0x158/0x1e4\nsoftirq: huh, entered softirq 3 NET_RX 0000000093774ee4 with\npreempt_count 00000100, exited with fffffe00?",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "SUSE Linux Enterprise Micro 5.3:kernel-rt-5.14.21-150400.15.124.1.x86_64",
          "SUSE Linux Enterprise Micro 5.3:kernel-source-rt-5.14.21-150400.15.124.1.noarch",
          "SUSE Linux Enterprise Micro 5.4:kernel-rt-5.14.21-150400.15.124.1.x86_64",
          "SUSE Linux Enterprise Micro 5.4:kernel-source-rt-5.14.21-150400.15.124.1.noarch"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2022-50171",
          "url": "https://www.suse.com/security/cve/CVE-2022-50171"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1244765 for CVE-2022-50171",
          "url": "https://bugzilla.suse.com/1244765"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "SUSE Linux Enterprise Micro 5.3:kernel-rt-5.14.21-150400.15.124.1.x86_64",
            "SUSE Linux Enterprise Micro 5.3:kernel-source-rt-5.14.21-150400.15.124.1.noarch",
            "SUSE Linux Enterprise Micro 5.4:kernel-rt-5.14.21-150400.15.124.1.x86_64",
            "SUSE Linux Enterprise Micro 5.4:kernel-source-rt-5.14.21-150400.15.124.1.noarch"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 5.5,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
            "version": "3.1"
          },
          "products": [
            "SUSE Linux Enterprise Micro 5.3:kernel-rt-5.14.21-150400.15.124.1.x86_64",
            "SUSE Linux Enterprise Micro 5.3:kernel-source-rt-5.14.21-150400.15.124.1.noarch",
            "SUSE Linux Enterprise Micro 5.4:kernel-rt-5.14.21-150400.15.124.1.x86_64",
            "SUSE Linux Enterprise Micro 5.4:kernel-source-rt-5.14.21-150400.15.124.1.noarch"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2025-07-15T14:31:46Z",
          "details": "moderate"
        }
      ],
      "title": "CVE-2022-50171"
    },
    {
      "cve": "CVE-2022-50172",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2022-50172"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "In the Linux kernel, the following vulnerability has been resolved:\n\nmt76: mt76x02u: fix possible memory leak in __mt76x02u_mcu_send_msg\n\nFree the skb if mt76u_bulk_msg fails in __mt76x02u_mcu_send_msg routine.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "SUSE Linux Enterprise Micro 5.3:kernel-rt-5.14.21-150400.15.124.1.x86_64",
          "SUSE Linux Enterprise Micro 5.3:kernel-source-rt-5.14.21-150400.15.124.1.noarch",
          "SUSE Linux Enterprise Micro 5.4:kernel-rt-5.14.21-150400.15.124.1.x86_64",
          "SUSE Linux Enterprise Micro 5.4:kernel-source-rt-5.14.21-150400.15.124.1.noarch"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2022-50172",
          "url": "https://www.suse.com/security/cve/CVE-2022-50172"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1244764 for CVE-2022-50172",
          "url": "https://bugzilla.suse.com/1244764"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "SUSE Linux Enterprise Micro 5.3:kernel-rt-5.14.21-150400.15.124.1.x86_64",
            "SUSE Linux Enterprise Micro 5.3:kernel-source-rt-5.14.21-150400.15.124.1.noarch",
            "SUSE Linux Enterprise Micro 5.4:kernel-rt-5.14.21-150400.15.124.1.x86_64",
            "SUSE Linux Enterprise Micro 5.4:kernel-source-rt-5.14.21-150400.15.124.1.noarch"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 5.5,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
            "version": "3.1"
          },
          "products": [
            "SUSE Linux Enterprise Micro 5.3:kernel-rt-5.14.21-150400.15.124.1.x86_64",
            "SUSE Linux Enterprise Micro 5.3:kernel-source-rt-5.14.21-150400.15.124.1.noarch",
            "SUSE Linux Enterprise Micro 5.4:kernel-rt-5.14.21-150400.15.124.1.x86_64",
            "SUSE Linux Enterprise Micro 5.4:kernel-source-rt-5.14.21-150400.15.124.1.noarch"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2025-07-15T14:31:46Z",
          "details": "moderate"
        }
      ],
      "title": "CVE-2022-50172"
    },
    {
      "cve": "CVE-2022-50173",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2022-50173"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "In the Linux kernel, the following vulnerability has been resolved:\n\ndrm/msm/mdp5: Fix global state lock backoff\n\nWe need to grab the lock after the early return for !hwpipe case.\nOtherwise, we could have hit contention yet still returned 0.\n\nFixes an issue that the new CONFIG_DRM_DEBUG_MODESET_LOCK stuff flagged\nin CI:\n\n   WARNING: CPU: 0 PID: 282 at drivers/gpu/drm/drm_modeset_lock.c:296 drm_modeset_lock+0xf8/0x154\n   Modules linked in:\n   CPU: 0 PID: 282 Comm: kms_cursor_lega Tainted: G        W         5.19.0-rc2-15930-g875cc8bc536a #1\n   Hardware name: Qualcomm Technologies, Inc. DB820c (DT)\n   pstate: 60000005 (nZCv daif -PAN -UAO -TCO -DIT -SSBS BTYPE=--)\n   pc : drm_modeset_lock+0xf8/0x154\n   lr : drm_atomic_get_private_obj_state+0x84/0x170\n   sp : ffff80000cfab6a0\n   x29: ffff80000cfab6a0 x28: 0000000000000000 x27: ffff000083bc4d00\n   x26: 0000000000000038 x25: 0000000000000000 x24: ffff80000957ca58\n   x23: 0000000000000000 x22: ffff000081ace080 x21: 0000000000000001\n   x20: ffff000081acec18 x19: ffff80000cfabb80 x18: 0000000000000038\n   x17: 0000000000000000 x16: 0000000000000000 x15: fffffffffffea0d0\n   x14: 0000000000000000 x13: 284e4f5f4e524157 x12: 5f534b434f4c5f47\n   x11: ffff80000a386aa8 x10: 0000000000000029 x9 : ffff80000cfab610\n   x8 : 0000000000000029 x7 : 0000000000000014 x6 : 0000000000000000\n   x5 : 0000000000000001 x4 : ffff8000081ad904 x3 : 0000000000000029\n   x2 : ffff0000801db4c0 x1 : ffff80000cfabb80 x0 : ffff000081aceb58\n   Call trace:\n    drm_modeset_lock+0xf8/0x154\n    drm_atomic_get_private_obj_state+0x84/0x170\n    mdp5_get_global_state+0x54/0x6c\n    mdp5_pipe_release+0x2c/0xd4\n    mdp5_plane_atomic_check+0x2ec/0x414\n    drm_atomic_helper_check_planes+0xd8/0x210\n    drm_atomic_helper_check+0x54/0xb0\n    ...\n   ---[ end trace 0000000000000000 ]---\n   drm_modeset_lock attempting to lock a contended lock without backoff:\n      drm_modeset_lock+0x148/0x154\n      mdp5_get_global_state+0x30/0x6c\n      mdp5_pipe_release+0x2c/0xd4\n      mdp5_plane_atomic_check+0x290/0x414\n      drm_atomic_helper_check_planes+0xd8/0x210\n      drm_atomic_helper_check+0x54/0xb0\n      drm_atomic_check_only+0x4b0/0x8f4\n      drm_atomic_commit+0x68/0xe0\n\nPatchwork: https://patchwork.freedesktop.org/patch/492701/",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "SUSE Linux Enterprise Micro 5.3:kernel-rt-5.14.21-150400.15.124.1.x86_64",
          "SUSE Linux Enterprise Micro 5.3:kernel-source-rt-5.14.21-150400.15.124.1.noarch",
          "SUSE Linux Enterprise Micro 5.4:kernel-rt-5.14.21-150400.15.124.1.x86_64",
          "SUSE Linux Enterprise Micro 5.4:kernel-source-rt-5.14.21-150400.15.124.1.noarch"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2022-50173",
          "url": "https://www.suse.com/security/cve/CVE-2022-50173"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1244992 for CVE-2022-50173",
          "url": "https://bugzilla.suse.com/1244992"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "SUSE Linux Enterprise Micro 5.3:kernel-rt-5.14.21-150400.15.124.1.x86_64",
            "SUSE Linux Enterprise Micro 5.3:kernel-source-rt-5.14.21-150400.15.124.1.noarch",
            "SUSE Linux Enterprise Micro 5.4:kernel-rt-5.14.21-150400.15.124.1.x86_64",
            "SUSE Linux Enterprise Micro 5.4:kernel-source-rt-5.14.21-150400.15.124.1.noarch"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 5.5,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
            "version": "3.1"
          },
          "products": [
            "SUSE Linux Enterprise Micro 5.3:kernel-rt-5.14.21-150400.15.124.1.x86_64",
            "SUSE Linux Enterprise Micro 5.3:kernel-source-rt-5.14.21-150400.15.124.1.noarch",
            "SUSE Linux Enterprise Micro 5.4:kernel-rt-5.14.21-150400.15.124.1.x86_64",
            "SUSE Linux Enterprise Micro 5.4:kernel-source-rt-5.14.21-150400.15.124.1.noarch"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2025-07-15T14:31:46Z",
          "details": "moderate"
        }
      ],
      "title": "CVE-2022-50173"
    },
    {
      "cve": "CVE-2022-50175",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2022-50175"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "In the Linux kernel, the following vulnerability has been resolved:\n\nmedia: tw686x: Fix memory leak in tw686x_video_init\n\nvideo_device_alloc() allocates memory for vdev,\nwhen video_register_device() fails, it doesn\u0027t release the memory and\nleads to memory leak, call video_device_release() to fix this.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "SUSE Linux Enterprise Micro 5.3:kernel-rt-5.14.21-150400.15.124.1.x86_64",
          "SUSE Linux Enterprise Micro 5.3:kernel-source-rt-5.14.21-150400.15.124.1.noarch",
          "SUSE Linux Enterprise Micro 5.4:kernel-rt-5.14.21-150400.15.124.1.x86_64",
          "SUSE Linux Enterprise Micro 5.4:kernel-source-rt-5.14.21-150400.15.124.1.noarch"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2022-50175",
          "url": "https://www.suse.com/security/cve/CVE-2022-50175"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1244903 for CVE-2022-50175",
          "url": "https://bugzilla.suse.com/1244903"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "SUSE Linux Enterprise Micro 5.3:kernel-rt-5.14.21-150400.15.124.1.x86_64",
            "SUSE Linux Enterprise Micro 5.3:kernel-source-rt-5.14.21-150400.15.124.1.noarch",
            "SUSE Linux Enterprise Micro 5.4:kernel-rt-5.14.21-150400.15.124.1.x86_64",
            "SUSE Linux Enterprise Micro 5.4:kernel-source-rt-5.14.21-150400.15.124.1.noarch"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 5.5,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
            "version": "3.1"
          },
          "products": [
            "SUSE Linux Enterprise Micro 5.3:kernel-rt-5.14.21-150400.15.124.1.x86_64",
            "SUSE Linux Enterprise Micro 5.3:kernel-source-rt-5.14.21-150400.15.124.1.noarch",
            "SUSE Linux Enterprise Micro 5.4:kernel-rt-5.14.21-150400.15.124.1.x86_64",
            "SUSE Linux Enterprise Micro 5.4:kernel-source-rt-5.14.21-150400.15.124.1.noarch"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2025-07-15T14:31:46Z",
          "details": "moderate"
        }
      ],
      "title": "CVE-2022-50175"
    },
    {
      "cve": "CVE-2022-50176",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2022-50176"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "In the Linux kernel, the following vulnerability has been resolved:\n\ndrm/mcde: Fix refcount leak in mcde_dsi_bind\n\nEvery iteration of for_each_available_child_of_node() decrements\nthe reference counter of the previous node. There is no decrement\nwhen break out from the loop and results in refcount leak.\nAdd missing of_node_put() to fix this.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "SUSE Linux Enterprise Micro 5.3:kernel-rt-5.14.21-150400.15.124.1.x86_64",
          "SUSE Linux Enterprise Micro 5.3:kernel-source-rt-5.14.21-150400.15.124.1.noarch",
          "SUSE Linux Enterprise Micro 5.4:kernel-rt-5.14.21-150400.15.124.1.x86_64",
          "SUSE Linux Enterprise Micro 5.4:kernel-source-rt-5.14.21-150400.15.124.1.noarch"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2022-50176",
          "url": "https://www.suse.com/security/cve/CVE-2022-50176"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1244902 for CVE-2022-50176",
          "url": "https://bugzilla.suse.com/1244902"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "SUSE Linux Enterprise Micro 5.3:kernel-rt-5.14.21-150400.15.124.1.x86_64",
            "SUSE Linux Enterprise Micro 5.3:kernel-source-rt-5.14.21-150400.15.124.1.noarch",
            "SUSE Linux Enterprise Micro 5.4:kernel-rt-5.14.21-150400.15.124.1.x86_64",
            "SUSE Linux Enterprise Micro 5.4:kernel-source-rt-5.14.21-150400.15.124.1.noarch"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 5.5,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
            "version": "3.1"
          },
          "products": [
            "SUSE Linux Enterprise Micro 5.3:kernel-rt-5.14.21-150400.15.124.1.x86_64",
            "SUSE Linux Enterprise Micro 5.3:kernel-source-rt-5.14.21-150400.15.124.1.noarch",
            "SUSE Linux Enterprise Micro 5.4:kernel-rt-5.14.21-150400.15.124.1.x86_64",
            "SUSE Linux Enterprise Micro 5.4:kernel-source-rt-5.14.21-150400.15.124.1.noarch"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2025-07-15T14:31:46Z",
          "details": "moderate"
        }
      ],
      "title": "CVE-2022-50176"
    },
    {
      "cve": "CVE-2022-50178",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2022-50178"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "In the Linux kernel, the following vulnerability has been resolved:\n\nwifi: rtw89: 8852a: rfk: fix div 0 exception\n\nThe DPK is a kind of RF calibration whose algorithm is to fine tune\nparameters and calibrate, and check the result. If the result isn\u0027t good\nenough, it could adjust parameters and try again.\n\nThis issue is to read and show the result, but it could be a negative\ncalibration result that causes divisor 0 and core dump. So, fix it by\nphy_div() that does division only if divisor isn\u0027t zero; otherwise,\nzero is adopted.\n\n  divide error: 0000 [#1] PREEMPT SMP NOPTI\n  CPU: 1 PID: 728 Comm: wpa_supplicant Not tainted 5.10.114-16019-g462a1661811a #1 \u003cHASH:d024 28\u003e\n  RIP: 0010:rtw8852a_dpk+0x14ae/0x288f [rtw89_core]\n  RSP: 0018:ffffa9bb412a7520 EFLAGS: 00010246\n  RAX: 0000000000000000 RBX: 0000000000000000 RCX: 0000000000000000\n  RDX: 0000000000000000 RSI: 00000000000180fc RDI: ffffa141d01023c0\n  RBP: ffffa9bb412a76a0 R08: 0000000000001319 R09: 00000000ffffff92\n  R10: ffffffffc0292de3 R11: ffffffffc00d2f51 R12: 0000000000000000\n  R13: ffffa141d01023c0 R14: ffffffffc0290250 R15: ffffa141d0102638\n  FS:  00007fa99f5c2740(0000) GS:ffffa142e5e80000(0000) knlGS:0000000000000000\n  CS:  0010 DS: 0000 ES: 0000 CR0: 0000000080050033\n  CR2: 0000000013e8e010 CR3: 0000000110d2c000 CR4: 0000000000750ee0\n  PKRU: 55555554\n  Call Trace:\n   rtw89_core_sta_add+0x95/0x9c [rtw89_core \u003cHASH:d239 29\u003e]\n   rtw89_ops_sta_state+0x5d/0x108 [rtw89_core \u003cHASH:d239 29\u003e]\n   drv_sta_state+0x115/0x66f [mac80211 \u003cHASH:81fe 30\u003e]\n   sta_info_insert_rcu+0x45c/0x713 [mac80211 \u003cHASH:81fe 30\u003e]\n   sta_info_insert+0xf/0x1b [mac80211 \u003cHASH:81fe 30\u003e]\n   ieee80211_prep_connection+0x9d6/0xb0c [mac80211 \u003cHASH:81fe 30\u003e]\n   ieee80211_mgd_auth+0x2aa/0x352 [mac80211 \u003cHASH:81fe 30\u003e]\n   cfg80211_mlme_auth+0x160/0x1f6 [cfg80211 \u003cHASH:00cd 31\u003e]\n   nl80211_authenticate+0x2e5/0x306 [cfg80211 \u003cHASH:00cd 31\u003e]\n   genl_rcv_msg+0x371/0x3a1\n   ? nl80211_stop_sched_scan+0xe5/0xe5 [cfg80211 \u003cHASH:00cd 31\u003e]\n   ? genl_rcv+0x36/0x36\n   netlink_rcv_skb+0x8a/0xf9\n   genl_rcv+0x28/0x36\n   netlink_unicast+0x27b/0x3a0\n   netlink_sendmsg+0x2aa/0x469\n   sock_sendmsg_nosec+0x49/0x4d\n   ____sys_sendmsg+0xe5/0x213\n   __sys_sendmsg+0xec/0x157\n   ? syscall_enter_from_user_mode+0xd7/0x116\n   do_syscall_64+0x43/0x55\n   entry_SYSCALL_64_after_hwframe+0x44/0xa9\n  RIP: 0033:0x7fa99f6e689b",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "SUSE Linux Enterprise Micro 5.3:kernel-rt-5.14.21-150400.15.124.1.x86_64",
          "SUSE Linux Enterprise Micro 5.3:kernel-source-rt-5.14.21-150400.15.124.1.noarch",
          "SUSE Linux Enterprise Micro 5.4:kernel-rt-5.14.21-150400.15.124.1.x86_64",
          "SUSE Linux Enterprise Micro 5.4:kernel-source-rt-5.14.21-150400.15.124.1.noarch"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2022-50178",
          "url": "https://www.suse.com/security/cve/CVE-2022-50178"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1244900 for CVE-2022-50178",
          "url": "https://bugzilla.suse.com/1244900"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "SUSE Linux Enterprise Micro 5.3:kernel-rt-5.14.21-150400.15.124.1.x86_64",
            "SUSE Linux Enterprise Micro 5.3:kernel-source-rt-5.14.21-150400.15.124.1.noarch",
            "SUSE Linux Enterprise Micro 5.4:kernel-rt-5.14.21-150400.15.124.1.x86_64",
            "SUSE Linux Enterprise Micro 5.4:kernel-source-rt-5.14.21-150400.15.124.1.noarch"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 5.5,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
            "version": "3.1"
          },
          "products": [
            "SUSE Linux Enterprise Micro 5.3:kernel-rt-5.14.21-150400.15.124.1.x86_64",
            "SUSE Linux Enterprise Micro 5.3:kernel-source-rt-5.14.21-150400.15.124.1.noarch",
            "SUSE Linux Enterprise Micro 5.4:kernel-rt-5.14.21-150400.15.124.1.x86_64",
            "SUSE Linux Enterprise Micro 5.4:kernel-source-rt-5.14.21-150400.15.124.1.noarch"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2025-07-15T14:31:46Z",
          "details": "moderate"
        }
      ],
      "title": "CVE-2022-50178"
    },
    {
      "cve": "CVE-2022-50179",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2022-50179"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "In the Linux kernel, the following vulnerability has been resolved:\n\nath9k: fix use-after-free in ath9k_hif_usb_rx_cb\n\nSyzbot reported use-after-free Read in ath9k_hif_usb_rx_cb() [0]. The\nproblem was in incorrect htc_handle-\u003edrv_priv initialization.\n\nProbable call trace which can trigger use-after-free:\n\nath9k_htc_probe_device()\n  /* htc_handle-\u003edrv_priv = priv; */\n  ath9k_htc_wait_for_target()      \u003c--- Failed\n  ieee80211_free_hw()\t\t   \u003c--- priv pointer is freed\n\n\u003cIRQ\u003e\n...\nath9k_hif_usb_rx_cb()\n  ath9k_hif_usb_rx_stream()\n   RX_STAT_INC()\t\t\u003c--- htc_handle-\u003edrv_priv access\n\nIn order to not add fancy protection for drv_priv we can move\nhtc_handle-\u003edrv_priv initialization at the end of the\nath9k_htc_probe_device() and add helper macro to make\nall *_STAT_* macros NULL safe, since syzbot has reported related NULL\nderef in that macros [1]",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "SUSE Linux Enterprise Micro 5.3:kernel-rt-5.14.21-150400.15.124.1.x86_64",
          "SUSE Linux Enterprise Micro 5.3:kernel-source-rt-5.14.21-150400.15.124.1.noarch",
          "SUSE Linux Enterprise Micro 5.4:kernel-rt-5.14.21-150400.15.124.1.x86_64",
          "SUSE Linux Enterprise Micro 5.4:kernel-source-rt-5.14.21-150400.15.124.1.noarch"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2022-50179",
          "url": "https://www.suse.com/security/cve/CVE-2022-50179"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1244886 for CVE-2022-50179",
          "url": "https://bugzilla.suse.com/1244886"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "SUSE Linux Enterprise Micro 5.3:kernel-rt-5.14.21-150400.15.124.1.x86_64",
            "SUSE Linux Enterprise Micro 5.3:kernel-source-rt-5.14.21-150400.15.124.1.noarch",
            "SUSE Linux Enterprise Micro 5.4:kernel-rt-5.14.21-150400.15.124.1.x86_64",
            "SUSE Linux Enterprise Micro 5.4:kernel-source-rt-5.14.21-150400.15.124.1.noarch"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 5.5,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
            "version": "3.1"
          },
          "products": [
            "SUSE Linux Enterprise Micro 5.3:kernel-rt-5.14.21-150400.15.124.1.x86_64",
            "SUSE Linux Enterprise Micro 5.3:kernel-source-rt-5.14.21-150400.15.124.1.noarch",
            "SUSE Linux Enterprise Micro 5.4:kernel-rt-5.14.21-150400.15.124.1.x86_64",
            "SUSE Linux Enterprise Micro 5.4:kernel-source-rt-5.14.21-150400.15.124.1.noarch"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2025-07-15T14:31:46Z",
          "details": "moderate"
        }
      ],
      "title": "CVE-2022-50179"
    },
    {
      "cve": "CVE-2022-50181",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2022-50181"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "In the Linux kernel, the following vulnerability has been resolved:\n\nvirtio-gpu: fix a missing check to avoid NULL dereference\n\n\u0027cache_ent\u0027 could be set NULL inside virtio_gpu_cmd_get_capset()\nand it will lead to a NULL dereference by a lately use of it\n(i.e., ptr = cache_ent-\u003ecaps_cache). Fix it with a NULL check.\n\n\n[ kraxel: minor codestyle fixup ]",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "SUSE Linux Enterprise Micro 5.3:kernel-rt-5.14.21-150400.15.124.1.x86_64",
          "SUSE Linux Enterprise Micro 5.3:kernel-source-rt-5.14.21-150400.15.124.1.noarch",
          "SUSE Linux Enterprise Micro 5.4:kernel-rt-5.14.21-150400.15.124.1.x86_64",
          "SUSE Linux Enterprise Micro 5.4:kernel-source-rt-5.14.21-150400.15.124.1.noarch"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2022-50181",
          "url": "https://www.suse.com/security/cve/CVE-2022-50181"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1244901 for CVE-2022-50181",
          "url": "https://bugzilla.suse.com/1244901"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "SUSE Linux Enterprise Micro 5.3:kernel-rt-5.14.21-150400.15.124.1.x86_64",
            "SUSE Linux Enterprise Micro 5.3:kernel-source-rt-5.14.21-150400.15.124.1.noarch",
            "SUSE Linux Enterprise Micro 5.4:kernel-rt-5.14.21-150400.15.124.1.x86_64",
            "SUSE Linux Enterprise Micro 5.4:kernel-source-rt-5.14.21-150400.15.124.1.noarch"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 5.5,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
            "version": "3.1"
          },
          "products": [
            "SUSE Linux Enterprise Micro 5.3:kernel-rt-5.14.21-150400.15.124.1.x86_64",
            "SUSE Linux Enterprise Micro 5.3:kernel-source-rt-5.14.21-150400.15.124.1.noarch",
            "SUSE Linux Enterprise Micro 5.4:kernel-rt-5.14.21-150400.15.124.1.x86_64",
            "SUSE Linux Enterprise Micro 5.4:kernel-source-rt-5.14.21-150400.15.124.1.noarch"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2025-07-15T14:31:46Z",
          "details": "moderate"
        }
      ],
      "title": "CVE-2022-50181"
    },
    {
      "cve": "CVE-2022-50185",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2022-50185"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "In the Linux kernel, the following vulnerability has been resolved:\n\ndrm/radeon: fix potential buffer overflow in ni_set_mc_special_registers()\n\nThe last case label can write two buffers \u0027mc_reg_address[j]\u0027 and\n\u0027mc_data[j]\u0027 with \u0027j\u0027 offset equal to SMC_NISLANDS_MC_REGISTER_ARRAY_SIZE\nsince there are no checks for this value in both case labels after the\nlast \u0027j++\u0027.\n\nInstead of changing \u0027\u003e\u0027 to \u0027\u003e=\u0027 there, add the bounds check at the start\nof the second \u0027case\u0027 (the first one already has it).\n\nAlso, remove redundant last checks for \u0027j\u0027 index bigger than array size.\nThe expression is always false. Moreover, before or after the patch\n\u0027table-\u003elast\u0027 can be equal to SMC_NISLANDS_MC_REGISTER_ARRAY_SIZE and it\nseems it can be a valid value.\n\nDetected using the static analysis tool - Svace.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "SUSE Linux Enterprise Micro 5.3:kernel-rt-5.14.21-150400.15.124.1.x86_64",
          "SUSE Linux Enterprise Micro 5.3:kernel-source-rt-5.14.21-150400.15.124.1.noarch",
          "SUSE Linux Enterprise Micro 5.4:kernel-rt-5.14.21-150400.15.124.1.x86_64",
          "SUSE Linux Enterprise Micro 5.4:kernel-source-rt-5.14.21-150400.15.124.1.noarch"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2022-50185",
          "url": "https://www.suse.com/security/cve/CVE-2022-50185"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1244887 for CVE-2022-50185",
          "url": "https://bugzilla.suse.com/1244887"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "SUSE Linux Enterprise Micro 5.3:kernel-rt-5.14.21-150400.15.124.1.x86_64",
            "SUSE Linux Enterprise Micro 5.3:kernel-source-rt-5.14.21-150400.15.124.1.noarch",
            "SUSE Linux Enterprise Micro 5.4:kernel-rt-5.14.21-150400.15.124.1.x86_64",
            "SUSE Linux Enterprise Micro 5.4:kernel-source-rt-5.14.21-150400.15.124.1.noarch"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 5.5,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
            "version": "3.1"
          },
          "products": [
            "SUSE Linux Enterprise Micro 5.3:kernel-rt-5.14.21-150400.15.124.1.x86_64",
            "SUSE Linux Enterprise Micro 5.3:kernel-source-rt-5.14.21-150400.15.124.1.noarch",
            "SUSE Linux Enterprise Micro 5.4:kernel-rt-5.14.21-150400.15.124.1.x86_64",
            "SUSE Linux Enterprise Micro 5.4:kernel-source-rt-5.14.21-150400.15.124.1.noarch"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2025-07-15T14:31:46Z",
          "details": "moderate"
        }
      ],
      "title": "CVE-2022-50185"
    },
    {
      "cve": "CVE-2022-50187",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2022-50187"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "In the Linux kernel, the following vulnerability has been resolved:\n\nath11k: fix netdev open race\n\nMake sure to allocate resources needed before registering the device.\n\nThis specifically avoids having a racing open() trigger a BUG_ON() in\nmod_timer() when ath11k_mac_op_start() is called before the\nmon_reap_timer as been set up.\n\nI did not see this issue with next-20220310, but I hit it on every probe\nwith next-20220511. Perhaps some timing changed in between.\n\nHere\u0027s the backtrace:\n\n[   51.346947] kernel BUG at kernel/time/timer.c:990!\n[   51.346958] Internal error: Oops - BUG: 0 [#1] PREEMPT SMP\n...\n[   51.578225] Call trace:\n[   51.583293]  __mod_timer+0x298/0x390\n[   51.589518]  mod_timer+0x14/0x20\n[   51.595368]  ath11k_mac_op_start+0x41c/0x4a0 [ath11k]\n[   51.603165]  drv_start+0x38/0x60 [mac80211]\n[   51.610110]  ieee80211_do_open+0x29c/0x7d0 [mac80211]\n[   51.617945]  ieee80211_open+0x60/0xb0 [mac80211]\n[   51.625311]  __dev_open+0x100/0x1c0\n[   51.631420]  __dev_change_flags+0x194/0x210\n[   51.638214]  dev_change_flags+0x24/0x70\n[   51.644646]  do_setlink+0x228/0xdb0\n[   51.650723]  __rtnl_newlink+0x460/0x830\n[   51.657162]  rtnl_newlink+0x4c/0x80\n[   51.663229]  rtnetlink_rcv_msg+0x124/0x390\n[   51.669917]  netlink_rcv_skb+0x58/0x130\n[   51.676314]  rtnetlink_rcv+0x18/0x30\n[   51.682460]  netlink_unicast+0x250/0x310\n[   51.688960]  netlink_sendmsg+0x19c/0x3e0\n[   51.695458]  ____sys_sendmsg+0x220/0x290\n[   51.701938]  ___sys_sendmsg+0x7c/0xc0\n[   51.708148]  __sys_sendmsg+0x68/0xd0\n[   51.714254]  __arm64_sys_sendmsg+0x28/0x40\n[   51.720900]  invoke_syscall+0x48/0x120\n\nTested-on: WCN6855 hw2.0 PCI WLAN.HSP.1.1-03125-QCAHSPSWPL_V1_V2_SILICONZ_LITE-3",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "SUSE Linux Enterprise Micro 5.3:kernel-rt-5.14.21-150400.15.124.1.x86_64",
          "SUSE Linux Enterprise Micro 5.3:kernel-source-rt-5.14.21-150400.15.124.1.noarch",
          "SUSE Linux Enterprise Micro 5.4:kernel-rt-5.14.21-150400.15.124.1.x86_64",
          "SUSE Linux Enterprise Micro 5.4:kernel-source-rt-5.14.21-150400.15.124.1.noarch"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2022-50187",
          "url": "https://www.suse.com/security/cve/CVE-2022-50187"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1244890 for CVE-2022-50187",
          "url": "https://bugzilla.suse.com/1244890"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "SUSE Linux Enterprise Micro 5.3:kernel-rt-5.14.21-150400.15.124.1.x86_64",
            "SUSE Linux Enterprise Micro 5.3:kernel-source-rt-5.14.21-150400.15.124.1.noarch",
            "SUSE Linux Enterprise Micro 5.4:kernel-rt-5.14.21-150400.15.124.1.x86_64",
            "SUSE Linux Enterprise Micro 5.4:kernel-source-rt-5.14.21-150400.15.124.1.noarch"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 5.5,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
            "version": "3.1"
          },
          "products": [
            "SUSE Linux Enterprise Micro 5.3:kernel-rt-5.14.21-150400.15.124.1.x86_64",
            "SUSE Linux Enterprise Micro 5.3:kernel-source-rt-5.14.21-150400.15.124.1.noarch",
            "SUSE Linux Enterprise Micro 5.4:kernel-rt-5.14.21-150400.15.124.1.x86_64",
            "SUSE Linux Enterprise Micro 5.4:kernel-source-rt-5.14.21-150400.15.124.1.noarch"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2025-07-15T14:31:46Z",
          "details": "moderate"
        }
      ],
      "title": "CVE-2022-50187"
    },
    {
      "cve": "CVE-2022-50190",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2022-50190"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "In the Linux kernel, the following vulnerability has been resolved:\n\nspi: Fix simplification of devm_spi_register_controller\n\nThis reverts commit 59ebbe40fb51 (\"spi: simplify\ndevm_spi_register_controller\").\n\nIf devm_add_action() fails in devm_add_action_or_reset(),\ndevm_spi_unregister() will be called, it decreases the\nrefcount of \u0027ctlr-\u003edev\u0027 to 0, then it will cause uaf in\nthe drivers that calling spi_put_controller() in error path.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "SUSE Linux Enterprise Micro 5.3:kernel-rt-5.14.21-150400.15.124.1.x86_64",
          "SUSE Linux Enterprise Micro 5.3:kernel-source-rt-5.14.21-150400.15.124.1.noarch",
          "SUSE Linux Enterprise Micro 5.4:kernel-rt-5.14.21-150400.15.124.1.x86_64",
          "SUSE Linux Enterprise Micro 5.4:kernel-source-rt-5.14.21-150400.15.124.1.noarch"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2022-50190",
          "url": "https://www.suse.com/security/cve/CVE-2022-50190"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1244895 for CVE-2022-50190",
          "url": "https://bugzilla.suse.com/1244895"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "SUSE Linux Enterprise Micro 5.3:kernel-rt-5.14.21-150400.15.124.1.x86_64",
            "SUSE Linux Enterprise Micro 5.3:kernel-source-rt-5.14.21-150400.15.124.1.noarch",
            "SUSE Linux Enterprise Micro 5.4:kernel-rt-5.14.21-150400.15.124.1.x86_64",
            "SUSE Linux Enterprise Micro 5.4:kernel-source-rt-5.14.21-150400.15.124.1.noarch"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 5.5,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
            "version": "3.1"
          },
          "products": [
            "SUSE Linux Enterprise Micro 5.3:kernel-rt-5.14.21-150400.15.124.1.x86_64",
            "SUSE Linux Enterprise Micro 5.3:kernel-source-rt-5.14.21-150400.15.124.1.noarch",
            "SUSE Linux Enterprise Micro 5.4:kernel-rt-5.14.21-150400.15.124.1.x86_64",
            "SUSE Linux Enterprise Micro 5.4:kernel-source-rt-5.14.21-150400.15.124.1.noarch"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2025-07-15T14:31:46Z",
          "details": "moderate"
        }
      ],
      "title": "CVE-2022-50190"
    },
    {
      "cve": "CVE-2022-50191",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2022-50191"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "In the Linux kernel, the following vulnerability has been resolved:\n\nregulator: of: Fix refcount leak bug in of_get_regulation_constraints()\n\nWe should call the of_node_put() for the reference returned by\nof_get_child_by_name() which has increased the refcount.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "SUSE Linux Enterprise Micro 5.3:kernel-rt-5.14.21-150400.15.124.1.x86_64",
          "SUSE Linux Enterprise Micro 5.3:kernel-source-rt-5.14.21-150400.15.124.1.noarch",
          "SUSE Linux Enterprise Micro 5.4:kernel-rt-5.14.21-150400.15.124.1.x86_64",
          "SUSE Linux Enterprise Micro 5.4:kernel-source-rt-5.14.21-150400.15.124.1.noarch"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2022-50191",
          "url": "https://www.suse.com/security/cve/CVE-2022-50191"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1244899 for CVE-2022-50191",
          "url": "https://bugzilla.suse.com/1244899"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "SUSE Linux Enterprise Micro 5.3:kernel-rt-5.14.21-150400.15.124.1.x86_64",
            "SUSE Linux Enterprise Micro 5.3:kernel-source-rt-5.14.21-150400.15.124.1.noarch",
            "SUSE Linux Enterprise Micro 5.4:kernel-rt-5.14.21-150400.15.124.1.x86_64",
            "SUSE Linux Enterprise Micro 5.4:kernel-source-rt-5.14.21-150400.15.124.1.noarch"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 5.5,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
            "version": "3.1"
          },
          "products": [
            "SUSE Linux Enterprise Micro 5.3:kernel-rt-5.14.21-150400.15.124.1.x86_64",
            "SUSE Linux Enterprise Micro 5.3:kernel-source-rt-5.14.21-150400.15.124.1.noarch",
            "SUSE Linux Enterprise Micro 5.4:kernel-rt-5.14.21-150400.15.124.1.x86_64",
            "SUSE Linux Enterprise Micro 5.4:kernel-source-rt-5.14.21-150400.15.124.1.noarch"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2025-07-15T14:31:46Z",
          "details": "moderate"
        }
      ],
      "title": "CVE-2022-50191"
    },
    {
      "cve": "CVE-2022-50192",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2022-50192"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "In the Linux kernel, the following vulnerability has been resolved:\n\nspi: tegra20-slink: fix UAF in tegra_slink_remove()\n\nAfter calling spi_unregister_master(), the refcount of master will\nbe decrease to 0, and it will be freed in spi_controller_release(),\nthe device data also will be freed, so it will lead a UAF when using\n\u0027tspi\u0027. To fix this, get the master before unregister and put it when\nfinish using it.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "SUSE Linux Enterprise Micro 5.3:kernel-rt-5.14.21-150400.15.124.1.x86_64",
          "SUSE Linux Enterprise Micro 5.3:kernel-source-rt-5.14.21-150400.15.124.1.noarch",
          "SUSE Linux Enterprise Micro 5.4:kernel-rt-5.14.21-150400.15.124.1.x86_64",
          "SUSE Linux Enterprise Micro 5.4:kernel-source-rt-5.14.21-150400.15.124.1.noarch"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2022-50192",
          "url": "https://www.suse.com/security/cve/CVE-2022-50192"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1244879 for CVE-2022-50192",
          "url": "https://bugzilla.suse.com/1244879"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "SUSE Linux Enterprise Micro 5.3:kernel-rt-5.14.21-150400.15.124.1.x86_64",
            "SUSE Linux Enterprise Micro 5.3:kernel-source-rt-5.14.21-150400.15.124.1.noarch",
            "SUSE Linux Enterprise Micro 5.4:kernel-rt-5.14.21-150400.15.124.1.x86_64",
            "SUSE Linux Enterprise Micro 5.4:kernel-source-rt-5.14.21-150400.15.124.1.noarch"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 5.5,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
            "version": "3.1"
          },
          "products": [
            "SUSE Linux Enterprise Micro 5.3:kernel-rt-5.14.21-150400.15.124.1.x86_64",
            "SUSE Linux Enterprise Micro 5.3:kernel-source-rt-5.14.21-150400.15.124.1.noarch",
            "SUSE Linux Enterprise Micro 5.4:kernel-rt-5.14.21-150400.15.124.1.x86_64",
            "SUSE Linux Enterprise Micro 5.4:kernel-source-rt-5.14.21-150400.15.124.1.noarch"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2025-07-15T14:31:46Z",
          "details": "moderate"
        }
      ],
      "title": "CVE-2022-50192"
    },
    {
      "cve": "CVE-2022-50194",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2022-50194"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "In the Linux kernel, the following vulnerability has been resolved:\n\nsoc: qcom: aoss: Fix refcount leak in qmp_cooling_devices_register\n\nEvery iteration of for_each_available_child_of_node() decrements\nthe reference count of the previous node.\nWhen breaking early from a for_each_available_child_of_node() loop,\nwe need to explicitly call of_node_put() on the child node.\nAdd missing of_node_put() to avoid refcount leak.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "SUSE Linux Enterprise Micro 5.3:kernel-rt-5.14.21-150400.15.124.1.x86_64",
          "SUSE Linux Enterprise Micro 5.3:kernel-source-rt-5.14.21-150400.15.124.1.noarch",
          "SUSE Linux Enterprise Micro 5.4:kernel-rt-5.14.21-150400.15.124.1.x86_64",
          "SUSE Linux Enterprise Micro 5.4:kernel-source-rt-5.14.21-150400.15.124.1.noarch"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2022-50194",
          "url": "https://www.suse.com/security/cve/CVE-2022-50194"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1244878 for CVE-2022-50194",
          "url": "https://bugzilla.suse.com/1244878"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "SUSE Linux Enterprise Micro 5.3:kernel-rt-5.14.21-150400.15.124.1.x86_64",
            "SUSE Linux Enterprise Micro 5.3:kernel-source-rt-5.14.21-150400.15.124.1.noarch",
            "SUSE Linux Enterprise Micro 5.4:kernel-rt-5.14.21-150400.15.124.1.x86_64",
            "SUSE Linux Enterprise Micro 5.4:kernel-source-rt-5.14.21-150400.15.124.1.noarch"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 5.5,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
            "version": "3.1"
          },
          "products": [
            "SUSE Linux Enterprise Micro 5.3:kernel-rt-5.14.21-150400.15.124.1.x86_64",
            "SUSE Linux Enterprise Micro 5.3:kernel-source-rt-5.14.21-150400.15.124.1.noarch",
            "SUSE Linux Enterprise Micro 5.4:kernel-rt-5.14.21-150400.15.124.1.x86_64",
            "SUSE Linux Enterprise Micro 5.4:kernel-source-rt-5.14.21-150400.15.124.1.noarch"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2025-07-15T14:31:46Z",
          "details": "moderate"
        }
      ],
      "title": "CVE-2022-50194"
    },
    {
      "cve": "CVE-2022-50196",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2022-50196"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "In the Linux kernel, the following vulnerability has been resolved:\n\nsoc: qcom: ocmem: Fix refcount leak in of_get_ocmem\n\nof_parse_phandle() returns a node pointer with refcount\nincremented, we should use of_node_put() on it when not need anymore.\nAdd missing of_node_put() to avoid refcount leak.\nof_node_put() will check NULL pointer.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "SUSE Linux Enterprise Micro 5.3:kernel-rt-5.14.21-150400.15.124.1.x86_64",
          "SUSE Linux Enterprise Micro 5.3:kernel-source-rt-5.14.21-150400.15.124.1.noarch",
          "SUSE Linux Enterprise Micro 5.4:kernel-rt-5.14.21-150400.15.124.1.x86_64",
          "SUSE Linux Enterprise Micro 5.4:kernel-source-rt-5.14.21-150400.15.124.1.noarch"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2022-50196",
          "url": "https://www.suse.com/security/cve/CVE-2022-50196"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1244875 for CVE-2022-50196",
          "url": "https://bugzilla.suse.com/1244875"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "SUSE Linux Enterprise Micro 5.3:kernel-rt-5.14.21-150400.15.124.1.x86_64",
            "SUSE Linux Enterprise Micro 5.3:kernel-source-rt-5.14.21-150400.15.124.1.noarch",
            "SUSE Linux Enterprise Micro 5.4:kernel-rt-5.14.21-150400.15.124.1.x86_64",
            "SUSE Linux Enterprise Micro 5.4:kernel-source-rt-5.14.21-150400.15.124.1.noarch"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 5.5,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
            "version": "3.1"
          },
          "products": [
            "SUSE Linux Enterprise Micro 5.3:kernel-rt-5.14.21-150400.15.124.1.x86_64",
            "SUSE Linux Enterprise Micro 5.3:kernel-source-rt-5.14.21-150400.15.124.1.noarch",
            "SUSE Linux Enterprise Micro 5.4:kernel-rt-5.14.21-150400.15.124.1.x86_64",
            "SUSE Linux Enterprise Micro 5.4:kernel-source-rt-5.14.21-150400.15.124.1.noarch"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2025-07-15T14:31:46Z",
          "details": "moderate"
        }
      ],
      "title": "CVE-2022-50196"
    },
    {
      "cve": "CVE-2022-50197",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2022-50197"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "In the Linux kernel, the following vulnerability has been resolved:\n\ncpufreq: zynq: Fix refcount leak in zynq_get_revision\n\nof_find_compatible_node() returns a node pointer with refcount\nincremented, we should use of_node_put() on it when done.\nAdd missing of_node_put() to avoid refcount leak.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "SUSE Linux Enterprise Micro 5.3:kernel-rt-5.14.21-150400.15.124.1.x86_64",
          "SUSE Linux Enterprise Micro 5.3:kernel-source-rt-5.14.21-150400.15.124.1.noarch",
          "SUSE Linux Enterprise Micro 5.4:kernel-rt-5.14.21-150400.15.124.1.x86_64",
          "SUSE Linux Enterprise Micro 5.4:kernel-source-rt-5.14.21-150400.15.124.1.noarch"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2022-50197",
          "url": "https://www.suse.com/security/cve/CVE-2022-50197"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1244876 for CVE-2022-50197",
          "url": "https://bugzilla.suse.com/1244876"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "SUSE Linux Enterprise Micro 5.3:kernel-rt-5.14.21-150400.15.124.1.x86_64",
            "SUSE Linux Enterprise Micro 5.3:kernel-source-rt-5.14.21-150400.15.124.1.noarch",
            "SUSE Linux Enterprise Micro 5.4:kernel-rt-5.14.21-150400.15.124.1.x86_64",
            "SUSE Linux Enterprise Micro 5.4:kernel-source-rt-5.14.21-150400.15.124.1.noarch"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 5.5,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
            "version": "3.1"
          },
          "products": [
            "SUSE Linux Enterprise Micro 5.3:kernel-rt-5.14.21-150400.15.124.1.x86_64",
            "SUSE Linux Enterprise Micro 5.3:kernel-source-rt-5.14.21-150400.15.124.1.noarch",
            "SUSE Linux Enterprise Micro 5.4:kernel-rt-5.14.21-150400.15.124.1.x86_64",
            "SUSE Linux Enterprise Micro 5.4:kernel-source-rt-5.14.21-150400.15.124.1.noarch"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2025-07-15T14:31:46Z",
          "details": "moderate"
        }
      ],
      "title": "CVE-2022-50197"
    },
    {
      "cve": "CVE-2022-50198",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2022-50198"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "In the Linux kernel, the following vulnerability has been resolved:\n\nARM: OMAP2+: Fix refcount leak in omap3xxx_prm_late_init\n\nof_find_matching_node() returns a node pointer with refcount\nincremented, we should use of_node_put() on it when not need anymore.\nAdd missing of_node_put() to avoid refcount leak.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "SUSE Linux Enterprise Micro 5.3:kernel-rt-5.14.21-150400.15.124.1.x86_64",
          "SUSE Linux Enterprise Micro 5.3:kernel-source-rt-5.14.21-150400.15.124.1.noarch",
          "SUSE Linux Enterprise Micro 5.4:kernel-rt-5.14.21-150400.15.124.1.x86_64",
          "SUSE Linux Enterprise Micro 5.4:kernel-source-rt-5.14.21-150400.15.124.1.noarch"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2022-50198",
          "url": "https://www.suse.com/security/cve/CVE-2022-50198"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1244872 for CVE-2022-50198",
          "url": "https://bugzilla.suse.com/1244872"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "SUSE Linux Enterprise Micro 5.3:kernel-rt-5.14.21-150400.15.124.1.x86_64",
            "SUSE Linux Enterprise Micro 5.3:kernel-source-rt-5.14.21-150400.15.124.1.noarch",
            "SUSE Linux Enterprise Micro 5.4:kernel-rt-5.14.21-150400.15.124.1.x86_64",
            "SUSE Linux Enterprise Micro 5.4:kernel-source-rt-5.14.21-150400.15.124.1.noarch"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 5.5,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
            "version": "3.1"
          },
          "products": [
            "SUSE Linux Enterprise Micro 5.3:kernel-rt-5.14.21-150400.15.124.1.x86_64",
            "SUSE Linux Enterprise Micro 5.3:kernel-source-rt-5.14.21-150400.15.124.1.noarch",
            "SUSE Linux Enterprise Micro 5.4:kernel-rt-5.14.21-150400.15.124.1.x86_64",
            "SUSE Linux Enterprise Micro 5.4:kernel-source-rt-5.14.21-150400.15.124.1.noarch"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2025-07-15T14:31:46Z",
          "details": "moderate"
        }
      ],
      "title": "CVE-2022-50198"
    },
    {
      "cve": "CVE-2022-50199",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2022-50199"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "In the Linux kernel, the following vulnerability has been resolved:\n\nARM: OMAP2+: Fix refcount leak in omapdss_init_of\n\nomapdss_find_dss_of_node() calls of_find_compatible_node() to get device\nnode. of_find_compatible_node() returns a node pointer with refcount\nincremented, we should use of_node_put() on it when done.\nAdd missing of_node_put() in later error path and normal path.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "SUSE Linux Enterprise Micro 5.3:kernel-rt-5.14.21-150400.15.124.1.x86_64",
          "SUSE Linux Enterprise Micro 5.3:kernel-source-rt-5.14.21-150400.15.124.1.noarch",
          "SUSE Linux Enterprise Micro 5.4:kernel-rt-5.14.21-150400.15.124.1.x86_64",
          "SUSE Linux Enterprise Micro 5.4:kernel-source-rt-5.14.21-150400.15.124.1.noarch"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2022-50199",
          "url": "https://www.suse.com/security/cve/CVE-2022-50199"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1244873 for CVE-2022-50199",
          "url": "https://bugzilla.suse.com/1244873"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "SUSE Linux Enterprise Micro 5.3:kernel-rt-5.14.21-150400.15.124.1.x86_64",
            "SUSE Linux Enterprise Micro 5.3:kernel-source-rt-5.14.21-150400.15.124.1.noarch",
            "SUSE Linux Enterprise Micro 5.4:kernel-rt-5.14.21-150400.15.124.1.x86_64",
            "SUSE Linux Enterprise Micro 5.4:kernel-source-rt-5.14.21-150400.15.124.1.noarch"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 5.5,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
            "version": "3.1"
          },
          "products": [
            "SUSE Linux Enterprise Micro 5.3:kernel-rt-5.14.21-150400.15.124.1.x86_64",
            "SUSE Linux Enterprise Micro 5.3:kernel-source-rt-5.14.21-150400.15.124.1.noarch",
            "SUSE Linux Enterprise Micro 5.4:kernel-rt-5.14.21-150400.15.124.1.x86_64",
            "SUSE Linux Enterprise Micro 5.4:kernel-source-rt-5.14.21-150400.15.124.1.noarch"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2025-07-15T14:31:46Z",
          "details": "moderate"
        }
      ],
      "title": "CVE-2022-50199"
    },
    {
      "cve": "CVE-2022-50200",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2022-50200"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "In the Linux kernel, the following vulnerability has been resolved:\n\nselinux: Add boundary check in put_entry()\n\nJust like next_entry(), boundary check is necessary to prevent memory\nout-of-bound access.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "SUSE Linux Enterprise Micro 5.3:kernel-rt-5.14.21-150400.15.124.1.x86_64",
          "SUSE Linux Enterprise Micro 5.3:kernel-source-rt-5.14.21-150400.15.124.1.noarch",
          "SUSE Linux Enterprise Micro 5.4:kernel-rt-5.14.21-150400.15.124.1.x86_64",
          "SUSE Linux Enterprise Micro 5.4:kernel-source-rt-5.14.21-150400.15.124.1.noarch"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2022-50200",
          "url": "https://www.suse.com/security/cve/CVE-2022-50200"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1245149 for CVE-2022-50200",
          "url": "https://bugzilla.suse.com/1245149"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "SUSE Linux Enterprise Micro 5.3:kernel-rt-5.14.21-150400.15.124.1.x86_64",
            "SUSE Linux Enterprise Micro 5.3:kernel-source-rt-5.14.21-150400.15.124.1.noarch",
            "SUSE Linux Enterprise Micro 5.4:kernel-rt-5.14.21-150400.15.124.1.x86_64",
            "SUSE Linux Enterprise Micro 5.4:kernel-source-rt-5.14.21-150400.15.124.1.noarch"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 7.8,
            "baseSeverity": "HIGH",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
            "version": "3.1"
          },
          "products": [
            "SUSE Linux Enterprise Micro 5.3:kernel-rt-5.14.21-150400.15.124.1.x86_64",
            "SUSE Linux Enterprise Micro 5.3:kernel-source-rt-5.14.21-150400.15.124.1.noarch",
            "SUSE Linux Enterprise Micro 5.4:kernel-rt-5.14.21-150400.15.124.1.x86_64",
            "SUSE Linux Enterprise Micro 5.4:kernel-source-rt-5.14.21-150400.15.124.1.noarch"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2025-07-15T14:31:46Z",
          "details": "important"
        }
      ],
      "title": "CVE-2022-50200"
    },
    {
      "cve": "CVE-2022-50201",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2022-50201"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "In the Linux kernel, the following vulnerability has been resolved:\n\nselinux: fix memleak in security_read_state_kernel()\n\nIn this function, it directly returns the result of __security_read_policy\nwithout freeing the allocated memory in *data, cause memory leak issue,\nso free the memory if __security_read_policy failed.\n\n[PM: subject line tweak]",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "SUSE Linux Enterprise Micro 5.3:kernel-rt-5.14.21-150400.15.124.1.x86_64",
          "SUSE Linux Enterprise Micro 5.3:kernel-source-rt-5.14.21-150400.15.124.1.noarch",
          "SUSE Linux Enterprise Micro 5.4:kernel-rt-5.14.21-150400.15.124.1.x86_64",
          "SUSE Linux Enterprise Micro 5.4:kernel-source-rt-5.14.21-150400.15.124.1.noarch"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2022-50201",
          "url": "https://www.suse.com/security/cve/CVE-2022-50201"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1245197 for CVE-2022-50201",
          "url": "https://bugzilla.suse.com/1245197"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "SUSE Linux Enterprise Micro 5.3:kernel-rt-5.14.21-150400.15.124.1.x86_64",
            "SUSE Linux Enterprise Micro 5.3:kernel-source-rt-5.14.21-150400.15.124.1.noarch",
            "SUSE Linux Enterprise Micro 5.4:kernel-rt-5.14.21-150400.15.124.1.x86_64",
            "SUSE Linux Enterprise Micro 5.4:kernel-source-rt-5.14.21-150400.15.124.1.noarch"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 4.4,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H",
            "version": "3.1"
          },
          "products": [
            "SUSE Linux Enterprise Micro 5.3:kernel-rt-5.14.21-150400.15.124.1.x86_64",
            "SUSE Linux Enterprise Micro 5.3:kernel-source-rt-5.14.21-150400.15.124.1.noarch",
            "SUSE Linux Enterprise Micro 5.4:kernel-rt-5.14.21-150400.15.124.1.x86_64",
            "SUSE Linux Enterprise Micro 5.4:kernel-source-rt-5.14.21-150400.15.124.1.noarch"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2025-07-15T14:31:46Z",
          "details": "moderate"
        }
      ],
      "title": "CVE-2022-50201"
    },
    {
      "cve": "CVE-2022-50202",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2022-50202"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "In the Linux kernel, the following vulnerability has been resolved:\n\nPM: hibernate: defer device probing when resuming from hibernation\n\nsyzbot is reporting hung task at misc_open() [1], for there is a race\nwindow of AB-BA deadlock which involves probe_count variable. Currently\nwait_for_device_probe() from snapshot_open() from misc_open() can sleep\nforever with misc_mtx held if probe_count cannot become 0.\n\nWhen a device is probed by hub_event() work function, probe_count is\nincremented before the probe function starts, and probe_count is\ndecremented after the probe function completed.\n\nThere are three cases that can prevent probe_count from dropping to 0.\n\n  (a) A device being probed stopped responding (i.e. broken/malicious\n      hardware).\n\n  (b) A process emulating a USB device using /dev/raw-gadget interface\n      stopped responding for some reason.\n\n  (c) New device probe requests keeps coming in before existing device\n      probe requests complete.\n\nThe phenomenon syzbot is reporting is (b). A process which is holding\nsystem_transition_mutex and misc_mtx is waiting for probe_count to become\n0 inside wait_for_device_probe(), but the probe function which is called\n from hub_event() work function is waiting for the processes which are\nblocked at mutex_lock(\u0026misc_mtx) to respond via /dev/raw-gadget interface.\n\nThis patch mitigates (b) by deferring wait_for_device_probe() from\nsnapshot_open() to snapshot_write() and snapshot_ioctl(). Please note that\nthe possibility of (b) remains as long as any thread which is emulating a\nUSB device via /dev/raw-gadget interface can be blocked by uninterruptible\nblocking operations (e.g. mutex_lock()).\n\nPlease also note that (a) and (c) are not addressed. Regarding (c), we\nshould change the code to wait for only one device which contains the\nimage for resuming from hibernation. I don\u0027t know how to address (a), for\nuse of timeout for wait_for_device_probe() might result in loss of user\ndata in the image. Maybe we should require the userland to wait for the\nimage device before opening /dev/snapshot interface.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "SUSE Linux Enterprise Micro 5.3:kernel-rt-5.14.21-150400.15.124.1.x86_64",
          "SUSE Linux Enterprise Micro 5.3:kernel-source-rt-5.14.21-150400.15.124.1.noarch",
          "SUSE Linux Enterprise Micro 5.4:kernel-rt-5.14.21-150400.15.124.1.x86_64",
          "SUSE Linux Enterprise Micro 5.4:kernel-source-rt-5.14.21-150400.15.124.1.noarch"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2022-50202",
          "url": "https://www.suse.com/security/cve/CVE-2022-50202"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1245154 for CVE-2022-50202",
          "url": "https://bugzilla.suse.com/1245154"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "SUSE Linux Enterprise Micro 5.3:kernel-rt-5.14.21-150400.15.124.1.x86_64",
            "SUSE Linux Enterprise Micro 5.3:kernel-source-rt-5.14.21-150400.15.124.1.noarch",
            "SUSE Linux Enterprise Micro 5.4:kernel-rt-5.14.21-150400.15.124.1.x86_64",
            "SUSE Linux Enterprise Micro 5.4:kernel-source-rt-5.14.21-150400.15.124.1.noarch"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 4.1,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:N/I:N/A:H",
            "version": "3.1"
          },
          "products": [
            "SUSE Linux Enterprise Micro 5.3:kernel-rt-5.14.21-150400.15.124.1.x86_64",
            "SUSE Linux Enterprise Micro 5.3:kernel-source-rt-5.14.21-150400.15.124.1.noarch",
            "SUSE Linux Enterprise Micro 5.4:kernel-rt-5.14.21-150400.15.124.1.x86_64",
            "SUSE Linux Enterprise Micro 5.4:kernel-source-rt-5.14.21-150400.15.124.1.noarch"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2025-07-15T14:31:46Z",
          "details": "moderate"
        }
      ],
      "title": "CVE-2022-50202"
    },
    {
      "cve": "CVE-2022-50203",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2022-50203"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "In the Linux kernel, the following vulnerability has been resolved:\n\nARM: OMAP2+: display: Fix refcount leak bug\n\nIn omapdss_init_fbdev(), of_find_node_by_name() will return a node\npointer with refcount incremented. We should use of_node_put() when\nit is not used anymore.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "SUSE Linux Enterprise Micro 5.3:kernel-rt-5.14.21-150400.15.124.1.x86_64",
          "SUSE Linux Enterprise Micro 5.3:kernel-source-rt-5.14.21-150400.15.124.1.noarch",
          "SUSE Linux Enterprise Micro 5.4:kernel-rt-5.14.21-150400.15.124.1.x86_64",
          "SUSE Linux Enterprise Micro 5.4:kernel-source-rt-5.14.21-150400.15.124.1.noarch"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2022-50203",
          "url": "https://www.suse.com/security/cve/CVE-2022-50203"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1245189 for CVE-2022-50203",
          "url": "https://bugzilla.suse.com/1245189"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "SUSE Linux Enterprise Micro 5.3:kernel-rt-5.14.21-150400.15.124.1.x86_64",
            "SUSE Linux Enterprise Micro 5.3:kernel-source-rt-5.14.21-150400.15.124.1.noarch",
            "SUSE Linux Enterprise Micro 5.4:kernel-rt-5.14.21-150400.15.124.1.x86_64",
            "SUSE Linux Enterprise Micro 5.4:kernel-source-rt-5.14.21-150400.15.124.1.noarch"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 5.5,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
            "version": "3.1"
          },
          "products": [
            "SUSE Linux Enterprise Micro 5.3:kernel-rt-5.14.21-150400.15.124.1.x86_64",
            "SUSE Linux Enterprise Micro 5.3:kernel-source-rt-5.14.21-150400.15.124.1.noarch",
            "SUSE Linux Enterprise Micro 5.4:kernel-rt-5.14.21-150400.15.124.1.x86_64",
            "SUSE Linux Enterprise Micro 5.4:kernel-source-rt-5.14.21-150400.15.124.1.noarch"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2025-07-15T14:31:46Z",
          "details": "moderate"
        }
      ],
      "title": "CVE-2022-50203"
    },
    {
      "cve": "CVE-2022-50204",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2022-50204"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "In the Linux kernel, the following vulnerability has been resolved:\n\nARM: OMAP2+: pdata-quirks: Fix refcount leak bug\n\nIn pdata_quirks_init_clocks(), the loop contains\nof_find_node_by_name() but without corresponding of_node_put().",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "SUSE Linux Enterprise Micro 5.3:kernel-rt-5.14.21-150400.15.124.1.x86_64",
          "SUSE Linux Enterprise Micro 5.3:kernel-source-rt-5.14.21-150400.15.124.1.noarch",
          "SUSE Linux Enterprise Micro 5.4:kernel-rt-5.14.21-150400.15.124.1.x86_64",
          "SUSE Linux Enterprise Micro 5.4:kernel-source-rt-5.14.21-150400.15.124.1.noarch"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2022-50204",
          "url": "https://www.suse.com/security/cve/CVE-2022-50204"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1245191 for CVE-2022-50204",
          "url": "https://bugzilla.suse.com/1245191"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "SUSE Linux Enterprise Micro 5.3:kernel-rt-5.14.21-150400.15.124.1.x86_64",
            "SUSE Linux Enterprise Micro 5.3:kernel-source-rt-5.14.21-150400.15.124.1.noarch",
            "SUSE Linux Enterprise Micro 5.4:kernel-rt-5.14.21-150400.15.124.1.x86_64",
            "SUSE Linux Enterprise Micro 5.4:kernel-source-rt-5.14.21-150400.15.124.1.noarch"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 5.5,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
            "version": "3.1"
          },
          "products": [
            "SUSE Linux Enterprise Micro 5.3:kernel-rt-5.14.21-150400.15.124.1.x86_64",
            "SUSE Linux Enterprise Micro 5.3:kernel-source-rt-5.14.21-150400.15.124.1.noarch",
            "SUSE Linux Enterprise Micro 5.4:kernel-rt-5.14.21-150400.15.124.1.x86_64",
            "SUSE Linux Enterprise Micro 5.4:kernel-source-rt-5.14.21-150400.15.124.1.noarch"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2025-07-15T14:31:46Z",
          "details": "moderate"
        }
      ],
      "title": "CVE-2022-50204"
    },
    {
      "cve": "CVE-2022-50206",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2022-50206"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "In the Linux kernel, the following vulnerability has been resolved:\n\narm64: fix oops in concurrently setting insn_emulation sysctls\n\nemulation_proc_handler() changes table-\u003edata for proc_dointvec_minmax\nand can generate the following Oops if called concurrently with itself:\n\n | Unable to handle kernel NULL pointer dereference at virtual address 0000000000000010\n | Internal error: Oops: 96000006 [#1] SMP\n | Call trace:\n | update_insn_emulation_mode+0xc0/0x148\n | emulation_proc_handler+0x64/0xb8\n | proc_sys_call_handler+0x9c/0xf8\n | proc_sys_write+0x18/0x20\n | __vfs_write+0x20/0x48\n | vfs_write+0xe4/0x1d0\n | ksys_write+0x70/0xf8\n | __arm64_sys_write+0x20/0x28\n | el0_svc_common.constprop.0+0x7c/0x1c0\n | el0_svc_handler+0x2c/0xa0\n | el0_svc+0x8/0x200\n\nTo fix this issue, keep the table-\u003edata as \u0026insn-\u003ecurrent_mode and\nuse container_of() to retrieve the insn pointer. Another mutex is\nused to protect against the current_mode update but not for retrieving\ninsn_emulation as table-\u003edata is no longer changing.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "SUSE Linux Enterprise Micro 5.3:kernel-rt-5.14.21-150400.15.124.1.x86_64",
          "SUSE Linux Enterprise Micro 5.3:kernel-source-rt-5.14.21-150400.15.124.1.noarch",
          "SUSE Linux Enterprise Micro 5.4:kernel-rt-5.14.21-150400.15.124.1.x86_64",
          "SUSE Linux Enterprise Micro 5.4:kernel-source-rt-5.14.21-150400.15.124.1.noarch"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2022-50206",
          "url": "https://www.suse.com/security/cve/CVE-2022-50206"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1245152 for CVE-2022-50206",
          "url": "https://bugzilla.suse.com/1245152"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "SUSE Linux Enterprise Micro 5.3:kernel-rt-5.14.21-150400.15.124.1.x86_64",
            "SUSE Linux Enterprise Micro 5.3:kernel-source-rt-5.14.21-150400.15.124.1.noarch",
            "SUSE Linux Enterprise Micro 5.4:kernel-rt-5.14.21-150400.15.124.1.x86_64",
            "SUSE Linux Enterprise Micro 5.4:kernel-source-rt-5.14.21-150400.15.124.1.noarch"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 4.7,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H",
            "version": "3.1"
          },
          "products": [
            "SUSE Linux Enterprise Micro 5.3:kernel-rt-5.14.21-150400.15.124.1.x86_64",
            "SUSE Linux Enterprise Micro 5.3:kernel-source-rt-5.14.21-150400.15.124.1.noarch",
            "SUSE Linux Enterprise Micro 5.4:kernel-rt-5.14.21-150400.15.124.1.x86_64",
            "SUSE Linux Enterprise Micro 5.4:kernel-source-rt-5.14.21-150400.15.124.1.noarch"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2025-07-15T14:31:46Z",
          "details": "moderate"
        }
      ],
      "title": "CVE-2022-50206"
    },
    {
      "cve": "CVE-2022-50207",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2022-50207"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "In the Linux kernel, the following vulnerability has been resolved:\n\nARM: bcm: Fix refcount leak in bcm_kona_smc_init\n\nof_find_matching_node() returns a node pointer with refcount\nincremented, we should use of_node_put() on it when not need anymore.\nAdd missing of_node_put() to avoid refcount leak.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "SUSE Linux Enterprise Micro 5.3:kernel-rt-5.14.21-150400.15.124.1.x86_64",
          "SUSE Linux Enterprise Micro 5.3:kernel-source-rt-5.14.21-150400.15.124.1.noarch",
          "SUSE Linux Enterprise Micro 5.4:kernel-rt-5.14.21-150400.15.124.1.x86_64",
          "SUSE Linux Enterprise Micro 5.4:kernel-source-rt-5.14.21-150400.15.124.1.noarch"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2022-50207",
          "url": "https://www.suse.com/security/cve/CVE-2022-50207"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1244871 for CVE-2022-50207",
          "url": "https://bugzilla.suse.com/1244871"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "SUSE Linux Enterprise Micro 5.3:kernel-rt-5.14.21-150400.15.124.1.x86_64",
            "SUSE Linux Enterprise Micro 5.3:kernel-source-rt-5.14.21-150400.15.124.1.noarch",
            "SUSE Linux Enterprise Micro 5.4:kernel-rt-5.14.21-150400.15.124.1.x86_64",
            "SUSE Linux Enterprise Micro 5.4:kernel-source-rt-5.14.21-150400.15.124.1.noarch"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 5.5,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
            "version": "3.1"
          },
          "products": [
            "SUSE Linux Enterprise Micro 5.3:kernel-rt-5.14.21-150400.15.124.1.x86_64",
            "SUSE Linux Enterprise Micro 5.3:kernel-source-rt-5.14.21-150400.15.124.1.noarch",
            "SUSE Linux Enterprise Micro 5.4:kernel-rt-5.14.21-150400.15.124.1.x86_64",
            "SUSE Linux Enterprise Micro 5.4:kernel-source-rt-5.14.21-150400.15.124.1.noarch"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2025-07-15T14:31:46Z",
          "details": "moderate"
        }
      ],
      "title": "CVE-2022-50207"
    },
    {
      "cve": "CVE-2022-50208",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2022-50208"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "In the Linux kernel, the following vulnerability has been resolved:\n\nsoc: amlogic: Fix refcount leak in meson-secure-pwrc.c\n\nIn meson_secure_pwrc_probe(), there is a refcount leak in one fail\npath.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "SUSE Linux Enterprise Micro 5.3:kernel-rt-5.14.21-150400.15.124.1.x86_64",
          "SUSE Linux Enterprise Micro 5.3:kernel-source-rt-5.14.21-150400.15.124.1.noarch",
          "SUSE Linux Enterprise Micro 5.4:kernel-rt-5.14.21-150400.15.124.1.x86_64",
          "SUSE Linux Enterprise Micro 5.4:kernel-source-rt-5.14.21-150400.15.124.1.noarch"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2022-50208",
          "url": "https://www.suse.com/security/cve/CVE-2022-50208"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1244870 for CVE-2022-50208",
          "url": "https://bugzilla.suse.com/1244870"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "SUSE Linux Enterprise Micro 5.3:kernel-rt-5.14.21-150400.15.124.1.x86_64",
            "SUSE Linux Enterprise Micro 5.3:kernel-source-rt-5.14.21-150400.15.124.1.noarch",
            "SUSE Linux Enterprise Micro 5.4:kernel-rt-5.14.21-150400.15.124.1.x86_64",
            "SUSE Linux Enterprise Micro 5.4:kernel-source-rt-5.14.21-150400.15.124.1.noarch"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 5.5,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
            "version": "3.1"
          },
          "products": [
            "SUSE Linux Enterprise Micro 5.3:kernel-rt-5.14.21-150400.15.124.1.x86_64",
            "SUSE Linux Enterprise Micro 5.3:kernel-source-rt-5.14.21-150400.15.124.1.noarch",
            "SUSE Linux Enterprise Micro 5.4:kernel-rt-5.14.21-150400.15.124.1.x86_64",
            "SUSE Linux Enterprise Micro 5.4:kernel-source-rt-5.14.21-150400.15.124.1.noarch"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2025-07-15T14:31:46Z",
          "details": "moderate"
        }
      ],
      "title": "CVE-2022-50208"
    },
    {
      "cve": "CVE-2022-50209",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2022-50209"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "In the Linux kernel, the following vulnerability has been resolved:\n\nmeson-mx-socinfo: Fix refcount leak in meson_mx_socinfo_init\n\nof_find_matching_node() returns a node pointer with refcount\nincremented, we should use of_node_put() on it when not need anymore.\nAdd missing of_node_put() to avoid refcount leak.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "SUSE Linux Enterprise Micro 5.3:kernel-rt-5.14.21-150400.15.124.1.x86_64",
          "SUSE Linux Enterprise Micro 5.3:kernel-source-rt-5.14.21-150400.15.124.1.noarch",
          "SUSE Linux Enterprise Micro 5.4:kernel-rt-5.14.21-150400.15.124.1.x86_64",
          "SUSE Linux Enterprise Micro 5.4:kernel-source-rt-5.14.21-150400.15.124.1.noarch"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2022-50209",
          "url": "https://www.suse.com/security/cve/CVE-2022-50209"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1244868 for CVE-2022-50209",
          "url": "https://bugzilla.suse.com/1244868"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "SUSE Linux Enterprise Micro 5.3:kernel-rt-5.14.21-150400.15.124.1.x86_64",
            "SUSE Linux Enterprise Micro 5.3:kernel-source-rt-5.14.21-150400.15.124.1.noarch",
            "SUSE Linux Enterprise Micro 5.4:kernel-rt-5.14.21-150400.15.124.1.x86_64",
            "SUSE Linux Enterprise Micro 5.4:kernel-source-rt-5.14.21-150400.15.124.1.noarch"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 5.5,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
            "version": "3.1"
          },
          "products": [
            "SUSE Linux Enterprise Micro 5.3:kernel-rt-5.14.21-150400.15.124.1.x86_64",
            "SUSE Linux Enterprise Micro 5.3:kernel-source-rt-5.14.21-150400.15.124.1.noarch",
            "SUSE Linux Enterprise Micro 5.4:kernel-rt-5.14.21-150400.15.124.1.x86_64",
            "SUSE Linux Enterprise Micro 5.4:kernel-source-rt-5.14.21-150400.15.124.1.noarch"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2025-07-15T14:31:46Z",
          "details": "moderate"
        }
      ],
      "title": "CVE-2022-50209"
    },
    {
      "cve": "CVE-2022-50211",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2022-50211"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "In the Linux kernel, the following vulnerability has been resolved:\n\nmd-raid10: fix KASAN warning\n\nThere\u0027s a KASAN warning in raid10_remove_disk when running the lvm\ntest lvconvert-raid-reshape.sh. We fix this warning by verifying that the\nvalue \"number\" is valid.\n\nBUG: KASAN: slab-out-of-bounds in raid10_remove_disk+0x61/0x2a0 [raid10]\nRead of size 8 at addr ffff889108f3d300 by task mdX_raid10/124682\n\nCPU: 3 PID: 124682 Comm: mdX_raid10 Not tainted 5.19.0-rc6 #1\nHardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.14.0-2 04/01/2014\nCall Trace:\n \u003cTASK\u003e\n dump_stack_lvl+0x34/0x44\n print_report.cold+0x45/0x57a\n ? __lock_text_start+0x18/0x18\n ? raid10_remove_disk+0x61/0x2a0 [raid10]\n kasan_report+0xa8/0xe0\n ? raid10_remove_disk+0x61/0x2a0 [raid10]\n raid10_remove_disk+0x61/0x2a0 [raid10]\nBuffer I/O error on dev dm-76, logical block 15344, async page read\n ? __mutex_unlock_slowpath.constprop.0+0x1e0/0x1e0\n remove_and_add_spares+0x367/0x8a0 [md_mod]\n ? super_written+0x1c0/0x1c0 [md_mod]\n ? mutex_trylock+0xac/0x120\n ? _raw_spin_lock+0x72/0xc0\n ? _raw_spin_lock_bh+0xc0/0xc0\n md_check_recovery+0x848/0x960 [md_mod]\n raid10d+0xcf/0x3360 [raid10]\n ? sched_clock_cpu+0x185/0x1a0\n ? rb_erase+0x4d4/0x620\n ? var_wake_function+0xe0/0xe0\n ? psi_group_change+0x411/0x500\n ? preempt_count_sub+0xf/0xc0\n ? _raw_spin_lock_irqsave+0x78/0xc0\n ? __lock_text_start+0x18/0x18\n ? raid10_sync_request+0x36c0/0x36c0 [raid10]\n ? preempt_count_sub+0xf/0xc0\n ? _raw_spin_unlock_irqrestore+0x19/0x40\n ? del_timer_sync+0xa9/0x100\n ? try_to_del_timer_sync+0xc0/0xc0\n ? _raw_spin_lock_irqsave+0x78/0xc0\n ? __lock_text_start+0x18/0x18\n ? _raw_spin_unlock_irq+0x11/0x24\n ? __list_del_entry_valid+0x68/0xa0\n ? finish_wait+0xa3/0x100\n md_thread+0x161/0x260 [md_mod]\n ? unregister_md_personality+0xa0/0xa0 [md_mod]\n ? _raw_spin_lock_irqsave+0x78/0xc0\n ? prepare_to_wait_event+0x2c0/0x2c0\n ? unregister_md_personality+0xa0/0xa0 [md_mod]\n kthread+0x148/0x180\n ? kthread_complete_and_exit+0x20/0x20\n ret_from_fork+0x1f/0x30\n \u003c/TASK\u003e\n\nAllocated by task 124495:\n kasan_save_stack+0x1e/0x40\n __kasan_kmalloc+0x80/0xa0\n setup_conf+0x140/0x5c0 [raid10]\n raid10_run+0x4cd/0x740 [raid10]\n md_run+0x6f9/0x1300 [md_mod]\n raid_ctr+0x2531/0x4ac0 [dm_raid]\n dm_table_add_target+0x2b0/0x620 [dm_mod]\n table_load+0x1c8/0x400 [dm_mod]\n ctl_ioctl+0x29e/0x560 [dm_mod]\n dm_compat_ctl_ioctl+0x7/0x20 [dm_mod]\n __do_compat_sys_ioctl+0xfa/0x160\n do_syscall_64+0x90/0xc0\n entry_SYSCALL_64_after_hwframe+0x46/0xb0\n\nLast potentially related work creation:\n kasan_save_stack+0x1e/0x40\n __kasan_record_aux_stack+0x9e/0xc0\n kvfree_call_rcu+0x84/0x480\n timerfd_release+0x82/0x140\nL __fput+0xfa/0x400\n task_work_run+0x80/0xc0\n exit_to_user_mode_prepare+0x155/0x160\n syscall_exit_to_user_mode+0x12/0x40\n do_syscall_64+0x42/0xc0\n entry_SYSCALL_64_after_hwframe+0x46/0xb0\n\nSecond to last potentially related work creation:\n kasan_save_stack+0x1e/0x40\n __kasan_record_aux_stack+0x9e/0xc0\n kvfree_call_rcu+0x84/0x480\n timerfd_release+0x82/0x140\n __fput+0xfa/0x400\n task_work_run+0x80/0xc0\n exit_to_user_mode_prepare+0x155/0x160\n syscall_exit_to_user_mode+0x12/0x40\n do_syscall_64+0x42/0xc0\n entry_SYSCALL_64_after_hwframe+0x46/0xb0\n\nThe buggy address belongs to the object at ffff889108f3d200\n which belongs to the cache kmalloc-256 of size 256\nThe buggy address is located 0 bytes to the right of\n 256-byte region [ffff889108f3d200, ffff889108f3d300)\n\nThe buggy address belongs to the physical page:\npage:000000007ef2a34c refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1108f3c\nhead:000000007ef2a34c order:2 compound_mapcount:0 compound_pincount:0\nflags: 0x4000000000010200(slab|head|zone=2)\nraw: 4000000000010200 0000000000000000 dead000000000001 ffff889100042b40\nraw: 0000000000000000 0000000080200020 00000001ffffffff 0000000000000000\npage dumped because: kasan: bad access detected\n\nMemory state around the buggy address:\n ffff889108f3d200: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00\n ffff889108f3d280: 00 00\n---truncated---",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "SUSE Linux Enterprise Micro 5.3:kernel-rt-5.14.21-150400.15.124.1.x86_64",
          "SUSE Linux Enterprise Micro 5.3:kernel-source-rt-5.14.21-150400.15.124.1.noarch",
          "SUSE Linux Enterprise Micro 5.4:kernel-rt-5.14.21-150400.15.124.1.x86_64",
          "SUSE Linux Enterprise Micro 5.4:kernel-source-rt-5.14.21-150400.15.124.1.noarch"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2022-50211",
          "url": "https://www.suse.com/security/cve/CVE-2022-50211"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1245140 for CVE-2022-50211",
          "url": "https://bugzilla.suse.com/1245140"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1245141 for CVE-2022-50211",
          "url": "https://bugzilla.suse.com/1245141"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "SUSE Linux Enterprise Micro 5.3:kernel-rt-5.14.21-150400.15.124.1.x86_64",
            "SUSE Linux Enterprise Micro 5.3:kernel-source-rt-5.14.21-150400.15.124.1.noarch",
            "SUSE Linux Enterprise Micro 5.4:kernel-rt-5.14.21-150400.15.124.1.x86_64",
            "SUSE Linux Enterprise Micro 5.4:kernel-source-rt-5.14.21-150400.15.124.1.noarch"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 7.8,
            "baseSeverity": "HIGH",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
            "version": "3.1"
          },
          "products": [
            "SUSE Linux Enterprise Micro 5.3:kernel-rt-5.14.21-150400.15.124.1.x86_64",
            "SUSE Linux Enterprise Micro 5.3:kernel-source-rt-5.14.21-150400.15.124.1.noarch",
            "SUSE Linux Enterprise Micro 5.4:kernel-rt-5.14.21-150400.15.124.1.x86_64",
            "SUSE Linux Enterprise Micro 5.4:kernel-source-rt-5.14.21-150400.15.124.1.noarch"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2025-07-15T14:31:46Z",
          "details": "important"
        }
      ],
      "title": "CVE-2022-50211"
    },
    {
      "cve": "CVE-2022-50212",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2022-50212"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "In the Linux kernel, the following vulnerability has been resolved:\n\nnetfilter: nf_tables: do not allow CHAIN_ID to refer to another table\n\nWhen doing lookups for chains on the same batch by using its ID, a chain\nfrom a different table can be used. If a rule is added to a table but\nrefers to a chain in a different table, it will be linked to the chain in\ntable2, but would have expressions referring to objects in table1.\n\nThen, when table1 is removed, the rule will not be removed as its linked to\na chain in table2. When expressions in the rule are processed or removed,\nthat will lead to a use-after-free.\n\nWhen looking for chains by ID, use the table that was used for the lookup\nby name, and only return chains belonging to that same table.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "SUSE Linux Enterprise Micro 5.3:kernel-rt-5.14.21-150400.15.124.1.x86_64",
          "SUSE Linux Enterprise Micro 5.3:kernel-source-rt-5.14.21-150400.15.124.1.noarch",
          "SUSE Linux Enterprise Micro 5.4:kernel-rt-5.14.21-150400.15.124.1.x86_64",
          "SUSE Linux Enterprise Micro 5.4:kernel-source-rt-5.14.21-150400.15.124.1.noarch"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2022-50212",
          "url": "https://www.suse.com/security/cve/CVE-2022-50212"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1244869 for CVE-2022-50212",
          "url": "https://bugzilla.suse.com/1244869"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "SUSE Linux Enterprise Micro 5.3:kernel-rt-5.14.21-150400.15.124.1.x86_64",
            "SUSE Linux Enterprise Micro 5.3:kernel-source-rt-5.14.21-150400.15.124.1.noarch",
            "SUSE Linux Enterprise Micro 5.4:kernel-rt-5.14.21-150400.15.124.1.x86_64",
            "SUSE Linux Enterprise Micro 5.4:kernel-source-rt-5.14.21-150400.15.124.1.noarch"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 5.5,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
            "version": "3.1"
          },
          "products": [
            "SUSE Linux Enterprise Micro 5.3:kernel-rt-5.14.21-150400.15.124.1.x86_64",
            "SUSE Linux Enterprise Micro 5.3:kernel-source-rt-5.14.21-150400.15.124.1.noarch",
            "SUSE Linux Enterprise Micro 5.4:kernel-rt-5.14.21-150400.15.124.1.x86_64",
            "SUSE Linux Enterprise Micro 5.4:kernel-source-rt-5.14.21-150400.15.124.1.noarch"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2025-07-15T14:31:46Z",
          "details": "moderate"
        }
      ],
      "title": "CVE-2022-50212"
    },
    {
      "cve": "CVE-2022-50213",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2022-50213"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "In the Linux kernel, the following vulnerability has been resolved:\n\nnetfilter: nf_tables: do not allow SET_ID to refer to another table\n\nWhen doing lookups for sets on the same batch by using its ID, a set from a\ndifferent table can be used.\n\nThen, when the table is removed, a reference to the set may be kept after\nthe set is freed, leading to a potential use-after-free.\n\nWhen looking for sets by ID, use the table that was used for the lookup by\nname, and only return sets belonging to that same table.\n\nThis fixes CVE-2022-2586, also reported as ZDI-CAN-17470.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "SUSE Linux Enterprise Micro 5.3:kernel-rt-5.14.21-150400.15.124.1.x86_64",
          "SUSE Linux Enterprise Micro 5.3:kernel-source-rt-5.14.21-150400.15.124.1.noarch",
          "SUSE Linux Enterprise Micro 5.4:kernel-rt-5.14.21-150400.15.124.1.x86_64",
          "SUSE Linux Enterprise Micro 5.4:kernel-source-rt-5.14.21-150400.15.124.1.noarch"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2022-50213",
          "url": "https://www.suse.com/security/cve/CVE-2022-50213"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1244867 for CVE-2022-50213",
          "url": "https://bugzilla.suse.com/1244867"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "SUSE Linux Enterprise Micro 5.3:kernel-rt-5.14.21-150400.15.124.1.x86_64",
            "SUSE Linux Enterprise Micro 5.3:kernel-source-rt-5.14.21-150400.15.124.1.noarch",
            "SUSE Linux Enterprise Micro 5.4:kernel-rt-5.14.21-150400.15.124.1.x86_64",
            "SUSE Linux Enterprise Micro 5.4:kernel-source-rt-5.14.21-150400.15.124.1.noarch"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 5.5,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
            "version": "3.1"
          },
          "products": [
            "SUSE Linux Enterprise Micro 5.3:kernel-rt-5.14.21-150400.15.124.1.x86_64",
            "SUSE Linux Enterprise Micro 5.3:kernel-source-rt-5.14.21-150400.15.124.1.noarch",
            "SUSE Linux Enterprise Micro 5.4:kernel-rt-5.14.21-150400.15.124.1.x86_64",
            "SUSE Linux Enterprise Micro 5.4:kernel-source-rt-5.14.21-150400.15.124.1.noarch"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2025-07-15T14:31:46Z",
          "details": "moderate"
        }
      ],
      "title": "CVE-2022-50213"
    },
    {
      "cve": "CVE-2022-50215",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2022-50215"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "In the Linux kernel, the following vulnerability has been resolved:\n\nscsi: sg: Allow waiting for commands to complete on removed device\n\nWhen a SCSI device is removed while in active use, currently sg will\nimmediately return -ENODEV on any attempt to wait for active commands that\nwere sent before the removal.  This is problematic for commands that use\nSG_FLAG_DIRECT_IO since the data buffer may still be in use by the kernel\nwhen userspace frees or reuses it after getting ENODEV, leading to\ncorrupted userspace memory (in the case of READ-type commands) or corrupted\ndata being sent to the device (in the case of WRITE-type commands).  This\nhas been seen in practice when logging out of a iscsi_tcp session, where\nthe iSCSI driver may still be processing commands after the device has been\nmarked for removal.\n\nChange the policy to allow userspace to wait for active sg commands even\nwhen the device is being removed.  Return -ENODEV only when there are no\nmore responses to read.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "SUSE Linux Enterprise Micro 5.3:kernel-rt-5.14.21-150400.15.124.1.x86_64",
          "SUSE Linux Enterprise Micro 5.3:kernel-source-rt-5.14.21-150400.15.124.1.noarch",
          "SUSE Linux Enterprise Micro 5.4:kernel-rt-5.14.21-150400.15.124.1.x86_64",
          "SUSE Linux Enterprise Micro 5.4:kernel-source-rt-5.14.21-150400.15.124.1.noarch"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2022-50215",
          "url": "https://www.suse.com/security/cve/CVE-2022-50215"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1245138 for CVE-2022-50215",
          "url": "https://bugzilla.suse.com/1245138"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "SUSE Linux Enterprise Micro 5.3:kernel-rt-5.14.21-150400.15.124.1.x86_64",
            "SUSE Linux Enterprise Micro 5.3:kernel-source-rt-5.14.21-150400.15.124.1.noarch",
            "SUSE Linux Enterprise Micro 5.4:kernel-rt-5.14.21-150400.15.124.1.x86_64",
            "SUSE Linux Enterprise Micro 5.4:kernel-source-rt-5.14.21-150400.15.124.1.noarch"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 6.1,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:H",
            "version": "3.1"
          },
          "products": [
            "SUSE Linux Enterprise Micro 5.3:kernel-rt-5.14.21-150400.15.124.1.x86_64",
            "SUSE Linux Enterprise Micro 5.3:kernel-source-rt-5.14.21-150400.15.124.1.noarch",
            "SUSE Linux Enterprise Micro 5.4:kernel-rt-5.14.21-150400.15.124.1.x86_64",
            "SUSE Linux Enterprise Micro 5.4:kernel-source-rt-5.14.21-150400.15.124.1.noarch"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2025-07-15T14:31:46Z",
          "details": "moderate"
        }
      ],
      "title": "CVE-2022-50215"
    },
    {
      "cve": "CVE-2022-50218",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2022-50218"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "In the Linux kernel, the following vulnerability has been resolved:\n\niio: light: isl29028: Fix the warning in isl29028_remove()\n\nThe driver use the non-managed form of the register function in\nisl29028_remove(). To keep the release order as mirroring the ordering\nin probe, the driver should use non-managed form in probe, too.\n\nThe following log reveals it:\n\n[   32.374955] isl29028 0-0010: remove\n[   32.376861] general protection fault, probably for non-canonical address 0xdffffc0000000006: 0000 [#1] PREEMPT SMP KASAN PTI\n[   32.377676] KASAN: null-ptr-deref in range [0x0000000000000030-0x0000000000000037]\n[   32.379432] RIP: 0010:kernfs_find_and_get_ns+0x28/0xe0\n[   32.385461] Call Trace:\n[   32.385807]  sysfs_unmerge_group+0x59/0x110\n[   32.386110]  dpm_sysfs_remove+0x58/0xc0\n[   32.386391]  device_del+0x296/0xe50\n[   32.386959]  cdev_device_del+0x1d/0xd0\n[   32.387231]  devm_iio_device_unreg+0x27/0xb0\n[   32.387542]  devres_release_group+0x319/0x3d0\n[   32.388162]  i2c_device_remove+0x93/0x1f0",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "SUSE Linux Enterprise Micro 5.3:kernel-rt-5.14.21-150400.15.124.1.x86_64",
          "SUSE Linux Enterprise Micro 5.3:kernel-source-rt-5.14.21-150400.15.124.1.noarch",
          "SUSE Linux Enterprise Micro 5.4:kernel-rt-5.14.21-150400.15.124.1.x86_64",
          "SUSE Linux Enterprise Micro 5.4:kernel-source-rt-5.14.21-150400.15.124.1.noarch"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2022-50218",
          "url": "https://www.suse.com/security/cve/CVE-2022-50218"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1244861 for CVE-2022-50218",
          "url": "https://bugzilla.suse.com/1244861"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "SUSE Linux Enterprise Micro 5.3:kernel-rt-5.14.21-150400.15.124.1.x86_64",
            "SUSE Linux Enterprise Micro 5.3:kernel-source-rt-5.14.21-150400.15.124.1.noarch",
            "SUSE Linux Enterprise Micro 5.4:kernel-rt-5.14.21-150400.15.124.1.x86_64",
            "SUSE Linux Enterprise Micro 5.4:kernel-source-rt-5.14.21-150400.15.124.1.noarch"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 5.5,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
            "version": "3.1"
          },
          "products": [
            "SUSE Linux Enterprise Micro 5.3:kernel-rt-5.14.21-150400.15.124.1.x86_64",
            "SUSE Linux Enterprise Micro 5.3:kernel-source-rt-5.14.21-150400.15.124.1.noarch",
            "SUSE Linux Enterprise Micro 5.4:kernel-rt-5.14.21-150400.15.124.1.x86_64",
            "SUSE Linux Enterprise Micro 5.4:kernel-source-rt-5.14.21-150400.15.124.1.noarch"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2025-07-15T14:31:46Z",
          "details": "moderate"
        }
      ],
      "title": "CVE-2022-50218"
    },
    {
      "cve": "CVE-2022-50220",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2022-50220"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "In the Linux kernel, the following vulnerability has been resolved:\n\nusbnet: Fix linkwatch use-after-free on disconnect\n\nusbnet uses the work usbnet_deferred_kevent() to perform tasks which may\nsleep.  On disconnect, completion of the work was originally awaited in\n-\u003endo_stop().  But in 2003, that was moved to -\u003edisconnect() by historic\ncommit \"[PATCH] USB: usbnet, prevent exotic rtnl deadlock\":\n\n  https://git.kernel.org/tglx/history/c/0f138bbfd83c\n\nThe change was made because back then, the kernel\u0027s workqueue\nimplementation did not allow waiting for a single work.  One had to wait\nfor completion of *all* work by calling flush_scheduled_work(), and that\ncould deadlock when waiting for usbnet_deferred_kevent() with rtnl_mutex\nheld in -\u003endo_stop().\n\nThe commit solved one problem but created another:  It causes a\nuse-after-free in USB Ethernet drivers aqc111.c, asix_devices.c,\nax88179_178a.c, ch9200.c and smsc75xx.c:\n\n* If the drivers receive a link change interrupt immediately before\n  disconnect, they raise EVENT_LINK_RESET in their (non-sleepable)\n  -\u003estatus() callback and schedule usbnet_deferred_kevent().\n* usbnet_deferred_kevent() invokes the driver\u0027s -\u003elink_reset() callback,\n  which calls netif_carrier_{on,off}().\n* That in turn schedules the work linkwatch_event().\n\nBecause usbnet_deferred_kevent() is awaited after unregister_netdev(),\nnetif_carrier_{on,off}() may operate on an unregistered netdev and\nlinkwatch_event() may run after free_netdev(), causing a use-after-free.\n\nIn 2010, usbnet was changed to only wait for a single instance of\nusbnet_deferred_kevent() instead of *all* work by commit 23f333a2bfaf\n(\"drivers/net: don\u0027t use flush_scheduled_work()\").\n\nUnfortunately the commit neglected to move the wait back to\n-\u003endo_stop().  Rectify that omission at long last.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "SUSE Linux Enterprise Micro 5.3:kernel-rt-5.14.21-150400.15.124.1.x86_64",
          "SUSE Linux Enterprise Micro 5.3:kernel-source-rt-5.14.21-150400.15.124.1.noarch",
          "SUSE Linux Enterprise Micro 5.4:kernel-rt-5.14.21-150400.15.124.1.x86_64",
          "SUSE Linux Enterprise Micro 5.4:kernel-source-rt-5.14.21-150400.15.124.1.noarch"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2022-50220",
          "url": "https://www.suse.com/security/cve/CVE-2022-50220"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1245348 for CVE-2022-50220",
          "url": "https://bugzilla.suse.com/1245348"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "SUSE Linux Enterprise Micro 5.3:kernel-rt-5.14.21-150400.15.124.1.x86_64",
            "SUSE Linux Enterprise Micro 5.3:kernel-source-rt-5.14.21-150400.15.124.1.noarch",
            "SUSE Linux Enterprise Micro 5.4:kernel-rt-5.14.21-150400.15.124.1.x86_64",
            "SUSE Linux Enterprise Micro 5.4:kernel-source-rt-5.14.21-150400.15.124.1.noarch"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 6.5,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:L/I:H/A:H",
            "version": "3.1"
          },
          "products": [
            "SUSE Linux Enterprise Micro 5.3:kernel-rt-5.14.21-150400.15.124.1.x86_64",
            "SUSE Linux Enterprise Micro 5.3:kernel-source-rt-5.14.21-150400.15.124.1.noarch",
            "SUSE Linux Enterprise Micro 5.4:kernel-rt-5.14.21-150400.15.124.1.x86_64",
            "SUSE Linux Enterprise Micro 5.4:kernel-source-rt-5.14.21-150400.15.124.1.noarch"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2025-07-15T14:31:46Z",
          "details": "moderate"
        }
      ],
      "title": "CVE-2022-50220"
    },
    {
      "cve": "CVE-2022-50222",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2022-50222"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "In the Linux kernel, the following vulnerability has been resolved:\n\ntty: vt: initialize unicode screen buffer\n\nsyzbot reports kernel infoleak at vcs_read() [1], for buffer can be read\nimmediately after resize operation. Initialize buffer using kzalloc().\n\n  ----------\n  #include \u003cfcntl.h\u003e\n  #include \u003cunistd.h\u003e\n  #include \u003csys/ioctl.h\u003e\n  #include \u003clinux/fb.h\u003e\n\n  int main(int argc, char *argv[])\n  {\n    struct fb_var_screeninfo var = { };\n    const int fb_fd = open(\"/dev/fb0\", 3);\n    ioctl(fb_fd, FBIOGET_VSCREENINFO, \u0026var);\n    var.yres = 0x21;\n    ioctl(fb_fd, FBIOPUT_VSCREENINFO, \u0026var);\n    return read(open(\"/dev/vcsu\", O_RDONLY), \u0026var, sizeof(var)) == -1;\n  }\n  ----------",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "SUSE Linux Enterprise Micro 5.3:kernel-rt-5.14.21-150400.15.124.1.x86_64",
          "SUSE Linux Enterprise Micro 5.3:kernel-source-rt-5.14.21-150400.15.124.1.noarch",
          "SUSE Linux Enterprise Micro 5.4:kernel-rt-5.14.21-150400.15.124.1.x86_64",
          "SUSE Linux Enterprise Micro 5.4:kernel-source-rt-5.14.21-150400.15.124.1.noarch"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2022-50222",
          "url": "https://www.suse.com/security/cve/CVE-2022-50222"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1245136 for CVE-2022-50222",
          "url": "https://bugzilla.suse.com/1245136"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "SUSE Linux Enterprise Micro 5.3:kernel-rt-5.14.21-150400.15.124.1.x86_64",
            "SUSE Linux Enterprise Micro 5.3:kernel-source-rt-5.14.21-150400.15.124.1.noarch",
            "SUSE Linux Enterprise Micro 5.4:kernel-rt-5.14.21-150400.15.124.1.x86_64",
            "SUSE Linux Enterprise Micro 5.4:kernel-source-rt-5.14.21-150400.15.124.1.noarch"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 3.3,
            "baseSeverity": "LOW",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N",
            "version": "3.1"
          },
          "products": [
            "SUSE Linux Enterprise Micro 5.3:kernel-rt-5.14.21-150400.15.124.1.x86_64",
            "SUSE Linux Enterprise Micro 5.3:kernel-source-rt-5.14.21-150400.15.124.1.noarch",
            "SUSE Linux Enterprise Micro 5.4:kernel-rt-5.14.21-150400.15.124.1.x86_64",
            "SUSE Linux Enterprise Micro 5.4:kernel-source-rt-5.14.21-150400.15.124.1.noarch"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2025-07-15T14:31:46Z",
          "details": "moderate"
        }
      ],
      "title": "CVE-2022-50222"
    },
    {
      "cve": "CVE-2022-50226",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2022-50226"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "In the Linux kernel, the following vulnerability has been resolved:\n\ncrypto: ccp - Use kzalloc for sev ioctl interfaces to prevent kernel memory leak\n\nFor some sev ioctl interfaces, input may be passed that is less than or\nequal to SEV_FW_BLOB_MAX_SIZE, but larger than the data that PSP\nfirmware returns. In this case, kmalloc will allocate memory that is the\nsize of the input rather than the size of the data. Since PSP firmware\ndoesn\u0027t fully overwrite the buffer, the sev ioctl interfaces with the\nissue may return uninitialized slab memory.\n\nCurrently, all of the ioctl interfaces in the ccp driver are safe, but\nto prevent future problems, change all ioctl interfaces that allocate\nmemory with kmalloc to use kzalloc and memset the data buffer to zero\nin sev_ioctl_do_platform_status.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "SUSE Linux Enterprise Micro 5.3:kernel-rt-5.14.21-150400.15.124.1.x86_64",
          "SUSE Linux Enterprise Micro 5.3:kernel-source-rt-5.14.21-150400.15.124.1.noarch",
          "SUSE Linux Enterprise Micro 5.4:kernel-rt-5.14.21-150400.15.124.1.x86_64",
          "SUSE Linux Enterprise Micro 5.4:kernel-source-rt-5.14.21-150400.15.124.1.noarch"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2022-50226",
          "url": "https://www.suse.com/security/cve/CVE-2022-50226"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1244860 for CVE-2022-50226",
          "url": "https://bugzilla.suse.com/1244860"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "SUSE Linux Enterprise Micro 5.3:kernel-rt-5.14.21-150400.15.124.1.x86_64",
            "SUSE Linux Enterprise Micro 5.3:kernel-source-rt-5.14.21-150400.15.124.1.noarch",
            "SUSE Linux Enterprise Micro 5.4:kernel-rt-5.14.21-150400.15.124.1.x86_64",
            "SUSE Linux Enterprise Micro 5.4:kernel-source-rt-5.14.21-150400.15.124.1.noarch"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 5.5,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
            "version": "3.1"
          },
          "products": [
            "SUSE Linux Enterprise Micro 5.3:kernel-rt-5.14.21-150400.15.124.1.x86_64",
            "SUSE Linux Enterprise Micro 5.3:kernel-source-rt-5.14.21-150400.15.124.1.noarch",
            "SUSE Linux Enterprise Micro 5.4:kernel-rt-5.14.21-150400.15.124.1.x86_64",
            "SUSE Linux Enterprise Micro 5.4:kernel-source-rt-5.14.21-150400.15.124.1.noarch"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2025-07-15T14:31:46Z",
          "details": "moderate"
        }
      ],
      "title": "CVE-2022-50226"
    },
    {
      "cve": "CVE-2022-50228",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2022-50228"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "In the Linux kernel, the following vulnerability has been resolved:\n\nKVM: SVM: Don\u0027t BUG if userspace injects an interrupt with GIF=0\n\nDon\u0027t BUG/WARN on interrupt injection due to GIF being cleared,\nsince it\u0027s trivial for userspace to force the situation via\nKVM_SET_VCPU_EVENTS (even if having at least a WARN there would be correct\nfor KVM internally generated injections).\n\n  kernel BUG at arch/x86/kvm/svm/svm.c:3386!\n  invalid opcode: 0000 [#1] SMP\n  CPU: 15 PID: 926 Comm: smm_test Not tainted 5.17.0-rc3+ #264\n  Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 0.0.0 02/06/2015\n  RIP: 0010:svm_inject_irq+0xab/0xb0 [kvm_amd]\n  Code: \u003c0f\u003e 0b 0f 1f 00 0f 1f 44 00 00 80 3d ac b3 01 00 00 55 48 89 f5 53\n  RSP: 0018:ffffc90000b37d88 EFLAGS: 00010246\n  RAX: 0000000000000000 RBX: ffff88810a234ac0 RCX: 0000000000000006\n  RDX: 0000000000000000 RSI: ffffc90000b37df7 RDI: ffff88810a234ac0\n  RBP: ffffc90000b37df7 R08: ffff88810a1fa410 R09: 0000000000000000\n  R10: 0000000000000000 R11: 0000000000000000 R12: 0000000000000000\n  R13: ffff888109571000 R14: ffff88810a234ac0 R15: 0000000000000000\n  FS:  0000000001821380(0000) GS:ffff88846fdc0000(0000) knlGS:0000000000000000\n  CS:  0010 DS: 0000 ES: 0000 CR0: 0000000080050033\n  CR2: 00007f74fc550008 CR3: 000000010a6fe000 CR4: 0000000000350ea0\n  Call Trace:\n   \u003cTASK\u003e\n   inject_pending_event+0x2f7/0x4c0 [kvm]\n   kvm_arch_vcpu_ioctl_run+0x791/0x17a0 [kvm]\n   kvm_vcpu_ioctl+0x26d/0x650 [kvm]\n   __x64_sys_ioctl+0x82/0xb0\n   do_syscall_64+0x3b/0xc0\n   entry_SYSCALL_64_after_hwframe+0x44/0xae\n   \u003c/TASK\u003e",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "SUSE Linux Enterprise Micro 5.3:kernel-rt-5.14.21-150400.15.124.1.x86_64",
          "SUSE Linux Enterprise Micro 5.3:kernel-source-rt-5.14.21-150400.15.124.1.noarch",
          "SUSE Linux Enterprise Micro 5.4:kernel-rt-5.14.21-150400.15.124.1.x86_64",
          "SUSE Linux Enterprise Micro 5.4:kernel-source-rt-5.14.21-150400.15.124.1.noarch"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2022-50228",
          "url": "https://www.suse.com/security/cve/CVE-2022-50228"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1244854 for CVE-2022-50228",
          "url": "https://bugzilla.suse.com/1244854"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "SUSE Linux Enterprise Micro 5.3:kernel-rt-5.14.21-150400.15.124.1.x86_64",
            "SUSE Linux Enterprise Micro 5.3:kernel-source-rt-5.14.21-150400.15.124.1.noarch",
            "SUSE Linux Enterprise Micro 5.4:kernel-rt-5.14.21-150400.15.124.1.x86_64",
            "SUSE Linux Enterprise Micro 5.4:kernel-source-rt-5.14.21-150400.15.124.1.noarch"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 5.5,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
            "version": "3.1"
          },
          "products": [
            "SUSE Linux Enterprise Micro 5.3:kernel-rt-5.14.21-150400.15.124.1.x86_64",
            "SUSE Linux Enterprise Micro 5.3:kernel-source-rt-5.14.21-150400.15.124.1.noarch",
            "SUSE Linux Enterprise Micro 5.4:kernel-rt-5.14.21-150400.15.124.1.x86_64",
            "SUSE Linux Enterprise Micro 5.4:kernel-source-rt-5.14.21-150400.15.124.1.noarch"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2025-07-15T14:31:46Z",
          "details": "moderate"
        }
      ],
      "title": "CVE-2022-50228"
    },
    {
      "cve": "CVE-2022-50229",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2022-50229"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "In the Linux kernel, the following vulnerability has been resolved:\n\nALSA: bcd2000: Fix a UAF bug on the error path of probing\n\nWhen the driver fails in snd_card_register() at probe time, it will free\nthe \u0027bcd2k-\u003emidi_out_urb\u0027 before killing it, which may cause a UAF bug.\n\nThe following log can reveal it:\n\n[   50.727020] BUG: KASAN: use-after-free in bcd2000_input_complete+0x1f1/0x2e0 [snd_bcd2000]\n[   50.727623] Read of size 8 at addr ffff88810fab0e88 by task swapper/4/0\n[   50.729530] Call Trace:\n[   50.732899]  bcd2000_input_complete+0x1f1/0x2e0 [snd_bcd2000]\n\nFix this by adding usb_kill_urb() before usb_free_urb().",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "SUSE Linux Enterprise Micro 5.3:kernel-rt-5.14.21-150400.15.124.1.x86_64",
          "SUSE Linux Enterprise Micro 5.3:kernel-source-rt-5.14.21-150400.15.124.1.noarch",
          "SUSE Linux Enterprise Micro 5.4:kernel-rt-5.14.21-150400.15.124.1.x86_64",
          "SUSE Linux Enterprise Micro 5.4:kernel-source-rt-5.14.21-150400.15.124.1.noarch"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2022-50229",
          "url": "https://www.suse.com/security/cve/CVE-2022-50229"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1244856 for CVE-2022-50229",
          "url": "https://bugzilla.suse.com/1244856"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "SUSE Linux Enterprise Micro 5.3:kernel-rt-5.14.21-150400.15.124.1.x86_64",
            "SUSE Linux Enterprise Micro 5.3:kernel-source-rt-5.14.21-150400.15.124.1.noarch",
            "SUSE Linux Enterprise Micro 5.4:kernel-rt-5.14.21-150400.15.124.1.x86_64",
            "SUSE Linux Enterprise Micro 5.4:kernel-source-rt-5.14.21-150400.15.124.1.noarch"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 5.5,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
            "version": "3.1"
          },
          "products": [
            "SUSE Linux Enterprise Micro 5.3:kernel-rt-5.14.21-150400.15.124.1.x86_64",
            "SUSE Linux Enterprise Micro 5.3:kernel-source-rt-5.14.21-150400.15.124.1.noarch",
            "SUSE Linux Enterprise Micro 5.4:kernel-rt-5.14.21-150400.15.124.1.x86_64",
            "SUSE Linux Enterprise Micro 5.4:kernel-source-rt-5.14.21-150400.15.124.1.noarch"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2025-07-15T14:31:46Z",
          "details": "moderate"
        }
      ],
      "title": "CVE-2022-50229"
    },
    {
      "cve": "CVE-2022-50231",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2022-50231"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "In the Linux kernel, the following vulnerability has been resolved:\n\ncrypto: arm64/poly1305 - fix a read out-of-bound\n\nA kasan error was reported during fuzzing:\n\nBUG: KASAN: slab-out-of-bounds in neon_poly1305_blocks.constprop.0+0x1b4/0x250 [poly1305_neon]\nRead of size 4 at addr ffff0010e293f010 by task syz-executor.5/1646715\nCPU: 4 PID: 1646715 Comm: syz-executor.5 Kdump: loaded Not tainted 5.10.0.aarch64 #1\nHardware name: Huawei TaiShan 2280 /BC11SPCD, BIOS 1.59 01/31/2019\nCall trace:\n dump_backtrace+0x0/0x394\n show_stack+0x34/0x4c arch/arm64/kernel/stacktrace.c:196\n __dump_stack lib/dump_stack.c:77 [inline]\n dump_stack+0x158/0x1e4 lib/dump_stack.c:118\n print_address_description.constprop.0+0x68/0x204 mm/kasan/report.c:387\n __kasan_report+0xe0/0x140 mm/kasan/report.c:547\n kasan_report+0x44/0xe0 mm/kasan/report.c:564\n check_memory_region_inline mm/kasan/generic.c:187 [inline]\n __asan_load4+0x94/0xd0 mm/kasan/generic.c:252\n neon_poly1305_blocks.constprop.0+0x1b4/0x250 [poly1305_neon]\n neon_poly1305_do_update+0x6c/0x15c [poly1305_neon]\n neon_poly1305_update+0x9c/0x1c4 [poly1305_neon]\n crypto_shash_update crypto/shash.c:131 [inline]\n shash_finup_unaligned+0x84/0x15c crypto/shash.c:179\n crypto_shash_finup+0x8c/0x140 crypto/shash.c:193\n shash_digest_unaligned+0xb8/0xe4 crypto/shash.c:201\n crypto_shash_digest+0xa4/0xfc crypto/shash.c:217\n crypto_shash_tfm_digest+0xb4/0x150 crypto/shash.c:229\n essiv_skcipher_setkey+0x164/0x200 [essiv]\n crypto_skcipher_setkey+0xb0/0x160 crypto/skcipher.c:612\n skcipher_setkey+0x3c/0x50 crypto/algif_skcipher.c:305\n alg_setkey+0x114/0x2a0 crypto/af_alg.c:220\n alg_setsockopt+0x19c/0x210 crypto/af_alg.c:253\n __sys_setsockopt+0x190/0x2e0 net/socket.c:2123\n __do_sys_setsockopt net/socket.c:2134 [inline]\n __se_sys_setsockopt net/socket.c:2131 [inline]\n __arm64_sys_setsockopt+0x78/0x94 net/socket.c:2131\n __invoke_syscall arch/arm64/kernel/syscall.c:36 [inline]\n invoke_syscall+0x64/0x100 arch/arm64/kernel/syscall.c:48\n el0_svc_common.constprop.0+0x220/0x230 arch/arm64/kernel/syscall.c:155\n do_el0_svc+0xb4/0xd4 arch/arm64/kernel/syscall.c:217\n el0_svc+0x24/0x3c arch/arm64/kernel/entry-common.c:353\n el0_sync_handler+0x160/0x164 arch/arm64/kernel/entry-common.c:369\n el0_sync+0x160/0x180 arch/arm64/kernel/entry.S:683\n\nThis error can be reproduced by the following code compiled as ko on a\nsystem with kasan enabled:\n\n#include \u003clinux/module.h\u003e\n#include \u003clinux/crypto.h\u003e\n#include \u003ccrypto/hash.h\u003e\n#include \u003ccrypto/poly1305.h\u003e\n\nchar test_data[] = \"\\x00\\x01\\x02\\x03\\x04\\x05\\x06\\x07\"\n                   \"\\x08\\x09\\x0a\\x0b\\x0c\\x0d\\x0e\\x0f\"\n                   \"\\x10\\x11\\x12\\x13\\x14\\x15\\x16\\x17\"\n                   \"\\x18\\x19\\x1a\\x1b\\x1c\\x1d\\x1e\";\n\nint init(void)\n{\n        struct crypto_shash *tfm = NULL;\n        char *data = NULL, *out = NULL;\n\n        tfm = crypto_alloc_shash(\"poly1305\", 0, 0);\n        data = kmalloc(POLY1305_KEY_SIZE - 1, GFP_KERNEL);\n        out = kmalloc(POLY1305_DIGEST_SIZE, GFP_KERNEL);\n        memcpy(data, test_data, POLY1305_KEY_SIZE - 1);\n        crypto_shash_tfm_digest(tfm, data, POLY1305_KEY_SIZE - 1, out);\n\n        kfree(data);\n        kfree(out);\n        return 0;\n}\n\nvoid deinit(void)\n{\n}\n\nmodule_init(init)\nmodule_exit(deinit)\nMODULE_LICENSE(\"GPL\");\n\nThe root cause of the bug sits in neon_poly1305_blocks. The logic\nneon_poly1305_blocks() performed is that if it was called with both s[]\nand r[] uninitialized, it will first try to initialize them with the\ndata from the first \"block\" that it believed to be 32 bytes in length.\nFirst 16 bytes are used as the key and the next 16 bytes for s[]. This\nwould lead to the aforementioned read out-of-bound. However, after\ncalling poly1305_init_arch(), only 16 bytes were deducted from the input\nand s[] is initialized yet again with the following 16 bytes. The second\ninitialization of s[] is certainly redundent which indicates that the\nfirst initialization should be for r[] only.\n\nThis patch fixes the issue by calling poly1305_init_arm64() instead o\n---truncated---",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "SUSE Linux Enterprise Micro 5.3:kernel-rt-5.14.21-150400.15.124.1.x86_64",
          "SUSE Linux Enterprise Micro 5.3:kernel-source-rt-5.14.21-150400.15.124.1.noarch",
          "SUSE Linux Enterprise Micro 5.4:kernel-rt-5.14.21-150400.15.124.1.x86_64",
          "SUSE Linux Enterprise Micro 5.4:kernel-source-rt-5.14.21-150400.15.124.1.noarch"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2022-50231",
          "url": "https://www.suse.com/security/cve/CVE-2022-50231"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1244853 for CVE-2022-50231",
          "url": "https://bugzilla.suse.com/1244853"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "SUSE Linux Enterprise Micro 5.3:kernel-rt-5.14.21-150400.15.124.1.x86_64",
            "SUSE Linux Enterprise Micro 5.3:kernel-source-rt-5.14.21-150400.15.124.1.noarch",
            "SUSE Linux Enterprise Micro 5.4:kernel-rt-5.14.21-150400.15.124.1.x86_64",
            "SUSE Linux Enterprise Micro 5.4:kernel-source-rt-5.14.21-150400.15.124.1.noarch"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 5.5,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
            "version": "3.1"
          },
          "products": [
            "SUSE Linux Enterprise Micro 5.3:kernel-rt-5.14.21-150400.15.124.1.x86_64",
            "SUSE Linux Enterprise Micro 5.3:kernel-source-rt-5.14.21-150400.15.124.1.noarch",
            "SUSE Linux Enterprise Micro 5.4:kernel-rt-5.14.21-150400.15.124.1.x86_64",
            "SUSE Linux Enterprise Micro 5.4:kernel-source-rt-5.14.21-150400.15.124.1.noarch"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2025-07-15T14:31:46Z",
          "details": "moderate"
        }
      ],
      "title": "CVE-2022-50231"
    },
    {
      "cve": "CVE-2023-3111",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2023-3111"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "A use after free vulnerability was found in prepare_to_relocate in fs/btrfs/relocation.c in btrfs in the Linux Kernel. This possible flaw can be triggered by calling btrfs_ioctl_balance() before calling btrfs_ioctl_defrag().",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "SUSE Linux Enterprise Micro 5.3:kernel-rt-5.14.21-150400.15.124.1.x86_64",
          "SUSE Linux Enterprise Micro 5.3:kernel-source-rt-5.14.21-150400.15.124.1.noarch",
          "SUSE Linux Enterprise Micro 5.4:kernel-rt-5.14.21-150400.15.124.1.x86_64",
          "SUSE Linux Enterprise Micro 5.4:kernel-source-rt-5.14.21-150400.15.124.1.noarch"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2023-3111",
          "url": "https://www.suse.com/security/cve/CVE-2023-3111"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1212051 for CVE-2023-3111",
          "url": "https://bugzilla.suse.com/1212051"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1220015 for CVE-2023-3111",
          "url": "https://bugzilla.suse.com/1220015"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "SUSE Linux Enterprise Micro 5.3:kernel-rt-5.14.21-150400.15.124.1.x86_64",
            "SUSE Linux Enterprise Micro 5.3:kernel-source-rt-5.14.21-150400.15.124.1.noarch",
            "SUSE Linux Enterprise Micro 5.4:kernel-rt-5.14.21-150400.15.124.1.x86_64",
            "SUSE Linux Enterprise Micro 5.4:kernel-source-rt-5.14.21-150400.15.124.1.noarch"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 6.7,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H",
            "version": "3.1"
          },
          "products": [
            "SUSE Linux Enterprise Micro 5.3:kernel-rt-5.14.21-150400.15.124.1.x86_64",
            "SUSE Linux Enterprise Micro 5.3:kernel-source-rt-5.14.21-150400.15.124.1.noarch",
            "SUSE Linux Enterprise Micro 5.4:kernel-rt-5.14.21-150400.15.124.1.x86_64",
            "SUSE Linux Enterprise Micro 5.4:kernel-source-rt-5.14.21-150400.15.124.1.noarch"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2025-07-15T14:31:46Z",
          "details": "moderate"
        }
      ],
      "title": "CVE-2023-3111"
    },
    {
      "cve": "CVE-2023-52924",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2023-52924"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "In the Linux kernel, the following vulnerability has been resolved:\n\nnetfilter: nf_tables: don\u0027t skip expired elements during walk\n\nThere is an asymmetry between commit/abort and preparation phase if the\nfollowing conditions are met:\n\n1. set is a verdict map (\"1.2.3.4 : jump foo\")\n2. timeouts are enabled\n\nIn this case, following sequence is problematic:\n\n1. element E in set S refers to chain C\n2. userspace requests removal of set S\n3. kernel does a set walk to decrement chain-\u003euse count for all elements\n   from preparation phase\n4. kernel does another set walk to remove elements from the commit phase\n   (or another walk to do a chain-\u003euse increment for all elements from\n    abort phase)\n\nIf E has already expired in 1), it will be ignored during list walk, so its use count\nwon\u0027t have been changed.\n\nThen, when set is culled, -\u003edestroy callback will zap the element via\nnf_tables_set_elem_destroy(), but this function is only safe for\nelements that have been deactivated earlier from the preparation phase:\nlack of earlier deactivate removes the element but leaks the chain use\ncount, which results in a WARN splat when the chain gets removed later,\nplus a leak of the nft_chain structure.\n\nUpdate pipapo_get() not to skip expired elements, otherwise flush\ncommand reports bogus ENOENT errors.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "SUSE Linux Enterprise Micro 5.3:kernel-rt-5.14.21-150400.15.124.1.x86_64",
          "SUSE Linux Enterprise Micro 5.3:kernel-source-rt-5.14.21-150400.15.124.1.noarch",
          "SUSE Linux Enterprise Micro 5.4:kernel-rt-5.14.21-150400.15.124.1.x86_64",
          "SUSE Linux Enterprise Micro 5.4:kernel-source-rt-5.14.21-150400.15.124.1.noarch"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2023-52924",
          "url": "https://www.suse.com/security/cve/CVE-2023-52924"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1236821 for CVE-2023-52924",
          "url": "https://bugzilla.suse.com/1236821"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1244630 for CVE-2023-52924",
          "url": "https://bugzilla.suse.com/1244630"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "SUSE Linux Enterprise Micro 5.3:kernel-rt-5.14.21-150400.15.124.1.x86_64",
            "SUSE Linux Enterprise Micro 5.3:kernel-source-rt-5.14.21-150400.15.124.1.noarch",
            "SUSE Linux Enterprise Micro 5.4:kernel-rt-5.14.21-150400.15.124.1.x86_64",
            "SUSE Linux Enterprise Micro 5.4:kernel-source-rt-5.14.21-150400.15.124.1.noarch"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 7.8,
            "baseSeverity": "HIGH",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
            "version": "3.1"
          },
          "products": [
            "SUSE Linux Enterprise Micro 5.3:kernel-rt-5.14.21-150400.15.124.1.x86_64",
            "SUSE Linux Enterprise Micro 5.3:kernel-source-rt-5.14.21-150400.15.124.1.noarch",
            "SUSE Linux Enterprise Micro 5.4:kernel-rt-5.14.21-150400.15.124.1.x86_64",
            "SUSE Linux Enterprise Micro 5.4:kernel-source-rt-5.14.21-150400.15.124.1.noarch"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2025-07-15T14:31:46Z",
          "details": "important"
        }
      ],
      "title": "CVE-2023-52924"
    },
    {
      "cve": "CVE-2023-52925",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2023-52925"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "In the Linux kernel, the following vulnerability has been resolved:\n\nnetfilter: nf_tables: don\u0027t fail inserts if duplicate has expired\n\nnftables selftests fail:\nrun-tests.sh testcases/sets/0044interval_overlap_0\nExpected: 0-2 . 0-3, got:\nW: [FAILED]     ./testcases/sets/0044interval_overlap_0: got 1\n\nInsertion must ignore duplicate but expired entries.\n\nMoreover, there is a strange asymmetry in nft_pipapo_activate:\n\nIt refetches the current element, whereas the other -\u003eactivate callbacks\n(bitmap, hash, rhash, rbtree) use elem-\u003epriv.\nSame for .remove: other set implementations take elem-\u003epriv,\nnft_pipapo_remove fetches elem-\u003epriv, then does a relookup,\nremove this.\n\nI suspect this was the reason for the change that prompted the\nremoval of the expired check in pipapo_get() in the first place,\nbut skipping exired elements there makes no sense to me, this helper\nis used for normal get requests, insertions (duplicate check)\nand deactivate callback.\n\nIn first two cases expired elements must be skipped.\n\nFor -\u003edeactivate(), this gets called for DELSETELEM, so it\nseems to me that expired elements should be skipped as well, i.e.\ndelete request should fail with -ENOENT error.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "SUSE Linux Enterprise Micro 5.3:kernel-rt-5.14.21-150400.15.124.1.x86_64",
          "SUSE Linux Enterprise Micro 5.3:kernel-source-rt-5.14.21-150400.15.124.1.noarch",
          "SUSE Linux Enterprise Micro 5.4:kernel-rt-5.14.21-150400.15.124.1.x86_64",
          "SUSE Linux Enterprise Micro 5.4:kernel-source-rt-5.14.21-150400.15.124.1.noarch"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2023-52925",
          "url": "https://www.suse.com/security/cve/CVE-2023-52925"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1236822 for CVE-2023-52925",
          "url": "https://bugzilla.suse.com/1236822"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "SUSE Linux Enterprise Micro 5.3:kernel-rt-5.14.21-150400.15.124.1.x86_64",
            "SUSE Linux Enterprise Micro 5.3:kernel-source-rt-5.14.21-150400.15.124.1.noarch",
            "SUSE Linux Enterprise Micro 5.4:kernel-rt-5.14.21-150400.15.124.1.x86_64",
            "SUSE Linux Enterprise Micro 5.4:kernel-source-rt-5.14.21-150400.15.124.1.noarch"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 7.8,
            "baseSeverity": "HIGH",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
            "version": "3.1"
          },
          "products": [
            "SUSE Linux Enterprise Micro 5.3:kernel-rt-5.14.21-150400.15.124.1.x86_64",
            "SUSE Linux Enterprise Micro 5.3:kernel-source-rt-5.14.21-150400.15.124.1.noarch",
            "SUSE Linux Enterprise Micro 5.4:kernel-rt-5.14.21-150400.15.124.1.x86_64",
            "SUSE Linux Enterprise Micro 5.4:kernel-source-rt-5.14.21-150400.15.124.1.noarch"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2025-07-15T14:31:46Z",
          "details": "important"
        }
      ],
      "title": "CVE-2023-52925"
    },
    {
      "cve": "CVE-2023-53048",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2023-53048"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "In the Linux kernel, the following vulnerability has been resolved:\n\nusb: typec: tcpm: fix warning when handle discover_identity message\n\nSince both source and sink device can send discover_identity message in\nPD3, kernel may dump below warning:\n\n------------[ cut here ]------------\nWARNING: CPU: 0 PID: 169 at drivers/usb/typec/tcpm/tcpm.c:1446 tcpm_queue_vdm+0xe0/0xf0\nModules linked in:\nCPU: 0 PID: 169 Comm: 1-0050 Not tainted 6.1.1-00038-g6a3c36cf1da2-dirty #567\nHardware name: NXP i.MX8MPlus EVK board (DT)\npstate: 20000005 (nzCv daif -PAN -UAO -TCO -DIT -SSBS BTYPE=--)\npc : tcpm_queue_vdm+0xe0/0xf0\nlr : tcpm_queue_vdm+0x2c/0xf0\nsp : ffff80000c19bcd0\nx29: ffff80000c19bcd0 x28: 0000000000000001 x27: ffff0000d11c8ab8\nx26: ffff0000d11cc000 x25: 0000000000000000 x24: 00000000ff008081\nx23: 0000000000000001 x22: 00000000ff00a081 x21: ffff80000c19bdbc\nx20: 0000000000000000 x19: ffff0000d11c8080 x18: ffffffffffffffff\nx17: 0000000000000000 x16: 0000000000000000 x15: ffff0000d716f580\nx14: 0000000000000001 x13: ffff0000d716f507 x12: 0000000000000001\nx11: 0000000000000000 x10: 0000000000000020 x9 : 00000000000ee098\nx8 : 00000000ffffffff x7 : 000000000000001c x6 : ffff0000d716f580\nx5 : 0000000000000000 x4 : 0000000000000000 x3 : 0000000000000000\nx2 : ffff80000c19bdbc x1 : 00000000ff00a081 x0 : 0000000000000004\nCall trace:\ntcpm_queue_vdm+0xe0/0xf0\ntcpm_pd_rx_handler+0x340/0x1ab0\nkthread_worker_fn+0xcc/0x18c\nkthread+0x10c/0x110\nret_from_fork+0x10/0x20\n---[ end trace 0000000000000000 ]---\n\nBelow sequences may trigger this warning:\n\ntcpm_send_discover_work(work)\n  tcpm_send_vdm(port, USB_SID_PD, CMD_DISCOVER_IDENT, NULL, 0);\n   tcpm_queue_vdm(port, header, data, count);\n    port-\u003evdm_state = VDM_STATE_READY;\n\nvdm_state_machine_work(work);\n\t\t\t\u003c-- received discover_identity from partner\n vdm_run_state_machine(port);\n  port-\u003evdm_state = VDM_STATE_SEND_MESSAGE;\n   mod_vdm_delayed_work(port, x);\n\ntcpm_pd_rx_handler(work);\n tcpm_pd_data_request(port, msg);\n  tcpm_handle_vdm_request(port, msg-\u003epayload, cnt);\n   tcpm_queue_vdm(port, response[0], \u0026response[1], rlen - 1);\n--\u003e WARN_ON(port-\u003evdm_state \u003e VDM_STATE_DONE);\n\nFor this case, the state machine could still send out discover\nidentity message later if we skip current discover_identity message.\nSo we should handle the received message firstly and override the pending\ndiscover_identity message without warning in this case. Then, a delayed\nsend_discover work will send discover_identity message again.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "SUSE Linux Enterprise Micro 5.3:kernel-rt-5.14.21-150400.15.124.1.x86_64",
          "SUSE Linux Enterprise Micro 5.3:kernel-source-rt-5.14.21-150400.15.124.1.noarch",
          "SUSE Linux Enterprise Micro 5.4:kernel-rt-5.14.21-150400.15.124.1.x86_64",
          "SUSE Linux Enterprise Micro 5.4:kernel-source-rt-5.14.21-150400.15.124.1.noarch"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2023-53048",
          "url": "https://www.suse.com/security/cve/CVE-2023-53048"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1244179 for CVE-2023-53048",
          "url": "https://bugzilla.suse.com/1244179"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "SUSE Linux Enterprise Micro 5.3:kernel-rt-5.14.21-150400.15.124.1.x86_64",
            "SUSE Linux Enterprise Micro 5.3:kernel-source-rt-5.14.21-150400.15.124.1.noarch",
            "SUSE Linux Enterprise Micro 5.4:kernel-rt-5.14.21-150400.15.124.1.x86_64",
            "SUSE Linux Enterprise Micro 5.4:kernel-source-rt-5.14.21-150400.15.124.1.noarch"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 5.5,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
            "version": "3.1"
          },
          "products": [
            "SUSE Linux Enterprise Micro 5.3:kernel-rt-5.14.21-150400.15.124.1.x86_64",
            "SUSE Linux Enterprise Micro 5.3:kernel-source-rt-5.14.21-150400.15.124.1.noarch",
            "SUSE Linux Enterprise Micro 5.4:kernel-rt-5.14.21-150400.15.124.1.x86_64",
            "SUSE Linux Enterprise Micro 5.4:kernel-source-rt-5.14.21-150400.15.124.1.noarch"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2025-07-15T14:31:46Z",
          "details": "moderate"
        }
      ],
      "title": "CVE-2023-53048"
    },
    {
      "cve": "CVE-2023-53076",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2023-53076"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "This CVE ID has been rejected or withdrawn by its CVE Numbering Authority.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "SUSE Linux Enterprise Micro 5.3:kernel-rt-5.14.21-150400.15.124.1.x86_64",
          "SUSE Linux Enterprise Micro 5.3:kernel-source-rt-5.14.21-150400.15.124.1.noarch",
          "SUSE Linux Enterprise Micro 5.4:kernel-rt-5.14.21-150400.15.124.1.x86_64",
          "SUSE Linux Enterprise Micro 5.4:kernel-source-rt-5.14.21-150400.15.124.1.noarch"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2023-53076",
          "url": "https://www.suse.com/security/cve/CVE-2023-53076"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1242221 for CVE-2023-53076",
          "url": "https://bugzilla.suse.com/1242221"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "SUSE Linux Enterprise Micro 5.3:kernel-rt-5.14.21-150400.15.124.1.x86_64",
            "SUSE Linux Enterprise Micro 5.3:kernel-source-rt-5.14.21-150400.15.124.1.noarch",
            "SUSE Linux Enterprise Micro 5.4:kernel-rt-5.14.21-150400.15.124.1.x86_64",
            "SUSE Linux Enterprise Micro 5.4:kernel-source-rt-5.14.21-150400.15.124.1.noarch"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 5.5,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
            "version": "3.1"
          },
          "products": [
            "SUSE Linux Enterprise Micro 5.3:kernel-rt-5.14.21-150400.15.124.1.x86_64",
            "SUSE Linux Enterprise Micro 5.3:kernel-source-rt-5.14.21-150400.15.124.1.noarch",
            "SUSE Linux Enterprise Micro 5.4:kernel-rt-5.14.21-150400.15.124.1.x86_64",
            "SUSE Linux Enterprise Micro 5.4:kernel-source-rt-5.14.21-150400.15.124.1.noarch"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2025-07-15T14:31:46Z",
          "details": "moderate"
        }
      ],
      "title": "CVE-2023-53076"
    },
    {
      "cve": "CVE-2023-53097",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2023-53097"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "In the Linux kernel, the following vulnerability has been resolved:\n\npowerpc/iommu: fix memory leak with using debugfs_lookup()\n\nWhen calling debugfs_lookup() the result must have dput() called on it,\notherwise the memory will leak over time.  To make things simpler, just\ncall debugfs_lookup_and_remove() instead which handles all of the logic\nat once.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "SUSE Linux Enterprise Micro 5.3:kernel-rt-5.14.21-150400.15.124.1.x86_64",
          "SUSE Linux Enterprise Micro 5.3:kernel-source-rt-5.14.21-150400.15.124.1.noarch",
          "SUSE Linux Enterprise Micro 5.4:kernel-rt-5.14.21-150400.15.124.1.x86_64",
          "SUSE Linux Enterprise Micro 5.4:kernel-source-rt-5.14.21-150400.15.124.1.noarch"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2023-53097",
          "url": "https://www.suse.com/security/cve/CVE-2023-53097"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1244114 for CVE-2023-53097",
          "url": "https://bugzilla.suse.com/1244114"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "SUSE Linux Enterprise Micro 5.3:kernel-rt-5.14.21-150400.15.124.1.x86_64",
            "SUSE Linux Enterprise Micro 5.3:kernel-source-rt-5.14.21-150400.15.124.1.noarch",
            "SUSE Linux Enterprise Micro 5.4:kernel-rt-5.14.21-150400.15.124.1.x86_64",
            "SUSE Linux Enterprise Micro 5.4:kernel-source-rt-5.14.21-150400.15.124.1.noarch"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 5.5,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
            "version": "3.1"
          },
          "products": [
            "SUSE Linux Enterprise Micro 5.3:kernel-rt-5.14.21-150400.15.124.1.x86_64",
            "SUSE Linux Enterprise Micro 5.3:kernel-source-rt-5.14.21-150400.15.124.1.noarch",
            "SUSE Linux Enterprise Micro 5.4:kernel-rt-5.14.21-150400.15.124.1.x86_64",
            "SUSE Linux Enterprise Micro 5.4:kernel-source-rt-5.14.21-150400.15.124.1.noarch"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2025-07-15T14:31:46Z",
          "details": "moderate"
        }
      ],
      "title": "CVE-2023-53097"
    },
    {
      "cve": "CVE-2024-26808",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2024-26808"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "In the Linux kernel, the following vulnerability has been resolved:\n\nnetfilter: nft_chain_filter: handle NETDEV_UNREGISTER for inet/ingress basechain\n\nRemove netdevice from inet/ingress basechain in case NETDEV_UNREGISTER\nevent is reported, otherwise a stale reference to netdevice remains in\nthe hook list.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "SUSE Linux Enterprise Micro 5.3:kernel-rt-5.14.21-150400.15.124.1.x86_64",
          "SUSE Linux Enterprise Micro 5.3:kernel-source-rt-5.14.21-150400.15.124.1.noarch",
          "SUSE Linux Enterprise Micro 5.4:kernel-rt-5.14.21-150400.15.124.1.x86_64",
          "SUSE Linux Enterprise Micro 5.4:kernel-source-rt-5.14.21-150400.15.124.1.noarch"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2024-26808",
          "url": "https://www.suse.com/security/cve/CVE-2024-26808"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1222634 for CVE-2024-26808",
          "url": "https://bugzilla.suse.com/1222634"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "SUSE Linux Enterprise Micro 5.3:kernel-rt-5.14.21-150400.15.124.1.x86_64",
            "SUSE Linux Enterprise Micro 5.3:kernel-source-rt-5.14.21-150400.15.124.1.noarch",
            "SUSE Linux Enterprise Micro 5.4:kernel-rt-5.14.21-150400.15.124.1.x86_64",
            "SUSE Linux Enterprise Micro 5.4:kernel-source-rt-5.14.21-150400.15.124.1.noarch"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 7.8,
            "baseSeverity": "HIGH",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
            "version": "3.1"
          },
          "products": [
            "SUSE Linux Enterprise Micro 5.3:kernel-rt-5.14.21-150400.15.124.1.x86_64",
            "SUSE Linux Enterprise Micro 5.3:kernel-source-rt-5.14.21-150400.15.124.1.noarch",
            "SUSE Linux Enterprise Micro 5.4:kernel-rt-5.14.21-150400.15.124.1.x86_64",
            "SUSE Linux Enterprise Micro 5.4:kernel-source-rt-5.14.21-150400.15.124.1.noarch"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2025-07-15T14:31:46Z",
          "details": "important"
        }
      ],
      "title": "CVE-2024-26808"
    },
    {
      "cve": "CVE-2024-26924",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2024-26924"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "In the Linux kernel, the following vulnerability has been resolved:\n\nnetfilter: nft_set_pipapo: do not free live element\n\nPablo reports a crash with large batches of elements with a\nback-to-back add/remove pattern.  Quoting Pablo:\n\n  add_elem(\"00000000\") timeout 100 ms\n  ...\n  add_elem(\"0000000X\") timeout 100 ms\n  del_elem(\"0000000X\") \u003c---------------- delete one that was just added\n  ...\n  add_elem(\"00005000\") timeout 100 ms\n\n  1) nft_pipapo_remove() removes element 0000000X\n  Then, KASAN shows a splat.\n\nLooking at the remove function there is a chance that we will drop a\nrule that maps to a non-deactivated element.\n\nRemoval happens in two steps, first we do a lookup for key k and return the\nto-be-removed element and mark it as inactive in the next generation.\nThen, in a second step, the element gets removed from the set/map.\n\nThe _remove function does not work correctly if we have more than one\nelement that share the same key.\n\nThis can happen if we insert an element into a set when the set already\nholds an element with same key, but the element mapping to the existing\nkey has timed out or is not active in the next generation.\n\nIn such case its possible that removal will unmap the wrong element.\nIf this happens, we will leak the non-deactivated element, it becomes\nunreachable.\n\nThe element that got deactivated (and will be freed later) will\nremain reachable in the set data structure, this can result in\na crash when such an element is retrieved during lookup (stale\npointer).\n\nAdd a check that the fully matching key does in fact map to the element\nthat we have marked as inactive in the deactivation step.\nIf not, we need to continue searching.\n\nAdd a bug/warn trap at the end of the function as well, the remove\nfunction must not ever be called with an invisible/unreachable/non-existent\nelement.\n\nv2: avoid uneeded temporary variable (Stefano)",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "SUSE Linux Enterprise Micro 5.3:kernel-rt-5.14.21-150400.15.124.1.x86_64",
          "SUSE Linux Enterprise Micro 5.3:kernel-source-rt-5.14.21-150400.15.124.1.noarch",
          "SUSE Linux Enterprise Micro 5.4:kernel-rt-5.14.21-150400.15.124.1.x86_64",
          "SUSE Linux Enterprise Micro 5.4:kernel-source-rt-5.14.21-150400.15.124.1.noarch"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2024-26924",
          "url": "https://www.suse.com/security/cve/CVE-2024-26924"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1223387 for CVE-2024-26924",
          "url": "https://bugzilla.suse.com/1223387"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "SUSE Linux Enterprise Micro 5.3:kernel-rt-5.14.21-150400.15.124.1.x86_64",
            "SUSE Linux Enterprise Micro 5.3:kernel-source-rt-5.14.21-150400.15.124.1.noarch",
            "SUSE Linux Enterprise Micro 5.4:kernel-rt-5.14.21-150400.15.124.1.x86_64",
            "SUSE Linux Enterprise Micro 5.4:kernel-source-rt-5.14.21-150400.15.124.1.noarch"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 6.7,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H",
            "version": "3.1"
          },
          "products": [
            "SUSE Linux Enterprise Micro 5.3:kernel-rt-5.14.21-150400.15.124.1.x86_64",
            "SUSE Linux Enterprise Micro 5.3:kernel-source-rt-5.14.21-150400.15.124.1.noarch",
            "SUSE Linux Enterprise Micro 5.4:kernel-rt-5.14.21-150400.15.124.1.x86_64",
            "SUSE Linux Enterprise Micro 5.4:kernel-source-rt-5.14.21-150400.15.124.1.noarch"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2025-07-15T14:31:46Z",
          "details": "moderate"
        }
      ],
      "title": "CVE-2024-26924"
    },
    {
      "cve": "CVE-2024-26935",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2024-26935"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "In the Linux kernel, the following vulnerability has been resolved:\n\nscsi: core: Fix unremoved procfs host directory regression\n\nCommit fc663711b944 (\"scsi: core: Remove the /proc/scsi/${proc_name}\ndirectory earlier\") fixed a bug related to modules loading/unloading, by\nadding a call to scsi_proc_hostdir_rm() on scsi_remove_host(). But that led\nto a potential duplicate call to the hostdir_rm() routine, since it\u0027s also\ncalled from scsi_host_dev_release(). That triggered a regression report,\nwhich was then fixed by commit be03df3d4bfe (\"scsi: core: Fix a procfs host\ndirectory removal regression\"). The fix just dropped the hostdir_rm() call\nfrom dev_release().\n\nBut it happens that this proc directory is created on scsi_host_alloc(),\nand that function \"pairs\" with scsi_host_dev_release(), while\nscsi_remove_host() pairs with scsi_add_host(). In other words, it seems the\nreason for removing the proc directory on dev_release() was meant to cover\ncases in which a SCSI host structure was allocated, but the call to\nscsi_add_host() didn\u0027t happen. And that pattern happens to exist in some\nerror paths, for example.\n\nSyzkaller causes that by using USB raw gadget device, error\u0027ing on\nusb-storage driver, at usb_stor_probe2(). By checking that path, we can see\nthat the BadDevice label leads to a scsi_host_put() after a SCSI host\nallocation, but there\u0027s no call to scsi_add_host() in such path. That leads\nto messages like this in dmesg (and a leak of the SCSI host proc\nstructure):\n\nusb-storage 4-1:87.51: USB Mass Storage device detected\nproc_dir_entry \u0027scsi/usb-storage\u0027 already registered\nWARNING: CPU: 1 PID: 3519 at fs/proc/generic.c:377 proc_register+0x347/0x4e0 fs/proc/generic.c:376\n\nThe proper fix seems to still call scsi_proc_hostdir_rm() on dev_release(),\nbut guard that with the state check for SHOST_CREATED; there is even a\ncomment in scsi_host_dev_release() detailing that: such conditional is\nmeant for cases where the SCSI host was allocated but there was no calls to\n{add,remove}_host(), like the usb-storage case.\n\nThis is what we propose here and with that, the error path of usb-storage\ndoes not trigger the warning anymore.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "SUSE Linux Enterprise Micro 5.3:kernel-rt-5.14.21-150400.15.124.1.x86_64",
          "SUSE Linux Enterprise Micro 5.3:kernel-source-rt-5.14.21-150400.15.124.1.noarch",
          "SUSE Linux Enterprise Micro 5.4:kernel-rt-5.14.21-150400.15.124.1.x86_64",
          "SUSE Linux Enterprise Micro 5.4:kernel-source-rt-5.14.21-150400.15.124.1.noarch"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2024-26935",
          "url": "https://www.suse.com/security/cve/CVE-2024-26935"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1223675 for CVE-2024-26935",
          "url": "https://bugzilla.suse.com/1223675"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "SUSE Linux Enterprise Micro 5.3:kernel-rt-5.14.21-150400.15.124.1.x86_64",
            "SUSE Linux Enterprise Micro 5.3:kernel-source-rt-5.14.21-150400.15.124.1.noarch",
            "SUSE Linux Enterprise Micro 5.4:kernel-rt-5.14.21-150400.15.124.1.x86_64",
            "SUSE Linux Enterprise Micro 5.4:kernel-source-rt-5.14.21-150400.15.124.1.noarch"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 3.3,
            "baseSeverity": "LOW",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L",
            "version": "3.1"
          },
          "products": [
            "SUSE Linux Enterprise Micro 5.3:kernel-rt-5.14.21-150400.15.124.1.x86_64",
            "SUSE Linux Enterprise Micro 5.3:kernel-source-rt-5.14.21-150400.15.124.1.noarch",
            "SUSE Linux Enterprise Micro 5.4:kernel-rt-5.14.21-150400.15.124.1.x86_64",
            "SUSE Linux Enterprise Micro 5.4:kernel-source-rt-5.14.21-150400.15.124.1.noarch"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2025-07-15T14:31:46Z",
          "details": "low"
        }
      ],
      "title": "CVE-2024-26935"
    },
    {
      "cve": "CVE-2024-27397",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2024-27397"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "In the Linux kernel, the following vulnerability has been resolved:\n\nnetfilter: nf_tables: use timestamp to check for set element timeout\n\nAdd a timestamp field at the beginning of the transaction, store it\nin the nftables per-netns area.\n\nUpdate set backend .insert, .deactivate and sync gc path to use the\ntimestamp, this avoids that an element expires while control plane\ntransaction is still unfinished.\n\n.lookup and .update, which are used from packet path, still use the\ncurrent time to check if the element has expired. And .get path and dump\nalso since this runs lockless under rcu read size lock. Then, there is\nasync gc which also needs to check the current time since it runs\nasynchronously from a workqueue.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "SUSE Linux Enterprise Micro 5.3:kernel-rt-5.14.21-150400.15.124.1.x86_64",
          "SUSE Linux Enterprise Micro 5.3:kernel-source-rt-5.14.21-150400.15.124.1.noarch",
          "SUSE Linux Enterprise Micro 5.4:kernel-rt-5.14.21-150400.15.124.1.x86_64",
          "SUSE Linux Enterprise Micro 5.4:kernel-source-rt-5.14.21-150400.15.124.1.noarch"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2024-27397",
          "url": "https://www.suse.com/security/cve/CVE-2024-27397"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1224095 for CVE-2024-27397",
          "url": "https://bugzilla.suse.com/1224095"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "SUSE Linux Enterprise Micro 5.3:kernel-rt-5.14.21-150400.15.124.1.x86_64",
            "SUSE Linux Enterprise Micro 5.3:kernel-source-rt-5.14.21-150400.15.124.1.noarch",
            "SUSE Linux Enterprise Micro 5.4:kernel-rt-5.14.21-150400.15.124.1.x86_64",
            "SUSE Linux Enterprise Micro 5.4:kernel-source-rt-5.14.21-150400.15.124.1.noarch"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 6.7,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H",
            "version": "3.1"
          },
          "products": [
            "SUSE Linux Enterprise Micro 5.3:kernel-rt-5.14.21-150400.15.124.1.x86_64",
            "SUSE Linux Enterprise Micro 5.3:kernel-source-rt-5.14.21-150400.15.124.1.noarch",
            "SUSE Linux Enterprise Micro 5.4:kernel-rt-5.14.21-150400.15.124.1.x86_64",
            "SUSE Linux Enterprise Micro 5.4:kernel-source-rt-5.14.21-150400.15.124.1.noarch"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2025-07-15T14:31:46Z",
          "details": "moderate"
        }
      ],
      "title": "CVE-2024-27397"
    },
    {
      "cve": "CVE-2024-35840",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2024-35840"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "In the Linux kernel, the following vulnerability has been resolved:\n\nmptcp: use OPTION_MPTCP_MPJ_SYNACK in subflow_finish_connect()\n\nsubflow_finish_connect() uses four fields (backup, join_id, thmac, none)\nthat may contain garbage unless OPTION_MPTCP_MPJ_SYNACK has been set\nin mptcp_parse_option()",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "SUSE Linux Enterprise Micro 5.3:kernel-rt-5.14.21-150400.15.124.1.x86_64",
          "SUSE Linux Enterprise Micro 5.3:kernel-source-rt-5.14.21-150400.15.124.1.noarch",
          "SUSE Linux Enterprise Micro 5.4:kernel-rt-5.14.21-150400.15.124.1.x86_64",
          "SUSE Linux Enterprise Micro 5.4:kernel-source-rt-5.14.21-150400.15.124.1.noarch"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2024-35840",
          "url": "https://www.suse.com/security/cve/CVE-2024-35840"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1224597 for CVE-2024-35840",
          "url": "https://bugzilla.suse.com/1224597"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "SUSE Linux Enterprise Micro 5.3:kernel-rt-5.14.21-150400.15.124.1.x86_64",
            "SUSE Linux Enterprise Micro 5.3:kernel-source-rt-5.14.21-150400.15.124.1.noarch",
            "SUSE Linux Enterprise Micro 5.4:kernel-rt-5.14.21-150400.15.124.1.x86_64",
            "SUSE Linux Enterprise Micro 5.4:kernel-source-rt-5.14.21-150400.15.124.1.noarch"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 5.5,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
            "version": "3.1"
          },
          "products": [
            "SUSE Linux Enterprise Micro 5.3:kernel-rt-5.14.21-150400.15.124.1.x86_64",
            "SUSE Linux Enterprise Micro 5.3:kernel-source-rt-5.14.21-150400.15.124.1.noarch",
            "SUSE Linux Enterprise Micro 5.4:kernel-rt-5.14.21-150400.15.124.1.x86_64",
            "SUSE Linux Enterprise Micro 5.4:kernel-source-rt-5.14.21-150400.15.124.1.noarch"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2025-07-15T14:31:46Z",
          "details": "moderate"
        }
      ],
      "title": "CVE-2024-35840"
    },
    {
      "cve": "CVE-2024-36978",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2024-36978"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "In the Linux kernel, the following vulnerability has been resolved:\n\nnet: sched: sch_multiq: fix possible OOB write in multiq_tune()\n\nq-\u003ebands will be assigned to qopt-\u003ebands to execute subsequent code logic\nafter kmalloc. So the old q-\u003ebands should not be used in kmalloc.\nOtherwise, an out-of-bounds write will occur.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "SUSE Linux Enterprise Micro 5.3:kernel-rt-5.14.21-150400.15.124.1.x86_64",
          "SUSE Linux Enterprise Micro 5.3:kernel-source-rt-5.14.21-150400.15.124.1.noarch",
          "SUSE Linux Enterprise Micro 5.4:kernel-rt-5.14.21-150400.15.124.1.x86_64",
          "SUSE Linux Enterprise Micro 5.4:kernel-source-rt-5.14.21-150400.15.124.1.noarch"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2024-36978",
          "url": "https://www.suse.com/security/cve/CVE-2024-36978"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1226514 for CVE-2024-36978",
          "url": "https://bugzilla.suse.com/1226514"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1244631 for CVE-2024-36978",
          "url": "https://bugzilla.suse.com/1244631"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "SUSE Linux Enterprise Micro 5.3:kernel-rt-5.14.21-150400.15.124.1.x86_64",
            "SUSE Linux Enterprise Micro 5.3:kernel-source-rt-5.14.21-150400.15.124.1.noarch",
            "SUSE Linux Enterprise Micro 5.4:kernel-rt-5.14.21-150400.15.124.1.x86_64",
            "SUSE Linux Enterprise Micro 5.4:kernel-source-rt-5.14.21-150400.15.124.1.noarch"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 7.8,
            "baseSeverity": "HIGH",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
            "version": "3.1"
          },
          "products": [
            "SUSE Linux Enterprise Micro 5.3:kernel-rt-5.14.21-150400.15.124.1.x86_64",
            "SUSE Linux Enterprise Micro 5.3:kernel-source-rt-5.14.21-150400.15.124.1.noarch",
            "SUSE Linux Enterprise Micro 5.4:kernel-rt-5.14.21-150400.15.124.1.x86_64",
            "SUSE Linux Enterprise Micro 5.4:kernel-source-rt-5.14.21-150400.15.124.1.noarch"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2025-07-15T14:31:46Z",
          "details": "important"
        }
      ],
      "title": "CVE-2024-36978"
    },
    {
      "cve": "CVE-2024-46800",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2024-46800"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "In the Linux kernel, the following vulnerability has been resolved:\n\nsch/netem: fix use after free in netem_dequeue\n\nIf netem_dequeue() enqueues packet to inner qdisc and that qdisc\nreturns __NET_XMIT_STOLEN. The packet is dropped but\nqdisc_tree_reduce_backlog() is not called to update the parent\u0027s\nq.qlen, leading to the similar use-after-free as Commit\ne04991a48dbaf382 (\"netem: fix return value if duplicate enqueue\nfails\")\n\nCommands to trigger KASAN UaF:\n\nip link add type dummy\nip link set lo up\nip link set dummy0 up\ntc qdisc add dev lo parent root handle 1: drr\ntc filter add dev lo parent 1: basic classid 1:1\ntc class add dev lo classid 1:1 drr\ntc qdisc add dev lo parent 1:1 handle 2: netem\ntc qdisc add dev lo parent 2: handle 3: drr\ntc filter add dev lo parent 3: basic classid 3:1 action mirred egress\nredirect dev dummy0\ntc class add dev lo classid 3:1 drr\nping -c1 -W0.01 localhost # Trigger bug\ntc class del dev lo classid 1:1\ntc class add dev lo classid 1:1 drr\nping -c1 -W0.01 localhost # UaF",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "SUSE Linux Enterprise Micro 5.3:kernel-rt-5.14.21-150400.15.124.1.x86_64",
          "SUSE Linux Enterprise Micro 5.3:kernel-source-rt-5.14.21-150400.15.124.1.noarch",
          "SUSE Linux Enterprise Micro 5.4:kernel-rt-5.14.21-150400.15.124.1.x86_64",
          "SUSE Linux Enterprise Micro 5.4:kernel-source-rt-5.14.21-150400.15.124.1.noarch"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2024-46800",
          "url": "https://www.suse.com/security/cve/CVE-2024-46800"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1230827 for CVE-2024-46800",
          "url": "https://bugzilla.suse.com/1230827"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "SUSE Linux Enterprise Micro 5.3:kernel-rt-5.14.21-150400.15.124.1.x86_64",
            "SUSE Linux Enterprise Micro 5.3:kernel-source-rt-5.14.21-150400.15.124.1.noarch",
            "SUSE Linux Enterprise Micro 5.4:kernel-rt-5.14.21-150400.15.124.1.x86_64",
            "SUSE Linux Enterprise Micro 5.4:kernel-source-rt-5.14.21-150400.15.124.1.noarch"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 5.5,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
            "version": "3.1"
          },
          "products": [
            "SUSE Linux Enterprise Micro 5.3:kernel-rt-5.14.21-150400.15.124.1.x86_64",
            "SUSE Linux Enterprise Micro 5.3:kernel-source-rt-5.14.21-150400.15.124.1.noarch",
            "SUSE Linux Enterprise Micro 5.4:kernel-rt-5.14.21-150400.15.124.1.x86_64",
            "SUSE Linux Enterprise Micro 5.4:kernel-source-rt-5.14.21-150400.15.124.1.noarch"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2025-07-15T14:31:46Z",
          "details": "moderate"
        }
      ],
      "title": "CVE-2024-46800"
    },
    {
      "cve": "CVE-2024-53057",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2024-53057"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "In the Linux kernel, the following vulnerability has been resolved:\n\nnet/sched: stop qdisc_tree_reduce_backlog on TC_H_ROOT\n\nIn qdisc_tree_reduce_backlog, Qdiscs with major handle ffff: are assumed\nto be either root or ingress. This assumption is bogus since it\u0027s valid\nto create egress qdiscs with major handle ffff:\nBudimir Markovic found that for qdiscs like DRR that maintain an active\nclass list, it will cause a UAF with a dangling class pointer.\n\nIn 066a3b5b2346, the concern was to avoid iterating over the ingress\nqdisc since its parent is itself. The proper fix is to stop when parent\nTC_H_ROOT is reached because the only way to retrieve ingress is when a\nhierarchy which does not contain a ffff: major handle call into\nqdisc_lookup with TC_H_MAJ(TC_H_ROOT).\n\nIn the scenario where major ffff: is an egress qdisc in any of the tree\nlevels, the updates will also propagate to TC_H_ROOT, which then the\niteration must stop.\n\n\n net/sched/sch_api.c | 2 +-\n 1 file changed, 1 insertion(+), 1 deletion(-)",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "SUSE Linux Enterprise Micro 5.3:kernel-rt-5.14.21-150400.15.124.1.x86_64",
          "SUSE Linux Enterprise Micro 5.3:kernel-source-rt-5.14.21-150400.15.124.1.noarch",
          "SUSE Linux Enterprise Micro 5.4:kernel-rt-5.14.21-150400.15.124.1.x86_64",
          "SUSE Linux Enterprise Micro 5.4:kernel-source-rt-5.14.21-150400.15.124.1.noarch"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2024-53057",
          "url": "https://www.suse.com/security/cve/CVE-2024-53057"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1233551 for CVE-2024-53057",
          "url": "https://bugzilla.suse.com/1233551"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "SUSE Linux Enterprise Micro 5.3:kernel-rt-5.14.21-150400.15.124.1.x86_64",
            "SUSE Linux Enterprise Micro 5.3:kernel-source-rt-5.14.21-150400.15.124.1.noarch",
            "SUSE Linux Enterprise Micro 5.4:kernel-rt-5.14.21-150400.15.124.1.x86_64",
            "SUSE Linux Enterprise Micro 5.4:kernel-source-rt-5.14.21-150400.15.124.1.noarch"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 7.8,
            "baseSeverity": "HIGH",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
            "version": "3.1"
          },
          "products": [
            "SUSE Linux Enterprise Micro 5.3:kernel-rt-5.14.21-150400.15.124.1.x86_64",
            "SUSE Linux Enterprise Micro 5.3:kernel-source-rt-5.14.21-150400.15.124.1.noarch",
            "SUSE Linux Enterprise Micro 5.4:kernel-rt-5.14.21-150400.15.124.1.x86_64",
            "SUSE Linux Enterprise Micro 5.4:kernel-source-rt-5.14.21-150400.15.124.1.noarch"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2025-07-15T14:31:46Z",
          "details": "important"
        }
      ],
      "title": "CVE-2024-53057"
    },
    {
      "cve": "CVE-2024-53125",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2024-53125"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "In the Linux kernel, the following vulnerability has been resolved:\n\nbpf: sync_linked_regs() must preserve subreg_def\n\nRange propagation must not affect subreg_def marks, otherwise the\nfollowing example is rewritten by verifier incorrectly when\nBPF_F_TEST_RND_HI32 flag is set:\n\n  0: call bpf_ktime_get_ns                   call bpf_ktime_get_ns\n  1: r0 \u0026= 0x7fffffff       after verifier   r0 \u0026= 0x7fffffff\n  2: w1 = w0                rewrites         w1 = w0\n  3: if w0 \u003c 10 goto +0     --------------\u003e  r11 = 0x2f5674a6     (r)\n  4: r1 \u003e\u003e= 32                               r11 \u003c\u003c= 32           (r)\n  5: r0 = r1                                 r1 |= r11            (r)\n  6: exit;                                   if w0 \u003c 0xa goto pc+0\n                                             r1 \u003e\u003e= 32\n                                             r0 = r1\n                                             exit\n\n(or zero extension of w1 at (2) is missing for architectures that\n require zero extension for upper register half).\n\nThe following happens w/o this patch:\n- r0 is marked as not a subreg at (0);\n- w1 is marked as subreg at (2);\n- w1 subreg_def is overridden at (3) by copy_register_state();\n- w1 is read at (5) but mark_insn_zext() does not mark (2)\n  for zero extension, because w1 subreg_def is not set;\n- because of BPF_F_TEST_RND_HI32 flag verifier inserts random\n  value for hi32 bits of (2) (marked (r));\n- this random value is read at (5).",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "SUSE Linux Enterprise Micro 5.3:kernel-rt-5.14.21-150400.15.124.1.x86_64",
          "SUSE Linux Enterprise Micro 5.3:kernel-source-rt-5.14.21-150400.15.124.1.noarch",
          "SUSE Linux Enterprise Micro 5.4:kernel-rt-5.14.21-150400.15.124.1.x86_64",
          "SUSE Linux Enterprise Micro 5.4:kernel-source-rt-5.14.21-150400.15.124.1.noarch"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2024-53125",
          "url": "https://www.suse.com/security/cve/CVE-2024-53125"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1234156 for CVE-2024-53125",
          "url": "https://bugzilla.suse.com/1234156"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "SUSE Linux Enterprise Micro 5.3:kernel-rt-5.14.21-150400.15.124.1.x86_64",
            "SUSE Linux Enterprise Micro 5.3:kernel-source-rt-5.14.21-150400.15.124.1.noarch",
            "SUSE Linux Enterprise Micro 5.4:kernel-rt-5.14.21-150400.15.124.1.x86_64",
            "SUSE Linux Enterprise Micro 5.4:kernel-source-rt-5.14.21-150400.15.124.1.noarch"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 7.8,
            "baseSeverity": "HIGH",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
            "version": "3.1"
          },
          "products": [
            "SUSE Linux Enterprise Micro 5.3:kernel-rt-5.14.21-150400.15.124.1.x86_64",
            "SUSE Linux Enterprise Micro 5.3:kernel-source-rt-5.14.21-150400.15.124.1.noarch",
            "SUSE Linux Enterprise Micro 5.4:kernel-rt-5.14.21-150400.15.124.1.x86_64",
            "SUSE Linux Enterprise Micro 5.4:kernel-source-rt-5.14.21-150400.15.124.1.noarch"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2025-07-15T14:31:46Z",
          "details": "important"
        }
      ],
      "title": "CVE-2024-53125"
    },
    {
      "cve": "CVE-2024-53141",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2024-53141"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "In the Linux kernel, the following vulnerability has been resolved:\n\nnetfilter: ipset: add missing range check in bitmap_ip_uadt\n\nWhen tb[IPSET_ATTR_IP_TO] is not present but tb[IPSET_ATTR_CIDR] exists,\nthe values of ip and ip_to are slightly swapped. Therefore, the range check\nfor ip should be done later, but this part is missing and it seems that the\nvulnerability occurs.\n\nSo we should add missing range checks and remove unnecessary range checks.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "SUSE Linux Enterprise Micro 5.3:kernel-rt-5.14.21-150400.15.124.1.x86_64",
          "SUSE Linux Enterprise Micro 5.3:kernel-source-rt-5.14.21-150400.15.124.1.noarch",
          "SUSE Linux Enterprise Micro 5.4:kernel-rt-5.14.21-150400.15.124.1.x86_64",
          "SUSE Linux Enterprise Micro 5.4:kernel-source-rt-5.14.21-150400.15.124.1.noarch"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2024-53141",
          "url": "https://www.suse.com/security/cve/CVE-2024-53141"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1234381 for CVE-2024-53141",
          "url": "https://bugzilla.suse.com/1234381"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1245778 for CVE-2024-53141",
          "url": "https://bugzilla.suse.com/1245778"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "SUSE Linux Enterprise Micro 5.3:kernel-rt-5.14.21-150400.15.124.1.x86_64",
            "SUSE Linux Enterprise Micro 5.3:kernel-source-rt-5.14.21-150400.15.124.1.noarch",
            "SUSE Linux Enterprise Micro 5.4:kernel-rt-5.14.21-150400.15.124.1.x86_64",
            "SUSE Linux Enterprise Micro 5.4:kernel-source-rt-5.14.21-150400.15.124.1.noarch"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 7.8,
            "baseSeverity": "HIGH",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
            "version": "3.1"
          },
          "products": [
            "SUSE Linux Enterprise Micro 5.3:kernel-rt-5.14.21-150400.15.124.1.x86_64",
            "SUSE Linux Enterprise Micro 5.3:kernel-source-rt-5.14.21-150400.15.124.1.noarch",
            "SUSE Linux Enterprise Micro 5.4:kernel-rt-5.14.21-150400.15.124.1.x86_64",
            "SUSE Linux Enterprise Micro 5.4:kernel-source-rt-5.14.21-150400.15.124.1.noarch"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2025-07-15T14:31:46Z",
          "details": "important"
        }
      ],
      "title": "CVE-2024-53141"
    },
    {
      "cve": "CVE-2024-56770",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2024-56770"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "In the Linux kernel, the following vulnerability has been resolved:\n\nnet/sched: netem: account for backlog updates from child qdisc\n\nIn general, \u0027qlen\u0027 of any classful qdisc should keep track of the\nnumber of packets that the qdisc itself and all of its children holds.\nIn case of netem, \u0027qlen\u0027 only accounts for the packets in its internal\ntfifo. When netem is used with a child qdisc, the child qdisc can use\n\u0027qdisc_tree_reduce_backlog\u0027 to inform its parent, netem, about created\nor dropped SKBs. This function updates \u0027qlen\u0027 and the backlog statistics\nof netem, but netem does not account for changes made by a child qdisc.\n\u0027qlen\u0027 then indicates the wrong number of packets in the tfifo.\nIf a child qdisc creates new SKBs during enqueue and informs its parent\nabout this, netem\u0027s \u0027qlen\u0027 value is increased. When netem dequeues the\nnewly created SKBs from the child, the \u0027qlen\u0027 in netem is not updated.\nIf \u0027qlen\u0027 reaches the configured sch-\u003elimit, the enqueue function stops\nworking, even though the tfifo is not full.\n\nReproduce the bug:\nEnsure that the sender machine has GSO enabled. Configure netem as root\nqdisc and tbf as its child on the outgoing interface of the machine\nas follows:\n$ tc qdisc add dev \u003coif\u003e root handle 1: netem delay 100ms limit 100\n$ tc qdisc add dev \u003coif\u003e parent 1:0 tbf rate 50Mbit burst 1542 latency 50ms\n\nSend bulk TCP traffic out via this interface, e.g., by running an iPerf3\nclient on the machine. Check the qdisc statistics:\n$ tc -s qdisc show dev \u003coif\u003e\n\nStatistics after 10s of iPerf3 TCP test before the fix (note that\nnetem\u0027s backlog \u003e limit, netem stopped accepting packets):\nqdisc netem 1: root refcnt 2 limit 1000 delay 100ms\n Sent 2767766 bytes 1848 pkt (dropped 652, overlimits 0 requeues 0)\n backlog 4294528236b 1155p requeues 0\nqdisc tbf 10: parent 1:1 rate 50Mbit burst 1537b lat 50ms\n Sent 2767766 bytes 1848 pkt (dropped 327, overlimits 7601 requeues 0)\n backlog 0b 0p requeues 0\n\nStatistics after the fix:\nqdisc netem 1: root refcnt 2 limit 1000 delay 100ms\n Sent 37766372 bytes 24974 pkt (dropped 9, overlimits 0 requeues 0)\n backlog 0b 0p requeues 0\nqdisc tbf 10: parent 1:1 rate 50Mbit burst 1537b lat 50ms\n Sent 37766372 bytes 24974 pkt (dropped 327, overlimits 96017 requeues 0)\n backlog 0b 0p requeues 0\n\ntbf segments the GSO SKBs (tbf_segment) and updates the netem\u0027s \u0027qlen\u0027.\nThe interface fully stops transferring packets and \"locks\". In this case,\nthe child qdisc and tfifo are empty, but \u0027qlen\u0027 indicates the tfifo is at\nits limit and no more packets are accepted.\n\nThis patch adds a counter for the entries in the tfifo. Netem\u0027s \u0027qlen\u0027 is\nonly decreased when a packet is returned by its dequeue function, and not\nduring enqueuing into the child qdisc. External updates to \u0027qlen\u0027 are thus\naccounted for and only the behavior of the backlog statistics changes. As\nin other qdiscs, \u0027qlen\u0027 then keeps track of  how many packets are held in\nnetem and all of its children. As before, sch-\u003elimit remains as the\nmaximum number of packets in the tfifo. The same applies to netem\u0027s\nbacklog statistics.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "SUSE Linux Enterprise Micro 5.3:kernel-rt-5.14.21-150400.15.124.1.x86_64",
          "SUSE Linux Enterprise Micro 5.3:kernel-source-rt-5.14.21-150400.15.124.1.noarch",
          "SUSE Linux Enterprise Micro 5.4:kernel-rt-5.14.21-150400.15.124.1.x86_64",
          "SUSE Linux Enterprise Micro 5.4:kernel-source-rt-5.14.21-150400.15.124.1.noarch"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2024-56770",
          "url": "https://www.suse.com/security/cve/CVE-2024-56770"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1235637 for CVE-2024-56770",
          "url": "https://bugzilla.suse.com/1235637"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "SUSE Linux Enterprise Micro 5.3:kernel-rt-5.14.21-150400.15.124.1.x86_64",
            "SUSE Linux Enterprise Micro 5.3:kernel-source-rt-5.14.21-150400.15.124.1.noarch",
            "SUSE Linux Enterprise Micro 5.4:kernel-rt-5.14.21-150400.15.124.1.x86_64",
            "SUSE Linux Enterprise Micro 5.4:kernel-source-rt-5.14.21-150400.15.124.1.noarch"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 5.1,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:L/A:H",
            "version": "3.1"
          },
          "products": [
            "SUSE Linux Enterprise Micro 5.3:kernel-rt-5.14.21-150400.15.124.1.x86_64",
            "SUSE Linux Enterprise Micro 5.3:kernel-source-rt-5.14.21-150400.15.124.1.noarch",
            "SUSE Linux Enterprise Micro 5.4:kernel-rt-5.14.21-150400.15.124.1.x86_64",
            "SUSE Linux Enterprise Micro 5.4:kernel-source-rt-5.14.21-150400.15.124.1.noarch"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2025-07-15T14:31:46Z",
          "details": "moderate"
        }
      ],
      "title": "CVE-2024-56770"
    },
    {
      "cve": "CVE-2024-57947",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2024-57947"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "In the Linux kernel, the following vulnerability has been resolved:\n\nnetfilter: nf_set_pipapo: fix initial map fill\n\nThe initial buffer has to be inited to all-ones, but it must restrict\nit to the size of the first field, not the total field size.\n\nAfter each round in the map search step, the result and the fill map\nare swapped, so if we have a set where f-\u003ebsize of the first element\nis smaller than m-\u003ebsize_max, those one-bits are leaked into future\nrounds result map.\n\nThis makes pipapo find an incorrect matching results for sets where\nfirst field size is not the largest.\n\nFollowup patch adds a test case to nft_concat_range.sh selftest script.\n\nThanks to Stefano Brivio for pointing out that we need to zero out\nthe remainder explicitly, only correcting memset() argument isn\u0027t enough.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "SUSE Linux Enterprise Micro 5.3:kernel-rt-5.14.21-150400.15.124.1.x86_64",
          "SUSE Linux Enterprise Micro 5.3:kernel-source-rt-5.14.21-150400.15.124.1.noarch",
          "SUSE Linux Enterprise Micro 5.4:kernel-rt-5.14.21-150400.15.124.1.x86_64",
          "SUSE Linux Enterprise Micro 5.4:kernel-source-rt-5.14.21-150400.15.124.1.noarch"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2024-57947",
          "url": "https://www.suse.com/security/cve/CVE-2024-57947"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1236333 for CVE-2024-57947",
          "url": "https://bugzilla.suse.com/1236333"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1245799 for CVE-2024-57947",
          "url": "https://bugzilla.suse.com/1245799"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "SUSE Linux Enterprise Micro 5.3:kernel-rt-5.14.21-150400.15.124.1.x86_64",
            "SUSE Linux Enterprise Micro 5.3:kernel-source-rt-5.14.21-150400.15.124.1.noarch",
            "SUSE Linux Enterprise Micro 5.4:kernel-rt-5.14.21-150400.15.124.1.x86_64",
            "SUSE Linux Enterprise Micro 5.4:kernel-source-rt-5.14.21-150400.15.124.1.noarch"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 7,
            "baseSeverity": "HIGH",
            "vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H",
            "version": "3.1"
          },
          "products": [
            "SUSE Linux Enterprise Micro 5.3:kernel-rt-5.14.21-150400.15.124.1.x86_64",
            "SUSE Linux Enterprise Micro 5.3:kernel-source-rt-5.14.21-150400.15.124.1.noarch",
            "SUSE Linux Enterprise Micro 5.4:kernel-rt-5.14.21-150400.15.124.1.x86_64",
            "SUSE Linux Enterprise Micro 5.4:kernel-source-rt-5.14.21-150400.15.124.1.noarch"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2025-07-15T14:31:46Z",
          "details": "important"
        }
      ],
      "title": "CVE-2024-57947"
    },
    {
      "cve": "CVE-2024-57999",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2024-57999"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "In the Linux kernel, the following vulnerability has been resolved:\n\npowerpc/pseries/iommu: IOMMU incorrectly marks MMIO range in DDW\n\nPower Hypervisor can possibily allocate MMIO window intersecting with\nDynamic DMA Window (DDW) range, which is over 32-bit addressing.\n\nThese MMIO pages needs to be marked as reserved so that IOMMU doesn\u0027t map\nDMA buffers in this range.\n\nThe current code is not marking these pages correctly which is resulting\nin LPAR to OOPS while booting. The stack is at below\n\nBUG: Unable to handle kernel data access on read at 0xc00800005cd40000\nFaulting instruction address: 0xc00000000005cdac\nOops: Kernel access of bad area, sig: 11 [#1]\nLE PAGE_SIZE=64K MMU=Hash SMP NR_CPUS=2048 NUMA pSeries\nModules linked in: af_packet rfkill ibmveth(X) lpfc(+) nvmet_fc nvmet nvme_keyring crct10dif_vpmsum nvme_fc nvme_fabrics nvme_core be2net(+) nvme_auth rtc_generic nfsd auth_rpcgss nfs_acl lockd grace sunrpc fuse configfs ip_tables x_tables xfs libcrc32c dm_service_time ibmvfc(X) scsi_transport_fc vmx_crypto gf128mul crc32c_vpmsum dm_mirror dm_region_hash dm_log dm_multipath dm_mod sd_mod scsi_dh_emc scsi_dh_rdac scsi_dh_alua t10_pi crc64_rocksoft_generic crc64_rocksoft sg crc64 scsi_mod\nSupported: Yes, External\nCPU: 8 PID: 241 Comm: kworker/8:1 Kdump: loaded Not tainted 6.4.0-150600.23.14-default #1 SLE15-SP6 b44ee71c81261b9e4bab5e0cde1f2ed891d5359b\nHardware name: IBM,9080-M9S POWER9 (raw) 0x4e2103 0xf000005 of:IBM,FW950.B0 (VH950_149) hv:phyp pSeries\nWorkqueue: events work_for_cpu_fn\nNIP:  c00000000005cdac LR: c00000000005e830 CTR: 0000000000000000\nREGS: c00001400c9ff770 TRAP: 0300   Not tainted  (6.4.0-150600.23.14-default)\nMSR:  800000000280b033 \u003cSF,VEC,VSX,EE,FP,ME,IR,DR,RI,LE\u003e  CR: 24228448  XER: 00000001\nCFAR: c00000000005cdd4 DAR: c00800005cd40000 DSISR: 40000000 IRQMASK: 0\nGPR00: c00000000005e830 c00001400c9ffa10 c000000001987d00 c00001400c4fe800\nGPR04: 0000080000000000 0000000000000001 0000000004000000 0000000000800000\nGPR08: 0000000004000000 0000000000000001 c00800005cd40000 ffffffffffffffff\nGPR12: 0000000084228882 c00000000a4c4f00 0000000000000010 0000080000000000\nGPR16: c00001400c4fe800 0000000004000000 0800000000000000 c00000006088b800\nGPR20: c00001401a7be980 c00001400eff3800 c000000002a2da68 000000000000002b\nGPR24: c0000000026793a8 c000000002679368 000000000000002a c0000000026793c8\nGPR28: 000008007effffff 0000080000000000 0000000000800000 c00001400c4fe800\nNIP [c00000000005cdac] iommu_table_reserve_pages+0xac/0x100\nLR [c00000000005e830] iommu_init_table+0x80/0x1e0\nCall Trace:\n[c00001400c9ffa10] [c00000000005e810] iommu_init_table+0x60/0x1e0 (unreliable)\n[c00001400c9ffa90] [c00000000010356c] iommu_bypass_supported_pSeriesLP+0x9cc/0xe40\n[c00001400c9ffc30] [c00000000005c300] dma_iommu_dma_supported+0xf0/0x230\n[c00001400c9ffcb0] [c00000000024b0c4] dma_supported+0x44/0x90\n[c00001400c9ffcd0] [c00000000024b14c] dma_set_mask+0x3c/0x80\n[c00001400c9ffd00] [c0080000555b715c] be_probe+0xc4/0xb90 [be2net]\n[c00001400c9ffdc0] [c000000000986f3c] local_pci_probe+0x6c/0x110\n[c00001400c9ffe40] [c000000000188f28] work_for_cpu_fn+0x38/0x60\n[c00001400c9ffe70] [c00000000018e454] process_one_work+0x314/0x620\n[c00001400c9fff10] [c00000000018f280] worker_thread+0x2b0/0x620\n[c00001400c9fff90] [c00000000019bb18] kthread+0x148/0x150\n[c00001400c9fffe0] [c00000000000ded8] start_kernel_thread+0x14/0x18\n\nThere are 2 issues in the code\n\n1. The index is \"int\" while the address is \"unsigned long\". This results in\n   negative value when setting the bitmap.\n\n2. The DMA offset is page shifted but the MMIO range is used as-is (64-bit\n   address). MMIO address needs to be page shifted as well.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "SUSE Linux Enterprise Micro 5.3:kernel-rt-5.14.21-150400.15.124.1.x86_64",
          "SUSE Linux Enterprise Micro 5.3:kernel-source-rt-5.14.21-150400.15.124.1.noarch",
          "SUSE Linux Enterprise Micro 5.4:kernel-rt-5.14.21-150400.15.124.1.x86_64",
          "SUSE Linux Enterprise Micro 5.4:kernel-source-rt-5.14.21-150400.15.124.1.noarch"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2024-57999",
          "url": "https://www.suse.com/security/cve/CVE-2024-57999"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1238526 for CVE-2024-57999",
          "url": "https://bugzilla.suse.com/1238526"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "SUSE Linux Enterprise Micro 5.3:kernel-rt-5.14.21-150400.15.124.1.x86_64",
            "SUSE Linux Enterprise Micro 5.3:kernel-source-rt-5.14.21-150400.15.124.1.noarch",
            "SUSE Linux Enterprise Micro 5.4:kernel-rt-5.14.21-150400.15.124.1.x86_64",
            "SUSE Linux Enterprise Micro 5.4:kernel-source-rt-5.14.21-150400.15.124.1.noarch"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 5.5,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
            "version": "3.1"
          },
          "products": [
            "SUSE Linux Enterprise Micro 5.3:kernel-rt-5.14.21-150400.15.124.1.x86_64",
            "SUSE Linux Enterprise Micro 5.3:kernel-source-rt-5.14.21-150400.15.124.1.noarch",
            "SUSE Linux Enterprise Micro 5.4:kernel-rt-5.14.21-150400.15.124.1.x86_64",
            "SUSE Linux Enterprise Micro 5.4:kernel-source-rt-5.14.21-150400.15.124.1.noarch"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2025-07-15T14:31:46Z",
          "details": "moderate"
        }
      ],
      "title": "CVE-2024-57999"
    },
    {
      "cve": "CVE-2025-21700",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2025-21700"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "In the Linux kernel, the following vulnerability has been resolved:\n\nnet: sched: Disallow replacing of child qdisc from one parent to another\n\nLion Ackermann was able to create a UAF which can be abused for privilege\nescalation with the following script\n\nStep 1. create root qdisc\ntc qdisc add dev lo root handle 1:0 drr\n\nstep2. a class for packet aggregation do demonstrate uaf\ntc class add dev lo classid 1:1 drr\n\nstep3. a class for nesting\ntc class add dev lo classid 1:2 drr\n\nstep4. a class to graft qdisc to\ntc class add dev lo classid 1:3 drr\n\nstep5.\ntc qdisc add dev lo parent 1:1 handle 2:0 plug limit 1024\n\nstep6.\ntc qdisc add dev lo parent 1:2 handle 3:0 drr\n\nstep7.\ntc class add dev lo classid 3:1 drr\n\nstep 8.\ntc qdisc add dev lo parent 3:1 handle 4:0 pfifo\n\nstep 9. Display the class/qdisc layout\n\ntc class ls dev lo\n class drr 1:1 root leaf 2: quantum 64Kb\n class drr 1:2 root leaf 3: quantum 64Kb\n class drr 3:1 root leaf 4: quantum 64Kb\n\ntc qdisc ls\n qdisc drr 1: dev lo root refcnt 2\n qdisc plug 2: dev lo parent 1:1\n qdisc pfifo 4: dev lo parent 3:1 limit 1000p\n qdisc drr 3: dev lo parent 1:2\n\nstep10. trigger the bug \u003c=== prevented by this patch\ntc qdisc replace dev lo parent 1:3 handle 4:0\n\nstep 11. Redisplay again the qdiscs/classes\n\ntc class ls dev lo\n class drr 1:1 root leaf 2: quantum 64Kb\n class drr 1:2 root leaf 3: quantum 64Kb\n class drr 1:3 root leaf 4: quantum 64Kb\n class drr 3:1 root leaf 4: quantum 64Kb\n\ntc qdisc ls\n qdisc drr 1: dev lo root refcnt 2\n qdisc plug 2: dev lo parent 1:1\n qdisc pfifo 4: dev lo parent 3:1 refcnt 2 limit 1000p\n qdisc drr 3: dev lo parent 1:2\n\nObserve that a) parent for 4:0 does not change despite the replace request.\nThere can only be one parent.  b) refcount has gone up by two for 4:0 and\nc) both class 1:3 and 3:1 are pointing to it.\n\nStep 12.  send one packet to plug\necho \"\" | socat -u STDIN UDP4-DATAGRAM:127.0.0.1:8888,priority=$((0x10001))\nstep13.  send one packet to the grafted fifo\necho \"\" | socat -u STDIN UDP4-DATAGRAM:127.0.0.1:8888,priority=$((0x10003))\n\nstep14. lets trigger the uaf\ntc class delete dev lo classid 1:3\ntc class delete dev lo classid 1:1\n\nThe semantics of \"replace\" is for a del/add _on the same node_ and not\na delete from one node(3:1) and add to another node (1:3) as in step10.\nWhile we could \"fix\" with a more complex approach there could be\nconsequences to expectations so the patch takes the preventive approach of\n\"disallow such config\".\n\nJoint work with Lion Ackermann \u003cnnamrec@gmail.com\u003e",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "SUSE Linux Enterprise Micro 5.3:kernel-rt-5.14.21-150400.15.124.1.x86_64",
          "SUSE Linux Enterprise Micro 5.3:kernel-source-rt-5.14.21-150400.15.124.1.noarch",
          "SUSE Linux Enterprise Micro 5.4:kernel-rt-5.14.21-150400.15.124.1.x86_64",
          "SUSE Linux Enterprise Micro 5.4:kernel-source-rt-5.14.21-150400.15.124.1.noarch"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2025-21700",
          "url": "https://www.suse.com/security/cve/CVE-2025-21700"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1237159 for CVE-2025-21700",
          "url": "https://bugzilla.suse.com/1237159"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "SUSE Linux Enterprise Micro 5.3:kernel-rt-5.14.21-150400.15.124.1.x86_64",
            "SUSE Linux Enterprise Micro 5.3:kernel-source-rt-5.14.21-150400.15.124.1.noarch",
            "SUSE Linux Enterprise Micro 5.4:kernel-rt-5.14.21-150400.15.124.1.x86_64",
            "SUSE Linux Enterprise Micro 5.4:kernel-source-rt-5.14.21-150400.15.124.1.noarch"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 6.7,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H",
            "version": "3.1"
          },
          "products": [
            "SUSE Linux Enterprise Micro 5.3:kernel-rt-5.14.21-150400.15.124.1.x86_64",
            "SUSE Linux Enterprise Micro 5.3:kernel-source-rt-5.14.21-150400.15.124.1.noarch",
            "SUSE Linux Enterprise Micro 5.4:kernel-rt-5.14.21-150400.15.124.1.x86_64",
            "SUSE Linux Enterprise Micro 5.4:kernel-source-rt-5.14.21-150400.15.124.1.noarch"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2025-07-15T14:31:46Z",
          "details": "moderate"
        }
      ],
      "title": "CVE-2025-21700"
    },
    {
      "cve": "CVE-2025-21702",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2025-21702"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "In the Linux kernel, the following vulnerability has been resolved:\n\npfifo_tail_enqueue: Drop new packet when sch-\u003elimit == 0\n\nExpected behaviour:\nIn case we reach scheduler\u0027s limit, pfifo_tail_enqueue() will drop a\npacket in scheduler\u0027s queue and decrease scheduler\u0027s qlen by one.\nThen, pfifo_tail_enqueue() enqueue new packet and increase\nscheduler\u0027s qlen by one. Finally, pfifo_tail_enqueue() return\n`NET_XMIT_CN` status code.\n\nWeird behaviour:\nIn case we set `sch-\u003elimit == 0` and trigger pfifo_tail_enqueue() on a\nscheduler that has no packet, the \u0027drop a packet\u0027 step will do nothing.\nThis means the scheduler\u0027s qlen still has value equal 0.\nThen, we continue to enqueue new packet and increase scheduler\u0027s qlen by\none. In summary, we can leverage pfifo_tail_enqueue() to increase qlen by\none and return `NET_XMIT_CN` status code.\n\nThe problem is:\nLet\u0027s say we have two qdiscs: Qdisc_A and Qdisc_B.\n - Qdisc_A\u0027s type must have \u0027-\u003egraft()\u0027 function to create parent/child relationship.\n   Let\u0027s say Qdisc_A\u0027s type is `hfsc`. Enqueue packet to this qdisc will trigger `hfsc_enqueue`.\n - Qdisc_B\u0027s type is pfifo_head_drop. Enqueue packet to this qdisc will trigger `pfifo_tail_enqueue`.\n - Qdisc_B is configured to have `sch-\u003elimit == 0`.\n - Qdisc_A is configured to route the enqueued\u0027s packet to Qdisc_B.\n\nEnqueue packet through Qdisc_A will lead to:\n - hfsc_enqueue(Qdisc_A) -\u003e pfifo_tail_enqueue(Qdisc_B)\n - Qdisc_B-\u003eq.qlen += 1\n - pfifo_tail_enqueue() return `NET_XMIT_CN`\n - hfsc_enqueue() check for `NET_XMIT_SUCCESS` and see `NET_XMIT_CN` =\u003e hfsc_enqueue() don\u0027t increase qlen of Qdisc_A.\n\nThe whole process lead to a situation where Qdisc_A-\u003eq.qlen == 0 and Qdisc_B-\u003eq.qlen == 1.\nReplace \u0027hfsc\u0027 with other type (for example: \u0027drr\u0027) still lead to the same problem.\nThis violate the design where parent\u0027s qlen should equal to the sum of its childrens\u0027qlen.\n\nBug impact: This issue can be used for user-\u003ekernel privilege escalation when it is reachable.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "SUSE Linux Enterprise Micro 5.3:kernel-rt-5.14.21-150400.15.124.1.x86_64",
          "SUSE Linux Enterprise Micro 5.3:kernel-source-rt-5.14.21-150400.15.124.1.noarch",
          "SUSE Linux Enterprise Micro 5.4:kernel-rt-5.14.21-150400.15.124.1.x86_64",
          "SUSE Linux Enterprise Micro 5.4:kernel-source-rt-5.14.21-150400.15.124.1.noarch"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2025-21702",
          "url": "https://www.suse.com/security/cve/CVE-2025-21702"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1237312 for CVE-2025-21702",
          "url": "https://bugzilla.suse.com/1237312"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1245797 for CVE-2025-21702",
          "url": "https://bugzilla.suse.com/1245797"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "SUSE Linux Enterprise Micro 5.3:kernel-rt-5.14.21-150400.15.124.1.x86_64",
            "SUSE Linux Enterprise Micro 5.3:kernel-source-rt-5.14.21-150400.15.124.1.noarch",
            "SUSE Linux Enterprise Micro 5.4:kernel-rt-5.14.21-150400.15.124.1.x86_64",
            "SUSE Linux Enterprise Micro 5.4:kernel-source-rt-5.14.21-150400.15.124.1.noarch"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 7.8,
            "baseSeverity": "HIGH",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
            "version": "3.1"
          },
          "products": [
            "SUSE Linux Enterprise Micro 5.3:kernel-rt-5.14.21-150400.15.124.1.x86_64",
            "SUSE Linux Enterprise Micro 5.3:kernel-source-rt-5.14.21-150400.15.124.1.noarch",
            "SUSE Linux Enterprise Micro 5.4:kernel-rt-5.14.21-150400.15.124.1.x86_64",
            "SUSE Linux Enterprise Micro 5.4:kernel-source-rt-5.14.21-150400.15.124.1.noarch"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2025-07-15T14:31:46Z",
          "details": "important"
        }
      ],
      "title": "CVE-2025-21702"
    },
    {
      "cve": "CVE-2025-21703",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2025-21703"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "In the Linux kernel, the following vulnerability has been resolved:\n\nnetem: Update sch-\u003eq.qlen before qdisc_tree_reduce_backlog()\n\nqdisc_tree_reduce_backlog() notifies parent qdisc only if child\nqdisc becomes empty, therefore we need to reduce the backlog of the\nchild qdisc before calling it. Otherwise it would miss the opportunity\nto call cops-\u003eqlen_notify(), in the case of DRR, it resulted in UAF\nsince DRR uses -\u003eqlen_notify() to maintain its active list.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "SUSE Linux Enterprise Micro 5.3:kernel-rt-5.14.21-150400.15.124.1.x86_64",
          "SUSE Linux Enterprise Micro 5.3:kernel-source-rt-5.14.21-150400.15.124.1.noarch",
          "SUSE Linux Enterprise Micro 5.4:kernel-rt-5.14.21-150400.15.124.1.x86_64",
          "SUSE Linux Enterprise Micro 5.4:kernel-source-rt-5.14.21-150400.15.124.1.noarch"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2025-21703",
          "url": "https://www.suse.com/security/cve/CVE-2025-21703"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1237313 for CVE-2025-21703",
          "url": "https://bugzilla.suse.com/1237313"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1245796 for CVE-2025-21703",
          "url": "https://bugzilla.suse.com/1245796"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "SUSE Linux Enterprise Micro 5.3:kernel-rt-5.14.21-150400.15.124.1.x86_64",
            "SUSE Linux Enterprise Micro 5.3:kernel-source-rt-5.14.21-150400.15.124.1.noarch",
            "SUSE Linux Enterprise Micro 5.4:kernel-rt-5.14.21-150400.15.124.1.x86_64",
            "SUSE Linux Enterprise Micro 5.4:kernel-source-rt-5.14.21-150400.15.124.1.noarch"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 7.8,
            "baseSeverity": "HIGH",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
            "version": "3.1"
          },
          "products": [
            "SUSE Linux Enterprise Micro 5.3:kernel-rt-5.14.21-150400.15.124.1.x86_64",
            "SUSE Linux Enterprise Micro 5.3:kernel-source-rt-5.14.21-150400.15.124.1.noarch",
            "SUSE Linux Enterprise Micro 5.4:kernel-rt-5.14.21-150400.15.124.1.x86_64",
            "SUSE Linux Enterprise Micro 5.4:kernel-source-rt-5.14.21-150400.15.124.1.noarch"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2025-07-15T14:31:46Z",
          "details": "important"
        }
      ],
      "title": "CVE-2025-21703"
    },
    {
      "cve": "CVE-2025-21756",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2025-21756"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "In the Linux kernel, the following vulnerability has been resolved:\n\nvsock: Keep the binding until socket destruction\n\nPreserve sockets bindings; this includes both resulting from an explicit\nbind() and those implicitly bound through autobind during connect().\n\nPrevents socket unbinding during a transport reassignment, which fixes a\nuse-after-free:\n\n    1. vsock_create() (refcnt=1) calls vsock_insert_unbound() (refcnt=2)\n    2. transport-\u003erelease() calls vsock_remove_bound() without checking if\n       sk was bound and moved to bound list (refcnt=1)\n    3. vsock_bind() assumes sk is in unbound list and before\n       __vsock_insert_bound(vsock_bound_sockets()) calls\n       __vsock_remove_bound() which does:\n           list_del_init(\u0026vsk-\u003ebound_table); // nop\n           sock_put(\u0026vsk-\u003esk);               // refcnt=0\n\nBUG: KASAN: slab-use-after-free in __vsock_bind+0x62e/0x730\nRead of size 4 at addr ffff88816b46a74c by task a.out/2057\n dump_stack_lvl+0x68/0x90\n print_report+0x174/0x4f6\n kasan_report+0xb9/0x190\n __vsock_bind+0x62e/0x730\n vsock_bind+0x97/0xe0\n __sys_bind+0x154/0x1f0\n __x64_sys_bind+0x6e/0xb0\n do_syscall_64+0x93/0x1b0\n entry_SYSCALL_64_after_hwframe+0x76/0x7e\n\nAllocated by task 2057:\n kasan_save_stack+0x1e/0x40\n kasan_save_track+0x10/0x30\n __kasan_slab_alloc+0x85/0x90\n kmem_cache_alloc_noprof+0x131/0x450\n sk_prot_alloc+0x5b/0x220\n sk_alloc+0x2c/0x870\n __vsock_create.constprop.0+0x2e/0xb60\n vsock_create+0xe4/0x420\n __sock_create+0x241/0x650\n __sys_socket+0xf2/0x1a0\n __x64_sys_socket+0x6e/0xb0\n do_syscall_64+0x93/0x1b0\n entry_SYSCALL_64_after_hwframe+0x76/0x7e\n\nFreed by task 2057:\n kasan_save_stack+0x1e/0x40\n kasan_save_track+0x10/0x30\n kasan_save_free_info+0x37/0x60\n __kasan_slab_free+0x4b/0x70\n kmem_cache_free+0x1a1/0x590\n __sk_destruct+0x388/0x5a0\n __vsock_bind+0x5e1/0x730\n vsock_bind+0x97/0xe0\n __sys_bind+0x154/0x1f0\n __x64_sys_bind+0x6e/0xb0\n do_syscall_64+0x93/0x1b0\n entry_SYSCALL_64_after_hwframe+0x76/0x7e\n\nrefcount_t: addition on 0; use-after-free.\nWARNING: CPU: 7 PID: 2057 at lib/refcount.c:25 refcount_warn_saturate+0xce/0x150\nRIP: 0010:refcount_warn_saturate+0xce/0x150\n __vsock_bind+0x66d/0x730\n vsock_bind+0x97/0xe0\n __sys_bind+0x154/0x1f0\n __x64_sys_bind+0x6e/0xb0\n do_syscall_64+0x93/0x1b0\n entry_SYSCALL_64_after_hwframe+0x76/0x7e\n\nrefcount_t: underflow; use-after-free.\nWARNING: CPU: 7 PID: 2057 at lib/refcount.c:28 refcount_warn_saturate+0xee/0x150\nRIP: 0010:refcount_warn_saturate+0xee/0x150\n vsock_remove_bound+0x187/0x1e0\n __vsock_release+0x383/0x4a0\n vsock_release+0x90/0x120\n __sock_release+0xa3/0x250\n sock_close+0x14/0x20\n __fput+0x359/0xa80\n task_work_run+0x107/0x1d0\n do_exit+0x847/0x2560\n do_group_exit+0xb8/0x250\n __x64_sys_exit_group+0x3a/0x50\n x64_sys_call+0xfec/0x14f0\n do_syscall_64+0x93/0x1b0\n entry_SYSCALL_64_after_hwframe+0x76/0x7e",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "SUSE Linux Enterprise Micro 5.3:kernel-rt-5.14.21-150400.15.124.1.x86_64",
          "SUSE Linux Enterprise Micro 5.3:kernel-source-rt-5.14.21-150400.15.124.1.noarch",
          "SUSE Linux Enterprise Micro 5.4:kernel-rt-5.14.21-150400.15.124.1.x86_64",
          "SUSE Linux Enterprise Micro 5.4:kernel-source-rt-5.14.21-150400.15.124.1.noarch"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2025-21756",
          "url": "https://www.suse.com/security/cve/CVE-2025-21756"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1238876 for CVE-2025-21756",
          "url": "https://bugzilla.suse.com/1238876"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1245795 for CVE-2025-21756",
          "url": "https://bugzilla.suse.com/1245795"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "SUSE Linux Enterprise Micro 5.3:kernel-rt-5.14.21-150400.15.124.1.x86_64",
            "SUSE Linux Enterprise Micro 5.3:kernel-source-rt-5.14.21-150400.15.124.1.noarch",
            "SUSE Linux Enterprise Micro 5.4:kernel-rt-5.14.21-150400.15.124.1.x86_64",
            "SUSE Linux Enterprise Micro 5.4:kernel-source-rt-5.14.21-150400.15.124.1.noarch"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 7.8,
            "baseSeverity": "HIGH",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
            "version": "3.1"
          },
          "products": [
            "SUSE Linux Enterprise Micro 5.3:kernel-rt-5.14.21-150400.15.124.1.x86_64",
            "SUSE Linux Enterprise Micro 5.3:kernel-source-rt-5.14.21-150400.15.124.1.noarch",
            "SUSE Linux Enterprise Micro 5.4:kernel-rt-5.14.21-150400.15.124.1.x86_64",
            "SUSE Linux Enterprise Micro 5.4:kernel-source-rt-5.14.21-150400.15.124.1.noarch"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2025-07-15T14:31:46Z",
          "details": "important"
        }
      ],
      "title": "CVE-2025-21756"
    },
    {
      "cve": "CVE-2025-23141",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2025-23141"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "In the Linux kernel, the following vulnerability has been resolved:\n\nKVM: x86: Acquire SRCU in KVM_GET_MP_STATE to protect guest memory accesses\n\nAcquire a lock on kvm-\u003esrcu when userspace is getting MP state to handle a\nrather extreme edge case where \"accepting\" APIC events, i.e. processing\npending INIT or SIPI, can trigger accesses to guest memory.  If the vCPU\nis in L2 with INIT *and* a TRIPLE_FAULT request pending, then getting MP\nstate will trigger a nested VM-Exit by way of -\u003echeck_nested_events(), and\nemuating the nested VM-Exit can access guest memory.\n\nThe splat was originally hit by syzkaller on a Google-internal kernel, and\nreproduced on an upstream kernel by hacking the triple_fault_event_test\nselftest to stuff a pending INIT, store an MSR on VM-Exit (to generate a\nmemory access on VMX), and do vcpu_mp_state_get() to trigger the scenario.\n\n  =============================\n  WARNING: suspicious RCU usage\n  6.14.0-rc3-b112d356288b-vmx/pi_lockdep_false_pos-lock #3 Not tainted\n  -----------------------------\n  include/linux/kvm_host.h:1058 suspicious rcu_dereference_check() usage!\n\n  other info that might help us debug this:\n\n  rcu_scheduler_active = 2, debug_locks = 1\n  1 lock held by triple_fault_ev/1256:\n   #0: ffff88810df5a330 (\u0026vcpu-\u003emutex){+.+.}-{4:4}, at: kvm_vcpu_ioctl+0x8b/0x9a0 [kvm]\n\n  stack backtrace:\n  CPU: 11 UID: 1000 PID: 1256 Comm: triple_fault_ev Not tainted 6.14.0-rc3-b112d356288b-vmx #3\n  Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 0.0.0 02/06/2015\n  Call Trace:\n   \u003cTASK\u003e\n   dump_stack_lvl+0x7f/0x90\n   lockdep_rcu_suspicious+0x144/0x190\n   kvm_vcpu_gfn_to_memslot+0x156/0x180 [kvm]\n   kvm_vcpu_read_guest+0x3e/0x90 [kvm]\n   read_and_check_msr_entry+0x2e/0x180 [kvm_intel]\n   __nested_vmx_vmexit+0x550/0xde0 [kvm_intel]\n   kvm_check_nested_events+0x1b/0x30 [kvm]\n   kvm_apic_accept_events+0x33/0x100 [kvm]\n   kvm_arch_vcpu_ioctl_get_mpstate+0x30/0x1d0 [kvm]\n   kvm_vcpu_ioctl+0x33e/0x9a0 [kvm]\n   __x64_sys_ioctl+0x8b/0xb0\n   do_syscall_64+0x6c/0x170\n   entry_SYSCALL_64_after_hwframe+0x4b/0x53\n   \u003c/TASK\u003e",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "SUSE Linux Enterprise Micro 5.3:kernel-rt-5.14.21-150400.15.124.1.x86_64",
          "SUSE Linux Enterprise Micro 5.3:kernel-source-rt-5.14.21-150400.15.124.1.noarch",
          "SUSE Linux Enterprise Micro 5.4:kernel-rt-5.14.21-150400.15.124.1.x86_64",
          "SUSE Linux Enterprise Micro 5.4:kernel-source-rt-5.14.21-150400.15.124.1.noarch"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2025-23141",
          "url": "https://www.suse.com/security/cve/CVE-2025-23141"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1242782 for CVE-2025-23141",
          "url": "https://bugzilla.suse.com/1242782"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "SUSE Linux Enterprise Micro 5.3:kernel-rt-5.14.21-150400.15.124.1.x86_64",
            "SUSE Linux Enterprise Micro 5.3:kernel-source-rt-5.14.21-150400.15.124.1.noarch",
            "SUSE Linux Enterprise Micro 5.4:kernel-rt-5.14.21-150400.15.124.1.x86_64",
            "SUSE Linux Enterprise Micro 5.4:kernel-source-rt-5.14.21-150400.15.124.1.noarch"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 5.5,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
            "version": "3.1"
          },
          "products": [
            "SUSE Linux Enterprise Micro 5.3:kernel-rt-5.14.21-150400.15.124.1.x86_64",
            "SUSE Linux Enterprise Micro 5.3:kernel-source-rt-5.14.21-150400.15.124.1.noarch",
            "SUSE Linux Enterprise Micro 5.4:kernel-rt-5.14.21-150400.15.124.1.x86_64",
            "SUSE Linux Enterprise Micro 5.4:kernel-source-rt-5.14.21-150400.15.124.1.noarch"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2025-07-15T14:31:46Z",
          "details": "moderate"
        }
      ],
      "title": "CVE-2025-23141"
    },
    {
      "cve": "CVE-2025-23145",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2025-23145"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "In the Linux kernel, the following vulnerability has been resolved:\n\nmptcp: fix NULL pointer in can_accept_new_subflow\n\nWhen testing valkey benchmark tool with MPTCP, the kernel panics in\n\u0027mptcp_can_accept_new_subflow\u0027 because subflow_req-\u003emsk is NULL.\n\nCall trace:\n\n  mptcp_can_accept_new_subflow (./net/mptcp/subflow.c:63 (discriminator 4)) (P)\n  subflow_syn_recv_sock (./net/mptcp/subflow.c:854)\n  tcp_check_req (./net/ipv4/tcp_minisocks.c:863)\n  tcp_v4_rcv (./net/ipv4/tcp_ipv4.c:2268)\n  ip_protocol_deliver_rcu (./net/ipv4/ip_input.c:207)\n  ip_local_deliver_finish (./net/ipv4/ip_input.c:234)\n  ip_local_deliver (./net/ipv4/ip_input.c:254)\n  ip_rcv_finish (./net/ipv4/ip_input.c:449)\n  ...\n\nAccording to the debug log, the same req received two SYN-ACK in a very\nshort time, very likely because the client retransmits the syn ack due\nto multiple reasons.\n\nEven if the packets are transmitted with a relevant time interval, they\ncan be processed by the server on different CPUs concurrently). The\n\u0027subflow_req-\u003emsk\u0027 ownership is transferred to the subflow the first,\nand there will be a risk of a null pointer dereference here.\n\nThis patch fixes this issue by moving the \u0027subflow_req-\u003emsk\u0027 under the\n`own_req == true` conditional.\n\nNote that the !msk check in subflow_hmac_valid() can be dropped, because\nthe same check already exists under the own_req mpj branch where the\ncode has been moved to.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "SUSE Linux Enterprise Micro 5.3:kernel-rt-5.14.21-150400.15.124.1.x86_64",
          "SUSE Linux Enterprise Micro 5.3:kernel-source-rt-5.14.21-150400.15.124.1.noarch",
          "SUSE Linux Enterprise Micro 5.4:kernel-rt-5.14.21-150400.15.124.1.x86_64",
          "SUSE Linux Enterprise Micro 5.4:kernel-source-rt-5.14.21-150400.15.124.1.noarch"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2025-23145",
          "url": "https://www.suse.com/security/cve/CVE-2025-23145"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1242596 for CVE-2025-23145",
          "url": "https://bugzilla.suse.com/1242596"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1242882 for CVE-2025-23145",
          "url": "https://bugzilla.suse.com/1242882"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "SUSE Linux Enterprise Micro 5.3:kernel-rt-5.14.21-150400.15.124.1.x86_64",
            "SUSE Linux Enterprise Micro 5.3:kernel-source-rt-5.14.21-150400.15.124.1.noarch",
            "SUSE Linux Enterprise Micro 5.4:kernel-rt-5.14.21-150400.15.124.1.x86_64",
            "SUSE Linux Enterprise Micro 5.4:kernel-source-rt-5.14.21-150400.15.124.1.noarch"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 7.5,
            "baseSeverity": "HIGH",
            "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
            "version": "3.1"
          },
          "products": [
            "SUSE Linux Enterprise Micro 5.3:kernel-rt-5.14.21-150400.15.124.1.x86_64",
            "SUSE Linux Enterprise Micro 5.3:kernel-source-rt-5.14.21-150400.15.124.1.noarch",
            "SUSE Linux Enterprise Micro 5.4:kernel-rt-5.14.21-150400.15.124.1.x86_64",
            "SUSE Linux Enterprise Micro 5.4:kernel-source-rt-5.14.21-150400.15.124.1.noarch"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2025-07-15T14:31:46Z",
          "details": "important"
        }
      ],
      "title": "CVE-2025-23145"
    },
    {
      "cve": "CVE-2025-37752",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2025-37752"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "In the Linux kernel, the following vulnerability has been resolved:\n\nnet_sched: sch_sfq: move the limit validation\n\nIt is not sufficient to directly validate the limit on the data that\nthe user passes as it can be updated based on how the other parameters\nare changed.\n\nMove the check at the end of the configuration update process to also\ncatch scenarios where the limit is indirectly updated, for example\nwith the following configurations:\n\ntc qdisc add dev dummy0 handle 1: root sfq limit 2 flows 1 depth 1\ntc qdisc add dev dummy0 handle 1: root sfq limit 2 flows 1 divisor 1\n\nThis fixes the following syzkaller reported crash:\n\n------------[ cut here ]------------\nUBSAN: array-index-out-of-bounds in net/sched/sch_sfq.c:203:6\nindex 65535 is out of range for type \u0027struct sfq_head[128]\u0027\nCPU: 1 UID: 0 PID: 3037 Comm: syz.2.16 Not tainted 6.14.0-rc2-syzkaller #0\nHardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 12/27/2024\nCall Trace:\n \u003cTASK\u003e\n __dump_stack lib/dump_stack.c:94 [inline]\n dump_stack_lvl+0x201/0x300 lib/dump_stack.c:120\n ubsan_epilogue lib/ubsan.c:231 [inline]\n __ubsan_handle_out_of_bounds+0xf5/0x120 lib/ubsan.c:429\n sfq_link net/sched/sch_sfq.c:203 [inline]\n sfq_dec+0x53c/0x610 net/sched/sch_sfq.c:231\n sfq_dequeue+0x34e/0x8c0 net/sched/sch_sfq.c:493\n sfq_reset+0x17/0x60 net/sched/sch_sfq.c:518\n qdisc_reset+0x12e/0x600 net/sched/sch_generic.c:1035\n tbf_reset+0x41/0x110 net/sched/sch_tbf.c:339\n qdisc_reset+0x12e/0x600 net/sched/sch_generic.c:1035\n dev_reset_queue+0x100/0x1b0 net/sched/sch_generic.c:1311\n netdev_for_each_tx_queue include/linux/netdevice.h:2590 [inline]\n dev_deactivate_many+0x7e5/0xe70 net/sched/sch_generic.c:1375",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "SUSE Linux Enterprise Micro 5.3:kernel-rt-5.14.21-150400.15.124.1.x86_64",
          "SUSE Linux Enterprise Micro 5.3:kernel-source-rt-5.14.21-150400.15.124.1.noarch",
          "SUSE Linux Enterprise Micro 5.4:kernel-rt-5.14.21-150400.15.124.1.x86_64",
          "SUSE Linux Enterprise Micro 5.4:kernel-source-rt-5.14.21-150400.15.124.1.noarch"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2025-37752",
          "url": "https://www.suse.com/security/cve/CVE-2025-37752"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1242504 for CVE-2025-37752",
          "url": "https://bugzilla.suse.com/1242504"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1245776 for CVE-2025-37752",
          "url": "https://bugzilla.suse.com/1245776"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "SUSE Linux Enterprise Micro 5.3:kernel-rt-5.14.21-150400.15.124.1.x86_64",
            "SUSE Linux Enterprise Micro 5.3:kernel-source-rt-5.14.21-150400.15.124.1.noarch",
            "SUSE Linux Enterprise Micro 5.4:kernel-rt-5.14.21-150400.15.124.1.x86_64",
            "SUSE Linux Enterprise Micro 5.4:kernel-source-rt-5.14.21-150400.15.124.1.noarch"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 7,
            "baseSeverity": "HIGH",
            "vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H",
            "version": "3.1"
          },
          "products": [
            "SUSE Linux Enterprise Micro 5.3:kernel-rt-5.14.21-150400.15.124.1.x86_64",
            "SUSE Linux Enterprise Micro 5.3:kernel-source-rt-5.14.21-150400.15.124.1.noarch",
            "SUSE Linux Enterprise Micro 5.4:kernel-rt-5.14.21-150400.15.124.1.x86_64",
            "SUSE Linux Enterprise Micro 5.4:kernel-source-rt-5.14.21-150400.15.124.1.noarch"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2025-07-15T14:31:46Z",
          "details": "moderate"
        }
      ],
      "title": "CVE-2025-37752"
    },
    {
      "cve": "CVE-2025-37797",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2025-37797"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "In the Linux kernel, the following vulnerability has been resolved:\n\nnet_sched: hfsc: Fix a UAF vulnerability in class handling\n\nThis patch fixes a Use-After-Free vulnerability in the HFSC qdisc class\nhandling. The issue occurs due to a time-of-check/time-of-use condition\nin hfsc_change_class() when working with certain child qdiscs like netem\nor codel.\n\nThe vulnerability works as follows:\n1. hfsc_change_class() checks if a class has packets (q.qlen != 0)\n2. It then calls qdisc_peek_len(), which for certain qdiscs (e.g.,\n   codel, netem) might drop packets and empty the queue\n3. The code continues assuming the queue is still non-empty, adding\n   the class to vttree\n4. This breaks HFSC scheduler assumptions that only non-empty classes\n   are in vttree\n5. Later, when the class is destroyed, this can lead to a Use-After-Free\n\nThe fix adds a second queue length check after qdisc_peek_len() to verify\nthe queue wasn\u0027t emptied.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "SUSE Linux Enterprise Micro 5.3:kernel-rt-5.14.21-150400.15.124.1.x86_64",
          "SUSE Linux Enterprise Micro 5.3:kernel-source-rt-5.14.21-150400.15.124.1.noarch",
          "SUSE Linux Enterprise Micro 5.4:kernel-rt-5.14.21-150400.15.124.1.x86_64",
          "SUSE Linux Enterprise Micro 5.4:kernel-source-rt-5.14.21-150400.15.124.1.noarch"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2025-37797",
          "url": "https://www.suse.com/security/cve/CVE-2025-37797"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1242417 for CVE-2025-37797",
          "url": "https://bugzilla.suse.com/1242417"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1245793 for CVE-2025-37797",
          "url": "https://bugzilla.suse.com/1245793"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "SUSE Linux Enterprise Micro 5.3:kernel-rt-5.14.21-150400.15.124.1.x86_64",
            "SUSE Linux Enterprise Micro 5.3:kernel-source-rt-5.14.21-150400.15.124.1.noarch",
            "SUSE Linux Enterprise Micro 5.4:kernel-rt-5.14.21-150400.15.124.1.x86_64",
            "SUSE Linux Enterprise Micro 5.4:kernel-source-rt-5.14.21-150400.15.124.1.noarch"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 7.8,
            "baseSeverity": "HIGH",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
            "version": "3.1"
          },
          "products": [
            "SUSE Linux Enterprise Micro 5.3:kernel-rt-5.14.21-150400.15.124.1.x86_64",
            "SUSE Linux Enterprise Micro 5.3:kernel-source-rt-5.14.21-150400.15.124.1.noarch",
            "SUSE Linux Enterprise Micro 5.4:kernel-rt-5.14.21-150400.15.124.1.x86_64",
            "SUSE Linux Enterprise Micro 5.4:kernel-source-rt-5.14.21-150400.15.124.1.noarch"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2025-07-15T14:31:46Z",
          "details": "important"
        }
      ],
      "title": "CVE-2025-37797"
    },
    {
      "cve": "CVE-2025-37798",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2025-37798"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "In the Linux kernel, the following vulnerability has been resolved:\n\ncodel: remove sch-\u003eq.qlen check before qdisc_tree_reduce_backlog()\n\nAfter making all -\u003eqlen_notify() callbacks idempotent, now it is safe to\nremove the check of qlen!=0 from both fq_codel_dequeue() and\ncodel_qdisc_dequeue().",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "SUSE Linux Enterprise Micro 5.3:kernel-rt-5.14.21-150400.15.124.1.x86_64",
          "SUSE Linux Enterprise Micro 5.3:kernel-source-rt-5.14.21-150400.15.124.1.noarch",
          "SUSE Linux Enterprise Micro 5.4:kernel-rt-5.14.21-150400.15.124.1.x86_64",
          "SUSE Linux Enterprise Micro 5.4:kernel-source-rt-5.14.21-150400.15.124.1.noarch"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2025-37798",
          "url": "https://www.suse.com/security/cve/CVE-2025-37798"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1242414 for CVE-2025-37798",
          "url": "https://bugzilla.suse.com/1242414"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1242417 for CVE-2025-37798",
          "url": "https://bugzilla.suse.com/1242417"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "SUSE Linux Enterprise Micro 5.3:kernel-rt-5.14.21-150400.15.124.1.x86_64",
            "SUSE Linux Enterprise Micro 5.3:kernel-source-rt-5.14.21-150400.15.124.1.noarch",
            "SUSE Linux Enterprise Micro 5.4:kernel-rt-5.14.21-150400.15.124.1.x86_64",
            "SUSE Linux Enterprise Micro 5.4:kernel-source-rt-5.14.21-150400.15.124.1.noarch"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 7.8,
            "baseSeverity": "HIGH",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
            "version": "3.1"
          },
          "products": [
            "SUSE Linux Enterprise Micro 5.3:kernel-rt-5.14.21-150400.15.124.1.x86_64",
            "SUSE Linux Enterprise Micro 5.3:kernel-source-rt-5.14.21-150400.15.124.1.noarch",
            "SUSE Linux Enterprise Micro 5.4:kernel-rt-5.14.21-150400.15.124.1.x86_64",
            "SUSE Linux Enterprise Micro 5.4:kernel-source-rt-5.14.21-150400.15.124.1.noarch"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2025-07-15T14:31:46Z",
          "details": "important"
        }
      ],
      "title": "CVE-2025-37798"
    },
    {
      "cve": "CVE-2025-37823",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2025-37823"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "In the Linux kernel, the following vulnerability has been resolved:\n\nnet_sched: hfsc: Fix a potential UAF in hfsc_dequeue() too\n\nSimilarly to the previous patch, we need to safe guard hfsc_dequeue()\ntoo. But for this one, we don\u0027t have a reliable reproducer.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "SUSE Linux Enterprise Micro 5.3:kernel-rt-5.14.21-150400.15.124.1.x86_64",
          "SUSE Linux Enterprise Micro 5.3:kernel-source-rt-5.14.21-150400.15.124.1.noarch",
          "SUSE Linux Enterprise Micro 5.4:kernel-rt-5.14.21-150400.15.124.1.x86_64",
          "SUSE Linux Enterprise Micro 5.4:kernel-source-rt-5.14.21-150400.15.124.1.noarch"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2025-37823",
          "url": "https://www.suse.com/security/cve/CVE-2025-37823"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1242924 for CVE-2025-37823",
          "url": "https://bugzilla.suse.com/1242924"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "SUSE Linux Enterprise Micro 5.3:kernel-rt-5.14.21-150400.15.124.1.x86_64",
            "SUSE Linux Enterprise Micro 5.3:kernel-source-rt-5.14.21-150400.15.124.1.noarch",
            "SUSE Linux Enterprise Micro 5.4:kernel-rt-5.14.21-150400.15.124.1.x86_64",
            "SUSE Linux Enterprise Micro 5.4:kernel-source-rt-5.14.21-150400.15.124.1.noarch"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 5.5,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
            "version": "3.1"
          },
          "products": [
            "SUSE Linux Enterprise Micro 5.3:kernel-rt-5.14.21-150400.15.124.1.x86_64",
            "SUSE Linux Enterprise Micro 5.3:kernel-source-rt-5.14.21-150400.15.124.1.noarch",
            "SUSE Linux Enterprise Micro 5.4:kernel-rt-5.14.21-150400.15.124.1.x86_64",
            "SUSE Linux Enterprise Micro 5.4:kernel-source-rt-5.14.21-150400.15.124.1.noarch"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2025-07-15T14:31:46Z",
          "details": "moderate"
        }
      ],
      "title": "CVE-2025-37823"
    },
    {
      "cve": "CVE-2025-37890",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2025-37890"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "In the Linux kernel, the following vulnerability has been resolved:\n\nnet_sched: hfsc: Fix a UAF vulnerability in class with netem as child qdisc\n\nAs described in Gerrard\u0027s report [1], we have a UAF case when an hfsc class\nhas a netem child qdisc. The crux of the issue is that hfsc is assuming\nthat checking for cl-\u003eqdisc-\u003eq.qlen == 0 guarantees that it hasn\u0027t inserted\nthe class in the vttree or eltree (which is not true for the netem\nduplicate case).\n\nThis patch checks the n_active class variable to make sure that the code\nwon\u0027t insert the class in the vttree or eltree twice, catering for the\nreentrant case.\n\n[1] https://lore.kernel.org/netdev/CAHcdcOm+03OD2j6R0=YHKqmy=VgJ8xEOKuP6c7mSgnp-TEJJbw@mail.gmail.com/",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "SUSE Linux Enterprise Micro 5.3:kernel-rt-5.14.21-150400.15.124.1.x86_64",
          "SUSE Linux Enterprise Micro 5.3:kernel-source-rt-5.14.21-150400.15.124.1.noarch",
          "SUSE Linux Enterprise Micro 5.4:kernel-rt-5.14.21-150400.15.124.1.x86_64",
          "SUSE Linux Enterprise Micro 5.4:kernel-source-rt-5.14.21-150400.15.124.1.noarch"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2025-37890",
          "url": "https://www.suse.com/security/cve/CVE-2025-37890"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1243330 for CVE-2025-37890",
          "url": "https://bugzilla.suse.com/1243330"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1245791 for CVE-2025-37890",
          "url": "https://bugzilla.suse.com/1245791"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "SUSE Linux Enterprise Micro 5.3:kernel-rt-5.14.21-150400.15.124.1.x86_64",
            "SUSE Linux Enterprise Micro 5.3:kernel-source-rt-5.14.21-150400.15.124.1.noarch",
            "SUSE Linux Enterprise Micro 5.4:kernel-rt-5.14.21-150400.15.124.1.x86_64",
            "SUSE Linux Enterprise Micro 5.4:kernel-source-rt-5.14.21-150400.15.124.1.noarch"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 7,
            "baseSeverity": "HIGH",
            "vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H",
            "version": "3.1"
          },
          "products": [
            "SUSE Linux Enterprise Micro 5.3:kernel-rt-5.14.21-150400.15.124.1.x86_64",
            "SUSE Linux Enterprise Micro 5.3:kernel-source-rt-5.14.21-150400.15.124.1.noarch",
            "SUSE Linux Enterprise Micro 5.4:kernel-rt-5.14.21-150400.15.124.1.x86_64",
            "SUSE Linux Enterprise Micro 5.4:kernel-source-rt-5.14.21-150400.15.124.1.noarch"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2025-07-15T14:31:46Z",
          "details": "moderate"
        }
      ],
      "title": "CVE-2025-37890"
    },
    {
      "cve": "CVE-2025-37932",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2025-37932"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "In the Linux kernel, the following vulnerability has been resolved:\n\nsch_htb: make htb_qlen_notify() idempotent\n\nhtb_qlen_notify() always deactivates the HTB class and in fact could\ntrigger a warning if it is already deactivated. Therefore, it is not\nidempotent and not friendly to its callers, like fq_codel_dequeue().\n\nLet\u0027s make it idempotent to ease qdisc_tree_reduce_backlog() callers\u0027\nlife.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "SUSE Linux Enterprise Micro 5.3:kernel-rt-5.14.21-150400.15.124.1.x86_64",
          "SUSE Linux Enterprise Micro 5.3:kernel-source-rt-5.14.21-150400.15.124.1.noarch",
          "SUSE Linux Enterprise Micro 5.4:kernel-rt-5.14.21-150400.15.124.1.x86_64",
          "SUSE Linux Enterprise Micro 5.4:kernel-source-rt-5.14.21-150400.15.124.1.noarch"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2025-37932",
          "url": "https://www.suse.com/security/cve/CVE-2025-37932"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1243627 for CVE-2025-37932",
          "url": "https://bugzilla.suse.com/1243627"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "SUSE Linux Enterprise Micro 5.3:kernel-rt-5.14.21-150400.15.124.1.x86_64",
            "SUSE Linux Enterprise Micro 5.3:kernel-source-rt-5.14.21-150400.15.124.1.noarch",
            "SUSE Linux Enterprise Micro 5.4:kernel-rt-5.14.21-150400.15.124.1.x86_64",
            "SUSE Linux Enterprise Micro 5.4:kernel-source-rt-5.14.21-150400.15.124.1.noarch"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 0,
            "baseSeverity": "NONE",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:N",
            "version": "3.1"
          },
          "products": [
            "SUSE Linux Enterprise Micro 5.3:kernel-rt-5.14.21-150400.15.124.1.x86_64",
            "SUSE Linux Enterprise Micro 5.3:kernel-source-rt-5.14.21-150400.15.124.1.noarch",
            "SUSE Linux Enterprise Micro 5.4:kernel-rt-5.14.21-150400.15.124.1.x86_64",
            "SUSE Linux Enterprise Micro 5.4:kernel-source-rt-5.14.21-150400.15.124.1.noarch"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2025-07-15T14:31:46Z",
          "details": "low"
        }
      ],
      "title": "CVE-2025-37932"
    },
    {
      "cve": "CVE-2025-37953",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2025-37953"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "In the Linux kernel, the following vulnerability has been resolved:\n\nsch_htb: make htb_deactivate() idempotent\n\nAlan reported a NULL pointer dereference in htb_next_rb_node()\nafter we made htb_qlen_notify() idempotent.\n\nIt turns out in the following case it introduced some regression:\n\nhtb_dequeue_tree():\n  |-\u003e fq_codel_dequeue()\n    |-\u003e qdisc_tree_reduce_backlog()\n      |-\u003e htb_qlen_notify()\n        |-\u003e htb_deactivate()\n  |-\u003e htb_next_rb_node()\n  |-\u003e htb_deactivate()\n\nFor htb_next_rb_node(), after calling the 1st htb_deactivate(), the\nclprio[prio]-\u003eptr could be already set to  NULL, which means\nhtb_next_rb_node() is vulnerable here.\n\nFor htb_deactivate(), although we checked qlen before calling it, in\ncase of qlen==0 after qdisc_tree_reduce_backlog(), we may call it again\nwhich triggers the warning inside.\n\nTo fix the issues here, we need to:\n\n1) Make htb_deactivate() idempotent, that is, simply return if we\n   already call it before.\n2) Make htb_next_rb_node() safe against ptr==NULL.\n\nMany thanks to Alan for testing and for the reproducer.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "SUSE Linux Enterprise Micro 5.3:kernel-rt-5.14.21-150400.15.124.1.x86_64",
          "SUSE Linux Enterprise Micro 5.3:kernel-source-rt-5.14.21-150400.15.124.1.noarch",
          "SUSE Linux Enterprise Micro 5.4:kernel-rt-5.14.21-150400.15.124.1.x86_64",
          "SUSE Linux Enterprise Micro 5.4:kernel-source-rt-5.14.21-150400.15.124.1.noarch"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2025-37953",
          "url": "https://www.suse.com/security/cve/CVE-2025-37953"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1243543 for CVE-2025-37953",
          "url": "https://bugzilla.suse.com/1243543"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "SUSE Linux Enterprise Micro 5.3:kernel-rt-5.14.21-150400.15.124.1.x86_64",
            "SUSE Linux Enterprise Micro 5.3:kernel-source-rt-5.14.21-150400.15.124.1.noarch",
            "SUSE Linux Enterprise Micro 5.4:kernel-rt-5.14.21-150400.15.124.1.x86_64",
            "SUSE Linux Enterprise Micro 5.4:kernel-source-rt-5.14.21-150400.15.124.1.noarch"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 5.5,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
            "version": "3.1"
          },
          "products": [
            "SUSE Linux Enterprise Micro 5.3:kernel-rt-5.14.21-150400.15.124.1.x86_64",
            "SUSE Linux Enterprise Micro 5.3:kernel-source-rt-5.14.21-150400.15.124.1.noarch",
            "SUSE Linux Enterprise Micro 5.4:kernel-rt-5.14.21-150400.15.124.1.x86_64",
            "SUSE Linux Enterprise Micro 5.4:kernel-source-rt-5.14.21-150400.15.124.1.noarch"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2025-07-15T14:31:46Z",
          "details": "moderate"
        }
      ],
      "title": "CVE-2025-37953"
    },
    {
      "cve": "CVE-2025-37997",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2025-37997"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "In the Linux kernel, the following vulnerability has been resolved:\n\nnetfilter: ipset: fix region locking in hash types\n\nRegion locking introduced in v5.6-rc4 contained three macros to handle\nthe region locks: ahash_bucket_start(), ahash_bucket_end() which gave\nback the start and end hash bucket values belonging to a given region\nlock and ahash_region() which should give back the region lock belonging\nto a given hash bucket. The latter was incorrect which can lead to a\nrace condition between the garbage collector and adding new elements\nwhen a hash type of set is defined with timeouts.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "SUSE Linux Enterprise Micro 5.3:kernel-rt-5.14.21-150400.15.124.1.x86_64",
          "SUSE Linux Enterprise Micro 5.3:kernel-source-rt-5.14.21-150400.15.124.1.noarch",
          "SUSE Linux Enterprise Micro 5.4:kernel-rt-5.14.21-150400.15.124.1.x86_64",
          "SUSE Linux Enterprise Micro 5.4:kernel-source-rt-5.14.21-150400.15.124.1.noarch"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2025-37997",
          "url": "https://www.suse.com/security/cve/CVE-2025-37997"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1243832 for CVE-2025-37997",
          "url": "https://bugzilla.suse.com/1243832"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1245774 for CVE-2025-37997",
          "url": "https://bugzilla.suse.com/1245774"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "SUSE Linux Enterprise Micro 5.3:kernel-rt-5.14.21-150400.15.124.1.x86_64",
            "SUSE Linux Enterprise Micro 5.3:kernel-source-rt-5.14.21-150400.15.124.1.noarch",
            "SUSE Linux Enterprise Micro 5.4:kernel-rt-5.14.21-150400.15.124.1.x86_64",
            "SUSE Linux Enterprise Micro 5.4:kernel-source-rt-5.14.21-150400.15.124.1.noarch"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 7,
            "baseSeverity": "HIGH",
            "vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H",
            "version": "3.1"
          },
          "products": [
            "SUSE Linux Enterprise Micro 5.3:kernel-rt-5.14.21-150400.15.124.1.x86_64",
            "SUSE Linux Enterprise Micro 5.3:kernel-source-rt-5.14.21-150400.15.124.1.noarch",
            "SUSE Linux Enterprise Micro 5.4:kernel-rt-5.14.21-150400.15.124.1.x86_64",
            "SUSE Linux Enterprise Micro 5.4:kernel-source-rt-5.14.21-150400.15.124.1.noarch"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2025-07-15T14:31:46Z",
          "details": "moderate"
        }
      ],
      "title": "CVE-2025-37997"
    },
    {
      "cve": "CVE-2025-38000",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2025-38000"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "In the Linux kernel, the following vulnerability has been resolved:\n\nsch_hfsc: Fix qlen accounting bug when using peek in hfsc_enqueue()\n\nWhen enqueuing the first packet to an HFSC class, hfsc_enqueue() calls the\nchild qdisc\u0027s peek() operation before incrementing sch-\u003eq.qlen and\nsch-\u003eqstats.backlog. If the child qdisc uses qdisc_peek_dequeued(), this may\ntrigger an immediate dequeue and potential packet drop. In such cases,\nqdisc_tree_reduce_backlog() is called, but the HFSC qdisc\u0027s qlen and backlog\nhave not yet been updated, leading to inconsistent queue accounting. This\ncan leave an empty HFSC class in the active list, causing further\nconsequences like use-after-free.\n\nThis patch fixes the bug by moving the increment of sch-\u003eq.qlen and\nsch-\u003eqstats.backlog before the call to the child qdisc\u0027s peek() operation.\nThis ensures that queue length and backlog are always accurate when packet\ndrops or dequeues are triggered during the peek.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "SUSE Linux Enterprise Micro 5.3:kernel-rt-5.14.21-150400.15.124.1.x86_64",
          "SUSE Linux Enterprise Micro 5.3:kernel-source-rt-5.14.21-150400.15.124.1.noarch",
          "SUSE Linux Enterprise Micro 5.4:kernel-rt-5.14.21-150400.15.124.1.x86_64",
          "SUSE Linux Enterprise Micro 5.4:kernel-source-rt-5.14.21-150400.15.124.1.noarch"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2025-38000",
          "url": "https://www.suse.com/security/cve/CVE-2025-38000"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1244277 for CVE-2025-38000",
          "url": "https://bugzilla.suse.com/1244277"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1245775 for CVE-2025-38000",
          "url": "https://bugzilla.suse.com/1245775"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "SUSE Linux Enterprise Micro 5.3:kernel-rt-5.14.21-150400.15.124.1.x86_64",
            "SUSE Linux Enterprise Micro 5.3:kernel-source-rt-5.14.21-150400.15.124.1.noarch",
            "SUSE Linux Enterprise Micro 5.4:kernel-rt-5.14.21-150400.15.124.1.x86_64",
            "SUSE Linux Enterprise Micro 5.4:kernel-source-rt-5.14.21-150400.15.124.1.noarch"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 7,
            "baseSeverity": "HIGH",
            "vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H",
            "version": "3.1"
          },
          "products": [
            "SUSE Linux Enterprise Micro 5.3:kernel-rt-5.14.21-150400.15.124.1.x86_64",
            "SUSE Linux Enterprise Micro 5.3:kernel-source-rt-5.14.21-150400.15.124.1.noarch",
            "SUSE Linux Enterprise Micro 5.4:kernel-rt-5.14.21-150400.15.124.1.x86_64",
            "SUSE Linux Enterprise Micro 5.4:kernel-source-rt-5.14.21-150400.15.124.1.noarch"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2025-07-15T14:31:46Z",
          "details": "important"
        }
      ],
      "title": "CVE-2025-38000"
    },
    {
      "cve": "CVE-2025-38001",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2025-38001"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "In the Linux kernel, the following vulnerability has been resolved:\n\nnet_sched: hfsc: Address reentrant enqueue adding class to eltree twice\n\nSavino says:\n    \"We are writing to report that this recent patch\n    (141d34391abbb315d68556b7c67ad97885407547) [1]\n    can be bypassed, and a UAF can still occur when HFSC is utilized with\n    NETEM.\n\n    The patch only checks the cl-\u003ecl_nactive field to determine whether\n    it is the first insertion or not [2], but this field is only\n    incremented by init_vf [3].\n\n    By using HFSC_RSC (which uses init_ed) [4], it is possible to bypass the\n    check and insert the class twice in the eltree.\n    Under normal conditions, this would lead to an infinite loop in\n    hfsc_dequeue for the reasons we already explained in this report [5].\n\n    However, if TBF is added as root qdisc and it is configured with a\n    very low rate,\n    it can be utilized to prevent packets from being dequeued.\n    This behavior can be exploited to perform subsequent insertions in the\n    HFSC eltree and cause a UAF.\"\n\nTo fix both the UAF and the infinite loop, with netem as an hfsc child,\ncheck explicitly in hfsc_enqueue whether the class is already in the eltree\nwhenever the HFSC_RSC flag is set.\n\n[1] https://web.git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=141d34391abbb315d68556b7c67ad97885407547\n[2] https://elixir.bootlin.com/linux/v6.15-rc5/source/net/sched/sch_hfsc.c#L1572\n[3] https://elixir.bootlin.com/linux/v6.15-rc5/source/net/sched/sch_hfsc.c#L677\n[4] https://elixir.bootlin.com/linux/v6.15-rc5/source/net/sched/sch_hfsc.c#L1574\n[5] https://lore.kernel.org/netdev/8DuRWwfqjoRDLDmBMlIfbrsZg9Gx50DHJc1ilxsEBNe2D6NMoigR_eIRIG0LOjMc3r10nUUZtArXx4oZBIdUfZQrwjcQhdinnMis_0G7VEk=@willsroot.io/T/#u",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "SUSE Linux Enterprise Micro 5.3:kernel-rt-5.14.21-150400.15.124.1.x86_64",
          "SUSE Linux Enterprise Micro 5.3:kernel-source-rt-5.14.21-150400.15.124.1.noarch",
          "SUSE Linux Enterprise Micro 5.4:kernel-rt-5.14.21-150400.15.124.1.x86_64",
          "SUSE Linux Enterprise Micro 5.4:kernel-source-rt-5.14.21-150400.15.124.1.noarch"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2025-38001",
          "url": "https://www.suse.com/security/cve/CVE-2025-38001"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1244234 for CVE-2025-38001",
          "url": "https://bugzilla.suse.com/1244234"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1244235 for CVE-2025-38001",
          "url": "https://bugzilla.suse.com/1244235"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "SUSE Linux Enterprise Micro 5.3:kernel-rt-5.14.21-150400.15.124.1.x86_64",
            "SUSE Linux Enterprise Micro 5.3:kernel-source-rt-5.14.21-150400.15.124.1.noarch",
            "SUSE Linux Enterprise Micro 5.4:kernel-rt-5.14.21-150400.15.124.1.x86_64",
            "SUSE Linux Enterprise Micro 5.4:kernel-source-rt-5.14.21-150400.15.124.1.noarch"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 7.8,
            "baseSeverity": "HIGH",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
            "version": "3.1"
          },
          "products": [
            "SUSE Linux Enterprise Micro 5.3:kernel-rt-5.14.21-150400.15.124.1.x86_64",
            "SUSE Linux Enterprise Micro 5.3:kernel-source-rt-5.14.21-150400.15.124.1.noarch",
            "SUSE Linux Enterprise Micro 5.4:kernel-rt-5.14.21-150400.15.124.1.x86_64",
            "SUSE Linux Enterprise Micro 5.4:kernel-source-rt-5.14.21-150400.15.124.1.noarch"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2025-07-15T14:31:46Z",
          "details": "important"
        }
      ],
      "title": "CVE-2025-38001"
    },
    {
      "cve": "CVE-2025-38014",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2025-38014"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "In the Linux kernel, the following vulnerability has been resolved:\n\ndmaengine: idxd: Refactor remove call with idxd_cleanup() helper\n\nThe idxd_cleanup() helper cleans up perfmon, interrupts, internals and\nso on. Refactor remove call with the idxd_cleanup() helper to avoid code\nduplication. Note, this also fixes the missing put_device() for idxd\ngroups, enginces and wqs.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "SUSE Linux Enterprise Micro 5.3:kernel-rt-5.14.21-150400.15.124.1.x86_64",
          "SUSE Linux Enterprise Micro 5.3:kernel-source-rt-5.14.21-150400.15.124.1.noarch",
          "SUSE Linux Enterprise Micro 5.4:kernel-rt-5.14.21-150400.15.124.1.x86_64",
          "SUSE Linux Enterprise Micro 5.4:kernel-source-rt-5.14.21-150400.15.124.1.noarch"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2025-38014",
          "url": "https://www.suse.com/security/cve/CVE-2025-38014"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1244732 for CVE-2025-38014",
          "url": "https://bugzilla.suse.com/1244732"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1244733 for CVE-2025-38014",
          "url": "https://bugzilla.suse.com/1244733"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "SUSE Linux Enterprise Micro 5.3:kernel-rt-5.14.21-150400.15.124.1.x86_64",
            "SUSE Linux Enterprise Micro 5.3:kernel-source-rt-5.14.21-150400.15.124.1.noarch",
            "SUSE Linux Enterprise Micro 5.4:kernel-rt-5.14.21-150400.15.124.1.x86_64",
            "SUSE Linux Enterprise Micro 5.4:kernel-source-rt-5.14.21-150400.15.124.1.noarch"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 4.1,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:N/I:N/A:H",
            "version": "3.1"
          },
          "products": [
            "SUSE Linux Enterprise Micro 5.3:kernel-rt-5.14.21-150400.15.124.1.x86_64",
            "SUSE Linux Enterprise Micro 5.3:kernel-source-rt-5.14.21-150400.15.124.1.noarch",
            "SUSE Linux Enterprise Micro 5.4:kernel-rt-5.14.21-150400.15.124.1.x86_64",
            "SUSE Linux Enterprise Micro 5.4:kernel-source-rt-5.14.21-150400.15.124.1.noarch"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2025-07-15T14:31:46Z",
          "details": "moderate"
        }
      ],
      "title": "CVE-2025-38014"
    },
    {
      "cve": "CVE-2025-38083",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2025-38083"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "In the Linux kernel, the following vulnerability has been resolved:\n\nnet_sched: prio: fix a race in prio_tune()\n\nGerrard Tai reported a race condition in PRIO, whenever SFQ perturb timer\nfires at the wrong time.\n\nThe race is as follows:\n\nCPU 0                                 CPU 1\n[1]: lock root\n[2]: qdisc_tree_flush_backlog()\n[3]: unlock root\n |\n |                                    [5]: lock root\n |                                    [6]: rehash\n |                                    [7]: qdisc_tree_reduce_backlog()\n |\n[4]: qdisc_put()\n\nThis can be abused to underflow a parent\u0027s qlen.\n\nCalling qdisc_purge_queue() instead of qdisc_tree_flush_backlog()\nshould fix the race, because all packets will be purged from the qdisc\nbefore releasing the lock.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "SUSE Linux Enterprise Micro 5.3:kernel-rt-5.14.21-150400.15.124.1.x86_64",
          "SUSE Linux Enterprise Micro 5.3:kernel-source-rt-5.14.21-150400.15.124.1.noarch",
          "SUSE Linux Enterprise Micro 5.4:kernel-rt-5.14.21-150400.15.124.1.x86_64",
          "SUSE Linux Enterprise Micro 5.4:kernel-source-rt-5.14.21-150400.15.124.1.noarch"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2025-38083",
          "url": "https://www.suse.com/security/cve/CVE-2025-38083"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1245183 for CVE-2025-38083",
          "url": "https://bugzilla.suse.com/1245183"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1245350 for CVE-2025-38083",
          "url": "https://bugzilla.suse.com/1245350"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "SUSE Linux Enterprise Micro 5.3:kernel-rt-5.14.21-150400.15.124.1.x86_64",
            "SUSE Linux Enterprise Micro 5.3:kernel-source-rt-5.14.21-150400.15.124.1.noarch",
            "SUSE Linux Enterprise Micro 5.4:kernel-rt-5.14.21-150400.15.124.1.x86_64",
            "SUSE Linux Enterprise Micro 5.4:kernel-source-rt-5.14.21-150400.15.124.1.noarch"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 7.8,
            "baseSeverity": "HIGH",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
            "version": "3.1"
          },
          "products": [
            "SUSE Linux Enterprise Micro 5.3:kernel-rt-5.14.21-150400.15.124.1.x86_64",
            "SUSE Linux Enterprise Micro 5.3:kernel-source-rt-5.14.21-150400.15.124.1.noarch",
            "SUSE Linux Enterprise Micro 5.4:kernel-rt-5.14.21-150400.15.124.1.x86_64",
            "SUSE Linux Enterprise Micro 5.4:kernel-source-rt-5.14.21-150400.15.124.1.noarch"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2025-07-15T14:31:46Z",
          "details": "important"
        }
      ],
      "title": "CVE-2025-38083"
    }
  ]
}
  suse-su-2022:3288-1
Vulnerability from csaf_suse
Published
2022-09-16 08:38
    Modified
2022-09-16 08:38
    Summary
Security update for the Linux Kernel
    Notes
Title of the patch
Security update for the Linux Kernel
    Description of the patch
The SUSE Linux Enterprise 15 SP4 Azure kernel was updated to receive various security and bugfixes.
The following security bugs were fixed:
- CVE-2022-39190: Fixed an issue that was discovered in net/netfilter/nf_tables_api.c and could cause a denial of service upon binding to an already bound chain (bnc#1203117).
- CVE-2022-39188: Fixed race condition in include/asm-generic/tlb.h where a device driver can free a page while it still has stale TLB entries (bnc#1203107).
- CVE-2022-36946: Fixed a denial of service (panic) inside nfqnl_mangle in net/netfilter/nfnetlink_queue.c (bnc#1201940).
- CVE-2022-36879: Fixed an issue in xfrm_expand_policies in net/xfrm/xfrm_policy.c where a refcount could be dropped twice (bnc#1201948).
- CVE-2022-3078: Fixed a lack of check after calling vzalloc() and lack of free after allocation in drivers/media/test-drivers/vidtv/vidtv_s302m.c (bnc#1203041).
- CVE-2022-3028: Fixed race condition that was found in the IP framework for transforming packets (XFRM subsystem) (bnc#1202898).
- CVE-2022-2977: Fixed reference counting for struct tpm_chip (bsc#1202672).
- CVE-2022-2959: Fixed a race condition that was found inside the watch queue due to a missing lock in pipe_resize_ring() (bnc#1202681).
- CVE-2022-2938: Fixed a flaw that was found inside the Pressure Stall Information implementation that could have been used to allow an attacker to crash the system or have other memory-corruption side effects (bnc#1202623).
- CVE-2022-2905: Fixed tnum_range usage on array range checking for poke descriptors (bsc#1202564, bsc#1202860).
- CVE-2022-2873: Fixed an out-of-bounds memory access flaw that was found in iSMT SMBus host controller driver (bnc#1202558).
- CVE-2022-28693: Fixed x86/speculation behavior by disabling RRSBA (bsc#1201455).
- CVE-2022-28356: Fixed a refcount leak bug that was found in net/llc/af_llc.c (bnc#1197391).
- CVE-2022-2663: Fixed an issue that was found in nf_conntrack_irc where the message handling could be confused and incorrectly matches the message (bnc#1202097).
- CVE-2022-2639: Fixed an integer coercion error that was found in the openvswitch kernel module (bnc#1202154).
- CVE-2022-26373: Fixed non-transparent sharing of return predictor targets between contexts in some Intel Processors that may have allowed information disclosure via local access (bnc#1201726).
- CVE-2022-2588: Fixed use-after-free in cls_route (bsc#1202096).
- CVE-2022-2585: Fixed missing cleanup of CPU timers before freeing them during exec (bsc#1202094).
- CVE-2022-20369: Fixed out of bounds write in v4l2_m2m_querybuf of v4l2-mem2mem.c (bnc#1202347).
- CVE-2022-20368: Fixed slab-out-of-bounds access in packet_recvmsg() (bsc#1202346).
- CVE-2022-1184: Fixed an use-after-free flaw in fs/ext4/namei.c:dx_insert_block() in the filesystem sub-component (bnc#1198577).
- CVE-2021-4037: Fixed function logic vulnerability that allowed local users to create files for the XFS file-system with an unintended group ownership and with group execution and SGID permission bits set (bnc#1198702).
- CVE-2021-33135: Fixed uncontrolled resource consumption inside Intel(R) SGX that may have allowed an authenticated user to potentially enable denial of service via local access (bnc#1199515).
- CVE-2020-36516: Fixed an issue in the mixed IPID assignment method where an attacker was able to inject data into or terminate a victim's TCP session (bnc#1196616).
- CVE-2016-3695: Fixed an issue inside the einj_error_inject function in drivers/acpi/apei/einj.c that allowed users to simulate hardware errors and consequently cause a denial of service (bnc#1023051).
The following non-security bugs were fixed:
- ACPI: APEI: Better fix to avoid spamming the console with old error logs (git-fixes).
- ACPI: APEI: explicit init of HEST and GHES in apci_init() (git-fixes).
- ACPI: CPPC: Do not prevent CPPC from working in the future (git-fixes).
- ACPI: EC: Drop the EC_FLAGS_IGNORE_DSDT_GPE quirk (git-fixes).
- ACPI: EC: Remove duplicate ThinkPad X1 Carbon 6th entry from DMI quirks (git-fixes).
- ACPI: LPSS: Fix missing check in register_device_clock() (git-fixes).
- ACPI: PM: save NVS memory for Lenovo G40-45 (git-fixes).
- ACPI: VIOT: Fix ACS setup (git-fixes).
- ACPI: processor/idle: Annotate more functions to live in cpuidle section (git-fixes).
- ACPI: processor: Remove freq Qos request for all CPUs (git-fixes).
- ACPI: property: Return type of acpi_add_nondev_subnodes() should be bool (git-fixes).
- ACPI: thermal: drop an always true check (git-fixes).
- ACPI: video: Force backlight native for some TongFang devices (git-fixes).
- ACPI: video: Shortening quirk list by identifying Clevo by board_name only (git-fixes).
- ALSA: bcd2000: Fix a UAF bug on the error path of probing (git-fixes).
- ALSA: hda/cirrus - support for iMac 12,1 model (git-fixes).
- ALSA: hda/conexant: Add quirk for LENOVO 20149 Notebook model (git-fixes).
- ALSA: hda/conexant: add a new hda codec SN6140 (git-fixes).
- ALSA: hda/realtek: Add a quirk for HP OMEN 15 (8786) mute LED (git-fixes).
- ALSA: hda/realtek: Add quirk for Clevo NS50PU, NS70PU (git-fixes).
- ALSA: hda/realtek: Add quirk for Clevo NV45PZ (git-fixes).
- ALSA: hda/realtek: Add quirk for HP Spectre x360 15-eb0xxx (git-fixes).
- ALSA: hda/realtek: Add quirk for Lenovo Yoga9 14IAP7 (git-fixes).
- ALSA: hda/realtek: Add quirk for another Asus K42JZ model (git-fixes).
- ALSA: hda/realtek: Add speaker AMP init for Samsung laptops with ALC298 (git-fixes).
- ALSA: hda/sigmatel: Keep power up while beep is enabled (bsc#1200544).
- ALSA: hda: intel-nhlt: Correct the handling of fmt_config flexible array (git-fixes).
- ALSA: info: Fix llseek return value when using callback (git-fixes).
- ALSA: seq: Fix data-race at module auto-loading (git-fixes).
- ALSA: seq: oss: Fix data-race for max_midi_devs access (git-fixes).
- ALSA: usb-audio: Add endianness annotations (git-fixes).
- ALSA: usb-audio: Add quirk for Behringer UMC202HD (git-fixes).
- ALSA: usb-audio: Add quirk for LH Labs Geek Out HD Audio 1V5 (git-fixes).
- ALSA: usb-audio: More comprehensive mixer map for ASUS ROG Zenith II (git-fixes).
- ALSA: usb-audio: Support jack detection on Dell dock (git-fixes).
- ALSA: usb-audio: Turn off 'manual mode' on Dell dock (git-fixes).
- ARM: OMAP2+: Fix refcount leak in omap3xxx_prm_late_init (git-fixes).
- ARM: OMAP2+: Fix refcount leak in omapdss_init_of (git-fixes).
- ARM: OMAP2+: display: Fix refcount leak bug (git-fixes).
- ARM: OMAP2+: pdata-quirks: Fix refcount leak bug (git-fixes).
- ARM: bcm: Fix refcount leak in bcm_kona_smc_init (git-fixes).
- ARM: dts: BCM5301X: Add DT for Meraki MR26 (git-fixes).
- ARM: dts: ast2500-evb: fix board compatible (git-fixes).
- ARM: dts: ast2600-evb-a1: fix board compatible (git-fixes).
- ARM: dts: ast2600-evb: fix board compatible (git-fixes).
- ARM: dts: at91: sama5d27_wlsom1: do not keep ldo2 enabled all the time (git-fixes).
- ARM: dts: at91: sama5d27_wlsom1: specify proper regulator output ranges (git-fixes).
- ARM: dts: at91: sama5d2_icp: do not keep vdd_other enabled all the time (git-fixes).
- ARM: dts: at91: sama5d2_icp: specify proper regulator output ranges (git-fixes).
- ARM: dts: imx6qdl-kontron-samx6i: remove duplicated node (git-fixes).
- ARM: dts: imx6ul: add missing properties for sram (git-fixes).
- ARM: dts: imx6ul: change operating-points to uint32-matrix (git-fixes).
- ARM: dts: imx6ul: fix csi node compatible (git-fixes).
- ARM: dts: imx6ul: fix keypad compatible (git-fixes).
- ARM: dts: imx6ul: fix lcdif node compatible (git-fixes).
- ARM: dts: imx6ul: fix qspi node compatible (git-fixes).
- ARM: dts: imx7d-colibri-emmc: add cpu1 supply (git-fixes).
- ARM: dts: qcom: mdm9615: add missing PMIC GPIO reg (git-fixes).
- ARM: dts: qcom: pm8841: add required thermal-sensor-cells (git-fixes).
- ARM: dts: qcom: sdx55: Fix the IRQ trigger type for UART (git-fixes).
- ARM: dts: uniphier: Fix USB interrupts for PXs2 SoC (git-fixes).
- ARM: findbit: fix overflowing offset (git-fixes).
- ARM: shmobile: rcar-gen2: Increase refcount for new reference (git-fixes).
- ASoC: SOF: debug: Fix potential buffer overflow by snprintf() (git-fixes).
- ASoC: audio-graph-card: Add of_node_put() in fail path (git-fixes).
- ASoC: codec: tlv320aic32x4: fix mono playback via I2S (git-fixes).
- ASoC: codecs: da7210: add check for i2c_add_driver (git-fixes).
- ASoC: codecs: msm8916-wcd-digital: move gains from SX_TLV to S8_TLV (git-fixes).
- ASoC: codecs: wcd9335: move gains from SX_TLV to S8_TLV (git-fixes).
- ASoC: cros_ec_codec: Fix refcount leak in cros_ec_codec_platform_probe (git-fixes).
- ASoC: fsl-asoc-card: force cast the asrc_format type (git-fixes).
- ASoC: fsl_asrc: force cast the asrc_format type (git-fixes).
- ASoC: fsl_easrc: use snd_pcm_format_t type for sample_format (git-fixes).
- ASoC: imx-audmux: Silence a clang warning (git-fixes).
- ASoC: imx-card: Fix DSD/PDM mclk frequency (git-fixes).
- ASoC: imx-card: use snd_pcm_format_t type for asrc_format (git-fixes).
- ASoC: mchp-spdifrx: disable end of block interrupt on failures (git-fixes).
- ASoC: mt6359: Fix refcount leak bug (git-fixes).
- ASoC: mt6797-mt6351: Fix refcount leak in mt6797_mt6351_dev_probe (git-fixes).
- ASoC: qcom: Fix missing of_node_put() in asoc_qcom_lpass_cpu_platform_probe() (git-fixes).
- ASoC: qcom: q6dsp: Fix an off-by-one in q6adm_alloc_copp() (git-fixes).
- ASoC: rsnd: care default case on rsnd_ssiu_busif_err_irq_ctrl() (git-fixes).
- ASoC: samsung: Fix error handling in aries_audio_probe (git-fixes).
- ASoC: samsung: change gpiod_speaker_power and rx1950_audio from global to static variables (git-fixes).
- ASoC: samsung: change neo1973_audio from a global to static (git-fixes).
- ASoC: samsung: h1940_uda1380: include proepr GPIO consumer header (git-fixes).
- ASoC: tas2770: Allow mono streams (git-fixes).
- ASoC: tas2770: Drop conflicting set_bias_level power setting (git-fixes).
- ASoC: tas2770: Fix handling of mute/unmute (git-fixes).
- ASoC: tas2770: Set correct FSYNC polarity (git-fixes).
- Bluetooth: L2CAP: Fix build errors in some archs (git-fixes).
- Bluetooth: L2CAP: Fix l2cap_global_chan_by_psm regression (git-fixes).
- Bluetooth: L2CAP: Fix use-after-free caused by l2cap_chan_put (git-fixes).
- Bluetooth: MGMT: Fixes build warnings with C=1 (git-fixes).
- Bluetooth: btusb: Add Realtek RTL8852C support ID 0x04C5:0x1675 (git-fixes).
- Bluetooth: btusb: Add Realtek RTL8852C support ID 0x04CA:0x4007 (git-fixes).
- Bluetooth: btusb: Add Realtek RTL8852C support ID 0x0CB8:0xC558 (git-fixes).
- Bluetooth: btusb: Add Realtek RTL8852C support ID 0x13D3:0x3586 (git-fixes).
- Bluetooth: btusb: Add Realtek RTL8852C support ID 0x13D3:0x3587 (git-fixes).
- Bluetooth: btusb: Add support of IMC Networks PID 0x3568 (git-fixes).
- Bluetooth: hci_bcm: Add BCM4349B1 variant (git-fixes).
- Bluetooth: hci_bcm: Add DT compatible for CYW55572 (git-fixes).
- Bluetooth: hci_intel: Add check for platform_driver_register (git-fixes).
- Documentation: ACPI: EINJ: Fix obsolete example (git-fixes).
- Documentation: PM: Drop pme_interrupt reference (git-fixes).
- Documentation: dm writecache: Render status list as list (git-fixes).
- Documentation: fix sctp_wmem in ip-sysctl.rst (git-fixes).
- Documentation: siphash: Fix typo in the name of offsetofend macro (git-fixes).
- EDAC/ghes: Set the DIMM label unconditionally (bsc#1201768).
- HID: AMD_SFH: Add a DMI quirk entry for Chromebooks (git-fixes).
- HID: add Lenovo Yoga C630 battery quirk (git-fixes).
- HID: alps: Declare U1_UNICORN_LEGACY support (git-fixes).
- HID: amd_sfh: Add NULL check for hid device (git-fixes).
- HID: amd_sfh: Handle condition of 'no sensors' (git-fixes).
- HID: asus: ROG NKey: Ignore portion of 0x5a report (git-fixes).
- HID: cp2112: prevent a buffer overflow in cp2112_xfer() (git-fixes).
- HID: hid-input: add Surface Go battery quirk (git-fixes).
- HID: mcp2221: prevent a buffer overflow in mcp_smbus_write() (git-fixes).
- HID: multitouch: new device class fix Lenovo X12 trackpad sticky (git-fixes).
- HID: steam: Prevent NULL pointer dereference in steam_{recv,send}_report (git-fies).
- HID: thrustmaster: Add sparco wheel and fix array length (git-fixes).
- HID: wacom: Do not register pad_input for touch switch (git-fixes).
- HID: wacom: Only report rotation for art pen (git-fixes).
- Input: exc3000 - fix return value check of wait_for_completion_timeout (git-fixes).
- Input: gscps2 - check return value of ioremap() in gscps2_probe() (git-fixes).
- Input: i8042 - add TUXEDO devices to i8042 quirk tables (git-fies).
- Input: i8042 - add additional TUXEDO devices to i8042 quirk tables (git-fies).
- Input: i8042 - merge quirk tables (git-fies).
- Input: i8042 - move __initconst to fix code styling warning (git-fies).
- Input: iforce - wake up after clearing IFORCE_XMIT_RUNNING flag (git-fixes).
- Input: rk805-pwrkey - fix module autoloading (git-fixes).
- KABI: cgroup: Restore KABI of css_set (bsc#1201610).
- KEYS: asymmetric: enforce SM2 signature use pkey algo (git-fixes).
- KVM: LAPIC: Also cancel preemption timer during SET_LAPIC (git-fixes).
- KVM: MMU: shadow nested paging does not have PKU (git-fixes).
- KVM: PPC: Book3S HV: Check return value of kvmppc_radix_init (bsc#1194869).
- KVM: PPC: Book3S HV: Prevent POWER7/8 TLB flush flushing SLB (bsc#1156395).
- KVM: PPC: Book3S HV: Remove kvmhv_p9_[set,restore]_lpcr declarations (bsc#1194869).
- KVM: PPC: Book3S HV: Use GLOBAL_TOC for kvmppc_h_set_dabr/xdabr() (bsc#1156395).
- KVM: PPC: Book3S HV: fix incorrect NULL check on list iterator (bsc#1194869).
- KVM: PPC: Book3s HV: Remove unused function kvmppc_bad_interrupt (bsc#1194869).
- KVM: PPC: Fix vmx/vsx mixup in mmio emulation (bsc#1156395).
- KVM: PPC: Use arch_get_random_seed_long instead of powernv variant (bsc#1156395).
- KVM: SVM: Do not BUG if userspace injects an interrupt with GIF=0 (git-fixes).
- KVM: SVM: Do not intercept #GP for SEV guests (git-fixes).
- KVM: SVM: Unwind 'speculative' RIP advancement if INTn injection 'fails' (git-fixes).
- KVM: SVM: fix panic on out-of-bounds guest IRQ (git-fixes).
- KVM: VMX: Print VM-instruction error as unsigned (git-fixes).
- KVM: VMX: prepare sync_pir_to_irr for running with APICv disabled (git-fixes).
- KVM: VMX: switch blocked_vcpu_on_cpu_lock to raw spinlock (git-fixes).
- KVM: X86: Use vcpu->arch.walk_mmu for kvm_mmu_invlpg() (git-fixes).
- KVM: X86: avoid uninitialized 'fault.async_page_fault' from fixed-up #PF (git-fixes).
- KVM: arm64: Avoid setting the upper 32 bits of TCR_EL2 and CPTR_EL2 (bsc#1201442)
- KVM: nVMX: Inject #UD if VMXON is attempted with incompatible CR0/CR4 (git-fixes).
- KVM: nVMX: Let userspace set nVMX MSR to any _host_ supported value (git-fixes).
- KVM: nVMX: Set UMIP bit CR4_FIXED1 MSR when emulating UMIP (git-fixes).
- KVM: nVMX: Snapshot pre-VM-Enter BNDCFGS for !nested_run_pending case (git-fixes).
- KVM: nVMX: Snapshot pre-VM-Enter DEBUGCTL for !nested_run_pending case (git-fixes).
- KVM: nVMX: Synthesize TRIPLE_FAULT for L2 if emulation is required (git-fixes).
- KVM: nVMX: do not use vcpu->arch.efer when checking host state on nested state load (git-fixes).
- KVM: x86/mmu: Do not freak out if pml5_root is NULL on 4-level host (git-fixes).
- KVM: x86/mmu: Move 'invalid' check out of kvm_tdp_mmu_get_root() (git-fixes).
- KVM: x86/mmu: Zap _all_ roots when unmapping gfn range in TDP MMU (git-fixes).
- KVM: x86/mmu: include EFER.LMA in extended mmu role (git-fixes).
- KVM: x86/mmu: make apf token non-zero to fix bug (git-fixes).
- KVM: x86: Avoid theoretical NULL pointer dereference in kvm_irq_delivery_to_apic_fast() (git-fixes).
- KVM: x86: Check lapic_in_kernel() before attempting to set a SynIC irq (git-fixes).
- KVM: x86: Forbid VMM to set SYNIC/STIMER MSRs when SynIC wasn't activated (git-fixes).
- KVM: x86: Mark TSS busy during LTR emulation _after_ all fault checks (git-fixes).
- KVM: x86: SVM: do not passthrough SMAP/SMEP/PKE bits in !NPT && !gCR0.PG case (git-fixes).
- KVM: x86: Set error code to segment selector on LLDT/LTR non-canonical #GP (git-fixes).
- KVM: x86: check PIR even for vCPUs with disabled APICv (git-fixes).
- KVM: x86: hyper-v: Drop redundant 'ex' parameter from kvm_hv_flush_tlb() (git-fixes).
- KVM: x86: ignore APICv if LAPIC is not enabled (git-fixes).
- KVM: x86: remove PMU FIXED_CTR3 from msrs_to_save_all (git-fixes).
- KVM: x86: revalidate steal time cache if MSR value changes (git-fixes).
- NFSD: Clamp WRITE offsets (git-fixes).
- NFSD: Fix NFSv3 SETATTR/CREATE's handling of large file sizes (git-fixes).
- NFSD: Fix ia_size underflow (git-fixes).
- NFSD: Fix possible sleep during nfsd4_release_lockowner() (git-fixes).
- NFSD: prevent integer overflow on 32 bit systems (git-fixes).
- NFSD: prevent underflow in nfssvc_decode_writeargs() (git-fixes).
- NTB: ntb_tool: uninitialized heap data in tool_fn_write() (git-fixes).
- PCI/ACPI: Guard ARM64-specific mcfg_quirks (git-fixes).
- PCI/AER: Iterate over error counters instead of error strings (git-fixes).
- PCI/portdrv: Do not disable AER reporting in get_port_device_capability() (git-fixes).
- PCI: Add ACS quirk for Broadcom BCM5750x NICs (git-fixes).
- PCI: aardvark: Fix reporting Slot capabilities on emulated bridge (git-fixes).
- PCI: dwc: Add unroll iATU space support to dw_pcie_disable_atu() (git-fixes).
- PCI: dwc: Always enable CDM check if 'snps,enable-cdm-check' exists (git-fixes).
- PCI: dwc: Deallocate EPC memory on dw_pcie_ep_init() errors (git-fixes).
- PCI: dwc: Disable outbound windows only for controllers using iATU (git-fixes).
- PCI: dwc: Set INCREASE_REGION_SIZE flag based on limit address (git-fixes).
- PCI: dwc: Stop link on host_init errors and de-initialization (git-fixes).
- PCI: endpoint: Do not stop controller when unbinding endpoint function (git-fixes).
- PCI: hv: Only reuse existing IRTE allocation for Multi-MSI (bsc#1200845).
- PCI: microchip: Fix refcount leak in mc_pcie_init_irq_domains() (git-fixes).
- PCI: qcom: Power on PHY before IPQ8074 DBI register accesses (git-fixes).
- PCI: qcom: Set up rev 2.1.0 PARF_PHY before enabling clocks (git-fixes).
- PCI: tegra194: Fix PM error handling in tegra_pcie_config_ep() (git-fixes).
- PCI: tegra194: Fix Root Port interrupt handling (git-fixes).
- PCI: tegra194: Fix link up retry sequence (git-fixes).
- PM: domains: Ensure genpd_debugfs_dir exists before remove (git-fixes).
- PM: hibernate: defer device probing when resuming from hibernation (git-fixes).
- Revert 'clk: core: Honor CLK_OPS_PARENT_ENABLE for clk gate ops' (git-fixes).
- Revert 'drivers/video/backlight/platform_lcd.c: add support for device tree based probe' (git-fixes).
- Revert 'drm/i915: Hold reference to intel_context over life of i915_request' (git-fixes).
- Revert 'drm/udl: Kill pending URBs at suspend and disconnect' (bsc#1195917).
- Revert 'ipv6: Honor all IPv6 PIO Valid Lifetime values' (bsc#1202989).
- Revert 'net: usb: ax88179_178a needs FLAG_SEND_ZLP' (git-fixes).
- Revert 'scripts/mod/modpost.c: permit '.cranges' secton for sh64 architecture.' (git-fixes).
- Revert 'usb: gadget: udc-xilinx: replace memcpy with memcpy_toio' (git-fixes).
- Revert 'x86/sev: Expose sev_es_ghcb_hv_call() for use by HyperV' (bsc#1190497).
- SUNRPC: Fix NFSD's request deferral on RDMA transports (git-fixes).
- SUNRPC: Fix READ_PLUS crasher (git-fixes).
- SUNRPC: Prevent immediate close+reconnect (git-fixes).
- USB: Follow-up to SPDX GPL-2.0+ identifiers addition - remove now useless comments (git-fixes).
- USB: Follow-up to SPDX identifiers addition - remove now useless comments (git-fixes).
- USB: serial: ch314: use usb_control_msg_recv() (git-fixes).
- USB: serial: ch341: fix disabled rx timer on older devices (git-fixes).
- USB: serial: fix tty-port initialized comments (git-fixes).
- apparmor: Fix failed mount permission check error message (git-fixes).
- apparmor: Fix memleak in aa_simple_write_to_buffer() (git-fixes).
- apparmor: fix aa_label_asxprint return check (git-fixes).
- apparmor: fix absroot causing audited secids to begin with = (git-fixes).
- apparmor: fix overlapping attachment computation (git-fixes).
- apparmor: fix quiet_denied for file rules (git-fixes).
- apparmor: fix reference count leak in aa_pivotroot() (git-fixes).
- apparmor: fix setting unconfined mode on a loaded profile (git-fixes).
- arm64: Do not forget syscall when starting a new thread (git-fixes).
- arm64: Fix match_list for erratum 1286807 on Arm Cortex-A76 (git-fixes).
- arm64: cpufeature: Allow different PMU versions in ID_DFR0_EL1 (git-fixes).
- arm64: dts: allwinner: a64: orangepi-win: Fix LED node name (git-fixes).
- arm64: dts: mt7622: fix BPI-R64 WPS button (git-fixes).
- arm64: dts: mt8192: Fix idle-states entry-method (git-fixes).
- arm64: dts: mt8192: Fix idle-states nodes naming scheme (git-fixes).
- arm64: dts: qcom: ipq8074: fix NAND node name (git-fixes).
- arm64: dts: qcom: msm8916: Fix typo in pronto remoteproc node (git-fixes).
- arm64: dts: qcom: qcs404: Fix incorrect USB2 PHYs assignment (git-fixes).
- arm64: dts: qcom: sm8250: add missing PCIe PHY clock-cells (git-fixes).
- arm64: dts: renesas: Fix thermal-sensors on single-zone sensors (git-fixes).
- arm64: dts: renesas: beacon: Fix regulator node names (git-fixes).
- arm64: dts: uniphier: Fix USB interrupts for PXs3 SoC (git-fixes).
- arm64: fix oops in concurrently setting insn_emulation sysctls (git-fixes).
- arm64: fix rodata=full (git-fixes).
- arm64: kasan: Revert 'arm64: mte: reset the page tag in page->flags' (git-fixes).
- arm64: set UXN on swapper page tables (git-fixes).
- arm64: tegra: Fix SDMMC1 CD on P2888 (git-fixes).
- arm64: tegra: Fixup SYSRAM references (git-fixes).
- arm64: tegra: Mark BPMP channels as no-memory-wc (git-fixes).
- asm-generic: sections: refactor memory_intersects (git-fixes).
- ata: libata-eh: Add missing command name (git-fixes).
- ath10k: do not enforce interrupt trigger type (git-fixes).
- ath11k: Fix incorrect debug_mask mappings (git-fixes).
- ath11k: fix netdev open race (git-fixes).
- atm: idt77252: fix use-after-free bugs caused by tst_timer (git-fixes).
- audit: fix potential double free on error path from fsnotify_add_inode_mark (git-fixes).
- ax25: Fix ax25 session cleanup problems (git-fixes).
- block: Fix fsync always failed if once failed (bsc#1202779).
- block: Fix wrong offset in bio_truncate() (bsc#1202780).
- block: fix rq-qos breakage from skipping rq_qos_done_bio() (bsc#1202781).
- block: only mark bio as tracked if it really is tracked (bsc#1202782).
- bnx2x: Invalidate fastpath HSI version for VFs (git-fixes).
- bnx2x: Utilize firmware 7.13.21.0 (git-fixes).
- btrfs: properly flag filesystem with BTRFS_FEATURE_INCOMPAT_BIG_METADATA (git-fixes).
- bus: hisi_lpc: fix missing platform_device_put() in hisi_lpc_acpi_probe() (git-fixes).
- can: Break loopback loop on loopback documentation (git-fixes).
- can: ems_usb: fix clang's -Wunaligned-access warning (git-fixes).
- can: error: specify the values of data[5..7] of CAN error frames (git-fixes).
- can: hi311x: do not report txerr and rxerr during bus-off (git-fixes).
- can: j1939: j1939_sk_queue_activate_next_locked(): replace WARN_ON_ONCE with netdev_warn_once() (git-fixes).
- can: kvaser_usb_hydra: do not report txerr and rxerr during bus-off (git-fixes).
- can: kvaser_usb_leaf: do not report txerr and rxerr during bus-off (git-fixes).
- can: mcp251x: Fix race condition on receive interrupt (git-fixes).
- can: mcp251xfd: mcp251xfd_dump(): fix comment (git-fixes).
- can: netlink: allow configuring of fixed bit rates without need for do_set_bittiming callback (git-fixes).
- can: netlink: allow configuring of fixed data bit rates without need for do_set_data_bittiming callback (git-fixes).
- can: pch_can: do not report txerr and rxerr during bus-off (git-fixes).
- can: pch_can: pch_can_error(): initialize errc before using it (git-fixes).
- can: rcar_can: do not report txerr and rxerr during bus-off (git-fixes).
- can: sja1000: do not report txerr and rxerr during bus-off (git-fixes).
- can: sun4i_can: do not report txerr and rxerr during bus-off (git-fixes).
- can: usb_8dev: do not report txerr and rxerr during bus-off (git-fixes).
- ceph: do not leak snap_rwsem in handle_cap_grant (bsc#1202823).
- ceph: do not truncate file in atomic_open (bsc#1202824).
- ceph: use correct index when encoding client supported features (bsc#1202822).
- cfg80211/mac80211: assume CHECKSUM_COMPLETE includes SNAP (bsc#1202131).
- cgroup: Use separate src/dst nodes when preloading css_sets for migration (bsc#1201610).
- clk: bcm: rpi: Fix error handling of raspberrypi_fw_get_rate (git-fixes).
- clk: core: Fix runtime PM sequence in clk_core_unprepare() (git-fixes).
- clk: core: Honor CLK_OPS_PARENT_ENABLE for clk gate ops (git-fixes).
- clk: mediatek: reset: Fix written reset bit offset (git-fixes).
- clk: qcom: camcc-sdm845: Fix topology around titan_top power domain (git-fixes).
- clk: qcom: camcc-sm8250: Fix halt on boot by reducing driver's init level (git-fixes).
- clk: qcom: camcc-sm8250: Fix topology around titan_top power domain (git-fixes).
- clk: qcom: clk-alpha-pll: fix clk_trion_pll_configure description (git-fixes).
- clk: qcom: clk-krait: unlock spin after mux completion (git-fixes).
- clk: qcom: clk-rcg2: Fail Duty-Cycle configuration if MND divider is not enabled (git-fixes).
- clk: qcom: clk-rcg2: Make sure to not write d=0 to the NMD register (git-fixes).
- clk: qcom: gcc-msm8939: Add missing SYSTEM_MM_NOC_BFDCD_CLK_SRC (git-fixes).
- clk: qcom: gcc-msm8939: Add missing system_mm_noc_bfdcd_clk_src (git-fixes).
- clk: qcom: gcc-msm8939: Fix bimc_ddr_clk_src rcgr base address (git-fixes).
- clk: qcom: gcc-msm8939: Fix weird field spacing in ftbl_gcc_camss_cci_clk (git-fixes).
- clk: qcom: gcc-msm8939: Point MM peripherals to system_mm_noc clock (git-fixes).
- clk: qcom: ipq8074: SW workaround for UBI32 PLL lock (git-fixes).
- clk: qcom: ipq8074: dont disable gcc_sleep_clk_src (git-fixes).
- clk: qcom: ipq8074: fix NSS core PLL-s (git-fixes).
- clk: qcom: ipq8074: fix NSS port frequency tables (git-fixes).
- clk: qcom: ipq8074: set BRANCH_HALT_DELAY flag for UBI clocks (git-fixes).
- clk: renesas: r9a06g032: Fix UART clkgrp bitsel (git-fixes).
- clk: ti: Stop using legacy clkctrl names for omap4 and 5 (git-fixes).
- cpufreq: zynq: Fix refcount leak in zynq_get_revision (git-fixes).
- crypto: arm64/poly1305 - fix a read out-of-bound (git-fixes).
- crypto: ccp - During shutdown, check SEV data pointer before using (git-fixes).
- crypto: ccp - Use kzalloc for sev ioctl interfaces to prevent kernel memory leak (git-fixes).
- crypto: hisilicon - Kunpeng916 crypto driver do not sleep when in softirq (git-fixes).
- crypto: hisilicon/hpre - do not use GFP_KERNEL to alloc mem during softirq (git-fixes).
- crypto: hisilicon/sec - do not sleep when in softirq (git-fixes).
- crypto: hisilicon/sec - fix auth key size error (git-fixes).
- crypto: inside-secure - Add missing MODULE_DEVICE_TABLE for of (git-fixes).
- crypto: sun8i-ss - do not allocate memory when handling hash requests (git-fixes).
- crypto: sun8i-ss - fix error codes in allocate_flows() (git-fixes).
- crypto: sun8i-ss - fix infinite loop in sun8i_ss_setup_ivs() (git-fixes).
- devlink: Fix use-after-free after a failed reload (git-fixes).
- dm raid: fix KASAN warning in raid5_add_disks (git-fixes).
- dmaengine: dw-axi-dmac: do not print NULL LLI during error (git-fixes).
- dmaengine: dw-axi-dmac: ignore interrupt if no descriptor (git-fixes).
- dmaengine: dw-edma: Fix eDMA Rd/Wr-channels and DMA-direction semantics (git-fixes).
- dmaengine: imx-dma: Cast of_device_get_match_data() with (uintptr_t) (git-fixes).
- dmaengine: sf-pdma: Add multithread support for a DMA channel (git-fixes).
- dmaengine: sprd: Cleanup in .remove() after pm_runtime_get_sync() failed (git-fixes).
- dmaengine: stm32-mdma: Remove dead code in stm32_mdma_irq_handler() (git-fixes).
- docs: i2c: i2c-sysfs: fix hyperlinks (git-fixes).
- docs: zh_CN: fix a broken reference (git-fixes).
- dpaa2-eth: fix ethtool statistics (git-fixes).
- driver core: Do not probe devices after bus_type.match() probe deferral (git-fixes).
- driver core: fix potential deadlock in __driver_attach (git-fixes).
- drivers/iio: Remove all strcpy() uses (git-fixes).
- drivers: usb: dwc3-qcom: Add sdm660 compatible (git-fixes).
- drm/amd/amd_shared.h: Add missing doc for PP_GFX_DCS_MASK (git-fixes).
- drm/amd/display: Add option to defer works of hpd_rx_irq (git-fixes).
- drm/amd/display: Avoid MPC infinite loop (git-fixes).
- drm/amd/display: Check correct bounds for stream encoder instances for DCN303 (git-fixes).
- drm/amd/display: Enable building new display engine with KCOV enabled (git-fixes).
- drm/amd/display: Fix HDMI VSIF V3 incorrect issue (git-fixes).
- drm/amd/display: Fix pixel clock programming (git-fixes).
- drm/amd/display: Fix surface optimization regression on Carrizo (git-fixes).
- drm/amd/display: For stereo keep 'FLIP_ANY_FRAME' (git-fixes).
- drm/amd/display: Reset DMCUB before HW init (git-fixes).
- drm/amd/display: Revert 'drm/amd/display: turn DPMS off on connector unplug' (git-fixes).
- drm/amd/display: avoid doing vm_init multiple time (git-fixes).
- drm/amd/display: clear optc underflow before turn off odm clock (git-fixes).
- drm/amd/pm: add missing ->fini_microcode interface for Sienna Cichlid (git-fixes).
- drm/amdgpu: Check BO's requested pinning domains against its preferred_domains (git-fixes).
- drm/amdgpu: Increase tlb flush timeout for sriov (git-fixes).
- drm/amdgpu: Remove one duplicated ef removal (git-fixes).
- drm/amdgpu: remove useless condition in amdgpu_job_stop_all_jobs_on_sched() (git-fixes).
- drm/bridge: lt9611uxc: Cancel only driver's work (git-fixes).
- drm/bridge: tc358767: Fix (e)DP bridge endpoint parsing in dedicated function (git-fixes).
- drm/bridge: tc358767: Make sure Refclk clock are enabled (git-fixes).
- drm/bridge: tc358767: Move (e)DP bridge endpoint parsing into dedicated function (git-fixes).
- drm/doc: Fix comment typo (git-fixes).
- drm/exynos/exynos7_drm_decon: free resources when clk_set_parent() failed (git-fixes).
- drm/gem: Properly annotate WW context on drm_gem_lock_reservations() error (git-fixes).
- drm/i915/display: avoid warnings when registering dual panel backlight (git-fixes).
- drm/i915/gt: Skip TLB invalidations once wedged (git-fixes).
- drm/i915/reg: Fix spelling mistake 'Unsupport' -> 'Unsupported' (git-fixes).
- drm/i915: fix null pointer dereference (git-fixes).
- drm/mcde: Fix refcount leak in mcde_dsi_bind (git-fixes).
- drm/mediatek: Add pull-down MIPI operation in mtk_dsi_poweroff function (git-fixes).
- drm/mediatek: Allow commands to be sent during video mode (git-fixes).
- drm/mediatek: Keep dsi as LP00 before dcs cmds transfer (git-fixes).
- drm/mediatek: Modify dsi funcs to atomic operations (git-fixes).
- drm/mediatek: Separate poweron/poweroff from enable/disable and define new funcs (git-fixes).
- drm/mediatek: dpi: Only enable dpi after the bridge is enabled (git-fixes).
- drm/mediatek: dpi: Remove output format of YUV (git-fixes).
- drm/meson: Fix overflow implicit truncation warnings (git-fixes).
- drm/meson: Fix refcount bugs in meson_vpu_has_available_connectors() (git-fixes).
- drm/mipi-dbi: align max_chunk to 2 in spi_transfer (git-fixes).
- drm/msm/dpu: Fix for non-visible planes (git-fixes).
- drm/msm/dsi: Fix number of regulators for SDM660 (git-fixes).
- drm/msm/dsi: Fix number of regulators for msm8996_dsi_cfg (git-fixes).
- drm/msm/dsi: fix the inconsistent indenting (git-fixes).
- drm/msm/hdmi: drop empty 'none' regulator lists (git-fixes).
- drm/msm/hdmi: enable core-vcc/core-vdda-supply for 8996 platform (git-fixes).
- drm/msm/mdp5: Fix global state lock backoff (git-fixes).
- drm/msm: Avoid dirtyfb stalls on video mode displays (v2) (git-fixes).
- drm/msm: Fix dirtyfb refcounting (git-fixes).
- drm/nouveau/acpi: Do not print error when we get -EINPROGRESS from pm_runtime (git-fixes).
- drm/nouveau/kms: Fix failure path for creating DP connectors (git-fixes).
- drm/nouveau: Do not pm_runtime_put_sync(), only pm_runtime_put_autosuspend() (git-fixes).
- drm/nouveau: fix another off-by-one in nvbios_addr (git-fixes).
- drm/nouveau: recognise GA103 (git-fixes).
- drm/radeon: fix incorrrect SPDX-License-Identifiers (git-fixes).
- drm/radeon: fix potential buffer overflow in ni_set_mc_special_registers() (git-fixes).
- drm/rockchip: Fix an error handling path rockchip_dp_probe() (git-fixes).
- drm/rockchip: vop: Do not crash for invalid duplicate_state() (git-fixes).
- drm/shmem-helper: Add missing vunmap on error (git-fixes).
- drm/simpledrm: Fix return type of simpledrm_simple_display_pipe_mode_valid() (git-fixes).
- drm/st7735r: Fix module autoloading for Okaya RH128128T (git-fixes).
- drm/sun4i: dsi: Prevent underflow when computing packet sizes (git-fixes).
- drm/ttm: Fix dummy res NULL ptr deref bug (git-fixes).
- drm/udl: Add parameter to set number of URBs (bsc#1195917).
- drm/udl: Add reset_resume (bsc#1195917)
- drm/udl: Do not re-initialize stuff at retrying the URB list allocation (bsc#1195917).
- drm/udl: Drop unneeded alignment (bsc#1195917).
- drm/udl: Enable damage clipping (bsc#1195917).
- drm/udl: Fix inconsistent urbs.count value during udl_free_urb_list() (bsc#1195917).
- drm/udl: Fix potential URB leaks (bsc#1195917).
- drm/udl: Increase the default URB list size to 20 (bsc#1195917).
- drm/udl: Kill pending URBs at suspend and disconnect (bsc#1195917).
- drm/udl: Replace BUG_ON() with WARN_ON() (bsc#1195917).
- drm/udl: Replace semaphore with a simple wait queue (bsc#1195917).
- drm/udl: Restore display mode on resume (bsc#1195917)
- drm/udl: Suppress error print for -EPROTO at URB completion (bsc#1195917).
- drm/udl: Sync pending URBs at suspend / disconnect (bsc#1195917).
- drm/udl: Sync pending URBs at the end of suspend (bsc#1195917).
- drm/vc4: change vc4_dma_range_matches from a global to static (git-fixes).
- drm/vc4: drv: Adopt the dma configuration from the HVS or V3D component (git-fixes).
- drm/vc4: dsi: Add correct stop condition to vc4_dsi_encoder_disable iteration (git-fixes).
- drm/vc4: dsi: Correct DSI divider calculations (git-fixes).
- drm/vc4: dsi: Correct pixel order for DSI0 (git-fixes).
- drm/vc4: dsi: Fix dsi0 interrupt support (git-fixes).
- drm/vc4: dsi: Register dsi0 as the correct vc4 encoder type (git-fixes).
- drm/vc4: hdmi: Correct HDMI timing registers for interlaced modes (git-fixes).
- drm/vc4: hdmi: Disable audio if dmas property is present but empty (git-fixes).
- drm/vc4: hdmi: Fix timings for interlaced modes (git-fixes).
- drm/vc4: hdmi: Reset HDMI MISC_CONTROL register (git-fixes).
- drm/vc4: plane: Fix margin calculations for the right/bottom edges (git-fixes).
- drm/vc4: plane: Remove subpixel positioning check (git-fixes).
- drm: adv7511: override i2c address of cec before accessing it (git-fixes).
- drm: bridge: adv7511: Add check for mipi_dsi_driver_register (git-fixes).
- drm: bridge: sii8620: fix possible off-by-one (git-fixes).
- dsa: mv88e6xxx: fix debug print for SPEED_UNFORCED (git-fixes).
- dt-bindings: arm: qcom: fix MSM8916 MTP compatibles (git-fixes).
- dt-bindings: arm: qcom: fix MSM8994 boards compatibles (git-fixes).
- dt-bindings: bluetooth: broadcom: Add BCM4349B1 DT binding (git-fixes).
- dt-bindings: clock: qcom,gcc-msm8996: add more GCC clock sources (git-fixes).
- dt-bindings: gpio: zynq: Add missing compatible strings (git-fixes).
- dt-bindings: iio: accel: Add DT binding doc for ADXL355 (git-fixes).
- dt-bindings: usb: mtk-xhci: Allow wakeup interrupt-names to be optional (git-fixes).
- dtb: Do not include sources in src.rpm - refer to kernel-source Same as other kernel binary packages there is no need to carry duplicate sources in dtb packages.
- eeprom: idt_89hpesx: uninitialized data in idt_dbgfs_csr_write() (git-fixes).
- ethernet: rocker: fix sleep in atomic context bug in neigh_timer_handler (git-fies).
- ext4: Fix BUG_ON in ext4_bread when write quota data (bsc#1197755).
- ext4: add new helper interface ext4_try_to_trim_range() (bsc#1202783).
- ext4: add reserved GDT blocks check (bsc#1202712).
- ext4: do not use the orphan list when migrating an inode (bsc#1197756).
- ext4: fast commit may miss tracking unwritten range during ftruncate (bsc#1202759).
- ext4: filter out EXT4_FC_REPLAY from on-disk superblock field s_state (bsc#1202771).
- ext4: fix a possible ABBA deadlock due to busy PA (bsc#1202762).
- ext4: fix bug_on in ext4_writepages (bsc#1200872).
- ext4: fix error handling in ext4_fc_record_modified_inode() (bsc#1202767).
- ext4: fix error handling in ext4_restore_inline_data() (bsc#1197757).
- ext4: fix fallocate to use file_modified to update permissions consistently (bsc#1202769).
- ext4: fix fast commit may miss tracking range for FALLOC_FL_ZERO_RANGE (bsc#1202757).
- ext4: fix fs corruption when tring to remove a non-empty directory with IO error (bsc#1202768).
- ext4: fix incorrect type issue during replay_del_range (bsc#1202867).
- ext4: fix null-ptr-deref in '__ext4_journal_ensure_credits' (bsc#1202764).
- ext4: fix overhead calculation to account for the reserved gdt blocks (bsc#1200869).
- ext4: fix race when reusing xattr blocks (bsc#1198971).
- ext4: fix super block checksum incorrect after mount (bsc#1202773).
- ext4: fix symlink file size not match to file content (bsc#1200868).
- ext4: fix use-after-free in ext4_rename_dir_prepare (bsc#1200871).
- ext4: fix use-after-free in ext4_search_dir (bsc#1202710).
- ext4: fix warning in ext4_handle_inode_extension (bsc#1202711).
- ext4: force overhead calculation if the s_overhead_cluster makes no sense (bsc#1200870).
- ext4: initialize err_blk before calling __ext4_get_inode_loc (bsc#1202763).
- ext4: make sure quota gets properly shutdown on error (bsc#1195480).
- ext4: make sure to reset inode lockdep class when quota enabling fails (bsc#1202761).
- ext4: mark group as trimmed only if it was fully scanned (bsc#1202770).
- ext4: modify the logic of ext4_mb_new_blocks_simple (bsc#1202766).
- ext4: prevent used blocks from being allocated during fast commit replay (bsc#1202765).
- ext4: recover csum seed of tmp_inode after migrating to extents (bsc#1202713).
- ext4: remove EA inode entry from mbcache on inode eviction (bsc#1198971).
- ext4: unindent codeblock in ext4_xattr_block_set() (bsc#1198971).
- ext4: use ext4_ext_remove_space() for fast commit replay delete range (bsc#1202758).
- fbcon: Fix boundary checks for fbcon=vc:n1-n2 parameters (git-fixes).
- fbdev: fb_pm2fb: Avoid potential divide by zero error (git-fixes).
- fbdev: fbcon: Properly revert changes when vc_resize() failed (git-fies).
- filemap: Handle sibling entries in filemap_get_read_batch() (bsc#1202774).
- firmware: arm_scpi: Ensure scpi_info is not assigned if the probe fails (git-fixes).
- firmware: tegra: Fix error check return value of debugfs_create_file() (git-fixes).
- firmware: tegra: bpmp: Do only aligned access to IPC memory area (git-fixes).
- fix race between exit_itimers() and /proc/pid/timers (git-fixes).
- fpga: altera-pr-ip: fix unsigned comparison with less than zero (git-fixes).
- fs-writeback: writeback_sb_inodes: Recalculate 'wrote' according skipped pages (bsc#1200873).
- ftrace/x86: Add back ftrace_expected assignment (git-fixes).
- fuse: ioctl: translate ENOSYS (bsc#1203139).
- fuse: limit nsec (bsc#1203138).
- gadgetfs: ep_io - wait until IRQ finishes (git-fixes).
- geneve: do not use RT_TOS for IPv6 flowlabel (git-fixes).
- geneve: fix TOS inheriting for ipv4 (git-fixes).
- gpio: gpiolib-of: Fix refcount bugs in of_mm_gpiochip_add_data() (git-fixes).
- gpio: pca953x: Add mutex_lock for regcache sync in PM (git-fixes).
- grub: Fix symbol `grub_disk_get_size' not found (bsc#1201361 bsc#1192968).
- habanalabs/gaudi: fix shift out of bounds (git-fixes).
- habanalabs/gaudi: mask constant value before cast (git-fixes).
- hwmon: (dell-smm) Add Dell XPS 13 7390 to fan control whitelist (git-fixes).
- hwmon: (drivetemp) Add module alias (git-fixes).
- hwmon: (gpio-fan) Fix array out of bounds access (git-fixes).
- hwmon: (sht15) Fix wrong assumptions in device remove callback (git-fixes).
- i2c: Fix a potential use after free (git-fixes).
- i2c: cadence: Support PEC for SMBus block read (git-fixes).
- i2c: imx: Make sure to unregister adapter on remove() (git-fixes).
- i2c: mux-gpmux: Add of_node_put() when breaking out of loop (git-fixes).
- i2c: mxs: Silence a clang warning (git-fixes).
- i2c: npcm: Capitalize the one-line comment (git-fixes).
- i2c: npcm: Correct slave role behavior (git-fixes).
- i2c: npcm: Remove own slave addresses 2:10 (git-fixes).
- ice: fix 'scheduling while atomic' on aux critical err interrupt (git-fixes).
- ieee80211: add EHT 1K aggregation definitions (bsc#1202131).
- ieee80211: change HE nominal packet padding value defines (bsc#1202131).
- ieee802154/adf7242: defer destroy_workqueue call (git-fixes).
- iio: accel: bma220: Fix alignment for DMA safety (git-fixes).
- iio: accel: bma400: Fix the scale min and max macro values (git-fixes).
- iio: accel: bma400: Reordering of header files (git-fixes).
- iio: accel: sca3000: Fix alignment for DMA safety (git-fixes).
- iio: accel: sca3300: Fix alignment for DMA safety (git-fixes).
- iio: ad7292: Prevent regulator double disable (git-fixes).
- iio: adc: ad7266: Fix alignment for DMA safety (git-fixes).
- iio: adc: ad7292: Fix alignment for DMA safety (git-fixes).
- iio: adc: ad7298: Fix alignment for DMA safety (git-fixes).
- iio: adc: ad7476: Fix alignment for DMA safety (git-fixes).
- iio: adc: ad7766: Fix alignment for DMA safety (git-fixes).
- iio: adc: ad7768-1: Fix alignment for DMA safety (git-fixes).
- iio: adc: ad7887: Fix alignment for DMA safety (git-fixes).
- iio: adc: ad7923: Fix alignment for DMA safety (git-fixes).
- iio: adc: hi8435: Fix alignment for DMA safety (git-fixes).
- iio: adc: ltc2496: Fix alignment for DMA safety (git-fixes).
- iio: adc: ltc2497: Fix alignment for DMA safety (git-fixes).
- iio: adc: max1027: Fix alignment for DMA safety (git-fixes).
- iio: adc: max11100: Fix alignment for DMA safety (git-fixes).
- iio: adc: max1118: Fix alignment for DMA safety (git-fixes).
- iio: adc: max1241: Fix alignment for DMA safety (git-fixes).
- iio: adc: mcp320x: Fix alignment for DMA safety (git-fixes).
- iio: adc: mcp3911: make use of the sign bit (git-fixes).
- iio: adc: mcp3911: use correct formula for AD conversion (git-fixes).
- iio: adc: ti-adc0832: Fix alignment for DMA safety (git-fixes).
- iio: adc: ti-adc084s021: Fix alignment for DMA safety (git-fixes).
- iio: adc: ti-adc108s102: Fix alignment for DMA safety (git-fixes).
- iio: adc: ti-adc12138: Fix alignment for DMA safety (git-fixes).
- iio: adc: ti-adc128s052: Fix alignment for DMA safety (git-fixes).
- iio: adc: ti-adc161s626: Fix alignment for DMA safety (git-fixes).
- iio: adc: ti-ads124s08: Fix alignment for DMA safety (git-fixes).
- iio: adc: ti-ads131e08: Fix alignment for DMA safety (git-fixes).
- iio: adc: ti-ads7950: Fix alignment for DMA safety (git-fixes).
- iio: adc: ti-ads8344: Fix alignment for DMA safety (git-fixes).
- iio: adc: ti-ads8688: Fix alignment for DMA safety (git-fixes).
- iio: adc: ti-tlc4541: Fix alignment for DMA safety (git-fixes).
- iio: amplifiers: ad8366: Fix alignment for DMA safety (git-fixes).
- iio: common: ssp: Fix alignment for DMA safety (git-fixes).
- iio: core: Fix IIO_ALIGN and rename as it was not sufficiently large (git-fixes).
- iio: dac: ad5064: Fix alignment for DMA safety (git-fixes).
- iio: dac: ad5360: Fix alignment for DMA safety (git-fixes).
- iio: dac: ad5421: Fix alignment for DMA safety (git-fixes).
- iio: dac: ad5449: Fix alignment for DMA safety (git-fixes).
- iio: dac: ad5504: Fix alignment for DMA safety (git-fixes).
- iio: dac: ad5755: Fix alignment for DMA safety (git-fixes).
- iio: dac: ad5761: Fix alignment for DMA safety (git-fixes).
- iio: dac: ad5764: Fix alignment for DMA safety (git-fixes).
- iio: dac: ad5766: Fix alignment for DMA safety (git-fixes).
- iio: dac: ad5770r: Fix alignment for DMA safety (git-fixes).
- iio: dac: ad5791: Fix alignment for DMA saftey (git-fixes).
- iio: dac: ad7303: Fix alignment for DMA safety (git-fixes).
- iio: dac: ad8801: Fix alignment for DMA safety (git-fixes).
- iio: dac: mcp4922: Fix alignment for DMA safety (git-fixes).
- iio: dac: ti-dac082s085: Fix alignment for DMA safety (git-fixes).
- iio: dac: ti-dac5571: Fix alignment for DMA safety (git-fixes).
- iio: dac: ti-dac7311: Fix alignment for DMA safety (git-fixes).
- iio: dac: ti-dac7612: Fix alignment for DMA safety (git-fixes).
- iio: fix iio_format_avail_range() printing for none IIO_VAL_INT (git-fixes).
- iio: frequency: ad9523: Fix alignment for DMA safety (git-fixes).
- iio: frequency: adf4350: Fix alignment for DMA safety (git-fixes).
- iio: frequency: adf4371: Fix alignment for DMA safety (git-fixes).
- iio: gyro: adis16080: Fix alignment for DMA safety (git-fixes).
- iio: gyro: adis16130: Fix alignment for DMA safety (git-fixes).
- iio: gyro: adxrs450: Fix alignment for DMA safety (git-fixes).
- iio: gyro: fxas210002c: Fix alignment for DMA safety (git-fixes).
- iio: imu: fxos8700: Fix alignment for DMA safety (git-fixes).
- iio: light: isl29028: Fix the warning in isl29028_remove() (git-fixes).
- iio: potentiometer: ad5272: Fix alignment for DMA safety (git-fixes).
- iio: potentiometer: max5481: Fix alignment for DMA safety (git-fixes).
- iio: potentiometer: mcp41010: Fix alignment for DMA safety (git-fixes).
- iio: potentiometer: mcp4131: Fix alignment for DMA safety (git-fixes).
- iio: proximity: as3935: Fix alignment for DMA safety (git-fixes).
- iio: resolver: ad2s1200: Fix alignment for DMA safety (git-fixes).
- iio: resolver: ad2s90: Fix alignment for DMA safety (git-fixes).
- iio: temp: ltc2983: Fix alignment for DMA safety (git-fixes).
- iio: temp: maxim_thermocouple: Fix alignment for DMA safety (git-fixes).
- intel_th: Fix a resource leak in an error handling path (git-fixes).
- intel_th: msu-sink: Potential dereference of null pointer (git-fixes).
- intel_th: msu: Fix vmalloced buffers (git-fixes).
- intel_th: pci: Add Meteor Lake-P support (git-fixes).
- intel_th: pci: Add Raptor Lake-S CPU support (git-fixes).
- intel_th: pci: Add Raptor Lake-S PCH support (git-fixes).
- interconnect: imx: fix max_node_id (git-fixes).
- io_uring: add a schedule point in io_add_buffers() (git-fixes).
- io_uring: terminate manual loop iterator loop correctly for non-vecs (git-fixes).
- iommu/amd: Clarify AMD IOMMUv2 initialization messages (git-fixes).
- iommu/amd: Enable swiotlb in all cases (git-fixes).
- iommu/amd: Fix I/O page table memory leak (git-fixes).
- iommu/amd: Recover from event log overflow (git-fixes).
- iommu/amd: Simplify and Consolidate Virtual APIC (AVIC) Enablement (git-fixes).
- iommu/arm-smmu-v3-sva: Fix mm use-after-free (git-fixes).
- iommu/arm-smmu-v3: Fix size calculation in arm_smmu_mm_invalidate_range() (git-fixes).
- iommu/arm-smmu: qcom_iommu: Add of_node_put() when breaking out of loop (git-fixes).
- iommu/dart: Add missing module owner to ops structure (git-fixes).
- iommu/dart: check return value after calling platform_get_resource() (git-fixes).
- iommu/exynos: Handle failed IOMMU device registration properly (git-fixes).
- iommu/iova: Improve 32-bit free space estimate (git-fixes).
- iommu/ipmmu-vmsa: Check for error num after setting mask (git-fixes).
- iommu/mediatek: Add list_del in mtk_iommu_remove (git-fixes).
- iommu/mediatek: Add mutex for m4u_group and m4u_dom in data (git-fixes).
- iommu/mediatek: Fix 2 HW sharing pgtable issue (git-fixes).
- iommu/mediatek: Fix NULL pointer dereference when printing dev_name (git-fixes).
- iommu/mediatek: Remove clk_disable in mtk_iommu_remove (git-fixes).
- iommu/msm: Fix an incorrect NULL check on list iterator (git-fixes).
- iommu/omap: Fix regression in probe for NULL pointer dereference (git-fixes).
- iommu/tegra-smmu: Fix missing put_device() call in tegra_smmu_find (git-fixes).
- iommu/vt-d: Acquiring lock in domain ID allocation helpers (bsc#1200301).
- iommu/vt-d: Calculate mask for non-aligned flushes (git-fixes).
- iommu/vt-d: Drop stop marker messages (git-fixes).
- iommu/vt-d: Fix PCI bus rescan device hot add (git-fixes).
- iommu/vt-d: Fix RID2PASID setup/teardown failure (git-fixes).
- iommu/vt-d: Make DMAR_UNITS_SUPPORTED default 1024 (bsc#1200301).
- iommu/vt-d: Refactor iommu information of each domain (bsc#1200301).
- iommu/vt-d: Remove global g_iommus array (bsc#1200301).
- iommu/vt-d: Remove intel_iommu::domains (bsc#1200301).
- iommu/vt-d: Remove unnecessary check in intel_iommu_add() (bsc#1200301).
- iommu/vt-d: Use IDA interface to manage iommu sequence id (bsc#1200301).
- iommu/vt-d: avoid invalid memory access via node_online(NUMA_NO_NODE) (git-fixes).
- iommu: Fix potential use-after-free during probe (git-fixes).
- ipmi: fix initialization when workqueue allocation fails (git-fixes).
- irqchip/tegra: Fix overflow implicit truncation warnings (git-fixes).
- iwlwifi/fw: use struct_size over open coded arithmetic (bsc#1202131).
- iwlwifi: ACPI: support revision 3 WGDS tables (bsc#1202131).
- iwlwifi: Add support for getting rf id with blank otp (bsc#1202131).
- iwlwifi: Add support for more BZ HWs (bsc#1202131).
- iwlwifi: BZ Family BUS_MASTER_DISABLE_REQ code duplication (bsc#1202131).
- iwlwifi: BZ Family SW reset support (bsc#1202131).
- iwlwifi: Configure FW debug preset via module param (bsc#1202131).
- iwlwifi: Fix FW name for gl (bsc#1202131).
- iwlwifi: Fix missing error code in iwl_pci_probe() (bsc#1202131).
- iwlwifi: Fix syntax errors in comments (bsc#1202131).
- iwlwifi: Make use of the helper macro LIST_HEAD() (bsc#1202131).
- iwlwifi: Read the correct addresses when getting the crf id (bsc#1202131).
- iwlwifi: Start scratch debug register for Bz family (bsc#1202131).
- iwlwifi: acpi: fix wgds rev 3 size (bsc#1202131).
- iwlwifi: acpi: move ppag code from mvm to fw/acpi (bsc#1202131).
- iwlwifi: add missing entries for Gf4 with So and SoF (bsc#1202131).
- iwlwifi: add new Qu-Hr device (bsc#1202131).
- iwlwifi: add new ax1650 killer device (bsc#1202131).
- iwlwifi: add new device id 7F70 (bsc#1202131).
- iwlwifi: add new pci SoF with JF (bsc#1202131).
- iwlwifi: add some missing kernel-doc in struct iwl_fw (bsc#1202131).
- iwlwifi: add support for BNJ HW (bsc#1202131).
- iwlwifi: add support for BZ-U and BZ-L HW (bsc#1202131).
- iwlwifi: add support for Bz-Z HW (bsc#1202131).
- iwlwifi: add vendor specific capabilities for some RFs (bsc#1202131).
- iwlwifi: advertise support for HE - DCM BPSK RX/TX (bsc#1202131).
- iwlwifi: allow rate-limited error messages (bsc#1202131).
- iwlwifi: api: fix struct iwl_wowlan_status_v7 kernel-doc (bsc#1202131).
- iwlwifi: api: remove ttl field from TX command (bsc#1202131).
- iwlwifi: api: remove unused RX status bits (bsc#1202131).
- iwlwifi: avoid variable shadowing (bsc#1202131).
- iwlwifi: avoid void pointer arithmetic (bsc#1202131).
- iwlwifi: bump FW API to 67 for AX devices (bsc#1202131).
- iwlwifi: bump FW API to 68 for AX devices (bsc#1202131).
- iwlwifi: bump FW API to 69 for AX devices (bsc#1202131).
- iwlwifi: bump FW API to 70 for AX devices (bsc#1202131).
- iwlwifi: bump FW API to 71 for AX devices (bsc#1202131).
- iwlwifi: bump FW API to 72 for AX devices (bsc#1202131).
- iwlwifi: cfg: add support for 1K BA queue (bsc#1202131).
- iwlwifi: dbg-tlv: clean up iwl_dbg_tlv_update_drams() (bsc#1202131).
- iwlwifi: dbg: add infra for tracking free buffer size (bsc#1202131).
- iwlwifi: dbg: check trigger data before access (bsc#1202131).
- iwlwifi: dbg: disable ini debug in 8000 family and below (bsc#1202131).
- iwlwifi: dbg: in sync mode do not call schedule (bsc#1202131).
- iwlwifi: dbg: treat dbgc allocation failure when tlv is missing (bsc#1202131).
- iwlwifi: dbg: treat non active regions as unsupported regions (bsc#1202131).
- iwlwifi: dbg_ini: Split memcpy() to avoid multi-field write (bsc#1202131).
- iwlwifi: de-const properly where needed (bsc#1202131).
- iwlwifi: debugfs: remove useless double condition (bsc#1202131).
- iwlwifi: do not dump_stack() when we get an unexpected interrupt (bsc#1202131).
- iwlwifi: do not use __unused as variable name (bsc#1202131).
- iwlwifi: drv: load tlv debug data earlier (bsc#1202131).
- iwlwifi: dump CSR scratch from outer function (bsc#1202131).
- iwlwifi: dump RCM error tables (bsc#1202131).
- iwlwifi: dump both TCM error tables if present (bsc#1202131).
- iwlwifi: dump host monitor data when NIC does not init (bsc#1202131).
- iwlwifi: dvm: use struct_size over open coded arithmetic (bsc#1202131).
- iwlwifi: eeprom: clean up macros (bsc#1202131).
- iwlwifi: fix LED dependencies (bsc#1202131).
- iwlwifi: fix debug TLV parsing (bsc#1202131).
- iwlwifi: fix fw/img.c license statement (bsc#1202131).
- iwlwifi: fix iwl_legacy_rate_to_fw_idx (bsc#1202131).
- iwlwifi: fix small doc mistake for iwl_fw_ini_addr_val (bsc#1202131).
- iwlwifi: fix various more -Wcast-qual warnings (bsc#1202131).
- iwlwifi: fw dump: add infrastructure for dump scrubbing (bsc#1202131).
- iwlwifi: fw: add support for splitting region type bits (bsc#1202131).
- iwlwifi: fw: api: add link to PHY context command struct v1 (bsc#1202131).
- iwlwifi: fw: correctly detect HW-SMEM region subtype (bsc#1202131).
- iwlwifi: fw: fix some scan kernel-doc (bsc#1202131).
- iwlwifi: fw: init SAR GEO table only if data is present (bsc#1202131).
- iwlwifi: fw: make dump_start callback void (bsc#1202131).
- iwlwifi: fw: remove dead error log code (bsc#1202131).
- iwlwifi: implement reset flow for Bz devices (bsc#1202131).
- iwlwifi: iwl-eeprom-parse: mostly dvm only (bsc#1202131).
- iwlwifi: make iwl_fw_lookup_cmd_ver() take a cmd_id (bsc#1202131).
- iwlwifi: make iwl_txq_dyn_alloc_dma() return the txq (bsc#1202131).
- iwlwifi: make some functions friendly to sparse (bsc#1202131).
- iwlwifi: move symbols into a separate namespace (bsc#1202131).
- iwlwifi: mvm/api: define system control command (bsc#1202131).
- iwlwifi: mvm: Add RTS and CTS flags to iwl_tx_cmd_flags (bsc#1202131).
- iwlwifi: mvm: Add list of OEMs allowed to use TAS (bsc#1202131).
- iwlwifi: mvm: Add support for a new version of scan request command (bsc#1202131).
- iwlwifi: mvm: Add support for new rate_n_flags in tx_cmd (bsc#1202131).
- iwlwifi: mvm: Consider P2P GO operation during scan (bsc#1202131).
- iwlwifi: mvm: Disable WiFi bands selectively with BIOS (bsc#1202131).
- iwlwifi: mvm: Do not fail if PPAG isn't supported (bsc#1202131).
- iwlwifi: mvm: Fix wrong documentation for scan request command (bsc#1202131).
- iwlwifi: mvm: Passively scan non PSC channels only when requested so (bsc#1202131).
- iwlwifi: mvm: Read acpi dsm to get channel activation bitmap (bsc#1202131).
- iwlwifi: mvm: Remove antenna c references (bsc#1202131).
- iwlwifi: mvm: Support new TX_RSP and COMPRESSED_BA_RES versions (bsc#1202131).
- iwlwifi: mvm: Support new rate_n_flags for REPLY_RX_MPDU_CMD and RX_NO_DATA_NOTIF (bsc#1202131).
- iwlwifi: mvm: Support new version of BEACON_TEMPLATE_CMD (bsc#1202131).
- iwlwifi: mvm: Support new version of ranging response notification (bsc#1202131).
- iwlwifi: mvm: Support version 3 of tlc_update_notif (bsc#1202131).
- iwlwifi: mvm: Unify the scan iteration functions (bsc#1202131).
- iwlwifi: mvm: Use all Rx chains for roaming scan (bsc#1202131).
- iwlwifi: mvm: add US/CA to TAS block list if OEM isn't allowed (bsc#1202131).
- iwlwifi: mvm: add a flag to reduce power command (bsc#1202131).
- iwlwifi: mvm: add additional info for boot info failures (bsc#1202131).
- iwlwifi: mvm: add additional info for boot info failures (bsc#1202131).
- iwlwifi: mvm: add dbg_time_point to debugfs (bsc#1202131).
- iwlwifi: mvm: add definitions for new rate & flags (bsc#1202131).
- iwlwifi: mvm: add lmac/umac PC info in case of error (bsc#1202131).
- iwlwifi: mvm: add missing min_size to kernel-doc (bsc#1202131).
- iwlwifi: mvm: add some missing command strings (bsc#1202131).
- iwlwifi: mvm: add support for 160Mhz in ranging measurements (bsc#1202131).
- iwlwifi: mvm: add support for CT-KILL notification version 2 (bsc#1202131).
- iwlwifi: mvm: add support for IMR based on platform (bsc#1202131).
- iwlwifi: mvm: add support for OCE scan (bsc#1202131).
- iwlwifi: mvm: add support for PHY context command v4 (bsc#1202131).
- iwlwifi: mvm: add support for statistics update version 15 (bsc#1202131).
- iwlwifi: mvm: allow enabling UHB TAS in the USA via ACPI setting (bsc#1202131).
- iwlwifi: mvm: always remove the session protection after association (bsc#1202131).
- iwlwifi: mvm: always store the PPAG table as the latest version (bsc#1202131).
- iwlwifi: mvm: always use 4K RB size by default (bsc#1202131).
- iwlwifi: mvm: change old-SN drop threshold (bsc#1202131).
- iwlwifi: mvm: clean up indenting in iwl_mvm_tlc_update_notif() (bsc#1202131).
- iwlwifi: mvm: convert old rate & flags to the new format (bsc#1202131).
- iwlwifi: mvm: correct sta-state logic for TDLS (bsc#1202131).
- iwlwifi: mvm: correctly set channel flags (bsc#1202131).
- iwlwifi: mvm: correctly set schedule scan profiles (bsc#1202131).
- iwlwifi: mvm: d3: move GTK rekeys condition (bsc#1202131).
- iwlwifi: mvm: d3: support v12 wowlan status (bsc#1202131).
- iwlwifi: mvm: d3: use internal data representation (bsc#1202131).
- iwlwifi: mvm: demote non-compliant kernel-doc header (bsc#1202131).
- iwlwifi: mvm: do not get address of mvm->fwrt just to dereference as a pointer (bsc#1202131).
- iwlwifi: mvm: do not send BAID removal to the FW during hw_restart (bsc#1202131).
- iwlwifi: mvm: do not trust hardware queue number (bsc#1202131).
- iwlwifi: mvm: drop too short packets silently (bsc#1202131).
- iwlwifi: mvm: extend session protection on association (bsc#1202131).
- iwlwifi: mvm: fix WGDS table print in iwl_mvm_chub_update_mcc() (bsc#1202131).
- iwlwifi: mvm: fix a stray tab (bsc#1202131).
- iwlwifi: mvm: fix condition which checks the version of rate_n_flags (bsc#1202131).
- iwlwifi: mvm: fix delBA vs. NSSN queue sync race (bsc#1202131).
- iwlwifi: mvm: fix ieee80211_get_he_iftype_cap() iftype (bsc#1202131).
- iwlwifi: mvm: fix off by one in iwl_mvm_stat_iterator_all_macs() (bsc#1202131).
- iwlwifi: mvm: fw: clean up hcmd struct creation (bsc#1202131).
- iwlwifi: mvm: handle RX checksum on Bz devices (bsc#1202131).
- iwlwifi: mvm: improve log when processing CSA (bsc#1202131).
- iwlwifi: mvm: isolate offload assist (checksum) calculation (bsc#1202131).
- iwlwifi: mvm: make iwl_mvm_reconfig_scd() static (bsc#1202131).
- iwlwifi: mvm: offload channel switch timing to FW (bsc#1202131).
- iwlwifi: mvm: only enable HE DCM if we also support TX (bsc#1202131).
- iwlwifi: mvm: optionally suppress assert log (bsc#1202131).
- iwlwifi: mvm: parse firmware alive message version 6 (bsc#1202131).
- iwlwifi: mvm: read 6E enablement flags from DSM and pass to FW (bsc#1202131).
- iwlwifi: mvm: reduce WARN_ON() in TX status path (bsc#1202131).
- iwlwifi: mvm: refactor iwl_mvm_sta_rx_agg() (bsc#1202131).
- iwlwifi: mvm: refactor setting PPE thresholds in STA_HE_CTXT_CMD (bsc#1202131).
- iwlwifi: mvm: remove card state notification code (bsc#1202131).
- iwlwifi: mvm: remove cipher scheme support (bsc#1202131).
- iwlwifi: mvm: remove csi from iwl_mvm_pass_packet_to_mac80211() (bsc#1202131).
- iwlwifi: mvm: remove iwl_mvm_disable_txq() flags argument (bsc#1202131).
- iwlwifi: mvm: remove session protection after auth/assoc (bsc#1202131).
- iwlwifi: mvm: remove session protection on disassoc (bsc#1202131).
- iwlwifi: mvm: remove session protection upon station removal (bsc#1202131).
- iwlwifi: mvm: rfi: handle deactivation notification (bsc#1202131).
- iwlwifi: mvm: rfi: update rfi table (bsc#1202131).
- iwlwifi: mvm: rfi: use kmemdup() to replace kzalloc + memcpy (bsc#1202131).
- iwlwifi: mvm: scrub key material in firmware dumps (bsc#1202131).
- iwlwifi: mvm: set BT-coex high priority for 802.1X/4-way-HS (bsc#1202131).
- iwlwifi: mvm: set inactivity timeouts also for PS-poll (bsc#1202131).
- iwlwifi: mvm: starting from 22000 we have 32 Rx AMPDU sessions (bsc#1202131).
- iwlwifi: mvm: support Bz TX checksum offload (bsc#1202131).
- iwlwifi: mvm: support RLC configuration command (bsc#1202131).
- iwlwifi: mvm: support new BAID allocation command (bsc#1202131).
- iwlwifi: mvm: support revision 1 of WTAS table (bsc#1202131).
- iwlwifi: mvm: support v3 of station HE context command (bsc#1202131).
- iwlwifi: mvm: update BAID allocation command again (bsc#1202131).
- iwlwifi: mvm: update RFI TLV (bsc#1202131).
- iwlwifi: mvm: update definitions due to new rate & flags (bsc#1202131).
- iwlwifi: mvm: update rate scale in moving back to assoc state (bsc#1202131).
- iwlwifi: mvm: use a define for checksum flags mask (bsc#1202131).
- iwlwifi: mvm: use debug print instead of WARN_ON() (bsc#1202131).
- iwlwifi: nvm: Correct HE capability (bsc#1202131).
- iwlwifi: parse debug exclude data from firmware file (bsc#1202131).
- iwlwifi: parse error tables from debug TLVs (bsc#1202131).
- iwlwifi: pcie: Adapt rx queue write pointer for Bz family (bsc#1202131).
- iwlwifi: pcie: add jacket bit to device configuration parsing (bsc#1202131).
- iwlwifi: pcie: add support for MS devices (bsc#1202131).
- iwlwifi: pcie: adjust to Bz completion descriptor (bsc#1202131).
- iwlwifi: pcie: fix SW error MSI-X mapping (bsc#1202131).
- iwlwifi: pcie: fix constant-conversion warning (bsc#1202131).
- iwlwifi: pcie: fix killer name matching for AX200 (bsc#1202131).
- iwlwifi: pcie: iwlwifi: fix device id 7F70 struct (bsc#1202131).
- iwlwifi: pcie: make sure iwl_rx_packet_payload_len() will not underflow (bsc#1202131).
- iwlwifi: pcie: refactor dev_info lookup (bsc#1202131).
- iwlwifi: pcie: remove duplicate entry (bsc#1202131).
- iwlwifi: pcie: remove two duplicate PNJ device entries (bsc#1202131).
- iwlwifi: pcie: retake ownership after reset (bsc#1202131).
- iwlwifi: pcie: simplify iwl_pci_find_dev_info() (bsc#1202131).
- iwlwifi: pcie: support Bz suspend/resume trigger (bsc#1202131).
- iwlwifi: pcie: try to grab NIC access early (bsc#1202131).
- iwlwifi: pcie: update sw error interrupt for BZ family (bsc#1202131).
- iwlwifi: pnvm: print out the version properly (bsc#1202131).
- iwlwifi: prefer WIDE_ID() over iwl_cmd_id() (bsc#1202131).
- iwlwifi: propagate (const) type qualifier (bsc#1202131).
- iwlwifi: recognize missing PNVM data and then log filename (bsc#1202131).
- iwlwifi: remove MODULE_AUTHOR() statements (bsc#1202131).
- iwlwifi: remove command ID argument from queue allocation (bsc#1202131).
- iwlwifi: remove contact information (bsc#1202131).
- iwlwifi: remove deprecated broadcast filtering feature (bsc#1202131).
- iwlwifi: remove redundant iwl_finish_nic_init() argument (bsc#1202131).
- iwlwifi: remove unused DC2DC_CONFIG_CMD definitions (bsc#1202131).
- iwlwifi: remove unused iwlax210_2ax_cfg_so_hr_a0 structure (bsc#1202131).
- iwlwifi: remove unused macros (bsc#1202131).
- iwlwifi: rename CHANNEL_SWITCH_NOA_NOTIF to CHANNEL_SWITCH_START_NOTIF (bsc#1202131).
- iwlwifi: rename GEO_TX_POWER_LIMIT to PER_CHAIN_LIMIT_OFFSET_CMD (bsc#1202131).
- iwlwifi: rs: add support for TLC config command ver 4 (bsc#1202131).
- iwlwifi: scan: Modify return value of a function (bsc#1202131).
- iwlwifi: support 4-bits in MAC step value (bsc#1202131).
- iwlwifi: support SAR GEO Offset Mapping override via BIOS (bsc#1202131).
- iwlwifi: support new queue allocation command (bsc#1202131).
- iwlwifi: swap 1650i and 1650s killer struct names (bsc#1202131).
- iwlwifi: tlc: Add logs in rs_fw_rate_init func to print TLC configuration (bsc#1202131).
- iwlwifi: use 4k queue size for Bz A-step (bsc#1202131).
- iwlwifi: yoyo: Avoid using dram data if allocation failed (bsc#1202131).
- iwlwifi: yoyo: add IMR DRAM dump support (bsc#1202131).
- iwlwifi: yoyo: disable IMR DRAM region if IMR is disabled (bsc#1202131).
- iwlwifi: yoyo: dump IMR DRAM only for HW and FW error (bsc#1202131).
- iwlwifi: yoyo: fix DBGC allocation flow (bsc#1202131).
- iwlwifi: yoyo: fix DBGI_SRAM ini dump header (bsc#1202131).
- iwlwifi: yoyo: fix issue with new DBGI_SRAM region read (bsc#1202131).
- iwlwifi: yoyo: fw debug config from context info and preset (bsc#1202131).
- iwlwifi: yoyo: send hcmd to fw after dump collection completes (bsc#1202131).
- iwlwifi: yoyo: support TLV-based firmware reset (bsc#1202131).
- iwlwifi: yoyo: support dump policy for the dump size (bsc#1202131).
- iwlwifi: yoyo: support for DBGC4 for dram (bsc#1202131).
- iwlwifi: yoyo: support for ROM usniffer (bsc#1202131).
- jbd2: export jbd2_journal_[grab|put]_journal_head (bsc#1202775).
- jbd2: fix assertion 'jh->b_frozen_data == NULL' failure when journal aborted (bsc#1202716).
- jbd2: fix outstanding credits assert in jbd2_journal_commit_transaction() (bsc#1202715).
- kABI: scsi: libiscsi: fix removal of iscsi_create_conn (bsc#1198410).
- kabi/severities: add Qlogic qed symbols
- kabi/severities: add drivers/scsi/hisi_sas for bsc#1202471
- kabi/severities: add hisilicon hns3 symbols
- kabi/severities: add microchip dsa drivers
- kabi/severities: ignore kABI changes in mwifiex drivers Those symbols are used only locally in mwifiex (sub-)modules.
- kabi/severities: octeontx2 driver (jsc#SLE-24682)
- kbuild: dummy-tools: avoid tmpdir leak in dummy gcc (git-fixes).
- kbuild: fix the modules order between drivers and libs (git-fixes).
- kbuild: link vmlinux only once for CONFIG_TRIM_UNUSED_KSYMS (2nd attempt) (git-fixes).
- kcm: fix strp_init() order and cleanup (git-fies).
- kernel-binary: move @NOSOURCE@ to @SOURCES@ as in other packages
- kernel-source: include the kernel signature file We assume that the upstream tarball is used for released kernels. Then we can also include the signature file and keyring in the kernel-source src.rpm. Because of mkspec code limitation exclude the signature and keyring from binary packages always - mkspec does not parse spec conditionals.
- kfifo: fix kfifo_to_user() return type (git-fixes).
- lib/list_debug.c: Detect uninitialized lists (git-fixes).
- lib/raid6/test: fix multiple definition linking error (git-fixes).
- lib/smp_processor_id: fix imbalanced instrumentation_end() call (git-fixes).
- lkdtm: Disable return thunks in rodata.c (bsc#1190497).
- locking/lockdep: Fix lockdep_init_map_*() confusion (git-fixes).
- loop: Check for overflow while configuring loop (git-fies).
- mac80211: fix a memory leak where sta_info is not freed (git-fixes).
- mac80211: introduce channel switch disconnect function (bsc#1202131).
- marvell: octeontx2: build error: unknown type name 'u64' (jsc#SLE-24682).
- mbcache: add functions to delete entry if unused (bsc#1198971).
- mbcache: do not reclaim used entries (bsc#1198971).
- md/bitmap: do not set sb values if can't pass sanity check (bsc#1197158).
- md/raid0: Ignore RAID0 layout if the second zone has only one device (git-fixes).
- md/raid1: fix missing bitmap update w/o WriteMostly devices (bsc#1203036).
- media: [PATCH] pci: atomisp_cmd: fix three missing checks on list iterator (git-fixes).
- media: atmel: atmel-sama7g5-isc: fix warning in configs without OF (git-fixes).
- media: cedrus: h265: Fix flag name (git-fixes).
- media: cedrus: hevc: Add check for invalid timestamp (git-fixes).
- media: driver/nxp/imx-jpeg: fix a unexpected return value problem (git-fixes).
- media: hantro: postproc: Fix motion vector space size (git-fixes).
- media: hdpvr: fix error value returns in hdpvr_read (git-fixes).
- media: hevc: Embedded indexes in RPS (git-fixes).
- media: imx-jpeg: Add pm-runtime support for imx-jpeg (git-fixes).
- media: imx-jpeg: use NV12M to represent non contiguous NV12 (git-fixes).
- media: pvrusb2: fix memory leak in pvr_probe (git-fixes).
- media: tw686x: Fix memory leak in tw686x_video_init (git-fixes).
- media: tw686x: Register the irq at the end of probe (git-fixes).
- media: v4l2-mem2mem: prevent pollerr when last_buffer_dequeued is set (git-fixes).
- mediatek: mt76: eeprom: fix missing of_node_put() in mt76_find_power_limits_node() (git-fixes).
- mediatek: mt76: mac80211: Fix missing of_node_put() in mt76_led_init() (git-fixes).
- memstick/ms_block: Fix a memory leak (git-fixes).
- memstick/ms_block: Fix some incorrect memory allocation (git-fixes).
- meson-mx-socinfo: Fix refcount leak in meson_mx_socinfo_init (git-fixes).
- mfd: max77620: Fix refcount leak in max77620_initialise_fps (git-fixes).
- mfd: t7l66xb: Drop platform disable callback (git-fixes).
- misc: fastrpc: fix memory corruption on open (git-fixes).
- misc: fastrpc: fix memory corruption on probe (git-fixes).
- misc: rtsx: Fix an error handling path in rtsx_pci_probe() (git-fixes).
- mkspec: eliminate @NOSOURCE@ macro This should be alsways used with @SOURCES@, just include the content there.
- mm/rmap: Fix anon_vma->degree ambiguity leading to double-reuse (git-fixes). kABI: Fix kABI after 'mm/rmap: Fix anon_vma->degree ambiguity leading to double-reuse' (git-fixes).
- mm/rmap: Fix anon_vma-degree ambiguity leading to double-reuse (git-fixes, bsc#1203098).
- mm: bdi: initialize bdi_min_ratio when bdi is unregistered (bsc#1197763).
- mm: memcontrol: fix potential oom_lock recursion deadlock (bsc#1202447).
- mm: pagewalk: Fix race between unmap and page walker (git-fixes, bsc#1203159).
- mmc: block: Add single read for 4k sector cards (git-fixes).
- mmc: cavium-octeon: Add of_node_put() when breaking out of loop (git-fixes).
- mmc: cavium-thunderx: Add of_node_put() when breaking out of loop (git-fixes).
- mmc: core: Fix UHS-I SD 1.8V workaround branch (git-fixes).
- mmc: meson-gx: Fix an error handling path in meson_mmc_probe() (git-fixes).
- mmc: mxcmmc: Silence a clang warning (git-fixes).
- mmc: pxamci: Fix an error handling path in pxamci_probe() (git-fixes).
- mmc: pxamci: Fix another error handling path in pxamci_probe() (git-fixes).
- mmc: renesas_sdhi: Get the reset handle early in the probe (git-fixes).
- mmc: sdhci-of-at91: fix set_uhs_signaling rewriting of MC1R (git-fixes).
- mmc: sdhci-of-esdhc: Fix refcount leak in esdhc_signal_voltage_switch (git-fixes).
- mmc: tmio: avoid glitches when resetting (git-fixes).
- mt76: mt76x02u: fix possible memory leak in __mt76x02u_mcu_send_msg (git-fixes).
- mt76: mt7921: enlarge maximum VHT MPDU length to 11454 (git-fixes).
- mt76: mt7921: fix aggregation subframes setting to HE max (git-fixes).
- mtd: dataflash: Add SPI ID table (git-fixes).
- mtd: maps: Fix refcount leak in ap_flash_init (git-fixes).
- mtd: maps: Fix refcount leak in of_flash_probe_versatile (git-fixes).
- mtd: parsers: ofpart: Fix refcount leak in bcm4908_partitions_fw_offset (git-fixes).
- mtd: partitions: Fix refcount leak in parse_redboot_of (git-fixes).
- mtd: rawnand: arasan: Fix clock rate in NV-DDR (git-fixes).
- mtd: rawnand: gpmi: Set WAIT_FOR_READY timeout based on program/erase times (git-fixes).
- mtd: rawnand: meson: Fix a potential double free issue (git-fixes).
- mtd: sm_ftl: Fix deadlock caused by cancel_work_sync in sm_release (git-fixes).
- mtd: spi-nor: fix spi_nor_spimem_setup_op() call in spi_nor_erase_{sector,chip}() (git-fixes).
- mtd: st_spi_fsm: Add a clk_disable_unprepare() in .probe()'s error path (git-fixes).
- musb: fix USB_MUSB_TUSB6010 dependency (git-fixes).
- mwifiex: Ignore BTCOEX events from the 88W8897 firmware (git-fixes).
- n_gsm: remove unused parameters from gsm_error() (git-fixes).
- net: asix: fix 'can't send until first packet is send' issue (git-fixes).
- net: bcmgenet: Use stronger register read/writes to assure ordering (git-fixes).
- net: dsa: b53: Add SPI ID table (git-fixes).
- net: dsa: felix: Fix memory leak in felix_setup_mmio_filtering (git-fixes).
- net: dsa: felix: purge skb from TX timestamping queue if it cannot be sent (git-fies).
- net: dsa: hellcreek: Add STP forwarding rule (git-fixes).
- net: dsa: hellcreek: Add missing PTP via UDP rules (git-fixes).
- net: dsa: hellcreek: Allow PTP P2P measurements on blocked ports (git-fixes).
- net: dsa: hellcreek: Fix insertion of static FDB entries (git-fixes).
- net: dsa: microchip: implement multi-bridge support (git-fixes).
- net: dsa: mv88e6xxx: Add fix for erratum 5.2 of 88E6393X family (git-fixes).
- net: dsa: mv88e6xxx: Drop unnecessary check in mv88e6393x_serdes_erratum_4_6() (git-fixes).
- net: dsa: mv88e6xxx: Enable port policy support on 6097 (git-fixes).
- net: dsa: mv88e6xxx: Fix application of erratum 4.8 for 88E6393X (git-fixes).
- net: dsa: mv88e6xxx: Fix inband AN for 2500base-x on 88E6393X family (git-fixes).
- net: dsa: mv88e6xxx: Link in pcs_get_state() if AN is bypassed (git-fixes).
- net: dsa: mv88e6xxx: Save power by disabling SerDes trasmitter and receiver (git-fixes).
- net: dsa: mv88e6xxx: Unforce speed & duplex in mac_link_down() (git-fixes).
- net: dsa: mv88e6xxx: allow use of PHYs on CPU and DSA ports (git-fixes).
- net: dsa: mv88e6xxx: error handling for serdes_power functions (git-fixes).
- net: dsa: mv88e6xxx: fix 'do not use PHY_DETECT on internal PHY's' (git-fixes).
- net: dsa: ocelot: seville: utilize of_mdiobus_register (git-fixes).
- net: dsa: qca8k: fix MTU calculation (git-fixes).
- net: dsa: seville: register the mdiobus under devres (git-fixes).
- net: dsa: tag_ocelot_8021q: break circular dependency with ocelot switch lib (git-fies).
- net: enetc: report software timestamping via SO_TIMESTAMPING (git-fixes).
- net: hns3: clean residual vf config after disable sriov (git-fixes).
- net: macsec: fix potential resource leak in macsec_add_rxsa() and macsec_add_txsa() (git-fixes).
- net: marvell: prestera: fix incorrect structure access (git-fixes).
- net: mscc: ocelot: correctly report the timestamping RX filters in ethtool (git-fixes).
- net: mscc: ocelot: create a function that replaces an existing VCAP filter (git-fixes).
- net: mscc: ocelot: do not dereference NULL pointers with shared tc filters (git-fixes).
- net: mscc: ocelot: do not downgrade timestamping RX filters in SIOCSHWTSTAMP (git-fixes).
- net: mscc: ocelot: fix incorrect balancing with down LAG ports (git-fixes).
- net: mscc: ocelot: set up traps for PTP packets (git-fixes).
- net: openvswitch: do not send internal clone attribute to the userspace (git-fixes).
- net: openvswitch: fix leak of nested actions (git-fixes).
- net: openvswitch: fix misuse of the cached connection on tuple changes (git-fixes).
- net: openvswitch: fix parsing of nw_proto for IPv6 fragments (git-fixes).
- net: phy: Do not WARN for PHY_READY state in mdio_bus_phy_resume() (git-fixes).
- net: phy: Warn about incorrect mdio_bus_phy_resume() state (git-fixes).
- net: phy: smsc: Disable Energy Detect Power-Down in interrupt mode (git-fixes).
- net: ptp: add a definition for the UDP port for IEEE 1588 general messages (git-fixes).
- net: rose: fix netdev reference changes (git-fixes).
- net: sock: tracing: Fix sock_exceed_buf_limit not to dereference stale pointer (git-fixes).
- net: stmmac: clean up impossible condition (git-fixes).
- net: stmmac: disable Split Header (SPH) for Intel platforms (bsc#1194904).
- net: stmmac: dwc-qos: Disable split header for Tegra194 (bsc#1194904).
- net: stmmac: fix off-by-one error in sanity check (git-fixes).
- net: usb: ax88179_178a needs FLAG_SEND_ZLP (git-fixes).
- net: usb: ax88179_178a: add Allied Telesis AT-UMCs (git-fixes).
- net: usb: make USB_RTL8153_ECM non user configurable (git-fixes).
- net: vmxnet3: fix possible NULL pointer dereference in vmxnet3_rq_cleanup() (bsc#1200431).
- net: vmxnet3: fix possible use-after-free bugs in vmxnet3_rq_alloc_rx_buf() (bsc#1200431).
- net: vmxnet3: remove multiple false checks in vmxnet3_ethtool.c (bsc#1200431).
- net:enetc: allocate CBD ring data memory using DMA coherent methods (git-fixes).
- net_sched: cls_route: disallow handle of 0 (bsc#1202393).
- nfc: pn533: Fix use-after-free bugs caused by pn532_cmd_timeout (git-fixes).
- nfsd: fix use-after-free due to delegation race (git-fixes).
- nmi: Extend NMI watchdog's timer during LPM (bsc#1202872 ltc#197920).
- nohz/full, sched/rt: Fix missed tick-reenabling bug in dequeue_task_rt() (bnc#1189999 (Scheduler functional and performance backports)).
- nouveau: explicitly wait on the fence in nouveau_bo_move_m2mf (git-fies).
- ntb_hw_amd: Add NTB PCI ID for new gen CPU (bsc#1202113).
- nvme-auth: align to pre-upstream FFDHE implementation (bsc#1202265).
- nvme-fabrics: parse nvme connect Linux error codes (bsc#1201865).
- nvme-rdma: Handle number of queue changes (bsc#1201865).
- nvme-tcp: Handle number of queue changes (bsc#1201865).
- nvme-tcp: fix UAF when detecting digest errors (bsc#1200313 bsc#1201489).
- nvme: fix RCU hole that allowed for endless looping in multipath round robin (bsc#1202636).
- nvmet: Expose max queues to configfs (bsc#1201865).
- ocfs2: dlmfs: fix error handling of user_dlm_destroy_lock (bsc#1202778).
- ocfs2: fix a deadlock when commit trans (bsc#1202776).
- octeontx2-af: Add KPU changes to parse NGIO as separate layer (jsc#SLE-24682).
- octeontx2-af: Add PTP device id for CN10K and 95O silcons (jsc#SLE-24682).
- octeontx2-af: Add SDP interface support (jsc#SLE-24682).
- octeontx2-af: Add debug messages for failures (jsc#SLE-24682).
- octeontx2-af: Add external ptp input clock (jsc#SLE-24682).
- octeontx2-af: Add free rsrc count mbox msg (jsc#SLE-24682).
- octeontx2-af: Add mbox to retrieve bandwidth profile free count (jsc#SLE-24682).
- octeontx2-af: Add support to flush full CPT CTX cache (jsc#SLE-24682).
- octeontx2-af: Adjust LA pointer for cpt parse header (jsc#SLE-24682).
- octeontx2-af: Allocate low priority entries for PF (jsc#SLE-24682).
- octeontx2-af: Allow to configure flow tag LSB byte as RSS adder (jsc#SLE-24682).
- octeontx2-af: Change the order of queue work and interrupt disable (jsc#SLE-24682).
- octeontx2-af: Do not enable Pause frames by default (jsc#SLE-24682).
- octeontx2-af: Enable CPT HW interrupts (jsc#SLE-24682).
- octeontx2-af: Enhance mailbox trace entry (jsc#SLE-24682).
- octeontx2-af: Fix LBK backpressure id count (jsc#SLE-24682).
- octeontx2-af: Fix inconsistent license text (jsc#SLE-24682).
- octeontx2-af: Fix interrupt name strings (jsc#SLE-24682).
- octeontx2-af: Fix spelling mistake 'Makesure' -> 'Make sure' (jsc#SLE-24682).
- octeontx2-af: Fix uninitialized variable val (jsc#SLE-24682).
- octeontx2-af: Flow control resource management (jsc#SLE-24682).
- octeontx2-af: Handle return value in block reset (jsc#SLE-24682).
- octeontx2-af: Hardware configuration for inline IPsec (jsc#SLE-24682).
- octeontx2-af: Increase link credit restore polling timeout (jsc#SLE-24682).
- octeontx2-af: Increase number of reserved entries in KPU (jsc#SLE-24682).
- octeontx2-af: Increment ptp refcount before use (jsc#SLE-24682).
- octeontx2-af: Limit KPU parsing for GTPU packets (jsc#SLE-24682).
- octeontx2-af: Modify install flow error codes (jsc#SLE-24682).
- octeontx2-af: Optimize KPU1 processing for variable-length headers (jsc#SLE-24682).
- octeontx2-af: Perform cpt lf teardown in non FLR path (jsc#SLE-24682).
- octeontx2-af: Priority flow control configuration support (jsc#SLE-24682).
- octeontx2-af: Remove channel verification while installing MCAM rules (jsc#SLE-24682).
- octeontx2-af: Remove redundant initialization of variable blkaddr (jsc#SLE-24682).
- octeontx2-af: Remove redundant initialization of variable pin (jsc#SLE-24682).
- octeontx2-af: Reset PTP config in FLR handler (jsc#SLE-24682).
- octeontx2-af: Retry until RVU block reset complete (jsc#SLE-24682).
- octeontx2-af: Use DMA_ATTR_FORCE_CONTIGUOUS attribute in DMA alloc (jsc#SLE-24682).
- octeontx2-af: Use NDC TX for transmit packet data (jsc#SLE-24682).
- octeontx2-af: Use ptp input clock info from firmware data (jsc#SLE-24682).
- octeontx2-af: Wait for TX link idle for credits change (jsc#SLE-24682).
- octeontx2-af: add proper return codes for AF mailbox handlers (jsc#SLE-24682).
- octeontx2-af: cn10K: Get NPC counters value (jsc#SLE-24682).
- octeontx2-af: cn10K: support for sched lmtst and other features (jsc#SLE-24682).
- octeontx2-af: cn10k: DWRR MTU configuration (jsc#SLE-24682).
- octeontx2-af: cn10k: RPM hardware timestamp configuration (jsc#SLE-24682).
- octeontx2-af: cn10k: Set cache lines for NPA batch alloc (jsc#SLE-24682).
- octeontx2-af: cn10k: Use appropriate register for LMAC enable (jsc#SLE-24682).
- octeontx2-af: cn10k: add workaround for ptp errata (jsc#SLE-24682).
- octeontx2-af: cn10k: debugfs for dumping LMTST map table (jsc#SLE-24682).
- octeontx2-af: configure npc for cn10k to allow packets from cpt (jsc#SLE-24682).
- octeontx2-af: debugfs: Add channel and channel mask (jsc#SLE-24682).
- octeontx2-af: debugfs: Minor changes (jsc#SLE-24682).
- octeontx2-af: debugfs: do not corrupt user memory (jsc#SLE-24682).
- octeontx2-af: debugfs: fix error return of allocations (jsc#SLE-24682).
- octeontx2-af: enable tx shaping feature for 96xx C0 (jsc#SLE-24682).
- octeontx2-af: fix array bound error (jsc#SLE-24682).
- octeontx2-af: fix error code in is_valid_offset() (jsc#SLE-24682).
- octeontx2-af: initialize action variable (jsc#SLE-24682).
- octeontx2-af: nix and lbk in loop mode in 98xx (jsc#SLE-24682).
- octeontx2-af: remove redudant second error check on variable err (jsc#SLE-24682).
- octeontx2-af: use swap() to make code cleaner (jsc#SLE-24682).
- octeontx2-af: verify CQ context updates (jsc#SLE-24682).
- octeontx2-nic: fix mixed module build (jsc#SLE-24682).
- octeontx2-nicvf: Add PTP hardware clock support to NIX VF (jsc#SLE-24682).
- octeontx2-nicvf: Free VF PTP resources (jsc#SLE-24682).
- octeontx2-pf: Add TC feature for VFs (jsc#SLE-24682).
- octeontx2-pf: Add XDP support to netdev PF (jsc#SLE-24682).
- octeontx2-pf: Add check for non zero mcam flows (jsc#SLE-24682).
- octeontx2-pf: Add support for adaptive interrupt coalescing (jsc#SLE-24682).
- octeontx2-pf: Add vlan-etype to ntuple filters (jsc#SLE-24682).
- octeontx2-pf: Allow VLAN priority also in ntuple filters (jsc#SLE-24682).
- octeontx2-pf: CN10K: Hide RPM stats over ethtool (jsc#SLE-24682).
- octeontx2-pf: Do not mask out supported link modes (jsc#SLE-24682).
- octeontx2-pf: Enable NETIF_F_RXALL support for VF driver (jsc#SLE-24682).
- octeontx2-pf: Fix inconsistent license text (jsc#SLE-24682).
- octeontx2-pf: Ntuple filters support for VF netdev (jsc#SLE-24682).
- octeontx2-pf: PFC config support with DCBx (jsc#SLE-24682).
- octeontx2-pf: Remove unnecessary synchronize_irq() before free_irq() (jsc#SLE-24682).
- octeontx2-pf: Simplify the receive buffer size calculation (jsc#SLE-24682).
- octeontx2-pf: Sort the allocated MCAM entry indices (jsc#SLE-24682).
- octeontx2-pf: Unify flow management variables (jsc#SLE-24682).
- octeontx2-pf: Use hardware register for CQE count (jsc#SLE-24682).
- octeontx2-pf: cn10K: Reserve LMTST lines per core (jsc#SLE-24682).
- octeontx2-pf: cn10k: Config DWRR weight based on MTU (jsc#SLE-24682).
- octeontx2-pf: cn10k: Ensure valid pointers are freed to aura (jsc#SLE-24682).
- octeontx2-pf: cn10k: add support for new ptp timestamp format (jsc#SLE-24682).
- octeontx2-pf: devlink params support to set mcam entry count (jsc#SLE-24682).
- octeontx2-pf: replace bitmap_weight with bitmap_empty where appropriate (jsc#SLE-24682).
- octeontx2-pf: select CONFIG_NET_DEVLINK (jsc#SLE-24682).
- octeontx2-vf: Add support for adaptive interrupt coalescing (jsc#SLE-24682).
- octeontx2: Move devlink registration to be last devlink command (jsc#SLE-24682).
- openvswitch: Fix setting ipv6 fields causing hw csum failure (git-fixes).
- openvswitch: Fixed nd target mask field in the flow dump (git-fixes).
- pci: Add support for ACPI RST reset method (jsc#SLE-19359 jsc#SLE-24572).
- perf bench futex: Fix memory leak of perf_cpu_map__new() (git-fixes).
- phy: samsung: phy-exynos-pcie: sanitize init/power_on callbacks (git-fixes).
- phy: stm32: fix error return in stm32_usbphyc_phy_init (git-fixes).
- pinctrl: amd: Do not save/restore interrupt status and wake status bits (git-fixes).
- pinctrl: intel: Check against matching data instead of ACPI companion (git-fixes).
- pinctrl: nomadik: Fix refcount leak in nmk_pinctrl_dt_subnode_to_map (git-fixes).
- pinctrl: qcom: msm8916: Allow CAMSS GP clocks to be muxed (git-fixes).
- pinctrl: qcom: sm8250: Fix PDC map (git-fixes).
- pinctrl: sunxi: Add I/O bias setting for H6 R-PIO (git-fixes).
- platform/chrome: cros_ec: Always expose last resume result (git-fixes).
- platform/chrome: cros_ec_proto: do not show MKBP version if unsupported (git-fixes).
- platform/olpc: Fix uninitialized data in debugfs write (git-fixes).
- platform/x86: pmc_atom: Fix SLP_TYPx bitfield mask (git-fixes).
- platform/x86: pmc_atom: Match all Lex BayTrail boards with critclk_systems DMI table (git-fixes).
- powerpc/perf: Optimize clearing the pending PMI and remove WARN_ON for PMI check in power_pmu_disable (bsc#1156395).
- powerpc/powernv/kvm: Use darn for H_RANDOM on Power9 (bsc#1065729).
- powerpc/powernv: Avoid crashing if rng is NULL (bsc#1065729).
- powerpc/powernv: delay rng platform device creation until later in boot (bsc#1065729).
- powerpc/powernv: rename remaining rng powernv_ functions to pnv_ (bsc#1065729).
- powerpc/powernv: wire up rng during setup_arch (bsc#1065729).
- powerpc/pseries: wire up rng during setup_arch() (bsc#1065729).
- powerpc/xive: Fix refcount leak in xive_get_max_prio (git-fixess).
- powerpc: Avoid discarding flags in system_call_exception() (bsc#1194869).
- powerpc: Enable execve syscall exit tracepoint (bsc#1065729).
- powerpc: powernv: kABI: add back powernv_get_random_long (bsc#1065729).
- proc: fix a dentry lock race between release_task and lookup (git-fixes).
- proc: fix dentry/inode overinstantiating under /proc/${pid}/net (git-fixes).
- profiling: fix shift too large makes kernel panic (git-fixes).
- pwm: lpc18xx-sct: Reduce number of devm memory allocations (git-fixes).
- pwm: lpc18xx-sct: Simplify driver by not using pwm_[gs]et_chip_data() (git-fixes).
- pwm: lpc18xx: Fix period handling (git-fixes).
- qed: validate and restrict untrusted VFs vlan promisc mode (git-fixes).
- r8152: fix the RX FIFO settings when suspending (git-fixes).
- r8152: fix the units of some registers for RTL8156A (git-fixes).
- random: remove useless header comment (git-fixes).
- ratelimit: Fix data-races in ___ratelimit() (git-fixes).
- regulator: of: Fix refcount leak bug in of_get_regulation_constraints() (git-fixes).
- regulator: pca9450: Remove restrictions for regulator-name (git-fixes).
- regulator: qcom_smd: Fix pm8916_pldo range (git-fixes).
- remoteproc: imx_rproc: Fix refcount leak in imx_rproc_addr_init (git-fixes).
- remoteproc: k3-r5: Fix refcount leak in k3_r5_cluster_of_init (git-fixes).
- remoteproc: qcom: pas: Check if coredump is enabled (git-fixes).
- remoteproc: qcom: pas: Mark devices as wakeup capable (git-fixes).
- remoteproc: qcom: q6v5-mss: add powerdomains to MSM8996 config (git-fixes).
- remoteproc: qcom: wcnss: Fix handling of IRQs (git-fixes).
- remoteproc: sysmon: Wait for SSCTL service to come up (git-fixes).
- rose: check NULL rose_loopback_neigh->loopback (git-fixes).
- rpm/kernel-binary.spec.in: move vdso to a separate package (bsc#1202385) We do the move only on 15.5+.
- rpm/kernel-binary.spec.in: simplify find for usrmerged The type test and print line are the same for both cases. The usrmerged case only ignores more, so refactor it to make it more obvious.
- rpm/kernel-source.spec.in: simplify finding of broken symlinks 'find -xtype l' will report them, so use that to make the search a bit faster (without using shell).
- rpm: Fix parsing of rpm/macros.kernel-source on SLE12 (bsc#1201019).
- rpmsg: char: Add mutex protection for rpmsg_eptdev_open() (git-fixes).
- rpmsg: mtk_rpmsg: Fix circular locking dependency (git-fixes).
- rpmsg: qcom_smd: Fix refcount leak in qcom_smd_parse_edge (git-fixes).
- s390/cpumf: Handle events cycles and instructions identical (git-fixes).
- s390/crash: fix incorrect number of bytes to copy to user space (git-fixes).
- s390/crash: make copy_oldmem_page() return number of bytes copied (git-fixes).
- s390/hugetlb: fix prepare_hugepage_range() check for 2 GB hugepages (git-fixes).
- s390/hypfs: avoid error message under KVM (bsc#1032323).
- s390/kexec: handle R_390_PLT32DBL rela in arch_kexec_apply_relocations_add() (git-fixes).
- s390/mm: do not trigger write fault when vma does not allow VM_WRITE (git-fixes).
- s390/mm: use non-quiescing sske for KVM switch to keyed guest (git-fixes).
- s390/qeth: cache link_info for ethtool (bsc#1202262 LTC#199322).
- s390/stp: clock_delta should be signed (git-fixes).
- s390/zcore: fix race when reading from hardware system area (git-fixes).
- sched/core: Always flush pending blk_plug (bnc#1189999 (Scheduler functional and performance backports)).
- sched/core: Do not requeue task on CPU excluded from cpus_mask (bnc#1199356).
- sched/deadline: Fix BUG_ON condition for deboosted tasks (git-fixes)
- sched/fair: Fix cfs_rq_clock_pelt() for throttled cfs_rq (bnc#1189999 (Scheduler functional and performance backports)).
- sched/fair: Fix cfs_rq_clock_pelt() for throttled cfs_rq -kabi (git fixes (sched/fair)).
- sched/fair: Remove redundant word ' *' (bnc#1189999 (Scheduler functional and performance backports)).
- sched/uclamp: Fix iowait boost escaping uclamp restriction (git-fixes)
- sched/uclamp: Fix rq->uclamp_max not set on first enqueue (git-fixes)
- sched: Allow newidle balancing to bail out of load_balance (bnc#1189999 (Scheduler functional and performance backports)).
- sched: Fix the check of nr_running at queue wakelist (bnc#1189999 (Scheduler functional and performance backports)).
- sched: Remove the limitation of WF_ON_CPU on wakelist if wakee cpu is idle (bnc#1189999 (Scheduler functional and performance backports)). Refresh
- sched: Remove unused function group_first_cpu() (bnc#1189999).
- scripts/faddr2line: Fix vmlinux detection on arm64 (git-fixes).
- scsi: hisi_sas: Keep controller active between ISR of phyup and the event being processed (bsc#1202471).
- scsi: hisi_sas: Use autosuspend for the host controller (bsc#1202471).
- scsi: libiscsi: Add iscsi_cls_conn to sysfs after initialization (bsc#1198410).
- scsi: lpfc: Add warning notification period to CMF_SYNC_WQE (bsc#1203063).
- scsi: lpfc: Check the return value of alloc_workqueue() (bsc#1203063).
- scsi: lpfc: Copyright updates for 14.2.0.5 patches (bsc#1201956).
- scsi: lpfc: Copyright updates for 14.2.0.6 patches (bsc#1203063).
- scsi: lpfc: Fix attempted FA-PWWN usage after feature disable (bsc#1201956).
- scsi: lpfc: Fix lost NVMe paths during LIF bounce stress test (bsc#1201956).
- scsi: lpfc: Fix null ndlp ptr dereference in abnormal exit path for GFT_ID (bsc#1203063).
- scsi: lpfc: Fix possible memory leak when failing to issue CMF WQE (bsc#1201956).
- scsi: lpfc: Fix uninitialized cqe field in lpfc_nvme_cancel_iocb() (bsc#1201956).
- scsi: lpfc: Fix unsolicited FLOGI receive handling during PT2PT discovery (bsc#1203063).
- scsi: lpfc: Prevent buffer overflow crashes in debugfs with malformed user input (bsc#1201956).
- scsi: lpfc: Refactor lpfc_nvmet_prep_abort_wqe() into lpfc_sli_prep_abort_xri() (bsc#1201956).
- scsi: lpfc: Remove Menlo/Hornet related code (bsc#1201956).
- scsi: lpfc: Remove SANDiags related code (bsc#1203063).
- scsi: lpfc: Remove extra atomic_inc on cmd_pending in queuecommand after VMID (bsc#1201956).
- scsi: lpfc: Revert RSCN_MEMENTO workaround for misbehaved configuration (bsc#1201956).
- scsi: lpfc: Rework MIB Rx Monitor debug info logic (bsc#1203063).
- scsi: lpfc: Set PU field when providing D_ID in XMIT_ELS_RSP64_CX iocb (bsc#1201956).
- scsi: lpfc: Update lpfc version to 14.2.0.5 (bsc#1201956).
- scsi: lpfc: Update lpfc version to 14.2.0.6 (bsc#1203063).
- scsi: mpt3sas: Stop fw fault watchdog work item during system shutdown (git-fixes).
- scsi: sg: Allow waiting for commands to complete on removed device (git-fixes).
- scsi: smartpqi: Fix DMA direction for RAID requests (git-fixes).
- scsi: ufs: core: Fix another task management completion race (git-fixes).
- scsi: ufs: core: Fix task management completion timeout race (git-fixes).
- scsi: zfcp: Fix missing auto port scan and thus missing target ports (git-fixes).
- selftests/seccomp: Fix compile warning when CC=clang (git-fixes).
- selftests: kvm: set rax before vmcall (git-fixes).
- selftests: timers: clocksource-switch: fix passing errors from child (git-fixes).
- selftests: timers: valid-adjtimex: build fix for newer toolchains (git-fixes).
- selinux: Add boundary check in put_entry() (git-fixes).
- selinux: access superblock_security_struct in LSM blob way (git-fixes).
- selinux: check return value of sel_make_avc_files (git-fixes).
- selinux: fix bad cleanup on error in hashtab_duplicate() (git-fixes).
- selinux: fix double free of cond_list on error paths (git-fixes).
- selinux: fix memleak in security_read_state_kernel() (git-fixes).
- selinux: fix misuse of mutex_is_locked() (git-fixes).
- selinux: use correct type for context length (git-fixes).
- serial: 8250: Add proper clock handling for OxSemi PCIe devices (git-fixes).
- serial: 8250: Export ICR access helpers for internal use (git-fixes).
- serial: 8250: Fold EndRun device support into OxSemi Tornado code (git-fixes).
- serial: 8250_bcm7271: Save/restore RTS in suspend/resume (git-fixes).
- serial: 8250_dw: Store LSR into lsr_saved_flags in dw8250_tx_wait_empty() (git-fixes).
- serial: 8250_fsl: Do not report FE, PE and OE twice (git-fixes).
- serial: 8250_pci: Refactor the loop in pci_ite887x_init() (git-fixes).
- serial: 8250_pci: Replace dev_*() by pci_*() macros (git-fixes).
- serial: fsl_lpuart: RS485 RTS polariy is inverse (git-fixes).
- serial: mvebu-uart: uart2 error bits clearing (git-fixes).
- soc: amlogic: Fix refcount leak in meson-secure-pwrc.c (git-fixes).
- soc: brcmstb: pm-arm: Fix refcount leak and __iomem leak bugs (git-fixes).
- soc: fsl: guts: machine variable might be unset (git-fixes).
- soc: fsl: select FSL_GUTS driver for DPIO (git-fixes).
- soc: imx: gpcv2: Assert reset before ungating clock (git-fixes).
- soc: qcom: Make QCOM_RPMPD depend on PM (git-fixes).
- soc: qcom: aoss: Fix refcount leak in qmp_cooling_devices_register (git-fixes).
- soc: qcom: ocmem: Fix refcount leak in of_get_ocmem (git-fixes).
- soc: renesas: r8a779a0-sysc: Fix A2DP1 and A2CV[2357] PDR values (git-fixes).
- soundwire: bus_type: fix remove and shutdown support (git-fixes).
- soundwire: qcom: Check device status before reading devid (git-fixes).
- soundwire: qcom: fix device status array range (git-fixes).
- spi: Fix incorrect cs_setup delay handling (git-fixes).
- spi: Fix simplification of devm_spi_register_controller (git-fixes).
- spi: dt-bindings: cadence: add missing 'required' (git-fixes).
- spi: dt-bindings: zynqmp-qspi: add missing 'required' (git-fixes).
- spi: meson-spicc: add local pow2 clock ops to preserve rate between messages (git-fixes).
- spi: spi-altera-dfl: Fix an error handling path (git-fixes).
- spi: spi-rspi: Fix PIO fallback on RZ platforms (git-fixes).
- spi: synquacer: Add missing clk_disable_unprepare() (git-fixes).
- spi: tegra20-slink: fix UAF in tegra_slink_remove() (git-fixes).
- spmi: trace: fix stack-out-of-bound access in SPMI tracing functions (git-fixes).
- staging: rtl8192u: Fix sleep in atomic context bug in dm_fsync_timer_callback (git-fixes).
- staging: rtl8712: fix use after free bugs (git-fixes).
- supported.conf: added drivers/net/ethernet/marvell/octeontx2/nic/otx2_ptp and changed all octeontx2 modules as supported (jsc#SLE-24682)
- supported.conf: mark lib/objagg supported as dependency of mlxsw
- supported.conf: mark mlxsw modules supported (jsc#SLE-23766)
- thermal/int340x_thermal: handle data_vault when the value is ZERO_SIZE_PTR (bsc#1201308).
- thermal/tools/tmon: Include pthread and time headers in tmon.h (git-fixes).
- thermal: sysfs: Fix cooling_device_stats_setup() error code path (git-fixes).
- thunderbolt: Use the actual buffer in tb_async_error() (git-fixes).
- tools/thermal: Fix possible path truncations (git-fixes).
- tpm: eventlog: Fix section mismatch for DEBUG_SECTION_MISMATCH (git-fixes).
- trace/osnoise: Add migrate-disabled field to the osnoise header (git-fixes).
- trace/timerlat: Add migrate-disabled field to the timerlat header (git-fixes).
- tracing/histograms: Fix memory leak problem (git-fixes).
- tracing/kprobes: Check whether get_kretprobe() returns NULL in kretprobe_dispatcher() (git-fixes).
- tracing/probes: Have kprobes and uprobes use $COMM too (git-fixes).
- tracing: Add ustring operation to filtering string pointers (git-fixes).
- tracing: Fix sleeping while atomic in kdb ftdump (git-fixes).
- tracing: Have filter accept 'common_cpu' to be consistent (git-fixes).
- tracing: Use a struct alignof to determine trace event field alignment (git-fixes).
- tty: 8250: Add support for Brainboxes PX cards (git-fixes).
- tty: n_gsm: Modify CR,PF bit printk info when config requester (git-fixes).
- tty: n_gsm: Modify cr bit value when config requester (git-fixes).
- tty: n_gsm: Modify gsmtty driver register method when config requester (git-fixes).
- tty: n_gsm: add sanity check for gsm->receive in gsm_receive_buf() (git-fixes).
- tty: n_gsm: avoid call of sleeping functions from atomic context (git-fixes).
- tty: n_gsm: clean up dead code in gsm_queue() (git-fixes).
- tty: n_gsm: clean up implicit CR bit encoding in address field (git-fixes).
- tty: n_gsm: clean up indenting in gsm_queue() (git-fixes).
- tty: n_gsm: fix DM command (git-fixes).
- tty: n_gsm: fix broken virtual tty handling (git-fixes).
- tty: n_gsm: fix deadlock and link starvation in outgoing data path (git-fixes).
- tty: n_gsm: fix flow control handling in tx path (git-fixes).
- tty: n_gsm: fix missing corner cases in gsmld_poll() (git-fixes).
- tty: n_gsm: fix missing mux reset on config change at responder (git-fixes).
- tty: n_gsm: fix missing timer to handle stalled links (git-fixes).
- tty: n_gsm: fix non flow control frames during mux flow off (git-fixes).
- tty: n_gsm: fix packet re-transmission without open control channel (git-fixes).
- tty: n_gsm: fix race condition in gsmld_write() (git-fixes).
- tty: n_gsm: fix resource allocation order in gsm_activate_mux() (git-fixes).
- tty: n_gsm: fix tty registration before control channel open (git-fixes).
- tty: n_gsm: fix user open not possible at responder until initiator open (git-fixes).
- tty: n_gsm: fix wrong T1 retry count handling (git-fixes).
- tty: n_gsm: fix wrong queuing behavior in gsm_dlci_data_output() (git-fixes).
- tty: n_gsm: initialize more members at gsm_alloc_mux() (git-fixes).
- tty: n_gsm: replace kicktimer with delayed_work (git-fixes).
- tty: serial: Fix refcount leak bug in ucc_uart.c (git-fixes).
- tty: serial: fsl_lpuart: correct the count of break characters (git-fixes).
- tty: serial: lpuart: disable flow control while waiting for the transmit engine to complete (git-fixes).
- tty: vt: initialize unicode screen buffer (git-fixes).
- udf: Fix crash after seekdir (bsc#1194592).
- udmabuf: Set the DMA mask for the udmabuf device (v2) (git-fixes).
- usb: aspeed-vhub: Fix refcount leak bug in ast_vhub_init_desc() (git-fixes).
- usb: cdns3 fix use-after-free at workaround 2 (git-fixes).
- usb: cdns3: Do not use priv_dev uninitialized in cdns3_gadget_ep_enable() (git-fixes).
- usb: cdns3: change place of 'priv_ep' assignment in cdns3_gadget_ep_dequeue(), cdns3_gadget_ep_enable() (git-fixes).
- usb: cdns3: fix incorrect handling TRB_SMM flag for ISOC transfer (git-fixes).
- usb: cdns3: fix issue with rearming ISO OUT endpoint (git-fixes).
- usb: cdns3: fix random warning message when driver load (git-fixes).
- usb: dwc2: fix wrong order of phy_power_on and phy_init (git-fixes).
- usb: dwc2: gadget: remove D+ pull-up while no vbus with usb-role-switch (git-fixes).
- usb: dwc3: core: Deprecate GCTL.CORESOFTRESET (git-fixes).
- usb: dwc3: core: Do not perform GCTL_CORE_SOFTRESET during bootup (git-fixes).
- usb: dwc3: dwc3-qcom: Add missing platform_device_put() in dwc3_qcom_acpi_register_core (git-fixes).
- usb: dwc3: dwc3-qcom: Fix typo in the dwc3 vbus override API (git-fixes).
- usb: dwc3: gadget: Avoid duplicate requests to enable Run/Stop (git-fixes).
- usb: dwc3: gadget: fix high speed multiplier setting (git-fixes).
- usb: dwc3: gadget: refactor dwc3_repare_one_trb (git-fixes).
- usb: dwc3: qcom: Add helper functions to enable,disable wake irqs (git-fixes).
- usb: dwc3: qcom: fix missing optional irq warnings (git-fixes).
- usb: dwc3: qcom: fix use-after-free on runtime-PM wakeup (git-fixes).
- usb: gadget: f_uac2: clean up some inconsistent indenting (git-fixes).
- usb: gadget: f_uac2: fix superspeed transfer (git-fixes).
- usb: gadget: mass_storage: Fix cdrom data transfers on MAC-OS (git-fixes).
- usb: gadget: tegra-xudc: Fix error check in tegra_xudc_powerdomain_init() (git-fixes).
- usb: gadget: udc-xilinx: replace memcpy with memcpy_toio (git-fixes).
- usb: gadget: udc: amd5536 depends on HAS_DMA (git-fixes).
- usb: gadget: uvc: call uvc uvcg_warn on completed status instead of uvcg_info (git-fixes).
- usb: host: Fix refcount leak in ehci_hcd_ppc_of_probe (git-fixes).
- usb: host: ohci-ppc-of: Fix refcount leak bug (git-fixes).
- usb: host: xhci: use snprintf() in xhci_decode_trb() (git-fixes).
- usb: ohci-nxp: Fix refcount leak in ohci_hcd_nxp_probe (git-fixes).
- usb: renesas: Fix refcount leak bug (git-fixes).
- usb: typec: altmodes/displayport: correct pin assignment for UFP receptacles (git-fixes).
- usb: typec: tcpm: Return ENOTSUPP for power supply prop writes (git-fixes).
- usb: typec: ucsi: Acknowledge the GET_ERROR_STATUS command completion (git-fixes).
- usb: xhci: tegra: Fix error check (git-fixes).
- usbnet: Fix linkwatch use-after-free on disconnect (git-fixes).
- usbnet: smsc95xx: Avoid link settings race on interrupt reception (git-fixes).
- usbnet: smsc95xx: Do not clear read-only PHY interrupt (git-fixes).
- usbnet: smsc95xx: Fix deadlock on runtime resume (git-fixes).
- usbnet: smsc95xx: Forward PHY interrupts to PHY driver to avoid polling (git-fixes).
- vboxguest: Do not use devm for irq (git-fixes).
- vdpa_sim: avoid putting an uninitialized iova_domain (git-fixes).
- venus: pm_helpers: Fix warning in OPP during probe (git-fixes).
- vfio/ccw: Do not change FSM state in subchannel event (git-fixes).
- vfio/ccw: Remove UUID from s390 debug log (git-fixes).
- vfio: Clear the caps->buf to NULL after free (git-fixes).
- video: fbdev: amba-clcd: Fix refcount leak bugs (git-fixes).
- video: fbdev: arkfb: Check the size of screen before memset_io() (git-fixes).
- video: fbdev: arkfb: Fix a divide-by-zero bug in ark_set_pixclock() (git-fixes).
- video: fbdev: i740fb: Check the argument of i740_calc_vclk() (git-fixes).
- video: fbdev: s3fb: Check the size of screen before memset_io() (git-fixes).
- video: fbdev: sis: fix typos in SiS_GetModeID() (git-fixes).
- video: fbdev: vt8623fb: Check the size of screen before memset_io() (git-fixes).
- virtio-gpu: fix a missing check to avoid NULL dereference (git-fixes).
- virtio-net: fix the race between refill work and close (git-fixes).
- virtio_net: fix memory leak inside XPD_TX with mergeable (git-fixes).
- vmxnet3: Implement ethtool's get_channels command (bsc#1200431).
- vmxnet3: Record queue number to incoming packets (bsc#1200431).
- vmxnet3: Remove useless DMA-32 fallback configuration (bsc#1200431).
- vmxnet3: add command to set ring buffer sizes (bsc#1200431).
- vmxnet3: add support for capability registers (bsc#1200431).
- vmxnet3: add support for large passthrough BAR register (bsc#1200431).
- vmxnet3: add support for out of order rx completion (bsc#1200431).
- vmxnet3: disable overlay offloads if UPT device does not support (bsc#1200431).
- vmxnet3: do not reschedule napi for rx processing (bsc#1200431).
- vmxnet3: limit number of TXDs used for TSO packet (bsc#1200431).
- vmxnet3: prepare for version 7 changes (bsc#1200431).
- vmxnet3: switch from 'pci_' to 'dma_' API (bsc#1200431).
- vmxnet3: update to version 7 (bsc#1200431).
- vmxnet3: use ext1 field to indicate encapsulated packet (bsc#1200431).
- vrf: do not run conntrack on vrf with !dflt qdisc (git-fixes).
- vsock: Fix memory leak in vsock_connect() (git-fixes).
- vsock: Set socket state back to SS_UNCONNECTED in vsock_connect_timeout() (git-fixes).
- watchdog: armada_37xx_wdt: check the return value of devm_ioremap() in armada_37xx_wdt_probe() (git-fixes).
- watchdog: sp5100_tco: Fix a memory leak of EFCH MMIO resource (git-fixes).
- wifi: cfg80211: debugfs: fix return type in ht40allow_map_read() (git-fixes).
- wifi: iwlegacy: 4965: fix potential off-by-one overflow in il4965_rs_fill_link_cmd() (git-fixes).
- wifi: iwlwifi: mvm: fix double list_add at iwl_mvm_mac_wake_tx_queue (git-fixes).
- wifi: libertas: Fix possible refcount leak in if_usb_probe() (git-fixes).
- wifi: mac80211: Do not finalize CSA in IBSS mode if state is disconnected (git-fixes).
- wifi: mac80211: limit A-MSDU subframes for client too (git-fixes).
- wifi: mac80211_hwsim: add back erroneously removed cast (git-fixes).
- wifi: mac80211_hwsim: fix race condition in pending packet (git-fixes).
- wifi: mac80211_hwsim: use 32-bit skb cookie (git-fixes).
- wifi: p54: Fix an error handling path in p54spi_probe() (git-fixes).
- wifi: p54: add missing parentheses in p54_flush() (git-fixes).
- wifi: rtlwifi: fix error codes in rtl_debugfs_set_write_h2c() (git-fixes).
- wifi: rtlwifi: remove always-true condition pointed out by GCC 12 (git-fies).
- wifi: rtw88: check the return value of alloc_workqueue() (git-fixes).
- wifi: rtw89: 8852a: rfk: fix div 0 exception (git-fixes).
- wifi: wil6210: debugfs: fix info leak in wil_write_file_wmi() (git-fixes).
- wifi: wil6210: debugfs: fix uninitialized variable use in `wil_write_file_wmi()` (git-fixes).
- wireless: Remove redundant 'flush_workqueue()' calls (bsc#1202131).
- x86/Hyper-V: Add SEV negotiate protocol support in Isolation VM (bsc#1190497).
- x86/olpc: fix 'logical not is only applied to the left hand side' (git-fixes).
- x86/retbleed: Add fine grained Kconfig knobs (bsc#1190497).
- x86/sev: Define the Linux-specific guest termination reasons (bsc#1190497).
- x86/sev: Save the negotiated GHCB version (bsc#1190497).
- xen/gntdev: fix unmap notification order (git-fixes).
- xen/privcmd: fix error exit of privcmd_ioctl_dm_op() (git-fixes).
- xen/xenbus: fix return type in xenbus_file_read() (git-fixes).
- xen: detect uninitialized xenbus in xenbus_init (git-fixes).
- xen: do not continue xenstore initialization in case of errors (git-fixes).
- xfs: Fix the free logic of state in xfs_attr_node_hasname (git-fixes).
- xfs: check sb_meta_uuid for dabuf buffer recovery (git-fixes).
- xfs: fix soft lockup via spinning in filestream ag selection loop (git-fixes).
- xfs: fix use-after-free in xattr node block inactivation (git-fixes).
- xfs: fold perag loop iteration logic into helper function (git-fixes).
- xfs: make xfs_rtalloc_query_range input parameters const (git-fixes).
- xfs: only bother with sync_filesystem during readonly remount (git-fixes).
- xfs: prevent UAF in xfs_log_item_in_current_chkpt (git-fixes).
- xfs: prevent a UAF when log IO errors race with unmount (git-fixes).
- xfs: remove incorrect ASSERT in xfs_rename (git-fixes).
- xfs: rename the next_agno perag iteration variable (git-fixes).
- xfs: reorder iunlink remove operation in xfs_ifree (git-fixes).
- xfs: revert 'xfs: actually bump warning counts when we send warnings' (git-fixes).
- xfs: terminate perag iteration reliably on agcount (git-fixes).
- xfs: use invalidate_lock to check the state of mmap_lock (git-fixes).
- xfs: use kmem_cache_free() for kmem_cache objects (git-fixes).
- xfs: use setattr_copy to set vfs inode attributes (git-fixes).
    Patchnames
SUSE-2022-3288,SUSE-SLE-Module-Public-Cloud-15-SP4-2022-3288,openSUSE-SLE-15.4-2022-3288
    Terms of use
CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).
    {
  "document": {
    "aggregate_severity": {
      "namespace": "https://www.suse.com/support/security/rating/",
      "text": "important"
    },
    "category": "csaf_security_advisory",
    "csaf_version": "2.0",
    "distribution": {
      "text": "Copyright 2024 SUSE LLC. All rights reserved.",
      "tlp": {
        "label": "WHITE",
        "url": "https://www.first.org/tlp/"
      }
    },
    "lang": "en",
    "notes": [
      {
        "category": "summary",
        "text": "Security update for the Linux Kernel",
        "title": "Title of the patch"
      },
      {
        "category": "description",
        "text": "\nThe SUSE Linux Enterprise 15 SP4 Azure kernel was updated to receive various security and bugfixes.\n\n\nThe following security bugs were fixed:\n\n- CVE-2022-39190: Fixed an issue that was discovered in net/netfilter/nf_tables_api.c and could cause a denial of service upon binding to an already bound chain (bnc#1203117).\n- CVE-2022-39188: Fixed race condition in include/asm-generic/tlb.h where a device driver can free a page while it still has stale TLB entries (bnc#1203107).\n- CVE-2022-36946: Fixed a denial of service (panic) inside nfqnl_mangle in net/netfilter/nfnetlink_queue.c (bnc#1201940).\n- CVE-2022-36879: Fixed an issue in xfrm_expand_policies in net/xfrm/xfrm_policy.c where a refcount could be dropped twice (bnc#1201948).\n- CVE-2022-3078: Fixed a lack of check after calling vzalloc() and lack of free after allocation in drivers/media/test-drivers/vidtv/vidtv_s302m.c (bnc#1203041).\n- CVE-2022-3028: Fixed race condition that was found in the IP framework for transforming packets (XFRM subsystem) (bnc#1202898).\n- CVE-2022-2977: Fixed reference counting for struct tpm_chip (bsc#1202672).\n- CVE-2022-2959: Fixed a race condition that was found inside the watch queue due to a missing lock in pipe_resize_ring() (bnc#1202681).\n- CVE-2022-2938: Fixed a flaw that was found inside the Pressure Stall Information implementation that could have been used to allow an attacker to crash the system or have other memory-corruption side effects (bnc#1202623).\n- CVE-2022-2905: Fixed tnum_range usage on array range checking for poke descriptors (bsc#1202564, bsc#1202860).\n- CVE-2022-2873: Fixed an out-of-bounds memory access flaw that was found in iSMT SMBus host controller driver (bnc#1202558).\n- CVE-2022-28693: Fixed x86/speculation behavior by disabling RRSBA (bsc#1201455).\n- CVE-2022-28356: Fixed a refcount leak bug that was found in net/llc/af_llc.c (bnc#1197391).\n- CVE-2022-2663: Fixed an issue that was found in nf_conntrack_irc where the message handling could be confused and incorrectly matches the message (bnc#1202097).\n- CVE-2022-2639: Fixed an integer coercion error that was found in the openvswitch kernel module (bnc#1202154).\n- CVE-2022-26373: Fixed non-transparent sharing of return predictor targets between contexts in some Intel Processors that may have allowed information disclosure via local access (bnc#1201726).\n- CVE-2022-2588: Fixed use-after-free in cls_route (bsc#1202096).\n- CVE-2022-2585: Fixed missing cleanup of CPU timers before freeing them during exec (bsc#1202094).\n- CVE-2022-20369: Fixed out of bounds write in v4l2_m2m_querybuf of v4l2-mem2mem.c (bnc#1202347).\n- CVE-2022-20368: Fixed slab-out-of-bounds access in packet_recvmsg() (bsc#1202346).\n- CVE-2022-1184: Fixed an use-after-free flaw in fs/ext4/namei.c:dx_insert_block() in the filesystem sub-component (bnc#1198577).\n- CVE-2021-4037: Fixed function logic vulnerability that allowed local users to create files for the XFS file-system with an unintended group ownership and with group execution and SGID permission bits set (bnc#1198702).\n- CVE-2021-33135: Fixed uncontrolled resource consumption inside Intel(R) SGX that may have allowed an authenticated user to potentially enable denial of service via local access (bnc#1199515).\n- CVE-2020-36516: Fixed an issue in the mixed IPID assignment method where an attacker was able to inject data into or terminate a victim\u0027s TCP session (bnc#1196616).\n- CVE-2016-3695: Fixed an issue inside the einj_error_inject function in drivers/acpi/apei/einj.c that allowed users to simulate hardware errors and consequently cause a denial of service (bnc#1023051).\n\n\nThe following non-security bugs were fixed:\n\n- ACPI: APEI: Better fix to avoid spamming the console with old error logs (git-fixes).\n- ACPI: APEI: explicit init of HEST and GHES in apci_init() (git-fixes).\n- ACPI: CPPC: Do not prevent CPPC from working in the future (git-fixes).\n- ACPI: EC: Drop the EC_FLAGS_IGNORE_DSDT_GPE quirk (git-fixes).\n- ACPI: EC: Remove duplicate ThinkPad X1 Carbon 6th entry from DMI quirks (git-fixes).\n- ACPI: LPSS: Fix missing check in register_device_clock() (git-fixes).\n- ACPI: PM: save NVS memory for Lenovo G40-45 (git-fixes).\n- ACPI: VIOT: Fix ACS setup (git-fixes).\n- ACPI: processor/idle: Annotate more functions to live in cpuidle section (git-fixes).\n- ACPI: processor: Remove freq Qos request for all CPUs (git-fixes).\n- ACPI: property: Return type of acpi_add_nondev_subnodes() should be bool (git-fixes).\n- ACPI: thermal: drop an always true check (git-fixes).\n- ACPI: video: Force backlight native for some TongFang devices (git-fixes).\n- ACPI: video: Shortening quirk list by identifying Clevo by board_name only (git-fixes).\n- ALSA: bcd2000: Fix a UAF bug on the error path of probing (git-fixes).\n- ALSA: hda/cirrus - support for iMac 12,1 model (git-fixes).\n- ALSA: hda/conexant: Add quirk for LENOVO 20149 Notebook model (git-fixes).\n- ALSA: hda/conexant: add a new hda codec SN6140 (git-fixes).\n- ALSA: hda/realtek: Add a quirk for HP OMEN 15 (8786) mute LED (git-fixes).\n- ALSA: hda/realtek: Add quirk for Clevo NS50PU, NS70PU (git-fixes).\n- ALSA: hda/realtek: Add quirk for Clevo NV45PZ (git-fixes).\n- ALSA: hda/realtek: Add quirk for HP Spectre x360 15-eb0xxx (git-fixes).\n- ALSA: hda/realtek: Add quirk for Lenovo Yoga9 14IAP7 (git-fixes).\n- ALSA: hda/realtek: Add quirk for another Asus K42JZ model (git-fixes).\n- ALSA: hda/realtek: Add speaker AMP init for Samsung laptops with ALC298 (git-fixes).\n- ALSA: hda/sigmatel: Keep power up while beep is enabled (bsc#1200544).\n- ALSA: hda: intel-nhlt: Correct the handling of fmt_config flexible array (git-fixes).\n- ALSA: info: Fix llseek return value when using callback (git-fixes).\n- ALSA: seq: Fix data-race at module auto-loading (git-fixes).\n- ALSA: seq: oss: Fix data-race for max_midi_devs access (git-fixes).\n- ALSA: usb-audio: Add endianness annotations (git-fixes).\n- ALSA: usb-audio: Add quirk for Behringer UMC202HD (git-fixes).\n- ALSA: usb-audio: Add quirk for LH Labs Geek Out HD Audio 1V5 (git-fixes).\n- ALSA: usb-audio: More comprehensive mixer map for ASUS ROG Zenith II (git-fixes).\n- ALSA: usb-audio: Support jack detection on Dell dock (git-fixes).\n- ALSA: usb-audio: Turn off \u0027manual mode\u0027 on Dell dock (git-fixes).\n- ARM: OMAP2+: Fix refcount leak in omap3xxx_prm_late_init (git-fixes).\n- ARM: OMAP2+: Fix refcount leak in omapdss_init_of (git-fixes).\n- ARM: OMAP2+: display: Fix refcount leak bug (git-fixes).\n- ARM: OMAP2+: pdata-quirks: Fix refcount leak bug (git-fixes).\n- ARM: bcm: Fix refcount leak in bcm_kona_smc_init (git-fixes).\n- ARM: dts: BCM5301X: Add DT for Meraki MR26 (git-fixes).\n- ARM: dts: ast2500-evb: fix board compatible (git-fixes).\n- ARM: dts: ast2600-evb-a1: fix board compatible (git-fixes).\n- ARM: dts: ast2600-evb: fix board compatible (git-fixes).\n- ARM: dts: at91: sama5d27_wlsom1: do not keep ldo2 enabled all the time (git-fixes).\n- ARM: dts: at91: sama5d27_wlsom1: specify proper regulator output ranges (git-fixes).\n- ARM: dts: at91: sama5d2_icp: do not keep vdd_other enabled all the time (git-fixes).\n- ARM: dts: at91: sama5d2_icp: specify proper regulator output ranges (git-fixes).\n- ARM: dts: imx6qdl-kontron-samx6i: remove duplicated node (git-fixes).\n- ARM: dts: imx6ul: add missing properties for sram (git-fixes).\n- ARM: dts: imx6ul: change operating-points to uint32-matrix (git-fixes).\n- ARM: dts: imx6ul: fix csi node compatible (git-fixes).\n- ARM: dts: imx6ul: fix keypad compatible (git-fixes).\n- ARM: dts: imx6ul: fix lcdif node compatible (git-fixes).\n- ARM: dts: imx6ul: fix qspi node compatible (git-fixes).\n- ARM: dts: imx7d-colibri-emmc: add cpu1 supply (git-fixes).\n- ARM: dts: qcom: mdm9615: add missing PMIC GPIO reg (git-fixes).\n- ARM: dts: qcom: pm8841: add required thermal-sensor-cells (git-fixes).\n- ARM: dts: qcom: sdx55: Fix the IRQ trigger type for UART (git-fixes).\n- ARM: dts: uniphier: Fix USB interrupts for PXs2 SoC (git-fixes).\n- ARM: findbit: fix overflowing offset (git-fixes).\n- ARM: shmobile: rcar-gen2: Increase refcount for new reference (git-fixes).\n- ASoC: SOF: debug: Fix potential buffer overflow by snprintf() (git-fixes).\n- ASoC: audio-graph-card: Add of_node_put() in fail path (git-fixes).\n- ASoC: codec: tlv320aic32x4: fix mono playback via I2S (git-fixes).\n- ASoC: codecs: da7210: add check for i2c_add_driver (git-fixes).\n- ASoC: codecs: msm8916-wcd-digital: move gains from SX_TLV to S8_TLV (git-fixes).\n- ASoC: codecs: wcd9335: move gains from SX_TLV to S8_TLV (git-fixes).\n- ASoC: cros_ec_codec: Fix refcount leak in cros_ec_codec_platform_probe (git-fixes).\n- ASoC: fsl-asoc-card: force cast the asrc_format type (git-fixes).\n- ASoC: fsl_asrc: force cast the asrc_format type (git-fixes).\n- ASoC: fsl_easrc: use snd_pcm_format_t type for sample_format (git-fixes).\n- ASoC: imx-audmux: Silence a clang warning (git-fixes).\n- ASoC: imx-card: Fix DSD/PDM mclk frequency (git-fixes).\n- ASoC: imx-card: use snd_pcm_format_t type for asrc_format (git-fixes).\n- ASoC: mchp-spdifrx: disable end of block interrupt on failures (git-fixes).\n- ASoC: mt6359: Fix refcount leak bug (git-fixes).\n- ASoC: mt6797-mt6351: Fix refcount leak in mt6797_mt6351_dev_probe (git-fixes).\n- ASoC: qcom: Fix missing of_node_put() in asoc_qcom_lpass_cpu_platform_probe() (git-fixes).\n- ASoC: qcom: q6dsp: Fix an off-by-one in q6adm_alloc_copp() (git-fixes).\n- ASoC: rsnd: care default case on rsnd_ssiu_busif_err_irq_ctrl() (git-fixes).\n- ASoC: samsung: Fix error handling in aries_audio_probe (git-fixes).\n- ASoC: samsung: change gpiod_speaker_power and rx1950_audio from global to static variables (git-fixes).\n- ASoC: samsung: change neo1973_audio from a global to static (git-fixes).\n- ASoC: samsung: h1940_uda1380: include proepr GPIO consumer header (git-fixes).\n- ASoC: tas2770: Allow mono streams (git-fixes).\n- ASoC: tas2770: Drop conflicting set_bias_level power setting (git-fixes).\n- ASoC: tas2770: Fix handling of mute/unmute (git-fixes).\n- ASoC: tas2770: Set correct FSYNC polarity (git-fixes).\n- Bluetooth: L2CAP: Fix build errors in some archs (git-fixes).\n- Bluetooth: L2CAP: Fix l2cap_global_chan_by_psm regression (git-fixes).\n- Bluetooth: L2CAP: Fix use-after-free caused by l2cap_chan_put (git-fixes).\n- Bluetooth: MGMT: Fixes build warnings with C=1 (git-fixes).\n- Bluetooth: btusb: Add Realtek RTL8852C support ID 0x04C5:0x1675 (git-fixes).\n- Bluetooth: btusb: Add Realtek RTL8852C support ID 0x04CA:0x4007 (git-fixes).\n- Bluetooth: btusb: Add Realtek RTL8852C support ID 0x0CB8:0xC558 (git-fixes).\n- Bluetooth: btusb: Add Realtek RTL8852C support ID 0x13D3:0x3586 (git-fixes).\n- Bluetooth: btusb: Add Realtek RTL8852C support ID 0x13D3:0x3587 (git-fixes).\n- Bluetooth: btusb: Add support of IMC Networks PID 0x3568 (git-fixes).\n- Bluetooth: hci_bcm: Add BCM4349B1 variant (git-fixes).\n- Bluetooth: hci_bcm: Add DT compatible for CYW55572 (git-fixes).\n- Bluetooth: hci_intel: Add check for platform_driver_register (git-fixes).\n- Documentation: ACPI: EINJ: Fix obsolete example (git-fixes).\n- Documentation: PM: Drop pme_interrupt reference (git-fixes).\n- Documentation: dm writecache: Render status list as list (git-fixes).\n- Documentation: fix sctp_wmem in ip-sysctl.rst (git-fixes).\n- Documentation: siphash: Fix typo in the name of offsetofend macro (git-fixes).\n- EDAC/ghes: Set the DIMM label unconditionally (bsc#1201768).\n- HID: AMD_SFH: Add a DMI quirk entry for Chromebooks (git-fixes).\n- HID: add Lenovo Yoga C630 battery quirk (git-fixes).\n- HID: alps: Declare U1_UNICORN_LEGACY support (git-fixes).\n- HID: amd_sfh: Add NULL check for hid device (git-fixes).\n- HID: amd_sfh: Handle condition of \u0027no sensors\u0027 (git-fixes).\n- HID: asus: ROG NKey: Ignore portion of 0x5a report (git-fixes).\n- HID: cp2112: prevent a buffer overflow in cp2112_xfer() (git-fixes).\n- HID: hid-input: add Surface Go battery quirk (git-fixes).\n- HID: mcp2221: prevent a buffer overflow in mcp_smbus_write() (git-fixes).\n- HID: multitouch: new device class fix Lenovo X12 trackpad sticky (git-fixes).\n- HID: steam: Prevent NULL pointer dereference in steam_{recv,send}_report (git-fies).\n- HID: thrustmaster: Add sparco wheel and fix array length (git-fixes).\n- HID: wacom: Do not register pad_input for touch switch (git-fixes).\n- HID: wacom: Only report rotation for art pen (git-fixes).\n- Input: exc3000 - fix return value check of wait_for_completion_timeout (git-fixes).\n- Input: gscps2 - check return value of ioremap() in gscps2_probe() (git-fixes).\n- Input: i8042 - add TUXEDO devices to i8042 quirk tables (git-fies).\n- Input: i8042 - add additional TUXEDO devices to i8042 quirk tables (git-fies).\n- Input: i8042 - merge quirk tables (git-fies).\n- Input: i8042 - move __initconst to fix code styling warning (git-fies).\n- Input: iforce - wake up after clearing IFORCE_XMIT_RUNNING flag (git-fixes).\n- Input: rk805-pwrkey - fix module autoloading (git-fixes).\n- KABI: cgroup: Restore KABI of css_set (bsc#1201610).\n- KEYS: asymmetric: enforce SM2 signature use pkey algo (git-fixes).\n- KVM: LAPIC: Also cancel preemption timer during SET_LAPIC (git-fixes).\n- KVM: MMU: shadow nested paging does not have PKU (git-fixes).\n- KVM: PPC: Book3S HV: Check return value of kvmppc_radix_init (bsc#1194869).\n- KVM: PPC: Book3S HV: Prevent POWER7/8 TLB flush flushing SLB (bsc#1156395).\n- KVM: PPC: Book3S HV: Remove kvmhv_p9_[set,restore]_lpcr declarations (bsc#1194869).\n- KVM: PPC: Book3S HV: Use GLOBAL_TOC for kvmppc_h_set_dabr/xdabr() (bsc#1156395).\n- KVM: PPC: Book3S HV: fix incorrect NULL check on list iterator (bsc#1194869).\n- KVM: PPC: Book3s HV: Remove unused function kvmppc_bad_interrupt (bsc#1194869).\n- KVM: PPC: Fix vmx/vsx mixup in mmio emulation (bsc#1156395).\n- KVM: PPC: Use arch_get_random_seed_long instead of powernv variant (bsc#1156395).\n- KVM: SVM: Do not BUG if userspace injects an interrupt with GIF=0 (git-fixes).\n- KVM: SVM: Do not intercept #GP for SEV guests (git-fixes).\n- KVM: SVM: Unwind \u0027speculative\u0027 RIP advancement if INTn injection \u0027fails\u0027 (git-fixes).\n- KVM: SVM: fix panic on out-of-bounds guest IRQ (git-fixes).\n- KVM: VMX: Print VM-instruction error as unsigned (git-fixes).\n- KVM: VMX: prepare sync_pir_to_irr for running with APICv disabled (git-fixes).\n- KVM: VMX: switch blocked_vcpu_on_cpu_lock to raw spinlock (git-fixes).\n- KVM: X86: Use vcpu-\u003earch.walk_mmu for kvm_mmu_invlpg() (git-fixes).\n- KVM: X86: avoid uninitialized \u0027fault.async_page_fault\u0027 from fixed-up #PF (git-fixes).\n- KVM: arm64: Avoid setting the upper 32 bits of TCR_EL2 and CPTR_EL2 (bsc#1201442)\n- KVM: nVMX: Inject #UD if VMXON is attempted with incompatible CR0/CR4 (git-fixes).\n- KVM: nVMX: Let userspace set nVMX MSR to any _host_ supported value (git-fixes).\n- KVM: nVMX: Set UMIP bit CR4_FIXED1 MSR when emulating UMIP (git-fixes).\n- KVM: nVMX: Snapshot pre-VM-Enter BNDCFGS for !nested_run_pending case (git-fixes).\n- KVM: nVMX: Snapshot pre-VM-Enter DEBUGCTL for !nested_run_pending case (git-fixes).\n- KVM: nVMX: Synthesize TRIPLE_FAULT for L2 if emulation is required (git-fixes).\n- KVM: nVMX: do not use vcpu-\u003earch.efer when checking host state on nested state load (git-fixes).\n- KVM: x86/mmu: Do not freak out if pml5_root is NULL on 4-level host (git-fixes).\n- KVM: x86/mmu: Move \u0027invalid\u0027 check out of kvm_tdp_mmu_get_root() (git-fixes).\n- KVM: x86/mmu: Zap _all_ roots when unmapping gfn range in TDP MMU (git-fixes).\n- KVM: x86/mmu: include EFER.LMA in extended mmu role (git-fixes).\n- KVM: x86/mmu: make apf token non-zero to fix bug (git-fixes).\n- KVM: x86: Avoid theoretical NULL pointer dereference in kvm_irq_delivery_to_apic_fast() (git-fixes).\n- KVM: x86: Check lapic_in_kernel() before attempting to set a SynIC irq (git-fixes).\n- KVM: x86: Forbid VMM to set SYNIC/STIMER MSRs when SynIC wasn\u0027t activated (git-fixes).\n- KVM: x86: Mark TSS busy during LTR emulation _after_ all fault checks (git-fixes).\n- KVM: x86: SVM: do not passthrough SMAP/SMEP/PKE bits in !NPT \u0026\u0026 !gCR0.PG case (git-fixes).\n- KVM: x86: Set error code to segment selector on LLDT/LTR non-canonical #GP (git-fixes).\n- KVM: x86: check PIR even for vCPUs with disabled APICv (git-fixes).\n- KVM: x86: hyper-v: Drop redundant \u0027ex\u0027 parameter from kvm_hv_flush_tlb() (git-fixes).\n- KVM: x86: ignore APICv if LAPIC is not enabled (git-fixes).\n- KVM: x86: remove PMU FIXED_CTR3 from msrs_to_save_all (git-fixes).\n- KVM: x86: revalidate steal time cache if MSR value changes (git-fixes).\n- NFSD: Clamp WRITE offsets (git-fixes).\n- NFSD: Fix NFSv3 SETATTR/CREATE\u0027s handling of large file sizes (git-fixes).\n- NFSD: Fix ia_size underflow (git-fixes).\n- NFSD: Fix possible sleep during nfsd4_release_lockowner() (git-fixes).\n- NFSD: prevent integer overflow on 32 bit systems (git-fixes).\n- NFSD: prevent underflow in nfssvc_decode_writeargs() (git-fixes).\n- NTB: ntb_tool: uninitialized heap data in tool_fn_write() (git-fixes).\n- PCI/ACPI: Guard ARM64-specific mcfg_quirks (git-fixes).\n- PCI/AER: Iterate over error counters instead of error strings (git-fixes).\n- PCI/portdrv: Do not disable AER reporting in get_port_device_capability() (git-fixes).\n- PCI: Add ACS quirk for Broadcom BCM5750x NICs (git-fixes).\n- PCI: aardvark: Fix reporting Slot capabilities on emulated bridge (git-fixes).\n- PCI: dwc: Add unroll iATU space support to dw_pcie_disable_atu() (git-fixes).\n- PCI: dwc: Always enable CDM check if \u0027snps,enable-cdm-check\u0027 exists (git-fixes).\n- PCI: dwc: Deallocate EPC memory on dw_pcie_ep_init() errors (git-fixes).\n- PCI: dwc: Disable outbound windows only for controllers using iATU (git-fixes).\n- PCI: dwc: Set INCREASE_REGION_SIZE flag based on limit address (git-fixes).\n- PCI: dwc: Stop link on host_init errors and de-initialization (git-fixes).\n- PCI: endpoint: Do not stop controller when unbinding endpoint function (git-fixes).\n- PCI: hv: Only reuse existing IRTE allocation for Multi-MSI (bsc#1200845).\n- PCI: microchip: Fix refcount leak in mc_pcie_init_irq_domains() (git-fixes).\n- PCI: qcom: Power on PHY before IPQ8074 DBI register accesses (git-fixes).\n- PCI: qcom: Set up rev 2.1.0 PARF_PHY before enabling clocks (git-fixes).\n- PCI: tegra194: Fix PM error handling in tegra_pcie_config_ep() (git-fixes).\n- PCI: tegra194: Fix Root Port interrupt handling (git-fixes).\n- PCI: tegra194: Fix link up retry sequence (git-fixes).\n- PM: domains: Ensure genpd_debugfs_dir exists before remove (git-fixes).\n- PM: hibernate: defer device probing when resuming from hibernation (git-fixes).\n- Revert \u0027clk: core: Honor CLK_OPS_PARENT_ENABLE for clk gate ops\u0027 (git-fixes).\n- Revert \u0027drivers/video/backlight/platform_lcd.c: add support for device tree based probe\u0027 (git-fixes).\n- Revert \u0027drm/i915: Hold reference to intel_context over life of i915_request\u0027 (git-fixes).\n- Revert \u0027drm/udl: Kill pending URBs at suspend and disconnect\u0027 (bsc#1195917).\n- Revert \u0027ipv6: Honor all IPv6 PIO Valid Lifetime values\u0027 (bsc#1202989).\n- Revert \u0027net: usb: ax88179_178a needs FLAG_SEND_ZLP\u0027 (git-fixes).\n- Revert \u0027scripts/mod/modpost.c: permit \u0027.cranges\u0027 secton for sh64 architecture.\u0027 (git-fixes).\n- Revert \u0027usb: gadget: udc-xilinx: replace memcpy with memcpy_toio\u0027 (git-fixes).\n- Revert \u0027x86/sev: Expose sev_es_ghcb_hv_call() for use by HyperV\u0027 (bsc#1190497).\n- SUNRPC: Fix NFSD\u0027s request deferral on RDMA transports (git-fixes).\n- SUNRPC: Fix READ_PLUS crasher (git-fixes).\n- SUNRPC: Prevent immediate close+reconnect (git-fixes).\n- USB: Follow-up to SPDX GPL-2.0+ identifiers addition - remove now useless comments (git-fixes).\n- USB: Follow-up to SPDX identifiers addition - remove now useless comments (git-fixes).\n- USB: serial: ch314: use usb_control_msg_recv() (git-fixes).\n- USB: serial: ch341: fix disabled rx timer on older devices (git-fixes).\n- USB: serial: fix tty-port initialized comments (git-fixes).\n- apparmor: Fix failed mount permission check error message (git-fixes).\n- apparmor: Fix memleak in aa_simple_write_to_buffer() (git-fixes).\n- apparmor: fix aa_label_asxprint return check (git-fixes).\n- apparmor: fix absroot causing audited secids to begin with = (git-fixes).\n- apparmor: fix overlapping attachment computation (git-fixes).\n- apparmor: fix quiet_denied for file rules (git-fixes).\n- apparmor: fix reference count leak in aa_pivotroot() (git-fixes).\n- apparmor: fix setting unconfined mode on a loaded profile (git-fixes).\n- arm64: Do not forget syscall when starting a new thread (git-fixes).\n- arm64: Fix match_list for erratum 1286807 on Arm Cortex-A76 (git-fixes).\n- arm64: cpufeature: Allow different PMU versions in ID_DFR0_EL1 (git-fixes).\n- arm64: dts: allwinner: a64: orangepi-win: Fix LED node name (git-fixes).\n- arm64: dts: mt7622: fix BPI-R64 WPS button (git-fixes).\n- arm64: dts: mt8192: Fix idle-states entry-method (git-fixes).\n- arm64: dts: mt8192: Fix idle-states nodes naming scheme (git-fixes).\n- arm64: dts: qcom: ipq8074: fix NAND node name (git-fixes).\n- arm64: dts: qcom: msm8916: Fix typo in pronto remoteproc node (git-fixes).\n- arm64: dts: qcom: qcs404: Fix incorrect USB2 PHYs assignment (git-fixes).\n- arm64: dts: qcom: sm8250: add missing PCIe PHY clock-cells (git-fixes).\n- arm64: dts: renesas: Fix thermal-sensors on single-zone sensors (git-fixes).\n- arm64: dts: renesas: beacon: Fix regulator node names (git-fixes).\n- arm64: dts: uniphier: Fix USB interrupts for PXs3 SoC (git-fixes).\n- arm64: fix oops in concurrently setting insn_emulation sysctls (git-fixes).\n- arm64: fix rodata=full (git-fixes).\n- arm64: kasan: Revert \u0027arm64: mte: reset the page tag in page-\u003eflags\u0027 (git-fixes).\n- arm64: set UXN on swapper page tables (git-fixes).\n- arm64: tegra: Fix SDMMC1 CD on P2888 (git-fixes).\n- arm64: tegra: Fixup SYSRAM references (git-fixes).\n- arm64: tegra: Mark BPMP channels as no-memory-wc (git-fixes).\n- asm-generic: sections: refactor memory_intersects (git-fixes).\n- ata: libata-eh: Add missing command name (git-fixes).\n- ath10k: do not enforce interrupt trigger type (git-fixes).\n- ath11k: Fix incorrect debug_mask mappings (git-fixes).\n- ath11k: fix netdev open race (git-fixes).\n- atm: idt77252: fix use-after-free bugs caused by tst_timer (git-fixes).\n- audit: fix potential double free on error path from fsnotify_add_inode_mark (git-fixes).\n- ax25: Fix ax25 session cleanup problems (git-fixes).\n- block: Fix fsync always failed if once failed (bsc#1202779).\n- block: Fix wrong offset in bio_truncate() (bsc#1202780).\n- block: fix rq-qos breakage from skipping rq_qos_done_bio() (bsc#1202781).\n- block: only mark bio as tracked if it really is tracked (bsc#1202782).\n- bnx2x: Invalidate fastpath HSI version for VFs (git-fixes).\n- bnx2x: Utilize firmware 7.13.21.0 (git-fixes).\n- btrfs: properly flag filesystem with BTRFS_FEATURE_INCOMPAT_BIG_METADATA (git-fixes).\n- bus: hisi_lpc: fix missing platform_device_put() in hisi_lpc_acpi_probe() (git-fixes).\n- can: Break loopback loop on loopback documentation (git-fixes).\n- can: ems_usb: fix clang\u0027s -Wunaligned-access warning (git-fixes).\n- can: error: specify the values of data[5..7] of CAN error frames (git-fixes).\n- can: hi311x: do not report txerr and rxerr during bus-off (git-fixes).\n- can: j1939: j1939_sk_queue_activate_next_locked(): replace WARN_ON_ONCE with netdev_warn_once() (git-fixes).\n- can: kvaser_usb_hydra: do not report txerr and rxerr during bus-off (git-fixes).\n- can: kvaser_usb_leaf: do not report txerr and rxerr during bus-off (git-fixes).\n- can: mcp251x: Fix race condition on receive interrupt (git-fixes).\n- can: mcp251xfd: mcp251xfd_dump(): fix comment (git-fixes).\n- can: netlink: allow configuring of fixed bit rates without need for do_set_bittiming callback (git-fixes).\n- can: netlink: allow configuring of fixed data bit rates without need for do_set_data_bittiming callback (git-fixes).\n- can: pch_can: do not report txerr and rxerr during bus-off (git-fixes).\n- can: pch_can: pch_can_error(): initialize errc before using it (git-fixes).\n- can: rcar_can: do not report txerr and rxerr during bus-off (git-fixes).\n- can: sja1000: do not report txerr and rxerr during bus-off (git-fixes).\n- can: sun4i_can: do not report txerr and rxerr during bus-off (git-fixes).\n- can: usb_8dev: do not report txerr and rxerr during bus-off (git-fixes).\n- ceph: do not leak snap_rwsem in handle_cap_grant (bsc#1202823).\n- ceph: do not truncate file in atomic_open (bsc#1202824).\n- ceph: use correct index when encoding client supported features (bsc#1202822).\n- cfg80211/mac80211: assume CHECKSUM_COMPLETE includes SNAP (bsc#1202131).\n- cgroup: Use separate src/dst nodes when preloading css_sets for migration (bsc#1201610).\n- clk: bcm: rpi: Fix error handling of raspberrypi_fw_get_rate (git-fixes).\n- clk: core: Fix runtime PM sequence in clk_core_unprepare() (git-fixes).\n- clk: core: Honor CLK_OPS_PARENT_ENABLE for clk gate ops (git-fixes).\n- clk: mediatek: reset: Fix written reset bit offset (git-fixes).\n- clk: qcom: camcc-sdm845: Fix topology around titan_top power domain (git-fixes).\n- clk: qcom: camcc-sm8250: Fix halt on boot by reducing driver\u0027s init level (git-fixes).\n- clk: qcom: camcc-sm8250: Fix topology around titan_top power domain (git-fixes).\n- clk: qcom: clk-alpha-pll: fix clk_trion_pll_configure description (git-fixes).\n- clk: qcom: clk-krait: unlock spin after mux completion (git-fixes).\n- clk: qcom: clk-rcg2: Fail Duty-Cycle configuration if MND divider is not enabled (git-fixes).\n- clk: qcom: clk-rcg2: Make sure to not write d=0 to the NMD register (git-fixes).\n- clk: qcom: gcc-msm8939: Add missing SYSTEM_MM_NOC_BFDCD_CLK_SRC (git-fixes).\n- clk: qcom: gcc-msm8939: Add missing system_mm_noc_bfdcd_clk_src (git-fixes).\n- clk: qcom: gcc-msm8939: Fix bimc_ddr_clk_src rcgr base address (git-fixes).\n- clk: qcom: gcc-msm8939: Fix weird field spacing in ftbl_gcc_camss_cci_clk (git-fixes).\n- clk: qcom: gcc-msm8939: Point MM peripherals to system_mm_noc clock (git-fixes).\n- clk: qcom: ipq8074: SW workaround for UBI32 PLL lock (git-fixes).\n- clk: qcom: ipq8074: dont disable gcc_sleep_clk_src (git-fixes).\n- clk: qcom: ipq8074: fix NSS core PLL-s (git-fixes).\n- clk: qcom: ipq8074: fix NSS port frequency tables (git-fixes).\n- clk: qcom: ipq8074: set BRANCH_HALT_DELAY flag for UBI clocks (git-fixes).\n- clk: renesas: r9a06g032: Fix UART clkgrp bitsel (git-fixes).\n- clk: ti: Stop using legacy clkctrl names for omap4 and 5 (git-fixes).\n- cpufreq: zynq: Fix refcount leak in zynq_get_revision (git-fixes).\n- crypto: arm64/poly1305 - fix a read out-of-bound (git-fixes).\n- crypto: ccp - During shutdown, check SEV data pointer before using (git-fixes).\n- crypto: ccp - Use kzalloc for sev ioctl interfaces to prevent kernel memory leak (git-fixes).\n- crypto: hisilicon - Kunpeng916 crypto driver do not sleep when in softirq (git-fixes).\n- crypto: hisilicon/hpre - do not use GFP_KERNEL to alloc mem during softirq (git-fixes).\n- crypto: hisilicon/sec - do not sleep when in softirq (git-fixes).\n- crypto: hisilicon/sec - fix auth key size error (git-fixes).\n- crypto: inside-secure - Add missing MODULE_DEVICE_TABLE for of (git-fixes).\n- crypto: sun8i-ss - do not allocate memory when handling hash requests (git-fixes).\n- crypto: sun8i-ss - fix error codes in allocate_flows() (git-fixes).\n- crypto: sun8i-ss - fix infinite loop in sun8i_ss_setup_ivs() (git-fixes).\n- devlink: Fix use-after-free after a failed reload (git-fixes).\n- dm raid: fix KASAN warning in raid5_add_disks (git-fixes).\n- dmaengine: dw-axi-dmac: do not print NULL LLI during error (git-fixes).\n- dmaengine: dw-axi-dmac: ignore interrupt if no descriptor (git-fixes).\n- dmaengine: dw-edma: Fix eDMA Rd/Wr-channels and DMA-direction semantics (git-fixes).\n- dmaengine: imx-dma: Cast of_device_get_match_data() with (uintptr_t) (git-fixes).\n- dmaengine: sf-pdma: Add multithread support for a DMA channel (git-fixes).\n- dmaengine: sprd: Cleanup in .remove() after pm_runtime_get_sync() failed (git-fixes).\n- dmaengine: stm32-mdma: Remove dead code in stm32_mdma_irq_handler() (git-fixes).\n- docs: i2c: i2c-sysfs: fix hyperlinks (git-fixes).\n- docs: zh_CN: fix a broken reference (git-fixes).\n- dpaa2-eth: fix ethtool statistics (git-fixes).\n- driver core: Do not probe devices after bus_type.match() probe deferral (git-fixes).\n- driver core: fix potential deadlock in __driver_attach (git-fixes).\n- drivers/iio: Remove all strcpy() uses (git-fixes).\n- drivers: usb: dwc3-qcom: Add sdm660 compatible (git-fixes).\n- drm/amd/amd_shared.h: Add missing doc for PP_GFX_DCS_MASK (git-fixes).\n- drm/amd/display: Add option to defer works of hpd_rx_irq (git-fixes).\n- drm/amd/display: Avoid MPC infinite loop (git-fixes).\n- drm/amd/display: Check correct bounds for stream encoder instances for DCN303 (git-fixes).\n- drm/amd/display: Enable building new display engine with KCOV enabled (git-fixes).\n- drm/amd/display: Fix HDMI VSIF V3 incorrect issue (git-fixes).\n- drm/amd/display: Fix pixel clock programming (git-fixes).\n- drm/amd/display: Fix surface optimization regression on Carrizo (git-fixes).\n- drm/amd/display: For stereo keep \u0027FLIP_ANY_FRAME\u0027 (git-fixes).\n- drm/amd/display: Reset DMCUB before HW init (git-fixes).\n- drm/amd/display: Revert \u0027drm/amd/display: turn DPMS off on connector unplug\u0027 (git-fixes).\n- drm/amd/display: avoid doing vm_init multiple time (git-fixes).\n- drm/amd/display: clear optc underflow before turn off odm clock (git-fixes).\n- drm/amd/pm: add missing -\u003efini_microcode interface for Sienna Cichlid (git-fixes).\n- drm/amdgpu: Check BO\u0027s requested pinning domains against its preferred_domains (git-fixes).\n- drm/amdgpu: Increase tlb flush timeout for sriov (git-fixes).\n- drm/amdgpu: Remove one duplicated ef removal (git-fixes).\n- drm/amdgpu: remove useless condition in amdgpu_job_stop_all_jobs_on_sched() (git-fixes).\n- drm/bridge: lt9611uxc: Cancel only driver\u0027s work (git-fixes).\n- drm/bridge: tc358767: Fix (e)DP bridge endpoint parsing in dedicated function (git-fixes).\n- drm/bridge: tc358767: Make sure Refclk clock are enabled (git-fixes).\n- drm/bridge: tc358767: Move (e)DP bridge endpoint parsing into dedicated function (git-fixes).\n- drm/doc: Fix comment typo (git-fixes).\n- drm/exynos/exynos7_drm_decon: free resources when clk_set_parent() failed (git-fixes).\n- drm/gem: Properly annotate WW context on drm_gem_lock_reservations() error (git-fixes).\n- drm/i915/display: avoid warnings when registering dual panel backlight (git-fixes).\n- drm/i915/gt: Skip TLB invalidations once wedged (git-fixes).\n- drm/i915/reg: Fix spelling mistake \u0027Unsupport\u0027 -\u003e \u0027Unsupported\u0027 (git-fixes).\n- drm/i915: fix null pointer dereference (git-fixes).\n- drm/mcde: Fix refcount leak in mcde_dsi_bind (git-fixes).\n- drm/mediatek: Add pull-down MIPI operation in mtk_dsi_poweroff function (git-fixes).\n- drm/mediatek: Allow commands to be sent during video mode (git-fixes).\n- drm/mediatek: Keep dsi as LP00 before dcs cmds transfer (git-fixes).\n- drm/mediatek: Modify dsi funcs to atomic operations (git-fixes).\n- drm/mediatek: Separate poweron/poweroff from enable/disable and define new funcs (git-fixes).\n- drm/mediatek: dpi: Only enable dpi after the bridge is enabled (git-fixes).\n- drm/mediatek: dpi: Remove output format of YUV (git-fixes).\n- drm/meson: Fix overflow implicit truncation warnings (git-fixes).\n- drm/meson: Fix refcount bugs in meson_vpu_has_available_connectors() (git-fixes).\n- drm/mipi-dbi: align max_chunk to 2 in spi_transfer (git-fixes).\n- drm/msm/dpu: Fix for non-visible planes (git-fixes).\n- drm/msm/dsi: Fix number of regulators for SDM660 (git-fixes).\n- drm/msm/dsi: Fix number of regulators for msm8996_dsi_cfg (git-fixes).\n- drm/msm/dsi: fix the inconsistent indenting (git-fixes).\n- drm/msm/hdmi: drop empty \u0027none\u0027 regulator lists (git-fixes).\n- drm/msm/hdmi: enable core-vcc/core-vdda-supply for 8996 platform (git-fixes).\n- drm/msm/mdp5: Fix global state lock backoff (git-fixes).\n- drm/msm: Avoid dirtyfb stalls on video mode displays (v2) (git-fixes).\n- drm/msm: Fix dirtyfb refcounting (git-fixes).\n- drm/nouveau/acpi: Do not print error when we get -EINPROGRESS from pm_runtime (git-fixes).\n- drm/nouveau/kms: Fix failure path for creating DP connectors (git-fixes).\n- drm/nouveau: Do not pm_runtime_put_sync(), only pm_runtime_put_autosuspend() (git-fixes).\n- drm/nouveau: fix another off-by-one in nvbios_addr (git-fixes).\n- drm/nouveau: recognise GA103 (git-fixes).\n- drm/radeon: fix incorrrect SPDX-License-Identifiers (git-fixes).\n- drm/radeon: fix potential buffer overflow in ni_set_mc_special_registers() (git-fixes).\n- drm/rockchip: Fix an error handling path rockchip_dp_probe() (git-fixes).\n- drm/rockchip: vop: Do not crash for invalid duplicate_state() (git-fixes).\n- drm/shmem-helper: Add missing vunmap on error (git-fixes).\n- drm/simpledrm: Fix return type of simpledrm_simple_display_pipe_mode_valid() (git-fixes).\n- drm/st7735r: Fix module autoloading for Okaya RH128128T (git-fixes).\n- drm/sun4i: dsi: Prevent underflow when computing packet sizes (git-fixes).\n- drm/ttm: Fix dummy res NULL ptr deref bug (git-fixes).\n- drm/udl: Add parameter to set number of URBs (bsc#1195917).\n- drm/udl: Add reset_resume (bsc#1195917)\n- drm/udl: Do not re-initialize stuff at retrying the URB list allocation (bsc#1195917).\n- drm/udl: Drop unneeded alignment (bsc#1195917).\n- drm/udl: Enable damage clipping (bsc#1195917).\n- drm/udl: Fix inconsistent urbs.count value during udl_free_urb_list() (bsc#1195917).\n- drm/udl: Fix potential URB leaks (bsc#1195917).\n- drm/udl: Increase the default URB list size to 20 (bsc#1195917).\n- drm/udl: Kill pending URBs at suspend and disconnect (bsc#1195917).\n- drm/udl: Replace BUG_ON() with WARN_ON() (bsc#1195917).\n- drm/udl: Replace semaphore with a simple wait queue (bsc#1195917).\n- drm/udl: Restore display mode on resume (bsc#1195917)\n- drm/udl: Suppress error print for -EPROTO at URB completion (bsc#1195917).\n- drm/udl: Sync pending URBs at suspend / disconnect (bsc#1195917).\n- drm/udl: Sync pending URBs at the end of suspend (bsc#1195917).\n- drm/vc4: change vc4_dma_range_matches from a global to static (git-fixes).\n- drm/vc4: drv: Adopt the dma configuration from the HVS or V3D component (git-fixes).\n- drm/vc4: dsi: Add correct stop condition to vc4_dsi_encoder_disable iteration (git-fixes).\n- drm/vc4: dsi: Correct DSI divider calculations (git-fixes).\n- drm/vc4: dsi: Correct pixel order for DSI0 (git-fixes).\n- drm/vc4: dsi: Fix dsi0 interrupt support (git-fixes).\n- drm/vc4: dsi: Register dsi0 as the correct vc4 encoder type (git-fixes).\n- drm/vc4: hdmi: Correct HDMI timing registers for interlaced modes (git-fixes).\n- drm/vc4: hdmi: Disable audio if dmas property is present but empty (git-fixes).\n- drm/vc4: hdmi: Fix timings for interlaced modes (git-fixes).\n- drm/vc4: hdmi: Reset HDMI MISC_CONTROL register (git-fixes).\n- drm/vc4: plane: Fix margin calculations for the right/bottom edges (git-fixes).\n- drm/vc4: plane: Remove subpixel positioning check (git-fixes).\n- drm: adv7511: override i2c address of cec before accessing it (git-fixes).\n- drm: bridge: adv7511: Add check for mipi_dsi_driver_register (git-fixes).\n- drm: bridge: sii8620: fix possible off-by-one (git-fixes).\n- dsa: mv88e6xxx: fix debug print for SPEED_UNFORCED (git-fixes).\n- dt-bindings: arm: qcom: fix MSM8916 MTP compatibles (git-fixes).\n- dt-bindings: arm: qcom: fix MSM8994 boards compatibles (git-fixes).\n- dt-bindings: bluetooth: broadcom: Add BCM4349B1 DT binding (git-fixes).\n- dt-bindings: clock: qcom,gcc-msm8996: add more GCC clock sources (git-fixes).\n- dt-bindings: gpio: zynq: Add missing compatible strings (git-fixes).\n- dt-bindings: iio: accel: Add DT binding doc for ADXL355 (git-fixes).\n- dt-bindings: usb: mtk-xhci: Allow wakeup interrupt-names to be optional (git-fixes).\n- dtb: Do not include sources in src.rpm - refer to kernel-source Same as other kernel binary packages there is no need to carry duplicate sources in dtb packages.\n- eeprom: idt_89hpesx: uninitialized data in idt_dbgfs_csr_write() (git-fixes).\n- ethernet: rocker: fix sleep in atomic context bug in neigh_timer_handler (git-fies).\n- ext4: Fix BUG_ON in ext4_bread when write quota data (bsc#1197755).\n- ext4: add new helper interface ext4_try_to_trim_range() (bsc#1202783).\n- ext4: add reserved GDT blocks check (bsc#1202712).\n- ext4: do not use the orphan list when migrating an inode (bsc#1197756).\n- ext4: fast commit may miss tracking unwritten range during ftruncate (bsc#1202759).\n- ext4: filter out EXT4_FC_REPLAY from on-disk superblock field s_state (bsc#1202771).\n- ext4: fix a possible ABBA deadlock due to busy PA (bsc#1202762).\n- ext4: fix bug_on in ext4_writepages (bsc#1200872).\n- ext4: fix error handling in ext4_fc_record_modified_inode() (bsc#1202767).\n- ext4: fix error handling in ext4_restore_inline_data() (bsc#1197757).\n- ext4: fix fallocate to use file_modified to update permissions consistently (bsc#1202769).\n- ext4: fix fast commit may miss tracking range for FALLOC_FL_ZERO_RANGE (bsc#1202757).\n- ext4: fix fs corruption when tring to remove a non-empty directory with IO error (bsc#1202768).\n- ext4: fix incorrect type issue during replay_del_range (bsc#1202867).\n- ext4: fix null-ptr-deref in \u0027__ext4_journal_ensure_credits\u0027 (bsc#1202764).\n- ext4: fix overhead calculation to account for the reserved gdt blocks (bsc#1200869).\n- ext4: fix race when reusing xattr blocks (bsc#1198971).\n- ext4: fix super block checksum incorrect after mount (bsc#1202773).\n- ext4: fix symlink file size not match to file content (bsc#1200868).\n- ext4: fix use-after-free in ext4_rename_dir_prepare (bsc#1200871).\n- ext4: fix use-after-free in ext4_search_dir (bsc#1202710).\n- ext4: fix warning in ext4_handle_inode_extension (bsc#1202711).\n- ext4: force overhead calculation if the s_overhead_cluster makes no sense (bsc#1200870).\n- ext4: initialize err_blk before calling __ext4_get_inode_loc (bsc#1202763).\n- ext4: make sure quota gets properly shutdown on error (bsc#1195480).\n- ext4: make sure to reset inode lockdep class when quota enabling fails (bsc#1202761).\n- ext4: mark group as trimmed only if it was fully scanned (bsc#1202770).\n- ext4: modify the logic of ext4_mb_new_blocks_simple (bsc#1202766).\n- ext4: prevent used blocks from being allocated during fast commit replay (bsc#1202765).\n- ext4: recover csum seed of tmp_inode after migrating to extents (bsc#1202713).\n- ext4: remove EA inode entry from mbcache on inode eviction (bsc#1198971).\n- ext4: unindent codeblock in ext4_xattr_block_set() (bsc#1198971).\n- ext4: use ext4_ext_remove_space() for fast commit replay delete range (bsc#1202758).\n- fbcon: Fix boundary checks for fbcon=vc:n1-n2 parameters (git-fixes).\n- fbdev: fb_pm2fb: Avoid potential divide by zero error (git-fixes).\n- fbdev: fbcon: Properly revert changes when vc_resize() failed (git-fies).\n- filemap: Handle sibling entries in filemap_get_read_batch() (bsc#1202774).\n- firmware: arm_scpi: Ensure scpi_info is not assigned if the probe fails (git-fixes).\n- firmware: tegra: Fix error check return value of debugfs_create_file() (git-fixes).\n- firmware: tegra: bpmp: Do only aligned access to IPC memory area (git-fixes).\n- fix race between exit_itimers() and /proc/pid/timers (git-fixes).\n- fpga: altera-pr-ip: fix unsigned comparison with less than zero (git-fixes).\n- fs-writeback: writeback_sb_inodes: Recalculate \u0027wrote\u0027 according skipped pages (bsc#1200873).\n- ftrace/x86: Add back ftrace_expected assignment (git-fixes).\n- fuse: ioctl: translate ENOSYS (bsc#1203139).\n- fuse: limit nsec (bsc#1203138).\n- gadgetfs: ep_io - wait until IRQ finishes (git-fixes).\n- geneve: do not use RT_TOS for IPv6 flowlabel (git-fixes).\n- geneve: fix TOS inheriting for ipv4 (git-fixes).\n- gpio: gpiolib-of: Fix refcount bugs in of_mm_gpiochip_add_data() (git-fixes).\n- gpio: pca953x: Add mutex_lock for regcache sync in PM (git-fixes).\n- grub: Fix symbol `grub_disk_get_size\u0027 not found (bsc#1201361 bsc#1192968).\n- habanalabs/gaudi: fix shift out of bounds (git-fixes).\n- habanalabs/gaudi: mask constant value before cast (git-fixes).\n- hwmon: (dell-smm) Add Dell XPS 13 7390 to fan control whitelist (git-fixes).\n- hwmon: (drivetemp) Add module alias (git-fixes).\n- hwmon: (gpio-fan) Fix array out of bounds access (git-fixes).\n- hwmon: (sht15) Fix wrong assumptions in device remove callback (git-fixes).\n- i2c: Fix a potential use after free (git-fixes).\n- i2c: cadence: Support PEC for SMBus block read (git-fixes).\n- i2c: imx: Make sure to unregister adapter on remove() (git-fixes).\n- i2c: mux-gpmux: Add of_node_put() when breaking out of loop (git-fixes).\n- i2c: mxs: Silence a clang warning (git-fixes).\n- i2c: npcm: Capitalize the one-line comment (git-fixes).\n- i2c: npcm: Correct slave role behavior (git-fixes).\n- i2c: npcm: Remove own slave addresses 2:10 (git-fixes).\n- ice: fix \u0027scheduling while atomic\u0027 on aux critical err interrupt (git-fixes).\n- ieee80211: add EHT 1K aggregation definitions (bsc#1202131).\n- ieee80211: change HE nominal packet padding value defines (bsc#1202131).\n- ieee802154/adf7242: defer destroy_workqueue call (git-fixes).\n- iio: accel: bma220: Fix alignment for DMA safety (git-fixes).\n- iio: accel: bma400: Fix the scale min and max macro values (git-fixes).\n- iio: accel: bma400: Reordering of header files (git-fixes).\n- iio: accel: sca3000: Fix alignment for DMA safety (git-fixes).\n- iio: accel: sca3300: Fix alignment for DMA safety (git-fixes).\n- iio: ad7292: Prevent regulator double disable (git-fixes).\n- iio: adc: ad7266: Fix alignment for DMA safety (git-fixes).\n- iio: adc: ad7292: Fix alignment for DMA safety (git-fixes).\n- iio: adc: ad7298: Fix alignment for DMA safety (git-fixes).\n- iio: adc: ad7476: Fix alignment for DMA safety (git-fixes).\n- iio: adc: ad7766: Fix alignment for DMA safety (git-fixes).\n- iio: adc: ad7768-1: Fix alignment for DMA safety (git-fixes).\n- iio: adc: ad7887: Fix alignment for DMA safety (git-fixes).\n- iio: adc: ad7923: Fix alignment for DMA safety (git-fixes).\n- iio: adc: hi8435: Fix alignment for DMA safety (git-fixes).\n- iio: adc: ltc2496: Fix alignment for DMA safety (git-fixes).\n- iio: adc: ltc2497: Fix alignment for DMA safety (git-fixes).\n- iio: adc: max1027: Fix alignment for DMA safety (git-fixes).\n- iio: adc: max11100: Fix alignment for DMA safety (git-fixes).\n- iio: adc: max1118: Fix alignment for DMA safety (git-fixes).\n- iio: adc: max1241: Fix alignment for DMA safety (git-fixes).\n- iio: adc: mcp320x: Fix alignment for DMA safety (git-fixes).\n- iio: adc: mcp3911: make use of the sign bit (git-fixes).\n- iio: adc: mcp3911: use correct formula for AD conversion (git-fixes).\n- iio: adc: ti-adc0832: Fix alignment for DMA safety (git-fixes).\n- iio: adc: ti-adc084s021: Fix alignment for DMA safety (git-fixes).\n- iio: adc: ti-adc108s102: Fix alignment for DMA safety (git-fixes).\n- iio: adc: ti-adc12138: Fix alignment for DMA safety (git-fixes).\n- iio: adc: ti-adc128s052: Fix alignment for DMA safety (git-fixes).\n- iio: adc: ti-adc161s626: Fix alignment for DMA safety (git-fixes).\n- iio: adc: ti-ads124s08: Fix alignment for DMA safety (git-fixes).\n- iio: adc: ti-ads131e08: Fix alignment for DMA safety (git-fixes).\n- iio: adc: ti-ads7950: Fix alignment for DMA safety (git-fixes).\n- iio: adc: ti-ads8344: Fix alignment for DMA safety (git-fixes).\n- iio: adc: ti-ads8688: Fix alignment for DMA safety (git-fixes).\n- iio: adc: ti-tlc4541: Fix alignment for DMA safety (git-fixes).\n- iio: amplifiers: ad8366: Fix alignment for DMA safety (git-fixes).\n- iio: common: ssp: Fix alignment for DMA safety (git-fixes).\n- iio: core: Fix IIO_ALIGN and rename as it was not sufficiently large (git-fixes).\n- iio: dac: ad5064: Fix alignment for DMA safety (git-fixes).\n- iio: dac: ad5360: Fix alignment for DMA safety (git-fixes).\n- iio: dac: ad5421: Fix alignment for DMA safety (git-fixes).\n- iio: dac: ad5449: Fix alignment for DMA safety (git-fixes).\n- iio: dac: ad5504: Fix alignment for DMA safety (git-fixes).\n- iio: dac: ad5755: Fix alignment for DMA safety (git-fixes).\n- iio: dac: ad5761: Fix alignment for DMA safety (git-fixes).\n- iio: dac: ad5764: Fix alignment for DMA safety (git-fixes).\n- iio: dac: ad5766: Fix alignment for DMA safety (git-fixes).\n- iio: dac: ad5770r: Fix alignment for DMA safety (git-fixes).\n- iio: dac: ad5791: Fix alignment for DMA saftey (git-fixes).\n- iio: dac: ad7303: Fix alignment for DMA safety (git-fixes).\n- iio: dac: ad8801: Fix alignment for DMA safety (git-fixes).\n- iio: dac: mcp4922: Fix alignment for DMA safety (git-fixes).\n- iio: dac: ti-dac082s085: Fix alignment for DMA safety (git-fixes).\n- iio: dac: ti-dac5571: Fix alignment for DMA safety (git-fixes).\n- iio: dac: ti-dac7311: Fix alignment for DMA safety (git-fixes).\n- iio: dac: ti-dac7612: Fix alignment for DMA safety (git-fixes).\n- iio: fix iio_format_avail_range() printing for none IIO_VAL_INT (git-fixes).\n- iio: frequency: ad9523: Fix alignment for DMA safety (git-fixes).\n- iio: frequency: adf4350: Fix alignment for DMA safety (git-fixes).\n- iio: frequency: adf4371: Fix alignment for DMA safety (git-fixes).\n- iio: gyro: adis16080: Fix alignment for DMA safety (git-fixes).\n- iio: gyro: adis16130: Fix alignment for DMA safety (git-fixes).\n- iio: gyro: adxrs450: Fix alignment for DMA safety (git-fixes).\n- iio: gyro: fxas210002c: Fix alignment for DMA safety (git-fixes).\n- iio: imu: fxos8700: Fix alignment for DMA safety (git-fixes).\n- iio: light: isl29028: Fix the warning in isl29028_remove() (git-fixes).\n- iio: potentiometer: ad5272: Fix alignment for DMA safety (git-fixes).\n- iio: potentiometer: max5481: Fix alignment for DMA safety (git-fixes).\n- iio: potentiometer: mcp41010: Fix alignment for DMA safety (git-fixes).\n- iio: potentiometer: mcp4131: Fix alignment for DMA safety (git-fixes).\n- iio: proximity: as3935: Fix alignment for DMA safety (git-fixes).\n- iio: resolver: ad2s1200: Fix alignment for DMA safety (git-fixes).\n- iio: resolver: ad2s90: Fix alignment for DMA safety (git-fixes).\n- iio: temp: ltc2983: Fix alignment for DMA safety (git-fixes).\n- iio: temp: maxim_thermocouple: Fix alignment for DMA safety (git-fixes).\n- intel_th: Fix a resource leak in an error handling path (git-fixes).\n- intel_th: msu-sink: Potential dereference of null pointer (git-fixes).\n- intel_th: msu: Fix vmalloced buffers (git-fixes).\n- intel_th: pci: Add Meteor Lake-P support (git-fixes).\n- intel_th: pci: Add Raptor Lake-S CPU support (git-fixes).\n- intel_th: pci: Add Raptor Lake-S PCH support (git-fixes).\n- interconnect: imx: fix max_node_id (git-fixes).\n- io_uring: add a schedule point in io_add_buffers() (git-fixes).\n- io_uring: terminate manual loop iterator loop correctly for non-vecs (git-fixes).\n- iommu/amd: Clarify AMD IOMMUv2 initialization messages (git-fixes).\n- iommu/amd: Enable swiotlb in all cases (git-fixes).\n- iommu/amd: Fix I/O page table memory leak (git-fixes).\n- iommu/amd: Recover from event log overflow (git-fixes).\n- iommu/amd: Simplify and Consolidate Virtual APIC (AVIC) Enablement (git-fixes).\n- iommu/arm-smmu-v3-sva: Fix mm use-after-free (git-fixes).\n- iommu/arm-smmu-v3: Fix size calculation in arm_smmu_mm_invalidate_range() (git-fixes).\n- iommu/arm-smmu: qcom_iommu: Add of_node_put() when breaking out of loop (git-fixes).\n- iommu/dart: Add missing module owner to ops structure (git-fixes).\n- iommu/dart: check return value after calling platform_get_resource() (git-fixes).\n- iommu/exynos: Handle failed IOMMU device registration properly (git-fixes).\n- iommu/iova: Improve 32-bit free space estimate (git-fixes).\n- iommu/ipmmu-vmsa: Check for error num after setting mask (git-fixes).\n- iommu/mediatek: Add list_del in mtk_iommu_remove (git-fixes).\n- iommu/mediatek: Add mutex for m4u_group and m4u_dom in data (git-fixes).\n- iommu/mediatek: Fix 2 HW sharing pgtable issue (git-fixes).\n- iommu/mediatek: Fix NULL pointer dereference when printing dev_name (git-fixes).\n- iommu/mediatek: Remove clk_disable in mtk_iommu_remove (git-fixes).\n- iommu/msm: Fix an incorrect NULL check on list iterator (git-fixes).\n- iommu/omap: Fix regression in probe for NULL pointer dereference (git-fixes).\n- iommu/tegra-smmu: Fix missing put_device() call in tegra_smmu_find (git-fixes).\n- iommu/vt-d: Acquiring lock in domain ID allocation helpers (bsc#1200301).\n- iommu/vt-d: Calculate mask for non-aligned flushes (git-fixes).\n- iommu/vt-d: Drop stop marker messages (git-fixes).\n- iommu/vt-d: Fix PCI bus rescan device hot add (git-fixes).\n- iommu/vt-d: Fix RID2PASID setup/teardown failure (git-fixes).\n- iommu/vt-d: Make DMAR_UNITS_SUPPORTED default 1024 (bsc#1200301).\n- iommu/vt-d: Refactor iommu information of each domain (bsc#1200301).\n- iommu/vt-d: Remove global g_iommus array (bsc#1200301).\n- iommu/vt-d: Remove intel_iommu::domains (bsc#1200301).\n- iommu/vt-d: Remove unnecessary check in intel_iommu_add() (bsc#1200301).\n- iommu/vt-d: Use IDA interface to manage iommu sequence id (bsc#1200301).\n- iommu/vt-d: avoid invalid memory access via node_online(NUMA_NO_NODE) (git-fixes).\n- iommu: Fix potential use-after-free during probe (git-fixes).\n- ipmi: fix initialization when workqueue allocation fails (git-fixes).\n- irqchip/tegra: Fix overflow implicit truncation warnings (git-fixes).\n- iwlwifi/fw: use struct_size over open coded arithmetic (bsc#1202131).\n- iwlwifi: ACPI: support revision 3 WGDS tables (bsc#1202131).\n- iwlwifi: Add support for getting rf id with blank otp (bsc#1202131).\n- iwlwifi: Add support for more BZ HWs (bsc#1202131).\n- iwlwifi: BZ Family BUS_MASTER_DISABLE_REQ code duplication (bsc#1202131).\n- iwlwifi: BZ Family SW reset support (bsc#1202131).\n- iwlwifi: Configure FW debug preset via module param (bsc#1202131).\n- iwlwifi: Fix FW name for gl (bsc#1202131).\n- iwlwifi: Fix missing error code in iwl_pci_probe() (bsc#1202131).\n- iwlwifi: Fix syntax errors in comments (bsc#1202131).\n- iwlwifi: Make use of the helper macro LIST_HEAD() (bsc#1202131).\n- iwlwifi: Read the correct addresses when getting the crf id (bsc#1202131).\n- iwlwifi: Start scratch debug register for Bz family (bsc#1202131).\n- iwlwifi: acpi: fix wgds rev 3 size (bsc#1202131).\n- iwlwifi: acpi: move ppag code from mvm to fw/acpi (bsc#1202131).\n- iwlwifi: add missing entries for Gf4 with So and SoF (bsc#1202131).\n- iwlwifi: add new Qu-Hr device (bsc#1202131).\n- iwlwifi: add new ax1650 killer device (bsc#1202131).\n- iwlwifi: add new device id 7F70 (bsc#1202131).\n- iwlwifi: add new pci SoF with JF (bsc#1202131).\n- iwlwifi: add some missing kernel-doc in struct iwl_fw (bsc#1202131).\n- iwlwifi: add support for BNJ HW (bsc#1202131).\n- iwlwifi: add support for BZ-U and BZ-L HW (bsc#1202131).\n- iwlwifi: add support for Bz-Z HW (bsc#1202131).\n- iwlwifi: add vendor specific capabilities for some RFs (bsc#1202131).\n- iwlwifi: advertise support for HE - DCM BPSK RX/TX (bsc#1202131).\n- iwlwifi: allow rate-limited error messages (bsc#1202131).\n- iwlwifi: api: fix struct iwl_wowlan_status_v7 kernel-doc (bsc#1202131).\n- iwlwifi: api: remove ttl field from TX command (bsc#1202131).\n- iwlwifi: api: remove unused RX status bits (bsc#1202131).\n- iwlwifi: avoid variable shadowing (bsc#1202131).\n- iwlwifi: avoid void pointer arithmetic (bsc#1202131).\n- iwlwifi: bump FW API to 67 for AX devices (bsc#1202131).\n- iwlwifi: bump FW API to 68 for AX devices (bsc#1202131).\n- iwlwifi: bump FW API to 69 for AX devices (bsc#1202131).\n- iwlwifi: bump FW API to 70 for AX devices (bsc#1202131).\n- iwlwifi: bump FW API to 71 for AX devices (bsc#1202131).\n- iwlwifi: bump FW API to 72 for AX devices (bsc#1202131).\n- iwlwifi: cfg: add support for 1K BA queue (bsc#1202131).\n- iwlwifi: dbg-tlv: clean up iwl_dbg_tlv_update_drams() (bsc#1202131).\n- iwlwifi: dbg: add infra for tracking free buffer size (bsc#1202131).\n- iwlwifi: dbg: check trigger data before access (bsc#1202131).\n- iwlwifi: dbg: disable ini debug in 8000 family and below (bsc#1202131).\n- iwlwifi: dbg: in sync mode do not call schedule (bsc#1202131).\n- iwlwifi: dbg: treat dbgc allocation failure when tlv is missing (bsc#1202131).\n- iwlwifi: dbg: treat non active regions as unsupported regions (bsc#1202131).\n- iwlwifi: dbg_ini: Split memcpy() to avoid multi-field write (bsc#1202131).\n- iwlwifi: de-const properly where needed (bsc#1202131).\n- iwlwifi: debugfs: remove useless double condition (bsc#1202131).\n- iwlwifi: do not dump_stack() when we get an unexpected interrupt (bsc#1202131).\n- iwlwifi: do not use __unused as variable name (bsc#1202131).\n- iwlwifi: drv: load tlv debug data earlier (bsc#1202131).\n- iwlwifi: dump CSR scratch from outer function (bsc#1202131).\n- iwlwifi: dump RCM error tables (bsc#1202131).\n- iwlwifi: dump both TCM error tables if present (bsc#1202131).\n- iwlwifi: dump host monitor data when NIC does not init (bsc#1202131).\n- iwlwifi: dvm: use struct_size over open coded arithmetic (bsc#1202131).\n- iwlwifi: eeprom: clean up macros (bsc#1202131).\n- iwlwifi: fix LED dependencies (bsc#1202131).\n- iwlwifi: fix debug TLV parsing (bsc#1202131).\n- iwlwifi: fix fw/img.c license statement (bsc#1202131).\n- iwlwifi: fix iwl_legacy_rate_to_fw_idx (bsc#1202131).\n- iwlwifi: fix small doc mistake for iwl_fw_ini_addr_val (bsc#1202131).\n- iwlwifi: fix various more -Wcast-qual warnings (bsc#1202131).\n- iwlwifi: fw dump: add infrastructure for dump scrubbing (bsc#1202131).\n- iwlwifi: fw: add support for splitting region type bits (bsc#1202131).\n- iwlwifi: fw: api: add link to PHY context command struct v1 (bsc#1202131).\n- iwlwifi: fw: correctly detect HW-SMEM region subtype (bsc#1202131).\n- iwlwifi: fw: fix some scan kernel-doc (bsc#1202131).\n- iwlwifi: fw: init SAR GEO table only if data is present (bsc#1202131).\n- iwlwifi: fw: make dump_start callback void (bsc#1202131).\n- iwlwifi: fw: remove dead error log code (bsc#1202131).\n- iwlwifi: implement reset flow for Bz devices (bsc#1202131).\n- iwlwifi: iwl-eeprom-parse: mostly dvm only (bsc#1202131).\n- iwlwifi: make iwl_fw_lookup_cmd_ver() take a cmd_id (bsc#1202131).\n- iwlwifi: make iwl_txq_dyn_alloc_dma() return the txq (bsc#1202131).\n- iwlwifi: make some functions friendly to sparse (bsc#1202131).\n- iwlwifi: move symbols into a separate namespace (bsc#1202131).\n- iwlwifi: mvm/api: define system control command (bsc#1202131).\n- iwlwifi: mvm: Add RTS and CTS flags to iwl_tx_cmd_flags (bsc#1202131).\n- iwlwifi: mvm: Add list of OEMs allowed to use TAS (bsc#1202131).\n- iwlwifi: mvm: Add support for a new version of scan request command (bsc#1202131).\n- iwlwifi: mvm: Add support for new rate_n_flags in tx_cmd (bsc#1202131).\n- iwlwifi: mvm: Consider P2P GO operation during scan (bsc#1202131).\n- iwlwifi: mvm: Disable WiFi bands selectively with BIOS (bsc#1202131).\n- iwlwifi: mvm: Do not fail if PPAG isn\u0027t supported (bsc#1202131).\n- iwlwifi: mvm: Fix wrong documentation for scan request command (bsc#1202131).\n- iwlwifi: mvm: Passively scan non PSC channels only when requested so (bsc#1202131).\n- iwlwifi: mvm: Read acpi dsm to get channel activation bitmap (bsc#1202131).\n- iwlwifi: mvm: Remove antenna c references (bsc#1202131).\n- iwlwifi: mvm: Support new TX_RSP and COMPRESSED_BA_RES versions (bsc#1202131).\n- iwlwifi: mvm: Support new rate_n_flags for REPLY_RX_MPDU_CMD and RX_NO_DATA_NOTIF (bsc#1202131).\n- iwlwifi: mvm: Support new version of BEACON_TEMPLATE_CMD (bsc#1202131).\n- iwlwifi: mvm: Support new version of ranging response notification (bsc#1202131).\n- iwlwifi: mvm: Support version 3 of tlc_update_notif (bsc#1202131).\n- iwlwifi: mvm: Unify the scan iteration functions (bsc#1202131).\n- iwlwifi: mvm: Use all Rx chains for roaming scan (bsc#1202131).\n- iwlwifi: mvm: add US/CA to TAS block list if OEM isn\u0027t allowed (bsc#1202131).\n- iwlwifi: mvm: add a flag to reduce power command (bsc#1202131).\n- iwlwifi: mvm: add additional info for boot info failures (bsc#1202131).\n- iwlwifi: mvm: add additional info for boot info failures (bsc#1202131).\n- iwlwifi: mvm: add dbg_time_point to debugfs (bsc#1202131).\n- iwlwifi: mvm: add definitions for new rate \u0026 flags (bsc#1202131).\n- iwlwifi: mvm: add lmac/umac PC info in case of error (bsc#1202131).\n- iwlwifi: mvm: add missing min_size to kernel-doc (bsc#1202131).\n- iwlwifi: mvm: add some missing command strings (bsc#1202131).\n- iwlwifi: mvm: add support for 160Mhz in ranging measurements (bsc#1202131).\n- iwlwifi: mvm: add support for CT-KILL notification version 2 (bsc#1202131).\n- iwlwifi: mvm: add support for IMR based on platform (bsc#1202131).\n- iwlwifi: mvm: add support for OCE scan (bsc#1202131).\n- iwlwifi: mvm: add support for PHY context command v4 (bsc#1202131).\n- iwlwifi: mvm: add support for statistics update version 15 (bsc#1202131).\n- iwlwifi: mvm: allow enabling UHB TAS in the USA via ACPI setting (bsc#1202131).\n- iwlwifi: mvm: always remove the session protection after association (bsc#1202131).\n- iwlwifi: mvm: always store the PPAG table as the latest version (bsc#1202131).\n- iwlwifi: mvm: always use 4K RB size by default (bsc#1202131).\n- iwlwifi: mvm: change old-SN drop threshold (bsc#1202131).\n- iwlwifi: mvm: clean up indenting in iwl_mvm_tlc_update_notif() (bsc#1202131).\n- iwlwifi: mvm: convert old rate \u0026 flags to the new format (bsc#1202131).\n- iwlwifi: mvm: correct sta-state logic for TDLS (bsc#1202131).\n- iwlwifi: mvm: correctly set channel flags (bsc#1202131).\n- iwlwifi: mvm: correctly set schedule scan profiles (bsc#1202131).\n- iwlwifi: mvm: d3: move GTK rekeys condition (bsc#1202131).\n- iwlwifi: mvm: d3: support v12 wowlan status (bsc#1202131).\n- iwlwifi: mvm: d3: use internal data representation (bsc#1202131).\n- iwlwifi: mvm: demote non-compliant kernel-doc header (bsc#1202131).\n- iwlwifi: mvm: do not get address of mvm-\u003efwrt just to dereference as a pointer (bsc#1202131).\n- iwlwifi: mvm: do not send BAID removal to the FW during hw_restart (bsc#1202131).\n- iwlwifi: mvm: do not trust hardware queue number (bsc#1202131).\n- iwlwifi: mvm: drop too short packets silently (bsc#1202131).\n- iwlwifi: mvm: extend session protection on association (bsc#1202131).\n- iwlwifi: mvm: fix WGDS table print in iwl_mvm_chub_update_mcc() (bsc#1202131).\n- iwlwifi: mvm: fix a stray tab (bsc#1202131).\n- iwlwifi: mvm: fix condition which checks the version of rate_n_flags (bsc#1202131).\n- iwlwifi: mvm: fix delBA vs. NSSN queue sync race (bsc#1202131).\n- iwlwifi: mvm: fix ieee80211_get_he_iftype_cap() iftype (bsc#1202131).\n- iwlwifi: mvm: fix off by one in iwl_mvm_stat_iterator_all_macs() (bsc#1202131).\n- iwlwifi: mvm: fw: clean up hcmd struct creation (bsc#1202131).\n- iwlwifi: mvm: handle RX checksum on Bz devices (bsc#1202131).\n- iwlwifi: mvm: improve log when processing CSA (bsc#1202131).\n- iwlwifi: mvm: isolate offload assist (checksum) calculation (bsc#1202131).\n- iwlwifi: mvm: make iwl_mvm_reconfig_scd() static (bsc#1202131).\n- iwlwifi: mvm: offload channel switch timing to FW (bsc#1202131).\n- iwlwifi: mvm: only enable HE DCM if we also support TX (bsc#1202131).\n- iwlwifi: mvm: optionally suppress assert log (bsc#1202131).\n- iwlwifi: mvm: parse firmware alive message version 6 (bsc#1202131).\n- iwlwifi: mvm: read 6E enablement flags from DSM and pass to FW (bsc#1202131).\n- iwlwifi: mvm: reduce WARN_ON() in TX status path (bsc#1202131).\n- iwlwifi: mvm: refactor iwl_mvm_sta_rx_agg() (bsc#1202131).\n- iwlwifi: mvm: refactor setting PPE thresholds in STA_HE_CTXT_CMD (bsc#1202131).\n- iwlwifi: mvm: remove card state notification code (bsc#1202131).\n- iwlwifi: mvm: remove cipher scheme support (bsc#1202131).\n- iwlwifi: mvm: remove csi from iwl_mvm_pass_packet_to_mac80211() (bsc#1202131).\n- iwlwifi: mvm: remove iwl_mvm_disable_txq() flags argument (bsc#1202131).\n- iwlwifi: mvm: remove session protection after auth/assoc (bsc#1202131).\n- iwlwifi: mvm: remove session protection on disassoc (bsc#1202131).\n- iwlwifi: mvm: remove session protection upon station removal (bsc#1202131).\n- iwlwifi: mvm: rfi: handle deactivation notification (bsc#1202131).\n- iwlwifi: mvm: rfi: update rfi table (bsc#1202131).\n- iwlwifi: mvm: rfi: use kmemdup() to replace kzalloc + memcpy (bsc#1202131).\n- iwlwifi: mvm: scrub key material in firmware dumps (bsc#1202131).\n- iwlwifi: mvm: set BT-coex high priority for 802.1X/4-way-HS (bsc#1202131).\n- iwlwifi: mvm: set inactivity timeouts also for PS-poll (bsc#1202131).\n- iwlwifi: mvm: starting from 22000 we have 32 Rx AMPDU sessions (bsc#1202131).\n- iwlwifi: mvm: support Bz TX checksum offload (bsc#1202131).\n- iwlwifi: mvm: support RLC configuration command (bsc#1202131).\n- iwlwifi: mvm: support new BAID allocation command (bsc#1202131).\n- iwlwifi: mvm: support revision 1 of WTAS table (bsc#1202131).\n- iwlwifi: mvm: support v3 of station HE context command (bsc#1202131).\n- iwlwifi: mvm: update BAID allocation command again (bsc#1202131).\n- iwlwifi: mvm: update RFI TLV (bsc#1202131).\n- iwlwifi: mvm: update definitions due to new rate \u0026 flags (bsc#1202131).\n- iwlwifi: mvm: update rate scale in moving back to assoc state (bsc#1202131).\n- iwlwifi: mvm: use a define for checksum flags mask (bsc#1202131).\n- iwlwifi: mvm: use debug print instead of WARN_ON() (bsc#1202131).\n- iwlwifi: nvm: Correct HE capability (bsc#1202131).\n- iwlwifi: parse debug exclude data from firmware file (bsc#1202131).\n- iwlwifi: parse error tables from debug TLVs (bsc#1202131).\n- iwlwifi: pcie: Adapt rx queue write pointer for Bz family (bsc#1202131).\n- iwlwifi: pcie: add jacket bit to device configuration parsing (bsc#1202131).\n- iwlwifi: pcie: add support for MS devices (bsc#1202131).\n- iwlwifi: pcie: adjust to Bz completion descriptor (bsc#1202131).\n- iwlwifi: pcie: fix SW error MSI-X mapping (bsc#1202131).\n- iwlwifi: pcie: fix constant-conversion warning (bsc#1202131).\n- iwlwifi: pcie: fix killer name matching for AX200 (bsc#1202131).\n- iwlwifi: pcie: iwlwifi: fix device id 7F70 struct (bsc#1202131).\n- iwlwifi: pcie: make sure iwl_rx_packet_payload_len() will not underflow (bsc#1202131).\n- iwlwifi: pcie: refactor dev_info lookup (bsc#1202131).\n- iwlwifi: pcie: remove duplicate entry (bsc#1202131).\n- iwlwifi: pcie: remove two duplicate PNJ device entries (bsc#1202131).\n- iwlwifi: pcie: retake ownership after reset (bsc#1202131).\n- iwlwifi: pcie: simplify iwl_pci_find_dev_info() (bsc#1202131).\n- iwlwifi: pcie: support Bz suspend/resume trigger (bsc#1202131).\n- iwlwifi: pcie: try to grab NIC access early (bsc#1202131).\n- iwlwifi: pcie: update sw error interrupt for BZ family (bsc#1202131).\n- iwlwifi: pnvm: print out the version properly (bsc#1202131).\n- iwlwifi: prefer WIDE_ID() over iwl_cmd_id() (bsc#1202131).\n- iwlwifi: propagate (const) type qualifier (bsc#1202131).\n- iwlwifi: recognize missing PNVM data and then log filename (bsc#1202131).\n- iwlwifi: remove MODULE_AUTHOR() statements (bsc#1202131).\n- iwlwifi: remove command ID argument from queue allocation (bsc#1202131).\n- iwlwifi: remove contact information (bsc#1202131).\n- iwlwifi: remove deprecated broadcast filtering feature (bsc#1202131).\n- iwlwifi: remove redundant iwl_finish_nic_init() argument (bsc#1202131).\n- iwlwifi: remove unused DC2DC_CONFIG_CMD definitions (bsc#1202131).\n- iwlwifi: remove unused iwlax210_2ax_cfg_so_hr_a0 structure (bsc#1202131).\n- iwlwifi: remove unused macros (bsc#1202131).\n- iwlwifi: rename CHANNEL_SWITCH_NOA_NOTIF to CHANNEL_SWITCH_START_NOTIF (bsc#1202131).\n- iwlwifi: rename GEO_TX_POWER_LIMIT to PER_CHAIN_LIMIT_OFFSET_CMD (bsc#1202131).\n- iwlwifi: rs: add support for TLC config command ver 4 (bsc#1202131).\n- iwlwifi: scan: Modify return value of a function (bsc#1202131).\n- iwlwifi: support 4-bits in MAC step value (bsc#1202131).\n- iwlwifi: support SAR GEO Offset Mapping override via BIOS (bsc#1202131).\n- iwlwifi: support new queue allocation command (bsc#1202131).\n- iwlwifi: swap 1650i and 1650s killer struct names (bsc#1202131).\n- iwlwifi: tlc: Add logs in rs_fw_rate_init func to print TLC configuration (bsc#1202131).\n- iwlwifi: use 4k queue size for Bz A-step (bsc#1202131).\n- iwlwifi: yoyo: Avoid using dram data if allocation failed (bsc#1202131).\n- iwlwifi: yoyo: add IMR DRAM dump support (bsc#1202131).\n- iwlwifi: yoyo: disable IMR DRAM region if IMR is disabled (bsc#1202131).\n- iwlwifi: yoyo: dump IMR DRAM only for HW and FW error (bsc#1202131).\n- iwlwifi: yoyo: fix DBGC allocation flow (bsc#1202131).\n- iwlwifi: yoyo: fix DBGI_SRAM ini dump header (bsc#1202131).\n- iwlwifi: yoyo: fix issue with new DBGI_SRAM region read (bsc#1202131).\n- iwlwifi: yoyo: fw debug config from context info and preset (bsc#1202131).\n- iwlwifi: yoyo: send hcmd to fw after dump collection completes (bsc#1202131).\n- iwlwifi: yoyo: support TLV-based firmware reset (bsc#1202131).\n- iwlwifi: yoyo: support dump policy for the dump size (bsc#1202131).\n- iwlwifi: yoyo: support for DBGC4 for dram (bsc#1202131).\n- iwlwifi: yoyo: support for ROM usniffer (bsc#1202131).\n- jbd2: export jbd2_journal_[grab|put]_journal_head (bsc#1202775).\n- jbd2: fix assertion \u0027jh-\u003eb_frozen_data == NULL\u0027 failure when journal aborted (bsc#1202716).\n- jbd2: fix outstanding credits assert in jbd2_journal_commit_transaction() (bsc#1202715).\n- kABI: scsi: libiscsi: fix removal of iscsi_create_conn (bsc#1198410).\n- kabi/severities: add Qlogic qed symbols\n- kabi/severities: add drivers/scsi/hisi_sas for bsc#1202471\n- kabi/severities: add hisilicon hns3 symbols\n- kabi/severities: add microchip dsa drivers\n- kabi/severities: ignore kABI changes in mwifiex drivers Those symbols are used only locally in mwifiex (sub-)modules.\n- kabi/severities: octeontx2 driver (jsc#SLE-24682)\n- kbuild: dummy-tools: avoid tmpdir leak in dummy gcc (git-fixes).\n- kbuild: fix the modules order between drivers and libs (git-fixes).\n- kbuild: link vmlinux only once for CONFIG_TRIM_UNUSED_KSYMS (2nd attempt) (git-fixes).\n- kcm: fix strp_init() order and cleanup (git-fies).\n- kernel-binary: move @NOSOURCE@ to @SOURCES@ as in other packages\n- kernel-source: include the kernel signature file We assume that the upstream tarball is used for released kernels. Then we can also include the signature file and keyring in the kernel-source src.rpm. Because of mkspec code limitation exclude the signature and keyring from binary packages always - mkspec does not parse spec conditionals.\n- kfifo: fix kfifo_to_user() return type (git-fixes).\n- lib/list_debug.c: Detect uninitialized lists (git-fixes).\n- lib/raid6/test: fix multiple definition linking error (git-fixes).\n- lib/smp_processor_id: fix imbalanced instrumentation_end() call (git-fixes).\n- lkdtm: Disable return thunks in rodata.c (bsc#1190497).\n- locking/lockdep: Fix lockdep_init_map_*() confusion (git-fixes).\n- loop: Check for overflow while configuring loop (git-fies).\n- mac80211: fix a memory leak where sta_info is not freed (git-fixes).\n- mac80211: introduce channel switch disconnect function (bsc#1202131).\n- marvell: octeontx2: build error: unknown type name \u0027u64\u0027 (jsc#SLE-24682).\n- mbcache: add functions to delete entry if unused (bsc#1198971).\n- mbcache: do not reclaim used entries (bsc#1198971).\n- md/bitmap: do not set sb values if can\u0027t pass sanity check (bsc#1197158).\n- md/raid0: Ignore RAID0 layout if the second zone has only one device (git-fixes).\n- md/raid1: fix missing bitmap update w/o WriteMostly devices (bsc#1203036).\n- media: [PATCH] pci: atomisp_cmd: fix three missing checks on list iterator (git-fixes).\n- media: atmel: atmel-sama7g5-isc: fix warning in configs without OF (git-fixes).\n- media: cedrus: h265: Fix flag name (git-fixes).\n- media: cedrus: hevc: Add check for invalid timestamp (git-fixes).\n- media: driver/nxp/imx-jpeg: fix a unexpected return value problem (git-fixes).\n- media: hantro: postproc: Fix motion vector space size (git-fixes).\n- media: hdpvr: fix error value returns in hdpvr_read (git-fixes).\n- media: hevc: Embedded indexes in RPS (git-fixes).\n- media: imx-jpeg: Add pm-runtime support for imx-jpeg (git-fixes).\n- media: imx-jpeg: use NV12M to represent non contiguous NV12 (git-fixes).\n- media: pvrusb2: fix memory leak in pvr_probe (git-fixes).\n- media: tw686x: Fix memory leak in tw686x_video_init (git-fixes).\n- media: tw686x: Register the irq at the end of probe (git-fixes).\n- media: v4l2-mem2mem: prevent pollerr when last_buffer_dequeued is set (git-fixes).\n- mediatek: mt76: eeprom: fix missing of_node_put() in mt76_find_power_limits_node() (git-fixes).\n- mediatek: mt76: mac80211: Fix missing of_node_put() in mt76_led_init() (git-fixes).\n- memstick/ms_block: Fix a memory leak (git-fixes).\n- memstick/ms_block: Fix some incorrect memory allocation (git-fixes).\n- meson-mx-socinfo: Fix refcount leak in meson_mx_socinfo_init (git-fixes).\n- mfd: max77620: Fix refcount leak in max77620_initialise_fps (git-fixes).\n- mfd: t7l66xb: Drop platform disable callback (git-fixes).\n- misc: fastrpc: fix memory corruption on open (git-fixes).\n- misc: fastrpc: fix memory corruption on probe (git-fixes).\n- misc: rtsx: Fix an error handling path in rtsx_pci_probe() (git-fixes).\n- mkspec: eliminate @NOSOURCE@ macro This should be alsways used with @SOURCES@, just include the content there.\n- mm/rmap: Fix anon_vma-\u003edegree ambiguity leading to double-reuse (git-fixes). kABI: Fix kABI after \u0027mm/rmap: Fix anon_vma-\u003edegree ambiguity leading to double-reuse\u0027 (git-fixes).\n- mm/rmap: Fix anon_vma-degree ambiguity leading to double-reuse (git-fixes, bsc#1203098).\n- mm: bdi: initialize bdi_min_ratio when bdi is unregistered (bsc#1197763).\n- mm: memcontrol: fix potential oom_lock recursion deadlock (bsc#1202447).\n- mm: pagewalk: Fix race between unmap and page walker (git-fixes, bsc#1203159).\n- mmc: block: Add single read for 4k sector cards (git-fixes).\n- mmc: cavium-octeon: Add of_node_put() when breaking out of loop (git-fixes).\n- mmc: cavium-thunderx: Add of_node_put() when breaking out of loop (git-fixes).\n- mmc: core: Fix UHS-I SD 1.8V workaround branch (git-fixes).\n- mmc: meson-gx: Fix an error handling path in meson_mmc_probe() (git-fixes).\n- mmc: mxcmmc: Silence a clang warning (git-fixes).\n- mmc: pxamci: Fix an error handling path in pxamci_probe() (git-fixes).\n- mmc: pxamci: Fix another error handling path in pxamci_probe() (git-fixes).\n- mmc: renesas_sdhi: Get the reset handle early in the probe (git-fixes).\n- mmc: sdhci-of-at91: fix set_uhs_signaling rewriting of MC1R (git-fixes).\n- mmc: sdhci-of-esdhc: Fix refcount leak in esdhc_signal_voltage_switch (git-fixes).\n- mmc: tmio: avoid glitches when resetting (git-fixes).\n- mt76: mt76x02u: fix possible memory leak in __mt76x02u_mcu_send_msg (git-fixes).\n- mt76: mt7921: enlarge maximum VHT MPDU length to 11454 (git-fixes).\n- mt76: mt7921: fix aggregation subframes setting to HE max (git-fixes).\n- mtd: dataflash: Add SPI ID table (git-fixes).\n- mtd: maps: Fix refcount leak in ap_flash_init (git-fixes).\n- mtd: maps: Fix refcount leak in of_flash_probe_versatile (git-fixes).\n- mtd: parsers: ofpart: Fix refcount leak in bcm4908_partitions_fw_offset (git-fixes).\n- mtd: partitions: Fix refcount leak in parse_redboot_of (git-fixes).\n- mtd: rawnand: arasan: Fix clock rate in NV-DDR (git-fixes).\n- mtd: rawnand: gpmi: Set WAIT_FOR_READY timeout based on program/erase times (git-fixes).\n- mtd: rawnand: meson: Fix a potential double free issue (git-fixes).\n- mtd: sm_ftl: Fix deadlock caused by cancel_work_sync in sm_release (git-fixes).\n- mtd: spi-nor: fix spi_nor_spimem_setup_op() call in spi_nor_erase_{sector,chip}() (git-fixes).\n- mtd: st_spi_fsm: Add a clk_disable_unprepare() in .probe()\u0027s error path (git-fixes).\n- musb: fix USB_MUSB_TUSB6010 dependency (git-fixes).\n- mwifiex: Ignore BTCOEX events from the 88W8897 firmware (git-fixes).\n- n_gsm: remove unused parameters from gsm_error() (git-fixes).\n- net: asix: fix \u0027can\u0027t send until first packet is send\u0027 issue (git-fixes).\n- net: bcmgenet: Use stronger register read/writes to assure ordering (git-fixes).\n- net: dsa: b53: Add SPI ID table (git-fixes).\n- net: dsa: felix: Fix memory leak in felix_setup_mmio_filtering (git-fixes).\n- net: dsa: felix: purge skb from TX timestamping queue if it cannot be sent (git-fies).\n- net: dsa: hellcreek: Add STP forwarding rule (git-fixes).\n- net: dsa: hellcreek: Add missing PTP via UDP rules (git-fixes).\n- net: dsa: hellcreek: Allow PTP P2P measurements on blocked ports (git-fixes).\n- net: dsa: hellcreek: Fix insertion of static FDB entries (git-fixes).\n- net: dsa: microchip: implement multi-bridge support (git-fixes).\n- net: dsa: mv88e6xxx: Add fix for erratum 5.2 of 88E6393X family (git-fixes).\n- net: dsa: mv88e6xxx: Drop unnecessary check in mv88e6393x_serdes_erratum_4_6() (git-fixes).\n- net: dsa: mv88e6xxx: Enable port policy support on 6097 (git-fixes).\n- net: dsa: mv88e6xxx: Fix application of erratum 4.8 for 88E6393X (git-fixes).\n- net: dsa: mv88e6xxx: Fix inband AN for 2500base-x on 88E6393X family (git-fixes).\n- net: dsa: mv88e6xxx: Link in pcs_get_state() if AN is bypassed (git-fixes).\n- net: dsa: mv88e6xxx: Save power by disabling SerDes trasmitter and receiver (git-fixes).\n- net: dsa: mv88e6xxx: Unforce speed \u0026 duplex in mac_link_down() (git-fixes).\n- net: dsa: mv88e6xxx: allow use of PHYs on CPU and DSA ports (git-fixes).\n- net: dsa: mv88e6xxx: error handling for serdes_power functions (git-fixes).\n- net: dsa: mv88e6xxx: fix \u0027do not use PHY_DETECT on internal PHY\u0027s\u0027 (git-fixes).\n- net: dsa: ocelot: seville: utilize of_mdiobus_register (git-fixes).\n- net: dsa: qca8k: fix MTU calculation (git-fixes).\n- net: dsa: seville: register the mdiobus under devres (git-fixes).\n- net: dsa: tag_ocelot_8021q: break circular dependency with ocelot switch lib (git-fies).\n- net: enetc: report software timestamping via SO_TIMESTAMPING (git-fixes).\n- net: hns3: clean residual vf config after disable sriov (git-fixes).\n- net: macsec: fix potential resource leak in macsec_add_rxsa() and macsec_add_txsa() (git-fixes).\n- net: marvell: prestera: fix incorrect structure access (git-fixes).\n- net: mscc: ocelot: correctly report the timestamping RX filters in ethtool (git-fixes).\n- net: mscc: ocelot: create a function that replaces an existing VCAP filter (git-fixes).\n- net: mscc: ocelot: do not dereference NULL pointers with shared tc filters (git-fixes).\n- net: mscc: ocelot: do not downgrade timestamping RX filters in SIOCSHWTSTAMP (git-fixes).\n- net: mscc: ocelot: fix incorrect balancing with down LAG ports (git-fixes).\n- net: mscc: ocelot: set up traps for PTP packets (git-fixes).\n- net: openvswitch: do not send internal clone attribute to the userspace (git-fixes).\n- net: openvswitch: fix leak of nested actions (git-fixes).\n- net: openvswitch: fix misuse of the cached connection on tuple changes (git-fixes).\n- net: openvswitch: fix parsing of nw_proto for IPv6 fragments (git-fixes).\n- net: phy: Do not WARN for PHY_READY state in mdio_bus_phy_resume() (git-fixes).\n- net: phy: Warn about incorrect mdio_bus_phy_resume() state (git-fixes).\n- net: phy: smsc: Disable Energy Detect Power-Down in interrupt mode (git-fixes).\n- net: ptp: add a definition for the UDP port for IEEE 1588 general messages (git-fixes).\n- net: rose: fix netdev reference changes (git-fixes).\n- net: sock: tracing: Fix sock_exceed_buf_limit not to dereference stale pointer (git-fixes).\n- net: stmmac: clean up impossible condition (git-fixes).\n- net: stmmac: disable Split Header (SPH) for Intel platforms (bsc#1194904).\n- net: stmmac: dwc-qos: Disable split header for Tegra194 (bsc#1194904).\n- net: stmmac: fix off-by-one error in sanity check (git-fixes).\n- net: usb: ax88179_178a needs FLAG_SEND_ZLP (git-fixes).\n- net: usb: ax88179_178a: add Allied Telesis AT-UMCs (git-fixes).\n- net: usb: make USB_RTL8153_ECM non user configurable (git-fixes).\n- net: vmxnet3: fix possible NULL pointer dereference in vmxnet3_rq_cleanup() (bsc#1200431).\n- net: vmxnet3: fix possible use-after-free bugs in vmxnet3_rq_alloc_rx_buf() (bsc#1200431).\n- net: vmxnet3: remove multiple false checks in vmxnet3_ethtool.c (bsc#1200431).\n- net:enetc: allocate CBD ring data memory using DMA coherent methods (git-fixes).\n- net_sched: cls_route: disallow handle of 0 (bsc#1202393).\n- nfc: pn533: Fix use-after-free bugs caused by pn532_cmd_timeout (git-fixes).\n- nfsd: fix use-after-free due to delegation race (git-fixes).\n- nmi: Extend NMI watchdog\u0027s timer during LPM (bsc#1202872 ltc#197920).\n- nohz/full, sched/rt: Fix missed tick-reenabling bug in dequeue_task_rt() (bnc#1189999 (Scheduler functional and performance backports)).\n- nouveau: explicitly wait on the fence in nouveau_bo_move_m2mf (git-fies).\n- ntb_hw_amd: Add NTB PCI ID for new gen CPU (bsc#1202113).\n- nvme-auth: align to pre-upstream FFDHE implementation (bsc#1202265).\n- nvme-fabrics: parse nvme connect Linux error codes (bsc#1201865).\n- nvme-rdma: Handle number of queue changes (bsc#1201865).\n- nvme-tcp: Handle number of queue changes (bsc#1201865).\n- nvme-tcp: fix UAF when detecting digest errors (bsc#1200313 bsc#1201489).\n- nvme: fix RCU hole that allowed for endless looping in multipath round robin (bsc#1202636).\n- nvmet: Expose max queues to configfs (bsc#1201865).\n- ocfs2: dlmfs: fix error handling of user_dlm_destroy_lock (bsc#1202778).\n- ocfs2: fix a deadlock when commit trans (bsc#1202776).\n- octeontx2-af: Add KPU changes to parse NGIO as separate layer (jsc#SLE-24682).\n- octeontx2-af: Add PTP device id for CN10K and 95O silcons (jsc#SLE-24682).\n- octeontx2-af: Add SDP interface support (jsc#SLE-24682).\n- octeontx2-af: Add debug messages for failures (jsc#SLE-24682).\n- octeontx2-af: Add external ptp input clock (jsc#SLE-24682).\n- octeontx2-af: Add free rsrc count mbox msg (jsc#SLE-24682).\n- octeontx2-af: Add mbox to retrieve bandwidth profile free count (jsc#SLE-24682).\n- octeontx2-af: Add support to flush full CPT CTX cache (jsc#SLE-24682).\n- octeontx2-af: Adjust LA pointer for cpt parse header (jsc#SLE-24682).\n- octeontx2-af: Allocate low priority entries for PF (jsc#SLE-24682).\n- octeontx2-af: Allow to configure flow tag LSB byte as RSS adder (jsc#SLE-24682).\n- octeontx2-af: Change the order of queue work and interrupt disable (jsc#SLE-24682).\n- octeontx2-af: Do not enable Pause frames by default (jsc#SLE-24682).\n- octeontx2-af: Enable CPT HW interrupts (jsc#SLE-24682).\n- octeontx2-af: Enhance mailbox trace entry (jsc#SLE-24682).\n- octeontx2-af: Fix LBK backpressure id count (jsc#SLE-24682).\n- octeontx2-af: Fix inconsistent license text (jsc#SLE-24682).\n- octeontx2-af: Fix interrupt name strings (jsc#SLE-24682).\n- octeontx2-af: Fix spelling mistake \u0027Makesure\u0027 -\u003e \u0027Make sure\u0027 (jsc#SLE-24682).\n- octeontx2-af: Fix uninitialized variable val (jsc#SLE-24682).\n- octeontx2-af: Flow control resource management (jsc#SLE-24682).\n- octeontx2-af: Handle return value in block reset (jsc#SLE-24682).\n- octeontx2-af: Hardware configuration for inline IPsec (jsc#SLE-24682).\n- octeontx2-af: Increase link credit restore polling timeout (jsc#SLE-24682).\n- octeontx2-af: Increase number of reserved entries in KPU (jsc#SLE-24682).\n- octeontx2-af: Increment ptp refcount before use (jsc#SLE-24682).\n- octeontx2-af: Limit KPU parsing for GTPU packets (jsc#SLE-24682).\n- octeontx2-af: Modify install flow error codes (jsc#SLE-24682).\n- octeontx2-af: Optimize KPU1 processing for variable-length headers (jsc#SLE-24682).\n- octeontx2-af: Perform cpt lf teardown in non FLR path (jsc#SLE-24682).\n- octeontx2-af: Priority flow control configuration support (jsc#SLE-24682).\n- octeontx2-af: Remove channel verification while installing MCAM rules (jsc#SLE-24682).\n- octeontx2-af: Remove redundant initialization of variable blkaddr (jsc#SLE-24682).\n- octeontx2-af: Remove redundant initialization of variable pin (jsc#SLE-24682).\n- octeontx2-af: Reset PTP config in FLR handler (jsc#SLE-24682).\n- octeontx2-af: Retry until RVU block reset complete (jsc#SLE-24682).\n- octeontx2-af: Use DMA_ATTR_FORCE_CONTIGUOUS attribute in DMA alloc (jsc#SLE-24682).\n- octeontx2-af: Use NDC TX for transmit packet data (jsc#SLE-24682).\n- octeontx2-af: Use ptp input clock info from firmware data (jsc#SLE-24682).\n- octeontx2-af: Wait for TX link idle for credits change (jsc#SLE-24682).\n- octeontx2-af: add proper return codes for AF mailbox handlers (jsc#SLE-24682).\n- octeontx2-af: cn10K: Get NPC counters value (jsc#SLE-24682).\n- octeontx2-af: cn10K: support for sched lmtst and other features (jsc#SLE-24682).\n- octeontx2-af: cn10k: DWRR MTU configuration (jsc#SLE-24682).\n- octeontx2-af: cn10k: RPM hardware timestamp configuration (jsc#SLE-24682).\n- octeontx2-af: cn10k: Set cache lines for NPA batch alloc (jsc#SLE-24682).\n- octeontx2-af: cn10k: Use appropriate register for LMAC enable (jsc#SLE-24682).\n- octeontx2-af: cn10k: add workaround for ptp errata (jsc#SLE-24682).\n- octeontx2-af: cn10k: debugfs for dumping LMTST map table (jsc#SLE-24682).\n- octeontx2-af: configure npc for cn10k to allow packets from cpt (jsc#SLE-24682).\n- octeontx2-af: debugfs: Add channel and channel mask (jsc#SLE-24682).\n- octeontx2-af: debugfs: Minor changes (jsc#SLE-24682).\n- octeontx2-af: debugfs: do not corrupt user memory (jsc#SLE-24682).\n- octeontx2-af: debugfs: fix error return of allocations (jsc#SLE-24682).\n- octeontx2-af: enable tx shaping feature for 96xx C0 (jsc#SLE-24682).\n- octeontx2-af: fix array bound error (jsc#SLE-24682).\n- octeontx2-af: fix error code in is_valid_offset() (jsc#SLE-24682).\n- octeontx2-af: initialize action variable (jsc#SLE-24682).\n- octeontx2-af: nix and lbk in loop mode in 98xx (jsc#SLE-24682).\n- octeontx2-af: remove redudant second error check on variable err (jsc#SLE-24682).\n- octeontx2-af: use swap() to make code cleaner (jsc#SLE-24682).\n- octeontx2-af: verify CQ context updates (jsc#SLE-24682).\n- octeontx2-nic: fix mixed module build (jsc#SLE-24682).\n- octeontx2-nicvf: Add PTP hardware clock support to NIX VF (jsc#SLE-24682).\n- octeontx2-nicvf: Free VF PTP resources (jsc#SLE-24682).\n- octeontx2-pf: Add TC feature for VFs (jsc#SLE-24682).\n- octeontx2-pf: Add XDP support to netdev PF (jsc#SLE-24682).\n- octeontx2-pf: Add check for non zero mcam flows (jsc#SLE-24682).\n- octeontx2-pf: Add support for adaptive interrupt coalescing (jsc#SLE-24682).\n- octeontx2-pf: Add vlan-etype to ntuple filters (jsc#SLE-24682).\n- octeontx2-pf: Allow VLAN priority also in ntuple filters (jsc#SLE-24682).\n- octeontx2-pf: CN10K: Hide RPM stats over ethtool (jsc#SLE-24682).\n- octeontx2-pf: Do not mask out supported link modes (jsc#SLE-24682).\n- octeontx2-pf: Enable NETIF_F_RXALL support for VF driver (jsc#SLE-24682).\n- octeontx2-pf: Fix inconsistent license text (jsc#SLE-24682).\n- octeontx2-pf: Ntuple filters support for VF netdev (jsc#SLE-24682).\n- octeontx2-pf: PFC config support with DCBx (jsc#SLE-24682).\n- octeontx2-pf: Remove unnecessary synchronize_irq() before free_irq() (jsc#SLE-24682).\n- octeontx2-pf: Simplify the receive buffer size calculation (jsc#SLE-24682).\n- octeontx2-pf: Sort the allocated MCAM entry indices (jsc#SLE-24682).\n- octeontx2-pf: Unify flow management variables (jsc#SLE-24682).\n- octeontx2-pf: Use hardware register for CQE count (jsc#SLE-24682).\n- octeontx2-pf: cn10K: Reserve LMTST lines per core (jsc#SLE-24682).\n- octeontx2-pf: cn10k: Config DWRR weight based on MTU (jsc#SLE-24682).\n- octeontx2-pf: cn10k: Ensure valid pointers are freed to aura (jsc#SLE-24682).\n- octeontx2-pf: cn10k: add support for new ptp timestamp format (jsc#SLE-24682).\n- octeontx2-pf: devlink params support to set mcam entry count (jsc#SLE-24682).\n- octeontx2-pf: replace bitmap_weight with bitmap_empty where appropriate (jsc#SLE-24682).\n- octeontx2-pf: select CONFIG_NET_DEVLINK (jsc#SLE-24682).\n- octeontx2-vf: Add support for adaptive interrupt coalescing (jsc#SLE-24682).\n- octeontx2: Move devlink registration to be last devlink command (jsc#SLE-24682).\n- openvswitch: Fix setting ipv6 fields causing hw csum failure (git-fixes).\n- openvswitch: Fixed nd target mask field in the flow dump (git-fixes).\n- pci: Add support for ACPI RST reset method (jsc#SLE-19359 jsc#SLE-24572).\n- perf bench futex: Fix memory leak of perf_cpu_map__new() (git-fixes).\n- phy: samsung: phy-exynos-pcie: sanitize init/power_on callbacks (git-fixes).\n- phy: stm32: fix error return in stm32_usbphyc_phy_init (git-fixes).\n- pinctrl: amd: Do not save/restore interrupt status and wake status bits (git-fixes).\n- pinctrl: intel: Check against matching data instead of ACPI companion (git-fixes).\n- pinctrl: nomadik: Fix refcount leak in nmk_pinctrl_dt_subnode_to_map (git-fixes).\n- pinctrl: qcom: msm8916: Allow CAMSS GP clocks to be muxed (git-fixes).\n- pinctrl: qcom: sm8250: Fix PDC map (git-fixes).\n- pinctrl: sunxi: Add I/O bias setting for H6 R-PIO (git-fixes).\n- platform/chrome: cros_ec: Always expose last resume result (git-fixes).\n- platform/chrome: cros_ec_proto: do not show MKBP version if unsupported (git-fixes).\n- platform/olpc: Fix uninitialized data in debugfs write (git-fixes).\n- platform/x86: pmc_atom: Fix SLP_TYPx bitfield mask (git-fixes).\n- platform/x86: pmc_atom: Match all Lex BayTrail boards with critclk_systems DMI table (git-fixes).\n- powerpc/perf: Optimize clearing the pending PMI and remove WARN_ON for PMI check in power_pmu_disable (bsc#1156395).\n- powerpc/powernv/kvm: Use darn for H_RANDOM on Power9 (bsc#1065729).\n- powerpc/powernv: Avoid crashing if rng is NULL (bsc#1065729).\n- powerpc/powernv: delay rng platform device creation until later in boot (bsc#1065729).\n- powerpc/powernv: rename remaining rng powernv_ functions to pnv_ (bsc#1065729).\n- powerpc/powernv: wire up rng during setup_arch (bsc#1065729).\n- powerpc/pseries: wire up rng during setup_arch() (bsc#1065729).\n- powerpc/xive: Fix refcount leak in xive_get_max_prio (git-fixess).\n- powerpc: Avoid discarding flags in system_call_exception() (bsc#1194869).\n- powerpc: Enable execve syscall exit tracepoint (bsc#1065729).\n- powerpc: powernv: kABI: add back powernv_get_random_long (bsc#1065729).\n- proc: fix a dentry lock race between release_task and lookup (git-fixes).\n- proc: fix dentry/inode overinstantiating under /proc/${pid}/net (git-fixes).\n- profiling: fix shift too large makes kernel panic (git-fixes).\n- pwm: lpc18xx-sct: Reduce number of devm memory allocations (git-fixes).\n- pwm: lpc18xx-sct: Simplify driver by not using pwm_[gs]et_chip_data() (git-fixes).\n- pwm: lpc18xx: Fix period handling (git-fixes).\n- qed: validate and restrict untrusted VFs vlan promisc mode (git-fixes).\n- r8152: fix the RX FIFO settings when suspending (git-fixes).\n- r8152: fix the units of some registers for RTL8156A (git-fixes).\n- random: remove useless header comment (git-fixes).\n- ratelimit: Fix data-races in ___ratelimit() (git-fixes).\n- regulator: of: Fix refcount leak bug in of_get_regulation_constraints() (git-fixes).\n- regulator: pca9450: Remove restrictions for regulator-name (git-fixes).\n- regulator: qcom_smd: Fix pm8916_pldo range (git-fixes).\n- remoteproc: imx_rproc: Fix refcount leak in imx_rproc_addr_init (git-fixes).\n- remoteproc: k3-r5: Fix refcount leak in k3_r5_cluster_of_init (git-fixes).\n- remoteproc: qcom: pas: Check if coredump is enabled (git-fixes).\n- remoteproc: qcom: pas: Mark devices as wakeup capable (git-fixes).\n- remoteproc: qcom: q6v5-mss: add powerdomains to MSM8996 config (git-fixes).\n- remoteproc: qcom: wcnss: Fix handling of IRQs (git-fixes).\n- remoteproc: sysmon: Wait for SSCTL service to come up (git-fixes).\n- rose: check NULL rose_loopback_neigh-\u003eloopback (git-fixes).\n- rpm/kernel-binary.spec.in: move vdso to a separate package (bsc#1202385) We do the move only on 15.5+.\n- rpm/kernel-binary.spec.in: simplify find for usrmerged The type test and print line are the same for both cases. The usrmerged case only ignores more, so refactor it to make it more obvious.\n- rpm/kernel-source.spec.in: simplify finding of broken symlinks \u0027find -xtype l\u0027 will report them, so use that to make the search a bit faster (without using shell).\n- rpm: Fix parsing of rpm/macros.kernel-source on SLE12 (bsc#1201019).\n- rpmsg: char: Add mutex protection for rpmsg_eptdev_open() (git-fixes).\n- rpmsg: mtk_rpmsg: Fix circular locking dependency (git-fixes).\n- rpmsg: qcom_smd: Fix refcount leak in qcom_smd_parse_edge (git-fixes).\n- s390/cpumf: Handle events cycles and instructions identical (git-fixes).\n- s390/crash: fix incorrect number of bytes to copy to user space (git-fixes).\n- s390/crash: make copy_oldmem_page() return number of bytes copied (git-fixes).\n- s390/hugetlb: fix prepare_hugepage_range() check for 2 GB hugepages (git-fixes).\n- s390/hypfs: avoid error message under KVM (bsc#1032323).\n- s390/kexec: handle R_390_PLT32DBL rela in arch_kexec_apply_relocations_add() (git-fixes).\n- s390/mm: do not trigger write fault when vma does not allow VM_WRITE (git-fixes).\n- s390/mm: use non-quiescing sske for KVM switch to keyed guest (git-fixes).\n- s390/qeth: cache link_info for ethtool (bsc#1202262 LTC#199322).\n- s390/stp: clock_delta should be signed (git-fixes).\n- s390/zcore: fix race when reading from hardware system area (git-fixes).\n- sched/core: Always flush pending blk_plug (bnc#1189999 (Scheduler functional and performance backports)).\n- sched/core: Do not requeue task on CPU excluded from cpus_mask (bnc#1199356).\n- sched/deadline: Fix BUG_ON condition for deboosted tasks (git-fixes)\n- sched/fair: Fix cfs_rq_clock_pelt() for throttled cfs_rq (bnc#1189999 (Scheduler functional and performance backports)).\n- sched/fair: Fix cfs_rq_clock_pelt() for throttled cfs_rq -kabi (git fixes (sched/fair)).\n- sched/fair: Remove redundant word \u0027 *\u0027 (bnc#1189999 (Scheduler functional and performance backports)).\n- sched/uclamp: Fix iowait boost escaping uclamp restriction (git-fixes)\n- sched/uclamp: Fix rq-\u003euclamp_max not set on first enqueue (git-fixes)\n- sched: Allow newidle balancing to bail out of load_balance (bnc#1189999 (Scheduler functional and performance backports)).\n- sched: Fix the check of nr_running at queue wakelist (bnc#1189999 (Scheduler functional and performance backports)).\n- sched: Remove the limitation of WF_ON_CPU on wakelist if wakee cpu is idle (bnc#1189999 (Scheduler functional and performance backports)). Refresh\n- sched: Remove unused function group_first_cpu() (bnc#1189999).\n- scripts/faddr2line: Fix vmlinux detection on arm64 (git-fixes).\n- scsi: hisi_sas: Keep controller active between ISR of phyup and the event being processed (bsc#1202471).\n- scsi: hisi_sas: Use autosuspend for the host controller (bsc#1202471).\n- scsi: libiscsi: Add iscsi_cls_conn to sysfs after initialization (bsc#1198410).\n- scsi: lpfc: Add warning notification period to CMF_SYNC_WQE (bsc#1203063).\n- scsi: lpfc: Check the return value of alloc_workqueue() (bsc#1203063).\n- scsi: lpfc: Copyright updates for 14.2.0.5 patches (bsc#1201956).\n- scsi: lpfc: Copyright updates for 14.2.0.6 patches (bsc#1203063).\n- scsi: lpfc: Fix attempted FA-PWWN usage after feature disable (bsc#1201956).\n- scsi: lpfc: Fix lost NVMe paths during LIF bounce stress test (bsc#1201956).\n- scsi: lpfc: Fix null ndlp ptr dereference in abnormal exit path for GFT_ID (bsc#1203063).\n- scsi: lpfc: Fix possible memory leak when failing to issue CMF WQE (bsc#1201956).\n- scsi: lpfc: Fix uninitialized cqe field in lpfc_nvme_cancel_iocb() (bsc#1201956).\n- scsi: lpfc: Fix unsolicited FLOGI receive handling during PT2PT discovery (bsc#1203063).\n- scsi: lpfc: Prevent buffer overflow crashes in debugfs with malformed user input (bsc#1201956).\n- scsi: lpfc: Refactor lpfc_nvmet_prep_abort_wqe() into lpfc_sli_prep_abort_xri() (bsc#1201956).\n- scsi: lpfc: Remove Menlo/Hornet related code (bsc#1201956).\n- scsi: lpfc: Remove SANDiags related code (bsc#1203063).\n- scsi: lpfc: Remove extra atomic_inc on cmd_pending in queuecommand after VMID (bsc#1201956).\n- scsi: lpfc: Revert RSCN_MEMENTO workaround for misbehaved configuration (bsc#1201956).\n- scsi: lpfc: Rework MIB Rx Monitor debug info logic (bsc#1203063).\n- scsi: lpfc: Set PU field when providing D_ID in XMIT_ELS_RSP64_CX iocb (bsc#1201956).\n- scsi: lpfc: Update lpfc version to 14.2.0.5 (bsc#1201956).\n- scsi: lpfc: Update lpfc version to 14.2.0.6 (bsc#1203063).\n- scsi: mpt3sas: Stop fw fault watchdog work item during system shutdown (git-fixes).\n- scsi: sg: Allow waiting for commands to complete on removed device (git-fixes).\n- scsi: smartpqi: Fix DMA direction for RAID requests (git-fixes).\n- scsi: ufs: core: Fix another task management completion race (git-fixes).\n- scsi: ufs: core: Fix task management completion timeout race (git-fixes).\n- scsi: zfcp: Fix missing auto port scan and thus missing target ports (git-fixes).\n- selftests/seccomp: Fix compile warning when CC=clang (git-fixes).\n- selftests: kvm: set rax before vmcall (git-fixes).\n- selftests: timers: clocksource-switch: fix passing errors from child (git-fixes).\n- selftests: timers: valid-adjtimex: build fix for newer toolchains (git-fixes).\n- selinux: Add boundary check in put_entry() (git-fixes).\n- selinux: access superblock_security_struct in LSM blob way (git-fixes).\n- selinux: check return value of sel_make_avc_files (git-fixes).\n- selinux: fix bad cleanup on error in hashtab_duplicate() (git-fixes).\n- selinux: fix double free of cond_list on error paths (git-fixes).\n- selinux: fix memleak in security_read_state_kernel() (git-fixes).\n- selinux: fix misuse of mutex_is_locked() (git-fixes).\n- selinux: use correct type for context length (git-fixes).\n- serial: 8250: Add proper clock handling for OxSemi PCIe devices (git-fixes).\n- serial: 8250: Export ICR access helpers for internal use (git-fixes).\n- serial: 8250: Fold EndRun device support into OxSemi Tornado code (git-fixes).\n- serial: 8250_bcm7271: Save/restore RTS in suspend/resume (git-fixes).\n- serial: 8250_dw: Store LSR into lsr_saved_flags in dw8250_tx_wait_empty() (git-fixes).\n- serial: 8250_fsl: Do not report FE, PE and OE twice (git-fixes).\n- serial: 8250_pci: Refactor the loop in pci_ite887x_init() (git-fixes).\n- serial: 8250_pci: Replace dev_*() by pci_*() macros (git-fixes).\n- serial: fsl_lpuart: RS485 RTS polariy is inverse (git-fixes).\n- serial: mvebu-uart: uart2 error bits clearing (git-fixes).\n- soc: amlogic: Fix refcount leak in meson-secure-pwrc.c (git-fixes).\n- soc: brcmstb: pm-arm: Fix refcount leak and __iomem leak bugs (git-fixes).\n- soc: fsl: guts: machine variable might be unset (git-fixes).\n- soc: fsl: select FSL_GUTS driver for DPIO (git-fixes).\n- soc: imx: gpcv2: Assert reset before ungating clock (git-fixes).\n- soc: qcom: Make QCOM_RPMPD depend on PM (git-fixes).\n- soc: qcom: aoss: Fix refcount leak in qmp_cooling_devices_register (git-fixes).\n- soc: qcom: ocmem: Fix refcount leak in of_get_ocmem (git-fixes).\n- soc: renesas: r8a779a0-sysc: Fix A2DP1 and A2CV[2357] PDR values (git-fixes).\n- soundwire: bus_type: fix remove and shutdown support (git-fixes).\n- soundwire: qcom: Check device status before reading devid (git-fixes).\n- soundwire: qcom: fix device status array range (git-fixes).\n- spi: Fix incorrect cs_setup delay handling (git-fixes).\n- spi: Fix simplification of devm_spi_register_controller (git-fixes).\n- spi: dt-bindings: cadence: add missing \u0027required\u0027 (git-fixes).\n- spi: dt-bindings: zynqmp-qspi: add missing \u0027required\u0027 (git-fixes).\n- spi: meson-spicc: add local pow2 clock ops to preserve rate between messages (git-fixes).\n- spi: spi-altera-dfl: Fix an error handling path (git-fixes).\n- spi: spi-rspi: Fix PIO fallback on RZ platforms (git-fixes).\n- spi: synquacer: Add missing clk_disable_unprepare() (git-fixes).\n- spi: tegra20-slink: fix UAF in tegra_slink_remove() (git-fixes).\n- spmi: trace: fix stack-out-of-bound access in SPMI tracing functions (git-fixes).\n- staging: rtl8192u: Fix sleep in atomic context bug in dm_fsync_timer_callback (git-fixes).\n- staging: rtl8712: fix use after free bugs (git-fixes).\n- supported.conf: added drivers/net/ethernet/marvell/octeontx2/nic/otx2_ptp and changed all octeontx2 modules as supported (jsc#SLE-24682)\n- supported.conf: mark lib/objagg supported as dependency of mlxsw\n- supported.conf: mark mlxsw modules supported (jsc#SLE-23766)\n- thermal/int340x_thermal: handle data_vault when the value is ZERO_SIZE_PTR (bsc#1201308).\n- thermal/tools/tmon: Include pthread and time headers in tmon.h (git-fixes).\n- thermal: sysfs: Fix cooling_device_stats_setup() error code path (git-fixes).\n- thunderbolt: Use the actual buffer in tb_async_error() (git-fixes).\n- tools/thermal: Fix possible path truncations (git-fixes).\n- tpm: eventlog: Fix section mismatch for DEBUG_SECTION_MISMATCH (git-fixes).\n- trace/osnoise: Add migrate-disabled field to the osnoise header (git-fixes).\n- trace/timerlat: Add migrate-disabled field to the timerlat header (git-fixes).\n- tracing/histograms: Fix memory leak problem (git-fixes).\n- tracing/kprobes: Check whether get_kretprobe() returns NULL in kretprobe_dispatcher() (git-fixes).\n- tracing/probes: Have kprobes and uprobes use $COMM too (git-fixes).\n- tracing: Add ustring operation to filtering string pointers (git-fixes).\n- tracing: Fix sleeping while atomic in kdb ftdump (git-fixes).\n- tracing: Have filter accept \u0027common_cpu\u0027 to be consistent (git-fixes).\n- tracing: Use a struct alignof to determine trace event field alignment (git-fixes).\n- tty: 8250: Add support for Brainboxes PX cards (git-fixes).\n- tty: n_gsm: Modify CR,PF bit printk info when config requester (git-fixes).\n- tty: n_gsm: Modify cr bit value when config requester (git-fixes).\n- tty: n_gsm: Modify gsmtty driver register method when config requester (git-fixes).\n- tty: n_gsm: add sanity check for gsm-\u003ereceive in gsm_receive_buf() (git-fixes).\n- tty: n_gsm: avoid call of sleeping functions from atomic context (git-fixes).\n- tty: n_gsm: clean up dead code in gsm_queue() (git-fixes).\n- tty: n_gsm: clean up implicit CR bit encoding in address field (git-fixes).\n- tty: n_gsm: clean up indenting in gsm_queue() (git-fixes).\n- tty: n_gsm: fix DM command (git-fixes).\n- tty: n_gsm: fix broken virtual tty handling (git-fixes).\n- tty: n_gsm: fix deadlock and link starvation in outgoing data path (git-fixes).\n- tty: n_gsm: fix flow control handling in tx path (git-fixes).\n- tty: n_gsm: fix missing corner cases in gsmld_poll() (git-fixes).\n- tty: n_gsm: fix missing mux reset on config change at responder (git-fixes).\n- tty: n_gsm: fix missing timer to handle stalled links (git-fixes).\n- tty: n_gsm: fix non flow control frames during mux flow off (git-fixes).\n- tty: n_gsm: fix packet re-transmission without open control channel (git-fixes).\n- tty: n_gsm: fix race condition in gsmld_write() (git-fixes).\n- tty: n_gsm: fix resource allocation order in gsm_activate_mux() (git-fixes).\n- tty: n_gsm: fix tty registration before control channel open (git-fixes).\n- tty: n_gsm: fix user open not possible at responder until initiator open (git-fixes).\n- tty: n_gsm: fix wrong T1 retry count handling (git-fixes).\n- tty: n_gsm: fix wrong queuing behavior in gsm_dlci_data_output() (git-fixes).\n- tty: n_gsm: initialize more members at gsm_alloc_mux() (git-fixes).\n- tty: n_gsm: replace kicktimer with delayed_work (git-fixes).\n- tty: serial: Fix refcount leak bug in ucc_uart.c (git-fixes).\n- tty: serial: fsl_lpuart: correct the count of break characters (git-fixes).\n- tty: serial: lpuart: disable flow control while waiting for the transmit engine to complete (git-fixes).\n- tty: vt: initialize unicode screen buffer (git-fixes).\n- udf: Fix crash after seekdir (bsc#1194592).\n- udmabuf: Set the DMA mask for the udmabuf device (v2) (git-fixes).\n- usb: aspeed-vhub: Fix refcount leak bug in ast_vhub_init_desc() (git-fixes).\n- usb: cdns3 fix use-after-free at workaround 2 (git-fixes).\n- usb: cdns3: Do not use priv_dev uninitialized in cdns3_gadget_ep_enable() (git-fixes).\n- usb: cdns3: change place of \u0027priv_ep\u0027 assignment in cdns3_gadget_ep_dequeue(), cdns3_gadget_ep_enable() (git-fixes).\n- usb: cdns3: fix incorrect handling TRB_SMM flag for ISOC transfer (git-fixes).\n- usb: cdns3: fix issue with rearming ISO OUT endpoint (git-fixes).\n- usb: cdns3: fix random warning message when driver load (git-fixes).\n- usb: dwc2: fix wrong order of phy_power_on and phy_init (git-fixes).\n- usb: dwc2: gadget: remove D+ pull-up while no vbus with usb-role-switch (git-fixes).\n- usb: dwc3: core: Deprecate GCTL.CORESOFTRESET (git-fixes).\n- usb: dwc3: core: Do not perform GCTL_CORE_SOFTRESET during bootup (git-fixes).\n- usb: dwc3: dwc3-qcom: Add missing platform_device_put() in dwc3_qcom_acpi_register_core (git-fixes).\n- usb: dwc3: dwc3-qcom: Fix typo in the dwc3 vbus override API (git-fixes).\n- usb: dwc3: gadget: Avoid duplicate requests to enable Run/Stop (git-fixes).\n- usb: dwc3: gadget: fix high speed multiplier setting (git-fixes).\n- usb: dwc3: gadget: refactor dwc3_repare_one_trb (git-fixes).\n- usb: dwc3: qcom: Add helper functions to enable,disable wake irqs (git-fixes).\n- usb: dwc3: qcom: fix missing optional irq warnings (git-fixes).\n- usb: dwc3: qcom: fix use-after-free on runtime-PM wakeup (git-fixes).\n- usb: gadget: f_uac2: clean up some inconsistent indenting (git-fixes).\n- usb: gadget: f_uac2: fix superspeed transfer (git-fixes).\n- usb: gadget: mass_storage: Fix cdrom data transfers on MAC-OS (git-fixes).\n- usb: gadget: tegra-xudc: Fix error check in tegra_xudc_powerdomain_init() (git-fixes).\n- usb: gadget: udc-xilinx: replace memcpy with memcpy_toio (git-fixes).\n- usb: gadget: udc: amd5536 depends on HAS_DMA (git-fixes).\n- usb: gadget: uvc: call uvc uvcg_warn on completed status instead of uvcg_info (git-fixes).\n- usb: host: Fix refcount leak in ehci_hcd_ppc_of_probe (git-fixes).\n- usb: host: ohci-ppc-of: Fix refcount leak bug (git-fixes).\n- usb: host: xhci: use snprintf() in xhci_decode_trb() (git-fixes).\n- usb: ohci-nxp: Fix refcount leak in ohci_hcd_nxp_probe (git-fixes).\n- usb: renesas: Fix refcount leak bug (git-fixes).\n- usb: typec: altmodes/displayport: correct pin assignment for UFP receptacles (git-fixes).\n- usb: typec: tcpm: Return ENOTSUPP for power supply prop writes (git-fixes).\n- usb: typec: ucsi: Acknowledge the GET_ERROR_STATUS command completion (git-fixes).\n- usb: xhci: tegra: Fix error check (git-fixes).\n- usbnet: Fix linkwatch use-after-free on disconnect (git-fixes).\n- usbnet: smsc95xx: Avoid link settings race on interrupt reception (git-fixes).\n- usbnet: smsc95xx: Do not clear read-only PHY interrupt (git-fixes).\n- usbnet: smsc95xx: Fix deadlock on runtime resume (git-fixes).\n- usbnet: smsc95xx: Forward PHY interrupts to PHY driver to avoid polling (git-fixes).\n- vboxguest: Do not use devm for irq (git-fixes).\n- vdpa_sim: avoid putting an uninitialized iova_domain (git-fixes).\n- venus: pm_helpers: Fix warning in OPP during probe (git-fixes).\n- vfio/ccw: Do not change FSM state in subchannel event (git-fixes).\n- vfio/ccw: Remove UUID from s390 debug log (git-fixes).\n- vfio: Clear the caps-\u003ebuf to NULL after free (git-fixes).\n- video: fbdev: amba-clcd: Fix refcount leak bugs (git-fixes).\n- video: fbdev: arkfb: Check the size of screen before memset_io() (git-fixes).\n- video: fbdev: arkfb: Fix a divide-by-zero bug in ark_set_pixclock() (git-fixes).\n- video: fbdev: i740fb: Check the argument of i740_calc_vclk() (git-fixes).\n- video: fbdev: s3fb: Check the size of screen before memset_io() (git-fixes).\n- video: fbdev: sis: fix typos in SiS_GetModeID() (git-fixes).\n- video: fbdev: vt8623fb: Check the size of screen before memset_io() (git-fixes).\n- virtio-gpu: fix a missing check to avoid NULL dereference (git-fixes).\n- virtio-net: fix the race between refill work and close (git-fixes).\n- virtio_net: fix memory leak inside XPD_TX with mergeable (git-fixes).\n- vmxnet3: Implement ethtool\u0027s get_channels command (bsc#1200431).\n- vmxnet3: Record queue number to incoming packets (bsc#1200431).\n- vmxnet3: Remove useless DMA-32 fallback configuration (bsc#1200431).\n- vmxnet3: add command to set ring buffer sizes (bsc#1200431).\n- vmxnet3: add support for capability registers (bsc#1200431).\n- vmxnet3: add support for large passthrough BAR register (bsc#1200431).\n- vmxnet3: add support for out of order rx completion (bsc#1200431).\n- vmxnet3: disable overlay offloads if UPT device does not support (bsc#1200431).\n- vmxnet3: do not reschedule napi for rx processing (bsc#1200431).\n- vmxnet3: limit number of TXDs used for TSO packet (bsc#1200431).\n- vmxnet3: prepare for version 7 changes (bsc#1200431).\n- vmxnet3: switch from \u0027pci_\u0027 to \u0027dma_\u0027 API (bsc#1200431).\n- vmxnet3: update to version 7 (bsc#1200431).\n- vmxnet3: use ext1 field to indicate encapsulated packet (bsc#1200431).\n- vrf: do not run conntrack on vrf with !dflt qdisc (git-fixes).\n- vsock: Fix memory leak in vsock_connect() (git-fixes).\n- vsock: Set socket state back to SS_UNCONNECTED in vsock_connect_timeout() (git-fixes).\n- watchdog: armada_37xx_wdt: check the return value of devm_ioremap() in armada_37xx_wdt_probe() (git-fixes).\n- watchdog: sp5100_tco: Fix a memory leak of EFCH MMIO resource (git-fixes).\n- wifi: cfg80211: debugfs: fix return type in ht40allow_map_read() (git-fixes).\n- wifi: iwlegacy: 4965: fix potential off-by-one overflow in il4965_rs_fill_link_cmd() (git-fixes).\n- wifi: iwlwifi: mvm: fix double list_add at iwl_mvm_mac_wake_tx_queue (git-fixes).\n- wifi: libertas: Fix possible refcount leak in if_usb_probe() (git-fixes).\n- wifi: mac80211: Do not finalize CSA in IBSS mode if state is disconnected (git-fixes).\n- wifi: mac80211: limit A-MSDU subframes for client too (git-fixes).\n- wifi: mac80211_hwsim: add back erroneously removed cast (git-fixes).\n- wifi: mac80211_hwsim: fix race condition in pending packet (git-fixes).\n- wifi: mac80211_hwsim: use 32-bit skb cookie (git-fixes).\n- wifi: p54: Fix an error handling path in p54spi_probe() (git-fixes).\n- wifi: p54: add missing parentheses in p54_flush() (git-fixes).\n- wifi: rtlwifi: fix error codes in rtl_debugfs_set_write_h2c() (git-fixes).\n- wifi: rtlwifi: remove always-true condition pointed out by GCC 12 (git-fies).\n- wifi: rtw88: check the return value of alloc_workqueue() (git-fixes).\n- wifi: rtw89: 8852a: rfk: fix div 0 exception (git-fixes).\n- wifi: wil6210: debugfs: fix info leak in wil_write_file_wmi() (git-fixes).\n- wifi: wil6210: debugfs: fix uninitialized variable use in `wil_write_file_wmi()` (git-fixes).\n- wireless: Remove redundant \u0027flush_workqueue()\u0027 calls (bsc#1202131).\n- x86/Hyper-V: Add SEV negotiate protocol support in Isolation VM (bsc#1190497).\n- x86/olpc: fix \u0027logical not is only applied to the left hand side\u0027 (git-fixes).\n- x86/retbleed: Add fine grained Kconfig knobs (bsc#1190497).\n- x86/sev: Define the Linux-specific guest termination reasons (bsc#1190497).\n- x86/sev: Save the negotiated GHCB version (bsc#1190497).\n- xen/gntdev: fix unmap notification order (git-fixes).\n- xen/privcmd: fix error exit of privcmd_ioctl_dm_op() (git-fixes).\n- xen/xenbus: fix return type in xenbus_file_read() (git-fixes).\n- xen: detect uninitialized xenbus in xenbus_init (git-fixes).\n- xen: do not continue xenstore initialization in case of errors (git-fixes).\n- xfs: Fix the free logic of state in xfs_attr_node_hasname (git-fixes).\n- xfs: check sb_meta_uuid for dabuf buffer recovery (git-fixes).\n- xfs: fix soft lockup via spinning in filestream ag selection loop (git-fixes).\n- xfs: fix use-after-free in xattr node block inactivation (git-fixes).\n- xfs: fold perag loop iteration logic into helper function (git-fixes).\n- xfs: make xfs_rtalloc_query_range input parameters const (git-fixes).\n- xfs: only bother with sync_filesystem during readonly remount (git-fixes).\n- xfs: prevent UAF in xfs_log_item_in_current_chkpt (git-fixes).\n- xfs: prevent a UAF when log IO errors race with unmount (git-fixes).\n- xfs: remove incorrect ASSERT in xfs_rename (git-fixes).\n- xfs: rename the next_agno perag iteration variable (git-fixes).\n- xfs: reorder iunlink remove operation in xfs_ifree (git-fixes).\n- xfs: revert \u0027xfs: actually bump warning counts when we send warnings\u0027 (git-fixes).\n- xfs: terminate perag iteration reliably on agcount (git-fixes).\n- xfs: use invalidate_lock to check the state of mmap_lock (git-fixes).\n- xfs: use kmem_cache_free() for kmem_cache objects (git-fixes).\n- xfs: use setattr_copy to set vfs inode attributes (git-fixes).\n",
        "title": "Description of the patch"
      },
      {
        "category": "details",
        "text": "SUSE-2022-3288,SUSE-SLE-Module-Public-Cloud-15-SP4-2022-3288,openSUSE-SLE-15.4-2022-3288",
        "title": "Patchnames"
      },
      {
        "category": "legal_disclaimer",
        "text": "CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).",
        "title": "Terms of use"
      }
    ],
    "publisher": {
      "category": "vendor",
      "contact_details": "https://www.suse.com/support/security/contact/",
      "name": "SUSE Product Security Team",
      "namespace": "https://www.suse.com/"
    },
    "references": [
      {
        "category": "external",
        "summary": "SUSE ratings",
        "url": "https://www.suse.com/support/security/rating/"
      },
      {
        "category": "self",
        "summary": "URL of this CSAF notice",
        "url": "https://ftp.suse.com/pub/projects/security/csaf/suse-su-2022_3288-1.json"
      },
      {
        "category": "self",
        "summary": "URL for SUSE-SU-2022:3288-1",
        "url": "https://www.suse.com/support/update/announcement/2022/suse-su-20223288-1/"
      },
      {
        "category": "self",
        "summary": "E-Mail link for SUSE-SU-2022:3288-1",
        "url": "https://lists.suse.com/pipermail/sle-security-updates/2022-September/012270.html"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1023051",
        "url": "https://bugzilla.suse.com/1023051"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1032323",
        "url": "https://bugzilla.suse.com/1032323"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1065729",
        "url": "https://bugzilla.suse.com/1065729"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1156395",
        "url": "https://bugzilla.suse.com/1156395"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1189999",
        "url": "https://bugzilla.suse.com/1189999"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1190497",
        "url": "https://bugzilla.suse.com/1190497"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1192968",
        "url": "https://bugzilla.suse.com/1192968"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1194592",
        "url": "https://bugzilla.suse.com/1194592"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1194869",
        "url": "https://bugzilla.suse.com/1194869"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1194904",
        "url": "https://bugzilla.suse.com/1194904"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1195480",
        "url": "https://bugzilla.suse.com/1195480"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1195917",
        "url": "https://bugzilla.suse.com/1195917"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1196616",
        "url": "https://bugzilla.suse.com/1196616"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1197158",
        "url": "https://bugzilla.suse.com/1197158"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1197391",
        "url": "https://bugzilla.suse.com/1197391"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1197755",
        "url": "https://bugzilla.suse.com/1197755"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1197756",
        "url": "https://bugzilla.suse.com/1197756"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1197757",
        "url": "https://bugzilla.suse.com/1197757"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1197763",
        "url": "https://bugzilla.suse.com/1197763"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1198410",
        "url": "https://bugzilla.suse.com/1198410"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1198577",
        "url": "https://bugzilla.suse.com/1198577"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1198702",
        "url": "https://bugzilla.suse.com/1198702"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1198971",
        "url": "https://bugzilla.suse.com/1198971"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1199356",
        "url": "https://bugzilla.suse.com/1199356"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1199515",
        "url": "https://bugzilla.suse.com/1199515"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1200301",
        "url": "https://bugzilla.suse.com/1200301"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1200313",
        "url": "https://bugzilla.suse.com/1200313"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1200431",
        "url": "https://bugzilla.suse.com/1200431"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1200544",
        "url": "https://bugzilla.suse.com/1200544"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1200845",
        "url": "https://bugzilla.suse.com/1200845"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1200868",
        "url": "https://bugzilla.suse.com/1200868"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1200869",
        "url": "https://bugzilla.suse.com/1200869"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1200870",
        "url": "https://bugzilla.suse.com/1200870"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1200871",
        "url": "https://bugzilla.suse.com/1200871"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1200872",
        "url": "https://bugzilla.suse.com/1200872"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1200873",
        "url": "https://bugzilla.suse.com/1200873"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1201019",
        "url": "https://bugzilla.suse.com/1201019"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1201308",
        "url": "https://bugzilla.suse.com/1201308"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1201361",
        "url": "https://bugzilla.suse.com/1201361"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1201442",
        "url": "https://bugzilla.suse.com/1201442"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1201455",
        "url": "https://bugzilla.suse.com/1201455"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1201489",
        "url": "https://bugzilla.suse.com/1201489"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1201610",
        "url": "https://bugzilla.suse.com/1201610"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1201726",
        "url": "https://bugzilla.suse.com/1201726"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1201768",
        "url": "https://bugzilla.suse.com/1201768"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1201865",
        "url": "https://bugzilla.suse.com/1201865"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1201940",
        "url": "https://bugzilla.suse.com/1201940"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1201948",
        "url": "https://bugzilla.suse.com/1201948"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1201956",
        "url": "https://bugzilla.suse.com/1201956"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1202094",
        "url": "https://bugzilla.suse.com/1202094"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1202096",
        "url": "https://bugzilla.suse.com/1202096"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1202097",
        "url": "https://bugzilla.suse.com/1202097"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1202113",
        "url": "https://bugzilla.suse.com/1202113"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1202131",
        "url": "https://bugzilla.suse.com/1202131"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1202154",
        "url": "https://bugzilla.suse.com/1202154"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1202262",
        "url": "https://bugzilla.suse.com/1202262"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1202265",
        "url": "https://bugzilla.suse.com/1202265"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1202346",
        "url": "https://bugzilla.suse.com/1202346"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1202347",
        "url": "https://bugzilla.suse.com/1202347"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1202385",
        "url": "https://bugzilla.suse.com/1202385"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1202393",
        "url": "https://bugzilla.suse.com/1202393"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1202447",
        "url": "https://bugzilla.suse.com/1202447"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1202471",
        "url": "https://bugzilla.suse.com/1202471"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1202558",
        "url": "https://bugzilla.suse.com/1202558"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1202564",
        "url": "https://bugzilla.suse.com/1202564"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1202623",
        "url": "https://bugzilla.suse.com/1202623"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1202636",
        "url": "https://bugzilla.suse.com/1202636"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1202672",
        "url": "https://bugzilla.suse.com/1202672"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1202681",
        "url": "https://bugzilla.suse.com/1202681"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1202710",
        "url": "https://bugzilla.suse.com/1202710"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1202711",
        "url": "https://bugzilla.suse.com/1202711"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1202712",
        "url": "https://bugzilla.suse.com/1202712"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1202713",
        "url": "https://bugzilla.suse.com/1202713"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1202715",
        "url": "https://bugzilla.suse.com/1202715"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1202716",
        "url": "https://bugzilla.suse.com/1202716"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1202757",
        "url": "https://bugzilla.suse.com/1202757"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1202758",
        "url": "https://bugzilla.suse.com/1202758"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1202759",
        "url": "https://bugzilla.suse.com/1202759"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1202761",
        "url": "https://bugzilla.suse.com/1202761"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1202762",
        "url": "https://bugzilla.suse.com/1202762"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1202763",
        "url": "https://bugzilla.suse.com/1202763"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1202764",
        "url": "https://bugzilla.suse.com/1202764"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1202765",
        "url": "https://bugzilla.suse.com/1202765"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1202766",
        "url": "https://bugzilla.suse.com/1202766"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1202767",
        "url": "https://bugzilla.suse.com/1202767"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1202768",
        "url": "https://bugzilla.suse.com/1202768"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1202769",
        "url": "https://bugzilla.suse.com/1202769"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1202770",
        "url": "https://bugzilla.suse.com/1202770"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1202771",
        "url": "https://bugzilla.suse.com/1202771"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1202773",
        "url": "https://bugzilla.suse.com/1202773"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1202774",
        "url": "https://bugzilla.suse.com/1202774"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1202775",
        "url": "https://bugzilla.suse.com/1202775"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1202776",
        "url": "https://bugzilla.suse.com/1202776"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1202778",
        "url": "https://bugzilla.suse.com/1202778"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1202779",
        "url": "https://bugzilla.suse.com/1202779"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1202780",
        "url": "https://bugzilla.suse.com/1202780"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1202781",
        "url": "https://bugzilla.suse.com/1202781"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1202782",
        "url": "https://bugzilla.suse.com/1202782"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1202783",
        "url": "https://bugzilla.suse.com/1202783"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1202822",
        "url": "https://bugzilla.suse.com/1202822"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1202823",
        "url": "https://bugzilla.suse.com/1202823"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1202824",
        "url": "https://bugzilla.suse.com/1202824"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1202860",
        "url": "https://bugzilla.suse.com/1202860"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1202867",
        "url": "https://bugzilla.suse.com/1202867"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1202872",
        "url": "https://bugzilla.suse.com/1202872"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1202898",
        "url": "https://bugzilla.suse.com/1202898"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1202989",
        "url": "https://bugzilla.suse.com/1202989"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1203036",
        "url": "https://bugzilla.suse.com/1203036"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1203041",
        "url": "https://bugzilla.suse.com/1203041"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1203063",
        "url": "https://bugzilla.suse.com/1203063"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1203098",
        "url": "https://bugzilla.suse.com/1203098"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1203107",
        "url": "https://bugzilla.suse.com/1203107"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1203117",
        "url": "https://bugzilla.suse.com/1203117"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1203138",
        "url": "https://bugzilla.suse.com/1203138"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1203139",
        "url": "https://bugzilla.suse.com/1203139"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1203159",
        "url": "https://bugzilla.suse.com/1203159"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2016-3695 page",
        "url": "https://www.suse.com/security/cve/CVE-2016-3695/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2020-36516 page",
        "url": "https://www.suse.com/security/cve/CVE-2020-36516/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2021-33135 page",
        "url": "https://www.suse.com/security/cve/CVE-2021-33135/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2021-4037 page",
        "url": "https://www.suse.com/security/cve/CVE-2021-4037/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2022-1184 page",
        "url": "https://www.suse.com/security/cve/CVE-2022-1184/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2022-20368 page",
        "url": "https://www.suse.com/security/cve/CVE-2022-20368/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2022-20369 page",
        "url": "https://www.suse.com/security/cve/CVE-2022-20369/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2022-2585 page",
        "url": "https://www.suse.com/security/cve/CVE-2022-2585/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2022-2588 page",
        "url": "https://www.suse.com/security/cve/CVE-2022-2588/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2022-26373 page",
        "url": "https://www.suse.com/security/cve/CVE-2022-26373/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2022-2639 page",
        "url": "https://www.suse.com/security/cve/CVE-2022-2639/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2022-2663 page",
        "url": "https://www.suse.com/security/cve/CVE-2022-2663/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2022-28356 page",
        "url": "https://www.suse.com/security/cve/CVE-2022-28356/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2022-28693 page",
        "url": "https://www.suse.com/security/cve/CVE-2022-28693/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2022-2873 page",
        "url": "https://www.suse.com/security/cve/CVE-2022-2873/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2022-2905 page",
        "url": "https://www.suse.com/security/cve/CVE-2022-2905/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2022-2938 page",
        "url": "https://www.suse.com/security/cve/CVE-2022-2938/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2022-2959 page",
        "url": "https://www.suse.com/security/cve/CVE-2022-2959/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2022-2977 page",
        "url": "https://www.suse.com/security/cve/CVE-2022-2977/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2022-3028 page",
        "url": "https://www.suse.com/security/cve/CVE-2022-3028/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2022-3078 page",
        "url": "https://www.suse.com/security/cve/CVE-2022-3078/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2022-36879 page",
        "url": "https://www.suse.com/security/cve/CVE-2022-36879/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2022-36946 page",
        "url": "https://www.suse.com/security/cve/CVE-2022-36946/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2022-39188 page",
        "url": "https://www.suse.com/security/cve/CVE-2022-39188/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2022-39190 page",
        "url": "https://www.suse.com/security/cve/CVE-2022-39190/"
      }
    ],
    "title": "Security update for the Linux Kernel",
    "tracking": {
      "current_release_date": "2022-09-16T08:38:48Z",
      "generator": {
        "date": "2022-09-16T08:38:48Z",
        "engine": {
          "name": "cve-database.git:bin/generate-csaf.pl",
          "version": "1"
        }
      },
      "id": "SUSE-SU-2022:3288-1",
      "initial_release_date": "2022-09-16T08:38:48Z",
      "revision_history": [
        {
          "date": "2022-09-16T08:38:48Z",
          "number": "1",
          "summary": "Current version"
        }
      ],
      "status": "final",
      "version": "1"
    }
  },
  "product_tree": {
    "branches": [
      {
        "branches": [
          {
            "branches": [
              {
                "category": "product_version",
                "name": "cluster-md-kmp-azure-5.14.21-150400.14.13.1.aarch64",
                "product": {
                  "name": "cluster-md-kmp-azure-5.14.21-150400.14.13.1.aarch64",
                  "product_id": "cluster-md-kmp-azure-5.14.21-150400.14.13.1.aarch64"
                }
              },
              {
                "category": "product_version",
                "name": "dlm-kmp-azure-5.14.21-150400.14.13.1.aarch64",
                "product": {
                  "name": "dlm-kmp-azure-5.14.21-150400.14.13.1.aarch64",
                  "product_id": "dlm-kmp-azure-5.14.21-150400.14.13.1.aarch64"
                }
              },
              {
                "category": "product_version",
                "name": "gfs2-kmp-azure-5.14.21-150400.14.13.1.aarch64",
                "product": {
                  "name": "gfs2-kmp-azure-5.14.21-150400.14.13.1.aarch64",
                  "product_id": "gfs2-kmp-azure-5.14.21-150400.14.13.1.aarch64"
                }
              },
              {
                "category": "product_version",
                "name": "kernel-azure-5.14.21-150400.14.13.1.aarch64",
                "product": {
                  "name": "kernel-azure-5.14.21-150400.14.13.1.aarch64",
                  "product_id": "kernel-azure-5.14.21-150400.14.13.1.aarch64"
                }
              },
              {
                "category": "product_version",
                "name": "kernel-azure-devel-5.14.21-150400.14.13.1.aarch64",
                "product": {
                  "name": "kernel-azure-devel-5.14.21-150400.14.13.1.aarch64",
                  "product_id": "kernel-azure-devel-5.14.21-150400.14.13.1.aarch64"
                }
              },
              {
                "category": "product_version",
                "name": "kernel-azure-extra-5.14.21-150400.14.13.1.aarch64",
                "product": {
                  "name": "kernel-azure-extra-5.14.21-150400.14.13.1.aarch64",
                  "product_id": "kernel-azure-extra-5.14.21-150400.14.13.1.aarch64"
                }
              },
              {
                "category": "product_version",
                "name": "kernel-azure-livepatch-devel-5.14.21-150400.14.13.1.aarch64",
                "product": {
                  "name": "kernel-azure-livepatch-devel-5.14.21-150400.14.13.1.aarch64",
                  "product_id": "kernel-azure-livepatch-devel-5.14.21-150400.14.13.1.aarch64"
                }
              },
              {
                "category": "product_version",
                "name": "kernel-azure-optional-5.14.21-150400.14.13.1.aarch64",
                "product": {
                  "name": "kernel-azure-optional-5.14.21-150400.14.13.1.aarch64",
                  "product_id": "kernel-azure-optional-5.14.21-150400.14.13.1.aarch64"
                }
              },
              {
                "category": "product_version",
                "name": "kernel-syms-azure-5.14.21-150400.14.13.1.aarch64",
                "product": {
                  "name": "kernel-syms-azure-5.14.21-150400.14.13.1.aarch64",
                  "product_id": "kernel-syms-azure-5.14.21-150400.14.13.1.aarch64"
                }
              },
              {
                "category": "product_version",
                "name": "kselftests-kmp-azure-5.14.21-150400.14.13.1.aarch64",
                "product": {
                  "name": "kselftests-kmp-azure-5.14.21-150400.14.13.1.aarch64",
                  "product_id": "kselftests-kmp-azure-5.14.21-150400.14.13.1.aarch64"
                }
              },
              {
                "category": "product_version",
                "name": "ocfs2-kmp-azure-5.14.21-150400.14.13.1.aarch64",
                "product": {
                  "name": "ocfs2-kmp-azure-5.14.21-150400.14.13.1.aarch64",
                  "product_id": "ocfs2-kmp-azure-5.14.21-150400.14.13.1.aarch64"
                }
              },
              {
                "category": "product_version",
                "name": "reiserfs-kmp-azure-5.14.21-150400.14.13.1.aarch64",
                "product": {
                  "name": "reiserfs-kmp-azure-5.14.21-150400.14.13.1.aarch64",
                  "product_id": "reiserfs-kmp-azure-5.14.21-150400.14.13.1.aarch64"
                }
              }
            ],
            "category": "architecture",
            "name": "aarch64"
          },
          {
            "branches": [
              {
                "category": "product_version",
                "name": "kernel-devel-azure-5.14.21-150400.14.13.1.noarch",
                "product": {
                  "name": "kernel-devel-azure-5.14.21-150400.14.13.1.noarch",
                  "product_id": "kernel-devel-azure-5.14.21-150400.14.13.1.noarch"
                }
              },
              {
                "category": "product_version",
                "name": "kernel-source-azure-5.14.21-150400.14.13.1.noarch",
                "product": {
                  "name": "kernel-source-azure-5.14.21-150400.14.13.1.noarch",
                  "product_id": "kernel-source-azure-5.14.21-150400.14.13.1.noarch"
                }
              }
            ],
            "category": "architecture",
            "name": "noarch"
          },
          {
            "branches": [
              {
                "category": "product_version",
                "name": "cluster-md-kmp-azure-5.14.21-150400.14.13.1.x86_64",
                "product": {
                  "name": "cluster-md-kmp-azure-5.14.21-150400.14.13.1.x86_64",
                  "product_id": "cluster-md-kmp-azure-5.14.21-150400.14.13.1.x86_64"
                }
              },
              {
                "category": "product_version",
                "name": "dlm-kmp-azure-5.14.21-150400.14.13.1.x86_64",
                "product": {
                  "name": "dlm-kmp-azure-5.14.21-150400.14.13.1.x86_64",
                  "product_id": "dlm-kmp-azure-5.14.21-150400.14.13.1.x86_64"
                }
              },
              {
                "category": "product_version",
                "name": "gfs2-kmp-azure-5.14.21-150400.14.13.1.x86_64",
                "product": {
                  "name": "gfs2-kmp-azure-5.14.21-150400.14.13.1.x86_64",
                  "product_id": "gfs2-kmp-azure-5.14.21-150400.14.13.1.x86_64"
                }
              },
              {
                "category": "product_version",
                "name": "kernel-azure-5.14.21-150400.14.13.1.x86_64",
                "product": {
                  "name": "kernel-azure-5.14.21-150400.14.13.1.x86_64",
                  "product_id": "kernel-azure-5.14.21-150400.14.13.1.x86_64"
                }
              },
              {
                "category": "product_version",
                "name": "kernel-azure-devel-5.14.21-150400.14.13.1.x86_64",
                "product": {
                  "name": "kernel-azure-devel-5.14.21-150400.14.13.1.x86_64",
                  "product_id": "kernel-azure-devel-5.14.21-150400.14.13.1.x86_64"
                }
              },
              {
                "category": "product_version",
                "name": "kernel-azure-extra-5.14.21-150400.14.13.1.x86_64",
                "product": {
                  "name": "kernel-azure-extra-5.14.21-150400.14.13.1.x86_64",
                  "product_id": "kernel-azure-extra-5.14.21-150400.14.13.1.x86_64"
                }
              },
              {
                "category": "product_version",
                "name": "kernel-azure-livepatch-devel-5.14.21-150400.14.13.1.x86_64",
                "product": {
                  "name": "kernel-azure-livepatch-devel-5.14.21-150400.14.13.1.x86_64",
                  "product_id": "kernel-azure-livepatch-devel-5.14.21-150400.14.13.1.x86_64"
                }
              },
              {
                "category": "product_version",
                "name": "kernel-azure-optional-5.14.21-150400.14.13.1.x86_64",
                "product": {
                  "name": "kernel-azure-optional-5.14.21-150400.14.13.1.x86_64",
                  "product_id": "kernel-azure-optional-5.14.21-150400.14.13.1.x86_64"
                }
              },
              {
                "category": "product_version",
                "name": "kernel-syms-azure-5.14.21-150400.14.13.1.x86_64",
                "product": {
                  "name": "kernel-syms-azure-5.14.21-150400.14.13.1.x86_64",
                  "product_id": "kernel-syms-azure-5.14.21-150400.14.13.1.x86_64"
                }
              },
              {
                "category": "product_version",
                "name": "kselftests-kmp-azure-5.14.21-150400.14.13.1.x86_64",
                "product": {
                  "name": "kselftests-kmp-azure-5.14.21-150400.14.13.1.x86_64",
                  "product_id": "kselftests-kmp-azure-5.14.21-150400.14.13.1.x86_64"
                }
              },
              {
                "category": "product_version",
                "name": "ocfs2-kmp-azure-5.14.21-150400.14.13.1.x86_64",
                "product": {
                  "name": "ocfs2-kmp-azure-5.14.21-150400.14.13.1.x86_64",
                  "product_id": "ocfs2-kmp-azure-5.14.21-150400.14.13.1.x86_64"
                }
              },
              {
                "category": "product_version",
                "name": "reiserfs-kmp-azure-5.14.21-150400.14.13.1.x86_64",
                "product": {
                  "name": "reiserfs-kmp-azure-5.14.21-150400.14.13.1.x86_64",
                  "product_id": "reiserfs-kmp-azure-5.14.21-150400.14.13.1.x86_64"
                }
              }
            ],
            "category": "architecture",
            "name": "x86_64"
          },
          {
            "branches": [
              {
                "category": "product_name",
                "name": "SUSE Linux Enterprise Module for Public Cloud 15 SP4",
                "product": {
                  "name": "SUSE Linux Enterprise Module for Public Cloud 15 SP4",
                  "product_id": "SUSE Linux Enterprise Module for Public Cloud 15 SP4",
                  "product_identification_helper": {
                    "cpe": "cpe:/o:suse:sle-module-public-cloud:15:sp4"
                  }
                }
              },
              {
                "category": "product_name",
                "name": "openSUSE Leap 15.4",
                "product": {
                  "name": "openSUSE Leap 15.4",
                  "product_id": "openSUSE Leap 15.4",
                  "product_identification_helper": {
                    "cpe": "cpe:/o:opensuse:leap:15.4"
                  }
                }
              }
            ],
            "category": "product_family",
            "name": "SUSE Linux Enterprise"
          }
        ],
        "category": "vendor",
        "name": "SUSE"
      }
    ],
    "relationships": [
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-azure-5.14.21-150400.14.13.1.aarch64 as component of SUSE Linux Enterprise Module for Public Cloud 15 SP4",
          "product_id": "SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-azure-5.14.21-150400.14.13.1.aarch64"
        },
        "product_reference": "kernel-azure-5.14.21-150400.14.13.1.aarch64",
        "relates_to_product_reference": "SUSE Linux Enterprise Module for Public Cloud 15 SP4"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-azure-5.14.21-150400.14.13.1.x86_64 as component of SUSE Linux Enterprise Module for Public Cloud 15 SP4",
          "product_id": "SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-azure-5.14.21-150400.14.13.1.x86_64"
        },
        "product_reference": "kernel-azure-5.14.21-150400.14.13.1.x86_64",
        "relates_to_product_reference": "SUSE Linux Enterprise Module for Public Cloud 15 SP4"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-azure-devel-5.14.21-150400.14.13.1.aarch64 as component of SUSE Linux Enterprise Module for Public Cloud 15 SP4",
          "product_id": "SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-azure-devel-5.14.21-150400.14.13.1.aarch64"
        },
        "product_reference": "kernel-azure-devel-5.14.21-150400.14.13.1.aarch64",
        "relates_to_product_reference": "SUSE Linux Enterprise Module for Public Cloud 15 SP4"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-azure-devel-5.14.21-150400.14.13.1.x86_64 as component of SUSE Linux Enterprise Module for Public Cloud 15 SP4",
          "product_id": "SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-azure-devel-5.14.21-150400.14.13.1.x86_64"
        },
        "product_reference": "kernel-azure-devel-5.14.21-150400.14.13.1.x86_64",
        "relates_to_product_reference": "SUSE Linux Enterprise Module for Public Cloud 15 SP4"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-devel-azure-5.14.21-150400.14.13.1.noarch as component of SUSE Linux Enterprise Module for Public Cloud 15 SP4",
          "product_id": "SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-devel-azure-5.14.21-150400.14.13.1.noarch"
        },
        "product_reference": "kernel-devel-azure-5.14.21-150400.14.13.1.noarch",
        "relates_to_product_reference": "SUSE Linux Enterprise Module for Public Cloud 15 SP4"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-source-azure-5.14.21-150400.14.13.1.noarch as component of SUSE Linux Enterprise Module for Public Cloud 15 SP4",
          "product_id": "SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-source-azure-5.14.21-150400.14.13.1.noarch"
        },
        "product_reference": "kernel-source-azure-5.14.21-150400.14.13.1.noarch",
        "relates_to_product_reference": "SUSE Linux Enterprise Module for Public Cloud 15 SP4"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-syms-azure-5.14.21-150400.14.13.1.aarch64 as component of SUSE Linux Enterprise Module for Public Cloud 15 SP4",
          "product_id": "SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-syms-azure-5.14.21-150400.14.13.1.aarch64"
        },
        "product_reference": "kernel-syms-azure-5.14.21-150400.14.13.1.aarch64",
        "relates_to_product_reference": "SUSE Linux Enterprise Module for Public Cloud 15 SP4"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-syms-azure-5.14.21-150400.14.13.1.x86_64 as component of SUSE Linux Enterprise Module for Public Cloud 15 SP4",
          "product_id": "SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-syms-azure-5.14.21-150400.14.13.1.x86_64"
        },
        "product_reference": "kernel-syms-azure-5.14.21-150400.14.13.1.x86_64",
        "relates_to_product_reference": "SUSE Linux Enterprise Module for Public Cloud 15 SP4"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "cluster-md-kmp-azure-5.14.21-150400.14.13.1.aarch64 as component of openSUSE Leap 15.4",
          "product_id": "openSUSE Leap 15.4:cluster-md-kmp-azure-5.14.21-150400.14.13.1.aarch64"
        },
        "product_reference": "cluster-md-kmp-azure-5.14.21-150400.14.13.1.aarch64",
        "relates_to_product_reference": "openSUSE Leap 15.4"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "cluster-md-kmp-azure-5.14.21-150400.14.13.1.x86_64 as component of openSUSE Leap 15.4",
          "product_id": "openSUSE Leap 15.4:cluster-md-kmp-azure-5.14.21-150400.14.13.1.x86_64"
        },
        "product_reference": "cluster-md-kmp-azure-5.14.21-150400.14.13.1.x86_64",
        "relates_to_product_reference": "openSUSE Leap 15.4"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "dlm-kmp-azure-5.14.21-150400.14.13.1.aarch64 as component of openSUSE Leap 15.4",
          "product_id": "openSUSE Leap 15.4:dlm-kmp-azure-5.14.21-150400.14.13.1.aarch64"
        },
        "product_reference": "dlm-kmp-azure-5.14.21-150400.14.13.1.aarch64",
        "relates_to_product_reference": "openSUSE Leap 15.4"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "dlm-kmp-azure-5.14.21-150400.14.13.1.x86_64 as component of openSUSE Leap 15.4",
          "product_id": "openSUSE Leap 15.4:dlm-kmp-azure-5.14.21-150400.14.13.1.x86_64"
        },
        "product_reference": "dlm-kmp-azure-5.14.21-150400.14.13.1.x86_64",
        "relates_to_product_reference": "openSUSE Leap 15.4"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "gfs2-kmp-azure-5.14.21-150400.14.13.1.aarch64 as component of openSUSE Leap 15.4",
          "product_id": "openSUSE Leap 15.4:gfs2-kmp-azure-5.14.21-150400.14.13.1.aarch64"
        },
        "product_reference": "gfs2-kmp-azure-5.14.21-150400.14.13.1.aarch64",
        "relates_to_product_reference": "openSUSE Leap 15.4"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "gfs2-kmp-azure-5.14.21-150400.14.13.1.x86_64 as component of openSUSE Leap 15.4",
          "product_id": "openSUSE Leap 15.4:gfs2-kmp-azure-5.14.21-150400.14.13.1.x86_64"
        },
        "product_reference": "gfs2-kmp-azure-5.14.21-150400.14.13.1.x86_64",
        "relates_to_product_reference": "openSUSE Leap 15.4"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-azure-5.14.21-150400.14.13.1.aarch64 as component of openSUSE Leap 15.4",
          "product_id": "openSUSE Leap 15.4:kernel-azure-5.14.21-150400.14.13.1.aarch64"
        },
        "product_reference": "kernel-azure-5.14.21-150400.14.13.1.aarch64",
        "relates_to_product_reference": "openSUSE Leap 15.4"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-azure-5.14.21-150400.14.13.1.x86_64 as component of openSUSE Leap 15.4",
          "product_id": "openSUSE Leap 15.4:kernel-azure-5.14.21-150400.14.13.1.x86_64"
        },
        "product_reference": "kernel-azure-5.14.21-150400.14.13.1.x86_64",
        "relates_to_product_reference": "openSUSE Leap 15.4"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-azure-devel-5.14.21-150400.14.13.1.aarch64 as component of openSUSE Leap 15.4",
          "product_id": "openSUSE Leap 15.4:kernel-azure-devel-5.14.21-150400.14.13.1.aarch64"
        },
        "product_reference": "kernel-azure-devel-5.14.21-150400.14.13.1.aarch64",
        "relates_to_product_reference": "openSUSE Leap 15.4"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-azure-devel-5.14.21-150400.14.13.1.x86_64 as component of openSUSE Leap 15.4",
          "product_id": "openSUSE Leap 15.4:kernel-azure-devel-5.14.21-150400.14.13.1.x86_64"
        },
        "product_reference": "kernel-azure-devel-5.14.21-150400.14.13.1.x86_64",
        "relates_to_product_reference": "openSUSE Leap 15.4"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-azure-extra-5.14.21-150400.14.13.1.aarch64 as component of openSUSE Leap 15.4",
          "product_id": "openSUSE Leap 15.4:kernel-azure-extra-5.14.21-150400.14.13.1.aarch64"
        },
        "product_reference": "kernel-azure-extra-5.14.21-150400.14.13.1.aarch64",
        "relates_to_product_reference": "openSUSE Leap 15.4"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-azure-extra-5.14.21-150400.14.13.1.x86_64 as component of openSUSE Leap 15.4",
          "product_id": "openSUSE Leap 15.4:kernel-azure-extra-5.14.21-150400.14.13.1.x86_64"
        },
        "product_reference": "kernel-azure-extra-5.14.21-150400.14.13.1.x86_64",
        "relates_to_product_reference": "openSUSE Leap 15.4"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-azure-livepatch-devel-5.14.21-150400.14.13.1.aarch64 as component of openSUSE Leap 15.4",
          "product_id": "openSUSE Leap 15.4:kernel-azure-livepatch-devel-5.14.21-150400.14.13.1.aarch64"
        },
        "product_reference": "kernel-azure-livepatch-devel-5.14.21-150400.14.13.1.aarch64",
        "relates_to_product_reference": "openSUSE Leap 15.4"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-azure-livepatch-devel-5.14.21-150400.14.13.1.x86_64 as component of openSUSE Leap 15.4",
          "product_id": "openSUSE Leap 15.4:kernel-azure-livepatch-devel-5.14.21-150400.14.13.1.x86_64"
        },
        "product_reference": "kernel-azure-livepatch-devel-5.14.21-150400.14.13.1.x86_64",
        "relates_to_product_reference": "openSUSE Leap 15.4"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-azure-optional-5.14.21-150400.14.13.1.aarch64 as component of openSUSE Leap 15.4",
          "product_id": "openSUSE Leap 15.4:kernel-azure-optional-5.14.21-150400.14.13.1.aarch64"
        },
        "product_reference": "kernel-azure-optional-5.14.21-150400.14.13.1.aarch64",
        "relates_to_product_reference": "openSUSE Leap 15.4"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-azure-optional-5.14.21-150400.14.13.1.x86_64 as component of openSUSE Leap 15.4",
          "product_id": "openSUSE Leap 15.4:kernel-azure-optional-5.14.21-150400.14.13.1.x86_64"
        },
        "product_reference": "kernel-azure-optional-5.14.21-150400.14.13.1.x86_64",
        "relates_to_product_reference": "openSUSE Leap 15.4"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-devel-azure-5.14.21-150400.14.13.1.noarch as component of openSUSE Leap 15.4",
          "product_id": "openSUSE Leap 15.4:kernel-devel-azure-5.14.21-150400.14.13.1.noarch"
        },
        "product_reference": "kernel-devel-azure-5.14.21-150400.14.13.1.noarch",
        "relates_to_product_reference": "openSUSE Leap 15.4"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-source-azure-5.14.21-150400.14.13.1.noarch as component of openSUSE Leap 15.4",
          "product_id": "openSUSE Leap 15.4:kernel-source-azure-5.14.21-150400.14.13.1.noarch"
        },
        "product_reference": "kernel-source-azure-5.14.21-150400.14.13.1.noarch",
        "relates_to_product_reference": "openSUSE Leap 15.4"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-syms-azure-5.14.21-150400.14.13.1.aarch64 as component of openSUSE Leap 15.4",
          "product_id": "openSUSE Leap 15.4:kernel-syms-azure-5.14.21-150400.14.13.1.aarch64"
        },
        "product_reference": "kernel-syms-azure-5.14.21-150400.14.13.1.aarch64",
        "relates_to_product_reference": "openSUSE Leap 15.4"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-syms-azure-5.14.21-150400.14.13.1.x86_64 as component of openSUSE Leap 15.4",
          "product_id": "openSUSE Leap 15.4:kernel-syms-azure-5.14.21-150400.14.13.1.x86_64"
        },
        "product_reference": "kernel-syms-azure-5.14.21-150400.14.13.1.x86_64",
        "relates_to_product_reference": "openSUSE Leap 15.4"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kselftests-kmp-azure-5.14.21-150400.14.13.1.aarch64 as component of openSUSE Leap 15.4",
          "product_id": "openSUSE Leap 15.4:kselftests-kmp-azure-5.14.21-150400.14.13.1.aarch64"
        },
        "product_reference": "kselftests-kmp-azure-5.14.21-150400.14.13.1.aarch64",
        "relates_to_product_reference": "openSUSE Leap 15.4"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kselftests-kmp-azure-5.14.21-150400.14.13.1.x86_64 as component of openSUSE Leap 15.4",
          "product_id": "openSUSE Leap 15.4:kselftests-kmp-azure-5.14.21-150400.14.13.1.x86_64"
        },
        "product_reference": "kselftests-kmp-azure-5.14.21-150400.14.13.1.x86_64",
        "relates_to_product_reference": "openSUSE Leap 15.4"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "ocfs2-kmp-azure-5.14.21-150400.14.13.1.aarch64 as component of openSUSE Leap 15.4",
          "product_id": "openSUSE Leap 15.4:ocfs2-kmp-azure-5.14.21-150400.14.13.1.aarch64"
        },
        "product_reference": "ocfs2-kmp-azure-5.14.21-150400.14.13.1.aarch64",
        "relates_to_product_reference": "openSUSE Leap 15.4"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "ocfs2-kmp-azure-5.14.21-150400.14.13.1.x86_64 as component of openSUSE Leap 15.4",
          "product_id": "openSUSE Leap 15.4:ocfs2-kmp-azure-5.14.21-150400.14.13.1.x86_64"
        },
        "product_reference": "ocfs2-kmp-azure-5.14.21-150400.14.13.1.x86_64",
        "relates_to_product_reference": "openSUSE Leap 15.4"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "reiserfs-kmp-azure-5.14.21-150400.14.13.1.aarch64 as component of openSUSE Leap 15.4",
          "product_id": "openSUSE Leap 15.4:reiserfs-kmp-azure-5.14.21-150400.14.13.1.aarch64"
        },
        "product_reference": "reiserfs-kmp-azure-5.14.21-150400.14.13.1.aarch64",
        "relates_to_product_reference": "openSUSE Leap 15.4"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "reiserfs-kmp-azure-5.14.21-150400.14.13.1.x86_64 as component of openSUSE Leap 15.4",
          "product_id": "openSUSE Leap 15.4:reiserfs-kmp-azure-5.14.21-150400.14.13.1.x86_64"
        },
        "product_reference": "reiserfs-kmp-azure-5.14.21-150400.14.13.1.x86_64",
        "relates_to_product_reference": "openSUSE Leap 15.4"
      }
    ]
  },
  "vulnerabilities": [
    {
      "cve": "CVE-2016-3695",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2016-3695"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "The einj_error_inject function in drivers/acpi/apei/einj.c in the Linux kernel allows local users to simulate hardware errors and consequently cause a denial of service by leveraging failure to disable APEI error injection through EINJ when securelevel is set.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-azure-5.14.21-150400.14.13.1.aarch64",
          "SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-azure-5.14.21-150400.14.13.1.x86_64",
          "SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-azure-devel-5.14.21-150400.14.13.1.aarch64",
          "SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-azure-devel-5.14.21-150400.14.13.1.x86_64",
          "SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-devel-azure-5.14.21-150400.14.13.1.noarch",
          "SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-source-azure-5.14.21-150400.14.13.1.noarch",
          "SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-syms-azure-5.14.21-150400.14.13.1.aarch64",
          "SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-syms-azure-5.14.21-150400.14.13.1.x86_64",
          "openSUSE Leap 15.4:cluster-md-kmp-azure-5.14.21-150400.14.13.1.aarch64",
          "openSUSE Leap 15.4:cluster-md-kmp-azure-5.14.21-150400.14.13.1.x86_64",
          "openSUSE Leap 15.4:dlm-kmp-azure-5.14.21-150400.14.13.1.aarch64",
          "openSUSE Leap 15.4:dlm-kmp-azure-5.14.21-150400.14.13.1.x86_64",
          "openSUSE Leap 15.4:gfs2-kmp-azure-5.14.21-150400.14.13.1.aarch64",
          "openSUSE Leap 15.4:gfs2-kmp-azure-5.14.21-150400.14.13.1.x86_64",
          "openSUSE Leap 15.4:kernel-azure-5.14.21-150400.14.13.1.aarch64",
          "openSUSE Leap 15.4:kernel-azure-5.14.21-150400.14.13.1.x86_64",
          "openSUSE Leap 15.4:kernel-azure-devel-5.14.21-150400.14.13.1.aarch64",
          "openSUSE Leap 15.4:kernel-azure-devel-5.14.21-150400.14.13.1.x86_64",
          "openSUSE Leap 15.4:kernel-azure-extra-5.14.21-150400.14.13.1.aarch64",
          "openSUSE Leap 15.4:kernel-azure-extra-5.14.21-150400.14.13.1.x86_64",
          "openSUSE Leap 15.4:kernel-azure-livepatch-devel-5.14.21-150400.14.13.1.aarch64",
          "openSUSE Leap 15.4:kernel-azure-livepatch-devel-5.14.21-150400.14.13.1.x86_64",
          "openSUSE Leap 15.4:kernel-azure-optional-5.14.21-150400.14.13.1.aarch64",
          "openSUSE Leap 15.4:kernel-azure-optional-5.14.21-150400.14.13.1.x86_64",
          "openSUSE Leap 15.4:kernel-devel-azure-5.14.21-150400.14.13.1.noarch",
          "openSUSE Leap 15.4:kernel-source-azure-5.14.21-150400.14.13.1.noarch",
          "openSUSE Leap 15.4:kernel-syms-azure-5.14.21-150400.14.13.1.aarch64",
          "openSUSE Leap 15.4:kernel-syms-azure-5.14.21-150400.14.13.1.x86_64",
          "openSUSE Leap 15.4:kselftests-kmp-azure-5.14.21-150400.14.13.1.aarch64",
          "openSUSE Leap 15.4:kselftests-kmp-azure-5.14.21-150400.14.13.1.x86_64",
          "openSUSE Leap 15.4:ocfs2-kmp-azure-5.14.21-150400.14.13.1.aarch64",
          "openSUSE Leap 15.4:ocfs2-kmp-azure-5.14.21-150400.14.13.1.x86_64",
          "openSUSE Leap 15.4:reiserfs-kmp-azure-5.14.21-150400.14.13.1.aarch64",
          "openSUSE Leap 15.4:reiserfs-kmp-azure-5.14.21-150400.14.13.1.x86_64"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2016-3695",
          "url": "https://www.suse.com/security/cve/CVE-2016-3695"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1023051 for CVE-2016-3695",
          "url": "https://bugzilla.suse.com/1023051"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-azure-5.14.21-150400.14.13.1.aarch64",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-azure-5.14.21-150400.14.13.1.x86_64",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-azure-devel-5.14.21-150400.14.13.1.aarch64",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-azure-devel-5.14.21-150400.14.13.1.x86_64",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-devel-azure-5.14.21-150400.14.13.1.noarch",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-source-azure-5.14.21-150400.14.13.1.noarch",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-syms-azure-5.14.21-150400.14.13.1.aarch64",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-syms-azure-5.14.21-150400.14.13.1.x86_64",
            "openSUSE Leap 15.4:cluster-md-kmp-azure-5.14.21-150400.14.13.1.aarch64",
            "openSUSE Leap 15.4:cluster-md-kmp-azure-5.14.21-150400.14.13.1.x86_64",
            "openSUSE Leap 15.4:dlm-kmp-azure-5.14.21-150400.14.13.1.aarch64",
            "openSUSE Leap 15.4:dlm-kmp-azure-5.14.21-150400.14.13.1.x86_64",
            "openSUSE Leap 15.4:gfs2-kmp-azure-5.14.21-150400.14.13.1.aarch64",
            "openSUSE Leap 15.4:gfs2-kmp-azure-5.14.21-150400.14.13.1.x86_64",
            "openSUSE Leap 15.4:kernel-azure-5.14.21-150400.14.13.1.aarch64",
            "openSUSE Leap 15.4:kernel-azure-5.14.21-150400.14.13.1.x86_64",
            "openSUSE Leap 15.4:kernel-azure-devel-5.14.21-150400.14.13.1.aarch64",
            "openSUSE Leap 15.4:kernel-azure-devel-5.14.21-150400.14.13.1.x86_64",
            "openSUSE Leap 15.4:kernel-azure-extra-5.14.21-150400.14.13.1.aarch64",
            "openSUSE Leap 15.4:kernel-azure-extra-5.14.21-150400.14.13.1.x86_64",
            "openSUSE Leap 15.4:kernel-azure-livepatch-devel-5.14.21-150400.14.13.1.aarch64",
            "openSUSE Leap 15.4:kernel-azure-livepatch-devel-5.14.21-150400.14.13.1.x86_64",
            "openSUSE Leap 15.4:kernel-azure-optional-5.14.21-150400.14.13.1.aarch64",
            "openSUSE Leap 15.4:kernel-azure-optional-5.14.21-150400.14.13.1.x86_64",
            "openSUSE Leap 15.4:kernel-devel-azure-5.14.21-150400.14.13.1.noarch",
            "openSUSE Leap 15.4:kernel-source-azure-5.14.21-150400.14.13.1.noarch",
            "openSUSE Leap 15.4:kernel-syms-azure-5.14.21-150400.14.13.1.aarch64",
            "openSUSE Leap 15.4:kernel-syms-azure-5.14.21-150400.14.13.1.x86_64",
            "openSUSE Leap 15.4:kselftests-kmp-azure-5.14.21-150400.14.13.1.aarch64",
            "openSUSE Leap 15.4:kselftests-kmp-azure-5.14.21-150400.14.13.1.x86_64",
            "openSUSE Leap 15.4:ocfs2-kmp-azure-5.14.21-150400.14.13.1.aarch64",
            "openSUSE Leap 15.4:ocfs2-kmp-azure-5.14.21-150400.14.13.1.x86_64",
            "openSUSE Leap 15.4:reiserfs-kmp-azure-5.14.21-150400.14.13.1.aarch64",
            "openSUSE Leap 15.4:reiserfs-kmp-azure-5.14.21-150400.14.13.1.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 2.2,
            "baseSeverity": "LOW",
            "vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:R/S:U/C:N/I:N/A:L",
            "version": "3.1"
          },
          "products": [
            "SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-azure-5.14.21-150400.14.13.1.aarch64",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-azure-5.14.21-150400.14.13.1.x86_64",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-azure-devel-5.14.21-150400.14.13.1.aarch64",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-azure-devel-5.14.21-150400.14.13.1.x86_64",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-devel-azure-5.14.21-150400.14.13.1.noarch",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-source-azure-5.14.21-150400.14.13.1.noarch",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-syms-azure-5.14.21-150400.14.13.1.aarch64",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-syms-azure-5.14.21-150400.14.13.1.x86_64",
            "openSUSE Leap 15.4:cluster-md-kmp-azure-5.14.21-150400.14.13.1.aarch64",
            "openSUSE Leap 15.4:cluster-md-kmp-azure-5.14.21-150400.14.13.1.x86_64",
            "openSUSE Leap 15.4:dlm-kmp-azure-5.14.21-150400.14.13.1.aarch64",
            "openSUSE Leap 15.4:dlm-kmp-azure-5.14.21-150400.14.13.1.x86_64",
            "openSUSE Leap 15.4:gfs2-kmp-azure-5.14.21-150400.14.13.1.aarch64",
            "openSUSE Leap 15.4:gfs2-kmp-azure-5.14.21-150400.14.13.1.x86_64",
            "openSUSE Leap 15.4:kernel-azure-5.14.21-150400.14.13.1.aarch64",
            "openSUSE Leap 15.4:kernel-azure-5.14.21-150400.14.13.1.x86_64",
            "openSUSE Leap 15.4:kernel-azure-devel-5.14.21-150400.14.13.1.aarch64",
            "openSUSE Leap 15.4:kernel-azure-devel-5.14.21-150400.14.13.1.x86_64",
            "openSUSE Leap 15.4:kernel-azure-extra-5.14.21-150400.14.13.1.aarch64",
            "openSUSE Leap 15.4:kernel-azure-extra-5.14.21-150400.14.13.1.x86_64",
            "openSUSE Leap 15.4:kernel-azure-livepatch-devel-5.14.21-150400.14.13.1.aarch64",
            "openSUSE Leap 15.4:kernel-azure-livepatch-devel-5.14.21-150400.14.13.1.x86_64",
            "openSUSE Leap 15.4:kernel-azure-optional-5.14.21-150400.14.13.1.aarch64",
            "openSUSE Leap 15.4:kernel-azure-optional-5.14.21-150400.14.13.1.x86_64",
            "openSUSE Leap 15.4:kernel-devel-azure-5.14.21-150400.14.13.1.noarch",
            "openSUSE Leap 15.4:kernel-source-azure-5.14.21-150400.14.13.1.noarch",
            "openSUSE Leap 15.4:kernel-syms-azure-5.14.21-150400.14.13.1.aarch64",
            "openSUSE Leap 15.4:kernel-syms-azure-5.14.21-150400.14.13.1.x86_64",
            "openSUSE Leap 15.4:kselftests-kmp-azure-5.14.21-150400.14.13.1.aarch64",
            "openSUSE Leap 15.4:kselftests-kmp-azure-5.14.21-150400.14.13.1.x86_64",
            "openSUSE Leap 15.4:ocfs2-kmp-azure-5.14.21-150400.14.13.1.aarch64",
            "openSUSE Leap 15.4:ocfs2-kmp-azure-5.14.21-150400.14.13.1.x86_64",
            "openSUSE Leap 15.4:reiserfs-kmp-azure-5.14.21-150400.14.13.1.aarch64",
            "openSUSE Leap 15.4:reiserfs-kmp-azure-5.14.21-150400.14.13.1.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2022-09-16T08:38:48Z",
          "details": "low"
        }
      ],
      "title": "CVE-2016-3695"
    },
    {
      "cve": "CVE-2020-36516",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2020-36516"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "An issue was discovered in the Linux kernel through 5.16.11. The mixed IPID assignment method with the hash-based IPID assignment policy allows an off-path attacker to inject data into a victim\u0027s TCP session or terminate that session.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-azure-5.14.21-150400.14.13.1.aarch64",
          "SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-azure-5.14.21-150400.14.13.1.x86_64",
          "SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-azure-devel-5.14.21-150400.14.13.1.aarch64",
          "SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-azure-devel-5.14.21-150400.14.13.1.x86_64",
          "SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-devel-azure-5.14.21-150400.14.13.1.noarch",
          "SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-source-azure-5.14.21-150400.14.13.1.noarch",
          "SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-syms-azure-5.14.21-150400.14.13.1.aarch64",
          "SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-syms-azure-5.14.21-150400.14.13.1.x86_64",
          "openSUSE Leap 15.4:cluster-md-kmp-azure-5.14.21-150400.14.13.1.aarch64",
          "openSUSE Leap 15.4:cluster-md-kmp-azure-5.14.21-150400.14.13.1.x86_64",
          "openSUSE Leap 15.4:dlm-kmp-azure-5.14.21-150400.14.13.1.aarch64",
          "openSUSE Leap 15.4:dlm-kmp-azure-5.14.21-150400.14.13.1.x86_64",
          "openSUSE Leap 15.4:gfs2-kmp-azure-5.14.21-150400.14.13.1.aarch64",
          "openSUSE Leap 15.4:gfs2-kmp-azure-5.14.21-150400.14.13.1.x86_64",
          "openSUSE Leap 15.4:kernel-azure-5.14.21-150400.14.13.1.aarch64",
          "openSUSE Leap 15.4:kernel-azure-5.14.21-150400.14.13.1.x86_64",
          "openSUSE Leap 15.4:kernel-azure-devel-5.14.21-150400.14.13.1.aarch64",
          "openSUSE Leap 15.4:kernel-azure-devel-5.14.21-150400.14.13.1.x86_64",
          "openSUSE Leap 15.4:kernel-azure-extra-5.14.21-150400.14.13.1.aarch64",
          "openSUSE Leap 15.4:kernel-azure-extra-5.14.21-150400.14.13.1.x86_64",
          "openSUSE Leap 15.4:kernel-azure-livepatch-devel-5.14.21-150400.14.13.1.aarch64",
          "openSUSE Leap 15.4:kernel-azure-livepatch-devel-5.14.21-150400.14.13.1.x86_64",
          "openSUSE Leap 15.4:kernel-azure-optional-5.14.21-150400.14.13.1.aarch64",
          "openSUSE Leap 15.4:kernel-azure-optional-5.14.21-150400.14.13.1.x86_64",
          "openSUSE Leap 15.4:kernel-devel-azure-5.14.21-150400.14.13.1.noarch",
          "openSUSE Leap 15.4:kernel-source-azure-5.14.21-150400.14.13.1.noarch",
          "openSUSE Leap 15.4:kernel-syms-azure-5.14.21-150400.14.13.1.aarch64",
          "openSUSE Leap 15.4:kernel-syms-azure-5.14.21-150400.14.13.1.x86_64",
          "openSUSE Leap 15.4:kselftests-kmp-azure-5.14.21-150400.14.13.1.aarch64",
          "openSUSE Leap 15.4:kselftests-kmp-azure-5.14.21-150400.14.13.1.x86_64",
          "openSUSE Leap 15.4:ocfs2-kmp-azure-5.14.21-150400.14.13.1.aarch64",
          "openSUSE Leap 15.4:ocfs2-kmp-azure-5.14.21-150400.14.13.1.x86_64",
          "openSUSE Leap 15.4:reiserfs-kmp-azure-5.14.21-150400.14.13.1.aarch64",
          "openSUSE Leap 15.4:reiserfs-kmp-azure-5.14.21-150400.14.13.1.x86_64"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2020-36516",
          "url": "https://www.suse.com/security/cve/CVE-2020-36516"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1196616 for CVE-2020-36516",
          "url": "https://bugzilla.suse.com/1196616"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1196867 for CVE-2020-36516",
          "url": "https://bugzilla.suse.com/1196867"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1204092 for CVE-2020-36516",
          "url": "https://bugzilla.suse.com/1204092"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1204183 for CVE-2020-36516",
          "url": "https://bugzilla.suse.com/1204183"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-azure-5.14.21-150400.14.13.1.aarch64",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-azure-5.14.21-150400.14.13.1.x86_64",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-azure-devel-5.14.21-150400.14.13.1.aarch64",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-azure-devel-5.14.21-150400.14.13.1.x86_64",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-devel-azure-5.14.21-150400.14.13.1.noarch",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-source-azure-5.14.21-150400.14.13.1.noarch",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-syms-azure-5.14.21-150400.14.13.1.aarch64",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-syms-azure-5.14.21-150400.14.13.1.x86_64",
            "openSUSE Leap 15.4:cluster-md-kmp-azure-5.14.21-150400.14.13.1.aarch64",
            "openSUSE Leap 15.4:cluster-md-kmp-azure-5.14.21-150400.14.13.1.x86_64",
            "openSUSE Leap 15.4:dlm-kmp-azure-5.14.21-150400.14.13.1.aarch64",
            "openSUSE Leap 15.4:dlm-kmp-azure-5.14.21-150400.14.13.1.x86_64",
            "openSUSE Leap 15.4:gfs2-kmp-azure-5.14.21-150400.14.13.1.aarch64",
            "openSUSE Leap 15.4:gfs2-kmp-azure-5.14.21-150400.14.13.1.x86_64",
            "openSUSE Leap 15.4:kernel-azure-5.14.21-150400.14.13.1.aarch64",
            "openSUSE Leap 15.4:kernel-azure-5.14.21-150400.14.13.1.x86_64",
            "openSUSE Leap 15.4:kernel-azure-devel-5.14.21-150400.14.13.1.aarch64",
            "openSUSE Leap 15.4:kernel-azure-devel-5.14.21-150400.14.13.1.x86_64",
            "openSUSE Leap 15.4:kernel-azure-extra-5.14.21-150400.14.13.1.aarch64",
            "openSUSE Leap 15.4:kernel-azure-extra-5.14.21-150400.14.13.1.x86_64",
            "openSUSE Leap 15.4:kernel-azure-livepatch-devel-5.14.21-150400.14.13.1.aarch64",
            "openSUSE Leap 15.4:kernel-azure-livepatch-devel-5.14.21-150400.14.13.1.x86_64",
            "openSUSE Leap 15.4:kernel-azure-optional-5.14.21-150400.14.13.1.aarch64",
            "openSUSE Leap 15.4:kernel-azure-optional-5.14.21-150400.14.13.1.x86_64",
            "openSUSE Leap 15.4:kernel-devel-azure-5.14.21-150400.14.13.1.noarch",
            "openSUSE Leap 15.4:kernel-source-azure-5.14.21-150400.14.13.1.noarch",
            "openSUSE Leap 15.4:kernel-syms-azure-5.14.21-150400.14.13.1.aarch64",
            "openSUSE Leap 15.4:kernel-syms-azure-5.14.21-150400.14.13.1.x86_64",
            "openSUSE Leap 15.4:kselftests-kmp-azure-5.14.21-150400.14.13.1.aarch64",
            "openSUSE Leap 15.4:kselftests-kmp-azure-5.14.21-150400.14.13.1.x86_64",
            "openSUSE Leap 15.4:ocfs2-kmp-azure-5.14.21-150400.14.13.1.aarch64",
            "openSUSE Leap 15.4:ocfs2-kmp-azure-5.14.21-150400.14.13.1.x86_64",
            "openSUSE Leap 15.4:reiserfs-kmp-azure-5.14.21-150400.14.13.1.aarch64",
            "openSUSE Leap 15.4:reiserfs-kmp-azure-5.14.21-150400.14.13.1.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 8.1,
            "baseSeverity": "HIGH",
            "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:H",
            "version": "3.1"
          },
          "products": [
            "SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-azure-5.14.21-150400.14.13.1.aarch64",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-azure-5.14.21-150400.14.13.1.x86_64",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-azure-devel-5.14.21-150400.14.13.1.aarch64",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-azure-devel-5.14.21-150400.14.13.1.x86_64",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-devel-azure-5.14.21-150400.14.13.1.noarch",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-source-azure-5.14.21-150400.14.13.1.noarch",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-syms-azure-5.14.21-150400.14.13.1.aarch64",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-syms-azure-5.14.21-150400.14.13.1.x86_64",
            "openSUSE Leap 15.4:cluster-md-kmp-azure-5.14.21-150400.14.13.1.aarch64",
            "openSUSE Leap 15.4:cluster-md-kmp-azure-5.14.21-150400.14.13.1.x86_64",
            "openSUSE Leap 15.4:dlm-kmp-azure-5.14.21-150400.14.13.1.aarch64",
            "openSUSE Leap 15.4:dlm-kmp-azure-5.14.21-150400.14.13.1.x86_64",
            "openSUSE Leap 15.4:gfs2-kmp-azure-5.14.21-150400.14.13.1.aarch64",
            "openSUSE Leap 15.4:gfs2-kmp-azure-5.14.21-150400.14.13.1.x86_64",
            "openSUSE Leap 15.4:kernel-azure-5.14.21-150400.14.13.1.aarch64",
            "openSUSE Leap 15.4:kernel-azure-5.14.21-150400.14.13.1.x86_64",
            "openSUSE Leap 15.4:kernel-azure-devel-5.14.21-150400.14.13.1.aarch64",
            "openSUSE Leap 15.4:kernel-azure-devel-5.14.21-150400.14.13.1.x86_64",
            "openSUSE Leap 15.4:kernel-azure-extra-5.14.21-150400.14.13.1.aarch64",
            "openSUSE Leap 15.4:kernel-azure-extra-5.14.21-150400.14.13.1.x86_64",
            "openSUSE Leap 15.4:kernel-azure-livepatch-devel-5.14.21-150400.14.13.1.aarch64",
            "openSUSE Leap 15.4:kernel-azure-livepatch-devel-5.14.21-150400.14.13.1.x86_64",
            "openSUSE Leap 15.4:kernel-azure-optional-5.14.21-150400.14.13.1.aarch64",
            "openSUSE Leap 15.4:kernel-azure-optional-5.14.21-150400.14.13.1.x86_64",
            "openSUSE Leap 15.4:kernel-devel-azure-5.14.21-150400.14.13.1.noarch",
            "openSUSE Leap 15.4:kernel-source-azure-5.14.21-150400.14.13.1.noarch",
            "openSUSE Leap 15.4:kernel-syms-azure-5.14.21-150400.14.13.1.aarch64",
            "openSUSE Leap 15.4:kernel-syms-azure-5.14.21-150400.14.13.1.x86_64",
            "openSUSE Leap 15.4:kselftests-kmp-azure-5.14.21-150400.14.13.1.aarch64",
            "openSUSE Leap 15.4:kselftests-kmp-azure-5.14.21-150400.14.13.1.x86_64",
            "openSUSE Leap 15.4:ocfs2-kmp-azure-5.14.21-150400.14.13.1.aarch64",
            "openSUSE Leap 15.4:ocfs2-kmp-azure-5.14.21-150400.14.13.1.x86_64",
            "openSUSE Leap 15.4:reiserfs-kmp-azure-5.14.21-150400.14.13.1.aarch64",
            "openSUSE Leap 15.4:reiserfs-kmp-azure-5.14.21-150400.14.13.1.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2022-09-16T08:38:48Z",
          "details": "important"
        }
      ],
      "title": "CVE-2020-36516"
    },
    {
      "cve": "CVE-2021-33135",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2021-33135"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "Uncontrolled resource consumption in the Linux kernel drivers for Intel(R) SGX may allow an authenticated user to potentially enable denial of service via local access.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-azure-5.14.21-150400.14.13.1.aarch64",
          "SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-azure-5.14.21-150400.14.13.1.x86_64",
          "SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-azure-devel-5.14.21-150400.14.13.1.aarch64",
          "SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-azure-devel-5.14.21-150400.14.13.1.x86_64",
          "SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-devel-azure-5.14.21-150400.14.13.1.noarch",
          "SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-source-azure-5.14.21-150400.14.13.1.noarch",
          "SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-syms-azure-5.14.21-150400.14.13.1.aarch64",
          "SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-syms-azure-5.14.21-150400.14.13.1.x86_64",
          "openSUSE Leap 15.4:cluster-md-kmp-azure-5.14.21-150400.14.13.1.aarch64",
          "openSUSE Leap 15.4:cluster-md-kmp-azure-5.14.21-150400.14.13.1.x86_64",
          "openSUSE Leap 15.4:dlm-kmp-azure-5.14.21-150400.14.13.1.aarch64",
          "openSUSE Leap 15.4:dlm-kmp-azure-5.14.21-150400.14.13.1.x86_64",
          "openSUSE Leap 15.4:gfs2-kmp-azure-5.14.21-150400.14.13.1.aarch64",
          "openSUSE Leap 15.4:gfs2-kmp-azure-5.14.21-150400.14.13.1.x86_64",
          "openSUSE Leap 15.4:kernel-azure-5.14.21-150400.14.13.1.aarch64",
          "openSUSE Leap 15.4:kernel-azure-5.14.21-150400.14.13.1.x86_64",
          "openSUSE Leap 15.4:kernel-azure-devel-5.14.21-150400.14.13.1.aarch64",
          "openSUSE Leap 15.4:kernel-azure-devel-5.14.21-150400.14.13.1.x86_64",
          "openSUSE Leap 15.4:kernel-azure-extra-5.14.21-150400.14.13.1.aarch64",
          "openSUSE Leap 15.4:kernel-azure-extra-5.14.21-150400.14.13.1.x86_64",
          "openSUSE Leap 15.4:kernel-azure-livepatch-devel-5.14.21-150400.14.13.1.aarch64",
          "openSUSE Leap 15.4:kernel-azure-livepatch-devel-5.14.21-150400.14.13.1.x86_64",
          "openSUSE Leap 15.4:kernel-azure-optional-5.14.21-150400.14.13.1.aarch64",
          "openSUSE Leap 15.4:kernel-azure-optional-5.14.21-150400.14.13.1.x86_64",
          "openSUSE Leap 15.4:kernel-devel-azure-5.14.21-150400.14.13.1.noarch",
          "openSUSE Leap 15.4:kernel-source-azure-5.14.21-150400.14.13.1.noarch",
          "openSUSE Leap 15.4:kernel-syms-azure-5.14.21-150400.14.13.1.aarch64",
          "openSUSE Leap 15.4:kernel-syms-azure-5.14.21-150400.14.13.1.x86_64",
          "openSUSE Leap 15.4:kselftests-kmp-azure-5.14.21-150400.14.13.1.aarch64",
          "openSUSE Leap 15.4:kselftests-kmp-azure-5.14.21-150400.14.13.1.x86_64",
          "openSUSE Leap 15.4:ocfs2-kmp-azure-5.14.21-150400.14.13.1.aarch64",
          "openSUSE Leap 15.4:ocfs2-kmp-azure-5.14.21-150400.14.13.1.x86_64",
          "openSUSE Leap 15.4:reiserfs-kmp-azure-5.14.21-150400.14.13.1.aarch64",
          "openSUSE Leap 15.4:reiserfs-kmp-azure-5.14.21-150400.14.13.1.x86_64"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2021-33135",
          "url": "https://www.suse.com/security/cve/CVE-2021-33135"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1199515 for CVE-2021-33135",
          "url": "https://bugzilla.suse.com/1199515"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-azure-5.14.21-150400.14.13.1.aarch64",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-azure-5.14.21-150400.14.13.1.x86_64",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-azure-devel-5.14.21-150400.14.13.1.aarch64",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-azure-devel-5.14.21-150400.14.13.1.x86_64",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-devel-azure-5.14.21-150400.14.13.1.noarch",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-source-azure-5.14.21-150400.14.13.1.noarch",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-syms-azure-5.14.21-150400.14.13.1.aarch64",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-syms-azure-5.14.21-150400.14.13.1.x86_64",
            "openSUSE Leap 15.4:cluster-md-kmp-azure-5.14.21-150400.14.13.1.aarch64",
            "openSUSE Leap 15.4:cluster-md-kmp-azure-5.14.21-150400.14.13.1.x86_64",
            "openSUSE Leap 15.4:dlm-kmp-azure-5.14.21-150400.14.13.1.aarch64",
            "openSUSE Leap 15.4:dlm-kmp-azure-5.14.21-150400.14.13.1.x86_64",
            "openSUSE Leap 15.4:gfs2-kmp-azure-5.14.21-150400.14.13.1.aarch64",
            "openSUSE Leap 15.4:gfs2-kmp-azure-5.14.21-150400.14.13.1.x86_64",
            "openSUSE Leap 15.4:kernel-azure-5.14.21-150400.14.13.1.aarch64",
            "openSUSE Leap 15.4:kernel-azure-5.14.21-150400.14.13.1.x86_64",
            "openSUSE Leap 15.4:kernel-azure-devel-5.14.21-150400.14.13.1.aarch64",
            "openSUSE Leap 15.4:kernel-azure-devel-5.14.21-150400.14.13.1.x86_64",
            "openSUSE Leap 15.4:kernel-azure-extra-5.14.21-150400.14.13.1.aarch64",
            "openSUSE Leap 15.4:kernel-azure-extra-5.14.21-150400.14.13.1.x86_64",
            "openSUSE Leap 15.4:kernel-azure-livepatch-devel-5.14.21-150400.14.13.1.aarch64",
            "openSUSE Leap 15.4:kernel-azure-livepatch-devel-5.14.21-150400.14.13.1.x86_64",
            "openSUSE Leap 15.4:kernel-azure-optional-5.14.21-150400.14.13.1.aarch64",
            "openSUSE Leap 15.4:kernel-azure-optional-5.14.21-150400.14.13.1.x86_64",
            "openSUSE Leap 15.4:kernel-devel-azure-5.14.21-150400.14.13.1.noarch",
            "openSUSE Leap 15.4:kernel-source-azure-5.14.21-150400.14.13.1.noarch",
            "openSUSE Leap 15.4:kernel-syms-azure-5.14.21-150400.14.13.1.aarch64",
            "openSUSE Leap 15.4:kernel-syms-azure-5.14.21-150400.14.13.1.x86_64",
            "openSUSE Leap 15.4:kselftests-kmp-azure-5.14.21-150400.14.13.1.aarch64",
            "openSUSE Leap 15.4:kselftests-kmp-azure-5.14.21-150400.14.13.1.x86_64",
            "openSUSE Leap 15.4:ocfs2-kmp-azure-5.14.21-150400.14.13.1.aarch64",
            "openSUSE Leap 15.4:ocfs2-kmp-azure-5.14.21-150400.14.13.1.x86_64",
            "openSUSE Leap 15.4:reiserfs-kmp-azure-5.14.21-150400.14.13.1.aarch64",
            "openSUSE Leap 15.4:reiserfs-kmp-azure-5.14.21-150400.14.13.1.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 5.5,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
            "version": "3.1"
          },
          "products": [
            "SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-azure-5.14.21-150400.14.13.1.aarch64",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-azure-5.14.21-150400.14.13.1.x86_64",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-azure-devel-5.14.21-150400.14.13.1.aarch64",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-azure-devel-5.14.21-150400.14.13.1.x86_64",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-devel-azure-5.14.21-150400.14.13.1.noarch",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-source-azure-5.14.21-150400.14.13.1.noarch",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-syms-azure-5.14.21-150400.14.13.1.aarch64",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-syms-azure-5.14.21-150400.14.13.1.x86_64",
            "openSUSE Leap 15.4:cluster-md-kmp-azure-5.14.21-150400.14.13.1.aarch64",
            "openSUSE Leap 15.4:cluster-md-kmp-azure-5.14.21-150400.14.13.1.x86_64",
            "openSUSE Leap 15.4:dlm-kmp-azure-5.14.21-150400.14.13.1.aarch64",
            "openSUSE Leap 15.4:dlm-kmp-azure-5.14.21-150400.14.13.1.x86_64",
            "openSUSE Leap 15.4:gfs2-kmp-azure-5.14.21-150400.14.13.1.aarch64",
            "openSUSE Leap 15.4:gfs2-kmp-azure-5.14.21-150400.14.13.1.x86_64",
            "openSUSE Leap 15.4:kernel-azure-5.14.21-150400.14.13.1.aarch64",
            "openSUSE Leap 15.4:kernel-azure-5.14.21-150400.14.13.1.x86_64",
            "openSUSE Leap 15.4:kernel-azure-devel-5.14.21-150400.14.13.1.aarch64",
            "openSUSE Leap 15.4:kernel-azure-devel-5.14.21-150400.14.13.1.x86_64",
            "openSUSE Leap 15.4:kernel-azure-extra-5.14.21-150400.14.13.1.aarch64",
            "openSUSE Leap 15.4:kernel-azure-extra-5.14.21-150400.14.13.1.x86_64",
            "openSUSE Leap 15.4:kernel-azure-livepatch-devel-5.14.21-150400.14.13.1.aarch64",
            "openSUSE Leap 15.4:kernel-azure-livepatch-devel-5.14.21-150400.14.13.1.x86_64",
            "openSUSE Leap 15.4:kernel-azure-optional-5.14.21-150400.14.13.1.aarch64",
            "openSUSE Leap 15.4:kernel-azure-optional-5.14.21-150400.14.13.1.x86_64",
            "openSUSE Leap 15.4:kernel-devel-azure-5.14.21-150400.14.13.1.noarch",
            "openSUSE Leap 15.4:kernel-source-azure-5.14.21-150400.14.13.1.noarch",
            "openSUSE Leap 15.4:kernel-syms-azure-5.14.21-150400.14.13.1.aarch64",
            "openSUSE Leap 15.4:kernel-syms-azure-5.14.21-150400.14.13.1.x86_64",
            "openSUSE Leap 15.4:kselftests-kmp-azure-5.14.21-150400.14.13.1.aarch64",
            "openSUSE Leap 15.4:kselftests-kmp-azure-5.14.21-150400.14.13.1.x86_64",
            "openSUSE Leap 15.4:ocfs2-kmp-azure-5.14.21-150400.14.13.1.aarch64",
            "openSUSE Leap 15.4:ocfs2-kmp-azure-5.14.21-150400.14.13.1.x86_64",
            "openSUSE Leap 15.4:reiserfs-kmp-azure-5.14.21-150400.14.13.1.aarch64",
            "openSUSE Leap 15.4:reiserfs-kmp-azure-5.14.21-150400.14.13.1.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2022-09-16T08:38:48Z",
          "details": "moderate"
        }
      ],
      "title": "CVE-2021-33135"
    },
    {
      "cve": "CVE-2021-4037",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2021-4037"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "A vulnerability was found in the fs/inode.c:inode_init_owner() function logic of the LInux kernel that allows local users to create files for the XFS file-system with an unintended group ownership and with group execution and SGID permission bits set, in a scenario where a directory is SGID and belongs to a certain group and is writable by a user who is not a member of this group. This can lead to excessive permissions granted in case when they should not. This vulnerability is similar to the previous CVE-2018-13405 and adds the missed fix for the XFS.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-azure-5.14.21-150400.14.13.1.aarch64",
          "SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-azure-5.14.21-150400.14.13.1.x86_64",
          "SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-azure-devel-5.14.21-150400.14.13.1.aarch64",
          "SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-azure-devel-5.14.21-150400.14.13.1.x86_64",
          "SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-devel-azure-5.14.21-150400.14.13.1.noarch",
          "SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-source-azure-5.14.21-150400.14.13.1.noarch",
          "SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-syms-azure-5.14.21-150400.14.13.1.aarch64",
          "SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-syms-azure-5.14.21-150400.14.13.1.x86_64",
          "openSUSE Leap 15.4:cluster-md-kmp-azure-5.14.21-150400.14.13.1.aarch64",
          "openSUSE Leap 15.4:cluster-md-kmp-azure-5.14.21-150400.14.13.1.x86_64",
          "openSUSE Leap 15.4:dlm-kmp-azure-5.14.21-150400.14.13.1.aarch64",
          "openSUSE Leap 15.4:dlm-kmp-azure-5.14.21-150400.14.13.1.x86_64",
          "openSUSE Leap 15.4:gfs2-kmp-azure-5.14.21-150400.14.13.1.aarch64",
          "openSUSE Leap 15.4:gfs2-kmp-azure-5.14.21-150400.14.13.1.x86_64",
          "openSUSE Leap 15.4:kernel-azure-5.14.21-150400.14.13.1.aarch64",
          "openSUSE Leap 15.4:kernel-azure-5.14.21-150400.14.13.1.x86_64",
          "openSUSE Leap 15.4:kernel-azure-devel-5.14.21-150400.14.13.1.aarch64",
          "openSUSE Leap 15.4:kernel-azure-devel-5.14.21-150400.14.13.1.x86_64",
          "openSUSE Leap 15.4:kernel-azure-extra-5.14.21-150400.14.13.1.aarch64",
          "openSUSE Leap 15.4:kernel-azure-extra-5.14.21-150400.14.13.1.x86_64",
          "openSUSE Leap 15.4:kernel-azure-livepatch-devel-5.14.21-150400.14.13.1.aarch64",
          "openSUSE Leap 15.4:kernel-azure-livepatch-devel-5.14.21-150400.14.13.1.x86_64",
          "openSUSE Leap 15.4:kernel-azure-optional-5.14.21-150400.14.13.1.aarch64",
          "openSUSE Leap 15.4:kernel-azure-optional-5.14.21-150400.14.13.1.x86_64",
          "openSUSE Leap 15.4:kernel-devel-azure-5.14.21-150400.14.13.1.noarch",
          "openSUSE Leap 15.4:kernel-source-azure-5.14.21-150400.14.13.1.noarch",
          "openSUSE Leap 15.4:kernel-syms-azure-5.14.21-150400.14.13.1.aarch64",
          "openSUSE Leap 15.4:kernel-syms-azure-5.14.21-150400.14.13.1.x86_64",
          "openSUSE Leap 15.4:kselftests-kmp-azure-5.14.21-150400.14.13.1.aarch64",
          "openSUSE Leap 15.4:kselftests-kmp-azure-5.14.21-150400.14.13.1.x86_64",
          "openSUSE Leap 15.4:ocfs2-kmp-azure-5.14.21-150400.14.13.1.aarch64",
          "openSUSE Leap 15.4:ocfs2-kmp-azure-5.14.21-150400.14.13.1.x86_64",
          "openSUSE Leap 15.4:reiserfs-kmp-azure-5.14.21-150400.14.13.1.aarch64",
          "openSUSE Leap 15.4:reiserfs-kmp-azure-5.14.21-150400.14.13.1.x86_64"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2021-4037",
          "url": "https://www.suse.com/security/cve/CVE-2021-4037"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1198702 for CVE-2021-4037",
          "url": "https://bugzilla.suse.com/1198702"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-azure-5.14.21-150400.14.13.1.aarch64",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-azure-5.14.21-150400.14.13.1.x86_64",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-azure-devel-5.14.21-150400.14.13.1.aarch64",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-azure-devel-5.14.21-150400.14.13.1.x86_64",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-devel-azure-5.14.21-150400.14.13.1.noarch",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-source-azure-5.14.21-150400.14.13.1.noarch",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-syms-azure-5.14.21-150400.14.13.1.aarch64",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-syms-azure-5.14.21-150400.14.13.1.x86_64",
            "openSUSE Leap 15.4:cluster-md-kmp-azure-5.14.21-150400.14.13.1.aarch64",
            "openSUSE Leap 15.4:cluster-md-kmp-azure-5.14.21-150400.14.13.1.x86_64",
            "openSUSE Leap 15.4:dlm-kmp-azure-5.14.21-150400.14.13.1.aarch64",
            "openSUSE Leap 15.4:dlm-kmp-azure-5.14.21-150400.14.13.1.x86_64",
            "openSUSE Leap 15.4:gfs2-kmp-azure-5.14.21-150400.14.13.1.aarch64",
            "openSUSE Leap 15.4:gfs2-kmp-azure-5.14.21-150400.14.13.1.x86_64",
            "openSUSE Leap 15.4:kernel-azure-5.14.21-150400.14.13.1.aarch64",
            "openSUSE Leap 15.4:kernel-azure-5.14.21-150400.14.13.1.x86_64",
            "openSUSE Leap 15.4:kernel-azure-devel-5.14.21-150400.14.13.1.aarch64",
            "openSUSE Leap 15.4:kernel-azure-devel-5.14.21-150400.14.13.1.x86_64",
            "openSUSE Leap 15.4:kernel-azure-extra-5.14.21-150400.14.13.1.aarch64",
            "openSUSE Leap 15.4:kernel-azure-extra-5.14.21-150400.14.13.1.x86_64",
            "openSUSE Leap 15.4:kernel-azure-livepatch-devel-5.14.21-150400.14.13.1.aarch64",
            "openSUSE Leap 15.4:kernel-azure-livepatch-devel-5.14.21-150400.14.13.1.x86_64",
            "openSUSE Leap 15.4:kernel-azure-optional-5.14.21-150400.14.13.1.aarch64",
            "openSUSE Leap 15.4:kernel-azure-optional-5.14.21-150400.14.13.1.x86_64",
            "openSUSE Leap 15.4:kernel-devel-azure-5.14.21-150400.14.13.1.noarch",
            "openSUSE Leap 15.4:kernel-source-azure-5.14.21-150400.14.13.1.noarch",
            "openSUSE Leap 15.4:kernel-syms-azure-5.14.21-150400.14.13.1.aarch64",
            "openSUSE Leap 15.4:kernel-syms-azure-5.14.21-150400.14.13.1.x86_64",
            "openSUSE Leap 15.4:kselftests-kmp-azure-5.14.21-150400.14.13.1.aarch64",
            "openSUSE Leap 15.4:kselftests-kmp-azure-5.14.21-150400.14.13.1.x86_64",
            "openSUSE Leap 15.4:ocfs2-kmp-azure-5.14.21-150400.14.13.1.aarch64",
            "openSUSE Leap 15.4:ocfs2-kmp-azure-5.14.21-150400.14.13.1.x86_64",
            "openSUSE Leap 15.4:reiserfs-kmp-azure-5.14.21-150400.14.13.1.aarch64",
            "openSUSE Leap 15.4:reiserfs-kmp-azure-5.14.21-150400.14.13.1.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 4.4,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:N",
            "version": "3.1"
          },
          "products": [
            "SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-azure-5.14.21-150400.14.13.1.aarch64",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-azure-5.14.21-150400.14.13.1.x86_64",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-azure-devel-5.14.21-150400.14.13.1.aarch64",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-azure-devel-5.14.21-150400.14.13.1.x86_64",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-devel-azure-5.14.21-150400.14.13.1.noarch",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-source-azure-5.14.21-150400.14.13.1.noarch",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-syms-azure-5.14.21-150400.14.13.1.aarch64",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-syms-azure-5.14.21-150400.14.13.1.x86_64",
            "openSUSE Leap 15.4:cluster-md-kmp-azure-5.14.21-150400.14.13.1.aarch64",
            "openSUSE Leap 15.4:cluster-md-kmp-azure-5.14.21-150400.14.13.1.x86_64",
            "openSUSE Leap 15.4:dlm-kmp-azure-5.14.21-150400.14.13.1.aarch64",
            "openSUSE Leap 15.4:dlm-kmp-azure-5.14.21-150400.14.13.1.x86_64",
            "openSUSE Leap 15.4:gfs2-kmp-azure-5.14.21-150400.14.13.1.aarch64",
            "openSUSE Leap 15.4:gfs2-kmp-azure-5.14.21-150400.14.13.1.x86_64",
            "openSUSE Leap 15.4:kernel-azure-5.14.21-150400.14.13.1.aarch64",
            "openSUSE Leap 15.4:kernel-azure-5.14.21-150400.14.13.1.x86_64",
            "openSUSE Leap 15.4:kernel-azure-devel-5.14.21-150400.14.13.1.aarch64",
            "openSUSE Leap 15.4:kernel-azure-devel-5.14.21-150400.14.13.1.x86_64",
            "openSUSE Leap 15.4:kernel-azure-extra-5.14.21-150400.14.13.1.aarch64",
            "openSUSE Leap 15.4:kernel-azure-extra-5.14.21-150400.14.13.1.x86_64",
            "openSUSE Leap 15.4:kernel-azure-livepatch-devel-5.14.21-150400.14.13.1.aarch64",
            "openSUSE Leap 15.4:kernel-azure-livepatch-devel-5.14.21-150400.14.13.1.x86_64",
            "openSUSE Leap 15.4:kernel-azure-optional-5.14.21-150400.14.13.1.aarch64",
            "openSUSE Leap 15.4:kernel-azure-optional-5.14.21-150400.14.13.1.x86_64",
            "openSUSE Leap 15.4:kernel-devel-azure-5.14.21-150400.14.13.1.noarch",
            "openSUSE Leap 15.4:kernel-source-azure-5.14.21-150400.14.13.1.noarch",
            "openSUSE Leap 15.4:kernel-syms-azure-5.14.21-150400.14.13.1.aarch64",
            "openSUSE Leap 15.4:kernel-syms-azure-5.14.21-150400.14.13.1.x86_64",
            "openSUSE Leap 15.4:kselftests-kmp-azure-5.14.21-150400.14.13.1.aarch64",
            "openSUSE Leap 15.4:kselftests-kmp-azure-5.14.21-150400.14.13.1.x86_64",
            "openSUSE Leap 15.4:ocfs2-kmp-azure-5.14.21-150400.14.13.1.aarch64",
            "openSUSE Leap 15.4:ocfs2-kmp-azure-5.14.21-150400.14.13.1.x86_64",
            "openSUSE Leap 15.4:reiserfs-kmp-azure-5.14.21-150400.14.13.1.aarch64",
            "openSUSE Leap 15.4:reiserfs-kmp-azure-5.14.21-150400.14.13.1.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2022-09-16T08:38:48Z",
          "details": "moderate"
        }
      ],
      "title": "CVE-2021-4037"
    },
    {
      "cve": "CVE-2022-1184",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2022-1184"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "A use-after-free flaw was found in fs/ext4/namei.c:dx_insert_block() in the Linux kernel\u0027s filesystem sub-component. This flaw allows a local attacker with a user privilege to cause a denial of service.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-azure-5.14.21-150400.14.13.1.aarch64",
          "SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-azure-5.14.21-150400.14.13.1.x86_64",
          "SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-azure-devel-5.14.21-150400.14.13.1.aarch64",
          "SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-azure-devel-5.14.21-150400.14.13.1.x86_64",
          "SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-devel-azure-5.14.21-150400.14.13.1.noarch",
          "SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-source-azure-5.14.21-150400.14.13.1.noarch",
          "SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-syms-azure-5.14.21-150400.14.13.1.aarch64",
          "SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-syms-azure-5.14.21-150400.14.13.1.x86_64",
          "openSUSE Leap 15.4:cluster-md-kmp-azure-5.14.21-150400.14.13.1.aarch64",
          "openSUSE Leap 15.4:cluster-md-kmp-azure-5.14.21-150400.14.13.1.x86_64",
          "openSUSE Leap 15.4:dlm-kmp-azure-5.14.21-150400.14.13.1.aarch64",
          "openSUSE Leap 15.4:dlm-kmp-azure-5.14.21-150400.14.13.1.x86_64",
          "openSUSE Leap 15.4:gfs2-kmp-azure-5.14.21-150400.14.13.1.aarch64",
          "openSUSE Leap 15.4:gfs2-kmp-azure-5.14.21-150400.14.13.1.x86_64",
          "openSUSE Leap 15.4:kernel-azure-5.14.21-150400.14.13.1.aarch64",
          "openSUSE Leap 15.4:kernel-azure-5.14.21-150400.14.13.1.x86_64",
          "openSUSE Leap 15.4:kernel-azure-devel-5.14.21-150400.14.13.1.aarch64",
          "openSUSE Leap 15.4:kernel-azure-devel-5.14.21-150400.14.13.1.x86_64",
          "openSUSE Leap 15.4:kernel-azure-extra-5.14.21-150400.14.13.1.aarch64",
          "openSUSE Leap 15.4:kernel-azure-extra-5.14.21-150400.14.13.1.x86_64",
          "openSUSE Leap 15.4:kernel-azure-livepatch-devel-5.14.21-150400.14.13.1.aarch64",
          "openSUSE Leap 15.4:kernel-azure-livepatch-devel-5.14.21-150400.14.13.1.x86_64",
          "openSUSE Leap 15.4:kernel-azure-optional-5.14.21-150400.14.13.1.aarch64",
          "openSUSE Leap 15.4:kernel-azure-optional-5.14.21-150400.14.13.1.x86_64",
          "openSUSE Leap 15.4:kernel-devel-azure-5.14.21-150400.14.13.1.noarch",
          "openSUSE Leap 15.4:kernel-source-azure-5.14.21-150400.14.13.1.noarch",
          "openSUSE Leap 15.4:kernel-syms-azure-5.14.21-150400.14.13.1.aarch64",
          "openSUSE Leap 15.4:kernel-syms-azure-5.14.21-150400.14.13.1.x86_64",
          "openSUSE Leap 15.4:kselftests-kmp-azure-5.14.21-150400.14.13.1.aarch64",
          "openSUSE Leap 15.4:kselftests-kmp-azure-5.14.21-150400.14.13.1.x86_64",
          "openSUSE Leap 15.4:ocfs2-kmp-azure-5.14.21-150400.14.13.1.aarch64",
          "openSUSE Leap 15.4:ocfs2-kmp-azure-5.14.21-150400.14.13.1.x86_64",
          "openSUSE Leap 15.4:reiserfs-kmp-azure-5.14.21-150400.14.13.1.aarch64",
          "openSUSE Leap 15.4:reiserfs-kmp-azure-5.14.21-150400.14.13.1.x86_64"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2022-1184",
          "url": "https://www.suse.com/security/cve/CVE-2022-1184"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1198577 for CVE-2022-1184",
          "url": "https://bugzilla.suse.com/1198577"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1210859 for CVE-2022-1184",
          "url": "https://bugzilla.suse.com/1210859"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-azure-5.14.21-150400.14.13.1.aarch64",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-azure-5.14.21-150400.14.13.1.x86_64",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-azure-devel-5.14.21-150400.14.13.1.aarch64",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-azure-devel-5.14.21-150400.14.13.1.x86_64",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-devel-azure-5.14.21-150400.14.13.1.noarch",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-source-azure-5.14.21-150400.14.13.1.noarch",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-syms-azure-5.14.21-150400.14.13.1.aarch64",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-syms-azure-5.14.21-150400.14.13.1.x86_64",
            "openSUSE Leap 15.4:cluster-md-kmp-azure-5.14.21-150400.14.13.1.aarch64",
            "openSUSE Leap 15.4:cluster-md-kmp-azure-5.14.21-150400.14.13.1.x86_64",
            "openSUSE Leap 15.4:dlm-kmp-azure-5.14.21-150400.14.13.1.aarch64",
            "openSUSE Leap 15.4:dlm-kmp-azure-5.14.21-150400.14.13.1.x86_64",
            "openSUSE Leap 15.4:gfs2-kmp-azure-5.14.21-150400.14.13.1.aarch64",
            "openSUSE Leap 15.4:gfs2-kmp-azure-5.14.21-150400.14.13.1.x86_64",
            "openSUSE Leap 15.4:kernel-azure-5.14.21-150400.14.13.1.aarch64",
            "openSUSE Leap 15.4:kernel-azure-5.14.21-150400.14.13.1.x86_64",
            "openSUSE Leap 15.4:kernel-azure-devel-5.14.21-150400.14.13.1.aarch64",
            "openSUSE Leap 15.4:kernel-azure-devel-5.14.21-150400.14.13.1.x86_64",
            "openSUSE Leap 15.4:kernel-azure-extra-5.14.21-150400.14.13.1.aarch64",
            "openSUSE Leap 15.4:kernel-azure-extra-5.14.21-150400.14.13.1.x86_64",
            "openSUSE Leap 15.4:kernel-azure-livepatch-devel-5.14.21-150400.14.13.1.aarch64",
            "openSUSE Leap 15.4:kernel-azure-livepatch-devel-5.14.21-150400.14.13.1.x86_64",
            "openSUSE Leap 15.4:kernel-azure-optional-5.14.21-150400.14.13.1.aarch64",
            "openSUSE Leap 15.4:kernel-azure-optional-5.14.21-150400.14.13.1.x86_64",
            "openSUSE Leap 15.4:kernel-devel-azure-5.14.21-150400.14.13.1.noarch",
            "openSUSE Leap 15.4:kernel-source-azure-5.14.21-150400.14.13.1.noarch",
            "openSUSE Leap 15.4:kernel-syms-azure-5.14.21-150400.14.13.1.aarch64",
            "openSUSE Leap 15.4:kernel-syms-azure-5.14.21-150400.14.13.1.x86_64",
            "openSUSE Leap 15.4:kselftests-kmp-azure-5.14.21-150400.14.13.1.aarch64",
            "openSUSE Leap 15.4:kselftests-kmp-azure-5.14.21-150400.14.13.1.x86_64",
            "openSUSE Leap 15.4:ocfs2-kmp-azure-5.14.21-150400.14.13.1.aarch64",
            "openSUSE Leap 15.4:ocfs2-kmp-azure-5.14.21-150400.14.13.1.x86_64",
            "openSUSE Leap 15.4:reiserfs-kmp-azure-5.14.21-150400.14.13.1.aarch64",
            "openSUSE Leap 15.4:reiserfs-kmp-azure-5.14.21-150400.14.13.1.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 5.5,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
            "version": "3.1"
          },
          "products": [
            "SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-azure-5.14.21-150400.14.13.1.aarch64",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-azure-5.14.21-150400.14.13.1.x86_64",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-azure-devel-5.14.21-150400.14.13.1.aarch64",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-azure-devel-5.14.21-150400.14.13.1.x86_64",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-devel-azure-5.14.21-150400.14.13.1.noarch",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-source-azure-5.14.21-150400.14.13.1.noarch",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-syms-azure-5.14.21-150400.14.13.1.aarch64",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-syms-azure-5.14.21-150400.14.13.1.x86_64",
            "openSUSE Leap 15.4:cluster-md-kmp-azure-5.14.21-150400.14.13.1.aarch64",
            "openSUSE Leap 15.4:cluster-md-kmp-azure-5.14.21-150400.14.13.1.x86_64",
            "openSUSE Leap 15.4:dlm-kmp-azure-5.14.21-150400.14.13.1.aarch64",
            "openSUSE Leap 15.4:dlm-kmp-azure-5.14.21-150400.14.13.1.x86_64",
            "openSUSE Leap 15.4:gfs2-kmp-azure-5.14.21-150400.14.13.1.aarch64",
            "openSUSE Leap 15.4:gfs2-kmp-azure-5.14.21-150400.14.13.1.x86_64",
            "openSUSE Leap 15.4:kernel-azure-5.14.21-150400.14.13.1.aarch64",
            "openSUSE Leap 15.4:kernel-azure-5.14.21-150400.14.13.1.x86_64",
            "openSUSE Leap 15.4:kernel-azure-devel-5.14.21-150400.14.13.1.aarch64",
            "openSUSE Leap 15.4:kernel-azure-devel-5.14.21-150400.14.13.1.x86_64",
            "openSUSE Leap 15.4:kernel-azure-extra-5.14.21-150400.14.13.1.aarch64",
            "openSUSE Leap 15.4:kernel-azure-extra-5.14.21-150400.14.13.1.x86_64",
            "openSUSE Leap 15.4:kernel-azure-livepatch-devel-5.14.21-150400.14.13.1.aarch64",
            "openSUSE Leap 15.4:kernel-azure-livepatch-devel-5.14.21-150400.14.13.1.x86_64",
            "openSUSE Leap 15.4:kernel-azure-optional-5.14.21-150400.14.13.1.aarch64",
            "openSUSE Leap 15.4:kernel-azure-optional-5.14.21-150400.14.13.1.x86_64",
            "openSUSE Leap 15.4:kernel-devel-azure-5.14.21-150400.14.13.1.noarch",
            "openSUSE Leap 15.4:kernel-source-azure-5.14.21-150400.14.13.1.noarch",
            "openSUSE Leap 15.4:kernel-syms-azure-5.14.21-150400.14.13.1.aarch64",
            "openSUSE Leap 15.4:kernel-syms-azure-5.14.21-150400.14.13.1.x86_64",
            "openSUSE Leap 15.4:kselftests-kmp-azure-5.14.21-150400.14.13.1.aarch64",
            "openSUSE Leap 15.4:kselftests-kmp-azure-5.14.21-150400.14.13.1.x86_64",
            "openSUSE Leap 15.4:ocfs2-kmp-azure-5.14.21-150400.14.13.1.aarch64",
            "openSUSE Leap 15.4:ocfs2-kmp-azure-5.14.21-150400.14.13.1.x86_64",
            "openSUSE Leap 15.4:reiserfs-kmp-azure-5.14.21-150400.14.13.1.aarch64",
            "openSUSE Leap 15.4:reiserfs-kmp-azure-5.14.21-150400.14.13.1.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2022-09-16T08:38:48Z",
          "details": "moderate"
        }
      ],
      "title": "CVE-2022-1184"
    },
    {
      "cve": "CVE-2022-20368",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2022-20368"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "Product: AndroidVersions: Android kernelAndroid ID: A-224546354References: Upstream kernel",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-azure-5.14.21-150400.14.13.1.aarch64",
          "SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-azure-5.14.21-150400.14.13.1.x86_64",
          "SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-azure-devel-5.14.21-150400.14.13.1.aarch64",
          "SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-azure-devel-5.14.21-150400.14.13.1.x86_64",
          "SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-devel-azure-5.14.21-150400.14.13.1.noarch",
          "SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-source-azure-5.14.21-150400.14.13.1.noarch",
          "SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-syms-azure-5.14.21-150400.14.13.1.aarch64",
          "SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-syms-azure-5.14.21-150400.14.13.1.x86_64",
          "openSUSE Leap 15.4:cluster-md-kmp-azure-5.14.21-150400.14.13.1.aarch64",
          "openSUSE Leap 15.4:cluster-md-kmp-azure-5.14.21-150400.14.13.1.x86_64",
          "openSUSE Leap 15.4:dlm-kmp-azure-5.14.21-150400.14.13.1.aarch64",
          "openSUSE Leap 15.4:dlm-kmp-azure-5.14.21-150400.14.13.1.x86_64",
          "openSUSE Leap 15.4:gfs2-kmp-azure-5.14.21-150400.14.13.1.aarch64",
          "openSUSE Leap 15.4:gfs2-kmp-azure-5.14.21-150400.14.13.1.x86_64",
          "openSUSE Leap 15.4:kernel-azure-5.14.21-150400.14.13.1.aarch64",
          "openSUSE Leap 15.4:kernel-azure-5.14.21-150400.14.13.1.x86_64",
          "openSUSE Leap 15.4:kernel-azure-devel-5.14.21-150400.14.13.1.aarch64",
          "openSUSE Leap 15.4:kernel-azure-devel-5.14.21-150400.14.13.1.x86_64",
          "openSUSE Leap 15.4:kernel-azure-extra-5.14.21-150400.14.13.1.aarch64",
          "openSUSE Leap 15.4:kernel-azure-extra-5.14.21-150400.14.13.1.x86_64",
          "openSUSE Leap 15.4:kernel-azure-livepatch-devel-5.14.21-150400.14.13.1.aarch64",
          "openSUSE Leap 15.4:kernel-azure-livepatch-devel-5.14.21-150400.14.13.1.x86_64",
          "openSUSE Leap 15.4:kernel-azure-optional-5.14.21-150400.14.13.1.aarch64",
          "openSUSE Leap 15.4:kernel-azure-optional-5.14.21-150400.14.13.1.x86_64",
          "openSUSE Leap 15.4:kernel-devel-azure-5.14.21-150400.14.13.1.noarch",
          "openSUSE Leap 15.4:kernel-source-azure-5.14.21-150400.14.13.1.noarch",
          "openSUSE Leap 15.4:kernel-syms-azure-5.14.21-150400.14.13.1.aarch64",
          "openSUSE Leap 15.4:kernel-syms-azure-5.14.21-150400.14.13.1.x86_64",
          "openSUSE Leap 15.4:kselftests-kmp-azure-5.14.21-150400.14.13.1.aarch64",
          "openSUSE Leap 15.4:kselftests-kmp-azure-5.14.21-150400.14.13.1.x86_64",
          "openSUSE Leap 15.4:ocfs2-kmp-azure-5.14.21-150400.14.13.1.aarch64",
          "openSUSE Leap 15.4:ocfs2-kmp-azure-5.14.21-150400.14.13.1.x86_64",
          "openSUSE Leap 15.4:reiserfs-kmp-azure-5.14.21-150400.14.13.1.aarch64",
          "openSUSE Leap 15.4:reiserfs-kmp-azure-5.14.21-150400.14.13.1.x86_64"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2022-20368",
          "url": "https://www.suse.com/security/cve/CVE-2022-20368"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1202346 for CVE-2022-20368",
          "url": "https://bugzilla.suse.com/1202346"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1212311 for CVE-2022-20368",
          "url": "https://bugzilla.suse.com/1212311"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-azure-5.14.21-150400.14.13.1.aarch64",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-azure-5.14.21-150400.14.13.1.x86_64",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-azure-devel-5.14.21-150400.14.13.1.aarch64",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-azure-devel-5.14.21-150400.14.13.1.x86_64",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-devel-azure-5.14.21-150400.14.13.1.noarch",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-source-azure-5.14.21-150400.14.13.1.noarch",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-syms-azure-5.14.21-150400.14.13.1.aarch64",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-syms-azure-5.14.21-150400.14.13.1.x86_64",
            "openSUSE Leap 15.4:cluster-md-kmp-azure-5.14.21-150400.14.13.1.aarch64",
            "openSUSE Leap 15.4:cluster-md-kmp-azure-5.14.21-150400.14.13.1.x86_64",
            "openSUSE Leap 15.4:dlm-kmp-azure-5.14.21-150400.14.13.1.aarch64",
            "openSUSE Leap 15.4:dlm-kmp-azure-5.14.21-150400.14.13.1.x86_64",
            "openSUSE Leap 15.4:gfs2-kmp-azure-5.14.21-150400.14.13.1.aarch64",
            "openSUSE Leap 15.4:gfs2-kmp-azure-5.14.21-150400.14.13.1.x86_64",
            "openSUSE Leap 15.4:kernel-azure-5.14.21-150400.14.13.1.aarch64",
            "openSUSE Leap 15.4:kernel-azure-5.14.21-150400.14.13.1.x86_64",
            "openSUSE Leap 15.4:kernel-azure-devel-5.14.21-150400.14.13.1.aarch64",
            "openSUSE Leap 15.4:kernel-azure-devel-5.14.21-150400.14.13.1.x86_64",
            "openSUSE Leap 15.4:kernel-azure-extra-5.14.21-150400.14.13.1.aarch64",
            "openSUSE Leap 15.4:kernel-azure-extra-5.14.21-150400.14.13.1.x86_64",
            "openSUSE Leap 15.4:kernel-azure-livepatch-devel-5.14.21-150400.14.13.1.aarch64",
            "openSUSE Leap 15.4:kernel-azure-livepatch-devel-5.14.21-150400.14.13.1.x86_64",
            "openSUSE Leap 15.4:kernel-azure-optional-5.14.21-150400.14.13.1.aarch64",
            "openSUSE Leap 15.4:kernel-azure-optional-5.14.21-150400.14.13.1.x86_64",
            "openSUSE Leap 15.4:kernel-devel-azure-5.14.21-150400.14.13.1.noarch",
            "openSUSE Leap 15.4:kernel-source-azure-5.14.21-150400.14.13.1.noarch",
            "openSUSE Leap 15.4:kernel-syms-azure-5.14.21-150400.14.13.1.aarch64",
            "openSUSE Leap 15.4:kernel-syms-azure-5.14.21-150400.14.13.1.x86_64",
            "openSUSE Leap 15.4:kselftests-kmp-azure-5.14.21-150400.14.13.1.aarch64",
            "openSUSE Leap 15.4:kselftests-kmp-azure-5.14.21-150400.14.13.1.x86_64",
            "openSUSE Leap 15.4:ocfs2-kmp-azure-5.14.21-150400.14.13.1.aarch64",
            "openSUSE Leap 15.4:ocfs2-kmp-azure-5.14.21-150400.14.13.1.x86_64",
            "openSUSE Leap 15.4:reiserfs-kmp-azure-5.14.21-150400.14.13.1.aarch64",
            "openSUSE Leap 15.4:reiserfs-kmp-azure-5.14.21-150400.14.13.1.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 5.5,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
            "version": "3.1"
          },
          "products": [
            "SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-azure-5.14.21-150400.14.13.1.aarch64",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-azure-5.14.21-150400.14.13.1.x86_64",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-azure-devel-5.14.21-150400.14.13.1.aarch64",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-azure-devel-5.14.21-150400.14.13.1.x86_64",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-devel-azure-5.14.21-150400.14.13.1.noarch",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-source-azure-5.14.21-150400.14.13.1.noarch",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-syms-azure-5.14.21-150400.14.13.1.aarch64",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-syms-azure-5.14.21-150400.14.13.1.x86_64",
            "openSUSE Leap 15.4:cluster-md-kmp-azure-5.14.21-150400.14.13.1.aarch64",
            "openSUSE Leap 15.4:cluster-md-kmp-azure-5.14.21-150400.14.13.1.x86_64",
            "openSUSE Leap 15.4:dlm-kmp-azure-5.14.21-150400.14.13.1.aarch64",
            "openSUSE Leap 15.4:dlm-kmp-azure-5.14.21-150400.14.13.1.x86_64",
            "openSUSE Leap 15.4:gfs2-kmp-azure-5.14.21-150400.14.13.1.aarch64",
            "openSUSE Leap 15.4:gfs2-kmp-azure-5.14.21-150400.14.13.1.x86_64",
            "openSUSE Leap 15.4:kernel-azure-5.14.21-150400.14.13.1.aarch64",
            "openSUSE Leap 15.4:kernel-azure-5.14.21-150400.14.13.1.x86_64",
            "openSUSE Leap 15.4:kernel-azure-devel-5.14.21-150400.14.13.1.aarch64",
            "openSUSE Leap 15.4:kernel-azure-devel-5.14.21-150400.14.13.1.x86_64",
            "openSUSE Leap 15.4:kernel-azure-extra-5.14.21-150400.14.13.1.aarch64",
            "openSUSE Leap 15.4:kernel-azure-extra-5.14.21-150400.14.13.1.x86_64",
            "openSUSE Leap 15.4:kernel-azure-livepatch-devel-5.14.21-150400.14.13.1.aarch64",
            "openSUSE Leap 15.4:kernel-azure-livepatch-devel-5.14.21-150400.14.13.1.x86_64",
            "openSUSE Leap 15.4:kernel-azure-optional-5.14.21-150400.14.13.1.aarch64",
            "openSUSE Leap 15.4:kernel-azure-optional-5.14.21-150400.14.13.1.x86_64",
            "openSUSE Leap 15.4:kernel-devel-azure-5.14.21-150400.14.13.1.noarch",
            "openSUSE Leap 15.4:kernel-source-azure-5.14.21-150400.14.13.1.noarch",
            "openSUSE Leap 15.4:kernel-syms-azure-5.14.21-150400.14.13.1.aarch64",
            "openSUSE Leap 15.4:kernel-syms-azure-5.14.21-150400.14.13.1.x86_64",
            "openSUSE Leap 15.4:kselftests-kmp-azure-5.14.21-150400.14.13.1.aarch64",
            "openSUSE Leap 15.4:kselftests-kmp-azure-5.14.21-150400.14.13.1.x86_64",
            "openSUSE Leap 15.4:ocfs2-kmp-azure-5.14.21-150400.14.13.1.aarch64",
            "openSUSE Leap 15.4:ocfs2-kmp-azure-5.14.21-150400.14.13.1.x86_64",
            "openSUSE Leap 15.4:reiserfs-kmp-azure-5.14.21-150400.14.13.1.aarch64",
            "openSUSE Leap 15.4:reiserfs-kmp-azure-5.14.21-150400.14.13.1.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2022-09-16T08:38:48Z",
          "details": "moderate"
        }
      ],
      "title": "CVE-2022-20368"
    },
    {
      "cve": "CVE-2022-20369",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2022-20369"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "In v4l2_m2m_querybuf of v4l2-mem2mem.c, there is a possible out of bounds write due to improper input validation. This could lead to local escalation of privilege with System execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android kernelAndroid ID: A-223375145References: Upstream kernel",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-azure-5.14.21-150400.14.13.1.aarch64",
          "SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-azure-5.14.21-150400.14.13.1.x86_64",
          "SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-azure-devel-5.14.21-150400.14.13.1.aarch64",
          "SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-azure-devel-5.14.21-150400.14.13.1.x86_64",
          "SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-devel-azure-5.14.21-150400.14.13.1.noarch",
          "SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-source-azure-5.14.21-150400.14.13.1.noarch",
          "SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-syms-azure-5.14.21-150400.14.13.1.aarch64",
          "SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-syms-azure-5.14.21-150400.14.13.1.x86_64",
          "openSUSE Leap 15.4:cluster-md-kmp-azure-5.14.21-150400.14.13.1.aarch64",
          "openSUSE Leap 15.4:cluster-md-kmp-azure-5.14.21-150400.14.13.1.x86_64",
          "openSUSE Leap 15.4:dlm-kmp-azure-5.14.21-150400.14.13.1.aarch64",
          "openSUSE Leap 15.4:dlm-kmp-azure-5.14.21-150400.14.13.1.x86_64",
          "openSUSE Leap 15.4:gfs2-kmp-azure-5.14.21-150400.14.13.1.aarch64",
          "openSUSE Leap 15.4:gfs2-kmp-azure-5.14.21-150400.14.13.1.x86_64",
          "openSUSE Leap 15.4:kernel-azure-5.14.21-150400.14.13.1.aarch64",
          "openSUSE Leap 15.4:kernel-azure-5.14.21-150400.14.13.1.x86_64",
          "openSUSE Leap 15.4:kernel-azure-devel-5.14.21-150400.14.13.1.aarch64",
          "openSUSE Leap 15.4:kernel-azure-devel-5.14.21-150400.14.13.1.x86_64",
          "openSUSE Leap 15.4:kernel-azure-extra-5.14.21-150400.14.13.1.aarch64",
          "openSUSE Leap 15.4:kernel-azure-extra-5.14.21-150400.14.13.1.x86_64",
          "openSUSE Leap 15.4:kernel-azure-livepatch-devel-5.14.21-150400.14.13.1.aarch64",
          "openSUSE Leap 15.4:kernel-azure-livepatch-devel-5.14.21-150400.14.13.1.x86_64",
          "openSUSE Leap 15.4:kernel-azure-optional-5.14.21-150400.14.13.1.aarch64",
          "openSUSE Leap 15.4:kernel-azure-optional-5.14.21-150400.14.13.1.x86_64",
          "openSUSE Leap 15.4:kernel-devel-azure-5.14.21-150400.14.13.1.noarch",
          "openSUSE Leap 15.4:kernel-source-azure-5.14.21-150400.14.13.1.noarch",
          "openSUSE Leap 15.4:kernel-syms-azure-5.14.21-150400.14.13.1.aarch64",
          "openSUSE Leap 15.4:kernel-syms-azure-5.14.21-150400.14.13.1.x86_64",
          "openSUSE Leap 15.4:kselftests-kmp-azure-5.14.21-150400.14.13.1.aarch64",
          "openSUSE Leap 15.4:kselftests-kmp-azure-5.14.21-150400.14.13.1.x86_64",
          "openSUSE Leap 15.4:ocfs2-kmp-azure-5.14.21-150400.14.13.1.aarch64",
          "openSUSE Leap 15.4:ocfs2-kmp-azure-5.14.21-150400.14.13.1.x86_64",
          "openSUSE Leap 15.4:reiserfs-kmp-azure-5.14.21-150400.14.13.1.aarch64",
          "openSUSE Leap 15.4:reiserfs-kmp-azure-5.14.21-150400.14.13.1.x86_64"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2022-20369",
          "url": "https://www.suse.com/security/cve/CVE-2022-20369"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1202347 for CVE-2022-20369",
          "url": "https://bugzilla.suse.com/1202347"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1212321 for CVE-2022-20369",
          "url": "https://bugzilla.suse.com/1212321"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-azure-5.14.21-150400.14.13.1.aarch64",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-azure-5.14.21-150400.14.13.1.x86_64",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-azure-devel-5.14.21-150400.14.13.1.aarch64",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-azure-devel-5.14.21-150400.14.13.1.x86_64",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-devel-azure-5.14.21-150400.14.13.1.noarch",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-source-azure-5.14.21-150400.14.13.1.noarch",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-syms-azure-5.14.21-150400.14.13.1.aarch64",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-syms-azure-5.14.21-150400.14.13.1.x86_64",
            "openSUSE Leap 15.4:cluster-md-kmp-azure-5.14.21-150400.14.13.1.aarch64",
            "openSUSE Leap 15.4:cluster-md-kmp-azure-5.14.21-150400.14.13.1.x86_64",
            "openSUSE Leap 15.4:dlm-kmp-azure-5.14.21-150400.14.13.1.aarch64",
            "openSUSE Leap 15.4:dlm-kmp-azure-5.14.21-150400.14.13.1.x86_64",
            "openSUSE Leap 15.4:gfs2-kmp-azure-5.14.21-150400.14.13.1.aarch64",
            "openSUSE Leap 15.4:gfs2-kmp-azure-5.14.21-150400.14.13.1.x86_64",
            "openSUSE Leap 15.4:kernel-azure-5.14.21-150400.14.13.1.aarch64",
            "openSUSE Leap 15.4:kernel-azure-5.14.21-150400.14.13.1.x86_64",
            "openSUSE Leap 15.4:kernel-azure-devel-5.14.21-150400.14.13.1.aarch64",
            "openSUSE Leap 15.4:kernel-azure-devel-5.14.21-150400.14.13.1.x86_64",
            "openSUSE Leap 15.4:kernel-azure-extra-5.14.21-150400.14.13.1.aarch64",
            "openSUSE Leap 15.4:kernel-azure-extra-5.14.21-150400.14.13.1.x86_64",
            "openSUSE Leap 15.4:kernel-azure-livepatch-devel-5.14.21-150400.14.13.1.aarch64",
            "openSUSE Leap 15.4:kernel-azure-livepatch-devel-5.14.21-150400.14.13.1.x86_64",
            "openSUSE Leap 15.4:kernel-azure-optional-5.14.21-150400.14.13.1.aarch64",
            "openSUSE Leap 15.4:kernel-azure-optional-5.14.21-150400.14.13.1.x86_64",
            "openSUSE Leap 15.4:kernel-devel-azure-5.14.21-150400.14.13.1.noarch",
            "openSUSE Leap 15.4:kernel-source-azure-5.14.21-150400.14.13.1.noarch",
            "openSUSE Leap 15.4:kernel-syms-azure-5.14.21-150400.14.13.1.aarch64",
            "openSUSE Leap 15.4:kernel-syms-azure-5.14.21-150400.14.13.1.x86_64",
            "openSUSE Leap 15.4:kselftests-kmp-azure-5.14.21-150400.14.13.1.aarch64",
            "openSUSE Leap 15.4:kselftests-kmp-azure-5.14.21-150400.14.13.1.x86_64",
            "openSUSE Leap 15.4:ocfs2-kmp-azure-5.14.21-150400.14.13.1.aarch64",
            "openSUSE Leap 15.4:ocfs2-kmp-azure-5.14.21-150400.14.13.1.x86_64",
            "openSUSE Leap 15.4:reiserfs-kmp-azure-5.14.21-150400.14.13.1.aarch64",
            "openSUSE Leap 15.4:reiserfs-kmp-azure-5.14.21-150400.14.13.1.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 5.5,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
            "version": "3.1"
          },
          "products": [
            "SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-azure-5.14.21-150400.14.13.1.aarch64",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-azure-5.14.21-150400.14.13.1.x86_64",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-azure-devel-5.14.21-150400.14.13.1.aarch64",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-azure-devel-5.14.21-150400.14.13.1.x86_64",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-devel-azure-5.14.21-150400.14.13.1.noarch",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-source-azure-5.14.21-150400.14.13.1.noarch",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-syms-azure-5.14.21-150400.14.13.1.aarch64",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-syms-azure-5.14.21-150400.14.13.1.x86_64",
            "openSUSE Leap 15.4:cluster-md-kmp-azure-5.14.21-150400.14.13.1.aarch64",
            "openSUSE Leap 15.4:cluster-md-kmp-azure-5.14.21-150400.14.13.1.x86_64",
            "openSUSE Leap 15.4:dlm-kmp-azure-5.14.21-150400.14.13.1.aarch64",
            "openSUSE Leap 15.4:dlm-kmp-azure-5.14.21-150400.14.13.1.x86_64",
            "openSUSE Leap 15.4:gfs2-kmp-azure-5.14.21-150400.14.13.1.aarch64",
            "openSUSE Leap 15.4:gfs2-kmp-azure-5.14.21-150400.14.13.1.x86_64",
            "openSUSE Leap 15.4:kernel-azure-5.14.21-150400.14.13.1.aarch64",
            "openSUSE Leap 15.4:kernel-azure-5.14.21-150400.14.13.1.x86_64",
            "openSUSE Leap 15.4:kernel-azure-devel-5.14.21-150400.14.13.1.aarch64",
            "openSUSE Leap 15.4:kernel-azure-devel-5.14.21-150400.14.13.1.x86_64",
            "openSUSE Leap 15.4:kernel-azure-extra-5.14.21-150400.14.13.1.aarch64",
            "openSUSE Leap 15.4:kernel-azure-extra-5.14.21-150400.14.13.1.x86_64",
            "openSUSE Leap 15.4:kernel-azure-livepatch-devel-5.14.21-150400.14.13.1.aarch64",
            "openSUSE Leap 15.4:kernel-azure-livepatch-devel-5.14.21-150400.14.13.1.x86_64",
            "openSUSE Leap 15.4:kernel-azure-optional-5.14.21-150400.14.13.1.aarch64",
            "openSUSE Leap 15.4:kernel-azure-optional-5.14.21-150400.14.13.1.x86_64",
            "openSUSE Leap 15.4:kernel-devel-azure-5.14.21-150400.14.13.1.noarch",
            "openSUSE Leap 15.4:kernel-source-azure-5.14.21-150400.14.13.1.noarch",
            "openSUSE Leap 15.4:kernel-syms-azure-5.14.21-150400.14.13.1.aarch64",
            "openSUSE Leap 15.4:kernel-syms-azure-5.14.21-150400.14.13.1.x86_64",
            "openSUSE Leap 15.4:kselftests-kmp-azure-5.14.21-150400.14.13.1.aarch64",
            "openSUSE Leap 15.4:kselftests-kmp-azure-5.14.21-150400.14.13.1.x86_64",
            "openSUSE Leap 15.4:ocfs2-kmp-azure-5.14.21-150400.14.13.1.aarch64",
            "openSUSE Leap 15.4:ocfs2-kmp-azure-5.14.21-150400.14.13.1.x86_64",
            "openSUSE Leap 15.4:reiserfs-kmp-azure-5.14.21-150400.14.13.1.aarch64",
            "openSUSE Leap 15.4:reiserfs-kmp-azure-5.14.21-150400.14.13.1.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2022-09-16T08:38:48Z",
          "details": "moderate"
        }
      ],
      "title": "CVE-2022-20369"
    },
    {
      "cve": "CVE-2022-2585",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2022-2585"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "It was discovered that when exec\u0027ing from a non-leader thread, armed POSIX CPU timers would be left on a list but freed, leading to a use-after-free.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-azure-5.14.21-150400.14.13.1.aarch64",
          "SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-azure-5.14.21-150400.14.13.1.x86_64",
          "SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-azure-devel-5.14.21-150400.14.13.1.aarch64",
          "SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-azure-devel-5.14.21-150400.14.13.1.x86_64",
          "SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-devel-azure-5.14.21-150400.14.13.1.noarch",
          "SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-source-azure-5.14.21-150400.14.13.1.noarch",
          "SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-syms-azure-5.14.21-150400.14.13.1.aarch64",
          "SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-syms-azure-5.14.21-150400.14.13.1.x86_64",
          "openSUSE Leap 15.4:cluster-md-kmp-azure-5.14.21-150400.14.13.1.aarch64",
          "openSUSE Leap 15.4:cluster-md-kmp-azure-5.14.21-150400.14.13.1.x86_64",
          "openSUSE Leap 15.4:dlm-kmp-azure-5.14.21-150400.14.13.1.aarch64",
          "openSUSE Leap 15.4:dlm-kmp-azure-5.14.21-150400.14.13.1.x86_64",
          "openSUSE Leap 15.4:gfs2-kmp-azure-5.14.21-150400.14.13.1.aarch64",
          "openSUSE Leap 15.4:gfs2-kmp-azure-5.14.21-150400.14.13.1.x86_64",
          "openSUSE Leap 15.4:kernel-azure-5.14.21-150400.14.13.1.aarch64",
          "openSUSE Leap 15.4:kernel-azure-5.14.21-150400.14.13.1.x86_64",
          "openSUSE Leap 15.4:kernel-azure-devel-5.14.21-150400.14.13.1.aarch64",
          "openSUSE Leap 15.4:kernel-azure-devel-5.14.21-150400.14.13.1.x86_64",
          "openSUSE Leap 15.4:kernel-azure-extra-5.14.21-150400.14.13.1.aarch64",
          "openSUSE Leap 15.4:kernel-azure-extra-5.14.21-150400.14.13.1.x86_64",
          "openSUSE Leap 15.4:kernel-azure-livepatch-devel-5.14.21-150400.14.13.1.aarch64",
          "openSUSE Leap 15.4:kernel-azure-livepatch-devel-5.14.21-150400.14.13.1.x86_64",
          "openSUSE Leap 15.4:kernel-azure-optional-5.14.21-150400.14.13.1.aarch64",
          "openSUSE Leap 15.4:kernel-azure-optional-5.14.21-150400.14.13.1.x86_64",
          "openSUSE Leap 15.4:kernel-devel-azure-5.14.21-150400.14.13.1.noarch",
          "openSUSE Leap 15.4:kernel-source-azure-5.14.21-150400.14.13.1.noarch",
          "openSUSE Leap 15.4:kernel-syms-azure-5.14.21-150400.14.13.1.aarch64",
          "openSUSE Leap 15.4:kernel-syms-azure-5.14.21-150400.14.13.1.x86_64",
          "openSUSE Leap 15.4:kselftests-kmp-azure-5.14.21-150400.14.13.1.aarch64",
          "openSUSE Leap 15.4:kselftests-kmp-azure-5.14.21-150400.14.13.1.x86_64",
          "openSUSE Leap 15.4:ocfs2-kmp-azure-5.14.21-150400.14.13.1.aarch64",
          "openSUSE Leap 15.4:ocfs2-kmp-azure-5.14.21-150400.14.13.1.x86_64",
          "openSUSE Leap 15.4:reiserfs-kmp-azure-5.14.21-150400.14.13.1.aarch64",
          "openSUSE Leap 15.4:reiserfs-kmp-azure-5.14.21-150400.14.13.1.x86_64"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2022-2585",
          "url": "https://www.suse.com/security/cve/CVE-2022-2585"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1202094 for CVE-2022-2585",
          "url": "https://bugzilla.suse.com/1202094"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1202163 for CVE-2022-2585",
          "url": "https://bugzilla.suse.com/1202163"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-azure-5.14.21-150400.14.13.1.aarch64",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-azure-5.14.21-150400.14.13.1.x86_64",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-azure-devel-5.14.21-150400.14.13.1.aarch64",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-azure-devel-5.14.21-150400.14.13.1.x86_64",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-devel-azure-5.14.21-150400.14.13.1.noarch",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-source-azure-5.14.21-150400.14.13.1.noarch",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-syms-azure-5.14.21-150400.14.13.1.aarch64",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-syms-azure-5.14.21-150400.14.13.1.x86_64",
            "openSUSE Leap 15.4:cluster-md-kmp-azure-5.14.21-150400.14.13.1.aarch64",
            "openSUSE Leap 15.4:cluster-md-kmp-azure-5.14.21-150400.14.13.1.x86_64",
            "openSUSE Leap 15.4:dlm-kmp-azure-5.14.21-150400.14.13.1.aarch64",
            "openSUSE Leap 15.4:dlm-kmp-azure-5.14.21-150400.14.13.1.x86_64",
            "openSUSE Leap 15.4:gfs2-kmp-azure-5.14.21-150400.14.13.1.aarch64",
            "openSUSE Leap 15.4:gfs2-kmp-azure-5.14.21-150400.14.13.1.x86_64",
            "openSUSE Leap 15.4:kernel-azure-5.14.21-150400.14.13.1.aarch64",
            "openSUSE Leap 15.4:kernel-azure-5.14.21-150400.14.13.1.x86_64",
            "openSUSE Leap 15.4:kernel-azure-devel-5.14.21-150400.14.13.1.aarch64",
            "openSUSE Leap 15.4:kernel-azure-devel-5.14.21-150400.14.13.1.x86_64",
            "openSUSE Leap 15.4:kernel-azure-extra-5.14.21-150400.14.13.1.aarch64",
            "openSUSE Leap 15.4:kernel-azure-extra-5.14.21-150400.14.13.1.x86_64",
            "openSUSE Leap 15.4:kernel-azure-livepatch-devel-5.14.21-150400.14.13.1.aarch64",
            "openSUSE Leap 15.4:kernel-azure-livepatch-devel-5.14.21-150400.14.13.1.x86_64",
            "openSUSE Leap 15.4:kernel-azure-optional-5.14.21-150400.14.13.1.aarch64",
            "openSUSE Leap 15.4:kernel-azure-optional-5.14.21-150400.14.13.1.x86_64",
            "openSUSE Leap 15.4:kernel-devel-azure-5.14.21-150400.14.13.1.noarch",
            "openSUSE Leap 15.4:kernel-source-azure-5.14.21-150400.14.13.1.noarch",
            "openSUSE Leap 15.4:kernel-syms-azure-5.14.21-150400.14.13.1.aarch64",
            "openSUSE Leap 15.4:kernel-syms-azure-5.14.21-150400.14.13.1.x86_64",
            "openSUSE Leap 15.4:kselftests-kmp-azure-5.14.21-150400.14.13.1.aarch64",
            "openSUSE Leap 15.4:kselftests-kmp-azure-5.14.21-150400.14.13.1.x86_64",
            "openSUSE Leap 15.4:ocfs2-kmp-azure-5.14.21-150400.14.13.1.aarch64",
            "openSUSE Leap 15.4:ocfs2-kmp-azure-5.14.21-150400.14.13.1.x86_64",
            "openSUSE Leap 15.4:reiserfs-kmp-azure-5.14.21-150400.14.13.1.aarch64",
            "openSUSE Leap 15.4:reiserfs-kmp-azure-5.14.21-150400.14.13.1.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 8.4,
            "baseSeverity": "HIGH",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
            "version": "3.1"
          },
          "products": [
            "SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-azure-5.14.21-150400.14.13.1.aarch64",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-azure-5.14.21-150400.14.13.1.x86_64",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-azure-devel-5.14.21-150400.14.13.1.aarch64",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-azure-devel-5.14.21-150400.14.13.1.x86_64",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-devel-azure-5.14.21-150400.14.13.1.noarch",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-source-azure-5.14.21-150400.14.13.1.noarch",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-syms-azure-5.14.21-150400.14.13.1.aarch64",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-syms-azure-5.14.21-150400.14.13.1.x86_64",
            "openSUSE Leap 15.4:cluster-md-kmp-azure-5.14.21-150400.14.13.1.aarch64",
            "openSUSE Leap 15.4:cluster-md-kmp-azure-5.14.21-150400.14.13.1.x86_64",
            "openSUSE Leap 15.4:dlm-kmp-azure-5.14.21-150400.14.13.1.aarch64",
            "openSUSE Leap 15.4:dlm-kmp-azure-5.14.21-150400.14.13.1.x86_64",
            "openSUSE Leap 15.4:gfs2-kmp-azure-5.14.21-150400.14.13.1.aarch64",
            "openSUSE Leap 15.4:gfs2-kmp-azure-5.14.21-150400.14.13.1.x86_64",
            "openSUSE Leap 15.4:kernel-azure-5.14.21-150400.14.13.1.aarch64",
            "openSUSE Leap 15.4:kernel-azure-5.14.21-150400.14.13.1.x86_64",
            "openSUSE Leap 15.4:kernel-azure-devel-5.14.21-150400.14.13.1.aarch64",
            "openSUSE Leap 15.4:kernel-azure-devel-5.14.21-150400.14.13.1.x86_64",
            "openSUSE Leap 15.4:kernel-azure-extra-5.14.21-150400.14.13.1.aarch64",
            "openSUSE Leap 15.4:kernel-azure-extra-5.14.21-150400.14.13.1.x86_64",
            "openSUSE Leap 15.4:kernel-azure-livepatch-devel-5.14.21-150400.14.13.1.aarch64",
            "openSUSE Leap 15.4:kernel-azure-livepatch-devel-5.14.21-150400.14.13.1.x86_64",
            "openSUSE Leap 15.4:kernel-azure-optional-5.14.21-150400.14.13.1.aarch64",
            "openSUSE Leap 15.4:kernel-azure-optional-5.14.21-150400.14.13.1.x86_64",
            "openSUSE Leap 15.4:kernel-devel-azure-5.14.21-150400.14.13.1.noarch",
            "openSUSE Leap 15.4:kernel-source-azure-5.14.21-150400.14.13.1.noarch",
            "openSUSE Leap 15.4:kernel-syms-azure-5.14.21-150400.14.13.1.aarch64",
            "openSUSE Leap 15.4:kernel-syms-azure-5.14.21-150400.14.13.1.x86_64",
            "openSUSE Leap 15.4:kselftests-kmp-azure-5.14.21-150400.14.13.1.aarch64",
            "openSUSE Leap 15.4:kselftests-kmp-azure-5.14.21-150400.14.13.1.x86_64",
            "openSUSE Leap 15.4:ocfs2-kmp-azure-5.14.21-150400.14.13.1.aarch64",
            "openSUSE Leap 15.4:ocfs2-kmp-azure-5.14.21-150400.14.13.1.x86_64",
            "openSUSE Leap 15.4:reiserfs-kmp-azure-5.14.21-150400.14.13.1.aarch64",
            "openSUSE Leap 15.4:reiserfs-kmp-azure-5.14.21-150400.14.13.1.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2022-09-16T08:38:48Z",
          "details": "important"
        }
      ],
      "title": "CVE-2022-2585"
    },
    {
      "cve": "CVE-2022-2588",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2022-2588"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "It was discovered that the cls_route filter implementation in the Linux kernel would not remove an old filter from the hashtable before freeing it if its handle had the value 0.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-azure-5.14.21-150400.14.13.1.aarch64",
          "SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-azure-5.14.21-150400.14.13.1.x86_64",
          "SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-azure-devel-5.14.21-150400.14.13.1.aarch64",
          "SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-azure-devel-5.14.21-150400.14.13.1.x86_64",
          "SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-devel-azure-5.14.21-150400.14.13.1.noarch",
          "SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-source-azure-5.14.21-150400.14.13.1.noarch",
          "SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-syms-azure-5.14.21-150400.14.13.1.aarch64",
          "SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-syms-azure-5.14.21-150400.14.13.1.x86_64",
          "openSUSE Leap 15.4:cluster-md-kmp-azure-5.14.21-150400.14.13.1.aarch64",
          "openSUSE Leap 15.4:cluster-md-kmp-azure-5.14.21-150400.14.13.1.x86_64",
          "openSUSE Leap 15.4:dlm-kmp-azure-5.14.21-150400.14.13.1.aarch64",
          "openSUSE Leap 15.4:dlm-kmp-azure-5.14.21-150400.14.13.1.x86_64",
          "openSUSE Leap 15.4:gfs2-kmp-azure-5.14.21-150400.14.13.1.aarch64",
          "openSUSE Leap 15.4:gfs2-kmp-azure-5.14.21-150400.14.13.1.x86_64",
          "openSUSE Leap 15.4:kernel-azure-5.14.21-150400.14.13.1.aarch64",
          "openSUSE Leap 15.4:kernel-azure-5.14.21-150400.14.13.1.x86_64",
          "openSUSE Leap 15.4:kernel-azure-devel-5.14.21-150400.14.13.1.aarch64",
          "openSUSE Leap 15.4:kernel-azure-devel-5.14.21-150400.14.13.1.x86_64",
          "openSUSE Leap 15.4:kernel-azure-extra-5.14.21-150400.14.13.1.aarch64",
          "openSUSE Leap 15.4:kernel-azure-extra-5.14.21-150400.14.13.1.x86_64",
          "openSUSE Leap 15.4:kernel-azure-livepatch-devel-5.14.21-150400.14.13.1.aarch64",
          "openSUSE Leap 15.4:kernel-azure-livepatch-devel-5.14.21-150400.14.13.1.x86_64",
          "openSUSE Leap 15.4:kernel-azure-optional-5.14.21-150400.14.13.1.aarch64",
          "openSUSE Leap 15.4:kernel-azure-optional-5.14.21-150400.14.13.1.x86_64",
          "openSUSE Leap 15.4:kernel-devel-azure-5.14.21-150400.14.13.1.noarch",
          "openSUSE Leap 15.4:kernel-source-azure-5.14.21-150400.14.13.1.noarch",
          "openSUSE Leap 15.4:kernel-syms-azure-5.14.21-150400.14.13.1.aarch64",
          "openSUSE Leap 15.4:kernel-syms-azure-5.14.21-150400.14.13.1.x86_64",
          "openSUSE Leap 15.4:kselftests-kmp-azure-5.14.21-150400.14.13.1.aarch64",
          "openSUSE Leap 15.4:kselftests-kmp-azure-5.14.21-150400.14.13.1.x86_64",
          "openSUSE Leap 15.4:ocfs2-kmp-azure-5.14.21-150400.14.13.1.aarch64",
          "openSUSE Leap 15.4:ocfs2-kmp-azure-5.14.21-150400.14.13.1.x86_64",
          "openSUSE Leap 15.4:reiserfs-kmp-azure-5.14.21-150400.14.13.1.aarch64",
          "openSUSE Leap 15.4:reiserfs-kmp-azure-5.14.21-150400.14.13.1.x86_64"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2022-2588",
          "url": "https://www.suse.com/security/cve/CVE-2022-2588"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1202096 for CVE-2022-2588",
          "url": "https://bugzilla.suse.com/1202096"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1203613 for CVE-2022-2588",
          "url": "https://bugzilla.suse.com/1203613"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1204183 for CVE-2022-2588",
          "url": "https://bugzilla.suse.com/1204183"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1209225 for CVE-2022-2588",
          "url": "https://bugzilla.suse.com/1209225"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-azure-5.14.21-150400.14.13.1.aarch64",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-azure-5.14.21-150400.14.13.1.x86_64",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-azure-devel-5.14.21-150400.14.13.1.aarch64",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-azure-devel-5.14.21-150400.14.13.1.x86_64",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-devel-azure-5.14.21-150400.14.13.1.noarch",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-source-azure-5.14.21-150400.14.13.1.noarch",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-syms-azure-5.14.21-150400.14.13.1.aarch64",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-syms-azure-5.14.21-150400.14.13.1.x86_64",
            "openSUSE Leap 15.4:cluster-md-kmp-azure-5.14.21-150400.14.13.1.aarch64",
            "openSUSE Leap 15.4:cluster-md-kmp-azure-5.14.21-150400.14.13.1.x86_64",
            "openSUSE Leap 15.4:dlm-kmp-azure-5.14.21-150400.14.13.1.aarch64",
            "openSUSE Leap 15.4:dlm-kmp-azure-5.14.21-150400.14.13.1.x86_64",
            "openSUSE Leap 15.4:gfs2-kmp-azure-5.14.21-150400.14.13.1.aarch64",
            "openSUSE Leap 15.4:gfs2-kmp-azure-5.14.21-150400.14.13.1.x86_64",
            "openSUSE Leap 15.4:kernel-azure-5.14.21-150400.14.13.1.aarch64",
            "openSUSE Leap 15.4:kernel-azure-5.14.21-150400.14.13.1.x86_64",
            "openSUSE Leap 15.4:kernel-azure-devel-5.14.21-150400.14.13.1.aarch64",
            "openSUSE Leap 15.4:kernel-azure-devel-5.14.21-150400.14.13.1.x86_64",
            "openSUSE Leap 15.4:kernel-azure-extra-5.14.21-150400.14.13.1.aarch64",
            "openSUSE Leap 15.4:kernel-azure-extra-5.14.21-150400.14.13.1.x86_64",
            "openSUSE Leap 15.4:kernel-azure-livepatch-devel-5.14.21-150400.14.13.1.aarch64",
            "openSUSE Leap 15.4:kernel-azure-livepatch-devel-5.14.21-150400.14.13.1.x86_64",
            "openSUSE Leap 15.4:kernel-azure-optional-5.14.21-150400.14.13.1.aarch64",
            "openSUSE Leap 15.4:kernel-azure-optional-5.14.21-150400.14.13.1.x86_64",
            "openSUSE Leap 15.4:kernel-devel-azure-5.14.21-150400.14.13.1.noarch",
            "openSUSE Leap 15.4:kernel-source-azure-5.14.21-150400.14.13.1.noarch",
            "openSUSE Leap 15.4:kernel-syms-azure-5.14.21-150400.14.13.1.aarch64",
            "openSUSE Leap 15.4:kernel-syms-azure-5.14.21-150400.14.13.1.x86_64",
            "openSUSE Leap 15.4:kselftests-kmp-azure-5.14.21-150400.14.13.1.aarch64",
            "openSUSE Leap 15.4:kselftests-kmp-azure-5.14.21-150400.14.13.1.x86_64",
            "openSUSE Leap 15.4:ocfs2-kmp-azure-5.14.21-150400.14.13.1.aarch64",
            "openSUSE Leap 15.4:ocfs2-kmp-azure-5.14.21-150400.14.13.1.x86_64",
            "openSUSE Leap 15.4:reiserfs-kmp-azure-5.14.21-150400.14.13.1.aarch64",
            "openSUSE Leap 15.4:reiserfs-kmp-azure-5.14.21-150400.14.13.1.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 7.8,
            "baseSeverity": "HIGH",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
            "version": "3.1"
          },
          "products": [
            "SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-azure-5.14.21-150400.14.13.1.aarch64",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-azure-5.14.21-150400.14.13.1.x86_64",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-azure-devel-5.14.21-150400.14.13.1.aarch64",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-azure-devel-5.14.21-150400.14.13.1.x86_64",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-devel-azure-5.14.21-150400.14.13.1.noarch",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-source-azure-5.14.21-150400.14.13.1.noarch",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-syms-azure-5.14.21-150400.14.13.1.aarch64",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-syms-azure-5.14.21-150400.14.13.1.x86_64",
            "openSUSE Leap 15.4:cluster-md-kmp-azure-5.14.21-150400.14.13.1.aarch64",
            "openSUSE Leap 15.4:cluster-md-kmp-azure-5.14.21-150400.14.13.1.x86_64",
            "openSUSE Leap 15.4:dlm-kmp-azure-5.14.21-150400.14.13.1.aarch64",
            "openSUSE Leap 15.4:dlm-kmp-azure-5.14.21-150400.14.13.1.x86_64",
            "openSUSE Leap 15.4:gfs2-kmp-azure-5.14.21-150400.14.13.1.aarch64",
            "openSUSE Leap 15.4:gfs2-kmp-azure-5.14.21-150400.14.13.1.x86_64",
            "openSUSE Leap 15.4:kernel-azure-5.14.21-150400.14.13.1.aarch64",
            "openSUSE Leap 15.4:kernel-azure-5.14.21-150400.14.13.1.x86_64",
            "openSUSE Leap 15.4:kernel-azure-devel-5.14.21-150400.14.13.1.aarch64",
            "openSUSE Leap 15.4:kernel-azure-devel-5.14.21-150400.14.13.1.x86_64",
            "openSUSE Leap 15.4:kernel-azure-extra-5.14.21-150400.14.13.1.aarch64",
            "openSUSE Leap 15.4:kernel-azure-extra-5.14.21-150400.14.13.1.x86_64",
            "openSUSE Leap 15.4:kernel-azure-livepatch-devel-5.14.21-150400.14.13.1.aarch64",
            "openSUSE Leap 15.4:kernel-azure-livepatch-devel-5.14.21-150400.14.13.1.x86_64",
            "openSUSE Leap 15.4:kernel-azure-optional-5.14.21-150400.14.13.1.aarch64",
            "openSUSE Leap 15.4:kernel-azure-optional-5.14.21-150400.14.13.1.x86_64",
            "openSUSE Leap 15.4:kernel-devel-azure-5.14.21-150400.14.13.1.noarch",
            "openSUSE Leap 15.4:kernel-source-azure-5.14.21-150400.14.13.1.noarch",
            "openSUSE Leap 15.4:kernel-syms-azure-5.14.21-150400.14.13.1.aarch64",
            "openSUSE Leap 15.4:kernel-syms-azure-5.14.21-150400.14.13.1.x86_64",
            "openSUSE Leap 15.4:kselftests-kmp-azure-5.14.21-150400.14.13.1.aarch64",
            "openSUSE Leap 15.4:kselftests-kmp-azure-5.14.21-150400.14.13.1.x86_64",
            "openSUSE Leap 15.4:ocfs2-kmp-azure-5.14.21-150400.14.13.1.aarch64",
            "openSUSE Leap 15.4:ocfs2-kmp-azure-5.14.21-150400.14.13.1.x86_64",
            "openSUSE Leap 15.4:reiserfs-kmp-azure-5.14.21-150400.14.13.1.aarch64",
            "openSUSE Leap 15.4:reiserfs-kmp-azure-5.14.21-150400.14.13.1.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2022-09-16T08:38:48Z",
          "details": "important"
        }
      ],
      "title": "CVE-2022-2588"
    },
    {
      "cve": "CVE-2022-26373",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2022-26373"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "Non-transparent sharing of return predictor targets between contexts in some Intel(R) Processors may allow an authorized user to potentially enable information disclosure via local access.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-azure-5.14.21-150400.14.13.1.aarch64",
          "SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-azure-5.14.21-150400.14.13.1.x86_64",
          "SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-azure-devel-5.14.21-150400.14.13.1.aarch64",
          "SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-azure-devel-5.14.21-150400.14.13.1.x86_64",
          "SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-devel-azure-5.14.21-150400.14.13.1.noarch",
          "SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-source-azure-5.14.21-150400.14.13.1.noarch",
          "SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-syms-azure-5.14.21-150400.14.13.1.aarch64",
          "SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-syms-azure-5.14.21-150400.14.13.1.x86_64",
          "openSUSE Leap 15.4:cluster-md-kmp-azure-5.14.21-150400.14.13.1.aarch64",
          "openSUSE Leap 15.4:cluster-md-kmp-azure-5.14.21-150400.14.13.1.x86_64",
          "openSUSE Leap 15.4:dlm-kmp-azure-5.14.21-150400.14.13.1.aarch64",
          "openSUSE Leap 15.4:dlm-kmp-azure-5.14.21-150400.14.13.1.x86_64",
          "openSUSE Leap 15.4:gfs2-kmp-azure-5.14.21-150400.14.13.1.aarch64",
          "openSUSE Leap 15.4:gfs2-kmp-azure-5.14.21-150400.14.13.1.x86_64",
          "openSUSE Leap 15.4:kernel-azure-5.14.21-150400.14.13.1.aarch64",
          "openSUSE Leap 15.4:kernel-azure-5.14.21-150400.14.13.1.x86_64",
          "openSUSE Leap 15.4:kernel-azure-devel-5.14.21-150400.14.13.1.aarch64",
          "openSUSE Leap 15.4:kernel-azure-devel-5.14.21-150400.14.13.1.x86_64",
          "openSUSE Leap 15.4:kernel-azure-extra-5.14.21-150400.14.13.1.aarch64",
          "openSUSE Leap 15.4:kernel-azure-extra-5.14.21-150400.14.13.1.x86_64",
          "openSUSE Leap 15.4:kernel-azure-livepatch-devel-5.14.21-150400.14.13.1.aarch64",
          "openSUSE Leap 15.4:kernel-azure-livepatch-devel-5.14.21-150400.14.13.1.x86_64",
          "openSUSE Leap 15.4:kernel-azure-optional-5.14.21-150400.14.13.1.aarch64",
          "openSUSE Leap 15.4:kernel-azure-optional-5.14.21-150400.14.13.1.x86_64",
          "openSUSE Leap 15.4:kernel-devel-azure-5.14.21-150400.14.13.1.noarch",
          "openSUSE Leap 15.4:kernel-source-azure-5.14.21-150400.14.13.1.noarch",
          "openSUSE Leap 15.4:kernel-syms-azure-5.14.21-150400.14.13.1.aarch64",
          "openSUSE Leap 15.4:kernel-syms-azure-5.14.21-150400.14.13.1.x86_64",
          "openSUSE Leap 15.4:kselftests-kmp-azure-5.14.21-150400.14.13.1.aarch64",
          "openSUSE Leap 15.4:kselftests-kmp-azure-5.14.21-150400.14.13.1.x86_64",
          "openSUSE Leap 15.4:ocfs2-kmp-azure-5.14.21-150400.14.13.1.aarch64",
          "openSUSE Leap 15.4:ocfs2-kmp-azure-5.14.21-150400.14.13.1.x86_64",
          "openSUSE Leap 15.4:reiserfs-kmp-azure-5.14.21-150400.14.13.1.aarch64",
          "openSUSE Leap 15.4:reiserfs-kmp-azure-5.14.21-150400.14.13.1.x86_64"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2022-26373",
          "url": "https://www.suse.com/security/cve/CVE-2022-26373"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1201726 for CVE-2022-26373",
          "url": "https://bugzilla.suse.com/1201726"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1209619 for CVE-2022-26373",
          "url": "https://bugzilla.suse.com/1209619"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-azure-5.14.21-150400.14.13.1.aarch64",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-azure-5.14.21-150400.14.13.1.x86_64",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-azure-devel-5.14.21-150400.14.13.1.aarch64",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-azure-devel-5.14.21-150400.14.13.1.x86_64",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-devel-azure-5.14.21-150400.14.13.1.noarch",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-source-azure-5.14.21-150400.14.13.1.noarch",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-syms-azure-5.14.21-150400.14.13.1.aarch64",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-syms-azure-5.14.21-150400.14.13.1.x86_64",
            "openSUSE Leap 15.4:cluster-md-kmp-azure-5.14.21-150400.14.13.1.aarch64",
            "openSUSE Leap 15.4:cluster-md-kmp-azure-5.14.21-150400.14.13.1.x86_64",
            "openSUSE Leap 15.4:dlm-kmp-azure-5.14.21-150400.14.13.1.aarch64",
            "openSUSE Leap 15.4:dlm-kmp-azure-5.14.21-150400.14.13.1.x86_64",
            "openSUSE Leap 15.4:gfs2-kmp-azure-5.14.21-150400.14.13.1.aarch64",
            "openSUSE Leap 15.4:gfs2-kmp-azure-5.14.21-150400.14.13.1.x86_64",
            "openSUSE Leap 15.4:kernel-azure-5.14.21-150400.14.13.1.aarch64",
            "openSUSE Leap 15.4:kernel-azure-5.14.21-150400.14.13.1.x86_64",
            "openSUSE Leap 15.4:kernel-azure-devel-5.14.21-150400.14.13.1.aarch64",
            "openSUSE Leap 15.4:kernel-azure-devel-5.14.21-150400.14.13.1.x86_64",
            "openSUSE Leap 15.4:kernel-azure-extra-5.14.21-150400.14.13.1.aarch64",
            "openSUSE Leap 15.4:kernel-azure-extra-5.14.21-150400.14.13.1.x86_64",
            "openSUSE Leap 15.4:kernel-azure-livepatch-devel-5.14.21-150400.14.13.1.aarch64",
            "openSUSE Leap 15.4:kernel-azure-livepatch-devel-5.14.21-150400.14.13.1.x86_64",
            "openSUSE Leap 15.4:kernel-azure-optional-5.14.21-150400.14.13.1.aarch64",
            "openSUSE Leap 15.4:kernel-azure-optional-5.14.21-150400.14.13.1.x86_64",
            "openSUSE Leap 15.4:kernel-devel-azure-5.14.21-150400.14.13.1.noarch",
            "openSUSE Leap 15.4:kernel-source-azure-5.14.21-150400.14.13.1.noarch",
            "openSUSE Leap 15.4:kernel-syms-azure-5.14.21-150400.14.13.1.aarch64",
            "openSUSE Leap 15.4:kernel-syms-azure-5.14.21-150400.14.13.1.x86_64",
            "openSUSE Leap 15.4:kselftests-kmp-azure-5.14.21-150400.14.13.1.aarch64",
            "openSUSE Leap 15.4:kselftests-kmp-azure-5.14.21-150400.14.13.1.x86_64",
            "openSUSE Leap 15.4:ocfs2-kmp-azure-5.14.21-150400.14.13.1.aarch64",
            "openSUSE Leap 15.4:ocfs2-kmp-azure-5.14.21-150400.14.13.1.x86_64",
            "openSUSE Leap 15.4:reiserfs-kmp-azure-5.14.21-150400.14.13.1.aarch64",
            "openSUSE Leap 15.4:reiserfs-kmp-azure-5.14.21-150400.14.13.1.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 5.5,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N",
            "version": "3.1"
          },
          "products": [
            "SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-azure-5.14.21-150400.14.13.1.aarch64",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-azure-5.14.21-150400.14.13.1.x86_64",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-azure-devel-5.14.21-150400.14.13.1.aarch64",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-azure-devel-5.14.21-150400.14.13.1.x86_64",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-devel-azure-5.14.21-150400.14.13.1.noarch",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-source-azure-5.14.21-150400.14.13.1.noarch",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-syms-azure-5.14.21-150400.14.13.1.aarch64",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-syms-azure-5.14.21-150400.14.13.1.x86_64",
            "openSUSE Leap 15.4:cluster-md-kmp-azure-5.14.21-150400.14.13.1.aarch64",
            "openSUSE Leap 15.4:cluster-md-kmp-azure-5.14.21-150400.14.13.1.x86_64",
            "openSUSE Leap 15.4:dlm-kmp-azure-5.14.21-150400.14.13.1.aarch64",
            "openSUSE Leap 15.4:dlm-kmp-azure-5.14.21-150400.14.13.1.x86_64",
            "openSUSE Leap 15.4:gfs2-kmp-azure-5.14.21-150400.14.13.1.aarch64",
            "openSUSE Leap 15.4:gfs2-kmp-azure-5.14.21-150400.14.13.1.x86_64",
            "openSUSE Leap 15.4:kernel-azure-5.14.21-150400.14.13.1.aarch64",
            "openSUSE Leap 15.4:kernel-azure-5.14.21-150400.14.13.1.x86_64",
            "openSUSE Leap 15.4:kernel-azure-devel-5.14.21-150400.14.13.1.aarch64",
            "openSUSE Leap 15.4:kernel-azure-devel-5.14.21-150400.14.13.1.x86_64",
            "openSUSE Leap 15.4:kernel-azure-extra-5.14.21-150400.14.13.1.aarch64",
            "openSUSE Leap 15.4:kernel-azure-extra-5.14.21-150400.14.13.1.x86_64",
            "openSUSE Leap 15.4:kernel-azure-livepatch-devel-5.14.21-150400.14.13.1.aarch64",
            "openSUSE Leap 15.4:kernel-azure-livepatch-devel-5.14.21-150400.14.13.1.x86_64",
            "openSUSE Leap 15.4:kernel-azure-optional-5.14.21-150400.14.13.1.aarch64",
            "openSUSE Leap 15.4:kernel-azure-optional-5.14.21-150400.14.13.1.x86_64",
            "openSUSE Leap 15.4:kernel-devel-azure-5.14.21-150400.14.13.1.noarch",
            "openSUSE Leap 15.4:kernel-source-azure-5.14.21-150400.14.13.1.noarch",
            "openSUSE Leap 15.4:kernel-syms-azure-5.14.21-150400.14.13.1.aarch64",
            "openSUSE Leap 15.4:kernel-syms-azure-5.14.21-150400.14.13.1.x86_64",
            "openSUSE Leap 15.4:kselftests-kmp-azure-5.14.21-150400.14.13.1.aarch64",
            "openSUSE Leap 15.4:kselftests-kmp-azure-5.14.21-150400.14.13.1.x86_64",
            "openSUSE Leap 15.4:ocfs2-kmp-azure-5.14.21-150400.14.13.1.aarch64",
            "openSUSE Leap 15.4:ocfs2-kmp-azure-5.14.21-150400.14.13.1.x86_64",
            "openSUSE Leap 15.4:reiserfs-kmp-azure-5.14.21-150400.14.13.1.aarch64",
            "openSUSE Leap 15.4:reiserfs-kmp-azure-5.14.21-150400.14.13.1.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2022-09-16T08:38:48Z",
          "details": "moderate"
        }
      ],
      "title": "CVE-2022-26373"
    },
    {
      "cve": "CVE-2022-2639",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2022-2639"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "An integer coercion error was found in the openvswitch kernel module. Given a sufficiently large number of actions, while copying and reserving memory for a new action of a new flow, the reserve_sfa_size() function does not return -EMSGSIZE as expected, potentially leading to an out-of-bounds write access. This flaw allows a local user to crash or potentially escalate their privileges on the system.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-azure-5.14.21-150400.14.13.1.aarch64",
          "SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-azure-5.14.21-150400.14.13.1.x86_64",
          "SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-azure-devel-5.14.21-150400.14.13.1.aarch64",
          "SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-azure-devel-5.14.21-150400.14.13.1.x86_64",
          "SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-devel-azure-5.14.21-150400.14.13.1.noarch",
          "SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-source-azure-5.14.21-150400.14.13.1.noarch",
          "SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-syms-azure-5.14.21-150400.14.13.1.aarch64",
          "SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-syms-azure-5.14.21-150400.14.13.1.x86_64",
          "openSUSE Leap 15.4:cluster-md-kmp-azure-5.14.21-150400.14.13.1.aarch64",
          "openSUSE Leap 15.4:cluster-md-kmp-azure-5.14.21-150400.14.13.1.x86_64",
          "openSUSE Leap 15.4:dlm-kmp-azure-5.14.21-150400.14.13.1.aarch64",
          "openSUSE Leap 15.4:dlm-kmp-azure-5.14.21-150400.14.13.1.x86_64",
          "openSUSE Leap 15.4:gfs2-kmp-azure-5.14.21-150400.14.13.1.aarch64",
          "openSUSE Leap 15.4:gfs2-kmp-azure-5.14.21-150400.14.13.1.x86_64",
          "openSUSE Leap 15.4:kernel-azure-5.14.21-150400.14.13.1.aarch64",
          "openSUSE Leap 15.4:kernel-azure-5.14.21-150400.14.13.1.x86_64",
          "openSUSE Leap 15.4:kernel-azure-devel-5.14.21-150400.14.13.1.aarch64",
          "openSUSE Leap 15.4:kernel-azure-devel-5.14.21-150400.14.13.1.x86_64",
          "openSUSE Leap 15.4:kernel-azure-extra-5.14.21-150400.14.13.1.aarch64",
          "openSUSE Leap 15.4:kernel-azure-extra-5.14.21-150400.14.13.1.x86_64",
          "openSUSE Leap 15.4:kernel-azure-livepatch-devel-5.14.21-150400.14.13.1.aarch64",
          "openSUSE Leap 15.4:kernel-azure-livepatch-devel-5.14.21-150400.14.13.1.x86_64",
          "openSUSE Leap 15.4:kernel-azure-optional-5.14.21-150400.14.13.1.aarch64",
          "openSUSE Leap 15.4:kernel-azure-optional-5.14.21-150400.14.13.1.x86_64",
          "openSUSE Leap 15.4:kernel-devel-azure-5.14.21-150400.14.13.1.noarch",
          "openSUSE Leap 15.4:kernel-source-azure-5.14.21-150400.14.13.1.noarch",
          "openSUSE Leap 15.4:kernel-syms-azure-5.14.21-150400.14.13.1.aarch64",
          "openSUSE Leap 15.4:kernel-syms-azure-5.14.21-150400.14.13.1.x86_64",
          "openSUSE Leap 15.4:kselftests-kmp-azure-5.14.21-150400.14.13.1.aarch64",
          "openSUSE Leap 15.4:kselftests-kmp-azure-5.14.21-150400.14.13.1.x86_64",
          "openSUSE Leap 15.4:ocfs2-kmp-azure-5.14.21-150400.14.13.1.aarch64",
          "openSUSE Leap 15.4:ocfs2-kmp-azure-5.14.21-150400.14.13.1.x86_64",
          "openSUSE Leap 15.4:reiserfs-kmp-azure-5.14.21-150400.14.13.1.aarch64",
          "openSUSE Leap 15.4:reiserfs-kmp-azure-5.14.21-150400.14.13.1.x86_64"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2022-2639",
          "url": "https://www.suse.com/security/cve/CVE-2022-2639"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1202154 for CVE-2022-2639",
          "url": "https://bugzilla.suse.com/1202154"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-azure-5.14.21-150400.14.13.1.aarch64",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-azure-5.14.21-150400.14.13.1.x86_64",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-azure-devel-5.14.21-150400.14.13.1.aarch64",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-azure-devel-5.14.21-150400.14.13.1.x86_64",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-devel-azure-5.14.21-150400.14.13.1.noarch",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-source-azure-5.14.21-150400.14.13.1.noarch",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-syms-azure-5.14.21-150400.14.13.1.aarch64",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-syms-azure-5.14.21-150400.14.13.1.x86_64",
            "openSUSE Leap 15.4:cluster-md-kmp-azure-5.14.21-150400.14.13.1.aarch64",
            "openSUSE Leap 15.4:cluster-md-kmp-azure-5.14.21-150400.14.13.1.x86_64",
            "openSUSE Leap 15.4:dlm-kmp-azure-5.14.21-150400.14.13.1.aarch64",
            "openSUSE Leap 15.4:dlm-kmp-azure-5.14.21-150400.14.13.1.x86_64",
            "openSUSE Leap 15.4:gfs2-kmp-azure-5.14.21-150400.14.13.1.aarch64",
            "openSUSE Leap 15.4:gfs2-kmp-azure-5.14.21-150400.14.13.1.x86_64",
            "openSUSE Leap 15.4:kernel-azure-5.14.21-150400.14.13.1.aarch64",
            "openSUSE Leap 15.4:kernel-azure-5.14.21-150400.14.13.1.x86_64",
            "openSUSE Leap 15.4:kernel-azure-devel-5.14.21-150400.14.13.1.aarch64",
            "openSUSE Leap 15.4:kernel-azure-devel-5.14.21-150400.14.13.1.x86_64",
            "openSUSE Leap 15.4:kernel-azure-extra-5.14.21-150400.14.13.1.aarch64",
            "openSUSE Leap 15.4:kernel-azure-extra-5.14.21-150400.14.13.1.x86_64",
            "openSUSE Leap 15.4:kernel-azure-livepatch-devel-5.14.21-150400.14.13.1.aarch64",
            "openSUSE Leap 15.4:kernel-azure-livepatch-devel-5.14.21-150400.14.13.1.x86_64",
            "openSUSE Leap 15.4:kernel-azure-optional-5.14.21-150400.14.13.1.aarch64",
            "openSUSE Leap 15.4:kernel-azure-optional-5.14.21-150400.14.13.1.x86_64",
            "openSUSE Leap 15.4:kernel-devel-azure-5.14.21-150400.14.13.1.noarch",
            "openSUSE Leap 15.4:kernel-source-azure-5.14.21-150400.14.13.1.noarch",
            "openSUSE Leap 15.4:kernel-syms-azure-5.14.21-150400.14.13.1.aarch64",
            "openSUSE Leap 15.4:kernel-syms-azure-5.14.21-150400.14.13.1.x86_64",
            "openSUSE Leap 15.4:kselftests-kmp-azure-5.14.21-150400.14.13.1.aarch64",
            "openSUSE Leap 15.4:kselftests-kmp-azure-5.14.21-150400.14.13.1.x86_64",
            "openSUSE Leap 15.4:ocfs2-kmp-azure-5.14.21-150400.14.13.1.aarch64",
            "openSUSE Leap 15.4:ocfs2-kmp-azure-5.14.21-150400.14.13.1.x86_64",
            "openSUSE Leap 15.4:reiserfs-kmp-azure-5.14.21-150400.14.13.1.aarch64",
            "openSUSE Leap 15.4:reiserfs-kmp-azure-5.14.21-150400.14.13.1.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 6.1,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:H",
            "version": "3.1"
          },
          "products": [
            "SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-azure-5.14.21-150400.14.13.1.aarch64",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-azure-5.14.21-150400.14.13.1.x86_64",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-azure-devel-5.14.21-150400.14.13.1.aarch64",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-azure-devel-5.14.21-150400.14.13.1.x86_64",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-devel-azure-5.14.21-150400.14.13.1.noarch",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-source-azure-5.14.21-150400.14.13.1.noarch",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-syms-azure-5.14.21-150400.14.13.1.aarch64",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-syms-azure-5.14.21-150400.14.13.1.x86_64",
            "openSUSE Leap 15.4:cluster-md-kmp-azure-5.14.21-150400.14.13.1.aarch64",
            "openSUSE Leap 15.4:cluster-md-kmp-azure-5.14.21-150400.14.13.1.x86_64",
            "openSUSE Leap 15.4:dlm-kmp-azure-5.14.21-150400.14.13.1.aarch64",
            "openSUSE Leap 15.4:dlm-kmp-azure-5.14.21-150400.14.13.1.x86_64",
            "openSUSE Leap 15.4:gfs2-kmp-azure-5.14.21-150400.14.13.1.aarch64",
            "openSUSE Leap 15.4:gfs2-kmp-azure-5.14.21-150400.14.13.1.x86_64",
            "openSUSE Leap 15.4:kernel-azure-5.14.21-150400.14.13.1.aarch64",
            "openSUSE Leap 15.4:kernel-azure-5.14.21-150400.14.13.1.x86_64",
            "openSUSE Leap 15.4:kernel-azure-devel-5.14.21-150400.14.13.1.aarch64",
            "openSUSE Leap 15.4:kernel-azure-devel-5.14.21-150400.14.13.1.x86_64",
            "openSUSE Leap 15.4:kernel-azure-extra-5.14.21-150400.14.13.1.aarch64",
            "openSUSE Leap 15.4:kernel-azure-extra-5.14.21-150400.14.13.1.x86_64",
            "openSUSE Leap 15.4:kernel-azure-livepatch-devel-5.14.21-150400.14.13.1.aarch64",
            "openSUSE Leap 15.4:kernel-azure-livepatch-devel-5.14.21-150400.14.13.1.x86_64",
            "openSUSE Leap 15.4:kernel-azure-optional-5.14.21-150400.14.13.1.aarch64",
            "openSUSE Leap 15.4:kernel-azure-optional-5.14.21-150400.14.13.1.x86_64",
            "openSUSE Leap 15.4:kernel-devel-azure-5.14.21-150400.14.13.1.noarch",
            "openSUSE Leap 15.4:kernel-source-azure-5.14.21-150400.14.13.1.noarch",
            "openSUSE Leap 15.4:kernel-syms-azure-5.14.21-150400.14.13.1.aarch64",
            "openSUSE Leap 15.4:kernel-syms-azure-5.14.21-150400.14.13.1.x86_64",
            "openSUSE Leap 15.4:kselftests-kmp-azure-5.14.21-150400.14.13.1.aarch64",
            "openSUSE Leap 15.4:kselftests-kmp-azure-5.14.21-150400.14.13.1.x86_64",
            "openSUSE Leap 15.4:ocfs2-kmp-azure-5.14.21-150400.14.13.1.aarch64",
            "openSUSE Leap 15.4:ocfs2-kmp-azure-5.14.21-150400.14.13.1.x86_64",
            "openSUSE Leap 15.4:reiserfs-kmp-azure-5.14.21-150400.14.13.1.aarch64",
            "openSUSE Leap 15.4:reiserfs-kmp-azure-5.14.21-150400.14.13.1.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2022-09-16T08:38:48Z",
          "details": "moderate"
        }
      ],
      "title": "CVE-2022-2639"
    },
    {
      "cve": "CVE-2022-2663",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2022-2663"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "An issue was found in the Linux kernel in nf_conntrack_irc where the message handling can be confused and incorrectly matches the message. A firewall may be able to be bypassed when users are using unencrypted IRC with nf_conntrack_irc configured.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-azure-5.14.21-150400.14.13.1.aarch64",
          "SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-azure-5.14.21-150400.14.13.1.x86_64",
          "SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-azure-devel-5.14.21-150400.14.13.1.aarch64",
          "SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-azure-devel-5.14.21-150400.14.13.1.x86_64",
          "SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-devel-azure-5.14.21-150400.14.13.1.noarch",
          "SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-source-azure-5.14.21-150400.14.13.1.noarch",
          "SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-syms-azure-5.14.21-150400.14.13.1.aarch64",
          "SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-syms-azure-5.14.21-150400.14.13.1.x86_64",
          "openSUSE Leap 15.4:cluster-md-kmp-azure-5.14.21-150400.14.13.1.aarch64",
          "openSUSE Leap 15.4:cluster-md-kmp-azure-5.14.21-150400.14.13.1.x86_64",
          "openSUSE Leap 15.4:dlm-kmp-azure-5.14.21-150400.14.13.1.aarch64",
          "openSUSE Leap 15.4:dlm-kmp-azure-5.14.21-150400.14.13.1.x86_64",
          "openSUSE Leap 15.4:gfs2-kmp-azure-5.14.21-150400.14.13.1.aarch64",
          "openSUSE Leap 15.4:gfs2-kmp-azure-5.14.21-150400.14.13.1.x86_64",
          "openSUSE Leap 15.4:kernel-azure-5.14.21-150400.14.13.1.aarch64",
          "openSUSE Leap 15.4:kernel-azure-5.14.21-150400.14.13.1.x86_64",
          "openSUSE Leap 15.4:kernel-azure-devel-5.14.21-150400.14.13.1.aarch64",
          "openSUSE Leap 15.4:kernel-azure-devel-5.14.21-150400.14.13.1.x86_64",
          "openSUSE Leap 15.4:kernel-azure-extra-5.14.21-150400.14.13.1.aarch64",
          "openSUSE Leap 15.4:kernel-azure-extra-5.14.21-150400.14.13.1.x86_64",
          "openSUSE Leap 15.4:kernel-azure-livepatch-devel-5.14.21-150400.14.13.1.aarch64",
          "openSUSE Leap 15.4:kernel-azure-livepatch-devel-5.14.21-150400.14.13.1.x86_64",
          "openSUSE Leap 15.4:kernel-azure-optional-5.14.21-150400.14.13.1.aarch64",
          "openSUSE Leap 15.4:kernel-azure-optional-5.14.21-150400.14.13.1.x86_64",
          "openSUSE Leap 15.4:kernel-devel-azure-5.14.21-150400.14.13.1.noarch",
          "openSUSE Leap 15.4:kernel-source-azure-5.14.21-150400.14.13.1.noarch",
          "openSUSE Leap 15.4:kernel-syms-azure-5.14.21-150400.14.13.1.aarch64",
          "openSUSE Leap 15.4:kernel-syms-azure-5.14.21-150400.14.13.1.x86_64",
          "openSUSE Leap 15.4:kselftests-kmp-azure-5.14.21-150400.14.13.1.aarch64",
          "openSUSE Leap 15.4:kselftests-kmp-azure-5.14.21-150400.14.13.1.x86_64",
          "openSUSE Leap 15.4:ocfs2-kmp-azure-5.14.21-150400.14.13.1.aarch64",
          "openSUSE Leap 15.4:ocfs2-kmp-azure-5.14.21-150400.14.13.1.x86_64",
          "openSUSE Leap 15.4:reiserfs-kmp-azure-5.14.21-150400.14.13.1.aarch64",
          "openSUSE Leap 15.4:reiserfs-kmp-azure-5.14.21-150400.14.13.1.x86_64"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2022-2663",
          "url": "https://www.suse.com/security/cve/CVE-2022-2663"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1202097 for CVE-2022-2663",
          "url": "https://bugzilla.suse.com/1202097"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1212299 for CVE-2022-2663",
          "url": "https://bugzilla.suse.com/1212299"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-azure-5.14.21-150400.14.13.1.aarch64",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-azure-5.14.21-150400.14.13.1.x86_64",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-azure-devel-5.14.21-150400.14.13.1.aarch64",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-azure-devel-5.14.21-150400.14.13.1.x86_64",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-devel-azure-5.14.21-150400.14.13.1.noarch",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-source-azure-5.14.21-150400.14.13.1.noarch",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-syms-azure-5.14.21-150400.14.13.1.aarch64",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-syms-azure-5.14.21-150400.14.13.1.x86_64",
            "openSUSE Leap 15.4:cluster-md-kmp-azure-5.14.21-150400.14.13.1.aarch64",
            "openSUSE Leap 15.4:cluster-md-kmp-azure-5.14.21-150400.14.13.1.x86_64",
            "openSUSE Leap 15.4:dlm-kmp-azure-5.14.21-150400.14.13.1.aarch64",
            "openSUSE Leap 15.4:dlm-kmp-azure-5.14.21-150400.14.13.1.x86_64",
            "openSUSE Leap 15.4:gfs2-kmp-azure-5.14.21-150400.14.13.1.aarch64",
            "openSUSE Leap 15.4:gfs2-kmp-azure-5.14.21-150400.14.13.1.x86_64",
            "openSUSE Leap 15.4:kernel-azure-5.14.21-150400.14.13.1.aarch64",
            "openSUSE Leap 15.4:kernel-azure-5.14.21-150400.14.13.1.x86_64",
            "openSUSE Leap 15.4:kernel-azure-devel-5.14.21-150400.14.13.1.aarch64",
            "openSUSE Leap 15.4:kernel-azure-devel-5.14.21-150400.14.13.1.x86_64",
            "openSUSE Leap 15.4:kernel-azure-extra-5.14.21-150400.14.13.1.aarch64",
            "openSUSE Leap 15.4:kernel-azure-extra-5.14.21-150400.14.13.1.x86_64",
            "openSUSE Leap 15.4:kernel-azure-livepatch-devel-5.14.21-150400.14.13.1.aarch64",
            "openSUSE Leap 15.4:kernel-azure-livepatch-devel-5.14.21-150400.14.13.1.x86_64",
            "openSUSE Leap 15.4:kernel-azure-optional-5.14.21-150400.14.13.1.aarch64",
            "openSUSE Leap 15.4:kernel-azure-optional-5.14.21-150400.14.13.1.x86_64",
            "openSUSE Leap 15.4:kernel-devel-azure-5.14.21-150400.14.13.1.noarch",
            "openSUSE Leap 15.4:kernel-source-azure-5.14.21-150400.14.13.1.noarch",
            "openSUSE Leap 15.4:kernel-syms-azure-5.14.21-150400.14.13.1.aarch64",
            "openSUSE Leap 15.4:kernel-syms-azure-5.14.21-150400.14.13.1.x86_64",
            "openSUSE Leap 15.4:kselftests-kmp-azure-5.14.21-150400.14.13.1.aarch64",
            "openSUSE Leap 15.4:kselftests-kmp-azure-5.14.21-150400.14.13.1.x86_64",
            "openSUSE Leap 15.4:ocfs2-kmp-azure-5.14.21-150400.14.13.1.aarch64",
            "openSUSE Leap 15.4:ocfs2-kmp-azure-5.14.21-150400.14.13.1.x86_64",
            "openSUSE Leap 15.4:reiserfs-kmp-azure-5.14.21-150400.14.13.1.aarch64",
            "openSUSE Leap 15.4:reiserfs-kmp-azure-5.14.21-150400.14.13.1.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 5.9,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:N",
            "version": "3.1"
          },
          "products": [
            "SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-azure-5.14.21-150400.14.13.1.aarch64",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-azure-5.14.21-150400.14.13.1.x86_64",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-azure-devel-5.14.21-150400.14.13.1.aarch64",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-azure-devel-5.14.21-150400.14.13.1.x86_64",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-devel-azure-5.14.21-150400.14.13.1.noarch",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-source-azure-5.14.21-150400.14.13.1.noarch",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-syms-azure-5.14.21-150400.14.13.1.aarch64",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-syms-azure-5.14.21-150400.14.13.1.x86_64",
            "openSUSE Leap 15.4:cluster-md-kmp-azure-5.14.21-150400.14.13.1.aarch64",
            "openSUSE Leap 15.4:cluster-md-kmp-azure-5.14.21-150400.14.13.1.x86_64",
            "openSUSE Leap 15.4:dlm-kmp-azure-5.14.21-150400.14.13.1.aarch64",
            "openSUSE Leap 15.4:dlm-kmp-azure-5.14.21-150400.14.13.1.x86_64",
            "openSUSE Leap 15.4:gfs2-kmp-azure-5.14.21-150400.14.13.1.aarch64",
            "openSUSE Leap 15.4:gfs2-kmp-azure-5.14.21-150400.14.13.1.x86_64",
            "openSUSE Leap 15.4:kernel-azure-5.14.21-150400.14.13.1.aarch64",
            "openSUSE Leap 15.4:kernel-azure-5.14.21-150400.14.13.1.x86_64",
            "openSUSE Leap 15.4:kernel-azure-devel-5.14.21-150400.14.13.1.aarch64",
            "openSUSE Leap 15.4:kernel-azure-devel-5.14.21-150400.14.13.1.x86_64",
            "openSUSE Leap 15.4:kernel-azure-extra-5.14.21-150400.14.13.1.aarch64",
            "openSUSE Leap 15.4:kernel-azure-extra-5.14.21-150400.14.13.1.x86_64",
            "openSUSE Leap 15.4:kernel-azure-livepatch-devel-5.14.21-150400.14.13.1.aarch64",
            "openSUSE Leap 15.4:kernel-azure-livepatch-devel-5.14.21-150400.14.13.1.x86_64",
            "openSUSE Leap 15.4:kernel-azure-optional-5.14.21-150400.14.13.1.aarch64",
            "openSUSE Leap 15.4:kernel-azure-optional-5.14.21-150400.14.13.1.x86_64",
            "openSUSE Leap 15.4:kernel-devel-azure-5.14.21-150400.14.13.1.noarch",
            "openSUSE Leap 15.4:kernel-source-azure-5.14.21-150400.14.13.1.noarch",
            "openSUSE Leap 15.4:kernel-syms-azure-5.14.21-150400.14.13.1.aarch64",
            "openSUSE Leap 15.4:kernel-syms-azure-5.14.21-150400.14.13.1.x86_64",
            "openSUSE Leap 15.4:kselftests-kmp-azure-5.14.21-150400.14.13.1.aarch64",
            "openSUSE Leap 15.4:kselftests-kmp-azure-5.14.21-150400.14.13.1.x86_64",
            "openSUSE Leap 15.4:ocfs2-kmp-azure-5.14.21-150400.14.13.1.aarch64",
            "openSUSE Leap 15.4:ocfs2-kmp-azure-5.14.21-150400.14.13.1.x86_64",
            "openSUSE Leap 15.4:reiserfs-kmp-azure-5.14.21-150400.14.13.1.aarch64",
            "openSUSE Leap 15.4:reiserfs-kmp-azure-5.14.21-150400.14.13.1.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2022-09-16T08:38:48Z",
          "details": "moderate"
        }
      ],
      "title": "CVE-2022-2663"
    },
    {
      "cve": "CVE-2022-28356",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2022-28356"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "In the Linux kernel before 5.17.1, a refcount leak bug was found in net/llc/af_llc.c.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-azure-5.14.21-150400.14.13.1.aarch64",
          "SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-azure-5.14.21-150400.14.13.1.x86_64",
          "SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-azure-devel-5.14.21-150400.14.13.1.aarch64",
          "SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-azure-devel-5.14.21-150400.14.13.1.x86_64",
          "SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-devel-azure-5.14.21-150400.14.13.1.noarch",
          "SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-source-azure-5.14.21-150400.14.13.1.noarch",
          "SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-syms-azure-5.14.21-150400.14.13.1.aarch64",
          "SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-syms-azure-5.14.21-150400.14.13.1.x86_64",
          "openSUSE Leap 15.4:cluster-md-kmp-azure-5.14.21-150400.14.13.1.aarch64",
          "openSUSE Leap 15.4:cluster-md-kmp-azure-5.14.21-150400.14.13.1.x86_64",
          "openSUSE Leap 15.4:dlm-kmp-azure-5.14.21-150400.14.13.1.aarch64",
          "openSUSE Leap 15.4:dlm-kmp-azure-5.14.21-150400.14.13.1.x86_64",
          "openSUSE Leap 15.4:gfs2-kmp-azure-5.14.21-150400.14.13.1.aarch64",
          "openSUSE Leap 15.4:gfs2-kmp-azure-5.14.21-150400.14.13.1.x86_64",
          "openSUSE Leap 15.4:kernel-azure-5.14.21-150400.14.13.1.aarch64",
          "openSUSE Leap 15.4:kernel-azure-5.14.21-150400.14.13.1.x86_64",
          "openSUSE Leap 15.4:kernel-azure-devel-5.14.21-150400.14.13.1.aarch64",
          "openSUSE Leap 15.4:kernel-azure-devel-5.14.21-150400.14.13.1.x86_64",
          "openSUSE Leap 15.4:kernel-azure-extra-5.14.21-150400.14.13.1.aarch64",
          "openSUSE Leap 15.4:kernel-azure-extra-5.14.21-150400.14.13.1.x86_64",
          "openSUSE Leap 15.4:kernel-azure-livepatch-devel-5.14.21-150400.14.13.1.aarch64",
          "openSUSE Leap 15.4:kernel-azure-livepatch-devel-5.14.21-150400.14.13.1.x86_64",
          "openSUSE Leap 15.4:kernel-azure-optional-5.14.21-150400.14.13.1.aarch64",
          "openSUSE Leap 15.4:kernel-azure-optional-5.14.21-150400.14.13.1.x86_64",
          "openSUSE Leap 15.4:kernel-devel-azure-5.14.21-150400.14.13.1.noarch",
          "openSUSE Leap 15.4:kernel-source-azure-5.14.21-150400.14.13.1.noarch",
          "openSUSE Leap 15.4:kernel-syms-azure-5.14.21-150400.14.13.1.aarch64",
          "openSUSE Leap 15.4:kernel-syms-azure-5.14.21-150400.14.13.1.x86_64",
          "openSUSE Leap 15.4:kselftests-kmp-azure-5.14.21-150400.14.13.1.aarch64",
          "openSUSE Leap 15.4:kselftests-kmp-azure-5.14.21-150400.14.13.1.x86_64",
          "openSUSE Leap 15.4:ocfs2-kmp-azure-5.14.21-150400.14.13.1.aarch64",
          "openSUSE Leap 15.4:ocfs2-kmp-azure-5.14.21-150400.14.13.1.x86_64",
          "openSUSE Leap 15.4:reiserfs-kmp-azure-5.14.21-150400.14.13.1.aarch64",
          "openSUSE Leap 15.4:reiserfs-kmp-azure-5.14.21-150400.14.13.1.x86_64"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2022-28356",
          "url": "https://www.suse.com/security/cve/CVE-2022-28356"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1197391 for CVE-2022-28356",
          "url": "https://bugzilla.suse.com/1197391"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-azure-5.14.21-150400.14.13.1.aarch64",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-azure-5.14.21-150400.14.13.1.x86_64",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-azure-devel-5.14.21-150400.14.13.1.aarch64",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-azure-devel-5.14.21-150400.14.13.1.x86_64",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-devel-azure-5.14.21-150400.14.13.1.noarch",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-source-azure-5.14.21-150400.14.13.1.noarch",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-syms-azure-5.14.21-150400.14.13.1.aarch64",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-syms-azure-5.14.21-150400.14.13.1.x86_64",
            "openSUSE Leap 15.4:cluster-md-kmp-azure-5.14.21-150400.14.13.1.aarch64",
            "openSUSE Leap 15.4:cluster-md-kmp-azure-5.14.21-150400.14.13.1.x86_64",
            "openSUSE Leap 15.4:dlm-kmp-azure-5.14.21-150400.14.13.1.aarch64",
            "openSUSE Leap 15.4:dlm-kmp-azure-5.14.21-150400.14.13.1.x86_64",
            "openSUSE Leap 15.4:gfs2-kmp-azure-5.14.21-150400.14.13.1.aarch64",
            "openSUSE Leap 15.4:gfs2-kmp-azure-5.14.21-150400.14.13.1.x86_64",
            "openSUSE Leap 15.4:kernel-azure-5.14.21-150400.14.13.1.aarch64",
            "openSUSE Leap 15.4:kernel-azure-5.14.21-150400.14.13.1.x86_64",
            "openSUSE Leap 15.4:kernel-azure-devel-5.14.21-150400.14.13.1.aarch64",
            "openSUSE Leap 15.4:kernel-azure-devel-5.14.21-150400.14.13.1.x86_64",
            "openSUSE Leap 15.4:kernel-azure-extra-5.14.21-150400.14.13.1.aarch64",
            "openSUSE Leap 15.4:kernel-azure-extra-5.14.21-150400.14.13.1.x86_64",
            "openSUSE Leap 15.4:kernel-azure-livepatch-devel-5.14.21-150400.14.13.1.aarch64",
            "openSUSE Leap 15.4:kernel-azure-livepatch-devel-5.14.21-150400.14.13.1.x86_64",
            "openSUSE Leap 15.4:kernel-azure-optional-5.14.21-150400.14.13.1.aarch64",
            "openSUSE Leap 15.4:kernel-azure-optional-5.14.21-150400.14.13.1.x86_64",
            "openSUSE Leap 15.4:kernel-devel-azure-5.14.21-150400.14.13.1.noarch",
            "openSUSE Leap 15.4:kernel-source-azure-5.14.21-150400.14.13.1.noarch",
            "openSUSE Leap 15.4:kernel-syms-azure-5.14.21-150400.14.13.1.aarch64",
            "openSUSE Leap 15.4:kernel-syms-azure-5.14.21-150400.14.13.1.x86_64",
            "openSUSE Leap 15.4:kselftests-kmp-azure-5.14.21-150400.14.13.1.aarch64",
            "openSUSE Leap 15.4:kselftests-kmp-azure-5.14.21-150400.14.13.1.x86_64",
            "openSUSE Leap 15.4:ocfs2-kmp-azure-5.14.21-150400.14.13.1.aarch64",
            "openSUSE Leap 15.4:ocfs2-kmp-azure-5.14.21-150400.14.13.1.x86_64",
            "openSUSE Leap 15.4:reiserfs-kmp-azure-5.14.21-150400.14.13.1.aarch64",
            "openSUSE Leap 15.4:reiserfs-kmp-azure-5.14.21-150400.14.13.1.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 5.5,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
            "version": "3.1"
          },
          "products": [
            "SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-azure-5.14.21-150400.14.13.1.aarch64",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-azure-5.14.21-150400.14.13.1.x86_64",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-azure-devel-5.14.21-150400.14.13.1.aarch64",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-azure-devel-5.14.21-150400.14.13.1.x86_64",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-devel-azure-5.14.21-150400.14.13.1.noarch",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-source-azure-5.14.21-150400.14.13.1.noarch",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-syms-azure-5.14.21-150400.14.13.1.aarch64",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-syms-azure-5.14.21-150400.14.13.1.x86_64",
            "openSUSE Leap 15.4:cluster-md-kmp-azure-5.14.21-150400.14.13.1.aarch64",
            "openSUSE Leap 15.4:cluster-md-kmp-azure-5.14.21-150400.14.13.1.x86_64",
            "openSUSE Leap 15.4:dlm-kmp-azure-5.14.21-150400.14.13.1.aarch64",
            "openSUSE Leap 15.4:dlm-kmp-azure-5.14.21-150400.14.13.1.x86_64",
            "openSUSE Leap 15.4:gfs2-kmp-azure-5.14.21-150400.14.13.1.aarch64",
            "openSUSE Leap 15.4:gfs2-kmp-azure-5.14.21-150400.14.13.1.x86_64",
            "openSUSE Leap 15.4:kernel-azure-5.14.21-150400.14.13.1.aarch64",
            "openSUSE Leap 15.4:kernel-azure-5.14.21-150400.14.13.1.x86_64",
            "openSUSE Leap 15.4:kernel-azure-devel-5.14.21-150400.14.13.1.aarch64",
            "openSUSE Leap 15.4:kernel-azure-devel-5.14.21-150400.14.13.1.x86_64",
            "openSUSE Leap 15.4:kernel-azure-extra-5.14.21-150400.14.13.1.aarch64",
            "openSUSE Leap 15.4:kernel-azure-extra-5.14.21-150400.14.13.1.x86_64",
            "openSUSE Leap 15.4:kernel-azure-livepatch-devel-5.14.21-150400.14.13.1.aarch64",
            "openSUSE Leap 15.4:kernel-azure-livepatch-devel-5.14.21-150400.14.13.1.x86_64",
            "openSUSE Leap 15.4:kernel-azure-optional-5.14.21-150400.14.13.1.aarch64",
            "openSUSE Leap 15.4:kernel-azure-optional-5.14.21-150400.14.13.1.x86_64",
            "openSUSE Leap 15.4:kernel-devel-azure-5.14.21-150400.14.13.1.noarch",
            "openSUSE Leap 15.4:kernel-source-azure-5.14.21-150400.14.13.1.noarch",
            "openSUSE Leap 15.4:kernel-syms-azure-5.14.21-150400.14.13.1.aarch64",
            "openSUSE Leap 15.4:kernel-syms-azure-5.14.21-150400.14.13.1.x86_64",
            "openSUSE Leap 15.4:kselftests-kmp-azure-5.14.21-150400.14.13.1.aarch64",
            "openSUSE Leap 15.4:kselftests-kmp-azure-5.14.21-150400.14.13.1.x86_64",
            "openSUSE Leap 15.4:ocfs2-kmp-azure-5.14.21-150400.14.13.1.aarch64",
            "openSUSE Leap 15.4:ocfs2-kmp-azure-5.14.21-150400.14.13.1.x86_64",
            "openSUSE Leap 15.4:reiserfs-kmp-azure-5.14.21-150400.14.13.1.aarch64",
            "openSUSE Leap 15.4:reiserfs-kmp-azure-5.14.21-150400.14.13.1.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2022-09-16T08:38:48Z",
          "details": "moderate"
        }
      ],
      "title": "CVE-2022-28356"
    },
    {
      "cve": "CVE-2022-28693",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2022-28693"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "Unprotected alternative channel of return branch target prediction in some Intel(R) Processors may allow an authorized user to potentially enable information disclosure via local access.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-azure-5.14.21-150400.14.13.1.aarch64",
          "SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-azure-5.14.21-150400.14.13.1.x86_64",
          "SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-azure-devel-5.14.21-150400.14.13.1.aarch64",
          "SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-azure-devel-5.14.21-150400.14.13.1.x86_64",
          "SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-devel-azure-5.14.21-150400.14.13.1.noarch",
          "SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-source-azure-5.14.21-150400.14.13.1.noarch",
          "SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-syms-azure-5.14.21-150400.14.13.1.aarch64",
          "SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-syms-azure-5.14.21-150400.14.13.1.x86_64",
          "openSUSE Leap 15.4:cluster-md-kmp-azure-5.14.21-150400.14.13.1.aarch64",
          "openSUSE Leap 15.4:cluster-md-kmp-azure-5.14.21-150400.14.13.1.x86_64",
          "openSUSE Leap 15.4:dlm-kmp-azure-5.14.21-150400.14.13.1.aarch64",
          "openSUSE Leap 15.4:dlm-kmp-azure-5.14.21-150400.14.13.1.x86_64",
          "openSUSE Leap 15.4:gfs2-kmp-azure-5.14.21-150400.14.13.1.aarch64",
          "openSUSE Leap 15.4:gfs2-kmp-azure-5.14.21-150400.14.13.1.x86_64",
          "openSUSE Leap 15.4:kernel-azure-5.14.21-150400.14.13.1.aarch64",
          "openSUSE Leap 15.4:kernel-azure-5.14.21-150400.14.13.1.x86_64",
          "openSUSE Leap 15.4:kernel-azure-devel-5.14.21-150400.14.13.1.aarch64",
          "openSUSE Leap 15.4:kernel-azure-devel-5.14.21-150400.14.13.1.x86_64",
          "openSUSE Leap 15.4:kernel-azure-extra-5.14.21-150400.14.13.1.aarch64",
          "openSUSE Leap 15.4:kernel-azure-extra-5.14.21-150400.14.13.1.x86_64",
          "openSUSE Leap 15.4:kernel-azure-livepatch-devel-5.14.21-150400.14.13.1.aarch64",
          "openSUSE Leap 15.4:kernel-azure-livepatch-devel-5.14.21-150400.14.13.1.x86_64",
          "openSUSE Leap 15.4:kernel-azure-optional-5.14.21-150400.14.13.1.aarch64",
          "openSUSE Leap 15.4:kernel-azure-optional-5.14.21-150400.14.13.1.x86_64",
          "openSUSE Leap 15.4:kernel-devel-azure-5.14.21-150400.14.13.1.noarch",
          "openSUSE Leap 15.4:kernel-source-azure-5.14.21-150400.14.13.1.noarch",
          "openSUSE Leap 15.4:kernel-syms-azure-5.14.21-150400.14.13.1.aarch64",
          "openSUSE Leap 15.4:kernel-syms-azure-5.14.21-150400.14.13.1.x86_64",
          "openSUSE Leap 15.4:kselftests-kmp-azure-5.14.21-150400.14.13.1.aarch64",
          "openSUSE Leap 15.4:kselftests-kmp-azure-5.14.21-150400.14.13.1.x86_64",
          "openSUSE Leap 15.4:ocfs2-kmp-azure-5.14.21-150400.14.13.1.aarch64",
          "openSUSE Leap 15.4:ocfs2-kmp-azure-5.14.21-150400.14.13.1.x86_64",
          "openSUSE Leap 15.4:reiserfs-kmp-azure-5.14.21-150400.14.13.1.aarch64",
          "openSUSE Leap 15.4:reiserfs-kmp-azure-5.14.21-150400.14.13.1.x86_64"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2022-28693",
          "url": "https://www.suse.com/security/cve/CVE-2022-28693"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1201455 for CVE-2022-28693",
          "url": "https://bugzilla.suse.com/1201455"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-azure-5.14.21-150400.14.13.1.aarch64",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-azure-5.14.21-150400.14.13.1.x86_64",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-azure-devel-5.14.21-150400.14.13.1.aarch64",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-azure-devel-5.14.21-150400.14.13.1.x86_64",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-devel-azure-5.14.21-150400.14.13.1.noarch",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-source-azure-5.14.21-150400.14.13.1.noarch",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-syms-azure-5.14.21-150400.14.13.1.aarch64",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-syms-azure-5.14.21-150400.14.13.1.x86_64",
            "openSUSE Leap 15.4:cluster-md-kmp-azure-5.14.21-150400.14.13.1.aarch64",
            "openSUSE Leap 15.4:cluster-md-kmp-azure-5.14.21-150400.14.13.1.x86_64",
            "openSUSE Leap 15.4:dlm-kmp-azure-5.14.21-150400.14.13.1.aarch64",
            "openSUSE Leap 15.4:dlm-kmp-azure-5.14.21-150400.14.13.1.x86_64",
            "openSUSE Leap 15.4:gfs2-kmp-azure-5.14.21-150400.14.13.1.aarch64",
            "openSUSE Leap 15.4:gfs2-kmp-azure-5.14.21-150400.14.13.1.x86_64",
            "openSUSE Leap 15.4:kernel-azure-5.14.21-150400.14.13.1.aarch64",
            "openSUSE Leap 15.4:kernel-azure-5.14.21-150400.14.13.1.x86_64",
            "openSUSE Leap 15.4:kernel-azure-devel-5.14.21-150400.14.13.1.aarch64",
            "openSUSE Leap 15.4:kernel-azure-devel-5.14.21-150400.14.13.1.x86_64",
            "openSUSE Leap 15.4:kernel-azure-extra-5.14.21-150400.14.13.1.aarch64",
            "openSUSE Leap 15.4:kernel-azure-extra-5.14.21-150400.14.13.1.x86_64",
            "openSUSE Leap 15.4:kernel-azure-livepatch-devel-5.14.21-150400.14.13.1.aarch64",
            "openSUSE Leap 15.4:kernel-azure-livepatch-devel-5.14.21-150400.14.13.1.x86_64",
            "openSUSE Leap 15.4:kernel-azure-optional-5.14.21-150400.14.13.1.aarch64",
            "openSUSE Leap 15.4:kernel-azure-optional-5.14.21-150400.14.13.1.x86_64",
            "openSUSE Leap 15.4:kernel-devel-azure-5.14.21-150400.14.13.1.noarch",
            "openSUSE Leap 15.4:kernel-source-azure-5.14.21-150400.14.13.1.noarch",
            "openSUSE Leap 15.4:kernel-syms-azure-5.14.21-150400.14.13.1.aarch64",
            "openSUSE Leap 15.4:kernel-syms-azure-5.14.21-150400.14.13.1.x86_64",
            "openSUSE Leap 15.4:kselftests-kmp-azure-5.14.21-150400.14.13.1.aarch64",
            "openSUSE Leap 15.4:kselftests-kmp-azure-5.14.21-150400.14.13.1.x86_64",
            "openSUSE Leap 15.4:ocfs2-kmp-azure-5.14.21-150400.14.13.1.aarch64",
            "openSUSE Leap 15.4:ocfs2-kmp-azure-5.14.21-150400.14.13.1.x86_64",
            "openSUSE Leap 15.4:reiserfs-kmp-azure-5.14.21-150400.14.13.1.aarch64",
            "openSUSE Leap 15.4:reiserfs-kmp-azure-5.14.21-150400.14.13.1.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 4.7,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:N/A:N",
            "version": "3.1"
          },
          "products": [
            "SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-azure-5.14.21-150400.14.13.1.aarch64",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-azure-5.14.21-150400.14.13.1.x86_64",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-azure-devel-5.14.21-150400.14.13.1.aarch64",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-azure-devel-5.14.21-150400.14.13.1.x86_64",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-devel-azure-5.14.21-150400.14.13.1.noarch",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-source-azure-5.14.21-150400.14.13.1.noarch",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-syms-azure-5.14.21-150400.14.13.1.aarch64",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-syms-azure-5.14.21-150400.14.13.1.x86_64",
            "openSUSE Leap 15.4:cluster-md-kmp-azure-5.14.21-150400.14.13.1.aarch64",
            "openSUSE Leap 15.4:cluster-md-kmp-azure-5.14.21-150400.14.13.1.x86_64",
            "openSUSE Leap 15.4:dlm-kmp-azure-5.14.21-150400.14.13.1.aarch64",
            "openSUSE Leap 15.4:dlm-kmp-azure-5.14.21-150400.14.13.1.x86_64",
            "openSUSE Leap 15.4:gfs2-kmp-azure-5.14.21-150400.14.13.1.aarch64",
            "openSUSE Leap 15.4:gfs2-kmp-azure-5.14.21-150400.14.13.1.x86_64",
            "openSUSE Leap 15.4:kernel-azure-5.14.21-150400.14.13.1.aarch64",
            "openSUSE Leap 15.4:kernel-azure-5.14.21-150400.14.13.1.x86_64",
            "openSUSE Leap 15.4:kernel-azure-devel-5.14.21-150400.14.13.1.aarch64",
            "openSUSE Leap 15.4:kernel-azure-devel-5.14.21-150400.14.13.1.x86_64",
            "openSUSE Leap 15.4:kernel-azure-extra-5.14.21-150400.14.13.1.aarch64",
            "openSUSE Leap 15.4:kernel-azure-extra-5.14.21-150400.14.13.1.x86_64",
            "openSUSE Leap 15.4:kernel-azure-livepatch-devel-5.14.21-150400.14.13.1.aarch64",
            "openSUSE Leap 15.4:kernel-azure-livepatch-devel-5.14.21-150400.14.13.1.x86_64",
            "openSUSE Leap 15.4:kernel-azure-optional-5.14.21-150400.14.13.1.aarch64",
            "openSUSE Leap 15.4:kernel-azure-optional-5.14.21-150400.14.13.1.x86_64",
            "openSUSE Leap 15.4:kernel-devel-azure-5.14.21-150400.14.13.1.noarch",
            "openSUSE Leap 15.4:kernel-source-azure-5.14.21-150400.14.13.1.noarch",
            "openSUSE Leap 15.4:kernel-syms-azure-5.14.21-150400.14.13.1.aarch64",
            "openSUSE Leap 15.4:kernel-syms-azure-5.14.21-150400.14.13.1.x86_64",
            "openSUSE Leap 15.4:kselftests-kmp-azure-5.14.21-150400.14.13.1.aarch64",
            "openSUSE Leap 15.4:kselftests-kmp-azure-5.14.21-150400.14.13.1.x86_64",
            "openSUSE Leap 15.4:ocfs2-kmp-azure-5.14.21-150400.14.13.1.aarch64",
            "openSUSE Leap 15.4:ocfs2-kmp-azure-5.14.21-150400.14.13.1.x86_64",
            "openSUSE Leap 15.4:reiserfs-kmp-azure-5.14.21-150400.14.13.1.aarch64",
            "openSUSE Leap 15.4:reiserfs-kmp-azure-5.14.21-150400.14.13.1.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2022-09-16T08:38:48Z",
          "details": "moderate"
        }
      ],
      "title": "CVE-2022-28693"
    },
    {
      "cve": "CVE-2022-2873",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2022-2873"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "An out-of-bounds memory access flaw was found in the Linux kernel Intel\u0027s iSMT SMBus host controller driver in the way a user triggers the I2C_SMBUS_BLOCK_DATA (with the ioctl I2C_SMBUS) with malicious input data. This flaw allows a local user to crash the system.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-azure-5.14.21-150400.14.13.1.aarch64",
          "SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-azure-5.14.21-150400.14.13.1.x86_64",
          "SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-azure-devel-5.14.21-150400.14.13.1.aarch64",
          "SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-azure-devel-5.14.21-150400.14.13.1.x86_64",
          "SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-devel-azure-5.14.21-150400.14.13.1.noarch",
          "SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-source-azure-5.14.21-150400.14.13.1.noarch",
          "SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-syms-azure-5.14.21-150400.14.13.1.aarch64",
          "SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-syms-azure-5.14.21-150400.14.13.1.x86_64",
          "openSUSE Leap 15.4:cluster-md-kmp-azure-5.14.21-150400.14.13.1.aarch64",
          "openSUSE Leap 15.4:cluster-md-kmp-azure-5.14.21-150400.14.13.1.x86_64",
          "openSUSE Leap 15.4:dlm-kmp-azure-5.14.21-150400.14.13.1.aarch64",
          "openSUSE Leap 15.4:dlm-kmp-azure-5.14.21-150400.14.13.1.x86_64",
          "openSUSE Leap 15.4:gfs2-kmp-azure-5.14.21-150400.14.13.1.aarch64",
          "openSUSE Leap 15.4:gfs2-kmp-azure-5.14.21-150400.14.13.1.x86_64",
          "openSUSE Leap 15.4:kernel-azure-5.14.21-150400.14.13.1.aarch64",
          "openSUSE Leap 15.4:kernel-azure-5.14.21-150400.14.13.1.x86_64",
          "openSUSE Leap 15.4:kernel-azure-devel-5.14.21-150400.14.13.1.aarch64",
          "openSUSE Leap 15.4:kernel-azure-devel-5.14.21-150400.14.13.1.x86_64",
          "openSUSE Leap 15.4:kernel-azure-extra-5.14.21-150400.14.13.1.aarch64",
          "openSUSE Leap 15.4:kernel-azure-extra-5.14.21-150400.14.13.1.x86_64",
          "openSUSE Leap 15.4:kernel-azure-livepatch-devel-5.14.21-150400.14.13.1.aarch64",
          "openSUSE Leap 15.4:kernel-azure-livepatch-devel-5.14.21-150400.14.13.1.x86_64",
          "openSUSE Leap 15.4:kernel-azure-optional-5.14.21-150400.14.13.1.aarch64",
          "openSUSE Leap 15.4:kernel-azure-optional-5.14.21-150400.14.13.1.x86_64",
          "openSUSE Leap 15.4:kernel-devel-azure-5.14.21-150400.14.13.1.noarch",
          "openSUSE Leap 15.4:kernel-source-azure-5.14.21-150400.14.13.1.noarch",
          "openSUSE Leap 15.4:kernel-syms-azure-5.14.21-150400.14.13.1.aarch64",
          "openSUSE Leap 15.4:kernel-syms-azure-5.14.21-150400.14.13.1.x86_64",
          "openSUSE Leap 15.4:kselftests-kmp-azure-5.14.21-150400.14.13.1.aarch64",
          "openSUSE Leap 15.4:kselftests-kmp-azure-5.14.21-150400.14.13.1.x86_64",
          "openSUSE Leap 15.4:ocfs2-kmp-azure-5.14.21-150400.14.13.1.aarch64",
          "openSUSE Leap 15.4:ocfs2-kmp-azure-5.14.21-150400.14.13.1.x86_64",
          "openSUSE Leap 15.4:reiserfs-kmp-azure-5.14.21-150400.14.13.1.aarch64",
          "openSUSE Leap 15.4:reiserfs-kmp-azure-5.14.21-150400.14.13.1.x86_64"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2022-2873",
          "url": "https://www.suse.com/security/cve/CVE-2022-2873"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1202558 for CVE-2022-2873",
          "url": "https://bugzilla.suse.com/1202558"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-azure-5.14.21-150400.14.13.1.aarch64",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-azure-5.14.21-150400.14.13.1.x86_64",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-azure-devel-5.14.21-150400.14.13.1.aarch64",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-azure-devel-5.14.21-150400.14.13.1.x86_64",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-devel-azure-5.14.21-150400.14.13.1.noarch",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-source-azure-5.14.21-150400.14.13.1.noarch",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-syms-azure-5.14.21-150400.14.13.1.aarch64",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-syms-azure-5.14.21-150400.14.13.1.x86_64",
            "openSUSE Leap 15.4:cluster-md-kmp-azure-5.14.21-150400.14.13.1.aarch64",
            "openSUSE Leap 15.4:cluster-md-kmp-azure-5.14.21-150400.14.13.1.x86_64",
            "openSUSE Leap 15.4:dlm-kmp-azure-5.14.21-150400.14.13.1.aarch64",
            "openSUSE Leap 15.4:dlm-kmp-azure-5.14.21-150400.14.13.1.x86_64",
            "openSUSE Leap 15.4:gfs2-kmp-azure-5.14.21-150400.14.13.1.aarch64",
            "openSUSE Leap 15.4:gfs2-kmp-azure-5.14.21-150400.14.13.1.x86_64",
            "openSUSE Leap 15.4:kernel-azure-5.14.21-150400.14.13.1.aarch64",
            "openSUSE Leap 15.4:kernel-azure-5.14.21-150400.14.13.1.x86_64",
            "openSUSE Leap 15.4:kernel-azure-devel-5.14.21-150400.14.13.1.aarch64",
            "openSUSE Leap 15.4:kernel-azure-devel-5.14.21-150400.14.13.1.x86_64",
            "openSUSE Leap 15.4:kernel-azure-extra-5.14.21-150400.14.13.1.aarch64",
            "openSUSE Leap 15.4:kernel-azure-extra-5.14.21-150400.14.13.1.x86_64",
            "openSUSE Leap 15.4:kernel-azure-livepatch-devel-5.14.21-150400.14.13.1.aarch64",
            "openSUSE Leap 15.4:kernel-azure-livepatch-devel-5.14.21-150400.14.13.1.x86_64",
            "openSUSE Leap 15.4:kernel-azure-optional-5.14.21-150400.14.13.1.aarch64",
            "openSUSE Leap 15.4:kernel-azure-optional-5.14.21-150400.14.13.1.x86_64",
            "openSUSE Leap 15.4:kernel-devel-azure-5.14.21-150400.14.13.1.noarch",
            "openSUSE Leap 15.4:kernel-source-azure-5.14.21-150400.14.13.1.noarch",
            "openSUSE Leap 15.4:kernel-syms-azure-5.14.21-150400.14.13.1.aarch64",
            "openSUSE Leap 15.4:kernel-syms-azure-5.14.21-150400.14.13.1.x86_64",
            "openSUSE Leap 15.4:kselftests-kmp-azure-5.14.21-150400.14.13.1.aarch64",
            "openSUSE Leap 15.4:kselftests-kmp-azure-5.14.21-150400.14.13.1.x86_64",
            "openSUSE Leap 15.4:ocfs2-kmp-azure-5.14.21-150400.14.13.1.aarch64",
            "openSUSE Leap 15.4:ocfs2-kmp-azure-5.14.21-150400.14.13.1.x86_64",
            "openSUSE Leap 15.4:reiserfs-kmp-azure-5.14.21-150400.14.13.1.aarch64",
            "openSUSE Leap 15.4:reiserfs-kmp-azure-5.14.21-150400.14.13.1.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 4.2,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:R/S:U/C:N/I:N/A:H",
            "version": "3.1"
          },
          "products": [
            "SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-azure-5.14.21-150400.14.13.1.aarch64",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-azure-5.14.21-150400.14.13.1.x86_64",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-azure-devel-5.14.21-150400.14.13.1.aarch64",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-azure-devel-5.14.21-150400.14.13.1.x86_64",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-devel-azure-5.14.21-150400.14.13.1.noarch",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-source-azure-5.14.21-150400.14.13.1.noarch",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-syms-azure-5.14.21-150400.14.13.1.aarch64",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-syms-azure-5.14.21-150400.14.13.1.x86_64",
            "openSUSE Leap 15.4:cluster-md-kmp-azure-5.14.21-150400.14.13.1.aarch64",
            "openSUSE Leap 15.4:cluster-md-kmp-azure-5.14.21-150400.14.13.1.x86_64",
            "openSUSE Leap 15.4:dlm-kmp-azure-5.14.21-150400.14.13.1.aarch64",
            "openSUSE Leap 15.4:dlm-kmp-azure-5.14.21-150400.14.13.1.x86_64",
            "openSUSE Leap 15.4:gfs2-kmp-azure-5.14.21-150400.14.13.1.aarch64",
            "openSUSE Leap 15.4:gfs2-kmp-azure-5.14.21-150400.14.13.1.x86_64",
            "openSUSE Leap 15.4:kernel-azure-5.14.21-150400.14.13.1.aarch64",
            "openSUSE Leap 15.4:kernel-azure-5.14.21-150400.14.13.1.x86_64",
            "openSUSE Leap 15.4:kernel-azure-devel-5.14.21-150400.14.13.1.aarch64",
            "openSUSE Leap 15.4:kernel-azure-devel-5.14.21-150400.14.13.1.x86_64",
            "openSUSE Leap 15.4:kernel-azure-extra-5.14.21-150400.14.13.1.aarch64",
            "openSUSE Leap 15.4:kernel-azure-extra-5.14.21-150400.14.13.1.x86_64",
            "openSUSE Leap 15.4:kernel-azure-livepatch-devel-5.14.21-150400.14.13.1.aarch64",
            "openSUSE Leap 15.4:kernel-azure-livepatch-devel-5.14.21-150400.14.13.1.x86_64",
            "openSUSE Leap 15.4:kernel-azure-optional-5.14.21-150400.14.13.1.aarch64",
            "openSUSE Leap 15.4:kernel-azure-optional-5.14.21-150400.14.13.1.x86_64",
            "openSUSE Leap 15.4:kernel-devel-azure-5.14.21-150400.14.13.1.noarch",
            "openSUSE Leap 15.4:kernel-source-azure-5.14.21-150400.14.13.1.noarch",
            "openSUSE Leap 15.4:kernel-syms-azure-5.14.21-150400.14.13.1.aarch64",
            "openSUSE Leap 15.4:kernel-syms-azure-5.14.21-150400.14.13.1.x86_64",
            "openSUSE Leap 15.4:kselftests-kmp-azure-5.14.21-150400.14.13.1.aarch64",
            "openSUSE Leap 15.4:kselftests-kmp-azure-5.14.21-150400.14.13.1.x86_64",
            "openSUSE Leap 15.4:ocfs2-kmp-azure-5.14.21-150400.14.13.1.aarch64",
            "openSUSE Leap 15.4:ocfs2-kmp-azure-5.14.21-150400.14.13.1.x86_64",
            "openSUSE Leap 15.4:reiserfs-kmp-azure-5.14.21-150400.14.13.1.aarch64",
            "openSUSE Leap 15.4:reiserfs-kmp-azure-5.14.21-150400.14.13.1.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2022-09-16T08:38:48Z",
          "details": "moderate"
        }
      ],
      "title": "CVE-2022-2873"
    },
    {
      "cve": "CVE-2022-2905",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2022-2905"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "An out-of-bounds memory read flaw was found in the Linux kernel\u0027s BPF subsystem in how a user calls the bpf_tail_call function with a key larger than the max_entries of the map. This flaw allows a local user to gain unauthorized access to data.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-azure-5.14.21-150400.14.13.1.aarch64",
          "SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-azure-5.14.21-150400.14.13.1.x86_64",
          "SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-azure-devel-5.14.21-150400.14.13.1.aarch64",
          "SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-azure-devel-5.14.21-150400.14.13.1.x86_64",
          "SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-devel-azure-5.14.21-150400.14.13.1.noarch",
          "SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-source-azure-5.14.21-150400.14.13.1.noarch",
          "SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-syms-azure-5.14.21-150400.14.13.1.aarch64",
          "SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-syms-azure-5.14.21-150400.14.13.1.x86_64",
          "openSUSE Leap 15.4:cluster-md-kmp-azure-5.14.21-150400.14.13.1.aarch64",
          "openSUSE Leap 15.4:cluster-md-kmp-azure-5.14.21-150400.14.13.1.x86_64",
          "openSUSE Leap 15.4:dlm-kmp-azure-5.14.21-150400.14.13.1.aarch64",
          "openSUSE Leap 15.4:dlm-kmp-azure-5.14.21-150400.14.13.1.x86_64",
          "openSUSE Leap 15.4:gfs2-kmp-azure-5.14.21-150400.14.13.1.aarch64",
          "openSUSE Leap 15.4:gfs2-kmp-azure-5.14.21-150400.14.13.1.x86_64",
          "openSUSE Leap 15.4:kernel-azure-5.14.21-150400.14.13.1.aarch64",
          "openSUSE Leap 15.4:kernel-azure-5.14.21-150400.14.13.1.x86_64",
          "openSUSE Leap 15.4:kernel-azure-devel-5.14.21-150400.14.13.1.aarch64",
          "openSUSE Leap 15.4:kernel-azure-devel-5.14.21-150400.14.13.1.x86_64",
          "openSUSE Leap 15.4:kernel-azure-extra-5.14.21-150400.14.13.1.aarch64",
          "openSUSE Leap 15.4:kernel-azure-extra-5.14.21-150400.14.13.1.x86_64",
          "openSUSE Leap 15.4:kernel-azure-livepatch-devel-5.14.21-150400.14.13.1.aarch64",
          "openSUSE Leap 15.4:kernel-azure-livepatch-devel-5.14.21-150400.14.13.1.x86_64",
          "openSUSE Leap 15.4:kernel-azure-optional-5.14.21-150400.14.13.1.aarch64",
          "openSUSE Leap 15.4:kernel-azure-optional-5.14.21-150400.14.13.1.x86_64",
          "openSUSE Leap 15.4:kernel-devel-azure-5.14.21-150400.14.13.1.noarch",
          "openSUSE Leap 15.4:kernel-source-azure-5.14.21-150400.14.13.1.noarch",
          "openSUSE Leap 15.4:kernel-syms-azure-5.14.21-150400.14.13.1.aarch64",
          "openSUSE Leap 15.4:kernel-syms-azure-5.14.21-150400.14.13.1.x86_64",
          "openSUSE Leap 15.4:kselftests-kmp-azure-5.14.21-150400.14.13.1.aarch64",
          "openSUSE Leap 15.4:kselftests-kmp-azure-5.14.21-150400.14.13.1.x86_64",
          "openSUSE Leap 15.4:ocfs2-kmp-azure-5.14.21-150400.14.13.1.aarch64",
          "openSUSE Leap 15.4:ocfs2-kmp-azure-5.14.21-150400.14.13.1.x86_64",
          "openSUSE Leap 15.4:reiserfs-kmp-azure-5.14.21-150400.14.13.1.aarch64",
          "openSUSE Leap 15.4:reiserfs-kmp-azure-5.14.21-150400.14.13.1.x86_64"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2022-2905",
          "url": "https://www.suse.com/security/cve/CVE-2022-2905"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1202860 for CVE-2022-2905",
          "url": "https://bugzilla.suse.com/1202860"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-azure-5.14.21-150400.14.13.1.aarch64",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-azure-5.14.21-150400.14.13.1.x86_64",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-azure-devel-5.14.21-150400.14.13.1.aarch64",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-azure-devel-5.14.21-150400.14.13.1.x86_64",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-devel-azure-5.14.21-150400.14.13.1.noarch",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-source-azure-5.14.21-150400.14.13.1.noarch",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-syms-azure-5.14.21-150400.14.13.1.aarch64",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-syms-azure-5.14.21-150400.14.13.1.x86_64",
            "openSUSE Leap 15.4:cluster-md-kmp-azure-5.14.21-150400.14.13.1.aarch64",
            "openSUSE Leap 15.4:cluster-md-kmp-azure-5.14.21-150400.14.13.1.x86_64",
            "openSUSE Leap 15.4:dlm-kmp-azure-5.14.21-150400.14.13.1.aarch64",
            "openSUSE Leap 15.4:dlm-kmp-azure-5.14.21-150400.14.13.1.x86_64",
            "openSUSE Leap 15.4:gfs2-kmp-azure-5.14.21-150400.14.13.1.aarch64",
            "openSUSE Leap 15.4:gfs2-kmp-azure-5.14.21-150400.14.13.1.x86_64",
            "openSUSE Leap 15.4:kernel-azure-5.14.21-150400.14.13.1.aarch64",
            "openSUSE Leap 15.4:kernel-azure-5.14.21-150400.14.13.1.x86_64",
            "openSUSE Leap 15.4:kernel-azure-devel-5.14.21-150400.14.13.1.aarch64",
            "openSUSE Leap 15.4:kernel-azure-devel-5.14.21-150400.14.13.1.x86_64",
            "openSUSE Leap 15.4:kernel-azure-extra-5.14.21-150400.14.13.1.aarch64",
            "openSUSE Leap 15.4:kernel-azure-extra-5.14.21-150400.14.13.1.x86_64",
            "openSUSE Leap 15.4:kernel-azure-livepatch-devel-5.14.21-150400.14.13.1.aarch64",
            "openSUSE Leap 15.4:kernel-azure-livepatch-devel-5.14.21-150400.14.13.1.x86_64",
            "openSUSE Leap 15.4:kernel-azure-optional-5.14.21-150400.14.13.1.aarch64",
            "openSUSE Leap 15.4:kernel-azure-optional-5.14.21-150400.14.13.1.x86_64",
            "openSUSE Leap 15.4:kernel-devel-azure-5.14.21-150400.14.13.1.noarch",
            "openSUSE Leap 15.4:kernel-source-azure-5.14.21-150400.14.13.1.noarch",
            "openSUSE Leap 15.4:kernel-syms-azure-5.14.21-150400.14.13.1.aarch64",
            "openSUSE Leap 15.4:kernel-syms-azure-5.14.21-150400.14.13.1.x86_64",
            "openSUSE Leap 15.4:kselftests-kmp-azure-5.14.21-150400.14.13.1.aarch64",
            "openSUSE Leap 15.4:kselftests-kmp-azure-5.14.21-150400.14.13.1.x86_64",
            "openSUSE Leap 15.4:ocfs2-kmp-azure-5.14.21-150400.14.13.1.aarch64",
            "openSUSE Leap 15.4:ocfs2-kmp-azure-5.14.21-150400.14.13.1.x86_64",
            "openSUSE Leap 15.4:reiserfs-kmp-azure-5.14.21-150400.14.13.1.aarch64",
            "openSUSE Leap 15.4:reiserfs-kmp-azure-5.14.21-150400.14.13.1.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 6.2,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N",
            "version": "3.1"
          },
          "products": [
            "SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-azure-5.14.21-150400.14.13.1.aarch64",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-azure-5.14.21-150400.14.13.1.x86_64",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-azure-devel-5.14.21-150400.14.13.1.aarch64",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-azure-devel-5.14.21-150400.14.13.1.x86_64",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-devel-azure-5.14.21-150400.14.13.1.noarch",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-source-azure-5.14.21-150400.14.13.1.noarch",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-syms-azure-5.14.21-150400.14.13.1.aarch64",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-syms-azure-5.14.21-150400.14.13.1.x86_64",
            "openSUSE Leap 15.4:cluster-md-kmp-azure-5.14.21-150400.14.13.1.aarch64",
            "openSUSE Leap 15.4:cluster-md-kmp-azure-5.14.21-150400.14.13.1.x86_64",
            "openSUSE Leap 15.4:dlm-kmp-azure-5.14.21-150400.14.13.1.aarch64",
            "openSUSE Leap 15.4:dlm-kmp-azure-5.14.21-150400.14.13.1.x86_64",
            "openSUSE Leap 15.4:gfs2-kmp-azure-5.14.21-150400.14.13.1.aarch64",
            "openSUSE Leap 15.4:gfs2-kmp-azure-5.14.21-150400.14.13.1.x86_64",
            "openSUSE Leap 15.4:kernel-azure-5.14.21-150400.14.13.1.aarch64",
            "openSUSE Leap 15.4:kernel-azure-5.14.21-150400.14.13.1.x86_64",
            "openSUSE Leap 15.4:kernel-azure-devel-5.14.21-150400.14.13.1.aarch64",
            "openSUSE Leap 15.4:kernel-azure-devel-5.14.21-150400.14.13.1.x86_64",
            "openSUSE Leap 15.4:kernel-azure-extra-5.14.21-150400.14.13.1.aarch64",
            "openSUSE Leap 15.4:kernel-azure-extra-5.14.21-150400.14.13.1.x86_64",
            "openSUSE Leap 15.4:kernel-azure-livepatch-devel-5.14.21-150400.14.13.1.aarch64",
            "openSUSE Leap 15.4:kernel-azure-livepatch-devel-5.14.21-150400.14.13.1.x86_64",
            "openSUSE Leap 15.4:kernel-azure-optional-5.14.21-150400.14.13.1.aarch64",
            "openSUSE Leap 15.4:kernel-azure-optional-5.14.21-150400.14.13.1.x86_64",
            "openSUSE Leap 15.4:kernel-devel-azure-5.14.21-150400.14.13.1.noarch",
            "openSUSE Leap 15.4:kernel-source-azure-5.14.21-150400.14.13.1.noarch",
            "openSUSE Leap 15.4:kernel-syms-azure-5.14.21-150400.14.13.1.aarch64",
            "openSUSE Leap 15.4:kernel-syms-azure-5.14.21-150400.14.13.1.x86_64",
            "openSUSE Leap 15.4:kselftests-kmp-azure-5.14.21-150400.14.13.1.aarch64",
            "openSUSE Leap 15.4:kselftests-kmp-azure-5.14.21-150400.14.13.1.x86_64",
            "openSUSE Leap 15.4:ocfs2-kmp-azure-5.14.21-150400.14.13.1.aarch64",
            "openSUSE Leap 15.4:ocfs2-kmp-azure-5.14.21-150400.14.13.1.x86_64",
            "openSUSE Leap 15.4:reiserfs-kmp-azure-5.14.21-150400.14.13.1.aarch64",
            "openSUSE Leap 15.4:reiserfs-kmp-azure-5.14.21-150400.14.13.1.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2022-09-16T08:38:48Z",
          "details": "moderate"
        }
      ],
      "title": "CVE-2022-2905"
    },
    {
      "cve": "CVE-2022-2938",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2022-2938"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "A flaw was found in the Linux kernel\u0027s implementation of Pressure Stall Information. While the feature is disabled by default, it could allow an attacker to crash the system or have other memory-corruption side effects.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-azure-5.14.21-150400.14.13.1.aarch64",
          "SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-azure-5.14.21-150400.14.13.1.x86_64",
          "SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-azure-devel-5.14.21-150400.14.13.1.aarch64",
          "SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-azure-devel-5.14.21-150400.14.13.1.x86_64",
          "SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-devel-azure-5.14.21-150400.14.13.1.noarch",
          "SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-source-azure-5.14.21-150400.14.13.1.noarch",
          "SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-syms-azure-5.14.21-150400.14.13.1.aarch64",
          "SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-syms-azure-5.14.21-150400.14.13.1.x86_64",
          "openSUSE Leap 15.4:cluster-md-kmp-azure-5.14.21-150400.14.13.1.aarch64",
          "openSUSE Leap 15.4:cluster-md-kmp-azure-5.14.21-150400.14.13.1.x86_64",
          "openSUSE Leap 15.4:dlm-kmp-azure-5.14.21-150400.14.13.1.aarch64",
          "openSUSE Leap 15.4:dlm-kmp-azure-5.14.21-150400.14.13.1.x86_64",
          "openSUSE Leap 15.4:gfs2-kmp-azure-5.14.21-150400.14.13.1.aarch64",
          "openSUSE Leap 15.4:gfs2-kmp-azure-5.14.21-150400.14.13.1.x86_64",
          "openSUSE Leap 15.4:kernel-azure-5.14.21-150400.14.13.1.aarch64",
          "openSUSE Leap 15.4:kernel-azure-5.14.21-150400.14.13.1.x86_64",
          "openSUSE Leap 15.4:kernel-azure-devel-5.14.21-150400.14.13.1.aarch64",
          "openSUSE Leap 15.4:kernel-azure-devel-5.14.21-150400.14.13.1.x86_64",
          "openSUSE Leap 15.4:kernel-azure-extra-5.14.21-150400.14.13.1.aarch64",
          "openSUSE Leap 15.4:kernel-azure-extra-5.14.21-150400.14.13.1.x86_64",
          "openSUSE Leap 15.4:kernel-azure-livepatch-devel-5.14.21-150400.14.13.1.aarch64",
          "openSUSE Leap 15.4:kernel-azure-livepatch-devel-5.14.21-150400.14.13.1.x86_64",
          "openSUSE Leap 15.4:kernel-azure-optional-5.14.21-150400.14.13.1.aarch64",
          "openSUSE Leap 15.4:kernel-azure-optional-5.14.21-150400.14.13.1.x86_64",
          "openSUSE Leap 15.4:kernel-devel-azure-5.14.21-150400.14.13.1.noarch",
          "openSUSE Leap 15.4:kernel-source-azure-5.14.21-150400.14.13.1.noarch",
          "openSUSE Leap 15.4:kernel-syms-azure-5.14.21-150400.14.13.1.aarch64",
          "openSUSE Leap 15.4:kernel-syms-azure-5.14.21-150400.14.13.1.x86_64",
          "openSUSE Leap 15.4:kselftests-kmp-azure-5.14.21-150400.14.13.1.aarch64",
          "openSUSE Leap 15.4:kselftests-kmp-azure-5.14.21-150400.14.13.1.x86_64",
          "openSUSE Leap 15.4:ocfs2-kmp-azure-5.14.21-150400.14.13.1.aarch64",
          "openSUSE Leap 15.4:ocfs2-kmp-azure-5.14.21-150400.14.13.1.x86_64",
          "openSUSE Leap 15.4:reiserfs-kmp-azure-5.14.21-150400.14.13.1.aarch64",
          "openSUSE Leap 15.4:reiserfs-kmp-azure-5.14.21-150400.14.13.1.x86_64"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2022-2938",
          "url": "https://www.suse.com/security/cve/CVE-2022-2938"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1202623 for CVE-2022-2938",
          "url": "https://bugzilla.suse.com/1202623"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-azure-5.14.21-150400.14.13.1.aarch64",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-azure-5.14.21-150400.14.13.1.x86_64",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-azure-devel-5.14.21-150400.14.13.1.aarch64",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-azure-devel-5.14.21-150400.14.13.1.x86_64",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-devel-azure-5.14.21-150400.14.13.1.noarch",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-source-azure-5.14.21-150400.14.13.1.noarch",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-syms-azure-5.14.21-150400.14.13.1.aarch64",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-syms-azure-5.14.21-150400.14.13.1.x86_64",
            "openSUSE Leap 15.4:cluster-md-kmp-azure-5.14.21-150400.14.13.1.aarch64",
            "openSUSE Leap 15.4:cluster-md-kmp-azure-5.14.21-150400.14.13.1.x86_64",
            "openSUSE Leap 15.4:dlm-kmp-azure-5.14.21-150400.14.13.1.aarch64",
            "openSUSE Leap 15.4:dlm-kmp-azure-5.14.21-150400.14.13.1.x86_64",
            "openSUSE Leap 15.4:gfs2-kmp-azure-5.14.21-150400.14.13.1.aarch64",
            "openSUSE Leap 15.4:gfs2-kmp-azure-5.14.21-150400.14.13.1.x86_64",
            "openSUSE Leap 15.4:kernel-azure-5.14.21-150400.14.13.1.aarch64",
            "openSUSE Leap 15.4:kernel-azure-5.14.21-150400.14.13.1.x86_64",
            "openSUSE Leap 15.4:kernel-azure-devel-5.14.21-150400.14.13.1.aarch64",
            "openSUSE Leap 15.4:kernel-azure-devel-5.14.21-150400.14.13.1.x86_64",
            "openSUSE Leap 15.4:kernel-azure-extra-5.14.21-150400.14.13.1.aarch64",
            "openSUSE Leap 15.4:kernel-azure-extra-5.14.21-150400.14.13.1.x86_64",
            "openSUSE Leap 15.4:kernel-azure-livepatch-devel-5.14.21-150400.14.13.1.aarch64",
            "openSUSE Leap 15.4:kernel-azure-livepatch-devel-5.14.21-150400.14.13.1.x86_64",
            "openSUSE Leap 15.4:kernel-azure-optional-5.14.21-150400.14.13.1.aarch64",
            "openSUSE Leap 15.4:kernel-azure-optional-5.14.21-150400.14.13.1.x86_64",
            "openSUSE Leap 15.4:kernel-devel-azure-5.14.21-150400.14.13.1.noarch",
            "openSUSE Leap 15.4:kernel-source-azure-5.14.21-150400.14.13.1.noarch",
            "openSUSE Leap 15.4:kernel-syms-azure-5.14.21-150400.14.13.1.aarch64",
            "openSUSE Leap 15.4:kernel-syms-azure-5.14.21-150400.14.13.1.x86_64",
            "openSUSE Leap 15.4:kselftests-kmp-azure-5.14.21-150400.14.13.1.aarch64",
            "openSUSE Leap 15.4:kselftests-kmp-azure-5.14.21-150400.14.13.1.x86_64",
            "openSUSE Leap 15.4:ocfs2-kmp-azure-5.14.21-150400.14.13.1.aarch64",
            "openSUSE Leap 15.4:ocfs2-kmp-azure-5.14.21-150400.14.13.1.x86_64",
            "openSUSE Leap 15.4:reiserfs-kmp-azure-5.14.21-150400.14.13.1.aarch64",
            "openSUSE Leap 15.4:reiserfs-kmp-azure-5.14.21-150400.14.13.1.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 6.7,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:R/S:U/C:H/I:H/A:H",
            "version": "3.1"
          },
          "products": [
            "SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-azure-5.14.21-150400.14.13.1.aarch64",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-azure-5.14.21-150400.14.13.1.x86_64",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-azure-devel-5.14.21-150400.14.13.1.aarch64",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-azure-devel-5.14.21-150400.14.13.1.x86_64",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-devel-azure-5.14.21-150400.14.13.1.noarch",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-source-azure-5.14.21-150400.14.13.1.noarch",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-syms-azure-5.14.21-150400.14.13.1.aarch64",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-syms-azure-5.14.21-150400.14.13.1.x86_64",
            "openSUSE Leap 15.4:cluster-md-kmp-azure-5.14.21-150400.14.13.1.aarch64",
            "openSUSE Leap 15.4:cluster-md-kmp-azure-5.14.21-150400.14.13.1.x86_64",
            "openSUSE Leap 15.4:dlm-kmp-azure-5.14.21-150400.14.13.1.aarch64",
            "openSUSE Leap 15.4:dlm-kmp-azure-5.14.21-150400.14.13.1.x86_64",
            "openSUSE Leap 15.4:gfs2-kmp-azure-5.14.21-150400.14.13.1.aarch64",
            "openSUSE Leap 15.4:gfs2-kmp-azure-5.14.21-150400.14.13.1.x86_64",
            "openSUSE Leap 15.4:kernel-azure-5.14.21-150400.14.13.1.aarch64",
            "openSUSE Leap 15.4:kernel-azure-5.14.21-150400.14.13.1.x86_64",
            "openSUSE Leap 15.4:kernel-azure-devel-5.14.21-150400.14.13.1.aarch64",
            "openSUSE Leap 15.4:kernel-azure-devel-5.14.21-150400.14.13.1.x86_64",
            "openSUSE Leap 15.4:kernel-azure-extra-5.14.21-150400.14.13.1.aarch64",
            "openSUSE Leap 15.4:kernel-azure-extra-5.14.21-150400.14.13.1.x86_64",
            "openSUSE Leap 15.4:kernel-azure-livepatch-devel-5.14.21-150400.14.13.1.aarch64",
            "openSUSE Leap 15.4:kernel-azure-livepatch-devel-5.14.21-150400.14.13.1.x86_64",
            "openSUSE Leap 15.4:kernel-azure-optional-5.14.21-150400.14.13.1.aarch64",
            "openSUSE Leap 15.4:kernel-azure-optional-5.14.21-150400.14.13.1.x86_64",
            "openSUSE Leap 15.4:kernel-devel-azure-5.14.21-150400.14.13.1.noarch",
            "openSUSE Leap 15.4:kernel-source-azure-5.14.21-150400.14.13.1.noarch",
            "openSUSE Leap 15.4:kernel-syms-azure-5.14.21-150400.14.13.1.aarch64",
            "openSUSE Leap 15.4:kernel-syms-azure-5.14.21-150400.14.13.1.x86_64",
            "openSUSE Leap 15.4:kselftests-kmp-azure-5.14.21-150400.14.13.1.aarch64",
            "openSUSE Leap 15.4:kselftests-kmp-azure-5.14.21-150400.14.13.1.x86_64",
            "openSUSE Leap 15.4:ocfs2-kmp-azure-5.14.21-150400.14.13.1.aarch64",
            "openSUSE Leap 15.4:ocfs2-kmp-azure-5.14.21-150400.14.13.1.x86_64",
            "openSUSE Leap 15.4:reiserfs-kmp-azure-5.14.21-150400.14.13.1.aarch64",
            "openSUSE Leap 15.4:reiserfs-kmp-azure-5.14.21-150400.14.13.1.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2022-09-16T08:38:48Z",
          "details": "moderate"
        }
      ],
      "title": "CVE-2022-2938"
    },
    {
      "cve": "CVE-2022-2959",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2022-2959"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "A race condition was found in the Linux kernel\u0027s watch queue due to a missing lock in pipe_resize_ring(). The specific flaw exists within the handling of pipe buffers. The issue results from the lack of proper locking when performing operations on an object. This flaw allows a local user to crash the system or escalate their privileges on the system.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-azure-5.14.21-150400.14.13.1.aarch64",
          "SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-azure-5.14.21-150400.14.13.1.x86_64",
          "SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-azure-devel-5.14.21-150400.14.13.1.aarch64",
          "SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-azure-devel-5.14.21-150400.14.13.1.x86_64",
          "SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-devel-azure-5.14.21-150400.14.13.1.noarch",
          "SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-source-azure-5.14.21-150400.14.13.1.noarch",
          "SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-syms-azure-5.14.21-150400.14.13.1.aarch64",
          "SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-syms-azure-5.14.21-150400.14.13.1.x86_64",
          "openSUSE Leap 15.4:cluster-md-kmp-azure-5.14.21-150400.14.13.1.aarch64",
          "openSUSE Leap 15.4:cluster-md-kmp-azure-5.14.21-150400.14.13.1.x86_64",
          "openSUSE Leap 15.4:dlm-kmp-azure-5.14.21-150400.14.13.1.aarch64",
          "openSUSE Leap 15.4:dlm-kmp-azure-5.14.21-150400.14.13.1.x86_64",
          "openSUSE Leap 15.4:gfs2-kmp-azure-5.14.21-150400.14.13.1.aarch64",
          "openSUSE Leap 15.4:gfs2-kmp-azure-5.14.21-150400.14.13.1.x86_64",
          "openSUSE Leap 15.4:kernel-azure-5.14.21-150400.14.13.1.aarch64",
          "openSUSE Leap 15.4:kernel-azure-5.14.21-150400.14.13.1.x86_64",
          "openSUSE Leap 15.4:kernel-azure-devel-5.14.21-150400.14.13.1.aarch64",
          "openSUSE Leap 15.4:kernel-azure-devel-5.14.21-150400.14.13.1.x86_64",
          "openSUSE Leap 15.4:kernel-azure-extra-5.14.21-150400.14.13.1.aarch64",
          "openSUSE Leap 15.4:kernel-azure-extra-5.14.21-150400.14.13.1.x86_64",
          "openSUSE Leap 15.4:kernel-azure-livepatch-devel-5.14.21-150400.14.13.1.aarch64",
          "openSUSE Leap 15.4:kernel-azure-livepatch-devel-5.14.21-150400.14.13.1.x86_64",
          "openSUSE Leap 15.4:kernel-azure-optional-5.14.21-150400.14.13.1.aarch64",
          "openSUSE Leap 15.4:kernel-azure-optional-5.14.21-150400.14.13.1.x86_64",
          "openSUSE Leap 15.4:kernel-devel-azure-5.14.21-150400.14.13.1.noarch",
          "openSUSE Leap 15.4:kernel-source-azure-5.14.21-150400.14.13.1.noarch",
          "openSUSE Leap 15.4:kernel-syms-azure-5.14.21-150400.14.13.1.aarch64",
          "openSUSE Leap 15.4:kernel-syms-azure-5.14.21-150400.14.13.1.x86_64",
          "openSUSE Leap 15.4:kselftests-kmp-azure-5.14.21-150400.14.13.1.aarch64",
          "openSUSE Leap 15.4:kselftests-kmp-azure-5.14.21-150400.14.13.1.x86_64",
          "openSUSE Leap 15.4:ocfs2-kmp-azure-5.14.21-150400.14.13.1.aarch64",
          "openSUSE Leap 15.4:ocfs2-kmp-azure-5.14.21-150400.14.13.1.x86_64",
          "openSUSE Leap 15.4:reiserfs-kmp-azure-5.14.21-150400.14.13.1.aarch64",
          "openSUSE Leap 15.4:reiserfs-kmp-azure-5.14.21-150400.14.13.1.x86_64"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2022-2959",
          "url": "https://www.suse.com/security/cve/CVE-2022-2959"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1202681 for CVE-2022-2959",
          "url": "https://bugzilla.suse.com/1202681"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1202685 for CVE-2022-2959",
          "url": "https://bugzilla.suse.com/1202685"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-azure-5.14.21-150400.14.13.1.aarch64",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-azure-5.14.21-150400.14.13.1.x86_64",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-azure-devel-5.14.21-150400.14.13.1.aarch64",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-azure-devel-5.14.21-150400.14.13.1.x86_64",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-devel-azure-5.14.21-150400.14.13.1.noarch",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-source-azure-5.14.21-150400.14.13.1.noarch",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-syms-azure-5.14.21-150400.14.13.1.aarch64",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-syms-azure-5.14.21-150400.14.13.1.x86_64",
            "openSUSE Leap 15.4:cluster-md-kmp-azure-5.14.21-150400.14.13.1.aarch64",
            "openSUSE Leap 15.4:cluster-md-kmp-azure-5.14.21-150400.14.13.1.x86_64",
            "openSUSE Leap 15.4:dlm-kmp-azure-5.14.21-150400.14.13.1.aarch64",
            "openSUSE Leap 15.4:dlm-kmp-azure-5.14.21-150400.14.13.1.x86_64",
            "openSUSE Leap 15.4:gfs2-kmp-azure-5.14.21-150400.14.13.1.aarch64",
            "openSUSE Leap 15.4:gfs2-kmp-azure-5.14.21-150400.14.13.1.x86_64",
            "openSUSE Leap 15.4:kernel-azure-5.14.21-150400.14.13.1.aarch64",
            "openSUSE Leap 15.4:kernel-azure-5.14.21-150400.14.13.1.x86_64",
            "openSUSE Leap 15.4:kernel-azure-devel-5.14.21-150400.14.13.1.aarch64",
            "openSUSE Leap 15.4:kernel-azure-devel-5.14.21-150400.14.13.1.x86_64",
            "openSUSE Leap 15.4:kernel-azure-extra-5.14.21-150400.14.13.1.aarch64",
            "openSUSE Leap 15.4:kernel-azure-extra-5.14.21-150400.14.13.1.x86_64",
            "openSUSE Leap 15.4:kernel-azure-livepatch-devel-5.14.21-150400.14.13.1.aarch64",
            "openSUSE Leap 15.4:kernel-azure-livepatch-devel-5.14.21-150400.14.13.1.x86_64",
            "openSUSE Leap 15.4:kernel-azure-optional-5.14.21-150400.14.13.1.aarch64",
            "openSUSE Leap 15.4:kernel-azure-optional-5.14.21-150400.14.13.1.x86_64",
            "openSUSE Leap 15.4:kernel-devel-azure-5.14.21-150400.14.13.1.noarch",
            "openSUSE Leap 15.4:kernel-source-azure-5.14.21-150400.14.13.1.noarch",
            "openSUSE Leap 15.4:kernel-syms-azure-5.14.21-150400.14.13.1.aarch64",
            "openSUSE Leap 15.4:kernel-syms-azure-5.14.21-150400.14.13.1.x86_64",
            "openSUSE Leap 15.4:kselftests-kmp-azure-5.14.21-150400.14.13.1.aarch64",
            "openSUSE Leap 15.4:kselftests-kmp-azure-5.14.21-150400.14.13.1.x86_64",
            "openSUSE Leap 15.4:ocfs2-kmp-azure-5.14.21-150400.14.13.1.aarch64",
            "openSUSE Leap 15.4:ocfs2-kmp-azure-5.14.21-150400.14.13.1.x86_64",
            "openSUSE Leap 15.4:reiserfs-kmp-azure-5.14.21-150400.14.13.1.aarch64",
            "openSUSE Leap 15.4:reiserfs-kmp-azure-5.14.21-150400.14.13.1.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 7.8,
            "baseSeverity": "HIGH",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
            "version": "3.1"
          },
          "products": [
            "SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-azure-5.14.21-150400.14.13.1.aarch64",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-azure-5.14.21-150400.14.13.1.x86_64",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-azure-devel-5.14.21-150400.14.13.1.aarch64",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-azure-devel-5.14.21-150400.14.13.1.x86_64",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-devel-azure-5.14.21-150400.14.13.1.noarch",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-source-azure-5.14.21-150400.14.13.1.noarch",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-syms-azure-5.14.21-150400.14.13.1.aarch64",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-syms-azure-5.14.21-150400.14.13.1.x86_64",
            "openSUSE Leap 15.4:cluster-md-kmp-azure-5.14.21-150400.14.13.1.aarch64",
            "openSUSE Leap 15.4:cluster-md-kmp-azure-5.14.21-150400.14.13.1.x86_64",
            "openSUSE Leap 15.4:dlm-kmp-azure-5.14.21-150400.14.13.1.aarch64",
            "openSUSE Leap 15.4:dlm-kmp-azure-5.14.21-150400.14.13.1.x86_64",
            "openSUSE Leap 15.4:gfs2-kmp-azure-5.14.21-150400.14.13.1.aarch64",
            "openSUSE Leap 15.4:gfs2-kmp-azure-5.14.21-150400.14.13.1.x86_64",
            "openSUSE Leap 15.4:kernel-azure-5.14.21-150400.14.13.1.aarch64",
            "openSUSE Leap 15.4:kernel-azure-5.14.21-150400.14.13.1.x86_64",
            "openSUSE Leap 15.4:kernel-azure-devel-5.14.21-150400.14.13.1.aarch64",
            "openSUSE Leap 15.4:kernel-azure-devel-5.14.21-150400.14.13.1.x86_64",
            "openSUSE Leap 15.4:kernel-azure-extra-5.14.21-150400.14.13.1.aarch64",
            "openSUSE Leap 15.4:kernel-azure-extra-5.14.21-150400.14.13.1.x86_64",
            "openSUSE Leap 15.4:kernel-azure-livepatch-devel-5.14.21-150400.14.13.1.aarch64",
            "openSUSE Leap 15.4:kernel-azure-livepatch-devel-5.14.21-150400.14.13.1.x86_64",
            "openSUSE Leap 15.4:kernel-azure-optional-5.14.21-150400.14.13.1.aarch64",
            "openSUSE Leap 15.4:kernel-azure-optional-5.14.21-150400.14.13.1.x86_64",
            "openSUSE Leap 15.4:kernel-devel-azure-5.14.21-150400.14.13.1.noarch",
            "openSUSE Leap 15.4:kernel-source-azure-5.14.21-150400.14.13.1.noarch",
            "openSUSE Leap 15.4:kernel-syms-azure-5.14.21-150400.14.13.1.aarch64",
            "openSUSE Leap 15.4:kernel-syms-azure-5.14.21-150400.14.13.1.x86_64",
            "openSUSE Leap 15.4:kselftests-kmp-azure-5.14.21-150400.14.13.1.aarch64",
            "openSUSE Leap 15.4:kselftests-kmp-azure-5.14.21-150400.14.13.1.x86_64",
            "openSUSE Leap 15.4:ocfs2-kmp-azure-5.14.21-150400.14.13.1.aarch64",
            "openSUSE Leap 15.4:ocfs2-kmp-azure-5.14.21-150400.14.13.1.x86_64",
            "openSUSE Leap 15.4:reiserfs-kmp-azure-5.14.21-150400.14.13.1.aarch64",
            "openSUSE Leap 15.4:reiserfs-kmp-azure-5.14.21-150400.14.13.1.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2022-09-16T08:38:48Z",
          "details": "important"
        }
      ],
      "title": "CVE-2022-2959"
    },
    {
      "cve": "CVE-2022-2977",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2022-2977"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "A flaw was found in the Linux kernel implementation of proxied virtualized TPM devices. On a system where virtualized TPM devices are configured (this is not the default) a local attacker can create a use-after-free and create a situation where it may be possible to escalate privileges on the system.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-azure-5.14.21-150400.14.13.1.aarch64",
          "SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-azure-5.14.21-150400.14.13.1.x86_64",
          "SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-azure-devel-5.14.21-150400.14.13.1.aarch64",
          "SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-azure-devel-5.14.21-150400.14.13.1.x86_64",
          "SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-devel-azure-5.14.21-150400.14.13.1.noarch",
          "SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-source-azure-5.14.21-150400.14.13.1.noarch",
          "SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-syms-azure-5.14.21-150400.14.13.1.aarch64",
          "SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-syms-azure-5.14.21-150400.14.13.1.x86_64",
          "openSUSE Leap 15.4:cluster-md-kmp-azure-5.14.21-150400.14.13.1.aarch64",
          "openSUSE Leap 15.4:cluster-md-kmp-azure-5.14.21-150400.14.13.1.x86_64",
          "openSUSE Leap 15.4:dlm-kmp-azure-5.14.21-150400.14.13.1.aarch64",
          "openSUSE Leap 15.4:dlm-kmp-azure-5.14.21-150400.14.13.1.x86_64",
          "openSUSE Leap 15.4:gfs2-kmp-azure-5.14.21-150400.14.13.1.aarch64",
          "openSUSE Leap 15.4:gfs2-kmp-azure-5.14.21-150400.14.13.1.x86_64",
          "openSUSE Leap 15.4:kernel-azure-5.14.21-150400.14.13.1.aarch64",
          "openSUSE Leap 15.4:kernel-azure-5.14.21-150400.14.13.1.x86_64",
          "openSUSE Leap 15.4:kernel-azure-devel-5.14.21-150400.14.13.1.aarch64",
          "openSUSE Leap 15.4:kernel-azure-devel-5.14.21-150400.14.13.1.x86_64",
          "openSUSE Leap 15.4:kernel-azure-extra-5.14.21-150400.14.13.1.aarch64",
          "openSUSE Leap 15.4:kernel-azure-extra-5.14.21-150400.14.13.1.x86_64",
          "openSUSE Leap 15.4:kernel-azure-livepatch-devel-5.14.21-150400.14.13.1.aarch64",
          "openSUSE Leap 15.4:kernel-azure-livepatch-devel-5.14.21-150400.14.13.1.x86_64",
          "openSUSE Leap 15.4:kernel-azure-optional-5.14.21-150400.14.13.1.aarch64",
          "openSUSE Leap 15.4:kernel-azure-optional-5.14.21-150400.14.13.1.x86_64",
          "openSUSE Leap 15.4:kernel-devel-azure-5.14.21-150400.14.13.1.noarch",
          "openSUSE Leap 15.4:kernel-source-azure-5.14.21-150400.14.13.1.noarch",
          "openSUSE Leap 15.4:kernel-syms-azure-5.14.21-150400.14.13.1.aarch64",
          "openSUSE Leap 15.4:kernel-syms-azure-5.14.21-150400.14.13.1.x86_64",
          "openSUSE Leap 15.4:kselftests-kmp-azure-5.14.21-150400.14.13.1.aarch64",
          "openSUSE Leap 15.4:kselftests-kmp-azure-5.14.21-150400.14.13.1.x86_64",
          "openSUSE Leap 15.4:ocfs2-kmp-azure-5.14.21-150400.14.13.1.aarch64",
          "openSUSE Leap 15.4:ocfs2-kmp-azure-5.14.21-150400.14.13.1.x86_64",
          "openSUSE Leap 15.4:reiserfs-kmp-azure-5.14.21-150400.14.13.1.aarch64",
          "openSUSE Leap 15.4:reiserfs-kmp-azure-5.14.21-150400.14.13.1.x86_64"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2022-2977",
          "url": "https://www.suse.com/security/cve/CVE-2022-2977"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1202672 for CVE-2022-2977",
          "url": "https://bugzilla.suse.com/1202672"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-azure-5.14.21-150400.14.13.1.aarch64",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-azure-5.14.21-150400.14.13.1.x86_64",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-azure-devel-5.14.21-150400.14.13.1.aarch64",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-azure-devel-5.14.21-150400.14.13.1.x86_64",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-devel-azure-5.14.21-150400.14.13.1.noarch",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-source-azure-5.14.21-150400.14.13.1.noarch",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-syms-azure-5.14.21-150400.14.13.1.aarch64",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-syms-azure-5.14.21-150400.14.13.1.x86_64",
            "openSUSE Leap 15.4:cluster-md-kmp-azure-5.14.21-150400.14.13.1.aarch64",
            "openSUSE Leap 15.4:cluster-md-kmp-azure-5.14.21-150400.14.13.1.x86_64",
            "openSUSE Leap 15.4:dlm-kmp-azure-5.14.21-150400.14.13.1.aarch64",
            "openSUSE Leap 15.4:dlm-kmp-azure-5.14.21-150400.14.13.1.x86_64",
            "openSUSE Leap 15.4:gfs2-kmp-azure-5.14.21-150400.14.13.1.aarch64",
            "openSUSE Leap 15.4:gfs2-kmp-azure-5.14.21-150400.14.13.1.x86_64",
            "openSUSE Leap 15.4:kernel-azure-5.14.21-150400.14.13.1.aarch64",
            "openSUSE Leap 15.4:kernel-azure-5.14.21-150400.14.13.1.x86_64",
            "openSUSE Leap 15.4:kernel-azure-devel-5.14.21-150400.14.13.1.aarch64",
            "openSUSE Leap 15.4:kernel-azure-devel-5.14.21-150400.14.13.1.x86_64",
            "openSUSE Leap 15.4:kernel-azure-extra-5.14.21-150400.14.13.1.aarch64",
            "openSUSE Leap 15.4:kernel-azure-extra-5.14.21-150400.14.13.1.x86_64",
            "openSUSE Leap 15.4:kernel-azure-livepatch-devel-5.14.21-150400.14.13.1.aarch64",
            "openSUSE Leap 15.4:kernel-azure-livepatch-devel-5.14.21-150400.14.13.1.x86_64",
            "openSUSE Leap 15.4:kernel-azure-optional-5.14.21-150400.14.13.1.aarch64",
            "openSUSE Leap 15.4:kernel-azure-optional-5.14.21-150400.14.13.1.x86_64",
            "openSUSE Leap 15.4:kernel-devel-azure-5.14.21-150400.14.13.1.noarch",
            "openSUSE Leap 15.4:kernel-source-azure-5.14.21-150400.14.13.1.noarch",
            "openSUSE Leap 15.4:kernel-syms-azure-5.14.21-150400.14.13.1.aarch64",
            "openSUSE Leap 15.4:kernel-syms-azure-5.14.21-150400.14.13.1.x86_64",
            "openSUSE Leap 15.4:kselftests-kmp-azure-5.14.21-150400.14.13.1.aarch64",
            "openSUSE Leap 15.4:kselftests-kmp-azure-5.14.21-150400.14.13.1.x86_64",
            "openSUSE Leap 15.4:ocfs2-kmp-azure-5.14.21-150400.14.13.1.aarch64",
            "openSUSE Leap 15.4:ocfs2-kmp-azure-5.14.21-150400.14.13.1.x86_64",
            "openSUSE Leap 15.4:reiserfs-kmp-azure-5.14.21-150400.14.13.1.aarch64",
            "openSUSE Leap 15.4:reiserfs-kmp-azure-5.14.21-150400.14.13.1.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 4.2,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:R/S:U/C:N/I:N/A:H",
            "version": "3.1"
          },
          "products": [
            "SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-azure-5.14.21-150400.14.13.1.aarch64",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-azure-5.14.21-150400.14.13.1.x86_64",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-azure-devel-5.14.21-150400.14.13.1.aarch64",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-azure-devel-5.14.21-150400.14.13.1.x86_64",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-devel-azure-5.14.21-150400.14.13.1.noarch",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-source-azure-5.14.21-150400.14.13.1.noarch",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-syms-azure-5.14.21-150400.14.13.1.aarch64",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-syms-azure-5.14.21-150400.14.13.1.x86_64",
            "openSUSE Leap 15.4:cluster-md-kmp-azure-5.14.21-150400.14.13.1.aarch64",
            "openSUSE Leap 15.4:cluster-md-kmp-azure-5.14.21-150400.14.13.1.x86_64",
            "openSUSE Leap 15.4:dlm-kmp-azure-5.14.21-150400.14.13.1.aarch64",
            "openSUSE Leap 15.4:dlm-kmp-azure-5.14.21-150400.14.13.1.x86_64",
            "openSUSE Leap 15.4:gfs2-kmp-azure-5.14.21-150400.14.13.1.aarch64",
            "openSUSE Leap 15.4:gfs2-kmp-azure-5.14.21-150400.14.13.1.x86_64",
            "openSUSE Leap 15.4:kernel-azure-5.14.21-150400.14.13.1.aarch64",
            "openSUSE Leap 15.4:kernel-azure-5.14.21-150400.14.13.1.x86_64",
            "openSUSE Leap 15.4:kernel-azure-devel-5.14.21-150400.14.13.1.aarch64",
            "openSUSE Leap 15.4:kernel-azure-devel-5.14.21-150400.14.13.1.x86_64",
            "openSUSE Leap 15.4:kernel-azure-extra-5.14.21-150400.14.13.1.aarch64",
            "openSUSE Leap 15.4:kernel-azure-extra-5.14.21-150400.14.13.1.x86_64",
            "openSUSE Leap 15.4:kernel-azure-livepatch-devel-5.14.21-150400.14.13.1.aarch64",
            "openSUSE Leap 15.4:kernel-azure-livepatch-devel-5.14.21-150400.14.13.1.x86_64",
            "openSUSE Leap 15.4:kernel-azure-optional-5.14.21-150400.14.13.1.aarch64",
            "openSUSE Leap 15.4:kernel-azure-optional-5.14.21-150400.14.13.1.x86_64",
            "openSUSE Leap 15.4:kernel-devel-azure-5.14.21-150400.14.13.1.noarch",
            "openSUSE Leap 15.4:kernel-source-azure-5.14.21-150400.14.13.1.noarch",
            "openSUSE Leap 15.4:kernel-syms-azure-5.14.21-150400.14.13.1.aarch64",
            "openSUSE Leap 15.4:kernel-syms-azure-5.14.21-150400.14.13.1.x86_64",
            "openSUSE Leap 15.4:kselftests-kmp-azure-5.14.21-150400.14.13.1.aarch64",
            "openSUSE Leap 15.4:kselftests-kmp-azure-5.14.21-150400.14.13.1.x86_64",
            "openSUSE Leap 15.4:ocfs2-kmp-azure-5.14.21-150400.14.13.1.aarch64",
            "openSUSE Leap 15.4:ocfs2-kmp-azure-5.14.21-150400.14.13.1.x86_64",
            "openSUSE Leap 15.4:reiserfs-kmp-azure-5.14.21-150400.14.13.1.aarch64",
            "openSUSE Leap 15.4:reiserfs-kmp-azure-5.14.21-150400.14.13.1.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2022-09-16T08:38:48Z",
          "details": "moderate"
        }
      ],
      "title": "CVE-2022-2977"
    },
    {
      "cve": "CVE-2022-3028",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2022-3028"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "A race condition was found in the Linux kernel\u0027s IP framework for transforming packets (XFRM subsystem) when multiple calls to xfrm_probe_algs occurred simultaneously. This flaw could allow a local attacker to potentially trigger an out-of-bounds write or leak kernel heap memory by performing an out-of-bounds read and copying it into a socket.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-azure-5.14.21-150400.14.13.1.aarch64",
          "SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-azure-5.14.21-150400.14.13.1.x86_64",
          "SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-azure-devel-5.14.21-150400.14.13.1.aarch64",
          "SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-azure-devel-5.14.21-150400.14.13.1.x86_64",
          "SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-devel-azure-5.14.21-150400.14.13.1.noarch",
          "SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-source-azure-5.14.21-150400.14.13.1.noarch",
          "SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-syms-azure-5.14.21-150400.14.13.1.aarch64",
          "SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-syms-azure-5.14.21-150400.14.13.1.x86_64",
          "openSUSE Leap 15.4:cluster-md-kmp-azure-5.14.21-150400.14.13.1.aarch64",
          "openSUSE Leap 15.4:cluster-md-kmp-azure-5.14.21-150400.14.13.1.x86_64",
          "openSUSE Leap 15.4:dlm-kmp-azure-5.14.21-150400.14.13.1.aarch64",
          "openSUSE Leap 15.4:dlm-kmp-azure-5.14.21-150400.14.13.1.x86_64",
          "openSUSE Leap 15.4:gfs2-kmp-azure-5.14.21-150400.14.13.1.aarch64",
          "openSUSE Leap 15.4:gfs2-kmp-azure-5.14.21-150400.14.13.1.x86_64",
          "openSUSE Leap 15.4:kernel-azure-5.14.21-150400.14.13.1.aarch64",
          "openSUSE Leap 15.4:kernel-azure-5.14.21-150400.14.13.1.x86_64",
          "openSUSE Leap 15.4:kernel-azure-devel-5.14.21-150400.14.13.1.aarch64",
          "openSUSE Leap 15.4:kernel-azure-devel-5.14.21-150400.14.13.1.x86_64",
          "openSUSE Leap 15.4:kernel-azure-extra-5.14.21-150400.14.13.1.aarch64",
          "openSUSE Leap 15.4:kernel-azure-extra-5.14.21-150400.14.13.1.x86_64",
          "openSUSE Leap 15.4:kernel-azure-livepatch-devel-5.14.21-150400.14.13.1.aarch64",
          "openSUSE Leap 15.4:kernel-azure-livepatch-devel-5.14.21-150400.14.13.1.x86_64",
          "openSUSE Leap 15.4:kernel-azure-optional-5.14.21-150400.14.13.1.aarch64",
          "openSUSE Leap 15.4:kernel-azure-optional-5.14.21-150400.14.13.1.x86_64",
          "openSUSE Leap 15.4:kernel-devel-azure-5.14.21-150400.14.13.1.noarch",
          "openSUSE Leap 15.4:kernel-source-azure-5.14.21-150400.14.13.1.noarch",
          "openSUSE Leap 15.4:kernel-syms-azure-5.14.21-150400.14.13.1.aarch64",
          "openSUSE Leap 15.4:kernel-syms-azure-5.14.21-150400.14.13.1.x86_64",
          "openSUSE Leap 15.4:kselftests-kmp-azure-5.14.21-150400.14.13.1.aarch64",
          "openSUSE Leap 15.4:kselftests-kmp-azure-5.14.21-150400.14.13.1.x86_64",
          "openSUSE Leap 15.4:ocfs2-kmp-azure-5.14.21-150400.14.13.1.aarch64",
          "openSUSE Leap 15.4:ocfs2-kmp-azure-5.14.21-150400.14.13.1.x86_64",
          "openSUSE Leap 15.4:reiserfs-kmp-azure-5.14.21-150400.14.13.1.aarch64",
          "openSUSE Leap 15.4:reiserfs-kmp-azure-5.14.21-150400.14.13.1.x86_64"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2022-3028",
          "url": "https://www.suse.com/security/cve/CVE-2022-3028"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1202898 for CVE-2022-3028",
          "url": "https://bugzilla.suse.com/1202898"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1212296 for CVE-2022-3028",
          "url": "https://bugzilla.suse.com/1212296"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-azure-5.14.21-150400.14.13.1.aarch64",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-azure-5.14.21-150400.14.13.1.x86_64",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-azure-devel-5.14.21-150400.14.13.1.aarch64",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-azure-devel-5.14.21-150400.14.13.1.x86_64",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-devel-azure-5.14.21-150400.14.13.1.noarch",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-source-azure-5.14.21-150400.14.13.1.noarch",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-syms-azure-5.14.21-150400.14.13.1.aarch64",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-syms-azure-5.14.21-150400.14.13.1.x86_64",
            "openSUSE Leap 15.4:cluster-md-kmp-azure-5.14.21-150400.14.13.1.aarch64",
            "openSUSE Leap 15.4:cluster-md-kmp-azure-5.14.21-150400.14.13.1.x86_64",
            "openSUSE Leap 15.4:dlm-kmp-azure-5.14.21-150400.14.13.1.aarch64",
            "openSUSE Leap 15.4:dlm-kmp-azure-5.14.21-150400.14.13.1.x86_64",
            "openSUSE Leap 15.4:gfs2-kmp-azure-5.14.21-150400.14.13.1.aarch64",
            "openSUSE Leap 15.4:gfs2-kmp-azure-5.14.21-150400.14.13.1.x86_64",
            "openSUSE Leap 15.4:kernel-azure-5.14.21-150400.14.13.1.aarch64",
            "openSUSE Leap 15.4:kernel-azure-5.14.21-150400.14.13.1.x86_64",
            "openSUSE Leap 15.4:kernel-azure-devel-5.14.21-150400.14.13.1.aarch64",
            "openSUSE Leap 15.4:kernel-azure-devel-5.14.21-150400.14.13.1.x86_64",
            "openSUSE Leap 15.4:kernel-azure-extra-5.14.21-150400.14.13.1.aarch64",
            "openSUSE Leap 15.4:kernel-azure-extra-5.14.21-150400.14.13.1.x86_64",
            "openSUSE Leap 15.4:kernel-azure-livepatch-devel-5.14.21-150400.14.13.1.aarch64",
            "openSUSE Leap 15.4:kernel-azure-livepatch-devel-5.14.21-150400.14.13.1.x86_64",
            "openSUSE Leap 15.4:kernel-azure-optional-5.14.21-150400.14.13.1.aarch64",
            "openSUSE Leap 15.4:kernel-azure-optional-5.14.21-150400.14.13.1.x86_64",
            "openSUSE Leap 15.4:kernel-devel-azure-5.14.21-150400.14.13.1.noarch",
            "openSUSE Leap 15.4:kernel-source-azure-5.14.21-150400.14.13.1.noarch",
            "openSUSE Leap 15.4:kernel-syms-azure-5.14.21-150400.14.13.1.aarch64",
            "openSUSE Leap 15.4:kernel-syms-azure-5.14.21-150400.14.13.1.x86_64",
            "openSUSE Leap 15.4:kselftests-kmp-azure-5.14.21-150400.14.13.1.aarch64",
            "openSUSE Leap 15.4:kselftests-kmp-azure-5.14.21-150400.14.13.1.x86_64",
            "openSUSE Leap 15.4:ocfs2-kmp-azure-5.14.21-150400.14.13.1.aarch64",
            "openSUSE Leap 15.4:ocfs2-kmp-azure-5.14.21-150400.14.13.1.x86_64",
            "openSUSE Leap 15.4:reiserfs-kmp-azure-5.14.21-150400.14.13.1.aarch64",
            "openSUSE Leap 15.4:reiserfs-kmp-azure-5.14.21-150400.14.13.1.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 6.7,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H",
            "version": "3.1"
          },
          "products": [
            "SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-azure-5.14.21-150400.14.13.1.aarch64",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-azure-5.14.21-150400.14.13.1.x86_64",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-azure-devel-5.14.21-150400.14.13.1.aarch64",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-azure-devel-5.14.21-150400.14.13.1.x86_64",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-devel-azure-5.14.21-150400.14.13.1.noarch",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-source-azure-5.14.21-150400.14.13.1.noarch",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-syms-azure-5.14.21-150400.14.13.1.aarch64",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-syms-azure-5.14.21-150400.14.13.1.x86_64",
            "openSUSE Leap 15.4:cluster-md-kmp-azure-5.14.21-150400.14.13.1.aarch64",
            "openSUSE Leap 15.4:cluster-md-kmp-azure-5.14.21-150400.14.13.1.x86_64",
            "openSUSE Leap 15.4:dlm-kmp-azure-5.14.21-150400.14.13.1.aarch64",
            "openSUSE Leap 15.4:dlm-kmp-azure-5.14.21-150400.14.13.1.x86_64",
            "openSUSE Leap 15.4:gfs2-kmp-azure-5.14.21-150400.14.13.1.aarch64",
            "openSUSE Leap 15.4:gfs2-kmp-azure-5.14.21-150400.14.13.1.x86_64",
            "openSUSE Leap 15.4:kernel-azure-5.14.21-150400.14.13.1.aarch64",
            "openSUSE Leap 15.4:kernel-azure-5.14.21-150400.14.13.1.x86_64",
            "openSUSE Leap 15.4:kernel-azure-devel-5.14.21-150400.14.13.1.aarch64",
            "openSUSE Leap 15.4:kernel-azure-devel-5.14.21-150400.14.13.1.x86_64",
            "openSUSE Leap 15.4:kernel-azure-extra-5.14.21-150400.14.13.1.aarch64",
            "openSUSE Leap 15.4:kernel-azure-extra-5.14.21-150400.14.13.1.x86_64",
            "openSUSE Leap 15.4:kernel-azure-livepatch-devel-5.14.21-150400.14.13.1.aarch64",
            "openSUSE Leap 15.4:kernel-azure-livepatch-devel-5.14.21-150400.14.13.1.x86_64",
            "openSUSE Leap 15.4:kernel-azure-optional-5.14.21-150400.14.13.1.aarch64",
            "openSUSE Leap 15.4:kernel-azure-optional-5.14.21-150400.14.13.1.x86_64",
            "openSUSE Leap 15.4:kernel-devel-azure-5.14.21-150400.14.13.1.noarch",
            "openSUSE Leap 15.4:kernel-source-azure-5.14.21-150400.14.13.1.noarch",
            "openSUSE Leap 15.4:kernel-syms-azure-5.14.21-150400.14.13.1.aarch64",
            "openSUSE Leap 15.4:kernel-syms-azure-5.14.21-150400.14.13.1.x86_64",
            "openSUSE Leap 15.4:kselftests-kmp-azure-5.14.21-150400.14.13.1.aarch64",
            "openSUSE Leap 15.4:kselftests-kmp-azure-5.14.21-150400.14.13.1.x86_64",
            "openSUSE Leap 15.4:ocfs2-kmp-azure-5.14.21-150400.14.13.1.aarch64",
            "openSUSE Leap 15.4:ocfs2-kmp-azure-5.14.21-150400.14.13.1.x86_64",
            "openSUSE Leap 15.4:reiserfs-kmp-azure-5.14.21-150400.14.13.1.aarch64",
            "openSUSE Leap 15.4:reiserfs-kmp-azure-5.14.21-150400.14.13.1.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2022-09-16T08:38:48Z",
          "details": "moderate"
        }
      ],
      "title": "CVE-2022-3028"
    },
    {
      "cve": "CVE-2022-3078",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2022-3078"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "An issue was discovered in the Linux kernel through 5.16-rc6. There is a lack of check after calling vzalloc() and lack of free after allocation in drivers/media/test-drivers/vidtv/vidtv_s302m.c.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-azure-5.14.21-150400.14.13.1.aarch64",
          "SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-azure-5.14.21-150400.14.13.1.x86_64",
          "SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-azure-devel-5.14.21-150400.14.13.1.aarch64",
          "SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-azure-devel-5.14.21-150400.14.13.1.x86_64",
          "SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-devel-azure-5.14.21-150400.14.13.1.noarch",
          "SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-source-azure-5.14.21-150400.14.13.1.noarch",
          "SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-syms-azure-5.14.21-150400.14.13.1.aarch64",
          "SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-syms-azure-5.14.21-150400.14.13.1.x86_64",
          "openSUSE Leap 15.4:cluster-md-kmp-azure-5.14.21-150400.14.13.1.aarch64",
          "openSUSE Leap 15.4:cluster-md-kmp-azure-5.14.21-150400.14.13.1.x86_64",
          "openSUSE Leap 15.4:dlm-kmp-azure-5.14.21-150400.14.13.1.aarch64",
          "openSUSE Leap 15.4:dlm-kmp-azure-5.14.21-150400.14.13.1.x86_64",
          "openSUSE Leap 15.4:gfs2-kmp-azure-5.14.21-150400.14.13.1.aarch64",
          "openSUSE Leap 15.4:gfs2-kmp-azure-5.14.21-150400.14.13.1.x86_64",
          "openSUSE Leap 15.4:kernel-azure-5.14.21-150400.14.13.1.aarch64",
          "openSUSE Leap 15.4:kernel-azure-5.14.21-150400.14.13.1.x86_64",
          "openSUSE Leap 15.4:kernel-azure-devel-5.14.21-150400.14.13.1.aarch64",
          "openSUSE Leap 15.4:kernel-azure-devel-5.14.21-150400.14.13.1.x86_64",
          "openSUSE Leap 15.4:kernel-azure-extra-5.14.21-150400.14.13.1.aarch64",
          "openSUSE Leap 15.4:kernel-azure-extra-5.14.21-150400.14.13.1.x86_64",
          "openSUSE Leap 15.4:kernel-azure-livepatch-devel-5.14.21-150400.14.13.1.aarch64",
          "openSUSE Leap 15.4:kernel-azure-livepatch-devel-5.14.21-150400.14.13.1.x86_64",
          "openSUSE Leap 15.4:kernel-azure-optional-5.14.21-150400.14.13.1.aarch64",
          "openSUSE Leap 15.4:kernel-azure-optional-5.14.21-150400.14.13.1.x86_64",
          "openSUSE Leap 15.4:kernel-devel-azure-5.14.21-150400.14.13.1.noarch",
          "openSUSE Leap 15.4:kernel-source-azure-5.14.21-150400.14.13.1.noarch",
          "openSUSE Leap 15.4:kernel-syms-azure-5.14.21-150400.14.13.1.aarch64",
          "openSUSE Leap 15.4:kernel-syms-azure-5.14.21-150400.14.13.1.x86_64",
          "openSUSE Leap 15.4:kselftests-kmp-azure-5.14.21-150400.14.13.1.aarch64",
          "openSUSE Leap 15.4:kselftests-kmp-azure-5.14.21-150400.14.13.1.x86_64",
          "openSUSE Leap 15.4:ocfs2-kmp-azure-5.14.21-150400.14.13.1.aarch64",
          "openSUSE Leap 15.4:ocfs2-kmp-azure-5.14.21-150400.14.13.1.x86_64",
          "openSUSE Leap 15.4:reiserfs-kmp-azure-5.14.21-150400.14.13.1.aarch64",
          "openSUSE Leap 15.4:reiserfs-kmp-azure-5.14.21-150400.14.13.1.x86_64"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2022-3078",
          "url": "https://www.suse.com/security/cve/CVE-2022-3078"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1203041 for CVE-2022-3078",
          "url": "https://bugzilla.suse.com/1203041"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-azure-5.14.21-150400.14.13.1.aarch64",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-azure-5.14.21-150400.14.13.1.x86_64",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-azure-devel-5.14.21-150400.14.13.1.aarch64",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-azure-devel-5.14.21-150400.14.13.1.x86_64",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-devel-azure-5.14.21-150400.14.13.1.noarch",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-source-azure-5.14.21-150400.14.13.1.noarch",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-syms-azure-5.14.21-150400.14.13.1.aarch64",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-syms-azure-5.14.21-150400.14.13.1.x86_64",
            "openSUSE Leap 15.4:cluster-md-kmp-azure-5.14.21-150400.14.13.1.aarch64",
            "openSUSE Leap 15.4:cluster-md-kmp-azure-5.14.21-150400.14.13.1.x86_64",
            "openSUSE Leap 15.4:dlm-kmp-azure-5.14.21-150400.14.13.1.aarch64",
            "openSUSE Leap 15.4:dlm-kmp-azure-5.14.21-150400.14.13.1.x86_64",
            "openSUSE Leap 15.4:gfs2-kmp-azure-5.14.21-150400.14.13.1.aarch64",
            "openSUSE Leap 15.4:gfs2-kmp-azure-5.14.21-150400.14.13.1.x86_64",
            "openSUSE Leap 15.4:kernel-azure-5.14.21-150400.14.13.1.aarch64",
            "openSUSE Leap 15.4:kernel-azure-5.14.21-150400.14.13.1.x86_64",
            "openSUSE Leap 15.4:kernel-azure-devel-5.14.21-150400.14.13.1.aarch64",
            "openSUSE Leap 15.4:kernel-azure-devel-5.14.21-150400.14.13.1.x86_64",
            "openSUSE Leap 15.4:kernel-azure-extra-5.14.21-150400.14.13.1.aarch64",
            "openSUSE Leap 15.4:kernel-azure-extra-5.14.21-150400.14.13.1.x86_64",
            "openSUSE Leap 15.4:kernel-azure-livepatch-devel-5.14.21-150400.14.13.1.aarch64",
            "openSUSE Leap 15.4:kernel-azure-livepatch-devel-5.14.21-150400.14.13.1.x86_64",
            "openSUSE Leap 15.4:kernel-azure-optional-5.14.21-150400.14.13.1.aarch64",
            "openSUSE Leap 15.4:kernel-azure-optional-5.14.21-150400.14.13.1.x86_64",
            "openSUSE Leap 15.4:kernel-devel-azure-5.14.21-150400.14.13.1.noarch",
            "openSUSE Leap 15.4:kernel-source-azure-5.14.21-150400.14.13.1.noarch",
            "openSUSE Leap 15.4:kernel-syms-azure-5.14.21-150400.14.13.1.aarch64",
            "openSUSE Leap 15.4:kernel-syms-azure-5.14.21-150400.14.13.1.x86_64",
            "openSUSE Leap 15.4:kselftests-kmp-azure-5.14.21-150400.14.13.1.aarch64",
            "openSUSE Leap 15.4:kselftests-kmp-azure-5.14.21-150400.14.13.1.x86_64",
            "openSUSE Leap 15.4:ocfs2-kmp-azure-5.14.21-150400.14.13.1.aarch64",
            "openSUSE Leap 15.4:ocfs2-kmp-azure-5.14.21-150400.14.13.1.x86_64",
            "openSUSE Leap 15.4:reiserfs-kmp-azure-5.14.21-150400.14.13.1.aarch64",
            "openSUSE Leap 15.4:reiserfs-kmp-azure-5.14.21-150400.14.13.1.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 4,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L",
            "version": "3.1"
          },
          "products": [
            "SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-azure-5.14.21-150400.14.13.1.aarch64",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-azure-5.14.21-150400.14.13.1.x86_64",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-azure-devel-5.14.21-150400.14.13.1.aarch64",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-azure-devel-5.14.21-150400.14.13.1.x86_64",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-devel-azure-5.14.21-150400.14.13.1.noarch",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-source-azure-5.14.21-150400.14.13.1.noarch",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-syms-azure-5.14.21-150400.14.13.1.aarch64",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-syms-azure-5.14.21-150400.14.13.1.x86_64",
            "openSUSE Leap 15.4:cluster-md-kmp-azure-5.14.21-150400.14.13.1.aarch64",
            "openSUSE Leap 15.4:cluster-md-kmp-azure-5.14.21-150400.14.13.1.x86_64",
            "openSUSE Leap 15.4:dlm-kmp-azure-5.14.21-150400.14.13.1.aarch64",
            "openSUSE Leap 15.4:dlm-kmp-azure-5.14.21-150400.14.13.1.x86_64",
            "openSUSE Leap 15.4:gfs2-kmp-azure-5.14.21-150400.14.13.1.aarch64",
            "openSUSE Leap 15.4:gfs2-kmp-azure-5.14.21-150400.14.13.1.x86_64",
            "openSUSE Leap 15.4:kernel-azure-5.14.21-150400.14.13.1.aarch64",
            "openSUSE Leap 15.4:kernel-azure-5.14.21-150400.14.13.1.x86_64",
            "openSUSE Leap 15.4:kernel-azure-devel-5.14.21-150400.14.13.1.aarch64",
            "openSUSE Leap 15.4:kernel-azure-devel-5.14.21-150400.14.13.1.x86_64",
            "openSUSE Leap 15.4:kernel-azure-extra-5.14.21-150400.14.13.1.aarch64",
            "openSUSE Leap 15.4:kernel-azure-extra-5.14.21-150400.14.13.1.x86_64",
            "openSUSE Leap 15.4:kernel-azure-livepatch-devel-5.14.21-150400.14.13.1.aarch64",
            "openSUSE Leap 15.4:kernel-azure-livepatch-devel-5.14.21-150400.14.13.1.x86_64",
            "openSUSE Leap 15.4:kernel-azure-optional-5.14.21-150400.14.13.1.aarch64",
            "openSUSE Leap 15.4:kernel-azure-optional-5.14.21-150400.14.13.1.x86_64",
            "openSUSE Leap 15.4:kernel-devel-azure-5.14.21-150400.14.13.1.noarch",
            "openSUSE Leap 15.4:kernel-source-azure-5.14.21-150400.14.13.1.noarch",
            "openSUSE Leap 15.4:kernel-syms-azure-5.14.21-150400.14.13.1.aarch64",
            "openSUSE Leap 15.4:kernel-syms-azure-5.14.21-150400.14.13.1.x86_64",
            "openSUSE Leap 15.4:kselftests-kmp-azure-5.14.21-150400.14.13.1.aarch64",
            "openSUSE Leap 15.4:kselftests-kmp-azure-5.14.21-150400.14.13.1.x86_64",
            "openSUSE Leap 15.4:ocfs2-kmp-azure-5.14.21-150400.14.13.1.aarch64",
            "openSUSE Leap 15.4:ocfs2-kmp-azure-5.14.21-150400.14.13.1.x86_64",
            "openSUSE Leap 15.4:reiserfs-kmp-azure-5.14.21-150400.14.13.1.aarch64",
            "openSUSE Leap 15.4:reiserfs-kmp-azure-5.14.21-150400.14.13.1.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2022-09-16T08:38:48Z",
          "details": "low"
        }
      ],
      "title": "CVE-2022-3078"
    },
    {
      "cve": "CVE-2022-36879",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2022-36879"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "An issue was discovered in the Linux kernel through 5.18.14. xfrm_expand_policies in net/xfrm/xfrm_policy.c can cause a refcount to be dropped twice.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-azure-5.14.21-150400.14.13.1.aarch64",
          "SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-azure-5.14.21-150400.14.13.1.x86_64",
          "SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-azure-devel-5.14.21-150400.14.13.1.aarch64",
          "SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-azure-devel-5.14.21-150400.14.13.1.x86_64",
          "SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-devel-azure-5.14.21-150400.14.13.1.noarch",
          "SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-source-azure-5.14.21-150400.14.13.1.noarch",
          "SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-syms-azure-5.14.21-150400.14.13.1.aarch64",
          "SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-syms-azure-5.14.21-150400.14.13.1.x86_64",
          "openSUSE Leap 15.4:cluster-md-kmp-azure-5.14.21-150400.14.13.1.aarch64",
          "openSUSE Leap 15.4:cluster-md-kmp-azure-5.14.21-150400.14.13.1.x86_64",
          "openSUSE Leap 15.4:dlm-kmp-azure-5.14.21-150400.14.13.1.aarch64",
          "openSUSE Leap 15.4:dlm-kmp-azure-5.14.21-150400.14.13.1.x86_64",
          "openSUSE Leap 15.4:gfs2-kmp-azure-5.14.21-150400.14.13.1.aarch64",
          "openSUSE Leap 15.4:gfs2-kmp-azure-5.14.21-150400.14.13.1.x86_64",
          "openSUSE Leap 15.4:kernel-azure-5.14.21-150400.14.13.1.aarch64",
          "openSUSE Leap 15.4:kernel-azure-5.14.21-150400.14.13.1.x86_64",
          "openSUSE Leap 15.4:kernel-azure-devel-5.14.21-150400.14.13.1.aarch64",
          "openSUSE Leap 15.4:kernel-azure-devel-5.14.21-150400.14.13.1.x86_64",
          "openSUSE Leap 15.4:kernel-azure-extra-5.14.21-150400.14.13.1.aarch64",
          "openSUSE Leap 15.4:kernel-azure-extra-5.14.21-150400.14.13.1.x86_64",
          "openSUSE Leap 15.4:kernel-azure-livepatch-devel-5.14.21-150400.14.13.1.aarch64",
          "openSUSE Leap 15.4:kernel-azure-livepatch-devel-5.14.21-150400.14.13.1.x86_64",
          "openSUSE Leap 15.4:kernel-azure-optional-5.14.21-150400.14.13.1.aarch64",
          "openSUSE Leap 15.4:kernel-azure-optional-5.14.21-150400.14.13.1.x86_64",
          "openSUSE Leap 15.4:kernel-devel-azure-5.14.21-150400.14.13.1.noarch",
          "openSUSE Leap 15.4:kernel-source-azure-5.14.21-150400.14.13.1.noarch",
          "openSUSE Leap 15.4:kernel-syms-azure-5.14.21-150400.14.13.1.aarch64",
          "openSUSE Leap 15.4:kernel-syms-azure-5.14.21-150400.14.13.1.x86_64",
          "openSUSE Leap 15.4:kselftests-kmp-azure-5.14.21-150400.14.13.1.aarch64",
          "openSUSE Leap 15.4:kselftests-kmp-azure-5.14.21-150400.14.13.1.x86_64",
          "openSUSE Leap 15.4:ocfs2-kmp-azure-5.14.21-150400.14.13.1.aarch64",
          "openSUSE Leap 15.4:ocfs2-kmp-azure-5.14.21-150400.14.13.1.x86_64",
          "openSUSE Leap 15.4:reiserfs-kmp-azure-5.14.21-150400.14.13.1.aarch64",
          "openSUSE Leap 15.4:reiserfs-kmp-azure-5.14.21-150400.14.13.1.x86_64"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2022-36879",
          "url": "https://www.suse.com/security/cve/CVE-2022-36879"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1201948 for CVE-2022-36879",
          "url": "https://bugzilla.suse.com/1201948"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1212327 for CVE-2022-36879",
          "url": "https://bugzilla.suse.com/1212327"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-azure-5.14.21-150400.14.13.1.aarch64",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-azure-5.14.21-150400.14.13.1.x86_64",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-azure-devel-5.14.21-150400.14.13.1.aarch64",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-azure-devel-5.14.21-150400.14.13.1.x86_64",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-devel-azure-5.14.21-150400.14.13.1.noarch",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-source-azure-5.14.21-150400.14.13.1.noarch",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-syms-azure-5.14.21-150400.14.13.1.aarch64",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-syms-azure-5.14.21-150400.14.13.1.x86_64",
            "openSUSE Leap 15.4:cluster-md-kmp-azure-5.14.21-150400.14.13.1.aarch64",
            "openSUSE Leap 15.4:cluster-md-kmp-azure-5.14.21-150400.14.13.1.x86_64",
            "openSUSE Leap 15.4:dlm-kmp-azure-5.14.21-150400.14.13.1.aarch64",
            "openSUSE Leap 15.4:dlm-kmp-azure-5.14.21-150400.14.13.1.x86_64",
            "openSUSE Leap 15.4:gfs2-kmp-azure-5.14.21-150400.14.13.1.aarch64",
            "openSUSE Leap 15.4:gfs2-kmp-azure-5.14.21-150400.14.13.1.x86_64",
            "openSUSE Leap 15.4:kernel-azure-5.14.21-150400.14.13.1.aarch64",
            "openSUSE Leap 15.4:kernel-azure-5.14.21-150400.14.13.1.x86_64",
            "openSUSE Leap 15.4:kernel-azure-devel-5.14.21-150400.14.13.1.aarch64",
            "openSUSE Leap 15.4:kernel-azure-devel-5.14.21-150400.14.13.1.x86_64",
            "openSUSE Leap 15.4:kernel-azure-extra-5.14.21-150400.14.13.1.aarch64",
            "openSUSE Leap 15.4:kernel-azure-extra-5.14.21-150400.14.13.1.x86_64",
            "openSUSE Leap 15.4:kernel-azure-livepatch-devel-5.14.21-150400.14.13.1.aarch64",
            "openSUSE Leap 15.4:kernel-azure-livepatch-devel-5.14.21-150400.14.13.1.x86_64",
            "openSUSE Leap 15.4:kernel-azure-optional-5.14.21-150400.14.13.1.aarch64",
            "openSUSE Leap 15.4:kernel-azure-optional-5.14.21-150400.14.13.1.x86_64",
            "openSUSE Leap 15.4:kernel-devel-azure-5.14.21-150400.14.13.1.noarch",
            "openSUSE Leap 15.4:kernel-source-azure-5.14.21-150400.14.13.1.noarch",
            "openSUSE Leap 15.4:kernel-syms-azure-5.14.21-150400.14.13.1.aarch64",
            "openSUSE Leap 15.4:kernel-syms-azure-5.14.21-150400.14.13.1.x86_64",
            "openSUSE Leap 15.4:kselftests-kmp-azure-5.14.21-150400.14.13.1.aarch64",
            "openSUSE Leap 15.4:kselftests-kmp-azure-5.14.21-150400.14.13.1.x86_64",
            "openSUSE Leap 15.4:ocfs2-kmp-azure-5.14.21-150400.14.13.1.aarch64",
            "openSUSE Leap 15.4:ocfs2-kmp-azure-5.14.21-150400.14.13.1.x86_64",
            "openSUSE Leap 15.4:reiserfs-kmp-azure-5.14.21-150400.14.13.1.aarch64",
            "openSUSE Leap 15.4:reiserfs-kmp-azure-5.14.21-150400.14.13.1.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 4.1,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:N/I:N/A:H",
            "version": "3.1"
          },
          "products": [
            "SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-azure-5.14.21-150400.14.13.1.aarch64",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-azure-5.14.21-150400.14.13.1.x86_64",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-azure-devel-5.14.21-150400.14.13.1.aarch64",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-azure-devel-5.14.21-150400.14.13.1.x86_64",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-devel-azure-5.14.21-150400.14.13.1.noarch",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-source-azure-5.14.21-150400.14.13.1.noarch",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-syms-azure-5.14.21-150400.14.13.1.aarch64",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-syms-azure-5.14.21-150400.14.13.1.x86_64",
            "openSUSE Leap 15.4:cluster-md-kmp-azure-5.14.21-150400.14.13.1.aarch64",
            "openSUSE Leap 15.4:cluster-md-kmp-azure-5.14.21-150400.14.13.1.x86_64",
            "openSUSE Leap 15.4:dlm-kmp-azure-5.14.21-150400.14.13.1.aarch64",
            "openSUSE Leap 15.4:dlm-kmp-azure-5.14.21-150400.14.13.1.x86_64",
            "openSUSE Leap 15.4:gfs2-kmp-azure-5.14.21-150400.14.13.1.aarch64",
            "openSUSE Leap 15.4:gfs2-kmp-azure-5.14.21-150400.14.13.1.x86_64",
            "openSUSE Leap 15.4:kernel-azure-5.14.21-150400.14.13.1.aarch64",
            "openSUSE Leap 15.4:kernel-azure-5.14.21-150400.14.13.1.x86_64",
            "openSUSE Leap 15.4:kernel-azure-devel-5.14.21-150400.14.13.1.aarch64",
            "openSUSE Leap 15.4:kernel-azure-devel-5.14.21-150400.14.13.1.x86_64",
            "openSUSE Leap 15.4:kernel-azure-extra-5.14.21-150400.14.13.1.aarch64",
            "openSUSE Leap 15.4:kernel-azure-extra-5.14.21-150400.14.13.1.x86_64",
            "openSUSE Leap 15.4:kernel-azure-livepatch-devel-5.14.21-150400.14.13.1.aarch64",
            "openSUSE Leap 15.4:kernel-azure-livepatch-devel-5.14.21-150400.14.13.1.x86_64",
            "openSUSE Leap 15.4:kernel-azure-optional-5.14.21-150400.14.13.1.aarch64",
            "openSUSE Leap 15.4:kernel-azure-optional-5.14.21-150400.14.13.1.x86_64",
            "openSUSE Leap 15.4:kernel-devel-azure-5.14.21-150400.14.13.1.noarch",
            "openSUSE Leap 15.4:kernel-source-azure-5.14.21-150400.14.13.1.noarch",
            "openSUSE Leap 15.4:kernel-syms-azure-5.14.21-150400.14.13.1.aarch64",
            "openSUSE Leap 15.4:kernel-syms-azure-5.14.21-150400.14.13.1.x86_64",
            "openSUSE Leap 15.4:kselftests-kmp-azure-5.14.21-150400.14.13.1.aarch64",
            "openSUSE Leap 15.4:kselftests-kmp-azure-5.14.21-150400.14.13.1.x86_64",
            "openSUSE Leap 15.4:ocfs2-kmp-azure-5.14.21-150400.14.13.1.aarch64",
            "openSUSE Leap 15.4:ocfs2-kmp-azure-5.14.21-150400.14.13.1.x86_64",
            "openSUSE Leap 15.4:reiserfs-kmp-azure-5.14.21-150400.14.13.1.aarch64",
            "openSUSE Leap 15.4:reiserfs-kmp-azure-5.14.21-150400.14.13.1.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2022-09-16T08:38:48Z",
          "details": "moderate"
        }
      ],
      "title": "CVE-2022-36879"
    },
    {
      "cve": "CVE-2022-36946",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2022-36946"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "nfqnl_mangle in net/netfilter/nfnetlink_queue.c in the Linux kernel through 5.18.14 allows remote attackers to cause a denial of service (panic) because, in the case of an nf_queue verdict with a one-byte nfta_payload attribute, an skb_pull can encounter a negative skb-\u003elen.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-azure-5.14.21-150400.14.13.1.aarch64",
          "SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-azure-5.14.21-150400.14.13.1.x86_64",
          "SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-azure-devel-5.14.21-150400.14.13.1.aarch64",
          "SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-azure-devel-5.14.21-150400.14.13.1.x86_64",
          "SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-devel-azure-5.14.21-150400.14.13.1.noarch",
          "SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-source-azure-5.14.21-150400.14.13.1.noarch",
          "SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-syms-azure-5.14.21-150400.14.13.1.aarch64",
          "SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-syms-azure-5.14.21-150400.14.13.1.x86_64",
          "openSUSE Leap 15.4:cluster-md-kmp-azure-5.14.21-150400.14.13.1.aarch64",
          "openSUSE Leap 15.4:cluster-md-kmp-azure-5.14.21-150400.14.13.1.x86_64",
          "openSUSE Leap 15.4:dlm-kmp-azure-5.14.21-150400.14.13.1.aarch64",
          "openSUSE Leap 15.4:dlm-kmp-azure-5.14.21-150400.14.13.1.x86_64",
          "openSUSE Leap 15.4:gfs2-kmp-azure-5.14.21-150400.14.13.1.aarch64",
          "openSUSE Leap 15.4:gfs2-kmp-azure-5.14.21-150400.14.13.1.x86_64",
          "openSUSE Leap 15.4:kernel-azure-5.14.21-150400.14.13.1.aarch64",
          "openSUSE Leap 15.4:kernel-azure-5.14.21-150400.14.13.1.x86_64",
          "openSUSE Leap 15.4:kernel-azure-devel-5.14.21-150400.14.13.1.aarch64",
          "openSUSE Leap 15.4:kernel-azure-devel-5.14.21-150400.14.13.1.x86_64",
          "openSUSE Leap 15.4:kernel-azure-extra-5.14.21-150400.14.13.1.aarch64",
          "openSUSE Leap 15.4:kernel-azure-extra-5.14.21-150400.14.13.1.x86_64",
          "openSUSE Leap 15.4:kernel-azure-livepatch-devel-5.14.21-150400.14.13.1.aarch64",
          "openSUSE Leap 15.4:kernel-azure-livepatch-devel-5.14.21-150400.14.13.1.x86_64",
          "openSUSE Leap 15.4:kernel-azure-optional-5.14.21-150400.14.13.1.aarch64",
          "openSUSE Leap 15.4:kernel-azure-optional-5.14.21-150400.14.13.1.x86_64",
          "openSUSE Leap 15.4:kernel-devel-azure-5.14.21-150400.14.13.1.noarch",
          "openSUSE Leap 15.4:kernel-source-azure-5.14.21-150400.14.13.1.noarch",
          "openSUSE Leap 15.4:kernel-syms-azure-5.14.21-150400.14.13.1.aarch64",
          "openSUSE Leap 15.4:kernel-syms-azure-5.14.21-150400.14.13.1.x86_64",
          "openSUSE Leap 15.4:kselftests-kmp-azure-5.14.21-150400.14.13.1.aarch64",
          "openSUSE Leap 15.4:kselftests-kmp-azure-5.14.21-150400.14.13.1.x86_64",
          "openSUSE Leap 15.4:ocfs2-kmp-azure-5.14.21-150400.14.13.1.aarch64",
          "openSUSE Leap 15.4:ocfs2-kmp-azure-5.14.21-150400.14.13.1.x86_64",
          "openSUSE Leap 15.4:reiserfs-kmp-azure-5.14.21-150400.14.13.1.aarch64",
          "openSUSE Leap 15.4:reiserfs-kmp-azure-5.14.21-150400.14.13.1.x86_64"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2022-36946",
          "url": "https://www.suse.com/security/cve/CVE-2022-36946"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1201940 for CVE-2022-36946",
          "url": "https://bugzilla.suse.com/1201940"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1201941 for CVE-2022-36946",
          "url": "https://bugzilla.suse.com/1201941"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1202312 for CVE-2022-36946",
          "url": "https://bugzilla.suse.com/1202312"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1202874 for CVE-2022-36946",
          "url": "https://bugzilla.suse.com/1202874"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1203208 for CVE-2022-36946",
          "url": "https://bugzilla.suse.com/1203208"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1204132 for CVE-2022-36946",
          "url": "https://bugzilla.suse.com/1204132"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1205313 for CVE-2022-36946",
          "url": "https://bugzilla.suse.com/1205313"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1212310 for CVE-2022-36946",
          "url": "https://bugzilla.suse.com/1212310"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-azure-5.14.21-150400.14.13.1.aarch64",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-azure-5.14.21-150400.14.13.1.x86_64",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-azure-devel-5.14.21-150400.14.13.1.aarch64",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-azure-devel-5.14.21-150400.14.13.1.x86_64",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-devel-azure-5.14.21-150400.14.13.1.noarch",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-source-azure-5.14.21-150400.14.13.1.noarch",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-syms-azure-5.14.21-150400.14.13.1.aarch64",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-syms-azure-5.14.21-150400.14.13.1.x86_64",
            "openSUSE Leap 15.4:cluster-md-kmp-azure-5.14.21-150400.14.13.1.aarch64",
            "openSUSE Leap 15.4:cluster-md-kmp-azure-5.14.21-150400.14.13.1.x86_64",
            "openSUSE Leap 15.4:dlm-kmp-azure-5.14.21-150400.14.13.1.aarch64",
            "openSUSE Leap 15.4:dlm-kmp-azure-5.14.21-150400.14.13.1.x86_64",
            "openSUSE Leap 15.4:gfs2-kmp-azure-5.14.21-150400.14.13.1.aarch64",
            "openSUSE Leap 15.4:gfs2-kmp-azure-5.14.21-150400.14.13.1.x86_64",
            "openSUSE Leap 15.4:kernel-azure-5.14.21-150400.14.13.1.aarch64",
            "openSUSE Leap 15.4:kernel-azure-5.14.21-150400.14.13.1.x86_64",
            "openSUSE Leap 15.4:kernel-azure-devel-5.14.21-150400.14.13.1.aarch64",
            "openSUSE Leap 15.4:kernel-azure-devel-5.14.21-150400.14.13.1.x86_64",
            "openSUSE Leap 15.4:kernel-azure-extra-5.14.21-150400.14.13.1.aarch64",
            "openSUSE Leap 15.4:kernel-azure-extra-5.14.21-150400.14.13.1.x86_64",
            "openSUSE Leap 15.4:kernel-azure-livepatch-devel-5.14.21-150400.14.13.1.aarch64",
            "openSUSE Leap 15.4:kernel-azure-livepatch-devel-5.14.21-150400.14.13.1.x86_64",
            "openSUSE Leap 15.4:kernel-azure-optional-5.14.21-150400.14.13.1.aarch64",
            "openSUSE Leap 15.4:kernel-azure-optional-5.14.21-150400.14.13.1.x86_64",
            "openSUSE Leap 15.4:kernel-devel-azure-5.14.21-150400.14.13.1.noarch",
            "openSUSE Leap 15.4:kernel-source-azure-5.14.21-150400.14.13.1.noarch",
            "openSUSE Leap 15.4:kernel-syms-azure-5.14.21-150400.14.13.1.aarch64",
            "openSUSE Leap 15.4:kernel-syms-azure-5.14.21-150400.14.13.1.x86_64",
            "openSUSE Leap 15.4:kselftests-kmp-azure-5.14.21-150400.14.13.1.aarch64",
            "openSUSE Leap 15.4:kselftests-kmp-azure-5.14.21-150400.14.13.1.x86_64",
            "openSUSE Leap 15.4:ocfs2-kmp-azure-5.14.21-150400.14.13.1.aarch64",
            "openSUSE Leap 15.4:ocfs2-kmp-azure-5.14.21-150400.14.13.1.x86_64",
            "openSUSE Leap 15.4:reiserfs-kmp-azure-5.14.21-150400.14.13.1.aarch64",
            "openSUSE Leap 15.4:reiserfs-kmp-azure-5.14.21-150400.14.13.1.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 7.5,
            "baseSeverity": "HIGH",
            "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
            "version": "3.1"
          },
          "products": [
            "SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-azure-5.14.21-150400.14.13.1.aarch64",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-azure-5.14.21-150400.14.13.1.x86_64",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-azure-devel-5.14.21-150400.14.13.1.aarch64",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-azure-devel-5.14.21-150400.14.13.1.x86_64",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-devel-azure-5.14.21-150400.14.13.1.noarch",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-source-azure-5.14.21-150400.14.13.1.noarch",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-syms-azure-5.14.21-150400.14.13.1.aarch64",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-syms-azure-5.14.21-150400.14.13.1.x86_64",
            "openSUSE Leap 15.4:cluster-md-kmp-azure-5.14.21-150400.14.13.1.aarch64",
            "openSUSE Leap 15.4:cluster-md-kmp-azure-5.14.21-150400.14.13.1.x86_64",
            "openSUSE Leap 15.4:dlm-kmp-azure-5.14.21-150400.14.13.1.aarch64",
            "openSUSE Leap 15.4:dlm-kmp-azure-5.14.21-150400.14.13.1.x86_64",
            "openSUSE Leap 15.4:gfs2-kmp-azure-5.14.21-150400.14.13.1.aarch64",
            "openSUSE Leap 15.4:gfs2-kmp-azure-5.14.21-150400.14.13.1.x86_64",
            "openSUSE Leap 15.4:kernel-azure-5.14.21-150400.14.13.1.aarch64",
            "openSUSE Leap 15.4:kernel-azure-5.14.21-150400.14.13.1.x86_64",
            "openSUSE Leap 15.4:kernel-azure-devel-5.14.21-150400.14.13.1.aarch64",
            "openSUSE Leap 15.4:kernel-azure-devel-5.14.21-150400.14.13.1.x86_64",
            "openSUSE Leap 15.4:kernel-azure-extra-5.14.21-150400.14.13.1.aarch64",
            "openSUSE Leap 15.4:kernel-azure-extra-5.14.21-150400.14.13.1.x86_64",
            "openSUSE Leap 15.4:kernel-azure-livepatch-devel-5.14.21-150400.14.13.1.aarch64",
            "openSUSE Leap 15.4:kernel-azure-livepatch-devel-5.14.21-150400.14.13.1.x86_64",
            "openSUSE Leap 15.4:kernel-azure-optional-5.14.21-150400.14.13.1.aarch64",
            "openSUSE Leap 15.4:kernel-azure-optional-5.14.21-150400.14.13.1.x86_64",
            "openSUSE Leap 15.4:kernel-devel-azure-5.14.21-150400.14.13.1.noarch",
            "openSUSE Leap 15.4:kernel-source-azure-5.14.21-150400.14.13.1.noarch",
            "openSUSE Leap 15.4:kernel-syms-azure-5.14.21-150400.14.13.1.aarch64",
            "openSUSE Leap 15.4:kernel-syms-azure-5.14.21-150400.14.13.1.x86_64",
            "openSUSE Leap 15.4:kselftests-kmp-azure-5.14.21-150400.14.13.1.aarch64",
            "openSUSE Leap 15.4:kselftests-kmp-azure-5.14.21-150400.14.13.1.x86_64",
            "openSUSE Leap 15.4:ocfs2-kmp-azure-5.14.21-150400.14.13.1.aarch64",
            "openSUSE Leap 15.4:ocfs2-kmp-azure-5.14.21-150400.14.13.1.x86_64",
            "openSUSE Leap 15.4:reiserfs-kmp-azure-5.14.21-150400.14.13.1.aarch64",
            "openSUSE Leap 15.4:reiserfs-kmp-azure-5.14.21-150400.14.13.1.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2022-09-16T08:38:48Z",
          "details": "important"
        }
      ],
      "title": "CVE-2022-36946"
    },
    {
      "cve": "CVE-2022-39188",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2022-39188"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "An issue was discovered in include/asm-generic/tlb.h in the Linux kernel before 5.19. Because of a race condition (unmap_mapping_range versus munmap), a device driver can free a page while it still has stale TLB entries. This only occurs in situations with VM_PFNMAP VMAs.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-azure-5.14.21-150400.14.13.1.aarch64",
          "SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-azure-5.14.21-150400.14.13.1.x86_64",
          "SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-azure-devel-5.14.21-150400.14.13.1.aarch64",
          "SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-azure-devel-5.14.21-150400.14.13.1.x86_64",
          "SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-devel-azure-5.14.21-150400.14.13.1.noarch",
          "SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-source-azure-5.14.21-150400.14.13.1.noarch",
          "SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-syms-azure-5.14.21-150400.14.13.1.aarch64",
          "SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-syms-azure-5.14.21-150400.14.13.1.x86_64",
          "openSUSE Leap 15.4:cluster-md-kmp-azure-5.14.21-150400.14.13.1.aarch64",
          "openSUSE Leap 15.4:cluster-md-kmp-azure-5.14.21-150400.14.13.1.x86_64",
          "openSUSE Leap 15.4:dlm-kmp-azure-5.14.21-150400.14.13.1.aarch64",
          "openSUSE Leap 15.4:dlm-kmp-azure-5.14.21-150400.14.13.1.x86_64",
          "openSUSE Leap 15.4:gfs2-kmp-azure-5.14.21-150400.14.13.1.aarch64",
          "openSUSE Leap 15.4:gfs2-kmp-azure-5.14.21-150400.14.13.1.x86_64",
          "openSUSE Leap 15.4:kernel-azure-5.14.21-150400.14.13.1.aarch64",
          "openSUSE Leap 15.4:kernel-azure-5.14.21-150400.14.13.1.x86_64",
          "openSUSE Leap 15.4:kernel-azure-devel-5.14.21-150400.14.13.1.aarch64",
          "openSUSE Leap 15.4:kernel-azure-devel-5.14.21-150400.14.13.1.x86_64",
          "openSUSE Leap 15.4:kernel-azure-extra-5.14.21-150400.14.13.1.aarch64",
          "openSUSE Leap 15.4:kernel-azure-extra-5.14.21-150400.14.13.1.x86_64",
          "openSUSE Leap 15.4:kernel-azure-livepatch-devel-5.14.21-150400.14.13.1.aarch64",
          "openSUSE Leap 15.4:kernel-azure-livepatch-devel-5.14.21-150400.14.13.1.x86_64",
          "openSUSE Leap 15.4:kernel-azure-optional-5.14.21-150400.14.13.1.aarch64",
          "openSUSE Leap 15.4:kernel-azure-optional-5.14.21-150400.14.13.1.x86_64",
          "openSUSE Leap 15.4:kernel-devel-azure-5.14.21-150400.14.13.1.noarch",
          "openSUSE Leap 15.4:kernel-source-azure-5.14.21-150400.14.13.1.noarch",
          "openSUSE Leap 15.4:kernel-syms-azure-5.14.21-150400.14.13.1.aarch64",
          "openSUSE Leap 15.4:kernel-syms-azure-5.14.21-150400.14.13.1.x86_64",
          "openSUSE Leap 15.4:kselftests-kmp-azure-5.14.21-150400.14.13.1.aarch64",
          "openSUSE Leap 15.4:kselftests-kmp-azure-5.14.21-150400.14.13.1.x86_64",
          "openSUSE Leap 15.4:ocfs2-kmp-azure-5.14.21-150400.14.13.1.aarch64",
          "openSUSE Leap 15.4:ocfs2-kmp-azure-5.14.21-150400.14.13.1.x86_64",
          "openSUSE Leap 15.4:reiserfs-kmp-azure-5.14.21-150400.14.13.1.aarch64",
          "openSUSE Leap 15.4:reiserfs-kmp-azure-5.14.21-150400.14.13.1.x86_64"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2022-39188",
          "url": "https://www.suse.com/security/cve/CVE-2022-39188"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1203107 for CVE-2022-39188",
          "url": "https://bugzilla.suse.com/1203107"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1203116 for CVE-2022-39188",
          "url": "https://bugzilla.suse.com/1203116"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1205313 for CVE-2022-39188",
          "url": "https://bugzilla.suse.com/1205313"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1209225 for CVE-2022-39188",
          "url": "https://bugzilla.suse.com/1209225"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1212326 for CVE-2022-39188",
          "url": "https://bugzilla.suse.com/1212326"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-azure-5.14.21-150400.14.13.1.aarch64",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-azure-5.14.21-150400.14.13.1.x86_64",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-azure-devel-5.14.21-150400.14.13.1.aarch64",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-azure-devel-5.14.21-150400.14.13.1.x86_64",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-devel-azure-5.14.21-150400.14.13.1.noarch",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-source-azure-5.14.21-150400.14.13.1.noarch",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-syms-azure-5.14.21-150400.14.13.1.aarch64",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-syms-azure-5.14.21-150400.14.13.1.x86_64",
            "openSUSE Leap 15.4:cluster-md-kmp-azure-5.14.21-150400.14.13.1.aarch64",
            "openSUSE Leap 15.4:cluster-md-kmp-azure-5.14.21-150400.14.13.1.x86_64",
            "openSUSE Leap 15.4:dlm-kmp-azure-5.14.21-150400.14.13.1.aarch64",
            "openSUSE Leap 15.4:dlm-kmp-azure-5.14.21-150400.14.13.1.x86_64",
            "openSUSE Leap 15.4:gfs2-kmp-azure-5.14.21-150400.14.13.1.aarch64",
            "openSUSE Leap 15.4:gfs2-kmp-azure-5.14.21-150400.14.13.1.x86_64",
            "openSUSE Leap 15.4:kernel-azure-5.14.21-150400.14.13.1.aarch64",
            "openSUSE Leap 15.4:kernel-azure-5.14.21-150400.14.13.1.x86_64",
            "openSUSE Leap 15.4:kernel-azure-devel-5.14.21-150400.14.13.1.aarch64",
            "openSUSE Leap 15.4:kernel-azure-devel-5.14.21-150400.14.13.1.x86_64",
            "openSUSE Leap 15.4:kernel-azure-extra-5.14.21-150400.14.13.1.aarch64",
            "openSUSE Leap 15.4:kernel-azure-extra-5.14.21-150400.14.13.1.x86_64",
            "openSUSE Leap 15.4:kernel-azure-livepatch-devel-5.14.21-150400.14.13.1.aarch64",
            "openSUSE Leap 15.4:kernel-azure-livepatch-devel-5.14.21-150400.14.13.1.x86_64",
            "openSUSE Leap 15.4:kernel-azure-optional-5.14.21-150400.14.13.1.aarch64",
            "openSUSE Leap 15.4:kernel-azure-optional-5.14.21-150400.14.13.1.x86_64",
            "openSUSE Leap 15.4:kernel-devel-azure-5.14.21-150400.14.13.1.noarch",
            "openSUSE Leap 15.4:kernel-source-azure-5.14.21-150400.14.13.1.noarch",
            "openSUSE Leap 15.4:kernel-syms-azure-5.14.21-150400.14.13.1.aarch64",
            "openSUSE Leap 15.4:kernel-syms-azure-5.14.21-150400.14.13.1.x86_64",
            "openSUSE Leap 15.4:kselftests-kmp-azure-5.14.21-150400.14.13.1.aarch64",
            "openSUSE Leap 15.4:kselftests-kmp-azure-5.14.21-150400.14.13.1.x86_64",
            "openSUSE Leap 15.4:ocfs2-kmp-azure-5.14.21-150400.14.13.1.aarch64",
            "openSUSE Leap 15.4:ocfs2-kmp-azure-5.14.21-150400.14.13.1.x86_64",
            "openSUSE Leap 15.4:reiserfs-kmp-azure-5.14.21-150400.14.13.1.aarch64",
            "openSUSE Leap 15.4:reiserfs-kmp-azure-5.14.21-150400.14.13.1.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 7,
            "baseSeverity": "HIGH",
            "vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H",
            "version": "3.1"
          },
          "products": [
            "SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-azure-5.14.21-150400.14.13.1.aarch64",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-azure-5.14.21-150400.14.13.1.x86_64",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-azure-devel-5.14.21-150400.14.13.1.aarch64",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-azure-devel-5.14.21-150400.14.13.1.x86_64",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-devel-azure-5.14.21-150400.14.13.1.noarch",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-source-azure-5.14.21-150400.14.13.1.noarch",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-syms-azure-5.14.21-150400.14.13.1.aarch64",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-syms-azure-5.14.21-150400.14.13.1.x86_64",
            "openSUSE Leap 15.4:cluster-md-kmp-azure-5.14.21-150400.14.13.1.aarch64",
            "openSUSE Leap 15.4:cluster-md-kmp-azure-5.14.21-150400.14.13.1.x86_64",
            "openSUSE Leap 15.4:dlm-kmp-azure-5.14.21-150400.14.13.1.aarch64",
            "openSUSE Leap 15.4:dlm-kmp-azure-5.14.21-150400.14.13.1.x86_64",
            "openSUSE Leap 15.4:gfs2-kmp-azure-5.14.21-150400.14.13.1.aarch64",
            "openSUSE Leap 15.4:gfs2-kmp-azure-5.14.21-150400.14.13.1.x86_64",
            "openSUSE Leap 15.4:kernel-azure-5.14.21-150400.14.13.1.aarch64",
            "openSUSE Leap 15.4:kernel-azure-5.14.21-150400.14.13.1.x86_64",
            "openSUSE Leap 15.4:kernel-azure-devel-5.14.21-150400.14.13.1.aarch64",
            "openSUSE Leap 15.4:kernel-azure-devel-5.14.21-150400.14.13.1.x86_64",
            "openSUSE Leap 15.4:kernel-azure-extra-5.14.21-150400.14.13.1.aarch64",
            "openSUSE Leap 15.4:kernel-azure-extra-5.14.21-150400.14.13.1.x86_64",
            "openSUSE Leap 15.4:kernel-azure-livepatch-devel-5.14.21-150400.14.13.1.aarch64",
            "openSUSE Leap 15.4:kernel-azure-livepatch-devel-5.14.21-150400.14.13.1.x86_64",
            "openSUSE Leap 15.4:kernel-azure-optional-5.14.21-150400.14.13.1.aarch64",
            "openSUSE Leap 15.4:kernel-azure-optional-5.14.21-150400.14.13.1.x86_64",
            "openSUSE Leap 15.4:kernel-devel-azure-5.14.21-150400.14.13.1.noarch",
            "openSUSE Leap 15.4:kernel-source-azure-5.14.21-150400.14.13.1.noarch",
            "openSUSE Leap 15.4:kernel-syms-azure-5.14.21-150400.14.13.1.aarch64",
            "openSUSE Leap 15.4:kernel-syms-azure-5.14.21-150400.14.13.1.x86_64",
            "openSUSE Leap 15.4:kselftests-kmp-azure-5.14.21-150400.14.13.1.aarch64",
            "openSUSE Leap 15.4:kselftests-kmp-azure-5.14.21-150400.14.13.1.x86_64",
            "openSUSE Leap 15.4:ocfs2-kmp-azure-5.14.21-150400.14.13.1.aarch64",
            "openSUSE Leap 15.4:ocfs2-kmp-azure-5.14.21-150400.14.13.1.x86_64",
            "openSUSE Leap 15.4:reiserfs-kmp-azure-5.14.21-150400.14.13.1.aarch64",
            "openSUSE Leap 15.4:reiserfs-kmp-azure-5.14.21-150400.14.13.1.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2022-09-16T08:38:48Z",
          "details": "moderate"
        }
      ],
      "title": "CVE-2022-39188"
    },
    {
      "cve": "CVE-2022-39190",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2022-39190"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "An issue was discovered in net/netfilter/nf_tables_api.c in the Linux kernel before 5.19.6. A denial of service can occur upon binding to an already bound chain.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-azure-5.14.21-150400.14.13.1.aarch64",
          "SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-azure-5.14.21-150400.14.13.1.x86_64",
          "SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-azure-devel-5.14.21-150400.14.13.1.aarch64",
          "SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-azure-devel-5.14.21-150400.14.13.1.x86_64",
          "SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-devel-azure-5.14.21-150400.14.13.1.noarch",
          "SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-source-azure-5.14.21-150400.14.13.1.noarch",
          "SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-syms-azure-5.14.21-150400.14.13.1.aarch64",
          "SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-syms-azure-5.14.21-150400.14.13.1.x86_64",
          "openSUSE Leap 15.4:cluster-md-kmp-azure-5.14.21-150400.14.13.1.aarch64",
          "openSUSE Leap 15.4:cluster-md-kmp-azure-5.14.21-150400.14.13.1.x86_64",
          "openSUSE Leap 15.4:dlm-kmp-azure-5.14.21-150400.14.13.1.aarch64",
          "openSUSE Leap 15.4:dlm-kmp-azure-5.14.21-150400.14.13.1.x86_64",
          "openSUSE Leap 15.4:gfs2-kmp-azure-5.14.21-150400.14.13.1.aarch64",
          "openSUSE Leap 15.4:gfs2-kmp-azure-5.14.21-150400.14.13.1.x86_64",
          "openSUSE Leap 15.4:kernel-azure-5.14.21-150400.14.13.1.aarch64",
          "openSUSE Leap 15.4:kernel-azure-5.14.21-150400.14.13.1.x86_64",
          "openSUSE Leap 15.4:kernel-azure-devel-5.14.21-150400.14.13.1.aarch64",
          "openSUSE Leap 15.4:kernel-azure-devel-5.14.21-150400.14.13.1.x86_64",
          "openSUSE Leap 15.4:kernel-azure-extra-5.14.21-150400.14.13.1.aarch64",
          "openSUSE Leap 15.4:kernel-azure-extra-5.14.21-150400.14.13.1.x86_64",
          "openSUSE Leap 15.4:kernel-azure-livepatch-devel-5.14.21-150400.14.13.1.aarch64",
          "openSUSE Leap 15.4:kernel-azure-livepatch-devel-5.14.21-150400.14.13.1.x86_64",
          "openSUSE Leap 15.4:kernel-azure-optional-5.14.21-150400.14.13.1.aarch64",
          "openSUSE Leap 15.4:kernel-azure-optional-5.14.21-150400.14.13.1.x86_64",
          "openSUSE Leap 15.4:kernel-devel-azure-5.14.21-150400.14.13.1.noarch",
          "openSUSE Leap 15.4:kernel-source-azure-5.14.21-150400.14.13.1.noarch",
          "openSUSE Leap 15.4:kernel-syms-azure-5.14.21-150400.14.13.1.aarch64",
          "openSUSE Leap 15.4:kernel-syms-azure-5.14.21-150400.14.13.1.x86_64",
          "openSUSE Leap 15.4:kselftests-kmp-azure-5.14.21-150400.14.13.1.aarch64",
          "openSUSE Leap 15.4:kselftests-kmp-azure-5.14.21-150400.14.13.1.x86_64",
          "openSUSE Leap 15.4:ocfs2-kmp-azure-5.14.21-150400.14.13.1.aarch64",
          "openSUSE Leap 15.4:ocfs2-kmp-azure-5.14.21-150400.14.13.1.x86_64",
          "openSUSE Leap 15.4:reiserfs-kmp-azure-5.14.21-150400.14.13.1.aarch64",
          "openSUSE Leap 15.4:reiserfs-kmp-azure-5.14.21-150400.14.13.1.x86_64"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2022-39190",
          "url": "https://www.suse.com/security/cve/CVE-2022-39190"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1203117 for CVE-2022-39190",
          "url": "https://bugzilla.suse.com/1203117"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-azure-5.14.21-150400.14.13.1.aarch64",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-azure-5.14.21-150400.14.13.1.x86_64",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-azure-devel-5.14.21-150400.14.13.1.aarch64",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-azure-devel-5.14.21-150400.14.13.1.x86_64",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-devel-azure-5.14.21-150400.14.13.1.noarch",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-source-azure-5.14.21-150400.14.13.1.noarch",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-syms-azure-5.14.21-150400.14.13.1.aarch64",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-syms-azure-5.14.21-150400.14.13.1.x86_64",
            "openSUSE Leap 15.4:cluster-md-kmp-azure-5.14.21-150400.14.13.1.aarch64",
            "openSUSE Leap 15.4:cluster-md-kmp-azure-5.14.21-150400.14.13.1.x86_64",
            "openSUSE Leap 15.4:dlm-kmp-azure-5.14.21-150400.14.13.1.aarch64",
            "openSUSE Leap 15.4:dlm-kmp-azure-5.14.21-150400.14.13.1.x86_64",
            "openSUSE Leap 15.4:gfs2-kmp-azure-5.14.21-150400.14.13.1.aarch64",
            "openSUSE Leap 15.4:gfs2-kmp-azure-5.14.21-150400.14.13.1.x86_64",
            "openSUSE Leap 15.4:kernel-azure-5.14.21-150400.14.13.1.aarch64",
            "openSUSE Leap 15.4:kernel-azure-5.14.21-150400.14.13.1.x86_64",
            "openSUSE Leap 15.4:kernel-azure-devel-5.14.21-150400.14.13.1.aarch64",
            "openSUSE Leap 15.4:kernel-azure-devel-5.14.21-150400.14.13.1.x86_64",
            "openSUSE Leap 15.4:kernel-azure-extra-5.14.21-150400.14.13.1.aarch64",
            "openSUSE Leap 15.4:kernel-azure-extra-5.14.21-150400.14.13.1.x86_64",
            "openSUSE Leap 15.4:kernel-azure-livepatch-devel-5.14.21-150400.14.13.1.aarch64",
            "openSUSE Leap 15.4:kernel-azure-livepatch-devel-5.14.21-150400.14.13.1.x86_64",
            "openSUSE Leap 15.4:kernel-azure-optional-5.14.21-150400.14.13.1.aarch64",
            "openSUSE Leap 15.4:kernel-azure-optional-5.14.21-150400.14.13.1.x86_64",
            "openSUSE Leap 15.4:kernel-devel-azure-5.14.21-150400.14.13.1.noarch",
            "openSUSE Leap 15.4:kernel-source-azure-5.14.21-150400.14.13.1.noarch",
            "openSUSE Leap 15.4:kernel-syms-azure-5.14.21-150400.14.13.1.aarch64",
            "openSUSE Leap 15.4:kernel-syms-azure-5.14.21-150400.14.13.1.x86_64",
            "openSUSE Leap 15.4:kselftests-kmp-azure-5.14.21-150400.14.13.1.aarch64",
            "openSUSE Leap 15.4:kselftests-kmp-azure-5.14.21-150400.14.13.1.x86_64",
            "openSUSE Leap 15.4:ocfs2-kmp-azure-5.14.21-150400.14.13.1.aarch64",
            "openSUSE Leap 15.4:ocfs2-kmp-azure-5.14.21-150400.14.13.1.x86_64",
            "openSUSE Leap 15.4:reiserfs-kmp-azure-5.14.21-150400.14.13.1.aarch64",
            "openSUSE Leap 15.4:reiserfs-kmp-azure-5.14.21-150400.14.13.1.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 5.5,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
            "version": "3.1"
          },
          "products": [
            "SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-azure-5.14.21-150400.14.13.1.aarch64",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-azure-5.14.21-150400.14.13.1.x86_64",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-azure-devel-5.14.21-150400.14.13.1.aarch64",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-azure-devel-5.14.21-150400.14.13.1.x86_64",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-devel-azure-5.14.21-150400.14.13.1.noarch",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-source-azure-5.14.21-150400.14.13.1.noarch",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-syms-azure-5.14.21-150400.14.13.1.aarch64",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-syms-azure-5.14.21-150400.14.13.1.x86_64",
            "openSUSE Leap 15.4:cluster-md-kmp-azure-5.14.21-150400.14.13.1.aarch64",
            "openSUSE Leap 15.4:cluster-md-kmp-azure-5.14.21-150400.14.13.1.x86_64",
            "openSUSE Leap 15.4:dlm-kmp-azure-5.14.21-150400.14.13.1.aarch64",
            "openSUSE Leap 15.4:dlm-kmp-azure-5.14.21-150400.14.13.1.x86_64",
            "openSUSE Leap 15.4:gfs2-kmp-azure-5.14.21-150400.14.13.1.aarch64",
            "openSUSE Leap 15.4:gfs2-kmp-azure-5.14.21-150400.14.13.1.x86_64",
            "openSUSE Leap 15.4:kernel-azure-5.14.21-150400.14.13.1.aarch64",
            "openSUSE Leap 15.4:kernel-azure-5.14.21-150400.14.13.1.x86_64",
            "openSUSE Leap 15.4:kernel-azure-devel-5.14.21-150400.14.13.1.aarch64",
            "openSUSE Leap 15.4:kernel-azure-devel-5.14.21-150400.14.13.1.x86_64",
            "openSUSE Leap 15.4:kernel-azure-extra-5.14.21-150400.14.13.1.aarch64",
            "openSUSE Leap 15.4:kernel-azure-extra-5.14.21-150400.14.13.1.x86_64",
            "openSUSE Leap 15.4:kernel-azure-livepatch-devel-5.14.21-150400.14.13.1.aarch64",
            "openSUSE Leap 15.4:kernel-azure-livepatch-devel-5.14.21-150400.14.13.1.x86_64",
            "openSUSE Leap 15.4:kernel-azure-optional-5.14.21-150400.14.13.1.aarch64",
            "openSUSE Leap 15.4:kernel-azure-optional-5.14.21-150400.14.13.1.x86_64",
            "openSUSE Leap 15.4:kernel-devel-azure-5.14.21-150400.14.13.1.noarch",
            "openSUSE Leap 15.4:kernel-source-azure-5.14.21-150400.14.13.1.noarch",
            "openSUSE Leap 15.4:kernel-syms-azure-5.14.21-150400.14.13.1.aarch64",
            "openSUSE Leap 15.4:kernel-syms-azure-5.14.21-150400.14.13.1.x86_64",
            "openSUSE Leap 15.4:kselftests-kmp-azure-5.14.21-150400.14.13.1.aarch64",
            "openSUSE Leap 15.4:kselftests-kmp-azure-5.14.21-150400.14.13.1.x86_64",
            "openSUSE Leap 15.4:ocfs2-kmp-azure-5.14.21-150400.14.13.1.aarch64",
            "openSUSE Leap 15.4:ocfs2-kmp-azure-5.14.21-150400.14.13.1.x86_64",
            "openSUSE Leap 15.4:reiserfs-kmp-azure-5.14.21-150400.14.13.1.aarch64",
            "openSUSE Leap 15.4:reiserfs-kmp-azure-5.14.21-150400.14.13.1.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2022-09-16T08:38:48Z",
          "details": "moderate"
        }
      ],
      "title": "CVE-2022-39190"
    }
  ]
}
  suse-su-2022:3809-1
Vulnerability from csaf_suse
Published
2022-10-31 08:28
    Modified
2022-10-31 08:28
    Summary
Security update for the Linux Kernel
    Notes
Title of the patch
Security update for the Linux Kernel
    Description of the patch
The SUSE Linux Enterprise 15 SP3 RT kernel was updated to receive various security and bugfixes.
The following security bugs were fixed:
- CVE-2016-3695: Fixed an issue inside the einj_error_inject function in drivers/acpi/apei/einj.c that allowed users to simulate hardware errors and consequently cause a denial of service (bnc#1023051).
- CVE-2020-16119: Fixed a use-after-free due to reuse of a DCCP socket with an attached dccps_hc_tx_ccid object as a listener after being released (bnc#1177471).
- CVE-2020-27784: Fixed a vulnerability that was found in printer_ioctl() printer_ioctl() when accessing a deallocated instance (bnc#1202895).
- CVE-2021-4155: Fixed a data leak flaw that was found in the way XFS_IOC_ALLOCSP IOCTL in the XFS filesystem (bnc#1194272).
- CVE-2021-4203: Fixed use-after-free read flaw that was found in sock_getsockopt() in net/core/sock.c due to SO_PEERCRED and SO_PEERGROUPS race with listen() (bnc#1194535).
- CVE-2022-20368: Fixed slab-out-of-bounds access in packet_recvmsg() (bsc#1202346).
- CVE-2022-20369: Fixed out of bounds write in v4l2_m2m_querybuf of v4l2-mem2mem.c (bnc#1202347).
- CVE-2022-2503: Fixed a LoadPin bypass in Dm-verity (bnc#1202677).
- CVE-2022-2586: Fixed issue in netfilter that allowed CHAIN_ID to refer to another table (bsc#1202095).
- CVE-2022-2588: Fixed use-after-free in cls_route (bsc#1202096).
- CVE-2022-26373: Fixed non-transparent sharing of return predictor targets between contexts in some Intel Processors (bnc#1201726).
- CVE-2022-2663: Fixed an issue that was found in nf_conntrack_irc where the message handling could be confused and incorrectly matches the message (bnc#1202097).
- CVE-2022-2905: Fixed tnum_range usage on array range checking for poke descriptors (bsc#1202564, bsc#1202860).
- CVE-2022-2977: Fixed reference counting for struct tpm_chip (bsc#1202672).
- CVE-2022-3028: Fixed race condition that was found in the IP framework for transforming packets (XFRM subsystem) (bnc#1202898).
- CVE-2022-3169: Fixed a denial of service that resulted in a PCIe link disconnect (bnc#1203290).
- CVE-2022-32296: Fixed issue where TCP servers were able to identify clients by observing what source ports are used (bnc#1200288).
- CVE-2022-3239: Fixed a use-after-free in the video4linux driver (bnc#1203552).
- CVE-2022-3303: Fixed a race at SNDCTL_DSP_SYNC (bsc#1203769).
- CVE-2022-36879: Fixed an issue in xfrm_expand_policies in net/xfrm/xfrm_policy.c where a refcount could be dropped twice (bnc#1201948).
- CVE-2022-39188: Fixed race condition in include/asm-generic/tlb.h where a device driver can free a page while it still has stale TLB entries (bnc#1203107).
- CVE-2022-39190: Fixed an issue that was discovered in net/netfilter/nf_tables_api.c and could cause a denial of service upon binding to an already bound chain (bnc#1203117).
- CVE-2022-40768: Fixed information leak in drivers/scsi/stex.c due to stex_queuecommand_lck lack a memset for the PASSTHRU_CMD case (bnc#1203514).
- CVE-2022-41218: Fixed a use-after-free due to refcount races at releasing (bsc#1202960).
- CVE-2022-41222: Fixed a use-after-free via a stale TLB because an rmap lock is not held during a PUD move (bnc#1203622).
- CVE-2022-41674: Fixed a DoS issue where kernel can crash on the reception of specific WiFi Frames (bsc#1203770).
- CVE-2022-41848: Fixed a use-after-free in mgslpc_ops (bsc#1203987).
- CVE-2022-41849: Fixed a use-after-free in ufx_ops_open() (bsc#1203992).
- CVE-2022-42719: Fixed MBSSID parsing use-after-free (bsc#1204051).
- CVE-2022-42720: Fixed BSS refcounting bugs (bsc#1204059).
- CVE-2022-42721: Avoid nontransmitted BSS list corruption (bsc#1204060).
- CVE-2022-42722: Fixed crash in beacon protection for P2P-device (bsc#1204125).
The following non-security bugs were fixed:
- Fixed parsing of rpm/macros.kernel-source on SLE12 (bsc#1201019).
- acpi: EC: Remove duplicate ThinkPad X1 Carbon 6th entry from DMI quirks (git-fixes).
- acpi: LPSS: Fix missing check in register_device_clock() (git-fixes).
- acpi: PM: save NVS memory for Lenovo G40-45 (git-fixes).
- acpi: processor idle: Practically limit 'Dummy wait' workaround to old Intel systems (bnc#1203802).
- acpi: processor: Remove freq Qos request for all CPUs (git-fixes).
- acpi: property: Return type of acpi_add_nondev_subnodes() should be bool (git-fixes).
- acpi: video: Force backlight native for some TongFang devices (git-fixes).
- alsa: aloop: Fix random zeros in capture data when using jiffies timer (git-fixes).
- alsa: bcd2000: Fix a UAF bug on the error path of probing (git-fixes).
- alsa: emu10k1: Fix out of bounds access in snd_emu10k1_pcm_channel_alloc() (git-fixes).
- alsa: hda/cirrus - support for iMac 12,1 model (git-fixes).
- alsa: hda/conexant: Add quirk for LENOVO 20149 Notebook model (git-fixes).
- alsa: hda/realtek: Add a quirk for HP OMEN 15 (8786) mute LED (git-fixes).
- alsa: hda/realtek: Add mute LED quirk for HP Omen laptop (git-fixes).
- alsa: hda/realtek: Add new alc285-hp-amp-init model (git-fixes).
- alsa: hda/realtek: Add pincfg for ASUS G513 HP jack (git-fixes).
- alsa: hda/realtek: Add pincfg for ASUS G533Z HP jack (git-fixes).
- alsa: hda/realtek: Add quirk for ASUS GA503R laptop (git-fixes).
- alsa: hda/realtek: Add quirk for Clevo L140PU (git-fixes).
- alsa: hda/realtek: Add quirk for Clevo NP50PNJ (git-fixes).
- alsa: hda/realtek: Add quirk for Clevo NP70PNJ (git-fixes).
- alsa: hda/realtek: Add quirk for Clevo NP70PNP (git-fixes).
- alsa: hda/realtek: Add quirk for Clevo NS50PU (git-fixes).
- alsa: hda/realtek: Add quirk for Clevo NV45PZ (git-fixes).
- alsa: hda/realtek: Add quirk for Dell Latitude 7520 (git-fixes).
- alsa: hda/realtek: Add quirk for HP Dev One (git-fixes).
- alsa: hda/realtek: Add quirk for HP Spectre x360 15-eb0xxx (git-fixes).
- alsa: hda/realtek: Add quirk for Huawei WRT-WX9 (git-fixes).
- alsa: hda/realtek: Add quirk for TongFang devices with pop noise (git-fixes).
- alsa: hda/realtek: Add quirk for another Asus K42JZ model (git-fixes).
- alsa: hda/realtek: Add quirk for the Framework Laptop (git-fixes).
- alsa: hda/realtek: Enable 4-speaker output Dell Precision 5530 laptop (git-fixes).
- alsa: hda/realtek: Fix LED on HP ProBook 435 G7 (git-fixes).
- alsa: hda/realtek: Fix deadlock by COEF mutex (git-fixes).
- alsa: hda/realtek: Fix headset mic for Acer SF313-51 (git-fixes).
- alsa: hda/realtek: Re-arrange quirk table entries (git-fixes).
- alsa: hda/realtek: fix mute/micmute LEDs for HP machines (git-fixes).
- alsa: hda/realtek: fix mute/micmute LEDs for a HP ProBook (git-fixes).
- alsa: hda/realtek: fix right sounds and mute/micmute LEDs for HP machine (git-fixes).
- alsa: hda/realtek: fix right sounds and mute/micmute LEDs for HP machines (git-fixes).
- alsa: hda/sigmatel: Fix unused variable warning for beep power change (git-fixes).
- alsa: hda/sigmatel: Keep power up while beep is enabled (git-fixes).
- alsa: hda/tegra: Align BDL entry to 4KB boundary (git-fixes).
- alsa: hda: add Intel 5 Series / 3400 PCI DID (git-fixes).
- alsa: info: Fix llseek return value when using callback (git-fixes).
- alsa: seq: Fix data-race at module auto-loading (git-fixes).
- alsa: seq: oss: Fix data-race for max_midi_devs access (git-fixes).
- alsa: usb-audio: Fix an out-of-bounds bug in __snd_usb_parse_audio_interface() (git-fixes).
- alsa: usb-audio: Inform the delayed registration more properly (git-fixes).
- alsa: usb-audio: More comprehensive mixer map for ASUS ROG Zenith II (git-fixes).
- alsa: usb-audio: Register card again for iface over delayed_register option (git-fixes).
- alsa: usb-audio: Split endpoint setups for hw_params and prepare (git-fixes).
- alsa: usb-audio: fix spelling mistakes (git-fixes).
- arm64/mm: Validate hotplug range before creating linear mapping (git-fixes)
- arm64: cpufeature: Allow different PMU versions in ID_DFR0_EL1 (git-fixes)
- arm64: dts: allwinner: A64 Sopine: phy-mode rgmii-id (git-fixes)
- arm64: dts: allwinner: H5: NanoPi Neo Plus2: phy-mode rgmii-id (git-fixes)
- arm64: dts: allwinner: a64-sopine-baseboard: change RGMII mode to (bsc#1202341)
- arm64: dts: rockchip: Pull up wlan wake# on Gru-Bob (git-fixes)
- arm64: dts: rockchip: Remove 'enable-active-low' from rk3399-puma (git-fixes)
- arm64: dts: rockchip: Set RK3399-Gru PCLK_EDP to 24 MHz (git-fixes)
- arm64: dts: uniphier: Fix USB interrupts for PXs3 SoC (git-fixes)
- arm64: kexec_file: use more system keyrings to verify kernel image signature (bsc#1196444).
- arm64: mm: Always update TCR_EL1 from __cpu_set_tcr_t0sz() (git-fixes)
- arm64: mm: fix p?d_leaf() (git-fixes)
- arm64: mm: use a 48-bit ID map when possible on 52-bit VA builds (git-fixes)
- arm64: signal: nofpsimd: Do not allocate fp/simd context when not available (git-fixes).
- arm64: tegra: Fix SDMMC1 CD on P2888 (git-fixes)
- arm64: tegra: Remove non existent Tegra194 reset (git-fixes)
- arm64: tlb: fix the TTL value of tlb_get_level (git-fixes)
- arm: 9077/1: PLT: Move struct plt_entries definition to header (git-fixes).
- arm: 9078/1: Add warn suppress parameter to arm_gen_branch_link() (git-fixes).
- arm: 9079/1: ftrace: Add MODULE_PLTS support (git-fixes).
- arm: 9098/1: ftrace: MODULE_PLT: Fix build problem without DYNAMIC_FTRACE (git-fixes).
- asm-generic: sections: refactor memory_intersects (git-fixes).
- asoc: SOF: debug: Fix potential buffer overflow by snprintf() (git-fixes).
- asoc: audio-graph-card: Add of_node_put() in fail path (git-fixes).
- asoc: codecs: da7210: add check for i2c_add_driver (git-fixes).
- asoc: codecs: msm8916-wcd-digital: move gains from SX_TLV to S8_TLV (git-fixes).
- asoc: codecs: wcd9335: move gains from SX_TLV to S8_TLV (git-fixes).
- asoc: mt6797-mt6351: Fix refcount leak in mt6797_mt6351_dev_probe (git-fixes).
- asoc: nau8824: Fix semaphore unbalance at error paths (git-fixes).
- asoc: qcom: q6dsp: Fix an off-by-one in q6adm_alloc_copp() (git-fixes).
- asoc: tas2770: Allow mono streams (git-fixes).
- asoc: tas2770: Reinit regcache on reset (git-fixes).
- ata: libata-eh: Add missing command name (git-fixes).
- atm: idt77252: fix use-after-free bugs caused by tst_timer (git-fixes).
- blk-iocost: clamp inuse and skip noops in __propagate_weights() (bsc#1202722).
- blk-iocost: fix operation ordering in iocg_wake_fn() (bsc#1202720).
- blk-iocost: fix weight updates of inner active iocgs (bsc#1202717).
- blk-iocost: rename propagate_active_weights() to propagate_weights() (bsc#1202722).
- blktrace: fix blk_rq_merge documentation (git-fixes).
- bluetooth: L2CAP: Fix build errors in some archs (git-fixes).
- bluetooth: L2CAP: Fix l2cap_global_chan_by_psm regression (git-fixes).
- bluetooth: MGMT: Fixes build warnings with C=1 (git-fixes).
- bpf: Compile out btf_parse_module() if module BTF is not enabled (git-fixes).
- can: ems_usb: fix clang's -Wunaligned-access warning (git-fixes).
- can: gs_usb: gs_can_open(): fix race dev->can.state condition (git-fixes).
- ceph: do not leak snap_rwsem in handle_cap_grant (bsc#1202810).
- ceph: do not truncate file in atomic_open (bsc#1202811).
- cgroup: Trace event cgroup id fields should be u64 (git-fixes).
- cgroup: Use separate src/dst nodes when preloading css_sets for migration (bsc#1201610).
- cgroup: cgroup_get_from_id() must check the looked-up kn is a directory (bsc#1203906).
- clk: bcm: rpi: Fix error handling of raspberrypi_fw_get_rate (git-fixes).
- clk: core: Fix runtime PM sequence in clk_core_unprepare() (git-fixes).
- clk: core: Honor CLK_OPS_PARENT_ENABLE for clk gate ops (git-fixes).
- clk: imx: imx6sx: remove the SET_RATE_PARENT flag for QSPI clocks (git-fixes).
- clk: iproc: Do not rely on node name for correct PLL setup (git-fixes).
- clk: qcom: ipq8074: dont disable gcc_sleep_clk_src (git-fixes).
- clk: rockchip: add sclk_mac_lbtest to rk3188_critical_clocks (git-fixes).
- coresight: cti: Correct the parameter for pm_runtime_put (git-fixes).
- crypto: arm64/gcm - Select AEAD for GHASH_ARM64_CE (git-fixes)
- crypto: arm64/poly1305 - fix a read out-of-bound (git-fixes)
- devlink: Fix use-after-free after a failed reload (git-fixes).
- dm raid: fix KASAN warning in raid5_add_disks (git-fixes).
- dmaengine: sprd: Cleanup in .remove() after pm_runtime_get_sync() failed (git-fixes).
- dpaa2-eth: unregister the netdev before disconnecting from the PHY (git-fixes).
- driver core: Do not probe devices after bus_type.match() probe deferral (git-fixes).
- drm/amd/display: Limit user regamma to a valid value (git-fixes).
- drm/amdgpu: Check BO's requested pinning domains against its preferred_domains (git-fixes).
- drm/amdgpu: Check num_gfx_rings for gfx v9_0 rb setup (git-fixes).
- drm/amdgpu: do not register a dirty callback for non-atomic (git-fixes).
- drm/amdgpu: mmVM_L2_CNTL3 register not initialized correctly (git-fixes).
- drm/amdgpu: remove useless condition in amdgpu_job_stop_all_jobs_on_sched() (git-fixes).
- drm/amdgpu: use dirty framebuffer helper (git-fixes).
- drm/gem: Fix GEM handle release errors (git-fixes).
- drm/gem: Properly annotate WW context on drm_gem_lock_reservations() error (git-fixes).
- drm/i915/glk: ECS Liva Q2 needs GLK HDMI port timing quirk (git-fixes).
- drm/i915/reg: Fix spelling mistake 'Unsupport' -> 'Unsupported' (git-fixes).
- drm/meson: Correct OSD1 global alpha value (git-fixes).
- drm/meson: Fix OSD1 RGB to YCbCr coefficient (git-fixes).
- drm/meson: Fix overflow implicit truncation warnings (git-fixes).
- drm/meson: Fix refcount bugs in meson_vpu_has_available_connectors() (git-fixes).
- drm/msm/dsi: Fix number of regulators for SDM660 (git-fixes).
- drm/msm/dsi: Fix number of regulators for msm8996_dsi_cfg (git-fixes).
- drm/msm/dsi: fix the inconsistent indenting (git-fixes).
- drm/msm/rd: Fix FIFO-full deadlock (git-fixes).
- drm/radeon: add a force flush to delay work when radeon (git-fixes).
- drm/rockchip: Fix return type of cdn_dp_connector_mode_valid (git-fixes).
- drm/sun4i: dsi: Prevent underflow when computing packet sizes (git-fixes).
- dtb: Do not include sources in src.rpm - refer to kernel-source Same as other kernel binary packages there is no need to carry duplicate sources in dtb packages.
- efi: capsule-loader: Fix use-after-free in efi_capsule_write (git-fixes).
- ehea: fix error return code in ehea_restart_qps() (git-fixes).
- enetc: Fix endianness issues for enetc_qos (git-fixes).
- ethernet: sun: niu: fix missing checks of niu_pci_eeprom_read() (git-fixes).
- ext4: Fix BUG_ON in ext4_bread when write quota data (bsc#1197755).
- ext4: add reserved GDT blocks check (bsc#1202712).
- ext4: do not set SB_ACTIVE in ext4_orphan_cleanup() (bsc#1202708).
- ext4: do not use the orphan list when migrating an inode (bsc#1197756).
- ext4: fix bug_on in ext4_writepages (bsc#1200872).
- ext4: fix error handling code in add_new_gdb (bsc#1179722).
- ext4: fix error handling in ext4_restore_inline_data() (bsc#1197757).
- ext4: fix invalid inode checksum (bsc#1179723).
- ext4: fix loff_t overflow in ext4_max_bitmap_size() (bsc#1202709).
- ext4: fix overhead calculation to account for the reserved gdt blocks (bsc#1200869).
- ext4: fix potential infinite loop in ext4_dx_readdir() (bsc#1191662).
- ext4: fix race when reusing xattr blocks (bsc#1198971).
- ext4: fix symlink file size not match to file content (bsc#1200868).
- ext4: fix use-after-free in ext4_rename_dir_prepare (bsc#1200871).
- ext4: fix use-after-free in ext4_search_dir (bsc#1202710).
- ext4: fix warning in ext4_handle_inode_extension (bsc#1202711).
- ext4: force overhead calculation if the s_overhead_cluster makes no sense (bsc#1200870).
- ext4: recover csum seed of tmp_inode after migrating to extents (bsc#1202713).
- ext4: remove EA inode entry from mbcache on inode eviction (bsc#1198971).
- ext4: unindent codeblock in ext4_xattr_block_set() (bsc#1198971).
- fbcon: Fix boundary checks for fbcon=vc:n1-n2 parameters (git-fixes).
- fbdev: chipsfb: Add missing pci_disable_device() in chipsfb_pci_init() (git-fixes).
- fbdev: fb_pm2fb: Avoid potential divide by zero error (git-fixes).
- firmware: tegra: bpmp: Do only aligned access to IPC memory area (git-fixes).
- fs-writeback: writeback_sb_inodes: Recalculate 'wrote' according skipped pages (bsc#1200873).
- ftrace: Fix NULL pointer dereference in is_ftrace_trampoline when ftrace is dead (git-fixes).
- fuse: Remove the control interface for virtio-fs (bsc#1203137).
- fuse: ioctl: translate ENOSYS (bsc#1203136).
- fuse: limit nsec (bsc#1203135).
- gadgetfs: ep_io - wait until IRQ finishes (git-fixes).
- geneve: do not use RT_TOS for IPv6 flowlabel (git-fixes).
- geneve: fix TOS inheriting for ipv4 (git-fixes).
- gpio: mpc8xxx: Fix support for IRQ_TYPE_LEVEL_LOW flow_type in mpc85xx (git-fixes).
- gpio: pca953x: Add mutex_lock for regcache sync in PM (git-fixes).
- hid: alps: Declare U1_UNICORN_LEGACY support (git-fixes).
- hid: intel-ish-hid: ishtp: Fix ishtp client sending disordered message (git-fixes).
- hid: ishtp-hid-clientHID: ishtp-hid-client: Fix comment typo (git-fixes).
- hid: steam: Prevent NULL pointer dereference in steam_{recv,send}_report (git-fixes).
- hid: wacom: Do not register pad_input for touch switch (git-fixes).
- hid: wacom: Only report rotation for art pen (git-fixes).
- hv_netvsc: Load and store the proper (NBL_HASH_INFO) per-packet info (bsc#1202701).
- hwmon: (gpio-fan) Fix array out of bounds access (git-fixes).
- i2c: imx: Make sure to unregister adapter on remove() (git-fixes).
- ice: report supported and advertised autoneg using PHY capabilities (git-fixes).
- ieee802154/adf7242: defer destroy_workqueue call (git-fixes).
- ieee802154: cc2520: add rc code in cc2520_tx() (git-fixes).
- iio: adc: mcp3911: make use of the sign bit (git-fixes).
- iio: adc: mcp3911: use correct formula for AD conversion (git-fixes).
- ima: force signature verification when CONFIG_KEXEC_SIG is configured (bsc#1203737).
- input: iforce - add support for Boeder Force Feedback Wheel (git-fixes).
- input: iforce - wake up after clearing IFORCE_XMIT_RUNNING flag (git-fixes).
- input: melfas_mip4 - fix return value check in mip4_probe() (git-fixes).
- input: rk805-pwrkey - fix module autoloading (git-fixes).
- input: snvs_pwrkey - fix SNVS_HPVIDR1 register address (git-fixes).
- intel_th: pci: Add Meteor Lake-P support (git-fixes).
- intel_th: pci: Add Raptor Lake-S CPU support (git-fixes).
- intel_th: pci: Add Raptor Lake-S PCH support (git-fixes).
- iommu/amd: Simplify and Consolidate Virtual APIC (AVIC) Enablement (git-fixes).
- iommu/arm-smmu: qcom_iommu: Add of_node_put() when breaking out of loop (git-fixes).
- iommu/exynos: Handle failed IOMMU device registration properly (git-fixes).
- iommu/iova: Improve 32-bit free space estimate (git-fixes).
- iommu/ipmmu-vmsa: Check for error num after setting mask (git-fixes).
- iommu/mediatek: Add list_del in mtk_iommu_remove (git-fixes).
- iommu/msm: Fix an incorrect NULL check on list iterator (git-fixes).
- iommu/omap: Fix regression in probe for NULL pointer dereference (git-fixes).
- iommu/vt-d: Calculate mask for non-aligned flushes (git-fixes).
- iommu/vt-d: Fix PCI bus rescan device hot add (git-fixes).
- iommu/vt-d: Fix RID2PASID setup/teardown failure (git-fixes).
- iommu/vt-d: avoid invalid memory access via node_online(NUMA_NO_NODE) (git-fixes).
- ipheth: fix EOVERFLOW in ipheth_rcvbulk_callback (git-fixes).
- ipmi: ssif: initialize ssif_info->client early (git-fixes).
- ixgbevf: add correct exception tracing for XDP (git-fixes).
- jbd2: fix assertion 'jh->b_frozen_data == NULL' failure when journal aborted (bsc#1202716).
- jbd2: fix outstanding credits assert in jbd2_journal_commit_transaction() (bsc#1202715).
- jfs: fix GPF in diFree (bsc#1203389).
- jfs: fix memleak in jfs_mount (git-fixes).
- jfs: more checks for invalid superblock (git-fixes).
- jfs: prevent NULL deref in diFree (bsc#1203389).
- kABI: x86: kexec: hide new include from genksyms (bsc#1196444).
- kabi: cgroup: Restore KABI of css_set (bsc#1201610).
- kbuild: do not create built-in objects for external module builds (jsc#SLE-24559 bsc#1202756).
- kbuild: dummy-tools: avoid tmpdir leak in dummy gcc (bsc#1181862 git-fixes).
- kbuild: dummy-tools: avoid tmpdir leak in dummy gcc (git-fixes).
- kernel-binary: move @NOSOURCE@ to @SOURCES@ as in other packages
- kernel-obs-build: include qemu_fw_cfg (boo#1201705)
- kernel-source: include the kernel signature file We assume that the upstream tarball is used for released kernels. Then we can also include the signature file and keyring in the kernel-source src.rpm. Because of mkspec code limitation exclude the signature and keyring from binary packages always - mkspec does not parse spec conditionals.
- kexec, KEYS, s390: Make use of built-in and secondary keyring for signature verification (bsc#1196444).
- kexec, KEYS: make the code in bzImage64_verify_sig generic (bsc#1196444).
- kexec: clean up arch_kexec_kernel_verify_sig (bsc#1196444).
- kexec: do not verify the signature without the lockdown or mandatory signature (bsc#1203737).
- kexec: drop weak attribute from functions (bsc#1196444).
- kexec_file: drop weak attribute from arch_kexec_apply_relocations[_add] (bsc#1196444).
- kexec_file: drop weak attribute from functions (bsc#1196444).
- kfifo: fix kfifo_to_user() return type (git-fixes).
- kfifo: fix ternary sign extension bugs (git-fixes).
- kvm: PPC: Book3S HV: Context tracking exit guest context before enabling irqs (bsc#1065729).
- kvm: PPC: Book3S HV: Prevent POWER7/8 TLB flush flushing SLB (bsc#1156395).
- kvm: PPC: Book3S HV: Use GLOBAL_TOC for kvmppc_h_set_dabr/xdabr() (bsc#1156395).
- kvm: PPC: Fix vmx/vsx mixup in mmio emulation (bsc#1156395).
- kvm: PPC: Use arch_get_random_seed_long instead of powernv variant (bsc#1156395).
- kvm: VMX: Refuse to load kvm_intel if EPT and NX are disabled (git-fixes).
- kvm: nVMX: Let userspace set nVMX MSR to any _host_ supported value (git-fixes).
- kvm: nVMX: Snapshot pre-VM-Enter BNDCFGS for !nested_run_pending case (git-fixes).
- kvm: nVMX: Snapshot pre-VM-Enter DEBUGCTL for !nested_run_pending case (git-fixes).
- kvm: x86: Mark TSS busy during LTR emulation _after_ all fault checks (git-fixes).
- kvm: x86: Set error code to segment selector on LLDT/LTR non-canonical #GP (git-fixes).
- kvm: x86: accept userspace interrupt only if no event is injected (git-fixes).
- lib/list_debug.c: Detect uninitialized lists (git-fixes).
- lib: bitmap: provide devm_bitmap_alloc() and devm_bitmap_zalloc() (git-fixes).
- libata: add ATA_HORKAGE_NOLPM for Pioneer BDR-207M and BDR-205 (git-fixes).
- lightnvm: Remove lightnvm implemenation (bsc#1191881 bsc#1201420 ZDI-CAN-17325).
- list: add 'list_del_init_careful()' to go with 'list_empty_careful()' (bsc#1202745).
- locking/lockdep: Avoid potential access of invalid memory in lock_class (git-fixes).
- loop: Fix missing discard support when using LOOP_CONFIGURE (bsc#1202718).
- mbcache: add functions to delete entry if unused (bsc#1198971).
- mbcache: do not reclaim used entries (bsc#1198971).
- md-raid10: fix KASAN warning (git-fixes).
- md/bitmap: do not set sb values if can't pass sanity check (bsc#1197158).
- md: call __md_stop_writes in md_stop (git-fixes).
- md: unlock mddev before reap sync_thread in action_store (bsc#1197659).
- media: aspeed-video: ignore interrupts that are not enabled (git-fixes).
- media: coda: Add more H264 levels for CODA960 (git-fixes).
- media: coda: Fix reported H264 profile (git-fixes).
- media: dvb_vb2: fix possible out of bound access (git-fixes).
- mfd: max77620: Fix refcount leak in max77620_initialise_fps (git-fixes).
- mfd: t7l66xb: Drop platform disable callback (git-fixes).
- misc: fastrpc: fix memory corruption on open (git-fixes).
- misc: fastrpc: fix memory corruption on probe (git-fixes).
- mkspec: eliminate @NOSOURCE@ macro This should be alsways used with @SOURCES@, just include the content there.
- mm/rmap: Fix anon_vma->degree ambiguity leading to double-reuse (git-fixes, bsc#1203098).
- mm: bdi: initialize bdi_min_ratio when bdi is unregistered (bsc#1197763).
- mm: memcontrol: fix potential oom_lock recursion deadlock (bsc#1202447).
- mm: pagewalk: Fix race between unmap and page walker (git-fixes, bsc#1203159).
- mm: proc: smaps_rollup: do not stall write attempts on mmap_lock (bsc#1201990).
- mm: smaps*: extend smap_gather_stats to support specified beginning (bsc#1201990).
- mmap locking API: add mmap_lock_is_contended() (bsc#1201990).
- mmc: moxart: fix 4-bit bus width and remove 8-bit bus width (git-fixes).
- mmc: pxamci: Fix an error handling path in pxamci_probe() (git-fixes).
- mmc: pxamci: Fix another error handling path in pxamci_probe() (git-fixes).
- module: Ignore _GLOBAL_OFFSET_TABLE_ when warning for undefined symbols (git-fixes).
- mtd: maps: Fix refcount leak in ap_flash_init (git-fixes).
- mtd: maps: Fix refcount leak in of_flash_probe_versatile (git-fixes).
- mtd: partitions: Fix refcount leak in parse_redboot_of (git-fixes).
- mtd: rawnand: meson: Fix a potential double free issue (git-fixes).
- mtd: sm_ftl: Fix deadlock caused by cancel_work_sync in sm_release (git-fixes).
- mtd: st_spi_fsm: Add a clk_disable_unprepare() in .probe()'s error path (git-fixes).
- net/mlx5e: Check for needed capability for cvlan matching (git-fixes).
- net: bcmgenet: Add mdio-bcm-unimac soft dependency (git-fixes).
- net: cpsw: Properly initialise struct page_pool_params (git-fixes).
- net: cpsw: add missing of_node_put() in cpsw_probe_dt() (git-fixes).
- net: davinci_emac: Fix incorrect masking of tx and rx error channel (git-fixes).
- net: dsa: felix: suppress -EPROBE_DEFER errors (git-fixes).
- net: dsa: mt7530: fix VLAN traffic leaks (git-fixes).
- net: enetc: Use pci_release_region() to release some resources (git-fixes).
- net: enetc: report software timestamping via SO_TIMESTAMPING (git-fixes).
- net: enetc: unmap DMA in enetc_send_cmd() (git-fixes).
- net: ethernet: aeroflex: fix UAF in greth_of_remove (git-fixes).
- net: ethernet: ezchip: fix UAF in nps_enet_remove (git-fixes).
- net: ethernet: ezchip: fix error handling (git-fixes).
- net: ethernet: ezchip: remove redundant check (git-fixes).
- net: ethernet: fix potential use-after-free in ec_bhf_remove (git-fixes).
- net: ethernet: ti: cpsw_ale: Fix access to un-initialized memory (git-fixes).
- net: fec: fix the potential memory leak in fec_enet_init() (git-fixes).
- net: fec_ptp: add clock rate zero check (git-fixes).
- net: hns: Fix kernel-doc (git-fixes).
- net: lantiq: fix memory corruption in RX ring (git-fixes).
- net: mana: Add rmb after checking owner bits (git-fixes).
- net: mana: Add support of XDP_REDIRECT action (bsc#1201310, jsc#PED-529).
- net: mana: Add the Linux MANA PF driver (bsc#1201309, jsc#PED-529).
- net: moxa: Use devm_platform_get_and_ioremap_resource() (git-fixes).
- net: mscc: ocelot: correctly report the timestamping RX filters in ethtool (git-fixes).
- net: mscc: ocelot: do not downgrade timestamping RX filters in SIOCSHWTSTAMP (git-fixes).
- net: netcp: Fix an error message (git-fixes).
- net: pch_gbe: Propagate error from devm_gpio_request_one() (git-fixes).
- net: rose: fix netdev reference changes (git-fixes).
- net: sock: tracing: Fix sock_exceed_buf_limit not to dereference stale pointer (git-fixes).
- net: stmicro: handle clk_prepare() failure during init (git-fixes).
- net: stmmac: disable clocks in stmmac_remove_config_dt() (git-fixes).
- net: stmmac: dwmac1000: Fix extended MAC address registers definition (git-fixes).
- net: usb: qmi_wwan: add Quectel RM520N (git-fixes).
- net: vmxnet3: fix possible NULL pointer dereference in vmxnet3_rq_cleanup() (bsc#1200431).
- net: vmxnet3: fix possible use-after-free bugs in vmxnet3_rq_alloc_rx_buf() (bsc#1200431).
- net: vmxnet3: remove multiple false checks in vmxnet3_ethtool.c (bsc#1200431).
- net:emac/emac-mac: Fix a use after free in emac_mac_tx_buf_send (git-fixes).
- net:enetc: allocate CBD ring data memory using DMA coherent methods (git-fixes).
- net_sched: cls_route: disallow handle of 0 (bsc#1202393).
- nfs: fix nfs_path in case of a rename retry (git-fixes).
- nfsd: Add missing NFSv2 .pc_func methods (git-fixes).
- nfsd: Clamp WRITE offsets (git-fixes).
- nfsd: Fix offset type in I/O trace points (git-fixes).
- nfsd: Fix possible sleep during nfsd4_release_lockowner() (git-fixes).
- nfsd: fix use-after-free due to delegation race (git-fixes).
- nfsd: prevent integer overflow on 32 bit systems (git-fixes).
- nfsd: prevent underflow in nfssvc_decode_writeargs() (git-fixes).
- nfsv4.1: Do not decrease the value of seq_nr_highest_sent (git-fixes).
- nfsv4.1: Handle NFS4ERR_DELAY replies to OP_SEQUENCE correctly (git-fixes).
- nfsv4.1: RECLAIM_COMPLETE must handle EACCES (git-fixes).
- nfsv4.2: support EXCHGID4_FLAG_SUPP_FENCE_OPS 4.2 EXCHANGE_ID flag (git-fixes).
- nfsv4: Fix races in the legacy idmapper upcall (git-fixes).
- nfsv4: Fix second deadlock in nfs4_evict_inode() (git-fixes).
- nfsv4: nfs4_proc_set_acl needs to restore NFS_CAP_UIDGID_NOMAP on error (git-fixes).
- ntb: ntb_tool: uninitialized heap data in tool_fn_write() (git-fixes).
- nvme-fabrics: parse nvme connect Linux error codes (bsc#1201865).
- nvme-rdma: Handle number of queue changes (bsc#1201865).
- nvme-tcp: Handle number of queue changes (bsc#1201865).
- nvme-tcp: fix UAF when detecting digest errors (bsc#1200313 bsc#1201489).
- nvme: fix RCU hole that allowed for endless looping in multipath round robin (bsc#1202636).
- nvmet: Expose max queues to configfs (bsc#1201865).
- objtool: Add support for intra-function calls (bsc#1202396).
- objtool: Make handle_insn_ops() unconditional (bsc#1202396).
- objtool: Remove INSN_STACK (bsc#1202396).
- objtool: Rework allocating stack_ops on decode (bsc#1202396).
- objtool: Support multiple stack_op per instruction (bsc#1202396).
- ocfs2: drop acl cache for directories too (bsc#1191667).
- ocfs2: fix crash when initialize filecheck kobj fails (bsc#1197920).
- ocfs2: mount fails with buffer overflow in strlen (bsc#1197760).
- of/device: Fix up of_dma_configure_id() stub (git-fixes).
- of: fdt: fix off-by-one error in unflatten_dt_nodes() (git-fixes).
- padata: introduce internal padata_get/put_pd() helpers (bsc#1202638).
- padata: make padata_free_shell() to respect pd's ->refcnt (bsc#1202638).
- parisc/sticon: fix reverse colors (bsc#1152489).
- parisc: parisc-agp requires SBA IOMMU driver (bsc#1152489)
- pci/acpi: Guard ARM64-specific mcfg_quirks (git-fixes).
- pci: Add ACS quirk for Broadcom BCM5750x NICs (git-fixes).
- pci: hv: Fix hv_arch_irq_unmask() for multi-MSI (bsc#1200845).
- pci: hv: Fix interrupt mapping for multi-MSI (bsc#1200845).
- pci: hv: Fix multi-MSI to allow more than one MSI vector (bsc#1200845).
- pci: hv: Make the code arch neutral by adding arch specific interfaces (bsc#1200845).
- pci: hv: Only reuse existing IRTE allocation for Multi-MSI (bsc#1200845).
- pci: hv: Reuse existing IRTE allocation in compose_msi_msg() (bsc#1200845).
- pci: qcom: Fix pipe clock imbalance (git-fixes).
- perf bench: Share some global variables to fix build with gcc 10 (git-fixes).
- pinctrl/rockchip: fix gpio device creation (git-fixes).
- pinctrl: nomadik: Fix refcount leak in nmk_pinctrl_dt_subnode_to_map (git-fixes).
- pinctrl: qcom: msm8916: Allow CAMSS GP clocks to be muxed (git-fixes).
- pinctrl: rockchip: Enhance support for IRQ_TYPE_EDGE_BOTH (git-fixes).
- pinctrl: sunxi: Add I/O bias setting for H6 R-PIO (git-fixes).
- platform/x86: acer-wmi: Acer Aspire One AOD270/Packard Bell Dot keymap fixes (git-fixes).
- platform/x86: pmc_atom: Fix SLP_TYPx bitfield mask (git-fixes).
- powerpc/drmem: Make lmb_size 64 bit (bsc#1203424 ltc#199544).
- powerpc/memhotplug: Make lmb size 64bit (bsc#1203424 ltc#199544).
- powerpc/perf: Optimize clearing the pending PMI and remove WARN_ON for PMI check in power_pmu_disable (bsc#1156395).
- powerpc/powernv/kvm: Use darn for H_RANDOM on Power9 (bsc#1065729).
- powerpc/powernv: Avoid crashing if rng is NULL (bsc#1065729).
- powerpc/powernv: Staticify functions without prototypes (bsc#1065729).
- powerpc/powernv: delay rng platform device creation until later in boot (bsc#1065729).
- powerpc/powernv: rename remaining rng powernv_ functions to pnv_ (bsc#1065729).
- powerpc/powernv: wire up rng during setup_arch (bsc#1065729).
- powerpc/pseries: wire up rng during setup_arch() (bsc#1065729).
- powerpc/xive: Fix refcount leak in xive_get_max_prio (git-fixess).
- powerpc: Enable execve syscall exit tracepoint (bsc#1065729).
- powerpc: define get_cycles macro for arch-override (bsc#1065729).
- powerpc: powernv: kABI: add back powernv_get_random_long (bsc#1065729).
- ppc64/kdump: Limit kdump base to 512MB (bsc#1203410 ltc#199904).
- profiling: fix shift too large makes kernel panic (git-fixes).
- psi: Fix uaf issue when psi trigger is destroyed while being polled (bsc#1203909).
- qlcnic: Add null check after calling netdev_alloc_skb (git-fixes).
- random: fix crash on multiple early calls to add_bootloader_randomness() (git-fixes).
- ratelimit: Fix data-races in ___ratelimit() (git-fixes).
- regulator: core: Clean up on enable failure (git-fixes).
- regulator: pfuze100: Fix the global-out-of-bounds access in pfuze100_regulator_probe() (git-fixes).
- reiserfs: fix handling of -EOPNOTSUPP in reiserfs_for_each_xattr (bsc#1202714).
- remoteproc: qcom: q6v5-mss: add powerdomains to MSM8996 config (git-fixes).
- remoteproc: qcom: wcnss: Fix handling of IRQs (git-fixes).
- reset: imx7: Fix the iMX8MP PCIe PHY PERST support (git-fixes).
- rpm/kernel-binary.spec.in: move vdso to a separate package (bsc#1202385) We do the move only on 15.5+.
- rpm/kernel-binary.spec.in: simplify find for usrmerged The type test and print line are the same for both cases. The usrmerged case only ignores more, so refactor it to make it more obvious.
- rpm/kernel-source.spec.in: simplify finding of broken symlinks 'find -xtype l' will report them, so use that to make the search a bit faster (without using shell).
- s390/crash: fix incorrect number of bytes to copy to user space (git-fixes).
- s390/crash: make copy_oldmem_page() return number of bytes copied (git-fixes).
- s390/mm: do not trigger write fault when vma does not allow VM_WRITE (git-fixes).
- s390/mm: fix 2KB pgtable release race (git-fixes).
- s390/ptrace: pass invalid syscall numbers to tracing (bsc#1192594 LTC#197522).
- s390/qeth: cache link_info for ethtool (bsc#1202984 LTC#199607).
- s390/qeth: clean up default cases for ethtool link mode (bsc#1202984 LTC#199607).
- s390/qeth: improve QUERY CARD INFO processing (bsc#1202984 LTC#199607).
- s390/qeth: improve selection of ethtool link modes (bsc#1202984 LTC#199607).
- s390/qeth: set static link info during initialization (bsc#1202984 LTC#199607).
- s390/qeth: tolerate error when querying card info (bsc#1202984 LTC#199607).
- s390/qeth: use QUERY OAT for initial link info (bsc#1202984 LTC#199607).
- scsi: core: Fix bad pointer dereference when ehandler kthread is invalid (git-fixes).
- scsi: lpfc: Add missing destroy_workqueue() in error path (bsc#1203939).
- scsi: lpfc: Add missing free iocb and nlp kref put for early return VMID cases (bsc#1203939).
- scsi: lpfc: Add reporting capability for Link Degrade Signaling (bsc#1203939).
- scsi: lpfc: Add warning notification period to CMF_SYNC_WQE (bsc#1203063).
- scsi: lpfc: Check the return value of alloc_workqueue() (bsc#1203063).
- scsi: lpfc: Copyright updates for 14.2.0.6 patches (bsc#1203063).
- scsi: lpfc: Fix FLOGI ACC with wrong SID in PT2PT topology (bsc#1203939).
- scsi: lpfc: Fix mbuf pool resource detected as busy at driver unload (bsc#1203939).
- scsi: lpfc: Fix multiple NVMe remoteport registration calls for the same NPort ID (bsc#1203939).
- scsi: lpfc: Fix null ndlp ptr dereference in abnormal exit path for GFT_ID (bsc#1203063).
- scsi: lpfc: Fix prli_fc4_req checks in PRLI handling (bsc#1203939).
- scsi: lpfc: Fix unsolicited FLOGI receive handling during PT2PT discovery (bsc#1203063).
- scsi: lpfc: Fix various issues reported by tools (bsc#1203939).
- scsi: lpfc: Move scsi_host_template outside dynamically allocated/freed phba (bsc#1185032 bsc#1203939).
- scsi: lpfc: Remove SANDiags related code (bsc#1203063).
- scsi: lpfc: Remove the unneeded result variable (bsc#1203939).
- scsi: lpfc: Remove unneeded result variable (bsc#1203939).
- scsi: lpfc: Rename mp/bmp dma buffers to rq/rsp in lpfc_fdmi_cmd (bsc#1203939).
- scsi: lpfc: Return DID_TRANSPORT_DISRUPTED instead of DID_REQUEUE (bsc#1203939).
- scsi: lpfc: Rework FDMI attribute registration for unintential padding (bsc#1203939).
- scsi: lpfc: Rework MIB Rx Monitor debug info logic (bsc#1203063).
- scsi: lpfc: Rework lpfc_fdmi_cmd() routine for cleanup and consistency (bsc#1203939).
- scsi: lpfc: Update congestion mode logging for Emulex SAN Manager application (bsc#1203939).
- scsi: lpfc: Update lpfc version to 14.2.0.6 (bsc#1203063).
- scsi: lpfc: Update lpfc version to 14.2.0.7 (bsc#1203939).
- scsi: mpt3sas: Fix use-after-free warning (git-fixes).
- scsi: qla2xxx: Add NVMe parameters support in Auxiliary Image Status (bsc#1203935).
- scsi: qla2xxx: Add debugfs create/delete helpers (bsc#1203935).
- scsi: qla2xxx: Always wait for qlt_sess_work_fn() from qlt_stop_phase1() (bsc#1203935).
- scsi: qla2xxx: Avoid flush_scheduled_work() usage (bsc#1203935).
- scsi: qla2xxx: Disable ATIO interrupt coalesce for quad port ISP27XX (bsc#1203935).
- scsi: qla2xxx: Drop DID_TARGET_FAILURE use (bsc#1203935).
- scsi: qla2xxx: Fix memory leak in __qlt_24xx_handle_abts() (bsc#1203935).
- scsi: qla2xxx: Fix response queue handler reading stale packets (bsc#1203935).
- scsi: qla2xxx: Log message 'skipping scsi_scan_host()' as informational (bsc#1203935).
- scsi: qla2xxx: Remove unused declarations for qla2xxx (bsc#1203935).
- scsi: qla2xxx: Remove unused del_sess_list field (bsc#1203935).
- scsi: qla2xxx: Remove unused qlt_tmr_work() (bsc#1203935).
- scsi: qla2xxx: Revert 'scsi: qla2xxx: Fix response queue handler reading stale packets' (bsc#1203935).
- scsi: qla2xxx: Update version to 10.02.07.900-k (bsc#1203935).
- scsi: sg: Allow waiting for commands to complete on removed device (git-fixes).
- scsi: smartpqi: Fix DMA direction for RAID requests (git-fixes).
- scsi: smartpqi: Shorten drive visibility after removal (bsc#1200622).
- scsi: smartpqi: Update LUN reset handler (bsc#1200622).
- selftests: futex: Use variable MAKE instead of make (git-fixes).
- serial: 8250_dw: Store LSR into lsr_saved_flags in dw8250_tx_wait_empty() (git-fixes).
- serial: Create uart_xmit_advance() (git-fixes).
- serial: fsl_lpuart: RS485 RTS polariy is inverse (git-fixes).
- serial: mvebu-uart: uart2 error bits clearing (git-fixes).
- serial: tegra-tcu: Use uart_xmit_advance(), fixes icount.tx accounting (git-fixes).
- serial: tegra: Change lower tolerance baud rate limit for tegra20 and tegra30 (git-fixes).
- serial: tegra: Use uart_xmit_advance(), fixes icount.tx accounting (git-fixes).
- silence nfscache allocation warnings with kvzalloc (git-fixes).
- soc: brcmstb: pm-arm: Fix refcount leak and __iomem leak bugs (git-fixes).
- soc: sunxi: sram: Actually claim SRAM regions (git-fixes).
- soc: sunxi: sram: Fix debugfs info for A64 SRAM C (git-fixes).
- soc: sunxi: sram: Prevent the driver from being unbound (git-fixes).
- spi: Fix incorrect cs_setup delay handling (git-fixes).
- spi: spi-rspi: Fix PIO fallback on RZ platforms (git-fixes).
- spi: synquacer: Add missing clk_disable_unprepare() (git-fixes).
- spmi: trace: fix stack-out-of-bound access in SPMI tracing functions (git-fixes).
- squashfs: fix divide error in calculate_skip() (git-fixes).
- staging: rtl8712: fix use after free bugs (git-fixes).
- struct ehci_hcd: hide new member (git-fixes).
- struct otg_fsm: hide new boolean member in gap (git-fixes).
- sunrpc: Clean up scheduling of autoclose (git-fixes).
- sunrpc: Do not call connect() more than once on a TCP socket (git-fixes).
- sunrpc: Do not dereference xprt->snd_task if it's a cookie (git-fixes).
- sunrpc: Do not leak sockets in xs_local_connect() (git-fixes).
- sunrpc: Fix READ_PLUS crasher (git-fixes).
- sunrpc: Fix misplaced barrier in call_decode (git-fixes).
- sunrpc: Prevent immediate close+reconnect (git-fixes).
- sunrpc: RPC level errors should set task->tk_rpc_status (git-fixes).
- sunrpc: Reinitialise the backchannel request buffers before reuse (git-fixes).
- sunrpc: fix expiry of auth creds (git-fixes).
- svcrdma: Hold private mutex while invoking rdma_accept() (git-fixes).
- tee: optee: Fix incorrect page free bug (git-fixes).
- thermal: Fix NULL pointer dereferences in of_thermal_ functions (git-fixes).
- thermal: sysfs: Fix cooling_device_stats_setup() error code path (git-fixes).
- thunderbolt: Use the actual buffer in tb_async_error() (git-fixes).
- tools/thermal: Fix possible path truncations (git-fixes).
- tracing/histogram: Fix a potential memory leak for kstrdup() (git-fixes).
- tracing/histograms: Fix memory leak problem (git-fixes).
- tracing/probes: Have kprobes and uprobes use $COMM too (git-fixes).
- tracing: Add ustring operation to filtering string pointers (git-fixes).
- tracing: hold caller_addr to hardirq_{enable,disable}_ip (git-fixes).
- tty/serial: atmel: RS485 & ISO7816: wait for TXRDY before sending data (git-fixes).
- tty: serial: Fix refcount leak bug in ucc_uart.c (git-fixes).
- tty: serial: lpuart: disable flow control while waiting for the transmit engine to complete (git-fixes).
- tty: vt: initialize unicode screen buffer (git-fixes).
- usb-storage: Add ignore-residue quirk for NXP PN7462AU (git-fixes).
- usb.h: struct usb_device: hide new member (git-fixes).
- usb: add quirks for Lenovo OneLink+ Dock (git-fixes).
- usb: cdc-acm: Add Icom PMR F3400 support (0c26:0020) (git-fixes).
- usb: core: Fix RST error in hub.c (git-fixes).
- usb: core: Prevent nested device-reset calls (git-fixes).
- usb: dwc2: fix wrong order of phy_power_on and phy_init (git-fixes).
- usb: dwc3: Switch to platform_get_irq_byname_optional() (git-fixes).
- usb: dwc3: disable USB core PHY management (git-fixes).
- usb: dwc3: ep0: Fix delay status handling (git-fixes).
- usb: dwc3: gadget: Avoid starting DWC3 gadget during UDC unbind (git-fixes).
- usb: dwc3: gadget: END_TRANSFER before CLEAR_STALL command (git-fixes).
- usb: dwc3: gadget: Fix IN endpoint max packet size allocation (git-fixes).
- usb: dwc3: gadget: Prevent repeat pullup() (git-fixes).
- usb: dwc3: gadget: Refactor dwc3_gadget_ep_dequeue (git-fixes).
- usb: dwc3: gadget: Remove FS bInterval_m1 limitation (git-fixes).
- usb: dwc3: gadget: Remove unnecessary checks (git-fixes).
- usb: dwc3: gadget: Replace list_for_each_entry_safe() if using giveback (git-fixes).
- usb: dwc3: gadget: Store resource index of start cmd (git-fixes).
- usb: dwc3: qcom: fix missing optional irq warnings.
- usb: ehci: handshake CMD_RUN instead of STS_HALT (git-fixes).
- usb: gadget: mass_storage: Fix cdrom data transfers on MAC-OS (git-fixes).
- usb: gadget: u_audio: fix race condition on endpoint stop (git-fixes).
- usb: gadget: udc-xilinx: replace memcpy with memcpy_toio (git-fixes).
- usb: gadget: uvc: call uvc uvcg_warn on completed status instead of uvcg_info (git-fixes).
- usb: host: ohci-ppc-of: Fix refcount leak bug (git-fixes).
- usb: otg-fsm: Fix hrtimer list corruption (git-fixes).
- usb: renesas: Fix refcount leak bug (git-fixes).
- usb: serial: ch341: fix disabled rx timer on older devices (git-fixes).
- usb: serial: ch341: fix lost character on LCR updates (git-fixes).
- usb: serial: ch341: name prescaler, divisor registers (git-fixes).
- usb: serial: cp210x: add Decagon UCA device id (git-fixes).
- usb: serial: ftdi_sio: add Omron CS1W-CIF31 device id (git-fixes).
- usb: serial: option: add Quectel BG95 0x0203 composition (git-fixes).
- usb: serial: option: add Quectel BG95 0x0203 composition (git-fixes).
- usb: serial: option: add Quectel EM060K modem (git-fixes).
- usb: serial: option: add Quectel RM520N (git-fixes).
- usb: serial: option: add Quectel RM520N (git-fixes).
- usb: serial: option: add support for Cinterion MV32-WA/WB RmNet mode (git-fixes).
- usb: serial: option: add support for OPPO R11 diag port (git-fixes).
- usb: storage: Add ASUS <0x0b05:0x1932> to IGNORE_UAS (git-fixes).
- usb: typec: altmodes/displayport: correct pin assignment for UFP receptacles (git-fixes).
- usb: typec: ucsi: Remove incorrect warning (git-fixes).
- usb: xhci-mtk: add a function to (un)load bandwidth info (git-fixes).
- usb: xhci-mtk: add only one extra CS for FS/LS INTR (git-fixes).
- usb: xhci-mtk: add some schedule error number (git-fixes).
- usb: xhci-mtk: fix issue of out-of-bounds array access (git-fixes).
- usb: xhci-mtk: get the microframe boundary for ESIT (git-fixes).
- usb: xhci-mtk: use @sch_tt to check whether need do TT schedule (git-fixes).
- usbnet: Fix linkwatch use-after-free on disconnect (git-fixes).
- usbnet: Fix memory leak in usbnet_disconnect() (git-fixes).
- usbnet: smsc95xx: Fix deadlock on runtime resume (git-fixes).
- vboxguest: Do not use devm for irq (git-fixes).
- vfio/ccw: Remove UUID from s390 debug log (git-fixes).
- video: fbdev: amba-clcd: Fix refcount leak bugs (git-fixes).
- video: fbdev: arkfb: Check the size of screen before memset_io() (git-fixes).
- video: fbdev: arkfb: Fix a divide-by-zero bug in ark_set_pixclock() (git-fixes).
- video: fbdev: i740fb: Check the argument of i740_calc_vclk() (git-fixes).
- video: fbdev: pxa3xx-gcu: Fix integer overflow in pxa3xx_gcu_write (git-fixes).
- video: fbdev: s3fb: Check the size of screen before memset_io() (git-fixes).
- video: fbdev: sis: fix typos in SiS_GetModeID() (git-fixes).
- video: fbdev: vt8623fb: Check the size of screen before memset_io() (git-fixes).
- virtio_net: fix memory leak inside XPD_TX with mergeable (git-fixes).
- vmci: Add support for ARM64 (bsc#1199291, jsc#SLE-24635).
- vmci: Check exclusive_vectors when freeing interrupt 1 (bsc#1199291, jsc#SLE-24635).
- vmci: Enforce queuepair max size for IOCTL_VMCI_QUEUEPAIR_ALLOC (bsc#1199291, jsc#SLE-24635).
- vmci: Fix some error handling paths in vmci_guest_probe_device() (bsc#1199291, jsc#SLE-24635).
- vmci: Release notification_bitmap in error path (bsc#1199291, jsc#SLE-24635).
- vmci: dma dg: add MMIO access to registers (bsc#1199291, jsc#SLE-24635).
- vmci: dma dg: add support for DMA datagrams receive (bsc#1199291, jsc#SLE-24635).
- vmci: dma dg: add support for DMA datagrams sends (bsc#1199291, jsc#SLE-24635).
- vmci: dma dg: allocate send and receive buffers for DMA datagrams (bsc#1199291, jsc#SLE-24635).
- vmci: dma dg: detect DMA datagram capability (bsc#1199291, jsc#SLE-24635).
- vmci: dma dg: register dummy IRQ handlers for DMA datagrams (bsc#1199291, jsc#SLE-24635).
- vmci: dma dg: set OS page size (bsc#1199291, jsc#SLE-24635).
- vmci: dma dg: whitespace formatting change for vmci register defines (bsc#1199291, jsc#SLE-24635).
- vmxnet3: Implement ethtool's get_channels command (bsc#1200431).
- vmxnet3: Record queue number to incoming packets (bsc#1200431).
- vmxnet3: Remove useless DMA-32 fallback configuration (bsc#1200431).
- vmxnet3: add command to set ring buffer sizes (bsc#1200431).
- vmxnet3: add support for capability registers (bsc#1200431).
- vmxnet3: add support for large passthrough BAR register (bsc#1200431).
- vmxnet3: add support for out of order rx completion (bsc#1200431).
- vmxnet3: disable overlay offloads if UPT device does not support (bsc#1200431).
- vmxnet3: do not reschedule napi for rx processing (bsc#1200431).
- vmxnet3: do not stop tx queues after netif_device_detach() (bsc#1200431).
- vmxnet3: limit number of TXDs used for TSO packet (bsc#1200431).
- vmxnet3: prepare for version 7 changes (bsc#1200431).
- vmxnet3: switch from 'pci_' to 'dma_' API (bsc#1200431).
- vmxnet3: update to version 7 (bsc#1200431).
- vmxnet3: use ext1 field to indicate encapsulated packet (bsc#1200431).
- vsock: Fix memory leak in vsock_connect() (git-fixes).
- vsock: Set socket state back to SS_UNCONNECTED in vsock_connect_timeout() (git-fixes).
- vt: Clear selection before changing the font (git-fixes).
- vt: selection, introduce vc_is_sel (git-fixes).
- watchdog: armada_37xx_wdt: check the return value of devm_ioremap() in armada_37xx_wdt_probe() (git-fixes).
- watchdog: wdat_wdt: Set the min and max timeout values properly (bsc#1194023).
- wifi: cfg80211: debugfs: fix return type in ht40allow_map_read() (git-fixes).
- wifi: iwlegacy: 4965: corrected fix for potential off-by-one overflow in il4965_rs_fill_link_cmd() (git-fixes).
- wifi: mac80211: Do not finalize CSA in IBSS mode if state is disconnected (git-fixes).
- wifi: mac80211: Fix UAF in ieee80211_scan_rx() (git-fixes).
- wifi: mac80211_hwsim: add back erroneously removed cast (git-fixes).
- wifi: mac80211_hwsim: fix race condition in pending packet (git-fixes).
- wifi: mac80211_hwsim: use 32-bit skb cookie (git-fixes).
- x86/bugs: Reenable retbleed=off While for older kernels the return thunks are statically built in and cannot be dynamically patched out, retbleed=off should still work so that it can be disabled.
- x86/kexec: fix memory leak of elf header buffer (bsc#1196444).
- x86/olpc: fix 'logical not is only applied to the left hand side' (git-fixes).
- x86/xen: Remove undefined behavior in setup_features() (git-fixes).
- xen/xenbus: fix return type in xenbus_file_read() (git-fixes).
- xfs: Fix assert failure in xfs_setattr_size() (git-fixes).
- xfs: bunmapi has unnecessary AG lock ordering issues (git-fixes).
- xfs: check sb_meta_uuid for dabuf buffer recovery (bsc#1202577).
- xfs: make xfs_rtalloc_query_range input parameters const (git-fixes).
- xfs: mark a data structure sick if there are cross-referencing errors (git-fixes).
- xfs: only reset incore inode health state flags when reclaiming an inode (git-fixes).
- xfs: prevent a UAF when log IO errors race with unmount (git-fixes).
- xfs: use kmem_cache_free() for kmem_cache objects (git-fixes).
- xprtrdma: Fix XDRBUF_SPARSE_PAGES support (git-fixes).
- xprtrdma: Fix cwnd update ordering (git-fixes).
    Patchnames
SUSE-2022-3809,SUSE-SLE-Module-RT-15-SP3-2022-3809,SUSE-SUSE-MicroOS-5.1-2022-3809,SUSE-SUSE-MicroOS-5.2-2022-3809,openSUSE-Leap-Micro-5.2-2022-3809
    Terms of use
CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).
    {
  "document": {
    "aggregate_severity": {
      "namespace": "https://www.suse.com/support/security/rating/",
      "text": "important"
    },
    "category": "csaf_security_advisory",
    "csaf_version": "2.0",
    "distribution": {
      "text": "Copyright 2024 SUSE LLC. All rights reserved.",
      "tlp": {
        "label": "WHITE",
        "url": "https://www.first.org/tlp/"
      }
    },
    "lang": "en",
    "notes": [
      {
        "category": "summary",
        "text": "Security update for the Linux Kernel",
        "title": "Title of the patch"
      },
      {
        "category": "description",
        "text": "\nThe SUSE Linux Enterprise 15 SP3 RT kernel was updated to receive various security and bugfixes.\n\n\nThe following security bugs were fixed:\n\n- CVE-2016-3695: Fixed an issue inside the einj_error_inject function in drivers/acpi/apei/einj.c that allowed users to simulate hardware errors and consequently cause a denial of service (bnc#1023051).\n- CVE-2020-16119: Fixed a use-after-free due to reuse of a DCCP socket with an attached dccps_hc_tx_ccid object as a listener after being released (bnc#1177471).\n- CVE-2020-27784: Fixed a vulnerability that was found in printer_ioctl() printer_ioctl() when accessing a deallocated instance (bnc#1202895).\n- CVE-2021-4155: Fixed a data leak flaw that was found in the way XFS_IOC_ALLOCSP IOCTL in the XFS filesystem (bnc#1194272).\n- CVE-2021-4203: Fixed use-after-free read flaw that was found in sock_getsockopt() in net/core/sock.c due to SO_PEERCRED and SO_PEERGROUPS race with listen() (bnc#1194535).\n- CVE-2022-20368: Fixed slab-out-of-bounds access in packet_recvmsg() (bsc#1202346).\n- CVE-2022-20369: Fixed out of bounds write in v4l2_m2m_querybuf of v4l2-mem2mem.c (bnc#1202347).\n- CVE-2022-2503: Fixed a LoadPin bypass in Dm-verity (bnc#1202677).\n- CVE-2022-2586: Fixed issue in netfilter that allowed CHAIN_ID to refer to another table (bsc#1202095).\n- CVE-2022-2588: Fixed use-after-free in cls_route (bsc#1202096).\n- CVE-2022-26373: Fixed non-transparent sharing of return predictor targets between contexts in some Intel Processors (bnc#1201726).\n- CVE-2022-2663: Fixed an issue that was found in nf_conntrack_irc where the message handling could be confused and incorrectly matches the message (bnc#1202097).\n- CVE-2022-2905: Fixed tnum_range usage on array range checking for poke descriptors (bsc#1202564, bsc#1202860).\n- CVE-2022-2977: Fixed reference counting for struct tpm_chip (bsc#1202672).\n- CVE-2022-3028: Fixed race condition that was found in the IP framework for transforming packets (XFRM subsystem) (bnc#1202898).\n- CVE-2022-3169: Fixed a denial of service that resulted in a PCIe link disconnect (bnc#1203290).\n- CVE-2022-32296: Fixed issue where TCP servers were able to identify clients by observing what source ports are used (bnc#1200288).\n- CVE-2022-3239: Fixed a use-after-free in the video4linux driver (bnc#1203552).\n- CVE-2022-3303: Fixed a race at SNDCTL_DSP_SYNC (bsc#1203769).\n- CVE-2022-36879: Fixed an issue in xfrm_expand_policies in net/xfrm/xfrm_policy.c where a refcount could be dropped twice (bnc#1201948).\n- CVE-2022-39188: Fixed race condition in include/asm-generic/tlb.h where a device driver can free a page while it still has stale TLB entries (bnc#1203107).\n- CVE-2022-39190: Fixed an issue that was discovered in net/netfilter/nf_tables_api.c and could cause a denial of service upon binding to an already bound chain (bnc#1203117).\n- CVE-2022-40768: Fixed information leak in drivers/scsi/stex.c due to stex_queuecommand_lck lack a memset for the PASSTHRU_CMD case (bnc#1203514).\n- CVE-2022-41218: Fixed a use-after-free due to refcount races at releasing (bsc#1202960).\n- CVE-2022-41222: Fixed a use-after-free via a stale TLB because an rmap lock is not held during a PUD move (bnc#1203622).\n- CVE-2022-41674: Fixed a DoS issue where kernel can crash on the reception of specific WiFi Frames (bsc#1203770).\n- CVE-2022-41848: Fixed a use-after-free in mgslpc_ops (bsc#1203987).\n- CVE-2022-41849: Fixed a use-after-free in ufx_ops_open() (bsc#1203992).\n- CVE-2022-42719: Fixed MBSSID parsing use-after-free (bsc#1204051).\n- CVE-2022-42720: Fixed BSS refcounting bugs (bsc#1204059).\n- CVE-2022-42721: Avoid nontransmitted BSS list corruption (bsc#1204060).\n- CVE-2022-42722: Fixed crash in beacon protection for P2P-device (bsc#1204125).\n\nThe following non-security bugs were fixed:\n\n- Fixed parsing of rpm/macros.kernel-source on SLE12 (bsc#1201019).\n- acpi: EC: Remove duplicate ThinkPad X1 Carbon 6th entry from DMI quirks (git-fixes).\n- acpi: LPSS: Fix missing check in register_device_clock() (git-fixes).\n- acpi: PM: save NVS memory for Lenovo G40-45 (git-fixes).\n- acpi: processor idle: Practically limit \u0027Dummy wait\u0027 workaround to old Intel systems (bnc#1203802).\n- acpi: processor: Remove freq Qos request for all CPUs (git-fixes).\n- acpi: property: Return type of acpi_add_nondev_subnodes() should be bool (git-fixes).\n- acpi: video: Force backlight native for some TongFang devices (git-fixes).\n- alsa: aloop: Fix random zeros in capture data when using jiffies timer (git-fixes).\n- alsa: bcd2000: Fix a UAF bug on the error path of probing (git-fixes).\n- alsa: emu10k1: Fix out of bounds access in snd_emu10k1_pcm_channel_alloc() (git-fixes).\n- alsa: hda/cirrus - support for iMac 12,1 model (git-fixes).\n- alsa: hda/conexant: Add quirk for LENOVO 20149 Notebook model (git-fixes).\n- alsa: hda/realtek: Add a quirk for HP OMEN 15 (8786) mute LED (git-fixes).\n- alsa: hda/realtek: Add mute LED quirk for HP Omen laptop (git-fixes).\n- alsa: hda/realtek: Add new alc285-hp-amp-init model (git-fixes).\n- alsa: hda/realtek: Add pincfg for ASUS G513 HP jack (git-fixes).\n- alsa: hda/realtek: Add pincfg for ASUS G533Z HP jack (git-fixes).\n- alsa: hda/realtek: Add quirk for ASUS GA503R laptop (git-fixes).\n- alsa: hda/realtek: Add quirk for Clevo L140PU (git-fixes).\n- alsa: hda/realtek: Add quirk for Clevo NP50PNJ (git-fixes).\n- alsa: hda/realtek: Add quirk for Clevo NP70PNJ (git-fixes).\n- alsa: hda/realtek: Add quirk for Clevo NP70PNP (git-fixes).\n- alsa: hda/realtek: Add quirk for Clevo NS50PU (git-fixes).\n- alsa: hda/realtek: Add quirk for Clevo NV45PZ (git-fixes).\n- alsa: hda/realtek: Add quirk for Dell Latitude 7520 (git-fixes).\n- alsa: hda/realtek: Add quirk for HP Dev One (git-fixes).\n- alsa: hda/realtek: Add quirk for HP Spectre x360 15-eb0xxx (git-fixes).\n- alsa: hda/realtek: Add quirk for Huawei WRT-WX9 (git-fixes).\n- alsa: hda/realtek: Add quirk for TongFang devices with pop noise (git-fixes).\n- alsa: hda/realtek: Add quirk for another Asus K42JZ model (git-fixes).\n- alsa: hda/realtek: Add quirk for the Framework Laptop (git-fixes).\n- alsa: hda/realtek: Enable 4-speaker output Dell Precision 5530 laptop (git-fixes).\n- alsa: hda/realtek: Fix LED on HP ProBook 435 G7 (git-fixes).\n- alsa: hda/realtek: Fix deadlock by COEF mutex (git-fixes).\n- alsa: hda/realtek: Fix headset mic for Acer SF313-51 (git-fixes).\n- alsa: hda/realtek: Re-arrange quirk table entries (git-fixes).\n- alsa: hda/realtek: fix mute/micmute LEDs for HP machines (git-fixes).\n- alsa: hda/realtek: fix mute/micmute LEDs for a HP ProBook (git-fixes).\n- alsa: hda/realtek: fix right sounds and mute/micmute LEDs for HP machine (git-fixes).\n- alsa: hda/realtek: fix right sounds and mute/micmute LEDs for HP machines (git-fixes).\n- alsa: hda/sigmatel: Fix unused variable warning for beep power change (git-fixes).\n- alsa: hda/sigmatel: Keep power up while beep is enabled (git-fixes).\n- alsa: hda/tegra: Align BDL entry to 4KB boundary (git-fixes).\n- alsa: hda: add Intel 5 Series / 3400 PCI DID (git-fixes).\n- alsa: info: Fix llseek return value when using callback (git-fixes).\n- alsa: seq: Fix data-race at module auto-loading (git-fixes).\n- alsa: seq: oss: Fix data-race for max_midi_devs access (git-fixes).\n- alsa: usb-audio: Fix an out-of-bounds bug in __snd_usb_parse_audio_interface() (git-fixes).\n- alsa: usb-audio: Inform the delayed registration more properly (git-fixes).\n- alsa: usb-audio: More comprehensive mixer map for ASUS ROG Zenith II (git-fixes).\n- alsa: usb-audio: Register card again for iface over delayed_register option (git-fixes).\n- alsa: usb-audio: Split endpoint setups for hw_params and prepare (git-fixes).\n- alsa: usb-audio: fix spelling mistakes (git-fixes).\n- arm64/mm: Validate hotplug range before creating linear mapping (git-fixes)\n- arm64: cpufeature: Allow different PMU versions in ID_DFR0_EL1 (git-fixes)\n- arm64: dts: allwinner: A64 Sopine: phy-mode rgmii-id (git-fixes)\n- arm64: dts: allwinner: H5: NanoPi Neo Plus2: phy-mode rgmii-id (git-fixes)\n- arm64: dts: allwinner: a64-sopine-baseboard: change RGMII mode to (bsc#1202341)\n- arm64: dts: rockchip: Pull up wlan wake# on Gru-Bob (git-fixes)\n- arm64: dts: rockchip: Remove \u0027enable-active-low\u0027 from rk3399-puma (git-fixes)\n- arm64: dts: rockchip: Set RK3399-Gru PCLK_EDP to 24 MHz (git-fixes)\n- arm64: dts: uniphier: Fix USB interrupts for PXs3 SoC (git-fixes)\n- arm64: kexec_file: use more system keyrings to verify kernel image signature (bsc#1196444).\n- arm64: mm: Always update TCR_EL1 from __cpu_set_tcr_t0sz() (git-fixes)\n- arm64: mm: fix p?d_leaf() (git-fixes)\n- arm64: mm: use a 48-bit ID map when possible on 52-bit VA builds (git-fixes)\n- arm64: signal: nofpsimd: Do not allocate fp/simd context when not available (git-fixes).\n- arm64: tegra: Fix SDMMC1 CD on P2888 (git-fixes)\n- arm64: tegra: Remove non existent Tegra194 reset (git-fixes)\n- arm64: tlb: fix the TTL value of tlb_get_level (git-fixes)\n- arm: 9077/1: PLT: Move struct plt_entries definition to header (git-fixes).\n- arm: 9078/1: Add warn suppress parameter to arm_gen_branch_link() (git-fixes).\n- arm: 9079/1: ftrace: Add MODULE_PLTS support (git-fixes).\n- arm: 9098/1: ftrace: MODULE_PLT: Fix build problem without DYNAMIC_FTRACE (git-fixes).\n- asm-generic: sections: refactor memory_intersects (git-fixes).\n- asoc: SOF: debug: Fix potential buffer overflow by snprintf() (git-fixes).\n- asoc: audio-graph-card: Add of_node_put() in fail path (git-fixes).\n- asoc: codecs: da7210: add check for i2c_add_driver (git-fixes).\n- asoc: codecs: msm8916-wcd-digital: move gains from SX_TLV to S8_TLV (git-fixes).\n- asoc: codecs: wcd9335: move gains from SX_TLV to S8_TLV (git-fixes).\n- asoc: mt6797-mt6351: Fix refcount leak in mt6797_mt6351_dev_probe (git-fixes).\n- asoc: nau8824: Fix semaphore unbalance at error paths (git-fixes).\n- asoc: qcom: q6dsp: Fix an off-by-one in q6adm_alloc_copp() (git-fixes).\n- asoc: tas2770: Allow mono streams (git-fixes).\n- asoc: tas2770: Reinit regcache on reset (git-fixes).\n- ata: libata-eh: Add missing command name (git-fixes).\n- atm: idt77252: fix use-after-free bugs caused by tst_timer (git-fixes).\n- blk-iocost: clamp inuse and skip noops in __propagate_weights() (bsc#1202722).\n- blk-iocost: fix operation ordering in iocg_wake_fn() (bsc#1202720).\n- blk-iocost: fix weight updates of inner active iocgs (bsc#1202717).\n- blk-iocost: rename propagate_active_weights() to propagate_weights() (bsc#1202722).\n- blktrace: fix blk_rq_merge documentation (git-fixes).\n- bluetooth: L2CAP: Fix build errors in some archs (git-fixes).\n- bluetooth: L2CAP: Fix l2cap_global_chan_by_psm regression (git-fixes).\n- bluetooth: MGMT: Fixes build warnings with C=1 (git-fixes).\n- bpf: Compile out btf_parse_module() if module BTF is not enabled (git-fixes).\n- can: ems_usb: fix clang\u0027s -Wunaligned-access warning (git-fixes).\n- can: gs_usb: gs_can_open(): fix race dev-\u003ecan.state condition (git-fixes).\n- ceph: do not leak snap_rwsem in handle_cap_grant (bsc#1202810).\n- ceph: do not truncate file in atomic_open (bsc#1202811).\n- cgroup: Trace event cgroup id fields should be u64 (git-fixes).\n- cgroup: Use separate src/dst nodes when preloading css_sets for migration (bsc#1201610).\n- cgroup: cgroup_get_from_id() must check the looked-up kn is a directory (bsc#1203906).\n- clk: bcm: rpi: Fix error handling of raspberrypi_fw_get_rate (git-fixes).\n- clk: core: Fix runtime PM sequence in clk_core_unprepare() (git-fixes).\n- clk: core: Honor CLK_OPS_PARENT_ENABLE for clk gate ops (git-fixes).\n- clk: imx: imx6sx: remove the SET_RATE_PARENT flag for QSPI clocks (git-fixes).\n- clk: iproc: Do not rely on node name for correct PLL setup (git-fixes).\n- clk: qcom: ipq8074: dont disable gcc_sleep_clk_src (git-fixes).\n- clk: rockchip: add sclk_mac_lbtest to rk3188_critical_clocks (git-fixes).\n- coresight: cti: Correct the parameter for pm_runtime_put (git-fixes).\n- crypto: arm64/gcm - Select AEAD for GHASH_ARM64_CE (git-fixes)\n- crypto: arm64/poly1305 - fix a read out-of-bound (git-fixes)\n- devlink: Fix use-after-free after a failed reload (git-fixes).\n- dm raid: fix KASAN warning in raid5_add_disks (git-fixes).\n- dmaengine: sprd: Cleanup in .remove() after pm_runtime_get_sync() failed (git-fixes).\n- dpaa2-eth: unregister the netdev before disconnecting from the PHY (git-fixes).\n- driver core: Do not probe devices after bus_type.match() probe deferral (git-fixes).\n- drm/amd/display: Limit user regamma to a valid value (git-fixes).\n- drm/amdgpu: Check BO\u0027s requested pinning domains against its preferred_domains (git-fixes).\n- drm/amdgpu: Check num_gfx_rings for gfx v9_0 rb setup (git-fixes).\n- drm/amdgpu: do not register a dirty callback for non-atomic (git-fixes).\n- drm/amdgpu: mmVM_L2_CNTL3 register not initialized correctly (git-fixes).\n- drm/amdgpu: remove useless condition in amdgpu_job_stop_all_jobs_on_sched() (git-fixes).\n- drm/amdgpu: use dirty framebuffer helper (git-fixes).\n- drm/gem: Fix GEM handle release errors (git-fixes).\n- drm/gem: Properly annotate WW context on drm_gem_lock_reservations() error (git-fixes).\n- drm/i915/glk: ECS Liva Q2 needs GLK HDMI port timing quirk (git-fixes).\n- drm/i915/reg: Fix spelling mistake \u0027Unsupport\u0027 -\u003e \u0027Unsupported\u0027 (git-fixes).\n- drm/meson: Correct OSD1 global alpha value (git-fixes).\n- drm/meson: Fix OSD1 RGB to YCbCr coefficient (git-fixes).\n- drm/meson: Fix overflow implicit truncation warnings (git-fixes).\n- drm/meson: Fix refcount bugs in meson_vpu_has_available_connectors() (git-fixes).\n- drm/msm/dsi: Fix number of regulators for SDM660 (git-fixes).\n- drm/msm/dsi: Fix number of regulators for msm8996_dsi_cfg (git-fixes).\n- drm/msm/dsi: fix the inconsistent indenting (git-fixes).\n- drm/msm/rd: Fix FIFO-full deadlock (git-fixes).\n- drm/radeon: add a force flush to delay work when radeon (git-fixes).\n- drm/rockchip: Fix return type of cdn_dp_connector_mode_valid (git-fixes).\n- drm/sun4i: dsi: Prevent underflow when computing packet sizes (git-fixes).\n- dtb: Do not include sources in src.rpm - refer to kernel-source Same as other kernel binary packages there is no need to carry duplicate sources in dtb packages.\n- efi: capsule-loader: Fix use-after-free in efi_capsule_write (git-fixes).\n- ehea: fix error return code in ehea_restart_qps() (git-fixes).\n- enetc: Fix endianness issues for enetc_qos (git-fixes).\n- ethernet: sun: niu: fix missing checks of niu_pci_eeprom_read() (git-fixes).\n- ext4: Fix BUG_ON in ext4_bread when write quota data (bsc#1197755).\n- ext4: add reserved GDT blocks check (bsc#1202712).\n- ext4: do not set SB_ACTIVE in ext4_orphan_cleanup() (bsc#1202708).\n- ext4: do not use the orphan list when migrating an inode (bsc#1197756).\n- ext4: fix bug_on in ext4_writepages (bsc#1200872).\n- ext4: fix error handling code in add_new_gdb (bsc#1179722).\n- ext4: fix error handling in ext4_restore_inline_data() (bsc#1197757).\n- ext4: fix invalid inode checksum (bsc#1179723).\n- ext4: fix loff_t overflow in ext4_max_bitmap_size() (bsc#1202709).\n- ext4: fix overhead calculation to account for the reserved gdt blocks (bsc#1200869).\n- ext4: fix potential infinite loop in ext4_dx_readdir() (bsc#1191662).\n- ext4: fix race when reusing xattr blocks (bsc#1198971).\n- ext4: fix symlink file size not match to file content (bsc#1200868).\n- ext4: fix use-after-free in ext4_rename_dir_prepare (bsc#1200871).\n- ext4: fix use-after-free in ext4_search_dir (bsc#1202710).\n- ext4: fix warning in ext4_handle_inode_extension (bsc#1202711).\n- ext4: force overhead calculation if the s_overhead_cluster makes no sense (bsc#1200870).\n- ext4: recover csum seed of tmp_inode after migrating to extents (bsc#1202713).\n- ext4: remove EA inode entry from mbcache on inode eviction (bsc#1198971).\n- ext4: unindent codeblock in ext4_xattr_block_set() (bsc#1198971).\n- fbcon: Fix boundary checks for fbcon=vc:n1-n2 parameters (git-fixes).\n- fbdev: chipsfb: Add missing pci_disable_device() in chipsfb_pci_init() (git-fixes).\n- fbdev: fb_pm2fb: Avoid potential divide by zero error (git-fixes).\n- firmware: tegra: bpmp: Do only aligned access to IPC memory area (git-fixes).\n- fs-writeback: writeback_sb_inodes: Recalculate \u0027wrote\u0027 according skipped pages (bsc#1200873).\n- ftrace: Fix NULL pointer dereference in is_ftrace_trampoline when ftrace is dead (git-fixes).\n- fuse: Remove the control interface for virtio-fs (bsc#1203137).\n- fuse: ioctl: translate ENOSYS (bsc#1203136).\n- fuse: limit nsec (bsc#1203135).\n- gadgetfs: ep_io - wait until IRQ finishes (git-fixes).\n- geneve: do not use RT_TOS for IPv6 flowlabel (git-fixes).\n- geneve: fix TOS inheriting for ipv4 (git-fixes).\n- gpio: mpc8xxx: Fix support for IRQ_TYPE_LEVEL_LOW flow_type in mpc85xx (git-fixes).\n- gpio: pca953x: Add mutex_lock for regcache sync in PM (git-fixes).\n- hid: alps: Declare U1_UNICORN_LEGACY support (git-fixes).\n- hid: intel-ish-hid: ishtp: Fix ishtp client sending disordered message (git-fixes).\n- hid: ishtp-hid-clientHID: ishtp-hid-client: Fix comment typo (git-fixes).\n- hid: steam: Prevent NULL pointer dereference in steam_{recv,send}_report (git-fixes).\n- hid: wacom: Do not register pad_input for touch switch (git-fixes).\n- hid: wacom: Only report rotation for art pen (git-fixes).\n- hv_netvsc: Load and store the proper (NBL_HASH_INFO) per-packet info (bsc#1202701).\n- hwmon: (gpio-fan) Fix array out of bounds access (git-fixes).\n- i2c: imx: Make sure to unregister adapter on remove() (git-fixes).\n- ice: report supported and advertised autoneg using PHY capabilities (git-fixes).\n- ieee802154/adf7242: defer destroy_workqueue call (git-fixes).\n- ieee802154: cc2520: add rc code in cc2520_tx() (git-fixes).\n- iio: adc: mcp3911: make use of the sign bit (git-fixes).\n- iio: adc: mcp3911: use correct formula for AD conversion (git-fixes).\n- ima: force signature verification when CONFIG_KEXEC_SIG is configured (bsc#1203737).\n- input: iforce - add support for Boeder Force Feedback Wheel (git-fixes).\n- input: iforce - wake up after clearing IFORCE_XMIT_RUNNING flag (git-fixes).\n- input: melfas_mip4 - fix return value check in mip4_probe() (git-fixes).\n- input: rk805-pwrkey - fix module autoloading (git-fixes).\n- input: snvs_pwrkey - fix SNVS_HPVIDR1 register address (git-fixes).\n- intel_th: pci: Add Meteor Lake-P support (git-fixes).\n- intel_th: pci: Add Raptor Lake-S CPU support (git-fixes).\n- intel_th: pci: Add Raptor Lake-S PCH support (git-fixes).\n- iommu/amd: Simplify and Consolidate Virtual APIC (AVIC) Enablement (git-fixes).\n- iommu/arm-smmu: qcom_iommu: Add of_node_put() when breaking out of loop (git-fixes).\n- iommu/exynos: Handle failed IOMMU device registration properly (git-fixes).\n- iommu/iova: Improve 32-bit free space estimate (git-fixes).\n- iommu/ipmmu-vmsa: Check for error num after setting mask (git-fixes).\n- iommu/mediatek: Add list_del in mtk_iommu_remove (git-fixes).\n- iommu/msm: Fix an incorrect NULL check on list iterator (git-fixes).\n- iommu/omap: Fix regression in probe for NULL pointer dereference (git-fixes).\n- iommu/vt-d: Calculate mask for non-aligned flushes (git-fixes).\n- iommu/vt-d: Fix PCI bus rescan device hot add (git-fixes).\n- iommu/vt-d: Fix RID2PASID setup/teardown failure (git-fixes).\n- iommu/vt-d: avoid invalid memory access via node_online(NUMA_NO_NODE) (git-fixes).\n- ipheth: fix EOVERFLOW in ipheth_rcvbulk_callback (git-fixes).\n- ipmi: ssif: initialize ssif_info-\u003eclient early (git-fixes).\n- ixgbevf: add correct exception tracing for XDP (git-fixes).\n- jbd2: fix assertion \u0027jh-\u003eb_frozen_data == NULL\u0027 failure when journal aborted (bsc#1202716).\n- jbd2: fix outstanding credits assert in jbd2_journal_commit_transaction() (bsc#1202715).\n- jfs: fix GPF in diFree (bsc#1203389).\n- jfs: fix memleak in jfs_mount (git-fixes).\n- jfs: more checks for invalid superblock (git-fixes).\n- jfs: prevent NULL deref in diFree (bsc#1203389).\n- kABI: x86: kexec: hide new include from genksyms (bsc#1196444).\n- kabi: cgroup: Restore KABI of css_set (bsc#1201610).\n- kbuild: do not create built-in objects for external module builds (jsc#SLE-24559 bsc#1202756).\n- kbuild: dummy-tools: avoid tmpdir leak in dummy gcc (bsc#1181862 git-fixes).\n- kbuild: dummy-tools: avoid tmpdir leak in dummy gcc (git-fixes).\n- kernel-binary: move @NOSOURCE@ to @SOURCES@ as in other packages\n- kernel-obs-build: include qemu_fw_cfg (boo#1201705)\n- kernel-source: include the kernel signature file We assume that the upstream tarball is used for released kernels. Then we can also include the signature file and keyring in the kernel-source src.rpm. Because of mkspec code limitation exclude the signature and keyring from binary packages always - mkspec does not parse spec conditionals.\n- kexec, KEYS, s390: Make use of built-in and secondary keyring for signature verification (bsc#1196444).\n- kexec, KEYS: make the code in bzImage64_verify_sig generic (bsc#1196444).\n- kexec: clean up arch_kexec_kernel_verify_sig (bsc#1196444).\n- kexec: do not verify the signature without the lockdown or mandatory signature (bsc#1203737).\n- kexec: drop weak attribute from functions (bsc#1196444).\n- kexec_file: drop weak attribute from arch_kexec_apply_relocations[_add] (bsc#1196444).\n- kexec_file: drop weak attribute from functions (bsc#1196444).\n- kfifo: fix kfifo_to_user() return type (git-fixes).\n- kfifo: fix ternary sign extension bugs (git-fixes).\n- kvm: PPC: Book3S HV: Context tracking exit guest context before enabling irqs (bsc#1065729).\n- kvm: PPC: Book3S HV: Prevent POWER7/8 TLB flush flushing SLB (bsc#1156395).\n- kvm: PPC: Book3S HV: Use GLOBAL_TOC for kvmppc_h_set_dabr/xdabr() (bsc#1156395).\n- kvm: PPC: Fix vmx/vsx mixup in mmio emulation (bsc#1156395).\n- kvm: PPC: Use arch_get_random_seed_long instead of powernv variant (bsc#1156395).\n- kvm: VMX: Refuse to load kvm_intel if EPT and NX are disabled (git-fixes).\n- kvm: nVMX: Let userspace set nVMX MSR to any _host_ supported value (git-fixes).\n- kvm: nVMX: Snapshot pre-VM-Enter BNDCFGS for !nested_run_pending case (git-fixes).\n- kvm: nVMX: Snapshot pre-VM-Enter DEBUGCTL for !nested_run_pending case (git-fixes).\n- kvm: x86: Mark TSS busy during LTR emulation _after_ all fault checks (git-fixes).\n- kvm: x86: Set error code to segment selector on LLDT/LTR non-canonical #GP (git-fixes).\n- kvm: x86: accept userspace interrupt only if no event is injected (git-fixes).\n- lib/list_debug.c: Detect uninitialized lists (git-fixes).\n- lib: bitmap: provide devm_bitmap_alloc() and devm_bitmap_zalloc() (git-fixes).\n- libata: add ATA_HORKAGE_NOLPM for Pioneer BDR-207M and BDR-205 (git-fixes).\n- lightnvm: Remove lightnvm implemenation (bsc#1191881 bsc#1201420 ZDI-CAN-17325).\n- list: add \u0027list_del_init_careful()\u0027 to go with \u0027list_empty_careful()\u0027 (bsc#1202745).\n- locking/lockdep: Avoid potential access of invalid memory in lock_class (git-fixes).\n- loop: Fix missing discard support when using LOOP_CONFIGURE (bsc#1202718).\n- mbcache: add functions to delete entry if unused (bsc#1198971).\n- mbcache: do not reclaim used entries (bsc#1198971).\n- md-raid10: fix KASAN warning (git-fixes).\n- md/bitmap: do not set sb values if can\u0027t pass sanity check (bsc#1197158).\n- md: call __md_stop_writes in md_stop (git-fixes).\n- md: unlock mddev before reap sync_thread in action_store (bsc#1197659).\n- media: aspeed-video: ignore interrupts that are not enabled (git-fixes).\n- media: coda: Add more H264 levels for CODA960 (git-fixes).\n- media: coda: Fix reported H264 profile (git-fixes).\n- media: dvb_vb2: fix possible out of bound access (git-fixes).\n- mfd: max77620: Fix refcount leak in max77620_initialise_fps (git-fixes).\n- mfd: t7l66xb: Drop platform disable callback (git-fixes).\n- misc: fastrpc: fix memory corruption on open (git-fixes).\n- misc: fastrpc: fix memory corruption on probe (git-fixes).\n- mkspec: eliminate @NOSOURCE@ macro This should be alsways used with @SOURCES@, just include the content there.\n- mm/rmap: Fix anon_vma-\u003edegree ambiguity leading to double-reuse (git-fixes, bsc#1203098).\n- mm: bdi: initialize bdi_min_ratio when bdi is unregistered (bsc#1197763).\n- mm: memcontrol: fix potential oom_lock recursion deadlock (bsc#1202447).\n- mm: pagewalk: Fix race between unmap and page walker (git-fixes, bsc#1203159).\n- mm: proc: smaps_rollup: do not stall write attempts on mmap_lock (bsc#1201990).\n- mm: smaps*: extend smap_gather_stats to support specified beginning (bsc#1201990).\n- mmap locking API: add mmap_lock_is_contended() (bsc#1201990).\n- mmc: moxart: fix 4-bit bus width and remove 8-bit bus width (git-fixes).\n- mmc: pxamci: Fix an error handling path in pxamci_probe() (git-fixes).\n- mmc: pxamci: Fix another error handling path in pxamci_probe() (git-fixes).\n- module: Ignore _GLOBAL_OFFSET_TABLE_ when warning for undefined symbols (git-fixes).\n- mtd: maps: Fix refcount leak in ap_flash_init (git-fixes).\n- mtd: maps: Fix refcount leak in of_flash_probe_versatile (git-fixes).\n- mtd: partitions: Fix refcount leak in parse_redboot_of (git-fixes).\n- mtd: rawnand: meson: Fix a potential double free issue (git-fixes).\n- mtd: sm_ftl: Fix deadlock caused by cancel_work_sync in sm_release (git-fixes).\n- mtd: st_spi_fsm: Add a clk_disable_unprepare() in .probe()\u0027s error path (git-fixes).\n- net/mlx5e: Check for needed capability for cvlan matching (git-fixes).\n- net: bcmgenet: Add mdio-bcm-unimac soft dependency (git-fixes).\n- net: cpsw: Properly initialise struct page_pool_params (git-fixes).\n- net: cpsw: add missing of_node_put() in cpsw_probe_dt() (git-fixes).\n- net: davinci_emac: Fix incorrect masking of tx and rx error channel (git-fixes).\n- net: dsa: felix: suppress -EPROBE_DEFER errors (git-fixes).\n- net: dsa: mt7530: fix VLAN traffic leaks (git-fixes).\n- net: enetc: Use pci_release_region() to release some resources (git-fixes).\n- net: enetc: report software timestamping via SO_TIMESTAMPING (git-fixes).\n- net: enetc: unmap DMA in enetc_send_cmd() (git-fixes).\n- net: ethernet: aeroflex: fix UAF in greth_of_remove (git-fixes).\n- net: ethernet: ezchip: fix UAF in nps_enet_remove (git-fixes).\n- net: ethernet: ezchip: fix error handling (git-fixes).\n- net: ethernet: ezchip: remove redundant check (git-fixes).\n- net: ethernet: fix potential use-after-free in ec_bhf_remove (git-fixes).\n- net: ethernet: ti: cpsw_ale: Fix access to un-initialized memory (git-fixes).\n- net: fec: fix the potential memory leak in fec_enet_init() (git-fixes).\n- net: fec_ptp: add clock rate zero check (git-fixes).\n- net: hns: Fix kernel-doc (git-fixes).\n- net: lantiq: fix memory corruption in RX ring (git-fixes).\n- net: mana: Add rmb after checking owner bits (git-fixes).\n- net: mana: Add support of XDP_REDIRECT action (bsc#1201310, jsc#PED-529).\n- net: mana: Add the Linux MANA PF driver (bsc#1201309, jsc#PED-529).\n- net: moxa: Use devm_platform_get_and_ioremap_resource() (git-fixes).\n- net: mscc: ocelot: correctly report the timestamping RX filters in ethtool (git-fixes).\n- net: mscc: ocelot: do not downgrade timestamping RX filters in SIOCSHWTSTAMP (git-fixes).\n- net: netcp: Fix an error message (git-fixes).\n- net: pch_gbe: Propagate error from devm_gpio_request_one() (git-fixes).\n- net: rose: fix netdev reference changes (git-fixes).\n- net: sock: tracing: Fix sock_exceed_buf_limit not to dereference stale pointer (git-fixes).\n- net: stmicro: handle clk_prepare() failure during init (git-fixes).\n- net: stmmac: disable clocks in stmmac_remove_config_dt() (git-fixes).\n- net: stmmac: dwmac1000: Fix extended MAC address registers definition (git-fixes).\n- net: usb: qmi_wwan: add Quectel RM520N (git-fixes).\n- net: vmxnet3: fix possible NULL pointer dereference in vmxnet3_rq_cleanup() (bsc#1200431).\n- net: vmxnet3: fix possible use-after-free bugs in vmxnet3_rq_alloc_rx_buf() (bsc#1200431).\n- net: vmxnet3: remove multiple false checks in vmxnet3_ethtool.c (bsc#1200431).\n- net:emac/emac-mac: Fix a use after free in emac_mac_tx_buf_send (git-fixes).\n- net:enetc: allocate CBD ring data memory using DMA coherent methods (git-fixes).\n- net_sched: cls_route: disallow handle of 0 (bsc#1202393).\n- nfs: fix nfs_path in case of a rename retry (git-fixes).\n- nfsd: Add missing NFSv2 .pc_func methods (git-fixes).\n- nfsd: Clamp WRITE offsets (git-fixes).\n- nfsd: Fix offset type in I/O trace points (git-fixes).\n- nfsd: Fix possible sleep during nfsd4_release_lockowner() (git-fixes).\n- nfsd: fix use-after-free due to delegation race (git-fixes).\n- nfsd: prevent integer overflow on 32 bit systems (git-fixes).\n- nfsd: prevent underflow in nfssvc_decode_writeargs() (git-fixes).\n- nfsv4.1: Do not decrease the value of seq_nr_highest_sent (git-fixes).\n- nfsv4.1: Handle NFS4ERR_DELAY replies to OP_SEQUENCE correctly (git-fixes).\n- nfsv4.1: RECLAIM_COMPLETE must handle EACCES (git-fixes).\n- nfsv4.2: support EXCHGID4_FLAG_SUPP_FENCE_OPS 4.2 EXCHANGE_ID flag (git-fixes).\n- nfsv4: Fix races in the legacy idmapper upcall (git-fixes).\n- nfsv4: Fix second deadlock in nfs4_evict_inode() (git-fixes).\n- nfsv4: nfs4_proc_set_acl needs to restore NFS_CAP_UIDGID_NOMAP on error (git-fixes).\n- ntb: ntb_tool: uninitialized heap data in tool_fn_write() (git-fixes).\n- nvme-fabrics: parse nvme connect Linux error codes (bsc#1201865).\n- nvme-rdma: Handle number of queue changes (bsc#1201865).\n- nvme-tcp: Handle number of queue changes (bsc#1201865).\n- nvme-tcp: fix UAF when detecting digest errors (bsc#1200313 bsc#1201489).\n- nvme: fix RCU hole that allowed for endless looping in multipath round robin (bsc#1202636).\n- nvmet: Expose max queues to configfs (bsc#1201865).\n- objtool: Add support for intra-function calls (bsc#1202396).\n- objtool: Make handle_insn_ops() unconditional (bsc#1202396).\n- objtool: Remove INSN_STACK (bsc#1202396).\n- objtool: Rework allocating stack_ops on decode (bsc#1202396).\n- objtool: Support multiple stack_op per instruction (bsc#1202396).\n- ocfs2: drop acl cache for directories too (bsc#1191667).\n- ocfs2: fix crash when initialize filecheck kobj fails (bsc#1197920).\n- ocfs2: mount fails with buffer overflow in strlen (bsc#1197760).\n- of/device: Fix up of_dma_configure_id() stub (git-fixes).\n- of: fdt: fix off-by-one error in unflatten_dt_nodes() (git-fixes).\n- padata: introduce internal padata_get/put_pd() helpers (bsc#1202638).\n- padata: make padata_free_shell() to respect pd\u0027s -\u003erefcnt (bsc#1202638).\n- parisc/sticon: fix reverse colors (bsc#1152489).\n- parisc: parisc-agp requires SBA IOMMU driver (bsc#1152489)\n- pci/acpi: Guard ARM64-specific mcfg_quirks (git-fixes).\n- pci: Add ACS quirk for Broadcom BCM5750x NICs (git-fixes).\n- pci: hv: Fix hv_arch_irq_unmask() for multi-MSI (bsc#1200845).\n- pci: hv: Fix interrupt mapping for multi-MSI (bsc#1200845).\n- pci: hv: Fix multi-MSI to allow more than one MSI vector (bsc#1200845).\n- pci: hv: Make the code arch neutral by adding arch specific interfaces (bsc#1200845).\n- pci: hv: Only reuse existing IRTE allocation for Multi-MSI (bsc#1200845).\n- pci: hv: Reuse existing IRTE allocation in compose_msi_msg() (bsc#1200845).\n- pci: qcom: Fix pipe clock imbalance (git-fixes).\n- perf bench: Share some global variables to fix build with gcc 10 (git-fixes).\n- pinctrl/rockchip: fix gpio device creation (git-fixes).\n- pinctrl: nomadik: Fix refcount leak in nmk_pinctrl_dt_subnode_to_map (git-fixes).\n- pinctrl: qcom: msm8916: Allow CAMSS GP clocks to be muxed (git-fixes).\n- pinctrl: rockchip: Enhance support for IRQ_TYPE_EDGE_BOTH (git-fixes).\n- pinctrl: sunxi: Add I/O bias setting for H6 R-PIO (git-fixes).\n- platform/x86: acer-wmi: Acer Aspire One AOD270/Packard Bell Dot keymap fixes (git-fixes).\n- platform/x86: pmc_atom: Fix SLP_TYPx bitfield mask (git-fixes).\n- powerpc/drmem: Make lmb_size 64 bit (bsc#1203424 ltc#199544).\n- powerpc/memhotplug: Make lmb size 64bit (bsc#1203424 ltc#199544).\n- powerpc/perf: Optimize clearing the pending PMI and remove WARN_ON for PMI check in power_pmu_disable (bsc#1156395).\n- powerpc/powernv/kvm: Use darn for H_RANDOM on Power9 (bsc#1065729).\n- powerpc/powernv: Avoid crashing if rng is NULL (bsc#1065729).\n- powerpc/powernv: Staticify functions without prototypes (bsc#1065729).\n- powerpc/powernv: delay rng platform device creation until later in boot (bsc#1065729).\n- powerpc/powernv: rename remaining rng powernv_ functions to pnv_ (bsc#1065729).\n- powerpc/powernv: wire up rng during setup_arch (bsc#1065729).\n- powerpc/pseries: wire up rng during setup_arch() (bsc#1065729).\n- powerpc/xive: Fix refcount leak in xive_get_max_prio (git-fixess).\n- powerpc: Enable execve syscall exit tracepoint (bsc#1065729).\n- powerpc: define get_cycles macro for arch-override (bsc#1065729).\n- powerpc: powernv: kABI: add back powernv_get_random_long (bsc#1065729).\n- ppc64/kdump: Limit kdump base to 512MB (bsc#1203410 ltc#199904).\n- profiling: fix shift too large makes kernel panic (git-fixes).\n- psi: Fix uaf issue when psi trigger is destroyed while being polled (bsc#1203909).\n- qlcnic: Add null check after calling netdev_alloc_skb (git-fixes).\n- random: fix crash on multiple early calls to add_bootloader_randomness() (git-fixes).\n- ratelimit: Fix data-races in ___ratelimit() (git-fixes).\n- regulator: core: Clean up on enable failure (git-fixes).\n- regulator: pfuze100: Fix the global-out-of-bounds access in pfuze100_regulator_probe() (git-fixes).\n- reiserfs: fix handling of -EOPNOTSUPP in reiserfs_for_each_xattr (bsc#1202714).\n- remoteproc: qcom: q6v5-mss: add powerdomains to MSM8996 config (git-fixes).\n- remoteproc: qcom: wcnss: Fix handling of IRQs (git-fixes).\n- reset: imx7: Fix the iMX8MP PCIe PHY PERST support (git-fixes).\n- rpm/kernel-binary.spec.in: move vdso to a separate package (bsc#1202385) We do the move only on 15.5+.\n- rpm/kernel-binary.spec.in: simplify find for usrmerged The type test and print line are the same for both cases. The usrmerged case only ignores more, so refactor it to make it more obvious.\n- rpm/kernel-source.spec.in: simplify finding of broken symlinks \u0027find -xtype l\u0027 will report them, so use that to make the search a bit faster (without using shell).\n- s390/crash: fix incorrect number of bytes to copy to user space (git-fixes).\n- s390/crash: make copy_oldmem_page() return number of bytes copied (git-fixes).\n- s390/mm: do not trigger write fault when vma does not allow VM_WRITE (git-fixes).\n- s390/mm: fix 2KB pgtable release race (git-fixes).\n- s390/ptrace: pass invalid syscall numbers to tracing (bsc#1192594 LTC#197522).\n- s390/qeth: cache link_info for ethtool (bsc#1202984 LTC#199607).\n- s390/qeth: clean up default cases for ethtool link mode (bsc#1202984 LTC#199607).\n- s390/qeth: improve QUERY CARD INFO processing (bsc#1202984 LTC#199607).\n- s390/qeth: improve selection of ethtool link modes (bsc#1202984 LTC#199607).\n- s390/qeth: set static link info during initialization (bsc#1202984 LTC#199607).\n- s390/qeth: tolerate error when querying card info (bsc#1202984 LTC#199607).\n- s390/qeth: use QUERY OAT for initial link info (bsc#1202984 LTC#199607).\n- scsi: core: Fix bad pointer dereference when ehandler kthread is invalid (git-fixes).\n- scsi: lpfc: Add missing destroy_workqueue() in error path (bsc#1203939).\n- scsi: lpfc: Add missing free iocb and nlp kref put for early return VMID cases (bsc#1203939).\n- scsi: lpfc: Add reporting capability for Link Degrade Signaling (bsc#1203939).\n- scsi: lpfc: Add warning notification period to CMF_SYNC_WQE (bsc#1203063).\n- scsi: lpfc: Check the return value of alloc_workqueue() (bsc#1203063).\n- scsi: lpfc: Copyright updates for 14.2.0.6 patches (bsc#1203063).\n- scsi: lpfc: Fix FLOGI ACC with wrong SID in PT2PT topology (bsc#1203939).\n- scsi: lpfc: Fix mbuf pool resource detected as busy at driver unload (bsc#1203939).\n- scsi: lpfc: Fix multiple NVMe remoteport registration calls for the same NPort ID (bsc#1203939).\n- scsi: lpfc: Fix null ndlp ptr dereference in abnormal exit path for GFT_ID (bsc#1203063).\n- scsi: lpfc: Fix prli_fc4_req checks in PRLI handling (bsc#1203939).\n- scsi: lpfc: Fix unsolicited FLOGI receive handling during PT2PT discovery (bsc#1203063).\n- scsi: lpfc: Fix various issues reported by tools (bsc#1203939).\n- scsi: lpfc: Move scsi_host_template outside dynamically allocated/freed phba (bsc#1185032 bsc#1203939).\n- scsi: lpfc: Remove SANDiags related code (bsc#1203063).\n- scsi: lpfc: Remove the unneeded result variable (bsc#1203939).\n- scsi: lpfc: Remove unneeded result variable (bsc#1203939).\n- scsi: lpfc: Rename mp/bmp dma buffers to rq/rsp in lpfc_fdmi_cmd (bsc#1203939).\n- scsi: lpfc: Return DID_TRANSPORT_DISRUPTED instead of DID_REQUEUE (bsc#1203939).\n- scsi: lpfc: Rework FDMI attribute registration for unintential padding (bsc#1203939).\n- scsi: lpfc: Rework MIB Rx Monitor debug info logic (bsc#1203063).\n- scsi: lpfc: Rework lpfc_fdmi_cmd() routine for cleanup and consistency (bsc#1203939).\n- scsi: lpfc: Update congestion mode logging for Emulex SAN Manager application (bsc#1203939).\n- scsi: lpfc: Update lpfc version to 14.2.0.6 (bsc#1203063).\n- scsi: lpfc: Update lpfc version to 14.2.0.7 (bsc#1203939).\n- scsi: mpt3sas: Fix use-after-free warning (git-fixes).\n- scsi: qla2xxx: Add NVMe parameters support in Auxiliary Image Status (bsc#1203935).\n- scsi: qla2xxx: Add debugfs create/delete helpers (bsc#1203935).\n- scsi: qla2xxx: Always wait for qlt_sess_work_fn() from qlt_stop_phase1() (bsc#1203935).\n- scsi: qla2xxx: Avoid flush_scheduled_work() usage (bsc#1203935).\n- scsi: qla2xxx: Disable ATIO interrupt coalesce for quad port ISP27XX (bsc#1203935).\n- scsi: qla2xxx: Drop DID_TARGET_FAILURE use (bsc#1203935).\n- scsi: qla2xxx: Fix memory leak in __qlt_24xx_handle_abts() (bsc#1203935).\n- scsi: qla2xxx: Fix response queue handler reading stale packets (bsc#1203935).\n- scsi: qla2xxx: Log message \u0027skipping scsi_scan_host()\u0027 as informational (bsc#1203935).\n- scsi: qla2xxx: Remove unused declarations for qla2xxx (bsc#1203935).\n- scsi: qla2xxx: Remove unused del_sess_list field (bsc#1203935).\n- scsi: qla2xxx: Remove unused qlt_tmr_work() (bsc#1203935).\n- scsi: qla2xxx: Revert \u0027scsi: qla2xxx: Fix response queue handler reading stale packets\u0027 (bsc#1203935).\n- scsi: qla2xxx: Update version to 10.02.07.900-k (bsc#1203935).\n- scsi: sg: Allow waiting for commands to complete on removed device (git-fixes).\n- scsi: smartpqi: Fix DMA direction for RAID requests (git-fixes).\n- scsi: smartpqi: Shorten drive visibility after removal (bsc#1200622).\n- scsi: smartpqi: Update LUN reset handler (bsc#1200622).\n- selftests: futex: Use variable MAKE instead of make (git-fixes).\n- serial: 8250_dw: Store LSR into lsr_saved_flags in dw8250_tx_wait_empty() (git-fixes).\n- serial: Create uart_xmit_advance() (git-fixes).\n- serial: fsl_lpuart: RS485 RTS polariy is inverse (git-fixes).\n- serial: mvebu-uart: uart2 error bits clearing (git-fixes).\n- serial: tegra-tcu: Use uart_xmit_advance(), fixes icount.tx accounting (git-fixes).\n- serial: tegra: Change lower tolerance baud rate limit for tegra20 and tegra30 (git-fixes).\n- serial: tegra: Use uart_xmit_advance(), fixes icount.tx accounting (git-fixes).\n- silence nfscache allocation warnings with kvzalloc (git-fixes).\n- soc: brcmstb: pm-arm: Fix refcount leak and __iomem leak bugs (git-fixes).\n- soc: sunxi: sram: Actually claim SRAM regions (git-fixes).\n- soc: sunxi: sram: Fix debugfs info for A64 SRAM C (git-fixes).\n- soc: sunxi: sram: Prevent the driver from being unbound (git-fixes).\n- spi: Fix incorrect cs_setup delay handling (git-fixes).\n- spi: spi-rspi: Fix PIO fallback on RZ platforms (git-fixes).\n- spi: synquacer: Add missing clk_disable_unprepare() (git-fixes).\n- spmi: trace: fix stack-out-of-bound access in SPMI tracing functions (git-fixes).\n- squashfs: fix divide error in calculate_skip() (git-fixes).\n- staging: rtl8712: fix use after free bugs (git-fixes).\n- struct ehci_hcd: hide new member (git-fixes).\n- struct otg_fsm: hide new boolean member in gap (git-fixes).\n- sunrpc: Clean up scheduling of autoclose (git-fixes).\n- sunrpc: Do not call connect() more than once on a TCP socket (git-fixes).\n- sunrpc: Do not dereference xprt-\u003esnd_task if it\u0027s a cookie (git-fixes).\n- sunrpc: Do not leak sockets in xs_local_connect() (git-fixes).\n- sunrpc: Fix READ_PLUS crasher (git-fixes).\n- sunrpc: Fix misplaced barrier in call_decode (git-fixes).\n- sunrpc: Prevent immediate close+reconnect (git-fixes).\n- sunrpc: RPC level errors should set task-\u003etk_rpc_status (git-fixes).\n- sunrpc: Reinitialise the backchannel request buffers before reuse (git-fixes).\n- sunrpc: fix expiry of auth creds (git-fixes).\n- svcrdma: Hold private mutex while invoking rdma_accept() (git-fixes).\n- tee: optee: Fix incorrect page free bug (git-fixes).\n- thermal: Fix NULL pointer dereferences in of_thermal_ functions (git-fixes).\n- thermal: sysfs: Fix cooling_device_stats_setup() error code path (git-fixes).\n- thunderbolt: Use the actual buffer in tb_async_error() (git-fixes).\n- tools/thermal: Fix possible path truncations (git-fixes).\n- tracing/histogram: Fix a potential memory leak for kstrdup() (git-fixes).\n- tracing/histograms: Fix memory leak problem (git-fixes).\n- tracing/probes: Have kprobes and uprobes use $COMM too (git-fixes).\n- tracing: Add ustring operation to filtering string pointers (git-fixes).\n- tracing: hold caller_addr to hardirq_{enable,disable}_ip (git-fixes).\n- tty/serial: atmel: RS485 \u0026 ISO7816: wait for TXRDY before sending data (git-fixes).\n- tty: serial: Fix refcount leak bug in ucc_uart.c (git-fixes).\n- tty: serial: lpuart: disable flow control while waiting for the transmit engine to complete (git-fixes).\n- tty: vt: initialize unicode screen buffer (git-fixes).\n- usb-storage: Add ignore-residue quirk for NXP PN7462AU (git-fixes).\n- usb.h: struct usb_device: hide new member (git-fixes).\n- usb: add quirks for Lenovo OneLink+ Dock (git-fixes).\n- usb: cdc-acm: Add Icom PMR F3400 support (0c26:0020) (git-fixes).\n- usb: core: Fix RST error in hub.c (git-fixes).\n- usb: core: Prevent nested device-reset calls (git-fixes).\n- usb: dwc2: fix wrong order of phy_power_on and phy_init (git-fixes).\n- usb: dwc3: Switch to platform_get_irq_byname_optional() (git-fixes).\n- usb: dwc3: disable USB core PHY management (git-fixes).\n- usb: dwc3: ep0: Fix delay status handling (git-fixes).\n- usb: dwc3: gadget: Avoid starting DWC3 gadget during UDC unbind (git-fixes).\n- usb: dwc3: gadget: END_TRANSFER before CLEAR_STALL command (git-fixes).\n- usb: dwc3: gadget: Fix IN endpoint max packet size allocation (git-fixes).\n- usb: dwc3: gadget: Prevent repeat pullup() (git-fixes).\n- usb: dwc3: gadget: Refactor dwc3_gadget_ep_dequeue (git-fixes).\n- usb: dwc3: gadget: Remove FS bInterval_m1 limitation (git-fixes).\n- usb: dwc3: gadget: Remove unnecessary checks (git-fixes).\n- usb: dwc3: gadget: Replace list_for_each_entry_safe() if using giveback (git-fixes).\n- usb: dwc3: gadget: Store resource index of start cmd (git-fixes).\n- usb: dwc3: qcom: fix missing optional irq warnings.\n- usb: ehci: handshake CMD_RUN instead of STS_HALT (git-fixes).\n- usb: gadget: mass_storage: Fix cdrom data transfers on MAC-OS (git-fixes).\n- usb: gadget: u_audio: fix race condition on endpoint stop (git-fixes).\n- usb: gadget: udc-xilinx: replace memcpy with memcpy_toio (git-fixes).\n- usb: gadget: uvc: call uvc uvcg_warn on completed status instead of uvcg_info (git-fixes).\n- usb: host: ohci-ppc-of: Fix refcount leak bug (git-fixes).\n- usb: otg-fsm: Fix hrtimer list corruption (git-fixes).\n- usb: renesas: Fix refcount leak bug (git-fixes).\n- usb: serial: ch341: fix disabled rx timer on older devices (git-fixes).\n- usb: serial: ch341: fix lost character on LCR updates (git-fixes).\n- usb: serial: ch341: name prescaler, divisor registers (git-fixes).\n- usb: serial: cp210x: add Decagon UCA device id (git-fixes).\n- usb: serial: ftdi_sio: add Omron CS1W-CIF31 device id (git-fixes).\n- usb: serial: option: add Quectel BG95 0x0203 composition (git-fixes).\n- usb: serial: option: add Quectel BG95 0x0203 composition (git-fixes).\n- usb: serial: option: add Quectel EM060K modem (git-fixes).\n- usb: serial: option: add Quectel RM520N (git-fixes).\n- usb: serial: option: add Quectel RM520N (git-fixes).\n- usb: serial: option: add support for Cinterion MV32-WA/WB RmNet mode (git-fixes).\n- usb: serial: option: add support for OPPO R11 diag port (git-fixes).\n- usb: storage: Add ASUS \u0026lt;0x0b05:0x1932\u003e to IGNORE_UAS (git-fixes).\n- usb: typec: altmodes/displayport: correct pin assignment for UFP receptacles (git-fixes).\n- usb: typec: ucsi: Remove incorrect warning (git-fixes).\n- usb: xhci-mtk: add a function to (un)load bandwidth info (git-fixes).\n- usb: xhci-mtk: add only one extra CS for FS/LS INTR (git-fixes).\n- usb: xhci-mtk: add some schedule error number (git-fixes).\n- usb: xhci-mtk: fix issue of out-of-bounds array access (git-fixes).\n- usb: xhci-mtk: get the microframe boundary for ESIT (git-fixes).\n- usb: xhci-mtk: use @sch_tt to check whether need do TT schedule (git-fixes).\n- usbnet: Fix linkwatch use-after-free on disconnect (git-fixes).\n- usbnet: Fix memory leak in usbnet_disconnect() (git-fixes).\n- usbnet: smsc95xx: Fix deadlock on runtime resume (git-fixes).\n- vboxguest: Do not use devm for irq (git-fixes).\n- vfio/ccw: Remove UUID from s390 debug log (git-fixes).\n- video: fbdev: amba-clcd: Fix refcount leak bugs (git-fixes).\n- video: fbdev: arkfb: Check the size of screen before memset_io() (git-fixes).\n- video: fbdev: arkfb: Fix a divide-by-zero bug in ark_set_pixclock() (git-fixes).\n- video: fbdev: i740fb: Check the argument of i740_calc_vclk() (git-fixes).\n- video: fbdev: pxa3xx-gcu: Fix integer overflow in pxa3xx_gcu_write (git-fixes).\n- video: fbdev: s3fb: Check the size of screen before memset_io() (git-fixes).\n- video: fbdev: sis: fix typos in SiS_GetModeID() (git-fixes).\n- video: fbdev: vt8623fb: Check the size of screen before memset_io() (git-fixes).\n- virtio_net: fix memory leak inside XPD_TX with mergeable (git-fixes).\n- vmci: Add support for ARM64 (bsc#1199291, jsc#SLE-24635).\n- vmci: Check exclusive_vectors when freeing interrupt 1 (bsc#1199291, jsc#SLE-24635).\n- vmci: Enforce queuepair max size for IOCTL_VMCI_QUEUEPAIR_ALLOC (bsc#1199291, jsc#SLE-24635).\n- vmci: Fix some error handling paths in vmci_guest_probe_device() (bsc#1199291, jsc#SLE-24635).\n- vmci: Release notification_bitmap in error path (bsc#1199291, jsc#SLE-24635).\n- vmci: dma dg: add MMIO access to registers (bsc#1199291, jsc#SLE-24635).\n- vmci: dma dg: add support for DMA datagrams receive (bsc#1199291, jsc#SLE-24635).\n- vmci: dma dg: add support for DMA datagrams sends (bsc#1199291, jsc#SLE-24635).\n- vmci: dma dg: allocate send and receive buffers for DMA datagrams (bsc#1199291, jsc#SLE-24635).\n- vmci: dma dg: detect DMA datagram capability (bsc#1199291, jsc#SLE-24635).\n- vmci: dma dg: register dummy IRQ handlers for DMA datagrams (bsc#1199291, jsc#SLE-24635).\n- vmci: dma dg: set OS page size (bsc#1199291, jsc#SLE-24635).\n- vmci: dma dg: whitespace formatting change for vmci register defines (bsc#1199291, jsc#SLE-24635).\n- vmxnet3: Implement ethtool\u0027s get_channels command (bsc#1200431).\n- vmxnet3: Record queue number to incoming packets (bsc#1200431).\n- vmxnet3: Remove useless DMA-32 fallback configuration (bsc#1200431).\n- vmxnet3: add command to set ring buffer sizes (bsc#1200431).\n- vmxnet3: add support for capability registers (bsc#1200431).\n- vmxnet3: add support for large passthrough BAR register (bsc#1200431).\n- vmxnet3: add support for out of order rx completion (bsc#1200431).\n- vmxnet3: disable overlay offloads if UPT device does not support (bsc#1200431).\n- vmxnet3: do not reschedule napi for rx processing (bsc#1200431).\n- vmxnet3: do not stop tx queues after netif_device_detach() (bsc#1200431).\n- vmxnet3: limit number of TXDs used for TSO packet (bsc#1200431).\n- vmxnet3: prepare for version 7 changes (bsc#1200431).\n- vmxnet3: switch from \u0027pci_\u0027 to \u0027dma_\u0027 API (bsc#1200431).\n- vmxnet3: update to version 7 (bsc#1200431).\n- vmxnet3: use ext1 field to indicate encapsulated packet (bsc#1200431).\n- vsock: Fix memory leak in vsock_connect() (git-fixes).\n- vsock: Set socket state back to SS_UNCONNECTED in vsock_connect_timeout() (git-fixes).\n- vt: Clear selection before changing the font (git-fixes).\n- vt: selection, introduce vc_is_sel (git-fixes).\n- watchdog: armada_37xx_wdt: check the return value of devm_ioremap() in armada_37xx_wdt_probe() (git-fixes).\n- watchdog: wdat_wdt: Set the min and max timeout values properly (bsc#1194023).\n- wifi: cfg80211: debugfs: fix return type in ht40allow_map_read() (git-fixes).\n- wifi: iwlegacy: 4965: corrected fix for potential off-by-one overflow in il4965_rs_fill_link_cmd() (git-fixes).\n- wifi: mac80211: Do not finalize CSA in IBSS mode if state is disconnected (git-fixes).\n- wifi: mac80211: Fix UAF in ieee80211_scan_rx() (git-fixes).\n- wifi: mac80211_hwsim: add back erroneously removed cast (git-fixes).\n- wifi: mac80211_hwsim: fix race condition in pending packet (git-fixes).\n- wifi: mac80211_hwsim: use 32-bit skb cookie (git-fixes).\n- x86/bugs: Reenable retbleed=off While for older kernels the return thunks are statically built in and cannot be dynamically patched out, retbleed=off should still work so that it can be disabled.\n- x86/kexec: fix memory leak of elf header buffer (bsc#1196444).\n- x86/olpc: fix \u0027logical not is only applied to the left hand side\u0027 (git-fixes).\n- x86/xen: Remove undefined behavior in setup_features() (git-fixes).\n- xen/xenbus: fix return type in xenbus_file_read() (git-fixes).\n- xfs: Fix assert failure in xfs_setattr_size() (git-fixes).\n- xfs: bunmapi has unnecessary AG lock ordering issues (git-fixes).\n- xfs: check sb_meta_uuid for dabuf buffer recovery (bsc#1202577).\n- xfs: make xfs_rtalloc_query_range input parameters const (git-fixes).\n- xfs: mark a data structure sick if there are cross-referencing errors (git-fixes).\n- xfs: only reset incore inode health state flags when reclaiming an inode (git-fixes).\n- xfs: prevent a UAF when log IO errors race with unmount (git-fixes).\n- xfs: use kmem_cache_free() for kmem_cache objects (git-fixes).\n- xprtrdma: Fix XDRBUF_SPARSE_PAGES support (git-fixes).\n- xprtrdma: Fix cwnd update ordering (git-fixes).\n",
        "title": "Description of the patch"
      },
      {
        "category": "details",
        "text": "SUSE-2022-3809,SUSE-SLE-Module-RT-15-SP3-2022-3809,SUSE-SUSE-MicroOS-5.1-2022-3809,SUSE-SUSE-MicroOS-5.2-2022-3809,openSUSE-Leap-Micro-5.2-2022-3809",
        "title": "Patchnames"
      },
      {
        "category": "legal_disclaimer",
        "text": "CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).",
        "title": "Terms of use"
      }
    ],
    "publisher": {
      "category": "vendor",
      "contact_details": "https://www.suse.com/support/security/contact/",
      "name": "SUSE Product Security Team",
      "namespace": "https://www.suse.com/"
    },
    "references": [
      {
        "category": "external",
        "summary": "SUSE ratings",
        "url": "https://www.suse.com/support/security/rating/"
      },
      {
        "category": "self",
        "summary": "URL of this CSAF notice",
        "url": "https://ftp.suse.com/pub/projects/security/csaf/suse-su-2022_3809-1.json"
      },
      {
        "category": "self",
        "summary": "URL for SUSE-SU-2022:3809-1",
        "url": "https://www.suse.com/support/update/announcement/2022/suse-su-20223809-1/"
      },
      {
        "category": "self",
        "summary": "E-Mail link for SUSE-SU-2022:3809-1",
        "url": "https://lists.suse.com/pipermail/sle-security-updates/2022-October/012771.html"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1023051",
        "url": "https://bugzilla.suse.com/1023051"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1065729",
        "url": "https://bugzilla.suse.com/1065729"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1152489",
        "url": "https://bugzilla.suse.com/1152489"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1156395",
        "url": "https://bugzilla.suse.com/1156395"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1177471",
        "url": "https://bugzilla.suse.com/1177471"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1179722",
        "url": "https://bugzilla.suse.com/1179722"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1179723",
        "url": "https://bugzilla.suse.com/1179723"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1181862",
        "url": "https://bugzilla.suse.com/1181862"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1185032",
        "url": "https://bugzilla.suse.com/1185032"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1191662",
        "url": "https://bugzilla.suse.com/1191662"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1191667",
        "url": "https://bugzilla.suse.com/1191667"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1191881",
        "url": "https://bugzilla.suse.com/1191881"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1192594",
        "url": "https://bugzilla.suse.com/1192594"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1194023",
        "url": "https://bugzilla.suse.com/1194023"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1194272",
        "url": "https://bugzilla.suse.com/1194272"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1194535",
        "url": "https://bugzilla.suse.com/1194535"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1196444",
        "url": "https://bugzilla.suse.com/1196444"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1197158",
        "url": "https://bugzilla.suse.com/1197158"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1197659",
        "url": "https://bugzilla.suse.com/1197659"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1197755",
        "url": "https://bugzilla.suse.com/1197755"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1197756",
        "url": "https://bugzilla.suse.com/1197756"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1197757",
        "url": "https://bugzilla.suse.com/1197757"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1197760",
        "url": "https://bugzilla.suse.com/1197760"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1197763",
        "url": "https://bugzilla.suse.com/1197763"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1197920",
        "url": "https://bugzilla.suse.com/1197920"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1198971",
        "url": "https://bugzilla.suse.com/1198971"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1199291",
        "url": "https://bugzilla.suse.com/1199291"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1200288",
        "url": "https://bugzilla.suse.com/1200288"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1200313",
        "url": "https://bugzilla.suse.com/1200313"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1200431",
        "url": "https://bugzilla.suse.com/1200431"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1200622",
        "url": "https://bugzilla.suse.com/1200622"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1200845",
        "url": "https://bugzilla.suse.com/1200845"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1200868",
        "url": "https://bugzilla.suse.com/1200868"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1200869",
        "url": "https://bugzilla.suse.com/1200869"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1200870",
        "url": "https://bugzilla.suse.com/1200870"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1200871",
        "url": "https://bugzilla.suse.com/1200871"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1200872",
        "url": "https://bugzilla.suse.com/1200872"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1200873",
        "url": "https://bugzilla.suse.com/1200873"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1201019",
        "url": "https://bugzilla.suse.com/1201019"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1201309",
        "url": "https://bugzilla.suse.com/1201309"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1201310",
        "url": "https://bugzilla.suse.com/1201310"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1201420",
        "url": "https://bugzilla.suse.com/1201420"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1201489",
        "url": "https://bugzilla.suse.com/1201489"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1201610",
        "url": "https://bugzilla.suse.com/1201610"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1201705",
        "url": "https://bugzilla.suse.com/1201705"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1201726",
        "url": "https://bugzilla.suse.com/1201726"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1201865",
        "url": "https://bugzilla.suse.com/1201865"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1201948",
        "url": "https://bugzilla.suse.com/1201948"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1201990",
        "url": "https://bugzilla.suse.com/1201990"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1202095",
        "url": "https://bugzilla.suse.com/1202095"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1202096",
        "url": "https://bugzilla.suse.com/1202096"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1202097",
        "url": "https://bugzilla.suse.com/1202097"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1202341",
        "url": "https://bugzilla.suse.com/1202341"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1202346",
        "url": "https://bugzilla.suse.com/1202346"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1202347",
        "url": "https://bugzilla.suse.com/1202347"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1202385",
        "url": "https://bugzilla.suse.com/1202385"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1202393",
        "url": "https://bugzilla.suse.com/1202393"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1202396",
        "url": "https://bugzilla.suse.com/1202396"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1202447",
        "url": "https://bugzilla.suse.com/1202447"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1202577",
        "url": "https://bugzilla.suse.com/1202577"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1202636",
        "url": "https://bugzilla.suse.com/1202636"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1202638",
        "url": "https://bugzilla.suse.com/1202638"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1202672",
        "url": "https://bugzilla.suse.com/1202672"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1202677",
        "url": "https://bugzilla.suse.com/1202677"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1202701",
        "url": "https://bugzilla.suse.com/1202701"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1202708",
        "url": "https://bugzilla.suse.com/1202708"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1202709",
        "url": "https://bugzilla.suse.com/1202709"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1202710",
        "url": "https://bugzilla.suse.com/1202710"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1202711",
        "url": "https://bugzilla.suse.com/1202711"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1202712",
        "url": "https://bugzilla.suse.com/1202712"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1202713",
        "url": "https://bugzilla.suse.com/1202713"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1202714",
        "url": "https://bugzilla.suse.com/1202714"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1202715",
        "url": "https://bugzilla.suse.com/1202715"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1202716",
        "url": "https://bugzilla.suse.com/1202716"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1202717",
        "url": "https://bugzilla.suse.com/1202717"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1202718",
        "url": "https://bugzilla.suse.com/1202718"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1202720",
        "url": "https://bugzilla.suse.com/1202720"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1202722",
        "url": "https://bugzilla.suse.com/1202722"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1202745",
        "url": "https://bugzilla.suse.com/1202745"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1202756",
        "url": "https://bugzilla.suse.com/1202756"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1202810",
        "url": "https://bugzilla.suse.com/1202810"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1202811",
        "url": "https://bugzilla.suse.com/1202811"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1202860",
        "url": "https://bugzilla.suse.com/1202860"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1202895",
        "url": "https://bugzilla.suse.com/1202895"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1202898",
        "url": "https://bugzilla.suse.com/1202898"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1202960",
        "url": "https://bugzilla.suse.com/1202960"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1202984",
        "url": "https://bugzilla.suse.com/1202984"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1203063",
        "url": "https://bugzilla.suse.com/1203063"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1203098",
        "url": "https://bugzilla.suse.com/1203098"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1203107",
        "url": "https://bugzilla.suse.com/1203107"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1203117",
        "url": "https://bugzilla.suse.com/1203117"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1203135",
        "url": "https://bugzilla.suse.com/1203135"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1203136",
        "url": "https://bugzilla.suse.com/1203136"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1203137",
        "url": "https://bugzilla.suse.com/1203137"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1203159",
        "url": "https://bugzilla.suse.com/1203159"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1203290",
        "url": "https://bugzilla.suse.com/1203290"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1203389",
        "url": "https://bugzilla.suse.com/1203389"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1203410",
        "url": "https://bugzilla.suse.com/1203410"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1203424",
        "url": "https://bugzilla.suse.com/1203424"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1203514",
        "url": "https://bugzilla.suse.com/1203514"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1203552",
        "url": "https://bugzilla.suse.com/1203552"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1203622",
        "url": "https://bugzilla.suse.com/1203622"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1203737",
        "url": "https://bugzilla.suse.com/1203737"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1203769",
        "url": "https://bugzilla.suse.com/1203769"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1203770",
        "url": "https://bugzilla.suse.com/1203770"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1203802",
        "url": "https://bugzilla.suse.com/1203802"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1203906",
        "url": "https://bugzilla.suse.com/1203906"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1203909",
        "url": "https://bugzilla.suse.com/1203909"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1203935",
        "url": "https://bugzilla.suse.com/1203935"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1203939",
        "url": "https://bugzilla.suse.com/1203939"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1203987",
        "url": "https://bugzilla.suse.com/1203987"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1203992",
        "url": "https://bugzilla.suse.com/1203992"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1204051",
        "url": "https://bugzilla.suse.com/1204051"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1204059",
        "url": "https://bugzilla.suse.com/1204059"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1204060",
        "url": "https://bugzilla.suse.com/1204060"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1204125",
        "url": "https://bugzilla.suse.com/1204125"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2016-3695 page",
        "url": "https://www.suse.com/security/cve/CVE-2016-3695/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2020-16119 page",
        "url": "https://www.suse.com/security/cve/CVE-2020-16119/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2020-27784 page",
        "url": "https://www.suse.com/security/cve/CVE-2020-27784/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2021-4155 page",
        "url": "https://www.suse.com/security/cve/CVE-2021-4155/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2021-4203 page",
        "url": "https://www.suse.com/security/cve/CVE-2021-4203/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2022-20368 page",
        "url": "https://www.suse.com/security/cve/CVE-2022-20368/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2022-20369 page",
        "url": "https://www.suse.com/security/cve/CVE-2022-20369/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2022-2503 page",
        "url": "https://www.suse.com/security/cve/CVE-2022-2503/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2022-2586 page",
        "url": "https://www.suse.com/security/cve/CVE-2022-2586/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2022-2588 page",
        "url": "https://www.suse.com/security/cve/CVE-2022-2588/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2022-26373 page",
        "url": "https://www.suse.com/security/cve/CVE-2022-26373/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2022-2663 page",
        "url": "https://www.suse.com/security/cve/CVE-2022-2663/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2022-2905 page",
        "url": "https://www.suse.com/security/cve/CVE-2022-2905/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2022-2977 page",
        "url": "https://www.suse.com/security/cve/CVE-2022-2977/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2022-3028 page",
        "url": "https://www.suse.com/security/cve/CVE-2022-3028/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2022-3169 page",
        "url": "https://www.suse.com/security/cve/CVE-2022-3169/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2022-32296 page",
        "url": "https://www.suse.com/security/cve/CVE-2022-32296/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2022-3239 page",
        "url": "https://www.suse.com/security/cve/CVE-2022-3239/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2022-3303 page",
        "url": "https://www.suse.com/security/cve/CVE-2022-3303/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2022-36879 page",
        "url": "https://www.suse.com/security/cve/CVE-2022-36879/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2022-39188 page",
        "url": "https://www.suse.com/security/cve/CVE-2022-39188/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2022-39190 page",
        "url": "https://www.suse.com/security/cve/CVE-2022-39190/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2022-40768 page",
        "url": "https://www.suse.com/security/cve/CVE-2022-40768/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2022-41218 page",
        "url": "https://www.suse.com/security/cve/CVE-2022-41218/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2022-41222 page",
        "url": "https://www.suse.com/security/cve/CVE-2022-41222/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2022-41674 page",
        "url": "https://www.suse.com/security/cve/CVE-2022-41674/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2022-41848 page",
        "url": "https://www.suse.com/security/cve/CVE-2022-41848/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2022-41849 page",
        "url": "https://www.suse.com/security/cve/CVE-2022-41849/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2022-42719 page",
        "url": "https://www.suse.com/security/cve/CVE-2022-42719/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2022-42720 page",
        "url": "https://www.suse.com/security/cve/CVE-2022-42720/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2022-42721 page",
        "url": "https://www.suse.com/security/cve/CVE-2022-42721/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2022-42722 page",
        "url": "https://www.suse.com/security/cve/CVE-2022-42722/"
      }
    ],
    "title": "Security update for the Linux Kernel",
    "tracking": {
      "current_release_date": "2022-10-31T08:28:31Z",
      "generator": {
        "date": "2022-10-31T08:28:31Z",
        "engine": {
          "name": "cve-database.git:bin/generate-csaf.pl",
          "version": "1"
        }
      },
      "id": "SUSE-SU-2022:3809-1",
      "initial_release_date": "2022-10-31T08:28:31Z",
      "revision_history": [
        {
          "date": "2022-10-31T08:28:31Z",
          "number": "1",
          "summary": "Current version"
        }
      ],
      "status": "final",
      "version": "1"
    }
  },
  "product_tree": {
    "branches": [
      {
        "branches": [
          {
            "branches": [
              {
                "category": "product_version",
                "name": "kernel-devel-rt-5.3.18-150300.106.1.noarch",
                "product": {
                  "name": "kernel-devel-rt-5.3.18-150300.106.1.noarch",
                  "product_id": "kernel-devel-rt-5.3.18-150300.106.1.noarch"
                }
              },
              {
                "category": "product_version",
                "name": "kernel-source-rt-5.3.18-150300.106.1.noarch",
                "product": {
                  "name": "kernel-source-rt-5.3.18-150300.106.1.noarch",
                  "product_id": "kernel-source-rt-5.3.18-150300.106.1.noarch"
                }
              }
            ],
            "category": "architecture",
            "name": "noarch"
          },
          {
            "branches": [
              {
                "category": "product_version",
                "name": "cluster-md-kmp-rt-5.3.18-150300.106.1.x86_64",
                "product": {
                  "name": "cluster-md-kmp-rt-5.3.18-150300.106.1.x86_64",
                  "product_id": "cluster-md-kmp-rt-5.3.18-150300.106.1.x86_64"
                }
              },
              {
                "category": "product_version",
                "name": "cluster-md-kmp-rt_debug-5.3.18-150300.106.1.x86_64",
                "product": {
                  "name": "cluster-md-kmp-rt_debug-5.3.18-150300.106.1.x86_64",
                  "product_id": "cluster-md-kmp-rt_debug-5.3.18-150300.106.1.x86_64"
                }
              },
              {
                "category": "product_version",
                "name": "dlm-kmp-rt-5.3.18-150300.106.1.x86_64",
                "product": {
                  "name": "dlm-kmp-rt-5.3.18-150300.106.1.x86_64",
                  "product_id": "dlm-kmp-rt-5.3.18-150300.106.1.x86_64"
                }
              },
              {
                "category": "product_version",
                "name": "dlm-kmp-rt_debug-5.3.18-150300.106.1.x86_64",
                "product": {
                  "name": "dlm-kmp-rt_debug-5.3.18-150300.106.1.x86_64",
                  "product_id": "dlm-kmp-rt_debug-5.3.18-150300.106.1.x86_64"
                }
              },
              {
                "category": "product_version",
                "name": "gfs2-kmp-rt-5.3.18-150300.106.1.x86_64",
                "product": {
                  "name": "gfs2-kmp-rt-5.3.18-150300.106.1.x86_64",
                  "product_id": "gfs2-kmp-rt-5.3.18-150300.106.1.x86_64"
                }
              },
              {
                "category": "product_version",
                "name": "gfs2-kmp-rt_debug-5.3.18-150300.106.1.x86_64",
                "product": {
                  "name": "gfs2-kmp-rt_debug-5.3.18-150300.106.1.x86_64",
                  "product_id": "gfs2-kmp-rt_debug-5.3.18-150300.106.1.x86_64"
                }
              },
              {
                "category": "product_version",
                "name": "kernel-rt-5.3.18-150300.106.1.x86_64",
                "product": {
                  "name": "kernel-rt-5.3.18-150300.106.1.x86_64",
                  "product_id": "kernel-rt-5.3.18-150300.106.1.x86_64"
                }
              },
              {
                "category": "product_version",
                "name": "kernel-rt-devel-5.3.18-150300.106.1.x86_64",
                "product": {
                  "name": "kernel-rt-devel-5.3.18-150300.106.1.x86_64",
                  "product_id": "kernel-rt-devel-5.3.18-150300.106.1.x86_64"
                }
              },
              {
                "category": "product_version",
                "name": "kernel-rt-extra-5.3.18-150300.106.1.x86_64",
                "product": {
                  "name": "kernel-rt-extra-5.3.18-150300.106.1.x86_64",
                  "product_id": "kernel-rt-extra-5.3.18-150300.106.1.x86_64"
                }
              },
              {
                "category": "product_version",
                "name": "kernel-rt-livepatch-devel-5.3.18-150300.106.1.x86_64",
                "product": {
                  "name": "kernel-rt-livepatch-devel-5.3.18-150300.106.1.x86_64",
                  "product_id": "kernel-rt-livepatch-devel-5.3.18-150300.106.1.x86_64"
                }
              },
              {
                "category": "product_version",
                "name": "kernel-rt-optional-5.3.18-150300.106.1.x86_64",
                "product": {
                  "name": "kernel-rt-optional-5.3.18-150300.106.1.x86_64",
                  "product_id": "kernel-rt-optional-5.3.18-150300.106.1.x86_64"
                }
              },
              {
                "category": "product_version",
                "name": "kernel-rt_debug-5.3.18-150300.106.1.x86_64",
                "product": {
                  "name": "kernel-rt_debug-5.3.18-150300.106.1.x86_64",
                  "product_id": "kernel-rt_debug-5.3.18-150300.106.1.x86_64"
                }
              },
              {
                "category": "product_version",
                "name": "kernel-rt_debug-devel-5.3.18-150300.106.1.x86_64",
                "product": {
                  "name": "kernel-rt_debug-devel-5.3.18-150300.106.1.x86_64",
                  "product_id": "kernel-rt_debug-devel-5.3.18-150300.106.1.x86_64"
                }
              },
              {
                "category": "product_version",
                "name": "kernel-rt_debug-extra-5.3.18-150300.106.1.x86_64",
                "product": {
                  "name": "kernel-rt_debug-extra-5.3.18-150300.106.1.x86_64",
                  "product_id": "kernel-rt_debug-extra-5.3.18-150300.106.1.x86_64"
                }
              },
              {
                "category": "product_version",
                "name": "kernel-rt_debug-livepatch-devel-5.3.18-150300.106.1.x86_64",
                "product": {
                  "name": "kernel-rt_debug-livepatch-devel-5.3.18-150300.106.1.x86_64",
                  "product_id": "kernel-rt_debug-livepatch-devel-5.3.18-150300.106.1.x86_64"
                }
              },
              {
                "category": "product_version",
                "name": "kernel-rt_debug-optional-5.3.18-150300.106.1.x86_64",
                "product": {
                  "name": "kernel-rt_debug-optional-5.3.18-150300.106.1.x86_64",
                  "product_id": "kernel-rt_debug-optional-5.3.18-150300.106.1.x86_64"
                }
              },
              {
                "category": "product_version",
                "name": "kernel-syms-rt-5.3.18-150300.106.1.x86_64",
                "product": {
                  "name": "kernel-syms-rt-5.3.18-150300.106.1.x86_64",
                  "product_id": "kernel-syms-rt-5.3.18-150300.106.1.x86_64"
                }
              },
              {
                "category": "product_version",
                "name": "kselftests-kmp-rt-5.3.18-150300.106.1.x86_64",
                "product": {
                  "name": "kselftests-kmp-rt-5.3.18-150300.106.1.x86_64",
                  "product_id": "kselftests-kmp-rt-5.3.18-150300.106.1.x86_64"
                }
              },
              {
                "category": "product_version",
                "name": "kselftests-kmp-rt_debug-5.3.18-150300.106.1.x86_64",
                "product": {
                  "name": "kselftests-kmp-rt_debug-5.3.18-150300.106.1.x86_64",
                  "product_id": "kselftests-kmp-rt_debug-5.3.18-150300.106.1.x86_64"
                }
              },
              {
                "category": "product_version",
                "name": "ocfs2-kmp-rt-5.3.18-150300.106.1.x86_64",
                "product": {
                  "name": "ocfs2-kmp-rt-5.3.18-150300.106.1.x86_64",
                  "product_id": "ocfs2-kmp-rt-5.3.18-150300.106.1.x86_64"
                }
              },
              {
                "category": "product_version",
                "name": "ocfs2-kmp-rt_debug-5.3.18-150300.106.1.x86_64",
                "product": {
                  "name": "ocfs2-kmp-rt_debug-5.3.18-150300.106.1.x86_64",
                  "product_id": "ocfs2-kmp-rt_debug-5.3.18-150300.106.1.x86_64"
                }
              },
              {
                "category": "product_version",
                "name": "reiserfs-kmp-rt-5.3.18-150300.106.1.x86_64",
                "product": {
                  "name": "reiserfs-kmp-rt-5.3.18-150300.106.1.x86_64",
                  "product_id": "reiserfs-kmp-rt-5.3.18-150300.106.1.x86_64"
                }
              },
              {
                "category": "product_version",
                "name": "reiserfs-kmp-rt_debug-5.3.18-150300.106.1.x86_64",
                "product": {
                  "name": "reiserfs-kmp-rt_debug-5.3.18-150300.106.1.x86_64",
                  "product_id": "reiserfs-kmp-rt_debug-5.3.18-150300.106.1.x86_64"
                }
              }
            ],
            "category": "architecture",
            "name": "x86_64"
          },
          {
            "branches": [
              {
                "category": "product_name",
                "name": "SUSE Real Time Module 15 SP3",
                "product": {
                  "name": "SUSE Real Time Module 15 SP3",
                  "product_id": "SUSE Real Time Module 15 SP3",
                  "product_identification_helper": {
                    "cpe": "cpe:/o:suse:sle-module-rt:15:sp3"
                  }
                }
              },
              {
                "category": "product_name",
                "name": "SUSE Linux Enterprise Micro 5.1",
                "product": {
                  "name": "SUSE Linux Enterprise Micro 5.1",
                  "product_id": "SUSE Linux Enterprise Micro 5.1",
                  "product_identification_helper": {
                    "cpe": "cpe:/o:suse:suse-microos:5.1"
                  }
                }
              },
              {
                "category": "product_name",
                "name": "SUSE Linux Enterprise Micro 5.2",
                "product": {
                  "name": "SUSE Linux Enterprise Micro 5.2",
                  "product_id": "SUSE Linux Enterprise Micro 5.2",
                  "product_identification_helper": {
                    "cpe": "cpe:/o:suse:suse-microos:5.2"
                  }
                }
              },
              {
                "category": "product_name",
                "name": "openSUSE Leap Micro 5.2",
                "product": {
                  "name": "openSUSE Leap Micro 5.2",
                  "product_id": "openSUSE Leap Micro 5.2",
                  "product_identification_helper": {
                    "cpe": "cpe:/o:opensuse:leap-micro:5.2"
                  }
                }
              }
            ],
            "category": "product_family",
            "name": "SUSE Linux Enterprise"
          }
        ],
        "category": "vendor",
        "name": "SUSE"
      }
    ],
    "relationships": [
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "cluster-md-kmp-rt-5.3.18-150300.106.1.x86_64 as component of SUSE Real Time Module 15 SP3",
          "product_id": "SUSE Real Time Module 15 SP3:cluster-md-kmp-rt-5.3.18-150300.106.1.x86_64"
        },
        "product_reference": "cluster-md-kmp-rt-5.3.18-150300.106.1.x86_64",
        "relates_to_product_reference": "SUSE Real Time Module 15 SP3"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "dlm-kmp-rt-5.3.18-150300.106.1.x86_64 as component of SUSE Real Time Module 15 SP3",
          "product_id": "SUSE Real Time Module 15 SP3:dlm-kmp-rt-5.3.18-150300.106.1.x86_64"
        },
        "product_reference": "dlm-kmp-rt-5.3.18-150300.106.1.x86_64",
        "relates_to_product_reference": "SUSE Real Time Module 15 SP3"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "gfs2-kmp-rt-5.3.18-150300.106.1.x86_64 as component of SUSE Real Time Module 15 SP3",
          "product_id": "SUSE Real Time Module 15 SP3:gfs2-kmp-rt-5.3.18-150300.106.1.x86_64"
        },
        "product_reference": "gfs2-kmp-rt-5.3.18-150300.106.1.x86_64",
        "relates_to_product_reference": "SUSE Real Time Module 15 SP3"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-devel-rt-5.3.18-150300.106.1.noarch as component of SUSE Real Time Module 15 SP3",
          "product_id": "SUSE Real Time Module 15 SP3:kernel-devel-rt-5.3.18-150300.106.1.noarch"
        },
        "product_reference": "kernel-devel-rt-5.3.18-150300.106.1.noarch",
        "relates_to_product_reference": "SUSE Real Time Module 15 SP3"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-rt-5.3.18-150300.106.1.x86_64 as component of SUSE Real Time Module 15 SP3",
          "product_id": "SUSE Real Time Module 15 SP3:kernel-rt-5.3.18-150300.106.1.x86_64"
        },
        "product_reference": "kernel-rt-5.3.18-150300.106.1.x86_64",
        "relates_to_product_reference": "SUSE Real Time Module 15 SP3"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-rt-devel-5.3.18-150300.106.1.x86_64 as component of SUSE Real Time Module 15 SP3",
          "product_id": "SUSE Real Time Module 15 SP3:kernel-rt-devel-5.3.18-150300.106.1.x86_64"
        },
        "product_reference": "kernel-rt-devel-5.3.18-150300.106.1.x86_64",
        "relates_to_product_reference": "SUSE Real Time Module 15 SP3"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-rt_debug-devel-5.3.18-150300.106.1.x86_64 as component of SUSE Real Time Module 15 SP3",
          "product_id": "SUSE Real Time Module 15 SP3:kernel-rt_debug-devel-5.3.18-150300.106.1.x86_64"
        },
        "product_reference": "kernel-rt_debug-devel-5.3.18-150300.106.1.x86_64",
        "relates_to_product_reference": "SUSE Real Time Module 15 SP3"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-source-rt-5.3.18-150300.106.1.noarch as component of SUSE Real Time Module 15 SP3",
          "product_id": "SUSE Real Time Module 15 SP3:kernel-source-rt-5.3.18-150300.106.1.noarch"
        },
        "product_reference": "kernel-source-rt-5.3.18-150300.106.1.noarch",
        "relates_to_product_reference": "SUSE Real Time Module 15 SP3"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-syms-rt-5.3.18-150300.106.1.x86_64 as component of SUSE Real Time Module 15 SP3",
          "product_id": "SUSE Real Time Module 15 SP3:kernel-syms-rt-5.3.18-150300.106.1.x86_64"
        },
        "product_reference": "kernel-syms-rt-5.3.18-150300.106.1.x86_64",
        "relates_to_product_reference": "SUSE Real Time Module 15 SP3"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "ocfs2-kmp-rt-5.3.18-150300.106.1.x86_64 as component of SUSE Real Time Module 15 SP3",
          "product_id": "SUSE Real Time Module 15 SP3:ocfs2-kmp-rt-5.3.18-150300.106.1.x86_64"
        },
        "product_reference": "ocfs2-kmp-rt-5.3.18-150300.106.1.x86_64",
        "relates_to_product_reference": "SUSE Real Time Module 15 SP3"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-rt-5.3.18-150300.106.1.x86_64 as component of SUSE Linux Enterprise Micro 5.1",
          "product_id": "SUSE Linux Enterprise Micro 5.1:kernel-rt-5.3.18-150300.106.1.x86_64"
        },
        "product_reference": "kernel-rt-5.3.18-150300.106.1.x86_64",
        "relates_to_product_reference": "SUSE Linux Enterprise Micro 5.1"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-rt-5.3.18-150300.106.1.x86_64 as component of SUSE Linux Enterprise Micro 5.2",
          "product_id": "SUSE Linux Enterprise Micro 5.2:kernel-rt-5.3.18-150300.106.1.x86_64"
        },
        "product_reference": "kernel-rt-5.3.18-150300.106.1.x86_64",
        "relates_to_product_reference": "SUSE Linux Enterprise Micro 5.2"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-rt-5.3.18-150300.106.1.x86_64 as component of openSUSE Leap Micro 5.2",
          "product_id": "openSUSE Leap Micro 5.2:kernel-rt-5.3.18-150300.106.1.x86_64"
        },
        "product_reference": "kernel-rt-5.3.18-150300.106.1.x86_64",
        "relates_to_product_reference": "openSUSE Leap Micro 5.2"
      }
    ]
  },
  "vulnerabilities": [
    {
      "cve": "CVE-2016-3695",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2016-3695"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "The einj_error_inject function in drivers/acpi/apei/einj.c in the Linux kernel allows local users to simulate hardware errors and consequently cause a denial of service by leveraging failure to disable APEI error injection through EINJ when securelevel is set.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "SUSE Linux Enterprise Micro 5.1:kernel-rt-5.3.18-150300.106.1.x86_64",
          "SUSE Linux Enterprise Micro 5.2:kernel-rt-5.3.18-150300.106.1.x86_64",
          "SUSE Real Time Module 15 SP3:cluster-md-kmp-rt-5.3.18-150300.106.1.x86_64",
          "SUSE Real Time Module 15 SP3:dlm-kmp-rt-5.3.18-150300.106.1.x86_64",
          "SUSE Real Time Module 15 SP3:gfs2-kmp-rt-5.3.18-150300.106.1.x86_64",
          "SUSE Real Time Module 15 SP3:kernel-devel-rt-5.3.18-150300.106.1.noarch",
          "SUSE Real Time Module 15 SP3:kernel-rt-5.3.18-150300.106.1.x86_64",
          "SUSE Real Time Module 15 SP3:kernel-rt-devel-5.3.18-150300.106.1.x86_64",
          "SUSE Real Time Module 15 SP3:kernel-rt_debug-devel-5.3.18-150300.106.1.x86_64",
          "SUSE Real Time Module 15 SP3:kernel-source-rt-5.3.18-150300.106.1.noarch",
          "SUSE Real Time Module 15 SP3:kernel-syms-rt-5.3.18-150300.106.1.x86_64",
          "SUSE Real Time Module 15 SP3:ocfs2-kmp-rt-5.3.18-150300.106.1.x86_64",
          "openSUSE Leap Micro 5.2:kernel-rt-5.3.18-150300.106.1.x86_64"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2016-3695",
          "url": "https://www.suse.com/security/cve/CVE-2016-3695"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1023051 for CVE-2016-3695",
          "url": "https://bugzilla.suse.com/1023051"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "SUSE Linux Enterprise Micro 5.1:kernel-rt-5.3.18-150300.106.1.x86_64",
            "SUSE Linux Enterprise Micro 5.2:kernel-rt-5.3.18-150300.106.1.x86_64",
            "SUSE Real Time Module 15 SP3:cluster-md-kmp-rt-5.3.18-150300.106.1.x86_64",
            "SUSE Real Time Module 15 SP3:dlm-kmp-rt-5.3.18-150300.106.1.x86_64",
            "SUSE Real Time Module 15 SP3:gfs2-kmp-rt-5.3.18-150300.106.1.x86_64",
            "SUSE Real Time Module 15 SP3:kernel-devel-rt-5.3.18-150300.106.1.noarch",
            "SUSE Real Time Module 15 SP3:kernel-rt-5.3.18-150300.106.1.x86_64",
            "SUSE Real Time Module 15 SP3:kernel-rt-devel-5.3.18-150300.106.1.x86_64",
            "SUSE Real Time Module 15 SP3:kernel-rt_debug-devel-5.3.18-150300.106.1.x86_64",
            "SUSE Real Time Module 15 SP3:kernel-source-rt-5.3.18-150300.106.1.noarch",
            "SUSE Real Time Module 15 SP3:kernel-syms-rt-5.3.18-150300.106.1.x86_64",
            "SUSE Real Time Module 15 SP3:ocfs2-kmp-rt-5.3.18-150300.106.1.x86_64",
            "openSUSE Leap Micro 5.2:kernel-rt-5.3.18-150300.106.1.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 2.2,
            "baseSeverity": "LOW",
            "vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:R/S:U/C:N/I:N/A:L",
            "version": "3.1"
          },
          "products": [
            "SUSE Linux Enterprise Micro 5.1:kernel-rt-5.3.18-150300.106.1.x86_64",
            "SUSE Linux Enterprise Micro 5.2:kernel-rt-5.3.18-150300.106.1.x86_64",
            "SUSE Real Time Module 15 SP3:cluster-md-kmp-rt-5.3.18-150300.106.1.x86_64",
            "SUSE Real Time Module 15 SP3:dlm-kmp-rt-5.3.18-150300.106.1.x86_64",
            "SUSE Real Time Module 15 SP3:gfs2-kmp-rt-5.3.18-150300.106.1.x86_64",
            "SUSE Real Time Module 15 SP3:kernel-devel-rt-5.3.18-150300.106.1.noarch",
            "SUSE Real Time Module 15 SP3:kernel-rt-5.3.18-150300.106.1.x86_64",
            "SUSE Real Time Module 15 SP3:kernel-rt-devel-5.3.18-150300.106.1.x86_64",
            "SUSE Real Time Module 15 SP3:kernel-rt_debug-devel-5.3.18-150300.106.1.x86_64",
            "SUSE Real Time Module 15 SP3:kernel-source-rt-5.3.18-150300.106.1.noarch",
            "SUSE Real Time Module 15 SP3:kernel-syms-rt-5.3.18-150300.106.1.x86_64",
            "SUSE Real Time Module 15 SP3:ocfs2-kmp-rt-5.3.18-150300.106.1.x86_64",
            "openSUSE Leap Micro 5.2:kernel-rt-5.3.18-150300.106.1.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2022-10-31T08:28:31Z",
          "details": "low"
        }
      ],
      "title": "CVE-2016-3695"
    },
    {
      "cve": "CVE-2020-16119",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2020-16119"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "Use-after-free vulnerability in the Linux kernel exploitable by a local attacker due to reuse of a DCCP socket with an attached dccps_hc_tx_ccid object as a listener after being released. Fixed in Ubuntu Linux kernel 5.4.0-51.56, 5.3.0-68.63, 4.15.0-121.123, 4.4.0-193.224, 3.13.0.182.191 and 3.2.0-149.196.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "SUSE Linux Enterprise Micro 5.1:kernel-rt-5.3.18-150300.106.1.x86_64",
          "SUSE Linux Enterprise Micro 5.2:kernel-rt-5.3.18-150300.106.1.x86_64",
          "SUSE Real Time Module 15 SP3:cluster-md-kmp-rt-5.3.18-150300.106.1.x86_64",
          "SUSE Real Time Module 15 SP3:dlm-kmp-rt-5.3.18-150300.106.1.x86_64",
          "SUSE Real Time Module 15 SP3:gfs2-kmp-rt-5.3.18-150300.106.1.x86_64",
          "SUSE Real Time Module 15 SP3:kernel-devel-rt-5.3.18-150300.106.1.noarch",
          "SUSE Real Time Module 15 SP3:kernel-rt-5.3.18-150300.106.1.x86_64",
          "SUSE Real Time Module 15 SP3:kernel-rt-devel-5.3.18-150300.106.1.x86_64",
          "SUSE Real Time Module 15 SP3:kernel-rt_debug-devel-5.3.18-150300.106.1.x86_64",
          "SUSE Real Time Module 15 SP3:kernel-source-rt-5.3.18-150300.106.1.noarch",
          "SUSE Real Time Module 15 SP3:kernel-syms-rt-5.3.18-150300.106.1.x86_64",
          "SUSE Real Time Module 15 SP3:ocfs2-kmp-rt-5.3.18-150300.106.1.x86_64",
          "openSUSE Leap Micro 5.2:kernel-rt-5.3.18-150300.106.1.x86_64"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2020-16119",
          "url": "https://www.suse.com/security/cve/CVE-2020-16119"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1177471 for CVE-2020-16119",
          "url": "https://bugzilla.suse.com/1177471"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1177742 for CVE-2020-16119",
          "url": "https://bugzilla.suse.com/1177742"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "SUSE Linux Enterprise Micro 5.1:kernel-rt-5.3.18-150300.106.1.x86_64",
            "SUSE Linux Enterprise Micro 5.2:kernel-rt-5.3.18-150300.106.1.x86_64",
            "SUSE Real Time Module 15 SP3:cluster-md-kmp-rt-5.3.18-150300.106.1.x86_64",
            "SUSE Real Time Module 15 SP3:dlm-kmp-rt-5.3.18-150300.106.1.x86_64",
            "SUSE Real Time Module 15 SP3:gfs2-kmp-rt-5.3.18-150300.106.1.x86_64",
            "SUSE Real Time Module 15 SP3:kernel-devel-rt-5.3.18-150300.106.1.noarch",
            "SUSE Real Time Module 15 SP3:kernel-rt-5.3.18-150300.106.1.x86_64",
            "SUSE Real Time Module 15 SP3:kernel-rt-devel-5.3.18-150300.106.1.x86_64",
            "SUSE Real Time Module 15 SP3:kernel-rt_debug-devel-5.3.18-150300.106.1.x86_64",
            "SUSE Real Time Module 15 SP3:kernel-source-rt-5.3.18-150300.106.1.noarch",
            "SUSE Real Time Module 15 SP3:kernel-syms-rt-5.3.18-150300.106.1.x86_64",
            "SUSE Real Time Module 15 SP3:ocfs2-kmp-rt-5.3.18-150300.106.1.x86_64",
            "openSUSE Leap Micro 5.2:kernel-rt-5.3.18-150300.106.1.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 7.8,
            "baseSeverity": "HIGH",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
            "version": "3.1"
          },
          "products": [
            "SUSE Linux Enterprise Micro 5.1:kernel-rt-5.3.18-150300.106.1.x86_64",
            "SUSE Linux Enterprise Micro 5.2:kernel-rt-5.3.18-150300.106.1.x86_64",
            "SUSE Real Time Module 15 SP3:cluster-md-kmp-rt-5.3.18-150300.106.1.x86_64",
            "SUSE Real Time Module 15 SP3:dlm-kmp-rt-5.3.18-150300.106.1.x86_64",
            "SUSE Real Time Module 15 SP3:gfs2-kmp-rt-5.3.18-150300.106.1.x86_64",
            "SUSE Real Time Module 15 SP3:kernel-devel-rt-5.3.18-150300.106.1.noarch",
            "SUSE Real Time Module 15 SP3:kernel-rt-5.3.18-150300.106.1.x86_64",
            "SUSE Real Time Module 15 SP3:kernel-rt-devel-5.3.18-150300.106.1.x86_64",
            "SUSE Real Time Module 15 SP3:kernel-rt_debug-devel-5.3.18-150300.106.1.x86_64",
            "SUSE Real Time Module 15 SP3:kernel-source-rt-5.3.18-150300.106.1.noarch",
            "SUSE Real Time Module 15 SP3:kernel-syms-rt-5.3.18-150300.106.1.x86_64",
            "SUSE Real Time Module 15 SP3:ocfs2-kmp-rt-5.3.18-150300.106.1.x86_64",
            "openSUSE Leap Micro 5.2:kernel-rt-5.3.18-150300.106.1.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2022-10-31T08:28:31Z",
          "details": "important"
        }
      ],
      "title": "CVE-2020-16119"
    },
    {
      "cve": "CVE-2020-27784",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2020-27784"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "A vulnerability was found in the Linux kernel, where accessing a deallocated instance in printer_ioctl() printer_ioctl() tries to access of a printer_dev instance. However, use-after-free arises because it had been freed by gprinter_free().",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "SUSE Linux Enterprise Micro 5.1:kernel-rt-5.3.18-150300.106.1.x86_64",
          "SUSE Linux Enterprise Micro 5.2:kernel-rt-5.3.18-150300.106.1.x86_64",
          "SUSE Real Time Module 15 SP3:cluster-md-kmp-rt-5.3.18-150300.106.1.x86_64",
          "SUSE Real Time Module 15 SP3:dlm-kmp-rt-5.3.18-150300.106.1.x86_64",
          "SUSE Real Time Module 15 SP3:gfs2-kmp-rt-5.3.18-150300.106.1.x86_64",
          "SUSE Real Time Module 15 SP3:kernel-devel-rt-5.3.18-150300.106.1.noarch",
          "SUSE Real Time Module 15 SP3:kernel-rt-5.3.18-150300.106.1.x86_64",
          "SUSE Real Time Module 15 SP3:kernel-rt-devel-5.3.18-150300.106.1.x86_64",
          "SUSE Real Time Module 15 SP3:kernel-rt_debug-devel-5.3.18-150300.106.1.x86_64",
          "SUSE Real Time Module 15 SP3:kernel-source-rt-5.3.18-150300.106.1.noarch",
          "SUSE Real Time Module 15 SP3:kernel-syms-rt-5.3.18-150300.106.1.x86_64",
          "SUSE Real Time Module 15 SP3:ocfs2-kmp-rt-5.3.18-150300.106.1.x86_64",
          "openSUSE Leap Micro 5.2:kernel-rt-5.3.18-150300.106.1.x86_64"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2020-27784",
          "url": "https://www.suse.com/security/cve/CVE-2020-27784"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1202895 for CVE-2020-27784",
          "url": "https://bugzilla.suse.com/1202895"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "SUSE Linux Enterprise Micro 5.1:kernel-rt-5.3.18-150300.106.1.x86_64",
            "SUSE Linux Enterprise Micro 5.2:kernel-rt-5.3.18-150300.106.1.x86_64",
            "SUSE Real Time Module 15 SP3:cluster-md-kmp-rt-5.3.18-150300.106.1.x86_64",
            "SUSE Real Time Module 15 SP3:dlm-kmp-rt-5.3.18-150300.106.1.x86_64",
            "SUSE Real Time Module 15 SP3:gfs2-kmp-rt-5.3.18-150300.106.1.x86_64",
            "SUSE Real Time Module 15 SP3:kernel-devel-rt-5.3.18-150300.106.1.noarch",
            "SUSE Real Time Module 15 SP3:kernel-rt-5.3.18-150300.106.1.x86_64",
            "SUSE Real Time Module 15 SP3:kernel-rt-devel-5.3.18-150300.106.1.x86_64",
            "SUSE Real Time Module 15 SP3:kernel-rt_debug-devel-5.3.18-150300.106.1.x86_64",
            "SUSE Real Time Module 15 SP3:kernel-source-rt-5.3.18-150300.106.1.noarch",
            "SUSE Real Time Module 15 SP3:kernel-syms-rt-5.3.18-150300.106.1.x86_64",
            "SUSE Real Time Module 15 SP3:ocfs2-kmp-rt-5.3.18-150300.106.1.x86_64",
            "openSUSE Leap Micro 5.2:kernel-rt-5.3.18-150300.106.1.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 4,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:L/AC:H/PR:H/UI:R/S:U/C:N/I:N/A:H",
            "version": "3.1"
          },
          "products": [
            "SUSE Linux Enterprise Micro 5.1:kernel-rt-5.3.18-150300.106.1.x86_64",
            "SUSE Linux Enterprise Micro 5.2:kernel-rt-5.3.18-150300.106.1.x86_64",
            "SUSE Real Time Module 15 SP3:cluster-md-kmp-rt-5.3.18-150300.106.1.x86_64",
            "SUSE Real Time Module 15 SP3:dlm-kmp-rt-5.3.18-150300.106.1.x86_64",
            "SUSE Real Time Module 15 SP3:gfs2-kmp-rt-5.3.18-150300.106.1.x86_64",
            "SUSE Real Time Module 15 SP3:kernel-devel-rt-5.3.18-150300.106.1.noarch",
            "SUSE Real Time Module 15 SP3:kernel-rt-5.3.18-150300.106.1.x86_64",
            "SUSE Real Time Module 15 SP3:kernel-rt-devel-5.3.18-150300.106.1.x86_64",
            "SUSE Real Time Module 15 SP3:kernel-rt_debug-devel-5.3.18-150300.106.1.x86_64",
            "SUSE Real Time Module 15 SP3:kernel-source-rt-5.3.18-150300.106.1.noarch",
            "SUSE Real Time Module 15 SP3:kernel-syms-rt-5.3.18-150300.106.1.x86_64",
            "SUSE Real Time Module 15 SP3:ocfs2-kmp-rt-5.3.18-150300.106.1.x86_64",
            "openSUSE Leap Micro 5.2:kernel-rt-5.3.18-150300.106.1.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2022-10-31T08:28:31Z",
          "details": "low"
        }
      ],
      "title": "CVE-2020-27784"
    },
    {
      "cve": "CVE-2021-4155",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2021-4155"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "A data leak flaw was found in the way XFS_IOC_ALLOCSP IOCTL in the XFS filesystem allowed for size increase of files with unaligned size. A local attacker could use this flaw to leak data on the XFS filesystem otherwise not accessible to them.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "SUSE Linux Enterprise Micro 5.1:kernel-rt-5.3.18-150300.106.1.x86_64",
          "SUSE Linux Enterprise Micro 5.2:kernel-rt-5.3.18-150300.106.1.x86_64",
          "SUSE Real Time Module 15 SP3:cluster-md-kmp-rt-5.3.18-150300.106.1.x86_64",
          "SUSE Real Time Module 15 SP3:dlm-kmp-rt-5.3.18-150300.106.1.x86_64",
          "SUSE Real Time Module 15 SP3:gfs2-kmp-rt-5.3.18-150300.106.1.x86_64",
          "SUSE Real Time Module 15 SP3:kernel-devel-rt-5.3.18-150300.106.1.noarch",
          "SUSE Real Time Module 15 SP3:kernel-rt-5.3.18-150300.106.1.x86_64",
          "SUSE Real Time Module 15 SP3:kernel-rt-devel-5.3.18-150300.106.1.x86_64",
          "SUSE Real Time Module 15 SP3:kernel-rt_debug-devel-5.3.18-150300.106.1.x86_64",
          "SUSE Real Time Module 15 SP3:kernel-source-rt-5.3.18-150300.106.1.noarch",
          "SUSE Real Time Module 15 SP3:kernel-syms-rt-5.3.18-150300.106.1.x86_64",
          "SUSE Real Time Module 15 SP3:ocfs2-kmp-rt-5.3.18-150300.106.1.x86_64",
          "openSUSE Leap Micro 5.2:kernel-rt-5.3.18-150300.106.1.x86_64"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2021-4155",
          "url": "https://www.suse.com/security/cve/CVE-2021-4155"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1194272 for CVE-2021-4155",
          "url": "https://bugzilla.suse.com/1194272"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1199255 for CVE-2021-4155",
          "url": "https://bugzilla.suse.com/1199255"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1200084 for CVE-2021-4155",
          "url": "https://bugzilla.suse.com/1200084"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "SUSE Linux Enterprise Micro 5.1:kernel-rt-5.3.18-150300.106.1.x86_64",
            "SUSE Linux Enterprise Micro 5.2:kernel-rt-5.3.18-150300.106.1.x86_64",
            "SUSE Real Time Module 15 SP3:cluster-md-kmp-rt-5.3.18-150300.106.1.x86_64",
            "SUSE Real Time Module 15 SP3:dlm-kmp-rt-5.3.18-150300.106.1.x86_64",
            "SUSE Real Time Module 15 SP3:gfs2-kmp-rt-5.3.18-150300.106.1.x86_64",
            "SUSE Real Time Module 15 SP3:kernel-devel-rt-5.3.18-150300.106.1.noarch",
            "SUSE Real Time Module 15 SP3:kernel-rt-5.3.18-150300.106.1.x86_64",
            "SUSE Real Time Module 15 SP3:kernel-rt-devel-5.3.18-150300.106.1.x86_64",
            "SUSE Real Time Module 15 SP3:kernel-rt_debug-devel-5.3.18-150300.106.1.x86_64",
            "SUSE Real Time Module 15 SP3:kernel-source-rt-5.3.18-150300.106.1.noarch",
            "SUSE Real Time Module 15 SP3:kernel-syms-rt-5.3.18-150300.106.1.x86_64",
            "SUSE Real Time Module 15 SP3:ocfs2-kmp-rt-5.3.18-150300.106.1.x86_64",
            "openSUSE Leap Micro 5.2:kernel-rt-5.3.18-150300.106.1.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 5.5,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N",
            "version": "3.1"
          },
          "products": [
            "SUSE Linux Enterprise Micro 5.1:kernel-rt-5.3.18-150300.106.1.x86_64",
            "SUSE Linux Enterprise Micro 5.2:kernel-rt-5.3.18-150300.106.1.x86_64",
            "SUSE Real Time Module 15 SP3:cluster-md-kmp-rt-5.3.18-150300.106.1.x86_64",
            "SUSE Real Time Module 15 SP3:dlm-kmp-rt-5.3.18-150300.106.1.x86_64",
            "SUSE Real Time Module 15 SP3:gfs2-kmp-rt-5.3.18-150300.106.1.x86_64",
            "SUSE Real Time Module 15 SP3:kernel-devel-rt-5.3.18-150300.106.1.noarch",
            "SUSE Real Time Module 15 SP3:kernel-rt-5.3.18-150300.106.1.x86_64",
            "SUSE Real Time Module 15 SP3:kernel-rt-devel-5.3.18-150300.106.1.x86_64",
            "SUSE Real Time Module 15 SP3:kernel-rt_debug-devel-5.3.18-150300.106.1.x86_64",
            "SUSE Real Time Module 15 SP3:kernel-source-rt-5.3.18-150300.106.1.noarch",
            "SUSE Real Time Module 15 SP3:kernel-syms-rt-5.3.18-150300.106.1.x86_64",
            "SUSE Real Time Module 15 SP3:ocfs2-kmp-rt-5.3.18-150300.106.1.x86_64",
            "openSUSE Leap Micro 5.2:kernel-rt-5.3.18-150300.106.1.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2022-10-31T08:28:31Z",
          "details": "moderate"
        }
      ],
      "title": "CVE-2021-4155"
    },
    {
      "cve": "CVE-2021-4203",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2021-4203"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "A use-after-free read flaw was found in sock_getsockopt() in net/core/sock.c due to SO_PEERCRED and SO_PEERGROUPS race with listen() (and connect()) in the Linux kernel. In this flaw, an attacker with a user privileges may crash the system or leak internal kernel information.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "SUSE Linux Enterprise Micro 5.1:kernel-rt-5.3.18-150300.106.1.x86_64",
          "SUSE Linux Enterprise Micro 5.2:kernel-rt-5.3.18-150300.106.1.x86_64",
          "SUSE Real Time Module 15 SP3:cluster-md-kmp-rt-5.3.18-150300.106.1.x86_64",
          "SUSE Real Time Module 15 SP3:dlm-kmp-rt-5.3.18-150300.106.1.x86_64",
          "SUSE Real Time Module 15 SP3:gfs2-kmp-rt-5.3.18-150300.106.1.x86_64",
          "SUSE Real Time Module 15 SP3:kernel-devel-rt-5.3.18-150300.106.1.noarch",
          "SUSE Real Time Module 15 SP3:kernel-rt-5.3.18-150300.106.1.x86_64",
          "SUSE Real Time Module 15 SP3:kernel-rt-devel-5.3.18-150300.106.1.x86_64",
          "SUSE Real Time Module 15 SP3:kernel-rt_debug-devel-5.3.18-150300.106.1.x86_64",
          "SUSE Real Time Module 15 SP3:kernel-source-rt-5.3.18-150300.106.1.noarch",
          "SUSE Real Time Module 15 SP3:kernel-syms-rt-5.3.18-150300.106.1.x86_64",
          "SUSE Real Time Module 15 SP3:ocfs2-kmp-rt-5.3.18-150300.106.1.x86_64",
          "openSUSE Leap Micro 5.2:kernel-rt-5.3.18-150300.106.1.x86_64"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2021-4203",
          "url": "https://www.suse.com/security/cve/CVE-2021-4203"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1194535 for CVE-2021-4203",
          "url": "https://bugzilla.suse.com/1194535"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "SUSE Linux Enterprise Micro 5.1:kernel-rt-5.3.18-150300.106.1.x86_64",
            "SUSE Linux Enterprise Micro 5.2:kernel-rt-5.3.18-150300.106.1.x86_64",
            "SUSE Real Time Module 15 SP3:cluster-md-kmp-rt-5.3.18-150300.106.1.x86_64",
            "SUSE Real Time Module 15 SP3:dlm-kmp-rt-5.3.18-150300.106.1.x86_64",
            "SUSE Real Time Module 15 SP3:gfs2-kmp-rt-5.3.18-150300.106.1.x86_64",
            "SUSE Real Time Module 15 SP3:kernel-devel-rt-5.3.18-150300.106.1.noarch",
            "SUSE Real Time Module 15 SP3:kernel-rt-5.3.18-150300.106.1.x86_64",
            "SUSE Real Time Module 15 SP3:kernel-rt-devel-5.3.18-150300.106.1.x86_64",
            "SUSE Real Time Module 15 SP3:kernel-rt_debug-devel-5.3.18-150300.106.1.x86_64",
            "SUSE Real Time Module 15 SP3:kernel-source-rt-5.3.18-150300.106.1.noarch",
            "SUSE Real Time Module 15 SP3:kernel-syms-rt-5.3.18-150300.106.1.x86_64",
            "SUSE Real Time Module 15 SP3:ocfs2-kmp-rt-5.3.18-150300.106.1.x86_64",
            "openSUSE Leap Micro 5.2:kernel-rt-5.3.18-150300.106.1.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 5.8,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:L/A:L",
            "version": "3.1"
          },
          "products": [
            "SUSE Linux Enterprise Micro 5.1:kernel-rt-5.3.18-150300.106.1.x86_64",
            "SUSE Linux Enterprise Micro 5.2:kernel-rt-5.3.18-150300.106.1.x86_64",
            "SUSE Real Time Module 15 SP3:cluster-md-kmp-rt-5.3.18-150300.106.1.x86_64",
            "SUSE Real Time Module 15 SP3:dlm-kmp-rt-5.3.18-150300.106.1.x86_64",
            "SUSE Real Time Module 15 SP3:gfs2-kmp-rt-5.3.18-150300.106.1.x86_64",
            "SUSE Real Time Module 15 SP3:kernel-devel-rt-5.3.18-150300.106.1.noarch",
            "SUSE Real Time Module 15 SP3:kernel-rt-5.3.18-150300.106.1.x86_64",
            "SUSE Real Time Module 15 SP3:kernel-rt-devel-5.3.18-150300.106.1.x86_64",
            "SUSE Real Time Module 15 SP3:kernel-rt_debug-devel-5.3.18-150300.106.1.x86_64",
            "SUSE Real Time Module 15 SP3:kernel-source-rt-5.3.18-150300.106.1.noarch",
            "SUSE Real Time Module 15 SP3:kernel-syms-rt-5.3.18-150300.106.1.x86_64",
            "SUSE Real Time Module 15 SP3:ocfs2-kmp-rt-5.3.18-150300.106.1.x86_64",
            "openSUSE Leap Micro 5.2:kernel-rt-5.3.18-150300.106.1.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2022-10-31T08:28:31Z",
          "details": "moderate"
        }
      ],
      "title": "CVE-2021-4203"
    },
    {
      "cve": "CVE-2022-20368",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2022-20368"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "Product: AndroidVersions: Android kernelAndroid ID: A-224546354References: Upstream kernel",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "SUSE Linux Enterprise Micro 5.1:kernel-rt-5.3.18-150300.106.1.x86_64",
          "SUSE Linux Enterprise Micro 5.2:kernel-rt-5.3.18-150300.106.1.x86_64",
          "SUSE Real Time Module 15 SP3:cluster-md-kmp-rt-5.3.18-150300.106.1.x86_64",
          "SUSE Real Time Module 15 SP3:dlm-kmp-rt-5.3.18-150300.106.1.x86_64",
          "SUSE Real Time Module 15 SP3:gfs2-kmp-rt-5.3.18-150300.106.1.x86_64",
          "SUSE Real Time Module 15 SP3:kernel-devel-rt-5.3.18-150300.106.1.noarch",
          "SUSE Real Time Module 15 SP3:kernel-rt-5.3.18-150300.106.1.x86_64",
          "SUSE Real Time Module 15 SP3:kernel-rt-devel-5.3.18-150300.106.1.x86_64",
          "SUSE Real Time Module 15 SP3:kernel-rt_debug-devel-5.3.18-150300.106.1.x86_64",
          "SUSE Real Time Module 15 SP3:kernel-source-rt-5.3.18-150300.106.1.noarch",
          "SUSE Real Time Module 15 SP3:kernel-syms-rt-5.3.18-150300.106.1.x86_64",
          "SUSE Real Time Module 15 SP3:ocfs2-kmp-rt-5.3.18-150300.106.1.x86_64",
          "openSUSE Leap Micro 5.2:kernel-rt-5.3.18-150300.106.1.x86_64"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2022-20368",
          "url": "https://www.suse.com/security/cve/CVE-2022-20368"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1202346 for CVE-2022-20368",
          "url": "https://bugzilla.suse.com/1202346"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1212311 for CVE-2022-20368",
          "url": "https://bugzilla.suse.com/1212311"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "SUSE Linux Enterprise Micro 5.1:kernel-rt-5.3.18-150300.106.1.x86_64",
            "SUSE Linux Enterprise Micro 5.2:kernel-rt-5.3.18-150300.106.1.x86_64",
            "SUSE Real Time Module 15 SP3:cluster-md-kmp-rt-5.3.18-150300.106.1.x86_64",
            "SUSE Real Time Module 15 SP3:dlm-kmp-rt-5.3.18-150300.106.1.x86_64",
            "SUSE Real Time Module 15 SP3:gfs2-kmp-rt-5.3.18-150300.106.1.x86_64",
            "SUSE Real Time Module 15 SP3:kernel-devel-rt-5.3.18-150300.106.1.noarch",
            "SUSE Real Time Module 15 SP3:kernel-rt-5.3.18-150300.106.1.x86_64",
            "SUSE Real Time Module 15 SP3:kernel-rt-devel-5.3.18-150300.106.1.x86_64",
            "SUSE Real Time Module 15 SP3:kernel-rt_debug-devel-5.3.18-150300.106.1.x86_64",
            "SUSE Real Time Module 15 SP3:kernel-source-rt-5.3.18-150300.106.1.noarch",
            "SUSE Real Time Module 15 SP3:kernel-syms-rt-5.3.18-150300.106.1.x86_64",
            "SUSE Real Time Module 15 SP3:ocfs2-kmp-rt-5.3.18-150300.106.1.x86_64",
            "openSUSE Leap Micro 5.2:kernel-rt-5.3.18-150300.106.1.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 5.5,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
            "version": "3.1"
          },
          "products": [
            "SUSE Linux Enterprise Micro 5.1:kernel-rt-5.3.18-150300.106.1.x86_64",
            "SUSE Linux Enterprise Micro 5.2:kernel-rt-5.3.18-150300.106.1.x86_64",
            "SUSE Real Time Module 15 SP3:cluster-md-kmp-rt-5.3.18-150300.106.1.x86_64",
            "SUSE Real Time Module 15 SP3:dlm-kmp-rt-5.3.18-150300.106.1.x86_64",
            "SUSE Real Time Module 15 SP3:gfs2-kmp-rt-5.3.18-150300.106.1.x86_64",
            "SUSE Real Time Module 15 SP3:kernel-devel-rt-5.3.18-150300.106.1.noarch",
            "SUSE Real Time Module 15 SP3:kernel-rt-5.3.18-150300.106.1.x86_64",
            "SUSE Real Time Module 15 SP3:kernel-rt-devel-5.3.18-150300.106.1.x86_64",
            "SUSE Real Time Module 15 SP3:kernel-rt_debug-devel-5.3.18-150300.106.1.x86_64",
            "SUSE Real Time Module 15 SP3:kernel-source-rt-5.3.18-150300.106.1.noarch",
            "SUSE Real Time Module 15 SP3:kernel-syms-rt-5.3.18-150300.106.1.x86_64",
            "SUSE Real Time Module 15 SP3:ocfs2-kmp-rt-5.3.18-150300.106.1.x86_64",
            "openSUSE Leap Micro 5.2:kernel-rt-5.3.18-150300.106.1.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2022-10-31T08:28:31Z",
          "details": "moderate"
        }
      ],
      "title": "CVE-2022-20368"
    },
    {
      "cve": "CVE-2022-20369",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2022-20369"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "In v4l2_m2m_querybuf of v4l2-mem2mem.c, there is a possible out of bounds write due to improper input validation. This could lead to local escalation of privilege with System execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android kernelAndroid ID: A-223375145References: Upstream kernel",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "SUSE Linux Enterprise Micro 5.1:kernel-rt-5.3.18-150300.106.1.x86_64",
          "SUSE Linux Enterprise Micro 5.2:kernel-rt-5.3.18-150300.106.1.x86_64",
          "SUSE Real Time Module 15 SP3:cluster-md-kmp-rt-5.3.18-150300.106.1.x86_64",
          "SUSE Real Time Module 15 SP3:dlm-kmp-rt-5.3.18-150300.106.1.x86_64",
          "SUSE Real Time Module 15 SP3:gfs2-kmp-rt-5.3.18-150300.106.1.x86_64",
          "SUSE Real Time Module 15 SP3:kernel-devel-rt-5.3.18-150300.106.1.noarch",
          "SUSE Real Time Module 15 SP3:kernel-rt-5.3.18-150300.106.1.x86_64",
          "SUSE Real Time Module 15 SP3:kernel-rt-devel-5.3.18-150300.106.1.x86_64",
          "SUSE Real Time Module 15 SP3:kernel-rt_debug-devel-5.3.18-150300.106.1.x86_64",
          "SUSE Real Time Module 15 SP3:kernel-source-rt-5.3.18-150300.106.1.noarch",
          "SUSE Real Time Module 15 SP3:kernel-syms-rt-5.3.18-150300.106.1.x86_64",
          "SUSE Real Time Module 15 SP3:ocfs2-kmp-rt-5.3.18-150300.106.1.x86_64",
          "openSUSE Leap Micro 5.2:kernel-rt-5.3.18-150300.106.1.x86_64"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2022-20369",
          "url": "https://www.suse.com/security/cve/CVE-2022-20369"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1202347 for CVE-2022-20369",
          "url": "https://bugzilla.suse.com/1202347"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1212321 for CVE-2022-20369",
          "url": "https://bugzilla.suse.com/1212321"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "SUSE Linux Enterprise Micro 5.1:kernel-rt-5.3.18-150300.106.1.x86_64",
            "SUSE Linux Enterprise Micro 5.2:kernel-rt-5.3.18-150300.106.1.x86_64",
            "SUSE Real Time Module 15 SP3:cluster-md-kmp-rt-5.3.18-150300.106.1.x86_64",
            "SUSE Real Time Module 15 SP3:dlm-kmp-rt-5.3.18-150300.106.1.x86_64",
            "SUSE Real Time Module 15 SP3:gfs2-kmp-rt-5.3.18-150300.106.1.x86_64",
            "SUSE Real Time Module 15 SP3:kernel-devel-rt-5.3.18-150300.106.1.noarch",
            "SUSE Real Time Module 15 SP3:kernel-rt-5.3.18-150300.106.1.x86_64",
            "SUSE Real Time Module 15 SP3:kernel-rt-devel-5.3.18-150300.106.1.x86_64",
            "SUSE Real Time Module 15 SP3:kernel-rt_debug-devel-5.3.18-150300.106.1.x86_64",
            "SUSE Real Time Module 15 SP3:kernel-source-rt-5.3.18-150300.106.1.noarch",
            "SUSE Real Time Module 15 SP3:kernel-syms-rt-5.3.18-150300.106.1.x86_64",
            "SUSE Real Time Module 15 SP3:ocfs2-kmp-rt-5.3.18-150300.106.1.x86_64",
            "openSUSE Leap Micro 5.2:kernel-rt-5.3.18-150300.106.1.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 5.5,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
            "version": "3.1"
          },
          "products": [
            "SUSE Linux Enterprise Micro 5.1:kernel-rt-5.3.18-150300.106.1.x86_64",
            "SUSE Linux Enterprise Micro 5.2:kernel-rt-5.3.18-150300.106.1.x86_64",
            "SUSE Real Time Module 15 SP3:cluster-md-kmp-rt-5.3.18-150300.106.1.x86_64",
            "SUSE Real Time Module 15 SP3:dlm-kmp-rt-5.3.18-150300.106.1.x86_64",
            "SUSE Real Time Module 15 SP3:gfs2-kmp-rt-5.3.18-150300.106.1.x86_64",
            "SUSE Real Time Module 15 SP3:kernel-devel-rt-5.3.18-150300.106.1.noarch",
            "SUSE Real Time Module 15 SP3:kernel-rt-5.3.18-150300.106.1.x86_64",
            "SUSE Real Time Module 15 SP3:kernel-rt-devel-5.3.18-150300.106.1.x86_64",
            "SUSE Real Time Module 15 SP3:kernel-rt_debug-devel-5.3.18-150300.106.1.x86_64",
            "SUSE Real Time Module 15 SP3:kernel-source-rt-5.3.18-150300.106.1.noarch",
            "SUSE Real Time Module 15 SP3:kernel-syms-rt-5.3.18-150300.106.1.x86_64",
            "SUSE Real Time Module 15 SP3:ocfs2-kmp-rt-5.3.18-150300.106.1.x86_64",
            "openSUSE Leap Micro 5.2:kernel-rt-5.3.18-150300.106.1.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2022-10-31T08:28:31Z",
          "details": "moderate"
        }
      ],
      "title": "CVE-2022-20369"
    },
    {
      "cve": "CVE-2022-2503",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2022-2503"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "Dm-verity is used for extending root-of-trust to root filesystems. LoadPin builds on this property to restrict module/firmware loads to just the trusted root filesystem. Device-mapper table reloads currently allow users with root privileges to switch out the target with an equivalent dm-linear target and bypass verification till reboot. This allows root to bypass LoadPin and can be used to load untrusted and unverified kernel modules and firmware, which implies arbitrary kernel execution and persistence for peripherals that do not verify firmware updates. We recommend upgrading past commit 4caae58406f8ceb741603eee460d79bacca9b1b5",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "SUSE Linux Enterprise Micro 5.1:kernel-rt-5.3.18-150300.106.1.x86_64",
          "SUSE Linux Enterprise Micro 5.2:kernel-rt-5.3.18-150300.106.1.x86_64",
          "SUSE Real Time Module 15 SP3:cluster-md-kmp-rt-5.3.18-150300.106.1.x86_64",
          "SUSE Real Time Module 15 SP3:dlm-kmp-rt-5.3.18-150300.106.1.x86_64",
          "SUSE Real Time Module 15 SP3:gfs2-kmp-rt-5.3.18-150300.106.1.x86_64",
          "SUSE Real Time Module 15 SP3:kernel-devel-rt-5.3.18-150300.106.1.noarch",
          "SUSE Real Time Module 15 SP3:kernel-rt-5.3.18-150300.106.1.x86_64",
          "SUSE Real Time Module 15 SP3:kernel-rt-devel-5.3.18-150300.106.1.x86_64",
          "SUSE Real Time Module 15 SP3:kernel-rt_debug-devel-5.3.18-150300.106.1.x86_64",
          "SUSE Real Time Module 15 SP3:kernel-source-rt-5.3.18-150300.106.1.noarch",
          "SUSE Real Time Module 15 SP3:kernel-syms-rt-5.3.18-150300.106.1.x86_64",
          "SUSE Real Time Module 15 SP3:ocfs2-kmp-rt-5.3.18-150300.106.1.x86_64",
          "openSUSE Leap Micro 5.2:kernel-rt-5.3.18-150300.106.1.x86_64"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2022-2503",
          "url": "https://www.suse.com/security/cve/CVE-2022-2503"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1202677 for CVE-2022-2503",
          "url": "https://bugzilla.suse.com/1202677"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "SUSE Linux Enterprise Micro 5.1:kernel-rt-5.3.18-150300.106.1.x86_64",
            "SUSE Linux Enterprise Micro 5.2:kernel-rt-5.3.18-150300.106.1.x86_64",
            "SUSE Real Time Module 15 SP3:cluster-md-kmp-rt-5.3.18-150300.106.1.x86_64",
            "SUSE Real Time Module 15 SP3:dlm-kmp-rt-5.3.18-150300.106.1.x86_64",
            "SUSE Real Time Module 15 SP3:gfs2-kmp-rt-5.3.18-150300.106.1.x86_64",
            "SUSE Real Time Module 15 SP3:kernel-devel-rt-5.3.18-150300.106.1.noarch",
            "SUSE Real Time Module 15 SP3:kernel-rt-5.3.18-150300.106.1.x86_64",
            "SUSE Real Time Module 15 SP3:kernel-rt-devel-5.3.18-150300.106.1.x86_64",
            "SUSE Real Time Module 15 SP3:kernel-rt_debug-devel-5.3.18-150300.106.1.x86_64",
            "SUSE Real Time Module 15 SP3:kernel-source-rt-5.3.18-150300.106.1.noarch",
            "SUSE Real Time Module 15 SP3:kernel-syms-rt-5.3.18-150300.106.1.x86_64",
            "SUSE Real Time Module 15 SP3:ocfs2-kmp-rt-5.3.18-150300.106.1.x86_64",
            "openSUSE Leap Micro 5.2:kernel-rt-5.3.18-150300.106.1.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 6.7,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H",
            "version": "3.1"
          },
          "products": [
            "SUSE Linux Enterprise Micro 5.1:kernel-rt-5.3.18-150300.106.1.x86_64",
            "SUSE Linux Enterprise Micro 5.2:kernel-rt-5.3.18-150300.106.1.x86_64",
            "SUSE Real Time Module 15 SP3:cluster-md-kmp-rt-5.3.18-150300.106.1.x86_64",
            "SUSE Real Time Module 15 SP3:dlm-kmp-rt-5.3.18-150300.106.1.x86_64",
            "SUSE Real Time Module 15 SP3:gfs2-kmp-rt-5.3.18-150300.106.1.x86_64",
            "SUSE Real Time Module 15 SP3:kernel-devel-rt-5.3.18-150300.106.1.noarch",
            "SUSE Real Time Module 15 SP3:kernel-rt-5.3.18-150300.106.1.x86_64",
            "SUSE Real Time Module 15 SP3:kernel-rt-devel-5.3.18-150300.106.1.x86_64",
            "SUSE Real Time Module 15 SP3:kernel-rt_debug-devel-5.3.18-150300.106.1.x86_64",
            "SUSE Real Time Module 15 SP3:kernel-source-rt-5.3.18-150300.106.1.noarch",
            "SUSE Real Time Module 15 SP3:kernel-syms-rt-5.3.18-150300.106.1.x86_64",
            "SUSE Real Time Module 15 SP3:ocfs2-kmp-rt-5.3.18-150300.106.1.x86_64",
            "openSUSE Leap Micro 5.2:kernel-rt-5.3.18-150300.106.1.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2022-10-31T08:28:31Z",
          "details": "moderate"
        }
      ],
      "title": "CVE-2022-2503"
    },
    {
      "cve": "CVE-2022-2586",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2022-2586"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "It was discovered that a nft object or expression could reference a nft set on a different nft table, leading to a use-after-free once that table was deleted.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "SUSE Linux Enterprise Micro 5.1:kernel-rt-5.3.18-150300.106.1.x86_64",
          "SUSE Linux Enterprise Micro 5.2:kernel-rt-5.3.18-150300.106.1.x86_64",
          "SUSE Real Time Module 15 SP3:cluster-md-kmp-rt-5.3.18-150300.106.1.x86_64",
          "SUSE Real Time Module 15 SP3:dlm-kmp-rt-5.3.18-150300.106.1.x86_64",
          "SUSE Real Time Module 15 SP3:gfs2-kmp-rt-5.3.18-150300.106.1.x86_64",
          "SUSE Real Time Module 15 SP3:kernel-devel-rt-5.3.18-150300.106.1.noarch",
          "SUSE Real Time Module 15 SP3:kernel-rt-5.3.18-150300.106.1.x86_64",
          "SUSE Real Time Module 15 SP3:kernel-rt-devel-5.3.18-150300.106.1.x86_64",
          "SUSE Real Time Module 15 SP3:kernel-rt_debug-devel-5.3.18-150300.106.1.x86_64",
          "SUSE Real Time Module 15 SP3:kernel-source-rt-5.3.18-150300.106.1.noarch",
          "SUSE Real Time Module 15 SP3:kernel-syms-rt-5.3.18-150300.106.1.x86_64",
          "SUSE Real Time Module 15 SP3:ocfs2-kmp-rt-5.3.18-150300.106.1.x86_64",
          "openSUSE Leap Micro 5.2:kernel-rt-5.3.18-150300.106.1.x86_64"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2022-2586",
          "url": "https://www.suse.com/security/cve/CVE-2022-2586"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1202095 for CVE-2022-2586",
          "url": "https://bugzilla.suse.com/1202095"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1209719 for CVE-2022-2586",
          "url": "https://bugzilla.suse.com/1209719"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "SUSE Linux Enterprise Micro 5.1:kernel-rt-5.3.18-150300.106.1.x86_64",
            "SUSE Linux Enterprise Micro 5.2:kernel-rt-5.3.18-150300.106.1.x86_64",
            "SUSE Real Time Module 15 SP3:cluster-md-kmp-rt-5.3.18-150300.106.1.x86_64",
            "SUSE Real Time Module 15 SP3:dlm-kmp-rt-5.3.18-150300.106.1.x86_64",
            "SUSE Real Time Module 15 SP3:gfs2-kmp-rt-5.3.18-150300.106.1.x86_64",
            "SUSE Real Time Module 15 SP3:kernel-devel-rt-5.3.18-150300.106.1.noarch",
            "SUSE Real Time Module 15 SP3:kernel-rt-5.3.18-150300.106.1.x86_64",
            "SUSE Real Time Module 15 SP3:kernel-rt-devel-5.3.18-150300.106.1.x86_64",
            "SUSE Real Time Module 15 SP3:kernel-rt_debug-devel-5.3.18-150300.106.1.x86_64",
            "SUSE Real Time Module 15 SP3:kernel-source-rt-5.3.18-150300.106.1.noarch",
            "SUSE Real Time Module 15 SP3:kernel-syms-rt-5.3.18-150300.106.1.x86_64",
            "SUSE Real Time Module 15 SP3:ocfs2-kmp-rt-5.3.18-150300.106.1.x86_64",
            "openSUSE Leap Micro 5.2:kernel-rt-5.3.18-150300.106.1.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 6.7,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H",
            "version": "3.1"
          },
          "products": [
            "SUSE Linux Enterprise Micro 5.1:kernel-rt-5.3.18-150300.106.1.x86_64",
            "SUSE Linux Enterprise Micro 5.2:kernel-rt-5.3.18-150300.106.1.x86_64",
            "SUSE Real Time Module 15 SP3:cluster-md-kmp-rt-5.3.18-150300.106.1.x86_64",
            "SUSE Real Time Module 15 SP3:dlm-kmp-rt-5.3.18-150300.106.1.x86_64",
            "SUSE Real Time Module 15 SP3:gfs2-kmp-rt-5.3.18-150300.106.1.x86_64",
            "SUSE Real Time Module 15 SP3:kernel-devel-rt-5.3.18-150300.106.1.noarch",
            "SUSE Real Time Module 15 SP3:kernel-rt-5.3.18-150300.106.1.x86_64",
            "SUSE Real Time Module 15 SP3:kernel-rt-devel-5.3.18-150300.106.1.x86_64",
            "SUSE Real Time Module 15 SP3:kernel-rt_debug-devel-5.3.18-150300.106.1.x86_64",
            "SUSE Real Time Module 15 SP3:kernel-source-rt-5.3.18-150300.106.1.noarch",
            "SUSE Real Time Module 15 SP3:kernel-syms-rt-5.3.18-150300.106.1.x86_64",
            "SUSE Real Time Module 15 SP3:ocfs2-kmp-rt-5.3.18-150300.106.1.x86_64",
            "openSUSE Leap Micro 5.2:kernel-rt-5.3.18-150300.106.1.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2022-10-31T08:28:31Z",
          "details": "moderate"
        }
      ],
      "title": "CVE-2022-2586"
    },
    {
      "cve": "CVE-2022-2588",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2022-2588"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "It was discovered that the cls_route filter implementation in the Linux kernel would not remove an old filter from the hashtable before freeing it if its handle had the value 0.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "SUSE Linux Enterprise Micro 5.1:kernel-rt-5.3.18-150300.106.1.x86_64",
          "SUSE Linux Enterprise Micro 5.2:kernel-rt-5.3.18-150300.106.1.x86_64",
          "SUSE Real Time Module 15 SP3:cluster-md-kmp-rt-5.3.18-150300.106.1.x86_64",
          "SUSE Real Time Module 15 SP3:dlm-kmp-rt-5.3.18-150300.106.1.x86_64",
          "SUSE Real Time Module 15 SP3:gfs2-kmp-rt-5.3.18-150300.106.1.x86_64",
          "SUSE Real Time Module 15 SP3:kernel-devel-rt-5.3.18-150300.106.1.noarch",
          "SUSE Real Time Module 15 SP3:kernel-rt-5.3.18-150300.106.1.x86_64",
          "SUSE Real Time Module 15 SP3:kernel-rt-devel-5.3.18-150300.106.1.x86_64",
          "SUSE Real Time Module 15 SP3:kernel-rt_debug-devel-5.3.18-150300.106.1.x86_64",
          "SUSE Real Time Module 15 SP3:kernel-source-rt-5.3.18-150300.106.1.noarch",
          "SUSE Real Time Module 15 SP3:kernel-syms-rt-5.3.18-150300.106.1.x86_64",
          "SUSE Real Time Module 15 SP3:ocfs2-kmp-rt-5.3.18-150300.106.1.x86_64",
          "openSUSE Leap Micro 5.2:kernel-rt-5.3.18-150300.106.1.x86_64"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2022-2588",
          "url": "https://www.suse.com/security/cve/CVE-2022-2588"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1202096 for CVE-2022-2588",
          "url": "https://bugzilla.suse.com/1202096"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1203613 for CVE-2022-2588",
          "url": "https://bugzilla.suse.com/1203613"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1204183 for CVE-2022-2588",
          "url": "https://bugzilla.suse.com/1204183"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1209225 for CVE-2022-2588",
          "url": "https://bugzilla.suse.com/1209225"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "SUSE Linux Enterprise Micro 5.1:kernel-rt-5.3.18-150300.106.1.x86_64",
            "SUSE Linux Enterprise Micro 5.2:kernel-rt-5.3.18-150300.106.1.x86_64",
            "SUSE Real Time Module 15 SP3:cluster-md-kmp-rt-5.3.18-150300.106.1.x86_64",
            "SUSE Real Time Module 15 SP3:dlm-kmp-rt-5.3.18-150300.106.1.x86_64",
            "SUSE Real Time Module 15 SP3:gfs2-kmp-rt-5.3.18-150300.106.1.x86_64",
            "SUSE Real Time Module 15 SP3:kernel-devel-rt-5.3.18-150300.106.1.noarch",
            "SUSE Real Time Module 15 SP3:kernel-rt-5.3.18-150300.106.1.x86_64",
            "SUSE Real Time Module 15 SP3:kernel-rt-devel-5.3.18-150300.106.1.x86_64",
            "SUSE Real Time Module 15 SP3:kernel-rt_debug-devel-5.3.18-150300.106.1.x86_64",
            "SUSE Real Time Module 15 SP3:kernel-source-rt-5.3.18-150300.106.1.noarch",
            "SUSE Real Time Module 15 SP3:kernel-syms-rt-5.3.18-150300.106.1.x86_64",
            "SUSE Real Time Module 15 SP3:ocfs2-kmp-rt-5.3.18-150300.106.1.x86_64",
            "openSUSE Leap Micro 5.2:kernel-rt-5.3.18-150300.106.1.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 7.8,
            "baseSeverity": "HIGH",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
            "version": "3.1"
          },
          "products": [
            "SUSE Linux Enterprise Micro 5.1:kernel-rt-5.3.18-150300.106.1.x86_64",
            "SUSE Linux Enterprise Micro 5.2:kernel-rt-5.3.18-150300.106.1.x86_64",
            "SUSE Real Time Module 15 SP3:cluster-md-kmp-rt-5.3.18-150300.106.1.x86_64",
            "SUSE Real Time Module 15 SP3:dlm-kmp-rt-5.3.18-150300.106.1.x86_64",
            "SUSE Real Time Module 15 SP3:gfs2-kmp-rt-5.3.18-150300.106.1.x86_64",
            "SUSE Real Time Module 15 SP3:kernel-devel-rt-5.3.18-150300.106.1.noarch",
            "SUSE Real Time Module 15 SP3:kernel-rt-5.3.18-150300.106.1.x86_64",
            "SUSE Real Time Module 15 SP3:kernel-rt-devel-5.3.18-150300.106.1.x86_64",
            "SUSE Real Time Module 15 SP3:kernel-rt_debug-devel-5.3.18-150300.106.1.x86_64",
            "SUSE Real Time Module 15 SP3:kernel-source-rt-5.3.18-150300.106.1.noarch",
            "SUSE Real Time Module 15 SP3:kernel-syms-rt-5.3.18-150300.106.1.x86_64",
            "SUSE Real Time Module 15 SP3:ocfs2-kmp-rt-5.3.18-150300.106.1.x86_64",
            "openSUSE Leap Micro 5.2:kernel-rt-5.3.18-150300.106.1.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2022-10-31T08:28:31Z",
          "details": "important"
        }
      ],
      "title": "CVE-2022-2588"
    },
    {
      "cve": "CVE-2022-26373",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2022-26373"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "Non-transparent sharing of return predictor targets between contexts in some Intel(R) Processors may allow an authorized user to potentially enable information disclosure via local access.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "SUSE Linux Enterprise Micro 5.1:kernel-rt-5.3.18-150300.106.1.x86_64",
          "SUSE Linux Enterprise Micro 5.2:kernel-rt-5.3.18-150300.106.1.x86_64",
          "SUSE Real Time Module 15 SP3:cluster-md-kmp-rt-5.3.18-150300.106.1.x86_64",
          "SUSE Real Time Module 15 SP3:dlm-kmp-rt-5.3.18-150300.106.1.x86_64",
          "SUSE Real Time Module 15 SP3:gfs2-kmp-rt-5.3.18-150300.106.1.x86_64",
          "SUSE Real Time Module 15 SP3:kernel-devel-rt-5.3.18-150300.106.1.noarch",
          "SUSE Real Time Module 15 SP3:kernel-rt-5.3.18-150300.106.1.x86_64",
          "SUSE Real Time Module 15 SP3:kernel-rt-devel-5.3.18-150300.106.1.x86_64",
          "SUSE Real Time Module 15 SP3:kernel-rt_debug-devel-5.3.18-150300.106.1.x86_64",
          "SUSE Real Time Module 15 SP3:kernel-source-rt-5.3.18-150300.106.1.noarch",
          "SUSE Real Time Module 15 SP3:kernel-syms-rt-5.3.18-150300.106.1.x86_64",
          "SUSE Real Time Module 15 SP3:ocfs2-kmp-rt-5.3.18-150300.106.1.x86_64",
          "openSUSE Leap Micro 5.2:kernel-rt-5.3.18-150300.106.1.x86_64"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2022-26373",
          "url": "https://www.suse.com/security/cve/CVE-2022-26373"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1201726 for CVE-2022-26373",
          "url": "https://bugzilla.suse.com/1201726"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1209619 for CVE-2022-26373",
          "url": "https://bugzilla.suse.com/1209619"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "SUSE Linux Enterprise Micro 5.1:kernel-rt-5.3.18-150300.106.1.x86_64",
            "SUSE Linux Enterprise Micro 5.2:kernel-rt-5.3.18-150300.106.1.x86_64",
            "SUSE Real Time Module 15 SP3:cluster-md-kmp-rt-5.3.18-150300.106.1.x86_64",
            "SUSE Real Time Module 15 SP3:dlm-kmp-rt-5.3.18-150300.106.1.x86_64",
            "SUSE Real Time Module 15 SP3:gfs2-kmp-rt-5.3.18-150300.106.1.x86_64",
            "SUSE Real Time Module 15 SP3:kernel-devel-rt-5.3.18-150300.106.1.noarch",
            "SUSE Real Time Module 15 SP3:kernel-rt-5.3.18-150300.106.1.x86_64",
            "SUSE Real Time Module 15 SP3:kernel-rt-devel-5.3.18-150300.106.1.x86_64",
            "SUSE Real Time Module 15 SP3:kernel-rt_debug-devel-5.3.18-150300.106.1.x86_64",
            "SUSE Real Time Module 15 SP3:kernel-source-rt-5.3.18-150300.106.1.noarch",
            "SUSE Real Time Module 15 SP3:kernel-syms-rt-5.3.18-150300.106.1.x86_64",
            "SUSE Real Time Module 15 SP3:ocfs2-kmp-rt-5.3.18-150300.106.1.x86_64",
            "openSUSE Leap Micro 5.2:kernel-rt-5.3.18-150300.106.1.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 5.5,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N",
            "version": "3.1"
          },
          "products": [
            "SUSE Linux Enterprise Micro 5.1:kernel-rt-5.3.18-150300.106.1.x86_64",
            "SUSE Linux Enterprise Micro 5.2:kernel-rt-5.3.18-150300.106.1.x86_64",
            "SUSE Real Time Module 15 SP3:cluster-md-kmp-rt-5.3.18-150300.106.1.x86_64",
            "SUSE Real Time Module 15 SP3:dlm-kmp-rt-5.3.18-150300.106.1.x86_64",
            "SUSE Real Time Module 15 SP3:gfs2-kmp-rt-5.3.18-150300.106.1.x86_64",
            "SUSE Real Time Module 15 SP3:kernel-devel-rt-5.3.18-150300.106.1.noarch",
            "SUSE Real Time Module 15 SP3:kernel-rt-5.3.18-150300.106.1.x86_64",
            "SUSE Real Time Module 15 SP3:kernel-rt-devel-5.3.18-150300.106.1.x86_64",
            "SUSE Real Time Module 15 SP3:kernel-rt_debug-devel-5.3.18-150300.106.1.x86_64",
            "SUSE Real Time Module 15 SP3:kernel-source-rt-5.3.18-150300.106.1.noarch",
            "SUSE Real Time Module 15 SP3:kernel-syms-rt-5.3.18-150300.106.1.x86_64",
            "SUSE Real Time Module 15 SP3:ocfs2-kmp-rt-5.3.18-150300.106.1.x86_64",
            "openSUSE Leap Micro 5.2:kernel-rt-5.3.18-150300.106.1.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2022-10-31T08:28:31Z",
          "details": "moderate"
        }
      ],
      "title": "CVE-2022-26373"
    },
    {
      "cve": "CVE-2022-2663",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2022-2663"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "An issue was found in the Linux kernel in nf_conntrack_irc where the message handling can be confused and incorrectly matches the message. A firewall may be able to be bypassed when users are using unencrypted IRC with nf_conntrack_irc configured.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "SUSE Linux Enterprise Micro 5.1:kernel-rt-5.3.18-150300.106.1.x86_64",
          "SUSE Linux Enterprise Micro 5.2:kernel-rt-5.3.18-150300.106.1.x86_64",
          "SUSE Real Time Module 15 SP3:cluster-md-kmp-rt-5.3.18-150300.106.1.x86_64",
          "SUSE Real Time Module 15 SP3:dlm-kmp-rt-5.3.18-150300.106.1.x86_64",
          "SUSE Real Time Module 15 SP3:gfs2-kmp-rt-5.3.18-150300.106.1.x86_64",
          "SUSE Real Time Module 15 SP3:kernel-devel-rt-5.3.18-150300.106.1.noarch",
          "SUSE Real Time Module 15 SP3:kernel-rt-5.3.18-150300.106.1.x86_64",
          "SUSE Real Time Module 15 SP3:kernel-rt-devel-5.3.18-150300.106.1.x86_64",
          "SUSE Real Time Module 15 SP3:kernel-rt_debug-devel-5.3.18-150300.106.1.x86_64",
          "SUSE Real Time Module 15 SP3:kernel-source-rt-5.3.18-150300.106.1.noarch",
          "SUSE Real Time Module 15 SP3:kernel-syms-rt-5.3.18-150300.106.1.x86_64",
          "SUSE Real Time Module 15 SP3:ocfs2-kmp-rt-5.3.18-150300.106.1.x86_64",
          "openSUSE Leap Micro 5.2:kernel-rt-5.3.18-150300.106.1.x86_64"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2022-2663",
          "url": "https://www.suse.com/security/cve/CVE-2022-2663"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1202097 for CVE-2022-2663",
          "url": "https://bugzilla.suse.com/1202097"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1212299 for CVE-2022-2663",
          "url": "https://bugzilla.suse.com/1212299"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "SUSE Linux Enterprise Micro 5.1:kernel-rt-5.3.18-150300.106.1.x86_64",
            "SUSE Linux Enterprise Micro 5.2:kernel-rt-5.3.18-150300.106.1.x86_64",
            "SUSE Real Time Module 15 SP3:cluster-md-kmp-rt-5.3.18-150300.106.1.x86_64",
            "SUSE Real Time Module 15 SP3:dlm-kmp-rt-5.3.18-150300.106.1.x86_64",
            "SUSE Real Time Module 15 SP3:gfs2-kmp-rt-5.3.18-150300.106.1.x86_64",
            "SUSE Real Time Module 15 SP3:kernel-devel-rt-5.3.18-150300.106.1.noarch",
            "SUSE Real Time Module 15 SP3:kernel-rt-5.3.18-150300.106.1.x86_64",
            "SUSE Real Time Module 15 SP3:kernel-rt-devel-5.3.18-150300.106.1.x86_64",
            "SUSE Real Time Module 15 SP3:kernel-rt_debug-devel-5.3.18-150300.106.1.x86_64",
            "SUSE Real Time Module 15 SP3:kernel-source-rt-5.3.18-150300.106.1.noarch",
            "SUSE Real Time Module 15 SP3:kernel-syms-rt-5.3.18-150300.106.1.x86_64",
            "SUSE Real Time Module 15 SP3:ocfs2-kmp-rt-5.3.18-150300.106.1.x86_64",
            "openSUSE Leap Micro 5.2:kernel-rt-5.3.18-150300.106.1.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 5.9,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:N",
            "version": "3.1"
          },
          "products": [
            "SUSE Linux Enterprise Micro 5.1:kernel-rt-5.3.18-150300.106.1.x86_64",
            "SUSE Linux Enterprise Micro 5.2:kernel-rt-5.3.18-150300.106.1.x86_64",
            "SUSE Real Time Module 15 SP3:cluster-md-kmp-rt-5.3.18-150300.106.1.x86_64",
            "SUSE Real Time Module 15 SP3:dlm-kmp-rt-5.3.18-150300.106.1.x86_64",
            "SUSE Real Time Module 15 SP3:gfs2-kmp-rt-5.3.18-150300.106.1.x86_64",
            "SUSE Real Time Module 15 SP3:kernel-devel-rt-5.3.18-150300.106.1.noarch",
            "SUSE Real Time Module 15 SP3:kernel-rt-5.3.18-150300.106.1.x86_64",
            "SUSE Real Time Module 15 SP3:kernel-rt-devel-5.3.18-150300.106.1.x86_64",
            "SUSE Real Time Module 15 SP3:kernel-rt_debug-devel-5.3.18-150300.106.1.x86_64",
            "SUSE Real Time Module 15 SP3:kernel-source-rt-5.3.18-150300.106.1.noarch",
            "SUSE Real Time Module 15 SP3:kernel-syms-rt-5.3.18-150300.106.1.x86_64",
            "SUSE Real Time Module 15 SP3:ocfs2-kmp-rt-5.3.18-150300.106.1.x86_64",
            "openSUSE Leap Micro 5.2:kernel-rt-5.3.18-150300.106.1.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2022-10-31T08:28:31Z",
          "details": "moderate"
        }
      ],
      "title": "CVE-2022-2663"
    },
    {
      "cve": "CVE-2022-2905",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2022-2905"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "An out-of-bounds memory read flaw was found in the Linux kernel\u0027s BPF subsystem in how a user calls the bpf_tail_call function with a key larger than the max_entries of the map. This flaw allows a local user to gain unauthorized access to data.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "SUSE Linux Enterprise Micro 5.1:kernel-rt-5.3.18-150300.106.1.x86_64",
          "SUSE Linux Enterprise Micro 5.2:kernel-rt-5.3.18-150300.106.1.x86_64",
          "SUSE Real Time Module 15 SP3:cluster-md-kmp-rt-5.3.18-150300.106.1.x86_64",
          "SUSE Real Time Module 15 SP3:dlm-kmp-rt-5.3.18-150300.106.1.x86_64",
          "SUSE Real Time Module 15 SP3:gfs2-kmp-rt-5.3.18-150300.106.1.x86_64",
          "SUSE Real Time Module 15 SP3:kernel-devel-rt-5.3.18-150300.106.1.noarch",
          "SUSE Real Time Module 15 SP3:kernel-rt-5.3.18-150300.106.1.x86_64",
          "SUSE Real Time Module 15 SP3:kernel-rt-devel-5.3.18-150300.106.1.x86_64",
          "SUSE Real Time Module 15 SP3:kernel-rt_debug-devel-5.3.18-150300.106.1.x86_64",
          "SUSE Real Time Module 15 SP3:kernel-source-rt-5.3.18-150300.106.1.noarch",
          "SUSE Real Time Module 15 SP3:kernel-syms-rt-5.3.18-150300.106.1.x86_64",
          "SUSE Real Time Module 15 SP3:ocfs2-kmp-rt-5.3.18-150300.106.1.x86_64",
          "openSUSE Leap Micro 5.2:kernel-rt-5.3.18-150300.106.1.x86_64"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2022-2905",
          "url": "https://www.suse.com/security/cve/CVE-2022-2905"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1202860 for CVE-2022-2905",
          "url": "https://bugzilla.suse.com/1202860"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "SUSE Linux Enterprise Micro 5.1:kernel-rt-5.3.18-150300.106.1.x86_64",
            "SUSE Linux Enterprise Micro 5.2:kernel-rt-5.3.18-150300.106.1.x86_64",
            "SUSE Real Time Module 15 SP3:cluster-md-kmp-rt-5.3.18-150300.106.1.x86_64",
            "SUSE Real Time Module 15 SP3:dlm-kmp-rt-5.3.18-150300.106.1.x86_64",
            "SUSE Real Time Module 15 SP3:gfs2-kmp-rt-5.3.18-150300.106.1.x86_64",
            "SUSE Real Time Module 15 SP3:kernel-devel-rt-5.3.18-150300.106.1.noarch",
            "SUSE Real Time Module 15 SP3:kernel-rt-5.3.18-150300.106.1.x86_64",
            "SUSE Real Time Module 15 SP3:kernel-rt-devel-5.3.18-150300.106.1.x86_64",
            "SUSE Real Time Module 15 SP3:kernel-rt_debug-devel-5.3.18-150300.106.1.x86_64",
            "SUSE Real Time Module 15 SP3:kernel-source-rt-5.3.18-150300.106.1.noarch",
            "SUSE Real Time Module 15 SP3:kernel-syms-rt-5.3.18-150300.106.1.x86_64",
            "SUSE Real Time Module 15 SP3:ocfs2-kmp-rt-5.3.18-150300.106.1.x86_64",
            "openSUSE Leap Micro 5.2:kernel-rt-5.3.18-150300.106.1.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 6.2,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N",
            "version": "3.1"
          },
          "products": [
            "SUSE Linux Enterprise Micro 5.1:kernel-rt-5.3.18-150300.106.1.x86_64",
            "SUSE Linux Enterprise Micro 5.2:kernel-rt-5.3.18-150300.106.1.x86_64",
            "SUSE Real Time Module 15 SP3:cluster-md-kmp-rt-5.3.18-150300.106.1.x86_64",
            "SUSE Real Time Module 15 SP3:dlm-kmp-rt-5.3.18-150300.106.1.x86_64",
            "SUSE Real Time Module 15 SP3:gfs2-kmp-rt-5.3.18-150300.106.1.x86_64",
            "SUSE Real Time Module 15 SP3:kernel-devel-rt-5.3.18-150300.106.1.noarch",
            "SUSE Real Time Module 15 SP3:kernel-rt-5.3.18-150300.106.1.x86_64",
            "SUSE Real Time Module 15 SP3:kernel-rt-devel-5.3.18-150300.106.1.x86_64",
            "SUSE Real Time Module 15 SP3:kernel-rt_debug-devel-5.3.18-150300.106.1.x86_64",
            "SUSE Real Time Module 15 SP3:kernel-source-rt-5.3.18-150300.106.1.noarch",
            "SUSE Real Time Module 15 SP3:kernel-syms-rt-5.3.18-150300.106.1.x86_64",
            "SUSE Real Time Module 15 SP3:ocfs2-kmp-rt-5.3.18-150300.106.1.x86_64",
            "openSUSE Leap Micro 5.2:kernel-rt-5.3.18-150300.106.1.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2022-10-31T08:28:31Z",
          "details": "moderate"
        }
      ],
      "title": "CVE-2022-2905"
    },
    {
      "cve": "CVE-2022-2977",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2022-2977"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "A flaw was found in the Linux kernel implementation of proxied virtualized TPM devices. On a system where virtualized TPM devices are configured (this is not the default) a local attacker can create a use-after-free and create a situation where it may be possible to escalate privileges on the system.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "SUSE Linux Enterprise Micro 5.1:kernel-rt-5.3.18-150300.106.1.x86_64",
          "SUSE Linux Enterprise Micro 5.2:kernel-rt-5.3.18-150300.106.1.x86_64",
          "SUSE Real Time Module 15 SP3:cluster-md-kmp-rt-5.3.18-150300.106.1.x86_64",
          "SUSE Real Time Module 15 SP3:dlm-kmp-rt-5.3.18-150300.106.1.x86_64",
          "SUSE Real Time Module 15 SP3:gfs2-kmp-rt-5.3.18-150300.106.1.x86_64",
          "SUSE Real Time Module 15 SP3:kernel-devel-rt-5.3.18-150300.106.1.noarch",
          "SUSE Real Time Module 15 SP3:kernel-rt-5.3.18-150300.106.1.x86_64",
          "SUSE Real Time Module 15 SP3:kernel-rt-devel-5.3.18-150300.106.1.x86_64",
          "SUSE Real Time Module 15 SP3:kernel-rt_debug-devel-5.3.18-150300.106.1.x86_64",
          "SUSE Real Time Module 15 SP3:kernel-source-rt-5.3.18-150300.106.1.noarch",
          "SUSE Real Time Module 15 SP3:kernel-syms-rt-5.3.18-150300.106.1.x86_64",
          "SUSE Real Time Module 15 SP3:ocfs2-kmp-rt-5.3.18-150300.106.1.x86_64",
          "openSUSE Leap Micro 5.2:kernel-rt-5.3.18-150300.106.1.x86_64"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2022-2977",
          "url": "https://www.suse.com/security/cve/CVE-2022-2977"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1202672 for CVE-2022-2977",
          "url": "https://bugzilla.suse.com/1202672"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "SUSE Linux Enterprise Micro 5.1:kernel-rt-5.3.18-150300.106.1.x86_64",
            "SUSE Linux Enterprise Micro 5.2:kernel-rt-5.3.18-150300.106.1.x86_64",
            "SUSE Real Time Module 15 SP3:cluster-md-kmp-rt-5.3.18-150300.106.1.x86_64",
            "SUSE Real Time Module 15 SP3:dlm-kmp-rt-5.3.18-150300.106.1.x86_64",
            "SUSE Real Time Module 15 SP3:gfs2-kmp-rt-5.3.18-150300.106.1.x86_64",
            "SUSE Real Time Module 15 SP3:kernel-devel-rt-5.3.18-150300.106.1.noarch",
            "SUSE Real Time Module 15 SP3:kernel-rt-5.3.18-150300.106.1.x86_64",
            "SUSE Real Time Module 15 SP3:kernel-rt-devel-5.3.18-150300.106.1.x86_64",
            "SUSE Real Time Module 15 SP3:kernel-rt_debug-devel-5.3.18-150300.106.1.x86_64",
            "SUSE Real Time Module 15 SP3:kernel-source-rt-5.3.18-150300.106.1.noarch",
            "SUSE Real Time Module 15 SP3:kernel-syms-rt-5.3.18-150300.106.1.x86_64",
            "SUSE Real Time Module 15 SP3:ocfs2-kmp-rt-5.3.18-150300.106.1.x86_64",
            "openSUSE Leap Micro 5.2:kernel-rt-5.3.18-150300.106.1.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 4.2,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:R/S:U/C:N/I:N/A:H",
            "version": "3.1"
          },
          "products": [
            "SUSE Linux Enterprise Micro 5.1:kernel-rt-5.3.18-150300.106.1.x86_64",
            "SUSE Linux Enterprise Micro 5.2:kernel-rt-5.3.18-150300.106.1.x86_64",
            "SUSE Real Time Module 15 SP3:cluster-md-kmp-rt-5.3.18-150300.106.1.x86_64",
            "SUSE Real Time Module 15 SP3:dlm-kmp-rt-5.3.18-150300.106.1.x86_64",
            "SUSE Real Time Module 15 SP3:gfs2-kmp-rt-5.3.18-150300.106.1.x86_64",
            "SUSE Real Time Module 15 SP3:kernel-devel-rt-5.3.18-150300.106.1.noarch",
            "SUSE Real Time Module 15 SP3:kernel-rt-5.3.18-150300.106.1.x86_64",
            "SUSE Real Time Module 15 SP3:kernel-rt-devel-5.3.18-150300.106.1.x86_64",
            "SUSE Real Time Module 15 SP3:kernel-rt_debug-devel-5.3.18-150300.106.1.x86_64",
            "SUSE Real Time Module 15 SP3:kernel-source-rt-5.3.18-150300.106.1.noarch",
            "SUSE Real Time Module 15 SP3:kernel-syms-rt-5.3.18-150300.106.1.x86_64",
            "SUSE Real Time Module 15 SP3:ocfs2-kmp-rt-5.3.18-150300.106.1.x86_64",
            "openSUSE Leap Micro 5.2:kernel-rt-5.3.18-150300.106.1.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2022-10-31T08:28:31Z",
          "details": "moderate"
        }
      ],
      "title": "CVE-2022-2977"
    },
    {
      "cve": "CVE-2022-3028",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2022-3028"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "A race condition was found in the Linux kernel\u0027s IP framework for transforming packets (XFRM subsystem) when multiple calls to xfrm_probe_algs occurred simultaneously. This flaw could allow a local attacker to potentially trigger an out-of-bounds write or leak kernel heap memory by performing an out-of-bounds read and copying it into a socket.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "SUSE Linux Enterprise Micro 5.1:kernel-rt-5.3.18-150300.106.1.x86_64",
          "SUSE Linux Enterprise Micro 5.2:kernel-rt-5.3.18-150300.106.1.x86_64",
          "SUSE Real Time Module 15 SP3:cluster-md-kmp-rt-5.3.18-150300.106.1.x86_64",
          "SUSE Real Time Module 15 SP3:dlm-kmp-rt-5.3.18-150300.106.1.x86_64",
          "SUSE Real Time Module 15 SP3:gfs2-kmp-rt-5.3.18-150300.106.1.x86_64",
          "SUSE Real Time Module 15 SP3:kernel-devel-rt-5.3.18-150300.106.1.noarch",
          "SUSE Real Time Module 15 SP3:kernel-rt-5.3.18-150300.106.1.x86_64",
          "SUSE Real Time Module 15 SP3:kernel-rt-devel-5.3.18-150300.106.1.x86_64",
          "SUSE Real Time Module 15 SP3:kernel-rt_debug-devel-5.3.18-150300.106.1.x86_64",
          "SUSE Real Time Module 15 SP3:kernel-source-rt-5.3.18-150300.106.1.noarch",
          "SUSE Real Time Module 15 SP3:kernel-syms-rt-5.3.18-150300.106.1.x86_64",
          "SUSE Real Time Module 15 SP3:ocfs2-kmp-rt-5.3.18-150300.106.1.x86_64",
          "openSUSE Leap Micro 5.2:kernel-rt-5.3.18-150300.106.1.x86_64"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2022-3028",
          "url": "https://www.suse.com/security/cve/CVE-2022-3028"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1202898 for CVE-2022-3028",
          "url": "https://bugzilla.suse.com/1202898"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1212296 for CVE-2022-3028",
          "url": "https://bugzilla.suse.com/1212296"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "SUSE Linux Enterprise Micro 5.1:kernel-rt-5.3.18-150300.106.1.x86_64",
            "SUSE Linux Enterprise Micro 5.2:kernel-rt-5.3.18-150300.106.1.x86_64",
            "SUSE Real Time Module 15 SP3:cluster-md-kmp-rt-5.3.18-150300.106.1.x86_64",
            "SUSE Real Time Module 15 SP3:dlm-kmp-rt-5.3.18-150300.106.1.x86_64",
            "SUSE Real Time Module 15 SP3:gfs2-kmp-rt-5.3.18-150300.106.1.x86_64",
            "SUSE Real Time Module 15 SP3:kernel-devel-rt-5.3.18-150300.106.1.noarch",
            "SUSE Real Time Module 15 SP3:kernel-rt-5.3.18-150300.106.1.x86_64",
            "SUSE Real Time Module 15 SP3:kernel-rt-devel-5.3.18-150300.106.1.x86_64",
            "SUSE Real Time Module 15 SP3:kernel-rt_debug-devel-5.3.18-150300.106.1.x86_64",
            "SUSE Real Time Module 15 SP3:kernel-source-rt-5.3.18-150300.106.1.noarch",
            "SUSE Real Time Module 15 SP3:kernel-syms-rt-5.3.18-150300.106.1.x86_64",
            "SUSE Real Time Module 15 SP3:ocfs2-kmp-rt-5.3.18-150300.106.1.x86_64",
            "openSUSE Leap Micro 5.2:kernel-rt-5.3.18-150300.106.1.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 6.7,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H",
            "version": "3.1"
          },
          "products": [
            "SUSE Linux Enterprise Micro 5.1:kernel-rt-5.3.18-150300.106.1.x86_64",
            "SUSE Linux Enterprise Micro 5.2:kernel-rt-5.3.18-150300.106.1.x86_64",
            "SUSE Real Time Module 15 SP3:cluster-md-kmp-rt-5.3.18-150300.106.1.x86_64",
            "SUSE Real Time Module 15 SP3:dlm-kmp-rt-5.3.18-150300.106.1.x86_64",
            "SUSE Real Time Module 15 SP3:gfs2-kmp-rt-5.3.18-150300.106.1.x86_64",
            "SUSE Real Time Module 15 SP3:kernel-devel-rt-5.3.18-150300.106.1.noarch",
            "SUSE Real Time Module 15 SP3:kernel-rt-5.3.18-150300.106.1.x86_64",
            "SUSE Real Time Module 15 SP3:kernel-rt-devel-5.3.18-150300.106.1.x86_64",
            "SUSE Real Time Module 15 SP3:kernel-rt_debug-devel-5.3.18-150300.106.1.x86_64",
            "SUSE Real Time Module 15 SP3:kernel-source-rt-5.3.18-150300.106.1.noarch",
            "SUSE Real Time Module 15 SP3:kernel-syms-rt-5.3.18-150300.106.1.x86_64",
            "SUSE Real Time Module 15 SP3:ocfs2-kmp-rt-5.3.18-150300.106.1.x86_64",
            "openSUSE Leap Micro 5.2:kernel-rt-5.3.18-150300.106.1.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2022-10-31T08:28:31Z",
          "details": "moderate"
        }
      ],
      "title": "CVE-2022-3028"
    },
    {
      "cve": "CVE-2022-3169",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2022-3169"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "A flaw was found in the Linux kernel. A denial of service flaw may occur if there is a consecutive request of the NVME_IOCTL_RESET and the NVME_IOCTL_SUBSYS_RESET through the device file of the driver, resulting in a PCIe link disconnect.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "SUSE Linux Enterprise Micro 5.1:kernel-rt-5.3.18-150300.106.1.x86_64",
          "SUSE Linux Enterprise Micro 5.2:kernel-rt-5.3.18-150300.106.1.x86_64",
          "SUSE Real Time Module 15 SP3:cluster-md-kmp-rt-5.3.18-150300.106.1.x86_64",
          "SUSE Real Time Module 15 SP3:dlm-kmp-rt-5.3.18-150300.106.1.x86_64",
          "SUSE Real Time Module 15 SP3:gfs2-kmp-rt-5.3.18-150300.106.1.x86_64",
          "SUSE Real Time Module 15 SP3:kernel-devel-rt-5.3.18-150300.106.1.noarch",
          "SUSE Real Time Module 15 SP3:kernel-rt-5.3.18-150300.106.1.x86_64",
          "SUSE Real Time Module 15 SP3:kernel-rt-devel-5.3.18-150300.106.1.x86_64",
          "SUSE Real Time Module 15 SP3:kernel-rt_debug-devel-5.3.18-150300.106.1.x86_64",
          "SUSE Real Time Module 15 SP3:kernel-source-rt-5.3.18-150300.106.1.noarch",
          "SUSE Real Time Module 15 SP3:kernel-syms-rt-5.3.18-150300.106.1.x86_64",
          "SUSE Real Time Module 15 SP3:ocfs2-kmp-rt-5.3.18-150300.106.1.x86_64",
          "openSUSE Leap Micro 5.2:kernel-rt-5.3.18-150300.106.1.x86_64"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2022-3169",
          "url": "https://www.suse.com/security/cve/CVE-2022-3169"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1203290 for CVE-2022-3169",
          "url": "https://bugzilla.suse.com/1203290"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "SUSE Linux Enterprise Micro 5.1:kernel-rt-5.3.18-150300.106.1.x86_64",
            "SUSE Linux Enterprise Micro 5.2:kernel-rt-5.3.18-150300.106.1.x86_64",
            "SUSE Real Time Module 15 SP3:cluster-md-kmp-rt-5.3.18-150300.106.1.x86_64",
            "SUSE Real Time Module 15 SP3:dlm-kmp-rt-5.3.18-150300.106.1.x86_64",
            "SUSE Real Time Module 15 SP3:gfs2-kmp-rt-5.3.18-150300.106.1.x86_64",
            "SUSE Real Time Module 15 SP3:kernel-devel-rt-5.3.18-150300.106.1.noarch",
            "SUSE Real Time Module 15 SP3:kernel-rt-5.3.18-150300.106.1.x86_64",
            "SUSE Real Time Module 15 SP3:kernel-rt-devel-5.3.18-150300.106.1.x86_64",
            "SUSE Real Time Module 15 SP3:kernel-rt_debug-devel-5.3.18-150300.106.1.x86_64",
            "SUSE Real Time Module 15 SP3:kernel-source-rt-5.3.18-150300.106.1.noarch",
            "SUSE Real Time Module 15 SP3:kernel-syms-rt-5.3.18-150300.106.1.x86_64",
            "SUSE Real Time Module 15 SP3:ocfs2-kmp-rt-5.3.18-150300.106.1.x86_64",
            "openSUSE Leap Micro 5.2:kernel-rt-5.3.18-150300.106.1.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 6.2,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
            "version": "3.1"
          },
          "products": [
            "SUSE Linux Enterprise Micro 5.1:kernel-rt-5.3.18-150300.106.1.x86_64",
            "SUSE Linux Enterprise Micro 5.2:kernel-rt-5.3.18-150300.106.1.x86_64",
            "SUSE Real Time Module 15 SP3:cluster-md-kmp-rt-5.3.18-150300.106.1.x86_64",
            "SUSE Real Time Module 15 SP3:dlm-kmp-rt-5.3.18-150300.106.1.x86_64",
            "SUSE Real Time Module 15 SP3:gfs2-kmp-rt-5.3.18-150300.106.1.x86_64",
            "SUSE Real Time Module 15 SP3:kernel-devel-rt-5.3.18-150300.106.1.noarch",
            "SUSE Real Time Module 15 SP3:kernel-rt-5.3.18-150300.106.1.x86_64",
            "SUSE Real Time Module 15 SP3:kernel-rt-devel-5.3.18-150300.106.1.x86_64",
            "SUSE Real Time Module 15 SP3:kernel-rt_debug-devel-5.3.18-150300.106.1.x86_64",
            "SUSE Real Time Module 15 SP3:kernel-source-rt-5.3.18-150300.106.1.noarch",
            "SUSE Real Time Module 15 SP3:kernel-syms-rt-5.3.18-150300.106.1.x86_64",
            "SUSE Real Time Module 15 SP3:ocfs2-kmp-rt-5.3.18-150300.106.1.x86_64",
            "openSUSE Leap Micro 5.2:kernel-rt-5.3.18-150300.106.1.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2022-10-31T08:28:31Z",
          "details": "moderate"
        }
      ],
      "title": "CVE-2022-3169"
    },
    {
      "cve": "CVE-2022-32296",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2022-32296"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "The Linux kernel before 5.17.9 allows TCP servers to identify clients by observing what source ports are used. This occurs because of use of Algorithm 4 (\"Double-Hash Port Selection Algorithm\") of RFC 6056.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "SUSE Linux Enterprise Micro 5.1:kernel-rt-5.3.18-150300.106.1.x86_64",
          "SUSE Linux Enterprise Micro 5.2:kernel-rt-5.3.18-150300.106.1.x86_64",
          "SUSE Real Time Module 15 SP3:cluster-md-kmp-rt-5.3.18-150300.106.1.x86_64",
          "SUSE Real Time Module 15 SP3:dlm-kmp-rt-5.3.18-150300.106.1.x86_64",
          "SUSE Real Time Module 15 SP3:gfs2-kmp-rt-5.3.18-150300.106.1.x86_64",
          "SUSE Real Time Module 15 SP3:kernel-devel-rt-5.3.18-150300.106.1.noarch",
          "SUSE Real Time Module 15 SP3:kernel-rt-5.3.18-150300.106.1.x86_64",
          "SUSE Real Time Module 15 SP3:kernel-rt-devel-5.3.18-150300.106.1.x86_64",
          "SUSE Real Time Module 15 SP3:kernel-rt_debug-devel-5.3.18-150300.106.1.x86_64",
          "SUSE Real Time Module 15 SP3:kernel-source-rt-5.3.18-150300.106.1.noarch",
          "SUSE Real Time Module 15 SP3:kernel-syms-rt-5.3.18-150300.106.1.x86_64",
          "SUSE Real Time Module 15 SP3:ocfs2-kmp-rt-5.3.18-150300.106.1.x86_64",
          "openSUSE Leap Micro 5.2:kernel-rt-5.3.18-150300.106.1.x86_64"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2022-32296",
          "url": "https://www.suse.com/security/cve/CVE-2022-32296"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1200288 for CVE-2022-32296",
          "url": "https://bugzilla.suse.com/1200288"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "SUSE Linux Enterprise Micro 5.1:kernel-rt-5.3.18-150300.106.1.x86_64",
            "SUSE Linux Enterprise Micro 5.2:kernel-rt-5.3.18-150300.106.1.x86_64",
            "SUSE Real Time Module 15 SP3:cluster-md-kmp-rt-5.3.18-150300.106.1.x86_64",
            "SUSE Real Time Module 15 SP3:dlm-kmp-rt-5.3.18-150300.106.1.x86_64",
            "SUSE Real Time Module 15 SP3:gfs2-kmp-rt-5.3.18-150300.106.1.x86_64",
            "SUSE Real Time Module 15 SP3:kernel-devel-rt-5.3.18-150300.106.1.noarch",
            "SUSE Real Time Module 15 SP3:kernel-rt-5.3.18-150300.106.1.x86_64",
            "SUSE Real Time Module 15 SP3:kernel-rt-devel-5.3.18-150300.106.1.x86_64",
            "SUSE Real Time Module 15 SP3:kernel-rt_debug-devel-5.3.18-150300.106.1.x86_64",
            "SUSE Real Time Module 15 SP3:kernel-source-rt-5.3.18-150300.106.1.noarch",
            "SUSE Real Time Module 15 SP3:kernel-syms-rt-5.3.18-150300.106.1.x86_64",
            "SUSE Real Time Module 15 SP3:ocfs2-kmp-rt-5.3.18-150300.106.1.x86_64",
            "openSUSE Leap Micro 5.2:kernel-rt-5.3.18-150300.106.1.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 5.3,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:N/A:N",
            "version": "3.1"
          },
          "products": [
            "SUSE Linux Enterprise Micro 5.1:kernel-rt-5.3.18-150300.106.1.x86_64",
            "SUSE Linux Enterprise Micro 5.2:kernel-rt-5.3.18-150300.106.1.x86_64",
            "SUSE Real Time Module 15 SP3:cluster-md-kmp-rt-5.3.18-150300.106.1.x86_64",
            "SUSE Real Time Module 15 SP3:dlm-kmp-rt-5.3.18-150300.106.1.x86_64",
            "SUSE Real Time Module 15 SP3:gfs2-kmp-rt-5.3.18-150300.106.1.x86_64",
            "SUSE Real Time Module 15 SP3:kernel-devel-rt-5.3.18-150300.106.1.noarch",
            "SUSE Real Time Module 15 SP3:kernel-rt-5.3.18-150300.106.1.x86_64",
            "SUSE Real Time Module 15 SP3:kernel-rt-devel-5.3.18-150300.106.1.x86_64",
            "SUSE Real Time Module 15 SP3:kernel-rt_debug-devel-5.3.18-150300.106.1.x86_64",
            "SUSE Real Time Module 15 SP3:kernel-source-rt-5.3.18-150300.106.1.noarch",
            "SUSE Real Time Module 15 SP3:kernel-syms-rt-5.3.18-150300.106.1.x86_64",
            "SUSE Real Time Module 15 SP3:ocfs2-kmp-rt-5.3.18-150300.106.1.x86_64",
            "openSUSE Leap Micro 5.2:kernel-rt-5.3.18-150300.106.1.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2022-10-31T08:28:31Z",
          "details": "moderate"
        }
      ],
      "title": "CVE-2022-32296"
    },
    {
      "cve": "CVE-2022-3239",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2022-3239"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "A flaw use after free in the Linux kernel video4linux driver was found in the way user triggers em28xx_usb_probe() for the Empia 28xx based TV cards. A local user could use this flaw to crash the system or potentially escalate their privileges on the system.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "SUSE Linux Enterprise Micro 5.1:kernel-rt-5.3.18-150300.106.1.x86_64",
          "SUSE Linux Enterprise Micro 5.2:kernel-rt-5.3.18-150300.106.1.x86_64",
          "SUSE Real Time Module 15 SP3:cluster-md-kmp-rt-5.3.18-150300.106.1.x86_64",
          "SUSE Real Time Module 15 SP3:dlm-kmp-rt-5.3.18-150300.106.1.x86_64",
          "SUSE Real Time Module 15 SP3:gfs2-kmp-rt-5.3.18-150300.106.1.x86_64",
          "SUSE Real Time Module 15 SP3:kernel-devel-rt-5.3.18-150300.106.1.noarch",
          "SUSE Real Time Module 15 SP3:kernel-rt-5.3.18-150300.106.1.x86_64",
          "SUSE Real Time Module 15 SP3:kernel-rt-devel-5.3.18-150300.106.1.x86_64",
          "SUSE Real Time Module 15 SP3:kernel-rt_debug-devel-5.3.18-150300.106.1.x86_64",
          "SUSE Real Time Module 15 SP3:kernel-source-rt-5.3.18-150300.106.1.noarch",
          "SUSE Real Time Module 15 SP3:kernel-syms-rt-5.3.18-150300.106.1.x86_64",
          "SUSE Real Time Module 15 SP3:ocfs2-kmp-rt-5.3.18-150300.106.1.x86_64",
          "openSUSE Leap Micro 5.2:kernel-rt-5.3.18-150300.106.1.x86_64"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2022-3239",
          "url": "https://www.suse.com/security/cve/CVE-2022-3239"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1203552 for CVE-2022-3239",
          "url": "https://bugzilla.suse.com/1203552"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "SUSE Linux Enterprise Micro 5.1:kernel-rt-5.3.18-150300.106.1.x86_64",
            "SUSE Linux Enterprise Micro 5.2:kernel-rt-5.3.18-150300.106.1.x86_64",
            "SUSE Real Time Module 15 SP3:cluster-md-kmp-rt-5.3.18-150300.106.1.x86_64",
            "SUSE Real Time Module 15 SP3:dlm-kmp-rt-5.3.18-150300.106.1.x86_64",
            "SUSE Real Time Module 15 SP3:gfs2-kmp-rt-5.3.18-150300.106.1.x86_64",
            "SUSE Real Time Module 15 SP3:kernel-devel-rt-5.3.18-150300.106.1.noarch",
            "SUSE Real Time Module 15 SP3:kernel-rt-5.3.18-150300.106.1.x86_64",
            "SUSE Real Time Module 15 SP3:kernel-rt-devel-5.3.18-150300.106.1.x86_64",
            "SUSE Real Time Module 15 SP3:kernel-rt_debug-devel-5.3.18-150300.106.1.x86_64",
            "SUSE Real Time Module 15 SP3:kernel-source-rt-5.3.18-150300.106.1.noarch",
            "SUSE Real Time Module 15 SP3:kernel-syms-rt-5.3.18-150300.106.1.x86_64",
            "SUSE Real Time Module 15 SP3:ocfs2-kmp-rt-5.3.18-150300.106.1.x86_64",
            "openSUSE Leap Micro 5.2:kernel-rt-5.3.18-150300.106.1.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 6.4,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H",
            "version": "3.1"
          },
          "products": [
            "SUSE Linux Enterprise Micro 5.1:kernel-rt-5.3.18-150300.106.1.x86_64",
            "SUSE Linux Enterprise Micro 5.2:kernel-rt-5.3.18-150300.106.1.x86_64",
            "SUSE Real Time Module 15 SP3:cluster-md-kmp-rt-5.3.18-150300.106.1.x86_64",
            "SUSE Real Time Module 15 SP3:dlm-kmp-rt-5.3.18-150300.106.1.x86_64",
            "SUSE Real Time Module 15 SP3:gfs2-kmp-rt-5.3.18-150300.106.1.x86_64",
            "SUSE Real Time Module 15 SP3:kernel-devel-rt-5.3.18-150300.106.1.noarch",
            "SUSE Real Time Module 15 SP3:kernel-rt-5.3.18-150300.106.1.x86_64",
            "SUSE Real Time Module 15 SP3:kernel-rt-devel-5.3.18-150300.106.1.x86_64",
            "SUSE Real Time Module 15 SP3:kernel-rt_debug-devel-5.3.18-150300.106.1.x86_64",
            "SUSE Real Time Module 15 SP3:kernel-source-rt-5.3.18-150300.106.1.noarch",
            "SUSE Real Time Module 15 SP3:kernel-syms-rt-5.3.18-150300.106.1.x86_64",
            "SUSE Real Time Module 15 SP3:ocfs2-kmp-rt-5.3.18-150300.106.1.x86_64",
            "openSUSE Leap Micro 5.2:kernel-rt-5.3.18-150300.106.1.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2022-10-31T08:28:31Z",
          "details": "moderate"
        }
      ],
      "title": "CVE-2022-3239"
    },
    {
      "cve": "CVE-2022-3303",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2022-3303"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "A race condition flaw was found in the Linux kernel sound subsystem due to improper locking. It could lead to a NULL pointer dereference while handling the SNDCTL_DSP_SYNC ioctl. A privileged local user (root or member of the audio group) could use this flaw to crash the system, resulting in a denial of service condition",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "SUSE Linux Enterprise Micro 5.1:kernel-rt-5.3.18-150300.106.1.x86_64",
          "SUSE Linux Enterprise Micro 5.2:kernel-rt-5.3.18-150300.106.1.x86_64",
          "SUSE Real Time Module 15 SP3:cluster-md-kmp-rt-5.3.18-150300.106.1.x86_64",
          "SUSE Real Time Module 15 SP3:dlm-kmp-rt-5.3.18-150300.106.1.x86_64",
          "SUSE Real Time Module 15 SP3:gfs2-kmp-rt-5.3.18-150300.106.1.x86_64",
          "SUSE Real Time Module 15 SP3:kernel-devel-rt-5.3.18-150300.106.1.noarch",
          "SUSE Real Time Module 15 SP3:kernel-rt-5.3.18-150300.106.1.x86_64",
          "SUSE Real Time Module 15 SP3:kernel-rt-devel-5.3.18-150300.106.1.x86_64",
          "SUSE Real Time Module 15 SP3:kernel-rt_debug-devel-5.3.18-150300.106.1.x86_64",
          "SUSE Real Time Module 15 SP3:kernel-source-rt-5.3.18-150300.106.1.noarch",
          "SUSE Real Time Module 15 SP3:kernel-syms-rt-5.3.18-150300.106.1.x86_64",
          "SUSE Real Time Module 15 SP3:ocfs2-kmp-rt-5.3.18-150300.106.1.x86_64",
          "openSUSE Leap Micro 5.2:kernel-rt-5.3.18-150300.106.1.x86_64"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2022-3303",
          "url": "https://www.suse.com/security/cve/CVE-2022-3303"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1203769 for CVE-2022-3303",
          "url": "https://bugzilla.suse.com/1203769"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1212304 for CVE-2022-3303",
          "url": "https://bugzilla.suse.com/1212304"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "SUSE Linux Enterprise Micro 5.1:kernel-rt-5.3.18-150300.106.1.x86_64",
            "SUSE Linux Enterprise Micro 5.2:kernel-rt-5.3.18-150300.106.1.x86_64",
            "SUSE Real Time Module 15 SP3:cluster-md-kmp-rt-5.3.18-150300.106.1.x86_64",
            "SUSE Real Time Module 15 SP3:dlm-kmp-rt-5.3.18-150300.106.1.x86_64",
            "SUSE Real Time Module 15 SP3:gfs2-kmp-rt-5.3.18-150300.106.1.x86_64",
            "SUSE Real Time Module 15 SP3:kernel-devel-rt-5.3.18-150300.106.1.noarch",
            "SUSE Real Time Module 15 SP3:kernel-rt-5.3.18-150300.106.1.x86_64",
            "SUSE Real Time Module 15 SP3:kernel-rt-devel-5.3.18-150300.106.1.x86_64",
            "SUSE Real Time Module 15 SP3:kernel-rt_debug-devel-5.3.18-150300.106.1.x86_64",
            "SUSE Real Time Module 15 SP3:kernel-source-rt-5.3.18-150300.106.1.noarch",
            "SUSE Real Time Module 15 SP3:kernel-syms-rt-5.3.18-150300.106.1.x86_64",
            "SUSE Real Time Module 15 SP3:ocfs2-kmp-rt-5.3.18-150300.106.1.x86_64",
            "openSUSE Leap Micro 5.2:kernel-rt-5.3.18-150300.106.1.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 4.4,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H",
            "version": "3.1"
          },
          "products": [
            "SUSE Linux Enterprise Micro 5.1:kernel-rt-5.3.18-150300.106.1.x86_64",
            "SUSE Linux Enterprise Micro 5.2:kernel-rt-5.3.18-150300.106.1.x86_64",
            "SUSE Real Time Module 15 SP3:cluster-md-kmp-rt-5.3.18-150300.106.1.x86_64",
            "SUSE Real Time Module 15 SP3:dlm-kmp-rt-5.3.18-150300.106.1.x86_64",
            "SUSE Real Time Module 15 SP3:gfs2-kmp-rt-5.3.18-150300.106.1.x86_64",
            "SUSE Real Time Module 15 SP3:kernel-devel-rt-5.3.18-150300.106.1.noarch",
            "SUSE Real Time Module 15 SP3:kernel-rt-5.3.18-150300.106.1.x86_64",
            "SUSE Real Time Module 15 SP3:kernel-rt-devel-5.3.18-150300.106.1.x86_64",
            "SUSE Real Time Module 15 SP3:kernel-rt_debug-devel-5.3.18-150300.106.1.x86_64",
            "SUSE Real Time Module 15 SP3:kernel-source-rt-5.3.18-150300.106.1.noarch",
            "SUSE Real Time Module 15 SP3:kernel-syms-rt-5.3.18-150300.106.1.x86_64",
            "SUSE Real Time Module 15 SP3:ocfs2-kmp-rt-5.3.18-150300.106.1.x86_64",
            "openSUSE Leap Micro 5.2:kernel-rt-5.3.18-150300.106.1.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2022-10-31T08:28:31Z",
          "details": "moderate"
        }
      ],
      "title": "CVE-2022-3303"
    },
    {
      "cve": "CVE-2022-36879",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2022-36879"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "An issue was discovered in the Linux kernel through 5.18.14. xfrm_expand_policies in net/xfrm/xfrm_policy.c can cause a refcount to be dropped twice.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "SUSE Linux Enterprise Micro 5.1:kernel-rt-5.3.18-150300.106.1.x86_64",
          "SUSE Linux Enterprise Micro 5.2:kernel-rt-5.3.18-150300.106.1.x86_64",
          "SUSE Real Time Module 15 SP3:cluster-md-kmp-rt-5.3.18-150300.106.1.x86_64",
          "SUSE Real Time Module 15 SP3:dlm-kmp-rt-5.3.18-150300.106.1.x86_64",
          "SUSE Real Time Module 15 SP3:gfs2-kmp-rt-5.3.18-150300.106.1.x86_64",
          "SUSE Real Time Module 15 SP3:kernel-devel-rt-5.3.18-150300.106.1.noarch",
          "SUSE Real Time Module 15 SP3:kernel-rt-5.3.18-150300.106.1.x86_64",
          "SUSE Real Time Module 15 SP3:kernel-rt-devel-5.3.18-150300.106.1.x86_64",
          "SUSE Real Time Module 15 SP3:kernel-rt_debug-devel-5.3.18-150300.106.1.x86_64",
          "SUSE Real Time Module 15 SP3:kernel-source-rt-5.3.18-150300.106.1.noarch",
          "SUSE Real Time Module 15 SP3:kernel-syms-rt-5.3.18-150300.106.1.x86_64",
          "SUSE Real Time Module 15 SP3:ocfs2-kmp-rt-5.3.18-150300.106.1.x86_64",
          "openSUSE Leap Micro 5.2:kernel-rt-5.3.18-150300.106.1.x86_64"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2022-36879",
          "url": "https://www.suse.com/security/cve/CVE-2022-36879"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1201948 for CVE-2022-36879",
          "url": "https://bugzilla.suse.com/1201948"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1212327 for CVE-2022-36879",
          "url": "https://bugzilla.suse.com/1212327"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "SUSE Linux Enterprise Micro 5.1:kernel-rt-5.3.18-150300.106.1.x86_64",
            "SUSE Linux Enterprise Micro 5.2:kernel-rt-5.3.18-150300.106.1.x86_64",
            "SUSE Real Time Module 15 SP3:cluster-md-kmp-rt-5.3.18-150300.106.1.x86_64",
            "SUSE Real Time Module 15 SP3:dlm-kmp-rt-5.3.18-150300.106.1.x86_64",
            "SUSE Real Time Module 15 SP3:gfs2-kmp-rt-5.3.18-150300.106.1.x86_64",
            "SUSE Real Time Module 15 SP3:kernel-devel-rt-5.3.18-150300.106.1.noarch",
            "SUSE Real Time Module 15 SP3:kernel-rt-5.3.18-150300.106.1.x86_64",
            "SUSE Real Time Module 15 SP3:kernel-rt-devel-5.3.18-150300.106.1.x86_64",
            "SUSE Real Time Module 15 SP3:kernel-rt_debug-devel-5.3.18-150300.106.1.x86_64",
            "SUSE Real Time Module 15 SP3:kernel-source-rt-5.3.18-150300.106.1.noarch",
            "SUSE Real Time Module 15 SP3:kernel-syms-rt-5.3.18-150300.106.1.x86_64",
            "SUSE Real Time Module 15 SP3:ocfs2-kmp-rt-5.3.18-150300.106.1.x86_64",
            "openSUSE Leap Micro 5.2:kernel-rt-5.3.18-150300.106.1.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 4.1,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:N/I:N/A:H",
            "version": "3.1"
          },
          "products": [
            "SUSE Linux Enterprise Micro 5.1:kernel-rt-5.3.18-150300.106.1.x86_64",
            "SUSE Linux Enterprise Micro 5.2:kernel-rt-5.3.18-150300.106.1.x86_64",
            "SUSE Real Time Module 15 SP3:cluster-md-kmp-rt-5.3.18-150300.106.1.x86_64",
            "SUSE Real Time Module 15 SP3:dlm-kmp-rt-5.3.18-150300.106.1.x86_64",
            "SUSE Real Time Module 15 SP3:gfs2-kmp-rt-5.3.18-150300.106.1.x86_64",
            "SUSE Real Time Module 15 SP3:kernel-devel-rt-5.3.18-150300.106.1.noarch",
            "SUSE Real Time Module 15 SP3:kernel-rt-5.3.18-150300.106.1.x86_64",
            "SUSE Real Time Module 15 SP3:kernel-rt-devel-5.3.18-150300.106.1.x86_64",
            "SUSE Real Time Module 15 SP3:kernel-rt_debug-devel-5.3.18-150300.106.1.x86_64",
            "SUSE Real Time Module 15 SP3:kernel-source-rt-5.3.18-150300.106.1.noarch",
            "SUSE Real Time Module 15 SP3:kernel-syms-rt-5.3.18-150300.106.1.x86_64",
            "SUSE Real Time Module 15 SP3:ocfs2-kmp-rt-5.3.18-150300.106.1.x86_64",
            "openSUSE Leap Micro 5.2:kernel-rt-5.3.18-150300.106.1.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2022-10-31T08:28:31Z",
          "details": "moderate"
        }
      ],
      "title": "CVE-2022-36879"
    },
    {
      "cve": "CVE-2022-39188",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2022-39188"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "An issue was discovered in include/asm-generic/tlb.h in the Linux kernel before 5.19. Because of a race condition (unmap_mapping_range versus munmap), a device driver can free a page while it still has stale TLB entries. This only occurs in situations with VM_PFNMAP VMAs.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "SUSE Linux Enterprise Micro 5.1:kernel-rt-5.3.18-150300.106.1.x86_64",
          "SUSE Linux Enterprise Micro 5.2:kernel-rt-5.3.18-150300.106.1.x86_64",
          "SUSE Real Time Module 15 SP3:cluster-md-kmp-rt-5.3.18-150300.106.1.x86_64",
          "SUSE Real Time Module 15 SP3:dlm-kmp-rt-5.3.18-150300.106.1.x86_64",
          "SUSE Real Time Module 15 SP3:gfs2-kmp-rt-5.3.18-150300.106.1.x86_64",
          "SUSE Real Time Module 15 SP3:kernel-devel-rt-5.3.18-150300.106.1.noarch",
          "SUSE Real Time Module 15 SP3:kernel-rt-5.3.18-150300.106.1.x86_64",
          "SUSE Real Time Module 15 SP3:kernel-rt-devel-5.3.18-150300.106.1.x86_64",
          "SUSE Real Time Module 15 SP3:kernel-rt_debug-devel-5.3.18-150300.106.1.x86_64",
          "SUSE Real Time Module 15 SP3:kernel-source-rt-5.3.18-150300.106.1.noarch",
          "SUSE Real Time Module 15 SP3:kernel-syms-rt-5.3.18-150300.106.1.x86_64",
          "SUSE Real Time Module 15 SP3:ocfs2-kmp-rt-5.3.18-150300.106.1.x86_64",
          "openSUSE Leap Micro 5.2:kernel-rt-5.3.18-150300.106.1.x86_64"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2022-39188",
          "url": "https://www.suse.com/security/cve/CVE-2022-39188"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1203107 for CVE-2022-39188",
          "url": "https://bugzilla.suse.com/1203107"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1203116 for CVE-2022-39188",
          "url": "https://bugzilla.suse.com/1203116"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1205313 for CVE-2022-39188",
          "url": "https://bugzilla.suse.com/1205313"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1209225 for CVE-2022-39188",
          "url": "https://bugzilla.suse.com/1209225"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1212326 for CVE-2022-39188",
          "url": "https://bugzilla.suse.com/1212326"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "SUSE Linux Enterprise Micro 5.1:kernel-rt-5.3.18-150300.106.1.x86_64",
            "SUSE Linux Enterprise Micro 5.2:kernel-rt-5.3.18-150300.106.1.x86_64",
            "SUSE Real Time Module 15 SP3:cluster-md-kmp-rt-5.3.18-150300.106.1.x86_64",
            "SUSE Real Time Module 15 SP3:dlm-kmp-rt-5.3.18-150300.106.1.x86_64",
            "SUSE Real Time Module 15 SP3:gfs2-kmp-rt-5.3.18-150300.106.1.x86_64",
            "SUSE Real Time Module 15 SP3:kernel-devel-rt-5.3.18-150300.106.1.noarch",
            "SUSE Real Time Module 15 SP3:kernel-rt-5.3.18-150300.106.1.x86_64",
            "SUSE Real Time Module 15 SP3:kernel-rt-devel-5.3.18-150300.106.1.x86_64",
            "SUSE Real Time Module 15 SP3:kernel-rt_debug-devel-5.3.18-150300.106.1.x86_64",
            "SUSE Real Time Module 15 SP3:kernel-source-rt-5.3.18-150300.106.1.noarch",
            "SUSE Real Time Module 15 SP3:kernel-syms-rt-5.3.18-150300.106.1.x86_64",
            "SUSE Real Time Module 15 SP3:ocfs2-kmp-rt-5.3.18-150300.106.1.x86_64",
            "openSUSE Leap Micro 5.2:kernel-rt-5.3.18-150300.106.1.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 7,
            "baseSeverity": "HIGH",
            "vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H",
            "version": "3.1"
          },
          "products": [
            "SUSE Linux Enterprise Micro 5.1:kernel-rt-5.3.18-150300.106.1.x86_64",
            "SUSE Linux Enterprise Micro 5.2:kernel-rt-5.3.18-150300.106.1.x86_64",
            "SUSE Real Time Module 15 SP3:cluster-md-kmp-rt-5.3.18-150300.106.1.x86_64",
            "SUSE Real Time Module 15 SP3:dlm-kmp-rt-5.3.18-150300.106.1.x86_64",
            "SUSE Real Time Module 15 SP3:gfs2-kmp-rt-5.3.18-150300.106.1.x86_64",
            "SUSE Real Time Module 15 SP3:kernel-devel-rt-5.3.18-150300.106.1.noarch",
            "SUSE Real Time Module 15 SP3:kernel-rt-5.3.18-150300.106.1.x86_64",
            "SUSE Real Time Module 15 SP3:kernel-rt-devel-5.3.18-150300.106.1.x86_64",
            "SUSE Real Time Module 15 SP3:kernel-rt_debug-devel-5.3.18-150300.106.1.x86_64",
            "SUSE Real Time Module 15 SP3:kernel-source-rt-5.3.18-150300.106.1.noarch",
            "SUSE Real Time Module 15 SP3:kernel-syms-rt-5.3.18-150300.106.1.x86_64",
            "SUSE Real Time Module 15 SP3:ocfs2-kmp-rt-5.3.18-150300.106.1.x86_64",
            "openSUSE Leap Micro 5.2:kernel-rt-5.3.18-150300.106.1.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2022-10-31T08:28:31Z",
          "details": "moderate"
        }
      ],
      "title": "CVE-2022-39188"
    },
    {
      "cve": "CVE-2022-39190",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2022-39190"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "An issue was discovered in net/netfilter/nf_tables_api.c in the Linux kernel before 5.19.6. A denial of service can occur upon binding to an already bound chain.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "SUSE Linux Enterprise Micro 5.1:kernel-rt-5.3.18-150300.106.1.x86_64",
          "SUSE Linux Enterprise Micro 5.2:kernel-rt-5.3.18-150300.106.1.x86_64",
          "SUSE Real Time Module 15 SP3:cluster-md-kmp-rt-5.3.18-150300.106.1.x86_64",
          "SUSE Real Time Module 15 SP3:dlm-kmp-rt-5.3.18-150300.106.1.x86_64",
          "SUSE Real Time Module 15 SP3:gfs2-kmp-rt-5.3.18-150300.106.1.x86_64",
          "SUSE Real Time Module 15 SP3:kernel-devel-rt-5.3.18-150300.106.1.noarch",
          "SUSE Real Time Module 15 SP3:kernel-rt-5.3.18-150300.106.1.x86_64",
          "SUSE Real Time Module 15 SP3:kernel-rt-devel-5.3.18-150300.106.1.x86_64",
          "SUSE Real Time Module 15 SP3:kernel-rt_debug-devel-5.3.18-150300.106.1.x86_64",
          "SUSE Real Time Module 15 SP3:kernel-source-rt-5.3.18-150300.106.1.noarch",
          "SUSE Real Time Module 15 SP3:kernel-syms-rt-5.3.18-150300.106.1.x86_64",
          "SUSE Real Time Module 15 SP3:ocfs2-kmp-rt-5.3.18-150300.106.1.x86_64",
          "openSUSE Leap Micro 5.2:kernel-rt-5.3.18-150300.106.1.x86_64"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2022-39190",
          "url": "https://www.suse.com/security/cve/CVE-2022-39190"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1203117 for CVE-2022-39190",
          "url": "https://bugzilla.suse.com/1203117"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "SUSE Linux Enterprise Micro 5.1:kernel-rt-5.3.18-150300.106.1.x86_64",
            "SUSE Linux Enterprise Micro 5.2:kernel-rt-5.3.18-150300.106.1.x86_64",
            "SUSE Real Time Module 15 SP3:cluster-md-kmp-rt-5.3.18-150300.106.1.x86_64",
            "SUSE Real Time Module 15 SP3:dlm-kmp-rt-5.3.18-150300.106.1.x86_64",
            "SUSE Real Time Module 15 SP3:gfs2-kmp-rt-5.3.18-150300.106.1.x86_64",
            "SUSE Real Time Module 15 SP3:kernel-devel-rt-5.3.18-150300.106.1.noarch",
            "SUSE Real Time Module 15 SP3:kernel-rt-5.3.18-150300.106.1.x86_64",
            "SUSE Real Time Module 15 SP3:kernel-rt-devel-5.3.18-150300.106.1.x86_64",
            "SUSE Real Time Module 15 SP3:kernel-rt_debug-devel-5.3.18-150300.106.1.x86_64",
            "SUSE Real Time Module 15 SP3:kernel-source-rt-5.3.18-150300.106.1.noarch",
            "SUSE Real Time Module 15 SP3:kernel-syms-rt-5.3.18-150300.106.1.x86_64",
            "SUSE Real Time Module 15 SP3:ocfs2-kmp-rt-5.3.18-150300.106.1.x86_64",
            "openSUSE Leap Micro 5.2:kernel-rt-5.3.18-150300.106.1.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 5.5,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
            "version": "3.1"
          },
          "products": [
            "SUSE Linux Enterprise Micro 5.1:kernel-rt-5.3.18-150300.106.1.x86_64",
            "SUSE Linux Enterprise Micro 5.2:kernel-rt-5.3.18-150300.106.1.x86_64",
            "SUSE Real Time Module 15 SP3:cluster-md-kmp-rt-5.3.18-150300.106.1.x86_64",
            "SUSE Real Time Module 15 SP3:dlm-kmp-rt-5.3.18-150300.106.1.x86_64",
            "SUSE Real Time Module 15 SP3:gfs2-kmp-rt-5.3.18-150300.106.1.x86_64",
            "SUSE Real Time Module 15 SP3:kernel-devel-rt-5.3.18-150300.106.1.noarch",
            "SUSE Real Time Module 15 SP3:kernel-rt-5.3.18-150300.106.1.x86_64",
            "SUSE Real Time Module 15 SP3:kernel-rt-devel-5.3.18-150300.106.1.x86_64",
            "SUSE Real Time Module 15 SP3:kernel-rt_debug-devel-5.3.18-150300.106.1.x86_64",
            "SUSE Real Time Module 15 SP3:kernel-source-rt-5.3.18-150300.106.1.noarch",
            "SUSE Real Time Module 15 SP3:kernel-syms-rt-5.3.18-150300.106.1.x86_64",
            "SUSE Real Time Module 15 SP3:ocfs2-kmp-rt-5.3.18-150300.106.1.x86_64",
            "openSUSE Leap Micro 5.2:kernel-rt-5.3.18-150300.106.1.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2022-10-31T08:28:31Z",
          "details": "moderate"
        }
      ],
      "title": "CVE-2022-39190"
    },
    {
      "cve": "CVE-2022-40768",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2022-40768"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "drivers/scsi/stex.c in the Linux kernel through 5.19.9 allows local users to obtain sensitive information from kernel memory because stex_queuecommand_lck lacks a memset for the PASSTHRU_CMD case.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "SUSE Linux Enterprise Micro 5.1:kernel-rt-5.3.18-150300.106.1.x86_64",
          "SUSE Linux Enterprise Micro 5.2:kernel-rt-5.3.18-150300.106.1.x86_64",
          "SUSE Real Time Module 15 SP3:cluster-md-kmp-rt-5.3.18-150300.106.1.x86_64",
          "SUSE Real Time Module 15 SP3:dlm-kmp-rt-5.3.18-150300.106.1.x86_64",
          "SUSE Real Time Module 15 SP3:gfs2-kmp-rt-5.3.18-150300.106.1.x86_64",
          "SUSE Real Time Module 15 SP3:kernel-devel-rt-5.3.18-150300.106.1.noarch",
          "SUSE Real Time Module 15 SP3:kernel-rt-5.3.18-150300.106.1.x86_64",
          "SUSE Real Time Module 15 SP3:kernel-rt-devel-5.3.18-150300.106.1.x86_64",
          "SUSE Real Time Module 15 SP3:kernel-rt_debug-devel-5.3.18-150300.106.1.x86_64",
          "SUSE Real Time Module 15 SP3:kernel-source-rt-5.3.18-150300.106.1.noarch",
          "SUSE Real Time Module 15 SP3:kernel-syms-rt-5.3.18-150300.106.1.x86_64",
          "SUSE Real Time Module 15 SP3:ocfs2-kmp-rt-5.3.18-150300.106.1.x86_64",
          "openSUSE Leap Micro 5.2:kernel-rt-5.3.18-150300.106.1.x86_64"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2022-40768",
          "url": "https://www.suse.com/security/cve/CVE-2022-40768"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1203514 for CVE-2022-40768",
          "url": "https://bugzilla.suse.com/1203514"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "SUSE Linux Enterprise Micro 5.1:kernel-rt-5.3.18-150300.106.1.x86_64",
            "SUSE Linux Enterprise Micro 5.2:kernel-rt-5.3.18-150300.106.1.x86_64",
            "SUSE Real Time Module 15 SP3:cluster-md-kmp-rt-5.3.18-150300.106.1.x86_64",
            "SUSE Real Time Module 15 SP3:dlm-kmp-rt-5.3.18-150300.106.1.x86_64",
            "SUSE Real Time Module 15 SP3:gfs2-kmp-rt-5.3.18-150300.106.1.x86_64",
            "SUSE Real Time Module 15 SP3:kernel-devel-rt-5.3.18-150300.106.1.noarch",
            "SUSE Real Time Module 15 SP3:kernel-rt-5.3.18-150300.106.1.x86_64",
            "SUSE Real Time Module 15 SP3:kernel-rt-devel-5.3.18-150300.106.1.x86_64",
            "SUSE Real Time Module 15 SP3:kernel-rt_debug-devel-5.3.18-150300.106.1.x86_64",
            "SUSE Real Time Module 15 SP3:kernel-source-rt-5.3.18-150300.106.1.noarch",
            "SUSE Real Time Module 15 SP3:kernel-syms-rt-5.3.18-150300.106.1.x86_64",
            "SUSE Real Time Module 15 SP3:ocfs2-kmp-rt-5.3.18-150300.106.1.x86_64",
            "openSUSE Leap Micro 5.2:kernel-rt-5.3.18-150300.106.1.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 5.5,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N",
            "version": "3.1"
          },
          "products": [
            "SUSE Linux Enterprise Micro 5.1:kernel-rt-5.3.18-150300.106.1.x86_64",
            "SUSE Linux Enterprise Micro 5.2:kernel-rt-5.3.18-150300.106.1.x86_64",
            "SUSE Real Time Module 15 SP3:cluster-md-kmp-rt-5.3.18-150300.106.1.x86_64",
            "SUSE Real Time Module 15 SP3:dlm-kmp-rt-5.3.18-150300.106.1.x86_64",
            "SUSE Real Time Module 15 SP3:gfs2-kmp-rt-5.3.18-150300.106.1.x86_64",
            "SUSE Real Time Module 15 SP3:kernel-devel-rt-5.3.18-150300.106.1.noarch",
            "SUSE Real Time Module 15 SP3:kernel-rt-5.3.18-150300.106.1.x86_64",
            "SUSE Real Time Module 15 SP3:kernel-rt-devel-5.3.18-150300.106.1.x86_64",
            "SUSE Real Time Module 15 SP3:kernel-rt_debug-devel-5.3.18-150300.106.1.x86_64",
            "SUSE Real Time Module 15 SP3:kernel-source-rt-5.3.18-150300.106.1.noarch",
            "SUSE Real Time Module 15 SP3:kernel-syms-rt-5.3.18-150300.106.1.x86_64",
            "SUSE Real Time Module 15 SP3:ocfs2-kmp-rt-5.3.18-150300.106.1.x86_64",
            "openSUSE Leap Micro 5.2:kernel-rt-5.3.18-150300.106.1.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2022-10-31T08:28:31Z",
          "details": "moderate"
        }
      ],
      "title": "CVE-2022-40768"
    },
    {
      "cve": "CVE-2022-41218",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2022-41218"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "In drivers/media/dvb-core/dmxdev.c in the Linux kernel through 5.19.10, there is a use-after-free caused by refcount races, affecting dvb_demux_open and dvb_dmxdev_release.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "SUSE Linux Enterprise Micro 5.1:kernel-rt-5.3.18-150300.106.1.x86_64",
          "SUSE Linux Enterprise Micro 5.2:kernel-rt-5.3.18-150300.106.1.x86_64",
          "SUSE Real Time Module 15 SP3:cluster-md-kmp-rt-5.3.18-150300.106.1.x86_64",
          "SUSE Real Time Module 15 SP3:dlm-kmp-rt-5.3.18-150300.106.1.x86_64",
          "SUSE Real Time Module 15 SP3:gfs2-kmp-rt-5.3.18-150300.106.1.x86_64",
          "SUSE Real Time Module 15 SP3:kernel-devel-rt-5.3.18-150300.106.1.noarch",
          "SUSE Real Time Module 15 SP3:kernel-rt-5.3.18-150300.106.1.x86_64",
          "SUSE Real Time Module 15 SP3:kernel-rt-devel-5.3.18-150300.106.1.x86_64",
          "SUSE Real Time Module 15 SP3:kernel-rt_debug-devel-5.3.18-150300.106.1.x86_64",
          "SUSE Real Time Module 15 SP3:kernel-source-rt-5.3.18-150300.106.1.noarch",
          "SUSE Real Time Module 15 SP3:kernel-syms-rt-5.3.18-150300.106.1.x86_64",
          "SUSE Real Time Module 15 SP3:ocfs2-kmp-rt-5.3.18-150300.106.1.x86_64",
          "openSUSE Leap Micro 5.2:kernel-rt-5.3.18-150300.106.1.x86_64"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2022-41218",
          "url": "https://www.suse.com/security/cve/CVE-2022-41218"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1202960 for CVE-2022-41218",
          "url": "https://bugzilla.suse.com/1202960"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1203606 for CVE-2022-41218",
          "url": "https://bugzilla.suse.com/1203606"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1205313 for CVE-2022-41218",
          "url": "https://bugzilla.suse.com/1205313"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1209225 for CVE-2022-41218",
          "url": "https://bugzilla.suse.com/1209225"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "SUSE Linux Enterprise Micro 5.1:kernel-rt-5.3.18-150300.106.1.x86_64",
            "SUSE Linux Enterprise Micro 5.2:kernel-rt-5.3.18-150300.106.1.x86_64",
            "SUSE Real Time Module 15 SP3:cluster-md-kmp-rt-5.3.18-150300.106.1.x86_64",
            "SUSE Real Time Module 15 SP3:dlm-kmp-rt-5.3.18-150300.106.1.x86_64",
            "SUSE Real Time Module 15 SP3:gfs2-kmp-rt-5.3.18-150300.106.1.x86_64",
            "SUSE Real Time Module 15 SP3:kernel-devel-rt-5.3.18-150300.106.1.noarch",
            "SUSE Real Time Module 15 SP3:kernel-rt-5.3.18-150300.106.1.x86_64",
            "SUSE Real Time Module 15 SP3:kernel-rt-devel-5.3.18-150300.106.1.x86_64",
            "SUSE Real Time Module 15 SP3:kernel-rt_debug-devel-5.3.18-150300.106.1.x86_64",
            "SUSE Real Time Module 15 SP3:kernel-source-rt-5.3.18-150300.106.1.noarch",
            "SUSE Real Time Module 15 SP3:kernel-syms-rt-5.3.18-150300.106.1.x86_64",
            "SUSE Real Time Module 15 SP3:ocfs2-kmp-rt-5.3.18-150300.106.1.x86_64",
            "openSUSE Leap Micro 5.2:kernel-rt-5.3.18-150300.106.1.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 8.4,
            "baseSeverity": "HIGH",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
            "version": "3.1"
          },
          "products": [
            "SUSE Linux Enterprise Micro 5.1:kernel-rt-5.3.18-150300.106.1.x86_64",
            "SUSE Linux Enterprise Micro 5.2:kernel-rt-5.3.18-150300.106.1.x86_64",
            "SUSE Real Time Module 15 SP3:cluster-md-kmp-rt-5.3.18-150300.106.1.x86_64",
            "SUSE Real Time Module 15 SP3:dlm-kmp-rt-5.3.18-150300.106.1.x86_64",
            "SUSE Real Time Module 15 SP3:gfs2-kmp-rt-5.3.18-150300.106.1.x86_64",
            "SUSE Real Time Module 15 SP3:kernel-devel-rt-5.3.18-150300.106.1.noarch",
            "SUSE Real Time Module 15 SP3:kernel-rt-5.3.18-150300.106.1.x86_64",
            "SUSE Real Time Module 15 SP3:kernel-rt-devel-5.3.18-150300.106.1.x86_64",
            "SUSE Real Time Module 15 SP3:kernel-rt_debug-devel-5.3.18-150300.106.1.x86_64",
            "SUSE Real Time Module 15 SP3:kernel-source-rt-5.3.18-150300.106.1.noarch",
            "SUSE Real Time Module 15 SP3:kernel-syms-rt-5.3.18-150300.106.1.x86_64",
            "SUSE Real Time Module 15 SP3:ocfs2-kmp-rt-5.3.18-150300.106.1.x86_64",
            "openSUSE Leap Micro 5.2:kernel-rt-5.3.18-150300.106.1.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2022-10-31T08:28:31Z",
          "details": "important"
        }
      ],
      "title": "CVE-2022-41218"
    },
    {
      "cve": "CVE-2022-41222",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2022-41222"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "mm/mremap.c in the Linux kernel before 5.13.3 has a use-after-free via a stale TLB because an rmap lock is not held during a PUD move.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "SUSE Linux Enterprise Micro 5.1:kernel-rt-5.3.18-150300.106.1.x86_64",
          "SUSE Linux Enterprise Micro 5.2:kernel-rt-5.3.18-150300.106.1.x86_64",
          "SUSE Real Time Module 15 SP3:cluster-md-kmp-rt-5.3.18-150300.106.1.x86_64",
          "SUSE Real Time Module 15 SP3:dlm-kmp-rt-5.3.18-150300.106.1.x86_64",
          "SUSE Real Time Module 15 SP3:gfs2-kmp-rt-5.3.18-150300.106.1.x86_64",
          "SUSE Real Time Module 15 SP3:kernel-devel-rt-5.3.18-150300.106.1.noarch",
          "SUSE Real Time Module 15 SP3:kernel-rt-5.3.18-150300.106.1.x86_64",
          "SUSE Real Time Module 15 SP3:kernel-rt-devel-5.3.18-150300.106.1.x86_64",
          "SUSE Real Time Module 15 SP3:kernel-rt_debug-devel-5.3.18-150300.106.1.x86_64",
          "SUSE Real Time Module 15 SP3:kernel-source-rt-5.3.18-150300.106.1.noarch",
          "SUSE Real Time Module 15 SP3:kernel-syms-rt-5.3.18-150300.106.1.x86_64",
          "SUSE Real Time Module 15 SP3:ocfs2-kmp-rt-5.3.18-150300.106.1.x86_64",
          "openSUSE Leap Micro 5.2:kernel-rt-5.3.18-150300.106.1.x86_64"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2022-41222",
          "url": "https://www.suse.com/security/cve/CVE-2022-41222"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1203622 for CVE-2022-41222",
          "url": "https://bugzilla.suse.com/1203622"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1203624 for CVE-2022-41222",
          "url": "https://bugzilla.suse.com/1203624"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1209225 for CVE-2022-41222",
          "url": "https://bugzilla.suse.com/1209225"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1209476 for CVE-2022-41222",
          "url": "https://bugzilla.suse.com/1209476"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "SUSE Linux Enterprise Micro 5.1:kernel-rt-5.3.18-150300.106.1.x86_64",
            "SUSE Linux Enterprise Micro 5.2:kernel-rt-5.3.18-150300.106.1.x86_64",
            "SUSE Real Time Module 15 SP3:cluster-md-kmp-rt-5.3.18-150300.106.1.x86_64",
            "SUSE Real Time Module 15 SP3:dlm-kmp-rt-5.3.18-150300.106.1.x86_64",
            "SUSE Real Time Module 15 SP3:gfs2-kmp-rt-5.3.18-150300.106.1.x86_64",
            "SUSE Real Time Module 15 SP3:kernel-devel-rt-5.3.18-150300.106.1.noarch",
            "SUSE Real Time Module 15 SP3:kernel-rt-5.3.18-150300.106.1.x86_64",
            "SUSE Real Time Module 15 SP3:kernel-rt-devel-5.3.18-150300.106.1.x86_64",
            "SUSE Real Time Module 15 SP3:kernel-rt_debug-devel-5.3.18-150300.106.1.x86_64",
            "SUSE Real Time Module 15 SP3:kernel-source-rt-5.3.18-150300.106.1.noarch",
            "SUSE Real Time Module 15 SP3:kernel-syms-rt-5.3.18-150300.106.1.x86_64",
            "SUSE Real Time Module 15 SP3:ocfs2-kmp-rt-5.3.18-150300.106.1.x86_64",
            "openSUSE Leap Micro 5.2:kernel-rt-5.3.18-150300.106.1.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 7,
            "baseSeverity": "HIGH",
            "vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H",
            "version": "3.1"
          },
          "products": [
            "SUSE Linux Enterprise Micro 5.1:kernel-rt-5.3.18-150300.106.1.x86_64",
            "SUSE Linux Enterprise Micro 5.2:kernel-rt-5.3.18-150300.106.1.x86_64",
            "SUSE Real Time Module 15 SP3:cluster-md-kmp-rt-5.3.18-150300.106.1.x86_64",
            "SUSE Real Time Module 15 SP3:dlm-kmp-rt-5.3.18-150300.106.1.x86_64",
            "SUSE Real Time Module 15 SP3:gfs2-kmp-rt-5.3.18-150300.106.1.x86_64",
            "SUSE Real Time Module 15 SP3:kernel-devel-rt-5.3.18-150300.106.1.noarch",
            "SUSE Real Time Module 15 SP3:kernel-rt-5.3.18-150300.106.1.x86_64",
            "SUSE Real Time Module 15 SP3:kernel-rt-devel-5.3.18-150300.106.1.x86_64",
            "SUSE Real Time Module 15 SP3:kernel-rt_debug-devel-5.3.18-150300.106.1.x86_64",
            "SUSE Real Time Module 15 SP3:kernel-source-rt-5.3.18-150300.106.1.noarch",
            "SUSE Real Time Module 15 SP3:kernel-syms-rt-5.3.18-150300.106.1.x86_64",
            "SUSE Real Time Module 15 SP3:ocfs2-kmp-rt-5.3.18-150300.106.1.x86_64",
            "openSUSE Leap Micro 5.2:kernel-rt-5.3.18-150300.106.1.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2022-10-31T08:28:31Z",
          "details": "moderate"
        }
      ],
      "title": "CVE-2022-41222"
    },
    {
      "cve": "CVE-2022-41674",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2022-41674"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "An issue was discovered in the Linux kernel before 5.19.16. Attackers able to inject WLAN frames could cause a buffer overflow in the ieee80211_bss_info_update function in net/mac80211/scan.c.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "SUSE Linux Enterprise Micro 5.1:kernel-rt-5.3.18-150300.106.1.x86_64",
          "SUSE Linux Enterprise Micro 5.2:kernel-rt-5.3.18-150300.106.1.x86_64",
          "SUSE Real Time Module 15 SP3:cluster-md-kmp-rt-5.3.18-150300.106.1.x86_64",
          "SUSE Real Time Module 15 SP3:dlm-kmp-rt-5.3.18-150300.106.1.x86_64",
          "SUSE Real Time Module 15 SP3:gfs2-kmp-rt-5.3.18-150300.106.1.x86_64",
          "SUSE Real Time Module 15 SP3:kernel-devel-rt-5.3.18-150300.106.1.noarch",
          "SUSE Real Time Module 15 SP3:kernel-rt-5.3.18-150300.106.1.x86_64",
          "SUSE Real Time Module 15 SP3:kernel-rt-devel-5.3.18-150300.106.1.x86_64",
          "SUSE Real Time Module 15 SP3:kernel-rt_debug-devel-5.3.18-150300.106.1.x86_64",
          "SUSE Real Time Module 15 SP3:kernel-source-rt-5.3.18-150300.106.1.noarch",
          "SUSE Real Time Module 15 SP3:kernel-syms-rt-5.3.18-150300.106.1.x86_64",
          "SUSE Real Time Module 15 SP3:ocfs2-kmp-rt-5.3.18-150300.106.1.x86_64",
          "openSUSE Leap Micro 5.2:kernel-rt-5.3.18-150300.106.1.x86_64"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2022-41674",
          "url": "https://www.suse.com/security/cve/CVE-2022-41674"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1203770 for CVE-2022-41674",
          "url": "https://bugzilla.suse.com/1203770"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1203994 for CVE-2022-41674",
          "url": "https://bugzilla.suse.com/1203994"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1209225 for CVE-2022-41674",
          "url": "https://bugzilla.suse.com/1209225"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "SUSE Linux Enterprise Micro 5.1:kernel-rt-5.3.18-150300.106.1.x86_64",
            "SUSE Linux Enterprise Micro 5.2:kernel-rt-5.3.18-150300.106.1.x86_64",
            "SUSE Real Time Module 15 SP3:cluster-md-kmp-rt-5.3.18-150300.106.1.x86_64",
            "SUSE Real Time Module 15 SP3:dlm-kmp-rt-5.3.18-150300.106.1.x86_64",
            "SUSE Real Time Module 15 SP3:gfs2-kmp-rt-5.3.18-150300.106.1.x86_64",
            "SUSE Real Time Module 15 SP3:kernel-devel-rt-5.3.18-150300.106.1.noarch",
            "SUSE Real Time Module 15 SP3:kernel-rt-5.3.18-150300.106.1.x86_64",
            "SUSE Real Time Module 15 SP3:kernel-rt-devel-5.3.18-150300.106.1.x86_64",
            "SUSE Real Time Module 15 SP3:kernel-rt_debug-devel-5.3.18-150300.106.1.x86_64",
            "SUSE Real Time Module 15 SP3:kernel-source-rt-5.3.18-150300.106.1.noarch",
            "SUSE Real Time Module 15 SP3:kernel-syms-rt-5.3.18-150300.106.1.x86_64",
            "SUSE Real Time Module 15 SP3:ocfs2-kmp-rt-5.3.18-150300.106.1.x86_64",
            "openSUSE Leap Micro 5.2:kernel-rt-5.3.18-150300.106.1.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 8.8,
            "baseSeverity": "HIGH",
            "vectorString": "CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
            "version": "3.1"
          },
          "products": [
            "SUSE Linux Enterprise Micro 5.1:kernel-rt-5.3.18-150300.106.1.x86_64",
            "SUSE Linux Enterprise Micro 5.2:kernel-rt-5.3.18-150300.106.1.x86_64",
            "SUSE Real Time Module 15 SP3:cluster-md-kmp-rt-5.3.18-150300.106.1.x86_64",
            "SUSE Real Time Module 15 SP3:dlm-kmp-rt-5.3.18-150300.106.1.x86_64",
            "SUSE Real Time Module 15 SP3:gfs2-kmp-rt-5.3.18-150300.106.1.x86_64",
            "SUSE Real Time Module 15 SP3:kernel-devel-rt-5.3.18-150300.106.1.noarch",
            "SUSE Real Time Module 15 SP3:kernel-rt-5.3.18-150300.106.1.x86_64",
            "SUSE Real Time Module 15 SP3:kernel-rt-devel-5.3.18-150300.106.1.x86_64",
            "SUSE Real Time Module 15 SP3:kernel-rt_debug-devel-5.3.18-150300.106.1.x86_64",
            "SUSE Real Time Module 15 SP3:kernel-source-rt-5.3.18-150300.106.1.noarch",
            "SUSE Real Time Module 15 SP3:kernel-syms-rt-5.3.18-150300.106.1.x86_64",
            "SUSE Real Time Module 15 SP3:ocfs2-kmp-rt-5.3.18-150300.106.1.x86_64",
            "openSUSE Leap Micro 5.2:kernel-rt-5.3.18-150300.106.1.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2022-10-31T08:28:31Z",
          "details": "important"
        }
      ],
      "title": "CVE-2022-41674"
    },
    {
      "cve": "CVE-2022-41848",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2022-41848"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "drivers/char/pcmcia/synclink_cs.c in the Linux kernel through 5.19.12 has a race condition and resultant use-after-free if a physically proximate attacker removes a PCMCIA device while calling ioctl, aka a race condition between mgslpc_ioctl and mgslpc_detach.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "SUSE Linux Enterprise Micro 5.1:kernel-rt-5.3.18-150300.106.1.x86_64",
          "SUSE Linux Enterprise Micro 5.2:kernel-rt-5.3.18-150300.106.1.x86_64",
          "SUSE Real Time Module 15 SP3:cluster-md-kmp-rt-5.3.18-150300.106.1.x86_64",
          "SUSE Real Time Module 15 SP3:dlm-kmp-rt-5.3.18-150300.106.1.x86_64",
          "SUSE Real Time Module 15 SP3:gfs2-kmp-rt-5.3.18-150300.106.1.x86_64",
          "SUSE Real Time Module 15 SP3:kernel-devel-rt-5.3.18-150300.106.1.noarch",
          "SUSE Real Time Module 15 SP3:kernel-rt-5.3.18-150300.106.1.x86_64",
          "SUSE Real Time Module 15 SP3:kernel-rt-devel-5.3.18-150300.106.1.x86_64",
          "SUSE Real Time Module 15 SP3:kernel-rt_debug-devel-5.3.18-150300.106.1.x86_64",
          "SUSE Real Time Module 15 SP3:kernel-source-rt-5.3.18-150300.106.1.noarch",
          "SUSE Real Time Module 15 SP3:kernel-syms-rt-5.3.18-150300.106.1.x86_64",
          "SUSE Real Time Module 15 SP3:ocfs2-kmp-rt-5.3.18-150300.106.1.x86_64",
          "openSUSE Leap Micro 5.2:kernel-rt-5.3.18-150300.106.1.x86_64"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2022-41848",
          "url": "https://www.suse.com/security/cve/CVE-2022-41848"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1203987 for CVE-2022-41848",
          "url": "https://bugzilla.suse.com/1203987"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1211484 for CVE-2022-41848",
          "url": "https://bugzilla.suse.com/1211484"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1212317 for CVE-2022-41848",
          "url": "https://bugzilla.suse.com/1212317"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "SUSE Linux Enterprise Micro 5.1:kernel-rt-5.3.18-150300.106.1.x86_64",
            "SUSE Linux Enterprise Micro 5.2:kernel-rt-5.3.18-150300.106.1.x86_64",
            "SUSE Real Time Module 15 SP3:cluster-md-kmp-rt-5.3.18-150300.106.1.x86_64",
            "SUSE Real Time Module 15 SP3:dlm-kmp-rt-5.3.18-150300.106.1.x86_64",
            "SUSE Real Time Module 15 SP3:gfs2-kmp-rt-5.3.18-150300.106.1.x86_64",
            "SUSE Real Time Module 15 SP3:kernel-devel-rt-5.3.18-150300.106.1.noarch",
            "SUSE Real Time Module 15 SP3:kernel-rt-5.3.18-150300.106.1.x86_64",
            "SUSE Real Time Module 15 SP3:kernel-rt-devel-5.3.18-150300.106.1.x86_64",
            "SUSE Real Time Module 15 SP3:kernel-rt_debug-devel-5.3.18-150300.106.1.x86_64",
            "SUSE Real Time Module 15 SP3:kernel-source-rt-5.3.18-150300.106.1.noarch",
            "SUSE Real Time Module 15 SP3:kernel-syms-rt-5.3.18-150300.106.1.x86_64",
            "SUSE Real Time Module 15 SP3:ocfs2-kmp-rt-5.3.18-150300.106.1.x86_64",
            "openSUSE Leap Micro 5.2:kernel-rt-5.3.18-150300.106.1.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 6.4,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:P/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H",
            "version": "3.1"
          },
          "products": [
            "SUSE Linux Enterprise Micro 5.1:kernel-rt-5.3.18-150300.106.1.x86_64",
            "SUSE Linux Enterprise Micro 5.2:kernel-rt-5.3.18-150300.106.1.x86_64",
            "SUSE Real Time Module 15 SP3:cluster-md-kmp-rt-5.3.18-150300.106.1.x86_64",
            "SUSE Real Time Module 15 SP3:dlm-kmp-rt-5.3.18-150300.106.1.x86_64",
            "SUSE Real Time Module 15 SP3:gfs2-kmp-rt-5.3.18-150300.106.1.x86_64",
            "SUSE Real Time Module 15 SP3:kernel-devel-rt-5.3.18-150300.106.1.noarch",
            "SUSE Real Time Module 15 SP3:kernel-rt-5.3.18-150300.106.1.x86_64",
            "SUSE Real Time Module 15 SP3:kernel-rt-devel-5.3.18-150300.106.1.x86_64",
            "SUSE Real Time Module 15 SP3:kernel-rt_debug-devel-5.3.18-150300.106.1.x86_64",
            "SUSE Real Time Module 15 SP3:kernel-source-rt-5.3.18-150300.106.1.noarch",
            "SUSE Real Time Module 15 SP3:kernel-syms-rt-5.3.18-150300.106.1.x86_64",
            "SUSE Real Time Module 15 SP3:ocfs2-kmp-rt-5.3.18-150300.106.1.x86_64",
            "openSUSE Leap Micro 5.2:kernel-rt-5.3.18-150300.106.1.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2022-10-31T08:28:31Z",
          "details": "moderate"
        }
      ],
      "title": "CVE-2022-41848"
    },
    {
      "cve": "CVE-2022-41849",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2022-41849"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "drivers/video/fbdev/smscufx.c in the Linux kernel through 5.19.12 has a race condition and resultant use-after-free if a physically proximate attacker removes a USB device while calling open(), aka a race condition between ufx_ops_open and ufx_usb_disconnect.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "SUSE Linux Enterprise Micro 5.1:kernel-rt-5.3.18-150300.106.1.x86_64",
          "SUSE Linux Enterprise Micro 5.2:kernel-rt-5.3.18-150300.106.1.x86_64",
          "SUSE Real Time Module 15 SP3:cluster-md-kmp-rt-5.3.18-150300.106.1.x86_64",
          "SUSE Real Time Module 15 SP3:dlm-kmp-rt-5.3.18-150300.106.1.x86_64",
          "SUSE Real Time Module 15 SP3:gfs2-kmp-rt-5.3.18-150300.106.1.x86_64",
          "SUSE Real Time Module 15 SP3:kernel-devel-rt-5.3.18-150300.106.1.noarch",
          "SUSE Real Time Module 15 SP3:kernel-rt-5.3.18-150300.106.1.x86_64",
          "SUSE Real Time Module 15 SP3:kernel-rt-devel-5.3.18-150300.106.1.x86_64",
          "SUSE Real Time Module 15 SP3:kernel-rt_debug-devel-5.3.18-150300.106.1.x86_64",
          "SUSE Real Time Module 15 SP3:kernel-source-rt-5.3.18-150300.106.1.noarch",
          "SUSE Real Time Module 15 SP3:kernel-syms-rt-5.3.18-150300.106.1.x86_64",
          "SUSE Real Time Module 15 SP3:ocfs2-kmp-rt-5.3.18-150300.106.1.x86_64",
          "openSUSE Leap Micro 5.2:kernel-rt-5.3.18-150300.106.1.x86_64"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2022-41849",
          "url": "https://www.suse.com/security/cve/CVE-2022-41849"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1203992 for CVE-2022-41849",
          "url": "https://bugzilla.suse.com/1203992"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1217458 for CVE-2022-41849",
          "url": "https://bugzilla.suse.com/1217458"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "SUSE Linux Enterprise Micro 5.1:kernel-rt-5.3.18-150300.106.1.x86_64",
            "SUSE Linux Enterprise Micro 5.2:kernel-rt-5.3.18-150300.106.1.x86_64",
            "SUSE Real Time Module 15 SP3:cluster-md-kmp-rt-5.3.18-150300.106.1.x86_64",
            "SUSE Real Time Module 15 SP3:dlm-kmp-rt-5.3.18-150300.106.1.x86_64",
            "SUSE Real Time Module 15 SP3:gfs2-kmp-rt-5.3.18-150300.106.1.x86_64",
            "SUSE Real Time Module 15 SP3:kernel-devel-rt-5.3.18-150300.106.1.noarch",
            "SUSE Real Time Module 15 SP3:kernel-rt-5.3.18-150300.106.1.x86_64",
            "SUSE Real Time Module 15 SP3:kernel-rt-devel-5.3.18-150300.106.1.x86_64",
            "SUSE Real Time Module 15 SP3:kernel-rt_debug-devel-5.3.18-150300.106.1.x86_64",
            "SUSE Real Time Module 15 SP3:kernel-source-rt-5.3.18-150300.106.1.noarch",
            "SUSE Real Time Module 15 SP3:kernel-syms-rt-5.3.18-150300.106.1.x86_64",
            "SUSE Real Time Module 15 SP3:ocfs2-kmp-rt-5.3.18-150300.106.1.x86_64",
            "openSUSE Leap Micro 5.2:kernel-rt-5.3.18-150300.106.1.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 6.3,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:P/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H",
            "version": "3.1"
          },
          "products": [
            "SUSE Linux Enterprise Micro 5.1:kernel-rt-5.3.18-150300.106.1.x86_64",
            "SUSE Linux Enterprise Micro 5.2:kernel-rt-5.3.18-150300.106.1.x86_64",
            "SUSE Real Time Module 15 SP3:cluster-md-kmp-rt-5.3.18-150300.106.1.x86_64",
            "SUSE Real Time Module 15 SP3:dlm-kmp-rt-5.3.18-150300.106.1.x86_64",
            "SUSE Real Time Module 15 SP3:gfs2-kmp-rt-5.3.18-150300.106.1.x86_64",
            "SUSE Real Time Module 15 SP3:kernel-devel-rt-5.3.18-150300.106.1.noarch",
            "SUSE Real Time Module 15 SP3:kernel-rt-5.3.18-150300.106.1.x86_64",
            "SUSE Real Time Module 15 SP3:kernel-rt-devel-5.3.18-150300.106.1.x86_64",
            "SUSE Real Time Module 15 SP3:kernel-rt_debug-devel-5.3.18-150300.106.1.x86_64",
            "SUSE Real Time Module 15 SP3:kernel-source-rt-5.3.18-150300.106.1.noarch",
            "SUSE Real Time Module 15 SP3:kernel-syms-rt-5.3.18-150300.106.1.x86_64",
            "SUSE Real Time Module 15 SP3:ocfs2-kmp-rt-5.3.18-150300.106.1.x86_64",
            "openSUSE Leap Micro 5.2:kernel-rt-5.3.18-150300.106.1.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2022-10-31T08:28:31Z",
          "details": "moderate"
        }
      ],
      "title": "CVE-2022-41849"
    },
    {
      "cve": "CVE-2022-42719",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2022-42719"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "A use-after-free in the mac80211 stack when parsing a multi-BSSID element in the Linux kernel 5.2 through 5.19.x before 5.19.16 could be used by attackers (able to inject WLAN frames) to crash the kernel and potentially execute code.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "SUSE Linux Enterprise Micro 5.1:kernel-rt-5.3.18-150300.106.1.x86_64",
          "SUSE Linux Enterprise Micro 5.2:kernel-rt-5.3.18-150300.106.1.x86_64",
          "SUSE Real Time Module 15 SP3:cluster-md-kmp-rt-5.3.18-150300.106.1.x86_64",
          "SUSE Real Time Module 15 SP3:dlm-kmp-rt-5.3.18-150300.106.1.x86_64",
          "SUSE Real Time Module 15 SP3:gfs2-kmp-rt-5.3.18-150300.106.1.x86_64",
          "SUSE Real Time Module 15 SP3:kernel-devel-rt-5.3.18-150300.106.1.noarch",
          "SUSE Real Time Module 15 SP3:kernel-rt-5.3.18-150300.106.1.x86_64",
          "SUSE Real Time Module 15 SP3:kernel-rt-devel-5.3.18-150300.106.1.x86_64",
          "SUSE Real Time Module 15 SP3:kernel-rt_debug-devel-5.3.18-150300.106.1.x86_64",
          "SUSE Real Time Module 15 SP3:kernel-source-rt-5.3.18-150300.106.1.noarch",
          "SUSE Real Time Module 15 SP3:kernel-syms-rt-5.3.18-150300.106.1.x86_64",
          "SUSE Real Time Module 15 SP3:ocfs2-kmp-rt-5.3.18-150300.106.1.x86_64",
          "openSUSE Leap Micro 5.2:kernel-rt-5.3.18-150300.106.1.x86_64"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2022-42719",
          "url": "https://www.suse.com/security/cve/CVE-2022-42719"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1204051 for CVE-2022-42719",
          "url": "https://bugzilla.suse.com/1204051"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1204292 for CVE-2022-42719",
          "url": "https://bugzilla.suse.com/1204292"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1209225 for CVE-2022-42719",
          "url": "https://bugzilla.suse.com/1209225"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "SUSE Linux Enterprise Micro 5.1:kernel-rt-5.3.18-150300.106.1.x86_64",
            "SUSE Linux Enterprise Micro 5.2:kernel-rt-5.3.18-150300.106.1.x86_64",
            "SUSE Real Time Module 15 SP3:cluster-md-kmp-rt-5.3.18-150300.106.1.x86_64",
            "SUSE Real Time Module 15 SP3:dlm-kmp-rt-5.3.18-150300.106.1.x86_64",
            "SUSE Real Time Module 15 SP3:gfs2-kmp-rt-5.3.18-150300.106.1.x86_64",
            "SUSE Real Time Module 15 SP3:kernel-devel-rt-5.3.18-150300.106.1.noarch",
            "SUSE Real Time Module 15 SP3:kernel-rt-5.3.18-150300.106.1.x86_64",
            "SUSE Real Time Module 15 SP3:kernel-rt-devel-5.3.18-150300.106.1.x86_64",
            "SUSE Real Time Module 15 SP3:kernel-rt_debug-devel-5.3.18-150300.106.1.x86_64",
            "SUSE Real Time Module 15 SP3:kernel-source-rt-5.3.18-150300.106.1.noarch",
            "SUSE Real Time Module 15 SP3:kernel-syms-rt-5.3.18-150300.106.1.x86_64",
            "SUSE Real Time Module 15 SP3:ocfs2-kmp-rt-5.3.18-150300.106.1.x86_64",
            "openSUSE Leap Micro 5.2:kernel-rt-5.3.18-150300.106.1.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 7.5,
            "baseSeverity": "HIGH",
            "vectorString": "CVSS:3.1/AV:A/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H",
            "version": "3.1"
          },
          "products": [
            "SUSE Linux Enterprise Micro 5.1:kernel-rt-5.3.18-150300.106.1.x86_64",
            "SUSE Linux Enterprise Micro 5.2:kernel-rt-5.3.18-150300.106.1.x86_64",
            "SUSE Real Time Module 15 SP3:cluster-md-kmp-rt-5.3.18-150300.106.1.x86_64",
            "SUSE Real Time Module 15 SP3:dlm-kmp-rt-5.3.18-150300.106.1.x86_64",
            "SUSE Real Time Module 15 SP3:gfs2-kmp-rt-5.3.18-150300.106.1.x86_64",
            "SUSE Real Time Module 15 SP3:kernel-devel-rt-5.3.18-150300.106.1.noarch",
            "SUSE Real Time Module 15 SP3:kernel-rt-5.3.18-150300.106.1.x86_64",
            "SUSE Real Time Module 15 SP3:kernel-rt-devel-5.3.18-150300.106.1.x86_64",
            "SUSE Real Time Module 15 SP3:kernel-rt_debug-devel-5.3.18-150300.106.1.x86_64",
            "SUSE Real Time Module 15 SP3:kernel-source-rt-5.3.18-150300.106.1.noarch",
            "SUSE Real Time Module 15 SP3:kernel-syms-rt-5.3.18-150300.106.1.x86_64",
            "SUSE Real Time Module 15 SP3:ocfs2-kmp-rt-5.3.18-150300.106.1.x86_64",
            "openSUSE Leap Micro 5.2:kernel-rt-5.3.18-150300.106.1.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2022-10-31T08:28:31Z",
          "details": "important"
        }
      ],
      "title": "CVE-2022-42719"
    },
    {
      "cve": "CVE-2022-42720",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2022-42720"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "Various refcounting bugs in the multi-BSS handling in the mac80211 stack in the Linux kernel 5.1 through 5.19.x before 5.19.16 could be used by local attackers (able to inject WLAN frames) to trigger use-after-free conditions to potentially execute code.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "SUSE Linux Enterprise Micro 5.1:kernel-rt-5.3.18-150300.106.1.x86_64",
          "SUSE Linux Enterprise Micro 5.2:kernel-rt-5.3.18-150300.106.1.x86_64",
          "SUSE Real Time Module 15 SP3:cluster-md-kmp-rt-5.3.18-150300.106.1.x86_64",
          "SUSE Real Time Module 15 SP3:dlm-kmp-rt-5.3.18-150300.106.1.x86_64",
          "SUSE Real Time Module 15 SP3:gfs2-kmp-rt-5.3.18-150300.106.1.x86_64",
          "SUSE Real Time Module 15 SP3:kernel-devel-rt-5.3.18-150300.106.1.noarch",
          "SUSE Real Time Module 15 SP3:kernel-rt-5.3.18-150300.106.1.x86_64",
          "SUSE Real Time Module 15 SP3:kernel-rt-devel-5.3.18-150300.106.1.x86_64",
          "SUSE Real Time Module 15 SP3:kernel-rt_debug-devel-5.3.18-150300.106.1.x86_64",
          "SUSE Real Time Module 15 SP3:kernel-source-rt-5.3.18-150300.106.1.noarch",
          "SUSE Real Time Module 15 SP3:kernel-syms-rt-5.3.18-150300.106.1.x86_64",
          "SUSE Real Time Module 15 SP3:ocfs2-kmp-rt-5.3.18-150300.106.1.x86_64",
          "openSUSE Leap Micro 5.2:kernel-rt-5.3.18-150300.106.1.x86_64"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2022-42720",
          "url": "https://www.suse.com/security/cve/CVE-2022-42720"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1204059 for CVE-2022-42720",
          "url": "https://bugzilla.suse.com/1204059"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1204291 for CVE-2022-42720",
          "url": "https://bugzilla.suse.com/1204291"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1209225 for CVE-2022-42720",
          "url": "https://bugzilla.suse.com/1209225"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "SUSE Linux Enterprise Micro 5.1:kernel-rt-5.3.18-150300.106.1.x86_64",
            "SUSE Linux Enterprise Micro 5.2:kernel-rt-5.3.18-150300.106.1.x86_64",
            "SUSE Real Time Module 15 SP3:cluster-md-kmp-rt-5.3.18-150300.106.1.x86_64",
            "SUSE Real Time Module 15 SP3:dlm-kmp-rt-5.3.18-150300.106.1.x86_64",
            "SUSE Real Time Module 15 SP3:gfs2-kmp-rt-5.3.18-150300.106.1.x86_64",
            "SUSE Real Time Module 15 SP3:kernel-devel-rt-5.3.18-150300.106.1.noarch",
            "SUSE Real Time Module 15 SP3:kernel-rt-5.3.18-150300.106.1.x86_64",
            "SUSE Real Time Module 15 SP3:kernel-rt-devel-5.3.18-150300.106.1.x86_64",
            "SUSE Real Time Module 15 SP3:kernel-rt_debug-devel-5.3.18-150300.106.1.x86_64",
            "SUSE Real Time Module 15 SP3:kernel-source-rt-5.3.18-150300.106.1.noarch",
            "SUSE Real Time Module 15 SP3:kernel-syms-rt-5.3.18-150300.106.1.x86_64",
            "SUSE Real Time Module 15 SP3:ocfs2-kmp-rt-5.3.18-150300.106.1.x86_64",
            "openSUSE Leap Micro 5.2:kernel-rt-5.3.18-150300.106.1.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 7.5,
            "baseSeverity": "HIGH",
            "vectorString": "CVSS:3.1/AV:A/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H",
            "version": "3.1"
          },
          "products": [
            "SUSE Linux Enterprise Micro 5.1:kernel-rt-5.3.18-150300.106.1.x86_64",
            "SUSE Linux Enterprise Micro 5.2:kernel-rt-5.3.18-150300.106.1.x86_64",
            "SUSE Real Time Module 15 SP3:cluster-md-kmp-rt-5.3.18-150300.106.1.x86_64",
            "SUSE Real Time Module 15 SP3:dlm-kmp-rt-5.3.18-150300.106.1.x86_64",
            "SUSE Real Time Module 15 SP3:gfs2-kmp-rt-5.3.18-150300.106.1.x86_64",
            "SUSE Real Time Module 15 SP3:kernel-devel-rt-5.3.18-150300.106.1.noarch",
            "SUSE Real Time Module 15 SP3:kernel-rt-5.3.18-150300.106.1.x86_64",
            "SUSE Real Time Module 15 SP3:kernel-rt-devel-5.3.18-150300.106.1.x86_64",
            "SUSE Real Time Module 15 SP3:kernel-rt_debug-devel-5.3.18-150300.106.1.x86_64",
            "SUSE Real Time Module 15 SP3:kernel-source-rt-5.3.18-150300.106.1.noarch",
            "SUSE Real Time Module 15 SP3:kernel-syms-rt-5.3.18-150300.106.1.x86_64",
            "SUSE Real Time Module 15 SP3:ocfs2-kmp-rt-5.3.18-150300.106.1.x86_64",
            "openSUSE Leap Micro 5.2:kernel-rt-5.3.18-150300.106.1.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2022-10-31T08:28:31Z",
          "details": "important"
        }
      ],
      "title": "CVE-2022-42720"
    },
    {
      "cve": "CVE-2022-42721",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2022-42721"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "A list management bug in BSS handling in the mac80211 stack in the Linux kernel 5.1 through 5.19.x before 5.19.16 could be used by local attackers (able to inject WLAN frames) to corrupt a linked list and, in turn, potentially execute code.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "SUSE Linux Enterprise Micro 5.1:kernel-rt-5.3.18-150300.106.1.x86_64",
          "SUSE Linux Enterprise Micro 5.2:kernel-rt-5.3.18-150300.106.1.x86_64",
          "SUSE Real Time Module 15 SP3:cluster-md-kmp-rt-5.3.18-150300.106.1.x86_64",
          "SUSE Real Time Module 15 SP3:dlm-kmp-rt-5.3.18-150300.106.1.x86_64",
          "SUSE Real Time Module 15 SP3:gfs2-kmp-rt-5.3.18-150300.106.1.x86_64",
          "SUSE Real Time Module 15 SP3:kernel-devel-rt-5.3.18-150300.106.1.noarch",
          "SUSE Real Time Module 15 SP3:kernel-rt-5.3.18-150300.106.1.x86_64",
          "SUSE Real Time Module 15 SP3:kernel-rt-devel-5.3.18-150300.106.1.x86_64",
          "SUSE Real Time Module 15 SP3:kernel-rt_debug-devel-5.3.18-150300.106.1.x86_64",
          "SUSE Real Time Module 15 SP3:kernel-source-rt-5.3.18-150300.106.1.noarch",
          "SUSE Real Time Module 15 SP3:kernel-syms-rt-5.3.18-150300.106.1.x86_64",
          "SUSE Real Time Module 15 SP3:ocfs2-kmp-rt-5.3.18-150300.106.1.x86_64",
          "openSUSE Leap Micro 5.2:kernel-rt-5.3.18-150300.106.1.x86_64"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2022-42721",
          "url": "https://www.suse.com/security/cve/CVE-2022-42721"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1204060 for CVE-2022-42721",
          "url": "https://bugzilla.suse.com/1204060"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1204290 for CVE-2022-42721",
          "url": "https://bugzilla.suse.com/1204290"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1209225 for CVE-2022-42721",
          "url": "https://bugzilla.suse.com/1209225"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "SUSE Linux Enterprise Micro 5.1:kernel-rt-5.3.18-150300.106.1.x86_64",
            "SUSE Linux Enterprise Micro 5.2:kernel-rt-5.3.18-150300.106.1.x86_64",
            "SUSE Real Time Module 15 SP3:cluster-md-kmp-rt-5.3.18-150300.106.1.x86_64",
            "SUSE Real Time Module 15 SP3:dlm-kmp-rt-5.3.18-150300.106.1.x86_64",
            "SUSE Real Time Module 15 SP3:gfs2-kmp-rt-5.3.18-150300.106.1.x86_64",
            "SUSE Real Time Module 15 SP3:kernel-devel-rt-5.3.18-150300.106.1.noarch",
            "SUSE Real Time Module 15 SP3:kernel-rt-5.3.18-150300.106.1.x86_64",
            "SUSE Real Time Module 15 SP3:kernel-rt-devel-5.3.18-150300.106.1.x86_64",
            "SUSE Real Time Module 15 SP3:kernel-rt_debug-devel-5.3.18-150300.106.1.x86_64",
            "SUSE Real Time Module 15 SP3:kernel-source-rt-5.3.18-150300.106.1.noarch",
            "SUSE Real Time Module 15 SP3:kernel-syms-rt-5.3.18-150300.106.1.x86_64",
            "SUSE Real Time Module 15 SP3:ocfs2-kmp-rt-5.3.18-150300.106.1.x86_64",
            "openSUSE Leap Micro 5.2:kernel-rt-5.3.18-150300.106.1.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 7.5,
            "baseSeverity": "HIGH",
            "vectorString": "CVSS:3.1/AV:A/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H",
            "version": "3.1"
          },
          "products": [
            "SUSE Linux Enterprise Micro 5.1:kernel-rt-5.3.18-150300.106.1.x86_64",
            "SUSE Linux Enterprise Micro 5.2:kernel-rt-5.3.18-150300.106.1.x86_64",
            "SUSE Real Time Module 15 SP3:cluster-md-kmp-rt-5.3.18-150300.106.1.x86_64",
            "SUSE Real Time Module 15 SP3:dlm-kmp-rt-5.3.18-150300.106.1.x86_64",
            "SUSE Real Time Module 15 SP3:gfs2-kmp-rt-5.3.18-150300.106.1.x86_64",
            "SUSE Real Time Module 15 SP3:kernel-devel-rt-5.3.18-150300.106.1.noarch",
            "SUSE Real Time Module 15 SP3:kernel-rt-5.3.18-150300.106.1.x86_64",
            "SUSE Real Time Module 15 SP3:kernel-rt-devel-5.3.18-150300.106.1.x86_64",
            "SUSE Real Time Module 15 SP3:kernel-rt_debug-devel-5.3.18-150300.106.1.x86_64",
            "SUSE Real Time Module 15 SP3:kernel-source-rt-5.3.18-150300.106.1.noarch",
            "SUSE Real Time Module 15 SP3:kernel-syms-rt-5.3.18-150300.106.1.x86_64",
            "SUSE Real Time Module 15 SP3:ocfs2-kmp-rt-5.3.18-150300.106.1.x86_64",
            "openSUSE Leap Micro 5.2:kernel-rt-5.3.18-150300.106.1.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2022-10-31T08:28:31Z",
          "details": "important"
        }
      ],
      "title": "CVE-2022-42721"
    },
    {
      "cve": "CVE-2022-42722",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2022-42722"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "In the Linux kernel 5.8 through 5.19.x before 5.19.16, local attackers able to inject WLAN frames into the mac80211 stack could cause a NULL pointer dereference denial-of-service attack against the beacon protection of P2P devices.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "SUSE Linux Enterprise Micro 5.1:kernel-rt-5.3.18-150300.106.1.x86_64",
          "SUSE Linux Enterprise Micro 5.2:kernel-rt-5.3.18-150300.106.1.x86_64",
          "SUSE Real Time Module 15 SP3:cluster-md-kmp-rt-5.3.18-150300.106.1.x86_64",
          "SUSE Real Time Module 15 SP3:dlm-kmp-rt-5.3.18-150300.106.1.x86_64",
          "SUSE Real Time Module 15 SP3:gfs2-kmp-rt-5.3.18-150300.106.1.x86_64",
          "SUSE Real Time Module 15 SP3:kernel-devel-rt-5.3.18-150300.106.1.noarch",
          "SUSE Real Time Module 15 SP3:kernel-rt-5.3.18-150300.106.1.x86_64",
          "SUSE Real Time Module 15 SP3:kernel-rt-devel-5.3.18-150300.106.1.x86_64",
          "SUSE Real Time Module 15 SP3:kernel-rt_debug-devel-5.3.18-150300.106.1.x86_64",
          "SUSE Real Time Module 15 SP3:kernel-source-rt-5.3.18-150300.106.1.noarch",
          "SUSE Real Time Module 15 SP3:kernel-syms-rt-5.3.18-150300.106.1.x86_64",
          "SUSE Real Time Module 15 SP3:ocfs2-kmp-rt-5.3.18-150300.106.1.x86_64",
          "openSUSE Leap Micro 5.2:kernel-rt-5.3.18-150300.106.1.x86_64"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2022-42722",
          "url": "https://www.suse.com/security/cve/CVE-2022-42722"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1204125 for CVE-2022-42722",
          "url": "https://bugzilla.suse.com/1204125"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1204289 for CVE-2022-42722",
          "url": "https://bugzilla.suse.com/1204289"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1209225 for CVE-2022-42722",
          "url": "https://bugzilla.suse.com/1209225"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "SUSE Linux Enterprise Micro 5.1:kernel-rt-5.3.18-150300.106.1.x86_64",
            "SUSE Linux Enterprise Micro 5.2:kernel-rt-5.3.18-150300.106.1.x86_64",
            "SUSE Real Time Module 15 SP3:cluster-md-kmp-rt-5.3.18-150300.106.1.x86_64",
            "SUSE Real Time Module 15 SP3:dlm-kmp-rt-5.3.18-150300.106.1.x86_64",
            "SUSE Real Time Module 15 SP3:gfs2-kmp-rt-5.3.18-150300.106.1.x86_64",
            "SUSE Real Time Module 15 SP3:kernel-devel-rt-5.3.18-150300.106.1.noarch",
            "SUSE Real Time Module 15 SP3:kernel-rt-5.3.18-150300.106.1.x86_64",
            "SUSE Real Time Module 15 SP3:kernel-rt-devel-5.3.18-150300.106.1.x86_64",
            "SUSE Real Time Module 15 SP3:kernel-rt_debug-devel-5.3.18-150300.106.1.x86_64",
            "SUSE Real Time Module 15 SP3:kernel-source-rt-5.3.18-150300.106.1.noarch",
            "SUSE Real Time Module 15 SP3:kernel-syms-rt-5.3.18-150300.106.1.x86_64",
            "SUSE Real Time Module 15 SP3:ocfs2-kmp-rt-5.3.18-150300.106.1.x86_64",
            "openSUSE Leap Micro 5.2:kernel-rt-5.3.18-150300.106.1.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 7.5,
            "baseSeverity": "HIGH",
            "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
            "version": "3.1"
          },
          "products": [
            "SUSE Linux Enterprise Micro 5.1:kernel-rt-5.3.18-150300.106.1.x86_64",
            "SUSE Linux Enterprise Micro 5.2:kernel-rt-5.3.18-150300.106.1.x86_64",
            "SUSE Real Time Module 15 SP3:cluster-md-kmp-rt-5.3.18-150300.106.1.x86_64",
            "SUSE Real Time Module 15 SP3:dlm-kmp-rt-5.3.18-150300.106.1.x86_64",
            "SUSE Real Time Module 15 SP3:gfs2-kmp-rt-5.3.18-150300.106.1.x86_64",
            "SUSE Real Time Module 15 SP3:kernel-devel-rt-5.3.18-150300.106.1.noarch",
            "SUSE Real Time Module 15 SP3:kernel-rt-5.3.18-150300.106.1.x86_64",
            "SUSE Real Time Module 15 SP3:kernel-rt-devel-5.3.18-150300.106.1.x86_64",
            "SUSE Real Time Module 15 SP3:kernel-rt_debug-devel-5.3.18-150300.106.1.x86_64",
            "SUSE Real Time Module 15 SP3:kernel-source-rt-5.3.18-150300.106.1.noarch",
            "SUSE Real Time Module 15 SP3:kernel-syms-rt-5.3.18-150300.106.1.x86_64",
            "SUSE Real Time Module 15 SP3:ocfs2-kmp-rt-5.3.18-150300.106.1.x86_64",
            "openSUSE Leap Micro 5.2:kernel-rt-5.3.18-150300.106.1.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2022-10-31T08:28:31Z",
          "details": "important"
        }
      ],
      "title": "CVE-2022-42722"
    }
  ]
}
  suse-su-2022:3293-1
Vulnerability from csaf_suse
Published
2022-09-16 15:30
    Modified
2022-09-16 15:30
    Summary
Security update for the Linux Kernel
    Notes
Title of the patch
Security update for the Linux Kernel
    Description of the patch
The SUSE Linux Enterprise 15 SP4 kernel was updated to receive various security and bugfixes.
The following security bugs were fixed:
- CVE-2022-39190: Fixed an issue that was discovered in net/netfilter/nf_tables_api.c and could cause a denial of service upon binding to an already bound chain (bnc#1203117).
- CVE-2022-39188: Fixed race condition in include/asm-generic/tlb.h where a device driver can free a page while it still has stale TLB entries (bnc#1203107).
- CVE-2022-2663: Fixed an issue that was found in nf_conntrack_irc where the message handling could be confused and incorrectly matches the message (bnc#1202097).
- CVE-2022-3078: Fixed a lack of check after calling vzalloc() and lack of free after allocation in drivers/media/test-drivers/vidtv/vidtv_s302m.c (bnc#1203041).
- CVE-2022-28356: Fixed a refcount leak bug that was found in net/llc/af_llc.c (bnc#1197391).
- CVE-2022-3028: Fixed race condition that was found in the IP framework for transforming packets (XFRM subsystem) (bnc#1202898).
- CVE-2022-2905: Fixed tnum_range usage on array range checking for poke descriptors (bsc#1202564, bsc#1202860).
- CVE-2022-2977: Fixed reference counting for struct tpm_chip (bsc#1202672).
- CVE-2022-2938: Fixed a flaw that was found inside the Pressure Stall Information implementation that could have been used to allow an attacker to crash the system or have other memory-corruption side effects (bnc#1202623).
- CVE-2022-28693: Fixed x86/speculation behavior by disabling RRSBA (bsc#1201455).
- CVE-2021-33135: Fixed uncontrolled resource consumption inside Intel(R) SGX that may have allowed an authenticated user to potentially enable denial of service via local access (bnc#1199515).
- CVE-2022-2588: Fixed use-after-free in cls_route (bsc#1202096).
- CVE-2022-2959: Fixed a race condition that was found inside the watch queue due to a missing lock in pipe_resize_ring() (bnc#1202681 bnc#1202685).
- CVE-2022-36946: Fixed a denial of service (panic) inside nfqnl_mangle in net/netfilter/nfnetlink_queue.c (bnc#1201940 bnc#1201941 bnc#1202312 bnc#1202874).
- CVE-2021-4037: Fixed function logic vulnerability that allowed local users to create files for the XFS file-system with an unintended group ownership and with group execution and SGID permission bits set (bnc#1198702).
- CVE-2022-2873: Fixed an out-of-bounds memory access flaw that was found in iSMT SMBus host controller driver (bnc#1202558).
- CVE-2022-36879: Fixed an issue in xfrm_expand_policies in net/xfrm/xfrm_policy.c where a refcount could be dropped twice (bnc#1201948).
- CVE-2022-20368: Fixed slab-out-of-bounds access in packet_recvmsg() (bsc#1202346).
- CVE-2022-20369: Fixed out of bounds write in v4l2_m2m_querybuf of v4l2-mem2mem.c (bnc#1202347).
- CVE-2016-3695: Fixed an issue inside the einj_error_inject function in drivers/acpi/apei/einj.c that allowed users to simulate hardware errors and consequently cause a denial of service (bnc#1023051).
- CVE-2022-2639: Fixed an integer coercion error that was found in the openvswitch kernel module (bnc#1202154).
- CVE-2020-36516: Fixed an issue in the mixed IPID assignment method where an attacker was able to inject data into or terminate a victim's TCP session (bnc#1196616).
- CVE-2022-32250: Fixed a privilege escalation issue in net/netfilter/nf_tables_api.c that allowed a local user to became root (bnc#1200015).
The following non-security bugs were fixed:
- 9p: Fix refcounting during full path walks for fid lookups (git-fixes).
- 9p: fix fid refcount leak in v9fs_vfs_atomic_open_dotl (git-fixes).
- 9p: fix fid refcount leak in v9fs_vfs_get_link (git-fixes).
- ACPI: APEI: Better fix to avoid spamming the console with old error logs (git-fixes).
- ACPI: APEI: explicit init of HEST and GHES in apci_init() (git-fixes).
- ACPI: CPPC: Do not prevent CPPC from working in the future (git-fixes).
- ACPI: EC: Drop the EC_FLAGS_IGNORE_DSDT_GPE quirk (git-fixes).
- ACPI: EC: Remove duplicate ThinkPad X1 Carbon 6th entry from DMI quirks (git-fixes).
- ACPI: LPSS: Fix missing check in register_device_clock() (git-fixes).
- ACPI: PM: save NVS memory for Lenovo G40-45 (git-fixes).
- ACPI: VIOT: Fix ACS setup (git-fixes).
- ACPI: processor/idle: Annotate more functions to live in cpuidle section (git-fixes).
- ACPI: processor: Remove freq Qos request for all CPUs (git-fixes).
- ACPI: property: Return type of acpi_add_nondev_subnodes() should be bool (git-fixes).
- ACPI: thermal: drop an always true check (git-fixes).
- ACPI: video: Force backlight native for some TongFang devices (git-fixes).
- ACPI: video: Shortening quirk list by identifying Clevo by board_name only (git-fixes).
- ALSA: bcd2000: Fix a UAF bug on the error path of probing (git-fixes).
- ALSA: hda/cirrus - support for iMac 12,1 model (git-fixes).
- ALSA: hda/conexant: Add quirk for LENOVO 20149 Notebook model (git-fixes).
- ALSA: hda/conexant: add a new hda codec SN6140 (git-fixes).
- ALSA: hda/realtek: Add a quirk for HP OMEN 15 (8786) mute LED (git-fixes).
- ALSA: hda/realtek: Add quirk for Clevo NS50PU, NS70PU (git-fixes).
- ALSA: hda/realtek: Add quirk for Clevo NV45PZ (git-fixes).
- ALSA: hda/realtek: Add quirk for HP Spectre x360 15-eb0xxx (git-fixes).
- ALSA: hda/realtek: Add quirk for Lenovo Yoga9 14IAP7 (git-fixes).
- ALSA: hda/realtek: Add quirk for another Asus K42JZ model (git-fixes).
- ALSA: hda/realtek: Add speaker AMP init for Samsung laptops with ALC298 (git-fixes).
- ALSA: hda/sigmatel: Keep power up while beep is enabled (bsc#1200544).
- ALSA: hda: intel-nhlt: Correct the handling of fmt_config flexible array (git-fixes).
- ALSA: info: Fix llseek return value when using callback (git-fixes).
- ALSA: seq: Fix data-race at module auto-loading (git-fixes).
- ALSA: seq: oss: Fix data-race for max_midi_devs access (git-fixes).
- ALSA: usb-audio: Add endianness annotations (git-fixes).
- ALSA: usb-audio: Add quirk for Behringer UMC202HD (git-fixes).
- ALSA: usb-audio: Add quirk for LH Labs Geek Out HD Audio 1V5 (git-fixes).
- ALSA: usb-audio: More comprehensive mixer map for ASUS ROG Zenith II (git-fixes).
- ALSA: usb-audio: Support jack detection on Dell dock (git-fixes).
- ALSA: usb-audio: Turn off 'manual mode' on Dell dock (git-fixes).
- ARM: 9216/1: Fix MAX_DMA_ADDRESS overflow (git-fixes).
- ARM: OMAP2+: Fix refcount leak in omap3xxx_prm_late_init (git-fixes).
- ARM: OMAP2+: Fix refcount leak in omapdss_init_of (git-fixes).
- ARM: OMAP2+: display: Fix refcount leak bug (git-fixes).
- ARM: OMAP2+: pdata-quirks: Fix refcount leak bug (git-fixes).
- ARM: bcm: Fix refcount leak in bcm_kona_smc_init (git-fixes).
- ARM: dts: BCM5301X: Add DT for Meraki MR26 (git-fixes).
- ARM: dts: ast2500-evb: fix board compatible (git-fixes).
- ARM: dts: ast2600-evb-a1: fix board compatible (git-fixes).
- ARM: dts: ast2600-evb: fix board compatible (git-fixes).
- ARM: dts: at91: sama5d27_wlsom1: do not keep ldo2 enabled all the time (git-fixes).
- ARM: dts: at91: sama5d27_wlsom1: specify proper regulator output ranges (git-fixes).
- ARM: dts: at91: sama5d2_icp: do not keep vdd_other enabled all the time (git-fixes).
- ARM: dts: at91: sama5d2_icp: specify proper regulator output ranges (git-fixes).
- ARM: dts: imx6qdl-kontron-samx6i: remove duplicated node (git-fixes).
- ARM: dts: imx6ul: add missing properties for sram (git-fixes).
- ARM: dts: imx6ul: change operating-points to uint32-matrix (git-fixes).
- ARM: dts: imx6ul: fix csi node compatible (git-fixes).
- ARM: dts: imx6ul: fix keypad compatible (git-fixes).
- ARM: dts: imx6ul: fix lcdif node compatible (git-fixes).
- ARM: dts: imx6ul: fix qspi node compatible (git-fixes).
- ARM: dts: imx7d-colibri-emmc: add cpu1 supply (git-fixes).
- ARM: dts: qcom: mdm9615: add missing PMIC GPIO reg (git-fixes).
- ARM: dts: qcom: pm8841: add required thermal-sensor-cells (git-fixes).
- ARM: dts: qcom: sdx55: Fix the IRQ trigger type for UART (git-fixes).
- ARM: dts: uniphier: Fix USB interrupts for PXs2 SoC (git-fixes).
- ARM: findbit: fix overflowing offset (git-fixes).
- ARM: shmobile: rcar-gen2: Increase refcount for new reference (git-fixes).
- ASoC: SOF: debug: Fix potential buffer overflow by snprintf() (git-fixes).
- ASoC: audio-graph-card: Add of_node_put() in fail path (git-fixes).
- ASoC: codec: tlv320aic32x4: fix mono playback via I2S (git-fixes).
- ASoC: codecs: da7210: add check for i2c_add_driver (git-fixes).
- ASoC: codecs: msm8916-wcd-digital: move gains from SX_TLV to S8_TLV (git-fixes).
- ASoC: codecs: wcd9335: move gains from SX_TLV to S8_TLV (git-fixes).
- ASoC: cros_ec_codec: Fix refcount leak in cros_ec_codec_platform_probe (git-fixes).
- ASoC: fsl-asoc-card: force cast the asrc_format type (git-fixes).
- ASoC: fsl_asrc: force cast the asrc_format type (git-fixes).
- ASoC: fsl_easrc: use snd_pcm_format_t type for sample_format (git-fixes).
- ASoC: imx-audmux: Silence a clang warning (git-fixes).
- ASoC: imx-card: Fix DSD/PDM mclk frequency (git-fixes).
- ASoC: imx-card: use snd_pcm_format_t type for asrc_format (git-fixes).
- ASoC: mchp-spdifrx: disable end of block interrupt on failures (git-fixes).
- ASoC: mt6359: Fix refcount leak bug (git-fixes).
- ASoC: mt6797-mt6351: Fix refcount leak in mt6797_mt6351_dev_probe (git-fixes).
- ASoC: qcom: Fix missing of_node_put() in asoc_qcom_lpass_cpu_platform_probe() (git-fixes).
- ASoC: qcom: q6dsp: Fix an off-by-one in q6adm_alloc_copp() (git-fixes).
- ASoC: rsnd: care default case on rsnd_ssiu_busif_err_irq_ctrl() (git-fixes).
- ASoC: samsung: Fix error handling in aries_audio_probe (git-fixes).
- ASoC: samsung: change gpiod_speaker_power and rx1950_audio from global to static variables (git-fixes).
- ASoC: samsung: change neo1973_audio from a global to static (git-fixes).
- ASoC: samsung: h1940_uda1380: include proepr GPIO consumer header (git-fixes).
- ASoC: tas2770: Allow mono streams (git-fixes).
- ASoC: tas2770: Drop conflicting set_bias_level power setting (git-fixes).
- ASoC: tas2770: Fix handling of mute/unmute (git-fixes).
- ASoC: tas2770: Set correct FSYNC polarity (git-fixes).
- Bluetooth: Add bt_skb_sendmmsg helper (git-fixes).
- Bluetooth: Add bt_skb_sendmsg helper (git-fixes).
- Bluetooth: Fix bt_skb_sendmmsg not allocating partial chunks (git-fixes).
- Bluetooth: Fix passing NULL to PTR_ERR (git-fixes).
- Bluetooth: L2CAP: Fix build errors in some archs (git-fixes).
- Bluetooth: L2CAP: Fix l2cap_global_chan_by_psm regression (git-fixes).
- Bluetooth: L2CAP: Fix use-after-free caused by l2cap_chan_put (git-fixes).
- Bluetooth: MGMT: Fixes build warnings with C=1 (git-fixes).
- Bluetooth: RFCOMM: Replace use of memcpy_from_msg with bt_skb_sendmmsg (git-fixes).
- Bluetooth: SCO: Fix sco_send_frame returning skb->len (git-fixes).
- Bluetooth: SCO: Replace use of memcpy_from_msg with bt_skb_sendmsg (git-fixes).
- Bluetooth: btusb: Add Realtek RTL8852C support ID 0x04C5:0x1675 (git-fixes).
- Bluetooth: btusb: Add Realtek RTL8852C support ID 0x04CA:0x4007 (git-fixes).
- Bluetooth: btusb: Add Realtek RTL8852C support ID 0x0CB8:0xC558 (git-fixes).
- Bluetooth: btusb: Add Realtek RTL8852C support ID 0x13D3:0x3586 (git-fixes).
- Bluetooth: btusb: Add Realtek RTL8852C support ID 0x13D3:0x3587 (git-fixes).
- Bluetooth: btusb: Add support of IMC Networks PID 0x3568 (git-fixes).
- Bluetooth: hci_bcm: Add BCM4349B1 variant (git-fixes).
- Bluetooth: hci_bcm: Add DT compatible for CYW55572 (git-fixes).
- Bluetooth: hci_intel: Add check for platform_driver_register (git-fixes).
- EDAC/ghes: Set the DIMM label unconditionally (bsc#1201768).
- rpm: Fix parsing of rpm/macros.kernel-source on SLE12 (bsc#1201019).
- HID: AMD_SFH: Add a DMI quirk entry for Chromebooks (git-fixes).
- HID: add Lenovo Yoga C630 battery quirk (git-fixes).
- HID: alps: Declare U1_UNICORN_LEGACY support (git-fixes).
- HID: amd_sfh: Add NULL check for hid device (git-fixes).
- HID: amd_sfh: Handle condition of 'no sensors' (git-fixes).
- HID: asus: ROG NKey: Ignore portion of 0x5a report (git-fixes).
- HID: cp2112: prevent a buffer overflow in cp2112_xfer() (git-fixes).
- HID: hid-input: add Surface Go battery quirk (git-fixes).
- HID: mcp2221: prevent a buffer overflow in mcp_smbus_write() (git-fixes).
- HID: multitouch: new device class fix Lenovo X12 trackpad sticky (git-fixes).
- HID: steam: Prevent NULL pointer dereference in steam_{recv,send}_report (git-fies).
- HID: thrustmaster: Add sparco wheel and fix array length (git-fixes).
- HID: wacom: Do not register pad_input for touch switch (git-fixes).
- HID: wacom: Only report rotation for art pen (git-fixes).
- Input: exc3000 - fix return value check of wait_for_completion_timeout (git-fixes).
- Input: gscps2 - check return value of ioremap() in gscps2_probe() (git-fixes).
- Input: i8042 - add TUXEDO devices to i8042 quirk tables (git-fies).
- Input: i8042 - add additional TUXEDO devices to i8042 quirk tables (git-fies).
- Input: i8042 - merge quirk tables (git-fies).
- Input: i8042 - move __initconst to fix code styling warning (git-fies).
- Input: iforce - wake up after clearing IFORCE_XMIT_RUNNING flag (git-fixes).
- Input: rk805-pwrkey - fix module autoloading (git-fixes).
- KABI: cgroup: Restore KABI of css_set (bsc#1201610).
- KEYS: asymmetric: enforce SM2 signature use pkey algo (git-fixes).
- KVM: LAPIC: Also cancel preemption timer during SET_LAPIC (git-fixes).
- KVM: MMU: shadow nested paging does not have PKU (git-fixes).
- KVM: PPC: Book3S HV: Check return value of kvmppc_radix_init (bsc#1194869).
- KVM: PPC: Book3S HV: Prevent POWER7/8 TLB flush flushing SLB (bsc#1156395).
- KVM: PPC: Book3S HV: Remove kvmhv_p9_[set,restore]_lpcr declarations (bsc#1194869).
- KVM: PPC: Book3S HV: Use GLOBAL_TOC for kvmppc_h_set_dabr/xdabr() (bsc#1156395).
- KVM: PPC: Book3S HV: fix incorrect NULL check on list iterator (bsc#1194869).
- KVM: PPC: Book3s HV: Remove unused function kvmppc_bad_interrupt (bsc#1194869).
- KVM: PPC: Fix vmx/vsx mixup in mmio emulation (bsc#1156395).
- KVM: PPC: Use arch_get_random_seed_long instead of powernv variant (bsc#1156395).
- KVM: SVM: Do not BUG if userspace injects an interrupt with GIF=0 (git-fixes).
- KVM: SVM: Do not intercept #GP for SEV guests (git-fixes).
- KVM: SVM: Unwind 'speculative' RIP advancement if INTn injection 'fails' (git-fixes).
- KVM: SVM: fix panic on out-of-bounds guest IRQ (git-fixes).
- KVM: VMX: Print VM-instruction error as unsigned (git-fixes).
- KVM: VMX: prepare sync_pir_to_irr for running with APICv disabled (git-fixes).
- KVM: VMX: switch blocked_vcpu_on_cpu_lock to raw spinlock (git-fixes).
- KVM: X86: Use vcpu->arch.walk_mmu for kvm_mmu_invlpg() (git-fixes).
- KVM: X86: avoid uninitialized 'fault.async_page_fault' from fixed-up #PF (git-fixes).
- KVM: arm64: Avoid setting the upper 32 bits of TCR_EL2 and CPTR_EL2 (bsc#1201442)
- KVM: nVMX: Defer APICv updates while L2 is active until L1 is active (git-fixes).
- KVM: nVMX: Inject #UD if VMXON is attempted with incompatible CR0/CR4 (git-fixes).
- KVM: nVMX: Let userspace set nVMX MSR to any _host_ supported value (git-fixes).
- KVM: nVMX: Set UMIP bit CR4_FIXED1 MSR when emulating UMIP (git-fixes).
- KVM: nVMX: Snapshot pre-VM-Enter BNDCFGS for !nested_run_pending case (git-fixes).
- KVM: nVMX: Snapshot pre-VM-Enter DEBUGCTL for !nested_run_pending case (git-fixes).
- KVM: nVMX: Synthesize TRIPLE_FAULT for L2 if emulation is required (git-fixes).
- KVM: nVMX: do not use vcpu->arch.efer when checking host state on nested state load (git-fixes).
- KVM: selftests: Make sure kvm_create_max_vcpus test won't hit RLIMIT_NOFILE (git-fixes).
- KVM: selftests: Silence compiler warning in the kvm_page_table_test (git-fixes).
- KVM: x86/mmu: Do not freak out if pml5_root is NULL on 4-level host (git-fixes).
- KVM: x86/mmu: Move 'invalid' check out of kvm_tdp_mmu_get_root() (git-fixes).
- KVM: x86/mmu: Zap _all_ roots when unmapping gfn range in TDP MMU (git-fixes).
- KVM: x86/mmu: include EFER.LMA in extended mmu role (git-fixes).
- KVM: x86/mmu: make apf token non-zero to fix bug (git-fixes).
- KVM: x86: Avoid theoretical NULL pointer dereference in kvm_irq_delivery_to_apic_fast() (git-fixes).
- KVM: x86: Check lapic_in_kernel() before attempting to set a SynIC irq (git-fixes).
- KVM: x86: Forbid VMM to set SYNIC/STIMER MSRs when SynIC wasn't activated (git-fixes).
- KVM: x86: Mark TSS busy during LTR emulation _after_ all fault checks (git-fixes).
- KVM: x86: SVM: do not passthrough SMAP/SMEP/PKE bits in !NPT && !gCR0.PG case (git-fixes).
- KVM: x86: Set error code to segment selector on LLDT/LTR non-canonical #GP (git-fixes).
- KVM: x86: check PIR even for vCPUs with disabled APICv (git-fixes).
- KVM: x86: hyper-v: Drop redundant 'ex' parameter from kvm_hv_flush_tlb() (git-fixes).
- KVM: x86: ignore APICv if LAPIC is not enabled (git-fixes).
- KVM: x86: remove PMU FIXED_CTR3 from msrs_to_save_all (git-fixes).
- KVM: x86: revalidate steal time cache if MSR value changes (git-fixes).
- NFSD: Clamp WRITE offsets (git-fixes).
- NFSD: Fix NFSv3 SETATTR/CREATE's handling of large file sizes (git-fixes).
- NFSD: Fix ia_size underflow (git-fixes).
- NFSD: Fix possible sleep during nfsd4_release_lockowner() (git-fixes).
- NFSD: prevent integer overflow on 32 bit systems (git-fixes).
- NFSD: prevent underflow in nfssvc_decode_writeargs() (git-fixes).
- NTB: ntb_tool: uninitialized heap data in tool_fn_write() (git-fixes).
- PCI/ACPI: Guard ARM64-specific mcfg_quirks (git-fixes).
- PCI/AER: Iterate over error counters instead of error strings (git-fixes).
- PCI/portdrv: Do not disable AER reporting in get_port_device_capability() (git-fixes).
- PCI: Add ACS quirk for Broadcom BCM5750x NICs (git-fixes).
- PCI: aardvark: Fix reporting Slot capabilities on emulated bridge (git-fixes).
- PCI: dwc: Add unroll iATU space support to dw_pcie_disable_atu() (git-fixes).
- PCI: dwc: Always enable CDM check if 'snps,enable-cdm-check' exists (git-fixes).
- PCI: dwc: Deallocate EPC memory on dw_pcie_ep_init() errors (git-fixes).
- PCI: dwc: Disable outbound windows only for controllers using iATU (git-fixes).
- PCI: dwc: Set INCREASE_REGION_SIZE flag based on limit address (git-fixes).
- PCI: dwc: Stop link on host_init errors and de-initialization (git-fixes).
- PCI: endpoint: Do not stop controller when unbinding endpoint function (git-fixes).
- PCI: hv: Only reuse existing IRTE allocation for Multi-MSI (bsc#1200845).
- PCI: microchip: Fix refcount leak in mc_pcie_init_irq_domains() (git-fixes).
- PCI: qcom: Power on PHY before IPQ8074 DBI register accesses (git-fixes).
- PCI: qcom: Set up rev 2.1.0 PARF_PHY before enabling clocks (git-fixes).
- PCI: tegra194: Fix PM error handling in tegra_pcie_config_ep() (git-fixes).
- PCI: tegra194: Fix Root Port interrupt handling (git-fixes).
- PCI: tegra194: Fix link up retry sequence (git-fixes).
- PM: domains: Ensure genpd_debugfs_dir exists before remove (git-fixes).
- PM: hibernate: defer device probing when resuming from hibernation (git-fixes).
- SUNRPC: Fix NFSD's request deferral on RDMA transports (git-fixes).
- SUNRPC: Fix READ_PLUS crasher (git-fixes).
- SUNRPC: Prevent immediate close+reconnect (git-fixes).
- USB: Follow-up to SPDX GPL-2.0+ identifiers addition - remove now useless comments (git-fixes).
- USB: Follow-up to SPDX identifiers addition - remove now useless comments (git-fixes).
- USB: serial: ch314: use usb_control_msg_recv() (git-fixes).
- USB: serial: ch341: fix disabled rx timer on older devices (git-fixes).
- USB: serial: ch341: fix lost character on LCR updates (git-fixes).
- USB: serial: fix tty-port initialized comments (git-fixes).
- XArray: Update the LRU list in xas_split() (git-fixes).
- apparmor: Fix failed mount permission check error message (git-fixes).
- apparmor: Fix memleak in aa_simple_write_to_buffer() (git-fixes).
- apparmor: fix aa_label_asxprint return check (git-fixes).
- apparmor: fix absroot causing audited secids to begin with = (git-fixes).
- apparmor: fix overlapping attachment computation (git-fixes).
- apparmor: fix quiet_denied for file rules (git-fixes).
- apparmor: fix reference count leak in aa_pivotroot() (git-fixes).
- apparmor: fix setting unconfined mode on a loaded profile (git-fixes).
- arm64: Do not forget syscall when starting a new thread (git-fixes).
- arm64: Fix match_list for erratum 1286807 on Arm Cortex-A76 (git-fixes).
- arm64: cpufeature: Allow different PMU versions in ID_DFR0_EL1 (git-fixes).
- arm64: dts: allwinner: a64: orangepi-win: Fix LED node name (git-fixes).
- arm64: dts: mt7622: fix BPI-R64 WPS button (git-fixes).
- arm64: dts: mt8192: Fix idle-states entry-method (git-fixes).
- arm64: dts: mt8192: Fix idle-states nodes naming scheme (git-fixes).
- arm64: dts: qcom: ipq8074: fix NAND node name (git-fixes).
- arm64: dts: qcom: msm8916: Fix typo in pronto remoteproc node (git-fixes).
- arm64: dts: qcom: qcs404: Fix incorrect USB2 PHYs assignment (git-fixes).
- arm64: dts: qcom: sm8250: add missing PCIe PHY clock-cells (git-fixes).
- arm64: dts: renesas: Fix thermal-sensors on single-zone sensors (git-fixes).
- arm64: dts: renesas: beacon: Fix regulator node names (git-fixes).
- arm64: dts: uniphier: Fix USB interrupts for PXs3 SoC (git-fixes).
- arm64: fix oops in concurrently setting insn_emulation sysctls (git-fixes).
- arm64: fix rodata=full (git-fixes).
- arm64: kasan: Revert 'arm64: mte: reset the page tag in page->flags' (git-fixes).
- arm64: set UXN on swapper page tables (git-fixes).
- arm64: tegra: Fix SDMMC1 CD on P2888 (git-fixes).
- arm64: tegra: Fixup SYSRAM references (git-fixes).
- arm64: tegra: Mark BPMP channels as no-memory-wc (git-fixes).
- arm64: tegra: Update Tegra234 BPMP channel addresses (git-fixes).
- arm_pmu: Validate single/group leader events (git-fixes).
- asm-generic: remove a broken and needless ifdef conditional (git-fixes).
- asm-generic: sections: refactor memory_intersects (git-fixes).
- ata: libata-eh: Add missing command name (git-fixes).
- ath10k: do not enforce interrupt trigger type (git-fixes).
- ath11k: Fix incorrect debug_mask mappings (git-fixes).
- ath11k: fix netdev open race (git-fixes).
- atm: idt77252: fix use-after-free bugs caused by tst_timer (git-fixes).
- audit: fix potential double free on error path from fsnotify_add_inode_mark (git-fixes).
- ax25: Fix ax25 session cleanup problems (git-fixes).
- bitfield.h: Fix 'type of reg too small for mask' test (git-fixes).
- block: Fix fsync always failed if once failed (bsc#1202779).
- block: Fix wrong offset in bio_truncate() (bsc#1202780).
- block: fix rq-qos breakage from skipping rq_qos_done_bio() (bsc#1202781).
- block: only mark bio as tracked if it really is tracked (bsc#1202782).
- bnx2x: Invalidate fastpath HSI version for VFs (git-fixes).
- bnx2x: Utilize firmware 7.13.21.0 (git-fixes).
- btrfs: properly flag filesystem with BTRFS_FEATURE_INCOMPAT_BIG_METADATA (git-fixes).
- bus: hisi_lpc: fix missing platform_device_put() in hisi_lpc_acpi_probe() (git-fixes).
- can: Break loopback loop on loopback documentation (git-fixes).
- can: ems_usb: fix clang's -Wunaligned-access warning (git-fixes).
- can: error: specify the values of data[5..7] of CAN error frames (git-fixes).
- can: hi311x: do not report txerr and rxerr during bus-off (git-fixes).
- can: j1939: j1939_sk_queue_activate_next_locked(): replace WARN_ON_ONCE with netdev_warn_once() (git-fixes).
- can: kvaser_usb_hydra: do not report txerr and rxerr during bus-off (git-fixes).
- can: kvaser_usb_leaf: do not report txerr and rxerr during bus-off (git-fixes).
- can: mcp251x: Fix race condition on receive interrupt (git-fixes).
- can: mcp251xfd: mcp251xfd_dump(): fix comment (git-fixes).
- can: netlink: allow configuring of fixed bit rates without need for do_set_bittiming callback (git-fixes).
- can: netlink: allow configuring of fixed data bit rates without need for do_set_data_bittiming callback (git-fixes).
- can: pch_can: do not report txerr and rxerr during bus-off (git-fixes).
- can: pch_can: pch_can_error(): initialize errc before using it (git-fixes).
- can: rcar_can: do not report txerr and rxerr during bus-off (git-fixes).
- can: sja1000: do not report txerr and rxerr during bus-off (git-fixes).
- can: sun4i_can: do not report txerr and rxerr during bus-off (git-fixes).
- can: usb_8dev: do not report txerr and rxerr during bus-off (git-fixes).
- ceph: do not leak snap_rwsem in handle_cap_grant (bsc#1202823).
- ceph: do not truncate file in atomic_open (bsc#1202824).
- ceph: use correct index when encoding client supported features (bsc#1202822).
- cfg80211/mac80211: assume CHECKSUM_COMPLETE includes SNAP (bsc#1202131).
- cgroup: Use separate src/dst nodes when preloading css_sets for migration (bsc#1201610).
- cifs: fix reconnect on smb3 mount types (bsc#1201427).
- clk: bcm: rpi: Fix error handling of raspberrypi_fw_get_rate (git-fixes).
- clk: core: Fix runtime PM sequence in clk_core_unprepare() (git-fixes).
- clk: core: Honor CLK_OPS_PARENT_ENABLE for clk gate ops (git-fixes).
- clk: mediatek: reset: Fix written reset bit offset (git-fixes).
- clk: qcom: camcc-sdm845: Fix topology around titan_top power domain (git-fixes).
- clk: qcom: camcc-sm8250: Fix halt on boot by reducing driver's init level (git-fixes).
- clk: qcom: camcc-sm8250: Fix topology around titan_top power domain (git-fixes).
- clk: qcom: clk-alpha-pll: fix clk_trion_pll_configure description (git-fixes).
- clk: qcom: clk-krait: unlock spin after mux completion (git-fixes).
- clk: qcom: clk-rcg2: Fail Duty-Cycle configuration if MND divider is not enabled (git-fixes).
- clk: qcom: clk-rcg2: Make sure to not write d=0 to the NMD register (git-fixes).
- clk: qcom: gcc-msm8939: Add missing SYSTEM_MM_NOC_BFDCD_CLK_SRC (git-fixes).
- clk: qcom: gcc-msm8939: Add missing system_mm_noc_bfdcd_clk_src (git-fixes).
- clk: qcom: gcc-msm8939: Fix bimc_ddr_clk_src rcgr base address (git-fixes).
- clk: qcom: gcc-msm8939: Fix weird field spacing in ftbl_gcc_camss_cci_clk (git-fixes).
- clk: qcom: gcc-msm8939: Point MM peripherals to system_mm_noc clock (git-fixes).
- clk: qcom: ipq8074: SW workaround for UBI32 PLL lock (git-fixes).
- clk: qcom: ipq8074: dont disable gcc_sleep_clk_src (git-fixes).
- clk: qcom: ipq8074: fix NSS core PLL-s (git-fixes).
- clk: qcom: ipq8074: fix NSS port frequency tables (git-fixes).
- clk: qcom: ipq8074: set BRANCH_HALT_DELAY flag for UBI clocks (git-fixes).
- clk: renesas: r9a06g032: Fix UART clkgrp bitsel (git-fixes).
- clk: ti: Stop using legacy clkctrl names for omap4 and 5 (git-fixes).
- configfs: fix a race in configfs_{,un}register_subsystem() (git-fixes).
- cpufreq: zynq: Fix refcount leak in zynq_get_revision (git-fixes).
- crypto: arm64/poly1305 - fix a read out-of-bound (git-fixes).
- crypto: ccp - During shutdown, check SEV data pointer before using (git-fixes).
- crypto: ccp - Use kzalloc for sev ioctl interfaces to prevent kernel memory leak (git-fixes).
- crypto: hisilicon - Kunpeng916 crypto driver do not sleep when in softirq (git-fixes).
- crypto: hisilicon/hpre - do not use GFP_KERNEL to alloc mem during softirq (git-fixes).
- crypto: hisilicon/sec - do not sleep when in softirq (git-fixes).
- crypto: hisilicon/sec - fix auth key size error (git-fixes).
- crypto: inside-secure - Add missing MODULE_DEVICE_TABLE for of (git-fixes).
- crypto: sun8i-ss - do not allocate memory when handling hash requests (git-fixes).
- crypto: sun8i-ss - fix error codes in allocate_flows() (git-fixes).
- crypto: sun8i-ss - fix infinite loop in sun8i_ss_setup_ivs() (git-fixes).
- device property: Check fwnode->secondary when finding properties (git-fixes).
- devlink: Fix use-after-free after a failed reload (git-fixes).
- dm raid: fix KASAN warning in raid5_add_disks (git-fixes).
- dma-debug: change allocation mode from GFP_NOWAIT to GFP_ATIOMIC (git-fixes).
- dma-debug: make things less spammy under memory pressure (git-fixes).
- dmaengine: dw-axi-dmac: do not print NULL LLI during error (git-fixes).
- dmaengine: dw-axi-dmac: ignore interrupt if no descriptor (git-fixes).
- dmaengine: dw-edma: Fix eDMA Rd/Wr-channels and DMA-direction semantics (git-fixes).
- dmaengine: imx-dma: Cast of_device_get_match_data() with (uintptr_t) (git-fixes).
- dmaengine: sf-pdma: Add multithread support for a DMA channel (git-fixes).
- dmaengine: sprd: Cleanup in .remove() after pm_runtime_get_sync() failed (git-fixes).
- dmaengine: stm32-mdma: Remove dead code in stm32_mdma_irq_handler() (git-fixes).
- docs/kernel-parameters: Update descriptions for 'mitigations=' param with retbleed (git-fixes).
- docs: i2c: i2c-sysfs: fix hyperlinks (git-fixes).
- docs: zh_CN: fix a broken reference (git-fixes).
- dpaa2-eth: fix ethtool statistics (git-fixes).
- driver core: Do not probe devices after bus_type.match() probe deferral (git-fixes).
- driver core: fix potential deadlock in __driver_attach (git-fixes).
- drivers/iio: Remove all strcpy() uses (git-fixes).
- drivers: usb: dwc3-qcom: Add sdm660 compatible (git-fixes).
- drm/amd/amd_shared.h: Add missing doc for PP_GFX_DCS_MASK (git-fixes).
- drm/amd/display: Add option to defer works of hpd_rx_irq (git-fixes).
- drm/amd/display: Avoid MPC infinite loop (git-fixes).
- drm/amd/display: Check correct bounds for stream encoder instances for DCN303 (git-fixes).
- drm/amd/display: Enable building new display engine with KCOV enabled (git-fixes).
- drm/amd/display: Fix HDMI VSIF V3 incorrect issue (git-fixes).
- drm/amd/display: Fix pixel clock programming (git-fixes).
- drm/amd/display: Fix surface optimization regression on Carrizo (git-fixes).
- drm/amd/display: For stereo keep 'FLIP_ANY_FRAME' (git-fixes).
- drm/amd/display: Ignore First MST Sideband Message Return Error (git-fixes).
- drm/amd/display: Optimize bandwidth on following fast update (git-fixes).
- drm/amd/display: Reset DMCUB before HW init (git-fixes).
- drm/amd/display: Revert 'drm/amd/display: turn DPMS off on connector unplug' (git-fixes).
- drm/amd/display: avoid doing vm_init multiple time (git-fixes).
- drm/amd/display: clear optc underflow before turn off odm clock (git-fixes).
- drm/amd/pm: add missing ->fini_microcode interface for Sienna Cichlid (git-fixes).
- drm/amdgpu: Check BO's requested pinning domains against its preferred_domains (git-fixes).
- drm/amdgpu: Increase tlb flush timeout for sriov (git-fixes).
- drm/amdgpu: Remove one duplicated ef removal (git-fixes).
- drm/amdgpu: remove useless condition in amdgpu_job_stop_all_jobs_on_sched() (git-fixes).
- drm/bridge: lt9611uxc: Cancel only driver's work (git-fixes).
- drm/bridge: tc358767: Fix (e)DP bridge endpoint parsing in dedicated function (git-fixes).
- drm/bridge: tc358767: Make sure Refclk clock are enabled (git-fixes).
- drm/bridge: tc358767: Move (e)DP bridge endpoint parsing into dedicated function (git-fixes).
- drm/doc: Fix comment typo (git-fixes).
- drm/exynos/exynos7_drm_decon: free resources when clk_set_parent() failed (git-fixes).
- drm/gem: Properly annotate WW context on drm_gem_lock_reservations() error (git-fixes).
- drm/i915/display: avoid warnings when registering dual panel backlight (git-fixes).
- drm/i915/gt: Skip TLB invalidations once wedged (git-fixes).
- drm/i915/reg: Fix spelling mistake 'Unsupport' -> 'Unsupported' (git-fixes).
- drm/i915: fix null pointer dereference (git-fixes).
- drm/mcde: Fix refcount leak in mcde_dsi_bind (git-fixes).
- drm/mediatek: Add pull-down MIPI operation in mtk_dsi_poweroff function (git-fixes).
- drm/mediatek: Allow commands to be sent during video mode (git-fixes).
- drm/mediatek: Keep dsi as LP00 before dcs cmds transfer (git-fixes).
- drm/mediatek: Modify dsi funcs to atomic operations (git-fixes).
- drm/mediatek: Separate poweron/poweroff from enable/disable and define new funcs (git-fixes).
- drm/mediatek: dpi: Only enable dpi after the bridge is enabled (git-fixes).
- drm/mediatek: dpi: Remove output format of YUV (git-fixes).
- drm/meson: Fix overflow implicit truncation warnings (git-fixes).
- drm/meson: Fix refcount bugs in meson_vpu_has_available_connectors() (git-fixes).
- drm/mipi-dbi: align max_chunk to 2 in spi_transfer (git-fixes).
- drm/msm/dp: delete DP_RECOVERED_CLOCK_OUT_EN to fix tps4 (git-fixes).
- drm/msm/dpu: Fix for non-visible planes (git-fixes).
- drm/msm/dsi: Fix number of regulators for SDM660 (git-fixes).
- drm/msm/dsi: Fix number of regulators for msm8996_dsi_cfg (git-fixes).
- drm/msm/dsi: fix the inconsistent indenting (git-fixes).
- drm/msm/hdmi: drop empty 'none' regulator lists (git-fixes).
- drm/msm/hdmi: enable core-vcc/core-vdda-supply for 8996 platform (git-fixes).
- drm/msm/mdp5: Fix global state lock backoff (git-fixes).
- drm/msm: Avoid dirtyfb stalls on video mode displays (v2) (git-fixes).
- drm/msm: Fix dirtyfb refcounting (git-fixes).
- drm/nouveau/acpi: Do not print error when we get -EINPROGRESS from pm_runtime (git-fixes).
- drm/nouveau/kms: Fix failure path for creating DP connectors (git-fixes).
- drm/nouveau: Do not pm_runtime_put_sync(), only pm_runtime_put_autosuspend() (git-fixes).
- drm/nouveau: fix another off-by-one in nvbios_addr (git-fixes).
- drm/nouveau: recognise GA103 (git-fixes).
- drm/radeon: fix incorrrect SPDX-License-Identifiers (git-fixes).
- drm/radeon: fix potential buffer overflow in ni_set_mc_special_registers() (git-fixes).
- drm/rockchip: Fix an error handling path rockchip_dp_probe() (git-fixes).
- drm/rockchip: vop: Do not crash for invalid duplicate_state() (git-fixes).
- drm/shmem-helper: Add missing vunmap on error (git-fixes).
- drm/simpledrm: Fix return type of simpledrm_simple_display_pipe_mode_valid() (git-fixes).
- drm/st7735r: Fix module autoloading for Okaya RH128128T (git-fixes).
- drm/sun4i: dsi: Prevent underflow when computing packet sizes (git-fixes).
- drm/ttm: Fix dummy res NULL ptr deref bug (git-fixes).
- drm/udl: Add parameter to set number of URBs (bsc#1195917).
- drm/udl: Add reset_resume (bsc#1195917)
- drm/udl: Do not re-initialize stuff at retrying the URB list allocation (bsc#1195917).
- drm/udl: Drop unneeded alignment (bsc#1195917).
- drm/udl: Enable damage clipping (bsc#1195917).
- drm/udl: Fix inconsistent urbs.count value during udl_free_urb_list() (bsc#1195917).
- drm/udl: Fix potential URB leaks (bsc#1195917).
- drm/udl: Increase the default URB list size to 20 (bsc#1195917).
- drm/udl: Kill pending URBs at suspend and disconnect (bsc#1195917).
- drm/udl: Replace BUG_ON() with WARN_ON() (bsc#1195917).
- drm/udl: Replace semaphore with a simple wait queue (bsc#1195917).
- drm/udl: Restore display mode on resume (bsc#1195917)
- drm/udl: Suppress error print for -EPROTO at URB completion (bsc#1195917).
- drm/udl: Sync pending URBs at suspend / disconnect (bsc#1195917).
- drm/udl: Sync pending URBs at the end of suspend (bsc#1195917).
- drm/vc4: change vc4_dma_range_matches from a global to static (git-fixes).
- drm/vc4: drv: Adopt the dma configuration from the HVS or V3D component (git-fixes).
- drm/vc4: dsi: Add correct stop condition to vc4_dsi_encoder_disable iteration (git-fixes).
- drm/vc4: dsi: Correct DSI divider calculations (git-fixes).
- drm/vc4: dsi: Correct pixel order for DSI0 (git-fixes).
- drm/vc4: dsi: Fix dsi0 interrupt support (git-fixes).
- drm/vc4: dsi: Register dsi0 as the correct vc4 encoder type (git-fixes).
- drm/vc4: hdmi: Correct HDMI timing registers for interlaced modes (git-fixes).
- drm/vc4: hdmi: Disable audio if dmas property is present but empty (git-fixes).
- drm/vc4: hdmi: Fix timings for interlaced modes (git-fixes).
- drm/vc4: hdmi: Reset HDMI MISC_CONTROL register (git-fixes).
- drm/vc4: plane: Fix margin calculations for the right/bottom edges (git-fixes).
- drm/vc4: plane: Remove subpixel positioning check (git-fixes).
- drm: adv7511: override i2c address of cec before accessing it (git-fixes).
- drm: bridge: adv7511: Add check for mipi_dsi_driver_register (git-fixes).
- drm: bridge: sii8620: fix possible off-by-one (git-fixes).
- dsa: mv88e6xxx: fix debug print for SPEED_UNFORCED (git-fixes).
- dt-bindings: arm: qcom: fix MSM8916 MTP compatibles (git-fixes).
- dt-bindings: arm: qcom: fix MSM8994 boards compatibles (git-fixes).
- dt-bindings: bluetooth: broadcom: Add BCM4349B1 DT binding (git-fixes).
- dt-bindings: clock: qcom,gcc-msm8996: add more GCC clock sources (git-fixes).
- dt-bindings: gpio: zynq: Add missing compatible strings (git-fixes).
- dt-bindings: iio: accel: Add DT binding doc for ADXL355 (git-fixes).
- dt-bindings: usb: mtk-xhci: Allow wakeup interrupt-names to be optional (git-fixes).
- eeprom: idt_89hpesx: uninitialized data in idt_dbgfs_csr_write() (git-fixes).
- erofs: fix deadlock when shrink erofs slab (git-fixes).
- ethernet: rocker: fix sleep in atomic context bug in neigh_timer_handler (git-fies).
- exfat: Define NLS_NAME_* as bit flags explicitly (bsc#1201725).
- exfat: Downgrade ENAMETOOLONG error message to debug messages (bsc#1201725).
- exfat: Drop superfluous new line for error messages (bsc#1201725).
- exfat: Expand exfat_err() and co directly to pr_*() macro (bsc#1201725).
- exfat: Return ENAMETOOLONG consistently for oversized paths (bsc#1201725).
- exfat: fix i_blocks for files truncated over 4 GiB (git-fixes).
- exfat: fix referencing wrong parent directory information after renaming (git-fixes).
- exfat: reuse exfat_inode_info variable instead of calling EXFAT_I() (git-fixes).
- exfat: use updated exfat_chain directly during renaming (git-fixes).
- export: fix string handling of namespace in EXPORT_SYMBOL_NS (git-fixes).
- ext4: Fix BUG_ON in ext4_bread when write quota data (bsc#1197755).
- ext4: add new helper interface ext4_try_to_trim_range() (bsc#1202783).
- ext4: add reserved GDT blocks check (bsc#1202712).
- ext4: do not use the orphan list when migrating an inode (bsc#1197756).
- ext4: fast commit may miss tracking unwritten range during ftruncate (bsc#1202759).
- ext4: filter out EXT4_FC_REPLAY from on-disk superblock field s_state (bsc#1202771).
- ext4: fix a possible ABBA deadlock due to busy PA (bsc#1202762).
- ext4: fix bug_on in ext4_writepages (bsc#1200872).
- ext4: fix error handling in ext4_fc_record_modified_inode() (bsc#1202767).
- ext4: fix error handling in ext4_restore_inline_data() (bsc#1197757).
- ext4: fix fallocate to use file_modified to update permissions consistently (bsc#1202769).
- ext4: fix fast commit may miss tracking range for FALLOC_FL_ZERO_RANGE (bsc#1202757).
- ext4: fix fs corruption when tring to remove a non-empty directory with IO error (bsc#1202768).
- ext4: fix incorrect type issue during replay_del_range (bsc#1202867).
- ext4: fix null-ptr-deref in '__ext4_journal_ensure_credits' (bsc#1202764).
- ext4: fix overhead calculation to account for the reserved gdt blocks (bsc#1200869).
- ext4: fix race when reusing xattr blocks (bsc#1198971).
- ext4: fix super block checksum incorrect after mount (bsc#1202773).
- ext4: fix symlink file size not match to file content (bsc#1200868).
- ext4: fix use-after-free in ext4_rename_dir_prepare (bsc#1200871).
- ext4: fix use-after-free in ext4_search_dir (bsc#1202710).
- ext4: fix warning in ext4_handle_inode_extension (bsc#1202711).
- ext4: force overhead calculation if the s_overhead_cluster makes no sense (bsc#1200870).
- ext4: initialize err_blk before calling __ext4_get_inode_loc (bsc#1202763).
- ext4: make sure quota gets properly shutdown on error (bsc#1195480).
- ext4: make sure to reset inode lockdep class when quota enabling fails (bsc#1202761).
- ext4: mark group as trimmed only if it was fully scanned (bsc#1202770).
- ext4: modify the logic of ext4_mb_new_blocks_simple (bsc#1202766).
- ext4: prevent used blocks from being allocated during fast commit replay (bsc#1202765).
- ext4: recover csum seed of tmp_inode after migrating to extents (bsc#1202713).
- ext4: remove EA inode entry from mbcache on inode eviction (bsc#1198971).
- ext4: unindent codeblock in ext4_xattr_block_set() (bsc#1198971).
- ext4: use ext4_ext_remove_space() for fast commit replay delete range (bsc#1202758).
- fat: add ratelimit to fat*_ent_bread() (git-fixes).
- fbcon: Fix boundary checks for fbcon=vc:n1-n2 parameters (git-fixes).
- fbdev: fb_pm2fb: Avoid potential divide by zero error (git-fixes).
- fbdev: fbcon: Properly revert changes when vc_resize() failed (git-fies).
- filemap: Handle sibling entries in filemap_get_read_batch() (bsc#1202774).
- firmware: arm_scpi: Ensure scpi_info is not assigned if the probe fails (git-fixes).
- firmware: tegra: Fix error check return value of debugfs_create_file() (git-fixes).
- firmware: tegra: bpmp: Do only aligned access to IPC memory area (git-fixes).
- fix race between exit_itimers() and /proc/pid/timers (git-fixes).
- fpga: altera-pr-ip: fix unsigned comparison with less than zero (git-fixes).
- fs-writeback: writeback_sb_inodes: Recalculate 'wrote' according skipped pages (bsc#1200873).
- ftrace/x86: Add back ftrace_expected assignment (git-fixes).
- fuse: ioctl: translate ENOSYS (bsc#1203139).
- fuse: limit nsec (bsc#1203138).
- gadgetfs: ep_io - wait until IRQ finishes (git-fixes).
- geneve: do not use RT_TOS for IPv6 flowlabel (git-fixes).
- geneve: fix TOS inheriting for ipv4 (git-fixes).
- gpio: gpiolib-of: Fix refcount bugs in of_mm_gpiochip_add_data() (git-fixes).
- gpio: pca953x: Add mutex_lock for regcache sync in PM (git-fixes).
- habanalabs/gaudi: fix shift out of bounds (git-fixes).
- habanalabs/gaudi: mask constant value before cast (git-fixes).
- hwmon: (dell-smm) Add Dell XPS 13 7390 to fan control whitelist (git-fixes).
- hwmon: (drivetemp) Add module alias (git-fixes).
- hwmon: (gpio-fan) Fix array out of bounds access (git-fixes).
- hwmon: (sht15) Fix wrong assumptions in device remove callback (git-fixes).
- i2c: Fix a potential use after free (git-fixes).
- i2c: cadence: Support PEC for SMBus block read (git-fixes).
- i2c: imx: Make sure to unregister adapter on remove() (git-fixes).
- i2c: mux-gpmux: Add of_node_put() when breaking out of loop (git-fixes).
- i2c: mxs: Silence a clang warning (git-fixes).
- i2c: npcm: Capitalize the one-line comment (git-fixes).
- i2c: npcm: Correct slave role behavior (git-fixes).
- i2c: npcm: Remove own slave addresses 2:10 (git-fixes).
- ice: fix 'scheduling while atomic' on aux critical err interrupt (git-fixes).
- ieee80211: add EHT 1K aggregation definitions (bsc#1202131).
- ieee80211: change HE nominal packet padding value defines (bsc#1202131).
- ieee802154/adf7242: defer destroy_workqueue call (git-fixes).
- iio: accel: bma220: Fix alignment for DMA safety (git-fixes).
- iio: accel: bma400: Fix the scale min and max macro values (git-fixes).
- iio: accel: bma400: Reordering of header files (git-fixes).
- iio: accel: sca3000: Fix alignment for DMA safety (git-fixes).
- iio: accel: sca3300: Fix alignment for DMA safety (git-fixes).
- iio: ad7292: Prevent regulator double disable (git-fixes).
- iio: adc: ad7266: Fix alignment for DMA safety (git-fixes).
- iio: adc: ad7292: Fix alignment for DMA safety (git-fixes).
- iio: adc: ad7298: Fix alignment for DMA safety (git-fixes).
- iio: adc: ad7476: Fix alignment for DMA safety (git-fixes).
- iio: adc: ad7766: Fix alignment for DMA safety (git-fixes).
- iio: adc: ad7768-1: Fix alignment for DMA safety (git-fixes).
- iio: adc: ad7887: Fix alignment for DMA safety (git-fixes).
- iio: adc: ad7923: Fix alignment for DMA safety (git-fixes).
- iio: adc: hi8435: Fix alignment for DMA safety (git-fixes).
- iio: adc: ltc2496: Fix alignment for DMA safety (git-fixes).
- iio: adc: ltc2497: Fix alignment for DMA safety (git-fixes).
- iio: adc: max1027: Fix alignment for DMA safety (git-fixes).
- iio: adc: max11100: Fix alignment for DMA safety (git-fixes).
- iio: adc: max1118: Fix alignment for DMA safety (git-fixes).
- iio: adc: max1241: Fix alignment for DMA safety (git-fixes).
- iio: adc: mcp320x: Fix alignment for DMA safety (git-fixes).
- iio: adc: mcp3911: make use of the sign bit (git-fixes).
- iio: adc: mcp3911: use correct formula for AD conversion (git-fixes).
- iio: adc: ti-adc0832: Fix alignment for DMA safety (git-fixes).
- iio: adc: ti-adc084s021: Fix alignment for DMA safety (git-fixes).
- iio: adc: ti-adc108s102: Fix alignment for DMA safety (git-fixes).
- iio: adc: ti-adc12138: Fix alignment for DMA safety (git-fixes).
- iio: adc: ti-adc128s052: Fix alignment for DMA safety (git-fixes).
- iio: adc: ti-adc161s626: Fix alignment for DMA safety (git-fixes).
- iio: adc: ti-ads124s08: Fix alignment for DMA safety (git-fixes).
- iio: adc: ti-ads131e08: Fix alignment for DMA safety (git-fixes).
- iio: adc: ti-ads7950: Fix alignment for DMA safety (git-fixes).
- iio: adc: ti-ads8344: Fix alignment for DMA safety (git-fixes).
- iio: adc: ti-ads8688: Fix alignment for DMA safety (git-fixes).
- iio: adc: ti-tlc4541: Fix alignment for DMA safety (git-fixes).
- iio: amplifiers: ad8366: Fix alignment for DMA safety (git-fixes).
- iio: common: ssp: Fix alignment for DMA safety (git-fixes).
- iio: core: Fix IIO_ALIGN and rename as it was not sufficiently large (git-fixes).
- iio: dac: ad5064: Fix alignment for DMA safety (git-fixes).
- iio: dac: ad5360: Fix alignment for DMA safety (git-fixes).
- iio: dac: ad5421: Fix alignment for DMA safety (git-fixes).
- iio: dac: ad5449: Fix alignment for DMA safety (git-fixes).
- iio: dac: ad5504: Fix alignment for DMA safety (git-fixes).
- iio: dac: ad5755: Fix alignment for DMA safety (git-fixes).
- iio: dac: ad5761: Fix alignment for DMA safety (git-fixes).
- iio: dac: ad5764: Fix alignment for DMA safety (git-fixes).
- iio: dac: ad5766: Fix alignment for DMA safety (git-fixes).
- iio: dac: ad5770r: Fix alignment for DMA safety (git-fixes).
- iio: dac: ad5791: Fix alignment for DMA saftey (git-fixes).
- iio: dac: ad7303: Fix alignment for DMA safety (git-fixes).
- iio: dac: ad8801: Fix alignment for DMA safety (git-fixes).
- iio: dac: mcp4922: Fix alignment for DMA safety (git-fixes).
- iio: dac: ti-dac082s085: Fix alignment for DMA safety (git-fixes).
- iio: dac: ti-dac5571: Fix alignment for DMA safety (git-fixes).
- iio: dac: ti-dac7311: Fix alignment for DMA safety (git-fixes).
- iio: dac: ti-dac7612: Fix alignment for DMA safety (git-fixes).
- iio: fix iio_format_avail_range() printing for none IIO_VAL_INT (git-fixes).
- iio: frequency: ad9523: Fix alignment for DMA safety (git-fixes).
- iio: frequency: adf4350: Fix alignment for DMA safety (git-fixes).
- iio: frequency: adf4371: Fix alignment for DMA safety (git-fixes).
- iio: gyro: adis16080: Fix alignment for DMA safety (git-fixes).
- iio: gyro: adis16130: Fix alignment for DMA safety (git-fixes).
- iio: gyro: adxrs450: Fix alignment for DMA safety (git-fixes).
- iio: gyro: fxas210002c: Fix alignment for DMA safety (git-fixes).
- iio: imu: fxos8700: Fix alignment for DMA safety (git-fixes).
- iio: light: isl29028: Fix the warning in isl29028_remove() (git-fixes).
- iio: potentiometer: ad5272: Fix alignment for DMA safety (git-fixes).
- iio: potentiometer: max5481: Fix alignment for DMA safety (git-fixes).
- iio: potentiometer: mcp41010: Fix alignment for DMA safety (git-fixes).
- iio: potentiometer: mcp4131: Fix alignment for DMA safety (git-fixes).
- iio: proximity: as3935: Fix alignment for DMA safety (git-fixes).
- iio: resolver: ad2s1200: Fix alignment for DMA safety (git-fixes).
- iio: resolver: ad2s90: Fix alignment for DMA safety (git-fixes).
- iio: temp: ltc2983: Fix alignment for DMA safety (git-fixes).
- iio: temp: maxim_thermocouple: Fix alignment for DMA safety (git-fixes).
- inet_diag: fix kernel-infoleak for UDP sockets (git-fixes).
- intel_th: Fix a resource leak in an error handling path (git-fixes).
- intel_th: msu-sink: Potential dereference of null pointer (git-fixes).
- intel_th: msu: Fix vmalloced buffers (git-fixes).
- intel_th: pci: Add Meteor Lake-P support (git-fixes).
- intel_th: pci: Add Raptor Lake-S CPU support (git-fixes).
- intel_th: pci: Add Raptor Lake-S PCH support (git-fixes).
- interconnect: imx: fix max_node_id (git-fixes).
- io_uring: add a schedule point in io_add_buffers() (git-fixes).
- io_uring: terminate manual loop iterator loop correctly for non-vecs (git-fixes).
- iommu/amd: Clarify AMD IOMMUv2 initialization messages (git-fixes).
- iommu/amd: Enable swiotlb in all cases (git-fixes).
- iommu/amd: Fix I/O page table memory leak (git-fixes).
- iommu/amd: Recover from event log overflow (git-fixes).
- iommu/amd: Simplify and Consolidate Virtual APIC (AVIC) Enablement (git-fixes).
- iommu/arm-smmu-v3-sva: Fix mm use-after-free (git-fixes).
- iommu/arm-smmu-v3: Fix size calculation in arm_smmu_mm_invalidate_range() (git-fixes).
- iommu/arm-smmu: qcom_iommu: Add of_node_put() when breaking out of loop (git-fixes).
- iommu/dart: Add missing module owner to ops structure (git-fixes).
- iommu/dart: check return value after calling platform_get_resource() (git-fixes).
- iommu/exynos: Handle failed IOMMU device registration properly (git-fixes).
- iommu/iova: Improve 32-bit free space estimate (git-fixes).
- iommu/ipmmu-vmsa: Check for error num after setting mask (git-fixes).
- iommu/mediatek: Add list_del in mtk_iommu_remove (git-fixes).
- iommu/mediatek: Add mutex for m4u_group and m4u_dom in data (git-fixes).
- iommu/mediatek: Fix 2 HW sharing pgtable issue (git-fixes).
- iommu/mediatek: Fix NULL pointer dereference when printing dev_name (git-fixes).
- iommu/mediatek: Remove clk_disable in mtk_iommu_remove (git-fixes).
- iommu/msm: Fix an incorrect NULL check on list iterator (git-fixes).
- iommu/omap: Fix regression in probe for NULL pointer dereference (git-fixes).
- iommu/tegra-smmu: Fix missing put_device() call in tegra_smmu_find (git-fixes).
- iommu/vt-d: Acquiring lock in domain ID allocation helpers (bsc#1200301).
- iommu/vt-d: Calculate mask for non-aligned flushes (git-fixes).
- iommu/vt-d: Drop stop marker messages (git-fixes).
- iommu/vt-d: Fix PCI bus rescan device hot add (git-fixes).
- iommu/vt-d: Fix RID2PASID setup/teardown failure (git-fixes).
- iommu/vt-d: Make DMAR_UNITS_SUPPORTED default 1024 (bsc#1200301).
- iommu/vt-d: Refactor iommu information of each domain (bsc#1200301).
- iommu/vt-d: Remove global g_iommus array (bsc#1200301).
- iommu/vt-d: Remove intel_iommu::domains (bsc#1200301).
- iommu/vt-d: Remove unnecessary check in intel_iommu_add() (bsc#1200301).
- iommu/vt-d: Use IDA interface to manage iommu sequence id (bsc#1200301).
- iommu/vt-d: avoid invalid memory access via node_online(NUMA_NO_NODE) (git-fixes).
- iommu: Fix potential use-after-free during probe (git-fixes).
- iov_iter: Fix iter_xarray_get_pages{,_alloc}() (git-fixes).
- iov_iter: fix build issue due to possible type mis-match (git-fixes).
- ipmi: fix initialization when workqueue allocation fails (git-fixes).
- irqchip/sifive-plic: Add missing thead,c900-plic match string (git-fixes).
- irqchip/tegra: Fix overflow implicit truncation warnings (git-fixes).
- iwlwifi/fw: use struct_size over open coded arithmetic (bsc#1202131).
- iwlwifi: ACPI: support revision 3 WGDS tables (bsc#1202131).
- iwlwifi: Add support for getting rf id with blank otp (bsc#1202131).
- iwlwifi: Add support for more BZ HWs (bsc#1202131).
- iwlwifi: BZ Family BUS_MASTER_DISABLE_REQ code duplication (bsc#1202131).
- iwlwifi: BZ Family SW reset support (bsc#1202131).
- iwlwifi: Configure FW debug preset via module param (bsc#1202131).
- iwlwifi: Fix FW name for gl (bsc#1202131).
- iwlwifi: Fix missing error code in iwl_pci_probe() (bsc#1202131).
- iwlwifi: Fix syntax errors in comments (bsc#1202131).
- iwlwifi: Make use of the helper macro LIST_HEAD() (bsc#1202131).
- iwlwifi: Read the correct addresses when getting the crf id (bsc#1202131).
- iwlwifi: Start scratch debug register for Bz family (bsc#1202131).
- iwlwifi: acpi: fix wgds rev 3 size (bsc#1202131).
- iwlwifi: acpi: move ppag code from mvm to fw/acpi (bsc#1202131).
- iwlwifi: add missing entries for Gf4 with So and SoF (bsc#1202131).
- iwlwifi: add new Qu-Hr device (bsc#1202131).
- iwlwifi: add new ax1650 killer device (bsc#1202131).
- iwlwifi: add new device id 7F70 (bsc#1202131).
- iwlwifi: add new pci SoF with JF (bsc#1202131).
- iwlwifi: add some missing kernel-doc in struct iwl_fw (bsc#1202131).
- iwlwifi: add support for BNJ HW (bsc#1202131).
- iwlwifi: add support for BZ-U and BZ-L HW (bsc#1202131).
- iwlwifi: add support for Bz-Z HW (bsc#1202131).
- iwlwifi: add vendor specific capabilities for some RFs (bsc#1202131).
- iwlwifi: advertise support for HE - DCM BPSK RX/TX (bsc#1202131).
- iwlwifi: allow rate-limited error messages (bsc#1202131).
- iwlwifi: api: fix struct iwl_wowlan_status_v7 kernel-doc (bsc#1202131).
- iwlwifi: api: remove ttl field from TX command (bsc#1202131).
- iwlwifi: api: remove unused RX status bits (bsc#1202131).
- iwlwifi: avoid variable shadowing (bsc#1202131).
- iwlwifi: avoid void pointer arithmetic (bsc#1202131).
- iwlwifi: bump FW API to 67 for AX devices (bsc#1202131).
- iwlwifi: bump FW API to 68 for AX devices (bsc#1202131).
- iwlwifi: bump FW API to 69 for AX devices (bsc#1202131).
- iwlwifi: bump FW API to 70 for AX devices (bsc#1202131).
- iwlwifi: bump FW API to 71 for AX devices (bsc#1202131).
- iwlwifi: bump FW API to 72 for AX devices (bsc#1202131).
- iwlwifi: cfg: add support for 1K BA queue (bsc#1202131).
- iwlwifi: dbg-tlv: clean up iwl_dbg_tlv_update_drams() (bsc#1202131).
- iwlwifi: dbg: add infra for tracking free buffer size (bsc#1202131).
- iwlwifi: dbg: check trigger data before access (bsc#1202131).
- iwlwifi: dbg: disable ini debug in 8000 family and below (bsc#1202131).
- iwlwifi: dbg: in sync mode do not call schedule (bsc#1202131).
- iwlwifi: dbg: treat dbgc allocation failure when tlv is missing (bsc#1202131).
- iwlwifi: dbg: treat non active regions as unsupported regions (bsc#1202131).
- iwlwifi: dbg_ini: Split memcpy() to avoid multi-field write (bsc#1202131).
- iwlwifi: de-const properly where needed (bsc#1202131).
- iwlwifi: debugfs: remove useless double condition (bsc#1202131).
- iwlwifi: do not dump_stack() when we get an unexpected interrupt (bsc#1202131).
- iwlwifi: do not use __unused as variable name (bsc#1202131).
- iwlwifi: drv: load tlv debug data earlier (bsc#1202131).
- iwlwifi: dump CSR scratch from outer function (bsc#1202131).
- iwlwifi: dump RCM error tables (bsc#1202131).
- iwlwifi: dump both TCM error tables if present (bsc#1202131).
- iwlwifi: dump host monitor data when NIC does not init (bsc#1202131).
- iwlwifi: dvm: use struct_size over open coded arithmetic (bsc#1202131).
- iwlwifi: eeprom: clean up macros (bsc#1202131).
- iwlwifi: fix LED dependencies (bsc#1202131).
- iwlwifi: fix debug TLV parsing (bsc#1202131).
- iwlwifi: fix fw/img.c license statement (bsc#1202131).
- iwlwifi: fix iwl_legacy_rate_to_fw_idx (bsc#1202131).
- iwlwifi: fix small doc mistake for iwl_fw_ini_addr_val (bsc#1202131).
- iwlwifi: fix various more -Wcast-qual warnings (bsc#1202131).
- iwlwifi: fw dump: add infrastructure for dump scrubbing (bsc#1202131).
- iwlwifi: fw: add support for splitting region type bits (bsc#1202131).
- iwlwifi: fw: api: add link to PHY context command struct v1 (bsc#1202131).
- iwlwifi: fw: correctly detect HW-SMEM region subtype (bsc#1202131).
- iwlwifi: fw: fix some scan kernel-doc (bsc#1202131).
- iwlwifi: fw: init SAR GEO table only if data is present (bsc#1202131).
- iwlwifi: fw: make dump_start callback void (bsc#1202131).
- iwlwifi: fw: remove dead error log code (bsc#1202131).
- iwlwifi: implement reset flow for Bz devices (bsc#1202131).
- iwlwifi: iwl-eeprom-parse: mostly dvm only (bsc#1202131).
- iwlwifi: make iwl_fw_lookup_cmd_ver() take a cmd_id (bsc#1202131).
- iwlwifi: make iwl_txq_dyn_alloc_dma() return the txq (bsc#1202131).
- iwlwifi: make some functions friendly to sparse (bsc#1202131).
- iwlwifi: move symbols into a separate namespace (bsc#1202131).
- iwlwifi: mvm/api: define system control command (bsc#1202131).
- iwlwifi: mvm: Add RTS and CTS flags to iwl_tx_cmd_flags (bsc#1202131).
- iwlwifi: mvm: Add list of OEMs allowed to use TAS (bsc#1202131).
- iwlwifi: mvm: Add support for a new version of scan request command (bsc#1202131).
- iwlwifi: mvm: Add support for new rate_n_flags in tx_cmd (bsc#1202131).
- iwlwifi: mvm: Consider P2P GO operation during scan (bsc#1202131).
- iwlwifi: mvm: Disable WiFi bands selectively with BIOS (bsc#1202131).
- iwlwifi: mvm: Do not fail if PPAG isn't supported (bsc#1202131).
- iwlwifi: mvm: Fix wrong documentation for scan request command (bsc#1202131).
- iwlwifi: mvm: Passively scan non PSC channels only when requested so (bsc#1202131).
- iwlwifi: mvm: Read acpi dsm to get channel activation bitmap (bsc#1202131).
- iwlwifi: mvm: Remove antenna c references (bsc#1202131).
- iwlwifi: mvm: Support new TX_RSP and COMPRESSED_BA_RES versions (bsc#1202131).
- iwlwifi: mvm: Support new rate_n_flags for REPLY_RX_MPDU_CMD and RX_NO_DATA_NOTIF (bsc#1202131).
- iwlwifi: mvm: Support new version of BEACON_TEMPLATE_CMD (bsc#1202131).
- iwlwifi: mvm: Support new version of ranging response notification (bsc#1202131).
- iwlwifi: mvm: Support version 3 of tlc_update_notif (bsc#1202131).
- iwlwifi: mvm: Unify the scan iteration functions (bsc#1202131).
- iwlwifi: mvm: Use all Rx chains for roaming scan (bsc#1202131).
- iwlwifi: mvm: add US/CA to TAS block list if OEM isn't allowed (bsc#1202131).
- iwlwifi: mvm: add a flag to reduce power command (bsc#1202131).
- iwlwifi: mvm: add additional info for boot info failures (bsc#1202131).
- iwlwifi: mvm: add additional info for boot info failures (bsc#1202131).
- iwlwifi: mvm: add dbg_time_point to debugfs (bsc#1202131).
- iwlwifi: mvm: add definitions for new rate & flags (bsc#1202131).
- iwlwifi: mvm: add lmac/umac PC info in case of error (bsc#1202131).
- iwlwifi: mvm: add missing min_size to kernel-doc (bsc#1202131).
- iwlwifi: mvm: add some missing command strings (bsc#1202131).
- iwlwifi: mvm: add support for 160Mhz in ranging measurements (bsc#1202131).
- iwlwifi: mvm: add support for CT-KILL notification version 2 (bsc#1202131).
- iwlwifi: mvm: add support for IMR based on platform (bsc#1202131).
- iwlwifi: mvm: add support for OCE scan (bsc#1202131).
- iwlwifi: mvm: add support for PHY context command v4 (bsc#1202131).
- iwlwifi: mvm: add support for statistics update version 15 (bsc#1202131).
- iwlwifi: mvm: allow enabling UHB TAS in the USA via ACPI setting (bsc#1202131).
- iwlwifi: mvm: always remove the session protection after association (bsc#1202131).
- iwlwifi: mvm: always store the PPAG table as the latest version (bsc#1202131).
- iwlwifi: mvm: always use 4K RB size by default (bsc#1202131).
- iwlwifi: mvm: change old-SN drop threshold (bsc#1202131).
- iwlwifi: mvm: clean up indenting in iwl_mvm_tlc_update_notif() (bsc#1202131).
- iwlwifi: mvm: convert old rate & flags to the new format (bsc#1202131).
- iwlwifi: mvm: correct sta-state logic for TDLS (bsc#1202131).
- iwlwifi: mvm: correctly set channel flags (bsc#1202131).
- iwlwifi: mvm: correctly set schedule scan profiles (bsc#1202131).
- iwlwifi: mvm: d3: move GTK rekeys condition (bsc#1202131).
- iwlwifi: mvm: d3: support v12 wowlan status (bsc#1202131).
- iwlwifi: mvm: d3: use internal data representation (bsc#1202131).
- iwlwifi: mvm: demote non-compliant kernel-doc header (bsc#1202131).
- iwlwifi: mvm: do not get address of mvm->fwrt just to dereference as a pointer (bsc#1202131).
- iwlwifi: mvm: do not send BAID removal to the FW during hw_restart (bsc#1202131).
- iwlwifi: mvm: do not trust hardware queue number (bsc#1202131).
- iwlwifi: mvm: drop too short packets silently (bsc#1202131).
- iwlwifi: mvm: extend session protection on association (bsc#1202131).
- iwlwifi: mvm: fix WGDS table print in iwl_mvm_chub_update_mcc() (bsc#1202131).
- iwlwifi: mvm: fix a stray tab (bsc#1202131).
- iwlwifi: mvm: fix condition which checks the version of rate_n_flags (bsc#1202131).
- iwlwifi: mvm: fix delBA vs. NSSN queue sync race (bsc#1202131).
- iwlwifi: mvm: fix ieee80211_get_he_iftype_cap() iftype (bsc#1202131).
- iwlwifi: mvm: fix off by one in iwl_mvm_stat_iterator_all_macs() (bsc#1202131).
- iwlwifi: mvm: fw: clean up hcmd struct creation (bsc#1202131).
- iwlwifi: mvm: handle RX checksum on Bz devices (bsc#1202131).
- iwlwifi: mvm: improve log when processing CSA (bsc#1202131).
- iwlwifi: mvm: isolate offload assist (checksum) calculation (bsc#1202131).
- iwlwifi: mvm: make iwl_mvm_reconfig_scd() static (bsc#1202131).
- iwlwifi: mvm: offload channel switch timing to FW (bsc#1202131).
- iwlwifi: mvm: only enable HE DCM if we also support TX (bsc#1202131).
- iwlwifi: mvm: optionally suppress assert log (bsc#1202131).
- iwlwifi: mvm: parse firmware alive message version 6 (bsc#1202131).
- iwlwifi: mvm: read 6E enablement flags from DSM and pass to FW (bsc#1202131).
- iwlwifi: mvm: reduce WARN_ON() in TX status path (bsc#1202131).
- iwlwifi: mvm: refactor iwl_mvm_sta_rx_agg() (bsc#1202131).
- iwlwifi: mvm: refactor setting PPE thresholds in STA_HE_CTXT_CMD (bsc#1202131).
- iwlwifi: mvm: remove card state notification code (bsc#1202131).
- iwlwifi: mvm: remove cipher scheme support (bsc#1202131).
- iwlwifi: mvm: remove csi from iwl_mvm_pass_packet_to_mac80211() (bsc#1202131).
- iwlwifi: mvm: remove iwl_mvm_disable_txq() flags argument (bsc#1202131).
- iwlwifi: mvm: remove session protection after auth/assoc (bsc#1202131).
- iwlwifi: mvm: remove session protection on disassoc (bsc#1202131).
- iwlwifi: mvm: remove session protection upon station removal (bsc#1202131).
- iwlwifi: mvm: rfi: handle deactivation notification (bsc#1202131).
- iwlwifi: mvm: rfi: update rfi table (bsc#1202131).
- iwlwifi: mvm: rfi: use kmemdup() to replace kzalloc + memcpy (bsc#1202131).
- iwlwifi: mvm: scrub key material in firmware dumps (bsc#1202131).
- iwlwifi: mvm: set BT-coex high priority for 802.1X/4-way-HS (bsc#1202131).
- iwlwifi: mvm: set inactivity timeouts also for PS-poll (bsc#1202131).
- iwlwifi: mvm: starting from 22000 we have 32 Rx AMPDU sessions (bsc#1202131).
- iwlwifi: mvm: support Bz TX checksum offload (bsc#1202131).
- iwlwifi: mvm: support RLC configuration command (bsc#1202131).
- iwlwifi: mvm: support new BAID allocation command (bsc#1202131).
- iwlwifi: mvm: support revision 1 of WTAS table (bsc#1202131).
- iwlwifi: mvm: support v3 of station HE context command (bsc#1202131).
- iwlwifi: mvm: update BAID allocation command again (bsc#1202131).
- iwlwifi: mvm: update RFI TLV (bsc#1202131).
- iwlwifi: mvm: update definitions due to new rate & flags (bsc#1202131).
- iwlwifi: mvm: update rate scale in moving back to assoc state (bsc#1202131).
- iwlwifi: mvm: use a define for checksum flags mask (bsc#1202131).
- iwlwifi: mvm: use debug print instead of WARN_ON() (bsc#1202131).
- iwlwifi: nvm: Correct HE capability (bsc#1202131).
- iwlwifi: parse debug exclude data from firmware file (bsc#1202131).
- iwlwifi: parse error tables from debug TLVs (bsc#1202131).
- iwlwifi: pcie: Adapt rx queue write pointer for Bz family (bsc#1202131).
- iwlwifi: pcie: add jacket bit to device configuration parsing (bsc#1202131).
- iwlwifi: pcie: add support for MS devices (bsc#1202131).
- iwlwifi: pcie: adjust to Bz completion descriptor (bsc#1202131).
- iwlwifi: pcie: fix SW error MSI-X mapping (bsc#1202131).
- iwlwifi: pcie: fix constant-conversion warning (bsc#1202131).
- iwlwifi: pcie: fix killer name matching for AX200 (bsc#1202131).
- iwlwifi: pcie: iwlwifi: fix device id 7F70 struct (bsc#1202131).
- iwlwifi: pcie: make sure iwl_rx_packet_payload_len() will not underflow (bsc#1202131).
- iwlwifi: pcie: refactor dev_info lookup (bsc#1202131).
- iwlwifi: pcie: remove duplicate entry (bsc#1202131).
- iwlwifi: pcie: remove two duplicate PNJ device entries (bsc#1202131).
- iwlwifi: pcie: retake ownership after reset (bsc#1202131).
- iwlwifi: pcie: simplify iwl_pci_find_dev_info() (bsc#1202131).
- iwlwifi: pcie: support Bz suspend/resume trigger (bsc#1202131).
- iwlwifi: pcie: try to grab NIC access early (bsc#1202131).
- iwlwifi: pcie: update sw error interrupt for BZ family (bsc#1202131).
- iwlwifi: pnvm: print out the version properly (bsc#1202131).
- iwlwifi: prefer WIDE_ID() over iwl_cmd_id() (bsc#1202131).
- iwlwifi: propagate (const) type qualifier (bsc#1202131).
- iwlwifi: recognize missing PNVM data and then log filename (bsc#1202131).
- iwlwifi: remove MODULE_AUTHOR() statements (bsc#1202131).
- iwlwifi: remove command ID argument from queue allocation (bsc#1202131).
- iwlwifi: remove contact information (bsc#1202131).
- iwlwifi: remove deprecated broadcast filtering feature (bsc#1202131).
- iwlwifi: remove redundant iwl_finish_nic_init() argument (bsc#1202131).
- iwlwifi: remove unused DC2DC_CONFIG_CMD definitions (bsc#1202131).
- iwlwifi: remove unused iwlax210_2ax_cfg_so_hr_a0 structure (bsc#1202131).
- iwlwifi: remove unused macros (bsc#1202131).
- iwlwifi: rename CHANNEL_SWITCH_NOA_NOTIF to CHANNEL_SWITCH_START_NOTIF (bsc#1202131).
- iwlwifi: rename GEO_TX_POWER_LIMIT to PER_CHAIN_LIMIT_OFFSET_CMD (bsc#1202131).
- iwlwifi: rs: add support for TLC config command ver 4 (bsc#1202131).
- iwlwifi: scan: Modify return value of a function (bsc#1202131).
- iwlwifi: support 4-bits in MAC step value (bsc#1202131).
- iwlwifi: support SAR GEO Offset Mapping override via BIOS (bsc#1202131).
- iwlwifi: support new queue allocation command (bsc#1202131).
- iwlwifi: swap 1650i and 1650s killer struct names (bsc#1202131).
- iwlwifi: tlc: Add logs in rs_fw_rate_init func to print TLC configuration (bsc#1202131).
- iwlwifi: use 4k queue size for Bz A-step (bsc#1202131).
- iwlwifi: yoyo: Avoid using dram data if allocation failed (bsc#1202131).
- iwlwifi: yoyo: add IMR DRAM dump support (bsc#1202131).
- iwlwifi: yoyo: disable IMR DRAM region if IMR is disabled (bsc#1202131).
- iwlwifi: yoyo: dump IMR DRAM only for HW and FW error (bsc#1202131).
- iwlwifi: yoyo: fix DBGC allocation flow (bsc#1202131).
- iwlwifi: yoyo: fix DBGI_SRAM ini dump header (bsc#1202131).
- iwlwifi: yoyo: fix issue with new DBGI_SRAM region read (bsc#1202131).
- iwlwifi: yoyo: fw debug config from context info and preset (bsc#1202131).
- iwlwifi: yoyo: send hcmd to fw after dump collection completes (bsc#1202131).
- iwlwifi: yoyo: support TLV-based firmware reset (bsc#1202131).
- iwlwifi: yoyo: support dump policy for the dump size (bsc#1202131).
- iwlwifi: yoyo: support for DBGC4 for dram (bsc#1202131).
- iwlwifi: yoyo: support for ROM usniffer (bsc#1202131).
- jbd2: export jbd2_journal_[grab|put]_journal_head (bsc#1202775).
- jbd2: fix assertion 'jh->b_frozen_data == NULL' failure when journal aborted (bsc#1202716).
- jbd2: fix outstanding credits assert in jbd2_journal_commit_transaction() (bsc#1202715).
- kABI: scsi: libiscsi: fix removal of iscsi_create_conn (bsc#1198410).
- kabi/severities: Exclude ppc kvm
- kabi/severities: add Qlogic qed symbols
- kabi/severities: add drivers/scsi/hisi_sas for bsc#1202471
- kabi/severities: add hisilicon hns3 symbols
- kabi/severities: add microchip dsa drivers
- kabi/severities: ignore kABI changes in mwifiex drivers Those symbols are used only locally in mwifiex (sub-)modules.
- kabi/severities: octeontx2 driver (jsc#SLE-24682)
- kbuild: dummy-tools: avoid tmpdir leak in dummy gcc (git-fixes).
- kbuild: fix the modules order between drivers and libs (git-fixes).
- kbuild: link vmlinux only once for CONFIG_TRIM_UNUSED_KSYMS (2nd attempt) (git-fixes).
- kcm: fix strp_init() order and cleanup (git-fies).
- kernel-binary: move @NOSOURCE@ to @SOURCES@ as in other packages
- kfifo: fix kfifo_to_user() return type (git-fixes).
- kselftest/cgroup: fix test_stress.sh to use OUTPUT dir (git-fixes).
- kselftest/vm: fix tests build with old libc (git-fixes).
- kselftest: Fix vdso_test_abi return status (git-fixes).
- kselftest: signal all child processes (git-fixes).
- kvm: selftests: do not use bitfields larger than 32-bits for PTEs (git-fixes).
- l3mdev: l3mdev_master_upper_ifindex_by_index_rcu should be using netdev_master_upper_dev_get_rcu (git-fixes).
- landlock: Add clang-format exceptions (git-fixes).
- landlock: Change landlock_add_rule(2) argument check ordering (git-fixes).
- landlock: Change landlock_restrict_self(2) check ordering (git-fixes).
- landlock: Create find_rule() from unmask_layers() (git-fixes).
- landlock: Define access_mask_t to enforce a consistent access mask size (git-fixes).
- landlock: Fix landlock_add_rule(2) documentation (git-fixes).
- landlock: Fix same-layer rule unions (git-fixes).
- landlock: Format with clang-format (git-fixes).
- landlock: Reduce the maximum number of layers to 16 (git-fixes).
- landlock: Use square brackets around 'landlock-ruleset' (git-fixes).
- lib/list_debug.c: Detect uninitialized lists (git-fixes).
- lib/raid6/test: fix multiple definition linking error (git-fixes).
- lib/smp_processor_id: fix imbalanced instrumentation_end() call (git-fixes).
- lkdtm: Disable return thunks in rodata.c (bsc#1190497).
- lockdep: Correct lock_classes index mapping (git-fixes).
- locking/lockdep: Avoid potential access of invalid memory in lock_class (git-fixes).
- locking/lockdep: Fix lockdep_init_map_*() confusion (git-fixes).
- locking/lockdep: Iterate lock_classes directly when reading lockdep files (git-fixes).
- loop: Check for overflow while configuring loop (git-fies).
- loop: Use pr_warn_once() for loop_control_remove() warning (git-fixes).
- loop: use sysfs_emit() in the sysfs xxx show() (git-fixes).
- mac80211: fix a memory leak where sta_info is not freed (git-fixes).
- mac80211: introduce channel switch disconnect function (bsc#1202131).
- macsec: always read MACSEC_SA_ATTR_PN as a u64 (git-fixes).
- macsec: fix NULL deref in macsec_add_rxsa (git-fixes).
- macsec: fix error message in macsec_add_rxsa and _txsa (git-fixes).
- macsec: limit replay window size with XPN (git-fixes).
- marvell: octeontx2: build error: unknown type name 'u64' (jsc#SLE-24682).
- mbcache: add functions to delete entry if unused (bsc#1198971).
- mbcache: do not reclaim used entries (bsc#1198971).
- md/bitmap: do not set sb values if can't pass sanity check (bsc#1197158).
- md/raid0: Ignore RAID0 layout if the second zone has only one device (git-fixes).
- md/raid1: fix missing bitmap update w/o WriteMostly devices (bsc#1203036).
- media: [PATCH] pci: atomisp_cmd: fix three missing checks on list iterator (git-fixes).
- media: atmel: atmel-sama7g5-isc: fix warning in configs without OF (git-fixes).
- media: cedrus: h265: Fix flag name (git-fixes).
- media: cedrus: hevc: Add check for invalid timestamp (git-fixes).
- media: driver/nxp/imx-jpeg: fix a unexpected return value problem (git-fixes).
- media: hantro: postproc: Fix motion vector space size (git-fixes).
- media: hdpvr: fix error value returns in hdpvr_read (git-fixes).
- media: hevc: Embedded indexes in RPS (git-fixes).
- media: imx-jpeg: Add pm-runtime support for imx-jpeg (git-fixes).
- media: imx-jpeg: use NV12M to represent non contiguous NV12 (git-fixes).
- media: pvrusb2: fix memory leak in pvr_probe (git-fixes).
- media: tw686x: Fix memory leak in tw686x_video_init (git-fixes).
- media: tw686x: Register the irq at the end of probe (git-fixes).
- media: v4l2-mem2mem: prevent pollerr when last_buffer_dequeued is set (git-fixes).
- mediatek: mt76: eeprom: fix missing of_node_put() in mt76_find_power_limits_node() (git-fixes).
- mediatek: mt76: mac80211: Fix missing of_node_put() in mt76_led_init() (git-fixes).
- memstick/ms_block: Fix a memory leak (git-fixes).
- memstick/ms_block: Fix some incorrect memory allocation (git-fixes).
- meson-mx-socinfo: Fix refcount leak in meson_mx_socinfo_init (git-fixes).
- mfd: max77620: Fix refcount leak in max77620_initialise_fps (git-fixes).
- mfd: t7l66xb: Drop platform disable callback (git-fixes).
- minix: fix bug when opening a file with O_DIRECT (git-fixes).
- misc: fastrpc: fix memory corruption on open (git-fixes).
- misc: fastrpc: fix memory corruption on probe (git-fixes).
- misc: rtsx: Fix an error handling path in rtsx_pci_probe() (git-fixes).
- mkspec: eliminate @NOSOURCE@ macro This should be alsways used with @SOURCES@, just include the content there.
- mm/rmap: Fix anon_vma->degree ambiguity leading to double-reuse (git-fixes).
- mm: bdi: initialize bdi_min_ratio when bdi is unregistered (bsc#1197763).
- mm: memcontrol: fix potential oom_lock recursion deadlock (bsc#1202447).
- mm: pagewalk: Fix race between unmap and page walker (git-fixes, bsc#1203159).
- mmc: block: Add single read for 4k sector cards (git-fixes).
- mmc: cavium-octeon: Add of_node_put() when breaking out of loop (git-fixes).
- mmc: cavium-thunderx: Add of_node_put() when breaking out of loop (git-fixes).
- mmc: core: Fix UHS-I SD 1.8V workaround branch (git-fixes).
- mmc: meson-gx: Fix an error handling path in meson_mmc_probe() (git-fixes).
- mmc: mxcmmc: Silence a clang warning (git-fixes).
- mmc: pxamci: Fix an error handling path in pxamci_probe() (git-fixes).
- mmc: pxamci: Fix another error handling path in pxamci_probe() (git-fixes).
- mmc: renesas_sdhi: Get the reset handle early in the probe (git-fixes).
- mmc: sdhci-of-at91: fix set_uhs_signaling rewriting of MC1R (git-fixes).
- mmc: sdhci-of-esdhc: Fix refcount leak in esdhc_signal_voltage_switch (git-fixes).
- mmc: tmio: avoid glitches when resetting (git-fixes).
- msft-hv-2570-hv_netvsc: Add support for XDP_REDIRECT (bsc#1199364).
- mt76: mt7615: do not update pm stats in case of error (git-fixes).
- mt76: mt76x02u: fix possible memory leak in __mt76x02u_mcu_send_msg (git-fixes).
- mt76: mt7921: enlarge maximum VHT MPDU length to 11454 (git-fixes).
- mt76: mt7921: fix aggregation subframes setting to HE max (git-fixes).
- mtd: dataflash: Add SPI ID table (git-fixes).
- mtd: maps: Fix refcount leak in ap_flash_init (git-fixes).
- mtd: maps: Fix refcount leak in of_flash_probe_versatile (git-fixes).
- mtd: parsers: ofpart: Fix refcount leak in bcm4908_partitions_fw_offset (git-fixes).
- mtd: partitions: Fix refcount leak in parse_redboot_of (git-fixes).
- mtd: rawnand: arasan: Fix clock rate in NV-DDR (git-fixes).
- mtd: rawnand: arasan: Update NAND bus clock instead of system clock (git-fixes).
- mtd: rawnand: gpmi: Set WAIT_FOR_READY timeout based on program/erase times (git-fixes).
- mtd: rawnand: gpmi: validate controller clock rate (git-fixes).
- mtd: rawnand: meson: Fix a potential double free issue (git-fixes).
- mtd: sm_ftl: Fix deadlock caused by cancel_work_sync in sm_release (git-fixes).
- mtd: spi-nor: fix spi_nor_spimem_setup_op() call in spi_nor_erase_{sector,chip}() (git-fixes).
- mtd: st_spi_fsm: Add a clk_disable_unprepare() in .probe()'s error path (git-fixes).
- musb: fix USB_MUSB_TUSB6010 dependency (git-fixes).
- mwifiex: Ignore BTCOEX events from the 88W8897 firmware (git-fixes).
- n_gsm: remove unused parameters from gsm_error() (git-fixes).
- net: asix: fix 'can't send until first packet is send' issue (git-fixes).
- net: bcmgenet: Use stronger register read/writes to assure ordering (git-fixes).
- net: dsa: b53: Add SPI ID table (git-fixes).
- net: dsa: felix: Fix memory leak in felix_setup_mmio_filtering (git-fixes).
- net: dsa: felix: purge skb from TX timestamping queue if it cannot be sent (git-fies).
- net: dsa: hellcreek: Add STP forwarding rule (git-fixes).
- net: dsa: hellcreek: Add missing PTP via UDP rules (git-fixes).
- net: dsa: hellcreek: Allow PTP P2P measurements on blocked ports (git-fixes).
- net: dsa: hellcreek: Fix insertion of static FDB entries (git-fixes).
- net: dsa: microchip: implement multi-bridge support (git-fixes).
- net: dsa: mv88e6xxx: Add fix for erratum 5.2 of 88E6393X family (git-fixes).
- net: dsa: mv88e6xxx: Drop unnecessary check in mv88e6393x_serdes_erratum_4_6() (git-fixes).
- net: dsa: mv88e6xxx: Enable port policy support on 6097 (git-fixes).
- net: dsa: mv88e6xxx: Fix application of erratum 4.8 for 88E6393X (git-fixes).
- net: dsa: mv88e6xxx: Fix inband AN for 2500base-x on 88E6393X family (git-fixes).
- net: dsa: mv88e6xxx: Link in pcs_get_state() if AN is bypassed (git-fixes).
- net: dsa: mv88e6xxx: Save power by disabling SerDes trasmitter and receiver (git-fixes).
- net: dsa: mv88e6xxx: Unforce speed & duplex in mac_link_down() (git-fixes).
- net: dsa: mv88e6xxx: allow use of PHYs on CPU and DSA ports (git-fixes).
- net: dsa: mv88e6xxx: error handling for serdes_power functions (git-fixes).
- net: dsa: mv88e6xxx: fix 'do not use PHY_DETECT on internal PHY's' (git-fixes).
- net: dsa: ocelot: seville: utilize of_mdiobus_register (git-fixes).
- net: dsa: qca8k: fix MTU calculation (git-fixes).
- net: dsa: seville: register the mdiobus under devres (git-fixes).
- net: dsa: tag_ocelot_8021q: break circular dependency with ocelot switch lib (git-fies).
- net: enetc: report software timestamping via SO_TIMESTAMPING (git-fixes).
- net: hns3: clean residual vf config after disable sriov (git-fixes).
- net: macsec: fix potential resource leak in macsec_add_rxsa() and macsec_add_txsa() (git-fixes).
- net: marvell: prestera: fix incorrect structure access (git-fixes).
- net: mscc: ocelot: correctly report the timestamping RX filters in ethtool (git-fixes).
- net: mscc: ocelot: create a function that replaces an existing VCAP filter (git-fixes).
- net: mscc: ocelot: do not dereference NULL pointers with shared tc filters (git-fixes).
- net: mscc: ocelot: do not downgrade timestamping RX filters in SIOCSHWTSTAMP (git-fixes).
- net: mscc: ocelot: fix incorrect balancing with down LAG ports (git-fixes).
- net: mscc: ocelot: set up traps for PTP packets (git-fixes).
- net: openvswitch: do not send internal clone attribute to the userspace (git-fixes).
- net: openvswitch: fix leak of nested actions (git-fixes).
- net: openvswitch: fix misuse of the cached connection on tuple changes (git-fixes).
- net: openvswitch: fix parsing of nw_proto for IPv6 fragments (git-fixes).
- net: phy: Do not WARN for PHY_READY state in mdio_bus_phy_resume() (git-fixes).
- net: phy: Warn about incorrect mdio_bus_phy_resume() state (git-fixes).
- net: phy: smsc: Disable Energy Detect Power-Down in interrupt mode (git-fixes).
- net: ptp: add a definition for the UDP port for IEEE 1588 general messages (git-fixes).
- net: rose: fix netdev reference changes (git-fixes).
- net: sock: tracing: Fix sock_exceed_buf_limit not to dereference stale pointer (git-fixes).
- net: stmmac: clean up impossible condition (git-fixes).
- net: stmmac: disable Split Header (SPH) for Intel platforms (bsc#1194904).
- net: stmmac: dwc-qos: Disable split header for Tegra194 (bsc#1194904).
- net: stmmac: fix off-by-one error in sanity check (git-fixes).
- net: usb: Correct PHY handling of smsc95xx (git-fixes).
- net: usb: Correct reset handling of smsc95xx (git-fixes).
- net: usb: ax88179_178a needs FLAG_SEND_ZLP (git-fixes).
- net: usb: ax88179_178a: add Allied Telesis AT-UMCs (git-fixes).
- net: usb: make USB_RTL8153_ECM non user configurable (git-fixes).
- net: vmxnet3: fix possible NULL pointer dereference in vmxnet3_rq_cleanup() (bsc#1200431).
- net: vmxnet3: fix possible use-after-free bugs in vmxnet3_rq_alloc_rx_buf() (bsc#1200431).
- net: vmxnet3: remove multiple false checks in vmxnet3_ethtool.c (bsc#1200431).
- net:enetc: allocate CBD ring data memory using DMA coherent methods (git-fixes).
- net_sched: cls_route: disallow handle of 0 (bsc#1202393).
- nfc: pn533: Fix use-after-free bugs caused by pn532_cmd_timeout (git-fixes).
- nfsd: fix use-after-free due to delegation race (git-fixes).
- nilfs2: fix incorrect masking of permission flags for symlinks (git-fixes).
- nilfs2: fix lockdep warnings during disk space reclamation (git-fixes).
- nilfs2: fix lockdep warnings in page operations for btree nodes (git-fixes).
- nohz/full, sched/rt: Fix missed tick-reenabling bug in dequeue_task_rt() (bnc#1189999 (Scheduler functional and performance backports)).
- nouveau/svm: Fix to migrate all requested pages (git-fixes).
- nouveau: explicitly wait on the fence in nouveau_bo_move_m2mf (git-fies).
- ntb_hw_amd: Add NTB PCI ID for new gen CPU (bsc#1202113).
- nvme-auth: align to pre-upstream FFDHE implementation (bsc#1202265).
- nvme-auth: retry command if DNR bit is not set (bsc#1201675).
- nvme-fabrics: parse nvme connect Linux error codes (bsc#1201865).
- nvme-rdma: Handle number of queue changes (bsc#1201865).
- nvme-tcp: Handle number of queue changes (bsc#1201865).
- nvme-tcp: fix UAF when detecting digest errors (bsc#1200313 bsc#1201489).
- nvme: consider also host_iface when checking ip options (bsc#1199670).
- nvme: fix RCU hole that allowed for endless looping in multipath round robin (bsc#1202636).
- nvme: implement In-Band authentication (jsc#SLE-20183).
- nvme: kabi fixes for in-band authentication (bsc#1199086).
- nvmet-auth: expire authentication sessions (jsc#SLE-20183).
- nvmet: Expose max queues to configfs (bsc#1201865).
- nvmet: implement basic In-Band Authentication (jsc#SLE-20183).
- ocfs2: dlmfs: fix error handling of user_dlm_destroy_lock (bsc#1202778).
- ocfs2: fix a deadlock when commit trans (bsc#1202776).
- octeontx2-af: Add KPU changes to parse NGIO as separate layer (jsc#SLE-24682).
- octeontx2-af: Add PTP device id for CN10K and 95O silcons (jsc#SLE-24682).
- octeontx2-af: Add SDP interface support (jsc#SLE-24682).
- octeontx2-af: Add debug messages for failures (jsc#SLE-24682).
- octeontx2-af: Add external ptp input clock (jsc#SLE-24682).
- octeontx2-af: Add free rsrc count mbox msg (jsc#SLE-24682).
- octeontx2-af: Add mbox to retrieve bandwidth profile free count (jsc#SLE-24682).
- octeontx2-af: Add support to flush full CPT CTX cache (jsc#SLE-24682).
- octeontx2-af: Adjust LA pointer for cpt parse header (jsc#SLE-24682).
- octeontx2-af: Allocate low priority entries for PF (jsc#SLE-24682).
- octeontx2-af: Allow to configure flow tag LSB byte as RSS adder (jsc#SLE-24682).
- octeontx2-af: Change the order of queue work and interrupt disable (jsc#SLE-24682).
- octeontx2-af: Do not enable Pause frames by default (jsc#SLE-24682).
- octeontx2-af: Enable CPT HW interrupts (jsc#SLE-24682).
- octeontx2-af: Enhance mailbox trace entry (jsc#SLE-24682).
- octeontx2-af: Fix LBK backpressure id count (jsc#SLE-24682).
- octeontx2-af: Fix inconsistent license text (jsc#SLE-24682).
- octeontx2-af: Fix interrupt name strings (jsc#SLE-24682).
- octeontx2-af: Fix spelling mistake 'Makesure' -> 'Make sure' (jsc#SLE-24682).
- octeontx2-af: Fix uninitialized variable val (jsc#SLE-24682).
- octeontx2-af: Flow control resource management (jsc#SLE-24682).
- octeontx2-af: Handle return value in block reset (jsc#SLE-24682).
- octeontx2-af: Hardware configuration for inline IPsec (jsc#SLE-24682).
- octeontx2-af: Increase link credit restore polling timeout (jsc#SLE-24682).
- octeontx2-af: Increase number of reserved entries in KPU (jsc#SLE-24682).
- octeontx2-af: Increment ptp refcount before use (jsc#SLE-24682).
- octeontx2-af: Limit KPU parsing for GTPU packets (jsc#SLE-24682).
- octeontx2-af: Modify install flow error codes (jsc#SLE-24682).
- octeontx2-af: Optimize KPU1 processing for variable-length headers (jsc#SLE-24682).
- octeontx2-af: Perform cpt lf teardown in non FLR path (jsc#SLE-24682).
- octeontx2-af: Priority flow control configuration support (jsc#SLE-24682).
- octeontx2-af: Remove channel verification while installing MCAM rules (jsc#SLE-24682).
- octeontx2-af: Remove redundant initialization of variable blkaddr (jsc#SLE-24682).
- octeontx2-af: Remove redundant initialization of variable pin (jsc#SLE-24682).
- octeontx2-af: Reset PTP config in FLR handler (jsc#SLE-24682).
- octeontx2-af: Retry until RVU block reset complete (jsc#SLE-24682).
- octeontx2-af: Use DMA_ATTR_FORCE_CONTIGUOUS attribute in DMA alloc (jsc#SLE-24682).
- octeontx2-af: Use NDC TX for transmit packet data (jsc#SLE-24682).
- octeontx2-af: Use ptp input clock info from firmware data (jsc#SLE-24682).
- octeontx2-af: Wait for TX link idle for credits change (jsc#SLE-24682).
- octeontx2-af: add proper return codes for AF mailbox handlers (jsc#SLE-24682).
- octeontx2-af: cn10K: Get NPC counters value (jsc#SLE-24682).
- octeontx2-af: cn10K: support for sched lmtst and other features (jsc#SLE-24682).
- octeontx2-af: cn10k: DWRR MTU configuration (jsc#SLE-24682).
- octeontx2-af: cn10k: RPM hardware timestamp configuration (jsc#SLE-24682).
- octeontx2-af: cn10k: Set cache lines for NPA batch alloc (jsc#SLE-24682).
- octeontx2-af: cn10k: Use appropriate register for LMAC enable (jsc#SLE-24682).
- octeontx2-af: cn10k: add workaround for ptp errata (jsc#SLE-24682).
- octeontx2-af: cn10k: debugfs for dumping LMTST map table (jsc#SLE-24682).
- octeontx2-af: configure npc for cn10k to allow packets from cpt (jsc#SLE-24682).
- octeontx2-af: debugfs: Add channel and channel mask (jsc#SLE-24682).
- octeontx2-af: debugfs: Minor changes (jsc#SLE-24682).
- octeontx2-af: debugfs: do not corrupt user memory (jsc#SLE-24682).
- octeontx2-af: debugfs: fix error return of allocations (jsc#SLE-24682).
- octeontx2-af: enable tx shaping feature for 96xx C0 (jsc#SLE-24682).
- octeontx2-af: fix array bound error (jsc#SLE-24682).
- octeontx2-af: fix error code in is_valid_offset() (jsc#SLE-24682).
- octeontx2-af: initialize action variable (jsc#SLE-24682).
- octeontx2-af: nix and lbk in loop mode in 98xx (jsc#SLE-24682).
- octeontx2-af: remove redudant second error check on variable err (jsc#SLE-24682).
- octeontx2-af: use swap() to make code cleaner (jsc#SLE-24682).
- octeontx2-af: verify CQ context updates (jsc#SLE-24682).
- octeontx2-nic: fix mixed module build (jsc#SLE-24682).
- octeontx2-nicvf: Add PTP hardware clock support to NIX VF (jsc#SLE-24682).
- octeontx2-nicvf: Free VF PTP resources (jsc#SLE-24682).
- octeontx2-pf: Add TC feature for VFs (jsc#SLE-24682).
- octeontx2-pf: Add XDP support to netdev PF (jsc#SLE-24682).
- octeontx2-pf: Add check for non zero mcam flows (jsc#SLE-24682).
- octeontx2-pf: Add support for adaptive interrupt coalescing (jsc#SLE-24682).
- octeontx2-pf: Add vlan-etype to ntuple filters (jsc#SLE-24682).
- octeontx2-pf: Allow VLAN priority also in ntuple filters (jsc#SLE-24682).
- octeontx2-pf: CN10K: Hide RPM stats over ethtool (jsc#SLE-24682).
- octeontx2-pf: Do not mask out supported link modes (jsc#SLE-24682).
- octeontx2-pf: Enable NETIF_F_RXALL support for VF driver (jsc#SLE-24682).
- octeontx2-pf: Fix inconsistent license text (jsc#SLE-24682).
- octeontx2-pf: Ntuple filters support for VF netdev (jsc#SLE-24682).
- octeontx2-pf: PFC config support with DCBx (jsc#SLE-24682).
- octeontx2-pf: Remove unnecessary synchronize_irq() before free_irq() (jsc#SLE-24682).
- octeontx2-pf: Simplify the receive buffer size calculation (jsc#SLE-24682).
- octeontx2-pf: Sort the allocated MCAM entry indices (jsc#SLE-24682).
- octeontx2-pf: Unify flow management variables (jsc#SLE-24682).
- octeontx2-pf: Use hardware register for CQE count (jsc#SLE-24682).
- octeontx2-pf: cn10K: Reserve LMTST lines per core (jsc#SLE-24682).
- octeontx2-pf: cn10k: Config DWRR weight based on MTU (jsc#SLE-24682).
- octeontx2-pf: cn10k: Ensure valid pointers are freed to aura (jsc#SLE-24682).
- octeontx2-pf: cn10k: add support for new ptp timestamp format (jsc#SLE-24682).
- octeontx2-pf: devlink params support to set mcam entry count (jsc#SLE-24682).
- octeontx2-pf: replace bitmap_weight with bitmap_empty where appropriate (jsc#SLE-24682).
- octeontx2-pf: select CONFIG_NET_DEVLINK (jsc#SLE-24682).
- octeontx2-vf: Add support for adaptive interrupt coalescing (jsc#SLE-24682).
- octeontx2: Move devlink registration to be last devlink command (jsc#SLE-24682).
- openvswitch: Fix setting ipv6 fields causing hw csum failure (git-fixes).
- openvswitch: Fixed nd target mask field in the flow dump (git-fixes).
- openvswitch: always update flow key after nat (git-fixes).
- optee: add error checks in optee_ffa_do_call_with_arg() (git-fixes).
- perf bench futex: Fix memory leak of perf_cpu_map__new() (git-fixes).
- phy: samsung: phy-exynos-pcie: sanitize init/power_on callbacks (git-fixes).
- phy: stm32: fix error return in stm32_usbphyc_phy_init (git-fixes).
- pinctrl: amd: Do not save/restore interrupt status and wake status bits (git-fixes).
- pinctrl: armada-37xx: Convert to use dev_err_probe() (git-fixes).
- pinctrl: armada-37xx: Make use of the devm_platform_ioremap_resource() (git-fixes).
- pinctrl: armada-37xx: Use temporary variable for struct device (git-fixes).
- pinctrl: intel: Check against matching data instead of ACPI companion (git-fixes).
- pinctrl: nomadik: Fix refcount leak in nmk_pinctrl_dt_subnode_to_map (git-fixes).
- pinctrl: qcom: msm8916: Allow CAMSS GP clocks to be muxed (git-fixes).
- pinctrl: qcom: sm8250: Fix PDC map (git-fixes).
- pinctrl: sunxi: Add I/O bias setting for H6 R-PIO (git-fixes).
- platform/chrome: cros_ec: Always expose last resume result (git-fixes).
- platform/chrome: cros_ec_proto: do not show MKBP version if unsupported (git-fixes).
- platform/olpc: Fix uninitialized data in debugfs write (git-fixes).
- platform/x86: pmc_atom: Fix SLP_TYPx bitfield mask (git-fixes).
- platform/x86: pmc_atom: Match all Lex BayTrail boards with critclk_systems DMI table (git-fixes).
- powerpc/perf: Optimize clearing the pending PMI and remove WARN_ON for PMI check in power_pmu_disable (bsc#1156395).
- powerpc/powernv/kvm: Use darn for H_RANDOM on Power9 (bsc#1065729).
- powerpc/powernv: Avoid crashing if rng is NULL (bsc#1065729).
- powerpc/powernv: delay rng platform device creation until later in boot (bsc#1065729).
- powerpc/powernv: rename remaining rng powernv_ functions to pnv_ (bsc#1065729).
- powerpc/powernv: wire up rng during setup_arch (bsc#1065729).
- powerpc/pseries: Interface to represent PAPR firmware attributes (bsc#1200465 ltc#197256 jsc#SLE-18130).
- powerpc/pseries: Rename TYPE1_AFFINITY to FORM1_AFFINITY (bsc#1200465 ltc#197256 jsc#SLE-18130).
- powerpc/pseries: rename min_common_depth to primary_domain_index (bsc#1200465 ltc#197256 jsc#SLE-18130).
- powerpc/pseries: wire up rng during setup_arch() (bsc#1065729).
- powerpc/xive: Fix refcount leak in xive_get_max_prio (git-fixess).
- powerpc: Avoid discarding flags in system_call_exception() (bsc#1194869).
- powerpc: Enable execve syscall exit tracepoint (bsc#1065729).
- powerpc: powernv: kABI: add back powernv_get_random_long (bsc#1065729).
- proc: fix a dentry lock race between release_task and lookup (git-fixes).
- proc: fix dentry/inode overinstantiating under /proc/${pid}/net (git-fixes).
- profiling: fix shift too large makes kernel panic (git-fixes).
- pwm: lpc18xx-sct: Reduce number of devm memory allocations (git-fixes).
- pwm: lpc18xx-sct: Simplify driver by not using pwm_[gs]et_chip_data() (git-fixes).
- pwm: lpc18xx: Fix period handling (git-fixes).
- qed: validate and restrict untrusted VFs vlan promisc mode (git-fixes).
- r8152: fix the RX FIFO settings when suspending (git-fixes).
- r8152: fix the units of some registers for RTL8156A (git-fixes).
- random: remove useless header comment (git-fixes).
- ratelimit: Fix data-races in ___ratelimit() (git-fixes).
- regulator: of: Fix refcount leak bug in of_get_regulation_constraints() (git-fixes).
- regulator: pca9450: Remove restrictions for regulator-name (git-fixes).
- regulator: qcom_smd: Fix pm8916_pldo range (git-fixes).
- remoteproc: imx_rproc: Fix refcount leak in imx_rproc_addr_init (git-fixes).
- remoteproc: k3-r5: Fix refcount leak in k3_r5_cluster_of_init (git-fixes).
- remoteproc: qcom: pas: Check if coredump is enabled (git-fixes).
- remoteproc: qcom: pas: Mark devices as wakeup capable (git-fixes).
- remoteproc: qcom: q6v5-mss: add powerdomains to MSM8996 config (git-fixes).
- remoteproc: qcom: wcnss: Fix handling of IRQs (git-fixes).
- remoteproc: sysmon: Wait for SSCTL service to come up (git-fixes).
- rose: check NULL rose_loopback_neigh->loopback (git-fixes).
- rpm/kernel-binary.spec.in: move vdso to a separate package (bsc#1202385) 
- rpmsg: char: Add mutex protection for rpmsg_eptdev_open() (git-fixes).
- rpmsg: mtk_rpmsg: Fix circular locking dependency (git-fixes).
- rpmsg: qcom_smd: Fix refcount leak in qcom_smd_parse_edge (git-fixes).
- s390/cpumf: Handle events cycles and instructions identical (git-fixes).
- s390/crash: fix incorrect number of bytes to copy to user space (git-fixes).
- s390/crash: make copy_oldmem_page() return number of bytes copied (git-fixes).
- s390/hugetlb: fix prepare_hugepage_range() check for 2 GB hugepages (git-fixes).
- s390/hypfs: avoid error message under KVM (bsc#1032323).
- s390/kexec: handle R_390_PLT32DBL rela in arch_kexec_apply_relocations_add() (git-fixes).
- s390/mm: do not trigger write fault when vma does not allow VM_WRITE (git-fixes).
- s390/mm: use non-quiescing sske for KVM switch to keyed guest (git-fixes).
- s390/qeth: cache link_info for ethtool (bsc#1202262 LTC#199322).
- s390/stp: clock_delta should be signed (git-fixes).
- s390/zcore: fix race when reading from hardware system area (git-fixes).
- samples/landlock: Add clang-format exceptions (git-fixes).
- samples/landlock: Fix path_list memory leak (git-fixes).
- samples/landlock: Format with clang-format (git-fixes).
- sched/core: Always flush pending blk_plug (bnc#1189999 (Scheduler functional and performance backports)).
- sched/deadline: Fix BUG_ON condition for deboosted tasks (git-fixes)
- sched/fair: Fix cfs_rq_clock_pelt() for throttled cfs_rq (bnc#1189999 (Scheduler functional and performance backports)).
- sched/fair: Fix cfs_rq_clock_pelt() for throttled cfs_rq -kabi (git fixes (sched/fair)).
- sched/fair: Remove redundant word ' *' (bnc#1189999 (Scheduler functional and performance backports)).
- sched/uclamp: Fix iowait boost escaping uclamp restriction (git-fixes)
- sched/uclamp: Fix rq->uclamp_max not set on first enqueue (git-fixes)
- sched: Allow newidle balancing to bail out of load_balance (bnc#1189999 (Scheduler functional and performance backports)).
- sched: Fix the check of nr_running at queue wakelist (bnc#1189999 (Scheduler functional and performance backports)).
- sched: Remove the limitation of WF_ON_CPU on wakelist if wakee cpu is idle (bnc#1189999 (Scheduler functional and performance backports)). Refresh
- sched: Remove unused function group_first_cpu() (bnc#1189999 (Scheduler functional and performance backports)).
- scripts/dtc: Call pkg-config POSIXly correct (git-fixes).
- scripts/faddr2line: Fix vmlinux detection on arm64 (git-fixes).
- scripts/gdb: change kernel config dumping method (git-fixes).
- scripts: sphinx-pre-install: Fix ctex support on Debian (git-fixes).
- scripts: sphinx-pre-install: add required ctex dependency (git-fixes).
- scsi: hisi_sas: Keep controller active between ISR of phyup and the event being processed (bsc#1202471).
- scsi: hisi_sas: Use autosuspend for the host controller (bsc#1202471).
- scsi: libiscsi: Add iscsi_cls_conn to sysfs after initialization (bsc#1198410).
- scsi: lpfc: Add warning notification period to CMF_SYNC_WQE (bsc#1203063).
- scsi: lpfc: Check the return value of alloc_workqueue() (bsc#1203063).
- scsi: lpfc: Copyright updates for 14.2.0.5 patches (bsc#1201956).
- scsi: lpfc: Copyright updates for 14.2.0.6 patches (bsc#1203063).
- scsi: lpfc: Fix attempted FA-PWWN usage after feature disable (bsc#1201956).
- scsi: lpfc: Fix lost NVMe paths during LIF bounce stress test (bsc#1201956).
- scsi: lpfc: Fix null ndlp ptr dereference in abnormal exit path for GFT_ID (bsc#1203063).
- scsi: lpfc: Fix possible memory leak when failing to issue CMF WQE (bsc#1201956).
- scsi: lpfc: Fix uninitialized cqe field in lpfc_nvme_cancel_iocb() (bsc#1201956).
- scsi: lpfc: Fix unsolicited FLOGI receive handling during PT2PT discovery (bsc#1203063).
- scsi: lpfc: Prevent buffer overflow crashes in debugfs with malformed user input (bsc#1201956).
- scsi: lpfc: Refactor lpfc_nvmet_prep_abort_wqe() into lpfc_sli_prep_abort_xri() (bsc#1201956).
- scsi: lpfc: Remove Menlo/Hornet related code (bsc#1201956).
- scsi: lpfc: Remove SANDiags related code (bsc#1203063).
- scsi: lpfc: Remove extra atomic_inc on cmd_pending in queuecommand after VMID (bsc#1201956).
- scsi: lpfc: Revert RSCN_MEMENTO workaround for misbehaved configuration (bsc#1201956).
- scsi: lpfc: Rework MIB Rx Monitor debug info logic (bsc#1203063).
- scsi: lpfc: Set PU field when providing D_ID in XMIT_ELS_RSP64_CX iocb (bsc#1201956).
- scsi: lpfc: Update lpfc version to 14.2.0.5 (bsc#1201956).
- scsi: lpfc: Update lpfc version to 14.2.0.6 (bsc#1203063).
- scsi: megaraid: Clear READ queue map's nr_queues (git-fixes).
- scsi: mpt3sas: Stop fw fault watchdog work item during system shutdown (git-fixes).
- scsi: qla2xxx: Check correct variable in qla24xx_async_gffid() (bsc#1201958).
- scsi: qla2xxx: Fix discovery issues in FC-AL topology (bsc#1201958).
- scsi: qla2xxx: Fix imbalance vha->vref_count (bsc#1201958).
- scsi: qla2xxx: Fix incorrect display of max frame size (bsc#1201958).
- scsi: qla2xxx: Fix response queue handler reading stale packets (bsc#1201958).
- scsi: qla2xxx: Fix sparse warning for dport_data (bsc#1201958).
- scsi: qla2xxx: Update manufacturer details (bsc#1201958).
- scsi: qla2xxx: Update version to 10.02.07.800-k (bsc#1201958).
- scsi: qla2xxx: Zero undefined mailbox IN registers (bsc#1201958).
- scsi: qla2xxx: edif: Fix dropped IKE message (bsc#1201958).
- scsi: sg: Allow waiting for commands to complete on removed device (git-fixes).
- scsi: smartpqi: Fix DMA direction for RAID requests (git-fixes).
- scsi: ufs: core: Fix another task management completion race (git-fixes).
- scsi: ufs: core: Fix task management completion timeout race (git-fixes).
- scsi: zfcp: Fix missing auto port scan and thus missing target ports (git-fixes).
- seccomp: Invalidate seccomp mode to catch death failures (git-fixes).
- selftest/net/forwarding: declare NETIFS p9 p10 (git-fixes).
- selftest/powerpc: Add PAPR sysfs attributes sniff test (bsc#1200465 ltc#197256 jsc#SLE-18130).
- selftest/vm: fix map_fixed_noreplace test failure (git-fixes).
- selftest/vm: verify mmap addr in mremap_test (git-fixes).
- selftest/vm: verify remap destination address in mremap_test (git-fixes).
- selftests, x86: fix how check_cc.sh is being invoked (git-fixes).
- selftests/exec: Add non-regular to TEST_GEN_PROGS (git-fixes).
- selftests/exec: Remove pipe from TEST_GEN_FILES (git-fixes).
- selftests/fib_tests: Rework fib_rp_filter_test() (git-fixes).
- selftests/ftrace: Do not trace do_softirq because of PREEMPT_RT (git-fixes).
- selftests/ftrace: make kprobe profile testcase description unique (git-fixes).
- selftests/landlock: Add clang-format exceptions (git-fixes).
- selftests/landlock: Add tests for O_PATH (git-fixes).
- selftests/landlock: Add tests for unknown access rights (git-fixes).
- selftests/landlock: Extend access right tests to directories (git-fixes).
- selftests/landlock: Extend tests for minimal valid attribute size (git-fixes).
- selftests/landlock: Format with clang-format (git-fixes).
- selftests/landlock: Fully test file rename with 'remove' access (git-fixes).
- selftests/landlock: Make tests build with old libc (git-fixes).
- selftests/landlock: Normalize array assignment (git-fixes).
- selftests/landlock: Test landlock_create_ruleset(2) argument check ordering (git-fixes).
- selftests/memfd: clean up mapping in mfd_fail_write (git-fixes).
- selftests/memfd: remove unused variable (git-fixes).
- selftests/net: pass ipv6_args to udpgso_bench's IPv6 TCP test (git-fixes).
- selftests/net: so_txtime: fix parsing of start time stamp on 32 bit systems (git-fixes).
- selftests/net: so_txtime: usage(): fix documentation of default clock (git-fixes).
- selftests/net: timestamping: Fix bind_phc check (git-fixes).
- selftests/net: udpgso_bench_tx: fix dst ip argument (git-fixes).
- selftests/powerpc/spectre_v2: Return skip code when miss_percent is high (git-fixes).
- selftests/powerpc: Add a test of sigreturning to the kernel (git-fixes).
- selftests/resctrl: Fix null pointer dereference on open failed (git-fixes).
- selftests/rseq: Change type of rseq_offset to ptrdiff_t (git-fixes).
- selftests/rseq: Fix ppc32 missing instruction selection 'u' and 'x' for load/store (git-fixes).
- selftests/rseq: Fix ppc32 offsets by using long rather than off_t (git-fixes).
- selftests/rseq: Fix ppc32: wrong rseq_cs 32-bit field pointer on big endian (git-fixes).
- selftests/rseq: Fix warnings about #if checks of undefined tokens (git-fixes).
- selftests/rseq: Fix: work-around asm goto compiler bugs (git-fixes).
- selftests/rseq: Introduce rseq_get_abi() helper (git-fixes).
- selftests/rseq: Introduce thread pointer getters (git-fixes).
- selftests/rseq: Remove arm/mips asm goto compiler work-around (git-fixes).
- selftests/rseq: Remove useless assignment to cpu variable (git-fixes).
- selftests/rseq: Remove volatile from __rseq_abi (git-fixes).
- selftests/rseq: Uplift rseq selftests for compatibility with glibc-2.35 (git-fixes).
- selftests/rseq: introduce own copy of rseq uapi header (git-fixes).
- selftests/rseq: remove ARRAY_SIZE define from individual tests (git-fixes).
- selftests/rseq: x86-32: use %gs segment selector for accessing rseq thread area (git-fixes).
- selftests/rseq: x86-64: use %fs segment selector for accessing rseq thread area (git-fixes).
- selftests/seccomp: Do not call read() on TTY from background pgrp (git-fixes).
- selftests/seccomp: Fix compile warning when CC=clang (git-fixes).
- selftests/seccomp: Fix seccomp failure by adding missing headers (git-fixes).
- selftests/sgx: Treat CC as one argument (git-fixes).
- selftests/vm/transhuge-stress: fix ram size thinko (git-fixes).
- selftests/vm: make charge_reserved_hugetlb.sh work with existing cgroup setting (git-fixes).
- selftests/x86: Add validity check and allow field splitting (git-fixes).
- selftests/zram01.sh: Fix compression ratio calculation (git-fixes).
- selftests/zram: Adapt the situation that /dev/zram0 is being used (git-fixes).
- selftests/zram: Skip max_comp_streams interface on newer kernel (git-fixes).
- selftests: Add duplicate config only for MD5 VRF tests (git-fixes).
- selftests: Fix IPv6 address bind tests (git-fixes).
- selftests: Fix raw socket bind tests with VRF (git-fixes).
- selftests: add ping test with ping_group_range tuned (git-fixes).
- selftests: cgroup: Make cg_create() use 0755 for permission instead of 0644 (git-fixes).
- selftests: cgroup: Test open-time cgroup namespace usage for migration checks (git-fixes).
- selftests: cgroup: Test open-time credential usage for migration checks (git-fixes).
- selftests: clone3: clone3: add case CLONE3_ARGS_NO_TEST (git-fixes).
- selftests: fixup build warnings in pidfd / clone3 tests (git-fixes).
- selftests: forwarding: fix error message in learning_test (git-fixes).
- selftests: forwarding: fix flood_unicast_test when h2 supports IFF_UNICAST_FLT (git-fixes).
- selftests: forwarding: fix learning_test when h1 supports IFF_UNICAST_FLT (git-fixes).
- selftests: futex: Use variable MAKE instead of make (git-fixes).
- selftests: gpio: fix gpio compiling error (git-fixes).
- selftests: harness: avoid false negatives if test has no ASSERTs (git-fixes).
- selftests: icmp_redirect: pass xfail=0 to log_test() (git-fixes).
- selftests: kvm: set rax before vmcall (git-fixes).
- selftests: mirror_gre_bridge_1q: Avoid changing PVID while interface is operational (git-fixes).
- selftests: mlxsw: resource_scale: Fix return value (git-fixes).
- selftests: mlxsw: tc_police_scale: Make test more robust (git-fixes).
- selftests: mlxsw: vxlan_flooding: Prevent flooding of unwanted packets (git-fixes).
- selftests: mptcp: add csum mib check for mptcp_connect (git-fixes).
- selftests: mptcp: fix diag instability (git-fixes).
- selftests: mptcp: fix ipv6 routing setup (git-fixes).
- selftests: mptcp: more stable diag tests (git-fixes).
- selftests: net: Correct case name (git-fixes).
- selftests: net: Correct ping6 expected rc from 2 to 1 (git-fixes).
- selftests: net: Fix a typo in udpgro_fwd.sh (git-fixes).
- selftests: net: tls: remove unused variable and code (git-fixes).
- selftests: net: udpgro_fwd.sh: explicitly checking the available ping feature (git-fixes).
- selftests: net: using ping6 for IPv6 in udpgro_fwd.sh (git-fixes).
- selftests: netfilter: add a vrf+conntrack testcase (git-fixes).
- selftests: netfilter: correct PKTGEN_SCRIPT_PATHS in nft_concat_range.sh (git-fixes).
- selftests: netfilter: disable rp_filter on router (git-fixes).
- selftests: netfilter: fix exit value for nft_concat_range (git-fixes).
- selftests: nft_concat_range: add test for reload with no element add/del (git-fixes).
- selftests: ocelot: tc_flower_chains: specify conform-exceed action for policer (git-fixes).
- selftests: openat2: Add missing dependency in Makefile (git-fixes).
- selftests: openat2: Print also errno in failure messages (git-fixes).
- selftests: openat2: Skip testcases that fail with EOPNOTSUPP (git-fixes).
- selftests: pmtu.sh: Kill nettest processes launched in subshell (git-fixes).
- selftests: pmtu.sh: Kill tcpdump processes launched by subshell (git-fixes).
- selftests: rtc: Increase test timeout so that all tests run (git-fixes).
- selftests: skip mincore.check_file_mmap when fs lacks needed support (git-fixes).
- selftests: test_vxlan_under_vrf: Fix broken test case (git-fixes).
- selftests: timers: clocksource-switch: fix passing errors from child (git-fixes).
- selftests: timers: valid-adjtimex: build fix for newer toolchains (git-fixes).
- selftests: vm: Makefile: rename TARGETS to VMTARGETS (git-fixes).
- selftests: vm: fix clang build error multiple output files (git-fixes).
- selftests: x86: fix [-Wstringop-overread] warn in test_process_vm_readv() (git-fixes).
- selinux: Add boundary check in put_entry() (git-fixes).
- selinux: access superblock_security_struct in LSM blob way (git-fixes).
- selinux: check return value of sel_make_avc_files (git-fixes).
- selinux: fix bad cleanup on error in hashtab_duplicate() (git-fixes).
- selinux: fix double free of cond_list on error paths (git-fixes).
- selinux: fix memleak in security_read_state_kernel() (git-fixes).
- selinux: fix misuse of mutex_is_locked() (git-fixes).
- selinux: use correct type for context length (git-fixes).
- serial: 8250: Add proper clock handling for OxSemi PCIe devices (git-fixes).
- serial: 8250: Export ICR access helpers for internal use (git-fixes).
- serial: 8250: Fold EndRun device support into OxSemi Tornado code (git-fixes).
- serial: 8250_bcm7271: Save/restore RTS in suspend/resume (git-fixes).
- serial: 8250_dw: Store LSR into lsr_saved_flags in dw8250_tx_wait_empty() (git-fixes).
- serial: 8250_fsl: Do not report FE, PE and OE twice (git-fixes).
- serial: 8250_pci: Refactor the loop in pci_ite887x_init() (git-fixes).
- serial: 8250_pci: Replace dev_*() by pci_*() macros (git-fixes).
- serial: fsl_lpuart: RS485 RTS polariy is inverse (git-fixes).
- serial: mvebu-uart: uart2 error bits clearing (git-fixes).
- smsc95xx: Ignore -ENODEV errors when device is unplugged (git-fixes).
- soc: amlogic: Fix refcount leak in meson-secure-pwrc.c (git-fixes).
- soc: brcmstb: pm-arm: Fix refcount leak and __iomem leak bugs (git-fixes).
- soc: fsl: guts: machine variable might be unset (git-fixes).
- soc: fsl: select FSL_GUTS driver for DPIO (git-fixes).
- soc: imx: gpcv2: Assert reset before ungating clock (git-fixes).
- soc: qcom: Make QCOM_RPMPD depend on PM (git-fixes).
- soc: qcom: aoss: Fix refcount leak in qmp_cooling_devices_register (git-fixes).
- soc: qcom: ocmem: Fix refcount leak in of_get_ocmem (git-fixes).
- soc: renesas: r8a779a0-sysc: Fix A2DP1 and A2CV[2357] PDR values (git-fixes).
- soundwire: bus_type: fix remove and shutdown support (git-fixes).
- soundwire: qcom: Check device status before reading devid (git-fixes).
- soundwire: qcom: fix device status array range (git-fixes).
- spi: Fix incorrect cs_setup delay handling (git-fixes).
- spi: Fix simplification of devm_spi_register_controller (git-fixes).
- spi: dt-bindings: cadence: add missing 'required' (git-fixes).
- spi: dt-bindings: zynqmp-qspi: add missing 'required' (git-fixes).
- spi: meson-spicc: add local pow2 clock ops to preserve rate between messages (git-fixes).
- spi: spi-altera-dfl: Fix an error handling path (git-fixes).
- spi: spi-rspi: Fix PIO fallback on RZ platforms (git-fixes).
- spi: synquacer: Add missing clk_disable_unprepare() (git-fixes).
- spi: tegra20-slink: fix UAF in tegra_slink_remove() (git-fixes).
- spmi: trace: fix stack-out-of-bound access in SPMI tracing functions (git-fixes).
- staging: rtl8192u: Fix sleep in atomic context bug in dm_fsync_timer_callback (git-fixes).
- staging: rtl8712: fix use after free bugs (git-fixes).
- tee: optee: do not check memref size on return from Secure World (git-fixes).
- tee: tee_get_drvdata(): fix description of return value (git-fixes).
- testing/selftests/mqueue: Fix mq_perf_tests to free the allocated cpu set (git-fixes).
- testing: nvdimm: asm/mce.h is not needed in nfit.c (git-fixes).
- testing: nvdimm: iomap: make __nfit_test_ioremap a macro (git-fixes).
- tests: fix idmapped mount_setattr test (git-fixes).
- thermal/int340x_thermal: handle data_vault when the value is ZERO_SIZE_PTR (bsc#1201308).
- thermal/tools/tmon: Include pthread and time headers in tmon.h (git-fixes).
- thermal: sysfs: Fix cooling_device_stats_setup() error code path (git-fixes).
- thunderbolt: Use the actual buffer in tb_async_error() (git-fixes).
- tools include UAPI: Sync sound/asound.h copy with the kernel sources (git-fixes).
- tools/nolibc: fix incorrect truncation of exit code (git-fixes).
- tools/nolibc: i386: fix initial stack alignment (git-fixes).
- tools/nolibc: x86-64: Fix startup code bug (git-fixes).
- tools/testing/scatterlist: add missing defines (git-fixes).
- tools/thermal: Fix possible path truncations (git-fixes).
- tpm: eventlog: Fix section mismatch for DEBUG_SECTION_MISMATCH (git-fixes).
- trace/osnoise: Add migrate-disabled field to the osnoise header (git-fixes).
- trace/timerlat: Add migrate-disabled field to the timerlat header (git-fixes).
- tracing/histograms: Fix memory leak problem (git-fixes).
- tracing/kprobes: Check whether get_kretprobe() returns NULL in kretprobe_dispatcher() (git-fixes).
- tracing/probes: Have kprobes and uprobes use $COMM too (git-fixes).
- tracing: Add ustring operation to filtering string pointers (git-fixes).
- tracing: Fix sleeping while atomic in kdb ftdump (git-fixes).
- tracing: Have filter accept 'common_cpu' to be consistent (git-fixes).
- tracing: Use a struct alignof to determine trace event field alignment (git-fixes).
- tty: 8250: Add support for Brainboxes PX cards (git-fixes).
- tty: n_gsm: Delete gsm_disconnect when config requester (git-fixes).
- tty: n_gsm: Delete gsmtty open SABM frame when config requester (git-fixes).
- tty: n_gsm: Modify CR,PF bit printk info when config requester (git-fixes).
- tty: n_gsm: Modify CR,PF bit when config requester (git-fixes).
- tty: n_gsm: Modify cr bit value when config requester (git-fixes).
- tty: n_gsm: Modify gsmtty driver register method when config requester (git-fixes).
- tty: n_gsm: Save dlci address open status when config requester (git-fixes).
- tty: n_gsm: add sanity check for gsm->receive in gsm_receive_buf() (git-fixes).
- tty: n_gsm: avoid call of sleeping functions from atomic context (git-fixes).
- tty: n_gsm: clean up dead code in gsm_queue() (git-fixes).
- tty: n_gsm: clean up implicit CR bit encoding in address field (git-fixes).
- tty: n_gsm: clean up indenting in gsm_queue() (git-fixes).
- tty: n_gsm: fix DM command (git-fixes).
- tty: n_gsm: fix broken virtual tty handling (git-fixes).
- tty: n_gsm: fix buffer over-read in gsm_dlci_data() (git-fixes).
- tty: n_gsm: fix deadlock and link starvation in outgoing data path (git-fixes).
- tty: n_gsm: fix decoupled mux resource (git-fixes).
- tty: n_gsm: fix encoding of command/response bit (git-fixes).
- tty: n_gsm: fix flow control handling in tx path (git-fixes).
- tty: n_gsm: fix frame reception handling (git-fixes).
- tty: n_gsm: fix incorrect UA handling (git-fixes).
- tty: n_gsm: fix insufficient txframe size (git-fixes).
- tty: n_gsm: fix invalid gsmtty_write_room() result (git-fixes).
- tty: n_gsm: fix invalid use of MSC in advanced option (git-fixes).
- tty: n_gsm: fix malformed counter for out of frame data (git-fixes).
- tty: n_gsm: fix missing corner cases in gsmld_poll() (git-fixes).
- tty: n_gsm: fix missing explicit ldisc flush (git-fixes).
- tty: n_gsm: fix missing mux reset on config change at responder (git-fixes).
- tty: n_gsm: fix missing timer to handle stalled links (git-fixes).
- tty: n_gsm: fix missing tty wakeup in convergence layer type 2 (git-fixes).
- tty: n_gsm: fix missing update of modem controls after DLCI open (git-fixes).
- tty: n_gsm: fix mux activation issues in gsm_config() (git-fixes).
- tty: n_gsm: fix mux cleanup after unregister tty device (git-fixes).
- tty: n_gsm: fix non flow control frames during mux flow off (git-fixes).
- tty: n_gsm: fix packet re-transmission without open control channel (git-fixes).
- tty: n_gsm: fix race condition in gsmld_write() (git-fixes).
- tty: n_gsm: fix reset fifo race condition (git-fixes).
- tty: n_gsm: fix resource allocation order in gsm_activate_mux() (git-fixes).
- tty: n_gsm: fix restart handling via CLD command (git-fixes).
- tty: n_gsm: fix software flow control handling (git-fixes).
- tty: n_gsm: fix sometimes uninitialized warning in gsm_dlci_modem_output() (git-fixes).
- tty: n_gsm: fix tty registration before control channel open (git-fixes).
- tty: n_gsm: fix user open not possible at responder until initiator open (git-fixes).
- tty: n_gsm: fix wrong DLCI release order (git-fixes).
- tty: n_gsm: fix wrong T1 retry count handling (git-fixes).
- tty: n_gsm: fix wrong command frame length field encoding (git-fixes).
- tty: n_gsm: fix wrong command retry handling (git-fixes).
- tty: n_gsm: fix wrong queuing behavior in gsm_dlci_data_output() (git-fixes).
- tty: n_gsm: fix wrong signal octet encoding in convergence layer type 2 (git-fixes).
- tty: n_gsm: fix wrong signal octets encoding in MSC (git-fixes).
- tty: n_gsm: initialize more members at gsm_alloc_mux() (git-fixes).
- tty: n_gsm: replace kicktimer with delayed_work (git-fixes).
- tty: serial: Fix refcount leak bug in ucc_uart.c (git-fixes).
- tty: serial: fsl_lpuart: correct the count of break characters (git-fixes).
- tty: serial: lpuart: disable flow control while waiting for the transmit engine to complete (git-fixes).
- tty: vt: initialize unicode screen buffer (git-fixes).
- tun: avoid double free in tun_free_netdev (git-fixes).
- tunnels: do not assume mac header is set in skb_tunnel_check_pmtu() (git-fixes).
- tuntap: add sanity checks about msg_controllen in sendmsg (git-fixes).
- uaccess: fix type mismatch warnings from access_ok() (git-fixes).
- ucounts: Base set_cred_ucounts changes on the real user (git-fixes).
- ucounts: Fix rlimit max values check (git-fixes).
- ucounts: Fix systemd LimitNPROC with private users regression (git-fixes).
- ucounts: Handle wrapping in is_ucounts_overlimit (git-fixes).
- ucounts: In set_cred_ucounts assume new->ucounts is non-NULL (git-fixes).
- udf: Fix crash after seekdir (bsc#1194592).
- udmabuf: Set the DMA mask for the udmabuf device (v2) (git-fixes).
- udmabuf: add back sanity check (git-fixes).
- usb: aspeed-vhub: Fix refcount leak bug in ast_vhub_init_desc() (git-fixes).
- usb: cdns3 fix use-after-free at workaround 2 (git-fixes).
- usb: cdns3: Do not use priv_dev uninitialized in cdns3_gadget_ep_enable() (git-fixes).
- usb: cdns3: change place of 'priv_ep' assignment in cdns3_gadget_ep_dequeue(), cdns3_gadget_ep_enable() (git-fixes).
- usb: cdns3: fix incorrect handling TRB_SMM flag for ISOC transfer (git-fixes).
- usb: cdns3: fix issue with rearming ISO OUT endpoint (git-fixes).
- usb: cdns3: fix random warning message when driver load (git-fixes).
- usb: dwc2: fix wrong order of phy_power_on and phy_init (git-fixes).
- usb: dwc2: gadget: remove D+ pull-up while no vbus with usb-role-switch (git-fixes).
- usb: dwc3: core: Deprecate GCTL.CORESOFTRESET (git-fixes).
- usb: dwc3: core: Do not perform GCTL_CORE_SOFTRESET during bootup (git-fixes).
- usb: dwc3: dwc3-qcom: Add missing platform_device_put() in dwc3_qcom_acpi_register_core (git-fixes).
- usb: dwc3: dwc3-qcom: Fix typo in the dwc3 vbus override API (git-fixes).
- usb: dwc3: gadget: Avoid duplicate requests to enable Run/Stop (git-fixes).
- usb: dwc3: gadget: fix high speed multiplier setting (git-fixes).
- usb: dwc3: gadget: refactor dwc3_repare_one_trb (git-fixes).
- usb: dwc3: qcom: Add helper functions to enable,disable wake irqs (git-fixes).
- usb: dwc3: qcom: fix missing optional irq warnings (git-fixes).
- usb: dwc3: qcom: fix use-after-free on runtime-PM wakeup (git-fixes).
- usb: gadget: f_uac2: clean up some inconsistent indenting (git-fixes).
- usb: gadget: f_uac2: fix superspeed transfer (git-fixes).
- usb: gadget: mass_storage: Fix cdrom data transfers on MAC-OS (git-fixes).
- usb: gadget: tegra-xudc: Fix error check in tegra_xudc_powerdomain_init() (git-fixes).
- usb: gadget: udc-xilinx: replace memcpy with memcpy_toio (git-fixes).
- usb: gadget: udc: amd5536 depends on HAS_DMA (git-fixes).
- usb: gadget: uvc: call uvc uvcg_warn on completed status instead of uvcg_info (git-fixes).
- usb: host: Fix refcount leak in ehci_hcd_ppc_of_probe (git-fixes).
- usb: host: ohci-ppc-of: Fix refcount leak bug (git-fixes).
- usb: host: xhci: use snprintf() in xhci_decode_trb() (git-fixes).
- usb: ohci-nxp: Fix refcount leak in ohci_hcd_nxp_probe (git-fixes).
- usb: renesas: Fix refcount leak bug (git-fixes).
- usb: typec: altmodes/displayport: correct pin assignment for UFP receptacles (git-fixes).
- usb: typec: tcpm: Return ENOTSUPP for power supply prop writes (git-fixes).
- usb: typec: ucsi: Acknowledge the GET_ERROR_STATUS command completion (git-fixes).
- usb: xhci: tegra: Fix error check (git-fixes).
- usbnet: Fix linkwatch use-after-free on disconnect (git-fixes).
- usbnet: Run unregister_netdev() before unbind() again (git-fixes).
- usbnet: smsc95xx: Avoid link settings race on interrupt reception (git-fixes).
- usbnet: smsc95xx: Do not clear read-only PHY interrupt (git-fixes).
- usbnet: smsc95xx: Fix deadlock on runtime resume (git-fixes).
- usbnet: smsc95xx: Forward PHY interrupts to PHY driver to avoid polling (git-fixes).
- userfaultfd/selftests: fix hugetlb area allocations (git-fixes).
- vboxguest: Do not use devm for irq (git-fixes).
- vdpa_sim: avoid putting an uninitialized iova_domain (git-fixes).
- venus: pm_helpers: Fix warning in OPP during probe (git-fixes).
- vfio/ccw: Do not change FSM state in subchannel event (git-fixes).
- vfio/ccw: Remove UUID from s390 debug log (git-fixes).
- vfio: Clear the caps->buf to NULL after free (git-fixes).
- video: fbdev: amba-clcd: Fix refcount leak bugs (git-fixes).
- video: fbdev: arkfb: Check the size of screen before memset_io() (git-fixes).
- video: fbdev: arkfb: Fix a divide-by-zero bug in ark_set_pixclock() (git-fixes).
- video: fbdev: i740fb: Check the argument of i740_calc_vclk() (git-fixes).
- video: fbdev: s3fb: Check the size of screen before memset_io() (git-fixes).
- video: fbdev: sis: fix typos in SiS_GetModeID() (git-fixes).
- video: fbdev: vt8623fb: Check the size of screen before memset_io() (git-fixes).
- virtio-gpu: fix a missing check to avoid NULL dereference (git-fixes).
- virtio-net: fix the race between refill work and close (git-fixes).
- virtio_net: fix memory leak inside XPD_TX with mergeable (git-fixes).
- vmxnet3: Implement ethtool's get_channels command (bsc#1200431).
- vmxnet3: Record queue number to incoming packets (bsc#1200431).
- vmxnet3: Remove useless DMA-32 fallback configuration (bsc#1200431).
- vmxnet3: add command to set ring buffer sizes (bsc#1200431).
- vmxnet3: add support for capability registers (bsc#1200431).
- vmxnet3: add support for large passthrough BAR register (bsc#1200431).
- vmxnet3: add support for out of order rx completion (bsc#1200431).
- vmxnet3: disable overlay offloads if UPT device does not support (bsc#1200431).
- vmxnet3: do not reschedule napi for rx processing (bsc#1200431).
- vmxnet3: limit number of TXDs used for TSO packet (bsc#1200431).
- vmxnet3: prepare for version 7 changes (bsc#1200431).
- vmxnet3: switch from 'pci_' to 'dma_' API (bsc#1200431).
- vmxnet3: update to version 7 (bsc#1200431).
- vmxnet3: use ext1 field to indicate encapsulated packet (bsc#1200431).
- vrf: do not run conntrack on vrf with !dflt qdisc (git-fixes).
- vsock/virtio: enable VQs early on probe (git-fixes).
- vsock/virtio: initialize vdev->priv before using VQs (git-fixes).
- vsock/virtio: read the negotiated features before using VQs (git-fixes).
- vsock: Fix memory leak in vsock_connect() (git-fixes).
- vsock: Set socket state back to SS_UNCONNECTED in vsock_connect_timeout() (git-fixes).
- vsock: remove vsock from connected table when connect is interrupted by a signal (git-fixes).
- watch-queue: remove spurious double semicolon (git-fixes).
- watch_queue: Fix missing locking in add_watch_to_object() (git-fixes).
- watch_queue: Fix missing rcu annotation (git-fixes).
- watchdog: armada_37xx_wdt: check the return value of devm_ioremap() in armada_37xx_wdt_probe() (git-fixes).
- watchdog: sp5100_tco: Fix a memory leak of EFCH MMIO resource (git-fixes).
- watchqueue: make sure to serialize 'wqueue->defunct' properly (git-fixes).
- wifi: cfg80211: debugfs: fix return type in ht40allow_map_read() (git-fixes).
- wifi: iwlegacy: 4965: fix potential off-by-one overflow in il4965_rs_fill_link_cmd() (git-fixes).
- wifi: iwlwifi: mvm: fix double list_add at iwl_mvm_mac_wake_tx_queue (git-fixes).
- wifi: libertas: Fix possible refcount leak in if_usb_probe() (git-fixes).
- wifi: mac80211: Do not finalize CSA in IBSS mode if state is disconnected (git-fixes).
- wifi: mac80211: limit A-MSDU subframes for client too (git-fixes).
- wifi: mac80211_hwsim: add back erroneously removed cast (git-fixes).
- wifi: mac80211_hwsim: fix race condition in pending packet (git-fixes).
- wifi: mac80211_hwsim: use 32-bit skb cookie (git-fixes).
- wifi: p54: Fix an error handling path in p54spi_probe() (git-fixes).
- wifi: p54: add missing parentheses in p54_flush() (git-fixes).
- wifi: rtlwifi: fix error codes in rtl_debugfs_set_write_h2c() (git-fixes).
- wifi: rtlwifi: remove always-true condition pointed out by GCC 12 (git-fies).
- wifi: rtw88: check the return value of alloc_workqueue() (git-fixes).
- wifi: rtw89: 8852a: rfk: fix div 0 exception (git-fixes).
- wifi: wil6210: debugfs: fix info leak in wil_write_file_wmi() (git-fixes).
- wifi: wil6210: debugfs: fix uninitialized variable use in `wil_write_file_wmi()` (git-fixes).
- wireguard: device: check for metadata_dst with skb_valid_dst() (git-fixes).
- wireless: Remove redundant 'flush_workqueue()' calls (bsc#1202131).
- x86/Hyper-V: Add SEV negotiate protocol support in Isolation VM (bsc#1190497).
- x86/olpc: fix 'logical not is only applied to the left hand side' (git-fixes).
- x86/retbleed: Add fine grained Kconfig knobs (bsc#1190497).
- x86/sev: Define the Linux-specific guest termination reasons (bsc#1190497).
- x86/sev: Save the negotiated GHCB version (bsc#1190497).
- xen/gntdev: fix unmap notification order (git-fixes).
- xen/privcmd: fix error exit of privcmd_ioctl_dm_op() (git-fixes).
- xen/xenbus: fix return type in xenbus_file_read() (git-fixes).
- xen: detect uninitialized xenbus in xenbus_init (git-fixes).
- xen: do not continue xenstore initialization in case of errors (git-fixes).
- xfs: Fix the free logic of state in xfs_attr_node_hasname (git-fixes).
- xfs: check sb_meta_uuid for dabuf buffer recovery (git-fixes).
- xfs: fix soft lockup via spinning in filestream ag selection loop (git-fixes).
- xfs: fix use-after-free in xattr node block inactivation (git-fixes).
- xfs: fold perag loop iteration logic into helper function (git-fixes).
- xfs: make xfs_rtalloc_query_range input parameters const (git-fixes).
- xfs: only bother with sync_filesystem during readonly remount (git-fixes).
- xfs: prevent UAF in xfs_log_item_in_current_chkpt (git-fixes).
- xfs: prevent a UAF when log IO errors race with unmount (git-fixes).
- xfs: remove incorrect ASSERT in xfs_rename (git-fixes).
- xfs: rename the next_agno perag iteration variable (git-fixes).
- xfs: reorder iunlink remove operation in xfs_ifree (git-fixes).
- xfs: revert 'xfs: actually bump warning counts when we send warnings' (git-fixes).
- xfs: terminate perag iteration reliably on agcount (git-fixes).
- xfs: use invalidate_lock to check the state of mmap_lock (git-fixes).
- xfs: use kmem_cache_free() for kmem_cache objects (git-fixes).
- xfs: use setattr_copy to set vfs inode attributes (git-fixes).
- xhci: Set HCD flag to defer primary roothub registration (git-fixes).
- xhci: dbc: Rename xhci_dbc_init and xhci_dbc_exit (git-fixes).
- xhci: dbc: create and remove dbc structure in dbgtty driver (git-fixes).
- xhci: dbc: refactor xhci_dbc_init() (git-fixes).
- xprtrdma: fix pointer derefs in error cases of rpcrdma_ep_create (git-fixes).
- xprtrdma: treat all calls not a bcall when bc_serv is NULL (git-fixes).
- zonefs: Clear inode information flags on inode creation (git-fixes).
- zonefs: Fix management of open zones (git-fixes).
- zonefs: add MODULE_ALIAS_FS (git-fixes).
    Patchnames
SUSE-2022-3293,SUSE-SLE-Module-Basesystem-15-SP4-2022-3293,SUSE-SLE-Module-Development-Tools-15-SP4-2022-3293,SUSE-SLE-Module-Legacy-15-SP4-2022-3293,SUSE-SLE-Module-Live-Patching-15-SP4-2022-3293,SUSE-SLE-Product-HA-15-SP4-2022-3293,SUSE-SLE-Product-WE-15-SP4-2022-3293,openSUSE-SLE-15.4-2022-3293
    Terms of use
CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).
    {
  "document": {
    "aggregate_severity": {
      "namespace": "https://www.suse.com/support/security/rating/",
      "text": "important"
    },
    "category": "csaf_security_advisory",
    "csaf_version": "2.0",
    "distribution": {
      "text": "Copyright 2024 SUSE LLC. All rights reserved.",
      "tlp": {
        "label": "WHITE",
        "url": "https://www.first.org/tlp/"
      }
    },
    "lang": "en",
    "notes": [
      {
        "category": "summary",
        "text": "Security update for the Linux Kernel",
        "title": "Title of the patch"
      },
      {
        "category": "description",
        "text": "\nThe SUSE Linux Enterprise 15 SP4 kernel was updated to receive various security and bugfixes.\n\n\nThe following security bugs were fixed:\n\n- CVE-2022-39190: Fixed an issue that was discovered in net/netfilter/nf_tables_api.c and could cause a denial of service upon binding to an already bound chain (bnc#1203117).\n- CVE-2022-39188: Fixed race condition in include/asm-generic/tlb.h where a device driver can free a page while it still has stale TLB entries (bnc#1203107).\n- CVE-2022-2663: Fixed an issue that was found in nf_conntrack_irc where the message handling could be confused and incorrectly matches the message (bnc#1202097).\n- CVE-2022-3078: Fixed a lack of check after calling vzalloc() and lack of free after allocation in drivers/media/test-drivers/vidtv/vidtv_s302m.c (bnc#1203041).\n- CVE-2022-28356: Fixed a refcount leak bug that was found in net/llc/af_llc.c (bnc#1197391).\n- CVE-2022-3028: Fixed race condition that was found in the IP framework for transforming packets (XFRM subsystem) (bnc#1202898).\n- CVE-2022-2905: Fixed tnum_range usage on array range checking for poke descriptors (bsc#1202564, bsc#1202860).\n- CVE-2022-2977: Fixed reference counting for struct tpm_chip (bsc#1202672).\n- CVE-2022-2938: Fixed a flaw that was found inside the Pressure Stall Information implementation that could have been used to allow an attacker to crash the system or have other memory-corruption side effects (bnc#1202623).\n- CVE-2022-28693: Fixed x86/speculation behavior by disabling RRSBA (bsc#1201455).\n- CVE-2021-33135: Fixed uncontrolled resource consumption inside Intel(R) SGX that may have allowed an authenticated user to potentially enable denial of service via local access (bnc#1199515).\n- CVE-2022-2588: Fixed use-after-free in cls_route (bsc#1202096).\n- CVE-2022-2959: Fixed a race condition that was found inside the watch queue due to a missing lock in pipe_resize_ring() (bnc#1202681 bnc#1202685).\n- CVE-2022-36946: Fixed a denial of service (panic) inside nfqnl_mangle in net/netfilter/nfnetlink_queue.c (bnc#1201940 bnc#1201941 bnc#1202312 bnc#1202874).\n- CVE-2021-4037: Fixed function logic vulnerability that allowed local users to create files for the XFS file-system with an unintended group ownership and with group execution and SGID permission bits set (bnc#1198702).\n- CVE-2022-2873: Fixed an out-of-bounds memory access flaw that was found in iSMT SMBus host controller driver (bnc#1202558).\n- CVE-2022-36879: Fixed an issue in xfrm_expand_policies in net/xfrm/xfrm_policy.c where a refcount could be dropped twice (bnc#1201948).\n- CVE-2022-20368: Fixed slab-out-of-bounds access in packet_recvmsg() (bsc#1202346).\n- CVE-2022-20369: Fixed out of bounds write in v4l2_m2m_querybuf of v4l2-mem2mem.c (bnc#1202347).\n- CVE-2016-3695: Fixed an issue inside the einj_error_inject function in drivers/acpi/apei/einj.c that allowed users to simulate hardware errors and consequently cause a denial of service (bnc#1023051).\n- CVE-2022-2639: Fixed an integer coercion error that was found in the openvswitch kernel module (bnc#1202154).\n- CVE-2020-36516: Fixed an issue in the mixed IPID assignment method where an attacker was able to inject data into or terminate a victim\u0027s TCP session (bnc#1196616).\n- CVE-2022-32250: Fixed a privilege escalation issue in net/netfilter/nf_tables_api.c that allowed a local user to became root (bnc#1200015).\n\n\nThe following non-security bugs were fixed:\n\n- 9p: Fix refcounting during full path walks for fid lookups (git-fixes).\n- 9p: fix fid refcount leak in v9fs_vfs_atomic_open_dotl (git-fixes).\n- 9p: fix fid refcount leak in v9fs_vfs_get_link (git-fixes).\n- ACPI: APEI: Better fix to avoid spamming the console with old error logs (git-fixes).\n- ACPI: APEI: explicit init of HEST and GHES in apci_init() (git-fixes).\n- ACPI: CPPC: Do not prevent CPPC from working in the future (git-fixes).\n- ACPI: EC: Drop the EC_FLAGS_IGNORE_DSDT_GPE quirk (git-fixes).\n- ACPI: EC: Remove duplicate ThinkPad X1 Carbon 6th entry from DMI quirks (git-fixes).\n- ACPI: LPSS: Fix missing check in register_device_clock() (git-fixes).\n- ACPI: PM: save NVS memory for Lenovo G40-45 (git-fixes).\n- ACPI: VIOT: Fix ACS setup (git-fixes).\n- ACPI: processor/idle: Annotate more functions to live in cpuidle section (git-fixes).\n- ACPI: processor: Remove freq Qos request for all CPUs (git-fixes).\n- ACPI: property: Return type of acpi_add_nondev_subnodes() should be bool (git-fixes).\n- ACPI: thermal: drop an always true check (git-fixes).\n- ACPI: video: Force backlight native for some TongFang devices (git-fixes).\n- ACPI: video: Shortening quirk list by identifying Clevo by board_name only (git-fixes).\n- ALSA: bcd2000: Fix a UAF bug on the error path of probing (git-fixes).\n- ALSA: hda/cirrus - support for iMac 12,1 model (git-fixes).\n- ALSA: hda/conexant: Add quirk for LENOVO 20149 Notebook model (git-fixes).\n- ALSA: hda/conexant: add a new hda codec SN6140 (git-fixes).\n- ALSA: hda/realtek: Add a quirk for HP OMEN 15 (8786) mute LED (git-fixes).\n- ALSA: hda/realtek: Add quirk for Clevo NS50PU, NS70PU (git-fixes).\n- ALSA: hda/realtek: Add quirk for Clevo NV45PZ (git-fixes).\n- ALSA: hda/realtek: Add quirk for HP Spectre x360 15-eb0xxx (git-fixes).\n- ALSA: hda/realtek: Add quirk for Lenovo Yoga9 14IAP7 (git-fixes).\n- ALSA: hda/realtek: Add quirk for another Asus K42JZ model (git-fixes).\n- ALSA: hda/realtek: Add speaker AMP init for Samsung laptops with ALC298 (git-fixes).\n- ALSA: hda/sigmatel: Keep power up while beep is enabled (bsc#1200544).\n- ALSA: hda: intel-nhlt: Correct the handling of fmt_config flexible array (git-fixes).\n- ALSA: info: Fix llseek return value when using callback (git-fixes).\n- ALSA: seq: Fix data-race at module auto-loading (git-fixes).\n- ALSA: seq: oss: Fix data-race for max_midi_devs access (git-fixes).\n- ALSA: usb-audio: Add endianness annotations (git-fixes).\n- ALSA: usb-audio: Add quirk for Behringer UMC202HD (git-fixes).\n- ALSA: usb-audio: Add quirk for LH Labs Geek Out HD Audio 1V5 (git-fixes).\n- ALSA: usb-audio: More comprehensive mixer map for ASUS ROG Zenith II (git-fixes).\n- ALSA: usb-audio: Support jack detection on Dell dock (git-fixes).\n- ALSA: usb-audio: Turn off \u0027manual mode\u0027 on Dell dock (git-fixes).\n- ARM: 9216/1: Fix MAX_DMA_ADDRESS overflow (git-fixes).\n- ARM: OMAP2+: Fix refcount leak in omap3xxx_prm_late_init (git-fixes).\n- ARM: OMAP2+: Fix refcount leak in omapdss_init_of (git-fixes).\n- ARM: OMAP2+: display: Fix refcount leak bug (git-fixes).\n- ARM: OMAP2+: pdata-quirks: Fix refcount leak bug (git-fixes).\n- ARM: bcm: Fix refcount leak in bcm_kona_smc_init (git-fixes).\n- ARM: dts: BCM5301X: Add DT for Meraki MR26 (git-fixes).\n- ARM: dts: ast2500-evb: fix board compatible (git-fixes).\n- ARM: dts: ast2600-evb-a1: fix board compatible (git-fixes).\n- ARM: dts: ast2600-evb: fix board compatible (git-fixes).\n- ARM: dts: at91: sama5d27_wlsom1: do not keep ldo2 enabled all the time (git-fixes).\n- ARM: dts: at91: sama5d27_wlsom1: specify proper regulator output ranges (git-fixes).\n- ARM: dts: at91: sama5d2_icp: do not keep vdd_other enabled all the time (git-fixes).\n- ARM: dts: at91: sama5d2_icp: specify proper regulator output ranges (git-fixes).\n- ARM: dts: imx6qdl-kontron-samx6i: remove duplicated node (git-fixes).\n- ARM: dts: imx6ul: add missing properties for sram (git-fixes).\n- ARM: dts: imx6ul: change operating-points to uint32-matrix (git-fixes).\n- ARM: dts: imx6ul: fix csi node compatible (git-fixes).\n- ARM: dts: imx6ul: fix keypad compatible (git-fixes).\n- ARM: dts: imx6ul: fix lcdif node compatible (git-fixes).\n- ARM: dts: imx6ul: fix qspi node compatible (git-fixes).\n- ARM: dts: imx7d-colibri-emmc: add cpu1 supply (git-fixes).\n- ARM: dts: qcom: mdm9615: add missing PMIC GPIO reg (git-fixes).\n- ARM: dts: qcom: pm8841: add required thermal-sensor-cells (git-fixes).\n- ARM: dts: qcom: sdx55: Fix the IRQ trigger type for UART (git-fixes).\n- ARM: dts: uniphier: Fix USB interrupts for PXs2 SoC (git-fixes).\n- ARM: findbit: fix overflowing offset (git-fixes).\n- ARM: shmobile: rcar-gen2: Increase refcount for new reference (git-fixes).\n- ASoC: SOF: debug: Fix potential buffer overflow by snprintf() (git-fixes).\n- ASoC: audio-graph-card: Add of_node_put() in fail path (git-fixes).\n- ASoC: codec: tlv320aic32x4: fix mono playback via I2S (git-fixes).\n- ASoC: codecs: da7210: add check for i2c_add_driver (git-fixes).\n- ASoC: codecs: msm8916-wcd-digital: move gains from SX_TLV to S8_TLV (git-fixes).\n- ASoC: codecs: wcd9335: move gains from SX_TLV to S8_TLV (git-fixes).\n- ASoC: cros_ec_codec: Fix refcount leak in cros_ec_codec_platform_probe (git-fixes).\n- ASoC: fsl-asoc-card: force cast the asrc_format type (git-fixes).\n- ASoC: fsl_asrc: force cast the asrc_format type (git-fixes).\n- ASoC: fsl_easrc: use snd_pcm_format_t type for sample_format (git-fixes).\n- ASoC: imx-audmux: Silence a clang warning (git-fixes).\n- ASoC: imx-card: Fix DSD/PDM mclk frequency (git-fixes).\n- ASoC: imx-card: use snd_pcm_format_t type for asrc_format (git-fixes).\n- ASoC: mchp-spdifrx: disable end of block interrupt on failures (git-fixes).\n- ASoC: mt6359: Fix refcount leak bug (git-fixes).\n- ASoC: mt6797-mt6351: Fix refcount leak in mt6797_mt6351_dev_probe (git-fixes).\n- ASoC: qcom: Fix missing of_node_put() in asoc_qcom_lpass_cpu_platform_probe() (git-fixes).\n- ASoC: qcom: q6dsp: Fix an off-by-one in q6adm_alloc_copp() (git-fixes).\n- ASoC: rsnd: care default case on rsnd_ssiu_busif_err_irq_ctrl() (git-fixes).\n- ASoC: samsung: Fix error handling in aries_audio_probe (git-fixes).\n- ASoC: samsung: change gpiod_speaker_power and rx1950_audio from global to static variables (git-fixes).\n- ASoC: samsung: change neo1973_audio from a global to static (git-fixes).\n- ASoC: samsung: h1940_uda1380: include proepr GPIO consumer header (git-fixes).\n- ASoC: tas2770: Allow mono streams (git-fixes).\n- ASoC: tas2770: Drop conflicting set_bias_level power setting (git-fixes).\n- ASoC: tas2770: Fix handling of mute/unmute (git-fixes).\n- ASoC: tas2770: Set correct FSYNC polarity (git-fixes).\n- Bluetooth: Add bt_skb_sendmmsg helper (git-fixes).\n- Bluetooth: Add bt_skb_sendmsg helper (git-fixes).\n- Bluetooth: Fix bt_skb_sendmmsg not allocating partial chunks (git-fixes).\n- Bluetooth: Fix passing NULL to PTR_ERR (git-fixes).\n- Bluetooth: L2CAP: Fix build errors in some archs (git-fixes).\n- Bluetooth: L2CAP: Fix l2cap_global_chan_by_psm regression (git-fixes).\n- Bluetooth: L2CAP: Fix use-after-free caused by l2cap_chan_put (git-fixes).\n- Bluetooth: MGMT: Fixes build warnings with C=1 (git-fixes).\n- Bluetooth: RFCOMM: Replace use of memcpy_from_msg with bt_skb_sendmmsg (git-fixes).\n- Bluetooth: SCO: Fix sco_send_frame returning skb-\u003elen (git-fixes).\n- Bluetooth: SCO: Replace use of memcpy_from_msg with bt_skb_sendmsg (git-fixes).\n- Bluetooth: btusb: Add Realtek RTL8852C support ID 0x04C5:0x1675 (git-fixes).\n- Bluetooth: btusb: Add Realtek RTL8852C support ID 0x04CA:0x4007 (git-fixes).\n- Bluetooth: btusb: Add Realtek RTL8852C support ID 0x0CB8:0xC558 (git-fixes).\n- Bluetooth: btusb: Add Realtek RTL8852C support ID 0x13D3:0x3586 (git-fixes).\n- Bluetooth: btusb: Add Realtek RTL8852C support ID 0x13D3:0x3587 (git-fixes).\n- Bluetooth: btusb: Add support of IMC Networks PID 0x3568 (git-fixes).\n- Bluetooth: hci_bcm: Add BCM4349B1 variant (git-fixes).\n- Bluetooth: hci_bcm: Add DT compatible for CYW55572 (git-fixes).\n- Bluetooth: hci_intel: Add check for platform_driver_register (git-fixes).\n- EDAC/ghes: Set the DIMM label unconditionally (bsc#1201768).\n- rpm: Fix parsing of rpm/macros.kernel-source on SLE12 (bsc#1201019).\n- HID: AMD_SFH: Add a DMI quirk entry for Chromebooks (git-fixes).\n- HID: add Lenovo Yoga C630 battery quirk (git-fixes).\n- HID: alps: Declare U1_UNICORN_LEGACY support (git-fixes).\n- HID: amd_sfh: Add NULL check for hid device (git-fixes).\n- HID: amd_sfh: Handle condition of \u0027no sensors\u0027 (git-fixes).\n- HID: asus: ROG NKey: Ignore portion of 0x5a report (git-fixes).\n- HID: cp2112: prevent a buffer overflow in cp2112_xfer() (git-fixes).\n- HID: hid-input: add Surface Go battery quirk (git-fixes).\n- HID: mcp2221: prevent a buffer overflow in mcp_smbus_write() (git-fixes).\n- HID: multitouch: new device class fix Lenovo X12 trackpad sticky (git-fixes).\n- HID: steam: Prevent NULL pointer dereference in steam_{recv,send}_report (git-fies).\n- HID: thrustmaster: Add sparco wheel and fix array length (git-fixes).\n- HID: wacom: Do not register pad_input for touch switch (git-fixes).\n- HID: wacom: Only report rotation for art pen (git-fixes).\n- Input: exc3000 - fix return value check of wait_for_completion_timeout (git-fixes).\n- Input: gscps2 - check return value of ioremap() in gscps2_probe() (git-fixes).\n- Input: i8042 - add TUXEDO devices to i8042 quirk tables (git-fies).\n- Input: i8042 - add additional TUXEDO devices to i8042 quirk tables (git-fies).\n- Input: i8042 - merge quirk tables (git-fies).\n- Input: i8042 - move __initconst to fix code styling warning (git-fies).\n- Input: iforce - wake up after clearing IFORCE_XMIT_RUNNING flag (git-fixes).\n- Input: rk805-pwrkey - fix module autoloading (git-fixes).\n- KABI: cgroup: Restore KABI of css_set (bsc#1201610).\n- KEYS: asymmetric: enforce SM2 signature use pkey algo (git-fixes).\n- KVM: LAPIC: Also cancel preemption timer during SET_LAPIC (git-fixes).\n- KVM: MMU: shadow nested paging does not have PKU (git-fixes).\n- KVM: PPC: Book3S HV: Check return value of kvmppc_radix_init (bsc#1194869).\n- KVM: PPC: Book3S HV: Prevent POWER7/8 TLB flush flushing SLB (bsc#1156395).\n- KVM: PPC: Book3S HV: Remove kvmhv_p9_[set,restore]_lpcr declarations (bsc#1194869).\n- KVM: PPC: Book3S HV: Use GLOBAL_TOC for kvmppc_h_set_dabr/xdabr() (bsc#1156395).\n- KVM: PPC: Book3S HV: fix incorrect NULL check on list iterator (bsc#1194869).\n- KVM: PPC: Book3s HV: Remove unused function kvmppc_bad_interrupt (bsc#1194869).\n- KVM: PPC: Fix vmx/vsx mixup in mmio emulation (bsc#1156395).\n- KVM: PPC: Use arch_get_random_seed_long instead of powernv variant (bsc#1156395).\n- KVM: SVM: Do not BUG if userspace injects an interrupt with GIF=0 (git-fixes).\n- KVM: SVM: Do not intercept #GP for SEV guests (git-fixes).\n- KVM: SVM: Unwind \u0027speculative\u0027 RIP advancement if INTn injection \u0027fails\u0027 (git-fixes).\n- KVM: SVM: fix panic on out-of-bounds guest IRQ (git-fixes).\n- KVM: VMX: Print VM-instruction error as unsigned (git-fixes).\n- KVM: VMX: prepare sync_pir_to_irr for running with APICv disabled (git-fixes).\n- KVM: VMX: switch blocked_vcpu_on_cpu_lock to raw spinlock (git-fixes).\n- KVM: X86: Use vcpu-\u003earch.walk_mmu for kvm_mmu_invlpg() (git-fixes).\n- KVM: X86: avoid uninitialized \u0027fault.async_page_fault\u0027 from fixed-up #PF (git-fixes).\n- KVM: arm64: Avoid setting the upper 32 bits of TCR_EL2 and CPTR_EL2 (bsc#1201442)\n- KVM: nVMX: Defer APICv updates while L2 is active until L1 is active (git-fixes).\n- KVM: nVMX: Inject #UD if VMXON is attempted with incompatible CR0/CR4 (git-fixes).\n- KVM: nVMX: Let userspace set nVMX MSR to any _host_ supported value (git-fixes).\n- KVM: nVMX: Set UMIP bit CR4_FIXED1 MSR when emulating UMIP (git-fixes).\n- KVM: nVMX: Snapshot pre-VM-Enter BNDCFGS for !nested_run_pending case (git-fixes).\n- KVM: nVMX: Snapshot pre-VM-Enter DEBUGCTL for !nested_run_pending case (git-fixes).\n- KVM: nVMX: Synthesize TRIPLE_FAULT for L2 if emulation is required (git-fixes).\n- KVM: nVMX: do not use vcpu-\u003earch.efer when checking host state on nested state load (git-fixes).\n- KVM: selftests: Make sure kvm_create_max_vcpus test won\u0027t hit RLIMIT_NOFILE (git-fixes).\n- KVM: selftests: Silence compiler warning in the kvm_page_table_test (git-fixes).\n- KVM: x86/mmu: Do not freak out if pml5_root is NULL on 4-level host (git-fixes).\n- KVM: x86/mmu: Move \u0027invalid\u0027 check out of kvm_tdp_mmu_get_root() (git-fixes).\n- KVM: x86/mmu: Zap _all_ roots when unmapping gfn range in TDP MMU (git-fixes).\n- KVM: x86/mmu: include EFER.LMA in extended mmu role (git-fixes).\n- KVM: x86/mmu: make apf token non-zero to fix bug (git-fixes).\n- KVM: x86: Avoid theoretical NULL pointer dereference in kvm_irq_delivery_to_apic_fast() (git-fixes).\n- KVM: x86: Check lapic_in_kernel() before attempting to set a SynIC irq (git-fixes).\n- KVM: x86: Forbid VMM to set SYNIC/STIMER MSRs when SynIC wasn\u0027t activated (git-fixes).\n- KVM: x86: Mark TSS busy during LTR emulation _after_ all fault checks (git-fixes).\n- KVM: x86: SVM: do not passthrough SMAP/SMEP/PKE bits in !NPT \u0026\u0026 !gCR0.PG case (git-fixes).\n- KVM: x86: Set error code to segment selector on LLDT/LTR non-canonical #GP (git-fixes).\n- KVM: x86: check PIR even for vCPUs with disabled APICv (git-fixes).\n- KVM: x86: hyper-v: Drop redundant \u0027ex\u0027 parameter from kvm_hv_flush_tlb() (git-fixes).\n- KVM: x86: ignore APICv if LAPIC is not enabled (git-fixes).\n- KVM: x86: remove PMU FIXED_CTR3 from msrs_to_save_all (git-fixes).\n- KVM: x86: revalidate steal time cache if MSR value changes (git-fixes).\n- NFSD: Clamp WRITE offsets (git-fixes).\n- NFSD: Fix NFSv3 SETATTR/CREATE\u0027s handling of large file sizes (git-fixes).\n- NFSD: Fix ia_size underflow (git-fixes).\n- NFSD: Fix possible sleep during nfsd4_release_lockowner() (git-fixes).\n- NFSD: prevent integer overflow on 32 bit systems (git-fixes).\n- NFSD: prevent underflow in nfssvc_decode_writeargs() (git-fixes).\n- NTB: ntb_tool: uninitialized heap data in tool_fn_write() (git-fixes).\n- PCI/ACPI: Guard ARM64-specific mcfg_quirks (git-fixes).\n- PCI/AER: Iterate over error counters instead of error strings (git-fixes).\n- PCI/portdrv: Do not disable AER reporting in get_port_device_capability() (git-fixes).\n- PCI: Add ACS quirk for Broadcom BCM5750x NICs (git-fixes).\n- PCI: aardvark: Fix reporting Slot capabilities on emulated bridge (git-fixes).\n- PCI: dwc: Add unroll iATU space support to dw_pcie_disable_atu() (git-fixes).\n- PCI: dwc: Always enable CDM check if \u0027snps,enable-cdm-check\u0027 exists (git-fixes).\n- PCI: dwc: Deallocate EPC memory on dw_pcie_ep_init() errors (git-fixes).\n- PCI: dwc: Disable outbound windows only for controllers using iATU (git-fixes).\n- PCI: dwc: Set INCREASE_REGION_SIZE flag based on limit address (git-fixes).\n- PCI: dwc: Stop link on host_init errors and de-initialization (git-fixes).\n- PCI: endpoint: Do not stop controller when unbinding endpoint function (git-fixes).\n- PCI: hv: Only reuse existing IRTE allocation for Multi-MSI (bsc#1200845).\n- PCI: microchip: Fix refcount leak in mc_pcie_init_irq_domains() (git-fixes).\n- PCI: qcom: Power on PHY before IPQ8074 DBI register accesses (git-fixes).\n- PCI: qcom: Set up rev 2.1.0 PARF_PHY before enabling clocks (git-fixes).\n- PCI: tegra194: Fix PM error handling in tegra_pcie_config_ep() (git-fixes).\n- PCI: tegra194: Fix Root Port interrupt handling (git-fixes).\n- PCI: tegra194: Fix link up retry sequence (git-fixes).\n- PM: domains: Ensure genpd_debugfs_dir exists before remove (git-fixes).\n- PM: hibernate: defer device probing when resuming from hibernation (git-fixes).\n- SUNRPC: Fix NFSD\u0027s request deferral on RDMA transports (git-fixes).\n- SUNRPC: Fix READ_PLUS crasher (git-fixes).\n- SUNRPC: Prevent immediate close+reconnect (git-fixes).\n- USB: Follow-up to SPDX GPL-2.0+ identifiers addition - remove now useless comments (git-fixes).\n- USB: Follow-up to SPDX identifiers addition - remove now useless comments (git-fixes).\n- USB: serial: ch314: use usb_control_msg_recv() (git-fixes).\n- USB: serial: ch341: fix disabled rx timer on older devices (git-fixes).\n- USB: serial: ch341: fix lost character on LCR updates (git-fixes).\n- USB: serial: fix tty-port initialized comments (git-fixes).\n- XArray: Update the LRU list in xas_split() (git-fixes).\n- apparmor: Fix failed mount permission check error message (git-fixes).\n- apparmor: Fix memleak in aa_simple_write_to_buffer() (git-fixes).\n- apparmor: fix aa_label_asxprint return check (git-fixes).\n- apparmor: fix absroot causing audited secids to begin with = (git-fixes).\n- apparmor: fix overlapping attachment computation (git-fixes).\n- apparmor: fix quiet_denied for file rules (git-fixes).\n- apparmor: fix reference count leak in aa_pivotroot() (git-fixes).\n- apparmor: fix setting unconfined mode on a loaded profile (git-fixes).\n- arm64: Do not forget syscall when starting a new thread (git-fixes).\n- arm64: Fix match_list for erratum 1286807 on Arm Cortex-A76 (git-fixes).\n- arm64: cpufeature: Allow different PMU versions in ID_DFR0_EL1 (git-fixes).\n- arm64: dts: allwinner: a64: orangepi-win: Fix LED node name (git-fixes).\n- arm64: dts: mt7622: fix BPI-R64 WPS button (git-fixes).\n- arm64: dts: mt8192: Fix idle-states entry-method (git-fixes).\n- arm64: dts: mt8192: Fix idle-states nodes naming scheme (git-fixes).\n- arm64: dts: qcom: ipq8074: fix NAND node name (git-fixes).\n- arm64: dts: qcom: msm8916: Fix typo in pronto remoteproc node (git-fixes).\n- arm64: dts: qcom: qcs404: Fix incorrect USB2 PHYs assignment (git-fixes).\n- arm64: dts: qcom: sm8250: add missing PCIe PHY clock-cells (git-fixes).\n- arm64: dts: renesas: Fix thermal-sensors on single-zone sensors (git-fixes).\n- arm64: dts: renesas: beacon: Fix regulator node names (git-fixes).\n- arm64: dts: uniphier: Fix USB interrupts for PXs3 SoC (git-fixes).\n- arm64: fix oops in concurrently setting insn_emulation sysctls (git-fixes).\n- arm64: fix rodata=full (git-fixes).\n- arm64: kasan: Revert \u0027arm64: mte: reset the page tag in page-\u003eflags\u0027 (git-fixes).\n- arm64: set UXN on swapper page tables (git-fixes).\n- arm64: tegra: Fix SDMMC1 CD on P2888 (git-fixes).\n- arm64: tegra: Fixup SYSRAM references (git-fixes).\n- arm64: tegra: Mark BPMP channels as no-memory-wc (git-fixes).\n- arm64: tegra: Update Tegra234 BPMP channel addresses (git-fixes).\n- arm_pmu: Validate single/group leader events (git-fixes).\n- asm-generic: remove a broken and needless ifdef conditional (git-fixes).\n- asm-generic: sections: refactor memory_intersects (git-fixes).\n- ata: libata-eh: Add missing command name (git-fixes).\n- ath10k: do not enforce interrupt trigger type (git-fixes).\n- ath11k: Fix incorrect debug_mask mappings (git-fixes).\n- ath11k: fix netdev open race (git-fixes).\n- atm: idt77252: fix use-after-free bugs caused by tst_timer (git-fixes).\n- audit: fix potential double free on error path from fsnotify_add_inode_mark (git-fixes).\n- ax25: Fix ax25 session cleanup problems (git-fixes).\n- bitfield.h: Fix \u0027type of reg too small for mask\u0027 test (git-fixes).\n- block: Fix fsync always failed if once failed (bsc#1202779).\n- block: Fix wrong offset in bio_truncate() (bsc#1202780).\n- block: fix rq-qos breakage from skipping rq_qos_done_bio() (bsc#1202781).\n- block: only mark bio as tracked if it really is tracked (bsc#1202782).\n- bnx2x: Invalidate fastpath HSI version for VFs (git-fixes).\n- bnx2x: Utilize firmware 7.13.21.0 (git-fixes).\n- btrfs: properly flag filesystem with BTRFS_FEATURE_INCOMPAT_BIG_METADATA (git-fixes).\n- bus: hisi_lpc: fix missing platform_device_put() in hisi_lpc_acpi_probe() (git-fixes).\n- can: Break loopback loop on loopback documentation (git-fixes).\n- can: ems_usb: fix clang\u0027s -Wunaligned-access warning (git-fixes).\n- can: error: specify the values of data[5..7] of CAN error frames (git-fixes).\n- can: hi311x: do not report txerr and rxerr during bus-off (git-fixes).\n- can: j1939: j1939_sk_queue_activate_next_locked(): replace WARN_ON_ONCE with netdev_warn_once() (git-fixes).\n- can: kvaser_usb_hydra: do not report txerr and rxerr during bus-off (git-fixes).\n- can: kvaser_usb_leaf: do not report txerr and rxerr during bus-off (git-fixes).\n- can: mcp251x: Fix race condition on receive interrupt (git-fixes).\n- can: mcp251xfd: mcp251xfd_dump(): fix comment (git-fixes).\n- can: netlink: allow configuring of fixed bit rates without need for do_set_bittiming callback (git-fixes).\n- can: netlink: allow configuring of fixed data bit rates without need for do_set_data_bittiming callback (git-fixes).\n- can: pch_can: do not report txerr and rxerr during bus-off (git-fixes).\n- can: pch_can: pch_can_error(): initialize errc before using it (git-fixes).\n- can: rcar_can: do not report txerr and rxerr during bus-off (git-fixes).\n- can: sja1000: do not report txerr and rxerr during bus-off (git-fixes).\n- can: sun4i_can: do not report txerr and rxerr during bus-off (git-fixes).\n- can: usb_8dev: do not report txerr and rxerr during bus-off (git-fixes).\n- ceph: do not leak snap_rwsem in handle_cap_grant (bsc#1202823).\n- ceph: do not truncate file in atomic_open (bsc#1202824).\n- ceph: use correct index when encoding client supported features (bsc#1202822).\n- cfg80211/mac80211: assume CHECKSUM_COMPLETE includes SNAP (bsc#1202131).\n- cgroup: Use separate src/dst nodes when preloading css_sets for migration (bsc#1201610).\n- cifs: fix reconnect on smb3 mount types (bsc#1201427).\n- clk: bcm: rpi: Fix error handling of raspberrypi_fw_get_rate (git-fixes).\n- clk: core: Fix runtime PM sequence in clk_core_unprepare() (git-fixes).\n- clk: core: Honor CLK_OPS_PARENT_ENABLE for clk gate ops (git-fixes).\n- clk: mediatek: reset: Fix written reset bit offset (git-fixes).\n- clk: qcom: camcc-sdm845: Fix topology around titan_top power domain (git-fixes).\n- clk: qcom: camcc-sm8250: Fix halt on boot by reducing driver\u0027s init level (git-fixes).\n- clk: qcom: camcc-sm8250: Fix topology around titan_top power domain (git-fixes).\n- clk: qcom: clk-alpha-pll: fix clk_trion_pll_configure description (git-fixes).\n- clk: qcom: clk-krait: unlock spin after mux completion (git-fixes).\n- clk: qcom: clk-rcg2: Fail Duty-Cycle configuration if MND divider is not enabled (git-fixes).\n- clk: qcom: clk-rcg2: Make sure to not write d=0 to the NMD register (git-fixes).\n- clk: qcom: gcc-msm8939: Add missing SYSTEM_MM_NOC_BFDCD_CLK_SRC (git-fixes).\n- clk: qcom: gcc-msm8939: Add missing system_mm_noc_bfdcd_clk_src (git-fixes).\n- clk: qcom: gcc-msm8939: Fix bimc_ddr_clk_src rcgr base address (git-fixes).\n- clk: qcom: gcc-msm8939: Fix weird field spacing in ftbl_gcc_camss_cci_clk (git-fixes).\n- clk: qcom: gcc-msm8939: Point MM peripherals to system_mm_noc clock (git-fixes).\n- clk: qcom: ipq8074: SW workaround for UBI32 PLL lock (git-fixes).\n- clk: qcom: ipq8074: dont disable gcc_sleep_clk_src (git-fixes).\n- clk: qcom: ipq8074: fix NSS core PLL-s (git-fixes).\n- clk: qcom: ipq8074: fix NSS port frequency tables (git-fixes).\n- clk: qcom: ipq8074: set BRANCH_HALT_DELAY flag for UBI clocks (git-fixes).\n- clk: renesas: r9a06g032: Fix UART clkgrp bitsel (git-fixes).\n- clk: ti: Stop using legacy clkctrl names for omap4 and 5 (git-fixes).\n- configfs: fix a race in configfs_{,un}register_subsystem() (git-fixes).\n- cpufreq: zynq: Fix refcount leak in zynq_get_revision (git-fixes).\n- crypto: arm64/poly1305 - fix a read out-of-bound (git-fixes).\n- crypto: ccp - During shutdown, check SEV data pointer before using (git-fixes).\n- crypto: ccp - Use kzalloc for sev ioctl interfaces to prevent kernel memory leak (git-fixes).\n- crypto: hisilicon - Kunpeng916 crypto driver do not sleep when in softirq (git-fixes).\n- crypto: hisilicon/hpre - do not use GFP_KERNEL to alloc mem during softirq (git-fixes).\n- crypto: hisilicon/sec - do not sleep when in softirq (git-fixes).\n- crypto: hisilicon/sec - fix auth key size error (git-fixes).\n- crypto: inside-secure - Add missing MODULE_DEVICE_TABLE for of (git-fixes).\n- crypto: sun8i-ss - do not allocate memory when handling hash requests (git-fixes).\n- crypto: sun8i-ss - fix error codes in allocate_flows() (git-fixes).\n- crypto: sun8i-ss - fix infinite loop in sun8i_ss_setup_ivs() (git-fixes).\n- device property: Check fwnode-\u003esecondary when finding properties (git-fixes).\n- devlink: Fix use-after-free after a failed reload (git-fixes).\n- dm raid: fix KASAN warning in raid5_add_disks (git-fixes).\n- dma-debug: change allocation mode from GFP_NOWAIT to GFP_ATIOMIC (git-fixes).\n- dma-debug: make things less spammy under memory pressure (git-fixes).\n- dmaengine: dw-axi-dmac: do not print NULL LLI during error (git-fixes).\n- dmaengine: dw-axi-dmac: ignore interrupt if no descriptor (git-fixes).\n- dmaengine: dw-edma: Fix eDMA Rd/Wr-channels and DMA-direction semantics (git-fixes).\n- dmaengine: imx-dma: Cast of_device_get_match_data() with (uintptr_t) (git-fixes).\n- dmaengine: sf-pdma: Add multithread support for a DMA channel (git-fixes).\n- dmaengine: sprd: Cleanup in .remove() after pm_runtime_get_sync() failed (git-fixes).\n- dmaengine: stm32-mdma: Remove dead code in stm32_mdma_irq_handler() (git-fixes).\n- docs/kernel-parameters: Update descriptions for \u0027mitigations=\u0027 param with retbleed (git-fixes).\n- docs: i2c: i2c-sysfs: fix hyperlinks (git-fixes).\n- docs: zh_CN: fix a broken reference (git-fixes).\n- dpaa2-eth: fix ethtool statistics (git-fixes).\n- driver core: Do not probe devices after bus_type.match() probe deferral (git-fixes).\n- driver core: fix potential deadlock in __driver_attach (git-fixes).\n- drivers/iio: Remove all strcpy() uses (git-fixes).\n- drivers: usb: dwc3-qcom: Add sdm660 compatible (git-fixes).\n- drm/amd/amd_shared.h: Add missing doc for PP_GFX_DCS_MASK (git-fixes).\n- drm/amd/display: Add option to defer works of hpd_rx_irq (git-fixes).\n- drm/amd/display: Avoid MPC infinite loop (git-fixes).\n- drm/amd/display: Check correct bounds for stream encoder instances for DCN303 (git-fixes).\n- drm/amd/display: Enable building new display engine with KCOV enabled (git-fixes).\n- drm/amd/display: Fix HDMI VSIF V3 incorrect issue (git-fixes).\n- drm/amd/display: Fix pixel clock programming (git-fixes).\n- drm/amd/display: Fix surface optimization regression on Carrizo (git-fixes).\n- drm/amd/display: For stereo keep \u0027FLIP_ANY_FRAME\u0027 (git-fixes).\n- drm/amd/display: Ignore First MST Sideband Message Return Error (git-fixes).\n- drm/amd/display: Optimize bandwidth on following fast update (git-fixes).\n- drm/amd/display: Reset DMCUB before HW init (git-fixes).\n- drm/amd/display: Revert \u0027drm/amd/display: turn DPMS off on connector unplug\u0027 (git-fixes).\n- drm/amd/display: avoid doing vm_init multiple time (git-fixes).\n- drm/amd/display: clear optc underflow before turn off odm clock (git-fixes).\n- drm/amd/pm: add missing -\u003efini_microcode interface for Sienna Cichlid (git-fixes).\n- drm/amdgpu: Check BO\u0027s requested pinning domains against its preferred_domains (git-fixes).\n- drm/amdgpu: Increase tlb flush timeout for sriov (git-fixes).\n- drm/amdgpu: Remove one duplicated ef removal (git-fixes).\n- drm/amdgpu: remove useless condition in amdgpu_job_stop_all_jobs_on_sched() (git-fixes).\n- drm/bridge: lt9611uxc: Cancel only driver\u0027s work (git-fixes).\n- drm/bridge: tc358767: Fix (e)DP bridge endpoint parsing in dedicated function (git-fixes).\n- drm/bridge: tc358767: Make sure Refclk clock are enabled (git-fixes).\n- drm/bridge: tc358767: Move (e)DP bridge endpoint parsing into dedicated function (git-fixes).\n- drm/doc: Fix comment typo (git-fixes).\n- drm/exynos/exynos7_drm_decon: free resources when clk_set_parent() failed (git-fixes).\n- drm/gem: Properly annotate WW context on drm_gem_lock_reservations() error (git-fixes).\n- drm/i915/display: avoid warnings when registering dual panel backlight (git-fixes).\n- drm/i915/gt: Skip TLB invalidations once wedged (git-fixes).\n- drm/i915/reg: Fix spelling mistake \u0027Unsupport\u0027 -\u003e \u0027Unsupported\u0027 (git-fixes).\n- drm/i915: fix null pointer dereference (git-fixes).\n- drm/mcde: Fix refcount leak in mcde_dsi_bind (git-fixes).\n- drm/mediatek: Add pull-down MIPI operation in mtk_dsi_poweroff function (git-fixes).\n- drm/mediatek: Allow commands to be sent during video mode (git-fixes).\n- drm/mediatek: Keep dsi as LP00 before dcs cmds transfer (git-fixes).\n- drm/mediatek: Modify dsi funcs to atomic operations (git-fixes).\n- drm/mediatek: Separate poweron/poweroff from enable/disable and define new funcs (git-fixes).\n- drm/mediatek: dpi: Only enable dpi after the bridge is enabled (git-fixes).\n- drm/mediatek: dpi: Remove output format of YUV (git-fixes).\n- drm/meson: Fix overflow implicit truncation warnings (git-fixes).\n- drm/meson: Fix refcount bugs in meson_vpu_has_available_connectors() (git-fixes).\n- drm/mipi-dbi: align max_chunk to 2 in spi_transfer (git-fixes).\n- drm/msm/dp: delete DP_RECOVERED_CLOCK_OUT_EN to fix tps4 (git-fixes).\n- drm/msm/dpu: Fix for non-visible planes (git-fixes).\n- drm/msm/dsi: Fix number of regulators for SDM660 (git-fixes).\n- drm/msm/dsi: Fix number of regulators for msm8996_dsi_cfg (git-fixes).\n- drm/msm/dsi: fix the inconsistent indenting (git-fixes).\n- drm/msm/hdmi: drop empty \u0027none\u0027 regulator lists (git-fixes).\n- drm/msm/hdmi: enable core-vcc/core-vdda-supply for 8996 platform (git-fixes).\n- drm/msm/mdp5: Fix global state lock backoff (git-fixes).\n- drm/msm: Avoid dirtyfb stalls on video mode displays (v2) (git-fixes).\n- drm/msm: Fix dirtyfb refcounting (git-fixes).\n- drm/nouveau/acpi: Do not print error when we get -EINPROGRESS from pm_runtime (git-fixes).\n- drm/nouveau/kms: Fix failure path for creating DP connectors (git-fixes).\n- drm/nouveau: Do not pm_runtime_put_sync(), only pm_runtime_put_autosuspend() (git-fixes).\n- drm/nouveau: fix another off-by-one in nvbios_addr (git-fixes).\n- drm/nouveau: recognise GA103 (git-fixes).\n- drm/radeon: fix incorrrect SPDX-License-Identifiers (git-fixes).\n- drm/radeon: fix potential buffer overflow in ni_set_mc_special_registers() (git-fixes).\n- drm/rockchip: Fix an error handling path rockchip_dp_probe() (git-fixes).\n- drm/rockchip: vop: Do not crash for invalid duplicate_state() (git-fixes).\n- drm/shmem-helper: Add missing vunmap on error (git-fixes).\n- drm/simpledrm: Fix return type of simpledrm_simple_display_pipe_mode_valid() (git-fixes).\n- drm/st7735r: Fix module autoloading for Okaya RH128128T (git-fixes).\n- drm/sun4i: dsi: Prevent underflow when computing packet sizes (git-fixes).\n- drm/ttm: Fix dummy res NULL ptr deref bug (git-fixes).\n- drm/udl: Add parameter to set number of URBs (bsc#1195917).\n- drm/udl: Add reset_resume (bsc#1195917)\n- drm/udl: Do not re-initialize stuff at retrying the URB list allocation (bsc#1195917).\n- drm/udl: Drop unneeded alignment (bsc#1195917).\n- drm/udl: Enable damage clipping (bsc#1195917).\n- drm/udl: Fix inconsistent urbs.count value during udl_free_urb_list() (bsc#1195917).\n- drm/udl: Fix potential URB leaks (bsc#1195917).\n- drm/udl: Increase the default URB list size to 20 (bsc#1195917).\n- drm/udl: Kill pending URBs at suspend and disconnect (bsc#1195917).\n- drm/udl: Replace BUG_ON() with WARN_ON() (bsc#1195917).\n- drm/udl: Replace semaphore with a simple wait queue (bsc#1195917).\n- drm/udl: Restore display mode on resume (bsc#1195917)\n- drm/udl: Suppress error print for -EPROTO at URB completion (bsc#1195917).\n- drm/udl: Sync pending URBs at suspend / disconnect (bsc#1195917).\n- drm/udl: Sync pending URBs at the end of suspend (bsc#1195917).\n- drm/vc4: change vc4_dma_range_matches from a global to static (git-fixes).\n- drm/vc4: drv: Adopt the dma configuration from the HVS or V3D component (git-fixes).\n- drm/vc4: dsi: Add correct stop condition to vc4_dsi_encoder_disable iteration (git-fixes).\n- drm/vc4: dsi: Correct DSI divider calculations (git-fixes).\n- drm/vc4: dsi: Correct pixel order for DSI0 (git-fixes).\n- drm/vc4: dsi: Fix dsi0 interrupt support (git-fixes).\n- drm/vc4: dsi: Register dsi0 as the correct vc4 encoder type (git-fixes).\n- drm/vc4: hdmi: Correct HDMI timing registers for interlaced modes (git-fixes).\n- drm/vc4: hdmi: Disable audio if dmas property is present but empty (git-fixes).\n- drm/vc4: hdmi: Fix timings for interlaced modes (git-fixes).\n- drm/vc4: hdmi: Reset HDMI MISC_CONTROL register (git-fixes).\n- drm/vc4: plane: Fix margin calculations for the right/bottom edges (git-fixes).\n- drm/vc4: plane: Remove subpixel positioning check (git-fixes).\n- drm: adv7511: override i2c address of cec before accessing it (git-fixes).\n- drm: bridge: adv7511: Add check for mipi_dsi_driver_register (git-fixes).\n- drm: bridge: sii8620: fix possible off-by-one (git-fixes).\n- dsa: mv88e6xxx: fix debug print for SPEED_UNFORCED (git-fixes).\n- dt-bindings: arm: qcom: fix MSM8916 MTP compatibles (git-fixes).\n- dt-bindings: arm: qcom: fix MSM8994 boards compatibles (git-fixes).\n- dt-bindings: bluetooth: broadcom: Add BCM4349B1 DT binding (git-fixes).\n- dt-bindings: clock: qcom,gcc-msm8996: add more GCC clock sources (git-fixes).\n- dt-bindings: gpio: zynq: Add missing compatible strings (git-fixes).\n- dt-bindings: iio: accel: Add DT binding doc for ADXL355 (git-fixes).\n- dt-bindings: usb: mtk-xhci: Allow wakeup interrupt-names to be optional (git-fixes).\n- eeprom: idt_89hpesx: uninitialized data in idt_dbgfs_csr_write() (git-fixes).\n- erofs: fix deadlock when shrink erofs slab (git-fixes).\n- ethernet: rocker: fix sleep in atomic context bug in neigh_timer_handler (git-fies).\n- exfat: Define NLS_NAME_* as bit flags explicitly (bsc#1201725).\n- exfat: Downgrade ENAMETOOLONG error message to debug messages (bsc#1201725).\n- exfat: Drop superfluous new line for error messages (bsc#1201725).\n- exfat: Expand exfat_err() and co directly to pr_*() macro (bsc#1201725).\n- exfat: Return ENAMETOOLONG consistently for oversized paths (bsc#1201725).\n- exfat: fix i_blocks for files truncated over 4 GiB (git-fixes).\n- exfat: fix referencing wrong parent directory information after renaming (git-fixes).\n- exfat: reuse exfat_inode_info variable instead of calling EXFAT_I() (git-fixes).\n- exfat: use updated exfat_chain directly during renaming (git-fixes).\n- export: fix string handling of namespace in EXPORT_SYMBOL_NS (git-fixes).\n- ext4: Fix BUG_ON in ext4_bread when write quota data (bsc#1197755).\n- ext4: add new helper interface ext4_try_to_trim_range() (bsc#1202783).\n- ext4: add reserved GDT blocks check (bsc#1202712).\n- ext4: do not use the orphan list when migrating an inode (bsc#1197756).\n- ext4: fast commit may miss tracking unwritten range during ftruncate (bsc#1202759).\n- ext4: filter out EXT4_FC_REPLAY from on-disk superblock field s_state (bsc#1202771).\n- ext4: fix a possible ABBA deadlock due to busy PA (bsc#1202762).\n- ext4: fix bug_on in ext4_writepages (bsc#1200872).\n- ext4: fix error handling in ext4_fc_record_modified_inode() (bsc#1202767).\n- ext4: fix error handling in ext4_restore_inline_data() (bsc#1197757).\n- ext4: fix fallocate to use file_modified to update permissions consistently (bsc#1202769).\n- ext4: fix fast commit may miss tracking range for FALLOC_FL_ZERO_RANGE (bsc#1202757).\n- ext4: fix fs corruption when tring to remove a non-empty directory with IO error (bsc#1202768).\n- ext4: fix incorrect type issue during replay_del_range (bsc#1202867).\n- ext4: fix null-ptr-deref in \u0027__ext4_journal_ensure_credits\u0027 (bsc#1202764).\n- ext4: fix overhead calculation to account for the reserved gdt blocks (bsc#1200869).\n- ext4: fix race when reusing xattr blocks (bsc#1198971).\n- ext4: fix super block checksum incorrect after mount (bsc#1202773).\n- ext4: fix symlink file size not match to file content (bsc#1200868).\n- ext4: fix use-after-free in ext4_rename_dir_prepare (bsc#1200871).\n- ext4: fix use-after-free in ext4_search_dir (bsc#1202710).\n- ext4: fix warning in ext4_handle_inode_extension (bsc#1202711).\n- ext4: force overhead calculation if the s_overhead_cluster makes no sense (bsc#1200870).\n- ext4: initialize err_blk before calling __ext4_get_inode_loc (bsc#1202763).\n- ext4: make sure quota gets properly shutdown on error (bsc#1195480).\n- ext4: make sure to reset inode lockdep class when quota enabling fails (bsc#1202761).\n- ext4: mark group as trimmed only if it was fully scanned (bsc#1202770).\n- ext4: modify the logic of ext4_mb_new_blocks_simple (bsc#1202766).\n- ext4: prevent used blocks from being allocated during fast commit replay (bsc#1202765).\n- ext4: recover csum seed of tmp_inode after migrating to extents (bsc#1202713).\n- ext4: remove EA inode entry from mbcache on inode eviction (bsc#1198971).\n- ext4: unindent codeblock in ext4_xattr_block_set() (bsc#1198971).\n- ext4: use ext4_ext_remove_space() for fast commit replay delete range (bsc#1202758).\n- fat: add ratelimit to fat*_ent_bread() (git-fixes).\n- fbcon: Fix boundary checks for fbcon=vc:n1-n2 parameters (git-fixes).\n- fbdev: fb_pm2fb: Avoid potential divide by zero error (git-fixes).\n- fbdev: fbcon: Properly revert changes when vc_resize() failed (git-fies).\n- filemap: Handle sibling entries in filemap_get_read_batch() (bsc#1202774).\n- firmware: arm_scpi: Ensure scpi_info is not assigned if the probe fails (git-fixes).\n- firmware: tegra: Fix error check return value of debugfs_create_file() (git-fixes).\n- firmware: tegra: bpmp: Do only aligned access to IPC memory area (git-fixes).\n- fix race between exit_itimers() and /proc/pid/timers (git-fixes).\n- fpga: altera-pr-ip: fix unsigned comparison with less than zero (git-fixes).\n- fs-writeback: writeback_sb_inodes: Recalculate \u0027wrote\u0027 according skipped pages (bsc#1200873).\n- ftrace/x86: Add back ftrace_expected assignment (git-fixes).\n- fuse: ioctl: translate ENOSYS (bsc#1203139).\n- fuse: limit nsec (bsc#1203138).\n- gadgetfs: ep_io - wait until IRQ finishes (git-fixes).\n- geneve: do not use RT_TOS for IPv6 flowlabel (git-fixes).\n- geneve: fix TOS inheriting for ipv4 (git-fixes).\n- gpio: gpiolib-of: Fix refcount bugs in of_mm_gpiochip_add_data() (git-fixes).\n- gpio: pca953x: Add mutex_lock for regcache sync in PM (git-fixes).\n- habanalabs/gaudi: fix shift out of bounds (git-fixes).\n- habanalabs/gaudi: mask constant value before cast (git-fixes).\n- hwmon: (dell-smm) Add Dell XPS 13 7390 to fan control whitelist (git-fixes).\n- hwmon: (drivetemp) Add module alias (git-fixes).\n- hwmon: (gpio-fan) Fix array out of bounds access (git-fixes).\n- hwmon: (sht15) Fix wrong assumptions in device remove callback (git-fixes).\n- i2c: Fix a potential use after free (git-fixes).\n- i2c: cadence: Support PEC for SMBus block read (git-fixes).\n- i2c: imx: Make sure to unregister adapter on remove() (git-fixes).\n- i2c: mux-gpmux: Add of_node_put() when breaking out of loop (git-fixes).\n- i2c: mxs: Silence a clang warning (git-fixes).\n- i2c: npcm: Capitalize the one-line comment (git-fixes).\n- i2c: npcm: Correct slave role behavior (git-fixes).\n- i2c: npcm: Remove own slave addresses 2:10 (git-fixes).\n- ice: fix \u0027scheduling while atomic\u0027 on aux critical err interrupt (git-fixes).\n- ieee80211: add EHT 1K aggregation definitions (bsc#1202131).\n- ieee80211: change HE nominal packet padding value defines (bsc#1202131).\n- ieee802154/adf7242: defer destroy_workqueue call (git-fixes).\n- iio: accel: bma220: Fix alignment for DMA safety (git-fixes).\n- iio: accel: bma400: Fix the scale min and max macro values (git-fixes).\n- iio: accel: bma400: Reordering of header files (git-fixes).\n- iio: accel: sca3000: Fix alignment for DMA safety (git-fixes).\n- iio: accel: sca3300: Fix alignment for DMA safety (git-fixes).\n- iio: ad7292: Prevent regulator double disable (git-fixes).\n- iio: adc: ad7266: Fix alignment for DMA safety (git-fixes).\n- iio: adc: ad7292: Fix alignment for DMA safety (git-fixes).\n- iio: adc: ad7298: Fix alignment for DMA safety (git-fixes).\n- iio: adc: ad7476: Fix alignment for DMA safety (git-fixes).\n- iio: adc: ad7766: Fix alignment for DMA safety (git-fixes).\n- iio: adc: ad7768-1: Fix alignment for DMA safety (git-fixes).\n- iio: adc: ad7887: Fix alignment for DMA safety (git-fixes).\n- iio: adc: ad7923: Fix alignment for DMA safety (git-fixes).\n- iio: adc: hi8435: Fix alignment for DMA safety (git-fixes).\n- iio: adc: ltc2496: Fix alignment for DMA safety (git-fixes).\n- iio: adc: ltc2497: Fix alignment for DMA safety (git-fixes).\n- iio: adc: max1027: Fix alignment for DMA safety (git-fixes).\n- iio: adc: max11100: Fix alignment for DMA safety (git-fixes).\n- iio: adc: max1118: Fix alignment for DMA safety (git-fixes).\n- iio: adc: max1241: Fix alignment for DMA safety (git-fixes).\n- iio: adc: mcp320x: Fix alignment for DMA safety (git-fixes).\n- iio: adc: mcp3911: make use of the sign bit (git-fixes).\n- iio: adc: mcp3911: use correct formula for AD conversion (git-fixes).\n- iio: adc: ti-adc0832: Fix alignment for DMA safety (git-fixes).\n- iio: adc: ti-adc084s021: Fix alignment for DMA safety (git-fixes).\n- iio: adc: ti-adc108s102: Fix alignment for DMA safety (git-fixes).\n- iio: adc: ti-adc12138: Fix alignment for DMA safety (git-fixes).\n- iio: adc: ti-adc128s052: Fix alignment for DMA safety (git-fixes).\n- iio: adc: ti-adc161s626: Fix alignment for DMA safety (git-fixes).\n- iio: adc: ti-ads124s08: Fix alignment for DMA safety (git-fixes).\n- iio: adc: ti-ads131e08: Fix alignment for DMA safety (git-fixes).\n- iio: adc: ti-ads7950: Fix alignment for DMA safety (git-fixes).\n- iio: adc: ti-ads8344: Fix alignment for DMA safety (git-fixes).\n- iio: adc: ti-ads8688: Fix alignment for DMA safety (git-fixes).\n- iio: adc: ti-tlc4541: Fix alignment for DMA safety (git-fixes).\n- iio: amplifiers: ad8366: Fix alignment for DMA safety (git-fixes).\n- iio: common: ssp: Fix alignment for DMA safety (git-fixes).\n- iio: core: Fix IIO_ALIGN and rename as it was not sufficiently large (git-fixes).\n- iio: dac: ad5064: Fix alignment for DMA safety (git-fixes).\n- iio: dac: ad5360: Fix alignment for DMA safety (git-fixes).\n- iio: dac: ad5421: Fix alignment for DMA safety (git-fixes).\n- iio: dac: ad5449: Fix alignment for DMA safety (git-fixes).\n- iio: dac: ad5504: Fix alignment for DMA safety (git-fixes).\n- iio: dac: ad5755: Fix alignment for DMA safety (git-fixes).\n- iio: dac: ad5761: Fix alignment for DMA safety (git-fixes).\n- iio: dac: ad5764: Fix alignment for DMA safety (git-fixes).\n- iio: dac: ad5766: Fix alignment for DMA safety (git-fixes).\n- iio: dac: ad5770r: Fix alignment for DMA safety (git-fixes).\n- iio: dac: ad5791: Fix alignment for DMA saftey (git-fixes).\n- iio: dac: ad7303: Fix alignment for DMA safety (git-fixes).\n- iio: dac: ad8801: Fix alignment for DMA safety (git-fixes).\n- iio: dac: mcp4922: Fix alignment for DMA safety (git-fixes).\n- iio: dac: ti-dac082s085: Fix alignment for DMA safety (git-fixes).\n- iio: dac: ti-dac5571: Fix alignment for DMA safety (git-fixes).\n- iio: dac: ti-dac7311: Fix alignment for DMA safety (git-fixes).\n- iio: dac: ti-dac7612: Fix alignment for DMA safety (git-fixes).\n- iio: fix iio_format_avail_range() printing for none IIO_VAL_INT (git-fixes).\n- iio: frequency: ad9523: Fix alignment for DMA safety (git-fixes).\n- iio: frequency: adf4350: Fix alignment for DMA safety (git-fixes).\n- iio: frequency: adf4371: Fix alignment for DMA safety (git-fixes).\n- iio: gyro: adis16080: Fix alignment for DMA safety (git-fixes).\n- iio: gyro: adis16130: Fix alignment for DMA safety (git-fixes).\n- iio: gyro: adxrs450: Fix alignment for DMA safety (git-fixes).\n- iio: gyro: fxas210002c: Fix alignment for DMA safety (git-fixes).\n- iio: imu: fxos8700: Fix alignment for DMA safety (git-fixes).\n- iio: light: isl29028: Fix the warning in isl29028_remove() (git-fixes).\n- iio: potentiometer: ad5272: Fix alignment for DMA safety (git-fixes).\n- iio: potentiometer: max5481: Fix alignment for DMA safety (git-fixes).\n- iio: potentiometer: mcp41010: Fix alignment for DMA safety (git-fixes).\n- iio: potentiometer: mcp4131: Fix alignment for DMA safety (git-fixes).\n- iio: proximity: as3935: Fix alignment for DMA safety (git-fixes).\n- iio: resolver: ad2s1200: Fix alignment for DMA safety (git-fixes).\n- iio: resolver: ad2s90: Fix alignment for DMA safety (git-fixes).\n- iio: temp: ltc2983: Fix alignment for DMA safety (git-fixes).\n- iio: temp: maxim_thermocouple: Fix alignment for DMA safety (git-fixes).\n- inet_diag: fix kernel-infoleak for UDP sockets (git-fixes).\n- intel_th: Fix a resource leak in an error handling path (git-fixes).\n- intel_th: msu-sink: Potential dereference of null pointer (git-fixes).\n- intel_th: msu: Fix vmalloced buffers (git-fixes).\n- intel_th: pci: Add Meteor Lake-P support (git-fixes).\n- intel_th: pci: Add Raptor Lake-S CPU support (git-fixes).\n- intel_th: pci: Add Raptor Lake-S PCH support (git-fixes).\n- interconnect: imx: fix max_node_id (git-fixes).\n- io_uring: add a schedule point in io_add_buffers() (git-fixes).\n- io_uring: terminate manual loop iterator loop correctly for non-vecs (git-fixes).\n- iommu/amd: Clarify AMD IOMMUv2 initialization messages (git-fixes).\n- iommu/amd: Enable swiotlb in all cases (git-fixes).\n- iommu/amd: Fix I/O page table memory leak (git-fixes).\n- iommu/amd: Recover from event log overflow (git-fixes).\n- iommu/amd: Simplify and Consolidate Virtual APIC (AVIC) Enablement (git-fixes).\n- iommu/arm-smmu-v3-sva: Fix mm use-after-free (git-fixes).\n- iommu/arm-smmu-v3: Fix size calculation in arm_smmu_mm_invalidate_range() (git-fixes).\n- iommu/arm-smmu: qcom_iommu: Add of_node_put() when breaking out of loop (git-fixes).\n- iommu/dart: Add missing module owner to ops structure (git-fixes).\n- iommu/dart: check return value after calling platform_get_resource() (git-fixes).\n- iommu/exynos: Handle failed IOMMU device registration properly (git-fixes).\n- iommu/iova: Improve 32-bit free space estimate (git-fixes).\n- iommu/ipmmu-vmsa: Check for error num after setting mask (git-fixes).\n- iommu/mediatek: Add list_del in mtk_iommu_remove (git-fixes).\n- iommu/mediatek: Add mutex for m4u_group and m4u_dom in data (git-fixes).\n- iommu/mediatek: Fix 2 HW sharing pgtable issue (git-fixes).\n- iommu/mediatek: Fix NULL pointer dereference when printing dev_name (git-fixes).\n- iommu/mediatek: Remove clk_disable in mtk_iommu_remove (git-fixes).\n- iommu/msm: Fix an incorrect NULL check on list iterator (git-fixes).\n- iommu/omap: Fix regression in probe for NULL pointer dereference (git-fixes).\n- iommu/tegra-smmu: Fix missing put_device() call in tegra_smmu_find (git-fixes).\n- iommu/vt-d: Acquiring lock in domain ID allocation helpers (bsc#1200301).\n- iommu/vt-d: Calculate mask for non-aligned flushes (git-fixes).\n- iommu/vt-d: Drop stop marker messages (git-fixes).\n- iommu/vt-d: Fix PCI bus rescan device hot add (git-fixes).\n- iommu/vt-d: Fix RID2PASID setup/teardown failure (git-fixes).\n- iommu/vt-d: Make DMAR_UNITS_SUPPORTED default 1024 (bsc#1200301).\n- iommu/vt-d: Refactor iommu information of each domain (bsc#1200301).\n- iommu/vt-d: Remove global g_iommus array (bsc#1200301).\n- iommu/vt-d: Remove intel_iommu::domains (bsc#1200301).\n- iommu/vt-d: Remove unnecessary check in intel_iommu_add() (bsc#1200301).\n- iommu/vt-d: Use IDA interface to manage iommu sequence id (bsc#1200301).\n- iommu/vt-d: avoid invalid memory access via node_online(NUMA_NO_NODE) (git-fixes).\n- iommu: Fix potential use-after-free during probe (git-fixes).\n- iov_iter: Fix iter_xarray_get_pages{,_alloc}() (git-fixes).\n- iov_iter: fix build issue due to possible type mis-match (git-fixes).\n- ipmi: fix initialization when workqueue allocation fails (git-fixes).\n- irqchip/sifive-plic: Add missing thead,c900-plic match string (git-fixes).\n- irqchip/tegra: Fix overflow implicit truncation warnings (git-fixes).\n- iwlwifi/fw: use struct_size over open coded arithmetic (bsc#1202131).\n- iwlwifi: ACPI: support revision 3 WGDS tables (bsc#1202131).\n- iwlwifi: Add support for getting rf id with blank otp (bsc#1202131).\n- iwlwifi: Add support for more BZ HWs (bsc#1202131).\n- iwlwifi: BZ Family BUS_MASTER_DISABLE_REQ code duplication (bsc#1202131).\n- iwlwifi: BZ Family SW reset support (bsc#1202131).\n- iwlwifi: Configure FW debug preset via module param (bsc#1202131).\n- iwlwifi: Fix FW name for gl (bsc#1202131).\n- iwlwifi: Fix missing error code in iwl_pci_probe() (bsc#1202131).\n- iwlwifi: Fix syntax errors in comments (bsc#1202131).\n- iwlwifi: Make use of the helper macro LIST_HEAD() (bsc#1202131).\n- iwlwifi: Read the correct addresses when getting the crf id (bsc#1202131).\n- iwlwifi: Start scratch debug register for Bz family (bsc#1202131).\n- iwlwifi: acpi: fix wgds rev 3 size (bsc#1202131).\n- iwlwifi: acpi: move ppag code from mvm to fw/acpi (bsc#1202131).\n- iwlwifi: add missing entries for Gf4 with So and SoF (bsc#1202131).\n- iwlwifi: add new Qu-Hr device (bsc#1202131).\n- iwlwifi: add new ax1650 killer device (bsc#1202131).\n- iwlwifi: add new device id 7F70 (bsc#1202131).\n- iwlwifi: add new pci SoF with JF (bsc#1202131).\n- iwlwifi: add some missing kernel-doc in struct iwl_fw (bsc#1202131).\n- iwlwifi: add support for BNJ HW (bsc#1202131).\n- iwlwifi: add support for BZ-U and BZ-L HW (bsc#1202131).\n- iwlwifi: add support for Bz-Z HW (bsc#1202131).\n- iwlwifi: add vendor specific capabilities for some RFs (bsc#1202131).\n- iwlwifi: advertise support for HE - DCM BPSK RX/TX (bsc#1202131).\n- iwlwifi: allow rate-limited error messages (bsc#1202131).\n- iwlwifi: api: fix struct iwl_wowlan_status_v7 kernel-doc (bsc#1202131).\n- iwlwifi: api: remove ttl field from TX command (bsc#1202131).\n- iwlwifi: api: remove unused RX status bits (bsc#1202131).\n- iwlwifi: avoid variable shadowing (bsc#1202131).\n- iwlwifi: avoid void pointer arithmetic (bsc#1202131).\n- iwlwifi: bump FW API to 67 for AX devices (bsc#1202131).\n- iwlwifi: bump FW API to 68 for AX devices (bsc#1202131).\n- iwlwifi: bump FW API to 69 for AX devices (bsc#1202131).\n- iwlwifi: bump FW API to 70 for AX devices (bsc#1202131).\n- iwlwifi: bump FW API to 71 for AX devices (bsc#1202131).\n- iwlwifi: bump FW API to 72 for AX devices (bsc#1202131).\n- iwlwifi: cfg: add support for 1K BA queue (bsc#1202131).\n- iwlwifi: dbg-tlv: clean up iwl_dbg_tlv_update_drams() (bsc#1202131).\n- iwlwifi: dbg: add infra for tracking free buffer size (bsc#1202131).\n- iwlwifi: dbg: check trigger data before access (bsc#1202131).\n- iwlwifi: dbg: disable ini debug in 8000 family and below (bsc#1202131).\n- iwlwifi: dbg: in sync mode do not call schedule (bsc#1202131).\n- iwlwifi: dbg: treat dbgc allocation failure when tlv is missing (bsc#1202131).\n- iwlwifi: dbg: treat non active regions as unsupported regions (bsc#1202131).\n- iwlwifi: dbg_ini: Split memcpy() to avoid multi-field write (bsc#1202131).\n- iwlwifi: de-const properly where needed (bsc#1202131).\n- iwlwifi: debugfs: remove useless double condition (bsc#1202131).\n- iwlwifi: do not dump_stack() when we get an unexpected interrupt (bsc#1202131).\n- iwlwifi: do not use __unused as variable name (bsc#1202131).\n- iwlwifi: drv: load tlv debug data earlier (bsc#1202131).\n- iwlwifi: dump CSR scratch from outer function (bsc#1202131).\n- iwlwifi: dump RCM error tables (bsc#1202131).\n- iwlwifi: dump both TCM error tables if present (bsc#1202131).\n- iwlwifi: dump host monitor data when NIC does not init (bsc#1202131).\n- iwlwifi: dvm: use struct_size over open coded arithmetic (bsc#1202131).\n- iwlwifi: eeprom: clean up macros (bsc#1202131).\n- iwlwifi: fix LED dependencies (bsc#1202131).\n- iwlwifi: fix debug TLV parsing (bsc#1202131).\n- iwlwifi: fix fw/img.c license statement (bsc#1202131).\n- iwlwifi: fix iwl_legacy_rate_to_fw_idx (bsc#1202131).\n- iwlwifi: fix small doc mistake for iwl_fw_ini_addr_val (bsc#1202131).\n- iwlwifi: fix various more -Wcast-qual warnings (bsc#1202131).\n- iwlwifi: fw dump: add infrastructure for dump scrubbing (bsc#1202131).\n- iwlwifi: fw: add support for splitting region type bits (bsc#1202131).\n- iwlwifi: fw: api: add link to PHY context command struct v1 (bsc#1202131).\n- iwlwifi: fw: correctly detect HW-SMEM region subtype (bsc#1202131).\n- iwlwifi: fw: fix some scan kernel-doc (bsc#1202131).\n- iwlwifi: fw: init SAR GEO table only if data is present (bsc#1202131).\n- iwlwifi: fw: make dump_start callback void (bsc#1202131).\n- iwlwifi: fw: remove dead error log code (bsc#1202131).\n- iwlwifi: implement reset flow for Bz devices (bsc#1202131).\n- iwlwifi: iwl-eeprom-parse: mostly dvm only (bsc#1202131).\n- iwlwifi: make iwl_fw_lookup_cmd_ver() take a cmd_id (bsc#1202131).\n- iwlwifi: make iwl_txq_dyn_alloc_dma() return the txq (bsc#1202131).\n- iwlwifi: make some functions friendly to sparse (bsc#1202131).\n- iwlwifi: move symbols into a separate namespace (bsc#1202131).\n- iwlwifi: mvm/api: define system control command (bsc#1202131).\n- iwlwifi: mvm: Add RTS and CTS flags to iwl_tx_cmd_flags (bsc#1202131).\n- iwlwifi: mvm: Add list of OEMs allowed to use TAS (bsc#1202131).\n- iwlwifi: mvm: Add support for a new version of scan request command (bsc#1202131).\n- iwlwifi: mvm: Add support for new rate_n_flags in tx_cmd (bsc#1202131).\n- iwlwifi: mvm: Consider P2P GO operation during scan (bsc#1202131).\n- iwlwifi: mvm: Disable WiFi bands selectively with BIOS (bsc#1202131).\n- iwlwifi: mvm: Do not fail if PPAG isn\u0027t supported (bsc#1202131).\n- iwlwifi: mvm: Fix wrong documentation for scan request command (bsc#1202131).\n- iwlwifi: mvm: Passively scan non PSC channels only when requested so (bsc#1202131).\n- iwlwifi: mvm: Read acpi dsm to get channel activation bitmap (bsc#1202131).\n- iwlwifi: mvm: Remove antenna c references (bsc#1202131).\n- iwlwifi: mvm: Support new TX_RSP and COMPRESSED_BA_RES versions (bsc#1202131).\n- iwlwifi: mvm: Support new rate_n_flags for REPLY_RX_MPDU_CMD and RX_NO_DATA_NOTIF (bsc#1202131).\n- iwlwifi: mvm: Support new version of BEACON_TEMPLATE_CMD (bsc#1202131).\n- iwlwifi: mvm: Support new version of ranging response notification (bsc#1202131).\n- iwlwifi: mvm: Support version 3 of tlc_update_notif (bsc#1202131).\n- iwlwifi: mvm: Unify the scan iteration functions (bsc#1202131).\n- iwlwifi: mvm: Use all Rx chains for roaming scan (bsc#1202131).\n- iwlwifi: mvm: add US/CA to TAS block list if OEM isn\u0027t allowed (bsc#1202131).\n- iwlwifi: mvm: add a flag to reduce power command (bsc#1202131).\n- iwlwifi: mvm: add additional info for boot info failures (bsc#1202131).\n- iwlwifi: mvm: add additional info for boot info failures (bsc#1202131).\n- iwlwifi: mvm: add dbg_time_point to debugfs (bsc#1202131).\n- iwlwifi: mvm: add definitions for new rate \u0026 flags (bsc#1202131).\n- iwlwifi: mvm: add lmac/umac PC info in case of error (bsc#1202131).\n- iwlwifi: mvm: add missing min_size to kernel-doc (bsc#1202131).\n- iwlwifi: mvm: add some missing command strings (bsc#1202131).\n- iwlwifi: mvm: add support for 160Mhz in ranging measurements (bsc#1202131).\n- iwlwifi: mvm: add support for CT-KILL notification version 2 (bsc#1202131).\n- iwlwifi: mvm: add support for IMR based on platform (bsc#1202131).\n- iwlwifi: mvm: add support for OCE scan (bsc#1202131).\n- iwlwifi: mvm: add support for PHY context command v4 (bsc#1202131).\n- iwlwifi: mvm: add support for statistics update version 15 (bsc#1202131).\n- iwlwifi: mvm: allow enabling UHB TAS in the USA via ACPI setting (bsc#1202131).\n- iwlwifi: mvm: always remove the session protection after association (bsc#1202131).\n- iwlwifi: mvm: always store the PPAG table as the latest version (bsc#1202131).\n- iwlwifi: mvm: always use 4K RB size by default (bsc#1202131).\n- iwlwifi: mvm: change old-SN drop threshold (bsc#1202131).\n- iwlwifi: mvm: clean up indenting in iwl_mvm_tlc_update_notif() (bsc#1202131).\n- iwlwifi: mvm: convert old rate \u0026 flags to the new format (bsc#1202131).\n- iwlwifi: mvm: correct sta-state logic for TDLS (bsc#1202131).\n- iwlwifi: mvm: correctly set channel flags (bsc#1202131).\n- iwlwifi: mvm: correctly set schedule scan profiles (bsc#1202131).\n- iwlwifi: mvm: d3: move GTK rekeys condition (bsc#1202131).\n- iwlwifi: mvm: d3: support v12 wowlan status (bsc#1202131).\n- iwlwifi: mvm: d3: use internal data representation (bsc#1202131).\n- iwlwifi: mvm: demote non-compliant kernel-doc header (bsc#1202131).\n- iwlwifi: mvm: do not get address of mvm-\u003efwrt just to dereference as a pointer (bsc#1202131).\n- iwlwifi: mvm: do not send BAID removal to the FW during hw_restart (bsc#1202131).\n- iwlwifi: mvm: do not trust hardware queue number (bsc#1202131).\n- iwlwifi: mvm: drop too short packets silently (bsc#1202131).\n- iwlwifi: mvm: extend session protection on association (bsc#1202131).\n- iwlwifi: mvm: fix WGDS table print in iwl_mvm_chub_update_mcc() (bsc#1202131).\n- iwlwifi: mvm: fix a stray tab (bsc#1202131).\n- iwlwifi: mvm: fix condition which checks the version of rate_n_flags (bsc#1202131).\n- iwlwifi: mvm: fix delBA vs. NSSN queue sync race (bsc#1202131).\n- iwlwifi: mvm: fix ieee80211_get_he_iftype_cap() iftype (bsc#1202131).\n- iwlwifi: mvm: fix off by one in iwl_mvm_stat_iterator_all_macs() (bsc#1202131).\n- iwlwifi: mvm: fw: clean up hcmd struct creation (bsc#1202131).\n- iwlwifi: mvm: handle RX checksum on Bz devices (bsc#1202131).\n- iwlwifi: mvm: improve log when processing CSA (bsc#1202131).\n- iwlwifi: mvm: isolate offload assist (checksum) calculation (bsc#1202131).\n- iwlwifi: mvm: make iwl_mvm_reconfig_scd() static (bsc#1202131).\n- iwlwifi: mvm: offload channel switch timing to FW (bsc#1202131).\n- iwlwifi: mvm: only enable HE DCM if we also support TX (bsc#1202131).\n- iwlwifi: mvm: optionally suppress assert log (bsc#1202131).\n- iwlwifi: mvm: parse firmware alive message version 6 (bsc#1202131).\n- iwlwifi: mvm: read 6E enablement flags from DSM and pass to FW (bsc#1202131).\n- iwlwifi: mvm: reduce WARN_ON() in TX status path (bsc#1202131).\n- iwlwifi: mvm: refactor iwl_mvm_sta_rx_agg() (bsc#1202131).\n- iwlwifi: mvm: refactor setting PPE thresholds in STA_HE_CTXT_CMD (bsc#1202131).\n- iwlwifi: mvm: remove card state notification code (bsc#1202131).\n- iwlwifi: mvm: remove cipher scheme support (bsc#1202131).\n- iwlwifi: mvm: remove csi from iwl_mvm_pass_packet_to_mac80211() (bsc#1202131).\n- iwlwifi: mvm: remove iwl_mvm_disable_txq() flags argument (bsc#1202131).\n- iwlwifi: mvm: remove session protection after auth/assoc (bsc#1202131).\n- iwlwifi: mvm: remove session protection on disassoc (bsc#1202131).\n- iwlwifi: mvm: remove session protection upon station removal (bsc#1202131).\n- iwlwifi: mvm: rfi: handle deactivation notification (bsc#1202131).\n- iwlwifi: mvm: rfi: update rfi table (bsc#1202131).\n- iwlwifi: mvm: rfi: use kmemdup() to replace kzalloc + memcpy (bsc#1202131).\n- iwlwifi: mvm: scrub key material in firmware dumps (bsc#1202131).\n- iwlwifi: mvm: set BT-coex high priority for 802.1X/4-way-HS (bsc#1202131).\n- iwlwifi: mvm: set inactivity timeouts also for PS-poll (bsc#1202131).\n- iwlwifi: mvm: starting from 22000 we have 32 Rx AMPDU sessions (bsc#1202131).\n- iwlwifi: mvm: support Bz TX checksum offload (bsc#1202131).\n- iwlwifi: mvm: support RLC configuration command (bsc#1202131).\n- iwlwifi: mvm: support new BAID allocation command (bsc#1202131).\n- iwlwifi: mvm: support revision 1 of WTAS table (bsc#1202131).\n- iwlwifi: mvm: support v3 of station HE context command (bsc#1202131).\n- iwlwifi: mvm: update BAID allocation command again (bsc#1202131).\n- iwlwifi: mvm: update RFI TLV (bsc#1202131).\n- iwlwifi: mvm: update definitions due to new rate \u0026 flags (bsc#1202131).\n- iwlwifi: mvm: update rate scale in moving back to assoc state (bsc#1202131).\n- iwlwifi: mvm: use a define for checksum flags mask (bsc#1202131).\n- iwlwifi: mvm: use debug print instead of WARN_ON() (bsc#1202131).\n- iwlwifi: nvm: Correct HE capability (bsc#1202131).\n- iwlwifi: parse debug exclude data from firmware file (bsc#1202131).\n- iwlwifi: parse error tables from debug TLVs (bsc#1202131).\n- iwlwifi: pcie: Adapt rx queue write pointer for Bz family (bsc#1202131).\n- iwlwifi: pcie: add jacket bit to device configuration parsing (bsc#1202131).\n- iwlwifi: pcie: add support for MS devices (bsc#1202131).\n- iwlwifi: pcie: adjust to Bz completion descriptor (bsc#1202131).\n- iwlwifi: pcie: fix SW error MSI-X mapping (bsc#1202131).\n- iwlwifi: pcie: fix constant-conversion warning (bsc#1202131).\n- iwlwifi: pcie: fix killer name matching for AX200 (bsc#1202131).\n- iwlwifi: pcie: iwlwifi: fix device id 7F70 struct (bsc#1202131).\n- iwlwifi: pcie: make sure iwl_rx_packet_payload_len() will not underflow (bsc#1202131).\n- iwlwifi: pcie: refactor dev_info lookup (bsc#1202131).\n- iwlwifi: pcie: remove duplicate entry (bsc#1202131).\n- iwlwifi: pcie: remove two duplicate PNJ device entries (bsc#1202131).\n- iwlwifi: pcie: retake ownership after reset (bsc#1202131).\n- iwlwifi: pcie: simplify iwl_pci_find_dev_info() (bsc#1202131).\n- iwlwifi: pcie: support Bz suspend/resume trigger (bsc#1202131).\n- iwlwifi: pcie: try to grab NIC access early (bsc#1202131).\n- iwlwifi: pcie: update sw error interrupt for BZ family (bsc#1202131).\n- iwlwifi: pnvm: print out the version properly (bsc#1202131).\n- iwlwifi: prefer WIDE_ID() over iwl_cmd_id() (bsc#1202131).\n- iwlwifi: propagate (const) type qualifier (bsc#1202131).\n- iwlwifi: recognize missing PNVM data and then log filename (bsc#1202131).\n- iwlwifi: remove MODULE_AUTHOR() statements (bsc#1202131).\n- iwlwifi: remove command ID argument from queue allocation (bsc#1202131).\n- iwlwifi: remove contact information (bsc#1202131).\n- iwlwifi: remove deprecated broadcast filtering feature (bsc#1202131).\n- iwlwifi: remove redundant iwl_finish_nic_init() argument (bsc#1202131).\n- iwlwifi: remove unused DC2DC_CONFIG_CMD definitions (bsc#1202131).\n- iwlwifi: remove unused iwlax210_2ax_cfg_so_hr_a0 structure (bsc#1202131).\n- iwlwifi: remove unused macros (bsc#1202131).\n- iwlwifi: rename CHANNEL_SWITCH_NOA_NOTIF to CHANNEL_SWITCH_START_NOTIF (bsc#1202131).\n- iwlwifi: rename GEO_TX_POWER_LIMIT to PER_CHAIN_LIMIT_OFFSET_CMD (bsc#1202131).\n- iwlwifi: rs: add support for TLC config command ver 4 (bsc#1202131).\n- iwlwifi: scan: Modify return value of a function (bsc#1202131).\n- iwlwifi: support 4-bits in MAC step value (bsc#1202131).\n- iwlwifi: support SAR GEO Offset Mapping override via BIOS (bsc#1202131).\n- iwlwifi: support new queue allocation command (bsc#1202131).\n- iwlwifi: swap 1650i and 1650s killer struct names (bsc#1202131).\n- iwlwifi: tlc: Add logs in rs_fw_rate_init func to print TLC configuration (bsc#1202131).\n- iwlwifi: use 4k queue size for Bz A-step (bsc#1202131).\n- iwlwifi: yoyo: Avoid using dram data if allocation failed (bsc#1202131).\n- iwlwifi: yoyo: add IMR DRAM dump support (bsc#1202131).\n- iwlwifi: yoyo: disable IMR DRAM region if IMR is disabled (bsc#1202131).\n- iwlwifi: yoyo: dump IMR DRAM only for HW and FW error (bsc#1202131).\n- iwlwifi: yoyo: fix DBGC allocation flow (bsc#1202131).\n- iwlwifi: yoyo: fix DBGI_SRAM ini dump header (bsc#1202131).\n- iwlwifi: yoyo: fix issue with new DBGI_SRAM region read (bsc#1202131).\n- iwlwifi: yoyo: fw debug config from context info and preset (bsc#1202131).\n- iwlwifi: yoyo: send hcmd to fw after dump collection completes (bsc#1202131).\n- iwlwifi: yoyo: support TLV-based firmware reset (bsc#1202131).\n- iwlwifi: yoyo: support dump policy for the dump size (bsc#1202131).\n- iwlwifi: yoyo: support for DBGC4 for dram (bsc#1202131).\n- iwlwifi: yoyo: support for ROM usniffer (bsc#1202131).\n- jbd2: export jbd2_journal_[grab|put]_journal_head (bsc#1202775).\n- jbd2: fix assertion \u0027jh-\u003eb_frozen_data == NULL\u0027 failure when journal aborted (bsc#1202716).\n- jbd2: fix outstanding credits assert in jbd2_journal_commit_transaction() (bsc#1202715).\n- kABI: scsi: libiscsi: fix removal of iscsi_create_conn (bsc#1198410).\n- kabi/severities: Exclude ppc kvm\n- kabi/severities: add Qlogic qed symbols\n- kabi/severities: add drivers/scsi/hisi_sas for bsc#1202471\n- kabi/severities: add hisilicon hns3 symbols\n- kabi/severities: add microchip dsa drivers\n- kabi/severities: ignore kABI changes in mwifiex drivers Those symbols are used only locally in mwifiex (sub-)modules.\n- kabi/severities: octeontx2 driver (jsc#SLE-24682)\n- kbuild: dummy-tools: avoid tmpdir leak in dummy gcc (git-fixes).\n- kbuild: fix the modules order between drivers and libs (git-fixes).\n- kbuild: link vmlinux only once for CONFIG_TRIM_UNUSED_KSYMS (2nd attempt) (git-fixes).\n- kcm: fix strp_init() order and cleanup (git-fies).\n- kernel-binary: move @NOSOURCE@ to @SOURCES@ as in other packages\n- kfifo: fix kfifo_to_user() return type (git-fixes).\n- kselftest/cgroup: fix test_stress.sh to use OUTPUT dir (git-fixes).\n- kselftest/vm: fix tests build with old libc (git-fixes).\n- kselftest: Fix vdso_test_abi return status (git-fixes).\n- kselftest: signal all child processes (git-fixes).\n- kvm: selftests: do not use bitfields larger than 32-bits for PTEs (git-fixes).\n- l3mdev: l3mdev_master_upper_ifindex_by_index_rcu should be using netdev_master_upper_dev_get_rcu (git-fixes).\n- landlock: Add clang-format exceptions (git-fixes).\n- landlock: Change landlock_add_rule(2) argument check ordering (git-fixes).\n- landlock: Change landlock_restrict_self(2) check ordering (git-fixes).\n- landlock: Create find_rule() from unmask_layers() (git-fixes).\n- landlock: Define access_mask_t to enforce a consistent access mask size (git-fixes).\n- landlock: Fix landlock_add_rule(2) documentation (git-fixes).\n- landlock: Fix same-layer rule unions (git-fixes).\n- landlock: Format with clang-format (git-fixes).\n- landlock: Reduce the maximum number of layers to 16 (git-fixes).\n- landlock: Use square brackets around \u0027landlock-ruleset\u0027 (git-fixes).\n- lib/list_debug.c: Detect uninitialized lists (git-fixes).\n- lib/raid6/test: fix multiple definition linking error (git-fixes).\n- lib/smp_processor_id: fix imbalanced instrumentation_end() call (git-fixes).\n- lkdtm: Disable return thunks in rodata.c (bsc#1190497).\n- lockdep: Correct lock_classes index mapping (git-fixes).\n- locking/lockdep: Avoid potential access of invalid memory in lock_class (git-fixes).\n- locking/lockdep: Fix lockdep_init_map_*() confusion (git-fixes).\n- locking/lockdep: Iterate lock_classes directly when reading lockdep files (git-fixes).\n- loop: Check for overflow while configuring loop (git-fies).\n- loop: Use pr_warn_once() for loop_control_remove() warning (git-fixes).\n- loop: use sysfs_emit() in the sysfs xxx show() (git-fixes).\n- mac80211: fix a memory leak where sta_info is not freed (git-fixes).\n- mac80211: introduce channel switch disconnect function (bsc#1202131).\n- macsec: always read MACSEC_SA_ATTR_PN as a u64 (git-fixes).\n- macsec: fix NULL deref in macsec_add_rxsa (git-fixes).\n- macsec: fix error message in macsec_add_rxsa and _txsa (git-fixes).\n- macsec: limit replay window size with XPN (git-fixes).\n- marvell: octeontx2: build error: unknown type name \u0027u64\u0027 (jsc#SLE-24682).\n- mbcache: add functions to delete entry if unused (bsc#1198971).\n- mbcache: do not reclaim used entries (bsc#1198971).\n- md/bitmap: do not set sb values if can\u0027t pass sanity check (bsc#1197158).\n- md/raid0: Ignore RAID0 layout if the second zone has only one device (git-fixes).\n- md/raid1: fix missing bitmap update w/o WriteMostly devices (bsc#1203036).\n- media: [PATCH] pci: atomisp_cmd: fix three missing checks on list iterator (git-fixes).\n- media: atmel: atmel-sama7g5-isc: fix warning in configs without OF (git-fixes).\n- media: cedrus: h265: Fix flag name (git-fixes).\n- media: cedrus: hevc: Add check for invalid timestamp (git-fixes).\n- media: driver/nxp/imx-jpeg: fix a unexpected return value problem (git-fixes).\n- media: hantro: postproc: Fix motion vector space size (git-fixes).\n- media: hdpvr: fix error value returns in hdpvr_read (git-fixes).\n- media: hevc: Embedded indexes in RPS (git-fixes).\n- media: imx-jpeg: Add pm-runtime support for imx-jpeg (git-fixes).\n- media: imx-jpeg: use NV12M to represent non contiguous NV12 (git-fixes).\n- media: pvrusb2: fix memory leak in pvr_probe (git-fixes).\n- media: tw686x: Fix memory leak in tw686x_video_init (git-fixes).\n- media: tw686x: Register the irq at the end of probe (git-fixes).\n- media: v4l2-mem2mem: prevent pollerr when last_buffer_dequeued is set (git-fixes).\n- mediatek: mt76: eeprom: fix missing of_node_put() in mt76_find_power_limits_node() (git-fixes).\n- mediatek: mt76: mac80211: Fix missing of_node_put() in mt76_led_init() (git-fixes).\n- memstick/ms_block: Fix a memory leak (git-fixes).\n- memstick/ms_block: Fix some incorrect memory allocation (git-fixes).\n- meson-mx-socinfo: Fix refcount leak in meson_mx_socinfo_init (git-fixes).\n- mfd: max77620: Fix refcount leak in max77620_initialise_fps (git-fixes).\n- mfd: t7l66xb: Drop platform disable callback (git-fixes).\n- minix: fix bug when opening a file with O_DIRECT (git-fixes).\n- misc: fastrpc: fix memory corruption on open (git-fixes).\n- misc: fastrpc: fix memory corruption on probe (git-fixes).\n- misc: rtsx: Fix an error handling path in rtsx_pci_probe() (git-fixes).\n- mkspec: eliminate @NOSOURCE@ macro This should be alsways used with @SOURCES@, just include the content there.\n- mm/rmap: Fix anon_vma-\u003edegree ambiguity leading to double-reuse (git-fixes).\n- mm: bdi: initialize bdi_min_ratio when bdi is unregistered (bsc#1197763).\n- mm: memcontrol: fix potential oom_lock recursion deadlock (bsc#1202447).\n- mm: pagewalk: Fix race between unmap and page walker (git-fixes, bsc#1203159).\n- mmc: block: Add single read for 4k sector cards (git-fixes).\n- mmc: cavium-octeon: Add of_node_put() when breaking out of loop (git-fixes).\n- mmc: cavium-thunderx: Add of_node_put() when breaking out of loop (git-fixes).\n- mmc: core: Fix UHS-I SD 1.8V workaround branch (git-fixes).\n- mmc: meson-gx: Fix an error handling path in meson_mmc_probe() (git-fixes).\n- mmc: mxcmmc: Silence a clang warning (git-fixes).\n- mmc: pxamci: Fix an error handling path in pxamci_probe() (git-fixes).\n- mmc: pxamci: Fix another error handling path in pxamci_probe() (git-fixes).\n- mmc: renesas_sdhi: Get the reset handle early in the probe (git-fixes).\n- mmc: sdhci-of-at91: fix set_uhs_signaling rewriting of MC1R (git-fixes).\n- mmc: sdhci-of-esdhc: Fix refcount leak in esdhc_signal_voltage_switch (git-fixes).\n- mmc: tmio: avoid glitches when resetting (git-fixes).\n- msft-hv-2570-hv_netvsc: Add support for XDP_REDIRECT (bsc#1199364).\n- mt76: mt7615: do not update pm stats in case of error (git-fixes).\n- mt76: mt76x02u: fix possible memory leak in __mt76x02u_mcu_send_msg (git-fixes).\n- mt76: mt7921: enlarge maximum VHT MPDU length to 11454 (git-fixes).\n- mt76: mt7921: fix aggregation subframes setting to HE max (git-fixes).\n- mtd: dataflash: Add SPI ID table (git-fixes).\n- mtd: maps: Fix refcount leak in ap_flash_init (git-fixes).\n- mtd: maps: Fix refcount leak in of_flash_probe_versatile (git-fixes).\n- mtd: parsers: ofpart: Fix refcount leak in bcm4908_partitions_fw_offset (git-fixes).\n- mtd: partitions: Fix refcount leak in parse_redboot_of (git-fixes).\n- mtd: rawnand: arasan: Fix clock rate in NV-DDR (git-fixes).\n- mtd: rawnand: arasan: Update NAND bus clock instead of system clock (git-fixes).\n- mtd: rawnand: gpmi: Set WAIT_FOR_READY timeout based on program/erase times (git-fixes).\n- mtd: rawnand: gpmi: validate controller clock rate (git-fixes).\n- mtd: rawnand: meson: Fix a potential double free issue (git-fixes).\n- mtd: sm_ftl: Fix deadlock caused by cancel_work_sync in sm_release (git-fixes).\n- mtd: spi-nor: fix spi_nor_spimem_setup_op() call in spi_nor_erase_{sector,chip}() (git-fixes).\n- mtd: st_spi_fsm: Add a clk_disable_unprepare() in .probe()\u0027s error path (git-fixes).\n- musb: fix USB_MUSB_TUSB6010 dependency (git-fixes).\n- mwifiex: Ignore BTCOEX events from the 88W8897 firmware (git-fixes).\n- n_gsm: remove unused parameters from gsm_error() (git-fixes).\n- net: asix: fix \u0027can\u0027t send until first packet is send\u0027 issue (git-fixes).\n- net: bcmgenet: Use stronger register read/writes to assure ordering (git-fixes).\n- net: dsa: b53: Add SPI ID table (git-fixes).\n- net: dsa: felix: Fix memory leak in felix_setup_mmio_filtering (git-fixes).\n- net: dsa: felix: purge skb from TX timestamping queue if it cannot be sent (git-fies).\n- net: dsa: hellcreek: Add STP forwarding rule (git-fixes).\n- net: dsa: hellcreek: Add missing PTP via UDP rules (git-fixes).\n- net: dsa: hellcreek: Allow PTP P2P measurements on blocked ports (git-fixes).\n- net: dsa: hellcreek: Fix insertion of static FDB entries (git-fixes).\n- net: dsa: microchip: implement multi-bridge support (git-fixes).\n- net: dsa: mv88e6xxx: Add fix for erratum 5.2 of 88E6393X family (git-fixes).\n- net: dsa: mv88e6xxx: Drop unnecessary check in mv88e6393x_serdes_erratum_4_6() (git-fixes).\n- net: dsa: mv88e6xxx: Enable port policy support on 6097 (git-fixes).\n- net: dsa: mv88e6xxx: Fix application of erratum 4.8 for 88E6393X (git-fixes).\n- net: dsa: mv88e6xxx: Fix inband AN for 2500base-x on 88E6393X family (git-fixes).\n- net: dsa: mv88e6xxx: Link in pcs_get_state() if AN is bypassed (git-fixes).\n- net: dsa: mv88e6xxx: Save power by disabling SerDes trasmitter and receiver (git-fixes).\n- net: dsa: mv88e6xxx: Unforce speed \u0026 duplex in mac_link_down() (git-fixes).\n- net: dsa: mv88e6xxx: allow use of PHYs on CPU and DSA ports (git-fixes).\n- net: dsa: mv88e6xxx: error handling for serdes_power functions (git-fixes).\n- net: dsa: mv88e6xxx: fix \u0027do not use PHY_DETECT on internal PHY\u0027s\u0027 (git-fixes).\n- net: dsa: ocelot: seville: utilize of_mdiobus_register (git-fixes).\n- net: dsa: qca8k: fix MTU calculation (git-fixes).\n- net: dsa: seville: register the mdiobus under devres (git-fixes).\n- net: dsa: tag_ocelot_8021q: break circular dependency with ocelot switch lib (git-fies).\n- net: enetc: report software timestamping via SO_TIMESTAMPING (git-fixes).\n- net: hns3: clean residual vf config after disable sriov (git-fixes).\n- net: macsec: fix potential resource leak in macsec_add_rxsa() and macsec_add_txsa() (git-fixes).\n- net: marvell: prestera: fix incorrect structure access (git-fixes).\n- net: mscc: ocelot: correctly report the timestamping RX filters in ethtool (git-fixes).\n- net: mscc: ocelot: create a function that replaces an existing VCAP filter (git-fixes).\n- net: mscc: ocelot: do not dereference NULL pointers with shared tc filters (git-fixes).\n- net: mscc: ocelot: do not downgrade timestamping RX filters in SIOCSHWTSTAMP (git-fixes).\n- net: mscc: ocelot: fix incorrect balancing with down LAG ports (git-fixes).\n- net: mscc: ocelot: set up traps for PTP packets (git-fixes).\n- net: openvswitch: do not send internal clone attribute to the userspace (git-fixes).\n- net: openvswitch: fix leak of nested actions (git-fixes).\n- net: openvswitch: fix misuse of the cached connection on tuple changes (git-fixes).\n- net: openvswitch: fix parsing of nw_proto for IPv6 fragments (git-fixes).\n- net: phy: Do not WARN for PHY_READY state in mdio_bus_phy_resume() (git-fixes).\n- net: phy: Warn about incorrect mdio_bus_phy_resume() state (git-fixes).\n- net: phy: smsc: Disable Energy Detect Power-Down in interrupt mode (git-fixes).\n- net: ptp: add a definition for the UDP port for IEEE 1588 general messages (git-fixes).\n- net: rose: fix netdev reference changes (git-fixes).\n- net: sock: tracing: Fix sock_exceed_buf_limit not to dereference stale pointer (git-fixes).\n- net: stmmac: clean up impossible condition (git-fixes).\n- net: stmmac: disable Split Header (SPH) for Intel platforms (bsc#1194904).\n- net: stmmac: dwc-qos: Disable split header for Tegra194 (bsc#1194904).\n- net: stmmac: fix off-by-one error in sanity check (git-fixes).\n- net: usb: Correct PHY handling of smsc95xx (git-fixes).\n- net: usb: Correct reset handling of smsc95xx (git-fixes).\n- net: usb: ax88179_178a needs FLAG_SEND_ZLP (git-fixes).\n- net: usb: ax88179_178a: add Allied Telesis AT-UMCs (git-fixes).\n- net: usb: make USB_RTL8153_ECM non user configurable (git-fixes).\n- net: vmxnet3: fix possible NULL pointer dereference in vmxnet3_rq_cleanup() (bsc#1200431).\n- net: vmxnet3: fix possible use-after-free bugs in vmxnet3_rq_alloc_rx_buf() (bsc#1200431).\n- net: vmxnet3: remove multiple false checks in vmxnet3_ethtool.c (bsc#1200431).\n- net:enetc: allocate CBD ring data memory using DMA coherent methods (git-fixes).\n- net_sched: cls_route: disallow handle of 0 (bsc#1202393).\n- nfc: pn533: Fix use-after-free bugs caused by pn532_cmd_timeout (git-fixes).\n- nfsd: fix use-after-free due to delegation race (git-fixes).\n- nilfs2: fix incorrect masking of permission flags for symlinks (git-fixes).\n- nilfs2: fix lockdep warnings during disk space reclamation (git-fixes).\n- nilfs2: fix lockdep warnings in page operations for btree nodes (git-fixes).\n- nohz/full, sched/rt: Fix missed tick-reenabling bug in dequeue_task_rt() (bnc#1189999 (Scheduler functional and performance backports)).\n- nouveau/svm: Fix to migrate all requested pages (git-fixes).\n- nouveau: explicitly wait on the fence in nouveau_bo_move_m2mf (git-fies).\n- ntb_hw_amd: Add NTB PCI ID for new gen CPU (bsc#1202113).\n- nvme-auth: align to pre-upstream FFDHE implementation (bsc#1202265).\n- nvme-auth: retry command if DNR bit is not set (bsc#1201675).\n- nvme-fabrics: parse nvme connect Linux error codes (bsc#1201865).\n- nvme-rdma: Handle number of queue changes (bsc#1201865).\n- nvme-tcp: Handle number of queue changes (bsc#1201865).\n- nvme-tcp: fix UAF when detecting digest errors (bsc#1200313 bsc#1201489).\n- nvme: consider also host_iface when checking ip options (bsc#1199670).\n- nvme: fix RCU hole that allowed for endless looping in multipath round robin (bsc#1202636).\n- nvme: implement In-Band authentication (jsc#SLE-20183).\n- nvme: kabi fixes for in-band authentication (bsc#1199086).\n- nvmet-auth: expire authentication sessions (jsc#SLE-20183).\n- nvmet: Expose max queues to configfs (bsc#1201865).\n- nvmet: implement basic In-Band Authentication (jsc#SLE-20183).\n- ocfs2: dlmfs: fix error handling of user_dlm_destroy_lock (bsc#1202778).\n- ocfs2: fix a deadlock when commit trans (bsc#1202776).\n- octeontx2-af: Add KPU changes to parse NGIO as separate layer (jsc#SLE-24682).\n- octeontx2-af: Add PTP device id for CN10K and 95O silcons (jsc#SLE-24682).\n- octeontx2-af: Add SDP interface support (jsc#SLE-24682).\n- octeontx2-af: Add debug messages for failures (jsc#SLE-24682).\n- octeontx2-af: Add external ptp input clock (jsc#SLE-24682).\n- octeontx2-af: Add free rsrc count mbox msg (jsc#SLE-24682).\n- octeontx2-af: Add mbox to retrieve bandwidth profile free count (jsc#SLE-24682).\n- octeontx2-af: Add support to flush full CPT CTX cache (jsc#SLE-24682).\n- octeontx2-af: Adjust LA pointer for cpt parse header (jsc#SLE-24682).\n- octeontx2-af: Allocate low priority entries for PF (jsc#SLE-24682).\n- octeontx2-af: Allow to configure flow tag LSB byte as RSS adder (jsc#SLE-24682).\n- octeontx2-af: Change the order of queue work and interrupt disable (jsc#SLE-24682).\n- octeontx2-af: Do not enable Pause frames by default (jsc#SLE-24682).\n- octeontx2-af: Enable CPT HW interrupts (jsc#SLE-24682).\n- octeontx2-af: Enhance mailbox trace entry (jsc#SLE-24682).\n- octeontx2-af: Fix LBK backpressure id count (jsc#SLE-24682).\n- octeontx2-af: Fix inconsistent license text (jsc#SLE-24682).\n- octeontx2-af: Fix interrupt name strings (jsc#SLE-24682).\n- octeontx2-af: Fix spelling mistake \u0027Makesure\u0027 -\u003e \u0027Make sure\u0027 (jsc#SLE-24682).\n- octeontx2-af: Fix uninitialized variable val (jsc#SLE-24682).\n- octeontx2-af: Flow control resource management (jsc#SLE-24682).\n- octeontx2-af: Handle return value in block reset (jsc#SLE-24682).\n- octeontx2-af: Hardware configuration for inline IPsec (jsc#SLE-24682).\n- octeontx2-af: Increase link credit restore polling timeout (jsc#SLE-24682).\n- octeontx2-af: Increase number of reserved entries in KPU (jsc#SLE-24682).\n- octeontx2-af: Increment ptp refcount before use (jsc#SLE-24682).\n- octeontx2-af: Limit KPU parsing for GTPU packets (jsc#SLE-24682).\n- octeontx2-af: Modify install flow error codes (jsc#SLE-24682).\n- octeontx2-af: Optimize KPU1 processing for variable-length headers (jsc#SLE-24682).\n- octeontx2-af: Perform cpt lf teardown in non FLR path (jsc#SLE-24682).\n- octeontx2-af: Priority flow control configuration support (jsc#SLE-24682).\n- octeontx2-af: Remove channel verification while installing MCAM rules (jsc#SLE-24682).\n- octeontx2-af: Remove redundant initialization of variable blkaddr (jsc#SLE-24682).\n- octeontx2-af: Remove redundant initialization of variable pin (jsc#SLE-24682).\n- octeontx2-af: Reset PTP config in FLR handler (jsc#SLE-24682).\n- octeontx2-af: Retry until RVU block reset complete (jsc#SLE-24682).\n- octeontx2-af: Use DMA_ATTR_FORCE_CONTIGUOUS attribute in DMA alloc (jsc#SLE-24682).\n- octeontx2-af: Use NDC TX for transmit packet data (jsc#SLE-24682).\n- octeontx2-af: Use ptp input clock info from firmware data (jsc#SLE-24682).\n- octeontx2-af: Wait for TX link idle for credits change (jsc#SLE-24682).\n- octeontx2-af: add proper return codes for AF mailbox handlers (jsc#SLE-24682).\n- octeontx2-af: cn10K: Get NPC counters value (jsc#SLE-24682).\n- octeontx2-af: cn10K: support for sched lmtst and other features (jsc#SLE-24682).\n- octeontx2-af: cn10k: DWRR MTU configuration (jsc#SLE-24682).\n- octeontx2-af: cn10k: RPM hardware timestamp configuration (jsc#SLE-24682).\n- octeontx2-af: cn10k: Set cache lines for NPA batch alloc (jsc#SLE-24682).\n- octeontx2-af: cn10k: Use appropriate register for LMAC enable (jsc#SLE-24682).\n- octeontx2-af: cn10k: add workaround for ptp errata (jsc#SLE-24682).\n- octeontx2-af: cn10k: debugfs for dumping LMTST map table (jsc#SLE-24682).\n- octeontx2-af: configure npc for cn10k to allow packets from cpt (jsc#SLE-24682).\n- octeontx2-af: debugfs: Add channel and channel mask (jsc#SLE-24682).\n- octeontx2-af: debugfs: Minor changes (jsc#SLE-24682).\n- octeontx2-af: debugfs: do not corrupt user memory (jsc#SLE-24682).\n- octeontx2-af: debugfs: fix error return of allocations (jsc#SLE-24682).\n- octeontx2-af: enable tx shaping feature for 96xx C0 (jsc#SLE-24682).\n- octeontx2-af: fix array bound error (jsc#SLE-24682).\n- octeontx2-af: fix error code in is_valid_offset() (jsc#SLE-24682).\n- octeontx2-af: initialize action variable (jsc#SLE-24682).\n- octeontx2-af: nix and lbk in loop mode in 98xx (jsc#SLE-24682).\n- octeontx2-af: remove redudant second error check on variable err (jsc#SLE-24682).\n- octeontx2-af: use swap() to make code cleaner (jsc#SLE-24682).\n- octeontx2-af: verify CQ context updates (jsc#SLE-24682).\n- octeontx2-nic: fix mixed module build (jsc#SLE-24682).\n- octeontx2-nicvf: Add PTP hardware clock support to NIX VF (jsc#SLE-24682).\n- octeontx2-nicvf: Free VF PTP resources (jsc#SLE-24682).\n- octeontx2-pf: Add TC feature for VFs (jsc#SLE-24682).\n- octeontx2-pf: Add XDP support to netdev PF (jsc#SLE-24682).\n- octeontx2-pf: Add check for non zero mcam flows (jsc#SLE-24682).\n- octeontx2-pf: Add support for adaptive interrupt coalescing (jsc#SLE-24682).\n- octeontx2-pf: Add vlan-etype to ntuple filters (jsc#SLE-24682).\n- octeontx2-pf: Allow VLAN priority also in ntuple filters (jsc#SLE-24682).\n- octeontx2-pf: CN10K: Hide RPM stats over ethtool (jsc#SLE-24682).\n- octeontx2-pf: Do not mask out supported link modes (jsc#SLE-24682).\n- octeontx2-pf: Enable NETIF_F_RXALL support for VF driver (jsc#SLE-24682).\n- octeontx2-pf: Fix inconsistent license text (jsc#SLE-24682).\n- octeontx2-pf: Ntuple filters support for VF netdev (jsc#SLE-24682).\n- octeontx2-pf: PFC config support with DCBx (jsc#SLE-24682).\n- octeontx2-pf: Remove unnecessary synchronize_irq() before free_irq() (jsc#SLE-24682).\n- octeontx2-pf: Simplify the receive buffer size calculation (jsc#SLE-24682).\n- octeontx2-pf: Sort the allocated MCAM entry indices (jsc#SLE-24682).\n- octeontx2-pf: Unify flow management variables (jsc#SLE-24682).\n- octeontx2-pf: Use hardware register for CQE count (jsc#SLE-24682).\n- octeontx2-pf: cn10K: Reserve LMTST lines per core (jsc#SLE-24682).\n- octeontx2-pf: cn10k: Config DWRR weight based on MTU (jsc#SLE-24682).\n- octeontx2-pf: cn10k: Ensure valid pointers are freed to aura (jsc#SLE-24682).\n- octeontx2-pf: cn10k: add support for new ptp timestamp format (jsc#SLE-24682).\n- octeontx2-pf: devlink params support to set mcam entry count (jsc#SLE-24682).\n- octeontx2-pf: replace bitmap_weight with bitmap_empty where appropriate (jsc#SLE-24682).\n- octeontx2-pf: select CONFIG_NET_DEVLINK (jsc#SLE-24682).\n- octeontx2-vf: Add support for adaptive interrupt coalescing (jsc#SLE-24682).\n- octeontx2: Move devlink registration to be last devlink command (jsc#SLE-24682).\n- openvswitch: Fix setting ipv6 fields causing hw csum failure (git-fixes).\n- openvswitch: Fixed nd target mask field in the flow dump (git-fixes).\n- openvswitch: always update flow key after nat (git-fixes).\n- optee: add error checks in optee_ffa_do_call_with_arg() (git-fixes).\n- perf bench futex: Fix memory leak of perf_cpu_map__new() (git-fixes).\n- phy: samsung: phy-exynos-pcie: sanitize init/power_on callbacks (git-fixes).\n- phy: stm32: fix error return in stm32_usbphyc_phy_init (git-fixes).\n- pinctrl: amd: Do not save/restore interrupt status and wake status bits (git-fixes).\n- pinctrl: armada-37xx: Convert to use dev_err_probe() (git-fixes).\n- pinctrl: armada-37xx: Make use of the devm_platform_ioremap_resource() (git-fixes).\n- pinctrl: armada-37xx: Use temporary variable for struct device (git-fixes).\n- pinctrl: intel: Check against matching data instead of ACPI companion (git-fixes).\n- pinctrl: nomadik: Fix refcount leak in nmk_pinctrl_dt_subnode_to_map (git-fixes).\n- pinctrl: qcom: msm8916: Allow CAMSS GP clocks to be muxed (git-fixes).\n- pinctrl: qcom: sm8250: Fix PDC map (git-fixes).\n- pinctrl: sunxi: Add I/O bias setting for H6 R-PIO (git-fixes).\n- platform/chrome: cros_ec: Always expose last resume result (git-fixes).\n- platform/chrome: cros_ec_proto: do not show MKBP version if unsupported (git-fixes).\n- platform/olpc: Fix uninitialized data in debugfs write (git-fixes).\n- platform/x86: pmc_atom: Fix SLP_TYPx bitfield mask (git-fixes).\n- platform/x86: pmc_atom: Match all Lex BayTrail boards with critclk_systems DMI table (git-fixes).\n- powerpc/perf: Optimize clearing the pending PMI and remove WARN_ON for PMI check in power_pmu_disable (bsc#1156395).\n- powerpc/powernv/kvm: Use darn for H_RANDOM on Power9 (bsc#1065729).\n- powerpc/powernv: Avoid crashing if rng is NULL (bsc#1065729).\n- powerpc/powernv: delay rng platform device creation until later in boot (bsc#1065729).\n- powerpc/powernv: rename remaining rng powernv_ functions to pnv_ (bsc#1065729).\n- powerpc/powernv: wire up rng during setup_arch (bsc#1065729).\n- powerpc/pseries: Interface to represent PAPR firmware attributes (bsc#1200465 ltc#197256 jsc#SLE-18130).\n- powerpc/pseries: Rename TYPE1_AFFINITY to FORM1_AFFINITY (bsc#1200465 ltc#197256 jsc#SLE-18130).\n- powerpc/pseries: rename min_common_depth to primary_domain_index (bsc#1200465 ltc#197256 jsc#SLE-18130).\n- powerpc/pseries: wire up rng during setup_arch() (bsc#1065729).\n- powerpc/xive: Fix refcount leak in xive_get_max_prio (git-fixess).\n- powerpc: Avoid discarding flags in system_call_exception() (bsc#1194869).\n- powerpc: Enable execve syscall exit tracepoint (bsc#1065729).\n- powerpc: powernv: kABI: add back powernv_get_random_long (bsc#1065729).\n- proc: fix a dentry lock race between release_task and lookup (git-fixes).\n- proc: fix dentry/inode overinstantiating under /proc/${pid}/net (git-fixes).\n- profiling: fix shift too large makes kernel panic (git-fixes).\n- pwm: lpc18xx-sct: Reduce number of devm memory allocations (git-fixes).\n- pwm: lpc18xx-sct: Simplify driver by not using pwm_[gs]et_chip_data() (git-fixes).\n- pwm: lpc18xx: Fix period handling (git-fixes).\n- qed: validate and restrict untrusted VFs vlan promisc mode (git-fixes).\n- r8152: fix the RX FIFO settings when suspending (git-fixes).\n- r8152: fix the units of some registers for RTL8156A (git-fixes).\n- random: remove useless header comment (git-fixes).\n- ratelimit: Fix data-races in ___ratelimit() (git-fixes).\n- regulator: of: Fix refcount leak bug in of_get_regulation_constraints() (git-fixes).\n- regulator: pca9450: Remove restrictions for regulator-name (git-fixes).\n- regulator: qcom_smd: Fix pm8916_pldo range (git-fixes).\n- remoteproc: imx_rproc: Fix refcount leak in imx_rproc_addr_init (git-fixes).\n- remoteproc: k3-r5: Fix refcount leak in k3_r5_cluster_of_init (git-fixes).\n- remoteproc: qcom: pas: Check if coredump is enabled (git-fixes).\n- remoteproc: qcom: pas: Mark devices as wakeup capable (git-fixes).\n- remoteproc: qcom: q6v5-mss: add powerdomains to MSM8996 config (git-fixes).\n- remoteproc: qcom: wcnss: Fix handling of IRQs (git-fixes).\n- remoteproc: sysmon: Wait for SSCTL service to come up (git-fixes).\n- rose: check NULL rose_loopback_neigh-\u003eloopback (git-fixes).\n- rpm/kernel-binary.spec.in: move vdso to a separate package (bsc#1202385) \n- rpmsg: char: Add mutex protection for rpmsg_eptdev_open() (git-fixes).\n- rpmsg: mtk_rpmsg: Fix circular locking dependency (git-fixes).\n- rpmsg: qcom_smd: Fix refcount leak in qcom_smd_parse_edge (git-fixes).\n- s390/cpumf: Handle events cycles and instructions identical (git-fixes).\n- s390/crash: fix incorrect number of bytes to copy to user space (git-fixes).\n- s390/crash: make copy_oldmem_page() return number of bytes copied (git-fixes).\n- s390/hugetlb: fix prepare_hugepage_range() check for 2 GB hugepages (git-fixes).\n- s390/hypfs: avoid error message under KVM (bsc#1032323).\n- s390/kexec: handle R_390_PLT32DBL rela in arch_kexec_apply_relocations_add() (git-fixes).\n- s390/mm: do not trigger write fault when vma does not allow VM_WRITE (git-fixes).\n- s390/mm: use non-quiescing sske for KVM switch to keyed guest (git-fixes).\n- s390/qeth: cache link_info for ethtool (bsc#1202262 LTC#199322).\n- s390/stp: clock_delta should be signed (git-fixes).\n- s390/zcore: fix race when reading from hardware system area (git-fixes).\n- samples/landlock: Add clang-format exceptions (git-fixes).\n- samples/landlock: Fix path_list memory leak (git-fixes).\n- samples/landlock: Format with clang-format (git-fixes).\n- sched/core: Always flush pending blk_plug (bnc#1189999 (Scheduler functional and performance backports)).\n- sched/deadline: Fix BUG_ON condition for deboosted tasks (git-fixes)\n- sched/fair: Fix cfs_rq_clock_pelt() for throttled cfs_rq (bnc#1189999 (Scheduler functional and performance backports)).\n- sched/fair: Fix cfs_rq_clock_pelt() for throttled cfs_rq -kabi (git fixes (sched/fair)).\n- sched/fair: Remove redundant word \u0027 *\u0027 (bnc#1189999 (Scheduler functional and performance backports)).\n- sched/uclamp: Fix iowait boost escaping uclamp restriction (git-fixes)\n- sched/uclamp: Fix rq-\u003euclamp_max not set on first enqueue (git-fixes)\n- sched: Allow newidle balancing to bail out of load_balance (bnc#1189999 (Scheduler functional and performance backports)).\n- sched: Fix the check of nr_running at queue wakelist (bnc#1189999 (Scheduler functional and performance backports)).\n- sched: Remove the limitation of WF_ON_CPU on wakelist if wakee cpu is idle (bnc#1189999 (Scheduler functional and performance backports)). Refresh\n- sched: Remove unused function group_first_cpu() (bnc#1189999 (Scheduler functional and performance backports)).\n- scripts/dtc: Call pkg-config POSIXly correct (git-fixes).\n- scripts/faddr2line: Fix vmlinux detection on arm64 (git-fixes).\n- scripts/gdb: change kernel config dumping method (git-fixes).\n- scripts: sphinx-pre-install: Fix ctex support on Debian (git-fixes).\n- scripts: sphinx-pre-install: add required ctex dependency (git-fixes).\n- scsi: hisi_sas: Keep controller active between ISR of phyup and the event being processed (bsc#1202471).\n- scsi: hisi_sas: Use autosuspend for the host controller (bsc#1202471).\n- scsi: libiscsi: Add iscsi_cls_conn to sysfs after initialization (bsc#1198410).\n- scsi: lpfc: Add warning notification period to CMF_SYNC_WQE (bsc#1203063).\n- scsi: lpfc: Check the return value of alloc_workqueue() (bsc#1203063).\n- scsi: lpfc: Copyright updates for 14.2.0.5 patches (bsc#1201956).\n- scsi: lpfc: Copyright updates for 14.2.0.6 patches (bsc#1203063).\n- scsi: lpfc: Fix attempted FA-PWWN usage after feature disable (bsc#1201956).\n- scsi: lpfc: Fix lost NVMe paths during LIF bounce stress test (bsc#1201956).\n- scsi: lpfc: Fix null ndlp ptr dereference in abnormal exit path for GFT_ID (bsc#1203063).\n- scsi: lpfc: Fix possible memory leak when failing to issue CMF WQE (bsc#1201956).\n- scsi: lpfc: Fix uninitialized cqe field in lpfc_nvme_cancel_iocb() (bsc#1201956).\n- scsi: lpfc: Fix unsolicited FLOGI receive handling during PT2PT discovery (bsc#1203063).\n- scsi: lpfc: Prevent buffer overflow crashes in debugfs with malformed user input (bsc#1201956).\n- scsi: lpfc: Refactor lpfc_nvmet_prep_abort_wqe() into lpfc_sli_prep_abort_xri() (bsc#1201956).\n- scsi: lpfc: Remove Menlo/Hornet related code (bsc#1201956).\n- scsi: lpfc: Remove SANDiags related code (bsc#1203063).\n- scsi: lpfc: Remove extra atomic_inc on cmd_pending in queuecommand after VMID (bsc#1201956).\n- scsi: lpfc: Revert RSCN_MEMENTO workaround for misbehaved configuration (bsc#1201956).\n- scsi: lpfc: Rework MIB Rx Monitor debug info logic (bsc#1203063).\n- scsi: lpfc: Set PU field when providing D_ID in XMIT_ELS_RSP64_CX iocb (bsc#1201956).\n- scsi: lpfc: Update lpfc version to 14.2.0.5 (bsc#1201956).\n- scsi: lpfc: Update lpfc version to 14.2.0.6 (bsc#1203063).\n- scsi: megaraid: Clear READ queue map\u0027s nr_queues (git-fixes).\n- scsi: mpt3sas: Stop fw fault watchdog work item during system shutdown (git-fixes).\n- scsi: qla2xxx: Check correct variable in qla24xx_async_gffid() (bsc#1201958).\n- scsi: qla2xxx: Fix discovery issues in FC-AL topology (bsc#1201958).\n- scsi: qla2xxx: Fix imbalance vha-\u003evref_count (bsc#1201958).\n- scsi: qla2xxx: Fix incorrect display of max frame size (bsc#1201958).\n- scsi: qla2xxx: Fix response queue handler reading stale packets (bsc#1201958).\n- scsi: qla2xxx: Fix sparse warning for dport_data (bsc#1201958).\n- scsi: qla2xxx: Update manufacturer details (bsc#1201958).\n- scsi: qla2xxx: Update version to 10.02.07.800-k (bsc#1201958).\n- scsi: qla2xxx: Zero undefined mailbox IN registers (bsc#1201958).\n- scsi: qla2xxx: edif: Fix dropped IKE message (bsc#1201958).\n- scsi: sg: Allow waiting for commands to complete on removed device (git-fixes).\n- scsi: smartpqi: Fix DMA direction for RAID requests (git-fixes).\n- scsi: ufs: core: Fix another task management completion race (git-fixes).\n- scsi: ufs: core: Fix task management completion timeout race (git-fixes).\n- scsi: zfcp: Fix missing auto port scan and thus missing target ports (git-fixes).\n- seccomp: Invalidate seccomp mode to catch death failures (git-fixes).\n- selftest/net/forwarding: declare NETIFS p9 p10 (git-fixes).\n- selftest/powerpc: Add PAPR sysfs attributes sniff test (bsc#1200465 ltc#197256 jsc#SLE-18130).\n- selftest/vm: fix map_fixed_noreplace test failure (git-fixes).\n- selftest/vm: verify mmap addr in mremap_test (git-fixes).\n- selftest/vm: verify remap destination address in mremap_test (git-fixes).\n- selftests, x86: fix how check_cc.sh is being invoked (git-fixes).\n- selftests/exec: Add non-regular to TEST_GEN_PROGS (git-fixes).\n- selftests/exec: Remove pipe from TEST_GEN_FILES (git-fixes).\n- selftests/fib_tests: Rework fib_rp_filter_test() (git-fixes).\n- selftests/ftrace: Do not trace do_softirq because of PREEMPT_RT (git-fixes).\n- selftests/ftrace: make kprobe profile testcase description unique (git-fixes).\n- selftests/landlock: Add clang-format exceptions (git-fixes).\n- selftests/landlock: Add tests for O_PATH (git-fixes).\n- selftests/landlock: Add tests for unknown access rights (git-fixes).\n- selftests/landlock: Extend access right tests to directories (git-fixes).\n- selftests/landlock: Extend tests for minimal valid attribute size (git-fixes).\n- selftests/landlock: Format with clang-format (git-fixes).\n- selftests/landlock: Fully test file rename with \u0027remove\u0027 access (git-fixes).\n- selftests/landlock: Make tests build with old libc (git-fixes).\n- selftests/landlock: Normalize array assignment (git-fixes).\n- selftests/landlock: Test landlock_create_ruleset(2) argument check ordering (git-fixes).\n- selftests/memfd: clean up mapping in mfd_fail_write (git-fixes).\n- selftests/memfd: remove unused variable (git-fixes).\n- selftests/net: pass ipv6_args to udpgso_bench\u0027s IPv6 TCP test (git-fixes).\n- selftests/net: so_txtime: fix parsing of start time stamp on 32 bit systems (git-fixes).\n- selftests/net: so_txtime: usage(): fix documentation of default clock (git-fixes).\n- selftests/net: timestamping: Fix bind_phc check (git-fixes).\n- selftests/net: udpgso_bench_tx: fix dst ip argument (git-fixes).\n- selftests/powerpc/spectre_v2: Return skip code when miss_percent is high (git-fixes).\n- selftests/powerpc: Add a test of sigreturning to the kernel (git-fixes).\n- selftests/resctrl: Fix null pointer dereference on open failed (git-fixes).\n- selftests/rseq: Change type of rseq_offset to ptrdiff_t (git-fixes).\n- selftests/rseq: Fix ppc32 missing instruction selection \u0027u\u0027 and \u0027x\u0027 for load/store (git-fixes).\n- selftests/rseq: Fix ppc32 offsets by using long rather than off_t (git-fixes).\n- selftests/rseq: Fix ppc32: wrong rseq_cs 32-bit field pointer on big endian (git-fixes).\n- selftests/rseq: Fix warnings about #if checks of undefined tokens (git-fixes).\n- selftests/rseq: Fix: work-around asm goto compiler bugs (git-fixes).\n- selftests/rseq: Introduce rseq_get_abi() helper (git-fixes).\n- selftests/rseq: Introduce thread pointer getters (git-fixes).\n- selftests/rseq: Remove arm/mips asm goto compiler work-around (git-fixes).\n- selftests/rseq: Remove useless assignment to cpu variable (git-fixes).\n- selftests/rseq: Remove volatile from __rseq_abi (git-fixes).\n- selftests/rseq: Uplift rseq selftests for compatibility with glibc-2.35 (git-fixes).\n- selftests/rseq: introduce own copy of rseq uapi header (git-fixes).\n- selftests/rseq: remove ARRAY_SIZE define from individual tests (git-fixes).\n- selftests/rseq: x86-32: use %gs segment selector for accessing rseq thread area (git-fixes).\n- selftests/rseq: x86-64: use %fs segment selector for accessing rseq thread area (git-fixes).\n- selftests/seccomp: Do not call read() on TTY from background pgrp (git-fixes).\n- selftests/seccomp: Fix compile warning when CC=clang (git-fixes).\n- selftests/seccomp: Fix seccomp failure by adding missing headers (git-fixes).\n- selftests/sgx: Treat CC as one argument (git-fixes).\n- selftests/vm/transhuge-stress: fix ram size thinko (git-fixes).\n- selftests/vm: make charge_reserved_hugetlb.sh work with existing cgroup setting (git-fixes).\n- selftests/x86: Add validity check and allow field splitting (git-fixes).\n- selftests/zram01.sh: Fix compression ratio calculation (git-fixes).\n- selftests/zram: Adapt the situation that /dev/zram0 is being used (git-fixes).\n- selftests/zram: Skip max_comp_streams interface on newer kernel (git-fixes).\n- selftests: Add duplicate config only for MD5 VRF tests (git-fixes).\n- selftests: Fix IPv6 address bind tests (git-fixes).\n- selftests: Fix raw socket bind tests with VRF (git-fixes).\n- selftests: add ping test with ping_group_range tuned (git-fixes).\n- selftests: cgroup: Make cg_create() use 0755 for permission instead of 0644 (git-fixes).\n- selftests: cgroup: Test open-time cgroup namespace usage for migration checks (git-fixes).\n- selftests: cgroup: Test open-time credential usage for migration checks (git-fixes).\n- selftests: clone3: clone3: add case CLONE3_ARGS_NO_TEST (git-fixes).\n- selftests: fixup build warnings in pidfd / clone3 tests (git-fixes).\n- selftests: forwarding: fix error message in learning_test (git-fixes).\n- selftests: forwarding: fix flood_unicast_test when h2 supports IFF_UNICAST_FLT (git-fixes).\n- selftests: forwarding: fix learning_test when h1 supports IFF_UNICAST_FLT (git-fixes).\n- selftests: futex: Use variable MAKE instead of make (git-fixes).\n- selftests: gpio: fix gpio compiling error (git-fixes).\n- selftests: harness: avoid false negatives if test has no ASSERTs (git-fixes).\n- selftests: icmp_redirect: pass xfail=0 to log_test() (git-fixes).\n- selftests: kvm: set rax before vmcall (git-fixes).\n- selftests: mirror_gre_bridge_1q: Avoid changing PVID while interface is operational (git-fixes).\n- selftests: mlxsw: resource_scale: Fix return value (git-fixes).\n- selftests: mlxsw: tc_police_scale: Make test more robust (git-fixes).\n- selftests: mlxsw: vxlan_flooding: Prevent flooding of unwanted packets (git-fixes).\n- selftests: mptcp: add csum mib check for mptcp_connect (git-fixes).\n- selftests: mptcp: fix diag instability (git-fixes).\n- selftests: mptcp: fix ipv6 routing setup (git-fixes).\n- selftests: mptcp: more stable diag tests (git-fixes).\n- selftests: net: Correct case name (git-fixes).\n- selftests: net: Correct ping6 expected rc from 2 to 1 (git-fixes).\n- selftests: net: Fix a typo in udpgro_fwd.sh (git-fixes).\n- selftests: net: tls: remove unused variable and code (git-fixes).\n- selftests: net: udpgro_fwd.sh: explicitly checking the available ping feature (git-fixes).\n- selftests: net: using ping6 for IPv6 in udpgro_fwd.sh (git-fixes).\n- selftests: netfilter: add a vrf+conntrack testcase (git-fixes).\n- selftests: netfilter: correct PKTGEN_SCRIPT_PATHS in nft_concat_range.sh (git-fixes).\n- selftests: netfilter: disable rp_filter on router (git-fixes).\n- selftests: netfilter: fix exit value for nft_concat_range (git-fixes).\n- selftests: nft_concat_range: add test for reload with no element add/del (git-fixes).\n- selftests: ocelot: tc_flower_chains: specify conform-exceed action for policer (git-fixes).\n- selftests: openat2: Add missing dependency in Makefile (git-fixes).\n- selftests: openat2: Print also errno in failure messages (git-fixes).\n- selftests: openat2: Skip testcases that fail with EOPNOTSUPP (git-fixes).\n- selftests: pmtu.sh: Kill nettest processes launched in subshell (git-fixes).\n- selftests: pmtu.sh: Kill tcpdump processes launched by subshell (git-fixes).\n- selftests: rtc: Increase test timeout so that all tests run (git-fixes).\n- selftests: skip mincore.check_file_mmap when fs lacks needed support (git-fixes).\n- selftests: test_vxlan_under_vrf: Fix broken test case (git-fixes).\n- selftests: timers: clocksource-switch: fix passing errors from child (git-fixes).\n- selftests: timers: valid-adjtimex: build fix for newer toolchains (git-fixes).\n- selftests: vm: Makefile: rename TARGETS to VMTARGETS (git-fixes).\n- selftests: vm: fix clang build error multiple output files (git-fixes).\n- selftests: x86: fix [-Wstringop-overread] warn in test_process_vm_readv() (git-fixes).\n- selinux: Add boundary check in put_entry() (git-fixes).\n- selinux: access superblock_security_struct in LSM blob way (git-fixes).\n- selinux: check return value of sel_make_avc_files (git-fixes).\n- selinux: fix bad cleanup on error in hashtab_duplicate() (git-fixes).\n- selinux: fix double free of cond_list on error paths (git-fixes).\n- selinux: fix memleak in security_read_state_kernel() (git-fixes).\n- selinux: fix misuse of mutex_is_locked() (git-fixes).\n- selinux: use correct type for context length (git-fixes).\n- serial: 8250: Add proper clock handling for OxSemi PCIe devices (git-fixes).\n- serial: 8250: Export ICR access helpers for internal use (git-fixes).\n- serial: 8250: Fold EndRun device support into OxSemi Tornado code (git-fixes).\n- serial: 8250_bcm7271: Save/restore RTS in suspend/resume (git-fixes).\n- serial: 8250_dw: Store LSR into lsr_saved_flags in dw8250_tx_wait_empty() (git-fixes).\n- serial: 8250_fsl: Do not report FE, PE and OE twice (git-fixes).\n- serial: 8250_pci: Refactor the loop in pci_ite887x_init() (git-fixes).\n- serial: 8250_pci: Replace dev_*() by pci_*() macros (git-fixes).\n- serial: fsl_lpuart: RS485 RTS polariy is inverse (git-fixes).\n- serial: mvebu-uart: uart2 error bits clearing (git-fixes).\n- smsc95xx: Ignore -ENODEV errors when device is unplugged (git-fixes).\n- soc: amlogic: Fix refcount leak in meson-secure-pwrc.c (git-fixes).\n- soc: brcmstb: pm-arm: Fix refcount leak and __iomem leak bugs (git-fixes).\n- soc: fsl: guts: machine variable might be unset (git-fixes).\n- soc: fsl: select FSL_GUTS driver for DPIO (git-fixes).\n- soc: imx: gpcv2: Assert reset before ungating clock (git-fixes).\n- soc: qcom: Make QCOM_RPMPD depend on PM (git-fixes).\n- soc: qcom: aoss: Fix refcount leak in qmp_cooling_devices_register (git-fixes).\n- soc: qcom: ocmem: Fix refcount leak in of_get_ocmem (git-fixes).\n- soc: renesas: r8a779a0-sysc: Fix A2DP1 and A2CV[2357] PDR values (git-fixes).\n- soundwire: bus_type: fix remove and shutdown support (git-fixes).\n- soundwire: qcom: Check device status before reading devid (git-fixes).\n- soundwire: qcom: fix device status array range (git-fixes).\n- spi: Fix incorrect cs_setup delay handling (git-fixes).\n- spi: Fix simplification of devm_spi_register_controller (git-fixes).\n- spi: dt-bindings: cadence: add missing \u0027required\u0027 (git-fixes).\n- spi: dt-bindings: zynqmp-qspi: add missing \u0027required\u0027 (git-fixes).\n- spi: meson-spicc: add local pow2 clock ops to preserve rate between messages (git-fixes).\n- spi: spi-altera-dfl: Fix an error handling path (git-fixes).\n- spi: spi-rspi: Fix PIO fallback on RZ platforms (git-fixes).\n- spi: synquacer: Add missing clk_disable_unprepare() (git-fixes).\n- spi: tegra20-slink: fix UAF in tegra_slink_remove() (git-fixes).\n- spmi: trace: fix stack-out-of-bound access in SPMI tracing functions (git-fixes).\n- staging: rtl8192u: Fix sleep in atomic context bug in dm_fsync_timer_callback (git-fixes).\n- staging: rtl8712: fix use after free bugs (git-fixes).\n- tee: optee: do not check memref size on return from Secure World (git-fixes).\n- tee: tee_get_drvdata(): fix description of return value (git-fixes).\n- testing/selftests/mqueue: Fix mq_perf_tests to free the allocated cpu set (git-fixes).\n- testing: nvdimm: asm/mce.h is not needed in nfit.c (git-fixes).\n- testing: nvdimm: iomap: make __nfit_test_ioremap a macro (git-fixes).\n- tests: fix idmapped mount_setattr test (git-fixes).\n- thermal/int340x_thermal: handle data_vault when the value is ZERO_SIZE_PTR (bsc#1201308).\n- thermal/tools/tmon: Include pthread and time headers in tmon.h (git-fixes).\n- thermal: sysfs: Fix cooling_device_stats_setup() error code path (git-fixes).\n- thunderbolt: Use the actual buffer in tb_async_error() (git-fixes).\n- tools include UAPI: Sync sound/asound.h copy with the kernel sources (git-fixes).\n- tools/nolibc: fix incorrect truncation of exit code (git-fixes).\n- tools/nolibc: i386: fix initial stack alignment (git-fixes).\n- tools/nolibc: x86-64: Fix startup code bug (git-fixes).\n- tools/testing/scatterlist: add missing defines (git-fixes).\n- tools/thermal: Fix possible path truncations (git-fixes).\n- tpm: eventlog: Fix section mismatch for DEBUG_SECTION_MISMATCH (git-fixes).\n- trace/osnoise: Add migrate-disabled field to the osnoise header (git-fixes).\n- trace/timerlat: Add migrate-disabled field to the timerlat header (git-fixes).\n- tracing/histograms: Fix memory leak problem (git-fixes).\n- tracing/kprobes: Check whether get_kretprobe() returns NULL in kretprobe_dispatcher() (git-fixes).\n- tracing/probes: Have kprobes and uprobes use $COMM too (git-fixes).\n- tracing: Add ustring operation to filtering string pointers (git-fixes).\n- tracing: Fix sleeping while atomic in kdb ftdump (git-fixes).\n- tracing: Have filter accept \u0027common_cpu\u0027 to be consistent (git-fixes).\n- tracing: Use a struct alignof to determine trace event field alignment (git-fixes).\n- tty: 8250: Add support for Brainboxes PX cards (git-fixes).\n- tty: n_gsm: Delete gsm_disconnect when config requester (git-fixes).\n- tty: n_gsm: Delete gsmtty open SABM frame when config requester (git-fixes).\n- tty: n_gsm: Modify CR,PF bit printk info when config requester (git-fixes).\n- tty: n_gsm: Modify CR,PF bit when config requester (git-fixes).\n- tty: n_gsm: Modify cr bit value when config requester (git-fixes).\n- tty: n_gsm: Modify gsmtty driver register method when config requester (git-fixes).\n- tty: n_gsm: Save dlci address open status when config requester (git-fixes).\n- tty: n_gsm: add sanity check for gsm-\u003ereceive in gsm_receive_buf() (git-fixes).\n- tty: n_gsm: avoid call of sleeping functions from atomic context (git-fixes).\n- tty: n_gsm: clean up dead code in gsm_queue() (git-fixes).\n- tty: n_gsm: clean up implicit CR bit encoding in address field (git-fixes).\n- tty: n_gsm: clean up indenting in gsm_queue() (git-fixes).\n- tty: n_gsm: fix DM command (git-fixes).\n- tty: n_gsm: fix broken virtual tty handling (git-fixes).\n- tty: n_gsm: fix buffer over-read in gsm_dlci_data() (git-fixes).\n- tty: n_gsm: fix deadlock and link starvation in outgoing data path (git-fixes).\n- tty: n_gsm: fix decoupled mux resource (git-fixes).\n- tty: n_gsm: fix encoding of command/response bit (git-fixes).\n- tty: n_gsm: fix flow control handling in tx path (git-fixes).\n- tty: n_gsm: fix frame reception handling (git-fixes).\n- tty: n_gsm: fix incorrect UA handling (git-fixes).\n- tty: n_gsm: fix insufficient txframe size (git-fixes).\n- tty: n_gsm: fix invalid gsmtty_write_room() result (git-fixes).\n- tty: n_gsm: fix invalid use of MSC in advanced option (git-fixes).\n- tty: n_gsm: fix malformed counter for out of frame data (git-fixes).\n- tty: n_gsm: fix missing corner cases in gsmld_poll() (git-fixes).\n- tty: n_gsm: fix missing explicit ldisc flush (git-fixes).\n- tty: n_gsm: fix missing mux reset on config change at responder (git-fixes).\n- tty: n_gsm: fix missing timer to handle stalled links (git-fixes).\n- tty: n_gsm: fix missing tty wakeup in convergence layer type 2 (git-fixes).\n- tty: n_gsm: fix missing update of modem controls after DLCI open (git-fixes).\n- tty: n_gsm: fix mux activation issues in gsm_config() (git-fixes).\n- tty: n_gsm: fix mux cleanup after unregister tty device (git-fixes).\n- tty: n_gsm: fix non flow control frames during mux flow off (git-fixes).\n- tty: n_gsm: fix packet re-transmission without open control channel (git-fixes).\n- tty: n_gsm: fix race condition in gsmld_write() (git-fixes).\n- tty: n_gsm: fix reset fifo race condition (git-fixes).\n- tty: n_gsm: fix resource allocation order in gsm_activate_mux() (git-fixes).\n- tty: n_gsm: fix restart handling via CLD command (git-fixes).\n- tty: n_gsm: fix software flow control handling (git-fixes).\n- tty: n_gsm: fix sometimes uninitialized warning in gsm_dlci_modem_output() (git-fixes).\n- tty: n_gsm: fix tty registration before control channel open (git-fixes).\n- tty: n_gsm: fix user open not possible at responder until initiator open (git-fixes).\n- tty: n_gsm: fix wrong DLCI release order (git-fixes).\n- tty: n_gsm: fix wrong T1 retry count handling (git-fixes).\n- tty: n_gsm: fix wrong command frame length field encoding (git-fixes).\n- tty: n_gsm: fix wrong command retry handling (git-fixes).\n- tty: n_gsm: fix wrong queuing behavior in gsm_dlci_data_output() (git-fixes).\n- tty: n_gsm: fix wrong signal octet encoding in convergence layer type 2 (git-fixes).\n- tty: n_gsm: fix wrong signal octets encoding in MSC (git-fixes).\n- tty: n_gsm: initialize more members at gsm_alloc_mux() (git-fixes).\n- tty: n_gsm: replace kicktimer with delayed_work (git-fixes).\n- tty: serial: Fix refcount leak bug in ucc_uart.c (git-fixes).\n- tty: serial: fsl_lpuart: correct the count of break characters (git-fixes).\n- tty: serial: lpuart: disable flow control while waiting for the transmit engine to complete (git-fixes).\n- tty: vt: initialize unicode screen buffer (git-fixes).\n- tun: avoid double free in tun_free_netdev (git-fixes).\n- tunnels: do not assume mac header is set in skb_tunnel_check_pmtu() (git-fixes).\n- tuntap: add sanity checks about msg_controllen in sendmsg (git-fixes).\n- uaccess: fix type mismatch warnings from access_ok() (git-fixes).\n- ucounts: Base set_cred_ucounts changes on the real user (git-fixes).\n- ucounts: Fix rlimit max values check (git-fixes).\n- ucounts: Fix systemd LimitNPROC with private users regression (git-fixes).\n- ucounts: Handle wrapping in is_ucounts_overlimit (git-fixes).\n- ucounts: In set_cred_ucounts assume new-\u003eucounts is non-NULL (git-fixes).\n- udf: Fix crash after seekdir (bsc#1194592).\n- udmabuf: Set the DMA mask for the udmabuf device (v2) (git-fixes).\n- udmabuf: add back sanity check (git-fixes).\n- usb: aspeed-vhub: Fix refcount leak bug in ast_vhub_init_desc() (git-fixes).\n- usb: cdns3 fix use-after-free at workaround 2 (git-fixes).\n- usb: cdns3: Do not use priv_dev uninitialized in cdns3_gadget_ep_enable() (git-fixes).\n- usb: cdns3: change place of \u0027priv_ep\u0027 assignment in cdns3_gadget_ep_dequeue(), cdns3_gadget_ep_enable() (git-fixes).\n- usb: cdns3: fix incorrect handling TRB_SMM flag for ISOC transfer (git-fixes).\n- usb: cdns3: fix issue with rearming ISO OUT endpoint (git-fixes).\n- usb: cdns3: fix random warning message when driver load (git-fixes).\n- usb: dwc2: fix wrong order of phy_power_on and phy_init (git-fixes).\n- usb: dwc2: gadget: remove D+ pull-up while no vbus with usb-role-switch (git-fixes).\n- usb: dwc3: core: Deprecate GCTL.CORESOFTRESET (git-fixes).\n- usb: dwc3: core: Do not perform GCTL_CORE_SOFTRESET during bootup (git-fixes).\n- usb: dwc3: dwc3-qcom: Add missing platform_device_put() in dwc3_qcom_acpi_register_core (git-fixes).\n- usb: dwc3: dwc3-qcom: Fix typo in the dwc3 vbus override API (git-fixes).\n- usb: dwc3: gadget: Avoid duplicate requests to enable Run/Stop (git-fixes).\n- usb: dwc3: gadget: fix high speed multiplier setting (git-fixes).\n- usb: dwc3: gadget: refactor dwc3_repare_one_trb (git-fixes).\n- usb: dwc3: qcom: Add helper functions to enable,disable wake irqs (git-fixes).\n- usb: dwc3: qcom: fix missing optional irq warnings (git-fixes).\n- usb: dwc3: qcom: fix use-after-free on runtime-PM wakeup (git-fixes).\n- usb: gadget: f_uac2: clean up some inconsistent indenting (git-fixes).\n- usb: gadget: f_uac2: fix superspeed transfer (git-fixes).\n- usb: gadget: mass_storage: Fix cdrom data transfers on MAC-OS (git-fixes).\n- usb: gadget: tegra-xudc: Fix error check in tegra_xudc_powerdomain_init() (git-fixes).\n- usb: gadget: udc-xilinx: replace memcpy with memcpy_toio (git-fixes).\n- usb: gadget: udc: amd5536 depends on HAS_DMA (git-fixes).\n- usb: gadget: uvc: call uvc uvcg_warn on completed status instead of uvcg_info (git-fixes).\n- usb: host: Fix refcount leak in ehci_hcd_ppc_of_probe (git-fixes).\n- usb: host: ohci-ppc-of: Fix refcount leak bug (git-fixes).\n- usb: host: xhci: use snprintf() in xhci_decode_trb() (git-fixes).\n- usb: ohci-nxp: Fix refcount leak in ohci_hcd_nxp_probe (git-fixes).\n- usb: renesas: Fix refcount leak bug (git-fixes).\n- usb: typec: altmodes/displayport: correct pin assignment for UFP receptacles (git-fixes).\n- usb: typec: tcpm: Return ENOTSUPP for power supply prop writes (git-fixes).\n- usb: typec: ucsi: Acknowledge the GET_ERROR_STATUS command completion (git-fixes).\n- usb: xhci: tegra: Fix error check (git-fixes).\n- usbnet: Fix linkwatch use-after-free on disconnect (git-fixes).\n- usbnet: Run unregister_netdev() before unbind() again (git-fixes).\n- usbnet: smsc95xx: Avoid link settings race on interrupt reception (git-fixes).\n- usbnet: smsc95xx: Do not clear read-only PHY interrupt (git-fixes).\n- usbnet: smsc95xx: Fix deadlock on runtime resume (git-fixes).\n- usbnet: smsc95xx: Forward PHY interrupts to PHY driver to avoid polling (git-fixes).\n- userfaultfd/selftests: fix hugetlb area allocations (git-fixes).\n- vboxguest: Do not use devm for irq (git-fixes).\n- vdpa_sim: avoid putting an uninitialized iova_domain (git-fixes).\n- venus: pm_helpers: Fix warning in OPP during probe (git-fixes).\n- vfio/ccw: Do not change FSM state in subchannel event (git-fixes).\n- vfio/ccw: Remove UUID from s390 debug log (git-fixes).\n- vfio: Clear the caps-\u003ebuf to NULL after free (git-fixes).\n- video: fbdev: amba-clcd: Fix refcount leak bugs (git-fixes).\n- video: fbdev: arkfb: Check the size of screen before memset_io() (git-fixes).\n- video: fbdev: arkfb: Fix a divide-by-zero bug in ark_set_pixclock() (git-fixes).\n- video: fbdev: i740fb: Check the argument of i740_calc_vclk() (git-fixes).\n- video: fbdev: s3fb: Check the size of screen before memset_io() (git-fixes).\n- video: fbdev: sis: fix typos in SiS_GetModeID() (git-fixes).\n- video: fbdev: vt8623fb: Check the size of screen before memset_io() (git-fixes).\n- virtio-gpu: fix a missing check to avoid NULL dereference (git-fixes).\n- virtio-net: fix the race between refill work and close (git-fixes).\n- virtio_net: fix memory leak inside XPD_TX with mergeable (git-fixes).\n- vmxnet3: Implement ethtool\u0027s get_channels command (bsc#1200431).\n- vmxnet3: Record queue number to incoming packets (bsc#1200431).\n- vmxnet3: Remove useless DMA-32 fallback configuration (bsc#1200431).\n- vmxnet3: add command to set ring buffer sizes (bsc#1200431).\n- vmxnet3: add support for capability registers (bsc#1200431).\n- vmxnet3: add support for large passthrough BAR register (bsc#1200431).\n- vmxnet3: add support for out of order rx completion (bsc#1200431).\n- vmxnet3: disable overlay offloads if UPT device does not support (bsc#1200431).\n- vmxnet3: do not reschedule napi for rx processing (bsc#1200431).\n- vmxnet3: limit number of TXDs used for TSO packet (bsc#1200431).\n- vmxnet3: prepare for version 7 changes (bsc#1200431).\n- vmxnet3: switch from \u0027pci_\u0027 to \u0027dma_\u0027 API (bsc#1200431).\n- vmxnet3: update to version 7 (bsc#1200431).\n- vmxnet3: use ext1 field to indicate encapsulated packet (bsc#1200431).\n- vrf: do not run conntrack on vrf with !dflt qdisc (git-fixes).\n- vsock/virtio: enable VQs early on probe (git-fixes).\n- vsock/virtio: initialize vdev-\u003epriv before using VQs (git-fixes).\n- vsock/virtio: read the negotiated features before using VQs (git-fixes).\n- vsock: Fix memory leak in vsock_connect() (git-fixes).\n- vsock: Set socket state back to SS_UNCONNECTED in vsock_connect_timeout() (git-fixes).\n- vsock: remove vsock from connected table when connect is interrupted by a signal (git-fixes).\n- watch-queue: remove spurious double semicolon (git-fixes).\n- watch_queue: Fix missing locking in add_watch_to_object() (git-fixes).\n- watch_queue: Fix missing rcu annotation (git-fixes).\n- watchdog: armada_37xx_wdt: check the return value of devm_ioremap() in armada_37xx_wdt_probe() (git-fixes).\n- watchdog: sp5100_tco: Fix a memory leak of EFCH MMIO resource (git-fixes).\n- watchqueue: make sure to serialize \u0027wqueue-\u003edefunct\u0027 properly (git-fixes).\n- wifi: cfg80211: debugfs: fix return type in ht40allow_map_read() (git-fixes).\n- wifi: iwlegacy: 4965: fix potential off-by-one overflow in il4965_rs_fill_link_cmd() (git-fixes).\n- wifi: iwlwifi: mvm: fix double list_add at iwl_mvm_mac_wake_tx_queue (git-fixes).\n- wifi: libertas: Fix possible refcount leak in if_usb_probe() (git-fixes).\n- wifi: mac80211: Do not finalize CSA in IBSS mode if state is disconnected (git-fixes).\n- wifi: mac80211: limit A-MSDU subframes for client too (git-fixes).\n- wifi: mac80211_hwsim: add back erroneously removed cast (git-fixes).\n- wifi: mac80211_hwsim: fix race condition in pending packet (git-fixes).\n- wifi: mac80211_hwsim: use 32-bit skb cookie (git-fixes).\n- wifi: p54: Fix an error handling path in p54spi_probe() (git-fixes).\n- wifi: p54: add missing parentheses in p54_flush() (git-fixes).\n- wifi: rtlwifi: fix error codes in rtl_debugfs_set_write_h2c() (git-fixes).\n- wifi: rtlwifi: remove always-true condition pointed out by GCC 12 (git-fies).\n- wifi: rtw88: check the return value of alloc_workqueue() (git-fixes).\n- wifi: rtw89: 8852a: rfk: fix div 0 exception (git-fixes).\n- wifi: wil6210: debugfs: fix info leak in wil_write_file_wmi() (git-fixes).\n- wifi: wil6210: debugfs: fix uninitialized variable use in `wil_write_file_wmi()` (git-fixes).\n- wireguard: device: check for metadata_dst with skb_valid_dst() (git-fixes).\n- wireless: Remove redundant \u0027flush_workqueue()\u0027 calls (bsc#1202131).\n- x86/Hyper-V: Add SEV negotiate protocol support in Isolation VM (bsc#1190497).\n- x86/olpc: fix \u0027logical not is only applied to the left hand side\u0027 (git-fixes).\n- x86/retbleed: Add fine grained Kconfig knobs (bsc#1190497).\n- x86/sev: Define the Linux-specific guest termination reasons (bsc#1190497).\n- x86/sev: Save the negotiated GHCB version (bsc#1190497).\n- xen/gntdev: fix unmap notification order (git-fixes).\n- xen/privcmd: fix error exit of privcmd_ioctl_dm_op() (git-fixes).\n- xen/xenbus: fix return type in xenbus_file_read() (git-fixes).\n- xen: detect uninitialized xenbus in xenbus_init (git-fixes).\n- xen: do not continue xenstore initialization in case of errors (git-fixes).\n- xfs: Fix the free logic of state in xfs_attr_node_hasname (git-fixes).\n- xfs: check sb_meta_uuid for dabuf buffer recovery (git-fixes).\n- xfs: fix soft lockup via spinning in filestream ag selection loop (git-fixes).\n- xfs: fix use-after-free in xattr node block inactivation (git-fixes).\n- xfs: fold perag loop iteration logic into helper function (git-fixes).\n- xfs: make xfs_rtalloc_query_range input parameters const (git-fixes).\n- xfs: only bother with sync_filesystem during readonly remount (git-fixes).\n- xfs: prevent UAF in xfs_log_item_in_current_chkpt (git-fixes).\n- xfs: prevent a UAF when log IO errors race with unmount (git-fixes).\n- xfs: remove incorrect ASSERT in xfs_rename (git-fixes).\n- xfs: rename the next_agno perag iteration variable (git-fixes).\n- xfs: reorder iunlink remove operation in xfs_ifree (git-fixes).\n- xfs: revert \u0027xfs: actually bump warning counts when we send warnings\u0027 (git-fixes).\n- xfs: terminate perag iteration reliably on agcount (git-fixes).\n- xfs: use invalidate_lock to check the state of mmap_lock (git-fixes).\n- xfs: use kmem_cache_free() for kmem_cache objects (git-fixes).\n- xfs: use setattr_copy to set vfs inode attributes (git-fixes).\n- xhci: Set HCD flag to defer primary roothub registration (git-fixes).\n- xhci: dbc: Rename xhci_dbc_init and xhci_dbc_exit (git-fixes).\n- xhci: dbc: create and remove dbc structure in dbgtty driver (git-fixes).\n- xhci: dbc: refactor xhci_dbc_init() (git-fixes).\n- xprtrdma: fix pointer derefs in error cases of rpcrdma_ep_create (git-fixes).\n- xprtrdma: treat all calls not a bcall when bc_serv is NULL (git-fixes).\n- zonefs: Clear inode information flags on inode creation (git-fixes).\n- zonefs: Fix management of open zones (git-fixes).\n- zonefs: add MODULE_ALIAS_FS (git-fixes).\n",
        "title": "Description of the patch"
      },
      {
        "category": "details",
        "text": "SUSE-2022-3293,SUSE-SLE-Module-Basesystem-15-SP4-2022-3293,SUSE-SLE-Module-Development-Tools-15-SP4-2022-3293,SUSE-SLE-Module-Legacy-15-SP4-2022-3293,SUSE-SLE-Module-Live-Patching-15-SP4-2022-3293,SUSE-SLE-Product-HA-15-SP4-2022-3293,SUSE-SLE-Product-WE-15-SP4-2022-3293,openSUSE-SLE-15.4-2022-3293",
        "title": "Patchnames"
      },
      {
        "category": "legal_disclaimer",
        "text": "CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).",
        "title": "Terms of use"
      }
    ],
    "publisher": {
      "category": "vendor",
      "contact_details": "https://www.suse.com/support/security/contact/",
      "name": "SUSE Product Security Team",
      "namespace": "https://www.suse.com/"
    },
    "references": [
      {
        "category": "external",
        "summary": "SUSE ratings",
        "url": "https://www.suse.com/support/security/rating/"
      },
      {
        "category": "self",
        "summary": "URL of this CSAF notice",
        "url": "https://ftp.suse.com/pub/projects/security/csaf/suse-su-2022_3293-1.json"
      },
      {
        "category": "self",
        "summary": "URL for SUSE-SU-2022:3293-1",
        "url": "https://www.suse.com/support/update/announcement/2022/suse-su-20223293-1/"
      },
      {
        "category": "self",
        "summary": "E-Mail link for SUSE-SU-2022:3293-1",
        "url": "https://lists.suse.com/pipermail/sle-security-updates/2022-September/012273.html"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1023051",
        "url": "https://bugzilla.suse.com/1023051"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1032323",
        "url": "https://bugzilla.suse.com/1032323"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1065729",
        "url": "https://bugzilla.suse.com/1065729"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1156395",
        "url": "https://bugzilla.suse.com/1156395"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1190497",
        "url": "https://bugzilla.suse.com/1190497"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1194592",
        "url": "https://bugzilla.suse.com/1194592"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1194869",
        "url": "https://bugzilla.suse.com/1194869"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1194904",
        "url": "https://bugzilla.suse.com/1194904"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1195480",
        "url": "https://bugzilla.suse.com/1195480"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1195917",
        "url": "https://bugzilla.suse.com/1195917"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1196616",
        "url": "https://bugzilla.suse.com/1196616"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1197158",
        "url": "https://bugzilla.suse.com/1197158"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1197391",
        "url": "https://bugzilla.suse.com/1197391"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1197755",
        "url": "https://bugzilla.suse.com/1197755"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1197756",
        "url": "https://bugzilla.suse.com/1197756"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1197757",
        "url": "https://bugzilla.suse.com/1197757"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1197763",
        "url": "https://bugzilla.suse.com/1197763"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1198410",
        "url": "https://bugzilla.suse.com/1198410"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1198971",
        "url": "https://bugzilla.suse.com/1198971"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1199086",
        "url": "https://bugzilla.suse.com/1199086"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1199364",
        "url": "https://bugzilla.suse.com/1199364"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1199670",
        "url": "https://bugzilla.suse.com/1199670"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1200313",
        "url": "https://bugzilla.suse.com/1200313"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1200431",
        "url": "https://bugzilla.suse.com/1200431"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1200465",
        "url": "https://bugzilla.suse.com/1200465"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1200544",
        "url": "https://bugzilla.suse.com/1200544"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1200845",
        "url": "https://bugzilla.suse.com/1200845"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1200868",
        "url": "https://bugzilla.suse.com/1200868"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1200869",
        "url": "https://bugzilla.suse.com/1200869"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1200870",
        "url": "https://bugzilla.suse.com/1200870"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1200871",
        "url": "https://bugzilla.suse.com/1200871"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1200872",
        "url": "https://bugzilla.suse.com/1200872"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1200873",
        "url": "https://bugzilla.suse.com/1200873"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1201019",
        "url": "https://bugzilla.suse.com/1201019"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1201308",
        "url": "https://bugzilla.suse.com/1201308"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1201427",
        "url": "https://bugzilla.suse.com/1201427"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1201442",
        "url": "https://bugzilla.suse.com/1201442"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1201455",
        "url": "https://bugzilla.suse.com/1201455"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1201489",
        "url": "https://bugzilla.suse.com/1201489"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1201610",
        "url": "https://bugzilla.suse.com/1201610"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1201675",
        "url": "https://bugzilla.suse.com/1201675"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1201725",
        "url": "https://bugzilla.suse.com/1201725"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1201768",
        "url": "https://bugzilla.suse.com/1201768"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1201940",
        "url": "https://bugzilla.suse.com/1201940"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1201956",
        "url": "https://bugzilla.suse.com/1201956"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1201958",
        "url": "https://bugzilla.suse.com/1201958"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1202096",
        "url": "https://bugzilla.suse.com/1202096"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1202097",
        "url": "https://bugzilla.suse.com/1202097"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1202113",
        "url": "https://bugzilla.suse.com/1202113"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1202131",
        "url": "https://bugzilla.suse.com/1202131"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1202154",
        "url": "https://bugzilla.suse.com/1202154"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1202262",
        "url": "https://bugzilla.suse.com/1202262"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1202265",
        "url": "https://bugzilla.suse.com/1202265"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1202312",
        "url": "https://bugzilla.suse.com/1202312"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1202346",
        "url": "https://bugzilla.suse.com/1202346"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1202347",
        "url": "https://bugzilla.suse.com/1202347"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1202385",
        "url": "https://bugzilla.suse.com/1202385"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1202393",
        "url": "https://bugzilla.suse.com/1202393"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1202447",
        "url": "https://bugzilla.suse.com/1202447"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1202471",
        "url": "https://bugzilla.suse.com/1202471"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1202558",
        "url": "https://bugzilla.suse.com/1202558"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1202564",
        "url": "https://bugzilla.suse.com/1202564"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1202623",
        "url": "https://bugzilla.suse.com/1202623"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1202636",
        "url": "https://bugzilla.suse.com/1202636"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1202672",
        "url": "https://bugzilla.suse.com/1202672"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1202681",
        "url": "https://bugzilla.suse.com/1202681"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1202710",
        "url": "https://bugzilla.suse.com/1202710"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1202711",
        "url": "https://bugzilla.suse.com/1202711"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1202712",
        "url": "https://bugzilla.suse.com/1202712"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1202713",
        "url": "https://bugzilla.suse.com/1202713"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1202715",
        "url": "https://bugzilla.suse.com/1202715"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1202716",
        "url": "https://bugzilla.suse.com/1202716"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1202757",
        "url": "https://bugzilla.suse.com/1202757"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1202758",
        "url": "https://bugzilla.suse.com/1202758"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1202759",
        "url": "https://bugzilla.suse.com/1202759"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1202761",
        "url": "https://bugzilla.suse.com/1202761"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1202762",
        "url": "https://bugzilla.suse.com/1202762"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1202763",
        "url": "https://bugzilla.suse.com/1202763"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1202764",
        "url": "https://bugzilla.suse.com/1202764"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1202765",
        "url": "https://bugzilla.suse.com/1202765"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1202766",
        "url": "https://bugzilla.suse.com/1202766"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1202767",
        "url": "https://bugzilla.suse.com/1202767"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1202768",
        "url": "https://bugzilla.suse.com/1202768"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1202769",
        "url": "https://bugzilla.suse.com/1202769"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1202770",
        "url": "https://bugzilla.suse.com/1202770"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1202771",
        "url": "https://bugzilla.suse.com/1202771"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1202773",
        "url": "https://bugzilla.suse.com/1202773"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1202774",
        "url": "https://bugzilla.suse.com/1202774"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1202775",
        "url": "https://bugzilla.suse.com/1202775"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1202776",
        "url": "https://bugzilla.suse.com/1202776"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1202778",
        "url": "https://bugzilla.suse.com/1202778"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1202779",
        "url": "https://bugzilla.suse.com/1202779"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1202780",
        "url": "https://bugzilla.suse.com/1202780"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1202781",
        "url": "https://bugzilla.suse.com/1202781"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1202782",
        "url": "https://bugzilla.suse.com/1202782"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1202783",
        "url": "https://bugzilla.suse.com/1202783"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1202822",
        "url": "https://bugzilla.suse.com/1202822"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1202823",
        "url": "https://bugzilla.suse.com/1202823"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1202824",
        "url": "https://bugzilla.suse.com/1202824"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1202860",
        "url": "https://bugzilla.suse.com/1202860"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1202867",
        "url": "https://bugzilla.suse.com/1202867"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1202874",
        "url": "https://bugzilla.suse.com/1202874"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1202898",
        "url": "https://bugzilla.suse.com/1202898"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1203036",
        "url": "https://bugzilla.suse.com/1203036"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1203041",
        "url": "https://bugzilla.suse.com/1203041"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1203063",
        "url": "https://bugzilla.suse.com/1203063"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1203107",
        "url": "https://bugzilla.suse.com/1203107"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1203117",
        "url": "https://bugzilla.suse.com/1203117"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1203138",
        "url": "https://bugzilla.suse.com/1203138"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1203139",
        "url": "https://bugzilla.suse.com/1203139"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1203159",
        "url": "https://bugzilla.suse.com/1203159"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2016-3695 page",
        "url": "https://www.suse.com/security/cve/CVE-2016-3695/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2020-36516 page",
        "url": "https://www.suse.com/security/cve/CVE-2020-36516/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2021-33135 page",
        "url": "https://www.suse.com/security/cve/CVE-2021-33135/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2021-4037 page",
        "url": "https://www.suse.com/security/cve/CVE-2021-4037/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2022-20368 page",
        "url": "https://www.suse.com/security/cve/CVE-2022-20368/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2022-20369 page",
        "url": "https://www.suse.com/security/cve/CVE-2022-20369/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2022-2588 page",
        "url": "https://www.suse.com/security/cve/CVE-2022-2588/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2022-2639 page",
        "url": "https://www.suse.com/security/cve/CVE-2022-2639/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2022-2663 page",
        "url": "https://www.suse.com/security/cve/CVE-2022-2663/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2022-28356 page",
        "url": "https://www.suse.com/security/cve/CVE-2022-28356/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2022-28693 page",
        "url": "https://www.suse.com/security/cve/CVE-2022-28693/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2022-2873 page",
        "url": "https://www.suse.com/security/cve/CVE-2022-2873/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2022-2905 page",
        "url": "https://www.suse.com/security/cve/CVE-2022-2905/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2022-2938 page",
        "url": "https://www.suse.com/security/cve/CVE-2022-2938/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2022-2959 page",
        "url": "https://www.suse.com/security/cve/CVE-2022-2959/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2022-2977 page",
        "url": "https://www.suse.com/security/cve/CVE-2022-2977/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2022-3028 page",
        "url": "https://www.suse.com/security/cve/CVE-2022-3028/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2022-3078 page",
        "url": "https://www.suse.com/security/cve/CVE-2022-3078/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2022-32250 page",
        "url": "https://www.suse.com/security/cve/CVE-2022-32250/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2022-36879 page",
        "url": "https://www.suse.com/security/cve/CVE-2022-36879/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2022-36946 page",
        "url": "https://www.suse.com/security/cve/CVE-2022-36946/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2022-39188 page",
        "url": "https://www.suse.com/security/cve/CVE-2022-39188/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2022-39190 page",
        "url": "https://www.suse.com/security/cve/CVE-2022-39190/"
      }
    ],
    "title": "Security update for the Linux Kernel",
    "tracking": {
      "current_release_date": "2022-09-16T15:30:19Z",
      "generator": {
        "date": "2022-09-16T15:30:19Z",
        "engine": {
          "name": "cve-database.git:bin/generate-csaf.pl",
          "version": "1"
        }
      },
      "id": "SUSE-SU-2022:3293-1",
      "initial_release_date": "2022-09-16T15:30:19Z",
      "revision_history": [
        {
          "date": "2022-09-16T15:30:19Z",
          "number": "1",
          "summary": "Current version"
        }
      ],
      "status": "final",
      "version": "1"
    }
  },
  "product_tree": {
    "branches": [
      {
        "branches": [
          {
            "branches": [
              {
                "category": "product_version",
                "name": "cluster-md-kmp-64kb-5.14.21-150400.24.21.2.aarch64",
                "product": {
                  "name": "cluster-md-kmp-64kb-5.14.21-150400.24.21.2.aarch64",
                  "product_id": "cluster-md-kmp-64kb-5.14.21-150400.24.21.2.aarch64"
                }
              },
              {
                "category": "product_version",
                "name": "cluster-md-kmp-default-5.14.21-150400.24.21.2.aarch64",
                "product": {
                  "name": "cluster-md-kmp-default-5.14.21-150400.24.21.2.aarch64",
                  "product_id": "cluster-md-kmp-default-5.14.21-150400.24.21.2.aarch64"
                }
              },
              {
                "category": "product_version",
                "name": "dlm-kmp-64kb-5.14.21-150400.24.21.2.aarch64",
                "product": {
                  "name": "dlm-kmp-64kb-5.14.21-150400.24.21.2.aarch64",
                  "product_id": "dlm-kmp-64kb-5.14.21-150400.24.21.2.aarch64"
                }
              },
              {
                "category": "product_version",
                "name": "dlm-kmp-default-5.14.21-150400.24.21.2.aarch64",
                "product": {
                  "name": "dlm-kmp-default-5.14.21-150400.24.21.2.aarch64",
                  "product_id": "dlm-kmp-default-5.14.21-150400.24.21.2.aarch64"
                }
              },
              {
                "category": "product_version",
                "name": "dtb-allwinner-5.14.21-150400.24.21.1.aarch64",
                "product": {
                  "name": "dtb-allwinner-5.14.21-150400.24.21.1.aarch64",
                  "product_id": "dtb-allwinner-5.14.21-150400.24.21.1.aarch64"
                }
              },
              {
                "category": "product_version",
                "name": "dtb-altera-5.14.21-150400.24.21.1.aarch64",
                "product": {
                  "name": "dtb-altera-5.14.21-150400.24.21.1.aarch64",
                  "product_id": "dtb-altera-5.14.21-150400.24.21.1.aarch64"
                }
              },
              {
                "category": "product_version",
                "name": "dtb-amazon-5.14.21-150400.24.21.1.aarch64",
                "product": {
                  "name": "dtb-amazon-5.14.21-150400.24.21.1.aarch64",
                  "product_id": "dtb-amazon-5.14.21-150400.24.21.1.aarch64"
                }
              },
              {
                "category": "product_version",
                "name": "dtb-amd-5.14.21-150400.24.21.1.aarch64",
                "product": {
                  "name": "dtb-amd-5.14.21-150400.24.21.1.aarch64",
                  "product_id": "dtb-amd-5.14.21-150400.24.21.1.aarch64"
                }
              },
              {
                "category": "product_version",
                "name": "dtb-amlogic-5.14.21-150400.24.21.1.aarch64",
                "product": {
                  "name": "dtb-amlogic-5.14.21-150400.24.21.1.aarch64",
                  "product_id": "dtb-amlogic-5.14.21-150400.24.21.1.aarch64"
                }
              },
              {
                "category": "product_version",
                "name": "dtb-apm-5.14.21-150400.24.21.1.aarch64",
                "product": {
                  "name": "dtb-apm-5.14.21-150400.24.21.1.aarch64",
                  "product_id": "dtb-apm-5.14.21-150400.24.21.1.aarch64"
                }
              },
              {
                "category": "product_version",
                "name": "dtb-apple-5.14.21-150400.24.21.1.aarch64",
                "product": {
                  "name": "dtb-apple-5.14.21-150400.24.21.1.aarch64",
                  "product_id": "dtb-apple-5.14.21-150400.24.21.1.aarch64"
                }
              },
              {
                "category": "product_version",
                "name": "dtb-arm-5.14.21-150400.24.21.1.aarch64",
                "product": {
                  "name": "dtb-arm-5.14.21-150400.24.21.1.aarch64",
                  "product_id": "dtb-arm-5.14.21-150400.24.21.1.aarch64"
                }
              },
              {
                "category": "product_version",
                "name": "dtb-broadcom-5.14.21-150400.24.21.1.aarch64",
                "product": {
                  "name": "dtb-broadcom-5.14.21-150400.24.21.1.aarch64",
                  "product_id": "dtb-broadcom-5.14.21-150400.24.21.1.aarch64"
                }
              },
              {
                "category": "product_version",
                "name": "dtb-cavium-5.14.21-150400.24.21.1.aarch64",
                "product": {
                  "name": "dtb-cavium-5.14.21-150400.24.21.1.aarch64",
                  "product_id": "dtb-cavium-5.14.21-150400.24.21.1.aarch64"
                }
              },
              {
                "category": "product_version",
                "name": "dtb-exynos-5.14.21-150400.24.21.1.aarch64",
                "product": {
                  "name": "dtb-exynos-5.14.21-150400.24.21.1.aarch64",
                  "product_id": "dtb-exynos-5.14.21-150400.24.21.1.aarch64"
                }
              },
              {
                "category": "product_version",
                "name": "dtb-freescale-5.14.21-150400.24.21.1.aarch64",
                "product": {
                  "name": "dtb-freescale-5.14.21-150400.24.21.1.aarch64",
                  "product_id": "dtb-freescale-5.14.21-150400.24.21.1.aarch64"
                }
              },
              {
                "category": "product_version",
                "name": "dtb-hisilicon-5.14.21-150400.24.21.1.aarch64",
                "product": {
                  "name": "dtb-hisilicon-5.14.21-150400.24.21.1.aarch64",
                  "product_id": "dtb-hisilicon-5.14.21-150400.24.21.1.aarch64"
                }
              },
              {
                "category": "product_version",
                "name": "dtb-lg-5.14.21-150400.24.21.1.aarch64",
                "product": {
                  "name": "dtb-lg-5.14.21-150400.24.21.1.aarch64",
                  "product_id": "dtb-lg-5.14.21-150400.24.21.1.aarch64"
                }
              },
              {
                "category": "product_version",
                "name": "dtb-marvell-5.14.21-150400.24.21.1.aarch64",
                "product": {
                  "name": "dtb-marvell-5.14.21-150400.24.21.1.aarch64",
                  "product_id": "dtb-marvell-5.14.21-150400.24.21.1.aarch64"
                }
              },
              {
                "category": "product_version",
                "name": "dtb-mediatek-5.14.21-150400.24.21.1.aarch64",
                "product": {
                  "name": "dtb-mediatek-5.14.21-150400.24.21.1.aarch64",
                  "product_id": "dtb-mediatek-5.14.21-150400.24.21.1.aarch64"
                }
              },
              {
                "category": "product_version",
                "name": "dtb-nvidia-5.14.21-150400.24.21.1.aarch64",
                "product": {
                  "name": "dtb-nvidia-5.14.21-150400.24.21.1.aarch64",
                  "product_id": "dtb-nvidia-5.14.21-150400.24.21.1.aarch64"
                }
              },
              {
                "category": "product_version",
                "name": "dtb-qcom-5.14.21-150400.24.21.1.aarch64",
                "product": {
                  "name": "dtb-qcom-5.14.21-150400.24.21.1.aarch64",
                  "product_id": "dtb-qcom-5.14.21-150400.24.21.1.aarch64"
                }
              },
              {
                "category": "product_version",
                "name": "dtb-renesas-5.14.21-150400.24.21.1.aarch64",
                "product": {
                  "name": "dtb-renesas-5.14.21-150400.24.21.1.aarch64",
                  "product_id": "dtb-renesas-5.14.21-150400.24.21.1.aarch64"
                }
              },
              {
                "category": "product_version",
                "name": "dtb-rockchip-5.14.21-150400.24.21.1.aarch64",
                "product": {
                  "name": "dtb-rockchip-5.14.21-150400.24.21.1.aarch64",
                  "product_id": "dtb-rockchip-5.14.21-150400.24.21.1.aarch64"
                }
              },
              {
                "category": "product_version",
                "name": "dtb-socionext-5.14.21-150400.24.21.1.aarch64",
                "product": {
                  "name": "dtb-socionext-5.14.21-150400.24.21.1.aarch64",
                  "product_id": "dtb-socionext-5.14.21-150400.24.21.1.aarch64"
                }
              },
              {
                "category": "product_version",
                "name": "dtb-sprd-5.14.21-150400.24.21.1.aarch64",
                "product": {
                  "name": "dtb-sprd-5.14.21-150400.24.21.1.aarch64",
                  "product_id": "dtb-sprd-5.14.21-150400.24.21.1.aarch64"
                }
              },
              {
                "category": "product_version",
                "name": "dtb-xilinx-5.14.21-150400.24.21.1.aarch64",
                "product": {
                  "name": "dtb-xilinx-5.14.21-150400.24.21.1.aarch64",
                  "product_id": "dtb-xilinx-5.14.21-150400.24.21.1.aarch64"
                }
              },
              {
                "category": "product_version",
                "name": "gfs2-kmp-64kb-5.14.21-150400.24.21.2.aarch64",
                "product": {
                  "name": "gfs2-kmp-64kb-5.14.21-150400.24.21.2.aarch64",
                  "product_id": "gfs2-kmp-64kb-5.14.21-150400.24.21.2.aarch64"
                }
              },
              {
                "category": "product_version",
                "name": "gfs2-kmp-default-5.14.21-150400.24.21.2.aarch64",
                "product": {
                  "name": "gfs2-kmp-default-5.14.21-150400.24.21.2.aarch64",
                  "product_id": "gfs2-kmp-default-5.14.21-150400.24.21.2.aarch64"
                }
              },
              {
                "category": "product_version",
                "name": "kernel-64kb-5.14.21-150400.24.21.2.aarch64",
                "product": {
                  "name": "kernel-64kb-5.14.21-150400.24.21.2.aarch64",
                  "product_id": "kernel-64kb-5.14.21-150400.24.21.2.aarch64"
                }
              },
              {
                "category": "product_version",
                "name": "kernel-64kb-devel-5.14.21-150400.24.21.2.aarch64",
                "product": {
                  "name": "kernel-64kb-devel-5.14.21-150400.24.21.2.aarch64",
                  "product_id": "kernel-64kb-devel-5.14.21-150400.24.21.2.aarch64"
                }
              },
              {
                "category": "product_version",
                "name": "kernel-64kb-extra-5.14.21-150400.24.21.2.aarch64",
                "product": {
                  "name": "kernel-64kb-extra-5.14.21-150400.24.21.2.aarch64",
                  "product_id": "kernel-64kb-extra-5.14.21-150400.24.21.2.aarch64"
                }
              },
              {
                "category": "product_version",
                "name": "kernel-64kb-livepatch-devel-5.14.21-150400.24.21.2.aarch64",
                "product": {
                  "name": "kernel-64kb-livepatch-devel-5.14.21-150400.24.21.2.aarch64",
                  "product_id": "kernel-64kb-livepatch-devel-5.14.21-150400.24.21.2.aarch64"
                }
              },
              {
                "category": "product_version",
                "name": "kernel-64kb-optional-5.14.21-150400.24.21.2.aarch64",
                "product": {
                  "name": "kernel-64kb-optional-5.14.21-150400.24.21.2.aarch64",
                  "product_id": "kernel-64kb-optional-5.14.21-150400.24.21.2.aarch64"
                }
              },
              {
                "category": "product_version",
                "name": "kernel-default-5.14.21-150400.24.21.2.aarch64",
                "product": {
                  "name": "kernel-default-5.14.21-150400.24.21.2.aarch64",
                  "product_id": "kernel-default-5.14.21-150400.24.21.2.aarch64"
                }
              },
              {
                "category": "product_version",
                "name": "kernel-default-base-5.14.21-150400.24.21.2.150400.24.7.2.aarch64",
                "product": {
                  "name": "kernel-default-base-5.14.21-150400.24.21.2.150400.24.7.2.aarch64",
                  "product_id": "kernel-default-base-5.14.21-150400.24.21.2.150400.24.7.2.aarch64"
                }
              },
              {
                "category": "product_version",
                "name": "kernel-default-base-rebuild-5.14.21-150400.24.21.2.150400.24.7.2.aarch64",
                "product": {
                  "name": "kernel-default-base-rebuild-5.14.21-150400.24.21.2.150400.24.7.2.aarch64",
                  "product_id": "kernel-default-base-rebuild-5.14.21-150400.24.21.2.150400.24.7.2.aarch64"
                }
              },
              {
                "category": "product_version",
                "name": "kernel-default-devel-5.14.21-150400.24.21.2.aarch64",
                "product": {
                  "name": "kernel-default-devel-5.14.21-150400.24.21.2.aarch64",
                  "product_id": "kernel-default-devel-5.14.21-150400.24.21.2.aarch64"
                }
              },
              {
                "category": "product_version",
                "name": "kernel-default-extra-5.14.21-150400.24.21.2.aarch64",
                "product": {
                  "name": "kernel-default-extra-5.14.21-150400.24.21.2.aarch64",
                  "product_id": "kernel-default-extra-5.14.21-150400.24.21.2.aarch64"
                }
              },
              {
                "category": "product_version",
                "name": "kernel-default-livepatch-5.14.21-150400.24.21.2.aarch64",
                "product": {
                  "name": "kernel-default-livepatch-5.14.21-150400.24.21.2.aarch64",
                  "product_id": "kernel-default-livepatch-5.14.21-150400.24.21.2.aarch64"
                }
              },
              {
                "category": "product_version",
                "name": "kernel-default-livepatch-devel-5.14.21-150400.24.21.2.aarch64",
                "product": {
                  "name": "kernel-default-livepatch-devel-5.14.21-150400.24.21.2.aarch64",
                  "product_id": "kernel-default-livepatch-devel-5.14.21-150400.24.21.2.aarch64"
                }
              },
              {
                "category": "product_version",
                "name": "kernel-default-optional-5.14.21-150400.24.21.2.aarch64",
                "product": {
                  "name": "kernel-default-optional-5.14.21-150400.24.21.2.aarch64",
                  "product_id": "kernel-default-optional-5.14.21-150400.24.21.2.aarch64"
                }
              },
              {
                "category": "product_version",
                "name": "kernel-kvmsmall-5.14.21-150400.24.21.2.aarch64",
                "product": {
                  "name": "kernel-kvmsmall-5.14.21-150400.24.21.2.aarch64",
                  "product_id": "kernel-kvmsmall-5.14.21-150400.24.21.2.aarch64"
                }
              },
              {
                "category": "product_version",
                "name": "kernel-kvmsmall-devel-5.14.21-150400.24.21.2.aarch64",
                "product": {
                  "name": "kernel-kvmsmall-devel-5.14.21-150400.24.21.2.aarch64",
                  "product_id": "kernel-kvmsmall-devel-5.14.21-150400.24.21.2.aarch64"
                }
              },
              {
                "category": "product_version",
                "name": "kernel-kvmsmall-livepatch-devel-5.14.21-150400.24.21.2.aarch64",
                "product": {
                  "name": "kernel-kvmsmall-livepatch-devel-5.14.21-150400.24.21.2.aarch64",
                  "product_id": "kernel-kvmsmall-livepatch-devel-5.14.21-150400.24.21.2.aarch64"
                }
              },
              {
                "category": "product_version",
                "name": "kernel-obs-build-5.14.21-150400.24.21.2.aarch64",
                "product": {
                  "name": "kernel-obs-build-5.14.21-150400.24.21.2.aarch64",
                  "product_id": "kernel-obs-build-5.14.21-150400.24.21.2.aarch64"
                }
              },
              {
                "category": "product_version",
                "name": "kernel-obs-qa-5.14.21-150400.24.21.1.aarch64",
                "product": {
                  "name": "kernel-obs-qa-5.14.21-150400.24.21.1.aarch64",
                  "product_id": "kernel-obs-qa-5.14.21-150400.24.21.1.aarch64"
                }
              },
              {
                "category": "product_version",
                "name": "kernel-syms-5.14.21-150400.24.21.1.aarch64",
                "product": {
                  "name": "kernel-syms-5.14.21-150400.24.21.1.aarch64",
                  "product_id": "kernel-syms-5.14.21-150400.24.21.1.aarch64"
                }
              },
              {
                "category": "product_version",
                "name": "kselftests-kmp-64kb-5.14.21-150400.24.21.2.aarch64",
                "product": {
                  "name": "kselftests-kmp-64kb-5.14.21-150400.24.21.2.aarch64",
                  "product_id": "kselftests-kmp-64kb-5.14.21-150400.24.21.2.aarch64"
                }
              },
              {
                "category": "product_version",
                "name": "kselftests-kmp-default-5.14.21-150400.24.21.2.aarch64",
                "product": {
                  "name": "kselftests-kmp-default-5.14.21-150400.24.21.2.aarch64",
                  "product_id": "kselftests-kmp-default-5.14.21-150400.24.21.2.aarch64"
                }
              },
              {
                "category": "product_version",
                "name": "ocfs2-kmp-64kb-5.14.21-150400.24.21.2.aarch64",
                "product": {
                  "name": "ocfs2-kmp-64kb-5.14.21-150400.24.21.2.aarch64",
                  "product_id": "ocfs2-kmp-64kb-5.14.21-150400.24.21.2.aarch64"
                }
              },
              {
                "category": "product_version",
                "name": "ocfs2-kmp-default-5.14.21-150400.24.21.2.aarch64",
                "product": {
                  "name": "ocfs2-kmp-default-5.14.21-150400.24.21.2.aarch64",
                  "product_id": "ocfs2-kmp-default-5.14.21-150400.24.21.2.aarch64"
                }
              },
              {
                "category": "product_version",
                "name": "reiserfs-kmp-64kb-5.14.21-150400.24.21.2.aarch64",
                "product": {
                  "name": "reiserfs-kmp-64kb-5.14.21-150400.24.21.2.aarch64",
                  "product_id": "reiserfs-kmp-64kb-5.14.21-150400.24.21.2.aarch64"
                }
              },
              {
                "category": "product_version",
                "name": "reiserfs-kmp-default-5.14.21-150400.24.21.2.aarch64",
                "product": {
                  "name": "reiserfs-kmp-default-5.14.21-150400.24.21.2.aarch64",
                  "product_id": "reiserfs-kmp-default-5.14.21-150400.24.21.2.aarch64"
                }
              }
            ],
            "category": "architecture",
            "name": "aarch64"
          },
          {
            "branches": [
              {
                "category": "product_version",
                "name": "kernel-devel-5.14.21-150400.24.21.2.noarch",
                "product": {
                  "name": "kernel-devel-5.14.21-150400.24.21.2.noarch",
                  "product_id": "kernel-devel-5.14.21-150400.24.21.2.noarch"
                }
              },
              {
                "category": "product_version",
                "name": "kernel-docs-5.14.21-150400.24.21.3.noarch",
                "product": {
                  "name": "kernel-docs-5.14.21-150400.24.21.3.noarch",
                  "product_id": "kernel-docs-5.14.21-150400.24.21.3.noarch"
                }
              },
              {
                "category": "product_version",
                "name": "kernel-docs-html-5.14.21-150400.24.21.3.noarch",
                "product": {
                  "name": "kernel-docs-html-5.14.21-150400.24.21.3.noarch",
                  "product_id": "kernel-docs-html-5.14.21-150400.24.21.3.noarch"
                }
              },
              {
                "category": "product_version",
                "name": "kernel-macros-5.14.21-150400.24.21.2.noarch",
                "product": {
                  "name": "kernel-macros-5.14.21-150400.24.21.2.noarch",
                  "product_id": "kernel-macros-5.14.21-150400.24.21.2.noarch"
                }
              },
              {
                "category": "product_version",
                "name": "kernel-source-5.14.21-150400.24.21.2.noarch",
                "product": {
                  "name": "kernel-source-5.14.21-150400.24.21.2.noarch",
                  "product_id": "kernel-source-5.14.21-150400.24.21.2.noarch"
                }
              },
              {
                "category": "product_version",
                "name": "kernel-source-vanilla-5.14.21-150400.24.21.2.noarch",
                "product": {
                  "name": "kernel-source-vanilla-5.14.21-150400.24.21.2.noarch",
                  "product_id": "kernel-source-vanilla-5.14.21-150400.24.21.2.noarch"
                }
              }
            ],
            "category": "architecture",
            "name": "noarch"
          },
          {
            "branches": [
              {
                "category": "product_version",
                "name": "cluster-md-kmp-default-5.14.21-150400.24.21.2.ppc64le",
                "product": {
                  "name": "cluster-md-kmp-default-5.14.21-150400.24.21.2.ppc64le",
                  "product_id": "cluster-md-kmp-default-5.14.21-150400.24.21.2.ppc64le"
                }
              },
              {
                "category": "product_version",
                "name": "dlm-kmp-default-5.14.21-150400.24.21.2.ppc64le",
                "product": {
                  "name": "dlm-kmp-default-5.14.21-150400.24.21.2.ppc64le",
                  "product_id": "dlm-kmp-default-5.14.21-150400.24.21.2.ppc64le"
                }
              },
              {
                "category": "product_version",
                "name": "gfs2-kmp-default-5.14.21-150400.24.21.2.ppc64le",
                "product": {
                  "name": "gfs2-kmp-default-5.14.21-150400.24.21.2.ppc64le",
                  "product_id": "gfs2-kmp-default-5.14.21-150400.24.21.2.ppc64le"
                }
              },
              {
                "category": "product_version",
                "name": "kernel-debug-5.14.21-150400.24.21.2.ppc64le",
                "product": {
                  "name": "kernel-debug-5.14.21-150400.24.21.2.ppc64le",
                  "product_id": "kernel-debug-5.14.21-150400.24.21.2.ppc64le"
                }
              },
              {
                "category": "product_version",
                "name": "kernel-debug-devel-5.14.21-150400.24.21.2.ppc64le",
                "product": {
                  "name": "kernel-debug-devel-5.14.21-150400.24.21.2.ppc64le",
                  "product_id": "kernel-debug-devel-5.14.21-150400.24.21.2.ppc64le"
                }
              },
              {
                "category": "product_version",
                "name": "kernel-debug-livepatch-devel-5.14.21-150400.24.21.2.ppc64le",
                "product": {
                  "name": "kernel-debug-livepatch-devel-5.14.21-150400.24.21.2.ppc64le",
                  "product_id": "kernel-debug-livepatch-devel-5.14.21-150400.24.21.2.ppc64le"
                }
              },
              {
                "category": "product_version",
                "name": "kernel-default-5.14.21-150400.24.21.2.ppc64le",
                "product": {
                  "name": "kernel-default-5.14.21-150400.24.21.2.ppc64le",
                  "product_id": "kernel-default-5.14.21-150400.24.21.2.ppc64le"
                }
              },
              {
                "category": "product_version",
                "name": "kernel-default-base-5.14.21-150400.24.21.2.150400.24.7.2.ppc64le",
                "product": {
                  "name": "kernel-default-base-5.14.21-150400.24.21.2.150400.24.7.2.ppc64le",
                  "product_id": "kernel-default-base-5.14.21-150400.24.21.2.150400.24.7.2.ppc64le"
                }
              },
              {
                "category": "product_version",
                "name": "kernel-default-base-rebuild-5.14.21-150400.24.21.2.150400.24.7.2.ppc64le",
                "product": {
                  "name": "kernel-default-base-rebuild-5.14.21-150400.24.21.2.150400.24.7.2.ppc64le",
                  "product_id": "kernel-default-base-rebuild-5.14.21-150400.24.21.2.150400.24.7.2.ppc64le"
                }
              },
              {
                "category": "product_version",
                "name": "kernel-default-devel-5.14.21-150400.24.21.2.ppc64le",
                "product": {
                  "name": "kernel-default-devel-5.14.21-150400.24.21.2.ppc64le",
                  "product_id": "kernel-default-devel-5.14.21-150400.24.21.2.ppc64le"
                }
              },
              {
                "category": "product_version",
                "name": "kernel-default-extra-5.14.21-150400.24.21.2.ppc64le",
                "product": {
                  "name": "kernel-default-extra-5.14.21-150400.24.21.2.ppc64le",
                  "product_id": "kernel-default-extra-5.14.21-150400.24.21.2.ppc64le"
                }
              },
              {
                "category": "product_version",
                "name": "kernel-default-livepatch-5.14.21-150400.24.21.2.ppc64le",
                "product": {
                  "name": "kernel-default-livepatch-5.14.21-150400.24.21.2.ppc64le",
                  "product_id": "kernel-default-livepatch-5.14.21-150400.24.21.2.ppc64le"
                }
              },
              {
                "category": "product_version",
                "name": "kernel-default-livepatch-devel-5.14.21-150400.24.21.2.ppc64le",
                "product": {
                  "name": "kernel-default-livepatch-devel-5.14.21-150400.24.21.2.ppc64le",
                  "product_id": "kernel-default-livepatch-devel-5.14.21-150400.24.21.2.ppc64le"
                }
              },
              {
                "category": "product_version",
                "name": "kernel-default-optional-5.14.21-150400.24.21.2.ppc64le",
                "product": {
                  "name": "kernel-default-optional-5.14.21-150400.24.21.2.ppc64le",
                  "product_id": "kernel-default-optional-5.14.21-150400.24.21.2.ppc64le"
                }
              },
              {
                "category": "product_version",
                "name": "kernel-kvmsmall-5.14.21-150400.24.21.2.ppc64le",
                "product": {
                  "name": "kernel-kvmsmall-5.14.21-150400.24.21.2.ppc64le",
                  "product_id": "kernel-kvmsmall-5.14.21-150400.24.21.2.ppc64le"
                }
              },
              {
                "category": "product_version",
                "name": "kernel-kvmsmall-devel-5.14.21-150400.24.21.2.ppc64le",
                "product": {
                  "name": "kernel-kvmsmall-devel-5.14.21-150400.24.21.2.ppc64le",
                  "product_id": "kernel-kvmsmall-devel-5.14.21-150400.24.21.2.ppc64le"
                }
              },
              {
                "category": "product_version",
                "name": "kernel-kvmsmall-livepatch-devel-5.14.21-150400.24.21.2.ppc64le",
                "product": {
                  "name": "kernel-kvmsmall-livepatch-devel-5.14.21-150400.24.21.2.ppc64le",
                  "product_id": "kernel-kvmsmall-livepatch-devel-5.14.21-150400.24.21.2.ppc64le"
                }
              },
              {
                "category": "product_version",
                "name": "kernel-livepatch-5_14_21-150400_24_21-default-1-150400.9.3.2.ppc64le",
                "product": {
                  "name": "kernel-livepatch-5_14_21-150400_24_21-default-1-150400.9.3.2.ppc64le",
                  "product_id": "kernel-livepatch-5_14_21-150400_24_21-default-1-150400.9.3.2.ppc64le"
                }
              },
              {
                "category": "product_version",
                "name": "kernel-obs-build-5.14.21-150400.24.21.2.ppc64le",
                "product": {
                  "name": "kernel-obs-build-5.14.21-150400.24.21.2.ppc64le",
                  "product_id": "kernel-obs-build-5.14.21-150400.24.21.2.ppc64le"
                }
              },
              {
                "category": "product_version",
                "name": "kernel-obs-qa-5.14.21-150400.24.21.1.ppc64le",
                "product": {
                  "name": "kernel-obs-qa-5.14.21-150400.24.21.1.ppc64le",
                  "product_id": "kernel-obs-qa-5.14.21-150400.24.21.1.ppc64le"
                }
              },
              {
                "category": "product_version",
                "name": "kernel-syms-5.14.21-150400.24.21.1.ppc64le",
                "product": {
                  "name": "kernel-syms-5.14.21-150400.24.21.1.ppc64le",
                  "product_id": "kernel-syms-5.14.21-150400.24.21.1.ppc64le"
                }
              },
              {
                "category": "product_version",
                "name": "kselftests-kmp-default-5.14.21-150400.24.21.2.ppc64le",
                "product": {
                  "name": "kselftests-kmp-default-5.14.21-150400.24.21.2.ppc64le",
                  "product_id": "kselftests-kmp-default-5.14.21-150400.24.21.2.ppc64le"
                }
              },
              {
                "category": "product_version",
                "name": "ocfs2-kmp-default-5.14.21-150400.24.21.2.ppc64le",
                "product": {
                  "name": "ocfs2-kmp-default-5.14.21-150400.24.21.2.ppc64le",
                  "product_id": "ocfs2-kmp-default-5.14.21-150400.24.21.2.ppc64le"
                }
              },
              {
                "category": "product_version",
                "name": "reiserfs-kmp-default-5.14.21-150400.24.21.2.ppc64le",
                "product": {
                  "name": "reiserfs-kmp-default-5.14.21-150400.24.21.2.ppc64le",
                  "product_id": "reiserfs-kmp-default-5.14.21-150400.24.21.2.ppc64le"
                }
              }
            ],
            "category": "architecture",
            "name": "ppc64le"
          },
          {
            "branches": [
              {
                "category": "product_version",
                "name": "cluster-md-kmp-default-5.14.21-150400.24.21.2.s390x",
                "product": {
                  "name": "cluster-md-kmp-default-5.14.21-150400.24.21.2.s390x",
                  "product_id": "cluster-md-kmp-default-5.14.21-150400.24.21.2.s390x"
                }
              },
              {
                "category": "product_version",
                "name": "dlm-kmp-default-5.14.21-150400.24.21.2.s390x",
                "product": {
                  "name": "dlm-kmp-default-5.14.21-150400.24.21.2.s390x",
                  "product_id": "dlm-kmp-default-5.14.21-150400.24.21.2.s390x"
                }
              },
              {
                "category": "product_version",
                "name": "gfs2-kmp-default-5.14.21-150400.24.21.2.s390x",
                "product": {
                  "name": "gfs2-kmp-default-5.14.21-150400.24.21.2.s390x",
                  "product_id": "gfs2-kmp-default-5.14.21-150400.24.21.2.s390x"
                }
              },
              {
                "category": "product_version",
                "name": "kernel-default-5.14.21-150400.24.21.2.s390x",
                "product": {
                  "name": "kernel-default-5.14.21-150400.24.21.2.s390x",
                  "product_id": "kernel-default-5.14.21-150400.24.21.2.s390x"
                }
              },
              {
                "category": "product_version",
                "name": "kernel-default-base-5.14.21-150400.24.21.2.150400.24.7.2.s390x",
                "product": {
                  "name": "kernel-default-base-5.14.21-150400.24.21.2.150400.24.7.2.s390x",
                  "product_id": "kernel-default-base-5.14.21-150400.24.21.2.150400.24.7.2.s390x"
                }
              },
              {
                "category": "product_version",
                "name": "kernel-default-base-rebuild-5.14.21-150400.24.21.2.150400.24.7.2.s390x",
                "product": {
                  "name": "kernel-default-base-rebuild-5.14.21-150400.24.21.2.150400.24.7.2.s390x",
                  "product_id": "kernel-default-base-rebuild-5.14.21-150400.24.21.2.150400.24.7.2.s390x"
                }
              },
              {
                "category": "product_version",
                "name": "kernel-default-devel-5.14.21-150400.24.21.2.s390x",
                "product": {
                  "name": "kernel-default-devel-5.14.21-150400.24.21.2.s390x",
                  "product_id": "kernel-default-devel-5.14.21-150400.24.21.2.s390x"
                }
              },
              {
                "category": "product_version",
                "name": "kernel-default-extra-5.14.21-150400.24.21.2.s390x",
                "product": {
                  "name": "kernel-default-extra-5.14.21-150400.24.21.2.s390x",
                  "product_id": "kernel-default-extra-5.14.21-150400.24.21.2.s390x"
                }
              },
              {
                "category": "product_version",
                "name": "kernel-default-livepatch-5.14.21-150400.24.21.2.s390x",
                "product": {
                  "name": "kernel-default-livepatch-5.14.21-150400.24.21.2.s390x",
                  "product_id": "kernel-default-livepatch-5.14.21-150400.24.21.2.s390x"
                }
              },
              {
                "category": "product_version",
                "name": "kernel-default-livepatch-devel-5.14.21-150400.24.21.2.s390x",
                "product": {
                  "name": "kernel-default-livepatch-devel-5.14.21-150400.24.21.2.s390x",
                  "product_id": "kernel-default-livepatch-devel-5.14.21-150400.24.21.2.s390x"
                }
              },
              {
                "category": "product_version",
                "name": "kernel-default-optional-5.14.21-150400.24.21.2.s390x",
                "product": {
                  "name": "kernel-default-optional-5.14.21-150400.24.21.2.s390x",
                  "product_id": "kernel-default-optional-5.14.21-150400.24.21.2.s390x"
                }
              },
              {
                "category": "product_version",
                "name": "kernel-livepatch-5_14_21-150400_24_21-default-1-150400.9.3.2.s390x",
                "product": {
                  "name": "kernel-livepatch-5_14_21-150400_24_21-default-1-150400.9.3.2.s390x",
                  "product_id": "kernel-livepatch-5_14_21-150400_24_21-default-1-150400.9.3.2.s390x"
                }
              },
              {
                "category": "product_version",
                "name": "kernel-obs-build-5.14.21-150400.24.21.2.s390x",
                "product": {
                  "name": "kernel-obs-build-5.14.21-150400.24.21.2.s390x",
                  "product_id": "kernel-obs-build-5.14.21-150400.24.21.2.s390x"
                }
              },
              {
                "category": "product_version",
                "name": "kernel-obs-qa-5.14.21-150400.24.21.1.s390x",
                "product": {
                  "name": "kernel-obs-qa-5.14.21-150400.24.21.1.s390x",
                  "product_id": "kernel-obs-qa-5.14.21-150400.24.21.1.s390x"
                }
              },
              {
                "category": "product_version",
                "name": "kernel-syms-5.14.21-150400.24.21.1.s390x",
                "product": {
                  "name": "kernel-syms-5.14.21-150400.24.21.1.s390x",
                  "product_id": "kernel-syms-5.14.21-150400.24.21.1.s390x"
                }
              },
              {
                "category": "product_version",
                "name": "kernel-zfcpdump-5.14.21-150400.24.21.2.s390x",
                "product": {
                  "name": "kernel-zfcpdump-5.14.21-150400.24.21.2.s390x",
                  "product_id": "kernel-zfcpdump-5.14.21-150400.24.21.2.s390x"
                }
              },
              {
                "category": "product_version",
                "name": "kselftests-kmp-default-5.14.21-150400.24.21.2.s390x",
                "product": {
                  "name": "kselftests-kmp-default-5.14.21-150400.24.21.2.s390x",
                  "product_id": "kselftests-kmp-default-5.14.21-150400.24.21.2.s390x"
                }
              },
              {
                "category": "product_version",
                "name": "ocfs2-kmp-default-5.14.21-150400.24.21.2.s390x",
                "product": {
                  "name": "ocfs2-kmp-default-5.14.21-150400.24.21.2.s390x",
                  "product_id": "ocfs2-kmp-default-5.14.21-150400.24.21.2.s390x"
                }
              },
              {
                "category": "product_version",
                "name": "reiserfs-kmp-default-5.14.21-150400.24.21.2.s390x",
                "product": {
                  "name": "reiserfs-kmp-default-5.14.21-150400.24.21.2.s390x",
                  "product_id": "reiserfs-kmp-default-5.14.21-150400.24.21.2.s390x"
                }
              }
            ],
            "category": "architecture",
            "name": "s390x"
          },
          {
            "branches": [
              {
                "category": "product_version",
                "name": "cluster-md-kmp-default-5.14.21-150400.24.21.2.x86_64",
                "product": {
                  "name": "cluster-md-kmp-default-5.14.21-150400.24.21.2.x86_64",
                  "product_id": "cluster-md-kmp-default-5.14.21-150400.24.21.2.x86_64"
                }
              },
              {
                "category": "product_version",
                "name": "dlm-kmp-default-5.14.21-150400.24.21.2.x86_64",
                "product": {
                  "name": "dlm-kmp-default-5.14.21-150400.24.21.2.x86_64",
                  "product_id": "dlm-kmp-default-5.14.21-150400.24.21.2.x86_64"
                }
              },
              {
                "category": "product_version",
                "name": "gfs2-kmp-default-5.14.21-150400.24.21.2.x86_64",
                "product": {
                  "name": "gfs2-kmp-default-5.14.21-150400.24.21.2.x86_64",
                  "product_id": "gfs2-kmp-default-5.14.21-150400.24.21.2.x86_64"
                }
              },
              {
                "category": "product_version",
                "name": "kernel-debug-5.14.21-150400.24.21.2.x86_64",
                "product": {
                  "name": "kernel-debug-5.14.21-150400.24.21.2.x86_64",
                  "product_id": "kernel-debug-5.14.21-150400.24.21.2.x86_64"
                }
              },
              {
                "category": "product_version",
                "name": "kernel-debug-devel-5.14.21-150400.24.21.2.x86_64",
                "product": {
                  "name": "kernel-debug-devel-5.14.21-150400.24.21.2.x86_64",
                  "product_id": "kernel-debug-devel-5.14.21-150400.24.21.2.x86_64"
                }
              },
              {
                "category": "product_version",
                "name": "kernel-debug-livepatch-devel-5.14.21-150400.24.21.2.x86_64",
                "product": {
                  "name": "kernel-debug-livepatch-devel-5.14.21-150400.24.21.2.x86_64",
                  "product_id": "kernel-debug-livepatch-devel-5.14.21-150400.24.21.2.x86_64"
                }
              },
              {
                "category": "product_version",
                "name": "kernel-default-5.14.21-150400.24.21.2.x86_64",
                "product": {
                  "name": "kernel-default-5.14.21-150400.24.21.2.x86_64",
                  "product_id": "kernel-default-5.14.21-150400.24.21.2.x86_64"
                }
              },
              {
                "category": "product_version",
                "name": "kernel-default-base-5.14.21-150400.24.21.2.150400.24.7.2.x86_64",
                "product": {
                  "name": "kernel-default-base-5.14.21-150400.24.21.2.150400.24.7.2.x86_64",
                  "product_id": "kernel-default-base-5.14.21-150400.24.21.2.150400.24.7.2.x86_64"
                }
              },
              {
                "category": "product_version",
                "name": "kernel-default-base-rebuild-5.14.21-150400.24.21.2.150400.24.7.2.x86_64",
                "product": {
                  "name": "kernel-default-base-rebuild-5.14.21-150400.24.21.2.150400.24.7.2.x86_64",
                  "product_id": "kernel-default-base-rebuild-5.14.21-150400.24.21.2.150400.24.7.2.x86_64"
                }
              },
              {
                "category": "product_version",
                "name": "kernel-default-devel-5.14.21-150400.24.21.2.x86_64",
                "product": {
                  "name": "kernel-default-devel-5.14.21-150400.24.21.2.x86_64",
                  "product_id": "kernel-default-devel-5.14.21-150400.24.21.2.x86_64"
                }
              },
              {
                "category": "product_version",
                "name": "kernel-default-extra-5.14.21-150400.24.21.2.x86_64",
                "product": {
                  "name": "kernel-default-extra-5.14.21-150400.24.21.2.x86_64",
                  "product_id": "kernel-default-extra-5.14.21-150400.24.21.2.x86_64"
                }
              },
              {
                "category": "product_version",
                "name": "kernel-default-livepatch-5.14.21-150400.24.21.2.x86_64",
                "product": {
                  "name": "kernel-default-livepatch-5.14.21-150400.24.21.2.x86_64",
                  "product_id": "kernel-default-livepatch-5.14.21-150400.24.21.2.x86_64"
                }
              },
              {
                "category": "product_version",
                "name": "kernel-default-livepatch-devel-5.14.21-150400.24.21.2.x86_64",
                "product": {
                  "name": "kernel-default-livepatch-devel-5.14.21-150400.24.21.2.x86_64",
                  "product_id": "kernel-default-livepatch-devel-5.14.21-150400.24.21.2.x86_64"
                }
              },
              {
                "category": "product_version",
                "name": "kernel-default-optional-5.14.21-150400.24.21.2.x86_64",
                "product": {
                  "name": "kernel-default-optional-5.14.21-150400.24.21.2.x86_64",
                  "product_id": "kernel-default-optional-5.14.21-150400.24.21.2.x86_64"
                }
              },
              {
                "category": "product_version",
                "name": "kernel-kvmsmall-5.14.21-150400.24.21.2.x86_64",
                "product": {
                  "name": "kernel-kvmsmall-5.14.21-150400.24.21.2.x86_64",
                  "product_id": "kernel-kvmsmall-5.14.21-150400.24.21.2.x86_64"
                }
              },
              {
                "category": "product_version",
                "name": "kernel-kvmsmall-devel-5.14.21-150400.24.21.2.x86_64",
                "product": {
                  "name": "kernel-kvmsmall-devel-5.14.21-150400.24.21.2.x86_64",
                  "product_id": "kernel-kvmsmall-devel-5.14.21-150400.24.21.2.x86_64"
                }
              },
              {
                "category": "product_version",
                "name": "kernel-kvmsmall-livepatch-devel-5.14.21-150400.24.21.2.x86_64",
                "product": {
                  "name": "kernel-kvmsmall-livepatch-devel-5.14.21-150400.24.21.2.x86_64",
                  "product_id": "kernel-kvmsmall-livepatch-devel-5.14.21-150400.24.21.2.x86_64"
                }
              },
              {
                "category": "product_version",
                "name": "kernel-livepatch-5_14_21-150400_24_21-default-1-150400.9.3.2.x86_64",
                "product": {
                  "name": "kernel-livepatch-5_14_21-150400_24_21-default-1-150400.9.3.2.x86_64",
                  "product_id": "kernel-livepatch-5_14_21-150400_24_21-default-1-150400.9.3.2.x86_64"
                }
              },
              {
                "category": "product_version",
                "name": "kernel-obs-build-5.14.21-150400.24.21.2.x86_64",
                "product": {
                  "name": "kernel-obs-build-5.14.21-150400.24.21.2.x86_64",
                  "product_id": "kernel-obs-build-5.14.21-150400.24.21.2.x86_64"
                }
              },
              {
                "category": "product_version",
                "name": "kernel-obs-qa-5.14.21-150400.24.21.1.x86_64",
                "product": {
                  "name": "kernel-obs-qa-5.14.21-150400.24.21.1.x86_64",
                  "product_id": "kernel-obs-qa-5.14.21-150400.24.21.1.x86_64"
                }
              },
              {
                "category": "product_version",
                "name": "kernel-syms-5.14.21-150400.24.21.1.x86_64",
                "product": {
                  "name": "kernel-syms-5.14.21-150400.24.21.1.x86_64",
                  "product_id": "kernel-syms-5.14.21-150400.24.21.1.x86_64"
                }
              },
              {
                "category": "product_version",
                "name": "kselftests-kmp-default-5.14.21-150400.24.21.2.x86_64",
                "product": {
                  "name": "kselftests-kmp-default-5.14.21-150400.24.21.2.x86_64",
                  "product_id": "kselftests-kmp-default-5.14.21-150400.24.21.2.x86_64"
                }
              },
              {
                "category": "product_version",
                "name": "ocfs2-kmp-default-5.14.21-150400.24.21.2.x86_64",
                "product": {
                  "name": "ocfs2-kmp-default-5.14.21-150400.24.21.2.x86_64",
                  "product_id": "ocfs2-kmp-default-5.14.21-150400.24.21.2.x86_64"
                }
              },
              {
                "category": "product_version",
                "name": "reiserfs-kmp-default-5.14.21-150400.24.21.2.x86_64",
                "product": {
                  "name": "reiserfs-kmp-default-5.14.21-150400.24.21.2.x86_64",
                  "product_id": "reiserfs-kmp-default-5.14.21-150400.24.21.2.x86_64"
                }
              }
            ],
            "category": "architecture",
            "name": "x86_64"
          },
          {
            "branches": [
              {
                "category": "product_name",
                "name": "SUSE Linux Enterprise Module for Basesystem 15 SP4",
                "product": {
                  "name": "SUSE Linux Enterprise Module for Basesystem 15 SP4",
                  "product_id": "SUSE Linux Enterprise Module for Basesystem 15 SP4",
                  "product_identification_helper": {
                    "cpe": "cpe:/o:suse:sle-module-basesystem:15:sp4"
                  }
                }
              },
              {
                "category": "product_name",
                "name": "SUSE Linux Enterprise Module for Development Tools 15 SP4",
                "product": {
                  "name": "SUSE Linux Enterprise Module for Development Tools 15 SP4",
                  "product_id": "SUSE Linux Enterprise Module for Development Tools 15 SP4",
                  "product_identification_helper": {
                    "cpe": "cpe:/o:suse:sle-module-development-tools:15:sp4"
                  }
                }
              },
              {
                "category": "product_name",
                "name": "SUSE Linux Enterprise Module for Legacy 15 SP4",
                "product": {
                  "name": "SUSE Linux Enterprise Module for Legacy 15 SP4",
                  "product_id": "SUSE Linux Enterprise Module for Legacy 15 SP4",
                  "product_identification_helper": {
                    "cpe": "cpe:/o:suse:sle-module-legacy:15:sp4"
                  }
                }
              },
              {
                "category": "product_name",
                "name": "SUSE Linux Enterprise Live Patching 15 SP4",
                "product": {
                  "name": "SUSE Linux Enterprise Live Patching 15 SP4",
                  "product_id": "SUSE Linux Enterprise Live Patching 15 SP4",
                  "product_identification_helper": {
                    "cpe": "cpe:/o:suse:sle-module-live-patching:15:sp4"
                  }
                }
              },
              {
                "category": "product_name",
                "name": "SUSE Linux Enterprise High Availability Extension 15 SP4",
                "product": {
                  "name": "SUSE Linux Enterprise High Availability Extension 15 SP4",
                  "product_id": "SUSE Linux Enterprise High Availability Extension 15 SP4",
                  "product_identification_helper": {
                    "cpe": "cpe:/o:suse:sle-ha:15:sp4"
                  }
                }
              },
              {
                "category": "product_name",
                "name": "SUSE Linux Enterprise Workstation Extension 15 SP4",
                "product": {
                  "name": "SUSE Linux Enterprise Workstation Extension 15 SP4",
                  "product_id": "SUSE Linux Enterprise Workstation Extension 15 SP4",
                  "product_identification_helper": {
                    "cpe": "cpe:/o:suse:sle-we:15:sp4"
                  }
                }
              },
              {
                "category": "product_name",
                "name": "openSUSE Leap 15.4",
                "product": {
                  "name": "openSUSE Leap 15.4",
                  "product_id": "openSUSE Leap 15.4",
                  "product_identification_helper": {
                    "cpe": "cpe:/o:opensuse:leap:15.4"
                  }
                }
              }
            ],
            "category": "product_family",
            "name": "SUSE Linux Enterprise"
          }
        ],
        "category": "vendor",
        "name": "SUSE"
      }
    ],
    "relationships": [
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-64kb-5.14.21-150400.24.21.2.aarch64 as component of SUSE Linux Enterprise Module for Basesystem 15 SP4",
          "product_id": "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-64kb-5.14.21-150400.24.21.2.aarch64"
        },
        "product_reference": "kernel-64kb-5.14.21-150400.24.21.2.aarch64",
        "relates_to_product_reference": "SUSE Linux Enterprise Module for Basesystem 15 SP4"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-64kb-devel-5.14.21-150400.24.21.2.aarch64 as component of SUSE Linux Enterprise Module for Basesystem 15 SP4",
          "product_id": "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-64kb-devel-5.14.21-150400.24.21.2.aarch64"
        },
        "product_reference": "kernel-64kb-devel-5.14.21-150400.24.21.2.aarch64",
        "relates_to_product_reference": "SUSE Linux Enterprise Module for Basesystem 15 SP4"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-default-5.14.21-150400.24.21.2.aarch64 as component of SUSE Linux Enterprise Module for Basesystem 15 SP4",
          "product_id": "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-5.14.21-150400.24.21.2.aarch64"
        },
        "product_reference": "kernel-default-5.14.21-150400.24.21.2.aarch64",
        "relates_to_product_reference": "SUSE Linux Enterprise Module for Basesystem 15 SP4"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-default-5.14.21-150400.24.21.2.ppc64le as component of SUSE Linux Enterprise Module for Basesystem 15 SP4",
          "product_id": "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-5.14.21-150400.24.21.2.ppc64le"
        },
        "product_reference": "kernel-default-5.14.21-150400.24.21.2.ppc64le",
        "relates_to_product_reference": "SUSE Linux Enterprise Module for Basesystem 15 SP4"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-default-5.14.21-150400.24.21.2.s390x as component of SUSE Linux Enterprise Module for Basesystem 15 SP4",
          "product_id": "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-5.14.21-150400.24.21.2.s390x"
        },
        "product_reference": "kernel-default-5.14.21-150400.24.21.2.s390x",
        "relates_to_product_reference": "SUSE Linux Enterprise Module for Basesystem 15 SP4"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-default-5.14.21-150400.24.21.2.x86_64 as component of SUSE Linux Enterprise Module for Basesystem 15 SP4",
          "product_id": "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-5.14.21-150400.24.21.2.x86_64"
        },
        "product_reference": "kernel-default-5.14.21-150400.24.21.2.x86_64",
        "relates_to_product_reference": "SUSE Linux Enterprise Module for Basesystem 15 SP4"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-default-base-5.14.21-150400.24.21.2.150400.24.7.2.aarch64 as component of SUSE Linux Enterprise Module for Basesystem 15 SP4",
          "product_id": "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-base-5.14.21-150400.24.21.2.150400.24.7.2.aarch64"
        },
        "product_reference": "kernel-default-base-5.14.21-150400.24.21.2.150400.24.7.2.aarch64",
        "relates_to_product_reference": "SUSE Linux Enterprise Module for Basesystem 15 SP4"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-default-base-5.14.21-150400.24.21.2.150400.24.7.2.ppc64le as component of SUSE Linux Enterprise Module for Basesystem 15 SP4",
          "product_id": "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-base-5.14.21-150400.24.21.2.150400.24.7.2.ppc64le"
        },
        "product_reference": "kernel-default-base-5.14.21-150400.24.21.2.150400.24.7.2.ppc64le",
        "relates_to_product_reference": "SUSE Linux Enterprise Module for Basesystem 15 SP4"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-default-base-5.14.21-150400.24.21.2.150400.24.7.2.s390x as component of SUSE Linux Enterprise Module for Basesystem 15 SP4",
          "product_id": "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-base-5.14.21-150400.24.21.2.150400.24.7.2.s390x"
        },
        "product_reference": "kernel-default-base-5.14.21-150400.24.21.2.150400.24.7.2.s390x",
        "relates_to_product_reference": "SUSE Linux Enterprise Module for Basesystem 15 SP4"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-default-base-5.14.21-150400.24.21.2.150400.24.7.2.x86_64 as component of SUSE Linux Enterprise Module for Basesystem 15 SP4",
          "product_id": "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-base-5.14.21-150400.24.21.2.150400.24.7.2.x86_64"
        },
        "product_reference": "kernel-default-base-5.14.21-150400.24.21.2.150400.24.7.2.x86_64",
        "relates_to_product_reference": "SUSE Linux Enterprise Module for Basesystem 15 SP4"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-default-devel-5.14.21-150400.24.21.2.aarch64 as component of SUSE Linux Enterprise Module for Basesystem 15 SP4",
          "product_id": "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-devel-5.14.21-150400.24.21.2.aarch64"
        },
        "product_reference": "kernel-default-devel-5.14.21-150400.24.21.2.aarch64",
        "relates_to_product_reference": "SUSE Linux Enterprise Module for Basesystem 15 SP4"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-default-devel-5.14.21-150400.24.21.2.ppc64le as component of SUSE Linux Enterprise Module for Basesystem 15 SP4",
          "product_id": "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-devel-5.14.21-150400.24.21.2.ppc64le"
        },
        "product_reference": "kernel-default-devel-5.14.21-150400.24.21.2.ppc64le",
        "relates_to_product_reference": "SUSE Linux Enterprise Module for Basesystem 15 SP4"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-default-devel-5.14.21-150400.24.21.2.s390x as component of SUSE Linux Enterprise Module for Basesystem 15 SP4",
          "product_id": "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-devel-5.14.21-150400.24.21.2.s390x"
        },
        "product_reference": "kernel-default-devel-5.14.21-150400.24.21.2.s390x",
        "relates_to_product_reference": "SUSE Linux Enterprise Module for Basesystem 15 SP4"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-default-devel-5.14.21-150400.24.21.2.x86_64 as component of SUSE Linux Enterprise Module for Basesystem 15 SP4",
          "product_id": "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-devel-5.14.21-150400.24.21.2.x86_64"
        },
        "product_reference": "kernel-default-devel-5.14.21-150400.24.21.2.x86_64",
        "relates_to_product_reference": "SUSE Linux Enterprise Module for Basesystem 15 SP4"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-devel-5.14.21-150400.24.21.2.noarch as component of SUSE Linux Enterprise Module for Basesystem 15 SP4",
          "product_id": "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-devel-5.14.21-150400.24.21.2.noarch"
        },
        "product_reference": "kernel-devel-5.14.21-150400.24.21.2.noarch",
        "relates_to_product_reference": "SUSE Linux Enterprise Module for Basesystem 15 SP4"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-macros-5.14.21-150400.24.21.2.noarch as component of SUSE Linux Enterprise Module for Basesystem 15 SP4",
          "product_id": "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-macros-5.14.21-150400.24.21.2.noarch"
        },
        "product_reference": "kernel-macros-5.14.21-150400.24.21.2.noarch",
        "relates_to_product_reference": "SUSE Linux Enterprise Module for Basesystem 15 SP4"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-zfcpdump-5.14.21-150400.24.21.2.s390x as component of SUSE Linux Enterprise Module for Basesystem 15 SP4",
          "product_id": "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-zfcpdump-5.14.21-150400.24.21.2.s390x"
        },
        "product_reference": "kernel-zfcpdump-5.14.21-150400.24.21.2.s390x",
        "relates_to_product_reference": "SUSE Linux Enterprise Module for Basesystem 15 SP4"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-docs-5.14.21-150400.24.21.3.noarch as component of SUSE Linux Enterprise Module for Development Tools 15 SP4",
          "product_id": "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-docs-5.14.21-150400.24.21.3.noarch"
        },
        "product_reference": "kernel-docs-5.14.21-150400.24.21.3.noarch",
        "relates_to_product_reference": "SUSE Linux Enterprise Module for Development Tools 15 SP4"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-obs-build-5.14.21-150400.24.21.2.aarch64 as component of SUSE Linux Enterprise Module for Development Tools 15 SP4",
          "product_id": "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-obs-build-5.14.21-150400.24.21.2.aarch64"
        },
        "product_reference": "kernel-obs-build-5.14.21-150400.24.21.2.aarch64",
        "relates_to_product_reference": "SUSE Linux Enterprise Module for Development Tools 15 SP4"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-obs-build-5.14.21-150400.24.21.2.ppc64le as component of SUSE Linux Enterprise Module for Development Tools 15 SP4",
          "product_id": "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-obs-build-5.14.21-150400.24.21.2.ppc64le"
        },
        "product_reference": "kernel-obs-build-5.14.21-150400.24.21.2.ppc64le",
        "relates_to_product_reference": "SUSE Linux Enterprise Module for Development Tools 15 SP4"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-obs-build-5.14.21-150400.24.21.2.s390x as component of SUSE Linux Enterprise Module for Development Tools 15 SP4",
          "product_id": "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-obs-build-5.14.21-150400.24.21.2.s390x"
        },
        "product_reference": "kernel-obs-build-5.14.21-150400.24.21.2.s390x",
        "relates_to_product_reference": "SUSE Linux Enterprise Module for Development Tools 15 SP4"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-obs-build-5.14.21-150400.24.21.2.x86_64 as component of SUSE Linux Enterprise Module for Development Tools 15 SP4",
          "product_id": "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-obs-build-5.14.21-150400.24.21.2.x86_64"
        },
        "product_reference": "kernel-obs-build-5.14.21-150400.24.21.2.x86_64",
        "relates_to_product_reference": "SUSE Linux Enterprise Module for Development Tools 15 SP4"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-source-5.14.21-150400.24.21.2.noarch as component of SUSE Linux Enterprise Module for Development Tools 15 SP4",
          "product_id": "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-source-5.14.21-150400.24.21.2.noarch"
        },
        "product_reference": "kernel-source-5.14.21-150400.24.21.2.noarch",
        "relates_to_product_reference": "SUSE Linux Enterprise Module for Development Tools 15 SP4"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-syms-5.14.21-150400.24.21.1.aarch64 as component of SUSE Linux Enterprise Module for Development Tools 15 SP4",
          "product_id": "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-syms-5.14.21-150400.24.21.1.aarch64"
        },
        "product_reference": "kernel-syms-5.14.21-150400.24.21.1.aarch64",
        "relates_to_product_reference": "SUSE Linux Enterprise Module for Development Tools 15 SP4"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-syms-5.14.21-150400.24.21.1.ppc64le as component of SUSE Linux Enterprise Module for Development Tools 15 SP4",
          "product_id": "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-syms-5.14.21-150400.24.21.1.ppc64le"
        },
        "product_reference": "kernel-syms-5.14.21-150400.24.21.1.ppc64le",
        "relates_to_product_reference": "SUSE Linux Enterprise Module for Development Tools 15 SP4"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-syms-5.14.21-150400.24.21.1.s390x as component of SUSE Linux Enterprise Module for Development Tools 15 SP4",
          "product_id": "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-syms-5.14.21-150400.24.21.1.s390x"
        },
        "product_reference": "kernel-syms-5.14.21-150400.24.21.1.s390x",
        "relates_to_product_reference": "SUSE Linux Enterprise Module for Development Tools 15 SP4"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-syms-5.14.21-150400.24.21.1.x86_64 as component of SUSE Linux Enterprise Module for Development Tools 15 SP4",
          "product_id": "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-syms-5.14.21-150400.24.21.1.x86_64"
        },
        "product_reference": "kernel-syms-5.14.21-150400.24.21.1.x86_64",
        "relates_to_product_reference": "SUSE Linux Enterprise Module for Development Tools 15 SP4"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "reiserfs-kmp-default-5.14.21-150400.24.21.2.aarch64 as component of SUSE Linux Enterprise Module for Legacy 15 SP4",
          "product_id": "SUSE Linux Enterprise Module for Legacy 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.21.2.aarch64"
        },
        "product_reference": "reiserfs-kmp-default-5.14.21-150400.24.21.2.aarch64",
        "relates_to_product_reference": "SUSE Linux Enterprise Module for Legacy 15 SP4"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "reiserfs-kmp-default-5.14.21-150400.24.21.2.ppc64le as component of SUSE Linux Enterprise Module for Legacy 15 SP4",
          "product_id": "SUSE Linux Enterprise Module for Legacy 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.21.2.ppc64le"
        },
        "product_reference": "reiserfs-kmp-default-5.14.21-150400.24.21.2.ppc64le",
        "relates_to_product_reference": "SUSE Linux Enterprise Module for Legacy 15 SP4"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "reiserfs-kmp-default-5.14.21-150400.24.21.2.s390x as component of SUSE Linux Enterprise Module for Legacy 15 SP4",
          "product_id": "SUSE Linux Enterprise Module for Legacy 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.21.2.s390x"
        },
        "product_reference": "reiserfs-kmp-default-5.14.21-150400.24.21.2.s390x",
        "relates_to_product_reference": "SUSE Linux Enterprise Module for Legacy 15 SP4"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "reiserfs-kmp-default-5.14.21-150400.24.21.2.x86_64 as component of SUSE Linux Enterprise Module for Legacy 15 SP4",
          "product_id": "SUSE Linux Enterprise Module for Legacy 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.21.2.x86_64"
        },
        "product_reference": "reiserfs-kmp-default-5.14.21-150400.24.21.2.x86_64",
        "relates_to_product_reference": "SUSE Linux Enterprise Module for Legacy 15 SP4"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-default-livepatch-5.14.21-150400.24.21.2.ppc64le as component of SUSE Linux Enterprise Live Patching 15 SP4",
          "product_id": "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.21.2.ppc64le"
        },
        "product_reference": "kernel-default-livepatch-5.14.21-150400.24.21.2.ppc64le",
        "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP4"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-default-livepatch-5.14.21-150400.24.21.2.s390x as component of SUSE Linux Enterprise Live Patching 15 SP4",
          "product_id": "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.21.2.s390x"
        },
        "product_reference": "kernel-default-livepatch-5.14.21-150400.24.21.2.s390x",
        "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP4"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-default-livepatch-5.14.21-150400.24.21.2.x86_64 as component of SUSE Linux Enterprise Live Patching 15 SP4",
          "product_id": "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.21.2.x86_64"
        },
        "product_reference": "kernel-default-livepatch-5.14.21-150400.24.21.2.x86_64",
        "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP4"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-default-livepatch-devel-5.14.21-150400.24.21.2.ppc64le as component of SUSE Linux Enterprise Live Patching 15 SP4",
          "product_id": "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.21.2.ppc64le"
        },
        "product_reference": "kernel-default-livepatch-devel-5.14.21-150400.24.21.2.ppc64le",
        "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP4"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-default-livepatch-devel-5.14.21-150400.24.21.2.s390x as component of SUSE Linux Enterprise Live Patching 15 SP4",
          "product_id": "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.21.2.s390x"
        },
        "product_reference": "kernel-default-livepatch-devel-5.14.21-150400.24.21.2.s390x",
        "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP4"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-default-livepatch-devel-5.14.21-150400.24.21.2.x86_64 as component of SUSE Linux Enterprise Live Patching 15 SP4",
          "product_id": "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.21.2.x86_64"
        },
        "product_reference": "kernel-default-livepatch-devel-5.14.21-150400.24.21.2.x86_64",
        "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP4"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-livepatch-5_14_21-150400_24_21-default-1-150400.9.3.2.ppc64le as component of SUSE Linux Enterprise Live Patching 15 SP4",
          "product_id": "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_21-default-1-150400.9.3.2.ppc64le"
        },
        "product_reference": "kernel-livepatch-5_14_21-150400_24_21-default-1-150400.9.3.2.ppc64le",
        "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP4"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-livepatch-5_14_21-150400_24_21-default-1-150400.9.3.2.s390x as component of SUSE Linux Enterprise Live Patching 15 SP4",
          "product_id": "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_21-default-1-150400.9.3.2.s390x"
        },
        "product_reference": "kernel-livepatch-5_14_21-150400_24_21-default-1-150400.9.3.2.s390x",
        "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP4"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-livepatch-5_14_21-150400_24_21-default-1-150400.9.3.2.x86_64 as component of SUSE Linux Enterprise Live Patching 15 SP4",
          "product_id": "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_21-default-1-150400.9.3.2.x86_64"
        },
        "product_reference": "kernel-livepatch-5_14_21-150400_24_21-default-1-150400.9.3.2.x86_64",
        "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP4"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "cluster-md-kmp-default-5.14.21-150400.24.21.2.aarch64 as component of SUSE Linux Enterprise High Availability Extension 15 SP4",
          "product_id": "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.21.2.aarch64"
        },
        "product_reference": "cluster-md-kmp-default-5.14.21-150400.24.21.2.aarch64",
        "relates_to_product_reference": "SUSE Linux Enterprise High Availability Extension 15 SP4"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "cluster-md-kmp-default-5.14.21-150400.24.21.2.ppc64le as component of SUSE Linux Enterprise High Availability Extension 15 SP4",
          "product_id": "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.21.2.ppc64le"
        },
        "product_reference": "cluster-md-kmp-default-5.14.21-150400.24.21.2.ppc64le",
        "relates_to_product_reference": "SUSE Linux Enterprise High Availability Extension 15 SP4"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "cluster-md-kmp-default-5.14.21-150400.24.21.2.s390x as component of SUSE Linux Enterprise High Availability Extension 15 SP4",
          "product_id": "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.21.2.s390x"
        },
        "product_reference": "cluster-md-kmp-default-5.14.21-150400.24.21.2.s390x",
        "relates_to_product_reference": "SUSE Linux Enterprise High Availability Extension 15 SP4"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "cluster-md-kmp-default-5.14.21-150400.24.21.2.x86_64 as component of SUSE Linux Enterprise High Availability Extension 15 SP4",
          "product_id": "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.21.2.x86_64"
        },
        "product_reference": "cluster-md-kmp-default-5.14.21-150400.24.21.2.x86_64",
        "relates_to_product_reference": "SUSE Linux Enterprise High Availability Extension 15 SP4"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "dlm-kmp-default-5.14.21-150400.24.21.2.aarch64 as component of SUSE Linux Enterprise High Availability Extension 15 SP4",
          "product_id": "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.21.2.aarch64"
        },
        "product_reference": "dlm-kmp-default-5.14.21-150400.24.21.2.aarch64",
        "relates_to_product_reference": "SUSE Linux Enterprise High Availability Extension 15 SP4"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "dlm-kmp-default-5.14.21-150400.24.21.2.ppc64le as component of SUSE Linux Enterprise High Availability Extension 15 SP4",
          "product_id": "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.21.2.ppc64le"
        },
        "product_reference": "dlm-kmp-default-5.14.21-150400.24.21.2.ppc64le",
        "relates_to_product_reference": "SUSE Linux Enterprise High Availability Extension 15 SP4"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "dlm-kmp-default-5.14.21-150400.24.21.2.s390x as component of SUSE Linux Enterprise High Availability Extension 15 SP4",
          "product_id": "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.21.2.s390x"
        },
        "product_reference": "dlm-kmp-default-5.14.21-150400.24.21.2.s390x",
        "relates_to_product_reference": "SUSE Linux Enterprise High Availability Extension 15 SP4"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "dlm-kmp-default-5.14.21-150400.24.21.2.x86_64 as component of SUSE Linux Enterprise High Availability Extension 15 SP4",
          "product_id": "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.21.2.x86_64"
        },
        "product_reference": "dlm-kmp-default-5.14.21-150400.24.21.2.x86_64",
        "relates_to_product_reference": "SUSE Linux Enterprise High Availability Extension 15 SP4"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "gfs2-kmp-default-5.14.21-150400.24.21.2.aarch64 as component of SUSE Linux Enterprise High Availability Extension 15 SP4",
          "product_id": "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.21.2.aarch64"
        },
        "product_reference": "gfs2-kmp-default-5.14.21-150400.24.21.2.aarch64",
        "relates_to_product_reference": "SUSE Linux Enterprise High Availability Extension 15 SP4"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "gfs2-kmp-default-5.14.21-150400.24.21.2.ppc64le as component of SUSE Linux Enterprise High Availability Extension 15 SP4",
          "product_id": "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.21.2.ppc64le"
        },
        "product_reference": "gfs2-kmp-default-5.14.21-150400.24.21.2.ppc64le",
        "relates_to_product_reference": "SUSE Linux Enterprise High Availability Extension 15 SP4"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "gfs2-kmp-default-5.14.21-150400.24.21.2.s390x as component of SUSE Linux Enterprise High Availability Extension 15 SP4",
          "product_id": "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.21.2.s390x"
        },
        "product_reference": "gfs2-kmp-default-5.14.21-150400.24.21.2.s390x",
        "relates_to_product_reference": "SUSE Linux Enterprise High Availability Extension 15 SP4"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "gfs2-kmp-default-5.14.21-150400.24.21.2.x86_64 as component of SUSE Linux Enterprise High Availability Extension 15 SP4",
          "product_id": "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.21.2.x86_64"
        },
        "product_reference": "gfs2-kmp-default-5.14.21-150400.24.21.2.x86_64",
        "relates_to_product_reference": "SUSE Linux Enterprise High Availability Extension 15 SP4"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "ocfs2-kmp-default-5.14.21-150400.24.21.2.aarch64 as component of SUSE Linux Enterprise High Availability Extension 15 SP4",
          "product_id": "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.21.2.aarch64"
        },
        "product_reference": "ocfs2-kmp-default-5.14.21-150400.24.21.2.aarch64",
        "relates_to_product_reference": "SUSE Linux Enterprise High Availability Extension 15 SP4"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "ocfs2-kmp-default-5.14.21-150400.24.21.2.ppc64le as component of SUSE Linux Enterprise High Availability Extension 15 SP4",
          "product_id": "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.21.2.ppc64le"
        },
        "product_reference": "ocfs2-kmp-default-5.14.21-150400.24.21.2.ppc64le",
        "relates_to_product_reference": "SUSE Linux Enterprise High Availability Extension 15 SP4"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "ocfs2-kmp-default-5.14.21-150400.24.21.2.s390x as component of SUSE Linux Enterprise High Availability Extension 15 SP4",
          "product_id": "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.21.2.s390x"
        },
        "product_reference": "ocfs2-kmp-default-5.14.21-150400.24.21.2.s390x",
        "relates_to_product_reference": "SUSE Linux Enterprise High Availability Extension 15 SP4"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "ocfs2-kmp-default-5.14.21-150400.24.21.2.x86_64 as component of SUSE Linux Enterprise High Availability Extension 15 SP4",
          "product_id": "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.21.2.x86_64"
        },
        "product_reference": "ocfs2-kmp-default-5.14.21-150400.24.21.2.x86_64",
        "relates_to_product_reference": "SUSE Linux Enterprise High Availability Extension 15 SP4"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-default-extra-5.14.21-150400.24.21.2.x86_64 as component of SUSE Linux Enterprise Workstation Extension 15 SP4",
          "product_id": "SUSE Linux Enterprise Workstation Extension 15 SP4:kernel-default-extra-5.14.21-150400.24.21.2.x86_64"
        },
        "product_reference": "kernel-default-extra-5.14.21-150400.24.21.2.x86_64",
        "relates_to_product_reference": "SUSE Linux Enterprise Workstation Extension 15 SP4"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "cluster-md-kmp-64kb-5.14.21-150400.24.21.2.aarch64 as component of openSUSE Leap 15.4",
          "product_id": "openSUSE Leap 15.4:cluster-md-kmp-64kb-5.14.21-150400.24.21.2.aarch64"
        },
        "product_reference": "cluster-md-kmp-64kb-5.14.21-150400.24.21.2.aarch64",
        "relates_to_product_reference": "openSUSE Leap 15.4"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "cluster-md-kmp-default-5.14.21-150400.24.21.2.aarch64 as component of openSUSE Leap 15.4",
          "product_id": "openSUSE Leap 15.4:cluster-md-kmp-default-5.14.21-150400.24.21.2.aarch64"
        },
        "product_reference": "cluster-md-kmp-default-5.14.21-150400.24.21.2.aarch64",
        "relates_to_product_reference": "openSUSE Leap 15.4"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "cluster-md-kmp-default-5.14.21-150400.24.21.2.ppc64le as component of openSUSE Leap 15.4",
          "product_id": "openSUSE Leap 15.4:cluster-md-kmp-default-5.14.21-150400.24.21.2.ppc64le"
        },
        "product_reference": "cluster-md-kmp-default-5.14.21-150400.24.21.2.ppc64le",
        "relates_to_product_reference": "openSUSE Leap 15.4"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "cluster-md-kmp-default-5.14.21-150400.24.21.2.s390x as component of openSUSE Leap 15.4",
          "product_id": "openSUSE Leap 15.4:cluster-md-kmp-default-5.14.21-150400.24.21.2.s390x"
        },
        "product_reference": "cluster-md-kmp-default-5.14.21-150400.24.21.2.s390x",
        "relates_to_product_reference": "openSUSE Leap 15.4"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "cluster-md-kmp-default-5.14.21-150400.24.21.2.x86_64 as component of openSUSE Leap 15.4",
          "product_id": "openSUSE Leap 15.4:cluster-md-kmp-default-5.14.21-150400.24.21.2.x86_64"
        },
        "product_reference": "cluster-md-kmp-default-5.14.21-150400.24.21.2.x86_64",
        "relates_to_product_reference": "openSUSE Leap 15.4"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "dlm-kmp-64kb-5.14.21-150400.24.21.2.aarch64 as component of openSUSE Leap 15.4",
          "product_id": "openSUSE Leap 15.4:dlm-kmp-64kb-5.14.21-150400.24.21.2.aarch64"
        },
        "product_reference": "dlm-kmp-64kb-5.14.21-150400.24.21.2.aarch64",
        "relates_to_product_reference": "openSUSE Leap 15.4"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "dlm-kmp-default-5.14.21-150400.24.21.2.aarch64 as component of openSUSE Leap 15.4",
          "product_id": "openSUSE Leap 15.4:dlm-kmp-default-5.14.21-150400.24.21.2.aarch64"
        },
        "product_reference": "dlm-kmp-default-5.14.21-150400.24.21.2.aarch64",
        "relates_to_product_reference": "openSUSE Leap 15.4"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "dlm-kmp-default-5.14.21-150400.24.21.2.ppc64le as component of openSUSE Leap 15.4",
          "product_id": "openSUSE Leap 15.4:dlm-kmp-default-5.14.21-150400.24.21.2.ppc64le"
        },
        "product_reference": "dlm-kmp-default-5.14.21-150400.24.21.2.ppc64le",
        "relates_to_product_reference": "openSUSE Leap 15.4"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "dlm-kmp-default-5.14.21-150400.24.21.2.s390x as component of openSUSE Leap 15.4",
          "product_id": "openSUSE Leap 15.4:dlm-kmp-default-5.14.21-150400.24.21.2.s390x"
        },
        "product_reference": "dlm-kmp-default-5.14.21-150400.24.21.2.s390x",
        "relates_to_product_reference": "openSUSE Leap 15.4"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "dlm-kmp-default-5.14.21-150400.24.21.2.x86_64 as component of openSUSE Leap 15.4",
          "product_id": "openSUSE Leap 15.4:dlm-kmp-default-5.14.21-150400.24.21.2.x86_64"
        },
        "product_reference": "dlm-kmp-default-5.14.21-150400.24.21.2.x86_64",
        "relates_to_product_reference": "openSUSE Leap 15.4"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "dtb-allwinner-5.14.21-150400.24.21.1.aarch64 as component of openSUSE Leap 15.4",
          "product_id": "openSUSE Leap 15.4:dtb-allwinner-5.14.21-150400.24.21.1.aarch64"
        },
        "product_reference": "dtb-allwinner-5.14.21-150400.24.21.1.aarch64",
        "relates_to_product_reference": "openSUSE Leap 15.4"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "dtb-altera-5.14.21-150400.24.21.1.aarch64 as component of openSUSE Leap 15.4",
          "product_id": "openSUSE Leap 15.4:dtb-altera-5.14.21-150400.24.21.1.aarch64"
        },
        "product_reference": "dtb-altera-5.14.21-150400.24.21.1.aarch64",
        "relates_to_product_reference": "openSUSE Leap 15.4"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "dtb-amazon-5.14.21-150400.24.21.1.aarch64 as component of openSUSE Leap 15.4",
          "product_id": "openSUSE Leap 15.4:dtb-amazon-5.14.21-150400.24.21.1.aarch64"
        },
        "product_reference": "dtb-amazon-5.14.21-150400.24.21.1.aarch64",
        "relates_to_product_reference": "openSUSE Leap 15.4"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "dtb-amd-5.14.21-150400.24.21.1.aarch64 as component of openSUSE Leap 15.4",
          "product_id": "openSUSE Leap 15.4:dtb-amd-5.14.21-150400.24.21.1.aarch64"
        },
        "product_reference": "dtb-amd-5.14.21-150400.24.21.1.aarch64",
        "relates_to_product_reference": "openSUSE Leap 15.4"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "dtb-amlogic-5.14.21-150400.24.21.1.aarch64 as component of openSUSE Leap 15.4",
          "product_id": "openSUSE Leap 15.4:dtb-amlogic-5.14.21-150400.24.21.1.aarch64"
        },
        "product_reference": "dtb-amlogic-5.14.21-150400.24.21.1.aarch64",
        "relates_to_product_reference": "openSUSE Leap 15.4"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "dtb-apm-5.14.21-150400.24.21.1.aarch64 as component of openSUSE Leap 15.4",
          "product_id": "openSUSE Leap 15.4:dtb-apm-5.14.21-150400.24.21.1.aarch64"
        },
        "product_reference": "dtb-apm-5.14.21-150400.24.21.1.aarch64",
        "relates_to_product_reference": "openSUSE Leap 15.4"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "dtb-apple-5.14.21-150400.24.21.1.aarch64 as component of openSUSE Leap 15.4",
          "product_id": "openSUSE Leap 15.4:dtb-apple-5.14.21-150400.24.21.1.aarch64"
        },
        "product_reference": "dtb-apple-5.14.21-150400.24.21.1.aarch64",
        "relates_to_product_reference": "openSUSE Leap 15.4"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "dtb-arm-5.14.21-150400.24.21.1.aarch64 as component of openSUSE Leap 15.4",
          "product_id": "openSUSE Leap 15.4:dtb-arm-5.14.21-150400.24.21.1.aarch64"
        },
        "product_reference": "dtb-arm-5.14.21-150400.24.21.1.aarch64",
        "relates_to_product_reference": "openSUSE Leap 15.4"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "dtb-broadcom-5.14.21-150400.24.21.1.aarch64 as component of openSUSE Leap 15.4",
          "product_id": "openSUSE Leap 15.4:dtb-broadcom-5.14.21-150400.24.21.1.aarch64"
        },
        "product_reference": "dtb-broadcom-5.14.21-150400.24.21.1.aarch64",
        "relates_to_product_reference": "openSUSE Leap 15.4"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "dtb-cavium-5.14.21-150400.24.21.1.aarch64 as component of openSUSE Leap 15.4",
          "product_id": "openSUSE Leap 15.4:dtb-cavium-5.14.21-150400.24.21.1.aarch64"
        },
        "product_reference": "dtb-cavium-5.14.21-150400.24.21.1.aarch64",
        "relates_to_product_reference": "openSUSE Leap 15.4"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "dtb-exynos-5.14.21-150400.24.21.1.aarch64 as component of openSUSE Leap 15.4",
          "product_id": "openSUSE Leap 15.4:dtb-exynos-5.14.21-150400.24.21.1.aarch64"
        },
        "product_reference": "dtb-exynos-5.14.21-150400.24.21.1.aarch64",
        "relates_to_product_reference": "openSUSE Leap 15.4"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "dtb-freescale-5.14.21-150400.24.21.1.aarch64 as component of openSUSE Leap 15.4",
          "product_id": "openSUSE Leap 15.4:dtb-freescale-5.14.21-150400.24.21.1.aarch64"
        },
        "product_reference": "dtb-freescale-5.14.21-150400.24.21.1.aarch64",
        "relates_to_product_reference": "openSUSE Leap 15.4"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "dtb-hisilicon-5.14.21-150400.24.21.1.aarch64 as component of openSUSE Leap 15.4",
          "product_id": "openSUSE Leap 15.4:dtb-hisilicon-5.14.21-150400.24.21.1.aarch64"
        },
        "product_reference": "dtb-hisilicon-5.14.21-150400.24.21.1.aarch64",
        "relates_to_product_reference": "openSUSE Leap 15.4"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "dtb-lg-5.14.21-150400.24.21.1.aarch64 as component of openSUSE Leap 15.4",
          "product_id": "openSUSE Leap 15.4:dtb-lg-5.14.21-150400.24.21.1.aarch64"
        },
        "product_reference": "dtb-lg-5.14.21-150400.24.21.1.aarch64",
        "relates_to_product_reference": "openSUSE Leap 15.4"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "dtb-marvell-5.14.21-150400.24.21.1.aarch64 as component of openSUSE Leap 15.4",
          "product_id": "openSUSE Leap 15.4:dtb-marvell-5.14.21-150400.24.21.1.aarch64"
        },
        "product_reference": "dtb-marvell-5.14.21-150400.24.21.1.aarch64",
        "relates_to_product_reference": "openSUSE Leap 15.4"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "dtb-mediatek-5.14.21-150400.24.21.1.aarch64 as component of openSUSE Leap 15.4",
          "product_id": "openSUSE Leap 15.4:dtb-mediatek-5.14.21-150400.24.21.1.aarch64"
        },
        "product_reference": "dtb-mediatek-5.14.21-150400.24.21.1.aarch64",
        "relates_to_product_reference": "openSUSE Leap 15.4"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "dtb-nvidia-5.14.21-150400.24.21.1.aarch64 as component of openSUSE Leap 15.4",
          "product_id": "openSUSE Leap 15.4:dtb-nvidia-5.14.21-150400.24.21.1.aarch64"
        },
        "product_reference": "dtb-nvidia-5.14.21-150400.24.21.1.aarch64",
        "relates_to_product_reference": "openSUSE Leap 15.4"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "dtb-qcom-5.14.21-150400.24.21.1.aarch64 as component of openSUSE Leap 15.4",
          "product_id": "openSUSE Leap 15.4:dtb-qcom-5.14.21-150400.24.21.1.aarch64"
        },
        "product_reference": "dtb-qcom-5.14.21-150400.24.21.1.aarch64",
        "relates_to_product_reference": "openSUSE Leap 15.4"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "dtb-renesas-5.14.21-150400.24.21.1.aarch64 as component of openSUSE Leap 15.4",
          "product_id": "openSUSE Leap 15.4:dtb-renesas-5.14.21-150400.24.21.1.aarch64"
        },
        "product_reference": "dtb-renesas-5.14.21-150400.24.21.1.aarch64",
        "relates_to_product_reference": "openSUSE Leap 15.4"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "dtb-rockchip-5.14.21-150400.24.21.1.aarch64 as component of openSUSE Leap 15.4",
          "product_id": "openSUSE Leap 15.4:dtb-rockchip-5.14.21-150400.24.21.1.aarch64"
        },
        "product_reference": "dtb-rockchip-5.14.21-150400.24.21.1.aarch64",
        "relates_to_product_reference": "openSUSE Leap 15.4"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "dtb-socionext-5.14.21-150400.24.21.1.aarch64 as component of openSUSE Leap 15.4",
          "product_id": "openSUSE Leap 15.4:dtb-socionext-5.14.21-150400.24.21.1.aarch64"
        },
        "product_reference": "dtb-socionext-5.14.21-150400.24.21.1.aarch64",
        "relates_to_product_reference": "openSUSE Leap 15.4"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "dtb-sprd-5.14.21-150400.24.21.1.aarch64 as component of openSUSE Leap 15.4",
          "product_id": "openSUSE Leap 15.4:dtb-sprd-5.14.21-150400.24.21.1.aarch64"
        },
        "product_reference": "dtb-sprd-5.14.21-150400.24.21.1.aarch64",
        "relates_to_product_reference": "openSUSE Leap 15.4"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "dtb-xilinx-5.14.21-150400.24.21.1.aarch64 as component of openSUSE Leap 15.4",
          "product_id": "openSUSE Leap 15.4:dtb-xilinx-5.14.21-150400.24.21.1.aarch64"
        },
        "product_reference": "dtb-xilinx-5.14.21-150400.24.21.1.aarch64",
        "relates_to_product_reference": "openSUSE Leap 15.4"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "gfs2-kmp-64kb-5.14.21-150400.24.21.2.aarch64 as component of openSUSE Leap 15.4",
          "product_id": "openSUSE Leap 15.4:gfs2-kmp-64kb-5.14.21-150400.24.21.2.aarch64"
        },
        "product_reference": "gfs2-kmp-64kb-5.14.21-150400.24.21.2.aarch64",
        "relates_to_product_reference": "openSUSE Leap 15.4"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "gfs2-kmp-default-5.14.21-150400.24.21.2.aarch64 as component of openSUSE Leap 15.4",
          "product_id": "openSUSE Leap 15.4:gfs2-kmp-default-5.14.21-150400.24.21.2.aarch64"
        },
        "product_reference": "gfs2-kmp-default-5.14.21-150400.24.21.2.aarch64",
        "relates_to_product_reference": "openSUSE Leap 15.4"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "gfs2-kmp-default-5.14.21-150400.24.21.2.ppc64le as component of openSUSE Leap 15.4",
          "product_id": "openSUSE Leap 15.4:gfs2-kmp-default-5.14.21-150400.24.21.2.ppc64le"
        },
        "product_reference": "gfs2-kmp-default-5.14.21-150400.24.21.2.ppc64le",
        "relates_to_product_reference": "openSUSE Leap 15.4"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "gfs2-kmp-default-5.14.21-150400.24.21.2.s390x as component of openSUSE Leap 15.4",
          "product_id": "openSUSE Leap 15.4:gfs2-kmp-default-5.14.21-150400.24.21.2.s390x"
        },
        "product_reference": "gfs2-kmp-default-5.14.21-150400.24.21.2.s390x",
        "relates_to_product_reference": "openSUSE Leap 15.4"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "gfs2-kmp-default-5.14.21-150400.24.21.2.x86_64 as component of openSUSE Leap 15.4",
          "product_id": "openSUSE Leap 15.4:gfs2-kmp-default-5.14.21-150400.24.21.2.x86_64"
        },
        "product_reference": "gfs2-kmp-default-5.14.21-150400.24.21.2.x86_64",
        "relates_to_product_reference": "openSUSE Leap 15.4"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-64kb-5.14.21-150400.24.21.2.aarch64 as component of openSUSE Leap 15.4",
          "product_id": "openSUSE Leap 15.4:kernel-64kb-5.14.21-150400.24.21.2.aarch64"
        },
        "product_reference": "kernel-64kb-5.14.21-150400.24.21.2.aarch64",
        "relates_to_product_reference": "openSUSE Leap 15.4"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-64kb-devel-5.14.21-150400.24.21.2.aarch64 as component of openSUSE Leap 15.4",
          "product_id": "openSUSE Leap 15.4:kernel-64kb-devel-5.14.21-150400.24.21.2.aarch64"
        },
        "product_reference": "kernel-64kb-devel-5.14.21-150400.24.21.2.aarch64",
        "relates_to_product_reference": "openSUSE Leap 15.4"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-64kb-extra-5.14.21-150400.24.21.2.aarch64 as component of openSUSE Leap 15.4",
          "product_id": "openSUSE Leap 15.4:kernel-64kb-extra-5.14.21-150400.24.21.2.aarch64"
        },
        "product_reference": "kernel-64kb-extra-5.14.21-150400.24.21.2.aarch64",
        "relates_to_product_reference": "openSUSE Leap 15.4"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-64kb-livepatch-devel-5.14.21-150400.24.21.2.aarch64 as component of openSUSE Leap 15.4",
          "product_id": "openSUSE Leap 15.4:kernel-64kb-livepatch-devel-5.14.21-150400.24.21.2.aarch64"
        },
        "product_reference": "kernel-64kb-livepatch-devel-5.14.21-150400.24.21.2.aarch64",
        "relates_to_product_reference": "openSUSE Leap 15.4"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-64kb-optional-5.14.21-150400.24.21.2.aarch64 as component of openSUSE Leap 15.4",
          "product_id": "openSUSE Leap 15.4:kernel-64kb-optional-5.14.21-150400.24.21.2.aarch64"
        },
        "product_reference": "kernel-64kb-optional-5.14.21-150400.24.21.2.aarch64",
        "relates_to_product_reference": "openSUSE Leap 15.4"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-debug-5.14.21-150400.24.21.2.ppc64le as component of openSUSE Leap 15.4",
          "product_id": "openSUSE Leap 15.4:kernel-debug-5.14.21-150400.24.21.2.ppc64le"
        },
        "product_reference": "kernel-debug-5.14.21-150400.24.21.2.ppc64le",
        "relates_to_product_reference": "openSUSE Leap 15.4"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-debug-5.14.21-150400.24.21.2.x86_64 as component of openSUSE Leap 15.4",
          "product_id": "openSUSE Leap 15.4:kernel-debug-5.14.21-150400.24.21.2.x86_64"
        },
        "product_reference": "kernel-debug-5.14.21-150400.24.21.2.x86_64",
        "relates_to_product_reference": "openSUSE Leap 15.4"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-debug-devel-5.14.21-150400.24.21.2.ppc64le as component of openSUSE Leap 15.4",
          "product_id": "openSUSE Leap 15.4:kernel-debug-devel-5.14.21-150400.24.21.2.ppc64le"
        },
        "product_reference": "kernel-debug-devel-5.14.21-150400.24.21.2.ppc64le",
        "relates_to_product_reference": "openSUSE Leap 15.4"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-debug-devel-5.14.21-150400.24.21.2.x86_64 as component of openSUSE Leap 15.4",
          "product_id": "openSUSE Leap 15.4:kernel-debug-devel-5.14.21-150400.24.21.2.x86_64"
        },
        "product_reference": "kernel-debug-devel-5.14.21-150400.24.21.2.x86_64",
        "relates_to_product_reference": "openSUSE Leap 15.4"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-debug-livepatch-devel-5.14.21-150400.24.21.2.ppc64le as component of openSUSE Leap 15.4",
          "product_id": "openSUSE Leap 15.4:kernel-debug-livepatch-devel-5.14.21-150400.24.21.2.ppc64le"
        },
        "product_reference": "kernel-debug-livepatch-devel-5.14.21-150400.24.21.2.ppc64le",
        "relates_to_product_reference": "openSUSE Leap 15.4"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-debug-livepatch-devel-5.14.21-150400.24.21.2.x86_64 as component of openSUSE Leap 15.4",
          "product_id": "openSUSE Leap 15.4:kernel-debug-livepatch-devel-5.14.21-150400.24.21.2.x86_64"
        },
        "product_reference": "kernel-debug-livepatch-devel-5.14.21-150400.24.21.2.x86_64",
        "relates_to_product_reference": "openSUSE Leap 15.4"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-default-5.14.21-150400.24.21.2.aarch64 as component of openSUSE Leap 15.4",
          "product_id": "openSUSE Leap 15.4:kernel-default-5.14.21-150400.24.21.2.aarch64"
        },
        "product_reference": "kernel-default-5.14.21-150400.24.21.2.aarch64",
        "relates_to_product_reference": "openSUSE Leap 15.4"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-default-5.14.21-150400.24.21.2.ppc64le as component of openSUSE Leap 15.4",
          "product_id": "openSUSE Leap 15.4:kernel-default-5.14.21-150400.24.21.2.ppc64le"
        },
        "product_reference": "kernel-default-5.14.21-150400.24.21.2.ppc64le",
        "relates_to_product_reference": "openSUSE Leap 15.4"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-default-5.14.21-150400.24.21.2.s390x as component of openSUSE Leap 15.4",
          "product_id": "openSUSE Leap 15.4:kernel-default-5.14.21-150400.24.21.2.s390x"
        },
        "product_reference": "kernel-default-5.14.21-150400.24.21.2.s390x",
        "relates_to_product_reference": "openSUSE Leap 15.4"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-default-5.14.21-150400.24.21.2.x86_64 as component of openSUSE Leap 15.4",
          "product_id": "openSUSE Leap 15.4:kernel-default-5.14.21-150400.24.21.2.x86_64"
        },
        "product_reference": "kernel-default-5.14.21-150400.24.21.2.x86_64",
        "relates_to_product_reference": "openSUSE Leap 15.4"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-default-base-5.14.21-150400.24.21.2.150400.24.7.2.aarch64 as component of openSUSE Leap 15.4",
          "product_id": "openSUSE Leap 15.4:kernel-default-base-5.14.21-150400.24.21.2.150400.24.7.2.aarch64"
        },
        "product_reference": "kernel-default-base-5.14.21-150400.24.21.2.150400.24.7.2.aarch64",
        "relates_to_product_reference": "openSUSE Leap 15.4"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-default-base-5.14.21-150400.24.21.2.150400.24.7.2.ppc64le as component of openSUSE Leap 15.4",
          "product_id": "openSUSE Leap 15.4:kernel-default-base-5.14.21-150400.24.21.2.150400.24.7.2.ppc64le"
        },
        "product_reference": "kernel-default-base-5.14.21-150400.24.21.2.150400.24.7.2.ppc64le",
        "relates_to_product_reference": "openSUSE Leap 15.4"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-default-base-5.14.21-150400.24.21.2.150400.24.7.2.s390x as component of openSUSE Leap 15.4",
          "product_id": "openSUSE Leap 15.4:kernel-default-base-5.14.21-150400.24.21.2.150400.24.7.2.s390x"
        },
        "product_reference": "kernel-default-base-5.14.21-150400.24.21.2.150400.24.7.2.s390x",
        "relates_to_product_reference": "openSUSE Leap 15.4"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-default-base-5.14.21-150400.24.21.2.150400.24.7.2.x86_64 as component of openSUSE Leap 15.4",
          "product_id": "openSUSE Leap 15.4:kernel-default-base-5.14.21-150400.24.21.2.150400.24.7.2.x86_64"
        },
        "product_reference": "kernel-default-base-5.14.21-150400.24.21.2.150400.24.7.2.x86_64",
        "relates_to_product_reference": "openSUSE Leap 15.4"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-default-base-rebuild-5.14.21-150400.24.21.2.150400.24.7.2.aarch64 as component of openSUSE Leap 15.4",
          "product_id": "openSUSE Leap 15.4:kernel-default-base-rebuild-5.14.21-150400.24.21.2.150400.24.7.2.aarch64"
        },
        "product_reference": "kernel-default-base-rebuild-5.14.21-150400.24.21.2.150400.24.7.2.aarch64",
        "relates_to_product_reference": "openSUSE Leap 15.4"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-default-base-rebuild-5.14.21-150400.24.21.2.150400.24.7.2.ppc64le as component of openSUSE Leap 15.4",
          "product_id": "openSUSE Leap 15.4:kernel-default-base-rebuild-5.14.21-150400.24.21.2.150400.24.7.2.ppc64le"
        },
        "product_reference": "kernel-default-base-rebuild-5.14.21-150400.24.21.2.150400.24.7.2.ppc64le",
        "relates_to_product_reference": "openSUSE Leap 15.4"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-default-base-rebuild-5.14.21-150400.24.21.2.150400.24.7.2.s390x as component of openSUSE Leap 15.4",
          "product_id": "openSUSE Leap 15.4:kernel-default-base-rebuild-5.14.21-150400.24.21.2.150400.24.7.2.s390x"
        },
        "product_reference": "kernel-default-base-rebuild-5.14.21-150400.24.21.2.150400.24.7.2.s390x",
        "relates_to_product_reference": "openSUSE Leap 15.4"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-default-base-rebuild-5.14.21-150400.24.21.2.150400.24.7.2.x86_64 as component of openSUSE Leap 15.4",
          "product_id": "openSUSE Leap 15.4:kernel-default-base-rebuild-5.14.21-150400.24.21.2.150400.24.7.2.x86_64"
        },
        "product_reference": "kernel-default-base-rebuild-5.14.21-150400.24.21.2.150400.24.7.2.x86_64",
        "relates_to_product_reference": "openSUSE Leap 15.4"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-default-devel-5.14.21-150400.24.21.2.aarch64 as component of openSUSE Leap 15.4",
          "product_id": "openSUSE Leap 15.4:kernel-default-devel-5.14.21-150400.24.21.2.aarch64"
        },
        "product_reference": "kernel-default-devel-5.14.21-150400.24.21.2.aarch64",
        "relates_to_product_reference": "openSUSE Leap 15.4"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-default-devel-5.14.21-150400.24.21.2.ppc64le as component of openSUSE Leap 15.4",
          "product_id": "openSUSE Leap 15.4:kernel-default-devel-5.14.21-150400.24.21.2.ppc64le"
        },
        "product_reference": "kernel-default-devel-5.14.21-150400.24.21.2.ppc64le",
        "relates_to_product_reference": "openSUSE Leap 15.4"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-default-devel-5.14.21-150400.24.21.2.s390x as component of openSUSE Leap 15.4",
          "product_id": "openSUSE Leap 15.4:kernel-default-devel-5.14.21-150400.24.21.2.s390x"
        },
        "product_reference": "kernel-default-devel-5.14.21-150400.24.21.2.s390x",
        "relates_to_product_reference": "openSUSE Leap 15.4"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-default-devel-5.14.21-150400.24.21.2.x86_64 as component of openSUSE Leap 15.4",
          "product_id": "openSUSE Leap 15.4:kernel-default-devel-5.14.21-150400.24.21.2.x86_64"
        },
        "product_reference": "kernel-default-devel-5.14.21-150400.24.21.2.x86_64",
        "relates_to_product_reference": "openSUSE Leap 15.4"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-default-extra-5.14.21-150400.24.21.2.aarch64 as component of openSUSE Leap 15.4",
          "product_id": "openSUSE Leap 15.4:kernel-default-extra-5.14.21-150400.24.21.2.aarch64"
        },
        "product_reference": "kernel-default-extra-5.14.21-150400.24.21.2.aarch64",
        "relates_to_product_reference": "openSUSE Leap 15.4"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-default-extra-5.14.21-150400.24.21.2.ppc64le as component of openSUSE Leap 15.4",
          "product_id": "openSUSE Leap 15.4:kernel-default-extra-5.14.21-150400.24.21.2.ppc64le"
        },
        "product_reference": "kernel-default-extra-5.14.21-150400.24.21.2.ppc64le",
        "relates_to_product_reference": "openSUSE Leap 15.4"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-default-extra-5.14.21-150400.24.21.2.s390x as component of openSUSE Leap 15.4",
          "product_id": "openSUSE Leap 15.4:kernel-default-extra-5.14.21-150400.24.21.2.s390x"
        },
        "product_reference": "kernel-default-extra-5.14.21-150400.24.21.2.s390x",
        "relates_to_product_reference": "openSUSE Leap 15.4"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-default-extra-5.14.21-150400.24.21.2.x86_64 as component of openSUSE Leap 15.4",
          "product_id": "openSUSE Leap 15.4:kernel-default-extra-5.14.21-150400.24.21.2.x86_64"
        },
        "product_reference": "kernel-default-extra-5.14.21-150400.24.21.2.x86_64",
        "relates_to_product_reference": "openSUSE Leap 15.4"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-default-livepatch-5.14.21-150400.24.21.2.aarch64 as component of openSUSE Leap 15.4",
          "product_id": "openSUSE Leap 15.4:kernel-default-livepatch-5.14.21-150400.24.21.2.aarch64"
        },
        "product_reference": "kernel-default-livepatch-5.14.21-150400.24.21.2.aarch64",
        "relates_to_product_reference": "openSUSE Leap 15.4"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-default-livepatch-5.14.21-150400.24.21.2.ppc64le as component of openSUSE Leap 15.4",
          "product_id": "openSUSE Leap 15.4:kernel-default-livepatch-5.14.21-150400.24.21.2.ppc64le"
        },
        "product_reference": "kernel-default-livepatch-5.14.21-150400.24.21.2.ppc64le",
        "relates_to_product_reference": "openSUSE Leap 15.4"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-default-livepatch-5.14.21-150400.24.21.2.s390x as component of openSUSE Leap 15.4",
          "product_id": "openSUSE Leap 15.4:kernel-default-livepatch-5.14.21-150400.24.21.2.s390x"
        },
        "product_reference": "kernel-default-livepatch-5.14.21-150400.24.21.2.s390x",
        "relates_to_product_reference": "openSUSE Leap 15.4"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-default-livepatch-5.14.21-150400.24.21.2.x86_64 as component of openSUSE Leap 15.4",
          "product_id": "openSUSE Leap 15.4:kernel-default-livepatch-5.14.21-150400.24.21.2.x86_64"
        },
        "product_reference": "kernel-default-livepatch-5.14.21-150400.24.21.2.x86_64",
        "relates_to_product_reference": "openSUSE Leap 15.4"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-default-livepatch-devel-5.14.21-150400.24.21.2.aarch64 as component of openSUSE Leap 15.4",
          "product_id": "openSUSE Leap 15.4:kernel-default-livepatch-devel-5.14.21-150400.24.21.2.aarch64"
        },
        "product_reference": "kernel-default-livepatch-devel-5.14.21-150400.24.21.2.aarch64",
        "relates_to_product_reference": "openSUSE Leap 15.4"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-default-livepatch-devel-5.14.21-150400.24.21.2.ppc64le as component of openSUSE Leap 15.4",
          "product_id": "openSUSE Leap 15.4:kernel-default-livepatch-devel-5.14.21-150400.24.21.2.ppc64le"
        },
        "product_reference": "kernel-default-livepatch-devel-5.14.21-150400.24.21.2.ppc64le",
        "relates_to_product_reference": "openSUSE Leap 15.4"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-default-livepatch-devel-5.14.21-150400.24.21.2.s390x as component of openSUSE Leap 15.4",
          "product_id": "openSUSE Leap 15.4:kernel-default-livepatch-devel-5.14.21-150400.24.21.2.s390x"
        },
        "product_reference": "kernel-default-livepatch-devel-5.14.21-150400.24.21.2.s390x",
        "relates_to_product_reference": "openSUSE Leap 15.4"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-default-livepatch-devel-5.14.21-150400.24.21.2.x86_64 as component of openSUSE Leap 15.4",
          "product_id": "openSUSE Leap 15.4:kernel-default-livepatch-devel-5.14.21-150400.24.21.2.x86_64"
        },
        "product_reference": "kernel-default-livepatch-devel-5.14.21-150400.24.21.2.x86_64",
        "relates_to_product_reference": "openSUSE Leap 15.4"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-default-optional-5.14.21-150400.24.21.2.aarch64 as component of openSUSE Leap 15.4",
          "product_id": "openSUSE Leap 15.4:kernel-default-optional-5.14.21-150400.24.21.2.aarch64"
        },
        "product_reference": "kernel-default-optional-5.14.21-150400.24.21.2.aarch64",
        "relates_to_product_reference": "openSUSE Leap 15.4"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-default-optional-5.14.21-150400.24.21.2.ppc64le as component of openSUSE Leap 15.4",
          "product_id": "openSUSE Leap 15.4:kernel-default-optional-5.14.21-150400.24.21.2.ppc64le"
        },
        "product_reference": "kernel-default-optional-5.14.21-150400.24.21.2.ppc64le",
        "relates_to_product_reference": "openSUSE Leap 15.4"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-default-optional-5.14.21-150400.24.21.2.s390x as component of openSUSE Leap 15.4",
          "product_id": "openSUSE Leap 15.4:kernel-default-optional-5.14.21-150400.24.21.2.s390x"
        },
        "product_reference": "kernel-default-optional-5.14.21-150400.24.21.2.s390x",
        "relates_to_product_reference": "openSUSE Leap 15.4"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-default-optional-5.14.21-150400.24.21.2.x86_64 as component of openSUSE Leap 15.4",
          "product_id": "openSUSE Leap 15.4:kernel-default-optional-5.14.21-150400.24.21.2.x86_64"
        },
        "product_reference": "kernel-default-optional-5.14.21-150400.24.21.2.x86_64",
        "relates_to_product_reference": "openSUSE Leap 15.4"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-devel-5.14.21-150400.24.21.2.noarch as component of openSUSE Leap 15.4",
          "product_id": "openSUSE Leap 15.4:kernel-devel-5.14.21-150400.24.21.2.noarch"
        },
        "product_reference": "kernel-devel-5.14.21-150400.24.21.2.noarch",
        "relates_to_product_reference": "openSUSE Leap 15.4"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-docs-5.14.21-150400.24.21.3.noarch as component of openSUSE Leap 15.4",
          "product_id": "openSUSE Leap 15.4:kernel-docs-5.14.21-150400.24.21.3.noarch"
        },
        "product_reference": "kernel-docs-5.14.21-150400.24.21.3.noarch",
        "relates_to_product_reference": "openSUSE Leap 15.4"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-docs-html-5.14.21-150400.24.21.3.noarch as component of openSUSE Leap 15.4",
          "product_id": "openSUSE Leap 15.4:kernel-docs-html-5.14.21-150400.24.21.3.noarch"
        },
        "product_reference": "kernel-docs-html-5.14.21-150400.24.21.3.noarch",
        "relates_to_product_reference": "openSUSE Leap 15.4"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-kvmsmall-5.14.21-150400.24.21.2.aarch64 as component of openSUSE Leap 15.4",
          "product_id": "openSUSE Leap 15.4:kernel-kvmsmall-5.14.21-150400.24.21.2.aarch64"
        },
        "product_reference": "kernel-kvmsmall-5.14.21-150400.24.21.2.aarch64",
        "relates_to_product_reference": "openSUSE Leap 15.4"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-kvmsmall-5.14.21-150400.24.21.2.ppc64le as component of openSUSE Leap 15.4",
          "product_id": "openSUSE Leap 15.4:kernel-kvmsmall-5.14.21-150400.24.21.2.ppc64le"
        },
        "product_reference": "kernel-kvmsmall-5.14.21-150400.24.21.2.ppc64le",
        "relates_to_product_reference": "openSUSE Leap 15.4"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-kvmsmall-5.14.21-150400.24.21.2.x86_64 as component of openSUSE Leap 15.4",
          "product_id": "openSUSE Leap 15.4:kernel-kvmsmall-5.14.21-150400.24.21.2.x86_64"
        },
        "product_reference": "kernel-kvmsmall-5.14.21-150400.24.21.2.x86_64",
        "relates_to_product_reference": "openSUSE Leap 15.4"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-kvmsmall-devel-5.14.21-150400.24.21.2.aarch64 as component of openSUSE Leap 15.4",
          "product_id": "openSUSE Leap 15.4:kernel-kvmsmall-devel-5.14.21-150400.24.21.2.aarch64"
        },
        "product_reference": "kernel-kvmsmall-devel-5.14.21-150400.24.21.2.aarch64",
        "relates_to_product_reference": "openSUSE Leap 15.4"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-kvmsmall-devel-5.14.21-150400.24.21.2.ppc64le as component of openSUSE Leap 15.4",
          "product_id": "openSUSE Leap 15.4:kernel-kvmsmall-devel-5.14.21-150400.24.21.2.ppc64le"
        },
        "product_reference": "kernel-kvmsmall-devel-5.14.21-150400.24.21.2.ppc64le",
        "relates_to_product_reference": "openSUSE Leap 15.4"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-kvmsmall-devel-5.14.21-150400.24.21.2.x86_64 as component of openSUSE Leap 15.4",
          "product_id": "openSUSE Leap 15.4:kernel-kvmsmall-devel-5.14.21-150400.24.21.2.x86_64"
        },
        "product_reference": "kernel-kvmsmall-devel-5.14.21-150400.24.21.2.x86_64",
        "relates_to_product_reference": "openSUSE Leap 15.4"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-kvmsmall-livepatch-devel-5.14.21-150400.24.21.2.aarch64 as component of openSUSE Leap 15.4",
          "product_id": "openSUSE Leap 15.4:kernel-kvmsmall-livepatch-devel-5.14.21-150400.24.21.2.aarch64"
        },
        "product_reference": "kernel-kvmsmall-livepatch-devel-5.14.21-150400.24.21.2.aarch64",
        "relates_to_product_reference": "openSUSE Leap 15.4"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-kvmsmall-livepatch-devel-5.14.21-150400.24.21.2.ppc64le as component of openSUSE Leap 15.4",
          "product_id": "openSUSE Leap 15.4:kernel-kvmsmall-livepatch-devel-5.14.21-150400.24.21.2.ppc64le"
        },
        "product_reference": "kernel-kvmsmall-livepatch-devel-5.14.21-150400.24.21.2.ppc64le",
        "relates_to_product_reference": "openSUSE Leap 15.4"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-kvmsmall-livepatch-devel-5.14.21-150400.24.21.2.x86_64 as component of openSUSE Leap 15.4",
          "product_id": "openSUSE Leap 15.4:kernel-kvmsmall-livepatch-devel-5.14.21-150400.24.21.2.x86_64"
        },
        "product_reference": "kernel-kvmsmall-livepatch-devel-5.14.21-150400.24.21.2.x86_64",
        "relates_to_product_reference": "openSUSE Leap 15.4"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-macros-5.14.21-150400.24.21.2.noarch as component of openSUSE Leap 15.4",
          "product_id": "openSUSE Leap 15.4:kernel-macros-5.14.21-150400.24.21.2.noarch"
        },
        "product_reference": "kernel-macros-5.14.21-150400.24.21.2.noarch",
        "relates_to_product_reference": "openSUSE Leap 15.4"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-obs-build-5.14.21-150400.24.21.2.aarch64 as component of openSUSE Leap 15.4",
          "product_id": "openSUSE Leap 15.4:kernel-obs-build-5.14.21-150400.24.21.2.aarch64"
        },
        "product_reference": "kernel-obs-build-5.14.21-150400.24.21.2.aarch64",
        "relates_to_product_reference": "openSUSE Leap 15.4"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-obs-build-5.14.21-150400.24.21.2.ppc64le as component of openSUSE Leap 15.4",
          "product_id": "openSUSE Leap 15.4:kernel-obs-build-5.14.21-150400.24.21.2.ppc64le"
        },
        "product_reference": "kernel-obs-build-5.14.21-150400.24.21.2.ppc64le",
        "relates_to_product_reference": "openSUSE Leap 15.4"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-obs-build-5.14.21-150400.24.21.2.s390x as component of openSUSE Leap 15.4",
          "product_id": "openSUSE Leap 15.4:kernel-obs-build-5.14.21-150400.24.21.2.s390x"
        },
        "product_reference": "kernel-obs-build-5.14.21-150400.24.21.2.s390x",
        "relates_to_product_reference": "openSUSE Leap 15.4"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-obs-build-5.14.21-150400.24.21.2.x86_64 as component of openSUSE Leap 15.4",
          "product_id": "openSUSE Leap 15.4:kernel-obs-build-5.14.21-150400.24.21.2.x86_64"
        },
        "product_reference": "kernel-obs-build-5.14.21-150400.24.21.2.x86_64",
        "relates_to_product_reference": "openSUSE Leap 15.4"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-obs-qa-5.14.21-150400.24.21.1.aarch64 as component of openSUSE Leap 15.4",
          "product_id": "openSUSE Leap 15.4:kernel-obs-qa-5.14.21-150400.24.21.1.aarch64"
        },
        "product_reference": "kernel-obs-qa-5.14.21-150400.24.21.1.aarch64",
        "relates_to_product_reference": "openSUSE Leap 15.4"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-obs-qa-5.14.21-150400.24.21.1.ppc64le as component of openSUSE Leap 15.4",
          "product_id": "openSUSE Leap 15.4:kernel-obs-qa-5.14.21-150400.24.21.1.ppc64le"
        },
        "product_reference": "kernel-obs-qa-5.14.21-150400.24.21.1.ppc64le",
        "relates_to_product_reference": "openSUSE Leap 15.4"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-obs-qa-5.14.21-150400.24.21.1.s390x as component of openSUSE Leap 15.4",
          "product_id": "openSUSE Leap 15.4:kernel-obs-qa-5.14.21-150400.24.21.1.s390x"
        },
        "product_reference": "kernel-obs-qa-5.14.21-150400.24.21.1.s390x",
        "relates_to_product_reference": "openSUSE Leap 15.4"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-obs-qa-5.14.21-150400.24.21.1.x86_64 as component of openSUSE Leap 15.4",
          "product_id": "openSUSE Leap 15.4:kernel-obs-qa-5.14.21-150400.24.21.1.x86_64"
        },
        "product_reference": "kernel-obs-qa-5.14.21-150400.24.21.1.x86_64",
        "relates_to_product_reference": "openSUSE Leap 15.4"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-source-5.14.21-150400.24.21.2.noarch as component of openSUSE Leap 15.4",
          "product_id": "openSUSE Leap 15.4:kernel-source-5.14.21-150400.24.21.2.noarch"
        },
        "product_reference": "kernel-source-5.14.21-150400.24.21.2.noarch",
        "relates_to_product_reference": "openSUSE Leap 15.4"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-source-vanilla-5.14.21-150400.24.21.2.noarch as component of openSUSE Leap 15.4",
          "product_id": "openSUSE Leap 15.4:kernel-source-vanilla-5.14.21-150400.24.21.2.noarch"
        },
        "product_reference": "kernel-source-vanilla-5.14.21-150400.24.21.2.noarch",
        "relates_to_product_reference": "openSUSE Leap 15.4"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-syms-5.14.21-150400.24.21.1.aarch64 as component of openSUSE Leap 15.4",
          "product_id": "openSUSE Leap 15.4:kernel-syms-5.14.21-150400.24.21.1.aarch64"
        },
        "product_reference": "kernel-syms-5.14.21-150400.24.21.1.aarch64",
        "relates_to_product_reference": "openSUSE Leap 15.4"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-syms-5.14.21-150400.24.21.1.ppc64le as component of openSUSE Leap 15.4",
          "product_id": "openSUSE Leap 15.4:kernel-syms-5.14.21-150400.24.21.1.ppc64le"
        },
        "product_reference": "kernel-syms-5.14.21-150400.24.21.1.ppc64le",
        "relates_to_product_reference": "openSUSE Leap 15.4"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-syms-5.14.21-150400.24.21.1.s390x as component of openSUSE Leap 15.4",
          "product_id": "openSUSE Leap 15.4:kernel-syms-5.14.21-150400.24.21.1.s390x"
        },
        "product_reference": "kernel-syms-5.14.21-150400.24.21.1.s390x",
        "relates_to_product_reference": "openSUSE Leap 15.4"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-syms-5.14.21-150400.24.21.1.x86_64 as component of openSUSE Leap 15.4",
          "product_id": "openSUSE Leap 15.4:kernel-syms-5.14.21-150400.24.21.1.x86_64"
        },
        "product_reference": "kernel-syms-5.14.21-150400.24.21.1.x86_64",
        "relates_to_product_reference": "openSUSE Leap 15.4"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-zfcpdump-5.14.21-150400.24.21.2.s390x as component of openSUSE Leap 15.4",
          "product_id": "openSUSE Leap 15.4:kernel-zfcpdump-5.14.21-150400.24.21.2.s390x"
        },
        "product_reference": "kernel-zfcpdump-5.14.21-150400.24.21.2.s390x",
        "relates_to_product_reference": "openSUSE Leap 15.4"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kselftests-kmp-64kb-5.14.21-150400.24.21.2.aarch64 as component of openSUSE Leap 15.4",
          "product_id": "openSUSE Leap 15.4:kselftests-kmp-64kb-5.14.21-150400.24.21.2.aarch64"
        },
        "product_reference": "kselftests-kmp-64kb-5.14.21-150400.24.21.2.aarch64",
        "relates_to_product_reference": "openSUSE Leap 15.4"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kselftests-kmp-default-5.14.21-150400.24.21.2.aarch64 as component of openSUSE Leap 15.4",
          "product_id": "openSUSE Leap 15.4:kselftests-kmp-default-5.14.21-150400.24.21.2.aarch64"
        },
        "product_reference": "kselftests-kmp-default-5.14.21-150400.24.21.2.aarch64",
        "relates_to_product_reference": "openSUSE Leap 15.4"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kselftests-kmp-default-5.14.21-150400.24.21.2.ppc64le as component of openSUSE Leap 15.4",
          "product_id": "openSUSE Leap 15.4:kselftests-kmp-default-5.14.21-150400.24.21.2.ppc64le"
        },
        "product_reference": "kselftests-kmp-default-5.14.21-150400.24.21.2.ppc64le",
        "relates_to_product_reference": "openSUSE Leap 15.4"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kselftests-kmp-default-5.14.21-150400.24.21.2.s390x as component of openSUSE Leap 15.4",
          "product_id": "openSUSE Leap 15.4:kselftests-kmp-default-5.14.21-150400.24.21.2.s390x"
        },
        "product_reference": "kselftests-kmp-default-5.14.21-150400.24.21.2.s390x",
        "relates_to_product_reference": "openSUSE Leap 15.4"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kselftests-kmp-default-5.14.21-150400.24.21.2.x86_64 as component of openSUSE Leap 15.4",
          "product_id": "openSUSE Leap 15.4:kselftests-kmp-default-5.14.21-150400.24.21.2.x86_64"
        },
        "product_reference": "kselftests-kmp-default-5.14.21-150400.24.21.2.x86_64",
        "relates_to_product_reference": "openSUSE Leap 15.4"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "ocfs2-kmp-64kb-5.14.21-150400.24.21.2.aarch64 as component of openSUSE Leap 15.4",
          "product_id": "openSUSE Leap 15.4:ocfs2-kmp-64kb-5.14.21-150400.24.21.2.aarch64"
        },
        "product_reference": "ocfs2-kmp-64kb-5.14.21-150400.24.21.2.aarch64",
        "relates_to_product_reference": "openSUSE Leap 15.4"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "ocfs2-kmp-default-5.14.21-150400.24.21.2.aarch64 as component of openSUSE Leap 15.4",
          "product_id": "openSUSE Leap 15.4:ocfs2-kmp-default-5.14.21-150400.24.21.2.aarch64"
        },
        "product_reference": "ocfs2-kmp-default-5.14.21-150400.24.21.2.aarch64",
        "relates_to_product_reference": "openSUSE Leap 15.4"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "ocfs2-kmp-default-5.14.21-150400.24.21.2.ppc64le as component of openSUSE Leap 15.4",
          "product_id": "openSUSE Leap 15.4:ocfs2-kmp-default-5.14.21-150400.24.21.2.ppc64le"
        },
        "product_reference": "ocfs2-kmp-default-5.14.21-150400.24.21.2.ppc64le",
        "relates_to_product_reference": "openSUSE Leap 15.4"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "ocfs2-kmp-default-5.14.21-150400.24.21.2.s390x as component of openSUSE Leap 15.4",
          "product_id": "openSUSE Leap 15.4:ocfs2-kmp-default-5.14.21-150400.24.21.2.s390x"
        },
        "product_reference": "ocfs2-kmp-default-5.14.21-150400.24.21.2.s390x",
        "relates_to_product_reference": "openSUSE Leap 15.4"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "ocfs2-kmp-default-5.14.21-150400.24.21.2.x86_64 as component of openSUSE Leap 15.4",
          "product_id": "openSUSE Leap 15.4:ocfs2-kmp-default-5.14.21-150400.24.21.2.x86_64"
        },
        "product_reference": "ocfs2-kmp-default-5.14.21-150400.24.21.2.x86_64",
        "relates_to_product_reference": "openSUSE Leap 15.4"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "reiserfs-kmp-64kb-5.14.21-150400.24.21.2.aarch64 as component of openSUSE Leap 15.4",
          "product_id": "openSUSE Leap 15.4:reiserfs-kmp-64kb-5.14.21-150400.24.21.2.aarch64"
        },
        "product_reference": "reiserfs-kmp-64kb-5.14.21-150400.24.21.2.aarch64",
        "relates_to_product_reference": "openSUSE Leap 15.4"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "reiserfs-kmp-default-5.14.21-150400.24.21.2.aarch64 as component of openSUSE Leap 15.4",
          "product_id": "openSUSE Leap 15.4:reiserfs-kmp-default-5.14.21-150400.24.21.2.aarch64"
        },
        "product_reference": "reiserfs-kmp-default-5.14.21-150400.24.21.2.aarch64",
        "relates_to_product_reference": "openSUSE Leap 15.4"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "reiserfs-kmp-default-5.14.21-150400.24.21.2.ppc64le as component of openSUSE Leap 15.4",
          "product_id": "openSUSE Leap 15.4:reiserfs-kmp-default-5.14.21-150400.24.21.2.ppc64le"
        },
        "product_reference": "reiserfs-kmp-default-5.14.21-150400.24.21.2.ppc64le",
        "relates_to_product_reference": "openSUSE Leap 15.4"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "reiserfs-kmp-default-5.14.21-150400.24.21.2.s390x as component of openSUSE Leap 15.4",
          "product_id": "openSUSE Leap 15.4:reiserfs-kmp-default-5.14.21-150400.24.21.2.s390x"
        },
        "product_reference": "reiserfs-kmp-default-5.14.21-150400.24.21.2.s390x",
        "relates_to_product_reference": "openSUSE Leap 15.4"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "reiserfs-kmp-default-5.14.21-150400.24.21.2.x86_64 as component of openSUSE Leap 15.4",
          "product_id": "openSUSE Leap 15.4:reiserfs-kmp-default-5.14.21-150400.24.21.2.x86_64"
        },
        "product_reference": "reiserfs-kmp-default-5.14.21-150400.24.21.2.x86_64",
        "relates_to_product_reference": "openSUSE Leap 15.4"
      }
    ]
  },
  "vulnerabilities": [
    {
      "cve": "CVE-2016-3695",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2016-3695"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "The einj_error_inject function in drivers/acpi/apei/einj.c in the Linux kernel allows local users to simulate hardware errors and consequently cause a denial of service by leveraging failure to disable APEI error injection through EINJ when securelevel is set.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.21.2.aarch64",
          "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.21.2.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.21.2.s390x",
          "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.21.2.x86_64",
          "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.21.2.aarch64",
          "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.21.2.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.21.2.s390x",
          "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.21.2.x86_64",
          "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.21.2.aarch64",
          "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.21.2.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.21.2.s390x",
          "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.21.2.x86_64",
          "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.21.2.aarch64",
          "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.21.2.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.21.2.s390x",
          "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.21.2.x86_64",
          "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.21.2.ppc64le",
          "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.21.2.s390x",
          "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.21.2.x86_64",
          "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.21.2.ppc64le",
          "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.21.2.s390x",
          "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.21.2.x86_64",
          "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_21-default-1-150400.9.3.2.ppc64le",
          "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_21-default-1-150400.9.3.2.s390x",
          "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_21-default-1-150400.9.3.2.x86_64",
          "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-64kb-5.14.21-150400.24.21.2.aarch64",
          "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-64kb-devel-5.14.21-150400.24.21.2.aarch64",
          "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-5.14.21-150400.24.21.2.aarch64",
          "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-5.14.21-150400.24.21.2.ppc64le",
          "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-5.14.21-150400.24.21.2.s390x",
          "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-5.14.21-150400.24.21.2.x86_64",
          "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-base-5.14.21-150400.24.21.2.150400.24.7.2.aarch64",
          "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-base-5.14.21-150400.24.21.2.150400.24.7.2.ppc64le",
          "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-base-5.14.21-150400.24.21.2.150400.24.7.2.s390x",
          "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-base-5.14.21-150400.24.21.2.150400.24.7.2.x86_64",
          "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-devel-5.14.21-150400.24.21.2.aarch64",
          "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-devel-5.14.21-150400.24.21.2.ppc64le",
          "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-devel-5.14.21-150400.24.21.2.s390x",
          "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-devel-5.14.21-150400.24.21.2.x86_64",
          "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-devel-5.14.21-150400.24.21.2.noarch",
          "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-macros-5.14.21-150400.24.21.2.noarch",
          "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-zfcpdump-5.14.21-150400.24.21.2.s390x",
          "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-docs-5.14.21-150400.24.21.3.noarch",
          "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-obs-build-5.14.21-150400.24.21.2.aarch64",
          "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-obs-build-5.14.21-150400.24.21.2.ppc64le",
          "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-obs-build-5.14.21-150400.24.21.2.s390x",
          "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-obs-build-5.14.21-150400.24.21.2.x86_64",
          "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-source-5.14.21-150400.24.21.2.noarch",
          "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-syms-5.14.21-150400.24.21.1.aarch64",
          "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-syms-5.14.21-150400.24.21.1.ppc64le",
          "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-syms-5.14.21-150400.24.21.1.s390x",
          "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-syms-5.14.21-150400.24.21.1.x86_64",
          "SUSE Linux Enterprise Module for Legacy 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.21.2.aarch64",
          "SUSE Linux Enterprise Module for Legacy 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.21.2.ppc64le",
          "SUSE Linux Enterprise Module for Legacy 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.21.2.s390x",
          "SUSE Linux Enterprise Module for Legacy 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.21.2.x86_64",
          "SUSE Linux Enterprise Workstation Extension 15 SP4:kernel-default-extra-5.14.21-150400.24.21.2.x86_64",
          "openSUSE Leap 15.4:cluster-md-kmp-64kb-5.14.21-150400.24.21.2.aarch64",
          "openSUSE Leap 15.4:cluster-md-kmp-default-5.14.21-150400.24.21.2.aarch64",
          "openSUSE Leap 15.4:cluster-md-kmp-default-5.14.21-150400.24.21.2.ppc64le",
          "openSUSE Leap 15.4:cluster-md-kmp-default-5.14.21-150400.24.21.2.s390x",
          "openSUSE Leap 15.4:cluster-md-kmp-default-5.14.21-150400.24.21.2.x86_64",
          "openSUSE Leap 15.4:dlm-kmp-64kb-5.14.21-150400.24.21.2.aarch64",
          "openSUSE Leap 15.4:dlm-kmp-default-5.14.21-150400.24.21.2.aarch64",
          "openSUSE Leap 15.4:dlm-kmp-default-5.14.21-150400.24.21.2.ppc64le",
          "openSUSE Leap 15.4:dlm-kmp-default-5.14.21-150400.24.21.2.s390x",
          "openSUSE Leap 15.4:dlm-kmp-default-5.14.21-150400.24.21.2.x86_64",
          "openSUSE Leap 15.4:dtb-allwinner-5.14.21-150400.24.21.1.aarch64",
          "openSUSE Leap 15.4:dtb-altera-5.14.21-150400.24.21.1.aarch64",
          "openSUSE Leap 15.4:dtb-amazon-5.14.21-150400.24.21.1.aarch64",
          "openSUSE Leap 15.4:dtb-amd-5.14.21-150400.24.21.1.aarch64",
          "openSUSE Leap 15.4:dtb-amlogic-5.14.21-150400.24.21.1.aarch64",
          "openSUSE Leap 15.4:dtb-apm-5.14.21-150400.24.21.1.aarch64",
          "openSUSE Leap 15.4:dtb-apple-5.14.21-150400.24.21.1.aarch64",
          "openSUSE Leap 15.4:dtb-arm-5.14.21-150400.24.21.1.aarch64",
          "openSUSE Leap 15.4:dtb-broadcom-5.14.21-150400.24.21.1.aarch64",
          "openSUSE Leap 15.4:dtb-cavium-5.14.21-150400.24.21.1.aarch64",
          "openSUSE Leap 15.4:dtb-exynos-5.14.21-150400.24.21.1.aarch64",
          "openSUSE Leap 15.4:dtb-freescale-5.14.21-150400.24.21.1.aarch64",
          "openSUSE Leap 15.4:dtb-hisilicon-5.14.21-150400.24.21.1.aarch64",
          "openSUSE Leap 15.4:dtb-lg-5.14.21-150400.24.21.1.aarch64",
          "openSUSE Leap 15.4:dtb-marvell-5.14.21-150400.24.21.1.aarch64",
          "openSUSE Leap 15.4:dtb-mediatek-5.14.21-150400.24.21.1.aarch64",
          "openSUSE Leap 15.4:dtb-nvidia-5.14.21-150400.24.21.1.aarch64",
          "openSUSE Leap 15.4:dtb-qcom-5.14.21-150400.24.21.1.aarch64",
          "openSUSE Leap 15.4:dtb-renesas-5.14.21-150400.24.21.1.aarch64",
          "openSUSE Leap 15.4:dtb-rockchip-5.14.21-150400.24.21.1.aarch64",
          "openSUSE Leap 15.4:dtb-socionext-5.14.21-150400.24.21.1.aarch64",
          "openSUSE Leap 15.4:dtb-sprd-5.14.21-150400.24.21.1.aarch64",
          "openSUSE Leap 15.4:dtb-xilinx-5.14.21-150400.24.21.1.aarch64",
          "openSUSE Leap 15.4:gfs2-kmp-64kb-5.14.21-150400.24.21.2.aarch64",
          "openSUSE Leap 15.4:gfs2-kmp-default-5.14.21-150400.24.21.2.aarch64",
          "openSUSE Leap 15.4:gfs2-kmp-default-5.14.21-150400.24.21.2.ppc64le",
          "openSUSE Leap 15.4:gfs2-kmp-default-5.14.21-150400.24.21.2.s390x",
          "openSUSE Leap 15.4:gfs2-kmp-default-5.14.21-150400.24.21.2.x86_64",
          "openSUSE Leap 15.4:kernel-64kb-5.14.21-150400.24.21.2.aarch64",
          "openSUSE Leap 15.4:kernel-64kb-devel-5.14.21-150400.24.21.2.aarch64",
          "openSUSE Leap 15.4:kernel-64kb-extra-5.14.21-150400.24.21.2.aarch64",
          "openSUSE Leap 15.4:kernel-64kb-livepatch-devel-5.14.21-150400.24.21.2.aarch64",
          "openSUSE Leap 15.4:kernel-64kb-optional-5.14.21-150400.24.21.2.aarch64",
          "openSUSE Leap 15.4:kernel-debug-5.14.21-150400.24.21.2.ppc64le",
          "openSUSE Leap 15.4:kernel-debug-5.14.21-150400.24.21.2.x86_64",
          "openSUSE Leap 15.4:kernel-debug-devel-5.14.21-150400.24.21.2.ppc64le",
          "openSUSE Leap 15.4:kernel-debug-devel-5.14.21-150400.24.21.2.x86_64",
          "openSUSE Leap 15.4:kernel-debug-livepatch-devel-5.14.21-150400.24.21.2.ppc64le",
          "openSUSE Leap 15.4:kernel-debug-livepatch-devel-5.14.21-150400.24.21.2.x86_64",
          "openSUSE Leap 15.4:kernel-default-5.14.21-150400.24.21.2.aarch64",
          "openSUSE Leap 15.4:kernel-default-5.14.21-150400.24.21.2.ppc64le",
          "openSUSE Leap 15.4:kernel-default-5.14.21-150400.24.21.2.s390x",
          "openSUSE Leap 15.4:kernel-default-5.14.21-150400.24.21.2.x86_64",
          "openSUSE Leap 15.4:kernel-default-base-5.14.21-150400.24.21.2.150400.24.7.2.aarch64",
          "openSUSE Leap 15.4:kernel-default-base-5.14.21-150400.24.21.2.150400.24.7.2.ppc64le",
          "openSUSE Leap 15.4:kernel-default-base-5.14.21-150400.24.21.2.150400.24.7.2.s390x",
          "openSUSE Leap 15.4:kernel-default-base-5.14.21-150400.24.21.2.150400.24.7.2.x86_64",
          "openSUSE Leap 15.4:kernel-default-base-rebuild-5.14.21-150400.24.21.2.150400.24.7.2.aarch64",
          "openSUSE Leap 15.4:kernel-default-base-rebuild-5.14.21-150400.24.21.2.150400.24.7.2.ppc64le",
          "openSUSE Leap 15.4:kernel-default-base-rebuild-5.14.21-150400.24.21.2.150400.24.7.2.s390x",
          "openSUSE Leap 15.4:kernel-default-base-rebuild-5.14.21-150400.24.21.2.150400.24.7.2.x86_64",
          "openSUSE Leap 15.4:kernel-default-devel-5.14.21-150400.24.21.2.aarch64",
          "openSUSE Leap 15.4:kernel-default-devel-5.14.21-150400.24.21.2.ppc64le",
          "openSUSE Leap 15.4:kernel-default-devel-5.14.21-150400.24.21.2.s390x",
          "openSUSE Leap 15.4:kernel-default-devel-5.14.21-150400.24.21.2.x86_64",
          "openSUSE Leap 15.4:kernel-default-extra-5.14.21-150400.24.21.2.aarch64",
          "openSUSE Leap 15.4:kernel-default-extra-5.14.21-150400.24.21.2.ppc64le",
          "openSUSE Leap 15.4:kernel-default-extra-5.14.21-150400.24.21.2.s390x",
          "openSUSE Leap 15.4:kernel-default-extra-5.14.21-150400.24.21.2.x86_64",
          "openSUSE Leap 15.4:kernel-default-livepatch-5.14.21-150400.24.21.2.aarch64",
          "openSUSE Leap 15.4:kernel-default-livepatch-5.14.21-150400.24.21.2.ppc64le",
          "openSUSE Leap 15.4:kernel-default-livepatch-5.14.21-150400.24.21.2.s390x",
          "openSUSE Leap 15.4:kernel-default-livepatch-5.14.21-150400.24.21.2.x86_64",
          "openSUSE Leap 15.4:kernel-default-livepatch-devel-5.14.21-150400.24.21.2.aarch64",
          "openSUSE Leap 15.4:kernel-default-livepatch-devel-5.14.21-150400.24.21.2.ppc64le",
          "openSUSE Leap 15.4:kernel-default-livepatch-devel-5.14.21-150400.24.21.2.s390x",
          "openSUSE Leap 15.4:kernel-default-livepatch-devel-5.14.21-150400.24.21.2.x86_64",
          "openSUSE Leap 15.4:kernel-default-optional-5.14.21-150400.24.21.2.aarch64",
          "openSUSE Leap 15.4:kernel-default-optional-5.14.21-150400.24.21.2.ppc64le",
          "openSUSE Leap 15.4:kernel-default-optional-5.14.21-150400.24.21.2.s390x",
          "openSUSE Leap 15.4:kernel-default-optional-5.14.21-150400.24.21.2.x86_64",
          "openSUSE Leap 15.4:kernel-devel-5.14.21-150400.24.21.2.noarch",
          "openSUSE Leap 15.4:kernel-docs-5.14.21-150400.24.21.3.noarch",
          "openSUSE Leap 15.4:kernel-docs-html-5.14.21-150400.24.21.3.noarch",
          "openSUSE Leap 15.4:kernel-kvmsmall-5.14.21-150400.24.21.2.aarch64",
          "openSUSE Leap 15.4:kernel-kvmsmall-5.14.21-150400.24.21.2.ppc64le",
          "openSUSE Leap 15.4:kernel-kvmsmall-5.14.21-150400.24.21.2.x86_64",
          "openSUSE Leap 15.4:kernel-kvmsmall-devel-5.14.21-150400.24.21.2.aarch64",
          "openSUSE Leap 15.4:kernel-kvmsmall-devel-5.14.21-150400.24.21.2.ppc64le",
          "openSUSE Leap 15.4:kernel-kvmsmall-devel-5.14.21-150400.24.21.2.x86_64",
          "openSUSE Leap 15.4:kernel-kvmsmall-livepatch-devel-5.14.21-150400.24.21.2.aarch64",
          "openSUSE Leap 15.4:kernel-kvmsmall-livepatch-devel-5.14.21-150400.24.21.2.ppc64le",
          "openSUSE Leap 15.4:kernel-kvmsmall-livepatch-devel-5.14.21-150400.24.21.2.x86_64",
          "openSUSE Leap 15.4:kernel-macros-5.14.21-150400.24.21.2.noarch",
          "openSUSE Leap 15.4:kernel-obs-build-5.14.21-150400.24.21.2.aarch64",
          "openSUSE Leap 15.4:kernel-obs-build-5.14.21-150400.24.21.2.ppc64le",
          "openSUSE Leap 15.4:kernel-obs-build-5.14.21-150400.24.21.2.s390x",
          "openSUSE Leap 15.4:kernel-obs-build-5.14.21-150400.24.21.2.x86_64",
          "openSUSE Leap 15.4:kernel-obs-qa-5.14.21-150400.24.21.1.aarch64",
          "openSUSE Leap 15.4:kernel-obs-qa-5.14.21-150400.24.21.1.ppc64le",
          "openSUSE Leap 15.4:kernel-obs-qa-5.14.21-150400.24.21.1.s390x",
          "openSUSE Leap 15.4:kernel-obs-qa-5.14.21-150400.24.21.1.x86_64",
          "openSUSE Leap 15.4:kernel-source-5.14.21-150400.24.21.2.noarch",
          "openSUSE Leap 15.4:kernel-source-vanilla-5.14.21-150400.24.21.2.noarch",
          "openSUSE Leap 15.4:kernel-syms-5.14.21-150400.24.21.1.aarch64",
          "openSUSE Leap 15.4:kernel-syms-5.14.21-150400.24.21.1.ppc64le",
          "openSUSE Leap 15.4:kernel-syms-5.14.21-150400.24.21.1.s390x",
          "openSUSE Leap 15.4:kernel-syms-5.14.21-150400.24.21.1.x86_64",
          "openSUSE Leap 15.4:kernel-zfcpdump-5.14.21-150400.24.21.2.s390x",
          "openSUSE Leap 15.4:kselftests-kmp-64kb-5.14.21-150400.24.21.2.aarch64",
          "openSUSE Leap 15.4:kselftests-kmp-default-5.14.21-150400.24.21.2.aarch64",
          "openSUSE Leap 15.4:kselftests-kmp-default-5.14.21-150400.24.21.2.ppc64le",
          "openSUSE Leap 15.4:kselftests-kmp-default-5.14.21-150400.24.21.2.s390x",
          "openSUSE Leap 15.4:kselftests-kmp-default-5.14.21-150400.24.21.2.x86_64",
          "openSUSE Leap 15.4:ocfs2-kmp-64kb-5.14.21-150400.24.21.2.aarch64",
          "openSUSE Leap 15.4:ocfs2-kmp-default-5.14.21-150400.24.21.2.aarch64",
          "openSUSE Leap 15.4:ocfs2-kmp-default-5.14.21-150400.24.21.2.ppc64le",
          "openSUSE Leap 15.4:ocfs2-kmp-default-5.14.21-150400.24.21.2.s390x",
          "openSUSE Leap 15.4:ocfs2-kmp-default-5.14.21-150400.24.21.2.x86_64",
          "openSUSE Leap 15.4:reiserfs-kmp-64kb-5.14.21-150400.24.21.2.aarch64",
          "openSUSE Leap 15.4:reiserfs-kmp-default-5.14.21-150400.24.21.2.aarch64",
          "openSUSE Leap 15.4:reiserfs-kmp-default-5.14.21-150400.24.21.2.ppc64le",
          "openSUSE Leap 15.4:reiserfs-kmp-default-5.14.21-150400.24.21.2.s390x",
          "openSUSE Leap 15.4:reiserfs-kmp-default-5.14.21-150400.24.21.2.x86_64"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2016-3695",
          "url": "https://www.suse.com/security/cve/CVE-2016-3695"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1023051 for CVE-2016-3695",
          "url": "https://bugzilla.suse.com/1023051"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.21.2.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.21.2.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.21.2.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.21.2.x86_64",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.21.2.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.21.2.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.21.2.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.21.2.x86_64",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.21.2.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.21.2.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.21.2.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.21.2.x86_64",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.21.2.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.21.2.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.21.2.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.21.2.x86_64",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.21.2.ppc64le",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.21.2.s390x",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.21.2.x86_64",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.21.2.ppc64le",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.21.2.s390x",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.21.2.x86_64",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_21-default-1-150400.9.3.2.ppc64le",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_21-default-1-150400.9.3.2.s390x",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_21-default-1-150400.9.3.2.x86_64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-64kb-5.14.21-150400.24.21.2.aarch64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-64kb-devel-5.14.21-150400.24.21.2.aarch64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-5.14.21-150400.24.21.2.aarch64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-5.14.21-150400.24.21.2.ppc64le",
            "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-5.14.21-150400.24.21.2.s390x",
            "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-5.14.21-150400.24.21.2.x86_64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-base-5.14.21-150400.24.21.2.150400.24.7.2.aarch64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-base-5.14.21-150400.24.21.2.150400.24.7.2.ppc64le",
            "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-base-5.14.21-150400.24.21.2.150400.24.7.2.s390x",
            "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-base-5.14.21-150400.24.21.2.150400.24.7.2.x86_64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-devel-5.14.21-150400.24.21.2.aarch64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-devel-5.14.21-150400.24.21.2.ppc64le",
            "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-devel-5.14.21-150400.24.21.2.s390x",
            "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-devel-5.14.21-150400.24.21.2.x86_64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-devel-5.14.21-150400.24.21.2.noarch",
            "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-macros-5.14.21-150400.24.21.2.noarch",
            "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-zfcpdump-5.14.21-150400.24.21.2.s390x",
            "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-docs-5.14.21-150400.24.21.3.noarch",
            "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-obs-build-5.14.21-150400.24.21.2.aarch64",
            "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-obs-build-5.14.21-150400.24.21.2.ppc64le",
            "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-obs-build-5.14.21-150400.24.21.2.s390x",
            "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-obs-build-5.14.21-150400.24.21.2.x86_64",
            "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-source-5.14.21-150400.24.21.2.noarch",
            "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-syms-5.14.21-150400.24.21.1.aarch64",
            "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-syms-5.14.21-150400.24.21.1.ppc64le",
            "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-syms-5.14.21-150400.24.21.1.s390x",
            "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-syms-5.14.21-150400.24.21.1.x86_64",
            "SUSE Linux Enterprise Module for Legacy 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.21.2.aarch64",
            "SUSE Linux Enterprise Module for Legacy 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.21.2.ppc64le",
            "SUSE Linux Enterprise Module for Legacy 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.21.2.s390x",
            "SUSE Linux Enterprise Module for Legacy 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.21.2.x86_64",
            "SUSE Linux Enterprise Workstation Extension 15 SP4:kernel-default-extra-5.14.21-150400.24.21.2.x86_64",
            "openSUSE Leap 15.4:cluster-md-kmp-64kb-5.14.21-150400.24.21.2.aarch64",
            "openSUSE Leap 15.4:cluster-md-kmp-default-5.14.21-150400.24.21.2.aarch64",
            "openSUSE Leap 15.4:cluster-md-kmp-default-5.14.21-150400.24.21.2.ppc64le",
            "openSUSE Leap 15.4:cluster-md-kmp-default-5.14.21-150400.24.21.2.s390x",
            "openSUSE Leap 15.4:cluster-md-kmp-default-5.14.21-150400.24.21.2.x86_64",
            "openSUSE Leap 15.4:dlm-kmp-64kb-5.14.21-150400.24.21.2.aarch64",
            "openSUSE Leap 15.4:dlm-kmp-default-5.14.21-150400.24.21.2.aarch64",
            "openSUSE Leap 15.4:dlm-kmp-default-5.14.21-150400.24.21.2.ppc64le",
            "openSUSE Leap 15.4:dlm-kmp-default-5.14.21-150400.24.21.2.s390x",
            "openSUSE Leap 15.4:dlm-kmp-default-5.14.21-150400.24.21.2.x86_64",
            "openSUSE Leap 15.4:dtb-allwinner-5.14.21-150400.24.21.1.aarch64",
            "openSUSE Leap 15.4:dtb-altera-5.14.21-150400.24.21.1.aarch64",
            "openSUSE Leap 15.4:dtb-amazon-5.14.21-150400.24.21.1.aarch64",
            "openSUSE Leap 15.4:dtb-amd-5.14.21-150400.24.21.1.aarch64",
            "openSUSE Leap 15.4:dtb-amlogic-5.14.21-150400.24.21.1.aarch64",
            "openSUSE Leap 15.4:dtb-apm-5.14.21-150400.24.21.1.aarch64",
            "openSUSE Leap 15.4:dtb-apple-5.14.21-150400.24.21.1.aarch64",
            "openSUSE Leap 15.4:dtb-arm-5.14.21-150400.24.21.1.aarch64",
            "openSUSE Leap 15.4:dtb-broadcom-5.14.21-150400.24.21.1.aarch64",
            "openSUSE Leap 15.4:dtb-cavium-5.14.21-150400.24.21.1.aarch64",
            "openSUSE Leap 15.4:dtb-exynos-5.14.21-150400.24.21.1.aarch64",
            "openSUSE Leap 15.4:dtb-freescale-5.14.21-150400.24.21.1.aarch64",
            "openSUSE Leap 15.4:dtb-hisilicon-5.14.21-150400.24.21.1.aarch64",
            "openSUSE Leap 15.4:dtb-lg-5.14.21-150400.24.21.1.aarch64",
            "openSUSE Leap 15.4:dtb-marvell-5.14.21-150400.24.21.1.aarch64",
            "openSUSE Leap 15.4:dtb-mediatek-5.14.21-150400.24.21.1.aarch64",
            "openSUSE Leap 15.4:dtb-nvidia-5.14.21-150400.24.21.1.aarch64",
            "openSUSE Leap 15.4:dtb-qcom-5.14.21-150400.24.21.1.aarch64",
            "openSUSE Leap 15.4:dtb-renesas-5.14.21-150400.24.21.1.aarch64",
            "openSUSE Leap 15.4:dtb-rockchip-5.14.21-150400.24.21.1.aarch64",
            "openSUSE Leap 15.4:dtb-socionext-5.14.21-150400.24.21.1.aarch64",
            "openSUSE Leap 15.4:dtb-sprd-5.14.21-150400.24.21.1.aarch64",
            "openSUSE Leap 15.4:dtb-xilinx-5.14.21-150400.24.21.1.aarch64",
            "openSUSE Leap 15.4:gfs2-kmp-64kb-5.14.21-150400.24.21.2.aarch64",
            "openSUSE Leap 15.4:gfs2-kmp-default-5.14.21-150400.24.21.2.aarch64",
            "openSUSE Leap 15.4:gfs2-kmp-default-5.14.21-150400.24.21.2.ppc64le",
            "openSUSE Leap 15.4:gfs2-kmp-default-5.14.21-150400.24.21.2.s390x",
            "openSUSE Leap 15.4:gfs2-kmp-default-5.14.21-150400.24.21.2.x86_64",
            "openSUSE Leap 15.4:kernel-64kb-5.14.21-150400.24.21.2.aarch64",
            "openSUSE Leap 15.4:kernel-64kb-devel-5.14.21-150400.24.21.2.aarch64",
            "openSUSE Leap 15.4:kernel-64kb-extra-5.14.21-150400.24.21.2.aarch64",
            "openSUSE Leap 15.4:kernel-64kb-livepatch-devel-5.14.21-150400.24.21.2.aarch64",
            "openSUSE Leap 15.4:kernel-64kb-optional-5.14.21-150400.24.21.2.aarch64",
            "openSUSE Leap 15.4:kernel-debug-5.14.21-150400.24.21.2.ppc64le",
            "openSUSE Leap 15.4:kernel-debug-5.14.21-150400.24.21.2.x86_64",
            "openSUSE Leap 15.4:kernel-debug-devel-5.14.21-150400.24.21.2.ppc64le",
            "openSUSE Leap 15.4:kernel-debug-devel-5.14.21-150400.24.21.2.x86_64",
            "openSUSE Leap 15.4:kernel-debug-livepatch-devel-5.14.21-150400.24.21.2.ppc64le",
            "openSUSE Leap 15.4:kernel-debug-livepatch-devel-5.14.21-150400.24.21.2.x86_64",
            "openSUSE Leap 15.4:kernel-default-5.14.21-150400.24.21.2.aarch64",
            "openSUSE Leap 15.4:kernel-default-5.14.21-150400.24.21.2.ppc64le",
            "openSUSE Leap 15.4:kernel-default-5.14.21-150400.24.21.2.s390x",
            "openSUSE Leap 15.4:kernel-default-5.14.21-150400.24.21.2.x86_64",
            "openSUSE Leap 15.4:kernel-default-base-5.14.21-150400.24.21.2.150400.24.7.2.aarch64",
            "openSUSE Leap 15.4:kernel-default-base-5.14.21-150400.24.21.2.150400.24.7.2.ppc64le",
            "openSUSE Leap 15.4:kernel-default-base-5.14.21-150400.24.21.2.150400.24.7.2.s390x",
            "openSUSE Leap 15.4:kernel-default-base-5.14.21-150400.24.21.2.150400.24.7.2.x86_64",
            "openSUSE Leap 15.4:kernel-default-base-rebuild-5.14.21-150400.24.21.2.150400.24.7.2.aarch64",
            "openSUSE Leap 15.4:kernel-default-base-rebuild-5.14.21-150400.24.21.2.150400.24.7.2.ppc64le",
            "openSUSE Leap 15.4:kernel-default-base-rebuild-5.14.21-150400.24.21.2.150400.24.7.2.s390x",
            "openSUSE Leap 15.4:kernel-default-base-rebuild-5.14.21-150400.24.21.2.150400.24.7.2.x86_64",
            "openSUSE Leap 15.4:kernel-default-devel-5.14.21-150400.24.21.2.aarch64",
            "openSUSE Leap 15.4:kernel-default-devel-5.14.21-150400.24.21.2.ppc64le",
            "openSUSE Leap 15.4:kernel-default-devel-5.14.21-150400.24.21.2.s390x",
            "openSUSE Leap 15.4:kernel-default-devel-5.14.21-150400.24.21.2.x86_64",
            "openSUSE Leap 15.4:kernel-default-extra-5.14.21-150400.24.21.2.aarch64",
            "openSUSE Leap 15.4:kernel-default-extra-5.14.21-150400.24.21.2.ppc64le",
            "openSUSE Leap 15.4:kernel-default-extra-5.14.21-150400.24.21.2.s390x",
            "openSUSE Leap 15.4:kernel-default-extra-5.14.21-150400.24.21.2.x86_64",
            "openSUSE Leap 15.4:kernel-default-livepatch-5.14.21-150400.24.21.2.aarch64",
            "openSUSE Leap 15.4:kernel-default-livepatch-5.14.21-150400.24.21.2.ppc64le",
            "openSUSE Leap 15.4:kernel-default-livepatch-5.14.21-150400.24.21.2.s390x",
            "openSUSE Leap 15.4:kernel-default-livepatch-5.14.21-150400.24.21.2.x86_64",
            "openSUSE Leap 15.4:kernel-default-livepatch-devel-5.14.21-150400.24.21.2.aarch64",
            "openSUSE Leap 15.4:kernel-default-livepatch-devel-5.14.21-150400.24.21.2.ppc64le",
            "openSUSE Leap 15.4:kernel-default-livepatch-devel-5.14.21-150400.24.21.2.s390x",
            "openSUSE Leap 15.4:kernel-default-livepatch-devel-5.14.21-150400.24.21.2.x86_64",
            "openSUSE Leap 15.4:kernel-default-optional-5.14.21-150400.24.21.2.aarch64",
            "openSUSE Leap 15.4:kernel-default-optional-5.14.21-150400.24.21.2.ppc64le",
            "openSUSE Leap 15.4:kernel-default-optional-5.14.21-150400.24.21.2.s390x",
            "openSUSE Leap 15.4:kernel-default-optional-5.14.21-150400.24.21.2.x86_64",
            "openSUSE Leap 15.4:kernel-devel-5.14.21-150400.24.21.2.noarch",
            "openSUSE Leap 15.4:kernel-docs-5.14.21-150400.24.21.3.noarch",
            "openSUSE Leap 15.4:kernel-docs-html-5.14.21-150400.24.21.3.noarch",
            "openSUSE Leap 15.4:kernel-kvmsmall-5.14.21-150400.24.21.2.aarch64",
            "openSUSE Leap 15.4:kernel-kvmsmall-5.14.21-150400.24.21.2.ppc64le",
            "openSUSE Leap 15.4:kernel-kvmsmall-5.14.21-150400.24.21.2.x86_64",
            "openSUSE Leap 15.4:kernel-kvmsmall-devel-5.14.21-150400.24.21.2.aarch64",
            "openSUSE Leap 15.4:kernel-kvmsmall-devel-5.14.21-150400.24.21.2.ppc64le",
            "openSUSE Leap 15.4:kernel-kvmsmall-devel-5.14.21-150400.24.21.2.x86_64",
            "openSUSE Leap 15.4:kernel-kvmsmall-livepatch-devel-5.14.21-150400.24.21.2.aarch64",
            "openSUSE Leap 15.4:kernel-kvmsmall-livepatch-devel-5.14.21-150400.24.21.2.ppc64le",
            "openSUSE Leap 15.4:kernel-kvmsmall-livepatch-devel-5.14.21-150400.24.21.2.x86_64",
            "openSUSE Leap 15.4:kernel-macros-5.14.21-150400.24.21.2.noarch",
            "openSUSE Leap 15.4:kernel-obs-build-5.14.21-150400.24.21.2.aarch64",
            "openSUSE Leap 15.4:kernel-obs-build-5.14.21-150400.24.21.2.ppc64le",
            "openSUSE Leap 15.4:kernel-obs-build-5.14.21-150400.24.21.2.s390x",
            "openSUSE Leap 15.4:kernel-obs-build-5.14.21-150400.24.21.2.x86_64",
            "openSUSE Leap 15.4:kernel-obs-qa-5.14.21-150400.24.21.1.aarch64",
            "openSUSE Leap 15.4:kernel-obs-qa-5.14.21-150400.24.21.1.ppc64le",
            "openSUSE Leap 15.4:kernel-obs-qa-5.14.21-150400.24.21.1.s390x",
            "openSUSE Leap 15.4:kernel-obs-qa-5.14.21-150400.24.21.1.x86_64",
            "openSUSE Leap 15.4:kernel-source-5.14.21-150400.24.21.2.noarch",
            "openSUSE Leap 15.4:kernel-source-vanilla-5.14.21-150400.24.21.2.noarch",
            "openSUSE Leap 15.4:kernel-syms-5.14.21-150400.24.21.1.aarch64",
            "openSUSE Leap 15.4:kernel-syms-5.14.21-150400.24.21.1.ppc64le",
            "openSUSE Leap 15.4:kernel-syms-5.14.21-150400.24.21.1.s390x",
            "openSUSE Leap 15.4:kernel-syms-5.14.21-150400.24.21.1.x86_64",
            "openSUSE Leap 15.4:kernel-zfcpdump-5.14.21-150400.24.21.2.s390x",
            "openSUSE Leap 15.4:kselftests-kmp-64kb-5.14.21-150400.24.21.2.aarch64",
            "openSUSE Leap 15.4:kselftests-kmp-default-5.14.21-150400.24.21.2.aarch64",
            "openSUSE Leap 15.4:kselftests-kmp-default-5.14.21-150400.24.21.2.ppc64le",
            "openSUSE Leap 15.4:kselftests-kmp-default-5.14.21-150400.24.21.2.s390x",
            "openSUSE Leap 15.4:kselftests-kmp-default-5.14.21-150400.24.21.2.x86_64",
            "openSUSE Leap 15.4:ocfs2-kmp-64kb-5.14.21-150400.24.21.2.aarch64",
            "openSUSE Leap 15.4:ocfs2-kmp-default-5.14.21-150400.24.21.2.aarch64",
            "openSUSE Leap 15.4:ocfs2-kmp-default-5.14.21-150400.24.21.2.ppc64le",
            "openSUSE Leap 15.4:ocfs2-kmp-default-5.14.21-150400.24.21.2.s390x",
            "openSUSE Leap 15.4:ocfs2-kmp-default-5.14.21-150400.24.21.2.x86_64",
            "openSUSE Leap 15.4:reiserfs-kmp-64kb-5.14.21-150400.24.21.2.aarch64",
            "openSUSE Leap 15.4:reiserfs-kmp-default-5.14.21-150400.24.21.2.aarch64",
            "openSUSE Leap 15.4:reiserfs-kmp-default-5.14.21-150400.24.21.2.ppc64le",
            "openSUSE Leap 15.4:reiserfs-kmp-default-5.14.21-150400.24.21.2.s390x",
            "openSUSE Leap 15.4:reiserfs-kmp-default-5.14.21-150400.24.21.2.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 2.2,
            "baseSeverity": "LOW",
            "vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:R/S:U/C:N/I:N/A:L",
            "version": "3.1"
          },
          "products": [
            "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.21.2.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.21.2.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.21.2.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.21.2.x86_64",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.21.2.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.21.2.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.21.2.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.21.2.x86_64",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.21.2.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.21.2.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.21.2.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.21.2.x86_64",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.21.2.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.21.2.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.21.2.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.21.2.x86_64",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.21.2.ppc64le",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.21.2.s390x",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.21.2.x86_64",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.21.2.ppc64le",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.21.2.s390x",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.21.2.x86_64",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_21-default-1-150400.9.3.2.ppc64le",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_21-default-1-150400.9.3.2.s390x",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_21-default-1-150400.9.3.2.x86_64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-64kb-5.14.21-150400.24.21.2.aarch64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-64kb-devel-5.14.21-150400.24.21.2.aarch64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-5.14.21-150400.24.21.2.aarch64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-5.14.21-150400.24.21.2.ppc64le",
            "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-5.14.21-150400.24.21.2.s390x",
            "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-5.14.21-150400.24.21.2.x86_64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-base-5.14.21-150400.24.21.2.150400.24.7.2.aarch64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-base-5.14.21-150400.24.21.2.150400.24.7.2.ppc64le",
            "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-base-5.14.21-150400.24.21.2.150400.24.7.2.s390x",
            "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-base-5.14.21-150400.24.21.2.150400.24.7.2.x86_64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-devel-5.14.21-150400.24.21.2.aarch64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-devel-5.14.21-150400.24.21.2.ppc64le",
            "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-devel-5.14.21-150400.24.21.2.s390x",
            "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-devel-5.14.21-150400.24.21.2.x86_64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-devel-5.14.21-150400.24.21.2.noarch",
            "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-macros-5.14.21-150400.24.21.2.noarch",
            "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-zfcpdump-5.14.21-150400.24.21.2.s390x",
            "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-docs-5.14.21-150400.24.21.3.noarch",
            "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-obs-build-5.14.21-150400.24.21.2.aarch64",
            "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-obs-build-5.14.21-150400.24.21.2.ppc64le",
            "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-obs-build-5.14.21-150400.24.21.2.s390x",
            "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-obs-build-5.14.21-150400.24.21.2.x86_64",
            "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-source-5.14.21-150400.24.21.2.noarch",
            "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-syms-5.14.21-150400.24.21.1.aarch64",
            "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-syms-5.14.21-150400.24.21.1.ppc64le",
            "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-syms-5.14.21-150400.24.21.1.s390x",
            "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-syms-5.14.21-150400.24.21.1.x86_64",
            "SUSE Linux Enterprise Module for Legacy 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.21.2.aarch64",
            "SUSE Linux Enterprise Module for Legacy 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.21.2.ppc64le",
            "SUSE Linux Enterprise Module for Legacy 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.21.2.s390x",
            "SUSE Linux Enterprise Module for Legacy 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.21.2.x86_64",
            "SUSE Linux Enterprise Workstation Extension 15 SP4:kernel-default-extra-5.14.21-150400.24.21.2.x86_64",
            "openSUSE Leap 15.4:cluster-md-kmp-64kb-5.14.21-150400.24.21.2.aarch64",
            "openSUSE Leap 15.4:cluster-md-kmp-default-5.14.21-150400.24.21.2.aarch64",
            "openSUSE Leap 15.4:cluster-md-kmp-default-5.14.21-150400.24.21.2.ppc64le",
            "openSUSE Leap 15.4:cluster-md-kmp-default-5.14.21-150400.24.21.2.s390x",
            "openSUSE Leap 15.4:cluster-md-kmp-default-5.14.21-150400.24.21.2.x86_64",
            "openSUSE Leap 15.4:dlm-kmp-64kb-5.14.21-150400.24.21.2.aarch64",
            "openSUSE Leap 15.4:dlm-kmp-default-5.14.21-150400.24.21.2.aarch64",
            "openSUSE Leap 15.4:dlm-kmp-default-5.14.21-150400.24.21.2.ppc64le",
            "openSUSE Leap 15.4:dlm-kmp-default-5.14.21-150400.24.21.2.s390x",
            "openSUSE Leap 15.4:dlm-kmp-default-5.14.21-150400.24.21.2.x86_64",
            "openSUSE Leap 15.4:dtb-allwinner-5.14.21-150400.24.21.1.aarch64",
            "openSUSE Leap 15.4:dtb-altera-5.14.21-150400.24.21.1.aarch64",
            "openSUSE Leap 15.4:dtb-amazon-5.14.21-150400.24.21.1.aarch64",
            "openSUSE Leap 15.4:dtb-amd-5.14.21-150400.24.21.1.aarch64",
            "openSUSE Leap 15.4:dtb-amlogic-5.14.21-150400.24.21.1.aarch64",
            "openSUSE Leap 15.4:dtb-apm-5.14.21-150400.24.21.1.aarch64",
            "openSUSE Leap 15.4:dtb-apple-5.14.21-150400.24.21.1.aarch64",
            "openSUSE Leap 15.4:dtb-arm-5.14.21-150400.24.21.1.aarch64",
            "openSUSE Leap 15.4:dtb-broadcom-5.14.21-150400.24.21.1.aarch64",
            "openSUSE Leap 15.4:dtb-cavium-5.14.21-150400.24.21.1.aarch64",
            "openSUSE Leap 15.4:dtb-exynos-5.14.21-150400.24.21.1.aarch64",
            "openSUSE Leap 15.4:dtb-freescale-5.14.21-150400.24.21.1.aarch64",
            "openSUSE Leap 15.4:dtb-hisilicon-5.14.21-150400.24.21.1.aarch64",
            "openSUSE Leap 15.4:dtb-lg-5.14.21-150400.24.21.1.aarch64",
            "openSUSE Leap 15.4:dtb-marvell-5.14.21-150400.24.21.1.aarch64",
            "openSUSE Leap 15.4:dtb-mediatek-5.14.21-150400.24.21.1.aarch64",
            "openSUSE Leap 15.4:dtb-nvidia-5.14.21-150400.24.21.1.aarch64",
            "openSUSE Leap 15.4:dtb-qcom-5.14.21-150400.24.21.1.aarch64",
            "openSUSE Leap 15.4:dtb-renesas-5.14.21-150400.24.21.1.aarch64",
            "openSUSE Leap 15.4:dtb-rockchip-5.14.21-150400.24.21.1.aarch64",
            "openSUSE Leap 15.4:dtb-socionext-5.14.21-150400.24.21.1.aarch64",
            "openSUSE Leap 15.4:dtb-sprd-5.14.21-150400.24.21.1.aarch64",
            "openSUSE Leap 15.4:dtb-xilinx-5.14.21-150400.24.21.1.aarch64",
            "openSUSE Leap 15.4:gfs2-kmp-64kb-5.14.21-150400.24.21.2.aarch64",
            "openSUSE Leap 15.4:gfs2-kmp-default-5.14.21-150400.24.21.2.aarch64",
            "openSUSE Leap 15.4:gfs2-kmp-default-5.14.21-150400.24.21.2.ppc64le",
            "openSUSE Leap 15.4:gfs2-kmp-default-5.14.21-150400.24.21.2.s390x",
            "openSUSE Leap 15.4:gfs2-kmp-default-5.14.21-150400.24.21.2.x86_64",
            "openSUSE Leap 15.4:kernel-64kb-5.14.21-150400.24.21.2.aarch64",
            "openSUSE Leap 15.4:kernel-64kb-devel-5.14.21-150400.24.21.2.aarch64",
            "openSUSE Leap 15.4:kernel-64kb-extra-5.14.21-150400.24.21.2.aarch64",
            "openSUSE Leap 15.4:kernel-64kb-livepatch-devel-5.14.21-150400.24.21.2.aarch64",
            "openSUSE Leap 15.4:kernel-64kb-optional-5.14.21-150400.24.21.2.aarch64",
            "openSUSE Leap 15.4:kernel-debug-5.14.21-150400.24.21.2.ppc64le",
            "openSUSE Leap 15.4:kernel-debug-5.14.21-150400.24.21.2.x86_64",
            "openSUSE Leap 15.4:kernel-debug-devel-5.14.21-150400.24.21.2.ppc64le",
            "openSUSE Leap 15.4:kernel-debug-devel-5.14.21-150400.24.21.2.x86_64",
            "openSUSE Leap 15.4:kernel-debug-livepatch-devel-5.14.21-150400.24.21.2.ppc64le",
            "openSUSE Leap 15.4:kernel-debug-livepatch-devel-5.14.21-150400.24.21.2.x86_64",
            "openSUSE Leap 15.4:kernel-default-5.14.21-150400.24.21.2.aarch64",
            "openSUSE Leap 15.4:kernel-default-5.14.21-150400.24.21.2.ppc64le",
            "openSUSE Leap 15.4:kernel-default-5.14.21-150400.24.21.2.s390x",
            "openSUSE Leap 15.4:kernel-default-5.14.21-150400.24.21.2.x86_64",
            "openSUSE Leap 15.4:kernel-default-base-5.14.21-150400.24.21.2.150400.24.7.2.aarch64",
            "openSUSE Leap 15.4:kernel-default-base-5.14.21-150400.24.21.2.150400.24.7.2.ppc64le",
            "openSUSE Leap 15.4:kernel-default-base-5.14.21-150400.24.21.2.150400.24.7.2.s390x",
            "openSUSE Leap 15.4:kernel-default-base-5.14.21-150400.24.21.2.150400.24.7.2.x86_64",
            "openSUSE Leap 15.4:kernel-default-base-rebuild-5.14.21-150400.24.21.2.150400.24.7.2.aarch64",
            "openSUSE Leap 15.4:kernel-default-base-rebuild-5.14.21-150400.24.21.2.150400.24.7.2.ppc64le",
            "openSUSE Leap 15.4:kernel-default-base-rebuild-5.14.21-150400.24.21.2.150400.24.7.2.s390x",
            "openSUSE Leap 15.4:kernel-default-base-rebuild-5.14.21-150400.24.21.2.150400.24.7.2.x86_64",
            "openSUSE Leap 15.4:kernel-default-devel-5.14.21-150400.24.21.2.aarch64",
            "openSUSE Leap 15.4:kernel-default-devel-5.14.21-150400.24.21.2.ppc64le",
            "openSUSE Leap 15.4:kernel-default-devel-5.14.21-150400.24.21.2.s390x",
            "openSUSE Leap 15.4:kernel-default-devel-5.14.21-150400.24.21.2.x86_64",
            "openSUSE Leap 15.4:kernel-default-extra-5.14.21-150400.24.21.2.aarch64",
            "openSUSE Leap 15.4:kernel-default-extra-5.14.21-150400.24.21.2.ppc64le",
            "openSUSE Leap 15.4:kernel-default-extra-5.14.21-150400.24.21.2.s390x",
            "openSUSE Leap 15.4:kernel-default-extra-5.14.21-150400.24.21.2.x86_64",
            "openSUSE Leap 15.4:kernel-default-livepatch-5.14.21-150400.24.21.2.aarch64",
            "openSUSE Leap 15.4:kernel-default-livepatch-5.14.21-150400.24.21.2.ppc64le",
            "openSUSE Leap 15.4:kernel-default-livepatch-5.14.21-150400.24.21.2.s390x",
            "openSUSE Leap 15.4:kernel-default-livepatch-5.14.21-150400.24.21.2.x86_64",
            "openSUSE Leap 15.4:kernel-default-livepatch-devel-5.14.21-150400.24.21.2.aarch64",
            "openSUSE Leap 15.4:kernel-default-livepatch-devel-5.14.21-150400.24.21.2.ppc64le",
            "openSUSE Leap 15.4:kernel-default-livepatch-devel-5.14.21-150400.24.21.2.s390x",
            "openSUSE Leap 15.4:kernel-default-livepatch-devel-5.14.21-150400.24.21.2.x86_64",
            "openSUSE Leap 15.4:kernel-default-optional-5.14.21-150400.24.21.2.aarch64",
            "openSUSE Leap 15.4:kernel-default-optional-5.14.21-150400.24.21.2.ppc64le",
            "openSUSE Leap 15.4:kernel-default-optional-5.14.21-150400.24.21.2.s390x",
            "openSUSE Leap 15.4:kernel-default-optional-5.14.21-150400.24.21.2.x86_64",
            "openSUSE Leap 15.4:kernel-devel-5.14.21-150400.24.21.2.noarch",
            "openSUSE Leap 15.4:kernel-docs-5.14.21-150400.24.21.3.noarch",
            "openSUSE Leap 15.4:kernel-docs-html-5.14.21-150400.24.21.3.noarch",
            "openSUSE Leap 15.4:kernel-kvmsmall-5.14.21-150400.24.21.2.aarch64",
            "openSUSE Leap 15.4:kernel-kvmsmall-5.14.21-150400.24.21.2.ppc64le",
            "openSUSE Leap 15.4:kernel-kvmsmall-5.14.21-150400.24.21.2.x86_64",
            "openSUSE Leap 15.4:kernel-kvmsmall-devel-5.14.21-150400.24.21.2.aarch64",
            "openSUSE Leap 15.4:kernel-kvmsmall-devel-5.14.21-150400.24.21.2.ppc64le",
            "openSUSE Leap 15.4:kernel-kvmsmall-devel-5.14.21-150400.24.21.2.x86_64",
            "openSUSE Leap 15.4:kernel-kvmsmall-livepatch-devel-5.14.21-150400.24.21.2.aarch64",
            "openSUSE Leap 15.4:kernel-kvmsmall-livepatch-devel-5.14.21-150400.24.21.2.ppc64le",
            "openSUSE Leap 15.4:kernel-kvmsmall-livepatch-devel-5.14.21-150400.24.21.2.x86_64",
            "openSUSE Leap 15.4:kernel-macros-5.14.21-150400.24.21.2.noarch",
            "openSUSE Leap 15.4:kernel-obs-build-5.14.21-150400.24.21.2.aarch64",
            "openSUSE Leap 15.4:kernel-obs-build-5.14.21-150400.24.21.2.ppc64le",
            "openSUSE Leap 15.4:kernel-obs-build-5.14.21-150400.24.21.2.s390x",
            "openSUSE Leap 15.4:kernel-obs-build-5.14.21-150400.24.21.2.x86_64",
            "openSUSE Leap 15.4:kernel-obs-qa-5.14.21-150400.24.21.1.aarch64",
            "openSUSE Leap 15.4:kernel-obs-qa-5.14.21-150400.24.21.1.ppc64le",
            "openSUSE Leap 15.4:kernel-obs-qa-5.14.21-150400.24.21.1.s390x",
            "openSUSE Leap 15.4:kernel-obs-qa-5.14.21-150400.24.21.1.x86_64",
            "openSUSE Leap 15.4:kernel-source-5.14.21-150400.24.21.2.noarch",
            "openSUSE Leap 15.4:kernel-source-vanilla-5.14.21-150400.24.21.2.noarch",
            "openSUSE Leap 15.4:kernel-syms-5.14.21-150400.24.21.1.aarch64",
            "openSUSE Leap 15.4:kernel-syms-5.14.21-150400.24.21.1.ppc64le",
            "openSUSE Leap 15.4:kernel-syms-5.14.21-150400.24.21.1.s390x",
            "openSUSE Leap 15.4:kernel-syms-5.14.21-150400.24.21.1.x86_64",
            "openSUSE Leap 15.4:kernel-zfcpdump-5.14.21-150400.24.21.2.s390x",
            "openSUSE Leap 15.4:kselftests-kmp-64kb-5.14.21-150400.24.21.2.aarch64",
            "openSUSE Leap 15.4:kselftests-kmp-default-5.14.21-150400.24.21.2.aarch64",
            "openSUSE Leap 15.4:kselftests-kmp-default-5.14.21-150400.24.21.2.ppc64le",
            "openSUSE Leap 15.4:kselftests-kmp-default-5.14.21-150400.24.21.2.s390x",
            "openSUSE Leap 15.4:kselftests-kmp-default-5.14.21-150400.24.21.2.x86_64",
            "openSUSE Leap 15.4:ocfs2-kmp-64kb-5.14.21-150400.24.21.2.aarch64",
            "openSUSE Leap 15.4:ocfs2-kmp-default-5.14.21-150400.24.21.2.aarch64",
            "openSUSE Leap 15.4:ocfs2-kmp-default-5.14.21-150400.24.21.2.ppc64le",
            "openSUSE Leap 15.4:ocfs2-kmp-default-5.14.21-150400.24.21.2.s390x",
            "openSUSE Leap 15.4:ocfs2-kmp-default-5.14.21-150400.24.21.2.x86_64",
            "openSUSE Leap 15.4:reiserfs-kmp-64kb-5.14.21-150400.24.21.2.aarch64",
            "openSUSE Leap 15.4:reiserfs-kmp-default-5.14.21-150400.24.21.2.aarch64",
            "openSUSE Leap 15.4:reiserfs-kmp-default-5.14.21-150400.24.21.2.ppc64le",
            "openSUSE Leap 15.4:reiserfs-kmp-default-5.14.21-150400.24.21.2.s390x",
            "openSUSE Leap 15.4:reiserfs-kmp-default-5.14.21-150400.24.21.2.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2022-09-16T15:30:19Z",
          "details": "low"
        }
      ],
      "title": "CVE-2016-3695"
    },
    {
      "cve": "CVE-2020-36516",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2020-36516"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "An issue was discovered in the Linux kernel through 5.16.11. The mixed IPID assignment method with the hash-based IPID assignment policy allows an off-path attacker to inject data into a victim\u0027s TCP session or terminate that session.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.21.2.aarch64",
          "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.21.2.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.21.2.s390x",
          "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.21.2.x86_64",
          "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.21.2.aarch64",
          "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.21.2.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.21.2.s390x",
          "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.21.2.x86_64",
          "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.21.2.aarch64",
          "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.21.2.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.21.2.s390x",
          "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.21.2.x86_64",
          "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.21.2.aarch64",
          "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.21.2.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.21.2.s390x",
          "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.21.2.x86_64",
          "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.21.2.ppc64le",
          "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.21.2.s390x",
          "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.21.2.x86_64",
          "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.21.2.ppc64le",
          "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.21.2.s390x",
          "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.21.2.x86_64",
          "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_21-default-1-150400.9.3.2.ppc64le",
          "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_21-default-1-150400.9.3.2.s390x",
          "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_21-default-1-150400.9.3.2.x86_64",
          "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-64kb-5.14.21-150400.24.21.2.aarch64",
          "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-64kb-devel-5.14.21-150400.24.21.2.aarch64",
          "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-5.14.21-150400.24.21.2.aarch64",
          "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-5.14.21-150400.24.21.2.ppc64le",
          "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-5.14.21-150400.24.21.2.s390x",
          "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-5.14.21-150400.24.21.2.x86_64",
          "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-base-5.14.21-150400.24.21.2.150400.24.7.2.aarch64",
          "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-base-5.14.21-150400.24.21.2.150400.24.7.2.ppc64le",
          "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-base-5.14.21-150400.24.21.2.150400.24.7.2.s390x",
          "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-base-5.14.21-150400.24.21.2.150400.24.7.2.x86_64",
          "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-devel-5.14.21-150400.24.21.2.aarch64",
          "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-devel-5.14.21-150400.24.21.2.ppc64le",
          "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-devel-5.14.21-150400.24.21.2.s390x",
          "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-devel-5.14.21-150400.24.21.2.x86_64",
          "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-devel-5.14.21-150400.24.21.2.noarch",
          "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-macros-5.14.21-150400.24.21.2.noarch",
          "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-zfcpdump-5.14.21-150400.24.21.2.s390x",
          "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-docs-5.14.21-150400.24.21.3.noarch",
          "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-obs-build-5.14.21-150400.24.21.2.aarch64",
          "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-obs-build-5.14.21-150400.24.21.2.ppc64le",
          "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-obs-build-5.14.21-150400.24.21.2.s390x",
          "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-obs-build-5.14.21-150400.24.21.2.x86_64",
          "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-source-5.14.21-150400.24.21.2.noarch",
          "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-syms-5.14.21-150400.24.21.1.aarch64",
          "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-syms-5.14.21-150400.24.21.1.ppc64le",
          "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-syms-5.14.21-150400.24.21.1.s390x",
          "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-syms-5.14.21-150400.24.21.1.x86_64",
          "SUSE Linux Enterprise Module for Legacy 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.21.2.aarch64",
          "SUSE Linux Enterprise Module for Legacy 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.21.2.ppc64le",
          "SUSE Linux Enterprise Module for Legacy 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.21.2.s390x",
          "SUSE Linux Enterprise Module for Legacy 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.21.2.x86_64",
          "SUSE Linux Enterprise Workstation Extension 15 SP4:kernel-default-extra-5.14.21-150400.24.21.2.x86_64",
          "openSUSE Leap 15.4:cluster-md-kmp-64kb-5.14.21-150400.24.21.2.aarch64",
          "openSUSE Leap 15.4:cluster-md-kmp-default-5.14.21-150400.24.21.2.aarch64",
          "openSUSE Leap 15.4:cluster-md-kmp-default-5.14.21-150400.24.21.2.ppc64le",
          "openSUSE Leap 15.4:cluster-md-kmp-default-5.14.21-150400.24.21.2.s390x",
          "openSUSE Leap 15.4:cluster-md-kmp-default-5.14.21-150400.24.21.2.x86_64",
          "openSUSE Leap 15.4:dlm-kmp-64kb-5.14.21-150400.24.21.2.aarch64",
          "openSUSE Leap 15.4:dlm-kmp-default-5.14.21-150400.24.21.2.aarch64",
          "openSUSE Leap 15.4:dlm-kmp-default-5.14.21-150400.24.21.2.ppc64le",
          "openSUSE Leap 15.4:dlm-kmp-default-5.14.21-150400.24.21.2.s390x",
          "openSUSE Leap 15.4:dlm-kmp-default-5.14.21-150400.24.21.2.x86_64",
          "openSUSE Leap 15.4:dtb-allwinner-5.14.21-150400.24.21.1.aarch64",
          "openSUSE Leap 15.4:dtb-altera-5.14.21-150400.24.21.1.aarch64",
          "openSUSE Leap 15.4:dtb-amazon-5.14.21-150400.24.21.1.aarch64",
          "openSUSE Leap 15.4:dtb-amd-5.14.21-150400.24.21.1.aarch64",
          "openSUSE Leap 15.4:dtb-amlogic-5.14.21-150400.24.21.1.aarch64",
          "openSUSE Leap 15.4:dtb-apm-5.14.21-150400.24.21.1.aarch64",
          "openSUSE Leap 15.4:dtb-apple-5.14.21-150400.24.21.1.aarch64",
          "openSUSE Leap 15.4:dtb-arm-5.14.21-150400.24.21.1.aarch64",
          "openSUSE Leap 15.4:dtb-broadcom-5.14.21-150400.24.21.1.aarch64",
          "openSUSE Leap 15.4:dtb-cavium-5.14.21-150400.24.21.1.aarch64",
          "openSUSE Leap 15.4:dtb-exynos-5.14.21-150400.24.21.1.aarch64",
          "openSUSE Leap 15.4:dtb-freescale-5.14.21-150400.24.21.1.aarch64",
          "openSUSE Leap 15.4:dtb-hisilicon-5.14.21-150400.24.21.1.aarch64",
          "openSUSE Leap 15.4:dtb-lg-5.14.21-150400.24.21.1.aarch64",
          "openSUSE Leap 15.4:dtb-marvell-5.14.21-150400.24.21.1.aarch64",
          "openSUSE Leap 15.4:dtb-mediatek-5.14.21-150400.24.21.1.aarch64",
          "openSUSE Leap 15.4:dtb-nvidia-5.14.21-150400.24.21.1.aarch64",
          "openSUSE Leap 15.4:dtb-qcom-5.14.21-150400.24.21.1.aarch64",
          "openSUSE Leap 15.4:dtb-renesas-5.14.21-150400.24.21.1.aarch64",
          "openSUSE Leap 15.4:dtb-rockchip-5.14.21-150400.24.21.1.aarch64",
          "openSUSE Leap 15.4:dtb-socionext-5.14.21-150400.24.21.1.aarch64",
          "openSUSE Leap 15.4:dtb-sprd-5.14.21-150400.24.21.1.aarch64",
          "openSUSE Leap 15.4:dtb-xilinx-5.14.21-150400.24.21.1.aarch64",
          "openSUSE Leap 15.4:gfs2-kmp-64kb-5.14.21-150400.24.21.2.aarch64",
          "openSUSE Leap 15.4:gfs2-kmp-default-5.14.21-150400.24.21.2.aarch64",
          "openSUSE Leap 15.4:gfs2-kmp-default-5.14.21-150400.24.21.2.ppc64le",
          "openSUSE Leap 15.4:gfs2-kmp-default-5.14.21-150400.24.21.2.s390x",
          "openSUSE Leap 15.4:gfs2-kmp-default-5.14.21-150400.24.21.2.x86_64",
          "openSUSE Leap 15.4:kernel-64kb-5.14.21-150400.24.21.2.aarch64",
          "openSUSE Leap 15.4:kernel-64kb-devel-5.14.21-150400.24.21.2.aarch64",
          "openSUSE Leap 15.4:kernel-64kb-extra-5.14.21-150400.24.21.2.aarch64",
          "openSUSE Leap 15.4:kernel-64kb-livepatch-devel-5.14.21-150400.24.21.2.aarch64",
          "openSUSE Leap 15.4:kernel-64kb-optional-5.14.21-150400.24.21.2.aarch64",
          "openSUSE Leap 15.4:kernel-debug-5.14.21-150400.24.21.2.ppc64le",
          "openSUSE Leap 15.4:kernel-debug-5.14.21-150400.24.21.2.x86_64",
          "openSUSE Leap 15.4:kernel-debug-devel-5.14.21-150400.24.21.2.ppc64le",
          "openSUSE Leap 15.4:kernel-debug-devel-5.14.21-150400.24.21.2.x86_64",
          "openSUSE Leap 15.4:kernel-debug-livepatch-devel-5.14.21-150400.24.21.2.ppc64le",
          "openSUSE Leap 15.4:kernel-debug-livepatch-devel-5.14.21-150400.24.21.2.x86_64",
          "openSUSE Leap 15.4:kernel-default-5.14.21-150400.24.21.2.aarch64",
          "openSUSE Leap 15.4:kernel-default-5.14.21-150400.24.21.2.ppc64le",
          "openSUSE Leap 15.4:kernel-default-5.14.21-150400.24.21.2.s390x",
          "openSUSE Leap 15.4:kernel-default-5.14.21-150400.24.21.2.x86_64",
          "openSUSE Leap 15.4:kernel-default-base-5.14.21-150400.24.21.2.150400.24.7.2.aarch64",
          "openSUSE Leap 15.4:kernel-default-base-5.14.21-150400.24.21.2.150400.24.7.2.ppc64le",
          "openSUSE Leap 15.4:kernel-default-base-5.14.21-150400.24.21.2.150400.24.7.2.s390x",
          "openSUSE Leap 15.4:kernel-default-base-5.14.21-150400.24.21.2.150400.24.7.2.x86_64",
          "openSUSE Leap 15.4:kernel-default-base-rebuild-5.14.21-150400.24.21.2.150400.24.7.2.aarch64",
          "openSUSE Leap 15.4:kernel-default-base-rebuild-5.14.21-150400.24.21.2.150400.24.7.2.ppc64le",
          "openSUSE Leap 15.4:kernel-default-base-rebuild-5.14.21-150400.24.21.2.150400.24.7.2.s390x",
          "openSUSE Leap 15.4:kernel-default-base-rebuild-5.14.21-150400.24.21.2.150400.24.7.2.x86_64",
          "openSUSE Leap 15.4:kernel-default-devel-5.14.21-150400.24.21.2.aarch64",
          "openSUSE Leap 15.4:kernel-default-devel-5.14.21-150400.24.21.2.ppc64le",
          "openSUSE Leap 15.4:kernel-default-devel-5.14.21-150400.24.21.2.s390x",
          "openSUSE Leap 15.4:kernel-default-devel-5.14.21-150400.24.21.2.x86_64",
          "openSUSE Leap 15.4:kernel-default-extra-5.14.21-150400.24.21.2.aarch64",
          "openSUSE Leap 15.4:kernel-default-extra-5.14.21-150400.24.21.2.ppc64le",
          "openSUSE Leap 15.4:kernel-default-extra-5.14.21-150400.24.21.2.s390x",
          "openSUSE Leap 15.4:kernel-default-extra-5.14.21-150400.24.21.2.x86_64",
          "openSUSE Leap 15.4:kernel-default-livepatch-5.14.21-150400.24.21.2.aarch64",
          "openSUSE Leap 15.4:kernel-default-livepatch-5.14.21-150400.24.21.2.ppc64le",
          "openSUSE Leap 15.4:kernel-default-livepatch-5.14.21-150400.24.21.2.s390x",
          "openSUSE Leap 15.4:kernel-default-livepatch-5.14.21-150400.24.21.2.x86_64",
          "openSUSE Leap 15.4:kernel-default-livepatch-devel-5.14.21-150400.24.21.2.aarch64",
          "openSUSE Leap 15.4:kernel-default-livepatch-devel-5.14.21-150400.24.21.2.ppc64le",
          "openSUSE Leap 15.4:kernel-default-livepatch-devel-5.14.21-150400.24.21.2.s390x",
          "openSUSE Leap 15.4:kernel-default-livepatch-devel-5.14.21-150400.24.21.2.x86_64",
          "openSUSE Leap 15.4:kernel-default-optional-5.14.21-150400.24.21.2.aarch64",
          "openSUSE Leap 15.4:kernel-default-optional-5.14.21-150400.24.21.2.ppc64le",
          "openSUSE Leap 15.4:kernel-default-optional-5.14.21-150400.24.21.2.s390x",
          "openSUSE Leap 15.4:kernel-default-optional-5.14.21-150400.24.21.2.x86_64",
          "openSUSE Leap 15.4:kernel-devel-5.14.21-150400.24.21.2.noarch",
          "openSUSE Leap 15.4:kernel-docs-5.14.21-150400.24.21.3.noarch",
          "openSUSE Leap 15.4:kernel-docs-html-5.14.21-150400.24.21.3.noarch",
          "openSUSE Leap 15.4:kernel-kvmsmall-5.14.21-150400.24.21.2.aarch64",
          "openSUSE Leap 15.4:kernel-kvmsmall-5.14.21-150400.24.21.2.ppc64le",
          "openSUSE Leap 15.4:kernel-kvmsmall-5.14.21-150400.24.21.2.x86_64",
          "openSUSE Leap 15.4:kernel-kvmsmall-devel-5.14.21-150400.24.21.2.aarch64",
          "openSUSE Leap 15.4:kernel-kvmsmall-devel-5.14.21-150400.24.21.2.ppc64le",
          "openSUSE Leap 15.4:kernel-kvmsmall-devel-5.14.21-150400.24.21.2.x86_64",
          "openSUSE Leap 15.4:kernel-kvmsmall-livepatch-devel-5.14.21-150400.24.21.2.aarch64",
          "openSUSE Leap 15.4:kernel-kvmsmall-livepatch-devel-5.14.21-150400.24.21.2.ppc64le",
          "openSUSE Leap 15.4:kernel-kvmsmall-livepatch-devel-5.14.21-150400.24.21.2.x86_64",
          "openSUSE Leap 15.4:kernel-macros-5.14.21-150400.24.21.2.noarch",
          "openSUSE Leap 15.4:kernel-obs-build-5.14.21-150400.24.21.2.aarch64",
          "openSUSE Leap 15.4:kernel-obs-build-5.14.21-150400.24.21.2.ppc64le",
          "openSUSE Leap 15.4:kernel-obs-build-5.14.21-150400.24.21.2.s390x",
          "openSUSE Leap 15.4:kernel-obs-build-5.14.21-150400.24.21.2.x86_64",
          "openSUSE Leap 15.4:kernel-obs-qa-5.14.21-150400.24.21.1.aarch64",
          "openSUSE Leap 15.4:kernel-obs-qa-5.14.21-150400.24.21.1.ppc64le",
          "openSUSE Leap 15.4:kernel-obs-qa-5.14.21-150400.24.21.1.s390x",
          "openSUSE Leap 15.4:kernel-obs-qa-5.14.21-150400.24.21.1.x86_64",
          "openSUSE Leap 15.4:kernel-source-5.14.21-150400.24.21.2.noarch",
          "openSUSE Leap 15.4:kernel-source-vanilla-5.14.21-150400.24.21.2.noarch",
          "openSUSE Leap 15.4:kernel-syms-5.14.21-150400.24.21.1.aarch64",
          "openSUSE Leap 15.4:kernel-syms-5.14.21-150400.24.21.1.ppc64le",
          "openSUSE Leap 15.4:kernel-syms-5.14.21-150400.24.21.1.s390x",
          "openSUSE Leap 15.4:kernel-syms-5.14.21-150400.24.21.1.x86_64",
          "openSUSE Leap 15.4:kernel-zfcpdump-5.14.21-150400.24.21.2.s390x",
          "openSUSE Leap 15.4:kselftests-kmp-64kb-5.14.21-150400.24.21.2.aarch64",
          "openSUSE Leap 15.4:kselftests-kmp-default-5.14.21-150400.24.21.2.aarch64",
          "openSUSE Leap 15.4:kselftests-kmp-default-5.14.21-150400.24.21.2.ppc64le",
          "openSUSE Leap 15.4:kselftests-kmp-default-5.14.21-150400.24.21.2.s390x",
          "openSUSE Leap 15.4:kselftests-kmp-default-5.14.21-150400.24.21.2.x86_64",
          "openSUSE Leap 15.4:ocfs2-kmp-64kb-5.14.21-150400.24.21.2.aarch64",
          "openSUSE Leap 15.4:ocfs2-kmp-default-5.14.21-150400.24.21.2.aarch64",
          "openSUSE Leap 15.4:ocfs2-kmp-default-5.14.21-150400.24.21.2.ppc64le",
          "openSUSE Leap 15.4:ocfs2-kmp-default-5.14.21-150400.24.21.2.s390x",
          "openSUSE Leap 15.4:ocfs2-kmp-default-5.14.21-150400.24.21.2.x86_64",
          "openSUSE Leap 15.4:reiserfs-kmp-64kb-5.14.21-150400.24.21.2.aarch64",
          "openSUSE Leap 15.4:reiserfs-kmp-default-5.14.21-150400.24.21.2.aarch64",
          "openSUSE Leap 15.4:reiserfs-kmp-default-5.14.21-150400.24.21.2.ppc64le",
          "openSUSE Leap 15.4:reiserfs-kmp-default-5.14.21-150400.24.21.2.s390x",
          "openSUSE Leap 15.4:reiserfs-kmp-default-5.14.21-150400.24.21.2.x86_64"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2020-36516",
          "url": "https://www.suse.com/security/cve/CVE-2020-36516"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1196616 for CVE-2020-36516",
          "url": "https://bugzilla.suse.com/1196616"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1196867 for CVE-2020-36516",
          "url": "https://bugzilla.suse.com/1196867"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1204092 for CVE-2020-36516",
          "url": "https://bugzilla.suse.com/1204092"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1204183 for CVE-2020-36516",
          "url": "https://bugzilla.suse.com/1204183"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.21.2.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.21.2.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.21.2.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.21.2.x86_64",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.21.2.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.21.2.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.21.2.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.21.2.x86_64",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.21.2.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.21.2.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.21.2.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.21.2.x86_64",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.21.2.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.21.2.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.21.2.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.21.2.x86_64",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.21.2.ppc64le",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.21.2.s390x",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.21.2.x86_64",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.21.2.ppc64le",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.21.2.s390x",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.21.2.x86_64",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_21-default-1-150400.9.3.2.ppc64le",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_21-default-1-150400.9.3.2.s390x",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_21-default-1-150400.9.3.2.x86_64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-64kb-5.14.21-150400.24.21.2.aarch64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-64kb-devel-5.14.21-150400.24.21.2.aarch64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-5.14.21-150400.24.21.2.aarch64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-5.14.21-150400.24.21.2.ppc64le",
            "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-5.14.21-150400.24.21.2.s390x",
            "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-5.14.21-150400.24.21.2.x86_64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-base-5.14.21-150400.24.21.2.150400.24.7.2.aarch64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-base-5.14.21-150400.24.21.2.150400.24.7.2.ppc64le",
            "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-base-5.14.21-150400.24.21.2.150400.24.7.2.s390x",
            "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-base-5.14.21-150400.24.21.2.150400.24.7.2.x86_64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-devel-5.14.21-150400.24.21.2.aarch64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-devel-5.14.21-150400.24.21.2.ppc64le",
            "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-devel-5.14.21-150400.24.21.2.s390x",
            "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-devel-5.14.21-150400.24.21.2.x86_64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-devel-5.14.21-150400.24.21.2.noarch",
            "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-macros-5.14.21-150400.24.21.2.noarch",
            "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-zfcpdump-5.14.21-150400.24.21.2.s390x",
            "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-docs-5.14.21-150400.24.21.3.noarch",
            "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-obs-build-5.14.21-150400.24.21.2.aarch64",
            "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-obs-build-5.14.21-150400.24.21.2.ppc64le",
            "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-obs-build-5.14.21-150400.24.21.2.s390x",
            "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-obs-build-5.14.21-150400.24.21.2.x86_64",
            "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-source-5.14.21-150400.24.21.2.noarch",
            "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-syms-5.14.21-150400.24.21.1.aarch64",
            "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-syms-5.14.21-150400.24.21.1.ppc64le",
            "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-syms-5.14.21-150400.24.21.1.s390x",
            "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-syms-5.14.21-150400.24.21.1.x86_64",
            "SUSE Linux Enterprise Module for Legacy 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.21.2.aarch64",
            "SUSE Linux Enterprise Module for Legacy 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.21.2.ppc64le",
            "SUSE Linux Enterprise Module for Legacy 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.21.2.s390x",
            "SUSE Linux Enterprise Module for Legacy 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.21.2.x86_64",
            "SUSE Linux Enterprise Workstation Extension 15 SP4:kernel-default-extra-5.14.21-150400.24.21.2.x86_64",
            "openSUSE Leap 15.4:cluster-md-kmp-64kb-5.14.21-150400.24.21.2.aarch64",
            "openSUSE Leap 15.4:cluster-md-kmp-default-5.14.21-150400.24.21.2.aarch64",
            "openSUSE Leap 15.4:cluster-md-kmp-default-5.14.21-150400.24.21.2.ppc64le",
            "openSUSE Leap 15.4:cluster-md-kmp-default-5.14.21-150400.24.21.2.s390x",
            "openSUSE Leap 15.4:cluster-md-kmp-default-5.14.21-150400.24.21.2.x86_64",
            "openSUSE Leap 15.4:dlm-kmp-64kb-5.14.21-150400.24.21.2.aarch64",
            "openSUSE Leap 15.4:dlm-kmp-default-5.14.21-150400.24.21.2.aarch64",
            "openSUSE Leap 15.4:dlm-kmp-default-5.14.21-150400.24.21.2.ppc64le",
            "openSUSE Leap 15.4:dlm-kmp-default-5.14.21-150400.24.21.2.s390x",
            "openSUSE Leap 15.4:dlm-kmp-default-5.14.21-150400.24.21.2.x86_64",
            "openSUSE Leap 15.4:dtb-allwinner-5.14.21-150400.24.21.1.aarch64",
            "openSUSE Leap 15.4:dtb-altera-5.14.21-150400.24.21.1.aarch64",
            "openSUSE Leap 15.4:dtb-amazon-5.14.21-150400.24.21.1.aarch64",
            "openSUSE Leap 15.4:dtb-amd-5.14.21-150400.24.21.1.aarch64",
            "openSUSE Leap 15.4:dtb-amlogic-5.14.21-150400.24.21.1.aarch64",
            "openSUSE Leap 15.4:dtb-apm-5.14.21-150400.24.21.1.aarch64",
            "openSUSE Leap 15.4:dtb-apple-5.14.21-150400.24.21.1.aarch64",
            "openSUSE Leap 15.4:dtb-arm-5.14.21-150400.24.21.1.aarch64",
            "openSUSE Leap 15.4:dtb-broadcom-5.14.21-150400.24.21.1.aarch64",
            "openSUSE Leap 15.4:dtb-cavium-5.14.21-150400.24.21.1.aarch64",
            "openSUSE Leap 15.4:dtb-exynos-5.14.21-150400.24.21.1.aarch64",
            "openSUSE Leap 15.4:dtb-freescale-5.14.21-150400.24.21.1.aarch64",
            "openSUSE Leap 15.4:dtb-hisilicon-5.14.21-150400.24.21.1.aarch64",
            "openSUSE Leap 15.4:dtb-lg-5.14.21-150400.24.21.1.aarch64",
            "openSUSE Leap 15.4:dtb-marvell-5.14.21-150400.24.21.1.aarch64",
            "openSUSE Leap 15.4:dtb-mediatek-5.14.21-150400.24.21.1.aarch64",
            "openSUSE Leap 15.4:dtb-nvidia-5.14.21-150400.24.21.1.aarch64",
            "openSUSE Leap 15.4:dtb-qcom-5.14.21-150400.24.21.1.aarch64",
            "openSUSE Leap 15.4:dtb-renesas-5.14.21-150400.24.21.1.aarch64",
            "openSUSE Leap 15.4:dtb-rockchip-5.14.21-150400.24.21.1.aarch64",
            "openSUSE Leap 15.4:dtb-socionext-5.14.21-150400.24.21.1.aarch64",
            "openSUSE Leap 15.4:dtb-sprd-5.14.21-150400.24.21.1.aarch64",
            "openSUSE Leap 15.4:dtb-xilinx-5.14.21-150400.24.21.1.aarch64",
            "openSUSE Leap 15.4:gfs2-kmp-64kb-5.14.21-150400.24.21.2.aarch64",
            "openSUSE Leap 15.4:gfs2-kmp-default-5.14.21-150400.24.21.2.aarch64",
            "openSUSE Leap 15.4:gfs2-kmp-default-5.14.21-150400.24.21.2.ppc64le",
            "openSUSE Leap 15.4:gfs2-kmp-default-5.14.21-150400.24.21.2.s390x",
            "openSUSE Leap 15.4:gfs2-kmp-default-5.14.21-150400.24.21.2.x86_64",
            "openSUSE Leap 15.4:kernel-64kb-5.14.21-150400.24.21.2.aarch64",
            "openSUSE Leap 15.4:kernel-64kb-devel-5.14.21-150400.24.21.2.aarch64",
            "openSUSE Leap 15.4:kernel-64kb-extra-5.14.21-150400.24.21.2.aarch64",
            "openSUSE Leap 15.4:kernel-64kb-livepatch-devel-5.14.21-150400.24.21.2.aarch64",
            "openSUSE Leap 15.4:kernel-64kb-optional-5.14.21-150400.24.21.2.aarch64",
            "openSUSE Leap 15.4:kernel-debug-5.14.21-150400.24.21.2.ppc64le",
            "openSUSE Leap 15.4:kernel-debug-5.14.21-150400.24.21.2.x86_64",
            "openSUSE Leap 15.4:kernel-debug-devel-5.14.21-150400.24.21.2.ppc64le",
            "openSUSE Leap 15.4:kernel-debug-devel-5.14.21-150400.24.21.2.x86_64",
            "openSUSE Leap 15.4:kernel-debug-livepatch-devel-5.14.21-150400.24.21.2.ppc64le",
            "openSUSE Leap 15.4:kernel-debug-livepatch-devel-5.14.21-150400.24.21.2.x86_64",
            "openSUSE Leap 15.4:kernel-default-5.14.21-150400.24.21.2.aarch64",
            "openSUSE Leap 15.4:kernel-default-5.14.21-150400.24.21.2.ppc64le",
            "openSUSE Leap 15.4:kernel-default-5.14.21-150400.24.21.2.s390x",
            "openSUSE Leap 15.4:kernel-default-5.14.21-150400.24.21.2.x86_64",
            "openSUSE Leap 15.4:kernel-default-base-5.14.21-150400.24.21.2.150400.24.7.2.aarch64",
            "openSUSE Leap 15.4:kernel-default-base-5.14.21-150400.24.21.2.150400.24.7.2.ppc64le",
            "openSUSE Leap 15.4:kernel-default-base-5.14.21-150400.24.21.2.150400.24.7.2.s390x",
            "openSUSE Leap 15.4:kernel-default-base-5.14.21-150400.24.21.2.150400.24.7.2.x86_64",
            "openSUSE Leap 15.4:kernel-default-base-rebuild-5.14.21-150400.24.21.2.150400.24.7.2.aarch64",
            "openSUSE Leap 15.4:kernel-default-base-rebuild-5.14.21-150400.24.21.2.150400.24.7.2.ppc64le",
            "openSUSE Leap 15.4:kernel-default-base-rebuild-5.14.21-150400.24.21.2.150400.24.7.2.s390x",
            "openSUSE Leap 15.4:kernel-default-base-rebuild-5.14.21-150400.24.21.2.150400.24.7.2.x86_64",
            "openSUSE Leap 15.4:kernel-default-devel-5.14.21-150400.24.21.2.aarch64",
            "openSUSE Leap 15.4:kernel-default-devel-5.14.21-150400.24.21.2.ppc64le",
            "openSUSE Leap 15.4:kernel-default-devel-5.14.21-150400.24.21.2.s390x",
            "openSUSE Leap 15.4:kernel-default-devel-5.14.21-150400.24.21.2.x86_64",
            "openSUSE Leap 15.4:kernel-default-extra-5.14.21-150400.24.21.2.aarch64",
            "openSUSE Leap 15.4:kernel-default-extra-5.14.21-150400.24.21.2.ppc64le",
            "openSUSE Leap 15.4:kernel-default-extra-5.14.21-150400.24.21.2.s390x",
            "openSUSE Leap 15.4:kernel-default-extra-5.14.21-150400.24.21.2.x86_64",
            "openSUSE Leap 15.4:kernel-default-livepatch-5.14.21-150400.24.21.2.aarch64",
            "openSUSE Leap 15.4:kernel-default-livepatch-5.14.21-150400.24.21.2.ppc64le",
            "openSUSE Leap 15.4:kernel-default-livepatch-5.14.21-150400.24.21.2.s390x",
            "openSUSE Leap 15.4:kernel-default-livepatch-5.14.21-150400.24.21.2.x86_64",
            "openSUSE Leap 15.4:kernel-default-livepatch-devel-5.14.21-150400.24.21.2.aarch64",
            "openSUSE Leap 15.4:kernel-default-livepatch-devel-5.14.21-150400.24.21.2.ppc64le",
            "openSUSE Leap 15.4:kernel-default-livepatch-devel-5.14.21-150400.24.21.2.s390x",
            "openSUSE Leap 15.4:kernel-default-livepatch-devel-5.14.21-150400.24.21.2.x86_64",
            "openSUSE Leap 15.4:kernel-default-optional-5.14.21-150400.24.21.2.aarch64",
            "openSUSE Leap 15.4:kernel-default-optional-5.14.21-150400.24.21.2.ppc64le",
            "openSUSE Leap 15.4:kernel-default-optional-5.14.21-150400.24.21.2.s390x",
            "openSUSE Leap 15.4:kernel-default-optional-5.14.21-150400.24.21.2.x86_64",
            "openSUSE Leap 15.4:kernel-devel-5.14.21-150400.24.21.2.noarch",
            "openSUSE Leap 15.4:kernel-docs-5.14.21-150400.24.21.3.noarch",
            "openSUSE Leap 15.4:kernel-docs-html-5.14.21-150400.24.21.3.noarch",
            "openSUSE Leap 15.4:kernel-kvmsmall-5.14.21-150400.24.21.2.aarch64",
            "openSUSE Leap 15.4:kernel-kvmsmall-5.14.21-150400.24.21.2.ppc64le",
            "openSUSE Leap 15.4:kernel-kvmsmall-5.14.21-150400.24.21.2.x86_64",
            "openSUSE Leap 15.4:kernel-kvmsmall-devel-5.14.21-150400.24.21.2.aarch64",
            "openSUSE Leap 15.4:kernel-kvmsmall-devel-5.14.21-150400.24.21.2.ppc64le",
            "openSUSE Leap 15.4:kernel-kvmsmall-devel-5.14.21-150400.24.21.2.x86_64",
            "openSUSE Leap 15.4:kernel-kvmsmall-livepatch-devel-5.14.21-150400.24.21.2.aarch64",
            "openSUSE Leap 15.4:kernel-kvmsmall-livepatch-devel-5.14.21-150400.24.21.2.ppc64le",
            "openSUSE Leap 15.4:kernel-kvmsmall-livepatch-devel-5.14.21-150400.24.21.2.x86_64",
            "openSUSE Leap 15.4:kernel-macros-5.14.21-150400.24.21.2.noarch",
            "openSUSE Leap 15.4:kernel-obs-build-5.14.21-150400.24.21.2.aarch64",
            "openSUSE Leap 15.4:kernel-obs-build-5.14.21-150400.24.21.2.ppc64le",
            "openSUSE Leap 15.4:kernel-obs-build-5.14.21-150400.24.21.2.s390x",
            "openSUSE Leap 15.4:kernel-obs-build-5.14.21-150400.24.21.2.x86_64",
            "openSUSE Leap 15.4:kernel-obs-qa-5.14.21-150400.24.21.1.aarch64",
            "openSUSE Leap 15.4:kernel-obs-qa-5.14.21-150400.24.21.1.ppc64le",
            "openSUSE Leap 15.4:kernel-obs-qa-5.14.21-150400.24.21.1.s390x",
            "openSUSE Leap 15.4:kernel-obs-qa-5.14.21-150400.24.21.1.x86_64",
            "openSUSE Leap 15.4:kernel-source-5.14.21-150400.24.21.2.noarch",
            "openSUSE Leap 15.4:kernel-source-vanilla-5.14.21-150400.24.21.2.noarch",
            "openSUSE Leap 15.4:kernel-syms-5.14.21-150400.24.21.1.aarch64",
            "openSUSE Leap 15.4:kernel-syms-5.14.21-150400.24.21.1.ppc64le",
            "openSUSE Leap 15.4:kernel-syms-5.14.21-150400.24.21.1.s390x",
            "openSUSE Leap 15.4:kernel-syms-5.14.21-150400.24.21.1.x86_64",
            "openSUSE Leap 15.4:kernel-zfcpdump-5.14.21-150400.24.21.2.s390x",
            "openSUSE Leap 15.4:kselftests-kmp-64kb-5.14.21-150400.24.21.2.aarch64",
            "openSUSE Leap 15.4:kselftests-kmp-default-5.14.21-150400.24.21.2.aarch64",
            "openSUSE Leap 15.4:kselftests-kmp-default-5.14.21-150400.24.21.2.ppc64le",
            "openSUSE Leap 15.4:kselftests-kmp-default-5.14.21-150400.24.21.2.s390x",
            "openSUSE Leap 15.4:kselftests-kmp-default-5.14.21-150400.24.21.2.x86_64",
            "openSUSE Leap 15.4:ocfs2-kmp-64kb-5.14.21-150400.24.21.2.aarch64",
            "openSUSE Leap 15.4:ocfs2-kmp-default-5.14.21-150400.24.21.2.aarch64",
            "openSUSE Leap 15.4:ocfs2-kmp-default-5.14.21-150400.24.21.2.ppc64le",
            "openSUSE Leap 15.4:ocfs2-kmp-default-5.14.21-150400.24.21.2.s390x",
            "openSUSE Leap 15.4:ocfs2-kmp-default-5.14.21-150400.24.21.2.x86_64",
            "openSUSE Leap 15.4:reiserfs-kmp-64kb-5.14.21-150400.24.21.2.aarch64",
            "openSUSE Leap 15.4:reiserfs-kmp-default-5.14.21-150400.24.21.2.aarch64",
            "openSUSE Leap 15.4:reiserfs-kmp-default-5.14.21-150400.24.21.2.ppc64le",
            "openSUSE Leap 15.4:reiserfs-kmp-default-5.14.21-150400.24.21.2.s390x",
            "openSUSE Leap 15.4:reiserfs-kmp-default-5.14.21-150400.24.21.2.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 8.1,
            "baseSeverity": "HIGH",
            "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:H",
            "version": "3.1"
          },
          "products": [
            "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.21.2.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.21.2.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.21.2.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.21.2.x86_64",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.21.2.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.21.2.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.21.2.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.21.2.x86_64",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.21.2.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.21.2.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.21.2.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.21.2.x86_64",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.21.2.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.21.2.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.21.2.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.21.2.x86_64",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.21.2.ppc64le",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.21.2.s390x",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.21.2.x86_64",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.21.2.ppc64le",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.21.2.s390x",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.21.2.x86_64",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_21-default-1-150400.9.3.2.ppc64le",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_21-default-1-150400.9.3.2.s390x",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_21-default-1-150400.9.3.2.x86_64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-64kb-5.14.21-150400.24.21.2.aarch64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-64kb-devel-5.14.21-150400.24.21.2.aarch64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-5.14.21-150400.24.21.2.aarch64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-5.14.21-150400.24.21.2.ppc64le",
            "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-5.14.21-150400.24.21.2.s390x",
            "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-5.14.21-150400.24.21.2.x86_64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-base-5.14.21-150400.24.21.2.150400.24.7.2.aarch64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-base-5.14.21-150400.24.21.2.150400.24.7.2.ppc64le",
            "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-base-5.14.21-150400.24.21.2.150400.24.7.2.s390x",
            "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-base-5.14.21-150400.24.21.2.150400.24.7.2.x86_64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-devel-5.14.21-150400.24.21.2.aarch64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-devel-5.14.21-150400.24.21.2.ppc64le",
            "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-devel-5.14.21-150400.24.21.2.s390x",
            "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-devel-5.14.21-150400.24.21.2.x86_64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-devel-5.14.21-150400.24.21.2.noarch",
            "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-macros-5.14.21-150400.24.21.2.noarch",
            "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-zfcpdump-5.14.21-150400.24.21.2.s390x",
            "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-docs-5.14.21-150400.24.21.3.noarch",
            "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-obs-build-5.14.21-150400.24.21.2.aarch64",
            "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-obs-build-5.14.21-150400.24.21.2.ppc64le",
            "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-obs-build-5.14.21-150400.24.21.2.s390x",
            "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-obs-build-5.14.21-150400.24.21.2.x86_64",
            "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-source-5.14.21-150400.24.21.2.noarch",
            "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-syms-5.14.21-150400.24.21.1.aarch64",
            "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-syms-5.14.21-150400.24.21.1.ppc64le",
            "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-syms-5.14.21-150400.24.21.1.s390x",
            "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-syms-5.14.21-150400.24.21.1.x86_64",
            "SUSE Linux Enterprise Module for Legacy 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.21.2.aarch64",
            "SUSE Linux Enterprise Module for Legacy 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.21.2.ppc64le",
            "SUSE Linux Enterprise Module for Legacy 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.21.2.s390x",
            "SUSE Linux Enterprise Module for Legacy 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.21.2.x86_64",
            "SUSE Linux Enterprise Workstation Extension 15 SP4:kernel-default-extra-5.14.21-150400.24.21.2.x86_64",
            "openSUSE Leap 15.4:cluster-md-kmp-64kb-5.14.21-150400.24.21.2.aarch64",
            "openSUSE Leap 15.4:cluster-md-kmp-default-5.14.21-150400.24.21.2.aarch64",
            "openSUSE Leap 15.4:cluster-md-kmp-default-5.14.21-150400.24.21.2.ppc64le",
            "openSUSE Leap 15.4:cluster-md-kmp-default-5.14.21-150400.24.21.2.s390x",
            "openSUSE Leap 15.4:cluster-md-kmp-default-5.14.21-150400.24.21.2.x86_64",
            "openSUSE Leap 15.4:dlm-kmp-64kb-5.14.21-150400.24.21.2.aarch64",
            "openSUSE Leap 15.4:dlm-kmp-default-5.14.21-150400.24.21.2.aarch64",
            "openSUSE Leap 15.4:dlm-kmp-default-5.14.21-150400.24.21.2.ppc64le",
            "openSUSE Leap 15.4:dlm-kmp-default-5.14.21-150400.24.21.2.s390x",
            "openSUSE Leap 15.4:dlm-kmp-default-5.14.21-150400.24.21.2.x86_64",
            "openSUSE Leap 15.4:dtb-allwinner-5.14.21-150400.24.21.1.aarch64",
            "openSUSE Leap 15.4:dtb-altera-5.14.21-150400.24.21.1.aarch64",
            "openSUSE Leap 15.4:dtb-amazon-5.14.21-150400.24.21.1.aarch64",
            "openSUSE Leap 15.4:dtb-amd-5.14.21-150400.24.21.1.aarch64",
            "openSUSE Leap 15.4:dtb-amlogic-5.14.21-150400.24.21.1.aarch64",
            "openSUSE Leap 15.4:dtb-apm-5.14.21-150400.24.21.1.aarch64",
            "openSUSE Leap 15.4:dtb-apple-5.14.21-150400.24.21.1.aarch64",
            "openSUSE Leap 15.4:dtb-arm-5.14.21-150400.24.21.1.aarch64",
            "openSUSE Leap 15.4:dtb-broadcom-5.14.21-150400.24.21.1.aarch64",
            "openSUSE Leap 15.4:dtb-cavium-5.14.21-150400.24.21.1.aarch64",
            "openSUSE Leap 15.4:dtb-exynos-5.14.21-150400.24.21.1.aarch64",
            "openSUSE Leap 15.4:dtb-freescale-5.14.21-150400.24.21.1.aarch64",
            "openSUSE Leap 15.4:dtb-hisilicon-5.14.21-150400.24.21.1.aarch64",
            "openSUSE Leap 15.4:dtb-lg-5.14.21-150400.24.21.1.aarch64",
            "openSUSE Leap 15.4:dtb-marvell-5.14.21-150400.24.21.1.aarch64",
            "openSUSE Leap 15.4:dtb-mediatek-5.14.21-150400.24.21.1.aarch64",
            "openSUSE Leap 15.4:dtb-nvidia-5.14.21-150400.24.21.1.aarch64",
            "openSUSE Leap 15.4:dtb-qcom-5.14.21-150400.24.21.1.aarch64",
            "openSUSE Leap 15.4:dtb-renesas-5.14.21-150400.24.21.1.aarch64",
            "openSUSE Leap 15.4:dtb-rockchip-5.14.21-150400.24.21.1.aarch64",
            "openSUSE Leap 15.4:dtb-socionext-5.14.21-150400.24.21.1.aarch64",
            "openSUSE Leap 15.4:dtb-sprd-5.14.21-150400.24.21.1.aarch64",
            "openSUSE Leap 15.4:dtb-xilinx-5.14.21-150400.24.21.1.aarch64",
            "openSUSE Leap 15.4:gfs2-kmp-64kb-5.14.21-150400.24.21.2.aarch64",
            "openSUSE Leap 15.4:gfs2-kmp-default-5.14.21-150400.24.21.2.aarch64",
            "openSUSE Leap 15.4:gfs2-kmp-default-5.14.21-150400.24.21.2.ppc64le",
            "openSUSE Leap 15.4:gfs2-kmp-default-5.14.21-150400.24.21.2.s390x",
            "openSUSE Leap 15.4:gfs2-kmp-default-5.14.21-150400.24.21.2.x86_64",
            "openSUSE Leap 15.4:kernel-64kb-5.14.21-150400.24.21.2.aarch64",
            "openSUSE Leap 15.4:kernel-64kb-devel-5.14.21-150400.24.21.2.aarch64",
            "openSUSE Leap 15.4:kernel-64kb-extra-5.14.21-150400.24.21.2.aarch64",
            "openSUSE Leap 15.4:kernel-64kb-livepatch-devel-5.14.21-150400.24.21.2.aarch64",
            "openSUSE Leap 15.4:kernel-64kb-optional-5.14.21-150400.24.21.2.aarch64",
            "openSUSE Leap 15.4:kernel-debug-5.14.21-150400.24.21.2.ppc64le",
            "openSUSE Leap 15.4:kernel-debug-5.14.21-150400.24.21.2.x86_64",
            "openSUSE Leap 15.4:kernel-debug-devel-5.14.21-150400.24.21.2.ppc64le",
            "openSUSE Leap 15.4:kernel-debug-devel-5.14.21-150400.24.21.2.x86_64",
            "openSUSE Leap 15.4:kernel-debug-livepatch-devel-5.14.21-150400.24.21.2.ppc64le",
            "openSUSE Leap 15.4:kernel-debug-livepatch-devel-5.14.21-150400.24.21.2.x86_64",
            "openSUSE Leap 15.4:kernel-default-5.14.21-150400.24.21.2.aarch64",
            "openSUSE Leap 15.4:kernel-default-5.14.21-150400.24.21.2.ppc64le",
            "openSUSE Leap 15.4:kernel-default-5.14.21-150400.24.21.2.s390x",
            "openSUSE Leap 15.4:kernel-default-5.14.21-150400.24.21.2.x86_64",
            "openSUSE Leap 15.4:kernel-default-base-5.14.21-150400.24.21.2.150400.24.7.2.aarch64",
            "openSUSE Leap 15.4:kernel-default-base-5.14.21-150400.24.21.2.150400.24.7.2.ppc64le",
            "openSUSE Leap 15.4:kernel-default-base-5.14.21-150400.24.21.2.150400.24.7.2.s390x",
            "openSUSE Leap 15.4:kernel-default-base-5.14.21-150400.24.21.2.150400.24.7.2.x86_64",
            "openSUSE Leap 15.4:kernel-default-base-rebuild-5.14.21-150400.24.21.2.150400.24.7.2.aarch64",
            "openSUSE Leap 15.4:kernel-default-base-rebuild-5.14.21-150400.24.21.2.150400.24.7.2.ppc64le",
            "openSUSE Leap 15.4:kernel-default-base-rebuild-5.14.21-150400.24.21.2.150400.24.7.2.s390x",
            "openSUSE Leap 15.4:kernel-default-base-rebuild-5.14.21-150400.24.21.2.150400.24.7.2.x86_64",
            "openSUSE Leap 15.4:kernel-default-devel-5.14.21-150400.24.21.2.aarch64",
            "openSUSE Leap 15.4:kernel-default-devel-5.14.21-150400.24.21.2.ppc64le",
            "openSUSE Leap 15.4:kernel-default-devel-5.14.21-150400.24.21.2.s390x",
            "openSUSE Leap 15.4:kernel-default-devel-5.14.21-150400.24.21.2.x86_64",
            "openSUSE Leap 15.4:kernel-default-extra-5.14.21-150400.24.21.2.aarch64",
            "openSUSE Leap 15.4:kernel-default-extra-5.14.21-150400.24.21.2.ppc64le",
            "openSUSE Leap 15.4:kernel-default-extra-5.14.21-150400.24.21.2.s390x",
            "openSUSE Leap 15.4:kernel-default-extra-5.14.21-150400.24.21.2.x86_64",
            "openSUSE Leap 15.4:kernel-default-livepatch-5.14.21-150400.24.21.2.aarch64",
            "openSUSE Leap 15.4:kernel-default-livepatch-5.14.21-150400.24.21.2.ppc64le",
            "openSUSE Leap 15.4:kernel-default-livepatch-5.14.21-150400.24.21.2.s390x",
            "openSUSE Leap 15.4:kernel-default-livepatch-5.14.21-150400.24.21.2.x86_64",
            "openSUSE Leap 15.4:kernel-default-livepatch-devel-5.14.21-150400.24.21.2.aarch64",
            "openSUSE Leap 15.4:kernel-default-livepatch-devel-5.14.21-150400.24.21.2.ppc64le",
            "openSUSE Leap 15.4:kernel-default-livepatch-devel-5.14.21-150400.24.21.2.s390x",
            "openSUSE Leap 15.4:kernel-default-livepatch-devel-5.14.21-150400.24.21.2.x86_64",
            "openSUSE Leap 15.4:kernel-default-optional-5.14.21-150400.24.21.2.aarch64",
            "openSUSE Leap 15.4:kernel-default-optional-5.14.21-150400.24.21.2.ppc64le",
            "openSUSE Leap 15.4:kernel-default-optional-5.14.21-150400.24.21.2.s390x",
            "openSUSE Leap 15.4:kernel-default-optional-5.14.21-150400.24.21.2.x86_64",
            "openSUSE Leap 15.4:kernel-devel-5.14.21-150400.24.21.2.noarch",
            "openSUSE Leap 15.4:kernel-docs-5.14.21-150400.24.21.3.noarch",
            "openSUSE Leap 15.4:kernel-docs-html-5.14.21-150400.24.21.3.noarch",
            "openSUSE Leap 15.4:kernel-kvmsmall-5.14.21-150400.24.21.2.aarch64",
            "openSUSE Leap 15.4:kernel-kvmsmall-5.14.21-150400.24.21.2.ppc64le",
            "openSUSE Leap 15.4:kernel-kvmsmall-5.14.21-150400.24.21.2.x86_64",
            "openSUSE Leap 15.4:kernel-kvmsmall-devel-5.14.21-150400.24.21.2.aarch64",
            "openSUSE Leap 15.4:kernel-kvmsmall-devel-5.14.21-150400.24.21.2.ppc64le",
            "openSUSE Leap 15.4:kernel-kvmsmall-devel-5.14.21-150400.24.21.2.x86_64",
            "openSUSE Leap 15.4:kernel-kvmsmall-livepatch-devel-5.14.21-150400.24.21.2.aarch64",
            "openSUSE Leap 15.4:kernel-kvmsmall-livepatch-devel-5.14.21-150400.24.21.2.ppc64le",
            "openSUSE Leap 15.4:kernel-kvmsmall-livepatch-devel-5.14.21-150400.24.21.2.x86_64",
            "openSUSE Leap 15.4:kernel-macros-5.14.21-150400.24.21.2.noarch",
            "openSUSE Leap 15.4:kernel-obs-build-5.14.21-150400.24.21.2.aarch64",
            "openSUSE Leap 15.4:kernel-obs-build-5.14.21-150400.24.21.2.ppc64le",
            "openSUSE Leap 15.4:kernel-obs-build-5.14.21-150400.24.21.2.s390x",
            "openSUSE Leap 15.4:kernel-obs-build-5.14.21-150400.24.21.2.x86_64",
            "openSUSE Leap 15.4:kernel-obs-qa-5.14.21-150400.24.21.1.aarch64",
            "openSUSE Leap 15.4:kernel-obs-qa-5.14.21-150400.24.21.1.ppc64le",
            "openSUSE Leap 15.4:kernel-obs-qa-5.14.21-150400.24.21.1.s390x",
            "openSUSE Leap 15.4:kernel-obs-qa-5.14.21-150400.24.21.1.x86_64",
            "openSUSE Leap 15.4:kernel-source-5.14.21-150400.24.21.2.noarch",
            "openSUSE Leap 15.4:kernel-source-vanilla-5.14.21-150400.24.21.2.noarch",
            "openSUSE Leap 15.4:kernel-syms-5.14.21-150400.24.21.1.aarch64",
            "openSUSE Leap 15.4:kernel-syms-5.14.21-150400.24.21.1.ppc64le",
            "openSUSE Leap 15.4:kernel-syms-5.14.21-150400.24.21.1.s390x",
            "openSUSE Leap 15.4:kernel-syms-5.14.21-150400.24.21.1.x86_64",
            "openSUSE Leap 15.4:kernel-zfcpdump-5.14.21-150400.24.21.2.s390x",
            "openSUSE Leap 15.4:kselftests-kmp-64kb-5.14.21-150400.24.21.2.aarch64",
            "openSUSE Leap 15.4:kselftests-kmp-default-5.14.21-150400.24.21.2.aarch64",
            "openSUSE Leap 15.4:kselftests-kmp-default-5.14.21-150400.24.21.2.ppc64le",
            "openSUSE Leap 15.4:kselftests-kmp-default-5.14.21-150400.24.21.2.s390x",
            "openSUSE Leap 15.4:kselftests-kmp-default-5.14.21-150400.24.21.2.x86_64",
            "openSUSE Leap 15.4:ocfs2-kmp-64kb-5.14.21-150400.24.21.2.aarch64",
            "openSUSE Leap 15.4:ocfs2-kmp-default-5.14.21-150400.24.21.2.aarch64",
            "openSUSE Leap 15.4:ocfs2-kmp-default-5.14.21-150400.24.21.2.ppc64le",
            "openSUSE Leap 15.4:ocfs2-kmp-default-5.14.21-150400.24.21.2.s390x",
            "openSUSE Leap 15.4:ocfs2-kmp-default-5.14.21-150400.24.21.2.x86_64",
            "openSUSE Leap 15.4:reiserfs-kmp-64kb-5.14.21-150400.24.21.2.aarch64",
            "openSUSE Leap 15.4:reiserfs-kmp-default-5.14.21-150400.24.21.2.aarch64",
            "openSUSE Leap 15.4:reiserfs-kmp-default-5.14.21-150400.24.21.2.ppc64le",
            "openSUSE Leap 15.4:reiserfs-kmp-default-5.14.21-150400.24.21.2.s390x",
            "openSUSE Leap 15.4:reiserfs-kmp-default-5.14.21-150400.24.21.2.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2022-09-16T15:30:19Z",
          "details": "important"
        }
      ],
      "title": "CVE-2020-36516"
    },
    {
      "cve": "CVE-2021-33135",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2021-33135"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "Uncontrolled resource consumption in the Linux kernel drivers for Intel(R) SGX may allow an authenticated user to potentially enable denial of service via local access.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.21.2.aarch64",
          "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.21.2.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.21.2.s390x",
          "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.21.2.x86_64",
          "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.21.2.aarch64",
          "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.21.2.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.21.2.s390x",
          "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.21.2.x86_64",
          "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.21.2.aarch64",
          "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.21.2.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.21.2.s390x",
          "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.21.2.x86_64",
          "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.21.2.aarch64",
          "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.21.2.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.21.2.s390x",
          "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.21.2.x86_64",
          "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.21.2.ppc64le",
          "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.21.2.s390x",
          "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.21.2.x86_64",
          "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.21.2.ppc64le",
          "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.21.2.s390x",
          "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.21.2.x86_64",
          "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_21-default-1-150400.9.3.2.ppc64le",
          "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_21-default-1-150400.9.3.2.s390x",
          "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_21-default-1-150400.9.3.2.x86_64",
          "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-64kb-5.14.21-150400.24.21.2.aarch64",
          "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-64kb-devel-5.14.21-150400.24.21.2.aarch64",
          "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-5.14.21-150400.24.21.2.aarch64",
          "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-5.14.21-150400.24.21.2.ppc64le",
          "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-5.14.21-150400.24.21.2.s390x",
          "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-5.14.21-150400.24.21.2.x86_64",
          "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-base-5.14.21-150400.24.21.2.150400.24.7.2.aarch64",
          "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-base-5.14.21-150400.24.21.2.150400.24.7.2.ppc64le",
          "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-base-5.14.21-150400.24.21.2.150400.24.7.2.s390x",
          "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-base-5.14.21-150400.24.21.2.150400.24.7.2.x86_64",
          "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-devel-5.14.21-150400.24.21.2.aarch64",
          "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-devel-5.14.21-150400.24.21.2.ppc64le",
          "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-devel-5.14.21-150400.24.21.2.s390x",
          "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-devel-5.14.21-150400.24.21.2.x86_64",
          "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-devel-5.14.21-150400.24.21.2.noarch",
          "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-macros-5.14.21-150400.24.21.2.noarch",
          "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-zfcpdump-5.14.21-150400.24.21.2.s390x",
          "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-docs-5.14.21-150400.24.21.3.noarch",
          "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-obs-build-5.14.21-150400.24.21.2.aarch64",
          "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-obs-build-5.14.21-150400.24.21.2.ppc64le",
          "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-obs-build-5.14.21-150400.24.21.2.s390x",
          "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-obs-build-5.14.21-150400.24.21.2.x86_64",
          "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-source-5.14.21-150400.24.21.2.noarch",
          "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-syms-5.14.21-150400.24.21.1.aarch64",
          "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-syms-5.14.21-150400.24.21.1.ppc64le",
          "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-syms-5.14.21-150400.24.21.1.s390x",
          "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-syms-5.14.21-150400.24.21.1.x86_64",
          "SUSE Linux Enterprise Module for Legacy 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.21.2.aarch64",
          "SUSE Linux Enterprise Module for Legacy 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.21.2.ppc64le",
          "SUSE Linux Enterprise Module for Legacy 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.21.2.s390x",
          "SUSE Linux Enterprise Module for Legacy 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.21.2.x86_64",
          "SUSE Linux Enterprise Workstation Extension 15 SP4:kernel-default-extra-5.14.21-150400.24.21.2.x86_64",
          "openSUSE Leap 15.4:cluster-md-kmp-64kb-5.14.21-150400.24.21.2.aarch64",
          "openSUSE Leap 15.4:cluster-md-kmp-default-5.14.21-150400.24.21.2.aarch64",
          "openSUSE Leap 15.4:cluster-md-kmp-default-5.14.21-150400.24.21.2.ppc64le",
          "openSUSE Leap 15.4:cluster-md-kmp-default-5.14.21-150400.24.21.2.s390x",
          "openSUSE Leap 15.4:cluster-md-kmp-default-5.14.21-150400.24.21.2.x86_64",
          "openSUSE Leap 15.4:dlm-kmp-64kb-5.14.21-150400.24.21.2.aarch64",
          "openSUSE Leap 15.4:dlm-kmp-default-5.14.21-150400.24.21.2.aarch64",
          "openSUSE Leap 15.4:dlm-kmp-default-5.14.21-150400.24.21.2.ppc64le",
          "openSUSE Leap 15.4:dlm-kmp-default-5.14.21-150400.24.21.2.s390x",
          "openSUSE Leap 15.4:dlm-kmp-default-5.14.21-150400.24.21.2.x86_64",
          "openSUSE Leap 15.4:dtb-allwinner-5.14.21-150400.24.21.1.aarch64",
          "openSUSE Leap 15.4:dtb-altera-5.14.21-150400.24.21.1.aarch64",
          "openSUSE Leap 15.4:dtb-amazon-5.14.21-150400.24.21.1.aarch64",
          "openSUSE Leap 15.4:dtb-amd-5.14.21-150400.24.21.1.aarch64",
          "openSUSE Leap 15.4:dtb-amlogic-5.14.21-150400.24.21.1.aarch64",
          "openSUSE Leap 15.4:dtb-apm-5.14.21-150400.24.21.1.aarch64",
          "openSUSE Leap 15.4:dtb-apple-5.14.21-150400.24.21.1.aarch64",
          "openSUSE Leap 15.4:dtb-arm-5.14.21-150400.24.21.1.aarch64",
          "openSUSE Leap 15.4:dtb-broadcom-5.14.21-150400.24.21.1.aarch64",
          "openSUSE Leap 15.4:dtb-cavium-5.14.21-150400.24.21.1.aarch64",
          "openSUSE Leap 15.4:dtb-exynos-5.14.21-150400.24.21.1.aarch64",
          "openSUSE Leap 15.4:dtb-freescale-5.14.21-150400.24.21.1.aarch64",
          "openSUSE Leap 15.4:dtb-hisilicon-5.14.21-150400.24.21.1.aarch64",
          "openSUSE Leap 15.4:dtb-lg-5.14.21-150400.24.21.1.aarch64",
          "openSUSE Leap 15.4:dtb-marvell-5.14.21-150400.24.21.1.aarch64",
          "openSUSE Leap 15.4:dtb-mediatek-5.14.21-150400.24.21.1.aarch64",
          "openSUSE Leap 15.4:dtb-nvidia-5.14.21-150400.24.21.1.aarch64",
          "openSUSE Leap 15.4:dtb-qcom-5.14.21-150400.24.21.1.aarch64",
          "openSUSE Leap 15.4:dtb-renesas-5.14.21-150400.24.21.1.aarch64",
          "openSUSE Leap 15.4:dtb-rockchip-5.14.21-150400.24.21.1.aarch64",
          "openSUSE Leap 15.4:dtb-socionext-5.14.21-150400.24.21.1.aarch64",
          "openSUSE Leap 15.4:dtb-sprd-5.14.21-150400.24.21.1.aarch64",
          "openSUSE Leap 15.4:dtb-xilinx-5.14.21-150400.24.21.1.aarch64",
          "openSUSE Leap 15.4:gfs2-kmp-64kb-5.14.21-150400.24.21.2.aarch64",
          "openSUSE Leap 15.4:gfs2-kmp-default-5.14.21-150400.24.21.2.aarch64",
          "openSUSE Leap 15.4:gfs2-kmp-default-5.14.21-150400.24.21.2.ppc64le",
          "openSUSE Leap 15.4:gfs2-kmp-default-5.14.21-150400.24.21.2.s390x",
          "openSUSE Leap 15.4:gfs2-kmp-default-5.14.21-150400.24.21.2.x86_64",
          "openSUSE Leap 15.4:kernel-64kb-5.14.21-150400.24.21.2.aarch64",
          "openSUSE Leap 15.4:kernel-64kb-devel-5.14.21-150400.24.21.2.aarch64",
          "openSUSE Leap 15.4:kernel-64kb-extra-5.14.21-150400.24.21.2.aarch64",
          "openSUSE Leap 15.4:kernel-64kb-livepatch-devel-5.14.21-150400.24.21.2.aarch64",
          "openSUSE Leap 15.4:kernel-64kb-optional-5.14.21-150400.24.21.2.aarch64",
          "openSUSE Leap 15.4:kernel-debug-5.14.21-150400.24.21.2.ppc64le",
          "openSUSE Leap 15.4:kernel-debug-5.14.21-150400.24.21.2.x86_64",
          "openSUSE Leap 15.4:kernel-debug-devel-5.14.21-150400.24.21.2.ppc64le",
          "openSUSE Leap 15.4:kernel-debug-devel-5.14.21-150400.24.21.2.x86_64",
          "openSUSE Leap 15.4:kernel-debug-livepatch-devel-5.14.21-150400.24.21.2.ppc64le",
          "openSUSE Leap 15.4:kernel-debug-livepatch-devel-5.14.21-150400.24.21.2.x86_64",
          "openSUSE Leap 15.4:kernel-default-5.14.21-150400.24.21.2.aarch64",
          "openSUSE Leap 15.4:kernel-default-5.14.21-150400.24.21.2.ppc64le",
          "openSUSE Leap 15.4:kernel-default-5.14.21-150400.24.21.2.s390x",
          "openSUSE Leap 15.4:kernel-default-5.14.21-150400.24.21.2.x86_64",
          "openSUSE Leap 15.4:kernel-default-base-5.14.21-150400.24.21.2.150400.24.7.2.aarch64",
          "openSUSE Leap 15.4:kernel-default-base-5.14.21-150400.24.21.2.150400.24.7.2.ppc64le",
          "openSUSE Leap 15.4:kernel-default-base-5.14.21-150400.24.21.2.150400.24.7.2.s390x",
          "openSUSE Leap 15.4:kernel-default-base-5.14.21-150400.24.21.2.150400.24.7.2.x86_64",
          "openSUSE Leap 15.4:kernel-default-base-rebuild-5.14.21-150400.24.21.2.150400.24.7.2.aarch64",
          "openSUSE Leap 15.4:kernel-default-base-rebuild-5.14.21-150400.24.21.2.150400.24.7.2.ppc64le",
          "openSUSE Leap 15.4:kernel-default-base-rebuild-5.14.21-150400.24.21.2.150400.24.7.2.s390x",
          "openSUSE Leap 15.4:kernel-default-base-rebuild-5.14.21-150400.24.21.2.150400.24.7.2.x86_64",
          "openSUSE Leap 15.4:kernel-default-devel-5.14.21-150400.24.21.2.aarch64",
          "openSUSE Leap 15.4:kernel-default-devel-5.14.21-150400.24.21.2.ppc64le",
          "openSUSE Leap 15.4:kernel-default-devel-5.14.21-150400.24.21.2.s390x",
          "openSUSE Leap 15.4:kernel-default-devel-5.14.21-150400.24.21.2.x86_64",
          "openSUSE Leap 15.4:kernel-default-extra-5.14.21-150400.24.21.2.aarch64",
          "openSUSE Leap 15.4:kernel-default-extra-5.14.21-150400.24.21.2.ppc64le",
          "openSUSE Leap 15.4:kernel-default-extra-5.14.21-150400.24.21.2.s390x",
          "openSUSE Leap 15.4:kernel-default-extra-5.14.21-150400.24.21.2.x86_64",
          "openSUSE Leap 15.4:kernel-default-livepatch-5.14.21-150400.24.21.2.aarch64",
          "openSUSE Leap 15.4:kernel-default-livepatch-5.14.21-150400.24.21.2.ppc64le",
          "openSUSE Leap 15.4:kernel-default-livepatch-5.14.21-150400.24.21.2.s390x",
          "openSUSE Leap 15.4:kernel-default-livepatch-5.14.21-150400.24.21.2.x86_64",
          "openSUSE Leap 15.4:kernel-default-livepatch-devel-5.14.21-150400.24.21.2.aarch64",
          "openSUSE Leap 15.4:kernel-default-livepatch-devel-5.14.21-150400.24.21.2.ppc64le",
          "openSUSE Leap 15.4:kernel-default-livepatch-devel-5.14.21-150400.24.21.2.s390x",
          "openSUSE Leap 15.4:kernel-default-livepatch-devel-5.14.21-150400.24.21.2.x86_64",
          "openSUSE Leap 15.4:kernel-default-optional-5.14.21-150400.24.21.2.aarch64",
          "openSUSE Leap 15.4:kernel-default-optional-5.14.21-150400.24.21.2.ppc64le",
          "openSUSE Leap 15.4:kernel-default-optional-5.14.21-150400.24.21.2.s390x",
          "openSUSE Leap 15.4:kernel-default-optional-5.14.21-150400.24.21.2.x86_64",
          "openSUSE Leap 15.4:kernel-devel-5.14.21-150400.24.21.2.noarch",
          "openSUSE Leap 15.4:kernel-docs-5.14.21-150400.24.21.3.noarch",
          "openSUSE Leap 15.4:kernel-docs-html-5.14.21-150400.24.21.3.noarch",
          "openSUSE Leap 15.4:kernel-kvmsmall-5.14.21-150400.24.21.2.aarch64",
          "openSUSE Leap 15.4:kernel-kvmsmall-5.14.21-150400.24.21.2.ppc64le",
          "openSUSE Leap 15.4:kernel-kvmsmall-5.14.21-150400.24.21.2.x86_64",
          "openSUSE Leap 15.4:kernel-kvmsmall-devel-5.14.21-150400.24.21.2.aarch64",
          "openSUSE Leap 15.4:kernel-kvmsmall-devel-5.14.21-150400.24.21.2.ppc64le",
          "openSUSE Leap 15.4:kernel-kvmsmall-devel-5.14.21-150400.24.21.2.x86_64",
          "openSUSE Leap 15.4:kernel-kvmsmall-livepatch-devel-5.14.21-150400.24.21.2.aarch64",
          "openSUSE Leap 15.4:kernel-kvmsmall-livepatch-devel-5.14.21-150400.24.21.2.ppc64le",
          "openSUSE Leap 15.4:kernel-kvmsmall-livepatch-devel-5.14.21-150400.24.21.2.x86_64",
          "openSUSE Leap 15.4:kernel-macros-5.14.21-150400.24.21.2.noarch",
          "openSUSE Leap 15.4:kernel-obs-build-5.14.21-150400.24.21.2.aarch64",
          "openSUSE Leap 15.4:kernel-obs-build-5.14.21-150400.24.21.2.ppc64le",
          "openSUSE Leap 15.4:kernel-obs-build-5.14.21-150400.24.21.2.s390x",
          "openSUSE Leap 15.4:kernel-obs-build-5.14.21-150400.24.21.2.x86_64",
          "openSUSE Leap 15.4:kernel-obs-qa-5.14.21-150400.24.21.1.aarch64",
          "openSUSE Leap 15.4:kernel-obs-qa-5.14.21-150400.24.21.1.ppc64le",
          "openSUSE Leap 15.4:kernel-obs-qa-5.14.21-150400.24.21.1.s390x",
          "openSUSE Leap 15.4:kernel-obs-qa-5.14.21-150400.24.21.1.x86_64",
          "openSUSE Leap 15.4:kernel-source-5.14.21-150400.24.21.2.noarch",
          "openSUSE Leap 15.4:kernel-source-vanilla-5.14.21-150400.24.21.2.noarch",
          "openSUSE Leap 15.4:kernel-syms-5.14.21-150400.24.21.1.aarch64",
          "openSUSE Leap 15.4:kernel-syms-5.14.21-150400.24.21.1.ppc64le",
          "openSUSE Leap 15.4:kernel-syms-5.14.21-150400.24.21.1.s390x",
          "openSUSE Leap 15.4:kernel-syms-5.14.21-150400.24.21.1.x86_64",
          "openSUSE Leap 15.4:kernel-zfcpdump-5.14.21-150400.24.21.2.s390x",
          "openSUSE Leap 15.4:kselftests-kmp-64kb-5.14.21-150400.24.21.2.aarch64",
          "openSUSE Leap 15.4:kselftests-kmp-default-5.14.21-150400.24.21.2.aarch64",
          "openSUSE Leap 15.4:kselftests-kmp-default-5.14.21-150400.24.21.2.ppc64le",
          "openSUSE Leap 15.4:kselftests-kmp-default-5.14.21-150400.24.21.2.s390x",
          "openSUSE Leap 15.4:kselftests-kmp-default-5.14.21-150400.24.21.2.x86_64",
          "openSUSE Leap 15.4:ocfs2-kmp-64kb-5.14.21-150400.24.21.2.aarch64",
          "openSUSE Leap 15.4:ocfs2-kmp-default-5.14.21-150400.24.21.2.aarch64",
          "openSUSE Leap 15.4:ocfs2-kmp-default-5.14.21-150400.24.21.2.ppc64le",
          "openSUSE Leap 15.4:ocfs2-kmp-default-5.14.21-150400.24.21.2.s390x",
          "openSUSE Leap 15.4:ocfs2-kmp-default-5.14.21-150400.24.21.2.x86_64",
          "openSUSE Leap 15.4:reiserfs-kmp-64kb-5.14.21-150400.24.21.2.aarch64",
          "openSUSE Leap 15.4:reiserfs-kmp-default-5.14.21-150400.24.21.2.aarch64",
          "openSUSE Leap 15.4:reiserfs-kmp-default-5.14.21-150400.24.21.2.ppc64le",
          "openSUSE Leap 15.4:reiserfs-kmp-default-5.14.21-150400.24.21.2.s390x",
          "openSUSE Leap 15.4:reiserfs-kmp-default-5.14.21-150400.24.21.2.x86_64"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2021-33135",
          "url": "https://www.suse.com/security/cve/CVE-2021-33135"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1199515 for CVE-2021-33135",
          "url": "https://bugzilla.suse.com/1199515"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.21.2.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.21.2.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.21.2.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.21.2.x86_64",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.21.2.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.21.2.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.21.2.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.21.2.x86_64",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.21.2.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.21.2.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.21.2.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.21.2.x86_64",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.21.2.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.21.2.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.21.2.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.21.2.x86_64",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.21.2.ppc64le",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.21.2.s390x",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.21.2.x86_64",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.21.2.ppc64le",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.21.2.s390x",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.21.2.x86_64",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_21-default-1-150400.9.3.2.ppc64le",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_21-default-1-150400.9.3.2.s390x",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_21-default-1-150400.9.3.2.x86_64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-64kb-5.14.21-150400.24.21.2.aarch64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-64kb-devel-5.14.21-150400.24.21.2.aarch64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-5.14.21-150400.24.21.2.aarch64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-5.14.21-150400.24.21.2.ppc64le",
            "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-5.14.21-150400.24.21.2.s390x",
            "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-5.14.21-150400.24.21.2.x86_64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-base-5.14.21-150400.24.21.2.150400.24.7.2.aarch64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-base-5.14.21-150400.24.21.2.150400.24.7.2.ppc64le",
            "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-base-5.14.21-150400.24.21.2.150400.24.7.2.s390x",
            "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-base-5.14.21-150400.24.21.2.150400.24.7.2.x86_64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-devel-5.14.21-150400.24.21.2.aarch64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-devel-5.14.21-150400.24.21.2.ppc64le",
            "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-devel-5.14.21-150400.24.21.2.s390x",
            "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-devel-5.14.21-150400.24.21.2.x86_64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-devel-5.14.21-150400.24.21.2.noarch",
            "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-macros-5.14.21-150400.24.21.2.noarch",
            "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-zfcpdump-5.14.21-150400.24.21.2.s390x",
            "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-docs-5.14.21-150400.24.21.3.noarch",
            "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-obs-build-5.14.21-150400.24.21.2.aarch64",
            "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-obs-build-5.14.21-150400.24.21.2.ppc64le",
            "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-obs-build-5.14.21-150400.24.21.2.s390x",
            "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-obs-build-5.14.21-150400.24.21.2.x86_64",
            "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-source-5.14.21-150400.24.21.2.noarch",
            "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-syms-5.14.21-150400.24.21.1.aarch64",
            "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-syms-5.14.21-150400.24.21.1.ppc64le",
            "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-syms-5.14.21-150400.24.21.1.s390x",
            "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-syms-5.14.21-150400.24.21.1.x86_64",
            "SUSE Linux Enterprise Module for Legacy 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.21.2.aarch64",
            "SUSE Linux Enterprise Module for Legacy 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.21.2.ppc64le",
            "SUSE Linux Enterprise Module for Legacy 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.21.2.s390x",
            "SUSE Linux Enterprise Module for Legacy 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.21.2.x86_64",
            "SUSE Linux Enterprise Workstation Extension 15 SP4:kernel-default-extra-5.14.21-150400.24.21.2.x86_64",
            "openSUSE Leap 15.4:cluster-md-kmp-64kb-5.14.21-150400.24.21.2.aarch64",
            "openSUSE Leap 15.4:cluster-md-kmp-default-5.14.21-150400.24.21.2.aarch64",
            "openSUSE Leap 15.4:cluster-md-kmp-default-5.14.21-150400.24.21.2.ppc64le",
            "openSUSE Leap 15.4:cluster-md-kmp-default-5.14.21-150400.24.21.2.s390x",
            "openSUSE Leap 15.4:cluster-md-kmp-default-5.14.21-150400.24.21.2.x86_64",
            "openSUSE Leap 15.4:dlm-kmp-64kb-5.14.21-150400.24.21.2.aarch64",
            "openSUSE Leap 15.4:dlm-kmp-default-5.14.21-150400.24.21.2.aarch64",
            "openSUSE Leap 15.4:dlm-kmp-default-5.14.21-150400.24.21.2.ppc64le",
            "openSUSE Leap 15.4:dlm-kmp-default-5.14.21-150400.24.21.2.s390x",
            "openSUSE Leap 15.4:dlm-kmp-default-5.14.21-150400.24.21.2.x86_64",
            "openSUSE Leap 15.4:dtb-allwinner-5.14.21-150400.24.21.1.aarch64",
            "openSUSE Leap 15.4:dtb-altera-5.14.21-150400.24.21.1.aarch64",
            "openSUSE Leap 15.4:dtb-amazon-5.14.21-150400.24.21.1.aarch64",
            "openSUSE Leap 15.4:dtb-amd-5.14.21-150400.24.21.1.aarch64",
            "openSUSE Leap 15.4:dtb-amlogic-5.14.21-150400.24.21.1.aarch64",
            "openSUSE Leap 15.4:dtb-apm-5.14.21-150400.24.21.1.aarch64",
            "openSUSE Leap 15.4:dtb-apple-5.14.21-150400.24.21.1.aarch64",
            "openSUSE Leap 15.4:dtb-arm-5.14.21-150400.24.21.1.aarch64",
            "openSUSE Leap 15.4:dtb-broadcom-5.14.21-150400.24.21.1.aarch64",
            "openSUSE Leap 15.4:dtb-cavium-5.14.21-150400.24.21.1.aarch64",
            "openSUSE Leap 15.4:dtb-exynos-5.14.21-150400.24.21.1.aarch64",
            "openSUSE Leap 15.4:dtb-freescale-5.14.21-150400.24.21.1.aarch64",
            "openSUSE Leap 15.4:dtb-hisilicon-5.14.21-150400.24.21.1.aarch64",
            "openSUSE Leap 15.4:dtb-lg-5.14.21-150400.24.21.1.aarch64",
            "openSUSE Leap 15.4:dtb-marvell-5.14.21-150400.24.21.1.aarch64",
            "openSUSE Leap 15.4:dtb-mediatek-5.14.21-150400.24.21.1.aarch64",
            "openSUSE Leap 15.4:dtb-nvidia-5.14.21-150400.24.21.1.aarch64",
            "openSUSE Leap 15.4:dtb-qcom-5.14.21-150400.24.21.1.aarch64",
            "openSUSE Leap 15.4:dtb-renesas-5.14.21-150400.24.21.1.aarch64",
            "openSUSE Leap 15.4:dtb-rockchip-5.14.21-150400.24.21.1.aarch64",
            "openSUSE Leap 15.4:dtb-socionext-5.14.21-150400.24.21.1.aarch64",
            "openSUSE Leap 15.4:dtb-sprd-5.14.21-150400.24.21.1.aarch64",
            "openSUSE Leap 15.4:dtb-xilinx-5.14.21-150400.24.21.1.aarch64",
            "openSUSE Leap 15.4:gfs2-kmp-64kb-5.14.21-150400.24.21.2.aarch64",
            "openSUSE Leap 15.4:gfs2-kmp-default-5.14.21-150400.24.21.2.aarch64",
            "openSUSE Leap 15.4:gfs2-kmp-default-5.14.21-150400.24.21.2.ppc64le",
            "openSUSE Leap 15.4:gfs2-kmp-default-5.14.21-150400.24.21.2.s390x",
            "openSUSE Leap 15.4:gfs2-kmp-default-5.14.21-150400.24.21.2.x86_64",
            "openSUSE Leap 15.4:kernel-64kb-5.14.21-150400.24.21.2.aarch64",
            "openSUSE Leap 15.4:kernel-64kb-devel-5.14.21-150400.24.21.2.aarch64",
            "openSUSE Leap 15.4:kernel-64kb-extra-5.14.21-150400.24.21.2.aarch64",
            "openSUSE Leap 15.4:kernel-64kb-livepatch-devel-5.14.21-150400.24.21.2.aarch64",
            "openSUSE Leap 15.4:kernel-64kb-optional-5.14.21-150400.24.21.2.aarch64",
            "openSUSE Leap 15.4:kernel-debug-5.14.21-150400.24.21.2.ppc64le",
            "openSUSE Leap 15.4:kernel-debug-5.14.21-150400.24.21.2.x86_64",
            "openSUSE Leap 15.4:kernel-debug-devel-5.14.21-150400.24.21.2.ppc64le",
            "openSUSE Leap 15.4:kernel-debug-devel-5.14.21-150400.24.21.2.x86_64",
            "openSUSE Leap 15.4:kernel-debug-livepatch-devel-5.14.21-150400.24.21.2.ppc64le",
            "openSUSE Leap 15.4:kernel-debug-livepatch-devel-5.14.21-150400.24.21.2.x86_64",
            "openSUSE Leap 15.4:kernel-default-5.14.21-150400.24.21.2.aarch64",
            "openSUSE Leap 15.4:kernel-default-5.14.21-150400.24.21.2.ppc64le",
            "openSUSE Leap 15.4:kernel-default-5.14.21-150400.24.21.2.s390x",
            "openSUSE Leap 15.4:kernel-default-5.14.21-150400.24.21.2.x86_64",
            "openSUSE Leap 15.4:kernel-default-base-5.14.21-150400.24.21.2.150400.24.7.2.aarch64",
            "openSUSE Leap 15.4:kernel-default-base-5.14.21-150400.24.21.2.150400.24.7.2.ppc64le",
            "openSUSE Leap 15.4:kernel-default-base-5.14.21-150400.24.21.2.150400.24.7.2.s390x",
            "openSUSE Leap 15.4:kernel-default-base-5.14.21-150400.24.21.2.150400.24.7.2.x86_64",
            "openSUSE Leap 15.4:kernel-default-base-rebuild-5.14.21-150400.24.21.2.150400.24.7.2.aarch64",
            "openSUSE Leap 15.4:kernel-default-base-rebuild-5.14.21-150400.24.21.2.150400.24.7.2.ppc64le",
            "openSUSE Leap 15.4:kernel-default-base-rebuild-5.14.21-150400.24.21.2.150400.24.7.2.s390x",
            "openSUSE Leap 15.4:kernel-default-base-rebuild-5.14.21-150400.24.21.2.150400.24.7.2.x86_64",
            "openSUSE Leap 15.4:kernel-default-devel-5.14.21-150400.24.21.2.aarch64",
            "openSUSE Leap 15.4:kernel-default-devel-5.14.21-150400.24.21.2.ppc64le",
            "openSUSE Leap 15.4:kernel-default-devel-5.14.21-150400.24.21.2.s390x",
            "openSUSE Leap 15.4:kernel-default-devel-5.14.21-150400.24.21.2.x86_64",
            "openSUSE Leap 15.4:kernel-default-extra-5.14.21-150400.24.21.2.aarch64",
            "openSUSE Leap 15.4:kernel-default-extra-5.14.21-150400.24.21.2.ppc64le",
            "openSUSE Leap 15.4:kernel-default-extra-5.14.21-150400.24.21.2.s390x",
            "openSUSE Leap 15.4:kernel-default-extra-5.14.21-150400.24.21.2.x86_64",
            "openSUSE Leap 15.4:kernel-default-livepatch-5.14.21-150400.24.21.2.aarch64",
            "openSUSE Leap 15.4:kernel-default-livepatch-5.14.21-150400.24.21.2.ppc64le",
            "openSUSE Leap 15.4:kernel-default-livepatch-5.14.21-150400.24.21.2.s390x",
            "openSUSE Leap 15.4:kernel-default-livepatch-5.14.21-150400.24.21.2.x86_64",
            "openSUSE Leap 15.4:kernel-default-livepatch-devel-5.14.21-150400.24.21.2.aarch64",
            "openSUSE Leap 15.4:kernel-default-livepatch-devel-5.14.21-150400.24.21.2.ppc64le",
            "openSUSE Leap 15.4:kernel-default-livepatch-devel-5.14.21-150400.24.21.2.s390x",
            "openSUSE Leap 15.4:kernel-default-livepatch-devel-5.14.21-150400.24.21.2.x86_64",
            "openSUSE Leap 15.4:kernel-default-optional-5.14.21-150400.24.21.2.aarch64",
            "openSUSE Leap 15.4:kernel-default-optional-5.14.21-150400.24.21.2.ppc64le",
            "openSUSE Leap 15.4:kernel-default-optional-5.14.21-150400.24.21.2.s390x",
            "openSUSE Leap 15.4:kernel-default-optional-5.14.21-150400.24.21.2.x86_64",
            "openSUSE Leap 15.4:kernel-devel-5.14.21-150400.24.21.2.noarch",
            "openSUSE Leap 15.4:kernel-docs-5.14.21-150400.24.21.3.noarch",
            "openSUSE Leap 15.4:kernel-docs-html-5.14.21-150400.24.21.3.noarch",
            "openSUSE Leap 15.4:kernel-kvmsmall-5.14.21-150400.24.21.2.aarch64",
            "openSUSE Leap 15.4:kernel-kvmsmall-5.14.21-150400.24.21.2.ppc64le",
            "openSUSE Leap 15.4:kernel-kvmsmall-5.14.21-150400.24.21.2.x86_64",
            "openSUSE Leap 15.4:kernel-kvmsmall-devel-5.14.21-150400.24.21.2.aarch64",
            "openSUSE Leap 15.4:kernel-kvmsmall-devel-5.14.21-150400.24.21.2.ppc64le",
            "openSUSE Leap 15.4:kernel-kvmsmall-devel-5.14.21-150400.24.21.2.x86_64",
            "openSUSE Leap 15.4:kernel-kvmsmall-livepatch-devel-5.14.21-150400.24.21.2.aarch64",
            "openSUSE Leap 15.4:kernel-kvmsmall-livepatch-devel-5.14.21-150400.24.21.2.ppc64le",
            "openSUSE Leap 15.4:kernel-kvmsmall-livepatch-devel-5.14.21-150400.24.21.2.x86_64",
            "openSUSE Leap 15.4:kernel-macros-5.14.21-150400.24.21.2.noarch",
            "openSUSE Leap 15.4:kernel-obs-build-5.14.21-150400.24.21.2.aarch64",
            "openSUSE Leap 15.4:kernel-obs-build-5.14.21-150400.24.21.2.ppc64le",
            "openSUSE Leap 15.4:kernel-obs-build-5.14.21-150400.24.21.2.s390x",
            "openSUSE Leap 15.4:kernel-obs-build-5.14.21-150400.24.21.2.x86_64",
            "openSUSE Leap 15.4:kernel-obs-qa-5.14.21-150400.24.21.1.aarch64",
            "openSUSE Leap 15.4:kernel-obs-qa-5.14.21-150400.24.21.1.ppc64le",
            "openSUSE Leap 15.4:kernel-obs-qa-5.14.21-150400.24.21.1.s390x",
            "openSUSE Leap 15.4:kernel-obs-qa-5.14.21-150400.24.21.1.x86_64",
            "openSUSE Leap 15.4:kernel-source-5.14.21-150400.24.21.2.noarch",
            "openSUSE Leap 15.4:kernel-source-vanilla-5.14.21-150400.24.21.2.noarch",
            "openSUSE Leap 15.4:kernel-syms-5.14.21-150400.24.21.1.aarch64",
            "openSUSE Leap 15.4:kernel-syms-5.14.21-150400.24.21.1.ppc64le",
            "openSUSE Leap 15.4:kernel-syms-5.14.21-150400.24.21.1.s390x",
            "openSUSE Leap 15.4:kernel-syms-5.14.21-150400.24.21.1.x86_64",
            "openSUSE Leap 15.4:kernel-zfcpdump-5.14.21-150400.24.21.2.s390x",
            "openSUSE Leap 15.4:kselftests-kmp-64kb-5.14.21-150400.24.21.2.aarch64",
            "openSUSE Leap 15.4:kselftests-kmp-default-5.14.21-150400.24.21.2.aarch64",
            "openSUSE Leap 15.4:kselftests-kmp-default-5.14.21-150400.24.21.2.ppc64le",
            "openSUSE Leap 15.4:kselftests-kmp-default-5.14.21-150400.24.21.2.s390x",
            "openSUSE Leap 15.4:kselftests-kmp-default-5.14.21-150400.24.21.2.x86_64",
            "openSUSE Leap 15.4:ocfs2-kmp-64kb-5.14.21-150400.24.21.2.aarch64",
            "openSUSE Leap 15.4:ocfs2-kmp-default-5.14.21-150400.24.21.2.aarch64",
            "openSUSE Leap 15.4:ocfs2-kmp-default-5.14.21-150400.24.21.2.ppc64le",
            "openSUSE Leap 15.4:ocfs2-kmp-default-5.14.21-150400.24.21.2.s390x",
            "openSUSE Leap 15.4:ocfs2-kmp-default-5.14.21-150400.24.21.2.x86_64",
            "openSUSE Leap 15.4:reiserfs-kmp-64kb-5.14.21-150400.24.21.2.aarch64",
            "openSUSE Leap 15.4:reiserfs-kmp-default-5.14.21-150400.24.21.2.aarch64",
            "openSUSE Leap 15.4:reiserfs-kmp-default-5.14.21-150400.24.21.2.ppc64le",
            "openSUSE Leap 15.4:reiserfs-kmp-default-5.14.21-150400.24.21.2.s390x",
            "openSUSE Leap 15.4:reiserfs-kmp-default-5.14.21-150400.24.21.2.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 5.5,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
            "version": "3.1"
          },
          "products": [
            "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.21.2.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.21.2.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.21.2.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.21.2.x86_64",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.21.2.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.21.2.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.21.2.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.21.2.x86_64",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.21.2.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.21.2.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.21.2.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.21.2.x86_64",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.21.2.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.21.2.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.21.2.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.21.2.x86_64",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.21.2.ppc64le",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.21.2.s390x",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.21.2.x86_64",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.21.2.ppc64le",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.21.2.s390x",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.21.2.x86_64",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_21-default-1-150400.9.3.2.ppc64le",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_21-default-1-150400.9.3.2.s390x",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_21-default-1-150400.9.3.2.x86_64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-64kb-5.14.21-150400.24.21.2.aarch64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-64kb-devel-5.14.21-150400.24.21.2.aarch64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-5.14.21-150400.24.21.2.aarch64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-5.14.21-150400.24.21.2.ppc64le",
            "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-5.14.21-150400.24.21.2.s390x",
            "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-5.14.21-150400.24.21.2.x86_64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-base-5.14.21-150400.24.21.2.150400.24.7.2.aarch64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-base-5.14.21-150400.24.21.2.150400.24.7.2.ppc64le",
            "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-base-5.14.21-150400.24.21.2.150400.24.7.2.s390x",
            "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-base-5.14.21-150400.24.21.2.150400.24.7.2.x86_64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-devel-5.14.21-150400.24.21.2.aarch64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-devel-5.14.21-150400.24.21.2.ppc64le",
            "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-devel-5.14.21-150400.24.21.2.s390x",
            "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-devel-5.14.21-150400.24.21.2.x86_64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-devel-5.14.21-150400.24.21.2.noarch",
            "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-macros-5.14.21-150400.24.21.2.noarch",
            "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-zfcpdump-5.14.21-150400.24.21.2.s390x",
            "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-docs-5.14.21-150400.24.21.3.noarch",
            "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-obs-build-5.14.21-150400.24.21.2.aarch64",
            "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-obs-build-5.14.21-150400.24.21.2.ppc64le",
            "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-obs-build-5.14.21-150400.24.21.2.s390x",
            "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-obs-build-5.14.21-150400.24.21.2.x86_64",
            "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-source-5.14.21-150400.24.21.2.noarch",
            "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-syms-5.14.21-150400.24.21.1.aarch64",
            "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-syms-5.14.21-150400.24.21.1.ppc64le",
            "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-syms-5.14.21-150400.24.21.1.s390x",
            "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-syms-5.14.21-150400.24.21.1.x86_64",
            "SUSE Linux Enterprise Module for Legacy 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.21.2.aarch64",
            "SUSE Linux Enterprise Module for Legacy 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.21.2.ppc64le",
            "SUSE Linux Enterprise Module for Legacy 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.21.2.s390x",
            "SUSE Linux Enterprise Module for Legacy 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.21.2.x86_64",
            "SUSE Linux Enterprise Workstation Extension 15 SP4:kernel-default-extra-5.14.21-150400.24.21.2.x86_64",
            "openSUSE Leap 15.4:cluster-md-kmp-64kb-5.14.21-150400.24.21.2.aarch64",
            "openSUSE Leap 15.4:cluster-md-kmp-default-5.14.21-150400.24.21.2.aarch64",
            "openSUSE Leap 15.4:cluster-md-kmp-default-5.14.21-150400.24.21.2.ppc64le",
            "openSUSE Leap 15.4:cluster-md-kmp-default-5.14.21-150400.24.21.2.s390x",
            "openSUSE Leap 15.4:cluster-md-kmp-default-5.14.21-150400.24.21.2.x86_64",
            "openSUSE Leap 15.4:dlm-kmp-64kb-5.14.21-150400.24.21.2.aarch64",
            "openSUSE Leap 15.4:dlm-kmp-default-5.14.21-150400.24.21.2.aarch64",
            "openSUSE Leap 15.4:dlm-kmp-default-5.14.21-150400.24.21.2.ppc64le",
            "openSUSE Leap 15.4:dlm-kmp-default-5.14.21-150400.24.21.2.s390x",
            "openSUSE Leap 15.4:dlm-kmp-default-5.14.21-150400.24.21.2.x86_64",
            "openSUSE Leap 15.4:dtb-allwinner-5.14.21-150400.24.21.1.aarch64",
            "openSUSE Leap 15.4:dtb-altera-5.14.21-150400.24.21.1.aarch64",
            "openSUSE Leap 15.4:dtb-amazon-5.14.21-150400.24.21.1.aarch64",
            "openSUSE Leap 15.4:dtb-amd-5.14.21-150400.24.21.1.aarch64",
            "openSUSE Leap 15.4:dtb-amlogic-5.14.21-150400.24.21.1.aarch64",
            "openSUSE Leap 15.4:dtb-apm-5.14.21-150400.24.21.1.aarch64",
            "openSUSE Leap 15.4:dtb-apple-5.14.21-150400.24.21.1.aarch64",
            "openSUSE Leap 15.4:dtb-arm-5.14.21-150400.24.21.1.aarch64",
            "openSUSE Leap 15.4:dtb-broadcom-5.14.21-150400.24.21.1.aarch64",
            "openSUSE Leap 15.4:dtb-cavium-5.14.21-150400.24.21.1.aarch64",
            "openSUSE Leap 15.4:dtb-exynos-5.14.21-150400.24.21.1.aarch64",
            "openSUSE Leap 15.4:dtb-freescale-5.14.21-150400.24.21.1.aarch64",
            "openSUSE Leap 15.4:dtb-hisilicon-5.14.21-150400.24.21.1.aarch64",
            "openSUSE Leap 15.4:dtb-lg-5.14.21-150400.24.21.1.aarch64",
            "openSUSE Leap 15.4:dtb-marvell-5.14.21-150400.24.21.1.aarch64",
            "openSUSE Leap 15.4:dtb-mediatek-5.14.21-150400.24.21.1.aarch64",
            "openSUSE Leap 15.4:dtb-nvidia-5.14.21-150400.24.21.1.aarch64",
            "openSUSE Leap 15.4:dtb-qcom-5.14.21-150400.24.21.1.aarch64",
            "openSUSE Leap 15.4:dtb-renesas-5.14.21-150400.24.21.1.aarch64",
            "openSUSE Leap 15.4:dtb-rockchip-5.14.21-150400.24.21.1.aarch64",
            "openSUSE Leap 15.4:dtb-socionext-5.14.21-150400.24.21.1.aarch64",
            "openSUSE Leap 15.4:dtb-sprd-5.14.21-150400.24.21.1.aarch64",
            "openSUSE Leap 15.4:dtb-xilinx-5.14.21-150400.24.21.1.aarch64",
            "openSUSE Leap 15.4:gfs2-kmp-64kb-5.14.21-150400.24.21.2.aarch64",
            "openSUSE Leap 15.4:gfs2-kmp-default-5.14.21-150400.24.21.2.aarch64",
            "openSUSE Leap 15.4:gfs2-kmp-default-5.14.21-150400.24.21.2.ppc64le",
            "openSUSE Leap 15.4:gfs2-kmp-default-5.14.21-150400.24.21.2.s390x",
            "openSUSE Leap 15.4:gfs2-kmp-default-5.14.21-150400.24.21.2.x86_64",
            "openSUSE Leap 15.4:kernel-64kb-5.14.21-150400.24.21.2.aarch64",
            "openSUSE Leap 15.4:kernel-64kb-devel-5.14.21-150400.24.21.2.aarch64",
            "openSUSE Leap 15.4:kernel-64kb-extra-5.14.21-150400.24.21.2.aarch64",
            "openSUSE Leap 15.4:kernel-64kb-livepatch-devel-5.14.21-150400.24.21.2.aarch64",
            "openSUSE Leap 15.4:kernel-64kb-optional-5.14.21-150400.24.21.2.aarch64",
            "openSUSE Leap 15.4:kernel-debug-5.14.21-150400.24.21.2.ppc64le",
            "openSUSE Leap 15.4:kernel-debug-5.14.21-150400.24.21.2.x86_64",
            "openSUSE Leap 15.4:kernel-debug-devel-5.14.21-150400.24.21.2.ppc64le",
            "openSUSE Leap 15.4:kernel-debug-devel-5.14.21-150400.24.21.2.x86_64",
            "openSUSE Leap 15.4:kernel-debug-livepatch-devel-5.14.21-150400.24.21.2.ppc64le",
            "openSUSE Leap 15.4:kernel-debug-livepatch-devel-5.14.21-150400.24.21.2.x86_64",
            "openSUSE Leap 15.4:kernel-default-5.14.21-150400.24.21.2.aarch64",
            "openSUSE Leap 15.4:kernel-default-5.14.21-150400.24.21.2.ppc64le",
            "openSUSE Leap 15.4:kernel-default-5.14.21-150400.24.21.2.s390x",
            "openSUSE Leap 15.4:kernel-default-5.14.21-150400.24.21.2.x86_64",
            "openSUSE Leap 15.4:kernel-default-base-5.14.21-150400.24.21.2.150400.24.7.2.aarch64",
            "openSUSE Leap 15.4:kernel-default-base-5.14.21-150400.24.21.2.150400.24.7.2.ppc64le",
            "openSUSE Leap 15.4:kernel-default-base-5.14.21-150400.24.21.2.150400.24.7.2.s390x",
            "openSUSE Leap 15.4:kernel-default-base-5.14.21-150400.24.21.2.150400.24.7.2.x86_64",
            "openSUSE Leap 15.4:kernel-default-base-rebuild-5.14.21-150400.24.21.2.150400.24.7.2.aarch64",
            "openSUSE Leap 15.4:kernel-default-base-rebuild-5.14.21-150400.24.21.2.150400.24.7.2.ppc64le",
            "openSUSE Leap 15.4:kernel-default-base-rebuild-5.14.21-150400.24.21.2.150400.24.7.2.s390x",
            "openSUSE Leap 15.4:kernel-default-base-rebuild-5.14.21-150400.24.21.2.150400.24.7.2.x86_64",
            "openSUSE Leap 15.4:kernel-default-devel-5.14.21-150400.24.21.2.aarch64",
            "openSUSE Leap 15.4:kernel-default-devel-5.14.21-150400.24.21.2.ppc64le",
            "openSUSE Leap 15.4:kernel-default-devel-5.14.21-150400.24.21.2.s390x",
            "openSUSE Leap 15.4:kernel-default-devel-5.14.21-150400.24.21.2.x86_64",
            "openSUSE Leap 15.4:kernel-default-extra-5.14.21-150400.24.21.2.aarch64",
            "openSUSE Leap 15.4:kernel-default-extra-5.14.21-150400.24.21.2.ppc64le",
            "openSUSE Leap 15.4:kernel-default-extra-5.14.21-150400.24.21.2.s390x",
            "openSUSE Leap 15.4:kernel-default-extra-5.14.21-150400.24.21.2.x86_64",
            "openSUSE Leap 15.4:kernel-default-livepatch-5.14.21-150400.24.21.2.aarch64",
            "openSUSE Leap 15.4:kernel-default-livepatch-5.14.21-150400.24.21.2.ppc64le",
            "openSUSE Leap 15.4:kernel-default-livepatch-5.14.21-150400.24.21.2.s390x",
            "openSUSE Leap 15.4:kernel-default-livepatch-5.14.21-150400.24.21.2.x86_64",
            "openSUSE Leap 15.4:kernel-default-livepatch-devel-5.14.21-150400.24.21.2.aarch64",
            "openSUSE Leap 15.4:kernel-default-livepatch-devel-5.14.21-150400.24.21.2.ppc64le",
            "openSUSE Leap 15.4:kernel-default-livepatch-devel-5.14.21-150400.24.21.2.s390x",
            "openSUSE Leap 15.4:kernel-default-livepatch-devel-5.14.21-150400.24.21.2.x86_64",
            "openSUSE Leap 15.4:kernel-default-optional-5.14.21-150400.24.21.2.aarch64",
            "openSUSE Leap 15.4:kernel-default-optional-5.14.21-150400.24.21.2.ppc64le",
            "openSUSE Leap 15.4:kernel-default-optional-5.14.21-150400.24.21.2.s390x",
            "openSUSE Leap 15.4:kernel-default-optional-5.14.21-150400.24.21.2.x86_64",
            "openSUSE Leap 15.4:kernel-devel-5.14.21-150400.24.21.2.noarch",
            "openSUSE Leap 15.4:kernel-docs-5.14.21-150400.24.21.3.noarch",
            "openSUSE Leap 15.4:kernel-docs-html-5.14.21-150400.24.21.3.noarch",
            "openSUSE Leap 15.4:kernel-kvmsmall-5.14.21-150400.24.21.2.aarch64",
            "openSUSE Leap 15.4:kernel-kvmsmall-5.14.21-150400.24.21.2.ppc64le",
            "openSUSE Leap 15.4:kernel-kvmsmall-5.14.21-150400.24.21.2.x86_64",
            "openSUSE Leap 15.4:kernel-kvmsmall-devel-5.14.21-150400.24.21.2.aarch64",
            "openSUSE Leap 15.4:kernel-kvmsmall-devel-5.14.21-150400.24.21.2.ppc64le",
            "openSUSE Leap 15.4:kernel-kvmsmall-devel-5.14.21-150400.24.21.2.x86_64",
            "openSUSE Leap 15.4:kernel-kvmsmall-livepatch-devel-5.14.21-150400.24.21.2.aarch64",
            "openSUSE Leap 15.4:kernel-kvmsmall-livepatch-devel-5.14.21-150400.24.21.2.ppc64le",
            "openSUSE Leap 15.4:kernel-kvmsmall-livepatch-devel-5.14.21-150400.24.21.2.x86_64",
            "openSUSE Leap 15.4:kernel-macros-5.14.21-150400.24.21.2.noarch",
            "openSUSE Leap 15.4:kernel-obs-build-5.14.21-150400.24.21.2.aarch64",
            "openSUSE Leap 15.4:kernel-obs-build-5.14.21-150400.24.21.2.ppc64le",
            "openSUSE Leap 15.4:kernel-obs-build-5.14.21-150400.24.21.2.s390x",
            "openSUSE Leap 15.4:kernel-obs-build-5.14.21-150400.24.21.2.x86_64",
            "openSUSE Leap 15.4:kernel-obs-qa-5.14.21-150400.24.21.1.aarch64",
            "openSUSE Leap 15.4:kernel-obs-qa-5.14.21-150400.24.21.1.ppc64le",
            "openSUSE Leap 15.4:kernel-obs-qa-5.14.21-150400.24.21.1.s390x",
            "openSUSE Leap 15.4:kernel-obs-qa-5.14.21-150400.24.21.1.x86_64",
            "openSUSE Leap 15.4:kernel-source-5.14.21-150400.24.21.2.noarch",
            "openSUSE Leap 15.4:kernel-source-vanilla-5.14.21-150400.24.21.2.noarch",
            "openSUSE Leap 15.4:kernel-syms-5.14.21-150400.24.21.1.aarch64",
            "openSUSE Leap 15.4:kernel-syms-5.14.21-150400.24.21.1.ppc64le",
            "openSUSE Leap 15.4:kernel-syms-5.14.21-150400.24.21.1.s390x",
            "openSUSE Leap 15.4:kernel-syms-5.14.21-150400.24.21.1.x86_64",
            "openSUSE Leap 15.4:kernel-zfcpdump-5.14.21-150400.24.21.2.s390x",
            "openSUSE Leap 15.4:kselftests-kmp-64kb-5.14.21-150400.24.21.2.aarch64",
            "openSUSE Leap 15.4:kselftests-kmp-default-5.14.21-150400.24.21.2.aarch64",
            "openSUSE Leap 15.4:kselftests-kmp-default-5.14.21-150400.24.21.2.ppc64le",
            "openSUSE Leap 15.4:kselftests-kmp-default-5.14.21-150400.24.21.2.s390x",
            "openSUSE Leap 15.4:kselftests-kmp-default-5.14.21-150400.24.21.2.x86_64",
            "openSUSE Leap 15.4:ocfs2-kmp-64kb-5.14.21-150400.24.21.2.aarch64",
            "openSUSE Leap 15.4:ocfs2-kmp-default-5.14.21-150400.24.21.2.aarch64",
            "openSUSE Leap 15.4:ocfs2-kmp-default-5.14.21-150400.24.21.2.ppc64le",
            "openSUSE Leap 15.4:ocfs2-kmp-default-5.14.21-150400.24.21.2.s390x",
            "openSUSE Leap 15.4:ocfs2-kmp-default-5.14.21-150400.24.21.2.x86_64",
            "openSUSE Leap 15.4:reiserfs-kmp-64kb-5.14.21-150400.24.21.2.aarch64",
            "openSUSE Leap 15.4:reiserfs-kmp-default-5.14.21-150400.24.21.2.aarch64",
            "openSUSE Leap 15.4:reiserfs-kmp-default-5.14.21-150400.24.21.2.ppc64le",
            "openSUSE Leap 15.4:reiserfs-kmp-default-5.14.21-150400.24.21.2.s390x",
            "openSUSE Leap 15.4:reiserfs-kmp-default-5.14.21-150400.24.21.2.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2022-09-16T15:30:19Z",
          "details": "moderate"
        }
      ],
      "title": "CVE-2021-33135"
    },
    {
      "cve": "CVE-2021-4037",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2021-4037"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "A vulnerability was found in the fs/inode.c:inode_init_owner() function logic of the LInux kernel that allows local users to create files for the XFS file-system with an unintended group ownership and with group execution and SGID permission bits set, in a scenario where a directory is SGID and belongs to a certain group and is writable by a user who is not a member of this group. This can lead to excessive permissions granted in case when they should not. This vulnerability is similar to the previous CVE-2018-13405 and adds the missed fix for the XFS.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.21.2.aarch64",
          "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.21.2.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.21.2.s390x",
          "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.21.2.x86_64",
          "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.21.2.aarch64",
          "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.21.2.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.21.2.s390x",
          "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.21.2.x86_64",
          "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.21.2.aarch64",
          "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.21.2.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.21.2.s390x",
          "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.21.2.x86_64",
          "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.21.2.aarch64",
          "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.21.2.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.21.2.s390x",
          "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.21.2.x86_64",
          "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.21.2.ppc64le",
          "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.21.2.s390x",
          "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.21.2.x86_64",
          "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.21.2.ppc64le",
          "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.21.2.s390x",
          "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.21.2.x86_64",
          "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_21-default-1-150400.9.3.2.ppc64le",
          "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_21-default-1-150400.9.3.2.s390x",
          "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_21-default-1-150400.9.3.2.x86_64",
          "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-64kb-5.14.21-150400.24.21.2.aarch64",
          "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-64kb-devel-5.14.21-150400.24.21.2.aarch64",
          "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-5.14.21-150400.24.21.2.aarch64",
          "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-5.14.21-150400.24.21.2.ppc64le",
          "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-5.14.21-150400.24.21.2.s390x",
          "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-5.14.21-150400.24.21.2.x86_64",
          "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-base-5.14.21-150400.24.21.2.150400.24.7.2.aarch64",
          "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-base-5.14.21-150400.24.21.2.150400.24.7.2.ppc64le",
          "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-base-5.14.21-150400.24.21.2.150400.24.7.2.s390x",
          "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-base-5.14.21-150400.24.21.2.150400.24.7.2.x86_64",
          "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-devel-5.14.21-150400.24.21.2.aarch64",
          "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-devel-5.14.21-150400.24.21.2.ppc64le",
          "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-devel-5.14.21-150400.24.21.2.s390x",
          "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-devel-5.14.21-150400.24.21.2.x86_64",
          "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-devel-5.14.21-150400.24.21.2.noarch",
          "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-macros-5.14.21-150400.24.21.2.noarch",
          "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-zfcpdump-5.14.21-150400.24.21.2.s390x",
          "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-docs-5.14.21-150400.24.21.3.noarch",
          "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-obs-build-5.14.21-150400.24.21.2.aarch64",
          "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-obs-build-5.14.21-150400.24.21.2.ppc64le",
          "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-obs-build-5.14.21-150400.24.21.2.s390x",
          "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-obs-build-5.14.21-150400.24.21.2.x86_64",
          "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-source-5.14.21-150400.24.21.2.noarch",
          "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-syms-5.14.21-150400.24.21.1.aarch64",
          "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-syms-5.14.21-150400.24.21.1.ppc64le",
          "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-syms-5.14.21-150400.24.21.1.s390x",
          "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-syms-5.14.21-150400.24.21.1.x86_64",
          "SUSE Linux Enterprise Module for Legacy 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.21.2.aarch64",
          "SUSE Linux Enterprise Module for Legacy 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.21.2.ppc64le",
          "SUSE Linux Enterprise Module for Legacy 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.21.2.s390x",
          "SUSE Linux Enterprise Module for Legacy 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.21.2.x86_64",
          "SUSE Linux Enterprise Workstation Extension 15 SP4:kernel-default-extra-5.14.21-150400.24.21.2.x86_64",
          "openSUSE Leap 15.4:cluster-md-kmp-64kb-5.14.21-150400.24.21.2.aarch64",
          "openSUSE Leap 15.4:cluster-md-kmp-default-5.14.21-150400.24.21.2.aarch64",
          "openSUSE Leap 15.4:cluster-md-kmp-default-5.14.21-150400.24.21.2.ppc64le",
          "openSUSE Leap 15.4:cluster-md-kmp-default-5.14.21-150400.24.21.2.s390x",
          "openSUSE Leap 15.4:cluster-md-kmp-default-5.14.21-150400.24.21.2.x86_64",
          "openSUSE Leap 15.4:dlm-kmp-64kb-5.14.21-150400.24.21.2.aarch64",
          "openSUSE Leap 15.4:dlm-kmp-default-5.14.21-150400.24.21.2.aarch64",
          "openSUSE Leap 15.4:dlm-kmp-default-5.14.21-150400.24.21.2.ppc64le",
          "openSUSE Leap 15.4:dlm-kmp-default-5.14.21-150400.24.21.2.s390x",
          "openSUSE Leap 15.4:dlm-kmp-default-5.14.21-150400.24.21.2.x86_64",
          "openSUSE Leap 15.4:dtb-allwinner-5.14.21-150400.24.21.1.aarch64",
          "openSUSE Leap 15.4:dtb-altera-5.14.21-150400.24.21.1.aarch64",
          "openSUSE Leap 15.4:dtb-amazon-5.14.21-150400.24.21.1.aarch64",
          "openSUSE Leap 15.4:dtb-amd-5.14.21-150400.24.21.1.aarch64",
          "openSUSE Leap 15.4:dtb-amlogic-5.14.21-150400.24.21.1.aarch64",
          "openSUSE Leap 15.4:dtb-apm-5.14.21-150400.24.21.1.aarch64",
          "openSUSE Leap 15.4:dtb-apple-5.14.21-150400.24.21.1.aarch64",
          "openSUSE Leap 15.4:dtb-arm-5.14.21-150400.24.21.1.aarch64",
          "openSUSE Leap 15.4:dtb-broadcom-5.14.21-150400.24.21.1.aarch64",
          "openSUSE Leap 15.4:dtb-cavium-5.14.21-150400.24.21.1.aarch64",
          "openSUSE Leap 15.4:dtb-exynos-5.14.21-150400.24.21.1.aarch64",
          "openSUSE Leap 15.4:dtb-freescale-5.14.21-150400.24.21.1.aarch64",
          "openSUSE Leap 15.4:dtb-hisilicon-5.14.21-150400.24.21.1.aarch64",
          "openSUSE Leap 15.4:dtb-lg-5.14.21-150400.24.21.1.aarch64",
          "openSUSE Leap 15.4:dtb-marvell-5.14.21-150400.24.21.1.aarch64",
          "openSUSE Leap 15.4:dtb-mediatek-5.14.21-150400.24.21.1.aarch64",
          "openSUSE Leap 15.4:dtb-nvidia-5.14.21-150400.24.21.1.aarch64",
          "openSUSE Leap 15.4:dtb-qcom-5.14.21-150400.24.21.1.aarch64",
          "openSUSE Leap 15.4:dtb-renesas-5.14.21-150400.24.21.1.aarch64",
          "openSUSE Leap 15.4:dtb-rockchip-5.14.21-150400.24.21.1.aarch64",
          "openSUSE Leap 15.4:dtb-socionext-5.14.21-150400.24.21.1.aarch64",
          "openSUSE Leap 15.4:dtb-sprd-5.14.21-150400.24.21.1.aarch64",
          "openSUSE Leap 15.4:dtb-xilinx-5.14.21-150400.24.21.1.aarch64",
          "openSUSE Leap 15.4:gfs2-kmp-64kb-5.14.21-150400.24.21.2.aarch64",
          "openSUSE Leap 15.4:gfs2-kmp-default-5.14.21-150400.24.21.2.aarch64",
          "openSUSE Leap 15.4:gfs2-kmp-default-5.14.21-150400.24.21.2.ppc64le",
          "openSUSE Leap 15.4:gfs2-kmp-default-5.14.21-150400.24.21.2.s390x",
          "openSUSE Leap 15.4:gfs2-kmp-default-5.14.21-150400.24.21.2.x86_64",
          "openSUSE Leap 15.4:kernel-64kb-5.14.21-150400.24.21.2.aarch64",
          "openSUSE Leap 15.4:kernel-64kb-devel-5.14.21-150400.24.21.2.aarch64",
          "openSUSE Leap 15.4:kernel-64kb-extra-5.14.21-150400.24.21.2.aarch64",
          "openSUSE Leap 15.4:kernel-64kb-livepatch-devel-5.14.21-150400.24.21.2.aarch64",
          "openSUSE Leap 15.4:kernel-64kb-optional-5.14.21-150400.24.21.2.aarch64",
          "openSUSE Leap 15.4:kernel-debug-5.14.21-150400.24.21.2.ppc64le",
          "openSUSE Leap 15.4:kernel-debug-5.14.21-150400.24.21.2.x86_64",
          "openSUSE Leap 15.4:kernel-debug-devel-5.14.21-150400.24.21.2.ppc64le",
          "openSUSE Leap 15.4:kernel-debug-devel-5.14.21-150400.24.21.2.x86_64",
          "openSUSE Leap 15.4:kernel-debug-livepatch-devel-5.14.21-150400.24.21.2.ppc64le",
          "openSUSE Leap 15.4:kernel-debug-livepatch-devel-5.14.21-150400.24.21.2.x86_64",
          "openSUSE Leap 15.4:kernel-default-5.14.21-150400.24.21.2.aarch64",
          "openSUSE Leap 15.4:kernel-default-5.14.21-150400.24.21.2.ppc64le",
          "openSUSE Leap 15.4:kernel-default-5.14.21-150400.24.21.2.s390x",
          "openSUSE Leap 15.4:kernel-default-5.14.21-150400.24.21.2.x86_64",
          "openSUSE Leap 15.4:kernel-default-base-5.14.21-150400.24.21.2.150400.24.7.2.aarch64",
          "openSUSE Leap 15.4:kernel-default-base-5.14.21-150400.24.21.2.150400.24.7.2.ppc64le",
          "openSUSE Leap 15.4:kernel-default-base-5.14.21-150400.24.21.2.150400.24.7.2.s390x",
          "openSUSE Leap 15.4:kernel-default-base-5.14.21-150400.24.21.2.150400.24.7.2.x86_64",
          "openSUSE Leap 15.4:kernel-default-base-rebuild-5.14.21-150400.24.21.2.150400.24.7.2.aarch64",
          "openSUSE Leap 15.4:kernel-default-base-rebuild-5.14.21-150400.24.21.2.150400.24.7.2.ppc64le",
          "openSUSE Leap 15.4:kernel-default-base-rebuild-5.14.21-150400.24.21.2.150400.24.7.2.s390x",
          "openSUSE Leap 15.4:kernel-default-base-rebuild-5.14.21-150400.24.21.2.150400.24.7.2.x86_64",
          "openSUSE Leap 15.4:kernel-default-devel-5.14.21-150400.24.21.2.aarch64",
          "openSUSE Leap 15.4:kernel-default-devel-5.14.21-150400.24.21.2.ppc64le",
          "openSUSE Leap 15.4:kernel-default-devel-5.14.21-150400.24.21.2.s390x",
          "openSUSE Leap 15.4:kernel-default-devel-5.14.21-150400.24.21.2.x86_64",
          "openSUSE Leap 15.4:kernel-default-extra-5.14.21-150400.24.21.2.aarch64",
          "openSUSE Leap 15.4:kernel-default-extra-5.14.21-150400.24.21.2.ppc64le",
          "openSUSE Leap 15.4:kernel-default-extra-5.14.21-150400.24.21.2.s390x",
          "openSUSE Leap 15.4:kernel-default-extra-5.14.21-150400.24.21.2.x86_64",
          "openSUSE Leap 15.4:kernel-default-livepatch-5.14.21-150400.24.21.2.aarch64",
          "openSUSE Leap 15.4:kernel-default-livepatch-5.14.21-150400.24.21.2.ppc64le",
          "openSUSE Leap 15.4:kernel-default-livepatch-5.14.21-150400.24.21.2.s390x",
          "openSUSE Leap 15.4:kernel-default-livepatch-5.14.21-150400.24.21.2.x86_64",
          "openSUSE Leap 15.4:kernel-default-livepatch-devel-5.14.21-150400.24.21.2.aarch64",
          "openSUSE Leap 15.4:kernel-default-livepatch-devel-5.14.21-150400.24.21.2.ppc64le",
          "openSUSE Leap 15.4:kernel-default-livepatch-devel-5.14.21-150400.24.21.2.s390x",
          "openSUSE Leap 15.4:kernel-default-livepatch-devel-5.14.21-150400.24.21.2.x86_64",
          "openSUSE Leap 15.4:kernel-default-optional-5.14.21-150400.24.21.2.aarch64",
          "openSUSE Leap 15.4:kernel-default-optional-5.14.21-150400.24.21.2.ppc64le",
          "openSUSE Leap 15.4:kernel-default-optional-5.14.21-150400.24.21.2.s390x",
          "openSUSE Leap 15.4:kernel-default-optional-5.14.21-150400.24.21.2.x86_64",
          "openSUSE Leap 15.4:kernel-devel-5.14.21-150400.24.21.2.noarch",
          "openSUSE Leap 15.4:kernel-docs-5.14.21-150400.24.21.3.noarch",
          "openSUSE Leap 15.4:kernel-docs-html-5.14.21-150400.24.21.3.noarch",
          "openSUSE Leap 15.4:kernel-kvmsmall-5.14.21-150400.24.21.2.aarch64",
          "openSUSE Leap 15.4:kernel-kvmsmall-5.14.21-150400.24.21.2.ppc64le",
          "openSUSE Leap 15.4:kernel-kvmsmall-5.14.21-150400.24.21.2.x86_64",
          "openSUSE Leap 15.4:kernel-kvmsmall-devel-5.14.21-150400.24.21.2.aarch64",
          "openSUSE Leap 15.4:kernel-kvmsmall-devel-5.14.21-150400.24.21.2.ppc64le",
          "openSUSE Leap 15.4:kernel-kvmsmall-devel-5.14.21-150400.24.21.2.x86_64",
          "openSUSE Leap 15.4:kernel-kvmsmall-livepatch-devel-5.14.21-150400.24.21.2.aarch64",
          "openSUSE Leap 15.4:kernel-kvmsmall-livepatch-devel-5.14.21-150400.24.21.2.ppc64le",
          "openSUSE Leap 15.4:kernel-kvmsmall-livepatch-devel-5.14.21-150400.24.21.2.x86_64",
          "openSUSE Leap 15.4:kernel-macros-5.14.21-150400.24.21.2.noarch",
          "openSUSE Leap 15.4:kernel-obs-build-5.14.21-150400.24.21.2.aarch64",
          "openSUSE Leap 15.4:kernel-obs-build-5.14.21-150400.24.21.2.ppc64le",
          "openSUSE Leap 15.4:kernel-obs-build-5.14.21-150400.24.21.2.s390x",
          "openSUSE Leap 15.4:kernel-obs-build-5.14.21-150400.24.21.2.x86_64",
          "openSUSE Leap 15.4:kernel-obs-qa-5.14.21-150400.24.21.1.aarch64",
          "openSUSE Leap 15.4:kernel-obs-qa-5.14.21-150400.24.21.1.ppc64le",
          "openSUSE Leap 15.4:kernel-obs-qa-5.14.21-150400.24.21.1.s390x",
          "openSUSE Leap 15.4:kernel-obs-qa-5.14.21-150400.24.21.1.x86_64",
          "openSUSE Leap 15.4:kernel-source-5.14.21-150400.24.21.2.noarch",
          "openSUSE Leap 15.4:kernel-source-vanilla-5.14.21-150400.24.21.2.noarch",
          "openSUSE Leap 15.4:kernel-syms-5.14.21-150400.24.21.1.aarch64",
          "openSUSE Leap 15.4:kernel-syms-5.14.21-150400.24.21.1.ppc64le",
          "openSUSE Leap 15.4:kernel-syms-5.14.21-150400.24.21.1.s390x",
          "openSUSE Leap 15.4:kernel-syms-5.14.21-150400.24.21.1.x86_64",
          "openSUSE Leap 15.4:kernel-zfcpdump-5.14.21-150400.24.21.2.s390x",
          "openSUSE Leap 15.4:kselftests-kmp-64kb-5.14.21-150400.24.21.2.aarch64",
          "openSUSE Leap 15.4:kselftests-kmp-default-5.14.21-150400.24.21.2.aarch64",
          "openSUSE Leap 15.4:kselftests-kmp-default-5.14.21-150400.24.21.2.ppc64le",
          "openSUSE Leap 15.4:kselftests-kmp-default-5.14.21-150400.24.21.2.s390x",
          "openSUSE Leap 15.4:kselftests-kmp-default-5.14.21-150400.24.21.2.x86_64",
          "openSUSE Leap 15.4:ocfs2-kmp-64kb-5.14.21-150400.24.21.2.aarch64",
          "openSUSE Leap 15.4:ocfs2-kmp-default-5.14.21-150400.24.21.2.aarch64",
          "openSUSE Leap 15.4:ocfs2-kmp-default-5.14.21-150400.24.21.2.ppc64le",
          "openSUSE Leap 15.4:ocfs2-kmp-default-5.14.21-150400.24.21.2.s390x",
          "openSUSE Leap 15.4:ocfs2-kmp-default-5.14.21-150400.24.21.2.x86_64",
          "openSUSE Leap 15.4:reiserfs-kmp-64kb-5.14.21-150400.24.21.2.aarch64",
          "openSUSE Leap 15.4:reiserfs-kmp-default-5.14.21-150400.24.21.2.aarch64",
          "openSUSE Leap 15.4:reiserfs-kmp-default-5.14.21-150400.24.21.2.ppc64le",
          "openSUSE Leap 15.4:reiserfs-kmp-default-5.14.21-150400.24.21.2.s390x",
          "openSUSE Leap 15.4:reiserfs-kmp-default-5.14.21-150400.24.21.2.x86_64"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2021-4037",
          "url": "https://www.suse.com/security/cve/CVE-2021-4037"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1198702 for CVE-2021-4037",
          "url": "https://bugzilla.suse.com/1198702"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.21.2.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.21.2.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.21.2.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.21.2.x86_64",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.21.2.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.21.2.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.21.2.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.21.2.x86_64",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.21.2.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.21.2.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.21.2.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.21.2.x86_64",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.21.2.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.21.2.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.21.2.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.21.2.x86_64",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.21.2.ppc64le",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.21.2.s390x",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.21.2.x86_64",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.21.2.ppc64le",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.21.2.s390x",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.21.2.x86_64",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_21-default-1-150400.9.3.2.ppc64le",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_21-default-1-150400.9.3.2.s390x",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_21-default-1-150400.9.3.2.x86_64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-64kb-5.14.21-150400.24.21.2.aarch64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-64kb-devel-5.14.21-150400.24.21.2.aarch64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-5.14.21-150400.24.21.2.aarch64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-5.14.21-150400.24.21.2.ppc64le",
            "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-5.14.21-150400.24.21.2.s390x",
            "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-5.14.21-150400.24.21.2.x86_64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-base-5.14.21-150400.24.21.2.150400.24.7.2.aarch64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-base-5.14.21-150400.24.21.2.150400.24.7.2.ppc64le",
            "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-base-5.14.21-150400.24.21.2.150400.24.7.2.s390x",
            "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-base-5.14.21-150400.24.21.2.150400.24.7.2.x86_64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-devel-5.14.21-150400.24.21.2.aarch64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-devel-5.14.21-150400.24.21.2.ppc64le",
            "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-devel-5.14.21-150400.24.21.2.s390x",
            "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-devel-5.14.21-150400.24.21.2.x86_64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-devel-5.14.21-150400.24.21.2.noarch",
            "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-macros-5.14.21-150400.24.21.2.noarch",
            "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-zfcpdump-5.14.21-150400.24.21.2.s390x",
            "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-docs-5.14.21-150400.24.21.3.noarch",
            "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-obs-build-5.14.21-150400.24.21.2.aarch64",
            "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-obs-build-5.14.21-150400.24.21.2.ppc64le",
            "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-obs-build-5.14.21-150400.24.21.2.s390x",
            "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-obs-build-5.14.21-150400.24.21.2.x86_64",
            "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-source-5.14.21-150400.24.21.2.noarch",
            "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-syms-5.14.21-150400.24.21.1.aarch64",
            "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-syms-5.14.21-150400.24.21.1.ppc64le",
            "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-syms-5.14.21-150400.24.21.1.s390x",
            "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-syms-5.14.21-150400.24.21.1.x86_64",
            "SUSE Linux Enterprise Module for Legacy 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.21.2.aarch64",
            "SUSE Linux Enterprise Module for Legacy 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.21.2.ppc64le",
            "SUSE Linux Enterprise Module for Legacy 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.21.2.s390x",
            "SUSE Linux Enterprise Module for Legacy 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.21.2.x86_64",
            "SUSE Linux Enterprise Workstation Extension 15 SP4:kernel-default-extra-5.14.21-150400.24.21.2.x86_64",
            "openSUSE Leap 15.4:cluster-md-kmp-64kb-5.14.21-150400.24.21.2.aarch64",
            "openSUSE Leap 15.4:cluster-md-kmp-default-5.14.21-150400.24.21.2.aarch64",
            "openSUSE Leap 15.4:cluster-md-kmp-default-5.14.21-150400.24.21.2.ppc64le",
            "openSUSE Leap 15.4:cluster-md-kmp-default-5.14.21-150400.24.21.2.s390x",
            "openSUSE Leap 15.4:cluster-md-kmp-default-5.14.21-150400.24.21.2.x86_64",
            "openSUSE Leap 15.4:dlm-kmp-64kb-5.14.21-150400.24.21.2.aarch64",
            "openSUSE Leap 15.4:dlm-kmp-default-5.14.21-150400.24.21.2.aarch64",
            "openSUSE Leap 15.4:dlm-kmp-default-5.14.21-150400.24.21.2.ppc64le",
            "openSUSE Leap 15.4:dlm-kmp-default-5.14.21-150400.24.21.2.s390x",
            "openSUSE Leap 15.4:dlm-kmp-default-5.14.21-150400.24.21.2.x86_64",
            "openSUSE Leap 15.4:dtb-allwinner-5.14.21-150400.24.21.1.aarch64",
            "openSUSE Leap 15.4:dtb-altera-5.14.21-150400.24.21.1.aarch64",
            "openSUSE Leap 15.4:dtb-amazon-5.14.21-150400.24.21.1.aarch64",
            "openSUSE Leap 15.4:dtb-amd-5.14.21-150400.24.21.1.aarch64",
            "openSUSE Leap 15.4:dtb-amlogic-5.14.21-150400.24.21.1.aarch64",
            "openSUSE Leap 15.4:dtb-apm-5.14.21-150400.24.21.1.aarch64",
            "openSUSE Leap 15.4:dtb-apple-5.14.21-150400.24.21.1.aarch64",
            "openSUSE Leap 15.4:dtb-arm-5.14.21-150400.24.21.1.aarch64",
            "openSUSE Leap 15.4:dtb-broadcom-5.14.21-150400.24.21.1.aarch64",
            "openSUSE Leap 15.4:dtb-cavium-5.14.21-150400.24.21.1.aarch64",
            "openSUSE Leap 15.4:dtb-exynos-5.14.21-150400.24.21.1.aarch64",
            "openSUSE Leap 15.4:dtb-freescale-5.14.21-150400.24.21.1.aarch64",
            "openSUSE Leap 15.4:dtb-hisilicon-5.14.21-150400.24.21.1.aarch64",
            "openSUSE Leap 15.4:dtb-lg-5.14.21-150400.24.21.1.aarch64",
            "openSUSE Leap 15.4:dtb-marvell-5.14.21-150400.24.21.1.aarch64",
            "openSUSE Leap 15.4:dtb-mediatek-5.14.21-150400.24.21.1.aarch64",
            "openSUSE Leap 15.4:dtb-nvidia-5.14.21-150400.24.21.1.aarch64",
            "openSUSE Leap 15.4:dtb-qcom-5.14.21-150400.24.21.1.aarch64",
            "openSUSE Leap 15.4:dtb-renesas-5.14.21-150400.24.21.1.aarch64",
            "openSUSE Leap 15.4:dtb-rockchip-5.14.21-150400.24.21.1.aarch64",
            "openSUSE Leap 15.4:dtb-socionext-5.14.21-150400.24.21.1.aarch64",
            "openSUSE Leap 15.4:dtb-sprd-5.14.21-150400.24.21.1.aarch64",
            "openSUSE Leap 15.4:dtb-xilinx-5.14.21-150400.24.21.1.aarch64",
            "openSUSE Leap 15.4:gfs2-kmp-64kb-5.14.21-150400.24.21.2.aarch64",
            "openSUSE Leap 15.4:gfs2-kmp-default-5.14.21-150400.24.21.2.aarch64",
            "openSUSE Leap 15.4:gfs2-kmp-default-5.14.21-150400.24.21.2.ppc64le",
            "openSUSE Leap 15.4:gfs2-kmp-default-5.14.21-150400.24.21.2.s390x",
            "openSUSE Leap 15.4:gfs2-kmp-default-5.14.21-150400.24.21.2.x86_64",
            "openSUSE Leap 15.4:kernel-64kb-5.14.21-150400.24.21.2.aarch64",
            "openSUSE Leap 15.4:kernel-64kb-devel-5.14.21-150400.24.21.2.aarch64",
            "openSUSE Leap 15.4:kernel-64kb-extra-5.14.21-150400.24.21.2.aarch64",
            "openSUSE Leap 15.4:kernel-64kb-livepatch-devel-5.14.21-150400.24.21.2.aarch64",
            "openSUSE Leap 15.4:kernel-64kb-optional-5.14.21-150400.24.21.2.aarch64",
            "openSUSE Leap 15.4:kernel-debug-5.14.21-150400.24.21.2.ppc64le",
            "openSUSE Leap 15.4:kernel-debug-5.14.21-150400.24.21.2.x86_64",
            "openSUSE Leap 15.4:kernel-debug-devel-5.14.21-150400.24.21.2.ppc64le",
            "openSUSE Leap 15.4:kernel-debug-devel-5.14.21-150400.24.21.2.x86_64",
            "openSUSE Leap 15.4:kernel-debug-livepatch-devel-5.14.21-150400.24.21.2.ppc64le",
            "openSUSE Leap 15.4:kernel-debug-livepatch-devel-5.14.21-150400.24.21.2.x86_64",
            "openSUSE Leap 15.4:kernel-default-5.14.21-150400.24.21.2.aarch64",
            "openSUSE Leap 15.4:kernel-default-5.14.21-150400.24.21.2.ppc64le",
            "openSUSE Leap 15.4:kernel-default-5.14.21-150400.24.21.2.s390x",
            "openSUSE Leap 15.4:kernel-default-5.14.21-150400.24.21.2.x86_64",
            "openSUSE Leap 15.4:kernel-default-base-5.14.21-150400.24.21.2.150400.24.7.2.aarch64",
            "openSUSE Leap 15.4:kernel-default-base-5.14.21-150400.24.21.2.150400.24.7.2.ppc64le",
            "openSUSE Leap 15.4:kernel-default-base-5.14.21-150400.24.21.2.150400.24.7.2.s390x",
            "openSUSE Leap 15.4:kernel-default-base-5.14.21-150400.24.21.2.150400.24.7.2.x86_64",
            "openSUSE Leap 15.4:kernel-default-base-rebuild-5.14.21-150400.24.21.2.150400.24.7.2.aarch64",
            "openSUSE Leap 15.4:kernel-default-base-rebuild-5.14.21-150400.24.21.2.150400.24.7.2.ppc64le",
            "openSUSE Leap 15.4:kernel-default-base-rebuild-5.14.21-150400.24.21.2.150400.24.7.2.s390x",
            "openSUSE Leap 15.4:kernel-default-base-rebuild-5.14.21-150400.24.21.2.150400.24.7.2.x86_64",
            "openSUSE Leap 15.4:kernel-default-devel-5.14.21-150400.24.21.2.aarch64",
            "openSUSE Leap 15.4:kernel-default-devel-5.14.21-150400.24.21.2.ppc64le",
            "openSUSE Leap 15.4:kernel-default-devel-5.14.21-150400.24.21.2.s390x",
            "openSUSE Leap 15.4:kernel-default-devel-5.14.21-150400.24.21.2.x86_64",
            "openSUSE Leap 15.4:kernel-default-extra-5.14.21-150400.24.21.2.aarch64",
            "openSUSE Leap 15.4:kernel-default-extra-5.14.21-150400.24.21.2.ppc64le",
            "openSUSE Leap 15.4:kernel-default-extra-5.14.21-150400.24.21.2.s390x",
            "openSUSE Leap 15.4:kernel-default-extra-5.14.21-150400.24.21.2.x86_64",
            "openSUSE Leap 15.4:kernel-default-livepatch-5.14.21-150400.24.21.2.aarch64",
            "openSUSE Leap 15.4:kernel-default-livepatch-5.14.21-150400.24.21.2.ppc64le",
            "openSUSE Leap 15.4:kernel-default-livepatch-5.14.21-150400.24.21.2.s390x",
            "openSUSE Leap 15.4:kernel-default-livepatch-5.14.21-150400.24.21.2.x86_64",
            "openSUSE Leap 15.4:kernel-default-livepatch-devel-5.14.21-150400.24.21.2.aarch64",
            "openSUSE Leap 15.4:kernel-default-livepatch-devel-5.14.21-150400.24.21.2.ppc64le",
            "openSUSE Leap 15.4:kernel-default-livepatch-devel-5.14.21-150400.24.21.2.s390x",
            "openSUSE Leap 15.4:kernel-default-livepatch-devel-5.14.21-150400.24.21.2.x86_64",
            "openSUSE Leap 15.4:kernel-default-optional-5.14.21-150400.24.21.2.aarch64",
            "openSUSE Leap 15.4:kernel-default-optional-5.14.21-150400.24.21.2.ppc64le",
            "openSUSE Leap 15.4:kernel-default-optional-5.14.21-150400.24.21.2.s390x",
            "openSUSE Leap 15.4:kernel-default-optional-5.14.21-150400.24.21.2.x86_64",
            "openSUSE Leap 15.4:kernel-devel-5.14.21-150400.24.21.2.noarch",
            "openSUSE Leap 15.4:kernel-docs-5.14.21-150400.24.21.3.noarch",
            "openSUSE Leap 15.4:kernel-docs-html-5.14.21-150400.24.21.3.noarch",
            "openSUSE Leap 15.4:kernel-kvmsmall-5.14.21-150400.24.21.2.aarch64",
            "openSUSE Leap 15.4:kernel-kvmsmall-5.14.21-150400.24.21.2.ppc64le",
            "openSUSE Leap 15.4:kernel-kvmsmall-5.14.21-150400.24.21.2.x86_64",
            "openSUSE Leap 15.4:kernel-kvmsmall-devel-5.14.21-150400.24.21.2.aarch64",
            "openSUSE Leap 15.4:kernel-kvmsmall-devel-5.14.21-150400.24.21.2.ppc64le",
            "openSUSE Leap 15.4:kernel-kvmsmall-devel-5.14.21-150400.24.21.2.x86_64",
            "openSUSE Leap 15.4:kernel-kvmsmall-livepatch-devel-5.14.21-150400.24.21.2.aarch64",
            "openSUSE Leap 15.4:kernel-kvmsmall-livepatch-devel-5.14.21-150400.24.21.2.ppc64le",
            "openSUSE Leap 15.4:kernel-kvmsmall-livepatch-devel-5.14.21-150400.24.21.2.x86_64",
            "openSUSE Leap 15.4:kernel-macros-5.14.21-150400.24.21.2.noarch",
            "openSUSE Leap 15.4:kernel-obs-build-5.14.21-150400.24.21.2.aarch64",
            "openSUSE Leap 15.4:kernel-obs-build-5.14.21-150400.24.21.2.ppc64le",
            "openSUSE Leap 15.4:kernel-obs-build-5.14.21-150400.24.21.2.s390x",
            "openSUSE Leap 15.4:kernel-obs-build-5.14.21-150400.24.21.2.x86_64",
            "openSUSE Leap 15.4:kernel-obs-qa-5.14.21-150400.24.21.1.aarch64",
            "openSUSE Leap 15.4:kernel-obs-qa-5.14.21-150400.24.21.1.ppc64le",
            "openSUSE Leap 15.4:kernel-obs-qa-5.14.21-150400.24.21.1.s390x",
            "openSUSE Leap 15.4:kernel-obs-qa-5.14.21-150400.24.21.1.x86_64",
            "openSUSE Leap 15.4:kernel-source-5.14.21-150400.24.21.2.noarch",
            "openSUSE Leap 15.4:kernel-source-vanilla-5.14.21-150400.24.21.2.noarch",
            "openSUSE Leap 15.4:kernel-syms-5.14.21-150400.24.21.1.aarch64",
            "openSUSE Leap 15.4:kernel-syms-5.14.21-150400.24.21.1.ppc64le",
            "openSUSE Leap 15.4:kernel-syms-5.14.21-150400.24.21.1.s390x",
            "openSUSE Leap 15.4:kernel-syms-5.14.21-150400.24.21.1.x86_64",
            "openSUSE Leap 15.4:kernel-zfcpdump-5.14.21-150400.24.21.2.s390x",
            "openSUSE Leap 15.4:kselftests-kmp-64kb-5.14.21-150400.24.21.2.aarch64",
            "openSUSE Leap 15.4:kselftests-kmp-default-5.14.21-150400.24.21.2.aarch64",
            "openSUSE Leap 15.4:kselftests-kmp-default-5.14.21-150400.24.21.2.ppc64le",
            "openSUSE Leap 15.4:kselftests-kmp-default-5.14.21-150400.24.21.2.s390x",
            "openSUSE Leap 15.4:kselftests-kmp-default-5.14.21-150400.24.21.2.x86_64",
            "openSUSE Leap 15.4:ocfs2-kmp-64kb-5.14.21-150400.24.21.2.aarch64",
            "openSUSE Leap 15.4:ocfs2-kmp-default-5.14.21-150400.24.21.2.aarch64",
            "openSUSE Leap 15.4:ocfs2-kmp-default-5.14.21-150400.24.21.2.ppc64le",
            "openSUSE Leap 15.4:ocfs2-kmp-default-5.14.21-150400.24.21.2.s390x",
            "openSUSE Leap 15.4:ocfs2-kmp-default-5.14.21-150400.24.21.2.x86_64",
            "openSUSE Leap 15.4:reiserfs-kmp-64kb-5.14.21-150400.24.21.2.aarch64",
            "openSUSE Leap 15.4:reiserfs-kmp-default-5.14.21-150400.24.21.2.aarch64",
            "openSUSE Leap 15.4:reiserfs-kmp-default-5.14.21-150400.24.21.2.ppc64le",
            "openSUSE Leap 15.4:reiserfs-kmp-default-5.14.21-150400.24.21.2.s390x",
            "openSUSE Leap 15.4:reiserfs-kmp-default-5.14.21-150400.24.21.2.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 4.4,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:N",
            "version": "3.1"
          },
          "products": [
            "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.21.2.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.21.2.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.21.2.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.21.2.x86_64",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.21.2.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.21.2.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.21.2.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.21.2.x86_64",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.21.2.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.21.2.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.21.2.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.21.2.x86_64",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.21.2.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.21.2.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.21.2.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.21.2.x86_64",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.21.2.ppc64le",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.21.2.s390x",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.21.2.x86_64",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.21.2.ppc64le",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.21.2.s390x",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.21.2.x86_64",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_21-default-1-150400.9.3.2.ppc64le",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_21-default-1-150400.9.3.2.s390x",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_21-default-1-150400.9.3.2.x86_64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-64kb-5.14.21-150400.24.21.2.aarch64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-64kb-devel-5.14.21-150400.24.21.2.aarch64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-5.14.21-150400.24.21.2.aarch64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-5.14.21-150400.24.21.2.ppc64le",
            "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-5.14.21-150400.24.21.2.s390x",
            "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-5.14.21-150400.24.21.2.x86_64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-base-5.14.21-150400.24.21.2.150400.24.7.2.aarch64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-base-5.14.21-150400.24.21.2.150400.24.7.2.ppc64le",
            "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-base-5.14.21-150400.24.21.2.150400.24.7.2.s390x",
            "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-base-5.14.21-150400.24.21.2.150400.24.7.2.x86_64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-devel-5.14.21-150400.24.21.2.aarch64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-devel-5.14.21-150400.24.21.2.ppc64le",
            "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-devel-5.14.21-150400.24.21.2.s390x",
            "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-devel-5.14.21-150400.24.21.2.x86_64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-devel-5.14.21-150400.24.21.2.noarch",
            "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-macros-5.14.21-150400.24.21.2.noarch",
            "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-zfcpdump-5.14.21-150400.24.21.2.s390x",
            "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-docs-5.14.21-150400.24.21.3.noarch",
            "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-obs-build-5.14.21-150400.24.21.2.aarch64",
            "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-obs-build-5.14.21-150400.24.21.2.ppc64le",
            "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-obs-build-5.14.21-150400.24.21.2.s390x",
            "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-obs-build-5.14.21-150400.24.21.2.x86_64",
            "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-source-5.14.21-150400.24.21.2.noarch",
            "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-syms-5.14.21-150400.24.21.1.aarch64",
            "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-syms-5.14.21-150400.24.21.1.ppc64le",
            "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-syms-5.14.21-150400.24.21.1.s390x",
            "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-syms-5.14.21-150400.24.21.1.x86_64",
            "SUSE Linux Enterprise Module for Legacy 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.21.2.aarch64",
            "SUSE Linux Enterprise Module for Legacy 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.21.2.ppc64le",
            "SUSE Linux Enterprise Module for Legacy 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.21.2.s390x",
            "SUSE Linux Enterprise Module for Legacy 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.21.2.x86_64",
            "SUSE Linux Enterprise Workstation Extension 15 SP4:kernel-default-extra-5.14.21-150400.24.21.2.x86_64",
            "openSUSE Leap 15.4:cluster-md-kmp-64kb-5.14.21-150400.24.21.2.aarch64",
            "openSUSE Leap 15.4:cluster-md-kmp-default-5.14.21-150400.24.21.2.aarch64",
            "openSUSE Leap 15.4:cluster-md-kmp-default-5.14.21-150400.24.21.2.ppc64le",
            "openSUSE Leap 15.4:cluster-md-kmp-default-5.14.21-150400.24.21.2.s390x",
            "openSUSE Leap 15.4:cluster-md-kmp-default-5.14.21-150400.24.21.2.x86_64",
            "openSUSE Leap 15.4:dlm-kmp-64kb-5.14.21-150400.24.21.2.aarch64",
            "openSUSE Leap 15.4:dlm-kmp-default-5.14.21-150400.24.21.2.aarch64",
            "openSUSE Leap 15.4:dlm-kmp-default-5.14.21-150400.24.21.2.ppc64le",
            "openSUSE Leap 15.4:dlm-kmp-default-5.14.21-150400.24.21.2.s390x",
            "openSUSE Leap 15.4:dlm-kmp-default-5.14.21-150400.24.21.2.x86_64",
            "openSUSE Leap 15.4:dtb-allwinner-5.14.21-150400.24.21.1.aarch64",
            "openSUSE Leap 15.4:dtb-altera-5.14.21-150400.24.21.1.aarch64",
            "openSUSE Leap 15.4:dtb-amazon-5.14.21-150400.24.21.1.aarch64",
            "openSUSE Leap 15.4:dtb-amd-5.14.21-150400.24.21.1.aarch64",
            "openSUSE Leap 15.4:dtb-amlogic-5.14.21-150400.24.21.1.aarch64",
            "openSUSE Leap 15.4:dtb-apm-5.14.21-150400.24.21.1.aarch64",
            "openSUSE Leap 15.4:dtb-apple-5.14.21-150400.24.21.1.aarch64",
            "openSUSE Leap 15.4:dtb-arm-5.14.21-150400.24.21.1.aarch64",
            "openSUSE Leap 15.4:dtb-broadcom-5.14.21-150400.24.21.1.aarch64",
            "openSUSE Leap 15.4:dtb-cavium-5.14.21-150400.24.21.1.aarch64",
            "openSUSE Leap 15.4:dtb-exynos-5.14.21-150400.24.21.1.aarch64",
            "openSUSE Leap 15.4:dtb-freescale-5.14.21-150400.24.21.1.aarch64",
            "openSUSE Leap 15.4:dtb-hisilicon-5.14.21-150400.24.21.1.aarch64",
            "openSUSE Leap 15.4:dtb-lg-5.14.21-150400.24.21.1.aarch64",
            "openSUSE Leap 15.4:dtb-marvell-5.14.21-150400.24.21.1.aarch64",
            "openSUSE Leap 15.4:dtb-mediatek-5.14.21-150400.24.21.1.aarch64",
            "openSUSE Leap 15.4:dtb-nvidia-5.14.21-150400.24.21.1.aarch64",
            "openSUSE Leap 15.4:dtb-qcom-5.14.21-150400.24.21.1.aarch64",
            "openSUSE Leap 15.4:dtb-renesas-5.14.21-150400.24.21.1.aarch64",
            "openSUSE Leap 15.4:dtb-rockchip-5.14.21-150400.24.21.1.aarch64",
            "openSUSE Leap 15.4:dtb-socionext-5.14.21-150400.24.21.1.aarch64",
            "openSUSE Leap 15.4:dtb-sprd-5.14.21-150400.24.21.1.aarch64",
            "openSUSE Leap 15.4:dtb-xilinx-5.14.21-150400.24.21.1.aarch64",
            "openSUSE Leap 15.4:gfs2-kmp-64kb-5.14.21-150400.24.21.2.aarch64",
            "openSUSE Leap 15.4:gfs2-kmp-default-5.14.21-150400.24.21.2.aarch64",
            "openSUSE Leap 15.4:gfs2-kmp-default-5.14.21-150400.24.21.2.ppc64le",
            "openSUSE Leap 15.4:gfs2-kmp-default-5.14.21-150400.24.21.2.s390x",
            "openSUSE Leap 15.4:gfs2-kmp-default-5.14.21-150400.24.21.2.x86_64",
            "openSUSE Leap 15.4:kernel-64kb-5.14.21-150400.24.21.2.aarch64",
            "openSUSE Leap 15.4:kernel-64kb-devel-5.14.21-150400.24.21.2.aarch64",
            "openSUSE Leap 15.4:kernel-64kb-extra-5.14.21-150400.24.21.2.aarch64",
            "openSUSE Leap 15.4:kernel-64kb-livepatch-devel-5.14.21-150400.24.21.2.aarch64",
            "openSUSE Leap 15.4:kernel-64kb-optional-5.14.21-150400.24.21.2.aarch64",
            "openSUSE Leap 15.4:kernel-debug-5.14.21-150400.24.21.2.ppc64le",
            "openSUSE Leap 15.4:kernel-debug-5.14.21-150400.24.21.2.x86_64",
            "openSUSE Leap 15.4:kernel-debug-devel-5.14.21-150400.24.21.2.ppc64le",
            "openSUSE Leap 15.4:kernel-debug-devel-5.14.21-150400.24.21.2.x86_64",
            "openSUSE Leap 15.4:kernel-debug-livepatch-devel-5.14.21-150400.24.21.2.ppc64le",
            "openSUSE Leap 15.4:kernel-debug-livepatch-devel-5.14.21-150400.24.21.2.x86_64",
            "openSUSE Leap 15.4:kernel-default-5.14.21-150400.24.21.2.aarch64",
            "openSUSE Leap 15.4:kernel-default-5.14.21-150400.24.21.2.ppc64le",
            "openSUSE Leap 15.4:kernel-default-5.14.21-150400.24.21.2.s390x",
            "openSUSE Leap 15.4:kernel-default-5.14.21-150400.24.21.2.x86_64",
            "openSUSE Leap 15.4:kernel-default-base-5.14.21-150400.24.21.2.150400.24.7.2.aarch64",
            "openSUSE Leap 15.4:kernel-default-base-5.14.21-150400.24.21.2.150400.24.7.2.ppc64le",
            "openSUSE Leap 15.4:kernel-default-base-5.14.21-150400.24.21.2.150400.24.7.2.s390x",
            "openSUSE Leap 15.4:kernel-default-base-5.14.21-150400.24.21.2.150400.24.7.2.x86_64",
            "openSUSE Leap 15.4:kernel-default-base-rebuild-5.14.21-150400.24.21.2.150400.24.7.2.aarch64",
            "openSUSE Leap 15.4:kernel-default-base-rebuild-5.14.21-150400.24.21.2.150400.24.7.2.ppc64le",
            "openSUSE Leap 15.4:kernel-default-base-rebuild-5.14.21-150400.24.21.2.150400.24.7.2.s390x",
            "openSUSE Leap 15.4:kernel-default-base-rebuild-5.14.21-150400.24.21.2.150400.24.7.2.x86_64",
            "openSUSE Leap 15.4:kernel-default-devel-5.14.21-150400.24.21.2.aarch64",
            "openSUSE Leap 15.4:kernel-default-devel-5.14.21-150400.24.21.2.ppc64le",
            "openSUSE Leap 15.4:kernel-default-devel-5.14.21-150400.24.21.2.s390x",
            "openSUSE Leap 15.4:kernel-default-devel-5.14.21-150400.24.21.2.x86_64",
            "openSUSE Leap 15.4:kernel-default-extra-5.14.21-150400.24.21.2.aarch64",
            "openSUSE Leap 15.4:kernel-default-extra-5.14.21-150400.24.21.2.ppc64le",
            "openSUSE Leap 15.4:kernel-default-extra-5.14.21-150400.24.21.2.s390x",
            "openSUSE Leap 15.4:kernel-default-extra-5.14.21-150400.24.21.2.x86_64",
            "openSUSE Leap 15.4:kernel-default-livepatch-5.14.21-150400.24.21.2.aarch64",
            "openSUSE Leap 15.4:kernel-default-livepatch-5.14.21-150400.24.21.2.ppc64le",
            "openSUSE Leap 15.4:kernel-default-livepatch-5.14.21-150400.24.21.2.s390x",
            "openSUSE Leap 15.4:kernel-default-livepatch-5.14.21-150400.24.21.2.x86_64",
            "openSUSE Leap 15.4:kernel-default-livepatch-devel-5.14.21-150400.24.21.2.aarch64",
            "openSUSE Leap 15.4:kernel-default-livepatch-devel-5.14.21-150400.24.21.2.ppc64le",
            "openSUSE Leap 15.4:kernel-default-livepatch-devel-5.14.21-150400.24.21.2.s390x",
            "openSUSE Leap 15.4:kernel-default-livepatch-devel-5.14.21-150400.24.21.2.x86_64",
            "openSUSE Leap 15.4:kernel-default-optional-5.14.21-150400.24.21.2.aarch64",
            "openSUSE Leap 15.4:kernel-default-optional-5.14.21-150400.24.21.2.ppc64le",
            "openSUSE Leap 15.4:kernel-default-optional-5.14.21-150400.24.21.2.s390x",
            "openSUSE Leap 15.4:kernel-default-optional-5.14.21-150400.24.21.2.x86_64",
            "openSUSE Leap 15.4:kernel-devel-5.14.21-150400.24.21.2.noarch",
            "openSUSE Leap 15.4:kernel-docs-5.14.21-150400.24.21.3.noarch",
            "openSUSE Leap 15.4:kernel-docs-html-5.14.21-150400.24.21.3.noarch",
            "openSUSE Leap 15.4:kernel-kvmsmall-5.14.21-150400.24.21.2.aarch64",
            "openSUSE Leap 15.4:kernel-kvmsmall-5.14.21-150400.24.21.2.ppc64le",
            "openSUSE Leap 15.4:kernel-kvmsmall-5.14.21-150400.24.21.2.x86_64",
            "openSUSE Leap 15.4:kernel-kvmsmall-devel-5.14.21-150400.24.21.2.aarch64",
            "openSUSE Leap 15.4:kernel-kvmsmall-devel-5.14.21-150400.24.21.2.ppc64le",
            "openSUSE Leap 15.4:kernel-kvmsmall-devel-5.14.21-150400.24.21.2.x86_64",
            "openSUSE Leap 15.4:kernel-kvmsmall-livepatch-devel-5.14.21-150400.24.21.2.aarch64",
            "openSUSE Leap 15.4:kernel-kvmsmall-livepatch-devel-5.14.21-150400.24.21.2.ppc64le",
            "openSUSE Leap 15.4:kernel-kvmsmall-livepatch-devel-5.14.21-150400.24.21.2.x86_64",
            "openSUSE Leap 15.4:kernel-macros-5.14.21-150400.24.21.2.noarch",
            "openSUSE Leap 15.4:kernel-obs-build-5.14.21-150400.24.21.2.aarch64",
            "openSUSE Leap 15.4:kernel-obs-build-5.14.21-150400.24.21.2.ppc64le",
            "openSUSE Leap 15.4:kernel-obs-build-5.14.21-150400.24.21.2.s390x",
            "openSUSE Leap 15.4:kernel-obs-build-5.14.21-150400.24.21.2.x86_64",
            "openSUSE Leap 15.4:kernel-obs-qa-5.14.21-150400.24.21.1.aarch64",
            "openSUSE Leap 15.4:kernel-obs-qa-5.14.21-150400.24.21.1.ppc64le",
            "openSUSE Leap 15.4:kernel-obs-qa-5.14.21-150400.24.21.1.s390x",
            "openSUSE Leap 15.4:kernel-obs-qa-5.14.21-150400.24.21.1.x86_64",
            "openSUSE Leap 15.4:kernel-source-5.14.21-150400.24.21.2.noarch",
            "openSUSE Leap 15.4:kernel-source-vanilla-5.14.21-150400.24.21.2.noarch",
            "openSUSE Leap 15.4:kernel-syms-5.14.21-150400.24.21.1.aarch64",
            "openSUSE Leap 15.4:kernel-syms-5.14.21-150400.24.21.1.ppc64le",
            "openSUSE Leap 15.4:kernel-syms-5.14.21-150400.24.21.1.s390x",
            "openSUSE Leap 15.4:kernel-syms-5.14.21-150400.24.21.1.x86_64",
            "openSUSE Leap 15.4:kernel-zfcpdump-5.14.21-150400.24.21.2.s390x",
            "openSUSE Leap 15.4:kselftests-kmp-64kb-5.14.21-150400.24.21.2.aarch64",
            "openSUSE Leap 15.4:kselftests-kmp-default-5.14.21-150400.24.21.2.aarch64",
            "openSUSE Leap 15.4:kselftests-kmp-default-5.14.21-150400.24.21.2.ppc64le",
            "openSUSE Leap 15.4:kselftests-kmp-default-5.14.21-150400.24.21.2.s390x",
            "openSUSE Leap 15.4:kselftests-kmp-default-5.14.21-150400.24.21.2.x86_64",
            "openSUSE Leap 15.4:ocfs2-kmp-64kb-5.14.21-150400.24.21.2.aarch64",
            "openSUSE Leap 15.4:ocfs2-kmp-default-5.14.21-150400.24.21.2.aarch64",
            "openSUSE Leap 15.4:ocfs2-kmp-default-5.14.21-150400.24.21.2.ppc64le",
            "openSUSE Leap 15.4:ocfs2-kmp-default-5.14.21-150400.24.21.2.s390x",
            "openSUSE Leap 15.4:ocfs2-kmp-default-5.14.21-150400.24.21.2.x86_64",
            "openSUSE Leap 15.4:reiserfs-kmp-64kb-5.14.21-150400.24.21.2.aarch64",
            "openSUSE Leap 15.4:reiserfs-kmp-default-5.14.21-150400.24.21.2.aarch64",
            "openSUSE Leap 15.4:reiserfs-kmp-default-5.14.21-150400.24.21.2.ppc64le",
            "openSUSE Leap 15.4:reiserfs-kmp-default-5.14.21-150400.24.21.2.s390x",
            "openSUSE Leap 15.4:reiserfs-kmp-default-5.14.21-150400.24.21.2.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2022-09-16T15:30:19Z",
          "details": "moderate"
        }
      ],
      "title": "CVE-2021-4037"
    },
    {
      "cve": "CVE-2022-20368",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2022-20368"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "Product: AndroidVersions: Android kernelAndroid ID: A-224546354References: Upstream kernel",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.21.2.aarch64",
          "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.21.2.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.21.2.s390x",
          "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.21.2.x86_64",
          "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.21.2.aarch64",
          "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.21.2.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.21.2.s390x",
          "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.21.2.x86_64",
          "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.21.2.aarch64",
          "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.21.2.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.21.2.s390x",
          "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.21.2.x86_64",
          "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.21.2.aarch64",
          "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.21.2.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.21.2.s390x",
          "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.21.2.x86_64",
          "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.21.2.ppc64le",
          "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.21.2.s390x",
          "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.21.2.x86_64",
          "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.21.2.ppc64le",
          "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.21.2.s390x",
          "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.21.2.x86_64",
          "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_21-default-1-150400.9.3.2.ppc64le",
          "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_21-default-1-150400.9.3.2.s390x",
          "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_21-default-1-150400.9.3.2.x86_64",
          "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-64kb-5.14.21-150400.24.21.2.aarch64",
          "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-64kb-devel-5.14.21-150400.24.21.2.aarch64",
          "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-5.14.21-150400.24.21.2.aarch64",
          "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-5.14.21-150400.24.21.2.ppc64le",
          "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-5.14.21-150400.24.21.2.s390x",
          "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-5.14.21-150400.24.21.2.x86_64",
          "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-base-5.14.21-150400.24.21.2.150400.24.7.2.aarch64",
          "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-base-5.14.21-150400.24.21.2.150400.24.7.2.ppc64le",
          "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-base-5.14.21-150400.24.21.2.150400.24.7.2.s390x",
          "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-base-5.14.21-150400.24.21.2.150400.24.7.2.x86_64",
          "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-devel-5.14.21-150400.24.21.2.aarch64",
          "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-devel-5.14.21-150400.24.21.2.ppc64le",
          "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-devel-5.14.21-150400.24.21.2.s390x",
          "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-devel-5.14.21-150400.24.21.2.x86_64",
          "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-devel-5.14.21-150400.24.21.2.noarch",
          "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-macros-5.14.21-150400.24.21.2.noarch",
          "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-zfcpdump-5.14.21-150400.24.21.2.s390x",
          "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-docs-5.14.21-150400.24.21.3.noarch",
          "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-obs-build-5.14.21-150400.24.21.2.aarch64",
          "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-obs-build-5.14.21-150400.24.21.2.ppc64le",
          "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-obs-build-5.14.21-150400.24.21.2.s390x",
          "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-obs-build-5.14.21-150400.24.21.2.x86_64",
          "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-source-5.14.21-150400.24.21.2.noarch",
          "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-syms-5.14.21-150400.24.21.1.aarch64",
          "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-syms-5.14.21-150400.24.21.1.ppc64le",
          "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-syms-5.14.21-150400.24.21.1.s390x",
          "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-syms-5.14.21-150400.24.21.1.x86_64",
          "SUSE Linux Enterprise Module for Legacy 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.21.2.aarch64",
          "SUSE Linux Enterprise Module for Legacy 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.21.2.ppc64le",
          "SUSE Linux Enterprise Module for Legacy 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.21.2.s390x",
          "SUSE Linux Enterprise Module for Legacy 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.21.2.x86_64",
          "SUSE Linux Enterprise Workstation Extension 15 SP4:kernel-default-extra-5.14.21-150400.24.21.2.x86_64",
          "openSUSE Leap 15.4:cluster-md-kmp-64kb-5.14.21-150400.24.21.2.aarch64",
          "openSUSE Leap 15.4:cluster-md-kmp-default-5.14.21-150400.24.21.2.aarch64",
          "openSUSE Leap 15.4:cluster-md-kmp-default-5.14.21-150400.24.21.2.ppc64le",
          "openSUSE Leap 15.4:cluster-md-kmp-default-5.14.21-150400.24.21.2.s390x",
          "openSUSE Leap 15.4:cluster-md-kmp-default-5.14.21-150400.24.21.2.x86_64",
          "openSUSE Leap 15.4:dlm-kmp-64kb-5.14.21-150400.24.21.2.aarch64",
          "openSUSE Leap 15.4:dlm-kmp-default-5.14.21-150400.24.21.2.aarch64",
          "openSUSE Leap 15.4:dlm-kmp-default-5.14.21-150400.24.21.2.ppc64le",
          "openSUSE Leap 15.4:dlm-kmp-default-5.14.21-150400.24.21.2.s390x",
          "openSUSE Leap 15.4:dlm-kmp-default-5.14.21-150400.24.21.2.x86_64",
          "openSUSE Leap 15.4:dtb-allwinner-5.14.21-150400.24.21.1.aarch64",
          "openSUSE Leap 15.4:dtb-altera-5.14.21-150400.24.21.1.aarch64",
          "openSUSE Leap 15.4:dtb-amazon-5.14.21-150400.24.21.1.aarch64",
          "openSUSE Leap 15.4:dtb-amd-5.14.21-150400.24.21.1.aarch64",
          "openSUSE Leap 15.4:dtb-amlogic-5.14.21-150400.24.21.1.aarch64",
          "openSUSE Leap 15.4:dtb-apm-5.14.21-150400.24.21.1.aarch64",
          "openSUSE Leap 15.4:dtb-apple-5.14.21-150400.24.21.1.aarch64",
          "openSUSE Leap 15.4:dtb-arm-5.14.21-150400.24.21.1.aarch64",
          "openSUSE Leap 15.4:dtb-broadcom-5.14.21-150400.24.21.1.aarch64",
          "openSUSE Leap 15.4:dtb-cavium-5.14.21-150400.24.21.1.aarch64",
          "openSUSE Leap 15.4:dtb-exynos-5.14.21-150400.24.21.1.aarch64",
          "openSUSE Leap 15.4:dtb-freescale-5.14.21-150400.24.21.1.aarch64",
          "openSUSE Leap 15.4:dtb-hisilicon-5.14.21-150400.24.21.1.aarch64",
          "openSUSE Leap 15.4:dtb-lg-5.14.21-150400.24.21.1.aarch64",
          "openSUSE Leap 15.4:dtb-marvell-5.14.21-150400.24.21.1.aarch64",
          "openSUSE Leap 15.4:dtb-mediatek-5.14.21-150400.24.21.1.aarch64",
          "openSUSE Leap 15.4:dtb-nvidia-5.14.21-150400.24.21.1.aarch64",
          "openSUSE Leap 15.4:dtb-qcom-5.14.21-150400.24.21.1.aarch64",
          "openSUSE Leap 15.4:dtb-renesas-5.14.21-150400.24.21.1.aarch64",
          "openSUSE Leap 15.4:dtb-rockchip-5.14.21-150400.24.21.1.aarch64",
          "openSUSE Leap 15.4:dtb-socionext-5.14.21-150400.24.21.1.aarch64",
          "openSUSE Leap 15.4:dtb-sprd-5.14.21-150400.24.21.1.aarch64",
          "openSUSE Leap 15.4:dtb-xilinx-5.14.21-150400.24.21.1.aarch64",
          "openSUSE Leap 15.4:gfs2-kmp-64kb-5.14.21-150400.24.21.2.aarch64",
          "openSUSE Leap 15.4:gfs2-kmp-default-5.14.21-150400.24.21.2.aarch64",
          "openSUSE Leap 15.4:gfs2-kmp-default-5.14.21-150400.24.21.2.ppc64le",
          "openSUSE Leap 15.4:gfs2-kmp-default-5.14.21-150400.24.21.2.s390x",
          "openSUSE Leap 15.4:gfs2-kmp-default-5.14.21-150400.24.21.2.x86_64",
          "openSUSE Leap 15.4:kernel-64kb-5.14.21-150400.24.21.2.aarch64",
          "openSUSE Leap 15.4:kernel-64kb-devel-5.14.21-150400.24.21.2.aarch64",
          "openSUSE Leap 15.4:kernel-64kb-extra-5.14.21-150400.24.21.2.aarch64",
          "openSUSE Leap 15.4:kernel-64kb-livepatch-devel-5.14.21-150400.24.21.2.aarch64",
          "openSUSE Leap 15.4:kernel-64kb-optional-5.14.21-150400.24.21.2.aarch64",
          "openSUSE Leap 15.4:kernel-debug-5.14.21-150400.24.21.2.ppc64le",
          "openSUSE Leap 15.4:kernel-debug-5.14.21-150400.24.21.2.x86_64",
          "openSUSE Leap 15.4:kernel-debug-devel-5.14.21-150400.24.21.2.ppc64le",
          "openSUSE Leap 15.4:kernel-debug-devel-5.14.21-150400.24.21.2.x86_64",
          "openSUSE Leap 15.4:kernel-debug-livepatch-devel-5.14.21-150400.24.21.2.ppc64le",
          "openSUSE Leap 15.4:kernel-debug-livepatch-devel-5.14.21-150400.24.21.2.x86_64",
          "openSUSE Leap 15.4:kernel-default-5.14.21-150400.24.21.2.aarch64",
          "openSUSE Leap 15.4:kernel-default-5.14.21-150400.24.21.2.ppc64le",
          "openSUSE Leap 15.4:kernel-default-5.14.21-150400.24.21.2.s390x",
          "openSUSE Leap 15.4:kernel-default-5.14.21-150400.24.21.2.x86_64",
          "openSUSE Leap 15.4:kernel-default-base-5.14.21-150400.24.21.2.150400.24.7.2.aarch64",
          "openSUSE Leap 15.4:kernel-default-base-5.14.21-150400.24.21.2.150400.24.7.2.ppc64le",
          "openSUSE Leap 15.4:kernel-default-base-5.14.21-150400.24.21.2.150400.24.7.2.s390x",
          "openSUSE Leap 15.4:kernel-default-base-5.14.21-150400.24.21.2.150400.24.7.2.x86_64",
          "openSUSE Leap 15.4:kernel-default-base-rebuild-5.14.21-150400.24.21.2.150400.24.7.2.aarch64",
          "openSUSE Leap 15.4:kernel-default-base-rebuild-5.14.21-150400.24.21.2.150400.24.7.2.ppc64le",
          "openSUSE Leap 15.4:kernel-default-base-rebuild-5.14.21-150400.24.21.2.150400.24.7.2.s390x",
          "openSUSE Leap 15.4:kernel-default-base-rebuild-5.14.21-150400.24.21.2.150400.24.7.2.x86_64",
          "openSUSE Leap 15.4:kernel-default-devel-5.14.21-150400.24.21.2.aarch64",
          "openSUSE Leap 15.4:kernel-default-devel-5.14.21-150400.24.21.2.ppc64le",
          "openSUSE Leap 15.4:kernel-default-devel-5.14.21-150400.24.21.2.s390x",
          "openSUSE Leap 15.4:kernel-default-devel-5.14.21-150400.24.21.2.x86_64",
          "openSUSE Leap 15.4:kernel-default-extra-5.14.21-150400.24.21.2.aarch64",
          "openSUSE Leap 15.4:kernel-default-extra-5.14.21-150400.24.21.2.ppc64le",
          "openSUSE Leap 15.4:kernel-default-extra-5.14.21-150400.24.21.2.s390x",
          "openSUSE Leap 15.4:kernel-default-extra-5.14.21-150400.24.21.2.x86_64",
          "openSUSE Leap 15.4:kernel-default-livepatch-5.14.21-150400.24.21.2.aarch64",
          "openSUSE Leap 15.4:kernel-default-livepatch-5.14.21-150400.24.21.2.ppc64le",
          "openSUSE Leap 15.4:kernel-default-livepatch-5.14.21-150400.24.21.2.s390x",
          "openSUSE Leap 15.4:kernel-default-livepatch-5.14.21-150400.24.21.2.x86_64",
          "openSUSE Leap 15.4:kernel-default-livepatch-devel-5.14.21-150400.24.21.2.aarch64",
          "openSUSE Leap 15.4:kernel-default-livepatch-devel-5.14.21-150400.24.21.2.ppc64le",
          "openSUSE Leap 15.4:kernel-default-livepatch-devel-5.14.21-150400.24.21.2.s390x",
          "openSUSE Leap 15.4:kernel-default-livepatch-devel-5.14.21-150400.24.21.2.x86_64",
          "openSUSE Leap 15.4:kernel-default-optional-5.14.21-150400.24.21.2.aarch64",
          "openSUSE Leap 15.4:kernel-default-optional-5.14.21-150400.24.21.2.ppc64le",
          "openSUSE Leap 15.4:kernel-default-optional-5.14.21-150400.24.21.2.s390x",
          "openSUSE Leap 15.4:kernel-default-optional-5.14.21-150400.24.21.2.x86_64",
          "openSUSE Leap 15.4:kernel-devel-5.14.21-150400.24.21.2.noarch",
          "openSUSE Leap 15.4:kernel-docs-5.14.21-150400.24.21.3.noarch",
          "openSUSE Leap 15.4:kernel-docs-html-5.14.21-150400.24.21.3.noarch",
          "openSUSE Leap 15.4:kernel-kvmsmall-5.14.21-150400.24.21.2.aarch64",
          "openSUSE Leap 15.4:kernel-kvmsmall-5.14.21-150400.24.21.2.ppc64le",
          "openSUSE Leap 15.4:kernel-kvmsmall-5.14.21-150400.24.21.2.x86_64",
          "openSUSE Leap 15.4:kernel-kvmsmall-devel-5.14.21-150400.24.21.2.aarch64",
          "openSUSE Leap 15.4:kernel-kvmsmall-devel-5.14.21-150400.24.21.2.ppc64le",
          "openSUSE Leap 15.4:kernel-kvmsmall-devel-5.14.21-150400.24.21.2.x86_64",
          "openSUSE Leap 15.4:kernel-kvmsmall-livepatch-devel-5.14.21-150400.24.21.2.aarch64",
          "openSUSE Leap 15.4:kernel-kvmsmall-livepatch-devel-5.14.21-150400.24.21.2.ppc64le",
          "openSUSE Leap 15.4:kernel-kvmsmall-livepatch-devel-5.14.21-150400.24.21.2.x86_64",
          "openSUSE Leap 15.4:kernel-macros-5.14.21-150400.24.21.2.noarch",
          "openSUSE Leap 15.4:kernel-obs-build-5.14.21-150400.24.21.2.aarch64",
          "openSUSE Leap 15.4:kernel-obs-build-5.14.21-150400.24.21.2.ppc64le",
          "openSUSE Leap 15.4:kernel-obs-build-5.14.21-150400.24.21.2.s390x",
          "openSUSE Leap 15.4:kernel-obs-build-5.14.21-150400.24.21.2.x86_64",
          "openSUSE Leap 15.4:kernel-obs-qa-5.14.21-150400.24.21.1.aarch64",
          "openSUSE Leap 15.4:kernel-obs-qa-5.14.21-150400.24.21.1.ppc64le",
          "openSUSE Leap 15.4:kernel-obs-qa-5.14.21-150400.24.21.1.s390x",
          "openSUSE Leap 15.4:kernel-obs-qa-5.14.21-150400.24.21.1.x86_64",
          "openSUSE Leap 15.4:kernel-source-5.14.21-150400.24.21.2.noarch",
          "openSUSE Leap 15.4:kernel-source-vanilla-5.14.21-150400.24.21.2.noarch",
          "openSUSE Leap 15.4:kernel-syms-5.14.21-150400.24.21.1.aarch64",
          "openSUSE Leap 15.4:kernel-syms-5.14.21-150400.24.21.1.ppc64le",
          "openSUSE Leap 15.4:kernel-syms-5.14.21-150400.24.21.1.s390x",
          "openSUSE Leap 15.4:kernel-syms-5.14.21-150400.24.21.1.x86_64",
          "openSUSE Leap 15.4:kernel-zfcpdump-5.14.21-150400.24.21.2.s390x",
          "openSUSE Leap 15.4:kselftests-kmp-64kb-5.14.21-150400.24.21.2.aarch64",
          "openSUSE Leap 15.4:kselftests-kmp-default-5.14.21-150400.24.21.2.aarch64",
          "openSUSE Leap 15.4:kselftests-kmp-default-5.14.21-150400.24.21.2.ppc64le",
          "openSUSE Leap 15.4:kselftests-kmp-default-5.14.21-150400.24.21.2.s390x",
          "openSUSE Leap 15.4:kselftests-kmp-default-5.14.21-150400.24.21.2.x86_64",
          "openSUSE Leap 15.4:ocfs2-kmp-64kb-5.14.21-150400.24.21.2.aarch64",
          "openSUSE Leap 15.4:ocfs2-kmp-default-5.14.21-150400.24.21.2.aarch64",
          "openSUSE Leap 15.4:ocfs2-kmp-default-5.14.21-150400.24.21.2.ppc64le",
          "openSUSE Leap 15.4:ocfs2-kmp-default-5.14.21-150400.24.21.2.s390x",
          "openSUSE Leap 15.4:ocfs2-kmp-default-5.14.21-150400.24.21.2.x86_64",
          "openSUSE Leap 15.4:reiserfs-kmp-64kb-5.14.21-150400.24.21.2.aarch64",
          "openSUSE Leap 15.4:reiserfs-kmp-default-5.14.21-150400.24.21.2.aarch64",
          "openSUSE Leap 15.4:reiserfs-kmp-default-5.14.21-150400.24.21.2.ppc64le",
          "openSUSE Leap 15.4:reiserfs-kmp-default-5.14.21-150400.24.21.2.s390x",
          "openSUSE Leap 15.4:reiserfs-kmp-default-5.14.21-150400.24.21.2.x86_64"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2022-20368",
          "url": "https://www.suse.com/security/cve/CVE-2022-20368"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1202346 for CVE-2022-20368",
          "url": "https://bugzilla.suse.com/1202346"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1212311 for CVE-2022-20368",
          "url": "https://bugzilla.suse.com/1212311"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.21.2.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.21.2.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.21.2.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.21.2.x86_64",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.21.2.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.21.2.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.21.2.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.21.2.x86_64",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.21.2.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.21.2.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.21.2.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.21.2.x86_64",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.21.2.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.21.2.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.21.2.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.21.2.x86_64",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.21.2.ppc64le",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.21.2.s390x",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.21.2.x86_64",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.21.2.ppc64le",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.21.2.s390x",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.21.2.x86_64",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_21-default-1-150400.9.3.2.ppc64le",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_21-default-1-150400.9.3.2.s390x",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_21-default-1-150400.9.3.2.x86_64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-64kb-5.14.21-150400.24.21.2.aarch64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-64kb-devel-5.14.21-150400.24.21.2.aarch64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-5.14.21-150400.24.21.2.aarch64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-5.14.21-150400.24.21.2.ppc64le",
            "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-5.14.21-150400.24.21.2.s390x",
            "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-5.14.21-150400.24.21.2.x86_64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-base-5.14.21-150400.24.21.2.150400.24.7.2.aarch64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-base-5.14.21-150400.24.21.2.150400.24.7.2.ppc64le",
            "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-base-5.14.21-150400.24.21.2.150400.24.7.2.s390x",
            "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-base-5.14.21-150400.24.21.2.150400.24.7.2.x86_64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-devel-5.14.21-150400.24.21.2.aarch64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-devel-5.14.21-150400.24.21.2.ppc64le",
            "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-devel-5.14.21-150400.24.21.2.s390x",
            "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-devel-5.14.21-150400.24.21.2.x86_64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-devel-5.14.21-150400.24.21.2.noarch",
            "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-macros-5.14.21-150400.24.21.2.noarch",
            "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-zfcpdump-5.14.21-150400.24.21.2.s390x",
            "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-docs-5.14.21-150400.24.21.3.noarch",
            "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-obs-build-5.14.21-150400.24.21.2.aarch64",
            "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-obs-build-5.14.21-150400.24.21.2.ppc64le",
            "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-obs-build-5.14.21-150400.24.21.2.s390x",
            "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-obs-build-5.14.21-150400.24.21.2.x86_64",
            "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-source-5.14.21-150400.24.21.2.noarch",
            "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-syms-5.14.21-150400.24.21.1.aarch64",
            "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-syms-5.14.21-150400.24.21.1.ppc64le",
            "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-syms-5.14.21-150400.24.21.1.s390x",
            "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-syms-5.14.21-150400.24.21.1.x86_64",
            "SUSE Linux Enterprise Module for Legacy 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.21.2.aarch64",
            "SUSE Linux Enterprise Module for Legacy 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.21.2.ppc64le",
            "SUSE Linux Enterprise Module for Legacy 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.21.2.s390x",
            "SUSE Linux Enterprise Module for Legacy 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.21.2.x86_64",
            "SUSE Linux Enterprise Workstation Extension 15 SP4:kernel-default-extra-5.14.21-150400.24.21.2.x86_64",
            "openSUSE Leap 15.4:cluster-md-kmp-64kb-5.14.21-150400.24.21.2.aarch64",
            "openSUSE Leap 15.4:cluster-md-kmp-default-5.14.21-150400.24.21.2.aarch64",
            "openSUSE Leap 15.4:cluster-md-kmp-default-5.14.21-150400.24.21.2.ppc64le",
            "openSUSE Leap 15.4:cluster-md-kmp-default-5.14.21-150400.24.21.2.s390x",
            "openSUSE Leap 15.4:cluster-md-kmp-default-5.14.21-150400.24.21.2.x86_64",
            "openSUSE Leap 15.4:dlm-kmp-64kb-5.14.21-150400.24.21.2.aarch64",
            "openSUSE Leap 15.4:dlm-kmp-default-5.14.21-150400.24.21.2.aarch64",
            "openSUSE Leap 15.4:dlm-kmp-default-5.14.21-150400.24.21.2.ppc64le",
            "openSUSE Leap 15.4:dlm-kmp-default-5.14.21-150400.24.21.2.s390x",
            "openSUSE Leap 15.4:dlm-kmp-default-5.14.21-150400.24.21.2.x86_64",
            "openSUSE Leap 15.4:dtb-allwinner-5.14.21-150400.24.21.1.aarch64",
            "openSUSE Leap 15.4:dtb-altera-5.14.21-150400.24.21.1.aarch64",
            "openSUSE Leap 15.4:dtb-amazon-5.14.21-150400.24.21.1.aarch64",
            "openSUSE Leap 15.4:dtb-amd-5.14.21-150400.24.21.1.aarch64",
            "openSUSE Leap 15.4:dtb-amlogic-5.14.21-150400.24.21.1.aarch64",
            "openSUSE Leap 15.4:dtb-apm-5.14.21-150400.24.21.1.aarch64",
            "openSUSE Leap 15.4:dtb-apple-5.14.21-150400.24.21.1.aarch64",
            "openSUSE Leap 15.4:dtb-arm-5.14.21-150400.24.21.1.aarch64",
            "openSUSE Leap 15.4:dtb-broadcom-5.14.21-150400.24.21.1.aarch64",
            "openSUSE Leap 15.4:dtb-cavium-5.14.21-150400.24.21.1.aarch64",
            "openSUSE Leap 15.4:dtb-exynos-5.14.21-150400.24.21.1.aarch64",
            "openSUSE Leap 15.4:dtb-freescale-5.14.21-150400.24.21.1.aarch64",
            "openSUSE Leap 15.4:dtb-hisilicon-5.14.21-150400.24.21.1.aarch64",
            "openSUSE Leap 15.4:dtb-lg-5.14.21-150400.24.21.1.aarch64",
            "openSUSE Leap 15.4:dtb-marvell-5.14.21-150400.24.21.1.aarch64",
            "openSUSE Leap 15.4:dtb-mediatek-5.14.21-150400.24.21.1.aarch64",
            "openSUSE Leap 15.4:dtb-nvidia-5.14.21-150400.24.21.1.aarch64",
            "openSUSE Leap 15.4:dtb-qcom-5.14.21-150400.24.21.1.aarch64",
            "openSUSE Leap 15.4:dtb-renesas-5.14.21-150400.24.21.1.aarch64",
            "openSUSE Leap 15.4:dtb-rockchip-5.14.21-150400.24.21.1.aarch64",
            "openSUSE Leap 15.4:dtb-socionext-5.14.21-150400.24.21.1.aarch64",
            "openSUSE Leap 15.4:dtb-sprd-5.14.21-150400.24.21.1.aarch64",
            "openSUSE Leap 15.4:dtb-xilinx-5.14.21-150400.24.21.1.aarch64",
            "openSUSE Leap 15.4:gfs2-kmp-64kb-5.14.21-150400.24.21.2.aarch64",
            "openSUSE Leap 15.4:gfs2-kmp-default-5.14.21-150400.24.21.2.aarch64",
            "openSUSE Leap 15.4:gfs2-kmp-default-5.14.21-150400.24.21.2.ppc64le",
            "openSUSE Leap 15.4:gfs2-kmp-default-5.14.21-150400.24.21.2.s390x",
            "openSUSE Leap 15.4:gfs2-kmp-default-5.14.21-150400.24.21.2.x86_64",
            "openSUSE Leap 15.4:kernel-64kb-5.14.21-150400.24.21.2.aarch64",
            "openSUSE Leap 15.4:kernel-64kb-devel-5.14.21-150400.24.21.2.aarch64",
            "openSUSE Leap 15.4:kernel-64kb-extra-5.14.21-150400.24.21.2.aarch64",
            "openSUSE Leap 15.4:kernel-64kb-livepatch-devel-5.14.21-150400.24.21.2.aarch64",
            "openSUSE Leap 15.4:kernel-64kb-optional-5.14.21-150400.24.21.2.aarch64",
            "openSUSE Leap 15.4:kernel-debug-5.14.21-150400.24.21.2.ppc64le",
            "openSUSE Leap 15.4:kernel-debug-5.14.21-150400.24.21.2.x86_64",
            "openSUSE Leap 15.4:kernel-debug-devel-5.14.21-150400.24.21.2.ppc64le",
            "openSUSE Leap 15.4:kernel-debug-devel-5.14.21-150400.24.21.2.x86_64",
            "openSUSE Leap 15.4:kernel-debug-livepatch-devel-5.14.21-150400.24.21.2.ppc64le",
            "openSUSE Leap 15.4:kernel-debug-livepatch-devel-5.14.21-150400.24.21.2.x86_64",
            "openSUSE Leap 15.4:kernel-default-5.14.21-150400.24.21.2.aarch64",
            "openSUSE Leap 15.4:kernel-default-5.14.21-150400.24.21.2.ppc64le",
            "openSUSE Leap 15.4:kernel-default-5.14.21-150400.24.21.2.s390x",
            "openSUSE Leap 15.4:kernel-default-5.14.21-150400.24.21.2.x86_64",
            "openSUSE Leap 15.4:kernel-default-base-5.14.21-150400.24.21.2.150400.24.7.2.aarch64",
            "openSUSE Leap 15.4:kernel-default-base-5.14.21-150400.24.21.2.150400.24.7.2.ppc64le",
            "openSUSE Leap 15.4:kernel-default-base-5.14.21-150400.24.21.2.150400.24.7.2.s390x",
            "openSUSE Leap 15.4:kernel-default-base-5.14.21-150400.24.21.2.150400.24.7.2.x86_64",
            "openSUSE Leap 15.4:kernel-default-base-rebuild-5.14.21-150400.24.21.2.150400.24.7.2.aarch64",
            "openSUSE Leap 15.4:kernel-default-base-rebuild-5.14.21-150400.24.21.2.150400.24.7.2.ppc64le",
            "openSUSE Leap 15.4:kernel-default-base-rebuild-5.14.21-150400.24.21.2.150400.24.7.2.s390x",
            "openSUSE Leap 15.4:kernel-default-base-rebuild-5.14.21-150400.24.21.2.150400.24.7.2.x86_64",
            "openSUSE Leap 15.4:kernel-default-devel-5.14.21-150400.24.21.2.aarch64",
            "openSUSE Leap 15.4:kernel-default-devel-5.14.21-150400.24.21.2.ppc64le",
            "openSUSE Leap 15.4:kernel-default-devel-5.14.21-150400.24.21.2.s390x",
            "openSUSE Leap 15.4:kernel-default-devel-5.14.21-150400.24.21.2.x86_64",
            "openSUSE Leap 15.4:kernel-default-extra-5.14.21-150400.24.21.2.aarch64",
            "openSUSE Leap 15.4:kernel-default-extra-5.14.21-150400.24.21.2.ppc64le",
            "openSUSE Leap 15.4:kernel-default-extra-5.14.21-150400.24.21.2.s390x",
            "openSUSE Leap 15.4:kernel-default-extra-5.14.21-150400.24.21.2.x86_64",
            "openSUSE Leap 15.4:kernel-default-livepatch-5.14.21-150400.24.21.2.aarch64",
            "openSUSE Leap 15.4:kernel-default-livepatch-5.14.21-150400.24.21.2.ppc64le",
            "openSUSE Leap 15.4:kernel-default-livepatch-5.14.21-150400.24.21.2.s390x",
            "openSUSE Leap 15.4:kernel-default-livepatch-5.14.21-150400.24.21.2.x86_64",
            "openSUSE Leap 15.4:kernel-default-livepatch-devel-5.14.21-150400.24.21.2.aarch64",
            "openSUSE Leap 15.4:kernel-default-livepatch-devel-5.14.21-150400.24.21.2.ppc64le",
            "openSUSE Leap 15.4:kernel-default-livepatch-devel-5.14.21-150400.24.21.2.s390x",
            "openSUSE Leap 15.4:kernel-default-livepatch-devel-5.14.21-150400.24.21.2.x86_64",
            "openSUSE Leap 15.4:kernel-default-optional-5.14.21-150400.24.21.2.aarch64",
            "openSUSE Leap 15.4:kernel-default-optional-5.14.21-150400.24.21.2.ppc64le",
            "openSUSE Leap 15.4:kernel-default-optional-5.14.21-150400.24.21.2.s390x",
            "openSUSE Leap 15.4:kernel-default-optional-5.14.21-150400.24.21.2.x86_64",
            "openSUSE Leap 15.4:kernel-devel-5.14.21-150400.24.21.2.noarch",
            "openSUSE Leap 15.4:kernel-docs-5.14.21-150400.24.21.3.noarch",
            "openSUSE Leap 15.4:kernel-docs-html-5.14.21-150400.24.21.3.noarch",
            "openSUSE Leap 15.4:kernel-kvmsmall-5.14.21-150400.24.21.2.aarch64",
            "openSUSE Leap 15.4:kernel-kvmsmall-5.14.21-150400.24.21.2.ppc64le",
            "openSUSE Leap 15.4:kernel-kvmsmall-5.14.21-150400.24.21.2.x86_64",
            "openSUSE Leap 15.4:kernel-kvmsmall-devel-5.14.21-150400.24.21.2.aarch64",
            "openSUSE Leap 15.4:kernel-kvmsmall-devel-5.14.21-150400.24.21.2.ppc64le",
            "openSUSE Leap 15.4:kernel-kvmsmall-devel-5.14.21-150400.24.21.2.x86_64",
            "openSUSE Leap 15.4:kernel-kvmsmall-livepatch-devel-5.14.21-150400.24.21.2.aarch64",
            "openSUSE Leap 15.4:kernel-kvmsmall-livepatch-devel-5.14.21-150400.24.21.2.ppc64le",
            "openSUSE Leap 15.4:kernel-kvmsmall-livepatch-devel-5.14.21-150400.24.21.2.x86_64",
            "openSUSE Leap 15.4:kernel-macros-5.14.21-150400.24.21.2.noarch",
            "openSUSE Leap 15.4:kernel-obs-build-5.14.21-150400.24.21.2.aarch64",
            "openSUSE Leap 15.4:kernel-obs-build-5.14.21-150400.24.21.2.ppc64le",
            "openSUSE Leap 15.4:kernel-obs-build-5.14.21-150400.24.21.2.s390x",
            "openSUSE Leap 15.4:kernel-obs-build-5.14.21-150400.24.21.2.x86_64",
            "openSUSE Leap 15.4:kernel-obs-qa-5.14.21-150400.24.21.1.aarch64",
            "openSUSE Leap 15.4:kernel-obs-qa-5.14.21-150400.24.21.1.ppc64le",
            "openSUSE Leap 15.4:kernel-obs-qa-5.14.21-150400.24.21.1.s390x",
            "openSUSE Leap 15.4:kernel-obs-qa-5.14.21-150400.24.21.1.x86_64",
            "openSUSE Leap 15.4:kernel-source-5.14.21-150400.24.21.2.noarch",
            "openSUSE Leap 15.4:kernel-source-vanilla-5.14.21-150400.24.21.2.noarch",
            "openSUSE Leap 15.4:kernel-syms-5.14.21-150400.24.21.1.aarch64",
            "openSUSE Leap 15.4:kernel-syms-5.14.21-150400.24.21.1.ppc64le",
            "openSUSE Leap 15.4:kernel-syms-5.14.21-150400.24.21.1.s390x",
            "openSUSE Leap 15.4:kernel-syms-5.14.21-150400.24.21.1.x86_64",
            "openSUSE Leap 15.4:kernel-zfcpdump-5.14.21-150400.24.21.2.s390x",
            "openSUSE Leap 15.4:kselftests-kmp-64kb-5.14.21-150400.24.21.2.aarch64",
            "openSUSE Leap 15.4:kselftests-kmp-default-5.14.21-150400.24.21.2.aarch64",
            "openSUSE Leap 15.4:kselftests-kmp-default-5.14.21-150400.24.21.2.ppc64le",
            "openSUSE Leap 15.4:kselftests-kmp-default-5.14.21-150400.24.21.2.s390x",
            "openSUSE Leap 15.4:kselftests-kmp-default-5.14.21-150400.24.21.2.x86_64",
            "openSUSE Leap 15.4:ocfs2-kmp-64kb-5.14.21-150400.24.21.2.aarch64",
            "openSUSE Leap 15.4:ocfs2-kmp-default-5.14.21-150400.24.21.2.aarch64",
            "openSUSE Leap 15.4:ocfs2-kmp-default-5.14.21-150400.24.21.2.ppc64le",
            "openSUSE Leap 15.4:ocfs2-kmp-default-5.14.21-150400.24.21.2.s390x",
            "openSUSE Leap 15.4:ocfs2-kmp-default-5.14.21-150400.24.21.2.x86_64",
            "openSUSE Leap 15.4:reiserfs-kmp-64kb-5.14.21-150400.24.21.2.aarch64",
            "openSUSE Leap 15.4:reiserfs-kmp-default-5.14.21-150400.24.21.2.aarch64",
            "openSUSE Leap 15.4:reiserfs-kmp-default-5.14.21-150400.24.21.2.ppc64le",
            "openSUSE Leap 15.4:reiserfs-kmp-default-5.14.21-150400.24.21.2.s390x",
            "openSUSE Leap 15.4:reiserfs-kmp-default-5.14.21-150400.24.21.2.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 5.5,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
            "version": "3.1"
          },
          "products": [
            "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.21.2.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.21.2.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.21.2.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.21.2.x86_64",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.21.2.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.21.2.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.21.2.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.21.2.x86_64",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.21.2.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.21.2.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.21.2.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.21.2.x86_64",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.21.2.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.21.2.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.21.2.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.21.2.x86_64",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.21.2.ppc64le",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.21.2.s390x",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.21.2.x86_64",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.21.2.ppc64le",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.21.2.s390x",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.21.2.x86_64",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_21-default-1-150400.9.3.2.ppc64le",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_21-default-1-150400.9.3.2.s390x",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_21-default-1-150400.9.3.2.x86_64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-64kb-5.14.21-150400.24.21.2.aarch64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-64kb-devel-5.14.21-150400.24.21.2.aarch64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-5.14.21-150400.24.21.2.aarch64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-5.14.21-150400.24.21.2.ppc64le",
            "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-5.14.21-150400.24.21.2.s390x",
            "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-5.14.21-150400.24.21.2.x86_64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-base-5.14.21-150400.24.21.2.150400.24.7.2.aarch64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-base-5.14.21-150400.24.21.2.150400.24.7.2.ppc64le",
            "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-base-5.14.21-150400.24.21.2.150400.24.7.2.s390x",
            "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-base-5.14.21-150400.24.21.2.150400.24.7.2.x86_64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-devel-5.14.21-150400.24.21.2.aarch64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-devel-5.14.21-150400.24.21.2.ppc64le",
            "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-devel-5.14.21-150400.24.21.2.s390x",
            "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-devel-5.14.21-150400.24.21.2.x86_64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-devel-5.14.21-150400.24.21.2.noarch",
            "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-macros-5.14.21-150400.24.21.2.noarch",
            "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-zfcpdump-5.14.21-150400.24.21.2.s390x",
            "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-docs-5.14.21-150400.24.21.3.noarch",
            "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-obs-build-5.14.21-150400.24.21.2.aarch64",
            "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-obs-build-5.14.21-150400.24.21.2.ppc64le",
            "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-obs-build-5.14.21-150400.24.21.2.s390x",
            "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-obs-build-5.14.21-150400.24.21.2.x86_64",
            "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-source-5.14.21-150400.24.21.2.noarch",
            "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-syms-5.14.21-150400.24.21.1.aarch64",
            "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-syms-5.14.21-150400.24.21.1.ppc64le",
            "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-syms-5.14.21-150400.24.21.1.s390x",
            "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-syms-5.14.21-150400.24.21.1.x86_64",
            "SUSE Linux Enterprise Module for Legacy 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.21.2.aarch64",
            "SUSE Linux Enterprise Module for Legacy 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.21.2.ppc64le",
            "SUSE Linux Enterprise Module for Legacy 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.21.2.s390x",
            "SUSE Linux Enterprise Module for Legacy 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.21.2.x86_64",
            "SUSE Linux Enterprise Workstation Extension 15 SP4:kernel-default-extra-5.14.21-150400.24.21.2.x86_64",
            "openSUSE Leap 15.4:cluster-md-kmp-64kb-5.14.21-150400.24.21.2.aarch64",
            "openSUSE Leap 15.4:cluster-md-kmp-default-5.14.21-150400.24.21.2.aarch64",
            "openSUSE Leap 15.4:cluster-md-kmp-default-5.14.21-150400.24.21.2.ppc64le",
            "openSUSE Leap 15.4:cluster-md-kmp-default-5.14.21-150400.24.21.2.s390x",
            "openSUSE Leap 15.4:cluster-md-kmp-default-5.14.21-150400.24.21.2.x86_64",
            "openSUSE Leap 15.4:dlm-kmp-64kb-5.14.21-150400.24.21.2.aarch64",
            "openSUSE Leap 15.4:dlm-kmp-default-5.14.21-150400.24.21.2.aarch64",
            "openSUSE Leap 15.4:dlm-kmp-default-5.14.21-150400.24.21.2.ppc64le",
            "openSUSE Leap 15.4:dlm-kmp-default-5.14.21-150400.24.21.2.s390x",
            "openSUSE Leap 15.4:dlm-kmp-default-5.14.21-150400.24.21.2.x86_64",
            "openSUSE Leap 15.4:dtb-allwinner-5.14.21-150400.24.21.1.aarch64",
            "openSUSE Leap 15.4:dtb-altera-5.14.21-150400.24.21.1.aarch64",
            "openSUSE Leap 15.4:dtb-amazon-5.14.21-150400.24.21.1.aarch64",
            "openSUSE Leap 15.4:dtb-amd-5.14.21-150400.24.21.1.aarch64",
            "openSUSE Leap 15.4:dtb-amlogic-5.14.21-150400.24.21.1.aarch64",
            "openSUSE Leap 15.4:dtb-apm-5.14.21-150400.24.21.1.aarch64",
            "openSUSE Leap 15.4:dtb-apple-5.14.21-150400.24.21.1.aarch64",
            "openSUSE Leap 15.4:dtb-arm-5.14.21-150400.24.21.1.aarch64",
            "openSUSE Leap 15.4:dtb-broadcom-5.14.21-150400.24.21.1.aarch64",
            "openSUSE Leap 15.4:dtb-cavium-5.14.21-150400.24.21.1.aarch64",
            "openSUSE Leap 15.4:dtb-exynos-5.14.21-150400.24.21.1.aarch64",
            "openSUSE Leap 15.4:dtb-freescale-5.14.21-150400.24.21.1.aarch64",
            "openSUSE Leap 15.4:dtb-hisilicon-5.14.21-150400.24.21.1.aarch64",
            "openSUSE Leap 15.4:dtb-lg-5.14.21-150400.24.21.1.aarch64",
            "openSUSE Leap 15.4:dtb-marvell-5.14.21-150400.24.21.1.aarch64",
            "openSUSE Leap 15.4:dtb-mediatek-5.14.21-150400.24.21.1.aarch64",
            "openSUSE Leap 15.4:dtb-nvidia-5.14.21-150400.24.21.1.aarch64",
            "openSUSE Leap 15.4:dtb-qcom-5.14.21-150400.24.21.1.aarch64",
            "openSUSE Leap 15.4:dtb-renesas-5.14.21-150400.24.21.1.aarch64",
            "openSUSE Leap 15.4:dtb-rockchip-5.14.21-150400.24.21.1.aarch64",
            "openSUSE Leap 15.4:dtb-socionext-5.14.21-150400.24.21.1.aarch64",
            "openSUSE Leap 15.4:dtb-sprd-5.14.21-150400.24.21.1.aarch64",
            "openSUSE Leap 15.4:dtb-xilinx-5.14.21-150400.24.21.1.aarch64",
            "openSUSE Leap 15.4:gfs2-kmp-64kb-5.14.21-150400.24.21.2.aarch64",
            "openSUSE Leap 15.4:gfs2-kmp-default-5.14.21-150400.24.21.2.aarch64",
            "openSUSE Leap 15.4:gfs2-kmp-default-5.14.21-150400.24.21.2.ppc64le",
            "openSUSE Leap 15.4:gfs2-kmp-default-5.14.21-150400.24.21.2.s390x",
            "openSUSE Leap 15.4:gfs2-kmp-default-5.14.21-150400.24.21.2.x86_64",
            "openSUSE Leap 15.4:kernel-64kb-5.14.21-150400.24.21.2.aarch64",
            "openSUSE Leap 15.4:kernel-64kb-devel-5.14.21-150400.24.21.2.aarch64",
            "openSUSE Leap 15.4:kernel-64kb-extra-5.14.21-150400.24.21.2.aarch64",
            "openSUSE Leap 15.4:kernel-64kb-livepatch-devel-5.14.21-150400.24.21.2.aarch64",
            "openSUSE Leap 15.4:kernel-64kb-optional-5.14.21-150400.24.21.2.aarch64",
            "openSUSE Leap 15.4:kernel-debug-5.14.21-150400.24.21.2.ppc64le",
            "openSUSE Leap 15.4:kernel-debug-5.14.21-150400.24.21.2.x86_64",
            "openSUSE Leap 15.4:kernel-debug-devel-5.14.21-150400.24.21.2.ppc64le",
            "openSUSE Leap 15.4:kernel-debug-devel-5.14.21-150400.24.21.2.x86_64",
            "openSUSE Leap 15.4:kernel-debug-livepatch-devel-5.14.21-150400.24.21.2.ppc64le",
            "openSUSE Leap 15.4:kernel-debug-livepatch-devel-5.14.21-150400.24.21.2.x86_64",
            "openSUSE Leap 15.4:kernel-default-5.14.21-150400.24.21.2.aarch64",
            "openSUSE Leap 15.4:kernel-default-5.14.21-150400.24.21.2.ppc64le",
            "openSUSE Leap 15.4:kernel-default-5.14.21-150400.24.21.2.s390x",
            "openSUSE Leap 15.4:kernel-default-5.14.21-150400.24.21.2.x86_64",
            "openSUSE Leap 15.4:kernel-default-base-5.14.21-150400.24.21.2.150400.24.7.2.aarch64",
            "openSUSE Leap 15.4:kernel-default-base-5.14.21-150400.24.21.2.150400.24.7.2.ppc64le",
            "openSUSE Leap 15.4:kernel-default-base-5.14.21-150400.24.21.2.150400.24.7.2.s390x",
            "openSUSE Leap 15.4:kernel-default-base-5.14.21-150400.24.21.2.150400.24.7.2.x86_64",
            "openSUSE Leap 15.4:kernel-default-base-rebuild-5.14.21-150400.24.21.2.150400.24.7.2.aarch64",
            "openSUSE Leap 15.4:kernel-default-base-rebuild-5.14.21-150400.24.21.2.150400.24.7.2.ppc64le",
            "openSUSE Leap 15.4:kernel-default-base-rebuild-5.14.21-150400.24.21.2.150400.24.7.2.s390x",
            "openSUSE Leap 15.4:kernel-default-base-rebuild-5.14.21-150400.24.21.2.150400.24.7.2.x86_64",
            "openSUSE Leap 15.4:kernel-default-devel-5.14.21-150400.24.21.2.aarch64",
            "openSUSE Leap 15.4:kernel-default-devel-5.14.21-150400.24.21.2.ppc64le",
            "openSUSE Leap 15.4:kernel-default-devel-5.14.21-150400.24.21.2.s390x",
            "openSUSE Leap 15.4:kernel-default-devel-5.14.21-150400.24.21.2.x86_64",
            "openSUSE Leap 15.4:kernel-default-extra-5.14.21-150400.24.21.2.aarch64",
            "openSUSE Leap 15.4:kernel-default-extra-5.14.21-150400.24.21.2.ppc64le",
            "openSUSE Leap 15.4:kernel-default-extra-5.14.21-150400.24.21.2.s390x",
            "openSUSE Leap 15.4:kernel-default-extra-5.14.21-150400.24.21.2.x86_64",
            "openSUSE Leap 15.4:kernel-default-livepatch-5.14.21-150400.24.21.2.aarch64",
            "openSUSE Leap 15.4:kernel-default-livepatch-5.14.21-150400.24.21.2.ppc64le",
            "openSUSE Leap 15.4:kernel-default-livepatch-5.14.21-150400.24.21.2.s390x",
            "openSUSE Leap 15.4:kernel-default-livepatch-5.14.21-150400.24.21.2.x86_64",
            "openSUSE Leap 15.4:kernel-default-livepatch-devel-5.14.21-150400.24.21.2.aarch64",
            "openSUSE Leap 15.4:kernel-default-livepatch-devel-5.14.21-150400.24.21.2.ppc64le",
            "openSUSE Leap 15.4:kernel-default-livepatch-devel-5.14.21-150400.24.21.2.s390x",
            "openSUSE Leap 15.4:kernel-default-livepatch-devel-5.14.21-150400.24.21.2.x86_64",
            "openSUSE Leap 15.4:kernel-default-optional-5.14.21-150400.24.21.2.aarch64",
            "openSUSE Leap 15.4:kernel-default-optional-5.14.21-150400.24.21.2.ppc64le",
            "openSUSE Leap 15.4:kernel-default-optional-5.14.21-150400.24.21.2.s390x",
            "openSUSE Leap 15.4:kernel-default-optional-5.14.21-150400.24.21.2.x86_64",
            "openSUSE Leap 15.4:kernel-devel-5.14.21-150400.24.21.2.noarch",
            "openSUSE Leap 15.4:kernel-docs-5.14.21-150400.24.21.3.noarch",
            "openSUSE Leap 15.4:kernel-docs-html-5.14.21-150400.24.21.3.noarch",
            "openSUSE Leap 15.4:kernel-kvmsmall-5.14.21-150400.24.21.2.aarch64",
            "openSUSE Leap 15.4:kernel-kvmsmall-5.14.21-150400.24.21.2.ppc64le",
            "openSUSE Leap 15.4:kernel-kvmsmall-5.14.21-150400.24.21.2.x86_64",
            "openSUSE Leap 15.4:kernel-kvmsmall-devel-5.14.21-150400.24.21.2.aarch64",
            "openSUSE Leap 15.4:kernel-kvmsmall-devel-5.14.21-150400.24.21.2.ppc64le",
            "openSUSE Leap 15.4:kernel-kvmsmall-devel-5.14.21-150400.24.21.2.x86_64",
            "openSUSE Leap 15.4:kernel-kvmsmall-livepatch-devel-5.14.21-150400.24.21.2.aarch64",
            "openSUSE Leap 15.4:kernel-kvmsmall-livepatch-devel-5.14.21-150400.24.21.2.ppc64le",
            "openSUSE Leap 15.4:kernel-kvmsmall-livepatch-devel-5.14.21-150400.24.21.2.x86_64",
            "openSUSE Leap 15.4:kernel-macros-5.14.21-150400.24.21.2.noarch",
            "openSUSE Leap 15.4:kernel-obs-build-5.14.21-150400.24.21.2.aarch64",
            "openSUSE Leap 15.4:kernel-obs-build-5.14.21-150400.24.21.2.ppc64le",
            "openSUSE Leap 15.4:kernel-obs-build-5.14.21-150400.24.21.2.s390x",
            "openSUSE Leap 15.4:kernel-obs-build-5.14.21-150400.24.21.2.x86_64",
            "openSUSE Leap 15.4:kernel-obs-qa-5.14.21-150400.24.21.1.aarch64",
            "openSUSE Leap 15.4:kernel-obs-qa-5.14.21-150400.24.21.1.ppc64le",
            "openSUSE Leap 15.4:kernel-obs-qa-5.14.21-150400.24.21.1.s390x",
            "openSUSE Leap 15.4:kernel-obs-qa-5.14.21-150400.24.21.1.x86_64",
            "openSUSE Leap 15.4:kernel-source-5.14.21-150400.24.21.2.noarch",
            "openSUSE Leap 15.4:kernel-source-vanilla-5.14.21-150400.24.21.2.noarch",
            "openSUSE Leap 15.4:kernel-syms-5.14.21-150400.24.21.1.aarch64",
            "openSUSE Leap 15.4:kernel-syms-5.14.21-150400.24.21.1.ppc64le",
            "openSUSE Leap 15.4:kernel-syms-5.14.21-150400.24.21.1.s390x",
            "openSUSE Leap 15.4:kernel-syms-5.14.21-150400.24.21.1.x86_64",
            "openSUSE Leap 15.4:kernel-zfcpdump-5.14.21-150400.24.21.2.s390x",
            "openSUSE Leap 15.4:kselftests-kmp-64kb-5.14.21-150400.24.21.2.aarch64",
            "openSUSE Leap 15.4:kselftests-kmp-default-5.14.21-150400.24.21.2.aarch64",
            "openSUSE Leap 15.4:kselftests-kmp-default-5.14.21-150400.24.21.2.ppc64le",
            "openSUSE Leap 15.4:kselftests-kmp-default-5.14.21-150400.24.21.2.s390x",
            "openSUSE Leap 15.4:kselftests-kmp-default-5.14.21-150400.24.21.2.x86_64",
            "openSUSE Leap 15.4:ocfs2-kmp-64kb-5.14.21-150400.24.21.2.aarch64",
            "openSUSE Leap 15.4:ocfs2-kmp-default-5.14.21-150400.24.21.2.aarch64",
            "openSUSE Leap 15.4:ocfs2-kmp-default-5.14.21-150400.24.21.2.ppc64le",
            "openSUSE Leap 15.4:ocfs2-kmp-default-5.14.21-150400.24.21.2.s390x",
            "openSUSE Leap 15.4:ocfs2-kmp-default-5.14.21-150400.24.21.2.x86_64",
            "openSUSE Leap 15.4:reiserfs-kmp-64kb-5.14.21-150400.24.21.2.aarch64",
            "openSUSE Leap 15.4:reiserfs-kmp-default-5.14.21-150400.24.21.2.aarch64",
            "openSUSE Leap 15.4:reiserfs-kmp-default-5.14.21-150400.24.21.2.ppc64le",
            "openSUSE Leap 15.4:reiserfs-kmp-default-5.14.21-150400.24.21.2.s390x",
            "openSUSE Leap 15.4:reiserfs-kmp-default-5.14.21-150400.24.21.2.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2022-09-16T15:30:19Z",
          "details": "moderate"
        }
      ],
      "title": "CVE-2022-20368"
    },
    {
      "cve": "CVE-2022-20369",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2022-20369"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "In v4l2_m2m_querybuf of v4l2-mem2mem.c, there is a possible out of bounds write due to improper input validation. This could lead to local escalation of privilege with System execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android kernelAndroid ID: A-223375145References: Upstream kernel",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.21.2.aarch64",
          "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.21.2.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.21.2.s390x",
          "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.21.2.x86_64",
          "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.21.2.aarch64",
          "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.21.2.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.21.2.s390x",
          "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.21.2.x86_64",
          "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.21.2.aarch64",
          "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.21.2.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.21.2.s390x",
          "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.21.2.x86_64",
          "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.21.2.aarch64",
          "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.21.2.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.21.2.s390x",
          "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.21.2.x86_64",
          "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.21.2.ppc64le",
          "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.21.2.s390x",
          "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.21.2.x86_64",
          "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.21.2.ppc64le",
          "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.21.2.s390x",
          "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.21.2.x86_64",
          "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_21-default-1-150400.9.3.2.ppc64le",
          "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_21-default-1-150400.9.3.2.s390x",
          "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_21-default-1-150400.9.3.2.x86_64",
          "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-64kb-5.14.21-150400.24.21.2.aarch64",
          "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-64kb-devel-5.14.21-150400.24.21.2.aarch64",
          "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-5.14.21-150400.24.21.2.aarch64",
          "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-5.14.21-150400.24.21.2.ppc64le",
          "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-5.14.21-150400.24.21.2.s390x",
          "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-5.14.21-150400.24.21.2.x86_64",
          "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-base-5.14.21-150400.24.21.2.150400.24.7.2.aarch64",
          "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-base-5.14.21-150400.24.21.2.150400.24.7.2.ppc64le",
          "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-base-5.14.21-150400.24.21.2.150400.24.7.2.s390x",
          "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-base-5.14.21-150400.24.21.2.150400.24.7.2.x86_64",
          "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-devel-5.14.21-150400.24.21.2.aarch64",
          "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-devel-5.14.21-150400.24.21.2.ppc64le",
          "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-devel-5.14.21-150400.24.21.2.s390x",
          "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-devel-5.14.21-150400.24.21.2.x86_64",
          "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-devel-5.14.21-150400.24.21.2.noarch",
          "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-macros-5.14.21-150400.24.21.2.noarch",
          "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-zfcpdump-5.14.21-150400.24.21.2.s390x",
          "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-docs-5.14.21-150400.24.21.3.noarch",
          "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-obs-build-5.14.21-150400.24.21.2.aarch64",
          "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-obs-build-5.14.21-150400.24.21.2.ppc64le",
          "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-obs-build-5.14.21-150400.24.21.2.s390x",
          "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-obs-build-5.14.21-150400.24.21.2.x86_64",
          "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-source-5.14.21-150400.24.21.2.noarch",
          "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-syms-5.14.21-150400.24.21.1.aarch64",
          "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-syms-5.14.21-150400.24.21.1.ppc64le",
          "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-syms-5.14.21-150400.24.21.1.s390x",
          "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-syms-5.14.21-150400.24.21.1.x86_64",
          "SUSE Linux Enterprise Module for Legacy 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.21.2.aarch64",
          "SUSE Linux Enterprise Module for Legacy 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.21.2.ppc64le",
          "SUSE Linux Enterprise Module for Legacy 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.21.2.s390x",
          "SUSE Linux Enterprise Module for Legacy 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.21.2.x86_64",
          "SUSE Linux Enterprise Workstation Extension 15 SP4:kernel-default-extra-5.14.21-150400.24.21.2.x86_64",
          "openSUSE Leap 15.4:cluster-md-kmp-64kb-5.14.21-150400.24.21.2.aarch64",
          "openSUSE Leap 15.4:cluster-md-kmp-default-5.14.21-150400.24.21.2.aarch64",
          "openSUSE Leap 15.4:cluster-md-kmp-default-5.14.21-150400.24.21.2.ppc64le",
          "openSUSE Leap 15.4:cluster-md-kmp-default-5.14.21-150400.24.21.2.s390x",
          "openSUSE Leap 15.4:cluster-md-kmp-default-5.14.21-150400.24.21.2.x86_64",
          "openSUSE Leap 15.4:dlm-kmp-64kb-5.14.21-150400.24.21.2.aarch64",
          "openSUSE Leap 15.4:dlm-kmp-default-5.14.21-150400.24.21.2.aarch64",
          "openSUSE Leap 15.4:dlm-kmp-default-5.14.21-150400.24.21.2.ppc64le",
          "openSUSE Leap 15.4:dlm-kmp-default-5.14.21-150400.24.21.2.s390x",
          "openSUSE Leap 15.4:dlm-kmp-default-5.14.21-150400.24.21.2.x86_64",
          "openSUSE Leap 15.4:dtb-allwinner-5.14.21-150400.24.21.1.aarch64",
          "openSUSE Leap 15.4:dtb-altera-5.14.21-150400.24.21.1.aarch64",
          "openSUSE Leap 15.4:dtb-amazon-5.14.21-150400.24.21.1.aarch64",
          "openSUSE Leap 15.4:dtb-amd-5.14.21-150400.24.21.1.aarch64",
          "openSUSE Leap 15.4:dtb-amlogic-5.14.21-150400.24.21.1.aarch64",
          "openSUSE Leap 15.4:dtb-apm-5.14.21-150400.24.21.1.aarch64",
          "openSUSE Leap 15.4:dtb-apple-5.14.21-150400.24.21.1.aarch64",
          "openSUSE Leap 15.4:dtb-arm-5.14.21-150400.24.21.1.aarch64",
          "openSUSE Leap 15.4:dtb-broadcom-5.14.21-150400.24.21.1.aarch64",
          "openSUSE Leap 15.4:dtb-cavium-5.14.21-150400.24.21.1.aarch64",
          "openSUSE Leap 15.4:dtb-exynos-5.14.21-150400.24.21.1.aarch64",
          "openSUSE Leap 15.4:dtb-freescale-5.14.21-150400.24.21.1.aarch64",
          "openSUSE Leap 15.4:dtb-hisilicon-5.14.21-150400.24.21.1.aarch64",
          "openSUSE Leap 15.4:dtb-lg-5.14.21-150400.24.21.1.aarch64",
          "openSUSE Leap 15.4:dtb-marvell-5.14.21-150400.24.21.1.aarch64",
          "openSUSE Leap 15.4:dtb-mediatek-5.14.21-150400.24.21.1.aarch64",
          "openSUSE Leap 15.4:dtb-nvidia-5.14.21-150400.24.21.1.aarch64",
          "openSUSE Leap 15.4:dtb-qcom-5.14.21-150400.24.21.1.aarch64",
          "openSUSE Leap 15.4:dtb-renesas-5.14.21-150400.24.21.1.aarch64",
          "openSUSE Leap 15.4:dtb-rockchip-5.14.21-150400.24.21.1.aarch64",
          "openSUSE Leap 15.4:dtb-socionext-5.14.21-150400.24.21.1.aarch64",
          "openSUSE Leap 15.4:dtb-sprd-5.14.21-150400.24.21.1.aarch64",
          "openSUSE Leap 15.4:dtb-xilinx-5.14.21-150400.24.21.1.aarch64",
          "openSUSE Leap 15.4:gfs2-kmp-64kb-5.14.21-150400.24.21.2.aarch64",
          "openSUSE Leap 15.4:gfs2-kmp-default-5.14.21-150400.24.21.2.aarch64",
          "openSUSE Leap 15.4:gfs2-kmp-default-5.14.21-150400.24.21.2.ppc64le",
          "openSUSE Leap 15.4:gfs2-kmp-default-5.14.21-150400.24.21.2.s390x",
          "openSUSE Leap 15.4:gfs2-kmp-default-5.14.21-150400.24.21.2.x86_64",
          "openSUSE Leap 15.4:kernel-64kb-5.14.21-150400.24.21.2.aarch64",
          "openSUSE Leap 15.4:kernel-64kb-devel-5.14.21-150400.24.21.2.aarch64",
          "openSUSE Leap 15.4:kernel-64kb-extra-5.14.21-150400.24.21.2.aarch64",
          "openSUSE Leap 15.4:kernel-64kb-livepatch-devel-5.14.21-150400.24.21.2.aarch64",
          "openSUSE Leap 15.4:kernel-64kb-optional-5.14.21-150400.24.21.2.aarch64",
          "openSUSE Leap 15.4:kernel-debug-5.14.21-150400.24.21.2.ppc64le",
          "openSUSE Leap 15.4:kernel-debug-5.14.21-150400.24.21.2.x86_64",
          "openSUSE Leap 15.4:kernel-debug-devel-5.14.21-150400.24.21.2.ppc64le",
          "openSUSE Leap 15.4:kernel-debug-devel-5.14.21-150400.24.21.2.x86_64",
          "openSUSE Leap 15.4:kernel-debug-livepatch-devel-5.14.21-150400.24.21.2.ppc64le",
          "openSUSE Leap 15.4:kernel-debug-livepatch-devel-5.14.21-150400.24.21.2.x86_64",
          "openSUSE Leap 15.4:kernel-default-5.14.21-150400.24.21.2.aarch64",
          "openSUSE Leap 15.4:kernel-default-5.14.21-150400.24.21.2.ppc64le",
          "openSUSE Leap 15.4:kernel-default-5.14.21-150400.24.21.2.s390x",
          "openSUSE Leap 15.4:kernel-default-5.14.21-150400.24.21.2.x86_64",
          "openSUSE Leap 15.4:kernel-default-base-5.14.21-150400.24.21.2.150400.24.7.2.aarch64",
          "openSUSE Leap 15.4:kernel-default-base-5.14.21-150400.24.21.2.150400.24.7.2.ppc64le",
          "openSUSE Leap 15.4:kernel-default-base-5.14.21-150400.24.21.2.150400.24.7.2.s390x",
          "openSUSE Leap 15.4:kernel-default-base-5.14.21-150400.24.21.2.150400.24.7.2.x86_64",
          "openSUSE Leap 15.4:kernel-default-base-rebuild-5.14.21-150400.24.21.2.150400.24.7.2.aarch64",
          "openSUSE Leap 15.4:kernel-default-base-rebuild-5.14.21-150400.24.21.2.150400.24.7.2.ppc64le",
          "openSUSE Leap 15.4:kernel-default-base-rebuild-5.14.21-150400.24.21.2.150400.24.7.2.s390x",
          "openSUSE Leap 15.4:kernel-default-base-rebuild-5.14.21-150400.24.21.2.150400.24.7.2.x86_64",
          "openSUSE Leap 15.4:kernel-default-devel-5.14.21-150400.24.21.2.aarch64",
          "openSUSE Leap 15.4:kernel-default-devel-5.14.21-150400.24.21.2.ppc64le",
          "openSUSE Leap 15.4:kernel-default-devel-5.14.21-150400.24.21.2.s390x",
          "openSUSE Leap 15.4:kernel-default-devel-5.14.21-150400.24.21.2.x86_64",
          "openSUSE Leap 15.4:kernel-default-extra-5.14.21-150400.24.21.2.aarch64",
          "openSUSE Leap 15.4:kernel-default-extra-5.14.21-150400.24.21.2.ppc64le",
          "openSUSE Leap 15.4:kernel-default-extra-5.14.21-150400.24.21.2.s390x",
          "openSUSE Leap 15.4:kernel-default-extra-5.14.21-150400.24.21.2.x86_64",
          "openSUSE Leap 15.4:kernel-default-livepatch-5.14.21-150400.24.21.2.aarch64",
          "openSUSE Leap 15.4:kernel-default-livepatch-5.14.21-150400.24.21.2.ppc64le",
          "openSUSE Leap 15.4:kernel-default-livepatch-5.14.21-150400.24.21.2.s390x",
          "openSUSE Leap 15.4:kernel-default-livepatch-5.14.21-150400.24.21.2.x86_64",
          "openSUSE Leap 15.4:kernel-default-livepatch-devel-5.14.21-150400.24.21.2.aarch64",
          "openSUSE Leap 15.4:kernel-default-livepatch-devel-5.14.21-150400.24.21.2.ppc64le",
          "openSUSE Leap 15.4:kernel-default-livepatch-devel-5.14.21-150400.24.21.2.s390x",
          "openSUSE Leap 15.4:kernel-default-livepatch-devel-5.14.21-150400.24.21.2.x86_64",
          "openSUSE Leap 15.4:kernel-default-optional-5.14.21-150400.24.21.2.aarch64",
          "openSUSE Leap 15.4:kernel-default-optional-5.14.21-150400.24.21.2.ppc64le",
          "openSUSE Leap 15.4:kernel-default-optional-5.14.21-150400.24.21.2.s390x",
          "openSUSE Leap 15.4:kernel-default-optional-5.14.21-150400.24.21.2.x86_64",
          "openSUSE Leap 15.4:kernel-devel-5.14.21-150400.24.21.2.noarch",
          "openSUSE Leap 15.4:kernel-docs-5.14.21-150400.24.21.3.noarch",
          "openSUSE Leap 15.4:kernel-docs-html-5.14.21-150400.24.21.3.noarch",
          "openSUSE Leap 15.4:kernel-kvmsmall-5.14.21-150400.24.21.2.aarch64",
          "openSUSE Leap 15.4:kernel-kvmsmall-5.14.21-150400.24.21.2.ppc64le",
          "openSUSE Leap 15.4:kernel-kvmsmall-5.14.21-150400.24.21.2.x86_64",
          "openSUSE Leap 15.4:kernel-kvmsmall-devel-5.14.21-150400.24.21.2.aarch64",
          "openSUSE Leap 15.4:kernel-kvmsmall-devel-5.14.21-150400.24.21.2.ppc64le",
          "openSUSE Leap 15.4:kernel-kvmsmall-devel-5.14.21-150400.24.21.2.x86_64",
          "openSUSE Leap 15.4:kernel-kvmsmall-livepatch-devel-5.14.21-150400.24.21.2.aarch64",
          "openSUSE Leap 15.4:kernel-kvmsmall-livepatch-devel-5.14.21-150400.24.21.2.ppc64le",
          "openSUSE Leap 15.4:kernel-kvmsmall-livepatch-devel-5.14.21-150400.24.21.2.x86_64",
          "openSUSE Leap 15.4:kernel-macros-5.14.21-150400.24.21.2.noarch",
          "openSUSE Leap 15.4:kernel-obs-build-5.14.21-150400.24.21.2.aarch64",
          "openSUSE Leap 15.4:kernel-obs-build-5.14.21-150400.24.21.2.ppc64le",
          "openSUSE Leap 15.4:kernel-obs-build-5.14.21-150400.24.21.2.s390x",
          "openSUSE Leap 15.4:kernel-obs-build-5.14.21-150400.24.21.2.x86_64",
          "openSUSE Leap 15.4:kernel-obs-qa-5.14.21-150400.24.21.1.aarch64",
          "openSUSE Leap 15.4:kernel-obs-qa-5.14.21-150400.24.21.1.ppc64le",
          "openSUSE Leap 15.4:kernel-obs-qa-5.14.21-150400.24.21.1.s390x",
          "openSUSE Leap 15.4:kernel-obs-qa-5.14.21-150400.24.21.1.x86_64",
          "openSUSE Leap 15.4:kernel-source-5.14.21-150400.24.21.2.noarch",
          "openSUSE Leap 15.4:kernel-source-vanilla-5.14.21-150400.24.21.2.noarch",
          "openSUSE Leap 15.4:kernel-syms-5.14.21-150400.24.21.1.aarch64",
          "openSUSE Leap 15.4:kernel-syms-5.14.21-150400.24.21.1.ppc64le",
          "openSUSE Leap 15.4:kernel-syms-5.14.21-150400.24.21.1.s390x",
          "openSUSE Leap 15.4:kernel-syms-5.14.21-150400.24.21.1.x86_64",
          "openSUSE Leap 15.4:kernel-zfcpdump-5.14.21-150400.24.21.2.s390x",
          "openSUSE Leap 15.4:kselftests-kmp-64kb-5.14.21-150400.24.21.2.aarch64",
          "openSUSE Leap 15.4:kselftests-kmp-default-5.14.21-150400.24.21.2.aarch64",
          "openSUSE Leap 15.4:kselftests-kmp-default-5.14.21-150400.24.21.2.ppc64le",
          "openSUSE Leap 15.4:kselftests-kmp-default-5.14.21-150400.24.21.2.s390x",
          "openSUSE Leap 15.4:kselftests-kmp-default-5.14.21-150400.24.21.2.x86_64",
          "openSUSE Leap 15.4:ocfs2-kmp-64kb-5.14.21-150400.24.21.2.aarch64",
          "openSUSE Leap 15.4:ocfs2-kmp-default-5.14.21-150400.24.21.2.aarch64",
          "openSUSE Leap 15.4:ocfs2-kmp-default-5.14.21-150400.24.21.2.ppc64le",
          "openSUSE Leap 15.4:ocfs2-kmp-default-5.14.21-150400.24.21.2.s390x",
          "openSUSE Leap 15.4:ocfs2-kmp-default-5.14.21-150400.24.21.2.x86_64",
          "openSUSE Leap 15.4:reiserfs-kmp-64kb-5.14.21-150400.24.21.2.aarch64",
          "openSUSE Leap 15.4:reiserfs-kmp-default-5.14.21-150400.24.21.2.aarch64",
          "openSUSE Leap 15.4:reiserfs-kmp-default-5.14.21-150400.24.21.2.ppc64le",
          "openSUSE Leap 15.4:reiserfs-kmp-default-5.14.21-150400.24.21.2.s390x",
          "openSUSE Leap 15.4:reiserfs-kmp-default-5.14.21-150400.24.21.2.x86_64"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2022-20369",
          "url": "https://www.suse.com/security/cve/CVE-2022-20369"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1202347 for CVE-2022-20369",
          "url": "https://bugzilla.suse.com/1202347"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1212321 for CVE-2022-20369",
          "url": "https://bugzilla.suse.com/1212321"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.21.2.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.21.2.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.21.2.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.21.2.x86_64",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.21.2.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.21.2.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.21.2.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.21.2.x86_64",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.21.2.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.21.2.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.21.2.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.21.2.x86_64",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.21.2.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.21.2.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.21.2.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.21.2.x86_64",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.21.2.ppc64le",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.21.2.s390x",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.21.2.x86_64",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.21.2.ppc64le",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.21.2.s390x",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.21.2.x86_64",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_21-default-1-150400.9.3.2.ppc64le",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_21-default-1-150400.9.3.2.s390x",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_21-default-1-150400.9.3.2.x86_64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-64kb-5.14.21-150400.24.21.2.aarch64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-64kb-devel-5.14.21-150400.24.21.2.aarch64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-5.14.21-150400.24.21.2.aarch64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-5.14.21-150400.24.21.2.ppc64le",
            "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-5.14.21-150400.24.21.2.s390x",
            "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-5.14.21-150400.24.21.2.x86_64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-base-5.14.21-150400.24.21.2.150400.24.7.2.aarch64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-base-5.14.21-150400.24.21.2.150400.24.7.2.ppc64le",
            "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-base-5.14.21-150400.24.21.2.150400.24.7.2.s390x",
            "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-base-5.14.21-150400.24.21.2.150400.24.7.2.x86_64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-devel-5.14.21-150400.24.21.2.aarch64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-devel-5.14.21-150400.24.21.2.ppc64le",
            "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-devel-5.14.21-150400.24.21.2.s390x",
            "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-devel-5.14.21-150400.24.21.2.x86_64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-devel-5.14.21-150400.24.21.2.noarch",
            "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-macros-5.14.21-150400.24.21.2.noarch",
            "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-zfcpdump-5.14.21-150400.24.21.2.s390x",
            "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-docs-5.14.21-150400.24.21.3.noarch",
            "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-obs-build-5.14.21-150400.24.21.2.aarch64",
            "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-obs-build-5.14.21-150400.24.21.2.ppc64le",
            "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-obs-build-5.14.21-150400.24.21.2.s390x",
            "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-obs-build-5.14.21-150400.24.21.2.x86_64",
            "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-source-5.14.21-150400.24.21.2.noarch",
            "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-syms-5.14.21-150400.24.21.1.aarch64",
            "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-syms-5.14.21-150400.24.21.1.ppc64le",
            "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-syms-5.14.21-150400.24.21.1.s390x",
            "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-syms-5.14.21-150400.24.21.1.x86_64",
            "SUSE Linux Enterprise Module for Legacy 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.21.2.aarch64",
            "SUSE Linux Enterprise Module for Legacy 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.21.2.ppc64le",
            "SUSE Linux Enterprise Module for Legacy 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.21.2.s390x",
            "SUSE Linux Enterprise Module for Legacy 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.21.2.x86_64",
            "SUSE Linux Enterprise Workstation Extension 15 SP4:kernel-default-extra-5.14.21-150400.24.21.2.x86_64",
            "openSUSE Leap 15.4:cluster-md-kmp-64kb-5.14.21-150400.24.21.2.aarch64",
            "openSUSE Leap 15.4:cluster-md-kmp-default-5.14.21-150400.24.21.2.aarch64",
            "openSUSE Leap 15.4:cluster-md-kmp-default-5.14.21-150400.24.21.2.ppc64le",
            "openSUSE Leap 15.4:cluster-md-kmp-default-5.14.21-150400.24.21.2.s390x",
            "openSUSE Leap 15.4:cluster-md-kmp-default-5.14.21-150400.24.21.2.x86_64",
            "openSUSE Leap 15.4:dlm-kmp-64kb-5.14.21-150400.24.21.2.aarch64",
            "openSUSE Leap 15.4:dlm-kmp-default-5.14.21-150400.24.21.2.aarch64",
            "openSUSE Leap 15.4:dlm-kmp-default-5.14.21-150400.24.21.2.ppc64le",
            "openSUSE Leap 15.4:dlm-kmp-default-5.14.21-150400.24.21.2.s390x",
            "openSUSE Leap 15.4:dlm-kmp-default-5.14.21-150400.24.21.2.x86_64",
            "openSUSE Leap 15.4:dtb-allwinner-5.14.21-150400.24.21.1.aarch64",
            "openSUSE Leap 15.4:dtb-altera-5.14.21-150400.24.21.1.aarch64",
            "openSUSE Leap 15.4:dtb-amazon-5.14.21-150400.24.21.1.aarch64",
            "openSUSE Leap 15.4:dtb-amd-5.14.21-150400.24.21.1.aarch64",
            "openSUSE Leap 15.4:dtb-amlogic-5.14.21-150400.24.21.1.aarch64",
            "openSUSE Leap 15.4:dtb-apm-5.14.21-150400.24.21.1.aarch64",
            "openSUSE Leap 15.4:dtb-apple-5.14.21-150400.24.21.1.aarch64",
            "openSUSE Leap 15.4:dtb-arm-5.14.21-150400.24.21.1.aarch64",
            "openSUSE Leap 15.4:dtb-broadcom-5.14.21-150400.24.21.1.aarch64",
            "openSUSE Leap 15.4:dtb-cavium-5.14.21-150400.24.21.1.aarch64",
            "openSUSE Leap 15.4:dtb-exynos-5.14.21-150400.24.21.1.aarch64",
            "openSUSE Leap 15.4:dtb-freescale-5.14.21-150400.24.21.1.aarch64",
            "openSUSE Leap 15.4:dtb-hisilicon-5.14.21-150400.24.21.1.aarch64",
            "openSUSE Leap 15.4:dtb-lg-5.14.21-150400.24.21.1.aarch64",
            "openSUSE Leap 15.4:dtb-marvell-5.14.21-150400.24.21.1.aarch64",
            "openSUSE Leap 15.4:dtb-mediatek-5.14.21-150400.24.21.1.aarch64",
            "openSUSE Leap 15.4:dtb-nvidia-5.14.21-150400.24.21.1.aarch64",
            "openSUSE Leap 15.4:dtb-qcom-5.14.21-150400.24.21.1.aarch64",
            "openSUSE Leap 15.4:dtb-renesas-5.14.21-150400.24.21.1.aarch64",
            "openSUSE Leap 15.4:dtb-rockchip-5.14.21-150400.24.21.1.aarch64",
            "openSUSE Leap 15.4:dtb-socionext-5.14.21-150400.24.21.1.aarch64",
            "openSUSE Leap 15.4:dtb-sprd-5.14.21-150400.24.21.1.aarch64",
            "openSUSE Leap 15.4:dtb-xilinx-5.14.21-150400.24.21.1.aarch64",
            "openSUSE Leap 15.4:gfs2-kmp-64kb-5.14.21-150400.24.21.2.aarch64",
            "openSUSE Leap 15.4:gfs2-kmp-default-5.14.21-150400.24.21.2.aarch64",
            "openSUSE Leap 15.4:gfs2-kmp-default-5.14.21-150400.24.21.2.ppc64le",
            "openSUSE Leap 15.4:gfs2-kmp-default-5.14.21-150400.24.21.2.s390x",
            "openSUSE Leap 15.4:gfs2-kmp-default-5.14.21-150400.24.21.2.x86_64",
            "openSUSE Leap 15.4:kernel-64kb-5.14.21-150400.24.21.2.aarch64",
            "openSUSE Leap 15.4:kernel-64kb-devel-5.14.21-150400.24.21.2.aarch64",
            "openSUSE Leap 15.4:kernel-64kb-extra-5.14.21-150400.24.21.2.aarch64",
            "openSUSE Leap 15.4:kernel-64kb-livepatch-devel-5.14.21-150400.24.21.2.aarch64",
            "openSUSE Leap 15.4:kernel-64kb-optional-5.14.21-150400.24.21.2.aarch64",
            "openSUSE Leap 15.4:kernel-debug-5.14.21-150400.24.21.2.ppc64le",
            "openSUSE Leap 15.4:kernel-debug-5.14.21-150400.24.21.2.x86_64",
            "openSUSE Leap 15.4:kernel-debug-devel-5.14.21-150400.24.21.2.ppc64le",
            "openSUSE Leap 15.4:kernel-debug-devel-5.14.21-150400.24.21.2.x86_64",
            "openSUSE Leap 15.4:kernel-debug-livepatch-devel-5.14.21-150400.24.21.2.ppc64le",
            "openSUSE Leap 15.4:kernel-debug-livepatch-devel-5.14.21-150400.24.21.2.x86_64",
            "openSUSE Leap 15.4:kernel-default-5.14.21-150400.24.21.2.aarch64",
            "openSUSE Leap 15.4:kernel-default-5.14.21-150400.24.21.2.ppc64le",
            "openSUSE Leap 15.4:kernel-default-5.14.21-150400.24.21.2.s390x",
            "openSUSE Leap 15.4:kernel-default-5.14.21-150400.24.21.2.x86_64",
            "openSUSE Leap 15.4:kernel-default-base-5.14.21-150400.24.21.2.150400.24.7.2.aarch64",
            "openSUSE Leap 15.4:kernel-default-base-5.14.21-150400.24.21.2.150400.24.7.2.ppc64le",
            "openSUSE Leap 15.4:kernel-default-base-5.14.21-150400.24.21.2.150400.24.7.2.s390x",
            "openSUSE Leap 15.4:kernel-default-base-5.14.21-150400.24.21.2.150400.24.7.2.x86_64",
            "openSUSE Leap 15.4:kernel-default-base-rebuild-5.14.21-150400.24.21.2.150400.24.7.2.aarch64",
            "openSUSE Leap 15.4:kernel-default-base-rebuild-5.14.21-150400.24.21.2.150400.24.7.2.ppc64le",
            "openSUSE Leap 15.4:kernel-default-base-rebuild-5.14.21-150400.24.21.2.150400.24.7.2.s390x",
            "openSUSE Leap 15.4:kernel-default-base-rebuild-5.14.21-150400.24.21.2.150400.24.7.2.x86_64",
            "openSUSE Leap 15.4:kernel-default-devel-5.14.21-150400.24.21.2.aarch64",
            "openSUSE Leap 15.4:kernel-default-devel-5.14.21-150400.24.21.2.ppc64le",
            "openSUSE Leap 15.4:kernel-default-devel-5.14.21-150400.24.21.2.s390x",
            "openSUSE Leap 15.4:kernel-default-devel-5.14.21-150400.24.21.2.x86_64",
            "openSUSE Leap 15.4:kernel-default-extra-5.14.21-150400.24.21.2.aarch64",
            "openSUSE Leap 15.4:kernel-default-extra-5.14.21-150400.24.21.2.ppc64le",
            "openSUSE Leap 15.4:kernel-default-extra-5.14.21-150400.24.21.2.s390x",
            "openSUSE Leap 15.4:kernel-default-extra-5.14.21-150400.24.21.2.x86_64",
            "openSUSE Leap 15.4:kernel-default-livepatch-5.14.21-150400.24.21.2.aarch64",
            "openSUSE Leap 15.4:kernel-default-livepatch-5.14.21-150400.24.21.2.ppc64le",
            "openSUSE Leap 15.4:kernel-default-livepatch-5.14.21-150400.24.21.2.s390x",
            "openSUSE Leap 15.4:kernel-default-livepatch-5.14.21-150400.24.21.2.x86_64",
            "openSUSE Leap 15.4:kernel-default-livepatch-devel-5.14.21-150400.24.21.2.aarch64",
            "openSUSE Leap 15.4:kernel-default-livepatch-devel-5.14.21-150400.24.21.2.ppc64le",
            "openSUSE Leap 15.4:kernel-default-livepatch-devel-5.14.21-150400.24.21.2.s390x",
            "openSUSE Leap 15.4:kernel-default-livepatch-devel-5.14.21-150400.24.21.2.x86_64",
            "openSUSE Leap 15.4:kernel-default-optional-5.14.21-150400.24.21.2.aarch64",
            "openSUSE Leap 15.4:kernel-default-optional-5.14.21-150400.24.21.2.ppc64le",
            "openSUSE Leap 15.4:kernel-default-optional-5.14.21-150400.24.21.2.s390x",
            "openSUSE Leap 15.4:kernel-default-optional-5.14.21-150400.24.21.2.x86_64",
            "openSUSE Leap 15.4:kernel-devel-5.14.21-150400.24.21.2.noarch",
            "openSUSE Leap 15.4:kernel-docs-5.14.21-150400.24.21.3.noarch",
            "openSUSE Leap 15.4:kernel-docs-html-5.14.21-150400.24.21.3.noarch",
            "openSUSE Leap 15.4:kernel-kvmsmall-5.14.21-150400.24.21.2.aarch64",
            "openSUSE Leap 15.4:kernel-kvmsmall-5.14.21-150400.24.21.2.ppc64le",
            "openSUSE Leap 15.4:kernel-kvmsmall-5.14.21-150400.24.21.2.x86_64",
            "openSUSE Leap 15.4:kernel-kvmsmall-devel-5.14.21-150400.24.21.2.aarch64",
            "openSUSE Leap 15.4:kernel-kvmsmall-devel-5.14.21-150400.24.21.2.ppc64le",
            "openSUSE Leap 15.4:kernel-kvmsmall-devel-5.14.21-150400.24.21.2.x86_64",
            "openSUSE Leap 15.4:kernel-kvmsmall-livepatch-devel-5.14.21-150400.24.21.2.aarch64",
            "openSUSE Leap 15.4:kernel-kvmsmall-livepatch-devel-5.14.21-150400.24.21.2.ppc64le",
            "openSUSE Leap 15.4:kernel-kvmsmall-livepatch-devel-5.14.21-150400.24.21.2.x86_64",
            "openSUSE Leap 15.4:kernel-macros-5.14.21-150400.24.21.2.noarch",
            "openSUSE Leap 15.4:kernel-obs-build-5.14.21-150400.24.21.2.aarch64",
            "openSUSE Leap 15.4:kernel-obs-build-5.14.21-150400.24.21.2.ppc64le",
            "openSUSE Leap 15.4:kernel-obs-build-5.14.21-150400.24.21.2.s390x",
            "openSUSE Leap 15.4:kernel-obs-build-5.14.21-150400.24.21.2.x86_64",
            "openSUSE Leap 15.4:kernel-obs-qa-5.14.21-150400.24.21.1.aarch64",
            "openSUSE Leap 15.4:kernel-obs-qa-5.14.21-150400.24.21.1.ppc64le",
            "openSUSE Leap 15.4:kernel-obs-qa-5.14.21-150400.24.21.1.s390x",
            "openSUSE Leap 15.4:kernel-obs-qa-5.14.21-150400.24.21.1.x86_64",
            "openSUSE Leap 15.4:kernel-source-5.14.21-150400.24.21.2.noarch",
            "openSUSE Leap 15.4:kernel-source-vanilla-5.14.21-150400.24.21.2.noarch",
            "openSUSE Leap 15.4:kernel-syms-5.14.21-150400.24.21.1.aarch64",
            "openSUSE Leap 15.4:kernel-syms-5.14.21-150400.24.21.1.ppc64le",
            "openSUSE Leap 15.4:kernel-syms-5.14.21-150400.24.21.1.s390x",
            "openSUSE Leap 15.4:kernel-syms-5.14.21-150400.24.21.1.x86_64",
            "openSUSE Leap 15.4:kernel-zfcpdump-5.14.21-150400.24.21.2.s390x",
            "openSUSE Leap 15.4:kselftests-kmp-64kb-5.14.21-150400.24.21.2.aarch64",
            "openSUSE Leap 15.4:kselftests-kmp-default-5.14.21-150400.24.21.2.aarch64",
            "openSUSE Leap 15.4:kselftests-kmp-default-5.14.21-150400.24.21.2.ppc64le",
            "openSUSE Leap 15.4:kselftests-kmp-default-5.14.21-150400.24.21.2.s390x",
            "openSUSE Leap 15.4:kselftests-kmp-default-5.14.21-150400.24.21.2.x86_64",
            "openSUSE Leap 15.4:ocfs2-kmp-64kb-5.14.21-150400.24.21.2.aarch64",
            "openSUSE Leap 15.4:ocfs2-kmp-default-5.14.21-150400.24.21.2.aarch64",
            "openSUSE Leap 15.4:ocfs2-kmp-default-5.14.21-150400.24.21.2.ppc64le",
            "openSUSE Leap 15.4:ocfs2-kmp-default-5.14.21-150400.24.21.2.s390x",
            "openSUSE Leap 15.4:ocfs2-kmp-default-5.14.21-150400.24.21.2.x86_64",
            "openSUSE Leap 15.4:reiserfs-kmp-64kb-5.14.21-150400.24.21.2.aarch64",
            "openSUSE Leap 15.4:reiserfs-kmp-default-5.14.21-150400.24.21.2.aarch64",
            "openSUSE Leap 15.4:reiserfs-kmp-default-5.14.21-150400.24.21.2.ppc64le",
            "openSUSE Leap 15.4:reiserfs-kmp-default-5.14.21-150400.24.21.2.s390x",
            "openSUSE Leap 15.4:reiserfs-kmp-default-5.14.21-150400.24.21.2.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 5.5,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
            "version": "3.1"
          },
          "products": [
            "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.21.2.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.21.2.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.21.2.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.21.2.x86_64",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.21.2.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.21.2.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.21.2.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.21.2.x86_64",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.21.2.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.21.2.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.21.2.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.21.2.x86_64",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.21.2.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.21.2.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.21.2.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.21.2.x86_64",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.21.2.ppc64le",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.21.2.s390x",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.21.2.x86_64",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.21.2.ppc64le",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.21.2.s390x",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.21.2.x86_64",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_21-default-1-150400.9.3.2.ppc64le",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_21-default-1-150400.9.3.2.s390x",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_21-default-1-150400.9.3.2.x86_64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-64kb-5.14.21-150400.24.21.2.aarch64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-64kb-devel-5.14.21-150400.24.21.2.aarch64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-5.14.21-150400.24.21.2.aarch64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-5.14.21-150400.24.21.2.ppc64le",
            "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-5.14.21-150400.24.21.2.s390x",
            "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-5.14.21-150400.24.21.2.x86_64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-base-5.14.21-150400.24.21.2.150400.24.7.2.aarch64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-base-5.14.21-150400.24.21.2.150400.24.7.2.ppc64le",
            "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-base-5.14.21-150400.24.21.2.150400.24.7.2.s390x",
            "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-base-5.14.21-150400.24.21.2.150400.24.7.2.x86_64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-devel-5.14.21-150400.24.21.2.aarch64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-devel-5.14.21-150400.24.21.2.ppc64le",
            "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-devel-5.14.21-150400.24.21.2.s390x",
            "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-devel-5.14.21-150400.24.21.2.x86_64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-devel-5.14.21-150400.24.21.2.noarch",
            "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-macros-5.14.21-150400.24.21.2.noarch",
            "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-zfcpdump-5.14.21-150400.24.21.2.s390x",
            "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-docs-5.14.21-150400.24.21.3.noarch",
            "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-obs-build-5.14.21-150400.24.21.2.aarch64",
            "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-obs-build-5.14.21-150400.24.21.2.ppc64le",
            "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-obs-build-5.14.21-150400.24.21.2.s390x",
            "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-obs-build-5.14.21-150400.24.21.2.x86_64",
            "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-source-5.14.21-150400.24.21.2.noarch",
            "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-syms-5.14.21-150400.24.21.1.aarch64",
            "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-syms-5.14.21-150400.24.21.1.ppc64le",
            "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-syms-5.14.21-150400.24.21.1.s390x",
            "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-syms-5.14.21-150400.24.21.1.x86_64",
            "SUSE Linux Enterprise Module for Legacy 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.21.2.aarch64",
            "SUSE Linux Enterprise Module for Legacy 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.21.2.ppc64le",
            "SUSE Linux Enterprise Module for Legacy 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.21.2.s390x",
            "SUSE Linux Enterprise Module for Legacy 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.21.2.x86_64",
            "SUSE Linux Enterprise Workstation Extension 15 SP4:kernel-default-extra-5.14.21-150400.24.21.2.x86_64",
            "openSUSE Leap 15.4:cluster-md-kmp-64kb-5.14.21-150400.24.21.2.aarch64",
            "openSUSE Leap 15.4:cluster-md-kmp-default-5.14.21-150400.24.21.2.aarch64",
            "openSUSE Leap 15.4:cluster-md-kmp-default-5.14.21-150400.24.21.2.ppc64le",
            "openSUSE Leap 15.4:cluster-md-kmp-default-5.14.21-150400.24.21.2.s390x",
            "openSUSE Leap 15.4:cluster-md-kmp-default-5.14.21-150400.24.21.2.x86_64",
            "openSUSE Leap 15.4:dlm-kmp-64kb-5.14.21-150400.24.21.2.aarch64",
            "openSUSE Leap 15.4:dlm-kmp-default-5.14.21-150400.24.21.2.aarch64",
            "openSUSE Leap 15.4:dlm-kmp-default-5.14.21-150400.24.21.2.ppc64le",
            "openSUSE Leap 15.4:dlm-kmp-default-5.14.21-150400.24.21.2.s390x",
            "openSUSE Leap 15.4:dlm-kmp-default-5.14.21-150400.24.21.2.x86_64",
            "openSUSE Leap 15.4:dtb-allwinner-5.14.21-150400.24.21.1.aarch64",
            "openSUSE Leap 15.4:dtb-altera-5.14.21-150400.24.21.1.aarch64",
            "openSUSE Leap 15.4:dtb-amazon-5.14.21-150400.24.21.1.aarch64",
            "openSUSE Leap 15.4:dtb-amd-5.14.21-150400.24.21.1.aarch64",
            "openSUSE Leap 15.4:dtb-amlogic-5.14.21-150400.24.21.1.aarch64",
            "openSUSE Leap 15.4:dtb-apm-5.14.21-150400.24.21.1.aarch64",
            "openSUSE Leap 15.4:dtb-apple-5.14.21-150400.24.21.1.aarch64",
            "openSUSE Leap 15.4:dtb-arm-5.14.21-150400.24.21.1.aarch64",
            "openSUSE Leap 15.4:dtb-broadcom-5.14.21-150400.24.21.1.aarch64",
            "openSUSE Leap 15.4:dtb-cavium-5.14.21-150400.24.21.1.aarch64",
            "openSUSE Leap 15.4:dtb-exynos-5.14.21-150400.24.21.1.aarch64",
            "openSUSE Leap 15.4:dtb-freescale-5.14.21-150400.24.21.1.aarch64",
            "openSUSE Leap 15.4:dtb-hisilicon-5.14.21-150400.24.21.1.aarch64",
            "openSUSE Leap 15.4:dtb-lg-5.14.21-150400.24.21.1.aarch64",
            "openSUSE Leap 15.4:dtb-marvell-5.14.21-150400.24.21.1.aarch64",
            "openSUSE Leap 15.4:dtb-mediatek-5.14.21-150400.24.21.1.aarch64",
            "openSUSE Leap 15.4:dtb-nvidia-5.14.21-150400.24.21.1.aarch64",
            "openSUSE Leap 15.4:dtb-qcom-5.14.21-150400.24.21.1.aarch64",
            "openSUSE Leap 15.4:dtb-renesas-5.14.21-150400.24.21.1.aarch64",
            "openSUSE Leap 15.4:dtb-rockchip-5.14.21-150400.24.21.1.aarch64",
            "openSUSE Leap 15.4:dtb-socionext-5.14.21-150400.24.21.1.aarch64",
            "openSUSE Leap 15.4:dtb-sprd-5.14.21-150400.24.21.1.aarch64",
            "openSUSE Leap 15.4:dtb-xilinx-5.14.21-150400.24.21.1.aarch64",
            "openSUSE Leap 15.4:gfs2-kmp-64kb-5.14.21-150400.24.21.2.aarch64",
            "openSUSE Leap 15.4:gfs2-kmp-default-5.14.21-150400.24.21.2.aarch64",
            "openSUSE Leap 15.4:gfs2-kmp-default-5.14.21-150400.24.21.2.ppc64le",
            "openSUSE Leap 15.4:gfs2-kmp-default-5.14.21-150400.24.21.2.s390x",
            "openSUSE Leap 15.4:gfs2-kmp-default-5.14.21-150400.24.21.2.x86_64",
            "openSUSE Leap 15.4:kernel-64kb-5.14.21-150400.24.21.2.aarch64",
            "openSUSE Leap 15.4:kernel-64kb-devel-5.14.21-150400.24.21.2.aarch64",
            "openSUSE Leap 15.4:kernel-64kb-extra-5.14.21-150400.24.21.2.aarch64",
            "openSUSE Leap 15.4:kernel-64kb-livepatch-devel-5.14.21-150400.24.21.2.aarch64",
            "openSUSE Leap 15.4:kernel-64kb-optional-5.14.21-150400.24.21.2.aarch64",
            "openSUSE Leap 15.4:kernel-debug-5.14.21-150400.24.21.2.ppc64le",
            "openSUSE Leap 15.4:kernel-debug-5.14.21-150400.24.21.2.x86_64",
            "openSUSE Leap 15.4:kernel-debug-devel-5.14.21-150400.24.21.2.ppc64le",
            "openSUSE Leap 15.4:kernel-debug-devel-5.14.21-150400.24.21.2.x86_64",
            "openSUSE Leap 15.4:kernel-debug-livepatch-devel-5.14.21-150400.24.21.2.ppc64le",
            "openSUSE Leap 15.4:kernel-debug-livepatch-devel-5.14.21-150400.24.21.2.x86_64",
            "openSUSE Leap 15.4:kernel-default-5.14.21-150400.24.21.2.aarch64",
            "openSUSE Leap 15.4:kernel-default-5.14.21-150400.24.21.2.ppc64le",
            "openSUSE Leap 15.4:kernel-default-5.14.21-150400.24.21.2.s390x",
            "openSUSE Leap 15.4:kernel-default-5.14.21-150400.24.21.2.x86_64",
            "openSUSE Leap 15.4:kernel-default-base-5.14.21-150400.24.21.2.150400.24.7.2.aarch64",
            "openSUSE Leap 15.4:kernel-default-base-5.14.21-150400.24.21.2.150400.24.7.2.ppc64le",
            "openSUSE Leap 15.4:kernel-default-base-5.14.21-150400.24.21.2.150400.24.7.2.s390x",
            "openSUSE Leap 15.4:kernel-default-base-5.14.21-150400.24.21.2.150400.24.7.2.x86_64",
            "openSUSE Leap 15.4:kernel-default-base-rebuild-5.14.21-150400.24.21.2.150400.24.7.2.aarch64",
            "openSUSE Leap 15.4:kernel-default-base-rebuild-5.14.21-150400.24.21.2.150400.24.7.2.ppc64le",
            "openSUSE Leap 15.4:kernel-default-base-rebuild-5.14.21-150400.24.21.2.150400.24.7.2.s390x",
            "openSUSE Leap 15.4:kernel-default-base-rebuild-5.14.21-150400.24.21.2.150400.24.7.2.x86_64",
            "openSUSE Leap 15.4:kernel-default-devel-5.14.21-150400.24.21.2.aarch64",
            "openSUSE Leap 15.4:kernel-default-devel-5.14.21-150400.24.21.2.ppc64le",
            "openSUSE Leap 15.4:kernel-default-devel-5.14.21-150400.24.21.2.s390x",
            "openSUSE Leap 15.4:kernel-default-devel-5.14.21-150400.24.21.2.x86_64",
            "openSUSE Leap 15.4:kernel-default-extra-5.14.21-150400.24.21.2.aarch64",
            "openSUSE Leap 15.4:kernel-default-extra-5.14.21-150400.24.21.2.ppc64le",
            "openSUSE Leap 15.4:kernel-default-extra-5.14.21-150400.24.21.2.s390x",
            "openSUSE Leap 15.4:kernel-default-extra-5.14.21-150400.24.21.2.x86_64",
            "openSUSE Leap 15.4:kernel-default-livepatch-5.14.21-150400.24.21.2.aarch64",
            "openSUSE Leap 15.4:kernel-default-livepatch-5.14.21-150400.24.21.2.ppc64le",
            "openSUSE Leap 15.4:kernel-default-livepatch-5.14.21-150400.24.21.2.s390x",
            "openSUSE Leap 15.4:kernel-default-livepatch-5.14.21-150400.24.21.2.x86_64",
            "openSUSE Leap 15.4:kernel-default-livepatch-devel-5.14.21-150400.24.21.2.aarch64",
            "openSUSE Leap 15.4:kernel-default-livepatch-devel-5.14.21-150400.24.21.2.ppc64le",
            "openSUSE Leap 15.4:kernel-default-livepatch-devel-5.14.21-150400.24.21.2.s390x",
            "openSUSE Leap 15.4:kernel-default-livepatch-devel-5.14.21-150400.24.21.2.x86_64",
            "openSUSE Leap 15.4:kernel-default-optional-5.14.21-150400.24.21.2.aarch64",
            "openSUSE Leap 15.4:kernel-default-optional-5.14.21-150400.24.21.2.ppc64le",
            "openSUSE Leap 15.4:kernel-default-optional-5.14.21-150400.24.21.2.s390x",
            "openSUSE Leap 15.4:kernel-default-optional-5.14.21-150400.24.21.2.x86_64",
            "openSUSE Leap 15.4:kernel-devel-5.14.21-150400.24.21.2.noarch",
            "openSUSE Leap 15.4:kernel-docs-5.14.21-150400.24.21.3.noarch",
            "openSUSE Leap 15.4:kernel-docs-html-5.14.21-150400.24.21.3.noarch",
            "openSUSE Leap 15.4:kernel-kvmsmall-5.14.21-150400.24.21.2.aarch64",
            "openSUSE Leap 15.4:kernel-kvmsmall-5.14.21-150400.24.21.2.ppc64le",
            "openSUSE Leap 15.4:kernel-kvmsmall-5.14.21-150400.24.21.2.x86_64",
            "openSUSE Leap 15.4:kernel-kvmsmall-devel-5.14.21-150400.24.21.2.aarch64",
            "openSUSE Leap 15.4:kernel-kvmsmall-devel-5.14.21-150400.24.21.2.ppc64le",
            "openSUSE Leap 15.4:kernel-kvmsmall-devel-5.14.21-150400.24.21.2.x86_64",
            "openSUSE Leap 15.4:kernel-kvmsmall-livepatch-devel-5.14.21-150400.24.21.2.aarch64",
            "openSUSE Leap 15.4:kernel-kvmsmall-livepatch-devel-5.14.21-150400.24.21.2.ppc64le",
            "openSUSE Leap 15.4:kernel-kvmsmall-livepatch-devel-5.14.21-150400.24.21.2.x86_64",
            "openSUSE Leap 15.4:kernel-macros-5.14.21-150400.24.21.2.noarch",
            "openSUSE Leap 15.4:kernel-obs-build-5.14.21-150400.24.21.2.aarch64",
            "openSUSE Leap 15.4:kernel-obs-build-5.14.21-150400.24.21.2.ppc64le",
            "openSUSE Leap 15.4:kernel-obs-build-5.14.21-150400.24.21.2.s390x",
            "openSUSE Leap 15.4:kernel-obs-build-5.14.21-150400.24.21.2.x86_64",
            "openSUSE Leap 15.4:kernel-obs-qa-5.14.21-150400.24.21.1.aarch64",
            "openSUSE Leap 15.4:kernel-obs-qa-5.14.21-150400.24.21.1.ppc64le",
            "openSUSE Leap 15.4:kernel-obs-qa-5.14.21-150400.24.21.1.s390x",
            "openSUSE Leap 15.4:kernel-obs-qa-5.14.21-150400.24.21.1.x86_64",
            "openSUSE Leap 15.4:kernel-source-5.14.21-150400.24.21.2.noarch",
            "openSUSE Leap 15.4:kernel-source-vanilla-5.14.21-150400.24.21.2.noarch",
            "openSUSE Leap 15.4:kernel-syms-5.14.21-150400.24.21.1.aarch64",
            "openSUSE Leap 15.4:kernel-syms-5.14.21-150400.24.21.1.ppc64le",
            "openSUSE Leap 15.4:kernel-syms-5.14.21-150400.24.21.1.s390x",
            "openSUSE Leap 15.4:kernel-syms-5.14.21-150400.24.21.1.x86_64",
            "openSUSE Leap 15.4:kernel-zfcpdump-5.14.21-150400.24.21.2.s390x",
            "openSUSE Leap 15.4:kselftests-kmp-64kb-5.14.21-150400.24.21.2.aarch64",
            "openSUSE Leap 15.4:kselftests-kmp-default-5.14.21-150400.24.21.2.aarch64",
            "openSUSE Leap 15.4:kselftests-kmp-default-5.14.21-150400.24.21.2.ppc64le",
            "openSUSE Leap 15.4:kselftests-kmp-default-5.14.21-150400.24.21.2.s390x",
            "openSUSE Leap 15.4:kselftests-kmp-default-5.14.21-150400.24.21.2.x86_64",
            "openSUSE Leap 15.4:ocfs2-kmp-64kb-5.14.21-150400.24.21.2.aarch64",
            "openSUSE Leap 15.4:ocfs2-kmp-default-5.14.21-150400.24.21.2.aarch64",
            "openSUSE Leap 15.4:ocfs2-kmp-default-5.14.21-150400.24.21.2.ppc64le",
            "openSUSE Leap 15.4:ocfs2-kmp-default-5.14.21-150400.24.21.2.s390x",
            "openSUSE Leap 15.4:ocfs2-kmp-default-5.14.21-150400.24.21.2.x86_64",
            "openSUSE Leap 15.4:reiserfs-kmp-64kb-5.14.21-150400.24.21.2.aarch64",
            "openSUSE Leap 15.4:reiserfs-kmp-default-5.14.21-150400.24.21.2.aarch64",
            "openSUSE Leap 15.4:reiserfs-kmp-default-5.14.21-150400.24.21.2.ppc64le",
            "openSUSE Leap 15.4:reiserfs-kmp-default-5.14.21-150400.24.21.2.s390x",
            "openSUSE Leap 15.4:reiserfs-kmp-default-5.14.21-150400.24.21.2.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2022-09-16T15:30:19Z",
          "details": "moderate"
        }
      ],
      "title": "CVE-2022-20369"
    },
    {
      "cve": "CVE-2022-2588",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2022-2588"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "It was discovered that the cls_route filter implementation in the Linux kernel would not remove an old filter from the hashtable before freeing it if its handle had the value 0.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.21.2.aarch64",
          "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.21.2.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.21.2.s390x",
          "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.21.2.x86_64",
          "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.21.2.aarch64",
          "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.21.2.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.21.2.s390x",
          "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.21.2.x86_64",
          "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.21.2.aarch64",
          "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.21.2.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.21.2.s390x",
          "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.21.2.x86_64",
          "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.21.2.aarch64",
          "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.21.2.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.21.2.s390x",
          "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.21.2.x86_64",
          "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.21.2.ppc64le",
          "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.21.2.s390x",
          "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.21.2.x86_64",
          "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.21.2.ppc64le",
          "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.21.2.s390x",
          "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.21.2.x86_64",
          "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_21-default-1-150400.9.3.2.ppc64le",
          "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_21-default-1-150400.9.3.2.s390x",
          "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_21-default-1-150400.9.3.2.x86_64",
          "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-64kb-5.14.21-150400.24.21.2.aarch64",
          "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-64kb-devel-5.14.21-150400.24.21.2.aarch64",
          "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-5.14.21-150400.24.21.2.aarch64",
          "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-5.14.21-150400.24.21.2.ppc64le",
          "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-5.14.21-150400.24.21.2.s390x",
          "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-5.14.21-150400.24.21.2.x86_64",
          "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-base-5.14.21-150400.24.21.2.150400.24.7.2.aarch64",
          "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-base-5.14.21-150400.24.21.2.150400.24.7.2.ppc64le",
          "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-base-5.14.21-150400.24.21.2.150400.24.7.2.s390x",
          "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-base-5.14.21-150400.24.21.2.150400.24.7.2.x86_64",
          "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-devel-5.14.21-150400.24.21.2.aarch64",
          "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-devel-5.14.21-150400.24.21.2.ppc64le",
          "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-devel-5.14.21-150400.24.21.2.s390x",
          "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-devel-5.14.21-150400.24.21.2.x86_64",
          "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-devel-5.14.21-150400.24.21.2.noarch",
          "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-macros-5.14.21-150400.24.21.2.noarch",
          "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-zfcpdump-5.14.21-150400.24.21.2.s390x",
          "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-docs-5.14.21-150400.24.21.3.noarch",
          "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-obs-build-5.14.21-150400.24.21.2.aarch64",
          "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-obs-build-5.14.21-150400.24.21.2.ppc64le",
          "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-obs-build-5.14.21-150400.24.21.2.s390x",
          "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-obs-build-5.14.21-150400.24.21.2.x86_64",
          "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-source-5.14.21-150400.24.21.2.noarch",
          "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-syms-5.14.21-150400.24.21.1.aarch64",
          "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-syms-5.14.21-150400.24.21.1.ppc64le",
          "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-syms-5.14.21-150400.24.21.1.s390x",
          "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-syms-5.14.21-150400.24.21.1.x86_64",
          "SUSE Linux Enterprise Module for Legacy 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.21.2.aarch64",
          "SUSE Linux Enterprise Module for Legacy 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.21.2.ppc64le",
          "SUSE Linux Enterprise Module for Legacy 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.21.2.s390x",
          "SUSE Linux Enterprise Module for Legacy 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.21.2.x86_64",
          "SUSE Linux Enterprise Workstation Extension 15 SP4:kernel-default-extra-5.14.21-150400.24.21.2.x86_64",
          "openSUSE Leap 15.4:cluster-md-kmp-64kb-5.14.21-150400.24.21.2.aarch64",
          "openSUSE Leap 15.4:cluster-md-kmp-default-5.14.21-150400.24.21.2.aarch64",
          "openSUSE Leap 15.4:cluster-md-kmp-default-5.14.21-150400.24.21.2.ppc64le",
          "openSUSE Leap 15.4:cluster-md-kmp-default-5.14.21-150400.24.21.2.s390x",
          "openSUSE Leap 15.4:cluster-md-kmp-default-5.14.21-150400.24.21.2.x86_64",
          "openSUSE Leap 15.4:dlm-kmp-64kb-5.14.21-150400.24.21.2.aarch64",
          "openSUSE Leap 15.4:dlm-kmp-default-5.14.21-150400.24.21.2.aarch64",
          "openSUSE Leap 15.4:dlm-kmp-default-5.14.21-150400.24.21.2.ppc64le",
          "openSUSE Leap 15.4:dlm-kmp-default-5.14.21-150400.24.21.2.s390x",
          "openSUSE Leap 15.4:dlm-kmp-default-5.14.21-150400.24.21.2.x86_64",
          "openSUSE Leap 15.4:dtb-allwinner-5.14.21-150400.24.21.1.aarch64",
          "openSUSE Leap 15.4:dtb-altera-5.14.21-150400.24.21.1.aarch64",
          "openSUSE Leap 15.4:dtb-amazon-5.14.21-150400.24.21.1.aarch64",
          "openSUSE Leap 15.4:dtb-amd-5.14.21-150400.24.21.1.aarch64",
          "openSUSE Leap 15.4:dtb-amlogic-5.14.21-150400.24.21.1.aarch64",
          "openSUSE Leap 15.4:dtb-apm-5.14.21-150400.24.21.1.aarch64",
          "openSUSE Leap 15.4:dtb-apple-5.14.21-150400.24.21.1.aarch64",
          "openSUSE Leap 15.4:dtb-arm-5.14.21-150400.24.21.1.aarch64",
          "openSUSE Leap 15.4:dtb-broadcom-5.14.21-150400.24.21.1.aarch64",
          "openSUSE Leap 15.4:dtb-cavium-5.14.21-150400.24.21.1.aarch64",
          "openSUSE Leap 15.4:dtb-exynos-5.14.21-150400.24.21.1.aarch64",
          "openSUSE Leap 15.4:dtb-freescale-5.14.21-150400.24.21.1.aarch64",
          "openSUSE Leap 15.4:dtb-hisilicon-5.14.21-150400.24.21.1.aarch64",
          "openSUSE Leap 15.4:dtb-lg-5.14.21-150400.24.21.1.aarch64",
          "openSUSE Leap 15.4:dtb-marvell-5.14.21-150400.24.21.1.aarch64",
          "openSUSE Leap 15.4:dtb-mediatek-5.14.21-150400.24.21.1.aarch64",
          "openSUSE Leap 15.4:dtb-nvidia-5.14.21-150400.24.21.1.aarch64",
          "openSUSE Leap 15.4:dtb-qcom-5.14.21-150400.24.21.1.aarch64",
          "openSUSE Leap 15.4:dtb-renesas-5.14.21-150400.24.21.1.aarch64",
          "openSUSE Leap 15.4:dtb-rockchip-5.14.21-150400.24.21.1.aarch64",
          "openSUSE Leap 15.4:dtb-socionext-5.14.21-150400.24.21.1.aarch64",
          "openSUSE Leap 15.4:dtb-sprd-5.14.21-150400.24.21.1.aarch64",
          "openSUSE Leap 15.4:dtb-xilinx-5.14.21-150400.24.21.1.aarch64",
          "openSUSE Leap 15.4:gfs2-kmp-64kb-5.14.21-150400.24.21.2.aarch64",
          "openSUSE Leap 15.4:gfs2-kmp-default-5.14.21-150400.24.21.2.aarch64",
          "openSUSE Leap 15.4:gfs2-kmp-default-5.14.21-150400.24.21.2.ppc64le",
          "openSUSE Leap 15.4:gfs2-kmp-default-5.14.21-150400.24.21.2.s390x",
          "openSUSE Leap 15.4:gfs2-kmp-default-5.14.21-150400.24.21.2.x86_64",
          "openSUSE Leap 15.4:kernel-64kb-5.14.21-150400.24.21.2.aarch64",
          "openSUSE Leap 15.4:kernel-64kb-devel-5.14.21-150400.24.21.2.aarch64",
          "openSUSE Leap 15.4:kernel-64kb-extra-5.14.21-150400.24.21.2.aarch64",
          "openSUSE Leap 15.4:kernel-64kb-livepatch-devel-5.14.21-150400.24.21.2.aarch64",
          "openSUSE Leap 15.4:kernel-64kb-optional-5.14.21-150400.24.21.2.aarch64",
          "openSUSE Leap 15.4:kernel-debug-5.14.21-150400.24.21.2.ppc64le",
          "openSUSE Leap 15.4:kernel-debug-5.14.21-150400.24.21.2.x86_64",
          "openSUSE Leap 15.4:kernel-debug-devel-5.14.21-150400.24.21.2.ppc64le",
          "openSUSE Leap 15.4:kernel-debug-devel-5.14.21-150400.24.21.2.x86_64",
          "openSUSE Leap 15.4:kernel-debug-livepatch-devel-5.14.21-150400.24.21.2.ppc64le",
          "openSUSE Leap 15.4:kernel-debug-livepatch-devel-5.14.21-150400.24.21.2.x86_64",
          "openSUSE Leap 15.4:kernel-default-5.14.21-150400.24.21.2.aarch64",
          "openSUSE Leap 15.4:kernel-default-5.14.21-150400.24.21.2.ppc64le",
          "openSUSE Leap 15.4:kernel-default-5.14.21-150400.24.21.2.s390x",
          "openSUSE Leap 15.4:kernel-default-5.14.21-150400.24.21.2.x86_64",
          "openSUSE Leap 15.4:kernel-default-base-5.14.21-150400.24.21.2.150400.24.7.2.aarch64",
          "openSUSE Leap 15.4:kernel-default-base-5.14.21-150400.24.21.2.150400.24.7.2.ppc64le",
          "openSUSE Leap 15.4:kernel-default-base-5.14.21-150400.24.21.2.150400.24.7.2.s390x",
          "openSUSE Leap 15.4:kernel-default-base-5.14.21-150400.24.21.2.150400.24.7.2.x86_64",
          "openSUSE Leap 15.4:kernel-default-base-rebuild-5.14.21-150400.24.21.2.150400.24.7.2.aarch64",
          "openSUSE Leap 15.4:kernel-default-base-rebuild-5.14.21-150400.24.21.2.150400.24.7.2.ppc64le",
          "openSUSE Leap 15.4:kernel-default-base-rebuild-5.14.21-150400.24.21.2.150400.24.7.2.s390x",
          "openSUSE Leap 15.4:kernel-default-base-rebuild-5.14.21-150400.24.21.2.150400.24.7.2.x86_64",
          "openSUSE Leap 15.4:kernel-default-devel-5.14.21-150400.24.21.2.aarch64",
          "openSUSE Leap 15.4:kernel-default-devel-5.14.21-150400.24.21.2.ppc64le",
          "openSUSE Leap 15.4:kernel-default-devel-5.14.21-150400.24.21.2.s390x",
          "openSUSE Leap 15.4:kernel-default-devel-5.14.21-150400.24.21.2.x86_64",
          "openSUSE Leap 15.4:kernel-default-extra-5.14.21-150400.24.21.2.aarch64",
          "openSUSE Leap 15.4:kernel-default-extra-5.14.21-150400.24.21.2.ppc64le",
          "openSUSE Leap 15.4:kernel-default-extra-5.14.21-150400.24.21.2.s390x",
          "openSUSE Leap 15.4:kernel-default-extra-5.14.21-150400.24.21.2.x86_64",
          "openSUSE Leap 15.4:kernel-default-livepatch-5.14.21-150400.24.21.2.aarch64",
          "openSUSE Leap 15.4:kernel-default-livepatch-5.14.21-150400.24.21.2.ppc64le",
          "openSUSE Leap 15.4:kernel-default-livepatch-5.14.21-150400.24.21.2.s390x",
          "openSUSE Leap 15.4:kernel-default-livepatch-5.14.21-150400.24.21.2.x86_64",
          "openSUSE Leap 15.4:kernel-default-livepatch-devel-5.14.21-150400.24.21.2.aarch64",
          "openSUSE Leap 15.4:kernel-default-livepatch-devel-5.14.21-150400.24.21.2.ppc64le",
          "openSUSE Leap 15.4:kernel-default-livepatch-devel-5.14.21-150400.24.21.2.s390x",
          "openSUSE Leap 15.4:kernel-default-livepatch-devel-5.14.21-150400.24.21.2.x86_64",
          "openSUSE Leap 15.4:kernel-default-optional-5.14.21-150400.24.21.2.aarch64",
          "openSUSE Leap 15.4:kernel-default-optional-5.14.21-150400.24.21.2.ppc64le",
          "openSUSE Leap 15.4:kernel-default-optional-5.14.21-150400.24.21.2.s390x",
          "openSUSE Leap 15.4:kernel-default-optional-5.14.21-150400.24.21.2.x86_64",
          "openSUSE Leap 15.4:kernel-devel-5.14.21-150400.24.21.2.noarch",
          "openSUSE Leap 15.4:kernel-docs-5.14.21-150400.24.21.3.noarch",
          "openSUSE Leap 15.4:kernel-docs-html-5.14.21-150400.24.21.3.noarch",
          "openSUSE Leap 15.4:kernel-kvmsmall-5.14.21-150400.24.21.2.aarch64",
          "openSUSE Leap 15.4:kernel-kvmsmall-5.14.21-150400.24.21.2.ppc64le",
          "openSUSE Leap 15.4:kernel-kvmsmall-5.14.21-150400.24.21.2.x86_64",
          "openSUSE Leap 15.4:kernel-kvmsmall-devel-5.14.21-150400.24.21.2.aarch64",
          "openSUSE Leap 15.4:kernel-kvmsmall-devel-5.14.21-150400.24.21.2.ppc64le",
          "openSUSE Leap 15.4:kernel-kvmsmall-devel-5.14.21-150400.24.21.2.x86_64",
          "openSUSE Leap 15.4:kernel-kvmsmall-livepatch-devel-5.14.21-150400.24.21.2.aarch64",
          "openSUSE Leap 15.4:kernel-kvmsmall-livepatch-devel-5.14.21-150400.24.21.2.ppc64le",
          "openSUSE Leap 15.4:kernel-kvmsmall-livepatch-devel-5.14.21-150400.24.21.2.x86_64",
          "openSUSE Leap 15.4:kernel-macros-5.14.21-150400.24.21.2.noarch",
          "openSUSE Leap 15.4:kernel-obs-build-5.14.21-150400.24.21.2.aarch64",
          "openSUSE Leap 15.4:kernel-obs-build-5.14.21-150400.24.21.2.ppc64le",
          "openSUSE Leap 15.4:kernel-obs-build-5.14.21-150400.24.21.2.s390x",
          "openSUSE Leap 15.4:kernel-obs-build-5.14.21-150400.24.21.2.x86_64",
          "openSUSE Leap 15.4:kernel-obs-qa-5.14.21-150400.24.21.1.aarch64",
          "openSUSE Leap 15.4:kernel-obs-qa-5.14.21-150400.24.21.1.ppc64le",
          "openSUSE Leap 15.4:kernel-obs-qa-5.14.21-150400.24.21.1.s390x",
          "openSUSE Leap 15.4:kernel-obs-qa-5.14.21-150400.24.21.1.x86_64",
          "openSUSE Leap 15.4:kernel-source-5.14.21-150400.24.21.2.noarch",
          "openSUSE Leap 15.4:kernel-source-vanilla-5.14.21-150400.24.21.2.noarch",
          "openSUSE Leap 15.4:kernel-syms-5.14.21-150400.24.21.1.aarch64",
          "openSUSE Leap 15.4:kernel-syms-5.14.21-150400.24.21.1.ppc64le",
          "openSUSE Leap 15.4:kernel-syms-5.14.21-150400.24.21.1.s390x",
          "openSUSE Leap 15.4:kernel-syms-5.14.21-150400.24.21.1.x86_64",
          "openSUSE Leap 15.4:kernel-zfcpdump-5.14.21-150400.24.21.2.s390x",
          "openSUSE Leap 15.4:kselftests-kmp-64kb-5.14.21-150400.24.21.2.aarch64",
          "openSUSE Leap 15.4:kselftests-kmp-default-5.14.21-150400.24.21.2.aarch64",
          "openSUSE Leap 15.4:kselftests-kmp-default-5.14.21-150400.24.21.2.ppc64le",
          "openSUSE Leap 15.4:kselftests-kmp-default-5.14.21-150400.24.21.2.s390x",
          "openSUSE Leap 15.4:kselftests-kmp-default-5.14.21-150400.24.21.2.x86_64",
          "openSUSE Leap 15.4:ocfs2-kmp-64kb-5.14.21-150400.24.21.2.aarch64",
          "openSUSE Leap 15.4:ocfs2-kmp-default-5.14.21-150400.24.21.2.aarch64",
          "openSUSE Leap 15.4:ocfs2-kmp-default-5.14.21-150400.24.21.2.ppc64le",
          "openSUSE Leap 15.4:ocfs2-kmp-default-5.14.21-150400.24.21.2.s390x",
          "openSUSE Leap 15.4:ocfs2-kmp-default-5.14.21-150400.24.21.2.x86_64",
          "openSUSE Leap 15.4:reiserfs-kmp-64kb-5.14.21-150400.24.21.2.aarch64",
          "openSUSE Leap 15.4:reiserfs-kmp-default-5.14.21-150400.24.21.2.aarch64",
          "openSUSE Leap 15.4:reiserfs-kmp-default-5.14.21-150400.24.21.2.ppc64le",
          "openSUSE Leap 15.4:reiserfs-kmp-default-5.14.21-150400.24.21.2.s390x",
          "openSUSE Leap 15.4:reiserfs-kmp-default-5.14.21-150400.24.21.2.x86_64"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2022-2588",
          "url": "https://www.suse.com/security/cve/CVE-2022-2588"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1202096 for CVE-2022-2588",
          "url": "https://bugzilla.suse.com/1202096"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1203613 for CVE-2022-2588",
          "url": "https://bugzilla.suse.com/1203613"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1204183 for CVE-2022-2588",
          "url": "https://bugzilla.suse.com/1204183"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1209225 for CVE-2022-2588",
          "url": "https://bugzilla.suse.com/1209225"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.21.2.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.21.2.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.21.2.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.21.2.x86_64",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.21.2.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.21.2.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.21.2.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.21.2.x86_64",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.21.2.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.21.2.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.21.2.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.21.2.x86_64",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.21.2.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.21.2.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.21.2.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.21.2.x86_64",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.21.2.ppc64le",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.21.2.s390x",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.21.2.x86_64",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.21.2.ppc64le",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.21.2.s390x",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.21.2.x86_64",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_21-default-1-150400.9.3.2.ppc64le",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_21-default-1-150400.9.3.2.s390x",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_21-default-1-150400.9.3.2.x86_64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-64kb-5.14.21-150400.24.21.2.aarch64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-64kb-devel-5.14.21-150400.24.21.2.aarch64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-5.14.21-150400.24.21.2.aarch64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-5.14.21-150400.24.21.2.ppc64le",
            "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-5.14.21-150400.24.21.2.s390x",
            "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-5.14.21-150400.24.21.2.x86_64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-base-5.14.21-150400.24.21.2.150400.24.7.2.aarch64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-base-5.14.21-150400.24.21.2.150400.24.7.2.ppc64le",
            "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-base-5.14.21-150400.24.21.2.150400.24.7.2.s390x",
            "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-base-5.14.21-150400.24.21.2.150400.24.7.2.x86_64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-devel-5.14.21-150400.24.21.2.aarch64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-devel-5.14.21-150400.24.21.2.ppc64le",
            "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-devel-5.14.21-150400.24.21.2.s390x",
            "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-devel-5.14.21-150400.24.21.2.x86_64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-devel-5.14.21-150400.24.21.2.noarch",
            "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-macros-5.14.21-150400.24.21.2.noarch",
            "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-zfcpdump-5.14.21-150400.24.21.2.s390x",
            "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-docs-5.14.21-150400.24.21.3.noarch",
            "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-obs-build-5.14.21-150400.24.21.2.aarch64",
            "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-obs-build-5.14.21-150400.24.21.2.ppc64le",
            "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-obs-build-5.14.21-150400.24.21.2.s390x",
            "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-obs-build-5.14.21-150400.24.21.2.x86_64",
            "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-source-5.14.21-150400.24.21.2.noarch",
            "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-syms-5.14.21-150400.24.21.1.aarch64",
            "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-syms-5.14.21-150400.24.21.1.ppc64le",
            "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-syms-5.14.21-150400.24.21.1.s390x",
            "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-syms-5.14.21-150400.24.21.1.x86_64",
            "SUSE Linux Enterprise Module for Legacy 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.21.2.aarch64",
            "SUSE Linux Enterprise Module for Legacy 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.21.2.ppc64le",
            "SUSE Linux Enterprise Module for Legacy 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.21.2.s390x",
            "SUSE Linux Enterprise Module for Legacy 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.21.2.x86_64",
            "SUSE Linux Enterprise Workstation Extension 15 SP4:kernel-default-extra-5.14.21-150400.24.21.2.x86_64",
            "openSUSE Leap 15.4:cluster-md-kmp-64kb-5.14.21-150400.24.21.2.aarch64",
            "openSUSE Leap 15.4:cluster-md-kmp-default-5.14.21-150400.24.21.2.aarch64",
            "openSUSE Leap 15.4:cluster-md-kmp-default-5.14.21-150400.24.21.2.ppc64le",
            "openSUSE Leap 15.4:cluster-md-kmp-default-5.14.21-150400.24.21.2.s390x",
            "openSUSE Leap 15.4:cluster-md-kmp-default-5.14.21-150400.24.21.2.x86_64",
            "openSUSE Leap 15.4:dlm-kmp-64kb-5.14.21-150400.24.21.2.aarch64",
            "openSUSE Leap 15.4:dlm-kmp-default-5.14.21-150400.24.21.2.aarch64",
            "openSUSE Leap 15.4:dlm-kmp-default-5.14.21-150400.24.21.2.ppc64le",
            "openSUSE Leap 15.4:dlm-kmp-default-5.14.21-150400.24.21.2.s390x",
            "openSUSE Leap 15.4:dlm-kmp-default-5.14.21-150400.24.21.2.x86_64",
            "openSUSE Leap 15.4:dtb-allwinner-5.14.21-150400.24.21.1.aarch64",
            "openSUSE Leap 15.4:dtb-altera-5.14.21-150400.24.21.1.aarch64",
            "openSUSE Leap 15.4:dtb-amazon-5.14.21-150400.24.21.1.aarch64",
            "openSUSE Leap 15.4:dtb-amd-5.14.21-150400.24.21.1.aarch64",
            "openSUSE Leap 15.4:dtb-amlogic-5.14.21-150400.24.21.1.aarch64",
            "openSUSE Leap 15.4:dtb-apm-5.14.21-150400.24.21.1.aarch64",
            "openSUSE Leap 15.4:dtb-apple-5.14.21-150400.24.21.1.aarch64",
            "openSUSE Leap 15.4:dtb-arm-5.14.21-150400.24.21.1.aarch64",
            "openSUSE Leap 15.4:dtb-broadcom-5.14.21-150400.24.21.1.aarch64",
            "openSUSE Leap 15.4:dtb-cavium-5.14.21-150400.24.21.1.aarch64",
            "openSUSE Leap 15.4:dtb-exynos-5.14.21-150400.24.21.1.aarch64",
            "openSUSE Leap 15.4:dtb-freescale-5.14.21-150400.24.21.1.aarch64",
            "openSUSE Leap 15.4:dtb-hisilicon-5.14.21-150400.24.21.1.aarch64",
            "openSUSE Leap 15.4:dtb-lg-5.14.21-150400.24.21.1.aarch64",
            "openSUSE Leap 15.4:dtb-marvell-5.14.21-150400.24.21.1.aarch64",
            "openSUSE Leap 15.4:dtb-mediatek-5.14.21-150400.24.21.1.aarch64",
            "openSUSE Leap 15.4:dtb-nvidia-5.14.21-150400.24.21.1.aarch64",
            "openSUSE Leap 15.4:dtb-qcom-5.14.21-150400.24.21.1.aarch64",
            "openSUSE Leap 15.4:dtb-renesas-5.14.21-150400.24.21.1.aarch64",
            "openSUSE Leap 15.4:dtb-rockchip-5.14.21-150400.24.21.1.aarch64",
            "openSUSE Leap 15.4:dtb-socionext-5.14.21-150400.24.21.1.aarch64",
            "openSUSE Leap 15.4:dtb-sprd-5.14.21-150400.24.21.1.aarch64",
            "openSUSE Leap 15.4:dtb-xilinx-5.14.21-150400.24.21.1.aarch64",
            "openSUSE Leap 15.4:gfs2-kmp-64kb-5.14.21-150400.24.21.2.aarch64",
            "openSUSE Leap 15.4:gfs2-kmp-default-5.14.21-150400.24.21.2.aarch64",
            "openSUSE Leap 15.4:gfs2-kmp-default-5.14.21-150400.24.21.2.ppc64le",
            "openSUSE Leap 15.4:gfs2-kmp-default-5.14.21-150400.24.21.2.s390x",
            "openSUSE Leap 15.4:gfs2-kmp-default-5.14.21-150400.24.21.2.x86_64",
            "openSUSE Leap 15.4:kernel-64kb-5.14.21-150400.24.21.2.aarch64",
            "openSUSE Leap 15.4:kernel-64kb-devel-5.14.21-150400.24.21.2.aarch64",
            "openSUSE Leap 15.4:kernel-64kb-extra-5.14.21-150400.24.21.2.aarch64",
            "openSUSE Leap 15.4:kernel-64kb-livepatch-devel-5.14.21-150400.24.21.2.aarch64",
            "openSUSE Leap 15.4:kernel-64kb-optional-5.14.21-150400.24.21.2.aarch64",
            "openSUSE Leap 15.4:kernel-debug-5.14.21-150400.24.21.2.ppc64le",
            "openSUSE Leap 15.4:kernel-debug-5.14.21-150400.24.21.2.x86_64",
            "openSUSE Leap 15.4:kernel-debug-devel-5.14.21-150400.24.21.2.ppc64le",
            "openSUSE Leap 15.4:kernel-debug-devel-5.14.21-150400.24.21.2.x86_64",
            "openSUSE Leap 15.4:kernel-debug-livepatch-devel-5.14.21-150400.24.21.2.ppc64le",
            "openSUSE Leap 15.4:kernel-debug-livepatch-devel-5.14.21-150400.24.21.2.x86_64",
            "openSUSE Leap 15.4:kernel-default-5.14.21-150400.24.21.2.aarch64",
            "openSUSE Leap 15.4:kernel-default-5.14.21-150400.24.21.2.ppc64le",
            "openSUSE Leap 15.4:kernel-default-5.14.21-150400.24.21.2.s390x",
            "openSUSE Leap 15.4:kernel-default-5.14.21-150400.24.21.2.x86_64",
            "openSUSE Leap 15.4:kernel-default-base-5.14.21-150400.24.21.2.150400.24.7.2.aarch64",
            "openSUSE Leap 15.4:kernel-default-base-5.14.21-150400.24.21.2.150400.24.7.2.ppc64le",
            "openSUSE Leap 15.4:kernel-default-base-5.14.21-150400.24.21.2.150400.24.7.2.s390x",
            "openSUSE Leap 15.4:kernel-default-base-5.14.21-150400.24.21.2.150400.24.7.2.x86_64",
            "openSUSE Leap 15.4:kernel-default-base-rebuild-5.14.21-150400.24.21.2.150400.24.7.2.aarch64",
            "openSUSE Leap 15.4:kernel-default-base-rebuild-5.14.21-150400.24.21.2.150400.24.7.2.ppc64le",
            "openSUSE Leap 15.4:kernel-default-base-rebuild-5.14.21-150400.24.21.2.150400.24.7.2.s390x",
            "openSUSE Leap 15.4:kernel-default-base-rebuild-5.14.21-150400.24.21.2.150400.24.7.2.x86_64",
            "openSUSE Leap 15.4:kernel-default-devel-5.14.21-150400.24.21.2.aarch64",
            "openSUSE Leap 15.4:kernel-default-devel-5.14.21-150400.24.21.2.ppc64le",
            "openSUSE Leap 15.4:kernel-default-devel-5.14.21-150400.24.21.2.s390x",
            "openSUSE Leap 15.4:kernel-default-devel-5.14.21-150400.24.21.2.x86_64",
            "openSUSE Leap 15.4:kernel-default-extra-5.14.21-150400.24.21.2.aarch64",
            "openSUSE Leap 15.4:kernel-default-extra-5.14.21-150400.24.21.2.ppc64le",
            "openSUSE Leap 15.4:kernel-default-extra-5.14.21-150400.24.21.2.s390x",
            "openSUSE Leap 15.4:kernel-default-extra-5.14.21-150400.24.21.2.x86_64",
            "openSUSE Leap 15.4:kernel-default-livepatch-5.14.21-150400.24.21.2.aarch64",
            "openSUSE Leap 15.4:kernel-default-livepatch-5.14.21-150400.24.21.2.ppc64le",
            "openSUSE Leap 15.4:kernel-default-livepatch-5.14.21-150400.24.21.2.s390x",
            "openSUSE Leap 15.4:kernel-default-livepatch-5.14.21-150400.24.21.2.x86_64",
            "openSUSE Leap 15.4:kernel-default-livepatch-devel-5.14.21-150400.24.21.2.aarch64",
            "openSUSE Leap 15.4:kernel-default-livepatch-devel-5.14.21-150400.24.21.2.ppc64le",
            "openSUSE Leap 15.4:kernel-default-livepatch-devel-5.14.21-150400.24.21.2.s390x",
            "openSUSE Leap 15.4:kernel-default-livepatch-devel-5.14.21-150400.24.21.2.x86_64",
            "openSUSE Leap 15.4:kernel-default-optional-5.14.21-150400.24.21.2.aarch64",
            "openSUSE Leap 15.4:kernel-default-optional-5.14.21-150400.24.21.2.ppc64le",
            "openSUSE Leap 15.4:kernel-default-optional-5.14.21-150400.24.21.2.s390x",
            "openSUSE Leap 15.4:kernel-default-optional-5.14.21-150400.24.21.2.x86_64",
            "openSUSE Leap 15.4:kernel-devel-5.14.21-150400.24.21.2.noarch",
            "openSUSE Leap 15.4:kernel-docs-5.14.21-150400.24.21.3.noarch",
            "openSUSE Leap 15.4:kernel-docs-html-5.14.21-150400.24.21.3.noarch",
            "openSUSE Leap 15.4:kernel-kvmsmall-5.14.21-150400.24.21.2.aarch64",
            "openSUSE Leap 15.4:kernel-kvmsmall-5.14.21-150400.24.21.2.ppc64le",
            "openSUSE Leap 15.4:kernel-kvmsmall-5.14.21-150400.24.21.2.x86_64",
            "openSUSE Leap 15.4:kernel-kvmsmall-devel-5.14.21-150400.24.21.2.aarch64",
            "openSUSE Leap 15.4:kernel-kvmsmall-devel-5.14.21-150400.24.21.2.ppc64le",
            "openSUSE Leap 15.4:kernel-kvmsmall-devel-5.14.21-150400.24.21.2.x86_64",
            "openSUSE Leap 15.4:kernel-kvmsmall-livepatch-devel-5.14.21-150400.24.21.2.aarch64",
            "openSUSE Leap 15.4:kernel-kvmsmall-livepatch-devel-5.14.21-150400.24.21.2.ppc64le",
            "openSUSE Leap 15.4:kernel-kvmsmall-livepatch-devel-5.14.21-150400.24.21.2.x86_64",
            "openSUSE Leap 15.4:kernel-macros-5.14.21-150400.24.21.2.noarch",
            "openSUSE Leap 15.4:kernel-obs-build-5.14.21-150400.24.21.2.aarch64",
            "openSUSE Leap 15.4:kernel-obs-build-5.14.21-150400.24.21.2.ppc64le",
            "openSUSE Leap 15.4:kernel-obs-build-5.14.21-150400.24.21.2.s390x",
            "openSUSE Leap 15.4:kernel-obs-build-5.14.21-150400.24.21.2.x86_64",
            "openSUSE Leap 15.4:kernel-obs-qa-5.14.21-150400.24.21.1.aarch64",
            "openSUSE Leap 15.4:kernel-obs-qa-5.14.21-150400.24.21.1.ppc64le",
            "openSUSE Leap 15.4:kernel-obs-qa-5.14.21-150400.24.21.1.s390x",
            "openSUSE Leap 15.4:kernel-obs-qa-5.14.21-150400.24.21.1.x86_64",
            "openSUSE Leap 15.4:kernel-source-5.14.21-150400.24.21.2.noarch",
            "openSUSE Leap 15.4:kernel-source-vanilla-5.14.21-150400.24.21.2.noarch",
            "openSUSE Leap 15.4:kernel-syms-5.14.21-150400.24.21.1.aarch64",
            "openSUSE Leap 15.4:kernel-syms-5.14.21-150400.24.21.1.ppc64le",
            "openSUSE Leap 15.4:kernel-syms-5.14.21-150400.24.21.1.s390x",
            "openSUSE Leap 15.4:kernel-syms-5.14.21-150400.24.21.1.x86_64",
            "openSUSE Leap 15.4:kernel-zfcpdump-5.14.21-150400.24.21.2.s390x",
            "openSUSE Leap 15.4:kselftests-kmp-64kb-5.14.21-150400.24.21.2.aarch64",
            "openSUSE Leap 15.4:kselftests-kmp-default-5.14.21-150400.24.21.2.aarch64",
            "openSUSE Leap 15.4:kselftests-kmp-default-5.14.21-150400.24.21.2.ppc64le",
            "openSUSE Leap 15.4:kselftests-kmp-default-5.14.21-150400.24.21.2.s390x",
            "openSUSE Leap 15.4:kselftests-kmp-default-5.14.21-150400.24.21.2.x86_64",
            "openSUSE Leap 15.4:ocfs2-kmp-64kb-5.14.21-150400.24.21.2.aarch64",
            "openSUSE Leap 15.4:ocfs2-kmp-default-5.14.21-150400.24.21.2.aarch64",
            "openSUSE Leap 15.4:ocfs2-kmp-default-5.14.21-150400.24.21.2.ppc64le",
            "openSUSE Leap 15.4:ocfs2-kmp-default-5.14.21-150400.24.21.2.s390x",
            "openSUSE Leap 15.4:ocfs2-kmp-default-5.14.21-150400.24.21.2.x86_64",
            "openSUSE Leap 15.4:reiserfs-kmp-64kb-5.14.21-150400.24.21.2.aarch64",
            "openSUSE Leap 15.4:reiserfs-kmp-default-5.14.21-150400.24.21.2.aarch64",
            "openSUSE Leap 15.4:reiserfs-kmp-default-5.14.21-150400.24.21.2.ppc64le",
            "openSUSE Leap 15.4:reiserfs-kmp-default-5.14.21-150400.24.21.2.s390x",
            "openSUSE Leap 15.4:reiserfs-kmp-default-5.14.21-150400.24.21.2.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 7.8,
            "baseSeverity": "HIGH",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
            "version": "3.1"
          },
          "products": [
            "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.21.2.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.21.2.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.21.2.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.21.2.x86_64",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.21.2.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.21.2.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.21.2.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.21.2.x86_64",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.21.2.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.21.2.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.21.2.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.21.2.x86_64",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.21.2.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.21.2.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.21.2.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.21.2.x86_64",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.21.2.ppc64le",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.21.2.s390x",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.21.2.x86_64",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.21.2.ppc64le",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.21.2.s390x",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.21.2.x86_64",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_21-default-1-150400.9.3.2.ppc64le",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_21-default-1-150400.9.3.2.s390x",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_21-default-1-150400.9.3.2.x86_64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-64kb-5.14.21-150400.24.21.2.aarch64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-64kb-devel-5.14.21-150400.24.21.2.aarch64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-5.14.21-150400.24.21.2.aarch64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-5.14.21-150400.24.21.2.ppc64le",
            "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-5.14.21-150400.24.21.2.s390x",
            "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-5.14.21-150400.24.21.2.x86_64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-base-5.14.21-150400.24.21.2.150400.24.7.2.aarch64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-base-5.14.21-150400.24.21.2.150400.24.7.2.ppc64le",
            "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-base-5.14.21-150400.24.21.2.150400.24.7.2.s390x",
            "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-base-5.14.21-150400.24.21.2.150400.24.7.2.x86_64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-devel-5.14.21-150400.24.21.2.aarch64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-devel-5.14.21-150400.24.21.2.ppc64le",
            "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-devel-5.14.21-150400.24.21.2.s390x",
            "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-devel-5.14.21-150400.24.21.2.x86_64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-devel-5.14.21-150400.24.21.2.noarch",
            "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-macros-5.14.21-150400.24.21.2.noarch",
            "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-zfcpdump-5.14.21-150400.24.21.2.s390x",
            "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-docs-5.14.21-150400.24.21.3.noarch",
            "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-obs-build-5.14.21-150400.24.21.2.aarch64",
            "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-obs-build-5.14.21-150400.24.21.2.ppc64le",
            "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-obs-build-5.14.21-150400.24.21.2.s390x",
            "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-obs-build-5.14.21-150400.24.21.2.x86_64",
            "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-source-5.14.21-150400.24.21.2.noarch",
            "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-syms-5.14.21-150400.24.21.1.aarch64",
            "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-syms-5.14.21-150400.24.21.1.ppc64le",
            "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-syms-5.14.21-150400.24.21.1.s390x",
            "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-syms-5.14.21-150400.24.21.1.x86_64",
            "SUSE Linux Enterprise Module for Legacy 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.21.2.aarch64",
            "SUSE Linux Enterprise Module for Legacy 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.21.2.ppc64le",
            "SUSE Linux Enterprise Module for Legacy 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.21.2.s390x",
            "SUSE Linux Enterprise Module for Legacy 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.21.2.x86_64",
            "SUSE Linux Enterprise Workstation Extension 15 SP4:kernel-default-extra-5.14.21-150400.24.21.2.x86_64",
            "openSUSE Leap 15.4:cluster-md-kmp-64kb-5.14.21-150400.24.21.2.aarch64",
            "openSUSE Leap 15.4:cluster-md-kmp-default-5.14.21-150400.24.21.2.aarch64",
            "openSUSE Leap 15.4:cluster-md-kmp-default-5.14.21-150400.24.21.2.ppc64le",
            "openSUSE Leap 15.4:cluster-md-kmp-default-5.14.21-150400.24.21.2.s390x",
            "openSUSE Leap 15.4:cluster-md-kmp-default-5.14.21-150400.24.21.2.x86_64",
            "openSUSE Leap 15.4:dlm-kmp-64kb-5.14.21-150400.24.21.2.aarch64",
            "openSUSE Leap 15.4:dlm-kmp-default-5.14.21-150400.24.21.2.aarch64",
            "openSUSE Leap 15.4:dlm-kmp-default-5.14.21-150400.24.21.2.ppc64le",
            "openSUSE Leap 15.4:dlm-kmp-default-5.14.21-150400.24.21.2.s390x",
            "openSUSE Leap 15.4:dlm-kmp-default-5.14.21-150400.24.21.2.x86_64",
            "openSUSE Leap 15.4:dtb-allwinner-5.14.21-150400.24.21.1.aarch64",
            "openSUSE Leap 15.4:dtb-altera-5.14.21-150400.24.21.1.aarch64",
            "openSUSE Leap 15.4:dtb-amazon-5.14.21-150400.24.21.1.aarch64",
            "openSUSE Leap 15.4:dtb-amd-5.14.21-150400.24.21.1.aarch64",
            "openSUSE Leap 15.4:dtb-amlogic-5.14.21-150400.24.21.1.aarch64",
            "openSUSE Leap 15.4:dtb-apm-5.14.21-150400.24.21.1.aarch64",
            "openSUSE Leap 15.4:dtb-apple-5.14.21-150400.24.21.1.aarch64",
            "openSUSE Leap 15.4:dtb-arm-5.14.21-150400.24.21.1.aarch64",
            "openSUSE Leap 15.4:dtb-broadcom-5.14.21-150400.24.21.1.aarch64",
            "openSUSE Leap 15.4:dtb-cavium-5.14.21-150400.24.21.1.aarch64",
            "openSUSE Leap 15.4:dtb-exynos-5.14.21-150400.24.21.1.aarch64",
            "openSUSE Leap 15.4:dtb-freescale-5.14.21-150400.24.21.1.aarch64",
            "openSUSE Leap 15.4:dtb-hisilicon-5.14.21-150400.24.21.1.aarch64",
            "openSUSE Leap 15.4:dtb-lg-5.14.21-150400.24.21.1.aarch64",
            "openSUSE Leap 15.4:dtb-marvell-5.14.21-150400.24.21.1.aarch64",
            "openSUSE Leap 15.4:dtb-mediatek-5.14.21-150400.24.21.1.aarch64",
            "openSUSE Leap 15.4:dtb-nvidia-5.14.21-150400.24.21.1.aarch64",
            "openSUSE Leap 15.4:dtb-qcom-5.14.21-150400.24.21.1.aarch64",
            "openSUSE Leap 15.4:dtb-renesas-5.14.21-150400.24.21.1.aarch64",
            "openSUSE Leap 15.4:dtb-rockchip-5.14.21-150400.24.21.1.aarch64",
            "openSUSE Leap 15.4:dtb-socionext-5.14.21-150400.24.21.1.aarch64",
            "openSUSE Leap 15.4:dtb-sprd-5.14.21-150400.24.21.1.aarch64",
            "openSUSE Leap 15.4:dtb-xilinx-5.14.21-150400.24.21.1.aarch64",
            "openSUSE Leap 15.4:gfs2-kmp-64kb-5.14.21-150400.24.21.2.aarch64",
            "openSUSE Leap 15.4:gfs2-kmp-default-5.14.21-150400.24.21.2.aarch64",
            "openSUSE Leap 15.4:gfs2-kmp-default-5.14.21-150400.24.21.2.ppc64le",
            "openSUSE Leap 15.4:gfs2-kmp-default-5.14.21-150400.24.21.2.s390x",
            "openSUSE Leap 15.4:gfs2-kmp-default-5.14.21-150400.24.21.2.x86_64",
            "openSUSE Leap 15.4:kernel-64kb-5.14.21-150400.24.21.2.aarch64",
            "openSUSE Leap 15.4:kernel-64kb-devel-5.14.21-150400.24.21.2.aarch64",
            "openSUSE Leap 15.4:kernel-64kb-extra-5.14.21-150400.24.21.2.aarch64",
            "openSUSE Leap 15.4:kernel-64kb-livepatch-devel-5.14.21-150400.24.21.2.aarch64",
            "openSUSE Leap 15.4:kernel-64kb-optional-5.14.21-150400.24.21.2.aarch64",
            "openSUSE Leap 15.4:kernel-debug-5.14.21-150400.24.21.2.ppc64le",
            "openSUSE Leap 15.4:kernel-debug-5.14.21-150400.24.21.2.x86_64",
            "openSUSE Leap 15.4:kernel-debug-devel-5.14.21-150400.24.21.2.ppc64le",
            "openSUSE Leap 15.4:kernel-debug-devel-5.14.21-150400.24.21.2.x86_64",
            "openSUSE Leap 15.4:kernel-debug-livepatch-devel-5.14.21-150400.24.21.2.ppc64le",
            "openSUSE Leap 15.4:kernel-debug-livepatch-devel-5.14.21-150400.24.21.2.x86_64",
            "openSUSE Leap 15.4:kernel-default-5.14.21-150400.24.21.2.aarch64",
            "openSUSE Leap 15.4:kernel-default-5.14.21-150400.24.21.2.ppc64le",
            "openSUSE Leap 15.4:kernel-default-5.14.21-150400.24.21.2.s390x",
            "openSUSE Leap 15.4:kernel-default-5.14.21-150400.24.21.2.x86_64",
            "openSUSE Leap 15.4:kernel-default-base-5.14.21-150400.24.21.2.150400.24.7.2.aarch64",
            "openSUSE Leap 15.4:kernel-default-base-5.14.21-150400.24.21.2.150400.24.7.2.ppc64le",
            "openSUSE Leap 15.4:kernel-default-base-5.14.21-150400.24.21.2.150400.24.7.2.s390x",
            "openSUSE Leap 15.4:kernel-default-base-5.14.21-150400.24.21.2.150400.24.7.2.x86_64",
            "openSUSE Leap 15.4:kernel-default-base-rebuild-5.14.21-150400.24.21.2.150400.24.7.2.aarch64",
            "openSUSE Leap 15.4:kernel-default-base-rebuild-5.14.21-150400.24.21.2.150400.24.7.2.ppc64le",
            "openSUSE Leap 15.4:kernel-default-base-rebuild-5.14.21-150400.24.21.2.150400.24.7.2.s390x",
            "openSUSE Leap 15.4:kernel-default-base-rebuild-5.14.21-150400.24.21.2.150400.24.7.2.x86_64",
            "openSUSE Leap 15.4:kernel-default-devel-5.14.21-150400.24.21.2.aarch64",
            "openSUSE Leap 15.4:kernel-default-devel-5.14.21-150400.24.21.2.ppc64le",
            "openSUSE Leap 15.4:kernel-default-devel-5.14.21-150400.24.21.2.s390x",
            "openSUSE Leap 15.4:kernel-default-devel-5.14.21-150400.24.21.2.x86_64",
            "openSUSE Leap 15.4:kernel-default-extra-5.14.21-150400.24.21.2.aarch64",
            "openSUSE Leap 15.4:kernel-default-extra-5.14.21-150400.24.21.2.ppc64le",
            "openSUSE Leap 15.4:kernel-default-extra-5.14.21-150400.24.21.2.s390x",
            "openSUSE Leap 15.4:kernel-default-extra-5.14.21-150400.24.21.2.x86_64",
            "openSUSE Leap 15.4:kernel-default-livepatch-5.14.21-150400.24.21.2.aarch64",
            "openSUSE Leap 15.4:kernel-default-livepatch-5.14.21-150400.24.21.2.ppc64le",
            "openSUSE Leap 15.4:kernel-default-livepatch-5.14.21-150400.24.21.2.s390x",
            "openSUSE Leap 15.4:kernel-default-livepatch-5.14.21-150400.24.21.2.x86_64",
            "openSUSE Leap 15.4:kernel-default-livepatch-devel-5.14.21-150400.24.21.2.aarch64",
            "openSUSE Leap 15.4:kernel-default-livepatch-devel-5.14.21-150400.24.21.2.ppc64le",
            "openSUSE Leap 15.4:kernel-default-livepatch-devel-5.14.21-150400.24.21.2.s390x",
            "openSUSE Leap 15.4:kernel-default-livepatch-devel-5.14.21-150400.24.21.2.x86_64",
            "openSUSE Leap 15.4:kernel-default-optional-5.14.21-150400.24.21.2.aarch64",
            "openSUSE Leap 15.4:kernel-default-optional-5.14.21-150400.24.21.2.ppc64le",
            "openSUSE Leap 15.4:kernel-default-optional-5.14.21-150400.24.21.2.s390x",
            "openSUSE Leap 15.4:kernel-default-optional-5.14.21-150400.24.21.2.x86_64",
            "openSUSE Leap 15.4:kernel-devel-5.14.21-150400.24.21.2.noarch",
            "openSUSE Leap 15.4:kernel-docs-5.14.21-150400.24.21.3.noarch",
            "openSUSE Leap 15.4:kernel-docs-html-5.14.21-150400.24.21.3.noarch",
            "openSUSE Leap 15.4:kernel-kvmsmall-5.14.21-150400.24.21.2.aarch64",
            "openSUSE Leap 15.4:kernel-kvmsmall-5.14.21-150400.24.21.2.ppc64le",
            "openSUSE Leap 15.4:kernel-kvmsmall-5.14.21-150400.24.21.2.x86_64",
            "openSUSE Leap 15.4:kernel-kvmsmall-devel-5.14.21-150400.24.21.2.aarch64",
            "openSUSE Leap 15.4:kernel-kvmsmall-devel-5.14.21-150400.24.21.2.ppc64le",
            "openSUSE Leap 15.4:kernel-kvmsmall-devel-5.14.21-150400.24.21.2.x86_64",
            "openSUSE Leap 15.4:kernel-kvmsmall-livepatch-devel-5.14.21-150400.24.21.2.aarch64",
            "openSUSE Leap 15.4:kernel-kvmsmall-livepatch-devel-5.14.21-150400.24.21.2.ppc64le",
            "openSUSE Leap 15.4:kernel-kvmsmall-livepatch-devel-5.14.21-150400.24.21.2.x86_64",
            "openSUSE Leap 15.4:kernel-macros-5.14.21-150400.24.21.2.noarch",
            "openSUSE Leap 15.4:kernel-obs-build-5.14.21-150400.24.21.2.aarch64",
            "openSUSE Leap 15.4:kernel-obs-build-5.14.21-150400.24.21.2.ppc64le",
            "openSUSE Leap 15.4:kernel-obs-build-5.14.21-150400.24.21.2.s390x",
            "openSUSE Leap 15.4:kernel-obs-build-5.14.21-150400.24.21.2.x86_64",
            "openSUSE Leap 15.4:kernel-obs-qa-5.14.21-150400.24.21.1.aarch64",
            "openSUSE Leap 15.4:kernel-obs-qa-5.14.21-150400.24.21.1.ppc64le",
            "openSUSE Leap 15.4:kernel-obs-qa-5.14.21-150400.24.21.1.s390x",
            "openSUSE Leap 15.4:kernel-obs-qa-5.14.21-150400.24.21.1.x86_64",
            "openSUSE Leap 15.4:kernel-source-5.14.21-150400.24.21.2.noarch",
            "openSUSE Leap 15.4:kernel-source-vanilla-5.14.21-150400.24.21.2.noarch",
            "openSUSE Leap 15.4:kernel-syms-5.14.21-150400.24.21.1.aarch64",
            "openSUSE Leap 15.4:kernel-syms-5.14.21-150400.24.21.1.ppc64le",
            "openSUSE Leap 15.4:kernel-syms-5.14.21-150400.24.21.1.s390x",
            "openSUSE Leap 15.4:kernel-syms-5.14.21-150400.24.21.1.x86_64",
            "openSUSE Leap 15.4:kernel-zfcpdump-5.14.21-150400.24.21.2.s390x",
            "openSUSE Leap 15.4:kselftests-kmp-64kb-5.14.21-150400.24.21.2.aarch64",
            "openSUSE Leap 15.4:kselftests-kmp-default-5.14.21-150400.24.21.2.aarch64",
            "openSUSE Leap 15.4:kselftests-kmp-default-5.14.21-150400.24.21.2.ppc64le",
            "openSUSE Leap 15.4:kselftests-kmp-default-5.14.21-150400.24.21.2.s390x",
            "openSUSE Leap 15.4:kselftests-kmp-default-5.14.21-150400.24.21.2.x86_64",
            "openSUSE Leap 15.4:ocfs2-kmp-64kb-5.14.21-150400.24.21.2.aarch64",
            "openSUSE Leap 15.4:ocfs2-kmp-default-5.14.21-150400.24.21.2.aarch64",
            "openSUSE Leap 15.4:ocfs2-kmp-default-5.14.21-150400.24.21.2.ppc64le",
            "openSUSE Leap 15.4:ocfs2-kmp-default-5.14.21-150400.24.21.2.s390x",
            "openSUSE Leap 15.4:ocfs2-kmp-default-5.14.21-150400.24.21.2.x86_64",
            "openSUSE Leap 15.4:reiserfs-kmp-64kb-5.14.21-150400.24.21.2.aarch64",
            "openSUSE Leap 15.4:reiserfs-kmp-default-5.14.21-150400.24.21.2.aarch64",
            "openSUSE Leap 15.4:reiserfs-kmp-default-5.14.21-150400.24.21.2.ppc64le",
            "openSUSE Leap 15.4:reiserfs-kmp-default-5.14.21-150400.24.21.2.s390x",
            "openSUSE Leap 15.4:reiserfs-kmp-default-5.14.21-150400.24.21.2.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2022-09-16T15:30:19Z",
          "details": "important"
        }
      ],
      "title": "CVE-2022-2588"
    },
    {
      "cve": "CVE-2022-2639",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2022-2639"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "An integer coercion error was found in the openvswitch kernel module. Given a sufficiently large number of actions, while copying and reserving memory for a new action of a new flow, the reserve_sfa_size() function does not return -EMSGSIZE as expected, potentially leading to an out-of-bounds write access. This flaw allows a local user to crash or potentially escalate their privileges on the system.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.21.2.aarch64",
          "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.21.2.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.21.2.s390x",
          "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.21.2.x86_64",
          "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.21.2.aarch64",
          "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.21.2.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.21.2.s390x",
          "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.21.2.x86_64",
          "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.21.2.aarch64",
          "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.21.2.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.21.2.s390x",
          "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.21.2.x86_64",
          "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.21.2.aarch64",
          "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.21.2.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.21.2.s390x",
          "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.21.2.x86_64",
          "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.21.2.ppc64le",
          "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.21.2.s390x",
          "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.21.2.x86_64",
          "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.21.2.ppc64le",
          "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.21.2.s390x",
          "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.21.2.x86_64",
          "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_21-default-1-150400.9.3.2.ppc64le",
          "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_21-default-1-150400.9.3.2.s390x",
          "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_21-default-1-150400.9.3.2.x86_64",
          "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-64kb-5.14.21-150400.24.21.2.aarch64",
          "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-64kb-devel-5.14.21-150400.24.21.2.aarch64",
          "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-5.14.21-150400.24.21.2.aarch64",
          "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-5.14.21-150400.24.21.2.ppc64le",
          "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-5.14.21-150400.24.21.2.s390x",
          "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-5.14.21-150400.24.21.2.x86_64",
          "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-base-5.14.21-150400.24.21.2.150400.24.7.2.aarch64",
          "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-base-5.14.21-150400.24.21.2.150400.24.7.2.ppc64le",
          "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-base-5.14.21-150400.24.21.2.150400.24.7.2.s390x",
          "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-base-5.14.21-150400.24.21.2.150400.24.7.2.x86_64",
          "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-devel-5.14.21-150400.24.21.2.aarch64",
          "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-devel-5.14.21-150400.24.21.2.ppc64le",
          "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-devel-5.14.21-150400.24.21.2.s390x",
          "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-devel-5.14.21-150400.24.21.2.x86_64",
          "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-devel-5.14.21-150400.24.21.2.noarch",
          "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-macros-5.14.21-150400.24.21.2.noarch",
          "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-zfcpdump-5.14.21-150400.24.21.2.s390x",
          "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-docs-5.14.21-150400.24.21.3.noarch",
          "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-obs-build-5.14.21-150400.24.21.2.aarch64",
          "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-obs-build-5.14.21-150400.24.21.2.ppc64le",
          "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-obs-build-5.14.21-150400.24.21.2.s390x",
          "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-obs-build-5.14.21-150400.24.21.2.x86_64",
          "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-source-5.14.21-150400.24.21.2.noarch",
          "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-syms-5.14.21-150400.24.21.1.aarch64",
          "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-syms-5.14.21-150400.24.21.1.ppc64le",
          "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-syms-5.14.21-150400.24.21.1.s390x",
          "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-syms-5.14.21-150400.24.21.1.x86_64",
          "SUSE Linux Enterprise Module for Legacy 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.21.2.aarch64",
          "SUSE Linux Enterprise Module for Legacy 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.21.2.ppc64le",
          "SUSE Linux Enterprise Module for Legacy 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.21.2.s390x",
          "SUSE Linux Enterprise Module for Legacy 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.21.2.x86_64",
          "SUSE Linux Enterprise Workstation Extension 15 SP4:kernel-default-extra-5.14.21-150400.24.21.2.x86_64",
          "openSUSE Leap 15.4:cluster-md-kmp-64kb-5.14.21-150400.24.21.2.aarch64",
          "openSUSE Leap 15.4:cluster-md-kmp-default-5.14.21-150400.24.21.2.aarch64",
          "openSUSE Leap 15.4:cluster-md-kmp-default-5.14.21-150400.24.21.2.ppc64le",
          "openSUSE Leap 15.4:cluster-md-kmp-default-5.14.21-150400.24.21.2.s390x",
          "openSUSE Leap 15.4:cluster-md-kmp-default-5.14.21-150400.24.21.2.x86_64",
          "openSUSE Leap 15.4:dlm-kmp-64kb-5.14.21-150400.24.21.2.aarch64",
          "openSUSE Leap 15.4:dlm-kmp-default-5.14.21-150400.24.21.2.aarch64",
          "openSUSE Leap 15.4:dlm-kmp-default-5.14.21-150400.24.21.2.ppc64le",
          "openSUSE Leap 15.4:dlm-kmp-default-5.14.21-150400.24.21.2.s390x",
          "openSUSE Leap 15.4:dlm-kmp-default-5.14.21-150400.24.21.2.x86_64",
          "openSUSE Leap 15.4:dtb-allwinner-5.14.21-150400.24.21.1.aarch64",
          "openSUSE Leap 15.4:dtb-altera-5.14.21-150400.24.21.1.aarch64",
          "openSUSE Leap 15.4:dtb-amazon-5.14.21-150400.24.21.1.aarch64",
          "openSUSE Leap 15.4:dtb-amd-5.14.21-150400.24.21.1.aarch64",
          "openSUSE Leap 15.4:dtb-amlogic-5.14.21-150400.24.21.1.aarch64",
          "openSUSE Leap 15.4:dtb-apm-5.14.21-150400.24.21.1.aarch64",
          "openSUSE Leap 15.4:dtb-apple-5.14.21-150400.24.21.1.aarch64",
          "openSUSE Leap 15.4:dtb-arm-5.14.21-150400.24.21.1.aarch64",
          "openSUSE Leap 15.4:dtb-broadcom-5.14.21-150400.24.21.1.aarch64",
          "openSUSE Leap 15.4:dtb-cavium-5.14.21-150400.24.21.1.aarch64",
          "openSUSE Leap 15.4:dtb-exynos-5.14.21-150400.24.21.1.aarch64",
          "openSUSE Leap 15.4:dtb-freescale-5.14.21-150400.24.21.1.aarch64",
          "openSUSE Leap 15.4:dtb-hisilicon-5.14.21-150400.24.21.1.aarch64",
          "openSUSE Leap 15.4:dtb-lg-5.14.21-150400.24.21.1.aarch64",
          "openSUSE Leap 15.4:dtb-marvell-5.14.21-150400.24.21.1.aarch64",
          "openSUSE Leap 15.4:dtb-mediatek-5.14.21-150400.24.21.1.aarch64",
          "openSUSE Leap 15.4:dtb-nvidia-5.14.21-150400.24.21.1.aarch64",
          "openSUSE Leap 15.4:dtb-qcom-5.14.21-150400.24.21.1.aarch64",
          "openSUSE Leap 15.4:dtb-renesas-5.14.21-150400.24.21.1.aarch64",
          "openSUSE Leap 15.4:dtb-rockchip-5.14.21-150400.24.21.1.aarch64",
          "openSUSE Leap 15.4:dtb-socionext-5.14.21-150400.24.21.1.aarch64",
          "openSUSE Leap 15.4:dtb-sprd-5.14.21-150400.24.21.1.aarch64",
          "openSUSE Leap 15.4:dtb-xilinx-5.14.21-150400.24.21.1.aarch64",
          "openSUSE Leap 15.4:gfs2-kmp-64kb-5.14.21-150400.24.21.2.aarch64",
          "openSUSE Leap 15.4:gfs2-kmp-default-5.14.21-150400.24.21.2.aarch64",
          "openSUSE Leap 15.4:gfs2-kmp-default-5.14.21-150400.24.21.2.ppc64le",
          "openSUSE Leap 15.4:gfs2-kmp-default-5.14.21-150400.24.21.2.s390x",
          "openSUSE Leap 15.4:gfs2-kmp-default-5.14.21-150400.24.21.2.x86_64",
          "openSUSE Leap 15.4:kernel-64kb-5.14.21-150400.24.21.2.aarch64",
          "openSUSE Leap 15.4:kernel-64kb-devel-5.14.21-150400.24.21.2.aarch64",
          "openSUSE Leap 15.4:kernel-64kb-extra-5.14.21-150400.24.21.2.aarch64",
          "openSUSE Leap 15.4:kernel-64kb-livepatch-devel-5.14.21-150400.24.21.2.aarch64",
          "openSUSE Leap 15.4:kernel-64kb-optional-5.14.21-150400.24.21.2.aarch64",
          "openSUSE Leap 15.4:kernel-debug-5.14.21-150400.24.21.2.ppc64le",
          "openSUSE Leap 15.4:kernel-debug-5.14.21-150400.24.21.2.x86_64",
          "openSUSE Leap 15.4:kernel-debug-devel-5.14.21-150400.24.21.2.ppc64le",
          "openSUSE Leap 15.4:kernel-debug-devel-5.14.21-150400.24.21.2.x86_64",
          "openSUSE Leap 15.4:kernel-debug-livepatch-devel-5.14.21-150400.24.21.2.ppc64le",
          "openSUSE Leap 15.4:kernel-debug-livepatch-devel-5.14.21-150400.24.21.2.x86_64",
          "openSUSE Leap 15.4:kernel-default-5.14.21-150400.24.21.2.aarch64",
          "openSUSE Leap 15.4:kernel-default-5.14.21-150400.24.21.2.ppc64le",
          "openSUSE Leap 15.4:kernel-default-5.14.21-150400.24.21.2.s390x",
          "openSUSE Leap 15.4:kernel-default-5.14.21-150400.24.21.2.x86_64",
          "openSUSE Leap 15.4:kernel-default-base-5.14.21-150400.24.21.2.150400.24.7.2.aarch64",
          "openSUSE Leap 15.4:kernel-default-base-5.14.21-150400.24.21.2.150400.24.7.2.ppc64le",
          "openSUSE Leap 15.4:kernel-default-base-5.14.21-150400.24.21.2.150400.24.7.2.s390x",
          "openSUSE Leap 15.4:kernel-default-base-5.14.21-150400.24.21.2.150400.24.7.2.x86_64",
          "openSUSE Leap 15.4:kernel-default-base-rebuild-5.14.21-150400.24.21.2.150400.24.7.2.aarch64",
          "openSUSE Leap 15.4:kernel-default-base-rebuild-5.14.21-150400.24.21.2.150400.24.7.2.ppc64le",
          "openSUSE Leap 15.4:kernel-default-base-rebuild-5.14.21-150400.24.21.2.150400.24.7.2.s390x",
          "openSUSE Leap 15.4:kernel-default-base-rebuild-5.14.21-150400.24.21.2.150400.24.7.2.x86_64",
          "openSUSE Leap 15.4:kernel-default-devel-5.14.21-150400.24.21.2.aarch64",
          "openSUSE Leap 15.4:kernel-default-devel-5.14.21-150400.24.21.2.ppc64le",
          "openSUSE Leap 15.4:kernel-default-devel-5.14.21-150400.24.21.2.s390x",
          "openSUSE Leap 15.4:kernel-default-devel-5.14.21-150400.24.21.2.x86_64",
          "openSUSE Leap 15.4:kernel-default-extra-5.14.21-150400.24.21.2.aarch64",
          "openSUSE Leap 15.4:kernel-default-extra-5.14.21-150400.24.21.2.ppc64le",
          "openSUSE Leap 15.4:kernel-default-extra-5.14.21-150400.24.21.2.s390x",
          "openSUSE Leap 15.4:kernel-default-extra-5.14.21-150400.24.21.2.x86_64",
          "openSUSE Leap 15.4:kernel-default-livepatch-5.14.21-150400.24.21.2.aarch64",
          "openSUSE Leap 15.4:kernel-default-livepatch-5.14.21-150400.24.21.2.ppc64le",
          "openSUSE Leap 15.4:kernel-default-livepatch-5.14.21-150400.24.21.2.s390x",
          "openSUSE Leap 15.4:kernel-default-livepatch-5.14.21-150400.24.21.2.x86_64",
          "openSUSE Leap 15.4:kernel-default-livepatch-devel-5.14.21-150400.24.21.2.aarch64",
          "openSUSE Leap 15.4:kernel-default-livepatch-devel-5.14.21-150400.24.21.2.ppc64le",
          "openSUSE Leap 15.4:kernel-default-livepatch-devel-5.14.21-150400.24.21.2.s390x",
          "openSUSE Leap 15.4:kernel-default-livepatch-devel-5.14.21-150400.24.21.2.x86_64",
          "openSUSE Leap 15.4:kernel-default-optional-5.14.21-150400.24.21.2.aarch64",
          "openSUSE Leap 15.4:kernel-default-optional-5.14.21-150400.24.21.2.ppc64le",
          "openSUSE Leap 15.4:kernel-default-optional-5.14.21-150400.24.21.2.s390x",
          "openSUSE Leap 15.4:kernel-default-optional-5.14.21-150400.24.21.2.x86_64",
          "openSUSE Leap 15.4:kernel-devel-5.14.21-150400.24.21.2.noarch",
          "openSUSE Leap 15.4:kernel-docs-5.14.21-150400.24.21.3.noarch",
          "openSUSE Leap 15.4:kernel-docs-html-5.14.21-150400.24.21.3.noarch",
          "openSUSE Leap 15.4:kernel-kvmsmall-5.14.21-150400.24.21.2.aarch64",
          "openSUSE Leap 15.4:kernel-kvmsmall-5.14.21-150400.24.21.2.ppc64le",
          "openSUSE Leap 15.4:kernel-kvmsmall-5.14.21-150400.24.21.2.x86_64",
          "openSUSE Leap 15.4:kernel-kvmsmall-devel-5.14.21-150400.24.21.2.aarch64",
          "openSUSE Leap 15.4:kernel-kvmsmall-devel-5.14.21-150400.24.21.2.ppc64le",
          "openSUSE Leap 15.4:kernel-kvmsmall-devel-5.14.21-150400.24.21.2.x86_64",
          "openSUSE Leap 15.4:kernel-kvmsmall-livepatch-devel-5.14.21-150400.24.21.2.aarch64",
          "openSUSE Leap 15.4:kernel-kvmsmall-livepatch-devel-5.14.21-150400.24.21.2.ppc64le",
          "openSUSE Leap 15.4:kernel-kvmsmall-livepatch-devel-5.14.21-150400.24.21.2.x86_64",
          "openSUSE Leap 15.4:kernel-macros-5.14.21-150400.24.21.2.noarch",
          "openSUSE Leap 15.4:kernel-obs-build-5.14.21-150400.24.21.2.aarch64",
          "openSUSE Leap 15.4:kernel-obs-build-5.14.21-150400.24.21.2.ppc64le",
          "openSUSE Leap 15.4:kernel-obs-build-5.14.21-150400.24.21.2.s390x",
          "openSUSE Leap 15.4:kernel-obs-build-5.14.21-150400.24.21.2.x86_64",
          "openSUSE Leap 15.4:kernel-obs-qa-5.14.21-150400.24.21.1.aarch64",
          "openSUSE Leap 15.4:kernel-obs-qa-5.14.21-150400.24.21.1.ppc64le",
          "openSUSE Leap 15.4:kernel-obs-qa-5.14.21-150400.24.21.1.s390x",
          "openSUSE Leap 15.4:kernel-obs-qa-5.14.21-150400.24.21.1.x86_64",
          "openSUSE Leap 15.4:kernel-source-5.14.21-150400.24.21.2.noarch",
          "openSUSE Leap 15.4:kernel-source-vanilla-5.14.21-150400.24.21.2.noarch",
          "openSUSE Leap 15.4:kernel-syms-5.14.21-150400.24.21.1.aarch64",
          "openSUSE Leap 15.4:kernel-syms-5.14.21-150400.24.21.1.ppc64le",
          "openSUSE Leap 15.4:kernel-syms-5.14.21-150400.24.21.1.s390x",
          "openSUSE Leap 15.4:kernel-syms-5.14.21-150400.24.21.1.x86_64",
          "openSUSE Leap 15.4:kernel-zfcpdump-5.14.21-150400.24.21.2.s390x",
          "openSUSE Leap 15.4:kselftests-kmp-64kb-5.14.21-150400.24.21.2.aarch64",
          "openSUSE Leap 15.4:kselftests-kmp-default-5.14.21-150400.24.21.2.aarch64",
          "openSUSE Leap 15.4:kselftests-kmp-default-5.14.21-150400.24.21.2.ppc64le",
          "openSUSE Leap 15.4:kselftests-kmp-default-5.14.21-150400.24.21.2.s390x",
          "openSUSE Leap 15.4:kselftests-kmp-default-5.14.21-150400.24.21.2.x86_64",
          "openSUSE Leap 15.4:ocfs2-kmp-64kb-5.14.21-150400.24.21.2.aarch64",
          "openSUSE Leap 15.4:ocfs2-kmp-default-5.14.21-150400.24.21.2.aarch64",
          "openSUSE Leap 15.4:ocfs2-kmp-default-5.14.21-150400.24.21.2.ppc64le",
          "openSUSE Leap 15.4:ocfs2-kmp-default-5.14.21-150400.24.21.2.s390x",
          "openSUSE Leap 15.4:ocfs2-kmp-default-5.14.21-150400.24.21.2.x86_64",
          "openSUSE Leap 15.4:reiserfs-kmp-64kb-5.14.21-150400.24.21.2.aarch64",
          "openSUSE Leap 15.4:reiserfs-kmp-default-5.14.21-150400.24.21.2.aarch64",
          "openSUSE Leap 15.4:reiserfs-kmp-default-5.14.21-150400.24.21.2.ppc64le",
          "openSUSE Leap 15.4:reiserfs-kmp-default-5.14.21-150400.24.21.2.s390x",
          "openSUSE Leap 15.4:reiserfs-kmp-default-5.14.21-150400.24.21.2.x86_64"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2022-2639",
          "url": "https://www.suse.com/security/cve/CVE-2022-2639"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1202154 for CVE-2022-2639",
          "url": "https://bugzilla.suse.com/1202154"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.21.2.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.21.2.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.21.2.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.21.2.x86_64",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.21.2.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.21.2.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.21.2.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.21.2.x86_64",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.21.2.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.21.2.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.21.2.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.21.2.x86_64",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.21.2.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.21.2.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.21.2.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.21.2.x86_64",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.21.2.ppc64le",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.21.2.s390x",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.21.2.x86_64",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.21.2.ppc64le",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.21.2.s390x",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.21.2.x86_64",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_21-default-1-150400.9.3.2.ppc64le",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_21-default-1-150400.9.3.2.s390x",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_21-default-1-150400.9.3.2.x86_64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-64kb-5.14.21-150400.24.21.2.aarch64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-64kb-devel-5.14.21-150400.24.21.2.aarch64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-5.14.21-150400.24.21.2.aarch64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-5.14.21-150400.24.21.2.ppc64le",
            "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-5.14.21-150400.24.21.2.s390x",
            "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-5.14.21-150400.24.21.2.x86_64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-base-5.14.21-150400.24.21.2.150400.24.7.2.aarch64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-base-5.14.21-150400.24.21.2.150400.24.7.2.ppc64le",
            "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-base-5.14.21-150400.24.21.2.150400.24.7.2.s390x",
            "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-base-5.14.21-150400.24.21.2.150400.24.7.2.x86_64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-devel-5.14.21-150400.24.21.2.aarch64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-devel-5.14.21-150400.24.21.2.ppc64le",
            "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-devel-5.14.21-150400.24.21.2.s390x",
            "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-devel-5.14.21-150400.24.21.2.x86_64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-devel-5.14.21-150400.24.21.2.noarch",
            "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-macros-5.14.21-150400.24.21.2.noarch",
            "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-zfcpdump-5.14.21-150400.24.21.2.s390x",
            "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-docs-5.14.21-150400.24.21.3.noarch",
            "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-obs-build-5.14.21-150400.24.21.2.aarch64",
            "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-obs-build-5.14.21-150400.24.21.2.ppc64le",
            "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-obs-build-5.14.21-150400.24.21.2.s390x",
            "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-obs-build-5.14.21-150400.24.21.2.x86_64",
            "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-source-5.14.21-150400.24.21.2.noarch",
            "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-syms-5.14.21-150400.24.21.1.aarch64",
            "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-syms-5.14.21-150400.24.21.1.ppc64le",
            "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-syms-5.14.21-150400.24.21.1.s390x",
            "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-syms-5.14.21-150400.24.21.1.x86_64",
            "SUSE Linux Enterprise Module for Legacy 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.21.2.aarch64",
            "SUSE Linux Enterprise Module for Legacy 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.21.2.ppc64le",
            "SUSE Linux Enterprise Module for Legacy 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.21.2.s390x",
            "SUSE Linux Enterprise Module for Legacy 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.21.2.x86_64",
            "SUSE Linux Enterprise Workstation Extension 15 SP4:kernel-default-extra-5.14.21-150400.24.21.2.x86_64",
            "openSUSE Leap 15.4:cluster-md-kmp-64kb-5.14.21-150400.24.21.2.aarch64",
            "openSUSE Leap 15.4:cluster-md-kmp-default-5.14.21-150400.24.21.2.aarch64",
            "openSUSE Leap 15.4:cluster-md-kmp-default-5.14.21-150400.24.21.2.ppc64le",
            "openSUSE Leap 15.4:cluster-md-kmp-default-5.14.21-150400.24.21.2.s390x",
            "openSUSE Leap 15.4:cluster-md-kmp-default-5.14.21-150400.24.21.2.x86_64",
            "openSUSE Leap 15.4:dlm-kmp-64kb-5.14.21-150400.24.21.2.aarch64",
            "openSUSE Leap 15.4:dlm-kmp-default-5.14.21-150400.24.21.2.aarch64",
            "openSUSE Leap 15.4:dlm-kmp-default-5.14.21-150400.24.21.2.ppc64le",
            "openSUSE Leap 15.4:dlm-kmp-default-5.14.21-150400.24.21.2.s390x",
            "openSUSE Leap 15.4:dlm-kmp-default-5.14.21-150400.24.21.2.x86_64",
            "openSUSE Leap 15.4:dtb-allwinner-5.14.21-150400.24.21.1.aarch64",
            "openSUSE Leap 15.4:dtb-altera-5.14.21-150400.24.21.1.aarch64",
            "openSUSE Leap 15.4:dtb-amazon-5.14.21-150400.24.21.1.aarch64",
            "openSUSE Leap 15.4:dtb-amd-5.14.21-150400.24.21.1.aarch64",
            "openSUSE Leap 15.4:dtb-amlogic-5.14.21-150400.24.21.1.aarch64",
            "openSUSE Leap 15.4:dtb-apm-5.14.21-150400.24.21.1.aarch64",
            "openSUSE Leap 15.4:dtb-apple-5.14.21-150400.24.21.1.aarch64",
            "openSUSE Leap 15.4:dtb-arm-5.14.21-150400.24.21.1.aarch64",
            "openSUSE Leap 15.4:dtb-broadcom-5.14.21-150400.24.21.1.aarch64",
            "openSUSE Leap 15.4:dtb-cavium-5.14.21-150400.24.21.1.aarch64",
            "openSUSE Leap 15.4:dtb-exynos-5.14.21-150400.24.21.1.aarch64",
            "openSUSE Leap 15.4:dtb-freescale-5.14.21-150400.24.21.1.aarch64",
            "openSUSE Leap 15.4:dtb-hisilicon-5.14.21-150400.24.21.1.aarch64",
            "openSUSE Leap 15.4:dtb-lg-5.14.21-150400.24.21.1.aarch64",
            "openSUSE Leap 15.4:dtb-marvell-5.14.21-150400.24.21.1.aarch64",
            "openSUSE Leap 15.4:dtb-mediatek-5.14.21-150400.24.21.1.aarch64",
            "openSUSE Leap 15.4:dtb-nvidia-5.14.21-150400.24.21.1.aarch64",
            "openSUSE Leap 15.4:dtb-qcom-5.14.21-150400.24.21.1.aarch64",
            "openSUSE Leap 15.4:dtb-renesas-5.14.21-150400.24.21.1.aarch64",
            "openSUSE Leap 15.4:dtb-rockchip-5.14.21-150400.24.21.1.aarch64",
            "openSUSE Leap 15.4:dtb-socionext-5.14.21-150400.24.21.1.aarch64",
            "openSUSE Leap 15.4:dtb-sprd-5.14.21-150400.24.21.1.aarch64",
            "openSUSE Leap 15.4:dtb-xilinx-5.14.21-150400.24.21.1.aarch64",
            "openSUSE Leap 15.4:gfs2-kmp-64kb-5.14.21-150400.24.21.2.aarch64",
            "openSUSE Leap 15.4:gfs2-kmp-default-5.14.21-150400.24.21.2.aarch64",
            "openSUSE Leap 15.4:gfs2-kmp-default-5.14.21-150400.24.21.2.ppc64le",
            "openSUSE Leap 15.4:gfs2-kmp-default-5.14.21-150400.24.21.2.s390x",
            "openSUSE Leap 15.4:gfs2-kmp-default-5.14.21-150400.24.21.2.x86_64",
            "openSUSE Leap 15.4:kernel-64kb-5.14.21-150400.24.21.2.aarch64",
            "openSUSE Leap 15.4:kernel-64kb-devel-5.14.21-150400.24.21.2.aarch64",
            "openSUSE Leap 15.4:kernel-64kb-extra-5.14.21-150400.24.21.2.aarch64",
            "openSUSE Leap 15.4:kernel-64kb-livepatch-devel-5.14.21-150400.24.21.2.aarch64",
            "openSUSE Leap 15.4:kernel-64kb-optional-5.14.21-150400.24.21.2.aarch64",
            "openSUSE Leap 15.4:kernel-debug-5.14.21-150400.24.21.2.ppc64le",
            "openSUSE Leap 15.4:kernel-debug-5.14.21-150400.24.21.2.x86_64",
            "openSUSE Leap 15.4:kernel-debug-devel-5.14.21-150400.24.21.2.ppc64le",
            "openSUSE Leap 15.4:kernel-debug-devel-5.14.21-150400.24.21.2.x86_64",
            "openSUSE Leap 15.4:kernel-debug-livepatch-devel-5.14.21-150400.24.21.2.ppc64le",
            "openSUSE Leap 15.4:kernel-debug-livepatch-devel-5.14.21-150400.24.21.2.x86_64",
            "openSUSE Leap 15.4:kernel-default-5.14.21-150400.24.21.2.aarch64",
            "openSUSE Leap 15.4:kernel-default-5.14.21-150400.24.21.2.ppc64le",
            "openSUSE Leap 15.4:kernel-default-5.14.21-150400.24.21.2.s390x",
            "openSUSE Leap 15.4:kernel-default-5.14.21-150400.24.21.2.x86_64",
            "openSUSE Leap 15.4:kernel-default-base-5.14.21-150400.24.21.2.150400.24.7.2.aarch64",
            "openSUSE Leap 15.4:kernel-default-base-5.14.21-150400.24.21.2.150400.24.7.2.ppc64le",
            "openSUSE Leap 15.4:kernel-default-base-5.14.21-150400.24.21.2.150400.24.7.2.s390x",
            "openSUSE Leap 15.4:kernel-default-base-5.14.21-150400.24.21.2.150400.24.7.2.x86_64",
            "openSUSE Leap 15.4:kernel-default-base-rebuild-5.14.21-150400.24.21.2.150400.24.7.2.aarch64",
            "openSUSE Leap 15.4:kernel-default-base-rebuild-5.14.21-150400.24.21.2.150400.24.7.2.ppc64le",
            "openSUSE Leap 15.4:kernel-default-base-rebuild-5.14.21-150400.24.21.2.150400.24.7.2.s390x",
            "openSUSE Leap 15.4:kernel-default-base-rebuild-5.14.21-150400.24.21.2.150400.24.7.2.x86_64",
            "openSUSE Leap 15.4:kernel-default-devel-5.14.21-150400.24.21.2.aarch64",
            "openSUSE Leap 15.4:kernel-default-devel-5.14.21-150400.24.21.2.ppc64le",
            "openSUSE Leap 15.4:kernel-default-devel-5.14.21-150400.24.21.2.s390x",
            "openSUSE Leap 15.4:kernel-default-devel-5.14.21-150400.24.21.2.x86_64",
            "openSUSE Leap 15.4:kernel-default-extra-5.14.21-150400.24.21.2.aarch64",
            "openSUSE Leap 15.4:kernel-default-extra-5.14.21-150400.24.21.2.ppc64le",
            "openSUSE Leap 15.4:kernel-default-extra-5.14.21-150400.24.21.2.s390x",
            "openSUSE Leap 15.4:kernel-default-extra-5.14.21-150400.24.21.2.x86_64",
            "openSUSE Leap 15.4:kernel-default-livepatch-5.14.21-150400.24.21.2.aarch64",
            "openSUSE Leap 15.4:kernel-default-livepatch-5.14.21-150400.24.21.2.ppc64le",
            "openSUSE Leap 15.4:kernel-default-livepatch-5.14.21-150400.24.21.2.s390x",
            "openSUSE Leap 15.4:kernel-default-livepatch-5.14.21-150400.24.21.2.x86_64",
            "openSUSE Leap 15.4:kernel-default-livepatch-devel-5.14.21-150400.24.21.2.aarch64",
            "openSUSE Leap 15.4:kernel-default-livepatch-devel-5.14.21-150400.24.21.2.ppc64le",
            "openSUSE Leap 15.4:kernel-default-livepatch-devel-5.14.21-150400.24.21.2.s390x",
            "openSUSE Leap 15.4:kernel-default-livepatch-devel-5.14.21-150400.24.21.2.x86_64",
            "openSUSE Leap 15.4:kernel-default-optional-5.14.21-150400.24.21.2.aarch64",
            "openSUSE Leap 15.4:kernel-default-optional-5.14.21-150400.24.21.2.ppc64le",
            "openSUSE Leap 15.4:kernel-default-optional-5.14.21-150400.24.21.2.s390x",
            "openSUSE Leap 15.4:kernel-default-optional-5.14.21-150400.24.21.2.x86_64",
            "openSUSE Leap 15.4:kernel-devel-5.14.21-150400.24.21.2.noarch",
            "openSUSE Leap 15.4:kernel-docs-5.14.21-150400.24.21.3.noarch",
            "openSUSE Leap 15.4:kernel-docs-html-5.14.21-150400.24.21.3.noarch",
            "openSUSE Leap 15.4:kernel-kvmsmall-5.14.21-150400.24.21.2.aarch64",
            "openSUSE Leap 15.4:kernel-kvmsmall-5.14.21-150400.24.21.2.ppc64le",
            "openSUSE Leap 15.4:kernel-kvmsmall-5.14.21-150400.24.21.2.x86_64",
            "openSUSE Leap 15.4:kernel-kvmsmall-devel-5.14.21-150400.24.21.2.aarch64",
            "openSUSE Leap 15.4:kernel-kvmsmall-devel-5.14.21-150400.24.21.2.ppc64le",
            "openSUSE Leap 15.4:kernel-kvmsmall-devel-5.14.21-150400.24.21.2.x86_64",
            "openSUSE Leap 15.4:kernel-kvmsmall-livepatch-devel-5.14.21-150400.24.21.2.aarch64",
            "openSUSE Leap 15.4:kernel-kvmsmall-livepatch-devel-5.14.21-150400.24.21.2.ppc64le",
            "openSUSE Leap 15.4:kernel-kvmsmall-livepatch-devel-5.14.21-150400.24.21.2.x86_64",
            "openSUSE Leap 15.4:kernel-macros-5.14.21-150400.24.21.2.noarch",
            "openSUSE Leap 15.4:kernel-obs-build-5.14.21-150400.24.21.2.aarch64",
            "openSUSE Leap 15.4:kernel-obs-build-5.14.21-150400.24.21.2.ppc64le",
            "openSUSE Leap 15.4:kernel-obs-build-5.14.21-150400.24.21.2.s390x",
            "openSUSE Leap 15.4:kernel-obs-build-5.14.21-150400.24.21.2.x86_64",
            "openSUSE Leap 15.4:kernel-obs-qa-5.14.21-150400.24.21.1.aarch64",
            "openSUSE Leap 15.4:kernel-obs-qa-5.14.21-150400.24.21.1.ppc64le",
            "openSUSE Leap 15.4:kernel-obs-qa-5.14.21-150400.24.21.1.s390x",
            "openSUSE Leap 15.4:kernel-obs-qa-5.14.21-150400.24.21.1.x86_64",
            "openSUSE Leap 15.4:kernel-source-5.14.21-150400.24.21.2.noarch",
            "openSUSE Leap 15.4:kernel-source-vanilla-5.14.21-150400.24.21.2.noarch",
            "openSUSE Leap 15.4:kernel-syms-5.14.21-150400.24.21.1.aarch64",
            "openSUSE Leap 15.4:kernel-syms-5.14.21-150400.24.21.1.ppc64le",
            "openSUSE Leap 15.4:kernel-syms-5.14.21-150400.24.21.1.s390x",
            "openSUSE Leap 15.4:kernel-syms-5.14.21-150400.24.21.1.x86_64",
            "openSUSE Leap 15.4:kernel-zfcpdump-5.14.21-150400.24.21.2.s390x",
            "openSUSE Leap 15.4:kselftests-kmp-64kb-5.14.21-150400.24.21.2.aarch64",
            "openSUSE Leap 15.4:kselftests-kmp-default-5.14.21-150400.24.21.2.aarch64",
            "openSUSE Leap 15.4:kselftests-kmp-default-5.14.21-150400.24.21.2.ppc64le",
            "openSUSE Leap 15.4:kselftests-kmp-default-5.14.21-150400.24.21.2.s390x",
            "openSUSE Leap 15.4:kselftests-kmp-default-5.14.21-150400.24.21.2.x86_64",
            "openSUSE Leap 15.4:ocfs2-kmp-64kb-5.14.21-150400.24.21.2.aarch64",
            "openSUSE Leap 15.4:ocfs2-kmp-default-5.14.21-150400.24.21.2.aarch64",
            "openSUSE Leap 15.4:ocfs2-kmp-default-5.14.21-150400.24.21.2.ppc64le",
            "openSUSE Leap 15.4:ocfs2-kmp-default-5.14.21-150400.24.21.2.s390x",
            "openSUSE Leap 15.4:ocfs2-kmp-default-5.14.21-150400.24.21.2.x86_64",
            "openSUSE Leap 15.4:reiserfs-kmp-64kb-5.14.21-150400.24.21.2.aarch64",
            "openSUSE Leap 15.4:reiserfs-kmp-default-5.14.21-150400.24.21.2.aarch64",
            "openSUSE Leap 15.4:reiserfs-kmp-default-5.14.21-150400.24.21.2.ppc64le",
            "openSUSE Leap 15.4:reiserfs-kmp-default-5.14.21-150400.24.21.2.s390x",
            "openSUSE Leap 15.4:reiserfs-kmp-default-5.14.21-150400.24.21.2.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 6.1,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:H",
            "version": "3.1"
          },
          "products": [
            "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.21.2.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.21.2.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.21.2.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.21.2.x86_64",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.21.2.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.21.2.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.21.2.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.21.2.x86_64",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.21.2.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.21.2.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.21.2.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.21.2.x86_64",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.21.2.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.21.2.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.21.2.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.21.2.x86_64",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.21.2.ppc64le",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.21.2.s390x",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.21.2.x86_64",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.21.2.ppc64le",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.21.2.s390x",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.21.2.x86_64",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_21-default-1-150400.9.3.2.ppc64le",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_21-default-1-150400.9.3.2.s390x",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_21-default-1-150400.9.3.2.x86_64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-64kb-5.14.21-150400.24.21.2.aarch64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-64kb-devel-5.14.21-150400.24.21.2.aarch64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-5.14.21-150400.24.21.2.aarch64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-5.14.21-150400.24.21.2.ppc64le",
            "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-5.14.21-150400.24.21.2.s390x",
            "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-5.14.21-150400.24.21.2.x86_64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-base-5.14.21-150400.24.21.2.150400.24.7.2.aarch64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-base-5.14.21-150400.24.21.2.150400.24.7.2.ppc64le",
            "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-base-5.14.21-150400.24.21.2.150400.24.7.2.s390x",
            "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-base-5.14.21-150400.24.21.2.150400.24.7.2.x86_64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-devel-5.14.21-150400.24.21.2.aarch64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-devel-5.14.21-150400.24.21.2.ppc64le",
            "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-devel-5.14.21-150400.24.21.2.s390x",
            "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-devel-5.14.21-150400.24.21.2.x86_64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-devel-5.14.21-150400.24.21.2.noarch",
            "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-macros-5.14.21-150400.24.21.2.noarch",
            "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-zfcpdump-5.14.21-150400.24.21.2.s390x",
            "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-docs-5.14.21-150400.24.21.3.noarch",
            "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-obs-build-5.14.21-150400.24.21.2.aarch64",
            "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-obs-build-5.14.21-150400.24.21.2.ppc64le",
            "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-obs-build-5.14.21-150400.24.21.2.s390x",
            "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-obs-build-5.14.21-150400.24.21.2.x86_64",
            "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-source-5.14.21-150400.24.21.2.noarch",
            "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-syms-5.14.21-150400.24.21.1.aarch64",
            "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-syms-5.14.21-150400.24.21.1.ppc64le",
            "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-syms-5.14.21-150400.24.21.1.s390x",
            "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-syms-5.14.21-150400.24.21.1.x86_64",
            "SUSE Linux Enterprise Module for Legacy 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.21.2.aarch64",
            "SUSE Linux Enterprise Module for Legacy 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.21.2.ppc64le",
            "SUSE Linux Enterprise Module for Legacy 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.21.2.s390x",
            "SUSE Linux Enterprise Module for Legacy 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.21.2.x86_64",
            "SUSE Linux Enterprise Workstation Extension 15 SP4:kernel-default-extra-5.14.21-150400.24.21.2.x86_64",
            "openSUSE Leap 15.4:cluster-md-kmp-64kb-5.14.21-150400.24.21.2.aarch64",
            "openSUSE Leap 15.4:cluster-md-kmp-default-5.14.21-150400.24.21.2.aarch64",
            "openSUSE Leap 15.4:cluster-md-kmp-default-5.14.21-150400.24.21.2.ppc64le",
            "openSUSE Leap 15.4:cluster-md-kmp-default-5.14.21-150400.24.21.2.s390x",
            "openSUSE Leap 15.4:cluster-md-kmp-default-5.14.21-150400.24.21.2.x86_64",
            "openSUSE Leap 15.4:dlm-kmp-64kb-5.14.21-150400.24.21.2.aarch64",
            "openSUSE Leap 15.4:dlm-kmp-default-5.14.21-150400.24.21.2.aarch64",
            "openSUSE Leap 15.4:dlm-kmp-default-5.14.21-150400.24.21.2.ppc64le",
            "openSUSE Leap 15.4:dlm-kmp-default-5.14.21-150400.24.21.2.s390x",
            "openSUSE Leap 15.4:dlm-kmp-default-5.14.21-150400.24.21.2.x86_64",
            "openSUSE Leap 15.4:dtb-allwinner-5.14.21-150400.24.21.1.aarch64",
            "openSUSE Leap 15.4:dtb-altera-5.14.21-150400.24.21.1.aarch64",
            "openSUSE Leap 15.4:dtb-amazon-5.14.21-150400.24.21.1.aarch64",
            "openSUSE Leap 15.4:dtb-amd-5.14.21-150400.24.21.1.aarch64",
            "openSUSE Leap 15.4:dtb-amlogic-5.14.21-150400.24.21.1.aarch64",
            "openSUSE Leap 15.4:dtb-apm-5.14.21-150400.24.21.1.aarch64",
            "openSUSE Leap 15.4:dtb-apple-5.14.21-150400.24.21.1.aarch64",
            "openSUSE Leap 15.4:dtb-arm-5.14.21-150400.24.21.1.aarch64",
            "openSUSE Leap 15.4:dtb-broadcom-5.14.21-150400.24.21.1.aarch64",
            "openSUSE Leap 15.4:dtb-cavium-5.14.21-150400.24.21.1.aarch64",
            "openSUSE Leap 15.4:dtb-exynos-5.14.21-150400.24.21.1.aarch64",
            "openSUSE Leap 15.4:dtb-freescale-5.14.21-150400.24.21.1.aarch64",
            "openSUSE Leap 15.4:dtb-hisilicon-5.14.21-150400.24.21.1.aarch64",
            "openSUSE Leap 15.4:dtb-lg-5.14.21-150400.24.21.1.aarch64",
            "openSUSE Leap 15.4:dtb-marvell-5.14.21-150400.24.21.1.aarch64",
            "openSUSE Leap 15.4:dtb-mediatek-5.14.21-150400.24.21.1.aarch64",
            "openSUSE Leap 15.4:dtb-nvidia-5.14.21-150400.24.21.1.aarch64",
            "openSUSE Leap 15.4:dtb-qcom-5.14.21-150400.24.21.1.aarch64",
            "openSUSE Leap 15.4:dtb-renesas-5.14.21-150400.24.21.1.aarch64",
            "openSUSE Leap 15.4:dtb-rockchip-5.14.21-150400.24.21.1.aarch64",
            "openSUSE Leap 15.4:dtb-socionext-5.14.21-150400.24.21.1.aarch64",
            "openSUSE Leap 15.4:dtb-sprd-5.14.21-150400.24.21.1.aarch64",
            "openSUSE Leap 15.4:dtb-xilinx-5.14.21-150400.24.21.1.aarch64",
            "openSUSE Leap 15.4:gfs2-kmp-64kb-5.14.21-150400.24.21.2.aarch64",
            "openSUSE Leap 15.4:gfs2-kmp-default-5.14.21-150400.24.21.2.aarch64",
            "openSUSE Leap 15.4:gfs2-kmp-default-5.14.21-150400.24.21.2.ppc64le",
            "openSUSE Leap 15.4:gfs2-kmp-default-5.14.21-150400.24.21.2.s390x",
            "openSUSE Leap 15.4:gfs2-kmp-default-5.14.21-150400.24.21.2.x86_64",
            "openSUSE Leap 15.4:kernel-64kb-5.14.21-150400.24.21.2.aarch64",
            "openSUSE Leap 15.4:kernel-64kb-devel-5.14.21-150400.24.21.2.aarch64",
            "openSUSE Leap 15.4:kernel-64kb-extra-5.14.21-150400.24.21.2.aarch64",
            "openSUSE Leap 15.4:kernel-64kb-livepatch-devel-5.14.21-150400.24.21.2.aarch64",
            "openSUSE Leap 15.4:kernel-64kb-optional-5.14.21-150400.24.21.2.aarch64",
            "openSUSE Leap 15.4:kernel-debug-5.14.21-150400.24.21.2.ppc64le",
            "openSUSE Leap 15.4:kernel-debug-5.14.21-150400.24.21.2.x86_64",
            "openSUSE Leap 15.4:kernel-debug-devel-5.14.21-150400.24.21.2.ppc64le",
            "openSUSE Leap 15.4:kernel-debug-devel-5.14.21-150400.24.21.2.x86_64",
            "openSUSE Leap 15.4:kernel-debug-livepatch-devel-5.14.21-150400.24.21.2.ppc64le",
            "openSUSE Leap 15.4:kernel-debug-livepatch-devel-5.14.21-150400.24.21.2.x86_64",
            "openSUSE Leap 15.4:kernel-default-5.14.21-150400.24.21.2.aarch64",
            "openSUSE Leap 15.4:kernel-default-5.14.21-150400.24.21.2.ppc64le",
            "openSUSE Leap 15.4:kernel-default-5.14.21-150400.24.21.2.s390x",
            "openSUSE Leap 15.4:kernel-default-5.14.21-150400.24.21.2.x86_64",
            "openSUSE Leap 15.4:kernel-default-base-5.14.21-150400.24.21.2.150400.24.7.2.aarch64",
            "openSUSE Leap 15.4:kernel-default-base-5.14.21-150400.24.21.2.150400.24.7.2.ppc64le",
            "openSUSE Leap 15.4:kernel-default-base-5.14.21-150400.24.21.2.150400.24.7.2.s390x",
            "openSUSE Leap 15.4:kernel-default-base-5.14.21-150400.24.21.2.150400.24.7.2.x86_64",
            "openSUSE Leap 15.4:kernel-default-base-rebuild-5.14.21-150400.24.21.2.150400.24.7.2.aarch64",
            "openSUSE Leap 15.4:kernel-default-base-rebuild-5.14.21-150400.24.21.2.150400.24.7.2.ppc64le",
            "openSUSE Leap 15.4:kernel-default-base-rebuild-5.14.21-150400.24.21.2.150400.24.7.2.s390x",
            "openSUSE Leap 15.4:kernel-default-base-rebuild-5.14.21-150400.24.21.2.150400.24.7.2.x86_64",
            "openSUSE Leap 15.4:kernel-default-devel-5.14.21-150400.24.21.2.aarch64",
            "openSUSE Leap 15.4:kernel-default-devel-5.14.21-150400.24.21.2.ppc64le",
            "openSUSE Leap 15.4:kernel-default-devel-5.14.21-150400.24.21.2.s390x",
            "openSUSE Leap 15.4:kernel-default-devel-5.14.21-150400.24.21.2.x86_64",
            "openSUSE Leap 15.4:kernel-default-extra-5.14.21-150400.24.21.2.aarch64",
            "openSUSE Leap 15.4:kernel-default-extra-5.14.21-150400.24.21.2.ppc64le",
            "openSUSE Leap 15.4:kernel-default-extra-5.14.21-150400.24.21.2.s390x",
            "openSUSE Leap 15.4:kernel-default-extra-5.14.21-150400.24.21.2.x86_64",
            "openSUSE Leap 15.4:kernel-default-livepatch-5.14.21-150400.24.21.2.aarch64",
            "openSUSE Leap 15.4:kernel-default-livepatch-5.14.21-150400.24.21.2.ppc64le",
            "openSUSE Leap 15.4:kernel-default-livepatch-5.14.21-150400.24.21.2.s390x",
            "openSUSE Leap 15.4:kernel-default-livepatch-5.14.21-150400.24.21.2.x86_64",
            "openSUSE Leap 15.4:kernel-default-livepatch-devel-5.14.21-150400.24.21.2.aarch64",
            "openSUSE Leap 15.4:kernel-default-livepatch-devel-5.14.21-150400.24.21.2.ppc64le",
            "openSUSE Leap 15.4:kernel-default-livepatch-devel-5.14.21-150400.24.21.2.s390x",
            "openSUSE Leap 15.4:kernel-default-livepatch-devel-5.14.21-150400.24.21.2.x86_64",
            "openSUSE Leap 15.4:kernel-default-optional-5.14.21-150400.24.21.2.aarch64",
            "openSUSE Leap 15.4:kernel-default-optional-5.14.21-150400.24.21.2.ppc64le",
            "openSUSE Leap 15.4:kernel-default-optional-5.14.21-150400.24.21.2.s390x",
            "openSUSE Leap 15.4:kernel-default-optional-5.14.21-150400.24.21.2.x86_64",
            "openSUSE Leap 15.4:kernel-devel-5.14.21-150400.24.21.2.noarch",
            "openSUSE Leap 15.4:kernel-docs-5.14.21-150400.24.21.3.noarch",
            "openSUSE Leap 15.4:kernel-docs-html-5.14.21-150400.24.21.3.noarch",
            "openSUSE Leap 15.4:kernel-kvmsmall-5.14.21-150400.24.21.2.aarch64",
            "openSUSE Leap 15.4:kernel-kvmsmall-5.14.21-150400.24.21.2.ppc64le",
            "openSUSE Leap 15.4:kernel-kvmsmall-5.14.21-150400.24.21.2.x86_64",
            "openSUSE Leap 15.4:kernel-kvmsmall-devel-5.14.21-150400.24.21.2.aarch64",
            "openSUSE Leap 15.4:kernel-kvmsmall-devel-5.14.21-150400.24.21.2.ppc64le",
            "openSUSE Leap 15.4:kernel-kvmsmall-devel-5.14.21-150400.24.21.2.x86_64",
            "openSUSE Leap 15.4:kernel-kvmsmall-livepatch-devel-5.14.21-150400.24.21.2.aarch64",
            "openSUSE Leap 15.4:kernel-kvmsmall-livepatch-devel-5.14.21-150400.24.21.2.ppc64le",
            "openSUSE Leap 15.4:kernel-kvmsmall-livepatch-devel-5.14.21-150400.24.21.2.x86_64",
            "openSUSE Leap 15.4:kernel-macros-5.14.21-150400.24.21.2.noarch",
            "openSUSE Leap 15.4:kernel-obs-build-5.14.21-150400.24.21.2.aarch64",
            "openSUSE Leap 15.4:kernel-obs-build-5.14.21-150400.24.21.2.ppc64le",
            "openSUSE Leap 15.4:kernel-obs-build-5.14.21-150400.24.21.2.s390x",
            "openSUSE Leap 15.4:kernel-obs-build-5.14.21-150400.24.21.2.x86_64",
            "openSUSE Leap 15.4:kernel-obs-qa-5.14.21-150400.24.21.1.aarch64",
            "openSUSE Leap 15.4:kernel-obs-qa-5.14.21-150400.24.21.1.ppc64le",
            "openSUSE Leap 15.4:kernel-obs-qa-5.14.21-150400.24.21.1.s390x",
            "openSUSE Leap 15.4:kernel-obs-qa-5.14.21-150400.24.21.1.x86_64",
            "openSUSE Leap 15.4:kernel-source-5.14.21-150400.24.21.2.noarch",
            "openSUSE Leap 15.4:kernel-source-vanilla-5.14.21-150400.24.21.2.noarch",
            "openSUSE Leap 15.4:kernel-syms-5.14.21-150400.24.21.1.aarch64",
            "openSUSE Leap 15.4:kernel-syms-5.14.21-150400.24.21.1.ppc64le",
            "openSUSE Leap 15.4:kernel-syms-5.14.21-150400.24.21.1.s390x",
            "openSUSE Leap 15.4:kernel-syms-5.14.21-150400.24.21.1.x86_64",
            "openSUSE Leap 15.4:kernel-zfcpdump-5.14.21-150400.24.21.2.s390x",
            "openSUSE Leap 15.4:kselftests-kmp-64kb-5.14.21-150400.24.21.2.aarch64",
            "openSUSE Leap 15.4:kselftests-kmp-default-5.14.21-150400.24.21.2.aarch64",
            "openSUSE Leap 15.4:kselftests-kmp-default-5.14.21-150400.24.21.2.ppc64le",
            "openSUSE Leap 15.4:kselftests-kmp-default-5.14.21-150400.24.21.2.s390x",
            "openSUSE Leap 15.4:kselftests-kmp-default-5.14.21-150400.24.21.2.x86_64",
            "openSUSE Leap 15.4:ocfs2-kmp-64kb-5.14.21-150400.24.21.2.aarch64",
            "openSUSE Leap 15.4:ocfs2-kmp-default-5.14.21-150400.24.21.2.aarch64",
            "openSUSE Leap 15.4:ocfs2-kmp-default-5.14.21-150400.24.21.2.ppc64le",
            "openSUSE Leap 15.4:ocfs2-kmp-default-5.14.21-150400.24.21.2.s390x",
            "openSUSE Leap 15.4:ocfs2-kmp-default-5.14.21-150400.24.21.2.x86_64",
            "openSUSE Leap 15.4:reiserfs-kmp-64kb-5.14.21-150400.24.21.2.aarch64",
            "openSUSE Leap 15.4:reiserfs-kmp-default-5.14.21-150400.24.21.2.aarch64",
            "openSUSE Leap 15.4:reiserfs-kmp-default-5.14.21-150400.24.21.2.ppc64le",
            "openSUSE Leap 15.4:reiserfs-kmp-default-5.14.21-150400.24.21.2.s390x",
            "openSUSE Leap 15.4:reiserfs-kmp-default-5.14.21-150400.24.21.2.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2022-09-16T15:30:19Z",
          "details": "moderate"
        }
      ],
      "title": "CVE-2022-2639"
    },
    {
      "cve": "CVE-2022-2663",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2022-2663"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "An issue was found in the Linux kernel in nf_conntrack_irc where the message handling can be confused and incorrectly matches the message. A firewall may be able to be bypassed when users are using unencrypted IRC with nf_conntrack_irc configured.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.21.2.aarch64",
          "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.21.2.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.21.2.s390x",
          "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.21.2.x86_64",
          "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.21.2.aarch64",
          "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.21.2.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.21.2.s390x",
          "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.21.2.x86_64",
          "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.21.2.aarch64",
          "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.21.2.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.21.2.s390x",
          "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.21.2.x86_64",
          "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.21.2.aarch64",
          "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.21.2.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.21.2.s390x",
          "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.21.2.x86_64",
          "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.21.2.ppc64le",
          "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.21.2.s390x",
          "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.21.2.x86_64",
          "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.21.2.ppc64le",
          "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.21.2.s390x",
          "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.21.2.x86_64",
          "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_21-default-1-150400.9.3.2.ppc64le",
          "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_21-default-1-150400.9.3.2.s390x",
          "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_21-default-1-150400.9.3.2.x86_64",
          "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-64kb-5.14.21-150400.24.21.2.aarch64",
          "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-64kb-devel-5.14.21-150400.24.21.2.aarch64",
          "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-5.14.21-150400.24.21.2.aarch64",
          "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-5.14.21-150400.24.21.2.ppc64le",
          "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-5.14.21-150400.24.21.2.s390x",
          "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-5.14.21-150400.24.21.2.x86_64",
          "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-base-5.14.21-150400.24.21.2.150400.24.7.2.aarch64",
          "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-base-5.14.21-150400.24.21.2.150400.24.7.2.ppc64le",
          "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-base-5.14.21-150400.24.21.2.150400.24.7.2.s390x",
          "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-base-5.14.21-150400.24.21.2.150400.24.7.2.x86_64",
          "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-devel-5.14.21-150400.24.21.2.aarch64",
          "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-devel-5.14.21-150400.24.21.2.ppc64le",
          "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-devel-5.14.21-150400.24.21.2.s390x",
          "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-devel-5.14.21-150400.24.21.2.x86_64",
          "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-devel-5.14.21-150400.24.21.2.noarch",
          "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-macros-5.14.21-150400.24.21.2.noarch",
          "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-zfcpdump-5.14.21-150400.24.21.2.s390x",
          "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-docs-5.14.21-150400.24.21.3.noarch",
          "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-obs-build-5.14.21-150400.24.21.2.aarch64",
          "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-obs-build-5.14.21-150400.24.21.2.ppc64le",
          "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-obs-build-5.14.21-150400.24.21.2.s390x",
          "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-obs-build-5.14.21-150400.24.21.2.x86_64",
          "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-source-5.14.21-150400.24.21.2.noarch",
          "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-syms-5.14.21-150400.24.21.1.aarch64",
          "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-syms-5.14.21-150400.24.21.1.ppc64le",
          "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-syms-5.14.21-150400.24.21.1.s390x",
          "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-syms-5.14.21-150400.24.21.1.x86_64",
          "SUSE Linux Enterprise Module for Legacy 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.21.2.aarch64",
          "SUSE Linux Enterprise Module for Legacy 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.21.2.ppc64le",
          "SUSE Linux Enterprise Module for Legacy 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.21.2.s390x",
          "SUSE Linux Enterprise Module for Legacy 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.21.2.x86_64",
          "SUSE Linux Enterprise Workstation Extension 15 SP4:kernel-default-extra-5.14.21-150400.24.21.2.x86_64",
          "openSUSE Leap 15.4:cluster-md-kmp-64kb-5.14.21-150400.24.21.2.aarch64",
          "openSUSE Leap 15.4:cluster-md-kmp-default-5.14.21-150400.24.21.2.aarch64",
          "openSUSE Leap 15.4:cluster-md-kmp-default-5.14.21-150400.24.21.2.ppc64le",
          "openSUSE Leap 15.4:cluster-md-kmp-default-5.14.21-150400.24.21.2.s390x",
          "openSUSE Leap 15.4:cluster-md-kmp-default-5.14.21-150400.24.21.2.x86_64",
          "openSUSE Leap 15.4:dlm-kmp-64kb-5.14.21-150400.24.21.2.aarch64",
          "openSUSE Leap 15.4:dlm-kmp-default-5.14.21-150400.24.21.2.aarch64",
          "openSUSE Leap 15.4:dlm-kmp-default-5.14.21-150400.24.21.2.ppc64le",
          "openSUSE Leap 15.4:dlm-kmp-default-5.14.21-150400.24.21.2.s390x",
          "openSUSE Leap 15.4:dlm-kmp-default-5.14.21-150400.24.21.2.x86_64",
          "openSUSE Leap 15.4:dtb-allwinner-5.14.21-150400.24.21.1.aarch64",
          "openSUSE Leap 15.4:dtb-altera-5.14.21-150400.24.21.1.aarch64",
          "openSUSE Leap 15.4:dtb-amazon-5.14.21-150400.24.21.1.aarch64",
          "openSUSE Leap 15.4:dtb-amd-5.14.21-150400.24.21.1.aarch64",
          "openSUSE Leap 15.4:dtb-amlogic-5.14.21-150400.24.21.1.aarch64",
          "openSUSE Leap 15.4:dtb-apm-5.14.21-150400.24.21.1.aarch64",
          "openSUSE Leap 15.4:dtb-apple-5.14.21-150400.24.21.1.aarch64",
          "openSUSE Leap 15.4:dtb-arm-5.14.21-150400.24.21.1.aarch64",
          "openSUSE Leap 15.4:dtb-broadcom-5.14.21-150400.24.21.1.aarch64",
          "openSUSE Leap 15.4:dtb-cavium-5.14.21-150400.24.21.1.aarch64",
          "openSUSE Leap 15.4:dtb-exynos-5.14.21-150400.24.21.1.aarch64",
          "openSUSE Leap 15.4:dtb-freescale-5.14.21-150400.24.21.1.aarch64",
          "openSUSE Leap 15.4:dtb-hisilicon-5.14.21-150400.24.21.1.aarch64",
          "openSUSE Leap 15.4:dtb-lg-5.14.21-150400.24.21.1.aarch64",
          "openSUSE Leap 15.4:dtb-marvell-5.14.21-150400.24.21.1.aarch64",
          "openSUSE Leap 15.4:dtb-mediatek-5.14.21-150400.24.21.1.aarch64",
          "openSUSE Leap 15.4:dtb-nvidia-5.14.21-150400.24.21.1.aarch64",
          "openSUSE Leap 15.4:dtb-qcom-5.14.21-150400.24.21.1.aarch64",
          "openSUSE Leap 15.4:dtb-renesas-5.14.21-150400.24.21.1.aarch64",
          "openSUSE Leap 15.4:dtb-rockchip-5.14.21-150400.24.21.1.aarch64",
          "openSUSE Leap 15.4:dtb-socionext-5.14.21-150400.24.21.1.aarch64",
          "openSUSE Leap 15.4:dtb-sprd-5.14.21-150400.24.21.1.aarch64",
          "openSUSE Leap 15.4:dtb-xilinx-5.14.21-150400.24.21.1.aarch64",
          "openSUSE Leap 15.4:gfs2-kmp-64kb-5.14.21-150400.24.21.2.aarch64",
          "openSUSE Leap 15.4:gfs2-kmp-default-5.14.21-150400.24.21.2.aarch64",
          "openSUSE Leap 15.4:gfs2-kmp-default-5.14.21-150400.24.21.2.ppc64le",
          "openSUSE Leap 15.4:gfs2-kmp-default-5.14.21-150400.24.21.2.s390x",
          "openSUSE Leap 15.4:gfs2-kmp-default-5.14.21-150400.24.21.2.x86_64",
          "openSUSE Leap 15.4:kernel-64kb-5.14.21-150400.24.21.2.aarch64",
          "openSUSE Leap 15.4:kernel-64kb-devel-5.14.21-150400.24.21.2.aarch64",
          "openSUSE Leap 15.4:kernel-64kb-extra-5.14.21-150400.24.21.2.aarch64",
          "openSUSE Leap 15.4:kernel-64kb-livepatch-devel-5.14.21-150400.24.21.2.aarch64",
          "openSUSE Leap 15.4:kernel-64kb-optional-5.14.21-150400.24.21.2.aarch64",
          "openSUSE Leap 15.4:kernel-debug-5.14.21-150400.24.21.2.ppc64le",
          "openSUSE Leap 15.4:kernel-debug-5.14.21-150400.24.21.2.x86_64",
          "openSUSE Leap 15.4:kernel-debug-devel-5.14.21-150400.24.21.2.ppc64le",
          "openSUSE Leap 15.4:kernel-debug-devel-5.14.21-150400.24.21.2.x86_64",
          "openSUSE Leap 15.4:kernel-debug-livepatch-devel-5.14.21-150400.24.21.2.ppc64le",
          "openSUSE Leap 15.4:kernel-debug-livepatch-devel-5.14.21-150400.24.21.2.x86_64",
          "openSUSE Leap 15.4:kernel-default-5.14.21-150400.24.21.2.aarch64",
          "openSUSE Leap 15.4:kernel-default-5.14.21-150400.24.21.2.ppc64le",
          "openSUSE Leap 15.4:kernel-default-5.14.21-150400.24.21.2.s390x",
          "openSUSE Leap 15.4:kernel-default-5.14.21-150400.24.21.2.x86_64",
          "openSUSE Leap 15.4:kernel-default-base-5.14.21-150400.24.21.2.150400.24.7.2.aarch64",
          "openSUSE Leap 15.4:kernel-default-base-5.14.21-150400.24.21.2.150400.24.7.2.ppc64le",
          "openSUSE Leap 15.4:kernel-default-base-5.14.21-150400.24.21.2.150400.24.7.2.s390x",
          "openSUSE Leap 15.4:kernel-default-base-5.14.21-150400.24.21.2.150400.24.7.2.x86_64",
          "openSUSE Leap 15.4:kernel-default-base-rebuild-5.14.21-150400.24.21.2.150400.24.7.2.aarch64",
          "openSUSE Leap 15.4:kernel-default-base-rebuild-5.14.21-150400.24.21.2.150400.24.7.2.ppc64le",
          "openSUSE Leap 15.4:kernel-default-base-rebuild-5.14.21-150400.24.21.2.150400.24.7.2.s390x",
          "openSUSE Leap 15.4:kernel-default-base-rebuild-5.14.21-150400.24.21.2.150400.24.7.2.x86_64",
          "openSUSE Leap 15.4:kernel-default-devel-5.14.21-150400.24.21.2.aarch64",
          "openSUSE Leap 15.4:kernel-default-devel-5.14.21-150400.24.21.2.ppc64le",
          "openSUSE Leap 15.4:kernel-default-devel-5.14.21-150400.24.21.2.s390x",
          "openSUSE Leap 15.4:kernel-default-devel-5.14.21-150400.24.21.2.x86_64",
          "openSUSE Leap 15.4:kernel-default-extra-5.14.21-150400.24.21.2.aarch64",
          "openSUSE Leap 15.4:kernel-default-extra-5.14.21-150400.24.21.2.ppc64le",
          "openSUSE Leap 15.4:kernel-default-extra-5.14.21-150400.24.21.2.s390x",
          "openSUSE Leap 15.4:kernel-default-extra-5.14.21-150400.24.21.2.x86_64",
          "openSUSE Leap 15.4:kernel-default-livepatch-5.14.21-150400.24.21.2.aarch64",
          "openSUSE Leap 15.4:kernel-default-livepatch-5.14.21-150400.24.21.2.ppc64le",
          "openSUSE Leap 15.4:kernel-default-livepatch-5.14.21-150400.24.21.2.s390x",
          "openSUSE Leap 15.4:kernel-default-livepatch-5.14.21-150400.24.21.2.x86_64",
          "openSUSE Leap 15.4:kernel-default-livepatch-devel-5.14.21-150400.24.21.2.aarch64",
          "openSUSE Leap 15.4:kernel-default-livepatch-devel-5.14.21-150400.24.21.2.ppc64le",
          "openSUSE Leap 15.4:kernel-default-livepatch-devel-5.14.21-150400.24.21.2.s390x",
          "openSUSE Leap 15.4:kernel-default-livepatch-devel-5.14.21-150400.24.21.2.x86_64",
          "openSUSE Leap 15.4:kernel-default-optional-5.14.21-150400.24.21.2.aarch64",
          "openSUSE Leap 15.4:kernel-default-optional-5.14.21-150400.24.21.2.ppc64le",
          "openSUSE Leap 15.4:kernel-default-optional-5.14.21-150400.24.21.2.s390x",
          "openSUSE Leap 15.4:kernel-default-optional-5.14.21-150400.24.21.2.x86_64",
          "openSUSE Leap 15.4:kernel-devel-5.14.21-150400.24.21.2.noarch",
          "openSUSE Leap 15.4:kernel-docs-5.14.21-150400.24.21.3.noarch",
          "openSUSE Leap 15.4:kernel-docs-html-5.14.21-150400.24.21.3.noarch",
          "openSUSE Leap 15.4:kernel-kvmsmall-5.14.21-150400.24.21.2.aarch64",
          "openSUSE Leap 15.4:kernel-kvmsmall-5.14.21-150400.24.21.2.ppc64le",
          "openSUSE Leap 15.4:kernel-kvmsmall-5.14.21-150400.24.21.2.x86_64",
          "openSUSE Leap 15.4:kernel-kvmsmall-devel-5.14.21-150400.24.21.2.aarch64",
          "openSUSE Leap 15.4:kernel-kvmsmall-devel-5.14.21-150400.24.21.2.ppc64le",
          "openSUSE Leap 15.4:kernel-kvmsmall-devel-5.14.21-150400.24.21.2.x86_64",
          "openSUSE Leap 15.4:kernel-kvmsmall-livepatch-devel-5.14.21-150400.24.21.2.aarch64",
          "openSUSE Leap 15.4:kernel-kvmsmall-livepatch-devel-5.14.21-150400.24.21.2.ppc64le",
          "openSUSE Leap 15.4:kernel-kvmsmall-livepatch-devel-5.14.21-150400.24.21.2.x86_64",
          "openSUSE Leap 15.4:kernel-macros-5.14.21-150400.24.21.2.noarch",
          "openSUSE Leap 15.4:kernel-obs-build-5.14.21-150400.24.21.2.aarch64",
          "openSUSE Leap 15.4:kernel-obs-build-5.14.21-150400.24.21.2.ppc64le",
          "openSUSE Leap 15.4:kernel-obs-build-5.14.21-150400.24.21.2.s390x",
          "openSUSE Leap 15.4:kernel-obs-build-5.14.21-150400.24.21.2.x86_64",
          "openSUSE Leap 15.4:kernel-obs-qa-5.14.21-150400.24.21.1.aarch64",
          "openSUSE Leap 15.4:kernel-obs-qa-5.14.21-150400.24.21.1.ppc64le",
          "openSUSE Leap 15.4:kernel-obs-qa-5.14.21-150400.24.21.1.s390x",
          "openSUSE Leap 15.4:kernel-obs-qa-5.14.21-150400.24.21.1.x86_64",
          "openSUSE Leap 15.4:kernel-source-5.14.21-150400.24.21.2.noarch",
          "openSUSE Leap 15.4:kernel-source-vanilla-5.14.21-150400.24.21.2.noarch",
          "openSUSE Leap 15.4:kernel-syms-5.14.21-150400.24.21.1.aarch64",
          "openSUSE Leap 15.4:kernel-syms-5.14.21-150400.24.21.1.ppc64le",
          "openSUSE Leap 15.4:kernel-syms-5.14.21-150400.24.21.1.s390x",
          "openSUSE Leap 15.4:kernel-syms-5.14.21-150400.24.21.1.x86_64",
          "openSUSE Leap 15.4:kernel-zfcpdump-5.14.21-150400.24.21.2.s390x",
          "openSUSE Leap 15.4:kselftests-kmp-64kb-5.14.21-150400.24.21.2.aarch64",
          "openSUSE Leap 15.4:kselftests-kmp-default-5.14.21-150400.24.21.2.aarch64",
          "openSUSE Leap 15.4:kselftests-kmp-default-5.14.21-150400.24.21.2.ppc64le",
          "openSUSE Leap 15.4:kselftests-kmp-default-5.14.21-150400.24.21.2.s390x",
          "openSUSE Leap 15.4:kselftests-kmp-default-5.14.21-150400.24.21.2.x86_64",
          "openSUSE Leap 15.4:ocfs2-kmp-64kb-5.14.21-150400.24.21.2.aarch64",
          "openSUSE Leap 15.4:ocfs2-kmp-default-5.14.21-150400.24.21.2.aarch64",
          "openSUSE Leap 15.4:ocfs2-kmp-default-5.14.21-150400.24.21.2.ppc64le",
          "openSUSE Leap 15.4:ocfs2-kmp-default-5.14.21-150400.24.21.2.s390x",
          "openSUSE Leap 15.4:ocfs2-kmp-default-5.14.21-150400.24.21.2.x86_64",
          "openSUSE Leap 15.4:reiserfs-kmp-64kb-5.14.21-150400.24.21.2.aarch64",
          "openSUSE Leap 15.4:reiserfs-kmp-default-5.14.21-150400.24.21.2.aarch64",
          "openSUSE Leap 15.4:reiserfs-kmp-default-5.14.21-150400.24.21.2.ppc64le",
          "openSUSE Leap 15.4:reiserfs-kmp-default-5.14.21-150400.24.21.2.s390x",
          "openSUSE Leap 15.4:reiserfs-kmp-default-5.14.21-150400.24.21.2.x86_64"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2022-2663",
          "url": "https://www.suse.com/security/cve/CVE-2022-2663"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1202097 for CVE-2022-2663",
          "url": "https://bugzilla.suse.com/1202097"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1212299 for CVE-2022-2663",
          "url": "https://bugzilla.suse.com/1212299"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.21.2.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.21.2.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.21.2.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.21.2.x86_64",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.21.2.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.21.2.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.21.2.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.21.2.x86_64",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.21.2.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.21.2.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.21.2.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.21.2.x86_64",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.21.2.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.21.2.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.21.2.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.21.2.x86_64",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.21.2.ppc64le",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.21.2.s390x",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.21.2.x86_64",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.21.2.ppc64le",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.21.2.s390x",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.21.2.x86_64",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_21-default-1-150400.9.3.2.ppc64le",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_21-default-1-150400.9.3.2.s390x",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_21-default-1-150400.9.3.2.x86_64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-64kb-5.14.21-150400.24.21.2.aarch64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-64kb-devel-5.14.21-150400.24.21.2.aarch64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-5.14.21-150400.24.21.2.aarch64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-5.14.21-150400.24.21.2.ppc64le",
            "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-5.14.21-150400.24.21.2.s390x",
            "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-5.14.21-150400.24.21.2.x86_64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-base-5.14.21-150400.24.21.2.150400.24.7.2.aarch64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-base-5.14.21-150400.24.21.2.150400.24.7.2.ppc64le",
            "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-base-5.14.21-150400.24.21.2.150400.24.7.2.s390x",
            "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-base-5.14.21-150400.24.21.2.150400.24.7.2.x86_64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-devel-5.14.21-150400.24.21.2.aarch64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-devel-5.14.21-150400.24.21.2.ppc64le",
            "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-devel-5.14.21-150400.24.21.2.s390x",
            "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-devel-5.14.21-150400.24.21.2.x86_64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-devel-5.14.21-150400.24.21.2.noarch",
            "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-macros-5.14.21-150400.24.21.2.noarch",
            "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-zfcpdump-5.14.21-150400.24.21.2.s390x",
            "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-docs-5.14.21-150400.24.21.3.noarch",
            "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-obs-build-5.14.21-150400.24.21.2.aarch64",
            "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-obs-build-5.14.21-150400.24.21.2.ppc64le",
            "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-obs-build-5.14.21-150400.24.21.2.s390x",
            "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-obs-build-5.14.21-150400.24.21.2.x86_64",
            "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-source-5.14.21-150400.24.21.2.noarch",
            "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-syms-5.14.21-150400.24.21.1.aarch64",
            "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-syms-5.14.21-150400.24.21.1.ppc64le",
            "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-syms-5.14.21-150400.24.21.1.s390x",
            "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-syms-5.14.21-150400.24.21.1.x86_64",
            "SUSE Linux Enterprise Module for Legacy 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.21.2.aarch64",
            "SUSE Linux Enterprise Module for Legacy 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.21.2.ppc64le",
            "SUSE Linux Enterprise Module for Legacy 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.21.2.s390x",
            "SUSE Linux Enterprise Module for Legacy 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.21.2.x86_64",
            "SUSE Linux Enterprise Workstation Extension 15 SP4:kernel-default-extra-5.14.21-150400.24.21.2.x86_64",
            "openSUSE Leap 15.4:cluster-md-kmp-64kb-5.14.21-150400.24.21.2.aarch64",
            "openSUSE Leap 15.4:cluster-md-kmp-default-5.14.21-150400.24.21.2.aarch64",
            "openSUSE Leap 15.4:cluster-md-kmp-default-5.14.21-150400.24.21.2.ppc64le",
            "openSUSE Leap 15.4:cluster-md-kmp-default-5.14.21-150400.24.21.2.s390x",
            "openSUSE Leap 15.4:cluster-md-kmp-default-5.14.21-150400.24.21.2.x86_64",
            "openSUSE Leap 15.4:dlm-kmp-64kb-5.14.21-150400.24.21.2.aarch64",
            "openSUSE Leap 15.4:dlm-kmp-default-5.14.21-150400.24.21.2.aarch64",
            "openSUSE Leap 15.4:dlm-kmp-default-5.14.21-150400.24.21.2.ppc64le",
            "openSUSE Leap 15.4:dlm-kmp-default-5.14.21-150400.24.21.2.s390x",
            "openSUSE Leap 15.4:dlm-kmp-default-5.14.21-150400.24.21.2.x86_64",
            "openSUSE Leap 15.4:dtb-allwinner-5.14.21-150400.24.21.1.aarch64",
            "openSUSE Leap 15.4:dtb-altera-5.14.21-150400.24.21.1.aarch64",
            "openSUSE Leap 15.4:dtb-amazon-5.14.21-150400.24.21.1.aarch64",
            "openSUSE Leap 15.4:dtb-amd-5.14.21-150400.24.21.1.aarch64",
            "openSUSE Leap 15.4:dtb-amlogic-5.14.21-150400.24.21.1.aarch64",
            "openSUSE Leap 15.4:dtb-apm-5.14.21-150400.24.21.1.aarch64",
            "openSUSE Leap 15.4:dtb-apple-5.14.21-150400.24.21.1.aarch64",
            "openSUSE Leap 15.4:dtb-arm-5.14.21-150400.24.21.1.aarch64",
            "openSUSE Leap 15.4:dtb-broadcom-5.14.21-150400.24.21.1.aarch64",
            "openSUSE Leap 15.4:dtb-cavium-5.14.21-150400.24.21.1.aarch64",
            "openSUSE Leap 15.4:dtb-exynos-5.14.21-150400.24.21.1.aarch64",
            "openSUSE Leap 15.4:dtb-freescale-5.14.21-150400.24.21.1.aarch64",
            "openSUSE Leap 15.4:dtb-hisilicon-5.14.21-150400.24.21.1.aarch64",
            "openSUSE Leap 15.4:dtb-lg-5.14.21-150400.24.21.1.aarch64",
            "openSUSE Leap 15.4:dtb-marvell-5.14.21-150400.24.21.1.aarch64",
            "openSUSE Leap 15.4:dtb-mediatek-5.14.21-150400.24.21.1.aarch64",
            "openSUSE Leap 15.4:dtb-nvidia-5.14.21-150400.24.21.1.aarch64",
            "openSUSE Leap 15.4:dtb-qcom-5.14.21-150400.24.21.1.aarch64",
            "openSUSE Leap 15.4:dtb-renesas-5.14.21-150400.24.21.1.aarch64",
            "openSUSE Leap 15.4:dtb-rockchip-5.14.21-150400.24.21.1.aarch64",
            "openSUSE Leap 15.4:dtb-socionext-5.14.21-150400.24.21.1.aarch64",
            "openSUSE Leap 15.4:dtb-sprd-5.14.21-150400.24.21.1.aarch64",
            "openSUSE Leap 15.4:dtb-xilinx-5.14.21-150400.24.21.1.aarch64",
            "openSUSE Leap 15.4:gfs2-kmp-64kb-5.14.21-150400.24.21.2.aarch64",
            "openSUSE Leap 15.4:gfs2-kmp-default-5.14.21-150400.24.21.2.aarch64",
            "openSUSE Leap 15.4:gfs2-kmp-default-5.14.21-150400.24.21.2.ppc64le",
            "openSUSE Leap 15.4:gfs2-kmp-default-5.14.21-150400.24.21.2.s390x",
            "openSUSE Leap 15.4:gfs2-kmp-default-5.14.21-150400.24.21.2.x86_64",
            "openSUSE Leap 15.4:kernel-64kb-5.14.21-150400.24.21.2.aarch64",
            "openSUSE Leap 15.4:kernel-64kb-devel-5.14.21-150400.24.21.2.aarch64",
            "openSUSE Leap 15.4:kernel-64kb-extra-5.14.21-150400.24.21.2.aarch64",
            "openSUSE Leap 15.4:kernel-64kb-livepatch-devel-5.14.21-150400.24.21.2.aarch64",
            "openSUSE Leap 15.4:kernel-64kb-optional-5.14.21-150400.24.21.2.aarch64",
            "openSUSE Leap 15.4:kernel-debug-5.14.21-150400.24.21.2.ppc64le",
            "openSUSE Leap 15.4:kernel-debug-5.14.21-150400.24.21.2.x86_64",
            "openSUSE Leap 15.4:kernel-debug-devel-5.14.21-150400.24.21.2.ppc64le",
            "openSUSE Leap 15.4:kernel-debug-devel-5.14.21-150400.24.21.2.x86_64",
            "openSUSE Leap 15.4:kernel-debug-livepatch-devel-5.14.21-150400.24.21.2.ppc64le",
            "openSUSE Leap 15.4:kernel-debug-livepatch-devel-5.14.21-150400.24.21.2.x86_64",
            "openSUSE Leap 15.4:kernel-default-5.14.21-150400.24.21.2.aarch64",
            "openSUSE Leap 15.4:kernel-default-5.14.21-150400.24.21.2.ppc64le",
            "openSUSE Leap 15.4:kernel-default-5.14.21-150400.24.21.2.s390x",
            "openSUSE Leap 15.4:kernel-default-5.14.21-150400.24.21.2.x86_64",
            "openSUSE Leap 15.4:kernel-default-base-5.14.21-150400.24.21.2.150400.24.7.2.aarch64",
            "openSUSE Leap 15.4:kernel-default-base-5.14.21-150400.24.21.2.150400.24.7.2.ppc64le",
            "openSUSE Leap 15.4:kernel-default-base-5.14.21-150400.24.21.2.150400.24.7.2.s390x",
            "openSUSE Leap 15.4:kernel-default-base-5.14.21-150400.24.21.2.150400.24.7.2.x86_64",
            "openSUSE Leap 15.4:kernel-default-base-rebuild-5.14.21-150400.24.21.2.150400.24.7.2.aarch64",
            "openSUSE Leap 15.4:kernel-default-base-rebuild-5.14.21-150400.24.21.2.150400.24.7.2.ppc64le",
            "openSUSE Leap 15.4:kernel-default-base-rebuild-5.14.21-150400.24.21.2.150400.24.7.2.s390x",
            "openSUSE Leap 15.4:kernel-default-base-rebuild-5.14.21-150400.24.21.2.150400.24.7.2.x86_64",
            "openSUSE Leap 15.4:kernel-default-devel-5.14.21-150400.24.21.2.aarch64",
            "openSUSE Leap 15.4:kernel-default-devel-5.14.21-150400.24.21.2.ppc64le",
            "openSUSE Leap 15.4:kernel-default-devel-5.14.21-150400.24.21.2.s390x",
            "openSUSE Leap 15.4:kernel-default-devel-5.14.21-150400.24.21.2.x86_64",
            "openSUSE Leap 15.4:kernel-default-extra-5.14.21-150400.24.21.2.aarch64",
            "openSUSE Leap 15.4:kernel-default-extra-5.14.21-150400.24.21.2.ppc64le",
            "openSUSE Leap 15.4:kernel-default-extra-5.14.21-150400.24.21.2.s390x",
            "openSUSE Leap 15.4:kernel-default-extra-5.14.21-150400.24.21.2.x86_64",
            "openSUSE Leap 15.4:kernel-default-livepatch-5.14.21-150400.24.21.2.aarch64",
            "openSUSE Leap 15.4:kernel-default-livepatch-5.14.21-150400.24.21.2.ppc64le",
            "openSUSE Leap 15.4:kernel-default-livepatch-5.14.21-150400.24.21.2.s390x",
            "openSUSE Leap 15.4:kernel-default-livepatch-5.14.21-150400.24.21.2.x86_64",
            "openSUSE Leap 15.4:kernel-default-livepatch-devel-5.14.21-150400.24.21.2.aarch64",
            "openSUSE Leap 15.4:kernel-default-livepatch-devel-5.14.21-150400.24.21.2.ppc64le",
            "openSUSE Leap 15.4:kernel-default-livepatch-devel-5.14.21-150400.24.21.2.s390x",
            "openSUSE Leap 15.4:kernel-default-livepatch-devel-5.14.21-150400.24.21.2.x86_64",
            "openSUSE Leap 15.4:kernel-default-optional-5.14.21-150400.24.21.2.aarch64",
            "openSUSE Leap 15.4:kernel-default-optional-5.14.21-150400.24.21.2.ppc64le",
            "openSUSE Leap 15.4:kernel-default-optional-5.14.21-150400.24.21.2.s390x",
            "openSUSE Leap 15.4:kernel-default-optional-5.14.21-150400.24.21.2.x86_64",
            "openSUSE Leap 15.4:kernel-devel-5.14.21-150400.24.21.2.noarch",
            "openSUSE Leap 15.4:kernel-docs-5.14.21-150400.24.21.3.noarch",
            "openSUSE Leap 15.4:kernel-docs-html-5.14.21-150400.24.21.3.noarch",
            "openSUSE Leap 15.4:kernel-kvmsmall-5.14.21-150400.24.21.2.aarch64",
            "openSUSE Leap 15.4:kernel-kvmsmall-5.14.21-150400.24.21.2.ppc64le",
            "openSUSE Leap 15.4:kernel-kvmsmall-5.14.21-150400.24.21.2.x86_64",
            "openSUSE Leap 15.4:kernel-kvmsmall-devel-5.14.21-150400.24.21.2.aarch64",
            "openSUSE Leap 15.4:kernel-kvmsmall-devel-5.14.21-150400.24.21.2.ppc64le",
            "openSUSE Leap 15.4:kernel-kvmsmall-devel-5.14.21-150400.24.21.2.x86_64",
            "openSUSE Leap 15.4:kernel-kvmsmall-livepatch-devel-5.14.21-150400.24.21.2.aarch64",
            "openSUSE Leap 15.4:kernel-kvmsmall-livepatch-devel-5.14.21-150400.24.21.2.ppc64le",
            "openSUSE Leap 15.4:kernel-kvmsmall-livepatch-devel-5.14.21-150400.24.21.2.x86_64",
            "openSUSE Leap 15.4:kernel-macros-5.14.21-150400.24.21.2.noarch",
            "openSUSE Leap 15.4:kernel-obs-build-5.14.21-150400.24.21.2.aarch64",
            "openSUSE Leap 15.4:kernel-obs-build-5.14.21-150400.24.21.2.ppc64le",
            "openSUSE Leap 15.4:kernel-obs-build-5.14.21-150400.24.21.2.s390x",
            "openSUSE Leap 15.4:kernel-obs-build-5.14.21-150400.24.21.2.x86_64",
            "openSUSE Leap 15.4:kernel-obs-qa-5.14.21-150400.24.21.1.aarch64",
            "openSUSE Leap 15.4:kernel-obs-qa-5.14.21-150400.24.21.1.ppc64le",
            "openSUSE Leap 15.4:kernel-obs-qa-5.14.21-150400.24.21.1.s390x",
            "openSUSE Leap 15.4:kernel-obs-qa-5.14.21-150400.24.21.1.x86_64",
            "openSUSE Leap 15.4:kernel-source-5.14.21-150400.24.21.2.noarch",
            "openSUSE Leap 15.4:kernel-source-vanilla-5.14.21-150400.24.21.2.noarch",
            "openSUSE Leap 15.4:kernel-syms-5.14.21-150400.24.21.1.aarch64",
            "openSUSE Leap 15.4:kernel-syms-5.14.21-150400.24.21.1.ppc64le",
            "openSUSE Leap 15.4:kernel-syms-5.14.21-150400.24.21.1.s390x",
            "openSUSE Leap 15.4:kernel-syms-5.14.21-150400.24.21.1.x86_64",
            "openSUSE Leap 15.4:kernel-zfcpdump-5.14.21-150400.24.21.2.s390x",
            "openSUSE Leap 15.4:kselftests-kmp-64kb-5.14.21-150400.24.21.2.aarch64",
            "openSUSE Leap 15.4:kselftests-kmp-default-5.14.21-150400.24.21.2.aarch64",
            "openSUSE Leap 15.4:kselftests-kmp-default-5.14.21-150400.24.21.2.ppc64le",
            "openSUSE Leap 15.4:kselftests-kmp-default-5.14.21-150400.24.21.2.s390x",
            "openSUSE Leap 15.4:kselftests-kmp-default-5.14.21-150400.24.21.2.x86_64",
            "openSUSE Leap 15.4:ocfs2-kmp-64kb-5.14.21-150400.24.21.2.aarch64",
            "openSUSE Leap 15.4:ocfs2-kmp-default-5.14.21-150400.24.21.2.aarch64",
            "openSUSE Leap 15.4:ocfs2-kmp-default-5.14.21-150400.24.21.2.ppc64le",
            "openSUSE Leap 15.4:ocfs2-kmp-default-5.14.21-150400.24.21.2.s390x",
            "openSUSE Leap 15.4:ocfs2-kmp-default-5.14.21-150400.24.21.2.x86_64",
            "openSUSE Leap 15.4:reiserfs-kmp-64kb-5.14.21-150400.24.21.2.aarch64",
            "openSUSE Leap 15.4:reiserfs-kmp-default-5.14.21-150400.24.21.2.aarch64",
            "openSUSE Leap 15.4:reiserfs-kmp-default-5.14.21-150400.24.21.2.ppc64le",
            "openSUSE Leap 15.4:reiserfs-kmp-default-5.14.21-150400.24.21.2.s390x",
            "openSUSE Leap 15.4:reiserfs-kmp-default-5.14.21-150400.24.21.2.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 5.9,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:N",
            "version": "3.1"
          },
          "products": [
            "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.21.2.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.21.2.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.21.2.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.21.2.x86_64",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.21.2.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.21.2.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.21.2.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.21.2.x86_64",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.21.2.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.21.2.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.21.2.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.21.2.x86_64",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.21.2.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.21.2.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.21.2.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.21.2.x86_64",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.21.2.ppc64le",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.21.2.s390x",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.21.2.x86_64",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.21.2.ppc64le",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.21.2.s390x",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.21.2.x86_64",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_21-default-1-150400.9.3.2.ppc64le",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_21-default-1-150400.9.3.2.s390x",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_21-default-1-150400.9.3.2.x86_64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-64kb-5.14.21-150400.24.21.2.aarch64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-64kb-devel-5.14.21-150400.24.21.2.aarch64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-5.14.21-150400.24.21.2.aarch64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-5.14.21-150400.24.21.2.ppc64le",
            "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-5.14.21-150400.24.21.2.s390x",
            "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-5.14.21-150400.24.21.2.x86_64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-base-5.14.21-150400.24.21.2.150400.24.7.2.aarch64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-base-5.14.21-150400.24.21.2.150400.24.7.2.ppc64le",
            "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-base-5.14.21-150400.24.21.2.150400.24.7.2.s390x",
            "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-base-5.14.21-150400.24.21.2.150400.24.7.2.x86_64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-devel-5.14.21-150400.24.21.2.aarch64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-devel-5.14.21-150400.24.21.2.ppc64le",
            "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-devel-5.14.21-150400.24.21.2.s390x",
            "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-devel-5.14.21-150400.24.21.2.x86_64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-devel-5.14.21-150400.24.21.2.noarch",
            "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-macros-5.14.21-150400.24.21.2.noarch",
            "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-zfcpdump-5.14.21-150400.24.21.2.s390x",
            "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-docs-5.14.21-150400.24.21.3.noarch",
            "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-obs-build-5.14.21-150400.24.21.2.aarch64",
            "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-obs-build-5.14.21-150400.24.21.2.ppc64le",
            "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-obs-build-5.14.21-150400.24.21.2.s390x",
            "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-obs-build-5.14.21-150400.24.21.2.x86_64",
            "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-source-5.14.21-150400.24.21.2.noarch",
            "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-syms-5.14.21-150400.24.21.1.aarch64",
            "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-syms-5.14.21-150400.24.21.1.ppc64le",
            "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-syms-5.14.21-150400.24.21.1.s390x",
            "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-syms-5.14.21-150400.24.21.1.x86_64",
            "SUSE Linux Enterprise Module for Legacy 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.21.2.aarch64",
            "SUSE Linux Enterprise Module for Legacy 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.21.2.ppc64le",
            "SUSE Linux Enterprise Module for Legacy 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.21.2.s390x",
            "SUSE Linux Enterprise Module for Legacy 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.21.2.x86_64",
            "SUSE Linux Enterprise Workstation Extension 15 SP4:kernel-default-extra-5.14.21-150400.24.21.2.x86_64",
            "openSUSE Leap 15.4:cluster-md-kmp-64kb-5.14.21-150400.24.21.2.aarch64",
            "openSUSE Leap 15.4:cluster-md-kmp-default-5.14.21-150400.24.21.2.aarch64",
            "openSUSE Leap 15.4:cluster-md-kmp-default-5.14.21-150400.24.21.2.ppc64le",
            "openSUSE Leap 15.4:cluster-md-kmp-default-5.14.21-150400.24.21.2.s390x",
            "openSUSE Leap 15.4:cluster-md-kmp-default-5.14.21-150400.24.21.2.x86_64",
            "openSUSE Leap 15.4:dlm-kmp-64kb-5.14.21-150400.24.21.2.aarch64",
            "openSUSE Leap 15.4:dlm-kmp-default-5.14.21-150400.24.21.2.aarch64",
            "openSUSE Leap 15.4:dlm-kmp-default-5.14.21-150400.24.21.2.ppc64le",
            "openSUSE Leap 15.4:dlm-kmp-default-5.14.21-150400.24.21.2.s390x",
            "openSUSE Leap 15.4:dlm-kmp-default-5.14.21-150400.24.21.2.x86_64",
            "openSUSE Leap 15.4:dtb-allwinner-5.14.21-150400.24.21.1.aarch64",
            "openSUSE Leap 15.4:dtb-altera-5.14.21-150400.24.21.1.aarch64",
            "openSUSE Leap 15.4:dtb-amazon-5.14.21-150400.24.21.1.aarch64",
            "openSUSE Leap 15.4:dtb-amd-5.14.21-150400.24.21.1.aarch64",
            "openSUSE Leap 15.4:dtb-amlogic-5.14.21-150400.24.21.1.aarch64",
            "openSUSE Leap 15.4:dtb-apm-5.14.21-150400.24.21.1.aarch64",
            "openSUSE Leap 15.4:dtb-apple-5.14.21-150400.24.21.1.aarch64",
            "openSUSE Leap 15.4:dtb-arm-5.14.21-150400.24.21.1.aarch64",
            "openSUSE Leap 15.4:dtb-broadcom-5.14.21-150400.24.21.1.aarch64",
            "openSUSE Leap 15.4:dtb-cavium-5.14.21-150400.24.21.1.aarch64",
            "openSUSE Leap 15.4:dtb-exynos-5.14.21-150400.24.21.1.aarch64",
            "openSUSE Leap 15.4:dtb-freescale-5.14.21-150400.24.21.1.aarch64",
            "openSUSE Leap 15.4:dtb-hisilicon-5.14.21-150400.24.21.1.aarch64",
            "openSUSE Leap 15.4:dtb-lg-5.14.21-150400.24.21.1.aarch64",
            "openSUSE Leap 15.4:dtb-marvell-5.14.21-150400.24.21.1.aarch64",
            "openSUSE Leap 15.4:dtb-mediatek-5.14.21-150400.24.21.1.aarch64",
            "openSUSE Leap 15.4:dtb-nvidia-5.14.21-150400.24.21.1.aarch64",
            "openSUSE Leap 15.4:dtb-qcom-5.14.21-150400.24.21.1.aarch64",
            "openSUSE Leap 15.4:dtb-renesas-5.14.21-150400.24.21.1.aarch64",
            "openSUSE Leap 15.4:dtb-rockchip-5.14.21-150400.24.21.1.aarch64",
            "openSUSE Leap 15.4:dtb-socionext-5.14.21-150400.24.21.1.aarch64",
            "openSUSE Leap 15.4:dtb-sprd-5.14.21-150400.24.21.1.aarch64",
            "openSUSE Leap 15.4:dtb-xilinx-5.14.21-150400.24.21.1.aarch64",
            "openSUSE Leap 15.4:gfs2-kmp-64kb-5.14.21-150400.24.21.2.aarch64",
            "openSUSE Leap 15.4:gfs2-kmp-default-5.14.21-150400.24.21.2.aarch64",
            "openSUSE Leap 15.4:gfs2-kmp-default-5.14.21-150400.24.21.2.ppc64le",
            "openSUSE Leap 15.4:gfs2-kmp-default-5.14.21-150400.24.21.2.s390x",
            "openSUSE Leap 15.4:gfs2-kmp-default-5.14.21-150400.24.21.2.x86_64",
            "openSUSE Leap 15.4:kernel-64kb-5.14.21-150400.24.21.2.aarch64",
            "openSUSE Leap 15.4:kernel-64kb-devel-5.14.21-150400.24.21.2.aarch64",
            "openSUSE Leap 15.4:kernel-64kb-extra-5.14.21-150400.24.21.2.aarch64",
            "openSUSE Leap 15.4:kernel-64kb-livepatch-devel-5.14.21-150400.24.21.2.aarch64",
            "openSUSE Leap 15.4:kernel-64kb-optional-5.14.21-150400.24.21.2.aarch64",
            "openSUSE Leap 15.4:kernel-debug-5.14.21-150400.24.21.2.ppc64le",
            "openSUSE Leap 15.4:kernel-debug-5.14.21-150400.24.21.2.x86_64",
            "openSUSE Leap 15.4:kernel-debug-devel-5.14.21-150400.24.21.2.ppc64le",
            "openSUSE Leap 15.4:kernel-debug-devel-5.14.21-150400.24.21.2.x86_64",
            "openSUSE Leap 15.4:kernel-debug-livepatch-devel-5.14.21-150400.24.21.2.ppc64le",
            "openSUSE Leap 15.4:kernel-debug-livepatch-devel-5.14.21-150400.24.21.2.x86_64",
            "openSUSE Leap 15.4:kernel-default-5.14.21-150400.24.21.2.aarch64",
            "openSUSE Leap 15.4:kernel-default-5.14.21-150400.24.21.2.ppc64le",
            "openSUSE Leap 15.4:kernel-default-5.14.21-150400.24.21.2.s390x",
            "openSUSE Leap 15.4:kernel-default-5.14.21-150400.24.21.2.x86_64",
            "openSUSE Leap 15.4:kernel-default-base-5.14.21-150400.24.21.2.150400.24.7.2.aarch64",
            "openSUSE Leap 15.4:kernel-default-base-5.14.21-150400.24.21.2.150400.24.7.2.ppc64le",
            "openSUSE Leap 15.4:kernel-default-base-5.14.21-150400.24.21.2.150400.24.7.2.s390x",
            "openSUSE Leap 15.4:kernel-default-base-5.14.21-150400.24.21.2.150400.24.7.2.x86_64",
            "openSUSE Leap 15.4:kernel-default-base-rebuild-5.14.21-150400.24.21.2.150400.24.7.2.aarch64",
            "openSUSE Leap 15.4:kernel-default-base-rebuild-5.14.21-150400.24.21.2.150400.24.7.2.ppc64le",
            "openSUSE Leap 15.4:kernel-default-base-rebuild-5.14.21-150400.24.21.2.150400.24.7.2.s390x",
            "openSUSE Leap 15.4:kernel-default-base-rebuild-5.14.21-150400.24.21.2.150400.24.7.2.x86_64",
            "openSUSE Leap 15.4:kernel-default-devel-5.14.21-150400.24.21.2.aarch64",
            "openSUSE Leap 15.4:kernel-default-devel-5.14.21-150400.24.21.2.ppc64le",
            "openSUSE Leap 15.4:kernel-default-devel-5.14.21-150400.24.21.2.s390x",
            "openSUSE Leap 15.4:kernel-default-devel-5.14.21-150400.24.21.2.x86_64",
            "openSUSE Leap 15.4:kernel-default-extra-5.14.21-150400.24.21.2.aarch64",
            "openSUSE Leap 15.4:kernel-default-extra-5.14.21-150400.24.21.2.ppc64le",
            "openSUSE Leap 15.4:kernel-default-extra-5.14.21-150400.24.21.2.s390x",
            "openSUSE Leap 15.4:kernel-default-extra-5.14.21-150400.24.21.2.x86_64",
            "openSUSE Leap 15.4:kernel-default-livepatch-5.14.21-150400.24.21.2.aarch64",
            "openSUSE Leap 15.4:kernel-default-livepatch-5.14.21-150400.24.21.2.ppc64le",
            "openSUSE Leap 15.4:kernel-default-livepatch-5.14.21-150400.24.21.2.s390x",
            "openSUSE Leap 15.4:kernel-default-livepatch-5.14.21-150400.24.21.2.x86_64",
            "openSUSE Leap 15.4:kernel-default-livepatch-devel-5.14.21-150400.24.21.2.aarch64",
            "openSUSE Leap 15.4:kernel-default-livepatch-devel-5.14.21-150400.24.21.2.ppc64le",
            "openSUSE Leap 15.4:kernel-default-livepatch-devel-5.14.21-150400.24.21.2.s390x",
            "openSUSE Leap 15.4:kernel-default-livepatch-devel-5.14.21-150400.24.21.2.x86_64",
            "openSUSE Leap 15.4:kernel-default-optional-5.14.21-150400.24.21.2.aarch64",
            "openSUSE Leap 15.4:kernel-default-optional-5.14.21-150400.24.21.2.ppc64le",
            "openSUSE Leap 15.4:kernel-default-optional-5.14.21-150400.24.21.2.s390x",
            "openSUSE Leap 15.4:kernel-default-optional-5.14.21-150400.24.21.2.x86_64",
            "openSUSE Leap 15.4:kernel-devel-5.14.21-150400.24.21.2.noarch",
            "openSUSE Leap 15.4:kernel-docs-5.14.21-150400.24.21.3.noarch",
            "openSUSE Leap 15.4:kernel-docs-html-5.14.21-150400.24.21.3.noarch",
            "openSUSE Leap 15.4:kernel-kvmsmall-5.14.21-150400.24.21.2.aarch64",
            "openSUSE Leap 15.4:kernel-kvmsmall-5.14.21-150400.24.21.2.ppc64le",
            "openSUSE Leap 15.4:kernel-kvmsmall-5.14.21-150400.24.21.2.x86_64",
            "openSUSE Leap 15.4:kernel-kvmsmall-devel-5.14.21-150400.24.21.2.aarch64",
            "openSUSE Leap 15.4:kernel-kvmsmall-devel-5.14.21-150400.24.21.2.ppc64le",
            "openSUSE Leap 15.4:kernel-kvmsmall-devel-5.14.21-150400.24.21.2.x86_64",
            "openSUSE Leap 15.4:kernel-kvmsmall-livepatch-devel-5.14.21-150400.24.21.2.aarch64",
            "openSUSE Leap 15.4:kernel-kvmsmall-livepatch-devel-5.14.21-150400.24.21.2.ppc64le",
            "openSUSE Leap 15.4:kernel-kvmsmall-livepatch-devel-5.14.21-150400.24.21.2.x86_64",
            "openSUSE Leap 15.4:kernel-macros-5.14.21-150400.24.21.2.noarch",
            "openSUSE Leap 15.4:kernel-obs-build-5.14.21-150400.24.21.2.aarch64",
            "openSUSE Leap 15.4:kernel-obs-build-5.14.21-150400.24.21.2.ppc64le",
            "openSUSE Leap 15.4:kernel-obs-build-5.14.21-150400.24.21.2.s390x",
            "openSUSE Leap 15.4:kernel-obs-build-5.14.21-150400.24.21.2.x86_64",
            "openSUSE Leap 15.4:kernel-obs-qa-5.14.21-150400.24.21.1.aarch64",
            "openSUSE Leap 15.4:kernel-obs-qa-5.14.21-150400.24.21.1.ppc64le",
            "openSUSE Leap 15.4:kernel-obs-qa-5.14.21-150400.24.21.1.s390x",
            "openSUSE Leap 15.4:kernel-obs-qa-5.14.21-150400.24.21.1.x86_64",
            "openSUSE Leap 15.4:kernel-source-5.14.21-150400.24.21.2.noarch",
            "openSUSE Leap 15.4:kernel-source-vanilla-5.14.21-150400.24.21.2.noarch",
            "openSUSE Leap 15.4:kernel-syms-5.14.21-150400.24.21.1.aarch64",
            "openSUSE Leap 15.4:kernel-syms-5.14.21-150400.24.21.1.ppc64le",
            "openSUSE Leap 15.4:kernel-syms-5.14.21-150400.24.21.1.s390x",
            "openSUSE Leap 15.4:kernel-syms-5.14.21-150400.24.21.1.x86_64",
            "openSUSE Leap 15.4:kernel-zfcpdump-5.14.21-150400.24.21.2.s390x",
            "openSUSE Leap 15.4:kselftests-kmp-64kb-5.14.21-150400.24.21.2.aarch64",
            "openSUSE Leap 15.4:kselftests-kmp-default-5.14.21-150400.24.21.2.aarch64",
            "openSUSE Leap 15.4:kselftests-kmp-default-5.14.21-150400.24.21.2.ppc64le",
            "openSUSE Leap 15.4:kselftests-kmp-default-5.14.21-150400.24.21.2.s390x",
            "openSUSE Leap 15.4:kselftests-kmp-default-5.14.21-150400.24.21.2.x86_64",
            "openSUSE Leap 15.4:ocfs2-kmp-64kb-5.14.21-150400.24.21.2.aarch64",
            "openSUSE Leap 15.4:ocfs2-kmp-default-5.14.21-150400.24.21.2.aarch64",
            "openSUSE Leap 15.4:ocfs2-kmp-default-5.14.21-150400.24.21.2.ppc64le",
            "openSUSE Leap 15.4:ocfs2-kmp-default-5.14.21-150400.24.21.2.s390x",
            "openSUSE Leap 15.4:ocfs2-kmp-default-5.14.21-150400.24.21.2.x86_64",
            "openSUSE Leap 15.4:reiserfs-kmp-64kb-5.14.21-150400.24.21.2.aarch64",
            "openSUSE Leap 15.4:reiserfs-kmp-default-5.14.21-150400.24.21.2.aarch64",
            "openSUSE Leap 15.4:reiserfs-kmp-default-5.14.21-150400.24.21.2.ppc64le",
            "openSUSE Leap 15.4:reiserfs-kmp-default-5.14.21-150400.24.21.2.s390x",
            "openSUSE Leap 15.4:reiserfs-kmp-default-5.14.21-150400.24.21.2.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2022-09-16T15:30:19Z",
          "details": "moderate"
        }
      ],
      "title": "CVE-2022-2663"
    },
    {
      "cve": "CVE-2022-28356",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2022-28356"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "In the Linux kernel before 5.17.1, a refcount leak bug was found in net/llc/af_llc.c.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.21.2.aarch64",
          "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.21.2.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.21.2.s390x",
          "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.21.2.x86_64",
          "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.21.2.aarch64",
          "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.21.2.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.21.2.s390x",
          "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.21.2.x86_64",
          "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.21.2.aarch64",
          "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.21.2.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.21.2.s390x",
          "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.21.2.x86_64",
          "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.21.2.aarch64",
          "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.21.2.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.21.2.s390x",
          "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.21.2.x86_64",
          "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.21.2.ppc64le",
          "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.21.2.s390x",
          "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.21.2.x86_64",
          "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.21.2.ppc64le",
          "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.21.2.s390x",
          "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.21.2.x86_64",
          "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_21-default-1-150400.9.3.2.ppc64le",
          "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_21-default-1-150400.9.3.2.s390x",
          "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_21-default-1-150400.9.3.2.x86_64",
          "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-64kb-5.14.21-150400.24.21.2.aarch64",
          "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-64kb-devel-5.14.21-150400.24.21.2.aarch64",
          "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-5.14.21-150400.24.21.2.aarch64",
          "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-5.14.21-150400.24.21.2.ppc64le",
          "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-5.14.21-150400.24.21.2.s390x",
          "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-5.14.21-150400.24.21.2.x86_64",
          "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-base-5.14.21-150400.24.21.2.150400.24.7.2.aarch64",
          "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-base-5.14.21-150400.24.21.2.150400.24.7.2.ppc64le",
          "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-base-5.14.21-150400.24.21.2.150400.24.7.2.s390x",
          "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-base-5.14.21-150400.24.21.2.150400.24.7.2.x86_64",
          "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-devel-5.14.21-150400.24.21.2.aarch64",
          "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-devel-5.14.21-150400.24.21.2.ppc64le",
          "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-devel-5.14.21-150400.24.21.2.s390x",
          "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-devel-5.14.21-150400.24.21.2.x86_64",
          "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-devel-5.14.21-150400.24.21.2.noarch",
          "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-macros-5.14.21-150400.24.21.2.noarch",
          "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-zfcpdump-5.14.21-150400.24.21.2.s390x",
          "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-docs-5.14.21-150400.24.21.3.noarch",
          "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-obs-build-5.14.21-150400.24.21.2.aarch64",
          "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-obs-build-5.14.21-150400.24.21.2.ppc64le",
          "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-obs-build-5.14.21-150400.24.21.2.s390x",
          "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-obs-build-5.14.21-150400.24.21.2.x86_64",
          "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-source-5.14.21-150400.24.21.2.noarch",
          "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-syms-5.14.21-150400.24.21.1.aarch64",
          "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-syms-5.14.21-150400.24.21.1.ppc64le",
          "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-syms-5.14.21-150400.24.21.1.s390x",
          "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-syms-5.14.21-150400.24.21.1.x86_64",
          "SUSE Linux Enterprise Module for Legacy 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.21.2.aarch64",
          "SUSE Linux Enterprise Module for Legacy 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.21.2.ppc64le",
          "SUSE Linux Enterprise Module for Legacy 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.21.2.s390x",
          "SUSE Linux Enterprise Module for Legacy 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.21.2.x86_64",
          "SUSE Linux Enterprise Workstation Extension 15 SP4:kernel-default-extra-5.14.21-150400.24.21.2.x86_64",
          "openSUSE Leap 15.4:cluster-md-kmp-64kb-5.14.21-150400.24.21.2.aarch64",
          "openSUSE Leap 15.4:cluster-md-kmp-default-5.14.21-150400.24.21.2.aarch64",
          "openSUSE Leap 15.4:cluster-md-kmp-default-5.14.21-150400.24.21.2.ppc64le",
          "openSUSE Leap 15.4:cluster-md-kmp-default-5.14.21-150400.24.21.2.s390x",
          "openSUSE Leap 15.4:cluster-md-kmp-default-5.14.21-150400.24.21.2.x86_64",
          "openSUSE Leap 15.4:dlm-kmp-64kb-5.14.21-150400.24.21.2.aarch64",
          "openSUSE Leap 15.4:dlm-kmp-default-5.14.21-150400.24.21.2.aarch64",
          "openSUSE Leap 15.4:dlm-kmp-default-5.14.21-150400.24.21.2.ppc64le",
          "openSUSE Leap 15.4:dlm-kmp-default-5.14.21-150400.24.21.2.s390x",
          "openSUSE Leap 15.4:dlm-kmp-default-5.14.21-150400.24.21.2.x86_64",
          "openSUSE Leap 15.4:dtb-allwinner-5.14.21-150400.24.21.1.aarch64",
          "openSUSE Leap 15.4:dtb-altera-5.14.21-150400.24.21.1.aarch64",
          "openSUSE Leap 15.4:dtb-amazon-5.14.21-150400.24.21.1.aarch64",
          "openSUSE Leap 15.4:dtb-amd-5.14.21-150400.24.21.1.aarch64",
          "openSUSE Leap 15.4:dtb-amlogic-5.14.21-150400.24.21.1.aarch64",
          "openSUSE Leap 15.4:dtb-apm-5.14.21-150400.24.21.1.aarch64",
          "openSUSE Leap 15.4:dtb-apple-5.14.21-150400.24.21.1.aarch64",
          "openSUSE Leap 15.4:dtb-arm-5.14.21-150400.24.21.1.aarch64",
          "openSUSE Leap 15.4:dtb-broadcom-5.14.21-150400.24.21.1.aarch64",
          "openSUSE Leap 15.4:dtb-cavium-5.14.21-150400.24.21.1.aarch64",
          "openSUSE Leap 15.4:dtb-exynos-5.14.21-150400.24.21.1.aarch64",
          "openSUSE Leap 15.4:dtb-freescale-5.14.21-150400.24.21.1.aarch64",
          "openSUSE Leap 15.4:dtb-hisilicon-5.14.21-150400.24.21.1.aarch64",
          "openSUSE Leap 15.4:dtb-lg-5.14.21-150400.24.21.1.aarch64",
          "openSUSE Leap 15.4:dtb-marvell-5.14.21-150400.24.21.1.aarch64",
          "openSUSE Leap 15.4:dtb-mediatek-5.14.21-150400.24.21.1.aarch64",
          "openSUSE Leap 15.4:dtb-nvidia-5.14.21-150400.24.21.1.aarch64",
          "openSUSE Leap 15.4:dtb-qcom-5.14.21-150400.24.21.1.aarch64",
          "openSUSE Leap 15.4:dtb-renesas-5.14.21-150400.24.21.1.aarch64",
          "openSUSE Leap 15.4:dtb-rockchip-5.14.21-150400.24.21.1.aarch64",
          "openSUSE Leap 15.4:dtb-socionext-5.14.21-150400.24.21.1.aarch64",
          "openSUSE Leap 15.4:dtb-sprd-5.14.21-150400.24.21.1.aarch64",
          "openSUSE Leap 15.4:dtb-xilinx-5.14.21-150400.24.21.1.aarch64",
          "openSUSE Leap 15.4:gfs2-kmp-64kb-5.14.21-150400.24.21.2.aarch64",
          "openSUSE Leap 15.4:gfs2-kmp-default-5.14.21-150400.24.21.2.aarch64",
          "openSUSE Leap 15.4:gfs2-kmp-default-5.14.21-150400.24.21.2.ppc64le",
          "openSUSE Leap 15.4:gfs2-kmp-default-5.14.21-150400.24.21.2.s390x",
          "openSUSE Leap 15.4:gfs2-kmp-default-5.14.21-150400.24.21.2.x86_64",
          "openSUSE Leap 15.4:kernel-64kb-5.14.21-150400.24.21.2.aarch64",
          "openSUSE Leap 15.4:kernel-64kb-devel-5.14.21-150400.24.21.2.aarch64",
          "openSUSE Leap 15.4:kernel-64kb-extra-5.14.21-150400.24.21.2.aarch64",
          "openSUSE Leap 15.4:kernel-64kb-livepatch-devel-5.14.21-150400.24.21.2.aarch64",
          "openSUSE Leap 15.4:kernel-64kb-optional-5.14.21-150400.24.21.2.aarch64",
          "openSUSE Leap 15.4:kernel-debug-5.14.21-150400.24.21.2.ppc64le",
          "openSUSE Leap 15.4:kernel-debug-5.14.21-150400.24.21.2.x86_64",
          "openSUSE Leap 15.4:kernel-debug-devel-5.14.21-150400.24.21.2.ppc64le",
          "openSUSE Leap 15.4:kernel-debug-devel-5.14.21-150400.24.21.2.x86_64",
          "openSUSE Leap 15.4:kernel-debug-livepatch-devel-5.14.21-150400.24.21.2.ppc64le",
          "openSUSE Leap 15.4:kernel-debug-livepatch-devel-5.14.21-150400.24.21.2.x86_64",
          "openSUSE Leap 15.4:kernel-default-5.14.21-150400.24.21.2.aarch64",
          "openSUSE Leap 15.4:kernel-default-5.14.21-150400.24.21.2.ppc64le",
          "openSUSE Leap 15.4:kernel-default-5.14.21-150400.24.21.2.s390x",
          "openSUSE Leap 15.4:kernel-default-5.14.21-150400.24.21.2.x86_64",
          "openSUSE Leap 15.4:kernel-default-base-5.14.21-150400.24.21.2.150400.24.7.2.aarch64",
          "openSUSE Leap 15.4:kernel-default-base-5.14.21-150400.24.21.2.150400.24.7.2.ppc64le",
          "openSUSE Leap 15.4:kernel-default-base-5.14.21-150400.24.21.2.150400.24.7.2.s390x",
          "openSUSE Leap 15.4:kernel-default-base-5.14.21-150400.24.21.2.150400.24.7.2.x86_64",
          "openSUSE Leap 15.4:kernel-default-base-rebuild-5.14.21-150400.24.21.2.150400.24.7.2.aarch64",
          "openSUSE Leap 15.4:kernel-default-base-rebuild-5.14.21-150400.24.21.2.150400.24.7.2.ppc64le",
          "openSUSE Leap 15.4:kernel-default-base-rebuild-5.14.21-150400.24.21.2.150400.24.7.2.s390x",
          "openSUSE Leap 15.4:kernel-default-base-rebuild-5.14.21-150400.24.21.2.150400.24.7.2.x86_64",
          "openSUSE Leap 15.4:kernel-default-devel-5.14.21-150400.24.21.2.aarch64",
          "openSUSE Leap 15.4:kernel-default-devel-5.14.21-150400.24.21.2.ppc64le",
          "openSUSE Leap 15.4:kernel-default-devel-5.14.21-150400.24.21.2.s390x",
          "openSUSE Leap 15.4:kernel-default-devel-5.14.21-150400.24.21.2.x86_64",
          "openSUSE Leap 15.4:kernel-default-extra-5.14.21-150400.24.21.2.aarch64",
          "openSUSE Leap 15.4:kernel-default-extra-5.14.21-150400.24.21.2.ppc64le",
          "openSUSE Leap 15.4:kernel-default-extra-5.14.21-150400.24.21.2.s390x",
          "openSUSE Leap 15.4:kernel-default-extra-5.14.21-150400.24.21.2.x86_64",
          "openSUSE Leap 15.4:kernel-default-livepatch-5.14.21-150400.24.21.2.aarch64",
          "openSUSE Leap 15.4:kernel-default-livepatch-5.14.21-150400.24.21.2.ppc64le",
          "openSUSE Leap 15.4:kernel-default-livepatch-5.14.21-150400.24.21.2.s390x",
          "openSUSE Leap 15.4:kernel-default-livepatch-5.14.21-150400.24.21.2.x86_64",
          "openSUSE Leap 15.4:kernel-default-livepatch-devel-5.14.21-150400.24.21.2.aarch64",
          "openSUSE Leap 15.4:kernel-default-livepatch-devel-5.14.21-150400.24.21.2.ppc64le",
          "openSUSE Leap 15.4:kernel-default-livepatch-devel-5.14.21-150400.24.21.2.s390x",
          "openSUSE Leap 15.4:kernel-default-livepatch-devel-5.14.21-150400.24.21.2.x86_64",
          "openSUSE Leap 15.4:kernel-default-optional-5.14.21-150400.24.21.2.aarch64",
          "openSUSE Leap 15.4:kernel-default-optional-5.14.21-150400.24.21.2.ppc64le",
          "openSUSE Leap 15.4:kernel-default-optional-5.14.21-150400.24.21.2.s390x",
          "openSUSE Leap 15.4:kernel-default-optional-5.14.21-150400.24.21.2.x86_64",
          "openSUSE Leap 15.4:kernel-devel-5.14.21-150400.24.21.2.noarch",
          "openSUSE Leap 15.4:kernel-docs-5.14.21-150400.24.21.3.noarch",
          "openSUSE Leap 15.4:kernel-docs-html-5.14.21-150400.24.21.3.noarch",
          "openSUSE Leap 15.4:kernel-kvmsmall-5.14.21-150400.24.21.2.aarch64",
          "openSUSE Leap 15.4:kernel-kvmsmall-5.14.21-150400.24.21.2.ppc64le",
          "openSUSE Leap 15.4:kernel-kvmsmall-5.14.21-150400.24.21.2.x86_64",
          "openSUSE Leap 15.4:kernel-kvmsmall-devel-5.14.21-150400.24.21.2.aarch64",
          "openSUSE Leap 15.4:kernel-kvmsmall-devel-5.14.21-150400.24.21.2.ppc64le",
          "openSUSE Leap 15.4:kernel-kvmsmall-devel-5.14.21-150400.24.21.2.x86_64",
          "openSUSE Leap 15.4:kernel-kvmsmall-livepatch-devel-5.14.21-150400.24.21.2.aarch64",
          "openSUSE Leap 15.4:kernel-kvmsmall-livepatch-devel-5.14.21-150400.24.21.2.ppc64le",
          "openSUSE Leap 15.4:kernel-kvmsmall-livepatch-devel-5.14.21-150400.24.21.2.x86_64",
          "openSUSE Leap 15.4:kernel-macros-5.14.21-150400.24.21.2.noarch",
          "openSUSE Leap 15.4:kernel-obs-build-5.14.21-150400.24.21.2.aarch64",
          "openSUSE Leap 15.4:kernel-obs-build-5.14.21-150400.24.21.2.ppc64le",
          "openSUSE Leap 15.4:kernel-obs-build-5.14.21-150400.24.21.2.s390x",
          "openSUSE Leap 15.4:kernel-obs-build-5.14.21-150400.24.21.2.x86_64",
          "openSUSE Leap 15.4:kernel-obs-qa-5.14.21-150400.24.21.1.aarch64",
          "openSUSE Leap 15.4:kernel-obs-qa-5.14.21-150400.24.21.1.ppc64le",
          "openSUSE Leap 15.4:kernel-obs-qa-5.14.21-150400.24.21.1.s390x",
          "openSUSE Leap 15.4:kernel-obs-qa-5.14.21-150400.24.21.1.x86_64",
          "openSUSE Leap 15.4:kernel-source-5.14.21-150400.24.21.2.noarch",
          "openSUSE Leap 15.4:kernel-source-vanilla-5.14.21-150400.24.21.2.noarch",
          "openSUSE Leap 15.4:kernel-syms-5.14.21-150400.24.21.1.aarch64",
          "openSUSE Leap 15.4:kernel-syms-5.14.21-150400.24.21.1.ppc64le",
          "openSUSE Leap 15.4:kernel-syms-5.14.21-150400.24.21.1.s390x",
          "openSUSE Leap 15.4:kernel-syms-5.14.21-150400.24.21.1.x86_64",
          "openSUSE Leap 15.4:kernel-zfcpdump-5.14.21-150400.24.21.2.s390x",
          "openSUSE Leap 15.4:kselftests-kmp-64kb-5.14.21-150400.24.21.2.aarch64",
          "openSUSE Leap 15.4:kselftests-kmp-default-5.14.21-150400.24.21.2.aarch64",
          "openSUSE Leap 15.4:kselftests-kmp-default-5.14.21-150400.24.21.2.ppc64le",
          "openSUSE Leap 15.4:kselftests-kmp-default-5.14.21-150400.24.21.2.s390x",
          "openSUSE Leap 15.4:kselftests-kmp-default-5.14.21-150400.24.21.2.x86_64",
          "openSUSE Leap 15.4:ocfs2-kmp-64kb-5.14.21-150400.24.21.2.aarch64",
          "openSUSE Leap 15.4:ocfs2-kmp-default-5.14.21-150400.24.21.2.aarch64",
          "openSUSE Leap 15.4:ocfs2-kmp-default-5.14.21-150400.24.21.2.ppc64le",
          "openSUSE Leap 15.4:ocfs2-kmp-default-5.14.21-150400.24.21.2.s390x",
          "openSUSE Leap 15.4:ocfs2-kmp-default-5.14.21-150400.24.21.2.x86_64",
          "openSUSE Leap 15.4:reiserfs-kmp-64kb-5.14.21-150400.24.21.2.aarch64",
          "openSUSE Leap 15.4:reiserfs-kmp-default-5.14.21-150400.24.21.2.aarch64",
          "openSUSE Leap 15.4:reiserfs-kmp-default-5.14.21-150400.24.21.2.ppc64le",
          "openSUSE Leap 15.4:reiserfs-kmp-default-5.14.21-150400.24.21.2.s390x",
          "openSUSE Leap 15.4:reiserfs-kmp-default-5.14.21-150400.24.21.2.x86_64"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2022-28356",
          "url": "https://www.suse.com/security/cve/CVE-2022-28356"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1197391 for CVE-2022-28356",
          "url": "https://bugzilla.suse.com/1197391"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.21.2.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.21.2.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.21.2.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.21.2.x86_64",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.21.2.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.21.2.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.21.2.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.21.2.x86_64",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.21.2.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.21.2.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.21.2.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.21.2.x86_64",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.21.2.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.21.2.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.21.2.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.21.2.x86_64",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.21.2.ppc64le",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.21.2.s390x",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.21.2.x86_64",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.21.2.ppc64le",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.21.2.s390x",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.21.2.x86_64",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_21-default-1-150400.9.3.2.ppc64le",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_21-default-1-150400.9.3.2.s390x",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_21-default-1-150400.9.3.2.x86_64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-64kb-5.14.21-150400.24.21.2.aarch64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-64kb-devel-5.14.21-150400.24.21.2.aarch64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-5.14.21-150400.24.21.2.aarch64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-5.14.21-150400.24.21.2.ppc64le",
            "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-5.14.21-150400.24.21.2.s390x",
            "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-5.14.21-150400.24.21.2.x86_64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-base-5.14.21-150400.24.21.2.150400.24.7.2.aarch64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-base-5.14.21-150400.24.21.2.150400.24.7.2.ppc64le",
            "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-base-5.14.21-150400.24.21.2.150400.24.7.2.s390x",
            "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-base-5.14.21-150400.24.21.2.150400.24.7.2.x86_64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-devel-5.14.21-150400.24.21.2.aarch64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-devel-5.14.21-150400.24.21.2.ppc64le",
            "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-devel-5.14.21-150400.24.21.2.s390x",
            "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-devel-5.14.21-150400.24.21.2.x86_64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-devel-5.14.21-150400.24.21.2.noarch",
            "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-macros-5.14.21-150400.24.21.2.noarch",
            "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-zfcpdump-5.14.21-150400.24.21.2.s390x",
            "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-docs-5.14.21-150400.24.21.3.noarch",
            "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-obs-build-5.14.21-150400.24.21.2.aarch64",
            "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-obs-build-5.14.21-150400.24.21.2.ppc64le",
            "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-obs-build-5.14.21-150400.24.21.2.s390x",
            "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-obs-build-5.14.21-150400.24.21.2.x86_64",
            "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-source-5.14.21-150400.24.21.2.noarch",
            "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-syms-5.14.21-150400.24.21.1.aarch64",
            "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-syms-5.14.21-150400.24.21.1.ppc64le",
            "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-syms-5.14.21-150400.24.21.1.s390x",
            "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-syms-5.14.21-150400.24.21.1.x86_64",
            "SUSE Linux Enterprise Module for Legacy 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.21.2.aarch64",
            "SUSE Linux Enterprise Module for Legacy 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.21.2.ppc64le",
            "SUSE Linux Enterprise Module for Legacy 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.21.2.s390x",
            "SUSE Linux Enterprise Module for Legacy 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.21.2.x86_64",
            "SUSE Linux Enterprise Workstation Extension 15 SP4:kernel-default-extra-5.14.21-150400.24.21.2.x86_64",
            "openSUSE Leap 15.4:cluster-md-kmp-64kb-5.14.21-150400.24.21.2.aarch64",
            "openSUSE Leap 15.4:cluster-md-kmp-default-5.14.21-150400.24.21.2.aarch64",
            "openSUSE Leap 15.4:cluster-md-kmp-default-5.14.21-150400.24.21.2.ppc64le",
            "openSUSE Leap 15.4:cluster-md-kmp-default-5.14.21-150400.24.21.2.s390x",
            "openSUSE Leap 15.4:cluster-md-kmp-default-5.14.21-150400.24.21.2.x86_64",
            "openSUSE Leap 15.4:dlm-kmp-64kb-5.14.21-150400.24.21.2.aarch64",
            "openSUSE Leap 15.4:dlm-kmp-default-5.14.21-150400.24.21.2.aarch64",
            "openSUSE Leap 15.4:dlm-kmp-default-5.14.21-150400.24.21.2.ppc64le",
            "openSUSE Leap 15.4:dlm-kmp-default-5.14.21-150400.24.21.2.s390x",
            "openSUSE Leap 15.4:dlm-kmp-default-5.14.21-150400.24.21.2.x86_64",
            "openSUSE Leap 15.4:dtb-allwinner-5.14.21-150400.24.21.1.aarch64",
            "openSUSE Leap 15.4:dtb-altera-5.14.21-150400.24.21.1.aarch64",
            "openSUSE Leap 15.4:dtb-amazon-5.14.21-150400.24.21.1.aarch64",
            "openSUSE Leap 15.4:dtb-amd-5.14.21-150400.24.21.1.aarch64",
            "openSUSE Leap 15.4:dtb-amlogic-5.14.21-150400.24.21.1.aarch64",
            "openSUSE Leap 15.4:dtb-apm-5.14.21-150400.24.21.1.aarch64",
            "openSUSE Leap 15.4:dtb-apple-5.14.21-150400.24.21.1.aarch64",
            "openSUSE Leap 15.4:dtb-arm-5.14.21-150400.24.21.1.aarch64",
            "openSUSE Leap 15.4:dtb-broadcom-5.14.21-150400.24.21.1.aarch64",
            "openSUSE Leap 15.4:dtb-cavium-5.14.21-150400.24.21.1.aarch64",
            "openSUSE Leap 15.4:dtb-exynos-5.14.21-150400.24.21.1.aarch64",
            "openSUSE Leap 15.4:dtb-freescale-5.14.21-150400.24.21.1.aarch64",
            "openSUSE Leap 15.4:dtb-hisilicon-5.14.21-150400.24.21.1.aarch64",
            "openSUSE Leap 15.4:dtb-lg-5.14.21-150400.24.21.1.aarch64",
            "openSUSE Leap 15.4:dtb-marvell-5.14.21-150400.24.21.1.aarch64",
            "openSUSE Leap 15.4:dtb-mediatek-5.14.21-150400.24.21.1.aarch64",
            "openSUSE Leap 15.4:dtb-nvidia-5.14.21-150400.24.21.1.aarch64",
            "openSUSE Leap 15.4:dtb-qcom-5.14.21-150400.24.21.1.aarch64",
            "openSUSE Leap 15.4:dtb-renesas-5.14.21-150400.24.21.1.aarch64",
            "openSUSE Leap 15.4:dtb-rockchip-5.14.21-150400.24.21.1.aarch64",
            "openSUSE Leap 15.4:dtb-socionext-5.14.21-150400.24.21.1.aarch64",
            "openSUSE Leap 15.4:dtb-sprd-5.14.21-150400.24.21.1.aarch64",
            "openSUSE Leap 15.4:dtb-xilinx-5.14.21-150400.24.21.1.aarch64",
            "openSUSE Leap 15.4:gfs2-kmp-64kb-5.14.21-150400.24.21.2.aarch64",
            "openSUSE Leap 15.4:gfs2-kmp-default-5.14.21-150400.24.21.2.aarch64",
            "openSUSE Leap 15.4:gfs2-kmp-default-5.14.21-150400.24.21.2.ppc64le",
            "openSUSE Leap 15.4:gfs2-kmp-default-5.14.21-150400.24.21.2.s390x",
            "openSUSE Leap 15.4:gfs2-kmp-default-5.14.21-150400.24.21.2.x86_64",
            "openSUSE Leap 15.4:kernel-64kb-5.14.21-150400.24.21.2.aarch64",
            "openSUSE Leap 15.4:kernel-64kb-devel-5.14.21-150400.24.21.2.aarch64",
            "openSUSE Leap 15.4:kernel-64kb-extra-5.14.21-150400.24.21.2.aarch64",
            "openSUSE Leap 15.4:kernel-64kb-livepatch-devel-5.14.21-150400.24.21.2.aarch64",
            "openSUSE Leap 15.4:kernel-64kb-optional-5.14.21-150400.24.21.2.aarch64",
            "openSUSE Leap 15.4:kernel-debug-5.14.21-150400.24.21.2.ppc64le",
            "openSUSE Leap 15.4:kernel-debug-5.14.21-150400.24.21.2.x86_64",
            "openSUSE Leap 15.4:kernel-debug-devel-5.14.21-150400.24.21.2.ppc64le",
            "openSUSE Leap 15.4:kernel-debug-devel-5.14.21-150400.24.21.2.x86_64",
            "openSUSE Leap 15.4:kernel-debug-livepatch-devel-5.14.21-150400.24.21.2.ppc64le",
            "openSUSE Leap 15.4:kernel-debug-livepatch-devel-5.14.21-150400.24.21.2.x86_64",
            "openSUSE Leap 15.4:kernel-default-5.14.21-150400.24.21.2.aarch64",
            "openSUSE Leap 15.4:kernel-default-5.14.21-150400.24.21.2.ppc64le",
            "openSUSE Leap 15.4:kernel-default-5.14.21-150400.24.21.2.s390x",
            "openSUSE Leap 15.4:kernel-default-5.14.21-150400.24.21.2.x86_64",
            "openSUSE Leap 15.4:kernel-default-base-5.14.21-150400.24.21.2.150400.24.7.2.aarch64",
            "openSUSE Leap 15.4:kernel-default-base-5.14.21-150400.24.21.2.150400.24.7.2.ppc64le",
            "openSUSE Leap 15.4:kernel-default-base-5.14.21-150400.24.21.2.150400.24.7.2.s390x",
            "openSUSE Leap 15.4:kernel-default-base-5.14.21-150400.24.21.2.150400.24.7.2.x86_64",
            "openSUSE Leap 15.4:kernel-default-base-rebuild-5.14.21-150400.24.21.2.150400.24.7.2.aarch64",
            "openSUSE Leap 15.4:kernel-default-base-rebuild-5.14.21-150400.24.21.2.150400.24.7.2.ppc64le",
            "openSUSE Leap 15.4:kernel-default-base-rebuild-5.14.21-150400.24.21.2.150400.24.7.2.s390x",
            "openSUSE Leap 15.4:kernel-default-base-rebuild-5.14.21-150400.24.21.2.150400.24.7.2.x86_64",
            "openSUSE Leap 15.4:kernel-default-devel-5.14.21-150400.24.21.2.aarch64",
            "openSUSE Leap 15.4:kernel-default-devel-5.14.21-150400.24.21.2.ppc64le",
            "openSUSE Leap 15.4:kernel-default-devel-5.14.21-150400.24.21.2.s390x",
            "openSUSE Leap 15.4:kernel-default-devel-5.14.21-150400.24.21.2.x86_64",
            "openSUSE Leap 15.4:kernel-default-extra-5.14.21-150400.24.21.2.aarch64",
            "openSUSE Leap 15.4:kernel-default-extra-5.14.21-150400.24.21.2.ppc64le",
            "openSUSE Leap 15.4:kernel-default-extra-5.14.21-150400.24.21.2.s390x",
            "openSUSE Leap 15.4:kernel-default-extra-5.14.21-150400.24.21.2.x86_64",
            "openSUSE Leap 15.4:kernel-default-livepatch-5.14.21-150400.24.21.2.aarch64",
            "openSUSE Leap 15.4:kernel-default-livepatch-5.14.21-150400.24.21.2.ppc64le",
            "openSUSE Leap 15.4:kernel-default-livepatch-5.14.21-150400.24.21.2.s390x",
            "openSUSE Leap 15.4:kernel-default-livepatch-5.14.21-150400.24.21.2.x86_64",
            "openSUSE Leap 15.4:kernel-default-livepatch-devel-5.14.21-150400.24.21.2.aarch64",
            "openSUSE Leap 15.4:kernel-default-livepatch-devel-5.14.21-150400.24.21.2.ppc64le",
            "openSUSE Leap 15.4:kernel-default-livepatch-devel-5.14.21-150400.24.21.2.s390x",
            "openSUSE Leap 15.4:kernel-default-livepatch-devel-5.14.21-150400.24.21.2.x86_64",
            "openSUSE Leap 15.4:kernel-default-optional-5.14.21-150400.24.21.2.aarch64",
            "openSUSE Leap 15.4:kernel-default-optional-5.14.21-150400.24.21.2.ppc64le",
            "openSUSE Leap 15.4:kernel-default-optional-5.14.21-150400.24.21.2.s390x",
            "openSUSE Leap 15.4:kernel-default-optional-5.14.21-150400.24.21.2.x86_64",
            "openSUSE Leap 15.4:kernel-devel-5.14.21-150400.24.21.2.noarch",
            "openSUSE Leap 15.4:kernel-docs-5.14.21-150400.24.21.3.noarch",
            "openSUSE Leap 15.4:kernel-docs-html-5.14.21-150400.24.21.3.noarch",
            "openSUSE Leap 15.4:kernel-kvmsmall-5.14.21-150400.24.21.2.aarch64",
            "openSUSE Leap 15.4:kernel-kvmsmall-5.14.21-150400.24.21.2.ppc64le",
            "openSUSE Leap 15.4:kernel-kvmsmall-5.14.21-150400.24.21.2.x86_64",
            "openSUSE Leap 15.4:kernel-kvmsmall-devel-5.14.21-150400.24.21.2.aarch64",
            "openSUSE Leap 15.4:kernel-kvmsmall-devel-5.14.21-150400.24.21.2.ppc64le",
            "openSUSE Leap 15.4:kernel-kvmsmall-devel-5.14.21-150400.24.21.2.x86_64",
            "openSUSE Leap 15.4:kernel-kvmsmall-livepatch-devel-5.14.21-150400.24.21.2.aarch64",
            "openSUSE Leap 15.4:kernel-kvmsmall-livepatch-devel-5.14.21-150400.24.21.2.ppc64le",
            "openSUSE Leap 15.4:kernel-kvmsmall-livepatch-devel-5.14.21-150400.24.21.2.x86_64",
            "openSUSE Leap 15.4:kernel-macros-5.14.21-150400.24.21.2.noarch",
            "openSUSE Leap 15.4:kernel-obs-build-5.14.21-150400.24.21.2.aarch64",
            "openSUSE Leap 15.4:kernel-obs-build-5.14.21-150400.24.21.2.ppc64le",
            "openSUSE Leap 15.4:kernel-obs-build-5.14.21-150400.24.21.2.s390x",
            "openSUSE Leap 15.4:kernel-obs-build-5.14.21-150400.24.21.2.x86_64",
            "openSUSE Leap 15.4:kernel-obs-qa-5.14.21-150400.24.21.1.aarch64",
            "openSUSE Leap 15.4:kernel-obs-qa-5.14.21-150400.24.21.1.ppc64le",
            "openSUSE Leap 15.4:kernel-obs-qa-5.14.21-150400.24.21.1.s390x",
            "openSUSE Leap 15.4:kernel-obs-qa-5.14.21-150400.24.21.1.x86_64",
            "openSUSE Leap 15.4:kernel-source-5.14.21-150400.24.21.2.noarch",
            "openSUSE Leap 15.4:kernel-source-vanilla-5.14.21-150400.24.21.2.noarch",
            "openSUSE Leap 15.4:kernel-syms-5.14.21-150400.24.21.1.aarch64",
            "openSUSE Leap 15.4:kernel-syms-5.14.21-150400.24.21.1.ppc64le",
            "openSUSE Leap 15.4:kernel-syms-5.14.21-150400.24.21.1.s390x",
            "openSUSE Leap 15.4:kernel-syms-5.14.21-150400.24.21.1.x86_64",
            "openSUSE Leap 15.4:kernel-zfcpdump-5.14.21-150400.24.21.2.s390x",
            "openSUSE Leap 15.4:kselftests-kmp-64kb-5.14.21-150400.24.21.2.aarch64",
            "openSUSE Leap 15.4:kselftests-kmp-default-5.14.21-150400.24.21.2.aarch64",
            "openSUSE Leap 15.4:kselftests-kmp-default-5.14.21-150400.24.21.2.ppc64le",
            "openSUSE Leap 15.4:kselftests-kmp-default-5.14.21-150400.24.21.2.s390x",
            "openSUSE Leap 15.4:kselftests-kmp-default-5.14.21-150400.24.21.2.x86_64",
            "openSUSE Leap 15.4:ocfs2-kmp-64kb-5.14.21-150400.24.21.2.aarch64",
            "openSUSE Leap 15.4:ocfs2-kmp-default-5.14.21-150400.24.21.2.aarch64",
            "openSUSE Leap 15.4:ocfs2-kmp-default-5.14.21-150400.24.21.2.ppc64le",
            "openSUSE Leap 15.4:ocfs2-kmp-default-5.14.21-150400.24.21.2.s390x",
            "openSUSE Leap 15.4:ocfs2-kmp-default-5.14.21-150400.24.21.2.x86_64",
            "openSUSE Leap 15.4:reiserfs-kmp-64kb-5.14.21-150400.24.21.2.aarch64",
            "openSUSE Leap 15.4:reiserfs-kmp-default-5.14.21-150400.24.21.2.aarch64",
            "openSUSE Leap 15.4:reiserfs-kmp-default-5.14.21-150400.24.21.2.ppc64le",
            "openSUSE Leap 15.4:reiserfs-kmp-default-5.14.21-150400.24.21.2.s390x",
            "openSUSE Leap 15.4:reiserfs-kmp-default-5.14.21-150400.24.21.2.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 5.5,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
            "version": "3.1"
          },
          "products": [
            "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.21.2.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.21.2.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.21.2.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.21.2.x86_64",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.21.2.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.21.2.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.21.2.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.21.2.x86_64",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.21.2.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.21.2.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.21.2.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.21.2.x86_64",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.21.2.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.21.2.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.21.2.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.21.2.x86_64",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.21.2.ppc64le",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.21.2.s390x",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.21.2.x86_64",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.21.2.ppc64le",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.21.2.s390x",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.21.2.x86_64",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_21-default-1-150400.9.3.2.ppc64le",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_21-default-1-150400.9.3.2.s390x",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_21-default-1-150400.9.3.2.x86_64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-64kb-5.14.21-150400.24.21.2.aarch64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-64kb-devel-5.14.21-150400.24.21.2.aarch64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-5.14.21-150400.24.21.2.aarch64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-5.14.21-150400.24.21.2.ppc64le",
            "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-5.14.21-150400.24.21.2.s390x",
            "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-5.14.21-150400.24.21.2.x86_64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-base-5.14.21-150400.24.21.2.150400.24.7.2.aarch64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-base-5.14.21-150400.24.21.2.150400.24.7.2.ppc64le",
            "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-base-5.14.21-150400.24.21.2.150400.24.7.2.s390x",
            "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-base-5.14.21-150400.24.21.2.150400.24.7.2.x86_64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-devel-5.14.21-150400.24.21.2.aarch64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-devel-5.14.21-150400.24.21.2.ppc64le",
            "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-devel-5.14.21-150400.24.21.2.s390x",
            "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-devel-5.14.21-150400.24.21.2.x86_64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-devel-5.14.21-150400.24.21.2.noarch",
            "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-macros-5.14.21-150400.24.21.2.noarch",
            "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-zfcpdump-5.14.21-150400.24.21.2.s390x",
            "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-docs-5.14.21-150400.24.21.3.noarch",
            "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-obs-build-5.14.21-150400.24.21.2.aarch64",
            "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-obs-build-5.14.21-150400.24.21.2.ppc64le",
            "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-obs-build-5.14.21-150400.24.21.2.s390x",
            "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-obs-build-5.14.21-150400.24.21.2.x86_64",
            "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-source-5.14.21-150400.24.21.2.noarch",
            "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-syms-5.14.21-150400.24.21.1.aarch64",
            "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-syms-5.14.21-150400.24.21.1.ppc64le",
            "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-syms-5.14.21-150400.24.21.1.s390x",
            "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-syms-5.14.21-150400.24.21.1.x86_64",
            "SUSE Linux Enterprise Module for Legacy 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.21.2.aarch64",
            "SUSE Linux Enterprise Module for Legacy 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.21.2.ppc64le",
            "SUSE Linux Enterprise Module for Legacy 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.21.2.s390x",
            "SUSE Linux Enterprise Module for Legacy 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.21.2.x86_64",
            "SUSE Linux Enterprise Workstation Extension 15 SP4:kernel-default-extra-5.14.21-150400.24.21.2.x86_64",
            "openSUSE Leap 15.4:cluster-md-kmp-64kb-5.14.21-150400.24.21.2.aarch64",
            "openSUSE Leap 15.4:cluster-md-kmp-default-5.14.21-150400.24.21.2.aarch64",
            "openSUSE Leap 15.4:cluster-md-kmp-default-5.14.21-150400.24.21.2.ppc64le",
            "openSUSE Leap 15.4:cluster-md-kmp-default-5.14.21-150400.24.21.2.s390x",
            "openSUSE Leap 15.4:cluster-md-kmp-default-5.14.21-150400.24.21.2.x86_64",
            "openSUSE Leap 15.4:dlm-kmp-64kb-5.14.21-150400.24.21.2.aarch64",
            "openSUSE Leap 15.4:dlm-kmp-default-5.14.21-150400.24.21.2.aarch64",
            "openSUSE Leap 15.4:dlm-kmp-default-5.14.21-150400.24.21.2.ppc64le",
            "openSUSE Leap 15.4:dlm-kmp-default-5.14.21-150400.24.21.2.s390x",
            "openSUSE Leap 15.4:dlm-kmp-default-5.14.21-150400.24.21.2.x86_64",
            "openSUSE Leap 15.4:dtb-allwinner-5.14.21-150400.24.21.1.aarch64",
            "openSUSE Leap 15.4:dtb-altera-5.14.21-150400.24.21.1.aarch64",
            "openSUSE Leap 15.4:dtb-amazon-5.14.21-150400.24.21.1.aarch64",
            "openSUSE Leap 15.4:dtb-amd-5.14.21-150400.24.21.1.aarch64",
            "openSUSE Leap 15.4:dtb-amlogic-5.14.21-150400.24.21.1.aarch64",
            "openSUSE Leap 15.4:dtb-apm-5.14.21-150400.24.21.1.aarch64",
            "openSUSE Leap 15.4:dtb-apple-5.14.21-150400.24.21.1.aarch64",
            "openSUSE Leap 15.4:dtb-arm-5.14.21-150400.24.21.1.aarch64",
            "openSUSE Leap 15.4:dtb-broadcom-5.14.21-150400.24.21.1.aarch64",
            "openSUSE Leap 15.4:dtb-cavium-5.14.21-150400.24.21.1.aarch64",
            "openSUSE Leap 15.4:dtb-exynos-5.14.21-150400.24.21.1.aarch64",
            "openSUSE Leap 15.4:dtb-freescale-5.14.21-150400.24.21.1.aarch64",
            "openSUSE Leap 15.4:dtb-hisilicon-5.14.21-150400.24.21.1.aarch64",
            "openSUSE Leap 15.4:dtb-lg-5.14.21-150400.24.21.1.aarch64",
            "openSUSE Leap 15.4:dtb-marvell-5.14.21-150400.24.21.1.aarch64",
            "openSUSE Leap 15.4:dtb-mediatek-5.14.21-150400.24.21.1.aarch64",
            "openSUSE Leap 15.4:dtb-nvidia-5.14.21-150400.24.21.1.aarch64",
            "openSUSE Leap 15.4:dtb-qcom-5.14.21-150400.24.21.1.aarch64",
            "openSUSE Leap 15.4:dtb-renesas-5.14.21-150400.24.21.1.aarch64",
            "openSUSE Leap 15.4:dtb-rockchip-5.14.21-150400.24.21.1.aarch64",
            "openSUSE Leap 15.4:dtb-socionext-5.14.21-150400.24.21.1.aarch64",
            "openSUSE Leap 15.4:dtb-sprd-5.14.21-150400.24.21.1.aarch64",
            "openSUSE Leap 15.4:dtb-xilinx-5.14.21-150400.24.21.1.aarch64",
            "openSUSE Leap 15.4:gfs2-kmp-64kb-5.14.21-150400.24.21.2.aarch64",
            "openSUSE Leap 15.4:gfs2-kmp-default-5.14.21-150400.24.21.2.aarch64",
            "openSUSE Leap 15.4:gfs2-kmp-default-5.14.21-150400.24.21.2.ppc64le",
            "openSUSE Leap 15.4:gfs2-kmp-default-5.14.21-150400.24.21.2.s390x",
            "openSUSE Leap 15.4:gfs2-kmp-default-5.14.21-150400.24.21.2.x86_64",
            "openSUSE Leap 15.4:kernel-64kb-5.14.21-150400.24.21.2.aarch64",
            "openSUSE Leap 15.4:kernel-64kb-devel-5.14.21-150400.24.21.2.aarch64",
            "openSUSE Leap 15.4:kernel-64kb-extra-5.14.21-150400.24.21.2.aarch64",
            "openSUSE Leap 15.4:kernel-64kb-livepatch-devel-5.14.21-150400.24.21.2.aarch64",
            "openSUSE Leap 15.4:kernel-64kb-optional-5.14.21-150400.24.21.2.aarch64",
            "openSUSE Leap 15.4:kernel-debug-5.14.21-150400.24.21.2.ppc64le",
            "openSUSE Leap 15.4:kernel-debug-5.14.21-150400.24.21.2.x86_64",
            "openSUSE Leap 15.4:kernel-debug-devel-5.14.21-150400.24.21.2.ppc64le",
            "openSUSE Leap 15.4:kernel-debug-devel-5.14.21-150400.24.21.2.x86_64",
            "openSUSE Leap 15.4:kernel-debug-livepatch-devel-5.14.21-150400.24.21.2.ppc64le",
            "openSUSE Leap 15.4:kernel-debug-livepatch-devel-5.14.21-150400.24.21.2.x86_64",
            "openSUSE Leap 15.4:kernel-default-5.14.21-150400.24.21.2.aarch64",
            "openSUSE Leap 15.4:kernel-default-5.14.21-150400.24.21.2.ppc64le",
            "openSUSE Leap 15.4:kernel-default-5.14.21-150400.24.21.2.s390x",
            "openSUSE Leap 15.4:kernel-default-5.14.21-150400.24.21.2.x86_64",
            "openSUSE Leap 15.4:kernel-default-base-5.14.21-150400.24.21.2.150400.24.7.2.aarch64",
            "openSUSE Leap 15.4:kernel-default-base-5.14.21-150400.24.21.2.150400.24.7.2.ppc64le",
            "openSUSE Leap 15.4:kernel-default-base-5.14.21-150400.24.21.2.150400.24.7.2.s390x",
            "openSUSE Leap 15.4:kernel-default-base-5.14.21-150400.24.21.2.150400.24.7.2.x86_64",
            "openSUSE Leap 15.4:kernel-default-base-rebuild-5.14.21-150400.24.21.2.150400.24.7.2.aarch64",
            "openSUSE Leap 15.4:kernel-default-base-rebuild-5.14.21-150400.24.21.2.150400.24.7.2.ppc64le",
            "openSUSE Leap 15.4:kernel-default-base-rebuild-5.14.21-150400.24.21.2.150400.24.7.2.s390x",
            "openSUSE Leap 15.4:kernel-default-base-rebuild-5.14.21-150400.24.21.2.150400.24.7.2.x86_64",
            "openSUSE Leap 15.4:kernel-default-devel-5.14.21-150400.24.21.2.aarch64",
            "openSUSE Leap 15.4:kernel-default-devel-5.14.21-150400.24.21.2.ppc64le",
            "openSUSE Leap 15.4:kernel-default-devel-5.14.21-150400.24.21.2.s390x",
            "openSUSE Leap 15.4:kernel-default-devel-5.14.21-150400.24.21.2.x86_64",
            "openSUSE Leap 15.4:kernel-default-extra-5.14.21-150400.24.21.2.aarch64",
            "openSUSE Leap 15.4:kernel-default-extra-5.14.21-150400.24.21.2.ppc64le",
            "openSUSE Leap 15.4:kernel-default-extra-5.14.21-150400.24.21.2.s390x",
            "openSUSE Leap 15.4:kernel-default-extra-5.14.21-150400.24.21.2.x86_64",
            "openSUSE Leap 15.4:kernel-default-livepatch-5.14.21-150400.24.21.2.aarch64",
            "openSUSE Leap 15.4:kernel-default-livepatch-5.14.21-150400.24.21.2.ppc64le",
            "openSUSE Leap 15.4:kernel-default-livepatch-5.14.21-150400.24.21.2.s390x",
            "openSUSE Leap 15.4:kernel-default-livepatch-5.14.21-150400.24.21.2.x86_64",
            "openSUSE Leap 15.4:kernel-default-livepatch-devel-5.14.21-150400.24.21.2.aarch64",
            "openSUSE Leap 15.4:kernel-default-livepatch-devel-5.14.21-150400.24.21.2.ppc64le",
            "openSUSE Leap 15.4:kernel-default-livepatch-devel-5.14.21-150400.24.21.2.s390x",
            "openSUSE Leap 15.4:kernel-default-livepatch-devel-5.14.21-150400.24.21.2.x86_64",
            "openSUSE Leap 15.4:kernel-default-optional-5.14.21-150400.24.21.2.aarch64",
            "openSUSE Leap 15.4:kernel-default-optional-5.14.21-150400.24.21.2.ppc64le",
            "openSUSE Leap 15.4:kernel-default-optional-5.14.21-150400.24.21.2.s390x",
            "openSUSE Leap 15.4:kernel-default-optional-5.14.21-150400.24.21.2.x86_64",
            "openSUSE Leap 15.4:kernel-devel-5.14.21-150400.24.21.2.noarch",
            "openSUSE Leap 15.4:kernel-docs-5.14.21-150400.24.21.3.noarch",
            "openSUSE Leap 15.4:kernel-docs-html-5.14.21-150400.24.21.3.noarch",
            "openSUSE Leap 15.4:kernel-kvmsmall-5.14.21-150400.24.21.2.aarch64",
            "openSUSE Leap 15.4:kernel-kvmsmall-5.14.21-150400.24.21.2.ppc64le",
            "openSUSE Leap 15.4:kernel-kvmsmall-5.14.21-150400.24.21.2.x86_64",
            "openSUSE Leap 15.4:kernel-kvmsmall-devel-5.14.21-150400.24.21.2.aarch64",
            "openSUSE Leap 15.4:kernel-kvmsmall-devel-5.14.21-150400.24.21.2.ppc64le",
            "openSUSE Leap 15.4:kernel-kvmsmall-devel-5.14.21-150400.24.21.2.x86_64",
            "openSUSE Leap 15.4:kernel-kvmsmall-livepatch-devel-5.14.21-150400.24.21.2.aarch64",
            "openSUSE Leap 15.4:kernel-kvmsmall-livepatch-devel-5.14.21-150400.24.21.2.ppc64le",
            "openSUSE Leap 15.4:kernel-kvmsmall-livepatch-devel-5.14.21-150400.24.21.2.x86_64",
            "openSUSE Leap 15.4:kernel-macros-5.14.21-150400.24.21.2.noarch",
            "openSUSE Leap 15.4:kernel-obs-build-5.14.21-150400.24.21.2.aarch64",
            "openSUSE Leap 15.4:kernel-obs-build-5.14.21-150400.24.21.2.ppc64le",
            "openSUSE Leap 15.4:kernel-obs-build-5.14.21-150400.24.21.2.s390x",
            "openSUSE Leap 15.4:kernel-obs-build-5.14.21-150400.24.21.2.x86_64",
            "openSUSE Leap 15.4:kernel-obs-qa-5.14.21-150400.24.21.1.aarch64",
            "openSUSE Leap 15.4:kernel-obs-qa-5.14.21-150400.24.21.1.ppc64le",
            "openSUSE Leap 15.4:kernel-obs-qa-5.14.21-150400.24.21.1.s390x",
            "openSUSE Leap 15.4:kernel-obs-qa-5.14.21-150400.24.21.1.x86_64",
            "openSUSE Leap 15.4:kernel-source-5.14.21-150400.24.21.2.noarch",
            "openSUSE Leap 15.4:kernel-source-vanilla-5.14.21-150400.24.21.2.noarch",
            "openSUSE Leap 15.4:kernel-syms-5.14.21-150400.24.21.1.aarch64",
            "openSUSE Leap 15.4:kernel-syms-5.14.21-150400.24.21.1.ppc64le",
            "openSUSE Leap 15.4:kernel-syms-5.14.21-150400.24.21.1.s390x",
            "openSUSE Leap 15.4:kernel-syms-5.14.21-150400.24.21.1.x86_64",
            "openSUSE Leap 15.4:kernel-zfcpdump-5.14.21-150400.24.21.2.s390x",
            "openSUSE Leap 15.4:kselftests-kmp-64kb-5.14.21-150400.24.21.2.aarch64",
            "openSUSE Leap 15.4:kselftests-kmp-default-5.14.21-150400.24.21.2.aarch64",
            "openSUSE Leap 15.4:kselftests-kmp-default-5.14.21-150400.24.21.2.ppc64le",
            "openSUSE Leap 15.4:kselftests-kmp-default-5.14.21-150400.24.21.2.s390x",
            "openSUSE Leap 15.4:kselftests-kmp-default-5.14.21-150400.24.21.2.x86_64",
            "openSUSE Leap 15.4:ocfs2-kmp-64kb-5.14.21-150400.24.21.2.aarch64",
            "openSUSE Leap 15.4:ocfs2-kmp-default-5.14.21-150400.24.21.2.aarch64",
            "openSUSE Leap 15.4:ocfs2-kmp-default-5.14.21-150400.24.21.2.ppc64le",
            "openSUSE Leap 15.4:ocfs2-kmp-default-5.14.21-150400.24.21.2.s390x",
            "openSUSE Leap 15.4:ocfs2-kmp-default-5.14.21-150400.24.21.2.x86_64",
            "openSUSE Leap 15.4:reiserfs-kmp-64kb-5.14.21-150400.24.21.2.aarch64",
            "openSUSE Leap 15.4:reiserfs-kmp-default-5.14.21-150400.24.21.2.aarch64",
            "openSUSE Leap 15.4:reiserfs-kmp-default-5.14.21-150400.24.21.2.ppc64le",
            "openSUSE Leap 15.4:reiserfs-kmp-default-5.14.21-150400.24.21.2.s390x",
            "openSUSE Leap 15.4:reiserfs-kmp-default-5.14.21-150400.24.21.2.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2022-09-16T15:30:19Z",
          "details": "moderate"
        }
      ],
      "title": "CVE-2022-28356"
    },
    {
      "cve": "CVE-2022-28693",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2022-28693"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "Unprotected alternative channel of return branch target prediction in some Intel(R) Processors may allow an authorized user to potentially enable information disclosure via local access.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.21.2.aarch64",
          "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.21.2.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.21.2.s390x",
          "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.21.2.x86_64",
          "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.21.2.aarch64",
          "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.21.2.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.21.2.s390x",
          "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.21.2.x86_64",
          "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.21.2.aarch64",
          "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.21.2.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.21.2.s390x",
          "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.21.2.x86_64",
          "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.21.2.aarch64",
          "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.21.2.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.21.2.s390x",
          "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.21.2.x86_64",
          "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.21.2.ppc64le",
          "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.21.2.s390x",
          "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.21.2.x86_64",
          "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.21.2.ppc64le",
          "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.21.2.s390x",
          "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.21.2.x86_64",
          "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_21-default-1-150400.9.3.2.ppc64le",
          "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_21-default-1-150400.9.3.2.s390x",
          "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_21-default-1-150400.9.3.2.x86_64",
          "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-64kb-5.14.21-150400.24.21.2.aarch64",
          "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-64kb-devel-5.14.21-150400.24.21.2.aarch64",
          "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-5.14.21-150400.24.21.2.aarch64",
          "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-5.14.21-150400.24.21.2.ppc64le",
          "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-5.14.21-150400.24.21.2.s390x",
          "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-5.14.21-150400.24.21.2.x86_64",
          "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-base-5.14.21-150400.24.21.2.150400.24.7.2.aarch64",
          "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-base-5.14.21-150400.24.21.2.150400.24.7.2.ppc64le",
          "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-base-5.14.21-150400.24.21.2.150400.24.7.2.s390x",
          "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-base-5.14.21-150400.24.21.2.150400.24.7.2.x86_64",
          "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-devel-5.14.21-150400.24.21.2.aarch64",
          "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-devel-5.14.21-150400.24.21.2.ppc64le",
          "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-devel-5.14.21-150400.24.21.2.s390x",
          "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-devel-5.14.21-150400.24.21.2.x86_64",
          "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-devel-5.14.21-150400.24.21.2.noarch",
          "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-macros-5.14.21-150400.24.21.2.noarch",
          "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-zfcpdump-5.14.21-150400.24.21.2.s390x",
          "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-docs-5.14.21-150400.24.21.3.noarch",
          "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-obs-build-5.14.21-150400.24.21.2.aarch64",
          "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-obs-build-5.14.21-150400.24.21.2.ppc64le",
          "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-obs-build-5.14.21-150400.24.21.2.s390x",
          "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-obs-build-5.14.21-150400.24.21.2.x86_64",
          "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-source-5.14.21-150400.24.21.2.noarch",
          "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-syms-5.14.21-150400.24.21.1.aarch64",
          "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-syms-5.14.21-150400.24.21.1.ppc64le",
          "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-syms-5.14.21-150400.24.21.1.s390x",
          "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-syms-5.14.21-150400.24.21.1.x86_64",
          "SUSE Linux Enterprise Module for Legacy 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.21.2.aarch64",
          "SUSE Linux Enterprise Module for Legacy 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.21.2.ppc64le",
          "SUSE Linux Enterprise Module for Legacy 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.21.2.s390x",
          "SUSE Linux Enterprise Module for Legacy 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.21.2.x86_64",
          "SUSE Linux Enterprise Workstation Extension 15 SP4:kernel-default-extra-5.14.21-150400.24.21.2.x86_64",
          "openSUSE Leap 15.4:cluster-md-kmp-64kb-5.14.21-150400.24.21.2.aarch64",
          "openSUSE Leap 15.4:cluster-md-kmp-default-5.14.21-150400.24.21.2.aarch64",
          "openSUSE Leap 15.4:cluster-md-kmp-default-5.14.21-150400.24.21.2.ppc64le",
          "openSUSE Leap 15.4:cluster-md-kmp-default-5.14.21-150400.24.21.2.s390x",
          "openSUSE Leap 15.4:cluster-md-kmp-default-5.14.21-150400.24.21.2.x86_64",
          "openSUSE Leap 15.4:dlm-kmp-64kb-5.14.21-150400.24.21.2.aarch64",
          "openSUSE Leap 15.4:dlm-kmp-default-5.14.21-150400.24.21.2.aarch64",
          "openSUSE Leap 15.4:dlm-kmp-default-5.14.21-150400.24.21.2.ppc64le",
          "openSUSE Leap 15.4:dlm-kmp-default-5.14.21-150400.24.21.2.s390x",
          "openSUSE Leap 15.4:dlm-kmp-default-5.14.21-150400.24.21.2.x86_64",
          "openSUSE Leap 15.4:dtb-allwinner-5.14.21-150400.24.21.1.aarch64",
          "openSUSE Leap 15.4:dtb-altera-5.14.21-150400.24.21.1.aarch64",
          "openSUSE Leap 15.4:dtb-amazon-5.14.21-150400.24.21.1.aarch64",
          "openSUSE Leap 15.4:dtb-amd-5.14.21-150400.24.21.1.aarch64",
          "openSUSE Leap 15.4:dtb-amlogic-5.14.21-150400.24.21.1.aarch64",
          "openSUSE Leap 15.4:dtb-apm-5.14.21-150400.24.21.1.aarch64",
          "openSUSE Leap 15.4:dtb-apple-5.14.21-150400.24.21.1.aarch64",
          "openSUSE Leap 15.4:dtb-arm-5.14.21-150400.24.21.1.aarch64",
          "openSUSE Leap 15.4:dtb-broadcom-5.14.21-150400.24.21.1.aarch64",
          "openSUSE Leap 15.4:dtb-cavium-5.14.21-150400.24.21.1.aarch64",
          "openSUSE Leap 15.4:dtb-exynos-5.14.21-150400.24.21.1.aarch64",
          "openSUSE Leap 15.4:dtb-freescale-5.14.21-150400.24.21.1.aarch64",
          "openSUSE Leap 15.4:dtb-hisilicon-5.14.21-150400.24.21.1.aarch64",
          "openSUSE Leap 15.4:dtb-lg-5.14.21-150400.24.21.1.aarch64",
          "openSUSE Leap 15.4:dtb-marvell-5.14.21-150400.24.21.1.aarch64",
          "openSUSE Leap 15.4:dtb-mediatek-5.14.21-150400.24.21.1.aarch64",
          "openSUSE Leap 15.4:dtb-nvidia-5.14.21-150400.24.21.1.aarch64",
          "openSUSE Leap 15.4:dtb-qcom-5.14.21-150400.24.21.1.aarch64",
          "openSUSE Leap 15.4:dtb-renesas-5.14.21-150400.24.21.1.aarch64",
          "openSUSE Leap 15.4:dtb-rockchip-5.14.21-150400.24.21.1.aarch64",
          "openSUSE Leap 15.4:dtb-socionext-5.14.21-150400.24.21.1.aarch64",
          "openSUSE Leap 15.4:dtb-sprd-5.14.21-150400.24.21.1.aarch64",
          "openSUSE Leap 15.4:dtb-xilinx-5.14.21-150400.24.21.1.aarch64",
          "openSUSE Leap 15.4:gfs2-kmp-64kb-5.14.21-150400.24.21.2.aarch64",
          "openSUSE Leap 15.4:gfs2-kmp-default-5.14.21-150400.24.21.2.aarch64",
          "openSUSE Leap 15.4:gfs2-kmp-default-5.14.21-150400.24.21.2.ppc64le",
          "openSUSE Leap 15.4:gfs2-kmp-default-5.14.21-150400.24.21.2.s390x",
          "openSUSE Leap 15.4:gfs2-kmp-default-5.14.21-150400.24.21.2.x86_64",
          "openSUSE Leap 15.4:kernel-64kb-5.14.21-150400.24.21.2.aarch64",
          "openSUSE Leap 15.4:kernel-64kb-devel-5.14.21-150400.24.21.2.aarch64",
          "openSUSE Leap 15.4:kernel-64kb-extra-5.14.21-150400.24.21.2.aarch64",
          "openSUSE Leap 15.4:kernel-64kb-livepatch-devel-5.14.21-150400.24.21.2.aarch64",
          "openSUSE Leap 15.4:kernel-64kb-optional-5.14.21-150400.24.21.2.aarch64",
          "openSUSE Leap 15.4:kernel-debug-5.14.21-150400.24.21.2.ppc64le",
          "openSUSE Leap 15.4:kernel-debug-5.14.21-150400.24.21.2.x86_64",
          "openSUSE Leap 15.4:kernel-debug-devel-5.14.21-150400.24.21.2.ppc64le",
          "openSUSE Leap 15.4:kernel-debug-devel-5.14.21-150400.24.21.2.x86_64",
          "openSUSE Leap 15.4:kernel-debug-livepatch-devel-5.14.21-150400.24.21.2.ppc64le",
          "openSUSE Leap 15.4:kernel-debug-livepatch-devel-5.14.21-150400.24.21.2.x86_64",
          "openSUSE Leap 15.4:kernel-default-5.14.21-150400.24.21.2.aarch64",
          "openSUSE Leap 15.4:kernel-default-5.14.21-150400.24.21.2.ppc64le",
          "openSUSE Leap 15.4:kernel-default-5.14.21-150400.24.21.2.s390x",
          "openSUSE Leap 15.4:kernel-default-5.14.21-150400.24.21.2.x86_64",
          "openSUSE Leap 15.4:kernel-default-base-5.14.21-150400.24.21.2.150400.24.7.2.aarch64",
          "openSUSE Leap 15.4:kernel-default-base-5.14.21-150400.24.21.2.150400.24.7.2.ppc64le",
          "openSUSE Leap 15.4:kernel-default-base-5.14.21-150400.24.21.2.150400.24.7.2.s390x",
          "openSUSE Leap 15.4:kernel-default-base-5.14.21-150400.24.21.2.150400.24.7.2.x86_64",
          "openSUSE Leap 15.4:kernel-default-base-rebuild-5.14.21-150400.24.21.2.150400.24.7.2.aarch64",
          "openSUSE Leap 15.4:kernel-default-base-rebuild-5.14.21-150400.24.21.2.150400.24.7.2.ppc64le",
          "openSUSE Leap 15.4:kernel-default-base-rebuild-5.14.21-150400.24.21.2.150400.24.7.2.s390x",
          "openSUSE Leap 15.4:kernel-default-base-rebuild-5.14.21-150400.24.21.2.150400.24.7.2.x86_64",
          "openSUSE Leap 15.4:kernel-default-devel-5.14.21-150400.24.21.2.aarch64",
          "openSUSE Leap 15.4:kernel-default-devel-5.14.21-150400.24.21.2.ppc64le",
          "openSUSE Leap 15.4:kernel-default-devel-5.14.21-150400.24.21.2.s390x",
          "openSUSE Leap 15.4:kernel-default-devel-5.14.21-150400.24.21.2.x86_64",
          "openSUSE Leap 15.4:kernel-default-extra-5.14.21-150400.24.21.2.aarch64",
          "openSUSE Leap 15.4:kernel-default-extra-5.14.21-150400.24.21.2.ppc64le",
          "openSUSE Leap 15.4:kernel-default-extra-5.14.21-150400.24.21.2.s390x",
          "openSUSE Leap 15.4:kernel-default-extra-5.14.21-150400.24.21.2.x86_64",
          "openSUSE Leap 15.4:kernel-default-livepatch-5.14.21-150400.24.21.2.aarch64",
          "openSUSE Leap 15.4:kernel-default-livepatch-5.14.21-150400.24.21.2.ppc64le",
          "openSUSE Leap 15.4:kernel-default-livepatch-5.14.21-150400.24.21.2.s390x",
          "openSUSE Leap 15.4:kernel-default-livepatch-5.14.21-150400.24.21.2.x86_64",
          "openSUSE Leap 15.4:kernel-default-livepatch-devel-5.14.21-150400.24.21.2.aarch64",
          "openSUSE Leap 15.4:kernel-default-livepatch-devel-5.14.21-150400.24.21.2.ppc64le",
          "openSUSE Leap 15.4:kernel-default-livepatch-devel-5.14.21-150400.24.21.2.s390x",
          "openSUSE Leap 15.4:kernel-default-livepatch-devel-5.14.21-150400.24.21.2.x86_64",
          "openSUSE Leap 15.4:kernel-default-optional-5.14.21-150400.24.21.2.aarch64",
          "openSUSE Leap 15.4:kernel-default-optional-5.14.21-150400.24.21.2.ppc64le",
          "openSUSE Leap 15.4:kernel-default-optional-5.14.21-150400.24.21.2.s390x",
          "openSUSE Leap 15.4:kernel-default-optional-5.14.21-150400.24.21.2.x86_64",
          "openSUSE Leap 15.4:kernel-devel-5.14.21-150400.24.21.2.noarch",
          "openSUSE Leap 15.4:kernel-docs-5.14.21-150400.24.21.3.noarch",
          "openSUSE Leap 15.4:kernel-docs-html-5.14.21-150400.24.21.3.noarch",
          "openSUSE Leap 15.4:kernel-kvmsmall-5.14.21-150400.24.21.2.aarch64",
          "openSUSE Leap 15.4:kernel-kvmsmall-5.14.21-150400.24.21.2.ppc64le",
          "openSUSE Leap 15.4:kernel-kvmsmall-5.14.21-150400.24.21.2.x86_64",
          "openSUSE Leap 15.4:kernel-kvmsmall-devel-5.14.21-150400.24.21.2.aarch64",
          "openSUSE Leap 15.4:kernel-kvmsmall-devel-5.14.21-150400.24.21.2.ppc64le",
          "openSUSE Leap 15.4:kernel-kvmsmall-devel-5.14.21-150400.24.21.2.x86_64",
          "openSUSE Leap 15.4:kernel-kvmsmall-livepatch-devel-5.14.21-150400.24.21.2.aarch64",
          "openSUSE Leap 15.4:kernel-kvmsmall-livepatch-devel-5.14.21-150400.24.21.2.ppc64le",
          "openSUSE Leap 15.4:kernel-kvmsmall-livepatch-devel-5.14.21-150400.24.21.2.x86_64",
          "openSUSE Leap 15.4:kernel-macros-5.14.21-150400.24.21.2.noarch",
          "openSUSE Leap 15.4:kernel-obs-build-5.14.21-150400.24.21.2.aarch64",
          "openSUSE Leap 15.4:kernel-obs-build-5.14.21-150400.24.21.2.ppc64le",
          "openSUSE Leap 15.4:kernel-obs-build-5.14.21-150400.24.21.2.s390x",
          "openSUSE Leap 15.4:kernel-obs-build-5.14.21-150400.24.21.2.x86_64",
          "openSUSE Leap 15.4:kernel-obs-qa-5.14.21-150400.24.21.1.aarch64",
          "openSUSE Leap 15.4:kernel-obs-qa-5.14.21-150400.24.21.1.ppc64le",
          "openSUSE Leap 15.4:kernel-obs-qa-5.14.21-150400.24.21.1.s390x",
          "openSUSE Leap 15.4:kernel-obs-qa-5.14.21-150400.24.21.1.x86_64",
          "openSUSE Leap 15.4:kernel-source-5.14.21-150400.24.21.2.noarch",
          "openSUSE Leap 15.4:kernel-source-vanilla-5.14.21-150400.24.21.2.noarch",
          "openSUSE Leap 15.4:kernel-syms-5.14.21-150400.24.21.1.aarch64",
          "openSUSE Leap 15.4:kernel-syms-5.14.21-150400.24.21.1.ppc64le",
          "openSUSE Leap 15.4:kernel-syms-5.14.21-150400.24.21.1.s390x",
          "openSUSE Leap 15.4:kernel-syms-5.14.21-150400.24.21.1.x86_64",
          "openSUSE Leap 15.4:kernel-zfcpdump-5.14.21-150400.24.21.2.s390x",
          "openSUSE Leap 15.4:kselftests-kmp-64kb-5.14.21-150400.24.21.2.aarch64",
          "openSUSE Leap 15.4:kselftests-kmp-default-5.14.21-150400.24.21.2.aarch64",
          "openSUSE Leap 15.4:kselftests-kmp-default-5.14.21-150400.24.21.2.ppc64le",
          "openSUSE Leap 15.4:kselftests-kmp-default-5.14.21-150400.24.21.2.s390x",
          "openSUSE Leap 15.4:kselftests-kmp-default-5.14.21-150400.24.21.2.x86_64",
          "openSUSE Leap 15.4:ocfs2-kmp-64kb-5.14.21-150400.24.21.2.aarch64",
          "openSUSE Leap 15.4:ocfs2-kmp-default-5.14.21-150400.24.21.2.aarch64",
          "openSUSE Leap 15.4:ocfs2-kmp-default-5.14.21-150400.24.21.2.ppc64le",
          "openSUSE Leap 15.4:ocfs2-kmp-default-5.14.21-150400.24.21.2.s390x",
          "openSUSE Leap 15.4:ocfs2-kmp-default-5.14.21-150400.24.21.2.x86_64",
          "openSUSE Leap 15.4:reiserfs-kmp-64kb-5.14.21-150400.24.21.2.aarch64",
          "openSUSE Leap 15.4:reiserfs-kmp-default-5.14.21-150400.24.21.2.aarch64",
          "openSUSE Leap 15.4:reiserfs-kmp-default-5.14.21-150400.24.21.2.ppc64le",
          "openSUSE Leap 15.4:reiserfs-kmp-default-5.14.21-150400.24.21.2.s390x",
          "openSUSE Leap 15.4:reiserfs-kmp-default-5.14.21-150400.24.21.2.x86_64"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2022-28693",
          "url": "https://www.suse.com/security/cve/CVE-2022-28693"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1201455 for CVE-2022-28693",
          "url": "https://bugzilla.suse.com/1201455"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.21.2.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.21.2.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.21.2.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.21.2.x86_64",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.21.2.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.21.2.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.21.2.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.21.2.x86_64",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.21.2.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.21.2.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.21.2.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.21.2.x86_64",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.21.2.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.21.2.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.21.2.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.21.2.x86_64",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.21.2.ppc64le",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.21.2.s390x",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.21.2.x86_64",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.21.2.ppc64le",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.21.2.s390x",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.21.2.x86_64",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_21-default-1-150400.9.3.2.ppc64le",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_21-default-1-150400.9.3.2.s390x",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_21-default-1-150400.9.3.2.x86_64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-64kb-5.14.21-150400.24.21.2.aarch64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-64kb-devel-5.14.21-150400.24.21.2.aarch64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-5.14.21-150400.24.21.2.aarch64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-5.14.21-150400.24.21.2.ppc64le",
            "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-5.14.21-150400.24.21.2.s390x",
            "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-5.14.21-150400.24.21.2.x86_64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-base-5.14.21-150400.24.21.2.150400.24.7.2.aarch64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-base-5.14.21-150400.24.21.2.150400.24.7.2.ppc64le",
            "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-base-5.14.21-150400.24.21.2.150400.24.7.2.s390x",
            "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-base-5.14.21-150400.24.21.2.150400.24.7.2.x86_64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-devel-5.14.21-150400.24.21.2.aarch64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-devel-5.14.21-150400.24.21.2.ppc64le",
            "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-devel-5.14.21-150400.24.21.2.s390x",
            "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-devel-5.14.21-150400.24.21.2.x86_64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-devel-5.14.21-150400.24.21.2.noarch",
            "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-macros-5.14.21-150400.24.21.2.noarch",
            "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-zfcpdump-5.14.21-150400.24.21.2.s390x",
            "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-docs-5.14.21-150400.24.21.3.noarch",
            "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-obs-build-5.14.21-150400.24.21.2.aarch64",
            "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-obs-build-5.14.21-150400.24.21.2.ppc64le",
            "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-obs-build-5.14.21-150400.24.21.2.s390x",
            "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-obs-build-5.14.21-150400.24.21.2.x86_64",
            "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-source-5.14.21-150400.24.21.2.noarch",
            "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-syms-5.14.21-150400.24.21.1.aarch64",
            "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-syms-5.14.21-150400.24.21.1.ppc64le",
            "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-syms-5.14.21-150400.24.21.1.s390x",
            "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-syms-5.14.21-150400.24.21.1.x86_64",
            "SUSE Linux Enterprise Module for Legacy 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.21.2.aarch64",
            "SUSE Linux Enterprise Module for Legacy 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.21.2.ppc64le",
            "SUSE Linux Enterprise Module for Legacy 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.21.2.s390x",
            "SUSE Linux Enterprise Module for Legacy 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.21.2.x86_64",
            "SUSE Linux Enterprise Workstation Extension 15 SP4:kernel-default-extra-5.14.21-150400.24.21.2.x86_64",
            "openSUSE Leap 15.4:cluster-md-kmp-64kb-5.14.21-150400.24.21.2.aarch64",
            "openSUSE Leap 15.4:cluster-md-kmp-default-5.14.21-150400.24.21.2.aarch64",
            "openSUSE Leap 15.4:cluster-md-kmp-default-5.14.21-150400.24.21.2.ppc64le",
            "openSUSE Leap 15.4:cluster-md-kmp-default-5.14.21-150400.24.21.2.s390x",
            "openSUSE Leap 15.4:cluster-md-kmp-default-5.14.21-150400.24.21.2.x86_64",
            "openSUSE Leap 15.4:dlm-kmp-64kb-5.14.21-150400.24.21.2.aarch64",
            "openSUSE Leap 15.4:dlm-kmp-default-5.14.21-150400.24.21.2.aarch64",
            "openSUSE Leap 15.4:dlm-kmp-default-5.14.21-150400.24.21.2.ppc64le",
            "openSUSE Leap 15.4:dlm-kmp-default-5.14.21-150400.24.21.2.s390x",
            "openSUSE Leap 15.4:dlm-kmp-default-5.14.21-150400.24.21.2.x86_64",
            "openSUSE Leap 15.4:dtb-allwinner-5.14.21-150400.24.21.1.aarch64",
            "openSUSE Leap 15.4:dtb-altera-5.14.21-150400.24.21.1.aarch64",
            "openSUSE Leap 15.4:dtb-amazon-5.14.21-150400.24.21.1.aarch64",
            "openSUSE Leap 15.4:dtb-amd-5.14.21-150400.24.21.1.aarch64",
            "openSUSE Leap 15.4:dtb-amlogic-5.14.21-150400.24.21.1.aarch64",
            "openSUSE Leap 15.4:dtb-apm-5.14.21-150400.24.21.1.aarch64",
            "openSUSE Leap 15.4:dtb-apple-5.14.21-150400.24.21.1.aarch64",
            "openSUSE Leap 15.4:dtb-arm-5.14.21-150400.24.21.1.aarch64",
            "openSUSE Leap 15.4:dtb-broadcom-5.14.21-150400.24.21.1.aarch64",
            "openSUSE Leap 15.4:dtb-cavium-5.14.21-150400.24.21.1.aarch64",
            "openSUSE Leap 15.4:dtb-exynos-5.14.21-150400.24.21.1.aarch64",
            "openSUSE Leap 15.4:dtb-freescale-5.14.21-150400.24.21.1.aarch64",
            "openSUSE Leap 15.4:dtb-hisilicon-5.14.21-150400.24.21.1.aarch64",
            "openSUSE Leap 15.4:dtb-lg-5.14.21-150400.24.21.1.aarch64",
            "openSUSE Leap 15.4:dtb-marvell-5.14.21-150400.24.21.1.aarch64",
            "openSUSE Leap 15.4:dtb-mediatek-5.14.21-150400.24.21.1.aarch64",
            "openSUSE Leap 15.4:dtb-nvidia-5.14.21-150400.24.21.1.aarch64",
            "openSUSE Leap 15.4:dtb-qcom-5.14.21-150400.24.21.1.aarch64",
            "openSUSE Leap 15.4:dtb-renesas-5.14.21-150400.24.21.1.aarch64",
            "openSUSE Leap 15.4:dtb-rockchip-5.14.21-150400.24.21.1.aarch64",
            "openSUSE Leap 15.4:dtb-socionext-5.14.21-150400.24.21.1.aarch64",
            "openSUSE Leap 15.4:dtb-sprd-5.14.21-150400.24.21.1.aarch64",
            "openSUSE Leap 15.4:dtb-xilinx-5.14.21-150400.24.21.1.aarch64",
            "openSUSE Leap 15.4:gfs2-kmp-64kb-5.14.21-150400.24.21.2.aarch64",
            "openSUSE Leap 15.4:gfs2-kmp-default-5.14.21-150400.24.21.2.aarch64",
            "openSUSE Leap 15.4:gfs2-kmp-default-5.14.21-150400.24.21.2.ppc64le",
            "openSUSE Leap 15.4:gfs2-kmp-default-5.14.21-150400.24.21.2.s390x",
            "openSUSE Leap 15.4:gfs2-kmp-default-5.14.21-150400.24.21.2.x86_64",
            "openSUSE Leap 15.4:kernel-64kb-5.14.21-150400.24.21.2.aarch64",
            "openSUSE Leap 15.4:kernel-64kb-devel-5.14.21-150400.24.21.2.aarch64",
            "openSUSE Leap 15.4:kernel-64kb-extra-5.14.21-150400.24.21.2.aarch64",
            "openSUSE Leap 15.4:kernel-64kb-livepatch-devel-5.14.21-150400.24.21.2.aarch64",
            "openSUSE Leap 15.4:kernel-64kb-optional-5.14.21-150400.24.21.2.aarch64",
            "openSUSE Leap 15.4:kernel-debug-5.14.21-150400.24.21.2.ppc64le",
            "openSUSE Leap 15.4:kernel-debug-5.14.21-150400.24.21.2.x86_64",
            "openSUSE Leap 15.4:kernel-debug-devel-5.14.21-150400.24.21.2.ppc64le",
            "openSUSE Leap 15.4:kernel-debug-devel-5.14.21-150400.24.21.2.x86_64",
            "openSUSE Leap 15.4:kernel-debug-livepatch-devel-5.14.21-150400.24.21.2.ppc64le",
            "openSUSE Leap 15.4:kernel-debug-livepatch-devel-5.14.21-150400.24.21.2.x86_64",
            "openSUSE Leap 15.4:kernel-default-5.14.21-150400.24.21.2.aarch64",
            "openSUSE Leap 15.4:kernel-default-5.14.21-150400.24.21.2.ppc64le",
            "openSUSE Leap 15.4:kernel-default-5.14.21-150400.24.21.2.s390x",
            "openSUSE Leap 15.4:kernel-default-5.14.21-150400.24.21.2.x86_64",
            "openSUSE Leap 15.4:kernel-default-base-5.14.21-150400.24.21.2.150400.24.7.2.aarch64",
            "openSUSE Leap 15.4:kernel-default-base-5.14.21-150400.24.21.2.150400.24.7.2.ppc64le",
            "openSUSE Leap 15.4:kernel-default-base-5.14.21-150400.24.21.2.150400.24.7.2.s390x",
            "openSUSE Leap 15.4:kernel-default-base-5.14.21-150400.24.21.2.150400.24.7.2.x86_64",
            "openSUSE Leap 15.4:kernel-default-base-rebuild-5.14.21-150400.24.21.2.150400.24.7.2.aarch64",
            "openSUSE Leap 15.4:kernel-default-base-rebuild-5.14.21-150400.24.21.2.150400.24.7.2.ppc64le",
            "openSUSE Leap 15.4:kernel-default-base-rebuild-5.14.21-150400.24.21.2.150400.24.7.2.s390x",
            "openSUSE Leap 15.4:kernel-default-base-rebuild-5.14.21-150400.24.21.2.150400.24.7.2.x86_64",
            "openSUSE Leap 15.4:kernel-default-devel-5.14.21-150400.24.21.2.aarch64",
            "openSUSE Leap 15.4:kernel-default-devel-5.14.21-150400.24.21.2.ppc64le",
            "openSUSE Leap 15.4:kernel-default-devel-5.14.21-150400.24.21.2.s390x",
            "openSUSE Leap 15.4:kernel-default-devel-5.14.21-150400.24.21.2.x86_64",
            "openSUSE Leap 15.4:kernel-default-extra-5.14.21-150400.24.21.2.aarch64",
            "openSUSE Leap 15.4:kernel-default-extra-5.14.21-150400.24.21.2.ppc64le",
            "openSUSE Leap 15.4:kernel-default-extra-5.14.21-150400.24.21.2.s390x",
            "openSUSE Leap 15.4:kernel-default-extra-5.14.21-150400.24.21.2.x86_64",
            "openSUSE Leap 15.4:kernel-default-livepatch-5.14.21-150400.24.21.2.aarch64",
            "openSUSE Leap 15.4:kernel-default-livepatch-5.14.21-150400.24.21.2.ppc64le",
            "openSUSE Leap 15.4:kernel-default-livepatch-5.14.21-150400.24.21.2.s390x",
            "openSUSE Leap 15.4:kernel-default-livepatch-5.14.21-150400.24.21.2.x86_64",
            "openSUSE Leap 15.4:kernel-default-livepatch-devel-5.14.21-150400.24.21.2.aarch64",
            "openSUSE Leap 15.4:kernel-default-livepatch-devel-5.14.21-150400.24.21.2.ppc64le",
            "openSUSE Leap 15.4:kernel-default-livepatch-devel-5.14.21-150400.24.21.2.s390x",
            "openSUSE Leap 15.4:kernel-default-livepatch-devel-5.14.21-150400.24.21.2.x86_64",
            "openSUSE Leap 15.4:kernel-default-optional-5.14.21-150400.24.21.2.aarch64",
            "openSUSE Leap 15.4:kernel-default-optional-5.14.21-150400.24.21.2.ppc64le",
            "openSUSE Leap 15.4:kernel-default-optional-5.14.21-150400.24.21.2.s390x",
            "openSUSE Leap 15.4:kernel-default-optional-5.14.21-150400.24.21.2.x86_64",
            "openSUSE Leap 15.4:kernel-devel-5.14.21-150400.24.21.2.noarch",
            "openSUSE Leap 15.4:kernel-docs-5.14.21-150400.24.21.3.noarch",
            "openSUSE Leap 15.4:kernel-docs-html-5.14.21-150400.24.21.3.noarch",
            "openSUSE Leap 15.4:kernel-kvmsmall-5.14.21-150400.24.21.2.aarch64",
            "openSUSE Leap 15.4:kernel-kvmsmall-5.14.21-150400.24.21.2.ppc64le",
            "openSUSE Leap 15.4:kernel-kvmsmall-5.14.21-150400.24.21.2.x86_64",
            "openSUSE Leap 15.4:kernel-kvmsmall-devel-5.14.21-150400.24.21.2.aarch64",
            "openSUSE Leap 15.4:kernel-kvmsmall-devel-5.14.21-150400.24.21.2.ppc64le",
            "openSUSE Leap 15.4:kernel-kvmsmall-devel-5.14.21-150400.24.21.2.x86_64",
            "openSUSE Leap 15.4:kernel-kvmsmall-livepatch-devel-5.14.21-150400.24.21.2.aarch64",
            "openSUSE Leap 15.4:kernel-kvmsmall-livepatch-devel-5.14.21-150400.24.21.2.ppc64le",
            "openSUSE Leap 15.4:kernel-kvmsmall-livepatch-devel-5.14.21-150400.24.21.2.x86_64",
            "openSUSE Leap 15.4:kernel-macros-5.14.21-150400.24.21.2.noarch",
            "openSUSE Leap 15.4:kernel-obs-build-5.14.21-150400.24.21.2.aarch64",
            "openSUSE Leap 15.4:kernel-obs-build-5.14.21-150400.24.21.2.ppc64le",
            "openSUSE Leap 15.4:kernel-obs-build-5.14.21-150400.24.21.2.s390x",
            "openSUSE Leap 15.4:kernel-obs-build-5.14.21-150400.24.21.2.x86_64",
            "openSUSE Leap 15.4:kernel-obs-qa-5.14.21-150400.24.21.1.aarch64",
            "openSUSE Leap 15.4:kernel-obs-qa-5.14.21-150400.24.21.1.ppc64le",
            "openSUSE Leap 15.4:kernel-obs-qa-5.14.21-150400.24.21.1.s390x",
            "openSUSE Leap 15.4:kernel-obs-qa-5.14.21-150400.24.21.1.x86_64",
            "openSUSE Leap 15.4:kernel-source-5.14.21-150400.24.21.2.noarch",
            "openSUSE Leap 15.4:kernel-source-vanilla-5.14.21-150400.24.21.2.noarch",
            "openSUSE Leap 15.4:kernel-syms-5.14.21-150400.24.21.1.aarch64",
            "openSUSE Leap 15.4:kernel-syms-5.14.21-150400.24.21.1.ppc64le",
            "openSUSE Leap 15.4:kernel-syms-5.14.21-150400.24.21.1.s390x",
            "openSUSE Leap 15.4:kernel-syms-5.14.21-150400.24.21.1.x86_64",
            "openSUSE Leap 15.4:kernel-zfcpdump-5.14.21-150400.24.21.2.s390x",
            "openSUSE Leap 15.4:kselftests-kmp-64kb-5.14.21-150400.24.21.2.aarch64",
            "openSUSE Leap 15.4:kselftests-kmp-default-5.14.21-150400.24.21.2.aarch64",
            "openSUSE Leap 15.4:kselftests-kmp-default-5.14.21-150400.24.21.2.ppc64le",
            "openSUSE Leap 15.4:kselftests-kmp-default-5.14.21-150400.24.21.2.s390x",
            "openSUSE Leap 15.4:kselftests-kmp-default-5.14.21-150400.24.21.2.x86_64",
            "openSUSE Leap 15.4:ocfs2-kmp-64kb-5.14.21-150400.24.21.2.aarch64",
            "openSUSE Leap 15.4:ocfs2-kmp-default-5.14.21-150400.24.21.2.aarch64",
            "openSUSE Leap 15.4:ocfs2-kmp-default-5.14.21-150400.24.21.2.ppc64le",
            "openSUSE Leap 15.4:ocfs2-kmp-default-5.14.21-150400.24.21.2.s390x",
            "openSUSE Leap 15.4:ocfs2-kmp-default-5.14.21-150400.24.21.2.x86_64",
            "openSUSE Leap 15.4:reiserfs-kmp-64kb-5.14.21-150400.24.21.2.aarch64",
            "openSUSE Leap 15.4:reiserfs-kmp-default-5.14.21-150400.24.21.2.aarch64",
            "openSUSE Leap 15.4:reiserfs-kmp-default-5.14.21-150400.24.21.2.ppc64le",
            "openSUSE Leap 15.4:reiserfs-kmp-default-5.14.21-150400.24.21.2.s390x",
            "openSUSE Leap 15.4:reiserfs-kmp-default-5.14.21-150400.24.21.2.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 4.7,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:N/A:N",
            "version": "3.1"
          },
          "products": [
            "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.21.2.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.21.2.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.21.2.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.21.2.x86_64",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.21.2.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.21.2.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.21.2.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.21.2.x86_64",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.21.2.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.21.2.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.21.2.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.21.2.x86_64",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.21.2.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.21.2.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.21.2.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.21.2.x86_64",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.21.2.ppc64le",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.21.2.s390x",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.21.2.x86_64",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.21.2.ppc64le",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.21.2.s390x",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.21.2.x86_64",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_21-default-1-150400.9.3.2.ppc64le",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_21-default-1-150400.9.3.2.s390x",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_21-default-1-150400.9.3.2.x86_64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-64kb-5.14.21-150400.24.21.2.aarch64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-64kb-devel-5.14.21-150400.24.21.2.aarch64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-5.14.21-150400.24.21.2.aarch64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-5.14.21-150400.24.21.2.ppc64le",
            "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-5.14.21-150400.24.21.2.s390x",
            "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-5.14.21-150400.24.21.2.x86_64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-base-5.14.21-150400.24.21.2.150400.24.7.2.aarch64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-base-5.14.21-150400.24.21.2.150400.24.7.2.ppc64le",
            "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-base-5.14.21-150400.24.21.2.150400.24.7.2.s390x",
            "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-base-5.14.21-150400.24.21.2.150400.24.7.2.x86_64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-devel-5.14.21-150400.24.21.2.aarch64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-devel-5.14.21-150400.24.21.2.ppc64le",
            "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-devel-5.14.21-150400.24.21.2.s390x",
            "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-devel-5.14.21-150400.24.21.2.x86_64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-devel-5.14.21-150400.24.21.2.noarch",
            "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-macros-5.14.21-150400.24.21.2.noarch",
            "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-zfcpdump-5.14.21-150400.24.21.2.s390x",
            "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-docs-5.14.21-150400.24.21.3.noarch",
            "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-obs-build-5.14.21-150400.24.21.2.aarch64",
            "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-obs-build-5.14.21-150400.24.21.2.ppc64le",
            "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-obs-build-5.14.21-150400.24.21.2.s390x",
            "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-obs-build-5.14.21-150400.24.21.2.x86_64",
            "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-source-5.14.21-150400.24.21.2.noarch",
            "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-syms-5.14.21-150400.24.21.1.aarch64",
            "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-syms-5.14.21-150400.24.21.1.ppc64le",
            "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-syms-5.14.21-150400.24.21.1.s390x",
            "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-syms-5.14.21-150400.24.21.1.x86_64",
            "SUSE Linux Enterprise Module for Legacy 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.21.2.aarch64",
            "SUSE Linux Enterprise Module for Legacy 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.21.2.ppc64le",
            "SUSE Linux Enterprise Module for Legacy 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.21.2.s390x",
            "SUSE Linux Enterprise Module for Legacy 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.21.2.x86_64",
            "SUSE Linux Enterprise Workstation Extension 15 SP4:kernel-default-extra-5.14.21-150400.24.21.2.x86_64",
            "openSUSE Leap 15.4:cluster-md-kmp-64kb-5.14.21-150400.24.21.2.aarch64",
            "openSUSE Leap 15.4:cluster-md-kmp-default-5.14.21-150400.24.21.2.aarch64",
            "openSUSE Leap 15.4:cluster-md-kmp-default-5.14.21-150400.24.21.2.ppc64le",
            "openSUSE Leap 15.4:cluster-md-kmp-default-5.14.21-150400.24.21.2.s390x",
            "openSUSE Leap 15.4:cluster-md-kmp-default-5.14.21-150400.24.21.2.x86_64",
            "openSUSE Leap 15.4:dlm-kmp-64kb-5.14.21-150400.24.21.2.aarch64",
            "openSUSE Leap 15.4:dlm-kmp-default-5.14.21-150400.24.21.2.aarch64",
            "openSUSE Leap 15.4:dlm-kmp-default-5.14.21-150400.24.21.2.ppc64le",
            "openSUSE Leap 15.4:dlm-kmp-default-5.14.21-150400.24.21.2.s390x",
            "openSUSE Leap 15.4:dlm-kmp-default-5.14.21-150400.24.21.2.x86_64",
            "openSUSE Leap 15.4:dtb-allwinner-5.14.21-150400.24.21.1.aarch64",
            "openSUSE Leap 15.4:dtb-altera-5.14.21-150400.24.21.1.aarch64",
            "openSUSE Leap 15.4:dtb-amazon-5.14.21-150400.24.21.1.aarch64",
            "openSUSE Leap 15.4:dtb-amd-5.14.21-150400.24.21.1.aarch64",
            "openSUSE Leap 15.4:dtb-amlogic-5.14.21-150400.24.21.1.aarch64",
            "openSUSE Leap 15.4:dtb-apm-5.14.21-150400.24.21.1.aarch64",
            "openSUSE Leap 15.4:dtb-apple-5.14.21-150400.24.21.1.aarch64",
            "openSUSE Leap 15.4:dtb-arm-5.14.21-150400.24.21.1.aarch64",
            "openSUSE Leap 15.4:dtb-broadcom-5.14.21-150400.24.21.1.aarch64",
            "openSUSE Leap 15.4:dtb-cavium-5.14.21-150400.24.21.1.aarch64",
            "openSUSE Leap 15.4:dtb-exynos-5.14.21-150400.24.21.1.aarch64",
            "openSUSE Leap 15.4:dtb-freescale-5.14.21-150400.24.21.1.aarch64",
            "openSUSE Leap 15.4:dtb-hisilicon-5.14.21-150400.24.21.1.aarch64",
            "openSUSE Leap 15.4:dtb-lg-5.14.21-150400.24.21.1.aarch64",
            "openSUSE Leap 15.4:dtb-marvell-5.14.21-150400.24.21.1.aarch64",
            "openSUSE Leap 15.4:dtb-mediatek-5.14.21-150400.24.21.1.aarch64",
            "openSUSE Leap 15.4:dtb-nvidia-5.14.21-150400.24.21.1.aarch64",
            "openSUSE Leap 15.4:dtb-qcom-5.14.21-150400.24.21.1.aarch64",
            "openSUSE Leap 15.4:dtb-renesas-5.14.21-150400.24.21.1.aarch64",
            "openSUSE Leap 15.4:dtb-rockchip-5.14.21-150400.24.21.1.aarch64",
            "openSUSE Leap 15.4:dtb-socionext-5.14.21-150400.24.21.1.aarch64",
            "openSUSE Leap 15.4:dtb-sprd-5.14.21-150400.24.21.1.aarch64",
            "openSUSE Leap 15.4:dtb-xilinx-5.14.21-150400.24.21.1.aarch64",
            "openSUSE Leap 15.4:gfs2-kmp-64kb-5.14.21-150400.24.21.2.aarch64",
            "openSUSE Leap 15.4:gfs2-kmp-default-5.14.21-150400.24.21.2.aarch64",
            "openSUSE Leap 15.4:gfs2-kmp-default-5.14.21-150400.24.21.2.ppc64le",
            "openSUSE Leap 15.4:gfs2-kmp-default-5.14.21-150400.24.21.2.s390x",
            "openSUSE Leap 15.4:gfs2-kmp-default-5.14.21-150400.24.21.2.x86_64",
            "openSUSE Leap 15.4:kernel-64kb-5.14.21-150400.24.21.2.aarch64",
            "openSUSE Leap 15.4:kernel-64kb-devel-5.14.21-150400.24.21.2.aarch64",
            "openSUSE Leap 15.4:kernel-64kb-extra-5.14.21-150400.24.21.2.aarch64",
            "openSUSE Leap 15.4:kernel-64kb-livepatch-devel-5.14.21-150400.24.21.2.aarch64",
            "openSUSE Leap 15.4:kernel-64kb-optional-5.14.21-150400.24.21.2.aarch64",
            "openSUSE Leap 15.4:kernel-debug-5.14.21-150400.24.21.2.ppc64le",
            "openSUSE Leap 15.4:kernel-debug-5.14.21-150400.24.21.2.x86_64",
            "openSUSE Leap 15.4:kernel-debug-devel-5.14.21-150400.24.21.2.ppc64le",
            "openSUSE Leap 15.4:kernel-debug-devel-5.14.21-150400.24.21.2.x86_64",
            "openSUSE Leap 15.4:kernel-debug-livepatch-devel-5.14.21-150400.24.21.2.ppc64le",
            "openSUSE Leap 15.4:kernel-debug-livepatch-devel-5.14.21-150400.24.21.2.x86_64",
            "openSUSE Leap 15.4:kernel-default-5.14.21-150400.24.21.2.aarch64",
            "openSUSE Leap 15.4:kernel-default-5.14.21-150400.24.21.2.ppc64le",
            "openSUSE Leap 15.4:kernel-default-5.14.21-150400.24.21.2.s390x",
            "openSUSE Leap 15.4:kernel-default-5.14.21-150400.24.21.2.x86_64",
            "openSUSE Leap 15.4:kernel-default-base-5.14.21-150400.24.21.2.150400.24.7.2.aarch64",
            "openSUSE Leap 15.4:kernel-default-base-5.14.21-150400.24.21.2.150400.24.7.2.ppc64le",
            "openSUSE Leap 15.4:kernel-default-base-5.14.21-150400.24.21.2.150400.24.7.2.s390x",
            "openSUSE Leap 15.4:kernel-default-base-5.14.21-150400.24.21.2.150400.24.7.2.x86_64",
            "openSUSE Leap 15.4:kernel-default-base-rebuild-5.14.21-150400.24.21.2.150400.24.7.2.aarch64",
            "openSUSE Leap 15.4:kernel-default-base-rebuild-5.14.21-150400.24.21.2.150400.24.7.2.ppc64le",
            "openSUSE Leap 15.4:kernel-default-base-rebuild-5.14.21-150400.24.21.2.150400.24.7.2.s390x",
            "openSUSE Leap 15.4:kernel-default-base-rebuild-5.14.21-150400.24.21.2.150400.24.7.2.x86_64",
            "openSUSE Leap 15.4:kernel-default-devel-5.14.21-150400.24.21.2.aarch64",
            "openSUSE Leap 15.4:kernel-default-devel-5.14.21-150400.24.21.2.ppc64le",
            "openSUSE Leap 15.4:kernel-default-devel-5.14.21-150400.24.21.2.s390x",
            "openSUSE Leap 15.4:kernel-default-devel-5.14.21-150400.24.21.2.x86_64",
            "openSUSE Leap 15.4:kernel-default-extra-5.14.21-150400.24.21.2.aarch64",
            "openSUSE Leap 15.4:kernel-default-extra-5.14.21-150400.24.21.2.ppc64le",
            "openSUSE Leap 15.4:kernel-default-extra-5.14.21-150400.24.21.2.s390x",
            "openSUSE Leap 15.4:kernel-default-extra-5.14.21-150400.24.21.2.x86_64",
            "openSUSE Leap 15.4:kernel-default-livepatch-5.14.21-150400.24.21.2.aarch64",
            "openSUSE Leap 15.4:kernel-default-livepatch-5.14.21-150400.24.21.2.ppc64le",
            "openSUSE Leap 15.4:kernel-default-livepatch-5.14.21-150400.24.21.2.s390x",
            "openSUSE Leap 15.4:kernel-default-livepatch-5.14.21-150400.24.21.2.x86_64",
            "openSUSE Leap 15.4:kernel-default-livepatch-devel-5.14.21-150400.24.21.2.aarch64",
            "openSUSE Leap 15.4:kernel-default-livepatch-devel-5.14.21-150400.24.21.2.ppc64le",
            "openSUSE Leap 15.4:kernel-default-livepatch-devel-5.14.21-150400.24.21.2.s390x",
            "openSUSE Leap 15.4:kernel-default-livepatch-devel-5.14.21-150400.24.21.2.x86_64",
            "openSUSE Leap 15.4:kernel-default-optional-5.14.21-150400.24.21.2.aarch64",
            "openSUSE Leap 15.4:kernel-default-optional-5.14.21-150400.24.21.2.ppc64le",
            "openSUSE Leap 15.4:kernel-default-optional-5.14.21-150400.24.21.2.s390x",
            "openSUSE Leap 15.4:kernel-default-optional-5.14.21-150400.24.21.2.x86_64",
            "openSUSE Leap 15.4:kernel-devel-5.14.21-150400.24.21.2.noarch",
            "openSUSE Leap 15.4:kernel-docs-5.14.21-150400.24.21.3.noarch",
            "openSUSE Leap 15.4:kernel-docs-html-5.14.21-150400.24.21.3.noarch",
            "openSUSE Leap 15.4:kernel-kvmsmall-5.14.21-150400.24.21.2.aarch64",
            "openSUSE Leap 15.4:kernel-kvmsmall-5.14.21-150400.24.21.2.ppc64le",
            "openSUSE Leap 15.4:kernel-kvmsmall-5.14.21-150400.24.21.2.x86_64",
            "openSUSE Leap 15.4:kernel-kvmsmall-devel-5.14.21-150400.24.21.2.aarch64",
            "openSUSE Leap 15.4:kernel-kvmsmall-devel-5.14.21-150400.24.21.2.ppc64le",
            "openSUSE Leap 15.4:kernel-kvmsmall-devel-5.14.21-150400.24.21.2.x86_64",
            "openSUSE Leap 15.4:kernel-kvmsmall-livepatch-devel-5.14.21-150400.24.21.2.aarch64",
            "openSUSE Leap 15.4:kernel-kvmsmall-livepatch-devel-5.14.21-150400.24.21.2.ppc64le",
            "openSUSE Leap 15.4:kernel-kvmsmall-livepatch-devel-5.14.21-150400.24.21.2.x86_64",
            "openSUSE Leap 15.4:kernel-macros-5.14.21-150400.24.21.2.noarch",
            "openSUSE Leap 15.4:kernel-obs-build-5.14.21-150400.24.21.2.aarch64",
            "openSUSE Leap 15.4:kernel-obs-build-5.14.21-150400.24.21.2.ppc64le",
            "openSUSE Leap 15.4:kernel-obs-build-5.14.21-150400.24.21.2.s390x",
            "openSUSE Leap 15.4:kernel-obs-build-5.14.21-150400.24.21.2.x86_64",
            "openSUSE Leap 15.4:kernel-obs-qa-5.14.21-150400.24.21.1.aarch64",
            "openSUSE Leap 15.4:kernel-obs-qa-5.14.21-150400.24.21.1.ppc64le",
            "openSUSE Leap 15.4:kernel-obs-qa-5.14.21-150400.24.21.1.s390x",
            "openSUSE Leap 15.4:kernel-obs-qa-5.14.21-150400.24.21.1.x86_64",
            "openSUSE Leap 15.4:kernel-source-5.14.21-150400.24.21.2.noarch",
            "openSUSE Leap 15.4:kernel-source-vanilla-5.14.21-150400.24.21.2.noarch",
            "openSUSE Leap 15.4:kernel-syms-5.14.21-150400.24.21.1.aarch64",
            "openSUSE Leap 15.4:kernel-syms-5.14.21-150400.24.21.1.ppc64le",
            "openSUSE Leap 15.4:kernel-syms-5.14.21-150400.24.21.1.s390x",
            "openSUSE Leap 15.4:kernel-syms-5.14.21-150400.24.21.1.x86_64",
            "openSUSE Leap 15.4:kernel-zfcpdump-5.14.21-150400.24.21.2.s390x",
            "openSUSE Leap 15.4:kselftests-kmp-64kb-5.14.21-150400.24.21.2.aarch64",
            "openSUSE Leap 15.4:kselftests-kmp-default-5.14.21-150400.24.21.2.aarch64",
            "openSUSE Leap 15.4:kselftests-kmp-default-5.14.21-150400.24.21.2.ppc64le",
            "openSUSE Leap 15.4:kselftests-kmp-default-5.14.21-150400.24.21.2.s390x",
            "openSUSE Leap 15.4:kselftests-kmp-default-5.14.21-150400.24.21.2.x86_64",
            "openSUSE Leap 15.4:ocfs2-kmp-64kb-5.14.21-150400.24.21.2.aarch64",
            "openSUSE Leap 15.4:ocfs2-kmp-default-5.14.21-150400.24.21.2.aarch64",
            "openSUSE Leap 15.4:ocfs2-kmp-default-5.14.21-150400.24.21.2.ppc64le",
            "openSUSE Leap 15.4:ocfs2-kmp-default-5.14.21-150400.24.21.2.s390x",
            "openSUSE Leap 15.4:ocfs2-kmp-default-5.14.21-150400.24.21.2.x86_64",
            "openSUSE Leap 15.4:reiserfs-kmp-64kb-5.14.21-150400.24.21.2.aarch64",
            "openSUSE Leap 15.4:reiserfs-kmp-default-5.14.21-150400.24.21.2.aarch64",
            "openSUSE Leap 15.4:reiserfs-kmp-default-5.14.21-150400.24.21.2.ppc64le",
            "openSUSE Leap 15.4:reiserfs-kmp-default-5.14.21-150400.24.21.2.s390x",
            "openSUSE Leap 15.4:reiserfs-kmp-default-5.14.21-150400.24.21.2.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2022-09-16T15:30:19Z",
          "details": "moderate"
        }
      ],
      "title": "CVE-2022-28693"
    },
    {
      "cve": "CVE-2022-2873",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2022-2873"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "An out-of-bounds memory access flaw was found in the Linux kernel Intel\u0027s iSMT SMBus host controller driver in the way a user triggers the I2C_SMBUS_BLOCK_DATA (with the ioctl I2C_SMBUS) with malicious input data. This flaw allows a local user to crash the system.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.21.2.aarch64",
          "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.21.2.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.21.2.s390x",
          "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.21.2.x86_64",
          "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.21.2.aarch64",
          "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.21.2.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.21.2.s390x",
          "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.21.2.x86_64",
          "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.21.2.aarch64",
          "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.21.2.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.21.2.s390x",
          "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.21.2.x86_64",
          "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.21.2.aarch64",
          "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.21.2.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.21.2.s390x",
          "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.21.2.x86_64",
          "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.21.2.ppc64le",
          "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.21.2.s390x",
          "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.21.2.x86_64",
          "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.21.2.ppc64le",
          "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.21.2.s390x",
          "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.21.2.x86_64",
          "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_21-default-1-150400.9.3.2.ppc64le",
          "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_21-default-1-150400.9.3.2.s390x",
          "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_21-default-1-150400.9.3.2.x86_64",
          "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-64kb-5.14.21-150400.24.21.2.aarch64",
          "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-64kb-devel-5.14.21-150400.24.21.2.aarch64",
          "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-5.14.21-150400.24.21.2.aarch64",
          "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-5.14.21-150400.24.21.2.ppc64le",
          "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-5.14.21-150400.24.21.2.s390x",
          "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-5.14.21-150400.24.21.2.x86_64",
          "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-base-5.14.21-150400.24.21.2.150400.24.7.2.aarch64",
          "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-base-5.14.21-150400.24.21.2.150400.24.7.2.ppc64le",
          "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-base-5.14.21-150400.24.21.2.150400.24.7.2.s390x",
          "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-base-5.14.21-150400.24.21.2.150400.24.7.2.x86_64",
          "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-devel-5.14.21-150400.24.21.2.aarch64",
          "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-devel-5.14.21-150400.24.21.2.ppc64le",
          "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-devel-5.14.21-150400.24.21.2.s390x",
          "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-devel-5.14.21-150400.24.21.2.x86_64",
          "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-devel-5.14.21-150400.24.21.2.noarch",
          "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-macros-5.14.21-150400.24.21.2.noarch",
          "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-zfcpdump-5.14.21-150400.24.21.2.s390x",
          "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-docs-5.14.21-150400.24.21.3.noarch",
          "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-obs-build-5.14.21-150400.24.21.2.aarch64",
          "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-obs-build-5.14.21-150400.24.21.2.ppc64le",
          "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-obs-build-5.14.21-150400.24.21.2.s390x",
          "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-obs-build-5.14.21-150400.24.21.2.x86_64",
          "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-source-5.14.21-150400.24.21.2.noarch",
          "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-syms-5.14.21-150400.24.21.1.aarch64",
          "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-syms-5.14.21-150400.24.21.1.ppc64le",
          "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-syms-5.14.21-150400.24.21.1.s390x",
          "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-syms-5.14.21-150400.24.21.1.x86_64",
          "SUSE Linux Enterprise Module for Legacy 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.21.2.aarch64",
          "SUSE Linux Enterprise Module for Legacy 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.21.2.ppc64le",
          "SUSE Linux Enterprise Module for Legacy 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.21.2.s390x",
          "SUSE Linux Enterprise Module for Legacy 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.21.2.x86_64",
          "SUSE Linux Enterprise Workstation Extension 15 SP4:kernel-default-extra-5.14.21-150400.24.21.2.x86_64",
          "openSUSE Leap 15.4:cluster-md-kmp-64kb-5.14.21-150400.24.21.2.aarch64",
          "openSUSE Leap 15.4:cluster-md-kmp-default-5.14.21-150400.24.21.2.aarch64",
          "openSUSE Leap 15.4:cluster-md-kmp-default-5.14.21-150400.24.21.2.ppc64le",
          "openSUSE Leap 15.4:cluster-md-kmp-default-5.14.21-150400.24.21.2.s390x",
          "openSUSE Leap 15.4:cluster-md-kmp-default-5.14.21-150400.24.21.2.x86_64",
          "openSUSE Leap 15.4:dlm-kmp-64kb-5.14.21-150400.24.21.2.aarch64",
          "openSUSE Leap 15.4:dlm-kmp-default-5.14.21-150400.24.21.2.aarch64",
          "openSUSE Leap 15.4:dlm-kmp-default-5.14.21-150400.24.21.2.ppc64le",
          "openSUSE Leap 15.4:dlm-kmp-default-5.14.21-150400.24.21.2.s390x",
          "openSUSE Leap 15.4:dlm-kmp-default-5.14.21-150400.24.21.2.x86_64",
          "openSUSE Leap 15.4:dtb-allwinner-5.14.21-150400.24.21.1.aarch64",
          "openSUSE Leap 15.4:dtb-altera-5.14.21-150400.24.21.1.aarch64",
          "openSUSE Leap 15.4:dtb-amazon-5.14.21-150400.24.21.1.aarch64",
          "openSUSE Leap 15.4:dtb-amd-5.14.21-150400.24.21.1.aarch64",
          "openSUSE Leap 15.4:dtb-amlogic-5.14.21-150400.24.21.1.aarch64",
          "openSUSE Leap 15.4:dtb-apm-5.14.21-150400.24.21.1.aarch64",
          "openSUSE Leap 15.4:dtb-apple-5.14.21-150400.24.21.1.aarch64",
          "openSUSE Leap 15.4:dtb-arm-5.14.21-150400.24.21.1.aarch64",
          "openSUSE Leap 15.4:dtb-broadcom-5.14.21-150400.24.21.1.aarch64",
          "openSUSE Leap 15.4:dtb-cavium-5.14.21-150400.24.21.1.aarch64",
          "openSUSE Leap 15.4:dtb-exynos-5.14.21-150400.24.21.1.aarch64",
          "openSUSE Leap 15.4:dtb-freescale-5.14.21-150400.24.21.1.aarch64",
          "openSUSE Leap 15.4:dtb-hisilicon-5.14.21-150400.24.21.1.aarch64",
          "openSUSE Leap 15.4:dtb-lg-5.14.21-150400.24.21.1.aarch64",
          "openSUSE Leap 15.4:dtb-marvell-5.14.21-150400.24.21.1.aarch64",
          "openSUSE Leap 15.4:dtb-mediatek-5.14.21-150400.24.21.1.aarch64",
          "openSUSE Leap 15.4:dtb-nvidia-5.14.21-150400.24.21.1.aarch64",
          "openSUSE Leap 15.4:dtb-qcom-5.14.21-150400.24.21.1.aarch64",
          "openSUSE Leap 15.4:dtb-renesas-5.14.21-150400.24.21.1.aarch64",
          "openSUSE Leap 15.4:dtb-rockchip-5.14.21-150400.24.21.1.aarch64",
          "openSUSE Leap 15.4:dtb-socionext-5.14.21-150400.24.21.1.aarch64",
          "openSUSE Leap 15.4:dtb-sprd-5.14.21-150400.24.21.1.aarch64",
          "openSUSE Leap 15.4:dtb-xilinx-5.14.21-150400.24.21.1.aarch64",
          "openSUSE Leap 15.4:gfs2-kmp-64kb-5.14.21-150400.24.21.2.aarch64",
          "openSUSE Leap 15.4:gfs2-kmp-default-5.14.21-150400.24.21.2.aarch64",
          "openSUSE Leap 15.4:gfs2-kmp-default-5.14.21-150400.24.21.2.ppc64le",
          "openSUSE Leap 15.4:gfs2-kmp-default-5.14.21-150400.24.21.2.s390x",
          "openSUSE Leap 15.4:gfs2-kmp-default-5.14.21-150400.24.21.2.x86_64",
          "openSUSE Leap 15.4:kernel-64kb-5.14.21-150400.24.21.2.aarch64",
          "openSUSE Leap 15.4:kernel-64kb-devel-5.14.21-150400.24.21.2.aarch64",
          "openSUSE Leap 15.4:kernel-64kb-extra-5.14.21-150400.24.21.2.aarch64",
          "openSUSE Leap 15.4:kernel-64kb-livepatch-devel-5.14.21-150400.24.21.2.aarch64",
          "openSUSE Leap 15.4:kernel-64kb-optional-5.14.21-150400.24.21.2.aarch64",
          "openSUSE Leap 15.4:kernel-debug-5.14.21-150400.24.21.2.ppc64le",
          "openSUSE Leap 15.4:kernel-debug-5.14.21-150400.24.21.2.x86_64",
          "openSUSE Leap 15.4:kernel-debug-devel-5.14.21-150400.24.21.2.ppc64le",
          "openSUSE Leap 15.4:kernel-debug-devel-5.14.21-150400.24.21.2.x86_64",
          "openSUSE Leap 15.4:kernel-debug-livepatch-devel-5.14.21-150400.24.21.2.ppc64le",
          "openSUSE Leap 15.4:kernel-debug-livepatch-devel-5.14.21-150400.24.21.2.x86_64",
          "openSUSE Leap 15.4:kernel-default-5.14.21-150400.24.21.2.aarch64",
          "openSUSE Leap 15.4:kernel-default-5.14.21-150400.24.21.2.ppc64le",
          "openSUSE Leap 15.4:kernel-default-5.14.21-150400.24.21.2.s390x",
          "openSUSE Leap 15.4:kernel-default-5.14.21-150400.24.21.2.x86_64",
          "openSUSE Leap 15.4:kernel-default-base-5.14.21-150400.24.21.2.150400.24.7.2.aarch64",
          "openSUSE Leap 15.4:kernel-default-base-5.14.21-150400.24.21.2.150400.24.7.2.ppc64le",
          "openSUSE Leap 15.4:kernel-default-base-5.14.21-150400.24.21.2.150400.24.7.2.s390x",
          "openSUSE Leap 15.4:kernel-default-base-5.14.21-150400.24.21.2.150400.24.7.2.x86_64",
          "openSUSE Leap 15.4:kernel-default-base-rebuild-5.14.21-150400.24.21.2.150400.24.7.2.aarch64",
          "openSUSE Leap 15.4:kernel-default-base-rebuild-5.14.21-150400.24.21.2.150400.24.7.2.ppc64le",
          "openSUSE Leap 15.4:kernel-default-base-rebuild-5.14.21-150400.24.21.2.150400.24.7.2.s390x",
          "openSUSE Leap 15.4:kernel-default-base-rebuild-5.14.21-150400.24.21.2.150400.24.7.2.x86_64",
          "openSUSE Leap 15.4:kernel-default-devel-5.14.21-150400.24.21.2.aarch64",
          "openSUSE Leap 15.4:kernel-default-devel-5.14.21-150400.24.21.2.ppc64le",
          "openSUSE Leap 15.4:kernel-default-devel-5.14.21-150400.24.21.2.s390x",
          "openSUSE Leap 15.4:kernel-default-devel-5.14.21-150400.24.21.2.x86_64",
          "openSUSE Leap 15.4:kernel-default-extra-5.14.21-150400.24.21.2.aarch64",
          "openSUSE Leap 15.4:kernel-default-extra-5.14.21-150400.24.21.2.ppc64le",
          "openSUSE Leap 15.4:kernel-default-extra-5.14.21-150400.24.21.2.s390x",
          "openSUSE Leap 15.4:kernel-default-extra-5.14.21-150400.24.21.2.x86_64",
          "openSUSE Leap 15.4:kernel-default-livepatch-5.14.21-150400.24.21.2.aarch64",
          "openSUSE Leap 15.4:kernel-default-livepatch-5.14.21-150400.24.21.2.ppc64le",
          "openSUSE Leap 15.4:kernel-default-livepatch-5.14.21-150400.24.21.2.s390x",
          "openSUSE Leap 15.4:kernel-default-livepatch-5.14.21-150400.24.21.2.x86_64",
          "openSUSE Leap 15.4:kernel-default-livepatch-devel-5.14.21-150400.24.21.2.aarch64",
          "openSUSE Leap 15.4:kernel-default-livepatch-devel-5.14.21-150400.24.21.2.ppc64le",
          "openSUSE Leap 15.4:kernel-default-livepatch-devel-5.14.21-150400.24.21.2.s390x",
          "openSUSE Leap 15.4:kernel-default-livepatch-devel-5.14.21-150400.24.21.2.x86_64",
          "openSUSE Leap 15.4:kernel-default-optional-5.14.21-150400.24.21.2.aarch64",
          "openSUSE Leap 15.4:kernel-default-optional-5.14.21-150400.24.21.2.ppc64le",
          "openSUSE Leap 15.4:kernel-default-optional-5.14.21-150400.24.21.2.s390x",
          "openSUSE Leap 15.4:kernel-default-optional-5.14.21-150400.24.21.2.x86_64",
          "openSUSE Leap 15.4:kernel-devel-5.14.21-150400.24.21.2.noarch",
          "openSUSE Leap 15.4:kernel-docs-5.14.21-150400.24.21.3.noarch",
          "openSUSE Leap 15.4:kernel-docs-html-5.14.21-150400.24.21.3.noarch",
          "openSUSE Leap 15.4:kernel-kvmsmall-5.14.21-150400.24.21.2.aarch64",
          "openSUSE Leap 15.4:kernel-kvmsmall-5.14.21-150400.24.21.2.ppc64le",
          "openSUSE Leap 15.4:kernel-kvmsmall-5.14.21-150400.24.21.2.x86_64",
          "openSUSE Leap 15.4:kernel-kvmsmall-devel-5.14.21-150400.24.21.2.aarch64",
          "openSUSE Leap 15.4:kernel-kvmsmall-devel-5.14.21-150400.24.21.2.ppc64le",
          "openSUSE Leap 15.4:kernel-kvmsmall-devel-5.14.21-150400.24.21.2.x86_64",
          "openSUSE Leap 15.4:kernel-kvmsmall-livepatch-devel-5.14.21-150400.24.21.2.aarch64",
          "openSUSE Leap 15.4:kernel-kvmsmall-livepatch-devel-5.14.21-150400.24.21.2.ppc64le",
          "openSUSE Leap 15.4:kernel-kvmsmall-livepatch-devel-5.14.21-150400.24.21.2.x86_64",
          "openSUSE Leap 15.4:kernel-macros-5.14.21-150400.24.21.2.noarch",
          "openSUSE Leap 15.4:kernel-obs-build-5.14.21-150400.24.21.2.aarch64",
          "openSUSE Leap 15.4:kernel-obs-build-5.14.21-150400.24.21.2.ppc64le",
          "openSUSE Leap 15.4:kernel-obs-build-5.14.21-150400.24.21.2.s390x",
          "openSUSE Leap 15.4:kernel-obs-build-5.14.21-150400.24.21.2.x86_64",
          "openSUSE Leap 15.4:kernel-obs-qa-5.14.21-150400.24.21.1.aarch64",
          "openSUSE Leap 15.4:kernel-obs-qa-5.14.21-150400.24.21.1.ppc64le",
          "openSUSE Leap 15.4:kernel-obs-qa-5.14.21-150400.24.21.1.s390x",
          "openSUSE Leap 15.4:kernel-obs-qa-5.14.21-150400.24.21.1.x86_64",
          "openSUSE Leap 15.4:kernel-source-5.14.21-150400.24.21.2.noarch",
          "openSUSE Leap 15.4:kernel-source-vanilla-5.14.21-150400.24.21.2.noarch",
          "openSUSE Leap 15.4:kernel-syms-5.14.21-150400.24.21.1.aarch64",
          "openSUSE Leap 15.4:kernel-syms-5.14.21-150400.24.21.1.ppc64le",
          "openSUSE Leap 15.4:kernel-syms-5.14.21-150400.24.21.1.s390x",
          "openSUSE Leap 15.4:kernel-syms-5.14.21-150400.24.21.1.x86_64",
          "openSUSE Leap 15.4:kernel-zfcpdump-5.14.21-150400.24.21.2.s390x",
          "openSUSE Leap 15.4:kselftests-kmp-64kb-5.14.21-150400.24.21.2.aarch64",
          "openSUSE Leap 15.4:kselftests-kmp-default-5.14.21-150400.24.21.2.aarch64",
          "openSUSE Leap 15.4:kselftests-kmp-default-5.14.21-150400.24.21.2.ppc64le",
          "openSUSE Leap 15.4:kselftests-kmp-default-5.14.21-150400.24.21.2.s390x",
          "openSUSE Leap 15.4:kselftests-kmp-default-5.14.21-150400.24.21.2.x86_64",
          "openSUSE Leap 15.4:ocfs2-kmp-64kb-5.14.21-150400.24.21.2.aarch64",
          "openSUSE Leap 15.4:ocfs2-kmp-default-5.14.21-150400.24.21.2.aarch64",
          "openSUSE Leap 15.4:ocfs2-kmp-default-5.14.21-150400.24.21.2.ppc64le",
          "openSUSE Leap 15.4:ocfs2-kmp-default-5.14.21-150400.24.21.2.s390x",
          "openSUSE Leap 15.4:ocfs2-kmp-default-5.14.21-150400.24.21.2.x86_64",
          "openSUSE Leap 15.4:reiserfs-kmp-64kb-5.14.21-150400.24.21.2.aarch64",
          "openSUSE Leap 15.4:reiserfs-kmp-default-5.14.21-150400.24.21.2.aarch64",
          "openSUSE Leap 15.4:reiserfs-kmp-default-5.14.21-150400.24.21.2.ppc64le",
          "openSUSE Leap 15.4:reiserfs-kmp-default-5.14.21-150400.24.21.2.s390x",
          "openSUSE Leap 15.4:reiserfs-kmp-default-5.14.21-150400.24.21.2.x86_64"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2022-2873",
          "url": "https://www.suse.com/security/cve/CVE-2022-2873"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1202558 for CVE-2022-2873",
          "url": "https://bugzilla.suse.com/1202558"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.21.2.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.21.2.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.21.2.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.21.2.x86_64",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.21.2.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.21.2.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.21.2.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.21.2.x86_64",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.21.2.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.21.2.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.21.2.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.21.2.x86_64",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.21.2.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.21.2.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.21.2.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.21.2.x86_64",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.21.2.ppc64le",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.21.2.s390x",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.21.2.x86_64",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.21.2.ppc64le",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.21.2.s390x",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.21.2.x86_64",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_21-default-1-150400.9.3.2.ppc64le",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_21-default-1-150400.9.3.2.s390x",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_21-default-1-150400.9.3.2.x86_64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-64kb-5.14.21-150400.24.21.2.aarch64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-64kb-devel-5.14.21-150400.24.21.2.aarch64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-5.14.21-150400.24.21.2.aarch64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-5.14.21-150400.24.21.2.ppc64le",
            "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-5.14.21-150400.24.21.2.s390x",
            "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-5.14.21-150400.24.21.2.x86_64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-base-5.14.21-150400.24.21.2.150400.24.7.2.aarch64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-base-5.14.21-150400.24.21.2.150400.24.7.2.ppc64le",
            "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-base-5.14.21-150400.24.21.2.150400.24.7.2.s390x",
            "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-base-5.14.21-150400.24.21.2.150400.24.7.2.x86_64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-devel-5.14.21-150400.24.21.2.aarch64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-devel-5.14.21-150400.24.21.2.ppc64le",
            "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-devel-5.14.21-150400.24.21.2.s390x",
            "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-devel-5.14.21-150400.24.21.2.x86_64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-devel-5.14.21-150400.24.21.2.noarch",
            "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-macros-5.14.21-150400.24.21.2.noarch",
            "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-zfcpdump-5.14.21-150400.24.21.2.s390x",
            "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-docs-5.14.21-150400.24.21.3.noarch",
            "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-obs-build-5.14.21-150400.24.21.2.aarch64",
            "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-obs-build-5.14.21-150400.24.21.2.ppc64le",
            "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-obs-build-5.14.21-150400.24.21.2.s390x",
            "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-obs-build-5.14.21-150400.24.21.2.x86_64",
            "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-source-5.14.21-150400.24.21.2.noarch",
            "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-syms-5.14.21-150400.24.21.1.aarch64",
            "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-syms-5.14.21-150400.24.21.1.ppc64le",
            "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-syms-5.14.21-150400.24.21.1.s390x",
            "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-syms-5.14.21-150400.24.21.1.x86_64",
            "SUSE Linux Enterprise Module for Legacy 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.21.2.aarch64",
            "SUSE Linux Enterprise Module for Legacy 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.21.2.ppc64le",
            "SUSE Linux Enterprise Module for Legacy 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.21.2.s390x",
            "SUSE Linux Enterprise Module for Legacy 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.21.2.x86_64",
            "SUSE Linux Enterprise Workstation Extension 15 SP4:kernel-default-extra-5.14.21-150400.24.21.2.x86_64",
            "openSUSE Leap 15.4:cluster-md-kmp-64kb-5.14.21-150400.24.21.2.aarch64",
            "openSUSE Leap 15.4:cluster-md-kmp-default-5.14.21-150400.24.21.2.aarch64",
            "openSUSE Leap 15.4:cluster-md-kmp-default-5.14.21-150400.24.21.2.ppc64le",
            "openSUSE Leap 15.4:cluster-md-kmp-default-5.14.21-150400.24.21.2.s390x",
            "openSUSE Leap 15.4:cluster-md-kmp-default-5.14.21-150400.24.21.2.x86_64",
            "openSUSE Leap 15.4:dlm-kmp-64kb-5.14.21-150400.24.21.2.aarch64",
            "openSUSE Leap 15.4:dlm-kmp-default-5.14.21-150400.24.21.2.aarch64",
            "openSUSE Leap 15.4:dlm-kmp-default-5.14.21-150400.24.21.2.ppc64le",
            "openSUSE Leap 15.4:dlm-kmp-default-5.14.21-150400.24.21.2.s390x",
            "openSUSE Leap 15.4:dlm-kmp-default-5.14.21-150400.24.21.2.x86_64",
            "openSUSE Leap 15.4:dtb-allwinner-5.14.21-150400.24.21.1.aarch64",
            "openSUSE Leap 15.4:dtb-altera-5.14.21-150400.24.21.1.aarch64",
            "openSUSE Leap 15.4:dtb-amazon-5.14.21-150400.24.21.1.aarch64",
            "openSUSE Leap 15.4:dtb-amd-5.14.21-150400.24.21.1.aarch64",
            "openSUSE Leap 15.4:dtb-amlogic-5.14.21-150400.24.21.1.aarch64",
            "openSUSE Leap 15.4:dtb-apm-5.14.21-150400.24.21.1.aarch64",
            "openSUSE Leap 15.4:dtb-apple-5.14.21-150400.24.21.1.aarch64",
            "openSUSE Leap 15.4:dtb-arm-5.14.21-150400.24.21.1.aarch64",
            "openSUSE Leap 15.4:dtb-broadcom-5.14.21-150400.24.21.1.aarch64",
            "openSUSE Leap 15.4:dtb-cavium-5.14.21-150400.24.21.1.aarch64",
            "openSUSE Leap 15.4:dtb-exynos-5.14.21-150400.24.21.1.aarch64",
            "openSUSE Leap 15.4:dtb-freescale-5.14.21-150400.24.21.1.aarch64",
            "openSUSE Leap 15.4:dtb-hisilicon-5.14.21-150400.24.21.1.aarch64",
            "openSUSE Leap 15.4:dtb-lg-5.14.21-150400.24.21.1.aarch64",
            "openSUSE Leap 15.4:dtb-marvell-5.14.21-150400.24.21.1.aarch64",
            "openSUSE Leap 15.4:dtb-mediatek-5.14.21-150400.24.21.1.aarch64",
            "openSUSE Leap 15.4:dtb-nvidia-5.14.21-150400.24.21.1.aarch64",
            "openSUSE Leap 15.4:dtb-qcom-5.14.21-150400.24.21.1.aarch64",
            "openSUSE Leap 15.4:dtb-renesas-5.14.21-150400.24.21.1.aarch64",
            "openSUSE Leap 15.4:dtb-rockchip-5.14.21-150400.24.21.1.aarch64",
            "openSUSE Leap 15.4:dtb-socionext-5.14.21-150400.24.21.1.aarch64",
            "openSUSE Leap 15.4:dtb-sprd-5.14.21-150400.24.21.1.aarch64",
            "openSUSE Leap 15.4:dtb-xilinx-5.14.21-150400.24.21.1.aarch64",
            "openSUSE Leap 15.4:gfs2-kmp-64kb-5.14.21-150400.24.21.2.aarch64",
            "openSUSE Leap 15.4:gfs2-kmp-default-5.14.21-150400.24.21.2.aarch64",
            "openSUSE Leap 15.4:gfs2-kmp-default-5.14.21-150400.24.21.2.ppc64le",
            "openSUSE Leap 15.4:gfs2-kmp-default-5.14.21-150400.24.21.2.s390x",
            "openSUSE Leap 15.4:gfs2-kmp-default-5.14.21-150400.24.21.2.x86_64",
            "openSUSE Leap 15.4:kernel-64kb-5.14.21-150400.24.21.2.aarch64",
            "openSUSE Leap 15.4:kernel-64kb-devel-5.14.21-150400.24.21.2.aarch64",
            "openSUSE Leap 15.4:kernel-64kb-extra-5.14.21-150400.24.21.2.aarch64",
            "openSUSE Leap 15.4:kernel-64kb-livepatch-devel-5.14.21-150400.24.21.2.aarch64",
            "openSUSE Leap 15.4:kernel-64kb-optional-5.14.21-150400.24.21.2.aarch64",
            "openSUSE Leap 15.4:kernel-debug-5.14.21-150400.24.21.2.ppc64le",
            "openSUSE Leap 15.4:kernel-debug-5.14.21-150400.24.21.2.x86_64",
            "openSUSE Leap 15.4:kernel-debug-devel-5.14.21-150400.24.21.2.ppc64le",
            "openSUSE Leap 15.4:kernel-debug-devel-5.14.21-150400.24.21.2.x86_64",
            "openSUSE Leap 15.4:kernel-debug-livepatch-devel-5.14.21-150400.24.21.2.ppc64le",
            "openSUSE Leap 15.4:kernel-debug-livepatch-devel-5.14.21-150400.24.21.2.x86_64",
            "openSUSE Leap 15.4:kernel-default-5.14.21-150400.24.21.2.aarch64",
            "openSUSE Leap 15.4:kernel-default-5.14.21-150400.24.21.2.ppc64le",
            "openSUSE Leap 15.4:kernel-default-5.14.21-150400.24.21.2.s390x",
            "openSUSE Leap 15.4:kernel-default-5.14.21-150400.24.21.2.x86_64",
            "openSUSE Leap 15.4:kernel-default-base-5.14.21-150400.24.21.2.150400.24.7.2.aarch64",
            "openSUSE Leap 15.4:kernel-default-base-5.14.21-150400.24.21.2.150400.24.7.2.ppc64le",
            "openSUSE Leap 15.4:kernel-default-base-5.14.21-150400.24.21.2.150400.24.7.2.s390x",
            "openSUSE Leap 15.4:kernel-default-base-5.14.21-150400.24.21.2.150400.24.7.2.x86_64",
            "openSUSE Leap 15.4:kernel-default-base-rebuild-5.14.21-150400.24.21.2.150400.24.7.2.aarch64",
            "openSUSE Leap 15.4:kernel-default-base-rebuild-5.14.21-150400.24.21.2.150400.24.7.2.ppc64le",
            "openSUSE Leap 15.4:kernel-default-base-rebuild-5.14.21-150400.24.21.2.150400.24.7.2.s390x",
            "openSUSE Leap 15.4:kernel-default-base-rebuild-5.14.21-150400.24.21.2.150400.24.7.2.x86_64",
            "openSUSE Leap 15.4:kernel-default-devel-5.14.21-150400.24.21.2.aarch64",
            "openSUSE Leap 15.4:kernel-default-devel-5.14.21-150400.24.21.2.ppc64le",
            "openSUSE Leap 15.4:kernel-default-devel-5.14.21-150400.24.21.2.s390x",
            "openSUSE Leap 15.4:kernel-default-devel-5.14.21-150400.24.21.2.x86_64",
            "openSUSE Leap 15.4:kernel-default-extra-5.14.21-150400.24.21.2.aarch64",
            "openSUSE Leap 15.4:kernel-default-extra-5.14.21-150400.24.21.2.ppc64le",
            "openSUSE Leap 15.4:kernel-default-extra-5.14.21-150400.24.21.2.s390x",
            "openSUSE Leap 15.4:kernel-default-extra-5.14.21-150400.24.21.2.x86_64",
            "openSUSE Leap 15.4:kernel-default-livepatch-5.14.21-150400.24.21.2.aarch64",
            "openSUSE Leap 15.4:kernel-default-livepatch-5.14.21-150400.24.21.2.ppc64le",
            "openSUSE Leap 15.4:kernel-default-livepatch-5.14.21-150400.24.21.2.s390x",
            "openSUSE Leap 15.4:kernel-default-livepatch-5.14.21-150400.24.21.2.x86_64",
            "openSUSE Leap 15.4:kernel-default-livepatch-devel-5.14.21-150400.24.21.2.aarch64",
            "openSUSE Leap 15.4:kernel-default-livepatch-devel-5.14.21-150400.24.21.2.ppc64le",
            "openSUSE Leap 15.4:kernel-default-livepatch-devel-5.14.21-150400.24.21.2.s390x",
            "openSUSE Leap 15.4:kernel-default-livepatch-devel-5.14.21-150400.24.21.2.x86_64",
            "openSUSE Leap 15.4:kernel-default-optional-5.14.21-150400.24.21.2.aarch64",
            "openSUSE Leap 15.4:kernel-default-optional-5.14.21-150400.24.21.2.ppc64le",
            "openSUSE Leap 15.4:kernel-default-optional-5.14.21-150400.24.21.2.s390x",
            "openSUSE Leap 15.4:kernel-default-optional-5.14.21-150400.24.21.2.x86_64",
            "openSUSE Leap 15.4:kernel-devel-5.14.21-150400.24.21.2.noarch",
            "openSUSE Leap 15.4:kernel-docs-5.14.21-150400.24.21.3.noarch",
            "openSUSE Leap 15.4:kernel-docs-html-5.14.21-150400.24.21.3.noarch",
            "openSUSE Leap 15.4:kernel-kvmsmall-5.14.21-150400.24.21.2.aarch64",
            "openSUSE Leap 15.4:kernel-kvmsmall-5.14.21-150400.24.21.2.ppc64le",
            "openSUSE Leap 15.4:kernel-kvmsmall-5.14.21-150400.24.21.2.x86_64",
            "openSUSE Leap 15.4:kernel-kvmsmall-devel-5.14.21-150400.24.21.2.aarch64",
            "openSUSE Leap 15.4:kernel-kvmsmall-devel-5.14.21-150400.24.21.2.ppc64le",
            "openSUSE Leap 15.4:kernel-kvmsmall-devel-5.14.21-150400.24.21.2.x86_64",
            "openSUSE Leap 15.4:kernel-kvmsmall-livepatch-devel-5.14.21-150400.24.21.2.aarch64",
            "openSUSE Leap 15.4:kernel-kvmsmall-livepatch-devel-5.14.21-150400.24.21.2.ppc64le",
            "openSUSE Leap 15.4:kernel-kvmsmall-livepatch-devel-5.14.21-150400.24.21.2.x86_64",
            "openSUSE Leap 15.4:kernel-macros-5.14.21-150400.24.21.2.noarch",
            "openSUSE Leap 15.4:kernel-obs-build-5.14.21-150400.24.21.2.aarch64",
            "openSUSE Leap 15.4:kernel-obs-build-5.14.21-150400.24.21.2.ppc64le",
            "openSUSE Leap 15.4:kernel-obs-build-5.14.21-150400.24.21.2.s390x",
            "openSUSE Leap 15.4:kernel-obs-build-5.14.21-150400.24.21.2.x86_64",
            "openSUSE Leap 15.4:kernel-obs-qa-5.14.21-150400.24.21.1.aarch64",
            "openSUSE Leap 15.4:kernel-obs-qa-5.14.21-150400.24.21.1.ppc64le",
            "openSUSE Leap 15.4:kernel-obs-qa-5.14.21-150400.24.21.1.s390x",
            "openSUSE Leap 15.4:kernel-obs-qa-5.14.21-150400.24.21.1.x86_64",
            "openSUSE Leap 15.4:kernel-source-5.14.21-150400.24.21.2.noarch",
            "openSUSE Leap 15.4:kernel-source-vanilla-5.14.21-150400.24.21.2.noarch",
            "openSUSE Leap 15.4:kernel-syms-5.14.21-150400.24.21.1.aarch64",
            "openSUSE Leap 15.4:kernel-syms-5.14.21-150400.24.21.1.ppc64le",
            "openSUSE Leap 15.4:kernel-syms-5.14.21-150400.24.21.1.s390x",
            "openSUSE Leap 15.4:kernel-syms-5.14.21-150400.24.21.1.x86_64",
            "openSUSE Leap 15.4:kernel-zfcpdump-5.14.21-150400.24.21.2.s390x",
            "openSUSE Leap 15.4:kselftests-kmp-64kb-5.14.21-150400.24.21.2.aarch64",
            "openSUSE Leap 15.4:kselftests-kmp-default-5.14.21-150400.24.21.2.aarch64",
            "openSUSE Leap 15.4:kselftests-kmp-default-5.14.21-150400.24.21.2.ppc64le",
            "openSUSE Leap 15.4:kselftests-kmp-default-5.14.21-150400.24.21.2.s390x",
            "openSUSE Leap 15.4:kselftests-kmp-default-5.14.21-150400.24.21.2.x86_64",
            "openSUSE Leap 15.4:ocfs2-kmp-64kb-5.14.21-150400.24.21.2.aarch64",
            "openSUSE Leap 15.4:ocfs2-kmp-default-5.14.21-150400.24.21.2.aarch64",
            "openSUSE Leap 15.4:ocfs2-kmp-default-5.14.21-150400.24.21.2.ppc64le",
            "openSUSE Leap 15.4:ocfs2-kmp-default-5.14.21-150400.24.21.2.s390x",
            "openSUSE Leap 15.4:ocfs2-kmp-default-5.14.21-150400.24.21.2.x86_64",
            "openSUSE Leap 15.4:reiserfs-kmp-64kb-5.14.21-150400.24.21.2.aarch64",
            "openSUSE Leap 15.4:reiserfs-kmp-default-5.14.21-150400.24.21.2.aarch64",
            "openSUSE Leap 15.4:reiserfs-kmp-default-5.14.21-150400.24.21.2.ppc64le",
            "openSUSE Leap 15.4:reiserfs-kmp-default-5.14.21-150400.24.21.2.s390x",
            "openSUSE Leap 15.4:reiserfs-kmp-default-5.14.21-150400.24.21.2.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 4.2,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:R/S:U/C:N/I:N/A:H",
            "version": "3.1"
          },
          "products": [
            "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.21.2.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.21.2.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.21.2.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.21.2.x86_64",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.21.2.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.21.2.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.21.2.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.21.2.x86_64",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.21.2.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.21.2.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.21.2.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.21.2.x86_64",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.21.2.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.21.2.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.21.2.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.21.2.x86_64",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.21.2.ppc64le",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.21.2.s390x",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.21.2.x86_64",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.21.2.ppc64le",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.21.2.s390x",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.21.2.x86_64",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_21-default-1-150400.9.3.2.ppc64le",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_21-default-1-150400.9.3.2.s390x",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_21-default-1-150400.9.3.2.x86_64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-64kb-5.14.21-150400.24.21.2.aarch64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-64kb-devel-5.14.21-150400.24.21.2.aarch64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-5.14.21-150400.24.21.2.aarch64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-5.14.21-150400.24.21.2.ppc64le",
            "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-5.14.21-150400.24.21.2.s390x",
            "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-5.14.21-150400.24.21.2.x86_64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-base-5.14.21-150400.24.21.2.150400.24.7.2.aarch64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-base-5.14.21-150400.24.21.2.150400.24.7.2.ppc64le",
            "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-base-5.14.21-150400.24.21.2.150400.24.7.2.s390x",
            "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-base-5.14.21-150400.24.21.2.150400.24.7.2.x86_64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-devel-5.14.21-150400.24.21.2.aarch64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-devel-5.14.21-150400.24.21.2.ppc64le",
            "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-devel-5.14.21-150400.24.21.2.s390x",
            "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-devel-5.14.21-150400.24.21.2.x86_64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-devel-5.14.21-150400.24.21.2.noarch",
            "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-macros-5.14.21-150400.24.21.2.noarch",
            "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-zfcpdump-5.14.21-150400.24.21.2.s390x",
            "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-docs-5.14.21-150400.24.21.3.noarch",
            "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-obs-build-5.14.21-150400.24.21.2.aarch64",
            "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-obs-build-5.14.21-150400.24.21.2.ppc64le",
            "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-obs-build-5.14.21-150400.24.21.2.s390x",
            "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-obs-build-5.14.21-150400.24.21.2.x86_64",
            "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-source-5.14.21-150400.24.21.2.noarch",
            "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-syms-5.14.21-150400.24.21.1.aarch64",
            "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-syms-5.14.21-150400.24.21.1.ppc64le",
            "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-syms-5.14.21-150400.24.21.1.s390x",
            "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-syms-5.14.21-150400.24.21.1.x86_64",
            "SUSE Linux Enterprise Module for Legacy 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.21.2.aarch64",
            "SUSE Linux Enterprise Module for Legacy 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.21.2.ppc64le",
            "SUSE Linux Enterprise Module for Legacy 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.21.2.s390x",
            "SUSE Linux Enterprise Module for Legacy 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.21.2.x86_64",
            "SUSE Linux Enterprise Workstation Extension 15 SP4:kernel-default-extra-5.14.21-150400.24.21.2.x86_64",
            "openSUSE Leap 15.4:cluster-md-kmp-64kb-5.14.21-150400.24.21.2.aarch64",
            "openSUSE Leap 15.4:cluster-md-kmp-default-5.14.21-150400.24.21.2.aarch64",
            "openSUSE Leap 15.4:cluster-md-kmp-default-5.14.21-150400.24.21.2.ppc64le",
            "openSUSE Leap 15.4:cluster-md-kmp-default-5.14.21-150400.24.21.2.s390x",
            "openSUSE Leap 15.4:cluster-md-kmp-default-5.14.21-150400.24.21.2.x86_64",
            "openSUSE Leap 15.4:dlm-kmp-64kb-5.14.21-150400.24.21.2.aarch64",
            "openSUSE Leap 15.4:dlm-kmp-default-5.14.21-150400.24.21.2.aarch64",
            "openSUSE Leap 15.4:dlm-kmp-default-5.14.21-150400.24.21.2.ppc64le",
            "openSUSE Leap 15.4:dlm-kmp-default-5.14.21-150400.24.21.2.s390x",
            "openSUSE Leap 15.4:dlm-kmp-default-5.14.21-150400.24.21.2.x86_64",
            "openSUSE Leap 15.4:dtb-allwinner-5.14.21-150400.24.21.1.aarch64",
            "openSUSE Leap 15.4:dtb-altera-5.14.21-150400.24.21.1.aarch64",
            "openSUSE Leap 15.4:dtb-amazon-5.14.21-150400.24.21.1.aarch64",
            "openSUSE Leap 15.4:dtb-amd-5.14.21-150400.24.21.1.aarch64",
            "openSUSE Leap 15.4:dtb-amlogic-5.14.21-150400.24.21.1.aarch64",
            "openSUSE Leap 15.4:dtb-apm-5.14.21-150400.24.21.1.aarch64",
            "openSUSE Leap 15.4:dtb-apple-5.14.21-150400.24.21.1.aarch64",
            "openSUSE Leap 15.4:dtb-arm-5.14.21-150400.24.21.1.aarch64",
            "openSUSE Leap 15.4:dtb-broadcom-5.14.21-150400.24.21.1.aarch64",
            "openSUSE Leap 15.4:dtb-cavium-5.14.21-150400.24.21.1.aarch64",
            "openSUSE Leap 15.4:dtb-exynos-5.14.21-150400.24.21.1.aarch64",
            "openSUSE Leap 15.4:dtb-freescale-5.14.21-150400.24.21.1.aarch64",
            "openSUSE Leap 15.4:dtb-hisilicon-5.14.21-150400.24.21.1.aarch64",
            "openSUSE Leap 15.4:dtb-lg-5.14.21-150400.24.21.1.aarch64",
            "openSUSE Leap 15.4:dtb-marvell-5.14.21-150400.24.21.1.aarch64",
            "openSUSE Leap 15.4:dtb-mediatek-5.14.21-150400.24.21.1.aarch64",
            "openSUSE Leap 15.4:dtb-nvidia-5.14.21-150400.24.21.1.aarch64",
            "openSUSE Leap 15.4:dtb-qcom-5.14.21-150400.24.21.1.aarch64",
            "openSUSE Leap 15.4:dtb-renesas-5.14.21-150400.24.21.1.aarch64",
            "openSUSE Leap 15.4:dtb-rockchip-5.14.21-150400.24.21.1.aarch64",
            "openSUSE Leap 15.4:dtb-socionext-5.14.21-150400.24.21.1.aarch64",
            "openSUSE Leap 15.4:dtb-sprd-5.14.21-150400.24.21.1.aarch64",
            "openSUSE Leap 15.4:dtb-xilinx-5.14.21-150400.24.21.1.aarch64",
            "openSUSE Leap 15.4:gfs2-kmp-64kb-5.14.21-150400.24.21.2.aarch64",
            "openSUSE Leap 15.4:gfs2-kmp-default-5.14.21-150400.24.21.2.aarch64",
            "openSUSE Leap 15.4:gfs2-kmp-default-5.14.21-150400.24.21.2.ppc64le",
            "openSUSE Leap 15.4:gfs2-kmp-default-5.14.21-150400.24.21.2.s390x",
            "openSUSE Leap 15.4:gfs2-kmp-default-5.14.21-150400.24.21.2.x86_64",
            "openSUSE Leap 15.4:kernel-64kb-5.14.21-150400.24.21.2.aarch64",
            "openSUSE Leap 15.4:kernel-64kb-devel-5.14.21-150400.24.21.2.aarch64",
            "openSUSE Leap 15.4:kernel-64kb-extra-5.14.21-150400.24.21.2.aarch64",
            "openSUSE Leap 15.4:kernel-64kb-livepatch-devel-5.14.21-150400.24.21.2.aarch64",
            "openSUSE Leap 15.4:kernel-64kb-optional-5.14.21-150400.24.21.2.aarch64",
            "openSUSE Leap 15.4:kernel-debug-5.14.21-150400.24.21.2.ppc64le",
            "openSUSE Leap 15.4:kernel-debug-5.14.21-150400.24.21.2.x86_64",
            "openSUSE Leap 15.4:kernel-debug-devel-5.14.21-150400.24.21.2.ppc64le",
            "openSUSE Leap 15.4:kernel-debug-devel-5.14.21-150400.24.21.2.x86_64",
            "openSUSE Leap 15.4:kernel-debug-livepatch-devel-5.14.21-150400.24.21.2.ppc64le",
            "openSUSE Leap 15.4:kernel-debug-livepatch-devel-5.14.21-150400.24.21.2.x86_64",
            "openSUSE Leap 15.4:kernel-default-5.14.21-150400.24.21.2.aarch64",
            "openSUSE Leap 15.4:kernel-default-5.14.21-150400.24.21.2.ppc64le",
            "openSUSE Leap 15.4:kernel-default-5.14.21-150400.24.21.2.s390x",
            "openSUSE Leap 15.4:kernel-default-5.14.21-150400.24.21.2.x86_64",
            "openSUSE Leap 15.4:kernel-default-base-5.14.21-150400.24.21.2.150400.24.7.2.aarch64",
            "openSUSE Leap 15.4:kernel-default-base-5.14.21-150400.24.21.2.150400.24.7.2.ppc64le",
            "openSUSE Leap 15.4:kernel-default-base-5.14.21-150400.24.21.2.150400.24.7.2.s390x",
            "openSUSE Leap 15.4:kernel-default-base-5.14.21-150400.24.21.2.150400.24.7.2.x86_64",
            "openSUSE Leap 15.4:kernel-default-base-rebuild-5.14.21-150400.24.21.2.150400.24.7.2.aarch64",
            "openSUSE Leap 15.4:kernel-default-base-rebuild-5.14.21-150400.24.21.2.150400.24.7.2.ppc64le",
            "openSUSE Leap 15.4:kernel-default-base-rebuild-5.14.21-150400.24.21.2.150400.24.7.2.s390x",
            "openSUSE Leap 15.4:kernel-default-base-rebuild-5.14.21-150400.24.21.2.150400.24.7.2.x86_64",
            "openSUSE Leap 15.4:kernel-default-devel-5.14.21-150400.24.21.2.aarch64",
            "openSUSE Leap 15.4:kernel-default-devel-5.14.21-150400.24.21.2.ppc64le",
            "openSUSE Leap 15.4:kernel-default-devel-5.14.21-150400.24.21.2.s390x",
            "openSUSE Leap 15.4:kernel-default-devel-5.14.21-150400.24.21.2.x86_64",
            "openSUSE Leap 15.4:kernel-default-extra-5.14.21-150400.24.21.2.aarch64",
            "openSUSE Leap 15.4:kernel-default-extra-5.14.21-150400.24.21.2.ppc64le",
            "openSUSE Leap 15.4:kernel-default-extra-5.14.21-150400.24.21.2.s390x",
            "openSUSE Leap 15.4:kernel-default-extra-5.14.21-150400.24.21.2.x86_64",
            "openSUSE Leap 15.4:kernel-default-livepatch-5.14.21-150400.24.21.2.aarch64",
            "openSUSE Leap 15.4:kernel-default-livepatch-5.14.21-150400.24.21.2.ppc64le",
            "openSUSE Leap 15.4:kernel-default-livepatch-5.14.21-150400.24.21.2.s390x",
            "openSUSE Leap 15.4:kernel-default-livepatch-5.14.21-150400.24.21.2.x86_64",
            "openSUSE Leap 15.4:kernel-default-livepatch-devel-5.14.21-150400.24.21.2.aarch64",
            "openSUSE Leap 15.4:kernel-default-livepatch-devel-5.14.21-150400.24.21.2.ppc64le",
            "openSUSE Leap 15.4:kernel-default-livepatch-devel-5.14.21-150400.24.21.2.s390x",
            "openSUSE Leap 15.4:kernel-default-livepatch-devel-5.14.21-150400.24.21.2.x86_64",
            "openSUSE Leap 15.4:kernel-default-optional-5.14.21-150400.24.21.2.aarch64",
            "openSUSE Leap 15.4:kernel-default-optional-5.14.21-150400.24.21.2.ppc64le",
            "openSUSE Leap 15.4:kernel-default-optional-5.14.21-150400.24.21.2.s390x",
            "openSUSE Leap 15.4:kernel-default-optional-5.14.21-150400.24.21.2.x86_64",
            "openSUSE Leap 15.4:kernel-devel-5.14.21-150400.24.21.2.noarch",
            "openSUSE Leap 15.4:kernel-docs-5.14.21-150400.24.21.3.noarch",
            "openSUSE Leap 15.4:kernel-docs-html-5.14.21-150400.24.21.3.noarch",
            "openSUSE Leap 15.4:kernel-kvmsmall-5.14.21-150400.24.21.2.aarch64",
            "openSUSE Leap 15.4:kernel-kvmsmall-5.14.21-150400.24.21.2.ppc64le",
            "openSUSE Leap 15.4:kernel-kvmsmall-5.14.21-150400.24.21.2.x86_64",
            "openSUSE Leap 15.4:kernel-kvmsmall-devel-5.14.21-150400.24.21.2.aarch64",
            "openSUSE Leap 15.4:kernel-kvmsmall-devel-5.14.21-150400.24.21.2.ppc64le",
            "openSUSE Leap 15.4:kernel-kvmsmall-devel-5.14.21-150400.24.21.2.x86_64",
            "openSUSE Leap 15.4:kernel-kvmsmall-livepatch-devel-5.14.21-150400.24.21.2.aarch64",
            "openSUSE Leap 15.4:kernel-kvmsmall-livepatch-devel-5.14.21-150400.24.21.2.ppc64le",
            "openSUSE Leap 15.4:kernel-kvmsmall-livepatch-devel-5.14.21-150400.24.21.2.x86_64",
            "openSUSE Leap 15.4:kernel-macros-5.14.21-150400.24.21.2.noarch",
            "openSUSE Leap 15.4:kernel-obs-build-5.14.21-150400.24.21.2.aarch64",
            "openSUSE Leap 15.4:kernel-obs-build-5.14.21-150400.24.21.2.ppc64le",
            "openSUSE Leap 15.4:kernel-obs-build-5.14.21-150400.24.21.2.s390x",
            "openSUSE Leap 15.4:kernel-obs-build-5.14.21-150400.24.21.2.x86_64",
            "openSUSE Leap 15.4:kernel-obs-qa-5.14.21-150400.24.21.1.aarch64",
            "openSUSE Leap 15.4:kernel-obs-qa-5.14.21-150400.24.21.1.ppc64le",
            "openSUSE Leap 15.4:kernel-obs-qa-5.14.21-150400.24.21.1.s390x",
            "openSUSE Leap 15.4:kernel-obs-qa-5.14.21-150400.24.21.1.x86_64",
            "openSUSE Leap 15.4:kernel-source-5.14.21-150400.24.21.2.noarch",
            "openSUSE Leap 15.4:kernel-source-vanilla-5.14.21-150400.24.21.2.noarch",
            "openSUSE Leap 15.4:kernel-syms-5.14.21-150400.24.21.1.aarch64",
            "openSUSE Leap 15.4:kernel-syms-5.14.21-150400.24.21.1.ppc64le",
            "openSUSE Leap 15.4:kernel-syms-5.14.21-150400.24.21.1.s390x",
            "openSUSE Leap 15.4:kernel-syms-5.14.21-150400.24.21.1.x86_64",
            "openSUSE Leap 15.4:kernel-zfcpdump-5.14.21-150400.24.21.2.s390x",
            "openSUSE Leap 15.4:kselftests-kmp-64kb-5.14.21-150400.24.21.2.aarch64",
            "openSUSE Leap 15.4:kselftests-kmp-default-5.14.21-150400.24.21.2.aarch64",
            "openSUSE Leap 15.4:kselftests-kmp-default-5.14.21-150400.24.21.2.ppc64le",
            "openSUSE Leap 15.4:kselftests-kmp-default-5.14.21-150400.24.21.2.s390x",
            "openSUSE Leap 15.4:kselftests-kmp-default-5.14.21-150400.24.21.2.x86_64",
            "openSUSE Leap 15.4:ocfs2-kmp-64kb-5.14.21-150400.24.21.2.aarch64",
            "openSUSE Leap 15.4:ocfs2-kmp-default-5.14.21-150400.24.21.2.aarch64",
            "openSUSE Leap 15.4:ocfs2-kmp-default-5.14.21-150400.24.21.2.ppc64le",
            "openSUSE Leap 15.4:ocfs2-kmp-default-5.14.21-150400.24.21.2.s390x",
            "openSUSE Leap 15.4:ocfs2-kmp-default-5.14.21-150400.24.21.2.x86_64",
            "openSUSE Leap 15.4:reiserfs-kmp-64kb-5.14.21-150400.24.21.2.aarch64",
            "openSUSE Leap 15.4:reiserfs-kmp-default-5.14.21-150400.24.21.2.aarch64",
            "openSUSE Leap 15.4:reiserfs-kmp-default-5.14.21-150400.24.21.2.ppc64le",
            "openSUSE Leap 15.4:reiserfs-kmp-default-5.14.21-150400.24.21.2.s390x",
            "openSUSE Leap 15.4:reiserfs-kmp-default-5.14.21-150400.24.21.2.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2022-09-16T15:30:19Z",
          "details": "moderate"
        }
      ],
      "title": "CVE-2022-2873"
    },
    {
      "cve": "CVE-2022-2905",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2022-2905"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "An out-of-bounds memory read flaw was found in the Linux kernel\u0027s BPF subsystem in how a user calls the bpf_tail_call function with a key larger than the max_entries of the map. This flaw allows a local user to gain unauthorized access to data.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.21.2.aarch64",
          "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.21.2.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.21.2.s390x",
          "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.21.2.x86_64",
          "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.21.2.aarch64",
          "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.21.2.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.21.2.s390x",
          "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.21.2.x86_64",
          "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.21.2.aarch64",
          "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.21.2.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.21.2.s390x",
          "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.21.2.x86_64",
          "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.21.2.aarch64",
          "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.21.2.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.21.2.s390x",
          "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.21.2.x86_64",
          "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.21.2.ppc64le",
          "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.21.2.s390x",
          "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.21.2.x86_64",
          "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.21.2.ppc64le",
          "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.21.2.s390x",
          "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.21.2.x86_64",
          "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_21-default-1-150400.9.3.2.ppc64le",
          "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_21-default-1-150400.9.3.2.s390x",
          "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_21-default-1-150400.9.3.2.x86_64",
          "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-64kb-5.14.21-150400.24.21.2.aarch64",
          "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-64kb-devel-5.14.21-150400.24.21.2.aarch64",
          "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-5.14.21-150400.24.21.2.aarch64",
          "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-5.14.21-150400.24.21.2.ppc64le",
          "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-5.14.21-150400.24.21.2.s390x",
          "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-5.14.21-150400.24.21.2.x86_64",
          "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-base-5.14.21-150400.24.21.2.150400.24.7.2.aarch64",
          "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-base-5.14.21-150400.24.21.2.150400.24.7.2.ppc64le",
          "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-base-5.14.21-150400.24.21.2.150400.24.7.2.s390x",
          "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-base-5.14.21-150400.24.21.2.150400.24.7.2.x86_64",
          "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-devel-5.14.21-150400.24.21.2.aarch64",
          "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-devel-5.14.21-150400.24.21.2.ppc64le",
          "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-devel-5.14.21-150400.24.21.2.s390x",
          "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-devel-5.14.21-150400.24.21.2.x86_64",
          "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-devel-5.14.21-150400.24.21.2.noarch",
          "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-macros-5.14.21-150400.24.21.2.noarch",
          "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-zfcpdump-5.14.21-150400.24.21.2.s390x",
          "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-docs-5.14.21-150400.24.21.3.noarch",
          "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-obs-build-5.14.21-150400.24.21.2.aarch64",
          "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-obs-build-5.14.21-150400.24.21.2.ppc64le",
          "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-obs-build-5.14.21-150400.24.21.2.s390x",
          "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-obs-build-5.14.21-150400.24.21.2.x86_64",
          "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-source-5.14.21-150400.24.21.2.noarch",
          "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-syms-5.14.21-150400.24.21.1.aarch64",
          "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-syms-5.14.21-150400.24.21.1.ppc64le",
          "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-syms-5.14.21-150400.24.21.1.s390x",
          "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-syms-5.14.21-150400.24.21.1.x86_64",
          "SUSE Linux Enterprise Module for Legacy 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.21.2.aarch64",
          "SUSE Linux Enterprise Module for Legacy 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.21.2.ppc64le",
          "SUSE Linux Enterprise Module for Legacy 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.21.2.s390x",
          "SUSE Linux Enterprise Module for Legacy 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.21.2.x86_64",
          "SUSE Linux Enterprise Workstation Extension 15 SP4:kernel-default-extra-5.14.21-150400.24.21.2.x86_64",
          "openSUSE Leap 15.4:cluster-md-kmp-64kb-5.14.21-150400.24.21.2.aarch64",
          "openSUSE Leap 15.4:cluster-md-kmp-default-5.14.21-150400.24.21.2.aarch64",
          "openSUSE Leap 15.4:cluster-md-kmp-default-5.14.21-150400.24.21.2.ppc64le",
          "openSUSE Leap 15.4:cluster-md-kmp-default-5.14.21-150400.24.21.2.s390x",
          "openSUSE Leap 15.4:cluster-md-kmp-default-5.14.21-150400.24.21.2.x86_64",
          "openSUSE Leap 15.4:dlm-kmp-64kb-5.14.21-150400.24.21.2.aarch64",
          "openSUSE Leap 15.4:dlm-kmp-default-5.14.21-150400.24.21.2.aarch64",
          "openSUSE Leap 15.4:dlm-kmp-default-5.14.21-150400.24.21.2.ppc64le",
          "openSUSE Leap 15.4:dlm-kmp-default-5.14.21-150400.24.21.2.s390x",
          "openSUSE Leap 15.4:dlm-kmp-default-5.14.21-150400.24.21.2.x86_64",
          "openSUSE Leap 15.4:dtb-allwinner-5.14.21-150400.24.21.1.aarch64",
          "openSUSE Leap 15.4:dtb-altera-5.14.21-150400.24.21.1.aarch64",
          "openSUSE Leap 15.4:dtb-amazon-5.14.21-150400.24.21.1.aarch64",
          "openSUSE Leap 15.4:dtb-amd-5.14.21-150400.24.21.1.aarch64",
          "openSUSE Leap 15.4:dtb-amlogic-5.14.21-150400.24.21.1.aarch64",
          "openSUSE Leap 15.4:dtb-apm-5.14.21-150400.24.21.1.aarch64",
          "openSUSE Leap 15.4:dtb-apple-5.14.21-150400.24.21.1.aarch64",
          "openSUSE Leap 15.4:dtb-arm-5.14.21-150400.24.21.1.aarch64",
          "openSUSE Leap 15.4:dtb-broadcom-5.14.21-150400.24.21.1.aarch64",
          "openSUSE Leap 15.4:dtb-cavium-5.14.21-150400.24.21.1.aarch64",
          "openSUSE Leap 15.4:dtb-exynos-5.14.21-150400.24.21.1.aarch64",
          "openSUSE Leap 15.4:dtb-freescale-5.14.21-150400.24.21.1.aarch64",
          "openSUSE Leap 15.4:dtb-hisilicon-5.14.21-150400.24.21.1.aarch64",
          "openSUSE Leap 15.4:dtb-lg-5.14.21-150400.24.21.1.aarch64",
          "openSUSE Leap 15.4:dtb-marvell-5.14.21-150400.24.21.1.aarch64",
          "openSUSE Leap 15.4:dtb-mediatek-5.14.21-150400.24.21.1.aarch64",
          "openSUSE Leap 15.4:dtb-nvidia-5.14.21-150400.24.21.1.aarch64",
          "openSUSE Leap 15.4:dtb-qcom-5.14.21-150400.24.21.1.aarch64",
          "openSUSE Leap 15.4:dtb-renesas-5.14.21-150400.24.21.1.aarch64",
          "openSUSE Leap 15.4:dtb-rockchip-5.14.21-150400.24.21.1.aarch64",
          "openSUSE Leap 15.4:dtb-socionext-5.14.21-150400.24.21.1.aarch64",
          "openSUSE Leap 15.4:dtb-sprd-5.14.21-150400.24.21.1.aarch64",
          "openSUSE Leap 15.4:dtb-xilinx-5.14.21-150400.24.21.1.aarch64",
          "openSUSE Leap 15.4:gfs2-kmp-64kb-5.14.21-150400.24.21.2.aarch64",
          "openSUSE Leap 15.4:gfs2-kmp-default-5.14.21-150400.24.21.2.aarch64",
          "openSUSE Leap 15.4:gfs2-kmp-default-5.14.21-150400.24.21.2.ppc64le",
          "openSUSE Leap 15.4:gfs2-kmp-default-5.14.21-150400.24.21.2.s390x",
          "openSUSE Leap 15.4:gfs2-kmp-default-5.14.21-150400.24.21.2.x86_64",
          "openSUSE Leap 15.4:kernel-64kb-5.14.21-150400.24.21.2.aarch64",
          "openSUSE Leap 15.4:kernel-64kb-devel-5.14.21-150400.24.21.2.aarch64",
          "openSUSE Leap 15.4:kernel-64kb-extra-5.14.21-150400.24.21.2.aarch64",
          "openSUSE Leap 15.4:kernel-64kb-livepatch-devel-5.14.21-150400.24.21.2.aarch64",
          "openSUSE Leap 15.4:kernel-64kb-optional-5.14.21-150400.24.21.2.aarch64",
          "openSUSE Leap 15.4:kernel-debug-5.14.21-150400.24.21.2.ppc64le",
          "openSUSE Leap 15.4:kernel-debug-5.14.21-150400.24.21.2.x86_64",
          "openSUSE Leap 15.4:kernel-debug-devel-5.14.21-150400.24.21.2.ppc64le",
          "openSUSE Leap 15.4:kernel-debug-devel-5.14.21-150400.24.21.2.x86_64",
          "openSUSE Leap 15.4:kernel-debug-livepatch-devel-5.14.21-150400.24.21.2.ppc64le",
          "openSUSE Leap 15.4:kernel-debug-livepatch-devel-5.14.21-150400.24.21.2.x86_64",
          "openSUSE Leap 15.4:kernel-default-5.14.21-150400.24.21.2.aarch64",
          "openSUSE Leap 15.4:kernel-default-5.14.21-150400.24.21.2.ppc64le",
          "openSUSE Leap 15.4:kernel-default-5.14.21-150400.24.21.2.s390x",
          "openSUSE Leap 15.4:kernel-default-5.14.21-150400.24.21.2.x86_64",
          "openSUSE Leap 15.4:kernel-default-base-5.14.21-150400.24.21.2.150400.24.7.2.aarch64",
          "openSUSE Leap 15.4:kernel-default-base-5.14.21-150400.24.21.2.150400.24.7.2.ppc64le",
          "openSUSE Leap 15.4:kernel-default-base-5.14.21-150400.24.21.2.150400.24.7.2.s390x",
          "openSUSE Leap 15.4:kernel-default-base-5.14.21-150400.24.21.2.150400.24.7.2.x86_64",
          "openSUSE Leap 15.4:kernel-default-base-rebuild-5.14.21-150400.24.21.2.150400.24.7.2.aarch64",
          "openSUSE Leap 15.4:kernel-default-base-rebuild-5.14.21-150400.24.21.2.150400.24.7.2.ppc64le",
          "openSUSE Leap 15.4:kernel-default-base-rebuild-5.14.21-150400.24.21.2.150400.24.7.2.s390x",
          "openSUSE Leap 15.4:kernel-default-base-rebuild-5.14.21-150400.24.21.2.150400.24.7.2.x86_64",
          "openSUSE Leap 15.4:kernel-default-devel-5.14.21-150400.24.21.2.aarch64",
          "openSUSE Leap 15.4:kernel-default-devel-5.14.21-150400.24.21.2.ppc64le",
          "openSUSE Leap 15.4:kernel-default-devel-5.14.21-150400.24.21.2.s390x",
          "openSUSE Leap 15.4:kernel-default-devel-5.14.21-150400.24.21.2.x86_64",
          "openSUSE Leap 15.4:kernel-default-extra-5.14.21-150400.24.21.2.aarch64",
          "openSUSE Leap 15.4:kernel-default-extra-5.14.21-150400.24.21.2.ppc64le",
          "openSUSE Leap 15.4:kernel-default-extra-5.14.21-150400.24.21.2.s390x",
          "openSUSE Leap 15.4:kernel-default-extra-5.14.21-150400.24.21.2.x86_64",
          "openSUSE Leap 15.4:kernel-default-livepatch-5.14.21-150400.24.21.2.aarch64",
          "openSUSE Leap 15.4:kernel-default-livepatch-5.14.21-150400.24.21.2.ppc64le",
          "openSUSE Leap 15.4:kernel-default-livepatch-5.14.21-150400.24.21.2.s390x",
          "openSUSE Leap 15.4:kernel-default-livepatch-5.14.21-150400.24.21.2.x86_64",
          "openSUSE Leap 15.4:kernel-default-livepatch-devel-5.14.21-150400.24.21.2.aarch64",
          "openSUSE Leap 15.4:kernel-default-livepatch-devel-5.14.21-150400.24.21.2.ppc64le",
          "openSUSE Leap 15.4:kernel-default-livepatch-devel-5.14.21-150400.24.21.2.s390x",
          "openSUSE Leap 15.4:kernel-default-livepatch-devel-5.14.21-150400.24.21.2.x86_64",
          "openSUSE Leap 15.4:kernel-default-optional-5.14.21-150400.24.21.2.aarch64",
          "openSUSE Leap 15.4:kernel-default-optional-5.14.21-150400.24.21.2.ppc64le",
          "openSUSE Leap 15.4:kernel-default-optional-5.14.21-150400.24.21.2.s390x",
          "openSUSE Leap 15.4:kernel-default-optional-5.14.21-150400.24.21.2.x86_64",
          "openSUSE Leap 15.4:kernel-devel-5.14.21-150400.24.21.2.noarch",
          "openSUSE Leap 15.4:kernel-docs-5.14.21-150400.24.21.3.noarch",
          "openSUSE Leap 15.4:kernel-docs-html-5.14.21-150400.24.21.3.noarch",
          "openSUSE Leap 15.4:kernel-kvmsmall-5.14.21-150400.24.21.2.aarch64",
          "openSUSE Leap 15.4:kernel-kvmsmall-5.14.21-150400.24.21.2.ppc64le",
          "openSUSE Leap 15.4:kernel-kvmsmall-5.14.21-150400.24.21.2.x86_64",
          "openSUSE Leap 15.4:kernel-kvmsmall-devel-5.14.21-150400.24.21.2.aarch64",
          "openSUSE Leap 15.4:kernel-kvmsmall-devel-5.14.21-150400.24.21.2.ppc64le",
          "openSUSE Leap 15.4:kernel-kvmsmall-devel-5.14.21-150400.24.21.2.x86_64",
          "openSUSE Leap 15.4:kernel-kvmsmall-livepatch-devel-5.14.21-150400.24.21.2.aarch64",
          "openSUSE Leap 15.4:kernel-kvmsmall-livepatch-devel-5.14.21-150400.24.21.2.ppc64le",
          "openSUSE Leap 15.4:kernel-kvmsmall-livepatch-devel-5.14.21-150400.24.21.2.x86_64",
          "openSUSE Leap 15.4:kernel-macros-5.14.21-150400.24.21.2.noarch",
          "openSUSE Leap 15.4:kernel-obs-build-5.14.21-150400.24.21.2.aarch64",
          "openSUSE Leap 15.4:kernel-obs-build-5.14.21-150400.24.21.2.ppc64le",
          "openSUSE Leap 15.4:kernel-obs-build-5.14.21-150400.24.21.2.s390x",
          "openSUSE Leap 15.4:kernel-obs-build-5.14.21-150400.24.21.2.x86_64",
          "openSUSE Leap 15.4:kernel-obs-qa-5.14.21-150400.24.21.1.aarch64",
          "openSUSE Leap 15.4:kernel-obs-qa-5.14.21-150400.24.21.1.ppc64le",
          "openSUSE Leap 15.4:kernel-obs-qa-5.14.21-150400.24.21.1.s390x",
          "openSUSE Leap 15.4:kernel-obs-qa-5.14.21-150400.24.21.1.x86_64",
          "openSUSE Leap 15.4:kernel-source-5.14.21-150400.24.21.2.noarch",
          "openSUSE Leap 15.4:kernel-source-vanilla-5.14.21-150400.24.21.2.noarch",
          "openSUSE Leap 15.4:kernel-syms-5.14.21-150400.24.21.1.aarch64",
          "openSUSE Leap 15.4:kernel-syms-5.14.21-150400.24.21.1.ppc64le",
          "openSUSE Leap 15.4:kernel-syms-5.14.21-150400.24.21.1.s390x",
          "openSUSE Leap 15.4:kernel-syms-5.14.21-150400.24.21.1.x86_64",
          "openSUSE Leap 15.4:kernel-zfcpdump-5.14.21-150400.24.21.2.s390x",
          "openSUSE Leap 15.4:kselftests-kmp-64kb-5.14.21-150400.24.21.2.aarch64",
          "openSUSE Leap 15.4:kselftests-kmp-default-5.14.21-150400.24.21.2.aarch64",
          "openSUSE Leap 15.4:kselftests-kmp-default-5.14.21-150400.24.21.2.ppc64le",
          "openSUSE Leap 15.4:kselftests-kmp-default-5.14.21-150400.24.21.2.s390x",
          "openSUSE Leap 15.4:kselftests-kmp-default-5.14.21-150400.24.21.2.x86_64",
          "openSUSE Leap 15.4:ocfs2-kmp-64kb-5.14.21-150400.24.21.2.aarch64",
          "openSUSE Leap 15.4:ocfs2-kmp-default-5.14.21-150400.24.21.2.aarch64",
          "openSUSE Leap 15.4:ocfs2-kmp-default-5.14.21-150400.24.21.2.ppc64le",
          "openSUSE Leap 15.4:ocfs2-kmp-default-5.14.21-150400.24.21.2.s390x",
          "openSUSE Leap 15.4:ocfs2-kmp-default-5.14.21-150400.24.21.2.x86_64",
          "openSUSE Leap 15.4:reiserfs-kmp-64kb-5.14.21-150400.24.21.2.aarch64",
          "openSUSE Leap 15.4:reiserfs-kmp-default-5.14.21-150400.24.21.2.aarch64",
          "openSUSE Leap 15.4:reiserfs-kmp-default-5.14.21-150400.24.21.2.ppc64le",
          "openSUSE Leap 15.4:reiserfs-kmp-default-5.14.21-150400.24.21.2.s390x",
          "openSUSE Leap 15.4:reiserfs-kmp-default-5.14.21-150400.24.21.2.x86_64"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2022-2905",
          "url": "https://www.suse.com/security/cve/CVE-2022-2905"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1202860 for CVE-2022-2905",
          "url": "https://bugzilla.suse.com/1202860"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.21.2.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.21.2.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.21.2.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.21.2.x86_64",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.21.2.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.21.2.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.21.2.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.21.2.x86_64",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.21.2.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.21.2.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.21.2.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.21.2.x86_64",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.21.2.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.21.2.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.21.2.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.21.2.x86_64",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.21.2.ppc64le",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.21.2.s390x",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.21.2.x86_64",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.21.2.ppc64le",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.21.2.s390x",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.21.2.x86_64",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_21-default-1-150400.9.3.2.ppc64le",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_21-default-1-150400.9.3.2.s390x",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_21-default-1-150400.9.3.2.x86_64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-64kb-5.14.21-150400.24.21.2.aarch64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-64kb-devel-5.14.21-150400.24.21.2.aarch64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-5.14.21-150400.24.21.2.aarch64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-5.14.21-150400.24.21.2.ppc64le",
            "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-5.14.21-150400.24.21.2.s390x",
            "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-5.14.21-150400.24.21.2.x86_64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-base-5.14.21-150400.24.21.2.150400.24.7.2.aarch64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-base-5.14.21-150400.24.21.2.150400.24.7.2.ppc64le",
            "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-base-5.14.21-150400.24.21.2.150400.24.7.2.s390x",
            "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-base-5.14.21-150400.24.21.2.150400.24.7.2.x86_64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-devel-5.14.21-150400.24.21.2.aarch64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-devel-5.14.21-150400.24.21.2.ppc64le",
            "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-devel-5.14.21-150400.24.21.2.s390x",
            "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-devel-5.14.21-150400.24.21.2.x86_64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-devel-5.14.21-150400.24.21.2.noarch",
            "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-macros-5.14.21-150400.24.21.2.noarch",
            "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-zfcpdump-5.14.21-150400.24.21.2.s390x",
            "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-docs-5.14.21-150400.24.21.3.noarch",
            "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-obs-build-5.14.21-150400.24.21.2.aarch64",
            "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-obs-build-5.14.21-150400.24.21.2.ppc64le",
            "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-obs-build-5.14.21-150400.24.21.2.s390x",
            "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-obs-build-5.14.21-150400.24.21.2.x86_64",
            "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-source-5.14.21-150400.24.21.2.noarch",
            "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-syms-5.14.21-150400.24.21.1.aarch64",
            "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-syms-5.14.21-150400.24.21.1.ppc64le",
            "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-syms-5.14.21-150400.24.21.1.s390x",
            "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-syms-5.14.21-150400.24.21.1.x86_64",
            "SUSE Linux Enterprise Module for Legacy 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.21.2.aarch64",
            "SUSE Linux Enterprise Module for Legacy 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.21.2.ppc64le",
            "SUSE Linux Enterprise Module for Legacy 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.21.2.s390x",
            "SUSE Linux Enterprise Module for Legacy 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.21.2.x86_64",
            "SUSE Linux Enterprise Workstation Extension 15 SP4:kernel-default-extra-5.14.21-150400.24.21.2.x86_64",
            "openSUSE Leap 15.4:cluster-md-kmp-64kb-5.14.21-150400.24.21.2.aarch64",
            "openSUSE Leap 15.4:cluster-md-kmp-default-5.14.21-150400.24.21.2.aarch64",
            "openSUSE Leap 15.4:cluster-md-kmp-default-5.14.21-150400.24.21.2.ppc64le",
            "openSUSE Leap 15.4:cluster-md-kmp-default-5.14.21-150400.24.21.2.s390x",
            "openSUSE Leap 15.4:cluster-md-kmp-default-5.14.21-150400.24.21.2.x86_64",
            "openSUSE Leap 15.4:dlm-kmp-64kb-5.14.21-150400.24.21.2.aarch64",
            "openSUSE Leap 15.4:dlm-kmp-default-5.14.21-150400.24.21.2.aarch64",
            "openSUSE Leap 15.4:dlm-kmp-default-5.14.21-150400.24.21.2.ppc64le",
            "openSUSE Leap 15.4:dlm-kmp-default-5.14.21-150400.24.21.2.s390x",
            "openSUSE Leap 15.4:dlm-kmp-default-5.14.21-150400.24.21.2.x86_64",
            "openSUSE Leap 15.4:dtb-allwinner-5.14.21-150400.24.21.1.aarch64",
            "openSUSE Leap 15.4:dtb-altera-5.14.21-150400.24.21.1.aarch64",
            "openSUSE Leap 15.4:dtb-amazon-5.14.21-150400.24.21.1.aarch64",
            "openSUSE Leap 15.4:dtb-amd-5.14.21-150400.24.21.1.aarch64",
            "openSUSE Leap 15.4:dtb-amlogic-5.14.21-150400.24.21.1.aarch64",
            "openSUSE Leap 15.4:dtb-apm-5.14.21-150400.24.21.1.aarch64",
            "openSUSE Leap 15.4:dtb-apple-5.14.21-150400.24.21.1.aarch64",
            "openSUSE Leap 15.4:dtb-arm-5.14.21-150400.24.21.1.aarch64",
            "openSUSE Leap 15.4:dtb-broadcom-5.14.21-150400.24.21.1.aarch64",
            "openSUSE Leap 15.4:dtb-cavium-5.14.21-150400.24.21.1.aarch64",
            "openSUSE Leap 15.4:dtb-exynos-5.14.21-150400.24.21.1.aarch64",
            "openSUSE Leap 15.4:dtb-freescale-5.14.21-150400.24.21.1.aarch64",
            "openSUSE Leap 15.4:dtb-hisilicon-5.14.21-150400.24.21.1.aarch64",
            "openSUSE Leap 15.4:dtb-lg-5.14.21-150400.24.21.1.aarch64",
            "openSUSE Leap 15.4:dtb-marvell-5.14.21-150400.24.21.1.aarch64",
            "openSUSE Leap 15.4:dtb-mediatek-5.14.21-150400.24.21.1.aarch64",
            "openSUSE Leap 15.4:dtb-nvidia-5.14.21-150400.24.21.1.aarch64",
            "openSUSE Leap 15.4:dtb-qcom-5.14.21-150400.24.21.1.aarch64",
            "openSUSE Leap 15.4:dtb-renesas-5.14.21-150400.24.21.1.aarch64",
            "openSUSE Leap 15.4:dtb-rockchip-5.14.21-150400.24.21.1.aarch64",
            "openSUSE Leap 15.4:dtb-socionext-5.14.21-150400.24.21.1.aarch64",
            "openSUSE Leap 15.4:dtb-sprd-5.14.21-150400.24.21.1.aarch64",
            "openSUSE Leap 15.4:dtb-xilinx-5.14.21-150400.24.21.1.aarch64",
            "openSUSE Leap 15.4:gfs2-kmp-64kb-5.14.21-150400.24.21.2.aarch64",
            "openSUSE Leap 15.4:gfs2-kmp-default-5.14.21-150400.24.21.2.aarch64",
            "openSUSE Leap 15.4:gfs2-kmp-default-5.14.21-150400.24.21.2.ppc64le",
            "openSUSE Leap 15.4:gfs2-kmp-default-5.14.21-150400.24.21.2.s390x",
            "openSUSE Leap 15.4:gfs2-kmp-default-5.14.21-150400.24.21.2.x86_64",
            "openSUSE Leap 15.4:kernel-64kb-5.14.21-150400.24.21.2.aarch64",
            "openSUSE Leap 15.4:kernel-64kb-devel-5.14.21-150400.24.21.2.aarch64",
            "openSUSE Leap 15.4:kernel-64kb-extra-5.14.21-150400.24.21.2.aarch64",
            "openSUSE Leap 15.4:kernel-64kb-livepatch-devel-5.14.21-150400.24.21.2.aarch64",
            "openSUSE Leap 15.4:kernel-64kb-optional-5.14.21-150400.24.21.2.aarch64",
            "openSUSE Leap 15.4:kernel-debug-5.14.21-150400.24.21.2.ppc64le",
            "openSUSE Leap 15.4:kernel-debug-5.14.21-150400.24.21.2.x86_64",
            "openSUSE Leap 15.4:kernel-debug-devel-5.14.21-150400.24.21.2.ppc64le",
            "openSUSE Leap 15.4:kernel-debug-devel-5.14.21-150400.24.21.2.x86_64",
            "openSUSE Leap 15.4:kernel-debug-livepatch-devel-5.14.21-150400.24.21.2.ppc64le",
            "openSUSE Leap 15.4:kernel-debug-livepatch-devel-5.14.21-150400.24.21.2.x86_64",
            "openSUSE Leap 15.4:kernel-default-5.14.21-150400.24.21.2.aarch64",
            "openSUSE Leap 15.4:kernel-default-5.14.21-150400.24.21.2.ppc64le",
            "openSUSE Leap 15.4:kernel-default-5.14.21-150400.24.21.2.s390x",
            "openSUSE Leap 15.4:kernel-default-5.14.21-150400.24.21.2.x86_64",
            "openSUSE Leap 15.4:kernel-default-base-5.14.21-150400.24.21.2.150400.24.7.2.aarch64",
            "openSUSE Leap 15.4:kernel-default-base-5.14.21-150400.24.21.2.150400.24.7.2.ppc64le",
            "openSUSE Leap 15.4:kernel-default-base-5.14.21-150400.24.21.2.150400.24.7.2.s390x",
            "openSUSE Leap 15.4:kernel-default-base-5.14.21-150400.24.21.2.150400.24.7.2.x86_64",
            "openSUSE Leap 15.4:kernel-default-base-rebuild-5.14.21-150400.24.21.2.150400.24.7.2.aarch64",
            "openSUSE Leap 15.4:kernel-default-base-rebuild-5.14.21-150400.24.21.2.150400.24.7.2.ppc64le",
            "openSUSE Leap 15.4:kernel-default-base-rebuild-5.14.21-150400.24.21.2.150400.24.7.2.s390x",
            "openSUSE Leap 15.4:kernel-default-base-rebuild-5.14.21-150400.24.21.2.150400.24.7.2.x86_64",
            "openSUSE Leap 15.4:kernel-default-devel-5.14.21-150400.24.21.2.aarch64",
            "openSUSE Leap 15.4:kernel-default-devel-5.14.21-150400.24.21.2.ppc64le",
            "openSUSE Leap 15.4:kernel-default-devel-5.14.21-150400.24.21.2.s390x",
            "openSUSE Leap 15.4:kernel-default-devel-5.14.21-150400.24.21.2.x86_64",
            "openSUSE Leap 15.4:kernel-default-extra-5.14.21-150400.24.21.2.aarch64",
            "openSUSE Leap 15.4:kernel-default-extra-5.14.21-150400.24.21.2.ppc64le",
            "openSUSE Leap 15.4:kernel-default-extra-5.14.21-150400.24.21.2.s390x",
            "openSUSE Leap 15.4:kernel-default-extra-5.14.21-150400.24.21.2.x86_64",
            "openSUSE Leap 15.4:kernel-default-livepatch-5.14.21-150400.24.21.2.aarch64",
            "openSUSE Leap 15.4:kernel-default-livepatch-5.14.21-150400.24.21.2.ppc64le",
            "openSUSE Leap 15.4:kernel-default-livepatch-5.14.21-150400.24.21.2.s390x",
            "openSUSE Leap 15.4:kernel-default-livepatch-5.14.21-150400.24.21.2.x86_64",
            "openSUSE Leap 15.4:kernel-default-livepatch-devel-5.14.21-150400.24.21.2.aarch64",
            "openSUSE Leap 15.4:kernel-default-livepatch-devel-5.14.21-150400.24.21.2.ppc64le",
            "openSUSE Leap 15.4:kernel-default-livepatch-devel-5.14.21-150400.24.21.2.s390x",
            "openSUSE Leap 15.4:kernel-default-livepatch-devel-5.14.21-150400.24.21.2.x86_64",
            "openSUSE Leap 15.4:kernel-default-optional-5.14.21-150400.24.21.2.aarch64",
            "openSUSE Leap 15.4:kernel-default-optional-5.14.21-150400.24.21.2.ppc64le",
            "openSUSE Leap 15.4:kernel-default-optional-5.14.21-150400.24.21.2.s390x",
            "openSUSE Leap 15.4:kernel-default-optional-5.14.21-150400.24.21.2.x86_64",
            "openSUSE Leap 15.4:kernel-devel-5.14.21-150400.24.21.2.noarch",
            "openSUSE Leap 15.4:kernel-docs-5.14.21-150400.24.21.3.noarch",
            "openSUSE Leap 15.4:kernel-docs-html-5.14.21-150400.24.21.3.noarch",
            "openSUSE Leap 15.4:kernel-kvmsmall-5.14.21-150400.24.21.2.aarch64",
            "openSUSE Leap 15.4:kernel-kvmsmall-5.14.21-150400.24.21.2.ppc64le",
            "openSUSE Leap 15.4:kernel-kvmsmall-5.14.21-150400.24.21.2.x86_64",
            "openSUSE Leap 15.4:kernel-kvmsmall-devel-5.14.21-150400.24.21.2.aarch64",
            "openSUSE Leap 15.4:kernel-kvmsmall-devel-5.14.21-150400.24.21.2.ppc64le",
            "openSUSE Leap 15.4:kernel-kvmsmall-devel-5.14.21-150400.24.21.2.x86_64",
            "openSUSE Leap 15.4:kernel-kvmsmall-livepatch-devel-5.14.21-150400.24.21.2.aarch64",
            "openSUSE Leap 15.4:kernel-kvmsmall-livepatch-devel-5.14.21-150400.24.21.2.ppc64le",
            "openSUSE Leap 15.4:kernel-kvmsmall-livepatch-devel-5.14.21-150400.24.21.2.x86_64",
            "openSUSE Leap 15.4:kernel-macros-5.14.21-150400.24.21.2.noarch",
            "openSUSE Leap 15.4:kernel-obs-build-5.14.21-150400.24.21.2.aarch64",
            "openSUSE Leap 15.4:kernel-obs-build-5.14.21-150400.24.21.2.ppc64le",
            "openSUSE Leap 15.4:kernel-obs-build-5.14.21-150400.24.21.2.s390x",
            "openSUSE Leap 15.4:kernel-obs-build-5.14.21-150400.24.21.2.x86_64",
            "openSUSE Leap 15.4:kernel-obs-qa-5.14.21-150400.24.21.1.aarch64",
            "openSUSE Leap 15.4:kernel-obs-qa-5.14.21-150400.24.21.1.ppc64le",
            "openSUSE Leap 15.4:kernel-obs-qa-5.14.21-150400.24.21.1.s390x",
            "openSUSE Leap 15.4:kernel-obs-qa-5.14.21-150400.24.21.1.x86_64",
            "openSUSE Leap 15.4:kernel-source-5.14.21-150400.24.21.2.noarch",
            "openSUSE Leap 15.4:kernel-source-vanilla-5.14.21-150400.24.21.2.noarch",
            "openSUSE Leap 15.4:kernel-syms-5.14.21-150400.24.21.1.aarch64",
            "openSUSE Leap 15.4:kernel-syms-5.14.21-150400.24.21.1.ppc64le",
            "openSUSE Leap 15.4:kernel-syms-5.14.21-150400.24.21.1.s390x",
            "openSUSE Leap 15.4:kernel-syms-5.14.21-150400.24.21.1.x86_64",
            "openSUSE Leap 15.4:kernel-zfcpdump-5.14.21-150400.24.21.2.s390x",
            "openSUSE Leap 15.4:kselftests-kmp-64kb-5.14.21-150400.24.21.2.aarch64",
            "openSUSE Leap 15.4:kselftests-kmp-default-5.14.21-150400.24.21.2.aarch64",
            "openSUSE Leap 15.4:kselftests-kmp-default-5.14.21-150400.24.21.2.ppc64le",
            "openSUSE Leap 15.4:kselftests-kmp-default-5.14.21-150400.24.21.2.s390x",
            "openSUSE Leap 15.4:kselftests-kmp-default-5.14.21-150400.24.21.2.x86_64",
            "openSUSE Leap 15.4:ocfs2-kmp-64kb-5.14.21-150400.24.21.2.aarch64",
            "openSUSE Leap 15.4:ocfs2-kmp-default-5.14.21-150400.24.21.2.aarch64",
            "openSUSE Leap 15.4:ocfs2-kmp-default-5.14.21-150400.24.21.2.ppc64le",
            "openSUSE Leap 15.4:ocfs2-kmp-default-5.14.21-150400.24.21.2.s390x",
            "openSUSE Leap 15.4:ocfs2-kmp-default-5.14.21-150400.24.21.2.x86_64",
            "openSUSE Leap 15.4:reiserfs-kmp-64kb-5.14.21-150400.24.21.2.aarch64",
            "openSUSE Leap 15.4:reiserfs-kmp-default-5.14.21-150400.24.21.2.aarch64",
            "openSUSE Leap 15.4:reiserfs-kmp-default-5.14.21-150400.24.21.2.ppc64le",
            "openSUSE Leap 15.4:reiserfs-kmp-default-5.14.21-150400.24.21.2.s390x",
            "openSUSE Leap 15.4:reiserfs-kmp-default-5.14.21-150400.24.21.2.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 6.2,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N",
            "version": "3.1"
          },
          "products": [
            "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.21.2.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.21.2.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.21.2.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.21.2.x86_64",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.21.2.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.21.2.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.21.2.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.21.2.x86_64",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.21.2.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.21.2.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.21.2.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.21.2.x86_64",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.21.2.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.21.2.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.21.2.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.21.2.x86_64",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.21.2.ppc64le",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.21.2.s390x",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.21.2.x86_64",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.21.2.ppc64le",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.21.2.s390x",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.21.2.x86_64",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_21-default-1-150400.9.3.2.ppc64le",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_21-default-1-150400.9.3.2.s390x",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_21-default-1-150400.9.3.2.x86_64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-64kb-5.14.21-150400.24.21.2.aarch64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-64kb-devel-5.14.21-150400.24.21.2.aarch64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-5.14.21-150400.24.21.2.aarch64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-5.14.21-150400.24.21.2.ppc64le",
            "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-5.14.21-150400.24.21.2.s390x",
            "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-5.14.21-150400.24.21.2.x86_64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-base-5.14.21-150400.24.21.2.150400.24.7.2.aarch64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-base-5.14.21-150400.24.21.2.150400.24.7.2.ppc64le",
            "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-base-5.14.21-150400.24.21.2.150400.24.7.2.s390x",
            "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-base-5.14.21-150400.24.21.2.150400.24.7.2.x86_64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-devel-5.14.21-150400.24.21.2.aarch64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-devel-5.14.21-150400.24.21.2.ppc64le",
            "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-devel-5.14.21-150400.24.21.2.s390x",
            "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-devel-5.14.21-150400.24.21.2.x86_64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-devel-5.14.21-150400.24.21.2.noarch",
            "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-macros-5.14.21-150400.24.21.2.noarch",
            "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-zfcpdump-5.14.21-150400.24.21.2.s390x",
            "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-docs-5.14.21-150400.24.21.3.noarch",
            "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-obs-build-5.14.21-150400.24.21.2.aarch64",
            "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-obs-build-5.14.21-150400.24.21.2.ppc64le",
            "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-obs-build-5.14.21-150400.24.21.2.s390x",
            "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-obs-build-5.14.21-150400.24.21.2.x86_64",
            "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-source-5.14.21-150400.24.21.2.noarch",
            "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-syms-5.14.21-150400.24.21.1.aarch64",
            "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-syms-5.14.21-150400.24.21.1.ppc64le",
            "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-syms-5.14.21-150400.24.21.1.s390x",
            "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-syms-5.14.21-150400.24.21.1.x86_64",
            "SUSE Linux Enterprise Module for Legacy 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.21.2.aarch64",
            "SUSE Linux Enterprise Module for Legacy 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.21.2.ppc64le",
            "SUSE Linux Enterprise Module for Legacy 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.21.2.s390x",
            "SUSE Linux Enterprise Module for Legacy 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.21.2.x86_64",
            "SUSE Linux Enterprise Workstation Extension 15 SP4:kernel-default-extra-5.14.21-150400.24.21.2.x86_64",
            "openSUSE Leap 15.4:cluster-md-kmp-64kb-5.14.21-150400.24.21.2.aarch64",
            "openSUSE Leap 15.4:cluster-md-kmp-default-5.14.21-150400.24.21.2.aarch64",
            "openSUSE Leap 15.4:cluster-md-kmp-default-5.14.21-150400.24.21.2.ppc64le",
            "openSUSE Leap 15.4:cluster-md-kmp-default-5.14.21-150400.24.21.2.s390x",
            "openSUSE Leap 15.4:cluster-md-kmp-default-5.14.21-150400.24.21.2.x86_64",
            "openSUSE Leap 15.4:dlm-kmp-64kb-5.14.21-150400.24.21.2.aarch64",
            "openSUSE Leap 15.4:dlm-kmp-default-5.14.21-150400.24.21.2.aarch64",
            "openSUSE Leap 15.4:dlm-kmp-default-5.14.21-150400.24.21.2.ppc64le",
            "openSUSE Leap 15.4:dlm-kmp-default-5.14.21-150400.24.21.2.s390x",
            "openSUSE Leap 15.4:dlm-kmp-default-5.14.21-150400.24.21.2.x86_64",
            "openSUSE Leap 15.4:dtb-allwinner-5.14.21-150400.24.21.1.aarch64",
            "openSUSE Leap 15.4:dtb-altera-5.14.21-150400.24.21.1.aarch64",
            "openSUSE Leap 15.4:dtb-amazon-5.14.21-150400.24.21.1.aarch64",
            "openSUSE Leap 15.4:dtb-amd-5.14.21-150400.24.21.1.aarch64",
            "openSUSE Leap 15.4:dtb-amlogic-5.14.21-150400.24.21.1.aarch64",
            "openSUSE Leap 15.4:dtb-apm-5.14.21-150400.24.21.1.aarch64",
            "openSUSE Leap 15.4:dtb-apple-5.14.21-150400.24.21.1.aarch64",
            "openSUSE Leap 15.4:dtb-arm-5.14.21-150400.24.21.1.aarch64",
            "openSUSE Leap 15.4:dtb-broadcom-5.14.21-150400.24.21.1.aarch64",
            "openSUSE Leap 15.4:dtb-cavium-5.14.21-150400.24.21.1.aarch64",
            "openSUSE Leap 15.4:dtb-exynos-5.14.21-150400.24.21.1.aarch64",
            "openSUSE Leap 15.4:dtb-freescale-5.14.21-150400.24.21.1.aarch64",
            "openSUSE Leap 15.4:dtb-hisilicon-5.14.21-150400.24.21.1.aarch64",
            "openSUSE Leap 15.4:dtb-lg-5.14.21-150400.24.21.1.aarch64",
            "openSUSE Leap 15.4:dtb-marvell-5.14.21-150400.24.21.1.aarch64",
            "openSUSE Leap 15.4:dtb-mediatek-5.14.21-150400.24.21.1.aarch64",
            "openSUSE Leap 15.4:dtb-nvidia-5.14.21-150400.24.21.1.aarch64",
            "openSUSE Leap 15.4:dtb-qcom-5.14.21-150400.24.21.1.aarch64",
            "openSUSE Leap 15.4:dtb-renesas-5.14.21-150400.24.21.1.aarch64",
            "openSUSE Leap 15.4:dtb-rockchip-5.14.21-150400.24.21.1.aarch64",
            "openSUSE Leap 15.4:dtb-socionext-5.14.21-150400.24.21.1.aarch64",
            "openSUSE Leap 15.4:dtb-sprd-5.14.21-150400.24.21.1.aarch64",
            "openSUSE Leap 15.4:dtb-xilinx-5.14.21-150400.24.21.1.aarch64",
            "openSUSE Leap 15.4:gfs2-kmp-64kb-5.14.21-150400.24.21.2.aarch64",
            "openSUSE Leap 15.4:gfs2-kmp-default-5.14.21-150400.24.21.2.aarch64",
            "openSUSE Leap 15.4:gfs2-kmp-default-5.14.21-150400.24.21.2.ppc64le",
            "openSUSE Leap 15.4:gfs2-kmp-default-5.14.21-150400.24.21.2.s390x",
            "openSUSE Leap 15.4:gfs2-kmp-default-5.14.21-150400.24.21.2.x86_64",
            "openSUSE Leap 15.4:kernel-64kb-5.14.21-150400.24.21.2.aarch64",
            "openSUSE Leap 15.4:kernel-64kb-devel-5.14.21-150400.24.21.2.aarch64",
            "openSUSE Leap 15.4:kernel-64kb-extra-5.14.21-150400.24.21.2.aarch64",
            "openSUSE Leap 15.4:kernel-64kb-livepatch-devel-5.14.21-150400.24.21.2.aarch64",
            "openSUSE Leap 15.4:kernel-64kb-optional-5.14.21-150400.24.21.2.aarch64",
            "openSUSE Leap 15.4:kernel-debug-5.14.21-150400.24.21.2.ppc64le",
            "openSUSE Leap 15.4:kernel-debug-5.14.21-150400.24.21.2.x86_64",
            "openSUSE Leap 15.4:kernel-debug-devel-5.14.21-150400.24.21.2.ppc64le",
            "openSUSE Leap 15.4:kernel-debug-devel-5.14.21-150400.24.21.2.x86_64",
            "openSUSE Leap 15.4:kernel-debug-livepatch-devel-5.14.21-150400.24.21.2.ppc64le",
            "openSUSE Leap 15.4:kernel-debug-livepatch-devel-5.14.21-150400.24.21.2.x86_64",
            "openSUSE Leap 15.4:kernel-default-5.14.21-150400.24.21.2.aarch64",
            "openSUSE Leap 15.4:kernel-default-5.14.21-150400.24.21.2.ppc64le",
            "openSUSE Leap 15.4:kernel-default-5.14.21-150400.24.21.2.s390x",
            "openSUSE Leap 15.4:kernel-default-5.14.21-150400.24.21.2.x86_64",
            "openSUSE Leap 15.4:kernel-default-base-5.14.21-150400.24.21.2.150400.24.7.2.aarch64",
            "openSUSE Leap 15.4:kernel-default-base-5.14.21-150400.24.21.2.150400.24.7.2.ppc64le",
            "openSUSE Leap 15.4:kernel-default-base-5.14.21-150400.24.21.2.150400.24.7.2.s390x",
            "openSUSE Leap 15.4:kernel-default-base-5.14.21-150400.24.21.2.150400.24.7.2.x86_64",
            "openSUSE Leap 15.4:kernel-default-base-rebuild-5.14.21-150400.24.21.2.150400.24.7.2.aarch64",
            "openSUSE Leap 15.4:kernel-default-base-rebuild-5.14.21-150400.24.21.2.150400.24.7.2.ppc64le",
            "openSUSE Leap 15.4:kernel-default-base-rebuild-5.14.21-150400.24.21.2.150400.24.7.2.s390x",
            "openSUSE Leap 15.4:kernel-default-base-rebuild-5.14.21-150400.24.21.2.150400.24.7.2.x86_64",
            "openSUSE Leap 15.4:kernel-default-devel-5.14.21-150400.24.21.2.aarch64",
            "openSUSE Leap 15.4:kernel-default-devel-5.14.21-150400.24.21.2.ppc64le",
            "openSUSE Leap 15.4:kernel-default-devel-5.14.21-150400.24.21.2.s390x",
            "openSUSE Leap 15.4:kernel-default-devel-5.14.21-150400.24.21.2.x86_64",
            "openSUSE Leap 15.4:kernel-default-extra-5.14.21-150400.24.21.2.aarch64",
            "openSUSE Leap 15.4:kernel-default-extra-5.14.21-150400.24.21.2.ppc64le",
            "openSUSE Leap 15.4:kernel-default-extra-5.14.21-150400.24.21.2.s390x",
            "openSUSE Leap 15.4:kernel-default-extra-5.14.21-150400.24.21.2.x86_64",
            "openSUSE Leap 15.4:kernel-default-livepatch-5.14.21-150400.24.21.2.aarch64",
            "openSUSE Leap 15.4:kernel-default-livepatch-5.14.21-150400.24.21.2.ppc64le",
            "openSUSE Leap 15.4:kernel-default-livepatch-5.14.21-150400.24.21.2.s390x",
            "openSUSE Leap 15.4:kernel-default-livepatch-5.14.21-150400.24.21.2.x86_64",
            "openSUSE Leap 15.4:kernel-default-livepatch-devel-5.14.21-150400.24.21.2.aarch64",
            "openSUSE Leap 15.4:kernel-default-livepatch-devel-5.14.21-150400.24.21.2.ppc64le",
            "openSUSE Leap 15.4:kernel-default-livepatch-devel-5.14.21-150400.24.21.2.s390x",
            "openSUSE Leap 15.4:kernel-default-livepatch-devel-5.14.21-150400.24.21.2.x86_64",
            "openSUSE Leap 15.4:kernel-default-optional-5.14.21-150400.24.21.2.aarch64",
            "openSUSE Leap 15.4:kernel-default-optional-5.14.21-150400.24.21.2.ppc64le",
            "openSUSE Leap 15.4:kernel-default-optional-5.14.21-150400.24.21.2.s390x",
            "openSUSE Leap 15.4:kernel-default-optional-5.14.21-150400.24.21.2.x86_64",
            "openSUSE Leap 15.4:kernel-devel-5.14.21-150400.24.21.2.noarch",
            "openSUSE Leap 15.4:kernel-docs-5.14.21-150400.24.21.3.noarch",
            "openSUSE Leap 15.4:kernel-docs-html-5.14.21-150400.24.21.3.noarch",
            "openSUSE Leap 15.4:kernel-kvmsmall-5.14.21-150400.24.21.2.aarch64",
            "openSUSE Leap 15.4:kernel-kvmsmall-5.14.21-150400.24.21.2.ppc64le",
            "openSUSE Leap 15.4:kernel-kvmsmall-5.14.21-150400.24.21.2.x86_64",
            "openSUSE Leap 15.4:kernel-kvmsmall-devel-5.14.21-150400.24.21.2.aarch64",
            "openSUSE Leap 15.4:kernel-kvmsmall-devel-5.14.21-150400.24.21.2.ppc64le",
            "openSUSE Leap 15.4:kernel-kvmsmall-devel-5.14.21-150400.24.21.2.x86_64",
            "openSUSE Leap 15.4:kernel-kvmsmall-livepatch-devel-5.14.21-150400.24.21.2.aarch64",
            "openSUSE Leap 15.4:kernel-kvmsmall-livepatch-devel-5.14.21-150400.24.21.2.ppc64le",
            "openSUSE Leap 15.4:kernel-kvmsmall-livepatch-devel-5.14.21-150400.24.21.2.x86_64",
            "openSUSE Leap 15.4:kernel-macros-5.14.21-150400.24.21.2.noarch",
            "openSUSE Leap 15.4:kernel-obs-build-5.14.21-150400.24.21.2.aarch64",
            "openSUSE Leap 15.4:kernel-obs-build-5.14.21-150400.24.21.2.ppc64le",
            "openSUSE Leap 15.4:kernel-obs-build-5.14.21-150400.24.21.2.s390x",
            "openSUSE Leap 15.4:kernel-obs-build-5.14.21-150400.24.21.2.x86_64",
            "openSUSE Leap 15.4:kernel-obs-qa-5.14.21-150400.24.21.1.aarch64",
            "openSUSE Leap 15.4:kernel-obs-qa-5.14.21-150400.24.21.1.ppc64le",
            "openSUSE Leap 15.4:kernel-obs-qa-5.14.21-150400.24.21.1.s390x",
            "openSUSE Leap 15.4:kernel-obs-qa-5.14.21-150400.24.21.1.x86_64",
            "openSUSE Leap 15.4:kernel-source-5.14.21-150400.24.21.2.noarch",
            "openSUSE Leap 15.4:kernel-source-vanilla-5.14.21-150400.24.21.2.noarch",
            "openSUSE Leap 15.4:kernel-syms-5.14.21-150400.24.21.1.aarch64",
            "openSUSE Leap 15.4:kernel-syms-5.14.21-150400.24.21.1.ppc64le",
            "openSUSE Leap 15.4:kernel-syms-5.14.21-150400.24.21.1.s390x",
            "openSUSE Leap 15.4:kernel-syms-5.14.21-150400.24.21.1.x86_64",
            "openSUSE Leap 15.4:kernel-zfcpdump-5.14.21-150400.24.21.2.s390x",
            "openSUSE Leap 15.4:kselftests-kmp-64kb-5.14.21-150400.24.21.2.aarch64",
            "openSUSE Leap 15.4:kselftests-kmp-default-5.14.21-150400.24.21.2.aarch64",
            "openSUSE Leap 15.4:kselftests-kmp-default-5.14.21-150400.24.21.2.ppc64le",
            "openSUSE Leap 15.4:kselftests-kmp-default-5.14.21-150400.24.21.2.s390x",
            "openSUSE Leap 15.4:kselftests-kmp-default-5.14.21-150400.24.21.2.x86_64",
            "openSUSE Leap 15.4:ocfs2-kmp-64kb-5.14.21-150400.24.21.2.aarch64",
            "openSUSE Leap 15.4:ocfs2-kmp-default-5.14.21-150400.24.21.2.aarch64",
            "openSUSE Leap 15.4:ocfs2-kmp-default-5.14.21-150400.24.21.2.ppc64le",
            "openSUSE Leap 15.4:ocfs2-kmp-default-5.14.21-150400.24.21.2.s390x",
            "openSUSE Leap 15.4:ocfs2-kmp-default-5.14.21-150400.24.21.2.x86_64",
            "openSUSE Leap 15.4:reiserfs-kmp-64kb-5.14.21-150400.24.21.2.aarch64",
            "openSUSE Leap 15.4:reiserfs-kmp-default-5.14.21-150400.24.21.2.aarch64",
            "openSUSE Leap 15.4:reiserfs-kmp-default-5.14.21-150400.24.21.2.ppc64le",
            "openSUSE Leap 15.4:reiserfs-kmp-default-5.14.21-150400.24.21.2.s390x",
            "openSUSE Leap 15.4:reiserfs-kmp-default-5.14.21-150400.24.21.2.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2022-09-16T15:30:19Z",
          "details": "moderate"
        }
      ],
      "title": "CVE-2022-2905"
    },
    {
      "cve": "CVE-2022-2938",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2022-2938"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "A flaw was found in the Linux kernel\u0027s implementation of Pressure Stall Information. While the feature is disabled by default, it could allow an attacker to crash the system or have other memory-corruption side effects.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.21.2.aarch64",
          "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.21.2.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.21.2.s390x",
          "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.21.2.x86_64",
          "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.21.2.aarch64",
          "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.21.2.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.21.2.s390x",
          "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.21.2.x86_64",
          "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.21.2.aarch64",
          "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.21.2.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.21.2.s390x",
          "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.21.2.x86_64",
          "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.21.2.aarch64",
          "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.21.2.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.21.2.s390x",
          "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.21.2.x86_64",
          "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.21.2.ppc64le",
          "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.21.2.s390x",
          "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.21.2.x86_64",
          "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.21.2.ppc64le",
          "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.21.2.s390x",
          "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.21.2.x86_64",
          "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_21-default-1-150400.9.3.2.ppc64le",
          "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_21-default-1-150400.9.3.2.s390x",
          "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_21-default-1-150400.9.3.2.x86_64",
          "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-64kb-5.14.21-150400.24.21.2.aarch64",
          "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-64kb-devel-5.14.21-150400.24.21.2.aarch64",
          "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-5.14.21-150400.24.21.2.aarch64",
          "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-5.14.21-150400.24.21.2.ppc64le",
          "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-5.14.21-150400.24.21.2.s390x",
          "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-5.14.21-150400.24.21.2.x86_64",
          "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-base-5.14.21-150400.24.21.2.150400.24.7.2.aarch64",
          "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-base-5.14.21-150400.24.21.2.150400.24.7.2.ppc64le",
          "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-base-5.14.21-150400.24.21.2.150400.24.7.2.s390x",
          "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-base-5.14.21-150400.24.21.2.150400.24.7.2.x86_64",
          "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-devel-5.14.21-150400.24.21.2.aarch64",
          "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-devel-5.14.21-150400.24.21.2.ppc64le",
          "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-devel-5.14.21-150400.24.21.2.s390x",
          "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-devel-5.14.21-150400.24.21.2.x86_64",
          "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-devel-5.14.21-150400.24.21.2.noarch",
          "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-macros-5.14.21-150400.24.21.2.noarch",
          "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-zfcpdump-5.14.21-150400.24.21.2.s390x",
          "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-docs-5.14.21-150400.24.21.3.noarch",
          "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-obs-build-5.14.21-150400.24.21.2.aarch64",
          "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-obs-build-5.14.21-150400.24.21.2.ppc64le",
          "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-obs-build-5.14.21-150400.24.21.2.s390x",
          "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-obs-build-5.14.21-150400.24.21.2.x86_64",
          "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-source-5.14.21-150400.24.21.2.noarch",
          "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-syms-5.14.21-150400.24.21.1.aarch64",
          "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-syms-5.14.21-150400.24.21.1.ppc64le",
          "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-syms-5.14.21-150400.24.21.1.s390x",
          "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-syms-5.14.21-150400.24.21.1.x86_64",
          "SUSE Linux Enterprise Module for Legacy 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.21.2.aarch64",
          "SUSE Linux Enterprise Module for Legacy 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.21.2.ppc64le",
          "SUSE Linux Enterprise Module for Legacy 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.21.2.s390x",
          "SUSE Linux Enterprise Module for Legacy 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.21.2.x86_64",
          "SUSE Linux Enterprise Workstation Extension 15 SP4:kernel-default-extra-5.14.21-150400.24.21.2.x86_64",
          "openSUSE Leap 15.4:cluster-md-kmp-64kb-5.14.21-150400.24.21.2.aarch64",
          "openSUSE Leap 15.4:cluster-md-kmp-default-5.14.21-150400.24.21.2.aarch64",
          "openSUSE Leap 15.4:cluster-md-kmp-default-5.14.21-150400.24.21.2.ppc64le",
          "openSUSE Leap 15.4:cluster-md-kmp-default-5.14.21-150400.24.21.2.s390x",
          "openSUSE Leap 15.4:cluster-md-kmp-default-5.14.21-150400.24.21.2.x86_64",
          "openSUSE Leap 15.4:dlm-kmp-64kb-5.14.21-150400.24.21.2.aarch64",
          "openSUSE Leap 15.4:dlm-kmp-default-5.14.21-150400.24.21.2.aarch64",
          "openSUSE Leap 15.4:dlm-kmp-default-5.14.21-150400.24.21.2.ppc64le",
          "openSUSE Leap 15.4:dlm-kmp-default-5.14.21-150400.24.21.2.s390x",
          "openSUSE Leap 15.4:dlm-kmp-default-5.14.21-150400.24.21.2.x86_64",
          "openSUSE Leap 15.4:dtb-allwinner-5.14.21-150400.24.21.1.aarch64",
          "openSUSE Leap 15.4:dtb-altera-5.14.21-150400.24.21.1.aarch64",
          "openSUSE Leap 15.4:dtb-amazon-5.14.21-150400.24.21.1.aarch64",
          "openSUSE Leap 15.4:dtb-amd-5.14.21-150400.24.21.1.aarch64",
          "openSUSE Leap 15.4:dtb-amlogic-5.14.21-150400.24.21.1.aarch64",
          "openSUSE Leap 15.4:dtb-apm-5.14.21-150400.24.21.1.aarch64",
          "openSUSE Leap 15.4:dtb-apple-5.14.21-150400.24.21.1.aarch64",
          "openSUSE Leap 15.4:dtb-arm-5.14.21-150400.24.21.1.aarch64",
          "openSUSE Leap 15.4:dtb-broadcom-5.14.21-150400.24.21.1.aarch64",
          "openSUSE Leap 15.4:dtb-cavium-5.14.21-150400.24.21.1.aarch64",
          "openSUSE Leap 15.4:dtb-exynos-5.14.21-150400.24.21.1.aarch64",
          "openSUSE Leap 15.4:dtb-freescale-5.14.21-150400.24.21.1.aarch64",
          "openSUSE Leap 15.4:dtb-hisilicon-5.14.21-150400.24.21.1.aarch64",
          "openSUSE Leap 15.4:dtb-lg-5.14.21-150400.24.21.1.aarch64",
          "openSUSE Leap 15.4:dtb-marvell-5.14.21-150400.24.21.1.aarch64",
          "openSUSE Leap 15.4:dtb-mediatek-5.14.21-150400.24.21.1.aarch64",
          "openSUSE Leap 15.4:dtb-nvidia-5.14.21-150400.24.21.1.aarch64",
          "openSUSE Leap 15.4:dtb-qcom-5.14.21-150400.24.21.1.aarch64",
          "openSUSE Leap 15.4:dtb-renesas-5.14.21-150400.24.21.1.aarch64",
          "openSUSE Leap 15.4:dtb-rockchip-5.14.21-150400.24.21.1.aarch64",
          "openSUSE Leap 15.4:dtb-socionext-5.14.21-150400.24.21.1.aarch64",
          "openSUSE Leap 15.4:dtb-sprd-5.14.21-150400.24.21.1.aarch64",
          "openSUSE Leap 15.4:dtb-xilinx-5.14.21-150400.24.21.1.aarch64",
          "openSUSE Leap 15.4:gfs2-kmp-64kb-5.14.21-150400.24.21.2.aarch64",
          "openSUSE Leap 15.4:gfs2-kmp-default-5.14.21-150400.24.21.2.aarch64",
          "openSUSE Leap 15.4:gfs2-kmp-default-5.14.21-150400.24.21.2.ppc64le",
          "openSUSE Leap 15.4:gfs2-kmp-default-5.14.21-150400.24.21.2.s390x",
          "openSUSE Leap 15.4:gfs2-kmp-default-5.14.21-150400.24.21.2.x86_64",
          "openSUSE Leap 15.4:kernel-64kb-5.14.21-150400.24.21.2.aarch64",
          "openSUSE Leap 15.4:kernel-64kb-devel-5.14.21-150400.24.21.2.aarch64",
          "openSUSE Leap 15.4:kernel-64kb-extra-5.14.21-150400.24.21.2.aarch64",
          "openSUSE Leap 15.4:kernel-64kb-livepatch-devel-5.14.21-150400.24.21.2.aarch64",
          "openSUSE Leap 15.4:kernel-64kb-optional-5.14.21-150400.24.21.2.aarch64",
          "openSUSE Leap 15.4:kernel-debug-5.14.21-150400.24.21.2.ppc64le",
          "openSUSE Leap 15.4:kernel-debug-5.14.21-150400.24.21.2.x86_64",
          "openSUSE Leap 15.4:kernel-debug-devel-5.14.21-150400.24.21.2.ppc64le",
          "openSUSE Leap 15.4:kernel-debug-devel-5.14.21-150400.24.21.2.x86_64",
          "openSUSE Leap 15.4:kernel-debug-livepatch-devel-5.14.21-150400.24.21.2.ppc64le",
          "openSUSE Leap 15.4:kernel-debug-livepatch-devel-5.14.21-150400.24.21.2.x86_64",
          "openSUSE Leap 15.4:kernel-default-5.14.21-150400.24.21.2.aarch64",
          "openSUSE Leap 15.4:kernel-default-5.14.21-150400.24.21.2.ppc64le",
          "openSUSE Leap 15.4:kernel-default-5.14.21-150400.24.21.2.s390x",
          "openSUSE Leap 15.4:kernel-default-5.14.21-150400.24.21.2.x86_64",
          "openSUSE Leap 15.4:kernel-default-base-5.14.21-150400.24.21.2.150400.24.7.2.aarch64",
          "openSUSE Leap 15.4:kernel-default-base-5.14.21-150400.24.21.2.150400.24.7.2.ppc64le",
          "openSUSE Leap 15.4:kernel-default-base-5.14.21-150400.24.21.2.150400.24.7.2.s390x",
          "openSUSE Leap 15.4:kernel-default-base-5.14.21-150400.24.21.2.150400.24.7.2.x86_64",
          "openSUSE Leap 15.4:kernel-default-base-rebuild-5.14.21-150400.24.21.2.150400.24.7.2.aarch64",
          "openSUSE Leap 15.4:kernel-default-base-rebuild-5.14.21-150400.24.21.2.150400.24.7.2.ppc64le",
          "openSUSE Leap 15.4:kernel-default-base-rebuild-5.14.21-150400.24.21.2.150400.24.7.2.s390x",
          "openSUSE Leap 15.4:kernel-default-base-rebuild-5.14.21-150400.24.21.2.150400.24.7.2.x86_64",
          "openSUSE Leap 15.4:kernel-default-devel-5.14.21-150400.24.21.2.aarch64",
          "openSUSE Leap 15.4:kernel-default-devel-5.14.21-150400.24.21.2.ppc64le",
          "openSUSE Leap 15.4:kernel-default-devel-5.14.21-150400.24.21.2.s390x",
          "openSUSE Leap 15.4:kernel-default-devel-5.14.21-150400.24.21.2.x86_64",
          "openSUSE Leap 15.4:kernel-default-extra-5.14.21-150400.24.21.2.aarch64",
          "openSUSE Leap 15.4:kernel-default-extra-5.14.21-150400.24.21.2.ppc64le",
          "openSUSE Leap 15.4:kernel-default-extra-5.14.21-150400.24.21.2.s390x",
          "openSUSE Leap 15.4:kernel-default-extra-5.14.21-150400.24.21.2.x86_64",
          "openSUSE Leap 15.4:kernel-default-livepatch-5.14.21-150400.24.21.2.aarch64",
          "openSUSE Leap 15.4:kernel-default-livepatch-5.14.21-150400.24.21.2.ppc64le",
          "openSUSE Leap 15.4:kernel-default-livepatch-5.14.21-150400.24.21.2.s390x",
          "openSUSE Leap 15.4:kernel-default-livepatch-5.14.21-150400.24.21.2.x86_64",
          "openSUSE Leap 15.4:kernel-default-livepatch-devel-5.14.21-150400.24.21.2.aarch64",
          "openSUSE Leap 15.4:kernel-default-livepatch-devel-5.14.21-150400.24.21.2.ppc64le",
          "openSUSE Leap 15.4:kernel-default-livepatch-devel-5.14.21-150400.24.21.2.s390x",
          "openSUSE Leap 15.4:kernel-default-livepatch-devel-5.14.21-150400.24.21.2.x86_64",
          "openSUSE Leap 15.4:kernel-default-optional-5.14.21-150400.24.21.2.aarch64",
          "openSUSE Leap 15.4:kernel-default-optional-5.14.21-150400.24.21.2.ppc64le",
          "openSUSE Leap 15.4:kernel-default-optional-5.14.21-150400.24.21.2.s390x",
          "openSUSE Leap 15.4:kernel-default-optional-5.14.21-150400.24.21.2.x86_64",
          "openSUSE Leap 15.4:kernel-devel-5.14.21-150400.24.21.2.noarch",
          "openSUSE Leap 15.4:kernel-docs-5.14.21-150400.24.21.3.noarch",
          "openSUSE Leap 15.4:kernel-docs-html-5.14.21-150400.24.21.3.noarch",
          "openSUSE Leap 15.4:kernel-kvmsmall-5.14.21-150400.24.21.2.aarch64",
          "openSUSE Leap 15.4:kernel-kvmsmall-5.14.21-150400.24.21.2.ppc64le",
          "openSUSE Leap 15.4:kernel-kvmsmall-5.14.21-150400.24.21.2.x86_64",
          "openSUSE Leap 15.4:kernel-kvmsmall-devel-5.14.21-150400.24.21.2.aarch64",
          "openSUSE Leap 15.4:kernel-kvmsmall-devel-5.14.21-150400.24.21.2.ppc64le",
          "openSUSE Leap 15.4:kernel-kvmsmall-devel-5.14.21-150400.24.21.2.x86_64",
          "openSUSE Leap 15.4:kernel-kvmsmall-livepatch-devel-5.14.21-150400.24.21.2.aarch64",
          "openSUSE Leap 15.4:kernel-kvmsmall-livepatch-devel-5.14.21-150400.24.21.2.ppc64le",
          "openSUSE Leap 15.4:kernel-kvmsmall-livepatch-devel-5.14.21-150400.24.21.2.x86_64",
          "openSUSE Leap 15.4:kernel-macros-5.14.21-150400.24.21.2.noarch",
          "openSUSE Leap 15.4:kernel-obs-build-5.14.21-150400.24.21.2.aarch64",
          "openSUSE Leap 15.4:kernel-obs-build-5.14.21-150400.24.21.2.ppc64le",
          "openSUSE Leap 15.4:kernel-obs-build-5.14.21-150400.24.21.2.s390x",
          "openSUSE Leap 15.4:kernel-obs-build-5.14.21-150400.24.21.2.x86_64",
          "openSUSE Leap 15.4:kernel-obs-qa-5.14.21-150400.24.21.1.aarch64",
          "openSUSE Leap 15.4:kernel-obs-qa-5.14.21-150400.24.21.1.ppc64le",
          "openSUSE Leap 15.4:kernel-obs-qa-5.14.21-150400.24.21.1.s390x",
          "openSUSE Leap 15.4:kernel-obs-qa-5.14.21-150400.24.21.1.x86_64",
          "openSUSE Leap 15.4:kernel-source-5.14.21-150400.24.21.2.noarch",
          "openSUSE Leap 15.4:kernel-source-vanilla-5.14.21-150400.24.21.2.noarch",
          "openSUSE Leap 15.4:kernel-syms-5.14.21-150400.24.21.1.aarch64",
          "openSUSE Leap 15.4:kernel-syms-5.14.21-150400.24.21.1.ppc64le",
          "openSUSE Leap 15.4:kernel-syms-5.14.21-150400.24.21.1.s390x",
          "openSUSE Leap 15.4:kernel-syms-5.14.21-150400.24.21.1.x86_64",
          "openSUSE Leap 15.4:kernel-zfcpdump-5.14.21-150400.24.21.2.s390x",
          "openSUSE Leap 15.4:kselftests-kmp-64kb-5.14.21-150400.24.21.2.aarch64",
          "openSUSE Leap 15.4:kselftests-kmp-default-5.14.21-150400.24.21.2.aarch64",
          "openSUSE Leap 15.4:kselftests-kmp-default-5.14.21-150400.24.21.2.ppc64le",
          "openSUSE Leap 15.4:kselftests-kmp-default-5.14.21-150400.24.21.2.s390x",
          "openSUSE Leap 15.4:kselftests-kmp-default-5.14.21-150400.24.21.2.x86_64",
          "openSUSE Leap 15.4:ocfs2-kmp-64kb-5.14.21-150400.24.21.2.aarch64",
          "openSUSE Leap 15.4:ocfs2-kmp-default-5.14.21-150400.24.21.2.aarch64",
          "openSUSE Leap 15.4:ocfs2-kmp-default-5.14.21-150400.24.21.2.ppc64le",
          "openSUSE Leap 15.4:ocfs2-kmp-default-5.14.21-150400.24.21.2.s390x",
          "openSUSE Leap 15.4:ocfs2-kmp-default-5.14.21-150400.24.21.2.x86_64",
          "openSUSE Leap 15.4:reiserfs-kmp-64kb-5.14.21-150400.24.21.2.aarch64",
          "openSUSE Leap 15.4:reiserfs-kmp-default-5.14.21-150400.24.21.2.aarch64",
          "openSUSE Leap 15.4:reiserfs-kmp-default-5.14.21-150400.24.21.2.ppc64le",
          "openSUSE Leap 15.4:reiserfs-kmp-default-5.14.21-150400.24.21.2.s390x",
          "openSUSE Leap 15.4:reiserfs-kmp-default-5.14.21-150400.24.21.2.x86_64"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2022-2938",
          "url": "https://www.suse.com/security/cve/CVE-2022-2938"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1202623 for CVE-2022-2938",
          "url": "https://bugzilla.suse.com/1202623"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.21.2.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.21.2.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.21.2.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.21.2.x86_64",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.21.2.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.21.2.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.21.2.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.21.2.x86_64",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.21.2.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.21.2.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.21.2.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.21.2.x86_64",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.21.2.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.21.2.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.21.2.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.21.2.x86_64",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.21.2.ppc64le",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.21.2.s390x",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.21.2.x86_64",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.21.2.ppc64le",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.21.2.s390x",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.21.2.x86_64",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_21-default-1-150400.9.3.2.ppc64le",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_21-default-1-150400.9.3.2.s390x",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_21-default-1-150400.9.3.2.x86_64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-64kb-5.14.21-150400.24.21.2.aarch64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-64kb-devel-5.14.21-150400.24.21.2.aarch64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-5.14.21-150400.24.21.2.aarch64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-5.14.21-150400.24.21.2.ppc64le",
            "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-5.14.21-150400.24.21.2.s390x",
            "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-5.14.21-150400.24.21.2.x86_64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-base-5.14.21-150400.24.21.2.150400.24.7.2.aarch64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-base-5.14.21-150400.24.21.2.150400.24.7.2.ppc64le",
            "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-base-5.14.21-150400.24.21.2.150400.24.7.2.s390x",
            "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-base-5.14.21-150400.24.21.2.150400.24.7.2.x86_64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-devel-5.14.21-150400.24.21.2.aarch64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-devel-5.14.21-150400.24.21.2.ppc64le",
            "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-devel-5.14.21-150400.24.21.2.s390x",
            "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-devel-5.14.21-150400.24.21.2.x86_64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-devel-5.14.21-150400.24.21.2.noarch",
            "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-macros-5.14.21-150400.24.21.2.noarch",
            "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-zfcpdump-5.14.21-150400.24.21.2.s390x",
            "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-docs-5.14.21-150400.24.21.3.noarch",
            "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-obs-build-5.14.21-150400.24.21.2.aarch64",
            "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-obs-build-5.14.21-150400.24.21.2.ppc64le",
            "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-obs-build-5.14.21-150400.24.21.2.s390x",
            "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-obs-build-5.14.21-150400.24.21.2.x86_64",
            "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-source-5.14.21-150400.24.21.2.noarch",
            "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-syms-5.14.21-150400.24.21.1.aarch64",
            "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-syms-5.14.21-150400.24.21.1.ppc64le",
            "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-syms-5.14.21-150400.24.21.1.s390x",
            "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-syms-5.14.21-150400.24.21.1.x86_64",
            "SUSE Linux Enterprise Module for Legacy 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.21.2.aarch64",
            "SUSE Linux Enterprise Module for Legacy 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.21.2.ppc64le",
            "SUSE Linux Enterprise Module for Legacy 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.21.2.s390x",
            "SUSE Linux Enterprise Module for Legacy 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.21.2.x86_64",
            "SUSE Linux Enterprise Workstation Extension 15 SP4:kernel-default-extra-5.14.21-150400.24.21.2.x86_64",
            "openSUSE Leap 15.4:cluster-md-kmp-64kb-5.14.21-150400.24.21.2.aarch64",
            "openSUSE Leap 15.4:cluster-md-kmp-default-5.14.21-150400.24.21.2.aarch64",
            "openSUSE Leap 15.4:cluster-md-kmp-default-5.14.21-150400.24.21.2.ppc64le",
            "openSUSE Leap 15.4:cluster-md-kmp-default-5.14.21-150400.24.21.2.s390x",
            "openSUSE Leap 15.4:cluster-md-kmp-default-5.14.21-150400.24.21.2.x86_64",
            "openSUSE Leap 15.4:dlm-kmp-64kb-5.14.21-150400.24.21.2.aarch64",
            "openSUSE Leap 15.4:dlm-kmp-default-5.14.21-150400.24.21.2.aarch64",
            "openSUSE Leap 15.4:dlm-kmp-default-5.14.21-150400.24.21.2.ppc64le",
            "openSUSE Leap 15.4:dlm-kmp-default-5.14.21-150400.24.21.2.s390x",
            "openSUSE Leap 15.4:dlm-kmp-default-5.14.21-150400.24.21.2.x86_64",
            "openSUSE Leap 15.4:dtb-allwinner-5.14.21-150400.24.21.1.aarch64",
            "openSUSE Leap 15.4:dtb-altera-5.14.21-150400.24.21.1.aarch64",
            "openSUSE Leap 15.4:dtb-amazon-5.14.21-150400.24.21.1.aarch64",
            "openSUSE Leap 15.4:dtb-amd-5.14.21-150400.24.21.1.aarch64",
            "openSUSE Leap 15.4:dtb-amlogic-5.14.21-150400.24.21.1.aarch64",
            "openSUSE Leap 15.4:dtb-apm-5.14.21-150400.24.21.1.aarch64",
            "openSUSE Leap 15.4:dtb-apple-5.14.21-150400.24.21.1.aarch64",
            "openSUSE Leap 15.4:dtb-arm-5.14.21-150400.24.21.1.aarch64",
            "openSUSE Leap 15.4:dtb-broadcom-5.14.21-150400.24.21.1.aarch64",
            "openSUSE Leap 15.4:dtb-cavium-5.14.21-150400.24.21.1.aarch64",
            "openSUSE Leap 15.4:dtb-exynos-5.14.21-150400.24.21.1.aarch64",
            "openSUSE Leap 15.4:dtb-freescale-5.14.21-150400.24.21.1.aarch64",
            "openSUSE Leap 15.4:dtb-hisilicon-5.14.21-150400.24.21.1.aarch64",
            "openSUSE Leap 15.4:dtb-lg-5.14.21-150400.24.21.1.aarch64",
            "openSUSE Leap 15.4:dtb-marvell-5.14.21-150400.24.21.1.aarch64",
            "openSUSE Leap 15.4:dtb-mediatek-5.14.21-150400.24.21.1.aarch64",
            "openSUSE Leap 15.4:dtb-nvidia-5.14.21-150400.24.21.1.aarch64",
            "openSUSE Leap 15.4:dtb-qcom-5.14.21-150400.24.21.1.aarch64",
            "openSUSE Leap 15.4:dtb-renesas-5.14.21-150400.24.21.1.aarch64",
            "openSUSE Leap 15.4:dtb-rockchip-5.14.21-150400.24.21.1.aarch64",
            "openSUSE Leap 15.4:dtb-socionext-5.14.21-150400.24.21.1.aarch64",
            "openSUSE Leap 15.4:dtb-sprd-5.14.21-150400.24.21.1.aarch64",
            "openSUSE Leap 15.4:dtb-xilinx-5.14.21-150400.24.21.1.aarch64",
            "openSUSE Leap 15.4:gfs2-kmp-64kb-5.14.21-150400.24.21.2.aarch64",
            "openSUSE Leap 15.4:gfs2-kmp-default-5.14.21-150400.24.21.2.aarch64",
            "openSUSE Leap 15.4:gfs2-kmp-default-5.14.21-150400.24.21.2.ppc64le",
            "openSUSE Leap 15.4:gfs2-kmp-default-5.14.21-150400.24.21.2.s390x",
            "openSUSE Leap 15.4:gfs2-kmp-default-5.14.21-150400.24.21.2.x86_64",
            "openSUSE Leap 15.4:kernel-64kb-5.14.21-150400.24.21.2.aarch64",
            "openSUSE Leap 15.4:kernel-64kb-devel-5.14.21-150400.24.21.2.aarch64",
            "openSUSE Leap 15.4:kernel-64kb-extra-5.14.21-150400.24.21.2.aarch64",
            "openSUSE Leap 15.4:kernel-64kb-livepatch-devel-5.14.21-150400.24.21.2.aarch64",
            "openSUSE Leap 15.4:kernel-64kb-optional-5.14.21-150400.24.21.2.aarch64",
            "openSUSE Leap 15.4:kernel-debug-5.14.21-150400.24.21.2.ppc64le",
            "openSUSE Leap 15.4:kernel-debug-5.14.21-150400.24.21.2.x86_64",
            "openSUSE Leap 15.4:kernel-debug-devel-5.14.21-150400.24.21.2.ppc64le",
            "openSUSE Leap 15.4:kernel-debug-devel-5.14.21-150400.24.21.2.x86_64",
            "openSUSE Leap 15.4:kernel-debug-livepatch-devel-5.14.21-150400.24.21.2.ppc64le",
            "openSUSE Leap 15.4:kernel-debug-livepatch-devel-5.14.21-150400.24.21.2.x86_64",
            "openSUSE Leap 15.4:kernel-default-5.14.21-150400.24.21.2.aarch64",
            "openSUSE Leap 15.4:kernel-default-5.14.21-150400.24.21.2.ppc64le",
            "openSUSE Leap 15.4:kernel-default-5.14.21-150400.24.21.2.s390x",
            "openSUSE Leap 15.4:kernel-default-5.14.21-150400.24.21.2.x86_64",
            "openSUSE Leap 15.4:kernel-default-base-5.14.21-150400.24.21.2.150400.24.7.2.aarch64",
            "openSUSE Leap 15.4:kernel-default-base-5.14.21-150400.24.21.2.150400.24.7.2.ppc64le",
            "openSUSE Leap 15.4:kernel-default-base-5.14.21-150400.24.21.2.150400.24.7.2.s390x",
            "openSUSE Leap 15.4:kernel-default-base-5.14.21-150400.24.21.2.150400.24.7.2.x86_64",
            "openSUSE Leap 15.4:kernel-default-base-rebuild-5.14.21-150400.24.21.2.150400.24.7.2.aarch64",
            "openSUSE Leap 15.4:kernel-default-base-rebuild-5.14.21-150400.24.21.2.150400.24.7.2.ppc64le",
            "openSUSE Leap 15.4:kernel-default-base-rebuild-5.14.21-150400.24.21.2.150400.24.7.2.s390x",
            "openSUSE Leap 15.4:kernel-default-base-rebuild-5.14.21-150400.24.21.2.150400.24.7.2.x86_64",
            "openSUSE Leap 15.4:kernel-default-devel-5.14.21-150400.24.21.2.aarch64",
            "openSUSE Leap 15.4:kernel-default-devel-5.14.21-150400.24.21.2.ppc64le",
            "openSUSE Leap 15.4:kernel-default-devel-5.14.21-150400.24.21.2.s390x",
            "openSUSE Leap 15.4:kernel-default-devel-5.14.21-150400.24.21.2.x86_64",
            "openSUSE Leap 15.4:kernel-default-extra-5.14.21-150400.24.21.2.aarch64",
            "openSUSE Leap 15.4:kernel-default-extra-5.14.21-150400.24.21.2.ppc64le",
            "openSUSE Leap 15.4:kernel-default-extra-5.14.21-150400.24.21.2.s390x",
            "openSUSE Leap 15.4:kernel-default-extra-5.14.21-150400.24.21.2.x86_64",
            "openSUSE Leap 15.4:kernel-default-livepatch-5.14.21-150400.24.21.2.aarch64",
            "openSUSE Leap 15.4:kernel-default-livepatch-5.14.21-150400.24.21.2.ppc64le",
            "openSUSE Leap 15.4:kernel-default-livepatch-5.14.21-150400.24.21.2.s390x",
            "openSUSE Leap 15.4:kernel-default-livepatch-5.14.21-150400.24.21.2.x86_64",
            "openSUSE Leap 15.4:kernel-default-livepatch-devel-5.14.21-150400.24.21.2.aarch64",
            "openSUSE Leap 15.4:kernel-default-livepatch-devel-5.14.21-150400.24.21.2.ppc64le",
            "openSUSE Leap 15.4:kernel-default-livepatch-devel-5.14.21-150400.24.21.2.s390x",
            "openSUSE Leap 15.4:kernel-default-livepatch-devel-5.14.21-150400.24.21.2.x86_64",
            "openSUSE Leap 15.4:kernel-default-optional-5.14.21-150400.24.21.2.aarch64",
            "openSUSE Leap 15.4:kernel-default-optional-5.14.21-150400.24.21.2.ppc64le",
            "openSUSE Leap 15.4:kernel-default-optional-5.14.21-150400.24.21.2.s390x",
            "openSUSE Leap 15.4:kernel-default-optional-5.14.21-150400.24.21.2.x86_64",
            "openSUSE Leap 15.4:kernel-devel-5.14.21-150400.24.21.2.noarch",
            "openSUSE Leap 15.4:kernel-docs-5.14.21-150400.24.21.3.noarch",
            "openSUSE Leap 15.4:kernel-docs-html-5.14.21-150400.24.21.3.noarch",
            "openSUSE Leap 15.4:kernel-kvmsmall-5.14.21-150400.24.21.2.aarch64",
            "openSUSE Leap 15.4:kernel-kvmsmall-5.14.21-150400.24.21.2.ppc64le",
            "openSUSE Leap 15.4:kernel-kvmsmall-5.14.21-150400.24.21.2.x86_64",
            "openSUSE Leap 15.4:kernel-kvmsmall-devel-5.14.21-150400.24.21.2.aarch64",
            "openSUSE Leap 15.4:kernel-kvmsmall-devel-5.14.21-150400.24.21.2.ppc64le",
            "openSUSE Leap 15.4:kernel-kvmsmall-devel-5.14.21-150400.24.21.2.x86_64",
            "openSUSE Leap 15.4:kernel-kvmsmall-livepatch-devel-5.14.21-150400.24.21.2.aarch64",
            "openSUSE Leap 15.4:kernel-kvmsmall-livepatch-devel-5.14.21-150400.24.21.2.ppc64le",
            "openSUSE Leap 15.4:kernel-kvmsmall-livepatch-devel-5.14.21-150400.24.21.2.x86_64",
            "openSUSE Leap 15.4:kernel-macros-5.14.21-150400.24.21.2.noarch",
            "openSUSE Leap 15.4:kernel-obs-build-5.14.21-150400.24.21.2.aarch64",
            "openSUSE Leap 15.4:kernel-obs-build-5.14.21-150400.24.21.2.ppc64le",
            "openSUSE Leap 15.4:kernel-obs-build-5.14.21-150400.24.21.2.s390x",
            "openSUSE Leap 15.4:kernel-obs-build-5.14.21-150400.24.21.2.x86_64",
            "openSUSE Leap 15.4:kernel-obs-qa-5.14.21-150400.24.21.1.aarch64",
            "openSUSE Leap 15.4:kernel-obs-qa-5.14.21-150400.24.21.1.ppc64le",
            "openSUSE Leap 15.4:kernel-obs-qa-5.14.21-150400.24.21.1.s390x",
            "openSUSE Leap 15.4:kernel-obs-qa-5.14.21-150400.24.21.1.x86_64",
            "openSUSE Leap 15.4:kernel-source-5.14.21-150400.24.21.2.noarch",
            "openSUSE Leap 15.4:kernel-source-vanilla-5.14.21-150400.24.21.2.noarch",
            "openSUSE Leap 15.4:kernel-syms-5.14.21-150400.24.21.1.aarch64",
            "openSUSE Leap 15.4:kernel-syms-5.14.21-150400.24.21.1.ppc64le",
            "openSUSE Leap 15.4:kernel-syms-5.14.21-150400.24.21.1.s390x",
            "openSUSE Leap 15.4:kernel-syms-5.14.21-150400.24.21.1.x86_64",
            "openSUSE Leap 15.4:kernel-zfcpdump-5.14.21-150400.24.21.2.s390x",
            "openSUSE Leap 15.4:kselftests-kmp-64kb-5.14.21-150400.24.21.2.aarch64",
            "openSUSE Leap 15.4:kselftests-kmp-default-5.14.21-150400.24.21.2.aarch64",
            "openSUSE Leap 15.4:kselftests-kmp-default-5.14.21-150400.24.21.2.ppc64le",
            "openSUSE Leap 15.4:kselftests-kmp-default-5.14.21-150400.24.21.2.s390x",
            "openSUSE Leap 15.4:kselftests-kmp-default-5.14.21-150400.24.21.2.x86_64",
            "openSUSE Leap 15.4:ocfs2-kmp-64kb-5.14.21-150400.24.21.2.aarch64",
            "openSUSE Leap 15.4:ocfs2-kmp-default-5.14.21-150400.24.21.2.aarch64",
            "openSUSE Leap 15.4:ocfs2-kmp-default-5.14.21-150400.24.21.2.ppc64le",
            "openSUSE Leap 15.4:ocfs2-kmp-default-5.14.21-150400.24.21.2.s390x",
            "openSUSE Leap 15.4:ocfs2-kmp-default-5.14.21-150400.24.21.2.x86_64",
            "openSUSE Leap 15.4:reiserfs-kmp-64kb-5.14.21-150400.24.21.2.aarch64",
            "openSUSE Leap 15.4:reiserfs-kmp-default-5.14.21-150400.24.21.2.aarch64",
            "openSUSE Leap 15.4:reiserfs-kmp-default-5.14.21-150400.24.21.2.ppc64le",
            "openSUSE Leap 15.4:reiserfs-kmp-default-5.14.21-150400.24.21.2.s390x",
            "openSUSE Leap 15.4:reiserfs-kmp-default-5.14.21-150400.24.21.2.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 6.7,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:R/S:U/C:H/I:H/A:H",
            "version": "3.1"
          },
          "products": [
            "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.21.2.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.21.2.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.21.2.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.21.2.x86_64",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.21.2.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.21.2.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.21.2.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.21.2.x86_64",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.21.2.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.21.2.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.21.2.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.21.2.x86_64",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.21.2.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.21.2.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.21.2.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.21.2.x86_64",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.21.2.ppc64le",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.21.2.s390x",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.21.2.x86_64",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.21.2.ppc64le",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.21.2.s390x",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.21.2.x86_64",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_21-default-1-150400.9.3.2.ppc64le",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_21-default-1-150400.9.3.2.s390x",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_21-default-1-150400.9.3.2.x86_64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-64kb-5.14.21-150400.24.21.2.aarch64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-64kb-devel-5.14.21-150400.24.21.2.aarch64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-5.14.21-150400.24.21.2.aarch64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-5.14.21-150400.24.21.2.ppc64le",
            "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-5.14.21-150400.24.21.2.s390x",
            "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-5.14.21-150400.24.21.2.x86_64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-base-5.14.21-150400.24.21.2.150400.24.7.2.aarch64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-base-5.14.21-150400.24.21.2.150400.24.7.2.ppc64le",
            "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-base-5.14.21-150400.24.21.2.150400.24.7.2.s390x",
            "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-base-5.14.21-150400.24.21.2.150400.24.7.2.x86_64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-devel-5.14.21-150400.24.21.2.aarch64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-devel-5.14.21-150400.24.21.2.ppc64le",
            "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-devel-5.14.21-150400.24.21.2.s390x",
            "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-devel-5.14.21-150400.24.21.2.x86_64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-devel-5.14.21-150400.24.21.2.noarch",
            "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-macros-5.14.21-150400.24.21.2.noarch",
            "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-zfcpdump-5.14.21-150400.24.21.2.s390x",
            "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-docs-5.14.21-150400.24.21.3.noarch",
            "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-obs-build-5.14.21-150400.24.21.2.aarch64",
            "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-obs-build-5.14.21-150400.24.21.2.ppc64le",
            "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-obs-build-5.14.21-150400.24.21.2.s390x",
            "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-obs-build-5.14.21-150400.24.21.2.x86_64",
            "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-source-5.14.21-150400.24.21.2.noarch",
            "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-syms-5.14.21-150400.24.21.1.aarch64",
            "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-syms-5.14.21-150400.24.21.1.ppc64le",
            "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-syms-5.14.21-150400.24.21.1.s390x",
            "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-syms-5.14.21-150400.24.21.1.x86_64",
            "SUSE Linux Enterprise Module for Legacy 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.21.2.aarch64",
            "SUSE Linux Enterprise Module for Legacy 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.21.2.ppc64le",
            "SUSE Linux Enterprise Module for Legacy 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.21.2.s390x",
            "SUSE Linux Enterprise Module for Legacy 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.21.2.x86_64",
            "SUSE Linux Enterprise Workstation Extension 15 SP4:kernel-default-extra-5.14.21-150400.24.21.2.x86_64",
            "openSUSE Leap 15.4:cluster-md-kmp-64kb-5.14.21-150400.24.21.2.aarch64",
            "openSUSE Leap 15.4:cluster-md-kmp-default-5.14.21-150400.24.21.2.aarch64",
            "openSUSE Leap 15.4:cluster-md-kmp-default-5.14.21-150400.24.21.2.ppc64le",
            "openSUSE Leap 15.4:cluster-md-kmp-default-5.14.21-150400.24.21.2.s390x",
            "openSUSE Leap 15.4:cluster-md-kmp-default-5.14.21-150400.24.21.2.x86_64",
            "openSUSE Leap 15.4:dlm-kmp-64kb-5.14.21-150400.24.21.2.aarch64",
            "openSUSE Leap 15.4:dlm-kmp-default-5.14.21-150400.24.21.2.aarch64",
            "openSUSE Leap 15.4:dlm-kmp-default-5.14.21-150400.24.21.2.ppc64le",
            "openSUSE Leap 15.4:dlm-kmp-default-5.14.21-150400.24.21.2.s390x",
            "openSUSE Leap 15.4:dlm-kmp-default-5.14.21-150400.24.21.2.x86_64",
            "openSUSE Leap 15.4:dtb-allwinner-5.14.21-150400.24.21.1.aarch64",
            "openSUSE Leap 15.4:dtb-altera-5.14.21-150400.24.21.1.aarch64",
            "openSUSE Leap 15.4:dtb-amazon-5.14.21-150400.24.21.1.aarch64",
            "openSUSE Leap 15.4:dtb-amd-5.14.21-150400.24.21.1.aarch64",
            "openSUSE Leap 15.4:dtb-amlogic-5.14.21-150400.24.21.1.aarch64",
            "openSUSE Leap 15.4:dtb-apm-5.14.21-150400.24.21.1.aarch64",
            "openSUSE Leap 15.4:dtb-apple-5.14.21-150400.24.21.1.aarch64",
            "openSUSE Leap 15.4:dtb-arm-5.14.21-150400.24.21.1.aarch64",
            "openSUSE Leap 15.4:dtb-broadcom-5.14.21-150400.24.21.1.aarch64",
            "openSUSE Leap 15.4:dtb-cavium-5.14.21-150400.24.21.1.aarch64",
            "openSUSE Leap 15.4:dtb-exynos-5.14.21-150400.24.21.1.aarch64",
            "openSUSE Leap 15.4:dtb-freescale-5.14.21-150400.24.21.1.aarch64",
            "openSUSE Leap 15.4:dtb-hisilicon-5.14.21-150400.24.21.1.aarch64",
            "openSUSE Leap 15.4:dtb-lg-5.14.21-150400.24.21.1.aarch64",
            "openSUSE Leap 15.4:dtb-marvell-5.14.21-150400.24.21.1.aarch64",
            "openSUSE Leap 15.4:dtb-mediatek-5.14.21-150400.24.21.1.aarch64",
            "openSUSE Leap 15.4:dtb-nvidia-5.14.21-150400.24.21.1.aarch64",
            "openSUSE Leap 15.4:dtb-qcom-5.14.21-150400.24.21.1.aarch64",
            "openSUSE Leap 15.4:dtb-renesas-5.14.21-150400.24.21.1.aarch64",
            "openSUSE Leap 15.4:dtb-rockchip-5.14.21-150400.24.21.1.aarch64",
            "openSUSE Leap 15.4:dtb-socionext-5.14.21-150400.24.21.1.aarch64",
            "openSUSE Leap 15.4:dtb-sprd-5.14.21-150400.24.21.1.aarch64",
            "openSUSE Leap 15.4:dtb-xilinx-5.14.21-150400.24.21.1.aarch64",
            "openSUSE Leap 15.4:gfs2-kmp-64kb-5.14.21-150400.24.21.2.aarch64",
            "openSUSE Leap 15.4:gfs2-kmp-default-5.14.21-150400.24.21.2.aarch64",
            "openSUSE Leap 15.4:gfs2-kmp-default-5.14.21-150400.24.21.2.ppc64le",
            "openSUSE Leap 15.4:gfs2-kmp-default-5.14.21-150400.24.21.2.s390x",
            "openSUSE Leap 15.4:gfs2-kmp-default-5.14.21-150400.24.21.2.x86_64",
            "openSUSE Leap 15.4:kernel-64kb-5.14.21-150400.24.21.2.aarch64",
            "openSUSE Leap 15.4:kernel-64kb-devel-5.14.21-150400.24.21.2.aarch64",
            "openSUSE Leap 15.4:kernel-64kb-extra-5.14.21-150400.24.21.2.aarch64",
            "openSUSE Leap 15.4:kernel-64kb-livepatch-devel-5.14.21-150400.24.21.2.aarch64",
            "openSUSE Leap 15.4:kernel-64kb-optional-5.14.21-150400.24.21.2.aarch64",
            "openSUSE Leap 15.4:kernel-debug-5.14.21-150400.24.21.2.ppc64le",
            "openSUSE Leap 15.4:kernel-debug-5.14.21-150400.24.21.2.x86_64",
            "openSUSE Leap 15.4:kernel-debug-devel-5.14.21-150400.24.21.2.ppc64le",
            "openSUSE Leap 15.4:kernel-debug-devel-5.14.21-150400.24.21.2.x86_64",
            "openSUSE Leap 15.4:kernel-debug-livepatch-devel-5.14.21-150400.24.21.2.ppc64le",
            "openSUSE Leap 15.4:kernel-debug-livepatch-devel-5.14.21-150400.24.21.2.x86_64",
            "openSUSE Leap 15.4:kernel-default-5.14.21-150400.24.21.2.aarch64",
            "openSUSE Leap 15.4:kernel-default-5.14.21-150400.24.21.2.ppc64le",
            "openSUSE Leap 15.4:kernel-default-5.14.21-150400.24.21.2.s390x",
            "openSUSE Leap 15.4:kernel-default-5.14.21-150400.24.21.2.x86_64",
            "openSUSE Leap 15.4:kernel-default-base-5.14.21-150400.24.21.2.150400.24.7.2.aarch64",
            "openSUSE Leap 15.4:kernel-default-base-5.14.21-150400.24.21.2.150400.24.7.2.ppc64le",
            "openSUSE Leap 15.4:kernel-default-base-5.14.21-150400.24.21.2.150400.24.7.2.s390x",
            "openSUSE Leap 15.4:kernel-default-base-5.14.21-150400.24.21.2.150400.24.7.2.x86_64",
            "openSUSE Leap 15.4:kernel-default-base-rebuild-5.14.21-150400.24.21.2.150400.24.7.2.aarch64",
            "openSUSE Leap 15.4:kernel-default-base-rebuild-5.14.21-150400.24.21.2.150400.24.7.2.ppc64le",
            "openSUSE Leap 15.4:kernel-default-base-rebuild-5.14.21-150400.24.21.2.150400.24.7.2.s390x",
            "openSUSE Leap 15.4:kernel-default-base-rebuild-5.14.21-150400.24.21.2.150400.24.7.2.x86_64",
            "openSUSE Leap 15.4:kernel-default-devel-5.14.21-150400.24.21.2.aarch64",
            "openSUSE Leap 15.4:kernel-default-devel-5.14.21-150400.24.21.2.ppc64le",
            "openSUSE Leap 15.4:kernel-default-devel-5.14.21-150400.24.21.2.s390x",
            "openSUSE Leap 15.4:kernel-default-devel-5.14.21-150400.24.21.2.x86_64",
            "openSUSE Leap 15.4:kernel-default-extra-5.14.21-150400.24.21.2.aarch64",
            "openSUSE Leap 15.4:kernel-default-extra-5.14.21-150400.24.21.2.ppc64le",
            "openSUSE Leap 15.4:kernel-default-extra-5.14.21-150400.24.21.2.s390x",
            "openSUSE Leap 15.4:kernel-default-extra-5.14.21-150400.24.21.2.x86_64",
            "openSUSE Leap 15.4:kernel-default-livepatch-5.14.21-150400.24.21.2.aarch64",
            "openSUSE Leap 15.4:kernel-default-livepatch-5.14.21-150400.24.21.2.ppc64le",
            "openSUSE Leap 15.4:kernel-default-livepatch-5.14.21-150400.24.21.2.s390x",
            "openSUSE Leap 15.4:kernel-default-livepatch-5.14.21-150400.24.21.2.x86_64",
            "openSUSE Leap 15.4:kernel-default-livepatch-devel-5.14.21-150400.24.21.2.aarch64",
            "openSUSE Leap 15.4:kernel-default-livepatch-devel-5.14.21-150400.24.21.2.ppc64le",
            "openSUSE Leap 15.4:kernel-default-livepatch-devel-5.14.21-150400.24.21.2.s390x",
            "openSUSE Leap 15.4:kernel-default-livepatch-devel-5.14.21-150400.24.21.2.x86_64",
            "openSUSE Leap 15.4:kernel-default-optional-5.14.21-150400.24.21.2.aarch64",
            "openSUSE Leap 15.4:kernel-default-optional-5.14.21-150400.24.21.2.ppc64le",
            "openSUSE Leap 15.4:kernel-default-optional-5.14.21-150400.24.21.2.s390x",
            "openSUSE Leap 15.4:kernel-default-optional-5.14.21-150400.24.21.2.x86_64",
            "openSUSE Leap 15.4:kernel-devel-5.14.21-150400.24.21.2.noarch",
            "openSUSE Leap 15.4:kernel-docs-5.14.21-150400.24.21.3.noarch",
            "openSUSE Leap 15.4:kernel-docs-html-5.14.21-150400.24.21.3.noarch",
            "openSUSE Leap 15.4:kernel-kvmsmall-5.14.21-150400.24.21.2.aarch64",
            "openSUSE Leap 15.4:kernel-kvmsmall-5.14.21-150400.24.21.2.ppc64le",
            "openSUSE Leap 15.4:kernel-kvmsmall-5.14.21-150400.24.21.2.x86_64",
            "openSUSE Leap 15.4:kernel-kvmsmall-devel-5.14.21-150400.24.21.2.aarch64",
            "openSUSE Leap 15.4:kernel-kvmsmall-devel-5.14.21-150400.24.21.2.ppc64le",
            "openSUSE Leap 15.4:kernel-kvmsmall-devel-5.14.21-150400.24.21.2.x86_64",
            "openSUSE Leap 15.4:kernel-kvmsmall-livepatch-devel-5.14.21-150400.24.21.2.aarch64",
            "openSUSE Leap 15.4:kernel-kvmsmall-livepatch-devel-5.14.21-150400.24.21.2.ppc64le",
            "openSUSE Leap 15.4:kernel-kvmsmall-livepatch-devel-5.14.21-150400.24.21.2.x86_64",
            "openSUSE Leap 15.4:kernel-macros-5.14.21-150400.24.21.2.noarch",
            "openSUSE Leap 15.4:kernel-obs-build-5.14.21-150400.24.21.2.aarch64",
            "openSUSE Leap 15.4:kernel-obs-build-5.14.21-150400.24.21.2.ppc64le",
            "openSUSE Leap 15.4:kernel-obs-build-5.14.21-150400.24.21.2.s390x",
            "openSUSE Leap 15.4:kernel-obs-build-5.14.21-150400.24.21.2.x86_64",
            "openSUSE Leap 15.4:kernel-obs-qa-5.14.21-150400.24.21.1.aarch64",
            "openSUSE Leap 15.4:kernel-obs-qa-5.14.21-150400.24.21.1.ppc64le",
            "openSUSE Leap 15.4:kernel-obs-qa-5.14.21-150400.24.21.1.s390x",
            "openSUSE Leap 15.4:kernel-obs-qa-5.14.21-150400.24.21.1.x86_64",
            "openSUSE Leap 15.4:kernel-source-5.14.21-150400.24.21.2.noarch",
            "openSUSE Leap 15.4:kernel-source-vanilla-5.14.21-150400.24.21.2.noarch",
            "openSUSE Leap 15.4:kernel-syms-5.14.21-150400.24.21.1.aarch64",
            "openSUSE Leap 15.4:kernel-syms-5.14.21-150400.24.21.1.ppc64le",
            "openSUSE Leap 15.4:kernel-syms-5.14.21-150400.24.21.1.s390x",
            "openSUSE Leap 15.4:kernel-syms-5.14.21-150400.24.21.1.x86_64",
            "openSUSE Leap 15.4:kernel-zfcpdump-5.14.21-150400.24.21.2.s390x",
            "openSUSE Leap 15.4:kselftests-kmp-64kb-5.14.21-150400.24.21.2.aarch64",
            "openSUSE Leap 15.4:kselftests-kmp-default-5.14.21-150400.24.21.2.aarch64",
            "openSUSE Leap 15.4:kselftests-kmp-default-5.14.21-150400.24.21.2.ppc64le",
            "openSUSE Leap 15.4:kselftests-kmp-default-5.14.21-150400.24.21.2.s390x",
            "openSUSE Leap 15.4:kselftests-kmp-default-5.14.21-150400.24.21.2.x86_64",
            "openSUSE Leap 15.4:ocfs2-kmp-64kb-5.14.21-150400.24.21.2.aarch64",
            "openSUSE Leap 15.4:ocfs2-kmp-default-5.14.21-150400.24.21.2.aarch64",
            "openSUSE Leap 15.4:ocfs2-kmp-default-5.14.21-150400.24.21.2.ppc64le",
            "openSUSE Leap 15.4:ocfs2-kmp-default-5.14.21-150400.24.21.2.s390x",
            "openSUSE Leap 15.4:ocfs2-kmp-default-5.14.21-150400.24.21.2.x86_64",
            "openSUSE Leap 15.4:reiserfs-kmp-64kb-5.14.21-150400.24.21.2.aarch64",
            "openSUSE Leap 15.4:reiserfs-kmp-default-5.14.21-150400.24.21.2.aarch64",
            "openSUSE Leap 15.4:reiserfs-kmp-default-5.14.21-150400.24.21.2.ppc64le",
            "openSUSE Leap 15.4:reiserfs-kmp-default-5.14.21-150400.24.21.2.s390x",
            "openSUSE Leap 15.4:reiserfs-kmp-default-5.14.21-150400.24.21.2.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2022-09-16T15:30:19Z",
          "details": "moderate"
        }
      ],
      "title": "CVE-2022-2938"
    },
    {
      "cve": "CVE-2022-2959",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2022-2959"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "A race condition was found in the Linux kernel\u0027s watch queue due to a missing lock in pipe_resize_ring(). The specific flaw exists within the handling of pipe buffers. The issue results from the lack of proper locking when performing operations on an object. This flaw allows a local user to crash the system or escalate their privileges on the system.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.21.2.aarch64",
          "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.21.2.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.21.2.s390x",
          "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.21.2.x86_64",
          "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.21.2.aarch64",
          "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.21.2.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.21.2.s390x",
          "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.21.2.x86_64",
          "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.21.2.aarch64",
          "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.21.2.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.21.2.s390x",
          "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.21.2.x86_64",
          "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.21.2.aarch64",
          "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.21.2.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.21.2.s390x",
          "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.21.2.x86_64",
          "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.21.2.ppc64le",
          "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.21.2.s390x",
          "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.21.2.x86_64",
          "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.21.2.ppc64le",
          "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.21.2.s390x",
          "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.21.2.x86_64",
          "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_21-default-1-150400.9.3.2.ppc64le",
          "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_21-default-1-150400.9.3.2.s390x",
          "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_21-default-1-150400.9.3.2.x86_64",
          "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-64kb-5.14.21-150400.24.21.2.aarch64",
          "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-64kb-devel-5.14.21-150400.24.21.2.aarch64",
          "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-5.14.21-150400.24.21.2.aarch64",
          "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-5.14.21-150400.24.21.2.ppc64le",
          "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-5.14.21-150400.24.21.2.s390x",
          "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-5.14.21-150400.24.21.2.x86_64",
          "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-base-5.14.21-150400.24.21.2.150400.24.7.2.aarch64",
          "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-base-5.14.21-150400.24.21.2.150400.24.7.2.ppc64le",
          "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-base-5.14.21-150400.24.21.2.150400.24.7.2.s390x",
          "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-base-5.14.21-150400.24.21.2.150400.24.7.2.x86_64",
          "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-devel-5.14.21-150400.24.21.2.aarch64",
          "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-devel-5.14.21-150400.24.21.2.ppc64le",
          "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-devel-5.14.21-150400.24.21.2.s390x",
          "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-devel-5.14.21-150400.24.21.2.x86_64",
          "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-devel-5.14.21-150400.24.21.2.noarch",
          "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-macros-5.14.21-150400.24.21.2.noarch",
          "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-zfcpdump-5.14.21-150400.24.21.2.s390x",
          "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-docs-5.14.21-150400.24.21.3.noarch",
          "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-obs-build-5.14.21-150400.24.21.2.aarch64",
          "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-obs-build-5.14.21-150400.24.21.2.ppc64le",
          "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-obs-build-5.14.21-150400.24.21.2.s390x",
          "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-obs-build-5.14.21-150400.24.21.2.x86_64",
          "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-source-5.14.21-150400.24.21.2.noarch",
          "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-syms-5.14.21-150400.24.21.1.aarch64",
          "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-syms-5.14.21-150400.24.21.1.ppc64le",
          "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-syms-5.14.21-150400.24.21.1.s390x",
          "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-syms-5.14.21-150400.24.21.1.x86_64",
          "SUSE Linux Enterprise Module for Legacy 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.21.2.aarch64",
          "SUSE Linux Enterprise Module for Legacy 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.21.2.ppc64le",
          "SUSE Linux Enterprise Module for Legacy 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.21.2.s390x",
          "SUSE Linux Enterprise Module for Legacy 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.21.2.x86_64",
          "SUSE Linux Enterprise Workstation Extension 15 SP4:kernel-default-extra-5.14.21-150400.24.21.2.x86_64",
          "openSUSE Leap 15.4:cluster-md-kmp-64kb-5.14.21-150400.24.21.2.aarch64",
          "openSUSE Leap 15.4:cluster-md-kmp-default-5.14.21-150400.24.21.2.aarch64",
          "openSUSE Leap 15.4:cluster-md-kmp-default-5.14.21-150400.24.21.2.ppc64le",
          "openSUSE Leap 15.4:cluster-md-kmp-default-5.14.21-150400.24.21.2.s390x",
          "openSUSE Leap 15.4:cluster-md-kmp-default-5.14.21-150400.24.21.2.x86_64",
          "openSUSE Leap 15.4:dlm-kmp-64kb-5.14.21-150400.24.21.2.aarch64",
          "openSUSE Leap 15.4:dlm-kmp-default-5.14.21-150400.24.21.2.aarch64",
          "openSUSE Leap 15.4:dlm-kmp-default-5.14.21-150400.24.21.2.ppc64le",
          "openSUSE Leap 15.4:dlm-kmp-default-5.14.21-150400.24.21.2.s390x",
          "openSUSE Leap 15.4:dlm-kmp-default-5.14.21-150400.24.21.2.x86_64",
          "openSUSE Leap 15.4:dtb-allwinner-5.14.21-150400.24.21.1.aarch64",
          "openSUSE Leap 15.4:dtb-altera-5.14.21-150400.24.21.1.aarch64",
          "openSUSE Leap 15.4:dtb-amazon-5.14.21-150400.24.21.1.aarch64",
          "openSUSE Leap 15.4:dtb-amd-5.14.21-150400.24.21.1.aarch64",
          "openSUSE Leap 15.4:dtb-amlogic-5.14.21-150400.24.21.1.aarch64",
          "openSUSE Leap 15.4:dtb-apm-5.14.21-150400.24.21.1.aarch64",
          "openSUSE Leap 15.4:dtb-apple-5.14.21-150400.24.21.1.aarch64",
          "openSUSE Leap 15.4:dtb-arm-5.14.21-150400.24.21.1.aarch64",
          "openSUSE Leap 15.4:dtb-broadcom-5.14.21-150400.24.21.1.aarch64",
          "openSUSE Leap 15.4:dtb-cavium-5.14.21-150400.24.21.1.aarch64",
          "openSUSE Leap 15.4:dtb-exynos-5.14.21-150400.24.21.1.aarch64",
          "openSUSE Leap 15.4:dtb-freescale-5.14.21-150400.24.21.1.aarch64",
          "openSUSE Leap 15.4:dtb-hisilicon-5.14.21-150400.24.21.1.aarch64",
          "openSUSE Leap 15.4:dtb-lg-5.14.21-150400.24.21.1.aarch64",
          "openSUSE Leap 15.4:dtb-marvell-5.14.21-150400.24.21.1.aarch64",
          "openSUSE Leap 15.4:dtb-mediatek-5.14.21-150400.24.21.1.aarch64",
          "openSUSE Leap 15.4:dtb-nvidia-5.14.21-150400.24.21.1.aarch64",
          "openSUSE Leap 15.4:dtb-qcom-5.14.21-150400.24.21.1.aarch64",
          "openSUSE Leap 15.4:dtb-renesas-5.14.21-150400.24.21.1.aarch64",
          "openSUSE Leap 15.4:dtb-rockchip-5.14.21-150400.24.21.1.aarch64",
          "openSUSE Leap 15.4:dtb-socionext-5.14.21-150400.24.21.1.aarch64",
          "openSUSE Leap 15.4:dtb-sprd-5.14.21-150400.24.21.1.aarch64",
          "openSUSE Leap 15.4:dtb-xilinx-5.14.21-150400.24.21.1.aarch64",
          "openSUSE Leap 15.4:gfs2-kmp-64kb-5.14.21-150400.24.21.2.aarch64",
          "openSUSE Leap 15.4:gfs2-kmp-default-5.14.21-150400.24.21.2.aarch64",
          "openSUSE Leap 15.4:gfs2-kmp-default-5.14.21-150400.24.21.2.ppc64le",
          "openSUSE Leap 15.4:gfs2-kmp-default-5.14.21-150400.24.21.2.s390x",
          "openSUSE Leap 15.4:gfs2-kmp-default-5.14.21-150400.24.21.2.x86_64",
          "openSUSE Leap 15.4:kernel-64kb-5.14.21-150400.24.21.2.aarch64",
          "openSUSE Leap 15.4:kernel-64kb-devel-5.14.21-150400.24.21.2.aarch64",
          "openSUSE Leap 15.4:kernel-64kb-extra-5.14.21-150400.24.21.2.aarch64",
          "openSUSE Leap 15.4:kernel-64kb-livepatch-devel-5.14.21-150400.24.21.2.aarch64",
          "openSUSE Leap 15.4:kernel-64kb-optional-5.14.21-150400.24.21.2.aarch64",
          "openSUSE Leap 15.4:kernel-debug-5.14.21-150400.24.21.2.ppc64le",
          "openSUSE Leap 15.4:kernel-debug-5.14.21-150400.24.21.2.x86_64",
          "openSUSE Leap 15.4:kernel-debug-devel-5.14.21-150400.24.21.2.ppc64le",
          "openSUSE Leap 15.4:kernel-debug-devel-5.14.21-150400.24.21.2.x86_64",
          "openSUSE Leap 15.4:kernel-debug-livepatch-devel-5.14.21-150400.24.21.2.ppc64le",
          "openSUSE Leap 15.4:kernel-debug-livepatch-devel-5.14.21-150400.24.21.2.x86_64",
          "openSUSE Leap 15.4:kernel-default-5.14.21-150400.24.21.2.aarch64",
          "openSUSE Leap 15.4:kernel-default-5.14.21-150400.24.21.2.ppc64le",
          "openSUSE Leap 15.4:kernel-default-5.14.21-150400.24.21.2.s390x",
          "openSUSE Leap 15.4:kernel-default-5.14.21-150400.24.21.2.x86_64",
          "openSUSE Leap 15.4:kernel-default-base-5.14.21-150400.24.21.2.150400.24.7.2.aarch64",
          "openSUSE Leap 15.4:kernel-default-base-5.14.21-150400.24.21.2.150400.24.7.2.ppc64le",
          "openSUSE Leap 15.4:kernel-default-base-5.14.21-150400.24.21.2.150400.24.7.2.s390x",
          "openSUSE Leap 15.4:kernel-default-base-5.14.21-150400.24.21.2.150400.24.7.2.x86_64",
          "openSUSE Leap 15.4:kernel-default-base-rebuild-5.14.21-150400.24.21.2.150400.24.7.2.aarch64",
          "openSUSE Leap 15.4:kernel-default-base-rebuild-5.14.21-150400.24.21.2.150400.24.7.2.ppc64le",
          "openSUSE Leap 15.4:kernel-default-base-rebuild-5.14.21-150400.24.21.2.150400.24.7.2.s390x",
          "openSUSE Leap 15.4:kernel-default-base-rebuild-5.14.21-150400.24.21.2.150400.24.7.2.x86_64",
          "openSUSE Leap 15.4:kernel-default-devel-5.14.21-150400.24.21.2.aarch64",
          "openSUSE Leap 15.4:kernel-default-devel-5.14.21-150400.24.21.2.ppc64le",
          "openSUSE Leap 15.4:kernel-default-devel-5.14.21-150400.24.21.2.s390x",
          "openSUSE Leap 15.4:kernel-default-devel-5.14.21-150400.24.21.2.x86_64",
          "openSUSE Leap 15.4:kernel-default-extra-5.14.21-150400.24.21.2.aarch64",
          "openSUSE Leap 15.4:kernel-default-extra-5.14.21-150400.24.21.2.ppc64le",
          "openSUSE Leap 15.4:kernel-default-extra-5.14.21-150400.24.21.2.s390x",
          "openSUSE Leap 15.4:kernel-default-extra-5.14.21-150400.24.21.2.x86_64",
          "openSUSE Leap 15.4:kernel-default-livepatch-5.14.21-150400.24.21.2.aarch64",
          "openSUSE Leap 15.4:kernel-default-livepatch-5.14.21-150400.24.21.2.ppc64le",
          "openSUSE Leap 15.4:kernel-default-livepatch-5.14.21-150400.24.21.2.s390x",
          "openSUSE Leap 15.4:kernel-default-livepatch-5.14.21-150400.24.21.2.x86_64",
          "openSUSE Leap 15.4:kernel-default-livepatch-devel-5.14.21-150400.24.21.2.aarch64",
          "openSUSE Leap 15.4:kernel-default-livepatch-devel-5.14.21-150400.24.21.2.ppc64le",
          "openSUSE Leap 15.4:kernel-default-livepatch-devel-5.14.21-150400.24.21.2.s390x",
          "openSUSE Leap 15.4:kernel-default-livepatch-devel-5.14.21-150400.24.21.2.x86_64",
          "openSUSE Leap 15.4:kernel-default-optional-5.14.21-150400.24.21.2.aarch64",
          "openSUSE Leap 15.4:kernel-default-optional-5.14.21-150400.24.21.2.ppc64le",
          "openSUSE Leap 15.4:kernel-default-optional-5.14.21-150400.24.21.2.s390x",
          "openSUSE Leap 15.4:kernel-default-optional-5.14.21-150400.24.21.2.x86_64",
          "openSUSE Leap 15.4:kernel-devel-5.14.21-150400.24.21.2.noarch",
          "openSUSE Leap 15.4:kernel-docs-5.14.21-150400.24.21.3.noarch",
          "openSUSE Leap 15.4:kernel-docs-html-5.14.21-150400.24.21.3.noarch",
          "openSUSE Leap 15.4:kernel-kvmsmall-5.14.21-150400.24.21.2.aarch64",
          "openSUSE Leap 15.4:kernel-kvmsmall-5.14.21-150400.24.21.2.ppc64le",
          "openSUSE Leap 15.4:kernel-kvmsmall-5.14.21-150400.24.21.2.x86_64",
          "openSUSE Leap 15.4:kernel-kvmsmall-devel-5.14.21-150400.24.21.2.aarch64",
          "openSUSE Leap 15.4:kernel-kvmsmall-devel-5.14.21-150400.24.21.2.ppc64le",
          "openSUSE Leap 15.4:kernel-kvmsmall-devel-5.14.21-150400.24.21.2.x86_64",
          "openSUSE Leap 15.4:kernel-kvmsmall-livepatch-devel-5.14.21-150400.24.21.2.aarch64",
          "openSUSE Leap 15.4:kernel-kvmsmall-livepatch-devel-5.14.21-150400.24.21.2.ppc64le",
          "openSUSE Leap 15.4:kernel-kvmsmall-livepatch-devel-5.14.21-150400.24.21.2.x86_64",
          "openSUSE Leap 15.4:kernel-macros-5.14.21-150400.24.21.2.noarch",
          "openSUSE Leap 15.4:kernel-obs-build-5.14.21-150400.24.21.2.aarch64",
          "openSUSE Leap 15.4:kernel-obs-build-5.14.21-150400.24.21.2.ppc64le",
          "openSUSE Leap 15.4:kernel-obs-build-5.14.21-150400.24.21.2.s390x",
          "openSUSE Leap 15.4:kernel-obs-build-5.14.21-150400.24.21.2.x86_64",
          "openSUSE Leap 15.4:kernel-obs-qa-5.14.21-150400.24.21.1.aarch64",
          "openSUSE Leap 15.4:kernel-obs-qa-5.14.21-150400.24.21.1.ppc64le",
          "openSUSE Leap 15.4:kernel-obs-qa-5.14.21-150400.24.21.1.s390x",
          "openSUSE Leap 15.4:kernel-obs-qa-5.14.21-150400.24.21.1.x86_64",
          "openSUSE Leap 15.4:kernel-source-5.14.21-150400.24.21.2.noarch",
          "openSUSE Leap 15.4:kernel-source-vanilla-5.14.21-150400.24.21.2.noarch",
          "openSUSE Leap 15.4:kernel-syms-5.14.21-150400.24.21.1.aarch64",
          "openSUSE Leap 15.4:kernel-syms-5.14.21-150400.24.21.1.ppc64le",
          "openSUSE Leap 15.4:kernel-syms-5.14.21-150400.24.21.1.s390x",
          "openSUSE Leap 15.4:kernel-syms-5.14.21-150400.24.21.1.x86_64",
          "openSUSE Leap 15.4:kernel-zfcpdump-5.14.21-150400.24.21.2.s390x",
          "openSUSE Leap 15.4:kselftests-kmp-64kb-5.14.21-150400.24.21.2.aarch64",
          "openSUSE Leap 15.4:kselftests-kmp-default-5.14.21-150400.24.21.2.aarch64",
          "openSUSE Leap 15.4:kselftests-kmp-default-5.14.21-150400.24.21.2.ppc64le",
          "openSUSE Leap 15.4:kselftests-kmp-default-5.14.21-150400.24.21.2.s390x",
          "openSUSE Leap 15.4:kselftests-kmp-default-5.14.21-150400.24.21.2.x86_64",
          "openSUSE Leap 15.4:ocfs2-kmp-64kb-5.14.21-150400.24.21.2.aarch64",
          "openSUSE Leap 15.4:ocfs2-kmp-default-5.14.21-150400.24.21.2.aarch64",
          "openSUSE Leap 15.4:ocfs2-kmp-default-5.14.21-150400.24.21.2.ppc64le",
          "openSUSE Leap 15.4:ocfs2-kmp-default-5.14.21-150400.24.21.2.s390x",
          "openSUSE Leap 15.4:ocfs2-kmp-default-5.14.21-150400.24.21.2.x86_64",
          "openSUSE Leap 15.4:reiserfs-kmp-64kb-5.14.21-150400.24.21.2.aarch64",
          "openSUSE Leap 15.4:reiserfs-kmp-default-5.14.21-150400.24.21.2.aarch64",
          "openSUSE Leap 15.4:reiserfs-kmp-default-5.14.21-150400.24.21.2.ppc64le",
          "openSUSE Leap 15.4:reiserfs-kmp-default-5.14.21-150400.24.21.2.s390x",
          "openSUSE Leap 15.4:reiserfs-kmp-default-5.14.21-150400.24.21.2.x86_64"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2022-2959",
          "url": "https://www.suse.com/security/cve/CVE-2022-2959"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1202681 for CVE-2022-2959",
          "url": "https://bugzilla.suse.com/1202681"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1202685 for CVE-2022-2959",
          "url": "https://bugzilla.suse.com/1202685"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.21.2.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.21.2.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.21.2.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.21.2.x86_64",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.21.2.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.21.2.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.21.2.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.21.2.x86_64",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.21.2.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.21.2.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.21.2.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.21.2.x86_64",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.21.2.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.21.2.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.21.2.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.21.2.x86_64",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.21.2.ppc64le",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.21.2.s390x",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.21.2.x86_64",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.21.2.ppc64le",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.21.2.s390x",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.21.2.x86_64",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_21-default-1-150400.9.3.2.ppc64le",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_21-default-1-150400.9.3.2.s390x",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_21-default-1-150400.9.3.2.x86_64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-64kb-5.14.21-150400.24.21.2.aarch64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-64kb-devel-5.14.21-150400.24.21.2.aarch64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-5.14.21-150400.24.21.2.aarch64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-5.14.21-150400.24.21.2.ppc64le",
            "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-5.14.21-150400.24.21.2.s390x",
            "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-5.14.21-150400.24.21.2.x86_64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-base-5.14.21-150400.24.21.2.150400.24.7.2.aarch64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-base-5.14.21-150400.24.21.2.150400.24.7.2.ppc64le",
            "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-base-5.14.21-150400.24.21.2.150400.24.7.2.s390x",
            "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-base-5.14.21-150400.24.21.2.150400.24.7.2.x86_64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-devel-5.14.21-150400.24.21.2.aarch64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-devel-5.14.21-150400.24.21.2.ppc64le",
            "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-devel-5.14.21-150400.24.21.2.s390x",
            "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-devel-5.14.21-150400.24.21.2.x86_64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-devel-5.14.21-150400.24.21.2.noarch",
            "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-macros-5.14.21-150400.24.21.2.noarch",
            "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-zfcpdump-5.14.21-150400.24.21.2.s390x",
            "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-docs-5.14.21-150400.24.21.3.noarch",
            "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-obs-build-5.14.21-150400.24.21.2.aarch64",
            "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-obs-build-5.14.21-150400.24.21.2.ppc64le",
            "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-obs-build-5.14.21-150400.24.21.2.s390x",
            "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-obs-build-5.14.21-150400.24.21.2.x86_64",
            "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-source-5.14.21-150400.24.21.2.noarch",
            "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-syms-5.14.21-150400.24.21.1.aarch64",
            "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-syms-5.14.21-150400.24.21.1.ppc64le",
            "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-syms-5.14.21-150400.24.21.1.s390x",
            "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-syms-5.14.21-150400.24.21.1.x86_64",
            "SUSE Linux Enterprise Module for Legacy 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.21.2.aarch64",
            "SUSE Linux Enterprise Module for Legacy 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.21.2.ppc64le",
            "SUSE Linux Enterprise Module for Legacy 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.21.2.s390x",
            "SUSE Linux Enterprise Module for Legacy 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.21.2.x86_64",
            "SUSE Linux Enterprise Workstation Extension 15 SP4:kernel-default-extra-5.14.21-150400.24.21.2.x86_64",
            "openSUSE Leap 15.4:cluster-md-kmp-64kb-5.14.21-150400.24.21.2.aarch64",
            "openSUSE Leap 15.4:cluster-md-kmp-default-5.14.21-150400.24.21.2.aarch64",
            "openSUSE Leap 15.4:cluster-md-kmp-default-5.14.21-150400.24.21.2.ppc64le",
            "openSUSE Leap 15.4:cluster-md-kmp-default-5.14.21-150400.24.21.2.s390x",
            "openSUSE Leap 15.4:cluster-md-kmp-default-5.14.21-150400.24.21.2.x86_64",
            "openSUSE Leap 15.4:dlm-kmp-64kb-5.14.21-150400.24.21.2.aarch64",
            "openSUSE Leap 15.4:dlm-kmp-default-5.14.21-150400.24.21.2.aarch64",
            "openSUSE Leap 15.4:dlm-kmp-default-5.14.21-150400.24.21.2.ppc64le",
            "openSUSE Leap 15.4:dlm-kmp-default-5.14.21-150400.24.21.2.s390x",
            "openSUSE Leap 15.4:dlm-kmp-default-5.14.21-150400.24.21.2.x86_64",
            "openSUSE Leap 15.4:dtb-allwinner-5.14.21-150400.24.21.1.aarch64",
            "openSUSE Leap 15.4:dtb-altera-5.14.21-150400.24.21.1.aarch64",
            "openSUSE Leap 15.4:dtb-amazon-5.14.21-150400.24.21.1.aarch64",
            "openSUSE Leap 15.4:dtb-amd-5.14.21-150400.24.21.1.aarch64",
            "openSUSE Leap 15.4:dtb-amlogic-5.14.21-150400.24.21.1.aarch64",
            "openSUSE Leap 15.4:dtb-apm-5.14.21-150400.24.21.1.aarch64",
            "openSUSE Leap 15.4:dtb-apple-5.14.21-150400.24.21.1.aarch64",
            "openSUSE Leap 15.4:dtb-arm-5.14.21-150400.24.21.1.aarch64",
            "openSUSE Leap 15.4:dtb-broadcom-5.14.21-150400.24.21.1.aarch64",
            "openSUSE Leap 15.4:dtb-cavium-5.14.21-150400.24.21.1.aarch64",
            "openSUSE Leap 15.4:dtb-exynos-5.14.21-150400.24.21.1.aarch64",
            "openSUSE Leap 15.4:dtb-freescale-5.14.21-150400.24.21.1.aarch64",
            "openSUSE Leap 15.4:dtb-hisilicon-5.14.21-150400.24.21.1.aarch64",
            "openSUSE Leap 15.4:dtb-lg-5.14.21-150400.24.21.1.aarch64",
            "openSUSE Leap 15.4:dtb-marvell-5.14.21-150400.24.21.1.aarch64",
            "openSUSE Leap 15.4:dtb-mediatek-5.14.21-150400.24.21.1.aarch64",
            "openSUSE Leap 15.4:dtb-nvidia-5.14.21-150400.24.21.1.aarch64",
            "openSUSE Leap 15.4:dtb-qcom-5.14.21-150400.24.21.1.aarch64",
            "openSUSE Leap 15.4:dtb-renesas-5.14.21-150400.24.21.1.aarch64",
            "openSUSE Leap 15.4:dtb-rockchip-5.14.21-150400.24.21.1.aarch64",
            "openSUSE Leap 15.4:dtb-socionext-5.14.21-150400.24.21.1.aarch64",
            "openSUSE Leap 15.4:dtb-sprd-5.14.21-150400.24.21.1.aarch64",
            "openSUSE Leap 15.4:dtb-xilinx-5.14.21-150400.24.21.1.aarch64",
            "openSUSE Leap 15.4:gfs2-kmp-64kb-5.14.21-150400.24.21.2.aarch64",
            "openSUSE Leap 15.4:gfs2-kmp-default-5.14.21-150400.24.21.2.aarch64",
            "openSUSE Leap 15.4:gfs2-kmp-default-5.14.21-150400.24.21.2.ppc64le",
            "openSUSE Leap 15.4:gfs2-kmp-default-5.14.21-150400.24.21.2.s390x",
            "openSUSE Leap 15.4:gfs2-kmp-default-5.14.21-150400.24.21.2.x86_64",
            "openSUSE Leap 15.4:kernel-64kb-5.14.21-150400.24.21.2.aarch64",
            "openSUSE Leap 15.4:kernel-64kb-devel-5.14.21-150400.24.21.2.aarch64",
            "openSUSE Leap 15.4:kernel-64kb-extra-5.14.21-150400.24.21.2.aarch64",
            "openSUSE Leap 15.4:kernel-64kb-livepatch-devel-5.14.21-150400.24.21.2.aarch64",
            "openSUSE Leap 15.4:kernel-64kb-optional-5.14.21-150400.24.21.2.aarch64",
            "openSUSE Leap 15.4:kernel-debug-5.14.21-150400.24.21.2.ppc64le",
            "openSUSE Leap 15.4:kernel-debug-5.14.21-150400.24.21.2.x86_64",
            "openSUSE Leap 15.4:kernel-debug-devel-5.14.21-150400.24.21.2.ppc64le",
            "openSUSE Leap 15.4:kernel-debug-devel-5.14.21-150400.24.21.2.x86_64",
            "openSUSE Leap 15.4:kernel-debug-livepatch-devel-5.14.21-150400.24.21.2.ppc64le",
            "openSUSE Leap 15.4:kernel-debug-livepatch-devel-5.14.21-150400.24.21.2.x86_64",
            "openSUSE Leap 15.4:kernel-default-5.14.21-150400.24.21.2.aarch64",
            "openSUSE Leap 15.4:kernel-default-5.14.21-150400.24.21.2.ppc64le",
            "openSUSE Leap 15.4:kernel-default-5.14.21-150400.24.21.2.s390x",
            "openSUSE Leap 15.4:kernel-default-5.14.21-150400.24.21.2.x86_64",
            "openSUSE Leap 15.4:kernel-default-base-5.14.21-150400.24.21.2.150400.24.7.2.aarch64",
            "openSUSE Leap 15.4:kernel-default-base-5.14.21-150400.24.21.2.150400.24.7.2.ppc64le",
            "openSUSE Leap 15.4:kernel-default-base-5.14.21-150400.24.21.2.150400.24.7.2.s390x",
            "openSUSE Leap 15.4:kernel-default-base-5.14.21-150400.24.21.2.150400.24.7.2.x86_64",
            "openSUSE Leap 15.4:kernel-default-base-rebuild-5.14.21-150400.24.21.2.150400.24.7.2.aarch64",
            "openSUSE Leap 15.4:kernel-default-base-rebuild-5.14.21-150400.24.21.2.150400.24.7.2.ppc64le",
            "openSUSE Leap 15.4:kernel-default-base-rebuild-5.14.21-150400.24.21.2.150400.24.7.2.s390x",
            "openSUSE Leap 15.4:kernel-default-base-rebuild-5.14.21-150400.24.21.2.150400.24.7.2.x86_64",
            "openSUSE Leap 15.4:kernel-default-devel-5.14.21-150400.24.21.2.aarch64",
            "openSUSE Leap 15.4:kernel-default-devel-5.14.21-150400.24.21.2.ppc64le",
            "openSUSE Leap 15.4:kernel-default-devel-5.14.21-150400.24.21.2.s390x",
            "openSUSE Leap 15.4:kernel-default-devel-5.14.21-150400.24.21.2.x86_64",
            "openSUSE Leap 15.4:kernel-default-extra-5.14.21-150400.24.21.2.aarch64",
            "openSUSE Leap 15.4:kernel-default-extra-5.14.21-150400.24.21.2.ppc64le",
            "openSUSE Leap 15.4:kernel-default-extra-5.14.21-150400.24.21.2.s390x",
            "openSUSE Leap 15.4:kernel-default-extra-5.14.21-150400.24.21.2.x86_64",
            "openSUSE Leap 15.4:kernel-default-livepatch-5.14.21-150400.24.21.2.aarch64",
            "openSUSE Leap 15.4:kernel-default-livepatch-5.14.21-150400.24.21.2.ppc64le",
            "openSUSE Leap 15.4:kernel-default-livepatch-5.14.21-150400.24.21.2.s390x",
            "openSUSE Leap 15.4:kernel-default-livepatch-5.14.21-150400.24.21.2.x86_64",
            "openSUSE Leap 15.4:kernel-default-livepatch-devel-5.14.21-150400.24.21.2.aarch64",
            "openSUSE Leap 15.4:kernel-default-livepatch-devel-5.14.21-150400.24.21.2.ppc64le",
            "openSUSE Leap 15.4:kernel-default-livepatch-devel-5.14.21-150400.24.21.2.s390x",
            "openSUSE Leap 15.4:kernel-default-livepatch-devel-5.14.21-150400.24.21.2.x86_64",
            "openSUSE Leap 15.4:kernel-default-optional-5.14.21-150400.24.21.2.aarch64",
            "openSUSE Leap 15.4:kernel-default-optional-5.14.21-150400.24.21.2.ppc64le",
            "openSUSE Leap 15.4:kernel-default-optional-5.14.21-150400.24.21.2.s390x",
            "openSUSE Leap 15.4:kernel-default-optional-5.14.21-150400.24.21.2.x86_64",
            "openSUSE Leap 15.4:kernel-devel-5.14.21-150400.24.21.2.noarch",
            "openSUSE Leap 15.4:kernel-docs-5.14.21-150400.24.21.3.noarch",
            "openSUSE Leap 15.4:kernel-docs-html-5.14.21-150400.24.21.3.noarch",
            "openSUSE Leap 15.4:kernel-kvmsmall-5.14.21-150400.24.21.2.aarch64",
            "openSUSE Leap 15.4:kernel-kvmsmall-5.14.21-150400.24.21.2.ppc64le",
            "openSUSE Leap 15.4:kernel-kvmsmall-5.14.21-150400.24.21.2.x86_64",
            "openSUSE Leap 15.4:kernel-kvmsmall-devel-5.14.21-150400.24.21.2.aarch64",
            "openSUSE Leap 15.4:kernel-kvmsmall-devel-5.14.21-150400.24.21.2.ppc64le",
            "openSUSE Leap 15.4:kernel-kvmsmall-devel-5.14.21-150400.24.21.2.x86_64",
            "openSUSE Leap 15.4:kernel-kvmsmall-livepatch-devel-5.14.21-150400.24.21.2.aarch64",
            "openSUSE Leap 15.4:kernel-kvmsmall-livepatch-devel-5.14.21-150400.24.21.2.ppc64le",
            "openSUSE Leap 15.4:kernel-kvmsmall-livepatch-devel-5.14.21-150400.24.21.2.x86_64",
            "openSUSE Leap 15.4:kernel-macros-5.14.21-150400.24.21.2.noarch",
            "openSUSE Leap 15.4:kernel-obs-build-5.14.21-150400.24.21.2.aarch64",
            "openSUSE Leap 15.4:kernel-obs-build-5.14.21-150400.24.21.2.ppc64le",
            "openSUSE Leap 15.4:kernel-obs-build-5.14.21-150400.24.21.2.s390x",
            "openSUSE Leap 15.4:kernel-obs-build-5.14.21-150400.24.21.2.x86_64",
            "openSUSE Leap 15.4:kernel-obs-qa-5.14.21-150400.24.21.1.aarch64",
            "openSUSE Leap 15.4:kernel-obs-qa-5.14.21-150400.24.21.1.ppc64le",
            "openSUSE Leap 15.4:kernel-obs-qa-5.14.21-150400.24.21.1.s390x",
            "openSUSE Leap 15.4:kernel-obs-qa-5.14.21-150400.24.21.1.x86_64",
            "openSUSE Leap 15.4:kernel-source-5.14.21-150400.24.21.2.noarch",
            "openSUSE Leap 15.4:kernel-source-vanilla-5.14.21-150400.24.21.2.noarch",
            "openSUSE Leap 15.4:kernel-syms-5.14.21-150400.24.21.1.aarch64",
            "openSUSE Leap 15.4:kernel-syms-5.14.21-150400.24.21.1.ppc64le",
            "openSUSE Leap 15.4:kernel-syms-5.14.21-150400.24.21.1.s390x",
            "openSUSE Leap 15.4:kernel-syms-5.14.21-150400.24.21.1.x86_64",
            "openSUSE Leap 15.4:kernel-zfcpdump-5.14.21-150400.24.21.2.s390x",
            "openSUSE Leap 15.4:kselftests-kmp-64kb-5.14.21-150400.24.21.2.aarch64",
            "openSUSE Leap 15.4:kselftests-kmp-default-5.14.21-150400.24.21.2.aarch64",
            "openSUSE Leap 15.4:kselftests-kmp-default-5.14.21-150400.24.21.2.ppc64le",
            "openSUSE Leap 15.4:kselftests-kmp-default-5.14.21-150400.24.21.2.s390x",
            "openSUSE Leap 15.4:kselftests-kmp-default-5.14.21-150400.24.21.2.x86_64",
            "openSUSE Leap 15.4:ocfs2-kmp-64kb-5.14.21-150400.24.21.2.aarch64",
            "openSUSE Leap 15.4:ocfs2-kmp-default-5.14.21-150400.24.21.2.aarch64",
            "openSUSE Leap 15.4:ocfs2-kmp-default-5.14.21-150400.24.21.2.ppc64le",
            "openSUSE Leap 15.4:ocfs2-kmp-default-5.14.21-150400.24.21.2.s390x",
            "openSUSE Leap 15.4:ocfs2-kmp-default-5.14.21-150400.24.21.2.x86_64",
            "openSUSE Leap 15.4:reiserfs-kmp-64kb-5.14.21-150400.24.21.2.aarch64",
            "openSUSE Leap 15.4:reiserfs-kmp-default-5.14.21-150400.24.21.2.aarch64",
            "openSUSE Leap 15.4:reiserfs-kmp-default-5.14.21-150400.24.21.2.ppc64le",
            "openSUSE Leap 15.4:reiserfs-kmp-default-5.14.21-150400.24.21.2.s390x",
            "openSUSE Leap 15.4:reiserfs-kmp-default-5.14.21-150400.24.21.2.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 7.8,
            "baseSeverity": "HIGH",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
            "version": "3.1"
          },
          "products": [
            "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.21.2.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.21.2.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.21.2.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.21.2.x86_64",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.21.2.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.21.2.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.21.2.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.21.2.x86_64",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.21.2.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.21.2.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.21.2.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.21.2.x86_64",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.21.2.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.21.2.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.21.2.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.21.2.x86_64",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.21.2.ppc64le",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.21.2.s390x",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.21.2.x86_64",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.21.2.ppc64le",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.21.2.s390x",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.21.2.x86_64",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_21-default-1-150400.9.3.2.ppc64le",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_21-default-1-150400.9.3.2.s390x",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_21-default-1-150400.9.3.2.x86_64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-64kb-5.14.21-150400.24.21.2.aarch64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-64kb-devel-5.14.21-150400.24.21.2.aarch64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-5.14.21-150400.24.21.2.aarch64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-5.14.21-150400.24.21.2.ppc64le",
            "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-5.14.21-150400.24.21.2.s390x",
            "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-5.14.21-150400.24.21.2.x86_64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-base-5.14.21-150400.24.21.2.150400.24.7.2.aarch64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-base-5.14.21-150400.24.21.2.150400.24.7.2.ppc64le",
            "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-base-5.14.21-150400.24.21.2.150400.24.7.2.s390x",
            "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-base-5.14.21-150400.24.21.2.150400.24.7.2.x86_64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-devel-5.14.21-150400.24.21.2.aarch64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-devel-5.14.21-150400.24.21.2.ppc64le",
            "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-devel-5.14.21-150400.24.21.2.s390x",
            "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-devel-5.14.21-150400.24.21.2.x86_64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-devel-5.14.21-150400.24.21.2.noarch",
            "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-macros-5.14.21-150400.24.21.2.noarch",
            "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-zfcpdump-5.14.21-150400.24.21.2.s390x",
            "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-docs-5.14.21-150400.24.21.3.noarch",
            "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-obs-build-5.14.21-150400.24.21.2.aarch64",
            "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-obs-build-5.14.21-150400.24.21.2.ppc64le",
            "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-obs-build-5.14.21-150400.24.21.2.s390x",
            "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-obs-build-5.14.21-150400.24.21.2.x86_64",
            "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-source-5.14.21-150400.24.21.2.noarch",
            "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-syms-5.14.21-150400.24.21.1.aarch64",
            "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-syms-5.14.21-150400.24.21.1.ppc64le",
            "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-syms-5.14.21-150400.24.21.1.s390x",
            "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-syms-5.14.21-150400.24.21.1.x86_64",
            "SUSE Linux Enterprise Module for Legacy 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.21.2.aarch64",
            "SUSE Linux Enterprise Module for Legacy 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.21.2.ppc64le",
            "SUSE Linux Enterprise Module for Legacy 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.21.2.s390x",
            "SUSE Linux Enterprise Module for Legacy 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.21.2.x86_64",
            "SUSE Linux Enterprise Workstation Extension 15 SP4:kernel-default-extra-5.14.21-150400.24.21.2.x86_64",
            "openSUSE Leap 15.4:cluster-md-kmp-64kb-5.14.21-150400.24.21.2.aarch64",
            "openSUSE Leap 15.4:cluster-md-kmp-default-5.14.21-150400.24.21.2.aarch64",
            "openSUSE Leap 15.4:cluster-md-kmp-default-5.14.21-150400.24.21.2.ppc64le",
            "openSUSE Leap 15.4:cluster-md-kmp-default-5.14.21-150400.24.21.2.s390x",
            "openSUSE Leap 15.4:cluster-md-kmp-default-5.14.21-150400.24.21.2.x86_64",
            "openSUSE Leap 15.4:dlm-kmp-64kb-5.14.21-150400.24.21.2.aarch64",
            "openSUSE Leap 15.4:dlm-kmp-default-5.14.21-150400.24.21.2.aarch64",
            "openSUSE Leap 15.4:dlm-kmp-default-5.14.21-150400.24.21.2.ppc64le",
            "openSUSE Leap 15.4:dlm-kmp-default-5.14.21-150400.24.21.2.s390x",
            "openSUSE Leap 15.4:dlm-kmp-default-5.14.21-150400.24.21.2.x86_64",
            "openSUSE Leap 15.4:dtb-allwinner-5.14.21-150400.24.21.1.aarch64",
            "openSUSE Leap 15.4:dtb-altera-5.14.21-150400.24.21.1.aarch64",
            "openSUSE Leap 15.4:dtb-amazon-5.14.21-150400.24.21.1.aarch64",
            "openSUSE Leap 15.4:dtb-amd-5.14.21-150400.24.21.1.aarch64",
            "openSUSE Leap 15.4:dtb-amlogic-5.14.21-150400.24.21.1.aarch64",
            "openSUSE Leap 15.4:dtb-apm-5.14.21-150400.24.21.1.aarch64",
            "openSUSE Leap 15.4:dtb-apple-5.14.21-150400.24.21.1.aarch64",
            "openSUSE Leap 15.4:dtb-arm-5.14.21-150400.24.21.1.aarch64",
            "openSUSE Leap 15.4:dtb-broadcom-5.14.21-150400.24.21.1.aarch64",
            "openSUSE Leap 15.4:dtb-cavium-5.14.21-150400.24.21.1.aarch64",
            "openSUSE Leap 15.4:dtb-exynos-5.14.21-150400.24.21.1.aarch64",
            "openSUSE Leap 15.4:dtb-freescale-5.14.21-150400.24.21.1.aarch64",
            "openSUSE Leap 15.4:dtb-hisilicon-5.14.21-150400.24.21.1.aarch64",
            "openSUSE Leap 15.4:dtb-lg-5.14.21-150400.24.21.1.aarch64",
            "openSUSE Leap 15.4:dtb-marvell-5.14.21-150400.24.21.1.aarch64",
            "openSUSE Leap 15.4:dtb-mediatek-5.14.21-150400.24.21.1.aarch64",
            "openSUSE Leap 15.4:dtb-nvidia-5.14.21-150400.24.21.1.aarch64",
            "openSUSE Leap 15.4:dtb-qcom-5.14.21-150400.24.21.1.aarch64",
            "openSUSE Leap 15.4:dtb-renesas-5.14.21-150400.24.21.1.aarch64",
            "openSUSE Leap 15.4:dtb-rockchip-5.14.21-150400.24.21.1.aarch64",
            "openSUSE Leap 15.4:dtb-socionext-5.14.21-150400.24.21.1.aarch64",
            "openSUSE Leap 15.4:dtb-sprd-5.14.21-150400.24.21.1.aarch64",
            "openSUSE Leap 15.4:dtb-xilinx-5.14.21-150400.24.21.1.aarch64",
            "openSUSE Leap 15.4:gfs2-kmp-64kb-5.14.21-150400.24.21.2.aarch64",
            "openSUSE Leap 15.4:gfs2-kmp-default-5.14.21-150400.24.21.2.aarch64",
            "openSUSE Leap 15.4:gfs2-kmp-default-5.14.21-150400.24.21.2.ppc64le",
            "openSUSE Leap 15.4:gfs2-kmp-default-5.14.21-150400.24.21.2.s390x",
            "openSUSE Leap 15.4:gfs2-kmp-default-5.14.21-150400.24.21.2.x86_64",
            "openSUSE Leap 15.4:kernel-64kb-5.14.21-150400.24.21.2.aarch64",
            "openSUSE Leap 15.4:kernel-64kb-devel-5.14.21-150400.24.21.2.aarch64",
            "openSUSE Leap 15.4:kernel-64kb-extra-5.14.21-150400.24.21.2.aarch64",
            "openSUSE Leap 15.4:kernel-64kb-livepatch-devel-5.14.21-150400.24.21.2.aarch64",
            "openSUSE Leap 15.4:kernel-64kb-optional-5.14.21-150400.24.21.2.aarch64",
            "openSUSE Leap 15.4:kernel-debug-5.14.21-150400.24.21.2.ppc64le",
            "openSUSE Leap 15.4:kernel-debug-5.14.21-150400.24.21.2.x86_64",
            "openSUSE Leap 15.4:kernel-debug-devel-5.14.21-150400.24.21.2.ppc64le",
            "openSUSE Leap 15.4:kernel-debug-devel-5.14.21-150400.24.21.2.x86_64",
            "openSUSE Leap 15.4:kernel-debug-livepatch-devel-5.14.21-150400.24.21.2.ppc64le",
            "openSUSE Leap 15.4:kernel-debug-livepatch-devel-5.14.21-150400.24.21.2.x86_64",
            "openSUSE Leap 15.4:kernel-default-5.14.21-150400.24.21.2.aarch64",
            "openSUSE Leap 15.4:kernel-default-5.14.21-150400.24.21.2.ppc64le",
            "openSUSE Leap 15.4:kernel-default-5.14.21-150400.24.21.2.s390x",
            "openSUSE Leap 15.4:kernel-default-5.14.21-150400.24.21.2.x86_64",
            "openSUSE Leap 15.4:kernel-default-base-5.14.21-150400.24.21.2.150400.24.7.2.aarch64",
            "openSUSE Leap 15.4:kernel-default-base-5.14.21-150400.24.21.2.150400.24.7.2.ppc64le",
            "openSUSE Leap 15.4:kernel-default-base-5.14.21-150400.24.21.2.150400.24.7.2.s390x",
            "openSUSE Leap 15.4:kernel-default-base-5.14.21-150400.24.21.2.150400.24.7.2.x86_64",
            "openSUSE Leap 15.4:kernel-default-base-rebuild-5.14.21-150400.24.21.2.150400.24.7.2.aarch64",
            "openSUSE Leap 15.4:kernel-default-base-rebuild-5.14.21-150400.24.21.2.150400.24.7.2.ppc64le",
            "openSUSE Leap 15.4:kernel-default-base-rebuild-5.14.21-150400.24.21.2.150400.24.7.2.s390x",
            "openSUSE Leap 15.4:kernel-default-base-rebuild-5.14.21-150400.24.21.2.150400.24.7.2.x86_64",
            "openSUSE Leap 15.4:kernel-default-devel-5.14.21-150400.24.21.2.aarch64",
            "openSUSE Leap 15.4:kernel-default-devel-5.14.21-150400.24.21.2.ppc64le",
            "openSUSE Leap 15.4:kernel-default-devel-5.14.21-150400.24.21.2.s390x",
            "openSUSE Leap 15.4:kernel-default-devel-5.14.21-150400.24.21.2.x86_64",
            "openSUSE Leap 15.4:kernel-default-extra-5.14.21-150400.24.21.2.aarch64",
            "openSUSE Leap 15.4:kernel-default-extra-5.14.21-150400.24.21.2.ppc64le",
            "openSUSE Leap 15.4:kernel-default-extra-5.14.21-150400.24.21.2.s390x",
            "openSUSE Leap 15.4:kernel-default-extra-5.14.21-150400.24.21.2.x86_64",
            "openSUSE Leap 15.4:kernel-default-livepatch-5.14.21-150400.24.21.2.aarch64",
            "openSUSE Leap 15.4:kernel-default-livepatch-5.14.21-150400.24.21.2.ppc64le",
            "openSUSE Leap 15.4:kernel-default-livepatch-5.14.21-150400.24.21.2.s390x",
            "openSUSE Leap 15.4:kernel-default-livepatch-5.14.21-150400.24.21.2.x86_64",
            "openSUSE Leap 15.4:kernel-default-livepatch-devel-5.14.21-150400.24.21.2.aarch64",
            "openSUSE Leap 15.4:kernel-default-livepatch-devel-5.14.21-150400.24.21.2.ppc64le",
            "openSUSE Leap 15.4:kernel-default-livepatch-devel-5.14.21-150400.24.21.2.s390x",
            "openSUSE Leap 15.4:kernel-default-livepatch-devel-5.14.21-150400.24.21.2.x86_64",
            "openSUSE Leap 15.4:kernel-default-optional-5.14.21-150400.24.21.2.aarch64",
            "openSUSE Leap 15.4:kernel-default-optional-5.14.21-150400.24.21.2.ppc64le",
            "openSUSE Leap 15.4:kernel-default-optional-5.14.21-150400.24.21.2.s390x",
            "openSUSE Leap 15.4:kernel-default-optional-5.14.21-150400.24.21.2.x86_64",
            "openSUSE Leap 15.4:kernel-devel-5.14.21-150400.24.21.2.noarch",
            "openSUSE Leap 15.4:kernel-docs-5.14.21-150400.24.21.3.noarch",
            "openSUSE Leap 15.4:kernel-docs-html-5.14.21-150400.24.21.3.noarch",
            "openSUSE Leap 15.4:kernel-kvmsmall-5.14.21-150400.24.21.2.aarch64",
            "openSUSE Leap 15.4:kernel-kvmsmall-5.14.21-150400.24.21.2.ppc64le",
            "openSUSE Leap 15.4:kernel-kvmsmall-5.14.21-150400.24.21.2.x86_64",
            "openSUSE Leap 15.4:kernel-kvmsmall-devel-5.14.21-150400.24.21.2.aarch64",
            "openSUSE Leap 15.4:kernel-kvmsmall-devel-5.14.21-150400.24.21.2.ppc64le",
            "openSUSE Leap 15.4:kernel-kvmsmall-devel-5.14.21-150400.24.21.2.x86_64",
            "openSUSE Leap 15.4:kernel-kvmsmall-livepatch-devel-5.14.21-150400.24.21.2.aarch64",
            "openSUSE Leap 15.4:kernel-kvmsmall-livepatch-devel-5.14.21-150400.24.21.2.ppc64le",
            "openSUSE Leap 15.4:kernel-kvmsmall-livepatch-devel-5.14.21-150400.24.21.2.x86_64",
            "openSUSE Leap 15.4:kernel-macros-5.14.21-150400.24.21.2.noarch",
            "openSUSE Leap 15.4:kernel-obs-build-5.14.21-150400.24.21.2.aarch64",
            "openSUSE Leap 15.4:kernel-obs-build-5.14.21-150400.24.21.2.ppc64le",
            "openSUSE Leap 15.4:kernel-obs-build-5.14.21-150400.24.21.2.s390x",
            "openSUSE Leap 15.4:kernel-obs-build-5.14.21-150400.24.21.2.x86_64",
            "openSUSE Leap 15.4:kernel-obs-qa-5.14.21-150400.24.21.1.aarch64",
            "openSUSE Leap 15.4:kernel-obs-qa-5.14.21-150400.24.21.1.ppc64le",
            "openSUSE Leap 15.4:kernel-obs-qa-5.14.21-150400.24.21.1.s390x",
            "openSUSE Leap 15.4:kernel-obs-qa-5.14.21-150400.24.21.1.x86_64",
            "openSUSE Leap 15.4:kernel-source-5.14.21-150400.24.21.2.noarch",
            "openSUSE Leap 15.4:kernel-source-vanilla-5.14.21-150400.24.21.2.noarch",
            "openSUSE Leap 15.4:kernel-syms-5.14.21-150400.24.21.1.aarch64",
            "openSUSE Leap 15.4:kernel-syms-5.14.21-150400.24.21.1.ppc64le",
            "openSUSE Leap 15.4:kernel-syms-5.14.21-150400.24.21.1.s390x",
            "openSUSE Leap 15.4:kernel-syms-5.14.21-150400.24.21.1.x86_64",
            "openSUSE Leap 15.4:kernel-zfcpdump-5.14.21-150400.24.21.2.s390x",
            "openSUSE Leap 15.4:kselftests-kmp-64kb-5.14.21-150400.24.21.2.aarch64",
            "openSUSE Leap 15.4:kselftests-kmp-default-5.14.21-150400.24.21.2.aarch64",
            "openSUSE Leap 15.4:kselftests-kmp-default-5.14.21-150400.24.21.2.ppc64le",
            "openSUSE Leap 15.4:kselftests-kmp-default-5.14.21-150400.24.21.2.s390x",
            "openSUSE Leap 15.4:kselftests-kmp-default-5.14.21-150400.24.21.2.x86_64",
            "openSUSE Leap 15.4:ocfs2-kmp-64kb-5.14.21-150400.24.21.2.aarch64",
            "openSUSE Leap 15.4:ocfs2-kmp-default-5.14.21-150400.24.21.2.aarch64",
            "openSUSE Leap 15.4:ocfs2-kmp-default-5.14.21-150400.24.21.2.ppc64le",
            "openSUSE Leap 15.4:ocfs2-kmp-default-5.14.21-150400.24.21.2.s390x",
            "openSUSE Leap 15.4:ocfs2-kmp-default-5.14.21-150400.24.21.2.x86_64",
            "openSUSE Leap 15.4:reiserfs-kmp-64kb-5.14.21-150400.24.21.2.aarch64",
            "openSUSE Leap 15.4:reiserfs-kmp-default-5.14.21-150400.24.21.2.aarch64",
            "openSUSE Leap 15.4:reiserfs-kmp-default-5.14.21-150400.24.21.2.ppc64le",
            "openSUSE Leap 15.4:reiserfs-kmp-default-5.14.21-150400.24.21.2.s390x",
            "openSUSE Leap 15.4:reiserfs-kmp-default-5.14.21-150400.24.21.2.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2022-09-16T15:30:19Z",
          "details": "important"
        }
      ],
      "title": "CVE-2022-2959"
    },
    {
      "cve": "CVE-2022-2977",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2022-2977"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "A flaw was found in the Linux kernel implementation of proxied virtualized TPM devices. On a system where virtualized TPM devices are configured (this is not the default) a local attacker can create a use-after-free and create a situation where it may be possible to escalate privileges on the system.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.21.2.aarch64",
          "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.21.2.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.21.2.s390x",
          "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.21.2.x86_64",
          "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.21.2.aarch64",
          "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.21.2.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.21.2.s390x",
          "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.21.2.x86_64",
          "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.21.2.aarch64",
          "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.21.2.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.21.2.s390x",
          "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.21.2.x86_64",
          "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.21.2.aarch64",
          "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.21.2.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.21.2.s390x",
          "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.21.2.x86_64",
          "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.21.2.ppc64le",
          "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.21.2.s390x",
          "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.21.2.x86_64",
          "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.21.2.ppc64le",
          "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.21.2.s390x",
          "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.21.2.x86_64",
          "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_21-default-1-150400.9.3.2.ppc64le",
          "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_21-default-1-150400.9.3.2.s390x",
          "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_21-default-1-150400.9.3.2.x86_64",
          "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-64kb-5.14.21-150400.24.21.2.aarch64",
          "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-64kb-devel-5.14.21-150400.24.21.2.aarch64",
          "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-5.14.21-150400.24.21.2.aarch64",
          "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-5.14.21-150400.24.21.2.ppc64le",
          "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-5.14.21-150400.24.21.2.s390x",
          "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-5.14.21-150400.24.21.2.x86_64",
          "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-base-5.14.21-150400.24.21.2.150400.24.7.2.aarch64",
          "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-base-5.14.21-150400.24.21.2.150400.24.7.2.ppc64le",
          "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-base-5.14.21-150400.24.21.2.150400.24.7.2.s390x",
          "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-base-5.14.21-150400.24.21.2.150400.24.7.2.x86_64",
          "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-devel-5.14.21-150400.24.21.2.aarch64",
          "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-devel-5.14.21-150400.24.21.2.ppc64le",
          "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-devel-5.14.21-150400.24.21.2.s390x",
          "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-devel-5.14.21-150400.24.21.2.x86_64",
          "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-devel-5.14.21-150400.24.21.2.noarch",
          "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-macros-5.14.21-150400.24.21.2.noarch",
          "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-zfcpdump-5.14.21-150400.24.21.2.s390x",
          "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-docs-5.14.21-150400.24.21.3.noarch",
          "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-obs-build-5.14.21-150400.24.21.2.aarch64",
          "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-obs-build-5.14.21-150400.24.21.2.ppc64le",
          "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-obs-build-5.14.21-150400.24.21.2.s390x",
          "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-obs-build-5.14.21-150400.24.21.2.x86_64",
          "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-source-5.14.21-150400.24.21.2.noarch",
          "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-syms-5.14.21-150400.24.21.1.aarch64",
          "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-syms-5.14.21-150400.24.21.1.ppc64le",
          "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-syms-5.14.21-150400.24.21.1.s390x",
          "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-syms-5.14.21-150400.24.21.1.x86_64",
          "SUSE Linux Enterprise Module for Legacy 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.21.2.aarch64",
          "SUSE Linux Enterprise Module for Legacy 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.21.2.ppc64le",
          "SUSE Linux Enterprise Module for Legacy 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.21.2.s390x",
          "SUSE Linux Enterprise Module for Legacy 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.21.2.x86_64",
          "SUSE Linux Enterprise Workstation Extension 15 SP4:kernel-default-extra-5.14.21-150400.24.21.2.x86_64",
          "openSUSE Leap 15.4:cluster-md-kmp-64kb-5.14.21-150400.24.21.2.aarch64",
          "openSUSE Leap 15.4:cluster-md-kmp-default-5.14.21-150400.24.21.2.aarch64",
          "openSUSE Leap 15.4:cluster-md-kmp-default-5.14.21-150400.24.21.2.ppc64le",
          "openSUSE Leap 15.4:cluster-md-kmp-default-5.14.21-150400.24.21.2.s390x",
          "openSUSE Leap 15.4:cluster-md-kmp-default-5.14.21-150400.24.21.2.x86_64",
          "openSUSE Leap 15.4:dlm-kmp-64kb-5.14.21-150400.24.21.2.aarch64",
          "openSUSE Leap 15.4:dlm-kmp-default-5.14.21-150400.24.21.2.aarch64",
          "openSUSE Leap 15.4:dlm-kmp-default-5.14.21-150400.24.21.2.ppc64le",
          "openSUSE Leap 15.4:dlm-kmp-default-5.14.21-150400.24.21.2.s390x",
          "openSUSE Leap 15.4:dlm-kmp-default-5.14.21-150400.24.21.2.x86_64",
          "openSUSE Leap 15.4:dtb-allwinner-5.14.21-150400.24.21.1.aarch64",
          "openSUSE Leap 15.4:dtb-altera-5.14.21-150400.24.21.1.aarch64",
          "openSUSE Leap 15.4:dtb-amazon-5.14.21-150400.24.21.1.aarch64",
          "openSUSE Leap 15.4:dtb-amd-5.14.21-150400.24.21.1.aarch64",
          "openSUSE Leap 15.4:dtb-amlogic-5.14.21-150400.24.21.1.aarch64",
          "openSUSE Leap 15.4:dtb-apm-5.14.21-150400.24.21.1.aarch64",
          "openSUSE Leap 15.4:dtb-apple-5.14.21-150400.24.21.1.aarch64",
          "openSUSE Leap 15.4:dtb-arm-5.14.21-150400.24.21.1.aarch64",
          "openSUSE Leap 15.4:dtb-broadcom-5.14.21-150400.24.21.1.aarch64",
          "openSUSE Leap 15.4:dtb-cavium-5.14.21-150400.24.21.1.aarch64",
          "openSUSE Leap 15.4:dtb-exynos-5.14.21-150400.24.21.1.aarch64",
          "openSUSE Leap 15.4:dtb-freescale-5.14.21-150400.24.21.1.aarch64",
          "openSUSE Leap 15.4:dtb-hisilicon-5.14.21-150400.24.21.1.aarch64",
          "openSUSE Leap 15.4:dtb-lg-5.14.21-150400.24.21.1.aarch64",
          "openSUSE Leap 15.4:dtb-marvell-5.14.21-150400.24.21.1.aarch64",
          "openSUSE Leap 15.4:dtb-mediatek-5.14.21-150400.24.21.1.aarch64",
          "openSUSE Leap 15.4:dtb-nvidia-5.14.21-150400.24.21.1.aarch64",
          "openSUSE Leap 15.4:dtb-qcom-5.14.21-150400.24.21.1.aarch64",
          "openSUSE Leap 15.4:dtb-renesas-5.14.21-150400.24.21.1.aarch64",
          "openSUSE Leap 15.4:dtb-rockchip-5.14.21-150400.24.21.1.aarch64",
          "openSUSE Leap 15.4:dtb-socionext-5.14.21-150400.24.21.1.aarch64",
          "openSUSE Leap 15.4:dtb-sprd-5.14.21-150400.24.21.1.aarch64",
          "openSUSE Leap 15.4:dtb-xilinx-5.14.21-150400.24.21.1.aarch64",
          "openSUSE Leap 15.4:gfs2-kmp-64kb-5.14.21-150400.24.21.2.aarch64",
          "openSUSE Leap 15.4:gfs2-kmp-default-5.14.21-150400.24.21.2.aarch64",
          "openSUSE Leap 15.4:gfs2-kmp-default-5.14.21-150400.24.21.2.ppc64le",
          "openSUSE Leap 15.4:gfs2-kmp-default-5.14.21-150400.24.21.2.s390x",
          "openSUSE Leap 15.4:gfs2-kmp-default-5.14.21-150400.24.21.2.x86_64",
          "openSUSE Leap 15.4:kernel-64kb-5.14.21-150400.24.21.2.aarch64",
          "openSUSE Leap 15.4:kernel-64kb-devel-5.14.21-150400.24.21.2.aarch64",
          "openSUSE Leap 15.4:kernel-64kb-extra-5.14.21-150400.24.21.2.aarch64",
          "openSUSE Leap 15.4:kernel-64kb-livepatch-devel-5.14.21-150400.24.21.2.aarch64",
          "openSUSE Leap 15.4:kernel-64kb-optional-5.14.21-150400.24.21.2.aarch64",
          "openSUSE Leap 15.4:kernel-debug-5.14.21-150400.24.21.2.ppc64le",
          "openSUSE Leap 15.4:kernel-debug-5.14.21-150400.24.21.2.x86_64",
          "openSUSE Leap 15.4:kernel-debug-devel-5.14.21-150400.24.21.2.ppc64le",
          "openSUSE Leap 15.4:kernel-debug-devel-5.14.21-150400.24.21.2.x86_64",
          "openSUSE Leap 15.4:kernel-debug-livepatch-devel-5.14.21-150400.24.21.2.ppc64le",
          "openSUSE Leap 15.4:kernel-debug-livepatch-devel-5.14.21-150400.24.21.2.x86_64",
          "openSUSE Leap 15.4:kernel-default-5.14.21-150400.24.21.2.aarch64",
          "openSUSE Leap 15.4:kernel-default-5.14.21-150400.24.21.2.ppc64le",
          "openSUSE Leap 15.4:kernel-default-5.14.21-150400.24.21.2.s390x",
          "openSUSE Leap 15.4:kernel-default-5.14.21-150400.24.21.2.x86_64",
          "openSUSE Leap 15.4:kernel-default-base-5.14.21-150400.24.21.2.150400.24.7.2.aarch64",
          "openSUSE Leap 15.4:kernel-default-base-5.14.21-150400.24.21.2.150400.24.7.2.ppc64le",
          "openSUSE Leap 15.4:kernel-default-base-5.14.21-150400.24.21.2.150400.24.7.2.s390x",
          "openSUSE Leap 15.4:kernel-default-base-5.14.21-150400.24.21.2.150400.24.7.2.x86_64",
          "openSUSE Leap 15.4:kernel-default-base-rebuild-5.14.21-150400.24.21.2.150400.24.7.2.aarch64",
          "openSUSE Leap 15.4:kernel-default-base-rebuild-5.14.21-150400.24.21.2.150400.24.7.2.ppc64le",
          "openSUSE Leap 15.4:kernel-default-base-rebuild-5.14.21-150400.24.21.2.150400.24.7.2.s390x",
          "openSUSE Leap 15.4:kernel-default-base-rebuild-5.14.21-150400.24.21.2.150400.24.7.2.x86_64",
          "openSUSE Leap 15.4:kernel-default-devel-5.14.21-150400.24.21.2.aarch64",
          "openSUSE Leap 15.4:kernel-default-devel-5.14.21-150400.24.21.2.ppc64le",
          "openSUSE Leap 15.4:kernel-default-devel-5.14.21-150400.24.21.2.s390x",
          "openSUSE Leap 15.4:kernel-default-devel-5.14.21-150400.24.21.2.x86_64",
          "openSUSE Leap 15.4:kernel-default-extra-5.14.21-150400.24.21.2.aarch64",
          "openSUSE Leap 15.4:kernel-default-extra-5.14.21-150400.24.21.2.ppc64le",
          "openSUSE Leap 15.4:kernel-default-extra-5.14.21-150400.24.21.2.s390x",
          "openSUSE Leap 15.4:kernel-default-extra-5.14.21-150400.24.21.2.x86_64",
          "openSUSE Leap 15.4:kernel-default-livepatch-5.14.21-150400.24.21.2.aarch64",
          "openSUSE Leap 15.4:kernel-default-livepatch-5.14.21-150400.24.21.2.ppc64le",
          "openSUSE Leap 15.4:kernel-default-livepatch-5.14.21-150400.24.21.2.s390x",
          "openSUSE Leap 15.4:kernel-default-livepatch-5.14.21-150400.24.21.2.x86_64",
          "openSUSE Leap 15.4:kernel-default-livepatch-devel-5.14.21-150400.24.21.2.aarch64",
          "openSUSE Leap 15.4:kernel-default-livepatch-devel-5.14.21-150400.24.21.2.ppc64le",
          "openSUSE Leap 15.4:kernel-default-livepatch-devel-5.14.21-150400.24.21.2.s390x",
          "openSUSE Leap 15.4:kernel-default-livepatch-devel-5.14.21-150400.24.21.2.x86_64",
          "openSUSE Leap 15.4:kernel-default-optional-5.14.21-150400.24.21.2.aarch64",
          "openSUSE Leap 15.4:kernel-default-optional-5.14.21-150400.24.21.2.ppc64le",
          "openSUSE Leap 15.4:kernel-default-optional-5.14.21-150400.24.21.2.s390x",
          "openSUSE Leap 15.4:kernel-default-optional-5.14.21-150400.24.21.2.x86_64",
          "openSUSE Leap 15.4:kernel-devel-5.14.21-150400.24.21.2.noarch",
          "openSUSE Leap 15.4:kernel-docs-5.14.21-150400.24.21.3.noarch",
          "openSUSE Leap 15.4:kernel-docs-html-5.14.21-150400.24.21.3.noarch",
          "openSUSE Leap 15.4:kernel-kvmsmall-5.14.21-150400.24.21.2.aarch64",
          "openSUSE Leap 15.4:kernel-kvmsmall-5.14.21-150400.24.21.2.ppc64le",
          "openSUSE Leap 15.4:kernel-kvmsmall-5.14.21-150400.24.21.2.x86_64",
          "openSUSE Leap 15.4:kernel-kvmsmall-devel-5.14.21-150400.24.21.2.aarch64",
          "openSUSE Leap 15.4:kernel-kvmsmall-devel-5.14.21-150400.24.21.2.ppc64le",
          "openSUSE Leap 15.4:kernel-kvmsmall-devel-5.14.21-150400.24.21.2.x86_64",
          "openSUSE Leap 15.4:kernel-kvmsmall-livepatch-devel-5.14.21-150400.24.21.2.aarch64",
          "openSUSE Leap 15.4:kernel-kvmsmall-livepatch-devel-5.14.21-150400.24.21.2.ppc64le",
          "openSUSE Leap 15.4:kernel-kvmsmall-livepatch-devel-5.14.21-150400.24.21.2.x86_64",
          "openSUSE Leap 15.4:kernel-macros-5.14.21-150400.24.21.2.noarch",
          "openSUSE Leap 15.4:kernel-obs-build-5.14.21-150400.24.21.2.aarch64",
          "openSUSE Leap 15.4:kernel-obs-build-5.14.21-150400.24.21.2.ppc64le",
          "openSUSE Leap 15.4:kernel-obs-build-5.14.21-150400.24.21.2.s390x",
          "openSUSE Leap 15.4:kernel-obs-build-5.14.21-150400.24.21.2.x86_64",
          "openSUSE Leap 15.4:kernel-obs-qa-5.14.21-150400.24.21.1.aarch64",
          "openSUSE Leap 15.4:kernel-obs-qa-5.14.21-150400.24.21.1.ppc64le",
          "openSUSE Leap 15.4:kernel-obs-qa-5.14.21-150400.24.21.1.s390x",
          "openSUSE Leap 15.4:kernel-obs-qa-5.14.21-150400.24.21.1.x86_64",
          "openSUSE Leap 15.4:kernel-source-5.14.21-150400.24.21.2.noarch",
          "openSUSE Leap 15.4:kernel-source-vanilla-5.14.21-150400.24.21.2.noarch",
          "openSUSE Leap 15.4:kernel-syms-5.14.21-150400.24.21.1.aarch64",
          "openSUSE Leap 15.4:kernel-syms-5.14.21-150400.24.21.1.ppc64le",
          "openSUSE Leap 15.4:kernel-syms-5.14.21-150400.24.21.1.s390x",
          "openSUSE Leap 15.4:kernel-syms-5.14.21-150400.24.21.1.x86_64",
          "openSUSE Leap 15.4:kernel-zfcpdump-5.14.21-150400.24.21.2.s390x",
          "openSUSE Leap 15.4:kselftests-kmp-64kb-5.14.21-150400.24.21.2.aarch64",
          "openSUSE Leap 15.4:kselftests-kmp-default-5.14.21-150400.24.21.2.aarch64",
          "openSUSE Leap 15.4:kselftests-kmp-default-5.14.21-150400.24.21.2.ppc64le",
          "openSUSE Leap 15.4:kselftests-kmp-default-5.14.21-150400.24.21.2.s390x",
          "openSUSE Leap 15.4:kselftests-kmp-default-5.14.21-150400.24.21.2.x86_64",
          "openSUSE Leap 15.4:ocfs2-kmp-64kb-5.14.21-150400.24.21.2.aarch64",
          "openSUSE Leap 15.4:ocfs2-kmp-default-5.14.21-150400.24.21.2.aarch64",
          "openSUSE Leap 15.4:ocfs2-kmp-default-5.14.21-150400.24.21.2.ppc64le",
          "openSUSE Leap 15.4:ocfs2-kmp-default-5.14.21-150400.24.21.2.s390x",
          "openSUSE Leap 15.4:ocfs2-kmp-default-5.14.21-150400.24.21.2.x86_64",
          "openSUSE Leap 15.4:reiserfs-kmp-64kb-5.14.21-150400.24.21.2.aarch64",
          "openSUSE Leap 15.4:reiserfs-kmp-default-5.14.21-150400.24.21.2.aarch64",
          "openSUSE Leap 15.4:reiserfs-kmp-default-5.14.21-150400.24.21.2.ppc64le",
          "openSUSE Leap 15.4:reiserfs-kmp-default-5.14.21-150400.24.21.2.s390x",
          "openSUSE Leap 15.4:reiserfs-kmp-default-5.14.21-150400.24.21.2.x86_64"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2022-2977",
          "url": "https://www.suse.com/security/cve/CVE-2022-2977"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1202672 for CVE-2022-2977",
          "url": "https://bugzilla.suse.com/1202672"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.21.2.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.21.2.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.21.2.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.21.2.x86_64",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.21.2.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.21.2.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.21.2.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.21.2.x86_64",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.21.2.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.21.2.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.21.2.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.21.2.x86_64",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.21.2.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.21.2.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.21.2.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.21.2.x86_64",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.21.2.ppc64le",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.21.2.s390x",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.21.2.x86_64",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.21.2.ppc64le",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.21.2.s390x",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.21.2.x86_64",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_21-default-1-150400.9.3.2.ppc64le",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_21-default-1-150400.9.3.2.s390x",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_21-default-1-150400.9.3.2.x86_64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-64kb-5.14.21-150400.24.21.2.aarch64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-64kb-devel-5.14.21-150400.24.21.2.aarch64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-5.14.21-150400.24.21.2.aarch64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-5.14.21-150400.24.21.2.ppc64le",
            "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-5.14.21-150400.24.21.2.s390x",
            "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-5.14.21-150400.24.21.2.x86_64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-base-5.14.21-150400.24.21.2.150400.24.7.2.aarch64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-base-5.14.21-150400.24.21.2.150400.24.7.2.ppc64le",
            "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-base-5.14.21-150400.24.21.2.150400.24.7.2.s390x",
            "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-base-5.14.21-150400.24.21.2.150400.24.7.2.x86_64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-devel-5.14.21-150400.24.21.2.aarch64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-devel-5.14.21-150400.24.21.2.ppc64le",
            "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-devel-5.14.21-150400.24.21.2.s390x",
            "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-devel-5.14.21-150400.24.21.2.x86_64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-devel-5.14.21-150400.24.21.2.noarch",
            "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-macros-5.14.21-150400.24.21.2.noarch",
            "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-zfcpdump-5.14.21-150400.24.21.2.s390x",
            "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-docs-5.14.21-150400.24.21.3.noarch",
            "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-obs-build-5.14.21-150400.24.21.2.aarch64",
            "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-obs-build-5.14.21-150400.24.21.2.ppc64le",
            "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-obs-build-5.14.21-150400.24.21.2.s390x",
            "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-obs-build-5.14.21-150400.24.21.2.x86_64",
            "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-source-5.14.21-150400.24.21.2.noarch",
            "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-syms-5.14.21-150400.24.21.1.aarch64",
            "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-syms-5.14.21-150400.24.21.1.ppc64le",
            "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-syms-5.14.21-150400.24.21.1.s390x",
            "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-syms-5.14.21-150400.24.21.1.x86_64",
            "SUSE Linux Enterprise Module for Legacy 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.21.2.aarch64",
            "SUSE Linux Enterprise Module for Legacy 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.21.2.ppc64le",
            "SUSE Linux Enterprise Module for Legacy 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.21.2.s390x",
            "SUSE Linux Enterprise Module for Legacy 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.21.2.x86_64",
            "SUSE Linux Enterprise Workstation Extension 15 SP4:kernel-default-extra-5.14.21-150400.24.21.2.x86_64",
            "openSUSE Leap 15.4:cluster-md-kmp-64kb-5.14.21-150400.24.21.2.aarch64",
            "openSUSE Leap 15.4:cluster-md-kmp-default-5.14.21-150400.24.21.2.aarch64",
            "openSUSE Leap 15.4:cluster-md-kmp-default-5.14.21-150400.24.21.2.ppc64le",
            "openSUSE Leap 15.4:cluster-md-kmp-default-5.14.21-150400.24.21.2.s390x",
            "openSUSE Leap 15.4:cluster-md-kmp-default-5.14.21-150400.24.21.2.x86_64",
            "openSUSE Leap 15.4:dlm-kmp-64kb-5.14.21-150400.24.21.2.aarch64",
            "openSUSE Leap 15.4:dlm-kmp-default-5.14.21-150400.24.21.2.aarch64",
            "openSUSE Leap 15.4:dlm-kmp-default-5.14.21-150400.24.21.2.ppc64le",
            "openSUSE Leap 15.4:dlm-kmp-default-5.14.21-150400.24.21.2.s390x",
            "openSUSE Leap 15.4:dlm-kmp-default-5.14.21-150400.24.21.2.x86_64",
            "openSUSE Leap 15.4:dtb-allwinner-5.14.21-150400.24.21.1.aarch64",
            "openSUSE Leap 15.4:dtb-altera-5.14.21-150400.24.21.1.aarch64",
            "openSUSE Leap 15.4:dtb-amazon-5.14.21-150400.24.21.1.aarch64",
            "openSUSE Leap 15.4:dtb-amd-5.14.21-150400.24.21.1.aarch64",
            "openSUSE Leap 15.4:dtb-amlogic-5.14.21-150400.24.21.1.aarch64",
            "openSUSE Leap 15.4:dtb-apm-5.14.21-150400.24.21.1.aarch64",
            "openSUSE Leap 15.4:dtb-apple-5.14.21-150400.24.21.1.aarch64",
            "openSUSE Leap 15.4:dtb-arm-5.14.21-150400.24.21.1.aarch64",
            "openSUSE Leap 15.4:dtb-broadcom-5.14.21-150400.24.21.1.aarch64",
            "openSUSE Leap 15.4:dtb-cavium-5.14.21-150400.24.21.1.aarch64",
            "openSUSE Leap 15.4:dtb-exynos-5.14.21-150400.24.21.1.aarch64",
            "openSUSE Leap 15.4:dtb-freescale-5.14.21-150400.24.21.1.aarch64",
            "openSUSE Leap 15.4:dtb-hisilicon-5.14.21-150400.24.21.1.aarch64",
            "openSUSE Leap 15.4:dtb-lg-5.14.21-150400.24.21.1.aarch64",
            "openSUSE Leap 15.4:dtb-marvell-5.14.21-150400.24.21.1.aarch64",
            "openSUSE Leap 15.4:dtb-mediatek-5.14.21-150400.24.21.1.aarch64",
            "openSUSE Leap 15.4:dtb-nvidia-5.14.21-150400.24.21.1.aarch64",
            "openSUSE Leap 15.4:dtb-qcom-5.14.21-150400.24.21.1.aarch64",
            "openSUSE Leap 15.4:dtb-renesas-5.14.21-150400.24.21.1.aarch64",
            "openSUSE Leap 15.4:dtb-rockchip-5.14.21-150400.24.21.1.aarch64",
            "openSUSE Leap 15.4:dtb-socionext-5.14.21-150400.24.21.1.aarch64",
            "openSUSE Leap 15.4:dtb-sprd-5.14.21-150400.24.21.1.aarch64",
            "openSUSE Leap 15.4:dtb-xilinx-5.14.21-150400.24.21.1.aarch64",
            "openSUSE Leap 15.4:gfs2-kmp-64kb-5.14.21-150400.24.21.2.aarch64",
            "openSUSE Leap 15.4:gfs2-kmp-default-5.14.21-150400.24.21.2.aarch64",
            "openSUSE Leap 15.4:gfs2-kmp-default-5.14.21-150400.24.21.2.ppc64le",
            "openSUSE Leap 15.4:gfs2-kmp-default-5.14.21-150400.24.21.2.s390x",
            "openSUSE Leap 15.4:gfs2-kmp-default-5.14.21-150400.24.21.2.x86_64",
            "openSUSE Leap 15.4:kernel-64kb-5.14.21-150400.24.21.2.aarch64",
            "openSUSE Leap 15.4:kernel-64kb-devel-5.14.21-150400.24.21.2.aarch64",
            "openSUSE Leap 15.4:kernel-64kb-extra-5.14.21-150400.24.21.2.aarch64",
            "openSUSE Leap 15.4:kernel-64kb-livepatch-devel-5.14.21-150400.24.21.2.aarch64",
            "openSUSE Leap 15.4:kernel-64kb-optional-5.14.21-150400.24.21.2.aarch64",
            "openSUSE Leap 15.4:kernel-debug-5.14.21-150400.24.21.2.ppc64le",
            "openSUSE Leap 15.4:kernel-debug-5.14.21-150400.24.21.2.x86_64",
            "openSUSE Leap 15.4:kernel-debug-devel-5.14.21-150400.24.21.2.ppc64le",
            "openSUSE Leap 15.4:kernel-debug-devel-5.14.21-150400.24.21.2.x86_64",
            "openSUSE Leap 15.4:kernel-debug-livepatch-devel-5.14.21-150400.24.21.2.ppc64le",
            "openSUSE Leap 15.4:kernel-debug-livepatch-devel-5.14.21-150400.24.21.2.x86_64",
            "openSUSE Leap 15.4:kernel-default-5.14.21-150400.24.21.2.aarch64",
            "openSUSE Leap 15.4:kernel-default-5.14.21-150400.24.21.2.ppc64le",
            "openSUSE Leap 15.4:kernel-default-5.14.21-150400.24.21.2.s390x",
            "openSUSE Leap 15.4:kernel-default-5.14.21-150400.24.21.2.x86_64",
            "openSUSE Leap 15.4:kernel-default-base-5.14.21-150400.24.21.2.150400.24.7.2.aarch64",
            "openSUSE Leap 15.4:kernel-default-base-5.14.21-150400.24.21.2.150400.24.7.2.ppc64le",
            "openSUSE Leap 15.4:kernel-default-base-5.14.21-150400.24.21.2.150400.24.7.2.s390x",
            "openSUSE Leap 15.4:kernel-default-base-5.14.21-150400.24.21.2.150400.24.7.2.x86_64",
            "openSUSE Leap 15.4:kernel-default-base-rebuild-5.14.21-150400.24.21.2.150400.24.7.2.aarch64",
            "openSUSE Leap 15.4:kernel-default-base-rebuild-5.14.21-150400.24.21.2.150400.24.7.2.ppc64le",
            "openSUSE Leap 15.4:kernel-default-base-rebuild-5.14.21-150400.24.21.2.150400.24.7.2.s390x",
            "openSUSE Leap 15.4:kernel-default-base-rebuild-5.14.21-150400.24.21.2.150400.24.7.2.x86_64",
            "openSUSE Leap 15.4:kernel-default-devel-5.14.21-150400.24.21.2.aarch64",
            "openSUSE Leap 15.4:kernel-default-devel-5.14.21-150400.24.21.2.ppc64le",
            "openSUSE Leap 15.4:kernel-default-devel-5.14.21-150400.24.21.2.s390x",
            "openSUSE Leap 15.4:kernel-default-devel-5.14.21-150400.24.21.2.x86_64",
            "openSUSE Leap 15.4:kernel-default-extra-5.14.21-150400.24.21.2.aarch64",
            "openSUSE Leap 15.4:kernel-default-extra-5.14.21-150400.24.21.2.ppc64le",
            "openSUSE Leap 15.4:kernel-default-extra-5.14.21-150400.24.21.2.s390x",
            "openSUSE Leap 15.4:kernel-default-extra-5.14.21-150400.24.21.2.x86_64",
            "openSUSE Leap 15.4:kernel-default-livepatch-5.14.21-150400.24.21.2.aarch64",
            "openSUSE Leap 15.4:kernel-default-livepatch-5.14.21-150400.24.21.2.ppc64le",
            "openSUSE Leap 15.4:kernel-default-livepatch-5.14.21-150400.24.21.2.s390x",
            "openSUSE Leap 15.4:kernel-default-livepatch-5.14.21-150400.24.21.2.x86_64",
            "openSUSE Leap 15.4:kernel-default-livepatch-devel-5.14.21-150400.24.21.2.aarch64",
            "openSUSE Leap 15.4:kernel-default-livepatch-devel-5.14.21-150400.24.21.2.ppc64le",
            "openSUSE Leap 15.4:kernel-default-livepatch-devel-5.14.21-150400.24.21.2.s390x",
            "openSUSE Leap 15.4:kernel-default-livepatch-devel-5.14.21-150400.24.21.2.x86_64",
            "openSUSE Leap 15.4:kernel-default-optional-5.14.21-150400.24.21.2.aarch64",
            "openSUSE Leap 15.4:kernel-default-optional-5.14.21-150400.24.21.2.ppc64le",
            "openSUSE Leap 15.4:kernel-default-optional-5.14.21-150400.24.21.2.s390x",
            "openSUSE Leap 15.4:kernel-default-optional-5.14.21-150400.24.21.2.x86_64",
            "openSUSE Leap 15.4:kernel-devel-5.14.21-150400.24.21.2.noarch",
            "openSUSE Leap 15.4:kernel-docs-5.14.21-150400.24.21.3.noarch",
            "openSUSE Leap 15.4:kernel-docs-html-5.14.21-150400.24.21.3.noarch",
            "openSUSE Leap 15.4:kernel-kvmsmall-5.14.21-150400.24.21.2.aarch64",
            "openSUSE Leap 15.4:kernel-kvmsmall-5.14.21-150400.24.21.2.ppc64le",
            "openSUSE Leap 15.4:kernel-kvmsmall-5.14.21-150400.24.21.2.x86_64",
            "openSUSE Leap 15.4:kernel-kvmsmall-devel-5.14.21-150400.24.21.2.aarch64",
            "openSUSE Leap 15.4:kernel-kvmsmall-devel-5.14.21-150400.24.21.2.ppc64le",
            "openSUSE Leap 15.4:kernel-kvmsmall-devel-5.14.21-150400.24.21.2.x86_64",
            "openSUSE Leap 15.4:kernel-kvmsmall-livepatch-devel-5.14.21-150400.24.21.2.aarch64",
            "openSUSE Leap 15.4:kernel-kvmsmall-livepatch-devel-5.14.21-150400.24.21.2.ppc64le",
            "openSUSE Leap 15.4:kernel-kvmsmall-livepatch-devel-5.14.21-150400.24.21.2.x86_64",
            "openSUSE Leap 15.4:kernel-macros-5.14.21-150400.24.21.2.noarch",
            "openSUSE Leap 15.4:kernel-obs-build-5.14.21-150400.24.21.2.aarch64",
            "openSUSE Leap 15.4:kernel-obs-build-5.14.21-150400.24.21.2.ppc64le",
            "openSUSE Leap 15.4:kernel-obs-build-5.14.21-150400.24.21.2.s390x",
            "openSUSE Leap 15.4:kernel-obs-build-5.14.21-150400.24.21.2.x86_64",
            "openSUSE Leap 15.4:kernel-obs-qa-5.14.21-150400.24.21.1.aarch64",
            "openSUSE Leap 15.4:kernel-obs-qa-5.14.21-150400.24.21.1.ppc64le",
            "openSUSE Leap 15.4:kernel-obs-qa-5.14.21-150400.24.21.1.s390x",
            "openSUSE Leap 15.4:kernel-obs-qa-5.14.21-150400.24.21.1.x86_64",
            "openSUSE Leap 15.4:kernel-source-5.14.21-150400.24.21.2.noarch",
            "openSUSE Leap 15.4:kernel-source-vanilla-5.14.21-150400.24.21.2.noarch",
            "openSUSE Leap 15.4:kernel-syms-5.14.21-150400.24.21.1.aarch64",
            "openSUSE Leap 15.4:kernel-syms-5.14.21-150400.24.21.1.ppc64le",
            "openSUSE Leap 15.4:kernel-syms-5.14.21-150400.24.21.1.s390x",
            "openSUSE Leap 15.4:kernel-syms-5.14.21-150400.24.21.1.x86_64",
            "openSUSE Leap 15.4:kernel-zfcpdump-5.14.21-150400.24.21.2.s390x",
            "openSUSE Leap 15.4:kselftests-kmp-64kb-5.14.21-150400.24.21.2.aarch64",
            "openSUSE Leap 15.4:kselftests-kmp-default-5.14.21-150400.24.21.2.aarch64",
            "openSUSE Leap 15.4:kselftests-kmp-default-5.14.21-150400.24.21.2.ppc64le",
            "openSUSE Leap 15.4:kselftests-kmp-default-5.14.21-150400.24.21.2.s390x",
            "openSUSE Leap 15.4:kselftests-kmp-default-5.14.21-150400.24.21.2.x86_64",
            "openSUSE Leap 15.4:ocfs2-kmp-64kb-5.14.21-150400.24.21.2.aarch64",
            "openSUSE Leap 15.4:ocfs2-kmp-default-5.14.21-150400.24.21.2.aarch64",
            "openSUSE Leap 15.4:ocfs2-kmp-default-5.14.21-150400.24.21.2.ppc64le",
            "openSUSE Leap 15.4:ocfs2-kmp-default-5.14.21-150400.24.21.2.s390x",
            "openSUSE Leap 15.4:ocfs2-kmp-default-5.14.21-150400.24.21.2.x86_64",
            "openSUSE Leap 15.4:reiserfs-kmp-64kb-5.14.21-150400.24.21.2.aarch64",
            "openSUSE Leap 15.4:reiserfs-kmp-default-5.14.21-150400.24.21.2.aarch64",
            "openSUSE Leap 15.4:reiserfs-kmp-default-5.14.21-150400.24.21.2.ppc64le",
            "openSUSE Leap 15.4:reiserfs-kmp-default-5.14.21-150400.24.21.2.s390x",
            "openSUSE Leap 15.4:reiserfs-kmp-default-5.14.21-150400.24.21.2.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 4.2,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:R/S:U/C:N/I:N/A:H",
            "version": "3.1"
          },
          "products": [
            "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.21.2.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.21.2.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.21.2.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.21.2.x86_64",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.21.2.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.21.2.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.21.2.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.21.2.x86_64",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.21.2.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.21.2.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.21.2.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.21.2.x86_64",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.21.2.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.21.2.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.21.2.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.21.2.x86_64",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.21.2.ppc64le",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.21.2.s390x",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.21.2.x86_64",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.21.2.ppc64le",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.21.2.s390x",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.21.2.x86_64",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_21-default-1-150400.9.3.2.ppc64le",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_21-default-1-150400.9.3.2.s390x",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_21-default-1-150400.9.3.2.x86_64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-64kb-5.14.21-150400.24.21.2.aarch64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-64kb-devel-5.14.21-150400.24.21.2.aarch64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-5.14.21-150400.24.21.2.aarch64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-5.14.21-150400.24.21.2.ppc64le",
            "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-5.14.21-150400.24.21.2.s390x",
            "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-5.14.21-150400.24.21.2.x86_64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-base-5.14.21-150400.24.21.2.150400.24.7.2.aarch64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-base-5.14.21-150400.24.21.2.150400.24.7.2.ppc64le",
            "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-base-5.14.21-150400.24.21.2.150400.24.7.2.s390x",
            "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-base-5.14.21-150400.24.21.2.150400.24.7.2.x86_64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-devel-5.14.21-150400.24.21.2.aarch64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-devel-5.14.21-150400.24.21.2.ppc64le",
            "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-devel-5.14.21-150400.24.21.2.s390x",
            "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-devel-5.14.21-150400.24.21.2.x86_64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-devel-5.14.21-150400.24.21.2.noarch",
            "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-macros-5.14.21-150400.24.21.2.noarch",
            "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-zfcpdump-5.14.21-150400.24.21.2.s390x",
            "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-docs-5.14.21-150400.24.21.3.noarch",
            "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-obs-build-5.14.21-150400.24.21.2.aarch64",
            "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-obs-build-5.14.21-150400.24.21.2.ppc64le",
            "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-obs-build-5.14.21-150400.24.21.2.s390x",
            "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-obs-build-5.14.21-150400.24.21.2.x86_64",
            "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-source-5.14.21-150400.24.21.2.noarch",
            "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-syms-5.14.21-150400.24.21.1.aarch64",
            "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-syms-5.14.21-150400.24.21.1.ppc64le",
            "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-syms-5.14.21-150400.24.21.1.s390x",
            "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-syms-5.14.21-150400.24.21.1.x86_64",
            "SUSE Linux Enterprise Module for Legacy 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.21.2.aarch64",
            "SUSE Linux Enterprise Module for Legacy 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.21.2.ppc64le",
            "SUSE Linux Enterprise Module for Legacy 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.21.2.s390x",
            "SUSE Linux Enterprise Module for Legacy 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.21.2.x86_64",
            "SUSE Linux Enterprise Workstation Extension 15 SP4:kernel-default-extra-5.14.21-150400.24.21.2.x86_64",
            "openSUSE Leap 15.4:cluster-md-kmp-64kb-5.14.21-150400.24.21.2.aarch64",
            "openSUSE Leap 15.4:cluster-md-kmp-default-5.14.21-150400.24.21.2.aarch64",
            "openSUSE Leap 15.4:cluster-md-kmp-default-5.14.21-150400.24.21.2.ppc64le",
            "openSUSE Leap 15.4:cluster-md-kmp-default-5.14.21-150400.24.21.2.s390x",
            "openSUSE Leap 15.4:cluster-md-kmp-default-5.14.21-150400.24.21.2.x86_64",
            "openSUSE Leap 15.4:dlm-kmp-64kb-5.14.21-150400.24.21.2.aarch64",
            "openSUSE Leap 15.4:dlm-kmp-default-5.14.21-150400.24.21.2.aarch64",
            "openSUSE Leap 15.4:dlm-kmp-default-5.14.21-150400.24.21.2.ppc64le",
            "openSUSE Leap 15.4:dlm-kmp-default-5.14.21-150400.24.21.2.s390x",
            "openSUSE Leap 15.4:dlm-kmp-default-5.14.21-150400.24.21.2.x86_64",
            "openSUSE Leap 15.4:dtb-allwinner-5.14.21-150400.24.21.1.aarch64",
            "openSUSE Leap 15.4:dtb-altera-5.14.21-150400.24.21.1.aarch64",
            "openSUSE Leap 15.4:dtb-amazon-5.14.21-150400.24.21.1.aarch64",
            "openSUSE Leap 15.4:dtb-amd-5.14.21-150400.24.21.1.aarch64",
            "openSUSE Leap 15.4:dtb-amlogic-5.14.21-150400.24.21.1.aarch64",
            "openSUSE Leap 15.4:dtb-apm-5.14.21-150400.24.21.1.aarch64",
            "openSUSE Leap 15.4:dtb-apple-5.14.21-150400.24.21.1.aarch64",
            "openSUSE Leap 15.4:dtb-arm-5.14.21-150400.24.21.1.aarch64",
            "openSUSE Leap 15.4:dtb-broadcom-5.14.21-150400.24.21.1.aarch64",
            "openSUSE Leap 15.4:dtb-cavium-5.14.21-150400.24.21.1.aarch64",
            "openSUSE Leap 15.4:dtb-exynos-5.14.21-150400.24.21.1.aarch64",
            "openSUSE Leap 15.4:dtb-freescale-5.14.21-150400.24.21.1.aarch64",
            "openSUSE Leap 15.4:dtb-hisilicon-5.14.21-150400.24.21.1.aarch64",
            "openSUSE Leap 15.4:dtb-lg-5.14.21-150400.24.21.1.aarch64",
            "openSUSE Leap 15.4:dtb-marvell-5.14.21-150400.24.21.1.aarch64",
            "openSUSE Leap 15.4:dtb-mediatek-5.14.21-150400.24.21.1.aarch64",
            "openSUSE Leap 15.4:dtb-nvidia-5.14.21-150400.24.21.1.aarch64",
            "openSUSE Leap 15.4:dtb-qcom-5.14.21-150400.24.21.1.aarch64",
            "openSUSE Leap 15.4:dtb-renesas-5.14.21-150400.24.21.1.aarch64",
            "openSUSE Leap 15.4:dtb-rockchip-5.14.21-150400.24.21.1.aarch64",
            "openSUSE Leap 15.4:dtb-socionext-5.14.21-150400.24.21.1.aarch64",
            "openSUSE Leap 15.4:dtb-sprd-5.14.21-150400.24.21.1.aarch64",
            "openSUSE Leap 15.4:dtb-xilinx-5.14.21-150400.24.21.1.aarch64",
            "openSUSE Leap 15.4:gfs2-kmp-64kb-5.14.21-150400.24.21.2.aarch64",
            "openSUSE Leap 15.4:gfs2-kmp-default-5.14.21-150400.24.21.2.aarch64",
            "openSUSE Leap 15.4:gfs2-kmp-default-5.14.21-150400.24.21.2.ppc64le",
            "openSUSE Leap 15.4:gfs2-kmp-default-5.14.21-150400.24.21.2.s390x",
            "openSUSE Leap 15.4:gfs2-kmp-default-5.14.21-150400.24.21.2.x86_64",
            "openSUSE Leap 15.4:kernel-64kb-5.14.21-150400.24.21.2.aarch64",
            "openSUSE Leap 15.4:kernel-64kb-devel-5.14.21-150400.24.21.2.aarch64",
            "openSUSE Leap 15.4:kernel-64kb-extra-5.14.21-150400.24.21.2.aarch64",
            "openSUSE Leap 15.4:kernel-64kb-livepatch-devel-5.14.21-150400.24.21.2.aarch64",
            "openSUSE Leap 15.4:kernel-64kb-optional-5.14.21-150400.24.21.2.aarch64",
            "openSUSE Leap 15.4:kernel-debug-5.14.21-150400.24.21.2.ppc64le",
            "openSUSE Leap 15.4:kernel-debug-5.14.21-150400.24.21.2.x86_64",
            "openSUSE Leap 15.4:kernel-debug-devel-5.14.21-150400.24.21.2.ppc64le",
            "openSUSE Leap 15.4:kernel-debug-devel-5.14.21-150400.24.21.2.x86_64",
            "openSUSE Leap 15.4:kernel-debug-livepatch-devel-5.14.21-150400.24.21.2.ppc64le",
            "openSUSE Leap 15.4:kernel-debug-livepatch-devel-5.14.21-150400.24.21.2.x86_64",
            "openSUSE Leap 15.4:kernel-default-5.14.21-150400.24.21.2.aarch64",
            "openSUSE Leap 15.4:kernel-default-5.14.21-150400.24.21.2.ppc64le",
            "openSUSE Leap 15.4:kernel-default-5.14.21-150400.24.21.2.s390x",
            "openSUSE Leap 15.4:kernel-default-5.14.21-150400.24.21.2.x86_64",
            "openSUSE Leap 15.4:kernel-default-base-5.14.21-150400.24.21.2.150400.24.7.2.aarch64",
            "openSUSE Leap 15.4:kernel-default-base-5.14.21-150400.24.21.2.150400.24.7.2.ppc64le",
            "openSUSE Leap 15.4:kernel-default-base-5.14.21-150400.24.21.2.150400.24.7.2.s390x",
            "openSUSE Leap 15.4:kernel-default-base-5.14.21-150400.24.21.2.150400.24.7.2.x86_64",
            "openSUSE Leap 15.4:kernel-default-base-rebuild-5.14.21-150400.24.21.2.150400.24.7.2.aarch64",
            "openSUSE Leap 15.4:kernel-default-base-rebuild-5.14.21-150400.24.21.2.150400.24.7.2.ppc64le",
            "openSUSE Leap 15.4:kernel-default-base-rebuild-5.14.21-150400.24.21.2.150400.24.7.2.s390x",
            "openSUSE Leap 15.4:kernel-default-base-rebuild-5.14.21-150400.24.21.2.150400.24.7.2.x86_64",
            "openSUSE Leap 15.4:kernel-default-devel-5.14.21-150400.24.21.2.aarch64",
            "openSUSE Leap 15.4:kernel-default-devel-5.14.21-150400.24.21.2.ppc64le",
            "openSUSE Leap 15.4:kernel-default-devel-5.14.21-150400.24.21.2.s390x",
            "openSUSE Leap 15.4:kernel-default-devel-5.14.21-150400.24.21.2.x86_64",
            "openSUSE Leap 15.4:kernel-default-extra-5.14.21-150400.24.21.2.aarch64",
            "openSUSE Leap 15.4:kernel-default-extra-5.14.21-150400.24.21.2.ppc64le",
            "openSUSE Leap 15.4:kernel-default-extra-5.14.21-150400.24.21.2.s390x",
            "openSUSE Leap 15.4:kernel-default-extra-5.14.21-150400.24.21.2.x86_64",
            "openSUSE Leap 15.4:kernel-default-livepatch-5.14.21-150400.24.21.2.aarch64",
            "openSUSE Leap 15.4:kernel-default-livepatch-5.14.21-150400.24.21.2.ppc64le",
            "openSUSE Leap 15.4:kernel-default-livepatch-5.14.21-150400.24.21.2.s390x",
            "openSUSE Leap 15.4:kernel-default-livepatch-5.14.21-150400.24.21.2.x86_64",
            "openSUSE Leap 15.4:kernel-default-livepatch-devel-5.14.21-150400.24.21.2.aarch64",
            "openSUSE Leap 15.4:kernel-default-livepatch-devel-5.14.21-150400.24.21.2.ppc64le",
            "openSUSE Leap 15.4:kernel-default-livepatch-devel-5.14.21-150400.24.21.2.s390x",
            "openSUSE Leap 15.4:kernel-default-livepatch-devel-5.14.21-150400.24.21.2.x86_64",
            "openSUSE Leap 15.4:kernel-default-optional-5.14.21-150400.24.21.2.aarch64",
            "openSUSE Leap 15.4:kernel-default-optional-5.14.21-150400.24.21.2.ppc64le",
            "openSUSE Leap 15.4:kernel-default-optional-5.14.21-150400.24.21.2.s390x",
            "openSUSE Leap 15.4:kernel-default-optional-5.14.21-150400.24.21.2.x86_64",
            "openSUSE Leap 15.4:kernel-devel-5.14.21-150400.24.21.2.noarch",
            "openSUSE Leap 15.4:kernel-docs-5.14.21-150400.24.21.3.noarch",
            "openSUSE Leap 15.4:kernel-docs-html-5.14.21-150400.24.21.3.noarch",
            "openSUSE Leap 15.4:kernel-kvmsmall-5.14.21-150400.24.21.2.aarch64",
            "openSUSE Leap 15.4:kernel-kvmsmall-5.14.21-150400.24.21.2.ppc64le",
            "openSUSE Leap 15.4:kernel-kvmsmall-5.14.21-150400.24.21.2.x86_64",
            "openSUSE Leap 15.4:kernel-kvmsmall-devel-5.14.21-150400.24.21.2.aarch64",
            "openSUSE Leap 15.4:kernel-kvmsmall-devel-5.14.21-150400.24.21.2.ppc64le",
            "openSUSE Leap 15.4:kernel-kvmsmall-devel-5.14.21-150400.24.21.2.x86_64",
            "openSUSE Leap 15.4:kernel-kvmsmall-livepatch-devel-5.14.21-150400.24.21.2.aarch64",
            "openSUSE Leap 15.4:kernel-kvmsmall-livepatch-devel-5.14.21-150400.24.21.2.ppc64le",
            "openSUSE Leap 15.4:kernel-kvmsmall-livepatch-devel-5.14.21-150400.24.21.2.x86_64",
            "openSUSE Leap 15.4:kernel-macros-5.14.21-150400.24.21.2.noarch",
            "openSUSE Leap 15.4:kernel-obs-build-5.14.21-150400.24.21.2.aarch64",
            "openSUSE Leap 15.4:kernel-obs-build-5.14.21-150400.24.21.2.ppc64le",
            "openSUSE Leap 15.4:kernel-obs-build-5.14.21-150400.24.21.2.s390x",
            "openSUSE Leap 15.4:kernel-obs-build-5.14.21-150400.24.21.2.x86_64",
            "openSUSE Leap 15.4:kernel-obs-qa-5.14.21-150400.24.21.1.aarch64",
            "openSUSE Leap 15.4:kernel-obs-qa-5.14.21-150400.24.21.1.ppc64le",
            "openSUSE Leap 15.4:kernel-obs-qa-5.14.21-150400.24.21.1.s390x",
            "openSUSE Leap 15.4:kernel-obs-qa-5.14.21-150400.24.21.1.x86_64",
            "openSUSE Leap 15.4:kernel-source-5.14.21-150400.24.21.2.noarch",
            "openSUSE Leap 15.4:kernel-source-vanilla-5.14.21-150400.24.21.2.noarch",
            "openSUSE Leap 15.4:kernel-syms-5.14.21-150400.24.21.1.aarch64",
            "openSUSE Leap 15.4:kernel-syms-5.14.21-150400.24.21.1.ppc64le",
            "openSUSE Leap 15.4:kernel-syms-5.14.21-150400.24.21.1.s390x",
            "openSUSE Leap 15.4:kernel-syms-5.14.21-150400.24.21.1.x86_64",
            "openSUSE Leap 15.4:kernel-zfcpdump-5.14.21-150400.24.21.2.s390x",
            "openSUSE Leap 15.4:kselftests-kmp-64kb-5.14.21-150400.24.21.2.aarch64",
            "openSUSE Leap 15.4:kselftests-kmp-default-5.14.21-150400.24.21.2.aarch64",
            "openSUSE Leap 15.4:kselftests-kmp-default-5.14.21-150400.24.21.2.ppc64le",
            "openSUSE Leap 15.4:kselftests-kmp-default-5.14.21-150400.24.21.2.s390x",
            "openSUSE Leap 15.4:kselftests-kmp-default-5.14.21-150400.24.21.2.x86_64",
            "openSUSE Leap 15.4:ocfs2-kmp-64kb-5.14.21-150400.24.21.2.aarch64",
            "openSUSE Leap 15.4:ocfs2-kmp-default-5.14.21-150400.24.21.2.aarch64",
            "openSUSE Leap 15.4:ocfs2-kmp-default-5.14.21-150400.24.21.2.ppc64le",
            "openSUSE Leap 15.4:ocfs2-kmp-default-5.14.21-150400.24.21.2.s390x",
            "openSUSE Leap 15.4:ocfs2-kmp-default-5.14.21-150400.24.21.2.x86_64",
            "openSUSE Leap 15.4:reiserfs-kmp-64kb-5.14.21-150400.24.21.2.aarch64",
            "openSUSE Leap 15.4:reiserfs-kmp-default-5.14.21-150400.24.21.2.aarch64",
            "openSUSE Leap 15.4:reiserfs-kmp-default-5.14.21-150400.24.21.2.ppc64le",
            "openSUSE Leap 15.4:reiserfs-kmp-default-5.14.21-150400.24.21.2.s390x",
            "openSUSE Leap 15.4:reiserfs-kmp-default-5.14.21-150400.24.21.2.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2022-09-16T15:30:19Z",
          "details": "moderate"
        }
      ],
      "title": "CVE-2022-2977"
    },
    {
      "cve": "CVE-2022-3028",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2022-3028"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "A race condition was found in the Linux kernel\u0027s IP framework for transforming packets (XFRM subsystem) when multiple calls to xfrm_probe_algs occurred simultaneously. This flaw could allow a local attacker to potentially trigger an out-of-bounds write or leak kernel heap memory by performing an out-of-bounds read and copying it into a socket.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.21.2.aarch64",
          "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.21.2.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.21.2.s390x",
          "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.21.2.x86_64",
          "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.21.2.aarch64",
          "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.21.2.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.21.2.s390x",
          "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.21.2.x86_64",
          "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.21.2.aarch64",
          "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.21.2.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.21.2.s390x",
          "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.21.2.x86_64",
          "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.21.2.aarch64",
          "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.21.2.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.21.2.s390x",
          "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.21.2.x86_64",
          "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.21.2.ppc64le",
          "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.21.2.s390x",
          "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.21.2.x86_64",
          "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.21.2.ppc64le",
          "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.21.2.s390x",
          "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.21.2.x86_64",
          "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_21-default-1-150400.9.3.2.ppc64le",
          "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_21-default-1-150400.9.3.2.s390x",
          "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_21-default-1-150400.9.3.2.x86_64",
          "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-64kb-5.14.21-150400.24.21.2.aarch64",
          "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-64kb-devel-5.14.21-150400.24.21.2.aarch64",
          "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-5.14.21-150400.24.21.2.aarch64",
          "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-5.14.21-150400.24.21.2.ppc64le",
          "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-5.14.21-150400.24.21.2.s390x",
          "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-5.14.21-150400.24.21.2.x86_64",
          "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-base-5.14.21-150400.24.21.2.150400.24.7.2.aarch64",
          "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-base-5.14.21-150400.24.21.2.150400.24.7.2.ppc64le",
          "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-base-5.14.21-150400.24.21.2.150400.24.7.2.s390x",
          "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-base-5.14.21-150400.24.21.2.150400.24.7.2.x86_64",
          "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-devel-5.14.21-150400.24.21.2.aarch64",
          "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-devel-5.14.21-150400.24.21.2.ppc64le",
          "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-devel-5.14.21-150400.24.21.2.s390x",
          "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-devel-5.14.21-150400.24.21.2.x86_64",
          "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-devel-5.14.21-150400.24.21.2.noarch",
          "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-macros-5.14.21-150400.24.21.2.noarch",
          "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-zfcpdump-5.14.21-150400.24.21.2.s390x",
          "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-docs-5.14.21-150400.24.21.3.noarch",
          "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-obs-build-5.14.21-150400.24.21.2.aarch64",
          "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-obs-build-5.14.21-150400.24.21.2.ppc64le",
          "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-obs-build-5.14.21-150400.24.21.2.s390x",
          "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-obs-build-5.14.21-150400.24.21.2.x86_64",
          "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-source-5.14.21-150400.24.21.2.noarch",
          "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-syms-5.14.21-150400.24.21.1.aarch64",
          "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-syms-5.14.21-150400.24.21.1.ppc64le",
          "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-syms-5.14.21-150400.24.21.1.s390x",
          "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-syms-5.14.21-150400.24.21.1.x86_64",
          "SUSE Linux Enterprise Module for Legacy 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.21.2.aarch64",
          "SUSE Linux Enterprise Module for Legacy 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.21.2.ppc64le",
          "SUSE Linux Enterprise Module for Legacy 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.21.2.s390x",
          "SUSE Linux Enterprise Module for Legacy 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.21.2.x86_64",
          "SUSE Linux Enterprise Workstation Extension 15 SP4:kernel-default-extra-5.14.21-150400.24.21.2.x86_64",
          "openSUSE Leap 15.4:cluster-md-kmp-64kb-5.14.21-150400.24.21.2.aarch64",
          "openSUSE Leap 15.4:cluster-md-kmp-default-5.14.21-150400.24.21.2.aarch64",
          "openSUSE Leap 15.4:cluster-md-kmp-default-5.14.21-150400.24.21.2.ppc64le",
          "openSUSE Leap 15.4:cluster-md-kmp-default-5.14.21-150400.24.21.2.s390x",
          "openSUSE Leap 15.4:cluster-md-kmp-default-5.14.21-150400.24.21.2.x86_64",
          "openSUSE Leap 15.4:dlm-kmp-64kb-5.14.21-150400.24.21.2.aarch64",
          "openSUSE Leap 15.4:dlm-kmp-default-5.14.21-150400.24.21.2.aarch64",
          "openSUSE Leap 15.4:dlm-kmp-default-5.14.21-150400.24.21.2.ppc64le",
          "openSUSE Leap 15.4:dlm-kmp-default-5.14.21-150400.24.21.2.s390x",
          "openSUSE Leap 15.4:dlm-kmp-default-5.14.21-150400.24.21.2.x86_64",
          "openSUSE Leap 15.4:dtb-allwinner-5.14.21-150400.24.21.1.aarch64",
          "openSUSE Leap 15.4:dtb-altera-5.14.21-150400.24.21.1.aarch64",
          "openSUSE Leap 15.4:dtb-amazon-5.14.21-150400.24.21.1.aarch64",
          "openSUSE Leap 15.4:dtb-amd-5.14.21-150400.24.21.1.aarch64",
          "openSUSE Leap 15.4:dtb-amlogic-5.14.21-150400.24.21.1.aarch64",
          "openSUSE Leap 15.4:dtb-apm-5.14.21-150400.24.21.1.aarch64",
          "openSUSE Leap 15.4:dtb-apple-5.14.21-150400.24.21.1.aarch64",
          "openSUSE Leap 15.4:dtb-arm-5.14.21-150400.24.21.1.aarch64",
          "openSUSE Leap 15.4:dtb-broadcom-5.14.21-150400.24.21.1.aarch64",
          "openSUSE Leap 15.4:dtb-cavium-5.14.21-150400.24.21.1.aarch64",
          "openSUSE Leap 15.4:dtb-exynos-5.14.21-150400.24.21.1.aarch64",
          "openSUSE Leap 15.4:dtb-freescale-5.14.21-150400.24.21.1.aarch64",
          "openSUSE Leap 15.4:dtb-hisilicon-5.14.21-150400.24.21.1.aarch64",
          "openSUSE Leap 15.4:dtb-lg-5.14.21-150400.24.21.1.aarch64",
          "openSUSE Leap 15.4:dtb-marvell-5.14.21-150400.24.21.1.aarch64",
          "openSUSE Leap 15.4:dtb-mediatek-5.14.21-150400.24.21.1.aarch64",
          "openSUSE Leap 15.4:dtb-nvidia-5.14.21-150400.24.21.1.aarch64",
          "openSUSE Leap 15.4:dtb-qcom-5.14.21-150400.24.21.1.aarch64",
          "openSUSE Leap 15.4:dtb-renesas-5.14.21-150400.24.21.1.aarch64",
          "openSUSE Leap 15.4:dtb-rockchip-5.14.21-150400.24.21.1.aarch64",
          "openSUSE Leap 15.4:dtb-socionext-5.14.21-150400.24.21.1.aarch64",
          "openSUSE Leap 15.4:dtb-sprd-5.14.21-150400.24.21.1.aarch64",
          "openSUSE Leap 15.4:dtb-xilinx-5.14.21-150400.24.21.1.aarch64",
          "openSUSE Leap 15.4:gfs2-kmp-64kb-5.14.21-150400.24.21.2.aarch64",
          "openSUSE Leap 15.4:gfs2-kmp-default-5.14.21-150400.24.21.2.aarch64",
          "openSUSE Leap 15.4:gfs2-kmp-default-5.14.21-150400.24.21.2.ppc64le",
          "openSUSE Leap 15.4:gfs2-kmp-default-5.14.21-150400.24.21.2.s390x",
          "openSUSE Leap 15.4:gfs2-kmp-default-5.14.21-150400.24.21.2.x86_64",
          "openSUSE Leap 15.4:kernel-64kb-5.14.21-150400.24.21.2.aarch64",
          "openSUSE Leap 15.4:kernel-64kb-devel-5.14.21-150400.24.21.2.aarch64",
          "openSUSE Leap 15.4:kernel-64kb-extra-5.14.21-150400.24.21.2.aarch64",
          "openSUSE Leap 15.4:kernel-64kb-livepatch-devel-5.14.21-150400.24.21.2.aarch64",
          "openSUSE Leap 15.4:kernel-64kb-optional-5.14.21-150400.24.21.2.aarch64",
          "openSUSE Leap 15.4:kernel-debug-5.14.21-150400.24.21.2.ppc64le",
          "openSUSE Leap 15.4:kernel-debug-5.14.21-150400.24.21.2.x86_64",
          "openSUSE Leap 15.4:kernel-debug-devel-5.14.21-150400.24.21.2.ppc64le",
          "openSUSE Leap 15.4:kernel-debug-devel-5.14.21-150400.24.21.2.x86_64",
          "openSUSE Leap 15.4:kernel-debug-livepatch-devel-5.14.21-150400.24.21.2.ppc64le",
          "openSUSE Leap 15.4:kernel-debug-livepatch-devel-5.14.21-150400.24.21.2.x86_64",
          "openSUSE Leap 15.4:kernel-default-5.14.21-150400.24.21.2.aarch64",
          "openSUSE Leap 15.4:kernel-default-5.14.21-150400.24.21.2.ppc64le",
          "openSUSE Leap 15.4:kernel-default-5.14.21-150400.24.21.2.s390x",
          "openSUSE Leap 15.4:kernel-default-5.14.21-150400.24.21.2.x86_64",
          "openSUSE Leap 15.4:kernel-default-base-5.14.21-150400.24.21.2.150400.24.7.2.aarch64",
          "openSUSE Leap 15.4:kernel-default-base-5.14.21-150400.24.21.2.150400.24.7.2.ppc64le",
          "openSUSE Leap 15.4:kernel-default-base-5.14.21-150400.24.21.2.150400.24.7.2.s390x",
          "openSUSE Leap 15.4:kernel-default-base-5.14.21-150400.24.21.2.150400.24.7.2.x86_64",
          "openSUSE Leap 15.4:kernel-default-base-rebuild-5.14.21-150400.24.21.2.150400.24.7.2.aarch64",
          "openSUSE Leap 15.4:kernel-default-base-rebuild-5.14.21-150400.24.21.2.150400.24.7.2.ppc64le",
          "openSUSE Leap 15.4:kernel-default-base-rebuild-5.14.21-150400.24.21.2.150400.24.7.2.s390x",
          "openSUSE Leap 15.4:kernel-default-base-rebuild-5.14.21-150400.24.21.2.150400.24.7.2.x86_64",
          "openSUSE Leap 15.4:kernel-default-devel-5.14.21-150400.24.21.2.aarch64",
          "openSUSE Leap 15.4:kernel-default-devel-5.14.21-150400.24.21.2.ppc64le",
          "openSUSE Leap 15.4:kernel-default-devel-5.14.21-150400.24.21.2.s390x",
          "openSUSE Leap 15.4:kernel-default-devel-5.14.21-150400.24.21.2.x86_64",
          "openSUSE Leap 15.4:kernel-default-extra-5.14.21-150400.24.21.2.aarch64",
          "openSUSE Leap 15.4:kernel-default-extra-5.14.21-150400.24.21.2.ppc64le",
          "openSUSE Leap 15.4:kernel-default-extra-5.14.21-150400.24.21.2.s390x",
          "openSUSE Leap 15.4:kernel-default-extra-5.14.21-150400.24.21.2.x86_64",
          "openSUSE Leap 15.4:kernel-default-livepatch-5.14.21-150400.24.21.2.aarch64",
          "openSUSE Leap 15.4:kernel-default-livepatch-5.14.21-150400.24.21.2.ppc64le",
          "openSUSE Leap 15.4:kernel-default-livepatch-5.14.21-150400.24.21.2.s390x",
          "openSUSE Leap 15.4:kernel-default-livepatch-5.14.21-150400.24.21.2.x86_64",
          "openSUSE Leap 15.4:kernel-default-livepatch-devel-5.14.21-150400.24.21.2.aarch64",
          "openSUSE Leap 15.4:kernel-default-livepatch-devel-5.14.21-150400.24.21.2.ppc64le",
          "openSUSE Leap 15.4:kernel-default-livepatch-devel-5.14.21-150400.24.21.2.s390x",
          "openSUSE Leap 15.4:kernel-default-livepatch-devel-5.14.21-150400.24.21.2.x86_64",
          "openSUSE Leap 15.4:kernel-default-optional-5.14.21-150400.24.21.2.aarch64",
          "openSUSE Leap 15.4:kernel-default-optional-5.14.21-150400.24.21.2.ppc64le",
          "openSUSE Leap 15.4:kernel-default-optional-5.14.21-150400.24.21.2.s390x",
          "openSUSE Leap 15.4:kernel-default-optional-5.14.21-150400.24.21.2.x86_64",
          "openSUSE Leap 15.4:kernel-devel-5.14.21-150400.24.21.2.noarch",
          "openSUSE Leap 15.4:kernel-docs-5.14.21-150400.24.21.3.noarch",
          "openSUSE Leap 15.4:kernel-docs-html-5.14.21-150400.24.21.3.noarch",
          "openSUSE Leap 15.4:kernel-kvmsmall-5.14.21-150400.24.21.2.aarch64",
          "openSUSE Leap 15.4:kernel-kvmsmall-5.14.21-150400.24.21.2.ppc64le",
          "openSUSE Leap 15.4:kernel-kvmsmall-5.14.21-150400.24.21.2.x86_64",
          "openSUSE Leap 15.4:kernel-kvmsmall-devel-5.14.21-150400.24.21.2.aarch64",
          "openSUSE Leap 15.4:kernel-kvmsmall-devel-5.14.21-150400.24.21.2.ppc64le",
          "openSUSE Leap 15.4:kernel-kvmsmall-devel-5.14.21-150400.24.21.2.x86_64",
          "openSUSE Leap 15.4:kernel-kvmsmall-livepatch-devel-5.14.21-150400.24.21.2.aarch64",
          "openSUSE Leap 15.4:kernel-kvmsmall-livepatch-devel-5.14.21-150400.24.21.2.ppc64le",
          "openSUSE Leap 15.4:kernel-kvmsmall-livepatch-devel-5.14.21-150400.24.21.2.x86_64",
          "openSUSE Leap 15.4:kernel-macros-5.14.21-150400.24.21.2.noarch",
          "openSUSE Leap 15.4:kernel-obs-build-5.14.21-150400.24.21.2.aarch64",
          "openSUSE Leap 15.4:kernel-obs-build-5.14.21-150400.24.21.2.ppc64le",
          "openSUSE Leap 15.4:kernel-obs-build-5.14.21-150400.24.21.2.s390x",
          "openSUSE Leap 15.4:kernel-obs-build-5.14.21-150400.24.21.2.x86_64",
          "openSUSE Leap 15.4:kernel-obs-qa-5.14.21-150400.24.21.1.aarch64",
          "openSUSE Leap 15.4:kernel-obs-qa-5.14.21-150400.24.21.1.ppc64le",
          "openSUSE Leap 15.4:kernel-obs-qa-5.14.21-150400.24.21.1.s390x",
          "openSUSE Leap 15.4:kernel-obs-qa-5.14.21-150400.24.21.1.x86_64",
          "openSUSE Leap 15.4:kernel-source-5.14.21-150400.24.21.2.noarch",
          "openSUSE Leap 15.4:kernel-source-vanilla-5.14.21-150400.24.21.2.noarch",
          "openSUSE Leap 15.4:kernel-syms-5.14.21-150400.24.21.1.aarch64",
          "openSUSE Leap 15.4:kernel-syms-5.14.21-150400.24.21.1.ppc64le",
          "openSUSE Leap 15.4:kernel-syms-5.14.21-150400.24.21.1.s390x",
          "openSUSE Leap 15.4:kernel-syms-5.14.21-150400.24.21.1.x86_64",
          "openSUSE Leap 15.4:kernel-zfcpdump-5.14.21-150400.24.21.2.s390x",
          "openSUSE Leap 15.4:kselftests-kmp-64kb-5.14.21-150400.24.21.2.aarch64",
          "openSUSE Leap 15.4:kselftests-kmp-default-5.14.21-150400.24.21.2.aarch64",
          "openSUSE Leap 15.4:kselftests-kmp-default-5.14.21-150400.24.21.2.ppc64le",
          "openSUSE Leap 15.4:kselftests-kmp-default-5.14.21-150400.24.21.2.s390x",
          "openSUSE Leap 15.4:kselftests-kmp-default-5.14.21-150400.24.21.2.x86_64",
          "openSUSE Leap 15.4:ocfs2-kmp-64kb-5.14.21-150400.24.21.2.aarch64",
          "openSUSE Leap 15.4:ocfs2-kmp-default-5.14.21-150400.24.21.2.aarch64",
          "openSUSE Leap 15.4:ocfs2-kmp-default-5.14.21-150400.24.21.2.ppc64le",
          "openSUSE Leap 15.4:ocfs2-kmp-default-5.14.21-150400.24.21.2.s390x",
          "openSUSE Leap 15.4:ocfs2-kmp-default-5.14.21-150400.24.21.2.x86_64",
          "openSUSE Leap 15.4:reiserfs-kmp-64kb-5.14.21-150400.24.21.2.aarch64",
          "openSUSE Leap 15.4:reiserfs-kmp-default-5.14.21-150400.24.21.2.aarch64",
          "openSUSE Leap 15.4:reiserfs-kmp-default-5.14.21-150400.24.21.2.ppc64le",
          "openSUSE Leap 15.4:reiserfs-kmp-default-5.14.21-150400.24.21.2.s390x",
          "openSUSE Leap 15.4:reiserfs-kmp-default-5.14.21-150400.24.21.2.x86_64"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2022-3028",
          "url": "https://www.suse.com/security/cve/CVE-2022-3028"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1202898 for CVE-2022-3028",
          "url": "https://bugzilla.suse.com/1202898"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1212296 for CVE-2022-3028",
          "url": "https://bugzilla.suse.com/1212296"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.21.2.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.21.2.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.21.2.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.21.2.x86_64",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.21.2.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.21.2.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.21.2.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.21.2.x86_64",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.21.2.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.21.2.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.21.2.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.21.2.x86_64",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.21.2.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.21.2.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.21.2.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.21.2.x86_64",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.21.2.ppc64le",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.21.2.s390x",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.21.2.x86_64",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.21.2.ppc64le",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.21.2.s390x",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.21.2.x86_64",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_21-default-1-150400.9.3.2.ppc64le",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_21-default-1-150400.9.3.2.s390x",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_21-default-1-150400.9.3.2.x86_64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-64kb-5.14.21-150400.24.21.2.aarch64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-64kb-devel-5.14.21-150400.24.21.2.aarch64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-5.14.21-150400.24.21.2.aarch64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-5.14.21-150400.24.21.2.ppc64le",
            "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-5.14.21-150400.24.21.2.s390x",
            "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-5.14.21-150400.24.21.2.x86_64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-base-5.14.21-150400.24.21.2.150400.24.7.2.aarch64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-base-5.14.21-150400.24.21.2.150400.24.7.2.ppc64le",
            "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-base-5.14.21-150400.24.21.2.150400.24.7.2.s390x",
            "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-base-5.14.21-150400.24.21.2.150400.24.7.2.x86_64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-devel-5.14.21-150400.24.21.2.aarch64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-devel-5.14.21-150400.24.21.2.ppc64le",
            "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-devel-5.14.21-150400.24.21.2.s390x",
            "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-devel-5.14.21-150400.24.21.2.x86_64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-devel-5.14.21-150400.24.21.2.noarch",
            "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-macros-5.14.21-150400.24.21.2.noarch",
            "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-zfcpdump-5.14.21-150400.24.21.2.s390x",
            "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-docs-5.14.21-150400.24.21.3.noarch",
            "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-obs-build-5.14.21-150400.24.21.2.aarch64",
            "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-obs-build-5.14.21-150400.24.21.2.ppc64le",
            "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-obs-build-5.14.21-150400.24.21.2.s390x",
            "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-obs-build-5.14.21-150400.24.21.2.x86_64",
            "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-source-5.14.21-150400.24.21.2.noarch",
            "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-syms-5.14.21-150400.24.21.1.aarch64",
            "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-syms-5.14.21-150400.24.21.1.ppc64le",
            "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-syms-5.14.21-150400.24.21.1.s390x",
            "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-syms-5.14.21-150400.24.21.1.x86_64",
            "SUSE Linux Enterprise Module for Legacy 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.21.2.aarch64",
            "SUSE Linux Enterprise Module for Legacy 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.21.2.ppc64le",
            "SUSE Linux Enterprise Module for Legacy 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.21.2.s390x",
            "SUSE Linux Enterprise Module for Legacy 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.21.2.x86_64",
            "SUSE Linux Enterprise Workstation Extension 15 SP4:kernel-default-extra-5.14.21-150400.24.21.2.x86_64",
            "openSUSE Leap 15.4:cluster-md-kmp-64kb-5.14.21-150400.24.21.2.aarch64",
            "openSUSE Leap 15.4:cluster-md-kmp-default-5.14.21-150400.24.21.2.aarch64",
            "openSUSE Leap 15.4:cluster-md-kmp-default-5.14.21-150400.24.21.2.ppc64le",
            "openSUSE Leap 15.4:cluster-md-kmp-default-5.14.21-150400.24.21.2.s390x",
            "openSUSE Leap 15.4:cluster-md-kmp-default-5.14.21-150400.24.21.2.x86_64",
            "openSUSE Leap 15.4:dlm-kmp-64kb-5.14.21-150400.24.21.2.aarch64",
            "openSUSE Leap 15.4:dlm-kmp-default-5.14.21-150400.24.21.2.aarch64",
            "openSUSE Leap 15.4:dlm-kmp-default-5.14.21-150400.24.21.2.ppc64le",
            "openSUSE Leap 15.4:dlm-kmp-default-5.14.21-150400.24.21.2.s390x",
            "openSUSE Leap 15.4:dlm-kmp-default-5.14.21-150400.24.21.2.x86_64",
            "openSUSE Leap 15.4:dtb-allwinner-5.14.21-150400.24.21.1.aarch64",
            "openSUSE Leap 15.4:dtb-altera-5.14.21-150400.24.21.1.aarch64",
            "openSUSE Leap 15.4:dtb-amazon-5.14.21-150400.24.21.1.aarch64",
            "openSUSE Leap 15.4:dtb-amd-5.14.21-150400.24.21.1.aarch64",
            "openSUSE Leap 15.4:dtb-amlogic-5.14.21-150400.24.21.1.aarch64",
            "openSUSE Leap 15.4:dtb-apm-5.14.21-150400.24.21.1.aarch64",
            "openSUSE Leap 15.4:dtb-apple-5.14.21-150400.24.21.1.aarch64",
            "openSUSE Leap 15.4:dtb-arm-5.14.21-150400.24.21.1.aarch64",
            "openSUSE Leap 15.4:dtb-broadcom-5.14.21-150400.24.21.1.aarch64",
            "openSUSE Leap 15.4:dtb-cavium-5.14.21-150400.24.21.1.aarch64",
            "openSUSE Leap 15.4:dtb-exynos-5.14.21-150400.24.21.1.aarch64",
            "openSUSE Leap 15.4:dtb-freescale-5.14.21-150400.24.21.1.aarch64",
            "openSUSE Leap 15.4:dtb-hisilicon-5.14.21-150400.24.21.1.aarch64",
            "openSUSE Leap 15.4:dtb-lg-5.14.21-150400.24.21.1.aarch64",
            "openSUSE Leap 15.4:dtb-marvell-5.14.21-150400.24.21.1.aarch64",
            "openSUSE Leap 15.4:dtb-mediatek-5.14.21-150400.24.21.1.aarch64",
            "openSUSE Leap 15.4:dtb-nvidia-5.14.21-150400.24.21.1.aarch64",
            "openSUSE Leap 15.4:dtb-qcom-5.14.21-150400.24.21.1.aarch64",
            "openSUSE Leap 15.4:dtb-renesas-5.14.21-150400.24.21.1.aarch64",
            "openSUSE Leap 15.4:dtb-rockchip-5.14.21-150400.24.21.1.aarch64",
            "openSUSE Leap 15.4:dtb-socionext-5.14.21-150400.24.21.1.aarch64",
            "openSUSE Leap 15.4:dtb-sprd-5.14.21-150400.24.21.1.aarch64",
            "openSUSE Leap 15.4:dtb-xilinx-5.14.21-150400.24.21.1.aarch64",
            "openSUSE Leap 15.4:gfs2-kmp-64kb-5.14.21-150400.24.21.2.aarch64",
            "openSUSE Leap 15.4:gfs2-kmp-default-5.14.21-150400.24.21.2.aarch64",
            "openSUSE Leap 15.4:gfs2-kmp-default-5.14.21-150400.24.21.2.ppc64le",
            "openSUSE Leap 15.4:gfs2-kmp-default-5.14.21-150400.24.21.2.s390x",
            "openSUSE Leap 15.4:gfs2-kmp-default-5.14.21-150400.24.21.2.x86_64",
            "openSUSE Leap 15.4:kernel-64kb-5.14.21-150400.24.21.2.aarch64",
            "openSUSE Leap 15.4:kernel-64kb-devel-5.14.21-150400.24.21.2.aarch64",
            "openSUSE Leap 15.4:kernel-64kb-extra-5.14.21-150400.24.21.2.aarch64",
            "openSUSE Leap 15.4:kernel-64kb-livepatch-devel-5.14.21-150400.24.21.2.aarch64",
            "openSUSE Leap 15.4:kernel-64kb-optional-5.14.21-150400.24.21.2.aarch64",
            "openSUSE Leap 15.4:kernel-debug-5.14.21-150400.24.21.2.ppc64le",
            "openSUSE Leap 15.4:kernel-debug-5.14.21-150400.24.21.2.x86_64",
            "openSUSE Leap 15.4:kernel-debug-devel-5.14.21-150400.24.21.2.ppc64le",
            "openSUSE Leap 15.4:kernel-debug-devel-5.14.21-150400.24.21.2.x86_64",
            "openSUSE Leap 15.4:kernel-debug-livepatch-devel-5.14.21-150400.24.21.2.ppc64le",
            "openSUSE Leap 15.4:kernel-debug-livepatch-devel-5.14.21-150400.24.21.2.x86_64",
            "openSUSE Leap 15.4:kernel-default-5.14.21-150400.24.21.2.aarch64",
            "openSUSE Leap 15.4:kernel-default-5.14.21-150400.24.21.2.ppc64le",
            "openSUSE Leap 15.4:kernel-default-5.14.21-150400.24.21.2.s390x",
            "openSUSE Leap 15.4:kernel-default-5.14.21-150400.24.21.2.x86_64",
            "openSUSE Leap 15.4:kernel-default-base-5.14.21-150400.24.21.2.150400.24.7.2.aarch64",
            "openSUSE Leap 15.4:kernel-default-base-5.14.21-150400.24.21.2.150400.24.7.2.ppc64le",
            "openSUSE Leap 15.4:kernel-default-base-5.14.21-150400.24.21.2.150400.24.7.2.s390x",
            "openSUSE Leap 15.4:kernel-default-base-5.14.21-150400.24.21.2.150400.24.7.2.x86_64",
            "openSUSE Leap 15.4:kernel-default-base-rebuild-5.14.21-150400.24.21.2.150400.24.7.2.aarch64",
            "openSUSE Leap 15.4:kernel-default-base-rebuild-5.14.21-150400.24.21.2.150400.24.7.2.ppc64le",
            "openSUSE Leap 15.4:kernel-default-base-rebuild-5.14.21-150400.24.21.2.150400.24.7.2.s390x",
            "openSUSE Leap 15.4:kernel-default-base-rebuild-5.14.21-150400.24.21.2.150400.24.7.2.x86_64",
            "openSUSE Leap 15.4:kernel-default-devel-5.14.21-150400.24.21.2.aarch64",
            "openSUSE Leap 15.4:kernel-default-devel-5.14.21-150400.24.21.2.ppc64le",
            "openSUSE Leap 15.4:kernel-default-devel-5.14.21-150400.24.21.2.s390x",
            "openSUSE Leap 15.4:kernel-default-devel-5.14.21-150400.24.21.2.x86_64",
            "openSUSE Leap 15.4:kernel-default-extra-5.14.21-150400.24.21.2.aarch64",
            "openSUSE Leap 15.4:kernel-default-extra-5.14.21-150400.24.21.2.ppc64le",
            "openSUSE Leap 15.4:kernel-default-extra-5.14.21-150400.24.21.2.s390x",
            "openSUSE Leap 15.4:kernel-default-extra-5.14.21-150400.24.21.2.x86_64",
            "openSUSE Leap 15.4:kernel-default-livepatch-5.14.21-150400.24.21.2.aarch64",
            "openSUSE Leap 15.4:kernel-default-livepatch-5.14.21-150400.24.21.2.ppc64le",
            "openSUSE Leap 15.4:kernel-default-livepatch-5.14.21-150400.24.21.2.s390x",
            "openSUSE Leap 15.4:kernel-default-livepatch-5.14.21-150400.24.21.2.x86_64",
            "openSUSE Leap 15.4:kernel-default-livepatch-devel-5.14.21-150400.24.21.2.aarch64",
            "openSUSE Leap 15.4:kernel-default-livepatch-devel-5.14.21-150400.24.21.2.ppc64le",
            "openSUSE Leap 15.4:kernel-default-livepatch-devel-5.14.21-150400.24.21.2.s390x",
            "openSUSE Leap 15.4:kernel-default-livepatch-devel-5.14.21-150400.24.21.2.x86_64",
            "openSUSE Leap 15.4:kernel-default-optional-5.14.21-150400.24.21.2.aarch64",
            "openSUSE Leap 15.4:kernel-default-optional-5.14.21-150400.24.21.2.ppc64le",
            "openSUSE Leap 15.4:kernel-default-optional-5.14.21-150400.24.21.2.s390x",
            "openSUSE Leap 15.4:kernel-default-optional-5.14.21-150400.24.21.2.x86_64",
            "openSUSE Leap 15.4:kernel-devel-5.14.21-150400.24.21.2.noarch",
            "openSUSE Leap 15.4:kernel-docs-5.14.21-150400.24.21.3.noarch",
            "openSUSE Leap 15.4:kernel-docs-html-5.14.21-150400.24.21.3.noarch",
            "openSUSE Leap 15.4:kernel-kvmsmall-5.14.21-150400.24.21.2.aarch64",
            "openSUSE Leap 15.4:kernel-kvmsmall-5.14.21-150400.24.21.2.ppc64le",
            "openSUSE Leap 15.4:kernel-kvmsmall-5.14.21-150400.24.21.2.x86_64",
            "openSUSE Leap 15.4:kernel-kvmsmall-devel-5.14.21-150400.24.21.2.aarch64",
            "openSUSE Leap 15.4:kernel-kvmsmall-devel-5.14.21-150400.24.21.2.ppc64le",
            "openSUSE Leap 15.4:kernel-kvmsmall-devel-5.14.21-150400.24.21.2.x86_64",
            "openSUSE Leap 15.4:kernel-kvmsmall-livepatch-devel-5.14.21-150400.24.21.2.aarch64",
            "openSUSE Leap 15.4:kernel-kvmsmall-livepatch-devel-5.14.21-150400.24.21.2.ppc64le",
            "openSUSE Leap 15.4:kernel-kvmsmall-livepatch-devel-5.14.21-150400.24.21.2.x86_64",
            "openSUSE Leap 15.4:kernel-macros-5.14.21-150400.24.21.2.noarch",
            "openSUSE Leap 15.4:kernel-obs-build-5.14.21-150400.24.21.2.aarch64",
            "openSUSE Leap 15.4:kernel-obs-build-5.14.21-150400.24.21.2.ppc64le",
            "openSUSE Leap 15.4:kernel-obs-build-5.14.21-150400.24.21.2.s390x",
            "openSUSE Leap 15.4:kernel-obs-build-5.14.21-150400.24.21.2.x86_64",
            "openSUSE Leap 15.4:kernel-obs-qa-5.14.21-150400.24.21.1.aarch64",
            "openSUSE Leap 15.4:kernel-obs-qa-5.14.21-150400.24.21.1.ppc64le",
            "openSUSE Leap 15.4:kernel-obs-qa-5.14.21-150400.24.21.1.s390x",
            "openSUSE Leap 15.4:kernel-obs-qa-5.14.21-150400.24.21.1.x86_64",
            "openSUSE Leap 15.4:kernel-source-5.14.21-150400.24.21.2.noarch",
            "openSUSE Leap 15.4:kernel-source-vanilla-5.14.21-150400.24.21.2.noarch",
            "openSUSE Leap 15.4:kernel-syms-5.14.21-150400.24.21.1.aarch64",
            "openSUSE Leap 15.4:kernel-syms-5.14.21-150400.24.21.1.ppc64le",
            "openSUSE Leap 15.4:kernel-syms-5.14.21-150400.24.21.1.s390x",
            "openSUSE Leap 15.4:kernel-syms-5.14.21-150400.24.21.1.x86_64",
            "openSUSE Leap 15.4:kernel-zfcpdump-5.14.21-150400.24.21.2.s390x",
            "openSUSE Leap 15.4:kselftests-kmp-64kb-5.14.21-150400.24.21.2.aarch64",
            "openSUSE Leap 15.4:kselftests-kmp-default-5.14.21-150400.24.21.2.aarch64",
            "openSUSE Leap 15.4:kselftests-kmp-default-5.14.21-150400.24.21.2.ppc64le",
            "openSUSE Leap 15.4:kselftests-kmp-default-5.14.21-150400.24.21.2.s390x",
            "openSUSE Leap 15.4:kselftests-kmp-default-5.14.21-150400.24.21.2.x86_64",
            "openSUSE Leap 15.4:ocfs2-kmp-64kb-5.14.21-150400.24.21.2.aarch64",
            "openSUSE Leap 15.4:ocfs2-kmp-default-5.14.21-150400.24.21.2.aarch64",
            "openSUSE Leap 15.4:ocfs2-kmp-default-5.14.21-150400.24.21.2.ppc64le",
            "openSUSE Leap 15.4:ocfs2-kmp-default-5.14.21-150400.24.21.2.s390x",
            "openSUSE Leap 15.4:ocfs2-kmp-default-5.14.21-150400.24.21.2.x86_64",
            "openSUSE Leap 15.4:reiserfs-kmp-64kb-5.14.21-150400.24.21.2.aarch64",
            "openSUSE Leap 15.4:reiserfs-kmp-default-5.14.21-150400.24.21.2.aarch64",
            "openSUSE Leap 15.4:reiserfs-kmp-default-5.14.21-150400.24.21.2.ppc64le",
            "openSUSE Leap 15.4:reiserfs-kmp-default-5.14.21-150400.24.21.2.s390x",
            "openSUSE Leap 15.4:reiserfs-kmp-default-5.14.21-150400.24.21.2.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 6.7,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H",
            "version": "3.1"
          },
          "products": [
            "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.21.2.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.21.2.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.21.2.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.21.2.x86_64",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.21.2.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.21.2.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.21.2.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.21.2.x86_64",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.21.2.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.21.2.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.21.2.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.21.2.x86_64",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.21.2.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.21.2.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.21.2.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.21.2.x86_64",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.21.2.ppc64le",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.21.2.s390x",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.21.2.x86_64",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.21.2.ppc64le",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.21.2.s390x",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.21.2.x86_64",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_21-default-1-150400.9.3.2.ppc64le",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_21-default-1-150400.9.3.2.s390x",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_21-default-1-150400.9.3.2.x86_64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-64kb-5.14.21-150400.24.21.2.aarch64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-64kb-devel-5.14.21-150400.24.21.2.aarch64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-5.14.21-150400.24.21.2.aarch64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-5.14.21-150400.24.21.2.ppc64le",
            "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-5.14.21-150400.24.21.2.s390x",
            "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-5.14.21-150400.24.21.2.x86_64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-base-5.14.21-150400.24.21.2.150400.24.7.2.aarch64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-base-5.14.21-150400.24.21.2.150400.24.7.2.ppc64le",
            "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-base-5.14.21-150400.24.21.2.150400.24.7.2.s390x",
            "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-base-5.14.21-150400.24.21.2.150400.24.7.2.x86_64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-devel-5.14.21-150400.24.21.2.aarch64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-devel-5.14.21-150400.24.21.2.ppc64le",
            "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-devel-5.14.21-150400.24.21.2.s390x",
            "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-devel-5.14.21-150400.24.21.2.x86_64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-devel-5.14.21-150400.24.21.2.noarch",
            "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-macros-5.14.21-150400.24.21.2.noarch",
            "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-zfcpdump-5.14.21-150400.24.21.2.s390x",
            "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-docs-5.14.21-150400.24.21.3.noarch",
            "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-obs-build-5.14.21-150400.24.21.2.aarch64",
            "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-obs-build-5.14.21-150400.24.21.2.ppc64le",
            "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-obs-build-5.14.21-150400.24.21.2.s390x",
            "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-obs-build-5.14.21-150400.24.21.2.x86_64",
            "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-source-5.14.21-150400.24.21.2.noarch",
            "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-syms-5.14.21-150400.24.21.1.aarch64",
            "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-syms-5.14.21-150400.24.21.1.ppc64le",
            "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-syms-5.14.21-150400.24.21.1.s390x",
            "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-syms-5.14.21-150400.24.21.1.x86_64",
            "SUSE Linux Enterprise Module for Legacy 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.21.2.aarch64",
            "SUSE Linux Enterprise Module for Legacy 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.21.2.ppc64le",
            "SUSE Linux Enterprise Module for Legacy 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.21.2.s390x",
            "SUSE Linux Enterprise Module for Legacy 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.21.2.x86_64",
            "SUSE Linux Enterprise Workstation Extension 15 SP4:kernel-default-extra-5.14.21-150400.24.21.2.x86_64",
            "openSUSE Leap 15.4:cluster-md-kmp-64kb-5.14.21-150400.24.21.2.aarch64",
            "openSUSE Leap 15.4:cluster-md-kmp-default-5.14.21-150400.24.21.2.aarch64",
            "openSUSE Leap 15.4:cluster-md-kmp-default-5.14.21-150400.24.21.2.ppc64le",
            "openSUSE Leap 15.4:cluster-md-kmp-default-5.14.21-150400.24.21.2.s390x",
            "openSUSE Leap 15.4:cluster-md-kmp-default-5.14.21-150400.24.21.2.x86_64",
            "openSUSE Leap 15.4:dlm-kmp-64kb-5.14.21-150400.24.21.2.aarch64",
            "openSUSE Leap 15.4:dlm-kmp-default-5.14.21-150400.24.21.2.aarch64",
            "openSUSE Leap 15.4:dlm-kmp-default-5.14.21-150400.24.21.2.ppc64le",
            "openSUSE Leap 15.4:dlm-kmp-default-5.14.21-150400.24.21.2.s390x",
            "openSUSE Leap 15.4:dlm-kmp-default-5.14.21-150400.24.21.2.x86_64",
            "openSUSE Leap 15.4:dtb-allwinner-5.14.21-150400.24.21.1.aarch64",
            "openSUSE Leap 15.4:dtb-altera-5.14.21-150400.24.21.1.aarch64",
            "openSUSE Leap 15.4:dtb-amazon-5.14.21-150400.24.21.1.aarch64",
            "openSUSE Leap 15.4:dtb-amd-5.14.21-150400.24.21.1.aarch64",
            "openSUSE Leap 15.4:dtb-amlogic-5.14.21-150400.24.21.1.aarch64",
            "openSUSE Leap 15.4:dtb-apm-5.14.21-150400.24.21.1.aarch64",
            "openSUSE Leap 15.4:dtb-apple-5.14.21-150400.24.21.1.aarch64",
            "openSUSE Leap 15.4:dtb-arm-5.14.21-150400.24.21.1.aarch64",
            "openSUSE Leap 15.4:dtb-broadcom-5.14.21-150400.24.21.1.aarch64",
            "openSUSE Leap 15.4:dtb-cavium-5.14.21-150400.24.21.1.aarch64",
            "openSUSE Leap 15.4:dtb-exynos-5.14.21-150400.24.21.1.aarch64",
            "openSUSE Leap 15.4:dtb-freescale-5.14.21-150400.24.21.1.aarch64",
            "openSUSE Leap 15.4:dtb-hisilicon-5.14.21-150400.24.21.1.aarch64",
            "openSUSE Leap 15.4:dtb-lg-5.14.21-150400.24.21.1.aarch64",
            "openSUSE Leap 15.4:dtb-marvell-5.14.21-150400.24.21.1.aarch64",
            "openSUSE Leap 15.4:dtb-mediatek-5.14.21-150400.24.21.1.aarch64",
            "openSUSE Leap 15.4:dtb-nvidia-5.14.21-150400.24.21.1.aarch64",
            "openSUSE Leap 15.4:dtb-qcom-5.14.21-150400.24.21.1.aarch64",
            "openSUSE Leap 15.4:dtb-renesas-5.14.21-150400.24.21.1.aarch64",
            "openSUSE Leap 15.4:dtb-rockchip-5.14.21-150400.24.21.1.aarch64",
            "openSUSE Leap 15.4:dtb-socionext-5.14.21-150400.24.21.1.aarch64",
            "openSUSE Leap 15.4:dtb-sprd-5.14.21-150400.24.21.1.aarch64",
            "openSUSE Leap 15.4:dtb-xilinx-5.14.21-150400.24.21.1.aarch64",
            "openSUSE Leap 15.4:gfs2-kmp-64kb-5.14.21-150400.24.21.2.aarch64",
            "openSUSE Leap 15.4:gfs2-kmp-default-5.14.21-150400.24.21.2.aarch64",
            "openSUSE Leap 15.4:gfs2-kmp-default-5.14.21-150400.24.21.2.ppc64le",
            "openSUSE Leap 15.4:gfs2-kmp-default-5.14.21-150400.24.21.2.s390x",
            "openSUSE Leap 15.4:gfs2-kmp-default-5.14.21-150400.24.21.2.x86_64",
            "openSUSE Leap 15.4:kernel-64kb-5.14.21-150400.24.21.2.aarch64",
            "openSUSE Leap 15.4:kernel-64kb-devel-5.14.21-150400.24.21.2.aarch64",
            "openSUSE Leap 15.4:kernel-64kb-extra-5.14.21-150400.24.21.2.aarch64",
            "openSUSE Leap 15.4:kernel-64kb-livepatch-devel-5.14.21-150400.24.21.2.aarch64",
            "openSUSE Leap 15.4:kernel-64kb-optional-5.14.21-150400.24.21.2.aarch64",
            "openSUSE Leap 15.4:kernel-debug-5.14.21-150400.24.21.2.ppc64le",
            "openSUSE Leap 15.4:kernel-debug-5.14.21-150400.24.21.2.x86_64",
            "openSUSE Leap 15.4:kernel-debug-devel-5.14.21-150400.24.21.2.ppc64le",
            "openSUSE Leap 15.4:kernel-debug-devel-5.14.21-150400.24.21.2.x86_64",
            "openSUSE Leap 15.4:kernel-debug-livepatch-devel-5.14.21-150400.24.21.2.ppc64le",
            "openSUSE Leap 15.4:kernel-debug-livepatch-devel-5.14.21-150400.24.21.2.x86_64",
            "openSUSE Leap 15.4:kernel-default-5.14.21-150400.24.21.2.aarch64",
            "openSUSE Leap 15.4:kernel-default-5.14.21-150400.24.21.2.ppc64le",
            "openSUSE Leap 15.4:kernel-default-5.14.21-150400.24.21.2.s390x",
            "openSUSE Leap 15.4:kernel-default-5.14.21-150400.24.21.2.x86_64",
            "openSUSE Leap 15.4:kernel-default-base-5.14.21-150400.24.21.2.150400.24.7.2.aarch64",
            "openSUSE Leap 15.4:kernel-default-base-5.14.21-150400.24.21.2.150400.24.7.2.ppc64le",
            "openSUSE Leap 15.4:kernel-default-base-5.14.21-150400.24.21.2.150400.24.7.2.s390x",
            "openSUSE Leap 15.4:kernel-default-base-5.14.21-150400.24.21.2.150400.24.7.2.x86_64",
            "openSUSE Leap 15.4:kernel-default-base-rebuild-5.14.21-150400.24.21.2.150400.24.7.2.aarch64",
            "openSUSE Leap 15.4:kernel-default-base-rebuild-5.14.21-150400.24.21.2.150400.24.7.2.ppc64le",
            "openSUSE Leap 15.4:kernel-default-base-rebuild-5.14.21-150400.24.21.2.150400.24.7.2.s390x",
            "openSUSE Leap 15.4:kernel-default-base-rebuild-5.14.21-150400.24.21.2.150400.24.7.2.x86_64",
            "openSUSE Leap 15.4:kernel-default-devel-5.14.21-150400.24.21.2.aarch64",
            "openSUSE Leap 15.4:kernel-default-devel-5.14.21-150400.24.21.2.ppc64le",
            "openSUSE Leap 15.4:kernel-default-devel-5.14.21-150400.24.21.2.s390x",
            "openSUSE Leap 15.4:kernel-default-devel-5.14.21-150400.24.21.2.x86_64",
            "openSUSE Leap 15.4:kernel-default-extra-5.14.21-150400.24.21.2.aarch64",
            "openSUSE Leap 15.4:kernel-default-extra-5.14.21-150400.24.21.2.ppc64le",
            "openSUSE Leap 15.4:kernel-default-extra-5.14.21-150400.24.21.2.s390x",
            "openSUSE Leap 15.4:kernel-default-extra-5.14.21-150400.24.21.2.x86_64",
            "openSUSE Leap 15.4:kernel-default-livepatch-5.14.21-150400.24.21.2.aarch64",
            "openSUSE Leap 15.4:kernel-default-livepatch-5.14.21-150400.24.21.2.ppc64le",
            "openSUSE Leap 15.4:kernel-default-livepatch-5.14.21-150400.24.21.2.s390x",
            "openSUSE Leap 15.4:kernel-default-livepatch-5.14.21-150400.24.21.2.x86_64",
            "openSUSE Leap 15.4:kernel-default-livepatch-devel-5.14.21-150400.24.21.2.aarch64",
            "openSUSE Leap 15.4:kernel-default-livepatch-devel-5.14.21-150400.24.21.2.ppc64le",
            "openSUSE Leap 15.4:kernel-default-livepatch-devel-5.14.21-150400.24.21.2.s390x",
            "openSUSE Leap 15.4:kernel-default-livepatch-devel-5.14.21-150400.24.21.2.x86_64",
            "openSUSE Leap 15.4:kernel-default-optional-5.14.21-150400.24.21.2.aarch64",
            "openSUSE Leap 15.4:kernel-default-optional-5.14.21-150400.24.21.2.ppc64le",
            "openSUSE Leap 15.4:kernel-default-optional-5.14.21-150400.24.21.2.s390x",
            "openSUSE Leap 15.4:kernel-default-optional-5.14.21-150400.24.21.2.x86_64",
            "openSUSE Leap 15.4:kernel-devel-5.14.21-150400.24.21.2.noarch",
            "openSUSE Leap 15.4:kernel-docs-5.14.21-150400.24.21.3.noarch",
            "openSUSE Leap 15.4:kernel-docs-html-5.14.21-150400.24.21.3.noarch",
            "openSUSE Leap 15.4:kernel-kvmsmall-5.14.21-150400.24.21.2.aarch64",
            "openSUSE Leap 15.4:kernel-kvmsmall-5.14.21-150400.24.21.2.ppc64le",
            "openSUSE Leap 15.4:kernel-kvmsmall-5.14.21-150400.24.21.2.x86_64",
            "openSUSE Leap 15.4:kernel-kvmsmall-devel-5.14.21-150400.24.21.2.aarch64",
            "openSUSE Leap 15.4:kernel-kvmsmall-devel-5.14.21-150400.24.21.2.ppc64le",
            "openSUSE Leap 15.4:kernel-kvmsmall-devel-5.14.21-150400.24.21.2.x86_64",
            "openSUSE Leap 15.4:kernel-kvmsmall-livepatch-devel-5.14.21-150400.24.21.2.aarch64",
            "openSUSE Leap 15.4:kernel-kvmsmall-livepatch-devel-5.14.21-150400.24.21.2.ppc64le",
            "openSUSE Leap 15.4:kernel-kvmsmall-livepatch-devel-5.14.21-150400.24.21.2.x86_64",
            "openSUSE Leap 15.4:kernel-macros-5.14.21-150400.24.21.2.noarch",
            "openSUSE Leap 15.4:kernel-obs-build-5.14.21-150400.24.21.2.aarch64",
            "openSUSE Leap 15.4:kernel-obs-build-5.14.21-150400.24.21.2.ppc64le",
            "openSUSE Leap 15.4:kernel-obs-build-5.14.21-150400.24.21.2.s390x",
            "openSUSE Leap 15.4:kernel-obs-build-5.14.21-150400.24.21.2.x86_64",
            "openSUSE Leap 15.4:kernel-obs-qa-5.14.21-150400.24.21.1.aarch64",
            "openSUSE Leap 15.4:kernel-obs-qa-5.14.21-150400.24.21.1.ppc64le",
            "openSUSE Leap 15.4:kernel-obs-qa-5.14.21-150400.24.21.1.s390x",
            "openSUSE Leap 15.4:kernel-obs-qa-5.14.21-150400.24.21.1.x86_64",
            "openSUSE Leap 15.4:kernel-source-5.14.21-150400.24.21.2.noarch",
            "openSUSE Leap 15.4:kernel-source-vanilla-5.14.21-150400.24.21.2.noarch",
            "openSUSE Leap 15.4:kernel-syms-5.14.21-150400.24.21.1.aarch64",
            "openSUSE Leap 15.4:kernel-syms-5.14.21-150400.24.21.1.ppc64le",
            "openSUSE Leap 15.4:kernel-syms-5.14.21-150400.24.21.1.s390x",
            "openSUSE Leap 15.4:kernel-syms-5.14.21-150400.24.21.1.x86_64",
            "openSUSE Leap 15.4:kernel-zfcpdump-5.14.21-150400.24.21.2.s390x",
            "openSUSE Leap 15.4:kselftests-kmp-64kb-5.14.21-150400.24.21.2.aarch64",
            "openSUSE Leap 15.4:kselftests-kmp-default-5.14.21-150400.24.21.2.aarch64",
            "openSUSE Leap 15.4:kselftests-kmp-default-5.14.21-150400.24.21.2.ppc64le",
            "openSUSE Leap 15.4:kselftests-kmp-default-5.14.21-150400.24.21.2.s390x",
            "openSUSE Leap 15.4:kselftests-kmp-default-5.14.21-150400.24.21.2.x86_64",
            "openSUSE Leap 15.4:ocfs2-kmp-64kb-5.14.21-150400.24.21.2.aarch64",
            "openSUSE Leap 15.4:ocfs2-kmp-default-5.14.21-150400.24.21.2.aarch64",
            "openSUSE Leap 15.4:ocfs2-kmp-default-5.14.21-150400.24.21.2.ppc64le",
            "openSUSE Leap 15.4:ocfs2-kmp-default-5.14.21-150400.24.21.2.s390x",
            "openSUSE Leap 15.4:ocfs2-kmp-default-5.14.21-150400.24.21.2.x86_64",
            "openSUSE Leap 15.4:reiserfs-kmp-64kb-5.14.21-150400.24.21.2.aarch64",
            "openSUSE Leap 15.4:reiserfs-kmp-default-5.14.21-150400.24.21.2.aarch64",
            "openSUSE Leap 15.4:reiserfs-kmp-default-5.14.21-150400.24.21.2.ppc64le",
            "openSUSE Leap 15.4:reiserfs-kmp-default-5.14.21-150400.24.21.2.s390x",
            "openSUSE Leap 15.4:reiserfs-kmp-default-5.14.21-150400.24.21.2.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2022-09-16T15:30:19Z",
          "details": "moderate"
        }
      ],
      "title": "CVE-2022-3028"
    },
    {
      "cve": "CVE-2022-3078",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2022-3078"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "An issue was discovered in the Linux kernel through 5.16-rc6. There is a lack of check after calling vzalloc() and lack of free after allocation in drivers/media/test-drivers/vidtv/vidtv_s302m.c.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.21.2.aarch64",
          "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.21.2.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.21.2.s390x",
          "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.21.2.x86_64",
          "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.21.2.aarch64",
          "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.21.2.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.21.2.s390x",
          "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.21.2.x86_64",
          "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.21.2.aarch64",
          "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.21.2.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.21.2.s390x",
          "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.21.2.x86_64",
          "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.21.2.aarch64",
          "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.21.2.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.21.2.s390x",
          "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.21.2.x86_64",
          "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.21.2.ppc64le",
          "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.21.2.s390x",
          "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.21.2.x86_64",
          "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.21.2.ppc64le",
          "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.21.2.s390x",
          "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.21.2.x86_64",
          "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_21-default-1-150400.9.3.2.ppc64le",
          "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_21-default-1-150400.9.3.2.s390x",
          "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_21-default-1-150400.9.3.2.x86_64",
          "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-64kb-5.14.21-150400.24.21.2.aarch64",
          "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-64kb-devel-5.14.21-150400.24.21.2.aarch64",
          "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-5.14.21-150400.24.21.2.aarch64",
          "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-5.14.21-150400.24.21.2.ppc64le",
          "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-5.14.21-150400.24.21.2.s390x",
          "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-5.14.21-150400.24.21.2.x86_64",
          "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-base-5.14.21-150400.24.21.2.150400.24.7.2.aarch64",
          "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-base-5.14.21-150400.24.21.2.150400.24.7.2.ppc64le",
          "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-base-5.14.21-150400.24.21.2.150400.24.7.2.s390x",
          "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-base-5.14.21-150400.24.21.2.150400.24.7.2.x86_64",
          "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-devel-5.14.21-150400.24.21.2.aarch64",
          "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-devel-5.14.21-150400.24.21.2.ppc64le",
          "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-devel-5.14.21-150400.24.21.2.s390x",
          "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-devel-5.14.21-150400.24.21.2.x86_64",
          "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-devel-5.14.21-150400.24.21.2.noarch",
          "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-macros-5.14.21-150400.24.21.2.noarch",
          "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-zfcpdump-5.14.21-150400.24.21.2.s390x",
          "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-docs-5.14.21-150400.24.21.3.noarch",
          "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-obs-build-5.14.21-150400.24.21.2.aarch64",
          "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-obs-build-5.14.21-150400.24.21.2.ppc64le",
          "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-obs-build-5.14.21-150400.24.21.2.s390x",
          "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-obs-build-5.14.21-150400.24.21.2.x86_64",
          "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-source-5.14.21-150400.24.21.2.noarch",
          "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-syms-5.14.21-150400.24.21.1.aarch64",
          "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-syms-5.14.21-150400.24.21.1.ppc64le",
          "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-syms-5.14.21-150400.24.21.1.s390x",
          "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-syms-5.14.21-150400.24.21.1.x86_64",
          "SUSE Linux Enterprise Module for Legacy 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.21.2.aarch64",
          "SUSE Linux Enterprise Module for Legacy 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.21.2.ppc64le",
          "SUSE Linux Enterprise Module for Legacy 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.21.2.s390x",
          "SUSE Linux Enterprise Module for Legacy 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.21.2.x86_64",
          "SUSE Linux Enterprise Workstation Extension 15 SP4:kernel-default-extra-5.14.21-150400.24.21.2.x86_64",
          "openSUSE Leap 15.4:cluster-md-kmp-64kb-5.14.21-150400.24.21.2.aarch64",
          "openSUSE Leap 15.4:cluster-md-kmp-default-5.14.21-150400.24.21.2.aarch64",
          "openSUSE Leap 15.4:cluster-md-kmp-default-5.14.21-150400.24.21.2.ppc64le",
          "openSUSE Leap 15.4:cluster-md-kmp-default-5.14.21-150400.24.21.2.s390x",
          "openSUSE Leap 15.4:cluster-md-kmp-default-5.14.21-150400.24.21.2.x86_64",
          "openSUSE Leap 15.4:dlm-kmp-64kb-5.14.21-150400.24.21.2.aarch64",
          "openSUSE Leap 15.4:dlm-kmp-default-5.14.21-150400.24.21.2.aarch64",
          "openSUSE Leap 15.4:dlm-kmp-default-5.14.21-150400.24.21.2.ppc64le",
          "openSUSE Leap 15.4:dlm-kmp-default-5.14.21-150400.24.21.2.s390x",
          "openSUSE Leap 15.4:dlm-kmp-default-5.14.21-150400.24.21.2.x86_64",
          "openSUSE Leap 15.4:dtb-allwinner-5.14.21-150400.24.21.1.aarch64",
          "openSUSE Leap 15.4:dtb-altera-5.14.21-150400.24.21.1.aarch64",
          "openSUSE Leap 15.4:dtb-amazon-5.14.21-150400.24.21.1.aarch64",
          "openSUSE Leap 15.4:dtb-amd-5.14.21-150400.24.21.1.aarch64",
          "openSUSE Leap 15.4:dtb-amlogic-5.14.21-150400.24.21.1.aarch64",
          "openSUSE Leap 15.4:dtb-apm-5.14.21-150400.24.21.1.aarch64",
          "openSUSE Leap 15.4:dtb-apple-5.14.21-150400.24.21.1.aarch64",
          "openSUSE Leap 15.4:dtb-arm-5.14.21-150400.24.21.1.aarch64",
          "openSUSE Leap 15.4:dtb-broadcom-5.14.21-150400.24.21.1.aarch64",
          "openSUSE Leap 15.4:dtb-cavium-5.14.21-150400.24.21.1.aarch64",
          "openSUSE Leap 15.4:dtb-exynos-5.14.21-150400.24.21.1.aarch64",
          "openSUSE Leap 15.4:dtb-freescale-5.14.21-150400.24.21.1.aarch64",
          "openSUSE Leap 15.4:dtb-hisilicon-5.14.21-150400.24.21.1.aarch64",
          "openSUSE Leap 15.4:dtb-lg-5.14.21-150400.24.21.1.aarch64",
          "openSUSE Leap 15.4:dtb-marvell-5.14.21-150400.24.21.1.aarch64",
          "openSUSE Leap 15.4:dtb-mediatek-5.14.21-150400.24.21.1.aarch64",
          "openSUSE Leap 15.4:dtb-nvidia-5.14.21-150400.24.21.1.aarch64",
          "openSUSE Leap 15.4:dtb-qcom-5.14.21-150400.24.21.1.aarch64",
          "openSUSE Leap 15.4:dtb-renesas-5.14.21-150400.24.21.1.aarch64",
          "openSUSE Leap 15.4:dtb-rockchip-5.14.21-150400.24.21.1.aarch64",
          "openSUSE Leap 15.4:dtb-socionext-5.14.21-150400.24.21.1.aarch64",
          "openSUSE Leap 15.4:dtb-sprd-5.14.21-150400.24.21.1.aarch64",
          "openSUSE Leap 15.4:dtb-xilinx-5.14.21-150400.24.21.1.aarch64",
          "openSUSE Leap 15.4:gfs2-kmp-64kb-5.14.21-150400.24.21.2.aarch64",
          "openSUSE Leap 15.4:gfs2-kmp-default-5.14.21-150400.24.21.2.aarch64",
          "openSUSE Leap 15.4:gfs2-kmp-default-5.14.21-150400.24.21.2.ppc64le",
          "openSUSE Leap 15.4:gfs2-kmp-default-5.14.21-150400.24.21.2.s390x",
          "openSUSE Leap 15.4:gfs2-kmp-default-5.14.21-150400.24.21.2.x86_64",
          "openSUSE Leap 15.4:kernel-64kb-5.14.21-150400.24.21.2.aarch64",
          "openSUSE Leap 15.4:kernel-64kb-devel-5.14.21-150400.24.21.2.aarch64",
          "openSUSE Leap 15.4:kernel-64kb-extra-5.14.21-150400.24.21.2.aarch64",
          "openSUSE Leap 15.4:kernel-64kb-livepatch-devel-5.14.21-150400.24.21.2.aarch64",
          "openSUSE Leap 15.4:kernel-64kb-optional-5.14.21-150400.24.21.2.aarch64",
          "openSUSE Leap 15.4:kernel-debug-5.14.21-150400.24.21.2.ppc64le",
          "openSUSE Leap 15.4:kernel-debug-5.14.21-150400.24.21.2.x86_64",
          "openSUSE Leap 15.4:kernel-debug-devel-5.14.21-150400.24.21.2.ppc64le",
          "openSUSE Leap 15.4:kernel-debug-devel-5.14.21-150400.24.21.2.x86_64",
          "openSUSE Leap 15.4:kernel-debug-livepatch-devel-5.14.21-150400.24.21.2.ppc64le",
          "openSUSE Leap 15.4:kernel-debug-livepatch-devel-5.14.21-150400.24.21.2.x86_64",
          "openSUSE Leap 15.4:kernel-default-5.14.21-150400.24.21.2.aarch64",
          "openSUSE Leap 15.4:kernel-default-5.14.21-150400.24.21.2.ppc64le",
          "openSUSE Leap 15.4:kernel-default-5.14.21-150400.24.21.2.s390x",
          "openSUSE Leap 15.4:kernel-default-5.14.21-150400.24.21.2.x86_64",
          "openSUSE Leap 15.4:kernel-default-base-5.14.21-150400.24.21.2.150400.24.7.2.aarch64",
          "openSUSE Leap 15.4:kernel-default-base-5.14.21-150400.24.21.2.150400.24.7.2.ppc64le",
          "openSUSE Leap 15.4:kernel-default-base-5.14.21-150400.24.21.2.150400.24.7.2.s390x",
          "openSUSE Leap 15.4:kernel-default-base-5.14.21-150400.24.21.2.150400.24.7.2.x86_64",
          "openSUSE Leap 15.4:kernel-default-base-rebuild-5.14.21-150400.24.21.2.150400.24.7.2.aarch64",
          "openSUSE Leap 15.4:kernel-default-base-rebuild-5.14.21-150400.24.21.2.150400.24.7.2.ppc64le",
          "openSUSE Leap 15.4:kernel-default-base-rebuild-5.14.21-150400.24.21.2.150400.24.7.2.s390x",
          "openSUSE Leap 15.4:kernel-default-base-rebuild-5.14.21-150400.24.21.2.150400.24.7.2.x86_64",
          "openSUSE Leap 15.4:kernel-default-devel-5.14.21-150400.24.21.2.aarch64",
          "openSUSE Leap 15.4:kernel-default-devel-5.14.21-150400.24.21.2.ppc64le",
          "openSUSE Leap 15.4:kernel-default-devel-5.14.21-150400.24.21.2.s390x",
          "openSUSE Leap 15.4:kernel-default-devel-5.14.21-150400.24.21.2.x86_64",
          "openSUSE Leap 15.4:kernel-default-extra-5.14.21-150400.24.21.2.aarch64",
          "openSUSE Leap 15.4:kernel-default-extra-5.14.21-150400.24.21.2.ppc64le",
          "openSUSE Leap 15.4:kernel-default-extra-5.14.21-150400.24.21.2.s390x",
          "openSUSE Leap 15.4:kernel-default-extra-5.14.21-150400.24.21.2.x86_64",
          "openSUSE Leap 15.4:kernel-default-livepatch-5.14.21-150400.24.21.2.aarch64",
          "openSUSE Leap 15.4:kernel-default-livepatch-5.14.21-150400.24.21.2.ppc64le",
          "openSUSE Leap 15.4:kernel-default-livepatch-5.14.21-150400.24.21.2.s390x",
          "openSUSE Leap 15.4:kernel-default-livepatch-5.14.21-150400.24.21.2.x86_64",
          "openSUSE Leap 15.4:kernel-default-livepatch-devel-5.14.21-150400.24.21.2.aarch64",
          "openSUSE Leap 15.4:kernel-default-livepatch-devel-5.14.21-150400.24.21.2.ppc64le",
          "openSUSE Leap 15.4:kernel-default-livepatch-devel-5.14.21-150400.24.21.2.s390x",
          "openSUSE Leap 15.4:kernel-default-livepatch-devel-5.14.21-150400.24.21.2.x86_64",
          "openSUSE Leap 15.4:kernel-default-optional-5.14.21-150400.24.21.2.aarch64",
          "openSUSE Leap 15.4:kernel-default-optional-5.14.21-150400.24.21.2.ppc64le",
          "openSUSE Leap 15.4:kernel-default-optional-5.14.21-150400.24.21.2.s390x",
          "openSUSE Leap 15.4:kernel-default-optional-5.14.21-150400.24.21.2.x86_64",
          "openSUSE Leap 15.4:kernel-devel-5.14.21-150400.24.21.2.noarch",
          "openSUSE Leap 15.4:kernel-docs-5.14.21-150400.24.21.3.noarch",
          "openSUSE Leap 15.4:kernel-docs-html-5.14.21-150400.24.21.3.noarch",
          "openSUSE Leap 15.4:kernel-kvmsmall-5.14.21-150400.24.21.2.aarch64",
          "openSUSE Leap 15.4:kernel-kvmsmall-5.14.21-150400.24.21.2.ppc64le",
          "openSUSE Leap 15.4:kernel-kvmsmall-5.14.21-150400.24.21.2.x86_64",
          "openSUSE Leap 15.4:kernel-kvmsmall-devel-5.14.21-150400.24.21.2.aarch64",
          "openSUSE Leap 15.4:kernel-kvmsmall-devel-5.14.21-150400.24.21.2.ppc64le",
          "openSUSE Leap 15.4:kernel-kvmsmall-devel-5.14.21-150400.24.21.2.x86_64",
          "openSUSE Leap 15.4:kernel-kvmsmall-livepatch-devel-5.14.21-150400.24.21.2.aarch64",
          "openSUSE Leap 15.4:kernel-kvmsmall-livepatch-devel-5.14.21-150400.24.21.2.ppc64le",
          "openSUSE Leap 15.4:kernel-kvmsmall-livepatch-devel-5.14.21-150400.24.21.2.x86_64",
          "openSUSE Leap 15.4:kernel-macros-5.14.21-150400.24.21.2.noarch",
          "openSUSE Leap 15.4:kernel-obs-build-5.14.21-150400.24.21.2.aarch64",
          "openSUSE Leap 15.4:kernel-obs-build-5.14.21-150400.24.21.2.ppc64le",
          "openSUSE Leap 15.4:kernel-obs-build-5.14.21-150400.24.21.2.s390x",
          "openSUSE Leap 15.4:kernel-obs-build-5.14.21-150400.24.21.2.x86_64",
          "openSUSE Leap 15.4:kernel-obs-qa-5.14.21-150400.24.21.1.aarch64",
          "openSUSE Leap 15.4:kernel-obs-qa-5.14.21-150400.24.21.1.ppc64le",
          "openSUSE Leap 15.4:kernel-obs-qa-5.14.21-150400.24.21.1.s390x",
          "openSUSE Leap 15.4:kernel-obs-qa-5.14.21-150400.24.21.1.x86_64",
          "openSUSE Leap 15.4:kernel-source-5.14.21-150400.24.21.2.noarch",
          "openSUSE Leap 15.4:kernel-source-vanilla-5.14.21-150400.24.21.2.noarch",
          "openSUSE Leap 15.4:kernel-syms-5.14.21-150400.24.21.1.aarch64",
          "openSUSE Leap 15.4:kernel-syms-5.14.21-150400.24.21.1.ppc64le",
          "openSUSE Leap 15.4:kernel-syms-5.14.21-150400.24.21.1.s390x",
          "openSUSE Leap 15.4:kernel-syms-5.14.21-150400.24.21.1.x86_64",
          "openSUSE Leap 15.4:kernel-zfcpdump-5.14.21-150400.24.21.2.s390x",
          "openSUSE Leap 15.4:kselftests-kmp-64kb-5.14.21-150400.24.21.2.aarch64",
          "openSUSE Leap 15.4:kselftests-kmp-default-5.14.21-150400.24.21.2.aarch64",
          "openSUSE Leap 15.4:kselftests-kmp-default-5.14.21-150400.24.21.2.ppc64le",
          "openSUSE Leap 15.4:kselftests-kmp-default-5.14.21-150400.24.21.2.s390x",
          "openSUSE Leap 15.4:kselftests-kmp-default-5.14.21-150400.24.21.2.x86_64",
          "openSUSE Leap 15.4:ocfs2-kmp-64kb-5.14.21-150400.24.21.2.aarch64",
          "openSUSE Leap 15.4:ocfs2-kmp-default-5.14.21-150400.24.21.2.aarch64",
          "openSUSE Leap 15.4:ocfs2-kmp-default-5.14.21-150400.24.21.2.ppc64le",
          "openSUSE Leap 15.4:ocfs2-kmp-default-5.14.21-150400.24.21.2.s390x",
          "openSUSE Leap 15.4:ocfs2-kmp-default-5.14.21-150400.24.21.2.x86_64",
          "openSUSE Leap 15.4:reiserfs-kmp-64kb-5.14.21-150400.24.21.2.aarch64",
          "openSUSE Leap 15.4:reiserfs-kmp-default-5.14.21-150400.24.21.2.aarch64",
          "openSUSE Leap 15.4:reiserfs-kmp-default-5.14.21-150400.24.21.2.ppc64le",
          "openSUSE Leap 15.4:reiserfs-kmp-default-5.14.21-150400.24.21.2.s390x",
          "openSUSE Leap 15.4:reiserfs-kmp-default-5.14.21-150400.24.21.2.x86_64"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2022-3078",
          "url": "https://www.suse.com/security/cve/CVE-2022-3078"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1203041 for CVE-2022-3078",
          "url": "https://bugzilla.suse.com/1203041"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.21.2.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.21.2.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.21.2.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.21.2.x86_64",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.21.2.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.21.2.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.21.2.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.21.2.x86_64",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.21.2.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.21.2.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.21.2.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.21.2.x86_64",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.21.2.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.21.2.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.21.2.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.21.2.x86_64",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.21.2.ppc64le",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.21.2.s390x",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.21.2.x86_64",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.21.2.ppc64le",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.21.2.s390x",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.21.2.x86_64",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_21-default-1-150400.9.3.2.ppc64le",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_21-default-1-150400.9.3.2.s390x",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_21-default-1-150400.9.3.2.x86_64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-64kb-5.14.21-150400.24.21.2.aarch64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-64kb-devel-5.14.21-150400.24.21.2.aarch64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-5.14.21-150400.24.21.2.aarch64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-5.14.21-150400.24.21.2.ppc64le",
            "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-5.14.21-150400.24.21.2.s390x",
            "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-5.14.21-150400.24.21.2.x86_64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-base-5.14.21-150400.24.21.2.150400.24.7.2.aarch64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-base-5.14.21-150400.24.21.2.150400.24.7.2.ppc64le",
            "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-base-5.14.21-150400.24.21.2.150400.24.7.2.s390x",
            "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-base-5.14.21-150400.24.21.2.150400.24.7.2.x86_64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-devel-5.14.21-150400.24.21.2.aarch64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-devel-5.14.21-150400.24.21.2.ppc64le",
            "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-devel-5.14.21-150400.24.21.2.s390x",
            "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-devel-5.14.21-150400.24.21.2.x86_64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-devel-5.14.21-150400.24.21.2.noarch",
            "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-macros-5.14.21-150400.24.21.2.noarch",
            "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-zfcpdump-5.14.21-150400.24.21.2.s390x",
            "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-docs-5.14.21-150400.24.21.3.noarch",
            "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-obs-build-5.14.21-150400.24.21.2.aarch64",
            "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-obs-build-5.14.21-150400.24.21.2.ppc64le",
            "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-obs-build-5.14.21-150400.24.21.2.s390x",
            "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-obs-build-5.14.21-150400.24.21.2.x86_64",
            "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-source-5.14.21-150400.24.21.2.noarch",
            "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-syms-5.14.21-150400.24.21.1.aarch64",
            "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-syms-5.14.21-150400.24.21.1.ppc64le",
            "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-syms-5.14.21-150400.24.21.1.s390x",
            "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-syms-5.14.21-150400.24.21.1.x86_64",
            "SUSE Linux Enterprise Module for Legacy 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.21.2.aarch64",
            "SUSE Linux Enterprise Module for Legacy 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.21.2.ppc64le",
            "SUSE Linux Enterprise Module for Legacy 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.21.2.s390x",
            "SUSE Linux Enterprise Module for Legacy 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.21.2.x86_64",
            "SUSE Linux Enterprise Workstation Extension 15 SP4:kernel-default-extra-5.14.21-150400.24.21.2.x86_64",
            "openSUSE Leap 15.4:cluster-md-kmp-64kb-5.14.21-150400.24.21.2.aarch64",
            "openSUSE Leap 15.4:cluster-md-kmp-default-5.14.21-150400.24.21.2.aarch64",
            "openSUSE Leap 15.4:cluster-md-kmp-default-5.14.21-150400.24.21.2.ppc64le",
            "openSUSE Leap 15.4:cluster-md-kmp-default-5.14.21-150400.24.21.2.s390x",
            "openSUSE Leap 15.4:cluster-md-kmp-default-5.14.21-150400.24.21.2.x86_64",
            "openSUSE Leap 15.4:dlm-kmp-64kb-5.14.21-150400.24.21.2.aarch64",
            "openSUSE Leap 15.4:dlm-kmp-default-5.14.21-150400.24.21.2.aarch64",
            "openSUSE Leap 15.4:dlm-kmp-default-5.14.21-150400.24.21.2.ppc64le",
            "openSUSE Leap 15.4:dlm-kmp-default-5.14.21-150400.24.21.2.s390x",
            "openSUSE Leap 15.4:dlm-kmp-default-5.14.21-150400.24.21.2.x86_64",
            "openSUSE Leap 15.4:dtb-allwinner-5.14.21-150400.24.21.1.aarch64",
            "openSUSE Leap 15.4:dtb-altera-5.14.21-150400.24.21.1.aarch64",
            "openSUSE Leap 15.4:dtb-amazon-5.14.21-150400.24.21.1.aarch64",
            "openSUSE Leap 15.4:dtb-amd-5.14.21-150400.24.21.1.aarch64",
            "openSUSE Leap 15.4:dtb-amlogic-5.14.21-150400.24.21.1.aarch64",
            "openSUSE Leap 15.4:dtb-apm-5.14.21-150400.24.21.1.aarch64",
            "openSUSE Leap 15.4:dtb-apple-5.14.21-150400.24.21.1.aarch64",
            "openSUSE Leap 15.4:dtb-arm-5.14.21-150400.24.21.1.aarch64",
            "openSUSE Leap 15.4:dtb-broadcom-5.14.21-150400.24.21.1.aarch64",
            "openSUSE Leap 15.4:dtb-cavium-5.14.21-150400.24.21.1.aarch64",
            "openSUSE Leap 15.4:dtb-exynos-5.14.21-150400.24.21.1.aarch64",
            "openSUSE Leap 15.4:dtb-freescale-5.14.21-150400.24.21.1.aarch64",
            "openSUSE Leap 15.4:dtb-hisilicon-5.14.21-150400.24.21.1.aarch64",
            "openSUSE Leap 15.4:dtb-lg-5.14.21-150400.24.21.1.aarch64",
            "openSUSE Leap 15.4:dtb-marvell-5.14.21-150400.24.21.1.aarch64",
            "openSUSE Leap 15.4:dtb-mediatek-5.14.21-150400.24.21.1.aarch64",
            "openSUSE Leap 15.4:dtb-nvidia-5.14.21-150400.24.21.1.aarch64",
            "openSUSE Leap 15.4:dtb-qcom-5.14.21-150400.24.21.1.aarch64",
            "openSUSE Leap 15.4:dtb-renesas-5.14.21-150400.24.21.1.aarch64",
            "openSUSE Leap 15.4:dtb-rockchip-5.14.21-150400.24.21.1.aarch64",
            "openSUSE Leap 15.4:dtb-socionext-5.14.21-150400.24.21.1.aarch64",
            "openSUSE Leap 15.4:dtb-sprd-5.14.21-150400.24.21.1.aarch64",
            "openSUSE Leap 15.4:dtb-xilinx-5.14.21-150400.24.21.1.aarch64",
            "openSUSE Leap 15.4:gfs2-kmp-64kb-5.14.21-150400.24.21.2.aarch64",
            "openSUSE Leap 15.4:gfs2-kmp-default-5.14.21-150400.24.21.2.aarch64",
            "openSUSE Leap 15.4:gfs2-kmp-default-5.14.21-150400.24.21.2.ppc64le",
            "openSUSE Leap 15.4:gfs2-kmp-default-5.14.21-150400.24.21.2.s390x",
            "openSUSE Leap 15.4:gfs2-kmp-default-5.14.21-150400.24.21.2.x86_64",
            "openSUSE Leap 15.4:kernel-64kb-5.14.21-150400.24.21.2.aarch64",
            "openSUSE Leap 15.4:kernel-64kb-devel-5.14.21-150400.24.21.2.aarch64",
            "openSUSE Leap 15.4:kernel-64kb-extra-5.14.21-150400.24.21.2.aarch64",
            "openSUSE Leap 15.4:kernel-64kb-livepatch-devel-5.14.21-150400.24.21.2.aarch64",
            "openSUSE Leap 15.4:kernel-64kb-optional-5.14.21-150400.24.21.2.aarch64",
            "openSUSE Leap 15.4:kernel-debug-5.14.21-150400.24.21.2.ppc64le",
            "openSUSE Leap 15.4:kernel-debug-5.14.21-150400.24.21.2.x86_64",
            "openSUSE Leap 15.4:kernel-debug-devel-5.14.21-150400.24.21.2.ppc64le",
            "openSUSE Leap 15.4:kernel-debug-devel-5.14.21-150400.24.21.2.x86_64",
            "openSUSE Leap 15.4:kernel-debug-livepatch-devel-5.14.21-150400.24.21.2.ppc64le",
            "openSUSE Leap 15.4:kernel-debug-livepatch-devel-5.14.21-150400.24.21.2.x86_64",
            "openSUSE Leap 15.4:kernel-default-5.14.21-150400.24.21.2.aarch64",
            "openSUSE Leap 15.4:kernel-default-5.14.21-150400.24.21.2.ppc64le",
            "openSUSE Leap 15.4:kernel-default-5.14.21-150400.24.21.2.s390x",
            "openSUSE Leap 15.4:kernel-default-5.14.21-150400.24.21.2.x86_64",
            "openSUSE Leap 15.4:kernel-default-base-5.14.21-150400.24.21.2.150400.24.7.2.aarch64",
            "openSUSE Leap 15.4:kernel-default-base-5.14.21-150400.24.21.2.150400.24.7.2.ppc64le",
            "openSUSE Leap 15.4:kernel-default-base-5.14.21-150400.24.21.2.150400.24.7.2.s390x",
            "openSUSE Leap 15.4:kernel-default-base-5.14.21-150400.24.21.2.150400.24.7.2.x86_64",
            "openSUSE Leap 15.4:kernel-default-base-rebuild-5.14.21-150400.24.21.2.150400.24.7.2.aarch64",
            "openSUSE Leap 15.4:kernel-default-base-rebuild-5.14.21-150400.24.21.2.150400.24.7.2.ppc64le",
            "openSUSE Leap 15.4:kernel-default-base-rebuild-5.14.21-150400.24.21.2.150400.24.7.2.s390x",
            "openSUSE Leap 15.4:kernel-default-base-rebuild-5.14.21-150400.24.21.2.150400.24.7.2.x86_64",
            "openSUSE Leap 15.4:kernel-default-devel-5.14.21-150400.24.21.2.aarch64",
            "openSUSE Leap 15.4:kernel-default-devel-5.14.21-150400.24.21.2.ppc64le",
            "openSUSE Leap 15.4:kernel-default-devel-5.14.21-150400.24.21.2.s390x",
            "openSUSE Leap 15.4:kernel-default-devel-5.14.21-150400.24.21.2.x86_64",
            "openSUSE Leap 15.4:kernel-default-extra-5.14.21-150400.24.21.2.aarch64",
            "openSUSE Leap 15.4:kernel-default-extra-5.14.21-150400.24.21.2.ppc64le",
            "openSUSE Leap 15.4:kernel-default-extra-5.14.21-150400.24.21.2.s390x",
            "openSUSE Leap 15.4:kernel-default-extra-5.14.21-150400.24.21.2.x86_64",
            "openSUSE Leap 15.4:kernel-default-livepatch-5.14.21-150400.24.21.2.aarch64",
            "openSUSE Leap 15.4:kernel-default-livepatch-5.14.21-150400.24.21.2.ppc64le",
            "openSUSE Leap 15.4:kernel-default-livepatch-5.14.21-150400.24.21.2.s390x",
            "openSUSE Leap 15.4:kernel-default-livepatch-5.14.21-150400.24.21.2.x86_64",
            "openSUSE Leap 15.4:kernel-default-livepatch-devel-5.14.21-150400.24.21.2.aarch64",
            "openSUSE Leap 15.4:kernel-default-livepatch-devel-5.14.21-150400.24.21.2.ppc64le",
            "openSUSE Leap 15.4:kernel-default-livepatch-devel-5.14.21-150400.24.21.2.s390x",
            "openSUSE Leap 15.4:kernel-default-livepatch-devel-5.14.21-150400.24.21.2.x86_64",
            "openSUSE Leap 15.4:kernel-default-optional-5.14.21-150400.24.21.2.aarch64",
            "openSUSE Leap 15.4:kernel-default-optional-5.14.21-150400.24.21.2.ppc64le",
            "openSUSE Leap 15.4:kernel-default-optional-5.14.21-150400.24.21.2.s390x",
            "openSUSE Leap 15.4:kernel-default-optional-5.14.21-150400.24.21.2.x86_64",
            "openSUSE Leap 15.4:kernel-devel-5.14.21-150400.24.21.2.noarch",
            "openSUSE Leap 15.4:kernel-docs-5.14.21-150400.24.21.3.noarch",
            "openSUSE Leap 15.4:kernel-docs-html-5.14.21-150400.24.21.3.noarch",
            "openSUSE Leap 15.4:kernel-kvmsmall-5.14.21-150400.24.21.2.aarch64",
            "openSUSE Leap 15.4:kernel-kvmsmall-5.14.21-150400.24.21.2.ppc64le",
            "openSUSE Leap 15.4:kernel-kvmsmall-5.14.21-150400.24.21.2.x86_64",
            "openSUSE Leap 15.4:kernel-kvmsmall-devel-5.14.21-150400.24.21.2.aarch64",
            "openSUSE Leap 15.4:kernel-kvmsmall-devel-5.14.21-150400.24.21.2.ppc64le",
            "openSUSE Leap 15.4:kernel-kvmsmall-devel-5.14.21-150400.24.21.2.x86_64",
            "openSUSE Leap 15.4:kernel-kvmsmall-livepatch-devel-5.14.21-150400.24.21.2.aarch64",
            "openSUSE Leap 15.4:kernel-kvmsmall-livepatch-devel-5.14.21-150400.24.21.2.ppc64le",
            "openSUSE Leap 15.4:kernel-kvmsmall-livepatch-devel-5.14.21-150400.24.21.2.x86_64",
            "openSUSE Leap 15.4:kernel-macros-5.14.21-150400.24.21.2.noarch",
            "openSUSE Leap 15.4:kernel-obs-build-5.14.21-150400.24.21.2.aarch64",
            "openSUSE Leap 15.4:kernel-obs-build-5.14.21-150400.24.21.2.ppc64le",
            "openSUSE Leap 15.4:kernel-obs-build-5.14.21-150400.24.21.2.s390x",
            "openSUSE Leap 15.4:kernel-obs-build-5.14.21-150400.24.21.2.x86_64",
            "openSUSE Leap 15.4:kernel-obs-qa-5.14.21-150400.24.21.1.aarch64",
            "openSUSE Leap 15.4:kernel-obs-qa-5.14.21-150400.24.21.1.ppc64le",
            "openSUSE Leap 15.4:kernel-obs-qa-5.14.21-150400.24.21.1.s390x",
            "openSUSE Leap 15.4:kernel-obs-qa-5.14.21-150400.24.21.1.x86_64",
            "openSUSE Leap 15.4:kernel-source-5.14.21-150400.24.21.2.noarch",
            "openSUSE Leap 15.4:kernel-source-vanilla-5.14.21-150400.24.21.2.noarch",
            "openSUSE Leap 15.4:kernel-syms-5.14.21-150400.24.21.1.aarch64",
            "openSUSE Leap 15.4:kernel-syms-5.14.21-150400.24.21.1.ppc64le",
            "openSUSE Leap 15.4:kernel-syms-5.14.21-150400.24.21.1.s390x",
            "openSUSE Leap 15.4:kernel-syms-5.14.21-150400.24.21.1.x86_64",
            "openSUSE Leap 15.4:kernel-zfcpdump-5.14.21-150400.24.21.2.s390x",
            "openSUSE Leap 15.4:kselftests-kmp-64kb-5.14.21-150400.24.21.2.aarch64",
            "openSUSE Leap 15.4:kselftests-kmp-default-5.14.21-150400.24.21.2.aarch64",
            "openSUSE Leap 15.4:kselftests-kmp-default-5.14.21-150400.24.21.2.ppc64le",
            "openSUSE Leap 15.4:kselftests-kmp-default-5.14.21-150400.24.21.2.s390x",
            "openSUSE Leap 15.4:kselftests-kmp-default-5.14.21-150400.24.21.2.x86_64",
            "openSUSE Leap 15.4:ocfs2-kmp-64kb-5.14.21-150400.24.21.2.aarch64",
            "openSUSE Leap 15.4:ocfs2-kmp-default-5.14.21-150400.24.21.2.aarch64",
            "openSUSE Leap 15.4:ocfs2-kmp-default-5.14.21-150400.24.21.2.ppc64le",
            "openSUSE Leap 15.4:ocfs2-kmp-default-5.14.21-150400.24.21.2.s390x",
            "openSUSE Leap 15.4:ocfs2-kmp-default-5.14.21-150400.24.21.2.x86_64",
            "openSUSE Leap 15.4:reiserfs-kmp-64kb-5.14.21-150400.24.21.2.aarch64",
            "openSUSE Leap 15.4:reiserfs-kmp-default-5.14.21-150400.24.21.2.aarch64",
            "openSUSE Leap 15.4:reiserfs-kmp-default-5.14.21-150400.24.21.2.ppc64le",
            "openSUSE Leap 15.4:reiserfs-kmp-default-5.14.21-150400.24.21.2.s390x",
            "openSUSE Leap 15.4:reiserfs-kmp-default-5.14.21-150400.24.21.2.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 4,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L",
            "version": "3.1"
          },
          "products": [
            "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.21.2.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.21.2.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.21.2.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.21.2.x86_64",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.21.2.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.21.2.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.21.2.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.21.2.x86_64",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.21.2.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.21.2.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.21.2.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.21.2.x86_64",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.21.2.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.21.2.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.21.2.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.21.2.x86_64",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.21.2.ppc64le",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.21.2.s390x",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.21.2.x86_64",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.21.2.ppc64le",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.21.2.s390x",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.21.2.x86_64",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_21-default-1-150400.9.3.2.ppc64le",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_21-default-1-150400.9.3.2.s390x",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_21-default-1-150400.9.3.2.x86_64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-64kb-5.14.21-150400.24.21.2.aarch64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-64kb-devel-5.14.21-150400.24.21.2.aarch64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-5.14.21-150400.24.21.2.aarch64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-5.14.21-150400.24.21.2.ppc64le",
            "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-5.14.21-150400.24.21.2.s390x",
            "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-5.14.21-150400.24.21.2.x86_64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-base-5.14.21-150400.24.21.2.150400.24.7.2.aarch64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-base-5.14.21-150400.24.21.2.150400.24.7.2.ppc64le",
            "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-base-5.14.21-150400.24.21.2.150400.24.7.2.s390x",
            "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-base-5.14.21-150400.24.21.2.150400.24.7.2.x86_64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-devel-5.14.21-150400.24.21.2.aarch64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-devel-5.14.21-150400.24.21.2.ppc64le",
            "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-devel-5.14.21-150400.24.21.2.s390x",
            "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-devel-5.14.21-150400.24.21.2.x86_64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-devel-5.14.21-150400.24.21.2.noarch",
            "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-macros-5.14.21-150400.24.21.2.noarch",
            "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-zfcpdump-5.14.21-150400.24.21.2.s390x",
            "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-docs-5.14.21-150400.24.21.3.noarch",
            "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-obs-build-5.14.21-150400.24.21.2.aarch64",
            "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-obs-build-5.14.21-150400.24.21.2.ppc64le",
            "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-obs-build-5.14.21-150400.24.21.2.s390x",
            "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-obs-build-5.14.21-150400.24.21.2.x86_64",
            "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-source-5.14.21-150400.24.21.2.noarch",
            "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-syms-5.14.21-150400.24.21.1.aarch64",
            "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-syms-5.14.21-150400.24.21.1.ppc64le",
            "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-syms-5.14.21-150400.24.21.1.s390x",
            "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-syms-5.14.21-150400.24.21.1.x86_64",
            "SUSE Linux Enterprise Module for Legacy 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.21.2.aarch64",
            "SUSE Linux Enterprise Module for Legacy 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.21.2.ppc64le",
            "SUSE Linux Enterprise Module for Legacy 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.21.2.s390x",
            "SUSE Linux Enterprise Module for Legacy 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.21.2.x86_64",
            "SUSE Linux Enterprise Workstation Extension 15 SP4:kernel-default-extra-5.14.21-150400.24.21.2.x86_64",
            "openSUSE Leap 15.4:cluster-md-kmp-64kb-5.14.21-150400.24.21.2.aarch64",
            "openSUSE Leap 15.4:cluster-md-kmp-default-5.14.21-150400.24.21.2.aarch64",
            "openSUSE Leap 15.4:cluster-md-kmp-default-5.14.21-150400.24.21.2.ppc64le",
            "openSUSE Leap 15.4:cluster-md-kmp-default-5.14.21-150400.24.21.2.s390x",
            "openSUSE Leap 15.4:cluster-md-kmp-default-5.14.21-150400.24.21.2.x86_64",
            "openSUSE Leap 15.4:dlm-kmp-64kb-5.14.21-150400.24.21.2.aarch64",
            "openSUSE Leap 15.4:dlm-kmp-default-5.14.21-150400.24.21.2.aarch64",
            "openSUSE Leap 15.4:dlm-kmp-default-5.14.21-150400.24.21.2.ppc64le",
            "openSUSE Leap 15.4:dlm-kmp-default-5.14.21-150400.24.21.2.s390x",
            "openSUSE Leap 15.4:dlm-kmp-default-5.14.21-150400.24.21.2.x86_64",
            "openSUSE Leap 15.4:dtb-allwinner-5.14.21-150400.24.21.1.aarch64",
            "openSUSE Leap 15.4:dtb-altera-5.14.21-150400.24.21.1.aarch64",
            "openSUSE Leap 15.4:dtb-amazon-5.14.21-150400.24.21.1.aarch64",
            "openSUSE Leap 15.4:dtb-amd-5.14.21-150400.24.21.1.aarch64",
            "openSUSE Leap 15.4:dtb-amlogic-5.14.21-150400.24.21.1.aarch64",
            "openSUSE Leap 15.4:dtb-apm-5.14.21-150400.24.21.1.aarch64",
            "openSUSE Leap 15.4:dtb-apple-5.14.21-150400.24.21.1.aarch64",
            "openSUSE Leap 15.4:dtb-arm-5.14.21-150400.24.21.1.aarch64",
            "openSUSE Leap 15.4:dtb-broadcom-5.14.21-150400.24.21.1.aarch64",
            "openSUSE Leap 15.4:dtb-cavium-5.14.21-150400.24.21.1.aarch64",
            "openSUSE Leap 15.4:dtb-exynos-5.14.21-150400.24.21.1.aarch64",
            "openSUSE Leap 15.4:dtb-freescale-5.14.21-150400.24.21.1.aarch64",
            "openSUSE Leap 15.4:dtb-hisilicon-5.14.21-150400.24.21.1.aarch64",
            "openSUSE Leap 15.4:dtb-lg-5.14.21-150400.24.21.1.aarch64",
            "openSUSE Leap 15.4:dtb-marvell-5.14.21-150400.24.21.1.aarch64",
            "openSUSE Leap 15.4:dtb-mediatek-5.14.21-150400.24.21.1.aarch64",
            "openSUSE Leap 15.4:dtb-nvidia-5.14.21-150400.24.21.1.aarch64",
            "openSUSE Leap 15.4:dtb-qcom-5.14.21-150400.24.21.1.aarch64",
            "openSUSE Leap 15.4:dtb-renesas-5.14.21-150400.24.21.1.aarch64",
            "openSUSE Leap 15.4:dtb-rockchip-5.14.21-150400.24.21.1.aarch64",
            "openSUSE Leap 15.4:dtb-socionext-5.14.21-150400.24.21.1.aarch64",
            "openSUSE Leap 15.4:dtb-sprd-5.14.21-150400.24.21.1.aarch64",
            "openSUSE Leap 15.4:dtb-xilinx-5.14.21-150400.24.21.1.aarch64",
            "openSUSE Leap 15.4:gfs2-kmp-64kb-5.14.21-150400.24.21.2.aarch64",
            "openSUSE Leap 15.4:gfs2-kmp-default-5.14.21-150400.24.21.2.aarch64",
            "openSUSE Leap 15.4:gfs2-kmp-default-5.14.21-150400.24.21.2.ppc64le",
            "openSUSE Leap 15.4:gfs2-kmp-default-5.14.21-150400.24.21.2.s390x",
            "openSUSE Leap 15.4:gfs2-kmp-default-5.14.21-150400.24.21.2.x86_64",
            "openSUSE Leap 15.4:kernel-64kb-5.14.21-150400.24.21.2.aarch64",
            "openSUSE Leap 15.4:kernel-64kb-devel-5.14.21-150400.24.21.2.aarch64",
            "openSUSE Leap 15.4:kernel-64kb-extra-5.14.21-150400.24.21.2.aarch64",
            "openSUSE Leap 15.4:kernel-64kb-livepatch-devel-5.14.21-150400.24.21.2.aarch64",
            "openSUSE Leap 15.4:kernel-64kb-optional-5.14.21-150400.24.21.2.aarch64",
            "openSUSE Leap 15.4:kernel-debug-5.14.21-150400.24.21.2.ppc64le",
            "openSUSE Leap 15.4:kernel-debug-5.14.21-150400.24.21.2.x86_64",
            "openSUSE Leap 15.4:kernel-debug-devel-5.14.21-150400.24.21.2.ppc64le",
            "openSUSE Leap 15.4:kernel-debug-devel-5.14.21-150400.24.21.2.x86_64",
            "openSUSE Leap 15.4:kernel-debug-livepatch-devel-5.14.21-150400.24.21.2.ppc64le",
            "openSUSE Leap 15.4:kernel-debug-livepatch-devel-5.14.21-150400.24.21.2.x86_64",
            "openSUSE Leap 15.4:kernel-default-5.14.21-150400.24.21.2.aarch64",
            "openSUSE Leap 15.4:kernel-default-5.14.21-150400.24.21.2.ppc64le",
            "openSUSE Leap 15.4:kernel-default-5.14.21-150400.24.21.2.s390x",
            "openSUSE Leap 15.4:kernel-default-5.14.21-150400.24.21.2.x86_64",
            "openSUSE Leap 15.4:kernel-default-base-5.14.21-150400.24.21.2.150400.24.7.2.aarch64",
            "openSUSE Leap 15.4:kernel-default-base-5.14.21-150400.24.21.2.150400.24.7.2.ppc64le",
            "openSUSE Leap 15.4:kernel-default-base-5.14.21-150400.24.21.2.150400.24.7.2.s390x",
            "openSUSE Leap 15.4:kernel-default-base-5.14.21-150400.24.21.2.150400.24.7.2.x86_64",
            "openSUSE Leap 15.4:kernel-default-base-rebuild-5.14.21-150400.24.21.2.150400.24.7.2.aarch64",
            "openSUSE Leap 15.4:kernel-default-base-rebuild-5.14.21-150400.24.21.2.150400.24.7.2.ppc64le",
            "openSUSE Leap 15.4:kernel-default-base-rebuild-5.14.21-150400.24.21.2.150400.24.7.2.s390x",
            "openSUSE Leap 15.4:kernel-default-base-rebuild-5.14.21-150400.24.21.2.150400.24.7.2.x86_64",
            "openSUSE Leap 15.4:kernel-default-devel-5.14.21-150400.24.21.2.aarch64",
            "openSUSE Leap 15.4:kernel-default-devel-5.14.21-150400.24.21.2.ppc64le",
            "openSUSE Leap 15.4:kernel-default-devel-5.14.21-150400.24.21.2.s390x",
            "openSUSE Leap 15.4:kernel-default-devel-5.14.21-150400.24.21.2.x86_64",
            "openSUSE Leap 15.4:kernel-default-extra-5.14.21-150400.24.21.2.aarch64",
            "openSUSE Leap 15.4:kernel-default-extra-5.14.21-150400.24.21.2.ppc64le",
            "openSUSE Leap 15.4:kernel-default-extra-5.14.21-150400.24.21.2.s390x",
            "openSUSE Leap 15.4:kernel-default-extra-5.14.21-150400.24.21.2.x86_64",
            "openSUSE Leap 15.4:kernel-default-livepatch-5.14.21-150400.24.21.2.aarch64",
            "openSUSE Leap 15.4:kernel-default-livepatch-5.14.21-150400.24.21.2.ppc64le",
            "openSUSE Leap 15.4:kernel-default-livepatch-5.14.21-150400.24.21.2.s390x",
            "openSUSE Leap 15.4:kernel-default-livepatch-5.14.21-150400.24.21.2.x86_64",
            "openSUSE Leap 15.4:kernel-default-livepatch-devel-5.14.21-150400.24.21.2.aarch64",
            "openSUSE Leap 15.4:kernel-default-livepatch-devel-5.14.21-150400.24.21.2.ppc64le",
            "openSUSE Leap 15.4:kernel-default-livepatch-devel-5.14.21-150400.24.21.2.s390x",
            "openSUSE Leap 15.4:kernel-default-livepatch-devel-5.14.21-150400.24.21.2.x86_64",
            "openSUSE Leap 15.4:kernel-default-optional-5.14.21-150400.24.21.2.aarch64",
            "openSUSE Leap 15.4:kernel-default-optional-5.14.21-150400.24.21.2.ppc64le",
            "openSUSE Leap 15.4:kernel-default-optional-5.14.21-150400.24.21.2.s390x",
            "openSUSE Leap 15.4:kernel-default-optional-5.14.21-150400.24.21.2.x86_64",
            "openSUSE Leap 15.4:kernel-devel-5.14.21-150400.24.21.2.noarch",
            "openSUSE Leap 15.4:kernel-docs-5.14.21-150400.24.21.3.noarch",
            "openSUSE Leap 15.4:kernel-docs-html-5.14.21-150400.24.21.3.noarch",
            "openSUSE Leap 15.4:kernel-kvmsmall-5.14.21-150400.24.21.2.aarch64",
            "openSUSE Leap 15.4:kernel-kvmsmall-5.14.21-150400.24.21.2.ppc64le",
            "openSUSE Leap 15.4:kernel-kvmsmall-5.14.21-150400.24.21.2.x86_64",
            "openSUSE Leap 15.4:kernel-kvmsmall-devel-5.14.21-150400.24.21.2.aarch64",
            "openSUSE Leap 15.4:kernel-kvmsmall-devel-5.14.21-150400.24.21.2.ppc64le",
            "openSUSE Leap 15.4:kernel-kvmsmall-devel-5.14.21-150400.24.21.2.x86_64",
            "openSUSE Leap 15.4:kernel-kvmsmall-livepatch-devel-5.14.21-150400.24.21.2.aarch64",
            "openSUSE Leap 15.4:kernel-kvmsmall-livepatch-devel-5.14.21-150400.24.21.2.ppc64le",
            "openSUSE Leap 15.4:kernel-kvmsmall-livepatch-devel-5.14.21-150400.24.21.2.x86_64",
            "openSUSE Leap 15.4:kernel-macros-5.14.21-150400.24.21.2.noarch",
            "openSUSE Leap 15.4:kernel-obs-build-5.14.21-150400.24.21.2.aarch64",
            "openSUSE Leap 15.4:kernel-obs-build-5.14.21-150400.24.21.2.ppc64le",
            "openSUSE Leap 15.4:kernel-obs-build-5.14.21-150400.24.21.2.s390x",
            "openSUSE Leap 15.4:kernel-obs-build-5.14.21-150400.24.21.2.x86_64",
            "openSUSE Leap 15.4:kernel-obs-qa-5.14.21-150400.24.21.1.aarch64",
            "openSUSE Leap 15.4:kernel-obs-qa-5.14.21-150400.24.21.1.ppc64le",
            "openSUSE Leap 15.4:kernel-obs-qa-5.14.21-150400.24.21.1.s390x",
            "openSUSE Leap 15.4:kernel-obs-qa-5.14.21-150400.24.21.1.x86_64",
            "openSUSE Leap 15.4:kernel-source-5.14.21-150400.24.21.2.noarch",
            "openSUSE Leap 15.4:kernel-source-vanilla-5.14.21-150400.24.21.2.noarch",
            "openSUSE Leap 15.4:kernel-syms-5.14.21-150400.24.21.1.aarch64",
            "openSUSE Leap 15.4:kernel-syms-5.14.21-150400.24.21.1.ppc64le",
            "openSUSE Leap 15.4:kernel-syms-5.14.21-150400.24.21.1.s390x",
            "openSUSE Leap 15.4:kernel-syms-5.14.21-150400.24.21.1.x86_64",
            "openSUSE Leap 15.4:kernel-zfcpdump-5.14.21-150400.24.21.2.s390x",
            "openSUSE Leap 15.4:kselftests-kmp-64kb-5.14.21-150400.24.21.2.aarch64",
            "openSUSE Leap 15.4:kselftests-kmp-default-5.14.21-150400.24.21.2.aarch64",
            "openSUSE Leap 15.4:kselftests-kmp-default-5.14.21-150400.24.21.2.ppc64le",
            "openSUSE Leap 15.4:kselftests-kmp-default-5.14.21-150400.24.21.2.s390x",
            "openSUSE Leap 15.4:kselftests-kmp-default-5.14.21-150400.24.21.2.x86_64",
            "openSUSE Leap 15.4:ocfs2-kmp-64kb-5.14.21-150400.24.21.2.aarch64",
            "openSUSE Leap 15.4:ocfs2-kmp-default-5.14.21-150400.24.21.2.aarch64",
            "openSUSE Leap 15.4:ocfs2-kmp-default-5.14.21-150400.24.21.2.ppc64le",
            "openSUSE Leap 15.4:ocfs2-kmp-default-5.14.21-150400.24.21.2.s390x",
            "openSUSE Leap 15.4:ocfs2-kmp-default-5.14.21-150400.24.21.2.x86_64",
            "openSUSE Leap 15.4:reiserfs-kmp-64kb-5.14.21-150400.24.21.2.aarch64",
            "openSUSE Leap 15.4:reiserfs-kmp-default-5.14.21-150400.24.21.2.aarch64",
            "openSUSE Leap 15.4:reiserfs-kmp-default-5.14.21-150400.24.21.2.ppc64le",
            "openSUSE Leap 15.4:reiserfs-kmp-default-5.14.21-150400.24.21.2.s390x",
            "openSUSE Leap 15.4:reiserfs-kmp-default-5.14.21-150400.24.21.2.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2022-09-16T15:30:19Z",
          "details": "low"
        }
      ],
      "title": "CVE-2022-3078"
    },
    {
      "cve": "CVE-2022-32250",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2022-32250"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "net/netfilter/nf_tables_api.c in the Linux kernel through 5.18.1 allows a local user (able to create user/net namespaces) to escalate privileges to root because an incorrect NFT_STATEFUL_EXPR check leads to a use-after-free.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.21.2.aarch64",
          "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.21.2.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.21.2.s390x",
          "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.21.2.x86_64",
          "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.21.2.aarch64",
          "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.21.2.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.21.2.s390x",
          "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.21.2.x86_64",
          "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.21.2.aarch64",
          "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.21.2.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.21.2.s390x",
          "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.21.2.x86_64",
          "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.21.2.aarch64",
          "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.21.2.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.21.2.s390x",
          "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.21.2.x86_64",
          "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.21.2.ppc64le",
          "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.21.2.s390x",
          "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.21.2.x86_64",
          "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.21.2.ppc64le",
          "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.21.2.s390x",
          "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.21.2.x86_64",
          "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_21-default-1-150400.9.3.2.ppc64le",
          "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_21-default-1-150400.9.3.2.s390x",
          "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_21-default-1-150400.9.3.2.x86_64",
          "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-64kb-5.14.21-150400.24.21.2.aarch64",
          "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-64kb-devel-5.14.21-150400.24.21.2.aarch64",
          "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-5.14.21-150400.24.21.2.aarch64",
          "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-5.14.21-150400.24.21.2.ppc64le",
          "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-5.14.21-150400.24.21.2.s390x",
          "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-5.14.21-150400.24.21.2.x86_64",
          "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-base-5.14.21-150400.24.21.2.150400.24.7.2.aarch64",
          "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-base-5.14.21-150400.24.21.2.150400.24.7.2.ppc64le",
          "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-base-5.14.21-150400.24.21.2.150400.24.7.2.s390x",
          "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-base-5.14.21-150400.24.21.2.150400.24.7.2.x86_64",
          "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-devel-5.14.21-150400.24.21.2.aarch64",
          "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-devel-5.14.21-150400.24.21.2.ppc64le",
          "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-devel-5.14.21-150400.24.21.2.s390x",
          "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-devel-5.14.21-150400.24.21.2.x86_64",
          "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-devel-5.14.21-150400.24.21.2.noarch",
          "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-macros-5.14.21-150400.24.21.2.noarch",
          "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-zfcpdump-5.14.21-150400.24.21.2.s390x",
          "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-docs-5.14.21-150400.24.21.3.noarch",
          "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-obs-build-5.14.21-150400.24.21.2.aarch64",
          "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-obs-build-5.14.21-150400.24.21.2.ppc64le",
          "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-obs-build-5.14.21-150400.24.21.2.s390x",
          "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-obs-build-5.14.21-150400.24.21.2.x86_64",
          "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-source-5.14.21-150400.24.21.2.noarch",
          "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-syms-5.14.21-150400.24.21.1.aarch64",
          "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-syms-5.14.21-150400.24.21.1.ppc64le",
          "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-syms-5.14.21-150400.24.21.1.s390x",
          "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-syms-5.14.21-150400.24.21.1.x86_64",
          "SUSE Linux Enterprise Module for Legacy 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.21.2.aarch64",
          "SUSE Linux Enterprise Module for Legacy 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.21.2.ppc64le",
          "SUSE Linux Enterprise Module for Legacy 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.21.2.s390x",
          "SUSE Linux Enterprise Module for Legacy 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.21.2.x86_64",
          "SUSE Linux Enterprise Workstation Extension 15 SP4:kernel-default-extra-5.14.21-150400.24.21.2.x86_64",
          "openSUSE Leap 15.4:cluster-md-kmp-64kb-5.14.21-150400.24.21.2.aarch64",
          "openSUSE Leap 15.4:cluster-md-kmp-default-5.14.21-150400.24.21.2.aarch64",
          "openSUSE Leap 15.4:cluster-md-kmp-default-5.14.21-150400.24.21.2.ppc64le",
          "openSUSE Leap 15.4:cluster-md-kmp-default-5.14.21-150400.24.21.2.s390x",
          "openSUSE Leap 15.4:cluster-md-kmp-default-5.14.21-150400.24.21.2.x86_64",
          "openSUSE Leap 15.4:dlm-kmp-64kb-5.14.21-150400.24.21.2.aarch64",
          "openSUSE Leap 15.4:dlm-kmp-default-5.14.21-150400.24.21.2.aarch64",
          "openSUSE Leap 15.4:dlm-kmp-default-5.14.21-150400.24.21.2.ppc64le",
          "openSUSE Leap 15.4:dlm-kmp-default-5.14.21-150400.24.21.2.s390x",
          "openSUSE Leap 15.4:dlm-kmp-default-5.14.21-150400.24.21.2.x86_64",
          "openSUSE Leap 15.4:dtb-allwinner-5.14.21-150400.24.21.1.aarch64",
          "openSUSE Leap 15.4:dtb-altera-5.14.21-150400.24.21.1.aarch64",
          "openSUSE Leap 15.4:dtb-amazon-5.14.21-150400.24.21.1.aarch64",
          "openSUSE Leap 15.4:dtb-amd-5.14.21-150400.24.21.1.aarch64",
          "openSUSE Leap 15.4:dtb-amlogic-5.14.21-150400.24.21.1.aarch64",
          "openSUSE Leap 15.4:dtb-apm-5.14.21-150400.24.21.1.aarch64",
          "openSUSE Leap 15.4:dtb-apple-5.14.21-150400.24.21.1.aarch64",
          "openSUSE Leap 15.4:dtb-arm-5.14.21-150400.24.21.1.aarch64",
          "openSUSE Leap 15.4:dtb-broadcom-5.14.21-150400.24.21.1.aarch64",
          "openSUSE Leap 15.4:dtb-cavium-5.14.21-150400.24.21.1.aarch64",
          "openSUSE Leap 15.4:dtb-exynos-5.14.21-150400.24.21.1.aarch64",
          "openSUSE Leap 15.4:dtb-freescale-5.14.21-150400.24.21.1.aarch64",
          "openSUSE Leap 15.4:dtb-hisilicon-5.14.21-150400.24.21.1.aarch64",
          "openSUSE Leap 15.4:dtb-lg-5.14.21-150400.24.21.1.aarch64",
          "openSUSE Leap 15.4:dtb-marvell-5.14.21-150400.24.21.1.aarch64",
          "openSUSE Leap 15.4:dtb-mediatek-5.14.21-150400.24.21.1.aarch64",
          "openSUSE Leap 15.4:dtb-nvidia-5.14.21-150400.24.21.1.aarch64",
          "openSUSE Leap 15.4:dtb-qcom-5.14.21-150400.24.21.1.aarch64",
          "openSUSE Leap 15.4:dtb-renesas-5.14.21-150400.24.21.1.aarch64",
          "openSUSE Leap 15.4:dtb-rockchip-5.14.21-150400.24.21.1.aarch64",
          "openSUSE Leap 15.4:dtb-socionext-5.14.21-150400.24.21.1.aarch64",
          "openSUSE Leap 15.4:dtb-sprd-5.14.21-150400.24.21.1.aarch64",
          "openSUSE Leap 15.4:dtb-xilinx-5.14.21-150400.24.21.1.aarch64",
          "openSUSE Leap 15.4:gfs2-kmp-64kb-5.14.21-150400.24.21.2.aarch64",
          "openSUSE Leap 15.4:gfs2-kmp-default-5.14.21-150400.24.21.2.aarch64",
          "openSUSE Leap 15.4:gfs2-kmp-default-5.14.21-150400.24.21.2.ppc64le",
          "openSUSE Leap 15.4:gfs2-kmp-default-5.14.21-150400.24.21.2.s390x",
          "openSUSE Leap 15.4:gfs2-kmp-default-5.14.21-150400.24.21.2.x86_64",
          "openSUSE Leap 15.4:kernel-64kb-5.14.21-150400.24.21.2.aarch64",
          "openSUSE Leap 15.4:kernel-64kb-devel-5.14.21-150400.24.21.2.aarch64",
          "openSUSE Leap 15.4:kernel-64kb-extra-5.14.21-150400.24.21.2.aarch64",
          "openSUSE Leap 15.4:kernel-64kb-livepatch-devel-5.14.21-150400.24.21.2.aarch64",
          "openSUSE Leap 15.4:kernel-64kb-optional-5.14.21-150400.24.21.2.aarch64",
          "openSUSE Leap 15.4:kernel-debug-5.14.21-150400.24.21.2.ppc64le",
          "openSUSE Leap 15.4:kernel-debug-5.14.21-150400.24.21.2.x86_64",
          "openSUSE Leap 15.4:kernel-debug-devel-5.14.21-150400.24.21.2.ppc64le",
          "openSUSE Leap 15.4:kernel-debug-devel-5.14.21-150400.24.21.2.x86_64",
          "openSUSE Leap 15.4:kernel-debug-livepatch-devel-5.14.21-150400.24.21.2.ppc64le",
          "openSUSE Leap 15.4:kernel-debug-livepatch-devel-5.14.21-150400.24.21.2.x86_64",
          "openSUSE Leap 15.4:kernel-default-5.14.21-150400.24.21.2.aarch64",
          "openSUSE Leap 15.4:kernel-default-5.14.21-150400.24.21.2.ppc64le",
          "openSUSE Leap 15.4:kernel-default-5.14.21-150400.24.21.2.s390x",
          "openSUSE Leap 15.4:kernel-default-5.14.21-150400.24.21.2.x86_64",
          "openSUSE Leap 15.4:kernel-default-base-5.14.21-150400.24.21.2.150400.24.7.2.aarch64",
          "openSUSE Leap 15.4:kernel-default-base-5.14.21-150400.24.21.2.150400.24.7.2.ppc64le",
          "openSUSE Leap 15.4:kernel-default-base-5.14.21-150400.24.21.2.150400.24.7.2.s390x",
          "openSUSE Leap 15.4:kernel-default-base-5.14.21-150400.24.21.2.150400.24.7.2.x86_64",
          "openSUSE Leap 15.4:kernel-default-base-rebuild-5.14.21-150400.24.21.2.150400.24.7.2.aarch64",
          "openSUSE Leap 15.4:kernel-default-base-rebuild-5.14.21-150400.24.21.2.150400.24.7.2.ppc64le",
          "openSUSE Leap 15.4:kernel-default-base-rebuild-5.14.21-150400.24.21.2.150400.24.7.2.s390x",
          "openSUSE Leap 15.4:kernel-default-base-rebuild-5.14.21-150400.24.21.2.150400.24.7.2.x86_64",
          "openSUSE Leap 15.4:kernel-default-devel-5.14.21-150400.24.21.2.aarch64",
          "openSUSE Leap 15.4:kernel-default-devel-5.14.21-150400.24.21.2.ppc64le",
          "openSUSE Leap 15.4:kernel-default-devel-5.14.21-150400.24.21.2.s390x",
          "openSUSE Leap 15.4:kernel-default-devel-5.14.21-150400.24.21.2.x86_64",
          "openSUSE Leap 15.4:kernel-default-extra-5.14.21-150400.24.21.2.aarch64",
          "openSUSE Leap 15.4:kernel-default-extra-5.14.21-150400.24.21.2.ppc64le",
          "openSUSE Leap 15.4:kernel-default-extra-5.14.21-150400.24.21.2.s390x",
          "openSUSE Leap 15.4:kernel-default-extra-5.14.21-150400.24.21.2.x86_64",
          "openSUSE Leap 15.4:kernel-default-livepatch-5.14.21-150400.24.21.2.aarch64",
          "openSUSE Leap 15.4:kernel-default-livepatch-5.14.21-150400.24.21.2.ppc64le",
          "openSUSE Leap 15.4:kernel-default-livepatch-5.14.21-150400.24.21.2.s390x",
          "openSUSE Leap 15.4:kernel-default-livepatch-5.14.21-150400.24.21.2.x86_64",
          "openSUSE Leap 15.4:kernel-default-livepatch-devel-5.14.21-150400.24.21.2.aarch64",
          "openSUSE Leap 15.4:kernel-default-livepatch-devel-5.14.21-150400.24.21.2.ppc64le",
          "openSUSE Leap 15.4:kernel-default-livepatch-devel-5.14.21-150400.24.21.2.s390x",
          "openSUSE Leap 15.4:kernel-default-livepatch-devel-5.14.21-150400.24.21.2.x86_64",
          "openSUSE Leap 15.4:kernel-default-optional-5.14.21-150400.24.21.2.aarch64",
          "openSUSE Leap 15.4:kernel-default-optional-5.14.21-150400.24.21.2.ppc64le",
          "openSUSE Leap 15.4:kernel-default-optional-5.14.21-150400.24.21.2.s390x",
          "openSUSE Leap 15.4:kernel-default-optional-5.14.21-150400.24.21.2.x86_64",
          "openSUSE Leap 15.4:kernel-devel-5.14.21-150400.24.21.2.noarch",
          "openSUSE Leap 15.4:kernel-docs-5.14.21-150400.24.21.3.noarch",
          "openSUSE Leap 15.4:kernel-docs-html-5.14.21-150400.24.21.3.noarch",
          "openSUSE Leap 15.4:kernel-kvmsmall-5.14.21-150400.24.21.2.aarch64",
          "openSUSE Leap 15.4:kernel-kvmsmall-5.14.21-150400.24.21.2.ppc64le",
          "openSUSE Leap 15.4:kernel-kvmsmall-5.14.21-150400.24.21.2.x86_64",
          "openSUSE Leap 15.4:kernel-kvmsmall-devel-5.14.21-150400.24.21.2.aarch64",
          "openSUSE Leap 15.4:kernel-kvmsmall-devel-5.14.21-150400.24.21.2.ppc64le",
          "openSUSE Leap 15.4:kernel-kvmsmall-devel-5.14.21-150400.24.21.2.x86_64",
          "openSUSE Leap 15.4:kernel-kvmsmall-livepatch-devel-5.14.21-150400.24.21.2.aarch64",
          "openSUSE Leap 15.4:kernel-kvmsmall-livepatch-devel-5.14.21-150400.24.21.2.ppc64le",
          "openSUSE Leap 15.4:kernel-kvmsmall-livepatch-devel-5.14.21-150400.24.21.2.x86_64",
          "openSUSE Leap 15.4:kernel-macros-5.14.21-150400.24.21.2.noarch",
          "openSUSE Leap 15.4:kernel-obs-build-5.14.21-150400.24.21.2.aarch64",
          "openSUSE Leap 15.4:kernel-obs-build-5.14.21-150400.24.21.2.ppc64le",
          "openSUSE Leap 15.4:kernel-obs-build-5.14.21-150400.24.21.2.s390x",
          "openSUSE Leap 15.4:kernel-obs-build-5.14.21-150400.24.21.2.x86_64",
          "openSUSE Leap 15.4:kernel-obs-qa-5.14.21-150400.24.21.1.aarch64",
          "openSUSE Leap 15.4:kernel-obs-qa-5.14.21-150400.24.21.1.ppc64le",
          "openSUSE Leap 15.4:kernel-obs-qa-5.14.21-150400.24.21.1.s390x",
          "openSUSE Leap 15.4:kernel-obs-qa-5.14.21-150400.24.21.1.x86_64",
          "openSUSE Leap 15.4:kernel-source-5.14.21-150400.24.21.2.noarch",
          "openSUSE Leap 15.4:kernel-source-vanilla-5.14.21-150400.24.21.2.noarch",
          "openSUSE Leap 15.4:kernel-syms-5.14.21-150400.24.21.1.aarch64",
          "openSUSE Leap 15.4:kernel-syms-5.14.21-150400.24.21.1.ppc64le",
          "openSUSE Leap 15.4:kernel-syms-5.14.21-150400.24.21.1.s390x",
          "openSUSE Leap 15.4:kernel-syms-5.14.21-150400.24.21.1.x86_64",
          "openSUSE Leap 15.4:kernel-zfcpdump-5.14.21-150400.24.21.2.s390x",
          "openSUSE Leap 15.4:kselftests-kmp-64kb-5.14.21-150400.24.21.2.aarch64",
          "openSUSE Leap 15.4:kselftests-kmp-default-5.14.21-150400.24.21.2.aarch64",
          "openSUSE Leap 15.4:kselftests-kmp-default-5.14.21-150400.24.21.2.ppc64le",
          "openSUSE Leap 15.4:kselftests-kmp-default-5.14.21-150400.24.21.2.s390x",
          "openSUSE Leap 15.4:kselftests-kmp-default-5.14.21-150400.24.21.2.x86_64",
          "openSUSE Leap 15.4:ocfs2-kmp-64kb-5.14.21-150400.24.21.2.aarch64",
          "openSUSE Leap 15.4:ocfs2-kmp-default-5.14.21-150400.24.21.2.aarch64",
          "openSUSE Leap 15.4:ocfs2-kmp-default-5.14.21-150400.24.21.2.ppc64le",
          "openSUSE Leap 15.4:ocfs2-kmp-default-5.14.21-150400.24.21.2.s390x",
          "openSUSE Leap 15.4:ocfs2-kmp-default-5.14.21-150400.24.21.2.x86_64",
          "openSUSE Leap 15.4:reiserfs-kmp-64kb-5.14.21-150400.24.21.2.aarch64",
          "openSUSE Leap 15.4:reiserfs-kmp-default-5.14.21-150400.24.21.2.aarch64",
          "openSUSE Leap 15.4:reiserfs-kmp-default-5.14.21-150400.24.21.2.ppc64le",
          "openSUSE Leap 15.4:reiserfs-kmp-default-5.14.21-150400.24.21.2.s390x",
          "openSUSE Leap 15.4:reiserfs-kmp-default-5.14.21-150400.24.21.2.x86_64"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2022-32250",
          "url": "https://www.suse.com/security/cve/CVE-2022-32250"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1200015 for CVE-2022-32250",
          "url": "https://bugzilla.suse.com/1200015"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1200268 for CVE-2022-32250",
          "url": "https://bugzilla.suse.com/1200268"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1200494 for CVE-2022-32250",
          "url": "https://bugzilla.suse.com/1200494"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1202992 for CVE-2022-32250",
          "url": "https://bugzilla.suse.com/1202992"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1202993 for CVE-2022-32250",
          "url": "https://bugzilla.suse.com/1202993"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1203002 for CVE-2022-32250",
          "url": "https://bugzilla.suse.com/1203002"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.21.2.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.21.2.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.21.2.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.21.2.x86_64",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.21.2.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.21.2.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.21.2.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.21.2.x86_64",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.21.2.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.21.2.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.21.2.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.21.2.x86_64",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.21.2.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.21.2.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.21.2.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.21.2.x86_64",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.21.2.ppc64le",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.21.2.s390x",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.21.2.x86_64",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.21.2.ppc64le",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.21.2.s390x",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.21.2.x86_64",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_21-default-1-150400.9.3.2.ppc64le",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_21-default-1-150400.9.3.2.s390x",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_21-default-1-150400.9.3.2.x86_64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-64kb-5.14.21-150400.24.21.2.aarch64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-64kb-devel-5.14.21-150400.24.21.2.aarch64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-5.14.21-150400.24.21.2.aarch64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-5.14.21-150400.24.21.2.ppc64le",
            "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-5.14.21-150400.24.21.2.s390x",
            "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-5.14.21-150400.24.21.2.x86_64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-base-5.14.21-150400.24.21.2.150400.24.7.2.aarch64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-base-5.14.21-150400.24.21.2.150400.24.7.2.ppc64le",
            "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-base-5.14.21-150400.24.21.2.150400.24.7.2.s390x",
            "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-base-5.14.21-150400.24.21.2.150400.24.7.2.x86_64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-devel-5.14.21-150400.24.21.2.aarch64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-devel-5.14.21-150400.24.21.2.ppc64le",
            "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-devel-5.14.21-150400.24.21.2.s390x",
            "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-devel-5.14.21-150400.24.21.2.x86_64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-devel-5.14.21-150400.24.21.2.noarch",
            "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-macros-5.14.21-150400.24.21.2.noarch",
            "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-zfcpdump-5.14.21-150400.24.21.2.s390x",
            "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-docs-5.14.21-150400.24.21.3.noarch",
            "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-obs-build-5.14.21-150400.24.21.2.aarch64",
            "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-obs-build-5.14.21-150400.24.21.2.ppc64le",
            "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-obs-build-5.14.21-150400.24.21.2.s390x",
            "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-obs-build-5.14.21-150400.24.21.2.x86_64",
            "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-source-5.14.21-150400.24.21.2.noarch",
            "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-syms-5.14.21-150400.24.21.1.aarch64",
            "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-syms-5.14.21-150400.24.21.1.ppc64le",
            "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-syms-5.14.21-150400.24.21.1.s390x",
            "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-syms-5.14.21-150400.24.21.1.x86_64",
            "SUSE Linux Enterprise Module for Legacy 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.21.2.aarch64",
            "SUSE Linux Enterprise Module for Legacy 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.21.2.ppc64le",
            "SUSE Linux Enterprise Module for Legacy 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.21.2.s390x",
            "SUSE Linux Enterprise Module for Legacy 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.21.2.x86_64",
            "SUSE Linux Enterprise Workstation Extension 15 SP4:kernel-default-extra-5.14.21-150400.24.21.2.x86_64",
            "openSUSE Leap 15.4:cluster-md-kmp-64kb-5.14.21-150400.24.21.2.aarch64",
            "openSUSE Leap 15.4:cluster-md-kmp-default-5.14.21-150400.24.21.2.aarch64",
            "openSUSE Leap 15.4:cluster-md-kmp-default-5.14.21-150400.24.21.2.ppc64le",
            "openSUSE Leap 15.4:cluster-md-kmp-default-5.14.21-150400.24.21.2.s390x",
            "openSUSE Leap 15.4:cluster-md-kmp-default-5.14.21-150400.24.21.2.x86_64",
            "openSUSE Leap 15.4:dlm-kmp-64kb-5.14.21-150400.24.21.2.aarch64",
            "openSUSE Leap 15.4:dlm-kmp-default-5.14.21-150400.24.21.2.aarch64",
            "openSUSE Leap 15.4:dlm-kmp-default-5.14.21-150400.24.21.2.ppc64le",
            "openSUSE Leap 15.4:dlm-kmp-default-5.14.21-150400.24.21.2.s390x",
            "openSUSE Leap 15.4:dlm-kmp-default-5.14.21-150400.24.21.2.x86_64",
            "openSUSE Leap 15.4:dtb-allwinner-5.14.21-150400.24.21.1.aarch64",
            "openSUSE Leap 15.4:dtb-altera-5.14.21-150400.24.21.1.aarch64",
            "openSUSE Leap 15.4:dtb-amazon-5.14.21-150400.24.21.1.aarch64",
            "openSUSE Leap 15.4:dtb-amd-5.14.21-150400.24.21.1.aarch64",
            "openSUSE Leap 15.4:dtb-amlogic-5.14.21-150400.24.21.1.aarch64",
            "openSUSE Leap 15.4:dtb-apm-5.14.21-150400.24.21.1.aarch64",
            "openSUSE Leap 15.4:dtb-apple-5.14.21-150400.24.21.1.aarch64",
            "openSUSE Leap 15.4:dtb-arm-5.14.21-150400.24.21.1.aarch64",
            "openSUSE Leap 15.4:dtb-broadcom-5.14.21-150400.24.21.1.aarch64",
            "openSUSE Leap 15.4:dtb-cavium-5.14.21-150400.24.21.1.aarch64",
            "openSUSE Leap 15.4:dtb-exynos-5.14.21-150400.24.21.1.aarch64",
            "openSUSE Leap 15.4:dtb-freescale-5.14.21-150400.24.21.1.aarch64",
            "openSUSE Leap 15.4:dtb-hisilicon-5.14.21-150400.24.21.1.aarch64",
            "openSUSE Leap 15.4:dtb-lg-5.14.21-150400.24.21.1.aarch64",
            "openSUSE Leap 15.4:dtb-marvell-5.14.21-150400.24.21.1.aarch64",
            "openSUSE Leap 15.4:dtb-mediatek-5.14.21-150400.24.21.1.aarch64",
            "openSUSE Leap 15.4:dtb-nvidia-5.14.21-150400.24.21.1.aarch64",
            "openSUSE Leap 15.4:dtb-qcom-5.14.21-150400.24.21.1.aarch64",
            "openSUSE Leap 15.4:dtb-renesas-5.14.21-150400.24.21.1.aarch64",
            "openSUSE Leap 15.4:dtb-rockchip-5.14.21-150400.24.21.1.aarch64",
            "openSUSE Leap 15.4:dtb-socionext-5.14.21-150400.24.21.1.aarch64",
            "openSUSE Leap 15.4:dtb-sprd-5.14.21-150400.24.21.1.aarch64",
            "openSUSE Leap 15.4:dtb-xilinx-5.14.21-150400.24.21.1.aarch64",
            "openSUSE Leap 15.4:gfs2-kmp-64kb-5.14.21-150400.24.21.2.aarch64",
            "openSUSE Leap 15.4:gfs2-kmp-default-5.14.21-150400.24.21.2.aarch64",
            "openSUSE Leap 15.4:gfs2-kmp-default-5.14.21-150400.24.21.2.ppc64le",
            "openSUSE Leap 15.4:gfs2-kmp-default-5.14.21-150400.24.21.2.s390x",
            "openSUSE Leap 15.4:gfs2-kmp-default-5.14.21-150400.24.21.2.x86_64",
            "openSUSE Leap 15.4:kernel-64kb-5.14.21-150400.24.21.2.aarch64",
            "openSUSE Leap 15.4:kernel-64kb-devel-5.14.21-150400.24.21.2.aarch64",
            "openSUSE Leap 15.4:kernel-64kb-extra-5.14.21-150400.24.21.2.aarch64",
            "openSUSE Leap 15.4:kernel-64kb-livepatch-devel-5.14.21-150400.24.21.2.aarch64",
            "openSUSE Leap 15.4:kernel-64kb-optional-5.14.21-150400.24.21.2.aarch64",
            "openSUSE Leap 15.4:kernel-debug-5.14.21-150400.24.21.2.ppc64le",
            "openSUSE Leap 15.4:kernel-debug-5.14.21-150400.24.21.2.x86_64",
            "openSUSE Leap 15.4:kernel-debug-devel-5.14.21-150400.24.21.2.ppc64le",
            "openSUSE Leap 15.4:kernel-debug-devel-5.14.21-150400.24.21.2.x86_64",
            "openSUSE Leap 15.4:kernel-debug-livepatch-devel-5.14.21-150400.24.21.2.ppc64le",
            "openSUSE Leap 15.4:kernel-debug-livepatch-devel-5.14.21-150400.24.21.2.x86_64",
            "openSUSE Leap 15.4:kernel-default-5.14.21-150400.24.21.2.aarch64",
            "openSUSE Leap 15.4:kernel-default-5.14.21-150400.24.21.2.ppc64le",
            "openSUSE Leap 15.4:kernel-default-5.14.21-150400.24.21.2.s390x",
            "openSUSE Leap 15.4:kernel-default-5.14.21-150400.24.21.2.x86_64",
            "openSUSE Leap 15.4:kernel-default-base-5.14.21-150400.24.21.2.150400.24.7.2.aarch64",
            "openSUSE Leap 15.4:kernel-default-base-5.14.21-150400.24.21.2.150400.24.7.2.ppc64le",
            "openSUSE Leap 15.4:kernel-default-base-5.14.21-150400.24.21.2.150400.24.7.2.s390x",
            "openSUSE Leap 15.4:kernel-default-base-5.14.21-150400.24.21.2.150400.24.7.2.x86_64",
            "openSUSE Leap 15.4:kernel-default-base-rebuild-5.14.21-150400.24.21.2.150400.24.7.2.aarch64",
            "openSUSE Leap 15.4:kernel-default-base-rebuild-5.14.21-150400.24.21.2.150400.24.7.2.ppc64le",
            "openSUSE Leap 15.4:kernel-default-base-rebuild-5.14.21-150400.24.21.2.150400.24.7.2.s390x",
            "openSUSE Leap 15.4:kernel-default-base-rebuild-5.14.21-150400.24.21.2.150400.24.7.2.x86_64",
            "openSUSE Leap 15.4:kernel-default-devel-5.14.21-150400.24.21.2.aarch64",
            "openSUSE Leap 15.4:kernel-default-devel-5.14.21-150400.24.21.2.ppc64le",
            "openSUSE Leap 15.4:kernel-default-devel-5.14.21-150400.24.21.2.s390x",
            "openSUSE Leap 15.4:kernel-default-devel-5.14.21-150400.24.21.2.x86_64",
            "openSUSE Leap 15.4:kernel-default-extra-5.14.21-150400.24.21.2.aarch64",
            "openSUSE Leap 15.4:kernel-default-extra-5.14.21-150400.24.21.2.ppc64le",
            "openSUSE Leap 15.4:kernel-default-extra-5.14.21-150400.24.21.2.s390x",
            "openSUSE Leap 15.4:kernel-default-extra-5.14.21-150400.24.21.2.x86_64",
            "openSUSE Leap 15.4:kernel-default-livepatch-5.14.21-150400.24.21.2.aarch64",
            "openSUSE Leap 15.4:kernel-default-livepatch-5.14.21-150400.24.21.2.ppc64le",
            "openSUSE Leap 15.4:kernel-default-livepatch-5.14.21-150400.24.21.2.s390x",
            "openSUSE Leap 15.4:kernel-default-livepatch-5.14.21-150400.24.21.2.x86_64",
            "openSUSE Leap 15.4:kernel-default-livepatch-devel-5.14.21-150400.24.21.2.aarch64",
            "openSUSE Leap 15.4:kernel-default-livepatch-devel-5.14.21-150400.24.21.2.ppc64le",
            "openSUSE Leap 15.4:kernel-default-livepatch-devel-5.14.21-150400.24.21.2.s390x",
            "openSUSE Leap 15.4:kernel-default-livepatch-devel-5.14.21-150400.24.21.2.x86_64",
            "openSUSE Leap 15.4:kernel-default-optional-5.14.21-150400.24.21.2.aarch64",
            "openSUSE Leap 15.4:kernel-default-optional-5.14.21-150400.24.21.2.ppc64le",
            "openSUSE Leap 15.4:kernel-default-optional-5.14.21-150400.24.21.2.s390x",
            "openSUSE Leap 15.4:kernel-default-optional-5.14.21-150400.24.21.2.x86_64",
            "openSUSE Leap 15.4:kernel-devel-5.14.21-150400.24.21.2.noarch",
            "openSUSE Leap 15.4:kernel-docs-5.14.21-150400.24.21.3.noarch",
            "openSUSE Leap 15.4:kernel-docs-html-5.14.21-150400.24.21.3.noarch",
            "openSUSE Leap 15.4:kernel-kvmsmall-5.14.21-150400.24.21.2.aarch64",
            "openSUSE Leap 15.4:kernel-kvmsmall-5.14.21-150400.24.21.2.ppc64le",
            "openSUSE Leap 15.4:kernel-kvmsmall-5.14.21-150400.24.21.2.x86_64",
            "openSUSE Leap 15.4:kernel-kvmsmall-devel-5.14.21-150400.24.21.2.aarch64",
            "openSUSE Leap 15.4:kernel-kvmsmall-devel-5.14.21-150400.24.21.2.ppc64le",
            "openSUSE Leap 15.4:kernel-kvmsmall-devel-5.14.21-150400.24.21.2.x86_64",
            "openSUSE Leap 15.4:kernel-kvmsmall-livepatch-devel-5.14.21-150400.24.21.2.aarch64",
            "openSUSE Leap 15.4:kernel-kvmsmall-livepatch-devel-5.14.21-150400.24.21.2.ppc64le",
            "openSUSE Leap 15.4:kernel-kvmsmall-livepatch-devel-5.14.21-150400.24.21.2.x86_64",
            "openSUSE Leap 15.4:kernel-macros-5.14.21-150400.24.21.2.noarch",
            "openSUSE Leap 15.4:kernel-obs-build-5.14.21-150400.24.21.2.aarch64",
            "openSUSE Leap 15.4:kernel-obs-build-5.14.21-150400.24.21.2.ppc64le",
            "openSUSE Leap 15.4:kernel-obs-build-5.14.21-150400.24.21.2.s390x",
            "openSUSE Leap 15.4:kernel-obs-build-5.14.21-150400.24.21.2.x86_64",
            "openSUSE Leap 15.4:kernel-obs-qa-5.14.21-150400.24.21.1.aarch64",
            "openSUSE Leap 15.4:kernel-obs-qa-5.14.21-150400.24.21.1.ppc64le",
            "openSUSE Leap 15.4:kernel-obs-qa-5.14.21-150400.24.21.1.s390x",
            "openSUSE Leap 15.4:kernel-obs-qa-5.14.21-150400.24.21.1.x86_64",
            "openSUSE Leap 15.4:kernel-source-5.14.21-150400.24.21.2.noarch",
            "openSUSE Leap 15.4:kernel-source-vanilla-5.14.21-150400.24.21.2.noarch",
            "openSUSE Leap 15.4:kernel-syms-5.14.21-150400.24.21.1.aarch64",
            "openSUSE Leap 15.4:kernel-syms-5.14.21-150400.24.21.1.ppc64le",
            "openSUSE Leap 15.4:kernel-syms-5.14.21-150400.24.21.1.s390x",
            "openSUSE Leap 15.4:kernel-syms-5.14.21-150400.24.21.1.x86_64",
            "openSUSE Leap 15.4:kernel-zfcpdump-5.14.21-150400.24.21.2.s390x",
            "openSUSE Leap 15.4:kselftests-kmp-64kb-5.14.21-150400.24.21.2.aarch64",
            "openSUSE Leap 15.4:kselftests-kmp-default-5.14.21-150400.24.21.2.aarch64",
            "openSUSE Leap 15.4:kselftests-kmp-default-5.14.21-150400.24.21.2.ppc64le",
            "openSUSE Leap 15.4:kselftests-kmp-default-5.14.21-150400.24.21.2.s390x",
            "openSUSE Leap 15.4:kselftests-kmp-default-5.14.21-150400.24.21.2.x86_64",
            "openSUSE Leap 15.4:ocfs2-kmp-64kb-5.14.21-150400.24.21.2.aarch64",
            "openSUSE Leap 15.4:ocfs2-kmp-default-5.14.21-150400.24.21.2.aarch64",
            "openSUSE Leap 15.4:ocfs2-kmp-default-5.14.21-150400.24.21.2.ppc64le",
            "openSUSE Leap 15.4:ocfs2-kmp-default-5.14.21-150400.24.21.2.s390x",
            "openSUSE Leap 15.4:ocfs2-kmp-default-5.14.21-150400.24.21.2.x86_64",
            "openSUSE Leap 15.4:reiserfs-kmp-64kb-5.14.21-150400.24.21.2.aarch64",
            "openSUSE Leap 15.4:reiserfs-kmp-default-5.14.21-150400.24.21.2.aarch64",
            "openSUSE Leap 15.4:reiserfs-kmp-default-5.14.21-150400.24.21.2.ppc64le",
            "openSUSE Leap 15.4:reiserfs-kmp-default-5.14.21-150400.24.21.2.s390x",
            "openSUSE Leap 15.4:reiserfs-kmp-default-5.14.21-150400.24.21.2.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 7.8,
            "baseSeverity": "HIGH",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
            "version": "3.1"
          },
          "products": [
            "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.21.2.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.21.2.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.21.2.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.21.2.x86_64",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.21.2.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.21.2.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.21.2.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.21.2.x86_64",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.21.2.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.21.2.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.21.2.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.21.2.x86_64",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.21.2.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.21.2.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.21.2.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.21.2.x86_64",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.21.2.ppc64le",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.21.2.s390x",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.21.2.x86_64",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.21.2.ppc64le",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.21.2.s390x",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.21.2.x86_64",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_21-default-1-150400.9.3.2.ppc64le",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_21-default-1-150400.9.3.2.s390x",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_21-default-1-150400.9.3.2.x86_64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-64kb-5.14.21-150400.24.21.2.aarch64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-64kb-devel-5.14.21-150400.24.21.2.aarch64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-5.14.21-150400.24.21.2.aarch64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-5.14.21-150400.24.21.2.ppc64le",
            "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-5.14.21-150400.24.21.2.s390x",
            "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-5.14.21-150400.24.21.2.x86_64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-base-5.14.21-150400.24.21.2.150400.24.7.2.aarch64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-base-5.14.21-150400.24.21.2.150400.24.7.2.ppc64le",
            "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-base-5.14.21-150400.24.21.2.150400.24.7.2.s390x",
            "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-base-5.14.21-150400.24.21.2.150400.24.7.2.x86_64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-devel-5.14.21-150400.24.21.2.aarch64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-devel-5.14.21-150400.24.21.2.ppc64le",
            "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-devel-5.14.21-150400.24.21.2.s390x",
            "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-devel-5.14.21-150400.24.21.2.x86_64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-devel-5.14.21-150400.24.21.2.noarch",
            "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-macros-5.14.21-150400.24.21.2.noarch",
            "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-zfcpdump-5.14.21-150400.24.21.2.s390x",
            "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-docs-5.14.21-150400.24.21.3.noarch",
            "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-obs-build-5.14.21-150400.24.21.2.aarch64",
            "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-obs-build-5.14.21-150400.24.21.2.ppc64le",
            "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-obs-build-5.14.21-150400.24.21.2.s390x",
            "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-obs-build-5.14.21-150400.24.21.2.x86_64",
            "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-source-5.14.21-150400.24.21.2.noarch",
            "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-syms-5.14.21-150400.24.21.1.aarch64",
            "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-syms-5.14.21-150400.24.21.1.ppc64le",
            "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-syms-5.14.21-150400.24.21.1.s390x",
            "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-syms-5.14.21-150400.24.21.1.x86_64",
            "SUSE Linux Enterprise Module for Legacy 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.21.2.aarch64",
            "SUSE Linux Enterprise Module for Legacy 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.21.2.ppc64le",
            "SUSE Linux Enterprise Module for Legacy 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.21.2.s390x",
            "SUSE Linux Enterprise Module for Legacy 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.21.2.x86_64",
            "SUSE Linux Enterprise Workstation Extension 15 SP4:kernel-default-extra-5.14.21-150400.24.21.2.x86_64",
            "openSUSE Leap 15.4:cluster-md-kmp-64kb-5.14.21-150400.24.21.2.aarch64",
            "openSUSE Leap 15.4:cluster-md-kmp-default-5.14.21-150400.24.21.2.aarch64",
            "openSUSE Leap 15.4:cluster-md-kmp-default-5.14.21-150400.24.21.2.ppc64le",
            "openSUSE Leap 15.4:cluster-md-kmp-default-5.14.21-150400.24.21.2.s390x",
            "openSUSE Leap 15.4:cluster-md-kmp-default-5.14.21-150400.24.21.2.x86_64",
            "openSUSE Leap 15.4:dlm-kmp-64kb-5.14.21-150400.24.21.2.aarch64",
            "openSUSE Leap 15.4:dlm-kmp-default-5.14.21-150400.24.21.2.aarch64",
            "openSUSE Leap 15.4:dlm-kmp-default-5.14.21-150400.24.21.2.ppc64le",
            "openSUSE Leap 15.4:dlm-kmp-default-5.14.21-150400.24.21.2.s390x",
            "openSUSE Leap 15.4:dlm-kmp-default-5.14.21-150400.24.21.2.x86_64",
            "openSUSE Leap 15.4:dtb-allwinner-5.14.21-150400.24.21.1.aarch64",
            "openSUSE Leap 15.4:dtb-altera-5.14.21-150400.24.21.1.aarch64",
            "openSUSE Leap 15.4:dtb-amazon-5.14.21-150400.24.21.1.aarch64",
            "openSUSE Leap 15.4:dtb-amd-5.14.21-150400.24.21.1.aarch64",
            "openSUSE Leap 15.4:dtb-amlogic-5.14.21-150400.24.21.1.aarch64",
            "openSUSE Leap 15.4:dtb-apm-5.14.21-150400.24.21.1.aarch64",
            "openSUSE Leap 15.4:dtb-apple-5.14.21-150400.24.21.1.aarch64",
            "openSUSE Leap 15.4:dtb-arm-5.14.21-150400.24.21.1.aarch64",
            "openSUSE Leap 15.4:dtb-broadcom-5.14.21-150400.24.21.1.aarch64",
            "openSUSE Leap 15.4:dtb-cavium-5.14.21-150400.24.21.1.aarch64",
            "openSUSE Leap 15.4:dtb-exynos-5.14.21-150400.24.21.1.aarch64",
            "openSUSE Leap 15.4:dtb-freescale-5.14.21-150400.24.21.1.aarch64",
            "openSUSE Leap 15.4:dtb-hisilicon-5.14.21-150400.24.21.1.aarch64",
            "openSUSE Leap 15.4:dtb-lg-5.14.21-150400.24.21.1.aarch64",
            "openSUSE Leap 15.4:dtb-marvell-5.14.21-150400.24.21.1.aarch64",
            "openSUSE Leap 15.4:dtb-mediatek-5.14.21-150400.24.21.1.aarch64",
            "openSUSE Leap 15.4:dtb-nvidia-5.14.21-150400.24.21.1.aarch64",
            "openSUSE Leap 15.4:dtb-qcom-5.14.21-150400.24.21.1.aarch64",
            "openSUSE Leap 15.4:dtb-renesas-5.14.21-150400.24.21.1.aarch64",
            "openSUSE Leap 15.4:dtb-rockchip-5.14.21-150400.24.21.1.aarch64",
            "openSUSE Leap 15.4:dtb-socionext-5.14.21-150400.24.21.1.aarch64",
            "openSUSE Leap 15.4:dtb-sprd-5.14.21-150400.24.21.1.aarch64",
            "openSUSE Leap 15.4:dtb-xilinx-5.14.21-150400.24.21.1.aarch64",
            "openSUSE Leap 15.4:gfs2-kmp-64kb-5.14.21-150400.24.21.2.aarch64",
            "openSUSE Leap 15.4:gfs2-kmp-default-5.14.21-150400.24.21.2.aarch64",
            "openSUSE Leap 15.4:gfs2-kmp-default-5.14.21-150400.24.21.2.ppc64le",
            "openSUSE Leap 15.4:gfs2-kmp-default-5.14.21-150400.24.21.2.s390x",
            "openSUSE Leap 15.4:gfs2-kmp-default-5.14.21-150400.24.21.2.x86_64",
            "openSUSE Leap 15.4:kernel-64kb-5.14.21-150400.24.21.2.aarch64",
            "openSUSE Leap 15.4:kernel-64kb-devel-5.14.21-150400.24.21.2.aarch64",
            "openSUSE Leap 15.4:kernel-64kb-extra-5.14.21-150400.24.21.2.aarch64",
            "openSUSE Leap 15.4:kernel-64kb-livepatch-devel-5.14.21-150400.24.21.2.aarch64",
            "openSUSE Leap 15.4:kernel-64kb-optional-5.14.21-150400.24.21.2.aarch64",
            "openSUSE Leap 15.4:kernel-debug-5.14.21-150400.24.21.2.ppc64le",
            "openSUSE Leap 15.4:kernel-debug-5.14.21-150400.24.21.2.x86_64",
            "openSUSE Leap 15.4:kernel-debug-devel-5.14.21-150400.24.21.2.ppc64le",
            "openSUSE Leap 15.4:kernel-debug-devel-5.14.21-150400.24.21.2.x86_64",
            "openSUSE Leap 15.4:kernel-debug-livepatch-devel-5.14.21-150400.24.21.2.ppc64le",
            "openSUSE Leap 15.4:kernel-debug-livepatch-devel-5.14.21-150400.24.21.2.x86_64",
            "openSUSE Leap 15.4:kernel-default-5.14.21-150400.24.21.2.aarch64",
            "openSUSE Leap 15.4:kernel-default-5.14.21-150400.24.21.2.ppc64le",
            "openSUSE Leap 15.4:kernel-default-5.14.21-150400.24.21.2.s390x",
            "openSUSE Leap 15.4:kernel-default-5.14.21-150400.24.21.2.x86_64",
            "openSUSE Leap 15.4:kernel-default-base-5.14.21-150400.24.21.2.150400.24.7.2.aarch64",
            "openSUSE Leap 15.4:kernel-default-base-5.14.21-150400.24.21.2.150400.24.7.2.ppc64le",
            "openSUSE Leap 15.4:kernel-default-base-5.14.21-150400.24.21.2.150400.24.7.2.s390x",
            "openSUSE Leap 15.4:kernel-default-base-5.14.21-150400.24.21.2.150400.24.7.2.x86_64",
            "openSUSE Leap 15.4:kernel-default-base-rebuild-5.14.21-150400.24.21.2.150400.24.7.2.aarch64",
            "openSUSE Leap 15.4:kernel-default-base-rebuild-5.14.21-150400.24.21.2.150400.24.7.2.ppc64le",
            "openSUSE Leap 15.4:kernel-default-base-rebuild-5.14.21-150400.24.21.2.150400.24.7.2.s390x",
            "openSUSE Leap 15.4:kernel-default-base-rebuild-5.14.21-150400.24.21.2.150400.24.7.2.x86_64",
            "openSUSE Leap 15.4:kernel-default-devel-5.14.21-150400.24.21.2.aarch64",
            "openSUSE Leap 15.4:kernel-default-devel-5.14.21-150400.24.21.2.ppc64le",
            "openSUSE Leap 15.4:kernel-default-devel-5.14.21-150400.24.21.2.s390x",
            "openSUSE Leap 15.4:kernel-default-devel-5.14.21-150400.24.21.2.x86_64",
            "openSUSE Leap 15.4:kernel-default-extra-5.14.21-150400.24.21.2.aarch64",
            "openSUSE Leap 15.4:kernel-default-extra-5.14.21-150400.24.21.2.ppc64le",
            "openSUSE Leap 15.4:kernel-default-extra-5.14.21-150400.24.21.2.s390x",
            "openSUSE Leap 15.4:kernel-default-extra-5.14.21-150400.24.21.2.x86_64",
            "openSUSE Leap 15.4:kernel-default-livepatch-5.14.21-150400.24.21.2.aarch64",
            "openSUSE Leap 15.4:kernel-default-livepatch-5.14.21-150400.24.21.2.ppc64le",
            "openSUSE Leap 15.4:kernel-default-livepatch-5.14.21-150400.24.21.2.s390x",
            "openSUSE Leap 15.4:kernel-default-livepatch-5.14.21-150400.24.21.2.x86_64",
            "openSUSE Leap 15.4:kernel-default-livepatch-devel-5.14.21-150400.24.21.2.aarch64",
            "openSUSE Leap 15.4:kernel-default-livepatch-devel-5.14.21-150400.24.21.2.ppc64le",
            "openSUSE Leap 15.4:kernel-default-livepatch-devel-5.14.21-150400.24.21.2.s390x",
            "openSUSE Leap 15.4:kernel-default-livepatch-devel-5.14.21-150400.24.21.2.x86_64",
            "openSUSE Leap 15.4:kernel-default-optional-5.14.21-150400.24.21.2.aarch64",
            "openSUSE Leap 15.4:kernel-default-optional-5.14.21-150400.24.21.2.ppc64le",
            "openSUSE Leap 15.4:kernel-default-optional-5.14.21-150400.24.21.2.s390x",
            "openSUSE Leap 15.4:kernel-default-optional-5.14.21-150400.24.21.2.x86_64",
            "openSUSE Leap 15.4:kernel-devel-5.14.21-150400.24.21.2.noarch",
            "openSUSE Leap 15.4:kernel-docs-5.14.21-150400.24.21.3.noarch",
            "openSUSE Leap 15.4:kernel-docs-html-5.14.21-150400.24.21.3.noarch",
            "openSUSE Leap 15.4:kernel-kvmsmall-5.14.21-150400.24.21.2.aarch64",
            "openSUSE Leap 15.4:kernel-kvmsmall-5.14.21-150400.24.21.2.ppc64le",
            "openSUSE Leap 15.4:kernel-kvmsmall-5.14.21-150400.24.21.2.x86_64",
            "openSUSE Leap 15.4:kernel-kvmsmall-devel-5.14.21-150400.24.21.2.aarch64",
            "openSUSE Leap 15.4:kernel-kvmsmall-devel-5.14.21-150400.24.21.2.ppc64le",
            "openSUSE Leap 15.4:kernel-kvmsmall-devel-5.14.21-150400.24.21.2.x86_64",
            "openSUSE Leap 15.4:kernel-kvmsmall-livepatch-devel-5.14.21-150400.24.21.2.aarch64",
            "openSUSE Leap 15.4:kernel-kvmsmall-livepatch-devel-5.14.21-150400.24.21.2.ppc64le",
            "openSUSE Leap 15.4:kernel-kvmsmall-livepatch-devel-5.14.21-150400.24.21.2.x86_64",
            "openSUSE Leap 15.4:kernel-macros-5.14.21-150400.24.21.2.noarch",
            "openSUSE Leap 15.4:kernel-obs-build-5.14.21-150400.24.21.2.aarch64",
            "openSUSE Leap 15.4:kernel-obs-build-5.14.21-150400.24.21.2.ppc64le",
            "openSUSE Leap 15.4:kernel-obs-build-5.14.21-150400.24.21.2.s390x",
            "openSUSE Leap 15.4:kernel-obs-build-5.14.21-150400.24.21.2.x86_64",
            "openSUSE Leap 15.4:kernel-obs-qa-5.14.21-150400.24.21.1.aarch64",
            "openSUSE Leap 15.4:kernel-obs-qa-5.14.21-150400.24.21.1.ppc64le",
            "openSUSE Leap 15.4:kernel-obs-qa-5.14.21-150400.24.21.1.s390x",
            "openSUSE Leap 15.4:kernel-obs-qa-5.14.21-150400.24.21.1.x86_64",
            "openSUSE Leap 15.4:kernel-source-5.14.21-150400.24.21.2.noarch",
            "openSUSE Leap 15.4:kernel-source-vanilla-5.14.21-150400.24.21.2.noarch",
            "openSUSE Leap 15.4:kernel-syms-5.14.21-150400.24.21.1.aarch64",
            "openSUSE Leap 15.4:kernel-syms-5.14.21-150400.24.21.1.ppc64le",
            "openSUSE Leap 15.4:kernel-syms-5.14.21-150400.24.21.1.s390x",
            "openSUSE Leap 15.4:kernel-syms-5.14.21-150400.24.21.1.x86_64",
            "openSUSE Leap 15.4:kernel-zfcpdump-5.14.21-150400.24.21.2.s390x",
            "openSUSE Leap 15.4:kselftests-kmp-64kb-5.14.21-150400.24.21.2.aarch64",
            "openSUSE Leap 15.4:kselftests-kmp-default-5.14.21-150400.24.21.2.aarch64",
            "openSUSE Leap 15.4:kselftests-kmp-default-5.14.21-150400.24.21.2.ppc64le",
            "openSUSE Leap 15.4:kselftests-kmp-default-5.14.21-150400.24.21.2.s390x",
            "openSUSE Leap 15.4:kselftests-kmp-default-5.14.21-150400.24.21.2.x86_64",
            "openSUSE Leap 15.4:ocfs2-kmp-64kb-5.14.21-150400.24.21.2.aarch64",
            "openSUSE Leap 15.4:ocfs2-kmp-default-5.14.21-150400.24.21.2.aarch64",
            "openSUSE Leap 15.4:ocfs2-kmp-default-5.14.21-150400.24.21.2.ppc64le",
            "openSUSE Leap 15.4:ocfs2-kmp-default-5.14.21-150400.24.21.2.s390x",
            "openSUSE Leap 15.4:ocfs2-kmp-default-5.14.21-150400.24.21.2.x86_64",
            "openSUSE Leap 15.4:reiserfs-kmp-64kb-5.14.21-150400.24.21.2.aarch64",
            "openSUSE Leap 15.4:reiserfs-kmp-default-5.14.21-150400.24.21.2.aarch64",
            "openSUSE Leap 15.4:reiserfs-kmp-default-5.14.21-150400.24.21.2.ppc64le",
            "openSUSE Leap 15.4:reiserfs-kmp-default-5.14.21-150400.24.21.2.s390x",
            "openSUSE Leap 15.4:reiserfs-kmp-default-5.14.21-150400.24.21.2.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2022-09-16T15:30:19Z",
          "details": "important"
        }
      ],
      "title": "CVE-2022-32250"
    },
    {
      "cve": "CVE-2022-36879",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2022-36879"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "An issue was discovered in the Linux kernel through 5.18.14. xfrm_expand_policies in net/xfrm/xfrm_policy.c can cause a refcount to be dropped twice.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.21.2.aarch64",
          "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.21.2.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.21.2.s390x",
          "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.21.2.x86_64",
          "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.21.2.aarch64",
          "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.21.2.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.21.2.s390x",
          "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.21.2.x86_64",
          "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.21.2.aarch64",
          "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.21.2.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.21.2.s390x",
          "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.21.2.x86_64",
          "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.21.2.aarch64",
          "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.21.2.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.21.2.s390x",
          "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.21.2.x86_64",
          "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.21.2.ppc64le",
          "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.21.2.s390x",
          "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.21.2.x86_64",
          "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.21.2.ppc64le",
          "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.21.2.s390x",
          "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.21.2.x86_64",
          "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_21-default-1-150400.9.3.2.ppc64le",
          "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_21-default-1-150400.9.3.2.s390x",
          "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_21-default-1-150400.9.3.2.x86_64",
          "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-64kb-5.14.21-150400.24.21.2.aarch64",
          "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-64kb-devel-5.14.21-150400.24.21.2.aarch64",
          "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-5.14.21-150400.24.21.2.aarch64",
          "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-5.14.21-150400.24.21.2.ppc64le",
          "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-5.14.21-150400.24.21.2.s390x",
          "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-5.14.21-150400.24.21.2.x86_64",
          "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-base-5.14.21-150400.24.21.2.150400.24.7.2.aarch64",
          "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-base-5.14.21-150400.24.21.2.150400.24.7.2.ppc64le",
          "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-base-5.14.21-150400.24.21.2.150400.24.7.2.s390x",
          "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-base-5.14.21-150400.24.21.2.150400.24.7.2.x86_64",
          "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-devel-5.14.21-150400.24.21.2.aarch64",
          "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-devel-5.14.21-150400.24.21.2.ppc64le",
          "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-devel-5.14.21-150400.24.21.2.s390x",
          "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-devel-5.14.21-150400.24.21.2.x86_64",
          "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-devel-5.14.21-150400.24.21.2.noarch",
          "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-macros-5.14.21-150400.24.21.2.noarch",
          "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-zfcpdump-5.14.21-150400.24.21.2.s390x",
          "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-docs-5.14.21-150400.24.21.3.noarch",
          "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-obs-build-5.14.21-150400.24.21.2.aarch64",
          "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-obs-build-5.14.21-150400.24.21.2.ppc64le",
          "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-obs-build-5.14.21-150400.24.21.2.s390x",
          "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-obs-build-5.14.21-150400.24.21.2.x86_64",
          "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-source-5.14.21-150400.24.21.2.noarch",
          "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-syms-5.14.21-150400.24.21.1.aarch64",
          "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-syms-5.14.21-150400.24.21.1.ppc64le",
          "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-syms-5.14.21-150400.24.21.1.s390x",
          "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-syms-5.14.21-150400.24.21.1.x86_64",
          "SUSE Linux Enterprise Module for Legacy 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.21.2.aarch64",
          "SUSE Linux Enterprise Module for Legacy 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.21.2.ppc64le",
          "SUSE Linux Enterprise Module for Legacy 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.21.2.s390x",
          "SUSE Linux Enterprise Module for Legacy 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.21.2.x86_64",
          "SUSE Linux Enterprise Workstation Extension 15 SP4:kernel-default-extra-5.14.21-150400.24.21.2.x86_64",
          "openSUSE Leap 15.4:cluster-md-kmp-64kb-5.14.21-150400.24.21.2.aarch64",
          "openSUSE Leap 15.4:cluster-md-kmp-default-5.14.21-150400.24.21.2.aarch64",
          "openSUSE Leap 15.4:cluster-md-kmp-default-5.14.21-150400.24.21.2.ppc64le",
          "openSUSE Leap 15.4:cluster-md-kmp-default-5.14.21-150400.24.21.2.s390x",
          "openSUSE Leap 15.4:cluster-md-kmp-default-5.14.21-150400.24.21.2.x86_64",
          "openSUSE Leap 15.4:dlm-kmp-64kb-5.14.21-150400.24.21.2.aarch64",
          "openSUSE Leap 15.4:dlm-kmp-default-5.14.21-150400.24.21.2.aarch64",
          "openSUSE Leap 15.4:dlm-kmp-default-5.14.21-150400.24.21.2.ppc64le",
          "openSUSE Leap 15.4:dlm-kmp-default-5.14.21-150400.24.21.2.s390x",
          "openSUSE Leap 15.4:dlm-kmp-default-5.14.21-150400.24.21.2.x86_64",
          "openSUSE Leap 15.4:dtb-allwinner-5.14.21-150400.24.21.1.aarch64",
          "openSUSE Leap 15.4:dtb-altera-5.14.21-150400.24.21.1.aarch64",
          "openSUSE Leap 15.4:dtb-amazon-5.14.21-150400.24.21.1.aarch64",
          "openSUSE Leap 15.4:dtb-amd-5.14.21-150400.24.21.1.aarch64",
          "openSUSE Leap 15.4:dtb-amlogic-5.14.21-150400.24.21.1.aarch64",
          "openSUSE Leap 15.4:dtb-apm-5.14.21-150400.24.21.1.aarch64",
          "openSUSE Leap 15.4:dtb-apple-5.14.21-150400.24.21.1.aarch64",
          "openSUSE Leap 15.4:dtb-arm-5.14.21-150400.24.21.1.aarch64",
          "openSUSE Leap 15.4:dtb-broadcom-5.14.21-150400.24.21.1.aarch64",
          "openSUSE Leap 15.4:dtb-cavium-5.14.21-150400.24.21.1.aarch64",
          "openSUSE Leap 15.4:dtb-exynos-5.14.21-150400.24.21.1.aarch64",
          "openSUSE Leap 15.4:dtb-freescale-5.14.21-150400.24.21.1.aarch64",
          "openSUSE Leap 15.4:dtb-hisilicon-5.14.21-150400.24.21.1.aarch64",
          "openSUSE Leap 15.4:dtb-lg-5.14.21-150400.24.21.1.aarch64",
          "openSUSE Leap 15.4:dtb-marvell-5.14.21-150400.24.21.1.aarch64",
          "openSUSE Leap 15.4:dtb-mediatek-5.14.21-150400.24.21.1.aarch64",
          "openSUSE Leap 15.4:dtb-nvidia-5.14.21-150400.24.21.1.aarch64",
          "openSUSE Leap 15.4:dtb-qcom-5.14.21-150400.24.21.1.aarch64",
          "openSUSE Leap 15.4:dtb-renesas-5.14.21-150400.24.21.1.aarch64",
          "openSUSE Leap 15.4:dtb-rockchip-5.14.21-150400.24.21.1.aarch64",
          "openSUSE Leap 15.4:dtb-socionext-5.14.21-150400.24.21.1.aarch64",
          "openSUSE Leap 15.4:dtb-sprd-5.14.21-150400.24.21.1.aarch64",
          "openSUSE Leap 15.4:dtb-xilinx-5.14.21-150400.24.21.1.aarch64",
          "openSUSE Leap 15.4:gfs2-kmp-64kb-5.14.21-150400.24.21.2.aarch64",
          "openSUSE Leap 15.4:gfs2-kmp-default-5.14.21-150400.24.21.2.aarch64",
          "openSUSE Leap 15.4:gfs2-kmp-default-5.14.21-150400.24.21.2.ppc64le",
          "openSUSE Leap 15.4:gfs2-kmp-default-5.14.21-150400.24.21.2.s390x",
          "openSUSE Leap 15.4:gfs2-kmp-default-5.14.21-150400.24.21.2.x86_64",
          "openSUSE Leap 15.4:kernel-64kb-5.14.21-150400.24.21.2.aarch64",
          "openSUSE Leap 15.4:kernel-64kb-devel-5.14.21-150400.24.21.2.aarch64",
          "openSUSE Leap 15.4:kernel-64kb-extra-5.14.21-150400.24.21.2.aarch64",
          "openSUSE Leap 15.4:kernel-64kb-livepatch-devel-5.14.21-150400.24.21.2.aarch64",
          "openSUSE Leap 15.4:kernel-64kb-optional-5.14.21-150400.24.21.2.aarch64",
          "openSUSE Leap 15.4:kernel-debug-5.14.21-150400.24.21.2.ppc64le",
          "openSUSE Leap 15.4:kernel-debug-5.14.21-150400.24.21.2.x86_64",
          "openSUSE Leap 15.4:kernel-debug-devel-5.14.21-150400.24.21.2.ppc64le",
          "openSUSE Leap 15.4:kernel-debug-devel-5.14.21-150400.24.21.2.x86_64",
          "openSUSE Leap 15.4:kernel-debug-livepatch-devel-5.14.21-150400.24.21.2.ppc64le",
          "openSUSE Leap 15.4:kernel-debug-livepatch-devel-5.14.21-150400.24.21.2.x86_64",
          "openSUSE Leap 15.4:kernel-default-5.14.21-150400.24.21.2.aarch64",
          "openSUSE Leap 15.4:kernel-default-5.14.21-150400.24.21.2.ppc64le",
          "openSUSE Leap 15.4:kernel-default-5.14.21-150400.24.21.2.s390x",
          "openSUSE Leap 15.4:kernel-default-5.14.21-150400.24.21.2.x86_64",
          "openSUSE Leap 15.4:kernel-default-base-5.14.21-150400.24.21.2.150400.24.7.2.aarch64",
          "openSUSE Leap 15.4:kernel-default-base-5.14.21-150400.24.21.2.150400.24.7.2.ppc64le",
          "openSUSE Leap 15.4:kernel-default-base-5.14.21-150400.24.21.2.150400.24.7.2.s390x",
          "openSUSE Leap 15.4:kernel-default-base-5.14.21-150400.24.21.2.150400.24.7.2.x86_64",
          "openSUSE Leap 15.4:kernel-default-base-rebuild-5.14.21-150400.24.21.2.150400.24.7.2.aarch64",
          "openSUSE Leap 15.4:kernel-default-base-rebuild-5.14.21-150400.24.21.2.150400.24.7.2.ppc64le",
          "openSUSE Leap 15.4:kernel-default-base-rebuild-5.14.21-150400.24.21.2.150400.24.7.2.s390x",
          "openSUSE Leap 15.4:kernel-default-base-rebuild-5.14.21-150400.24.21.2.150400.24.7.2.x86_64",
          "openSUSE Leap 15.4:kernel-default-devel-5.14.21-150400.24.21.2.aarch64",
          "openSUSE Leap 15.4:kernel-default-devel-5.14.21-150400.24.21.2.ppc64le",
          "openSUSE Leap 15.4:kernel-default-devel-5.14.21-150400.24.21.2.s390x",
          "openSUSE Leap 15.4:kernel-default-devel-5.14.21-150400.24.21.2.x86_64",
          "openSUSE Leap 15.4:kernel-default-extra-5.14.21-150400.24.21.2.aarch64",
          "openSUSE Leap 15.4:kernel-default-extra-5.14.21-150400.24.21.2.ppc64le",
          "openSUSE Leap 15.4:kernel-default-extra-5.14.21-150400.24.21.2.s390x",
          "openSUSE Leap 15.4:kernel-default-extra-5.14.21-150400.24.21.2.x86_64",
          "openSUSE Leap 15.4:kernel-default-livepatch-5.14.21-150400.24.21.2.aarch64",
          "openSUSE Leap 15.4:kernel-default-livepatch-5.14.21-150400.24.21.2.ppc64le",
          "openSUSE Leap 15.4:kernel-default-livepatch-5.14.21-150400.24.21.2.s390x",
          "openSUSE Leap 15.4:kernel-default-livepatch-5.14.21-150400.24.21.2.x86_64",
          "openSUSE Leap 15.4:kernel-default-livepatch-devel-5.14.21-150400.24.21.2.aarch64",
          "openSUSE Leap 15.4:kernel-default-livepatch-devel-5.14.21-150400.24.21.2.ppc64le",
          "openSUSE Leap 15.4:kernel-default-livepatch-devel-5.14.21-150400.24.21.2.s390x",
          "openSUSE Leap 15.4:kernel-default-livepatch-devel-5.14.21-150400.24.21.2.x86_64",
          "openSUSE Leap 15.4:kernel-default-optional-5.14.21-150400.24.21.2.aarch64",
          "openSUSE Leap 15.4:kernel-default-optional-5.14.21-150400.24.21.2.ppc64le",
          "openSUSE Leap 15.4:kernel-default-optional-5.14.21-150400.24.21.2.s390x",
          "openSUSE Leap 15.4:kernel-default-optional-5.14.21-150400.24.21.2.x86_64",
          "openSUSE Leap 15.4:kernel-devel-5.14.21-150400.24.21.2.noarch",
          "openSUSE Leap 15.4:kernel-docs-5.14.21-150400.24.21.3.noarch",
          "openSUSE Leap 15.4:kernel-docs-html-5.14.21-150400.24.21.3.noarch",
          "openSUSE Leap 15.4:kernel-kvmsmall-5.14.21-150400.24.21.2.aarch64",
          "openSUSE Leap 15.4:kernel-kvmsmall-5.14.21-150400.24.21.2.ppc64le",
          "openSUSE Leap 15.4:kernel-kvmsmall-5.14.21-150400.24.21.2.x86_64",
          "openSUSE Leap 15.4:kernel-kvmsmall-devel-5.14.21-150400.24.21.2.aarch64",
          "openSUSE Leap 15.4:kernel-kvmsmall-devel-5.14.21-150400.24.21.2.ppc64le",
          "openSUSE Leap 15.4:kernel-kvmsmall-devel-5.14.21-150400.24.21.2.x86_64",
          "openSUSE Leap 15.4:kernel-kvmsmall-livepatch-devel-5.14.21-150400.24.21.2.aarch64",
          "openSUSE Leap 15.4:kernel-kvmsmall-livepatch-devel-5.14.21-150400.24.21.2.ppc64le",
          "openSUSE Leap 15.4:kernel-kvmsmall-livepatch-devel-5.14.21-150400.24.21.2.x86_64",
          "openSUSE Leap 15.4:kernel-macros-5.14.21-150400.24.21.2.noarch",
          "openSUSE Leap 15.4:kernel-obs-build-5.14.21-150400.24.21.2.aarch64",
          "openSUSE Leap 15.4:kernel-obs-build-5.14.21-150400.24.21.2.ppc64le",
          "openSUSE Leap 15.4:kernel-obs-build-5.14.21-150400.24.21.2.s390x",
          "openSUSE Leap 15.4:kernel-obs-build-5.14.21-150400.24.21.2.x86_64",
          "openSUSE Leap 15.4:kernel-obs-qa-5.14.21-150400.24.21.1.aarch64",
          "openSUSE Leap 15.4:kernel-obs-qa-5.14.21-150400.24.21.1.ppc64le",
          "openSUSE Leap 15.4:kernel-obs-qa-5.14.21-150400.24.21.1.s390x",
          "openSUSE Leap 15.4:kernel-obs-qa-5.14.21-150400.24.21.1.x86_64",
          "openSUSE Leap 15.4:kernel-source-5.14.21-150400.24.21.2.noarch",
          "openSUSE Leap 15.4:kernel-source-vanilla-5.14.21-150400.24.21.2.noarch",
          "openSUSE Leap 15.4:kernel-syms-5.14.21-150400.24.21.1.aarch64",
          "openSUSE Leap 15.4:kernel-syms-5.14.21-150400.24.21.1.ppc64le",
          "openSUSE Leap 15.4:kernel-syms-5.14.21-150400.24.21.1.s390x",
          "openSUSE Leap 15.4:kernel-syms-5.14.21-150400.24.21.1.x86_64",
          "openSUSE Leap 15.4:kernel-zfcpdump-5.14.21-150400.24.21.2.s390x",
          "openSUSE Leap 15.4:kselftests-kmp-64kb-5.14.21-150400.24.21.2.aarch64",
          "openSUSE Leap 15.4:kselftests-kmp-default-5.14.21-150400.24.21.2.aarch64",
          "openSUSE Leap 15.4:kselftests-kmp-default-5.14.21-150400.24.21.2.ppc64le",
          "openSUSE Leap 15.4:kselftests-kmp-default-5.14.21-150400.24.21.2.s390x",
          "openSUSE Leap 15.4:kselftests-kmp-default-5.14.21-150400.24.21.2.x86_64",
          "openSUSE Leap 15.4:ocfs2-kmp-64kb-5.14.21-150400.24.21.2.aarch64",
          "openSUSE Leap 15.4:ocfs2-kmp-default-5.14.21-150400.24.21.2.aarch64",
          "openSUSE Leap 15.4:ocfs2-kmp-default-5.14.21-150400.24.21.2.ppc64le",
          "openSUSE Leap 15.4:ocfs2-kmp-default-5.14.21-150400.24.21.2.s390x",
          "openSUSE Leap 15.4:ocfs2-kmp-default-5.14.21-150400.24.21.2.x86_64",
          "openSUSE Leap 15.4:reiserfs-kmp-64kb-5.14.21-150400.24.21.2.aarch64",
          "openSUSE Leap 15.4:reiserfs-kmp-default-5.14.21-150400.24.21.2.aarch64",
          "openSUSE Leap 15.4:reiserfs-kmp-default-5.14.21-150400.24.21.2.ppc64le",
          "openSUSE Leap 15.4:reiserfs-kmp-default-5.14.21-150400.24.21.2.s390x",
          "openSUSE Leap 15.4:reiserfs-kmp-default-5.14.21-150400.24.21.2.x86_64"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2022-36879",
          "url": "https://www.suse.com/security/cve/CVE-2022-36879"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1201948 for CVE-2022-36879",
          "url": "https://bugzilla.suse.com/1201948"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1212327 for CVE-2022-36879",
          "url": "https://bugzilla.suse.com/1212327"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.21.2.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.21.2.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.21.2.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.21.2.x86_64",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.21.2.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.21.2.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.21.2.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.21.2.x86_64",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.21.2.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.21.2.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.21.2.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.21.2.x86_64",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.21.2.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.21.2.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.21.2.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.21.2.x86_64",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.21.2.ppc64le",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.21.2.s390x",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.21.2.x86_64",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.21.2.ppc64le",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.21.2.s390x",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.21.2.x86_64",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_21-default-1-150400.9.3.2.ppc64le",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_21-default-1-150400.9.3.2.s390x",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_21-default-1-150400.9.3.2.x86_64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-64kb-5.14.21-150400.24.21.2.aarch64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-64kb-devel-5.14.21-150400.24.21.2.aarch64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-5.14.21-150400.24.21.2.aarch64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-5.14.21-150400.24.21.2.ppc64le",
            "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-5.14.21-150400.24.21.2.s390x",
            "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-5.14.21-150400.24.21.2.x86_64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-base-5.14.21-150400.24.21.2.150400.24.7.2.aarch64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-base-5.14.21-150400.24.21.2.150400.24.7.2.ppc64le",
            "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-base-5.14.21-150400.24.21.2.150400.24.7.2.s390x",
            "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-base-5.14.21-150400.24.21.2.150400.24.7.2.x86_64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-devel-5.14.21-150400.24.21.2.aarch64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-devel-5.14.21-150400.24.21.2.ppc64le",
            "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-devel-5.14.21-150400.24.21.2.s390x",
            "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-devel-5.14.21-150400.24.21.2.x86_64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-devel-5.14.21-150400.24.21.2.noarch",
            "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-macros-5.14.21-150400.24.21.2.noarch",
            "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-zfcpdump-5.14.21-150400.24.21.2.s390x",
            "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-docs-5.14.21-150400.24.21.3.noarch",
            "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-obs-build-5.14.21-150400.24.21.2.aarch64",
            "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-obs-build-5.14.21-150400.24.21.2.ppc64le",
            "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-obs-build-5.14.21-150400.24.21.2.s390x",
            "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-obs-build-5.14.21-150400.24.21.2.x86_64",
            "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-source-5.14.21-150400.24.21.2.noarch",
            "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-syms-5.14.21-150400.24.21.1.aarch64",
            "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-syms-5.14.21-150400.24.21.1.ppc64le",
            "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-syms-5.14.21-150400.24.21.1.s390x",
            "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-syms-5.14.21-150400.24.21.1.x86_64",
            "SUSE Linux Enterprise Module for Legacy 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.21.2.aarch64",
            "SUSE Linux Enterprise Module for Legacy 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.21.2.ppc64le",
            "SUSE Linux Enterprise Module for Legacy 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.21.2.s390x",
            "SUSE Linux Enterprise Module for Legacy 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.21.2.x86_64",
            "SUSE Linux Enterprise Workstation Extension 15 SP4:kernel-default-extra-5.14.21-150400.24.21.2.x86_64",
            "openSUSE Leap 15.4:cluster-md-kmp-64kb-5.14.21-150400.24.21.2.aarch64",
            "openSUSE Leap 15.4:cluster-md-kmp-default-5.14.21-150400.24.21.2.aarch64",
            "openSUSE Leap 15.4:cluster-md-kmp-default-5.14.21-150400.24.21.2.ppc64le",
            "openSUSE Leap 15.4:cluster-md-kmp-default-5.14.21-150400.24.21.2.s390x",
            "openSUSE Leap 15.4:cluster-md-kmp-default-5.14.21-150400.24.21.2.x86_64",
            "openSUSE Leap 15.4:dlm-kmp-64kb-5.14.21-150400.24.21.2.aarch64",
            "openSUSE Leap 15.4:dlm-kmp-default-5.14.21-150400.24.21.2.aarch64",
            "openSUSE Leap 15.4:dlm-kmp-default-5.14.21-150400.24.21.2.ppc64le",
            "openSUSE Leap 15.4:dlm-kmp-default-5.14.21-150400.24.21.2.s390x",
            "openSUSE Leap 15.4:dlm-kmp-default-5.14.21-150400.24.21.2.x86_64",
            "openSUSE Leap 15.4:dtb-allwinner-5.14.21-150400.24.21.1.aarch64",
            "openSUSE Leap 15.4:dtb-altera-5.14.21-150400.24.21.1.aarch64",
            "openSUSE Leap 15.4:dtb-amazon-5.14.21-150400.24.21.1.aarch64",
            "openSUSE Leap 15.4:dtb-amd-5.14.21-150400.24.21.1.aarch64",
            "openSUSE Leap 15.4:dtb-amlogic-5.14.21-150400.24.21.1.aarch64",
            "openSUSE Leap 15.4:dtb-apm-5.14.21-150400.24.21.1.aarch64",
            "openSUSE Leap 15.4:dtb-apple-5.14.21-150400.24.21.1.aarch64",
            "openSUSE Leap 15.4:dtb-arm-5.14.21-150400.24.21.1.aarch64",
            "openSUSE Leap 15.4:dtb-broadcom-5.14.21-150400.24.21.1.aarch64",
            "openSUSE Leap 15.4:dtb-cavium-5.14.21-150400.24.21.1.aarch64",
            "openSUSE Leap 15.4:dtb-exynos-5.14.21-150400.24.21.1.aarch64",
            "openSUSE Leap 15.4:dtb-freescale-5.14.21-150400.24.21.1.aarch64",
            "openSUSE Leap 15.4:dtb-hisilicon-5.14.21-150400.24.21.1.aarch64",
            "openSUSE Leap 15.4:dtb-lg-5.14.21-150400.24.21.1.aarch64",
            "openSUSE Leap 15.4:dtb-marvell-5.14.21-150400.24.21.1.aarch64",
            "openSUSE Leap 15.4:dtb-mediatek-5.14.21-150400.24.21.1.aarch64",
            "openSUSE Leap 15.4:dtb-nvidia-5.14.21-150400.24.21.1.aarch64",
            "openSUSE Leap 15.4:dtb-qcom-5.14.21-150400.24.21.1.aarch64",
            "openSUSE Leap 15.4:dtb-renesas-5.14.21-150400.24.21.1.aarch64",
            "openSUSE Leap 15.4:dtb-rockchip-5.14.21-150400.24.21.1.aarch64",
            "openSUSE Leap 15.4:dtb-socionext-5.14.21-150400.24.21.1.aarch64",
            "openSUSE Leap 15.4:dtb-sprd-5.14.21-150400.24.21.1.aarch64",
            "openSUSE Leap 15.4:dtb-xilinx-5.14.21-150400.24.21.1.aarch64",
            "openSUSE Leap 15.4:gfs2-kmp-64kb-5.14.21-150400.24.21.2.aarch64",
            "openSUSE Leap 15.4:gfs2-kmp-default-5.14.21-150400.24.21.2.aarch64",
            "openSUSE Leap 15.4:gfs2-kmp-default-5.14.21-150400.24.21.2.ppc64le",
            "openSUSE Leap 15.4:gfs2-kmp-default-5.14.21-150400.24.21.2.s390x",
            "openSUSE Leap 15.4:gfs2-kmp-default-5.14.21-150400.24.21.2.x86_64",
            "openSUSE Leap 15.4:kernel-64kb-5.14.21-150400.24.21.2.aarch64",
            "openSUSE Leap 15.4:kernel-64kb-devel-5.14.21-150400.24.21.2.aarch64",
            "openSUSE Leap 15.4:kernel-64kb-extra-5.14.21-150400.24.21.2.aarch64",
            "openSUSE Leap 15.4:kernel-64kb-livepatch-devel-5.14.21-150400.24.21.2.aarch64",
            "openSUSE Leap 15.4:kernel-64kb-optional-5.14.21-150400.24.21.2.aarch64",
            "openSUSE Leap 15.4:kernel-debug-5.14.21-150400.24.21.2.ppc64le",
            "openSUSE Leap 15.4:kernel-debug-5.14.21-150400.24.21.2.x86_64",
            "openSUSE Leap 15.4:kernel-debug-devel-5.14.21-150400.24.21.2.ppc64le",
            "openSUSE Leap 15.4:kernel-debug-devel-5.14.21-150400.24.21.2.x86_64",
            "openSUSE Leap 15.4:kernel-debug-livepatch-devel-5.14.21-150400.24.21.2.ppc64le",
            "openSUSE Leap 15.4:kernel-debug-livepatch-devel-5.14.21-150400.24.21.2.x86_64",
            "openSUSE Leap 15.4:kernel-default-5.14.21-150400.24.21.2.aarch64",
            "openSUSE Leap 15.4:kernel-default-5.14.21-150400.24.21.2.ppc64le",
            "openSUSE Leap 15.4:kernel-default-5.14.21-150400.24.21.2.s390x",
            "openSUSE Leap 15.4:kernel-default-5.14.21-150400.24.21.2.x86_64",
            "openSUSE Leap 15.4:kernel-default-base-5.14.21-150400.24.21.2.150400.24.7.2.aarch64",
            "openSUSE Leap 15.4:kernel-default-base-5.14.21-150400.24.21.2.150400.24.7.2.ppc64le",
            "openSUSE Leap 15.4:kernel-default-base-5.14.21-150400.24.21.2.150400.24.7.2.s390x",
            "openSUSE Leap 15.4:kernel-default-base-5.14.21-150400.24.21.2.150400.24.7.2.x86_64",
            "openSUSE Leap 15.4:kernel-default-base-rebuild-5.14.21-150400.24.21.2.150400.24.7.2.aarch64",
            "openSUSE Leap 15.4:kernel-default-base-rebuild-5.14.21-150400.24.21.2.150400.24.7.2.ppc64le",
            "openSUSE Leap 15.4:kernel-default-base-rebuild-5.14.21-150400.24.21.2.150400.24.7.2.s390x",
            "openSUSE Leap 15.4:kernel-default-base-rebuild-5.14.21-150400.24.21.2.150400.24.7.2.x86_64",
            "openSUSE Leap 15.4:kernel-default-devel-5.14.21-150400.24.21.2.aarch64",
            "openSUSE Leap 15.4:kernel-default-devel-5.14.21-150400.24.21.2.ppc64le",
            "openSUSE Leap 15.4:kernel-default-devel-5.14.21-150400.24.21.2.s390x",
            "openSUSE Leap 15.4:kernel-default-devel-5.14.21-150400.24.21.2.x86_64",
            "openSUSE Leap 15.4:kernel-default-extra-5.14.21-150400.24.21.2.aarch64",
            "openSUSE Leap 15.4:kernel-default-extra-5.14.21-150400.24.21.2.ppc64le",
            "openSUSE Leap 15.4:kernel-default-extra-5.14.21-150400.24.21.2.s390x",
            "openSUSE Leap 15.4:kernel-default-extra-5.14.21-150400.24.21.2.x86_64",
            "openSUSE Leap 15.4:kernel-default-livepatch-5.14.21-150400.24.21.2.aarch64",
            "openSUSE Leap 15.4:kernel-default-livepatch-5.14.21-150400.24.21.2.ppc64le",
            "openSUSE Leap 15.4:kernel-default-livepatch-5.14.21-150400.24.21.2.s390x",
            "openSUSE Leap 15.4:kernel-default-livepatch-5.14.21-150400.24.21.2.x86_64",
            "openSUSE Leap 15.4:kernel-default-livepatch-devel-5.14.21-150400.24.21.2.aarch64",
            "openSUSE Leap 15.4:kernel-default-livepatch-devel-5.14.21-150400.24.21.2.ppc64le",
            "openSUSE Leap 15.4:kernel-default-livepatch-devel-5.14.21-150400.24.21.2.s390x",
            "openSUSE Leap 15.4:kernel-default-livepatch-devel-5.14.21-150400.24.21.2.x86_64",
            "openSUSE Leap 15.4:kernel-default-optional-5.14.21-150400.24.21.2.aarch64",
            "openSUSE Leap 15.4:kernel-default-optional-5.14.21-150400.24.21.2.ppc64le",
            "openSUSE Leap 15.4:kernel-default-optional-5.14.21-150400.24.21.2.s390x",
            "openSUSE Leap 15.4:kernel-default-optional-5.14.21-150400.24.21.2.x86_64",
            "openSUSE Leap 15.4:kernel-devel-5.14.21-150400.24.21.2.noarch",
            "openSUSE Leap 15.4:kernel-docs-5.14.21-150400.24.21.3.noarch",
            "openSUSE Leap 15.4:kernel-docs-html-5.14.21-150400.24.21.3.noarch",
            "openSUSE Leap 15.4:kernel-kvmsmall-5.14.21-150400.24.21.2.aarch64",
            "openSUSE Leap 15.4:kernel-kvmsmall-5.14.21-150400.24.21.2.ppc64le",
            "openSUSE Leap 15.4:kernel-kvmsmall-5.14.21-150400.24.21.2.x86_64",
            "openSUSE Leap 15.4:kernel-kvmsmall-devel-5.14.21-150400.24.21.2.aarch64",
            "openSUSE Leap 15.4:kernel-kvmsmall-devel-5.14.21-150400.24.21.2.ppc64le",
            "openSUSE Leap 15.4:kernel-kvmsmall-devel-5.14.21-150400.24.21.2.x86_64",
            "openSUSE Leap 15.4:kernel-kvmsmall-livepatch-devel-5.14.21-150400.24.21.2.aarch64",
            "openSUSE Leap 15.4:kernel-kvmsmall-livepatch-devel-5.14.21-150400.24.21.2.ppc64le",
            "openSUSE Leap 15.4:kernel-kvmsmall-livepatch-devel-5.14.21-150400.24.21.2.x86_64",
            "openSUSE Leap 15.4:kernel-macros-5.14.21-150400.24.21.2.noarch",
            "openSUSE Leap 15.4:kernel-obs-build-5.14.21-150400.24.21.2.aarch64",
            "openSUSE Leap 15.4:kernel-obs-build-5.14.21-150400.24.21.2.ppc64le",
            "openSUSE Leap 15.4:kernel-obs-build-5.14.21-150400.24.21.2.s390x",
            "openSUSE Leap 15.4:kernel-obs-build-5.14.21-150400.24.21.2.x86_64",
            "openSUSE Leap 15.4:kernel-obs-qa-5.14.21-150400.24.21.1.aarch64",
            "openSUSE Leap 15.4:kernel-obs-qa-5.14.21-150400.24.21.1.ppc64le",
            "openSUSE Leap 15.4:kernel-obs-qa-5.14.21-150400.24.21.1.s390x",
            "openSUSE Leap 15.4:kernel-obs-qa-5.14.21-150400.24.21.1.x86_64",
            "openSUSE Leap 15.4:kernel-source-5.14.21-150400.24.21.2.noarch",
            "openSUSE Leap 15.4:kernel-source-vanilla-5.14.21-150400.24.21.2.noarch",
            "openSUSE Leap 15.4:kernel-syms-5.14.21-150400.24.21.1.aarch64",
            "openSUSE Leap 15.4:kernel-syms-5.14.21-150400.24.21.1.ppc64le",
            "openSUSE Leap 15.4:kernel-syms-5.14.21-150400.24.21.1.s390x",
            "openSUSE Leap 15.4:kernel-syms-5.14.21-150400.24.21.1.x86_64",
            "openSUSE Leap 15.4:kernel-zfcpdump-5.14.21-150400.24.21.2.s390x",
            "openSUSE Leap 15.4:kselftests-kmp-64kb-5.14.21-150400.24.21.2.aarch64",
            "openSUSE Leap 15.4:kselftests-kmp-default-5.14.21-150400.24.21.2.aarch64",
            "openSUSE Leap 15.4:kselftests-kmp-default-5.14.21-150400.24.21.2.ppc64le",
            "openSUSE Leap 15.4:kselftests-kmp-default-5.14.21-150400.24.21.2.s390x",
            "openSUSE Leap 15.4:kselftests-kmp-default-5.14.21-150400.24.21.2.x86_64",
            "openSUSE Leap 15.4:ocfs2-kmp-64kb-5.14.21-150400.24.21.2.aarch64",
            "openSUSE Leap 15.4:ocfs2-kmp-default-5.14.21-150400.24.21.2.aarch64",
            "openSUSE Leap 15.4:ocfs2-kmp-default-5.14.21-150400.24.21.2.ppc64le",
            "openSUSE Leap 15.4:ocfs2-kmp-default-5.14.21-150400.24.21.2.s390x",
            "openSUSE Leap 15.4:ocfs2-kmp-default-5.14.21-150400.24.21.2.x86_64",
            "openSUSE Leap 15.4:reiserfs-kmp-64kb-5.14.21-150400.24.21.2.aarch64",
            "openSUSE Leap 15.4:reiserfs-kmp-default-5.14.21-150400.24.21.2.aarch64",
            "openSUSE Leap 15.4:reiserfs-kmp-default-5.14.21-150400.24.21.2.ppc64le",
            "openSUSE Leap 15.4:reiserfs-kmp-default-5.14.21-150400.24.21.2.s390x",
            "openSUSE Leap 15.4:reiserfs-kmp-default-5.14.21-150400.24.21.2.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 4.1,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:N/I:N/A:H",
            "version": "3.1"
          },
          "products": [
            "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.21.2.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.21.2.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.21.2.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.21.2.x86_64",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.21.2.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.21.2.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.21.2.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.21.2.x86_64",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.21.2.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.21.2.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.21.2.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.21.2.x86_64",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.21.2.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.21.2.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.21.2.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.21.2.x86_64",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.21.2.ppc64le",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.21.2.s390x",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.21.2.x86_64",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.21.2.ppc64le",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.21.2.s390x",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.21.2.x86_64",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_21-default-1-150400.9.3.2.ppc64le",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_21-default-1-150400.9.3.2.s390x",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_21-default-1-150400.9.3.2.x86_64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-64kb-5.14.21-150400.24.21.2.aarch64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-64kb-devel-5.14.21-150400.24.21.2.aarch64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-5.14.21-150400.24.21.2.aarch64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-5.14.21-150400.24.21.2.ppc64le",
            "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-5.14.21-150400.24.21.2.s390x",
            "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-5.14.21-150400.24.21.2.x86_64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-base-5.14.21-150400.24.21.2.150400.24.7.2.aarch64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-base-5.14.21-150400.24.21.2.150400.24.7.2.ppc64le",
            "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-base-5.14.21-150400.24.21.2.150400.24.7.2.s390x",
            "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-base-5.14.21-150400.24.21.2.150400.24.7.2.x86_64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-devel-5.14.21-150400.24.21.2.aarch64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-devel-5.14.21-150400.24.21.2.ppc64le",
            "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-devel-5.14.21-150400.24.21.2.s390x",
            "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-devel-5.14.21-150400.24.21.2.x86_64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-devel-5.14.21-150400.24.21.2.noarch",
            "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-macros-5.14.21-150400.24.21.2.noarch",
            "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-zfcpdump-5.14.21-150400.24.21.2.s390x",
            "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-docs-5.14.21-150400.24.21.3.noarch",
            "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-obs-build-5.14.21-150400.24.21.2.aarch64",
            "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-obs-build-5.14.21-150400.24.21.2.ppc64le",
            "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-obs-build-5.14.21-150400.24.21.2.s390x",
            "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-obs-build-5.14.21-150400.24.21.2.x86_64",
            "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-source-5.14.21-150400.24.21.2.noarch",
            "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-syms-5.14.21-150400.24.21.1.aarch64",
            "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-syms-5.14.21-150400.24.21.1.ppc64le",
            "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-syms-5.14.21-150400.24.21.1.s390x",
            "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-syms-5.14.21-150400.24.21.1.x86_64",
            "SUSE Linux Enterprise Module for Legacy 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.21.2.aarch64",
            "SUSE Linux Enterprise Module for Legacy 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.21.2.ppc64le",
            "SUSE Linux Enterprise Module for Legacy 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.21.2.s390x",
            "SUSE Linux Enterprise Module for Legacy 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.21.2.x86_64",
            "SUSE Linux Enterprise Workstation Extension 15 SP4:kernel-default-extra-5.14.21-150400.24.21.2.x86_64",
            "openSUSE Leap 15.4:cluster-md-kmp-64kb-5.14.21-150400.24.21.2.aarch64",
            "openSUSE Leap 15.4:cluster-md-kmp-default-5.14.21-150400.24.21.2.aarch64",
            "openSUSE Leap 15.4:cluster-md-kmp-default-5.14.21-150400.24.21.2.ppc64le",
            "openSUSE Leap 15.4:cluster-md-kmp-default-5.14.21-150400.24.21.2.s390x",
            "openSUSE Leap 15.4:cluster-md-kmp-default-5.14.21-150400.24.21.2.x86_64",
            "openSUSE Leap 15.4:dlm-kmp-64kb-5.14.21-150400.24.21.2.aarch64",
            "openSUSE Leap 15.4:dlm-kmp-default-5.14.21-150400.24.21.2.aarch64",
            "openSUSE Leap 15.4:dlm-kmp-default-5.14.21-150400.24.21.2.ppc64le",
            "openSUSE Leap 15.4:dlm-kmp-default-5.14.21-150400.24.21.2.s390x",
            "openSUSE Leap 15.4:dlm-kmp-default-5.14.21-150400.24.21.2.x86_64",
            "openSUSE Leap 15.4:dtb-allwinner-5.14.21-150400.24.21.1.aarch64",
            "openSUSE Leap 15.4:dtb-altera-5.14.21-150400.24.21.1.aarch64",
            "openSUSE Leap 15.4:dtb-amazon-5.14.21-150400.24.21.1.aarch64",
            "openSUSE Leap 15.4:dtb-amd-5.14.21-150400.24.21.1.aarch64",
            "openSUSE Leap 15.4:dtb-amlogic-5.14.21-150400.24.21.1.aarch64",
            "openSUSE Leap 15.4:dtb-apm-5.14.21-150400.24.21.1.aarch64",
            "openSUSE Leap 15.4:dtb-apple-5.14.21-150400.24.21.1.aarch64",
            "openSUSE Leap 15.4:dtb-arm-5.14.21-150400.24.21.1.aarch64",
            "openSUSE Leap 15.4:dtb-broadcom-5.14.21-150400.24.21.1.aarch64",
            "openSUSE Leap 15.4:dtb-cavium-5.14.21-150400.24.21.1.aarch64",
            "openSUSE Leap 15.4:dtb-exynos-5.14.21-150400.24.21.1.aarch64",
            "openSUSE Leap 15.4:dtb-freescale-5.14.21-150400.24.21.1.aarch64",
            "openSUSE Leap 15.4:dtb-hisilicon-5.14.21-150400.24.21.1.aarch64",
            "openSUSE Leap 15.4:dtb-lg-5.14.21-150400.24.21.1.aarch64",
            "openSUSE Leap 15.4:dtb-marvell-5.14.21-150400.24.21.1.aarch64",
            "openSUSE Leap 15.4:dtb-mediatek-5.14.21-150400.24.21.1.aarch64",
            "openSUSE Leap 15.4:dtb-nvidia-5.14.21-150400.24.21.1.aarch64",
            "openSUSE Leap 15.4:dtb-qcom-5.14.21-150400.24.21.1.aarch64",
            "openSUSE Leap 15.4:dtb-renesas-5.14.21-150400.24.21.1.aarch64",
            "openSUSE Leap 15.4:dtb-rockchip-5.14.21-150400.24.21.1.aarch64",
            "openSUSE Leap 15.4:dtb-socionext-5.14.21-150400.24.21.1.aarch64",
            "openSUSE Leap 15.4:dtb-sprd-5.14.21-150400.24.21.1.aarch64",
            "openSUSE Leap 15.4:dtb-xilinx-5.14.21-150400.24.21.1.aarch64",
            "openSUSE Leap 15.4:gfs2-kmp-64kb-5.14.21-150400.24.21.2.aarch64",
            "openSUSE Leap 15.4:gfs2-kmp-default-5.14.21-150400.24.21.2.aarch64",
            "openSUSE Leap 15.4:gfs2-kmp-default-5.14.21-150400.24.21.2.ppc64le",
            "openSUSE Leap 15.4:gfs2-kmp-default-5.14.21-150400.24.21.2.s390x",
            "openSUSE Leap 15.4:gfs2-kmp-default-5.14.21-150400.24.21.2.x86_64",
            "openSUSE Leap 15.4:kernel-64kb-5.14.21-150400.24.21.2.aarch64",
            "openSUSE Leap 15.4:kernel-64kb-devel-5.14.21-150400.24.21.2.aarch64",
            "openSUSE Leap 15.4:kernel-64kb-extra-5.14.21-150400.24.21.2.aarch64",
            "openSUSE Leap 15.4:kernel-64kb-livepatch-devel-5.14.21-150400.24.21.2.aarch64",
            "openSUSE Leap 15.4:kernel-64kb-optional-5.14.21-150400.24.21.2.aarch64",
            "openSUSE Leap 15.4:kernel-debug-5.14.21-150400.24.21.2.ppc64le",
            "openSUSE Leap 15.4:kernel-debug-5.14.21-150400.24.21.2.x86_64",
            "openSUSE Leap 15.4:kernel-debug-devel-5.14.21-150400.24.21.2.ppc64le",
            "openSUSE Leap 15.4:kernel-debug-devel-5.14.21-150400.24.21.2.x86_64",
            "openSUSE Leap 15.4:kernel-debug-livepatch-devel-5.14.21-150400.24.21.2.ppc64le",
            "openSUSE Leap 15.4:kernel-debug-livepatch-devel-5.14.21-150400.24.21.2.x86_64",
            "openSUSE Leap 15.4:kernel-default-5.14.21-150400.24.21.2.aarch64",
            "openSUSE Leap 15.4:kernel-default-5.14.21-150400.24.21.2.ppc64le",
            "openSUSE Leap 15.4:kernel-default-5.14.21-150400.24.21.2.s390x",
            "openSUSE Leap 15.4:kernel-default-5.14.21-150400.24.21.2.x86_64",
            "openSUSE Leap 15.4:kernel-default-base-5.14.21-150400.24.21.2.150400.24.7.2.aarch64",
            "openSUSE Leap 15.4:kernel-default-base-5.14.21-150400.24.21.2.150400.24.7.2.ppc64le",
            "openSUSE Leap 15.4:kernel-default-base-5.14.21-150400.24.21.2.150400.24.7.2.s390x",
            "openSUSE Leap 15.4:kernel-default-base-5.14.21-150400.24.21.2.150400.24.7.2.x86_64",
            "openSUSE Leap 15.4:kernel-default-base-rebuild-5.14.21-150400.24.21.2.150400.24.7.2.aarch64",
            "openSUSE Leap 15.4:kernel-default-base-rebuild-5.14.21-150400.24.21.2.150400.24.7.2.ppc64le",
            "openSUSE Leap 15.4:kernel-default-base-rebuild-5.14.21-150400.24.21.2.150400.24.7.2.s390x",
            "openSUSE Leap 15.4:kernel-default-base-rebuild-5.14.21-150400.24.21.2.150400.24.7.2.x86_64",
            "openSUSE Leap 15.4:kernel-default-devel-5.14.21-150400.24.21.2.aarch64",
            "openSUSE Leap 15.4:kernel-default-devel-5.14.21-150400.24.21.2.ppc64le",
            "openSUSE Leap 15.4:kernel-default-devel-5.14.21-150400.24.21.2.s390x",
            "openSUSE Leap 15.4:kernel-default-devel-5.14.21-150400.24.21.2.x86_64",
            "openSUSE Leap 15.4:kernel-default-extra-5.14.21-150400.24.21.2.aarch64",
            "openSUSE Leap 15.4:kernel-default-extra-5.14.21-150400.24.21.2.ppc64le",
            "openSUSE Leap 15.4:kernel-default-extra-5.14.21-150400.24.21.2.s390x",
            "openSUSE Leap 15.4:kernel-default-extra-5.14.21-150400.24.21.2.x86_64",
            "openSUSE Leap 15.4:kernel-default-livepatch-5.14.21-150400.24.21.2.aarch64",
            "openSUSE Leap 15.4:kernel-default-livepatch-5.14.21-150400.24.21.2.ppc64le",
            "openSUSE Leap 15.4:kernel-default-livepatch-5.14.21-150400.24.21.2.s390x",
            "openSUSE Leap 15.4:kernel-default-livepatch-5.14.21-150400.24.21.2.x86_64",
            "openSUSE Leap 15.4:kernel-default-livepatch-devel-5.14.21-150400.24.21.2.aarch64",
            "openSUSE Leap 15.4:kernel-default-livepatch-devel-5.14.21-150400.24.21.2.ppc64le",
            "openSUSE Leap 15.4:kernel-default-livepatch-devel-5.14.21-150400.24.21.2.s390x",
            "openSUSE Leap 15.4:kernel-default-livepatch-devel-5.14.21-150400.24.21.2.x86_64",
            "openSUSE Leap 15.4:kernel-default-optional-5.14.21-150400.24.21.2.aarch64",
            "openSUSE Leap 15.4:kernel-default-optional-5.14.21-150400.24.21.2.ppc64le",
            "openSUSE Leap 15.4:kernel-default-optional-5.14.21-150400.24.21.2.s390x",
            "openSUSE Leap 15.4:kernel-default-optional-5.14.21-150400.24.21.2.x86_64",
            "openSUSE Leap 15.4:kernel-devel-5.14.21-150400.24.21.2.noarch",
            "openSUSE Leap 15.4:kernel-docs-5.14.21-150400.24.21.3.noarch",
            "openSUSE Leap 15.4:kernel-docs-html-5.14.21-150400.24.21.3.noarch",
            "openSUSE Leap 15.4:kernel-kvmsmall-5.14.21-150400.24.21.2.aarch64",
            "openSUSE Leap 15.4:kernel-kvmsmall-5.14.21-150400.24.21.2.ppc64le",
            "openSUSE Leap 15.4:kernel-kvmsmall-5.14.21-150400.24.21.2.x86_64",
            "openSUSE Leap 15.4:kernel-kvmsmall-devel-5.14.21-150400.24.21.2.aarch64",
            "openSUSE Leap 15.4:kernel-kvmsmall-devel-5.14.21-150400.24.21.2.ppc64le",
            "openSUSE Leap 15.4:kernel-kvmsmall-devel-5.14.21-150400.24.21.2.x86_64",
            "openSUSE Leap 15.4:kernel-kvmsmall-livepatch-devel-5.14.21-150400.24.21.2.aarch64",
            "openSUSE Leap 15.4:kernel-kvmsmall-livepatch-devel-5.14.21-150400.24.21.2.ppc64le",
            "openSUSE Leap 15.4:kernel-kvmsmall-livepatch-devel-5.14.21-150400.24.21.2.x86_64",
            "openSUSE Leap 15.4:kernel-macros-5.14.21-150400.24.21.2.noarch",
            "openSUSE Leap 15.4:kernel-obs-build-5.14.21-150400.24.21.2.aarch64",
            "openSUSE Leap 15.4:kernel-obs-build-5.14.21-150400.24.21.2.ppc64le",
            "openSUSE Leap 15.4:kernel-obs-build-5.14.21-150400.24.21.2.s390x",
            "openSUSE Leap 15.4:kernel-obs-build-5.14.21-150400.24.21.2.x86_64",
            "openSUSE Leap 15.4:kernel-obs-qa-5.14.21-150400.24.21.1.aarch64",
            "openSUSE Leap 15.4:kernel-obs-qa-5.14.21-150400.24.21.1.ppc64le",
            "openSUSE Leap 15.4:kernel-obs-qa-5.14.21-150400.24.21.1.s390x",
            "openSUSE Leap 15.4:kernel-obs-qa-5.14.21-150400.24.21.1.x86_64",
            "openSUSE Leap 15.4:kernel-source-5.14.21-150400.24.21.2.noarch",
            "openSUSE Leap 15.4:kernel-source-vanilla-5.14.21-150400.24.21.2.noarch",
            "openSUSE Leap 15.4:kernel-syms-5.14.21-150400.24.21.1.aarch64",
            "openSUSE Leap 15.4:kernel-syms-5.14.21-150400.24.21.1.ppc64le",
            "openSUSE Leap 15.4:kernel-syms-5.14.21-150400.24.21.1.s390x",
            "openSUSE Leap 15.4:kernel-syms-5.14.21-150400.24.21.1.x86_64",
            "openSUSE Leap 15.4:kernel-zfcpdump-5.14.21-150400.24.21.2.s390x",
            "openSUSE Leap 15.4:kselftests-kmp-64kb-5.14.21-150400.24.21.2.aarch64",
            "openSUSE Leap 15.4:kselftests-kmp-default-5.14.21-150400.24.21.2.aarch64",
            "openSUSE Leap 15.4:kselftests-kmp-default-5.14.21-150400.24.21.2.ppc64le",
            "openSUSE Leap 15.4:kselftests-kmp-default-5.14.21-150400.24.21.2.s390x",
            "openSUSE Leap 15.4:kselftests-kmp-default-5.14.21-150400.24.21.2.x86_64",
            "openSUSE Leap 15.4:ocfs2-kmp-64kb-5.14.21-150400.24.21.2.aarch64",
            "openSUSE Leap 15.4:ocfs2-kmp-default-5.14.21-150400.24.21.2.aarch64",
            "openSUSE Leap 15.4:ocfs2-kmp-default-5.14.21-150400.24.21.2.ppc64le",
            "openSUSE Leap 15.4:ocfs2-kmp-default-5.14.21-150400.24.21.2.s390x",
            "openSUSE Leap 15.4:ocfs2-kmp-default-5.14.21-150400.24.21.2.x86_64",
            "openSUSE Leap 15.4:reiserfs-kmp-64kb-5.14.21-150400.24.21.2.aarch64",
            "openSUSE Leap 15.4:reiserfs-kmp-default-5.14.21-150400.24.21.2.aarch64",
            "openSUSE Leap 15.4:reiserfs-kmp-default-5.14.21-150400.24.21.2.ppc64le",
            "openSUSE Leap 15.4:reiserfs-kmp-default-5.14.21-150400.24.21.2.s390x",
            "openSUSE Leap 15.4:reiserfs-kmp-default-5.14.21-150400.24.21.2.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2022-09-16T15:30:19Z",
          "details": "moderate"
        }
      ],
      "title": "CVE-2022-36879"
    },
    {
      "cve": "CVE-2022-36946",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2022-36946"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "nfqnl_mangle in net/netfilter/nfnetlink_queue.c in the Linux kernel through 5.18.14 allows remote attackers to cause a denial of service (panic) because, in the case of an nf_queue verdict with a one-byte nfta_payload attribute, an skb_pull can encounter a negative skb-\u003elen.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.21.2.aarch64",
          "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.21.2.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.21.2.s390x",
          "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.21.2.x86_64",
          "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.21.2.aarch64",
          "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.21.2.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.21.2.s390x",
          "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.21.2.x86_64",
          "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.21.2.aarch64",
          "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.21.2.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.21.2.s390x",
          "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.21.2.x86_64",
          "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.21.2.aarch64",
          "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.21.2.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.21.2.s390x",
          "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.21.2.x86_64",
          "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.21.2.ppc64le",
          "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.21.2.s390x",
          "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.21.2.x86_64",
          "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.21.2.ppc64le",
          "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.21.2.s390x",
          "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.21.2.x86_64",
          "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_21-default-1-150400.9.3.2.ppc64le",
          "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_21-default-1-150400.9.3.2.s390x",
          "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_21-default-1-150400.9.3.2.x86_64",
          "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-64kb-5.14.21-150400.24.21.2.aarch64",
          "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-64kb-devel-5.14.21-150400.24.21.2.aarch64",
          "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-5.14.21-150400.24.21.2.aarch64",
          "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-5.14.21-150400.24.21.2.ppc64le",
          "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-5.14.21-150400.24.21.2.s390x",
          "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-5.14.21-150400.24.21.2.x86_64",
          "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-base-5.14.21-150400.24.21.2.150400.24.7.2.aarch64",
          "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-base-5.14.21-150400.24.21.2.150400.24.7.2.ppc64le",
          "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-base-5.14.21-150400.24.21.2.150400.24.7.2.s390x",
          "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-base-5.14.21-150400.24.21.2.150400.24.7.2.x86_64",
          "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-devel-5.14.21-150400.24.21.2.aarch64",
          "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-devel-5.14.21-150400.24.21.2.ppc64le",
          "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-devel-5.14.21-150400.24.21.2.s390x",
          "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-devel-5.14.21-150400.24.21.2.x86_64",
          "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-devel-5.14.21-150400.24.21.2.noarch",
          "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-macros-5.14.21-150400.24.21.2.noarch",
          "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-zfcpdump-5.14.21-150400.24.21.2.s390x",
          "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-docs-5.14.21-150400.24.21.3.noarch",
          "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-obs-build-5.14.21-150400.24.21.2.aarch64",
          "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-obs-build-5.14.21-150400.24.21.2.ppc64le",
          "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-obs-build-5.14.21-150400.24.21.2.s390x",
          "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-obs-build-5.14.21-150400.24.21.2.x86_64",
          "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-source-5.14.21-150400.24.21.2.noarch",
          "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-syms-5.14.21-150400.24.21.1.aarch64",
          "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-syms-5.14.21-150400.24.21.1.ppc64le",
          "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-syms-5.14.21-150400.24.21.1.s390x",
          "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-syms-5.14.21-150400.24.21.1.x86_64",
          "SUSE Linux Enterprise Module for Legacy 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.21.2.aarch64",
          "SUSE Linux Enterprise Module for Legacy 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.21.2.ppc64le",
          "SUSE Linux Enterprise Module for Legacy 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.21.2.s390x",
          "SUSE Linux Enterprise Module for Legacy 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.21.2.x86_64",
          "SUSE Linux Enterprise Workstation Extension 15 SP4:kernel-default-extra-5.14.21-150400.24.21.2.x86_64",
          "openSUSE Leap 15.4:cluster-md-kmp-64kb-5.14.21-150400.24.21.2.aarch64",
          "openSUSE Leap 15.4:cluster-md-kmp-default-5.14.21-150400.24.21.2.aarch64",
          "openSUSE Leap 15.4:cluster-md-kmp-default-5.14.21-150400.24.21.2.ppc64le",
          "openSUSE Leap 15.4:cluster-md-kmp-default-5.14.21-150400.24.21.2.s390x",
          "openSUSE Leap 15.4:cluster-md-kmp-default-5.14.21-150400.24.21.2.x86_64",
          "openSUSE Leap 15.4:dlm-kmp-64kb-5.14.21-150400.24.21.2.aarch64",
          "openSUSE Leap 15.4:dlm-kmp-default-5.14.21-150400.24.21.2.aarch64",
          "openSUSE Leap 15.4:dlm-kmp-default-5.14.21-150400.24.21.2.ppc64le",
          "openSUSE Leap 15.4:dlm-kmp-default-5.14.21-150400.24.21.2.s390x",
          "openSUSE Leap 15.4:dlm-kmp-default-5.14.21-150400.24.21.2.x86_64",
          "openSUSE Leap 15.4:dtb-allwinner-5.14.21-150400.24.21.1.aarch64",
          "openSUSE Leap 15.4:dtb-altera-5.14.21-150400.24.21.1.aarch64",
          "openSUSE Leap 15.4:dtb-amazon-5.14.21-150400.24.21.1.aarch64",
          "openSUSE Leap 15.4:dtb-amd-5.14.21-150400.24.21.1.aarch64",
          "openSUSE Leap 15.4:dtb-amlogic-5.14.21-150400.24.21.1.aarch64",
          "openSUSE Leap 15.4:dtb-apm-5.14.21-150400.24.21.1.aarch64",
          "openSUSE Leap 15.4:dtb-apple-5.14.21-150400.24.21.1.aarch64",
          "openSUSE Leap 15.4:dtb-arm-5.14.21-150400.24.21.1.aarch64",
          "openSUSE Leap 15.4:dtb-broadcom-5.14.21-150400.24.21.1.aarch64",
          "openSUSE Leap 15.4:dtb-cavium-5.14.21-150400.24.21.1.aarch64",
          "openSUSE Leap 15.4:dtb-exynos-5.14.21-150400.24.21.1.aarch64",
          "openSUSE Leap 15.4:dtb-freescale-5.14.21-150400.24.21.1.aarch64",
          "openSUSE Leap 15.4:dtb-hisilicon-5.14.21-150400.24.21.1.aarch64",
          "openSUSE Leap 15.4:dtb-lg-5.14.21-150400.24.21.1.aarch64",
          "openSUSE Leap 15.4:dtb-marvell-5.14.21-150400.24.21.1.aarch64",
          "openSUSE Leap 15.4:dtb-mediatek-5.14.21-150400.24.21.1.aarch64",
          "openSUSE Leap 15.4:dtb-nvidia-5.14.21-150400.24.21.1.aarch64",
          "openSUSE Leap 15.4:dtb-qcom-5.14.21-150400.24.21.1.aarch64",
          "openSUSE Leap 15.4:dtb-renesas-5.14.21-150400.24.21.1.aarch64",
          "openSUSE Leap 15.4:dtb-rockchip-5.14.21-150400.24.21.1.aarch64",
          "openSUSE Leap 15.4:dtb-socionext-5.14.21-150400.24.21.1.aarch64",
          "openSUSE Leap 15.4:dtb-sprd-5.14.21-150400.24.21.1.aarch64",
          "openSUSE Leap 15.4:dtb-xilinx-5.14.21-150400.24.21.1.aarch64",
          "openSUSE Leap 15.4:gfs2-kmp-64kb-5.14.21-150400.24.21.2.aarch64",
          "openSUSE Leap 15.4:gfs2-kmp-default-5.14.21-150400.24.21.2.aarch64",
          "openSUSE Leap 15.4:gfs2-kmp-default-5.14.21-150400.24.21.2.ppc64le",
          "openSUSE Leap 15.4:gfs2-kmp-default-5.14.21-150400.24.21.2.s390x",
          "openSUSE Leap 15.4:gfs2-kmp-default-5.14.21-150400.24.21.2.x86_64",
          "openSUSE Leap 15.4:kernel-64kb-5.14.21-150400.24.21.2.aarch64",
          "openSUSE Leap 15.4:kernel-64kb-devel-5.14.21-150400.24.21.2.aarch64",
          "openSUSE Leap 15.4:kernel-64kb-extra-5.14.21-150400.24.21.2.aarch64",
          "openSUSE Leap 15.4:kernel-64kb-livepatch-devel-5.14.21-150400.24.21.2.aarch64",
          "openSUSE Leap 15.4:kernel-64kb-optional-5.14.21-150400.24.21.2.aarch64",
          "openSUSE Leap 15.4:kernel-debug-5.14.21-150400.24.21.2.ppc64le",
          "openSUSE Leap 15.4:kernel-debug-5.14.21-150400.24.21.2.x86_64",
          "openSUSE Leap 15.4:kernel-debug-devel-5.14.21-150400.24.21.2.ppc64le",
          "openSUSE Leap 15.4:kernel-debug-devel-5.14.21-150400.24.21.2.x86_64",
          "openSUSE Leap 15.4:kernel-debug-livepatch-devel-5.14.21-150400.24.21.2.ppc64le",
          "openSUSE Leap 15.4:kernel-debug-livepatch-devel-5.14.21-150400.24.21.2.x86_64",
          "openSUSE Leap 15.4:kernel-default-5.14.21-150400.24.21.2.aarch64",
          "openSUSE Leap 15.4:kernel-default-5.14.21-150400.24.21.2.ppc64le",
          "openSUSE Leap 15.4:kernel-default-5.14.21-150400.24.21.2.s390x",
          "openSUSE Leap 15.4:kernel-default-5.14.21-150400.24.21.2.x86_64",
          "openSUSE Leap 15.4:kernel-default-base-5.14.21-150400.24.21.2.150400.24.7.2.aarch64",
          "openSUSE Leap 15.4:kernel-default-base-5.14.21-150400.24.21.2.150400.24.7.2.ppc64le",
          "openSUSE Leap 15.4:kernel-default-base-5.14.21-150400.24.21.2.150400.24.7.2.s390x",
          "openSUSE Leap 15.4:kernel-default-base-5.14.21-150400.24.21.2.150400.24.7.2.x86_64",
          "openSUSE Leap 15.4:kernel-default-base-rebuild-5.14.21-150400.24.21.2.150400.24.7.2.aarch64",
          "openSUSE Leap 15.4:kernel-default-base-rebuild-5.14.21-150400.24.21.2.150400.24.7.2.ppc64le",
          "openSUSE Leap 15.4:kernel-default-base-rebuild-5.14.21-150400.24.21.2.150400.24.7.2.s390x",
          "openSUSE Leap 15.4:kernel-default-base-rebuild-5.14.21-150400.24.21.2.150400.24.7.2.x86_64",
          "openSUSE Leap 15.4:kernel-default-devel-5.14.21-150400.24.21.2.aarch64",
          "openSUSE Leap 15.4:kernel-default-devel-5.14.21-150400.24.21.2.ppc64le",
          "openSUSE Leap 15.4:kernel-default-devel-5.14.21-150400.24.21.2.s390x",
          "openSUSE Leap 15.4:kernel-default-devel-5.14.21-150400.24.21.2.x86_64",
          "openSUSE Leap 15.4:kernel-default-extra-5.14.21-150400.24.21.2.aarch64",
          "openSUSE Leap 15.4:kernel-default-extra-5.14.21-150400.24.21.2.ppc64le",
          "openSUSE Leap 15.4:kernel-default-extra-5.14.21-150400.24.21.2.s390x",
          "openSUSE Leap 15.4:kernel-default-extra-5.14.21-150400.24.21.2.x86_64",
          "openSUSE Leap 15.4:kernel-default-livepatch-5.14.21-150400.24.21.2.aarch64",
          "openSUSE Leap 15.4:kernel-default-livepatch-5.14.21-150400.24.21.2.ppc64le",
          "openSUSE Leap 15.4:kernel-default-livepatch-5.14.21-150400.24.21.2.s390x",
          "openSUSE Leap 15.4:kernel-default-livepatch-5.14.21-150400.24.21.2.x86_64",
          "openSUSE Leap 15.4:kernel-default-livepatch-devel-5.14.21-150400.24.21.2.aarch64",
          "openSUSE Leap 15.4:kernel-default-livepatch-devel-5.14.21-150400.24.21.2.ppc64le",
          "openSUSE Leap 15.4:kernel-default-livepatch-devel-5.14.21-150400.24.21.2.s390x",
          "openSUSE Leap 15.4:kernel-default-livepatch-devel-5.14.21-150400.24.21.2.x86_64",
          "openSUSE Leap 15.4:kernel-default-optional-5.14.21-150400.24.21.2.aarch64",
          "openSUSE Leap 15.4:kernel-default-optional-5.14.21-150400.24.21.2.ppc64le",
          "openSUSE Leap 15.4:kernel-default-optional-5.14.21-150400.24.21.2.s390x",
          "openSUSE Leap 15.4:kernel-default-optional-5.14.21-150400.24.21.2.x86_64",
          "openSUSE Leap 15.4:kernel-devel-5.14.21-150400.24.21.2.noarch",
          "openSUSE Leap 15.4:kernel-docs-5.14.21-150400.24.21.3.noarch",
          "openSUSE Leap 15.4:kernel-docs-html-5.14.21-150400.24.21.3.noarch",
          "openSUSE Leap 15.4:kernel-kvmsmall-5.14.21-150400.24.21.2.aarch64",
          "openSUSE Leap 15.4:kernel-kvmsmall-5.14.21-150400.24.21.2.ppc64le",
          "openSUSE Leap 15.4:kernel-kvmsmall-5.14.21-150400.24.21.2.x86_64",
          "openSUSE Leap 15.4:kernel-kvmsmall-devel-5.14.21-150400.24.21.2.aarch64",
          "openSUSE Leap 15.4:kernel-kvmsmall-devel-5.14.21-150400.24.21.2.ppc64le",
          "openSUSE Leap 15.4:kernel-kvmsmall-devel-5.14.21-150400.24.21.2.x86_64",
          "openSUSE Leap 15.4:kernel-kvmsmall-livepatch-devel-5.14.21-150400.24.21.2.aarch64",
          "openSUSE Leap 15.4:kernel-kvmsmall-livepatch-devel-5.14.21-150400.24.21.2.ppc64le",
          "openSUSE Leap 15.4:kernel-kvmsmall-livepatch-devel-5.14.21-150400.24.21.2.x86_64",
          "openSUSE Leap 15.4:kernel-macros-5.14.21-150400.24.21.2.noarch",
          "openSUSE Leap 15.4:kernel-obs-build-5.14.21-150400.24.21.2.aarch64",
          "openSUSE Leap 15.4:kernel-obs-build-5.14.21-150400.24.21.2.ppc64le",
          "openSUSE Leap 15.4:kernel-obs-build-5.14.21-150400.24.21.2.s390x",
          "openSUSE Leap 15.4:kernel-obs-build-5.14.21-150400.24.21.2.x86_64",
          "openSUSE Leap 15.4:kernel-obs-qa-5.14.21-150400.24.21.1.aarch64",
          "openSUSE Leap 15.4:kernel-obs-qa-5.14.21-150400.24.21.1.ppc64le",
          "openSUSE Leap 15.4:kernel-obs-qa-5.14.21-150400.24.21.1.s390x",
          "openSUSE Leap 15.4:kernel-obs-qa-5.14.21-150400.24.21.1.x86_64",
          "openSUSE Leap 15.4:kernel-source-5.14.21-150400.24.21.2.noarch",
          "openSUSE Leap 15.4:kernel-source-vanilla-5.14.21-150400.24.21.2.noarch",
          "openSUSE Leap 15.4:kernel-syms-5.14.21-150400.24.21.1.aarch64",
          "openSUSE Leap 15.4:kernel-syms-5.14.21-150400.24.21.1.ppc64le",
          "openSUSE Leap 15.4:kernel-syms-5.14.21-150400.24.21.1.s390x",
          "openSUSE Leap 15.4:kernel-syms-5.14.21-150400.24.21.1.x86_64",
          "openSUSE Leap 15.4:kernel-zfcpdump-5.14.21-150400.24.21.2.s390x",
          "openSUSE Leap 15.4:kselftests-kmp-64kb-5.14.21-150400.24.21.2.aarch64",
          "openSUSE Leap 15.4:kselftests-kmp-default-5.14.21-150400.24.21.2.aarch64",
          "openSUSE Leap 15.4:kselftests-kmp-default-5.14.21-150400.24.21.2.ppc64le",
          "openSUSE Leap 15.4:kselftests-kmp-default-5.14.21-150400.24.21.2.s390x",
          "openSUSE Leap 15.4:kselftests-kmp-default-5.14.21-150400.24.21.2.x86_64",
          "openSUSE Leap 15.4:ocfs2-kmp-64kb-5.14.21-150400.24.21.2.aarch64",
          "openSUSE Leap 15.4:ocfs2-kmp-default-5.14.21-150400.24.21.2.aarch64",
          "openSUSE Leap 15.4:ocfs2-kmp-default-5.14.21-150400.24.21.2.ppc64le",
          "openSUSE Leap 15.4:ocfs2-kmp-default-5.14.21-150400.24.21.2.s390x",
          "openSUSE Leap 15.4:ocfs2-kmp-default-5.14.21-150400.24.21.2.x86_64",
          "openSUSE Leap 15.4:reiserfs-kmp-64kb-5.14.21-150400.24.21.2.aarch64",
          "openSUSE Leap 15.4:reiserfs-kmp-default-5.14.21-150400.24.21.2.aarch64",
          "openSUSE Leap 15.4:reiserfs-kmp-default-5.14.21-150400.24.21.2.ppc64le",
          "openSUSE Leap 15.4:reiserfs-kmp-default-5.14.21-150400.24.21.2.s390x",
          "openSUSE Leap 15.4:reiserfs-kmp-default-5.14.21-150400.24.21.2.x86_64"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2022-36946",
          "url": "https://www.suse.com/security/cve/CVE-2022-36946"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1201940 for CVE-2022-36946",
          "url": "https://bugzilla.suse.com/1201940"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1201941 for CVE-2022-36946",
          "url": "https://bugzilla.suse.com/1201941"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1202312 for CVE-2022-36946",
          "url": "https://bugzilla.suse.com/1202312"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1202874 for CVE-2022-36946",
          "url": "https://bugzilla.suse.com/1202874"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1203208 for CVE-2022-36946",
          "url": "https://bugzilla.suse.com/1203208"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1204132 for CVE-2022-36946",
          "url": "https://bugzilla.suse.com/1204132"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1205313 for CVE-2022-36946",
          "url": "https://bugzilla.suse.com/1205313"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1212310 for CVE-2022-36946",
          "url": "https://bugzilla.suse.com/1212310"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.21.2.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.21.2.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.21.2.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.21.2.x86_64",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.21.2.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.21.2.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.21.2.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.21.2.x86_64",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.21.2.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.21.2.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.21.2.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.21.2.x86_64",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.21.2.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.21.2.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.21.2.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.21.2.x86_64",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.21.2.ppc64le",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.21.2.s390x",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.21.2.x86_64",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.21.2.ppc64le",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.21.2.s390x",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.21.2.x86_64",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_21-default-1-150400.9.3.2.ppc64le",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_21-default-1-150400.9.3.2.s390x",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_21-default-1-150400.9.3.2.x86_64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-64kb-5.14.21-150400.24.21.2.aarch64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-64kb-devel-5.14.21-150400.24.21.2.aarch64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-5.14.21-150400.24.21.2.aarch64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-5.14.21-150400.24.21.2.ppc64le",
            "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-5.14.21-150400.24.21.2.s390x",
            "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-5.14.21-150400.24.21.2.x86_64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-base-5.14.21-150400.24.21.2.150400.24.7.2.aarch64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-base-5.14.21-150400.24.21.2.150400.24.7.2.ppc64le",
            "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-base-5.14.21-150400.24.21.2.150400.24.7.2.s390x",
            "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-base-5.14.21-150400.24.21.2.150400.24.7.2.x86_64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-devel-5.14.21-150400.24.21.2.aarch64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-devel-5.14.21-150400.24.21.2.ppc64le",
            "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-devel-5.14.21-150400.24.21.2.s390x",
            "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-devel-5.14.21-150400.24.21.2.x86_64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-devel-5.14.21-150400.24.21.2.noarch",
            "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-macros-5.14.21-150400.24.21.2.noarch",
            "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-zfcpdump-5.14.21-150400.24.21.2.s390x",
            "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-docs-5.14.21-150400.24.21.3.noarch",
            "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-obs-build-5.14.21-150400.24.21.2.aarch64",
            "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-obs-build-5.14.21-150400.24.21.2.ppc64le",
            "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-obs-build-5.14.21-150400.24.21.2.s390x",
            "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-obs-build-5.14.21-150400.24.21.2.x86_64",
            "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-source-5.14.21-150400.24.21.2.noarch",
            "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-syms-5.14.21-150400.24.21.1.aarch64",
            "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-syms-5.14.21-150400.24.21.1.ppc64le",
            "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-syms-5.14.21-150400.24.21.1.s390x",
            "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-syms-5.14.21-150400.24.21.1.x86_64",
            "SUSE Linux Enterprise Module for Legacy 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.21.2.aarch64",
            "SUSE Linux Enterprise Module for Legacy 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.21.2.ppc64le",
            "SUSE Linux Enterprise Module for Legacy 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.21.2.s390x",
            "SUSE Linux Enterprise Module for Legacy 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.21.2.x86_64",
            "SUSE Linux Enterprise Workstation Extension 15 SP4:kernel-default-extra-5.14.21-150400.24.21.2.x86_64",
            "openSUSE Leap 15.4:cluster-md-kmp-64kb-5.14.21-150400.24.21.2.aarch64",
            "openSUSE Leap 15.4:cluster-md-kmp-default-5.14.21-150400.24.21.2.aarch64",
            "openSUSE Leap 15.4:cluster-md-kmp-default-5.14.21-150400.24.21.2.ppc64le",
            "openSUSE Leap 15.4:cluster-md-kmp-default-5.14.21-150400.24.21.2.s390x",
            "openSUSE Leap 15.4:cluster-md-kmp-default-5.14.21-150400.24.21.2.x86_64",
            "openSUSE Leap 15.4:dlm-kmp-64kb-5.14.21-150400.24.21.2.aarch64",
            "openSUSE Leap 15.4:dlm-kmp-default-5.14.21-150400.24.21.2.aarch64",
            "openSUSE Leap 15.4:dlm-kmp-default-5.14.21-150400.24.21.2.ppc64le",
            "openSUSE Leap 15.4:dlm-kmp-default-5.14.21-150400.24.21.2.s390x",
            "openSUSE Leap 15.4:dlm-kmp-default-5.14.21-150400.24.21.2.x86_64",
            "openSUSE Leap 15.4:dtb-allwinner-5.14.21-150400.24.21.1.aarch64",
            "openSUSE Leap 15.4:dtb-altera-5.14.21-150400.24.21.1.aarch64",
            "openSUSE Leap 15.4:dtb-amazon-5.14.21-150400.24.21.1.aarch64",
            "openSUSE Leap 15.4:dtb-amd-5.14.21-150400.24.21.1.aarch64",
            "openSUSE Leap 15.4:dtb-amlogic-5.14.21-150400.24.21.1.aarch64",
            "openSUSE Leap 15.4:dtb-apm-5.14.21-150400.24.21.1.aarch64",
            "openSUSE Leap 15.4:dtb-apple-5.14.21-150400.24.21.1.aarch64",
            "openSUSE Leap 15.4:dtb-arm-5.14.21-150400.24.21.1.aarch64",
            "openSUSE Leap 15.4:dtb-broadcom-5.14.21-150400.24.21.1.aarch64",
            "openSUSE Leap 15.4:dtb-cavium-5.14.21-150400.24.21.1.aarch64",
            "openSUSE Leap 15.4:dtb-exynos-5.14.21-150400.24.21.1.aarch64",
            "openSUSE Leap 15.4:dtb-freescale-5.14.21-150400.24.21.1.aarch64",
            "openSUSE Leap 15.4:dtb-hisilicon-5.14.21-150400.24.21.1.aarch64",
            "openSUSE Leap 15.4:dtb-lg-5.14.21-150400.24.21.1.aarch64",
            "openSUSE Leap 15.4:dtb-marvell-5.14.21-150400.24.21.1.aarch64",
            "openSUSE Leap 15.4:dtb-mediatek-5.14.21-150400.24.21.1.aarch64",
            "openSUSE Leap 15.4:dtb-nvidia-5.14.21-150400.24.21.1.aarch64",
            "openSUSE Leap 15.4:dtb-qcom-5.14.21-150400.24.21.1.aarch64",
            "openSUSE Leap 15.4:dtb-renesas-5.14.21-150400.24.21.1.aarch64",
            "openSUSE Leap 15.4:dtb-rockchip-5.14.21-150400.24.21.1.aarch64",
            "openSUSE Leap 15.4:dtb-socionext-5.14.21-150400.24.21.1.aarch64",
            "openSUSE Leap 15.4:dtb-sprd-5.14.21-150400.24.21.1.aarch64",
            "openSUSE Leap 15.4:dtb-xilinx-5.14.21-150400.24.21.1.aarch64",
            "openSUSE Leap 15.4:gfs2-kmp-64kb-5.14.21-150400.24.21.2.aarch64",
            "openSUSE Leap 15.4:gfs2-kmp-default-5.14.21-150400.24.21.2.aarch64",
            "openSUSE Leap 15.4:gfs2-kmp-default-5.14.21-150400.24.21.2.ppc64le",
            "openSUSE Leap 15.4:gfs2-kmp-default-5.14.21-150400.24.21.2.s390x",
            "openSUSE Leap 15.4:gfs2-kmp-default-5.14.21-150400.24.21.2.x86_64",
            "openSUSE Leap 15.4:kernel-64kb-5.14.21-150400.24.21.2.aarch64",
            "openSUSE Leap 15.4:kernel-64kb-devel-5.14.21-150400.24.21.2.aarch64",
            "openSUSE Leap 15.4:kernel-64kb-extra-5.14.21-150400.24.21.2.aarch64",
            "openSUSE Leap 15.4:kernel-64kb-livepatch-devel-5.14.21-150400.24.21.2.aarch64",
            "openSUSE Leap 15.4:kernel-64kb-optional-5.14.21-150400.24.21.2.aarch64",
            "openSUSE Leap 15.4:kernel-debug-5.14.21-150400.24.21.2.ppc64le",
            "openSUSE Leap 15.4:kernel-debug-5.14.21-150400.24.21.2.x86_64",
            "openSUSE Leap 15.4:kernel-debug-devel-5.14.21-150400.24.21.2.ppc64le",
            "openSUSE Leap 15.4:kernel-debug-devel-5.14.21-150400.24.21.2.x86_64",
            "openSUSE Leap 15.4:kernel-debug-livepatch-devel-5.14.21-150400.24.21.2.ppc64le",
            "openSUSE Leap 15.4:kernel-debug-livepatch-devel-5.14.21-150400.24.21.2.x86_64",
            "openSUSE Leap 15.4:kernel-default-5.14.21-150400.24.21.2.aarch64",
            "openSUSE Leap 15.4:kernel-default-5.14.21-150400.24.21.2.ppc64le",
            "openSUSE Leap 15.4:kernel-default-5.14.21-150400.24.21.2.s390x",
            "openSUSE Leap 15.4:kernel-default-5.14.21-150400.24.21.2.x86_64",
            "openSUSE Leap 15.4:kernel-default-base-5.14.21-150400.24.21.2.150400.24.7.2.aarch64",
            "openSUSE Leap 15.4:kernel-default-base-5.14.21-150400.24.21.2.150400.24.7.2.ppc64le",
            "openSUSE Leap 15.4:kernel-default-base-5.14.21-150400.24.21.2.150400.24.7.2.s390x",
            "openSUSE Leap 15.4:kernel-default-base-5.14.21-150400.24.21.2.150400.24.7.2.x86_64",
            "openSUSE Leap 15.4:kernel-default-base-rebuild-5.14.21-150400.24.21.2.150400.24.7.2.aarch64",
            "openSUSE Leap 15.4:kernel-default-base-rebuild-5.14.21-150400.24.21.2.150400.24.7.2.ppc64le",
            "openSUSE Leap 15.4:kernel-default-base-rebuild-5.14.21-150400.24.21.2.150400.24.7.2.s390x",
            "openSUSE Leap 15.4:kernel-default-base-rebuild-5.14.21-150400.24.21.2.150400.24.7.2.x86_64",
            "openSUSE Leap 15.4:kernel-default-devel-5.14.21-150400.24.21.2.aarch64",
            "openSUSE Leap 15.4:kernel-default-devel-5.14.21-150400.24.21.2.ppc64le",
            "openSUSE Leap 15.4:kernel-default-devel-5.14.21-150400.24.21.2.s390x",
            "openSUSE Leap 15.4:kernel-default-devel-5.14.21-150400.24.21.2.x86_64",
            "openSUSE Leap 15.4:kernel-default-extra-5.14.21-150400.24.21.2.aarch64",
            "openSUSE Leap 15.4:kernel-default-extra-5.14.21-150400.24.21.2.ppc64le",
            "openSUSE Leap 15.4:kernel-default-extra-5.14.21-150400.24.21.2.s390x",
            "openSUSE Leap 15.4:kernel-default-extra-5.14.21-150400.24.21.2.x86_64",
            "openSUSE Leap 15.4:kernel-default-livepatch-5.14.21-150400.24.21.2.aarch64",
            "openSUSE Leap 15.4:kernel-default-livepatch-5.14.21-150400.24.21.2.ppc64le",
            "openSUSE Leap 15.4:kernel-default-livepatch-5.14.21-150400.24.21.2.s390x",
            "openSUSE Leap 15.4:kernel-default-livepatch-5.14.21-150400.24.21.2.x86_64",
            "openSUSE Leap 15.4:kernel-default-livepatch-devel-5.14.21-150400.24.21.2.aarch64",
            "openSUSE Leap 15.4:kernel-default-livepatch-devel-5.14.21-150400.24.21.2.ppc64le",
            "openSUSE Leap 15.4:kernel-default-livepatch-devel-5.14.21-150400.24.21.2.s390x",
            "openSUSE Leap 15.4:kernel-default-livepatch-devel-5.14.21-150400.24.21.2.x86_64",
            "openSUSE Leap 15.4:kernel-default-optional-5.14.21-150400.24.21.2.aarch64",
            "openSUSE Leap 15.4:kernel-default-optional-5.14.21-150400.24.21.2.ppc64le",
            "openSUSE Leap 15.4:kernel-default-optional-5.14.21-150400.24.21.2.s390x",
            "openSUSE Leap 15.4:kernel-default-optional-5.14.21-150400.24.21.2.x86_64",
            "openSUSE Leap 15.4:kernel-devel-5.14.21-150400.24.21.2.noarch",
            "openSUSE Leap 15.4:kernel-docs-5.14.21-150400.24.21.3.noarch",
            "openSUSE Leap 15.4:kernel-docs-html-5.14.21-150400.24.21.3.noarch",
            "openSUSE Leap 15.4:kernel-kvmsmall-5.14.21-150400.24.21.2.aarch64",
            "openSUSE Leap 15.4:kernel-kvmsmall-5.14.21-150400.24.21.2.ppc64le",
            "openSUSE Leap 15.4:kernel-kvmsmall-5.14.21-150400.24.21.2.x86_64",
            "openSUSE Leap 15.4:kernel-kvmsmall-devel-5.14.21-150400.24.21.2.aarch64",
            "openSUSE Leap 15.4:kernel-kvmsmall-devel-5.14.21-150400.24.21.2.ppc64le",
            "openSUSE Leap 15.4:kernel-kvmsmall-devel-5.14.21-150400.24.21.2.x86_64",
            "openSUSE Leap 15.4:kernel-kvmsmall-livepatch-devel-5.14.21-150400.24.21.2.aarch64",
            "openSUSE Leap 15.4:kernel-kvmsmall-livepatch-devel-5.14.21-150400.24.21.2.ppc64le",
            "openSUSE Leap 15.4:kernel-kvmsmall-livepatch-devel-5.14.21-150400.24.21.2.x86_64",
            "openSUSE Leap 15.4:kernel-macros-5.14.21-150400.24.21.2.noarch",
            "openSUSE Leap 15.4:kernel-obs-build-5.14.21-150400.24.21.2.aarch64",
            "openSUSE Leap 15.4:kernel-obs-build-5.14.21-150400.24.21.2.ppc64le",
            "openSUSE Leap 15.4:kernel-obs-build-5.14.21-150400.24.21.2.s390x",
            "openSUSE Leap 15.4:kernel-obs-build-5.14.21-150400.24.21.2.x86_64",
            "openSUSE Leap 15.4:kernel-obs-qa-5.14.21-150400.24.21.1.aarch64",
            "openSUSE Leap 15.4:kernel-obs-qa-5.14.21-150400.24.21.1.ppc64le",
            "openSUSE Leap 15.4:kernel-obs-qa-5.14.21-150400.24.21.1.s390x",
            "openSUSE Leap 15.4:kernel-obs-qa-5.14.21-150400.24.21.1.x86_64",
            "openSUSE Leap 15.4:kernel-source-5.14.21-150400.24.21.2.noarch",
            "openSUSE Leap 15.4:kernel-source-vanilla-5.14.21-150400.24.21.2.noarch",
            "openSUSE Leap 15.4:kernel-syms-5.14.21-150400.24.21.1.aarch64",
            "openSUSE Leap 15.4:kernel-syms-5.14.21-150400.24.21.1.ppc64le",
            "openSUSE Leap 15.4:kernel-syms-5.14.21-150400.24.21.1.s390x",
            "openSUSE Leap 15.4:kernel-syms-5.14.21-150400.24.21.1.x86_64",
            "openSUSE Leap 15.4:kernel-zfcpdump-5.14.21-150400.24.21.2.s390x",
            "openSUSE Leap 15.4:kselftests-kmp-64kb-5.14.21-150400.24.21.2.aarch64",
            "openSUSE Leap 15.4:kselftests-kmp-default-5.14.21-150400.24.21.2.aarch64",
            "openSUSE Leap 15.4:kselftests-kmp-default-5.14.21-150400.24.21.2.ppc64le",
            "openSUSE Leap 15.4:kselftests-kmp-default-5.14.21-150400.24.21.2.s390x",
            "openSUSE Leap 15.4:kselftests-kmp-default-5.14.21-150400.24.21.2.x86_64",
            "openSUSE Leap 15.4:ocfs2-kmp-64kb-5.14.21-150400.24.21.2.aarch64",
            "openSUSE Leap 15.4:ocfs2-kmp-default-5.14.21-150400.24.21.2.aarch64",
            "openSUSE Leap 15.4:ocfs2-kmp-default-5.14.21-150400.24.21.2.ppc64le",
            "openSUSE Leap 15.4:ocfs2-kmp-default-5.14.21-150400.24.21.2.s390x",
            "openSUSE Leap 15.4:ocfs2-kmp-default-5.14.21-150400.24.21.2.x86_64",
            "openSUSE Leap 15.4:reiserfs-kmp-64kb-5.14.21-150400.24.21.2.aarch64",
            "openSUSE Leap 15.4:reiserfs-kmp-default-5.14.21-150400.24.21.2.aarch64",
            "openSUSE Leap 15.4:reiserfs-kmp-default-5.14.21-150400.24.21.2.ppc64le",
            "openSUSE Leap 15.4:reiserfs-kmp-default-5.14.21-150400.24.21.2.s390x",
            "openSUSE Leap 15.4:reiserfs-kmp-default-5.14.21-150400.24.21.2.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 7.5,
            "baseSeverity": "HIGH",
            "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
            "version": "3.1"
          },
          "products": [
            "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.21.2.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.21.2.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.21.2.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.21.2.x86_64",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.21.2.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.21.2.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.21.2.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.21.2.x86_64",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.21.2.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.21.2.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.21.2.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.21.2.x86_64",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.21.2.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.21.2.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.21.2.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.21.2.x86_64",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.21.2.ppc64le",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.21.2.s390x",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.21.2.x86_64",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.21.2.ppc64le",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.21.2.s390x",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.21.2.x86_64",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_21-default-1-150400.9.3.2.ppc64le",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_21-default-1-150400.9.3.2.s390x",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_21-default-1-150400.9.3.2.x86_64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-64kb-5.14.21-150400.24.21.2.aarch64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-64kb-devel-5.14.21-150400.24.21.2.aarch64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-5.14.21-150400.24.21.2.aarch64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-5.14.21-150400.24.21.2.ppc64le",
            "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-5.14.21-150400.24.21.2.s390x",
            "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-5.14.21-150400.24.21.2.x86_64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-base-5.14.21-150400.24.21.2.150400.24.7.2.aarch64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-base-5.14.21-150400.24.21.2.150400.24.7.2.ppc64le",
            "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-base-5.14.21-150400.24.21.2.150400.24.7.2.s390x",
            "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-base-5.14.21-150400.24.21.2.150400.24.7.2.x86_64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-devel-5.14.21-150400.24.21.2.aarch64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-devel-5.14.21-150400.24.21.2.ppc64le",
            "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-devel-5.14.21-150400.24.21.2.s390x",
            "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-devel-5.14.21-150400.24.21.2.x86_64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-devel-5.14.21-150400.24.21.2.noarch",
            "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-macros-5.14.21-150400.24.21.2.noarch",
            "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-zfcpdump-5.14.21-150400.24.21.2.s390x",
            "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-docs-5.14.21-150400.24.21.3.noarch",
            "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-obs-build-5.14.21-150400.24.21.2.aarch64",
            "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-obs-build-5.14.21-150400.24.21.2.ppc64le",
            "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-obs-build-5.14.21-150400.24.21.2.s390x",
            "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-obs-build-5.14.21-150400.24.21.2.x86_64",
            "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-source-5.14.21-150400.24.21.2.noarch",
            "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-syms-5.14.21-150400.24.21.1.aarch64",
            "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-syms-5.14.21-150400.24.21.1.ppc64le",
            "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-syms-5.14.21-150400.24.21.1.s390x",
            "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-syms-5.14.21-150400.24.21.1.x86_64",
            "SUSE Linux Enterprise Module for Legacy 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.21.2.aarch64",
            "SUSE Linux Enterprise Module for Legacy 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.21.2.ppc64le",
            "SUSE Linux Enterprise Module for Legacy 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.21.2.s390x",
            "SUSE Linux Enterprise Module for Legacy 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.21.2.x86_64",
            "SUSE Linux Enterprise Workstation Extension 15 SP4:kernel-default-extra-5.14.21-150400.24.21.2.x86_64",
            "openSUSE Leap 15.4:cluster-md-kmp-64kb-5.14.21-150400.24.21.2.aarch64",
            "openSUSE Leap 15.4:cluster-md-kmp-default-5.14.21-150400.24.21.2.aarch64",
            "openSUSE Leap 15.4:cluster-md-kmp-default-5.14.21-150400.24.21.2.ppc64le",
            "openSUSE Leap 15.4:cluster-md-kmp-default-5.14.21-150400.24.21.2.s390x",
            "openSUSE Leap 15.4:cluster-md-kmp-default-5.14.21-150400.24.21.2.x86_64",
            "openSUSE Leap 15.4:dlm-kmp-64kb-5.14.21-150400.24.21.2.aarch64",
            "openSUSE Leap 15.4:dlm-kmp-default-5.14.21-150400.24.21.2.aarch64",
            "openSUSE Leap 15.4:dlm-kmp-default-5.14.21-150400.24.21.2.ppc64le",
            "openSUSE Leap 15.4:dlm-kmp-default-5.14.21-150400.24.21.2.s390x",
            "openSUSE Leap 15.4:dlm-kmp-default-5.14.21-150400.24.21.2.x86_64",
            "openSUSE Leap 15.4:dtb-allwinner-5.14.21-150400.24.21.1.aarch64",
            "openSUSE Leap 15.4:dtb-altera-5.14.21-150400.24.21.1.aarch64",
            "openSUSE Leap 15.4:dtb-amazon-5.14.21-150400.24.21.1.aarch64",
            "openSUSE Leap 15.4:dtb-amd-5.14.21-150400.24.21.1.aarch64",
            "openSUSE Leap 15.4:dtb-amlogic-5.14.21-150400.24.21.1.aarch64",
            "openSUSE Leap 15.4:dtb-apm-5.14.21-150400.24.21.1.aarch64",
            "openSUSE Leap 15.4:dtb-apple-5.14.21-150400.24.21.1.aarch64",
            "openSUSE Leap 15.4:dtb-arm-5.14.21-150400.24.21.1.aarch64",
            "openSUSE Leap 15.4:dtb-broadcom-5.14.21-150400.24.21.1.aarch64",
            "openSUSE Leap 15.4:dtb-cavium-5.14.21-150400.24.21.1.aarch64",
            "openSUSE Leap 15.4:dtb-exynos-5.14.21-150400.24.21.1.aarch64",
            "openSUSE Leap 15.4:dtb-freescale-5.14.21-150400.24.21.1.aarch64",
            "openSUSE Leap 15.4:dtb-hisilicon-5.14.21-150400.24.21.1.aarch64",
            "openSUSE Leap 15.4:dtb-lg-5.14.21-150400.24.21.1.aarch64",
            "openSUSE Leap 15.4:dtb-marvell-5.14.21-150400.24.21.1.aarch64",
            "openSUSE Leap 15.4:dtb-mediatek-5.14.21-150400.24.21.1.aarch64",
            "openSUSE Leap 15.4:dtb-nvidia-5.14.21-150400.24.21.1.aarch64",
            "openSUSE Leap 15.4:dtb-qcom-5.14.21-150400.24.21.1.aarch64",
            "openSUSE Leap 15.4:dtb-renesas-5.14.21-150400.24.21.1.aarch64",
            "openSUSE Leap 15.4:dtb-rockchip-5.14.21-150400.24.21.1.aarch64",
            "openSUSE Leap 15.4:dtb-socionext-5.14.21-150400.24.21.1.aarch64",
            "openSUSE Leap 15.4:dtb-sprd-5.14.21-150400.24.21.1.aarch64",
            "openSUSE Leap 15.4:dtb-xilinx-5.14.21-150400.24.21.1.aarch64",
            "openSUSE Leap 15.4:gfs2-kmp-64kb-5.14.21-150400.24.21.2.aarch64",
            "openSUSE Leap 15.4:gfs2-kmp-default-5.14.21-150400.24.21.2.aarch64",
            "openSUSE Leap 15.4:gfs2-kmp-default-5.14.21-150400.24.21.2.ppc64le",
            "openSUSE Leap 15.4:gfs2-kmp-default-5.14.21-150400.24.21.2.s390x",
            "openSUSE Leap 15.4:gfs2-kmp-default-5.14.21-150400.24.21.2.x86_64",
            "openSUSE Leap 15.4:kernel-64kb-5.14.21-150400.24.21.2.aarch64",
            "openSUSE Leap 15.4:kernel-64kb-devel-5.14.21-150400.24.21.2.aarch64",
            "openSUSE Leap 15.4:kernel-64kb-extra-5.14.21-150400.24.21.2.aarch64",
            "openSUSE Leap 15.4:kernel-64kb-livepatch-devel-5.14.21-150400.24.21.2.aarch64",
            "openSUSE Leap 15.4:kernel-64kb-optional-5.14.21-150400.24.21.2.aarch64",
            "openSUSE Leap 15.4:kernel-debug-5.14.21-150400.24.21.2.ppc64le",
            "openSUSE Leap 15.4:kernel-debug-5.14.21-150400.24.21.2.x86_64",
            "openSUSE Leap 15.4:kernel-debug-devel-5.14.21-150400.24.21.2.ppc64le",
            "openSUSE Leap 15.4:kernel-debug-devel-5.14.21-150400.24.21.2.x86_64",
            "openSUSE Leap 15.4:kernel-debug-livepatch-devel-5.14.21-150400.24.21.2.ppc64le",
            "openSUSE Leap 15.4:kernel-debug-livepatch-devel-5.14.21-150400.24.21.2.x86_64",
            "openSUSE Leap 15.4:kernel-default-5.14.21-150400.24.21.2.aarch64",
            "openSUSE Leap 15.4:kernel-default-5.14.21-150400.24.21.2.ppc64le",
            "openSUSE Leap 15.4:kernel-default-5.14.21-150400.24.21.2.s390x",
            "openSUSE Leap 15.4:kernel-default-5.14.21-150400.24.21.2.x86_64",
            "openSUSE Leap 15.4:kernel-default-base-5.14.21-150400.24.21.2.150400.24.7.2.aarch64",
            "openSUSE Leap 15.4:kernel-default-base-5.14.21-150400.24.21.2.150400.24.7.2.ppc64le",
            "openSUSE Leap 15.4:kernel-default-base-5.14.21-150400.24.21.2.150400.24.7.2.s390x",
            "openSUSE Leap 15.4:kernel-default-base-5.14.21-150400.24.21.2.150400.24.7.2.x86_64",
            "openSUSE Leap 15.4:kernel-default-base-rebuild-5.14.21-150400.24.21.2.150400.24.7.2.aarch64",
            "openSUSE Leap 15.4:kernel-default-base-rebuild-5.14.21-150400.24.21.2.150400.24.7.2.ppc64le",
            "openSUSE Leap 15.4:kernel-default-base-rebuild-5.14.21-150400.24.21.2.150400.24.7.2.s390x",
            "openSUSE Leap 15.4:kernel-default-base-rebuild-5.14.21-150400.24.21.2.150400.24.7.2.x86_64",
            "openSUSE Leap 15.4:kernel-default-devel-5.14.21-150400.24.21.2.aarch64",
            "openSUSE Leap 15.4:kernel-default-devel-5.14.21-150400.24.21.2.ppc64le",
            "openSUSE Leap 15.4:kernel-default-devel-5.14.21-150400.24.21.2.s390x",
            "openSUSE Leap 15.4:kernel-default-devel-5.14.21-150400.24.21.2.x86_64",
            "openSUSE Leap 15.4:kernel-default-extra-5.14.21-150400.24.21.2.aarch64",
            "openSUSE Leap 15.4:kernel-default-extra-5.14.21-150400.24.21.2.ppc64le",
            "openSUSE Leap 15.4:kernel-default-extra-5.14.21-150400.24.21.2.s390x",
            "openSUSE Leap 15.4:kernel-default-extra-5.14.21-150400.24.21.2.x86_64",
            "openSUSE Leap 15.4:kernel-default-livepatch-5.14.21-150400.24.21.2.aarch64",
            "openSUSE Leap 15.4:kernel-default-livepatch-5.14.21-150400.24.21.2.ppc64le",
            "openSUSE Leap 15.4:kernel-default-livepatch-5.14.21-150400.24.21.2.s390x",
            "openSUSE Leap 15.4:kernel-default-livepatch-5.14.21-150400.24.21.2.x86_64",
            "openSUSE Leap 15.4:kernel-default-livepatch-devel-5.14.21-150400.24.21.2.aarch64",
            "openSUSE Leap 15.4:kernel-default-livepatch-devel-5.14.21-150400.24.21.2.ppc64le",
            "openSUSE Leap 15.4:kernel-default-livepatch-devel-5.14.21-150400.24.21.2.s390x",
            "openSUSE Leap 15.4:kernel-default-livepatch-devel-5.14.21-150400.24.21.2.x86_64",
            "openSUSE Leap 15.4:kernel-default-optional-5.14.21-150400.24.21.2.aarch64",
            "openSUSE Leap 15.4:kernel-default-optional-5.14.21-150400.24.21.2.ppc64le",
            "openSUSE Leap 15.4:kernel-default-optional-5.14.21-150400.24.21.2.s390x",
            "openSUSE Leap 15.4:kernel-default-optional-5.14.21-150400.24.21.2.x86_64",
            "openSUSE Leap 15.4:kernel-devel-5.14.21-150400.24.21.2.noarch",
            "openSUSE Leap 15.4:kernel-docs-5.14.21-150400.24.21.3.noarch",
            "openSUSE Leap 15.4:kernel-docs-html-5.14.21-150400.24.21.3.noarch",
            "openSUSE Leap 15.4:kernel-kvmsmall-5.14.21-150400.24.21.2.aarch64",
            "openSUSE Leap 15.4:kernel-kvmsmall-5.14.21-150400.24.21.2.ppc64le",
            "openSUSE Leap 15.4:kernel-kvmsmall-5.14.21-150400.24.21.2.x86_64",
            "openSUSE Leap 15.4:kernel-kvmsmall-devel-5.14.21-150400.24.21.2.aarch64",
            "openSUSE Leap 15.4:kernel-kvmsmall-devel-5.14.21-150400.24.21.2.ppc64le",
            "openSUSE Leap 15.4:kernel-kvmsmall-devel-5.14.21-150400.24.21.2.x86_64",
            "openSUSE Leap 15.4:kernel-kvmsmall-livepatch-devel-5.14.21-150400.24.21.2.aarch64",
            "openSUSE Leap 15.4:kernel-kvmsmall-livepatch-devel-5.14.21-150400.24.21.2.ppc64le",
            "openSUSE Leap 15.4:kernel-kvmsmall-livepatch-devel-5.14.21-150400.24.21.2.x86_64",
            "openSUSE Leap 15.4:kernel-macros-5.14.21-150400.24.21.2.noarch",
            "openSUSE Leap 15.4:kernel-obs-build-5.14.21-150400.24.21.2.aarch64",
            "openSUSE Leap 15.4:kernel-obs-build-5.14.21-150400.24.21.2.ppc64le",
            "openSUSE Leap 15.4:kernel-obs-build-5.14.21-150400.24.21.2.s390x",
            "openSUSE Leap 15.4:kernel-obs-build-5.14.21-150400.24.21.2.x86_64",
            "openSUSE Leap 15.4:kernel-obs-qa-5.14.21-150400.24.21.1.aarch64",
            "openSUSE Leap 15.4:kernel-obs-qa-5.14.21-150400.24.21.1.ppc64le",
            "openSUSE Leap 15.4:kernel-obs-qa-5.14.21-150400.24.21.1.s390x",
            "openSUSE Leap 15.4:kernel-obs-qa-5.14.21-150400.24.21.1.x86_64",
            "openSUSE Leap 15.4:kernel-source-5.14.21-150400.24.21.2.noarch",
            "openSUSE Leap 15.4:kernel-source-vanilla-5.14.21-150400.24.21.2.noarch",
            "openSUSE Leap 15.4:kernel-syms-5.14.21-150400.24.21.1.aarch64",
            "openSUSE Leap 15.4:kernel-syms-5.14.21-150400.24.21.1.ppc64le",
            "openSUSE Leap 15.4:kernel-syms-5.14.21-150400.24.21.1.s390x",
            "openSUSE Leap 15.4:kernel-syms-5.14.21-150400.24.21.1.x86_64",
            "openSUSE Leap 15.4:kernel-zfcpdump-5.14.21-150400.24.21.2.s390x",
            "openSUSE Leap 15.4:kselftests-kmp-64kb-5.14.21-150400.24.21.2.aarch64",
            "openSUSE Leap 15.4:kselftests-kmp-default-5.14.21-150400.24.21.2.aarch64",
            "openSUSE Leap 15.4:kselftests-kmp-default-5.14.21-150400.24.21.2.ppc64le",
            "openSUSE Leap 15.4:kselftests-kmp-default-5.14.21-150400.24.21.2.s390x",
            "openSUSE Leap 15.4:kselftests-kmp-default-5.14.21-150400.24.21.2.x86_64",
            "openSUSE Leap 15.4:ocfs2-kmp-64kb-5.14.21-150400.24.21.2.aarch64",
            "openSUSE Leap 15.4:ocfs2-kmp-default-5.14.21-150400.24.21.2.aarch64",
            "openSUSE Leap 15.4:ocfs2-kmp-default-5.14.21-150400.24.21.2.ppc64le",
            "openSUSE Leap 15.4:ocfs2-kmp-default-5.14.21-150400.24.21.2.s390x",
            "openSUSE Leap 15.4:ocfs2-kmp-default-5.14.21-150400.24.21.2.x86_64",
            "openSUSE Leap 15.4:reiserfs-kmp-64kb-5.14.21-150400.24.21.2.aarch64",
            "openSUSE Leap 15.4:reiserfs-kmp-default-5.14.21-150400.24.21.2.aarch64",
            "openSUSE Leap 15.4:reiserfs-kmp-default-5.14.21-150400.24.21.2.ppc64le",
            "openSUSE Leap 15.4:reiserfs-kmp-default-5.14.21-150400.24.21.2.s390x",
            "openSUSE Leap 15.4:reiserfs-kmp-default-5.14.21-150400.24.21.2.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2022-09-16T15:30:19Z",
          "details": "important"
        }
      ],
      "title": "CVE-2022-36946"
    },
    {
      "cve": "CVE-2022-39188",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2022-39188"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "An issue was discovered in include/asm-generic/tlb.h in the Linux kernel before 5.19. Because of a race condition (unmap_mapping_range versus munmap), a device driver can free a page while it still has stale TLB entries. This only occurs in situations with VM_PFNMAP VMAs.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.21.2.aarch64",
          "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.21.2.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.21.2.s390x",
          "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.21.2.x86_64",
          "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.21.2.aarch64",
          "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.21.2.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.21.2.s390x",
          "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.21.2.x86_64",
          "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.21.2.aarch64",
          "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.21.2.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.21.2.s390x",
          "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.21.2.x86_64",
          "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.21.2.aarch64",
          "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.21.2.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.21.2.s390x",
          "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.21.2.x86_64",
          "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.21.2.ppc64le",
          "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.21.2.s390x",
          "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.21.2.x86_64",
          "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.21.2.ppc64le",
          "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.21.2.s390x",
          "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.21.2.x86_64",
          "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_21-default-1-150400.9.3.2.ppc64le",
          "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_21-default-1-150400.9.3.2.s390x",
          "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_21-default-1-150400.9.3.2.x86_64",
          "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-64kb-5.14.21-150400.24.21.2.aarch64",
          "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-64kb-devel-5.14.21-150400.24.21.2.aarch64",
          "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-5.14.21-150400.24.21.2.aarch64",
          "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-5.14.21-150400.24.21.2.ppc64le",
          "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-5.14.21-150400.24.21.2.s390x",
          "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-5.14.21-150400.24.21.2.x86_64",
          "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-base-5.14.21-150400.24.21.2.150400.24.7.2.aarch64",
          "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-base-5.14.21-150400.24.21.2.150400.24.7.2.ppc64le",
          "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-base-5.14.21-150400.24.21.2.150400.24.7.2.s390x",
          "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-base-5.14.21-150400.24.21.2.150400.24.7.2.x86_64",
          "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-devel-5.14.21-150400.24.21.2.aarch64",
          "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-devel-5.14.21-150400.24.21.2.ppc64le",
          "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-devel-5.14.21-150400.24.21.2.s390x",
          "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-devel-5.14.21-150400.24.21.2.x86_64",
          "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-devel-5.14.21-150400.24.21.2.noarch",
          "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-macros-5.14.21-150400.24.21.2.noarch",
          "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-zfcpdump-5.14.21-150400.24.21.2.s390x",
          "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-docs-5.14.21-150400.24.21.3.noarch",
          "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-obs-build-5.14.21-150400.24.21.2.aarch64",
          "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-obs-build-5.14.21-150400.24.21.2.ppc64le",
          "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-obs-build-5.14.21-150400.24.21.2.s390x",
          "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-obs-build-5.14.21-150400.24.21.2.x86_64",
          "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-source-5.14.21-150400.24.21.2.noarch",
          "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-syms-5.14.21-150400.24.21.1.aarch64",
          "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-syms-5.14.21-150400.24.21.1.ppc64le",
          "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-syms-5.14.21-150400.24.21.1.s390x",
          "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-syms-5.14.21-150400.24.21.1.x86_64",
          "SUSE Linux Enterprise Module for Legacy 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.21.2.aarch64",
          "SUSE Linux Enterprise Module for Legacy 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.21.2.ppc64le",
          "SUSE Linux Enterprise Module for Legacy 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.21.2.s390x",
          "SUSE Linux Enterprise Module for Legacy 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.21.2.x86_64",
          "SUSE Linux Enterprise Workstation Extension 15 SP4:kernel-default-extra-5.14.21-150400.24.21.2.x86_64",
          "openSUSE Leap 15.4:cluster-md-kmp-64kb-5.14.21-150400.24.21.2.aarch64",
          "openSUSE Leap 15.4:cluster-md-kmp-default-5.14.21-150400.24.21.2.aarch64",
          "openSUSE Leap 15.4:cluster-md-kmp-default-5.14.21-150400.24.21.2.ppc64le",
          "openSUSE Leap 15.4:cluster-md-kmp-default-5.14.21-150400.24.21.2.s390x",
          "openSUSE Leap 15.4:cluster-md-kmp-default-5.14.21-150400.24.21.2.x86_64",
          "openSUSE Leap 15.4:dlm-kmp-64kb-5.14.21-150400.24.21.2.aarch64",
          "openSUSE Leap 15.4:dlm-kmp-default-5.14.21-150400.24.21.2.aarch64",
          "openSUSE Leap 15.4:dlm-kmp-default-5.14.21-150400.24.21.2.ppc64le",
          "openSUSE Leap 15.4:dlm-kmp-default-5.14.21-150400.24.21.2.s390x",
          "openSUSE Leap 15.4:dlm-kmp-default-5.14.21-150400.24.21.2.x86_64",
          "openSUSE Leap 15.4:dtb-allwinner-5.14.21-150400.24.21.1.aarch64",
          "openSUSE Leap 15.4:dtb-altera-5.14.21-150400.24.21.1.aarch64",
          "openSUSE Leap 15.4:dtb-amazon-5.14.21-150400.24.21.1.aarch64",
          "openSUSE Leap 15.4:dtb-amd-5.14.21-150400.24.21.1.aarch64",
          "openSUSE Leap 15.4:dtb-amlogic-5.14.21-150400.24.21.1.aarch64",
          "openSUSE Leap 15.4:dtb-apm-5.14.21-150400.24.21.1.aarch64",
          "openSUSE Leap 15.4:dtb-apple-5.14.21-150400.24.21.1.aarch64",
          "openSUSE Leap 15.4:dtb-arm-5.14.21-150400.24.21.1.aarch64",
          "openSUSE Leap 15.4:dtb-broadcom-5.14.21-150400.24.21.1.aarch64",
          "openSUSE Leap 15.4:dtb-cavium-5.14.21-150400.24.21.1.aarch64",
          "openSUSE Leap 15.4:dtb-exynos-5.14.21-150400.24.21.1.aarch64",
          "openSUSE Leap 15.4:dtb-freescale-5.14.21-150400.24.21.1.aarch64",
          "openSUSE Leap 15.4:dtb-hisilicon-5.14.21-150400.24.21.1.aarch64",
          "openSUSE Leap 15.4:dtb-lg-5.14.21-150400.24.21.1.aarch64",
          "openSUSE Leap 15.4:dtb-marvell-5.14.21-150400.24.21.1.aarch64",
          "openSUSE Leap 15.4:dtb-mediatek-5.14.21-150400.24.21.1.aarch64",
          "openSUSE Leap 15.4:dtb-nvidia-5.14.21-150400.24.21.1.aarch64",
          "openSUSE Leap 15.4:dtb-qcom-5.14.21-150400.24.21.1.aarch64",
          "openSUSE Leap 15.4:dtb-renesas-5.14.21-150400.24.21.1.aarch64",
          "openSUSE Leap 15.4:dtb-rockchip-5.14.21-150400.24.21.1.aarch64",
          "openSUSE Leap 15.4:dtb-socionext-5.14.21-150400.24.21.1.aarch64",
          "openSUSE Leap 15.4:dtb-sprd-5.14.21-150400.24.21.1.aarch64",
          "openSUSE Leap 15.4:dtb-xilinx-5.14.21-150400.24.21.1.aarch64",
          "openSUSE Leap 15.4:gfs2-kmp-64kb-5.14.21-150400.24.21.2.aarch64",
          "openSUSE Leap 15.4:gfs2-kmp-default-5.14.21-150400.24.21.2.aarch64",
          "openSUSE Leap 15.4:gfs2-kmp-default-5.14.21-150400.24.21.2.ppc64le",
          "openSUSE Leap 15.4:gfs2-kmp-default-5.14.21-150400.24.21.2.s390x",
          "openSUSE Leap 15.4:gfs2-kmp-default-5.14.21-150400.24.21.2.x86_64",
          "openSUSE Leap 15.4:kernel-64kb-5.14.21-150400.24.21.2.aarch64",
          "openSUSE Leap 15.4:kernel-64kb-devel-5.14.21-150400.24.21.2.aarch64",
          "openSUSE Leap 15.4:kernel-64kb-extra-5.14.21-150400.24.21.2.aarch64",
          "openSUSE Leap 15.4:kernel-64kb-livepatch-devel-5.14.21-150400.24.21.2.aarch64",
          "openSUSE Leap 15.4:kernel-64kb-optional-5.14.21-150400.24.21.2.aarch64",
          "openSUSE Leap 15.4:kernel-debug-5.14.21-150400.24.21.2.ppc64le",
          "openSUSE Leap 15.4:kernel-debug-5.14.21-150400.24.21.2.x86_64",
          "openSUSE Leap 15.4:kernel-debug-devel-5.14.21-150400.24.21.2.ppc64le",
          "openSUSE Leap 15.4:kernel-debug-devel-5.14.21-150400.24.21.2.x86_64",
          "openSUSE Leap 15.4:kernel-debug-livepatch-devel-5.14.21-150400.24.21.2.ppc64le",
          "openSUSE Leap 15.4:kernel-debug-livepatch-devel-5.14.21-150400.24.21.2.x86_64",
          "openSUSE Leap 15.4:kernel-default-5.14.21-150400.24.21.2.aarch64",
          "openSUSE Leap 15.4:kernel-default-5.14.21-150400.24.21.2.ppc64le",
          "openSUSE Leap 15.4:kernel-default-5.14.21-150400.24.21.2.s390x",
          "openSUSE Leap 15.4:kernel-default-5.14.21-150400.24.21.2.x86_64",
          "openSUSE Leap 15.4:kernel-default-base-5.14.21-150400.24.21.2.150400.24.7.2.aarch64",
          "openSUSE Leap 15.4:kernel-default-base-5.14.21-150400.24.21.2.150400.24.7.2.ppc64le",
          "openSUSE Leap 15.4:kernel-default-base-5.14.21-150400.24.21.2.150400.24.7.2.s390x",
          "openSUSE Leap 15.4:kernel-default-base-5.14.21-150400.24.21.2.150400.24.7.2.x86_64",
          "openSUSE Leap 15.4:kernel-default-base-rebuild-5.14.21-150400.24.21.2.150400.24.7.2.aarch64",
          "openSUSE Leap 15.4:kernel-default-base-rebuild-5.14.21-150400.24.21.2.150400.24.7.2.ppc64le",
          "openSUSE Leap 15.4:kernel-default-base-rebuild-5.14.21-150400.24.21.2.150400.24.7.2.s390x",
          "openSUSE Leap 15.4:kernel-default-base-rebuild-5.14.21-150400.24.21.2.150400.24.7.2.x86_64",
          "openSUSE Leap 15.4:kernel-default-devel-5.14.21-150400.24.21.2.aarch64",
          "openSUSE Leap 15.4:kernel-default-devel-5.14.21-150400.24.21.2.ppc64le",
          "openSUSE Leap 15.4:kernel-default-devel-5.14.21-150400.24.21.2.s390x",
          "openSUSE Leap 15.4:kernel-default-devel-5.14.21-150400.24.21.2.x86_64",
          "openSUSE Leap 15.4:kernel-default-extra-5.14.21-150400.24.21.2.aarch64",
          "openSUSE Leap 15.4:kernel-default-extra-5.14.21-150400.24.21.2.ppc64le",
          "openSUSE Leap 15.4:kernel-default-extra-5.14.21-150400.24.21.2.s390x",
          "openSUSE Leap 15.4:kernel-default-extra-5.14.21-150400.24.21.2.x86_64",
          "openSUSE Leap 15.4:kernel-default-livepatch-5.14.21-150400.24.21.2.aarch64",
          "openSUSE Leap 15.4:kernel-default-livepatch-5.14.21-150400.24.21.2.ppc64le",
          "openSUSE Leap 15.4:kernel-default-livepatch-5.14.21-150400.24.21.2.s390x",
          "openSUSE Leap 15.4:kernel-default-livepatch-5.14.21-150400.24.21.2.x86_64",
          "openSUSE Leap 15.4:kernel-default-livepatch-devel-5.14.21-150400.24.21.2.aarch64",
          "openSUSE Leap 15.4:kernel-default-livepatch-devel-5.14.21-150400.24.21.2.ppc64le",
          "openSUSE Leap 15.4:kernel-default-livepatch-devel-5.14.21-150400.24.21.2.s390x",
          "openSUSE Leap 15.4:kernel-default-livepatch-devel-5.14.21-150400.24.21.2.x86_64",
          "openSUSE Leap 15.4:kernel-default-optional-5.14.21-150400.24.21.2.aarch64",
          "openSUSE Leap 15.4:kernel-default-optional-5.14.21-150400.24.21.2.ppc64le",
          "openSUSE Leap 15.4:kernel-default-optional-5.14.21-150400.24.21.2.s390x",
          "openSUSE Leap 15.4:kernel-default-optional-5.14.21-150400.24.21.2.x86_64",
          "openSUSE Leap 15.4:kernel-devel-5.14.21-150400.24.21.2.noarch",
          "openSUSE Leap 15.4:kernel-docs-5.14.21-150400.24.21.3.noarch",
          "openSUSE Leap 15.4:kernel-docs-html-5.14.21-150400.24.21.3.noarch",
          "openSUSE Leap 15.4:kernel-kvmsmall-5.14.21-150400.24.21.2.aarch64",
          "openSUSE Leap 15.4:kernel-kvmsmall-5.14.21-150400.24.21.2.ppc64le",
          "openSUSE Leap 15.4:kernel-kvmsmall-5.14.21-150400.24.21.2.x86_64",
          "openSUSE Leap 15.4:kernel-kvmsmall-devel-5.14.21-150400.24.21.2.aarch64",
          "openSUSE Leap 15.4:kernel-kvmsmall-devel-5.14.21-150400.24.21.2.ppc64le",
          "openSUSE Leap 15.4:kernel-kvmsmall-devel-5.14.21-150400.24.21.2.x86_64",
          "openSUSE Leap 15.4:kernel-kvmsmall-livepatch-devel-5.14.21-150400.24.21.2.aarch64",
          "openSUSE Leap 15.4:kernel-kvmsmall-livepatch-devel-5.14.21-150400.24.21.2.ppc64le",
          "openSUSE Leap 15.4:kernel-kvmsmall-livepatch-devel-5.14.21-150400.24.21.2.x86_64",
          "openSUSE Leap 15.4:kernel-macros-5.14.21-150400.24.21.2.noarch",
          "openSUSE Leap 15.4:kernel-obs-build-5.14.21-150400.24.21.2.aarch64",
          "openSUSE Leap 15.4:kernel-obs-build-5.14.21-150400.24.21.2.ppc64le",
          "openSUSE Leap 15.4:kernel-obs-build-5.14.21-150400.24.21.2.s390x",
          "openSUSE Leap 15.4:kernel-obs-build-5.14.21-150400.24.21.2.x86_64",
          "openSUSE Leap 15.4:kernel-obs-qa-5.14.21-150400.24.21.1.aarch64",
          "openSUSE Leap 15.4:kernel-obs-qa-5.14.21-150400.24.21.1.ppc64le",
          "openSUSE Leap 15.4:kernel-obs-qa-5.14.21-150400.24.21.1.s390x",
          "openSUSE Leap 15.4:kernel-obs-qa-5.14.21-150400.24.21.1.x86_64",
          "openSUSE Leap 15.4:kernel-source-5.14.21-150400.24.21.2.noarch",
          "openSUSE Leap 15.4:kernel-source-vanilla-5.14.21-150400.24.21.2.noarch",
          "openSUSE Leap 15.4:kernel-syms-5.14.21-150400.24.21.1.aarch64",
          "openSUSE Leap 15.4:kernel-syms-5.14.21-150400.24.21.1.ppc64le",
          "openSUSE Leap 15.4:kernel-syms-5.14.21-150400.24.21.1.s390x",
          "openSUSE Leap 15.4:kernel-syms-5.14.21-150400.24.21.1.x86_64",
          "openSUSE Leap 15.4:kernel-zfcpdump-5.14.21-150400.24.21.2.s390x",
          "openSUSE Leap 15.4:kselftests-kmp-64kb-5.14.21-150400.24.21.2.aarch64",
          "openSUSE Leap 15.4:kselftests-kmp-default-5.14.21-150400.24.21.2.aarch64",
          "openSUSE Leap 15.4:kselftests-kmp-default-5.14.21-150400.24.21.2.ppc64le",
          "openSUSE Leap 15.4:kselftests-kmp-default-5.14.21-150400.24.21.2.s390x",
          "openSUSE Leap 15.4:kselftests-kmp-default-5.14.21-150400.24.21.2.x86_64",
          "openSUSE Leap 15.4:ocfs2-kmp-64kb-5.14.21-150400.24.21.2.aarch64",
          "openSUSE Leap 15.4:ocfs2-kmp-default-5.14.21-150400.24.21.2.aarch64",
          "openSUSE Leap 15.4:ocfs2-kmp-default-5.14.21-150400.24.21.2.ppc64le",
          "openSUSE Leap 15.4:ocfs2-kmp-default-5.14.21-150400.24.21.2.s390x",
          "openSUSE Leap 15.4:ocfs2-kmp-default-5.14.21-150400.24.21.2.x86_64",
          "openSUSE Leap 15.4:reiserfs-kmp-64kb-5.14.21-150400.24.21.2.aarch64",
          "openSUSE Leap 15.4:reiserfs-kmp-default-5.14.21-150400.24.21.2.aarch64",
          "openSUSE Leap 15.4:reiserfs-kmp-default-5.14.21-150400.24.21.2.ppc64le",
          "openSUSE Leap 15.4:reiserfs-kmp-default-5.14.21-150400.24.21.2.s390x",
          "openSUSE Leap 15.4:reiserfs-kmp-default-5.14.21-150400.24.21.2.x86_64"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2022-39188",
          "url": "https://www.suse.com/security/cve/CVE-2022-39188"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1203107 for CVE-2022-39188",
          "url": "https://bugzilla.suse.com/1203107"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1203116 for CVE-2022-39188",
          "url": "https://bugzilla.suse.com/1203116"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1205313 for CVE-2022-39188",
          "url": "https://bugzilla.suse.com/1205313"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1209225 for CVE-2022-39188",
          "url": "https://bugzilla.suse.com/1209225"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1212326 for CVE-2022-39188",
          "url": "https://bugzilla.suse.com/1212326"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.21.2.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.21.2.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.21.2.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.21.2.x86_64",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.21.2.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.21.2.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.21.2.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.21.2.x86_64",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.21.2.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.21.2.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.21.2.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.21.2.x86_64",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.21.2.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.21.2.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.21.2.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.21.2.x86_64",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.21.2.ppc64le",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.21.2.s390x",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.21.2.x86_64",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.21.2.ppc64le",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.21.2.s390x",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.21.2.x86_64",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_21-default-1-150400.9.3.2.ppc64le",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_21-default-1-150400.9.3.2.s390x",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_21-default-1-150400.9.3.2.x86_64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-64kb-5.14.21-150400.24.21.2.aarch64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-64kb-devel-5.14.21-150400.24.21.2.aarch64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-5.14.21-150400.24.21.2.aarch64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-5.14.21-150400.24.21.2.ppc64le",
            "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-5.14.21-150400.24.21.2.s390x",
            "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-5.14.21-150400.24.21.2.x86_64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-base-5.14.21-150400.24.21.2.150400.24.7.2.aarch64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-base-5.14.21-150400.24.21.2.150400.24.7.2.ppc64le",
            "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-base-5.14.21-150400.24.21.2.150400.24.7.2.s390x",
            "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-base-5.14.21-150400.24.21.2.150400.24.7.2.x86_64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-devel-5.14.21-150400.24.21.2.aarch64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-devel-5.14.21-150400.24.21.2.ppc64le",
            "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-devel-5.14.21-150400.24.21.2.s390x",
            "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-devel-5.14.21-150400.24.21.2.x86_64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-devel-5.14.21-150400.24.21.2.noarch",
            "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-macros-5.14.21-150400.24.21.2.noarch",
            "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-zfcpdump-5.14.21-150400.24.21.2.s390x",
            "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-docs-5.14.21-150400.24.21.3.noarch",
            "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-obs-build-5.14.21-150400.24.21.2.aarch64",
            "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-obs-build-5.14.21-150400.24.21.2.ppc64le",
            "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-obs-build-5.14.21-150400.24.21.2.s390x",
            "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-obs-build-5.14.21-150400.24.21.2.x86_64",
            "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-source-5.14.21-150400.24.21.2.noarch",
            "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-syms-5.14.21-150400.24.21.1.aarch64",
            "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-syms-5.14.21-150400.24.21.1.ppc64le",
            "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-syms-5.14.21-150400.24.21.1.s390x",
            "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-syms-5.14.21-150400.24.21.1.x86_64",
            "SUSE Linux Enterprise Module for Legacy 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.21.2.aarch64",
            "SUSE Linux Enterprise Module for Legacy 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.21.2.ppc64le",
            "SUSE Linux Enterprise Module for Legacy 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.21.2.s390x",
            "SUSE Linux Enterprise Module for Legacy 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.21.2.x86_64",
            "SUSE Linux Enterprise Workstation Extension 15 SP4:kernel-default-extra-5.14.21-150400.24.21.2.x86_64",
            "openSUSE Leap 15.4:cluster-md-kmp-64kb-5.14.21-150400.24.21.2.aarch64",
            "openSUSE Leap 15.4:cluster-md-kmp-default-5.14.21-150400.24.21.2.aarch64",
            "openSUSE Leap 15.4:cluster-md-kmp-default-5.14.21-150400.24.21.2.ppc64le",
            "openSUSE Leap 15.4:cluster-md-kmp-default-5.14.21-150400.24.21.2.s390x",
            "openSUSE Leap 15.4:cluster-md-kmp-default-5.14.21-150400.24.21.2.x86_64",
            "openSUSE Leap 15.4:dlm-kmp-64kb-5.14.21-150400.24.21.2.aarch64",
            "openSUSE Leap 15.4:dlm-kmp-default-5.14.21-150400.24.21.2.aarch64",
            "openSUSE Leap 15.4:dlm-kmp-default-5.14.21-150400.24.21.2.ppc64le",
            "openSUSE Leap 15.4:dlm-kmp-default-5.14.21-150400.24.21.2.s390x",
            "openSUSE Leap 15.4:dlm-kmp-default-5.14.21-150400.24.21.2.x86_64",
            "openSUSE Leap 15.4:dtb-allwinner-5.14.21-150400.24.21.1.aarch64",
            "openSUSE Leap 15.4:dtb-altera-5.14.21-150400.24.21.1.aarch64",
            "openSUSE Leap 15.4:dtb-amazon-5.14.21-150400.24.21.1.aarch64",
            "openSUSE Leap 15.4:dtb-amd-5.14.21-150400.24.21.1.aarch64",
            "openSUSE Leap 15.4:dtb-amlogic-5.14.21-150400.24.21.1.aarch64",
            "openSUSE Leap 15.4:dtb-apm-5.14.21-150400.24.21.1.aarch64",
            "openSUSE Leap 15.4:dtb-apple-5.14.21-150400.24.21.1.aarch64",
            "openSUSE Leap 15.4:dtb-arm-5.14.21-150400.24.21.1.aarch64",
            "openSUSE Leap 15.4:dtb-broadcom-5.14.21-150400.24.21.1.aarch64",
            "openSUSE Leap 15.4:dtb-cavium-5.14.21-150400.24.21.1.aarch64",
            "openSUSE Leap 15.4:dtb-exynos-5.14.21-150400.24.21.1.aarch64",
            "openSUSE Leap 15.4:dtb-freescale-5.14.21-150400.24.21.1.aarch64",
            "openSUSE Leap 15.4:dtb-hisilicon-5.14.21-150400.24.21.1.aarch64",
            "openSUSE Leap 15.4:dtb-lg-5.14.21-150400.24.21.1.aarch64",
            "openSUSE Leap 15.4:dtb-marvell-5.14.21-150400.24.21.1.aarch64",
            "openSUSE Leap 15.4:dtb-mediatek-5.14.21-150400.24.21.1.aarch64",
            "openSUSE Leap 15.4:dtb-nvidia-5.14.21-150400.24.21.1.aarch64",
            "openSUSE Leap 15.4:dtb-qcom-5.14.21-150400.24.21.1.aarch64",
            "openSUSE Leap 15.4:dtb-renesas-5.14.21-150400.24.21.1.aarch64",
            "openSUSE Leap 15.4:dtb-rockchip-5.14.21-150400.24.21.1.aarch64",
            "openSUSE Leap 15.4:dtb-socionext-5.14.21-150400.24.21.1.aarch64",
            "openSUSE Leap 15.4:dtb-sprd-5.14.21-150400.24.21.1.aarch64",
            "openSUSE Leap 15.4:dtb-xilinx-5.14.21-150400.24.21.1.aarch64",
            "openSUSE Leap 15.4:gfs2-kmp-64kb-5.14.21-150400.24.21.2.aarch64",
            "openSUSE Leap 15.4:gfs2-kmp-default-5.14.21-150400.24.21.2.aarch64",
            "openSUSE Leap 15.4:gfs2-kmp-default-5.14.21-150400.24.21.2.ppc64le",
            "openSUSE Leap 15.4:gfs2-kmp-default-5.14.21-150400.24.21.2.s390x",
            "openSUSE Leap 15.4:gfs2-kmp-default-5.14.21-150400.24.21.2.x86_64",
            "openSUSE Leap 15.4:kernel-64kb-5.14.21-150400.24.21.2.aarch64",
            "openSUSE Leap 15.4:kernel-64kb-devel-5.14.21-150400.24.21.2.aarch64",
            "openSUSE Leap 15.4:kernel-64kb-extra-5.14.21-150400.24.21.2.aarch64",
            "openSUSE Leap 15.4:kernel-64kb-livepatch-devel-5.14.21-150400.24.21.2.aarch64",
            "openSUSE Leap 15.4:kernel-64kb-optional-5.14.21-150400.24.21.2.aarch64",
            "openSUSE Leap 15.4:kernel-debug-5.14.21-150400.24.21.2.ppc64le",
            "openSUSE Leap 15.4:kernel-debug-5.14.21-150400.24.21.2.x86_64",
            "openSUSE Leap 15.4:kernel-debug-devel-5.14.21-150400.24.21.2.ppc64le",
            "openSUSE Leap 15.4:kernel-debug-devel-5.14.21-150400.24.21.2.x86_64",
            "openSUSE Leap 15.4:kernel-debug-livepatch-devel-5.14.21-150400.24.21.2.ppc64le",
            "openSUSE Leap 15.4:kernel-debug-livepatch-devel-5.14.21-150400.24.21.2.x86_64",
            "openSUSE Leap 15.4:kernel-default-5.14.21-150400.24.21.2.aarch64",
            "openSUSE Leap 15.4:kernel-default-5.14.21-150400.24.21.2.ppc64le",
            "openSUSE Leap 15.4:kernel-default-5.14.21-150400.24.21.2.s390x",
            "openSUSE Leap 15.4:kernel-default-5.14.21-150400.24.21.2.x86_64",
            "openSUSE Leap 15.4:kernel-default-base-5.14.21-150400.24.21.2.150400.24.7.2.aarch64",
            "openSUSE Leap 15.4:kernel-default-base-5.14.21-150400.24.21.2.150400.24.7.2.ppc64le",
            "openSUSE Leap 15.4:kernel-default-base-5.14.21-150400.24.21.2.150400.24.7.2.s390x",
            "openSUSE Leap 15.4:kernel-default-base-5.14.21-150400.24.21.2.150400.24.7.2.x86_64",
            "openSUSE Leap 15.4:kernel-default-base-rebuild-5.14.21-150400.24.21.2.150400.24.7.2.aarch64",
            "openSUSE Leap 15.4:kernel-default-base-rebuild-5.14.21-150400.24.21.2.150400.24.7.2.ppc64le",
            "openSUSE Leap 15.4:kernel-default-base-rebuild-5.14.21-150400.24.21.2.150400.24.7.2.s390x",
            "openSUSE Leap 15.4:kernel-default-base-rebuild-5.14.21-150400.24.21.2.150400.24.7.2.x86_64",
            "openSUSE Leap 15.4:kernel-default-devel-5.14.21-150400.24.21.2.aarch64",
            "openSUSE Leap 15.4:kernel-default-devel-5.14.21-150400.24.21.2.ppc64le",
            "openSUSE Leap 15.4:kernel-default-devel-5.14.21-150400.24.21.2.s390x",
            "openSUSE Leap 15.4:kernel-default-devel-5.14.21-150400.24.21.2.x86_64",
            "openSUSE Leap 15.4:kernel-default-extra-5.14.21-150400.24.21.2.aarch64",
            "openSUSE Leap 15.4:kernel-default-extra-5.14.21-150400.24.21.2.ppc64le",
            "openSUSE Leap 15.4:kernel-default-extra-5.14.21-150400.24.21.2.s390x",
            "openSUSE Leap 15.4:kernel-default-extra-5.14.21-150400.24.21.2.x86_64",
            "openSUSE Leap 15.4:kernel-default-livepatch-5.14.21-150400.24.21.2.aarch64",
            "openSUSE Leap 15.4:kernel-default-livepatch-5.14.21-150400.24.21.2.ppc64le",
            "openSUSE Leap 15.4:kernel-default-livepatch-5.14.21-150400.24.21.2.s390x",
            "openSUSE Leap 15.4:kernel-default-livepatch-5.14.21-150400.24.21.2.x86_64",
            "openSUSE Leap 15.4:kernel-default-livepatch-devel-5.14.21-150400.24.21.2.aarch64",
            "openSUSE Leap 15.4:kernel-default-livepatch-devel-5.14.21-150400.24.21.2.ppc64le",
            "openSUSE Leap 15.4:kernel-default-livepatch-devel-5.14.21-150400.24.21.2.s390x",
            "openSUSE Leap 15.4:kernel-default-livepatch-devel-5.14.21-150400.24.21.2.x86_64",
            "openSUSE Leap 15.4:kernel-default-optional-5.14.21-150400.24.21.2.aarch64",
            "openSUSE Leap 15.4:kernel-default-optional-5.14.21-150400.24.21.2.ppc64le",
            "openSUSE Leap 15.4:kernel-default-optional-5.14.21-150400.24.21.2.s390x",
            "openSUSE Leap 15.4:kernel-default-optional-5.14.21-150400.24.21.2.x86_64",
            "openSUSE Leap 15.4:kernel-devel-5.14.21-150400.24.21.2.noarch",
            "openSUSE Leap 15.4:kernel-docs-5.14.21-150400.24.21.3.noarch",
            "openSUSE Leap 15.4:kernel-docs-html-5.14.21-150400.24.21.3.noarch",
            "openSUSE Leap 15.4:kernel-kvmsmall-5.14.21-150400.24.21.2.aarch64",
            "openSUSE Leap 15.4:kernel-kvmsmall-5.14.21-150400.24.21.2.ppc64le",
            "openSUSE Leap 15.4:kernel-kvmsmall-5.14.21-150400.24.21.2.x86_64",
            "openSUSE Leap 15.4:kernel-kvmsmall-devel-5.14.21-150400.24.21.2.aarch64",
            "openSUSE Leap 15.4:kernel-kvmsmall-devel-5.14.21-150400.24.21.2.ppc64le",
            "openSUSE Leap 15.4:kernel-kvmsmall-devel-5.14.21-150400.24.21.2.x86_64",
            "openSUSE Leap 15.4:kernel-kvmsmall-livepatch-devel-5.14.21-150400.24.21.2.aarch64",
            "openSUSE Leap 15.4:kernel-kvmsmall-livepatch-devel-5.14.21-150400.24.21.2.ppc64le",
            "openSUSE Leap 15.4:kernel-kvmsmall-livepatch-devel-5.14.21-150400.24.21.2.x86_64",
            "openSUSE Leap 15.4:kernel-macros-5.14.21-150400.24.21.2.noarch",
            "openSUSE Leap 15.4:kernel-obs-build-5.14.21-150400.24.21.2.aarch64",
            "openSUSE Leap 15.4:kernel-obs-build-5.14.21-150400.24.21.2.ppc64le",
            "openSUSE Leap 15.4:kernel-obs-build-5.14.21-150400.24.21.2.s390x",
            "openSUSE Leap 15.4:kernel-obs-build-5.14.21-150400.24.21.2.x86_64",
            "openSUSE Leap 15.4:kernel-obs-qa-5.14.21-150400.24.21.1.aarch64",
            "openSUSE Leap 15.4:kernel-obs-qa-5.14.21-150400.24.21.1.ppc64le",
            "openSUSE Leap 15.4:kernel-obs-qa-5.14.21-150400.24.21.1.s390x",
            "openSUSE Leap 15.4:kernel-obs-qa-5.14.21-150400.24.21.1.x86_64",
            "openSUSE Leap 15.4:kernel-source-5.14.21-150400.24.21.2.noarch",
            "openSUSE Leap 15.4:kernel-source-vanilla-5.14.21-150400.24.21.2.noarch",
            "openSUSE Leap 15.4:kernel-syms-5.14.21-150400.24.21.1.aarch64",
            "openSUSE Leap 15.4:kernel-syms-5.14.21-150400.24.21.1.ppc64le",
            "openSUSE Leap 15.4:kernel-syms-5.14.21-150400.24.21.1.s390x",
            "openSUSE Leap 15.4:kernel-syms-5.14.21-150400.24.21.1.x86_64",
            "openSUSE Leap 15.4:kernel-zfcpdump-5.14.21-150400.24.21.2.s390x",
            "openSUSE Leap 15.4:kselftests-kmp-64kb-5.14.21-150400.24.21.2.aarch64",
            "openSUSE Leap 15.4:kselftests-kmp-default-5.14.21-150400.24.21.2.aarch64",
            "openSUSE Leap 15.4:kselftests-kmp-default-5.14.21-150400.24.21.2.ppc64le",
            "openSUSE Leap 15.4:kselftests-kmp-default-5.14.21-150400.24.21.2.s390x",
            "openSUSE Leap 15.4:kselftests-kmp-default-5.14.21-150400.24.21.2.x86_64",
            "openSUSE Leap 15.4:ocfs2-kmp-64kb-5.14.21-150400.24.21.2.aarch64",
            "openSUSE Leap 15.4:ocfs2-kmp-default-5.14.21-150400.24.21.2.aarch64",
            "openSUSE Leap 15.4:ocfs2-kmp-default-5.14.21-150400.24.21.2.ppc64le",
            "openSUSE Leap 15.4:ocfs2-kmp-default-5.14.21-150400.24.21.2.s390x",
            "openSUSE Leap 15.4:ocfs2-kmp-default-5.14.21-150400.24.21.2.x86_64",
            "openSUSE Leap 15.4:reiserfs-kmp-64kb-5.14.21-150400.24.21.2.aarch64",
            "openSUSE Leap 15.4:reiserfs-kmp-default-5.14.21-150400.24.21.2.aarch64",
            "openSUSE Leap 15.4:reiserfs-kmp-default-5.14.21-150400.24.21.2.ppc64le",
            "openSUSE Leap 15.4:reiserfs-kmp-default-5.14.21-150400.24.21.2.s390x",
            "openSUSE Leap 15.4:reiserfs-kmp-default-5.14.21-150400.24.21.2.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 7,
            "baseSeverity": "HIGH",
            "vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H",
            "version": "3.1"
          },
          "products": [
            "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.21.2.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.21.2.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.21.2.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.21.2.x86_64",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.21.2.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.21.2.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.21.2.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.21.2.x86_64",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.21.2.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.21.2.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.21.2.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.21.2.x86_64",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.21.2.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.21.2.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.21.2.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.21.2.x86_64",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.21.2.ppc64le",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.21.2.s390x",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.21.2.x86_64",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.21.2.ppc64le",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.21.2.s390x",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.21.2.x86_64",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_21-default-1-150400.9.3.2.ppc64le",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_21-default-1-150400.9.3.2.s390x",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_21-default-1-150400.9.3.2.x86_64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-64kb-5.14.21-150400.24.21.2.aarch64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-64kb-devel-5.14.21-150400.24.21.2.aarch64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-5.14.21-150400.24.21.2.aarch64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-5.14.21-150400.24.21.2.ppc64le",
            "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-5.14.21-150400.24.21.2.s390x",
            "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-5.14.21-150400.24.21.2.x86_64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-base-5.14.21-150400.24.21.2.150400.24.7.2.aarch64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-base-5.14.21-150400.24.21.2.150400.24.7.2.ppc64le",
            "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-base-5.14.21-150400.24.21.2.150400.24.7.2.s390x",
            "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-base-5.14.21-150400.24.21.2.150400.24.7.2.x86_64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-devel-5.14.21-150400.24.21.2.aarch64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-devel-5.14.21-150400.24.21.2.ppc64le",
            "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-devel-5.14.21-150400.24.21.2.s390x",
            "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-devel-5.14.21-150400.24.21.2.x86_64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-devel-5.14.21-150400.24.21.2.noarch",
            "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-macros-5.14.21-150400.24.21.2.noarch",
            "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-zfcpdump-5.14.21-150400.24.21.2.s390x",
            "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-docs-5.14.21-150400.24.21.3.noarch",
            "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-obs-build-5.14.21-150400.24.21.2.aarch64",
            "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-obs-build-5.14.21-150400.24.21.2.ppc64le",
            "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-obs-build-5.14.21-150400.24.21.2.s390x",
            "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-obs-build-5.14.21-150400.24.21.2.x86_64",
            "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-source-5.14.21-150400.24.21.2.noarch",
            "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-syms-5.14.21-150400.24.21.1.aarch64",
            "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-syms-5.14.21-150400.24.21.1.ppc64le",
            "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-syms-5.14.21-150400.24.21.1.s390x",
            "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-syms-5.14.21-150400.24.21.1.x86_64",
            "SUSE Linux Enterprise Module for Legacy 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.21.2.aarch64",
            "SUSE Linux Enterprise Module for Legacy 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.21.2.ppc64le",
            "SUSE Linux Enterprise Module for Legacy 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.21.2.s390x",
            "SUSE Linux Enterprise Module for Legacy 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.21.2.x86_64",
            "SUSE Linux Enterprise Workstation Extension 15 SP4:kernel-default-extra-5.14.21-150400.24.21.2.x86_64",
            "openSUSE Leap 15.4:cluster-md-kmp-64kb-5.14.21-150400.24.21.2.aarch64",
            "openSUSE Leap 15.4:cluster-md-kmp-default-5.14.21-150400.24.21.2.aarch64",
            "openSUSE Leap 15.4:cluster-md-kmp-default-5.14.21-150400.24.21.2.ppc64le",
            "openSUSE Leap 15.4:cluster-md-kmp-default-5.14.21-150400.24.21.2.s390x",
            "openSUSE Leap 15.4:cluster-md-kmp-default-5.14.21-150400.24.21.2.x86_64",
            "openSUSE Leap 15.4:dlm-kmp-64kb-5.14.21-150400.24.21.2.aarch64",
            "openSUSE Leap 15.4:dlm-kmp-default-5.14.21-150400.24.21.2.aarch64",
            "openSUSE Leap 15.4:dlm-kmp-default-5.14.21-150400.24.21.2.ppc64le",
            "openSUSE Leap 15.4:dlm-kmp-default-5.14.21-150400.24.21.2.s390x",
            "openSUSE Leap 15.4:dlm-kmp-default-5.14.21-150400.24.21.2.x86_64",
            "openSUSE Leap 15.4:dtb-allwinner-5.14.21-150400.24.21.1.aarch64",
            "openSUSE Leap 15.4:dtb-altera-5.14.21-150400.24.21.1.aarch64",
            "openSUSE Leap 15.4:dtb-amazon-5.14.21-150400.24.21.1.aarch64",
            "openSUSE Leap 15.4:dtb-amd-5.14.21-150400.24.21.1.aarch64",
            "openSUSE Leap 15.4:dtb-amlogic-5.14.21-150400.24.21.1.aarch64",
            "openSUSE Leap 15.4:dtb-apm-5.14.21-150400.24.21.1.aarch64",
            "openSUSE Leap 15.4:dtb-apple-5.14.21-150400.24.21.1.aarch64",
            "openSUSE Leap 15.4:dtb-arm-5.14.21-150400.24.21.1.aarch64",
            "openSUSE Leap 15.4:dtb-broadcom-5.14.21-150400.24.21.1.aarch64",
            "openSUSE Leap 15.4:dtb-cavium-5.14.21-150400.24.21.1.aarch64",
            "openSUSE Leap 15.4:dtb-exynos-5.14.21-150400.24.21.1.aarch64",
            "openSUSE Leap 15.4:dtb-freescale-5.14.21-150400.24.21.1.aarch64",
            "openSUSE Leap 15.4:dtb-hisilicon-5.14.21-150400.24.21.1.aarch64",
            "openSUSE Leap 15.4:dtb-lg-5.14.21-150400.24.21.1.aarch64",
            "openSUSE Leap 15.4:dtb-marvell-5.14.21-150400.24.21.1.aarch64",
            "openSUSE Leap 15.4:dtb-mediatek-5.14.21-150400.24.21.1.aarch64",
            "openSUSE Leap 15.4:dtb-nvidia-5.14.21-150400.24.21.1.aarch64",
            "openSUSE Leap 15.4:dtb-qcom-5.14.21-150400.24.21.1.aarch64",
            "openSUSE Leap 15.4:dtb-renesas-5.14.21-150400.24.21.1.aarch64",
            "openSUSE Leap 15.4:dtb-rockchip-5.14.21-150400.24.21.1.aarch64",
            "openSUSE Leap 15.4:dtb-socionext-5.14.21-150400.24.21.1.aarch64",
            "openSUSE Leap 15.4:dtb-sprd-5.14.21-150400.24.21.1.aarch64",
            "openSUSE Leap 15.4:dtb-xilinx-5.14.21-150400.24.21.1.aarch64",
            "openSUSE Leap 15.4:gfs2-kmp-64kb-5.14.21-150400.24.21.2.aarch64",
            "openSUSE Leap 15.4:gfs2-kmp-default-5.14.21-150400.24.21.2.aarch64",
            "openSUSE Leap 15.4:gfs2-kmp-default-5.14.21-150400.24.21.2.ppc64le",
            "openSUSE Leap 15.4:gfs2-kmp-default-5.14.21-150400.24.21.2.s390x",
            "openSUSE Leap 15.4:gfs2-kmp-default-5.14.21-150400.24.21.2.x86_64",
            "openSUSE Leap 15.4:kernel-64kb-5.14.21-150400.24.21.2.aarch64",
            "openSUSE Leap 15.4:kernel-64kb-devel-5.14.21-150400.24.21.2.aarch64",
            "openSUSE Leap 15.4:kernel-64kb-extra-5.14.21-150400.24.21.2.aarch64",
            "openSUSE Leap 15.4:kernel-64kb-livepatch-devel-5.14.21-150400.24.21.2.aarch64",
            "openSUSE Leap 15.4:kernel-64kb-optional-5.14.21-150400.24.21.2.aarch64",
            "openSUSE Leap 15.4:kernel-debug-5.14.21-150400.24.21.2.ppc64le",
            "openSUSE Leap 15.4:kernel-debug-5.14.21-150400.24.21.2.x86_64",
            "openSUSE Leap 15.4:kernel-debug-devel-5.14.21-150400.24.21.2.ppc64le",
            "openSUSE Leap 15.4:kernel-debug-devel-5.14.21-150400.24.21.2.x86_64",
            "openSUSE Leap 15.4:kernel-debug-livepatch-devel-5.14.21-150400.24.21.2.ppc64le",
            "openSUSE Leap 15.4:kernel-debug-livepatch-devel-5.14.21-150400.24.21.2.x86_64",
            "openSUSE Leap 15.4:kernel-default-5.14.21-150400.24.21.2.aarch64",
            "openSUSE Leap 15.4:kernel-default-5.14.21-150400.24.21.2.ppc64le",
            "openSUSE Leap 15.4:kernel-default-5.14.21-150400.24.21.2.s390x",
            "openSUSE Leap 15.4:kernel-default-5.14.21-150400.24.21.2.x86_64",
            "openSUSE Leap 15.4:kernel-default-base-5.14.21-150400.24.21.2.150400.24.7.2.aarch64",
            "openSUSE Leap 15.4:kernel-default-base-5.14.21-150400.24.21.2.150400.24.7.2.ppc64le",
            "openSUSE Leap 15.4:kernel-default-base-5.14.21-150400.24.21.2.150400.24.7.2.s390x",
            "openSUSE Leap 15.4:kernel-default-base-5.14.21-150400.24.21.2.150400.24.7.2.x86_64",
            "openSUSE Leap 15.4:kernel-default-base-rebuild-5.14.21-150400.24.21.2.150400.24.7.2.aarch64",
            "openSUSE Leap 15.4:kernel-default-base-rebuild-5.14.21-150400.24.21.2.150400.24.7.2.ppc64le",
            "openSUSE Leap 15.4:kernel-default-base-rebuild-5.14.21-150400.24.21.2.150400.24.7.2.s390x",
            "openSUSE Leap 15.4:kernel-default-base-rebuild-5.14.21-150400.24.21.2.150400.24.7.2.x86_64",
            "openSUSE Leap 15.4:kernel-default-devel-5.14.21-150400.24.21.2.aarch64",
            "openSUSE Leap 15.4:kernel-default-devel-5.14.21-150400.24.21.2.ppc64le",
            "openSUSE Leap 15.4:kernel-default-devel-5.14.21-150400.24.21.2.s390x",
            "openSUSE Leap 15.4:kernel-default-devel-5.14.21-150400.24.21.2.x86_64",
            "openSUSE Leap 15.4:kernel-default-extra-5.14.21-150400.24.21.2.aarch64",
            "openSUSE Leap 15.4:kernel-default-extra-5.14.21-150400.24.21.2.ppc64le",
            "openSUSE Leap 15.4:kernel-default-extra-5.14.21-150400.24.21.2.s390x",
            "openSUSE Leap 15.4:kernel-default-extra-5.14.21-150400.24.21.2.x86_64",
            "openSUSE Leap 15.4:kernel-default-livepatch-5.14.21-150400.24.21.2.aarch64",
            "openSUSE Leap 15.4:kernel-default-livepatch-5.14.21-150400.24.21.2.ppc64le",
            "openSUSE Leap 15.4:kernel-default-livepatch-5.14.21-150400.24.21.2.s390x",
            "openSUSE Leap 15.4:kernel-default-livepatch-5.14.21-150400.24.21.2.x86_64",
            "openSUSE Leap 15.4:kernel-default-livepatch-devel-5.14.21-150400.24.21.2.aarch64",
            "openSUSE Leap 15.4:kernel-default-livepatch-devel-5.14.21-150400.24.21.2.ppc64le",
            "openSUSE Leap 15.4:kernel-default-livepatch-devel-5.14.21-150400.24.21.2.s390x",
            "openSUSE Leap 15.4:kernel-default-livepatch-devel-5.14.21-150400.24.21.2.x86_64",
            "openSUSE Leap 15.4:kernel-default-optional-5.14.21-150400.24.21.2.aarch64",
            "openSUSE Leap 15.4:kernel-default-optional-5.14.21-150400.24.21.2.ppc64le",
            "openSUSE Leap 15.4:kernel-default-optional-5.14.21-150400.24.21.2.s390x",
            "openSUSE Leap 15.4:kernel-default-optional-5.14.21-150400.24.21.2.x86_64",
            "openSUSE Leap 15.4:kernel-devel-5.14.21-150400.24.21.2.noarch",
            "openSUSE Leap 15.4:kernel-docs-5.14.21-150400.24.21.3.noarch",
            "openSUSE Leap 15.4:kernel-docs-html-5.14.21-150400.24.21.3.noarch",
            "openSUSE Leap 15.4:kernel-kvmsmall-5.14.21-150400.24.21.2.aarch64",
            "openSUSE Leap 15.4:kernel-kvmsmall-5.14.21-150400.24.21.2.ppc64le",
            "openSUSE Leap 15.4:kernel-kvmsmall-5.14.21-150400.24.21.2.x86_64",
            "openSUSE Leap 15.4:kernel-kvmsmall-devel-5.14.21-150400.24.21.2.aarch64",
            "openSUSE Leap 15.4:kernel-kvmsmall-devel-5.14.21-150400.24.21.2.ppc64le",
            "openSUSE Leap 15.4:kernel-kvmsmall-devel-5.14.21-150400.24.21.2.x86_64",
            "openSUSE Leap 15.4:kernel-kvmsmall-livepatch-devel-5.14.21-150400.24.21.2.aarch64",
            "openSUSE Leap 15.4:kernel-kvmsmall-livepatch-devel-5.14.21-150400.24.21.2.ppc64le",
            "openSUSE Leap 15.4:kernel-kvmsmall-livepatch-devel-5.14.21-150400.24.21.2.x86_64",
            "openSUSE Leap 15.4:kernel-macros-5.14.21-150400.24.21.2.noarch",
            "openSUSE Leap 15.4:kernel-obs-build-5.14.21-150400.24.21.2.aarch64",
            "openSUSE Leap 15.4:kernel-obs-build-5.14.21-150400.24.21.2.ppc64le",
            "openSUSE Leap 15.4:kernel-obs-build-5.14.21-150400.24.21.2.s390x",
            "openSUSE Leap 15.4:kernel-obs-build-5.14.21-150400.24.21.2.x86_64",
            "openSUSE Leap 15.4:kernel-obs-qa-5.14.21-150400.24.21.1.aarch64",
            "openSUSE Leap 15.4:kernel-obs-qa-5.14.21-150400.24.21.1.ppc64le",
            "openSUSE Leap 15.4:kernel-obs-qa-5.14.21-150400.24.21.1.s390x",
            "openSUSE Leap 15.4:kernel-obs-qa-5.14.21-150400.24.21.1.x86_64",
            "openSUSE Leap 15.4:kernel-source-5.14.21-150400.24.21.2.noarch",
            "openSUSE Leap 15.4:kernel-source-vanilla-5.14.21-150400.24.21.2.noarch",
            "openSUSE Leap 15.4:kernel-syms-5.14.21-150400.24.21.1.aarch64",
            "openSUSE Leap 15.4:kernel-syms-5.14.21-150400.24.21.1.ppc64le",
            "openSUSE Leap 15.4:kernel-syms-5.14.21-150400.24.21.1.s390x",
            "openSUSE Leap 15.4:kernel-syms-5.14.21-150400.24.21.1.x86_64",
            "openSUSE Leap 15.4:kernel-zfcpdump-5.14.21-150400.24.21.2.s390x",
            "openSUSE Leap 15.4:kselftests-kmp-64kb-5.14.21-150400.24.21.2.aarch64",
            "openSUSE Leap 15.4:kselftests-kmp-default-5.14.21-150400.24.21.2.aarch64",
            "openSUSE Leap 15.4:kselftests-kmp-default-5.14.21-150400.24.21.2.ppc64le",
            "openSUSE Leap 15.4:kselftests-kmp-default-5.14.21-150400.24.21.2.s390x",
            "openSUSE Leap 15.4:kselftests-kmp-default-5.14.21-150400.24.21.2.x86_64",
            "openSUSE Leap 15.4:ocfs2-kmp-64kb-5.14.21-150400.24.21.2.aarch64",
            "openSUSE Leap 15.4:ocfs2-kmp-default-5.14.21-150400.24.21.2.aarch64",
            "openSUSE Leap 15.4:ocfs2-kmp-default-5.14.21-150400.24.21.2.ppc64le",
            "openSUSE Leap 15.4:ocfs2-kmp-default-5.14.21-150400.24.21.2.s390x",
            "openSUSE Leap 15.4:ocfs2-kmp-default-5.14.21-150400.24.21.2.x86_64",
            "openSUSE Leap 15.4:reiserfs-kmp-64kb-5.14.21-150400.24.21.2.aarch64",
            "openSUSE Leap 15.4:reiserfs-kmp-default-5.14.21-150400.24.21.2.aarch64",
            "openSUSE Leap 15.4:reiserfs-kmp-default-5.14.21-150400.24.21.2.ppc64le",
            "openSUSE Leap 15.4:reiserfs-kmp-default-5.14.21-150400.24.21.2.s390x",
            "openSUSE Leap 15.4:reiserfs-kmp-default-5.14.21-150400.24.21.2.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2022-09-16T15:30:19Z",
          "details": "moderate"
        }
      ],
      "title": "CVE-2022-39188"
    },
    {
      "cve": "CVE-2022-39190",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2022-39190"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "An issue was discovered in net/netfilter/nf_tables_api.c in the Linux kernel before 5.19.6. A denial of service can occur upon binding to an already bound chain.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.21.2.aarch64",
          "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.21.2.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.21.2.s390x",
          "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.21.2.x86_64",
          "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.21.2.aarch64",
          "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.21.2.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.21.2.s390x",
          "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.21.2.x86_64",
          "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.21.2.aarch64",
          "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.21.2.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.21.2.s390x",
          "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.21.2.x86_64",
          "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.21.2.aarch64",
          "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.21.2.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.21.2.s390x",
          "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.21.2.x86_64",
          "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.21.2.ppc64le",
          "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.21.2.s390x",
          "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.21.2.x86_64",
          "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.21.2.ppc64le",
          "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.21.2.s390x",
          "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.21.2.x86_64",
          "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_21-default-1-150400.9.3.2.ppc64le",
          "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_21-default-1-150400.9.3.2.s390x",
          "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_21-default-1-150400.9.3.2.x86_64",
          "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-64kb-5.14.21-150400.24.21.2.aarch64",
          "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-64kb-devel-5.14.21-150400.24.21.2.aarch64",
          "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-5.14.21-150400.24.21.2.aarch64",
          "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-5.14.21-150400.24.21.2.ppc64le",
          "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-5.14.21-150400.24.21.2.s390x",
          "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-5.14.21-150400.24.21.2.x86_64",
          "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-base-5.14.21-150400.24.21.2.150400.24.7.2.aarch64",
          "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-base-5.14.21-150400.24.21.2.150400.24.7.2.ppc64le",
          "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-base-5.14.21-150400.24.21.2.150400.24.7.2.s390x",
          "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-base-5.14.21-150400.24.21.2.150400.24.7.2.x86_64",
          "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-devel-5.14.21-150400.24.21.2.aarch64",
          "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-devel-5.14.21-150400.24.21.2.ppc64le",
          "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-devel-5.14.21-150400.24.21.2.s390x",
          "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-devel-5.14.21-150400.24.21.2.x86_64",
          "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-devel-5.14.21-150400.24.21.2.noarch",
          "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-macros-5.14.21-150400.24.21.2.noarch",
          "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-zfcpdump-5.14.21-150400.24.21.2.s390x",
          "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-docs-5.14.21-150400.24.21.3.noarch",
          "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-obs-build-5.14.21-150400.24.21.2.aarch64",
          "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-obs-build-5.14.21-150400.24.21.2.ppc64le",
          "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-obs-build-5.14.21-150400.24.21.2.s390x",
          "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-obs-build-5.14.21-150400.24.21.2.x86_64",
          "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-source-5.14.21-150400.24.21.2.noarch",
          "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-syms-5.14.21-150400.24.21.1.aarch64",
          "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-syms-5.14.21-150400.24.21.1.ppc64le",
          "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-syms-5.14.21-150400.24.21.1.s390x",
          "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-syms-5.14.21-150400.24.21.1.x86_64",
          "SUSE Linux Enterprise Module for Legacy 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.21.2.aarch64",
          "SUSE Linux Enterprise Module for Legacy 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.21.2.ppc64le",
          "SUSE Linux Enterprise Module for Legacy 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.21.2.s390x",
          "SUSE Linux Enterprise Module for Legacy 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.21.2.x86_64",
          "SUSE Linux Enterprise Workstation Extension 15 SP4:kernel-default-extra-5.14.21-150400.24.21.2.x86_64",
          "openSUSE Leap 15.4:cluster-md-kmp-64kb-5.14.21-150400.24.21.2.aarch64",
          "openSUSE Leap 15.4:cluster-md-kmp-default-5.14.21-150400.24.21.2.aarch64",
          "openSUSE Leap 15.4:cluster-md-kmp-default-5.14.21-150400.24.21.2.ppc64le",
          "openSUSE Leap 15.4:cluster-md-kmp-default-5.14.21-150400.24.21.2.s390x",
          "openSUSE Leap 15.4:cluster-md-kmp-default-5.14.21-150400.24.21.2.x86_64",
          "openSUSE Leap 15.4:dlm-kmp-64kb-5.14.21-150400.24.21.2.aarch64",
          "openSUSE Leap 15.4:dlm-kmp-default-5.14.21-150400.24.21.2.aarch64",
          "openSUSE Leap 15.4:dlm-kmp-default-5.14.21-150400.24.21.2.ppc64le",
          "openSUSE Leap 15.4:dlm-kmp-default-5.14.21-150400.24.21.2.s390x",
          "openSUSE Leap 15.4:dlm-kmp-default-5.14.21-150400.24.21.2.x86_64",
          "openSUSE Leap 15.4:dtb-allwinner-5.14.21-150400.24.21.1.aarch64",
          "openSUSE Leap 15.4:dtb-altera-5.14.21-150400.24.21.1.aarch64",
          "openSUSE Leap 15.4:dtb-amazon-5.14.21-150400.24.21.1.aarch64",
          "openSUSE Leap 15.4:dtb-amd-5.14.21-150400.24.21.1.aarch64",
          "openSUSE Leap 15.4:dtb-amlogic-5.14.21-150400.24.21.1.aarch64",
          "openSUSE Leap 15.4:dtb-apm-5.14.21-150400.24.21.1.aarch64",
          "openSUSE Leap 15.4:dtb-apple-5.14.21-150400.24.21.1.aarch64",
          "openSUSE Leap 15.4:dtb-arm-5.14.21-150400.24.21.1.aarch64",
          "openSUSE Leap 15.4:dtb-broadcom-5.14.21-150400.24.21.1.aarch64",
          "openSUSE Leap 15.4:dtb-cavium-5.14.21-150400.24.21.1.aarch64",
          "openSUSE Leap 15.4:dtb-exynos-5.14.21-150400.24.21.1.aarch64",
          "openSUSE Leap 15.4:dtb-freescale-5.14.21-150400.24.21.1.aarch64",
          "openSUSE Leap 15.4:dtb-hisilicon-5.14.21-150400.24.21.1.aarch64",
          "openSUSE Leap 15.4:dtb-lg-5.14.21-150400.24.21.1.aarch64",
          "openSUSE Leap 15.4:dtb-marvell-5.14.21-150400.24.21.1.aarch64",
          "openSUSE Leap 15.4:dtb-mediatek-5.14.21-150400.24.21.1.aarch64",
          "openSUSE Leap 15.4:dtb-nvidia-5.14.21-150400.24.21.1.aarch64",
          "openSUSE Leap 15.4:dtb-qcom-5.14.21-150400.24.21.1.aarch64",
          "openSUSE Leap 15.4:dtb-renesas-5.14.21-150400.24.21.1.aarch64",
          "openSUSE Leap 15.4:dtb-rockchip-5.14.21-150400.24.21.1.aarch64",
          "openSUSE Leap 15.4:dtb-socionext-5.14.21-150400.24.21.1.aarch64",
          "openSUSE Leap 15.4:dtb-sprd-5.14.21-150400.24.21.1.aarch64",
          "openSUSE Leap 15.4:dtb-xilinx-5.14.21-150400.24.21.1.aarch64",
          "openSUSE Leap 15.4:gfs2-kmp-64kb-5.14.21-150400.24.21.2.aarch64",
          "openSUSE Leap 15.4:gfs2-kmp-default-5.14.21-150400.24.21.2.aarch64",
          "openSUSE Leap 15.4:gfs2-kmp-default-5.14.21-150400.24.21.2.ppc64le",
          "openSUSE Leap 15.4:gfs2-kmp-default-5.14.21-150400.24.21.2.s390x",
          "openSUSE Leap 15.4:gfs2-kmp-default-5.14.21-150400.24.21.2.x86_64",
          "openSUSE Leap 15.4:kernel-64kb-5.14.21-150400.24.21.2.aarch64",
          "openSUSE Leap 15.4:kernel-64kb-devel-5.14.21-150400.24.21.2.aarch64",
          "openSUSE Leap 15.4:kernel-64kb-extra-5.14.21-150400.24.21.2.aarch64",
          "openSUSE Leap 15.4:kernel-64kb-livepatch-devel-5.14.21-150400.24.21.2.aarch64",
          "openSUSE Leap 15.4:kernel-64kb-optional-5.14.21-150400.24.21.2.aarch64",
          "openSUSE Leap 15.4:kernel-debug-5.14.21-150400.24.21.2.ppc64le",
          "openSUSE Leap 15.4:kernel-debug-5.14.21-150400.24.21.2.x86_64",
          "openSUSE Leap 15.4:kernel-debug-devel-5.14.21-150400.24.21.2.ppc64le",
          "openSUSE Leap 15.4:kernel-debug-devel-5.14.21-150400.24.21.2.x86_64",
          "openSUSE Leap 15.4:kernel-debug-livepatch-devel-5.14.21-150400.24.21.2.ppc64le",
          "openSUSE Leap 15.4:kernel-debug-livepatch-devel-5.14.21-150400.24.21.2.x86_64",
          "openSUSE Leap 15.4:kernel-default-5.14.21-150400.24.21.2.aarch64",
          "openSUSE Leap 15.4:kernel-default-5.14.21-150400.24.21.2.ppc64le",
          "openSUSE Leap 15.4:kernel-default-5.14.21-150400.24.21.2.s390x",
          "openSUSE Leap 15.4:kernel-default-5.14.21-150400.24.21.2.x86_64",
          "openSUSE Leap 15.4:kernel-default-base-5.14.21-150400.24.21.2.150400.24.7.2.aarch64",
          "openSUSE Leap 15.4:kernel-default-base-5.14.21-150400.24.21.2.150400.24.7.2.ppc64le",
          "openSUSE Leap 15.4:kernel-default-base-5.14.21-150400.24.21.2.150400.24.7.2.s390x",
          "openSUSE Leap 15.4:kernel-default-base-5.14.21-150400.24.21.2.150400.24.7.2.x86_64",
          "openSUSE Leap 15.4:kernel-default-base-rebuild-5.14.21-150400.24.21.2.150400.24.7.2.aarch64",
          "openSUSE Leap 15.4:kernel-default-base-rebuild-5.14.21-150400.24.21.2.150400.24.7.2.ppc64le",
          "openSUSE Leap 15.4:kernel-default-base-rebuild-5.14.21-150400.24.21.2.150400.24.7.2.s390x",
          "openSUSE Leap 15.4:kernel-default-base-rebuild-5.14.21-150400.24.21.2.150400.24.7.2.x86_64",
          "openSUSE Leap 15.4:kernel-default-devel-5.14.21-150400.24.21.2.aarch64",
          "openSUSE Leap 15.4:kernel-default-devel-5.14.21-150400.24.21.2.ppc64le",
          "openSUSE Leap 15.4:kernel-default-devel-5.14.21-150400.24.21.2.s390x",
          "openSUSE Leap 15.4:kernel-default-devel-5.14.21-150400.24.21.2.x86_64",
          "openSUSE Leap 15.4:kernel-default-extra-5.14.21-150400.24.21.2.aarch64",
          "openSUSE Leap 15.4:kernel-default-extra-5.14.21-150400.24.21.2.ppc64le",
          "openSUSE Leap 15.4:kernel-default-extra-5.14.21-150400.24.21.2.s390x",
          "openSUSE Leap 15.4:kernel-default-extra-5.14.21-150400.24.21.2.x86_64",
          "openSUSE Leap 15.4:kernel-default-livepatch-5.14.21-150400.24.21.2.aarch64",
          "openSUSE Leap 15.4:kernel-default-livepatch-5.14.21-150400.24.21.2.ppc64le",
          "openSUSE Leap 15.4:kernel-default-livepatch-5.14.21-150400.24.21.2.s390x",
          "openSUSE Leap 15.4:kernel-default-livepatch-5.14.21-150400.24.21.2.x86_64",
          "openSUSE Leap 15.4:kernel-default-livepatch-devel-5.14.21-150400.24.21.2.aarch64",
          "openSUSE Leap 15.4:kernel-default-livepatch-devel-5.14.21-150400.24.21.2.ppc64le",
          "openSUSE Leap 15.4:kernel-default-livepatch-devel-5.14.21-150400.24.21.2.s390x",
          "openSUSE Leap 15.4:kernel-default-livepatch-devel-5.14.21-150400.24.21.2.x86_64",
          "openSUSE Leap 15.4:kernel-default-optional-5.14.21-150400.24.21.2.aarch64",
          "openSUSE Leap 15.4:kernel-default-optional-5.14.21-150400.24.21.2.ppc64le",
          "openSUSE Leap 15.4:kernel-default-optional-5.14.21-150400.24.21.2.s390x",
          "openSUSE Leap 15.4:kernel-default-optional-5.14.21-150400.24.21.2.x86_64",
          "openSUSE Leap 15.4:kernel-devel-5.14.21-150400.24.21.2.noarch",
          "openSUSE Leap 15.4:kernel-docs-5.14.21-150400.24.21.3.noarch",
          "openSUSE Leap 15.4:kernel-docs-html-5.14.21-150400.24.21.3.noarch",
          "openSUSE Leap 15.4:kernel-kvmsmall-5.14.21-150400.24.21.2.aarch64",
          "openSUSE Leap 15.4:kernel-kvmsmall-5.14.21-150400.24.21.2.ppc64le",
          "openSUSE Leap 15.4:kernel-kvmsmall-5.14.21-150400.24.21.2.x86_64",
          "openSUSE Leap 15.4:kernel-kvmsmall-devel-5.14.21-150400.24.21.2.aarch64",
          "openSUSE Leap 15.4:kernel-kvmsmall-devel-5.14.21-150400.24.21.2.ppc64le",
          "openSUSE Leap 15.4:kernel-kvmsmall-devel-5.14.21-150400.24.21.2.x86_64",
          "openSUSE Leap 15.4:kernel-kvmsmall-livepatch-devel-5.14.21-150400.24.21.2.aarch64",
          "openSUSE Leap 15.4:kernel-kvmsmall-livepatch-devel-5.14.21-150400.24.21.2.ppc64le",
          "openSUSE Leap 15.4:kernel-kvmsmall-livepatch-devel-5.14.21-150400.24.21.2.x86_64",
          "openSUSE Leap 15.4:kernel-macros-5.14.21-150400.24.21.2.noarch",
          "openSUSE Leap 15.4:kernel-obs-build-5.14.21-150400.24.21.2.aarch64",
          "openSUSE Leap 15.4:kernel-obs-build-5.14.21-150400.24.21.2.ppc64le",
          "openSUSE Leap 15.4:kernel-obs-build-5.14.21-150400.24.21.2.s390x",
          "openSUSE Leap 15.4:kernel-obs-build-5.14.21-150400.24.21.2.x86_64",
          "openSUSE Leap 15.4:kernel-obs-qa-5.14.21-150400.24.21.1.aarch64",
          "openSUSE Leap 15.4:kernel-obs-qa-5.14.21-150400.24.21.1.ppc64le",
          "openSUSE Leap 15.4:kernel-obs-qa-5.14.21-150400.24.21.1.s390x",
          "openSUSE Leap 15.4:kernel-obs-qa-5.14.21-150400.24.21.1.x86_64",
          "openSUSE Leap 15.4:kernel-source-5.14.21-150400.24.21.2.noarch",
          "openSUSE Leap 15.4:kernel-source-vanilla-5.14.21-150400.24.21.2.noarch",
          "openSUSE Leap 15.4:kernel-syms-5.14.21-150400.24.21.1.aarch64",
          "openSUSE Leap 15.4:kernel-syms-5.14.21-150400.24.21.1.ppc64le",
          "openSUSE Leap 15.4:kernel-syms-5.14.21-150400.24.21.1.s390x",
          "openSUSE Leap 15.4:kernel-syms-5.14.21-150400.24.21.1.x86_64",
          "openSUSE Leap 15.4:kernel-zfcpdump-5.14.21-150400.24.21.2.s390x",
          "openSUSE Leap 15.4:kselftests-kmp-64kb-5.14.21-150400.24.21.2.aarch64",
          "openSUSE Leap 15.4:kselftests-kmp-default-5.14.21-150400.24.21.2.aarch64",
          "openSUSE Leap 15.4:kselftests-kmp-default-5.14.21-150400.24.21.2.ppc64le",
          "openSUSE Leap 15.4:kselftests-kmp-default-5.14.21-150400.24.21.2.s390x",
          "openSUSE Leap 15.4:kselftests-kmp-default-5.14.21-150400.24.21.2.x86_64",
          "openSUSE Leap 15.4:ocfs2-kmp-64kb-5.14.21-150400.24.21.2.aarch64",
          "openSUSE Leap 15.4:ocfs2-kmp-default-5.14.21-150400.24.21.2.aarch64",
          "openSUSE Leap 15.4:ocfs2-kmp-default-5.14.21-150400.24.21.2.ppc64le",
          "openSUSE Leap 15.4:ocfs2-kmp-default-5.14.21-150400.24.21.2.s390x",
          "openSUSE Leap 15.4:ocfs2-kmp-default-5.14.21-150400.24.21.2.x86_64",
          "openSUSE Leap 15.4:reiserfs-kmp-64kb-5.14.21-150400.24.21.2.aarch64",
          "openSUSE Leap 15.4:reiserfs-kmp-default-5.14.21-150400.24.21.2.aarch64",
          "openSUSE Leap 15.4:reiserfs-kmp-default-5.14.21-150400.24.21.2.ppc64le",
          "openSUSE Leap 15.4:reiserfs-kmp-default-5.14.21-150400.24.21.2.s390x",
          "openSUSE Leap 15.4:reiserfs-kmp-default-5.14.21-150400.24.21.2.x86_64"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2022-39190",
          "url": "https://www.suse.com/security/cve/CVE-2022-39190"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1203117 for CVE-2022-39190",
          "url": "https://bugzilla.suse.com/1203117"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.21.2.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.21.2.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.21.2.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.21.2.x86_64",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.21.2.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.21.2.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.21.2.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.21.2.x86_64",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.21.2.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.21.2.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.21.2.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.21.2.x86_64",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.21.2.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.21.2.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.21.2.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.21.2.x86_64",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.21.2.ppc64le",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.21.2.s390x",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.21.2.x86_64",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.21.2.ppc64le",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.21.2.s390x",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.21.2.x86_64",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_21-default-1-150400.9.3.2.ppc64le",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_21-default-1-150400.9.3.2.s390x",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_21-default-1-150400.9.3.2.x86_64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-64kb-5.14.21-150400.24.21.2.aarch64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-64kb-devel-5.14.21-150400.24.21.2.aarch64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-5.14.21-150400.24.21.2.aarch64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-5.14.21-150400.24.21.2.ppc64le",
            "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-5.14.21-150400.24.21.2.s390x",
            "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-5.14.21-150400.24.21.2.x86_64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-base-5.14.21-150400.24.21.2.150400.24.7.2.aarch64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-base-5.14.21-150400.24.21.2.150400.24.7.2.ppc64le",
            "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-base-5.14.21-150400.24.21.2.150400.24.7.2.s390x",
            "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-base-5.14.21-150400.24.21.2.150400.24.7.2.x86_64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-devel-5.14.21-150400.24.21.2.aarch64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-devel-5.14.21-150400.24.21.2.ppc64le",
            "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-devel-5.14.21-150400.24.21.2.s390x",
            "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-devel-5.14.21-150400.24.21.2.x86_64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-devel-5.14.21-150400.24.21.2.noarch",
            "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-macros-5.14.21-150400.24.21.2.noarch",
            "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-zfcpdump-5.14.21-150400.24.21.2.s390x",
            "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-docs-5.14.21-150400.24.21.3.noarch",
            "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-obs-build-5.14.21-150400.24.21.2.aarch64",
            "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-obs-build-5.14.21-150400.24.21.2.ppc64le",
            "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-obs-build-5.14.21-150400.24.21.2.s390x",
            "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-obs-build-5.14.21-150400.24.21.2.x86_64",
            "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-source-5.14.21-150400.24.21.2.noarch",
            "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-syms-5.14.21-150400.24.21.1.aarch64",
            "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-syms-5.14.21-150400.24.21.1.ppc64le",
            "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-syms-5.14.21-150400.24.21.1.s390x",
            "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-syms-5.14.21-150400.24.21.1.x86_64",
            "SUSE Linux Enterprise Module for Legacy 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.21.2.aarch64",
            "SUSE Linux Enterprise Module for Legacy 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.21.2.ppc64le",
            "SUSE Linux Enterprise Module for Legacy 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.21.2.s390x",
            "SUSE Linux Enterprise Module for Legacy 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.21.2.x86_64",
            "SUSE Linux Enterprise Workstation Extension 15 SP4:kernel-default-extra-5.14.21-150400.24.21.2.x86_64",
            "openSUSE Leap 15.4:cluster-md-kmp-64kb-5.14.21-150400.24.21.2.aarch64",
            "openSUSE Leap 15.4:cluster-md-kmp-default-5.14.21-150400.24.21.2.aarch64",
            "openSUSE Leap 15.4:cluster-md-kmp-default-5.14.21-150400.24.21.2.ppc64le",
            "openSUSE Leap 15.4:cluster-md-kmp-default-5.14.21-150400.24.21.2.s390x",
            "openSUSE Leap 15.4:cluster-md-kmp-default-5.14.21-150400.24.21.2.x86_64",
            "openSUSE Leap 15.4:dlm-kmp-64kb-5.14.21-150400.24.21.2.aarch64",
            "openSUSE Leap 15.4:dlm-kmp-default-5.14.21-150400.24.21.2.aarch64",
            "openSUSE Leap 15.4:dlm-kmp-default-5.14.21-150400.24.21.2.ppc64le",
            "openSUSE Leap 15.4:dlm-kmp-default-5.14.21-150400.24.21.2.s390x",
            "openSUSE Leap 15.4:dlm-kmp-default-5.14.21-150400.24.21.2.x86_64",
            "openSUSE Leap 15.4:dtb-allwinner-5.14.21-150400.24.21.1.aarch64",
            "openSUSE Leap 15.4:dtb-altera-5.14.21-150400.24.21.1.aarch64",
            "openSUSE Leap 15.4:dtb-amazon-5.14.21-150400.24.21.1.aarch64",
            "openSUSE Leap 15.4:dtb-amd-5.14.21-150400.24.21.1.aarch64",
            "openSUSE Leap 15.4:dtb-amlogic-5.14.21-150400.24.21.1.aarch64",
            "openSUSE Leap 15.4:dtb-apm-5.14.21-150400.24.21.1.aarch64",
            "openSUSE Leap 15.4:dtb-apple-5.14.21-150400.24.21.1.aarch64",
            "openSUSE Leap 15.4:dtb-arm-5.14.21-150400.24.21.1.aarch64",
            "openSUSE Leap 15.4:dtb-broadcom-5.14.21-150400.24.21.1.aarch64",
            "openSUSE Leap 15.4:dtb-cavium-5.14.21-150400.24.21.1.aarch64",
            "openSUSE Leap 15.4:dtb-exynos-5.14.21-150400.24.21.1.aarch64",
            "openSUSE Leap 15.4:dtb-freescale-5.14.21-150400.24.21.1.aarch64",
            "openSUSE Leap 15.4:dtb-hisilicon-5.14.21-150400.24.21.1.aarch64",
            "openSUSE Leap 15.4:dtb-lg-5.14.21-150400.24.21.1.aarch64",
            "openSUSE Leap 15.4:dtb-marvell-5.14.21-150400.24.21.1.aarch64",
            "openSUSE Leap 15.4:dtb-mediatek-5.14.21-150400.24.21.1.aarch64",
            "openSUSE Leap 15.4:dtb-nvidia-5.14.21-150400.24.21.1.aarch64",
            "openSUSE Leap 15.4:dtb-qcom-5.14.21-150400.24.21.1.aarch64",
            "openSUSE Leap 15.4:dtb-renesas-5.14.21-150400.24.21.1.aarch64",
            "openSUSE Leap 15.4:dtb-rockchip-5.14.21-150400.24.21.1.aarch64",
            "openSUSE Leap 15.4:dtb-socionext-5.14.21-150400.24.21.1.aarch64",
            "openSUSE Leap 15.4:dtb-sprd-5.14.21-150400.24.21.1.aarch64",
            "openSUSE Leap 15.4:dtb-xilinx-5.14.21-150400.24.21.1.aarch64",
            "openSUSE Leap 15.4:gfs2-kmp-64kb-5.14.21-150400.24.21.2.aarch64",
            "openSUSE Leap 15.4:gfs2-kmp-default-5.14.21-150400.24.21.2.aarch64",
            "openSUSE Leap 15.4:gfs2-kmp-default-5.14.21-150400.24.21.2.ppc64le",
            "openSUSE Leap 15.4:gfs2-kmp-default-5.14.21-150400.24.21.2.s390x",
            "openSUSE Leap 15.4:gfs2-kmp-default-5.14.21-150400.24.21.2.x86_64",
            "openSUSE Leap 15.4:kernel-64kb-5.14.21-150400.24.21.2.aarch64",
            "openSUSE Leap 15.4:kernel-64kb-devel-5.14.21-150400.24.21.2.aarch64",
            "openSUSE Leap 15.4:kernel-64kb-extra-5.14.21-150400.24.21.2.aarch64",
            "openSUSE Leap 15.4:kernel-64kb-livepatch-devel-5.14.21-150400.24.21.2.aarch64",
            "openSUSE Leap 15.4:kernel-64kb-optional-5.14.21-150400.24.21.2.aarch64",
            "openSUSE Leap 15.4:kernel-debug-5.14.21-150400.24.21.2.ppc64le",
            "openSUSE Leap 15.4:kernel-debug-5.14.21-150400.24.21.2.x86_64",
            "openSUSE Leap 15.4:kernel-debug-devel-5.14.21-150400.24.21.2.ppc64le",
            "openSUSE Leap 15.4:kernel-debug-devel-5.14.21-150400.24.21.2.x86_64",
            "openSUSE Leap 15.4:kernel-debug-livepatch-devel-5.14.21-150400.24.21.2.ppc64le",
            "openSUSE Leap 15.4:kernel-debug-livepatch-devel-5.14.21-150400.24.21.2.x86_64",
            "openSUSE Leap 15.4:kernel-default-5.14.21-150400.24.21.2.aarch64",
            "openSUSE Leap 15.4:kernel-default-5.14.21-150400.24.21.2.ppc64le",
            "openSUSE Leap 15.4:kernel-default-5.14.21-150400.24.21.2.s390x",
            "openSUSE Leap 15.4:kernel-default-5.14.21-150400.24.21.2.x86_64",
            "openSUSE Leap 15.4:kernel-default-base-5.14.21-150400.24.21.2.150400.24.7.2.aarch64",
            "openSUSE Leap 15.4:kernel-default-base-5.14.21-150400.24.21.2.150400.24.7.2.ppc64le",
            "openSUSE Leap 15.4:kernel-default-base-5.14.21-150400.24.21.2.150400.24.7.2.s390x",
            "openSUSE Leap 15.4:kernel-default-base-5.14.21-150400.24.21.2.150400.24.7.2.x86_64",
            "openSUSE Leap 15.4:kernel-default-base-rebuild-5.14.21-150400.24.21.2.150400.24.7.2.aarch64",
            "openSUSE Leap 15.4:kernel-default-base-rebuild-5.14.21-150400.24.21.2.150400.24.7.2.ppc64le",
            "openSUSE Leap 15.4:kernel-default-base-rebuild-5.14.21-150400.24.21.2.150400.24.7.2.s390x",
            "openSUSE Leap 15.4:kernel-default-base-rebuild-5.14.21-150400.24.21.2.150400.24.7.2.x86_64",
            "openSUSE Leap 15.4:kernel-default-devel-5.14.21-150400.24.21.2.aarch64",
            "openSUSE Leap 15.4:kernel-default-devel-5.14.21-150400.24.21.2.ppc64le",
            "openSUSE Leap 15.4:kernel-default-devel-5.14.21-150400.24.21.2.s390x",
            "openSUSE Leap 15.4:kernel-default-devel-5.14.21-150400.24.21.2.x86_64",
            "openSUSE Leap 15.4:kernel-default-extra-5.14.21-150400.24.21.2.aarch64",
            "openSUSE Leap 15.4:kernel-default-extra-5.14.21-150400.24.21.2.ppc64le",
            "openSUSE Leap 15.4:kernel-default-extra-5.14.21-150400.24.21.2.s390x",
            "openSUSE Leap 15.4:kernel-default-extra-5.14.21-150400.24.21.2.x86_64",
            "openSUSE Leap 15.4:kernel-default-livepatch-5.14.21-150400.24.21.2.aarch64",
            "openSUSE Leap 15.4:kernel-default-livepatch-5.14.21-150400.24.21.2.ppc64le",
            "openSUSE Leap 15.4:kernel-default-livepatch-5.14.21-150400.24.21.2.s390x",
            "openSUSE Leap 15.4:kernel-default-livepatch-5.14.21-150400.24.21.2.x86_64",
            "openSUSE Leap 15.4:kernel-default-livepatch-devel-5.14.21-150400.24.21.2.aarch64",
            "openSUSE Leap 15.4:kernel-default-livepatch-devel-5.14.21-150400.24.21.2.ppc64le",
            "openSUSE Leap 15.4:kernel-default-livepatch-devel-5.14.21-150400.24.21.2.s390x",
            "openSUSE Leap 15.4:kernel-default-livepatch-devel-5.14.21-150400.24.21.2.x86_64",
            "openSUSE Leap 15.4:kernel-default-optional-5.14.21-150400.24.21.2.aarch64",
            "openSUSE Leap 15.4:kernel-default-optional-5.14.21-150400.24.21.2.ppc64le",
            "openSUSE Leap 15.4:kernel-default-optional-5.14.21-150400.24.21.2.s390x",
            "openSUSE Leap 15.4:kernel-default-optional-5.14.21-150400.24.21.2.x86_64",
            "openSUSE Leap 15.4:kernel-devel-5.14.21-150400.24.21.2.noarch",
            "openSUSE Leap 15.4:kernel-docs-5.14.21-150400.24.21.3.noarch",
            "openSUSE Leap 15.4:kernel-docs-html-5.14.21-150400.24.21.3.noarch",
            "openSUSE Leap 15.4:kernel-kvmsmall-5.14.21-150400.24.21.2.aarch64",
            "openSUSE Leap 15.4:kernel-kvmsmall-5.14.21-150400.24.21.2.ppc64le",
            "openSUSE Leap 15.4:kernel-kvmsmall-5.14.21-150400.24.21.2.x86_64",
            "openSUSE Leap 15.4:kernel-kvmsmall-devel-5.14.21-150400.24.21.2.aarch64",
            "openSUSE Leap 15.4:kernel-kvmsmall-devel-5.14.21-150400.24.21.2.ppc64le",
            "openSUSE Leap 15.4:kernel-kvmsmall-devel-5.14.21-150400.24.21.2.x86_64",
            "openSUSE Leap 15.4:kernel-kvmsmall-livepatch-devel-5.14.21-150400.24.21.2.aarch64",
            "openSUSE Leap 15.4:kernel-kvmsmall-livepatch-devel-5.14.21-150400.24.21.2.ppc64le",
            "openSUSE Leap 15.4:kernel-kvmsmall-livepatch-devel-5.14.21-150400.24.21.2.x86_64",
            "openSUSE Leap 15.4:kernel-macros-5.14.21-150400.24.21.2.noarch",
            "openSUSE Leap 15.4:kernel-obs-build-5.14.21-150400.24.21.2.aarch64",
            "openSUSE Leap 15.4:kernel-obs-build-5.14.21-150400.24.21.2.ppc64le",
            "openSUSE Leap 15.4:kernel-obs-build-5.14.21-150400.24.21.2.s390x",
            "openSUSE Leap 15.4:kernel-obs-build-5.14.21-150400.24.21.2.x86_64",
            "openSUSE Leap 15.4:kernel-obs-qa-5.14.21-150400.24.21.1.aarch64",
            "openSUSE Leap 15.4:kernel-obs-qa-5.14.21-150400.24.21.1.ppc64le",
            "openSUSE Leap 15.4:kernel-obs-qa-5.14.21-150400.24.21.1.s390x",
            "openSUSE Leap 15.4:kernel-obs-qa-5.14.21-150400.24.21.1.x86_64",
            "openSUSE Leap 15.4:kernel-source-5.14.21-150400.24.21.2.noarch",
            "openSUSE Leap 15.4:kernel-source-vanilla-5.14.21-150400.24.21.2.noarch",
            "openSUSE Leap 15.4:kernel-syms-5.14.21-150400.24.21.1.aarch64",
            "openSUSE Leap 15.4:kernel-syms-5.14.21-150400.24.21.1.ppc64le",
            "openSUSE Leap 15.4:kernel-syms-5.14.21-150400.24.21.1.s390x",
            "openSUSE Leap 15.4:kernel-syms-5.14.21-150400.24.21.1.x86_64",
            "openSUSE Leap 15.4:kernel-zfcpdump-5.14.21-150400.24.21.2.s390x",
            "openSUSE Leap 15.4:kselftests-kmp-64kb-5.14.21-150400.24.21.2.aarch64",
            "openSUSE Leap 15.4:kselftests-kmp-default-5.14.21-150400.24.21.2.aarch64",
            "openSUSE Leap 15.4:kselftests-kmp-default-5.14.21-150400.24.21.2.ppc64le",
            "openSUSE Leap 15.4:kselftests-kmp-default-5.14.21-150400.24.21.2.s390x",
            "openSUSE Leap 15.4:kselftests-kmp-default-5.14.21-150400.24.21.2.x86_64",
            "openSUSE Leap 15.4:ocfs2-kmp-64kb-5.14.21-150400.24.21.2.aarch64",
            "openSUSE Leap 15.4:ocfs2-kmp-default-5.14.21-150400.24.21.2.aarch64",
            "openSUSE Leap 15.4:ocfs2-kmp-default-5.14.21-150400.24.21.2.ppc64le",
            "openSUSE Leap 15.4:ocfs2-kmp-default-5.14.21-150400.24.21.2.s390x",
            "openSUSE Leap 15.4:ocfs2-kmp-default-5.14.21-150400.24.21.2.x86_64",
            "openSUSE Leap 15.4:reiserfs-kmp-64kb-5.14.21-150400.24.21.2.aarch64",
            "openSUSE Leap 15.4:reiserfs-kmp-default-5.14.21-150400.24.21.2.aarch64",
            "openSUSE Leap 15.4:reiserfs-kmp-default-5.14.21-150400.24.21.2.ppc64le",
            "openSUSE Leap 15.4:reiserfs-kmp-default-5.14.21-150400.24.21.2.s390x",
            "openSUSE Leap 15.4:reiserfs-kmp-default-5.14.21-150400.24.21.2.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 5.5,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
            "version": "3.1"
          },
          "products": [
            "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.21.2.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.21.2.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.21.2.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.21.2.x86_64",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.21.2.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.21.2.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.21.2.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.21.2.x86_64",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.21.2.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.21.2.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.21.2.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.21.2.x86_64",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.21.2.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.21.2.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.21.2.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.21.2.x86_64",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.21.2.ppc64le",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.21.2.s390x",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.21.2.x86_64",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.21.2.ppc64le",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.21.2.s390x",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.21.2.x86_64",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_21-default-1-150400.9.3.2.ppc64le",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_21-default-1-150400.9.3.2.s390x",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_21-default-1-150400.9.3.2.x86_64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-64kb-5.14.21-150400.24.21.2.aarch64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-64kb-devel-5.14.21-150400.24.21.2.aarch64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-5.14.21-150400.24.21.2.aarch64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-5.14.21-150400.24.21.2.ppc64le",
            "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-5.14.21-150400.24.21.2.s390x",
            "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-5.14.21-150400.24.21.2.x86_64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-base-5.14.21-150400.24.21.2.150400.24.7.2.aarch64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-base-5.14.21-150400.24.21.2.150400.24.7.2.ppc64le",
            "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-base-5.14.21-150400.24.21.2.150400.24.7.2.s390x",
            "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-base-5.14.21-150400.24.21.2.150400.24.7.2.x86_64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-devel-5.14.21-150400.24.21.2.aarch64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-devel-5.14.21-150400.24.21.2.ppc64le",
            "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-devel-5.14.21-150400.24.21.2.s390x",
            "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-devel-5.14.21-150400.24.21.2.x86_64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-devel-5.14.21-150400.24.21.2.noarch",
            "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-macros-5.14.21-150400.24.21.2.noarch",
            "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-zfcpdump-5.14.21-150400.24.21.2.s390x",
            "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-docs-5.14.21-150400.24.21.3.noarch",
            "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-obs-build-5.14.21-150400.24.21.2.aarch64",
            "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-obs-build-5.14.21-150400.24.21.2.ppc64le",
            "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-obs-build-5.14.21-150400.24.21.2.s390x",
            "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-obs-build-5.14.21-150400.24.21.2.x86_64",
            "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-source-5.14.21-150400.24.21.2.noarch",
            "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-syms-5.14.21-150400.24.21.1.aarch64",
            "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-syms-5.14.21-150400.24.21.1.ppc64le",
            "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-syms-5.14.21-150400.24.21.1.s390x",
            "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-syms-5.14.21-150400.24.21.1.x86_64",
            "SUSE Linux Enterprise Module for Legacy 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.21.2.aarch64",
            "SUSE Linux Enterprise Module for Legacy 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.21.2.ppc64le",
            "SUSE Linux Enterprise Module for Legacy 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.21.2.s390x",
            "SUSE Linux Enterprise Module for Legacy 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.21.2.x86_64",
            "SUSE Linux Enterprise Workstation Extension 15 SP4:kernel-default-extra-5.14.21-150400.24.21.2.x86_64",
            "openSUSE Leap 15.4:cluster-md-kmp-64kb-5.14.21-150400.24.21.2.aarch64",
            "openSUSE Leap 15.4:cluster-md-kmp-default-5.14.21-150400.24.21.2.aarch64",
            "openSUSE Leap 15.4:cluster-md-kmp-default-5.14.21-150400.24.21.2.ppc64le",
            "openSUSE Leap 15.4:cluster-md-kmp-default-5.14.21-150400.24.21.2.s390x",
            "openSUSE Leap 15.4:cluster-md-kmp-default-5.14.21-150400.24.21.2.x86_64",
            "openSUSE Leap 15.4:dlm-kmp-64kb-5.14.21-150400.24.21.2.aarch64",
            "openSUSE Leap 15.4:dlm-kmp-default-5.14.21-150400.24.21.2.aarch64",
            "openSUSE Leap 15.4:dlm-kmp-default-5.14.21-150400.24.21.2.ppc64le",
            "openSUSE Leap 15.4:dlm-kmp-default-5.14.21-150400.24.21.2.s390x",
            "openSUSE Leap 15.4:dlm-kmp-default-5.14.21-150400.24.21.2.x86_64",
            "openSUSE Leap 15.4:dtb-allwinner-5.14.21-150400.24.21.1.aarch64",
            "openSUSE Leap 15.4:dtb-altera-5.14.21-150400.24.21.1.aarch64",
            "openSUSE Leap 15.4:dtb-amazon-5.14.21-150400.24.21.1.aarch64",
            "openSUSE Leap 15.4:dtb-amd-5.14.21-150400.24.21.1.aarch64",
            "openSUSE Leap 15.4:dtb-amlogic-5.14.21-150400.24.21.1.aarch64",
            "openSUSE Leap 15.4:dtb-apm-5.14.21-150400.24.21.1.aarch64",
            "openSUSE Leap 15.4:dtb-apple-5.14.21-150400.24.21.1.aarch64",
            "openSUSE Leap 15.4:dtb-arm-5.14.21-150400.24.21.1.aarch64",
            "openSUSE Leap 15.4:dtb-broadcom-5.14.21-150400.24.21.1.aarch64",
            "openSUSE Leap 15.4:dtb-cavium-5.14.21-150400.24.21.1.aarch64",
            "openSUSE Leap 15.4:dtb-exynos-5.14.21-150400.24.21.1.aarch64",
            "openSUSE Leap 15.4:dtb-freescale-5.14.21-150400.24.21.1.aarch64",
            "openSUSE Leap 15.4:dtb-hisilicon-5.14.21-150400.24.21.1.aarch64",
            "openSUSE Leap 15.4:dtb-lg-5.14.21-150400.24.21.1.aarch64",
            "openSUSE Leap 15.4:dtb-marvell-5.14.21-150400.24.21.1.aarch64",
            "openSUSE Leap 15.4:dtb-mediatek-5.14.21-150400.24.21.1.aarch64",
            "openSUSE Leap 15.4:dtb-nvidia-5.14.21-150400.24.21.1.aarch64",
            "openSUSE Leap 15.4:dtb-qcom-5.14.21-150400.24.21.1.aarch64",
            "openSUSE Leap 15.4:dtb-renesas-5.14.21-150400.24.21.1.aarch64",
            "openSUSE Leap 15.4:dtb-rockchip-5.14.21-150400.24.21.1.aarch64",
            "openSUSE Leap 15.4:dtb-socionext-5.14.21-150400.24.21.1.aarch64",
            "openSUSE Leap 15.4:dtb-sprd-5.14.21-150400.24.21.1.aarch64",
            "openSUSE Leap 15.4:dtb-xilinx-5.14.21-150400.24.21.1.aarch64",
            "openSUSE Leap 15.4:gfs2-kmp-64kb-5.14.21-150400.24.21.2.aarch64",
            "openSUSE Leap 15.4:gfs2-kmp-default-5.14.21-150400.24.21.2.aarch64",
            "openSUSE Leap 15.4:gfs2-kmp-default-5.14.21-150400.24.21.2.ppc64le",
            "openSUSE Leap 15.4:gfs2-kmp-default-5.14.21-150400.24.21.2.s390x",
            "openSUSE Leap 15.4:gfs2-kmp-default-5.14.21-150400.24.21.2.x86_64",
            "openSUSE Leap 15.4:kernel-64kb-5.14.21-150400.24.21.2.aarch64",
            "openSUSE Leap 15.4:kernel-64kb-devel-5.14.21-150400.24.21.2.aarch64",
            "openSUSE Leap 15.4:kernel-64kb-extra-5.14.21-150400.24.21.2.aarch64",
            "openSUSE Leap 15.4:kernel-64kb-livepatch-devel-5.14.21-150400.24.21.2.aarch64",
            "openSUSE Leap 15.4:kernel-64kb-optional-5.14.21-150400.24.21.2.aarch64",
            "openSUSE Leap 15.4:kernel-debug-5.14.21-150400.24.21.2.ppc64le",
            "openSUSE Leap 15.4:kernel-debug-5.14.21-150400.24.21.2.x86_64",
            "openSUSE Leap 15.4:kernel-debug-devel-5.14.21-150400.24.21.2.ppc64le",
            "openSUSE Leap 15.4:kernel-debug-devel-5.14.21-150400.24.21.2.x86_64",
            "openSUSE Leap 15.4:kernel-debug-livepatch-devel-5.14.21-150400.24.21.2.ppc64le",
            "openSUSE Leap 15.4:kernel-debug-livepatch-devel-5.14.21-150400.24.21.2.x86_64",
            "openSUSE Leap 15.4:kernel-default-5.14.21-150400.24.21.2.aarch64",
            "openSUSE Leap 15.4:kernel-default-5.14.21-150400.24.21.2.ppc64le",
            "openSUSE Leap 15.4:kernel-default-5.14.21-150400.24.21.2.s390x",
            "openSUSE Leap 15.4:kernel-default-5.14.21-150400.24.21.2.x86_64",
            "openSUSE Leap 15.4:kernel-default-base-5.14.21-150400.24.21.2.150400.24.7.2.aarch64",
            "openSUSE Leap 15.4:kernel-default-base-5.14.21-150400.24.21.2.150400.24.7.2.ppc64le",
            "openSUSE Leap 15.4:kernel-default-base-5.14.21-150400.24.21.2.150400.24.7.2.s390x",
            "openSUSE Leap 15.4:kernel-default-base-5.14.21-150400.24.21.2.150400.24.7.2.x86_64",
            "openSUSE Leap 15.4:kernel-default-base-rebuild-5.14.21-150400.24.21.2.150400.24.7.2.aarch64",
            "openSUSE Leap 15.4:kernel-default-base-rebuild-5.14.21-150400.24.21.2.150400.24.7.2.ppc64le",
            "openSUSE Leap 15.4:kernel-default-base-rebuild-5.14.21-150400.24.21.2.150400.24.7.2.s390x",
            "openSUSE Leap 15.4:kernel-default-base-rebuild-5.14.21-150400.24.21.2.150400.24.7.2.x86_64",
            "openSUSE Leap 15.4:kernel-default-devel-5.14.21-150400.24.21.2.aarch64",
            "openSUSE Leap 15.4:kernel-default-devel-5.14.21-150400.24.21.2.ppc64le",
            "openSUSE Leap 15.4:kernel-default-devel-5.14.21-150400.24.21.2.s390x",
            "openSUSE Leap 15.4:kernel-default-devel-5.14.21-150400.24.21.2.x86_64",
            "openSUSE Leap 15.4:kernel-default-extra-5.14.21-150400.24.21.2.aarch64",
            "openSUSE Leap 15.4:kernel-default-extra-5.14.21-150400.24.21.2.ppc64le",
            "openSUSE Leap 15.4:kernel-default-extra-5.14.21-150400.24.21.2.s390x",
            "openSUSE Leap 15.4:kernel-default-extra-5.14.21-150400.24.21.2.x86_64",
            "openSUSE Leap 15.4:kernel-default-livepatch-5.14.21-150400.24.21.2.aarch64",
            "openSUSE Leap 15.4:kernel-default-livepatch-5.14.21-150400.24.21.2.ppc64le",
            "openSUSE Leap 15.4:kernel-default-livepatch-5.14.21-150400.24.21.2.s390x",
            "openSUSE Leap 15.4:kernel-default-livepatch-5.14.21-150400.24.21.2.x86_64",
            "openSUSE Leap 15.4:kernel-default-livepatch-devel-5.14.21-150400.24.21.2.aarch64",
            "openSUSE Leap 15.4:kernel-default-livepatch-devel-5.14.21-150400.24.21.2.ppc64le",
            "openSUSE Leap 15.4:kernel-default-livepatch-devel-5.14.21-150400.24.21.2.s390x",
            "openSUSE Leap 15.4:kernel-default-livepatch-devel-5.14.21-150400.24.21.2.x86_64",
            "openSUSE Leap 15.4:kernel-default-optional-5.14.21-150400.24.21.2.aarch64",
            "openSUSE Leap 15.4:kernel-default-optional-5.14.21-150400.24.21.2.ppc64le",
            "openSUSE Leap 15.4:kernel-default-optional-5.14.21-150400.24.21.2.s390x",
            "openSUSE Leap 15.4:kernel-default-optional-5.14.21-150400.24.21.2.x86_64",
            "openSUSE Leap 15.4:kernel-devel-5.14.21-150400.24.21.2.noarch",
            "openSUSE Leap 15.4:kernel-docs-5.14.21-150400.24.21.3.noarch",
            "openSUSE Leap 15.4:kernel-docs-html-5.14.21-150400.24.21.3.noarch",
            "openSUSE Leap 15.4:kernel-kvmsmall-5.14.21-150400.24.21.2.aarch64",
            "openSUSE Leap 15.4:kernel-kvmsmall-5.14.21-150400.24.21.2.ppc64le",
            "openSUSE Leap 15.4:kernel-kvmsmall-5.14.21-150400.24.21.2.x86_64",
            "openSUSE Leap 15.4:kernel-kvmsmall-devel-5.14.21-150400.24.21.2.aarch64",
            "openSUSE Leap 15.4:kernel-kvmsmall-devel-5.14.21-150400.24.21.2.ppc64le",
            "openSUSE Leap 15.4:kernel-kvmsmall-devel-5.14.21-150400.24.21.2.x86_64",
            "openSUSE Leap 15.4:kernel-kvmsmall-livepatch-devel-5.14.21-150400.24.21.2.aarch64",
            "openSUSE Leap 15.4:kernel-kvmsmall-livepatch-devel-5.14.21-150400.24.21.2.ppc64le",
            "openSUSE Leap 15.4:kernel-kvmsmall-livepatch-devel-5.14.21-150400.24.21.2.x86_64",
            "openSUSE Leap 15.4:kernel-macros-5.14.21-150400.24.21.2.noarch",
            "openSUSE Leap 15.4:kernel-obs-build-5.14.21-150400.24.21.2.aarch64",
            "openSUSE Leap 15.4:kernel-obs-build-5.14.21-150400.24.21.2.ppc64le",
            "openSUSE Leap 15.4:kernel-obs-build-5.14.21-150400.24.21.2.s390x",
            "openSUSE Leap 15.4:kernel-obs-build-5.14.21-150400.24.21.2.x86_64",
            "openSUSE Leap 15.4:kernel-obs-qa-5.14.21-150400.24.21.1.aarch64",
            "openSUSE Leap 15.4:kernel-obs-qa-5.14.21-150400.24.21.1.ppc64le",
            "openSUSE Leap 15.4:kernel-obs-qa-5.14.21-150400.24.21.1.s390x",
            "openSUSE Leap 15.4:kernel-obs-qa-5.14.21-150400.24.21.1.x86_64",
            "openSUSE Leap 15.4:kernel-source-5.14.21-150400.24.21.2.noarch",
            "openSUSE Leap 15.4:kernel-source-vanilla-5.14.21-150400.24.21.2.noarch",
            "openSUSE Leap 15.4:kernel-syms-5.14.21-150400.24.21.1.aarch64",
            "openSUSE Leap 15.4:kernel-syms-5.14.21-150400.24.21.1.ppc64le",
            "openSUSE Leap 15.4:kernel-syms-5.14.21-150400.24.21.1.s390x",
            "openSUSE Leap 15.4:kernel-syms-5.14.21-150400.24.21.1.x86_64",
            "openSUSE Leap 15.4:kernel-zfcpdump-5.14.21-150400.24.21.2.s390x",
            "openSUSE Leap 15.4:kselftests-kmp-64kb-5.14.21-150400.24.21.2.aarch64",
            "openSUSE Leap 15.4:kselftests-kmp-default-5.14.21-150400.24.21.2.aarch64",
            "openSUSE Leap 15.4:kselftests-kmp-default-5.14.21-150400.24.21.2.ppc64le",
            "openSUSE Leap 15.4:kselftests-kmp-default-5.14.21-150400.24.21.2.s390x",
            "openSUSE Leap 15.4:kselftests-kmp-default-5.14.21-150400.24.21.2.x86_64",
            "openSUSE Leap 15.4:ocfs2-kmp-64kb-5.14.21-150400.24.21.2.aarch64",
            "openSUSE Leap 15.4:ocfs2-kmp-default-5.14.21-150400.24.21.2.aarch64",
            "openSUSE Leap 15.4:ocfs2-kmp-default-5.14.21-150400.24.21.2.ppc64le",
            "openSUSE Leap 15.4:ocfs2-kmp-default-5.14.21-150400.24.21.2.s390x",
            "openSUSE Leap 15.4:ocfs2-kmp-default-5.14.21-150400.24.21.2.x86_64",
            "openSUSE Leap 15.4:reiserfs-kmp-64kb-5.14.21-150400.24.21.2.aarch64",
            "openSUSE Leap 15.4:reiserfs-kmp-default-5.14.21-150400.24.21.2.aarch64",
            "openSUSE Leap 15.4:reiserfs-kmp-default-5.14.21-150400.24.21.2.ppc64le",
            "openSUSE Leap 15.4:reiserfs-kmp-default-5.14.21-150400.24.21.2.s390x",
            "openSUSE Leap 15.4:reiserfs-kmp-default-5.14.21-150400.24.21.2.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2022-09-16T15:30:19Z",
          "details": "moderate"
        }
      ],
      "title": "CVE-2022-39190"
    }
  ]
}
  suse-su-2022:3450-1
Vulnerability from csaf_suse
Published
2022-09-28 06:48
    Modified
2022-09-28 06:48
    Summary
Security update for the Linux Kernel
    Notes
Title of the patch
Security update for the Linux Kernel
    Description of the patch
The SUSE Linux Enterprise 15 SP2 LTSS kernel was updated to receive various security and bugfixes.
The following security bugs were fixed:
- CVE-2022-39188: Fixed race condition in include/asm-generic/tlb.h where a device driver can free a page while it still has stale TLB entries (bnc#1203107).
- CVE-2022-2663: Fixed an issue that was found in nf_conntrack_irc where the message handling could be confused and incorrectly matches the message (bnc#1202097).
- CVE-2022-3028: Fixed race condition that was found in the IP framework for transforming packets (XFRM subsystem) (bnc#1202898).
- CVE-2020-27784: Fixed a vulnerability that was found in printer_ioctl() printer_ioctl() when accessing a deallocated instance (bnc#1202895).
- CVE-2021-4155: Fixed a data leak flaw that was found in the way XFS_IOC_ALLOCSP IOCTL in the XFS filesystem (bnc#1194272).
- CVE-2022-2905: Fixed tnum_range usage on array range checking for poke descriptors (bsc#1202564, bsc#1202860).
- CVE-2022-2977: Fixed reference counting for struct tpm_chip (bsc#1202672).
- CVE-2021-4203: Fixed use-after-free read flaw that was found in sock_getsockopt() in net/core/sock.c due to SO_PEERCRED and SO_PEERGROUPS race with listen() (bnc#1194535).
- CVE-2022-2588: Fixed use-after-free in cls_route (bsc#1202096).
- CVE-2022-1012: Fixed a memory leak problem that was found in the TCP source port generation algorithm in net/ipv4/tcp.c (bnc#1199482).
- CVE-2022-36879: Fixed an issue in xfrm_expand_policies in net/xfrm/xfrm_policy.c where a refcount could be dropped twice (bnc#1201948).
- CVE-2022-20368: Fixed slab-out-of-bounds access in packet_recvmsg() (bsc#1202346).
- CVE-2022-20369: Fixed out of bounds write in v4l2_m2m_querybuf of v4l2-mem2mem.c (bnc#1202347).
- CVE-2022-26373: Fixed non-transparent sharing of return predictor targets between contexts in some Intel Processors (bnc#1201726).
- CVE-2016-3695: Fixed an issue inside the einj_error_inject function in drivers/acpi/apei/einj.c that allowed users to simulate hardware errors and consequently cause a denial of service (bnc#1023051).
- CVE-2022-2639: Fixed an integer coercion error that was found in the openvswitch kernel module (bnc#1202154).
- CVE-2020-36516: Fixed an issue in the mixed IPID assignment method where an attacker was able to inject data into or terminate a victim's TCP session (bnc#1196616).
- CVE-2022-32250: Fixed a privilege escalation issue in net/netfilter/nf_tables_api.c that allowed a local user to became root (bnc#1200015)
- CVE-2022-29581: Fixed improper update of reference count vulnerability in net/sched that allowed a local attacker to cause privilege escalation to root (bnc#1199665).
- CVE-2022-20166: Fixed possible out of bounds write due to a heap buffer overflow in various methods of kernel base drivers (bnc#1200598).
The following non-security bugs were fixed:
- cifs: fix uninitialized pointer in error case in dfs_cache_get_tgt_share (bsc#1188944).
- cifs: skip trailing separators of prefix paths (bsc#1188944).
- config: Update files NVRAM=y (bsc#1201361 bsc#1192968).
- kernel-obs-build: include qemu_fw_cfg (boo#1201705)
- lightnvm: Remove lightnvm implemenation (bsc#1191881 bsc#1201420 ZDI-CAN-17325).
- md/bitmap: do not set sb values if can't pass sanity check (bsc#1197158).
- mm/rmap: Fix anon_vma->degree ambiguity leading to double-reuse (git-fixes, bsc#1203098).
- mm: pagewalk: Fix race between unmap and page walker (git-fixes, bsc#1203159).
- net_sched: cls_route: disallow handle of 0 (bsc#1202393).
- objtool: Add support for intra-function calls (bsc#1202396).
- objtool: Make handle_insn_ops() unconditional (bsc#1202396).
- objtool: Remove INSN_STACK (bsc#1202396).
- objtool: Rework allocating stack_ops on decode (bsc#1202396).
- objtool: Support multiple stack_op per instruction (bsc#1202396).
- rpm: Fix parsing of rpm/macros.kernel-source on SLE12 (bsc#1201019).
- tcp: add some entropy in __inet_hash_connect() (bsc#1180153).
- tcp: change source port randomizarion at connect() time (bsc#1180153).
    Patchnames
SUSE-2022-3450,SUSE-SLE-Module-Live-Patching-15-SP2-2022-3450,SUSE-SLE-Product-HA-15-SP2-2022-3450,SUSE-SLE-Product-HPC-15-SP2-ESPOS-2022-3450,SUSE-SLE-Product-HPC-15-SP2-LTSS-2022-3450,SUSE-SLE-Product-SLES-15-SP2-BCL-2022-3450,SUSE-SLE-Product-SLES-15-SP2-LTSS-2022-3450,SUSE-SLE-Product-SLES_SAP-15-SP2-2022-3450,SUSE-SLE-Product-SUSE-Manager-Proxy-4.1-2022-3450,SUSE-SLE-Product-SUSE-Manager-Retail-Branch-Server-4.1-2022-3450,SUSE-SLE-Product-SUSE-Manager-Server-4.1-2022-3450,SUSE-Storage-7-2022-3450
    Terms of use
CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).
    {
  "document": {
    "aggregate_severity": {
      "namespace": "https://www.suse.com/support/security/rating/",
      "text": "important"
    },
    "category": "csaf_security_advisory",
    "csaf_version": "2.0",
    "distribution": {
      "text": "Copyright 2024 SUSE LLC. All rights reserved.",
      "tlp": {
        "label": "WHITE",
        "url": "https://www.first.org/tlp/"
      }
    },
    "lang": "en",
    "notes": [
      {
        "category": "summary",
        "text": "Security update for the Linux Kernel",
        "title": "Title of the patch"
      },
      {
        "category": "description",
        "text": "\nThe SUSE Linux Enterprise 15 SP2 LTSS kernel was updated to receive various security and bugfixes.\n\n\nThe following security bugs were fixed:\n\n- CVE-2022-39188: Fixed race condition in include/asm-generic/tlb.h where a device driver can free a page while it still has stale TLB entries (bnc#1203107).\n- CVE-2022-2663: Fixed an issue that was found in nf_conntrack_irc where the message handling could be confused and incorrectly matches the message (bnc#1202097).\n- CVE-2022-3028: Fixed race condition that was found in the IP framework for transforming packets (XFRM subsystem) (bnc#1202898).\n- CVE-2020-27784: Fixed a vulnerability that was found in printer_ioctl() printer_ioctl() when accessing a deallocated instance (bnc#1202895).\n- CVE-2021-4155: Fixed a data leak flaw that was found in the way XFS_IOC_ALLOCSP IOCTL in the XFS filesystem (bnc#1194272).\n- CVE-2022-2905: Fixed tnum_range usage on array range checking for poke descriptors (bsc#1202564, bsc#1202860).\n- CVE-2022-2977: Fixed reference counting for struct tpm_chip (bsc#1202672).\n- CVE-2021-4203: Fixed use-after-free read flaw that was found in sock_getsockopt() in net/core/sock.c due to SO_PEERCRED and SO_PEERGROUPS race with listen() (bnc#1194535).\n- CVE-2022-2588: Fixed use-after-free in cls_route (bsc#1202096).\n- CVE-2022-1012: Fixed a memory leak problem that was found in the TCP source port generation algorithm in net/ipv4/tcp.c (bnc#1199482).\n- CVE-2022-36879: Fixed an issue in xfrm_expand_policies in net/xfrm/xfrm_policy.c where a refcount could be dropped twice (bnc#1201948).\n- CVE-2022-20368: Fixed slab-out-of-bounds access in packet_recvmsg() (bsc#1202346).\n- CVE-2022-20369: Fixed out of bounds write in v4l2_m2m_querybuf of v4l2-mem2mem.c (bnc#1202347).\n- CVE-2022-26373: Fixed non-transparent sharing of return predictor targets between contexts in some Intel Processors (bnc#1201726).\n- CVE-2016-3695: Fixed an issue inside the einj_error_inject function in drivers/acpi/apei/einj.c that allowed users to simulate hardware errors and consequently cause a denial of service (bnc#1023051).\n- CVE-2022-2639: Fixed an integer coercion error that was found in the openvswitch kernel module (bnc#1202154).\n- CVE-2020-36516: Fixed an issue in the mixed IPID assignment method where an attacker was able to inject data into or terminate a victim\u0027s TCP session (bnc#1196616).\n- CVE-2022-32250: Fixed a privilege escalation issue in net/netfilter/nf_tables_api.c that allowed a local user to became root (bnc#1200015)\n- CVE-2022-29581: Fixed improper update of reference count vulnerability in net/sched that allowed a local attacker to cause privilege escalation to root (bnc#1199665).\n- CVE-2022-20166: Fixed possible out of bounds write due to a heap buffer overflow in various methods of kernel base drivers (bnc#1200598).\n\nThe following non-security bugs were fixed:\n\n- cifs: fix uninitialized pointer in error case in dfs_cache_get_tgt_share (bsc#1188944).\n- cifs: skip trailing separators of prefix paths (bsc#1188944).\n- config: Update files NVRAM=y (bsc#1201361 bsc#1192968).\n- kernel-obs-build: include qemu_fw_cfg (boo#1201705)\n- lightnvm: Remove lightnvm implemenation (bsc#1191881 bsc#1201420 ZDI-CAN-17325).\n- md/bitmap: do not set sb values if can\u0027t pass sanity check (bsc#1197158).\n- mm/rmap: Fix anon_vma-\u003edegree ambiguity leading to double-reuse (git-fixes, bsc#1203098).\n- mm: pagewalk: Fix race between unmap and page walker (git-fixes, bsc#1203159).\n- net_sched: cls_route: disallow handle of 0 (bsc#1202393).\n- objtool: Add support for intra-function calls (bsc#1202396).\n- objtool: Make handle_insn_ops() unconditional (bsc#1202396).\n- objtool: Remove INSN_STACK (bsc#1202396).\n- objtool: Rework allocating stack_ops on decode (bsc#1202396).\n- objtool: Support multiple stack_op per instruction (bsc#1202396).\n- rpm: Fix parsing of rpm/macros.kernel-source on SLE12 (bsc#1201019).\n- tcp: add some entropy in __inet_hash_connect() (bsc#1180153).\n- tcp: change source port randomizarion at connect() time (bsc#1180153).\n",
        "title": "Description of the patch"
      },
      {
        "category": "details",
        "text": "SUSE-2022-3450,SUSE-SLE-Module-Live-Patching-15-SP2-2022-3450,SUSE-SLE-Product-HA-15-SP2-2022-3450,SUSE-SLE-Product-HPC-15-SP2-ESPOS-2022-3450,SUSE-SLE-Product-HPC-15-SP2-LTSS-2022-3450,SUSE-SLE-Product-SLES-15-SP2-BCL-2022-3450,SUSE-SLE-Product-SLES-15-SP2-LTSS-2022-3450,SUSE-SLE-Product-SLES_SAP-15-SP2-2022-3450,SUSE-SLE-Product-SUSE-Manager-Proxy-4.1-2022-3450,SUSE-SLE-Product-SUSE-Manager-Retail-Branch-Server-4.1-2022-3450,SUSE-SLE-Product-SUSE-Manager-Server-4.1-2022-3450,SUSE-Storage-7-2022-3450",
        "title": "Patchnames"
      },
      {
        "category": "legal_disclaimer",
        "text": "CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).",
        "title": "Terms of use"
      }
    ],
    "publisher": {
      "category": "vendor",
      "contact_details": "https://www.suse.com/support/security/contact/",
      "name": "SUSE Product Security Team",
      "namespace": "https://www.suse.com/"
    },
    "references": [
      {
        "category": "external",
        "summary": "SUSE ratings",
        "url": "https://www.suse.com/support/security/rating/"
      },
      {
        "category": "self",
        "summary": "URL of this CSAF notice",
        "url": "https://ftp.suse.com/pub/projects/security/csaf/suse-su-2022_3450-1.json"
      },
      {
        "category": "self",
        "summary": "URL for SUSE-SU-2022:3450-1",
        "url": "https://www.suse.com/support/update/announcement/2022/suse-su-20223450-1/"
      },
      {
        "category": "self",
        "summary": "E-Mail link for SUSE-SU-2022:3450-1",
        "url": "https://lists.suse.com/pipermail/sle-security-updates/2022-September/012439.html"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1023051",
        "url": "https://bugzilla.suse.com/1023051"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1180153",
        "url": "https://bugzilla.suse.com/1180153"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1188944",
        "url": "https://bugzilla.suse.com/1188944"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1191881",
        "url": "https://bugzilla.suse.com/1191881"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1192968",
        "url": "https://bugzilla.suse.com/1192968"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1194272",
        "url": "https://bugzilla.suse.com/1194272"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1194535",
        "url": "https://bugzilla.suse.com/1194535"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1196616",
        "url": "https://bugzilla.suse.com/1196616"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1197158",
        "url": "https://bugzilla.suse.com/1197158"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1199482",
        "url": "https://bugzilla.suse.com/1199482"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1199665",
        "url": "https://bugzilla.suse.com/1199665"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1201726",
        "url": "https://bugzilla.suse.com/1201726"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1201948",
        "url": "https://bugzilla.suse.com/1201948"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1202096",
        "url": "https://bugzilla.suse.com/1202096"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1202097",
        "url": "https://bugzilla.suse.com/1202097"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1202154",
        "url": "https://bugzilla.suse.com/1202154"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1202346",
        "url": "https://bugzilla.suse.com/1202346"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1202347",
        "url": "https://bugzilla.suse.com/1202347"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1202393",
        "url": "https://bugzilla.suse.com/1202393"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1202396",
        "url": "https://bugzilla.suse.com/1202396"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1202564",
        "url": "https://bugzilla.suse.com/1202564"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1202672",
        "url": "https://bugzilla.suse.com/1202672"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1202860",
        "url": "https://bugzilla.suse.com/1202860"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1202895",
        "url": "https://bugzilla.suse.com/1202895"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1202898",
        "url": "https://bugzilla.suse.com/1202898"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1203098",
        "url": "https://bugzilla.suse.com/1203098"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1203107",
        "url": "https://bugzilla.suse.com/1203107"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1203159",
        "url": "https://bugzilla.suse.com/1203159"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2016-3695 page",
        "url": "https://www.suse.com/security/cve/CVE-2016-3695/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2020-27784 page",
        "url": "https://www.suse.com/security/cve/CVE-2020-27784/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2020-36516 page",
        "url": "https://www.suse.com/security/cve/CVE-2020-36516/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2021-4155 page",
        "url": "https://www.suse.com/security/cve/CVE-2021-4155/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2021-4203 page",
        "url": "https://www.suse.com/security/cve/CVE-2021-4203/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2022-1012 page",
        "url": "https://www.suse.com/security/cve/CVE-2022-1012/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2022-20166 page",
        "url": "https://www.suse.com/security/cve/CVE-2022-20166/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2022-20368 page",
        "url": "https://www.suse.com/security/cve/CVE-2022-20368/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2022-20369 page",
        "url": "https://www.suse.com/security/cve/CVE-2022-20369/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2022-2588 page",
        "url": "https://www.suse.com/security/cve/CVE-2022-2588/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2022-26373 page",
        "url": "https://www.suse.com/security/cve/CVE-2022-26373/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2022-2639 page",
        "url": "https://www.suse.com/security/cve/CVE-2022-2639/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2022-2663 page",
        "url": "https://www.suse.com/security/cve/CVE-2022-2663/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2022-2905 page",
        "url": "https://www.suse.com/security/cve/CVE-2022-2905/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2022-29581 page",
        "url": "https://www.suse.com/security/cve/CVE-2022-29581/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2022-2977 page",
        "url": "https://www.suse.com/security/cve/CVE-2022-2977/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2022-3028 page",
        "url": "https://www.suse.com/security/cve/CVE-2022-3028/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2022-32250 page",
        "url": "https://www.suse.com/security/cve/CVE-2022-32250/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2022-36879 page",
        "url": "https://www.suse.com/security/cve/CVE-2022-36879/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2022-39188 page",
        "url": "https://www.suse.com/security/cve/CVE-2022-39188/"
      }
    ],
    "title": "Security update for the Linux Kernel",
    "tracking": {
      "current_release_date": "2022-09-28T06:48:59Z",
      "generator": {
        "date": "2022-09-28T06:48:59Z",
        "engine": {
          "name": "cve-database.git:bin/generate-csaf.pl",
          "version": "1"
        }
      },
      "id": "SUSE-SU-2022:3450-1",
      "initial_release_date": "2022-09-28T06:48:59Z",
      "revision_history": [
        {
          "date": "2022-09-28T06:48:59Z",
          "number": "1",
          "summary": "Current version"
        }
      ],
      "status": "final",
      "version": "1"
    }
  },
  "product_tree": {
    "branches": [
      {
        "branches": [
          {
            "branches": [
              {
                "category": "product_version",
                "name": "cluster-md-kmp-default-5.3.18-150200.24.129.1.aarch64",
                "product": {
                  "name": "cluster-md-kmp-default-5.3.18-150200.24.129.1.aarch64",
                  "product_id": "cluster-md-kmp-default-5.3.18-150200.24.129.1.aarch64"
                }
              },
              {
                "category": "product_version",
                "name": "cluster-md-kmp-preempt-5.3.18-150200.24.129.1.aarch64",
                "product": {
                  "name": "cluster-md-kmp-preempt-5.3.18-150200.24.129.1.aarch64",
                  "product_id": "cluster-md-kmp-preempt-5.3.18-150200.24.129.1.aarch64"
                }
              },
              {
                "category": "product_version",
                "name": "dlm-kmp-default-5.3.18-150200.24.129.1.aarch64",
                "product": {
                  "name": "dlm-kmp-default-5.3.18-150200.24.129.1.aarch64",
                  "product_id": "dlm-kmp-default-5.3.18-150200.24.129.1.aarch64"
                }
              },
              {
                "category": "product_version",
                "name": "dlm-kmp-preempt-5.3.18-150200.24.129.1.aarch64",
                "product": {
                  "name": "dlm-kmp-preempt-5.3.18-150200.24.129.1.aarch64",
                  "product_id": "dlm-kmp-preempt-5.3.18-150200.24.129.1.aarch64"
                }
              },
              {
                "category": "product_version",
                "name": "gfs2-kmp-default-5.3.18-150200.24.129.1.aarch64",
                "product": {
                  "name": "gfs2-kmp-default-5.3.18-150200.24.129.1.aarch64",
                  "product_id": "gfs2-kmp-default-5.3.18-150200.24.129.1.aarch64"
                }
              },
              {
                "category": "product_version",
                "name": "gfs2-kmp-preempt-5.3.18-150200.24.129.1.aarch64",
                "product": {
                  "name": "gfs2-kmp-preempt-5.3.18-150200.24.129.1.aarch64",
                  "product_id": "gfs2-kmp-preempt-5.3.18-150200.24.129.1.aarch64"
                }
              },
              {
                "category": "product_version",
                "name": "kernel-default-5.3.18-150200.24.129.1.aarch64",
                "product": {
                  "name": "kernel-default-5.3.18-150200.24.129.1.aarch64",
                  "product_id": "kernel-default-5.3.18-150200.24.129.1.aarch64"
                }
              },
              {
                "category": "product_version",
                "name": "kernel-default-base-5.3.18-150200.24.129.1.150200.9.61.1.aarch64",
                "product": {
                  "name": "kernel-default-base-5.3.18-150200.24.129.1.150200.9.61.1.aarch64",
                  "product_id": "kernel-default-base-5.3.18-150200.24.129.1.150200.9.61.1.aarch64"
                }
              },
              {
                "category": "product_version",
                "name": "kernel-default-base-rebuild-5.3.18-150200.24.129.1.150200.9.61.1.aarch64",
                "product": {
                  "name": "kernel-default-base-rebuild-5.3.18-150200.24.129.1.150200.9.61.1.aarch64",
                  "product_id": "kernel-default-base-rebuild-5.3.18-150200.24.129.1.150200.9.61.1.aarch64"
                }
              },
              {
                "category": "product_version",
                "name": "kernel-default-devel-5.3.18-150200.24.129.1.aarch64",
                "product": {
                  "name": "kernel-default-devel-5.3.18-150200.24.129.1.aarch64",
                  "product_id": "kernel-default-devel-5.3.18-150200.24.129.1.aarch64"
                }
              },
              {
                "category": "product_version",
                "name": "kernel-default-extra-5.3.18-150200.24.129.1.aarch64",
                "product": {
                  "name": "kernel-default-extra-5.3.18-150200.24.129.1.aarch64",
                  "product_id": "kernel-default-extra-5.3.18-150200.24.129.1.aarch64"
                }
              },
              {
                "category": "product_version",
                "name": "kernel-default-livepatch-5.3.18-150200.24.129.1.aarch64",
                "product": {
                  "name": "kernel-default-livepatch-5.3.18-150200.24.129.1.aarch64",
                  "product_id": "kernel-default-livepatch-5.3.18-150200.24.129.1.aarch64"
                }
              },
              {
                "category": "product_version",
                "name": "kernel-default-livepatch-devel-5.3.18-150200.24.129.1.aarch64",
                "product": {
                  "name": "kernel-default-livepatch-devel-5.3.18-150200.24.129.1.aarch64",
                  "product_id": "kernel-default-livepatch-devel-5.3.18-150200.24.129.1.aarch64"
                }
              },
              {
                "category": "product_version",
                "name": "kernel-obs-build-5.3.18-150200.24.129.1.aarch64",
                "product": {
                  "name": "kernel-obs-build-5.3.18-150200.24.129.1.aarch64",
                  "product_id": "kernel-obs-build-5.3.18-150200.24.129.1.aarch64"
                }
              },
              {
                "category": "product_version",
                "name": "kernel-obs-qa-5.3.18-150200.24.129.1.aarch64",
                "product": {
                  "name": "kernel-obs-qa-5.3.18-150200.24.129.1.aarch64",
                  "product_id": "kernel-obs-qa-5.3.18-150200.24.129.1.aarch64"
                }
              },
              {
                "category": "product_version",
                "name": "kernel-preempt-5.3.18-150200.24.129.1.aarch64",
                "product": {
                  "name": "kernel-preempt-5.3.18-150200.24.129.1.aarch64",
                  "product_id": "kernel-preempt-5.3.18-150200.24.129.1.aarch64"
                }
              },
              {
                "category": "product_version",
                "name": "kernel-preempt-devel-5.3.18-150200.24.129.1.aarch64",
                "product": {
                  "name": "kernel-preempt-devel-5.3.18-150200.24.129.1.aarch64",
                  "product_id": "kernel-preempt-devel-5.3.18-150200.24.129.1.aarch64"
                }
              },
              {
                "category": "product_version",
                "name": "kernel-preempt-extra-5.3.18-150200.24.129.1.aarch64",
                "product": {
                  "name": "kernel-preempt-extra-5.3.18-150200.24.129.1.aarch64",
                  "product_id": "kernel-preempt-extra-5.3.18-150200.24.129.1.aarch64"
                }
              },
              {
                "category": "product_version",
                "name": "kernel-preempt-livepatch-devel-5.3.18-150200.24.129.1.aarch64",
                "product": {
                  "name": "kernel-preempt-livepatch-devel-5.3.18-150200.24.129.1.aarch64",
                  "product_id": "kernel-preempt-livepatch-devel-5.3.18-150200.24.129.1.aarch64"
                }
              },
              {
                "category": "product_version",
                "name": "kernel-syms-5.3.18-150200.24.129.1.aarch64",
                "product": {
                  "name": "kernel-syms-5.3.18-150200.24.129.1.aarch64",
                  "product_id": "kernel-syms-5.3.18-150200.24.129.1.aarch64"
                }
              },
              {
                "category": "product_version",
                "name": "kselftests-kmp-default-5.3.18-150200.24.129.1.aarch64",
                "product": {
                  "name": "kselftests-kmp-default-5.3.18-150200.24.129.1.aarch64",
                  "product_id": "kselftests-kmp-default-5.3.18-150200.24.129.1.aarch64"
                }
              },
              {
                "category": "product_version",
                "name": "kselftests-kmp-preempt-5.3.18-150200.24.129.1.aarch64",
                "product": {
                  "name": "kselftests-kmp-preempt-5.3.18-150200.24.129.1.aarch64",
                  "product_id": "kselftests-kmp-preempt-5.3.18-150200.24.129.1.aarch64"
                }
              },
              {
                "category": "product_version",
                "name": "ocfs2-kmp-default-5.3.18-150200.24.129.1.aarch64",
                "product": {
                  "name": "ocfs2-kmp-default-5.3.18-150200.24.129.1.aarch64",
                  "product_id": "ocfs2-kmp-default-5.3.18-150200.24.129.1.aarch64"
                }
              },
              {
                "category": "product_version",
                "name": "ocfs2-kmp-preempt-5.3.18-150200.24.129.1.aarch64",
                "product": {
                  "name": "ocfs2-kmp-preempt-5.3.18-150200.24.129.1.aarch64",
                  "product_id": "ocfs2-kmp-preempt-5.3.18-150200.24.129.1.aarch64"
                }
              },
              {
                "category": "product_version",
                "name": "reiserfs-kmp-default-5.3.18-150200.24.129.1.aarch64",
                "product": {
                  "name": "reiserfs-kmp-default-5.3.18-150200.24.129.1.aarch64",
                  "product_id": "reiserfs-kmp-default-5.3.18-150200.24.129.1.aarch64"
                }
              },
              {
                "category": "product_version",
                "name": "reiserfs-kmp-preempt-5.3.18-150200.24.129.1.aarch64",
                "product": {
                  "name": "reiserfs-kmp-preempt-5.3.18-150200.24.129.1.aarch64",
                  "product_id": "reiserfs-kmp-preempt-5.3.18-150200.24.129.1.aarch64"
                }
              }
            ],
            "category": "architecture",
            "name": "aarch64"
          },
          {
            "branches": [
              {
                "category": "product_version",
                "name": "kernel-devel-5.3.18-150200.24.129.1.noarch",
                "product": {
                  "name": "kernel-devel-5.3.18-150200.24.129.1.noarch",
                  "product_id": "kernel-devel-5.3.18-150200.24.129.1.noarch"
                }
              },
              {
                "category": "product_version",
                "name": "kernel-docs-5.3.18-150200.24.129.1.noarch",
                "product": {
                  "name": "kernel-docs-5.3.18-150200.24.129.1.noarch",
                  "product_id": "kernel-docs-5.3.18-150200.24.129.1.noarch"
                }
              },
              {
                "category": "product_version",
                "name": "kernel-docs-html-5.3.18-150200.24.129.1.noarch",
                "product": {
                  "name": "kernel-docs-html-5.3.18-150200.24.129.1.noarch",
                  "product_id": "kernel-docs-html-5.3.18-150200.24.129.1.noarch"
                }
              },
              {
                "category": "product_version",
                "name": "kernel-macros-5.3.18-150200.24.129.1.noarch",
                "product": {
                  "name": "kernel-macros-5.3.18-150200.24.129.1.noarch",
                  "product_id": "kernel-macros-5.3.18-150200.24.129.1.noarch"
                }
              },
              {
                "category": "product_version",
                "name": "kernel-source-5.3.18-150200.24.129.1.noarch",
                "product": {
                  "name": "kernel-source-5.3.18-150200.24.129.1.noarch",
                  "product_id": "kernel-source-5.3.18-150200.24.129.1.noarch"
                }
              },
              {
                "category": "product_version",
                "name": "kernel-source-vanilla-5.3.18-150200.24.129.1.noarch",
                "product": {
                  "name": "kernel-source-vanilla-5.3.18-150200.24.129.1.noarch",
                  "product_id": "kernel-source-vanilla-5.3.18-150200.24.129.1.noarch"
                }
              }
            ],
            "category": "architecture",
            "name": "noarch"
          },
          {
            "branches": [
              {
                "category": "product_version",
                "name": "cluster-md-kmp-default-5.3.18-150200.24.129.1.ppc64le",
                "product": {
                  "name": "cluster-md-kmp-default-5.3.18-150200.24.129.1.ppc64le",
                  "product_id": "cluster-md-kmp-default-5.3.18-150200.24.129.1.ppc64le"
                }
              },
              {
                "category": "product_version",
                "name": "dlm-kmp-default-5.3.18-150200.24.129.1.ppc64le",
                "product": {
                  "name": "dlm-kmp-default-5.3.18-150200.24.129.1.ppc64le",
                  "product_id": "dlm-kmp-default-5.3.18-150200.24.129.1.ppc64le"
                }
              },
              {
                "category": "product_version",
                "name": "gfs2-kmp-default-5.3.18-150200.24.129.1.ppc64le",
                "product": {
                  "name": "gfs2-kmp-default-5.3.18-150200.24.129.1.ppc64le",
                  "product_id": "gfs2-kmp-default-5.3.18-150200.24.129.1.ppc64le"
                }
              },
              {
                "category": "product_version",
                "name": "kernel-debug-5.3.18-150200.24.129.1.ppc64le",
                "product": {
                  "name": "kernel-debug-5.3.18-150200.24.129.1.ppc64le",
                  "product_id": "kernel-debug-5.3.18-150200.24.129.1.ppc64le"
                }
              },
              {
                "category": "product_version",
                "name": "kernel-debug-devel-5.3.18-150200.24.129.1.ppc64le",
                "product": {
                  "name": "kernel-debug-devel-5.3.18-150200.24.129.1.ppc64le",
                  "product_id": "kernel-debug-devel-5.3.18-150200.24.129.1.ppc64le"
                }
              },
              {
                "category": "product_version",
                "name": "kernel-debug-livepatch-devel-5.3.18-150200.24.129.1.ppc64le",
                "product": {
                  "name": "kernel-debug-livepatch-devel-5.3.18-150200.24.129.1.ppc64le",
                  "product_id": "kernel-debug-livepatch-devel-5.3.18-150200.24.129.1.ppc64le"
                }
              },
              {
                "category": "product_version",
                "name": "kernel-default-5.3.18-150200.24.129.1.ppc64le",
                "product": {
                  "name": "kernel-default-5.3.18-150200.24.129.1.ppc64le",
                  "product_id": "kernel-default-5.3.18-150200.24.129.1.ppc64le"
                }
              },
              {
                "category": "product_version",
                "name": "kernel-default-base-5.3.18-150200.24.129.1.150200.9.61.1.ppc64le",
                "product": {
                  "name": "kernel-default-base-5.3.18-150200.24.129.1.150200.9.61.1.ppc64le",
                  "product_id": "kernel-default-base-5.3.18-150200.24.129.1.150200.9.61.1.ppc64le"
                }
              },
              {
                "category": "product_version",
                "name": "kernel-default-base-rebuild-5.3.18-150200.24.129.1.150200.9.61.1.ppc64le",
                "product": {
                  "name": "kernel-default-base-rebuild-5.3.18-150200.24.129.1.150200.9.61.1.ppc64le",
                  "product_id": "kernel-default-base-rebuild-5.3.18-150200.24.129.1.150200.9.61.1.ppc64le"
                }
              },
              {
                "category": "product_version",
                "name": "kernel-default-devel-5.3.18-150200.24.129.1.ppc64le",
                "product": {
                  "name": "kernel-default-devel-5.3.18-150200.24.129.1.ppc64le",
                  "product_id": "kernel-default-devel-5.3.18-150200.24.129.1.ppc64le"
                }
              },
              {
                "category": "product_version",
                "name": "kernel-default-extra-5.3.18-150200.24.129.1.ppc64le",
                "product": {
                  "name": "kernel-default-extra-5.3.18-150200.24.129.1.ppc64le",
                  "product_id": "kernel-default-extra-5.3.18-150200.24.129.1.ppc64le"
                }
              },
              {
                "category": "product_version",
                "name": "kernel-default-livepatch-5.3.18-150200.24.129.1.ppc64le",
                "product": {
                  "name": "kernel-default-livepatch-5.3.18-150200.24.129.1.ppc64le",
                  "product_id": "kernel-default-livepatch-5.3.18-150200.24.129.1.ppc64le"
                }
              },
              {
                "category": "product_version",
                "name": "kernel-default-livepatch-devel-5.3.18-150200.24.129.1.ppc64le",
                "product": {
                  "name": "kernel-default-livepatch-devel-5.3.18-150200.24.129.1.ppc64le",
                  "product_id": "kernel-default-livepatch-devel-5.3.18-150200.24.129.1.ppc64le"
                }
              },
              {
                "category": "product_version",
                "name": "kernel-kvmsmall-5.3.18-150200.24.129.1.ppc64le",
                "product": {
                  "name": "kernel-kvmsmall-5.3.18-150200.24.129.1.ppc64le",
                  "product_id": "kernel-kvmsmall-5.3.18-150200.24.129.1.ppc64le"
                }
              },
              {
                "category": "product_version",
                "name": "kernel-kvmsmall-devel-5.3.18-150200.24.129.1.ppc64le",
                "product": {
                  "name": "kernel-kvmsmall-devel-5.3.18-150200.24.129.1.ppc64le",
                  "product_id": "kernel-kvmsmall-devel-5.3.18-150200.24.129.1.ppc64le"
                }
              },
              {
                "category": "product_version",
                "name": "kernel-kvmsmall-livepatch-devel-5.3.18-150200.24.129.1.ppc64le",
                "product": {
                  "name": "kernel-kvmsmall-livepatch-devel-5.3.18-150200.24.129.1.ppc64le",
                  "product_id": "kernel-kvmsmall-livepatch-devel-5.3.18-150200.24.129.1.ppc64le"
                }
              },
              {
                "category": "product_version",
                "name": "kernel-livepatch-5_3_18-150200_24_129-default-1-150200.5.3.1.ppc64le",
                "product": {
                  "name": "kernel-livepatch-5_3_18-150200_24_129-default-1-150200.5.3.1.ppc64le",
                  "product_id": "kernel-livepatch-5_3_18-150200_24_129-default-1-150200.5.3.1.ppc64le"
                }
              },
              {
                "category": "product_version",
                "name": "kernel-obs-build-5.3.18-150200.24.129.1.ppc64le",
                "product": {
                  "name": "kernel-obs-build-5.3.18-150200.24.129.1.ppc64le",
                  "product_id": "kernel-obs-build-5.3.18-150200.24.129.1.ppc64le"
                }
              },
              {
                "category": "product_version",
                "name": "kernel-obs-qa-5.3.18-150200.24.129.1.ppc64le",
                "product": {
                  "name": "kernel-obs-qa-5.3.18-150200.24.129.1.ppc64le",
                  "product_id": "kernel-obs-qa-5.3.18-150200.24.129.1.ppc64le"
                }
              },
              {
                "category": "product_version",
                "name": "kernel-syms-5.3.18-150200.24.129.1.ppc64le",
                "product": {
                  "name": "kernel-syms-5.3.18-150200.24.129.1.ppc64le",
                  "product_id": "kernel-syms-5.3.18-150200.24.129.1.ppc64le"
                }
              },
              {
                "category": "product_version",
                "name": "kselftests-kmp-default-5.3.18-150200.24.129.1.ppc64le",
                "product": {
                  "name": "kselftests-kmp-default-5.3.18-150200.24.129.1.ppc64le",
                  "product_id": "kselftests-kmp-default-5.3.18-150200.24.129.1.ppc64le"
                }
              },
              {
                "category": "product_version",
                "name": "ocfs2-kmp-default-5.3.18-150200.24.129.1.ppc64le",
                "product": {
                  "name": "ocfs2-kmp-default-5.3.18-150200.24.129.1.ppc64le",
                  "product_id": "ocfs2-kmp-default-5.3.18-150200.24.129.1.ppc64le"
                }
              },
              {
                "category": "product_version",
                "name": "reiserfs-kmp-default-5.3.18-150200.24.129.1.ppc64le",
                "product": {
                  "name": "reiserfs-kmp-default-5.3.18-150200.24.129.1.ppc64le",
                  "product_id": "reiserfs-kmp-default-5.3.18-150200.24.129.1.ppc64le"
                }
              }
            ],
            "category": "architecture",
            "name": "ppc64le"
          },
          {
            "branches": [
              {
                "category": "product_version",
                "name": "cluster-md-kmp-default-5.3.18-150200.24.129.1.s390x",
                "product": {
                  "name": "cluster-md-kmp-default-5.3.18-150200.24.129.1.s390x",
                  "product_id": "cluster-md-kmp-default-5.3.18-150200.24.129.1.s390x"
                }
              },
              {
                "category": "product_version",
                "name": "dlm-kmp-default-5.3.18-150200.24.129.1.s390x",
                "product": {
                  "name": "dlm-kmp-default-5.3.18-150200.24.129.1.s390x",
                  "product_id": "dlm-kmp-default-5.3.18-150200.24.129.1.s390x"
                }
              },
              {
                "category": "product_version",
                "name": "gfs2-kmp-default-5.3.18-150200.24.129.1.s390x",
                "product": {
                  "name": "gfs2-kmp-default-5.3.18-150200.24.129.1.s390x",
                  "product_id": "gfs2-kmp-default-5.3.18-150200.24.129.1.s390x"
                }
              },
              {
                "category": "product_version",
                "name": "kernel-default-5.3.18-150200.24.129.1.s390x",
                "product": {
                  "name": "kernel-default-5.3.18-150200.24.129.1.s390x",
                  "product_id": "kernel-default-5.3.18-150200.24.129.1.s390x"
                }
              },
              {
                "category": "product_version",
                "name": "kernel-default-base-5.3.18-150200.24.129.1.150200.9.61.1.s390x",
                "product": {
                  "name": "kernel-default-base-5.3.18-150200.24.129.1.150200.9.61.1.s390x",
                  "product_id": "kernel-default-base-5.3.18-150200.24.129.1.150200.9.61.1.s390x"
                }
              },
              {
                "category": "product_version",
                "name": "kernel-default-base-rebuild-5.3.18-150200.24.129.1.150200.9.61.1.s390x",
                "product": {
                  "name": "kernel-default-base-rebuild-5.3.18-150200.24.129.1.150200.9.61.1.s390x",
                  "product_id": "kernel-default-base-rebuild-5.3.18-150200.24.129.1.150200.9.61.1.s390x"
                }
              },
              {
                "category": "product_version",
                "name": "kernel-default-devel-5.3.18-150200.24.129.1.s390x",
                "product": {
                  "name": "kernel-default-devel-5.3.18-150200.24.129.1.s390x",
                  "product_id": "kernel-default-devel-5.3.18-150200.24.129.1.s390x"
                }
              },
              {
                "category": "product_version",
                "name": "kernel-default-extra-5.3.18-150200.24.129.1.s390x",
                "product": {
                  "name": "kernel-default-extra-5.3.18-150200.24.129.1.s390x",
                  "product_id": "kernel-default-extra-5.3.18-150200.24.129.1.s390x"
                }
              },
              {
                "category": "product_version",
                "name": "kernel-default-livepatch-5.3.18-150200.24.129.1.s390x",
                "product": {
                  "name": "kernel-default-livepatch-5.3.18-150200.24.129.1.s390x",
                  "product_id": "kernel-default-livepatch-5.3.18-150200.24.129.1.s390x"
                }
              },
              {
                "category": "product_version",
                "name": "kernel-default-livepatch-devel-5.3.18-150200.24.129.1.s390x",
                "product": {
                  "name": "kernel-default-livepatch-devel-5.3.18-150200.24.129.1.s390x",
                  "product_id": "kernel-default-livepatch-devel-5.3.18-150200.24.129.1.s390x"
                }
              },
              {
                "category": "product_version",
                "name": "kernel-livepatch-5_3_18-150200_24_129-default-1-150200.5.3.1.s390x",
                "product": {
                  "name": "kernel-livepatch-5_3_18-150200_24_129-default-1-150200.5.3.1.s390x",
                  "product_id": "kernel-livepatch-5_3_18-150200_24_129-default-1-150200.5.3.1.s390x"
                }
              },
              {
                "category": "product_version",
                "name": "kernel-obs-build-5.3.18-150200.24.129.1.s390x",
                "product": {
                  "name": "kernel-obs-build-5.3.18-150200.24.129.1.s390x",
                  "product_id": "kernel-obs-build-5.3.18-150200.24.129.1.s390x"
                }
              },
              {
                "category": "product_version",
                "name": "kernel-obs-qa-5.3.18-150200.24.129.1.s390x",
                "product": {
                  "name": "kernel-obs-qa-5.3.18-150200.24.129.1.s390x",
                  "product_id": "kernel-obs-qa-5.3.18-150200.24.129.1.s390x"
                }
              },
              {
                "category": "product_version",
                "name": "kernel-syms-5.3.18-150200.24.129.1.s390x",
                "product": {
                  "name": "kernel-syms-5.3.18-150200.24.129.1.s390x",
                  "product_id": "kernel-syms-5.3.18-150200.24.129.1.s390x"
                }
              },
              {
                "category": "product_version",
                "name": "kernel-zfcpdump-5.3.18-150200.24.129.1.s390x",
                "product": {
                  "name": "kernel-zfcpdump-5.3.18-150200.24.129.1.s390x",
                  "product_id": "kernel-zfcpdump-5.3.18-150200.24.129.1.s390x"
                }
              },
              {
                "category": "product_version",
                "name": "kselftests-kmp-default-5.3.18-150200.24.129.1.s390x",
                "product": {
                  "name": "kselftests-kmp-default-5.3.18-150200.24.129.1.s390x",
                  "product_id": "kselftests-kmp-default-5.3.18-150200.24.129.1.s390x"
                }
              },
              {
                "category": "product_version",
                "name": "ocfs2-kmp-default-5.3.18-150200.24.129.1.s390x",
                "product": {
                  "name": "ocfs2-kmp-default-5.3.18-150200.24.129.1.s390x",
                  "product_id": "ocfs2-kmp-default-5.3.18-150200.24.129.1.s390x"
                }
              },
              {
                "category": "product_version",
                "name": "reiserfs-kmp-default-5.3.18-150200.24.129.1.s390x",
                "product": {
                  "name": "reiserfs-kmp-default-5.3.18-150200.24.129.1.s390x",
                  "product_id": "reiserfs-kmp-default-5.3.18-150200.24.129.1.s390x"
                }
              }
            ],
            "category": "architecture",
            "name": "s390x"
          },
          {
            "branches": [
              {
                "category": "product_version",
                "name": "cluster-md-kmp-default-5.3.18-150200.24.129.1.x86_64",
                "product": {
                  "name": "cluster-md-kmp-default-5.3.18-150200.24.129.1.x86_64",
                  "product_id": "cluster-md-kmp-default-5.3.18-150200.24.129.1.x86_64"
                }
              },
              {
                "category": "product_version",
                "name": "cluster-md-kmp-preempt-5.3.18-150200.24.129.1.x86_64",
                "product": {
                  "name": "cluster-md-kmp-preempt-5.3.18-150200.24.129.1.x86_64",
                  "product_id": "cluster-md-kmp-preempt-5.3.18-150200.24.129.1.x86_64"
                }
              },
              {
                "category": "product_version",
                "name": "dlm-kmp-default-5.3.18-150200.24.129.1.x86_64",
                "product": {
                  "name": "dlm-kmp-default-5.3.18-150200.24.129.1.x86_64",
                  "product_id": "dlm-kmp-default-5.3.18-150200.24.129.1.x86_64"
                }
              },
              {
                "category": "product_version",
                "name": "dlm-kmp-preempt-5.3.18-150200.24.129.1.x86_64",
                "product": {
                  "name": "dlm-kmp-preempt-5.3.18-150200.24.129.1.x86_64",
                  "product_id": "dlm-kmp-preempt-5.3.18-150200.24.129.1.x86_64"
                }
              },
              {
                "category": "product_version",
                "name": "gfs2-kmp-default-5.3.18-150200.24.129.1.x86_64",
                "product": {
                  "name": "gfs2-kmp-default-5.3.18-150200.24.129.1.x86_64",
                  "product_id": "gfs2-kmp-default-5.3.18-150200.24.129.1.x86_64"
                }
              },
              {
                "category": "product_version",
                "name": "gfs2-kmp-preempt-5.3.18-150200.24.129.1.x86_64",
                "product": {
                  "name": "gfs2-kmp-preempt-5.3.18-150200.24.129.1.x86_64",
                  "product_id": "gfs2-kmp-preempt-5.3.18-150200.24.129.1.x86_64"
                }
              },
              {
                "category": "product_version",
                "name": "kernel-debug-5.3.18-150200.24.129.1.x86_64",
                "product": {
                  "name": "kernel-debug-5.3.18-150200.24.129.1.x86_64",
                  "product_id": "kernel-debug-5.3.18-150200.24.129.1.x86_64"
                }
              },
              {
                "category": "product_version",
                "name": "kernel-debug-devel-5.3.18-150200.24.129.1.x86_64",
                "product": {
                  "name": "kernel-debug-devel-5.3.18-150200.24.129.1.x86_64",
                  "product_id": "kernel-debug-devel-5.3.18-150200.24.129.1.x86_64"
                }
              },
              {
                "category": "product_version",
                "name": "kernel-debug-livepatch-devel-5.3.18-150200.24.129.1.x86_64",
                "product": {
                  "name": "kernel-debug-livepatch-devel-5.3.18-150200.24.129.1.x86_64",
                  "product_id": "kernel-debug-livepatch-devel-5.3.18-150200.24.129.1.x86_64"
                }
              },
              {
                "category": "product_version",
                "name": "kernel-default-5.3.18-150200.24.129.1.x86_64",
                "product": {
                  "name": "kernel-default-5.3.18-150200.24.129.1.x86_64",
                  "product_id": "kernel-default-5.3.18-150200.24.129.1.x86_64"
                }
              },
              {
                "category": "product_version",
                "name": "kernel-default-base-5.3.18-150200.24.129.1.150200.9.61.1.x86_64",
                "product": {
                  "name": "kernel-default-base-5.3.18-150200.24.129.1.150200.9.61.1.x86_64",
                  "product_id": "kernel-default-base-5.3.18-150200.24.129.1.150200.9.61.1.x86_64"
                }
              },
              {
                "category": "product_version",
                "name": "kernel-default-base-rebuild-5.3.18-150200.24.129.1.150200.9.61.1.x86_64",
                "product": {
                  "name": "kernel-default-base-rebuild-5.3.18-150200.24.129.1.150200.9.61.1.x86_64",
                  "product_id": "kernel-default-base-rebuild-5.3.18-150200.24.129.1.150200.9.61.1.x86_64"
                }
              },
              {
                "category": "product_version",
                "name": "kernel-default-devel-5.3.18-150200.24.129.1.x86_64",
                "product": {
                  "name": "kernel-default-devel-5.3.18-150200.24.129.1.x86_64",
                  "product_id": "kernel-default-devel-5.3.18-150200.24.129.1.x86_64"
                }
              },
              {
                "category": "product_version",
                "name": "kernel-default-extra-5.3.18-150200.24.129.1.x86_64",
                "product": {
                  "name": "kernel-default-extra-5.3.18-150200.24.129.1.x86_64",
                  "product_id": "kernel-default-extra-5.3.18-150200.24.129.1.x86_64"
                }
              },
              {
                "category": "product_version",
                "name": "kernel-default-livepatch-5.3.18-150200.24.129.1.x86_64",
                "product": {
                  "name": "kernel-default-livepatch-5.3.18-150200.24.129.1.x86_64",
                  "product_id": "kernel-default-livepatch-5.3.18-150200.24.129.1.x86_64"
                }
              },
              {
                "category": "product_version",
                "name": "kernel-default-livepatch-devel-5.3.18-150200.24.129.1.x86_64",
                "product": {
                  "name": "kernel-default-livepatch-devel-5.3.18-150200.24.129.1.x86_64",
                  "product_id": "kernel-default-livepatch-devel-5.3.18-150200.24.129.1.x86_64"
                }
              },
              {
                "category": "product_version",
                "name": "kernel-kvmsmall-5.3.18-150200.24.129.1.x86_64",
                "product": {
                  "name": "kernel-kvmsmall-5.3.18-150200.24.129.1.x86_64",
                  "product_id": "kernel-kvmsmall-5.3.18-150200.24.129.1.x86_64"
                }
              },
              {
                "category": "product_version",
                "name": "kernel-kvmsmall-devel-5.3.18-150200.24.129.1.x86_64",
                "product": {
                  "name": "kernel-kvmsmall-devel-5.3.18-150200.24.129.1.x86_64",
                  "product_id": "kernel-kvmsmall-devel-5.3.18-150200.24.129.1.x86_64"
                }
              },
              {
                "category": "product_version",
                "name": "kernel-kvmsmall-livepatch-devel-5.3.18-150200.24.129.1.x86_64",
                "product": {
                  "name": "kernel-kvmsmall-livepatch-devel-5.3.18-150200.24.129.1.x86_64",
                  "product_id": "kernel-kvmsmall-livepatch-devel-5.3.18-150200.24.129.1.x86_64"
                }
              },
              {
                "category": "product_version",
                "name": "kernel-livepatch-5_3_18-150200_24_129-default-1-150200.5.3.1.x86_64",
                "product": {
                  "name": "kernel-livepatch-5_3_18-150200_24_129-default-1-150200.5.3.1.x86_64",
                  "product_id": "kernel-livepatch-5_3_18-150200_24_129-default-1-150200.5.3.1.x86_64"
                }
              },
              {
                "category": "product_version",
                "name": "kernel-livepatch-5_3_18-150200_24_129-preempt-1-150200.5.3.1.x86_64",
                "product": {
                  "name": "kernel-livepatch-5_3_18-150200_24_129-preempt-1-150200.5.3.1.x86_64",
                  "product_id": "kernel-livepatch-5_3_18-150200_24_129-preempt-1-150200.5.3.1.x86_64"
                }
              },
              {
                "category": "product_version",
                "name": "kernel-obs-build-5.3.18-150200.24.129.1.x86_64",
                "product": {
                  "name": "kernel-obs-build-5.3.18-150200.24.129.1.x86_64",
                  "product_id": "kernel-obs-build-5.3.18-150200.24.129.1.x86_64"
                }
              },
              {
                "category": "product_version",
                "name": "kernel-obs-qa-5.3.18-150200.24.129.1.x86_64",
                "product": {
                  "name": "kernel-obs-qa-5.3.18-150200.24.129.1.x86_64",
                  "product_id": "kernel-obs-qa-5.3.18-150200.24.129.1.x86_64"
                }
              },
              {
                "category": "product_version",
                "name": "kernel-preempt-5.3.18-150200.24.129.1.x86_64",
                "product": {
                  "name": "kernel-preempt-5.3.18-150200.24.129.1.x86_64",
                  "product_id": "kernel-preempt-5.3.18-150200.24.129.1.x86_64"
                }
              },
              {
                "category": "product_version",
                "name": "kernel-preempt-devel-5.3.18-150200.24.129.1.x86_64",
                "product": {
                  "name": "kernel-preempt-devel-5.3.18-150200.24.129.1.x86_64",
                  "product_id": "kernel-preempt-devel-5.3.18-150200.24.129.1.x86_64"
                }
              },
              {
                "category": "product_version",
                "name": "kernel-preempt-extra-5.3.18-150200.24.129.1.x86_64",
                "product": {
                  "name": "kernel-preempt-extra-5.3.18-150200.24.129.1.x86_64",
                  "product_id": "kernel-preempt-extra-5.3.18-150200.24.129.1.x86_64"
                }
              },
              {
                "category": "product_version",
                "name": "kernel-preempt-livepatch-devel-5.3.18-150200.24.129.1.x86_64",
                "product": {
                  "name": "kernel-preempt-livepatch-devel-5.3.18-150200.24.129.1.x86_64",
                  "product_id": "kernel-preempt-livepatch-devel-5.3.18-150200.24.129.1.x86_64"
                }
              },
              {
                "category": "product_version",
                "name": "kernel-syms-5.3.18-150200.24.129.1.x86_64",
                "product": {
                  "name": "kernel-syms-5.3.18-150200.24.129.1.x86_64",
                  "product_id": "kernel-syms-5.3.18-150200.24.129.1.x86_64"
                }
              },
              {
                "category": "product_version",
                "name": "kselftests-kmp-default-5.3.18-150200.24.129.1.x86_64",
                "product": {
                  "name": "kselftests-kmp-default-5.3.18-150200.24.129.1.x86_64",
                  "product_id": "kselftests-kmp-default-5.3.18-150200.24.129.1.x86_64"
                }
              },
              {
                "category": "product_version",
                "name": "kselftests-kmp-preempt-5.3.18-150200.24.129.1.x86_64",
                "product": {
                  "name": "kselftests-kmp-preempt-5.3.18-150200.24.129.1.x86_64",
                  "product_id": "kselftests-kmp-preempt-5.3.18-150200.24.129.1.x86_64"
                }
              },
              {
                "category": "product_version",
                "name": "ocfs2-kmp-default-5.3.18-150200.24.129.1.x86_64",
                "product": {
                  "name": "ocfs2-kmp-default-5.3.18-150200.24.129.1.x86_64",
                  "product_id": "ocfs2-kmp-default-5.3.18-150200.24.129.1.x86_64"
                }
              },
              {
                "category": "product_version",
                "name": "ocfs2-kmp-preempt-5.3.18-150200.24.129.1.x86_64",
                "product": {
                  "name": "ocfs2-kmp-preempt-5.3.18-150200.24.129.1.x86_64",
                  "product_id": "ocfs2-kmp-preempt-5.3.18-150200.24.129.1.x86_64"
                }
              },
              {
                "category": "product_version",
                "name": "reiserfs-kmp-default-5.3.18-150200.24.129.1.x86_64",
                "product": {
                  "name": "reiserfs-kmp-default-5.3.18-150200.24.129.1.x86_64",
                  "product_id": "reiserfs-kmp-default-5.3.18-150200.24.129.1.x86_64"
                }
              },
              {
                "category": "product_version",
                "name": "reiserfs-kmp-preempt-5.3.18-150200.24.129.1.x86_64",
                "product": {
                  "name": "reiserfs-kmp-preempt-5.3.18-150200.24.129.1.x86_64",
                  "product_id": "reiserfs-kmp-preempt-5.3.18-150200.24.129.1.x86_64"
                }
              }
            ],
            "category": "architecture",
            "name": "x86_64"
          },
          {
            "branches": [
              {
                "category": "product_name",
                "name": "SUSE Linux Enterprise Live Patching 15 SP2",
                "product": {
                  "name": "SUSE Linux Enterprise Live Patching 15 SP2",
                  "product_id": "SUSE Linux Enterprise Live Patching 15 SP2",
                  "product_identification_helper": {
                    "cpe": "cpe:/o:suse:sle-module-live-patching:15:sp2"
                  }
                }
              },
              {
                "category": "product_name",
                "name": "SUSE Linux Enterprise High Availability Extension 15 SP2",
                "product": {
                  "name": "SUSE Linux Enterprise High Availability Extension 15 SP2",
                  "product_id": "SUSE Linux Enterprise High Availability Extension 15 SP2",
                  "product_identification_helper": {
                    "cpe": "cpe:/o:suse:sle-ha:15:sp2"
                  }
                }
              },
              {
                "category": "product_name",
                "name": "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS",
                "product": {
                  "name": "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS",
                  "product_id": "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS",
                  "product_identification_helper": {
                    "cpe": "cpe:/o:suse:sle_hpc-espos:15:sp2"
                  }
                }
              },
              {
                "category": "product_name",
                "name": "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS",
                "product": {
                  "name": "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS",
                  "product_id": "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS",
                  "product_identification_helper": {
                    "cpe": "cpe:/o:suse:sle_hpc-ltss:15:sp2"
                  }
                }
              },
              {
                "category": "product_name",
                "name": "SUSE Linux Enterprise Server 15 SP2-BCL",
                "product": {
                  "name": "SUSE Linux Enterprise Server 15 SP2-BCL",
                  "product_id": "SUSE Linux Enterprise Server 15 SP2-BCL",
                  "product_identification_helper": {
                    "cpe": "cpe:/o:suse:sles_bcl:15:sp2"
                  }
                }
              },
              {
                "category": "product_name",
                "name": "SUSE Linux Enterprise Server 15 SP2-LTSS",
                "product": {
                  "name": "SUSE Linux Enterprise Server 15 SP2-LTSS",
                  "product_id": "SUSE Linux Enterprise Server 15 SP2-LTSS",
                  "product_identification_helper": {
                    "cpe": "cpe:/o:suse:sles-ltss:15:sp2"
                  }
                }
              },
              {
                "category": "product_name",
                "name": "SUSE Linux Enterprise Server for SAP Applications 15 SP2",
                "product": {
                  "name": "SUSE Linux Enterprise Server for SAP Applications 15 SP2",
                  "product_id": "SUSE Linux Enterprise Server for SAP Applications 15 SP2",
                  "product_identification_helper": {
                    "cpe": "cpe:/o:suse:sles_sap:15:sp2"
                  }
                }
              },
              {
                "category": "product_name",
                "name": "SUSE Manager Proxy 4.1",
                "product": {
                  "name": "SUSE Manager Proxy 4.1",
                  "product_id": "SUSE Manager Proxy 4.1",
                  "product_identification_helper": {
                    "cpe": "cpe:/o:suse:suse-manager-proxy:4.1"
                  }
                }
              },
              {
                "category": "product_name",
                "name": "SUSE Manager Retail Branch Server 4.1",
                "product": {
                  "name": "SUSE Manager Retail Branch Server 4.1",
                  "product_id": "SUSE Manager Retail Branch Server 4.1",
                  "product_identification_helper": {
                    "cpe": "cpe:/o:suse:suse-manager-retail-branch-server:4.1"
                  }
                }
              },
              {
                "category": "product_name",
                "name": "SUSE Manager Server 4.1",
                "product": {
                  "name": "SUSE Manager Server 4.1",
                  "product_id": "SUSE Manager Server 4.1",
                  "product_identification_helper": {
                    "cpe": "cpe:/o:suse:suse-manager-server:4.1"
                  }
                }
              },
              {
                "category": "product_name",
                "name": "SUSE Enterprise Storage 7",
                "product": {
                  "name": "SUSE Enterprise Storage 7",
                  "product_id": "SUSE Enterprise Storage 7",
                  "product_identification_helper": {
                    "cpe": "cpe:/o:suse:ses:7"
                  }
                }
              }
            ],
            "category": "product_family",
            "name": "SUSE Linux Enterprise"
          }
        ],
        "category": "vendor",
        "name": "SUSE"
      }
    ],
    "relationships": [
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-default-livepatch-5.3.18-150200.24.129.1.ppc64le as component of SUSE Linux Enterprise Live Patching 15 SP2",
          "product_id": "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-5.3.18-150200.24.129.1.ppc64le"
        },
        "product_reference": "kernel-default-livepatch-5.3.18-150200.24.129.1.ppc64le",
        "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP2"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-default-livepatch-5.3.18-150200.24.129.1.s390x as component of SUSE Linux Enterprise Live Patching 15 SP2",
          "product_id": "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-5.3.18-150200.24.129.1.s390x"
        },
        "product_reference": "kernel-default-livepatch-5.3.18-150200.24.129.1.s390x",
        "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP2"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-default-livepatch-5.3.18-150200.24.129.1.x86_64 as component of SUSE Linux Enterprise Live Patching 15 SP2",
          "product_id": "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-5.3.18-150200.24.129.1.x86_64"
        },
        "product_reference": "kernel-default-livepatch-5.3.18-150200.24.129.1.x86_64",
        "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP2"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-default-livepatch-devel-5.3.18-150200.24.129.1.ppc64le as component of SUSE Linux Enterprise Live Patching 15 SP2",
          "product_id": "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-devel-5.3.18-150200.24.129.1.ppc64le"
        },
        "product_reference": "kernel-default-livepatch-devel-5.3.18-150200.24.129.1.ppc64le",
        "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP2"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-default-livepatch-devel-5.3.18-150200.24.129.1.s390x as component of SUSE Linux Enterprise Live Patching 15 SP2",
          "product_id": "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-devel-5.3.18-150200.24.129.1.s390x"
        },
        "product_reference": "kernel-default-livepatch-devel-5.3.18-150200.24.129.1.s390x",
        "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP2"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-default-livepatch-devel-5.3.18-150200.24.129.1.x86_64 as component of SUSE Linux Enterprise Live Patching 15 SP2",
          "product_id": "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-devel-5.3.18-150200.24.129.1.x86_64"
        },
        "product_reference": "kernel-default-livepatch-devel-5.3.18-150200.24.129.1.x86_64",
        "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP2"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-livepatch-5_3_18-150200_24_129-default-1-150200.5.3.1.ppc64le as component of SUSE Linux Enterprise Live Patching 15 SP2",
          "product_id": "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-150200_24_129-default-1-150200.5.3.1.ppc64le"
        },
        "product_reference": "kernel-livepatch-5_3_18-150200_24_129-default-1-150200.5.3.1.ppc64le",
        "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP2"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-livepatch-5_3_18-150200_24_129-default-1-150200.5.3.1.s390x as component of SUSE Linux Enterprise Live Patching 15 SP2",
          "product_id": "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-150200_24_129-default-1-150200.5.3.1.s390x"
        },
        "product_reference": "kernel-livepatch-5_3_18-150200_24_129-default-1-150200.5.3.1.s390x",
        "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP2"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-livepatch-5_3_18-150200_24_129-default-1-150200.5.3.1.x86_64 as component of SUSE Linux Enterprise Live Patching 15 SP2",
          "product_id": "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-150200_24_129-default-1-150200.5.3.1.x86_64"
        },
        "product_reference": "kernel-livepatch-5_3_18-150200_24_129-default-1-150200.5.3.1.x86_64",
        "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP2"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "cluster-md-kmp-default-5.3.18-150200.24.129.1.aarch64 as component of SUSE Linux Enterprise High Availability Extension 15 SP2",
          "product_id": "SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-150200.24.129.1.aarch64"
        },
        "product_reference": "cluster-md-kmp-default-5.3.18-150200.24.129.1.aarch64",
        "relates_to_product_reference": "SUSE Linux Enterprise High Availability Extension 15 SP2"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "cluster-md-kmp-default-5.3.18-150200.24.129.1.ppc64le as component of SUSE Linux Enterprise High Availability Extension 15 SP2",
          "product_id": "SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-150200.24.129.1.ppc64le"
        },
        "product_reference": "cluster-md-kmp-default-5.3.18-150200.24.129.1.ppc64le",
        "relates_to_product_reference": "SUSE Linux Enterprise High Availability Extension 15 SP2"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "cluster-md-kmp-default-5.3.18-150200.24.129.1.s390x as component of SUSE Linux Enterprise High Availability Extension 15 SP2",
          "product_id": "SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-150200.24.129.1.s390x"
        },
        "product_reference": "cluster-md-kmp-default-5.3.18-150200.24.129.1.s390x",
        "relates_to_product_reference": "SUSE Linux Enterprise High Availability Extension 15 SP2"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "cluster-md-kmp-default-5.3.18-150200.24.129.1.x86_64 as component of SUSE Linux Enterprise High Availability Extension 15 SP2",
          "product_id": "SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-150200.24.129.1.x86_64"
        },
        "product_reference": "cluster-md-kmp-default-5.3.18-150200.24.129.1.x86_64",
        "relates_to_product_reference": "SUSE Linux Enterprise High Availability Extension 15 SP2"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "dlm-kmp-default-5.3.18-150200.24.129.1.aarch64 as component of SUSE Linux Enterprise High Availability Extension 15 SP2",
          "product_id": "SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-150200.24.129.1.aarch64"
        },
        "product_reference": "dlm-kmp-default-5.3.18-150200.24.129.1.aarch64",
        "relates_to_product_reference": "SUSE Linux Enterprise High Availability Extension 15 SP2"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "dlm-kmp-default-5.3.18-150200.24.129.1.ppc64le as component of SUSE Linux Enterprise High Availability Extension 15 SP2",
          "product_id": "SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-150200.24.129.1.ppc64le"
        },
        "product_reference": "dlm-kmp-default-5.3.18-150200.24.129.1.ppc64le",
        "relates_to_product_reference": "SUSE Linux Enterprise High Availability Extension 15 SP2"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "dlm-kmp-default-5.3.18-150200.24.129.1.s390x as component of SUSE Linux Enterprise High Availability Extension 15 SP2",
          "product_id": "SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-150200.24.129.1.s390x"
        },
        "product_reference": "dlm-kmp-default-5.3.18-150200.24.129.1.s390x",
        "relates_to_product_reference": "SUSE Linux Enterprise High Availability Extension 15 SP2"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "dlm-kmp-default-5.3.18-150200.24.129.1.x86_64 as component of SUSE Linux Enterprise High Availability Extension 15 SP2",
          "product_id": "SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-150200.24.129.1.x86_64"
        },
        "product_reference": "dlm-kmp-default-5.3.18-150200.24.129.1.x86_64",
        "relates_to_product_reference": "SUSE Linux Enterprise High Availability Extension 15 SP2"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "gfs2-kmp-default-5.3.18-150200.24.129.1.aarch64 as component of SUSE Linux Enterprise High Availability Extension 15 SP2",
          "product_id": "SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-150200.24.129.1.aarch64"
        },
        "product_reference": "gfs2-kmp-default-5.3.18-150200.24.129.1.aarch64",
        "relates_to_product_reference": "SUSE Linux Enterprise High Availability Extension 15 SP2"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "gfs2-kmp-default-5.3.18-150200.24.129.1.ppc64le as component of SUSE Linux Enterprise High Availability Extension 15 SP2",
          "product_id": "SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-150200.24.129.1.ppc64le"
        },
        "product_reference": "gfs2-kmp-default-5.3.18-150200.24.129.1.ppc64le",
        "relates_to_product_reference": "SUSE Linux Enterprise High Availability Extension 15 SP2"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "gfs2-kmp-default-5.3.18-150200.24.129.1.s390x as component of SUSE Linux Enterprise High Availability Extension 15 SP2",
          "product_id": "SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-150200.24.129.1.s390x"
        },
        "product_reference": "gfs2-kmp-default-5.3.18-150200.24.129.1.s390x",
        "relates_to_product_reference": "SUSE Linux Enterprise High Availability Extension 15 SP2"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "gfs2-kmp-default-5.3.18-150200.24.129.1.x86_64 as component of SUSE Linux Enterprise High Availability Extension 15 SP2",
          "product_id": "SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-150200.24.129.1.x86_64"
        },
        "product_reference": "gfs2-kmp-default-5.3.18-150200.24.129.1.x86_64",
        "relates_to_product_reference": "SUSE Linux Enterprise High Availability Extension 15 SP2"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "ocfs2-kmp-default-5.3.18-150200.24.129.1.aarch64 as component of SUSE Linux Enterprise High Availability Extension 15 SP2",
          "product_id": "SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-150200.24.129.1.aarch64"
        },
        "product_reference": "ocfs2-kmp-default-5.3.18-150200.24.129.1.aarch64",
        "relates_to_product_reference": "SUSE Linux Enterprise High Availability Extension 15 SP2"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "ocfs2-kmp-default-5.3.18-150200.24.129.1.ppc64le as component of SUSE Linux Enterprise High Availability Extension 15 SP2",
          "product_id": "SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-150200.24.129.1.ppc64le"
        },
        "product_reference": "ocfs2-kmp-default-5.3.18-150200.24.129.1.ppc64le",
        "relates_to_product_reference": "SUSE Linux Enterprise High Availability Extension 15 SP2"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "ocfs2-kmp-default-5.3.18-150200.24.129.1.s390x as component of SUSE Linux Enterprise High Availability Extension 15 SP2",
          "product_id": "SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-150200.24.129.1.s390x"
        },
        "product_reference": "ocfs2-kmp-default-5.3.18-150200.24.129.1.s390x",
        "relates_to_product_reference": "SUSE Linux Enterprise High Availability Extension 15 SP2"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "ocfs2-kmp-default-5.3.18-150200.24.129.1.x86_64 as component of SUSE Linux Enterprise High Availability Extension 15 SP2",
          "product_id": "SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-150200.24.129.1.x86_64"
        },
        "product_reference": "ocfs2-kmp-default-5.3.18-150200.24.129.1.x86_64",
        "relates_to_product_reference": "SUSE Linux Enterprise High Availability Extension 15 SP2"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-default-5.3.18-150200.24.129.1.aarch64 as component of SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS",
          "product_id": "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-default-5.3.18-150200.24.129.1.aarch64"
        },
        "product_reference": "kernel-default-5.3.18-150200.24.129.1.aarch64",
        "relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-default-5.3.18-150200.24.129.1.x86_64 as component of SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS",
          "product_id": "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-default-5.3.18-150200.24.129.1.x86_64"
        },
        "product_reference": "kernel-default-5.3.18-150200.24.129.1.x86_64",
        "relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-default-base-5.3.18-150200.24.129.1.150200.9.61.1.aarch64 as component of SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS",
          "product_id": "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-default-base-5.3.18-150200.24.129.1.150200.9.61.1.aarch64"
        },
        "product_reference": "kernel-default-base-5.3.18-150200.24.129.1.150200.9.61.1.aarch64",
        "relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-default-base-5.3.18-150200.24.129.1.150200.9.61.1.x86_64 as component of SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS",
          "product_id": "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-default-base-5.3.18-150200.24.129.1.150200.9.61.1.x86_64"
        },
        "product_reference": "kernel-default-base-5.3.18-150200.24.129.1.150200.9.61.1.x86_64",
        "relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-default-devel-5.3.18-150200.24.129.1.aarch64 as component of SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS",
          "product_id": "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-default-devel-5.3.18-150200.24.129.1.aarch64"
        },
        "product_reference": "kernel-default-devel-5.3.18-150200.24.129.1.aarch64",
        "relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-default-devel-5.3.18-150200.24.129.1.x86_64 as component of SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS",
          "product_id": "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-default-devel-5.3.18-150200.24.129.1.x86_64"
        },
        "product_reference": "kernel-default-devel-5.3.18-150200.24.129.1.x86_64",
        "relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-devel-5.3.18-150200.24.129.1.noarch as component of SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS",
          "product_id": "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-devel-5.3.18-150200.24.129.1.noarch"
        },
        "product_reference": "kernel-devel-5.3.18-150200.24.129.1.noarch",
        "relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-docs-5.3.18-150200.24.129.1.noarch as component of SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS",
          "product_id": "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-docs-5.3.18-150200.24.129.1.noarch"
        },
        "product_reference": "kernel-docs-5.3.18-150200.24.129.1.noarch",
        "relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-macros-5.3.18-150200.24.129.1.noarch as component of SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS",
          "product_id": "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-macros-5.3.18-150200.24.129.1.noarch"
        },
        "product_reference": "kernel-macros-5.3.18-150200.24.129.1.noarch",
        "relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-obs-build-5.3.18-150200.24.129.1.aarch64 as component of SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS",
          "product_id": "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-obs-build-5.3.18-150200.24.129.1.aarch64"
        },
        "product_reference": "kernel-obs-build-5.3.18-150200.24.129.1.aarch64",
        "relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-obs-build-5.3.18-150200.24.129.1.x86_64 as component of SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS",
          "product_id": "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-obs-build-5.3.18-150200.24.129.1.x86_64"
        },
        "product_reference": "kernel-obs-build-5.3.18-150200.24.129.1.x86_64",
        "relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-preempt-5.3.18-150200.24.129.1.aarch64 as component of SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS",
          "product_id": "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-preempt-5.3.18-150200.24.129.1.aarch64"
        },
        "product_reference": "kernel-preempt-5.3.18-150200.24.129.1.aarch64",
        "relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-preempt-5.3.18-150200.24.129.1.x86_64 as component of SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS",
          "product_id": "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-preempt-5.3.18-150200.24.129.1.x86_64"
        },
        "product_reference": "kernel-preempt-5.3.18-150200.24.129.1.x86_64",
        "relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-preempt-devel-5.3.18-150200.24.129.1.aarch64 as component of SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS",
          "product_id": "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-preempt-devel-5.3.18-150200.24.129.1.aarch64"
        },
        "product_reference": "kernel-preempt-devel-5.3.18-150200.24.129.1.aarch64",
        "relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-preempt-devel-5.3.18-150200.24.129.1.x86_64 as component of SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS",
          "product_id": "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-preempt-devel-5.3.18-150200.24.129.1.x86_64"
        },
        "product_reference": "kernel-preempt-devel-5.3.18-150200.24.129.1.x86_64",
        "relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-source-5.3.18-150200.24.129.1.noarch as component of SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS",
          "product_id": "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-source-5.3.18-150200.24.129.1.noarch"
        },
        "product_reference": "kernel-source-5.3.18-150200.24.129.1.noarch",
        "relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-syms-5.3.18-150200.24.129.1.aarch64 as component of SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS",
          "product_id": "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-syms-5.3.18-150200.24.129.1.aarch64"
        },
        "product_reference": "kernel-syms-5.3.18-150200.24.129.1.aarch64",
        "relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-syms-5.3.18-150200.24.129.1.x86_64 as component of SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS",
          "product_id": "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-syms-5.3.18-150200.24.129.1.x86_64"
        },
        "product_reference": "kernel-syms-5.3.18-150200.24.129.1.x86_64",
        "relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-default-5.3.18-150200.24.129.1.aarch64 as component of SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS",
          "product_id": "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-5.3.18-150200.24.129.1.aarch64"
        },
        "product_reference": "kernel-default-5.3.18-150200.24.129.1.aarch64",
        "relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-default-5.3.18-150200.24.129.1.x86_64 as component of SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS",
          "product_id": "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-5.3.18-150200.24.129.1.x86_64"
        },
        "product_reference": "kernel-default-5.3.18-150200.24.129.1.x86_64",
        "relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-default-base-5.3.18-150200.24.129.1.150200.9.61.1.aarch64 as component of SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS",
          "product_id": "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.129.1.150200.9.61.1.aarch64"
        },
        "product_reference": "kernel-default-base-5.3.18-150200.24.129.1.150200.9.61.1.aarch64",
        "relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-default-base-5.3.18-150200.24.129.1.150200.9.61.1.x86_64 as component of SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS",
          "product_id": "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.129.1.150200.9.61.1.x86_64"
        },
        "product_reference": "kernel-default-base-5.3.18-150200.24.129.1.150200.9.61.1.x86_64",
        "relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-default-devel-5.3.18-150200.24.129.1.aarch64 as component of SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS",
          "product_id": "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.129.1.aarch64"
        },
        "product_reference": "kernel-default-devel-5.3.18-150200.24.129.1.aarch64",
        "relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-default-devel-5.3.18-150200.24.129.1.x86_64 as component of SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS",
          "product_id": "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.129.1.x86_64"
        },
        "product_reference": "kernel-default-devel-5.3.18-150200.24.129.1.x86_64",
        "relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-devel-5.3.18-150200.24.129.1.noarch as component of SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS",
          "product_id": "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-devel-5.3.18-150200.24.129.1.noarch"
        },
        "product_reference": "kernel-devel-5.3.18-150200.24.129.1.noarch",
        "relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-docs-5.3.18-150200.24.129.1.noarch as component of SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS",
          "product_id": "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-docs-5.3.18-150200.24.129.1.noarch"
        },
        "product_reference": "kernel-docs-5.3.18-150200.24.129.1.noarch",
        "relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-macros-5.3.18-150200.24.129.1.noarch as component of SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS",
          "product_id": "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-macros-5.3.18-150200.24.129.1.noarch"
        },
        "product_reference": "kernel-macros-5.3.18-150200.24.129.1.noarch",
        "relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-obs-build-5.3.18-150200.24.129.1.aarch64 as component of SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS",
          "product_id": "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.129.1.aarch64"
        },
        "product_reference": "kernel-obs-build-5.3.18-150200.24.129.1.aarch64",
        "relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-obs-build-5.3.18-150200.24.129.1.x86_64 as component of SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS",
          "product_id": "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.129.1.x86_64"
        },
        "product_reference": "kernel-obs-build-5.3.18-150200.24.129.1.x86_64",
        "relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-preempt-5.3.18-150200.24.129.1.aarch64 as component of SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS",
          "product_id": "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-preempt-5.3.18-150200.24.129.1.aarch64"
        },
        "product_reference": "kernel-preempt-5.3.18-150200.24.129.1.aarch64",
        "relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-preempt-5.3.18-150200.24.129.1.x86_64 as component of SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS",
          "product_id": "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-preempt-5.3.18-150200.24.129.1.x86_64"
        },
        "product_reference": "kernel-preempt-5.3.18-150200.24.129.1.x86_64",
        "relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-preempt-devel-5.3.18-150200.24.129.1.aarch64 as component of SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS",
          "product_id": "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-preempt-devel-5.3.18-150200.24.129.1.aarch64"
        },
        "product_reference": "kernel-preempt-devel-5.3.18-150200.24.129.1.aarch64",
        "relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-preempt-devel-5.3.18-150200.24.129.1.x86_64 as component of SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS",
          "product_id": "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-preempt-devel-5.3.18-150200.24.129.1.x86_64"
        },
        "product_reference": "kernel-preempt-devel-5.3.18-150200.24.129.1.x86_64",
        "relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-source-5.3.18-150200.24.129.1.noarch as component of SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS",
          "product_id": "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-source-5.3.18-150200.24.129.1.noarch"
        },
        "product_reference": "kernel-source-5.3.18-150200.24.129.1.noarch",
        "relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-syms-5.3.18-150200.24.129.1.aarch64 as component of SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS",
          "product_id": "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.129.1.aarch64"
        },
        "product_reference": "kernel-syms-5.3.18-150200.24.129.1.aarch64",
        "relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-syms-5.3.18-150200.24.129.1.x86_64 as component of SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS",
          "product_id": "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.129.1.x86_64"
        },
        "product_reference": "kernel-syms-5.3.18-150200.24.129.1.x86_64",
        "relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-default-5.3.18-150200.24.129.1.x86_64 as component of SUSE Linux Enterprise Server 15 SP2-BCL",
          "product_id": "SUSE Linux Enterprise Server 15 SP2-BCL:kernel-default-5.3.18-150200.24.129.1.x86_64"
        },
        "product_reference": "kernel-default-5.3.18-150200.24.129.1.x86_64",
        "relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP2-BCL"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-default-base-5.3.18-150200.24.129.1.150200.9.61.1.x86_64 as component of SUSE Linux Enterprise Server 15 SP2-BCL",
          "product_id": "SUSE Linux Enterprise Server 15 SP2-BCL:kernel-default-base-5.3.18-150200.24.129.1.150200.9.61.1.x86_64"
        },
        "product_reference": "kernel-default-base-5.3.18-150200.24.129.1.150200.9.61.1.x86_64",
        "relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP2-BCL"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-default-devel-5.3.18-150200.24.129.1.x86_64 as component of SUSE Linux Enterprise Server 15 SP2-BCL",
          "product_id": "SUSE Linux Enterprise Server 15 SP2-BCL:kernel-default-devel-5.3.18-150200.24.129.1.x86_64"
        },
        "product_reference": "kernel-default-devel-5.3.18-150200.24.129.1.x86_64",
        "relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP2-BCL"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-devel-5.3.18-150200.24.129.1.noarch as component of SUSE Linux Enterprise Server 15 SP2-BCL",
          "product_id": "SUSE Linux Enterprise Server 15 SP2-BCL:kernel-devel-5.3.18-150200.24.129.1.noarch"
        },
        "product_reference": "kernel-devel-5.3.18-150200.24.129.1.noarch",
        "relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP2-BCL"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-docs-5.3.18-150200.24.129.1.noarch as component of SUSE Linux Enterprise Server 15 SP2-BCL",
          "product_id": "SUSE Linux Enterprise Server 15 SP2-BCL:kernel-docs-5.3.18-150200.24.129.1.noarch"
        },
        "product_reference": "kernel-docs-5.3.18-150200.24.129.1.noarch",
        "relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP2-BCL"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-macros-5.3.18-150200.24.129.1.noarch as component of SUSE Linux Enterprise Server 15 SP2-BCL",
          "product_id": "SUSE Linux Enterprise Server 15 SP2-BCL:kernel-macros-5.3.18-150200.24.129.1.noarch"
        },
        "product_reference": "kernel-macros-5.3.18-150200.24.129.1.noarch",
        "relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP2-BCL"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-obs-build-5.3.18-150200.24.129.1.x86_64 as component of SUSE Linux Enterprise Server 15 SP2-BCL",
          "product_id": "SUSE Linux Enterprise Server 15 SP2-BCL:kernel-obs-build-5.3.18-150200.24.129.1.x86_64"
        },
        "product_reference": "kernel-obs-build-5.3.18-150200.24.129.1.x86_64",
        "relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP2-BCL"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-preempt-5.3.18-150200.24.129.1.x86_64 as component of SUSE Linux Enterprise Server 15 SP2-BCL",
          "product_id": "SUSE Linux Enterprise Server 15 SP2-BCL:kernel-preempt-5.3.18-150200.24.129.1.x86_64"
        },
        "product_reference": "kernel-preempt-5.3.18-150200.24.129.1.x86_64",
        "relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP2-BCL"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-preempt-devel-5.3.18-150200.24.129.1.x86_64 as component of SUSE Linux Enterprise Server 15 SP2-BCL",
          "product_id": "SUSE Linux Enterprise Server 15 SP2-BCL:kernel-preempt-devel-5.3.18-150200.24.129.1.x86_64"
        },
        "product_reference": "kernel-preempt-devel-5.3.18-150200.24.129.1.x86_64",
        "relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP2-BCL"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-source-5.3.18-150200.24.129.1.noarch as component of SUSE Linux Enterprise Server 15 SP2-BCL",
          "product_id": "SUSE Linux Enterprise Server 15 SP2-BCL:kernel-source-5.3.18-150200.24.129.1.noarch"
        },
        "product_reference": "kernel-source-5.3.18-150200.24.129.1.noarch",
        "relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP2-BCL"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-syms-5.3.18-150200.24.129.1.x86_64 as component of SUSE Linux Enterprise Server 15 SP2-BCL",
          "product_id": "SUSE Linux Enterprise Server 15 SP2-BCL:kernel-syms-5.3.18-150200.24.129.1.x86_64"
        },
        "product_reference": "kernel-syms-5.3.18-150200.24.129.1.x86_64",
        "relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP2-BCL"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-default-5.3.18-150200.24.129.1.aarch64 as component of SUSE Linux Enterprise Server 15 SP2-LTSS",
          "product_id": "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-5.3.18-150200.24.129.1.aarch64"
        },
        "product_reference": "kernel-default-5.3.18-150200.24.129.1.aarch64",
        "relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP2-LTSS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-default-5.3.18-150200.24.129.1.ppc64le as component of SUSE Linux Enterprise Server 15 SP2-LTSS",
          "product_id": "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-5.3.18-150200.24.129.1.ppc64le"
        },
        "product_reference": "kernel-default-5.3.18-150200.24.129.1.ppc64le",
        "relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP2-LTSS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-default-5.3.18-150200.24.129.1.s390x as component of SUSE Linux Enterprise Server 15 SP2-LTSS",
          "product_id": "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-5.3.18-150200.24.129.1.s390x"
        },
        "product_reference": "kernel-default-5.3.18-150200.24.129.1.s390x",
        "relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP2-LTSS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-default-5.3.18-150200.24.129.1.x86_64 as component of SUSE Linux Enterprise Server 15 SP2-LTSS",
          "product_id": "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-5.3.18-150200.24.129.1.x86_64"
        },
        "product_reference": "kernel-default-5.3.18-150200.24.129.1.x86_64",
        "relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP2-LTSS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-default-base-5.3.18-150200.24.129.1.150200.9.61.1.aarch64 as component of SUSE Linux Enterprise Server 15 SP2-LTSS",
          "product_id": "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.129.1.150200.9.61.1.aarch64"
        },
        "product_reference": "kernel-default-base-5.3.18-150200.24.129.1.150200.9.61.1.aarch64",
        "relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP2-LTSS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-default-base-5.3.18-150200.24.129.1.150200.9.61.1.ppc64le as component of SUSE Linux Enterprise Server 15 SP2-LTSS",
          "product_id": "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.129.1.150200.9.61.1.ppc64le"
        },
        "product_reference": "kernel-default-base-5.3.18-150200.24.129.1.150200.9.61.1.ppc64le",
        "relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP2-LTSS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-default-base-5.3.18-150200.24.129.1.150200.9.61.1.s390x as component of SUSE Linux Enterprise Server 15 SP2-LTSS",
          "product_id": "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.129.1.150200.9.61.1.s390x"
        },
        "product_reference": "kernel-default-base-5.3.18-150200.24.129.1.150200.9.61.1.s390x",
        "relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP2-LTSS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-default-base-5.3.18-150200.24.129.1.150200.9.61.1.x86_64 as component of SUSE Linux Enterprise Server 15 SP2-LTSS",
          "product_id": "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.129.1.150200.9.61.1.x86_64"
        },
        "product_reference": "kernel-default-base-5.3.18-150200.24.129.1.150200.9.61.1.x86_64",
        "relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP2-LTSS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-default-devel-5.3.18-150200.24.129.1.aarch64 as component of SUSE Linux Enterprise Server 15 SP2-LTSS",
          "product_id": "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.129.1.aarch64"
        },
        "product_reference": "kernel-default-devel-5.3.18-150200.24.129.1.aarch64",
        "relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP2-LTSS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-default-devel-5.3.18-150200.24.129.1.ppc64le as component of SUSE Linux Enterprise Server 15 SP2-LTSS",
          "product_id": "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.129.1.ppc64le"
        },
        "product_reference": "kernel-default-devel-5.3.18-150200.24.129.1.ppc64le",
        "relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP2-LTSS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-default-devel-5.3.18-150200.24.129.1.s390x as component of SUSE Linux Enterprise Server 15 SP2-LTSS",
          "product_id": "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.129.1.s390x"
        },
        "product_reference": "kernel-default-devel-5.3.18-150200.24.129.1.s390x",
        "relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP2-LTSS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-default-devel-5.3.18-150200.24.129.1.x86_64 as component of SUSE Linux Enterprise Server 15 SP2-LTSS",
          "product_id": "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.129.1.x86_64"
        },
        "product_reference": "kernel-default-devel-5.3.18-150200.24.129.1.x86_64",
        "relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP2-LTSS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-devel-5.3.18-150200.24.129.1.noarch as component of SUSE Linux Enterprise Server 15 SP2-LTSS",
          "product_id": "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-devel-5.3.18-150200.24.129.1.noarch"
        },
        "product_reference": "kernel-devel-5.3.18-150200.24.129.1.noarch",
        "relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP2-LTSS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-docs-5.3.18-150200.24.129.1.noarch as component of SUSE Linux Enterprise Server 15 SP2-LTSS",
          "product_id": "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-docs-5.3.18-150200.24.129.1.noarch"
        },
        "product_reference": "kernel-docs-5.3.18-150200.24.129.1.noarch",
        "relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP2-LTSS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-macros-5.3.18-150200.24.129.1.noarch as component of SUSE Linux Enterprise Server 15 SP2-LTSS",
          "product_id": "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-macros-5.3.18-150200.24.129.1.noarch"
        },
        "product_reference": "kernel-macros-5.3.18-150200.24.129.1.noarch",
        "relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP2-LTSS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-obs-build-5.3.18-150200.24.129.1.aarch64 as component of SUSE Linux Enterprise Server 15 SP2-LTSS",
          "product_id": "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.129.1.aarch64"
        },
        "product_reference": "kernel-obs-build-5.3.18-150200.24.129.1.aarch64",
        "relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP2-LTSS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-obs-build-5.3.18-150200.24.129.1.ppc64le as component of SUSE Linux Enterprise Server 15 SP2-LTSS",
          "product_id": "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.129.1.ppc64le"
        },
        "product_reference": "kernel-obs-build-5.3.18-150200.24.129.1.ppc64le",
        "relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP2-LTSS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-obs-build-5.3.18-150200.24.129.1.s390x as component of SUSE Linux Enterprise Server 15 SP2-LTSS",
          "product_id": "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.129.1.s390x"
        },
        "product_reference": "kernel-obs-build-5.3.18-150200.24.129.1.s390x",
        "relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP2-LTSS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-obs-build-5.3.18-150200.24.129.1.x86_64 as component of SUSE Linux Enterprise Server 15 SP2-LTSS",
          "product_id": "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.129.1.x86_64"
        },
        "product_reference": "kernel-obs-build-5.3.18-150200.24.129.1.x86_64",
        "relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP2-LTSS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-preempt-5.3.18-150200.24.129.1.aarch64 as component of SUSE Linux Enterprise Server 15 SP2-LTSS",
          "product_id": "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-preempt-5.3.18-150200.24.129.1.aarch64"
        },
        "product_reference": "kernel-preempt-5.3.18-150200.24.129.1.aarch64",
        "relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP2-LTSS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-preempt-5.3.18-150200.24.129.1.x86_64 as component of SUSE Linux Enterprise Server 15 SP2-LTSS",
          "product_id": "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-preempt-5.3.18-150200.24.129.1.x86_64"
        },
        "product_reference": "kernel-preempt-5.3.18-150200.24.129.1.x86_64",
        "relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP2-LTSS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-preempt-devel-5.3.18-150200.24.129.1.aarch64 as component of SUSE Linux Enterprise Server 15 SP2-LTSS",
          "product_id": "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-preempt-devel-5.3.18-150200.24.129.1.aarch64"
        },
        "product_reference": "kernel-preempt-devel-5.3.18-150200.24.129.1.aarch64",
        "relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP2-LTSS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-preempt-devel-5.3.18-150200.24.129.1.x86_64 as component of SUSE Linux Enterprise Server 15 SP2-LTSS",
          "product_id": "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-preempt-devel-5.3.18-150200.24.129.1.x86_64"
        },
        "product_reference": "kernel-preempt-devel-5.3.18-150200.24.129.1.x86_64",
        "relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP2-LTSS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-source-5.3.18-150200.24.129.1.noarch as component of SUSE Linux Enterprise Server 15 SP2-LTSS",
          "product_id": "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-source-5.3.18-150200.24.129.1.noarch"
        },
        "product_reference": "kernel-source-5.3.18-150200.24.129.1.noarch",
        "relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP2-LTSS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-syms-5.3.18-150200.24.129.1.aarch64 as component of SUSE Linux Enterprise Server 15 SP2-LTSS",
          "product_id": "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.129.1.aarch64"
        },
        "product_reference": "kernel-syms-5.3.18-150200.24.129.1.aarch64",
        "relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP2-LTSS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-syms-5.3.18-150200.24.129.1.ppc64le as component of SUSE Linux Enterprise Server 15 SP2-LTSS",
          "product_id": "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.129.1.ppc64le"
        },
        "product_reference": "kernel-syms-5.3.18-150200.24.129.1.ppc64le",
        "relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP2-LTSS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-syms-5.3.18-150200.24.129.1.s390x as component of SUSE Linux Enterprise Server 15 SP2-LTSS",
          "product_id": "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.129.1.s390x"
        },
        "product_reference": "kernel-syms-5.3.18-150200.24.129.1.s390x",
        "relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP2-LTSS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-syms-5.3.18-150200.24.129.1.x86_64 as component of SUSE Linux Enterprise Server 15 SP2-LTSS",
          "product_id": "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.129.1.x86_64"
        },
        "product_reference": "kernel-syms-5.3.18-150200.24.129.1.x86_64",
        "relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP2-LTSS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "reiserfs-kmp-default-5.3.18-150200.24.129.1.aarch64 as component of SUSE Linux Enterprise Server 15 SP2-LTSS",
          "product_id": "SUSE Linux Enterprise Server 15 SP2-LTSS:reiserfs-kmp-default-5.3.18-150200.24.129.1.aarch64"
        },
        "product_reference": "reiserfs-kmp-default-5.3.18-150200.24.129.1.aarch64",
        "relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP2-LTSS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "reiserfs-kmp-default-5.3.18-150200.24.129.1.ppc64le as component of SUSE Linux Enterprise Server 15 SP2-LTSS",
          "product_id": "SUSE Linux Enterprise Server 15 SP2-LTSS:reiserfs-kmp-default-5.3.18-150200.24.129.1.ppc64le"
        },
        "product_reference": "reiserfs-kmp-default-5.3.18-150200.24.129.1.ppc64le",
        "relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP2-LTSS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "reiserfs-kmp-default-5.3.18-150200.24.129.1.s390x as component of SUSE Linux Enterprise Server 15 SP2-LTSS",
          "product_id": "SUSE Linux Enterprise Server 15 SP2-LTSS:reiserfs-kmp-default-5.3.18-150200.24.129.1.s390x"
        },
        "product_reference": "reiserfs-kmp-default-5.3.18-150200.24.129.1.s390x",
        "relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP2-LTSS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "reiserfs-kmp-default-5.3.18-150200.24.129.1.x86_64 as component of SUSE Linux Enterprise Server 15 SP2-LTSS",
          "product_id": "SUSE Linux Enterprise Server 15 SP2-LTSS:reiserfs-kmp-default-5.3.18-150200.24.129.1.x86_64"
        },
        "product_reference": "reiserfs-kmp-default-5.3.18-150200.24.129.1.x86_64",
        "relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP2-LTSS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-default-5.3.18-150200.24.129.1.ppc64le as component of SUSE Linux Enterprise Server for SAP Applications 15 SP2",
          "product_id": "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-5.3.18-150200.24.129.1.ppc64le"
        },
        "product_reference": "kernel-default-5.3.18-150200.24.129.1.ppc64le",
        "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 15 SP2"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-default-5.3.18-150200.24.129.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 15 SP2",
          "product_id": "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-5.3.18-150200.24.129.1.x86_64"
        },
        "product_reference": "kernel-default-5.3.18-150200.24.129.1.x86_64",
        "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 15 SP2"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-default-base-5.3.18-150200.24.129.1.150200.9.61.1.ppc64le as component of SUSE Linux Enterprise Server for SAP Applications 15 SP2",
          "product_id": "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-base-5.3.18-150200.24.129.1.150200.9.61.1.ppc64le"
        },
        "product_reference": "kernel-default-base-5.3.18-150200.24.129.1.150200.9.61.1.ppc64le",
        "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 15 SP2"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-default-base-5.3.18-150200.24.129.1.150200.9.61.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 15 SP2",
          "product_id": "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-base-5.3.18-150200.24.129.1.150200.9.61.1.x86_64"
        },
        "product_reference": "kernel-default-base-5.3.18-150200.24.129.1.150200.9.61.1.x86_64",
        "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 15 SP2"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-default-devel-5.3.18-150200.24.129.1.ppc64le as component of SUSE Linux Enterprise Server for SAP Applications 15 SP2",
          "product_id": "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-devel-5.3.18-150200.24.129.1.ppc64le"
        },
        "product_reference": "kernel-default-devel-5.3.18-150200.24.129.1.ppc64le",
        "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 15 SP2"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-default-devel-5.3.18-150200.24.129.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 15 SP2",
          "product_id": "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-devel-5.3.18-150200.24.129.1.x86_64"
        },
        "product_reference": "kernel-default-devel-5.3.18-150200.24.129.1.x86_64",
        "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 15 SP2"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-devel-5.3.18-150200.24.129.1.noarch as component of SUSE Linux Enterprise Server for SAP Applications 15 SP2",
          "product_id": "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-devel-5.3.18-150200.24.129.1.noarch"
        },
        "product_reference": "kernel-devel-5.3.18-150200.24.129.1.noarch",
        "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 15 SP2"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-docs-5.3.18-150200.24.129.1.noarch as component of SUSE Linux Enterprise Server for SAP Applications 15 SP2",
          "product_id": "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-docs-5.3.18-150200.24.129.1.noarch"
        },
        "product_reference": "kernel-docs-5.3.18-150200.24.129.1.noarch",
        "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 15 SP2"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-macros-5.3.18-150200.24.129.1.noarch as component of SUSE Linux Enterprise Server for SAP Applications 15 SP2",
          "product_id": "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-macros-5.3.18-150200.24.129.1.noarch"
        },
        "product_reference": "kernel-macros-5.3.18-150200.24.129.1.noarch",
        "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 15 SP2"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-obs-build-5.3.18-150200.24.129.1.ppc64le as component of SUSE Linux Enterprise Server for SAP Applications 15 SP2",
          "product_id": "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-obs-build-5.3.18-150200.24.129.1.ppc64le"
        },
        "product_reference": "kernel-obs-build-5.3.18-150200.24.129.1.ppc64le",
        "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 15 SP2"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-obs-build-5.3.18-150200.24.129.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 15 SP2",
          "product_id": "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-obs-build-5.3.18-150200.24.129.1.x86_64"
        },
        "product_reference": "kernel-obs-build-5.3.18-150200.24.129.1.x86_64",
        "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 15 SP2"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-preempt-5.3.18-150200.24.129.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 15 SP2",
          "product_id": "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-preempt-5.3.18-150200.24.129.1.x86_64"
        },
        "product_reference": "kernel-preempt-5.3.18-150200.24.129.1.x86_64",
        "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 15 SP2"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-preempt-devel-5.3.18-150200.24.129.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 15 SP2",
          "product_id": "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-preempt-devel-5.3.18-150200.24.129.1.x86_64"
        },
        "product_reference": "kernel-preempt-devel-5.3.18-150200.24.129.1.x86_64",
        "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 15 SP2"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-source-5.3.18-150200.24.129.1.noarch as component of SUSE Linux Enterprise Server for SAP Applications 15 SP2",
          "product_id": "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-source-5.3.18-150200.24.129.1.noarch"
        },
        "product_reference": "kernel-source-5.3.18-150200.24.129.1.noarch",
        "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 15 SP2"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-syms-5.3.18-150200.24.129.1.ppc64le as component of SUSE Linux Enterprise Server for SAP Applications 15 SP2",
          "product_id": "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-syms-5.3.18-150200.24.129.1.ppc64le"
        },
        "product_reference": "kernel-syms-5.3.18-150200.24.129.1.ppc64le",
        "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 15 SP2"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-syms-5.3.18-150200.24.129.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 15 SP2",
          "product_id": "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-syms-5.3.18-150200.24.129.1.x86_64"
        },
        "product_reference": "kernel-syms-5.3.18-150200.24.129.1.x86_64",
        "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 15 SP2"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "reiserfs-kmp-default-5.3.18-150200.24.129.1.ppc64le as component of SUSE Linux Enterprise Server for SAP Applications 15 SP2",
          "product_id": "SUSE Linux Enterprise Server for SAP Applications 15 SP2:reiserfs-kmp-default-5.3.18-150200.24.129.1.ppc64le"
        },
        "product_reference": "reiserfs-kmp-default-5.3.18-150200.24.129.1.ppc64le",
        "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 15 SP2"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "reiserfs-kmp-default-5.3.18-150200.24.129.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 15 SP2",
          "product_id": "SUSE Linux Enterprise Server for SAP Applications 15 SP2:reiserfs-kmp-default-5.3.18-150200.24.129.1.x86_64"
        },
        "product_reference": "reiserfs-kmp-default-5.3.18-150200.24.129.1.x86_64",
        "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 15 SP2"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-default-5.3.18-150200.24.129.1.x86_64 as component of SUSE Manager Proxy 4.1",
          "product_id": "SUSE Manager Proxy 4.1:kernel-default-5.3.18-150200.24.129.1.x86_64"
        },
        "product_reference": "kernel-default-5.3.18-150200.24.129.1.x86_64",
        "relates_to_product_reference": "SUSE Manager Proxy 4.1"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-default-base-5.3.18-150200.24.129.1.150200.9.61.1.x86_64 as component of SUSE Manager Proxy 4.1",
          "product_id": "SUSE Manager Proxy 4.1:kernel-default-base-5.3.18-150200.24.129.1.150200.9.61.1.x86_64"
        },
        "product_reference": "kernel-default-base-5.3.18-150200.24.129.1.150200.9.61.1.x86_64",
        "relates_to_product_reference": "SUSE Manager Proxy 4.1"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-default-devel-5.3.18-150200.24.129.1.x86_64 as component of SUSE Manager Proxy 4.1",
          "product_id": "SUSE Manager Proxy 4.1:kernel-default-devel-5.3.18-150200.24.129.1.x86_64"
        },
        "product_reference": "kernel-default-devel-5.3.18-150200.24.129.1.x86_64",
        "relates_to_product_reference": "SUSE Manager Proxy 4.1"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-devel-5.3.18-150200.24.129.1.noarch as component of SUSE Manager Proxy 4.1",
          "product_id": "SUSE Manager Proxy 4.1:kernel-devel-5.3.18-150200.24.129.1.noarch"
        },
        "product_reference": "kernel-devel-5.3.18-150200.24.129.1.noarch",
        "relates_to_product_reference": "SUSE Manager Proxy 4.1"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-docs-5.3.18-150200.24.129.1.noarch as component of SUSE Manager Proxy 4.1",
          "product_id": "SUSE Manager Proxy 4.1:kernel-docs-5.3.18-150200.24.129.1.noarch"
        },
        "product_reference": "kernel-docs-5.3.18-150200.24.129.1.noarch",
        "relates_to_product_reference": "SUSE Manager Proxy 4.1"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-macros-5.3.18-150200.24.129.1.noarch as component of SUSE Manager Proxy 4.1",
          "product_id": "SUSE Manager Proxy 4.1:kernel-macros-5.3.18-150200.24.129.1.noarch"
        },
        "product_reference": "kernel-macros-5.3.18-150200.24.129.1.noarch",
        "relates_to_product_reference": "SUSE Manager Proxy 4.1"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-obs-build-5.3.18-150200.24.129.1.x86_64 as component of SUSE Manager Proxy 4.1",
          "product_id": "SUSE Manager Proxy 4.1:kernel-obs-build-5.3.18-150200.24.129.1.x86_64"
        },
        "product_reference": "kernel-obs-build-5.3.18-150200.24.129.1.x86_64",
        "relates_to_product_reference": "SUSE Manager Proxy 4.1"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-preempt-5.3.18-150200.24.129.1.x86_64 as component of SUSE Manager Proxy 4.1",
          "product_id": "SUSE Manager Proxy 4.1:kernel-preempt-5.3.18-150200.24.129.1.x86_64"
        },
        "product_reference": "kernel-preempt-5.3.18-150200.24.129.1.x86_64",
        "relates_to_product_reference": "SUSE Manager Proxy 4.1"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-preempt-devel-5.3.18-150200.24.129.1.x86_64 as component of SUSE Manager Proxy 4.1",
          "product_id": "SUSE Manager Proxy 4.1:kernel-preempt-devel-5.3.18-150200.24.129.1.x86_64"
        },
        "product_reference": "kernel-preempt-devel-5.3.18-150200.24.129.1.x86_64",
        "relates_to_product_reference": "SUSE Manager Proxy 4.1"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-source-5.3.18-150200.24.129.1.noarch as component of SUSE Manager Proxy 4.1",
          "product_id": "SUSE Manager Proxy 4.1:kernel-source-5.3.18-150200.24.129.1.noarch"
        },
        "product_reference": "kernel-source-5.3.18-150200.24.129.1.noarch",
        "relates_to_product_reference": "SUSE Manager Proxy 4.1"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-syms-5.3.18-150200.24.129.1.x86_64 as component of SUSE Manager Proxy 4.1",
          "product_id": "SUSE Manager Proxy 4.1:kernel-syms-5.3.18-150200.24.129.1.x86_64"
        },
        "product_reference": "kernel-syms-5.3.18-150200.24.129.1.x86_64",
        "relates_to_product_reference": "SUSE Manager Proxy 4.1"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "reiserfs-kmp-default-5.3.18-150200.24.129.1.x86_64 as component of SUSE Manager Proxy 4.1",
          "product_id": "SUSE Manager Proxy 4.1:reiserfs-kmp-default-5.3.18-150200.24.129.1.x86_64"
        },
        "product_reference": "reiserfs-kmp-default-5.3.18-150200.24.129.1.x86_64",
        "relates_to_product_reference": "SUSE Manager Proxy 4.1"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-default-5.3.18-150200.24.129.1.x86_64 as component of SUSE Manager Retail Branch Server 4.1",
          "product_id": "SUSE Manager Retail Branch Server 4.1:kernel-default-5.3.18-150200.24.129.1.x86_64"
        },
        "product_reference": "kernel-default-5.3.18-150200.24.129.1.x86_64",
        "relates_to_product_reference": "SUSE Manager Retail Branch Server 4.1"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-default-base-5.3.18-150200.24.129.1.150200.9.61.1.x86_64 as component of SUSE Manager Retail Branch Server 4.1",
          "product_id": "SUSE Manager Retail Branch Server 4.1:kernel-default-base-5.3.18-150200.24.129.1.150200.9.61.1.x86_64"
        },
        "product_reference": "kernel-default-base-5.3.18-150200.24.129.1.150200.9.61.1.x86_64",
        "relates_to_product_reference": "SUSE Manager Retail Branch Server 4.1"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-default-devel-5.3.18-150200.24.129.1.x86_64 as component of SUSE Manager Retail Branch Server 4.1",
          "product_id": "SUSE Manager Retail Branch Server 4.1:kernel-default-devel-5.3.18-150200.24.129.1.x86_64"
        },
        "product_reference": "kernel-default-devel-5.3.18-150200.24.129.1.x86_64",
        "relates_to_product_reference": "SUSE Manager Retail Branch Server 4.1"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-devel-5.3.18-150200.24.129.1.noarch as component of SUSE Manager Retail Branch Server 4.1",
          "product_id": "SUSE Manager Retail Branch Server 4.1:kernel-devel-5.3.18-150200.24.129.1.noarch"
        },
        "product_reference": "kernel-devel-5.3.18-150200.24.129.1.noarch",
        "relates_to_product_reference": "SUSE Manager Retail Branch Server 4.1"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-docs-5.3.18-150200.24.129.1.noarch as component of SUSE Manager Retail Branch Server 4.1",
          "product_id": "SUSE Manager Retail Branch Server 4.1:kernel-docs-5.3.18-150200.24.129.1.noarch"
        },
        "product_reference": "kernel-docs-5.3.18-150200.24.129.1.noarch",
        "relates_to_product_reference": "SUSE Manager Retail Branch Server 4.1"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-macros-5.3.18-150200.24.129.1.noarch as component of SUSE Manager Retail Branch Server 4.1",
          "product_id": "SUSE Manager Retail Branch Server 4.1:kernel-macros-5.3.18-150200.24.129.1.noarch"
        },
        "product_reference": "kernel-macros-5.3.18-150200.24.129.1.noarch",
        "relates_to_product_reference": "SUSE Manager Retail Branch Server 4.1"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-obs-build-5.3.18-150200.24.129.1.x86_64 as component of SUSE Manager Retail Branch Server 4.1",
          "product_id": "SUSE Manager Retail Branch Server 4.1:kernel-obs-build-5.3.18-150200.24.129.1.x86_64"
        },
        "product_reference": "kernel-obs-build-5.3.18-150200.24.129.1.x86_64",
        "relates_to_product_reference": "SUSE Manager Retail Branch Server 4.1"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-preempt-5.3.18-150200.24.129.1.x86_64 as component of SUSE Manager Retail Branch Server 4.1",
          "product_id": "SUSE Manager Retail Branch Server 4.1:kernel-preempt-5.3.18-150200.24.129.1.x86_64"
        },
        "product_reference": "kernel-preempt-5.3.18-150200.24.129.1.x86_64",
        "relates_to_product_reference": "SUSE Manager Retail Branch Server 4.1"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-preempt-devel-5.3.18-150200.24.129.1.x86_64 as component of SUSE Manager Retail Branch Server 4.1",
          "product_id": "SUSE Manager Retail Branch Server 4.1:kernel-preempt-devel-5.3.18-150200.24.129.1.x86_64"
        },
        "product_reference": "kernel-preempt-devel-5.3.18-150200.24.129.1.x86_64",
        "relates_to_product_reference": "SUSE Manager Retail Branch Server 4.1"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-source-5.3.18-150200.24.129.1.noarch as component of SUSE Manager Retail Branch Server 4.1",
          "product_id": "SUSE Manager Retail Branch Server 4.1:kernel-source-5.3.18-150200.24.129.1.noarch"
        },
        "product_reference": "kernel-source-5.3.18-150200.24.129.1.noarch",
        "relates_to_product_reference": "SUSE Manager Retail Branch Server 4.1"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-syms-5.3.18-150200.24.129.1.x86_64 as component of SUSE Manager Retail Branch Server 4.1",
          "product_id": "SUSE Manager Retail Branch Server 4.1:kernel-syms-5.3.18-150200.24.129.1.x86_64"
        },
        "product_reference": "kernel-syms-5.3.18-150200.24.129.1.x86_64",
        "relates_to_product_reference": "SUSE Manager Retail Branch Server 4.1"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "reiserfs-kmp-default-5.3.18-150200.24.129.1.x86_64 as component of SUSE Manager Retail Branch Server 4.1",
          "product_id": "SUSE Manager Retail Branch Server 4.1:reiserfs-kmp-default-5.3.18-150200.24.129.1.x86_64"
        },
        "product_reference": "reiserfs-kmp-default-5.3.18-150200.24.129.1.x86_64",
        "relates_to_product_reference": "SUSE Manager Retail Branch Server 4.1"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-default-5.3.18-150200.24.129.1.ppc64le as component of SUSE Manager Server 4.1",
          "product_id": "SUSE Manager Server 4.1:kernel-default-5.3.18-150200.24.129.1.ppc64le"
        },
        "product_reference": "kernel-default-5.3.18-150200.24.129.1.ppc64le",
        "relates_to_product_reference": "SUSE Manager Server 4.1"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-default-5.3.18-150200.24.129.1.s390x as component of SUSE Manager Server 4.1",
          "product_id": "SUSE Manager Server 4.1:kernel-default-5.3.18-150200.24.129.1.s390x"
        },
        "product_reference": "kernel-default-5.3.18-150200.24.129.1.s390x",
        "relates_to_product_reference": "SUSE Manager Server 4.1"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-default-5.3.18-150200.24.129.1.x86_64 as component of SUSE Manager Server 4.1",
          "product_id": "SUSE Manager Server 4.1:kernel-default-5.3.18-150200.24.129.1.x86_64"
        },
        "product_reference": "kernel-default-5.3.18-150200.24.129.1.x86_64",
        "relates_to_product_reference": "SUSE Manager Server 4.1"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-default-base-5.3.18-150200.24.129.1.150200.9.61.1.ppc64le as component of SUSE Manager Server 4.1",
          "product_id": "SUSE Manager Server 4.1:kernel-default-base-5.3.18-150200.24.129.1.150200.9.61.1.ppc64le"
        },
        "product_reference": "kernel-default-base-5.3.18-150200.24.129.1.150200.9.61.1.ppc64le",
        "relates_to_product_reference": "SUSE Manager Server 4.1"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-default-base-5.3.18-150200.24.129.1.150200.9.61.1.s390x as component of SUSE Manager Server 4.1",
          "product_id": "SUSE Manager Server 4.1:kernel-default-base-5.3.18-150200.24.129.1.150200.9.61.1.s390x"
        },
        "product_reference": "kernel-default-base-5.3.18-150200.24.129.1.150200.9.61.1.s390x",
        "relates_to_product_reference": "SUSE Manager Server 4.1"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-default-base-5.3.18-150200.24.129.1.150200.9.61.1.x86_64 as component of SUSE Manager Server 4.1",
          "product_id": "SUSE Manager Server 4.1:kernel-default-base-5.3.18-150200.24.129.1.150200.9.61.1.x86_64"
        },
        "product_reference": "kernel-default-base-5.3.18-150200.24.129.1.150200.9.61.1.x86_64",
        "relates_to_product_reference": "SUSE Manager Server 4.1"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-default-devel-5.3.18-150200.24.129.1.ppc64le as component of SUSE Manager Server 4.1",
          "product_id": "SUSE Manager Server 4.1:kernel-default-devel-5.3.18-150200.24.129.1.ppc64le"
        },
        "product_reference": "kernel-default-devel-5.3.18-150200.24.129.1.ppc64le",
        "relates_to_product_reference": "SUSE Manager Server 4.1"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-default-devel-5.3.18-150200.24.129.1.s390x as component of SUSE Manager Server 4.1",
          "product_id": "SUSE Manager Server 4.1:kernel-default-devel-5.3.18-150200.24.129.1.s390x"
        },
        "product_reference": "kernel-default-devel-5.3.18-150200.24.129.1.s390x",
        "relates_to_product_reference": "SUSE Manager Server 4.1"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-default-devel-5.3.18-150200.24.129.1.x86_64 as component of SUSE Manager Server 4.1",
          "product_id": "SUSE Manager Server 4.1:kernel-default-devel-5.3.18-150200.24.129.1.x86_64"
        },
        "product_reference": "kernel-default-devel-5.3.18-150200.24.129.1.x86_64",
        "relates_to_product_reference": "SUSE Manager Server 4.1"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-devel-5.3.18-150200.24.129.1.noarch as component of SUSE Manager Server 4.1",
          "product_id": "SUSE Manager Server 4.1:kernel-devel-5.3.18-150200.24.129.1.noarch"
        },
        "product_reference": "kernel-devel-5.3.18-150200.24.129.1.noarch",
        "relates_to_product_reference": "SUSE Manager Server 4.1"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-docs-5.3.18-150200.24.129.1.noarch as component of SUSE Manager Server 4.1",
          "product_id": "SUSE Manager Server 4.1:kernel-docs-5.3.18-150200.24.129.1.noarch"
        },
        "product_reference": "kernel-docs-5.3.18-150200.24.129.1.noarch",
        "relates_to_product_reference": "SUSE Manager Server 4.1"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-macros-5.3.18-150200.24.129.1.noarch as component of SUSE Manager Server 4.1",
          "product_id": "SUSE Manager Server 4.1:kernel-macros-5.3.18-150200.24.129.1.noarch"
        },
        "product_reference": "kernel-macros-5.3.18-150200.24.129.1.noarch",
        "relates_to_product_reference": "SUSE Manager Server 4.1"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-obs-build-5.3.18-150200.24.129.1.ppc64le as component of SUSE Manager Server 4.1",
          "product_id": "SUSE Manager Server 4.1:kernel-obs-build-5.3.18-150200.24.129.1.ppc64le"
        },
        "product_reference": "kernel-obs-build-5.3.18-150200.24.129.1.ppc64le",
        "relates_to_product_reference": "SUSE Manager Server 4.1"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-obs-build-5.3.18-150200.24.129.1.s390x as component of SUSE Manager Server 4.1",
          "product_id": "SUSE Manager Server 4.1:kernel-obs-build-5.3.18-150200.24.129.1.s390x"
        },
        "product_reference": "kernel-obs-build-5.3.18-150200.24.129.1.s390x",
        "relates_to_product_reference": "SUSE Manager Server 4.1"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-obs-build-5.3.18-150200.24.129.1.x86_64 as component of SUSE Manager Server 4.1",
          "product_id": "SUSE Manager Server 4.1:kernel-obs-build-5.3.18-150200.24.129.1.x86_64"
        },
        "product_reference": "kernel-obs-build-5.3.18-150200.24.129.1.x86_64",
        "relates_to_product_reference": "SUSE Manager Server 4.1"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-preempt-5.3.18-150200.24.129.1.x86_64 as component of SUSE Manager Server 4.1",
          "product_id": "SUSE Manager Server 4.1:kernel-preempt-5.3.18-150200.24.129.1.x86_64"
        },
        "product_reference": "kernel-preempt-5.3.18-150200.24.129.1.x86_64",
        "relates_to_product_reference": "SUSE Manager Server 4.1"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-preempt-devel-5.3.18-150200.24.129.1.x86_64 as component of SUSE Manager Server 4.1",
          "product_id": "SUSE Manager Server 4.1:kernel-preempt-devel-5.3.18-150200.24.129.1.x86_64"
        },
        "product_reference": "kernel-preempt-devel-5.3.18-150200.24.129.1.x86_64",
        "relates_to_product_reference": "SUSE Manager Server 4.1"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-source-5.3.18-150200.24.129.1.noarch as component of SUSE Manager Server 4.1",
          "product_id": "SUSE Manager Server 4.1:kernel-source-5.3.18-150200.24.129.1.noarch"
        },
        "product_reference": "kernel-source-5.3.18-150200.24.129.1.noarch",
        "relates_to_product_reference": "SUSE Manager Server 4.1"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-syms-5.3.18-150200.24.129.1.ppc64le as component of SUSE Manager Server 4.1",
          "product_id": "SUSE Manager Server 4.1:kernel-syms-5.3.18-150200.24.129.1.ppc64le"
        },
        "product_reference": "kernel-syms-5.3.18-150200.24.129.1.ppc64le",
        "relates_to_product_reference": "SUSE Manager Server 4.1"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-syms-5.3.18-150200.24.129.1.s390x as component of SUSE Manager Server 4.1",
          "product_id": "SUSE Manager Server 4.1:kernel-syms-5.3.18-150200.24.129.1.s390x"
        },
        "product_reference": "kernel-syms-5.3.18-150200.24.129.1.s390x",
        "relates_to_product_reference": "SUSE Manager Server 4.1"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-syms-5.3.18-150200.24.129.1.x86_64 as component of SUSE Manager Server 4.1",
          "product_id": "SUSE Manager Server 4.1:kernel-syms-5.3.18-150200.24.129.1.x86_64"
        },
        "product_reference": "kernel-syms-5.3.18-150200.24.129.1.x86_64",
        "relates_to_product_reference": "SUSE Manager Server 4.1"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "reiserfs-kmp-default-5.3.18-150200.24.129.1.ppc64le as component of SUSE Manager Server 4.1",
          "product_id": "SUSE Manager Server 4.1:reiserfs-kmp-default-5.3.18-150200.24.129.1.ppc64le"
        },
        "product_reference": "reiserfs-kmp-default-5.3.18-150200.24.129.1.ppc64le",
        "relates_to_product_reference": "SUSE Manager Server 4.1"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "reiserfs-kmp-default-5.3.18-150200.24.129.1.s390x as component of SUSE Manager Server 4.1",
          "product_id": "SUSE Manager Server 4.1:reiserfs-kmp-default-5.3.18-150200.24.129.1.s390x"
        },
        "product_reference": "reiserfs-kmp-default-5.3.18-150200.24.129.1.s390x",
        "relates_to_product_reference": "SUSE Manager Server 4.1"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "reiserfs-kmp-default-5.3.18-150200.24.129.1.x86_64 as component of SUSE Manager Server 4.1",
          "product_id": "SUSE Manager Server 4.1:reiserfs-kmp-default-5.3.18-150200.24.129.1.x86_64"
        },
        "product_reference": "reiserfs-kmp-default-5.3.18-150200.24.129.1.x86_64",
        "relates_to_product_reference": "SUSE Manager Server 4.1"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-default-5.3.18-150200.24.129.1.aarch64 as component of SUSE Enterprise Storage 7",
          "product_id": "SUSE Enterprise Storage 7:kernel-default-5.3.18-150200.24.129.1.aarch64"
        },
        "product_reference": "kernel-default-5.3.18-150200.24.129.1.aarch64",
        "relates_to_product_reference": "SUSE Enterprise Storage 7"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-default-5.3.18-150200.24.129.1.x86_64 as component of SUSE Enterprise Storage 7",
          "product_id": "SUSE Enterprise Storage 7:kernel-default-5.3.18-150200.24.129.1.x86_64"
        },
        "product_reference": "kernel-default-5.3.18-150200.24.129.1.x86_64",
        "relates_to_product_reference": "SUSE Enterprise Storage 7"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-default-base-5.3.18-150200.24.129.1.150200.9.61.1.aarch64 as component of SUSE Enterprise Storage 7",
          "product_id": "SUSE Enterprise Storage 7:kernel-default-base-5.3.18-150200.24.129.1.150200.9.61.1.aarch64"
        },
        "product_reference": "kernel-default-base-5.3.18-150200.24.129.1.150200.9.61.1.aarch64",
        "relates_to_product_reference": "SUSE Enterprise Storage 7"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-default-base-5.3.18-150200.24.129.1.150200.9.61.1.x86_64 as component of SUSE Enterprise Storage 7",
          "product_id": "SUSE Enterprise Storage 7:kernel-default-base-5.3.18-150200.24.129.1.150200.9.61.1.x86_64"
        },
        "product_reference": "kernel-default-base-5.3.18-150200.24.129.1.150200.9.61.1.x86_64",
        "relates_to_product_reference": "SUSE Enterprise Storage 7"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-default-devel-5.3.18-150200.24.129.1.aarch64 as component of SUSE Enterprise Storage 7",
          "product_id": "SUSE Enterprise Storage 7:kernel-default-devel-5.3.18-150200.24.129.1.aarch64"
        },
        "product_reference": "kernel-default-devel-5.3.18-150200.24.129.1.aarch64",
        "relates_to_product_reference": "SUSE Enterprise Storage 7"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-default-devel-5.3.18-150200.24.129.1.x86_64 as component of SUSE Enterprise Storage 7",
          "product_id": "SUSE Enterprise Storage 7:kernel-default-devel-5.3.18-150200.24.129.1.x86_64"
        },
        "product_reference": "kernel-default-devel-5.3.18-150200.24.129.1.x86_64",
        "relates_to_product_reference": "SUSE Enterprise Storage 7"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-devel-5.3.18-150200.24.129.1.noarch as component of SUSE Enterprise Storage 7",
          "product_id": "SUSE Enterprise Storage 7:kernel-devel-5.3.18-150200.24.129.1.noarch"
        },
        "product_reference": "kernel-devel-5.3.18-150200.24.129.1.noarch",
        "relates_to_product_reference": "SUSE Enterprise Storage 7"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-docs-5.3.18-150200.24.129.1.noarch as component of SUSE Enterprise Storage 7",
          "product_id": "SUSE Enterprise Storage 7:kernel-docs-5.3.18-150200.24.129.1.noarch"
        },
        "product_reference": "kernel-docs-5.3.18-150200.24.129.1.noarch",
        "relates_to_product_reference": "SUSE Enterprise Storage 7"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-macros-5.3.18-150200.24.129.1.noarch as component of SUSE Enterprise Storage 7",
          "product_id": "SUSE Enterprise Storage 7:kernel-macros-5.3.18-150200.24.129.1.noarch"
        },
        "product_reference": "kernel-macros-5.3.18-150200.24.129.1.noarch",
        "relates_to_product_reference": "SUSE Enterprise Storage 7"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-obs-build-5.3.18-150200.24.129.1.aarch64 as component of SUSE Enterprise Storage 7",
          "product_id": "SUSE Enterprise Storage 7:kernel-obs-build-5.3.18-150200.24.129.1.aarch64"
        },
        "product_reference": "kernel-obs-build-5.3.18-150200.24.129.1.aarch64",
        "relates_to_product_reference": "SUSE Enterprise Storage 7"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-obs-build-5.3.18-150200.24.129.1.x86_64 as component of SUSE Enterprise Storage 7",
          "product_id": "SUSE Enterprise Storage 7:kernel-obs-build-5.3.18-150200.24.129.1.x86_64"
        },
        "product_reference": "kernel-obs-build-5.3.18-150200.24.129.1.x86_64",
        "relates_to_product_reference": "SUSE Enterprise Storage 7"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-preempt-5.3.18-150200.24.129.1.aarch64 as component of SUSE Enterprise Storage 7",
          "product_id": "SUSE Enterprise Storage 7:kernel-preempt-5.3.18-150200.24.129.1.aarch64"
        },
        "product_reference": "kernel-preempt-5.3.18-150200.24.129.1.aarch64",
        "relates_to_product_reference": "SUSE Enterprise Storage 7"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-preempt-5.3.18-150200.24.129.1.x86_64 as component of SUSE Enterprise Storage 7",
          "product_id": "SUSE Enterprise Storage 7:kernel-preempt-5.3.18-150200.24.129.1.x86_64"
        },
        "product_reference": "kernel-preempt-5.3.18-150200.24.129.1.x86_64",
        "relates_to_product_reference": "SUSE Enterprise Storage 7"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-preempt-devel-5.3.18-150200.24.129.1.aarch64 as component of SUSE Enterprise Storage 7",
          "product_id": "SUSE Enterprise Storage 7:kernel-preempt-devel-5.3.18-150200.24.129.1.aarch64"
        },
        "product_reference": "kernel-preempt-devel-5.3.18-150200.24.129.1.aarch64",
        "relates_to_product_reference": "SUSE Enterprise Storage 7"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-preempt-devel-5.3.18-150200.24.129.1.x86_64 as component of SUSE Enterprise Storage 7",
          "product_id": "SUSE Enterprise Storage 7:kernel-preempt-devel-5.3.18-150200.24.129.1.x86_64"
        },
        "product_reference": "kernel-preempt-devel-5.3.18-150200.24.129.1.x86_64",
        "relates_to_product_reference": "SUSE Enterprise Storage 7"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-source-5.3.18-150200.24.129.1.noarch as component of SUSE Enterprise Storage 7",
          "product_id": "SUSE Enterprise Storage 7:kernel-source-5.3.18-150200.24.129.1.noarch"
        },
        "product_reference": "kernel-source-5.3.18-150200.24.129.1.noarch",
        "relates_to_product_reference": "SUSE Enterprise Storage 7"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-syms-5.3.18-150200.24.129.1.aarch64 as component of SUSE Enterprise Storage 7",
          "product_id": "SUSE Enterprise Storage 7:kernel-syms-5.3.18-150200.24.129.1.aarch64"
        },
        "product_reference": "kernel-syms-5.3.18-150200.24.129.1.aarch64",
        "relates_to_product_reference": "SUSE Enterprise Storage 7"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-syms-5.3.18-150200.24.129.1.x86_64 as component of SUSE Enterprise Storage 7",
          "product_id": "SUSE Enterprise Storage 7:kernel-syms-5.3.18-150200.24.129.1.x86_64"
        },
        "product_reference": "kernel-syms-5.3.18-150200.24.129.1.x86_64",
        "relates_to_product_reference": "SUSE Enterprise Storage 7"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "reiserfs-kmp-default-5.3.18-150200.24.129.1.aarch64 as component of SUSE Enterprise Storage 7",
          "product_id": "SUSE Enterprise Storage 7:reiserfs-kmp-default-5.3.18-150200.24.129.1.aarch64"
        },
        "product_reference": "reiserfs-kmp-default-5.3.18-150200.24.129.1.aarch64",
        "relates_to_product_reference": "SUSE Enterprise Storage 7"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "reiserfs-kmp-default-5.3.18-150200.24.129.1.x86_64 as component of SUSE Enterprise Storage 7",
          "product_id": "SUSE Enterprise Storage 7:reiserfs-kmp-default-5.3.18-150200.24.129.1.x86_64"
        },
        "product_reference": "reiserfs-kmp-default-5.3.18-150200.24.129.1.x86_64",
        "relates_to_product_reference": "SUSE Enterprise Storage 7"
      }
    ]
  },
  "vulnerabilities": [
    {
      "cve": "CVE-2016-3695",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2016-3695"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "The einj_error_inject function in drivers/acpi/apei/einj.c in the Linux kernel allows local users to simulate hardware errors and consequently cause a denial of service by leveraging failure to disable APEI error injection through EINJ when securelevel is set.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "SUSE Enterprise Storage 7:kernel-default-5.3.18-150200.24.129.1.aarch64",
          "SUSE Enterprise Storage 7:kernel-default-5.3.18-150200.24.129.1.x86_64",
          "SUSE Enterprise Storage 7:kernel-default-base-5.3.18-150200.24.129.1.150200.9.61.1.aarch64",
          "SUSE Enterprise Storage 7:kernel-default-base-5.3.18-150200.24.129.1.150200.9.61.1.x86_64",
          "SUSE Enterprise Storage 7:kernel-default-devel-5.3.18-150200.24.129.1.aarch64",
          "SUSE Enterprise Storage 7:kernel-default-devel-5.3.18-150200.24.129.1.x86_64",
          "SUSE Enterprise Storage 7:kernel-devel-5.3.18-150200.24.129.1.noarch",
          "SUSE Enterprise Storage 7:kernel-docs-5.3.18-150200.24.129.1.noarch",
          "SUSE Enterprise Storage 7:kernel-macros-5.3.18-150200.24.129.1.noarch",
          "SUSE Enterprise Storage 7:kernel-obs-build-5.3.18-150200.24.129.1.aarch64",
          "SUSE Enterprise Storage 7:kernel-obs-build-5.3.18-150200.24.129.1.x86_64",
          "SUSE Enterprise Storage 7:kernel-preempt-5.3.18-150200.24.129.1.aarch64",
          "SUSE Enterprise Storage 7:kernel-preempt-5.3.18-150200.24.129.1.x86_64",
          "SUSE Enterprise Storage 7:kernel-preempt-devel-5.3.18-150200.24.129.1.aarch64",
          "SUSE Enterprise Storage 7:kernel-preempt-devel-5.3.18-150200.24.129.1.x86_64",
          "SUSE Enterprise Storage 7:kernel-source-5.3.18-150200.24.129.1.noarch",
          "SUSE Enterprise Storage 7:kernel-syms-5.3.18-150200.24.129.1.aarch64",
          "SUSE Enterprise Storage 7:kernel-syms-5.3.18-150200.24.129.1.x86_64",
          "SUSE Enterprise Storage 7:reiserfs-kmp-default-5.3.18-150200.24.129.1.aarch64",
          "SUSE Enterprise Storage 7:reiserfs-kmp-default-5.3.18-150200.24.129.1.x86_64",
          "SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-150200.24.129.1.aarch64",
          "SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-150200.24.129.1.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-150200.24.129.1.s390x",
          "SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-150200.24.129.1.x86_64",
          "SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-150200.24.129.1.aarch64",
          "SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-150200.24.129.1.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-150200.24.129.1.s390x",
          "SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-150200.24.129.1.x86_64",
          "SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-150200.24.129.1.aarch64",
          "SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-150200.24.129.1.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-150200.24.129.1.s390x",
          "SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-150200.24.129.1.x86_64",
          "SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-150200.24.129.1.aarch64",
          "SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-150200.24.129.1.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-150200.24.129.1.s390x",
          "SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-150200.24.129.1.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-default-5.3.18-150200.24.129.1.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-default-5.3.18-150200.24.129.1.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-default-base-5.3.18-150200.24.129.1.150200.9.61.1.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-default-base-5.3.18-150200.24.129.1.150200.9.61.1.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-default-devel-5.3.18-150200.24.129.1.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-default-devel-5.3.18-150200.24.129.1.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-devel-5.3.18-150200.24.129.1.noarch",
          "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-docs-5.3.18-150200.24.129.1.noarch",
          "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-macros-5.3.18-150200.24.129.1.noarch",
          "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-obs-build-5.3.18-150200.24.129.1.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-obs-build-5.3.18-150200.24.129.1.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-preempt-5.3.18-150200.24.129.1.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-preempt-5.3.18-150200.24.129.1.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-preempt-devel-5.3.18-150200.24.129.1.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-preempt-devel-5.3.18-150200.24.129.1.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-source-5.3.18-150200.24.129.1.noarch",
          "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-syms-5.3.18-150200.24.129.1.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-syms-5.3.18-150200.24.129.1.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-5.3.18-150200.24.129.1.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-5.3.18-150200.24.129.1.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.129.1.150200.9.61.1.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.129.1.150200.9.61.1.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.129.1.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.129.1.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-devel-5.3.18-150200.24.129.1.noarch",
          "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-docs-5.3.18-150200.24.129.1.noarch",
          "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-macros-5.3.18-150200.24.129.1.noarch",
          "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.129.1.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.129.1.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-preempt-5.3.18-150200.24.129.1.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-preempt-5.3.18-150200.24.129.1.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-preempt-devel-5.3.18-150200.24.129.1.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-preempt-devel-5.3.18-150200.24.129.1.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-source-5.3.18-150200.24.129.1.noarch",
          "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.129.1.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.129.1.x86_64",
          "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-5.3.18-150200.24.129.1.ppc64le",
          "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-5.3.18-150200.24.129.1.s390x",
          "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-5.3.18-150200.24.129.1.x86_64",
          "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-devel-5.3.18-150200.24.129.1.ppc64le",
          "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-devel-5.3.18-150200.24.129.1.s390x",
          "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-devel-5.3.18-150200.24.129.1.x86_64",
          "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-150200_24_129-default-1-150200.5.3.1.ppc64le",
          "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-150200_24_129-default-1-150200.5.3.1.s390x",
          "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-150200_24_129-default-1-150200.5.3.1.x86_64",
          "SUSE Linux Enterprise Server 15 SP2-BCL:kernel-default-5.3.18-150200.24.129.1.x86_64",
          "SUSE Linux Enterprise Server 15 SP2-BCL:kernel-default-base-5.3.18-150200.24.129.1.150200.9.61.1.x86_64",
          "SUSE Linux Enterprise Server 15 SP2-BCL:kernel-default-devel-5.3.18-150200.24.129.1.x86_64",
          "SUSE Linux Enterprise Server 15 SP2-BCL:kernel-devel-5.3.18-150200.24.129.1.noarch",
          "SUSE Linux Enterprise Server 15 SP2-BCL:kernel-docs-5.3.18-150200.24.129.1.noarch",
          "SUSE Linux Enterprise Server 15 SP2-BCL:kernel-macros-5.3.18-150200.24.129.1.noarch",
          "SUSE Linux Enterprise Server 15 SP2-BCL:kernel-obs-build-5.3.18-150200.24.129.1.x86_64",
          "SUSE Linux Enterprise Server 15 SP2-BCL:kernel-preempt-5.3.18-150200.24.129.1.x86_64",
          "SUSE Linux Enterprise Server 15 SP2-BCL:kernel-preempt-devel-5.3.18-150200.24.129.1.x86_64",
          "SUSE Linux Enterprise Server 15 SP2-BCL:kernel-source-5.3.18-150200.24.129.1.noarch",
          "SUSE Linux Enterprise Server 15 SP2-BCL:kernel-syms-5.3.18-150200.24.129.1.x86_64",
          "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-5.3.18-150200.24.129.1.aarch64",
          "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-5.3.18-150200.24.129.1.ppc64le",
          "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-5.3.18-150200.24.129.1.s390x",
          "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-5.3.18-150200.24.129.1.x86_64",
          "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.129.1.150200.9.61.1.aarch64",
          "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.129.1.150200.9.61.1.ppc64le",
          "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.129.1.150200.9.61.1.s390x",
          "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.129.1.150200.9.61.1.x86_64",
          "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.129.1.aarch64",
          "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.129.1.ppc64le",
          "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.129.1.s390x",
          "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.129.1.x86_64",
          "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-devel-5.3.18-150200.24.129.1.noarch",
          "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-docs-5.3.18-150200.24.129.1.noarch",
          "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-macros-5.3.18-150200.24.129.1.noarch",
          "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.129.1.aarch64",
          "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.129.1.ppc64le",
          "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.129.1.s390x",
          "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.129.1.x86_64",
          "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-preempt-5.3.18-150200.24.129.1.aarch64",
          "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-preempt-5.3.18-150200.24.129.1.x86_64",
          "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-preempt-devel-5.3.18-150200.24.129.1.aarch64",
          "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-preempt-devel-5.3.18-150200.24.129.1.x86_64",
          "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-source-5.3.18-150200.24.129.1.noarch",
          "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.129.1.aarch64",
          "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.129.1.ppc64le",
          "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.129.1.s390x",
          "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.129.1.x86_64",
          "SUSE Linux Enterprise Server 15 SP2-LTSS:reiserfs-kmp-default-5.3.18-150200.24.129.1.aarch64",
          "SUSE Linux Enterprise Server 15 SP2-LTSS:reiserfs-kmp-default-5.3.18-150200.24.129.1.ppc64le",
          "SUSE Linux Enterprise Server 15 SP2-LTSS:reiserfs-kmp-default-5.3.18-150200.24.129.1.s390x",
          "SUSE Linux Enterprise Server 15 SP2-LTSS:reiserfs-kmp-default-5.3.18-150200.24.129.1.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-5.3.18-150200.24.129.1.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-5.3.18-150200.24.129.1.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-base-5.3.18-150200.24.129.1.150200.9.61.1.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-base-5.3.18-150200.24.129.1.150200.9.61.1.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-devel-5.3.18-150200.24.129.1.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-devel-5.3.18-150200.24.129.1.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-devel-5.3.18-150200.24.129.1.noarch",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-docs-5.3.18-150200.24.129.1.noarch",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-macros-5.3.18-150200.24.129.1.noarch",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-obs-build-5.3.18-150200.24.129.1.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-obs-build-5.3.18-150200.24.129.1.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-preempt-5.3.18-150200.24.129.1.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-preempt-devel-5.3.18-150200.24.129.1.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-source-5.3.18-150200.24.129.1.noarch",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-syms-5.3.18-150200.24.129.1.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-syms-5.3.18-150200.24.129.1.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP2:reiserfs-kmp-default-5.3.18-150200.24.129.1.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP2:reiserfs-kmp-default-5.3.18-150200.24.129.1.x86_64",
          "SUSE Manager Proxy 4.1:kernel-default-5.3.18-150200.24.129.1.x86_64",
          "SUSE Manager Proxy 4.1:kernel-default-base-5.3.18-150200.24.129.1.150200.9.61.1.x86_64",
          "SUSE Manager Proxy 4.1:kernel-default-devel-5.3.18-150200.24.129.1.x86_64",
          "SUSE Manager Proxy 4.1:kernel-devel-5.3.18-150200.24.129.1.noarch",
          "SUSE Manager Proxy 4.1:kernel-docs-5.3.18-150200.24.129.1.noarch",
          "SUSE Manager Proxy 4.1:kernel-macros-5.3.18-150200.24.129.1.noarch",
          "SUSE Manager Proxy 4.1:kernel-obs-build-5.3.18-150200.24.129.1.x86_64",
          "SUSE Manager Proxy 4.1:kernel-preempt-5.3.18-150200.24.129.1.x86_64",
          "SUSE Manager Proxy 4.1:kernel-preempt-devel-5.3.18-150200.24.129.1.x86_64",
          "SUSE Manager Proxy 4.1:kernel-source-5.3.18-150200.24.129.1.noarch",
          "SUSE Manager Proxy 4.1:kernel-syms-5.3.18-150200.24.129.1.x86_64",
          "SUSE Manager Proxy 4.1:reiserfs-kmp-default-5.3.18-150200.24.129.1.x86_64",
          "SUSE Manager Retail Branch Server 4.1:kernel-default-5.3.18-150200.24.129.1.x86_64",
          "SUSE Manager Retail Branch Server 4.1:kernel-default-base-5.3.18-150200.24.129.1.150200.9.61.1.x86_64",
          "SUSE Manager Retail Branch Server 4.1:kernel-default-devel-5.3.18-150200.24.129.1.x86_64",
          "SUSE Manager Retail Branch Server 4.1:kernel-devel-5.3.18-150200.24.129.1.noarch",
          "SUSE Manager Retail Branch Server 4.1:kernel-docs-5.3.18-150200.24.129.1.noarch",
          "SUSE Manager Retail Branch Server 4.1:kernel-macros-5.3.18-150200.24.129.1.noarch",
          "SUSE Manager Retail Branch Server 4.1:kernel-obs-build-5.3.18-150200.24.129.1.x86_64",
          "SUSE Manager Retail Branch Server 4.1:kernel-preempt-5.3.18-150200.24.129.1.x86_64",
          "SUSE Manager Retail Branch Server 4.1:kernel-preempt-devel-5.3.18-150200.24.129.1.x86_64",
          "SUSE Manager Retail Branch Server 4.1:kernel-source-5.3.18-150200.24.129.1.noarch",
          "SUSE Manager Retail Branch Server 4.1:kernel-syms-5.3.18-150200.24.129.1.x86_64",
          "SUSE Manager Retail Branch Server 4.1:reiserfs-kmp-default-5.3.18-150200.24.129.1.x86_64",
          "SUSE Manager Server 4.1:kernel-default-5.3.18-150200.24.129.1.ppc64le",
          "SUSE Manager Server 4.1:kernel-default-5.3.18-150200.24.129.1.s390x",
          "SUSE Manager Server 4.1:kernel-default-5.3.18-150200.24.129.1.x86_64",
          "SUSE Manager Server 4.1:kernel-default-base-5.3.18-150200.24.129.1.150200.9.61.1.ppc64le",
          "SUSE Manager Server 4.1:kernel-default-base-5.3.18-150200.24.129.1.150200.9.61.1.s390x",
          "SUSE Manager Server 4.1:kernel-default-base-5.3.18-150200.24.129.1.150200.9.61.1.x86_64",
          "SUSE Manager Server 4.1:kernel-default-devel-5.3.18-150200.24.129.1.ppc64le",
          "SUSE Manager Server 4.1:kernel-default-devel-5.3.18-150200.24.129.1.s390x",
          "SUSE Manager Server 4.1:kernel-default-devel-5.3.18-150200.24.129.1.x86_64",
          "SUSE Manager Server 4.1:kernel-devel-5.3.18-150200.24.129.1.noarch",
          "SUSE Manager Server 4.1:kernel-docs-5.3.18-150200.24.129.1.noarch",
          "SUSE Manager Server 4.1:kernel-macros-5.3.18-150200.24.129.1.noarch",
          "SUSE Manager Server 4.1:kernel-obs-build-5.3.18-150200.24.129.1.ppc64le",
          "SUSE Manager Server 4.1:kernel-obs-build-5.3.18-150200.24.129.1.s390x",
          "SUSE Manager Server 4.1:kernel-obs-build-5.3.18-150200.24.129.1.x86_64",
          "SUSE Manager Server 4.1:kernel-preempt-5.3.18-150200.24.129.1.x86_64",
          "SUSE Manager Server 4.1:kernel-preempt-devel-5.3.18-150200.24.129.1.x86_64",
          "SUSE Manager Server 4.1:kernel-source-5.3.18-150200.24.129.1.noarch",
          "SUSE Manager Server 4.1:kernel-syms-5.3.18-150200.24.129.1.ppc64le",
          "SUSE Manager Server 4.1:kernel-syms-5.3.18-150200.24.129.1.s390x",
          "SUSE Manager Server 4.1:kernel-syms-5.3.18-150200.24.129.1.x86_64",
          "SUSE Manager Server 4.1:reiserfs-kmp-default-5.3.18-150200.24.129.1.ppc64le",
          "SUSE Manager Server 4.1:reiserfs-kmp-default-5.3.18-150200.24.129.1.s390x",
          "SUSE Manager Server 4.1:reiserfs-kmp-default-5.3.18-150200.24.129.1.x86_64"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2016-3695",
          "url": "https://www.suse.com/security/cve/CVE-2016-3695"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1023051 for CVE-2016-3695",
          "url": "https://bugzilla.suse.com/1023051"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "SUSE Enterprise Storage 7:kernel-default-5.3.18-150200.24.129.1.aarch64",
            "SUSE Enterprise Storage 7:kernel-default-5.3.18-150200.24.129.1.x86_64",
            "SUSE Enterprise Storage 7:kernel-default-base-5.3.18-150200.24.129.1.150200.9.61.1.aarch64",
            "SUSE Enterprise Storage 7:kernel-default-base-5.3.18-150200.24.129.1.150200.9.61.1.x86_64",
            "SUSE Enterprise Storage 7:kernel-default-devel-5.3.18-150200.24.129.1.aarch64",
            "SUSE Enterprise Storage 7:kernel-default-devel-5.3.18-150200.24.129.1.x86_64",
            "SUSE Enterprise Storage 7:kernel-devel-5.3.18-150200.24.129.1.noarch",
            "SUSE Enterprise Storage 7:kernel-docs-5.3.18-150200.24.129.1.noarch",
            "SUSE Enterprise Storage 7:kernel-macros-5.3.18-150200.24.129.1.noarch",
            "SUSE Enterprise Storage 7:kernel-obs-build-5.3.18-150200.24.129.1.aarch64",
            "SUSE Enterprise Storage 7:kernel-obs-build-5.3.18-150200.24.129.1.x86_64",
            "SUSE Enterprise Storage 7:kernel-preempt-5.3.18-150200.24.129.1.aarch64",
            "SUSE Enterprise Storage 7:kernel-preempt-5.3.18-150200.24.129.1.x86_64",
            "SUSE Enterprise Storage 7:kernel-preempt-devel-5.3.18-150200.24.129.1.aarch64",
            "SUSE Enterprise Storage 7:kernel-preempt-devel-5.3.18-150200.24.129.1.x86_64",
            "SUSE Enterprise Storage 7:kernel-source-5.3.18-150200.24.129.1.noarch",
            "SUSE Enterprise Storage 7:kernel-syms-5.3.18-150200.24.129.1.aarch64",
            "SUSE Enterprise Storage 7:kernel-syms-5.3.18-150200.24.129.1.x86_64",
            "SUSE Enterprise Storage 7:reiserfs-kmp-default-5.3.18-150200.24.129.1.aarch64",
            "SUSE Enterprise Storage 7:reiserfs-kmp-default-5.3.18-150200.24.129.1.x86_64",
            "SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-150200.24.129.1.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-150200.24.129.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-150200.24.129.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-150200.24.129.1.x86_64",
            "SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-150200.24.129.1.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-150200.24.129.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-150200.24.129.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-150200.24.129.1.x86_64",
            "SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-150200.24.129.1.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-150200.24.129.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-150200.24.129.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-150200.24.129.1.x86_64",
            "SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-150200.24.129.1.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-150200.24.129.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-150200.24.129.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-150200.24.129.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-default-5.3.18-150200.24.129.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-default-5.3.18-150200.24.129.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-default-base-5.3.18-150200.24.129.1.150200.9.61.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-default-base-5.3.18-150200.24.129.1.150200.9.61.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-default-devel-5.3.18-150200.24.129.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-default-devel-5.3.18-150200.24.129.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-devel-5.3.18-150200.24.129.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-docs-5.3.18-150200.24.129.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-macros-5.3.18-150200.24.129.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-obs-build-5.3.18-150200.24.129.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-obs-build-5.3.18-150200.24.129.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-preempt-5.3.18-150200.24.129.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-preempt-5.3.18-150200.24.129.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-preempt-devel-5.3.18-150200.24.129.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-preempt-devel-5.3.18-150200.24.129.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-source-5.3.18-150200.24.129.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-syms-5.3.18-150200.24.129.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-syms-5.3.18-150200.24.129.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-5.3.18-150200.24.129.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-5.3.18-150200.24.129.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.129.1.150200.9.61.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.129.1.150200.9.61.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.129.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.129.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-devel-5.3.18-150200.24.129.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-docs-5.3.18-150200.24.129.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-macros-5.3.18-150200.24.129.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.129.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.129.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-preempt-5.3.18-150200.24.129.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-preempt-5.3.18-150200.24.129.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-preempt-devel-5.3.18-150200.24.129.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-preempt-devel-5.3.18-150200.24.129.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-source-5.3.18-150200.24.129.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.129.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.129.1.x86_64",
            "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-5.3.18-150200.24.129.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-5.3.18-150200.24.129.1.s390x",
            "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-5.3.18-150200.24.129.1.x86_64",
            "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-devel-5.3.18-150200.24.129.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-devel-5.3.18-150200.24.129.1.s390x",
            "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-devel-5.3.18-150200.24.129.1.x86_64",
            "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-150200_24_129-default-1-150200.5.3.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-150200_24_129-default-1-150200.5.3.1.s390x",
            "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-150200_24_129-default-1-150200.5.3.1.x86_64",
            "SUSE Linux Enterprise Server 15 SP2-BCL:kernel-default-5.3.18-150200.24.129.1.x86_64",
            "SUSE Linux Enterprise Server 15 SP2-BCL:kernel-default-base-5.3.18-150200.24.129.1.150200.9.61.1.x86_64",
            "SUSE Linux Enterprise Server 15 SP2-BCL:kernel-default-devel-5.3.18-150200.24.129.1.x86_64",
            "SUSE Linux Enterprise Server 15 SP2-BCL:kernel-devel-5.3.18-150200.24.129.1.noarch",
            "SUSE Linux Enterprise Server 15 SP2-BCL:kernel-docs-5.3.18-150200.24.129.1.noarch",
            "SUSE Linux Enterprise Server 15 SP2-BCL:kernel-macros-5.3.18-150200.24.129.1.noarch",
            "SUSE Linux Enterprise Server 15 SP2-BCL:kernel-obs-build-5.3.18-150200.24.129.1.x86_64",
            "SUSE Linux Enterprise Server 15 SP2-BCL:kernel-preempt-5.3.18-150200.24.129.1.x86_64",
            "SUSE Linux Enterprise Server 15 SP2-BCL:kernel-preempt-devel-5.3.18-150200.24.129.1.x86_64",
            "SUSE Linux Enterprise Server 15 SP2-BCL:kernel-source-5.3.18-150200.24.129.1.noarch",
            "SUSE Linux Enterprise Server 15 SP2-BCL:kernel-syms-5.3.18-150200.24.129.1.x86_64",
            "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-5.3.18-150200.24.129.1.aarch64",
            "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-5.3.18-150200.24.129.1.ppc64le",
            "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-5.3.18-150200.24.129.1.s390x",
            "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-5.3.18-150200.24.129.1.x86_64",
            "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.129.1.150200.9.61.1.aarch64",
            "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.129.1.150200.9.61.1.ppc64le",
            "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.129.1.150200.9.61.1.s390x",
            "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.129.1.150200.9.61.1.x86_64",
            "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.129.1.aarch64",
            "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.129.1.ppc64le",
            "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.129.1.s390x",
            "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.129.1.x86_64",
            "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-devel-5.3.18-150200.24.129.1.noarch",
            "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-docs-5.3.18-150200.24.129.1.noarch",
            "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-macros-5.3.18-150200.24.129.1.noarch",
            "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.129.1.aarch64",
            "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.129.1.ppc64le",
            "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.129.1.s390x",
            "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.129.1.x86_64",
            "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-preempt-5.3.18-150200.24.129.1.aarch64",
            "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-preempt-5.3.18-150200.24.129.1.x86_64",
            "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-preempt-devel-5.3.18-150200.24.129.1.aarch64",
            "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-preempt-devel-5.3.18-150200.24.129.1.x86_64",
            "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-source-5.3.18-150200.24.129.1.noarch",
            "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.129.1.aarch64",
            "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.129.1.ppc64le",
            "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.129.1.s390x",
            "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.129.1.x86_64",
            "SUSE Linux Enterprise Server 15 SP2-LTSS:reiserfs-kmp-default-5.3.18-150200.24.129.1.aarch64",
            "SUSE Linux Enterprise Server 15 SP2-LTSS:reiserfs-kmp-default-5.3.18-150200.24.129.1.ppc64le",
            "SUSE Linux Enterprise Server 15 SP2-LTSS:reiserfs-kmp-default-5.3.18-150200.24.129.1.s390x",
            "SUSE Linux Enterprise Server 15 SP2-LTSS:reiserfs-kmp-default-5.3.18-150200.24.129.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-5.3.18-150200.24.129.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-5.3.18-150200.24.129.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-base-5.3.18-150200.24.129.1.150200.9.61.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-base-5.3.18-150200.24.129.1.150200.9.61.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-devel-5.3.18-150200.24.129.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-devel-5.3.18-150200.24.129.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-devel-5.3.18-150200.24.129.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-docs-5.3.18-150200.24.129.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-macros-5.3.18-150200.24.129.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-obs-build-5.3.18-150200.24.129.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-obs-build-5.3.18-150200.24.129.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-preempt-5.3.18-150200.24.129.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-preempt-devel-5.3.18-150200.24.129.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-source-5.3.18-150200.24.129.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-syms-5.3.18-150200.24.129.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-syms-5.3.18-150200.24.129.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP2:reiserfs-kmp-default-5.3.18-150200.24.129.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP2:reiserfs-kmp-default-5.3.18-150200.24.129.1.x86_64",
            "SUSE Manager Proxy 4.1:kernel-default-5.3.18-150200.24.129.1.x86_64",
            "SUSE Manager Proxy 4.1:kernel-default-base-5.3.18-150200.24.129.1.150200.9.61.1.x86_64",
            "SUSE Manager Proxy 4.1:kernel-default-devel-5.3.18-150200.24.129.1.x86_64",
            "SUSE Manager Proxy 4.1:kernel-devel-5.3.18-150200.24.129.1.noarch",
            "SUSE Manager Proxy 4.1:kernel-docs-5.3.18-150200.24.129.1.noarch",
            "SUSE Manager Proxy 4.1:kernel-macros-5.3.18-150200.24.129.1.noarch",
            "SUSE Manager Proxy 4.1:kernel-obs-build-5.3.18-150200.24.129.1.x86_64",
            "SUSE Manager Proxy 4.1:kernel-preempt-5.3.18-150200.24.129.1.x86_64",
            "SUSE Manager Proxy 4.1:kernel-preempt-devel-5.3.18-150200.24.129.1.x86_64",
            "SUSE Manager Proxy 4.1:kernel-source-5.3.18-150200.24.129.1.noarch",
            "SUSE Manager Proxy 4.1:kernel-syms-5.3.18-150200.24.129.1.x86_64",
            "SUSE Manager Proxy 4.1:reiserfs-kmp-default-5.3.18-150200.24.129.1.x86_64",
            "SUSE Manager Retail Branch Server 4.1:kernel-default-5.3.18-150200.24.129.1.x86_64",
            "SUSE Manager Retail Branch Server 4.1:kernel-default-base-5.3.18-150200.24.129.1.150200.9.61.1.x86_64",
            "SUSE Manager Retail Branch Server 4.1:kernel-default-devel-5.3.18-150200.24.129.1.x86_64",
            "SUSE Manager Retail Branch Server 4.1:kernel-devel-5.3.18-150200.24.129.1.noarch",
            "SUSE Manager Retail Branch Server 4.1:kernel-docs-5.3.18-150200.24.129.1.noarch",
            "SUSE Manager Retail Branch Server 4.1:kernel-macros-5.3.18-150200.24.129.1.noarch",
            "SUSE Manager Retail Branch Server 4.1:kernel-obs-build-5.3.18-150200.24.129.1.x86_64",
            "SUSE Manager Retail Branch Server 4.1:kernel-preempt-5.3.18-150200.24.129.1.x86_64",
            "SUSE Manager Retail Branch Server 4.1:kernel-preempt-devel-5.3.18-150200.24.129.1.x86_64",
            "SUSE Manager Retail Branch Server 4.1:kernel-source-5.3.18-150200.24.129.1.noarch",
            "SUSE Manager Retail Branch Server 4.1:kernel-syms-5.3.18-150200.24.129.1.x86_64",
            "SUSE Manager Retail Branch Server 4.1:reiserfs-kmp-default-5.3.18-150200.24.129.1.x86_64",
            "SUSE Manager Server 4.1:kernel-default-5.3.18-150200.24.129.1.ppc64le",
            "SUSE Manager Server 4.1:kernel-default-5.3.18-150200.24.129.1.s390x",
            "SUSE Manager Server 4.1:kernel-default-5.3.18-150200.24.129.1.x86_64",
            "SUSE Manager Server 4.1:kernel-default-base-5.3.18-150200.24.129.1.150200.9.61.1.ppc64le",
            "SUSE Manager Server 4.1:kernel-default-base-5.3.18-150200.24.129.1.150200.9.61.1.s390x",
            "SUSE Manager Server 4.1:kernel-default-base-5.3.18-150200.24.129.1.150200.9.61.1.x86_64",
            "SUSE Manager Server 4.1:kernel-default-devel-5.3.18-150200.24.129.1.ppc64le",
            "SUSE Manager Server 4.1:kernel-default-devel-5.3.18-150200.24.129.1.s390x",
            "SUSE Manager Server 4.1:kernel-default-devel-5.3.18-150200.24.129.1.x86_64",
            "SUSE Manager Server 4.1:kernel-devel-5.3.18-150200.24.129.1.noarch",
            "SUSE Manager Server 4.1:kernel-docs-5.3.18-150200.24.129.1.noarch",
            "SUSE Manager Server 4.1:kernel-macros-5.3.18-150200.24.129.1.noarch",
            "SUSE Manager Server 4.1:kernel-obs-build-5.3.18-150200.24.129.1.ppc64le",
            "SUSE Manager Server 4.1:kernel-obs-build-5.3.18-150200.24.129.1.s390x",
            "SUSE Manager Server 4.1:kernel-obs-build-5.3.18-150200.24.129.1.x86_64",
            "SUSE Manager Server 4.1:kernel-preempt-5.3.18-150200.24.129.1.x86_64",
            "SUSE Manager Server 4.1:kernel-preempt-devel-5.3.18-150200.24.129.1.x86_64",
            "SUSE Manager Server 4.1:kernel-source-5.3.18-150200.24.129.1.noarch",
            "SUSE Manager Server 4.1:kernel-syms-5.3.18-150200.24.129.1.ppc64le",
            "SUSE Manager Server 4.1:kernel-syms-5.3.18-150200.24.129.1.s390x",
            "SUSE Manager Server 4.1:kernel-syms-5.3.18-150200.24.129.1.x86_64",
            "SUSE Manager Server 4.1:reiserfs-kmp-default-5.3.18-150200.24.129.1.ppc64le",
            "SUSE Manager Server 4.1:reiserfs-kmp-default-5.3.18-150200.24.129.1.s390x",
            "SUSE Manager Server 4.1:reiserfs-kmp-default-5.3.18-150200.24.129.1.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 2.2,
            "baseSeverity": "LOW",
            "vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:R/S:U/C:N/I:N/A:L",
            "version": "3.1"
          },
          "products": [
            "SUSE Enterprise Storage 7:kernel-default-5.3.18-150200.24.129.1.aarch64",
            "SUSE Enterprise Storage 7:kernel-default-5.3.18-150200.24.129.1.x86_64",
            "SUSE Enterprise Storage 7:kernel-default-base-5.3.18-150200.24.129.1.150200.9.61.1.aarch64",
            "SUSE Enterprise Storage 7:kernel-default-base-5.3.18-150200.24.129.1.150200.9.61.1.x86_64",
            "SUSE Enterprise Storage 7:kernel-default-devel-5.3.18-150200.24.129.1.aarch64",
            "SUSE Enterprise Storage 7:kernel-default-devel-5.3.18-150200.24.129.1.x86_64",
            "SUSE Enterprise Storage 7:kernel-devel-5.3.18-150200.24.129.1.noarch",
            "SUSE Enterprise Storage 7:kernel-docs-5.3.18-150200.24.129.1.noarch",
            "SUSE Enterprise Storage 7:kernel-macros-5.3.18-150200.24.129.1.noarch",
            "SUSE Enterprise Storage 7:kernel-obs-build-5.3.18-150200.24.129.1.aarch64",
            "SUSE Enterprise Storage 7:kernel-obs-build-5.3.18-150200.24.129.1.x86_64",
            "SUSE Enterprise Storage 7:kernel-preempt-5.3.18-150200.24.129.1.aarch64",
            "SUSE Enterprise Storage 7:kernel-preempt-5.3.18-150200.24.129.1.x86_64",
            "SUSE Enterprise Storage 7:kernel-preempt-devel-5.3.18-150200.24.129.1.aarch64",
            "SUSE Enterprise Storage 7:kernel-preempt-devel-5.3.18-150200.24.129.1.x86_64",
            "SUSE Enterprise Storage 7:kernel-source-5.3.18-150200.24.129.1.noarch",
            "SUSE Enterprise Storage 7:kernel-syms-5.3.18-150200.24.129.1.aarch64",
            "SUSE Enterprise Storage 7:kernel-syms-5.3.18-150200.24.129.1.x86_64",
            "SUSE Enterprise Storage 7:reiserfs-kmp-default-5.3.18-150200.24.129.1.aarch64",
            "SUSE Enterprise Storage 7:reiserfs-kmp-default-5.3.18-150200.24.129.1.x86_64",
            "SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-150200.24.129.1.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-150200.24.129.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-150200.24.129.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-150200.24.129.1.x86_64",
            "SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-150200.24.129.1.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-150200.24.129.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-150200.24.129.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-150200.24.129.1.x86_64",
            "SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-150200.24.129.1.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-150200.24.129.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-150200.24.129.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-150200.24.129.1.x86_64",
            "SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-150200.24.129.1.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-150200.24.129.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-150200.24.129.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-150200.24.129.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-default-5.3.18-150200.24.129.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-default-5.3.18-150200.24.129.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-default-base-5.3.18-150200.24.129.1.150200.9.61.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-default-base-5.3.18-150200.24.129.1.150200.9.61.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-default-devel-5.3.18-150200.24.129.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-default-devel-5.3.18-150200.24.129.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-devel-5.3.18-150200.24.129.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-docs-5.3.18-150200.24.129.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-macros-5.3.18-150200.24.129.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-obs-build-5.3.18-150200.24.129.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-obs-build-5.3.18-150200.24.129.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-preempt-5.3.18-150200.24.129.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-preempt-5.3.18-150200.24.129.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-preempt-devel-5.3.18-150200.24.129.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-preempt-devel-5.3.18-150200.24.129.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-source-5.3.18-150200.24.129.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-syms-5.3.18-150200.24.129.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-syms-5.3.18-150200.24.129.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-5.3.18-150200.24.129.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-5.3.18-150200.24.129.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.129.1.150200.9.61.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.129.1.150200.9.61.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.129.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.129.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-devel-5.3.18-150200.24.129.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-docs-5.3.18-150200.24.129.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-macros-5.3.18-150200.24.129.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.129.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.129.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-preempt-5.3.18-150200.24.129.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-preempt-5.3.18-150200.24.129.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-preempt-devel-5.3.18-150200.24.129.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-preempt-devel-5.3.18-150200.24.129.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-source-5.3.18-150200.24.129.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.129.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.129.1.x86_64",
            "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-5.3.18-150200.24.129.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-5.3.18-150200.24.129.1.s390x",
            "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-5.3.18-150200.24.129.1.x86_64",
            "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-devel-5.3.18-150200.24.129.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-devel-5.3.18-150200.24.129.1.s390x",
            "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-devel-5.3.18-150200.24.129.1.x86_64",
            "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-150200_24_129-default-1-150200.5.3.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-150200_24_129-default-1-150200.5.3.1.s390x",
            "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-150200_24_129-default-1-150200.5.3.1.x86_64",
            "SUSE Linux Enterprise Server 15 SP2-BCL:kernel-default-5.3.18-150200.24.129.1.x86_64",
            "SUSE Linux Enterprise Server 15 SP2-BCL:kernel-default-base-5.3.18-150200.24.129.1.150200.9.61.1.x86_64",
            "SUSE Linux Enterprise Server 15 SP2-BCL:kernel-default-devel-5.3.18-150200.24.129.1.x86_64",
            "SUSE Linux Enterprise Server 15 SP2-BCL:kernel-devel-5.3.18-150200.24.129.1.noarch",
            "SUSE Linux Enterprise Server 15 SP2-BCL:kernel-docs-5.3.18-150200.24.129.1.noarch",
            "SUSE Linux Enterprise Server 15 SP2-BCL:kernel-macros-5.3.18-150200.24.129.1.noarch",
            "SUSE Linux Enterprise Server 15 SP2-BCL:kernel-obs-build-5.3.18-150200.24.129.1.x86_64",
            "SUSE Linux Enterprise Server 15 SP2-BCL:kernel-preempt-5.3.18-150200.24.129.1.x86_64",
            "SUSE Linux Enterprise Server 15 SP2-BCL:kernel-preempt-devel-5.3.18-150200.24.129.1.x86_64",
            "SUSE Linux Enterprise Server 15 SP2-BCL:kernel-source-5.3.18-150200.24.129.1.noarch",
            "SUSE Linux Enterprise Server 15 SP2-BCL:kernel-syms-5.3.18-150200.24.129.1.x86_64",
            "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-5.3.18-150200.24.129.1.aarch64",
            "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-5.3.18-150200.24.129.1.ppc64le",
            "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-5.3.18-150200.24.129.1.s390x",
            "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-5.3.18-150200.24.129.1.x86_64",
            "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.129.1.150200.9.61.1.aarch64",
            "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.129.1.150200.9.61.1.ppc64le",
            "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.129.1.150200.9.61.1.s390x",
            "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.129.1.150200.9.61.1.x86_64",
            "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.129.1.aarch64",
            "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.129.1.ppc64le",
            "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.129.1.s390x",
            "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.129.1.x86_64",
            "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-devel-5.3.18-150200.24.129.1.noarch",
            "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-docs-5.3.18-150200.24.129.1.noarch",
            "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-macros-5.3.18-150200.24.129.1.noarch",
            "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.129.1.aarch64",
            "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.129.1.ppc64le",
            "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.129.1.s390x",
            "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.129.1.x86_64",
            "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-preempt-5.3.18-150200.24.129.1.aarch64",
            "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-preempt-5.3.18-150200.24.129.1.x86_64",
            "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-preempt-devel-5.3.18-150200.24.129.1.aarch64",
            "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-preempt-devel-5.3.18-150200.24.129.1.x86_64",
            "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-source-5.3.18-150200.24.129.1.noarch",
            "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.129.1.aarch64",
            "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.129.1.ppc64le",
            "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.129.1.s390x",
            "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.129.1.x86_64",
            "SUSE Linux Enterprise Server 15 SP2-LTSS:reiserfs-kmp-default-5.3.18-150200.24.129.1.aarch64",
            "SUSE Linux Enterprise Server 15 SP2-LTSS:reiserfs-kmp-default-5.3.18-150200.24.129.1.ppc64le",
            "SUSE Linux Enterprise Server 15 SP2-LTSS:reiserfs-kmp-default-5.3.18-150200.24.129.1.s390x",
            "SUSE Linux Enterprise Server 15 SP2-LTSS:reiserfs-kmp-default-5.3.18-150200.24.129.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-5.3.18-150200.24.129.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-5.3.18-150200.24.129.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-base-5.3.18-150200.24.129.1.150200.9.61.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-base-5.3.18-150200.24.129.1.150200.9.61.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-devel-5.3.18-150200.24.129.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-devel-5.3.18-150200.24.129.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-devel-5.3.18-150200.24.129.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-docs-5.3.18-150200.24.129.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-macros-5.3.18-150200.24.129.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-obs-build-5.3.18-150200.24.129.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-obs-build-5.3.18-150200.24.129.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-preempt-5.3.18-150200.24.129.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-preempt-devel-5.3.18-150200.24.129.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-source-5.3.18-150200.24.129.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-syms-5.3.18-150200.24.129.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-syms-5.3.18-150200.24.129.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP2:reiserfs-kmp-default-5.3.18-150200.24.129.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP2:reiserfs-kmp-default-5.3.18-150200.24.129.1.x86_64",
            "SUSE Manager Proxy 4.1:kernel-default-5.3.18-150200.24.129.1.x86_64",
            "SUSE Manager Proxy 4.1:kernel-default-base-5.3.18-150200.24.129.1.150200.9.61.1.x86_64",
            "SUSE Manager Proxy 4.1:kernel-default-devel-5.3.18-150200.24.129.1.x86_64",
            "SUSE Manager Proxy 4.1:kernel-devel-5.3.18-150200.24.129.1.noarch",
            "SUSE Manager Proxy 4.1:kernel-docs-5.3.18-150200.24.129.1.noarch",
            "SUSE Manager Proxy 4.1:kernel-macros-5.3.18-150200.24.129.1.noarch",
            "SUSE Manager Proxy 4.1:kernel-obs-build-5.3.18-150200.24.129.1.x86_64",
            "SUSE Manager Proxy 4.1:kernel-preempt-5.3.18-150200.24.129.1.x86_64",
            "SUSE Manager Proxy 4.1:kernel-preempt-devel-5.3.18-150200.24.129.1.x86_64",
            "SUSE Manager Proxy 4.1:kernel-source-5.3.18-150200.24.129.1.noarch",
            "SUSE Manager Proxy 4.1:kernel-syms-5.3.18-150200.24.129.1.x86_64",
            "SUSE Manager Proxy 4.1:reiserfs-kmp-default-5.3.18-150200.24.129.1.x86_64",
            "SUSE Manager Retail Branch Server 4.1:kernel-default-5.3.18-150200.24.129.1.x86_64",
            "SUSE Manager Retail Branch Server 4.1:kernel-default-base-5.3.18-150200.24.129.1.150200.9.61.1.x86_64",
            "SUSE Manager Retail Branch Server 4.1:kernel-default-devel-5.3.18-150200.24.129.1.x86_64",
            "SUSE Manager Retail Branch Server 4.1:kernel-devel-5.3.18-150200.24.129.1.noarch",
            "SUSE Manager Retail Branch Server 4.1:kernel-docs-5.3.18-150200.24.129.1.noarch",
            "SUSE Manager Retail Branch Server 4.1:kernel-macros-5.3.18-150200.24.129.1.noarch",
            "SUSE Manager Retail Branch Server 4.1:kernel-obs-build-5.3.18-150200.24.129.1.x86_64",
            "SUSE Manager Retail Branch Server 4.1:kernel-preempt-5.3.18-150200.24.129.1.x86_64",
            "SUSE Manager Retail Branch Server 4.1:kernel-preempt-devel-5.3.18-150200.24.129.1.x86_64",
            "SUSE Manager Retail Branch Server 4.1:kernel-source-5.3.18-150200.24.129.1.noarch",
            "SUSE Manager Retail Branch Server 4.1:kernel-syms-5.3.18-150200.24.129.1.x86_64",
            "SUSE Manager Retail Branch Server 4.1:reiserfs-kmp-default-5.3.18-150200.24.129.1.x86_64",
            "SUSE Manager Server 4.1:kernel-default-5.3.18-150200.24.129.1.ppc64le",
            "SUSE Manager Server 4.1:kernel-default-5.3.18-150200.24.129.1.s390x",
            "SUSE Manager Server 4.1:kernel-default-5.3.18-150200.24.129.1.x86_64",
            "SUSE Manager Server 4.1:kernel-default-base-5.3.18-150200.24.129.1.150200.9.61.1.ppc64le",
            "SUSE Manager Server 4.1:kernel-default-base-5.3.18-150200.24.129.1.150200.9.61.1.s390x",
            "SUSE Manager Server 4.1:kernel-default-base-5.3.18-150200.24.129.1.150200.9.61.1.x86_64",
            "SUSE Manager Server 4.1:kernel-default-devel-5.3.18-150200.24.129.1.ppc64le",
            "SUSE Manager Server 4.1:kernel-default-devel-5.3.18-150200.24.129.1.s390x",
            "SUSE Manager Server 4.1:kernel-default-devel-5.3.18-150200.24.129.1.x86_64",
            "SUSE Manager Server 4.1:kernel-devel-5.3.18-150200.24.129.1.noarch",
            "SUSE Manager Server 4.1:kernel-docs-5.3.18-150200.24.129.1.noarch",
            "SUSE Manager Server 4.1:kernel-macros-5.3.18-150200.24.129.1.noarch",
            "SUSE Manager Server 4.1:kernel-obs-build-5.3.18-150200.24.129.1.ppc64le",
            "SUSE Manager Server 4.1:kernel-obs-build-5.3.18-150200.24.129.1.s390x",
            "SUSE Manager Server 4.1:kernel-obs-build-5.3.18-150200.24.129.1.x86_64",
            "SUSE Manager Server 4.1:kernel-preempt-5.3.18-150200.24.129.1.x86_64",
            "SUSE Manager Server 4.1:kernel-preempt-devel-5.3.18-150200.24.129.1.x86_64",
            "SUSE Manager Server 4.1:kernel-source-5.3.18-150200.24.129.1.noarch",
            "SUSE Manager Server 4.1:kernel-syms-5.3.18-150200.24.129.1.ppc64le",
            "SUSE Manager Server 4.1:kernel-syms-5.3.18-150200.24.129.1.s390x",
            "SUSE Manager Server 4.1:kernel-syms-5.3.18-150200.24.129.1.x86_64",
            "SUSE Manager Server 4.1:reiserfs-kmp-default-5.3.18-150200.24.129.1.ppc64le",
            "SUSE Manager Server 4.1:reiserfs-kmp-default-5.3.18-150200.24.129.1.s390x",
            "SUSE Manager Server 4.1:reiserfs-kmp-default-5.3.18-150200.24.129.1.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2022-09-28T06:48:59Z",
          "details": "low"
        }
      ],
      "title": "CVE-2016-3695"
    },
    {
      "cve": "CVE-2020-27784",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2020-27784"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "A vulnerability was found in the Linux kernel, where accessing a deallocated instance in printer_ioctl() printer_ioctl() tries to access of a printer_dev instance. However, use-after-free arises because it had been freed by gprinter_free().",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "SUSE Enterprise Storage 7:kernel-default-5.3.18-150200.24.129.1.aarch64",
          "SUSE Enterprise Storage 7:kernel-default-5.3.18-150200.24.129.1.x86_64",
          "SUSE Enterprise Storage 7:kernel-default-base-5.3.18-150200.24.129.1.150200.9.61.1.aarch64",
          "SUSE Enterprise Storage 7:kernel-default-base-5.3.18-150200.24.129.1.150200.9.61.1.x86_64",
          "SUSE Enterprise Storage 7:kernel-default-devel-5.3.18-150200.24.129.1.aarch64",
          "SUSE Enterprise Storage 7:kernel-default-devel-5.3.18-150200.24.129.1.x86_64",
          "SUSE Enterprise Storage 7:kernel-devel-5.3.18-150200.24.129.1.noarch",
          "SUSE Enterprise Storage 7:kernel-docs-5.3.18-150200.24.129.1.noarch",
          "SUSE Enterprise Storage 7:kernel-macros-5.3.18-150200.24.129.1.noarch",
          "SUSE Enterprise Storage 7:kernel-obs-build-5.3.18-150200.24.129.1.aarch64",
          "SUSE Enterprise Storage 7:kernel-obs-build-5.3.18-150200.24.129.1.x86_64",
          "SUSE Enterprise Storage 7:kernel-preempt-5.3.18-150200.24.129.1.aarch64",
          "SUSE Enterprise Storage 7:kernel-preempt-5.3.18-150200.24.129.1.x86_64",
          "SUSE Enterprise Storage 7:kernel-preempt-devel-5.3.18-150200.24.129.1.aarch64",
          "SUSE Enterprise Storage 7:kernel-preempt-devel-5.3.18-150200.24.129.1.x86_64",
          "SUSE Enterprise Storage 7:kernel-source-5.3.18-150200.24.129.1.noarch",
          "SUSE Enterprise Storage 7:kernel-syms-5.3.18-150200.24.129.1.aarch64",
          "SUSE Enterprise Storage 7:kernel-syms-5.3.18-150200.24.129.1.x86_64",
          "SUSE Enterprise Storage 7:reiserfs-kmp-default-5.3.18-150200.24.129.1.aarch64",
          "SUSE Enterprise Storage 7:reiserfs-kmp-default-5.3.18-150200.24.129.1.x86_64",
          "SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-150200.24.129.1.aarch64",
          "SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-150200.24.129.1.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-150200.24.129.1.s390x",
          "SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-150200.24.129.1.x86_64",
          "SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-150200.24.129.1.aarch64",
          "SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-150200.24.129.1.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-150200.24.129.1.s390x",
          "SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-150200.24.129.1.x86_64",
          "SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-150200.24.129.1.aarch64",
          "SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-150200.24.129.1.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-150200.24.129.1.s390x",
          "SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-150200.24.129.1.x86_64",
          "SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-150200.24.129.1.aarch64",
          "SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-150200.24.129.1.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-150200.24.129.1.s390x",
          "SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-150200.24.129.1.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-default-5.3.18-150200.24.129.1.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-default-5.3.18-150200.24.129.1.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-default-base-5.3.18-150200.24.129.1.150200.9.61.1.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-default-base-5.3.18-150200.24.129.1.150200.9.61.1.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-default-devel-5.3.18-150200.24.129.1.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-default-devel-5.3.18-150200.24.129.1.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-devel-5.3.18-150200.24.129.1.noarch",
          "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-docs-5.3.18-150200.24.129.1.noarch",
          "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-macros-5.3.18-150200.24.129.1.noarch",
          "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-obs-build-5.3.18-150200.24.129.1.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-obs-build-5.3.18-150200.24.129.1.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-preempt-5.3.18-150200.24.129.1.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-preempt-5.3.18-150200.24.129.1.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-preempt-devel-5.3.18-150200.24.129.1.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-preempt-devel-5.3.18-150200.24.129.1.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-source-5.3.18-150200.24.129.1.noarch",
          "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-syms-5.3.18-150200.24.129.1.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-syms-5.3.18-150200.24.129.1.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-5.3.18-150200.24.129.1.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-5.3.18-150200.24.129.1.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.129.1.150200.9.61.1.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.129.1.150200.9.61.1.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.129.1.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.129.1.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-devel-5.3.18-150200.24.129.1.noarch",
          "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-docs-5.3.18-150200.24.129.1.noarch",
          "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-macros-5.3.18-150200.24.129.1.noarch",
          "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.129.1.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.129.1.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-preempt-5.3.18-150200.24.129.1.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-preempt-5.3.18-150200.24.129.1.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-preempt-devel-5.3.18-150200.24.129.1.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-preempt-devel-5.3.18-150200.24.129.1.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-source-5.3.18-150200.24.129.1.noarch",
          "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.129.1.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.129.1.x86_64",
          "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-5.3.18-150200.24.129.1.ppc64le",
          "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-5.3.18-150200.24.129.1.s390x",
          "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-5.3.18-150200.24.129.1.x86_64",
          "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-devel-5.3.18-150200.24.129.1.ppc64le",
          "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-devel-5.3.18-150200.24.129.1.s390x",
          "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-devel-5.3.18-150200.24.129.1.x86_64",
          "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-150200_24_129-default-1-150200.5.3.1.ppc64le",
          "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-150200_24_129-default-1-150200.5.3.1.s390x",
          "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-150200_24_129-default-1-150200.5.3.1.x86_64",
          "SUSE Linux Enterprise Server 15 SP2-BCL:kernel-default-5.3.18-150200.24.129.1.x86_64",
          "SUSE Linux Enterprise Server 15 SP2-BCL:kernel-default-base-5.3.18-150200.24.129.1.150200.9.61.1.x86_64",
          "SUSE Linux Enterprise Server 15 SP2-BCL:kernel-default-devel-5.3.18-150200.24.129.1.x86_64",
          "SUSE Linux Enterprise Server 15 SP2-BCL:kernel-devel-5.3.18-150200.24.129.1.noarch",
          "SUSE Linux Enterprise Server 15 SP2-BCL:kernel-docs-5.3.18-150200.24.129.1.noarch",
          "SUSE Linux Enterprise Server 15 SP2-BCL:kernel-macros-5.3.18-150200.24.129.1.noarch",
          "SUSE Linux Enterprise Server 15 SP2-BCL:kernel-obs-build-5.3.18-150200.24.129.1.x86_64",
          "SUSE Linux Enterprise Server 15 SP2-BCL:kernel-preempt-5.3.18-150200.24.129.1.x86_64",
          "SUSE Linux Enterprise Server 15 SP2-BCL:kernel-preempt-devel-5.3.18-150200.24.129.1.x86_64",
          "SUSE Linux Enterprise Server 15 SP2-BCL:kernel-source-5.3.18-150200.24.129.1.noarch",
          "SUSE Linux Enterprise Server 15 SP2-BCL:kernel-syms-5.3.18-150200.24.129.1.x86_64",
          "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-5.3.18-150200.24.129.1.aarch64",
          "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-5.3.18-150200.24.129.1.ppc64le",
          "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-5.3.18-150200.24.129.1.s390x",
          "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-5.3.18-150200.24.129.1.x86_64",
          "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.129.1.150200.9.61.1.aarch64",
          "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.129.1.150200.9.61.1.ppc64le",
          "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.129.1.150200.9.61.1.s390x",
          "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.129.1.150200.9.61.1.x86_64",
          "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.129.1.aarch64",
          "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.129.1.ppc64le",
          "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.129.1.s390x",
          "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.129.1.x86_64",
          "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-devel-5.3.18-150200.24.129.1.noarch",
          "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-docs-5.3.18-150200.24.129.1.noarch",
          "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-macros-5.3.18-150200.24.129.1.noarch",
          "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.129.1.aarch64",
          "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.129.1.ppc64le",
          "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.129.1.s390x",
          "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.129.1.x86_64",
          "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-preempt-5.3.18-150200.24.129.1.aarch64",
          "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-preempt-5.3.18-150200.24.129.1.x86_64",
          "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-preempt-devel-5.3.18-150200.24.129.1.aarch64",
          "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-preempt-devel-5.3.18-150200.24.129.1.x86_64",
          "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-source-5.3.18-150200.24.129.1.noarch",
          "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.129.1.aarch64",
          "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.129.1.ppc64le",
          "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.129.1.s390x",
          "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.129.1.x86_64",
          "SUSE Linux Enterprise Server 15 SP2-LTSS:reiserfs-kmp-default-5.3.18-150200.24.129.1.aarch64",
          "SUSE Linux Enterprise Server 15 SP2-LTSS:reiserfs-kmp-default-5.3.18-150200.24.129.1.ppc64le",
          "SUSE Linux Enterprise Server 15 SP2-LTSS:reiserfs-kmp-default-5.3.18-150200.24.129.1.s390x",
          "SUSE Linux Enterprise Server 15 SP2-LTSS:reiserfs-kmp-default-5.3.18-150200.24.129.1.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-5.3.18-150200.24.129.1.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-5.3.18-150200.24.129.1.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-base-5.3.18-150200.24.129.1.150200.9.61.1.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-base-5.3.18-150200.24.129.1.150200.9.61.1.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-devel-5.3.18-150200.24.129.1.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-devel-5.3.18-150200.24.129.1.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-devel-5.3.18-150200.24.129.1.noarch",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-docs-5.3.18-150200.24.129.1.noarch",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-macros-5.3.18-150200.24.129.1.noarch",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-obs-build-5.3.18-150200.24.129.1.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-obs-build-5.3.18-150200.24.129.1.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-preempt-5.3.18-150200.24.129.1.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-preempt-devel-5.3.18-150200.24.129.1.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-source-5.3.18-150200.24.129.1.noarch",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-syms-5.3.18-150200.24.129.1.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-syms-5.3.18-150200.24.129.1.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP2:reiserfs-kmp-default-5.3.18-150200.24.129.1.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP2:reiserfs-kmp-default-5.3.18-150200.24.129.1.x86_64",
          "SUSE Manager Proxy 4.1:kernel-default-5.3.18-150200.24.129.1.x86_64",
          "SUSE Manager Proxy 4.1:kernel-default-base-5.3.18-150200.24.129.1.150200.9.61.1.x86_64",
          "SUSE Manager Proxy 4.1:kernel-default-devel-5.3.18-150200.24.129.1.x86_64",
          "SUSE Manager Proxy 4.1:kernel-devel-5.3.18-150200.24.129.1.noarch",
          "SUSE Manager Proxy 4.1:kernel-docs-5.3.18-150200.24.129.1.noarch",
          "SUSE Manager Proxy 4.1:kernel-macros-5.3.18-150200.24.129.1.noarch",
          "SUSE Manager Proxy 4.1:kernel-obs-build-5.3.18-150200.24.129.1.x86_64",
          "SUSE Manager Proxy 4.1:kernel-preempt-5.3.18-150200.24.129.1.x86_64",
          "SUSE Manager Proxy 4.1:kernel-preempt-devel-5.3.18-150200.24.129.1.x86_64",
          "SUSE Manager Proxy 4.1:kernel-source-5.3.18-150200.24.129.1.noarch",
          "SUSE Manager Proxy 4.1:kernel-syms-5.3.18-150200.24.129.1.x86_64",
          "SUSE Manager Proxy 4.1:reiserfs-kmp-default-5.3.18-150200.24.129.1.x86_64",
          "SUSE Manager Retail Branch Server 4.1:kernel-default-5.3.18-150200.24.129.1.x86_64",
          "SUSE Manager Retail Branch Server 4.1:kernel-default-base-5.3.18-150200.24.129.1.150200.9.61.1.x86_64",
          "SUSE Manager Retail Branch Server 4.1:kernel-default-devel-5.3.18-150200.24.129.1.x86_64",
          "SUSE Manager Retail Branch Server 4.1:kernel-devel-5.3.18-150200.24.129.1.noarch",
          "SUSE Manager Retail Branch Server 4.1:kernel-docs-5.3.18-150200.24.129.1.noarch",
          "SUSE Manager Retail Branch Server 4.1:kernel-macros-5.3.18-150200.24.129.1.noarch",
          "SUSE Manager Retail Branch Server 4.1:kernel-obs-build-5.3.18-150200.24.129.1.x86_64",
          "SUSE Manager Retail Branch Server 4.1:kernel-preempt-5.3.18-150200.24.129.1.x86_64",
          "SUSE Manager Retail Branch Server 4.1:kernel-preempt-devel-5.3.18-150200.24.129.1.x86_64",
          "SUSE Manager Retail Branch Server 4.1:kernel-source-5.3.18-150200.24.129.1.noarch",
          "SUSE Manager Retail Branch Server 4.1:kernel-syms-5.3.18-150200.24.129.1.x86_64",
          "SUSE Manager Retail Branch Server 4.1:reiserfs-kmp-default-5.3.18-150200.24.129.1.x86_64",
          "SUSE Manager Server 4.1:kernel-default-5.3.18-150200.24.129.1.ppc64le",
          "SUSE Manager Server 4.1:kernel-default-5.3.18-150200.24.129.1.s390x",
          "SUSE Manager Server 4.1:kernel-default-5.3.18-150200.24.129.1.x86_64",
          "SUSE Manager Server 4.1:kernel-default-base-5.3.18-150200.24.129.1.150200.9.61.1.ppc64le",
          "SUSE Manager Server 4.1:kernel-default-base-5.3.18-150200.24.129.1.150200.9.61.1.s390x",
          "SUSE Manager Server 4.1:kernel-default-base-5.3.18-150200.24.129.1.150200.9.61.1.x86_64",
          "SUSE Manager Server 4.1:kernel-default-devel-5.3.18-150200.24.129.1.ppc64le",
          "SUSE Manager Server 4.1:kernel-default-devel-5.3.18-150200.24.129.1.s390x",
          "SUSE Manager Server 4.1:kernel-default-devel-5.3.18-150200.24.129.1.x86_64",
          "SUSE Manager Server 4.1:kernel-devel-5.3.18-150200.24.129.1.noarch",
          "SUSE Manager Server 4.1:kernel-docs-5.3.18-150200.24.129.1.noarch",
          "SUSE Manager Server 4.1:kernel-macros-5.3.18-150200.24.129.1.noarch",
          "SUSE Manager Server 4.1:kernel-obs-build-5.3.18-150200.24.129.1.ppc64le",
          "SUSE Manager Server 4.1:kernel-obs-build-5.3.18-150200.24.129.1.s390x",
          "SUSE Manager Server 4.1:kernel-obs-build-5.3.18-150200.24.129.1.x86_64",
          "SUSE Manager Server 4.1:kernel-preempt-5.3.18-150200.24.129.1.x86_64",
          "SUSE Manager Server 4.1:kernel-preempt-devel-5.3.18-150200.24.129.1.x86_64",
          "SUSE Manager Server 4.1:kernel-source-5.3.18-150200.24.129.1.noarch",
          "SUSE Manager Server 4.1:kernel-syms-5.3.18-150200.24.129.1.ppc64le",
          "SUSE Manager Server 4.1:kernel-syms-5.3.18-150200.24.129.1.s390x",
          "SUSE Manager Server 4.1:kernel-syms-5.3.18-150200.24.129.1.x86_64",
          "SUSE Manager Server 4.1:reiserfs-kmp-default-5.3.18-150200.24.129.1.ppc64le",
          "SUSE Manager Server 4.1:reiserfs-kmp-default-5.3.18-150200.24.129.1.s390x",
          "SUSE Manager Server 4.1:reiserfs-kmp-default-5.3.18-150200.24.129.1.x86_64"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2020-27784",
          "url": "https://www.suse.com/security/cve/CVE-2020-27784"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1202895 for CVE-2020-27784",
          "url": "https://bugzilla.suse.com/1202895"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "SUSE Enterprise Storage 7:kernel-default-5.3.18-150200.24.129.1.aarch64",
            "SUSE Enterprise Storage 7:kernel-default-5.3.18-150200.24.129.1.x86_64",
            "SUSE Enterprise Storage 7:kernel-default-base-5.3.18-150200.24.129.1.150200.9.61.1.aarch64",
            "SUSE Enterprise Storage 7:kernel-default-base-5.3.18-150200.24.129.1.150200.9.61.1.x86_64",
            "SUSE Enterprise Storage 7:kernel-default-devel-5.3.18-150200.24.129.1.aarch64",
            "SUSE Enterprise Storage 7:kernel-default-devel-5.3.18-150200.24.129.1.x86_64",
            "SUSE Enterprise Storage 7:kernel-devel-5.3.18-150200.24.129.1.noarch",
            "SUSE Enterprise Storage 7:kernel-docs-5.3.18-150200.24.129.1.noarch",
            "SUSE Enterprise Storage 7:kernel-macros-5.3.18-150200.24.129.1.noarch",
            "SUSE Enterprise Storage 7:kernel-obs-build-5.3.18-150200.24.129.1.aarch64",
            "SUSE Enterprise Storage 7:kernel-obs-build-5.3.18-150200.24.129.1.x86_64",
            "SUSE Enterprise Storage 7:kernel-preempt-5.3.18-150200.24.129.1.aarch64",
            "SUSE Enterprise Storage 7:kernel-preempt-5.3.18-150200.24.129.1.x86_64",
            "SUSE Enterprise Storage 7:kernel-preempt-devel-5.3.18-150200.24.129.1.aarch64",
            "SUSE Enterprise Storage 7:kernel-preempt-devel-5.3.18-150200.24.129.1.x86_64",
            "SUSE Enterprise Storage 7:kernel-source-5.3.18-150200.24.129.1.noarch",
            "SUSE Enterprise Storage 7:kernel-syms-5.3.18-150200.24.129.1.aarch64",
            "SUSE Enterprise Storage 7:kernel-syms-5.3.18-150200.24.129.1.x86_64",
            "SUSE Enterprise Storage 7:reiserfs-kmp-default-5.3.18-150200.24.129.1.aarch64",
            "SUSE Enterprise Storage 7:reiserfs-kmp-default-5.3.18-150200.24.129.1.x86_64",
            "SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-150200.24.129.1.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-150200.24.129.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-150200.24.129.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-150200.24.129.1.x86_64",
            "SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-150200.24.129.1.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-150200.24.129.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-150200.24.129.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-150200.24.129.1.x86_64",
            "SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-150200.24.129.1.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-150200.24.129.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-150200.24.129.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-150200.24.129.1.x86_64",
            "SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-150200.24.129.1.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-150200.24.129.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-150200.24.129.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-150200.24.129.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-default-5.3.18-150200.24.129.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-default-5.3.18-150200.24.129.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-default-base-5.3.18-150200.24.129.1.150200.9.61.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-default-base-5.3.18-150200.24.129.1.150200.9.61.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-default-devel-5.3.18-150200.24.129.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-default-devel-5.3.18-150200.24.129.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-devel-5.3.18-150200.24.129.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-docs-5.3.18-150200.24.129.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-macros-5.3.18-150200.24.129.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-obs-build-5.3.18-150200.24.129.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-obs-build-5.3.18-150200.24.129.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-preempt-5.3.18-150200.24.129.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-preempt-5.3.18-150200.24.129.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-preempt-devel-5.3.18-150200.24.129.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-preempt-devel-5.3.18-150200.24.129.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-source-5.3.18-150200.24.129.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-syms-5.3.18-150200.24.129.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-syms-5.3.18-150200.24.129.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-5.3.18-150200.24.129.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-5.3.18-150200.24.129.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.129.1.150200.9.61.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.129.1.150200.9.61.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.129.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.129.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-devel-5.3.18-150200.24.129.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-docs-5.3.18-150200.24.129.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-macros-5.3.18-150200.24.129.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.129.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.129.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-preempt-5.3.18-150200.24.129.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-preempt-5.3.18-150200.24.129.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-preempt-devel-5.3.18-150200.24.129.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-preempt-devel-5.3.18-150200.24.129.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-source-5.3.18-150200.24.129.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.129.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.129.1.x86_64",
            "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-5.3.18-150200.24.129.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-5.3.18-150200.24.129.1.s390x",
            "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-5.3.18-150200.24.129.1.x86_64",
            "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-devel-5.3.18-150200.24.129.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-devel-5.3.18-150200.24.129.1.s390x",
            "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-devel-5.3.18-150200.24.129.1.x86_64",
            "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-150200_24_129-default-1-150200.5.3.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-150200_24_129-default-1-150200.5.3.1.s390x",
            "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-150200_24_129-default-1-150200.5.3.1.x86_64",
            "SUSE Linux Enterprise Server 15 SP2-BCL:kernel-default-5.3.18-150200.24.129.1.x86_64",
            "SUSE Linux Enterprise Server 15 SP2-BCL:kernel-default-base-5.3.18-150200.24.129.1.150200.9.61.1.x86_64",
            "SUSE Linux Enterprise Server 15 SP2-BCL:kernel-default-devel-5.3.18-150200.24.129.1.x86_64",
            "SUSE Linux Enterprise Server 15 SP2-BCL:kernel-devel-5.3.18-150200.24.129.1.noarch",
            "SUSE Linux Enterprise Server 15 SP2-BCL:kernel-docs-5.3.18-150200.24.129.1.noarch",
            "SUSE Linux Enterprise Server 15 SP2-BCL:kernel-macros-5.3.18-150200.24.129.1.noarch",
            "SUSE Linux Enterprise Server 15 SP2-BCL:kernel-obs-build-5.3.18-150200.24.129.1.x86_64",
            "SUSE Linux Enterprise Server 15 SP2-BCL:kernel-preempt-5.3.18-150200.24.129.1.x86_64",
            "SUSE Linux Enterprise Server 15 SP2-BCL:kernel-preempt-devel-5.3.18-150200.24.129.1.x86_64",
            "SUSE Linux Enterprise Server 15 SP2-BCL:kernel-source-5.3.18-150200.24.129.1.noarch",
            "SUSE Linux Enterprise Server 15 SP2-BCL:kernel-syms-5.3.18-150200.24.129.1.x86_64",
            "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-5.3.18-150200.24.129.1.aarch64",
            "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-5.3.18-150200.24.129.1.ppc64le",
            "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-5.3.18-150200.24.129.1.s390x",
            "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-5.3.18-150200.24.129.1.x86_64",
            "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.129.1.150200.9.61.1.aarch64",
            "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.129.1.150200.9.61.1.ppc64le",
            "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.129.1.150200.9.61.1.s390x",
            "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.129.1.150200.9.61.1.x86_64",
            "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.129.1.aarch64",
            "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.129.1.ppc64le",
            "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.129.1.s390x",
            "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.129.1.x86_64",
            "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-devel-5.3.18-150200.24.129.1.noarch",
            "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-docs-5.3.18-150200.24.129.1.noarch",
            "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-macros-5.3.18-150200.24.129.1.noarch",
            "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.129.1.aarch64",
            "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.129.1.ppc64le",
            "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.129.1.s390x",
            "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.129.1.x86_64",
            "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-preempt-5.3.18-150200.24.129.1.aarch64",
            "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-preempt-5.3.18-150200.24.129.1.x86_64",
            "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-preempt-devel-5.3.18-150200.24.129.1.aarch64",
            "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-preempt-devel-5.3.18-150200.24.129.1.x86_64",
            "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-source-5.3.18-150200.24.129.1.noarch",
            "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.129.1.aarch64",
            "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.129.1.ppc64le",
            "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.129.1.s390x",
            "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.129.1.x86_64",
            "SUSE Linux Enterprise Server 15 SP2-LTSS:reiserfs-kmp-default-5.3.18-150200.24.129.1.aarch64",
            "SUSE Linux Enterprise Server 15 SP2-LTSS:reiserfs-kmp-default-5.3.18-150200.24.129.1.ppc64le",
            "SUSE Linux Enterprise Server 15 SP2-LTSS:reiserfs-kmp-default-5.3.18-150200.24.129.1.s390x",
            "SUSE Linux Enterprise Server 15 SP2-LTSS:reiserfs-kmp-default-5.3.18-150200.24.129.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-5.3.18-150200.24.129.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-5.3.18-150200.24.129.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-base-5.3.18-150200.24.129.1.150200.9.61.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-base-5.3.18-150200.24.129.1.150200.9.61.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-devel-5.3.18-150200.24.129.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-devel-5.3.18-150200.24.129.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-devel-5.3.18-150200.24.129.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-docs-5.3.18-150200.24.129.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-macros-5.3.18-150200.24.129.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-obs-build-5.3.18-150200.24.129.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-obs-build-5.3.18-150200.24.129.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-preempt-5.3.18-150200.24.129.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-preempt-devel-5.3.18-150200.24.129.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-source-5.3.18-150200.24.129.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-syms-5.3.18-150200.24.129.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-syms-5.3.18-150200.24.129.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP2:reiserfs-kmp-default-5.3.18-150200.24.129.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP2:reiserfs-kmp-default-5.3.18-150200.24.129.1.x86_64",
            "SUSE Manager Proxy 4.1:kernel-default-5.3.18-150200.24.129.1.x86_64",
            "SUSE Manager Proxy 4.1:kernel-default-base-5.3.18-150200.24.129.1.150200.9.61.1.x86_64",
            "SUSE Manager Proxy 4.1:kernel-default-devel-5.3.18-150200.24.129.1.x86_64",
            "SUSE Manager Proxy 4.1:kernel-devel-5.3.18-150200.24.129.1.noarch",
            "SUSE Manager Proxy 4.1:kernel-docs-5.3.18-150200.24.129.1.noarch",
            "SUSE Manager Proxy 4.1:kernel-macros-5.3.18-150200.24.129.1.noarch",
            "SUSE Manager Proxy 4.1:kernel-obs-build-5.3.18-150200.24.129.1.x86_64",
            "SUSE Manager Proxy 4.1:kernel-preempt-5.3.18-150200.24.129.1.x86_64",
            "SUSE Manager Proxy 4.1:kernel-preempt-devel-5.3.18-150200.24.129.1.x86_64",
            "SUSE Manager Proxy 4.1:kernel-source-5.3.18-150200.24.129.1.noarch",
            "SUSE Manager Proxy 4.1:kernel-syms-5.3.18-150200.24.129.1.x86_64",
            "SUSE Manager Proxy 4.1:reiserfs-kmp-default-5.3.18-150200.24.129.1.x86_64",
            "SUSE Manager Retail Branch Server 4.1:kernel-default-5.3.18-150200.24.129.1.x86_64",
            "SUSE Manager Retail Branch Server 4.1:kernel-default-base-5.3.18-150200.24.129.1.150200.9.61.1.x86_64",
            "SUSE Manager Retail Branch Server 4.1:kernel-default-devel-5.3.18-150200.24.129.1.x86_64",
            "SUSE Manager Retail Branch Server 4.1:kernel-devel-5.3.18-150200.24.129.1.noarch",
            "SUSE Manager Retail Branch Server 4.1:kernel-docs-5.3.18-150200.24.129.1.noarch",
            "SUSE Manager Retail Branch Server 4.1:kernel-macros-5.3.18-150200.24.129.1.noarch",
            "SUSE Manager Retail Branch Server 4.1:kernel-obs-build-5.3.18-150200.24.129.1.x86_64",
            "SUSE Manager Retail Branch Server 4.1:kernel-preempt-5.3.18-150200.24.129.1.x86_64",
            "SUSE Manager Retail Branch Server 4.1:kernel-preempt-devel-5.3.18-150200.24.129.1.x86_64",
            "SUSE Manager Retail Branch Server 4.1:kernel-source-5.3.18-150200.24.129.1.noarch",
            "SUSE Manager Retail Branch Server 4.1:kernel-syms-5.3.18-150200.24.129.1.x86_64",
            "SUSE Manager Retail Branch Server 4.1:reiserfs-kmp-default-5.3.18-150200.24.129.1.x86_64",
            "SUSE Manager Server 4.1:kernel-default-5.3.18-150200.24.129.1.ppc64le",
            "SUSE Manager Server 4.1:kernel-default-5.3.18-150200.24.129.1.s390x",
            "SUSE Manager Server 4.1:kernel-default-5.3.18-150200.24.129.1.x86_64",
            "SUSE Manager Server 4.1:kernel-default-base-5.3.18-150200.24.129.1.150200.9.61.1.ppc64le",
            "SUSE Manager Server 4.1:kernel-default-base-5.3.18-150200.24.129.1.150200.9.61.1.s390x",
            "SUSE Manager Server 4.1:kernel-default-base-5.3.18-150200.24.129.1.150200.9.61.1.x86_64",
            "SUSE Manager Server 4.1:kernel-default-devel-5.3.18-150200.24.129.1.ppc64le",
            "SUSE Manager Server 4.1:kernel-default-devel-5.3.18-150200.24.129.1.s390x",
            "SUSE Manager Server 4.1:kernel-default-devel-5.3.18-150200.24.129.1.x86_64",
            "SUSE Manager Server 4.1:kernel-devel-5.3.18-150200.24.129.1.noarch",
            "SUSE Manager Server 4.1:kernel-docs-5.3.18-150200.24.129.1.noarch",
            "SUSE Manager Server 4.1:kernel-macros-5.3.18-150200.24.129.1.noarch",
            "SUSE Manager Server 4.1:kernel-obs-build-5.3.18-150200.24.129.1.ppc64le",
            "SUSE Manager Server 4.1:kernel-obs-build-5.3.18-150200.24.129.1.s390x",
            "SUSE Manager Server 4.1:kernel-obs-build-5.3.18-150200.24.129.1.x86_64",
            "SUSE Manager Server 4.1:kernel-preempt-5.3.18-150200.24.129.1.x86_64",
            "SUSE Manager Server 4.1:kernel-preempt-devel-5.3.18-150200.24.129.1.x86_64",
            "SUSE Manager Server 4.1:kernel-source-5.3.18-150200.24.129.1.noarch",
            "SUSE Manager Server 4.1:kernel-syms-5.3.18-150200.24.129.1.ppc64le",
            "SUSE Manager Server 4.1:kernel-syms-5.3.18-150200.24.129.1.s390x",
            "SUSE Manager Server 4.1:kernel-syms-5.3.18-150200.24.129.1.x86_64",
            "SUSE Manager Server 4.1:reiserfs-kmp-default-5.3.18-150200.24.129.1.ppc64le",
            "SUSE Manager Server 4.1:reiserfs-kmp-default-5.3.18-150200.24.129.1.s390x",
            "SUSE Manager Server 4.1:reiserfs-kmp-default-5.3.18-150200.24.129.1.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 4,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:L/AC:H/PR:H/UI:R/S:U/C:N/I:N/A:H",
            "version": "3.1"
          },
          "products": [
            "SUSE Enterprise Storage 7:kernel-default-5.3.18-150200.24.129.1.aarch64",
            "SUSE Enterprise Storage 7:kernel-default-5.3.18-150200.24.129.1.x86_64",
            "SUSE Enterprise Storage 7:kernel-default-base-5.3.18-150200.24.129.1.150200.9.61.1.aarch64",
            "SUSE Enterprise Storage 7:kernel-default-base-5.3.18-150200.24.129.1.150200.9.61.1.x86_64",
            "SUSE Enterprise Storage 7:kernel-default-devel-5.3.18-150200.24.129.1.aarch64",
            "SUSE Enterprise Storage 7:kernel-default-devel-5.3.18-150200.24.129.1.x86_64",
            "SUSE Enterprise Storage 7:kernel-devel-5.3.18-150200.24.129.1.noarch",
            "SUSE Enterprise Storage 7:kernel-docs-5.3.18-150200.24.129.1.noarch",
            "SUSE Enterprise Storage 7:kernel-macros-5.3.18-150200.24.129.1.noarch",
            "SUSE Enterprise Storage 7:kernel-obs-build-5.3.18-150200.24.129.1.aarch64",
            "SUSE Enterprise Storage 7:kernel-obs-build-5.3.18-150200.24.129.1.x86_64",
            "SUSE Enterprise Storage 7:kernel-preempt-5.3.18-150200.24.129.1.aarch64",
            "SUSE Enterprise Storage 7:kernel-preempt-5.3.18-150200.24.129.1.x86_64",
            "SUSE Enterprise Storage 7:kernel-preempt-devel-5.3.18-150200.24.129.1.aarch64",
            "SUSE Enterprise Storage 7:kernel-preempt-devel-5.3.18-150200.24.129.1.x86_64",
            "SUSE Enterprise Storage 7:kernel-source-5.3.18-150200.24.129.1.noarch",
            "SUSE Enterprise Storage 7:kernel-syms-5.3.18-150200.24.129.1.aarch64",
            "SUSE Enterprise Storage 7:kernel-syms-5.3.18-150200.24.129.1.x86_64",
            "SUSE Enterprise Storage 7:reiserfs-kmp-default-5.3.18-150200.24.129.1.aarch64",
            "SUSE Enterprise Storage 7:reiserfs-kmp-default-5.3.18-150200.24.129.1.x86_64",
            "SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-150200.24.129.1.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-150200.24.129.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-150200.24.129.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-150200.24.129.1.x86_64",
            "SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-150200.24.129.1.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-150200.24.129.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-150200.24.129.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-150200.24.129.1.x86_64",
            "SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-150200.24.129.1.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-150200.24.129.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-150200.24.129.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-150200.24.129.1.x86_64",
            "SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-150200.24.129.1.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-150200.24.129.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-150200.24.129.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-150200.24.129.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-default-5.3.18-150200.24.129.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-default-5.3.18-150200.24.129.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-default-base-5.3.18-150200.24.129.1.150200.9.61.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-default-base-5.3.18-150200.24.129.1.150200.9.61.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-default-devel-5.3.18-150200.24.129.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-default-devel-5.3.18-150200.24.129.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-devel-5.3.18-150200.24.129.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-docs-5.3.18-150200.24.129.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-macros-5.3.18-150200.24.129.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-obs-build-5.3.18-150200.24.129.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-obs-build-5.3.18-150200.24.129.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-preempt-5.3.18-150200.24.129.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-preempt-5.3.18-150200.24.129.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-preempt-devel-5.3.18-150200.24.129.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-preempt-devel-5.3.18-150200.24.129.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-source-5.3.18-150200.24.129.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-syms-5.3.18-150200.24.129.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-syms-5.3.18-150200.24.129.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-5.3.18-150200.24.129.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-5.3.18-150200.24.129.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.129.1.150200.9.61.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.129.1.150200.9.61.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.129.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.129.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-devel-5.3.18-150200.24.129.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-docs-5.3.18-150200.24.129.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-macros-5.3.18-150200.24.129.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.129.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.129.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-preempt-5.3.18-150200.24.129.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-preempt-5.3.18-150200.24.129.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-preempt-devel-5.3.18-150200.24.129.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-preempt-devel-5.3.18-150200.24.129.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-source-5.3.18-150200.24.129.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.129.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.129.1.x86_64",
            "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-5.3.18-150200.24.129.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-5.3.18-150200.24.129.1.s390x",
            "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-5.3.18-150200.24.129.1.x86_64",
            "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-devel-5.3.18-150200.24.129.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-devel-5.3.18-150200.24.129.1.s390x",
            "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-devel-5.3.18-150200.24.129.1.x86_64",
            "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-150200_24_129-default-1-150200.5.3.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-150200_24_129-default-1-150200.5.3.1.s390x",
            "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-150200_24_129-default-1-150200.5.3.1.x86_64",
            "SUSE Linux Enterprise Server 15 SP2-BCL:kernel-default-5.3.18-150200.24.129.1.x86_64",
            "SUSE Linux Enterprise Server 15 SP2-BCL:kernel-default-base-5.3.18-150200.24.129.1.150200.9.61.1.x86_64",
            "SUSE Linux Enterprise Server 15 SP2-BCL:kernel-default-devel-5.3.18-150200.24.129.1.x86_64",
            "SUSE Linux Enterprise Server 15 SP2-BCL:kernel-devel-5.3.18-150200.24.129.1.noarch",
            "SUSE Linux Enterprise Server 15 SP2-BCL:kernel-docs-5.3.18-150200.24.129.1.noarch",
            "SUSE Linux Enterprise Server 15 SP2-BCL:kernel-macros-5.3.18-150200.24.129.1.noarch",
            "SUSE Linux Enterprise Server 15 SP2-BCL:kernel-obs-build-5.3.18-150200.24.129.1.x86_64",
            "SUSE Linux Enterprise Server 15 SP2-BCL:kernel-preempt-5.3.18-150200.24.129.1.x86_64",
            "SUSE Linux Enterprise Server 15 SP2-BCL:kernel-preempt-devel-5.3.18-150200.24.129.1.x86_64",
            "SUSE Linux Enterprise Server 15 SP2-BCL:kernel-source-5.3.18-150200.24.129.1.noarch",
            "SUSE Linux Enterprise Server 15 SP2-BCL:kernel-syms-5.3.18-150200.24.129.1.x86_64",
            "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-5.3.18-150200.24.129.1.aarch64",
            "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-5.3.18-150200.24.129.1.ppc64le",
            "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-5.3.18-150200.24.129.1.s390x",
            "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-5.3.18-150200.24.129.1.x86_64",
            "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.129.1.150200.9.61.1.aarch64",
            "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.129.1.150200.9.61.1.ppc64le",
            "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.129.1.150200.9.61.1.s390x",
            "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.129.1.150200.9.61.1.x86_64",
            "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.129.1.aarch64",
            "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.129.1.ppc64le",
            "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.129.1.s390x",
            "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.129.1.x86_64",
            "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-devel-5.3.18-150200.24.129.1.noarch",
            "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-docs-5.3.18-150200.24.129.1.noarch",
            "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-macros-5.3.18-150200.24.129.1.noarch",
            "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.129.1.aarch64",
            "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.129.1.ppc64le",
            "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.129.1.s390x",
            "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.129.1.x86_64",
            "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-preempt-5.3.18-150200.24.129.1.aarch64",
            "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-preempt-5.3.18-150200.24.129.1.x86_64",
            "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-preempt-devel-5.3.18-150200.24.129.1.aarch64",
            "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-preempt-devel-5.3.18-150200.24.129.1.x86_64",
            "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-source-5.3.18-150200.24.129.1.noarch",
            "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.129.1.aarch64",
            "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.129.1.ppc64le",
            "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.129.1.s390x",
            "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.129.1.x86_64",
            "SUSE Linux Enterprise Server 15 SP2-LTSS:reiserfs-kmp-default-5.3.18-150200.24.129.1.aarch64",
            "SUSE Linux Enterprise Server 15 SP2-LTSS:reiserfs-kmp-default-5.3.18-150200.24.129.1.ppc64le",
            "SUSE Linux Enterprise Server 15 SP2-LTSS:reiserfs-kmp-default-5.3.18-150200.24.129.1.s390x",
            "SUSE Linux Enterprise Server 15 SP2-LTSS:reiserfs-kmp-default-5.3.18-150200.24.129.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-5.3.18-150200.24.129.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-5.3.18-150200.24.129.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-base-5.3.18-150200.24.129.1.150200.9.61.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-base-5.3.18-150200.24.129.1.150200.9.61.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-devel-5.3.18-150200.24.129.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-devel-5.3.18-150200.24.129.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-devel-5.3.18-150200.24.129.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-docs-5.3.18-150200.24.129.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-macros-5.3.18-150200.24.129.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-obs-build-5.3.18-150200.24.129.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-obs-build-5.3.18-150200.24.129.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-preempt-5.3.18-150200.24.129.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-preempt-devel-5.3.18-150200.24.129.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-source-5.3.18-150200.24.129.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-syms-5.3.18-150200.24.129.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-syms-5.3.18-150200.24.129.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP2:reiserfs-kmp-default-5.3.18-150200.24.129.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP2:reiserfs-kmp-default-5.3.18-150200.24.129.1.x86_64",
            "SUSE Manager Proxy 4.1:kernel-default-5.3.18-150200.24.129.1.x86_64",
            "SUSE Manager Proxy 4.1:kernel-default-base-5.3.18-150200.24.129.1.150200.9.61.1.x86_64",
            "SUSE Manager Proxy 4.1:kernel-default-devel-5.3.18-150200.24.129.1.x86_64",
            "SUSE Manager Proxy 4.1:kernel-devel-5.3.18-150200.24.129.1.noarch",
            "SUSE Manager Proxy 4.1:kernel-docs-5.3.18-150200.24.129.1.noarch",
            "SUSE Manager Proxy 4.1:kernel-macros-5.3.18-150200.24.129.1.noarch",
            "SUSE Manager Proxy 4.1:kernel-obs-build-5.3.18-150200.24.129.1.x86_64",
            "SUSE Manager Proxy 4.1:kernel-preempt-5.3.18-150200.24.129.1.x86_64",
            "SUSE Manager Proxy 4.1:kernel-preempt-devel-5.3.18-150200.24.129.1.x86_64",
            "SUSE Manager Proxy 4.1:kernel-source-5.3.18-150200.24.129.1.noarch",
            "SUSE Manager Proxy 4.1:kernel-syms-5.3.18-150200.24.129.1.x86_64",
            "SUSE Manager Proxy 4.1:reiserfs-kmp-default-5.3.18-150200.24.129.1.x86_64",
            "SUSE Manager Retail Branch Server 4.1:kernel-default-5.3.18-150200.24.129.1.x86_64",
            "SUSE Manager Retail Branch Server 4.1:kernel-default-base-5.3.18-150200.24.129.1.150200.9.61.1.x86_64",
            "SUSE Manager Retail Branch Server 4.1:kernel-default-devel-5.3.18-150200.24.129.1.x86_64",
            "SUSE Manager Retail Branch Server 4.1:kernel-devel-5.3.18-150200.24.129.1.noarch",
            "SUSE Manager Retail Branch Server 4.1:kernel-docs-5.3.18-150200.24.129.1.noarch",
            "SUSE Manager Retail Branch Server 4.1:kernel-macros-5.3.18-150200.24.129.1.noarch",
            "SUSE Manager Retail Branch Server 4.1:kernel-obs-build-5.3.18-150200.24.129.1.x86_64",
            "SUSE Manager Retail Branch Server 4.1:kernel-preempt-5.3.18-150200.24.129.1.x86_64",
            "SUSE Manager Retail Branch Server 4.1:kernel-preempt-devel-5.3.18-150200.24.129.1.x86_64",
            "SUSE Manager Retail Branch Server 4.1:kernel-source-5.3.18-150200.24.129.1.noarch",
            "SUSE Manager Retail Branch Server 4.1:kernel-syms-5.3.18-150200.24.129.1.x86_64",
            "SUSE Manager Retail Branch Server 4.1:reiserfs-kmp-default-5.3.18-150200.24.129.1.x86_64",
            "SUSE Manager Server 4.1:kernel-default-5.3.18-150200.24.129.1.ppc64le",
            "SUSE Manager Server 4.1:kernel-default-5.3.18-150200.24.129.1.s390x",
            "SUSE Manager Server 4.1:kernel-default-5.3.18-150200.24.129.1.x86_64",
            "SUSE Manager Server 4.1:kernel-default-base-5.3.18-150200.24.129.1.150200.9.61.1.ppc64le",
            "SUSE Manager Server 4.1:kernel-default-base-5.3.18-150200.24.129.1.150200.9.61.1.s390x",
            "SUSE Manager Server 4.1:kernel-default-base-5.3.18-150200.24.129.1.150200.9.61.1.x86_64",
            "SUSE Manager Server 4.1:kernel-default-devel-5.3.18-150200.24.129.1.ppc64le",
            "SUSE Manager Server 4.1:kernel-default-devel-5.3.18-150200.24.129.1.s390x",
            "SUSE Manager Server 4.1:kernel-default-devel-5.3.18-150200.24.129.1.x86_64",
            "SUSE Manager Server 4.1:kernel-devel-5.3.18-150200.24.129.1.noarch",
            "SUSE Manager Server 4.1:kernel-docs-5.3.18-150200.24.129.1.noarch",
            "SUSE Manager Server 4.1:kernel-macros-5.3.18-150200.24.129.1.noarch",
            "SUSE Manager Server 4.1:kernel-obs-build-5.3.18-150200.24.129.1.ppc64le",
            "SUSE Manager Server 4.1:kernel-obs-build-5.3.18-150200.24.129.1.s390x",
            "SUSE Manager Server 4.1:kernel-obs-build-5.3.18-150200.24.129.1.x86_64",
            "SUSE Manager Server 4.1:kernel-preempt-5.3.18-150200.24.129.1.x86_64",
            "SUSE Manager Server 4.1:kernel-preempt-devel-5.3.18-150200.24.129.1.x86_64",
            "SUSE Manager Server 4.1:kernel-source-5.3.18-150200.24.129.1.noarch",
            "SUSE Manager Server 4.1:kernel-syms-5.3.18-150200.24.129.1.ppc64le",
            "SUSE Manager Server 4.1:kernel-syms-5.3.18-150200.24.129.1.s390x",
            "SUSE Manager Server 4.1:kernel-syms-5.3.18-150200.24.129.1.x86_64",
            "SUSE Manager Server 4.1:reiserfs-kmp-default-5.3.18-150200.24.129.1.ppc64le",
            "SUSE Manager Server 4.1:reiserfs-kmp-default-5.3.18-150200.24.129.1.s390x",
            "SUSE Manager Server 4.1:reiserfs-kmp-default-5.3.18-150200.24.129.1.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2022-09-28T06:48:59Z",
          "details": "low"
        }
      ],
      "title": "CVE-2020-27784"
    },
    {
      "cve": "CVE-2020-36516",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2020-36516"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "An issue was discovered in the Linux kernel through 5.16.11. The mixed IPID assignment method with the hash-based IPID assignment policy allows an off-path attacker to inject data into a victim\u0027s TCP session or terminate that session.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "SUSE Enterprise Storage 7:kernel-default-5.3.18-150200.24.129.1.aarch64",
          "SUSE Enterprise Storage 7:kernel-default-5.3.18-150200.24.129.1.x86_64",
          "SUSE Enterprise Storage 7:kernel-default-base-5.3.18-150200.24.129.1.150200.9.61.1.aarch64",
          "SUSE Enterprise Storage 7:kernel-default-base-5.3.18-150200.24.129.1.150200.9.61.1.x86_64",
          "SUSE Enterprise Storage 7:kernel-default-devel-5.3.18-150200.24.129.1.aarch64",
          "SUSE Enterprise Storage 7:kernel-default-devel-5.3.18-150200.24.129.1.x86_64",
          "SUSE Enterprise Storage 7:kernel-devel-5.3.18-150200.24.129.1.noarch",
          "SUSE Enterprise Storage 7:kernel-docs-5.3.18-150200.24.129.1.noarch",
          "SUSE Enterprise Storage 7:kernel-macros-5.3.18-150200.24.129.1.noarch",
          "SUSE Enterprise Storage 7:kernel-obs-build-5.3.18-150200.24.129.1.aarch64",
          "SUSE Enterprise Storage 7:kernel-obs-build-5.3.18-150200.24.129.1.x86_64",
          "SUSE Enterprise Storage 7:kernel-preempt-5.3.18-150200.24.129.1.aarch64",
          "SUSE Enterprise Storage 7:kernel-preempt-5.3.18-150200.24.129.1.x86_64",
          "SUSE Enterprise Storage 7:kernel-preempt-devel-5.3.18-150200.24.129.1.aarch64",
          "SUSE Enterprise Storage 7:kernel-preempt-devel-5.3.18-150200.24.129.1.x86_64",
          "SUSE Enterprise Storage 7:kernel-source-5.3.18-150200.24.129.1.noarch",
          "SUSE Enterprise Storage 7:kernel-syms-5.3.18-150200.24.129.1.aarch64",
          "SUSE Enterprise Storage 7:kernel-syms-5.3.18-150200.24.129.1.x86_64",
          "SUSE Enterprise Storage 7:reiserfs-kmp-default-5.3.18-150200.24.129.1.aarch64",
          "SUSE Enterprise Storage 7:reiserfs-kmp-default-5.3.18-150200.24.129.1.x86_64",
          "SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-150200.24.129.1.aarch64",
          "SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-150200.24.129.1.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-150200.24.129.1.s390x",
          "SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-150200.24.129.1.x86_64",
          "SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-150200.24.129.1.aarch64",
          "SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-150200.24.129.1.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-150200.24.129.1.s390x",
          "SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-150200.24.129.1.x86_64",
          "SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-150200.24.129.1.aarch64",
          "SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-150200.24.129.1.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-150200.24.129.1.s390x",
          "SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-150200.24.129.1.x86_64",
          "SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-150200.24.129.1.aarch64",
          "SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-150200.24.129.1.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-150200.24.129.1.s390x",
          "SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-150200.24.129.1.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-default-5.3.18-150200.24.129.1.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-default-5.3.18-150200.24.129.1.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-default-base-5.3.18-150200.24.129.1.150200.9.61.1.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-default-base-5.3.18-150200.24.129.1.150200.9.61.1.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-default-devel-5.3.18-150200.24.129.1.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-default-devel-5.3.18-150200.24.129.1.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-devel-5.3.18-150200.24.129.1.noarch",
          "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-docs-5.3.18-150200.24.129.1.noarch",
          "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-macros-5.3.18-150200.24.129.1.noarch",
          "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-obs-build-5.3.18-150200.24.129.1.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-obs-build-5.3.18-150200.24.129.1.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-preempt-5.3.18-150200.24.129.1.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-preempt-5.3.18-150200.24.129.1.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-preempt-devel-5.3.18-150200.24.129.1.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-preempt-devel-5.3.18-150200.24.129.1.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-source-5.3.18-150200.24.129.1.noarch",
          "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-syms-5.3.18-150200.24.129.1.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-syms-5.3.18-150200.24.129.1.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-5.3.18-150200.24.129.1.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-5.3.18-150200.24.129.1.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.129.1.150200.9.61.1.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.129.1.150200.9.61.1.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.129.1.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.129.1.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-devel-5.3.18-150200.24.129.1.noarch",
          "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-docs-5.3.18-150200.24.129.1.noarch",
          "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-macros-5.3.18-150200.24.129.1.noarch",
          "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.129.1.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.129.1.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-preempt-5.3.18-150200.24.129.1.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-preempt-5.3.18-150200.24.129.1.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-preempt-devel-5.3.18-150200.24.129.1.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-preempt-devel-5.3.18-150200.24.129.1.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-source-5.3.18-150200.24.129.1.noarch",
          "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.129.1.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.129.1.x86_64",
          "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-5.3.18-150200.24.129.1.ppc64le",
          "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-5.3.18-150200.24.129.1.s390x",
          "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-5.3.18-150200.24.129.1.x86_64",
          "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-devel-5.3.18-150200.24.129.1.ppc64le",
          "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-devel-5.3.18-150200.24.129.1.s390x",
          "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-devel-5.3.18-150200.24.129.1.x86_64",
          "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-150200_24_129-default-1-150200.5.3.1.ppc64le",
          "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-150200_24_129-default-1-150200.5.3.1.s390x",
          "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-150200_24_129-default-1-150200.5.3.1.x86_64",
          "SUSE Linux Enterprise Server 15 SP2-BCL:kernel-default-5.3.18-150200.24.129.1.x86_64",
          "SUSE Linux Enterprise Server 15 SP2-BCL:kernel-default-base-5.3.18-150200.24.129.1.150200.9.61.1.x86_64",
          "SUSE Linux Enterprise Server 15 SP2-BCL:kernel-default-devel-5.3.18-150200.24.129.1.x86_64",
          "SUSE Linux Enterprise Server 15 SP2-BCL:kernel-devel-5.3.18-150200.24.129.1.noarch",
          "SUSE Linux Enterprise Server 15 SP2-BCL:kernel-docs-5.3.18-150200.24.129.1.noarch",
          "SUSE Linux Enterprise Server 15 SP2-BCL:kernel-macros-5.3.18-150200.24.129.1.noarch",
          "SUSE Linux Enterprise Server 15 SP2-BCL:kernel-obs-build-5.3.18-150200.24.129.1.x86_64",
          "SUSE Linux Enterprise Server 15 SP2-BCL:kernel-preempt-5.3.18-150200.24.129.1.x86_64",
          "SUSE Linux Enterprise Server 15 SP2-BCL:kernel-preempt-devel-5.3.18-150200.24.129.1.x86_64",
          "SUSE Linux Enterprise Server 15 SP2-BCL:kernel-source-5.3.18-150200.24.129.1.noarch",
          "SUSE Linux Enterprise Server 15 SP2-BCL:kernel-syms-5.3.18-150200.24.129.1.x86_64",
          "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-5.3.18-150200.24.129.1.aarch64",
          "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-5.3.18-150200.24.129.1.ppc64le",
          "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-5.3.18-150200.24.129.1.s390x",
          "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-5.3.18-150200.24.129.1.x86_64",
          "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.129.1.150200.9.61.1.aarch64",
          "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.129.1.150200.9.61.1.ppc64le",
          "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.129.1.150200.9.61.1.s390x",
          "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.129.1.150200.9.61.1.x86_64",
          "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.129.1.aarch64",
          "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.129.1.ppc64le",
          "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.129.1.s390x",
          "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.129.1.x86_64",
          "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-devel-5.3.18-150200.24.129.1.noarch",
          "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-docs-5.3.18-150200.24.129.1.noarch",
          "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-macros-5.3.18-150200.24.129.1.noarch",
          "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.129.1.aarch64",
          "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.129.1.ppc64le",
          "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.129.1.s390x",
          "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.129.1.x86_64",
          "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-preempt-5.3.18-150200.24.129.1.aarch64",
          "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-preempt-5.3.18-150200.24.129.1.x86_64",
          "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-preempt-devel-5.3.18-150200.24.129.1.aarch64",
          "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-preempt-devel-5.3.18-150200.24.129.1.x86_64",
          "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-source-5.3.18-150200.24.129.1.noarch",
          "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.129.1.aarch64",
          "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.129.1.ppc64le",
          "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.129.1.s390x",
          "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.129.1.x86_64",
          "SUSE Linux Enterprise Server 15 SP2-LTSS:reiserfs-kmp-default-5.3.18-150200.24.129.1.aarch64",
          "SUSE Linux Enterprise Server 15 SP2-LTSS:reiserfs-kmp-default-5.3.18-150200.24.129.1.ppc64le",
          "SUSE Linux Enterprise Server 15 SP2-LTSS:reiserfs-kmp-default-5.3.18-150200.24.129.1.s390x",
          "SUSE Linux Enterprise Server 15 SP2-LTSS:reiserfs-kmp-default-5.3.18-150200.24.129.1.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-5.3.18-150200.24.129.1.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-5.3.18-150200.24.129.1.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-base-5.3.18-150200.24.129.1.150200.9.61.1.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-base-5.3.18-150200.24.129.1.150200.9.61.1.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-devel-5.3.18-150200.24.129.1.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-devel-5.3.18-150200.24.129.1.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-devel-5.3.18-150200.24.129.1.noarch",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-docs-5.3.18-150200.24.129.1.noarch",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-macros-5.3.18-150200.24.129.1.noarch",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-obs-build-5.3.18-150200.24.129.1.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-obs-build-5.3.18-150200.24.129.1.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-preempt-5.3.18-150200.24.129.1.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-preempt-devel-5.3.18-150200.24.129.1.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-source-5.3.18-150200.24.129.1.noarch",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-syms-5.3.18-150200.24.129.1.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-syms-5.3.18-150200.24.129.1.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP2:reiserfs-kmp-default-5.3.18-150200.24.129.1.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP2:reiserfs-kmp-default-5.3.18-150200.24.129.1.x86_64",
          "SUSE Manager Proxy 4.1:kernel-default-5.3.18-150200.24.129.1.x86_64",
          "SUSE Manager Proxy 4.1:kernel-default-base-5.3.18-150200.24.129.1.150200.9.61.1.x86_64",
          "SUSE Manager Proxy 4.1:kernel-default-devel-5.3.18-150200.24.129.1.x86_64",
          "SUSE Manager Proxy 4.1:kernel-devel-5.3.18-150200.24.129.1.noarch",
          "SUSE Manager Proxy 4.1:kernel-docs-5.3.18-150200.24.129.1.noarch",
          "SUSE Manager Proxy 4.1:kernel-macros-5.3.18-150200.24.129.1.noarch",
          "SUSE Manager Proxy 4.1:kernel-obs-build-5.3.18-150200.24.129.1.x86_64",
          "SUSE Manager Proxy 4.1:kernel-preempt-5.3.18-150200.24.129.1.x86_64",
          "SUSE Manager Proxy 4.1:kernel-preempt-devel-5.3.18-150200.24.129.1.x86_64",
          "SUSE Manager Proxy 4.1:kernel-source-5.3.18-150200.24.129.1.noarch",
          "SUSE Manager Proxy 4.1:kernel-syms-5.3.18-150200.24.129.1.x86_64",
          "SUSE Manager Proxy 4.1:reiserfs-kmp-default-5.3.18-150200.24.129.1.x86_64",
          "SUSE Manager Retail Branch Server 4.1:kernel-default-5.3.18-150200.24.129.1.x86_64",
          "SUSE Manager Retail Branch Server 4.1:kernel-default-base-5.3.18-150200.24.129.1.150200.9.61.1.x86_64",
          "SUSE Manager Retail Branch Server 4.1:kernel-default-devel-5.3.18-150200.24.129.1.x86_64",
          "SUSE Manager Retail Branch Server 4.1:kernel-devel-5.3.18-150200.24.129.1.noarch",
          "SUSE Manager Retail Branch Server 4.1:kernel-docs-5.3.18-150200.24.129.1.noarch",
          "SUSE Manager Retail Branch Server 4.1:kernel-macros-5.3.18-150200.24.129.1.noarch",
          "SUSE Manager Retail Branch Server 4.1:kernel-obs-build-5.3.18-150200.24.129.1.x86_64",
          "SUSE Manager Retail Branch Server 4.1:kernel-preempt-5.3.18-150200.24.129.1.x86_64",
          "SUSE Manager Retail Branch Server 4.1:kernel-preempt-devel-5.3.18-150200.24.129.1.x86_64",
          "SUSE Manager Retail Branch Server 4.1:kernel-source-5.3.18-150200.24.129.1.noarch",
          "SUSE Manager Retail Branch Server 4.1:kernel-syms-5.3.18-150200.24.129.1.x86_64",
          "SUSE Manager Retail Branch Server 4.1:reiserfs-kmp-default-5.3.18-150200.24.129.1.x86_64",
          "SUSE Manager Server 4.1:kernel-default-5.3.18-150200.24.129.1.ppc64le",
          "SUSE Manager Server 4.1:kernel-default-5.3.18-150200.24.129.1.s390x",
          "SUSE Manager Server 4.1:kernel-default-5.3.18-150200.24.129.1.x86_64",
          "SUSE Manager Server 4.1:kernel-default-base-5.3.18-150200.24.129.1.150200.9.61.1.ppc64le",
          "SUSE Manager Server 4.1:kernel-default-base-5.3.18-150200.24.129.1.150200.9.61.1.s390x",
          "SUSE Manager Server 4.1:kernel-default-base-5.3.18-150200.24.129.1.150200.9.61.1.x86_64",
          "SUSE Manager Server 4.1:kernel-default-devel-5.3.18-150200.24.129.1.ppc64le",
          "SUSE Manager Server 4.1:kernel-default-devel-5.3.18-150200.24.129.1.s390x",
          "SUSE Manager Server 4.1:kernel-default-devel-5.3.18-150200.24.129.1.x86_64",
          "SUSE Manager Server 4.1:kernel-devel-5.3.18-150200.24.129.1.noarch",
          "SUSE Manager Server 4.1:kernel-docs-5.3.18-150200.24.129.1.noarch",
          "SUSE Manager Server 4.1:kernel-macros-5.3.18-150200.24.129.1.noarch",
          "SUSE Manager Server 4.1:kernel-obs-build-5.3.18-150200.24.129.1.ppc64le",
          "SUSE Manager Server 4.1:kernel-obs-build-5.3.18-150200.24.129.1.s390x",
          "SUSE Manager Server 4.1:kernel-obs-build-5.3.18-150200.24.129.1.x86_64",
          "SUSE Manager Server 4.1:kernel-preempt-5.3.18-150200.24.129.1.x86_64",
          "SUSE Manager Server 4.1:kernel-preempt-devel-5.3.18-150200.24.129.1.x86_64",
          "SUSE Manager Server 4.1:kernel-source-5.3.18-150200.24.129.1.noarch",
          "SUSE Manager Server 4.1:kernel-syms-5.3.18-150200.24.129.1.ppc64le",
          "SUSE Manager Server 4.1:kernel-syms-5.3.18-150200.24.129.1.s390x",
          "SUSE Manager Server 4.1:kernel-syms-5.3.18-150200.24.129.1.x86_64",
          "SUSE Manager Server 4.1:reiserfs-kmp-default-5.3.18-150200.24.129.1.ppc64le",
          "SUSE Manager Server 4.1:reiserfs-kmp-default-5.3.18-150200.24.129.1.s390x",
          "SUSE Manager Server 4.1:reiserfs-kmp-default-5.3.18-150200.24.129.1.x86_64"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2020-36516",
          "url": "https://www.suse.com/security/cve/CVE-2020-36516"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1196616 for CVE-2020-36516",
          "url": "https://bugzilla.suse.com/1196616"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1196867 for CVE-2020-36516",
          "url": "https://bugzilla.suse.com/1196867"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1204092 for CVE-2020-36516",
          "url": "https://bugzilla.suse.com/1204092"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1204183 for CVE-2020-36516",
          "url": "https://bugzilla.suse.com/1204183"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "SUSE Enterprise Storage 7:kernel-default-5.3.18-150200.24.129.1.aarch64",
            "SUSE Enterprise Storage 7:kernel-default-5.3.18-150200.24.129.1.x86_64",
            "SUSE Enterprise Storage 7:kernel-default-base-5.3.18-150200.24.129.1.150200.9.61.1.aarch64",
            "SUSE Enterprise Storage 7:kernel-default-base-5.3.18-150200.24.129.1.150200.9.61.1.x86_64",
            "SUSE Enterprise Storage 7:kernel-default-devel-5.3.18-150200.24.129.1.aarch64",
            "SUSE Enterprise Storage 7:kernel-default-devel-5.3.18-150200.24.129.1.x86_64",
            "SUSE Enterprise Storage 7:kernel-devel-5.3.18-150200.24.129.1.noarch",
            "SUSE Enterprise Storage 7:kernel-docs-5.3.18-150200.24.129.1.noarch",
            "SUSE Enterprise Storage 7:kernel-macros-5.3.18-150200.24.129.1.noarch",
            "SUSE Enterprise Storage 7:kernel-obs-build-5.3.18-150200.24.129.1.aarch64",
            "SUSE Enterprise Storage 7:kernel-obs-build-5.3.18-150200.24.129.1.x86_64",
            "SUSE Enterprise Storage 7:kernel-preempt-5.3.18-150200.24.129.1.aarch64",
            "SUSE Enterprise Storage 7:kernel-preempt-5.3.18-150200.24.129.1.x86_64",
            "SUSE Enterprise Storage 7:kernel-preempt-devel-5.3.18-150200.24.129.1.aarch64",
            "SUSE Enterprise Storage 7:kernel-preempt-devel-5.3.18-150200.24.129.1.x86_64",
            "SUSE Enterprise Storage 7:kernel-source-5.3.18-150200.24.129.1.noarch",
            "SUSE Enterprise Storage 7:kernel-syms-5.3.18-150200.24.129.1.aarch64",
            "SUSE Enterprise Storage 7:kernel-syms-5.3.18-150200.24.129.1.x86_64",
            "SUSE Enterprise Storage 7:reiserfs-kmp-default-5.3.18-150200.24.129.1.aarch64",
            "SUSE Enterprise Storage 7:reiserfs-kmp-default-5.3.18-150200.24.129.1.x86_64",
            "SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-150200.24.129.1.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-150200.24.129.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-150200.24.129.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-150200.24.129.1.x86_64",
            "SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-150200.24.129.1.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-150200.24.129.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-150200.24.129.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-150200.24.129.1.x86_64",
            "SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-150200.24.129.1.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-150200.24.129.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-150200.24.129.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-150200.24.129.1.x86_64",
            "SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-150200.24.129.1.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-150200.24.129.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-150200.24.129.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-150200.24.129.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-default-5.3.18-150200.24.129.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-default-5.3.18-150200.24.129.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-default-base-5.3.18-150200.24.129.1.150200.9.61.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-default-base-5.3.18-150200.24.129.1.150200.9.61.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-default-devel-5.3.18-150200.24.129.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-default-devel-5.3.18-150200.24.129.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-devel-5.3.18-150200.24.129.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-docs-5.3.18-150200.24.129.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-macros-5.3.18-150200.24.129.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-obs-build-5.3.18-150200.24.129.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-obs-build-5.3.18-150200.24.129.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-preempt-5.3.18-150200.24.129.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-preempt-5.3.18-150200.24.129.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-preempt-devel-5.3.18-150200.24.129.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-preempt-devel-5.3.18-150200.24.129.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-source-5.3.18-150200.24.129.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-syms-5.3.18-150200.24.129.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-syms-5.3.18-150200.24.129.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-5.3.18-150200.24.129.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-5.3.18-150200.24.129.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.129.1.150200.9.61.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.129.1.150200.9.61.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.129.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.129.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-devel-5.3.18-150200.24.129.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-docs-5.3.18-150200.24.129.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-macros-5.3.18-150200.24.129.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.129.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.129.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-preempt-5.3.18-150200.24.129.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-preempt-5.3.18-150200.24.129.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-preempt-devel-5.3.18-150200.24.129.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-preempt-devel-5.3.18-150200.24.129.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-source-5.3.18-150200.24.129.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.129.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.129.1.x86_64",
            "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-5.3.18-150200.24.129.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-5.3.18-150200.24.129.1.s390x",
            "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-5.3.18-150200.24.129.1.x86_64",
            "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-devel-5.3.18-150200.24.129.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-devel-5.3.18-150200.24.129.1.s390x",
            "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-devel-5.3.18-150200.24.129.1.x86_64",
            "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-150200_24_129-default-1-150200.5.3.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-150200_24_129-default-1-150200.5.3.1.s390x",
            "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-150200_24_129-default-1-150200.5.3.1.x86_64",
            "SUSE Linux Enterprise Server 15 SP2-BCL:kernel-default-5.3.18-150200.24.129.1.x86_64",
            "SUSE Linux Enterprise Server 15 SP2-BCL:kernel-default-base-5.3.18-150200.24.129.1.150200.9.61.1.x86_64",
            "SUSE Linux Enterprise Server 15 SP2-BCL:kernel-default-devel-5.3.18-150200.24.129.1.x86_64",
            "SUSE Linux Enterprise Server 15 SP2-BCL:kernel-devel-5.3.18-150200.24.129.1.noarch",
            "SUSE Linux Enterprise Server 15 SP2-BCL:kernel-docs-5.3.18-150200.24.129.1.noarch",
            "SUSE Linux Enterprise Server 15 SP2-BCL:kernel-macros-5.3.18-150200.24.129.1.noarch",
            "SUSE Linux Enterprise Server 15 SP2-BCL:kernel-obs-build-5.3.18-150200.24.129.1.x86_64",
            "SUSE Linux Enterprise Server 15 SP2-BCL:kernel-preempt-5.3.18-150200.24.129.1.x86_64",
            "SUSE Linux Enterprise Server 15 SP2-BCL:kernel-preempt-devel-5.3.18-150200.24.129.1.x86_64",
            "SUSE Linux Enterprise Server 15 SP2-BCL:kernel-source-5.3.18-150200.24.129.1.noarch",
            "SUSE Linux Enterprise Server 15 SP2-BCL:kernel-syms-5.3.18-150200.24.129.1.x86_64",
            "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-5.3.18-150200.24.129.1.aarch64",
            "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-5.3.18-150200.24.129.1.ppc64le",
            "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-5.3.18-150200.24.129.1.s390x",
            "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-5.3.18-150200.24.129.1.x86_64",
            "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.129.1.150200.9.61.1.aarch64",
            "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.129.1.150200.9.61.1.ppc64le",
            "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.129.1.150200.9.61.1.s390x",
            "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.129.1.150200.9.61.1.x86_64",
            "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.129.1.aarch64",
            "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.129.1.ppc64le",
            "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.129.1.s390x",
            "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.129.1.x86_64",
            "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-devel-5.3.18-150200.24.129.1.noarch",
            "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-docs-5.3.18-150200.24.129.1.noarch",
            "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-macros-5.3.18-150200.24.129.1.noarch",
            "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.129.1.aarch64",
            "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.129.1.ppc64le",
            "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.129.1.s390x",
            "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.129.1.x86_64",
            "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-preempt-5.3.18-150200.24.129.1.aarch64",
            "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-preempt-5.3.18-150200.24.129.1.x86_64",
            "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-preempt-devel-5.3.18-150200.24.129.1.aarch64",
            "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-preempt-devel-5.3.18-150200.24.129.1.x86_64",
            "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-source-5.3.18-150200.24.129.1.noarch",
            "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.129.1.aarch64",
            "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.129.1.ppc64le",
            "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.129.1.s390x",
            "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.129.1.x86_64",
            "SUSE Linux Enterprise Server 15 SP2-LTSS:reiserfs-kmp-default-5.3.18-150200.24.129.1.aarch64",
            "SUSE Linux Enterprise Server 15 SP2-LTSS:reiserfs-kmp-default-5.3.18-150200.24.129.1.ppc64le",
            "SUSE Linux Enterprise Server 15 SP2-LTSS:reiserfs-kmp-default-5.3.18-150200.24.129.1.s390x",
            "SUSE Linux Enterprise Server 15 SP2-LTSS:reiserfs-kmp-default-5.3.18-150200.24.129.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-5.3.18-150200.24.129.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-5.3.18-150200.24.129.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-base-5.3.18-150200.24.129.1.150200.9.61.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-base-5.3.18-150200.24.129.1.150200.9.61.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-devel-5.3.18-150200.24.129.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-devel-5.3.18-150200.24.129.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-devel-5.3.18-150200.24.129.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-docs-5.3.18-150200.24.129.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-macros-5.3.18-150200.24.129.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-obs-build-5.3.18-150200.24.129.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-obs-build-5.3.18-150200.24.129.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-preempt-5.3.18-150200.24.129.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-preempt-devel-5.3.18-150200.24.129.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-source-5.3.18-150200.24.129.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-syms-5.3.18-150200.24.129.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-syms-5.3.18-150200.24.129.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP2:reiserfs-kmp-default-5.3.18-150200.24.129.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP2:reiserfs-kmp-default-5.3.18-150200.24.129.1.x86_64",
            "SUSE Manager Proxy 4.1:kernel-default-5.3.18-150200.24.129.1.x86_64",
            "SUSE Manager Proxy 4.1:kernel-default-base-5.3.18-150200.24.129.1.150200.9.61.1.x86_64",
            "SUSE Manager Proxy 4.1:kernel-default-devel-5.3.18-150200.24.129.1.x86_64",
            "SUSE Manager Proxy 4.1:kernel-devel-5.3.18-150200.24.129.1.noarch",
            "SUSE Manager Proxy 4.1:kernel-docs-5.3.18-150200.24.129.1.noarch",
            "SUSE Manager Proxy 4.1:kernel-macros-5.3.18-150200.24.129.1.noarch",
            "SUSE Manager Proxy 4.1:kernel-obs-build-5.3.18-150200.24.129.1.x86_64",
            "SUSE Manager Proxy 4.1:kernel-preempt-5.3.18-150200.24.129.1.x86_64",
            "SUSE Manager Proxy 4.1:kernel-preempt-devel-5.3.18-150200.24.129.1.x86_64",
            "SUSE Manager Proxy 4.1:kernel-source-5.3.18-150200.24.129.1.noarch",
            "SUSE Manager Proxy 4.1:kernel-syms-5.3.18-150200.24.129.1.x86_64",
            "SUSE Manager Proxy 4.1:reiserfs-kmp-default-5.3.18-150200.24.129.1.x86_64",
            "SUSE Manager Retail Branch Server 4.1:kernel-default-5.3.18-150200.24.129.1.x86_64",
            "SUSE Manager Retail Branch Server 4.1:kernel-default-base-5.3.18-150200.24.129.1.150200.9.61.1.x86_64",
            "SUSE Manager Retail Branch Server 4.1:kernel-default-devel-5.3.18-150200.24.129.1.x86_64",
            "SUSE Manager Retail Branch Server 4.1:kernel-devel-5.3.18-150200.24.129.1.noarch",
            "SUSE Manager Retail Branch Server 4.1:kernel-docs-5.3.18-150200.24.129.1.noarch",
            "SUSE Manager Retail Branch Server 4.1:kernel-macros-5.3.18-150200.24.129.1.noarch",
            "SUSE Manager Retail Branch Server 4.1:kernel-obs-build-5.3.18-150200.24.129.1.x86_64",
            "SUSE Manager Retail Branch Server 4.1:kernel-preempt-5.3.18-150200.24.129.1.x86_64",
            "SUSE Manager Retail Branch Server 4.1:kernel-preempt-devel-5.3.18-150200.24.129.1.x86_64",
            "SUSE Manager Retail Branch Server 4.1:kernel-source-5.3.18-150200.24.129.1.noarch",
            "SUSE Manager Retail Branch Server 4.1:kernel-syms-5.3.18-150200.24.129.1.x86_64",
            "SUSE Manager Retail Branch Server 4.1:reiserfs-kmp-default-5.3.18-150200.24.129.1.x86_64",
            "SUSE Manager Server 4.1:kernel-default-5.3.18-150200.24.129.1.ppc64le",
            "SUSE Manager Server 4.1:kernel-default-5.3.18-150200.24.129.1.s390x",
            "SUSE Manager Server 4.1:kernel-default-5.3.18-150200.24.129.1.x86_64",
            "SUSE Manager Server 4.1:kernel-default-base-5.3.18-150200.24.129.1.150200.9.61.1.ppc64le",
            "SUSE Manager Server 4.1:kernel-default-base-5.3.18-150200.24.129.1.150200.9.61.1.s390x",
            "SUSE Manager Server 4.1:kernel-default-base-5.3.18-150200.24.129.1.150200.9.61.1.x86_64",
            "SUSE Manager Server 4.1:kernel-default-devel-5.3.18-150200.24.129.1.ppc64le",
            "SUSE Manager Server 4.1:kernel-default-devel-5.3.18-150200.24.129.1.s390x",
            "SUSE Manager Server 4.1:kernel-default-devel-5.3.18-150200.24.129.1.x86_64",
            "SUSE Manager Server 4.1:kernel-devel-5.3.18-150200.24.129.1.noarch",
            "SUSE Manager Server 4.1:kernel-docs-5.3.18-150200.24.129.1.noarch",
            "SUSE Manager Server 4.1:kernel-macros-5.3.18-150200.24.129.1.noarch",
            "SUSE Manager Server 4.1:kernel-obs-build-5.3.18-150200.24.129.1.ppc64le",
            "SUSE Manager Server 4.1:kernel-obs-build-5.3.18-150200.24.129.1.s390x",
            "SUSE Manager Server 4.1:kernel-obs-build-5.3.18-150200.24.129.1.x86_64",
            "SUSE Manager Server 4.1:kernel-preempt-5.3.18-150200.24.129.1.x86_64",
            "SUSE Manager Server 4.1:kernel-preempt-devel-5.3.18-150200.24.129.1.x86_64",
            "SUSE Manager Server 4.1:kernel-source-5.3.18-150200.24.129.1.noarch",
            "SUSE Manager Server 4.1:kernel-syms-5.3.18-150200.24.129.1.ppc64le",
            "SUSE Manager Server 4.1:kernel-syms-5.3.18-150200.24.129.1.s390x",
            "SUSE Manager Server 4.1:kernel-syms-5.3.18-150200.24.129.1.x86_64",
            "SUSE Manager Server 4.1:reiserfs-kmp-default-5.3.18-150200.24.129.1.ppc64le",
            "SUSE Manager Server 4.1:reiserfs-kmp-default-5.3.18-150200.24.129.1.s390x",
            "SUSE Manager Server 4.1:reiserfs-kmp-default-5.3.18-150200.24.129.1.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 8.1,
            "baseSeverity": "HIGH",
            "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:H",
            "version": "3.1"
          },
          "products": [
            "SUSE Enterprise Storage 7:kernel-default-5.3.18-150200.24.129.1.aarch64",
            "SUSE Enterprise Storage 7:kernel-default-5.3.18-150200.24.129.1.x86_64",
            "SUSE Enterprise Storage 7:kernel-default-base-5.3.18-150200.24.129.1.150200.9.61.1.aarch64",
            "SUSE Enterprise Storage 7:kernel-default-base-5.3.18-150200.24.129.1.150200.9.61.1.x86_64",
            "SUSE Enterprise Storage 7:kernel-default-devel-5.3.18-150200.24.129.1.aarch64",
            "SUSE Enterprise Storage 7:kernel-default-devel-5.3.18-150200.24.129.1.x86_64",
            "SUSE Enterprise Storage 7:kernel-devel-5.3.18-150200.24.129.1.noarch",
            "SUSE Enterprise Storage 7:kernel-docs-5.3.18-150200.24.129.1.noarch",
            "SUSE Enterprise Storage 7:kernel-macros-5.3.18-150200.24.129.1.noarch",
            "SUSE Enterprise Storage 7:kernel-obs-build-5.3.18-150200.24.129.1.aarch64",
            "SUSE Enterprise Storage 7:kernel-obs-build-5.3.18-150200.24.129.1.x86_64",
            "SUSE Enterprise Storage 7:kernel-preempt-5.3.18-150200.24.129.1.aarch64",
            "SUSE Enterprise Storage 7:kernel-preempt-5.3.18-150200.24.129.1.x86_64",
            "SUSE Enterprise Storage 7:kernel-preempt-devel-5.3.18-150200.24.129.1.aarch64",
            "SUSE Enterprise Storage 7:kernel-preempt-devel-5.3.18-150200.24.129.1.x86_64",
            "SUSE Enterprise Storage 7:kernel-source-5.3.18-150200.24.129.1.noarch",
            "SUSE Enterprise Storage 7:kernel-syms-5.3.18-150200.24.129.1.aarch64",
            "SUSE Enterprise Storage 7:kernel-syms-5.3.18-150200.24.129.1.x86_64",
            "SUSE Enterprise Storage 7:reiserfs-kmp-default-5.3.18-150200.24.129.1.aarch64",
            "SUSE Enterprise Storage 7:reiserfs-kmp-default-5.3.18-150200.24.129.1.x86_64",
            "SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-150200.24.129.1.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-150200.24.129.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-150200.24.129.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-150200.24.129.1.x86_64",
            "SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-150200.24.129.1.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-150200.24.129.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-150200.24.129.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-150200.24.129.1.x86_64",
            "SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-150200.24.129.1.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-150200.24.129.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-150200.24.129.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-150200.24.129.1.x86_64",
            "SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-150200.24.129.1.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-150200.24.129.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-150200.24.129.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-150200.24.129.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-default-5.3.18-150200.24.129.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-default-5.3.18-150200.24.129.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-default-base-5.3.18-150200.24.129.1.150200.9.61.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-default-base-5.3.18-150200.24.129.1.150200.9.61.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-default-devel-5.3.18-150200.24.129.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-default-devel-5.3.18-150200.24.129.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-devel-5.3.18-150200.24.129.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-docs-5.3.18-150200.24.129.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-macros-5.3.18-150200.24.129.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-obs-build-5.3.18-150200.24.129.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-obs-build-5.3.18-150200.24.129.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-preempt-5.3.18-150200.24.129.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-preempt-5.3.18-150200.24.129.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-preempt-devel-5.3.18-150200.24.129.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-preempt-devel-5.3.18-150200.24.129.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-source-5.3.18-150200.24.129.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-syms-5.3.18-150200.24.129.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-syms-5.3.18-150200.24.129.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-5.3.18-150200.24.129.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-5.3.18-150200.24.129.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.129.1.150200.9.61.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.129.1.150200.9.61.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.129.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.129.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-devel-5.3.18-150200.24.129.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-docs-5.3.18-150200.24.129.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-macros-5.3.18-150200.24.129.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.129.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.129.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-preempt-5.3.18-150200.24.129.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-preempt-5.3.18-150200.24.129.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-preempt-devel-5.3.18-150200.24.129.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-preempt-devel-5.3.18-150200.24.129.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-source-5.3.18-150200.24.129.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.129.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.129.1.x86_64",
            "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-5.3.18-150200.24.129.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-5.3.18-150200.24.129.1.s390x",
            "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-5.3.18-150200.24.129.1.x86_64",
            "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-devel-5.3.18-150200.24.129.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-devel-5.3.18-150200.24.129.1.s390x",
            "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-devel-5.3.18-150200.24.129.1.x86_64",
            "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-150200_24_129-default-1-150200.5.3.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-150200_24_129-default-1-150200.5.3.1.s390x",
            "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-150200_24_129-default-1-150200.5.3.1.x86_64",
            "SUSE Linux Enterprise Server 15 SP2-BCL:kernel-default-5.3.18-150200.24.129.1.x86_64",
            "SUSE Linux Enterprise Server 15 SP2-BCL:kernel-default-base-5.3.18-150200.24.129.1.150200.9.61.1.x86_64",
            "SUSE Linux Enterprise Server 15 SP2-BCL:kernel-default-devel-5.3.18-150200.24.129.1.x86_64",
            "SUSE Linux Enterprise Server 15 SP2-BCL:kernel-devel-5.3.18-150200.24.129.1.noarch",
            "SUSE Linux Enterprise Server 15 SP2-BCL:kernel-docs-5.3.18-150200.24.129.1.noarch",
            "SUSE Linux Enterprise Server 15 SP2-BCL:kernel-macros-5.3.18-150200.24.129.1.noarch",
            "SUSE Linux Enterprise Server 15 SP2-BCL:kernel-obs-build-5.3.18-150200.24.129.1.x86_64",
            "SUSE Linux Enterprise Server 15 SP2-BCL:kernel-preempt-5.3.18-150200.24.129.1.x86_64",
            "SUSE Linux Enterprise Server 15 SP2-BCL:kernel-preempt-devel-5.3.18-150200.24.129.1.x86_64",
            "SUSE Linux Enterprise Server 15 SP2-BCL:kernel-source-5.3.18-150200.24.129.1.noarch",
            "SUSE Linux Enterprise Server 15 SP2-BCL:kernel-syms-5.3.18-150200.24.129.1.x86_64",
            "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-5.3.18-150200.24.129.1.aarch64",
            "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-5.3.18-150200.24.129.1.ppc64le",
            "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-5.3.18-150200.24.129.1.s390x",
            "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-5.3.18-150200.24.129.1.x86_64",
            "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.129.1.150200.9.61.1.aarch64",
            "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.129.1.150200.9.61.1.ppc64le",
            "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.129.1.150200.9.61.1.s390x",
            "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.129.1.150200.9.61.1.x86_64",
            "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.129.1.aarch64",
            "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.129.1.ppc64le",
            "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.129.1.s390x",
            "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.129.1.x86_64",
            "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-devel-5.3.18-150200.24.129.1.noarch",
            "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-docs-5.3.18-150200.24.129.1.noarch",
            "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-macros-5.3.18-150200.24.129.1.noarch",
            "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.129.1.aarch64",
            "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.129.1.ppc64le",
            "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.129.1.s390x",
            "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.129.1.x86_64",
            "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-preempt-5.3.18-150200.24.129.1.aarch64",
            "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-preempt-5.3.18-150200.24.129.1.x86_64",
            "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-preempt-devel-5.3.18-150200.24.129.1.aarch64",
            "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-preempt-devel-5.3.18-150200.24.129.1.x86_64",
            "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-source-5.3.18-150200.24.129.1.noarch",
            "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.129.1.aarch64",
            "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.129.1.ppc64le",
            "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.129.1.s390x",
            "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.129.1.x86_64",
            "SUSE Linux Enterprise Server 15 SP2-LTSS:reiserfs-kmp-default-5.3.18-150200.24.129.1.aarch64",
            "SUSE Linux Enterprise Server 15 SP2-LTSS:reiserfs-kmp-default-5.3.18-150200.24.129.1.ppc64le",
            "SUSE Linux Enterprise Server 15 SP2-LTSS:reiserfs-kmp-default-5.3.18-150200.24.129.1.s390x",
            "SUSE Linux Enterprise Server 15 SP2-LTSS:reiserfs-kmp-default-5.3.18-150200.24.129.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-5.3.18-150200.24.129.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-5.3.18-150200.24.129.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-base-5.3.18-150200.24.129.1.150200.9.61.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-base-5.3.18-150200.24.129.1.150200.9.61.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-devel-5.3.18-150200.24.129.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-devel-5.3.18-150200.24.129.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-devel-5.3.18-150200.24.129.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-docs-5.3.18-150200.24.129.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-macros-5.3.18-150200.24.129.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-obs-build-5.3.18-150200.24.129.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-obs-build-5.3.18-150200.24.129.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-preempt-5.3.18-150200.24.129.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-preempt-devel-5.3.18-150200.24.129.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-source-5.3.18-150200.24.129.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-syms-5.3.18-150200.24.129.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-syms-5.3.18-150200.24.129.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP2:reiserfs-kmp-default-5.3.18-150200.24.129.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP2:reiserfs-kmp-default-5.3.18-150200.24.129.1.x86_64",
            "SUSE Manager Proxy 4.1:kernel-default-5.3.18-150200.24.129.1.x86_64",
            "SUSE Manager Proxy 4.1:kernel-default-base-5.3.18-150200.24.129.1.150200.9.61.1.x86_64",
            "SUSE Manager Proxy 4.1:kernel-default-devel-5.3.18-150200.24.129.1.x86_64",
            "SUSE Manager Proxy 4.1:kernel-devel-5.3.18-150200.24.129.1.noarch",
            "SUSE Manager Proxy 4.1:kernel-docs-5.3.18-150200.24.129.1.noarch",
            "SUSE Manager Proxy 4.1:kernel-macros-5.3.18-150200.24.129.1.noarch",
            "SUSE Manager Proxy 4.1:kernel-obs-build-5.3.18-150200.24.129.1.x86_64",
            "SUSE Manager Proxy 4.1:kernel-preempt-5.3.18-150200.24.129.1.x86_64",
            "SUSE Manager Proxy 4.1:kernel-preempt-devel-5.3.18-150200.24.129.1.x86_64",
            "SUSE Manager Proxy 4.1:kernel-source-5.3.18-150200.24.129.1.noarch",
            "SUSE Manager Proxy 4.1:kernel-syms-5.3.18-150200.24.129.1.x86_64",
            "SUSE Manager Proxy 4.1:reiserfs-kmp-default-5.3.18-150200.24.129.1.x86_64",
            "SUSE Manager Retail Branch Server 4.1:kernel-default-5.3.18-150200.24.129.1.x86_64",
            "SUSE Manager Retail Branch Server 4.1:kernel-default-base-5.3.18-150200.24.129.1.150200.9.61.1.x86_64",
            "SUSE Manager Retail Branch Server 4.1:kernel-default-devel-5.3.18-150200.24.129.1.x86_64",
            "SUSE Manager Retail Branch Server 4.1:kernel-devel-5.3.18-150200.24.129.1.noarch",
            "SUSE Manager Retail Branch Server 4.1:kernel-docs-5.3.18-150200.24.129.1.noarch",
            "SUSE Manager Retail Branch Server 4.1:kernel-macros-5.3.18-150200.24.129.1.noarch",
            "SUSE Manager Retail Branch Server 4.1:kernel-obs-build-5.3.18-150200.24.129.1.x86_64",
            "SUSE Manager Retail Branch Server 4.1:kernel-preempt-5.3.18-150200.24.129.1.x86_64",
            "SUSE Manager Retail Branch Server 4.1:kernel-preempt-devel-5.3.18-150200.24.129.1.x86_64",
            "SUSE Manager Retail Branch Server 4.1:kernel-source-5.3.18-150200.24.129.1.noarch",
            "SUSE Manager Retail Branch Server 4.1:kernel-syms-5.3.18-150200.24.129.1.x86_64",
            "SUSE Manager Retail Branch Server 4.1:reiserfs-kmp-default-5.3.18-150200.24.129.1.x86_64",
            "SUSE Manager Server 4.1:kernel-default-5.3.18-150200.24.129.1.ppc64le",
            "SUSE Manager Server 4.1:kernel-default-5.3.18-150200.24.129.1.s390x",
            "SUSE Manager Server 4.1:kernel-default-5.3.18-150200.24.129.1.x86_64",
            "SUSE Manager Server 4.1:kernel-default-base-5.3.18-150200.24.129.1.150200.9.61.1.ppc64le",
            "SUSE Manager Server 4.1:kernel-default-base-5.3.18-150200.24.129.1.150200.9.61.1.s390x",
            "SUSE Manager Server 4.1:kernel-default-base-5.3.18-150200.24.129.1.150200.9.61.1.x86_64",
            "SUSE Manager Server 4.1:kernel-default-devel-5.3.18-150200.24.129.1.ppc64le",
            "SUSE Manager Server 4.1:kernel-default-devel-5.3.18-150200.24.129.1.s390x",
            "SUSE Manager Server 4.1:kernel-default-devel-5.3.18-150200.24.129.1.x86_64",
            "SUSE Manager Server 4.1:kernel-devel-5.3.18-150200.24.129.1.noarch",
            "SUSE Manager Server 4.1:kernel-docs-5.3.18-150200.24.129.1.noarch",
            "SUSE Manager Server 4.1:kernel-macros-5.3.18-150200.24.129.1.noarch",
            "SUSE Manager Server 4.1:kernel-obs-build-5.3.18-150200.24.129.1.ppc64le",
            "SUSE Manager Server 4.1:kernel-obs-build-5.3.18-150200.24.129.1.s390x",
            "SUSE Manager Server 4.1:kernel-obs-build-5.3.18-150200.24.129.1.x86_64",
            "SUSE Manager Server 4.1:kernel-preempt-5.3.18-150200.24.129.1.x86_64",
            "SUSE Manager Server 4.1:kernel-preempt-devel-5.3.18-150200.24.129.1.x86_64",
            "SUSE Manager Server 4.1:kernel-source-5.3.18-150200.24.129.1.noarch",
            "SUSE Manager Server 4.1:kernel-syms-5.3.18-150200.24.129.1.ppc64le",
            "SUSE Manager Server 4.1:kernel-syms-5.3.18-150200.24.129.1.s390x",
            "SUSE Manager Server 4.1:kernel-syms-5.3.18-150200.24.129.1.x86_64",
            "SUSE Manager Server 4.1:reiserfs-kmp-default-5.3.18-150200.24.129.1.ppc64le",
            "SUSE Manager Server 4.1:reiserfs-kmp-default-5.3.18-150200.24.129.1.s390x",
            "SUSE Manager Server 4.1:reiserfs-kmp-default-5.3.18-150200.24.129.1.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2022-09-28T06:48:59Z",
          "details": "important"
        }
      ],
      "title": "CVE-2020-36516"
    },
    {
      "cve": "CVE-2021-4155",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2021-4155"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "A data leak flaw was found in the way XFS_IOC_ALLOCSP IOCTL in the XFS filesystem allowed for size increase of files with unaligned size. A local attacker could use this flaw to leak data on the XFS filesystem otherwise not accessible to them.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "SUSE Enterprise Storage 7:kernel-default-5.3.18-150200.24.129.1.aarch64",
          "SUSE Enterprise Storage 7:kernel-default-5.3.18-150200.24.129.1.x86_64",
          "SUSE Enterprise Storage 7:kernel-default-base-5.3.18-150200.24.129.1.150200.9.61.1.aarch64",
          "SUSE Enterprise Storage 7:kernel-default-base-5.3.18-150200.24.129.1.150200.9.61.1.x86_64",
          "SUSE Enterprise Storage 7:kernel-default-devel-5.3.18-150200.24.129.1.aarch64",
          "SUSE Enterprise Storage 7:kernel-default-devel-5.3.18-150200.24.129.1.x86_64",
          "SUSE Enterprise Storage 7:kernel-devel-5.3.18-150200.24.129.1.noarch",
          "SUSE Enterprise Storage 7:kernel-docs-5.3.18-150200.24.129.1.noarch",
          "SUSE Enterprise Storage 7:kernel-macros-5.3.18-150200.24.129.1.noarch",
          "SUSE Enterprise Storage 7:kernel-obs-build-5.3.18-150200.24.129.1.aarch64",
          "SUSE Enterprise Storage 7:kernel-obs-build-5.3.18-150200.24.129.1.x86_64",
          "SUSE Enterprise Storage 7:kernel-preempt-5.3.18-150200.24.129.1.aarch64",
          "SUSE Enterprise Storage 7:kernel-preempt-5.3.18-150200.24.129.1.x86_64",
          "SUSE Enterprise Storage 7:kernel-preempt-devel-5.3.18-150200.24.129.1.aarch64",
          "SUSE Enterprise Storage 7:kernel-preempt-devel-5.3.18-150200.24.129.1.x86_64",
          "SUSE Enterprise Storage 7:kernel-source-5.3.18-150200.24.129.1.noarch",
          "SUSE Enterprise Storage 7:kernel-syms-5.3.18-150200.24.129.1.aarch64",
          "SUSE Enterprise Storage 7:kernel-syms-5.3.18-150200.24.129.1.x86_64",
          "SUSE Enterprise Storage 7:reiserfs-kmp-default-5.3.18-150200.24.129.1.aarch64",
          "SUSE Enterprise Storage 7:reiserfs-kmp-default-5.3.18-150200.24.129.1.x86_64",
          "SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-150200.24.129.1.aarch64",
          "SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-150200.24.129.1.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-150200.24.129.1.s390x",
          "SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-150200.24.129.1.x86_64",
          "SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-150200.24.129.1.aarch64",
          "SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-150200.24.129.1.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-150200.24.129.1.s390x",
          "SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-150200.24.129.1.x86_64",
          "SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-150200.24.129.1.aarch64",
          "SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-150200.24.129.1.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-150200.24.129.1.s390x",
          "SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-150200.24.129.1.x86_64",
          "SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-150200.24.129.1.aarch64",
          "SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-150200.24.129.1.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-150200.24.129.1.s390x",
          "SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-150200.24.129.1.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-default-5.3.18-150200.24.129.1.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-default-5.3.18-150200.24.129.1.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-default-base-5.3.18-150200.24.129.1.150200.9.61.1.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-default-base-5.3.18-150200.24.129.1.150200.9.61.1.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-default-devel-5.3.18-150200.24.129.1.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-default-devel-5.3.18-150200.24.129.1.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-devel-5.3.18-150200.24.129.1.noarch",
          "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-docs-5.3.18-150200.24.129.1.noarch",
          "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-macros-5.3.18-150200.24.129.1.noarch",
          "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-obs-build-5.3.18-150200.24.129.1.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-obs-build-5.3.18-150200.24.129.1.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-preempt-5.3.18-150200.24.129.1.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-preempt-5.3.18-150200.24.129.1.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-preempt-devel-5.3.18-150200.24.129.1.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-preempt-devel-5.3.18-150200.24.129.1.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-source-5.3.18-150200.24.129.1.noarch",
          "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-syms-5.3.18-150200.24.129.1.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-syms-5.3.18-150200.24.129.1.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-5.3.18-150200.24.129.1.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-5.3.18-150200.24.129.1.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.129.1.150200.9.61.1.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.129.1.150200.9.61.1.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.129.1.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.129.1.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-devel-5.3.18-150200.24.129.1.noarch",
          "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-docs-5.3.18-150200.24.129.1.noarch",
          "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-macros-5.3.18-150200.24.129.1.noarch",
          "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.129.1.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.129.1.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-preempt-5.3.18-150200.24.129.1.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-preempt-5.3.18-150200.24.129.1.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-preempt-devel-5.3.18-150200.24.129.1.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-preempt-devel-5.3.18-150200.24.129.1.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-source-5.3.18-150200.24.129.1.noarch",
          "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.129.1.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.129.1.x86_64",
          "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-5.3.18-150200.24.129.1.ppc64le",
          "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-5.3.18-150200.24.129.1.s390x",
          "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-5.3.18-150200.24.129.1.x86_64",
          "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-devel-5.3.18-150200.24.129.1.ppc64le",
          "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-devel-5.3.18-150200.24.129.1.s390x",
          "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-devel-5.3.18-150200.24.129.1.x86_64",
          "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-150200_24_129-default-1-150200.5.3.1.ppc64le",
          "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-150200_24_129-default-1-150200.5.3.1.s390x",
          "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-150200_24_129-default-1-150200.5.3.1.x86_64",
          "SUSE Linux Enterprise Server 15 SP2-BCL:kernel-default-5.3.18-150200.24.129.1.x86_64",
          "SUSE Linux Enterprise Server 15 SP2-BCL:kernel-default-base-5.3.18-150200.24.129.1.150200.9.61.1.x86_64",
          "SUSE Linux Enterprise Server 15 SP2-BCL:kernel-default-devel-5.3.18-150200.24.129.1.x86_64",
          "SUSE Linux Enterprise Server 15 SP2-BCL:kernel-devel-5.3.18-150200.24.129.1.noarch",
          "SUSE Linux Enterprise Server 15 SP2-BCL:kernel-docs-5.3.18-150200.24.129.1.noarch",
          "SUSE Linux Enterprise Server 15 SP2-BCL:kernel-macros-5.3.18-150200.24.129.1.noarch",
          "SUSE Linux Enterprise Server 15 SP2-BCL:kernel-obs-build-5.3.18-150200.24.129.1.x86_64",
          "SUSE Linux Enterprise Server 15 SP2-BCL:kernel-preempt-5.3.18-150200.24.129.1.x86_64",
          "SUSE Linux Enterprise Server 15 SP2-BCL:kernel-preempt-devel-5.3.18-150200.24.129.1.x86_64",
          "SUSE Linux Enterprise Server 15 SP2-BCL:kernel-source-5.3.18-150200.24.129.1.noarch",
          "SUSE Linux Enterprise Server 15 SP2-BCL:kernel-syms-5.3.18-150200.24.129.1.x86_64",
          "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-5.3.18-150200.24.129.1.aarch64",
          "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-5.3.18-150200.24.129.1.ppc64le",
          "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-5.3.18-150200.24.129.1.s390x",
          "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-5.3.18-150200.24.129.1.x86_64",
          "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.129.1.150200.9.61.1.aarch64",
          "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.129.1.150200.9.61.1.ppc64le",
          "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.129.1.150200.9.61.1.s390x",
          "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.129.1.150200.9.61.1.x86_64",
          "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.129.1.aarch64",
          "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.129.1.ppc64le",
          "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.129.1.s390x",
          "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.129.1.x86_64",
          "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-devel-5.3.18-150200.24.129.1.noarch",
          "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-docs-5.3.18-150200.24.129.1.noarch",
          "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-macros-5.3.18-150200.24.129.1.noarch",
          "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.129.1.aarch64",
          "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.129.1.ppc64le",
          "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.129.1.s390x",
          "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.129.1.x86_64",
          "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-preempt-5.3.18-150200.24.129.1.aarch64",
          "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-preempt-5.3.18-150200.24.129.1.x86_64",
          "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-preempt-devel-5.3.18-150200.24.129.1.aarch64",
          "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-preempt-devel-5.3.18-150200.24.129.1.x86_64",
          "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-source-5.3.18-150200.24.129.1.noarch",
          "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.129.1.aarch64",
          "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.129.1.ppc64le",
          "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.129.1.s390x",
          "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.129.1.x86_64",
          "SUSE Linux Enterprise Server 15 SP2-LTSS:reiserfs-kmp-default-5.3.18-150200.24.129.1.aarch64",
          "SUSE Linux Enterprise Server 15 SP2-LTSS:reiserfs-kmp-default-5.3.18-150200.24.129.1.ppc64le",
          "SUSE Linux Enterprise Server 15 SP2-LTSS:reiserfs-kmp-default-5.3.18-150200.24.129.1.s390x",
          "SUSE Linux Enterprise Server 15 SP2-LTSS:reiserfs-kmp-default-5.3.18-150200.24.129.1.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-5.3.18-150200.24.129.1.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-5.3.18-150200.24.129.1.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-base-5.3.18-150200.24.129.1.150200.9.61.1.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-base-5.3.18-150200.24.129.1.150200.9.61.1.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-devel-5.3.18-150200.24.129.1.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-devel-5.3.18-150200.24.129.1.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-devel-5.3.18-150200.24.129.1.noarch",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-docs-5.3.18-150200.24.129.1.noarch",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-macros-5.3.18-150200.24.129.1.noarch",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-obs-build-5.3.18-150200.24.129.1.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-obs-build-5.3.18-150200.24.129.1.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-preempt-5.3.18-150200.24.129.1.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-preempt-devel-5.3.18-150200.24.129.1.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-source-5.3.18-150200.24.129.1.noarch",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-syms-5.3.18-150200.24.129.1.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-syms-5.3.18-150200.24.129.1.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP2:reiserfs-kmp-default-5.3.18-150200.24.129.1.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP2:reiserfs-kmp-default-5.3.18-150200.24.129.1.x86_64",
          "SUSE Manager Proxy 4.1:kernel-default-5.3.18-150200.24.129.1.x86_64",
          "SUSE Manager Proxy 4.1:kernel-default-base-5.3.18-150200.24.129.1.150200.9.61.1.x86_64",
          "SUSE Manager Proxy 4.1:kernel-default-devel-5.3.18-150200.24.129.1.x86_64",
          "SUSE Manager Proxy 4.1:kernel-devel-5.3.18-150200.24.129.1.noarch",
          "SUSE Manager Proxy 4.1:kernel-docs-5.3.18-150200.24.129.1.noarch",
          "SUSE Manager Proxy 4.1:kernel-macros-5.3.18-150200.24.129.1.noarch",
          "SUSE Manager Proxy 4.1:kernel-obs-build-5.3.18-150200.24.129.1.x86_64",
          "SUSE Manager Proxy 4.1:kernel-preempt-5.3.18-150200.24.129.1.x86_64",
          "SUSE Manager Proxy 4.1:kernel-preempt-devel-5.3.18-150200.24.129.1.x86_64",
          "SUSE Manager Proxy 4.1:kernel-source-5.3.18-150200.24.129.1.noarch",
          "SUSE Manager Proxy 4.1:kernel-syms-5.3.18-150200.24.129.1.x86_64",
          "SUSE Manager Proxy 4.1:reiserfs-kmp-default-5.3.18-150200.24.129.1.x86_64",
          "SUSE Manager Retail Branch Server 4.1:kernel-default-5.3.18-150200.24.129.1.x86_64",
          "SUSE Manager Retail Branch Server 4.1:kernel-default-base-5.3.18-150200.24.129.1.150200.9.61.1.x86_64",
          "SUSE Manager Retail Branch Server 4.1:kernel-default-devel-5.3.18-150200.24.129.1.x86_64",
          "SUSE Manager Retail Branch Server 4.1:kernel-devel-5.3.18-150200.24.129.1.noarch",
          "SUSE Manager Retail Branch Server 4.1:kernel-docs-5.3.18-150200.24.129.1.noarch",
          "SUSE Manager Retail Branch Server 4.1:kernel-macros-5.3.18-150200.24.129.1.noarch",
          "SUSE Manager Retail Branch Server 4.1:kernel-obs-build-5.3.18-150200.24.129.1.x86_64",
          "SUSE Manager Retail Branch Server 4.1:kernel-preempt-5.3.18-150200.24.129.1.x86_64",
          "SUSE Manager Retail Branch Server 4.1:kernel-preempt-devel-5.3.18-150200.24.129.1.x86_64",
          "SUSE Manager Retail Branch Server 4.1:kernel-source-5.3.18-150200.24.129.1.noarch",
          "SUSE Manager Retail Branch Server 4.1:kernel-syms-5.3.18-150200.24.129.1.x86_64",
          "SUSE Manager Retail Branch Server 4.1:reiserfs-kmp-default-5.3.18-150200.24.129.1.x86_64",
          "SUSE Manager Server 4.1:kernel-default-5.3.18-150200.24.129.1.ppc64le",
          "SUSE Manager Server 4.1:kernel-default-5.3.18-150200.24.129.1.s390x",
          "SUSE Manager Server 4.1:kernel-default-5.3.18-150200.24.129.1.x86_64",
          "SUSE Manager Server 4.1:kernel-default-base-5.3.18-150200.24.129.1.150200.9.61.1.ppc64le",
          "SUSE Manager Server 4.1:kernel-default-base-5.3.18-150200.24.129.1.150200.9.61.1.s390x",
          "SUSE Manager Server 4.1:kernel-default-base-5.3.18-150200.24.129.1.150200.9.61.1.x86_64",
          "SUSE Manager Server 4.1:kernel-default-devel-5.3.18-150200.24.129.1.ppc64le",
          "SUSE Manager Server 4.1:kernel-default-devel-5.3.18-150200.24.129.1.s390x",
          "SUSE Manager Server 4.1:kernel-default-devel-5.3.18-150200.24.129.1.x86_64",
          "SUSE Manager Server 4.1:kernel-devel-5.3.18-150200.24.129.1.noarch",
          "SUSE Manager Server 4.1:kernel-docs-5.3.18-150200.24.129.1.noarch",
          "SUSE Manager Server 4.1:kernel-macros-5.3.18-150200.24.129.1.noarch",
          "SUSE Manager Server 4.1:kernel-obs-build-5.3.18-150200.24.129.1.ppc64le",
          "SUSE Manager Server 4.1:kernel-obs-build-5.3.18-150200.24.129.1.s390x",
          "SUSE Manager Server 4.1:kernel-obs-build-5.3.18-150200.24.129.1.x86_64",
          "SUSE Manager Server 4.1:kernel-preempt-5.3.18-150200.24.129.1.x86_64",
          "SUSE Manager Server 4.1:kernel-preempt-devel-5.3.18-150200.24.129.1.x86_64",
          "SUSE Manager Server 4.1:kernel-source-5.3.18-150200.24.129.1.noarch",
          "SUSE Manager Server 4.1:kernel-syms-5.3.18-150200.24.129.1.ppc64le",
          "SUSE Manager Server 4.1:kernel-syms-5.3.18-150200.24.129.1.s390x",
          "SUSE Manager Server 4.1:kernel-syms-5.3.18-150200.24.129.1.x86_64",
          "SUSE Manager Server 4.1:reiserfs-kmp-default-5.3.18-150200.24.129.1.ppc64le",
          "SUSE Manager Server 4.1:reiserfs-kmp-default-5.3.18-150200.24.129.1.s390x",
          "SUSE Manager Server 4.1:reiserfs-kmp-default-5.3.18-150200.24.129.1.x86_64"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2021-4155",
          "url": "https://www.suse.com/security/cve/CVE-2021-4155"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1194272 for CVE-2021-4155",
          "url": "https://bugzilla.suse.com/1194272"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1199255 for CVE-2021-4155",
          "url": "https://bugzilla.suse.com/1199255"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1200084 for CVE-2021-4155",
          "url": "https://bugzilla.suse.com/1200084"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "SUSE Enterprise Storage 7:kernel-default-5.3.18-150200.24.129.1.aarch64",
            "SUSE Enterprise Storage 7:kernel-default-5.3.18-150200.24.129.1.x86_64",
            "SUSE Enterprise Storage 7:kernel-default-base-5.3.18-150200.24.129.1.150200.9.61.1.aarch64",
            "SUSE Enterprise Storage 7:kernel-default-base-5.3.18-150200.24.129.1.150200.9.61.1.x86_64",
            "SUSE Enterprise Storage 7:kernel-default-devel-5.3.18-150200.24.129.1.aarch64",
            "SUSE Enterprise Storage 7:kernel-default-devel-5.3.18-150200.24.129.1.x86_64",
            "SUSE Enterprise Storage 7:kernel-devel-5.3.18-150200.24.129.1.noarch",
            "SUSE Enterprise Storage 7:kernel-docs-5.3.18-150200.24.129.1.noarch",
            "SUSE Enterprise Storage 7:kernel-macros-5.3.18-150200.24.129.1.noarch",
            "SUSE Enterprise Storage 7:kernel-obs-build-5.3.18-150200.24.129.1.aarch64",
            "SUSE Enterprise Storage 7:kernel-obs-build-5.3.18-150200.24.129.1.x86_64",
            "SUSE Enterprise Storage 7:kernel-preempt-5.3.18-150200.24.129.1.aarch64",
            "SUSE Enterprise Storage 7:kernel-preempt-5.3.18-150200.24.129.1.x86_64",
            "SUSE Enterprise Storage 7:kernel-preempt-devel-5.3.18-150200.24.129.1.aarch64",
            "SUSE Enterprise Storage 7:kernel-preempt-devel-5.3.18-150200.24.129.1.x86_64",
            "SUSE Enterprise Storage 7:kernel-source-5.3.18-150200.24.129.1.noarch",
            "SUSE Enterprise Storage 7:kernel-syms-5.3.18-150200.24.129.1.aarch64",
            "SUSE Enterprise Storage 7:kernel-syms-5.3.18-150200.24.129.1.x86_64",
            "SUSE Enterprise Storage 7:reiserfs-kmp-default-5.3.18-150200.24.129.1.aarch64",
            "SUSE Enterprise Storage 7:reiserfs-kmp-default-5.3.18-150200.24.129.1.x86_64",
            "SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-150200.24.129.1.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-150200.24.129.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-150200.24.129.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-150200.24.129.1.x86_64",
            "SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-150200.24.129.1.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-150200.24.129.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-150200.24.129.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-150200.24.129.1.x86_64",
            "SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-150200.24.129.1.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-150200.24.129.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-150200.24.129.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-150200.24.129.1.x86_64",
            "SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-150200.24.129.1.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-150200.24.129.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-150200.24.129.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-150200.24.129.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-default-5.3.18-150200.24.129.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-default-5.3.18-150200.24.129.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-default-base-5.3.18-150200.24.129.1.150200.9.61.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-default-base-5.3.18-150200.24.129.1.150200.9.61.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-default-devel-5.3.18-150200.24.129.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-default-devel-5.3.18-150200.24.129.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-devel-5.3.18-150200.24.129.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-docs-5.3.18-150200.24.129.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-macros-5.3.18-150200.24.129.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-obs-build-5.3.18-150200.24.129.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-obs-build-5.3.18-150200.24.129.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-preempt-5.3.18-150200.24.129.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-preempt-5.3.18-150200.24.129.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-preempt-devel-5.3.18-150200.24.129.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-preempt-devel-5.3.18-150200.24.129.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-source-5.3.18-150200.24.129.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-syms-5.3.18-150200.24.129.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-syms-5.3.18-150200.24.129.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-5.3.18-150200.24.129.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-5.3.18-150200.24.129.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.129.1.150200.9.61.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.129.1.150200.9.61.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.129.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.129.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-devel-5.3.18-150200.24.129.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-docs-5.3.18-150200.24.129.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-macros-5.3.18-150200.24.129.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.129.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.129.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-preempt-5.3.18-150200.24.129.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-preempt-5.3.18-150200.24.129.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-preempt-devel-5.3.18-150200.24.129.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-preempt-devel-5.3.18-150200.24.129.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-source-5.3.18-150200.24.129.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.129.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.129.1.x86_64",
            "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-5.3.18-150200.24.129.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-5.3.18-150200.24.129.1.s390x",
            "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-5.3.18-150200.24.129.1.x86_64",
            "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-devel-5.3.18-150200.24.129.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-devel-5.3.18-150200.24.129.1.s390x",
            "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-devel-5.3.18-150200.24.129.1.x86_64",
            "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-150200_24_129-default-1-150200.5.3.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-150200_24_129-default-1-150200.5.3.1.s390x",
            "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-150200_24_129-default-1-150200.5.3.1.x86_64",
            "SUSE Linux Enterprise Server 15 SP2-BCL:kernel-default-5.3.18-150200.24.129.1.x86_64",
            "SUSE Linux Enterprise Server 15 SP2-BCL:kernel-default-base-5.3.18-150200.24.129.1.150200.9.61.1.x86_64",
            "SUSE Linux Enterprise Server 15 SP2-BCL:kernel-default-devel-5.3.18-150200.24.129.1.x86_64",
            "SUSE Linux Enterprise Server 15 SP2-BCL:kernel-devel-5.3.18-150200.24.129.1.noarch",
            "SUSE Linux Enterprise Server 15 SP2-BCL:kernel-docs-5.3.18-150200.24.129.1.noarch",
            "SUSE Linux Enterprise Server 15 SP2-BCL:kernel-macros-5.3.18-150200.24.129.1.noarch",
            "SUSE Linux Enterprise Server 15 SP2-BCL:kernel-obs-build-5.3.18-150200.24.129.1.x86_64",
            "SUSE Linux Enterprise Server 15 SP2-BCL:kernel-preempt-5.3.18-150200.24.129.1.x86_64",
            "SUSE Linux Enterprise Server 15 SP2-BCL:kernel-preempt-devel-5.3.18-150200.24.129.1.x86_64",
            "SUSE Linux Enterprise Server 15 SP2-BCL:kernel-source-5.3.18-150200.24.129.1.noarch",
            "SUSE Linux Enterprise Server 15 SP2-BCL:kernel-syms-5.3.18-150200.24.129.1.x86_64",
            "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-5.3.18-150200.24.129.1.aarch64",
            "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-5.3.18-150200.24.129.1.ppc64le",
            "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-5.3.18-150200.24.129.1.s390x",
            "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-5.3.18-150200.24.129.1.x86_64",
            "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.129.1.150200.9.61.1.aarch64",
            "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.129.1.150200.9.61.1.ppc64le",
            "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.129.1.150200.9.61.1.s390x",
            "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.129.1.150200.9.61.1.x86_64",
            "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.129.1.aarch64",
            "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.129.1.ppc64le",
            "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.129.1.s390x",
            "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.129.1.x86_64",
            "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-devel-5.3.18-150200.24.129.1.noarch",
            "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-docs-5.3.18-150200.24.129.1.noarch",
            "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-macros-5.3.18-150200.24.129.1.noarch",
            "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.129.1.aarch64",
            "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.129.1.ppc64le",
            "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.129.1.s390x",
            "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.129.1.x86_64",
            "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-preempt-5.3.18-150200.24.129.1.aarch64",
            "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-preempt-5.3.18-150200.24.129.1.x86_64",
            "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-preempt-devel-5.3.18-150200.24.129.1.aarch64",
            "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-preempt-devel-5.3.18-150200.24.129.1.x86_64",
            "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-source-5.3.18-150200.24.129.1.noarch",
            "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.129.1.aarch64",
            "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.129.1.ppc64le",
            "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.129.1.s390x",
            "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.129.1.x86_64",
            "SUSE Linux Enterprise Server 15 SP2-LTSS:reiserfs-kmp-default-5.3.18-150200.24.129.1.aarch64",
            "SUSE Linux Enterprise Server 15 SP2-LTSS:reiserfs-kmp-default-5.3.18-150200.24.129.1.ppc64le",
            "SUSE Linux Enterprise Server 15 SP2-LTSS:reiserfs-kmp-default-5.3.18-150200.24.129.1.s390x",
            "SUSE Linux Enterprise Server 15 SP2-LTSS:reiserfs-kmp-default-5.3.18-150200.24.129.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-5.3.18-150200.24.129.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-5.3.18-150200.24.129.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-base-5.3.18-150200.24.129.1.150200.9.61.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-base-5.3.18-150200.24.129.1.150200.9.61.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-devel-5.3.18-150200.24.129.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-devel-5.3.18-150200.24.129.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-devel-5.3.18-150200.24.129.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-docs-5.3.18-150200.24.129.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-macros-5.3.18-150200.24.129.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-obs-build-5.3.18-150200.24.129.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-obs-build-5.3.18-150200.24.129.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-preempt-5.3.18-150200.24.129.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-preempt-devel-5.3.18-150200.24.129.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-source-5.3.18-150200.24.129.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-syms-5.3.18-150200.24.129.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-syms-5.3.18-150200.24.129.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP2:reiserfs-kmp-default-5.3.18-150200.24.129.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP2:reiserfs-kmp-default-5.3.18-150200.24.129.1.x86_64",
            "SUSE Manager Proxy 4.1:kernel-default-5.3.18-150200.24.129.1.x86_64",
            "SUSE Manager Proxy 4.1:kernel-default-base-5.3.18-150200.24.129.1.150200.9.61.1.x86_64",
            "SUSE Manager Proxy 4.1:kernel-default-devel-5.3.18-150200.24.129.1.x86_64",
            "SUSE Manager Proxy 4.1:kernel-devel-5.3.18-150200.24.129.1.noarch",
            "SUSE Manager Proxy 4.1:kernel-docs-5.3.18-150200.24.129.1.noarch",
            "SUSE Manager Proxy 4.1:kernel-macros-5.3.18-150200.24.129.1.noarch",
            "SUSE Manager Proxy 4.1:kernel-obs-build-5.3.18-150200.24.129.1.x86_64",
            "SUSE Manager Proxy 4.1:kernel-preempt-5.3.18-150200.24.129.1.x86_64",
            "SUSE Manager Proxy 4.1:kernel-preempt-devel-5.3.18-150200.24.129.1.x86_64",
            "SUSE Manager Proxy 4.1:kernel-source-5.3.18-150200.24.129.1.noarch",
            "SUSE Manager Proxy 4.1:kernel-syms-5.3.18-150200.24.129.1.x86_64",
            "SUSE Manager Proxy 4.1:reiserfs-kmp-default-5.3.18-150200.24.129.1.x86_64",
            "SUSE Manager Retail Branch Server 4.1:kernel-default-5.3.18-150200.24.129.1.x86_64",
            "SUSE Manager Retail Branch Server 4.1:kernel-default-base-5.3.18-150200.24.129.1.150200.9.61.1.x86_64",
            "SUSE Manager Retail Branch Server 4.1:kernel-default-devel-5.3.18-150200.24.129.1.x86_64",
            "SUSE Manager Retail Branch Server 4.1:kernel-devel-5.3.18-150200.24.129.1.noarch",
            "SUSE Manager Retail Branch Server 4.1:kernel-docs-5.3.18-150200.24.129.1.noarch",
            "SUSE Manager Retail Branch Server 4.1:kernel-macros-5.3.18-150200.24.129.1.noarch",
            "SUSE Manager Retail Branch Server 4.1:kernel-obs-build-5.3.18-150200.24.129.1.x86_64",
            "SUSE Manager Retail Branch Server 4.1:kernel-preempt-5.3.18-150200.24.129.1.x86_64",
            "SUSE Manager Retail Branch Server 4.1:kernel-preempt-devel-5.3.18-150200.24.129.1.x86_64",
            "SUSE Manager Retail Branch Server 4.1:kernel-source-5.3.18-150200.24.129.1.noarch",
            "SUSE Manager Retail Branch Server 4.1:kernel-syms-5.3.18-150200.24.129.1.x86_64",
            "SUSE Manager Retail Branch Server 4.1:reiserfs-kmp-default-5.3.18-150200.24.129.1.x86_64",
            "SUSE Manager Server 4.1:kernel-default-5.3.18-150200.24.129.1.ppc64le",
            "SUSE Manager Server 4.1:kernel-default-5.3.18-150200.24.129.1.s390x",
            "SUSE Manager Server 4.1:kernel-default-5.3.18-150200.24.129.1.x86_64",
            "SUSE Manager Server 4.1:kernel-default-base-5.3.18-150200.24.129.1.150200.9.61.1.ppc64le",
            "SUSE Manager Server 4.1:kernel-default-base-5.3.18-150200.24.129.1.150200.9.61.1.s390x",
            "SUSE Manager Server 4.1:kernel-default-base-5.3.18-150200.24.129.1.150200.9.61.1.x86_64",
            "SUSE Manager Server 4.1:kernel-default-devel-5.3.18-150200.24.129.1.ppc64le",
            "SUSE Manager Server 4.1:kernel-default-devel-5.3.18-150200.24.129.1.s390x",
            "SUSE Manager Server 4.1:kernel-default-devel-5.3.18-150200.24.129.1.x86_64",
            "SUSE Manager Server 4.1:kernel-devel-5.3.18-150200.24.129.1.noarch",
            "SUSE Manager Server 4.1:kernel-docs-5.3.18-150200.24.129.1.noarch",
            "SUSE Manager Server 4.1:kernel-macros-5.3.18-150200.24.129.1.noarch",
            "SUSE Manager Server 4.1:kernel-obs-build-5.3.18-150200.24.129.1.ppc64le",
            "SUSE Manager Server 4.1:kernel-obs-build-5.3.18-150200.24.129.1.s390x",
            "SUSE Manager Server 4.1:kernel-obs-build-5.3.18-150200.24.129.1.x86_64",
            "SUSE Manager Server 4.1:kernel-preempt-5.3.18-150200.24.129.1.x86_64",
            "SUSE Manager Server 4.1:kernel-preempt-devel-5.3.18-150200.24.129.1.x86_64",
            "SUSE Manager Server 4.1:kernel-source-5.3.18-150200.24.129.1.noarch",
            "SUSE Manager Server 4.1:kernel-syms-5.3.18-150200.24.129.1.ppc64le",
            "SUSE Manager Server 4.1:kernel-syms-5.3.18-150200.24.129.1.s390x",
            "SUSE Manager Server 4.1:kernel-syms-5.3.18-150200.24.129.1.x86_64",
            "SUSE Manager Server 4.1:reiserfs-kmp-default-5.3.18-150200.24.129.1.ppc64le",
            "SUSE Manager Server 4.1:reiserfs-kmp-default-5.3.18-150200.24.129.1.s390x",
            "SUSE Manager Server 4.1:reiserfs-kmp-default-5.3.18-150200.24.129.1.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 5.5,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N",
            "version": "3.1"
          },
          "products": [
            "SUSE Enterprise Storage 7:kernel-default-5.3.18-150200.24.129.1.aarch64",
            "SUSE Enterprise Storage 7:kernel-default-5.3.18-150200.24.129.1.x86_64",
            "SUSE Enterprise Storage 7:kernel-default-base-5.3.18-150200.24.129.1.150200.9.61.1.aarch64",
            "SUSE Enterprise Storage 7:kernel-default-base-5.3.18-150200.24.129.1.150200.9.61.1.x86_64",
            "SUSE Enterprise Storage 7:kernel-default-devel-5.3.18-150200.24.129.1.aarch64",
            "SUSE Enterprise Storage 7:kernel-default-devel-5.3.18-150200.24.129.1.x86_64",
            "SUSE Enterprise Storage 7:kernel-devel-5.3.18-150200.24.129.1.noarch",
            "SUSE Enterprise Storage 7:kernel-docs-5.3.18-150200.24.129.1.noarch",
            "SUSE Enterprise Storage 7:kernel-macros-5.3.18-150200.24.129.1.noarch",
            "SUSE Enterprise Storage 7:kernel-obs-build-5.3.18-150200.24.129.1.aarch64",
            "SUSE Enterprise Storage 7:kernel-obs-build-5.3.18-150200.24.129.1.x86_64",
            "SUSE Enterprise Storage 7:kernel-preempt-5.3.18-150200.24.129.1.aarch64",
            "SUSE Enterprise Storage 7:kernel-preempt-5.3.18-150200.24.129.1.x86_64",
            "SUSE Enterprise Storage 7:kernel-preempt-devel-5.3.18-150200.24.129.1.aarch64",
            "SUSE Enterprise Storage 7:kernel-preempt-devel-5.3.18-150200.24.129.1.x86_64",
            "SUSE Enterprise Storage 7:kernel-source-5.3.18-150200.24.129.1.noarch",
            "SUSE Enterprise Storage 7:kernel-syms-5.3.18-150200.24.129.1.aarch64",
            "SUSE Enterprise Storage 7:kernel-syms-5.3.18-150200.24.129.1.x86_64",
            "SUSE Enterprise Storage 7:reiserfs-kmp-default-5.3.18-150200.24.129.1.aarch64",
            "SUSE Enterprise Storage 7:reiserfs-kmp-default-5.3.18-150200.24.129.1.x86_64",
            "SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-150200.24.129.1.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-150200.24.129.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-150200.24.129.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-150200.24.129.1.x86_64",
            "SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-150200.24.129.1.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-150200.24.129.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-150200.24.129.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-150200.24.129.1.x86_64",
            "SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-150200.24.129.1.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-150200.24.129.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-150200.24.129.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-150200.24.129.1.x86_64",
            "SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-150200.24.129.1.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-150200.24.129.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-150200.24.129.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-150200.24.129.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-default-5.3.18-150200.24.129.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-default-5.3.18-150200.24.129.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-default-base-5.3.18-150200.24.129.1.150200.9.61.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-default-base-5.3.18-150200.24.129.1.150200.9.61.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-default-devel-5.3.18-150200.24.129.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-default-devel-5.3.18-150200.24.129.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-devel-5.3.18-150200.24.129.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-docs-5.3.18-150200.24.129.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-macros-5.3.18-150200.24.129.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-obs-build-5.3.18-150200.24.129.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-obs-build-5.3.18-150200.24.129.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-preempt-5.3.18-150200.24.129.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-preempt-5.3.18-150200.24.129.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-preempt-devel-5.3.18-150200.24.129.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-preempt-devel-5.3.18-150200.24.129.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-source-5.3.18-150200.24.129.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-syms-5.3.18-150200.24.129.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-syms-5.3.18-150200.24.129.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-5.3.18-150200.24.129.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-5.3.18-150200.24.129.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.129.1.150200.9.61.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.129.1.150200.9.61.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.129.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.129.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-devel-5.3.18-150200.24.129.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-docs-5.3.18-150200.24.129.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-macros-5.3.18-150200.24.129.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.129.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.129.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-preempt-5.3.18-150200.24.129.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-preempt-5.3.18-150200.24.129.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-preempt-devel-5.3.18-150200.24.129.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-preempt-devel-5.3.18-150200.24.129.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-source-5.3.18-150200.24.129.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.129.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.129.1.x86_64",
            "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-5.3.18-150200.24.129.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-5.3.18-150200.24.129.1.s390x",
            "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-5.3.18-150200.24.129.1.x86_64",
            "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-devel-5.3.18-150200.24.129.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-devel-5.3.18-150200.24.129.1.s390x",
            "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-devel-5.3.18-150200.24.129.1.x86_64",
            "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-150200_24_129-default-1-150200.5.3.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-150200_24_129-default-1-150200.5.3.1.s390x",
            "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-150200_24_129-default-1-150200.5.3.1.x86_64",
            "SUSE Linux Enterprise Server 15 SP2-BCL:kernel-default-5.3.18-150200.24.129.1.x86_64",
            "SUSE Linux Enterprise Server 15 SP2-BCL:kernel-default-base-5.3.18-150200.24.129.1.150200.9.61.1.x86_64",
            "SUSE Linux Enterprise Server 15 SP2-BCL:kernel-default-devel-5.3.18-150200.24.129.1.x86_64",
            "SUSE Linux Enterprise Server 15 SP2-BCL:kernel-devel-5.3.18-150200.24.129.1.noarch",
            "SUSE Linux Enterprise Server 15 SP2-BCL:kernel-docs-5.3.18-150200.24.129.1.noarch",
            "SUSE Linux Enterprise Server 15 SP2-BCL:kernel-macros-5.3.18-150200.24.129.1.noarch",
            "SUSE Linux Enterprise Server 15 SP2-BCL:kernel-obs-build-5.3.18-150200.24.129.1.x86_64",
            "SUSE Linux Enterprise Server 15 SP2-BCL:kernel-preempt-5.3.18-150200.24.129.1.x86_64",
            "SUSE Linux Enterprise Server 15 SP2-BCL:kernel-preempt-devel-5.3.18-150200.24.129.1.x86_64",
            "SUSE Linux Enterprise Server 15 SP2-BCL:kernel-source-5.3.18-150200.24.129.1.noarch",
            "SUSE Linux Enterprise Server 15 SP2-BCL:kernel-syms-5.3.18-150200.24.129.1.x86_64",
            "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-5.3.18-150200.24.129.1.aarch64",
            "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-5.3.18-150200.24.129.1.ppc64le",
            "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-5.3.18-150200.24.129.1.s390x",
            "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-5.3.18-150200.24.129.1.x86_64",
            "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.129.1.150200.9.61.1.aarch64",
            "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.129.1.150200.9.61.1.ppc64le",
            "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.129.1.150200.9.61.1.s390x",
            "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.129.1.150200.9.61.1.x86_64",
            "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.129.1.aarch64",
            "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.129.1.ppc64le",
            "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.129.1.s390x",
            "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.129.1.x86_64",
            "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-devel-5.3.18-150200.24.129.1.noarch",
            "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-docs-5.3.18-150200.24.129.1.noarch",
            "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-macros-5.3.18-150200.24.129.1.noarch",
            "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.129.1.aarch64",
            "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.129.1.ppc64le",
            "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.129.1.s390x",
            "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.129.1.x86_64",
            "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-preempt-5.3.18-150200.24.129.1.aarch64",
            "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-preempt-5.3.18-150200.24.129.1.x86_64",
            "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-preempt-devel-5.3.18-150200.24.129.1.aarch64",
            "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-preempt-devel-5.3.18-150200.24.129.1.x86_64",
            "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-source-5.3.18-150200.24.129.1.noarch",
            "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.129.1.aarch64",
            "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.129.1.ppc64le",
            "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.129.1.s390x",
            "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.129.1.x86_64",
            "SUSE Linux Enterprise Server 15 SP2-LTSS:reiserfs-kmp-default-5.3.18-150200.24.129.1.aarch64",
            "SUSE Linux Enterprise Server 15 SP2-LTSS:reiserfs-kmp-default-5.3.18-150200.24.129.1.ppc64le",
            "SUSE Linux Enterprise Server 15 SP2-LTSS:reiserfs-kmp-default-5.3.18-150200.24.129.1.s390x",
            "SUSE Linux Enterprise Server 15 SP2-LTSS:reiserfs-kmp-default-5.3.18-150200.24.129.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-5.3.18-150200.24.129.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-5.3.18-150200.24.129.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-base-5.3.18-150200.24.129.1.150200.9.61.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-base-5.3.18-150200.24.129.1.150200.9.61.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-devel-5.3.18-150200.24.129.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-devel-5.3.18-150200.24.129.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-devel-5.3.18-150200.24.129.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-docs-5.3.18-150200.24.129.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-macros-5.3.18-150200.24.129.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-obs-build-5.3.18-150200.24.129.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-obs-build-5.3.18-150200.24.129.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-preempt-5.3.18-150200.24.129.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-preempt-devel-5.3.18-150200.24.129.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-source-5.3.18-150200.24.129.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-syms-5.3.18-150200.24.129.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-syms-5.3.18-150200.24.129.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP2:reiserfs-kmp-default-5.3.18-150200.24.129.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP2:reiserfs-kmp-default-5.3.18-150200.24.129.1.x86_64",
            "SUSE Manager Proxy 4.1:kernel-default-5.3.18-150200.24.129.1.x86_64",
            "SUSE Manager Proxy 4.1:kernel-default-base-5.3.18-150200.24.129.1.150200.9.61.1.x86_64",
            "SUSE Manager Proxy 4.1:kernel-default-devel-5.3.18-150200.24.129.1.x86_64",
            "SUSE Manager Proxy 4.1:kernel-devel-5.3.18-150200.24.129.1.noarch",
            "SUSE Manager Proxy 4.1:kernel-docs-5.3.18-150200.24.129.1.noarch",
            "SUSE Manager Proxy 4.1:kernel-macros-5.3.18-150200.24.129.1.noarch",
            "SUSE Manager Proxy 4.1:kernel-obs-build-5.3.18-150200.24.129.1.x86_64",
            "SUSE Manager Proxy 4.1:kernel-preempt-5.3.18-150200.24.129.1.x86_64",
            "SUSE Manager Proxy 4.1:kernel-preempt-devel-5.3.18-150200.24.129.1.x86_64",
            "SUSE Manager Proxy 4.1:kernel-source-5.3.18-150200.24.129.1.noarch",
            "SUSE Manager Proxy 4.1:kernel-syms-5.3.18-150200.24.129.1.x86_64",
            "SUSE Manager Proxy 4.1:reiserfs-kmp-default-5.3.18-150200.24.129.1.x86_64",
            "SUSE Manager Retail Branch Server 4.1:kernel-default-5.3.18-150200.24.129.1.x86_64",
            "SUSE Manager Retail Branch Server 4.1:kernel-default-base-5.3.18-150200.24.129.1.150200.9.61.1.x86_64",
            "SUSE Manager Retail Branch Server 4.1:kernel-default-devel-5.3.18-150200.24.129.1.x86_64",
            "SUSE Manager Retail Branch Server 4.1:kernel-devel-5.3.18-150200.24.129.1.noarch",
            "SUSE Manager Retail Branch Server 4.1:kernel-docs-5.3.18-150200.24.129.1.noarch",
            "SUSE Manager Retail Branch Server 4.1:kernel-macros-5.3.18-150200.24.129.1.noarch",
            "SUSE Manager Retail Branch Server 4.1:kernel-obs-build-5.3.18-150200.24.129.1.x86_64",
            "SUSE Manager Retail Branch Server 4.1:kernel-preempt-5.3.18-150200.24.129.1.x86_64",
            "SUSE Manager Retail Branch Server 4.1:kernel-preempt-devel-5.3.18-150200.24.129.1.x86_64",
            "SUSE Manager Retail Branch Server 4.1:kernel-source-5.3.18-150200.24.129.1.noarch",
            "SUSE Manager Retail Branch Server 4.1:kernel-syms-5.3.18-150200.24.129.1.x86_64",
            "SUSE Manager Retail Branch Server 4.1:reiserfs-kmp-default-5.3.18-150200.24.129.1.x86_64",
            "SUSE Manager Server 4.1:kernel-default-5.3.18-150200.24.129.1.ppc64le",
            "SUSE Manager Server 4.1:kernel-default-5.3.18-150200.24.129.1.s390x",
            "SUSE Manager Server 4.1:kernel-default-5.3.18-150200.24.129.1.x86_64",
            "SUSE Manager Server 4.1:kernel-default-base-5.3.18-150200.24.129.1.150200.9.61.1.ppc64le",
            "SUSE Manager Server 4.1:kernel-default-base-5.3.18-150200.24.129.1.150200.9.61.1.s390x",
            "SUSE Manager Server 4.1:kernel-default-base-5.3.18-150200.24.129.1.150200.9.61.1.x86_64",
            "SUSE Manager Server 4.1:kernel-default-devel-5.3.18-150200.24.129.1.ppc64le",
            "SUSE Manager Server 4.1:kernel-default-devel-5.3.18-150200.24.129.1.s390x",
            "SUSE Manager Server 4.1:kernel-default-devel-5.3.18-150200.24.129.1.x86_64",
            "SUSE Manager Server 4.1:kernel-devel-5.3.18-150200.24.129.1.noarch",
            "SUSE Manager Server 4.1:kernel-docs-5.3.18-150200.24.129.1.noarch",
            "SUSE Manager Server 4.1:kernel-macros-5.3.18-150200.24.129.1.noarch",
            "SUSE Manager Server 4.1:kernel-obs-build-5.3.18-150200.24.129.1.ppc64le",
            "SUSE Manager Server 4.1:kernel-obs-build-5.3.18-150200.24.129.1.s390x",
            "SUSE Manager Server 4.1:kernel-obs-build-5.3.18-150200.24.129.1.x86_64",
            "SUSE Manager Server 4.1:kernel-preempt-5.3.18-150200.24.129.1.x86_64",
            "SUSE Manager Server 4.1:kernel-preempt-devel-5.3.18-150200.24.129.1.x86_64",
            "SUSE Manager Server 4.1:kernel-source-5.3.18-150200.24.129.1.noarch",
            "SUSE Manager Server 4.1:kernel-syms-5.3.18-150200.24.129.1.ppc64le",
            "SUSE Manager Server 4.1:kernel-syms-5.3.18-150200.24.129.1.s390x",
            "SUSE Manager Server 4.1:kernel-syms-5.3.18-150200.24.129.1.x86_64",
            "SUSE Manager Server 4.1:reiserfs-kmp-default-5.3.18-150200.24.129.1.ppc64le",
            "SUSE Manager Server 4.1:reiserfs-kmp-default-5.3.18-150200.24.129.1.s390x",
            "SUSE Manager Server 4.1:reiserfs-kmp-default-5.3.18-150200.24.129.1.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2022-09-28T06:48:59Z",
          "details": "moderate"
        }
      ],
      "title": "CVE-2021-4155"
    },
    {
      "cve": "CVE-2021-4203",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2021-4203"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "A use-after-free read flaw was found in sock_getsockopt() in net/core/sock.c due to SO_PEERCRED and SO_PEERGROUPS race with listen() (and connect()) in the Linux kernel. In this flaw, an attacker with a user privileges may crash the system or leak internal kernel information.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "SUSE Enterprise Storage 7:kernel-default-5.3.18-150200.24.129.1.aarch64",
          "SUSE Enterprise Storage 7:kernel-default-5.3.18-150200.24.129.1.x86_64",
          "SUSE Enterprise Storage 7:kernel-default-base-5.3.18-150200.24.129.1.150200.9.61.1.aarch64",
          "SUSE Enterprise Storage 7:kernel-default-base-5.3.18-150200.24.129.1.150200.9.61.1.x86_64",
          "SUSE Enterprise Storage 7:kernel-default-devel-5.3.18-150200.24.129.1.aarch64",
          "SUSE Enterprise Storage 7:kernel-default-devel-5.3.18-150200.24.129.1.x86_64",
          "SUSE Enterprise Storage 7:kernel-devel-5.3.18-150200.24.129.1.noarch",
          "SUSE Enterprise Storage 7:kernel-docs-5.3.18-150200.24.129.1.noarch",
          "SUSE Enterprise Storage 7:kernel-macros-5.3.18-150200.24.129.1.noarch",
          "SUSE Enterprise Storage 7:kernel-obs-build-5.3.18-150200.24.129.1.aarch64",
          "SUSE Enterprise Storage 7:kernel-obs-build-5.3.18-150200.24.129.1.x86_64",
          "SUSE Enterprise Storage 7:kernel-preempt-5.3.18-150200.24.129.1.aarch64",
          "SUSE Enterprise Storage 7:kernel-preempt-5.3.18-150200.24.129.1.x86_64",
          "SUSE Enterprise Storage 7:kernel-preempt-devel-5.3.18-150200.24.129.1.aarch64",
          "SUSE Enterprise Storage 7:kernel-preempt-devel-5.3.18-150200.24.129.1.x86_64",
          "SUSE Enterprise Storage 7:kernel-source-5.3.18-150200.24.129.1.noarch",
          "SUSE Enterprise Storage 7:kernel-syms-5.3.18-150200.24.129.1.aarch64",
          "SUSE Enterprise Storage 7:kernel-syms-5.3.18-150200.24.129.1.x86_64",
          "SUSE Enterprise Storage 7:reiserfs-kmp-default-5.3.18-150200.24.129.1.aarch64",
          "SUSE Enterprise Storage 7:reiserfs-kmp-default-5.3.18-150200.24.129.1.x86_64",
          "SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-150200.24.129.1.aarch64",
          "SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-150200.24.129.1.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-150200.24.129.1.s390x",
          "SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-150200.24.129.1.x86_64",
          "SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-150200.24.129.1.aarch64",
          "SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-150200.24.129.1.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-150200.24.129.1.s390x",
          "SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-150200.24.129.1.x86_64",
          "SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-150200.24.129.1.aarch64",
          "SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-150200.24.129.1.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-150200.24.129.1.s390x",
          "SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-150200.24.129.1.x86_64",
          "SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-150200.24.129.1.aarch64",
          "SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-150200.24.129.1.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-150200.24.129.1.s390x",
          "SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-150200.24.129.1.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-default-5.3.18-150200.24.129.1.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-default-5.3.18-150200.24.129.1.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-default-base-5.3.18-150200.24.129.1.150200.9.61.1.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-default-base-5.3.18-150200.24.129.1.150200.9.61.1.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-default-devel-5.3.18-150200.24.129.1.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-default-devel-5.3.18-150200.24.129.1.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-devel-5.3.18-150200.24.129.1.noarch",
          "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-docs-5.3.18-150200.24.129.1.noarch",
          "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-macros-5.3.18-150200.24.129.1.noarch",
          "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-obs-build-5.3.18-150200.24.129.1.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-obs-build-5.3.18-150200.24.129.1.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-preempt-5.3.18-150200.24.129.1.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-preempt-5.3.18-150200.24.129.1.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-preempt-devel-5.3.18-150200.24.129.1.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-preempt-devel-5.3.18-150200.24.129.1.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-source-5.3.18-150200.24.129.1.noarch",
          "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-syms-5.3.18-150200.24.129.1.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-syms-5.3.18-150200.24.129.1.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-5.3.18-150200.24.129.1.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-5.3.18-150200.24.129.1.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.129.1.150200.9.61.1.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.129.1.150200.9.61.1.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.129.1.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.129.1.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-devel-5.3.18-150200.24.129.1.noarch",
          "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-docs-5.3.18-150200.24.129.1.noarch",
          "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-macros-5.3.18-150200.24.129.1.noarch",
          "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.129.1.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.129.1.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-preempt-5.3.18-150200.24.129.1.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-preempt-5.3.18-150200.24.129.1.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-preempt-devel-5.3.18-150200.24.129.1.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-preempt-devel-5.3.18-150200.24.129.1.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-source-5.3.18-150200.24.129.1.noarch",
          "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.129.1.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.129.1.x86_64",
          "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-5.3.18-150200.24.129.1.ppc64le",
          "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-5.3.18-150200.24.129.1.s390x",
          "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-5.3.18-150200.24.129.1.x86_64",
          "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-devel-5.3.18-150200.24.129.1.ppc64le",
          "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-devel-5.3.18-150200.24.129.1.s390x",
          "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-devel-5.3.18-150200.24.129.1.x86_64",
          "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-150200_24_129-default-1-150200.5.3.1.ppc64le",
          "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-150200_24_129-default-1-150200.5.3.1.s390x",
          "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-150200_24_129-default-1-150200.5.3.1.x86_64",
          "SUSE Linux Enterprise Server 15 SP2-BCL:kernel-default-5.3.18-150200.24.129.1.x86_64",
          "SUSE Linux Enterprise Server 15 SP2-BCL:kernel-default-base-5.3.18-150200.24.129.1.150200.9.61.1.x86_64",
          "SUSE Linux Enterprise Server 15 SP2-BCL:kernel-default-devel-5.3.18-150200.24.129.1.x86_64",
          "SUSE Linux Enterprise Server 15 SP2-BCL:kernel-devel-5.3.18-150200.24.129.1.noarch",
          "SUSE Linux Enterprise Server 15 SP2-BCL:kernel-docs-5.3.18-150200.24.129.1.noarch",
          "SUSE Linux Enterprise Server 15 SP2-BCL:kernel-macros-5.3.18-150200.24.129.1.noarch",
          "SUSE Linux Enterprise Server 15 SP2-BCL:kernel-obs-build-5.3.18-150200.24.129.1.x86_64",
          "SUSE Linux Enterprise Server 15 SP2-BCL:kernel-preempt-5.3.18-150200.24.129.1.x86_64",
          "SUSE Linux Enterprise Server 15 SP2-BCL:kernel-preempt-devel-5.3.18-150200.24.129.1.x86_64",
          "SUSE Linux Enterprise Server 15 SP2-BCL:kernel-source-5.3.18-150200.24.129.1.noarch",
          "SUSE Linux Enterprise Server 15 SP2-BCL:kernel-syms-5.3.18-150200.24.129.1.x86_64",
          "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-5.3.18-150200.24.129.1.aarch64",
          "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-5.3.18-150200.24.129.1.ppc64le",
          "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-5.3.18-150200.24.129.1.s390x",
          "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-5.3.18-150200.24.129.1.x86_64",
          "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.129.1.150200.9.61.1.aarch64",
          "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.129.1.150200.9.61.1.ppc64le",
          "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.129.1.150200.9.61.1.s390x",
          "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.129.1.150200.9.61.1.x86_64",
          "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.129.1.aarch64",
          "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.129.1.ppc64le",
          "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.129.1.s390x",
          "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.129.1.x86_64",
          "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-devel-5.3.18-150200.24.129.1.noarch",
          "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-docs-5.3.18-150200.24.129.1.noarch",
          "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-macros-5.3.18-150200.24.129.1.noarch",
          "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.129.1.aarch64",
          "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.129.1.ppc64le",
          "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.129.1.s390x",
          "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.129.1.x86_64",
          "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-preempt-5.3.18-150200.24.129.1.aarch64",
          "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-preempt-5.3.18-150200.24.129.1.x86_64",
          "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-preempt-devel-5.3.18-150200.24.129.1.aarch64",
          "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-preempt-devel-5.3.18-150200.24.129.1.x86_64",
          "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-source-5.3.18-150200.24.129.1.noarch",
          "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.129.1.aarch64",
          "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.129.1.ppc64le",
          "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.129.1.s390x",
          "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.129.1.x86_64",
          "SUSE Linux Enterprise Server 15 SP2-LTSS:reiserfs-kmp-default-5.3.18-150200.24.129.1.aarch64",
          "SUSE Linux Enterprise Server 15 SP2-LTSS:reiserfs-kmp-default-5.3.18-150200.24.129.1.ppc64le",
          "SUSE Linux Enterprise Server 15 SP2-LTSS:reiserfs-kmp-default-5.3.18-150200.24.129.1.s390x",
          "SUSE Linux Enterprise Server 15 SP2-LTSS:reiserfs-kmp-default-5.3.18-150200.24.129.1.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-5.3.18-150200.24.129.1.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-5.3.18-150200.24.129.1.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-base-5.3.18-150200.24.129.1.150200.9.61.1.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-base-5.3.18-150200.24.129.1.150200.9.61.1.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-devel-5.3.18-150200.24.129.1.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-devel-5.3.18-150200.24.129.1.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-devel-5.3.18-150200.24.129.1.noarch",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-docs-5.3.18-150200.24.129.1.noarch",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-macros-5.3.18-150200.24.129.1.noarch",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-obs-build-5.3.18-150200.24.129.1.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-obs-build-5.3.18-150200.24.129.1.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-preempt-5.3.18-150200.24.129.1.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-preempt-devel-5.3.18-150200.24.129.1.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-source-5.3.18-150200.24.129.1.noarch",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-syms-5.3.18-150200.24.129.1.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-syms-5.3.18-150200.24.129.1.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP2:reiserfs-kmp-default-5.3.18-150200.24.129.1.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP2:reiserfs-kmp-default-5.3.18-150200.24.129.1.x86_64",
          "SUSE Manager Proxy 4.1:kernel-default-5.3.18-150200.24.129.1.x86_64",
          "SUSE Manager Proxy 4.1:kernel-default-base-5.3.18-150200.24.129.1.150200.9.61.1.x86_64",
          "SUSE Manager Proxy 4.1:kernel-default-devel-5.3.18-150200.24.129.1.x86_64",
          "SUSE Manager Proxy 4.1:kernel-devel-5.3.18-150200.24.129.1.noarch",
          "SUSE Manager Proxy 4.1:kernel-docs-5.3.18-150200.24.129.1.noarch",
          "SUSE Manager Proxy 4.1:kernel-macros-5.3.18-150200.24.129.1.noarch",
          "SUSE Manager Proxy 4.1:kernel-obs-build-5.3.18-150200.24.129.1.x86_64",
          "SUSE Manager Proxy 4.1:kernel-preempt-5.3.18-150200.24.129.1.x86_64",
          "SUSE Manager Proxy 4.1:kernel-preempt-devel-5.3.18-150200.24.129.1.x86_64",
          "SUSE Manager Proxy 4.1:kernel-source-5.3.18-150200.24.129.1.noarch",
          "SUSE Manager Proxy 4.1:kernel-syms-5.3.18-150200.24.129.1.x86_64",
          "SUSE Manager Proxy 4.1:reiserfs-kmp-default-5.3.18-150200.24.129.1.x86_64",
          "SUSE Manager Retail Branch Server 4.1:kernel-default-5.3.18-150200.24.129.1.x86_64",
          "SUSE Manager Retail Branch Server 4.1:kernel-default-base-5.3.18-150200.24.129.1.150200.9.61.1.x86_64",
          "SUSE Manager Retail Branch Server 4.1:kernel-default-devel-5.3.18-150200.24.129.1.x86_64",
          "SUSE Manager Retail Branch Server 4.1:kernel-devel-5.3.18-150200.24.129.1.noarch",
          "SUSE Manager Retail Branch Server 4.1:kernel-docs-5.3.18-150200.24.129.1.noarch",
          "SUSE Manager Retail Branch Server 4.1:kernel-macros-5.3.18-150200.24.129.1.noarch",
          "SUSE Manager Retail Branch Server 4.1:kernel-obs-build-5.3.18-150200.24.129.1.x86_64",
          "SUSE Manager Retail Branch Server 4.1:kernel-preempt-5.3.18-150200.24.129.1.x86_64",
          "SUSE Manager Retail Branch Server 4.1:kernel-preempt-devel-5.3.18-150200.24.129.1.x86_64",
          "SUSE Manager Retail Branch Server 4.1:kernel-source-5.3.18-150200.24.129.1.noarch",
          "SUSE Manager Retail Branch Server 4.1:kernel-syms-5.3.18-150200.24.129.1.x86_64",
          "SUSE Manager Retail Branch Server 4.1:reiserfs-kmp-default-5.3.18-150200.24.129.1.x86_64",
          "SUSE Manager Server 4.1:kernel-default-5.3.18-150200.24.129.1.ppc64le",
          "SUSE Manager Server 4.1:kernel-default-5.3.18-150200.24.129.1.s390x",
          "SUSE Manager Server 4.1:kernel-default-5.3.18-150200.24.129.1.x86_64",
          "SUSE Manager Server 4.1:kernel-default-base-5.3.18-150200.24.129.1.150200.9.61.1.ppc64le",
          "SUSE Manager Server 4.1:kernel-default-base-5.3.18-150200.24.129.1.150200.9.61.1.s390x",
          "SUSE Manager Server 4.1:kernel-default-base-5.3.18-150200.24.129.1.150200.9.61.1.x86_64",
          "SUSE Manager Server 4.1:kernel-default-devel-5.3.18-150200.24.129.1.ppc64le",
          "SUSE Manager Server 4.1:kernel-default-devel-5.3.18-150200.24.129.1.s390x",
          "SUSE Manager Server 4.1:kernel-default-devel-5.3.18-150200.24.129.1.x86_64",
          "SUSE Manager Server 4.1:kernel-devel-5.3.18-150200.24.129.1.noarch",
          "SUSE Manager Server 4.1:kernel-docs-5.3.18-150200.24.129.1.noarch",
          "SUSE Manager Server 4.1:kernel-macros-5.3.18-150200.24.129.1.noarch",
          "SUSE Manager Server 4.1:kernel-obs-build-5.3.18-150200.24.129.1.ppc64le",
          "SUSE Manager Server 4.1:kernel-obs-build-5.3.18-150200.24.129.1.s390x",
          "SUSE Manager Server 4.1:kernel-obs-build-5.3.18-150200.24.129.1.x86_64",
          "SUSE Manager Server 4.1:kernel-preempt-5.3.18-150200.24.129.1.x86_64",
          "SUSE Manager Server 4.1:kernel-preempt-devel-5.3.18-150200.24.129.1.x86_64",
          "SUSE Manager Server 4.1:kernel-source-5.3.18-150200.24.129.1.noarch",
          "SUSE Manager Server 4.1:kernel-syms-5.3.18-150200.24.129.1.ppc64le",
          "SUSE Manager Server 4.1:kernel-syms-5.3.18-150200.24.129.1.s390x",
          "SUSE Manager Server 4.1:kernel-syms-5.3.18-150200.24.129.1.x86_64",
          "SUSE Manager Server 4.1:reiserfs-kmp-default-5.3.18-150200.24.129.1.ppc64le",
          "SUSE Manager Server 4.1:reiserfs-kmp-default-5.3.18-150200.24.129.1.s390x",
          "SUSE Manager Server 4.1:reiserfs-kmp-default-5.3.18-150200.24.129.1.x86_64"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2021-4203",
          "url": "https://www.suse.com/security/cve/CVE-2021-4203"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1194535 for CVE-2021-4203",
          "url": "https://bugzilla.suse.com/1194535"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "SUSE Enterprise Storage 7:kernel-default-5.3.18-150200.24.129.1.aarch64",
            "SUSE Enterprise Storage 7:kernel-default-5.3.18-150200.24.129.1.x86_64",
            "SUSE Enterprise Storage 7:kernel-default-base-5.3.18-150200.24.129.1.150200.9.61.1.aarch64",
            "SUSE Enterprise Storage 7:kernel-default-base-5.3.18-150200.24.129.1.150200.9.61.1.x86_64",
            "SUSE Enterprise Storage 7:kernel-default-devel-5.3.18-150200.24.129.1.aarch64",
            "SUSE Enterprise Storage 7:kernel-default-devel-5.3.18-150200.24.129.1.x86_64",
            "SUSE Enterprise Storage 7:kernel-devel-5.3.18-150200.24.129.1.noarch",
            "SUSE Enterprise Storage 7:kernel-docs-5.3.18-150200.24.129.1.noarch",
            "SUSE Enterprise Storage 7:kernel-macros-5.3.18-150200.24.129.1.noarch",
            "SUSE Enterprise Storage 7:kernel-obs-build-5.3.18-150200.24.129.1.aarch64",
            "SUSE Enterprise Storage 7:kernel-obs-build-5.3.18-150200.24.129.1.x86_64",
            "SUSE Enterprise Storage 7:kernel-preempt-5.3.18-150200.24.129.1.aarch64",
            "SUSE Enterprise Storage 7:kernel-preempt-5.3.18-150200.24.129.1.x86_64",
            "SUSE Enterprise Storage 7:kernel-preempt-devel-5.3.18-150200.24.129.1.aarch64",
            "SUSE Enterprise Storage 7:kernel-preempt-devel-5.3.18-150200.24.129.1.x86_64",
            "SUSE Enterprise Storage 7:kernel-source-5.3.18-150200.24.129.1.noarch",
            "SUSE Enterprise Storage 7:kernel-syms-5.3.18-150200.24.129.1.aarch64",
            "SUSE Enterprise Storage 7:kernel-syms-5.3.18-150200.24.129.1.x86_64",
            "SUSE Enterprise Storage 7:reiserfs-kmp-default-5.3.18-150200.24.129.1.aarch64",
            "SUSE Enterprise Storage 7:reiserfs-kmp-default-5.3.18-150200.24.129.1.x86_64",
            "SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-150200.24.129.1.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-150200.24.129.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-150200.24.129.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-150200.24.129.1.x86_64",
            "SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-150200.24.129.1.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-150200.24.129.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-150200.24.129.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-150200.24.129.1.x86_64",
            "SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-150200.24.129.1.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-150200.24.129.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-150200.24.129.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-150200.24.129.1.x86_64",
            "SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-150200.24.129.1.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-150200.24.129.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-150200.24.129.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-150200.24.129.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-default-5.3.18-150200.24.129.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-default-5.3.18-150200.24.129.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-default-base-5.3.18-150200.24.129.1.150200.9.61.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-default-base-5.3.18-150200.24.129.1.150200.9.61.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-default-devel-5.3.18-150200.24.129.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-default-devel-5.3.18-150200.24.129.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-devel-5.3.18-150200.24.129.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-docs-5.3.18-150200.24.129.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-macros-5.3.18-150200.24.129.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-obs-build-5.3.18-150200.24.129.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-obs-build-5.3.18-150200.24.129.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-preempt-5.3.18-150200.24.129.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-preempt-5.3.18-150200.24.129.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-preempt-devel-5.3.18-150200.24.129.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-preempt-devel-5.3.18-150200.24.129.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-source-5.3.18-150200.24.129.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-syms-5.3.18-150200.24.129.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-syms-5.3.18-150200.24.129.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-5.3.18-150200.24.129.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-5.3.18-150200.24.129.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.129.1.150200.9.61.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.129.1.150200.9.61.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.129.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.129.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-devel-5.3.18-150200.24.129.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-docs-5.3.18-150200.24.129.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-macros-5.3.18-150200.24.129.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.129.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.129.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-preempt-5.3.18-150200.24.129.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-preempt-5.3.18-150200.24.129.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-preempt-devel-5.3.18-150200.24.129.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-preempt-devel-5.3.18-150200.24.129.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-source-5.3.18-150200.24.129.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.129.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.129.1.x86_64",
            "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-5.3.18-150200.24.129.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-5.3.18-150200.24.129.1.s390x",
            "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-5.3.18-150200.24.129.1.x86_64",
            "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-devel-5.3.18-150200.24.129.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-devel-5.3.18-150200.24.129.1.s390x",
            "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-devel-5.3.18-150200.24.129.1.x86_64",
            "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-150200_24_129-default-1-150200.5.3.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-150200_24_129-default-1-150200.5.3.1.s390x",
            "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-150200_24_129-default-1-150200.5.3.1.x86_64",
            "SUSE Linux Enterprise Server 15 SP2-BCL:kernel-default-5.3.18-150200.24.129.1.x86_64",
            "SUSE Linux Enterprise Server 15 SP2-BCL:kernel-default-base-5.3.18-150200.24.129.1.150200.9.61.1.x86_64",
            "SUSE Linux Enterprise Server 15 SP2-BCL:kernel-default-devel-5.3.18-150200.24.129.1.x86_64",
            "SUSE Linux Enterprise Server 15 SP2-BCL:kernel-devel-5.3.18-150200.24.129.1.noarch",
            "SUSE Linux Enterprise Server 15 SP2-BCL:kernel-docs-5.3.18-150200.24.129.1.noarch",
            "SUSE Linux Enterprise Server 15 SP2-BCL:kernel-macros-5.3.18-150200.24.129.1.noarch",
            "SUSE Linux Enterprise Server 15 SP2-BCL:kernel-obs-build-5.3.18-150200.24.129.1.x86_64",
            "SUSE Linux Enterprise Server 15 SP2-BCL:kernel-preempt-5.3.18-150200.24.129.1.x86_64",
            "SUSE Linux Enterprise Server 15 SP2-BCL:kernel-preempt-devel-5.3.18-150200.24.129.1.x86_64",
            "SUSE Linux Enterprise Server 15 SP2-BCL:kernel-source-5.3.18-150200.24.129.1.noarch",
            "SUSE Linux Enterprise Server 15 SP2-BCL:kernel-syms-5.3.18-150200.24.129.1.x86_64",
            "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-5.3.18-150200.24.129.1.aarch64",
            "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-5.3.18-150200.24.129.1.ppc64le",
            "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-5.3.18-150200.24.129.1.s390x",
            "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-5.3.18-150200.24.129.1.x86_64",
            "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.129.1.150200.9.61.1.aarch64",
            "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.129.1.150200.9.61.1.ppc64le",
            "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.129.1.150200.9.61.1.s390x",
            "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.129.1.150200.9.61.1.x86_64",
            "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.129.1.aarch64",
            "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.129.1.ppc64le",
            "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.129.1.s390x",
            "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.129.1.x86_64",
            "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-devel-5.3.18-150200.24.129.1.noarch",
            "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-docs-5.3.18-150200.24.129.1.noarch",
            "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-macros-5.3.18-150200.24.129.1.noarch",
            "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.129.1.aarch64",
            "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.129.1.ppc64le",
            "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.129.1.s390x",
            "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.129.1.x86_64",
            "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-preempt-5.3.18-150200.24.129.1.aarch64",
            "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-preempt-5.3.18-150200.24.129.1.x86_64",
            "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-preempt-devel-5.3.18-150200.24.129.1.aarch64",
            "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-preempt-devel-5.3.18-150200.24.129.1.x86_64",
            "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-source-5.3.18-150200.24.129.1.noarch",
            "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.129.1.aarch64",
            "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.129.1.ppc64le",
            "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.129.1.s390x",
            "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.129.1.x86_64",
            "SUSE Linux Enterprise Server 15 SP2-LTSS:reiserfs-kmp-default-5.3.18-150200.24.129.1.aarch64",
            "SUSE Linux Enterprise Server 15 SP2-LTSS:reiserfs-kmp-default-5.3.18-150200.24.129.1.ppc64le",
            "SUSE Linux Enterprise Server 15 SP2-LTSS:reiserfs-kmp-default-5.3.18-150200.24.129.1.s390x",
            "SUSE Linux Enterprise Server 15 SP2-LTSS:reiserfs-kmp-default-5.3.18-150200.24.129.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-5.3.18-150200.24.129.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-5.3.18-150200.24.129.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-base-5.3.18-150200.24.129.1.150200.9.61.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-base-5.3.18-150200.24.129.1.150200.9.61.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-devel-5.3.18-150200.24.129.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-devel-5.3.18-150200.24.129.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-devel-5.3.18-150200.24.129.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-docs-5.3.18-150200.24.129.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-macros-5.3.18-150200.24.129.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-obs-build-5.3.18-150200.24.129.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-obs-build-5.3.18-150200.24.129.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-preempt-5.3.18-150200.24.129.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-preempt-devel-5.3.18-150200.24.129.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-source-5.3.18-150200.24.129.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-syms-5.3.18-150200.24.129.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-syms-5.3.18-150200.24.129.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP2:reiserfs-kmp-default-5.3.18-150200.24.129.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP2:reiserfs-kmp-default-5.3.18-150200.24.129.1.x86_64",
            "SUSE Manager Proxy 4.1:kernel-default-5.3.18-150200.24.129.1.x86_64",
            "SUSE Manager Proxy 4.1:kernel-default-base-5.3.18-150200.24.129.1.150200.9.61.1.x86_64",
            "SUSE Manager Proxy 4.1:kernel-default-devel-5.3.18-150200.24.129.1.x86_64",
            "SUSE Manager Proxy 4.1:kernel-devel-5.3.18-150200.24.129.1.noarch",
            "SUSE Manager Proxy 4.1:kernel-docs-5.3.18-150200.24.129.1.noarch",
            "SUSE Manager Proxy 4.1:kernel-macros-5.3.18-150200.24.129.1.noarch",
            "SUSE Manager Proxy 4.1:kernel-obs-build-5.3.18-150200.24.129.1.x86_64",
            "SUSE Manager Proxy 4.1:kernel-preempt-5.3.18-150200.24.129.1.x86_64",
            "SUSE Manager Proxy 4.1:kernel-preempt-devel-5.3.18-150200.24.129.1.x86_64",
            "SUSE Manager Proxy 4.1:kernel-source-5.3.18-150200.24.129.1.noarch",
            "SUSE Manager Proxy 4.1:kernel-syms-5.3.18-150200.24.129.1.x86_64",
            "SUSE Manager Proxy 4.1:reiserfs-kmp-default-5.3.18-150200.24.129.1.x86_64",
            "SUSE Manager Retail Branch Server 4.1:kernel-default-5.3.18-150200.24.129.1.x86_64",
            "SUSE Manager Retail Branch Server 4.1:kernel-default-base-5.3.18-150200.24.129.1.150200.9.61.1.x86_64",
            "SUSE Manager Retail Branch Server 4.1:kernel-default-devel-5.3.18-150200.24.129.1.x86_64",
            "SUSE Manager Retail Branch Server 4.1:kernel-devel-5.3.18-150200.24.129.1.noarch",
            "SUSE Manager Retail Branch Server 4.1:kernel-docs-5.3.18-150200.24.129.1.noarch",
            "SUSE Manager Retail Branch Server 4.1:kernel-macros-5.3.18-150200.24.129.1.noarch",
            "SUSE Manager Retail Branch Server 4.1:kernel-obs-build-5.3.18-150200.24.129.1.x86_64",
            "SUSE Manager Retail Branch Server 4.1:kernel-preempt-5.3.18-150200.24.129.1.x86_64",
            "SUSE Manager Retail Branch Server 4.1:kernel-preempt-devel-5.3.18-150200.24.129.1.x86_64",
            "SUSE Manager Retail Branch Server 4.1:kernel-source-5.3.18-150200.24.129.1.noarch",
            "SUSE Manager Retail Branch Server 4.1:kernel-syms-5.3.18-150200.24.129.1.x86_64",
            "SUSE Manager Retail Branch Server 4.1:reiserfs-kmp-default-5.3.18-150200.24.129.1.x86_64",
            "SUSE Manager Server 4.1:kernel-default-5.3.18-150200.24.129.1.ppc64le",
            "SUSE Manager Server 4.1:kernel-default-5.3.18-150200.24.129.1.s390x",
            "SUSE Manager Server 4.1:kernel-default-5.3.18-150200.24.129.1.x86_64",
            "SUSE Manager Server 4.1:kernel-default-base-5.3.18-150200.24.129.1.150200.9.61.1.ppc64le",
            "SUSE Manager Server 4.1:kernel-default-base-5.3.18-150200.24.129.1.150200.9.61.1.s390x",
            "SUSE Manager Server 4.1:kernel-default-base-5.3.18-150200.24.129.1.150200.9.61.1.x86_64",
            "SUSE Manager Server 4.1:kernel-default-devel-5.3.18-150200.24.129.1.ppc64le",
            "SUSE Manager Server 4.1:kernel-default-devel-5.3.18-150200.24.129.1.s390x",
            "SUSE Manager Server 4.1:kernel-default-devel-5.3.18-150200.24.129.1.x86_64",
            "SUSE Manager Server 4.1:kernel-devel-5.3.18-150200.24.129.1.noarch",
            "SUSE Manager Server 4.1:kernel-docs-5.3.18-150200.24.129.1.noarch",
            "SUSE Manager Server 4.1:kernel-macros-5.3.18-150200.24.129.1.noarch",
            "SUSE Manager Server 4.1:kernel-obs-build-5.3.18-150200.24.129.1.ppc64le",
            "SUSE Manager Server 4.1:kernel-obs-build-5.3.18-150200.24.129.1.s390x",
            "SUSE Manager Server 4.1:kernel-obs-build-5.3.18-150200.24.129.1.x86_64",
            "SUSE Manager Server 4.1:kernel-preempt-5.3.18-150200.24.129.1.x86_64",
            "SUSE Manager Server 4.1:kernel-preempt-devel-5.3.18-150200.24.129.1.x86_64",
            "SUSE Manager Server 4.1:kernel-source-5.3.18-150200.24.129.1.noarch",
            "SUSE Manager Server 4.1:kernel-syms-5.3.18-150200.24.129.1.ppc64le",
            "SUSE Manager Server 4.1:kernel-syms-5.3.18-150200.24.129.1.s390x",
            "SUSE Manager Server 4.1:kernel-syms-5.3.18-150200.24.129.1.x86_64",
            "SUSE Manager Server 4.1:reiserfs-kmp-default-5.3.18-150200.24.129.1.ppc64le",
            "SUSE Manager Server 4.1:reiserfs-kmp-default-5.3.18-150200.24.129.1.s390x",
            "SUSE Manager Server 4.1:reiserfs-kmp-default-5.3.18-150200.24.129.1.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 5.8,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:L/A:L",
            "version": "3.1"
          },
          "products": [
            "SUSE Enterprise Storage 7:kernel-default-5.3.18-150200.24.129.1.aarch64",
            "SUSE Enterprise Storage 7:kernel-default-5.3.18-150200.24.129.1.x86_64",
            "SUSE Enterprise Storage 7:kernel-default-base-5.3.18-150200.24.129.1.150200.9.61.1.aarch64",
            "SUSE Enterprise Storage 7:kernel-default-base-5.3.18-150200.24.129.1.150200.9.61.1.x86_64",
            "SUSE Enterprise Storage 7:kernel-default-devel-5.3.18-150200.24.129.1.aarch64",
            "SUSE Enterprise Storage 7:kernel-default-devel-5.3.18-150200.24.129.1.x86_64",
            "SUSE Enterprise Storage 7:kernel-devel-5.3.18-150200.24.129.1.noarch",
            "SUSE Enterprise Storage 7:kernel-docs-5.3.18-150200.24.129.1.noarch",
            "SUSE Enterprise Storage 7:kernel-macros-5.3.18-150200.24.129.1.noarch",
            "SUSE Enterprise Storage 7:kernel-obs-build-5.3.18-150200.24.129.1.aarch64",
            "SUSE Enterprise Storage 7:kernel-obs-build-5.3.18-150200.24.129.1.x86_64",
            "SUSE Enterprise Storage 7:kernel-preempt-5.3.18-150200.24.129.1.aarch64",
            "SUSE Enterprise Storage 7:kernel-preempt-5.3.18-150200.24.129.1.x86_64",
            "SUSE Enterprise Storage 7:kernel-preempt-devel-5.3.18-150200.24.129.1.aarch64",
            "SUSE Enterprise Storage 7:kernel-preempt-devel-5.3.18-150200.24.129.1.x86_64",
            "SUSE Enterprise Storage 7:kernel-source-5.3.18-150200.24.129.1.noarch",
            "SUSE Enterprise Storage 7:kernel-syms-5.3.18-150200.24.129.1.aarch64",
            "SUSE Enterprise Storage 7:kernel-syms-5.3.18-150200.24.129.1.x86_64",
            "SUSE Enterprise Storage 7:reiserfs-kmp-default-5.3.18-150200.24.129.1.aarch64",
            "SUSE Enterprise Storage 7:reiserfs-kmp-default-5.3.18-150200.24.129.1.x86_64",
            "SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-150200.24.129.1.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-150200.24.129.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-150200.24.129.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-150200.24.129.1.x86_64",
            "SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-150200.24.129.1.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-150200.24.129.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-150200.24.129.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-150200.24.129.1.x86_64",
            "SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-150200.24.129.1.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-150200.24.129.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-150200.24.129.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-150200.24.129.1.x86_64",
            "SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-150200.24.129.1.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-150200.24.129.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-150200.24.129.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-150200.24.129.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-default-5.3.18-150200.24.129.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-default-5.3.18-150200.24.129.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-default-base-5.3.18-150200.24.129.1.150200.9.61.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-default-base-5.3.18-150200.24.129.1.150200.9.61.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-default-devel-5.3.18-150200.24.129.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-default-devel-5.3.18-150200.24.129.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-devel-5.3.18-150200.24.129.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-docs-5.3.18-150200.24.129.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-macros-5.3.18-150200.24.129.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-obs-build-5.3.18-150200.24.129.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-obs-build-5.3.18-150200.24.129.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-preempt-5.3.18-150200.24.129.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-preempt-5.3.18-150200.24.129.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-preempt-devel-5.3.18-150200.24.129.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-preempt-devel-5.3.18-150200.24.129.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-source-5.3.18-150200.24.129.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-syms-5.3.18-150200.24.129.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-syms-5.3.18-150200.24.129.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-5.3.18-150200.24.129.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-5.3.18-150200.24.129.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.129.1.150200.9.61.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.129.1.150200.9.61.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.129.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.129.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-devel-5.3.18-150200.24.129.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-docs-5.3.18-150200.24.129.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-macros-5.3.18-150200.24.129.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.129.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.129.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-preempt-5.3.18-150200.24.129.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-preempt-5.3.18-150200.24.129.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-preempt-devel-5.3.18-150200.24.129.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-preempt-devel-5.3.18-150200.24.129.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-source-5.3.18-150200.24.129.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.129.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.129.1.x86_64",
            "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-5.3.18-150200.24.129.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-5.3.18-150200.24.129.1.s390x",
            "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-5.3.18-150200.24.129.1.x86_64",
            "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-devel-5.3.18-150200.24.129.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-devel-5.3.18-150200.24.129.1.s390x",
            "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-devel-5.3.18-150200.24.129.1.x86_64",
            "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-150200_24_129-default-1-150200.5.3.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-150200_24_129-default-1-150200.5.3.1.s390x",
            "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-150200_24_129-default-1-150200.5.3.1.x86_64",
            "SUSE Linux Enterprise Server 15 SP2-BCL:kernel-default-5.3.18-150200.24.129.1.x86_64",
            "SUSE Linux Enterprise Server 15 SP2-BCL:kernel-default-base-5.3.18-150200.24.129.1.150200.9.61.1.x86_64",
            "SUSE Linux Enterprise Server 15 SP2-BCL:kernel-default-devel-5.3.18-150200.24.129.1.x86_64",
            "SUSE Linux Enterprise Server 15 SP2-BCL:kernel-devel-5.3.18-150200.24.129.1.noarch",
            "SUSE Linux Enterprise Server 15 SP2-BCL:kernel-docs-5.3.18-150200.24.129.1.noarch",
            "SUSE Linux Enterprise Server 15 SP2-BCL:kernel-macros-5.3.18-150200.24.129.1.noarch",
            "SUSE Linux Enterprise Server 15 SP2-BCL:kernel-obs-build-5.3.18-150200.24.129.1.x86_64",
            "SUSE Linux Enterprise Server 15 SP2-BCL:kernel-preempt-5.3.18-150200.24.129.1.x86_64",
            "SUSE Linux Enterprise Server 15 SP2-BCL:kernel-preempt-devel-5.3.18-150200.24.129.1.x86_64",
            "SUSE Linux Enterprise Server 15 SP2-BCL:kernel-source-5.3.18-150200.24.129.1.noarch",
            "SUSE Linux Enterprise Server 15 SP2-BCL:kernel-syms-5.3.18-150200.24.129.1.x86_64",
            "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-5.3.18-150200.24.129.1.aarch64",
            "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-5.3.18-150200.24.129.1.ppc64le",
            "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-5.3.18-150200.24.129.1.s390x",
            "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-5.3.18-150200.24.129.1.x86_64",
            "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.129.1.150200.9.61.1.aarch64",
            "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.129.1.150200.9.61.1.ppc64le",
            "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.129.1.150200.9.61.1.s390x",
            "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.129.1.150200.9.61.1.x86_64",
            "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.129.1.aarch64",
            "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.129.1.ppc64le",
            "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.129.1.s390x",
            "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.129.1.x86_64",
            "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-devel-5.3.18-150200.24.129.1.noarch",
            "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-docs-5.3.18-150200.24.129.1.noarch",
            "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-macros-5.3.18-150200.24.129.1.noarch",
            "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.129.1.aarch64",
            "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.129.1.ppc64le",
            "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.129.1.s390x",
            "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.129.1.x86_64",
            "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-preempt-5.3.18-150200.24.129.1.aarch64",
            "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-preempt-5.3.18-150200.24.129.1.x86_64",
            "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-preempt-devel-5.3.18-150200.24.129.1.aarch64",
            "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-preempt-devel-5.3.18-150200.24.129.1.x86_64",
            "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-source-5.3.18-150200.24.129.1.noarch",
            "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.129.1.aarch64",
            "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.129.1.ppc64le",
            "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.129.1.s390x",
            "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.129.1.x86_64",
            "SUSE Linux Enterprise Server 15 SP2-LTSS:reiserfs-kmp-default-5.3.18-150200.24.129.1.aarch64",
            "SUSE Linux Enterprise Server 15 SP2-LTSS:reiserfs-kmp-default-5.3.18-150200.24.129.1.ppc64le",
            "SUSE Linux Enterprise Server 15 SP2-LTSS:reiserfs-kmp-default-5.3.18-150200.24.129.1.s390x",
            "SUSE Linux Enterprise Server 15 SP2-LTSS:reiserfs-kmp-default-5.3.18-150200.24.129.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-5.3.18-150200.24.129.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-5.3.18-150200.24.129.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-base-5.3.18-150200.24.129.1.150200.9.61.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-base-5.3.18-150200.24.129.1.150200.9.61.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-devel-5.3.18-150200.24.129.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-devel-5.3.18-150200.24.129.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-devel-5.3.18-150200.24.129.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-docs-5.3.18-150200.24.129.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-macros-5.3.18-150200.24.129.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-obs-build-5.3.18-150200.24.129.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-obs-build-5.3.18-150200.24.129.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-preempt-5.3.18-150200.24.129.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-preempt-devel-5.3.18-150200.24.129.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-source-5.3.18-150200.24.129.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-syms-5.3.18-150200.24.129.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-syms-5.3.18-150200.24.129.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP2:reiserfs-kmp-default-5.3.18-150200.24.129.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP2:reiserfs-kmp-default-5.3.18-150200.24.129.1.x86_64",
            "SUSE Manager Proxy 4.1:kernel-default-5.3.18-150200.24.129.1.x86_64",
            "SUSE Manager Proxy 4.1:kernel-default-base-5.3.18-150200.24.129.1.150200.9.61.1.x86_64",
            "SUSE Manager Proxy 4.1:kernel-default-devel-5.3.18-150200.24.129.1.x86_64",
            "SUSE Manager Proxy 4.1:kernel-devel-5.3.18-150200.24.129.1.noarch",
            "SUSE Manager Proxy 4.1:kernel-docs-5.3.18-150200.24.129.1.noarch",
            "SUSE Manager Proxy 4.1:kernel-macros-5.3.18-150200.24.129.1.noarch",
            "SUSE Manager Proxy 4.1:kernel-obs-build-5.3.18-150200.24.129.1.x86_64",
            "SUSE Manager Proxy 4.1:kernel-preempt-5.3.18-150200.24.129.1.x86_64",
            "SUSE Manager Proxy 4.1:kernel-preempt-devel-5.3.18-150200.24.129.1.x86_64",
            "SUSE Manager Proxy 4.1:kernel-source-5.3.18-150200.24.129.1.noarch",
            "SUSE Manager Proxy 4.1:kernel-syms-5.3.18-150200.24.129.1.x86_64",
            "SUSE Manager Proxy 4.1:reiserfs-kmp-default-5.3.18-150200.24.129.1.x86_64",
            "SUSE Manager Retail Branch Server 4.1:kernel-default-5.3.18-150200.24.129.1.x86_64",
            "SUSE Manager Retail Branch Server 4.1:kernel-default-base-5.3.18-150200.24.129.1.150200.9.61.1.x86_64",
            "SUSE Manager Retail Branch Server 4.1:kernel-default-devel-5.3.18-150200.24.129.1.x86_64",
            "SUSE Manager Retail Branch Server 4.1:kernel-devel-5.3.18-150200.24.129.1.noarch",
            "SUSE Manager Retail Branch Server 4.1:kernel-docs-5.3.18-150200.24.129.1.noarch",
            "SUSE Manager Retail Branch Server 4.1:kernel-macros-5.3.18-150200.24.129.1.noarch",
            "SUSE Manager Retail Branch Server 4.1:kernel-obs-build-5.3.18-150200.24.129.1.x86_64",
            "SUSE Manager Retail Branch Server 4.1:kernel-preempt-5.3.18-150200.24.129.1.x86_64",
            "SUSE Manager Retail Branch Server 4.1:kernel-preempt-devel-5.3.18-150200.24.129.1.x86_64",
            "SUSE Manager Retail Branch Server 4.1:kernel-source-5.3.18-150200.24.129.1.noarch",
            "SUSE Manager Retail Branch Server 4.1:kernel-syms-5.3.18-150200.24.129.1.x86_64",
            "SUSE Manager Retail Branch Server 4.1:reiserfs-kmp-default-5.3.18-150200.24.129.1.x86_64",
            "SUSE Manager Server 4.1:kernel-default-5.3.18-150200.24.129.1.ppc64le",
            "SUSE Manager Server 4.1:kernel-default-5.3.18-150200.24.129.1.s390x",
            "SUSE Manager Server 4.1:kernel-default-5.3.18-150200.24.129.1.x86_64",
            "SUSE Manager Server 4.1:kernel-default-base-5.3.18-150200.24.129.1.150200.9.61.1.ppc64le",
            "SUSE Manager Server 4.1:kernel-default-base-5.3.18-150200.24.129.1.150200.9.61.1.s390x",
            "SUSE Manager Server 4.1:kernel-default-base-5.3.18-150200.24.129.1.150200.9.61.1.x86_64",
            "SUSE Manager Server 4.1:kernel-default-devel-5.3.18-150200.24.129.1.ppc64le",
            "SUSE Manager Server 4.1:kernel-default-devel-5.3.18-150200.24.129.1.s390x",
            "SUSE Manager Server 4.1:kernel-default-devel-5.3.18-150200.24.129.1.x86_64",
            "SUSE Manager Server 4.1:kernel-devel-5.3.18-150200.24.129.1.noarch",
            "SUSE Manager Server 4.1:kernel-docs-5.3.18-150200.24.129.1.noarch",
            "SUSE Manager Server 4.1:kernel-macros-5.3.18-150200.24.129.1.noarch",
            "SUSE Manager Server 4.1:kernel-obs-build-5.3.18-150200.24.129.1.ppc64le",
            "SUSE Manager Server 4.1:kernel-obs-build-5.3.18-150200.24.129.1.s390x",
            "SUSE Manager Server 4.1:kernel-obs-build-5.3.18-150200.24.129.1.x86_64",
            "SUSE Manager Server 4.1:kernel-preempt-5.3.18-150200.24.129.1.x86_64",
            "SUSE Manager Server 4.1:kernel-preempt-devel-5.3.18-150200.24.129.1.x86_64",
            "SUSE Manager Server 4.1:kernel-source-5.3.18-150200.24.129.1.noarch",
            "SUSE Manager Server 4.1:kernel-syms-5.3.18-150200.24.129.1.ppc64le",
            "SUSE Manager Server 4.1:kernel-syms-5.3.18-150200.24.129.1.s390x",
            "SUSE Manager Server 4.1:kernel-syms-5.3.18-150200.24.129.1.x86_64",
            "SUSE Manager Server 4.1:reiserfs-kmp-default-5.3.18-150200.24.129.1.ppc64le",
            "SUSE Manager Server 4.1:reiserfs-kmp-default-5.3.18-150200.24.129.1.s390x",
            "SUSE Manager Server 4.1:reiserfs-kmp-default-5.3.18-150200.24.129.1.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2022-09-28T06:48:59Z",
          "details": "moderate"
        }
      ],
      "title": "CVE-2021-4203"
    },
    {
      "cve": "CVE-2022-1012",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2022-1012"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "A memory leak problem was found in the TCP source port generation algorithm in net/ipv4/tcp.c due to the small table perturb size. This flaw may allow an attacker to information leak and may cause a denial of service problem.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "SUSE Enterprise Storage 7:kernel-default-5.3.18-150200.24.129.1.aarch64",
          "SUSE Enterprise Storage 7:kernel-default-5.3.18-150200.24.129.1.x86_64",
          "SUSE Enterprise Storage 7:kernel-default-base-5.3.18-150200.24.129.1.150200.9.61.1.aarch64",
          "SUSE Enterprise Storage 7:kernel-default-base-5.3.18-150200.24.129.1.150200.9.61.1.x86_64",
          "SUSE Enterprise Storage 7:kernel-default-devel-5.3.18-150200.24.129.1.aarch64",
          "SUSE Enterprise Storage 7:kernel-default-devel-5.3.18-150200.24.129.1.x86_64",
          "SUSE Enterprise Storage 7:kernel-devel-5.3.18-150200.24.129.1.noarch",
          "SUSE Enterprise Storage 7:kernel-docs-5.3.18-150200.24.129.1.noarch",
          "SUSE Enterprise Storage 7:kernel-macros-5.3.18-150200.24.129.1.noarch",
          "SUSE Enterprise Storage 7:kernel-obs-build-5.3.18-150200.24.129.1.aarch64",
          "SUSE Enterprise Storage 7:kernel-obs-build-5.3.18-150200.24.129.1.x86_64",
          "SUSE Enterprise Storage 7:kernel-preempt-5.3.18-150200.24.129.1.aarch64",
          "SUSE Enterprise Storage 7:kernel-preempt-5.3.18-150200.24.129.1.x86_64",
          "SUSE Enterprise Storage 7:kernel-preempt-devel-5.3.18-150200.24.129.1.aarch64",
          "SUSE Enterprise Storage 7:kernel-preempt-devel-5.3.18-150200.24.129.1.x86_64",
          "SUSE Enterprise Storage 7:kernel-source-5.3.18-150200.24.129.1.noarch",
          "SUSE Enterprise Storage 7:kernel-syms-5.3.18-150200.24.129.1.aarch64",
          "SUSE Enterprise Storage 7:kernel-syms-5.3.18-150200.24.129.1.x86_64",
          "SUSE Enterprise Storage 7:reiserfs-kmp-default-5.3.18-150200.24.129.1.aarch64",
          "SUSE Enterprise Storage 7:reiserfs-kmp-default-5.3.18-150200.24.129.1.x86_64",
          "SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-150200.24.129.1.aarch64",
          "SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-150200.24.129.1.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-150200.24.129.1.s390x",
          "SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-150200.24.129.1.x86_64",
          "SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-150200.24.129.1.aarch64",
          "SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-150200.24.129.1.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-150200.24.129.1.s390x",
          "SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-150200.24.129.1.x86_64",
          "SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-150200.24.129.1.aarch64",
          "SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-150200.24.129.1.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-150200.24.129.1.s390x",
          "SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-150200.24.129.1.x86_64",
          "SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-150200.24.129.1.aarch64",
          "SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-150200.24.129.1.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-150200.24.129.1.s390x",
          "SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-150200.24.129.1.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-default-5.3.18-150200.24.129.1.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-default-5.3.18-150200.24.129.1.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-default-base-5.3.18-150200.24.129.1.150200.9.61.1.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-default-base-5.3.18-150200.24.129.1.150200.9.61.1.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-default-devel-5.3.18-150200.24.129.1.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-default-devel-5.3.18-150200.24.129.1.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-devel-5.3.18-150200.24.129.1.noarch",
          "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-docs-5.3.18-150200.24.129.1.noarch",
          "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-macros-5.3.18-150200.24.129.1.noarch",
          "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-obs-build-5.3.18-150200.24.129.1.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-obs-build-5.3.18-150200.24.129.1.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-preempt-5.3.18-150200.24.129.1.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-preempt-5.3.18-150200.24.129.1.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-preempt-devel-5.3.18-150200.24.129.1.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-preempt-devel-5.3.18-150200.24.129.1.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-source-5.3.18-150200.24.129.1.noarch",
          "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-syms-5.3.18-150200.24.129.1.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-syms-5.3.18-150200.24.129.1.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-5.3.18-150200.24.129.1.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-5.3.18-150200.24.129.1.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.129.1.150200.9.61.1.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.129.1.150200.9.61.1.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.129.1.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.129.1.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-devel-5.3.18-150200.24.129.1.noarch",
          "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-docs-5.3.18-150200.24.129.1.noarch",
          "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-macros-5.3.18-150200.24.129.1.noarch",
          "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.129.1.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.129.1.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-preempt-5.3.18-150200.24.129.1.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-preempt-5.3.18-150200.24.129.1.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-preempt-devel-5.3.18-150200.24.129.1.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-preempt-devel-5.3.18-150200.24.129.1.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-source-5.3.18-150200.24.129.1.noarch",
          "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.129.1.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.129.1.x86_64",
          "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-5.3.18-150200.24.129.1.ppc64le",
          "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-5.3.18-150200.24.129.1.s390x",
          "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-5.3.18-150200.24.129.1.x86_64",
          "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-devel-5.3.18-150200.24.129.1.ppc64le",
          "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-devel-5.3.18-150200.24.129.1.s390x",
          "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-devel-5.3.18-150200.24.129.1.x86_64",
          "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-150200_24_129-default-1-150200.5.3.1.ppc64le",
          "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-150200_24_129-default-1-150200.5.3.1.s390x",
          "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-150200_24_129-default-1-150200.5.3.1.x86_64",
          "SUSE Linux Enterprise Server 15 SP2-BCL:kernel-default-5.3.18-150200.24.129.1.x86_64",
          "SUSE Linux Enterprise Server 15 SP2-BCL:kernel-default-base-5.3.18-150200.24.129.1.150200.9.61.1.x86_64",
          "SUSE Linux Enterprise Server 15 SP2-BCL:kernel-default-devel-5.3.18-150200.24.129.1.x86_64",
          "SUSE Linux Enterprise Server 15 SP2-BCL:kernel-devel-5.3.18-150200.24.129.1.noarch",
          "SUSE Linux Enterprise Server 15 SP2-BCL:kernel-docs-5.3.18-150200.24.129.1.noarch",
          "SUSE Linux Enterprise Server 15 SP2-BCL:kernel-macros-5.3.18-150200.24.129.1.noarch",
          "SUSE Linux Enterprise Server 15 SP2-BCL:kernel-obs-build-5.3.18-150200.24.129.1.x86_64",
          "SUSE Linux Enterprise Server 15 SP2-BCL:kernel-preempt-5.3.18-150200.24.129.1.x86_64",
          "SUSE Linux Enterprise Server 15 SP2-BCL:kernel-preempt-devel-5.3.18-150200.24.129.1.x86_64",
          "SUSE Linux Enterprise Server 15 SP2-BCL:kernel-source-5.3.18-150200.24.129.1.noarch",
          "SUSE Linux Enterprise Server 15 SP2-BCL:kernel-syms-5.3.18-150200.24.129.1.x86_64",
          "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-5.3.18-150200.24.129.1.aarch64",
          "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-5.3.18-150200.24.129.1.ppc64le",
          "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-5.3.18-150200.24.129.1.s390x",
          "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-5.3.18-150200.24.129.1.x86_64",
          "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.129.1.150200.9.61.1.aarch64",
          "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.129.1.150200.9.61.1.ppc64le",
          "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.129.1.150200.9.61.1.s390x",
          "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.129.1.150200.9.61.1.x86_64",
          "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.129.1.aarch64",
          "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.129.1.ppc64le",
          "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.129.1.s390x",
          "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.129.1.x86_64",
          "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-devel-5.3.18-150200.24.129.1.noarch",
          "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-docs-5.3.18-150200.24.129.1.noarch",
          "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-macros-5.3.18-150200.24.129.1.noarch",
          "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.129.1.aarch64",
          "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.129.1.ppc64le",
          "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.129.1.s390x",
          "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.129.1.x86_64",
          "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-preempt-5.3.18-150200.24.129.1.aarch64",
          "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-preempt-5.3.18-150200.24.129.1.x86_64",
          "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-preempt-devel-5.3.18-150200.24.129.1.aarch64",
          "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-preempt-devel-5.3.18-150200.24.129.1.x86_64",
          "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-source-5.3.18-150200.24.129.1.noarch",
          "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.129.1.aarch64",
          "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.129.1.ppc64le",
          "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.129.1.s390x",
          "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.129.1.x86_64",
          "SUSE Linux Enterprise Server 15 SP2-LTSS:reiserfs-kmp-default-5.3.18-150200.24.129.1.aarch64",
          "SUSE Linux Enterprise Server 15 SP2-LTSS:reiserfs-kmp-default-5.3.18-150200.24.129.1.ppc64le",
          "SUSE Linux Enterprise Server 15 SP2-LTSS:reiserfs-kmp-default-5.3.18-150200.24.129.1.s390x",
          "SUSE Linux Enterprise Server 15 SP2-LTSS:reiserfs-kmp-default-5.3.18-150200.24.129.1.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-5.3.18-150200.24.129.1.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-5.3.18-150200.24.129.1.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-base-5.3.18-150200.24.129.1.150200.9.61.1.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-base-5.3.18-150200.24.129.1.150200.9.61.1.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-devel-5.3.18-150200.24.129.1.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-devel-5.3.18-150200.24.129.1.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-devel-5.3.18-150200.24.129.1.noarch",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-docs-5.3.18-150200.24.129.1.noarch",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-macros-5.3.18-150200.24.129.1.noarch",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-obs-build-5.3.18-150200.24.129.1.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-obs-build-5.3.18-150200.24.129.1.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-preempt-5.3.18-150200.24.129.1.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-preempt-devel-5.3.18-150200.24.129.1.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-source-5.3.18-150200.24.129.1.noarch",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-syms-5.3.18-150200.24.129.1.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-syms-5.3.18-150200.24.129.1.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP2:reiserfs-kmp-default-5.3.18-150200.24.129.1.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP2:reiserfs-kmp-default-5.3.18-150200.24.129.1.x86_64",
          "SUSE Manager Proxy 4.1:kernel-default-5.3.18-150200.24.129.1.x86_64",
          "SUSE Manager Proxy 4.1:kernel-default-base-5.3.18-150200.24.129.1.150200.9.61.1.x86_64",
          "SUSE Manager Proxy 4.1:kernel-default-devel-5.3.18-150200.24.129.1.x86_64",
          "SUSE Manager Proxy 4.1:kernel-devel-5.3.18-150200.24.129.1.noarch",
          "SUSE Manager Proxy 4.1:kernel-docs-5.3.18-150200.24.129.1.noarch",
          "SUSE Manager Proxy 4.1:kernel-macros-5.3.18-150200.24.129.1.noarch",
          "SUSE Manager Proxy 4.1:kernel-obs-build-5.3.18-150200.24.129.1.x86_64",
          "SUSE Manager Proxy 4.1:kernel-preempt-5.3.18-150200.24.129.1.x86_64",
          "SUSE Manager Proxy 4.1:kernel-preempt-devel-5.3.18-150200.24.129.1.x86_64",
          "SUSE Manager Proxy 4.1:kernel-source-5.3.18-150200.24.129.1.noarch",
          "SUSE Manager Proxy 4.1:kernel-syms-5.3.18-150200.24.129.1.x86_64",
          "SUSE Manager Proxy 4.1:reiserfs-kmp-default-5.3.18-150200.24.129.1.x86_64",
          "SUSE Manager Retail Branch Server 4.1:kernel-default-5.3.18-150200.24.129.1.x86_64",
          "SUSE Manager Retail Branch Server 4.1:kernel-default-base-5.3.18-150200.24.129.1.150200.9.61.1.x86_64",
          "SUSE Manager Retail Branch Server 4.1:kernel-default-devel-5.3.18-150200.24.129.1.x86_64",
          "SUSE Manager Retail Branch Server 4.1:kernel-devel-5.3.18-150200.24.129.1.noarch",
          "SUSE Manager Retail Branch Server 4.1:kernel-docs-5.3.18-150200.24.129.1.noarch",
          "SUSE Manager Retail Branch Server 4.1:kernel-macros-5.3.18-150200.24.129.1.noarch",
          "SUSE Manager Retail Branch Server 4.1:kernel-obs-build-5.3.18-150200.24.129.1.x86_64",
          "SUSE Manager Retail Branch Server 4.1:kernel-preempt-5.3.18-150200.24.129.1.x86_64",
          "SUSE Manager Retail Branch Server 4.1:kernel-preempt-devel-5.3.18-150200.24.129.1.x86_64",
          "SUSE Manager Retail Branch Server 4.1:kernel-source-5.3.18-150200.24.129.1.noarch",
          "SUSE Manager Retail Branch Server 4.1:kernel-syms-5.3.18-150200.24.129.1.x86_64",
          "SUSE Manager Retail Branch Server 4.1:reiserfs-kmp-default-5.3.18-150200.24.129.1.x86_64",
          "SUSE Manager Server 4.1:kernel-default-5.3.18-150200.24.129.1.ppc64le",
          "SUSE Manager Server 4.1:kernel-default-5.3.18-150200.24.129.1.s390x",
          "SUSE Manager Server 4.1:kernel-default-5.3.18-150200.24.129.1.x86_64",
          "SUSE Manager Server 4.1:kernel-default-base-5.3.18-150200.24.129.1.150200.9.61.1.ppc64le",
          "SUSE Manager Server 4.1:kernel-default-base-5.3.18-150200.24.129.1.150200.9.61.1.s390x",
          "SUSE Manager Server 4.1:kernel-default-base-5.3.18-150200.24.129.1.150200.9.61.1.x86_64",
          "SUSE Manager Server 4.1:kernel-default-devel-5.3.18-150200.24.129.1.ppc64le",
          "SUSE Manager Server 4.1:kernel-default-devel-5.3.18-150200.24.129.1.s390x",
          "SUSE Manager Server 4.1:kernel-default-devel-5.3.18-150200.24.129.1.x86_64",
          "SUSE Manager Server 4.1:kernel-devel-5.3.18-150200.24.129.1.noarch",
          "SUSE Manager Server 4.1:kernel-docs-5.3.18-150200.24.129.1.noarch",
          "SUSE Manager Server 4.1:kernel-macros-5.3.18-150200.24.129.1.noarch",
          "SUSE Manager Server 4.1:kernel-obs-build-5.3.18-150200.24.129.1.ppc64le",
          "SUSE Manager Server 4.1:kernel-obs-build-5.3.18-150200.24.129.1.s390x",
          "SUSE Manager Server 4.1:kernel-obs-build-5.3.18-150200.24.129.1.x86_64",
          "SUSE Manager Server 4.1:kernel-preempt-5.3.18-150200.24.129.1.x86_64",
          "SUSE Manager Server 4.1:kernel-preempt-devel-5.3.18-150200.24.129.1.x86_64",
          "SUSE Manager Server 4.1:kernel-source-5.3.18-150200.24.129.1.noarch",
          "SUSE Manager Server 4.1:kernel-syms-5.3.18-150200.24.129.1.ppc64le",
          "SUSE Manager Server 4.1:kernel-syms-5.3.18-150200.24.129.1.s390x",
          "SUSE Manager Server 4.1:kernel-syms-5.3.18-150200.24.129.1.x86_64",
          "SUSE Manager Server 4.1:reiserfs-kmp-default-5.3.18-150200.24.129.1.ppc64le",
          "SUSE Manager Server 4.1:reiserfs-kmp-default-5.3.18-150200.24.129.1.s390x",
          "SUSE Manager Server 4.1:reiserfs-kmp-default-5.3.18-150200.24.129.1.x86_64"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2022-1012",
          "url": "https://www.suse.com/security/cve/CVE-2022-1012"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1199482 for CVE-2022-1012",
          "url": "https://bugzilla.suse.com/1199482"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1199694 for CVE-2022-1012",
          "url": "https://bugzilla.suse.com/1199694"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1202335 for CVE-2022-1012",
          "url": "https://bugzilla.suse.com/1202335"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "SUSE Enterprise Storage 7:kernel-default-5.3.18-150200.24.129.1.aarch64",
            "SUSE Enterprise Storage 7:kernel-default-5.3.18-150200.24.129.1.x86_64",
            "SUSE Enterprise Storage 7:kernel-default-base-5.3.18-150200.24.129.1.150200.9.61.1.aarch64",
            "SUSE Enterprise Storage 7:kernel-default-base-5.3.18-150200.24.129.1.150200.9.61.1.x86_64",
            "SUSE Enterprise Storage 7:kernel-default-devel-5.3.18-150200.24.129.1.aarch64",
            "SUSE Enterprise Storage 7:kernel-default-devel-5.3.18-150200.24.129.1.x86_64",
            "SUSE Enterprise Storage 7:kernel-devel-5.3.18-150200.24.129.1.noarch",
            "SUSE Enterprise Storage 7:kernel-docs-5.3.18-150200.24.129.1.noarch",
            "SUSE Enterprise Storage 7:kernel-macros-5.3.18-150200.24.129.1.noarch",
            "SUSE Enterprise Storage 7:kernel-obs-build-5.3.18-150200.24.129.1.aarch64",
            "SUSE Enterprise Storage 7:kernel-obs-build-5.3.18-150200.24.129.1.x86_64",
            "SUSE Enterprise Storage 7:kernel-preempt-5.3.18-150200.24.129.1.aarch64",
            "SUSE Enterprise Storage 7:kernel-preempt-5.3.18-150200.24.129.1.x86_64",
            "SUSE Enterprise Storage 7:kernel-preempt-devel-5.3.18-150200.24.129.1.aarch64",
            "SUSE Enterprise Storage 7:kernel-preempt-devel-5.3.18-150200.24.129.1.x86_64",
            "SUSE Enterprise Storage 7:kernel-source-5.3.18-150200.24.129.1.noarch",
            "SUSE Enterprise Storage 7:kernel-syms-5.3.18-150200.24.129.1.aarch64",
            "SUSE Enterprise Storage 7:kernel-syms-5.3.18-150200.24.129.1.x86_64",
            "SUSE Enterprise Storage 7:reiserfs-kmp-default-5.3.18-150200.24.129.1.aarch64",
            "SUSE Enterprise Storage 7:reiserfs-kmp-default-5.3.18-150200.24.129.1.x86_64",
            "SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-150200.24.129.1.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-150200.24.129.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-150200.24.129.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-150200.24.129.1.x86_64",
            "SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-150200.24.129.1.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-150200.24.129.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-150200.24.129.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-150200.24.129.1.x86_64",
            "SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-150200.24.129.1.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-150200.24.129.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-150200.24.129.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-150200.24.129.1.x86_64",
            "SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-150200.24.129.1.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-150200.24.129.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-150200.24.129.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-150200.24.129.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-default-5.3.18-150200.24.129.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-default-5.3.18-150200.24.129.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-default-base-5.3.18-150200.24.129.1.150200.9.61.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-default-base-5.3.18-150200.24.129.1.150200.9.61.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-default-devel-5.3.18-150200.24.129.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-default-devel-5.3.18-150200.24.129.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-devel-5.3.18-150200.24.129.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-docs-5.3.18-150200.24.129.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-macros-5.3.18-150200.24.129.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-obs-build-5.3.18-150200.24.129.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-obs-build-5.3.18-150200.24.129.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-preempt-5.3.18-150200.24.129.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-preempt-5.3.18-150200.24.129.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-preempt-devel-5.3.18-150200.24.129.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-preempt-devel-5.3.18-150200.24.129.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-source-5.3.18-150200.24.129.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-syms-5.3.18-150200.24.129.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-syms-5.3.18-150200.24.129.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-5.3.18-150200.24.129.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-5.3.18-150200.24.129.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.129.1.150200.9.61.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.129.1.150200.9.61.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.129.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.129.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-devel-5.3.18-150200.24.129.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-docs-5.3.18-150200.24.129.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-macros-5.3.18-150200.24.129.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.129.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.129.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-preempt-5.3.18-150200.24.129.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-preempt-5.3.18-150200.24.129.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-preempt-devel-5.3.18-150200.24.129.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-preempt-devel-5.3.18-150200.24.129.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-source-5.3.18-150200.24.129.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.129.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.129.1.x86_64",
            "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-5.3.18-150200.24.129.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-5.3.18-150200.24.129.1.s390x",
            "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-5.3.18-150200.24.129.1.x86_64",
            "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-devel-5.3.18-150200.24.129.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-devel-5.3.18-150200.24.129.1.s390x",
            "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-devel-5.3.18-150200.24.129.1.x86_64",
            "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-150200_24_129-default-1-150200.5.3.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-150200_24_129-default-1-150200.5.3.1.s390x",
            "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-150200_24_129-default-1-150200.5.3.1.x86_64",
            "SUSE Linux Enterprise Server 15 SP2-BCL:kernel-default-5.3.18-150200.24.129.1.x86_64",
            "SUSE Linux Enterprise Server 15 SP2-BCL:kernel-default-base-5.3.18-150200.24.129.1.150200.9.61.1.x86_64",
            "SUSE Linux Enterprise Server 15 SP2-BCL:kernel-default-devel-5.3.18-150200.24.129.1.x86_64",
            "SUSE Linux Enterprise Server 15 SP2-BCL:kernel-devel-5.3.18-150200.24.129.1.noarch",
            "SUSE Linux Enterprise Server 15 SP2-BCL:kernel-docs-5.3.18-150200.24.129.1.noarch",
            "SUSE Linux Enterprise Server 15 SP2-BCL:kernel-macros-5.3.18-150200.24.129.1.noarch",
            "SUSE Linux Enterprise Server 15 SP2-BCL:kernel-obs-build-5.3.18-150200.24.129.1.x86_64",
            "SUSE Linux Enterprise Server 15 SP2-BCL:kernel-preempt-5.3.18-150200.24.129.1.x86_64",
            "SUSE Linux Enterprise Server 15 SP2-BCL:kernel-preempt-devel-5.3.18-150200.24.129.1.x86_64",
            "SUSE Linux Enterprise Server 15 SP2-BCL:kernel-source-5.3.18-150200.24.129.1.noarch",
            "SUSE Linux Enterprise Server 15 SP2-BCL:kernel-syms-5.3.18-150200.24.129.1.x86_64",
            "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-5.3.18-150200.24.129.1.aarch64",
            "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-5.3.18-150200.24.129.1.ppc64le",
            "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-5.3.18-150200.24.129.1.s390x",
            "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-5.3.18-150200.24.129.1.x86_64",
            "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.129.1.150200.9.61.1.aarch64",
            "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.129.1.150200.9.61.1.ppc64le",
            "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.129.1.150200.9.61.1.s390x",
            "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.129.1.150200.9.61.1.x86_64",
            "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.129.1.aarch64",
            "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.129.1.ppc64le",
            "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.129.1.s390x",
            "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.129.1.x86_64",
            "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-devel-5.3.18-150200.24.129.1.noarch",
            "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-docs-5.3.18-150200.24.129.1.noarch",
            "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-macros-5.3.18-150200.24.129.1.noarch",
            "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.129.1.aarch64",
            "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.129.1.ppc64le",
            "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.129.1.s390x",
            "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.129.1.x86_64",
            "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-preempt-5.3.18-150200.24.129.1.aarch64",
            "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-preempt-5.3.18-150200.24.129.1.x86_64",
            "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-preempt-devel-5.3.18-150200.24.129.1.aarch64",
            "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-preempt-devel-5.3.18-150200.24.129.1.x86_64",
            "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-source-5.3.18-150200.24.129.1.noarch",
            "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.129.1.aarch64",
            "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.129.1.ppc64le",
            "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.129.1.s390x",
            "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.129.1.x86_64",
            "SUSE Linux Enterprise Server 15 SP2-LTSS:reiserfs-kmp-default-5.3.18-150200.24.129.1.aarch64",
            "SUSE Linux Enterprise Server 15 SP2-LTSS:reiserfs-kmp-default-5.3.18-150200.24.129.1.ppc64le",
            "SUSE Linux Enterprise Server 15 SP2-LTSS:reiserfs-kmp-default-5.3.18-150200.24.129.1.s390x",
            "SUSE Linux Enterprise Server 15 SP2-LTSS:reiserfs-kmp-default-5.3.18-150200.24.129.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-5.3.18-150200.24.129.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-5.3.18-150200.24.129.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-base-5.3.18-150200.24.129.1.150200.9.61.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-base-5.3.18-150200.24.129.1.150200.9.61.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-devel-5.3.18-150200.24.129.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-devel-5.3.18-150200.24.129.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-devel-5.3.18-150200.24.129.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-docs-5.3.18-150200.24.129.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-macros-5.3.18-150200.24.129.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-obs-build-5.3.18-150200.24.129.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-obs-build-5.3.18-150200.24.129.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-preempt-5.3.18-150200.24.129.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-preempt-devel-5.3.18-150200.24.129.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-source-5.3.18-150200.24.129.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-syms-5.3.18-150200.24.129.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-syms-5.3.18-150200.24.129.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP2:reiserfs-kmp-default-5.3.18-150200.24.129.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP2:reiserfs-kmp-default-5.3.18-150200.24.129.1.x86_64",
            "SUSE Manager Proxy 4.1:kernel-default-5.3.18-150200.24.129.1.x86_64",
            "SUSE Manager Proxy 4.1:kernel-default-base-5.3.18-150200.24.129.1.150200.9.61.1.x86_64",
            "SUSE Manager Proxy 4.1:kernel-default-devel-5.3.18-150200.24.129.1.x86_64",
            "SUSE Manager Proxy 4.1:kernel-devel-5.3.18-150200.24.129.1.noarch",
            "SUSE Manager Proxy 4.1:kernel-docs-5.3.18-150200.24.129.1.noarch",
            "SUSE Manager Proxy 4.1:kernel-macros-5.3.18-150200.24.129.1.noarch",
            "SUSE Manager Proxy 4.1:kernel-obs-build-5.3.18-150200.24.129.1.x86_64",
            "SUSE Manager Proxy 4.1:kernel-preempt-5.3.18-150200.24.129.1.x86_64",
            "SUSE Manager Proxy 4.1:kernel-preempt-devel-5.3.18-150200.24.129.1.x86_64",
            "SUSE Manager Proxy 4.1:kernel-source-5.3.18-150200.24.129.1.noarch",
            "SUSE Manager Proxy 4.1:kernel-syms-5.3.18-150200.24.129.1.x86_64",
            "SUSE Manager Proxy 4.1:reiserfs-kmp-default-5.3.18-150200.24.129.1.x86_64",
            "SUSE Manager Retail Branch Server 4.1:kernel-default-5.3.18-150200.24.129.1.x86_64",
            "SUSE Manager Retail Branch Server 4.1:kernel-default-base-5.3.18-150200.24.129.1.150200.9.61.1.x86_64",
            "SUSE Manager Retail Branch Server 4.1:kernel-default-devel-5.3.18-150200.24.129.1.x86_64",
            "SUSE Manager Retail Branch Server 4.1:kernel-devel-5.3.18-150200.24.129.1.noarch",
            "SUSE Manager Retail Branch Server 4.1:kernel-docs-5.3.18-150200.24.129.1.noarch",
            "SUSE Manager Retail Branch Server 4.1:kernel-macros-5.3.18-150200.24.129.1.noarch",
            "SUSE Manager Retail Branch Server 4.1:kernel-obs-build-5.3.18-150200.24.129.1.x86_64",
            "SUSE Manager Retail Branch Server 4.1:kernel-preempt-5.3.18-150200.24.129.1.x86_64",
            "SUSE Manager Retail Branch Server 4.1:kernel-preempt-devel-5.3.18-150200.24.129.1.x86_64",
            "SUSE Manager Retail Branch Server 4.1:kernel-source-5.3.18-150200.24.129.1.noarch",
            "SUSE Manager Retail Branch Server 4.1:kernel-syms-5.3.18-150200.24.129.1.x86_64",
            "SUSE Manager Retail Branch Server 4.1:reiserfs-kmp-default-5.3.18-150200.24.129.1.x86_64",
            "SUSE Manager Server 4.1:kernel-default-5.3.18-150200.24.129.1.ppc64le",
            "SUSE Manager Server 4.1:kernel-default-5.3.18-150200.24.129.1.s390x",
            "SUSE Manager Server 4.1:kernel-default-5.3.18-150200.24.129.1.x86_64",
            "SUSE Manager Server 4.1:kernel-default-base-5.3.18-150200.24.129.1.150200.9.61.1.ppc64le",
            "SUSE Manager Server 4.1:kernel-default-base-5.3.18-150200.24.129.1.150200.9.61.1.s390x",
            "SUSE Manager Server 4.1:kernel-default-base-5.3.18-150200.24.129.1.150200.9.61.1.x86_64",
            "SUSE Manager Server 4.1:kernel-default-devel-5.3.18-150200.24.129.1.ppc64le",
            "SUSE Manager Server 4.1:kernel-default-devel-5.3.18-150200.24.129.1.s390x",
            "SUSE Manager Server 4.1:kernel-default-devel-5.3.18-150200.24.129.1.x86_64",
            "SUSE Manager Server 4.1:kernel-devel-5.3.18-150200.24.129.1.noarch",
            "SUSE Manager Server 4.1:kernel-docs-5.3.18-150200.24.129.1.noarch",
            "SUSE Manager Server 4.1:kernel-macros-5.3.18-150200.24.129.1.noarch",
            "SUSE Manager Server 4.1:kernel-obs-build-5.3.18-150200.24.129.1.ppc64le",
            "SUSE Manager Server 4.1:kernel-obs-build-5.3.18-150200.24.129.1.s390x",
            "SUSE Manager Server 4.1:kernel-obs-build-5.3.18-150200.24.129.1.x86_64",
            "SUSE Manager Server 4.1:kernel-preempt-5.3.18-150200.24.129.1.x86_64",
            "SUSE Manager Server 4.1:kernel-preempt-devel-5.3.18-150200.24.129.1.x86_64",
            "SUSE Manager Server 4.1:kernel-source-5.3.18-150200.24.129.1.noarch",
            "SUSE Manager Server 4.1:kernel-syms-5.3.18-150200.24.129.1.ppc64le",
            "SUSE Manager Server 4.1:kernel-syms-5.3.18-150200.24.129.1.s390x",
            "SUSE Manager Server 4.1:kernel-syms-5.3.18-150200.24.129.1.x86_64",
            "SUSE Manager Server 4.1:reiserfs-kmp-default-5.3.18-150200.24.129.1.ppc64le",
            "SUSE Manager Server 4.1:reiserfs-kmp-default-5.3.18-150200.24.129.1.s390x",
            "SUSE Manager Server 4.1:reiserfs-kmp-default-5.3.18-150200.24.129.1.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 6.5,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:H",
            "version": "3.1"
          },
          "products": [
            "SUSE Enterprise Storage 7:kernel-default-5.3.18-150200.24.129.1.aarch64",
            "SUSE Enterprise Storage 7:kernel-default-5.3.18-150200.24.129.1.x86_64",
            "SUSE Enterprise Storage 7:kernel-default-base-5.3.18-150200.24.129.1.150200.9.61.1.aarch64",
            "SUSE Enterprise Storage 7:kernel-default-base-5.3.18-150200.24.129.1.150200.9.61.1.x86_64",
            "SUSE Enterprise Storage 7:kernel-default-devel-5.3.18-150200.24.129.1.aarch64",
            "SUSE Enterprise Storage 7:kernel-default-devel-5.3.18-150200.24.129.1.x86_64",
            "SUSE Enterprise Storage 7:kernel-devel-5.3.18-150200.24.129.1.noarch",
            "SUSE Enterprise Storage 7:kernel-docs-5.3.18-150200.24.129.1.noarch",
            "SUSE Enterprise Storage 7:kernel-macros-5.3.18-150200.24.129.1.noarch",
            "SUSE Enterprise Storage 7:kernel-obs-build-5.3.18-150200.24.129.1.aarch64",
            "SUSE Enterprise Storage 7:kernel-obs-build-5.3.18-150200.24.129.1.x86_64",
            "SUSE Enterprise Storage 7:kernel-preempt-5.3.18-150200.24.129.1.aarch64",
            "SUSE Enterprise Storage 7:kernel-preempt-5.3.18-150200.24.129.1.x86_64",
            "SUSE Enterprise Storage 7:kernel-preempt-devel-5.3.18-150200.24.129.1.aarch64",
            "SUSE Enterprise Storage 7:kernel-preempt-devel-5.3.18-150200.24.129.1.x86_64",
            "SUSE Enterprise Storage 7:kernel-source-5.3.18-150200.24.129.1.noarch",
            "SUSE Enterprise Storage 7:kernel-syms-5.3.18-150200.24.129.1.aarch64",
            "SUSE Enterprise Storage 7:kernel-syms-5.3.18-150200.24.129.1.x86_64",
            "SUSE Enterprise Storage 7:reiserfs-kmp-default-5.3.18-150200.24.129.1.aarch64",
            "SUSE Enterprise Storage 7:reiserfs-kmp-default-5.3.18-150200.24.129.1.x86_64",
            "SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-150200.24.129.1.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-150200.24.129.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-150200.24.129.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-150200.24.129.1.x86_64",
            "SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-150200.24.129.1.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-150200.24.129.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-150200.24.129.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-150200.24.129.1.x86_64",
            "SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-150200.24.129.1.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-150200.24.129.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-150200.24.129.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-150200.24.129.1.x86_64",
            "SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-150200.24.129.1.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-150200.24.129.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-150200.24.129.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-150200.24.129.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-default-5.3.18-150200.24.129.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-default-5.3.18-150200.24.129.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-default-base-5.3.18-150200.24.129.1.150200.9.61.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-default-base-5.3.18-150200.24.129.1.150200.9.61.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-default-devel-5.3.18-150200.24.129.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-default-devel-5.3.18-150200.24.129.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-devel-5.3.18-150200.24.129.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-docs-5.3.18-150200.24.129.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-macros-5.3.18-150200.24.129.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-obs-build-5.3.18-150200.24.129.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-obs-build-5.3.18-150200.24.129.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-preempt-5.3.18-150200.24.129.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-preempt-5.3.18-150200.24.129.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-preempt-devel-5.3.18-150200.24.129.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-preempt-devel-5.3.18-150200.24.129.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-source-5.3.18-150200.24.129.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-syms-5.3.18-150200.24.129.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-syms-5.3.18-150200.24.129.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-5.3.18-150200.24.129.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-5.3.18-150200.24.129.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.129.1.150200.9.61.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.129.1.150200.9.61.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.129.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.129.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-devel-5.3.18-150200.24.129.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-docs-5.3.18-150200.24.129.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-macros-5.3.18-150200.24.129.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.129.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.129.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-preempt-5.3.18-150200.24.129.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-preempt-5.3.18-150200.24.129.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-preempt-devel-5.3.18-150200.24.129.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-preempt-devel-5.3.18-150200.24.129.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-source-5.3.18-150200.24.129.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.129.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.129.1.x86_64",
            "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-5.3.18-150200.24.129.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-5.3.18-150200.24.129.1.s390x",
            "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-5.3.18-150200.24.129.1.x86_64",
            "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-devel-5.3.18-150200.24.129.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-devel-5.3.18-150200.24.129.1.s390x",
            "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-devel-5.3.18-150200.24.129.1.x86_64",
            "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-150200_24_129-default-1-150200.5.3.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-150200_24_129-default-1-150200.5.3.1.s390x",
            "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-150200_24_129-default-1-150200.5.3.1.x86_64",
            "SUSE Linux Enterprise Server 15 SP2-BCL:kernel-default-5.3.18-150200.24.129.1.x86_64",
            "SUSE Linux Enterprise Server 15 SP2-BCL:kernel-default-base-5.3.18-150200.24.129.1.150200.9.61.1.x86_64",
            "SUSE Linux Enterprise Server 15 SP2-BCL:kernel-default-devel-5.3.18-150200.24.129.1.x86_64",
            "SUSE Linux Enterprise Server 15 SP2-BCL:kernel-devel-5.3.18-150200.24.129.1.noarch",
            "SUSE Linux Enterprise Server 15 SP2-BCL:kernel-docs-5.3.18-150200.24.129.1.noarch",
            "SUSE Linux Enterprise Server 15 SP2-BCL:kernel-macros-5.3.18-150200.24.129.1.noarch",
            "SUSE Linux Enterprise Server 15 SP2-BCL:kernel-obs-build-5.3.18-150200.24.129.1.x86_64",
            "SUSE Linux Enterprise Server 15 SP2-BCL:kernel-preempt-5.3.18-150200.24.129.1.x86_64",
            "SUSE Linux Enterprise Server 15 SP2-BCL:kernel-preempt-devel-5.3.18-150200.24.129.1.x86_64",
            "SUSE Linux Enterprise Server 15 SP2-BCL:kernel-source-5.3.18-150200.24.129.1.noarch",
            "SUSE Linux Enterprise Server 15 SP2-BCL:kernel-syms-5.3.18-150200.24.129.1.x86_64",
            "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-5.3.18-150200.24.129.1.aarch64",
            "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-5.3.18-150200.24.129.1.ppc64le",
            "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-5.3.18-150200.24.129.1.s390x",
            "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-5.3.18-150200.24.129.1.x86_64",
            "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.129.1.150200.9.61.1.aarch64",
            "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.129.1.150200.9.61.1.ppc64le",
            "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.129.1.150200.9.61.1.s390x",
            "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.129.1.150200.9.61.1.x86_64",
            "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.129.1.aarch64",
            "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.129.1.ppc64le",
            "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.129.1.s390x",
            "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.129.1.x86_64",
            "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-devel-5.3.18-150200.24.129.1.noarch",
            "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-docs-5.3.18-150200.24.129.1.noarch",
            "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-macros-5.3.18-150200.24.129.1.noarch",
            "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.129.1.aarch64",
            "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.129.1.ppc64le",
            "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.129.1.s390x",
            "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.129.1.x86_64",
            "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-preempt-5.3.18-150200.24.129.1.aarch64",
            "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-preempt-5.3.18-150200.24.129.1.x86_64",
            "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-preempt-devel-5.3.18-150200.24.129.1.aarch64",
            "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-preempt-devel-5.3.18-150200.24.129.1.x86_64",
            "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-source-5.3.18-150200.24.129.1.noarch",
            "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.129.1.aarch64",
            "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.129.1.ppc64le",
            "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.129.1.s390x",
            "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.129.1.x86_64",
            "SUSE Linux Enterprise Server 15 SP2-LTSS:reiserfs-kmp-default-5.3.18-150200.24.129.1.aarch64",
            "SUSE Linux Enterprise Server 15 SP2-LTSS:reiserfs-kmp-default-5.3.18-150200.24.129.1.ppc64le",
            "SUSE Linux Enterprise Server 15 SP2-LTSS:reiserfs-kmp-default-5.3.18-150200.24.129.1.s390x",
            "SUSE Linux Enterprise Server 15 SP2-LTSS:reiserfs-kmp-default-5.3.18-150200.24.129.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-5.3.18-150200.24.129.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-5.3.18-150200.24.129.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-base-5.3.18-150200.24.129.1.150200.9.61.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-base-5.3.18-150200.24.129.1.150200.9.61.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-devel-5.3.18-150200.24.129.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-devel-5.3.18-150200.24.129.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-devel-5.3.18-150200.24.129.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-docs-5.3.18-150200.24.129.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-macros-5.3.18-150200.24.129.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-obs-build-5.3.18-150200.24.129.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-obs-build-5.3.18-150200.24.129.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-preempt-5.3.18-150200.24.129.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-preempt-devel-5.3.18-150200.24.129.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-source-5.3.18-150200.24.129.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-syms-5.3.18-150200.24.129.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-syms-5.3.18-150200.24.129.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP2:reiserfs-kmp-default-5.3.18-150200.24.129.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP2:reiserfs-kmp-default-5.3.18-150200.24.129.1.x86_64",
            "SUSE Manager Proxy 4.1:kernel-default-5.3.18-150200.24.129.1.x86_64",
            "SUSE Manager Proxy 4.1:kernel-default-base-5.3.18-150200.24.129.1.150200.9.61.1.x86_64",
            "SUSE Manager Proxy 4.1:kernel-default-devel-5.3.18-150200.24.129.1.x86_64",
            "SUSE Manager Proxy 4.1:kernel-devel-5.3.18-150200.24.129.1.noarch",
            "SUSE Manager Proxy 4.1:kernel-docs-5.3.18-150200.24.129.1.noarch",
            "SUSE Manager Proxy 4.1:kernel-macros-5.3.18-150200.24.129.1.noarch",
            "SUSE Manager Proxy 4.1:kernel-obs-build-5.3.18-150200.24.129.1.x86_64",
            "SUSE Manager Proxy 4.1:kernel-preempt-5.3.18-150200.24.129.1.x86_64",
            "SUSE Manager Proxy 4.1:kernel-preempt-devel-5.3.18-150200.24.129.1.x86_64",
            "SUSE Manager Proxy 4.1:kernel-source-5.3.18-150200.24.129.1.noarch",
            "SUSE Manager Proxy 4.1:kernel-syms-5.3.18-150200.24.129.1.x86_64",
            "SUSE Manager Proxy 4.1:reiserfs-kmp-default-5.3.18-150200.24.129.1.x86_64",
            "SUSE Manager Retail Branch Server 4.1:kernel-default-5.3.18-150200.24.129.1.x86_64",
            "SUSE Manager Retail Branch Server 4.1:kernel-default-base-5.3.18-150200.24.129.1.150200.9.61.1.x86_64",
            "SUSE Manager Retail Branch Server 4.1:kernel-default-devel-5.3.18-150200.24.129.1.x86_64",
            "SUSE Manager Retail Branch Server 4.1:kernel-devel-5.3.18-150200.24.129.1.noarch",
            "SUSE Manager Retail Branch Server 4.1:kernel-docs-5.3.18-150200.24.129.1.noarch",
            "SUSE Manager Retail Branch Server 4.1:kernel-macros-5.3.18-150200.24.129.1.noarch",
            "SUSE Manager Retail Branch Server 4.1:kernel-obs-build-5.3.18-150200.24.129.1.x86_64",
            "SUSE Manager Retail Branch Server 4.1:kernel-preempt-5.3.18-150200.24.129.1.x86_64",
            "SUSE Manager Retail Branch Server 4.1:kernel-preempt-devel-5.3.18-150200.24.129.1.x86_64",
            "SUSE Manager Retail Branch Server 4.1:kernel-source-5.3.18-150200.24.129.1.noarch",
            "SUSE Manager Retail Branch Server 4.1:kernel-syms-5.3.18-150200.24.129.1.x86_64",
            "SUSE Manager Retail Branch Server 4.1:reiserfs-kmp-default-5.3.18-150200.24.129.1.x86_64",
            "SUSE Manager Server 4.1:kernel-default-5.3.18-150200.24.129.1.ppc64le",
            "SUSE Manager Server 4.1:kernel-default-5.3.18-150200.24.129.1.s390x",
            "SUSE Manager Server 4.1:kernel-default-5.3.18-150200.24.129.1.x86_64",
            "SUSE Manager Server 4.1:kernel-default-base-5.3.18-150200.24.129.1.150200.9.61.1.ppc64le",
            "SUSE Manager Server 4.1:kernel-default-base-5.3.18-150200.24.129.1.150200.9.61.1.s390x",
            "SUSE Manager Server 4.1:kernel-default-base-5.3.18-150200.24.129.1.150200.9.61.1.x86_64",
            "SUSE Manager Server 4.1:kernel-default-devel-5.3.18-150200.24.129.1.ppc64le",
            "SUSE Manager Server 4.1:kernel-default-devel-5.3.18-150200.24.129.1.s390x",
            "SUSE Manager Server 4.1:kernel-default-devel-5.3.18-150200.24.129.1.x86_64",
            "SUSE Manager Server 4.1:kernel-devel-5.3.18-150200.24.129.1.noarch",
            "SUSE Manager Server 4.1:kernel-docs-5.3.18-150200.24.129.1.noarch",
            "SUSE Manager Server 4.1:kernel-macros-5.3.18-150200.24.129.1.noarch",
            "SUSE Manager Server 4.1:kernel-obs-build-5.3.18-150200.24.129.1.ppc64le",
            "SUSE Manager Server 4.1:kernel-obs-build-5.3.18-150200.24.129.1.s390x",
            "SUSE Manager Server 4.1:kernel-obs-build-5.3.18-150200.24.129.1.x86_64",
            "SUSE Manager Server 4.1:kernel-preempt-5.3.18-150200.24.129.1.x86_64",
            "SUSE Manager Server 4.1:kernel-preempt-devel-5.3.18-150200.24.129.1.x86_64",
            "SUSE Manager Server 4.1:kernel-source-5.3.18-150200.24.129.1.noarch",
            "SUSE Manager Server 4.1:kernel-syms-5.3.18-150200.24.129.1.ppc64le",
            "SUSE Manager Server 4.1:kernel-syms-5.3.18-150200.24.129.1.s390x",
            "SUSE Manager Server 4.1:kernel-syms-5.3.18-150200.24.129.1.x86_64",
            "SUSE Manager Server 4.1:reiserfs-kmp-default-5.3.18-150200.24.129.1.ppc64le",
            "SUSE Manager Server 4.1:reiserfs-kmp-default-5.3.18-150200.24.129.1.s390x",
            "SUSE Manager Server 4.1:reiserfs-kmp-default-5.3.18-150200.24.129.1.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2022-09-28T06:48:59Z",
          "details": "moderate"
        }
      ],
      "title": "CVE-2022-1012"
    },
    {
      "cve": "CVE-2022-20166",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2022-20166"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "In various methods of kernel base drivers, there is a possible out of bounds write due to a heap buffer overflow. This could lead to local escalation of privilege with System execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android kernelAndroid ID: A-182388481References: Upstream kernel",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "SUSE Enterprise Storage 7:kernel-default-5.3.18-150200.24.129.1.aarch64",
          "SUSE Enterprise Storage 7:kernel-default-5.3.18-150200.24.129.1.x86_64",
          "SUSE Enterprise Storage 7:kernel-default-base-5.3.18-150200.24.129.1.150200.9.61.1.aarch64",
          "SUSE Enterprise Storage 7:kernel-default-base-5.3.18-150200.24.129.1.150200.9.61.1.x86_64",
          "SUSE Enterprise Storage 7:kernel-default-devel-5.3.18-150200.24.129.1.aarch64",
          "SUSE Enterprise Storage 7:kernel-default-devel-5.3.18-150200.24.129.1.x86_64",
          "SUSE Enterprise Storage 7:kernel-devel-5.3.18-150200.24.129.1.noarch",
          "SUSE Enterprise Storage 7:kernel-docs-5.3.18-150200.24.129.1.noarch",
          "SUSE Enterprise Storage 7:kernel-macros-5.3.18-150200.24.129.1.noarch",
          "SUSE Enterprise Storage 7:kernel-obs-build-5.3.18-150200.24.129.1.aarch64",
          "SUSE Enterprise Storage 7:kernel-obs-build-5.3.18-150200.24.129.1.x86_64",
          "SUSE Enterprise Storage 7:kernel-preempt-5.3.18-150200.24.129.1.aarch64",
          "SUSE Enterprise Storage 7:kernel-preempt-5.3.18-150200.24.129.1.x86_64",
          "SUSE Enterprise Storage 7:kernel-preempt-devel-5.3.18-150200.24.129.1.aarch64",
          "SUSE Enterprise Storage 7:kernel-preempt-devel-5.3.18-150200.24.129.1.x86_64",
          "SUSE Enterprise Storage 7:kernel-source-5.3.18-150200.24.129.1.noarch",
          "SUSE Enterprise Storage 7:kernel-syms-5.3.18-150200.24.129.1.aarch64",
          "SUSE Enterprise Storage 7:kernel-syms-5.3.18-150200.24.129.1.x86_64",
          "SUSE Enterprise Storage 7:reiserfs-kmp-default-5.3.18-150200.24.129.1.aarch64",
          "SUSE Enterprise Storage 7:reiserfs-kmp-default-5.3.18-150200.24.129.1.x86_64",
          "SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-150200.24.129.1.aarch64",
          "SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-150200.24.129.1.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-150200.24.129.1.s390x",
          "SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-150200.24.129.1.x86_64",
          "SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-150200.24.129.1.aarch64",
          "SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-150200.24.129.1.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-150200.24.129.1.s390x",
          "SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-150200.24.129.1.x86_64",
          "SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-150200.24.129.1.aarch64",
          "SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-150200.24.129.1.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-150200.24.129.1.s390x",
          "SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-150200.24.129.1.x86_64",
          "SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-150200.24.129.1.aarch64",
          "SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-150200.24.129.1.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-150200.24.129.1.s390x",
          "SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-150200.24.129.1.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-default-5.3.18-150200.24.129.1.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-default-5.3.18-150200.24.129.1.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-default-base-5.3.18-150200.24.129.1.150200.9.61.1.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-default-base-5.3.18-150200.24.129.1.150200.9.61.1.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-default-devel-5.3.18-150200.24.129.1.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-default-devel-5.3.18-150200.24.129.1.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-devel-5.3.18-150200.24.129.1.noarch",
          "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-docs-5.3.18-150200.24.129.1.noarch",
          "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-macros-5.3.18-150200.24.129.1.noarch",
          "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-obs-build-5.3.18-150200.24.129.1.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-obs-build-5.3.18-150200.24.129.1.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-preempt-5.3.18-150200.24.129.1.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-preempt-5.3.18-150200.24.129.1.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-preempt-devel-5.3.18-150200.24.129.1.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-preempt-devel-5.3.18-150200.24.129.1.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-source-5.3.18-150200.24.129.1.noarch",
          "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-syms-5.3.18-150200.24.129.1.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-syms-5.3.18-150200.24.129.1.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-5.3.18-150200.24.129.1.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-5.3.18-150200.24.129.1.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.129.1.150200.9.61.1.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.129.1.150200.9.61.1.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.129.1.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.129.1.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-devel-5.3.18-150200.24.129.1.noarch",
          "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-docs-5.3.18-150200.24.129.1.noarch",
          "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-macros-5.3.18-150200.24.129.1.noarch",
          "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.129.1.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.129.1.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-preempt-5.3.18-150200.24.129.1.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-preempt-5.3.18-150200.24.129.1.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-preempt-devel-5.3.18-150200.24.129.1.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-preempt-devel-5.3.18-150200.24.129.1.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-source-5.3.18-150200.24.129.1.noarch",
          "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.129.1.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.129.1.x86_64",
          "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-5.3.18-150200.24.129.1.ppc64le",
          "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-5.3.18-150200.24.129.1.s390x",
          "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-5.3.18-150200.24.129.1.x86_64",
          "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-devel-5.3.18-150200.24.129.1.ppc64le",
          "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-devel-5.3.18-150200.24.129.1.s390x",
          "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-devel-5.3.18-150200.24.129.1.x86_64",
          "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-150200_24_129-default-1-150200.5.3.1.ppc64le",
          "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-150200_24_129-default-1-150200.5.3.1.s390x",
          "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-150200_24_129-default-1-150200.5.3.1.x86_64",
          "SUSE Linux Enterprise Server 15 SP2-BCL:kernel-default-5.3.18-150200.24.129.1.x86_64",
          "SUSE Linux Enterprise Server 15 SP2-BCL:kernel-default-base-5.3.18-150200.24.129.1.150200.9.61.1.x86_64",
          "SUSE Linux Enterprise Server 15 SP2-BCL:kernel-default-devel-5.3.18-150200.24.129.1.x86_64",
          "SUSE Linux Enterprise Server 15 SP2-BCL:kernel-devel-5.3.18-150200.24.129.1.noarch",
          "SUSE Linux Enterprise Server 15 SP2-BCL:kernel-docs-5.3.18-150200.24.129.1.noarch",
          "SUSE Linux Enterprise Server 15 SP2-BCL:kernel-macros-5.3.18-150200.24.129.1.noarch",
          "SUSE Linux Enterprise Server 15 SP2-BCL:kernel-obs-build-5.3.18-150200.24.129.1.x86_64",
          "SUSE Linux Enterprise Server 15 SP2-BCL:kernel-preempt-5.3.18-150200.24.129.1.x86_64",
          "SUSE Linux Enterprise Server 15 SP2-BCL:kernel-preempt-devel-5.3.18-150200.24.129.1.x86_64",
          "SUSE Linux Enterprise Server 15 SP2-BCL:kernel-source-5.3.18-150200.24.129.1.noarch",
          "SUSE Linux Enterprise Server 15 SP2-BCL:kernel-syms-5.3.18-150200.24.129.1.x86_64",
          "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-5.3.18-150200.24.129.1.aarch64",
          "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-5.3.18-150200.24.129.1.ppc64le",
          "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-5.3.18-150200.24.129.1.s390x",
          "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-5.3.18-150200.24.129.1.x86_64",
          "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.129.1.150200.9.61.1.aarch64",
          "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.129.1.150200.9.61.1.ppc64le",
          "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.129.1.150200.9.61.1.s390x",
          "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.129.1.150200.9.61.1.x86_64",
          "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.129.1.aarch64",
          "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.129.1.ppc64le",
          "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.129.1.s390x",
          "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.129.1.x86_64",
          "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-devel-5.3.18-150200.24.129.1.noarch",
          "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-docs-5.3.18-150200.24.129.1.noarch",
          "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-macros-5.3.18-150200.24.129.1.noarch",
          "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.129.1.aarch64",
          "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.129.1.ppc64le",
          "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.129.1.s390x",
          "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.129.1.x86_64",
          "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-preempt-5.3.18-150200.24.129.1.aarch64",
          "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-preempt-5.3.18-150200.24.129.1.x86_64",
          "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-preempt-devel-5.3.18-150200.24.129.1.aarch64",
          "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-preempt-devel-5.3.18-150200.24.129.1.x86_64",
          "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-source-5.3.18-150200.24.129.1.noarch",
          "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.129.1.aarch64",
          "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.129.1.ppc64le",
          "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.129.1.s390x",
          "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.129.1.x86_64",
          "SUSE Linux Enterprise Server 15 SP2-LTSS:reiserfs-kmp-default-5.3.18-150200.24.129.1.aarch64",
          "SUSE Linux Enterprise Server 15 SP2-LTSS:reiserfs-kmp-default-5.3.18-150200.24.129.1.ppc64le",
          "SUSE Linux Enterprise Server 15 SP2-LTSS:reiserfs-kmp-default-5.3.18-150200.24.129.1.s390x",
          "SUSE Linux Enterprise Server 15 SP2-LTSS:reiserfs-kmp-default-5.3.18-150200.24.129.1.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-5.3.18-150200.24.129.1.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-5.3.18-150200.24.129.1.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-base-5.3.18-150200.24.129.1.150200.9.61.1.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-base-5.3.18-150200.24.129.1.150200.9.61.1.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-devel-5.3.18-150200.24.129.1.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-devel-5.3.18-150200.24.129.1.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-devel-5.3.18-150200.24.129.1.noarch",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-docs-5.3.18-150200.24.129.1.noarch",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-macros-5.3.18-150200.24.129.1.noarch",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-obs-build-5.3.18-150200.24.129.1.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-obs-build-5.3.18-150200.24.129.1.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-preempt-5.3.18-150200.24.129.1.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-preempt-devel-5.3.18-150200.24.129.1.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-source-5.3.18-150200.24.129.1.noarch",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-syms-5.3.18-150200.24.129.1.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-syms-5.3.18-150200.24.129.1.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP2:reiserfs-kmp-default-5.3.18-150200.24.129.1.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP2:reiserfs-kmp-default-5.3.18-150200.24.129.1.x86_64",
          "SUSE Manager Proxy 4.1:kernel-default-5.3.18-150200.24.129.1.x86_64",
          "SUSE Manager Proxy 4.1:kernel-default-base-5.3.18-150200.24.129.1.150200.9.61.1.x86_64",
          "SUSE Manager Proxy 4.1:kernel-default-devel-5.3.18-150200.24.129.1.x86_64",
          "SUSE Manager Proxy 4.1:kernel-devel-5.3.18-150200.24.129.1.noarch",
          "SUSE Manager Proxy 4.1:kernel-docs-5.3.18-150200.24.129.1.noarch",
          "SUSE Manager Proxy 4.1:kernel-macros-5.3.18-150200.24.129.1.noarch",
          "SUSE Manager Proxy 4.1:kernel-obs-build-5.3.18-150200.24.129.1.x86_64",
          "SUSE Manager Proxy 4.1:kernel-preempt-5.3.18-150200.24.129.1.x86_64",
          "SUSE Manager Proxy 4.1:kernel-preempt-devel-5.3.18-150200.24.129.1.x86_64",
          "SUSE Manager Proxy 4.1:kernel-source-5.3.18-150200.24.129.1.noarch",
          "SUSE Manager Proxy 4.1:kernel-syms-5.3.18-150200.24.129.1.x86_64",
          "SUSE Manager Proxy 4.1:reiserfs-kmp-default-5.3.18-150200.24.129.1.x86_64",
          "SUSE Manager Retail Branch Server 4.1:kernel-default-5.3.18-150200.24.129.1.x86_64",
          "SUSE Manager Retail Branch Server 4.1:kernel-default-base-5.3.18-150200.24.129.1.150200.9.61.1.x86_64",
          "SUSE Manager Retail Branch Server 4.1:kernel-default-devel-5.3.18-150200.24.129.1.x86_64",
          "SUSE Manager Retail Branch Server 4.1:kernel-devel-5.3.18-150200.24.129.1.noarch",
          "SUSE Manager Retail Branch Server 4.1:kernel-docs-5.3.18-150200.24.129.1.noarch",
          "SUSE Manager Retail Branch Server 4.1:kernel-macros-5.3.18-150200.24.129.1.noarch",
          "SUSE Manager Retail Branch Server 4.1:kernel-obs-build-5.3.18-150200.24.129.1.x86_64",
          "SUSE Manager Retail Branch Server 4.1:kernel-preempt-5.3.18-150200.24.129.1.x86_64",
          "SUSE Manager Retail Branch Server 4.1:kernel-preempt-devel-5.3.18-150200.24.129.1.x86_64",
          "SUSE Manager Retail Branch Server 4.1:kernel-source-5.3.18-150200.24.129.1.noarch",
          "SUSE Manager Retail Branch Server 4.1:kernel-syms-5.3.18-150200.24.129.1.x86_64",
          "SUSE Manager Retail Branch Server 4.1:reiserfs-kmp-default-5.3.18-150200.24.129.1.x86_64",
          "SUSE Manager Server 4.1:kernel-default-5.3.18-150200.24.129.1.ppc64le",
          "SUSE Manager Server 4.1:kernel-default-5.3.18-150200.24.129.1.s390x",
          "SUSE Manager Server 4.1:kernel-default-5.3.18-150200.24.129.1.x86_64",
          "SUSE Manager Server 4.1:kernel-default-base-5.3.18-150200.24.129.1.150200.9.61.1.ppc64le",
          "SUSE Manager Server 4.1:kernel-default-base-5.3.18-150200.24.129.1.150200.9.61.1.s390x",
          "SUSE Manager Server 4.1:kernel-default-base-5.3.18-150200.24.129.1.150200.9.61.1.x86_64",
          "SUSE Manager Server 4.1:kernel-default-devel-5.3.18-150200.24.129.1.ppc64le",
          "SUSE Manager Server 4.1:kernel-default-devel-5.3.18-150200.24.129.1.s390x",
          "SUSE Manager Server 4.1:kernel-default-devel-5.3.18-150200.24.129.1.x86_64",
          "SUSE Manager Server 4.1:kernel-devel-5.3.18-150200.24.129.1.noarch",
          "SUSE Manager Server 4.1:kernel-docs-5.3.18-150200.24.129.1.noarch",
          "SUSE Manager Server 4.1:kernel-macros-5.3.18-150200.24.129.1.noarch",
          "SUSE Manager Server 4.1:kernel-obs-build-5.3.18-150200.24.129.1.ppc64le",
          "SUSE Manager Server 4.1:kernel-obs-build-5.3.18-150200.24.129.1.s390x",
          "SUSE Manager Server 4.1:kernel-obs-build-5.3.18-150200.24.129.1.x86_64",
          "SUSE Manager Server 4.1:kernel-preempt-5.3.18-150200.24.129.1.x86_64",
          "SUSE Manager Server 4.1:kernel-preempt-devel-5.3.18-150200.24.129.1.x86_64",
          "SUSE Manager Server 4.1:kernel-source-5.3.18-150200.24.129.1.noarch",
          "SUSE Manager Server 4.1:kernel-syms-5.3.18-150200.24.129.1.ppc64le",
          "SUSE Manager Server 4.1:kernel-syms-5.3.18-150200.24.129.1.s390x",
          "SUSE Manager Server 4.1:kernel-syms-5.3.18-150200.24.129.1.x86_64",
          "SUSE Manager Server 4.1:reiserfs-kmp-default-5.3.18-150200.24.129.1.ppc64le",
          "SUSE Manager Server 4.1:reiserfs-kmp-default-5.3.18-150200.24.129.1.s390x",
          "SUSE Manager Server 4.1:reiserfs-kmp-default-5.3.18-150200.24.129.1.x86_64"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2022-20166",
          "url": "https://www.suse.com/security/cve/CVE-2022-20166"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1200598 for CVE-2022-20166",
          "url": "https://bugzilla.suse.com/1200598"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1212284 for CVE-2022-20166",
          "url": "https://bugzilla.suse.com/1212284"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "SUSE Enterprise Storage 7:kernel-default-5.3.18-150200.24.129.1.aarch64",
            "SUSE Enterprise Storage 7:kernel-default-5.3.18-150200.24.129.1.x86_64",
            "SUSE Enterprise Storage 7:kernel-default-base-5.3.18-150200.24.129.1.150200.9.61.1.aarch64",
            "SUSE Enterprise Storage 7:kernel-default-base-5.3.18-150200.24.129.1.150200.9.61.1.x86_64",
            "SUSE Enterprise Storage 7:kernel-default-devel-5.3.18-150200.24.129.1.aarch64",
            "SUSE Enterprise Storage 7:kernel-default-devel-5.3.18-150200.24.129.1.x86_64",
            "SUSE Enterprise Storage 7:kernel-devel-5.3.18-150200.24.129.1.noarch",
            "SUSE Enterprise Storage 7:kernel-docs-5.3.18-150200.24.129.1.noarch",
            "SUSE Enterprise Storage 7:kernel-macros-5.3.18-150200.24.129.1.noarch",
            "SUSE Enterprise Storage 7:kernel-obs-build-5.3.18-150200.24.129.1.aarch64",
            "SUSE Enterprise Storage 7:kernel-obs-build-5.3.18-150200.24.129.1.x86_64",
            "SUSE Enterprise Storage 7:kernel-preempt-5.3.18-150200.24.129.1.aarch64",
            "SUSE Enterprise Storage 7:kernel-preempt-5.3.18-150200.24.129.1.x86_64",
            "SUSE Enterprise Storage 7:kernel-preempt-devel-5.3.18-150200.24.129.1.aarch64",
            "SUSE Enterprise Storage 7:kernel-preempt-devel-5.3.18-150200.24.129.1.x86_64",
            "SUSE Enterprise Storage 7:kernel-source-5.3.18-150200.24.129.1.noarch",
            "SUSE Enterprise Storage 7:kernel-syms-5.3.18-150200.24.129.1.aarch64",
            "SUSE Enterprise Storage 7:kernel-syms-5.3.18-150200.24.129.1.x86_64",
            "SUSE Enterprise Storage 7:reiserfs-kmp-default-5.3.18-150200.24.129.1.aarch64",
            "SUSE Enterprise Storage 7:reiserfs-kmp-default-5.3.18-150200.24.129.1.x86_64",
            "SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-150200.24.129.1.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-150200.24.129.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-150200.24.129.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-150200.24.129.1.x86_64",
            "SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-150200.24.129.1.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-150200.24.129.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-150200.24.129.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-150200.24.129.1.x86_64",
            "SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-150200.24.129.1.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-150200.24.129.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-150200.24.129.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-150200.24.129.1.x86_64",
            "SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-150200.24.129.1.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-150200.24.129.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-150200.24.129.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-150200.24.129.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-default-5.3.18-150200.24.129.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-default-5.3.18-150200.24.129.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-default-base-5.3.18-150200.24.129.1.150200.9.61.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-default-base-5.3.18-150200.24.129.1.150200.9.61.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-default-devel-5.3.18-150200.24.129.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-default-devel-5.3.18-150200.24.129.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-devel-5.3.18-150200.24.129.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-docs-5.3.18-150200.24.129.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-macros-5.3.18-150200.24.129.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-obs-build-5.3.18-150200.24.129.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-obs-build-5.3.18-150200.24.129.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-preempt-5.3.18-150200.24.129.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-preempt-5.3.18-150200.24.129.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-preempt-devel-5.3.18-150200.24.129.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-preempt-devel-5.3.18-150200.24.129.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-source-5.3.18-150200.24.129.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-syms-5.3.18-150200.24.129.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-syms-5.3.18-150200.24.129.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-5.3.18-150200.24.129.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-5.3.18-150200.24.129.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.129.1.150200.9.61.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.129.1.150200.9.61.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.129.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.129.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-devel-5.3.18-150200.24.129.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-docs-5.3.18-150200.24.129.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-macros-5.3.18-150200.24.129.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.129.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.129.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-preempt-5.3.18-150200.24.129.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-preempt-5.3.18-150200.24.129.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-preempt-devel-5.3.18-150200.24.129.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-preempt-devel-5.3.18-150200.24.129.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-source-5.3.18-150200.24.129.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.129.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.129.1.x86_64",
            "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-5.3.18-150200.24.129.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-5.3.18-150200.24.129.1.s390x",
            "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-5.3.18-150200.24.129.1.x86_64",
            "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-devel-5.3.18-150200.24.129.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-devel-5.3.18-150200.24.129.1.s390x",
            "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-devel-5.3.18-150200.24.129.1.x86_64",
            "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-150200_24_129-default-1-150200.5.3.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-150200_24_129-default-1-150200.5.3.1.s390x",
            "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-150200_24_129-default-1-150200.5.3.1.x86_64",
            "SUSE Linux Enterprise Server 15 SP2-BCL:kernel-default-5.3.18-150200.24.129.1.x86_64",
            "SUSE Linux Enterprise Server 15 SP2-BCL:kernel-default-base-5.3.18-150200.24.129.1.150200.9.61.1.x86_64",
            "SUSE Linux Enterprise Server 15 SP2-BCL:kernel-default-devel-5.3.18-150200.24.129.1.x86_64",
            "SUSE Linux Enterprise Server 15 SP2-BCL:kernel-devel-5.3.18-150200.24.129.1.noarch",
            "SUSE Linux Enterprise Server 15 SP2-BCL:kernel-docs-5.3.18-150200.24.129.1.noarch",
            "SUSE Linux Enterprise Server 15 SP2-BCL:kernel-macros-5.3.18-150200.24.129.1.noarch",
            "SUSE Linux Enterprise Server 15 SP2-BCL:kernel-obs-build-5.3.18-150200.24.129.1.x86_64",
            "SUSE Linux Enterprise Server 15 SP2-BCL:kernel-preempt-5.3.18-150200.24.129.1.x86_64",
            "SUSE Linux Enterprise Server 15 SP2-BCL:kernel-preempt-devel-5.3.18-150200.24.129.1.x86_64",
            "SUSE Linux Enterprise Server 15 SP2-BCL:kernel-source-5.3.18-150200.24.129.1.noarch",
            "SUSE Linux Enterprise Server 15 SP2-BCL:kernel-syms-5.3.18-150200.24.129.1.x86_64",
            "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-5.3.18-150200.24.129.1.aarch64",
            "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-5.3.18-150200.24.129.1.ppc64le",
            "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-5.3.18-150200.24.129.1.s390x",
            "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-5.3.18-150200.24.129.1.x86_64",
            "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.129.1.150200.9.61.1.aarch64",
            "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.129.1.150200.9.61.1.ppc64le",
            "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.129.1.150200.9.61.1.s390x",
            "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.129.1.150200.9.61.1.x86_64",
            "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.129.1.aarch64",
            "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.129.1.ppc64le",
            "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.129.1.s390x",
            "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.129.1.x86_64",
            "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-devel-5.3.18-150200.24.129.1.noarch",
            "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-docs-5.3.18-150200.24.129.1.noarch",
            "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-macros-5.3.18-150200.24.129.1.noarch",
            "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.129.1.aarch64",
            "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.129.1.ppc64le",
            "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.129.1.s390x",
            "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.129.1.x86_64",
            "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-preempt-5.3.18-150200.24.129.1.aarch64",
            "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-preempt-5.3.18-150200.24.129.1.x86_64",
            "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-preempt-devel-5.3.18-150200.24.129.1.aarch64",
            "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-preempt-devel-5.3.18-150200.24.129.1.x86_64",
            "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-source-5.3.18-150200.24.129.1.noarch",
            "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.129.1.aarch64",
            "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.129.1.ppc64le",
            "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.129.1.s390x",
            "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.129.1.x86_64",
            "SUSE Linux Enterprise Server 15 SP2-LTSS:reiserfs-kmp-default-5.3.18-150200.24.129.1.aarch64",
            "SUSE Linux Enterprise Server 15 SP2-LTSS:reiserfs-kmp-default-5.3.18-150200.24.129.1.ppc64le",
            "SUSE Linux Enterprise Server 15 SP2-LTSS:reiserfs-kmp-default-5.3.18-150200.24.129.1.s390x",
            "SUSE Linux Enterprise Server 15 SP2-LTSS:reiserfs-kmp-default-5.3.18-150200.24.129.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-5.3.18-150200.24.129.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-5.3.18-150200.24.129.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-base-5.3.18-150200.24.129.1.150200.9.61.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-base-5.3.18-150200.24.129.1.150200.9.61.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-devel-5.3.18-150200.24.129.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-devel-5.3.18-150200.24.129.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-devel-5.3.18-150200.24.129.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-docs-5.3.18-150200.24.129.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-macros-5.3.18-150200.24.129.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-obs-build-5.3.18-150200.24.129.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-obs-build-5.3.18-150200.24.129.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-preempt-5.3.18-150200.24.129.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-preempt-devel-5.3.18-150200.24.129.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-source-5.3.18-150200.24.129.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-syms-5.3.18-150200.24.129.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-syms-5.3.18-150200.24.129.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP2:reiserfs-kmp-default-5.3.18-150200.24.129.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP2:reiserfs-kmp-default-5.3.18-150200.24.129.1.x86_64",
            "SUSE Manager Proxy 4.1:kernel-default-5.3.18-150200.24.129.1.x86_64",
            "SUSE Manager Proxy 4.1:kernel-default-base-5.3.18-150200.24.129.1.150200.9.61.1.x86_64",
            "SUSE Manager Proxy 4.1:kernel-default-devel-5.3.18-150200.24.129.1.x86_64",
            "SUSE Manager Proxy 4.1:kernel-devel-5.3.18-150200.24.129.1.noarch",
            "SUSE Manager Proxy 4.1:kernel-docs-5.3.18-150200.24.129.1.noarch",
            "SUSE Manager Proxy 4.1:kernel-macros-5.3.18-150200.24.129.1.noarch",
            "SUSE Manager Proxy 4.1:kernel-obs-build-5.3.18-150200.24.129.1.x86_64",
            "SUSE Manager Proxy 4.1:kernel-preempt-5.3.18-150200.24.129.1.x86_64",
            "SUSE Manager Proxy 4.1:kernel-preempt-devel-5.3.18-150200.24.129.1.x86_64",
            "SUSE Manager Proxy 4.1:kernel-source-5.3.18-150200.24.129.1.noarch",
            "SUSE Manager Proxy 4.1:kernel-syms-5.3.18-150200.24.129.1.x86_64",
            "SUSE Manager Proxy 4.1:reiserfs-kmp-default-5.3.18-150200.24.129.1.x86_64",
            "SUSE Manager Retail Branch Server 4.1:kernel-default-5.3.18-150200.24.129.1.x86_64",
            "SUSE Manager Retail Branch Server 4.1:kernel-default-base-5.3.18-150200.24.129.1.150200.9.61.1.x86_64",
            "SUSE Manager Retail Branch Server 4.1:kernel-default-devel-5.3.18-150200.24.129.1.x86_64",
            "SUSE Manager Retail Branch Server 4.1:kernel-devel-5.3.18-150200.24.129.1.noarch",
            "SUSE Manager Retail Branch Server 4.1:kernel-docs-5.3.18-150200.24.129.1.noarch",
            "SUSE Manager Retail Branch Server 4.1:kernel-macros-5.3.18-150200.24.129.1.noarch",
            "SUSE Manager Retail Branch Server 4.1:kernel-obs-build-5.3.18-150200.24.129.1.x86_64",
            "SUSE Manager Retail Branch Server 4.1:kernel-preempt-5.3.18-150200.24.129.1.x86_64",
            "SUSE Manager Retail Branch Server 4.1:kernel-preempt-devel-5.3.18-150200.24.129.1.x86_64",
            "SUSE Manager Retail Branch Server 4.1:kernel-source-5.3.18-150200.24.129.1.noarch",
            "SUSE Manager Retail Branch Server 4.1:kernel-syms-5.3.18-150200.24.129.1.x86_64",
            "SUSE Manager Retail Branch Server 4.1:reiserfs-kmp-default-5.3.18-150200.24.129.1.x86_64",
            "SUSE Manager Server 4.1:kernel-default-5.3.18-150200.24.129.1.ppc64le",
            "SUSE Manager Server 4.1:kernel-default-5.3.18-150200.24.129.1.s390x",
            "SUSE Manager Server 4.1:kernel-default-5.3.18-150200.24.129.1.x86_64",
            "SUSE Manager Server 4.1:kernel-default-base-5.3.18-150200.24.129.1.150200.9.61.1.ppc64le",
            "SUSE Manager Server 4.1:kernel-default-base-5.3.18-150200.24.129.1.150200.9.61.1.s390x",
            "SUSE Manager Server 4.1:kernel-default-base-5.3.18-150200.24.129.1.150200.9.61.1.x86_64",
            "SUSE Manager Server 4.1:kernel-default-devel-5.3.18-150200.24.129.1.ppc64le",
            "SUSE Manager Server 4.1:kernel-default-devel-5.3.18-150200.24.129.1.s390x",
            "SUSE Manager Server 4.1:kernel-default-devel-5.3.18-150200.24.129.1.x86_64",
            "SUSE Manager Server 4.1:kernel-devel-5.3.18-150200.24.129.1.noarch",
            "SUSE Manager Server 4.1:kernel-docs-5.3.18-150200.24.129.1.noarch",
            "SUSE Manager Server 4.1:kernel-macros-5.3.18-150200.24.129.1.noarch",
            "SUSE Manager Server 4.1:kernel-obs-build-5.3.18-150200.24.129.1.ppc64le",
            "SUSE Manager Server 4.1:kernel-obs-build-5.3.18-150200.24.129.1.s390x",
            "SUSE Manager Server 4.1:kernel-obs-build-5.3.18-150200.24.129.1.x86_64",
            "SUSE Manager Server 4.1:kernel-preempt-5.3.18-150200.24.129.1.x86_64",
            "SUSE Manager Server 4.1:kernel-preempt-devel-5.3.18-150200.24.129.1.x86_64",
            "SUSE Manager Server 4.1:kernel-source-5.3.18-150200.24.129.1.noarch",
            "SUSE Manager Server 4.1:kernel-syms-5.3.18-150200.24.129.1.ppc64le",
            "SUSE Manager Server 4.1:kernel-syms-5.3.18-150200.24.129.1.s390x",
            "SUSE Manager Server 4.1:kernel-syms-5.3.18-150200.24.129.1.x86_64",
            "SUSE Manager Server 4.1:reiserfs-kmp-default-5.3.18-150200.24.129.1.ppc64le",
            "SUSE Manager Server 4.1:reiserfs-kmp-default-5.3.18-150200.24.129.1.s390x",
            "SUSE Manager Server 4.1:reiserfs-kmp-default-5.3.18-150200.24.129.1.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 6.1,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:H",
            "version": "3.1"
          },
          "products": [
            "SUSE Enterprise Storage 7:kernel-default-5.3.18-150200.24.129.1.aarch64",
            "SUSE Enterprise Storage 7:kernel-default-5.3.18-150200.24.129.1.x86_64",
            "SUSE Enterprise Storage 7:kernel-default-base-5.3.18-150200.24.129.1.150200.9.61.1.aarch64",
            "SUSE Enterprise Storage 7:kernel-default-base-5.3.18-150200.24.129.1.150200.9.61.1.x86_64",
            "SUSE Enterprise Storage 7:kernel-default-devel-5.3.18-150200.24.129.1.aarch64",
            "SUSE Enterprise Storage 7:kernel-default-devel-5.3.18-150200.24.129.1.x86_64",
            "SUSE Enterprise Storage 7:kernel-devel-5.3.18-150200.24.129.1.noarch",
            "SUSE Enterprise Storage 7:kernel-docs-5.3.18-150200.24.129.1.noarch",
            "SUSE Enterprise Storage 7:kernel-macros-5.3.18-150200.24.129.1.noarch",
            "SUSE Enterprise Storage 7:kernel-obs-build-5.3.18-150200.24.129.1.aarch64",
            "SUSE Enterprise Storage 7:kernel-obs-build-5.3.18-150200.24.129.1.x86_64",
            "SUSE Enterprise Storage 7:kernel-preempt-5.3.18-150200.24.129.1.aarch64",
            "SUSE Enterprise Storage 7:kernel-preempt-5.3.18-150200.24.129.1.x86_64",
            "SUSE Enterprise Storage 7:kernel-preempt-devel-5.3.18-150200.24.129.1.aarch64",
            "SUSE Enterprise Storage 7:kernel-preempt-devel-5.3.18-150200.24.129.1.x86_64",
            "SUSE Enterprise Storage 7:kernel-source-5.3.18-150200.24.129.1.noarch",
            "SUSE Enterprise Storage 7:kernel-syms-5.3.18-150200.24.129.1.aarch64",
            "SUSE Enterprise Storage 7:kernel-syms-5.3.18-150200.24.129.1.x86_64",
            "SUSE Enterprise Storage 7:reiserfs-kmp-default-5.3.18-150200.24.129.1.aarch64",
            "SUSE Enterprise Storage 7:reiserfs-kmp-default-5.3.18-150200.24.129.1.x86_64",
            "SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-150200.24.129.1.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-150200.24.129.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-150200.24.129.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-150200.24.129.1.x86_64",
            "SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-150200.24.129.1.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-150200.24.129.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-150200.24.129.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-150200.24.129.1.x86_64",
            "SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-150200.24.129.1.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-150200.24.129.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-150200.24.129.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-150200.24.129.1.x86_64",
            "SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-150200.24.129.1.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-150200.24.129.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-150200.24.129.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-150200.24.129.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-default-5.3.18-150200.24.129.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-default-5.3.18-150200.24.129.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-default-base-5.3.18-150200.24.129.1.150200.9.61.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-default-base-5.3.18-150200.24.129.1.150200.9.61.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-default-devel-5.3.18-150200.24.129.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-default-devel-5.3.18-150200.24.129.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-devel-5.3.18-150200.24.129.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-docs-5.3.18-150200.24.129.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-macros-5.3.18-150200.24.129.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-obs-build-5.3.18-150200.24.129.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-obs-build-5.3.18-150200.24.129.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-preempt-5.3.18-150200.24.129.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-preempt-5.3.18-150200.24.129.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-preempt-devel-5.3.18-150200.24.129.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-preempt-devel-5.3.18-150200.24.129.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-source-5.3.18-150200.24.129.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-syms-5.3.18-150200.24.129.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-syms-5.3.18-150200.24.129.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-5.3.18-150200.24.129.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-5.3.18-150200.24.129.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.129.1.150200.9.61.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.129.1.150200.9.61.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.129.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.129.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-devel-5.3.18-150200.24.129.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-docs-5.3.18-150200.24.129.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-macros-5.3.18-150200.24.129.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.129.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.129.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-preempt-5.3.18-150200.24.129.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-preempt-5.3.18-150200.24.129.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-preempt-devel-5.3.18-150200.24.129.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-preempt-devel-5.3.18-150200.24.129.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-source-5.3.18-150200.24.129.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.129.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.129.1.x86_64",
            "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-5.3.18-150200.24.129.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-5.3.18-150200.24.129.1.s390x",
            "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-5.3.18-150200.24.129.1.x86_64",
            "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-devel-5.3.18-150200.24.129.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-devel-5.3.18-150200.24.129.1.s390x",
            "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-devel-5.3.18-150200.24.129.1.x86_64",
            "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-150200_24_129-default-1-150200.5.3.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-150200_24_129-default-1-150200.5.3.1.s390x",
            "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-150200_24_129-default-1-150200.5.3.1.x86_64",
            "SUSE Linux Enterprise Server 15 SP2-BCL:kernel-default-5.3.18-150200.24.129.1.x86_64",
            "SUSE Linux Enterprise Server 15 SP2-BCL:kernel-default-base-5.3.18-150200.24.129.1.150200.9.61.1.x86_64",
            "SUSE Linux Enterprise Server 15 SP2-BCL:kernel-default-devel-5.3.18-150200.24.129.1.x86_64",
            "SUSE Linux Enterprise Server 15 SP2-BCL:kernel-devel-5.3.18-150200.24.129.1.noarch",
            "SUSE Linux Enterprise Server 15 SP2-BCL:kernel-docs-5.3.18-150200.24.129.1.noarch",
            "SUSE Linux Enterprise Server 15 SP2-BCL:kernel-macros-5.3.18-150200.24.129.1.noarch",
            "SUSE Linux Enterprise Server 15 SP2-BCL:kernel-obs-build-5.3.18-150200.24.129.1.x86_64",
            "SUSE Linux Enterprise Server 15 SP2-BCL:kernel-preempt-5.3.18-150200.24.129.1.x86_64",
            "SUSE Linux Enterprise Server 15 SP2-BCL:kernel-preempt-devel-5.3.18-150200.24.129.1.x86_64",
            "SUSE Linux Enterprise Server 15 SP2-BCL:kernel-source-5.3.18-150200.24.129.1.noarch",
            "SUSE Linux Enterprise Server 15 SP2-BCL:kernel-syms-5.3.18-150200.24.129.1.x86_64",
            "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-5.3.18-150200.24.129.1.aarch64",
            "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-5.3.18-150200.24.129.1.ppc64le",
            "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-5.3.18-150200.24.129.1.s390x",
            "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-5.3.18-150200.24.129.1.x86_64",
            "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.129.1.150200.9.61.1.aarch64",
            "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.129.1.150200.9.61.1.ppc64le",
            "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.129.1.150200.9.61.1.s390x",
            "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.129.1.150200.9.61.1.x86_64",
            "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.129.1.aarch64",
            "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.129.1.ppc64le",
            "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.129.1.s390x",
            "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.129.1.x86_64",
            "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-devel-5.3.18-150200.24.129.1.noarch",
            "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-docs-5.3.18-150200.24.129.1.noarch",
            "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-macros-5.3.18-150200.24.129.1.noarch",
            "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.129.1.aarch64",
            "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.129.1.ppc64le",
            "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.129.1.s390x",
            "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.129.1.x86_64",
            "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-preempt-5.3.18-150200.24.129.1.aarch64",
            "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-preempt-5.3.18-150200.24.129.1.x86_64",
            "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-preempt-devel-5.3.18-150200.24.129.1.aarch64",
            "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-preempt-devel-5.3.18-150200.24.129.1.x86_64",
            "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-source-5.3.18-150200.24.129.1.noarch",
            "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.129.1.aarch64",
            "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.129.1.ppc64le",
            "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.129.1.s390x",
            "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.129.1.x86_64",
            "SUSE Linux Enterprise Server 15 SP2-LTSS:reiserfs-kmp-default-5.3.18-150200.24.129.1.aarch64",
            "SUSE Linux Enterprise Server 15 SP2-LTSS:reiserfs-kmp-default-5.3.18-150200.24.129.1.ppc64le",
            "SUSE Linux Enterprise Server 15 SP2-LTSS:reiserfs-kmp-default-5.3.18-150200.24.129.1.s390x",
            "SUSE Linux Enterprise Server 15 SP2-LTSS:reiserfs-kmp-default-5.3.18-150200.24.129.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-5.3.18-150200.24.129.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-5.3.18-150200.24.129.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-base-5.3.18-150200.24.129.1.150200.9.61.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-base-5.3.18-150200.24.129.1.150200.9.61.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-devel-5.3.18-150200.24.129.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-devel-5.3.18-150200.24.129.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-devel-5.3.18-150200.24.129.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-docs-5.3.18-150200.24.129.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-macros-5.3.18-150200.24.129.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-obs-build-5.3.18-150200.24.129.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-obs-build-5.3.18-150200.24.129.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-preempt-5.3.18-150200.24.129.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-preempt-devel-5.3.18-150200.24.129.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-source-5.3.18-150200.24.129.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-syms-5.3.18-150200.24.129.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-syms-5.3.18-150200.24.129.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP2:reiserfs-kmp-default-5.3.18-150200.24.129.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP2:reiserfs-kmp-default-5.3.18-150200.24.129.1.x86_64",
            "SUSE Manager Proxy 4.1:kernel-default-5.3.18-150200.24.129.1.x86_64",
            "SUSE Manager Proxy 4.1:kernel-default-base-5.3.18-150200.24.129.1.150200.9.61.1.x86_64",
            "SUSE Manager Proxy 4.1:kernel-default-devel-5.3.18-150200.24.129.1.x86_64",
            "SUSE Manager Proxy 4.1:kernel-devel-5.3.18-150200.24.129.1.noarch",
            "SUSE Manager Proxy 4.1:kernel-docs-5.3.18-150200.24.129.1.noarch",
            "SUSE Manager Proxy 4.1:kernel-macros-5.3.18-150200.24.129.1.noarch",
            "SUSE Manager Proxy 4.1:kernel-obs-build-5.3.18-150200.24.129.1.x86_64",
            "SUSE Manager Proxy 4.1:kernel-preempt-5.3.18-150200.24.129.1.x86_64",
            "SUSE Manager Proxy 4.1:kernel-preempt-devel-5.3.18-150200.24.129.1.x86_64",
            "SUSE Manager Proxy 4.1:kernel-source-5.3.18-150200.24.129.1.noarch",
            "SUSE Manager Proxy 4.1:kernel-syms-5.3.18-150200.24.129.1.x86_64",
            "SUSE Manager Proxy 4.1:reiserfs-kmp-default-5.3.18-150200.24.129.1.x86_64",
            "SUSE Manager Retail Branch Server 4.1:kernel-default-5.3.18-150200.24.129.1.x86_64",
            "SUSE Manager Retail Branch Server 4.1:kernel-default-base-5.3.18-150200.24.129.1.150200.9.61.1.x86_64",
            "SUSE Manager Retail Branch Server 4.1:kernel-default-devel-5.3.18-150200.24.129.1.x86_64",
            "SUSE Manager Retail Branch Server 4.1:kernel-devel-5.3.18-150200.24.129.1.noarch",
            "SUSE Manager Retail Branch Server 4.1:kernel-docs-5.3.18-150200.24.129.1.noarch",
            "SUSE Manager Retail Branch Server 4.1:kernel-macros-5.3.18-150200.24.129.1.noarch",
            "SUSE Manager Retail Branch Server 4.1:kernel-obs-build-5.3.18-150200.24.129.1.x86_64",
            "SUSE Manager Retail Branch Server 4.1:kernel-preempt-5.3.18-150200.24.129.1.x86_64",
            "SUSE Manager Retail Branch Server 4.1:kernel-preempt-devel-5.3.18-150200.24.129.1.x86_64",
            "SUSE Manager Retail Branch Server 4.1:kernel-source-5.3.18-150200.24.129.1.noarch",
            "SUSE Manager Retail Branch Server 4.1:kernel-syms-5.3.18-150200.24.129.1.x86_64",
            "SUSE Manager Retail Branch Server 4.1:reiserfs-kmp-default-5.3.18-150200.24.129.1.x86_64",
            "SUSE Manager Server 4.1:kernel-default-5.3.18-150200.24.129.1.ppc64le",
            "SUSE Manager Server 4.1:kernel-default-5.3.18-150200.24.129.1.s390x",
            "SUSE Manager Server 4.1:kernel-default-5.3.18-150200.24.129.1.x86_64",
            "SUSE Manager Server 4.1:kernel-default-base-5.3.18-150200.24.129.1.150200.9.61.1.ppc64le",
            "SUSE Manager Server 4.1:kernel-default-base-5.3.18-150200.24.129.1.150200.9.61.1.s390x",
            "SUSE Manager Server 4.1:kernel-default-base-5.3.18-150200.24.129.1.150200.9.61.1.x86_64",
            "SUSE Manager Server 4.1:kernel-default-devel-5.3.18-150200.24.129.1.ppc64le",
            "SUSE Manager Server 4.1:kernel-default-devel-5.3.18-150200.24.129.1.s390x",
            "SUSE Manager Server 4.1:kernel-default-devel-5.3.18-150200.24.129.1.x86_64",
            "SUSE Manager Server 4.1:kernel-devel-5.3.18-150200.24.129.1.noarch",
            "SUSE Manager Server 4.1:kernel-docs-5.3.18-150200.24.129.1.noarch",
            "SUSE Manager Server 4.1:kernel-macros-5.3.18-150200.24.129.1.noarch",
            "SUSE Manager Server 4.1:kernel-obs-build-5.3.18-150200.24.129.1.ppc64le",
            "SUSE Manager Server 4.1:kernel-obs-build-5.3.18-150200.24.129.1.s390x",
            "SUSE Manager Server 4.1:kernel-obs-build-5.3.18-150200.24.129.1.x86_64",
            "SUSE Manager Server 4.1:kernel-preempt-5.3.18-150200.24.129.1.x86_64",
            "SUSE Manager Server 4.1:kernel-preempt-devel-5.3.18-150200.24.129.1.x86_64",
            "SUSE Manager Server 4.1:kernel-source-5.3.18-150200.24.129.1.noarch",
            "SUSE Manager Server 4.1:kernel-syms-5.3.18-150200.24.129.1.ppc64le",
            "SUSE Manager Server 4.1:kernel-syms-5.3.18-150200.24.129.1.s390x",
            "SUSE Manager Server 4.1:kernel-syms-5.3.18-150200.24.129.1.x86_64",
            "SUSE Manager Server 4.1:reiserfs-kmp-default-5.3.18-150200.24.129.1.ppc64le",
            "SUSE Manager Server 4.1:reiserfs-kmp-default-5.3.18-150200.24.129.1.s390x",
            "SUSE Manager Server 4.1:reiserfs-kmp-default-5.3.18-150200.24.129.1.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2022-09-28T06:48:59Z",
          "details": "moderate"
        }
      ],
      "title": "CVE-2022-20166"
    },
    {
      "cve": "CVE-2022-20368",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2022-20368"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "Product: AndroidVersions: Android kernelAndroid ID: A-224546354References: Upstream kernel",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "SUSE Enterprise Storage 7:kernel-default-5.3.18-150200.24.129.1.aarch64",
          "SUSE Enterprise Storage 7:kernel-default-5.3.18-150200.24.129.1.x86_64",
          "SUSE Enterprise Storage 7:kernel-default-base-5.3.18-150200.24.129.1.150200.9.61.1.aarch64",
          "SUSE Enterprise Storage 7:kernel-default-base-5.3.18-150200.24.129.1.150200.9.61.1.x86_64",
          "SUSE Enterprise Storage 7:kernel-default-devel-5.3.18-150200.24.129.1.aarch64",
          "SUSE Enterprise Storage 7:kernel-default-devel-5.3.18-150200.24.129.1.x86_64",
          "SUSE Enterprise Storage 7:kernel-devel-5.3.18-150200.24.129.1.noarch",
          "SUSE Enterprise Storage 7:kernel-docs-5.3.18-150200.24.129.1.noarch",
          "SUSE Enterprise Storage 7:kernel-macros-5.3.18-150200.24.129.1.noarch",
          "SUSE Enterprise Storage 7:kernel-obs-build-5.3.18-150200.24.129.1.aarch64",
          "SUSE Enterprise Storage 7:kernel-obs-build-5.3.18-150200.24.129.1.x86_64",
          "SUSE Enterprise Storage 7:kernel-preempt-5.3.18-150200.24.129.1.aarch64",
          "SUSE Enterprise Storage 7:kernel-preempt-5.3.18-150200.24.129.1.x86_64",
          "SUSE Enterprise Storage 7:kernel-preempt-devel-5.3.18-150200.24.129.1.aarch64",
          "SUSE Enterprise Storage 7:kernel-preempt-devel-5.3.18-150200.24.129.1.x86_64",
          "SUSE Enterprise Storage 7:kernel-source-5.3.18-150200.24.129.1.noarch",
          "SUSE Enterprise Storage 7:kernel-syms-5.3.18-150200.24.129.1.aarch64",
          "SUSE Enterprise Storage 7:kernel-syms-5.3.18-150200.24.129.1.x86_64",
          "SUSE Enterprise Storage 7:reiserfs-kmp-default-5.3.18-150200.24.129.1.aarch64",
          "SUSE Enterprise Storage 7:reiserfs-kmp-default-5.3.18-150200.24.129.1.x86_64",
          "SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-150200.24.129.1.aarch64",
          "SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-150200.24.129.1.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-150200.24.129.1.s390x",
          "SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-150200.24.129.1.x86_64",
          "SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-150200.24.129.1.aarch64",
          "SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-150200.24.129.1.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-150200.24.129.1.s390x",
          "SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-150200.24.129.1.x86_64",
          "SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-150200.24.129.1.aarch64",
          "SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-150200.24.129.1.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-150200.24.129.1.s390x",
          "SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-150200.24.129.1.x86_64",
          "SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-150200.24.129.1.aarch64",
          "SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-150200.24.129.1.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-150200.24.129.1.s390x",
          "SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-150200.24.129.1.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-default-5.3.18-150200.24.129.1.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-default-5.3.18-150200.24.129.1.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-default-base-5.3.18-150200.24.129.1.150200.9.61.1.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-default-base-5.3.18-150200.24.129.1.150200.9.61.1.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-default-devel-5.3.18-150200.24.129.1.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-default-devel-5.3.18-150200.24.129.1.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-devel-5.3.18-150200.24.129.1.noarch",
          "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-docs-5.3.18-150200.24.129.1.noarch",
          "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-macros-5.3.18-150200.24.129.1.noarch",
          "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-obs-build-5.3.18-150200.24.129.1.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-obs-build-5.3.18-150200.24.129.1.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-preempt-5.3.18-150200.24.129.1.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-preempt-5.3.18-150200.24.129.1.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-preempt-devel-5.3.18-150200.24.129.1.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-preempt-devel-5.3.18-150200.24.129.1.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-source-5.3.18-150200.24.129.1.noarch",
          "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-syms-5.3.18-150200.24.129.1.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-syms-5.3.18-150200.24.129.1.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-5.3.18-150200.24.129.1.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-5.3.18-150200.24.129.1.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.129.1.150200.9.61.1.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.129.1.150200.9.61.1.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.129.1.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.129.1.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-devel-5.3.18-150200.24.129.1.noarch",
          "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-docs-5.3.18-150200.24.129.1.noarch",
          "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-macros-5.3.18-150200.24.129.1.noarch",
          "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.129.1.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.129.1.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-preempt-5.3.18-150200.24.129.1.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-preempt-5.3.18-150200.24.129.1.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-preempt-devel-5.3.18-150200.24.129.1.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-preempt-devel-5.3.18-150200.24.129.1.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-source-5.3.18-150200.24.129.1.noarch",
          "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.129.1.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.129.1.x86_64",
          "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-5.3.18-150200.24.129.1.ppc64le",
          "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-5.3.18-150200.24.129.1.s390x",
          "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-5.3.18-150200.24.129.1.x86_64",
          "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-devel-5.3.18-150200.24.129.1.ppc64le",
          "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-devel-5.3.18-150200.24.129.1.s390x",
          "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-devel-5.3.18-150200.24.129.1.x86_64",
          "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-150200_24_129-default-1-150200.5.3.1.ppc64le",
          "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-150200_24_129-default-1-150200.5.3.1.s390x",
          "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-150200_24_129-default-1-150200.5.3.1.x86_64",
          "SUSE Linux Enterprise Server 15 SP2-BCL:kernel-default-5.3.18-150200.24.129.1.x86_64",
          "SUSE Linux Enterprise Server 15 SP2-BCL:kernel-default-base-5.3.18-150200.24.129.1.150200.9.61.1.x86_64",
          "SUSE Linux Enterprise Server 15 SP2-BCL:kernel-default-devel-5.3.18-150200.24.129.1.x86_64",
          "SUSE Linux Enterprise Server 15 SP2-BCL:kernel-devel-5.3.18-150200.24.129.1.noarch",
          "SUSE Linux Enterprise Server 15 SP2-BCL:kernel-docs-5.3.18-150200.24.129.1.noarch",
          "SUSE Linux Enterprise Server 15 SP2-BCL:kernel-macros-5.3.18-150200.24.129.1.noarch",
          "SUSE Linux Enterprise Server 15 SP2-BCL:kernel-obs-build-5.3.18-150200.24.129.1.x86_64",
          "SUSE Linux Enterprise Server 15 SP2-BCL:kernel-preempt-5.3.18-150200.24.129.1.x86_64",
          "SUSE Linux Enterprise Server 15 SP2-BCL:kernel-preempt-devel-5.3.18-150200.24.129.1.x86_64",
          "SUSE Linux Enterprise Server 15 SP2-BCL:kernel-source-5.3.18-150200.24.129.1.noarch",
          "SUSE Linux Enterprise Server 15 SP2-BCL:kernel-syms-5.3.18-150200.24.129.1.x86_64",
          "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-5.3.18-150200.24.129.1.aarch64",
          "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-5.3.18-150200.24.129.1.ppc64le",
          "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-5.3.18-150200.24.129.1.s390x",
          "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-5.3.18-150200.24.129.1.x86_64",
          "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.129.1.150200.9.61.1.aarch64",
          "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.129.1.150200.9.61.1.ppc64le",
          "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.129.1.150200.9.61.1.s390x",
          "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.129.1.150200.9.61.1.x86_64",
          "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.129.1.aarch64",
          "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.129.1.ppc64le",
          "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.129.1.s390x",
          "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.129.1.x86_64",
          "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-devel-5.3.18-150200.24.129.1.noarch",
          "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-docs-5.3.18-150200.24.129.1.noarch",
          "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-macros-5.3.18-150200.24.129.1.noarch",
          "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.129.1.aarch64",
          "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.129.1.ppc64le",
          "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.129.1.s390x",
          "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.129.1.x86_64",
          "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-preempt-5.3.18-150200.24.129.1.aarch64",
          "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-preempt-5.3.18-150200.24.129.1.x86_64",
          "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-preempt-devel-5.3.18-150200.24.129.1.aarch64",
          "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-preempt-devel-5.3.18-150200.24.129.1.x86_64",
          "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-source-5.3.18-150200.24.129.1.noarch",
          "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.129.1.aarch64",
          "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.129.1.ppc64le",
          "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.129.1.s390x",
          "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.129.1.x86_64",
          "SUSE Linux Enterprise Server 15 SP2-LTSS:reiserfs-kmp-default-5.3.18-150200.24.129.1.aarch64",
          "SUSE Linux Enterprise Server 15 SP2-LTSS:reiserfs-kmp-default-5.3.18-150200.24.129.1.ppc64le",
          "SUSE Linux Enterprise Server 15 SP2-LTSS:reiserfs-kmp-default-5.3.18-150200.24.129.1.s390x",
          "SUSE Linux Enterprise Server 15 SP2-LTSS:reiserfs-kmp-default-5.3.18-150200.24.129.1.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-5.3.18-150200.24.129.1.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-5.3.18-150200.24.129.1.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-base-5.3.18-150200.24.129.1.150200.9.61.1.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-base-5.3.18-150200.24.129.1.150200.9.61.1.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-devel-5.3.18-150200.24.129.1.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-devel-5.3.18-150200.24.129.1.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-devel-5.3.18-150200.24.129.1.noarch",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-docs-5.3.18-150200.24.129.1.noarch",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-macros-5.3.18-150200.24.129.1.noarch",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-obs-build-5.3.18-150200.24.129.1.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-obs-build-5.3.18-150200.24.129.1.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-preempt-5.3.18-150200.24.129.1.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-preempt-devel-5.3.18-150200.24.129.1.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-source-5.3.18-150200.24.129.1.noarch",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-syms-5.3.18-150200.24.129.1.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-syms-5.3.18-150200.24.129.1.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP2:reiserfs-kmp-default-5.3.18-150200.24.129.1.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP2:reiserfs-kmp-default-5.3.18-150200.24.129.1.x86_64",
          "SUSE Manager Proxy 4.1:kernel-default-5.3.18-150200.24.129.1.x86_64",
          "SUSE Manager Proxy 4.1:kernel-default-base-5.3.18-150200.24.129.1.150200.9.61.1.x86_64",
          "SUSE Manager Proxy 4.1:kernel-default-devel-5.3.18-150200.24.129.1.x86_64",
          "SUSE Manager Proxy 4.1:kernel-devel-5.3.18-150200.24.129.1.noarch",
          "SUSE Manager Proxy 4.1:kernel-docs-5.3.18-150200.24.129.1.noarch",
          "SUSE Manager Proxy 4.1:kernel-macros-5.3.18-150200.24.129.1.noarch",
          "SUSE Manager Proxy 4.1:kernel-obs-build-5.3.18-150200.24.129.1.x86_64",
          "SUSE Manager Proxy 4.1:kernel-preempt-5.3.18-150200.24.129.1.x86_64",
          "SUSE Manager Proxy 4.1:kernel-preempt-devel-5.3.18-150200.24.129.1.x86_64",
          "SUSE Manager Proxy 4.1:kernel-source-5.3.18-150200.24.129.1.noarch",
          "SUSE Manager Proxy 4.1:kernel-syms-5.3.18-150200.24.129.1.x86_64",
          "SUSE Manager Proxy 4.1:reiserfs-kmp-default-5.3.18-150200.24.129.1.x86_64",
          "SUSE Manager Retail Branch Server 4.1:kernel-default-5.3.18-150200.24.129.1.x86_64",
          "SUSE Manager Retail Branch Server 4.1:kernel-default-base-5.3.18-150200.24.129.1.150200.9.61.1.x86_64",
          "SUSE Manager Retail Branch Server 4.1:kernel-default-devel-5.3.18-150200.24.129.1.x86_64",
          "SUSE Manager Retail Branch Server 4.1:kernel-devel-5.3.18-150200.24.129.1.noarch",
          "SUSE Manager Retail Branch Server 4.1:kernel-docs-5.3.18-150200.24.129.1.noarch",
          "SUSE Manager Retail Branch Server 4.1:kernel-macros-5.3.18-150200.24.129.1.noarch",
          "SUSE Manager Retail Branch Server 4.1:kernel-obs-build-5.3.18-150200.24.129.1.x86_64",
          "SUSE Manager Retail Branch Server 4.1:kernel-preempt-5.3.18-150200.24.129.1.x86_64",
          "SUSE Manager Retail Branch Server 4.1:kernel-preempt-devel-5.3.18-150200.24.129.1.x86_64",
          "SUSE Manager Retail Branch Server 4.1:kernel-source-5.3.18-150200.24.129.1.noarch",
          "SUSE Manager Retail Branch Server 4.1:kernel-syms-5.3.18-150200.24.129.1.x86_64",
          "SUSE Manager Retail Branch Server 4.1:reiserfs-kmp-default-5.3.18-150200.24.129.1.x86_64",
          "SUSE Manager Server 4.1:kernel-default-5.3.18-150200.24.129.1.ppc64le",
          "SUSE Manager Server 4.1:kernel-default-5.3.18-150200.24.129.1.s390x",
          "SUSE Manager Server 4.1:kernel-default-5.3.18-150200.24.129.1.x86_64",
          "SUSE Manager Server 4.1:kernel-default-base-5.3.18-150200.24.129.1.150200.9.61.1.ppc64le",
          "SUSE Manager Server 4.1:kernel-default-base-5.3.18-150200.24.129.1.150200.9.61.1.s390x",
          "SUSE Manager Server 4.1:kernel-default-base-5.3.18-150200.24.129.1.150200.9.61.1.x86_64",
          "SUSE Manager Server 4.1:kernel-default-devel-5.3.18-150200.24.129.1.ppc64le",
          "SUSE Manager Server 4.1:kernel-default-devel-5.3.18-150200.24.129.1.s390x",
          "SUSE Manager Server 4.1:kernel-default-devel-5.3.18-150200.24.129.1.x86_64",
          "SUSE Manager Server 4.1:kernel-devel-5.3.18-150200.24.129.1.noarch",
          "SUSE Manager Server 4.1:kernel-docs-5.3.18-150200.24.129.1.noarch",
          "SUSE Manager Server 4.1:kernel-macros-5.3.18-150200.24.129.1.noarch",
          "SUSE Manager Server 4.1:kernel-obs-build-5.3.18-150200.24.129.1.ppc64le",
          "SUSE Manager Server 4.1:kernel-obs-build-5.3.18-150200.24.129.1.s390x",
          "SUSE Manager Server 4.1:kernel-obs-build-5.3.18-150200.24.129.1.x86_64",
          "SUSE Manager Server 4.1:kernel-preempt-5.3.18-150200.24.129.1.x86_64",
          "SUSE Manager Server 4.1:kernel-preempt-devel-5.3.18-150200.24.129.1.x86_64",
          "SUSE Manager Server 4.1:kernel-source-5.3.18-150200.24.129.1.noarch",
          "SUSE Manager Server 4.1:kernel-syms-5.3.18-150200.24.129.1.ppc64le",
          "SUSE Manager Server 4.1:kernel-syms-5.3.18-150200.24.129.1.s390x",
          "SUSE Manager Server 4.1:kernel-syms-5.3.18-150200.24.129.1.x86_64",
          "SUSE Manager Server 4.1:reiserfs-kmp-default-5.3.18-150200.24.129.1.ppc64le",
          "SUSE Manager Server 4.1:reiserfs-kmp-default-5.3.18-150200.24.129.1.s390x",
          "SUSE Manager Server 4.1:reiserfs-kmp-default-5.3.18-150200.24.129.1.x86_64"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2022-20368",
          "url": "https://www.suse.com/security/cve/CVE-2022-20368"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1202346 for CVE-2022-20368",
          "url": "https://bugzilla.suse.com/1202346"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1212311 for CVE-2022-20368",
          "url": "https://bugzilla.suse.com/1212311"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "SUSE Enterprise Storage 7:kernel-default-5.3.18-150200.24.129.1.aarch64",
            "SUSE Enterprise Storage 7:kernel-default-5.3.18-150200.24.129.1.x86_64",
            "SUSE Enterprise Storage 7:kernel-default-base-5.3.18-150200.24.129.1.150200.9.61.1.aarch64",
            "SUSE Enterprise Storage 7:kernel-default-base-5.3.18-150200.24.129.1.150200.9.61.1.x86_64",
            "SUSE Enterprise Storage 7:kernel-default-devel-5.3.18-150200.24.129.1.aarch64",
            "SUSE Enterprise Storage 7:kernel-default-devel-5.3.18-150200.24.129.1.x86_64",
            "SUSE Enterprise Storage 7:kernel-devel-5.3.18-150200.24.129.1.noarch",
            "SUSE Enterprise Storage 7:kernel-docs-5.3.18-150200.24.129.1.noarch",
            "SUSE Enterprise Storage 7:kernel-macros-5.3.18-150200.24.129.1.noarch",
            "SUSE Enterprise Storage 7:kernel-obs-build-5.3.18-150200.24.129.1.aarch64",
            "SUSE Enterprise Storage 7:kernel-obs-build-5.3.18-150200.24.129.1.x86_64",
            "SUSE Enterprise Storage 7:kernel-preempt-5.3.18-150200.24.129.1.aarch64",
            "SUSE Enterprise Storage 7:kernel-preempt-5.3.18-150200.24.129.1.x86_64",
            "SUSE Enterprise Storage 7:kernel-preempt-devel-5.3.18-150200.24.129.1.aarch64",
            "SUSE Enterprise Storage 7:kernel-preempt-devel-5.3.18-150200.24.129.1.x86_64",
            "SUSE Enterprise Storage 7:kernel-source-5.3.18-150200.24.129.1.noarch",
            "SUSE Enterprise Storage 7:kernel-syms-5.3.18-150200.24.129.1.aarch64",
            "SUSE Enterprise Storage 7:kernel-syms-5.3.18-150200.24.129.1.x86_64",
            "SUSE Enterprise Storage 7:reiserfs-kmp-default-5.3.18-150200.24.129.1.aarch64",
            "SUSE Enterprise Storage 7:reiserfs-kmp-default-5.3.18-150200.24.129.1.x86_64",
            "SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-150200.24.129.1.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-150200.24.129.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-150200.24.129.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-150200.24.129.1.x86_64",
            "SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-150200.24.129.1.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-150200.24.129.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-150200.24.129.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-150200.24.129.1.x86_64",
            "SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-150200.24.129.1.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-150200.24.129.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-150200.24.129.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-150200.24.129.1.x86_64",
            "SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-150200.24.129.1.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-150200.24.129.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-150200.24.129.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-150200.24.129.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-default-5.3.18-150200.24.129.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-default-5.3.18-150200.24.129.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-default-base-5.3.18-150200.24.129.1.150200.9.61.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-default-base-5.3.18-150200.24.129.1.150200.9.61.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-default-devel-5.3.18-150200.24.129.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-default-devel-5.3.18-150200.24.129.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-devel-5.3.18-150200.24.129.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-docs-5.3.18-150200.24.129.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-macros-5.3.18-150200.24.129.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-obs-build-5.3.18-150200.24.129.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-obs-build-5.3.18-150200.24.129.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-preempt-5.3.18-150200.24.129.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-preempt-5.3.18-150200.24.129.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-preempt-devel-5.3.18-150200.24.129.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-preempt-devel-5.3.18-150200.24.129.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-source-5.3.18-150200.24.129.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-syms-5.3.18-150200.24.129.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-syms-5.3.18-150200.24.129.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-5.3.18-150200.24.129.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-5.3.18-150200.24.129.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.129.1.150200.9.61.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.129.1.150200.9.61.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.129.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.129.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-devel-5.3.18-150200.24.129.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-docs-5.3.18-150200.24.129.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-macros-5.3.18-150200.24.129.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.129.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.129.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-preempt-5.3.18-150200.24.129.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-preempt-5.3.18-150200.24.129.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-preempt-devel-5.3.18-150200.24.129.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-preempt-devel-5.3.18-150200.24.129.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-source-5.3.18-150200.24.129.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.129.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.129.1.x86_64",
            "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-5.3.18-150200.24.129.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-5.3.18-150200.24.129.1.s390x",
            "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-5.3.18-150200.24.129.1.x86_64",
            "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-devel-5.3.18-150200.24.129.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-devel-5.3.18-150200.24.129.1.s390x",
            "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-devel-5.3.18-150200.24.129.1.x86_64",
            "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-150200_24_129-default-1-150200.5.3.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-150200_24_129-default-1-150200.5.3.1.s390x",
            "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-150200_24_129-default-1-150200.5.3.1.x86_64",
            "SUSE Linux Enterprise Server 15 SP2-BCL:kernel-default-5.3.18-150200.24.129.1.x86_64",
            "SUSE Linux Enterprise Server 15 SP2-BCL:kernel-default-base-5.3.18-150200.24.129.1.150200.9.61.1.x86_64",
            "SUSE Linux Enterprise Server 15 SP2-BCL:kernel-default-devel-5.3.18-150200.24.129.1.x86_64",
            "SUSE Linux Enterprise Server 15 SP2-BCL:kernel-devel-5.3.18-150200.24.129.1.noarch",
            "SUSE Linux Enterprise Server 15 SP2-BCL:kernel-docs-5.3.18-150200.24.129.1.noarch",
            "SUSE Linux Enterprise Server 15 SP2-BCL:kernel-macros-5.3.18-150200.24.129.1.noarch",
            "SUSE Linux Enterprise Server 15 SP2-BCL:kernel-obs-build-5.3.18-150200.24.129.1.x86_64",
            "SUSE Linux Enterprise Server 15 SP2-BCL:kernel-preempt-5.3.18-150200.24.129.1.x86_64",
            "SUSE Linux Enterprise Server 15 SP2-BCL:kernel-preempt-devel-5.3.18-150200.24.129.1.x86_64",
            "SUSE Linux Enterprise Server 15 SP2-BCL:kernel-source-5.3.18-150200.24.129.1.noarch",
            "SUSE Linux Enterprise Server 15 SP2-BCL:kernel-syms-5.3.18-150200.24.129.1.x86_64",
            "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-5.3.18-150200.24.129.1.aarch64",
            "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-5.3.18-150200.24.129.1.ppc64le",
            "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-5.3.18-150200.24.129.1.s390x",
            "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-5.3.18-150200.24.129.1.x86_64",
            "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.129.1.150200.9.61.1.aarch64",
            "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.129.1.150200.9.61.1.ppc64le",
            "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.129.1.150200.9.61.1.s390x",
            "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.129.1.150200.9.61.1.x86_64",
            "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.129.1.aarch64",
            "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.129.1.ppc64le",
            "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.129.1.s390x",
            "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.129.1.x86_64",
            "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-devel-5.3.18-150200.24.129.1.noarch",
            "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-docs-5.3.18-150200.24.129.1.noarch",
            "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-macros-5.3.18-150200.24.129.1.noarch",
            "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.129.1.aarch64",
            "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.129.1.ppc64le",
            "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.129.1.s390x",
            "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.129.1.x86_64",
            "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-preempt-5.3.18-150200.24.129.1.aarch64",
            "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-preempt-5.3.18-150200.24.129.1.x86_64",
            "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-preempt-devel-5.3.18-150200.24.129.1.aarch64",
            "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-preempt-devel-5.3.18-150200.24.129.1.x86_64",
            "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-source-5.3.18-150200.24.129.1.noarch",
            "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.129.1.aarch64",
            "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.129.1.ppc64le",
            "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.129.1.s390x",
            "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.129.1.x86_64",
            "SUSE Linux Enterprise Server 15 SP2-LTSS:reiserfs-kmp-default-5.3.18-150200.24.129.1.aarch64",
            "SUSE Linux Enterprise Server 15 SP2-LTSS:reiserfs-kmp-default-5.3.18-150200.24.129.1.ppc64le",
            "SUSE Linux Enterprise Server 15 SP2-LTSS:reiserfs-kmp-default-5.3.18-150200.24.129.1.s390x",
            "SUSE Linux Enterprise Server 15 SP2-LTSS:reiserfs-kmp-default-5.3.18-150200.24.129.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-5.3.18-150200.24.129.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-5.3.18-150200.24.129.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-base-5.3.18-150200.24.129.1.150200.9.61.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-base-5.3.18-150200.24.129.1.150200.9.61.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-devel-5.3.18-150200.24.129.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-devel-5.3.18-150200.24.129.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-devel-5.3.18-150200.24.129.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-docs-5.3.18-150200.24.129.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-macros-5.3.18-150200.24.129.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-obs-build-5.3.18-150200.24.129.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-obs-build-5.3.18-150200.24.129.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-preempt-5.3.18-150200.24.129.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-preempt-devel-5.3.18-150200.24.129.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-source-5.3.18-150200.24.129.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-syms-5.3.18-150200.24.129.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-syms-5.3.18-150200.24.129.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP2:reiserfs-kmp-default-5.3.18-150200.24.129.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP2:reiserfs-kmp-default-5.3.18-150200.24.129.1.x86_64",
            "SUSE Manager Proxy 4.1:kernel-default-5.3.18-150200.24.129.1.x86_64",
            "SUSE Manager Proxy 4.1:kernel-default-base-5.3.18-150200.24.129.1.150200.9.61.1.x86_64",
            "SUSE Manager Proxy 4.1:kernel-default-devel-5.3.18-150200.24.129.1.x86_64",
            "SUSE Manager Proxy 4.1:kernel-devel-5.3.18-150200.24.129.1.noarch",
            "SUSE Manager Proxy 4.1:kernel-docs-5.3.18-150200.24.129.1.noarch",
            "SUSE Manager Proxy 4.1:kernel-macros-5.3.18-150200.24.129.1.noarch",
            "SUSE Manager Proxy 4.1:kernel-obs-build-5.3.18-150200.24.129.1.x86_64",
            "SUSE Manager Proxy 4.1:kernel-preempt-5.3.18-150200.24.129.1.x86_64",
            "SUSE Manager Proxy 4.1:kernel-preempt-devel-5.3.18-150200.24.129.1.x86_64",
            "SUSE Manager Proxy 4.1:kernel-source-5.3.18-150200.24.129.1.noarch",
            "SUSE Manager Proxy 4.1:kernel-syms-5.3.18-150200.24.129.1.x86_64",
            "SUSE Manager Proxy 4.1:reiserfs-kmp-default-5.3.18-150200.24.129.1.x86_64",
            "SUSE Manager Retail Branch Server 4.1:kernel-default-5.3.18-150200.24.129.1.x86_64",
            "SUSE Manager Retail Branch Server 4.1:kernel-default-base-5.3.18-150200.24.129.1.150200.9.61.1.x86_64",
            "SUSE Manager Retail Branch Server 4.1:kernel-default-devel-5.3.18-150200.24.129.1.x86_64",
            "SUSE Manager Retail Branch Server 4.1:kernel-devel-5.3.18-150200.24.129.1.noarch",
            "SUSE Manager Retail Branch Server 4.1:kernel-docs-5.3.18-150200.24.129.1.noarch",
            "SUSE Manager Retail Branch Server 4.1:kernel-macros-5.3.18-150200.24.129.1.noarch",
            "SUSE Manager Retail Branch Server 4.1:kernel-obs-build-5.3.18-150200.24.129.1.x86_64",
            "SUSE Manager Retail Branch Server 4.1:kernel-preempt-5.3.18-150200.24.129.1.x86_64",
            "SUSE Manager Retail Branch Server 4.1:kernel-preempt-devel-5.3.18-150200.24.129.1.x86_64",
            "SUSE Manager Retail Branch Server 4.1:kernel-source-5.3.18-150200.24.129.1.noarch",
            "SUSE Manager Retail Branch Server 4.1:kernel-syms-5.3.18-150200.24.129.1.x86_64",
            "SUSE Manager Retail Branch Server 4.1:reiserfs-kmp-default-5.3.18-150200.24.129.1.x86_64",
            "SUSE Manager Server 4.1:kernel-default-5.3.18-150200.24.129.1.ppc64le",
            "SUSE Manager Server 4.1:kernel-default-5.3.18-150200.24.129.1.s390x",
            "SUSE Manager Server 4.1:kernel-default-5.3.18-150200.24.129.1.x86_64",
            "SUSE Manager Server 4.1:kernel-default-base-5.3.18-150200.24.129.1.150200.9.61.1.ppc64le",
            "SUSE Manager Server 4.1:kernel-default-base-5.3.18-150200.24.129.1.150200.9.61.1.s390x",
            "SUSE Manager Server 4.1:kernel-default-base-5.3.18-150200.24.129.1.150200.9.61.1.x86_64",
            "SUSE Manager Server 4.1:kernel-default-devel-5.3.18-150200.24.129.1.ppc64le",
            "SUSE Manager Server 4.1:kernel-default-devel-5.3.18-150200.24.129.1.s390x",
            "SUSE Manager Server 4.1:kernel-default-devel-5.3.18-150200.24.129.1.x86_64",
            "SUSE Manager Server 4.1:kernel-devel-5.3.18-150200.24.129.1.noarch",
            "SUSE Manager Server 4.1:kernel-docs-5.3.18-150200.24.129.1.noarch",
            "SUSE Manager Server 4.1:kernel-macros-5.3.18-150200.24.129.1.noarch",
            "SUSE Manager Server 4.1:kernel-obs-build-5.3.18-150200.24.129.1.ppc64le",
            "SUSE Manager Server 4.1:kernel-obs-build-5.3.18-150200.24.129.1.s390x",
            "SUSE Manager Server 4.1:kernel-obs-build-5.3.18-150200.24.129.1.x86_64",
            "SUSE Manager Server 4.1:kernel-preempt-5.3.18-150200.24.129.1.x86_64",
            "SUSE Manager Server 4.1:kernel-preempt-devel-5.3.18-150200.24.129.1.x86_64",
            "SUSE Manager Server 4.1:kernel-source-5.3.18-150200.24.129.1.noarch",
            "SUSE Manager Server 4.1:kernel-syms-5.3.18-150200.24.129.1.ppc64le",
            "SUSE Manager Server 4.1:kernel-syms-5.3.18-150200.24.129.1.s390x",
            "SUSE Manager Server 4.1:kernel-syms-5.3.18-150200.24.129.1.x86_64",
            "SUSE Manager Server 4.1:reiserfs-kmp-default-5.3.18-150200.24.129.1.ppc64le",
            "SUSE Manager Server 4.1:reiserfs-kmp-default-5.3.18-150200.24.129.1.s390x",
            "SUSE Manager Server 4.1:reiserfs-kmp-default-5.3.18-150200.24.129.1.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 5.5,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
            "version": "3.1"
          },
          "products": [
            "SUSE Enterprise Storage 7:kernel-default-5.3.18-150200.24.129.1.aarch64",
            "SUSE Enterprise Storage 7:kernel-default-5.3.18-150200.24.129.1.x86_64",
            "SUSE Enterprise Storage 7:kernel-default-base-5.3.18-150200.24.129.1.150200.9.61.1.aarch64",
            "SUSE Enterprise Storage 7:kernel-default-base-5.3.18-150200.24.129.1.150200.9.61.1.x86_64",
            "SUSE Enterprise Storage 7:kernel-default-devel-5.3.18-150200.24.129.1.aarch64",
            "SUSE Enterprise Storage 7:kernel-default-devel-5.3.18-150200.24.129.1.x86_64",
            "SUSE Enterprise Storage 7:kernel-devel-5.3.18-150200.24.129.1.noarch",
            "SUSE Enterprise Storage 7:kernel-docs-5.3.18-150200.24.129.1.noarch",
            "SUSE Enterprise Storage 7:kernel-macros-5.3.18-150200.24.129.1.noarch",
            "SUSE Enterprise Storage 7:kernel-obs-build-5.3.18-150200.24.129.1.aarch64",
            "SUSE Enterprise Storage 7:kernel-obs-build-5.3.18-150200.24.129.1.x86_64",
            "SUSE Enterprise Storage 7:kernel-preempt-5.3.18-150200.24.129.1.aarch64",
            "SUSE Enterprise Storage 7:kernel-preempt-5.3.18-150200.24.129.1.x86_64",
            "SUSE Enterprise Storage 7:kernel-preempt-devel-5.3.18-150200.24.129.1.aarch64",
            "SUSE Enterprise Storage 7:kernel-preempt-devel-5.3.18-150200.24.129.1.x86_64",
            "SUSE Enterprise Storage 7:kernel-source-5.3.18-150200.24.129.1.noarch",
            "SUSE Enterprise Storage 7:kernel-syms-5.3.18-150200.24.129.1.aarch64",
            "SUSE Enterprise Storage 7:kernel-syms-5.3.18-150200.24.129.1.x86_64",
            "SUSE Enterprise Storage 7:reiserfs-kmp-default-5.3.18-150200.24.129.1.aarch64",
            "SUSE Enterprise Storage 7:reiserfs-kmp-default-5.3.18-150200.24.129.1.x86_64",
            "SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-150200.24.129.1.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-150200.24.129.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-150200.24.129.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-150200.24.129.1.x86_64",
            "SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-150200.24.129.1.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-150200.24.129.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-150200.24.129.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-150200.24.129.1.x86_64",
            "SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-150200.24.129.1.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-150200.24.129.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-150200.24.129.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-150200.24.129.1.x86_64",
            "SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-150200.24.129.1.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-150200.24.129.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-150200.24.129.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-150200.24.129.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-default-5.3.18-150200.24.129.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-default-5.3.18-150200.24.129.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-default-base-5.3.18-150200.24.129.1.150200.9.61.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-default-base-5.3.18-150200.24.129.1.150200.9.61.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-default-devel-5.3.18-150200.24.129.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-default-devel-5.3.18-150200.24.129.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-devel-5.3.18-150200.24.129.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-docs-5.3.18-150200.24.129.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-macros-5.3.18-150200.24.129.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-obs-build-5.3.18-150200.24.129.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-obs-build-5.3.18-150200.24.129.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-preempt-5.3.18-150200.24.129.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-preempt-5.3.18-150200.24.129.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-preempt-devel-5.3.18-150200.24.129.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-preempt-devel-5.3.18-150200.24.129.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-source-5.3.18-150200.24.129.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-syms-5.3.18-150200.24.129.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-syms-5.3.18-150200.24.129.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-5.3.18-150200.24.129.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-5.3.18-150200.24.129.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.129.1.150200.9.61.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.129.1.150200.9.61.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.129.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.129.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-devel-5.3.18-150200.24.129.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-docs-5.3.18-150200.24.129.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-macros-5.3.18-150200.24.129.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.129.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.129.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-preempt-5.3.18-150200.24.129.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-preempt-5.3.18-150200.24.129.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-preempt-devel-5.3.18-150200.24.129.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-preempt-devel-5.3.18-150200.24.129.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-source-5.3.18-150200.24.129.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.129.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.129.1.x86_64",
            "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-5.3.18-150200.24.129.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-5.3.18-150200.24.129.1.s390x",
            "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-5.3.18-150200.24.129.1.x86_64",
            "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-devel-5.3.18-150200.24.129.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-devel-5.3.18-150200.24.129.1.s390x",
            "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-devel-5.3.18-150200.24.129.1.x86_64",
            "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-150200_24_129-default-1-150200.5.3.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-150200_24_129-default-1-150200.5.3.1.s390x",
            "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-150200_24_129-default-1-150200.5.3.1.x86_64",
            "SUSE Linux Enterprise Server 15 SP2-BCL:kernel-default-5.3.18-150200.24.129.1.x86_64",
            "SUSE Linux Enterprise Server 15 SP2-BCL:kernel-default-base-5.3.18-150200.24.129.1.150200.9.61.1.x86_64",
            "SUSE Linux Enterprise Server 15 SP2-BCL:kernel-default-devel-5.3.18-150200.24.129.1.x86_64",
            "SUSE Linux Enterprise Server 15 SP2-BCL:kernel-devel-5.3.18-150200.24.129.1.noarch",
            "SUSE Linux Enterprise Server 15 SP2-BCL:kernel-docs-5.3.18-150200.24.129.1.noarch",
            "SUSE Linux Enterprise Server 15 SP2-BCL:kernel-macros-5.3.18-150200.24.129.1.noarch",
            "SUSE Linux Enterprise Server 15 SP2-BCL:kernel-obs-build-5.3.18-150200.24.129.1.x86_64",
            "SUSE Linux Enterprise Server 15 SP2-BCL:kernel-preempt-5.3.18-150200.24.129.1.x86_64",
            "SUSE Linux Enterprise Server 15 SP2-BCL:kernel-preempt-devel-5.3.18-150200.24.129.1.x86_64",
            "SUSE Linux Enterprise Server 15 SP2-BCL:kernel-source-5.3.18-150200.24.129.1.noarch",
            "SUSE Linux Enterprise Server 15 SP2-BCL:kernel-syms-5.3.18-150200.24.129.1.x86_64",
            "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-5.3.18-150200.24.129.1.aarch64",
            "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-5.3.18-150200.24.129.1.ppc64le",
            "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-5.3.18-150200.24.129.1.s390x",
            "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-5.3.18-150200.24.129.1.x86_64",
            "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.129.1.150200.9.61.1.aarch64",
            "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.129.1.150200.9.61.1.ppc64le",
            "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.129.1.150200.9.61.1.s390x",
            "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.129.1.150200.9.61.1.x86_64",
            "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.129.1.aarch64",
            "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.129.1.ppc64le",
            "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.129.1.s390x",
            "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.129.1.x86_64",
            "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-devel-5.3.18-150200.24.129.1.noarch",
            "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-docs-5.3.18-150200.24.129.1.noarch",
            "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-macros-5.3.18-150200.24.129.1.noarch",
            "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.129.1.aarch64",
            "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.129.1.ppc64le",
            "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.129.1.s390x",
            "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.129.1.x86_64",
            "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-preempt-5.3.18-150200.24.129.1.aarch64",
            "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-preempt-5.3.18-150200.24.129.1.x86_64",
            "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-preempt-devel-5.3.18-150200.24.129.1.aarch64",
            "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-preempt-devel-5.3.18-150200.24.129.1.x86_64",
            "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-source-5.3.18-150200.24.129.1.noarch",
            "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.129.1.aarch64",
            "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.129.1.ppc64le",
            "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.129.1.s390x",
            "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.129.1.x86_64",
            "SUSE Linux Enterprise Server 15 SP2-LTSS:reiserfs-kmp-default-5.3.18-150200.24.129.1.aarch64",
            "SUSE Linux Enterprise Server 15 SP2-LTSS:reiserfs-kmp-default-5.3.18-150200.24.129.1.ppc64le",
            "SUSE Linux Enterprise Server 15 SP2-LTSS:reiserfs-kmp-default-5.3.18-150200.24.129.1.s390x",
            "SUSE Linux Enterprise Server 15 SP2-LTSS:reiserfs-kmp-default-5.3.18-150200.24.129.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-5.3.18-150200.24.129.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-5.3.18-150200.24.129.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-base-5.3.18-150200.24.129.1.150200.9.61.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-base-5.3.18-150200.24.129.1.150200.9.61.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-devel-5.3.18-150200.24.129.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-devel-5.3.18-150200.24.129.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-devel-5.3.18-150200.24.129.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-docs-5.3.18-150200.24.129.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-macros-5.3.18-150200.24.129.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-obs-build-5.3.18-150200.24.129.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-obs-build-5.3.18-150200.24.129.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-preempt-5.3.18-150200.24.129.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-preempt-devel-5.3.18-150200.24.129.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-source-5.3.18-150200.24.129.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-syms-5.3.18-150200.24.129.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-syms-5.3.18-150200.24.129.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP2:reiserfs-kmp-default-5.3.18-150200.24.129.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP2:reiserfs-kmp-default-5.3.18-150200.24.129.1.x86_64",
            "SUSE Manager Proxy 4.1:kernel-default-5.3.18-150200.24.129.1.x86_64",
            "SUSE Manager Proxy 4.1:kernel-default-base-5.3.18-150200.24.129.1.150200.9.61.1.x86_64",
            "SUSE Manager Proxy 4.1:kernel-default-devel-5.3.18-150200.24.129.1.x86_64",
            "SUSE Manager Proxy 4.1:kernel-devel-5.3.18-150200.24.129.1.noarch",
            "SUSE Manager Proxy 4.1:kernel-docs-5.3.18-150200.24.129.1.noarch",
            "SUSE Manager Proxy 4.1:kernel-macros-5.3.18-150200.24.129.1.noarch",
            "SUSE Manager Proxy 4.1:kernel-obs-build-5.3.18-150200.24.129.1.x86_64",
            "SUSE Manager Proxy 4.1:kernel-preempt-5.3.18-150200.24.129.1.x86_64",
            "SUSE Manager Proxy 4.1:kernel-preempt-devel-5.3.18-150200.24.129.1.x86_64",
            "SUSE Manager Proxy 4.1:kernel-source-5.3.18-150200.24.129.1.noarch",
            "SUSE Manager Proxy 4.1:kernel-syms-5.3.18-150200.24.129.1.x86_64",
            "SUSE Manager Proxy 4.1:reiserfs-kmp-default-5.3.18-150200.24.129.1.x86_64",
            "SUSE Manager Retail Branch Server 4.1:kernel-default-5.3.18-150200.24.129.1.x86_64",
            "SUSE Manager Retail Branch Server 4.1:kernel-default-base-5.3.18-150200.24.129.1.150200.9.61.1.x86_64",
            "SUSE Manager Retail Branch Server 4.1:kernel-default-devel-5.3.18-150200.24.129.1.x86_64",
            "SUSE Manager Retail Branch Server 4.1:kernel-devel-5.3.18-150200.24.129.1.noarch",
            "SUSE Manager Retail Branch Server 4.1:kernel-docs-5.3.18-150200.24.129.1.noarch",
            "SUSE Manager Retail Branch Server 4.1:kernel-macros-5.3.18-150200.24.129.1.noarch",
            "SUSE Manager Retail Branch Server 4.1:kernel-obs-build-5.3.18-150200.24.129.1.x86_64",
            "SUSE Manager Retail Branch Server 4.1:kernel-preempt-5.3.18-150200.24.129.1.x86_64",
            "SUSE Manager Retail Branch Server 4.1:kernel-preempt-devel-5.3.18-150200.24.129.1.x86_64",
            "SUSE Manager Retail Branch Server 4.1:kernel-source-5.3.18-150200.24.129.1.noarch",
            "SUSE Manager Retail Branch Server 4.1:kernel-syms-5.3.18-150200.24.129.1.x86_64",
            "SUSE Manager Retail Branch Server 4.1:reiserfs-kmp-default-5.3.18-150200.24.129.1.x86_64",
            "SUSE Manager Server 4.1:kernel-default-5.3.18-150200.24.129.1.ppc64le",
            "SUSE Manager Server 4.1:kernel-default-5.3.18-150200.24.129.1.s390x",
            "SUSE Manager Server 4.1:kernel-default-5.3.18-150200.24.129.1.x86_64",
            "SUSE Manager Server 4.1:kernel-default-base-5.3.18-150200.24.129.1.150200.9.61.1.ppc64le",
            "SUSE Manager Server 4.1:kernel-default-base-5.3.18-150200.24.129.1.150200.9.61.1.s390x",
            "SUSE Manager Server 4.1:kernel-default-base-5.3.18-150200.24.129.1.150200.9.61.1.x86_64",
            "SUSE Manager Server 4.1:kernel-default-devel-5.3.18-150200.24.129.1.ppc64le",
            "SUSE Manager Server 4.1:kernel-default-devel-5.3.18-150200.24.129.1.s390x",
            "SUSE Manager Server 4.1:kernel-default-devel-5.3.18-150200.24.129.1.x86_64",
            "SUSE Manager Server 4.1:kernel-devel-5.3.18-150200.24.129.1.noarch",
            "SUSE Manager Server 4.1:kernel-docs-5.3.18-150200.24.129.1.noarch",
            "SUSE Manager Server 4.1:kernel-macros-5.3.18-150200.24.129.1.noarch",
            "SUSE Manager Server 4.1:kernel-obs-build-5.3.18-150200.24.129.1.ppc64le",
            "SUSE Manager Server 4.1:kernel-obs-build-5.3.18-150200.24.129.1.s390x",
            "SUSE Manager Server 4.1:kernel-obs-build-5.3.18-150200.24.129.1.x86_64",
            "SUSE Manager Server 4.1:kernel-preempt-5.3.18-150200.24.129.1.x86_64",
            "SUSE Manager Server 4.1:kernel-preempt-devel-5.3.18-150200.24.129.1.x86_64",
            "SUSE Manager Server 4.1:kernel-source-5.3.18-150200.24.129.1.noarch",
            "SUSE Manager Server 4.1:kernel-syms-5.3.18-150200.24.129.1.ppc64le",
            "SUSE Manager Server 4.1:kernel-syms-5.3.18-150200.24.129.1.s390x",
            "SUSE Manager Server 4.1:kernel-syms-5.3.18-150200.24.129.1.x86_64",
            "SUSE Manager Server 4.1:reiserfs-kmp-default-5.3.18-150200.24.129.1.ppc64le",
            "SUSE Manager Server 4.1:reiserfs-kmp-default-5.3.18-150200.24.129.1.s390x",
            "SUSE Manager Server 4.1:reiserfs-kmp-default-5.3.18-150200.24.129.1.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2022-09-28T06:48:59Z",
          "details": "moderate"
        }
      ],
      "title": "CVE-2022-20368"
    },
    {
      "cve": "CVE-2022-20369",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2022-20369"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "In v4l2_m2m_querybuf of v4l2-mem2mem.c, there is a possible out of bounds write due to improper input validation. This could lead to local escalation of privilege with System execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android kernelAndroid ID: A-223375145References: Upstream kernel",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "SUSE Enterprise Storage 7:kernel-default-5.3.18-150200.24.129.1.aarch64",
          "SUSE Enterprise Storage 7:kernel-default-5.3.18-150200.24.129.1.x86_64",
          "SUSE Enterprise Storage 7:kernel-default-base-5.3.18-150200.24.129.1.150200.9.61.1.aarch64",
          "SUSE Enterprise Storage 7:kernel-default-base-5.3.18-150200.24.129.1.150200.9.61.1.x86_64",
          "SUSE Enterprise Storage 7:kernel-default-devel-5.3.18-150200.24.129.1.aarch64",
          "SUSE Enterprise Storage 7:kernel-default-devel-5.3.18-150200.24.129.1.x86_64",
          "SUSE Enterprise Storage 7:kernel-devel-5.3.18-150200.24.129.1.noarch",
          "SUSE Enterprise Storage 7:kernel-docs-5.3.18-150200.24.129.1.noarch",
          "SUSE Enterprise Storage 7:kernel-macros-5.3.18-150200.24.129.1.noarch",
          "SUSE Enterprise Storage 7:kernel-obs-build-5.3.18-150200.24.129.1.aarch64",
          "SUSE Enterprise Storage 7:kernel-obs-build-5.3.18-150200.24.129.1.x86_64",
          "SUSE Enterprise Storage 7:kernel-preempt-5.3.18-150200.24.129.1.aarch64",
          "SUSE Enterprise Storage 7:kernel-preempt-5.3.18-150200.24.129.1.x86_64",
          "SUSE Enterprise Storage 7:kernel-preempt-devel-5.3.18-150200.24.129.1.aarch64",
          "SUSE Enterprise Storage 7:kernel-preempt-devel-5.3.18-150200.24.129.1.x86_64",
          "SUSE Enterprise Storage 7:kernel-source-5.3.18-150200.24.129.1.noarch",
          "SUSE Enterprise Storage 7:kernel-syms-5.3.18-150200.24.129.1.aarch64",
          "SUSE Enterprise Storage 7:kernel-syms-5.3.18-150200.24.129.1.x86_64",
          "SUSE Enterprise Storage 7:reiserfs-kmp-default-5.3.18-150200.24.129.1.aarch64",
          "SUSE Enterprise Storage 7:reiserfs-kmp-default-5.3.18-150200.24.129.1.x86_64",
          "SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-150200.24.129.1.aarch64",
          "SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-150200.24.129.1.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-150200.24.129.1.s390x",
          "SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-150200.24.129.1.x86_64",
          "SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-150200.24.129.1.aarch64",
          "SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-150200.24.129.1.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-150200.24.129.1.s390x",
          "SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-150200.24.129.1.x86_64",
          "SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-150200.24.129.1.aarch64",
          "SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-150200.24.129.1.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-150200.24.129.1.s390x",
          "SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-150200.24.129.1.x86_64",
          "SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-150200.24.129.1.aarch64",
          "SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-150200.24.129.1.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-150200.24.129.1.s390x",
          "SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-150200.24.129.1.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-default-5.3.18-150200.24.129.1.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-default-5.3.18-150200.24.129.1.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-default-base-5.3.18-150200.24.129.1.150200.9.61.1.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-default-base-5.3.18-150200.24.129.1.150200.9.61.1.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-default-devel-5.3.18-150200.24.129.1.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-default-devel-5.3.18-150200.24.129.1.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-devel-5.3.18-150200.24.129.1.noarch",
          "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-docs-5.3.18-150200.24.129.1.noarch",
          "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-macros-5.3.18-150200.24.129.1.noarch",
          "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-obs-build-5.3.18-150200.24.129.1.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-obs-build-5.3.18-150200.24.129.1.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-preempt-5.3.18-150200.24.129.1.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-preempt-5.3.18-150200.24.129.1.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-preempt-devel-5.3.18-150200.24.129.1.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-preempt-devel-5.3.18-150200.24.129.1.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-source-5.3.18-150200.24.129.1.noarch",
          "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-syms-5.3.18-150200.24.129.1.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-syms-5.3.18-150200.24.129.1.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-5.3.18-150200.24.129.1.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-5.3.18-150200.24.129.1.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.129.1.150200.9.61.1.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.129.1.150200.9.61.1.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.129.1.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.129.1.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-devel-5.3.18-150200.24.129.1.noarch",
          "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-docs-5.3.18-150200.24.129.1.noarch",
          "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-macros-5.3.18-150200.24.129.1.noarch",
          "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.129.1.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.129.1.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-preempt-5.3.18-150200.24.129.1.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-preempt-5.3.18-150200.24.129.1.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-preempt-devel-5.3.18-150200.24.129.1.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-preempt-devel-5.3.18-150200.24.129.1.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-source-5.3.18-150200.24.129.1.noarch",
          "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.129.1.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.129.1.x86_64",
          "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-5.3.18-150200.24.129.1.ppc64le",
          "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-5.3.18-150200.24.129.1.s390x",
          "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-5.3.18-150200.24.129.1.x86_64",
          "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-devel-5.3.18-150200.24.129.1.ppc64le",
          "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-devel-5.3.18-150200.24.129.1.s390x",
          "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-devel-5.3.18-150200.24.129.1.x86_64",
          "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-150200_24_129-default-1-150200.5.3.1.ppc64le",
          "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-150200_24_129-default-1-150200.5.3.1.s390x",
          "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-150200_24_129-default-1-150200.5.3.1.x86_64",
          "SUSE Linux Enterprise Server 15 SP2-BCL:kernel-default-5.3.18-150200.24.129.1.x86_64",
          "SUSE Linux Enterprise Server 15 SP2-BCL:kernel-default-base-5.3.18-150200.24.129.1.150200.9.61.1.x86_64",
          "SUSE Linux Enterprise Server 15 SP2-BCL:kernel-default-devel-5.3.18-150200.24.129.1.x86_64",
          "SUSE Linux Enterprise Server 15 SP2-BCL:kernel-devel-5.3.18-150200.24.129.1.noarch",
          "SUSE Linux Enterprise Server 15 SP2-BCL:kernel-docs-5.3.18-150200.24.129.1.noarch",
          "SUSE Linux Enterprise Server 15 SP2-BCL:kernel-macros-5.3.18-150200.24.129.1.noarch",
          "SUSE Linux Enterprise Server 15 SP2-BCL:kernel-obs-build-5.3.18-150200.24.129.1.x86_64",
          "SUSE Linux Enterprise Server 15 SP2-BCL:kernel-preempt-5.3.18-150200.24.129.1.x86_64",
          "SUSE Linux Enterprise Server 15 SP2-BCL:kernel-preempt-devel-5.3.18-150200.24.129.1.x86_64",
          "SUSE Linux Enterprise Server 15 SP2-BCL:kernel-source-5.3.18-150200.24.129.1.noarch",
          "SUSE Linux Enterprise Server 15 SP2-BCL:kernel-syms-5.3.18-150200.24.129.1.x86_64",
          "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-5.3.18-150200.24.129.1.aarch64",
          "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-5.3.18-150200.24.129.1.ppc64le",
          "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-5.3.18-150200.24.129.1.s390x",
          "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-5.3.18-150200.24.129.1.x86_64",
          "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.129.1.150200.9.61.1.aarch64",
          "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.129.1.150200.9.61.1.ppc64le",
          "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.129.1.150200.9.61.1.s390x",
          "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.129.1.150200.9.61.1.x86_64",
          "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.129.1.aarch64",
          "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.129.1.ppc64le",
          "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.129.1.s390x",
          "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.129.1.x86_64",
          "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-devel-5.3.18-150200.24.129.1.noarch",
          "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-docs-5.3.18-150200.24.129.1.noarch",
          "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-macros-5.3.18-150200.24.129.1.noarch",
          "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.129.1.aarch64",
          "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.129.1.ppc64le",
          "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.129.1.s390x",
          "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.129.1.x86_64",
          "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-preempt-5.3.18-150200.24.129.1.aarch64",
          "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-preempt-5.3.18-150200.24.129.1.x86_64",
          "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-preempt-devel-5.3.18-150200.24.129.1.aarch64",
          "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-preempt-devel-5.3.18-150200.24.129.1.x86_64",
          "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-source-5.3.18-150200.24.129.1.noarch",
          "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.129.1.aarch64",
          "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.129.1.ppc64le",
          "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.129.1.s390x",
          "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.129.1.x86_64",
          "SUSE Linux Enterprise Server 15 SP2-LTSS:reiserfs-kmp-default-5.3.18-150200.24.129.1.aarch64",
          "SUSE Linux Enterprise Server 15 SP2-LTSS:reiserfs-kmp-default-5.3.18-150200.24.129.1.ppc64le",
          "SUSE Linux Enterprise Server 15 SP2-LTSS:reiserfs-kmp-default-5.3.18-150200.24.129.1.s390x",
          "SUSE Linux Enterprise Server 15 SP2-LTSS:reiserfs-kmp-default-5.3.18-150200.24.129.1.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-5.3.18-150200.24.129.1.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-5.3.18-150200.24.129.1.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-base-5.3.18-150200.24.129.1.150200.9.61.1.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-base-5.3.18-150200.24.129.1.150200.9.61.1.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-devel-5.3.18-150200.24.129.1.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-devel-5.3.18-150200.24.129.1.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-devel-5.3.18-150200.24.129.1.noarch",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-docs-5.3.18-150200.24.129.1.noarch",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-macros-5.3.18-150200.24.129.1.noarch",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-obs-build-5.3.18-150200.24.129.1.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-obs-build-5.3.18-150200.24.129.1.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-preempt-5.3.18-150200.24.129.1.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-preempt-devel-5.3.18-150200.24.129.1.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-source-5.3.18-150200.24.129.1.noarch",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-syms-5.3.18-150200.24.129.1.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-syms-5.3.18-150200.24.129.1.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP2:reiserfs-kmp-default-5.3.18-150200.24.129.1.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP2:reiserfs-kmp-default-5.3.18-150200.24.129.1.x86_64",
          "SUSE Manager Proxy 4.1:kernel-default-5.3.18-150200.24.129.1.x86_64",
          "SUSE Manager Proxy 4.1:kernel-default-base-5.3.18-150200.24.129.1.150200.9.61.1.x86_64",
          "SUSE Manager Proxy 4.1:kernel-default-devel-5.3.18-150200.24.129.1.x86_64",
          "SUSE Manager Proxy 4.1:kernel-devel-5.3.18-150200.24.129.1.noarch",
          "SUSE Manager Proxy 4.1:kernel-docs-5.3.18-150200.24.129.1.noarch",
          "SUSE Manager Proxy 4.1:kernel-macros-5.3.18-150200.24.129.1.noarch",
          "SUSE Manager Proxy 4.1:kernel-obs-build-5.3.18-150200.24.129.1.x86_64",
          "SUSE Manager Proxy 4.1:kernel-preempt-5.3.18-150200.24.129.1.x86_64",
          "SUSE Manager Proxy 4.1:kernel-preempt-devel-5.3.18-150200.24.129.1.x86_64",
          "SUSE Manager Proxy 4.1:kernel-source-5.3.18-150200.24.129.1.noarch",
          "SUSE Manager Proxy 4.1:kernel-syms-5.3.18-150200.24.129.1.x86_64",
          "SUSE Manager Proxy 4.1:reiserfs-kmp-default-5.3.18-150200.24.129.1.x86_64",
          "SUSE Manager Retail Branch Server 4.1:kernel-default-5.3.18-150200.24.129.1.x86_64",
          "SUSE Manager Retail Branch Server 4.1:kernel-default-base-5.3.18-150200.24.129.1.150200.9.61.1.x86_64",
          "SUSE Manager Retail Branch Server 4.1:kernel-default-devel-5.3.18-150200.24.129.1.x86_64",
          "SUSE Manager Retail Branch Server 4.1:kernel-devel-5.3.18-150200.24.129.1.noarch",
          "SUSE Manager Retail Branch Server 4.1:kernel-docs-5.3.18-150200.24.129.1.noarch",
          "SUSE Manager Retail Branch Server 4.1:kernel-macros-5.3.18-150200.24.129.1.noarch",
          "SUSE Manager Retail Branch Server 4.1:kernel-obs-build-5.3.18-150200.24.129.1.x86_64",
          "SUSE Manager Retail Branch Server 4.1:kernel-preempt-5.3.18-150200.24.129.1.x86_64",
          "SUSE Manager Retail Branch Server 4.1:kernel-preempt-devel-5.3.18-150200.24.129.1.x86_64",
          "SUSE Manager Retail Branch Server 4.1:kernel-source-5.3.18-150200.24.129.1.noarch",
          "SUSE Manager Retail Branch Server 4.1:kernel-syms-5.3.18-150200.24.129.1.x86_64",
          "SUSE Manager Retail Branch Server 4.1:reiserfs-kmp-default-5.3.18-150200.24.129.1.x86_64",
          "SUSE Manager Server 4.1:kernel-default-5.3.18-150200.24.129.1.ppc64le",
          "SUSE Manager Server 4.1:kernel-default-5.3.18-150200.24.129.1.s390x",
          "SUSE Manager Server 4.1:kernel-default-5.3.18-150200.24.129.1.x86_64",
          "SUSE Manager Server 4.1:kernel-default-base-5.3.18-150200.24.129.1.150200.9.61.1.ppc64le",
          "SUSE Manager Server 4.1:kernel-default-base-5.3.18-150200.24.129.1.150200.9.61.1.s390x",
          "SUSE Manager Server 4.1:kernel-default-base-5.3.18-150200.24.129.1.150200.9.61.1.x86_64",
          "SUSE Manager Server 4.1:kernel-default-devel-5.3.18-150200.24.129.1.ppc64le",
          "SUSE Manager Server 4.1:kernel-default-devel-5.3.18-150200.24.129.1.s390x",
          "SUSE Manager Server 4.1:kernel-default-devel-5.3.18-150200.24.129.1.x86_64",
          "SUSE Manager Server 4.1:kernel-devel-5.3.18-150200.24.129.1.noarch",
          "SUSE Manager Server 4.1:kernel-docs-5.3.18-150200.24.129.1.noarch",
          "SUSE Manager Server 4.1:kernel-macros-5.3.18-150200.24.129.1.noarch",
          "SUSE Manager Server 4.1:kernel-obs-build-5.3.18-150200.24.129.1.ppc64le",
          "SUSE Manager Server 4.1:kernel-obs-build-5.3.18-150200.24.129.1.s390x",
          "SUSE Manager Server 4.1:kernel-obs-build-5.3.18-150200.24.129.1.x86_64",
          "SUSE Manager Server 4.1:kernel-preempt-5.3.18-150200.24.129.1.x86_64",
          "SUSE Manager Server 4.1:kernel-preempt-devel-5.3.18-150200.24.129.1.x86_64",
          "SUSE Manager Server 4.1:kernel-source-5.3.18-150200.24.129.1.noarch",
          "SUSE Manager Server 4.1:kernel-syms-5.3.18-150200.24.129.1.ppc64le",
          "SUSE Manager Server 4.1:kernel-syms-5.3.18-150200.24.129.1.s390x",
          "SUSE Manager Server 4.1:kernel-syms-5.3.18-150200.24.129.1.x86_64",
          "SUSE Manager Server 4.1:reiserfs-kmp-default-5.3.18-150200.24.129.1.ppc64le",
          "SUSE Manager Server 4.1:reiserfs-kmp-default-5.3.18-150200.24.129.1.s390x",
          "SUSE Manager Server 4.1:reiserfs-kmp-default-5.3.18-150200.24.129.1.x86_64"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2022-20369",
          "url": "https://www.suse.com/security/cve/CVE-2022-20369"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1202347 for CVE-2022-20369",
          "url": "https://bugzilla.suse.com/1202347"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1212321 for CVE-2022-20369",
          "url": "https://bugzilla.suse.com/1212321"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "SUSE Enterprise Storage 7:kernel-default-5.3.18-150200.24.129.1.aarch64",
            "SUSE Enterprise Storage 7:kernel-default-5.3.18-150200.24.129.1.x86_64",
            "SUSE Enterprise Storage 7:kernel-default-base-5.3.18-150200.24.129.1.150200.9.61.1.aarch64",
            "SUSE Enterprise Storage 7:kernel-default-base-5.3.18-150200.24.129.1.150200.9.61.1.x86_64",
            "SUSE Enterprise Storage 7:kernel-default-devel-5.3.18-150200.24.129.1.aarch64",
            "SUSE Enterprise Storage 7:kernel-default-devel-5.3.18-150200.24.129.1.x86_64",
            "SUSE Enterprise Storage 7:kernel-devel-5.3.18-150200.24.129.1.noarch",
            "SUSE Enterprise Storage 7:kernel-docs-5.3.18-150200.24.129.1.noarch",
            "SUSE Enterprise Storage 7:kernel-macros-5.3.18-150200.24.129.1.noarch",
            "SUSE Enterprise Storage 7:kernel-obs-build-5.3.18-150200.24.129.1.aarch64",
            "SUSE Enterprise Storage 7:kernel-obs-build-5.3.18-150200.24.129.1.x86_64",
            "SUSE Enterprise Storage 7:kernel-preempt-5.3.18-150200.24.129.1.aarch64",
            "SUSE Enterprise Storage 7:kernel-preempt-5.3.18-150200.24.129.1.x86_64",
            "SUSE Enterprise Storage 7:kernel-preempt-devel-5.3.18-150200.24.129.1.aarch64",
            "SUSE Enterprise Storage 7:kernel-preempt-devel-5.3.18-150200.24.129.1.x86_64",
            "SUSE Enterprise Storage 7:kernel-source-5.3.18-150200.24.129.1.noarch",
            "SUSE Enterprise Storage 7:kernel-syms-5.3.18-150200.24.129.1.aarch64",
            "SUSE Enterprise Storage 7:kernel-syms-5.3.18-150200.24.129.1.x86_64",
            "SUSE Enterprise Storage 7:reiserfs-kmp-default-5.3.18-150200.24.129.1.aarch64",
            "SUSE Enterprise Storage 7:reiserfs-kmp-default-5.3.18-150200.24.129.1.x86_64",
            "SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-150200.24.129.1.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-150200.24.129.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-150200.24.129.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-150200.24.129.1.x86_64",
            "SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-150200.24.129.1.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-150200.24.129.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-150200.24.129.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-150200.24.129.1.x86_64",
            "SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-150200.24.129.1.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-150200.24.129.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-150200.24.129.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-150200.24.129.1.x86_64",
            "SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-150200.24.129.1.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-150200.24.129.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-150200.24.129.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-150200.24.129.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-default-5.3.18-150200.24.129.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-default-5.3.18-150200.24.129.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-default-base-5.3.18-150200.24.129.1.150200.9.61.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-default-base-5.3.18-150200.24.129.1.150200.9.61.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-default-devel-5.3.18-150200.24.129.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-default-devel-5.3.18-150200.24.129.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-devel-5.3.18-150200.24.129.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-docs-5.3.18-150200.24.129.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-macros-5.3.18-150200.24.129.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-obs-build-5.3.18-150200.24.129.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-obs-build-5.3.18-150200.24.129.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-preempt-5.3.18-150200.24.129.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-preempt-5.3.18-150200.24.129.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-preempt-devel-5.3.18-150200.24.129.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-preempt-devel-5.3.18-150200.24.129.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-source-5.3.18-150200.24.129.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-syms-5.3.18-150200.24.129.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-syms-5.3.18-150200.24.129.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-5.3.18-150200.24.129.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-5.3.18-150200.24.129.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.129.1.150200.9.61.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.129.1.150200.9.61.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.129.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.129.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-devel-5.3.18-150200.24.129.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-docs-5.3.18-150200.24.129.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-macros-5.3.18-150200.24.129.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.129.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.129.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-preempt-5.3.18-150200.24.129.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-preempt-5.3.18-150200.24.129.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-preempt-devel-5.3.18-150200.24.129.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-preempt-devel-5.3.18-150200.24.129.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-source-5.3.18-150200.24.129.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.129.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.129.1.x86_64",
            "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-5.3.18-150200.24.129.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-5.3.18-150200.24.129.1.s390x",
            "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-5.3.18-150200.24.129.1.x86_64",
            "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-devel-5.3.18-150200.24.129.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-devel-5.3.18-150200.24.129.1.s390x",
            "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-devel-5.3.18-150200.24.129.1.x86_64",
            "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-150200_24_129-default-1-150200.5.3.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-150200_24_129-default-1-150200.5.3.1.s390x",
            "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-150200_24_129-default-1-150200.5.3.1.x86_64",
            "SUSE Linux Enterprise Server 15 SP2-BCL:kernel-default-5.3.18-150200.24.129.1.x86_64",
            "SUSE Linux Enterprise Server 15 SP2-BCL:kernel-default-base-5.3.18-150200.24.129.1.150200.9.61.1.x86_64",
            "SUSE Linux Enterprise Server 15 SP2-BCL:kernel-default-devel-5.3.18-150200.24.129.1.x86_64",
            "SUSE Linux Enterprise Server 15 SP2-BCL:kernel-devel-5.3.18-150200.24.129.1.noarch",
            "SUSE Linux Enterprise Server 15 SP2-BCL:kernel-docs-5.3.18-150200.24.129.1.noarch",
            "SUSE Linux Enterprise Server 15 SP2-BCL:kernel-macros-5.3.18-150200.24.129.1.noarch",
            "SUSE Linux Enterprise Server 15 SP2-BCL:kernel-obs-build-5.3.18-150200.24.129.1.x86_64",
            "SUSE Linux Enterprise Server 15 SP2-BCL:kernel-preempt-5.3.18-150200.24.129.1.x86_64",
            "SUSE Linux Enterprise Server 15 SP2-BCL:kernel-preempt-devel-5.3.18-150200.24.129.1.x86_64",
            "SUSE Linux Enterprise Server 15 SP2-BCL:kernel-source-5.3.18-150200.24.129.1.noarch",
            "SUSE Linux Enterprise Server 15 SP2-BCL:kernel-syms-5.3.18-150200.24.129.1.x86_64",
            "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-5.3.18-150200.24.129.1.aarch64",
            "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-5.3.18-150200.24.129.1.ppc64le",
            "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-5.3.18-150200.24.129.1.s390x",
            "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-5.3.18-150200.24.129.1.x86_64",
            "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.129.1.150200.9.61.1.aarch64",
            "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.129.1.150200.9.61.1.ppc64le",
            "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.129.1.150200.9.61.1.s390x",
            "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.129.1.150200.9.61.1.x86_64",
            "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.129.1.aarch64",
            "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.129.1.ppc64le",
            "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.129.1.s390x",
            "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.129.1.x86_64",
            "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-devel-5.3.18-150200.24.129.1.noarch",
            "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-docs-5.3.18-150200.24.129.1.noarch",
            "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-macros-5.3.18-150200.24.129.1.noarch",
            "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.129.1.aarch64",
            "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.129.1.ppc64le",
            "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.129.1.s390x",
            "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.129.1.x86_64",
            "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-preempt-5.3.18-150200.24.129.1.aarch64",
            "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-preempt-5.3.18-150200.24.129.1.x86_64",
            "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-preempt-devel-5.3.18-150200.24.129.1.aarch64",
            "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-preempt-devel-5.3.18-150200.24.129.1.x86_64",
            "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-source-5.3.18-150200.24.129.1.noarch",
            "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.129.1.aarch64",
            "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.129.1.ppc64le",
            "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.129.1.s390x",
            "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.129.1.x86_64",
            "SUSE Linux Enterprise Server 15 SP2-LTSS:reiserfs-kmp-default-5.3.18-150200.24.129.1.aarch64",
            "SUSE Linux Enterprise Server 15 SP2-LTSS:reiserfs-kmp-default-5.3.18-150200.24.129.1.ppc64le",
            "SUSE Linux Enterprise Server 15 SP2-LTSS:reiserfs-kmp-default-5.3.18-150200.24.129.1.s390x",
            "SUSE Linux Enterprise Server 15 SP2-LTSS:reiserfs-kmp-default-5.3.18-150200.24.129.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-5.3.18-150200.24.129.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-5.3.18-150200.24.129.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-base-5.3.18-150200.24.129.1.150200.9.61.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-base-5.3.18-150200.24.129.1.150200.9.61.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-devel-5.3.18-150200.24.129.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-devel-5.3.18-150200.24.129.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-devel-5.3.18-150200.24.129.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-docs-5.3.18-150200.24.129.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-macros-5.3.18-150200.24.129.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-obs-build-5.3.18-150200.24.129.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-obs-build-5.3.18-150200.24.129.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-preempt-5.3.18-150200.24.129.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-preempt-devel-5.3.18-150200.24.129.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-source-5.3.18-150200.24.129.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-syms-5.3.18-150200.24.129.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-syms-5.3.18-150200.24.129.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP2:reiserfs-kmp-default-5.3.18-150200.24.129.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP2:reiserfs-kmp-default-5.3.18-150200.24.129.1.x86_64",
            "SUSE Manager Proxy 4.1:kernel-default-5.3.18-150200.24.129.1.x86_64",
            "SUSE Manager Proxy 4.1:kernel-default-base-5.3.18-150200.24.129.1.150200.9.61.1.x86_64",
            "SUSE Manager Proxy 4.1:kernel-default-devel-5.3.18-150200.24.129.1.x86_64",
            "SUSE Manager Proxy 4.1:kernel-devel-5.3.18-150200.24.129.1.noarch",
            "SUSE Manager Proxy 4.1:kernel-docs-5.3.18-150200.24.129.1.noarch",
            "SUSE Manager Proxy 4.1:kernel-macros-5.3.18-150200.24.129.1.noarch",
            "SUSE Manager Proxy 4.1:kernel-obs-build-5.3.18-150200.24.129.1.x86_64",
            "SUSE Manager Proxy 4.1:kernel-preempt-5.3.18-150200.24.129.1.x86_64",
            "SUSE Manager Proxy 4.1:kernel-preempt-devel-5.3.18-150200.24.129.1.x86_64",
            "SUSE Manager Proxy 4.1:kernel-source-5.3.18-150200.24.129.1.noarch",
            "SUSE Manager Proxy 4.1:kernel-syms-5.3.18-150200.24.129.1.x86_64",
            "SUSE Manager Proxy 4.1:reiserfs-kmp-default-5.3.18-150200.24.129.1.x86_64",
            "SUSE Manager Retail Branch Server 4.1:kernel-default-5.3.18-150200.24.129.1.x86_64",
            "SUSE Manager Retail Branch Server 4.1:kernel-default-base-5.3.18-150200.24.129.1.150200.9.61.1.x86_64",
            "SUSE Manager Retail Branch Server 4.1:kernel-default-devel-5.3.18-150200.24.129.1.x86_64",
            "SUSE Manager Retail Branch Server 4.1:kernel-devel-5.3.18-150200.24.129.1.noarch",
            "SUSE Manager Retail Branch Server 4.1:kernel-docs-5.3.18-150200.24.129.1.noarch",
            "SUSE Manager Retail Branch Server 4.1:kernel-macros-5.3.18-150200.24.129.1.noarch",
            "SUSE Manager Retail Branch Server 4.1:kernel-obs-build-5.3.18-150200.24.129.1.x86_64",
            "SUSE Manager Retail Branch Server 4.1:kernel-preempt-5.3.18-150200.24.129.1.x86_64",
            "SUSE Manager Retail Branch Server 4.1:kernel-preempt-devel-5.3.18-150200.24.129.1.x86_64",
            "SUSE Manager Retail Branch Server 4.1:kernel-source-5.3.18-150200.24.129.1.noarch",
            "SUSE Manager Retail Branch Server 4.1:kernel-syms-5.3.18-150200.24.129.1.x86_64",
            "SUSE Manager Retail Branch Server 4.1:reiserfs-kmp-default-5.3.18-150200.24.129.1.x86_64",
            "SUSE Manager Server 4.1:kernel-default-5.3.18-150200.24.129.1.ppc64le",
            "SUSE Manager Server 4.1:kernel-default-5.3.18-150200.24.129.1.s390x",
            "SUSE Manager Server 4.1:kernel-default-5.3.18-150200.24.129.1.x86_64",
            "SUSE Manager Server 4.1:kernel-default-base-5.3.18-150200.24.129.1.150200.9.61.1.ppc64le",
            "SUSE Manager Server 4.1:kernel-default-base-5.3.18-150200.24.129.1.150200.9.61.1.s390x",
            "SUSE Manager Server 4.1:kernel-default-base-5.3.18-150200.24.129.1.150200.9.61.1.x86_64",
            "SUSE Manager Server 4.1:kernel-default-devel-5.3.18-150200.24.129.1.ppc64le",
            "SUSE Manager Server 4.1:kernel-default-devel-5.3.18-150200.24.129.1.s390x",
            "SUSE Manager Server 4.1:kernel-default-devel-5.3.18-150200.24.129.1.x86_64",
            "SUSE Manager Server 4.1:kernel-devel-5.3.18-150200.24.129.1.noarch",
            "SUSE Manager Server 4.1:kernel-docs-5.3.18-150200.24.129.1.noarch",
            "SUSE Manager Server 4.1:kernel-macros-5.3.18-150200.24.129.1.noarch",
            "SUSE Manager Server 4.1:kernel-obs-build-5.3.18-150200.24.129.1.ppc64le",
            "SUSE Manager Server 4.1:kernel-obs-build-5.3.18-150200.24.129.1.s390x",
            "SUSE Manager Server 4.1:kernel-obs-build-5.3.18-150200.24.129.1.x86_64",
            "SUSE Manager Server 4.1:kernel-preempt-5.3.18-150200.24.129.1.x86_64",
            "SUSE Manager Server 4.1:kernel-preempt-devel-5.3.18-150200.24.129.1.x86_64",
            "SUSE Manager Server 4.1:kernel-source-5.3.18-150200.24.129.1.noarch",
            "SUSE Manager Server 4.1:kernel-syms-5.3.18-150200.24.129.1.ppc64le",
            "SUSE Manager Server 4.1:kernel-syms-5.3.18-150200.24.129.1.s390x",
            "SUSE Manager Server 4.1:kernel-syms-5.3.18-150200.24.129.1.x86_64",
            "SUSE Manager Server 4.1:reiserfs-kmp-default-5.3.18-150200.24.129.1.ppc64le",
            "SUSE Manager Server 4.1:reiserfs-kmp-default-5.3.18-150200.24.129.1.s390x",
            "SUSE Manager Server 4.1:reiserfs-kmp-default-5.3.18-150200.24.129.1.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 5.5,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
            "version": "3.1"
          },
          "products": [
            "SUSE Enterprise Storage 7:kernel-default-5.3.18-150200.24.129.1.aarch64",
            "SUSE Enterprise Storage 7:kernel-default-5.3.18-150200.24.129.1.x86_64",
            "SUSE Enterprise Storage 7:kernel-default-base-5.3.18-150200.24.129.1.150200.9.61.1.aarch64",
            "SUSE Enterprise Storage 7:kernel-default-base-5.3.18-150200.24.129.1.150200.9.61.1.x86_64",
            "SUSE Enterprise Storage 7:kernel-default-devel-5.3.18-150200.24.129.1.aarch64",
            "SUSE Enterprise Storage 7:kernel-default-devel-5.3.18-150200.24.129.1.x86_64",
            "SUSE Enterprise Storage 7:kernel-devel-5.3.18-150200.24.129.1.noarch",
            "SUSE Enterprise Storage 7:kernel-docs-5.3.18-150200.24.129.1.noarch",
            "SUSE Enterprise Storage 7:kernel-macros-5.3.18-150200.24.129.1.noarch",
            "SUSE Enterprise Storage 7:kernel-obs-build-5.3.18-150200.24.129.1.aarch64",
            "SUSE Enterprise Storage 7:kernel-obs-build-5.3.18-150200.24.129.1.x86_64",
            "SUSE Enterprise Storage 7:kernel-preempt-5.3.18-150200.24.129.1.aarch64",
            "SUSE Enterprise Storage 7:kernel-preempt-5.3.18-150200.24.129.1.x86_64",
            "SUSE Enterprise Storage 7:kernel-preempt-devel-5.3.18-150200.24.129.1.aarch64",
            "SUSE Enterprise Storage 7:kernel-preempt-devel-5.3.18-150200.24.129.1.x86_64",
            "SUSE Enterprise Storage 7:kernel-source-5.3.18-150200.24.129.1.noarch",
            "SUSE Enterprise Storage 7:kernel-syms-5.3.18-150200.24.129.1.aarch64",
            "SUSE Enterprise Storage 7:kernel-syms-5.3.18-150200.24.129.1.x86_64",
            "SUSE Enterprise Storage 7:reiserfs-kmp-default-5.3.18-150200.24.129.1.aarch64",
            "SUSE Enterprise Storage 7:reiserfs-kmp-default-5.3.18-150200.24.129.1.x86_64",
            "SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-150200.24.129.1.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-150200.24.129.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-150200.24.129.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-150200.24.129.1.x86_64",
            "SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-150200.24.129.1.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-150200.24.129.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-150200.24.129.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-150200.24.129.1.x86_64",
            "SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-150200.24.129.1.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-150200.24.129.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-150200.24.129.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-150200.24.129.1.x86_64",
            "SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-150200.24.129.1.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-150200.24.129.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-150200.24.129.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-150200.24.129.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-default-5.3.18-150200.24.129.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-default-5.3.18-150200.24.129.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-default-base-5.3.18-150200.24.129.1.150200.9.61.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-default-base-5.3.18-150200.24.129.1.150200.9.61.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-default-devel-5.3.18-150200.24.129.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-default-devel-5.3.18-150200.24.129.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-devel-5.3.18-150200.24.129.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-docs-5.3.18-150200.24.129.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-macros-5.3.18-150200.24.129.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-obs-build-5.3.18-150200.24.129.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-obs-build-5.3.18-150200.24.129.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-preempt-5.3.18-150200.24.129.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-preempt-5.3.18-150200.24.129.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-preempt-devel-5.3.18-150200.24.129.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-preempt-devel-5.3.18-150200.24.129.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-source-5.3.18-150200.24.129.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-syms-5.3.18-150200.24.129.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-syms-5.3.18-150200.24.129.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-5.3.18-150200.24.129.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-5.3.18-150200.24.129.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.129.1.150200.9.61.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.129.1.150200.9.61.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.129.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.129.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-devel-5.3.18-150200.24.129.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-docs-5.3.18-150200.24.129.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-macros-5.3.18-150200.24.129.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.129.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.129.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-preempt-5.3.18-150200.24.129.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-preempt-5.3.18-150200.24.129.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-preempt-devel-5.3.18-150200.24.129.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-preempt-devel-5.3.18-150200.24.129.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-source-5.3.18-150200.24.129.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.129.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.129.1.x86_64",
            "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-5.3.18-150200.24.129.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-5.3.18-150200.24.129.1.s390x",
            "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-5.3.18-150200.24.129.1.x86_64",
            "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-devel-5.3.18-150200.24.129.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-devel-5.3.18-150200.24.129.1.s390x",
            "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-devel-5.3.18-150200.24.129.1.x86_64",
            "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-150200_24_129-default-1-150200.5.3.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-150200_24_129-default-1-150200.5.3.1.s390x",
            "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-150200_24_129-default-1-150200.5.3.1.x86_64",
            "SUSE Linux Enterprise Server 15 SP2-BCL:kernel-default-5.3.18-150200.24.129.1.x86_64",
            "SUSE Linux Enterprise Server 15 SP2-BCL:kernel-default-base-5.3.18-150200.24.129.1.150200.9.61.1.x86_64",
            "SUSE Linux Enterprise Server 15 SP2-BCL:kernel-default-devel-5.3.18-150200.24.129.1.x86_64",
            "SUSE Linux Enterprise Server 15 SP2-BCL:kernel-devel-5.3.18-150200.24.129.1.noarch",
            "SUSE Linux Enterprise Server 15 SP2-BCL:kernel-docs-5.3.18-150200.24.129.1.noarch",
            "SUSE Linux Enterprise Server 15 SP2-BCL:kernel-macros-5.3.18-150200.24.129.1.noarch",
            "SUSE Linux Enterprise Server 15 SP2-BCL:kernel-obs-build-5.3.18-150200.24.129.1.x86_64",
            "SUSE Linux Enterprise Server 15 SP2-BCL:kernel-preempt-5.3.18-150200.24.129.1.x86_64",
            "SUSE Linux Enterprise Server 15 SP2-BCL:kernel-preempt-devel-5.3.18-150200.24.129.1.x86_64",
            "SUSE Linux Enterprise Server 15 SP2-BCL:kernel-source-5.3.18-150200.24.129.1.noarch",
            "SUSE Linux Enterprise Server 15 SP2-BCL:kernel-syms-5.3.18-150200.24.129.1.x86_64",
            "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-5.3.18-150200.24.129.1.aarch64",
            "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-5.3.18-150200.24.129.1.ppc64le",
            "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-5.3.18-150200.24.129.1.s390x",
            "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-5.3.18-150200.24.129.1.x86_64",
            "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.129.1.150200.9.61.1.aarch64",
            "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.129.1.150200.9.61.1.ppc64le",
            "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.129.1.150200.9.61.1.s390x",
            "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.129.1.150200.9.61.1.x86_64",
            "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.129.1.aarch64",
            "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.129.1.ppc64le",
            "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.129.1.s390x",
            "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.129.1.x86_64",
            "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-devel-5.3.18-150200.24.129.1.noarch",
            "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-docs-5.3.18-150200.24.129.1.noarch",
            "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-macros-5.3.18-150200.24.129.1.noarch",
            "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.129.1.aarch64",
            "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.129.1.ppc64le",
            "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.129.1.s390x",
            "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.129.1.x86_64",
            "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-preempt-5.3.18-150200.24.129.1.aarch64",
            "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-preempt-5.3.18-150200.24.129.1.x86_64",
            "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-preempt-devel-5.3.18-150200.24.129.1.aarch64",
            "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-preempt-devel-5.3.18-150200.24.129.1.x86_64",
            "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-source-5.3.18-150200.24.129.1.noarch",
            "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.129.1.aarch64",
            "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.129.1.ppc64le",
            "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.129.1.s390x",
            "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.129.1.x86_64",
            "SUSE Linux Enterprise Server 15 SP2-LTSS:reiserfs-kmp-default-5.3.18-150200.24.129.1.aarch64",
            "SUSE Linux Enterprise Server 15 SP2-LTSS:reiserfs-kmp-default-5.3.18-150200.24.129.1.ppc64le",
            "SUSE Linux Enterprise Server 15 SP2-LTSS:reiserfs-kmp-default-5.3.18-150200.24.129.1.s390x",
            "SUSE Linux Enterprise Server 15 SP2-LTSS:reiserfs-kmp-default-5.3.18-150200.24.129.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-5.3.18-150200.24.129.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-5.3.18-150200.24.129.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-base-5.3.18-150200.24.129.1.150200.9.61.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-base-5.3.18-150200.24.129.1.150200.9.61.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-devel-5.3.18-150200.24.129.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-devel-5.3.18-150200.24.129.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-devel-5.3.18-150200.24.129.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-docs-5.3.18-150200.24.129.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-macros-5.3.18-150200.24.129.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-obs-build-5.3.18-150200.24.129.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-obs-build-5.3.18-150200.24.129.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-preempt-5.3.18-150200.24.129.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-preempt-devel-5.3.18-150200.24.129.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-source-5.3.18-150200.24.129.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-syms-5.3.18-150200.24.129.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-syms-5.3.18-150200.24.129.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP2:reiserfs-kmp-default-5.3.18-150200.24.129.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP2:reiserfs-kmp-default-5.3.18-150200.24.129.1.x86_64",
            "SUSE Manager Proxy 4.1:kernel-default-5.3.18-150200.24.129.1.x86_64",
            "SUSE Manager Proxy 4.1:kernel-default-base-5.3.18-150200.24.129.1.150200.9.61.1.x86_64",
            "SUSE Manager Proxy 4.1:kernel-default-devel-5.3.18-150200.24.129.1.x86_64",
            "SUSE Manager Proxy 4.1:kernel-devel-5.3.18-150200.24.129.1.noarch",
            "SUSE Manager Proxy 4.1:kernel-docs-5.3.18-150200.24.129.1.noarch",
            "SUSE Manager Proxy 4.1:kernel-macros-5.3.18-150200.24.129.1.noarch",
            "SUSE Manager Proxy 4.1:kernel-obs-build-5.3.18-150200.24.129.1.x86_64",
            "SUSE Manager Proxy 4.1:kernel-preempt-5.3.18-150200.24.129.1.x86_64",
            "SUSE Manager Proxy 4.1:kernel-preempt-devel-5.3.18-150200.24.129.1.x86_64",
            "SUSE Manager Proxy 4.1:kernel-source-5.3.18-150200.24.129.1.noarch",
            "SUSE Manager Proxy 4.1:kernel-syms-5.3.18-150200.24.129.1.x86_64",
            "SUSE Manager Proxy 4.1:reiserfs-kmp-default-5.3.18-150200.24.129.1.x86_64",
            "SUSE Manager Retail Branch Server 4.1:kernel-default-5.3.18-150200.24.129.1.x86_64",
            "SUSE Manager Retail Branch Server 4.1:kernel-default-base-5.3.18-150200.24.129.1.150200.9.61.1.x86_64",
            "SUSE Manager Retail Branch Server 4.1:kernel-default-devel-5.3.18-150200.24.129.1.x86_64",
            "SUSE Manager Retail Branch Server 4.1:kernel-devel-5.3.18-150200.24.129.1.noarch",
            "SUSE Manager Retail Branch Server 4.1:kernel-docs-5.3.18-150200.24.129.1.noarch",
            "SUSE Manager Retail Branch Server 4.1:kernel-macros-5.3.18-150200.24.129.1.noarch",
            "SUSE Manager Retail Branch Server 4.1:kernel-obs-build-5.3.18-150200.24.129.1.x86_64",
            "SUSE Manager Retail Branch Server 4.1:kernel-preempt-5.3.18-150200.24.129.1.x86_64",
            "SUSE Manager Retail Branch Server 4.1:kernel-preempt-devel-5.3.18-150200.24.129.1.x86_64",
            "SUSE Manager Retail Branch Server 4.1:kernel-source-5.3.18-150200.24.129.1.noarch",
            "SUSE Manager Retail Branch Server 4.1:kernel-syms-5.3.18-150200.24.129.1.x86_64",
            "SUSE Manager Retail Branch Server 4.1:reiserfs-kmp-default-5.3.18-150200.24.129.1.x86_64",
            "SUSE Manager Server 4.1:kernel-default-5.3.18-150200.24.129.1.ppc64le",
            "SUSE Manager Server 4.1:kernel-default-5.3.18-150200.24.129.1.s390x",
            "SUSE Manager Server 4.1:kernel-default-5.3.18-150200.24.129.1.x86_64",
            "SUSE Manager Server 4.1:kernel-default-base-5.3.18-150200.24.129.1.150200.9.61.1.ppc64le",
            "SUSE Manager Server 4.1:kernel-default-base-5.3.18-150200.24.129.1.150200.9.61.1.s390x",
            "SUSE Manager Server 4.1:kernel-default-base-5.3.18-150200.24.129.1.150200.9.61.1.x86_64",
            "SUSE Manager Server 4.1:kernel-default-devel-5.3.18-150200.24.129.1.ppc64le",
            "SUSE Manager Server 4.1:kernel-default-devel-5.3.18-150200.24.129.1.s390x",
            "SUSE Manager Server 4.1:kernel-default-devel-5.3.18-150200.24.129.1.x86_64",
            "SUSE Manager Server 4.1:kernel-devel-5.3.18-150200.24.129.1.noarch",
            "SUSE Manager Server 4.1:kernel-docs-5.3.18-150200.24.129.1.noarch",
            "SUSE Manager Server 4.1:kernel-macros-5.3.18-150200.24.129.1.noarch",
            "SUSE Manager Server 4.1:kernel-obs-build-5.3.18-150200.24.129.1.ppc64le",
            "SUSE Manager Server 4.1:kernel-obs-build-5.3.18-150200.24.129.1.s390x",
            "SUSE Manager Server 4.1:kernel-obs-build-5.3.18-150200.24.129.1.x86_64",
            "SUSE Manager Server 4.1:kernel-preempt-5.3.18-150200.24.129.1.x86_64",
            "SUSE Manager Server 4.1:kernel-preempt-devel-5.3.18-150200.24.129.1.x86_64",
            "SUSE Manager Server 4.1:kernel-source-5.3.18-150200.24.129.1.noarch",
            "SUSE Manager Server 4.1:kernel-syms-5.3.18-150200.24.129.1.ppc64le",
            "SUSE Manager Server 4.1:kernel-syms-5.3.18-150200.24.129.1.s390x",
            "SUSE Manager Server 4.1:kernel-syms-5.3.18-150200.24.129.1.x86_64",
            "SUSE Manager Server 4.1:reiserfs-kmp-default-5.3.18-150200.24.129.1.ppc64le",
            "SUSE Manager Server 4.1:reiserfs-kmp-default-5.3.18-150200.24.129.1.s390x",
            "SUSE Manager Server 4.1:reiserfs-kmp-default-5.3.18-150200.24.129.1.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2022-09-28T06:48:59Z",
          "details": "moderate"
        }
      ],
      "title": "CVE-2022-20369"
    },
    {
      "cve": "CVE-2022-2588",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2022-2588"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "It was discovered that the cls_route filter implementation in the Linux kernel would not remove an old filter from the hashtable before freeing it if its handle had the value 0.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "SUSE Enterprise Storage 7:kernel-default-5.3.18-150200.24.129.1.aarch64",
          "SUSE Enterprise Storage 7:kernel-default-5.3.18-150200.24.129.1.x86_64",
          "SUSE Enterprise Storage 7:kernel-default-base-5.3.18-150200.24.129.1.150200.9.61.1.aarch64",
          "SUSE Enterprise Storage 7:kernel-default-base-5.3.18-150200.24.129.1.150200.9.61.1.x86_64",
          "SUSE Enterprise Storage 7:kernel-default-devel-5.3.18-150200.24.129.1.aarch64",
          "SUSE Enterprise Storage 7:kernel-default-devel-5.3.18-150200.24.129.1.x86_64",
          "SUSE Enterprise Storage 7:kernel-devel-5.3.18-150200.24.129.1.noarch",
          "SUSE Enterprise Storage 7:kernel-docs-5.3.18-150200.24.129.1.noarch",
          "SUSE Enterprise Storage 7:kernel-macros-5.3.18-150200.24.129.1.noarch",
          "SUSE Enterprise Storage 7:kernel-obs-build-5.3.18-150200.24.129.1.aarch64",
          "SUSE Enterprise Storage 7:kernel-obs-build-5.3.18-150200.24.129.1.x86_64",
          "SUSE Enterprise Storage 7:kernel-preempt-5.3.18-150200.24.129.1.aarch64",
          "SUSE Enterprise Storage 7:kernel-preempt-5.3.18-150200.24.129.1.x86_64",
          "SUSE Enterprise Storage 7:kernel-preempt-devel-5.3.18-150200.24.129.1.aarch64",
          "SUSE Enterprise Storage 7:kernel-preempt-devel-5.3.18-150200.24.129.1.x86_64",
          "SUSE Enterprise Storage 7:kernel-source-5.3.18-150200.24.129.1.noarch",
          "SUSE Enterprise Storage 7:kernel-syms-5.3.18-150200.24.129.1.aarch64",
          "SUSE Enterprise Storage 7:kernel-syms-5.3.18-150200.24.129.1.x86_64",
          "SUSE Enterprise Storage 7:reiserfs-kmp-default-5.3.18-150200.24.129.1.aarch64",
          "SUSE Enterprise Storage 7:reiserfs-kmp-default-5.3.18-150200.24.129.1.x86_64",
          "SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-150200.24.129.1.aarch64",
          "SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-150200.24.129.1.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-150200.24.129.1.s390x",
          "SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-150200.24.129.1.x86_64",
          "SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-150200.24.129.1.aarch64",
          "SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-150200.24.129.1.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-150200.24.129.1.s390x",
          "SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-150200.24.129.1.x86_64",
          "SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-150200.24.129.1.aarch64",
          "SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-150200.24.129.1.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-150200.24.129.1.s390x",
          "SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-150200.24.129.1.x86_64",
          "SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-150200.24.129.1.aarch64",
          "SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-150200.24.129.1.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-150200.24.129.1.s390x",
          "SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-150200.24.129.1.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-default-5.3.18-150200.24.129.1.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-default-5.3.18-150200.24.129.1.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-default-base-5.3.18-150200.24.129.1.150200.9.61.1.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-default-base-5.3.18-150200.24.129.1.150200.9.61.1.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-default-devel-5.3.18-150200.24.129.1.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-default-devel-5.3.18-150200.24.129.1.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-devel-5.3.18-150200.24.129.1.noarch",
          "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-docs-5.3.18-150200.24.129.1.noarch",
          "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-macros-5.3.18-150200.24.129.1.noarch",
          "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-obs-build-5.3.18-150200.24.129.1.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-obs-build-5.3.18-150200.24.129.1.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-preempt-5.3.18-150200.24.129.1.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-preempt-5.3.18-150200.24.129.1.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-preempt-devel-5.3.18-150200.24.129.1.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-preempt-devel-5.3.18-150200.24.129.1.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-source-5.3.18-150200.24.129.1.noarch",
          "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-syms-5.3.18-150200.24.129.1.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-syms-5.3.18-150200.24.129.1.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-5.3.18-150200.24.129.1.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-5.3.18-150200.24.129.1.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.129.1.150200.9.61.1.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.129.1.150200.9.61.1.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.129.1.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.129.1.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-devel-5.3.18-150200.24.129.1.noarch",
          "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-docs-5.3.18-150200.24.129.1.noarch",
          "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-macros-5.3.18-150200.24.129.1.noarch",
          "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.129.1.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.129.1.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-preempt-5.3.18-150200.24.129.1.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-preempt-5.3.18-150200.24.129.1.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-preempt-devel-5.3.18-150200.24.129.1.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-preempt-devel-5.3.18-150200.24.129.1.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-source-5.3.18-150200.24.129.1.noarch",
          "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.129.1.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.129.1.x86_64",
          "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-5.3.18-150200.24.129.1.ppc64le",
          "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-5.3.18-150200.24.129.1.s390x",
          "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-5.3.18-150200.24.129.1.x86_64",
          "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-devel-5.3.18-150200.24.129.1.ppc64le",
          "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-devel-5.3.18-150200.24.129.1.s390x",
          "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-devel-5.3.18-150200.24.129.1.x86_64",
          "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-150200_24_129-default-1-150200.5.3.1.ppc64le",
          "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-150200_24_129-default-1-150200.5.3.1.s390x",
          "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-150200_24_129-default-1-150200.5.3.1.x86_64",
          "SUSE Linux Enterprise Server 15 SP2-BCL:kernel-default-5.3.18-150200.24.129.1.x86_64",
          "SUSE Linux Enterprise Server 15 SP2-BCL:kernel-default-base-5.3.18-150200.24.129.1.150200.9.61.1.x86_64",
          "SUSE Linux Enterprise Server 15 SP2-BCL:kernel-default-devel-5.3.18-150200.24.129.1.x86_64",
          "SUSE Linux Enterprise Server 15 SP2-BCL:kernel-devel-5.3.18-150200.24.129.1.noarch",
          "SUSE Linux Enterprise Server 15 SP2-BCL:kernel-docs-5.3.18-150200.24.129.1.noarch",
          "SUSE Linux Enterprise Server 15 SP2-BCL:kernel-macros-5.3.18-150200.24.129.1.noarch",
          "SUSE Linux Enterprise Server 15 SP2-BCL:kernel-obs-build-5.3.18-150200.24.129.1.x86_64",
          "SUSE Linux Enterprise Server 15 SP2-BCL:kernel-preempt-5.3.18-150200.24.129.1.x86_64",
          "SUSE Linux Enterprise Server 15 SP2-BCL:kernel-preempt-devel-5.3.18-150200.24.129.1.x86_64",
          "SUSE Linux Enterprise Server 15 SP2-BCL:kernel-source-5.3.18-150200.24.129.1.noarch",
          "SUSE Linux Enterprise Server 15 SP2-BCL:kernel-syms-5.3.18-150200.24.129.1.x86_64",
          "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-5.3.18-150200.24.129.1.aarch64",
          "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-5.3.18-150200.24.129.1.ppc64le",
          "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-5.3.18-150200.24.129.1.s390x",
          "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-5.3.18-150200.24.129.1.x86_64",
          "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.129.1.150200.9.61.1.aarch64",
          "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.129.1.150200.9.61.1.ppc64le",
          "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.129.1.150200.9.61.1.s390x",
          "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.129.1.150200.9.61.1.x86_64",
          "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.129.1.aarch64",
          "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.129.1.ppc64le",
          "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.129.1.s390x",
          "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.129.1.x86_64",
          "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-devel-5.3.18-150200.24.129.1.noarch",
          "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-docs-5.3.18-150200.24.129.1.noarch",
          "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-macros-5.3.18-150200.24.129.1.noarch",
          "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.129.1.aarch64",
          "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.129.1.ppc64le",
          "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.129.1.s390x",
          "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.129.1.x86_64",
          "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-preempt-5.3.18-150200.24.129.1.aarch64",
          "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-preempt-5.3.18-150200.24.129.1.x86_64",
          "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-preempt-devel-5.3.18-150200.24.129.1.aarch64",
          "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-preempt-devel-5.3.18-150200.24.129.1.x86_64",
          "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-source-5.3.18-150200.24.129.1.noarch",
          "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.129.1.aarch64",
          "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.129.1.ppc64le",
          "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.129.1.s390x",
          "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.129.1.x86_64",
          "SUSE Linux Enterprise Server 15 SP2-LTSS:reiserfs-kmp-default-5.3.18-150200.24.129.1.aarch64",
          "SUSE Linux Enterprise Server 15 SP2-LTSS:reiserfs-kmp-default-5.3.18-150200.24.129.1.ppc64le",
          "SUSE Linux Enterprise Server 15 SP2-LTSS:reiserfs-kmp-default-5.3.18-150200.24.129.1.s390x",
          "SUSE Linux Enterprise Server 15 SP2-LTSS:reiserfs-kmp-default-5.3.18-150200.24.129.1.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-5.3.18-150200.24.129.1.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-5.3.18-150200.24.129.1.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-base-5.3.18-150200.24.129.1.150200.9.61.1.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-base-5.3.18-150200.24.129.1.150200.9.61.1.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-devel-5.3.18-150200.24.129.1.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-devel-5.3.18-150200.24.129.1.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-devel-5.3.18-150200.24.129.1.noarch",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-docs-5.3.18-150200.24.129.1.noarch",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-macros-5.3.18-150200.24.129.1.noarch",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-obs-build-5.3.18-150200.24.129.1.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-obs-build-5.3.18-150200.24.129.1.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-preempt-5.3.18-150200.24.129.1.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-preempt-devel-5.3.18-150200.24.129.1.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-source-5.3.18-150200.24.129.1.noarch",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-syms-5.3.18-150200.24.129.1.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-syms-5.3.18-150200.24.129.1.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP2:reiserfs-kmp-default-5.3.18-150200.24.129.1.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP2:reiserfs-kmp-default-5.3.18-150200.24.129.1.x86_64",
          "SUSE Manager Proxy 4.1:kernel-default-5.3.18-150200.24.129.1.x86_64",
          "SUSE Manager Proxy 4.1:kernel-default-base-5.3.18-150200.24.129.1.150200.9.61.1.x86_64",
          "SUSE Manager Proxy 4.1:kernel-default-devel-5.3.18-150200.24.129.1.x86_64",
          "SUSE Manager Proxy 4.1:kernel-devel-5.3.18-150200.24.129.1.noarch",
          "SUSE Manager Proxy 4.1:kernel-docs-5.3.18-150200.24.129.1.noarch",
          "SUSE Manager Proxy 4.1:kernel-macros-5.3.18-150200.24.129.1.noarch",
          "SUSE Manager Proxy 4.1:kernel-obs-build-5.3.18-150200.24.129.1.x86_64",
          "SUSE Manager Proxy 4.1:kernel-preempt-5.3.18-150200.24.129.1.x86_64",
          "SUSE Manager Proxy 4.1:kernel-preempt-devel-5.3.18-150200.24.129.1.x86_64",
          "SUSE Manager Proxy 4.1:kernel-source-5.3.18-150200.24.129.1.noarch",
          "SUSE Manager Proxy 4.1:kernel-syms-5.3.18-150200.24.129.1.x86_64",
          "SUSE Manager Proxy 4.1:reiserfs-kmp-default-5.3.18-150200.24.129.1.x86_64",
          "SUSE Manager Retail Branch Server 4.1:kernel-default-5.3.18-150200.24.129.1.x86_64",
          "SUSE Manager Retail Branch Server 4.1:kernel-default-base-5.3.18-150200.24.129.1.150200.9.61.1.x86_64",
          "SUSE Manager Retail Branch Server 4.1:kernel-default-devel-5.3.18-150200.24.129.1.x86_64",
          "SUSE Manager Retail Branch Server 4.1:kernel-devel-5.3.18-150200.24.129.1.noarch",
          "SUSE Manager Retail Branch Server 4.1:kernel-docs-5.3.18-150200.24.129.1.noarch",
          "SUSE Manager Retail Branch Server 4.1:kernel-macros-5.3.18-150200.24.129.1.noarch",
          "SUSE Manager Retail Branch Server 4.1:kernel-obs-build-5.3.18-150200.24.129.1.x86_64",
          "SUSE Manager Retail Branch Server 4.1:kernel-preempt-5.3.18-150200.24.129.1.x86_64",
          "SUSE Manager Retail Branch Server 4.1:kernel-preempt-devel-5.3.18-150200.24.129.1.x86_64",
          "SUSE Manager Retail Branch Server 4.1:kernel-source-5.3.18-150200.24.129.1.noarch",
          "SUSE Manager Retail Branch Server 4.1:kernel-syms-5.3.18-150200.24.129.1.x86_64",
          "SUSE Manager Retail Branch Server 4.1:reiserfs-kmp-default-5.3.18-150200.24.129.1.x86_64",
          "SUSE Manager Server 4.1:kernel-default-5.3.18-150200.24.129.1.ppc64le",
          "SUSE Manager Server 4.1:kernel-default-5.3.18-150200.24.129.1.s390x",
          "SUSE Manager Server 4.1:kernel-default-5.3.18-150200.24.129.1.x86_64",
          "SUSE Manager Server 4.1:kernel-default-base-5.3.18-150200.24.129.1.150200.9.61.1.ppc64le",
          "SUSE Manager Server 4.1:kernel-default-base-5.3.18-150200.24.129.1.150200.9.61.1.s390x",
          "SUSE Manager Server 4.1:kernel-default-base-5.3.18-150200.24.129.1.150200.9.61.1.x86_64",
          "SUSE Manager Server 4.1:kernel-default-devel-5.3.18-150200.24.129.1.ppc64le",
          "SUSE Manager Server 4.1:kernel-default-devel-5.3.18-150200.24.129.1.s390x",
          "SUSE Manager Server 4.1:kernel-default-devel-5.3.18-150200.24.129.1.x86_64",
          "SUSE Manager Server 4.1:kernel-devel-5.3.18-150200.24.129.1.noarch",
          "SUSE Manager Server 4.1:kernel-docs-5.3.18-150200.24.129.1.noarch",
          "SUSE Manager Server 4.1:kernel-macros-5.3.18-150200.24.129.1.noarch",
          "SUSE Manager Server 4.1:kernel-obs-build-5.3.18-150200.24.129.1.ppc64le",
          "SUSE Manager Server 4.1:kernel-obs-build-5.3.18-150200.24.129.1.s390x",
          "SUSE Manager Server 4.1:kernel-obs-build-5.3.18-150200.24.129.1.x86_64",
          "SUSE Manager Server 4.1:kernel-preempt-5.3.18-150200.24.129.1.x86_64",
          "SUSE Manager Server 4.1:kernel-preempt-devel-5.3.18-150200.24.129.1.x86_64",
          "SUSE Manager Server 4.1:kernel-source-5.3.18-150200.24.129.1.noarch",
          "SUSE Manager Server 4.1:kernel-syms-5.3.18-150200.24.129.1.ppc64le",
          "SUSE Manager Server 4.1:kernel-syms-5.3.18-150200.24.129.1.s390x",
          "SUSE Manager Server 4.1:kernel-syms-5.3.18-150200.24.129.1.x86_64",
          "SUSE Manager Server 4.1:reiserfs-kmp-default-5.3.18-150200.24.129.1.ppc64le",
          "SUSE Manager Server 4.1:reiserfs-kmp-default-5.3.18-150200.24.129.1.s390x",
          "SUSE Manager Server 4.1:reiserfs-kmp-default-5.3.18-150200.24.129.1.x86_64"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2022-2588",
          "url": "https://www.suse.com/security/cve/CVE-2022-2588"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1202096 for CVE-2022-2588",
          "url": "https://bugzilla.suse.com/1202096"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1203613 for CVE-2022-2588",
          "url": "https://bugzilla.suse.com/1203613"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1204183 for CVE-2022-2588",
          "url": "https://bugzilla.suse.com/1204183"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1209225 for CVE-2022-2588",
          "url": "https://bugzilla.suse.com/1209225"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "SUSE Enterprise Storage 7:kernel-default-5.3.18-150200.24.129.1.aarch64",
            "SUSE Enterprise Storage 7:kernel-default-5.3.18-150200.24.129.1.x86_64",
            "SUSE Enterprise Storage 7:kernel-default-base-5.3.18-150200.24.129.1.150200.9.61.1.aarch64",
            "SUSE Enterprise Storage 7:kernel-default-base-5.3.18-150200.24.129.1.150200.9.61.1.x86_64",
            "SUSE Enterprise Storage 7:kernel-default-devel-5.3.18-150200.24.129.1.aarch64",
            "SUSE Enterprise Storage 7:kernel-default-devel-5.3.18-150200.24.129.1.x86_64",
            "SUSE Enterprise Storage 7:kernel-devel-5.3.18-150200.24.129.1.noarch",
            "SUSE Enterprise Storage 7:kernel-docs-5.3.18-150200.24.129.1.noarch",
            "SUSE Enterprise Storage 7:kernel-macros-5.3.18-150200.24.129.1.noarch",
            "SUSE Enterprise Storage 7:kernel-obs-build-5.3.18-150200.24.129.1.aarch64",
            "SUSE Enterprise Storage 7:kernel-obs-build-5.3.18-150200.24.129.1.x86_64",
            "SUSE Enterprise Storage 7:kernel-preempt-5.3.18-150200.24.129.1.aarch64",
            "SUSE Enterprise Storage 7:kernel-preempt-5.3.18-150200.24.129.1.x86_64",
            "SUSE Enterprise Storage 7:kernel-preempt-devel-5.3.18-150200.24.129.1.aarch64",
            "SUSE Enterprise Storage 7:kernel-preempt-devel-5.3.18-150200.24.129.1.x86_64",
            "SUSE Enterprise Storage 7:kernel-source-5.3.18-150200.24.129.1.noarch",
            "SUSE Enterprise Storage 7:kernel-syms-5.3.18-150200.24.129.1.aarch64",
            "SUSE Enterprise Storage 7:kernel-syms-5.3.18-150200.24.129.1.x86_64",
            "SUSE Enterprise Storage 7:reiserfs-kmp-default-5.3.18-150200.24.129.1.aarch64",
            "SUSE Enterprise Storage 7:reiserfs-kmp-default-5.3.18-150200.24.129.1.x86_64",
            "SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-150200.24.129.1.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-150200.24.129.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-150200.24.129.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-150200.24.129.1.x86_64",
            "SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-150200.24.129.1.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-150200.24.129.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-150200.24.129.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-150200.24.129.1.x86_64",
            "SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-150200.24.129.1.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-150200.24.129.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-150200.24.129.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-150200.24.129.1.x86_64",
            "SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-150200.24.129.1.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-150200.24.129.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-150200.24.129.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-150200.24.129.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-default-5.3.18-150200.24.129.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-default-5.3.18-150200.24.129.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-default-base-5.3.18-150200.24.129.1.150200.9.61.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-default-base-5.3.18-150200.24.129.1.150200.9.61.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-default-devel-5.3.18-150200.24.129.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-default-devel-5.3.18-150200.24.129.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-devel-5.3.18-150200.24.129.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-docs-5.3.18-150200.24.129.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-macros-5.3.18-150200.24.129.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-obs-build-5.3.18-150200.24.129.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-obs-build-5.3.18-150200.24.129.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-preempt-5.3.18-150200.24.129.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-preempt-5.3.18-150200.24.129.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-preempt-devel-5.3.18-150200.24.129.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-preempt-devel-5.3.18-150200.24.129.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-source-5.3.18-150200.24.129.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-syms-5.3.18-150200.24.129.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-syms-5.3.18-150200.24.129.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-5.3.18-150200.24.129.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-5.3.18-150200.24.129.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.129.1.150200.9.61.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.129.1.150200.9.61.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.129.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.129.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-devel-5.3.18-150200.24.129.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-docs-5.3.18-150200.24.129.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-macros-5.3.18-150200.24.129.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.129.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.129.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-preempt-5.3.18-150200.24.129.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-preempt-5.3.18-150200.24.129.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-preempt-devel-5.3.18-150200.24.129.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-preempt-devel-5.3.18-150200.24.129.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-source-5.3.18-150200.24.129.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.129.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.129.1.x86_64",
            "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-5.3.18-150200.24.129.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-5.3.18-150200.24.129.1.s390x",
            "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-5.3.18-150200.24.129.1.x86_64",
            "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-devel-5.3.18-150200.24.129.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-devel-5.3.18-150200.24.129.1.s390x",
            "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-devel-5.3.18-150200.24.129.1.x86_64",
            "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-150200_24_129-default-1-150200.5.3.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-150200_24_129-default-1-150200.5.3.1.s390x",
            "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-150200_24_129-default-1-150200.5.3.1.x86_64",
            "SUSE Linux Enterprise Server 15 SP2-BCL:kernel-default-5.3.18-150200.24.129.1.x86_64",
            "SUSE Linux Enterprise Server 15 SP2-BCL:kernel-default-base-5.3.18-150200.24.129.1.150200.9.61.1.x86_64",
            "SUSE Linux Enterprise Server 15 SP2-BCL:kernel-default-devel-5.3.18-150200.24.129.1.x86_64",
            "SUSE Linux Enterprise Server 15 SP2-BCL:kernel-devel-5.3.18-150200.24.129.1.noarch",
            "SUSE Linux Enterprise Server 15 SP2-BCL:kernel-docs-5.3.18-150200.24.129.1.noarch",
            "SUSE Linux Enterprise Server 15 SP2-BCL:kernel-macros-5.3.18-150200.24.129.1.noarch",
            "SUSE Linux Enterprise Server 15 SP2-BCL:kernel-obs-build-5.3.18-150200.24.129.1.x86_64",
            "SUSE Linux Enterprise Server 15 SP2-BCL:kernel-preempt-5.3.18-150200.24.129.1.x86_64",
            "SUSE Linux Enterprise Server 15 SP2-BCL:kernel-preempt-devel-5.3.18-150200.24.129.1.x86_64",
            "SUSE Linux Enterprise Server 15 SP2-BCL:kernel-source-5.3.18-150200.24.129.1.noarch",
            "SUSE Linux Enterprise Server 15 SP2-BCL:kernel-syms-5.3.18-150200.24.129.1.x86_64",
            "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-5.3.18-150200.24.129.1.aarch64",
            "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-5.3.18-150200.24.129.1.ppc64le",
            "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-5.3.18-150200.24.129.1.s390x",
            "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-5.3.18-150200.24.129.1.x86_64",
            "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.129.1.150200.9.61.1.aarch64",
            "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.129.1.150200.9.61.1.ppc64le",
            "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.129.1.150200.9.61.1.s390x",
            "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.129.1.150200.9.61.1.x86_64",
            "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.129.1.aarch64",
            "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.129.1.ppc64le",
            "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.129.1.s390x",
            "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.129.1.x86_64",
            "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-devel-5.3.18-150200.24.129.1.noarch",
            "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-docs-5.3.18-150200.24.129.1.noarch",
            "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-macros-5.3.18-150200.24.129.1.noarch",
            "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.129.1.aarch64",
            "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.129.1.ppc64le",
            "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.129.1.s390x",
            "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.129.1.x86_64",
            "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-preempt-5.3.18-150200.24.129.1.aarch64",
            "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-preempt-5.3.18-150200.24.129.1.x86_64",
            "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-preempt-devel-5.3.18-150200.24.129.1.aarch64",
            "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-preempt-devel-5.3.18-150200.24.129.1.x86_64",
            "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-source-5.3.18-150200.24.129.1.noarch",
            "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.129.1.aarch64",
            "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.129.1.ppc64le",
            "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.129.1.s390x",
            "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.129.1.x86_64",
            "SUSE Linux Enterprise Server 15 SP2-LTSS:reiserfs-kmp-default-5.3.18-150200.24.129.1.aarch64",
            "SUSE Linux Enterprise Server 15 SP2-LTSS:reiserfs-kmp-default-5.3.18-150200.24.129.1.ppc64le",
            "SUSE Linux Enterprise Server 15 SP2-LTSS:reiserfs-kmp-default-5.3.18-150200.24.129.1.s390x",
            "SUSE Linux Enterprise Server 15 SP2-LTSS:reiserfs-kmp-default-5.3.18-150200.24.129.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-5.3.18-150200.24.129.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-5.3.18-150200.24.129.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-base-5.3.18-150200.24.129.1.150200.9.61.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-base-5.3.18-150200.24.129.1.150200.9.61.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-devel-5.3.18-150200.24.129.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-devel-5.3.18-150200.24.129.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-devel-5.3.18-150200.24.129.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-docs-5.3.18-150200.24.129.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-macros-5.3.18-150200.24.129.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-obs-build-5.3.18-150200.24.129.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-obs-build-5.3.18-150200.24.129.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-preempt-5.3.18-150200.24.129.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-preempt-devel-5.3.18-150200.24.129.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-source-5.3.18-150200.24.129.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-syms-5.3.18-150200.24.129.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-syms-5.3.18-150200.24.129.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP2:reiserfs-kmp-default-5.3.18-150200.24.129.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP2:reiserfs-kmp-default-5.3.18-150200.24.129.1.x86_64",
            "SUSE Manager Proxy 4.1:kernel-default-5.3.18-150200.24.129.1.x86_64",
            "SUSE Manager Proxy 4.1:kernel-default-base-5.3.18-150200.24.129.1.150200.9.61.1.x86_64",
            "SUSE Manager Proxy 4.1:kernel-default-devel-5.3.18-150200.24.129.1.x86_64",
            "SUSE Manager Proxy 4.1:kernel-devel-5.3.18-150200.24.129.1.noarch",
            "SUSE Manager Proxy 4.1:kernel-docs-5.3.18-150200.24.129.1.noarch",
            "SUSE Manager Proxy 4.1:kernel-macros-5.3.18-150200.24.129.1.noarch",
            "SUSE Manager Proxy 4.1:kernel-obs-build-5.3.18-150200.24.129.1.x86_64",
            "SUSE Manager Proxy 4.1:kernel-preempt-5.3.18-150200.24.129.1.x86_64",
            "SUSE Manager Proxy 4.1:kernel-preempt-devel-5.3.18-150200.24.129.1.x86_64",
            "SUSE Manager Proxy 4.1:kernel-source-5.3.18-150200.24.129.1.noarch",
            "SUSE Manager Proxy 4.1:kernel-syms-5.3.18-150200.24.129.1.x86_64",
            "SUSE Manager Proxy 4.1:reiserfs-kmp-default-5.3.18-150200.24.129.1.x86_64",
            "SUSE Manager Retail Branch Server 4.1:kernel-default-5.3.18-150200.24.129.1.x86_64",
            "SUSE Manager Retail Branch Server 4.1:kernel-default-base-5.3.18-150200.24.129.1.150200.9.61.1.x86_64",
            "SUSE Manager Retail Branch Server 4.1:kernel-default-devel-5.3.18-150200.24.129.1.x86_64",
            "SUSE Manager Retail Branch Server 4.1:kernel-devel-5.3.18-150200.24.129.1.noarch",
            "SUSE Manager Retail Branch Server 4.1:kernel-docs-5.3.18-150200.24.129.1.noarch",
            "SUSE Manager Retail Branch Server 4.1:kernel-macros-5.3.18-150200.24.129.1.noarch",
            "SUSE Manager Retail Branch Server 4.1:kernel-obs-build-5.3.18-150200.24.129.1.x86_64",
            "SUSE Manager Retail Branch Server 4.1:kernel-preempt-5.3.18-150200.24.129.1.x86_64",
            "SUSE Manager Retail Branch Server 4.1:kernel-preempt-devel-5.3.18-150200.24.129.1.x86_64",
            "SUSE Manager Retail Branch Server 4.1:kernel-source-5.3.18-150200.24.129.1.noarch",
            "SUSE Manager Retail Branch Server 4.1:kernel-syms-5.3.18-150200.24.129.1.x86_64",
            "SUSE Manager Retail Branch Server 4.1:reiserfs-kmp-default-5.3.18-150200.24.129.1.x86_64",
            "SUSE Manager Server 4.1:kernel-default-5.3.18-150200.24.129.1.ppc64le",
            "SUSE Manager Server 4.1:kernel-default-5.3.18-150200.24.129.1.s390x",
            "SUSE Manager Server 4.1:kernel-default-5.3.18-150200.24.129.1.x86_64",
            "SUSE Manager Server 4.1:kernel-default-base-5.3.18-150200.24.129.1.150200.9.61.1.ppc64le",
            "SUSE Manager Server 4.1:kernel-default-base-5.3.18-150200.24.129.1.150200.9.61.1.s390x",
            "SUSE Manager Server 4.1:kernel-default-base-5.3.18-150200.24.129.1.150200.9.61.1.x86_64",
            "SUSE Manager Server 4.1:kernel-default-devel-5.3.18-150200.24.129.1.ppc64le",
            "SUSE Manager Server 4.1:kernel-default-devel-5.3.18-150200.24.129.1.s390x",
            "SUSE Manager Server 4.1:kernel-default-devel-5.3.18-150200.24.129.1.x86_64",
            "SUSE Manager Server 4.1:kernel-devel-5.3.18-150200.24.129.1.noarch",
            "SUSE Manager Server 4.1:kernel-docs-5.3.18-150200.24.129.1.noarch",
            "SUSE Manager Server 4.1:kernel-macros-5.3.18-150200.24.129.1.noarch",
            "SUSE Manager Server 4.1:kernel-obs-build-5.3.18-150200.24.129.1.ppc64le",
            "SUSE Manager Server 4.1:kernel-obs-build-5.3.18-150200.24.129.1.s390x",
            "SUSE Manager Server 4.1:kernel-obs-build-5.3.18-150200.24.129.1.x86_64",
            "SUSE Manager Server 4.1:kernel-preempt-5.3.18-150200.24.129.1.x86_64",
            "SUSE Manager Server 4.1:kernel-preempt-devel-5.3.18-150200.24.129.1.x86_64",
            "SUSE Manager Server 4.1:kernel-source-5.3.18-150200.24.129.1.noarch",
            "SUSE Manager Server 4.1:kernel-syms-5.3.18-150200.24.129.1.ppc64le",
            "SUSE Manager Server 4.1:kernel-syms-5.3.18-150200.24.129.1.s390x",
            "SUSE Manager Server 4.1:kernel-syms-5.3.18-150200.24.129.1.x86_64",
            "SUSE Manager Server 4.1:reiserfs-kmp-default-5.3.18-150200.24.129.1.ppc64le",
            "SUSE Manager Server 4.1:reiserfs-kmp-default-5.3.18-150200.24.129.1.s390x",
            "SUSE Manager Server 4.1:reiserfs-kmp-default-5.3.18-150200.24.129.1.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 7.8,
            "baseSeverity": "HIGH",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
            "version": "3.1"
          },
          "products": [
            "SUSE Enterprise Storage 7:kernel-default-5.3.18-150200.24.129.1.aarch64",
            "SUSE Enterprise Storage 7:kernel-default-5.3.18-150200.24.129.1.x86_64",
            "SUSE Enterprise Storage 7:kernel-default-base-5.3.18-150200.24.129.1.150200.9.61.1.aarch64",
            "SUSE Enterprise Storage 7:kernel-default-base-5.3.18-150200.24.129.1.150200.9.61.1.x86_64",
            "SUSE Enterprise Storage 7:kernel-default-devel-5.3.18-150200.24.129.1.aarch64",
            "SUSE Enterprise Storage 7:kernel-default-devel-5.3.18-150200.24.129.1.x86_64",
            "SUSE Enterprise Storage 7:kernel-devel-5.3.18-150200.24.129.1.noarch",
            "SUSE Enterprise Storage 7:kernel-docs-5.3.18-150200.24.129.1.noarch",
            "SUSE Enterprise Storage 7:kernel-macros-5.3.18-150200.24.129.1.noarch",
            "SUSE Enterprise Storage 7:kernel-obs-build-5.3.18-150200.24.129.1.aarch64",
            "SUSE Enterprise Storage 7:kernel-obs-build-5.3.18-150200.24.129.1.x86_64",
            "SUSE Enterprise Storage 7:kernel-preempt-5.3.18-150200.24.129.1.aarch64",
            "SUSE Enterprise Storage 7:kernel-preempt-5.3.18-150200.24.129.1.x86_64",
            "SUSE Enterprise Storage 7:kernel-preempt-devel-5.3.18-150200.24.129.1.aarch64",
            "SUSE Enterprise Storage 7:kernel-preempt-devel-5.3.18-150200.24.129.1.x86_64",
            "SUSE Enterprise Storage 7:kernel-source-5.3.18-150200.24.129.1.noarch",
            "SUSE Enterprise Storage 7:kernel-syms-5.3.18-150200.24.129.1.aarch64",
            "SUSE Enterprise Storage 7:kernel-syms-5.3.18-150200.24.129.1.x86_64",
            "SUSE Enterprise Storage 7:reiserfs-kmp-default-5.3.18-150200.24.129.1.aarch64",
            "SUSE Enterprise Storage 7:reiserfs-kmp-default-5.3.18-150200.24.129.1.x86_64",
            "SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-150200.24.129.1.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-150200.24.129.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-150200.24.129.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-150200.24.129.1.x86_64",
            "SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-150200.24.129.1.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-150200.24.129.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-150200.24.129.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-150200.24.129.1.x86_64",
            "SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-150200.24.129.1.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-150200.24.129.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-150200.24.129.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-150200.24.129.1.x86_64",
            "SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-150200.24.129.1.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-150200.24.129.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-150200.24.129.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-150200.24.129.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-default-5.3.18-150200.24.129.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-default-5.3.18-150200.24.129.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-default-base-5.3.18-150200.24.129.1.150200.9.61.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-default-base-5.3.18-150200.24.129.1.150200.9.61.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-default-devel-5.3.18-150200.24.129.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-default-devel-5.3.18-150200.24.129.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-devel-5.3.18-150200.24.129.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-docs-5.3.18-150200.24.129.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-macros-5.3.18-150200.24.129.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-obs-build-5.3.18-150200.24.129.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-obs-build-5.3.18-150200.24.129.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-preempt-5.3.18-150200.24.129.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-preempt-5.3.18-150200.24.129.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-preempt-devel-5.3.18-150200.24.129.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-preempt-devel-5.3.18-150200.24.129.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-source-5.3.18-150200.24.129.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-syms-5.3.18-150200.24.129.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-syms-5.3.18-150200.24.129.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-5.3.18-150200.24.129.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-5.3.18-150200.24.129.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.129.1.150200.9.61.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.129.1.150200.9.61.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.129.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.129.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-devel-5.3.18-150200.24.129.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-docs-5.3.18-150200.24.129.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-macros-5.3.18-150200.24.129.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.129.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.129.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-preempt-5.3.18-150200.24.129.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-preempt-5.3.18-150200.24.129.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-preempt-devel-5.3.18-150200.24.129.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-preempt-devel-5.3.18-150200.24.129.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-source-5.3.18-150200.24.129.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.129.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.129.1.x86_64",
            "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-5.3.18-150200.24.129.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-5.3.18-150200.24.129.1.s390x",
            "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-5.3.18-150200.24.129.1.x86_64",
            "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-devel-5.3.18-150200.24.129.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-devel-5.3.18-150200.24.129.1.s390x",
            "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-devel-5.3.18-150200.24.129.1.x86_64",
            "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-150200_24_129-default-1-150200.5.3.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-150200_24_129-default-1-150200.5.3.1.s390x",
            "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-150200_24_129-default-1-150200.5.3.1.x86_64",
            "SUSE Linux Enterprise Server 15 SP2-BCL:kernel-default-5.3.18-150200.24.129.1.x86_64",
            "SUSE Linux Enterprise Server 15 SP2-BCL:kernel-default-base-5.3.18-150200.24.129.1.150200.9.61.1.x86_64",
            "SUSE Linux Enterprise Server 15 SP2-BCL:kernel-default-devel-5.3.18-150200.24.129.1.x86_64",
            "SUSE Linux Enterprise Server 15 SP2-BCL:kernel-devel-5.3.18-150200.24.129.1.noarch",
            "SUSE Linux Enterprise Server 15 SP2-BCL:kernel-docs-5.3.18-150200.24.129.1.noarch",
            "SUSE Linux Enterprise Server 15 SP2-BCL:kernel-macros-5.3.18-150200.24.129.1.noarch",
            "SUSE Linux Enterprise Server 15 SP2-BCL:kernel-obs-build-5.3.18-150200.24.129.1.x86_64",
            "SUSE Linux Enterprise Server 15 SP2-BCL:kernel-preempt-5.3.18-150200.24.129.1.x86_64",
            "SUSE Linux Enterprise Server 15 SP2-BCL:kernel-preempt-devel-5.3.18-150200.24.129.1.x86_64",
            "SUSE Linux Enterprise Server 15 SP2-BCL:kernel-source-5.3.18-150200.24.129.1.noarch",
            "SUSE Linux Enterprise Server 15 SP2-BCL:kernel-syms-5.3.18-150200.24.129.1.x86_64",
            "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-5.3.18-150200.24.129.1.aarch64",
            "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-5.3.18-150200.24.129.1.ppc64le",
            "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-5.3.18-150200.24.129.1.s390x",
            "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-5.3.18-150200.24.129.1.x86_64",
            "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.129.1.150200.9.61.1.aarch64",
            "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.129.1.150200.9.61.1.ppc64le",
            "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.129.1.150200.9.61.1.s390x",
            "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.129.1.150200.9.61.1.x86_64",
            "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.129.1.aarch64",
            "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.129.1.ppc64le",
            "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.129.1.s390x",
            "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.129.1.x86_64",
            "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-devel-5.3.18-150200.24.129.1.noarch",
            "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-docs-5.3.18-150200.24.129.1.noarch",
            "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-macros-5.3.18-150200.24.129.1.noarch",
            "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.129.1.aarch64",
            "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.129.1.ppc64le",
            "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.129.1.s390x",
            "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.129.1.x86_64",
            "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-preempt-5.3.18-150200.24.129.1.aarch64",
            "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-preempt-5.3.18-150200.24.129.1.x86_64",
            "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-preempt-devel-5.3.18-150200.24.129.1.aarch64",
            "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-preempt-devel-5.3.18-150200.24.129.1.x86_64",
            "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-source-5.3.18-150200.24.129.1.noarch",
            "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.129.1.aarch64",
            "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.129.1.ppc64le",
            "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.129.1.s390x",
            "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.129.1.x86_64",
            "SUSE Linux Enterprise Server 15 SP2-LTSS:reiserfs-kmp-default-5.3.18-150200.24.129.1.aarch64",
            "SUSE Linux Enterprise Server 15 SP2-LTSS:reiserfs-kmp-default-5.3.18-150200.24.129.1.ppc64le",
            "SUSE Linux Enterprise Server 15 SP2-LTSS:reiserfs-kmp-default-5.3.18-150200.24.129.1.s390x",
            "SUSE Linux Enterprise Server 15 SP2-LTSS:reiserfs-kmp-default-5.3.18-150200.24.129.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-5.3.18-150200.24.129.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-5.3.18-150200.24.129.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-base-5.3.18-150200.24.129.1.150200.9.61.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-base-5.3.18-150200.24.129.1.150200.9.61.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-devel-5.3.18-150200.24.129.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-devel-5.3.18-150200.24.129.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-devel-5.3.18-150200.24.129.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-docs-5.3.18-150200.24.129.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-macros-5.3.18-150200.24.129.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-obs-build-5.3.18-150200.24.129.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-obs-build-5.3.18-150200.24.129.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-preempt-5.3.18-150200.24.129.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-preempt-devel-5.3.18-150200.24.129.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-source-5.3.18-150200.24.129.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-syms-5.3.18-150200.24.129.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-syms-5.3.18-150200.24.129.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP2:reiserfs-kmp-default-5.3.18-150200.24.129.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP2:reiserfs-kmp-default-5.3.18-150200.24.129.1.x86_64",
            "SUSE Manager Proxy 4.1:kernel-default-5.3.18-150200.24.129.1.x86_64",
            "SUSE Manager Proxy 4.1:kernel-default-base-5.3.18-150200.24.129.1.150200.9.61.1.x86_64",
            "SUSE Manager Proxy 4.1:kernel-default-devel-5.3.18-150200.24.129.1.x86_64",
            "SUSE Manager Proxy 4.1:kernel-devel-5.3.18-150200.24.129.1.noarch",
            "SUSE Manager Proxy 4.1:kernel-docs-5.3.18-150200.24.129.1.noarch",
            "SUSE Manager Proxy 4.1:kernel-macros-5.3.18-150200.24.129.1.noarch",
            "SUSE Manager Proxy 4.1:kernel-obs-build-5.3.18-150200.24.129.1.x86_64",
            "SUSE Manager Proxy 4.1:kernel-preempt-5.3.18-150200.24.129.1.x86_64",
            "SUSE Manager Proxy 4.1:kernel-preempt-devel-5.3.18-150200.24.129.1.x86_64",
            "SUSE Manager Proxy 4.1:kernel-source-5.3.18-150200.24.129.1.noarch",
            "SUSE Manager Proxy 4.1:kernel-syms-5.3.18-150200.24.129.1.x86_64",
            "SUSE Manager Proxy 4.1:reiserfs-kmp-default-5.3.18-150200.24.129.1.x86_64",
            "SUSE Manager Retail Branch Server 4.1:kernel-default-5.3.18-150200.24.129.1.x86_64",
            "SUSE Manager Retail Branch Server 4.1:kernel-default-base-5.3.18-150200.24.129.1.150200.9.61.1.x86_64",
            "SUSE Manager Retail Branch Server 4.1:kernel-default-devel-5.3.18-150200.24.129.1.x86_64",
            "SUSE Manager Retail Branch Server 4.1:kernel-devel-5.3.18-150200.24.129.1.noarch",
            "SUSE Manager Retail Branch Server 4.1:kernel-docs-5.3.18-150200.24.129.1.noarch",
            "SUSE Manager Retail Branch Server 4.1:kernel-macros-5.3.18-150200.24.129.1.noarch",
            "SUSE Manager Retail Branch Server 4.1:kernel-obs-build-5.3.18-150200.24.129.1.x86_64",
            "SUSE Manager Retail Branch Server 4.1:kernel-preempt-5.3.18-150200.24.129.1.x86_64",
            "SUSE Manager Retail Branch Server 4.1:kernel-preempt-devel-5.3.18-150200.24.129.1.x86_64",
            "SUSE Manager Retail Branch Server 4.1:kernel-source-5.3.18-150200.24.129.1.noarch",
            "SUSE Manager Retail Branch Server 4.1:kernel-syms-5.3.18-150200.24.129.1.x86_64",
            "SUSE Manager Retail Branch Server 4.1:reiserfs-kmp-default-5.3.18-150200.24.129.1.x86_64",
            "SUSE Manager Server 4.1:kernel-default-5.3.18-150200.24.129.1.ppc64le",
            "SUSE Manager Server 4.1:kernel-default-5.3.18-150200.24.129.1.s390x",
            "SUSE Manager Server 4.1:kernel-default-5.3.18-150200.24.129.1.x86_64",
            "SUSE Manager Server 4.1:kernel-default-base-5.3.18-150200.24.129.1.150200.9.61.1.ppc64le",
            "SUSE Manager Server 4.1:kernel-default-base-5.3.18-150200.24.129.1.150200.9.61.1.s390x",
            "SUSE Manager Server 4.1:kernel-default-base-5.3.18-150200.24.129.1.150200.9.61.1.x86_64",
            "SUSE Manager Server 4.1:kernel-default-devel-5.3.18-150200.24.129.1.ppc64le",
            "SUSE Manager Server 4.1:kernel-default-devel-5.3.18-150200.24.129.1.s390x",
            "SUSE Manager Server 4.1:kernel-default-devel-5.3.18-150200.24.129.1.x86_64",
            "SUSE Manager Server 4.1:kernel-devel-5.3.18-150200.24.129.1.noarch",
            "SUSE Manager Server 4.1:kernel-docs-5.3.18-150200.24.129.1.noarch",
            "SUSE Manager Server 4.1:kernel-macros-5.3.18-150200.24.129.1.noarch",
            "SUSE Manager Server 4.1:kernel-obs-build-5.3.18-150200.24.129.1.ppc64le",
            "SUSE Manager Server 4.1:kernel-obs-build-5.3.18-150200.24.129.1.s390x",
            "SUSE Manager Server 4.1:kernel-obs-build-5.3.18-150200.24.129.1.x86_64",
            "SUSE Manager Server 4.1:kernel-preempt-5.3.18-150200.24.129.1.x86_64",
            "SUSE Manager Server 4.1:kernel-preempt-devel-5.3.18-150200.24.129.1.x86_64",
            "SUSE Manager Server 4.1:kernel-source-5.3.18-150200.24.129.1.noarch",
            "SUSE Manager Server 4.1:kernel-syms-5.3.18-150200.24.129.1.ppc64le",
            "SUSE Manager Server 4.1:kernel-syms-5.3.18-150200.24.129.1.s390x",
            "SUSE Manager Server 4.1:kernel-syms-5.3.18-150200.24.129.1.x86_64",
            "SUSE Manager Server 4.1:reiserfs-kmp-default-5.3.18-150200.24.129.1.ppc64le",
            "SUSE Manager Server 4.1:reiserfs-kmp-default-5.3.18-150200.24.129.1.s390x",
            "SUSE Manager Server 4.1:reiserfs-kmp-default-5.3.18-150200.24.129.1.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2022-09-28T06:48:59Z",
          "details": "important"
        }
      ],
      "title": "CVE-2022-2588"
    },
    {
      "cve": "CVE-2022-26373",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2022-26373"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "Non-transparent sharing of return predictor targets between contexts in some Intel(R) Processors may allow an authorized user to potentially enable information disclosure via local access.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "SUSE Enterprise Storage 7:kernel-default-5.3.18-150200.24.129.1.aarch64",
          "SUSE Enterprise Storage 7:kernel-default-5.3.18-150200.24.129.1.x86_64",
          "SUSE Enterprise Storage 7:kernel-default-base-5.3.18-150200.24.129.1.150200.9.61.1.aarch64",
          "SUSE Enterprise Storage 7:kernel-default-base-5.3.18-150200.24.129.1.150200.9.61.1.x86_64",
          "SUSE Enterprise Storage 7:kernel-default-devel-5.3.18-150200.24.129.1.aarch64",
          "SUSE Enterprise Storage 7:kernel-default-devel-5.3.18-150200.24.129.1.x86_64",
          "SUSE Enterprise Storage 7:kernel-devel-5.3.18-150200.24.129.1.noarch",
          "SUSE Enterprise Storage 7:kernel-docs-5.3.18-150200.24.129.1.noarch",
          "SUSE Enterprise Storage 7:kernel-macros-5.3.18-150200.24.129.1.noarch",
          "SUSE Enterprise Storage 7:kernel-obs-build-5.3.18-150200.24.129.1.aarch64",
          "SUSE Enterprise Storage 7:kernel-obs-build-5.3.18-150200.24.129.1.x86_64",
          "SUSE Enterprise Storage 7:kernel-preempt-5.3.18-150200.24.129.1.aarch64",
          "SUSE Enterprise Storage 7:kernel-preempt-5.3.18-150200.24.129.1.x86_64",
          "SUSE Enterprise Storage 7:kernel-preempt-devel-5.3.18-150200.24.129.1.aarch64",
          "SUSE Enterprise Storage 7:kernel-preempt-devel-5.3.18-150200.24.129.1.x86_64",
          "SUSE Enterprise Storage 7:kernel-source-5.3.18-150200.24.129.1.noarch",
          "SUSE Enterprise Storage 7:kernel-syms-5.3.18-150200.24.129.1.aarch64",
          "SUSE Enterprise Storage 7:kernel-syms-5.3.18-150200.24.129.1.x86_64",
          "SUSE Enterprise Storage 7:reiserfs-kmp-default-5.3.18-150200.24.129.1.aarch64",
          "SUSE Enterprise Storage 7:reiserfs-kmp-default-5.3.18-150200.24.129.1.x86_64",
          "SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-150200.24.129.1.aarch64",
          "SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-150200.24.129.1.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-150200.24.129.1.s390x",
          "SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-150200.24.129.1.x86_64",
          "SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-150200.24.129.1.aarch64",
          "SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-150200.24.129.1.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-150200.24.129.1.s390x",
          "SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-150200.24.129.1.x86_64",
          "SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-150200.24.129.1.aarch64",
          "SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-150200.24.129.1.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-150200.24.129.1.s390x",
          "SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-150200.24.129.1.x86_64",
          "SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-150200.24.129.1.aarch64",
          "SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-150200.24.129.1.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-150200.24.129.1.s390x",
          "SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-150200.24.129.1.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-default-5.3.18-150200.24.129.1.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-default-5.3.18-150200.24.129.1.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-default-base-5.3.18-150200.24.129.1.150200.9.61.1.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-default-base-5.3.18-150200.24.129.1.150200.9.61.1.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-default-devel-5.3.18-150200.24.129.1.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-default-devel-5.3.18-150200.24.129.1.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-devel-5.3.18-150200.24.129.1.noarch",
          "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-docs-5.3.18-150200.24.129.1.noarch",
          "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-macros-5.3.18-150200.24.129.1.noarch",
          "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-obs-build-5.3.18-150200.24.129.1.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-obs-build-5.3.18-150200.24.129.1.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-preempt-5.3.18-150200.24.129.1.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-preempt-5.3.18-150200.24.129.1.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-preempt-devel-5.3.18-150200.24.129.1.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-preempt-devel-5.3.18-150200.24.129.1.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-source-5.3.18-150200.24.129.1.noarch",
          "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-syms-5.3.18-150200.24.129.1.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-syms-5.3.18-150200.24.129.1.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-5.3.18-150200.24.129.1.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-5.3.18-150200.24.129.1.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.129.1.150200.9.61.1.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.129.1.150200.9.61.1.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.129.1.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.129.1.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-devel-5.3.18-150200.24.129.1.noarch",
          "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-docs-5.3.18-150200.24.129.1.noarch",
          "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-macros-5.3.18-150200.24.129.1.noarch",
          "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.129.1.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.129.1.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-preempt-5.3.18-150200.24.129.1.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-preempt-5.3.18-150200.24.129.1.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-preempt-devel-5.3.18-150200.24.129.1.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-preempt-devel-5.3.18-150200.24.129.1.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-source-5.3.18-150200.24.129.1.noarch",
          "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.129.1.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.129.1.x86_64",
          "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-5.3.18-150200.24.129.1.ppc64le",
          "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-5.3.18-150200.24.129.1.s390x",
          "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-5.3.18-150200.24.129.1.x86_64",
          "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-devel-5.3.18-150200.24.129.1.ppc64le",
          "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-devel-5.3.18-150200.24.129.1.s390x",
          "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-devel-5.3.18-150200.24.129.1.x86_64",
          "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-150200_24_129-default-1-150200.5.3.1.ppc64le",
          "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-150200_24_129-default-1-150200.5.3.1.s390x",
          "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-150200_24_129-default-1-150200.5.3.1.x86_64",
          "SUSE Linux Enterprise Server 15 SP2-BCL:kernel-default-5.3.18-150200.24.129.1.x86_64",
          "SUSE Linux Enterprise Server 15 SP2-BCL:kernel-default-base-5.3.18-150200.24.129.1.150200.9.61.1.x86_64",
          "SUSE Linux Enterprise Server 15 SP2-BCL:kernel-default-devel-5.3.18-150200.24.129.1.x86_64",
          "SUSE Linux Enterprise Server 15 SP2-BCL:kernel-devel-5.3.18-150200.24.129.1.noarch",
          "SUSE Linux Enterprise Server 15 SP2-BCL:kernel-docs-5.3.18-150200.24.129.1.noarch",
          "SUSE Linux Enterprise Server 15 SP2-BCL:kernel-macros-5.3.18-150200.24.129.1.noarch",
          "SUSE Linux Enterprise Server 15 SP2-BCL:kernel-obs-build-5.3.18-150200.24.129.1.x86_64",
          "SUSE Linux Enterprise Server 15 SP2-BCL:kernel-preempt-5.3.18-150200.24.129.1.x86_64",
          "SUSE Linux Enterprise Server 15 SP2-BCL:kernel-preempt-devel-5.3.18-150200.24.129.1.x86_64",
          "SUSE Linux Enterprise Server 15 SP2-BCL:kernel-source-5.3.18-150200.24.129.1.noarch",
          "SUSE Linux Enterprise Server 15 SP2-BCL:kernel-syms-5.3.18-150200.24.129.1.x86_64",
          "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-5.3.18-150200.24.129.1.aarch64",
          "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-5.3.18-150200.24.129.1.ppc64le",
          "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-5.3.18-150200.24.129.1.s390x",
          "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-5.3.18-150200.24.129.1.x86_64",
          "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.129.1.150200.9.61.1.aarch64",
          "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.129.1.150200.9.61.1.ppc64le",
          "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.129.1.150200.9.61.1.s390x",
          "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.129.1.150200.9.61.1.x86_64",
          "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.129.1.aarch64",
          "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.129.1.ppc64le",
          "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.129.1.s390x",
          "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.129.1.x86_64",
          "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-devel-5.3.18-150200.24.129.1.noarch",
          "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-docs-5.3.18-150200.24.129.1.noarch",
          "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-macros-5.3.18-150200.24.129.1.noarch",
          "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.129.1.aarch64",
          "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.129.1.ppc64le",
          "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.129.1.s390x",
          "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.129.1.x86_64",
          "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-preempt-5.3.18-150200.24.129.1.aarch64",
          "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-preempt-5.3.18-150200.24.129.1.x86_64",
          "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-preempt-devel-5.3.18-150200.24.129.1.aarch64",
          "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-preempt-devel-5.3.18-150200.24.129.1.x86_64",
          "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-source-5.3.18-150200.24.129.1.noarch",
          "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.129.1.aarch64",
          "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.129.1.ppc64le",
          "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.129.1.s390x",
          "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.129.1.x86_64",
          "SUSE Linux Enterprise Server 15 SP2-LTSS:reiserfs-kmp-default-5.3.18-150200.24.129.1.aarch64",
          "SUSE Linux Enterprise Server 15 SP2-LTSS:reiserfs-kmp-default-5.3.18-150200.24.129.1.ppc64le",
          "SUSE Linux Enterprise Server 15 SP2-LTSS:reiserfs-kmp-default-5.3.18-150200.24.129.1.s390x",
          "SUSE Linux Enterprise Server 15 SP2-LTSS:reiserfs-kmp-default-5.3.18-150200.24.129.1.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-5.3.18-150200.24.129.1.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-5.3.18-150200.24.129.1.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-base-5.3.18-150200.24.129.1.150200.9.61.1.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-base-5.3.18-150200.24.129.1.150200.9.61.1.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-devel-5.3.18-150200.24.129.1.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-devel-5.3.18-150200.24.129.1.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-devel-5.3.18-150200.24.129.1.noarch",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-docs-5.3.18-150200.24.129.1.noarch",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-macros-5.3.18-150200.24.129.1.noarch",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-obs-build-5.3.18-150200.24.129.1.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-obs-build-5.3.18-150200.24.129.1.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-preempt-5.3.18-150200.24.129.1.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-preempt-devel-5.3.18-150200.24.129.1.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-source-5.3.18-150200.24.129.1.noarch",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-syms-5.3.18-150200.24.129.1.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-syms-5.3.18-150200.24.129.1.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP2:reiserfs-kmp-default-5.3.18-150200.24.129.1.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP2:reiserfs-kmp-default-5.3.18-150200.24.129.1.x86_64",
          "SUSE Manager Proxy 4.1:kernel-default-5.3.18-150200.24.129.1.x86_64",
          "SUSE Manager Proxy 4.1:kernel-default-base-5.3.18-150200.24.129.1.150200.9.61.1.x86_64",
          "SUSE Manager Proxy 4.1:kernel-default-devel-5.3.18-150200.24.129.1.x86_64",
          "SUSE Manager Proxy 4.1:kernel-devel-5.3.18-150200.24.129.1.noarch",
          "SUSE Manager Proxy 4.1:kernel-docs-5.3.18-150200.24.129.1.noarch",
          "SUSE Manager Proxy 4.1:kernel-macros-5.3.18-150200.24.129.1.noarch",
          "SUSE Manager Proxy 4.1:kernel-obs-build-5.3.18-150200.24.129.1.x86_64",
          "SUSE Manager Proxy 4.1:kernel-preempt-5.3.18-150200.24.129.1.x86_64",
          "SUSE Manager Proxy 4.1:kernel-preempt-devel-5.3.18-150200.24.129.1.x86_64",
          "SUSE Manager Proxy 4.1:kernel-source-5.3.18-150200.24.129.1.noarch",
          "SUSE Manager Proxy 4.1:kernel-syms-5.3.18-150200.24.129.1.x86_64",
          "SUSE Manager Proxy 4.1:reiserfs-kmp-default-5.3.18-150200.24.129.1.x86_64",
          "SUSE Manager Retail Branch Server 4.1:kernel-default-5.3.18-150200.24.129.1.x86_64",
          "SUSE Manager Retail Branch Server 4.1:kernel-default-base-5.3.18-150200.24.129.1.150200.9.61.1.x86_64",
          "SUSE Manager Retail Branch Server 4.1:kernel-default-devel-5.3.18-150200.24.129.1.x86_64",
          "SUSE Manager Retail Branch Server 4.1:kernel-devel-5.3.18-150200.24.129.1.noarch",
          "SUSE Manager Retail Branch Server 4.1:kernel-docs-5.3.18-150200.24.129.1.noarch",
          "SUSE Manager Retail Branch Server 4.1:kernel-macros-5.3.18-150200.24.129.1.noarch",
          "SUSE Manager Retail Branch Server 4.1:kernel-obs-build-5.3.18-150200.24.129.1.x86_64",
          "SUSE Manager Retail Branch Server 4.1:kernel-preempt-5.3.18-150200.24.129.1.x86_64",
          "SUSE Manager Retail Branch Server 4.1:kernel-preempt-devel-5.3.18-150200.24.129.1.x86_64",
          "SUSE Manager Retail Branch Server 4.1:kernel-source-5.3.18-150200.24.129.1.noarch",
          "SUSE Manager Retail Branch Server 4.1:kernel-syms-5.3.18-150200.24.129.1.x86_64",
          "SUSE Manager Retail Branch Server 4.1:reiserfs-kmp-default-5.3.18-150200.24.129.1.x86_64",
          "SUSE Manager Server 4.1:kernel-default-5.3.18-150200.24.129.1.ppc64le",
          "SUSE Manager Server 4.1:kernel-default-5.3.18-150200.24.129.1.s390x",
          "SUSE Manager Server 4.1:kernel-default-5.3.18-150200.24.129.1.x86_64",
          "SUSE Manager Server 4.1:kernel-default-base-5.3.18-150200.24.129.1.150200.9.61.1.ppc64le",
          "SUSE Manager Server 4.1:kernel-default-base-5.3.18-150200.24.129.1.150200.9.61.1.s390x",
          "SUSE Manager Server 4.1:kernel-default-base-5.3.18-150200.24.129.1.150200.9.61.1.x86_64",
          "SUSE Manager Server 4.1:kernel-default-devel-5.3.18-150200.24.129.1.ppc64le",
          "SUSE Manager Server 4.1:kernel-default-devel-5.3.18-150200.24.129.1.s390x",
          "SUSE Manager Server 4.1:kernel-default-devel-5.3.18-150200.24.129.1.x86_64",
          "SUSE Manager Server 4.1:kernel-devel-5.3.18-150200.24.129.1.noarch",
          "SUSE Manager Server 4.1:kernel-docs-5.3.18-150200.24.129.1.noarch",
          "SUSE Manager Server 4.1:kernel-macros-5.3.18-150200.24.129.1.noarch",
          "SUSE Manager Server 4.1:kernel-obs-build-5.3.18-150200.24.129.1.ppc64le",
          "SUSE Manager Server 4.1:kernel-obs-build-5.3.18-150200.24.129.1.s390x",
          "SUSE Manager Server 4.1:kernel-obs-build-5.3.18-150200.24.129.1.x86_64",
          "SUSE Manager Server 4.1:kernel-preempt-5.3.18-150200.24.129.1.x86_64",
          "SUSE Manager Server 4.1:kernel-preempt-devel-5.3.18-150200.24.129.1.x86_64",
          "SUSE Manager Server 4.1:kernel-source-5.3.18-150200.24.129.1.noarch",
          "SUSE Manager Server 4.1:kernel-syms-5.3.18-150200.24.129.1.ppc64le",
          "SUSE Manager Server 4.1:kernel-syms-5.3.18-150200.24.129.1.s390x",
          "SUSE Manager Server 4.1:kernel-syms-5.3.18-150200.24.129.1.x86_64",
          "SUSE Manager Server 4.1:reiserfs-kmp-default-5.3.18-150200.24.129.1.ppc64le",
          "SUSE Manager Server 4.1:reiserfs-kmp-default-5.3.18-150200.24.129.1.s390x",
          "SUSE Manager Server 4.1:reiserfs-kmp-default-5.3.18-150200.24.129.1.x86_64"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2022-26373",
          "url": "https://www.suse.com/security/cve/CVE-2022-26373"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1201726 for CVE-2022-26373",
          "url": "https://bugzilla.suse.com/1201726"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1209619 for CVE-2022-26373",
          "url": "https://bugzilla.suse.com/1209619"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "SUSE Enterprise Storage 7:kernel-default-5.3.18-150200.24.129.1.aarch64",
            "SUSE Enterprise Storage 7:kernel-default-5.3.18-150200.24.129.1.x86_64",
            "SUSE Enterprise Storage 7:kernel-default-base-5.3.18-150200.24.129.1.150200.9.61.1.aarch64",
            "SUSE Enterprise Storage 7:kernel-default-base-5.3.18-150200.24.129.1.150200.9.61.1.x86_64",
            "SUSE Enterprise Storage 7:kernel-default-devel-5.3.18-150200.24.129.1.aarch64",
            "SUSE Enterprise Storage 7:kernel-default-devel-5.3.18-150200.24.129.1.x86_64",
            "SUSE Enterprise Storage 7:kernel-devel-5.3.18-150200.24.129.1.noarch",
            "SUSE Enterprise Storage 7:kernel-docs-5.3.18-150200.24.129.1.noarch",
            "SUSE Enterprise Storage 7:kernel-macros-5.3.18-150200.24.129.1.noarch",
            "SUSE Enterprise Storage 7:kernel-obs-build-5.3.18-150200.24.129.1.aarch64",
            "SUSE Enterprise Storage 7:kernel-obs-build-5.3.18-150200.24.129.1.x86_64",
            "SUSE Enterprise Storage 7:kernel-preempt-5.3.18-150200.24.129.1.aarch64",
            "SUSE Enterprise Storage 7:kernel-preempt-5.3.18-150200.24.129.1.x86_64",
            "SUSE Enterprise Storage 7:kernel-preempt-devel-5.3.18-150200.24.129.1.aarch64",
            "SUSE Enterprise Storage 7:kernel-preempt-devel-5.3.18-150200.24.129.1.x86_64",
            "SUSE Enterprise Storage 7:kernel-source-5.3.18-150200.24.129.1.noarch",
            "SUSE Enterprise Storage 7:kernel-syms-5.3.18-150200.24.129.1.aarch64",
            "SUSE Enterprise Storage 7:kernel-syms-5.3.18-150200.24.129.1.x86_64",
            "SUSE Enterprise Storage 7:reiserfs-kmp-default-5.3.18-150200.24.129.1.aarch64",
            "SUSE Enterprise Storage 7:reiserfs-kmp-default-5.3.18-150200.24.129.1.x86_64",
            "SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-150200.24.129.1.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-150200.24.129.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-150200.24.129.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-150200.24.129.1.x86_64",
            "SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-150200.24.129.1.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-150200.24.129.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-150200.24.129.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-150200.24.129.1.x86_64",
            "SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-150200.24.129.1.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-150200.24.129.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-150200.24.129.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-150200.24.129.1.x86_64",
            "SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-150200.24.129.1.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-150200.24.129.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-150200.24.129.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-150200.24.129.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-default-5.3.18-150200.24.129.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-default-5.3.18-150200.24.129.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-default-base-5.3.18-150200.24.129.1.150200.9.61.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-default-base-5.3.18-150200.24.129.1.150200.9.61.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-default-devel-5.3.18-150200.24.129.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-default-devel-5.3.18-150200.24.129.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-devel-5.3.18-150200.24.129.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-docs-5.3.18-150200.24.129.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-macros-5.3.18-150200.24.129.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-obs-build-5.3.18-150200.24.129.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-obs-build-5.3.18-150200.24.129.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-preempt-5.3.18-150200.24.129.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-preempt-5.3.18-150200.24.129.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-preempt-devel-5.3.18-150200.24.129.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-preempt-devel-5.3.18-150200.24.129.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-source-5.3.18-150200.24.129.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-syms-5.3.18-150200.24.129.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-syms-5.3.18-150200.24.129.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-5.3.18-150200.24.129.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-5.3.18-150200.24.129.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.129.1.150200.9.61.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.129.1.150200.9.61.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.129.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.129.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-devel-5.3.18-150200.24.129.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-docs-5.3.18-150200.24.129.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-macros-5.3.18-150200.24.129.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.129.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.129.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-preempt-5.3.18-150200.24.129.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-preempt-5.3.18-150200.24.129.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-preempt-devel-5.3.18-150200.24.129.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-preempt-devel-5.3.18-150200.24.129.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-source-5.3.18-150200.24.129.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.129.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.129.1.x86_64",
            "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-5.3.18-150200.24.129.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-5.3.18-150200.24.129.1.s390x",
            "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-5.3.18-150200.24.129.1.x86_64",
            "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-devel-5.3.18-150200.24.129.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-devel-5.3.18-150200.24.129.1.s390x",
            "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-devel-5.3.18-150200.24.129.1.x86_64",
            "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-150200_24_129-default-1-150200.5.3.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-150200_24_129-default-1-150200.5.3.1.s390x",
            "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-150200_24_129-default-1-150200.5.3.1.x86_64",
            "SUSE Linux Enterprise Server 15 SP2-BCL:kernel-default-5.3.18-150200.24.129.1.x86_64",
            "SUSE Linux Enterprise Server 15 SP2-BCL:kernel-default-base-5.3.18-150200.24.129.1.150200.9.61.1.x86_64",
            "SUSE Linux Enterprise Server 15 SP2-BCL:kernel-default-devel-5.3.18-150200.24.129.1.x86_64",
            "SUSE Linux Enterprise Server 15 SP2-BCL:kernel-devel-5.3.18-150200.24.129.1.noarch",
            "SUSE Linux Enterprise Server 15 SP2-BCL:kernel-docs-5.3.18-150200.24.129.1.noarch",
            "SUSE Linux Enterprise Server 15 SP2-BCL:kernel-macros-5.3.18-150200.24.129.1.noarch",
            "SUSE Linux Enterprise Server 15 SP2-BCL:kernel-obs-build-5.3.18-150200.24.129.1.x86_64",
            "SUSE Linux Enterprise Server 15 SP2-BCL:kernel-preempt-5.3.18-150200.24.129.1.x86_64",
            "SUSE Linux Enterprise Server 15 SP2-BCL:kernel-preempt-devel-5.3.18-150200.24.129.1.x86_64",
            "SUSE Linux Enterprise Server 15 SP2-BCL:kernel-source-5.3.18-150200.24.129.1.noarch",
            "SUSE Linux Enterprise Server 15 SP2-BCL:kernel-syms-5.3.18-150200.24.129.1.x86_64",
            "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-5.3.18-150200.24.129.1.aarch64",
            "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-5.3.18-150200.24.129.1.ppc64le",
            "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-5.3.18-150200.24.129.1.s390x",
            "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-5.3.18-150200.24.129.1.x86_64",
            "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.129.1.150200.9.61.1.aarch64",
            "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.129.1.150200.9.61.1.ppc64le",
            "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.129.1.150200.9.61.1.s390x",
            "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.129.1.150200.9.61.1.x86_64",
            "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.129.1.aarch64",
            "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.129.1.ppc64le",
            "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.129.1.s390x",
            "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.129.1.x86_64",
            "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-devel-5.3.18-150200.24.129.1.noarch",
            "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-docs-5.3.18-150200.24.129.1.noarch",
            "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-macros-5.3.18-150200.24.129.1.noarch",
            "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.129.1.aarch64",
            "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.129.1.ppc64le",
            "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.129.1.s390x",
            "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.129.1.x86_64",
            "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-preempt-5.3.18-150200.24.129.1.aarch64",
            "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-preempt-5.3.18-150200.24.129.1.x86_64",
            "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-preempt-devel-5.3.18-150200.24.129.1.aarch64",
            "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-preempt-devel-5.3.18-150200.24.129.1.x86_64",
            "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-source-5.3.18-150200.24.129.1.noarch",
            "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.129.1.aarch64",
            "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.129.1.ppc64le",
            "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.129.1.s390x",
            "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.129.1.x86_64",
            "SUSE Linux Enterprise Server 15 SP2-LTSS:reiserfs-kmp-default-5.3.18-150200.24.129.1.aarch64",
            "SUSE Linux Enterprise Server 15 SP2-LTSS:reiserfs-kmp-default-5.3.18-150200.24.129.1.ppc64le",
            "SUSE Linux Enterprise Server 15 SP2-LTSS:reiserfs-kmp-default-5.3.18-150200.24.129.1.s390x",
            "SUSE Linux Enterprise Server 15 SP2-LTSS:reiserfs-kmp-default-5.3.18-150200.24.129.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-5.3.18-150200.24.129.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-5.3.18-150200.24.129.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-base-5.3.18-150200.24.129.1.150200.9.61.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-base-5.3.18-150200.24.129.1.150200.9.61.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-devel-5.3.18-150200.24.129.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-devel-5.3.18-150200.24.129.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-devel-5.3.18-150200.24.129.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-docs-5.3.18-150200.24.129.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-macros-5.3.18-150200.24.129.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-obs-build-5.3.18-150200.24.129.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-obs-build-5.3.18-150200.24.129.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-preempt-5.3.18-150200.24.129.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-preempt-devel-5.3.18-150200.24.129.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-source-5.3.18-150200.24.129.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-syms-5.3.18-150200.24.129.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-syms-5.3.18-150200.24.129.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP2:reiserfs-kmp-default-5.3.18-150200.24.129.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP2:reiserfs-kmp-default-5.3.18-150200.24.129.1.x86_64",
            "SUSE Manager Proxy 4.1:kernel-default-5.3.18-150200.24.129.1.x86_64",
            "SUSE Manager Proxy 4.1:kernel-default-base-5.3.18-150200.24.129.1.150200.9.61.1.x86_64",
            "SUSE Manager Proxy 4.1:kernel-default-devel-5.3.18-150200.24.129.1.x86_64",
            "SUSE Manager Proxy 4.1:kernel-devel-5.3.18-150200.24.129.1.noarch",
            "SUSE Manager Proxy 4.1:kernel-docs-5.3.18-150200.24.129.1.noarch",
            "SUSE Manager Proxy 4.1:kernel-macros-5.3.18-150200.24.129.1.noarch",
            "SUSE Manager Proxy 4.1:kernel-obs-build-5.3.18-150200.24.129.1.x86_64",
            "SUSE Manager Proxy 4.1:kernel-preempt-5.3.18-150200.24.129.1.x86_64",
            "SUSE Manager Proxy 4.1:kernel-preempt-devel-5.3.18-150200.24.129.1.x86_64",
            "SUSE Manager Proxy 4.1:kernel-source-5.3.18-150200.24.129.1.noarch",
            "SUSE Manager Proxy 4.1:kernel-syms-5.3.18-150200.24.129.1.x86_64",
            "SUSE Manager Proxy 4.1:reiserfs-kmp-default-5.3.18-150200.24.129.1.x86_64",
            "SUSE Manager Retail Branch Server 4.1:kernel-default-5.3.18-150200.24.129.1.x86_64",
            "SUSE Manager Retail Branch Server 4.1:kernel-default-base-5.3.18-150200.24.129.1.150200.9.61.1.x86_64",
            "SUSE Manager Retail Branch Server 4.1:kernel-default-devel-5.3.18-150200.24.129.1.x86_64",
            "SUSE Manager Retail Branch Server 4.1:kernel-devel-5.3.18-150200.24.129.1.noarch",
            "SUSE Manager Retail Branch Server 4.1:kernel-docs-5.3.18-150200.24.129.1.noarch",
            "SUSE Manager Retail Branch Server 4.1:kernel-macros-5.3.18-150200.24.129.1.noarch",
            "SUSE Manager Retail Branch Server 4.1:kernel-obs-build-5.3.18-150200.24.129.1.x86_64",
            "SUSE Manager Retail Branch Server 4.1:kernel-preempt-5.3.18-150200.24.129.1.x86_64",
            "SUSE Manager Retail Branch Server 4.1:kernel-preempt-devel-5.3.18-150200.24.129.1.x86_64",
            "SUSE Manager Retail Branch Server 4.1:kernel-source-5.3.18-150200.24.129.1.noarch",
            "SUSE Manager Retail Branch Server 4.1:kernel-syms-5.3.18-150200.24.129.1.x86_64",
            "SUSE Manager Retail Branch Server 4.1:reiserfs-kmp-default-5.3.18-150200.24.129.1.x86_64",
            "SUSE Manager Server 4.1:kernel-default-5.3.18-150200.24.129.1.ppc64le",
            "SUSE Manager Server 4.1:kernel-default-5.3.18-150200.24.129.1.s390x",
            "SUSE Manager Server 4.1:kernel-default-5.3.18-150200.24.129.1.x86_64",
            "SUSE Manager Server 4.1:kernel-default-base-5.3.18-150200.24.129.1.150200.9.61.1.ppc64le",
            "SUSE Manager Server 4.1:kernel-default-base-5.3.18-150200.24.129.1.150200.9.61.1.s390x",
            "SUSE Manager Server 4.1:kernel-default-base-5.3.18-150200.24.129.1.150200.9.61.1.x86_64",
            "SUSE Manager Server 4.1:kernel-default-devel-5.3.18-150200.24.129.1.ppc64le",
            "SUSE Manager Server 4.1:kernel-default-devel-5.3.18-150200.24.129.1.s390x",
            "SUSE Manager Server 4.1:kernel-default-devel-5.3.18-150200.24.129.1.x86_64",
            "SUSE Manager Server 4.1:kernel-devel-5.3.18-150200.24.129.1.noarch",
            "SUSE Manager Server 4.1:kernel-docs-5.3.18-150200.24.129.1.noarch",
            "SUSE Manager Server 4.1:kernel-macros-5.3.18-150200.24.129.1.noarch",
            "SUSE Manager Server 4.1:kernel-obs-build-5.3.18-150200.24.129.1.ppc64le",
            "SUSE Manager Server 4.1:kernel-obs-build-5.3.18-150200.24.129.1.s390x",
            "SUSE Manager Server 4.1:kernel-obs-build-5.3.18-150200.24.129.1.x86_64",
            "SUSE Manager Server 4.1:kernel-preempt-5.3.18-150200.24.129.1.x86_64",
            "SUSE Manager Server 4.1:kernel-preempt-devel-5.3.18-150200.24.129.1.x86_64",
            "SUSE Manager Server 4.1:kernel-source-5.3.18-150200.24.129.1.noarch",
            "SUSE Manager Server 4.1:kernel-syms-5.3.18-150200.24.129.1.ppc64le",
            "SUSE Manager Server 4.1:kernel-syms-5.3.18-150200.24.129.1.s390x",
            "SUSE Manager Server 4.1:kernel-syms-5.3.18-150200.24.129.1.x86_64",
            "SUSE Manager Server 4.1:reiserfs-kmp-default-5.3.18-150200.24.129.1.ppc64le",
            "SUSE Manager Server 4.1:reiserfs-kmp-default-5.3.18-150200.24.129.1.s390x",
            "SUSE Manager Server 4.1:reiserfs-kmp-default-5.3.18-150200.24.129.1.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 5.5,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N",
            "version": "3.1"
          },
          "products": [
            "SUSE Enterprise Storage 7:kernel-default-5.3.18-150200.24.129.1.aarch64",
            "SUSE Enterprise Storage 7:kernel-default-5.3.18-150200.24.129.1.x86_64",
            "SUSE Enterprise Storage 7:kernel-default-base-5.3.18-150200.24.129.1.150200.9.61.1.aarch64",
            "SUSE Enterprise Storage 7:kernel-default-base-5.3.18-150200.24.129.1.150200.9.61.1.x86_64",
            "SUSE Enterprise Storage 7:kernel-default-devel-5.3.18-150200.24.129.1.aarch64",
            "SUSE Enterprise Storage 7:kernel-default-devel-5.3.18-150200.24.129.1.x86_64",
            "SUSE Enterprise Storage 7:kernel-devel-5.3.18-150200.24.129.1.noarch",
            "SUSE Enterprise Storage 7:kernel-docs-5.3.18-150200.24.129.1.noarch",
            "SUSE Enterprise Storage 7:kernel-macros-5.3.18-150200.24.129.1.noarch",
            "SUSE Enterprise Storage 7:kernel-obs-build-5.3.18-150200.24.129.1.aarch64",
            "SUSE Enterprise Storage 7:kernel-obs-build-5.3.18-150200.24.129.1.x86_64",
            "SUSE Enterprise Storage 7:kernel-preempt-5.3.18-150200.24.129.1.aarch64",
            "SUSE Enterprise Storage 7:kernel-preempt-5.3.18-150200.24.129.1.x86_64",
            "SUSE Enterprise Storage 7:kernel-preempt-devel-5.3.18-150200.24.129.1.aarch64",
            "SUSE Enterprise Storage 7:kernel-preempt-devel-5.3.18-150200.24.129.1.x86_64",
            "SUSE Enterprise Storage 7:kernel-source-5.3.18-150200.24.129.1.noarch",
            "SUSE Enterprise Storage 7:kernel-syms-5.3.18-150200.24.129.1.aarch64",
            "SUSE Enterprise Storage 7:kernel-syms-5.3.18-150200.24.129.1.x86_64",
            "SUSE Enterprise Storage 7:reiserfs-kmp-default-5.3.18-150200.24.129.1.aarch64",
            "SUSE Enterprise Storage 7:reiserfs-kmp-default-5.3.18-150200.24.129.1.x86_64",
            "SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-150200.24.129.1.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-150200.24.129.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-150200.24.129.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-150200.24.129.1.x86_64",
            "SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-150200.24.129.1.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-150200.24.129.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-150200.24.129.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-150200.24.129.1.x86_64",
            "SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-150200.24.129.1.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-150200.24.129.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-150200.24.129.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-150200.24.129.1.x86_64",
            "SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-150200.24.129.1.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-150200.24.129.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-150200.24.129.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-150200.24.129.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-default-5.3.18-150200.24.129.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-default-5.3.18-150200.24.129.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-default-base-5.3.18-150200.24.129.1.150200.9.61.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-default-base-5.3.18-150200.24.129.1.150200.9.61.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-default-devel-5.3.18-150200.24.129.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-default-devel-5.3.18-150200.24.129.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-devel-5.3.18-150200.24.129.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-docs-5.3.18-150200.24.129.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-macros-5.3.18-150200.24.129.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-obs-build-5.3.18-150200.24.129.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-obs-build-5.3.18-150200.24.129.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-preempt-5.3.18-150200.24.129.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-preempt-5.3.18-150200.24.129.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-preempt-devel-5.3.18-150200.24.129.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-preempt-devel-5.3.18-150200.24.129.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-source-5.3.18-150200.24.129.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-syms-5.3.18-150200.24.129.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-syms-5.3.18-150200.24.129.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-5.3.18-150200.24.129.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-5.3.18-150200.24.129.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.129.1.150200.9.61.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.129.1.150200.9.61.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.129.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.129.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-devel-5.3.18-150200.24.129.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-docs-5.3.18-150200.24.129.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-macros-5.3.18-150200.24.129.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.129.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.129.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-preempt-5.3.18-150200.24.129.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-preempt-5.3.18-150200.24.129.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-preempt-devel-5.3.18-150200.24.129.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-preempt-devel-5.3.18-150200.24.129.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-source-5.3.18-150200.24.129.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.129.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.129.1.x86_64",
            "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-5.3.18-150200.24.129.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-5.3.18-150200.24.129.1.s390x",
            "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-5.3.18-150200.24.129.1.x86_64",
            "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-devel-5.3.18-150200.24.129.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-devel-5.3.18-150200.24.129.1.s390x",
            "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-devel-5.3.18-150200.24.129.1.x86_64",
            "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-150200_24_129-default-1-150200.5.3.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-150200_24_129-default-1-150200.5.3.1.s390x",
            "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-150200_24_129-default-1-150200.5.3.1.x86_64",
            "SUSE Linux Enterprise Server 15 SP2-BCL:kernel-default-5.3.18-150200.24.129.1.x86_64",
            "SUSE Linux Enterprise Server 15 SP2-BCL:kernel-default-base-5.3.18-150200.24.129.1.150200.9.61.1.x86_64",
            "SUSE Linux Enterprise Server 15 SP2-BCL:kernel-default-devel-5.3.18-150200.24.129.1.x86_64",
            "SUSE Linux Enterprise Server 15 SP2-BCL:kernel-devel-5.3.18-150200.24.129.1.noarch",
            "SUSE Linux Enterprise Server 15 SP2-BCL:kernel-docs-5.3.18-150200.24.129.1.noarch",
            "SUSE Linux Enterprise Server 15 SP2-BCL:kernel-macros-5.3.18-150200.24.129.1.noarch",
            "SUSE Linux Enterprise Server 15 SP2-BCL:kernel-obs-build-5.3.18-150200.24.129.1.x86_64",
            "SUSE Linux Enterprise Server 15 SP2-BCL:kernel-preempt-5.3.18-150200.24.129.1.x86_64",
            "SUSE Linux Enterprise Server 15 SP2-BCL:kernel-preempt-devel-5.3.18-150200.24.129.1.x86_64",
            "SUSE Linux Enterprise Server 15 SP2-BCL:kernel-source-5.3.18-150200.24.129.1.noarch",
            "SUSE Linux Enterprise Server 15 SP2-BCL:kernel-syms-5.3.18-150200.24.129.1.x86_64",
            "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-5.3.18-150200.24.129.1.aarch64",
            "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-5.3.18-150200.24.129.1.ppc64le",
            "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-5.3.18-150200.24.129.1.s390x",
            "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-5.3.18-150200.24.129.1.x86_64",
            "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.129.1.150200.9.61.1.aarch64",
            "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.129.1.150200.9.61.1.ppc64le",
            "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.129.1.150200.9.61.1.s390x",
            "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.129.1.150200.9.61.1.x86_64",
            "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.129.1.aarch64",
            "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.129.1.ppc64le",
            "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.129.1.s390x",
            "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.129.1.x86_64",
            "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-devel-5.3.18-150200.24.129.1.noarch",
            "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-docs-5.3.18-150200.24.129.1.noarch",
            "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-macros-5.3.18-150200.24.129.1.noarch",
            "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.129.1.aarch64",
            "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.129.1.ppc64le",
            "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.129.1.s390x",
            "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.129.1.x86_64",
            "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-preempt-5.3.18-150200.24.129.1.aarch64",
            "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-preempt-5.3.18-150200.24.129.1.x86_64",
            "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-preempt-devel-5.3.18-150200.24.129.1.aarch64",
            "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-preempt-devel-5.3.18-150200.24.129.1.x86_64",
            "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-source-5.3.18-150200.24.129.1.noarch",
            "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.129.1.aarch64",
            "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.129.1.ppc64le",
            "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.129.1.s390x",
            "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.129.1.x86_64",
            "SUSE Linux Enterprise Server 15 SP2-LTSS:reiserfs-kmp-default-5.3.18-150200.24.129.1.aarch64",
            "SUSE Linux Enterprise Server 15 SP2-LTSS:reiserfs-kmp-default-5.3.18-150200.24.129.1.ppc64le",
            "SUSE Linux Enterprise Server 15 SP2-LTSS:reiserfs-kmp-default-5.3.18-150200.24.129.1.s390x",
            "SUSE Linux Enterprise Server 15 SP2-LTSS:reiserfs-kmp-default-5.3.18-150200.24.129.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-5.3.18-150200.24.129.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-5.3.18-150200.24.129.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-base-5.3.18-150200.24.129.1.150200.9.61.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-base-5.3.18-150200.24.129.1.150200.9.61.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-devel-5.3.18-150200.24.129.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-devel-5.3.18-150200.24.129.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-devel-5.3.18-150200.24.129.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-docs-5.3.18-150200.24.129.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-macros-5.3.18-150200.24.129.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-obs-build-5.3.18-150200.24.129.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-obs-build-5.3.18-150200.24.129.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-preempt-5.3.18-150200.24.129.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-preempt-devel-5.3.18-150200.24.129.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-source-5.3.18-150200.24.129.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-syms-5.3.18-150200.24.129.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-syms-5.3.18-150200.24.129.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP2:reiserfs-kmp-default-5.3.18-150200.24.129.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP2:reiserfs-kmp-default-5.3.18-150200.24.129.1.x86_64",
            "SUSE Manager Proxy 4.1:kernel-default-5.3.18-150200.24.129.1.x86_64",
            "SUSE Manager Proxy 4.1:kernel-default-base-5.3.18-150200.24.129.1.150200.9.61.1.x86_64",
            "SUSE Manager Proxy 4.1:kernel-default-devel-5.3.18-150200.24.129.1.x86_64",
            "SUSE Manager Proxy 4.1:kernel-devel-5.3.18-150200.24.129.1.noarch",
            "SUSE Manager Proxy 4.1:kernel-docs-5.3.18-150200.24.129.1.noarch",
            "SUSE Manager Proxy 4.1:kernel-macros-5.3.18-150200.24.129.1.noarch",
            "SUSE Manager Proxy 4.1:kernel-obs-build-5.3.18-150200.24.129.1.x86_64",
            "SUSE Manager Proxy 4.1:kernel-preempt-5.3.18-150200.24.129.1.x86_64",
            "SUSE Manager Proxy 4.1:kernel-preempt-devel-5.3.18-150200.24.129.1.x86_64",
            "SUSE Manager Proxy 4.1:kernel-source-5.3.18-150200.24.129.1.noarch",
            "SUSE Manager Proxy 4.1:kernel-syms-5.3.18-150200.24.129.1.x86_64",
            "SUSE Manager Proxy 4.1:reiserfs-kmp-default-5.3.18-150200.24.129.1.x86_64",
            "SUSE Manager Retail Branch Server 4.1:kernel-default-5.3.18-150200.24.129.1.x86_64",
            "SUSE Manager Retail Branch Server 4.1:kernel-default-base-5.3.18-150200.24.129.1.150200.9.61.1.x86_64",
            "SUSE Manager Retail Branch Server 4.1:kernel-default-devel-5.3.18-150200.24.129.1.x86_64",
            "SUSE Manager Retail Branch Server 4.1:kernel-devel-5.3.18-150200.24.129.1.noarch",
            "SUSE Manager Retail Branch Server 4.1:kernel-docs-5.3.18-150200.24.129.1.noarch",
            "SUSE Manager Retail Branch Server 4.1:kernel-macros-5.3.18-150200.24.129.1.noarch",
            "SUSE Manager Retail Branch Server 4.1:kernel-obs-build-5.3.18-150200.24.129.1.x86_64",
            "SUSE Manager Retail Branch Server 4.1:kernel-preempt-5.3.18-150200.24.129.1.x86_64",
            "SUSE Manager Retail Branch Server 4.1:kernel-preempt-devel-5.3.18-150200.24.129.1.x86_64",
            "SUSE Manager Retail Branch Server 4.1:kernel-source-5.3.18-150200.24.129.1.noarch",
            "SUSE Manager Retail Branch Server 4.1:kernel-syms-5.3.18-150200.24.129.1.x86_64",
            "SUSE Manager Retail Branch Server 4.1:reiserfs-kmp-default-5.3.18-150200.24.129.1.x86_64",
            "SUSE Manager Server 4.1:kernel-default-5.3.18-150200.24.129.1.ppc64le",
            "SUSE Manager Server 4.1:kernel-default-5.3.18-150200.24.129.1.s390x",
            "SUSE Manager Server 4.1:kernel-default-5.3.18-150200.24.129.1.x86_64",
            "SUSE Manager Server 4.1:kernel-default-base-5.3.18-150200.24.129.1.150200.9.61.1.ppc64le",
            "SUSE Manager Server 4.1:kernel-default-base-5.3.18-150200.24.129.1.150200.9.61.1.s390x",
            "SUSE Manager Server 4.1:kernel-default-base-5.3.18-150200.24.129.1.150200.9.61.1.x86_64",
            "SUSE Manager Server 4.1:kernel-default-devel-5.3.18-150200.24.129.1.ppc64le",
            "SUSE Manager Server 4.1:kernel-default-devel-5.3.18-150200.24.129.1.s390x",
            "SUSE Manager Server 4.1:kernel-default-devel-5.3.18-150200.24.129.1.x86_64",
            "SUSE Manager Server 4.1:kernel-devel-5.3.18-150200.24.129.1.noarch",
            "SUSE Manager Server 4.1:kernel-docs-5.3.18-150200.24.129.1.noarch",
            "SUSE Manager Server 4.1:kernel-macros-5.3.18-150200.24.129.1.noarch",
            "SUSE Manager Server 4.1:kernel-obs-build-5.3.18-150200.24.129.1.ppc64le",
            "SUSE Manager Server 4.1:kernel-obs-build-5.3.18-150200.24.129.1.s390x",
            "SUSE Manager Server 4.1:kernel-obs-build-5.3.18-150200.24.129.1.x86_64",
            "SUSE Manager Server 4.1:kernel-preempt-5.3.18-150200.24.129.1.x86_64",
            "SUSE Manager Server 4.1:kernel-preempt-devel-5.3.18-150200.24.129.1.x86_64",
            "SUSE Manager Server 4.1:kernel-source-5.3.18-150200.24.129.1.noarch",
            "SUSE Manager Server 4.1:kernel-syms-5.3.18-150200.24.129.1.ppc64le",
            "SUSE Manager Server 4.1:kernel-syms-5.3.18-150200.24.129.1.s390x",
            "SUSE Manager Server 4.1:kernel-syms-5.3.18-150200.24.129.1.x86_64",
            "SUSE Manager Server 4.1:reiserfs-kmp-default-5.3.18-150200.24.129.1.ppc64le",
            "SUSE Manager Server 4.1:reiserfs-kmp-default-5.3.18-150200.24.129.1.s390x",
            "SUSE Manager Server 4.1:reiserfs-kmp-default-5.3.18-150200.24.129.1.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2022-09-28T06:48:59Z",
          "details": "moderate"
        }
      ],
      "title": "CVE-2022-26373"
    },
    {
      "cve": "CVE-2022-2639",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2022-2639"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "An integer coercion error was found in the openvswitch kernel module. Given a sufficiently large number of actions, while copying and reserving memory for a new action of a new flow, the reserve_sfa_size() function does not return -EMSGSIZE as expected, potentially leading to an out-of-bounds write access. This flaw allows a local user to crash or potentially escalate their privileges on the system.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "SUSE Enterprise Storage 7:kernel-default-5.3.18-150200.24.129.1.aarch64",
          "SUSE Enterprise Storage 7:kernel-default-5.3.18-150200.24.129.1.x86_64",
          "SUSE Enterprise Storage 7:kernel-default-base-5.3.18-150200.24.129.1.150200.9.61.1.aarch64",
          "SUSE Enterprise Storage 7:kernel-default-base-5.3.18-150200.24.129.1.150200.9.61.1.x86_64",
          "SUSE Enterprise Storage 7:kernel-default-devel-5.3.18-150200.24.129.1.aarch64",
          "SUSE Enterprise Storage 7:kernel-default-devel-5.3.18-150200.24.129.1.x86_64",
          "SUSE Enterprise Storage 7:kernel-devel-5.3.18-150200.24.129.1.noarch",
          "SUSE Enterprise Storage 7:kernel-docs-5.3.18-150200.24.129.1.noarch",
          "SUSE Enterprise Storage 7:kernel-macros-5.3.18-150200.24.129.1.noarch",
          "SUSE Enterprise Storage 7:kernel-obs-build-5.3.18-150200.24.129.1.aarch64",
          "SUSE Enterprise Storage 7:kernel-obs-build-5.3.18-150200.24.129.1.x86_64",
          "SUSE Enterprise Storage 7:kernel-preempt-5.3.18-150200.24.129.1.aarch64",
          "SUSE Enterprise Storage 7:kernel-preempt-5.3.18-150200.24.129.1.x86_64",
          "SUSE Enterprise Storage 7:kernel-preempt-devel-5.3.18-150200.24.129.1.aarch64",
          "SUSE Enterprise Storage 7:kernel-preempt-devel-5.3.18-150200.24.129.1.x86_64",
          "SUSE Enterprise Storage 7:kernel-source-5.3.18-150200.24.129.1.noarch",
          "SUSE Enterprise Storage 7:kernel-syms-5.3.18-150200.24.129.1.aarch64",
          "SUSE Enterprise Storage 7:kernel-syms-5.3.18-150200.24.129.1.x86_64",
          "SUSE Enterprise Storage 7:reiserfs-kmp-default-5.3.18-150200.24.129.1.aarch64",
          "SUSE Enterprise Storage 7:reiserfs-kmp-default-5.3.18-150200.24.129.1.x86_64",
          "SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-150200.24.129.1.aarch64",
          "SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-150200.24.129.1.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-150200.24.129.1.s390x",
          "SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-150200.24.129.1.x86_64",
          "SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-150200.24.129.1.aarch64",
          "SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-150200.24.129.1.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-150200.24.129.1.s390x",
          "SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-150200.24.129.1.x86_64",
          "SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-150200.24.129.1.aarch64",
          "SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-150200.24.129.1.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-150200.24.129.1.s390x",
          "SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-150200.24.129.1.x86_64",
          "SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-150200.24.129.1.aarch64",
          "SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-150200.24.129.1.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-150200.24.129.1.s390x",
          "SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-150200.24.129.1.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-default-5.3.18-150200.24.129.1.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-default-5.3.18-150200.24.129.1.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-default-base-5.3.18-150200.24.129.1.150200.9.61.1.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-default-base-5.3.18-150200.24.129.1.150200.9.61.1.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-default-devel-5.3.18-150200.24.129.1.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-default-devel-5.3.18-150200.24.129.1.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-devel-5.3.18-150200.24.129.1.noarch",
          "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-docs-5.3.18-150200.24.129.1.noarch",
          "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-macros-5.3.18-150200.24.129.1.noarch",
          "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-obs-build-5.3.18-150200.24.129.1.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-obs-build-5.3.18-150200.24.129.1.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-preempt-5.3.18-150200.24.129.1.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-preempt-5.3.18-150200.24.129.1.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-preempt-devel-5.3.18-150200.24.129.1.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-preempt-devel-5.3.18-150200.24.129.1.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-source-5.3.18-150200.24.129.1.noarch",
          "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-syms-5.3.18-150200.24.129.1.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-syms-5.3.18-150200.24.129.1.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-5.3.18-150200.24.129.1.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-5.3.18-150200.24.129.1.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.129.1.150200.9.61.1.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.129.1.150200.9.61.1.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.129.1.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.129.1.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-devel-5.3.18-150200.24.129.1.noarch",
          "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-docs-5.3.18-150200.24.129.1.noarch",
          "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-macros-5.3.18-150200.24.129.1.noarch",
          "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.129.1.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.129.1.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-preempt-5.3.18-150200.24.129.1.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-preempt-5.3.18-150200.24.129.1.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-preempt-devel-5.3.18-150200.24.129.1.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-preempt-devel-5.3.18-150200.24.129.1.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-source-5.3.18-150200.24.129.1.noarch",
          "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.129.1.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.129.1.x86_64",
          "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-5.3.18-150200.24.129.1.ppc64le",
          "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-5.3.18-150200.24.129.1.s390x",
          "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-5.3.18-150200.24.129.1.x86_64",
          "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-devel-5.3.18-150200.24.129.1.ppc64le",
          "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-devel-5.3.18-150200.24.129.1.s390x",
          "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-devel-5.3.18-150200.24.129.1.x86_64",
          "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-150200_24_129-default-1-150200.5.3.1.ppc64le",
          "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-150200_24_129-default-1-150200.5.3.1.s390x",
          "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-150200_24_129-default-1-150200.5.3.1.x86_64",
          "SUSE Linux Enterprise Server 15 SP2-BCL:kernel-default-5.3.18-150200.24.129.1.x86_64",
          "SUSE Linux Enterprise Server 15 SP2-BCL:kernel-default-base-5.3.18-150200.24.129.1.150200.9.61.1.x86_64",
          "SUSE Linux Enterprise Server 15 SP2-BCL:kernel-default-devel-5.3.18-150200.24.129.1.x86_64",
          "SUSE Linux Enterprise Server 15 SP2-BCL:kernel-devel-5.3.18-150200.24.129.1.noarch",
          "SUSE Linux Enterprise Server 15 SP2-BCL:kernel-docs-5.3.18-150200.24.129.1.noarch",
          "SUSE Linux Enterprise Server 15 SP2-BCL:kernel-macros-5.3.18-150200.24.129.1.noarch",
          "SUSE Linux Enterprise Server 15 SP2-BCL:kernel-obs-build-5.3.18-150200.24.129.1.x86_64",
          "SUSE Linux Enterprise Server 15 SP2-BCL:kernel-preempt-5.3.18-150200.24.129.1.x86_64",
          "SUSE Linux Enterprise Server 15 SP2-BCL:kernel-preempt-devel-5.3.18-150200.24.129.1.x86_64",
          "SUSE Linux Enterprise Server 15 SP2-BCL:kernel-source-5.3.18-150200.24.129.1.noarch",
          "SUSE Linux Enterprise Server 15 SP2-BCL:kernel-syms-5.3.18-150200.24.129.1.x86_64",
          "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-5.3.18-150200.24.129.1.aarch64",
          "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-5.3.18-150200.24.129.1.ppc64le",
          "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-5.3.18-150200.24.129.1.s390x",
          "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-5.3.18-150200.24.129.1.x86_64",
          "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.129.1.150200.9.61.1.aarch64",
          "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.129.1.150200.9.61.1.ppc64le",
          "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.129.1.150200.9.61.1.s390x",
          "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.129.1.150200.9.61.1.x86_64",
          "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.129.1.aarch64",
          "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.129.1.ppc64le",
          "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.129.1.s390x",
          "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.129.1.x86_64",
          "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-devel-5.3.18-150200.24.129.1.noarch",
          "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-docs-5.3.18-150200.24.129.1.noarch",
          "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-macros-5.3.18-150200.24.129.1.noarch",
          "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.129.1.aarch64",
          "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.129.1.ppc64le",
          "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.129.1.s390x",
          "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.129.1.x86_64",
          "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-preempt-5.3.18-150200.24.129.1.aarch64",
          "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-preempt-5.3.18-150200.24.129.1.x86_64",
          "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-preempt-devel-5.3.18-150200.24.129.1.aarch64",
          "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-preempt-devel-5.3.18-150200.24.129.1.x86_64",
          "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-source-5.3.18-150200.24.129.1.noarch",
          "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.129.1.aarch64",
          "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.129.1.ppc64le",
          "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.129.1.s390x",
          "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.129.1.x86_64",
          "SUSE Linux Enterprise Server 15 SP2-LTSS:reiserfs-kmp-default-5.3.18-150200.24.129.1.aarch64",
          "SUSE Linux Enterprise Server 15 SP2-LTSS:reiserfs-kmp-default-5.3.18-150200.24.129.1.ppc64le",
          "SUSE Linux Enterprise Server 15 SP2-LTSS:reiserfs-kmp-default-5.3.18-150200.24.129.1.s390x",
          "SUSE Linux Enterprise Server 15 SP2-LTSS:reiserfs-kmp-default-5.3.18-150200.24.129.1.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-5.3.18-150200.24.129.1.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-5.3.18-150200.24.129.1.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-base-5.3.18-150200.24.129.1.150200.9.61.1.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-base-5.3.18-150200.24.129.1.150200.9.61.1.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-devel-5.3.18-150200.24.129.1.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-devel-5.3.18-150200.24.129.1.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-devel-5.3.18-150200.24.129.1.noarch",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-docs-5.3.18-150200.24.129.1.noarch",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-macros-5.3.18-150200.24.129.1.noarch",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-obs-build-5.3.18-150200.24.129.1.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-obs-build-5.3.18-150200.24.129.1.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-preempt-5.3.18-150200.24.129.1.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-preempt-devel-5.3.18-150200.24.129.1.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-source-5.3.18-150200.24.129.1.noarch",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-syms-5.3.18-150200.24.129.1.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-syms-5.3.18-150200.24.129.1.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP2:reiserfs-kmp-default-5.3.18-150200.24.129.1.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP2:reiserfs-kmp-default-5.3.18-150200.24.129.1.x86_64",
          "SUSE Manager Proxy 4.1:kernel-default-5.3.18-150200.24.129.1.x86_64",
          "SUSE Manager Proxy 4.1:kernel-default-base-5.3.18-150200.24.129.1.150200.9.61.1.x86_64",
          "SUSE Manager Proxy 4.1:kernel-default-devel-5.3.18-150200.24.129.1.x86_64",
          "SUSE Manager Proxy 4.1:kernel-devel-5.3.18-150200.24.129.1.noarch",
          "SUSE Manager Proxy 4.1:kernel-docs-5.3.18-150200.24.129.1.noarch",
          "SUSE Manager Proxy 4.1:kernel-macros-5.3.18-150200.24.129.1.noarch",
          "SUSE Manager Proxy 4.1:kernel-obs-build-5.3.18-150200.24.129.1.x86_64",
          "SUSE Manager Proxy 4.1:kernel-preempt-5.3.18-150200.24.129.1.x86_64",
          "SUSE Manager Proxy 4.1:kernel-preempt-devel-5.3.18-150200.24.129.1.x86_64",
          "SUSE Manager Proxy 4.1:kernel-source-5.3.18-150200.24.129.1.noarch",
          "SUSE Manager Proxy 4.1:kernel-syms-5.3.18-150200.24.129.1.x86_64",
          "SUSE Manager Proxy 4.1:reiserfs-kmp-default-5.3.18-150200.24.129.1.x86_64",
          "SUSE Manager Retail Branch Server 4.1:kernel-default-5.3.18-150200.24.129.1.x86_64",
          "SUSE Manager Retail Branch Server 4.1:kernel-default-base-5.3.18-150200.24.129.1.150200.9.61.1.x86_64",
          "SUSE Manager Retail Branch Server 4.1:kernel-default-devel-5.3.18-150200.24.129.1.x86_64",
          "SUSE Manager Retail Branch Server 4.1:kernel-devel-5.3.18-150200.24.129.1.noarch",
          "SUSE Manager Retail Branch Server 4.1:kernel-docs-5.3.18-150200.24.129.1.noarch",
          "SUSE Manager Retail Branch Server 4.1:kernel-macros-5.3.18-150200.24.129.1.noarch",
          "SUSE Manager Retail Branch Server 4.1:kernel-obs-build-5.3.18-150200.24.129.1.x86_64",
          "SUSE Manager Retail Branch Server 4.1:kernel-preempt-5.3.18-150200.24.129.1.x86_64",
          "SUSE Manager Retail Branch Server 4.1:kernel-preempt-devel-5.3.18-150200.24.129.1.x86_64",
          "SUSE Manager Retail Branch Server 4.1:kernel-source-5.3.18-150200.24.129.1.noarch",
          "SUSE Manager Retail Branch Server 4.1:kernel-syms-5.3.18-150200.24.129.1.x86_64",
          "SUSE Manager Retail Branch Server 4.1:reiserfs-kmp-default-5.3.18-150200.24.129.1.x86_64",
          "SUSE Manager Server 4.1:kernel-default-5.3.18-150200.24.129.1.ppc64le",
          "SUSE Manager Server 4.1:kernel-default-5.3.18-150200.24.129.1.s390x",
          "SUSE Manager Server 4.1:kernel-default-5.3.18-150200.24.129.1.x86_64",
          "SUSE Manager Server 4.1:kernel-default-base-5.3.18-150200.24.129.1.150200.9.61.1.ppc64le",
          "SUSE Manager Server 4.1:kernel-default-base-5.3.18-150200.24.129.1.150200.9.61.1.s390x",
          "SUSE Manager Server 4.1:kernel-default-base-5.3.18-150200.24.129.1.150200.9.61.1.x86_64",
          "SUSE Manager Server 4.1:kernel-default-devel-5.3.18-150200.24.129.1.ppc64le",
          "SUSE Manager Server 4.1:kernel-default-devel-5.3.18-150200.24.129.1.s390x",
          "SUSE Manager Server 4.1:kernel-default-devel-5.3.18-150200.24.129.1.x86_64",
          "SUSE Manager Server 4.1:kernel-devel-5.3.18-150200.24.129.1.noarch",
          "SUSE Manager Server 4.1:kernel-docs-5.3.18-150200.24.129.1.noarch",
          "SUSE Manager Server 4.1:kernel-macros-5.3.18-150200.24.129.1.noarch",
          "SUSE Manager Server 4.1:kernel-obs-build-5.3.18-150200.24.129.1.ppc64le",
          "SUSE Manager Server 4.1:kernel-obs-build-5.3.18-150200.24.129.1.s390x",
          "SUSE Manager Server 4.1:kernel-obs-build-5.3.18-150200.24.129.1.x86_64",
          "SUSE Manager Server 4.1:kernel-preempt-5.3.18-150200.24.129.1.x86_64",
          "SUSE Manager Server 4.1:kernel-preempt-devel-5.3.18-150200.24.129.1.x86_64",
          "SUSE Manager Server 4.1:kernel-source-5.3.18-150200.24.129.1.noarch",
          "SUSE Manager Server 4.1:kernel-syms-5.3.18-150200.24.129.1.ppc64le",
          "SUSE Manager Server 4.1:kernel-syms-5.3.18-150200.24.129.1.s390x",
          "SUSE Manager Server 4.1:kernel-syms-5.3.18-150200.24.129.1.x86_64",
          "SUSE Manager Server 4.1:reiserfs-kmp-default-5.3.18-150200.24.129.1.ppc64le",
          "SUSE Manager Server 4.1:reiserfs-kmp-default-5.3.18-150200.24.129.1.s390x",
          "SUSE Manager Server 4.1:reiserfs-kmp-default-5.3.18-150200.24.129.1.x86_64"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2022-2639",
          "url": "https://www.suse.com/security/cve/CVE-2022-2639"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1202154 for CVE-2022-2639",
          "url": "https://bugzilla.suse.com/1202154"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "SUSE Enterprise Storage 7:kernel-default-5.3.18-150200.24.129.1.aarch64",
            "SUSE Enterprise Storage 7:kernel-default-5.3.18-150200.24.129.1.x86_64",
            "SUSE Enterprise Storage 7:kernel-default-base-5.3.18-150200.24.129.1.150200.9.61.1.aarch64",
            "SUSE Enterprise Storage 7:kernel-default-base-5.3.18-150200.24.129.1.150200.9.61.1.x86_64",
            "SUSE Enterprise Storage 7:kernel-default-devel-5.3.18-150200.24.129.1.aarch64",
            "SUSE Enterprise Storage 7:kernel-default-devel-5.3.18-150200.24.129.1.x86_64",
            "SUSE Enterprise Storage 7:kernel-devel-5.3.18-150200.24.129.1.noarch",
            "SUSE Enterprise Storage 7:kernel-docs-5.3.18-150200.24.129.1.noarch",
            "SUSE Enterprise Storage 7:kernel-macros-5.3.18-150200.24.129.1.noarch",
            "SUSE Enterprise Storage 7:kernel-obs-build-5.3.18-150200.24.129.1.aarch64",
            "SUSE Enterprise Storage 7:kernel-obs-build-5.3.18-150200.24.129.1.x86_64",
            "SUSE Enterprise Storage 7:kernel-preempt-5.3.18-150200.24.129.1.aarch64",
            "SUSE Enterprise Storage 7:kernel-preempt-5.3.18-150200.24.129.1.x86_64",
            "SUSE Enterprise Storage 7:kernel-preempt-devel-5.3.18-150200.24.129.1.aarch64",
            "SUSE Enterprise Storage 7:kernel-preempt-devel-5.3.18-150200.24.129.1.x86_64",
            "SUSE Enterprise Storage 7:kernel-source-5.3.18-150200.24.129.1.noarch",
            "SUSE Enterprise Storage 7:kernel-syms-5.3.18-150200.24.129.1.aarch64",
            "SUSE Enterprise Storage 7:kernel-syms-5.3.18-150200.24.129.1.x86_64",
            "SUSE Enterprise Storage 7:reiserfs-kmp-default-5.3.18-150200.24.129.1.aarch64",
            "SUSE Enterprise Storage 7:reiserfs-kmp-default-5.3.18-150200.24.129.1.x86_64",
            "SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-150200.24.129.1.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-150200.24.129.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-150200.24.129.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-150200.24.129.1.x86_64",
            "SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-150200.24.129.1.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-150200.24.129.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-150200.24.129.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-150200.24.129.1.x86_64",
            "SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-150200.24.129.1.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-150200.24.129.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-150200.24.129.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-150200.24.129.1.x86_64",
            "SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-150200.24.129.1.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-150200.24.129.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-150200.24.129.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-150200.24.129.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-default-5.3.18-150200.24.129.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-default-5.3.18-150200.24.129.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-default-base-5.3.18-150200.24.129.1.150200.9.61.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-default-base-5.3.18-150200.24.129.1.150200.9.61.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-default-devel-5.3.18-150200.24.129.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-default-devel-5.3.18-150200.24.129.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-devel-5.3.18-150200.24.129.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-docs-5.3.18-150200.24.129.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-macros-5.3.18-150200.24.129.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-obs-build-5.3.18-150200.24.129.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-obs-build-5.3.18-150200.24.129.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-preempt-5.3.18-150200.24.129.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-preempt-5.3.18-150200.24.129.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-preempt-devel-5.3.18-150200.24.129.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-preempt-devel-5.3.18-150200.24.129.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-source-5.3.18-150200.24.129.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-syms-5.3.18-150200.24.129.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-syms-5.3.18-150200.24.129.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-5.3.18-150200.24.129.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-5.3.18-150200.24.129.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.129.1.150200.9.61.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.129.1.150200.9.61.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.129.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.129.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-devel-5.3.18-150200.24.129.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-docs-5.3.18-150200.24.129.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-macros-5.3.18-150200.24.129.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.129.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.129.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-preempt-5.3.18-150200.24.129.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-preempt-5.3.18-150200.24.129.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-preempt-devel-5.3.18-150200.24.129.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-preempt-devel-5.3.18-150200.24.129.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-source-5.3.18-150200.24.129.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.129.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.129.1.x86_64",
            "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-5.3.18-150200.24.129.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-5.3.18-150200.24.129.1.s390x",
            "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-5.3.18-150200.24.129.1.x86_64",
            "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-devel-5.3.18-150200.24.129.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-devel-5.3.18-150200.24.129.1.s390x",
            "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-devel-5.3.18-150200.24.129.1.x86_64",
            "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-150200_24_129-default-1-150200.5.3.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-150200_24_129-default-1-150200.5.3.1.s390x",
            "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-150200_24_129-default-1-150200.5.3.1.x86_64",
            "SUSE Linux Enterprise Server 15 SP2-BCL:kernel-default-5.3.18-150200.24.129.1.x86_64",
            "SUSE Linux Enterprise Server 15 SP2-BCL:kernel-default-base-5.3.18-150200.24.129.1.150200.9.61.1.x86_64",
            "SUSE Linux Enterprise Server 15 SP2-BCL:kernel-default-devel-5.3.18-150200.24.129.1.x86_64",
            "SUSE Linux Enterprise Server 15 SP2-BCL:kernel-devel-5.3.18-150200.24.129.1.noarch",
            "SUSE Linux Enterprise Server 15 SP2-BCL:kernel-docs-5.3.18-150200.24.129.1.noarch",
            "SUSE Linux Enterprise Server 15 SP2-BCL:kernel-macros-5.3.18-150200.24.129.1.noarch",
            "SUSE Linux Enterprise Server 15 SP2-BCL:kernel-obs-build-5.3.18-150200.24.129.1.x86_64",
            "SUSE Linux Enterprise Server 15 SP2-BCL:kernel-preempt-5.3.18-150200.24.129.1.x86_64",
            "SUSE Linux Enterprise Server 15 SP2-BCL:kernel-preempt-devel-5.3.18-150200.24.129.1.x86_64",
            "SUSE Linux Enterprise Server 15 SP2-BCL:kernel-source-5.3.18-150200.24.129.1.noarch",
            "SUSE Linux Enterprise Server 15 SP2-BCL:kernel-syms-5.3.18-150200.24.129.1.x86_64",
            "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-5.3.18-150200.24.129.1.aarch64",
            "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-5.3.18-150200.24.129.1.ppc64le",
            "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-5.3.18-150200.24.129.1.s390x",
            "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-5.3.18-150200.24.129.1.x86_64",
            "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.129.1.150200.9.61.1.aarch64",
            "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.129.1.150200.9.61.1.ppc64le",
            "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.129.1.150200.9.61.1.s390x",
            "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.129.1.150200.9.61.1.x86_64",
            "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.129.1.aarch64",
            "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.129.1.ppc64le",
            "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.129.1.s390x",
            "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.129.1.x86_64",
            "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-devel-5.3.18-150200.24.129.1.noarch",
            "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-docs-5.3.18-150200.24.129.1.noarch",
            "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-macros-5.3.18-150200.24.129.1.noarch",
            "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.129.1.aarch64",
            "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.129.1.ppc64le",
            "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.129.1.s390x",
            "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.129.1.x86_64",
            "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-preempt-5.3.18-150200.24.129.1.aarch64",
            "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-preempt-5.3.18-150200.24.129.1.x86_64",
            "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-preempt-devel-5.3.18-150200.24.129.1.aarch64",
            "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-preempt-devel-5.3.18-150200.24.129.1.x86_64",
            "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-source-5.3.18-150200.24.129.1.noarch",
            "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.129.1.aarch64",
            "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.129.1.ppc64le",
            "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.129.1.s390x",
            "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.129.1.x86_64",
            "SUSE Linux Enterprise Server 15 SP2-LTSS:reiserfs-kmp-default-5.3.18-150200.24.129.1.aarch64",
            "SUSE Linux Enterprise Server 15 SP2-LTSS:reiserfs-kmp-default-5.3.18-150200.24.129.1.ppc64le",
            "SUSE Linux Enterprise Server 15 SP2-LTSS:reiserfs-kmp-default-5.3.18-150200.24.129.1.s390x",
            "SUSE Linux Enterprise Server 15 SP2-LTSS:reiserfs-kmp-default-5.3.18-150200.24.129.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-5.3.18-150200.24.129.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-5.3.18-150200.24.129.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-base-5.3.18-150200.24.129.1.150200.9.61.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-base-5.3.18-150200.24.129.1.150200.9.61.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-devel-5.3.18-150200.24.129.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-devel-5.3.18-150200.24.129.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-devel-5.3.18-150200.24.129.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-docs-5.3.18-150200.24.129.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-macros-5.3.18-150200.24.129.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-obs-build-5.3.18-150200.24.129.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-obs-build-5.3.18-150200.24.129.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-preempt-5.3.18-150200.24.129.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-preempt-devel-5.3.18-150200.24.129.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-source-5.3.18-150200.24.129.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-syms-5.3.18-150200.24.129.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-syms-5.3.18-150200.24.129.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP2:reiserfs-kmp-default-5.3.18-150200.24.129.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP2:reiserfs-kmp-default-5.3.18-150200.24.129.1.x86_64",
            "SUSE Manager Proxy 4.1:kernel-default-5.3.18-150200.24.129.1.x86_64",
            "SUSE Manager Proxy 4.1:kernel-default-base-5.3.18-150200.24.129.1.150200.9.61.1.x86_64",
            "SUSE Manager Proxy 4.1:kernel-default-devel-5.3.18-150200.24.129.1.x86_64",
            "SUSE Manager Proxy 4.1:kernel-devel-5.3.18-150200.24.129.1.noarch",
            "SUSE Manager Proxy 4.1:kernel-docs-5.3.18-150200.24.129.1.noarch",
            "SUSE Manager Proxy 4.1:kernel-macros-5.3.18-150200.24.129.1.noarch",
            "SUSE Manager Proxy 4.1:kernel-obs-build-5.3.18-150200.24.129.1.x86_64",
            "SUSE Manager Proxy 4.1:kernel-preempt-5.3.18-150200.24.129.1.x86_64",
            "SUSE Manager Proxy 4.1:kernel-preempt-devel-5.3.18-150200.24.129.1.x86_64",
            "SUSE Manager Proxy 4.1:kernel-source-5.3.18-150200.24.129.1.noarch",
            "SUSE Manager Proxy 4.1:kernel-syms-5.3.18-150200.24.129.1.x86_64",
            "SUSE Manager Proxy 4.1:reiserfs-kmp-default-5.3.18-150200.24.129.1.x86_64",
            "SUSE Manager Retail Branch Server 4.1:kernel-default-5.3.18-150200.24.129.1.x86_64",
            "SUSE Manager Retail Branch Server 4.1:kernel-default-base-5.3.18-150200.24.129.1.150200.9.61.1.x86_64",
            "SUSE Manager Retail Branch Server 4.1:kernel-default-devel-5.3.18-150200.24.129.1.x86_64",
            "SUSE Manager Retail Branch Server 4.1:kernel-devel-5.3.18-150200.24.129.1.noarch",
            "SUSE Manager Retail Branch Server 4.1:kernel-docs-5.3.18-150200.24.129.1.noarch",
            "SUSE Manager Retail Branch Server 4.1:kernel-macros-5.3.18-150200.24.129.1.noarch",
            "SUSE Manager Retail Branch Server 4.1:kernel-obs-build-5.3.18-150200.24.129.1.x86_64",
            "SUSE Manager Retail Branch Server 4.1:kernel-preempt-5.3.18-150200.24.129.1.x86_64",
            "SUSE Manager Retail Branch Server 4.1:kernel-preempt-devel-5.3.18-150200.24.129.1.x86_64",
            "SUSE Manager Retail Branch Server 4.1:kernel-source-5.3.18-150200.24.129.1.noarch",
            "SUSE Manager Retail Branch Server 4.1:kernel-syms-5.3.18-150200.24.129.1.x86_64",
            "SUSE Manager Retail Branch Server 4.1:reiserfs-kmp-default-5.3.18-150200.24.129.1.x86_64",
            "SUSE Manager Server 4.1:kernel-default-5.3.18-150200.24.129.1.ppc64le",
            "SUSE Manager Server 4.1:kernel-default-5.3.18-150200.24.129.1.s390x",
            "SUSE Manager Server 4.1:kernel-default-5.3.18-150200.24.129.1.x86_64",
            "SUSE Manager Server 4.1:kernel-default-base-5.3.18-150200.24.129.1.150200.9.61.1.ppc64le",
            "SUSE Manager Server 4.1:kernel-default-base-5.3.18-150200.24.129.1.150200.9.61.1.s390x",
            "SUSE Manager Server 4.1:kernel-default-base-5.3.18-150200.24.129.1.150200.9.61.1.x86_64",
            "SUSE Manager Server 4.1:kernel-default-devel-5.3.18-150200.24.129.1.ppc64le",
            "SUSE Manager Server 4.1:kernel-default-devel-5.3.18-150200.24.129.1.s390x",
            "SUSE Manager Server 4.1:kernel-default-devel-5.3.18-150200.24.129.1.x86_64",
            "SUSE Manager Server 4.1:kernel-devel-5.3.18-150200.24.129.1.noarch",
            "SUSE Manager Server 4.1:kernel-docs-5.3.18-150200.24.129.1.noarch",
            "SUSE Manager Server 4.1:kernel-macros-5.3.18-150200.24.129.1.noarch",
            "SUSE Manager Server 4.1:kernel-obs-build-5.3.18-150200.24.129.1.ppc64le",
            "SUSE Manager Server 4.1:kernel-obs-build-5.3.18-150200.24.129.1.s390x",
            "SUSE Manager Server 4.1:kernel-obs-build-5.3.18-150200.24.129.1.x86_64",
            "SUSE Manager Server 4.1:kernel-preempt-5.3.18-150200.24.129.1.x86_64",
            "SUSE Manager Server 4.1:kernel-preempt-devel-5.3.18-150200.24.129.1.x86_64",
            "SUSE Manager Server 4.1:kernel-source-5.3.18-150200.24.129.1.noarch",
            "SUSE Manager Server 4.1:kernel-syms-5.3.18-150200.24.129.1.ppc64le",
            "SUSE Manager Server 4.1:kernel-syms-5.3.18-150200.24.129.1.s390x",
            "SUSE Manager Server 4.1:kernel-syms-5.3.18-150200.24.129.1.x86_64",
            "SUSE Manager Server 4.1:reiserfs-kmp-default-5.3.18-150200.24.129.1.ppc64le",
            "SUSE Manager Server 4.1:reiserfs-kmp-default-5.3.18-150200.24.129.1.s390x",
            "SUSE Manager Server 4.1:reiserfs-kmp-default-5.3.18-150200.24.129.1.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 6.1,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:H",
            "version": "3.1"
          },
          "products": [
            "SUSE Enterprise Storage 7:kernel-default-5.3.18-150200.24.129.1.aarch64",
            "SUSE Enterprise Storage 7:kernel-default-5.3.18-150200.24.129.1.x86_64",
            "SUSE Enterprise Storage 7:kernel-default-base-5.3.18-150200.24.129.1.150200.9.61.1.aarch64",
            "SUSE Enterprise Storage 7:kernel-default-base-5.3.18-150200.24.129.1.150200.9.61.1.x86_64",
            "SUSE Enterprise Storage 7:kernel-default-devel-5.3.18-150200.24.129.1.aarch64",
            "SUSE Enterprise Storage 7:kernel-default-devel-5.3.18-150200.24.129.1.x86_64",
            "SUSE Enterprise Storage 7:kernel-devel-5.3.18-150200.24.129.1.noarch",
            "SUSE Enterprise Storage 7:kernel-docs-5.3.18-150200.24.129.1.noarch",
            "SUSE Enterprise Storage 7:kernel-macros-5.3.18-150200.24.129.1.noarch",
            "SUSE Enterprise Storage 7:kernel-obs-build-5.3.18-150200.24.129.1.aarch64",
            "SUSE Enterprise Storage 7:kernel-obs-build-5.3.18-150200.24.129.1.x86_64",
            "SUSE Enterprise Storage 7:kernel-preempt-5.3.18-150200.24.129.1.aarch64",
            "SUSE Enterprise Storage 7:kernel-preempt-5.3.18-150200.24.129.1.x86_64",
            "SUSE Enterprise Storage 7:kernel-preempt-devel-5.3.18-150200.24.129.1.aarch64",
            "SUSE Enterprise Storage 7:kernel-preempt-devel-5.3.18-150200.24.129.1.x86_64",
            "SUSE Enterprise Storage 7:kernel-source-5.3.18-150200.24.129.1.noarch",
            "SUSE Enterprise Storage 7:kernel-syms-5.3.18-150200.24.129.1.aarch64",
            "SUSE Enterprise Storage 7:kernel-syms-5.3.18-150200.24.129.1.x86_64",
            "SUSE Enterprise Storage 7:reiserfs-kmp-default-5.3.18-150200.24.129.1.aarch64",
            "SUSE Enterprise Storage 7:reiserfs-kmp-default-5.3.18-150200.24.129.1.x86_64",
            "SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-150200.24.129.1.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-150200.24.129.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-150200.24.129.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-150200.24.129.1.x86_64",
            "SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-150200.24.129.1.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-150200.24.129.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-150200.24.129.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-150200.24.129.1.x86_64",
            "SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-150200.24.129.1.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-150200.24.129.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-150200.24.129.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-150200.24.129.1.x86_64",
            "SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-150200.24.129.1.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-150200.24.129.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-150200.24.129.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-150200.24.129.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-default-5.3.18-150200.24.129.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-default-5.3.18-150200.24.129.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-default-base-5.3.18-150200.24.129.1.150200.9.61.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-default-base-5.3.18-150200.24.129.1.150200.9.61.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-default-devel-5.3.18-150200.24.129.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-default-devel-5.3.18-150200.24.129.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-devel-5.3.18-150200.24.129.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-docs-5.3.18-150200.24.129.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-macros-5.3.18-150200.24.129.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-obs-build-5.3.18-150200.24.129.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-obs-build-5.3.18-150200.24.129.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-preempt-5.3.18-150200.24.129.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-preempt-5.3.18-150200.24.129.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-preempt-devel-5.3.18-150200.24.129.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-preempt-devel-5.3.18-150200.24.129.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-source-5.3.18-150200.24.129.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-syms-5.3.18-150200.24.129.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-syms-5.3.18-150200.24.129.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-5.3.18-150200.24.129.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-5.3.18-150200.24.129.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.129.1.150200.9.61.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.129.1.150200.9.61.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.129.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.129.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-devel-5.3.18-150200.24.129.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-docs-5.3.18-150200.24.129.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-macros-5.3.18-150200.24.129.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.129.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.129.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-preempt-5.3.18-150200.24.129.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-preempt-5.3.18-150200.24.129.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-preempt-devel-5.3.18-150200.24.129.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-preempt-devel-5.3.18-150200.24.129.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-source-5.3.18-150200.24.129.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.129.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.129.1.x86_64",
            "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-5.3.18-150200.24.129.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-5.3.18-150200.24.129.1.s390x",
            "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-5.3.18-150200.24.129.1.x86_64",
            "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-devel-5.3.18-150200.24.129.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-devel-5.3.18-150200.24.129.1.s390x",
            "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-devel-5.3.18-150200.24.129.1.x86_64",
            "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-150200_24_129-default-1-150200.5.3.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-150200_24_129-default-1-150200.5.3.1.s390x",
            "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-150200_24_129-default-1-150200.5.3.1.x86_64",
            "SUSE Linux Enterprise Server 15 SP2-BCL:kernel-default-5.3.18-150200.24.129.1.x86_64",
            "SUSE Linux Enterprise Server 15 SP2-BCL:kernel-default-base-5.3.18-150200.24.129.1.150200.9.61.1.x86_64",
            "SUSE Linux Enterprise Server 15 SP2-BCL:kernel-default-devel-5.3.18-150200.24.129.1.x86_64",
            "SUSE Linux Enterprise Server 15 SP2-BCL:kernel-devel-5.3.18-150200.24.129.1.noarch",
            "SUSE Linux Enterprise Server 15 SP2-BCL:kernel-docs-5.3.18-150200.24.129.1.noarch",
            "SUSE Linux Enterprise Server 15 SP2-BCL:kernel-macros-5.3.18-150200.24.129.1.noarch",
            "SUSE Linux Enterprise Server 15 SP2-BCL:kernel-obs-build-5.3.18-150200.24.129.1.x86_64",
            "SUSE Linux Enterprise Server 15 SP2-BCL:kernel-preempt-5.3.18-150200.24.129.1.x86_64",
            "SUSE Linux Enterprise Server 15 SP2-BCL:kernel-preempt-devel-5.3.18-150200.24.129.1.x86_64",
            "SUSE Linux Enterprise Server 15 SP2-BCL:kernel-source-5.3.18-150200.24.129.1.noarch",
            "SUSE Linux Enterprise Server 15 SP2-BCL:kernel-syms-5.3.18-150200.24.129.1.x86_64",
            "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-5.3.18-150200.24.129.1.aarch64",
            "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-5.3.18-150200.24.129.1.ppc64le",
            "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-5.3.18-150200.24.129.1.s390x",
            "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-5.3.18-150200.24.129.1.x86_64",
            "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.129.1.150200.9.61.1.aarch64",
            "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.129.1.150200.9.61.1.ppc64le",
            "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.129.1.150200.9.61.1.s390x",
            "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.129.1.150200.9.61.1.x86_64",
            "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.129.1.aarch64",
            "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.129.1.ppc64le",
            "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.129.1.s390x",
            "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.129.1.x86_64",
            "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-devel-5.3.18-150200.24.129.1.noarch",
            "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-docs-5.3.18-150200.24.129.1.noarch",
            "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-macros-5.3.18-150200.24.129.1.noarch",
            "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.129.1.aarch64",
            "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.129.1.ppc64le",
            "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.129.1.s390x",
            "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.129.1.x86_64",
            "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-preempt-5.3.18-150200.24.129.1.aarch64",
            "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-preempt-5.3.18-150200.24.129.1.x86_64",
            "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-preempt-devel-5.3.18-150200.24.129.1.aarch64",
            "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-preempt-devel-5.3.18-150200.24.129.1.x86_64",
            "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-source-5.3.18-150200.24.129.1.noarch",
            "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.129.1.aarch64",
            "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.129.1.ppc64le",
            "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.129.1.s390x",
            "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.129.1.x86_64",
            "SUSE Linux Enterprise Server 15 SP2-LTSS:reiserfs-kmp-default-5.3.18-150200.24.129.1.aarch64",
            "SUSE Linux Enterprise Server 15 SP2-LTSS:reiserfs-kmp-default-5.3.18-150200.24.129.1.ppc64le",
            "SUSE Linux Enterprise Server 15 SP2-LTSS:reiserfs-kmp-default-5.3.18-150200.24.129.1.s390x",
            "SUSE Linux Enterprise Server 15 SP2-LTSS:reiserfs-kmp-default-5.3.18-150200.24.129.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-5.3.18-150200.24.129.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-5.3.18-150200.24.129.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-base-5.3.18-150200.24.129.1.150200.9.61.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-base-5.3.18-150200.24.129.1.150200.9.61.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-devel-5.3.18-150200.24.129.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-devel-5.3.18-150200.24.129.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-devel-5.3.18-150200.24.129.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-docs-5.3.18-150200.24.129.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-macros-5.3.18-150200.24.129.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-obs-build-5.3.18-150200.24.129.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-obs-build-5.3.18-150200.24.129.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-preempt-5.3.18-150200.24.129.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-preempt-devel-5.3.18-150200.24.129.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-source-5.3.18-150200.24.129.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-syms-5.3.18-150200.24.129.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-syms-5.3.18-150200.24.129.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP2:reiserfs-kmp-default-5.3.18-150200.24.129.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP2:reiserfs-kmp-default-5.3.18-150200.24.129.1.x86_64",
            "SUSE Manager Proxy 4.1:kernel-default-5.3.18-150200.24.129.1.x86_64",
            "SUSE Manager Proxy 4.1:kernel-default-base-5.3.18-150200.24.129.1.150200.9.61.1.x86_64",
            "SUSE Manager Proxy 4.1:kernel-default-devel-5.3.18-150200.24.129.1.x86_64",
            "SUSE Manager Proxy 4.1:kernel-devel-5.3.18-150200.24.129.1.noarch",
            "SUSE Manager Proxy 4.1:kernel-docs-5.3.18-150200.24.129.1.noarch",
            "SUSE Manager Proxy 4.1:kernel-macros-5.3.18-150200.24.129.1.noarch",
            "SUSE Manager Proxy 4.1:kernel-obs-build-5.3.18-150200.24.129.1.x86_64",
            "SUSE Manager Proxy 4.1:kernel-preempt-5.3.18-150200.24.129.1.x86_64",
            "SUSE Manager Proxy 4.1:kernel-preempt-devel-5.3.18-150200.24.129.1.x86_64",
            "SUSE Manager Proxy 4.1:kernel-source-5.3.18-150200.24.129.1.noarch",
            "SUSE Manager Proxy 4.1:kernel-syms-5.3.18-150200.24.129.1.x86_64",
            "SUSE Manager Proxy 4.1:reiserfs-kmp-default-5.3.18-150200.24.129.1.x86_64",
            "SUSE Manager Retail Branch Server 4.1:kernel-default-5.3.18-150200.24.129.1.x86_64",
            "SUSE Manager Retail Branch Server 4.1:kernel-default-base-5.3.18-150200.24.129.1.150200.9.61.1.x86_64",
            "SUSE Manager Retail Branch Server 4.1:kernel-default-devel-5.3.18-150200.24.129.1.x86_64",
            "SUSE Manager Retail Branch Server 4.1:kernel-devel-5.3.18-150200.24.129.1.noarch",
            "SUSE Manager Retail Branch Server 4.1:kernel-docs-5.3.18-150200.24.129.1.noarch",
            "SUSE Manager Retail Branch Server 4.1:kernel-macros-5.3.18-150200.24.129.1.noarch",
            "SUSE Manager Retail Branch Server 4.1:kernel-obs-build-5.3.18-150200.24.129.1.x86_64",
            "SUSE Manager Retail Branch Server 4.1:kernel-preempt-5.3.18-150200.24.129.1.x86_64",
            "SUSE Manager Retail Branch Server 4.1:kernel-preempt-devel-5.3.18-150200.24.129.1.x86_64",
            "SUSE Manager Retail Branch Server 4.1:kernel-source-5.3.18-150200.24.129.1.noarch",
            "SUSE Manager Retail Branch Server 4.1:kernel-syms-5.3.18-150200.24.129.1.x86_64",
            "SUSE Manager Retail Branch Server 4.1:reiserfs-kmp-default-5.3.18-150200.24.129.1.x86_64",
            "SUSE Manager Server 4.1:kernel-default-5.3.18-150200.24.129.1.ppc64le",
            "SUSE Manager Server 4.1:kernel-default-5.3.18-150200.24.129.1.s390x",
            "SUSE Manager Server 4.1:kernel-default-5.3.18-150200.24.129.1.x86_64",
            "SUSE Manager Server 4.1:kernel-default-base-5.3.18-150200.24.129.1.150200.9.61.1.ppc64le",
            "SUSE Manager Server 4.1:kernel-default-base-5.3.18-150200.24.129.1.150200.9.61.1.s390x",
            "SUSE Manager Server 4.1:kernel-default-base-5.3.18-150200.24.129.1.150200.9.61.1.x86_64",
            "SUSE Manager Server 4.1:kernel-default-devel-5.3.18-150200.24.129.1.ppc64le",
            "SUSE Manager Server 4.1:kernel-default-devel-5.3.18-150200.24.129.1.s390x",
            "SUSE Manager Server 4.1:kernel-default-devel-5.3.18-150200.24.129.1.x86_64",
            "SUSE Manager Server 4.1:kernel-devel-5.3.18-150200.24.129.1.noarch",
            "SUSE Manager Server 4.1:kernel-docs-5.3.18-150200.24.129.1.noarch",
            "SUSE Manager Server 4.1:kernel-macros-5.3.18-150200.24.129.1.noarch",
            "SUSE Manager Server 4.1:kernel-obs-build-5.3.18-150200.24.129.1.ppc64le",
            "SUSE Manager Server 4.1:kernel-obs-build-5.3.18-150200.24.129.1.s390x",
            "SUSE Manager Server 4.1:kernel-obs-build-5.3.18-150200.24.129.1.x86_64",
            "SUSE Manager Server 4.1:kernel-preempt-5.3.18-150200.24.129.1.x86_64",
            "SUSE Manager Server 4.1:kernel-preempt-devel-5.3.18-150200.24.129.1.x86_64",
            "SUSE Manager Server 4.1:kernel-source-5.3.18-150200.24.129.1.noarch",
            "SUSE Manager Server 4.1:kernel-syms-5.3.18-150200.24.129.1.ppc64le",
            "SUSE Manager Server 4.1:kernel-syms-5.3.18-150200.24.129.1.s390x",
            "SUSE Manager Server 4.1:kernel-syms-5.3.18-150200.24.129.1.x86_64",
            "SUSE Manager Server 4.1:reiserfs-kmp-default-5.3.18-150200.24.129.1.ppc64le",
            "SUSE Manager Server 4.1:reiserfs-kmp-default-5.3.18-150200.24.129.1.s390x",
            "SUSE Manager Server 4.1:reiserfs-kmp-default-5.3.18-150200.24.129.1.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2022-09-28T06:48:59Z",
          "details": "moderate"
        }
      ],
      "title": "CVE-2022-2639"
    },
    {
      "cve": "CVE-2022-2663",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2022-2663"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "An issue was found in the Linux kernel in nf_conntrack_irc where the message handling can be confused and incorrectly matches the message. A firewall may be able to be bypassed when users are using unencrypted IRC with nf_conntrack_irc configured.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "SUSE Enterprise Storage 7:kernel-default-5.3.18-150200.24.129.1.aarch64",
          "SUSE Enterprise Storage 7:kernel-default-5.3.18-150200.24.129.1.x86_64",
          "SUSE Enterprise Storage 7:kernel-default-base-5.3.18-150200.24.129.1.150200.9.61.1.aarch64",
          "SUSE Enterprise Storage 7:kernel-default-base-5.3.18-150200.24.129.1.150200.9.61.1.x86_64",
          "SUSE Enterprise Storage 7:kernel-default-devel-5.3.18-150200.24.129.1.aarch64",
          "SUSE Enterprise Storage 7:kernel-default-devel-5.3.18-150200.24.129.1.x86_64",
          "SUSE Enterprise Storage 7:kernel-devel-5.3.18-150200.24.129.1.noarch",
          "SUSE Enterprise Storage 7:kernel-docs-5.3.18-150200.24.129.1.noarch",
          "SUSE Enterprise Storage 7:kernel-macros-5.3.18-150200.24.129.1.noarch",
          "SUSE Enterprise Storage 7:kernel-obs-build-5.3.18-150200.24.129.1.aarch64",
          "SUSE Enterprise Storage 7:kernel-obs-build-5.3.18-150200.24.129.1.x86_64",
          "SUSE Enterprise Storage 7:kernel-preempt-5.3.18-150200.24.129.1.aarch64",
          "SUSE Enterprise Storage 7:kernel-preempt-5.3.18-150200.24.129.1.x86_64",
          "SUSE Enterprise Storage 7:kernel-preempt-devel-5.3.18-150200.24.129.1.aarch64",
          "SUSE Enterprise Storage 7:kernel-preempt-devel-5.3.18-150200.24.129.1.x86_64",
          "SUSE Enterprise Storage 7:kernel-source-5.3.18-150200.24.129.1.noarch",
          "SUSE Enterprise Storage 7:kernel-syms-5.3.18-150200.24.129.1.aarch64",
          "SUSE Enterprise Storage 7:kernel-syms-5.3.18-150200.24.129.1.x86_64",
          "SUSE Enterprise Storage 7:reiserfs-kmp-default-5.3.18-150200.24.129.1.aarch64",
          "SUSE Enterprise Storage 7:reiserfs-kmp-default-5.3.18-150200.24.129.1.x86_64",
          "SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-150200.24.129.1.aarch64",
          "SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-150200.24.129.1.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-150200.24.129.1.s390x",
          "SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-150200.24.129.1.x86_64",
          "SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-150200.24.129.1.aarch64",
          "SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-150200.24.129.1.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-150200.24.129.1.s390x",
          "SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-150200.24.129.1.x86_64",
          "SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-150200.24.129.1.aarch64",
          "SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-150200.24.129.1.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-150200.24.129.1.s390x",
          "SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-150200.24.129.1.x86_64",
          "SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-150200.24.129.1.aarch64",
          "SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-150200.24.129.1.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-150200.24.129.1.s390x",
          "SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-150200.24.129.1.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-default-5.3.18-150200.24.129.1.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-default-5.3.18-150200.24.129.1.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-default-base-5.3.18-150200.24.129.1.150200.9.61.1.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-default-base-5.3.18-150200.24.129.1.150200.9.61.1.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-default-devel-5.3.18-150200.24.129.1.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-default-devel-5.3.18-150200.24.129.1.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-devel-5.3.18-150200.24.129.1.noarch",
          "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-docs-5.3.18-150200.24.129.1.noarch",
          "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-macros-5.3.18-150200.24.129.1.noarch",
          "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-obs-build-5.3.18-150200.24.129.1.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-obs-build-5.3.18-150200.24.129.1.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-preempt-5.3.18-150200.24.129.1.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-preempt-5.3.18-150200.24.129.1.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-preempt-devel-5.3.18-150200.24.129.1.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-preempt-devel-5.3.18-150200.24.129.1.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-source-5.3.18-150200.24.129.1.noarch",
          "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-syms-5.3.18-150200.24.129.1.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-syms-5.3.18-150200.24.129.1.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-5.3.18-150200.24.129.1.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-5.3.18-150200.24.129.1.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.129.1.150200.9.61.1.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.129.1.150200.9.61.1.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.129.1.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.129.1.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-devel-5.3.18-150200.24.129.1.noarch",
          "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-docs-5.3.18-150200.24.129.1.noarch",
          "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-macros-5.3.18-150200.24.129.1.noarch",
          "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.129.1.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.129.1.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-preempt-5.3.18-150200.24.129.1.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-preempt-5.3.18-150200.24.129.1.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-preempt-devel-5.3.18-150200.24.129.1.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-preempt-devel-5.3.18-150200.24.129.1.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-source-5.3.18-150200.24.129.1.noarch",
          "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.129.1.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.129.1.x86_64",
          "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-5.3.18-150200.24.129.1.ppc64le",
          "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-5.3.18-150200.24.129.1.s390x",
          "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-5.3.18-150200.24.129.1.x86_64",
          "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-devel-5.3.18-150200.24.129.1.ppc64le",
          "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-devel-5.3.18-150200.24.129.1.s390x",
          "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-devel-5.3.18-150200.24.129.1.x86_64",
          "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-150200_24_129-default-1-150200.5.3.1.ppc64le",
          "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-150200_24_129-default-1-150200.5.3.1.s390x",
          "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-150200_24_129-default-1-150200.5.3.1.x86_64",
          "SUSE Linux Enterprise Server 15 SP2-BCL:kernel-default-5.3.18-150200.24.129.1.x86_64",
          "SUSE Linux Enterprise Server 15 SP2-BCL:kernel-default-base-5.3.18-150200.24.129.1.150200.9.61.1.x86_64",
          "SUSE Linux Enterprise Server 15 SP2-BCL:kernel-default-devel-5.3.18-150200.24.129.1.x86_64",
          "SUSE Linux Enterprise Server 15 SP2-BCL:kernel-devel-5.3.18-150200.24.129.1.noarch",
          "SUSE Linux Enterprise Server 15 SP2-BCL:kernel-docs-5.3.18-150200.24.129.1.noarch",
          "SUSE Linux Enterprise Server 15 SP2-BCL:kernel-macros-5.3.18-150200.24.129.1.noarch",
          "SUSE Linux Enterprise Server 15 SP2-BCL:kernel-obs-build-5.3.18-150200.24.129.1.x86_64",
          "SUSE Linux Enterprise Server 15 SP2-BCL:kernel-preempt-5.3.18-150200.24.129.1.x86_64",
          "SUSE Linux Enterprise Server 15 SP2-BCL:kernel-preempt-devel-5.3.18-150200.24.129.1.x86_64",
          "SUSE Linux Enterprise Server 15 SP2-BCL:kernel-source-5.3.18-150200.24.129.1.noarch",
          "SUSE Linux Enterprise Server 15 SP2-BCL:kernel-syms-5.3.18-150200.24.129.1.x86_64",
          "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-5.3.18-150200.24.129.1.aarch64",
          "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-5.3.18-150200.24.129.1.ppc64le",
          "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-5.3.18-150200.24.129.1.s390x",
          "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-5.3.18-150200.24.129.1.x86_64",
          "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.129.1.150200.9.61.1.aarch64",
          "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.129.1.150200.9.61.1.ppc64le",
          "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.129.1.150200.9.61.1.s390x",
          "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.129.1.150200.9.61.1.x86_64",
          "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.129.1.aarch64",
          "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.129.1.ppc64le",
          "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.129.1.s390x",
          "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.129.1.x86_64",
          "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-devel-5.3.18-150200.24.129.1.noarch",
          "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-docs-5.3.18-150200.24.129.1.noarch",
          "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-macros-5.3.18-150200.24.129.1.noarch",
          "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.129.1.aarch64",
          "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.129.1.ppc64le",
          "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.129.1.s390x",
          "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.129.1.x86_64",
          "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-preempt-5.3.18-150200.24.129.1.aarch64",
          "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-preempt-5.3.18-150200.24.129.1.x86_64",
          "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-preempt-devel-5.3.18-150200.24.129.1.aarch64",
          "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-preempt-devel-5.3.18-150200.24.129.1.x86_64",
          "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-source-5.3.18-150200.24.129.1.noarch",
          "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.129.1.aarch64",
          "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.129.1.ppc64le",
          "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.129.1.s390x",
          "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.129.1.x86_64",
          "SUSE Linux Enterprise Server 15 SP2-LTSS:reiserfs-kmp-default-5.3.18-150200.24.129.1.aarch64",
          "SUSE Linux Enterprise Server 15 SP2-LTSS:reiserfs-kmp-default-5.3.18-150200.24.129.1.ppc64le",
          "SUSE Linux Enterprise Server 15 SP2-LTSS:reiserfs-kmp-default-5.3.18-150200.24.129.1.s390x",
          "SUSE Linux Enterprise Server 15 SP2-LTSS:reiserfs-kmp-default-5.3.18-150200.24.129.1.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-5.3.18-150200.24.129.1.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-5.3.18-150200.24.129.1.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-base-5.3.18-150200.24.129.1.150200.9.61.1.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-base-5.3.18-150200.24.129.1.150200.9.61.1.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-devel-5.3.18-150200.24.129.1.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-devel-5.3.18-150200.24.129.1.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-devel-5.3.18-150200.24.129.1.noarch",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-docs-5.3.18-150200.24.129.1.noarch",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-macros-5.3.18-150200.24.129.1.noarch",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-obs-build-5.3.18-150200.24.129.1.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-obs-build-5.3.18-150200.24.129.1.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-preempt-5.3.18-150200.24.129.1.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-preempt-devel-5.3.18-150200.24.129.1.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-source-5.3.18-150200.24.129.1.noarch",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-syms-5.3.18-150200.24.129.1.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-syms-5.3.18-150200.24.129.1.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP2:reiserfs-kmp-default-5.3.18-150200.24.129.1.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP2:reiserfs-kmp-default-5.3.18-150200.24.129.1.x86_64",
          "SUSE Manager Proxy 4.1:kernel-default-5.3.18-150200.24.129.1.x86_64",
          "SUSE Manager Proxy 4.1:kernel-default-base-5.3.18-150200.24.129.1.150200.9.61.1.x86_64",
          "SUSE Manager Proxy 4.1:kernel-default-devel-5.3.18-150200.24.129.1.x86_64",
          "SUSE Manager Proxy 4.1:kernel-devel-5.3.18-150200.24.129.1.noarch",
          "SUSE Manager Proxy 4.1:kernel-docs-5.3.18-150200.24.129.1.noarch",
          "SUSE Manager Proxy 4.1:kernel-macros-5.3.18-150200.24.129.1.noarch",
          "SUSE Manager Proxy 4.1:kernel-obs-build-5.3.18-150200.24.129.1.x86_64",
          "SUSE Manager Proxy 4.1:kernel-preempt-5.3.18-150200.24.129.1.x86_64",
          "SUSE Manager Proxy 4.1:kernel-preempt-devel-5.3.18-150200.24.129.1.x86_64",
          "SUSE Manager Proxy 4.1:kernel-source-5.3.18-150200.24.129.1.noarch",
          "SUSE Manager Proxy 4.1:kernel-syms-5.3.18-150200.24.129.1.x86_64",
          "SUSE Manager Proxy 4.1:reiserfs-kmp-default-5.3.18-150200.24.129.1.x86_64",
          "SUSE Manager Retail Branch Server 4.1:kernel-default-5.3.18-150200.24.129.1.x86_64",
          "SUSE Manager Retail Branch Server 4.1:kernel-default-base-5.3.18-150200.24.129.1.150200.9.61.1.x86_64",
          "SUSE Manager Retail Branch Server 4.1:kernel-default-devel-5.3.18-150200.24.129.1.x86_64",
          "SUSE Manager Retail Branch Server 4.1:kernel-devel-5.3.18-150200.24.129.1.noarch",
          "SUSE Manager Retail Branch Server 4.1:kernel-docs-5.3.18-150200.24.129.1.noarch",
          "SUSE Manager Retail Branch Server 4.1:kernel-macros-5.3.18-150200.24.129.1.noarch",
          "SUSE Manager Retail Branch Server 4.1:kernel-obs-build-5.3.18-150200.24.129.1.x86_64",
          "SUSE Manager Retail Branch Server 4.1:kernel-preempt-5.3.18-150200.24.129.1.x86_64",
          "SUSE Manager Retail Branch Server 4.1:kernel-preempt-devel-5.3.18-150200.24.129.1.x86_64",
          "SUSE Manager Retail Branch Server 4.1:kernel-source-5.3.18-150200.24.129.1.noarch",
          "SUSE Manager Retail Branch Server 4.1:kernel-syms-5.3.18-150200.24.129.1.x86_64",
          "SUSE Manager Retail Branch Server 4.1:reiserfs-kmp-default-5.3.18-150200.24.129.1.x86_64",
          "SUSE Manager Server 4.1:kernel-default-5.3.18-150200.24.129.1.ppc64le",
          "SUSE Manager Server 4.1:kernel-default-5.3.18-150200.24.129.1.s390x",
          "SUSE Manager Server 4.1:kernel-default-5.3.18-150200.24.129.1.x86_64",
          "SUSE Manager Server 4.1:kernel-default-base-5.3.18-150200.24.129.1.150200.9.61.1.ppc64le",
          "SUSE Manager Server 4.1:kernel-default-base-5.3.18-150200.24.129.1.150200.9.61.1.s390x",
          "SUSE Manager Server 4.1:kernel-default-base-5.3.18-150200.24.129.1.150200.9.61.1.x86_64",
          "SUSE Manager Server 4.1:kernel-default-devel-5.3.18-150200.24.129.1.ppc64le",
          "SUSE Manager Server 4.1:kernel-default-devel-5.3.18-150200.24.129.1.s390x",
          "SUSE Manager Server 4.1:kernel-default-devel-5.3.18-150200.24.129.1.x86_64",
          "SUSE Manager Server 4.1:kernel-devel-5.3.18-150200.24.129.1.noarch",
          "SUSE Manager Server 4.1:kernel-docs-5.3.18-150200.24.129.1.noarch",
          "SUSE Manager Server 4.1:kernel-macros-5.3.18-150200.24.129.1.noarch",
          "SUSE Manager Server 4.1:kernel-obs-build-5.3.18-150200.24.129.1.ppc64le",
          "SUSE Manager Server 4.1:kernel-obs-build-5.3.18-150200.24.129.1.s390x",
          "SUSE Manager Server 4.1:kernel-obs-build-5.3.18-150200.24.129.1.x86_64",
          "SUSE Manager Server 4.1:kernel-preempt-5.3.18-150200.24.129.1.x86_64",
          "SUSE Manager Server 4.1:kernel-preempt-devel-5.3.18-150200.24.129.1.x86_64",
          "SUSE Manager Server 4.1:kernel-source-5.3.18-150200.24.129.1.noarch",
          "SUSE Manager Server 4.1:kernel-syms-5.3.18-150200.24.129.1.ppc64le",
          "SUSE Manager Server 4.1:kernel-syms-5.3.18-150200.24.129.1.s390x",
          "SUSE Manager Server 4.1:kernel-syms-5.3.18-150200.24.129.1.x86_64",
          "SUSE Manager Server 4.1:reiserfs-kmp-default-5.3.18-150200.24.129.1.ppc64le",
          "SUSE Manager Server 4.1:reiserfs-kmp-default-5.3.18-150200.24.129.1.s390x",
          "SUSE Manager Server 4.1:reiserfs-kmp-default-5.3.18-150200.24.129.1.x86_64"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2022-2663",
          "url": "https://www.suse.com/security/cve/CVE-2022-2663"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1202097 for CVE-2022-2663",
          "url": "https://bugzilla.suse.com/1202097"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1212299 for CVE-2022-2663",
          "url": "https://bugzilla.suse.com/1212299"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "SUSE Enterprise Storage 7:kernel-default-5.3.18-150200.24.129.1.aarch64",
            "SUSE Enterprise Storage 7:kernel-default-5.3.18-150200.24.129.1.x86_64",
            "SUSE Enterprise Storage 7:kernel-default-base-5.3.18-150200.24.129.1.150200.9.61.1.aarch64",
            "SUSE Enterprise Storage 7:kernel-default-base-5.3.18-150200.24.129.1.150200.9.61.1.x86_64",
            "SUSE Enterprise Storage 7:kernel-default-devel-5.3.18-150200.24.129.1.aarch64",
            "SUSE Enterprise Storage 7:kernel-default-devel-5.3.18-150200.24.129.1.x86_64",
            "SUSE Enterprise Storage 7:kernel-devel-5.3.18-150200.24.129.1.noarch",
            "SUSE Enterprise Storage 7:kernel-docs-5.3.18-150200.24.129.1.noarch",
            "SUSE Enterprise Storage 7:kernel-macros-5.3.18-150200.24.129.1.noarch",
            "SUSE Enterprise Storage 7:kernel-obs-build-5.3.18-150200.24.129.1.aarch64",
            "SUSE Enterprise Storage 7:kernel-obs-build-5.3.18-150200.24.129.1.x86_64",
            "SUSE Enterprise Storage 7:kernel-preempt-5.3.18-150200.24.129.1.aarch64",
            "SUSE Enterprise Storage 7:kernel-preempt-5.3.18-150200.24.129.1.x86_64",
            "SUSE Enterprise Storage 7:kernel-preempt-devel-5.3.18-150200.24.129.1.aarch64",
            "SUSE Enterprise Storage 7:kernel-preempt-devel-5.3.18-150200.24.129.1.x86_64",
            "SUSE Enterprise Storage 7:kernel-source-5.3.18-150200.24.129.1.noarch",
            "SUSE Enterprise Storage 7:kernel-syms-5.3.18-150200.24.129.1.aarch64",
            "SUSE Enterprise Storage 7:kernel-syms-5.3.18-150200.24.129.1.x86_64",
            "SUSE Enterprise Storage 7:reiserfs-kmp-default-5.3.18-150200.24.129.1.aarch64",
            "SUSE Enterprise Storage 7:reiserfs-kmp-default-5.3.18-150200.24.129.1.x86_64",
            "SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-150200.24.129.1.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-150200.24.129.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-150200.24.129.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-150200.24.129.1.x86_64",
            "SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-150200.24.129.1.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-150200.24.129.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-150200.24.129.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-150200.24.129.1.x86_64",
            "SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-150200.24.129.1.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-150200.24.129.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-150200.24.129.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-150200.24.129.1.x86_64",
            "SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-150200.24.129.1.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-150200.24.129.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-150200.24.129.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-150200.24.129.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-default-5.3.18-150200.24.129.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-default-5.3.18-150200.24.129.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-default-base-5.3.18-150200.24.129.1.150200.9.61.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-default-base-5.3.18-150200.24.129.1.150200.9.61.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-default-devel-5.3.18-150200.24.129.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-default-devel-5.3.18-150200.24.129.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-devel-5.3.18-150200.24.129.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-docs-5.3.18-150200.24.129.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-macros-5.3.18-150200.24.129.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-obs-build-5.3.18-150200.24.129.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-obs-build-5.3.18-150200.24.129.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-preempt-5.3.18-150200.24.129.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-preempt-5.3.18-150200.24.129.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-preempt-devel-5.3.18-150200.24.129.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-preempt-devel-5.3.18-150200.24.129.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-source-5.3.18-150200.24.129.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-syms-5.3.18-150200.24.129.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-syms-5.3.18-150200.24.129.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-5.3.18-150200.24.129.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-5.3.18-150200.24.129.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.129.1.150200.9.61.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.129.1.150200.9.61.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.129.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.129.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-devel-5.3.18-150200.24.129.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-docs-5.3.18-150200.24.129.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-macros-5.3.18-150200.24.129.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.129.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.129.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-preempt-5.3.18-150200.24.129.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-preempt-5.3.18-150200.24.129.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-preempt-devel-5.3.18-150200.24.129.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-preempt-devel-5.3.18-150200.24.129.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-source-5.3.18-150200.24.129.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.129.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.129.1.x86_64",
            "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-5.3.18-150200.24.129.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-5.3.18-150200.24.129.1.s390x",
            "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-5.3.18-150200.24.129.1.x86_64",
            "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-devel-5.3.18-150200.24.129.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-devel-5.3.18-150200.24.129.1.s390x",
            "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-devel-5.3.18-150200.24.129.1.x86_64",
            "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-150200_24_129-default-1-150200.5.3.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-150200_24_129-default-1-150200.5.3.1.s390x",
            "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-150200_24_129-default-1-150200.5.3.1.x86_64",
            "SUSE Linux Enterprise Server 15 SP2-BCL:kernel-default-5.3.18-150200.24.129.1.x86_64",
            "SUSE Linux Enterprise Server 15 SP2-BCL:kernel-default-base-5.3.18-150200.24.129.1.150200.9.61.1.x86_64",
            "SUSE Linux Enterprise Server 15 SP2-BCL:kernel-default-devel-5.3.18-150200.24.129.1.x86_64",
            "SUSE Linux Enterprise Server 15 SP2-BCL:kernel-devel-5.3.18-150200.24.129.1.noarch",
            "SUSE Linux Enterprise Server 15 SP2-BCL:kernel-docs-5.3.18-150200.24.129.1.noarch",
            "SUSE Linux Enterprise Server 15 SP2-BCL:kernel-macros-5.3.18-150200.24.129.1.noarch",
            "SUSE Linux Enterprise Server 15 SP2-BCL:kernel-obs-build-5.3.18-150200.24.129.1.x86_64",
            "SUSE Linux Enterprise Server 15 SP2-BCL:kernel-preempt-5.3.18-150200.24.129.1.x86_64",
            "SUSE Linux Enterprise Server 15 SP2-BCL:kernel-preempt-devel-5.3.18-150200.24.129.1.x86_64",
            "SUSE Linux Enterprise Server 15 SP2-BCL:kernel-source-5.3.18-150200.24.129.1.noarch",
            "SUSE Linux Enterprise Server 15 SP2-BCL:kernel-syms-5.3.18-150200.24.129.1.x86_64",
            "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-5.3.18-150200.24.129.1.aarch64",
            "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-5.3.18-150200.24.129.1.ppc64le",
            "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-5.3.18-150200.24.129.1.s390x",
            "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-5.3.18-150200.24.129.1.x86_64",
            "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.129.1.150200.9.61.1.aarch64",
            "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.129.1.150200.9.61.1.ppc64le",
            "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.129.1.150200.9.61.1.s390x",
            "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.129.1.150200.9.61.1.x86_64",
            "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.129.1.aarch64",
            "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.129.1.ppc64le",
            "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.129.1.s390x",
            "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.129.1.x86_64",
            "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-devel-5.3.18-150200.24.129.1.noarch",
            "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-docs-5.3.18-150200.24.129.1.noarch",
            "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-macros-5.3.18-150200.24.129.1.noarch",
            "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.129.1.aarch64",
            "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.129.1.ppc64le",
            "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.129.1.s390x",
            "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.129.1.x86_64",
            "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-preempt-5.3.18-150200.24.129.1.aarch64",
            "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-preempt-5.3.18-150200.24.129.1.x86_64",
            "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-preempt-devel-5.3.18-150200.24.129.1.aarch64",
            "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-preempt-devel-5.3.18-150200.24.129.1.x86_64",
            "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-source-5.3.18-150200.24.129.1.noarch",
            "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.129.1.aarch64",
            "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.129.1.ppc64le",
            "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.129.1.s390x",
            "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.129.1.x86_64",
            "SUSE Linux Enterprise Server 15 SP2-LTSS:reiserfs-kmp-default-5.3.18-150200.24.129.1.aarch64",
            "SUSE Linux Enterprise Server 15 SP2-LTSS:reiserfs-kmp-default-5.3.18-150200.24.129.1.ppc64le",
            "SUSE Linux Enterprise Server 15 SP2-LTSS:reiserfs-kmp-default-5.3.18-150200.24.129.1.s390x",
            "SUSE Linux Enterprise Server 15 SP2-LTSS:reiserfs-kmp-default-5.3.18-150200.24.129.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-5.3.18-150200.24.129.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-5.3.18-150200.24.129.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-base-5.3.18-150200.24.129.1.150200.9.61.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-base-5.3.18-150200.24.129.1.150200.9.61.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-devel-5.3.18-150200.24.129.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-devel-5.3.18-150200.24.129.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-devel-5.3.18-150200.24.129.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-docs-5.3.18-150200.24.129.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-macros-5.3.18-150200.24.129.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-obs-build-5.3.18-150200.24.129.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-obs-build-5.3.18-150200.24.129.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-preempt-5.3.18-150200.24.129.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-preempt-devel-5.3.18-150200.24.129.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-source-5.3.18-150200.24.129.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-syms-5.3.18-150200.24.129.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-syms-5.3.18-150200.24.129.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP2:reiserfs-kmp-default-5.3.18-150200.24.129.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP2:reiserfs-kmp-default-5.3.18-150200.24.129.1.x86_64",
            "SUSE Manager Proxy 4.1:kernel-default-5.3.18-150200.24.129.1.x86_64",
            "SUSE Manager Proxy 4.1:kernel-default-base-5.3.18-150200.24.129.1.150200.9.61.1.x86_64",
            "SUSE Manager Proxy 4.1:kernel-default-devel-5.3.18-150200.24.129.1.x86_64",
            "SUSE Manager Proxy 4.1:kernel-devel-5.3.18-150200.24.129.1.noarch",
            "SUSE Manager Proxy 4.1:kernel-docs-5.3.18-150200.24.129.1.noarch",
            "SUSE Manager Proxy 4.1:kernel-macros-5.3.18-150200.24.129.1.noarch",
            "SUSE Manager Proxy 4.1:kernel-obs-build-5.3.18-150200.24.129.1.x86_64",
            "SUSE Manager Proxy 4.1:kernel-preempt-5.3.18-150200.24.129.1.x86_64",
            "SUSE Manager Proxy 4.1:kernel-preempt-devel-5.3.18-150200.24.129.1.x86_64",
            "SUSE Manager Proxy 4.1:kernel-source-5.3.18-150200.24.129.1.noarch",
            "SUSE Manager Proxy 4.1:kernel-syms-5.3.18-150200.24.129.1.x86_64",
            "SUSE Manager Proxy 4.1:reiserfs-kmp-default-5.3.18-150200.24.129.1.x86_64",
            "SUSE Manager Retail Branch Server 4.1:kernel-default-5.3.18-150200.24.129.1.x86_64",
            "SUSE Manager Retail Branch Server 4.1:kernel-default-base-5.3.18-150200.24.129.1.150200.9.61.1.x86_64",
            "SUSE Manager Retail Branch Server 4.1:kernel-default-devel-5.3.18-150200.24.129.1.x86_64",
            "SUSE Manager Retail Branch Server 4.1:kernel-devel-5.3.18-150200.24.129.1.noarch",
            "SUSE Manager Retail Branch Server 4.1:kernel-docs-5.3.18-150200.24.129.1.noarch",
            "SUSE Manager Retail Branch Server 4.1:kernel-macros-5.3.18-150200.24.129.1.noarch",
            "SUSE Manager Retail Branch Server 4.1:kernel-obs-build-5.3.18-150200.24.129.1.x86_64",
            "SUSE Manager Retail Branch Server 4.1:kernel-preempt-5.3.18-150200.24.129.1.x86_64",
            "SUSE Manager Retail Branch Server 4.1:kernel-preempt-devel-5.3.18-150200.24.129.1.x86_64",
            "SUSE Manager Retail Branch Server 4.1:kernel-source-5.3.18-150200.24.129.1.noarch",
            "SUSE Manager Retail Branch Server 4.1:kernel-syms-5.3.18-150200.24.129.1.x86_64",
            "SUSE Manager Retail Branch Server 4.1:reiserfs-kmp-default-5.3.18-150200.24.129.1.x86_64",
            "SUSE Manager Server 4.1:kernel-default-5.3.18-150200.24.129.1.ppc64le",
            "SUSE Manager Server 4.1:kernel-default-5.3.18-150200.24.129.1.s390x",
            "SUSE Manager Server 4.1:kernel-default-5.3.18-150200.24.129.1.x86_64",
            "SUSE Manager Server 4.1:kernel-default-base-5.3.18-150200.24.129.1.150200.9.61.1.ppc64le",
            "SUSE Manager Server 4.1:kernel-default-base-5.3.18-150200.24.129.1.150200.9.61.1.s390x",
            "SUSE Manager Server 4.1:kernel-default-base-5.3.18-150200.24.129.1.150200.9.61.1.x86_64",
            "SUSE Manager Server 4.1:kernel-default-devel-5.3.18-150200.24.129.1.ppc64le",
            "SUSE Manager Server 4.1:kernel-default-devel-5.3.18-150200.24.129.1.s390x",
            "SUSE Manager Server 4.1:kernel-default-devel-5.3.18-150200.24.129.1.x86_64",
            "SUSE Manager Server 4.1:kernel-devel-5.3.18-150200.24.129.1.noarch",
            "SUSE Manager Server 4.1:kernel-docs-5.3.18-150200.24.129.1.noarch",
            "SUSE Manager Server 4.1:kernel-macros-5.3.18-150200.24.129.1.noarch",
            "SUSE Manager Server 4.1:kernel-obs-build-5.3.18-150200.24.129.1.ppc64le",
            "SUSE Manager Server 4.1:kernel-obs-build-5.3.18-150200.24.129.1.s390x",
            "SUSE Manager Server 4.1:kernel-obs-build-5.3.18-150200.24.129.1.x86_64",
            "SUSE Manager Server 4.1:kernel-preempt-5.3.18-150200.24.129.1.x86_64",
            "SUSE Manager Server 4.1:kernel-preempt-devel-5.3.18-150200.24.129.1.x86_64",
            "SUSE Manager Server 4.1:kernel-source-5.3.18-150200.24.129.1.noarch",
            "SUSE Manager Server 4.1:kernel-syms-5.3.18-150200.24.129.1.ppc64le",
            "SUSE Manager Server 4.1:kernel-syms-5.3.18-150200.24.129.1.s390x",
            "SUSE Manager Server 4.1:kernel-syms-5.3.18-150200.24.129.1.x86_64",
            "SUSE Manager Server 4.1:reiserfs-kmp-default-5.3.18-150200.24.129.1.ppc64le",
            "SUSE Manager Server 4.1:reiserfs-kmp-default-5.3.18-150200.24.129.1.s390x",
            "SUSE Manager Server 4.1:reiserfs-kmp-default-5.3.18-150200.24.129.1.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 5.9,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:N",
            "version": "3.1"
          },
          "products": [
            "SUSE Enterprise Storage 7:kernel-default-5.3.18-150200.24.129.1.aarch64",
            "SUSE Enterprise Storage 7:kernel-default-5.3.18-150200.24.129.1.x86_64",
            "SUSE Enterprise Storage 7:kernel-default-base-5.3.18-150200.24.129.1.150200.9.61.1.aarch64",
            "SUSE Enterprise Storage 7:kernel-default-base-5.3.18-150200.24.129.1.150200.9.61.1.x86_64",
            "SUSE Enterprise Storage 7:kernel-default-devel-5.3.18-150200.24.129.1.aarch64",
            "SUSE Enterprise Storage 7:kernel-default-devel-5.3.18-150200.24.129.1.x86_64",
            "SUSE Enterprise Storage 7:kernel-devel-5.3.18-150200.24.129.1.noarch",
            "SUSE Enterprise Storage 7:kernel-docs-5.3.18-150200.24.129.1.noarch",
            "SUSE Enterprise Storage 7:kernel-macros-5.3.18-150200.24.129.1.noarch",
            "SUSE Enterprise Storage 7:kernel-obs-build-5.3.18-150200.24.129.1.aarch64",
            "SUSE Enterprise Storage 7:kernel-obs-build-5.3.18-150200.24.129.1.x86_64",
            "SUSE Enterprise Storage 7:kernel-preempt-5.3.18-150200.24.129.1.aarch64",
            "SUSE Enterprise Storage 7:kernel-preempt-5.3.18-150200.24.129.1.x86_64",
            "SUSE Enterprise Storage 7:kernel-preempt-devel-5.3.18-150200.24.129.1.aarch64",
            "SUSE Enterprise Storage 7:kernel-preempt-devel-5.3.18-150200.24.129.1.x86_64",
            "SUSE Enterprise Storage 7:kernel-source-5.3.18-150200.24.129.1.noarch",
            "SUSE Enterprise Storage 7:kernel-syms-5.3.18-150200.24.129.1.aarch64",
            "SUSE Enterprise Storage 7:kernel-syms-5.3.18-150200.24.129.1.x86_64",
            "SUSE Enterprise Storage 7:reiserfs-kmp-default-5.3.18-150200.24.129.1.aarch64",
            "SUSE Enterprise Storage 7:reiserfs-kmp-default-5.3.18-150200.24.129.1.x86_64",
            "SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-150200.24.129.1.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-150200.24.129.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-150200.24.129.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-150200.24.129.1.x86_64",
            "SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-150200.24.129.1.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-150200.24.129.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-150200.24.129.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-150200.24.129.1.x86_64",
            "SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-150200.24.129.1.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-150200.24.129.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-150200.24.129.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-150200.24.129.1.x86_64",
            "SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-150200.24.129.1.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-150200.24.129.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-150200.24.129.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-150200.24.129.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-default-5.3.18-150200.24.129.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-default-5.3.18-150200.24.129.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-default-base-5.3.18-150200.24.129.1.150200.9.61.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-default-base-5.3.18-150200.24.129.1.150200.9.61.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-default-devel-5.3.18-150200.24.129.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-default-devel-5.3.18-150200.24.129.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-devel-5.3.18-150200.24.129.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-docs-5.3.18-150200.24.129.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-macros-5.3.18-150200.24.129.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-obs-build-5.3.18-150200.24.129.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-obs-build-5.3.18-150200.24.129.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-preempt-5.3.18-150200.24.129.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-preempt-5.3.18-150200.24.129.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-preempt-devel-5.3.18-150200.24.129.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-preempt-devel-5.3.18-150200.24.129.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-source-5.3.18-150200.24.129.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-syms-5.3.18-150200.24.129.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-syms-5.3.18-150200.24.129.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-5.3.18-150200.24.129.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-5.3.18-150200.24.129.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.129.1.150200.9.61.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.129.1.150200.9.61.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.129.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.129.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-devel-5.3.18-150200.24.129.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-docs-5.3.18-150200.24.129.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-macros-5.3.18-150200.24.129.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.129.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.129.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-preempt-5.3.18-150200.24.129.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-preempt-5.3.18-150200.24.129.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-preempt-devel-5.3.18-150200.24.129.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-preempt-devel-5.3.18-150200.24.129.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-source-5.3.18-150200.24.129.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.129.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.129.1.x86_64",
            "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-5.3.18-150200.24.129.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-5.3.18-150200.24.129.1.s390x",
            "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-5.3.18-150200.24.129.1.x86_64",
            "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-devel-5.3.18-150200.24.129.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-devel-5.3.18-150200.24.129.1.s390x",
            "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-devel-5.3.18-150200.24.129.1.x86_64",
            "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-150200_24_129-default-1-150200.5.3.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-150200_24_129-default-1-150200.5.3.1.s390x",
            "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-150200_24_129-default-1-150200.5.3.1.x86_64",
            "SUSE Linux Enterprise Server 15 SP2-BCL:kernel-default-5.3.18-150200.24.129.1.x86_64",
            "SUSE Linux Enterprise Server 15 SP2-BCL:kernel-default-base-5.3.18-150200.24.129.1.150200.9.61.1.x86_64",
            "SUSE Linux Enterprise Server 15 SP2-BCL:kernel-default-devel-5.3.18-150200.24.129.1.x86_64",
            "SUSE Linux Enterprise Server 15 SP2-BCL:kernel-devel-5.3.18-150200.24.129.1.noarch",
            "SUSE Linux Enterprise Server 15 SP2-BCL:kernel-docs-5.3.18-150200.24.129.1.noarch",
            "SUSE Linux Enterprise Server 15 SP2-BCL:kernel-macros-5.3.18-150200.24.129.1.noarch",
            "SUSE Linux Enterprise Server 15 SP2-BCL:kernel-obs-build-5.3.18-150200.24.129.1.x86_64",
            "SUSE Linux Enterprise Server 15 SP2-BCL:kernel-preempt-5.3.18-150200.24.129.1.x86_64",
            "SUSE Linux Enterprise Server 15 SP2-BCL:kernel-preempt-devel-5.3.18-150200.24.129.1.x86_64",
            "SUSE Linux Enterprise Server 15 SP2-BCL:kernel-source-5.3.18-150200.24.129.1.noarch",
            "SUSE Linux Enterprise Server 15 SP2-BCL:kernel-syms-5.3.18-150200.24.129.1.x86_64",
            "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-5.3.18-150200.24.129.1.aarch64",
            "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-5.3.18-150200.24.129.1.ppc64le",
            "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-5.3.18-150200.24.129.1.s390x",
            "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-5.3.18-150200.24.129.1.x86_64",
            "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.129.1.150200.9.61.1.aarch64",
            "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.129.1.150200.9.61.1.ppc64le",
            "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.129.1.150200.9.61.1.s390x",
            "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.129.1.150200.9.61.1.x86_64",
            "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.129.1.aarch64",
            "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.129.1.ppc64le",
            "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.129.1.s390x",
            "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.129.1.x86_64",
            "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-devel-5.3.18-150200.24.129.1.noarch",
            "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-docs-5.3.18-150200.24.129.1.noarch",
            "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-macros-5.3.18-150200.24.129.1.noarch",
            "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.129.1.aarch64",
            "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.129.1.ppc64le",
            "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.129.1.s390x",
            "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.129.1.x86_64",
            "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-preempt-5.3.18-150200.24.129.1.aarch64",
            "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-preempt-5.3.18-150200.24.129.1.x86_64",
            "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-preempt-devel-5.3.18-150200.24.129.1.aarch64",
            "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-preempt-devel-5.3.18-150200.24.129.1.x86_64",
            "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-source-5.3.18-150200.24.129.1.noarch",
            "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.129.1.aarch64",
            "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.129.1.ppc64le",
            "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.129.1.s390x",
            "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.129.1.x86_64",
            "SUSE Linux Enterprise Server 15 SP2-LTSS:reiserfs-kmp-default-5.3.18-150200.24.129.1.aarch64",
            "SUSE Linux Enterprise Server 15 SP2-LTSS:reiserfs-kmp-default-5.3.18-150200.24.129.1.ppc64le",
            "SUSE Linux Enterprise Server 15 SP2-LTSS:reiserfs-kmp-default-5.3.18-150200.24.129.1.s390x",
            "SUSE Linux Enterprise Server 15 SP2-LTSS:reiserfs-kmp-default-5.3.18-150200.24.129.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-5.3.18-150200.24.129.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-5.3.18-150200.24.129.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-base-5.3.18-150200.24.129.1.150200.9.61.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-base-5.3.18-150200.24.129.1.150200.9.61.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-devel-5.3.18-150200.24.129.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-devel-5.3.18-150200.24.129.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-devel-5.3.18-150200.24.129.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-docs-5.3.18-150200.24.129.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-macros-5.3.18-150200.24.129.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-obs-build-5.3.18-150200.24.129.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-obs-build-5.3.18-150200.24.129.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-preempt-5.3.18-150200.24.129.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-preempt-devel-5.3.18-150200.24.129.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-source-5.3.18-150200.24.129.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-syms-5.3.18-150200.24.129.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-syms-5.3.18-150200.24.129.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP2:reiserfs-kmp-default-5.3.18-150200.24.129.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP2:reiserfs-kmp-default-5.3.18-150200.24.129.1.x86_64",
            "SUSE Manager Proxy 4.1:kernel-default-5.3.18-150200.24.129.1.x86_64",
            "SUSE Manager Proxy 4.1:kernel-default-base-5.3.18-150200.24.129.1.150200.9.61.1.x86_64",
            "SUSE Manager Proxy 4.1:kernel-default-devel-5.3.18-150200.24.129.1.x86_64",
            "SUSE Manager Proxy 4.1:kernel-devel-5.3.18-150200.24.129.1.noarch",
            "SUSE Manager Proxy 4.1:kernel-docs-5.3.18-150200.24.129.1.noarch",
            "SUSE Manager Proxy 4.1:kernel-macros-5.3.18-150200.24.129.1.noarch",
            "SUSE Manager Proxy 4.1:kernel-obs-build-5.3.18-150200.24.129.1.x86_64",
            "SUSE Manager Proxy 4.1:kernel-preempt-5.3.18-150200.24.129.1.x86_64",
            "SUSE Manager Proxy 4.1:kernel-preempt-devel-5.3.18-150200.24.129.1.x86_64",
            "SUSE Manager Proxy 4.1:kernel-source-5.3.18-150200.24.129.1.noarch",
            "SUSE Manager Proxy 4.1:kernel-syms-5.3.18-150200.24.129.1.x86_64",
            "SUSE Manager Proxy 4.1:reiserfs-kmp-default-5.3.18-150200.24.129.1.x86_64",
            "SUSE Manager Retail Branch Server 4.1:kernel-default-5.3.18-150200.24.129.1.x86_64",
            "SUSE Manager Retail Branch Server 4.1:kernel-default-base-5.3.18-150200.24.129.1.150200.9.61.1.x86_64",
            "SUSE Manager Retail Branch Server 4.1:kernel-default-devel-5.3.18-150200.24.129.1.x86_64",
            "SUSE Manager Retail Branch Server 4.1:kernel-devel-5.3.18-150200.24.129.1.noarch",
            "SUSE Manager Retail Branch Server 4.1:kernel-docs-5.3.18-150200.24.129.1.noarch",
            "SUSE Manager Retail Branch Server 4.1:kernel-macros-5.3.18-150200.24.129.1.noarch",
            "SUSE Manager Retail Branch Server 4.1:kernel-obs-build-5.3.18-150200.24.129.1.x86_64",
            "SUSE Manager Retail Branch Server 4.1:kernel-preempt-5.3.18-150200.24.129.1.x86_64",
            "SUSE Manager Retail Branch Server 4.1:kernel-preempt-devel-5.3.18-150200.24.129.1.x86_64",
            "SUSE Manager Retail Branch Server 4.1:kernel-source-5.3.18-150200.24.129.1.noarch",
            "SUSE Manager Retail Branch Server 4.1:kernel-syms-5.3.18-150200.24.129.1.x86_64",
            "SUSE Manager Retail Branch Server 4.1:reiserfs-kmp-default-5.3.18-150200.24.129.1.x86_64",
            "SUSE Manager Server 4.1:kernel-default-5.3.18-150200.24.129.1.ppc64le",
            "SUSE Manager Server 4.1:kernel-default-5.3.18-150200.24.129.1.s390x",
            "SUSE Manager Server 4.1:kernel-default-5.3.18-150200.24.129.1.x86_64",
            "SUSE Manager Server 4.1:kernel-default-base-5.3.18-150200.24.129.1.150200.9.61.1.ppc64le",
            "SUSE Manager Server 4.1:kernel-default-base-5.3.18-150200.24.129.1.150200.9.61.1.s390x",
            "SUSE Manager Server 4.1:kernel-default-base-5.3.18-150200.24.129.1.150200.9.61.1.x86_64",
            "SUSE Manager Server 4.1:kernel-default-devel-5.3.18-150200.24.129.1.ppc64le",
            "SUSE Manager Server 4.1:kernel-default-devel-5.3.18-150200.24.129.1.s390x",
            "SUSE Manager Server 4.1:kernel-default-devel-5.3.18-150200.24.129.1.x86_64",
            "SUSE Manager Server 4.1:kernel-devel-5.3.18-150200.24.129.1.noarch",
            "SUSE Manager Server 4.1:kernel-docs-5.3.18-150200.24.129.1.noarch",
            "SUSE Manager Server 4.1:kernel-macros-5.3.18-150200.24.129.1.noarch",
            "SUSE Manager Server 4.1:kernel-obs-build-5.3.18-150200.24.129.1.ppc64le",
            "SUSE Manager Server 4.1:kernel-obs-build-5.3.18-150200.24.129.1.s390x",
            "SUSE Manager Server 4.1:kernel-obs-build-5.3.18-150200.24.129.1.x86_64",
            "SUSE Manager Server 4.1:kernel-preempt-5.3.18-150200.24.129.1.x86_64",
            "SUSE Manager Server 4.1:kernel-preempt-devel-5.3.18-150200.24.129.1.x86_64",
            "SUSE Manager Server 4.1:kernel-source-5.3.18-150200.24.129.1.noarch",
            "SUSE Manager Server 4.1:kernel-syms-5.3.18-150200.24.129.1.ppc64le",
            "SUSE Manager Server 4.1:kernel-syms-5.3.18-150200.24.129.1.s390x",
            "SUSE Manager Server 4.1:kernel-syms-5.3.18-150200.24.129.1.x86_64",
            "SUSE Manager Server 4.1:reiserfs-kmp-default-5.3.18-150200.24.129.1.ppc64le",
            "SUSE Manager Server 4.1:reiserfs-kmp-default-5.3.18-150200.24.129.1.s390x",
            "SUSE Manager Server 4.1:reiserfs-kmp-default-5.3.18-150200.24.129.1.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2022-09-28T06:48:59Z",
          "details": "moderate"
        }
      ],
      "title": "CVE-2022-2663"
    },
    {
      "cve": "CVE-2022-2905",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2022-2905"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "An out-of-bounds memory read flaw was found in the Linux kernel\u0027s BPF subsystem in how a user calls the bpf_tail_call function with a key larger than the max_entries of the map. This flaw allows a local user to gain unauthorized access to data.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "SUSE Enterprise Storage 7:kernel-default-5.3.18-150200.24.129.1.aarch64",
          "SUSE Enterprise Storage 7:kernel-default-5.3.18-150200.24.129.1.x86_64",
          "SUSE Enterprise Storage 7:kernel-default-base-5.3.18-150200.24.129.1.150200.9.61.1.aarch64",
          "SUSE Enterprise Storage 7:kernel-default-base-5.3.18-150200.24.129.1.150200.9.61.1.x86_64",
          "SUSE Enterprise Storage 7:kernel-default-devel-5.3.18-150200.24.129.1.aarch64",
          "SUSE Enterprise Storage 7:kernel-default-devel-5.3.18-150200.24.129.1.x86_64",
          "SUSE Enterprise Storage 7:kernel-devel-5.3.18-150200.24.129.1.noarch",
          "SUSE Enterprise Storage 7:kernel-docs-5.3.18-150200.24.129.1.noarch",
          "SUSE Enterprise Storage 7:kernel-macros-5.3.18-150200.24.129.1.noarch",
          "SUSE Enterprise Storage 7:kernel-obs-build-5.3.18-150200.24.129.1.aarch64",
          "SUSE Enterprise Storage 7:kernel-obs-build-5.3.18-150200.24.129.1.x86_64",
          "SUSE Enterprise Storage 7:kernel-preempt-5.3.18-150200.24.129.1.aarch64",
          "SUSE Enterprise Storage 7:kernel-preempt-5.3.18-150200.24.129.1.x86_64",
          "SUSE Enterprise Storage 7:kernel-preempt-devel-5.3.18-150200.24.129.1.aarch64",
          "SUSE Enterprise Storage 7:kernel-preempt-devel-5.3.18-150200.24.129.1.x86_64",
          "SUSE Enterprise Storage 7:kernel-source-5.3.18-150200.24.129.1.noarch",
          "SUSE Enterprise Storage 7:kernel-syms-5.3.18-150200.24.129.1.aarch64",
          "SUSE Enterprise Storage 7:kernel-syms-5.3.18-150200.24.129.1.x86_64",
          "SUSE Enterprise Storage 7:reiserfs-kmp-default-5.3.18-150200.24.129.1.aarch64",
          "SUSE Enterprise Storage 7:reiserfs-kmp-default-5.3.18-150200.24.129.1.x86_64",
          "SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-150200.24.129.1.aarch64",
          "SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-150200.24.129.1.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-150200.24.129.1.s390x",
          "SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-150200.24.129.1.x86_64",
          "SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-150200.24.129.1.aarch64",
          "SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-150200.24.129.1.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-150200.24.129.1.s390x",
          "SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-150200.24.129.1.x86_64",
          "SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-150200.24.129.1.aarch64",
          "SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-150200.24.129.1.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-150200.24.129.1.s390x",
          "SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-150200.24.129.1.x86_64",
          "SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-150200.24.129.1.aarch64",
          "SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-150200.24.129.1.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-150200.24.129.1.s390x",
          "SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-150200.24.129.1.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-default-5.3.18-150200.24.129.1.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-default-5.3.18-150200.24.129.1.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-default-base-5.3.18-150200.24.129.1.150200.9.61.1.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-default-base-5.3.18-150200.24.129.1.150200.9.61.1.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-default-devel-5.3.18-150200.24.129.1.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-default-devel-5.3.18-150200.24.129.1.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-devel-5.3.18-150200.24.129.1.noarch",
          "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-docs-5.3.18-150200.24.129.1.noarch",
          "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-macros-5.3.18-150200.24.129.1.noarch",
          "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-obs-build-5.3.18-150200.24.129.1.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-obs-build-5.3.18-150200.24.129.1.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-preempt-5.3.18-150200.24.129.1.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-preempt-5.3.18-150200.24.129.1.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-preempt-devel-5.3.18-150200.24.129.1.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-preempt-devel-5.3.18-150200.24.129.1.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-source-5.3.18-150200.24.129.1.noarch",
          "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-syms-5.3.18-150200.24.129.1.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-syms-5.3.18-150200.24.129.1.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-5.3.18-150200.24.129.1.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-5.3.18-150200.24.129.1.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.129.1.150200.9.61.1.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.129.1.150200.9.61.1.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.129.1.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.129.1.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-devel-5.3.18-150200.24.129.1.noarch",
          "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-docs-5.3.18-150200.24.129.1.noarch",
          "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-macros-5.3.18-150200.24.129.1.noarch",
          "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.129.1.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.129.1.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-preempt-5.3.18-150200.24.129.1.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-preempt-5.3.18-150200.24.129.1.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-preempt-devel-5.3.18-150200.24.129.1.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-preempt-devel-5.3.18-150200.24.129.1.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-source-5.3.18-150200.24.129.1.noarch",
          "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.129.1.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.129.1.x86_64",
          "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-5.3.18-150200.24.129.1.ppc64le",
          "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-5.3.18-150200.24.129.1.s390x",
          "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-5.3.18-150200.24.129.1.x86_64",
          "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-devel-5.3.18-150200.24.129.1.ppc64le",
          "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-devel-5.3.18-150200.24.129.1.s390x",
          "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-devel-5.3.18-150200.24.129.1.x86_64",
          "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-150200_24_129-default-1-150200.5.3.1.ppc64le",
          "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-150200_24_129-default-1-150200.5.3.1.s390x",
          "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-150200_24_129-default-1-150200.5.3.1.x86_64",
          "SUSE Linux Enterprise Server 15 SP2-BCL:kernel-default-5.3.18-150200.24.129.1.x86_64",
          "SUSE Linux Enterprise Server 15 SP2-BCL:kernel-default-base-5.3.18-150200.24.129.1.150200.9.61.1.x86_64",
          "SUSE Linux Enterprise Server 15 SP2-BCL:kernel-default-devel-5.3.18-150200.24.129.1.x86_64",
          "SUSE Linux Enterprise Server 15 SP2-BCL:kernel-devel-5.3.18-150200.24.129.1.noarch",
          "SUSE Linux Enterprise Server 15 SP2-BCL:kernel-docs-5.3.18-150200.24.129.1.noarch",
          "SUSE Linux Enterprise Server 15 SP2-BCL:kernel-macros-5.3.18-150200.24.129.1.noarch",
          "SUSE Linux Enterprise Server 15 SP2-BCL:kernel-obs-build-5.3.18-150200.24.129.1.x86_64",
          "SUSE Linux Enterprise Server 15 SP2-BCL:kernel-preempt-5.3.18-150200.24.129.1.x86_64",
          "SUSE Linux Enterprise Server 15 SP2-BCL:kernel-preempt-devel-5.3.18-150200.24.129.1.x86_64",
          "SUSE Linux Enterprise Server 15 SP2-BCL:kernel-source-5.3.18-150200.24.129.1.noarch",
          "SUSE Linux Enterprise Server 15 SP2-BCL:kernel-syms-5.3.18-150200.24.129.1.x86_64",
          "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-5.3.18-150200.24.129.1.aarch64",
          "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-5.3.18-150200.24.129.1.ppc64le",
          "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-5.3.18-150200.24.129.1.s390x",
          "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-5.3.18-150200.24.129.1.x86_64",
          "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.129.1.150200.9.61.1.aarch64",
          "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.129.1.150200.9.61.1.ppc64le",
          "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.129.1.150200.9.61.1.s390x",
          "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.129.1.150200.9.61.1.x86_64",
          "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.129.1.aarch64",
          "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.129.1.ppc64le",
          "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.129.1.s390x",
          "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.129.1.x86_64",
          "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-devel-5.3.18-150200.24.129.1.noarch",
          "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-docs-5.3.18-150200.24.129.1.noarch",
          "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-macros-5.3.18-150200.24.129.1.noarch",
          "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.129.1.aarch64",
          "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.129.1.ppc64le",
          "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.129.1.s390x",
          "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.129.1.x86_64",
          "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-preempt-5.3.18-150200.24.129.1.aarch64",
          "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-preempt-5.3.18-150200.24.129.1.x86_64",
          "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-preempt-devel-5.3.18-150200.24.129.1.aarch64",
          "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-preempt-devel-5.3.18-150200.24.129.1.x86_64",
          "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-source-5.3.18-150200.24.129.1.noarch",
          "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.129.1.aarch64",
          "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.129.1.ppc64le",
          "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.129.1.s390x",
          "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.129.1.x86_64",
          "SUSE Linux Enterprise Server 15 SP2-LTSS:reiserfs-kmp-default-5.3.18-150200.24.129.1.aarch64",
          "SUSE Linux Enterprise Server 15 SP2-LTSS:reiserfs-kmp-default-5.3.18-150200.24.129.1.ppc64le",
          "SUSE Linux Enterprise Server 15 SP2-LTSS:reiserfs-kmp-default-5.3.18-150200.24.129.1.s390x",
          "SUSE Linux Enterprise Server 15 SP2-LTSS:reiserfs-kmp-default-5.3.18-150200.24.129.1.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-5.3.18-150200.24.129.1.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-5.3.18-150200.24.129.1.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-base-5.3.18-150200.24.129.1.150200.9.61.1.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-base-5.3.18-150200.24.129.1.150200.9.61.1.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-devel-5.3.18-150200.24.129.1.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-devel-5.3.18-150200.24.129.1.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-devel-5.3.18-150200.24.129.1.noarch",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-docs-5.3.18-150200.24.129.1.noarch",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-macros-5.3.18-150200.24.129.1.noarch",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-obs-build-5.3.18-150200.24.129.1.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-obs-build-5.3.18-150200.24.129.1.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-preempt-5.3.18-150200.24.129.1.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-preempt-devel-5.3.18-150200.24.129.1.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-source-5.3.18-150200.24.129.1.noarch",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-syms-5.3.18-150200.24.129.1.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-syms-5.3.18-150200.24.129.1.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP2:reiserfs-kmp-default-5.3.18-150200.24.129.1.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP2:reiserfs-kmp-default-5.3.18-150200.24.129.1.x86_64",
          "SUSE Manager Proxy 4.1:kernel-default-5.3.18-150200.24.129.1.x86_64",
          "SUSE Manager Proxy 4.1:kernel-default-base-5.3.18-150200.24.129.1.150200.9.61.1.x86_64",
          "SUSE Manager Proxy 4.1:kernel-default-devel-5.3.18-150200.24.129.1.x86_64",
          "SUSE Manager Proxy 4.1:kernel-devel-5.3.18-150200.24.129.1.noarch",
          "SUSE Manager Proxy 4.1:kernel-docs-5.3.18-150200.24.129.1.noarch",
          "SUSE Manager Proxy 4.1:kernel-macros-5.3.18-150200.24.129.1.noarch",
          "SUSE Manager Proxy 4.1:kernel-obs-build-5.3.18-150200.24.129.1.x86_64",
          "SUSE Manager Proxy 4.1:kernel-preempt-5.3.18-150200.24.129.1.x86_64",
          "SUSE Manager Proxy 4.1:kernel-preempt-devel-5.3.18-150200.24.129.1.x86_64",
          "SUSE Manager Proxy 4.1:kernel-source-5.3.18-150200.24.129.1.noarch",
          "SUSE Manager Proxy 4.1:kernel-syms-5.3.18-150200.24.129.1.x86_64",
          "SUSE Manager Proxy 4.1:reiserfs-kmp-default-5.3.18-150200.24.129.1.x86_64",
          "SUSE Manager Retail Branch Server 4.1:kernel-default-5.3.18-150200.24.129.1.x86_64",
          "SUSE Manager Retail Branch Server 4.1:kernel-default-base-5.3.18-150200.24.129.1.150200.9.61.1.x86_64",
          "SUSE Manager Retail Branch Server 4.1:kernel-default-devel-5.3.18-150200.24.129.1.x86_64",
          "SUSE Manager Retail Branch Server 4.1:kernel-devel-5.3.18-150200.24.129.1.noarch",
          "SUSE Manager Retail Branch Server 4.1:kernel-docs-5.3.18-150200.24.129.1.noarch",
          "SUSE Manager Retail Branch Server 4.1:kernel-macros-5.3.18-150200.24.129.1.noarch",
          "SUSE Manager Retail Branch Server 4.1:kernel-obs-build-5.3.18-150200.24.129.1.x86_64",
          "SUSE Manager Retail Branch Server 4.1:kernel-preempt-5.3.18-150200.24.129.1.x86_64",
          "SUSE Manager Retail Branch Server 4.1:kernel-preempt-devel-5.3.18-150200.24.129.1.x86_64",
          "SUSE Manager Retail Branch Server 4.1:kernel-source-5.3.18-150200.24.129.1.noarch",
          "SUSE Manager Retail Branch Server 4.1:kernel-syms-5.3.18-150200.24.129.1.x86_64",
          "SUSE Manager Retail Branch Server 4.1:reiserfs-kmp-default-5.3.18-150200.24.129.1.x86_64",
          "SUSE Manager Server 4.1:kernel-default-5.3.18-150200.24.129.1.ppc64le",
          "SUSE Manager Server 4.1:kernel-default-5.3.18-150200.24.129.1.s390x",
          "SUSE Manager Server 4.1:kernel-default-5.3.18-150200.24.129.1.x86_64",
          "SUSE Manager Server 4.1:kernel-default-base-5.3.18-150200.24.129.1.150200.9.61.1.ppc64le",
          "SUSE Manager Server 4.1:kernel-default-base-5.3.18-150200.24.129.1.150200.9.61.1.s390x",
          "SUSE Manager Server 4.1:kernel-default-base-5.3.18-150200.24.129.1.150200.9.61.1.x86_64",
          "SUSE Manager Server 4.1:kernel-default-devel-5.3.18-150200.24.129.1.ppc64le",
          "SUSE Manager Server 4.1:kernel-default-devel-5.3.18-150200.24.129.1.s390x",
          "SUSE Manager Server 4.1:kernel-default-devel-5.3.18-150200.24.129.1.x86_64",
          "SUSE Manager Server 4.1:kernel-devel-5.3.18-150200.24.129.1.noarch",
          "SUSE Manager Server 4.1:kernel-docs-5.3.18-150200.24.129.1.noarch",
          "SUSE Manager Server 4.1:kernel-macros-5.3.18-150200.24.129.1.noarch",
          "SUSE Manager Server 4.1:kernel-obs-build-5.3.18-150200.24.129.1.ppc64le",
          "SUSE Manager Server 4.1:kernel-obs-build-5.3.18-150200.24.129.1.s390x",
          "SUSE Manager Server 4.1:kernel-obs-build-5.3.18-150200.24.129.1.x86_64",
          "SUSE Manager Server 4.1:kernel-preempt-5.3.18-150200.24.129.1.x86_64",
          "SUSE Manager Server 4.1:kernel-preempt-devel-5.3.18-150200.24.129.1.x86_64",
          "SUSE Manager Server 4.1:kernel-source-5.3.18-150200.24.129.1.noarch",
          "SUSE Manager Server 4.1:kernel-syms-5.3.18-150200.24.129.1.ppc64le",
          "SUSE Manager Server 4.1:kernel-syms-5.3.18-150200.24.129.1.s390x",
          "SUSE Manager Server 4.1:kernel-syms-5.3.18-150200.24.129.1.x86_64",
          "SUSE Manager Server 4.1:reiserfs-kmp-default-5.3.18-150200.24.129.1.ppc64le",
          "SUSE Manager Server 4.1:reiserfs-kmp-default-5.3.18-150200.24.129.1.s390x",
          "SUSE Manager Server 4.1:reiserfs-kmp-default-5.3.18-150200.24.129.1.x86_64"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2022-2905",
          "url": "https://www.suse.com/security/cve/CVE-2022-2905"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1202860 for CVE-2022-2905",
          "url": "https://bugzilla.suse.com/1202860"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "SUSE Enterprise Storage 7:kernel-default-5.3.18-150200.24.129.1.aarch64",
            "SUSE Enterprise Storage 7:kernel-default-5.3.18-150200.24.129.1.x86_64",
            "SUSE Enterprise Storage 7:kernel-default-base-5.3.18-150200.24.129.1.150200.9.61.1.aarch64",
            "SUSE Enterprise Storage 7:kernel-default-base-5.3.18-150200.24.129.1.150200.9.61.1.x86_64",
            "SUSE Enterprise Storage 7:kernel-default-devel-5.3.18-150200.24.129.1.aarch64",
            "SUSE Enterprise Storage 7:kernel-default-devel-5.3.18-150200.24.129.1.x86_64",
            "SUSE Enterprise Storage 7:kernel-devel-5.3.18-150200.24.129.1.noarch",
            "SUSE Enterprise Storage 7:kernel-docs-5.3.18-150200.24.129.1.noarch",
            "SUSE Enterprise Storage 7:kernel-macros-5.3.18-150200.24.129.1.noarch",
            "SUSE Enterprise Storage 7:kernel-obs-build-5.3.18-150200.24.129.1.aarch64",
            "SUSE Enterprise Storage 7:kernel-obs-build-5.3.18-150200.24.129.1.x86_64",
            "SUSE Enterprise Storage 7:kernel-preempt-5.3.18-150200.24.129.1.aarch64",
            "SUSE Enterprise Storage 7:kernel-preempt-5.3.18-150200.24.129.1.x86_64",
            "SUSE Enterprise Storage 7:kernel-preempt-devel-5.3.18-150200.24.129.1.aarch64",
            "SUSE Enterprise Storage 7:kernel-preempt-devel-5.3.18-150200.24.129.1.x86_64",
            "SUSE Enterprise Storage 7:kernel-source-5.3.18-150200.24.129.1.noarch",
            "SUSE Enterprise Storage 7:kernel-syms-5.3.18-150200.24.129.1.aarch64",
            "SUSE Enterprise Storage 7:kernel-syms-5.3.18-150200.24.129.1.x86_64",
            "SUSE Enterprise Storage 7:reiserfs-kmp-default-5.3.18-150200.24.129.1.aarch64",
            "SUSE Enterprise Storage 7:reiserfs-kmp-default-5.3.18-150200.24.129.1.x86_64",
            "SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-150200.24.129.1.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-150200.24.129.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-150200.24.129.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-150200.24.129.1.x86_64",
            "SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-150200.24.129.1.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-150200.24.129.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-150200.24.129.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-150200.24.129.1.x86_64",
            "SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-150200.24.129.1.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-150200.24.129.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-150200.24.129.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-150200.24.129.1.x86_64",
            "SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-150200.24.129.1.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-150200.24.129.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-150200.24.129.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-150200.24.129.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-default-5.3.18-150200.24.129.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-default-5.3.18-150200.24.129.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-default-base-5.3.18-150200.24.129.1.150200.9.61.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-default-base-5.3.18-150200.24.129.1.150200.9.61.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-default-devel-5.3.18-150200.24.129.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-default-devel-5.3.18-150200.24.129.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-devel-5.3.18-150200.24.129.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-docs-5.3.18-150200.24.129.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-macros-5.3.18-150200.24.129.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-obs-build-5.3.18-150200.24.129.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-obs-build-5.3.18-150200.24.129.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-preempt-5.3.18-150200.24.129.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-preempt-5.3.18-150200.24.129.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-preempt-devel-5.3.18-150200.24.129.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-preempt-devel-5.3.18-150200.24.129.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-source-5.3.18-150200.24.129.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-syms-5.3.18-150200.24.129.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-syms-5.3.18-150200.24.129.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-5.3.18-150200.24.129.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-5.3.18-150200.24.129.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.129.1.150200.9.61.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.129.1.150200.9.61.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.129.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.129.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-devel-5.3.18-150200.24.129.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-docs-5.3.18-150200.24.129.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-macros-5.3.18-150200.24.129.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.129.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.129.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-preempt-5.3.18-150200.24.129.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-preempt-5.3.18-150200.24.129.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-preempt-devel-5.3.18-150200.24.129.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-preempt-devel-5.3.18-150200.24.129.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-source-5.3.18-150200.24.129.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.129.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.129.1.x86_64",
            "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-5.3.18-150200.24.129.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-5.3.18-150200.24.129.1.s390x",
            "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-5.3.18-150200.24.129.1.x86_64",
            "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-devel-5.3.18-150200.24.129.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-devel-5.3.18-150200.24.129.1.s390x",
            "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-devel-5.3.18-150200.24.129.1.x86_64",
            "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-150200_24_129-default-1-150200.5.3.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-150200_24_129-default-1-150200.5.3.1.s390x",
            "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-150200_24_129-default-1-150200.5.3.1.x86_64",
            "SUSE Linux Enterprise Server 15 SP2-BCL:kernel-default-5.3.18-150200.24.129.1.x86_64",
            "SUSE Linux Enterprise Server 15 SP2-BCL:kernel-default-base-5.3.18-150200.24.129.1.150200.9.61.1.x86_64",
            "SUSE Linux Enterprise Server 15 SP2-BCL:kernel-default-devel-5.3.18-150200.24.129.1.x86_64",
            "SUSE Linux Enterprise Server 15 SP2-BCL:kernel-devel-5.3.18-150200.24.129.1.noarch",
            "SUSE Linux Enterprise Server 15 SP2-BCL:kernel-docs-5.3.18-150200.24.129.1.noarch",
            "SUSE Linux Enterprise Server 15 SP2-BCL:kernel-macros-5.3.18-150200.24.129.1.noarch",
            "SUSE Linux Enterprise Server 15 SP2-BCL:kernel-obs-build-5.3.18-150200.24.129.1.x86_64",
            "SUSE Linux Enterprise Server 15 SP2-BCL:kernel-preempt-5.3.18-150200.24.129.1.x86_64",
            "SUSE Linux Enterprise Server 15 SP2-BCL:kernel-preempt-devel-5.3.18-150200.24.129.1.x86_64",
            "SUSE Linux Enterprise Server 15 SP2-BCL:kernel-source-5.3.18-150200.24.129.1.noarch",
            "SUSE Linux Enterprise Server 15 SP2-BCL:kernel-syms-5.3.18-150200.24.129.1.x86_64",
            "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-5.3.18-150200.24.129.1.aarch64",
            "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-5.3.18-150200.24.129.1.ppc64le",
            "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-5.3.18-150200.24.129.1.s390x",
            "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-5.3.18-150200.24.129.1.x86_64",
            "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.129.1.150200.9.61.1.aarch64",
            "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.129.1.150200.9.61.1.ppc64le",
            "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.129.1.150200.9.61.1.s390x",
            "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.129.1.150200.9.61.1.x86_64",
            "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.129.1.aarch64",
            "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.129.1.ppc64le",
            "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.129.1.s390x",
            "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.129.1.x86_64",
            "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-devel-5.3.18-150200.24.129.1.noarch",
            "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-docs-5.3.18-150200.24.129.1.noarch",
            "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-macros-5.3.18-150200.24.129.1.noarch",
            "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.129.1.aarch64",
            "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.129.1.ppc64le",
            "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.129.1.s390x",
            "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.129.1.x86_64",
            "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-preempt-5.3.18-150200.24.129.1.aarch64",
            "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-preempt-5.3.18-150200.24.129.1.x86_64",
            "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-preempt-devel-5.3.18-150200.24.129.1.aarch64",
            "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-preempt-devel-5.3.18-150200.24.129.1.x86_64",
            "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-source-5.3.18-150200.24.129.1.noarch",
            "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.129.1.aarch64",
            "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.129.1.ppc64le",
            "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.129.1.s390x",
            "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.129.1.x86_64",
            "SUSE Linux Enterprise Server 15 SP2-LTSS:reiserfs-kmp-default-5.3.18-150200.24.129.1.aarch64",
            "SUSE Linux Enterprise Server 15 SP2-LTSS:reiserfs-kmp-default-5.3.18-150200.24.129.1.ppc64le",
            "SUSE Linux Enterprise Server 15 SP2-LTSS:reiserfs-kmp-default-5.3.18-150200.24.129.1.s390x",
            "SUSE Linux Enterprise Server 15 SP2-LTSS:reiserfs-kmp-default-5.3.18-150200.24.129.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-5.3.18-150200.24.129.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-5.3.18-150200.24.129.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-base-5.3.18-150200.24.129.1.150200.9.61.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-base-5.3.18-150200.24.129.1.150200.9.61.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-devel-5.3.18-150200.24.129.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-devel-5.3.18-150200.24.129.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-devel-5.3.18-150200.24.129.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-docs-5.3.18-150200.24.129.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-macros-5.3.18-150200.24.129.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-obs-build-5.3.18-150200.24.129.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-obs-build-5.3.18-150200.24.129.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-preempt-5.3.18-150200.24.129.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-preempt-devel-5.3.18-150200.24.129.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-source-5.3.18-150200.24.129.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-syms-5.3.18-150200.24.129.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-syms-5.3.18-150200.24.129.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP2:reiserfs-kmp-default-5.3.18-150200.24.129.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP2:reiserfs-kmp-default-5.3.18-150200.24.129.1.x86_64",
            "SUSE Manager Proxy 4.1:kernel-default-5.3.18-150200.24.129.1.x86_64",
            "SUSE Manager Proxy 4.1:kernel-default-base-5.3.18-150200.24.129.1.150200.9.61.1.x86_64",
            "SUSE Manager Proxy 4.1:kernel-default-devel-5.3.18-150200.24.129.1.x86_64",
            "SUSE Manager Proxy 4.1:kernel-devel-5.3.18-150200.24.129.1.noarch",
            "SUSE Manager Proxy 4.1:kernel-docs-5.3.18-150200.24.129.1.noarch",
            "SUSE Manager Proxy 4.1:kernel-macros-5.3.18-150200.24.129.1.noarch",
            "SUSE Manager Proxy 4.1:kernel-obs-build-5.3.18-150200.24.129.1.x86_64",
            "SUSE Manager Proxy 4.1:kernel-preempt-5.3.18-150200.24.129.1.x86_64",
            "SUSE Manager Proxy 4.1:kernel-preempt-devel-5.3.18-150200.24.129.1.x86_64",
            "SUSE Manager Proxy 4.1:kernel-source-5.3.18-150200.24.129.1.noarch",
            "SUSE Manager Proxy 4.1:kernel-syms-5.3.18-150200.24.129.1.x86_64",
            "SUSE Manager Proxy 4.1:reiserfs-kmp-default-5.3.18-150200.24.129.1.x86_64",
            "SUSE Manager Retail Branch Server 4.1:kernel-default-5.3.18-150200.24.129.1.x86_64",
            "SUSE Manager Retail Branch Server 4.1:kernel-default-base-5.3.18-150200.24.129.1.150200.9.61.1.x86_64",
            "SUSE Manager Retail Branch Server 4.1:kernel-default-devel-5.3.18-150200.24.129.1.x86_64",
            "SUSE Manager Retail Branch Server 4.1:kernel-devel-5.3.18-150200.24.129.1.noarch",
            "SUSE Manager Retail Branch Server 4.1:kernel-docs-5.3.18-150200.24.129.1.noarch",
            "SUSE Manager Retail Branch Server 4.1:kernel-macros-5.3.18-150200.24.129.1.noarch",
            "SUSE Manager Retail Branch Server 4.1:kernel-obs-build-5.3.18-150200.24.129.1.x86_64",
            "SUSE Manager Retail Branch Server 4.1:kernel-preempt-5.3.18-150200.24.129.1.x86_64",
            "SUSE Manager Retail Branch Server 4.1:kernel-preempt-devel-5.3.18-150200.24.129.1.x86_64",
            "SUSE Manager Retail Branch Server 4.1:kernel-source-5.3.18-150200.24.129.1.noarch",
            "SUSE Manager Retail Branch Server 4.1:kernel-syms-5.3.18-150200.24.129.1.x86_64",
            "SUSE Manager Retail Branch Server 4.1:reiserfs-kmp-default-5.3.18-150200.24.129.1.x86_64",
            "SUSE Manager Server 4.1:kernel-default-5.3.18-150200.24.129.1.ppc64le",
            "SUSE Manager Server 4.1:kernel-default-5.3.18-150200.24.129.1.s390x",
            "SUSE Manager Server 4.1:kernel-default-5.3.18-150200.24.129.1.x86_64",
            "SUSE Manager Server 4.1:kernel-default-base-5.3.18-150200.24.129.1.150200.9.61.1.ppc64le",
            "SUSE Manager Server 4.1:kernel-default-base-5.3.18-150200.24.129.1.150200.9.61.1.s390x",
            "SUSE Manager Server 4.1:kernel-default-base-5.3.18-150200.24.129.1.150200.9.61.1.x86_64",
            "SUSE Manager Server 4.1:kernel-default-devel-5.3.18-150200.24.129.1.ppc64le",
            "SUSE Manager Server 4.1:kernel-default-devel-5.3.18-150200.24.129.1.s390x",
            "SUSE Manager Server 4.1:kernel-default-devel-5.3.18-150200.24.129.1.x86_64",
            "SUSE Manager Server 4.1:kernel-devel-5.3.18-150200.24.129.1.noarch",
            "SUSE Manager Server 4.1:kernel-docs-5.3.18-150200.24.129.1.noarch",
            "SUSE Manager Server 4.1:kernel-macros-5.3.18-150200.24.129.1.noarch",
            "SUSE Manager Server 4.1:kernel-obs-build-5.3.18-150200.24.129.1.ppc64le",
            "SUSE Manager Server 4.1:kernel-obs-build-5.3.18-150200.24.129.1.s390x",
            "SUSE Manager Server 4.1:kernel-obs-build-5.3.18-150200.24.129.1.x86_64",
            "SUSE Manager Server 4.1:kernel-preempt-5.3.18-150200.24.129.1.x86_64",
            "SUSE Manager Server 4.1:kernel-preempt-devel-5.3.18-150200.24.129.1.x86_64",
            "SUSE Manager Server 4.1:kernel-source-5.3.18-150200.24.129.1.noarch",
            "SUSE Manager Server 4.1:kernel-syms-5.3.18-150200.24.129.1.ppc64le",
            "SUSE Manager Server 4.1:kernel-syms-5.3.18-150200.24.129.1.s390x",
            "SUSE Manager Server 4.1:kernel-syms-5.3.18-150200.24.129.1.x86_64",
            "SUSE Manager Server 4.1:reiserfs-kmp-default-5.3.18-150200.24.129.1.ppc64le",
            "SUSE Manager Server 4.1:reiserfs-kmp-default-5.3.18-150200.24.129.1.s390x",
            "SUSE Manager Server 4.1:reiserfs-kmp-default-5.3.18-150200.24.129.1.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 6.2,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N",
            "version": "3.1"
          },
          "products": [
            "SUSE Enterprise Storage 7:kernel-default-5.3.18-150200.24.129.1.aarch64",
            "SUSE Enterprise Storage 7:kernel-default-5.3.18-150200.24.129.1.x86_64",
            "SUSE Enterprise Storage 7:kernel-default-base-5.3.18-150200.24.129.1.150200.9.61.1.aarch64",
            "SUSE Enterprise Storage 7:kernel-default-base-5.3.18-150200.24.129.1.150200.9.61.1.x86_64",
            "SUSE Enterprise Storage 7:kernel-default-devel-5.3.18-150200.24.129.1.aarch64",
            "SUSE Enterprise Storage 7:kernel-default-devel-5.3.18-150200.24.129.1.x86_64",
            "SUSE Enterprise Storage 7:kernel-devel-5.3.18-150200.24.129.1.noarch",
            "SUSE Enterprise Storage 7:kernel-docs-5.3.18-150200.24.129.1.noarch",
            "SUSE Enterprise Storage 7:kernel-macros-5.3.18-150200.24.129.1.noarch",
            "SUSE Enterprise Storage 7:kernel-obs-build-5.3.18-150200.24.129.1.aarch64",
            "SUSE Enterprise Storage 7:kernel-obs-build-5.3.18-150200.24.129.1.x86_64",
            "SUSE Enterprise Storage 7:kernel-preempt-5.3.18-150200.24.129.1.aarch64",
            "SUSE Enterprise Storage 7:kernel-preempt-5.3.18-150200.24.129.1.x86_64",
            "SUSE Enterprise Storage 7:kernel-preempt-devel-5.3.18-150200.24.129.1.aarch64",
            "SUSE Enterprise Storage 7:kernel-preempt-devel-5.3.18-150200.24.129.1.x86_64",
            "SUSE Enterprise Storage 7:kernel-source-5.3.18-150200.24.129.1.noarch",
            "SUSE Enterprise Storage 7:kernel-syms-5.3.18-150200.24.129.1.aarch64",
            "SUSE Enterprise Storage 7:kernel-syms-5.3.18-150200.24.129.1.x86_64",
            "SUSE Enterprise Storage 7:reiserfs-kmp-default-5.3.18-150200.24.129.1.aarch64",
            "SUSE Enterprise Storage 7:reiserfs-kmp-default-5.3.18-150200.24.129.1.x86_64",
            "SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-150200.24.129.1.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-150200.24.129.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-150200.24.129.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-150200.24.129.1.x86_64",
            "SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-150200.24.129.1.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-150200.24.129.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-150200.24.129.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-150200.24.129.1.x86_64",
            "SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-150200.24.129.1.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-150200.24.129.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-150200.24.129.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-150200.24.129.1.x86_64",
            "SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-150200.24.129.1.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-150200.24.129.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-150200.24.129.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-150200.24.129.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-default-5.3.18-150200.24.129.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-default-5.3.18-150200.24.129.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-default-base-5.3.18-150200.24.129.1.150200.9.61.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-default-base-5.3.18-150200.24.129.1.150200.9.61.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-default-devel-5.3.18-150200.24.129.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-default-devel-5.3.18-150200.24.129.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-devel-5.3.18-150200.24.129.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-docs-5.3.18-150200.24.129.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-macros-5.3.18-150200.24.129.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-obs-build-5.3.18-150200.24.129.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-obs-build-5.3.18-150200.24.129.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-preempt-5.3.18-150200.24.129.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-preempt-5.3.18-150200.24.129.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-preempt-devel-5.3.18-150200.24.129.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-preempt-devel-5.3.18-150200.24.129.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-source-5.3.18-150200.24.129.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-syms-5.3.18-150200.24.129.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-syms-5.3.18-150200.24.129.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-5.3.18-150200.24.129.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-5.3.18-150200.24.129.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.129.1.150200.9.61.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.129.1.150200.9.61.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.129.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.129.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-devel-5.3.18-150200.24.129.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-docs-5.3.18-150200.24.129.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-macros-5.3.18-150200.24.129.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.129.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.129.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-preempt-5.3.18-150200.24.129.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-preempt-5.3.18-150200.24.129.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-preempt-devel-5.3.18-150200.24.129.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-preempt-devel-5.3.18-150200.24.129.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-source-5.3.18-150200.24.129.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.129.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.129.1.x86_64",
            "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-5.3.18-150200.24.129.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-5.3.18-150200.24.129.1.s390x",
            "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-5.3.18-150200.24.129.1.x86_64",
            "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-devel-5.3.18-150200.24.129.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-devel-5.3.18-150200.24.129.1.s390x",
            "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-devel-5.3.18-150200.24.129.1.x86_64",
            "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-150200_24_129-default-1-150200.5.3.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-150200_24_129-default-1-150200.5.3.1.s390x",
            "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-150200_24_129-default-1-150200.5.3.1.x86_64",
            "SUSE Linux Enterprise Server 15 SP2-BCL:kernel-default-5.3.18-150200.24.129.1.x86_64",
            "SUSE Linux Enterprise Server 15 SP2-BCL:kernel-default-base-5.3.18-150200.24.129.1.150200.9.61.1.x86_64",
            "SUSE Linux Enterprise Server 15 SP2-BCL:kernel-default-devel-5.3.18-150200.24.129.1.x86_64",
            "SUSE Linux Enterprise Server 15 SP2-BCL:kernel-devel-5.3.18-150200.24.129.1.noarch",
            "SUSE Linux Enterprise Server 15 SP2-BCL:kernel-docs-5.3.18-150200.24.129.1.noarch",
            "SUSE Linux Enterprise Server 15 SP2-BCL:kernel-macros-5.3.18-150200.24.129.1.noarch",
            "SUSE Linux Enterprise Server 15 SP2-BCL:kernel-obs-build-5.3.18-150200.24.129.1.x86_64",
            "SUSE Linux Enterprise Server 15 SP2-BCL:kernel-preempt-5.3.18-150200.24.129.1.x86_64",
            "SUSE Linux Enterprise Server 15 SP2-BCL:kernel-preempt-devel-5.3.18-150200.24.129.1.x86_64",
            "SUSE Linux Enterprise Server 15 SP2-BCL:kernel-source-5.3.18-150200.24.129.1.noarch",
            "SUSE Linux Enterprise Server 15 SP2-BCL:kernel-syms-5.3.18-150200.24.129.1.x86_64",
            "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-5.3.18-150200.24.129.1.aarch64",
            "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-5.3.18-150200.24.129.1.ppc64le",
            "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-5.3.18-150200.24.129.1.s390x",
            "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-5.3.18-150200.24.129.1.x86_64",
            "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.129.1.150200.9.61.1.aarch64",
            "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.129.1.150200.9.61.1.ppc64le",
            "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.129.1.150200.9.61.1.s390x",
            "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.129.1.150200.9.61.1.x86_64",
            "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.129.1.aarch64",
            "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.129.1.ppc64le",
            "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.129.1.s390x",
            "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.129.1.x86_64",
            "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-devel-5.3.18-150200.24.129.1.noarch",
            "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-docs-5.3.18-150200.24.129.1.noarch",
            "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-macros-5.3.18-150200.24.129.1.noarch",
            "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.129.1.aarch64",
            "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.129.1.ppc64le",
            "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.129.1.s390x",
            "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.129.1.x86_64",
            "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-preempt-5.3.18-150200.24.129.1.aarch64",
            "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-preempt-5.3.18-150200.24.129.1.x86_64",
            "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-preempt-devel-5.3.18-150200.24.129.1.aarch64",
            "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-preempt-devel-5.3.18-150200.24.129.1.x86_64",
            "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-source-5.3.18-150200.24.129.1.noarch",
            "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.129.1.aarch64",
            "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.129.1.ppc64le",
            "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.129.1.s390x",
            "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.129.1.x86_64",
            "SUSE Linux Enterprise Server 15 SP2-LTSS:reiserfs-kmp-default-5.3.18-150200.24.129.1.aarch64",
            "SUSE Linux Enterprise Server 15 SP2-LTSS:reiserfs-kmp-default-5.3.18-150200.24.129.1.ppc64le",
            "SUSE Linux Enterprise Server 15 SP2-LTSS:reiserfs-kmp-default-5.3.18-150200.24.129.1.s390x",
            "SUSE Linux Enterprise Server 15 SP2-LTSS:reiserfs-kmp-default-5.3.18-150200.24.129.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-5.3.18-150200.24.129.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-5.3.18-150200.24.129.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-base-5.3.18-150200.24.129.1.150200.9.61.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-base-5.3.18-150200.24.129.1.150200.9.61.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-devel-5.3.18-150200.24.129.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-devel-5.3.18-150200.24.129.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-devel-5.3.18-150200.24.129.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-docs-5.3.18-150200.24.129.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-macros-5.3.18-150200.24.129.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-obs-build-5.3.18-150200.24.129.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-obs-build-5.3.18-150200.24.129.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-preempt-5.3.18-150200.24.129.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-preempt-devel-5.3.18-150200.24.129.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-source-5.3.18-150200.24.129.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-syms-5.3.18-150200.24.129.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-syms-5.3.18-150200.24.129.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP2:reiserfs-kmp-default-5.3.18-150200.24.129.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP2:reiserfs-kmp-default-5.3.18-150200.24.129.1.x86_64",
            "SUSE Manager Proxy 4.1:kernel-default-5.3.18-150200.24.129.1.x86_64",
            "SUSE Manager Proxy 4.1:kernel-default-base-5.3.18-150200.24.129.1.150200.9.61.1.x86_64",
            "SUSE Manager Proxy 4.1:kernel-default-devel-5.3.18-150200.24.129.1.x86_64",
            "SUSE Manager Proxy 4.1:kernel-devel-5.3.18-150200.24.129.1.noarch",
            "SUSE Manager Proxy 4.1:kernel-docs-5.3.18-150200.24.129.1.noarch",
            "SUSE Manager Proxy 4.1:kernel-macros-5.3.18-150200.24.129.1.noarch",
            "SUSE Manager Proxy 4.1:kernel-obs-build-5.3.18-150200.24.129.1.x86_64",
            "SUSE Manager Proxy 4.1:kernel-preempt-5.3.18-150200.24.129.1.x86_64",
            "SUSE Manager Proxy 4.1:kernel-preempt-devel-5.3.18-150200.24.129.1.x86_64",
            "SUSE Manager Proxy 4.1:kernel-source-5.3.18-150200.24.129.1.noarch",
            "SUSE Manager Proxy 4.1:kernel-syms-5.3.18-150200.24.129.1.x86_64",
            "SUSE Manager Proxy 4.1:reiserfs-kmp-default-5.3.18-150200.24.129.1.x86_64",
            "SUSE Manager Retail Branch Server 4.1:kernel-default-5.3.18-150200.24.129.1.x86_64",
            "SUSE Manager Retail Branch Server 4.1:kernel-default-base-5.3.18-150200.24.129.1.150200.9.61.1.x86_64",
            "SUSE Manager Retail Branch Server 4.1:kernel-default-devel-5.3.18-150200.24.129.1.x86_64",
            "SUSE Manager Retail Branch Server 4.1:kernel-devel-5.3.18-150200.24.129.1.noarch",
            "SUSE Manager Retail Branch Server 4.1:kernel-docs-5.3.18-150200.24.129.1.noarch",
            "SUSE Manager Retail Branch Server 4.1:kernel-macros-5.3.18-150200.24.129.1.noarch",
            "SUSE Manager Retail Branch Server 4.1:kernel-obs-build-5.3.18-150200.24.129.1.x86_64",
            "SUSE Manager Retail Branch Server 4.1:kernel-preempt-5.3.18-150200.24.129.1.x86_64",
            "SUSE Manager Retail Branch Server 4.1:kernel-preempt-devel-5.3.18-150200.24.129.1.x86_64",
            "SUSE Manager Retail Branch Server 4.1:kernel-source-5.3.18-150200.24.129.1.noarch",
            "SUSE Manager Retail Branch Server 4.1:kernel-syms-5.3.18-150200.24.129.1.x86_64",
            "SUSE Manager Retail Branch Server 4.1:reiserfs-kmp-default-5.3.18-150200.24.129.1.x86_64",
            "SUSE Manager Server 4.1:kernel-default-5.3.18-150200.24.129.1.ppc64le",
            "SUSE Manager Server 4.1:kernel-default-5.3.18-150200.24.129.1.s390x",
            "SUSE Manager Server 4.1:kernel-default-5.3.18-150200.24.129.1.x86_64",
            "SUSE Manager Server 4.1:kernel-default-base-5.3.18-150200.24.129.1.150200.9.61.1.ppc64le",
            "SUSE Manager Server 4.1:kernel-default-base-5.3.18-150200.24.129.1.150200.9.61.1.s390x",
            "SUSE Manager Server 4.1:kernel-default-base-5.3.18-150200.24.129.1.150200.9.61.1.x86_64",
            "SUSE Manager Server 4.1:kernel-default-devel-5.3.18-150200.24.129.1.ppc64le",
            "SUSE Manager Server 4.1:kernel-default-devel-5.3.18-150200.24.129.1.s390x",
            "SUSE Manager Server 4.1:kernel-default-devel-5.3.18-150200.24.129.1.x86_64",
            "SUSE Manager Server 4.1:kernel-devel-5.3.18-150200.24.129.1.noarch",
            "SUSE Manager Server 4.1:kernel-docs-5.3.18-150200.24.129.1.noarch",
            "SUSE Manager Server 4.1:kernel-macros-5.3.18-150200.24.129.1.noarch",
            "SUSE Manager Server 4.1:kernel-obs-build-5.3.18-150200.24.129.1.ppc64le",
            "SUSE Manager Server 4.1:kernel-obs-build-5.3.18-150200.24.129.1.s390x",
            "SUSE Manager Server 4.1:kernel-obs-build-5.3.18-150200.24.129.1.x86_64",
            "SUSE Manager Server 4.1:kernel-preempt-5.3.18-150200.24.129.1.x86_64",
            "SUSE Manager Server 4.1:kernel-preempt-devel-5.3.18-150200.24.129.1.x86_64",
            "SUSE Manager Server 4.1:kernel-source-5.3.18-150200.24.129.1.noarch",
            "SUSE Manager Server 4.1:kernel-syms-5.3.18-150200.24.129.1.ppc64le",
            "SUSE Manager Server 4.1:kernel-syms-5.3.18-150200.24.129.1.s390x",
            "SUSE Manager Server 4.1:kernel-syms-5.3.18-150200.24.129.1.x86_64",
            "SUSE Manager Server 4.1:reiserfs-kmp-default-5.3.18-150200.24.129.1.ppc64le",
            "SUSE Manager Server 4.1:reiserfs-kmp-default-5.3.18-150200.24.129.1.s390x",
            "SUSE Manager Server 4.1:reiserfs-kmp-default-5.3.18-150200.24.129.1.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2022-09-28T06:48:59Z",
          "details": "moderate"
        }
      ],
      "title": "CVE-2022-2905"
    },
    {
      "cve": "CVE-2022-29581",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2022-29581"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "Improper Update of Reference Count vulnerability in net/sched of Linux Kernel allows local attacker to cause privilege escalation to root. This issue affects: Linux Kernel versions prior to 5.18; version 4.14 and later versions.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "SUSE Enterprise Storage 7:kernel-default-5.3.18-150200.24.129.1.aarch64",
          "SUSE Enterprise Storage 7:kernel-default-5.3.18-150200.24.129.1.x86_64",
          "SUSE Enterprise Storage 7:kernel-default-base-5.3.18-150200.24.129.1.150200.9.61.1.aarch64",
          "SUSE Enterprise Storage 7:kernel-default-base-5.3.18-150200.24.129.1.150200.9.61.1.x86_64",
          "SUSE Enterprise Storage 7:kernel-default-devel-5.3.18-150200.24.129.1.aarch64",
          "SUSE Enterprise Storage 7:kernel-default-devel-5.3.18-150200.24.129.1.x86_64",
          "SUSE Enterprise Storage 7:kernel-devel-5.3.18-150200.24.129.1.noarch",
          "SUSE Enterprise Storage 7:kernel-docs-5.3.18-150200.24.129.1.noarch",
          "SUSE Enterprise Storage 7:kernel-macros-5.3.18-150200.24.129.1.noarch",
          "SUSE Enterprise Storage 7:kernel-obs-build-5.3.18-150200.24.129.1.aarch64",
          "SUSE Enterprise Storage 7:kernel-obs-build-5.3.18-150200.24.129.1.x86_64",
          "SUSE Enterprise Storage 7:kernel-preempt-5.3.18-150200.24.129.1.aarch64",
          "SUSE Enterprise Storage 7:kernel-preempt-5.3.18-150200.24.129.1.x86_64",
          "SUSE Enterprise Storage 7:kernel-preempt-devel-5.3.18-150200.24.129.1.aarch64",
          "SUSE Enterprise Storage 7:kernel-preempt-devel-5.3.18-150200.24.129.1.x86_64",
          "SUSE Enterprise Storage 7:kernel-source-5.3.18-150200.24.129.1.noarch",
          "SUSE Enterprise Storage 7:kernel-syms-5.3.18-150200.24.129.1.aarch64",
          "SUSE Enterprise Storage 7:kernel-syms-5.3.18-150200.24.129.1.x86_64",
          "SUSE Enterprise Storage 7:reiserfs-kmp-default-5.3.18-150200.24.129.1.aarch64",
          "SUSE Enterprise Storage 7:reiserfs-kmp-default-5.3.18-150200.24.129.1.x86_64",
          "SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-150200.24.129.1.aarch64",
          "SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-150200.24.129.1.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-150200.24.129.1.s390x",
          "SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-150200.24.129.1.x86_64",
          "SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-150200.24.129.1.aarch64",
          "SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-150200.24.129.1.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-150200.24.129.1.s390x",
          "SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-150200.24.129.1.x86_64",
          "SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-150200.24.129.1.aarch64",
          "SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-150200.24.129.1.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-150200.24.129.1.s390x",
          "SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-150200.24.129.1.x86_64",
          "SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-150200.24.129.1.aarch64",
          "SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-150200.24.129.1.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-150200.24.129.1.s390x",
          "SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-150200.24.129.1.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-default-5.3.18-150200.24.129.1.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-default-5.3.18-150200.24.129.1.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-default-base-5.3.18-150200.24.129.1.150200.9.61.1.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-default-base-5.3.18-150200.24.129.1.150200.9.61.1.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-default-devel-5.3.18-150200.24.129.1.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-default-devel-5.3.18-150200.24.129.1.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-devel-5.3.18-150200.24.129.1.noarch",
          "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-docs-5.3.18-150200.24.129.1.noarch",
          "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-macros-5.3.18-150200.24.129.1.noarch",
          "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-obs-build-5.3.18-150200.24.129.1.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-obs-build-5.3.18-150200.24.129.1.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-preempt-5.3.18-150200.24.129.1.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-preempt-5.3.18-150200.24.129.1.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-preempt-devel-5.3.18-150200.24.129.1.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-preempt-devel-5.3.18-150200.24.129.1.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-source-5.3.18-150200.24.129.1.noarch",
          "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-syms-5.3.18-150200.24.129.1.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-syms-5.3.18-150200.24.129.1.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-5.3.18-150200.24.129.1.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-5.3.18-150200.24.129.1.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.129.1.150200.9.61.1.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.129.1.150200.9.61.1.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.129.1.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.129.1.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-devel-5.3.18-150200.24.129.1.noarch",
          "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-docs-5.3.18-150200.24.129.1.noarch",
          "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-macros-5.3.18-150200.24.129.1.noarch",
          "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.129.1.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.129.1.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-preempt-5.3.18-150200.24.129.1.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-preempt-5.3.18-150200.24.129.1.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-preempt-devel-5.3.18-150200.24.129.1.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-preempt-devel-5.3.18-150200.24.129.1.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-source-5.3.18-150200.24.129.1.noarch",
          "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.129.1.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.129.1.x86_64",
          "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-5.3.18-150200.24.129.1.ppc64le",
          "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-5.3.18-150200.24.129.1.s390x",
          "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-5.3.18-150200.24.129.1.x86_64",
          "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-devel-5.3.18-150200.24.129.1.ppc64le",
          "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-devel-5.3.18-150200.24.129.1.s390x",
          "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-devel-5.3.18-150200.24.129.1.x86_64",
          "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-150200_24_129-default-1-150200.5.3.1.ppc64le",
          "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-150200_24_129-default-1-150200.5.3.1.s390x",
          "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-150200_24_129-default-1-150200.5.3.1.x86_64",
          "SUSE Linux Enterprise Server 15 SP2-BCL:kernel-default-5.3.18-150200.24.129.1.x86_64",
          "SUSE Linux Enterprise Server 15 SP2-BCL:kernel-default-base-5.3.18-150200.24.129.1.150200.9.61.1.x86_64",
          "SUSE Linux Enterprise Server 15 SP2-BCL:kernel-default-devel-5.3.18-150200.24.129.1.x86_64",
          "SUSE Linux Enterprise Server 15 SP2-BCL:kernel-devel-5.3.18-150200.24.129.1.noarch",
          "SUSE Linux Enterprise Server 15 SP2-BCL:kernel-docs-5.3.18-150200.24.129.1.noarch",
          "SUSE Linux Enterprise Server 15 SP2-BCL:kernel-macros-5.3.18-150200.24.129.1.noarch",
          "SUSE Linux Enterprise Server 15 SP2-BCL:kernel-obs-build-5.3.18-150200.24.129.1.x86_64",
          "SUSE Linux Enterprise Server 15 SP2-BCL:kernel-preempt-5.3.18-150200.24.129.1.x86_64",
          "SUSE Linux Enterprise Server 15 SP2-BCL:kernel-preempt-devel-5.3.18-150200.24.129.1.x86_64",
          "SUSE Linux Enterprise Server 15 SP2-BCL:kernel-source-5.3.18-150200.24.129.1.noarch",
          "SUSE Linux Enterprise Server 15 SP2-BCL:kernel-syms-5.3.18-150200.24.129.1.x86_64",
          "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-5.3.18-150200.24.129.1.aarch64",
          "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-5.3.18-150200.24.129.1.ppc64le",
          "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-5.3.18-150200.24.129.1.s390x",
          "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-5.3.18-150200.24.129.1.x86_64",
          "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.129.1.150200.9.61.1.aarch64",
          "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.129.1.150200.9.61.1.ppc64le",
          "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.129.1.150200.9.61.1.s390x",
          "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.129.1.150200.9.61.1.x86_64",
          "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.129.1.aarch64",
          "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.129.1.ppc64le",
          "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.129.1.s390x",
          "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.129.1.x86_64",
          "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-devel-5.3.18-150200.24.129.1.noarch",
          "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-docs-5.3.18-150200.24.129.1.noarch",
          "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-macros-5.3.18-150200.24.129.1.noarch",
          "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.129.1.aarch64",
          "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.129.1.ppc64le",
          "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.129.1.s390x",
          "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.129.1.x86_64",
          "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-preempt-5.3.18-150200.24.129.1.aarch64",
          "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-preempt-5.3.18-150200.24.129.1.x86_64",
          "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-preempt-devel-5.3.18-150200.24.129.1.aarch64",
          "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-preempt-devel-5.3.18-150200.24.129.1.x86_64",
          "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-source-5.3.18-150200.24.129.1.noarch",
          "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.129.1.aarch64",
          "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.129.1.ppc64le",
          "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.129.1.s390x",
          "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.129.1.x86_64",
          "SUSE Linux Enterprise Server 15 SP2-LTSS:reiserfs-kmp-default-5.3.18-150200.24.129.1.aarch64",
          "SUSE Linux Enterprise Server 15 SP2-LTSS:reiserfs-kmp-default-5.3.18-150200.24.129.1.ppc64le",
          "SUSE Linux Enterprise Server 15 SP2-LTSS:reiserfs-kmp-default-5.3.18-150200.24.129.1.s390x",
          "SUSE Linux Enterprise Server 15 SP2-LTSS:reiserfs-kmp-default-5.3.18-150200.24.129.1.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-5.3.18-150200.24.129.1.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-5.3.18-150200.24.129.1.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-base-5.3.18-150200.24.129.1.150200.9.61.1.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-base-5.3.18-150200.24.129.1.150200.9.61.1.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-devel-5.3.18-150200.24.129.1.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-devel-5.3.18-150200.24.129.1.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-devel-5.3.18-150200.24.129.1.noarch",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-docs-5.3.18-150200.24.129.1.noarch",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-macros-5.3.18-150200.24.129.1.noarch",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-obs-build-5.3.18-150200.24.129.1.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-obs-build-5.3.18-150200.24.129.1.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-preempt-5.3.18-150200.24.129.1.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-preempt-devel-5.3.18-150200.24.129.1.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-source-5.3.18-150200.24.129.1.noarch",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-syms-5.3.18-150200.24.129.1.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-syms-5.3.18-150200.24.129.1.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP2:reiserfs-kmp-default-5.3.18-150200.24.129.1.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP2:reiserfs-kmp-default-5.3.18-150200.24.129.1.x86_64",
          "SUSE Manager Proxy 4.1:kernel-default-5.3.18-150200.24.129.1.x86_64",
          "SUSE Manager Proxy 4.1:kernel-default-base-5.3.18-150200.24.129.1.150200.9.61.1.x86_64",
          "SUSE Manager Proxy 4.1:kernel-default-devel-5.3.18-150200.24.129.1.x86_64",
          "SUSE Manager Proxy 4.1:kernel-devel-5.3.18-150200.24.129.1.noarch",
          "SUSE Manager Proxy 4.1:kernel-docs-5.3.18-150200.24.129.1.noarch",
          "SUSE Manager Proxy 4.1:kernel-macros-5.3.18-150200.24.129.1.noarch",
          "SUSE Manager Proxy 4.1:kernel-obs-build-5.3.18-150200.24.129.1.x86_64",
          "SUSE Manager Proxy 4.1:kernel-preempt-5.3.18-150200.24.129.1.x86_64",
          "SUSE Manager Proxy 4.1:kernel-preempt-devel-5.3.18-150200.24.129.1.x86_64",
          "SUSE Manager Proxy 4.1:kernel-source-5.3.18-150200.24.129.1.noarch",
          "SUSE Manager Proxy 4.1:kernel-syms-5.3.18-150200.24.129.1.x86_64",
          "SUSE Manager Proxy 4.1:reiserfs-kmp-default-5.3.18-150200.24.129.1.x86_64",
          "SUSE Manager Retail Branch Server 4.1:kernel-default-5.3.18-150200.24.129.1.x86_64",
          "SUSE Manager Retail Branch Server 4.1:kernel-default-base-5.3.18-150200.24.129.1.150200.9.61.1.x86_64",
          "SUSE Manager Retail Branch Server 4.1:kernel-default-devel-5.3.18-150200.24.129.1.x86_64",
          "SUSE Manager Retail Branch Server 4.1:kernel-devel-5.3.18-150200.24.129.1.noarch",
          "SUSE Manager Retail Branch Server 4.1:kernel-docs-5.3.18-150200.24.129.1.noarch",
          "SUSE Manager Retail Branch Server 4.1:kernel-macros-5.3.18-150200.24.129.1.noarch",
          "SUSE Manager Retail Branch Server 4.1:kernel-obs-build-5.3.18-150200.24.129.1.x86_64",
          "SUSE Manager Retail Branch Server 4.1:kernel-preempt-5.3.18-150200.24.129.1.x86_64",
          "SUSE Manager Retail Branch Server 4.1:kernel-preempt-devel-5.3.18-150200.24.129.1.x86_64",
          "SUSE Manager Retail Branch Server 4.1:kernel-source-5.3.18-150200.24.129.1.noarch",
          "SUSE Manager Retail Branch Server 4.1:kernel-syms-5.3.18-150200.24.129.1.x86_64",
          "SUSE Manager Retail Branch Server 4.1:reiserfs-kmp-default-5.3.18-150200.24.129.1.x86_64",
          "SUSE Manager Server 4.1:kernel-default-5.3.18-150200.24.129.1.ppc64le",
          "SUSE Manager Server 4.1:kernel-default-5.3.18-150200.24.129.1.s390x",
          "SUSE Manager Server 4.1:kernel-default-5.3.18-150200.24.129.1.x86_64",
          "SUSE Manager Server 4.1:kernel-default-base-5.3.18-150200.24.129.1.150200.9.61.1.ppc64le",
          "SUSE Manager Server 4.1:kernel-default-base-5.3.18-150200.24.129.1.150200.9.61.1.s390x",
          "SUSE Manager Server 4.1:kernel-default-base-5.3.18-150200.24.129.1.150200.9.61.1.x86_64",
          "SUSE Manager Server 4.1:kernel-default-devel-5.3.18-150200.24.129.1.ppc64le",
          "SUSE Manager Server 4.1:kernel-default-devel-5.3.18-150200.24.129.1.s390x",
          "SUSE Manager Server 4.1:kernel-default-devel-5.3.18-150200.24.129.1.x86_64",
          "SUSE Manager Server 4.1:kernel-devel-5.3.18-150200.24.129.1.noarch",
          "SUSE Manager Server 4.1:kernel-docs-5.3.18-150200.24.129.1.noarch",
          "SUSE Manager Server 4.1:kernel-macros-5.3.18-150200.24.129.1.noarch",
          "SUSE Manager Server 4.1:kernel-obs-build-5.3.18-150200.24.129.1.ppc64le",
          "SUSE Manager Server 4.1:kernel-obs-build-5.3.18-150200.24.129.1.s390x",
          "SUSE Manager Server 4.1:kernel-obs-build-5.3.18-150200.24.129.1.x86_64",
          "SUSE Manager Server 4.1:kernel-preempt-5.3.18-150200.24.129.1.x86_64",
          "SUSE Manager Server 4.1:kernel-preempt-devel-5.3.18-150200.24.129.1.x86_64",
          "SUSE Manager Server 4.1:kernel-source-5.3.18-150200.24.129.1.noarch",
          "SUSE Manager Server 4.1:kernel-syms-5.3.18-150200.24.129.1.ppc64le",
          "SUSE Manager Server 4.1:kernel-syms-5.3.18-150200.24.129.1.s390x",
          "SUSE Manager Server 4.1:kernel-syms-5.3.18-150200.24.129.1.x86_64",
          "SUSE Manager Server 4.1:reiserfs-kmp-default-5.3.18-150200.24.129.1.ppc64le",
          "SUSE Manager Server 4.1:reiserfs-kmp-default-5.3.18-150200.24.129.1.s390x",
          "SUSE Manager Server 4.1:reiserfs-kmp-default-5.3.18-150200.24.129.1.x86_64"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2022-29581",
          "url": "https://www.suse.com/security/cve/CVE-2022-29581"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1199665 for CVE-2022-29581",
          "url": "https://bugzilla.suse.com/1199665"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1199695 for CVE-2022-29581",
          "url": "https://bugzilla.suse.com/1199695"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1205313 for CVE-2022-29581",
          "url": "https://bugzilla.suse.com/1205313"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "SUSE Enterprise Storage 7:kernel-default-5.3.18-150200.24.129.1.aarch64",
            "SUSE Enterprise Storage 7:kernel-default-5.3.18-150200.24.129.1.x86_64",
            "SUSE Enterprise Storage 7:kernel-default-base-5.3.18-150200.24.129.1.150200.9.61.1.aarch64",
            "SUSE Enterprise Storage 7:kernel-default-base-5.3.18-150200.24.129.1.150200.9.61.1.x86_64",
            "SUSE Enterprise Storage 7:kernel-default-devel-5.3.18-150200.24.129.1.aarch64",
            "SUSE Enterprise Storage 7:kernel-default-devel-5.3.18-150200.24.129.1.x86_64",
            "SUSE Enterprise Storage 7:kernel-devel-5.3.18-150200.24.129.1.noarch",
            "SUSE Enterprise Storage 7:kernel-docs-5.3.18-150200.24.129.1.noarch",
            "SUSE Enterprise Storage 7:kernel-macros-5.3.18-150200.24.129.1.noarch",
            "SUSE Enterprise Storage 7:kernel-obs-build-5.3.18-150200.24.129.1.aarch64",
            "SUSE Enterprise Storage 7:kernel-obs-build-5.3.18-150200.24.129.1.x86_64",
            "SUSE Enterprise Storage 7:kernel-preempt-5.3.18-150200.24.129.1.aarch64",
            "SUSE Enterprise Storage 7:kernel-preempt-5.3.18-150200.24.129.1.x86_64",
            "SUSE Enterprise Storage 7:kernel-preempt-devel-5.3.18-150200.24.129.1.aarch64",
            "SUSE Enterprise Storage 7:kernel-preempt-devel-5.3.18-150200.24.129.1.x86_64",
            "SUSE Enterprise Storage 7:kernel-source-5.3.18-150200.24.129.1.noarch",
            "SUSE Enterprise Storage 7:kernel-syms-5.3.18-150200.24.129.1.aarch64",
            "SUSE Enterprise Storage 7:kernel-syms-5.3.18-150200.24.129.1.x86_64",
            "SUSE Enterprise Storage 7:reiserfs-kmp-default-5.3.18-150200.24.129.1.aarch64",
            "SUSE Enterprise Storage 7:reiserfs-kmp-default-5.3.18-150200.24.129.1.x86_64",
            "SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-150200.24.129.1.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-150200.24.129.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-150200.24.129.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-150200.24.129.1.x86_64",
            "SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-150200.24.129.1.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-150200.24.129.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-150200.24.129.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-150200.24.129.1.x86_64",
            "SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-150200.24.129.1.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-150200.24.129.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-150200.24.129.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-150200.24.129.1.x86_64",
            "SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-150200.24.129.1.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-150200.24.129.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-150200.24.129.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-150200.24.129.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-default-5.3.18-150200.24.129.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-default-5.3.18-150200.24.129.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-default-base-5.3.18-150200.24.129.1.150200.9.61.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-default-base-5.3.18-150200.24.129.1.150200.9.61.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-default-devel-5.3.18-150200.24.129.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-default-devel-5.3.18-150200.24.129.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-devel-5.3.18-150200.24.129.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-docs-5.3.18-150200.24.129.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-macros-5.3.18-150200.24.129.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-obs-build-5.3.18-150200.24.129.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-obs-build-5.3.18-150200.24.129.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-preempt-5.3.18-150200.24.129.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-preempt-5.3.18-150200.24.129.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-preempt-devel-5.3.18-150200.24.129.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-preempt-devel-5.3.18-150200.24.129.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-source-5.3.18-150200.24.129.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-syms-5.3.18-150200.24.129.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-syms-5.3.18-150200.24.129.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-5.3.18-150200.24.129.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-5.3.18-150200.24.129.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.129.1.150200.9.61.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.129.1.150200.9.61.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.129.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.129.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-devel-5.3.18-150200.24.129.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-docs-5.3.18-150200.24.129.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-macros-5.3.18-150200.24.129.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.129.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.129.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-preempt-5.3.18-150200.24.129.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-preempt-5.3.18-150200.24.129.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-preempt-devel-5.3.18-150200.24.129.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-preempt-devel-5.3.18-150200.24.129.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-source-5.3.18-150200.24.129.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.129.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.129.1.x86_64",
            "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-5.3.18-150200.24.129.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-5.3.18-150200.24.129.1.s390x",
            "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-5.3.18-150200.24.129.1.x86_64",
            "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-devel-5.3.18-150200.24.129.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-devel-5.3.18-150200.24.129.1.s390x",
            "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-devel-5.3.18-150200.24.129.1.x86_64",
            "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-150200_24_129-default-1-150200.5.3.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-150200_24_129-default-1-150200.5.3.1.s390x",
            "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-150200_24_129-default-1-150200.5.3.1.x86_64",
            "SUSE Linux Enterprise Server 15 SP2-BCL:kernel-default-5.3.18-150200.24.129.1.x86_64",
            "SUSE Linux Enterprise Server 15 SP2-BCL:kernel-default-base-5.3.18-150200.24.129.1.150200.9.61.1.x86_64",
            "SUSE Linux Enterprise Server 15 SP2-BCL:kernel-default-devel-5.3.18-150200.24.129.1.x86_64",
            "SUSE Linux Enterprise Server 15 SP2-BCL:kernel-devel-5.3.18-150200.24.129.1.noarch",
            "SUSE Linux Enterprise Server 15 SP2-BCL:kernel-docs-5.3.18-150200.24.129.1.noarch",
            "SUSE Linux Enterprise Server 15 SP2-BCL:kernel-macros-5.3.18-150200.24.129.1.noarch",
            "SUSE Linux Enterprise Server 15 SP2-BCL:kernel-obs-build-5.3.18-150200.24.129.1.x86_64",
            "SUSE Linux Enterprise Server 15 SP2-BCL:kernel-preempt-5.3.18-150200.24.129.1.x86_64",
            "SUSE Linux Enterprise Server 15 SP2-BCL:kernel-preempt-devel-5.3.18-150200.24.129.1.x86_64",
            "SUSE Linux Enterprise Server 15 SP2-BCL:kernel-source-5.3.18-150200.24.129.1.noarch",
            "SUSE Linux Enterprise Server 15 SP2-BCL:kernel-syms-5.3.18-150200.24.129.1.x86_64",
            "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-5.3.18-150200.24.129.1.aarch64",
            "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-5.3.18-150200.24.129.1.ppc64le",
            "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-5.3.18-150200.24.129.1.s390x",
            "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-5.3.18-150200.24.129.1.x86_64",
            "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.129.1.150200.9.61.1.aarch64",
            "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.129.1.150200.9.61.1.ppc64le",
            "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.129.1.150200.9.61.1.s390x",
            "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.129.1.150200.9.61.1.x86_64",
            "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.129.1.aarch64",
            "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.129.1.ppc64le",
            "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.129.1.s390x",
            "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.129.1.x86_64",
            "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-devel-5.3.18-150200.24.129.1.noarch",
            "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-docs-5.3.18-150200.24.129.1.noarch",
            "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-macros-5.3.18-150200.24.129.1.noarch",
            "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.129.1.aarch64",
            "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.129.1.ppc64le",
            "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.129.1.s390x",
            "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.129.1.x86_64",
            "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-preempt-5.3.18-150200.24.129.1.aarch64",
            "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-preempt-5.3.18-150200.24.129.1.x86_64",
            "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-preempt-devel-5.3.18-150200.24.129.1.aarch64",
            "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-preempt-devel-5.3.18-150200.24.129.1.x86_64",
            "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-source-5.3.18-150200.24.129.1.noarch",
            "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.129.1.aarch64",
            "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.129.1.ppc64le",
            "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.129.1.s390x",
            "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.129.1.x86_64",
            "SUSE Linux Enterprise Server 15 SP2-LTSS:reiserfs-kmp-default-5.3.18-150200.24.129.1.aarch64",
            "SUSE Linux Enterprise Server 15 SP2-LTSS:reiserfs-kmp-default-5.3.18-150200.24.129.1.ppc64le",
            "SUSE Linux Enterprise Server 15 SP2-LTSS:reiserfs-kmp-default-5.3.18-150200.24.129.1.s390x",
            "SUSE Linux Enterprise Server 15 SP2-LTSS:reiserfs-kmp-default-5.3.18-150200.24.129.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-5.3.18-150200.24.129.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-5.3.18-150200.24.129.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-base-5.3.18-150200.24.129.1.150200.9.61.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-base-5.3.18-150200.24.129.1.150200.9.61.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-devel-5.3.18-150200.24.129.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-devel-5.3.18-150200.24.129.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-devel-5.3.18-150200.24.129.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-docs-5.3.18-150200.24.129.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-macros-5.3.18-150200.24.129.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-obs-build-5.3.18-150200.24.129.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-obs-build-5.3.18-150200.24.129.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-preempt-5.3.18-150200.24.129.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-preempt-devel-5.3.18-150200.24.129.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-source-5.3.18-150200.24.129.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-syms-5.3.18-150200.24.129.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-syms-5.3.18-150200.24.129.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP2:reiserfs-kmp-default-5.3.18-150200.24.129.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP2:reiserfs-kmp-default-5.3.18-150200.24.129.1.x86_64",
            "SUSE Manager Proxy 4.1:kernel-default-5.3.18-150200.24.129.1.x86_64",
            "SUSE Manager Proxy 4.1:kernel-default-base-5.3.18-150200.24.129.1.150200.9.61.1.x86_64",
            "SUSE Manager Proxy 4.1:kernel-default-devel-5.3.18-150200.24.129.1.x86_64",
            "SUSE Manager Proxy 4.1:kernel-devel-5.3.18-150200.24.129.1.noarch",
            "SUSE Manager Proxy 4.1:kernel-docs-5.3.18-150200.24.129.1.noarch",
            "SUSE Manager Proxy 4.1:kernel-macros-5.3.18-150200.24.129.1.noarch",
            "SUSE Manager Proxy 4.1:kernel-obs-build-5.3.18-150200.24.129.1.x86_64",
            "SUSE Manager Proxy 4.1:kernel-preempt-5.3.18-150200.24.129.1.x86_64",
            "SUSE Manager Proxy 4.1:kernel-preempt-devel-5.3.18-150200.24.129.1.x86_64",
            "SUSE Manager Proxy 4.1:kernel-source-5.3.18-150200.24.129.1.noarch",
            "SUSE Manager Proxy 4.1:kernel-syms-5.3.18-150200.24.129.1.x86_64",
            "SUSE Manager Proxy 4.1:reiserfs-kmp-default-5.3.18-150200.24.129.1.x86_64",
            "SUSE Manager Retail Branch Server 4.1:kernel-default-5.3.18-150200.24.129.1.x86_64",
            "SUSE Manager Retail Branch Server 4.1:kernel-default-base-5.3.18-150200.24.129.1.150200.9.61.1.x86_64",
            "SUSE Manager Retail Branch Server 4.1:kernel-default-devel-5.3.18-150200.24.129.1.x86_64",
            "SUSE Manager Retail Branch Server 4.1:kernel-devel-5.3.18-150200.24.129.1.noarch",
            "SUSE Manager Retail Branch Server 4.1:kernel-docs-5.3.18-150200.24.129.1.noarch",
            "SUSE Manager Retail Branch Server 4.1:kernel-macros-5.3.18-150200.24.129.1.noarch",
            "SUSE Manager Retail Branch Server 4.1:kernel-obs-build-5.3.18-150200.24.129.1.x86_64",
            "SUSE Manager Retail Branch Server 4.1:kernel-preempt-5.3.18-150200.24.129.1.x86_64",
            "SUSE Manager Retail Branch Server 4.1:kernel-preempt-devel-5.3.18-150200.24.129.1.x86_64",
            "SUSE Manager Retail Branch Server 4.1:kernel-source-5.3.18-150200.24.129.1.noarch",
            "SUSE Manager Retail Branch Server 4.1:kernel-syms-5.3.18-150200.24.129.1.x86_64",
            "SUSE Manager Retail Branch Server 4.1:reiserfs-kmp-default-5.3.18-150200.24.129.1.x86_64",
            "SUSE Manager Server 4.1:kernel-default-5.3.18-150200.24.129.1.ppc64le",
            "SUSE Manager Server 4.1:kernel-default-5.3.18-150200.24.129.1.s390x",
            "SUSE Manager Server 4.1:kernel-default-5.3.18-150200.24.129.1.x86_64",
            "SUSE Manager Server 4.1:kernel-default-base-5.3.18-150200.24.129.1.150200.9.61.1.ppc64le",
            "SUSE Manager Server 4.1:kernel-default-base-5.3.18-150200.24.129.1.150200.9.61.1.s390x",
            "SUSE Manager Server 4.1:kernel-default-base-5.3.18-150200.24.129.1.150200.9.61.1.x86_64",
            "SUSE Manager Server 4.1:kernel-default-devel-5.3.18-150200.24.129.1.ppc64le",
            "SUSE Manager Server 4.1:kernel-default-devel-5.3.18-150200.24.129.1.s390x",
            "SUSE Manager Server 4.1:kernel-default-devel-5.3.18-150200.24.129.1.x86_64",
            "SUSE Manager Server 4.1:kernel-devel-5.3.18-150200.24.129.1.noarch",
            "SUSE Manager Server 4.1:kernel-docs-5.3.18-150200.24.129.1.noarch",
            "SUSE Manager Server 4.1:kernel-macros-5.3.18-150200.24.129.1.noarch",
            "SUSE Manager Server 4.1:kernel-obs-build-5.3.18-150200.24.129.1.ppc64le",
            "SUSE Manager Server 4.1:kernel-obs-build-5.3.18-150200.24.129.1.s390x",
            "SUSE Manager Server 4.1:kernel-obs-build-5.3.18-150200.24.129.1.x86_64",
            "SUSE Manager Server 4.1:kernel-preempt-5.3.18-150200.24.129.1.x86_64",
            "SUSE Manager Server 4.1:kernel-preempt-devel-5.3.18-150200.24.129.1.x86_64",
            "SUSE Manager Server 4.1:kernel-source-5.3.18-150200.24.129.1.noarch",
            "SUSE Manager Server 4.1:kernel-syms-5.3.18-150200.24.129.1.ppc64le",
            "SUSE Manager Server 4.1:kernel-syms-5.3.18-150200.24.129.1.s390x",
            "SUSE Manager Server 4.1:kernel-syms-5.3.18-150200.24.129.1.x86_64",
            "SUSE Manager Server 4.1:reiserfs-kmp-default-5.3.18-150200.24.129.1.ppc64le",
            "SUSE Manager Server 4.1:reiserfs-kmp-default-5.3.18-150200.24.129.1.s390x",
            "SUSE Manager Server 4.1:reiserfs-kmp-default-5.3.18-150200.24.129.1.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 7.8,
            "baseSeverity": "HIGH",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
            "version": "3.1"
          },
          "products": [
            "SUSE Enterprise Storage 7:kernel-default-5.3.18-150200.24.129.1.aarch64",
            "SUSE Enterprise Storage 7:kernel-default-5.3.18-150200.24.129.1.x86_64",
            "SUSE Enterprise Storage 7:kernel-default-base-5.3.18-150200.24.129.1.150200.9.61.1.aarch64",
            "SUSE Enterprise Storage 7:kernel-default-base-5.3.18-150200.24.129.1.150200.9.61.1.x86_64",
            "SUSE Enterprise Storage 7:kernel-default-devel-5.3.18-150200.24.129.1.aarch64",
            "SUSE Enterprise Storage 7:kernel-default-devel-5.3.18-150200.24.129.1.x86_64",
            "SUSE Enterprise Storage 7:kernel-devel-5.3.18-150200.24.129.1.noarch",
            "SUSE Enterprise Storage 7:kernel-docs-5.3.18-150200.24.129.1.noarch",
            "SUSE Enterprise Storage 7:kernel-macros-5.3.18-150200.24.129.1.noarch",
            "SUSE Enterprise Storage 7:kernel-obs-build-5.3.18-150200.24.129.1.aarch64",
            "SUSE Enterprise Storage 7:kernel-obs-build-5.3.18-150200.24.129.1.x86_64",
            "SUSE Enterprise Storage 7:kernel-preempt-5.3.18-150200.24.129.1.aarch64",
            "SUSE Enterprise Storage 7:kernel-preempt-5.3.18-150200.24.129.1.x86_64",
            "SUSE Enterprise Storage 7:kernel-preempt-devel-5.3.18-150200.24.129.1.aarch64",
            "SUSE Enterprise Storage 7:kernel-preempt-devel-5.3.18-150200.24.129.1.x86_64",
            "SUSE Enterprise Storage 7:kernel-source-5.3.18-150200.24.129.1.noarch",
            "SUSE Enterprise Storage 7:kernel-syms-5.3.18-150200.24.129.1.aarch64",
            "SUSE Enterprise Storage 7:kernel-syms-5.3.18-150200.24.129.1.x86_64",
            "SUSE Enterprise Storage 7:reiserfs-kmp-default-5.3.18-150200.24.129.1.aarch64",
            "SUSE Enterprise Storage 7:reiserfs-kmp-default-5.3.18-150200.24.129.1.x86_64",
            "SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-150200.24.129.1.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-150200.24.129.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-150200.24.129.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-150200.24.129.1.x86_64",
            "SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-150200.24.129.1.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-150200.24.129.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-150200.24.129.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-150200.24.129.1.x86_64",
            "SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-150200.24.129.1.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-150200.24.129.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-150200.24.129.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-150200.24.129.1.x86_64",
            "SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-150200.24.129.1.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-150200.24.129.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-150200.24.129.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-150200.24.129.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-default-5.3.18-150200.24.129.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-default-5.3.18-150200.24.129.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-default-base-5.3.18-150200.24.129.1.150200.9.61.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-default-base-5.3.18-150200.24.129.1.150200.9.61.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-default-devel-5.3.18-150200.24.129.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-default-devel-5.3.18-150200.24.129.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-devel-5.3.18-150200.24.129.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-docs-5.3.18-150200.24.129.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-macros-5.3.18-150200.24.129.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-obs-build-5.3.18-150200.24.129.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-obs-build-5.3.18-150200.24.129.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-preempt-5.3.18-150200.24.129.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-preempt-5.3.18-150200.24.129.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-preempt-devel-5.3.18-150200.24.129.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-preempt-devel-5.3.18-150200.24.129.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-source-5.3.18-150200.24.129.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-syms-5.3.18-150200.24.129.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-syms-5.3.18-150200.24.129.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-5.3.18-150200.24.129.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-5.3.18-150200.24.129.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.129.1.150200.9.61.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.129.1.150200.9.61.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.129.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.129.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-devel-5.3.18-150200.24.129.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-docs-5.3.18-150200.24.129.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-macros-5.3.18-150200.24.129.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.129.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.129.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-preempt-5.3.18-150200.24.129.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-preempt-5.3.18-150200.24.129.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-preempt-devel-5.3.18-150200.24.129.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-preempt-devel-5.3.18-150200.24.129.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-source-5.3.18-150200.24.129.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.129.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.129.1.x86_64",
            "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-5.3.18-150200.24.129.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-5.3.18-150200.24.129.1.s390x",
            "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-5.3.18-150200.24.129.1.x86_64",
            "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-devel-5.3.18-150200.24.129.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-devel-5.3.18-150200.24.129.1.s390x",
            "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-devel-5.3.18-150200.24.129.1.x86_64",
            "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-150200_24_129-default-1-150200.5.3.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-150200_24_129-default-1-150200.5.3.1.s390x",
            "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-150200_24_129-default-1-150200.5.3.1.x86_64",
            "SUSE Linux Enterprise Server 15 SP2-BCL:kernel-default-5.3.18-150200.24.129.1.x86_64",
            "SUSE Linux Enterprise Server 15 SP2-BCL:kernel-default-base-5.3.18-150200.24.129.1.150200.9.61.1.x86_64",
            "SUSE Linux Enterprise Server 15 SP2-BCL:kernel-default-devel-5.3.18-150200.24.129.1.x86_64",
            "SUSE Linux Enterprise Server 15 SP2-BCL:kernel-devel-5.3.18-150200.24.129.1.noarch",
            "SUSE Linux Enterprise Server 15 SP2-BCL:kernel-docs-5.3.18-150200.24.129.1.noarch",
            "SUSE Linux Enterprise Server 15 SP2-BCL:kernel-macros-5.3.18-150200.24.129.1.noarch",
            "SUSE Linux Enterprise Server 15 SP2-BCL:kernel-obs-build-5.3.18-150200.24.129.1.x86_64",
            "SUSE Linux Enterprise Server 15 SP2-BCL:kernel-preempt-5.3.18-150200.24.129.1.x86_64",
            "SUSE Linux Enterprise Server 15 SP2-BCL:kernel-preempt-devel-5.3.18-150200.24.129.1.x86_64",
            "SUSE Linux Enterprise Server 15 SP2-BCL:kernel-source-5.3.18-150200.24.129.1.noarch",
            "SUSE Linux Enterprise Server 15 SP2-BCL:kernel-syms-5.3.18-150200.24.129.1.x86_64",
            "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-5.3.18-150200.24.129.1.aarch64",
            "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-5.3.18-150200.24.129.1.ppc64le",
            "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-5.3.18-150200.24.129.1.s390x",
            "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-5.3.18-150200.24.129.1.x86_64",
            "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.129.1.150200.9.61.1.aarch64",
            "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.129.1.150200.9.61.1.ppc64le",
            "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.129.1.150200.9.61.1.s390x",
            "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.129.1.150200.9.61.1.x86_64",
            "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.129.1.aarch64",
            "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.129.1.ppc64le",
            "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.129.1.s390x",
            "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.129.1.x86_64",
            "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-devel-5.3.18-150200.24.129.1.noarch",
            "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-docs-5.3.18-150200.24.129.1.noarch",
            "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-macros-5.3.18-150200.24.129.1.noarch",
            "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.129.1.aarch64",
            "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.129.1.ppc64le",
            "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.129.1.s390x",
            "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.129.1.x86_64",
            "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-preempt-5.3.18-150200.24.129.1.aarch64",
            "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-preempt-5.3.18-150200.24.129.1.x86_64",
            "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-preempt-devel-5.3.18-150200.24.129.1.aarch64",
            "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-preempt-devel-5.3.18-150200.24.129.1.x86_64",
            "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-source-5.3.18-150200.24.129.1.noarch",
            "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.129.1.aarch64",
            "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.129.1.ppc64le",
            "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.129.1.s390x",
            "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.129.1.x86_64",
            "SUSE Linux Enterprise Server 15 SP2-LTSS:reiserfs-kmp-default-5.3.18-150200.24.129.1.aarch64",
            "SUSE Linux Enterprise Server 15 SP2-LTSS:reiserfs-kmp-default-5.3.18-150200.24.129.1.ppc64le",
            "SUSE Linux Enterprise Server 15 SP2-LTSS:reiserfs-kmp-default-5.3.18-150200.24.129.1.s390x",
            "SUSE Linux Enterprise Server 15 SP2-LTSS:reiserfs-kmp-default-5.3.18-150200.24.129.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-5.3.18-150200.24.129.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-5.3.18-150200.24.129.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-base-5.3.18-150200.24.129.1.150200.9.61.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-base-5.3.18-150200.24.129.1.150200.9.61.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-devel-5.3.18-150200.24.129.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-devel-5.3.18-150200.24.129.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-devel-5.3.18-150200.24.129.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-docs-5.3.18-150200.24.129.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-macros-5.3.18-150200.24.129.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-obs-build-5.3.18-150200.24.129.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-obs-build-5.3.18-150200.24.129.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-preempt-5.3.18-150200.24.129.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-preempt-devel-5.3.18-150200.24.129.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-source-5.3.18-150200.24.129.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-syms-5.3.18-150200.24.129.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-syms-5.3.18-150200.24.129.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP2:reiserfs-kmp-default-5.3.18-150200.24.129.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP2:reiserfs-kmp-default-5.3.18-150200.24.129.1.x86_64",
            "SUSE Manager Proxy 4.1:kernel-default-5.3.18-150200.24.129.1.x86_64",
            "SUSE Manager Proxy 4.1:kernel-default-base-5.3.18-150200.24.129.1.150200.9.61.1.x86_64",
            "SUSE Manager Proxy 4.1:kernel-default-devel-5.3.18-150200.24.129.1.x86_64",
            "SUSE Manager Proxy 4.1:kernel-devel-5.3.18-150200.24.129.1.noarch",
            "SUSE Manager Proxy 4.1:kernel-docs-5.3.18-150200.24.129.1.noarch",
            "SUSE Manager Proxy 4.1:kernel-macros-5.3.18-150200.24.129.1.noarch",
            "SUSE Manager Proxy 4.1:kernel-obs-build-5.3.18-150200.24.129.1.x86_64",
            "SUSE Manager Proxy 4.1:kernel-preempt-5.3.18-150200.24.129.1.x86_64",
            "SUSE Manager Proxy 4.1:kernel-preempt-devel-5.3.18-150200.24.129.1.x86_64",
            "SUSE Manager Proxy 4.1:kernel-source-5.3.18-150200.24.129.1.noarch",
            "SUSE Manager Proxy 4.1:kernel-syms-5.3.18-150200.24.129.1.x86_64",
            "SUSE Manager Proxy 4.1:reiserfs-kmp-default-5.3.18-150200.24.129.1.x86_64",
            "SUSE Manager Retail Branch Server 4.1:kernel-default-5.3.18-150200.24.129.1.x86_64",
            "SUSE Manager Retail Branch Server 4.1:kernel-default-base-5.3.18-150200.24.129.1.150200.9.61.1.x86_64",
            "SUSE Manager Retail Branch Server 4.1:kernel-default-devel-5.3.18-150200.24.129.1.x86_64",
            "SUSE Manager Retail Branch Server 4.1:kernel-devel-5.3.18-150200.24.129.1.noarch",
            "SUSE Manager Retail Branch Server 4.1:kernel-docs-5.3.18-150200.24.129.1.noarch",
            "SUSE Manager Retail Branch Server 4.1:kernel-macros-5.3.18-150200.24.129.1.noarch",
            "SUSE Manager Retail Branch Server 4.1:kernel-obs-build-5.3.18-150200.24.129.1.x86_64",
            "SUSE Manager Retail Branch Server 4.1:kernel-preempt-5.3.18-150200.24.129.1.x86_64",
            "SUSE Manager Retail Branch Server 4.1:kernel-preempt-devel-5.3.18-150200.24.129.1.x86_64",
            "SUSE Manager Retail Branch Server 4.1:kernel-source-5.3.18-150200.24.129.1.noarch",
            "SUSE Manager Retail Branch Server 4.1:kernel-syms-5.3.18-150200.24.129.1.x86_64",
            "SUSE Manager Retail Branch Server 4.1:reiserfs-kmp-default-5.3.18-150200.24.129.1.x86_64",
            "SUSE Manager Server 4.1:kernel-default-5.3.18-150200.24.129.1.ppc64le",
            "SUSE Manager Server 4.1:kernel-default-5.3.18-150200.24.129.1.s390x",
            "SUSE Manager Server 4.1:kernel-default-5.3.18-150200.24.129.1.x86_64",
            "SUSE Manager Server 4.1:kernel-default-base-5.3.18-150200.24.129.1.150200.9.61.1.ppc64le",
            "SUSE Manager Server 4.1:kernel-default-base-5.3.18-150200.24.129.1.150200.9.61.1.s390x",
            "SUSE Manager Server 4.1:kernel-default-base-5.3.18-150200.24.129.1.150200.9.61.1.x86_64",
            "SUSE Manager Server 4.1:kernel-default-devel-5.3.18-150200.24.129.1.ppc64le",
            "SUSE Manager Server 4.1:kernel-default-devel-5.3.18-150200.24.129.1.s390x",
            "SUSE Manager Server 4.1:kernel-default-devel-5.3.18-150200.24.129.1.x86_64",
            "SUSE Manager Server 4.1:kernel-devel-5.3.18-150200.24.129.1.noarch",
            "SUSE Manager Server 4.1:kernel-docs-5.3.18-150200.24.129.1.noarch",
            "SUSE Manager Server 4.1:kernel-macros-5.3.18-150200.24.129.1.noarch",
            "SUSE Manager Server 4.1:kernel-obs-build-5.3.18-150200.24.129.1.ppc64le",
            "SUSE Manager Server 4.1:kernel-obs-build-5.3.18-150200.24.129.1.s390x",
            "SUSE Manager Server 4.1:kernel-obs-build-5.3.18-150200.24.129.1.x86_64",
            "SUSE Manager Server 4.1:kernel-preempt-5.3.18-150200.24.129.1.x86_64",
            "SUSE Manager Server 4.1:kernel-preempt-devel-5.3.18-150200.24.129.1.x86_64",
            "SUSE Manager Server 4.1:kernel-source-5.3.18-150200.24.129.1.noarch",
            "SUSE Manager Server 4.1:kernel-syms-5.3.18-150200.24.129.1.ppc64le",
            "SUSE Manager Server 4.1:kernel-syms-5.3.18-150200.24.129.1.s390x",
            "SUSE Manager Server 4.1:kernel-syms-5.3.18-150200.24.129.1.x86_64",
            "SUSE Manager Server 4.1:reiserfs-kmp-default-5.3.18-150200.24.129.1.ppc64le",
            "SUSE Manager Server 4.1:reiserfs-kmp-default-5.3.18-150200.24.129.1.s390x",
            "SUSE Manager Server 4.1:reiserfs-kmp-default-5.3.18-150200.24.129.1.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2022-09-28T06:48:59Z",
          "details": "important"
        }
      ],
      "title": "CVE-2022-29581"
    },
    {
      "cve": "CVE-2022-2977",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2022-2977"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "A flaw was found in the Linux kernel implementation of proxied virtualized TPM devices. On a system where virtualized TPM devices are configured (this is not the default) a local attacker can create a use-after-free and create a situation where it may be possible to escalate privileges on the system.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "SUSE Enterprise Storage 7:kernel-default-5.3.18-150200.24.129.1.aarch64",
          "SUSE Enterprise Storage 7:kernel-default-5.3.18-150200.24.129.1.x86_64",
          "SUSE Enterprise Storage 7:kernel-default-base-5.3.18-150200.24.129.1.150200.9.61.1.aarch64",
          "SUSE Enterprise Storage 7:kernel-default-base-5.3.18-150200.24.129.1.150200.9.61.1.x86_64",
          "SUSE Enterprise Storage 7:kernel-default-devel-5.3.18-150200.24.129.1.aarch64",
          "SUSE Enterprise Storage 7:kernel-default-devel-5.3.18-150200.24.129.1.x86_64",
          "SUSE Enterprise Storage 7:kernel-devel-5.3.18-150200.24.129.1.noarch",
          "SUSE Enterprise Storage 7:kernel-docs-5.3.18-150200.24.129.1.noarch",
          "SUSE Enterprise Storage 7:kernel-macros-5.3.18-150200.24.129.1.noarch",
          "SUSE Enterprise Storage 7:kernel-obs-build-5.3.18-150200.24.129.1.aarch64",
          "SUSE Enterprise Storage 7:kernel-obs-build-5.3.18-150200.24.129.1.x86_64",
          "SUSE Enterprise Storage 7:kernel-preempt-5.3.18-150200.24.129.1.aarch64",
          "SUSE Enterprise Storage 7:kernel-preempt-5.3.18-150200.24.129.1.x86_64",
          "SUSE Enterprise Storage 7:kernel-preempt-devel-5.3.18-150200.24.129.1.aarch64",
          "SUSE Enterprise Storage 7:kernel-preempt-devel-5.3.18-150200.24.129.1.x86_64",
          "SUSE Enterprise Storage 7:kernel-source-5.3.18-150200.24.129.1.noarch",
          "SUSE Enterprise Storage 7:kernel-syms-5.3.18-150200.24.129.1.aarch64",
          "SUSE Enterprise Storage 7:kernel-syms-5.3.18-150200.24.129.1.x86_64",
          "SUSE Enterprise Storage 7:reiserfs-kmp-default-5.3.18-150200.24.129.1.aarch64",
          "SUSE Enterprise Storage 7:reiserfs-kmp-default-5.3.18-150200.24.129.1.x86_64",
          "SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-150200.24.129.1.aarch64",
          "SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-150200.24.129.1.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-150200.24.129.1.s390x",
          "SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-150200.24.129.1.x86_64",
          "SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-150200.24.129.1.aarch64",
          "SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-150200.24.129.1.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-150200.24.129.1.s390x",
          "SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-150200.24.129.1.x86_64",
          "SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-150200.24.129.1.aarch64",
          "SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-150200.24.129.1.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-150200.24.129.1.s390x",
          "SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-150200.24.129.1.x86_64",
          "SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-150200.24.129.1.aarch64",
          "SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-150200.24.129.1.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-150200.24.129.1.s390x",
          "SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-150200.24.129.1.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-default-5.3.18-150200.24.129.1.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-default-5.3.18-150200.24.129.1.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-default-base-5.3.18-150200.24.129.1.150200.9.61.1.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-default-base-5.3.18-150200.24.129.1.150200.9.61.1.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-default-devel-5.3.18-150200.24.129.1.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-default-devel-5.3.18-150200.24.129.1.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-devel-5.3.18-150200.24.129.1.noarch",
          "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-docs-5.3.18-150200.24.129.1.noarch",
          "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-macros-5.3.18-150200.24.129.1.noarch",
          "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-obs-build-5.3.18-150200.24.129.1.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-obs-build-5.3.18-150200.24.129.1.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-preempt-5.3.18-150200.24.129.1.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-preempt-5.3.18-150200.24.129.1.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-preempt-devel-5.3.18-150200.24.129.1.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-preempt-devel-5.3.18-150200.24.129.1.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-source-5.3.18-150200.24.129.1.noarch",
          "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-syms-5.3.18-150200.24.129.1.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-syms-5.3.18-150200.24.129.1.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-5.3.18-150200.24.129.1.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-5.3.18-150200.24.129.1.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.129.1.150200.9.61.1.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.129.1.150200.9.61.1.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.129.1.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.129.1.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-devel-5.3.18-150200.24.129.1.noarch",
          "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-docs-5.3.18-150200.24.129.1.noarch",
          "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-macros-5.3.18-150200.24.129.1.noarch",
          "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.129.1.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.129.1.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-preempt-5.3.18-150200.24.129.1.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-preempt-5.3.18-150200.24.129.1.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-preempt-devel-5.3.18-150200.24.129.1.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-preempt-devel-5.3.18-150200.24.129.1.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-source-5.3.18-150200.24.129.1.noarch",
          "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.129.1.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.129.1.x86_64",
          "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-5.3.18-150200.24.129.1.ppc64le",
          "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-5.3.18-150200.24.129.1.s390x",
          "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-5.3.18-150200.24.129.1.x86_64",
          "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-devel-5.3.18-150200.24.129.1.ppc64le",
          "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-devel-5.3.18-150200.24.129.1.s390x",
          "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-devel-5.3.18-150200.24.129.1.x86_64",
          "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-150200_24_129-default-1-150200.5.3.1.ppc64le",
          "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-150200_24_129-default-1-150200.5.3.1.s390x",
          "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-150200_24_129-default-1-150200.5.3.1.x86_64",
          "SUSE Linux Enterprise Server 15 SP2-BCL:kernel-default-5.3.18-150200.24.129.1.x86_64",
          "SUSE Linux Enterprise Server 15 SP2-BCL:kernel-default-base-5.3.18-150200.24.129.1.150200.9.61.1.x86_64",
          "SUSE Linux Enterprise Server 15 SP2-BCL:kernel-default-devel-5.3.18-150200.24.129.1.x86_64",
          "SUSE Linux Enterprise Server 15 SP2-BCL:kernel-devel-5.3.18-150200.24.129.1.noarch",
          "SUSE Linux Enterprise Server 15 SP2-BCL:kernel-docs-5.3.18-150200.24.129.1.noarch",
          "SUSE Linux Enterprise Server 15 SP2-BCL:kernel-macros-5.3.18-150200.24.129.1.noarch",
          "SUSE Linux Enterprise Server 15 SP2-BCL:kernel-obs-build-5.3.18-150200.24.129.1.x86_64",
          "SUSE Linux Enterprise Server 15 SP2-BCL:kernel-preempt-5.3.18-150200.24.129.1.x86_64",
          "SUSE Linux Enterprise Server 15 SP2-BCL:kernel-preempt-devel-5.3.18-150200.24.129.1.x86_64",
          "SUSE Linux Enterprise Server 15 SP2-BCL:kernel-source-5.3.18-150200.24.129.1.noarch",
          "SUSE Linux Enterprise Server 15 SP2-BCL:kernel-syms-5.3.18-150200.24.129.1.x86_64",
          "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-5.3.18-150200.24.129.1.aarch64",
          "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-5.3.18-150200.24.129.1.ppc64le",
          "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-5.3.18-150200.24.129.1.s390x",
          "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-5.3.18-150200.24.129.1.x86_64",
          "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.129.1.150200.9.61.1.aarch64",
          "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.129.1.150200.9.61.1.ppc64le",
          "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.129.1.150200.9.61.1.s390x",
          "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.129.1.150200.9.61.1.x86_64",
          "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.129.1.aarch64",
          "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.129.1.ppc64le",
          "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.129.1.s390x",
          "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.129.1.x86_64",
          "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-devel-5.3.18-150200.24.129.1.noarch",
          "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-docs-5.3.18-150200.24.129.1.noarch",
          "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-macros-5.3.18-150200.24.129.1.noarch",
          "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.129.1.aarch64",
          "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.129.1.ppc64le",
          "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.129.1.s390x",
          "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.129.1.x86_64",
          "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-preempt-5.3.18-150200.24.129.1.aarch64",
          "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-preempt-5.3.18-150200.24.129.1.x86_64",
          "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-preempt-devel-5.3.18-150200.24.129.1.aarch64",
          "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-preempt-devel-5.3.18-150200.24.129.1.x86_64",
          "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-source-5.3.18-150200.24.129.1.noarch",
          "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.129.1.aarch64",
          "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.129.1.ppc64le",
          "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.129.1.s390x",
          "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.129.1.x86_64",
          "SUSE Linux Enterprise Server 15 SP2-LTSS:reiserfs-kmp-default-5.3.18-150200.24.129.1.aarch64",
          "SUSE Linux Enterprise Server 15 SP2-LTSS:reiserfs-kmp-default-5.3.18-150200.24.129.1.ppc64le",
          "SUSE Linux Enterprise Server 15 SP2-LTSS:reiserfs-kmp-default-5.3.18-150200.24.129.1.s390x",
          "SUSE Linux Enterprise Server 15 SP2-LTSS:reiserfs-kmp-default-5.3.18-150200.24.129.1.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-5.3.18-150200.24.129.1.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-5.3.18-150200.24.129.1.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-base-5.3.18-150200.24.129.1.150200.9.61.1.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-base-5.3.18-150200.24.129.1.150200.9.61.1.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-devel-5.3.18-150200.24.129.1.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-devel-5.3.18-150200.24.129.1.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-devel-5.3.18-150200.24.129.1.noarch",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-docs-5.3.18-150200.24.129.1.noarch",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-macros-5.3.18-150200.24.129.1.noarch",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-obs-build-5.3.18-150200.24.129.1.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-obs-build-5.3.18-150200.24.129.1.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-preempt-5.3.18-150200.24.129.1.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-preempt-devel-5.3.18-150200.24.129.1.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-source-5.3.18-150200.24.129.1.noarch",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-syms-5.3.18-150200.24.129.1.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-syms-5.3.18-150200.24.129.1.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP2:reiserfs-kmp-default-5.3.18-150200.24.129.1.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP2:reiserfs-kmp-default-5.3.18-150200.24.129.1.x86_64",
          "SUSE Manager Proxy 4.1:kernel-default-5.3.18-150200.24.129.1.x86_64",
          "SUSE Manager Proxy 4.1:kernel-default-base-5.3.18-150200.24.129.1.150200.9.61.1.x86_64",
          "SUSE Manager Proxy 4.1:kernel-default-devel-5.3.18-150200.24.129.1.x86_64",
          "SUSE Manager Proxy 4.1:kernel-devel-5.3.18-150200.24.129.1.noarch",
          "SUSE Manager Proxy 4.1:kernel-docs-5.3.18-150200.24.129.1.noarch",
          "SUSE Manager Proxy 4.1:kernel-macros-5.3.18-150200.24.129.1.noarch",
          "SUSE Manager Proxy 4.1:kernel-obs-build-5.3.18-150200.24.129.1.x86_64",
          "SUSE Manager Proxy 4.1:kernel-preempt-5.3.18-150200.24.129.1.x86_64",
          "SUSE Manager Proxy 4.1:kernel-preempt-devel-5.3.18-150200.24.129.1.x86_64",
          "SUSE Manager Proxy 4.1:kernel-source-5.3.18-150200.24.129.1.noarch",
          "SUSE Manager Proxy 4.1:kernel-syms-5.3.18-150200.24.129.1.x86_64",
          "SUSE Manager Proxy 4.1:reiserfs-kmp-default-5.3.18-150200.24.129.1.x86_64",
          "SUSE Manager Retail Branch Server 4.1:kernel-default-5.3.18-150200.24.129.1.x86_64",
          "SUSE Manager Retail Branch Server 4.1:kernel-default-base-5.3.18-150200.24.129.1.150200.9.61.1.x86_64",
          "SUSE Manager Retail Branch Server 4.1:kernel-default-devel-5.3.18-150200.24.129.1.x86_64",
          "SUSE Manager Retail Branch Server 4.1:kernel-devel-5.3.18-150200.24.129.1.noarch",
          "SUSE Manager Retail Branch Server 4.1:kernel-docs-5.3.18-150200.24.129.1.noarch",
          "SUSE Manager Retail Branch Server 4.1:kernel-macros-5.3.18-150200.24.129.1.noarch",
          "SUSE Manager Retail Branch Server 4.1:kernel-obs-build-5.3.18-150200.24.129.1.x86_64",
          "SUSE Manager Retail Branch Server 4.1:kernel-preempt-5.3.18-150200.24.129.1.x86_64",
          "SUSE Manager Retail Branch Server 4.1:kernel-preempt-devel-5.3.18-150200.24.129.1.x86_64",
          "SUSE Manager Retail Branch Server 4.1:kernel-source-5.3.18-150200.24.129.1.noarch",
          "SUSE Manager Retail Branch Server 4.1:kernel-syms-5.3.18-150200.24.129.1.x86_64",
          "SUSE Manager Retail Branch Server 4.1:reiserfs-kmp-default-5.3.18-150200.24.129.1.x86_64",
          "SUSE Manager Server 4.1:kernel-default-5.3.18-150200.24.129.1.ppc64le",
          "SUSE Manager Server 4.1:kernel-default-5.3.18-150200.24.129.1.s390x",
          "SUSE Manager Server 4.1:kernel-default-5.3.18-150200.24.129.1.x86_64",
          "SUSE Manager Server 4.1:kernel-default-base-5.3.18-150200.24.129.1.150200.9.61.1.ppc64le",
          "SUSE Manager Server 4.1:kernel-default-base-5.3.18-150200.24.129.1.150200.9.61.1.s390x",
          "SUSE Manager Server 4.1:kernel-default-base-5.3.18-150200.24.129.1.150200.9.61.1.x86_64",
          "SUSE Manager Server 4.1:kernel-default-devel-5.3.18-150200.24.129.1.ppc64le",
          "SUSE Manager Server 4.1:kernel-default-devel-5.3.18-150200.24.129.1.s390x",
          "SUSE Manager Server 4.1:kernel-default-devel-5.3.18-150200.24.129.1.x86_64",
          "SUSE Manager Server 4.1:kernel-devel-5.3.18-150200.24.129.1.noarch",
          "SUSE Manager Server 4.1:kernel-docs-5.3.18-150200.24.129.1.noarch",
          "SUSE Manager Server 4.1:kernel-macros-5.3.18-150200.24.129.1.noarch",
          "SUSE Manager Server 4.1:kernel-obs-build-5.3.18-150200.24.129.1.ppc64le",
          "SUSE Manager Server 4.1:kernel-obs-build-5.3.18-150200.24.129.1.s390x",
          "SUSE Manager Server 4.1:kernel-obs-build-5.3.18-150200.24.129.1.x86_64",
          "SUSE Manager Server 4.1:kernel-preempt-5.3.18-150200.24.129.1.x86_64",
          "SUSE Manager Server 4.1:kernel-preempt-devel-5.3.18-150200.24.129.1.x86_64",
          "SUSE Manager Server 4.1:kernel-source-5.3.18-150200.24.129.1.noarch",
          "SUSE Manager Server 4.1:kernel-syms-5.3.18-150200.24.129.1.ppc64le",
          "SUSE Manager Server 4.1:kernel-syms-5.3.18-150200.24.129.1.s390x",
          "SUSE Manager Server 4.1:kernel-syms-5.3.18-150200.24.129.1.x86_64",
          "SUSE Manager Server 4.1:reiserfs-kmp-default-5.3.18-150200.24.129.1.ppc64le",
          "SUSE Manager Server 4.1:reiserfs-kmp-default-5.3.18-150200.24.129.1.s390x",
          "SUSE Manager Server 4.1:reiserfs-kmp-default-5.3.18-150200.24.129.1.x86_64"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2022-2977",
          "url": "https://www.suse.com/security/cve/CVE-2022-2977"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1202672 for CVE-2022-2977",
          "url": "https://bugzilla.suse.com/1202672"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "SUSE Enterprise Storage 7:kernel-default-5.3.18-150200.24.129.1.aarch64",
            "SUSE Enterprise Storage 7:kernel-default-5.3.18-150200.24.129.1.x86_64",
            "SUSE Enterprise Storage 7:kernel-default-base-5.3.18-150200.24.129.1.150200.9.61.1.aarch64",
            "SUSE Enterprise Storage 7:kernel-default-base-5.3.18-150200.24.129.1.150200.9.61.1.x86_64",
            "SUSE Enterprise Storage 7:kernel-default-devel-5.3.18-150200.24.129.1.aarch64",
            "SUSE Enterprise Storage 7:kernel-default-devel-5.3.18-150200.24.129.1.x86_64",
            "SUSE Enterprise Storage 7:kernel-devel-5.3.18-150200.24.129.1.noarch",
            "SUSE Enterprise Storage 7:kernel-docs-5.3.18-150200.24.129.1.noarch",
            "SUSE Enterprise Storage 7:kernel-macros-5.3.18-150200.24.129.1.noarch",
            "SUSE Enterprise Storage 7:kernel-obs-build-5.3.18-150200.24.129.1.aarch64",
            "SUSE Enterprise Storage 7:kernel-obs-build-5.3.18-150200.24.129.1.x86_64",
            "SUSE Enterprise Storage 7:kernel-preempt-5.3.18-150200.24.129.1.aarch64",
            "SUSE Enterprise Storage 7:kernel-preempt-5.3.18-150200.24.129.1.x86_64",
            "SUSE Enterprise Storage 7:kernel-preempt-devel-5.3.18-150200.24.129.1.aarch64",
            "SUSE Enterprise Storage 7:kernel-preempt-devel-5.3.18-150200.24.129.1.x86_64",
            "SUSE Enterprise Storage 7:kernel-source-5.3.18-150200.24.129.1.noarch",
            "SUSE Enterprise Storage 7:kernel-syms-5.3.18-150200.24.129.1.aarch64",
            "SUSE Enterprise Storage 7:kernel-syms-5.3.18-150200.24.129.1.x86_64",
            "SUSE Enterprise Storage 7:reiserfs-kmp-default-5.3.18-150200.24.129.1.aarch64",
            "SUSE Enterprise Storage 7:reiserfs-kmp-default-5.3.18-150200.24.129.1.x86_64",
            "SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-150200.24.129.1.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-150200.24.129.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-150200.24.129.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-150200.24.129.1.x86_64",
            "SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-150200.24.129.1.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-150200.24.129.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-150200.24.129.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-150200.24.129.1.x86_64",
            "SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-150200.24.129.1.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-150200.24.129.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-150200.24.129.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-150200.24.129.1.x86_64",
            "SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-150200.24.129.1.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-150200.24.129.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-150200.24.129.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-150200.24.129.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-default-5.3.18-150200.24.129.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-default-5.3.18-150200.24.129.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-default-base-5.3.18-150200.24.129.1.150200.9.61.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-default-base-5.3.18-150200.24.129.1.150200.9.61.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-default-devel-5.3.18-150200.24.129.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-default-devel-5.3.18-150200.24.129.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-devel-5.3.18-150200.24.129.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-docs-5.3.18-150200.24.129.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-macros-5.3.18-150200.24.129.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-obs-build-5.3.18-150200.24.129.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-obs-build-5.3.18-150200.24.129.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-preempt-5.3.18-150200.24.129.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-preempt-5.3.18-150200.24.129.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-preempt-devel-5.3.18-150200.24.129.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-preempt-devel-5.3.18-150200.24.129.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-source-5.3.18-150200.24.129.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-syms-5.3.18-150200.24.129.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-syms-5.3.18-150200.24.129.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-5.3.18-150200.24.129.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-5.3.18-150200.24.129.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.129.1.150200.9.61.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.129.1.150200.9.61.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.129.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.129.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-devel-5.3.18-150200.24.129.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-docs-5.3.18-150200.24.129.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-macros-5.3.18-150200.24.129.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.129.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.129.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-preempt-5.3.18-150200.24.129.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-preempt-5.3.18-150200.24.129.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-preempt-devel-5.3.18-150200.24.129.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-preempt-devel-5.3.18-150200.24.129.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-source-5.3.18-150200.24.129.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.129.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.129.1.x86_64",
            "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-5.3.18-150200.24.129.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-5.3.18-150200.24.129.1.s390x",
            "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-5.3.18-150200.24.129.1.x86_64",
            "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-devel-5.3.18-150200.24.129.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-devel-5.3.18-150200.24.129.1.s390x",
            "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-devel-5.3.18-150200.24.129.1.x86_64",
            "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-150200_24_129-default-1-150200.5.3.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-150200_24_129-default-1-150200.5.3.1.s390x",
            "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-150200_24_129-default-1-150200.5.3.1.x86_64",
            "SUSE Linux Enterprise Server 15 SP2-BCL:kernel-default-5.3.18-150200.24.129.1.x86_64",
            "SUSE Linux Enterprise Server 15 SP2-BCL:kernel-default-base-5.3.18-150200.24.129.1.150200.9.61.1.x86_64",
            "SUSE Linux Enterprise Server 15 SP2-BCL:kernel-default-devel-5.3.18-150200.24.129.1.x86_64",
            "SUSE Linux Enterprise Server 15 SP2-BCL:kernel-devel-5.3.18-150200.24.129.1.noarch",
            "SUSE Linux Enterprise Server 15 SP2-BCL:kernel-docs-5.3.18-150200.24.129.1.noarch",
            "SUSE Linux Enterprise Server 15 SP2-BCL:kernel-macros-5.3.18-150200.24.129.1.noarch",
            "SUSE Linux Enterprise Server 15 SP2-BCL:kernel-obs-build-5.3.18-150200.24.129.1.x86_64",
            "SUSE Linux Enterprise Server 15 SP2-BCL:kernel-preempt-5.3.18-150200.24.129.1.x86_64",
            "SUSE Linux Enterprise Server 15 SP2-BCL:kernel-preempt-devel-5.3.18-150200.24.129.1.x86_64",
            "SUSE Linux Enterprise Server 15 SP2-BCL:kernel-source-5.3.18-150200.24.129.1.noarch",
            "SUSE Linux Enterprise Server 15 SP2-BCL:kernel-syms-5.3.18-150200.24.129.1.x86_64",
            "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-5.3.18-150200.24.129.1.aarch64",
            "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-5.3.18-150200.24.129.1.ppc64le",
            "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-5.3.18-150200.24.129.1.s390x",
            "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-5.3.18-150200.24.129.1.x86_64",
            "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.129.1.150200.9.61.1.aarch64",
            "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.129.1.150200.9.61.1.ppc64le",
            "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.129.1.150200.9.61.1.s390x",
            "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.129.1.150200.9.61.1.x86_64",
            "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.129.1.aarch64",
            "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.129.1.ppc64le",
            "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.129.1.s390x",
            "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.129.1.x86_64",
            "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-devel-5.3.18-150200.24.129.1.noarch",
            "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-docs-5.3.18-150200.24.129.1.noarch",
            "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-macros-5.3.18-150200.24.129.1.noarch",
            "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.129.1.aarch64",
            "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.129.1.ppc64le",
            "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.129.1.s390x",
            "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.129.1.x86_64",
            "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-preempt-5.3.18-150200.24.129.1.aarch64",
            "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-preempt-5.3.18-150200.24.129.1.x86_64",
            "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-preempt-devel-5.3.18-150200.24.129.1.aarch64",
            "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-preempt-devel-5.3.18-150200.24.129.1.x86_64",
            "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-source-5.3.18-150200.24.129.1.noarch",
            "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.129.1.aarch64",
            "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.129.1.ppc64le",
            "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.129.1.s390x",
            "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.129.1.x86_64",
            "SUSE Linux Enterprise Server 15 SP2-LTSS:reiserfs-kmp-default-5.3.18-150200.24.129.1.aarch64",
            "SUSE Linux Enterprise Server 15 SP2-LTSS:reiserfs-kmp-default-5.3.18-150200.24.129.1.ppc64le",
            "SUSE Linux Enterprise Server 15 SP2-LTSS:reiserfs-kmp-default-5.3.18-150200.24.129.1.s390x",
            "SUSE Linux Enterprise Server 15 SP2-LTSS:reiserfs-kmp-default-5.3.18-150200.24.129.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-5.3.18-150200.24.129.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-5.3.18-150200.24.129.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-base-5.3.18-150200.24.129.1.150200.9.61.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-base-5.3.18-150200.24.129.1.150200.9.61.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-devel-5.3.18-150200.24.129.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-devel-5.3.18-150200.24.129.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-devel-5.3.18-150200.24.129.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-docs-5.3.18-150200.24.129.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-macros-5.3.18-150200.24.129.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-obs-build-5.3.18-150200.24.129.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-obs-build-5.3.18-150200.24.129.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-preempt-5.3.18-150200.24.129.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-preempt-devel-5.3.18-150200.24.129.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-source-5.3.18-150200.24.129.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-syms-5.3.18-150200.24.129.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-syms-5.3.18-150200.24.129.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP2:reiserfs-kmp-default-5.3.18-150200.24.129.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP2:reiserfs-kmp-default-5.3.18-150200.24.129.1.x86_64",
            "SUSE Manager Proxy 4.1:kernel-default-5.3.18-150200.24.129.1.x86_64",
            "SUSE Manager Proxy 4.1:kernel-default-base-5.3.18-150200.24.129.1.150200.9.61.1.x86_64",
            "SUSE Manager Proxy 4.1:kernel-default-devel-5.3.18-150200.24.129.1.x86_64",
            "SUSE Manager Proxy 4.1:kernel-devel-5.3.18-150200.24.129.1.noarch",
            "SUSE Manager Proxy 4.1:kernel-docs-5.3.18-150200.24.129.1.noarch",
            "SUSE Manager Proxy 4.1:kernel-macros-5.3.18-150200.24.129.1.noarch",
            "SUSE Manager Proxy 4.1:kernel-obs-build-5.3.18-150200.24.129.1.x86_64",
            "SUSE Manager Proxy 4.1:kernel-preempt-5.3.18-150200.24.129.1.x86_64",
            "SUSE Manager Proxy 4.1:kernel-preempt-devel-5.3.18-150200.24.129.1.x86_64",
            "SUSE Manager Proxy 4.1:kernel-source-5.3.18-150200.24.129.1.noarch",
            "SUSE Manager Proxy 4.1:kernel-syms-5.3.18-150200.24.129.1.x86_64",
            "SUSE Manager Proxy 4.1:reiserfs-kmp-default-5.3.18-150200.24.129.1.x86_64",
            "SUSE Manager Retail Branch Server 4.1:kernel-default-5.3.18-150200.24.129.1.x86_64",
            "SUSE Manager Retail Branch Server 4.1:kernel-default-base-5.3.18-150200.24.129.1.150200.9.61.1.x86_64",
            "SUSE Manager Retail Branch Server 4.1:kernel-default-devel-5.3.18-150200.24.129.1.x86_64",
            "SUSE Manager Retail Branch Server 4.1:kernel-devel-5.3.18-150200.24.129.1.noarch",
            "SUSE Manager Retail Branch Server 4.1:kernel-docs-5.3.18-150200.24.129.1.noarch",
            "SUSE Manager Retail Branch Server 4.1:kernel-macros-5.3.18-150200.24.129.1.noarch",
            "SUSE Manager Retail Branch Server 4.1:kernel-obs-build-5.3.18-150200.24.129.1.x86_64",
            "SUSE Manager Retail Branch Server 4.1:kernel-preempt-5.3.18-150200.24.129.1.x86_64",
            "SUSE Manager Retail Branch Server 4.1:kernel-preempt-devel-5.3.18-150200.24.129.1.x86_64",
            "SUSE Manager Retail Branch Server 4.1:kernel-source-5.3.18-150200.24.129.1.noarch",
            "SUSE Manager Retail Branch Server 4.1:kernel-syms-5.3.18-150200.24.129.1.x86_64",
            "SUSE Manager Retail Branch Server 4.1:reiserfs-kmp-default-5.3.18-150200.24.129.1.x86_64",
            "SUSE Manager Server 4.1:kernel-default-5.3.18-150200.24.129.1.ppc64le",
            "SUSE Manager Server 4.1:kernel-default-5.3.18-150200.24.129.1.s390x",
            "SUSE Manager Server 4.1:kernel-default-5.3.18-150200.24.129.1.x86_64",
            "SUSE Manager Server 4.1:kernel-default-base-5.3.18-150200.24.129.1.150200.9.61.1.ppc64le",
            "SUSE Manager Server 4.1:kernel-default-base-5.3.18-150200.24.129.1.150200.9.61.1.s390x",
            "SUSE Manager Server 4.1:kernel-default-base-5.3.18-150200.24.129.1.150200.9.61.1.x86_64",
            "SUSE Manager Server 4.1:kernel-default-devel-5.3.18-150200.24.129.1.ppc64le",
            "SUSE Manager Server 4.1:kernel-default-devel-5.3.18-150200.24.129.1.s390x",
            "SUSE Manager Server 4.1:kernel-default-devel-5.3.18-150200.24.129.1.x86_64",
            "SUSE Manager Server 4.1:kernel-devel-5.3.18-150200.24.129.1.noarch",
            "SUSE Manager Server 4.1:kernel-docs-5.3.18-150200.24.129.1.noarch",
            "SUSE Manager Server 4.1:kernel-macros-5.3.18-150200.24.129.1.noarch",
            "SUSE Manager Server 4.1:kernel-obs-build-5.3.18-150200.24.129.1.ppc64le",
            "SUSE Manager Server 4.1:kernel-obs-build-5.3.18-150200.24.129.1.s390x",
            "SUSE Manager Server 4.1:kernel-obs-build-5.3.18-150200.24.129.1.x86_64",
            "SUSE Manager Server 4.1:kernel-preempt-5.3.18-150200.24.129.1.x86_64",
            "SUSE Manager Server 4.1:kernel-preempt-devel-5.3.18-150200.24.129.1.x86_64",
            "SUSE Manager Server 4.1:kernel-source-5.3.18-150200.24.129.1.noarch",
            "SUSE Manager Server 4.1:kernel-syms-5.3.18-150200.24.129.1.ppc64le",
            "SUSE Manager Server 4.1:kernel-syms-5.3.18-150200.24.129.1.s390x",
            "SUSE Manager Server 4.1:kernel-syms-5.3.18-150200.24.129.1.x86_64",
            "SUSE Manager Server 4.1:reiserfs-kmp-default-5.3.18-150200.24.129.1.ppc64le",
            "SUSE Manager Server 4.1:reiserfs-kmp-default-5.3.18-150200.24.129.1.s390x",
            "SUSE Manager Server 4.1:reiserfs-kmp-default-5.3.18-150200.24.129.1.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 4.2,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:R/S:U/C:N/I:N/A:H",
            "version": "3.1"
          },
          "products": [
            "SUSE Enterprise Storage 7:kernel-default-5.3.18-150200.24.129.1.aarch64",
            "SUSE Enterprise Storage 7:kernel-default-5.3.18-150200.24.129.1.x86_64",
            "SUSE Enterprise Storage 7:kernel-default-base-5.3.18-150200.24.129.1.150200.9.61.1.aarch64",
            "SUSE Enterprise Storage 7:kernel-default-base-5.3.18-150200.24.129.1.150200.9.61.1.x86_64",
            "SUSE Enterprise Storage 7:kernel-default-devel-5.3.18-150200.24.129.1.aarch64",
            "SUSE Enterprise Storage 7:kernel-default-devel-5.3.18-150200.24.129.1.x86_64",
            "SUSE Enterprise Storage 7:kernel-devel-5.3.18-150200.24.129.1.noarch",
            "SUSE Enterprise Storage 7:kernel-docs-5.3.18-150200.24.129.1.noarch",
            "SUSE Enterprise Storage 7:kernel-macros-5.3.18-150200.24.129.1.noarch",
            "SUSE Enterprise Storage 7:kernel-obs-build-5.3.18-150200.24.129.1.aarch64",
            "SUSE Enterprise Storage 7:kernel-obs-build-5.3.18-150200.24.129.1.x86_64",
            "SUSE Enterprise Storage 7:kernel-preempt-5.3.18-150200.24.129.1.aarch64",
            "SUSE Enterprise Storage 7:kernel-preempt-5.3.18-150200.24.129.1.x86_64",
            "SUSE Enterprise Storage 7:kernel-preempt-devel-5.3.18-150200.24.129.1.aarch64",
            "SUSE Enterprise Storage 7:kernel-preempt-devel-5.3.18-150200.24.129.1.x86_64",
            "SUSE Enterprise Storage 7:kernel-source-5.3.18-150200.24.129.1.noarch",
            "SUSE Enterprise Storage 7:kernel-syms-5.3.18-150200.24.129.1.aarch64",
            "SUSE Enterprise Storage 7:kernel-syms-5.3.18-150200.24.129.1.x86_64",
            "SUSE Enterprise Storage 7:reiserfs-kmp-default-5.3.18-150200.24.129.1.aarch64",
            "SUSE Enterprise Storage 7:reiserfs-kmp-default-5.3.18-150200.24.129.1.x86_64",
            "SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-150200.24.129.1.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-150200.24.129.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-150200.24.129.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-150200.24.129.1.x86_64",
            "SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-150200.24.129.1.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-150200.24.129.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-150200.24.129.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-150200.24.129.1.x86_64",
            "SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-150200.24.129.1.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-150200.24.129.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-150200.24.129.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-150200.24.129.1.x86_64",
            "SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-150200.24.129.1.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-150200.24.129.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-150200.24.129.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-150200.24.129.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-default-5.3.18-150200.24.129.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-default-5.3.18-150200.24.129.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-default-base-5.3.18-150200.24.129.1.150200.9.61.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-default-base-5.3.18-150200.24.129.1.150200.9.61.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-default-devel-5.3.18-150200.24.129.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-default-devel-5.3.18-150200.24.129.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-devel-5.3.18-150200.24.129.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-docs-5.3.18-150200.24.129.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-macros-5.3.18-150200.24.129.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-obs-build-5.3.18-150200.24.129.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-obs-build-5.3.18-150200.24.129.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-preempt-5.3.18-150200.24.129.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-preempt-5.3.18-150200.24.129.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-preempt-devel-5.3.18-150200.24.129.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-preempt-devel-5.3.18-150200.24.129.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-source-5.3.18-150200.24.129.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-syms-5.3.18-150200.24.129.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-syms-5.3.18-150200.24.129.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-5.3.18-150200.24.129.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-5.3.18-150200.24.129.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.129.1.150200.9.61.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.129.1.150200.9.61.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.129.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.129.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-devel-5.3.18-150200.24.129.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-docs-5.3.18-150200.24.129.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-macros-5.3.18-150200.24.129.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.129.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.129.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-preempt-5.3.18-150200.24.129.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-preempt-5.3.18-150200.24.129.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-preempt-devel-5.3.18-150200.24.129.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-preempt-devel-5.3.18-150200.24.129.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-source-5.3.18-150200.24.129.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.129.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.129.1.x86_64",
            "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-5.3.18-150200.24.129.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-5.3.18-150200.24.129.1.s390x",
            "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-5.3.18-150200.24.129.1.x86_64",
            "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-devel-5.3.18-150200.24.129.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-devel-5.3.18-150200.24.129.1.s390x",
            "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-devel-5.3.18-150200.24.129.1.x86_64",
            "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-150200_24_129-default-1-150200.5.3.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-150200_24_129-default-1-150200.5.3.1.s390x",
            "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-150200_24_129-default-1-150200.5.3.1.x86_64",
            "SUSE Linux Enterprise Server 15 SP2-BCL:kernel-default-5.3.18-150200.24.129.1.x86_64",
            "SUSE Linux Enterprise Server 15 SP2-BCL:kernel-default-base-5.3.18-150200.24.129.1.150200.9.61.1.x86_64",
            "SUSE Linux Enterprise Server 15 SP2-BCL:kernel-default-devel-5.3.18-150200.24.129.1.x86_64",
            "SUSE Linux Enterprise Server 15 SP2-BCL:kernel-devel-5.3.18-150200.24.129.1.noarch",
            "SUSE Linux Enterprise Server 15 SP2-BCL:kernel-docs-5.3.18-150200.24.129.1.noarch",
            "SUSE Linux Enterprise Server 15 SP2-BCL:kernel-macros-5.3.18-150200.24.129.1.noarch",
            "SUSE Linux Enterprise Server 15 SP2-BCL:kernel-obs-build-5.3.18-150200.24.129.1.x86_64",
            "SUSE Linux Enterprise Server 15 SP2-BCL:kernel-preempt-5.3.18-150200.24.129.1.x86_64",
            "SUSE Linux Enterprise Server 15 SP2-BCL:kernel-preempt-devel-5.3.18-150200.24.129.1.x86_64",
            "SUSE Linux Enterprise Server 15 SP2-BCL:kernel-source-5.3.18-150200.24.129.1.noarch",
            "SUSE Linux Enterprise Server 15 SP2-BCL:kernel-syms-5.3.18-150200.24.129.1.x86_64",
            "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-5.3.18-150200.24.129.1.aarch64",
            "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-5.3.18-150200.24.129.1.ppc64le",
            "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-5.3.18-150200.24.129.1.s390x",
            "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-5.3.18-150200.24.129.1.x86_64",
            "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.129.1.150200.9.61.1.aarch64",
            "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.129.1.150200.9.61.1.ppc64le",
            "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.129.1.150200.9.61.1.s390x",
            "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.129.1.150200.9.61.1.x86_64",
            "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.129.1.aarch64",
            "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.129.1.ppc64le",
            "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.129.1.s390x",
            "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.129.1.x86_64",
            "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-devel-5.3.18-150200.24.129.1.noarch",
            "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-docs-5.3.18-150200.24.129.1.noarch",
            "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-macros-5.3.18-150200.24.129.1.noarch",
            "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.129.1.aarch64",
            "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.129.1.ppc64le",
            "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.129.1.s390x",
            "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.129.1.x86_64",
            "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-preempt-5.3.18-150200.24.129.1.aarch64",
            "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-preempt-5.3.18-150200.24.129.1.x86_64",
            "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-preempt-devel-5.3.18-150200.24.129.1.aarch64",
            "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-preempt-devel-5.3.18-150200.24.129.1.x86_64",
            "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-source-5.3.18-150200.24.129.1.noarch",
            "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.129.1.aarch64",
            "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.129.1.ppc64le",
            "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.129.1.s390x",
            "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.129.1.x86_64",
            "SUSE Linux Enterprise Server 15 SP2-LTSS:reiserfs-kmp-default-5.3.18-150200.24.129.1.aarch64",
            "SUSE Linux Enterprise Server 15 SP2-LTSS:reiserfs-kmp-default-5.3.18-150200.24.129.1.ppc64le",
            "SUSE Linux Enterprise Server 15 SP2-LTSS:reiserfs-kmp-default-5.3.18-150200.24.129.1.s390x",
            "SUSE Linux Enterprise Server 15 SP2-LTSS:reiserfs-kmp-default-5.3.18-150200.24.129.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-5.3.18-150200.24.129.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-5.3.18-150200.24.129.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-base-5.3.18-150200.24.129.1.150200.9.61.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-base-5.3.18-150200.24.129.1.150200.9.61.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-devel-5.3.18-150200.24.129.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-devel-5.3.18-150200.24.129.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-devel-5.3.18-150200.24.129.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-docs-5.3.18-150200.24.129.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-macros-5.3.18-150200.24.129.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-obs-build-5.3.18-150200.24.129.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-obs-build-5.3.18-150200.24.129.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-preempt-5.3.18-150200.24.129.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-preempt-devel-5.3.18-150200.24.129.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-source-5.3.18-150200.24.129.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-syms-5.3.18-150200.24.129.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-syms-5.3.18-150200.24.129.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP2:reiserfs-kmp-default-5.3.18-150200.24.129.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP2:reiserfs-kmp-default-5.3.18-150200.24.129.1.x86_64",
            "SUSE Manager Proxy 4.1:kernel-default-5.3.18-150200.24.129.1.x86_64",
            "SUSE Manager Proxy 4.1:kernel-default-base-5.3.18-150200.24.129.1.150200.9.61.1.x86_64",
            "SUSE Manager Proxy 4.1:kernel-default-devel-5.3.18-150200.24.129.1.x86_64",
            "SUSE Manager Proxy 4.1:kernel-devel-5.3.18-150200.24.129.1.noarch",
            "SUSE Manager Proxy 4.1:kernel-docs-5.3.18-150200.24.129.1.noarch",
            "SUSE Manager Proxy 4.1:kernel-macros-5.3.18-150200.24.129.1.noarch",
            "SUSE Manager Proxy 4.1:kernel-obs-build-5.3.18-150200.24.129.1.x86_64",
            "SUSE Manager Proxy 4.1:kernel-preempt-5.3.18-150200.24.129.1.x86_64",
            "SUSE Manager Proxy 4.1:kernel-preempt-devel-5.3.18-150200.24.129.1.x86_64",
            "SUSE Manager Proxy 4.1:kernel-source-5.3.18-150200.24.129.1.noarch",
            "SUSE Manager Proxy 4.1:kernel-syms-5.3.18-150200.24.129.1.x86_64",
            "SUSE Manager Proxy 4.1:reiserfs-kmp-default-5.3.18-150200.24.129.1.x86_64",
            "SUSE Manager Retail Branch Server 4.1:kernel-default-5.3.18-150200.24.129.1.x86_64",
            "SUSE Manager Retail Branch Server 4.1:kernel-default-base-5.3.18-150200.24.129.1.150200.9.61.1.x86_64",
            "SUSE Manager Retail Branch Server 4.1:kernel-default-devel-5.3.18-150200.24.129.1.x86_64",
            "SUSE Manager Retail Branch Server 4.1:kernel-devel-5.3.18-150200.24.129.1.noarch",
            "SUSE Manager Retail Branch Server 4.1:kernel-docs-5.3.18-150200.24.129.1.noarch",
            "SUSE Manager Retail Branch Server 4.1:kernel-macros-5.3.18-150200.24.129.1.noarch",
            "SUSE Manager Retail Branch Server 4.1:kernel-obs-build-5.3.18-150200.24.129.1.x86_64",
            "SUSE Manager Retail Branch Server 4.1:kernel-preempt-5.3.18-150200.24.129.1.x86_64",
            "SUSE Manager Retail Branch Server 4.1:kernel-preempt-devel-5.3.18-150200.24.129.1.x86_64",
            "SUSE Manager Retail Branch Server 4.1:kernel-source-5.3.18-150200.24.129.1.noarch",
            "SUSE Manager Retail Branch Server 4.1:kernel-syms-5.3.18-150200.24.129.1.x86_64",
            "SUSE Manager Retail Branch Server 4.1:reiserfs-kmp-default-5.3.18-150200.24.129.1.x86_64",
            "SUSE Manager Server 4.1:kernel-default-5.3.18-150200.24.129.1.ppc64le",
            "SUSE Manager Server 4.1:kernel-default-5.3.18-150200.24.129.1.s390x",
            "SUSE Manager Server 4.1:kernel-default-5.3.18-150200.24.129.1.x86_64",
            "SUSE Manager Server 4.1:kernel-default-base-5.3.18-150200.24.129.1.150200.9.61.1.ppc64le",
            "SUSE Manager Server 4.1:kernel-default-base-5.3.18-150200.24.129.1.150200.9.61.1.s390x",
            "SUSE Manager Server 4.1:kernel-default-base-5.3.18-150200.24.129.1.150200.9.61.1.x86_64",
            "SUSE Manager Server 4.1:kernel-default-devel-5.3.18-150200.24.129.1.ppc64le",
            "SUSE Manager Server 4.1:kernel-default-devel-5.3.18-150200.24.129.1.s390x",
            "SUSE Manager Server 4.1:kernel-default-devel-5.3.18-150200.24.129.1.x86_64",
            "SUSE Manager Server 4.1:kernel-devel-5.3.18-150200.24.129.1.noarch",
            "SUSE Manager Server 4.1:kernel-docs-5.3.18-150200.24.129.1.noarch",
            "SUSE Manager Server 4.1:kernel-macros-5.3.18-150200.24.129.1.noarch",
            "SUSE Manager Server 4.1:kernel-obs-build-5.3.18-150200.24.129.1.ppc64le",
            "SUSE Manager Server 4.1:kernel-obs-build-5.3.18-150200.24.129.1.s390x",
            "SUSE Manager Server 4.1:kernel-obs-build-5.3.18-150200.24.129.1.x86_64",
            "SUSE Manager Server 4.1:kernel-preempt-5.3.18-150200.24.129.1.x86_64",
            "SUSE Manager Server 4.1:kernel-preempt-devel-5.3.18-150200.24.129.1.x86_64",
            "SUSE Manager Server 4.1:kernel-source-5.3.18-150200.24.129.1.noarch",
            "SUSE Manager Server 4.1:kernel-syms-5.3.18-150200.24.129.1.ppc64le",
            "SUSE Manager Server 4.1:kernel-syms-5.3.18-150200.24.129.1.s390x",
            "SUSE Manager Server 4.1:kernel-syms-5.3.18-150200.24.129.1.x86_64",
            "SUSE Manager Server 4.1:reiserfs-kmp-default-5.3.18-150200.24.129.1.ppc64le",
            "SUSE Manager Server 4.1:reiserfs-kmp-default-5.3.18-150200.24.129.1.s390x",
            "SUSE Manager Server 4.1:reiserfs-kmp-default-5.3.18-150200.24.129.1.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2022-09-28T06:48:59Z",
          "details": "moderate"
        }
      ],
      "title": "CVE-2022-2977"
    },
    {
      "cve": "CVE-2022-3028",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2022-3028"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "A race condition was found in the Linux kernel\u0027s IP framework for transforming packets (XFRM subsystem) when multiple calls to xfrm_probe_algs occurred simultaneously. This flaw could allow a local attacker to potentially trigger an out-of-bounds write or leak kernel heap memory by performing an out-of-bounds read and copying it into a socket.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "SUSE Enterprise Storage 7:kernel-default-5.3.18-150200.24.129.1.aarch64",
          "SUSE Enterprise Storage 7:kernel-default-5.3.18-150200.24.129.1.x86_64",
          "SUSE Enterprise Storage 7:kernel-default-base-5.3.18-150200.24.129.1.150200.9.61.1.aarch64",
          "SUSE Enterprise Storage 7:kernel-default-base-5.3.18-150200.24.129.1.150200.9.61.1.x86_64",
          "SUSE Enterprise Storage 7:kernel-default-devel-5.3.18-150200.24.129.1.aarch64",
          "SUSE Enterprise Storage 7:kernel-default-devel-5.3.18-150200.24.129.1.x86_64",
          "SUSE Enterprise Storage 7:kernel-devel-5.3.18-150200.24.129.1.noarch",
          "SUSE Enterprise Storage 7:kernel-docs-5.3.18-150200.24.129.1.noarch",
          "SUSE Enterprise Storage 7:kernel-macros-5.3.18-150200.24.129.1.noarch",
          "SUSE Enterprise Storage 7:kernel-obs-build-5.3.18-150200.24.129.1.aarch64",
          "SUSE Enterprise Storage 7:kernel-obs-build-5.3.18-150200.24.129.1.x86_64",
          "SUSE Enterprise Storage 7:kernel-preempt-5.3.18-150200.24.129.1.aarch64",
          "SUSE Enterprise Storage 7:kernel-preempt-5.3.18-150200.24.129.1.x86_64",
          "SUSE Enterprise Storage 7:kernel-preempt-devel-5.3.18-150200.24.129.1.aarch64",
          "SUSE Enterprise Storage 7:kernel-preempt-devel-5.3.18-150200.24.129.1.x86_64",
          "SUSE Enterprise Storage 7:kernel-source-5.3.18-150200.24.129.1.noarch",
          "SUSE Enterprise Storage 7:kernel-syms-5.3.18-150200.24.129.1.aarch64",
          "SUSE Enterprise Storage 7:kernel-syms-5.3.18-150200.24.129.1.x86_64",
          "SUSE Enterprise Storage 7:reiserfs-kmp-default-5.3.18-150200.24.129.1.aarch64",
          "SUSE Enterprise Storage 7:reiserfs-kmp-default-5.3.18-150200.24.129.1.x86_64",
          "SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-150200.24.129.1.aarch64",
          "SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-150200.24.129.1.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-150200.24.129.1.s390x",
          "SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-150200.24.129.1.x86_64",
          "SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-150200.24.129.1.aarch64",
          "SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-150200.24.129.1.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-150200.24.129.1.s390x",
          "SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-150200.24.129.1.x86_64",
          "SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-150200.24.129.1.aarch64",
          "SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-150200.24.129.1.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-150200.24.129.1.s390x",
          "SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-150200.24.129.1.x86_64",
          "SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-150200.24.129.1.aarch64",
          "SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-150200.24.129.1.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-150200.24.129.1.s390x",
          "SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-150200.24.129.1.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-default-5.3.18-150200.24.129.1.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-default-5.3.18-150200.24.129.1.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-default-base-5.3.18-150200.24.129.1.150200.9.61.1.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-default-base-5.3.18-150200.24.129.1.150200.9.61.1.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-default-devel-5.3.18-150200.24.129.1.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-default-devel-5.3.18-150200.24.129.1.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-devel-5.3.18-150200.24.129.1.noarch",
          "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-docs-5.3.18-150200.24.129.1.noarch",
          "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-macros-5.3.18-150200.24.129.1.noarch",
          "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-obs-build-5.3.18-150200.24.129.1.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-obs-build-5.3.18-150200.24.129.1.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-preempt-5.3.18-150200.24.129.1.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-preempt-5.3.18-150200.24.129.1.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-preempt-devel-5.3.18-150200.24.129.1.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-preempt-devel-5.3.18-150200.24.129.1.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-source-5.3.18-150200.24.129.1.noarch",
          "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-syms-5.3.18-150200.24.129.1.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-syms-5.3.18-150200.24.129.1.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-5.3.18-150200.24.129.1.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-5.3.18-150200.24.129.1.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.129.1.150200.9.61.1.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.129.1.150200.9.61.1.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.129.1.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.129.1.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-devel-5.3.18-150200.24.129.1.noarch",
          "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-docs-5.3.18-150200.24.129.1.noarch",
          "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-macros-5.3.18-150200.24.129.1.noarch",
          "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.129.1.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.129.1.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-preempt-5.3.18-150200.24.129.1.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-preempt-5.3.18-150200.24.129.1.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-preempt-devel-5.3.18-150200.24.129.1.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-preempt-devel-5.3.18-150200.24.129.1.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-source-5.3.18-150200.24.129.1.noarch",
          "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.129.1.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.129.1.x86_64",
          "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-5.3.18-150200.24.129.1.ppc64le",
          "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-5.3.18-150200.24.129.1.s390x",
          "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-5.3.18-150200.24.129.1.x86_64",
          "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-devel-5.3.18-150200.24.129.1.ppc64le",
          "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-devel-5.3.18-150200.24.129.1.s390x",
          "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-devel-5.3.18-150200.24.129.1.x86_64",
          "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-150200_24_129-default-1-150200.5.3.1.ppc64le",
          "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-150200_24_129-default-1-150200.5.3.1.s390x",
          "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-150200_24_129-default-1-150200.5.3.1.x86_64",
          "SUSE Linux Enterprise Server 15 SP2-BCL:kernel-default-5.3.18-150200.24.129.1.x86_64",
          "SUSE Linux Enterprise Server 15 SP2-BCL:kernel-default-base-5.3.18-150200.24.129.1.150200.9.61.1.x86_64",
          "SUSE Linux Enterprise Server 15 SP2-BCL:kernel-default-devel-5.3.18-150200.24.129.1.x86_64",
          "SUSE Linux Enterprise Server 15 SP2-BCL:kernel-devel-5.3.18-150200.24.129.1.noarch",
          "SUSE Linux Enterprise Server 15 SP2-BCL:kernel-docs-5.3.18-150200.24.129.1.noarch",
          "SUSE Linux Enterprise Server 15 SP2-BCL:kernel-macros-5.3.18-150200.24.129.1.noarch",
          "SUSE Linux Enterprise Server 15 SP2-BCL:kernel-obs-build-5.3.18-150200.24.129.1.x86_64",
          "SUSE Linux Enterprise Server 15 SP2-BCL:kernel-preempt-5.3.18-150200.24.129.1.x86_64",
          "SUSE Linux Enterprise Server 15 SP2-BCL:kernel-preempt-devel-5.3.18-150200.24.129.1.x86_64",
          "SUSE Linux Enterprise Server 15 SP2-BCL:kernel-source-5.3.18-150200.24.129.1.noarch",
          "SUSE Linux Enterprise Server 15 SP2-BCL:kernel-syms-5.3.18-150200.24.129.1.x86_64",
          "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-5.3.18-150200.24.129.1.aarch64",
          "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-5.3.18-150200.24.129.1.ppc64le",
          "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-5.3.18-150200.24.129.1.s390x",
          "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-5.3.18-150200.24.129.1.x86_64",
          "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.129.1.150200.9.61.1.aarch64",
          "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.129.1.150200.9.61.1.ppc64le",
          "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.129.1.150200.9.61.1.s390x",
          "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.129.1.150200.9.61.1.x86_64",
          "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.129.1.aarch64",
          "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.129.1.ppc64le",
          "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.129.1.s390x",
          "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.129.1.x86_64",
          "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-devel-5.3.18-150200.24.129.1.noarch",
          "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-docs-5.3.18-150200.24.129.1.noarch",
          "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-macros-5.3.18-150200.24.129.1.noarch",
          "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.129.1.aarch64",
          "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.129.1.ppc64le",
          "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.129.1.s390x",
          "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.129.1.x86_64",
          "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-preempt-5.3.18-150200.24.129.1.aarch64",
          "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-preempt-5.3.18-150200.24.129.1.x86_64",
          "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-preempt-devel-5.3.18-150200.24.129.1.aarch64",
          "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-preempt-devel-5.3.18-150200.24.129.1.x86_64",
          "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-source-5.3.18-150200.24.129.1.noarch",
          "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.129.1.aarch64",
          "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.129.1.ppc64le",
          "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.129.1.s390x",
          "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.129.1.x86_64",
          "SUSE Linux Enterprise Server 15 SP2-LTSS:reiserfs-kmp-default-5.3.18-150200.24.129.1.aarch64",
          "SUSE Linux Enterprise Server 15 SP2-LTSS:reiserfs-kmp-default-5.3.18-150200.24.129.1.ppc64le",
          "SUSE Linux Enterprise Server 15 SP2-LTSS:reiserfs-kmp-default-5.3.18-150200.24.129.1.s390x",
          "SUSE Linux Enterprise Server 15 SP2-LTSS:reiserfs-kmp-default-5.3.18-150200.24.129.1.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-5.3.18-150200.24.129.1.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-5.3.18-150200.24.129.1.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-base-5.3.18-150200.24.129.1.150200.9.61.1.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-base-5.3.18-150200.24.129.1.150200.9.61.1.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-devel-5.3.18-150200.24.129.1.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-devel-5.3.18-150200.24.129.1.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-devel-5.3.18-150200.24.129.1.noarch",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-docs-5.3.18-150200.24.129.1.noarch",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-macros-5.3.18-150200.24.129.1.noarch",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-obs-build-5.3.18-150200.24.129.1.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-obs-build-5.3.18-150200.24.129.1.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-preempt-5.3.18-150200.24.129.1.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-preempt-devel-5.3.18-150200.24.129.1.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-source-5.3.18-150200.24.129.1.noarch",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-syms-5.3.18-150200.24.129.1.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-syms-5.3.18-150200.24.129.1.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP2:reiserfs-kmp-default-5.3.18-150200.24.129.1.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP2:reiserfs-kmp-default-5.3.18-150200.24.129.1.x86_64",
          "SUSE Manager Proxy 4.1:kernel-default-5.3.18-150200.24.129.1.x86_64",
          "SUSE Manager Proxy 4.1:kernel-default-base-5.3.18-150200.24.129.1.150200.9.61.1.x86_64",
          "SUSE Manager Proxy 4.1:kernel-default-devel-5.3.18-150200.24.129.1.x86_64",
          "SUSE Manager Proxy 4.1:kernel-devel-5.3.18-150200.24.129.1.noarch",
          "SUSE Manager Proxy 4.1:kernel-docs-5.3.18-150200.24.129.1.noarch",
          "SUSE Manager Proxy 4.1:kernel-macros-5.3.18-150200.24.129.1.noarch",
          "SUSE Manager Proxy 4.1:kernel-obs-build-5.3.18-150200.24.129.1.x86_64",
          "SUSE Manager Proxy 4.1:kernel-preempt-5.3.18-150200.24.129.1.x86_64",
          "SUSE Manager Proxy 4.1:kernel-preempt-devel-5.3.18-150200.24.129.1.x86_64",
          "SUSE Manager Proxy 4.1:kernel-source-5.3.18-150200.24.129.1.noarch",
          "SUSE Manager Proxy 4.1:kernel-syms-5.3.18-150200.24.129.1.x86_64",
          "SUSE Manager Proxy 4.1:reiserfs-kmp-default-5.3.18-150200.24.129.1.x86_64",
          "SUSE Manager Retail Branch Server 4.1:kernel-default-5.3.18-150200.24.129.1.x86_64",
          "SUSE Manager Retail Branch Server 4.1:kernel-default-base-5.3.18-150200.24.129.1.150200.9.61.1.x86_64",
          "SUSE Manager Retail Branch Server 4.1:kernel-default-devel-5.3.18-150200.24.129.1.x86_64",
          "SUSE Manager Retail Branch Server 4.1:kernel-devel-5.3.18-150200.24.129.1.noarch",
          "SUSE Manager Retail Branch Server 4.1:kernel-docs-5.3.18-150200.24.129.1.noarch",
          "SUSE Manager Retail Branch Server 4.1:kernel-macros-5.3.18-150200.24.129.1.noarch",
          "SUSE Manager Retail Branch Server 4.1:kernel-obs-build-5.3.18-150200.24.129.1.x86_64",
          "SUSE Manager Retail Branch Server 4.1:kernel-preempt-5.3.18-150200.24.129.1.x86_64",
          "SUSE Manager Retail Branch Server 4.1:kernel-preempt-devel-5.3.18-150200.24.129.1.x86_64",
          "SUSE Manager Retail Branch Server 4.1:kernel-source-5.3.18-150200.24.129.1.noarch",
          "SUSE Manager Retail Branch Server 4.1:kernel-syms-5.3.18-150200.24.129.1.x86_64",
          "SUSE Manager Retail Branch Server 4.1:reiserfs-kmp-default-5.3.18-150200.24.129.1.x86_64",
          "SUSE Manager Server 4.1:kernel-default-5.3.18-150200.24.129.1.ppc64le",
          "SUSE Manager Server 4.1:kernel-default-5.3.18-150200.24.129.1.s390x",
          "SUSE Manager Server 4.1:kernel-default-5.3.18-150200.24.129.1.x86_64",
          "SUSE Manager Server 4.1:kernel-default-base-5.3.18-150200.24.129.1.150200.9.61.1.ppc64le",
          "SUSE Manager Server 4.1:kernel-default-base-5.3.18-150200.24.129.1.150200.9.61.1.s390x",
          "SUSE Manager Server 4.1:kernel-default-base-5.3.18-150200.24.129.1.150200.9.61.1.x86_64",
          "SUSE Manager Server 4.1:kernel-default-devel-5.3.18-150200.24.129.1.ppc64le",
          "SUSE Manager Server 4.1:kernel-default-devel-5.3.18-150200.24.129.1.s390x",
          "SUSE Manager Server 4.1:kernel-default-devel-5.3.18-150200.24.129.1.x86_64",
          "SUSE Manager Server 4.1:kernel-devel-5.3.18-150200.24.129.1.noarch",
          "SUSE Manager Server 4.1:kernel-docs-5.3.18-150200.24.129.1.noarch",
          "SUSE Manager Server 4.1:kernel-macros-5.3.18-150200.24.129.1.noarch",
          "SUSE Manager Server 4.1:kernel-obs-build-5.3.18-150200.24.129.1.ppc64le",
          "SUSE Manager Server 4.1:kernel-obs-build-5.3.18-150200.24.129.1.s390x",
          "SUSE Manager Server 4.1:kernel-obs-build-5.3.18-150200.24.129.1.x86_64",
          "SUSE Manager Server 4.1:kernel-preempt-5.3.18-150200.24.129.1.x86_64",
          "SUSE Manager Server 4.1:kernel-preempt-devel-5.3.18-150200.24.129.1.x86_64",
          "SUSE Manager Server 4.1:kernel-source-5.3.18-150200.24.129.1.noarch",
          "SUSE Manager Server 4.1:kernel-syms-5.3.18-150200.24.129.1.ppc64le",
          "SUSE Manager Server 4.1:kernel-syms-5.3.18-150200.24.129.1.s390x",
          "SUSE Manager Server 4.1:kernel-syms-5.3.18-150200.24.129.1.x86_64",
          "SUSE Manager Server 4.1:reiserfs-kmp-default-5.3.18-150200.24.129.1.ppc64le",
          "SUSE Manager Server 4.1:reiserfs-kmp-default-5.3.18-150200.24.129.1.s390x",
          "SUSE Manager Server 4.1:reiserfs-kmp-default-5.3.18-150200.24.129.1.x86_64"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2022-3028",
          "url": "https://www.suse.com/security/cve/CVE-2022-3028"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1202898 for CVE-2022-3028",
          "url": "https://bugzilla.suse.com/1202898"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1212296 for CVE-2022-3028",
          "url": "https://bugzilla.suse.com/1212296"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "SUSE Enterprise Storage 7:kernel-default-5.3.18-150200.24.129.1.aarch64",
            "SUSE Enterprise Storage 7:kernel-default-5.3.18-150200.24.129.1.x86_64",
            "SUSE Enterprise Storage 7:kernel-default-base-5.3.18-150200.24.129.1.150200.9.61.1.aarch64",
            "SUSE Enterprise Storage 7:kernel-default-base-5.3.18-150200.24.129.1.150200.9.61.1.x86_64",
            "SUSE Enterprise Storage 7:kernel-default-devel-5.3.18-150200.24.129.1.aarch64",
            "SUSE Enterprise Storage 7:kernel-default-devel-5.3.18-150200.24.129.1.x86_64",
            "SUSE Enterprise Storage 7:kernel-devel-5.3.18-150200.24.129.1.noarch",
            "SUSE Enterprise Storage 7:kernel-docs-5.3.18-150200.24.129.1.noarch",
            "SUSE Enterprise Storage 7:kernel-macros-5.3.18-150200.24.129.1.noarch",
            "SUSE Enterprise Storage 7:kernel-obs-build-5.3.18-150200.24.129.1.aarch64",
            "SUSE Enterprise Storage 7:kernel-obs-build-5.3.18-150200.24.129.1.x86_64",
            "SUSE Enterprise Storage 7:kernel-preempt-5.3.18-150200.24.129.1.aarch64",
            "SUSE Enterprise Storage 7:kernel-preempt-5.3.18-150200.24.129.1.x86_64",
            "SUSE Enterprise Storage 7:kernel-preempt-devel-5.3.18-150200.24.129.1.aarch64",
            "SUSE Enterprise Storage 7:kernel-preempt-devel-5.3.18-150200.24.129.1.x86_64",
            "SUSE Enterprise Storage 7:kernel-source-5.3.18-150200.24.129.1.noarch",
            "SUSE Enterprise Storage 7:kernel-syms-5.3.18-150200.24.129.1.aarch64",
            "SUSE Enterprise Storage 7:kernel-syms-5.3.18-150200.24.129.1.x86_64",
            "SUSE Enterprise Storage 7:reiserfs-kmp-default-5.3.18-150200.24.129.1.aarch64",
            "SUSE Enterprise Storage 7:reiserfs-kmp-default-5.3.18-150200.24.129.1.x86_64",
            "SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-150200.24.129.1.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-150200.24.129.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-150200.24.129.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-150200.24.129.1.x86_64",
            "SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-150200.24.129.1.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-150200.24.129.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-150200.24.129.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-150200.24.129.1.x86_64",
            "SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-150200.24.129.1.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-150200.24.129.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-150200.24.129.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-150200.24.129.1.x86_64",
            "SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-150200.24.129.1.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-150200.24.129.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-150200.24.129.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-150200.24.129.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-default-5.3.18-150200.24.129.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-default-5.3.18-150200.24.129.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-default-base-5.3.18-150200.24.129.1.150200.9.61.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-default-base-5.3.18-150200.24.129.1.150200.9.61.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-default-devel-5.3.18-150200.24.129.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-default-devel-5.3.18-150200.24.129.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-devel-5.3.18-150200.24.129.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-docs-5.3.18-150200.24.129.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-macros-5.3.18-150200.24.129.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-obs-build-5.3.18-150200.24.129.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-obs-build-5.3.18-150200.24.129.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-preempt-5.3.18-150200.24.129.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-preempt-5.3.18-150200.24.129.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-preempt-devel-5.3.18-150200.24.129.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-preempt-devel-5.3.18-150200.24.129.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-source-5.3.18-150200.24.129.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-syms-5.3.18-150200.24.129.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-syms-5.3.18-150200.24.129.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-5.3.18-150200.24.129.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-5.3.18-150200.24.129.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.129.1.150200.9.61.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.129.1.150200.9.61.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.129.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.129.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-devel-5.3.18-150200.24.129.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-docs-5.3.18-150200.24.129.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-macros-5.3.18-150200.24.129.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.129.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.129.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-preempt-5.3.18-150200.24.129.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-preempt-5.3.18-150200.24.129.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-preempt-devel-5.3.18-150200.24.129.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-preempt-devel-5.3.18-150200.24.129.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-source-5.3.18-150200.24.129.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.129.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.129.1.x86_64",
            "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-5.3.18-150200.24.129.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-5.3.18-150200.24.129.1.s390x",
            "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-5.3.18-150200.24.129.1.x86_64",
            "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-devel-5.3.18-150200.24.129.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-devel-5.3.18-150200.24.129.1.s390x",
            "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-devel-5.3.18-150200.24.129.1.x86_64",
            "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-150200_24_129-default-1-150200.5.3.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-150200_24_129-default-1-150200.5.3.1.s390x",
            "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-150200_24_129-default-1-150200.5.3.1.x86_64",
            "SUSE Linux Enterprise Server 15 SP2-BCL:kernel-default-5.3.18-150200.24.129.1.x86_64",
            "SUSE Linux Enterprise Server 15 SP2-BCL:kernel-default-base-5.3.18-150200.24.129.1.150200.9.61.1.x86_64",
            "SUSE Linux Enterprise Server 15 SP2-BCL:kernel-default-devel-5.3.18-150200.24.129.1.x86_64",
            "SUSE Linux Enterprise Server 15 SP2-BCL:kernel-devel-5.3.18-150200.24.129.1.noarch",
            "SUSE Linux Enterprise Server 15 SP2-BCL:kernel-docs-5.3.18-150200.24.129.1.noarch",
            "SUSE Linux Enterprise Server 15 SP2-BCL:kernel-macros-5.3.18-150200.24.129.1.noarch",
            "SUSE Linux Enterprise Server 15 SP2-BCL:kernel-obs-build-5.3.18-150200.24.129.1.x86_64",
            "SUSE Linux Enterprise Server 15 SP2-BCL:kernel-preempt-5.3.18-150200.24.129.1.x86_64",
            "SUSE Linux Enterprise Server 15 SP2-BCL:kernel-preempt-devel-5.3.18-150200.24.129.1.x86_64",
            "SUSE Linux Enterprise Server 15 SP2-BCL:kernel-source-5.3.18-150200.24.129.1.noarch",
            "SUSE Linux Enterprise Server 15 SP2-BCL:kernel-syms-5.3.18-150200.24.129.1.x86_64",
            "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-5.3.18-150200.24.129.1.aarch64",
            "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-5.3.18-150200.24.129.1.ppc64le",
            "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-5.3.18-150200.24.129.1.s390x",
            "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-5.3.18-150200.24.129.1.x86_64",
            "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.129.1.150200.9.61.1.aarch64",
            "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.129.1.150200.9.61.1.ppc64le",
            "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.129.1.150200.9.61.1.s390x",
            "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.129.1.150200.9.61.1.x86_64",
            "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.129.1.aarch64",
            "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.129.1.ppc64le",
            "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.129.1.s390x",
            "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.129.1.x86_64",
            "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-devel-5.3.18-150200.24.129.1.noarch",
            "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-docs-5.3.18-150200.24.129.1.noarch",
            "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-macros-5.3.18-150200.24.129.1.noarch",
            "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.129.1.aarch64",
            "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.129.1.ppc64le",
            "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.129.1.s390x",
            "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.129.1.x86_64",
            "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-preempt-5.3.18-150200.24.129.1.aarch64",
            "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-preempt-5.3.18-150200.24.129.1.x86_64",
            "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-preempt-devel-5.3.18-150200.24.129.1.aarch64",
            "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-preempt-devel-5.3.18-150200.24.129.1.x86_64",
            "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-source-5.3.18-150200.24.129.1.noarch",
            "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.129.1.aarch64",
            "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.129.1.ppc64le",
            "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.129.1.s390x",
            "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.129.1.x86_64",
            "SUSE Linux Enterprise Server 15 SP2-LTSS:reiserfs-kmp-default-5.3.18-150200.24.129.1.aarch64",
            "SUSE Linux Enterprise Server 15 SP2-LTSS:reiserfs-kmp-default-5.3.18-150200.24.129.1.ppc64le",
            "SUSE Linux Enterprise Server 15 SP2-LTSS:reiserfs-kmp-default-5.3.18-150200.24.129.1.s390x",
            "SUSE Linux Enterprise Server 15 SP2-LTSS:reiserfs-kmp-default-5.3.18-150200.24.129.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-5.3.18-150200.24.129.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-5.3.18-150200.24.129.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-base-5.3.18-150200.24.129.1.150200.9.61.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-base-5.3.18-150200.24.129.1.150200.9.61.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-devel-5.3.18-150200.24.129.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-devel-5.3.18-150200.24.129.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-devel-5.3.18-150200.24.129.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-docs-5.3.18-150200.24.129.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-macros-5.3.18-150200.24.129.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-obs-build-5.3.18-150200.24.129.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-obs-build-5.3.18-150200.24.129.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-preempt-5.3.18-150200.24.129.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-preempt-devel-5.3.18-150200.24.129.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-source-5.3.18-150200.24.129.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-syms-5.3.18-150200.24.129.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-syms-5.3.18-150200.24.129.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP2:reiserfs-kmp-default-5.3.18-150200.24.129.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP2:reiserfs-kmp-default-5.3.18-150200.24.129.1.x86_64",
            "SUSE Manager Proxy 4.1:kernel-default-5.3.18-150200.24.129.1.x86_64",
            "SUSE Manager Proxy 4.1:kernel-default-base-5.3.18-150200.24.129.1.150200.9.61.1.x86_64",
            "SUSE Manager Proxy 4.1:kernel-default-devel-5.3.18-150200.24.129.1.x86_64",
            "SUSE Manager Proxy 4.1:kernel-devel-5.3.18-150200.24.129.1.noarch",
            "SUSE Manager Proxy 4.1:kernel-docs-5.3.18-150200.24.129.1.noarch",
            "SUSE Manager Proxy 4.1:kernel-macros-5.3.18-150200.24.129.1.noarch",
            "SUSE Manager Proxy 4.1:kernel-obs-build-5.3.18-150200.24.129.1.x86_64",
            "SUSE Manager Proxy 4.1:kernel-preempt-5.3.18-150200.24.129.1.x86_64",
            "SUSE Manager Proxy 4.1:kernel-preempt-devel-5.3.18-150200.24.129.1.x86_64",
            "SUSE Manager Proxy 4.1:kernel-source-5.3.18-150200.24.129.1.noarch",
            "SUSE Manager Proxy 4.1:kernel-syms-5.3.18-150200.24.129.1.x86_64",
            "SUSE Manager Proxy 4.1:reiserfs-kmp-default-5.3.18-150200.24.129.1.x86_64",
            "SUSE Manager Retail Branch Server 4.1:kernel-default-5.3.18-150200.24.129.1.x86_64",
            "SUSE Manager Retail Branch Server 4.1:kernel-default-base-5.3.18-150200.24.129.1.150200.9.61.1.x86_64",
            "SUSE Manager Retail Branch Server 4.1:kernel-default-devel-5.3.18-150200.24.129.1.x86_64",
            "SUSE Manager Retail Branch Server 4.1:kernel-devel-5.3.18-150200.24.129.1.noarch",
            "SUSE Manager Retail Branch Server 4.1:kernel-docs-5.3.18-150200.24.129.1.noarch",
            "SUSE Manager Retail Branch Server 4.1:kernel-macros-5.3.18-150200.24.129.1.noarch",
            "SUSE Manager Retail Branch Server 4.1:kernel-obs-build-5.3.18-150200.24.129.1.x86_64",
            "SUSE Manager Retail Branch Server 4.1:kernel-preempt-5.3.18-150200.24.129.1.x86_64",
            "SUSE Manager Retail Branch Server 4.1:kernel-preempt-devel-5.3.18-150200.24.129.1.x86_64",
            "SUSE Manager Retail Branch Server 4.1:kernel-source-5.3.18-150200.24.129.1.noarch",
            "SUSE Manager Retail Branch Server 4.1:kernel-syms-5.3.18-150200.24.129.1.x86_64",
            "SUSE Manager Retail Branch Server 4.1:reiserfs-kmp-default-5.3.18-150200.24.129.1.x86_64",
            "SUSE Manager Server 4.1:kernel-default-5.3.18-150200.24.129.1.ppc64le",
            "SUSE Manager Server 4.1:kernel-default-5.3.18-150200.24.129.1.s390x",
            "SUSE Manager Server 4.1:kernel-default-5.3.18-150200.24.129.1.x86_64",
            "SUSE Manager Server 4.1:kernel-default-base-5.3.18-150200.24.129.1.150200.9.61.1.ppc64le",
            "SUSE Manager Server 4.1:kernel-default-base-5.3.18-150200.24.129.1.150200.9.61.1.s390x",
            "SUSE Manager Server 4.1:kernel-default-base-5.3.18-150200.24.129.1.150200.9.61.1.x86_64",
            "SUSE Manager Server 4.1:kernel-default-devel-5.3.18-150200.24.129.1.ppc64le",
            "SUSE Manager Server 4.1:kernel-default-devel-5.3.18-150200.24.129.1.s390x",
            "SUSE Manager Server 4.1:kernel-default-devel-5.3.18-150200.24.129.1.x86_64",
            "SUSE Manager Server 4.1:kernel-devel-5.3.18-150200.24.129.1.noarch",
            "SUSE Manager Server 4.1:kernel-docs-5.3.18-150200.24.129.1.noarch",
            "SUSE Manager Server 4.1:kernel-macros-5.3.18-150200.24.129.1.noarch",
            "SUSE Manager Server 4.1:kernel-obs-build-5.3.18-150200.24.129.1.ppc64le",
            "SUSE Manager Server 4.1:kernel-obs-build-5.3.18-150200.24.129.1.s390x",
            "SUSE Manager Server 4.1:kernel-obs-build-5.3.18-150200.24.129.1.x86_64",
            "SUSE Manager Server 4.1:kernel-preempt-5.3.18-150200.24.129.1.x86_64",
            "SUSE Manager Server 4.1:kernel-preempt-devel-5.3.18-150200.24.129.1.x86_64",
            "SUSE Manager Server 4.1:kernel-source-5.3.18-150200.24.129.1.noarch",
            "SUSE Manager Server 4.1:kernel-syms-5.3.18-150200.24.129.1.ppc64le",
            "SUSE Manager Server 4.1:kernel-syms-5.3.18-150200.24.129.1.s390x",
            "SUSE Manager Server 4.1:kernel-syms-5.3.18-150200.24.129.1.x86_64",
            "SUSE Manager Server 4.1:reiserfs-kmp-default-5.3.18-150200.24.129.1.ppc64le",
            "SUSE Manager Server 4.1:reiserfs-kmp-default-5.3.18-150200.24.129.1.s390x",
            "SUSE Manager Server 4.1:reiserfs-kmp-default-5.3.18-150200.24.129.1.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 6.7,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H",
            "version": "3.1"
          },
          "products": [
            "SUSE Enterprise Storage 7:kernel-default-5.3.18-150200.24.129.1.aarch64",
            "SUSE Enterprise Storage 7:kernel-default-5.3.18-150200.24.129.1.x86_64",
            "SUSE Enterprise Storage 7:kernel-default-base-5.3.18-150200.24.129.1.150200.9.61.1.aarch64",
            "SUSE Enterprise Storage 7:kernel-default-base-5.3.18-150200.24.129.1.150200.9.61.1.x86_64",
            "SUSE Enterprise Storage 7:kernel-default-devel-5.3.18-150200.24.129.1.aarch64",
            "SUSE Enterprise Storage 7:kernel-default-devel-5.3.18-150200.24.129.1.x86_64",
            "SUSE Enterprise Storage 7:kernel-devel-5.3.18-150200.24.129.1.noarch",
            "SUSE Enterprise Storage 7:kernel-docs-5.3.18-150200.24.129.1.noarch",
            "SUSE Enterprise Storage 7:kernel-macros-5.3.18-150200.24.129.1.noarch",
            "SUSE Enterprise Storage 7:kernel-obs-build-5.3.18-150200.24.129.1.aarch64",
            "SUSE Enterprise Storage 7:kernel-obs-build-5.3.18-150200.24.129.1.x86_64",
            "SUSE Enterprise Storage 7:kernel-preempt-5.3.18-150200.24.129.1.aarch64",
            "SUSE Enterprise Storage 7:kernel-preempt-5.3.18-150200.24.129.1.x86_64",
            "SUSE Enterprise Storage 7:kernel-preempt-devel-5.3.18-150200.24.129.1.aarch64",
            "SUSE Enterprise Storage 7:kernel-preempt-devel-5.3.18-150200.24.129.1.x86_64",
            "SUSE Enterprise Storage 7:kernel-source-5.3.18-150200.24.129.1.noarch",
            "SUSE Enterprise Storage 7:kernel-syms-5.3.18-150200.24.129.1.aarch64",
            "SUSE Enterprise Storage 7:kernel-syms-5.3.18-150200.24.129.1.x86_64",
            "SUSE Enterprise Storage 7:reiserfs-kmp-default-5.3.18-150200.24.129.1.aarch64",
            "SUSE Enterprise Storage 7:reiserfs-kmp-default-5.3.18-150200.24.129.1.x86_64",
            "SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-150200.24.129.1.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-150200.24.129.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-150200.24.129.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-150200.24.129.1.x86_64",
            "SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-150200.24.129.1.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-150200.24.129.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-150200.24.129.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-150200.24.129.1.x86_64",
            "SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-150200.24.129.1.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-150200.24.129.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-150200.24.129.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-150200.24.129.1.x86_64",
            "SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-150200.24.129.1.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-150200.24.129.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-150200.24.129.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-150200.24.129.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-default-5.3.18-150200.24.129.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-default-5.3.18-150200.24.129.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-default-base-5.3.18-150200.24.129.1.150200.9.61.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-default-base-5.3.18-150200.24.129.1.150200.9.61.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-default-devel-5.3.18-150200.24.129.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-default-devel-5.3.18-150200.24.129.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-devel-5.3.18-150200.24.129.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-docs-5.3.18-150200.24.129.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-macros-5.3.18-150200.24.129.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-obs-build-5.3.18-150200.24.129.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-obs-build-5.3.18-150200.24.129.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-preempt-5.3.18-150200.24.129.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-preempt-5.3.18-150200.24.129.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-preempt-devel-5.3.18-150200.24.129.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-preempt-devel-5.3.18-150200.24.129.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-source-5.3.18-150200.24.129.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-syms-5.3.18-150200.24.129.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-syms-5.3.18-150200.24.129.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-5.3.18-150200.24.129.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-5.3.18-150200.24.129.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.129.1.150200.9.61.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.129.1.150200.9.61.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.129.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.129.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-devel-5.3.18-150200.24.129.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-docs-5.3.18-150200.24.129.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-macros-5.3.18-150200.24.129.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.129.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.129.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-preempt-5.3.18-150200.24.129.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-preempt-5.3.18-150200.24.129.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-preempt-devel-5.3.18-150200.24.129.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-preempt-devel-5.3.18-150200.24.129.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-source-5.3.18-150200.24.129.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.129.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.129.1.x86_64",
            "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-5.3.18-150200.24.129.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-5.3.18-150200.24.129.1.s390x",
            "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-5.3.18-150200.24.129.1.x86_64",
            "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-devel-5.3.18-150200.24.129.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-devel-5.3.18-150200.24.129.1.s390x",
            "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-devel-5.3.18-150200.24.129.1.x86_64",
            "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-150200_24_129-default-1-150200.5.3.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-150200_24_129-default-1-150200.5.3.1.s390x",
            "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-150200_24_129-default-1-150200.5.3.1.x86_64",
            "SUSE Linux Enterprise Server 15 SP2-BCL:kernel-default-5.3.18-150200.24.129.1.x86_64",
            "SUSE Linux Enterprise Server 15 SP2-BCL:kernel-default-base-5.3.18-150200.24.129.1.150200.9.61.1.x86_64",
            "SUSE Linux Enterprise Server 15 SP2-BCL:kernel-default-devel-5.3.18-150200.24.129.1.x86_64",
            "SUSE Linux Enterprise Server 15 SP2-BCL:kernel-devel-5.3.18-150200.24.129.1.noarch",
            "SUSE Linux Enterprise Server 15 SP2-BCL:kernel-docs-5.3.18-150200.24.129.1.noarch",
            "SUSE Linux Enterprise Server 15 SP2-BCL:kernel-macros-5.3.18-150200.24.129.1.noarch",
            "SUSE Linux Enterprise Server 15 SP2-BCL:kernel-obs-build-5.3.18-150200.24.129.1.x86_64",
            "SUSE Linux Enterprise Server 15 SP2-BCL:kernel-preempt-5.3.18-150200.24.129.1.x86_64",
            "SUSE Linux Enterprise Server 15 SP2-BCL:kernel-preempt-devel-5.3.18-150200.24.129.1.x86_64",
            "SUSE Linux Enterprise Server 15 SP2-BCL:kernel-source-5.3.18-150200.24.129.1.noarch",
            "SUSE Linux Enterprise Server 15 SP2-BCL:kernel-syms-5.3.18-150200.24.129.1.x86_64",
            "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-5.3.18-150200.24.129.1.aarch64",
            "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-5.3.18-150200.24.129.1.ppc64le",
            "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-5.3.18-150200.24.129.1.s390x",
            "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-5.3.18-150200.24.129.1.x86_64",
            "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.129.1.150200.9.61.1.aarch64",
            "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.129.1.150200.9.61.1.ppc64le",
            "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.129.1.150200.9.61.1.s390x",
            "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.129.1.150200.9.61.1.x86_64",
            "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.129.1.aarch64",
            "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.129.1.ppc64le",
            "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.129.1.s390x",
            "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.129.1.x86_64",
            "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-devel-5.3.18-150200.24.129.1.noarch",
            "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-docs-5.3.18-150200.24.129.1.noarch",
            "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-macros-5.3.18-150200.24.129.1.noarch",
            "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.129.1.aarch64",
            "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.129.1.ppc64le",
            "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.129.1.s390x",
            "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.129.1.x86_64",
            "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-preempt-5.3.18-150200.24.129.1.aarch64",
            "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-preempt-5.3.18-150200.24.129.1.x86_64",
            "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-preempt-devel-5.3.18-150200.24.129.1.aarch64",
            "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-preempt-devel-5.3.18-150200.24.129.1.x86_64",
            "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-source-5.3.18-150200.24.129.1.noarch",
            "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.129.1.aarch64",
            "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.129.1.ppc64le",
            "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.129.1.s390x",
            "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.129.1.x86_64",
            "SUSE Linux Enterprise Server 15 SP2-LTSS:reiserfs-kmp-default-5.3.18-150200.24.129.1.aarch64",
            "SUSE Linux Enterprise Server 15 SP2-LTSS:reiserfs-kmp-default-5.3.18-150200.24.129.1.ppc64le",
            "SUSE Linux Enterprise Server 15 SP2-LTSS:reiserfs-kmp-default-5.3.18-150200.24.129.1.s390x",
            "SUSE Linux Enterprise Server 15 SP2-LTSS:reiserfs-kmp-default-5.3.18-150200.24.129.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-5.3.18-150200.24.129.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-5.3.18-150200.24.129.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-base-5.3.18-150200.24.129.1.150200.9.61.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-base-5.3.18-150200.24.129.1.150200.9.61.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-devel-5.3.18-150200.24.129.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-devel-5.3.18-150200.24.129.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-devel-5.3.18-150200.24.129.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-docs-5.3.18-150200.24.129.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-macros-5.3.18-150200.24.129.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-obs-build-5.3.18-150200.24.129.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-obs-build-5.3.18-150200.24.129.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-preempt-5.3.18-150200.24.129.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-preempt-devel-5.3.18-150200.24.129.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-source-5.3.18-150200.24.129.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-syms-5.3.18-150200.24.129.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-syms-5.3.18-150200.24.129.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP2:reiserfs-kmp-default-5.3.18-150200.24.129.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP2:reiserfs-kmp-default-5.3.18-150200.24.129.1.x86_64",
            "SUSE Manager Proxy 4.1:kernel-default-5.3.18-150200.24.129.1.x86_64",
            "SUSE Manager Proxy 4.1:kernel-default-base-5.3.18-150200.24.129.1.150200.9.61.1.x86_64",
            "SUSE Manager Proxy 4.1:kernel-default-devel-5.3.18-150200.24.129.1.x86_64",
            "SUSE Manager Proxy 4.1:kernel-devel-5.3.18-150200.24.129.1.noarch",
            "SUSE Manager Proxy 4.1:kernel-docs-5.3.18-150200.24.129.1.noarch",
            "SUSE Manager Proxy 4.1:kernel-macros-5.3.18-150200.24.129.1.noarch",
            "SUSE Manager Proxy 4.1:kernel-obs-build-5.3.18-150200.24.129.1.x86_64",
            "SUSE Manager Proxy 4.1:kernel-preempt-5.3.18-150200.24.129.1.x86_64",
            "SUSE Manager Proxy 4.1:kernel-preempt-devel-5.3.18-150200.24.129.1.x86_64",
            "SUSE Manager Proxy 4.1:kernel-source-5.3.18-150200.24.129.1.noarch",
            "SUSE Manager Proxy 4.1:kernel-syms-5.3.18-150200.24.129.1.x86_64",
            "SUSE Manager Proxy 4.1:reiserfs-kmp-default-5.3.18-150200.24.129.1.x86_64",
            "SUSE Manager Retail Branch Server 4.1:kernel-default-5.3.18-150200.24.129.1.x86_64",
            "SUSE Manager Retail Branch Server 4.1:kernel-default-base-5.3.18-150200.24.129.1.150200.9.61.1.x86_64",
            "SUSE Manager Retail Branch Server 4.1:kernel-default-devel-5.3.18-150200.24.129.1.x86_64",
            "SUSE Manager Retail Branch Server 4.1:kernel-devel-5.3.18-150200.24.129.1.noarch",
            "SUSE Manager Retail Branch Server 4.1:kernel-docs-5.3.18-150200.24.129.1.noarch",
            "SUSE Manager Retail Branch Server 4.1:kernel-macros-5.3.18-150200.24.129.1.noarch",
            "SUSE Manager Retail Branch Server 4.1:kernel-obs-build-5.3.18-150200.24.129.1.x86_64",
            "SUSE Manager Retail Branch Server 4.1:kernel-preempt-5.3.18-150200.24.129.1.x86_64",
            "SUSE Manager Retail Branch Server 4.1:kernel-preempt-devel-5.3.18-150200.24.129.1.x86_64",
            "SUSE Manager Retail Branch Server 4.1:kernel-source-5.3.18-150200.24.129.1.noarch",
            "SUSE Manager Retail Branch Server 4.1:kernel-syms-5.3.18-150200.24.129.1.x86_64",
            "SUSE Manager Retail Branch Server 4.1:reiserfs-kmp-default-5.3.18-150200.24.129.1.x86_64",
            "SUSE Manager Server 4.1:kernel-default-5.3.18-150200.24.129.1.ppc64le",
            "SUSE Manager Server 4.1:kernel-default-5.3.18-150200.24.129.1.s390x",
            "SUSE Manager Server 4.1:kernel-default-5.3.18-150200.24.129.1.x86_64",
            "SUSE Manager Server 4.1:kernel-default-base-5.3.18-150200.24.129.1.150200.9.61.1.ppc64le",
            "SUSE Manager Server 4.1:kernel-default-base-5.3.18-150200.24.129.1.150200.9.61.1.s390x",
            "SUSE Manager Server 4.1:kernel-default-base-5.3.18-150200.24.129.1.150200.9.61.1.x86_64",
            "SUSE Manager Server 4.1:kernel-default-devel-5.3.18-150200.24.129.1.ppc64le",
            "SUSE Manager Server 4.1:kernel-default-devel-5.3.18-150200.24.129.1.s390x",
            "SUSE Manager Server 4.1:kernel-default-devel-5.3.18-150200.24.129.1.x86_64",
            "SUSE Manager Server 4.1:kernel-devel-5.3.18-150200.24.129.1.noarch",
            "SUSE Manager Server 4.1:kernel-docs-5.3.18-150200.24.129.1.noarch",
            "SUSE Manager Server 4.1:kernel-macros-5.3.18-150200.24.129.1.noarch",
            "SUSE Manager Server 4.1:kernel-obs-build-5.3.18-150200.24.129.1.ppc64le",
            "SUSE Manager Server 4.1:kernel-obs-build-5.3.18-150200.24.129.1.s390x",
            "SUSE Manager Server 4.1:kernel-obs-build-5.3.18-150200.24.129.1.x86_64",
            "SUSE Manager Server 4.1:kernel-preempt-5.3.18-150200.24.129.1.x86_64",
            "SUSE Manager Server 4.1:kernel-preempt-devel-5.3.18-150200.24.129.1.x86_64",
            "SUSE Manager Server 4.1:kernel-source-5.3.18-150200.24.129.1.noarch",
            "SUSE Manager Server 4.1:kernel-syms-5.3.18-150200.24.129.1.ppc64le",
            "SUSE Manager Server 4.1:kernel-syms-5.3.18-150200.24.129.1.s390x",
            "SUSE Manager Server 4.1:kernel-syms-5.3.18-150200.24.129.1.x86_64",
            "SUSE Manager Server 4.1:reiserfs-kmp-default-5.3.18-150200.24.129.1.ppc64le",
            "SUSE Manager Server 4.1:reiserfs-kmp-default-5.3.18-150200.24.129.1.s390x",
            "SUSE Manager Server 4.1:reiserfs-kmp-default-5.3.18-150200.24.129.1.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2022-09-28T06:48:59Z",
          "details": "moderate"
        }
      ],
      "title": "CVE-2022-3028"
    },
    {
      "cve": "CVE-2022-32250",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2022-32250"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "net/netfilter/nf_tables_api.c in the Linux kernel through 5.18.1 allows a local user (able to create user/net namespaces) to escalate privileges to root because an incorrect NFT_STATEFUL_EXPR check leads to a use-after-free.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "SUSE Enterprise Storage 7:kernel-default-5.3.18-150200.24.129.1.aarch64",
          "SUSE Enterprise Storage 7:kernel-default-5.3.18-150200.24.129.1.x86_64",
          "SUSE Enterprise Storage 7:kernel-default-base-5.3.18-150200.24.129.1.150200.9.61.1.aarch64",
          "SUSE Enterprise Storage 7:kernel-default-base-5.3.18-150200.24.129.1.150200.9.61.1.x86_64",
          "SUSE Enterprise Storage 7:kernel-default-devel-5.3.18-150200.24.129.1.aarch64",
          "SUSE Enterprise Storage 7:kernel-default-devel-5.3.18-150200.24.129.1.x86_64",
          "SUSE Enterprise Storage 7:kernel-devel-5.3.18-150200.24.129.1.noarch",
          "SUSE Enterprise Storage 7:kernel-docs-5.3.18-150200.24.129.1.noarch",
          "SUSE Enterprise Storage 7:kernel-macros-5.3.18-150200.24.129.1.noarch",
          "SUSE Enterprise Storage 7:kernel-obs-build-5.3.18-150200.24.129.1.aarch64",
          "SUSE Enterprise Storage 7:kernel-obs-build-5.3.18-150200.24.129.1.x86_64",
          "SUSE Enterprise Storage 7:kernel-preempt-5.3.18-150200.24.129.1.aarch64",
          "SUSE Enterprise Storage 7:kernel-preempt-5.3.18-150200.24.129.1.x86_64",
          "SUSE Enterprise Storage 7:kernel-preempt-devel-5.3.18-150200.24.129.1.aarch64",
          "SUSE Enterprise Storage 7:kernel-preempt-devel-5.3.18-150200.24.129.1.x86_64",
          "SUSE Enterprise Storage 7:kernel-source-5.3.18-150200.24.129.1.noarch",
          "SUSE Enterprise Storage 7:kernel-syms-5.3.18-150200.24.129.1.aarch64",
          "SUSE Enterprise Storage 7:kernel-syms-5.3.18-150200.24.129.1.x86_64",
          "SUSE Enterprise Storage 7:reiserfs-kmp-default-5.3.18-150200.24.129.1.aarch64",
          "SUSE Enterprise Storage 7:reiserfs-kmp-default-5.3.18-150200.24.129.1.x86_64",
          "SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-150200.24.129.1.aarch64",
          "SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-150200.24.129.1.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-150200.24.129.1.s390x",
          "SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-150200.24.129.1.x86_64",
          "SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-150200.24.129.1.aarch64",
          "SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-150200.24.129.1.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-150200.24.129.1.s390x",
          "SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-150200.24.129.1.x86_64",
          "SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-150200.24.129.1.aarch64",
          "SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-150200.24.129.1.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-150200.24.129.1.s390x",
          "SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-150200.24.129.1.x86_64",
          "SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-150200.24.129.1.aarch64",
          "SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-150200.24.129.1.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-150200.24.129.1.s390x",
          "SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-150200.24.129.1.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-default-5.3.18-150200.24.129.1.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-default-5.3.18-150200.24.129.1.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-default-base-5.3.18-150200.24.129.1.150200.9.61.1.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-default-base-5.3.18-150200.24.129.1.150200.9.61.1.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-default-devel-5.3.18-150200.24.129.1.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-default-devel-5.3.18-150200.24.129.1.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-devel-5.3.18-150200.24.129.1.noarch",
          "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-docs-5.3.18-150200.24.129.1.noarch",
          "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-macros-5.3.18-150200.24.129.1.noarch",
          "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-obs-build-5.3.18-150200.24.129.1.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-obs-build-5.3.18-150200.24.129.1.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-preempt-5.3.18-150200.24.129.1.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-preempt-5.3.18-150200.24.129.1.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-preempt-devel-5.3.18-150200.24.129.1.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-preempt-devel-5.3.18-150200.24.129.1.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-source-5.3.18-150200.24.129.1.noarch",
          "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-syms-5.3.18-150200.24.129.1.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-syms-5.3.18-150200.24.129.1.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-5.3.18-150200.24.129.1.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-5.3.18-150200.24.129.1.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.129.1.150200.9.61.1.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.129.1.150200.9.61.1.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.129.1.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.129.1.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-devel-5.3.18-150200.24.129.1.noarch",
          "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-docs-5.3.18-150200.24.129.1.noarch",
          "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-macros-5.3.18-150200.24.129.1.noarch",
          "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.129.1.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.129.1.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-preempt-5.3.18-150200.24.129.1.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-preempt-5.3.18-150200.24.129.1.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-preempt-devel-5.3.18-150200.24.129.1.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-preempt-devel-5.3.18-150200.24.129.1.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-source-5.3.18-150200.24.129.1.noarch",
          "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.129.1.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.129.1.x86_64",
          "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-5.3.18-150200.24.129.1.ppc64le",
          "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-5.3.18-150200.24.129.1.s390x",
          "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-5.3.18-150200.24.129.1.x86_64",
          "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-devel-5.3.18-150200.24.129.1.ppc64le",
          "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-devel-5.3.18-150200.24.129.1.s390x",
          "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-devel-5.3.18-150200.24.129.1.x86_64",
          "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-150200_24_129-default-1-150200.5.3.1.ppc64le",
          "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-150200_24_129-default-1-150200.5.3.1.s390x",
          "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-150200_24_129-default-1-150200.5.3.1.x86_64",
          "SUSE Linux Enterprise Server 15 SP2-BCL:kernel-default-5.3.18-150200.24.129.1.x86_64",
          "SUSE Linux Enterprise Server 15 SP2-BCL:kernel-default-base-5.3.18-150200.24.129.1.150200.9.61.1.x86_64",
          "SUSE Linux Enterprise Server 15 SP2-BCL:kernel-default-devel-5.3.18-150200.24.129.1.x86_64",
          "SUSE Linux Enterprise Server 15 SP2-BCL:kernel-devel-5.3.18-150200.24.129.1.noarch",
          "SUSE Linux Enterprise Server 15 SP2-BCL:kernel-docs-5.3.18-150200.24.129.1.noarch",
          "SUSE Linux Enterprise Server 15 SP2-BCL:kernel-macros-5.3.18-150200.24.129.1.noarch",
          "SUSE Linux Enterprise Server 15 SP2-BCL:kernel-obs-build-5.3.18-150200.24.129.1.x86_64",
          "SUSE Linux Enterprise Server 15 SP2-BCL:kernel-preempt-5.3.18-150200.24.129.1.x86_64",
          "SUSE Linux Enterprise Server 15 SP2-BCL:kernel-preempt-devel-5.3.18-150200.24.129.1.x86_64",
          "SUSE Linux Enterprise Server 15 SP2-BCL:kernel-source-5.3.18-150200.24.129.1.noarch",
          "SUSE Linux Enterprise Server 15 SP2-BCL:kernel-syms-5.3.18-150200.24.129.1.x86_64",
          "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-5.3.18-150200.24.129.1.aarch64",
          "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-5.3.18-150200.24.129.1.ppc64le",
          "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-5.3.18-150200.24.129.1.s390x",
          "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-5.3.18-150200.24.129.1.x86_64",
          "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.129.1.150200.9.61.1.aarch64",
          "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.129.1.150200.9.61.1.ppc64le",
          "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.129.1.150200.9.61.1.s390x",
          "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.129.1.150200.9.61.1.x86_64",
          "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.129.1.aarch64",
          "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.129.1.ppc64le",
          "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.129.1.s390x",
          "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.129.1.x86_64",
          "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-devel-5.3.18-150200.24.129.1.noarch",
          "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-docs-5.3.18-150200.24.129.1.noarch",
          "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-macros-5.3.18-150200.24.129.1.noarch",
          "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.129.1.aarch64",
          "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.129.1.ppc64le",
          "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.129.1.s390x",
          "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.129.1.x86_64",
          "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-preempt-5.3.18-150200.24.129.1.aarch64",
          "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-preempt-5.3.18-150200.24.129.1.x86_64",
          "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-preempt-devel-5.3.18-150200.24.129.1.aarch64",
          "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-preempt-devel-5.3.18-150200.24.129.1.x86_64",
          "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-source-5.3.18-150200.24.129.1.noarch",
          "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.129.1.aarch64",
          "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.129.1.ppc64le",
          "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.129.1.s390x",
          "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.129.1.x86_64",
          "SUSE Linux Enterprise Server 15 SP2-LTSS:reiserfs-kmp-default-5.3.18-150200.24.129.1.aarch64",
          "SUSE Linux Enterprise Server 15 SP2-LTSS:reiserfs-kmp-default-5.3.18-150200.24.129.1.ppc64le",
          "SUSE Linux Enterprise Server 15 SP2-LTSS:reiserfs-kmp-default-5.3.18-150200.24.129.1.s390x",
          "SUSE Linux Enterprise Server 15 SP2-LTSS:reiserfs-kmp-default-5.3.18-150200.24.129.1.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-5.3.18-150200.24.129.1.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-5.3.18-150200.24.129.1.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-base-5.3.18-150200.24.129.1.150200.9.61.1.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-base-5.3.18-150200.24.129.1.150200.9.61.1.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-devel-5.3.18-150200.24.129.1.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-devel-5.3.18-150200.24.129.1.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-devel-5.3.18-150200.24.129.1.noarch",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-docs-5.3.18-150200.24.129.1.noarch",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-macros-5.3.18-150200.24.129.1.noarch",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-obs-build-5.3.18-150200.24.129.1.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-obs-build-5.3.18-150200.24.129.1.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-preempt-5.3.18-150200.24.129.1.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-preempt-devel-5.3.18-150200.24.129.1.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-source-5.3.18-150200.24.129.1.noarch",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-syms-5.3.18-150200.24.129.1.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-syms-5.3.18-150200.24.129.1.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP2:reiserfs-kmp-default-5.3.18-150200.24.129.1.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP2:reiserfs-kmp-default-5.3.18-150200.24.129.1.x86_64",
          "SUSE Manager Proxy 4.1:kernel-default-5.3.18-150200.24.129.1.x86_64",
          "SUSE Manager Proxy 4.1:kernel-default-base-5.3.18-150200.24.129.1.150200.9.61.1.x86_64",
          "SUSE Manager Proxy 4.1:kernel-default-devel-5.3.18-150200.24.129.1.x86_64",
          "SUSE Manager Proxy 4.1:kernel-devel-5.3.18-150200.24.129.1.noarch",
          "SUSE Manager Proxy 4.1:kernel-docs-5.3.18-150200.24.129.1.noarch",
          "SUSE Manager Proxy 4.1:kernel-macros-5.3.18-150200.24.129.1.noarch",
          "SUSE Manager Proxy 4.1:kernel-obs-build-5.3.18-150200.24.129.1.x86_64",
          "SUSE Manager Proxy 4.1:kernel-preempt-5.3.18-150200.24.129.1.x86_64",
          "SUSE Manager Proxy 4.1:kernel-preempt-devel-5.3.18-150200.24.129.1.x86_64",
          "SUSE Manager Proxy 4.1:kernel-source-5.3.18-150200.24.129.1.noarch",
          "SUSE Manager Proxy 4.1:kernel-syms-5.3.18-150200.24.129.1.x86_64",
          "SUSE Manager Proxy 4.1:reiserfs-kmp-default-5.3.18-150200.24.129.1.x86_64",
          "SUSE Manager Retail Branch Server 4.1:kernel-default-5.3.18-150200.24.129.1.x86_64",
          "SUSE Manager Retail Branch Server 4.1:kernel-default-base-5.3.18-150200.24.129.1.150200.9.61.1.x86_64",
          "SUSE Manager Retail Branch Server 4.1:kernel-default-devel-5.3.18-150200.24.129.1.x86_64",
          "SUSE Manager Retail Branch Server 4.1:kernel-devel-5.3.18-150200.24.129.1.noarch",
          "SUSE Manager Retail Branch Server 4.1:kernel-docs-5.3.18-150200.24.129.1.noarch",
          "SUSE Manager Retail Branch Server 4.1:kernel-macros-5.3.18-150200.24.129.1.noarch",
          "SUSE Manager Retail Branch Server 4.1:kernel-obs-build-5.3.18-150200.24.129.1.x86_64",
          "SUSE Manager Retail Branch Server 4.1:kernel-preempt-5.3.18-150200.24.129.1.x86_64",
          "SUSE Manager Retail Branch Server 4.1:kernel-preempt-devel-5.3.18-150200.24.129.1.x86_64",
          "SUSE Manager Retail Branch Server 4.1:kernel-source-5.3.18-150200.24.129.1.noarch",
          "SUSE Manager Retail Branch Server 4.1:kernel-syms-5.3.18-150200.24.129.1.x86_64",
          "SUSE Manager Retail Branch Server 4.1:reiserfs-kmp-default-5.3.18-150200.24.129.1.x86_64",
          "SUSE Manager Server 4.1:kernel-default-5.3.18-150200.24.129.1.ppc64le",
          "SUSE Manager Server 4.1:kernel-default-5.3.18-150200.24.129.1.s390x",
          "SUSE Manager Server 4.1:kernel-default-5.3.18-150200.24.129.1.x86_64",
          "SUSE Manager Server 4.1:kernel-default-base-5.3.18-150200.24.129.1.150200.9.61.1.ppc64le",
          "SUSE Manager Server 4.1:kernel-default-base-5.3.18-150200.24.129.1.150200.9.61.1.s390x",
          "SUSE Manager Server 4.1:kernel-default-base-5.3.18-150200.24.129.1.150200.9.61.1.x86_64",
          "SUSE Manager Server 4.1:kernel-default-devel-5.3.18-150200.24.129.1.ppc64le",
          "SUSE Manager Server 4.1:kernel-default-devel-5.3.18-150200.24.129.1.s390x",
          "SUSE Manager Server 4.1:kernel-default-devel-5.3.18-150200.24.129.1.x86_64",
          "SUSE Manager Server 4.1:kernel-devel-5.3.18-150200.24.129.1.noarch",
          "SUSE Manager Server 4.1:kernel-docs-5.3.18-150200.24.129.1.noarch",
          "SUSE Manager Server 4.1:kernel-macros-5.3.18-150200.24.129.1.noarch",
          "SUSE Manager Server 4.1:kernel-obs-build-5.3.18-150200.24.129.1.ppc64le",
          "SUSE Manager Server 4.1:kernel-obs-build-5.3.18-150200.24.129.1.s390x",
          "SUSE Manager Server 4.1:kernel-obs-build-5.3.18-150200.24.129.1.x86_64",
          "SUSE Manager Server 4.1:kernel-preempt-5.3.18-150200.24.129.1.x86_64",
          "SUSE Manager Server 4.1:kernel-preempt-devel-5.3.18-150200.24.129.1.x86_64",
          "SUSE Manager Server 4.1:kernel-source-5.3.18-150200.24.129.1.noarch",
          "SUSE Manager Server 4.1:kernel-syms-5.3.18-150200.24.129.1.ppc64le",
          "SUSE Manager Server 4.1:kernel-syms-5.3.18-150200.24.129.1.s390x",
          "SUSE Manager Server 4.1:kernel-syms-5.3.18-150200.24.129.1.x86_64",
          "SUSE Manager Server 4.1:reiserfs-kmp-default-5.3.18-150200.24.129.1.ppc64le",
          "SUSE Manager Server 4.1:reiserfs-kmp-default-5.3.18-150200.24.129.1.s390x",
          "SUSE Manager Server 4.1:reiserfs-kmp-default-5.3.18-150200.24.129.1.x86_64"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2022-32250",
          "url": "https://www.suse.com/security/cve/CVE-2022-32250"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1200015 for CVE-2022-32250",
          "url": "https://bugzilla.suse.com/1200015"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1200268 for CVE-2022-32250",
          "url": "https://bugzilla.suse.com/1200268"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1200494 for CVE-2022-32250",
          "url": "https://bugzilla.suse.com/1200494"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1202992 for CVE-2022-32250",
          "url": "https://bugzilla.suse.com/1202992"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1202993 for CVE-2022-32250",
          "url": "https://bugzilla.suse.com/1202993"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1203002 for CVE-2022-32250",
          "url": "https://bugzilla.suse.com/1203002"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "SUSE Enterprise Storage 7:kernel-default-5.3.18-150200.24.129.1.aarch64",
            "SUSE Enterprise Storage 7:kernel-default-5.3.18-150200.24.129.1.x86_64",
            "SUSE Enterprise Storage 7:kernel-default-base-5.3.18-150200.24.129.1.150200.9.61.1.aarch64",
            "SUSE Enterprise Storage 7:kernel-default-base-5.3.18-150200.24.129.1.150200.9.61.1.x86_64",
            "SUSE Enterprise Storage 7:kernel-default-devel-5.3.18-150200.24.129.1.aarch64",
            "SUSE Enterprise Storage 7:kernel-default-devel-5.3.18-150200.24.129.1.x86_64",
            "SUSE Enterprise Storage 7:kernel-devel-5.3.18-150200.24.129.1.noarch",
            "SUSE Enterprise Storage 7:kernel-docs-5.3.18-150200.24.129.1.noarch",
            "SUSE Enterprise Storage 7:kernel-macros-5.3.18-150200.24.129.1.noarch",
            "SUSE Enterprise Storage 7:kernel-obs-build-5.3.18-150200.24.129.1.aarch64",
            "SUSE Enterprise Storage 7:kernel-obs-build-5.3.18-150200.24.129.1.x86_64",
            "SUSE Enterprise Storage 7:kernel-preempt-5.3.18-150200.24.129.1.aarch64",
            "SUSE Enterprise Storage 7:kernel-preempt-5.3.18-150200.24.129.1.x86_64",
            "SUSE Enterprise Storage 7:kernel-preempt-devel-5.3.18-150200.24.129.1.aarch64",
            "SUSE Enterprise Storage 7:kernel-preempt-devel-5.3.18-150200.24.129.1.x86_64",
            "SUSE Enterprise Storage 7:kernel-source-5.3.18-150200.24.129.1.noarch",
            "SUSE Enterprise Storage 7:kernel-syms-5.3.18-150200.24.129.1.aarch64",
            "SUSE Enterprise Storage 7:kernel-syms-5.3.18-150200.24.129.1.x86_64",
            "SUSE Enterprise Storage 7:reiserfs-kmp-default-5.3.18-150200.24.129.1.aarch64",
            "SUSE Enterprise Storage 7:reiserfs-kmp-default-5.3.18-150200.24.129.1.x86_64",
            "SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-150200.24.129.1.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-150200.24.129.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-150200.24.129.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-150200.24.129.1.x86_64",
            "SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-150200.24.129.1.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-150200.24.129.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-150200.24.129.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-150200.24.129.1.x86_64",
            "SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-150200.24.129.1.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-150200.24.129.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-150200.24.129.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-150200.24.129.1.x86_64",
            "SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-150200.24.129.1.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-150200.24.129.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-150200.24.129.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-150200.24.129.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-default-5.3.18-150200.24.129.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-default-5.3.18-150200.24.129.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-default-base-5.3.18-150200.24.129.1.150200.9.61.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-default-base-5.3.18-150200.24.129.1.150200.9.61.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-default-devel-5.3.18-150200.24.129.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-default-devel-5.3.18-150200.24.129.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-devel-5.3.18-150200.24.129.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-docs-5.3.18-150200.24.129.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-macros-5.3.18-150200.24.129.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-obs-build-5.3.18-150200.24.129.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-obs-build-5.3.18-150200.24.129.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-preempt-5.3.18-150200.24.129.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-preempt-5.3.18-150200.24.129.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-preempt-devel-5.3.18-150200.24.129.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-preempt-devel-5.3.18-150200.24.129.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-source-5.3.18-150200.24.129.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-syms-5.3.18-150200.24.129.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-syms-5.3.18-150200.24.129.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-5.3.18-150200.24.129.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-5.3.18-150200.24.129.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.129.1.150200.9.61.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.129.1.150200.9.61.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.129.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.129.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-devel-5.3.18-150200.24.129.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-docs-5.3.18-150200.24.129.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-macros-5.3.18-150200.24.129.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.129.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.129.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-preempt-5.3.18-150200.24.129.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-preempt-5.3.18-150200.24.129.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-preempt-devel-5.3.18-150200.24.129.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-preempt-devel-5.3.18-150200.24.129.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-source-5.3.18-150200.24.129.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.129.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.129.1.x86_64",
            "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-5.3.18-150200.24.129.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-5.3.18-150200.24.129.1.s390x",
            "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-5.3.18-150200.24.129.1.x86_64",
            "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-devel-5.3.18-150200.24.129.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-devel-5.3.18-150200.24.129.1.s390x",
            "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-devel-5.3.18-150200.24.129.1.x86_64",
            "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-150200_24_129-default-1-150200.5.3.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-150200_24_129-default-1-150200.5.3.1.s390x",
            "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-150200_24_129-default-1-150200.5.3.1.x86_64",
            "SUSE Linux Enterprise Server 15 SP2-BCL:kernel-default-5.3.18-150200.24.129.1.x86_64",
            "SUSE Linux Enterprise Server 15 SP2-BCL:kernel-default-base-5.3.18-150200.24.129.1.150200.9.61.1.x86_64",
            "SUSE Linux Enterprise Server 15 SP2-BCL:kernel-default-devel-5.3.18-150200.24.129.1.x86_64",
            "SUSE Linux Enterprise Server 15 SP2-BCL:kernel-devel-5.3.18-150200.24.129.1.noarch",
            "SUSE Linux Enterprise Server 15 SP2-BCL:kernel-docs-5.3.18-150200.24.129.1.noarch",
            "SUSE Linux Enterprise Server 15 SP2-BCL:kernel-macros-5.3.18-150200.24.129.1.noarch",
            "SUSE Linux Enterprise Server 15 SP2-BCL:kernel-obs-build-5.3.18-150200.24.129.1.x86_64",
            "SUSE Linux Enterprise Server 15 SP2-BCL:kernel-preempt-5.3.18-150200.24.129.1.x86_64",
            "SUSE Linux Enterprise Server 15 SP2-BCL:kernel-preempt-devel-5.3.18-150200.24.129.1.x86_64",
            "SUSE Linux Enterprise Server 15 SP2-BCL:kernel-source-5.3.18-150200.24.129.1.noarch",
            "SUSE Linux Enterprise Server 15 SP2-BCL:kernel-syms-5.3.18-150200.24.129.1.x86_64",
            "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-5.3.18-150200.24.129.1.aarch64",
            "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-5.3.18-150200.24.129.1.ppc64le",
            "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-5.3.18-150200.24.129.1.s390x",
            "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-5.3.18-150200.24.129.1.x86_64",
            "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.129.1.150200.9.61.1.aarch64",
            "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.129.1.150200.9.61.1.ppc64le",
            "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.129.1.150200.9.61.1.s390x",
            "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.129.1.150200.9.61.1.x86_64",
            "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.129.1.aarch64",
            "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.129.1.ppc64le",
            "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.129.1.s390x",
            "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.129.1.x86_64",
            "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-devel-5.3.18-150200.24.129.1.noarch",
            "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-docs-5.3.18-150200.24.129.1.noarch",
            "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-macros-5.3.18-150200.24.129.1.noarch",
            "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.129.1.aarch64",
            "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.129.1.ppc64le",
            "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.129.1.s390x",
            "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.129.1.x86_64",
            "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-preempt-5.3.18-150200.24.129.1.aarch64",
            "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-preempt-5.3.18-150200.24.129.1.x86_64",
            "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-preempt-devel-5.3.18-150200.24.129.1.aarch64",
            "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-preempt-devel-5.3.18-150200.24.129.1.x86_64",
            "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-source-5.3.18-150200.24.129.1.noarch",
            "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.129.1.aarch64",
            "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.129.1.ppc64le",
            "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.129.1.s390x",
            "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.129.1.x86_64",
            "SUSE Linux Enterprise Server 15 SP2-LTSS:reiserfs-kmp-default-5.3.18-150200.24.129.1.aarch64",
            "SUSE Linux Enterprise Server 15 SP2-LTSS:reiserfs-kmp-default-5.3.18-150200.24.129.1.ppc64le",
            "SUSE Linux Enterprise Server 15 SP2-LTSS:reiserfs-kmp-default-5.3.18-150200.24.129.1.s390x",
            "SUSE Linux Enterprise Server 15 SP2-LTSS:reiserfs-kmp-default-5.3.18-150200.24.129.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-5.3.18-150200.24.129.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-5.3.18-150200.24.129.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-base-5.3.18-150200.24.129.1.150200.9.61.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-base-5.3.18-150200.24.129.1.150200.9.61.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-devel-5.3.18-150200.24.129.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-devel-5.3.18-150200.24.129.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-devel-5.3.18-150200.24.129.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-docs-5.3.18-150200.24.129.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-macros-5.3.18-150200.24.129.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-obs-build-5.3.18-150200.24.129.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-obs-build-5.3.18-150200.24.129.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-preempt-5.3.18-150200.24.129.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-preempt-devel-5.3.18-150200.24.129.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-source-5.3.18-150200.24.129.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-syms-5.3.18-150200.24.129.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-syms-5.3.18-150200.24.129.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP2:reiserfs-kmp-default-5.3.18-150200.24.129.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP2:reiserfs-kmp-default-5.3.18-150200.24.129.1.x86_64",
            "SUSE Manager Proxy 4.1:kernel-default-5.3.18-150200.24.129.1.x86_64",
            "SUSE Manager Proxy 4.1:kernel-default-base-5.3.18-150200.24.129.1.150200.9.61.1.x86_64",
            "SUSE Manager Proxy 4.1:kernel-default-devel-5.3.18-150200.24.129.1.x86_64",
            "SUSE Manager Proxy 4.1:kernel-devel-5.3.18-150200.24.129.1.noarch",
            "SUSE Manager Proxy 4.1:kernel-docs-5.3.18-150200.24.129.1.noarch",
            "SUSE Manager Proxy 4.1:kernel-macros-5.3.18-150200.24.129.1.noarch",
            "SUSE Manager Proxy 4.1:kernel-obs-build-5.3.18-150200.24.129.1.x86_64",
            "SUSE Manager Proxy 4.1:kernel-preempt-5.3.18-150200.24.129.1.x86_64",
            "SUSE Manager Proxy 4.1:kernel-preempt-devel-5.3.18-150200.24.129.1.x86_64",
            "SUSE Manager Proxy 4.1:kernel-source-5.3.18-150200.24.129.1.noarch",
            "SUSE Manager Proxy 4.1:kernel-syms-5.3.18-150200.24.129.1.x86_64",
            "SUSE Manager Proxy 4.1:reiserfs-kmp-default-5.3.18-150200.24.129.1.x86_64",
            "SUSE Manager Retail Branch Server 4.1:kernel-default-5.3.18-150200.24.129.1.x86_64",
            "SUSE Manager Retail Branch Server 4.1:kernel-default-base-5.3.18-150200.24.129.1.150200.9.61.1.x86_64",
            "SUSE Manager Retail Branch Server 4.1:kernel-default-devel-5.3.18-150200.24.129.1.x86_64",
            "SUSE Manager Retail Branch Server 4.1:kernel-devel-5.3.18-150200.24.129.1.noarch",
            "SUSE Manager Retail Branch Server 4.1:kernel-docs-5.3.18-150200.24.129.1.noarch",
            "SUSE Manager Retail Branch Server 4.1:kernel-macros-5.3.18-150200.24.129.1.noarch",
            "SUSE Manager Retail Branch Server 4.1:kernel-obs-build-5.3.18-150200.24.129.1.x86_64",
            "SUSE Manager Retail Branch Server 4.1:kernel-preempt-5.3.18-150200.24.129.1.x86_64",
            "SUSE Manager Retail Branch Server 4.1:kernel-preempt-devel-5.3.18-150200.24.129.1.x86_64",
            "SUSE Manager Retail Branch Server 4.1:kernel-source-5.3.18-150200.24.129.1.noarch",
            "SUSE Manager Retail Branch Server 4.1:kernel-syms-5.3.18-150200.24.129.1.x86_64",
            "SUSE Manager Retail Branch Server 4.1:reiserfs-kmp-default-5.3.18-150200.24.129.1.x86_64",
            "SUSE Manager Server 4.1:kernel-default-5.3.18-150200.24.129.1.ppc64le",
            "SUSE Manager Server 4.1:kernel-default-5.3.18-150200.24.129.1.s390x",
            "SUSE Manager Server 4.1:kernel-default-5.3.18-150200.24.129.1.x86_64",
            "SUSE Manager Server 4.1:kernel-default-base-5.3.18-150200.24.129.1.150200.9.61.1.ppc64le",
            "SUSE Manager Server 4.1:kernel-default-base-5.3.18-150200.24.129.1.150200.9.61.1.s390x",
            "SUSE Manager Server 4.1:kernel-default-base-5.3.18-150200.24.129.1.150200.9.61.1.x86_64",
            "SUSE Manager Server 4.1:kernel-default-devel-5.3.18-150200.24.129.1.ppc64le",
            "SUSE Manager Server 4.1:kernel-default-devel-5.3.18-150200.24.129.1.s390x",
            "SUSE Manager Server 4.1:kernel-default-devel-5.3.18-150200.24.129.1.x86_64",
            "SUSE Manager Server 4.1:kernel-devel-5.3.18-150200.24.129.1.noarch",
            "SUSE Manager Server 4.1:kernel-docs-5.3.18-150200.24.129.1.noarch",
            "SUSE Manager Server 4.1:kernel-macros-5.3.18-150200.24.129.1.noarch",
            "SUSE Manager Server 4.1:kernel-obs-build-5.3.18-150200.24.129.1.ppc64le",
            "SUSE Manager Server 4.1:kernel-obs-build-5.3.18-150200.24.129.1.s390x",
            "SUSE Manager Server 4.1:kernel-obs-build-5.3.18-150200.24.129.1.x86_64",
            "SUSE Manager Server 4.1:kernel-preempt-5.3.18-150200.24.129.1.x86_64",
            "SUSE Manager Server 4.1:kernel-preempt-devel-5.3.18-150200.24.129.1.x86_64",
            "SUSE Manager Server 4.1:kernel-source-5.3.18-150200.24.129.1.noarch",
            "SUSE Manager Server 4.1:kernel-syms-5.3.18-150200.24.129.1.ppc64le",
            "SUSE Manager Server 4.1:kernel-syms-5.3.18-150200.24.129.1.s390x",
            "SUSE Manager Server 4.1:kernel-syms-5.3.18-150200.24.129.1.x86_64",
            "SUSE Manager Server 4.1:reiserfs-kmp-default-5.3.18-150200.24.129.1.ppc64le",
            "SUSE Manager Server 4.1:reiserfs-kmp-default-5.3.18-150200.24.129.1.s390x",
            "SUSE Manager Server 4.1:reiserfs-kmp-default-5.3.18-150200.24.129.1.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 7.8,
            "baseSeverity": "HIGH",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
            "version": "3.1"
          },
          "products": [
            "SUSE Enterprise Storage 7:kernel-default-5.3.18-150200.24.129.1.aarch64",
            "SUSE Enterprise Storage 7:kernel-default-5.3.18-150200.24.129.1.x86_64",
            "SUSE Enterprise Storage 7:kernel-default-base-5.3.18-150200.24.129.1.150200.9.61.1.aarch64",
            "SUSE Enterprise Storage 7:kernel-default-base-5.3.18-150200.24.129.1.150200.9.61.1.x86_64",
            "SUSE Enterprise Storage 7:kernel-default-devel-5.3.18-150200.24.129.1.aarch64",
            "SUSE Enterprise Storage 7:kernel-default-devel-5.3.18-150200.24.129.1.x86_64",
            "SUSE Enterprise Storage 7:kernel-devel-5.3.18-150200.24.129.1.noarch",
            "SUSE Enterprise Storage 7:kernel-docs-5.3.18-150200.24.129.1.noarch",
            "SUSE Enterprise Storage 7:kernel-macros-5.3.18-150200.24.129.1.noarch",
            "SUSE Enterprise Storage 7:kernel-obs-build-5.3.18-150200.24.129.1.aarch64",
            "SUSE Enterprise Storage 7:kernel-obs-build-5.3.18-150200.24.129.1.x86_64",
            "SUSE Enterprise Storage 7:kernel-preempt-5.3.18-150200.24.129.1.aarch64",
            "SUSE Enterprise Storage 7:kernel-preempt-5.3.18-150200.24.129.1.x86_64",
            "SUSE Enterprise Storage 7:kernel-preempt-devel-5.3.18-150200.24.129.1.aarch64",
            "SUSE Enterprise Storage 7:kernel-preempt-devel-5.3.18-150200.24.129.1.x86_64",
            "SUSE Enterprise Storage 7:kernel-source-5.3.18-150200.24.129.1.noarch",
            "SUSE Enterprise Storage 7:kernel-syms-5.3.18-150200.24.129.1.aarch64",
            "SUSE Enterprise Storage 7:kernel-syms-5.3.18-150200.24.129.1.x86_64",
            "SUSE Enterprise Storage 7:reiserfs-kmp-default-5.3.18-150200.24.129.1.aarch64",
            "SUSE Enterprise Storage 7:reiserfs-kmp-default-5.3.18-150200.24.129.1.x86_64",
            "SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-150200.24.129.1.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-150200.24.129.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-150200.24.129.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-150200.24.129.1.x86_64",
            "SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-150200.24.129.1.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-150200.24.129.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-150200.24.129.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-150200.24.129.1.x86_64",
            "SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-150200.24.129.1.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-150200.24.129.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-150200.24.129.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-150200.24.129.1.x86_64",
            "SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-150200.24.129.1.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-150200.24.129.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-150200.24.129.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-150200.24.129.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-default-5.3.18-150200.24.129.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-default-5.3.18-150200.24.129.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-default-base-5.3.18-150200.24.129.1.150200.9.61.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-default-base-5.3.18-150200.24.129.1.150200.9.61.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-default-devel-5.3.18-150200.24.129.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-default-devel-5.3.18-150200.24.129.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-devel-5.3.18-150200.24.129.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-docs-5.3.18-150200.24.129.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-macros-5.3.18-150200.24.129.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-obs-build-5.3.18-150200.24.129.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-obs-build-5.3.18-150200.24.129.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-preempt-5.3.18-150200.24.129.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-preempt-5.3.18-150200.24.129.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-preempt-devel-5.3.18-150200.24.129.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-preempt-devel-5.3.18-150200.24.129.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-source-5.3.18-150200.24.129.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-syms-5.3.18-150200.24.129.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-syms-5.3.18-150200.24.129.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-5.3.18-150200.24.129.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-5.3.18-150200.24.129.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.129.1.150200.9.61.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.129.1.150200.9.61.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.129.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.129.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-devel-5.3.18-150200.24.129.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-docs-5.3.18-150200.24.129.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-macros-5.3.18-150200.24.129.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.129.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.129.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-preempt-5.3.18-150200.24.129.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-preempt-5.3.18-150200.24.129.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-preempt-devel-5.3.18-150200.24.129.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-preempt-devel-5.3.18-150200.24.129.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-source-5.3.18-150200.24.129.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.129.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.129.1.x86_64",
            "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-5.3.18-150200.24.129.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-5.3.18-150200.24.129.1.s390x",
            "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-5.3.18-150200.24.129.1.x86_64",
            "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-devel-5.3.18-150200.24.129.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-devel-5.3.18-150200.24.129.1.s390x",
            "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-devel-5.3.18-150200.24.129.1.x86_64",
            "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-150200_24_129-default-1-150200.5.3.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-150200_24_129-default-1-150200.5.3.1.s390x",
            "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-150200_24_129-default-1-150200.5.3.1.x86_64",
            "SUSE Linux Enterprise Server 15 SP2-BCL:kernel-default-5.3.18-150200.24.129.1.x86_64",
            "SUSE Linux Enterprise Server 15 SP2-BCL:kernel-default-base-5.3.18-150200.24.129.1.150200.9.61.1.x86_64",
            "SUSE Linux Enterprise Server 15 SP2-BCL:kernel-default-devel-5.3.18-150200.24.129.1.x86_64",
            "SUSE Linux Enterprise Server 15 SP2-BCL:kernel-devel-5.3.18-150200.24.129.1.noarch",
            "SUSE Linux Enterprise Server 15 SP2-BCL:kernel-docs-5.3.18-150200.24.129.1.noarch",
            "SUSE Linux Enterprise Server 15 SP2-BCL:kernel-macros-5.3.18-150200.24.129.1.noarch",
            "SUSE Linux Enterprise Server 15 SP2-BCL:kernel-obs-build-5.3.18-150200.24.129.1.x86_64",
            "SUSE Linux Enterprise Server 15 SP2-BCL:kernel-preempt-5.3.18-150200.24.129.1.x86_64",
            "SUSE Linux Enterprise Server 15 SP2-BCL:kernel-preempt-devel-5.3.18-150200.24.129.1.x86_64",
            "SUSE Linux Enterprise Server 15 SP2-BCL:kernel-source-5.3.18-150200.24.129.1.noarch",
            "SUSE Linux Enterprise Server 15 SP2-BCL:kernel-syms-5.3.18-150200.24.129.1.x86_64",
            "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-5.3.18-150200.24.129.1.aarch64",
            "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-5.3.18-150200.24.129.1.ppc64le",
            "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-5.3.18-150200.24.129.1.s390x",
            "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-5.3.18-150200.24.129.1.x86_64",
            "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.129.1.150200.9.61.1.aarch64",
            "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.129.1.150200.9.61.1.ppc64le",
            "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.129.1.150200.9.61.1.s390x",
            "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.129.1.150200.9.61.1.x86_64",
            "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.129.1.aarch64",
            "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.129.1.ppc64le",
            "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.129.1.s390x",
            "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.129.1.x86_64",
            "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-devel-5.3.18-150200.24.129.1.noarch",
            "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-docs-5.3.18-150200.24.129.1.noarch",
            "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-macros-5.3.18-150200.24.129.1.noarch",
            "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.129.1.aarch64",
            "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.129.1.ppc64le",
            "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.129.1.s390x",
            "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.129.1.x86_64",
            "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-preempt-5.3.18-150200.24.129.1.aarch64",
            "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-preempt-5.3.18-150200.24.129.1.x86_64",
            "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-preempt-devel-5.3.18-150200.24.129.1.aarch64",
            "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-preempt-devel-5.3.18-150200.24.129.1.x86_64",
            "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-source-5.3.18-150200.24.129.1.noarch",
            "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.129.1.aarch64",
            "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.129.1.ppc64le",
            "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.129.1.s390x",
            "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.129.1.x86_64",
            "SUSE Linux Enterprise Server 15 SP2-LTSS:reiserfs-kmp-default-5.3.18-150200.24.129.1.aarch64",
            "SUSE Linux Enterprise Server 15 SP2-LTSS:reiserfs-kmp-default-5.3.18-150200.24.129.1.ppc64le",
            "SUSE Linux Enterprise Server 15 SP2-LTSS:reiserfs-kmp-default-5.3.18-150200.24.129.1.s390x",
            "SUSE Linux Enterprise Server 15 SP2-LTSS:reiserfs-kmp-default-5.3.18-150200.24.129.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-5.3.18-150200.24.129.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-5.3.18-150200.24.129.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-base-5.3.18-150200.24.129.1.150200.9.61.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-base-5.3.18-150200.24.129.1.150200.9.61.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-devel-5.3.18-150200.24.129.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-devel-5.3.18-150200.24.129.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-devel-5.3.18-150200.24.129.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-docs-5.3.18-150200.24.129.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-macros-5.3.18-150200.24.129.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-obs-build-5.3.18-150200.24.129.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-obs-build-5.3.18-150200.24.129.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-preempt-5.3.18-150200.24.129.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-preempt-devel-5.3.18-150200.24.129.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-source-5.3.18-150200.24.129.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-syms-5.3.18-150200.24.129.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-syms-5.3.18-150200.24.129.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP2:reiserfs-kmp-default-5.3.18-150200.24.129.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP2:reiserfs-kmp-default-5.3.18-150200.24.129.1.x86_64",
            "SUSE Manager Proxy 4.1:kernel-default-5.3.18-150200.24.129.1.x86_64",
            "SUSE Manager Proxy 4.1:kernel-default-base-5.3.18-150200.24.129.1.150200.9.61.1.x86_64",
            "SUSE Manager Proxy 4.1:kernel-default-devel-5.3.18-150200.24.129.1.x86_64",
            "SUSE Manager Proxy 4.1:kernel-devel-5.3.18-150200.24.129.1.noarch",
            "SUSE Manager Proxy 4.1:kernel-docs-5.3.18-150200.24.129.1.noarch",
            "SUSE Manager Proxy 4.1:kernel-macros-5.3.18-150200.24.129.1.noarch",
            "SUSE Manager Proxy 4.1:kernel-obs-build-5.3.18-150200.24.129.1.x86_64",
            "SUSE Manager Proxy 4.1:kernel-preempt-5.3.18-150200.24.129.1.x86_64",
            "SUSE Manager Proxy 4.1:kernel-preempt-devel-5.3.18-150200.24.129.1.x86_64",
            "SUSE Manager Proxy 4.1:kernel-source-5.3.18-150200.24.129.1.noarch",
            "SUSE Manager Proxy 4.1:kernel-syms-5.3.18-150200.24.129.1.x86_64",
            "SUSE Manager Proxy 4.1:reiserfs-kmp-default-5.3.18-150200.24.129.1.x86_64",
            "SUSE Manager Retail Branch Server 4.1:kernel-default-5.3.18-150200.24.129.1.x86_64",
            "SUSE Manager Retail Branch Server 4.1:kernel-default-base-5.3.18-150200.24.129.1.150200.9.61.1.x86_64",
            "SUSE Manager Retail Branch Server 4.1:kernel-default-devel-5.3.18-150200.24.129.1.x86_64",
            "SUSE Manager Retail Branch Server 4.1:kernel-devel-5.3.18-150200.24.129.1.noarch",
            "SUSE Manager Retail Branch Server 4.1:kernel-docs-5.3.18-150200.24.129.1.noarch",
            "SUSE Manager Retail Branch Server 4.1:kernel-macros-5.3.18-150200.24.129.1.noarch",
            "SUSE Manager Retail Branch Server 4.1:kernel-obs-build-5.3.18-150200.24.129.1.x86_64",
            "SUSE Manager Retail Branch Server 4.1:kernel-preempt-5.3.18-150200.24.129.1.x86_64",
            "SUSE Manager Retail Branch Server 4.1:kernel-preempt-devel-5.3.18-150200.24.129.1.x86_64",
            "SUSE Manager Retail Branch Server 4.1:kernel-source-5.3.18-150200.24.129.1.noarch",
            "SUSE Manager Retail Branch Server 4.1:kernel-syms-5.3.18-150200.24.129.1.x86_64",
            "SUSE Manager Retail Branch Server 4.1:reiserfs-kmp-default-5.3.18-150200.24.129.1.x86_64",
            "SUSE Manager Server 4.1:kernel-default-5.3.18-150200.24.129.1.ppc64le",
            "SUSE Manager Server 4.1:kernel-default-5.3.18-150200.24.129.1.s390x",
            "SUSE Manager Server 4.1:kernel-default-5.3.18-150200.24.129.1.x86_64",
            "SUSE Manager Server 4.1:kernel-default-base-5.3.18-150200.24.129.1.150200.9.61.1.ppc64le",
            "SUSE Manager Server 4.1:kernel-default-base-5.3.18-150200.24.129.1.150200.9.61.1.s390x",
            "SUSE Manager Server 4.1:kernel-default-base-5.3.18-150200.24.129.1.150200.9.61.1.x86_64",
            "SUSE Manager Server 4.1:kernel-default-devel-5.3.18-150200.24.129.1.ppc64le",
            "SUSE Manager Server 4.1:kernel-default-devel-5.3.18-150200.24.129.1.s390x",
            "SUSE Manager Server 4.1:kernel-default-devel-5.3.18-150200.24.129.1.x86_64",
            "SUSE Manager Server 4.1:kernel-devel-5.3.18-150200.24.129.1.noarch",
            "SUSE Manager Server 4.1:kernel-docs-5.3.18-150200.24.129.1.noarch",
            "SUSE Manager Server 4.1:kernel-macros-5.3.18-150200.24.129.1.noarch",
            "SUSE Manager Server 4.1:kernel-obs-build-5.3.18-150200.24.129.1.ppc64le",
            "SUSE Manager Server 4.1:kernel-obs-build-5.3.18-150200.24.129.1.s390x",
            "SUSE Manager Server 4.1:kernel-obs-build-5.3.18-150200.24.129.1.x86_64",
            "SUSE Manager Server 4.1:kernel-preempt-5.3.18-150200.24.129.1.x86_64",
            "SUSE Manager Server 4.1:kernel-preempt-devel-5.3.18-150200.24.129.1.x86_64",
            "SUSE Manager Server 4.1:kernel-source-5.3.18-150200.24.129.1.noarch",
            "SUSE Manager Server 4.1:kernel-syms-5.3.18-150200.24.129.1.ppc64le",
            "SUSE Manager Server 4.1:kernel-syms-5.3.18-150200.24.129.1.s390x",
            "SUSE Manager Server 4.1:kernel-syms-5.3.18-150200.24.129.1.x86_64",
            "SUSE Manager Server 4.1:reiserfs-kmp-default-5.3.18-150200.24.129.1.ppc64le",
            "SUSE Manager Server 4.1:reiserfs-kmp-default-5.3.18-150200.24.129.1.s390x",
            "SUSE Manager Server 4.1:reiserfs-kmp-default-5.3.18-150200.24.129.1.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2022-09-28T06:48:59Z",
          "details": "important"
        }
      ],
      "title": "CVE-2022-32250"
    },
    {
      "cve": "CVE-2022-36879",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2022-36879"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "An issue was discovered in the Linux kernel through 5.18.14. xfrm_expand_policies in net/xfrm/xfrm_policy.c can cause a refcount to be dropped twice.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "SUSE Enterprise Storage 7:kernel-default-5.3.18-150200.24.129.1.aarch64",
          "SUSE Enterprise Storage 7:kernel-default-5.3.18-150200.24.129.1.x86_64",
          "SUSE Enterprise Storage 7:kernel-default-base-5.3.18-150200.24.129.1.150200.9.61.1.aarch64",
          "SUSE Enterprise Storage 7:kernel-default-base-5.3.18-150200.24.129.1.150200.9.61.1.x86_64",
          "SUSE Enterprise Storage 7:kernel-default-devel-5.3.18-150200.24.129.1.aarch64",
          "SUSE Enterprise Storage 7:kernel-default-devel-5.3.18-150200.24.129.1.x86_64",
          "SUSE Enterprise Storage 7:kernel-devel-5.3.18-150200.24.129.1.noarch",
          "SUSE Enterprise Storage 7:kernel-docs-5.3.18-150200.24.129.1.noarch",
          "SUSE Enterprise Storage 7:kernel-macros-5.3.18-150200.24.129.1.noarch",
          "SUSE Enterprise Storage 7:kernel-obs-build-5.3.18-150200.24.129.1.aarch64",
          "SUSE Enterprise Storage 7:kernel-obs-build-5.3.18-150200.24.129.1.x86_64",
          "SUSE Enterprise Storage 7:kernel-preempt-5.3.18-150200.24.129.1.aarch64",
          "SUSE Enterprise Storage 7:kernel-preempt-5.3.18-150200.24.129.1.x86_64",
          "SUSE Enterprise Storage 7:kernel-preempt-devel-5.3.18-150200.24.129.1.aarch64",
          "SUSE Enterprise Storage 7:kernel-preempt-devel-5.3.18-150200.24.129.1.x86_64",
          "SUSE Enterprise Storage 7:kernel-source-5.3.18-150200.24.129.1.noarch",
          "SUSE Enterprise Storage 7:kernel-syms-5.3.18-150200.24.129.1.aarch64",
          "SUSE Enterprise Storage 7:kernel-syms-5.3.18-150200.24.129.1.x86_64",
          "SUSE Enterprise Storage 7:reiserfs-kmp-default-5.3.18-150200.24.129.1.aarch64",
          "SUSE Enterprise Storage 7:reiserfs-kmp-default-5.3.18-150200.24.129.1.x86_64",
          "SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-150200.24.129.1.aarch64",
          "SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-150200.24.129.1.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-150200.24.129.1.s390x",
          "SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-150200.24.129.1.x86_64",
          "SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-150200.24.129.1.aarch64",
          "SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-150200.24.129.1.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-150200.24.129.1.s390x",
          "SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-150200.24.129.1.x86_64",
          "SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-150200.24.129.1.aarch64",
          "SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-150200.24.129.1.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-150200.24.129.1.s390x",
          "SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-150200.24.129.1.x86_64",
          "SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-150200.24.129.1.aarch64",
          "SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-150200.24.129.1.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-150200.24.129.1.s390x",
          "SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-150200.24.129.1.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-default-5.3.18-150200.24.129.1.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-default-5.3.18-150200.24.129.1.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-default-base-5.3.18-150200.24.129.1.150200.9.61.1.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-default-base-5.3.18-150200.24.129.1.150200.9.61.1.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-default-devel-5.3.18-150200.24.129.1.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-default-devel-5.3.18-150200.24.129.1.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-devel-5.3.18-150200.24.129.1.noarch",
          "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-docs-5.3.18-150200.24.129.1.noarch",
          "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-macros-5.3.18-150200.24.129.1.noarch",
          "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-obs-build-5.3.18-150200.24.129.1.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-obs-build-5.3.18-150200.24.129.1.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-preempt-5.3.18-150200.24.129.1.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-preempt-5.3.18-150200.24.129.1.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-preempt-devel-5.3.18-150200.24.129.1.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-preempt-devel-5.3.18-150200.24.129.1.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-source-5.3.18-150200.24.129.1.noarch",
          "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-syms-5.3.18-150200.24.129.1.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-syms-5.3.18-150200.24.129.1.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-5.3.18-150200.24.129.1.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-5.3.18-150200.24.129.1.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.129.1.150200.9.61.1.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.129.1.150200.9.61.1.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.129.1.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.129.1.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-devel-5.3.18-150200.24.129.1.noarch",
          "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-docs-5.3.18-150200.24.129.1.noarch",
          "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-macros-5.3.18-150200.24.129.1.noarch",
          "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.129.1.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.129.1.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-preempt-5.3.18-150200.24.129.1.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-preempt-5.3.18-150200.24.129.1.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-preempt-devel-5.3.18-150200.24.129.1.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-preempt-devel-5.3.18-150200.24.129.1.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-source-5.3.18-150200.24.129.1.noarch",
          "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.129.1.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.129.1.x86_64",
          "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-5.3.18-150200.24.129.1.ppc64le",
          "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-5.3.18-150200.24.129.1.s390x",
          "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-5.3.18-150200.24.129.1.x86_64",
          "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-devel-5.3.18-150200.24.129.1.ppc64le",
          "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-devel-5.3.18-150200.24.129.1.s390x",
          "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-devel-5.3.18-150200.24.129.1.x86_64",
          "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-150200_24_129-default-1-150200.5.3.1.ppc64le",
          "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-150200_24_129-default-1-150200.5.3.1.s390x",
          "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-150200_24_129-default-1-150200.5.3.1.x86_64",
          "SUSE Linux Enterprise Server 15 SP2-BCL:kernel-default-5.3.18-150200.24.129.1.x86_64",
          "SUSE Linux Enterprise Server 15 SP2-BCL:kernel-default-base-5.3.18-150200.24.129.1.150200.9.61.1.x86_64",
          "SUSE Linux Enterprise Server 15 SP2-BCL:kernel-default-devel-5.3.18-150200.24.129.1.x86_64",
          "SUSE Linux Enterprise Server 15 SP2-BCL:kernel-devel-5.3.18-150200.24.129.1.noarch",
          "SUSE Linux Enterprise Server 15 SP2-BCL:kernel-docs-5.3.18-150200.24.129.1.noarch",
          "SUSE Linux Enterprise Server 15 SP2-BCL:kernel-macros-5.3.18-150200.24.129.1.noarch",
          "SUSE Linux Enterprise Server 15 SP2-BCL:kernel-obs-build-5.3.18-150200.24.129.1.x86_64",
          "SUSE Linux Enterprise Server 15 SP2-BCL:kernel-preempt-5.3.18-150200.24.129.1.x86_64",
          "SUSE Linux Enterprise Server 15 SP2-BCL:kernel-preempt-devel-5.3.18-150200.24.129.1.x86_64",
          "SUSE Linux Enterprise Server 15 SP2-BCL:kernel-source-5.3.18-150200.24.129.1.noarch",
          "SUSE Linux Enterprise Server 15 SP2-BCL:kernel-syms-5.3.18-150200.24.129.1.x86_64",
          "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-5.3.18-150200.24.129.1.aarch64",
          "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-5.3.18-150200.24.129.1.ppc64le",
          "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-5.3.18-150200.24.129.1.s390x",
          "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-5.3.18-150200.24.129.1.x86_64",
          "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.129.1.150200.9.61.1.aarch64",
          "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.129.1.150200.9.61.1.ppc64le",
          "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.129.1.150200.9.61.1.s390x",
          "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.129.1.150200.9.61.1.x86_64",
          "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.129.1.aarch64",
          "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.129.1.ppc64le",
          "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.129.1.s390x",
          "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.129.1.x86_64",
          "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-devel-5.3.18-150200.24.129.1.noarch",
          "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-docs-5.3.18-150200.24.129.1.noarch",
          "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-macros-5.3.18-150200.24.129.1.noarch",
          "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.129.1.aarch64",
          "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.129.1.ppc64le",
          "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.129.1.s390x",
          "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.129.1.x86_64",
          "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-preempt-5.3.18-150200.24.129.1.aarch64",
          "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-preempt-5.3.18-150200.24.129.1.x86_64",
          "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-preempt-devel-5.3.18-150200.24.129.1.aarch64",
          "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-preempt-devel-5.3.18-150200.24.129.1.x86_64",
          "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-source-5.3.18-150200.24.129.1.noarch",
          "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.129.1.aarch64",
          "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.129.1.ppc64le",
          "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.129.1.s390x",
          "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.129.1.x86_64",
          "SUSE Linux Enterprise Server 15 SP2-LTSS:reiserfs-kmp-default-5.3.18-150200.24.129.1.aarch64",
          "SUSE Linux Enterprise Server 15 SP2-LTSS:reiserfs-kmp-default-5.3.18-150200.24.129.1.ppc64le",
          "SUSE Linux Enterprise Server 15 SP2-LTSS:reiserfs-kmp-default-5.3.18-150200.24.129.1.s390x",
          "SUSE Linux Enterprise Server 15 SP2-LTSS:reiserfs-kmp-default-5.3.18-150200.24.129.1.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-5.3.18-150200.24.129.1.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-5.3.18-150200.24.129.1.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-base-5.3.18-150200.24.129.1.150200.9.61.1.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-base-5.3.18-150200.24.129.1.150200.9.61.1.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-devel-5.3.18-150200.24.129.1.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-devel-5.3.18-150200.24.129.1.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-devel-5.3.18-150200.24.129.1.noarch",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-docs-5.3.18-150200.24.129.1.noarch",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-macros-5.3.18-150200.24.129.1.noarch",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-obs-build-5.3.18-150200.24.129.1.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-obs-build-5.3.18-150200.24.129.1.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-preempt-5.3.18-150200.24.129.1.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-preempt-devel-5.3.18-150200.24.129.1.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-source-5.3.18-150200.24.129.1.noarch",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-syms-5.3.18-150200.24.129.1.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-syms-5.3.18-150200.24.129.1.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP2:reiserfs-kmp-default-5.3.18-150200.24.129.1.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP2:reiserfs-kmp-default-5.3.18-150200.24.129.1.x86_64",
          "SUSE Manager Proxy 4.1:kernel-default-5.3.18-150200.24.129.1.x86_64",
          "SUSE Manager Proxy 4.1:kernel-default-base-5.3.18-150200.24.129.1.150200.9.61.1.x86_64",
          "SUSE Manager Proxy 4.1:kernel-default-devel-5.3.18-150200.24.129.1.x86_64",
          "SUSE Manager Proxy 4.1:kernel-devel-5.3.18-150200.24.129.1.noarch",
          "SUSE Manager Proxy 4.1:kernel-docs-5.3.18-150200.24.129.1.noarch",
          "SUSE Manager Proxy 4.1:kernel-macros-5.3.18-150200.24.129.1.noarch",
          "SUSE Manager Proxy 4.1:kernel-obs-build-5.3.18-150200.24.129.1.x86_64",
          "SUSE Manager Proxy 4.1:kernel-preempt-5.3.18-150200.24.129.1.x86_64",
          "SUSE Manager Proxy 4.1:kernel-preempt-devel-5.3.18-150200.24.129.1.x86_64",
          "SUSE Manager Proxy 4.1:kernel-source-5.3.18-150200.24.129.1.noarch",
          "SUSE Manager Proxy 4.1:kernel-syms-5.3.18-150200.24.129.1.x86_64",
          "SUSE Manager Proxy 4.1:reiserfs-kmp-default-5.3.18-150200.24.129.1.x86_64",
          "SUSE Manager Retail Branch Server 4.1:kernel-default-5.3.18-150200.24.129.1.x86_64",
          "SUSE Manager Retail Branch Server 4.1:kernel-default-base-5.3.18-150200.24.129.1.150200.9.61.1.x86_64",
          "SUSE Manager Retail Branch Server 4.1:kernel-default-devel-5.3.18-150200.24.129.1.x86_64",
          "SUSE Manager Retail Branch Server 4.1:kernel-devel-5.3.18-150200.24.129.1.noarch",
          "SUSE Manager Retail Branch Server 4.1:kernel-docs-5.3.18-150200.24.129.1.noarch",
          "SUSE Manager Retail Branch Server 4.1:kernel-macros-5.3.18-150200.24.129.1.noarch",
          "SUSE Manager Retail Branch Server 4.1:kernel-obs-build-5.3.18-150200.24.129.1.x86_64",
          "SUSE Manager Retail Branch Server 4.1:kernel-preempt-5.3.18-150200.24.129.1.x86_64",
          "SUSE Manager Retail Branch Server 4.1:kernel-preempt-devel-5.3.18-150200.24.129.1.x86_64",
          "SUSE Manager Retail Branch Server 4.1:kernel-source-5.3.18-150200.24.129.1.noarch",
          "SUSE Manager Retail Branch Server 4.1:kernel-syms-5.3.18-150200.24.129.1.x86_64",
          "SUSE Manager Retail Branch Server 4.1:reiserfs-kmp-default-5.3.18-150200.24.129.1.x86_64",
          "SUSE Manager Server 4.1:kernel-default-5.3.18-150200.24.129.1.ppc64le",
          "SUSE Manager Server 4.1:kernel-default-5.3.18-150200.24.129.1.s390x",
          "SUSE Manager Server 4.1:kernel-default-5.3.18-150200.24.129.1.x86_64",
          "SUSE Manager Server 4.1:kernel-default-base-5.3.18-150200.24.129.1.150200.9.61.1.ppc64le",
          "SUSE Manager Server 4.1:kernel-default-base-5.3.18-150200.24.129.1.150200.9.61.1.s390x",
          "SUSE Manager Server 4.1:kernel-default-base-5.3.18-150200.24.129.1.150200.9.61.1.x86_64",
          "SUSE Manager Server 4.1:kernel-default-devel-5.3.18-150200.24.129.1.ppc64le",
          "SUSE Manager Server 4.1:kernel-default-devel-5.3.18-150200.24.129.1.s390x",
          "SUSE Manager Server 4.1:kernel-default-devel-5.3.18-150200.24.129.1.x86_64",
          "SUSE Manager Server 4.1:kernel-devel-5.3.18-150200.24.129.1.noarch",
          "SUSE Manager Server 4.1:kernel-docs-5.3.18-150200.24.129.1.noarch",
          "SUSE Manager Server 4.1:kernel-macros-5.3.18-150200.24.129.1.noarch",
          "SUSE Manager Server 4.1:kernel-obs-build-5.3.18-150200.24.129.1.ppc64le",
          "SUSE Manager Server 4.1:kernel-obs-build-5.3.18-150200.24.129.1.s390x",
          "SUSE Manager Server 4.1:kernel-obs-build-5.3.18-150200.24.129.1.x86_64",
          "SUSE Manager Server 4.1:kernel-preempt-5.3.18-150200.24.129.1.x86_64",
          "SUSE Manager Server 4.1:kernel-preempt-devel-5.3.18-150200.24.129.1.x86_64",
          "SUSE Manager Server 4.1:kernel-source-5.3.18-150200.24.129.1.noarch",
          "SUSE Manager Server 4.1:kernel-syms-5.3.18-150200.24.129.1.ppc64le",
          "SUSE Manager Server 4.1:kernel-syms-5.3.18-150200.24.129.1.s390x",
          "SUSE Manager Server 4.1:kernel-syms-5.3.18-150200.24.129.1.x86_64",
          "SUSE Manager Server 4.1:reiserfs-kmp-default-5.3.18-150200.24.129.1.ppc64le",
          "SUSE Manager Server 4.1:reiserfs-kmp-default-5.3.18-150200.24.129.1.s390x",
          "SUSE Manager Server 4.1:reiserfs-kmp-default-5.3.18-150200.24.129.1.x86_64"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2022-36879",
          "url": "https://www.suse.com/security/cve/CVE-2022-36879"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1201948 for CVE-2022-36879",
          "url": "https://bugzilla.suse.com/1201948"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1212327 for CVE-2022-36879",
          "url": "https://bugzilla.suse.com/1212327"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "SUSE Enterprise Storage 7:kernel-default-5.3.18-150200.24.129.1.aarch64",
            "SUSE Enterprise Storage 7:kernel-default-5.3.18-150200.24.129.1.x86_64",
            "SUSE Enterprise Storage 7:kernel-default-base-5.3.18-150200.24.129.1.150200.9.61.1.aarch64",
            "SUSE Enterprise Storage 7:kernel-default-base-5.3.18-150200.24.129.1.150200.9.61.1.x86_64",
            "SUSE Enterprise Storage 7:kernel-default-devel-5.3.18-150200.24.129.1.aarch64",
            "SUSE Enterprise Storage 7:kernel-default-devel-5.3.18-150200.24.129.1.x86_64",
            "SUSE Enterprise Storage 7:kernel-devel-5.3.18-150200.24.129.1.noarch",
            "SUSE Enterprise Storage 7:kernel-docs-5.3.18-150200.24.129.1.noarch",
            "SUSE Enterprise Storage 7:kernel-macros-5.3.18-150200.24.129.1.noarch",
            "SUSE Enterprise Storage 7:kernel-obs-build-5.3.18-150200.24.129.1.aarch64",
            "SUSE Enterprise Storage 7:kernel-obs-build-5.3.18-150200.24.129.1.x86_64",
            "SUSE Enterprise Storage 7:kernel-preempt-5.3.18-150200.24.129.1.aarch64",
            "SUSE Enterprise Storage 7:kernel-preempt-5.3.18-150200.24.129.1.x86_64",
            "SUSE Enterprise Storage 7:kernel-preempt-devel-5.3.18-150200.24.129.1.aarch64",
            "SUSE Enterprise Storage 7:kernel-preempt-devel-5.3.18-150200.24.129.1.x86_64",
            "SUSE Enterprise Storage 7:kernel-source-5.3.18-150200.24.129.1.noarch",
            "SUSE Enterprise Storage 7:kernel-syms-5.3.18-150200.24.129.1.aarch64",
            "SUSE Enterprise Storage 7:kernel-syms-5.3.18-150200.24.129.1.x86_64",
            "SUSE Enterprise Storage 7:reiserfs-kmp-default-5.3.18-150200.24.129.1.aarch64",
            "SUSE Enterprise Storage 7:reiserfs-kmp-default-5.3.18-150200.24.129.1.x86_64",
            "SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-150200.24.129.1.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-150200.24.129.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-150200.24.129.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-150200.24.129.1.x86_64",
            "SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-150200.24.129.1.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-150200.24.129.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-150200.24.129.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-150200.24.129.1.x86_64",
            "SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-150200.24.129.1.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-150200.24.129.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-150200.24.129.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-150200.24.129.1.x86_64",
            "SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-150200.24.129.1.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-150200.24.129.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-150200.24.129.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-150200.24.129.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-default-5.3.18-150200.24.129.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-default-5.3.18-150200.24.129.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-default-base-5.3.18-150200.24.129.1.150200.9.61.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-default-base-5.3.18-150200.24.129.1.150200.9.61.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-default-devel-5.3.18-150200.24.129.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-default-devel-5.3.18-150200.24.129.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-devel-5.3.18-150200.24.129.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-docs-5.3.18-150200.24.129.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-macros-5.3.18-150200.24.129.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-obs-build-5.3.18-150200.24.129.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-obs-build-5.3.18-150200.24.129.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-preempt-5.3.18-150200.24.129.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-preempt-5.3.18-150200.24.129.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-preempt-devel-5.3.18-150200.24.129.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-preempt-devel-5.3.18-150200.24.129.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-source-5.3.18-150200.24.129.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-syms-5.3.18-150200.24.129.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-syms-5.3.18-150200.24.129.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-5.3.18-150200.24.129.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-5.3.18-150200.24.129.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.129.1.150200.9.61.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.129.1.150200.9.61.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.129.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.129.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-devel-5.3.18-150200.24.129.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-docs-5.3.18-150200.24.129.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-macros-5.3.18-150200.24.129.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.129.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.129.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-preempt-5.3.18-150200.24.129.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-preempt-5.3.18-150200.24.129.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-preempt-devel-5.3.18-150200.24.129.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-preempt-devel-5.3.18-150200.24.129.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-source-5.3.18-150200.24.129.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.129.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.129.1.x86_64",
            "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-5.3.18-150200.24.129.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-5.3.18-150200.24.129.1.s390x",
            "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-5.3.18-150200.24.129.1.x86_64",
            "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-devel-5.3.18-150200.24.129.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-devel-5.3.18-150200.24.129.1.s390x",
            "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-devel-5.3.18-150200.24.129.1.x86_64",
            "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-150200_24_129-default-1-150200.5.3.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-150200_24_129-default-1-150200.5.3.1.s390x",
            "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-150200_24_129-default-1-150200.5.3.1.x86_64",
            "SUSE Linux Enterprise Server 15 SP2-BCL:kernel-default-5.3.18-150200.24.129.1.x86_64",
            "SUSE Linux Enterprise Server 15 SP2-BCL:kernel-default-base-5.3.18-150200.24.129.1.150200.9.61.1.x86_64",
            "SUSE Linux Enterprise Server 15 SP2-BCL:kernel-default-devel-5.3.18-150200.24.129.1.x86_64",
            "SUSE Linux Enterprise Server 15 SP2-BCL:kernel-devel-5.3.18-150200.24.129.1.noarch",
            "SUSE Linux Enterprise Server 15 SP2-BCL:kernel-docs-5.3.18-150200.24.129.1.noarch",
            "SUSE Linux Enterprise Server 15 SP2-BCL:kernel-macros-5.3.18-150200.24.129.1.noarch",
            "SUSE Linux Enterprise Server 15 SP2-BCL:kernel-obs-build-5.3.18-150200.24.129.1.x86_64",
            "SUSE Linux Enterprise Server 15 SP2-BCL:kernel-preempt-5.3.18-150200.24.129.1.x86_64",
            "SUSE Linux Enterprise Server 15 SP2-BCL:kernel-preempt-devel-5.3.18-150200.24.129.1.x86_64",
            "SUSE Linux Enterprise Server 15 SP2-BCL:kernel-source-5.3.18-150200.24.129.1.noarch",
            "SUSE Linux Enterprise Server 15 SP2-BCL:kernel-syms-5.3.18-150200.24.129.1.x86_64",
            "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-5.3.18-150200.24.129.1.aarch64",
            "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-5.3.18-150200.24.129.1.ppc64le",
            "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-5.3.18-150200.24.129.1.s390x",
            "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-5.3.18-150200.24.129.1.x86_64",
            "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.129.1.150200.9.61.1.aarch64",
            "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.129.1.150200.9.61.1.ppc64le",
            "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.129.1.150200.9.61.1.s390x",
            "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.129.1.150200.9.61.1.x86_64",
            "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.129.1.aarch64",
            "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.129.1.ppc64le",
            "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.129.1.s390x",
            "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.129.1.x86_64",
            "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-devel-5.3.18-150200.24.129.1.noarch",
            "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-docs-5.3.18-150200.24.129.1.noarch",
            "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-macros-5.3.18-150200.24.129.1.noarch",
            "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.129.1.aarch64",
            "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.129.1.ppc64le",
            "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.129.1.s390x",
            "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.129.1.x86_64",
            "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-preempt-5.3.18-150200.24.129.1.aarch64",
            "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-preempt-5.3.18-150200.24.129.1.x86_64",
            "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-preempt-devel-5.3.18-150200.24.129.1.aarch64",
            "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-preempt-devel-5.3.18-150200.24.129.1.x86_64",
            "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-source-5.3.18-150200.24.129.1.noarch",
            "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.129.1.aarch64",
            "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.129.1.ppc64le",
            "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.129.1.s390x",
            "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.129.1.x86_64",
            "SUSE Linux Enterprise Server 15 SP2-LTSS:reiserfs-kmp-default-5.3.18-150200.24.129.1.aarch64",
            "SUSE Linux Enterprise Server 15 SP2-LTSS:reiserfs-kmp-default-5.3.18-150200.24.129.1.ppc64le",
            "SUSE Linux Enterprise Server 15 SP2-LTSS:reiserfs-kmp-default-5.3.18-150200.24.129.1.s390x",
            "SUSE Linux Enterprise Server 15 SP2-LTSS:reiserfs-kmp-default-5.3.18-150200.24.129.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-5.3.18-150200.24.129.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-5.3.18-150200.24.129.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-base-5.3.18-150200.24.129.1.150200.9.61.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-base-5.3.18-150200.24.129.1.150200.9.61.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-devel-5.3.18-150200.24.129.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-devel-5.3.18-150200.24.129.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-devel-5.3.18-150200.24.129.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-docs-5.3.18-150200.24.129.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-macros-5.3.18-150200.24.129.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-obs-build-5.3.18-150200.24.129.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-obs-build-5.3.18-150200.24.129.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-preempt-5.3.18-150200.24.129.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-preempt-devel-5.3.18-150200.24.129.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-source-5.3.18-150200.24.129.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-syms-5.3.18-150200.24.129.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-syms-5.3.18-150200.24.129.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP2:reiserfs-kmp-default-5.3.18-150200.24.129.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP2:reiserfs-kmp-default-5.3.18-150200.24.129.1.x86_64",
            "SUSE Manager Proxy 4.1:kernel-default-5.3.18-150200.24.129.1.x86_64",
            "SUSE Manager Proxy 4.1:kernel-default-base-5.3.18-150200.24.129.1.150200.9.61.1.x86_64",
            "SUSE Manager Proxy 4.1:kernel-default-devel-5.3.18-150200.24.129.1.x86_64",
            "SUSE Manager Proxy 4.1:kernel-devel-5.3.18-150200.24.129.1.noarch",
            "SUSE Manager Proxy 4.1:kernel-docs-5.3.18-150200.24.129.1.noarch",
            "SUSE Manager Proxy 4.1:kernel-macros-5.3.18-150200.24.129.1.noarch",
            "SUSE Manager Proxy 4.1:kernel-obs-build-5.3.18-150200.24.129.1.x86_64",
            "SUSE Manager Proxy 4.1:kernel-preempt-5.3.18-150200.24.129.1.x86_64",
            "SUSE Manager Proxy 4.1:kernel-preempt-devel-5.3.18-150200.24.129.1.x86_64",
            "SUSE Manager Proxy 4.1:kernel-source-5.3.18-150200.24.129.1.noarch",
            "SUSE Manager Proxy 4.1:kernel-syms-5.3.18-150200.24.129.1.x86_64",
            "SUSE Manager Proxy 4.1:reiserfs-kmp-default-5.3.18-150200.24.129.1.x86_64",
            "SUSE Manager Retail Branch Server 4.1:kernel-default-5.3.18-150200.24.129.1.x86_64",
            "SUSE Manager Retail Branch Server 4.1:kernel-default-base-5.3.18-150200.24.129.1.150200.9.61.1.x86_64",
            "SUSE Manager Retail Branch Server 4.1:kernel-default-devel-5.3.18-150200.24.129.1.x86_64",
            "SUSE Manager Retail Branch Server 4.1:kernel-devel-5.3.18-150200.24.129.1.noarch",
            "SUSE Manager Retail Branch Server 4.1:kernel-docs-5.3.18-150200.24.129.1.noarch",
            "SUSE Manager Retail Branch Server 4.1:kernel-macros-5.3.18-150200.24.129.1.noarch",
            "SUSE Manager Retail Branch Server 4.1:kernel-obs-build-5.3.18-150200.24.129.1.x86_64",
            "SUSE Manager Retail Branch Server 4.1:kernel-preempt-5.3.18-150200.24.129.1.x86_64",
            "SUSE Manager Retail Branch Server 4.1:kernel-preempt-devel-5.3.18-150200.24.129.1.x86_64",
            "SUSE Manager Retail Branch Server 4.1:kernel-source-5.3.18-150200.24.129.1.noarch",
            "SUSE Manager Retail Branch Server 4.1:kernel-syms-5.3.18-150200.24.129.1.x86_64",
            "SUSE Manager Retail Branch Server 4.1:reiserfs-kmp-default-5.3.18-150200.24.129.1.x86_64",
            "SUSE Manager Server 4.1:kernel-default-5.3.18-150200.24.129.1.ppc64le",
            "SUSE Manager Server 4.1:kernel-default-5.3.18-150200.24.129.1.s390x",
            "SUSE Manager Server 4.1:kernel-default-5.3.18-150200.24.129.1.x86_64",
            "SUSE Manager Server 4.1:kernel-default-base-5.3.18-150200.24.129.1.150200.9.61.1.ppc64le",
            "SUSE Manager Server 4.1:kernel-default-base-5.3.18-150200.24.129.1.150200.9.61.1.s390x",
            "SUSE Manager Server 4.1:kernel-default-base-5.3.18-150200.24.129.1.150200.9.61.1.x86_64",
            "SUSE Manager Server 4.1:kernel-default-devel-5.3.18-150200.24.129.1.ppc64le",
            "SUSE Manager Server 4.1:kernel-default-devel-5.3.18-150200.24.129.1.s390x",
            "SUSE Manager Server 4.1:kernel-default-devel-5.3.18-150200.24.129.1.x86_64",
            "SUSE Manager Server 4.1:kernel-devel-5.3.18-150200.24.129.1.noarch",
            "SUSE Manager Server 4.1:kernel-docs-5.3.18-150200.24.129.1.noarch",
            "SUSE Manager Server 4.1:kernel-macros-5.3.18-150200.24.129.1.noarch",
            "SUSE Manager Server 4.1:kernel-obs-build-5.3.18-150200.24.129.1.ppc64le",
            "SUSE Manager Server 4.1:kernel-obs-build-5.3.18-150200.24.129.1.s390x",
            "SUSE Manager Server 4.1:kernel-obs-build-5.3.18-150200.24.129.1.x86_64",
            "SUSE Manager Server 4.1:kernel-preempt-5.3.18-150200.24.129.1.x86_64",
            "SUSE Manager Server 4.1:kernel-preempt-devel-5.3.18-150200.24.129.1.x86_64",
            "SUSE Manager Server 4.1:kernel-source-5.3.18-150200.24.129.1.noarch",
            "SUSE Manager Server 4.1:kernel-syms-5.3.18-150200.24.129.1.ppc64le",
            "SUSE Manager Server 4.1:kernel-syms-5.3.18-150200.24.129.1.s390x",
            "SUSE Manager Server 4.1:kernel-syms-5.3.18-150200.24.129.1.x86_64",
            "SUSE Manager Server 4.1:reiserfs-kmp-default-5.3.18-150200.24.129.1.ppc64le",
            "SUSE Manager Server 4.1:reiserfs-kmp-default-5.3.18-150200.24.129.1.s390x",
            "SUSE Manager Server 4.1:reiserfs-kmp-default-5.3.18-150200.24.129.1.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 4.1,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:N/I:N/A:H",
            "version": "3.1"
          },
          "products": [
            "SUSE Enterprise Storage 7:kernel-default-5.3.18-150200.24.129.1.aarch64",
            "SUSE Enterprise Storage 7:kernel-default-5.3.18-150200.24.129.1.x86_64",
            "SUSE Enterprise Storage 7:kernel-default-base-5.3.18-150200.24.129.1.150200.9.61.1.aarch64",
            "SUSE Enterprise Storage 7:kernel-default-base-5.3.18-150200.24.129.1.150200.9.61.1.x86_64",
            "SUSE Enterprise Storage 7:kernel-default-devel-5.3.18-150200.24.129.1.aarch64",
            "SUSE Enterprise Storage 7:kernel-default-devel-5.3.18-150200.24.129.1.x86_64",
            "SUSE Enterprise Storage 7:kernel-devel-5.3.18-150200.24.129.1.noarch",
            "SUSE Enterprise Storage 7:kernel-docs-5.3.18-150200.24.129.1.noarch",
            "SUSE Enterprise Storage 7:kernel-macros-5.3.18-150200.24.129.1.noarch",
            "SUSE Enterprise Storage 7:kernel-obs-build-5.3.18-150200.24.129.1.aarch64",
            "SUSE Enterprise Storage 7:kernel-obs-build-5.3.18-150200.24.129.1.x86_64",
            "SUSE Enterprise Storage 7:kernel-preempt-5.3.18-150200.24.129.1.aarch64",
            "SUSE Enterprise Storage 7:kernel-preempt-5.3.18-150200.24.129.1.x86_64",
            "SUSE Enterprise Storage 7:kernel-preempt-devel-5.3.18-150200.24.129.1.aarch64",
            "SUSE Enterprise Storage 7:kernel-preempt-devel-5.3.18-150200.24.129.1.x86_64",
            "SUSE Enterprise Storage 7:kernel-source-5.3.18-150200.24.129.1.noarch",
            "SUSE Enterprise Storage 7:kernel-syms-5.3.18-150200.24.129.1.aarch64",
            "SUSE Enterprise Storage 7:kernel-syms-5.3.18-150200.24.129.1.x86_64",
            "SUSE Enterprise Storage 7:reiserfs-kmp-default-5.3.18-150200.24.129.1.aarch64",
            "SUSE Enterprise Storage 7:reiserfs-kmp-default-5.3.18-150200.24.129.1.x86_64",
            "SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-150200.24.129.1.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-150200.24.129.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-150200.24.129.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-150200.24.129.1.x86_64",
            "SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-150200.24.129.1.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-150200.24.129.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-150200.24.129.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-150200.24.129.1.x86_64",
            "SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-150200.24.129.1.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-150200.24.129.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-150200.24.129.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-150200.24.129.1.x86_64",
            "SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-150200.24.129.1.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-150200.24.129.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-150200.24.129.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-150200.24.129.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-default-5.3.18-150200.24.129.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-default-5.3.18-150200.24.129.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-default-base-5.3.18-150200.24.129.1.150200.9.61.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-default-base-5.3.18-150200.24.129.1.150200.9.61.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-default-devel-5.3.18-150200.24.129.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-default-devel-5.3.18-150200.24.129.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-devel-5.3.18-150200.24.129.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-docs-5.3.18-150200.24.129.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-macros-5.3.18-150200.24.129.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-obs-build-5.3.18-150200.24.129.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-obs-build-5.3.18-150200.24.129.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-preempt-5.3.18-150200.24.129.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-preempt-5.3.18-150200.24.129.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-preempt-devel-5.3.18-150200.24.129.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-preempt-devel-5.3.18-150200.24.129.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-source-5.3.18-150200.24.129.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-syms-5.3.18-150200.24.129.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-syms-5.3.18-150200.24.129.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-5.3.18-150200.24.129.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-5.3.18-150200.24.129.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.129.1.150200.9.61.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.129.1.150200.9.61.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.129.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.129.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-devel-5.3.18-150200.24.129.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-docs-5.3.18-150200.24.129.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-macros-5.3.18-150200.24.129.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.129.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.129.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-preempt-5.3.18-150200.24.129.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-preempt-5.3.18-150200.24.129.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-preempt-devel-5.3.18-150200.24.129.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-preempt-devel-5.3.18-150200.24.129.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-source-5.3.18-150200.24.129.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.129.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.129.1.x86_64",
            "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-5.3.18-150200.24.129.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-5.3.18-150200.24.129.1.s390x",
            "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-5.3.18-150200.24.129.1.x86_64",
            "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-devel-5.3.18-150200.24.129.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-devel-5.3.18-150200.24.129.1.s390x",
            "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-devel-5.3.18-150200.24.129.1.x86_64",
            "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-150200_24_129-default-1-150200.5.3.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-150200_24_129-default-1-150200.5.3.1.s390x",
            "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-150200_24_129-default-1-150200.5.3.1.x86_64",
            "SUSE Linux Enterprise Server 15 SP2-BCL:kernel-default-5.3.18-150200.24.129.1.x86_64",
            "SUSE Linux Enterprise Server 15 SP2-BCL:kernel-default-base-5.3.18-150200.24.129.1.150200.9.61.1.x86_64",
            "SUSE Linux Enterprise Server 15 SP2-BCL:kernel-default-devel-5.3.18-150200.24.129.1.x86_64",
            "SUSE Linux Enterprise Server 15 SP2-BCL:kernel-devel-5.3.18-150200.24.129.1.noarch",
            "SUSE Linux Enterprise Server 15 SP2-BCL:kernel-docs-5.3.18-150200.24.129.1.noarch",
            "SUSE Linux Enterprise Server 15 SP2-BCL:kernel-macros-5.3.18-150200.24.129.1.noarch",
            "SUSE Linux Enterprise Server 15 SP2-BCL:kernel-obs-build-5.3.18-150200.24.129.1.x86_64",
            "SUSE Linux Enterprise Server 15 SP2-BCL:kernel-preempt-5.3.18-150200.24.129.1.x86_64",
            "SUSE Linux Enterprise Server 15 SP2-BCL:kernel-preempt-devel-5.3.18-150200.24.129.1.x86_64",
            "SUSE Linux Enterprise Server 15 SP2-BCL:kernel-source-5.3.18-150200.24.129.1.noarch",
            "SUSE Linux Enterprise Server 15 SP2-BCL:kernel-syms-5.3.18-150200.24.129.1.x86_64",
            "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-5.3.18-150200.24.129.1.aarch64",
            "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-5.3.18-150200.24.129.1.ppc64le",
            "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-5.3.18-150200.24.129.1.s390x",
            "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-5.3.18-150200.24.129.1.x86_64",
            "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.129.1.150200.9.61.1.aarch64",
            "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.129.1.150200.9.61.1.ppc64le",
            "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.129.1.150200.9.61.1.s390x",
            "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.129.1.150200.9.61.1.x86_64",
            "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.129.1.aarch64",
            "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.129.1.ppc64le",
            "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.129.1.s390x",
            "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.129.1.x86_64",
            "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-devel-5.3.18-150200.24.129.1.noarch",
            "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-docs-5.3.18-150200.24.129.1.noarch",
            "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-macros-5.3.18-150200.24.129.1.noarch",
            "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.129.1.aarch64",
            "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.129.1.ppc64le",
            "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.129.1.s390x",
            "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.129.1.x86_64",
            "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-preempt-5.3.18-150200.24.129.1.aarch64",
            "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-preempt-5.3.18-150200.24.129.1.x86_64",
            "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-preempt-devel-5.3.18-150200.24.129.1.aarch64",
            "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-preempt-devel-5.3.18-150200.24.129.1.x86_64",
            "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-source-5.3.18-150200.24.129.1.noarch",
            "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.129.1.aarch64",
            "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.129.1.ppc64le",
            "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.129.1.s390x",
            "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.129.1.x86_64",
            "SUSE Linux Enterprise Server 15 SP2-LTSS:reiserfs-kmp-default-5.3.18-150200.24.129.1.aarch64",
            "SUSE Linux Enterprise Server 15 SP2-LTSS:reiserfs-kmp-default-5.3.18-150200.24.129.1.ppc64le",
            "SUSE Linux Enterprise Server 15 SP2-LTSS:reiserfs-kmp-default-5.3.18-150200.24.129.1.s390x",
            "SUSE Linux Enterprise Server 15 SP2-LTSS:reiserfs-kmp-default-5.3.18-150200.24.129.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-5.3.18-150200.24.129.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-5.3.18-150200.24.129.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-base-5.3.18-150200.24.129.1.150200.9.61.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-base-5.3.18-150200.24.129.1.150200.9.61.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-devel-5.3.18-150200.24.129.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-devel-5.3.18-150200.24.129.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-devel-5.3.18-150200.24.129.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-docs-5.3.18-150200.24.129.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-macros-5.3.18-150200.24.129.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-obs-build-5.3.18-150200.24.129.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-obs-build-5.3.18-150200.24.129.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-preempt-5.3.18-150200.24.129.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-preempt-devel-5.3.18-150200.24.129.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-source-5.3.18-150200.24.129.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-syms-5.3.18-150200.24.129.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-syms-5.3.18-150200.24.129.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP2:reiserfs-kmp-default-5.3.18-150200.24.129.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP2:reiserfs-kmp-default-5.3.18-150200.24.129.1.x86_64",
            "SUSE Manager Proxy 4.1:kernel-default-5.3.18-150200.24.129.1.x86_64",
            "SUSE Manager Proxy 4.1:kernel-default-base-5.3.18-150200.24.129.1.150200.9.61.1.x86_64",
            "SUSE Manager Proxy 4.1:kernel-default-devel-5.3.18-150200.24.129.1.x86_64",
            "SUSE Manager Proxy 4.1:kernel-devel-5.3.18-150200.24.129.1.noarch",
            "SUSE Manager Proxy 4.1:kernel-docs-5.3.18-150200.24.129.1.noarch",
            "SUSE Manager Proxy 4.1:kernel-macros-5.3.18-150200.24.129.1.noarch",
            "SUSE Manager Proxy 4.1:kernel-obs-build-5.3.18-150200.24.129.1.x86_64",
            "SUSE Manager Proxy 4.1:kernel-preempt-5.3.18-150200.24.129.1.x86_64",
            "SUSE Manager Proxy 4.1:kernel-preempt-devel-5.3.18-150200.24.129.1.x86_64",
            "SUSE Manager Proxy 4.1:kernel-source-5.3.18-150200.24.129.1.noarch",
            "SUSE Manager Proxy 4.1:kernel-syms-5.3.18-150200.24.129.1.x86_64",
            "SUSE Manager Proxy 4.1:reiserfs-kmp-default-5.3.18-150200.24.129.1.x86_64",
            "SUSE Manager Retail Branch Server 4.1:kernel-default-5.3.18-150200.24.129.1.x86_64",
            "SUSE Manager Retail Branch Server 4.1:kernel-default-base-5.3.18-150200.24.129.1.150200.9.61.1.x86_64",
            "SUSE Manager Retail Branch Server 4.1:kernel-default-devel-5.3.18-150200.24.129.1.x86_64",
            "SUSE Manager Retail Branch Server 4.1:kernel-devel-5.3.18-150200.24.129.1.noarch",
            "SUSE Manager Retail Branch Server 4.1:kernel-docs-5.3.18-150200.24.129.1.noarch",
            "SUSE Manager Retail Branch Server 4.1:kernel-macros-5.3.18-150200.24.129.1.noarch",
            "SUSE Manager Retail Branch Server 4.1:kernel-obs-build-5.3.18-150200.24.129.1.x86_64",
            "SUSE Manager Retail Branch Server 4.1:kernel-preempt-5.3.18-150200.24.129.1.x86_64",
            "SUSE Manager Retail Branch Server 4.1:kernel-preempt-devel-5.3.18-150200.24.129.1.x86_64",
            "SUSE Manager Retail Branch Server 4.1:kernel-source-5.3.18-150200.24.129.1.noarch",
            "SUSE Manager Retail Branch Server 4.1:kernel-syms-5.3.18-150200.24.129.1.x86_64",
            "SUSE Manager Retail Branch Server 4.1:reiserfs-kmp-default-5.3.18-150200.24.129.1.x86_64",
            "SUSE Manager Server 4.1:kernel-default-5.3.18-150200.24.129.1.ppc64le",
            "SUSE Manager Server 4.1:kernel-default-5.3.18-150200.24.129.1.s390x",
            "SUSE Manager Server 4.1:kernel-default-5.3.18-150200.24.129.1.x86_64",
            "SUSE Manager Server 4.1:kernel-default-base-5.3.18-150200.24.129.1.150200.9.61.1.ppc64le",
            "SUSE Manager Server 4.1:kernel-default-base-5.3.18-150200.24.129.1.150200.9.61.1.s390x",
            "SUSE Manager Server 4.1:kernel-default-base-5.3.18-150200.24.129.1.150200.9.61.1.x86_64",
            "SUSE Manager Server 4.1:kernel-default-devel-5.3.18-150200.24.129.1.ppc64le",
            "SUSE Manager Server 4.1:kernel-default-devel-5.3.18-150200.24.129.1.s390x",
            "SUSE Manager Server 4.1:kernel-default-devel-5.3.18-150200.24.129.1.x86_64",
            "SUSE Manager Server 4.1:kernel-devel-5.3.18-150200.24.129.1.noarch",
            "SUSE Manager Server 4.1:kernel-docs-5.3.18-150200.24.129.1.noarch",
            "SUSE Manager Server 4.1:kernel-macros-5.3.18-150200.24.129.1.noarch",
            "SUSE Manager Server 4.1:kernel-obs-build-5.3.18-150200.24.129.1.ppc64le",
            "SUSE Manager Server 4.1:kernel-obs-build-5.3.18-150200.24.129.1.s390x",
            "SUSE Manager Server 4.1:kernel-obs-build-5.3.18-150200.24.129.1.x86_64",
            "SUSE Manager Server 4.1:kernel-preempt-5.3.18-150200.24.129.1.x86_64",
            "SUSE Manager Server 4.1:kernel-preempt-devel-5.3.18-150200.24.129.1.x86_64",
            "SUSE Manager Server 4.1:kernel-source-5.3.18-150200.24.129.1.noarch",
            "SUSE Manager Server 4.1:kernel-syms-5.3.18-150200.24.129.1.ppc64le",
            "SUSE Manager Server 4.1:kernel-syms-5.3.18-150200.24.129.1.s390x",
            "SUSE Manager Server 4.1:kernel-syms-5.3.18-150200.24.129.1.x86_64",
            "SUSE Manager Server 4.1:reiserfs-kmp-default-5.3.18-150200.24.129.1.ppc64le",
            "SUSE Manager Server 4.1:reiserfs-kmp-default-5.3.18-150200.24.129.1.s390x",
            "SUSE Manager Server 4.1:reiserfs-kmp-default-5.3.18-150200.24.129.1.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2022-09-28T06:48:59Z",
          "details": "moderate"
        }
      ],
      "title": "CVE-2022-36879"
    },
    {
      "cve": "CVE-2022-39188",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2022-39188"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "An issue was discovered in include/asm-generic/tlb.h in the Linux kernel before 5.19. Because of a race condition (unmap_mapping_range versus munmap), a device driver can free a page while it still has stale TLB entries. This only occurs in situations with VM_PFNMAP VMAs.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "SUSE Enterprise Storage 7:kernel-default-5.3.18-150200.24.129.1.aarch64",
          "SUSE Enterprise Storage 7:kernel-default-5.3.18-150200.24.129.1.x86_64",
          "SUSE Enterprise Storage 7:kernel-default-base-5.3.18-150200.24.129.1.150200.9.61.1.aarch64",
          "SUSE Enterprise Storage 7:kernel-default-base-5.3.18-150200.24.129.1.150200.9.61.1.x86_64",
          "SUSE Enterprise Storage 7:kernel-default-devel-5.3.18-150200.24.129.1.aarch64",
          "SUSE Enterprise Storage 7:kernel-default-devel-5.3.18-150200.24.129.1.x86_64",
          "SUSE Enterprise Storage 7:kernel-devel-5.3.18-150200.24.129.1.noarch",
          "SUSE Enterprise Storage 7:kernel-docs-5.3.18-150200.24.129.1.noarch",
          "SUSE Enterprise Storage 7:kernel-macros-5.3.18-150200.24.129.1.noarch",
          "SUSE Enterprise Storage 7:kernel-obs-build-5.3.18-150200.24.129.1.aarch64",
          "SUSE Enterprise Storage 7:kernel-obs-build-5.3.18-150200.24.129.1.x86_64",
          "SUSE Enterprise Storage 7:kernel-preempt-5.3.18-150200.24.129.1.aarch64",
          "SUSE Enterprise Storage 7:kernel-preempt-5.3.18-150200.24.129.1.x86_64",
          "SUSE Enterprise Storage 7:kernel-preempt-devel-5.3.18-150200.24.129.1.aarch64",
          "SUSE Enterprise Storage 7:kernel-preempt-devel-5.3.18-150200.24.129.1.x86_64",
          "SUSE Enterprise Storage 7:kernel-source-5.3.18-150200.24.129.1.noarch",
          "SUSE Enterprise Storage 7:kernel-syms-5.3.18-150200.24.129.1.aarch64",
          "SUSE Enterprise Storage 7:kernel-syms-5.3.18-150200.24.129.1.x86_64",
          "SUSE Enterprise Storage 7:reiserfs-kmp-default-5.3.18-150200.24.129.1.aarch64",
          "SUSE Enterprise Storage 7:reiserfs-kmp-default-5.3.18-150200.24.129.1.x86_64",
          "SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-150200.24.129.1.aarch64",
          "SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-150200.24.129.1.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-150200.24.129.1.s390x",
          "SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-150200.24.129.1.x86_64",
          "SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-150200.24.129.1.aarch64",
          "SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-150200.24.129.1.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-150200.24.129.1.s390x",
          "SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-150200.24.129.1.x86_64",
          "SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-150200.24.129.1.aarch64",
          "SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-150200.24.129.1.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-150200.24.129.1.s390x",
          "SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-150200.24.129.1.x86_64",
          "SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-150200.24.129.1.aarch64",
          "SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-150200.24.129.1.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-150200.24.129.1.s390x",
          "SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-150200.24.129.1.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-default-5.3.18-150200.24.129.1.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-default-5.3.18-150200.24.129.1.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-default-base-5.3.18-150200.24.129.1.150200.9.61.1.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-default-base-5.3.18-150200.24.129.1.150200.9.61.1.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-default-devel-5.3.18-150200.24.129.1.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-default-devel-5.3.18-150200.24.129.1.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-devel-5.3.18-150200.24.129.1.noarch",
          "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-docs-5.3.18-150200.24.129.1.noarch",
          "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-macros-5.3.18-150200.24.129.1.noarch",
          "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-obs-build-5.3.18-150200.24.129.1.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-obs-build-5.3.18-150200.24.129.1.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-preempt-5.3.18-150200.24.129.1.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-preempt-5.3.18-150200.24.129.1.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-preempt-devel-5.3.18-150200.24.129.1.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-preempt-devel-5.3.18-150200.24.129.1.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-source-5.3.18-150200.24.129.1.noarch",
          "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-syms-5.3.18-150200.24.129.1.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-syms-5.3.18-150200.24.129.1.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-5.3.18-150200.24.129.1.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-5.3.18-150200.24.129.1.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.129.1.150200.9.61.1.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.129.1.150200.9.61.1.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.129.1.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.129.1.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-devel-5.3.18-150200.24.129.1.noarch",
          "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-docs-5.3.18-150200.24.129.1.noarch",
          "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-macros-5.3.18-150200.24.129.1.noarch",
          "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.129.1.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.129.1.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-preempt-5.3.18-150200.24.129.1.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-preempt-5.3.18-150200.24.129.1.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-preempt-devel-5.3.18-150200.24.129.1.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-preempt-devel-5.3.18-150200.24.129.1.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-source-5.3.18-150200.24.129.1.noarch",
          "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.129.1.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.129.1.x86_64",
          "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-5.3.18-150200.24.129.1.ppc64le",
          "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-5.3.18-150200.24.129.1.s390x",
          "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-5.3.18-150200.24.129.1.x86_64",
          "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-devel-5.3.18-150200.24.129.1.ppc64le",
          "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-devel-5.3.18-150200.24.129.1.s390x",
          "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-devel-5.3.18-150200.24.129.1.x86_64",
          "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-150200_24_129-default-1-150200.5.3.1.ppc64le",
          "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-150200_24_129-default-1-150200.5.3.1.s390x",
          "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-150200_24_129-default-1-150200.5.3.1.x86_64",
          "SUSE Linux Enterprise Server 15 SP2-BCL:kernel-default-5.3.18-150200.24.129.1.x86_64",
          "SUSE Linux Enterprise Server 15 SP2-BCL:kernel-default-base-5.3.18-150200.24.129.1.150200.9.61.1.x86_64",
          "SUSE Linux Enterprise Server 15 SP2-BCL:kernel-default-devel-5.3.18-150200.24.129.1.x86_64",
          "SUSE Linux Enterprise Server 15 SP2-BCL:kernel-devel-5.3.18-150200.24.129.1.noarch",
          "SUSE Linux Enterprise Server 15 SP2-BCL:kernel-docs-5.3.18-150200.24.129.1.noarch",
          "SUSE Linux Enterprise Server 15 SP2-BCL:kernel-macros-5.3.18-150200.24.129.1.noarch",
          "SUSE Linux Enterprise Server 15 SP2-BCL:kernel-obs-build-5.3.18-150200.24.129.1.x86_64",
          "SUSE Linux Enterprise Server 15 SP2-BCL:kernel-preempt-5.3.18-150200.24.129.1.x86_64",
          "SUSE Linux Enterprise Server 15 SP2-BCL:kernel-preempt-devel-5.3.18-150200.24.129.1.x86_64",
          "SUSE Linux Enterprise Server 15 SP2-BCL:kernel-source-5.3.18-150200.24.129.1.noarch",
          "SUSE Linux Enterprise Server 15 SP2-BCL:kernel-syms-5.3.18-150200.24.129.1.x86_64",
          "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-5.3.18-150200.24.129.1.aarch64",
          "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-5.3.18-150200.24.129.1.ppc64le",
          "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-5.3.18-150200.24.129.1.s390x",
          "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-5.3.18-150200.24.129.1.x86_64",
          "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.129.1.150200.9.61.1.aarch64",
          "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.129.1.150200.9.61.1.ppc64le",
          "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.129.1.150200.9.61.1.s390x",
          "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.129.1.150200.9.61.1.x86_64",
          "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.129.1.aarch64",
          "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.129.1.ppc64le",
          "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.129.1.s390x",
          "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.129.1.x86_64",
          "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-devel-5.3.18-150200.24.129.1.noarch",
          "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-docs-5.3.18-150200.24.129.1.noarch",
          "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-macros-5.3.18-150200.24.129.1.noarch",
          "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.129.1.aarch64",
          "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.129.1.ppc64le",
          "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.129.1.s390x",
          "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.129.1.x86_64",
          "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-preempt-5.3.18-150200.24.129.1.aarch64",
          "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-preempt-5.3.18-150200.24.129.1.x86_64",
          "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-preempt-devel-5.3.18-150200.24.129.1.aarch64",
          "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-preempt-devel-5.3.18-150200.24.129.1.x86_64",
          "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-source-5.3.18-150200.24.129.1.noarch",
          "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.129.1.aarch64",
          "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.129.1.ppc64le",
          "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.129.1.s390x",
          "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.129.1.x86_64",
          "SUSE Linux Enterprise Server 15 SP2-LTSS:reiserfs-kmp-default-5.3.18-150200.24.129.1.aarch64",
          "SUSE Linux Enterprise Server 15 SP2-LTSS:reiserfs-kmp-default-5.3.18-150200.24.129.1.ppc64le",
          "SUSE Linux Enterprise Server 15 SP2-LTSS:reiserfs-kmp-default-5.3.18-150200.24.129.1.s390x",
          "SUSE Linux Enterprise Server 15 SP2-LTSS:reiserfs-kmp-default-5.3.18-150200.24.129.1.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-5.3.18-150200.24.129.1.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-5.3.18-150200.24.129.1.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-base-5.3.18-150200.24.129.1.150200.9.61.1.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-base-5.3.18-150200.24.129.1.150200.9.61.1.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-devel-5.3.18-150200.24.129.1.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-devel-5.3.18-150200.24.129.1.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-devel-5.3.18-150200.24.129.1.noarch",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-docs-5.3.18-150200.24.129.1.noarch",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-macros-5.3.18-150200.24.129.1.noarch",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-obs-build-5.3.18-150200.24.129.1.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-obs-build-5.3.18-150200.24.129.1.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-preempt-5.3.18-150200.24.129.1.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-preempt-devel-5.3.18-150200.24.129.1.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-source-5.3.18-150200.24.129.1.noarch",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-syms-5.3.18-150200.24.129.1.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-syms-5.3.18-150200.24.129.1.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP2:reiserfs-kmp-default-5.3.18-150200.24.129.1.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP2:reiserfs-kmp-default-5.3.18-150200.24.129.1.x86_64",
          "SUSE Manager Proxy 4.1:kernel-default-5.3.18-150200.24.129.1.x86_64",
          "SUSE Manager Proxy 4.1:kernel-default-base-5.3.18-150200.24.129.1.150200.9.61.1.x86_64",
          "SUSE Manager Proxy 4.1:kernel-default-devel-5.3.18-150200.24.129.1.x86_64",
          "SUSE Manager Proxy 4.1:kernel-devel-5.3.18-150200.24.129.1.noarch",
          "SUSE Manager Proxy 4.1:kernel-docs-5.3.18-150200.24.129.1.noarch",
          "SUSE Manager Proxy 4.1:kernel-macros-5.3.18-150200.24.129.1.noarch",
          "SUSE Manager Proxy 4.1:kernel-obs-build-5.3.18-150200.24.129.1.x86_64",
          "SUSE Manager Proxy 4.1:kernel-preempt-5.3.18-150200.24.129.1.x86_64",
          "SUSE Manager Proxy 4.1:kernel-preempt-devel-5.3.18-150200.24.129.1.x86_64",
          "SUSE Manager Proxy 4.1:kernel-source-5.3.18-150200.24.129.1.noarch",
          "SUSE Manager Proxy 4.1:kernel-syms-5.3.18-150200.24.129.1.x86_64",
          "SUSE Manager Proxy 4.1:reiserfs-kmp-default-5.3.18-150200.24.129.1.x86_64",
          "SUSE Manager Retail Branch Server 4.1:kernel-default-5.3.18-150200.24.129.1.x86_64",
          "SUSE Manager Retail Branch Server 4.1:kernel-default-base-5.3.18-150200.24.129.1.150200.9.61.1.x86_64",
          "SUSE Manager Retail Branch Server 4.1:kernel-default-devel-5.3.18-150200.24.129.1.x86_64",
          "SUSE Manager Retail Branch Server 4.1:kernel-devel-5.3.18-150200.24.129.1.noarch",
          "SUSE Manager Retail Branch Server 4.1:kernel-docs-5.3.18-150200.24.129.1.noarch",
          "SUSE Manager Retail Branch Server 4.1:kernel-macros-5.3.18-150200.24.129.1.noarch",
          "SUSE Manager Retail Branch Server 4.1:kernel-obs-build-5.3.18-150200.24.129.1.x86_64",
          "SUSE Manager Retail Branch Server 4.1:kernel-preempt-5.3.18-150200.24.129.1.x86_64",
          "SUSE Manager Retail Branch Server 4.1:kernel-preempt-devel-5.3.18-150200.24.129.1.x86_64",
          "SUSE Manager Retail Branch Server 4.1:kernel-source-5.3.18-150200.24.129.1.noarch",
          "SUSE Manager Retail Branch Server 4.1:kernel-syms-5.3.18-150200.24.129.1.x86_64",
          "SUSE Manager Retail Branch Server 4.1:reiserfs-kmp-default-5.3.18-150200.24.129.1.x86_64",
          "SUSE Manager Server 4.1:kernel-default-5.3.18-150200.24.129.1.ppc64le",
          "SUSE Manager Server 4.1:kernel-default-5.3.18-150200.24.129.1.s390x",
          "SUSE Manager Server 4.1:kernel-default-5.3.18-150200.24.129.1.x86_64",
          "SUSE Manager Server 4.1:kernel-default-base-5.3.18-150200.24.129.1.150200.9.61.1.ppc64le",
          "SUSE Manager Server 4.1:kernel-default-base-5.3.18-150200.24.129.1.150200.9.61.1.s390x",
          "SUSE Manager Server 4.1:kernel-default-base-5.3.18-150200.24.129.1.150200.9.61.1.x86_64",
          "SUSE Manager Server 4.1:kernel-default-devel-5.3.18-150200.24.129.1.ppc64le",
          "SUSE Manager Server 4.1:kernel-default-devel-5.3.18-150200.24.129.1.s390x",
          "SUSE Manager Server 4.1:kernel-default-devel-5.3.18-150200.24.129.1.x86_64",
          "SUSE Manager Server 4.1:kernel-devel-5.3.18-150200.24.129.1.noarch",
          "SUSE Manager Server 4.1:kernel-docs-5.3.18-150200.24.129.1.noarch",
          "SUSE Manager Server 4.1:kernel-macros-5.3.18-150200.24.129.1.noarch",
          "SUSE Manager Server 4.1:kernel-obs-build-5.3.18-150200.24.129.1.ppc64le",
          "SUSE Manager Server 4.1:kernel-obs-build-5.3.18-150200.24.129.1.s390x",
          "SUSE Manager Server 4.1:kernel-obs-build-5.3.18-150200.24.129.1.x86_64",
          "SUSE Manager Server 4.1:kernel-preempt-5.3.18-150200.24.129.1.x86_64",
          "SUSE Manager Server 4.1:kernel-preempt-devel-5.3.18-150200.24.129.1.x86_64",
          "SUSE Manager Server 4.1:kernel-source-5.3.18-150200.24.129.1.noarch",
          "SUSE Manager Server 4.1:kernel-syms-5.3.18-150200.24.129.1.ppc64le",
          "SUSE Manager Server 4.1:kernel-syms-5.3.18-150200.24.129.1.s390x",
          "SUSE Manager Server 4.1:kernel-syms-5.3.18-150200.24.129.1.x86_64",
          "SUSE Manager Server 4.1:reiserfs-kmp-default-5.3.18-150200.24.129.1.ppc64le",
          "SUSE Manager Server 4.1:reiserfs-kmp-default-5.3.18-150200.24.129.1.s390x",
          "SUSE Manager Server 4.1:reiserfs-kmp-default-5.3.18-150200.24.129.1.x86_64"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2022-39188",
          "url": "https://www.suse.com/security/cve/CVE-2022-39188"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1203107 for CVE-2022-39188",
          "url": "https://bugzilla.suse.com/1203107"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1203116 for CVE-2022-39188",
          "url": "https://bugzilla.suse.com/1203116"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1205313 for CVE-2022-39188",
          "url": "https://bugzilla.suse.com/1205313"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1209225 for CVE-2022-39188",
          "url": "https://bugzilla.suse.com/1209225"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1212326 for CVE-2022-39188",
          "url": "https://bugzilla.suse.com/1212326"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "SUSE Enterprise Storage 7:kernel-default-5.3.18-150200.24.129.1.aarch64",
            "SUSE Enterprise Storage 7:kernel-default-5.3.18-150200.24.129.1.x86_64",
            "SUSE Enterprise Storage 7:kernel-default-base-5.3.18-150200.24.129.1.150200.9.61.1.aarch64",
            "SUSE Enterprise Storage 7:kernel-default-base-5.3.18-150200.24.129.1.150200.9.61.1.x86_64",
            "SUSE Enterprise Storage 7:kernel-default-devel-5.3.18-150200.24.129.1.aarch64",
            "SUSE Enterprise Storage 7:kernel-default-devel-5.3.18-150200.24.129.1.x86_64",
            "SUSE Enterprise Storage 7:kernel-devel-5.3.18-150200.24.129.1.noarch",
            "SUSE Enterprise Storage 7:kernel-docs-5.3.18-150200.24.129.1.noarch",
            "SUSE Enterprise Storage 7:kernel-macros-5.3.18-150200.24.129.1.noarch",
            "SUSE Enterprise Storage 7:kernel-obs-build-5.3.18-150200.24.129.1.aarch64",
            "SUSE Enterprise Storage 7:kernel-obs-build-5.3.18-150200.24.129.1.x86_64",
            "SUSE Enterprise Storage 7:kernel-preempt-5.3.18-150200.24.129.1.aarch64",
            "SUSE Enterprise Storage 7:kernel-preempt-5.3.18-150200.24.129.1.x86_64",
            "SUSE Enterprise Storage 7:kernel-preempt-devel-5.3.18-150200.24.129.1.aarch64",
            "SUSE Enterprise Storage 7:kernel-preempt-devel-5.3.18-150200.24.129.1.x86_64",
            "SUSE Enterprise Storage 7:kernel-source-5.3.18-150200.24.129.1.noarch",
            "SUSE Enterprise Storage 7:kernel-syms-5.3.18-150200.24.129.1.aarch64",
            "SUSE Enterprise Storage 7:kernel-syms-5.3.18-150200.24.129.1.x86_64",
            "SUSE Enterprise Storage 7:reiserfs-kmp-default-5.3.18-150200.24.129.1.aarch64",
            "SUSE Enterprise Storage 7:reiserfs-kmp-default-5.3.18-150200.24.129.1.x86_64",
            "SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-150200.24.129.1.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-150200.24.129.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-150200.24.129.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-150200.24.129.1.x86_64",
            "SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-150200.24.129.1.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-150200.24.129.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-150200.24.129.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-150200.24.129.1.x86_64",
            "SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-150200.24.129.1.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-150200.24.129.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-150200.24.129.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-150200.24.129.1.x86_64",
            "SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-150200.24.129.1.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-150200.24.129.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-150200.24.129.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-150200.24.129.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-default-5.3.18-150200.24.129.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-default-5.3.18-150200.24.129.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-default-base-5.3.18-150200.24.129.1.150200.9.61.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-default-base-5.3.18-150200.24.129.1.150200.9.61.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-default-devel-5.3.18-150200.24.129.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-default-devel-5.3.18-150200.24.129.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-devel-5.3.18-150200.24.129.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-docs-5.3.18-150200.24.129.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-macros-5.3.18-150200.24.129.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-obs-build-5.3.18-150200.24.129.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-obs-build-5.3.18-150200.24.129.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-preempt-5.3.18-150200.24.129.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-preempt-5.3.18-150200.24.129.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-preempt-devel-5.3.18-150200.24.129.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-preempt-devel-5.3.18-150200.24.129.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-source-5.3.18-150200.24.129.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-syms-5.3.18-150200.24.129.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-syms-5.3.18-150200.24.129.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-5.3.18-150200.24.129.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-5.3.18-150200.24.129.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.129.1.150200.9.61.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.129.1.150200.9.61.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.129.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.129.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-devel-5.3.18-150200.24.129.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-docs-5.3.18-150200.24.129.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-macros-5.3.18-150200.24.129.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.129.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.129.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-preempt-5.3.18-150200.24.129.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-preempt-5.3.18-150200.24.129.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-preempt-devel-5.3.18-150200.24.129.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-preempt-devel-5.3.18-150200.24.129.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-source-5.3.18-150200.24.129.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.129.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.129.1.x86_64",
            "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-5.3.18-150200.24.129.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-5.3.18-150200.24.129.1.s390x",
            "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-5.3.18-150200.24.129.1.x86_64",
            "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-devel-5.3.18-150200.24.129.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-devel-5.3.18-150200.24.129.1.s390x",
            "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-devel-5.3.18-150200.24.129.1.x86_64",
            "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-150200_24_129-default-1-150200.5.3.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-150200_24_129-default-1-150200.5.3.1.s390x",
            "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-150200_24_129-default-1-150200.5.3.1.x86_64",
            "SUSE Linux Enterprise Server 15 SP2-BCL:kernel-default-5.3.18-150200.24.129.1.x86_64",
            "SUSE Linux Enterprise Server 15 SP2-BCL:kernel-default-base-5.3.18-150200.24.129.1.150200.9.61.1.x86_64",
            "SUSE Linux Enterprise Server 15 SP2-BCL:kernel-default-devel-5.3.18-150200.24.129.1.x86_64",
            "SUSE Linux Enterprise Server 15 SP2-BCL:kernel-devel-5.3.18-150200.24.129.1.noarch",
            "SUSE Linux Enterprise Server 15 SP2-BCL:kernel-docs-5.3.18-150200.24.129.1.noarch",
            "SUSE Linux Enterprise Server 15 SP2-BCL:kernel-macros-5.3.18-150200.24.129.1.noarch",
            "SUSE Linux Enterprise Server 15 SP2-BCL:kernel-obs-build-5.3.18-150200.24.129.1.x86_64",
            "SUSE Linux Enterprise Server 15 SP2-BCL:kernel-preempt-5.3.18-150200.24.129.1.x86_64",
            "SUSE Linux Enterprise Server 15 SP2-BCL:kernel-preempt-devel-5.3.18-150200.24.129.1.x86_64",
            "SUSE Linux Enterprise Server 15 SP2-BCL:kernel-source-5.3.18-150200.24.129.1.noarch",
            "SUSE Linux Enterprise Server 15 SP2-BCL:kernel-syms-5.3.18-150200.24.129.1.x86_64",
            "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-5.3.18-150200.24.129.1.aarch64",
            "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-5.3.18-150200.24.129.1.ppc64le",
            "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-5.3.18-150200.24.129.1.s390x",
            "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-5.3.18-150200.24.129.1.x86_64",
            "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.129.1.150200.9.61.1.aarch64",
            "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.129.1.150200.9.61.1.ppc64le",
            "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.129.1.150200.9.61.1.s390x",
            "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.129.1.150200.9.61.1.x86_64",
            "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.129.1.aarch64",
            "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.129.1.ppc64le",
            "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.129.1.s390x",
            "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.129.1.x86_64",
            "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-devel-5.3.18-150200.24.129.1.noarch",
            "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-docs-5.3.18-150200.24.129.1.noarch",
            "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-macros-5.3.18-150200.24.129.1.noarch",
            "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.129.1.aarch64",
            "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.129.1.ppc64le",
            "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.129.1.s390x",
            "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.129.1.x86_64",
            "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-preempt-5.3.18-150200.24.129.1.aarch64",
            "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-preempt-5.3.18-150200.24.129.1.x86_64",
            "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-preempt-devel-5.3.18-150200.24.129.1.aarch64",
            "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-preempt-devel-5.3.18-150200.24.129.1.x86_64",
            "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-source-5.3.18-150200.24.129.1.noarch",
            "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.129.1.aarch64",
            "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.129.1.ppc64le",
            "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.129.1.s390x",
            "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.129.1.x86_64",
            "SUSE Linux Enterprise Server 15 SP2-LTSS:reiserfs-kmp-default-5.3.18-150200.24.129.1.aarch64",
            "SUSE Linux Enterprise Server 15 SP2-LTSS:reiserfs-kmp-default-5.3.18-150200.24.129.1.ppc64le",
            "SUSE Linux Enterprise Server 15 SP2-LTSS:reiserfs-kmp-default-5.3.18-150200.24.129.1.s390x",
            "SUSE Linux Enterprise Server 15 SP2-LTSS:reiserfs-kmp-default-5.3.18-150200.24.129.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-5.3.18-150200.24.129.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-5.3.18-150200.24.129.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-base-5.3.18-150200.24.129.1.150200.9.61.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-base-5.3.18-150200.24.129.1.150200.9.61.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-devel-5.3.18-150200.24.129.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-devel-5.3.18-150200.24.129.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-devel-5.3.18-150200.24.129.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-docs-5.3.18-150200.24.129.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-macros-5.3.18-150200.24.129.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-obs-build-5.3.18-150200.24.129.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-obs-build-5.3.18-150200.24.129.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-preempt-5.3.18-150200.24.129.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-preempt-devel-5.3.18-150200.24.129.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-source-5.3.18-150200.24.129.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-syms-5.3.18-150200.24.129.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-syms-5.3.18-150200.24.129.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP2:reiserfs-kmp-default-5.3.18-150200.24.129.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP2:reiserfs-kmp-default-5.3.18-150200.24.129.1.x86_64",
            "SUSE Manager Proxy 4.1:kernel-default-5.3.18-150200.24.129.1.x86_64",
            "SUSE Manager Proxy 4.1:kernel-default-base-5.3.18-150200.24.129.1.150200.9.61.1.x86_64",
            "SUSE Manager Proxy 4.1:kernel-default-devel-5.3.18-150200.24.129.1.x86_64",
            "SUSE Manager Proxy 4.1:kernel-devel-5.3.18-150200.24.129.1.noarch",
            "SUSE Manager Proxy 4.1:kernel-docs-5.3.18-150200.24.129.1.noarch",
            "SUSE Manager Proxy 4.1:kernel-macros-5.3.18-150200.24.129.1.noarch",
            "SUSE Manager Proxy 4.1:kernel-obs-build-5.3.18-150200.24.129.1.x86_64",
            "SUSE Manager Proxy 4.1:kernel-preempt-5.3.18-150200.24.129.1.x86_64",
            "SUSE Manager Proxy 4.1:kernel-preempt-devel-5.3.18-150200.24.129.1.x86_64",
            "SUSE Manager Proxy 4.1:kernel-source-5.3.18-150200.24.129.1.noarch",
            "SUSE Manager Proxy 4.1:kernel-syms-5.3.18-150200.24.129.1.x86_64",
            "SUSE Manager Proxy 4.1:reiserfs-kmp-default-5.3.18-150200.24.129.1.x86_64",
            "SUSE Manager Retail Branch Server 4.1:kernel-default-5.3.18-150200.24.129.1.x86_64",
            "SUSE Manager Retail Branch Server 4.1:kernel-default-base-5.3.18-150200.24.129.1.150200.9.61.1.x86_64",
            "SUSE Manager Retail Branch Server 4.1:kernel-default-devel-5.3.18-150200.24.129.1.x86_64",
            "SUSE Manager Retail Branch Server 4.1:kernel-devel-5.3.18-150200.24.129.1.noarch",
            "SUSE Manager Retail Branch Server 4.1:kernel-docs-5.3.18-150200.24.129.1.noarch",
            "SUSE Manager Retail Branch Server 4.1:kernel-macros-5.3.18-150200.24.129.1.noarch",
            "SUSE Manager Retail Branch Server 4.1:kernel-obs-build-5.3.18-150200.24.129.1.x86_64",
            "SUSE Manager Retail Branch Server 4.1:kernel-preempt-5.3.18-150200.24.129.1.x86_64",
            "SUSE Manager Retail Branch Server 4.1:kernel-preempt-devel-5.3.18-150200.24.129.1.x86_64",
            "SUSE Manager Retail Branch Server 4.1:kernel-source-5.3.18-150200.24.129.1.noarch",
            "SUSE Manager Retail Branch Server 4.1:kernel-syms-5.3.18-150200.24.129.1.x86_64",
            "SUSE Manager Retail Branch Server 4.1:reiserfs-kmp-default-5.3.18-150200.24.129.1.x86_64",
            "SUSE Manager Server 4.1:kernel-default-5.3.18-150200.24.129.1.ppc64le",
            "SUSE Manager Server 4.1:kernel-default-5.3.18-150200.24.129.1.s390x",
            "SUSE Manager Server 4.1:kernel-default-5.3.18-150200.24.129.1.x86_64",
            "SUSE Manager Server 4.1:kernel-default-base-5.3.18-150200.24.129.1.150200.9.61.1.ppc64le",
            "SUSE Manager Server 4.1:kernel-default-base-5.3.18-150200.24.129.1.150200.9.61.1.s390x",
            "SUSE Manager Server 4.1:kernel-default-base-5.3.18-150200.24.129.1.150200.9.61.1.x86_64",
            "SUSE Manager Server 4.1:kernel-default-devel-5.3.18-150200.24.129.1.ppc64le",
            "SUSE Manager Server 4.1:kernel-default-devel-5.3.18-150200.24.129.1.s390x",
            "SUSE Manager Server 4.1:kernel-default-devel-5.3.18-150200.24.129.1.x86_64",
            "SUSE Manager Server 4.1:kernel-devel-5.3.18-150200.24.129.1.noarch",
            "SUSE Manager Server 4.1:kernel-docs-5.3.18-150200.24.129.1.noarch",
            "SUSE Manager Server 4.1:kernel-macros-5.3.18-150200.24.129.1.noarch",
            "SUSE Manager Server 4.1:kernel-obs-build-5.3.18-150200.24.129.1.ppc64le",
            "SUSE Manager Server 4.1:kernel-obs-build-5.3.18-150200.24.129.1.s390x",
            "SUSE Manager Server 4.1:kernel-obs-build-5.3.18-150200.24.129.1.x86_64",
            "SUSE Manager Server 4.1:kernel-preempt-5.3.18-150200.24.129.1.x86_64",
            "SUSE Manager Server 4.1:kernel-preempt-devel-5.3.18-150200.24.129.1.x86_64",
            "SUSE Manager Server 4.1:kernel-source-5.3.18-150200.24.129.1.noarch",
            "SUSE Manager Server 4.1:kernel-syms-5.3.18-150200.24.129.1.ppc64le",
            "SUSE Manager Server 4.1:kernel-syms-5.3.18-150200.24.129.1.s390x",
            "SUSE Manager Server 4.1:kernel-syms-5.3.18-150200.24.129.1.x86_64",
            "SUSE Manager Server 4.1:reiserfs-kmp-default-5.3.18-150200.24.129.1.ppc64le",
            "SUSE Manager Server 4.1:reiserfs-kmp-default-5.3.18-150200.24.129.1.s390x",
            "SUSE Manager Server 4.1:reiserfs-kmp-default-5.3.18-150200.24.129.1.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 7,
            "baseSeverity": "HIGH",
            "vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H",
            "version": "3.1"
          },
          "products": [
            "SUSE Enterprise Storage 7:kernel-default-5.3.18-150200.24.129.1.aarch64",
            "SUSE Enterprise Storage 7:kernel-default-5.3.18-150200.24.129.1.x86_64",
            "SUSE Enterprise Storage 7:kernel-default-base-5.3.18-150200.24.129.1.150200.9.61.1.aarch64",
            "SUSE Enterprise Storage 7:kernel-default-base-5.3.18-150200.24.129.1.150200.9.61.1.x86_64",
            "SUSE Enterprise Storage 7:kernel-default-devel-5.3.18-150200.24.129.1.aarch64",
            "SUSE Enterprise Storage 7:kernel-default-devel-5.3.18-150200.24.129.1.x86_64",
            "SUSE Enterprise Storage 7:kernel-devel-5.3.18-150200.24.129.1.noarch",
            "SUSE Enterprise Storage 7:kernel-docs-5.3.18-150200.24.129.1.noarch",
            "SUSE Enterprise Storage 7:kernel-macros-5.3.18-150200.24.129.1.noarch",
            "SUSE Enterprise Storage 7:kernel-obs-build-5.3.18-150200.24.129.1.aarch64",
            "SUSE Enterprise Storage 7:kernel-obs-build-5.3.18-150200.24.129.1.x86_64",
            "SUSE Enterprise Storage 7:kernel-preempt-5.3.18-150200.24.129.1.aarch64",
            "SUSE Enterprise Storage 7:kernel-preempt-5.3.18-150200.24.129.1.x86_64",
            "SUSE Enterprise Storage 7:kernel-preempt-devel-5.3.18-150200.24.129.1.aarch64",
            "SUSE Enterprise Storage 7:kernel-preempt-devel-5.3.18-150200.24.129.1.x86_64",
            "SUSE Enterprise Storage 7:kernel-source-5.3.18-150200.24.129.1.noarch",
            "SUSE Enterprise Storage 7:kernel-syms-5.3.18-150200.24.129.1.aarch64",
            "SUSE Enterprise Storage 7:kernel-syms-5.3.18-150200.24.129.1.x86_64",
            "SUSE Enterprise Storage 7:reiserfs-kmp-default-5.3.18-150200.24.129.1.aarch64",
            "SUSE Enterprise Storage 7:reiserfs-kmp-default-5.3.18-150200.24.129.1.x86_64",
            "SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-150200.24.129.1.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-150200.24.129.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-150200.24.129.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-150200.24.129.1.x86_64",
            "SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-150200.24.129.1.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-150200.24.129.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-150200.24.129.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-150200.24.129.1.x86_64",
            "SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-150200.24.129.1.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-150200.24.129.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-150200.24.129.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-150200.24.129.1.x86_64",
            "SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-150200.24.129.1.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-150200.24.129.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-150200.24.129.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-150200.24.129.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-default-5.3.18-150200.24.129.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-default-5.3.18-150200.24.129.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-default-base-5.3.18-150200.24.129.1.150200.9.61.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-default-base-5.3.18-150200.24.129.1.150200.9.61.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-default-devel-5.3.18-150200.24.129.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-default-devel-5.3.18-150200.24.129.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-devel-5.3.18-150200.24.129.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-docs-5.3.18-150200.24.129.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-macros-5.3.18-150200.24.129.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-obs-build-5.3.18-150200.24.129.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-obs-build-5.3.18-150200.24.129.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-preempt-5.3.18-150200.24.129.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-preempt-5.3.18-150200.24.129.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-preempt-devel-5.3.18-150200.24.129.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-preempt-devel-5.3.18-150200.24.129.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-source-5.3.18-150200.24.129.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-syms-5.3.18-150200.24.129.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-syms-5.3.18-150200.24.129.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-5.3.18-150200.24.129.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-5.3.18-150200.24.129.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.129.1.150200.9.61.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.129.1.150200.9.61.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.129.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.129.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-devel-5.3.18-150200.24.129.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-docs-5.3.18-150200.24.129.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-macros-5.3.18-150200.24.129.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.129.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.129.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-preempt-5.3.18-150200.24.129.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-preempt-5.3.18-150200.24.129.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-preempt-devel-5.3.18-150200.24.129.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-preempt-devel-5.3.18-150200.24.129.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-source-5.3.18-150200.24.129.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.129.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.129.1.x86_64",
            "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-5.3.18-150200.24.129.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-5.3.18-150200.24.129.1.s390x",
            "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-5.3.18-150200.24.129.1.x86_64",
            "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-devel-5.3.18-150200.24.129.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-devel-5.3.18-150200.24.129.1.s390x",
            "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-devel-5.3.18-150200.24.129.1.x86_64",
            "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-150200_24_129-default-1-150200.5.3.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-150200_24_129-default-1-150200.5.3.1.s390x",
            "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-150200_24_129-default-1-150200.5.3.1.x86_64",
            "SUSE Linux Enterprise Server 15 SP2-BCL:kernel-default-5.3.18-150200.24.129.1.x86_64",
            "SUSE Linux Enterprise Server 15 SP2-BCL:kernel-default-base-5.3.18-150200.24.129.1.150200.9.61.1.x86_64",
            "SUSE Linux Enterprise Server 15 SP2-BCL:kernel-default-devel-5.3.18-150200.24.129.1.x86_64",
            "SUSE Linux Enterprise Server 15 SP2-BCL:kernel-devel-5.3.18-150200.24.129.1.noarch",
            "SUSE Linux Enterprise Server 15 SP2-BCL:kernel-docs-5.3.18-150200.24.129.1.noarch",
            "SUSE Linux Enterprise Server 15 SP2-BCL:kernel-macros-5.3.18-150200.24.129.1.noarch",
            "SUSE Linux Enterprise Server 15 SP2-BCL:kernel-obs-build-5.3.18-150200.24.129.1.x86_64",
            "SUSE Linux Enterprise Server 15 SP2-BCL:kernel-preempt-5.3.18-150200.24.129.1.x86_64",
            "SUSE Linux Enterprise Server 15 SP2-BCL:kernel-preempt-devel-5.3.18-150200.24.129.1.x86_64",
            "SUSE Linux Enterprise Server 15 SP2-BCL:kernel-source-5.3.18-150200.24.129.1.noarch",
            "SUSE Linux Enterprise Server 15 SP2-BCL:kernel-syms-5.3.18-150200.24.129.1.x86_64",
            "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-5.3.18-150200.24.129.1.aarch64",
            "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-5.3.18-150200.24.129.1.ppc64le",
            "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-5.3.18-150200.24.129.1.s390x",
            "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-5.3.18-150200.24.129.1.x86_64",
            "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.129.1.150200.9.61.1.aarch64",
            "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.129.1.150200.9.61.1.ppc64le",
            "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.129.1.150200.9.61.1.s390x",
            "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.129.1.150200.9.61.1.x86_64",
            "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.129.1.aarch64",
            "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.129.1.ppc64le",
            "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.129.1.s390x",
            "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.129.1.x86_64",
            "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-devel-5.3.18-150200.24.129.1.noarch",
            "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-docs-5.3.18-150200.24.129.1.noarch",
            "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-macros-5.3.18-150200.24.129.1.noarch",
            "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.129.1.aarch64",
            "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.129.1.ppc64le",
            "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.129.1.s390x",
            "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.129.1.x86_64",
            "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-preempt-5.3.18-150200.24.129.1.aarch64",
            "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-preempt-5.3.18-150200.24.129.1.x86_64",
            "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-preempt-devel-5.3.18-150200.24.129.1.aarch64",
            "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-preempt-devel-5.3.18-150200.24.129.1.x86_64",
            "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-source-5.3.18-150200.24.129.1.noarch",
            "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.129.1.aarch64",
            "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.129.1.ppc64le",
            "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.129.1.s390x",
            "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.129.1.x86_64",
            "SUSE Linux Enterprise Server 15 SP2-LTSS:reiserfs-kmp-default-5.3.18-150200.24.129.1.aarch64",
            "SUSE Linux Enterprise Server 15 SP2-LTSS:reiserfs-kmp-default-5.3.18-150200.24.129.1.ppc64le",
            "SUSE Linux Enterprise Server 15 SP2-LTSS:reiserfs-kmp-default-5.3.18-150200.24.129.1.s390x",
            "SUSE Linux Enterprise Server 15 SP2-LTSS:reiserfs-kmp-default-5.3.18-150200.24.129.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-5.3.18-150200.24.129.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-5.3.18-150200.24.129.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-base-5.3.18-150200.24.129.1.150200.9.61.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-base-5.3.18-150200.24.129.1.150200.9.61.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-devel-5.3.18-150200.24.129.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-devel-5.3.18-150200.24.129.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-devel-5.3.18-150200.24.129.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-docs-5.3.18-150200.24.129.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-macros-5.3.18-150200.24.129.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-obs-build-5.3.18-150200.24.129.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-obs-build-5.3.18-150200.24.129.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-preempt-5.3.18-150200.24.129.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-preempt-devel-5.3.18-150200.24.129.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-source-5.3.18-150200.24.129.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-syms-5.3.18-150200.24.129.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-syms-5.3.18-150200.24.129.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP2:reiserfs-kmp-default-5.3.18-150200.24.129.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP2:reiserfs-kmp-default-5.3.18-150200.24.129.1.x86_64",
            "SUSE Manager Proxy 4.1:kernel-default-5.3.18-150200.24.129.1.x86_64",
            "SUSE Manager Proxy 4.1:kernel-default-base-5.3.18-150200.24.129.1.150200.9.61.1.x86_64",
            "SUSE Manager Proxy 4.1:kernel-default-devel-5.3.18-150200.24.129.1.x86_64",
            "SUSE Manager Proxy 4.1:kernel-devel-5.3.18-150200.24.129.1.noarch",
            "SUSE Manager Proxy 4.1:kernel-docs-5.3.18-150200.24.129.1.noarch",
            "SUSE Manager Proxy 4.1:kernel-macros-5.3.18-150200.24.129.1.noarch",
            "SUSE Manager Proxy 4.1:kernel-obs-build-5.3.18-150200.24.129.1.x86_64",
            "SUSE Manager Proxy 4.1:kernel-preempt-5.3.18-150200.24.129.1.x86_64",
            "SUSE Manager Proxy 4.1:kernel-preempt-devel-5.3.18-150200.24.129.1.x86_64",
            "SUSE Manager Proxy 4.1:kernel-source-5.3.18-150200.24.129.1.noarch",
            "SUSE Manager Proxy 4.1:kernel-syms-5.3.18-150200.24.129.1.x86_64",
            "SUSE Manager Proxy 4.1:reiserfs-kmp-default-5.3.18-150200.24.129.1.x86_64",
            "SUSE Manager Retail Branch Server 4.1:kernel-default-5.3.18-150200.24.129.1.x86_64",
            "SUSE Manager Retail Branch Server 4.1:kernel-default-base-5.3.18-150200.24.129.1.150200.9.61.1.x86_64",
            "SUSE Manager Retail Branch Server 4.1:kernel-default-devel-5.3.18-150200.24.129.1.x86_64",
            "SUSE Manager Retail Branch Server 4.1:kernel-devel-5.3.18-150200.24.129.1.noarch",
            "SUSE Manager Retail Branch Server 4.1:kernel-docs-5.3.18-150200.24.129.1.noarch",
            "SUSE Manager Retail Branch Server 4.1:kernel-macros-5.3.18-150200.24.129.1.noarch",
            "SUSE Manager Retail Branch Server 4.1:kernel-obs-build-5.3.18-150200.24.129.1.x86_64",
            "SUSE Manager Retail Branch Server 4.1:kernel-preempt-5.3.18-150200.24.129.1.x86_64",
            "SUSE Manager Retail Branch Server 4.1:kernel-preempt-devel-5.3.18-150200.24.129.1.x86_64",
            "SUSE Manager Retail Branch Server 4.1:kernel-source-5.3.18-150200.24.129.1.noarch",
            "SUSE Manager Retail Branch Server 4.1:kernel-syms-5.3.18-150200.24.129.1.x86_64",
            "SUSE Manager Retail Branch Server 4.1:reiserfs-kmp-default-5.3.18-150200.24.129.1.x86_64",
            "SUSE Manager Server 4.1:kernel-default-5.3.18-150200.24.129.1.ppc64le",
            "SUSE Manager Server 4.1:kernel-default-5.3.18-150200.24.129.1.s390x",
            "SUSE Manager Server 4.1:kernel-default-5.3.18-150200.24.129.1.x86_64",
            "SUSE Manager Server 4.1:kernel-default-base-5.3.18-150200.24.129.1.150200.9.61.1.ppc64le",
            "SUSE Manager Server 4.1:kernel-default-base-5.3.18-150200.24.129.1.150200.9.61.1.s390x",
            "SUSE Manager Server 4.1:kernel-default-base-5.3.18-150200.24.129.1.150200.9.61.1.x86_64",
            "SUSE Manager Server 4.1:kernel-default-devel-5.3.18-150200.24.129.1.ppc64le",
            "SUSE Manager Server 4.1:kernel-default-devel-5.3.18-150200.24.129.1.s390x",
            "SUSE Manager Server 4.1:kernel-default-devel-5.3.18-150200.24.129.1.x86_64",
            "SUSE Manager Server 4.1:kernel-devel-5.3.18-150200.24.129.1.noarch",
            "SUSE Manager Server 4.1:kernel-docs-5.3.18-150200.24.129.1.noarch",
            "SUSE Manager Server 4.1:kernel-macros-5.3.18-150200.24.129.1.noarch",
            "SUSE Manager Server 4.1:kernel-obs-build-5.3.18-150200.24.129.1.ppc64le",
            "SUSE Manager Server 4.1:kernel-obs-build-5.3.18-150200.24.129.1.s390x",
            "SUSE Manager Server 4.1:kernel-obs-build-5.3.18-150200.24.129.1.x86_64",
            "SUSE Manager Server 4.1:kernel-preempt-5.3.18-150200.24.129.1.x86_64",
            "SUSE Manager Server 4.1:kernel-preempt-devel-5.3.18-150200.24.129.1.x86_64",
            "SUSE Manager Server 4.1:kernel-source-5.3.18-150200.24.129.1.noarch",
            "SUSE Manager Server 4.1:kernel-syms-5.3.18-150200.24.129.1.ppc64le",
            "SUSE Manager Server 4.1:kernel-syms-5.3.18-150200.24.129.1.s390x",
            "SUSE Manager Server 4.1:kernel-syms-5.3.18-150200.24.129.1.x86_64",
            "SUSE Manager Server 4.1:reiserfs-kmp-default-5.3.18-150200.24.129.1.ppc64le",
            "SUSE Manager Server 4.1:reiserfs-kmp-default-5.3.18-150200.24.129.1.s390x",
            "SUSE Manager Server 4.1:reiserfs-kmp-default-5.3.18-150200.24.129.1.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2022-09-28T06:48:59Z",
          "details": "moderate"
        }
      ],
      "title": "CVE-2022-39188"
    }
  ]
}
  suse-su-2025:02320-1
Vulnerability from csaf_suse
Published
2025-07-15 14:20
    Modified
2025-07-15 14:20
    Summary
Security update for the Linux Kernel
    Notes
Title of the patch
Security update for the Linux Kernel
    Description of the patch
The SUSE Linux Enterprise 15 SP3 RT kernel was updated to receive various security bugfixes.
The following security bugs were fixed:
- CVE-2022-50085: dm raid: fix address sanitizer warning in raid_resume (bsc#1245147).
- CVE-2022-50087: firmware: arm_scpi: Ensure scpi_info is not assigned if the probe fails (bsc#1245119).
- CVE-2022-50200: selinux: Add boundary check in put_entry() (bsc#1245149).
- CVE-2024-26924: scsi: lpfc: Release hbalock before calling lpfc_worker_wake_up() (bsc#1225820).
- CVE-2024-27397: kabi: place tstamp needed for nftables set in a hole (bsc#1224095).
- CVE-2024-36978: net: sched: sch_multiq: fix possible OOB write in multiq_tune() (bsc#1226514).
- CVE-2024-46800: sch/netem: fix use after free in netem_dequeue (bsc#1230827).
- CVE-2024-53141: netfilter: ipset: add missing range check in bitmap_ip_uadt (bsc#1234381).
- CVE-2024-56770: sch/netem: fix use after free in netem_dequeue (bsc#1235637).
- CVE-2025-21700: net: sched: Disallow replacing of child qdisc from one parent to another (bsc#1237159).
- CVE-2025-21702: pfifo_tail_enqueue: Drop new packet when sch->limit == 0 (bsc#1237312).
- CVE-2025-21703: netem: Update sch->q.qlen before qdisc_tree_reduce_backlog() (bsc#1237313).
- CVE-2025-37752: net_sched: sch_sfq: move the limit validation (bsc#1242504).
- CVE-2025-37823: net_sched: hfsc: Fix a potential UAF in hfsc_dequeue() too (bsc#1242924).
- CVE-2025-37890: net_sched: hfsc: Fix a UAF vulnerability in class with netem as child qdisc (bsc#1243330).
- CVE-2025-37997: netfilter: ipset: fix region locking in hash types (bsc#1243832).
- CVE-2025-38000: sch_hfsc: Fix qlen accounting bug when using peek in hfsc_enqueue() (bsc#1244277).
- CVE-2025-38001: net_sched: hfsc: Address reentrant enqueue adding class to eltree twice (bsc#1244234).
- CVE-2025-38083: net_sched: prio: fix a race in prio_tune() (bsc#1245183).
The following non-security bugs were fixed:
- net_sched: sch_fifo: implement lockless __fifo_dump() (bsc#1237312)
- net_sched: sch_sfq: use a temporary work area for validating configuration (bsc#1232504)
- scsi: storvsc: Do not report the host packet status as the hv status (git-fixes).
- scsi: storvsc: Increase the timeouts to storvsc_timeout (bsc#1245455).
- wifi: cfg80211: Add my certificate (bsc#1243001).
- wifi: cfg80211: fix certs build to not depend on file order (bsc#1243001).
    Patchnames
SUSE-2025-2320,SUSE-SUSE-MicroOS-5.1-2025-2320,SUSE-SUSE-MicroOS-5.2-2025-2320
    Terms of use
CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).
    {
  "document": {
    "aggregate_severity": {
      "namespace": "https://www.suse.com/support/security/rating/",
      "text": "important"
    },
    "category": "csaf_security_advisory",
    "csaf_version": "2.0",
    "distribution": {
      "text": "Copyright 2024 SUSE LLC. All rights reserved.",
      "tlp": {
        "label": "WHITE",
        "url": "https://www.first.org/tlp/"
      }
    },
    "lang": "en",
    "notes": [
      {
        "category": "summary",
        "text": "Security update for the Linux Kernel",
        "title": "Title of the patch"
      },
      {
        "category": "description",
        "text": "\nThe SUSE Linux Enterprise 15 SP3 RT kernel was updated to receive various security bugfixes.\n\nThe following security bugs were fixed:\n\n- CVE-2022-50085: dm raid: fix address sanitizer warning in raid_resume (bsc#1245147).\n- CVE-2022-50087: firmware: arm_scpi: Ensure scpi_info is not assigned if the probe fails (bsc#1245119).\n- CVE-2022-50200: selinux: Add boundary check in put_entry() (bsc#1245149).\n- CVE-2024-26924: scsi: lpfc: Release hbalock before calling lpfc_worker_wake_up() (bsc#1225820).\n- CVE-2024-27397: kabi: place tstamp needed for nftables set in a hole (bsc#1224095).\n- CVE-2024-36978: net: sched: sch_multiq: fix possible OOB write in multiq_tune() (bsc#1226514).\n- CVE-2024-46800: sch/netem: fix use after free in netem_dequeue (bsc#1230827).\n- CVE-2024-53141: netfilter: ipset: add missing range check in bitmap_ip_uadt (bsc#1234381).\n- CVE-2024-56770: sch/netem: fix use after free in netem_dequeue (bsc#1235637).\n- CVE-2025-21700: net: sched: Disallow replacing of child qdisc from one parent to another (bsc#1237159).\n- CVE-2025-21702: pfifo_tail_enqueue: Drop new packet when sch-\u003elimit == 0 (bsc#1237312).\n- CVE-2025-21703: netem: Update sch-\u003eq.qlen before qdisc_tree_reduce_backlog() (bsc#1237313).\n- CVE-2025-37752: net_sched: sch_sfq: move the limit validation (bsc#1242504).\n- CVE-2025-37823: net_sched: hfsc: Fix a potential UAF in hfsc_dequeue() too (bsc#1242924).\n- CVE-2025-37890: net_sched: hfsc: Fix a UAF vulnerability in class with netem as child qdisc (bsc#1243330).\n- CVE-2025-37997: netfilter: ipset: fix region locking in hash types (bsc#1243832).\n- CVE-2025-38000: sch_hfsc: Fix qlen accounting bug when using peek in hfsc_enqueue() (bsc#1244277).\n- CVE-2025-38001: net_sched: hfsc: Address reentrant enqueue adding class to eltree twice (bsc#1244234).\n- CVE-2025-38083: net_sched: prio: fix a race in prio_tune() (bsc#1245183).\n\nThe following non-security bugs were fixed:\n\n- net_sched: sch_fifo: implement lockless __fifo_dump() (bsc#1237312)\n- net_sched: sch_sfq: use a temporary work area for validating configuration (bsc#1232504)\n- scsi: storvsc: Do not report the host packet status as the hv status (git-fixes).\n- scsi: storvsc: Increase the timeouts to storvsc_timeout (bsc#1245455).\n- wifi: cfg80211: Add my certificate (bsc#1243001).\n- wifi: cfg80211: fix certs build to not depend on file order (bsc#1243001).\n",
        "title": "Description of the patch"
      },
      {
        "category": "details",
        "text": "SUSE-2025-2320,SUSE-SUSE-MicroOS-5.1-2025-2320,SUSE-SUSE-MicroOS-5.2-2025-2320",
        "title": "Patchnames"
      },
      {
        "category": "legal_disclaimer",
        "text": "CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).",
        "title": "Terms of use"
      }
    ],
    "publisher": {
      "category": "vendor",
      "contact_details": "https://www.suse.com/support/security/contact/",
      "name": "SUSE Product Security Team",
      "namespace": "https://www.suse.com/"
    },
    "references": [
      {
        "category": "external",
        "summary": "SUSE ratings",
        "url": "https://www.suse.com/support/security/rating/"
      },
      {
        "category": "self",
        "summary": "URL of this CSAF notice",
        "url": "https://ftp.suse.com/pub/projects/security/csaf/suse-su-2025_02320-1.json"
      },
      {
        "category": "self",
        "summary": "URL for SUSE-SU-2025:02320-1",
        "url": "https://www.suse.com/support/update/announcement/2025/suse-su-202502320-1/"
      },
      {
        "category": "self",
        "summary": "E-Mail link for SUSE-SU-2025:02320-1",
        "url": "https://lists.suse.com/pipermail/sle-security-updates/2025-July/021812.html"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1065729",
        "url": "https://bugzilla.suse.com/1065729"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1156395",
        "url": "https://bugzilla.suse.com/1156395"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1199487",
        "url": "https://bugzilla.suse.com/1199487"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1201160",
        "url": "https://bugzilla.suse.com/1201160"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1201956",
        "url": "https://bugzilla.suse.com/1201956"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1202095",
        "url": "https://bugzilla.suse.com/1202095"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1202564",
        "url": "https://bugzilla.suse.com/1202564"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1202716",
        "url": "https://bugzilla.suse.com/1202716"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1202810",
        "url": "https://bugzilla.suse.com/1202810"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1202860",
        "url": "https://bugzilla.suse.com/1202860"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1205220",
        "url": "https://bugzilla.suse.com/1205220"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1205514",
        "url": "https://bugzilla.suse.com/1205514"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1206664",
        "url": "https://bugzilla.suse.com/1206664"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1206878",
        "url": "https://bugzilla.suse.com/1206878"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1206880",
        "url": "https://bugzilla.suse.com/1206880"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1211226",
        "url": "https://bugzilla.suse.com/1211226"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1212051",
        "url": "https://bugzilla.suse.com/1212051"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1218184",
        "url": "https://bugzilla.suse.com/1218184"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1224095",
        "url": "https://bugzilla.suse.com/1224095"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1225820",
        "url": "https://bugzilla.suse.com/1225820"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1226514",
        "url": "https://bugzilla.suse.com/1226514"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1228659",
        "url": "https://bugzilla.suse.com/1228659"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1230827",
        "url": "https://bugzilla.suse.com/1230827"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1231293",
        "url": "https://bugzilla.suse.com/1231293"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1232504",
        "url": "https://bugzilla.suse.com/1232504"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1234381",
        "url": "https://bugzilla.suse.com/1234381"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1234454",
        "url": "https://bugzilla.suse.com/1234454"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1235637",
        "url": "https://bugzilla.suse.com/1235637"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1237159",
        "url": "https://bugzilla.suse.com/1237159"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1237312",
        "url": "https://bugzilla.suse.com/1237312"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1237313",
        "url": "https://bugzilla.suse.com/1237313"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1238303",
        "url": "https://bugzilla.suse.com/1238303"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1238471",
        "url": "https://bugzilla.suse.com/1238471"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1238570",
        "url": "https://bugzilla.suse.com/1238570"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1239986",
        "url": "https://bugzilla.suse.com/1239986"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1240785",
        "url": "https://bugzilla.suse.com/1240785"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1241038",
        "url": "https://bugzilla.suse.com/1241038"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1242414",
        "url": "https://bugzilla.suse.com/1242414"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1242504",
        "url": "https://bugzilla.suse.com/1242504"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1242924",
        "url": "https://bugzilla.suse.com/1242924"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1243001",
        "url": "https://bugzilla.suse.com/1243001"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1243330",
        "url": "https://bugzilla.suse.com/1243330"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1243543",
        "url": "https://bugzilla.suse.com/1243543"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1243627",
        "url": "https://bugzilla.suse.com/1243627"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1243832",
        "url": "https://bugzilla.suse.com/1243832"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1244234",
        "url": "https://bugzilla.suse.com/1244234"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1244241",
        "url": "https://bugzilla.suse.com/1244241"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1244277",
        "url": "https://bugzilla.suse.com/1244277"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1244337",
        "url": "https://bugzilla.suse.com/1244337"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1244764",
        "url": "https://bugzilla.suse.com/1244764"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1244767",
        "url": "https://bugzilla.suse.com/1244767"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1244770",
        "url": "https://bugzilla.suse.com/1244770"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1244771",
        "url": "https://bugzilla.suse.com/1244771"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1244773",
        "url": "https://bugzilla.suse.com/1244773"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1244774",
        "url": "https://bugzilla.suse.com/1244774"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1244776",
        "url": "https://bugzilla.suse.com/1244776"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1244779",
        "url": "https://bugzilla.suse.com/1244779"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1244782",
        "url": "https://bugzilla.suse.com/1244782"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1244783",
        "url": "https://bugzilla.suse.com/1244783"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1244786",
        "url": "https://bugzilla.suse.com/1244786"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1244788",
        "url": "https://bugzilla.suse.com/1244788"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1244790",
        "url": "https://bugzilla.suse.com/1244790"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1244793",
        "url": "https://bugzilla.suse.com/1244793"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1244794",
        "url": "https://bugzilla.suse.com/1244794"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1244796",
        "url": "https://bugzilla.suse.com/1244796"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1244797",
        "url": "https://bugzilla.suse.com/1244797"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1244804",
        "url": "https://bugzilla.suse.com/1244804"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1244813",
        "url": "https://bugzilla.suse.com/1244813"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1244815",
        "url": "https://bugzilla.suse.com/1244815"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1244816",
        "url": "https://bugzilla.suse.com/1244816"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1244825",
        "url": "https://bugzilla.suse.com/1244825"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1244834",
        "url": "https://bugzilla.suse.com/1244834"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1244836",
        "url": "https://bugzilla.suse.com/1244836"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1244838",
        "url": "https://bugzilla.suse.com/1244838"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1244839",
        "url": "https://bugzilla.suse.com/1244839"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1244841",
        "url": "https://bugzilla.suse.com/1244841"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1244842",
        "url": "https://bugzilla.suse.com/1244842"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1244845",
        "url": "https://bugzilla.suse.com/1244845"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1244848",
        "url": "https://bugzilla.suse.com/1244848"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1244849",
        "url": "https://bugzilla.suse.com/1244849"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1244851",
        "url": "https://bugzilla.suse.com/1244851"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1244853",
        "url": "https://bugzilla.suse.com/1244853"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1244856",
        "url": "https://bugzilla.suse.com/1244856"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1244861",
        "url": "https://bugzilla.suse.com/1244861"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1244867",
        "url": "https://bugzilla.suse.com/1244867"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1244868",
        "url": "https://bugzilla.suse.com/1244868"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1244869",
        "url": "https://bugzilla.suse.com/1244869"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1244881",
        "url": "https://bugzilla.suse.com/1244881"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1244883",
        "url": "https://bugzilla.suse.com/1244883"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1244884",
        "url": "https://bugzilla.suse.com/1244884"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1244885",
        "url": "https://bugzilla.suse.com/1244885"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1244886",
        "url": "https://bugzilla.suse.com/1244886"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1244887",
        "url": "https://bugzilla.suse.com/1244887"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1244899",
        "url": "https://bugzilla.suse.com/1244899"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1244901",
        "url": "https://bugzilla.suse.com/1244901"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1244902",
        "url": "https://bugzilla.suse.com/1244902"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1244908",
        "url": "https://bugzilla.suse.com/1244908"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1244936",
        "url": "https://bugzilla.suse.com/1244936"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1244941",
        "url": "https://bugzilla.suse.com/1244941"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1244943",
        "url": "https://bugzilla.suse.com/1244943"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1244945",
        "url": "https://bugzilla.suse.com/1244945"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1244948",
        "url": "https://bugzilla.suse.com/1244948"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1244950",
        "url": "https://bugzilla.suse.com/1244950"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1244956",
        "url": "https://bugzilla.suse.com/1244956"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1244958",
        "url": "https://bugzilla.suse.com/1244958"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1244959",
        "url": "https://bugzilla.suse.com/1244959"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1244967",
        "url": "https://bugzilla.suse.com/1244967"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1244968",
        "url": "https://bugzilla.suse.com/1244968"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1244969",
        "url": "https://bugzilla.suse.com/1244969"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1244976",
        "url": "https://bugzilla.suse.com/1244976"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1244979",
        "url": "https://bugzilla.suse.com/1244979"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1244984",
        "url": "https://bugzilla.suse.com/1244984"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1244986",
        "url": "https://bugzilla.suse.com/1244986"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1244992",
        "url": "https://bugzilla.suse.com/1244992"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1245006",
        "url": "https://bugzilla.suse.com/1245006"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1245007",
        "url": "https://bugzilla.suse.com/1245007"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1245024",
        "url": "https://bugzilla.suse.com/1245024"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1245031",
        "url": "https://bugzilla.suse.com/1245031"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1245033",
        "url": "https://bugzilla.suse.com/1245033"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1245041",
        "url": "https://bugzilla.suse.com/1245041"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1245047",
        "url": "https://bugzilla.suse.com/1245047"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1245051",
        "url": "https://bugzilla.suse.com/1245051"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1245057",
        "url": "https://bugzilla.suse.com/1245057"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1245058",
        "url": "https://bugzilla.suse.com/1245058"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1245072",
        "url": "https://bugzilla.suse.com/1245072"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1245073",
        "url": "https://bugzilla.suse.com/1245073"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1245098",
        "url": "https://bugzilla.suse.com/1245098"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1245103",
        "url": "https://bugzilla.suse.com/1245103"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1245117",
        "url": "https://bugzilla.suse.com/1245117"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1245119",
        "url": "https://bugzilla.suse.com/1245119"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1245121",
        "url": "https://bugzilla.suse.com/1245121"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1245122",
        "url": "https://bugzilla.suse.com/1245122"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1245125",
        "url": "https://bugzilla.suse.com/1245125"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1245129",
        "url": "https://bugzilla.suse.com/1245129"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1245131",
        "url": "https://bugzilla.suse.com/1245131"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1245135",
        "url": "https://bugzilla.suse.com/1245135"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1245136",
        "url": "https://bugzilla.suse.com/1245136"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1245138",
        "url": "https://bugzilla.suse.com/1245138"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1245139",
        "url": "https://bugzilla.suse.com/1245139"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1245140",
        "url": "https://bugzilla.suse.com/1245140"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1245146",
        "url": "https://bugzilla.suse.com/1245146"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1245147",
        "url": "https://bugzilla.suse.com/1245147"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1245149",
        "url": "https://bugzilla.suse.com/1245149"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1245183",
        "url": "https://bugzilla.suse.com/1245183"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1245195",
        "url": "https://bugzilla.suse.com/1245195"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1245265",
        "url": "https://bugzilla.suse.com/1245265"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1245348",
        "url": "https://bugzilla.suse.com/1245348"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1245455",
        "url": "https://bugzilla.suse.com/1245455"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2022-1679 page",
        "url": "https://www.suse.com/security/cve/CVE-2022-1679/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2022-2586 page",
        "url": "https://www.suse.com/security/cve/CVE-2022-2586/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2022-2905 page",
        "url": "https://www.suse.com/security/cve/CVE-2022-2905/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2022-3903 page",
        "url": "https://www.suse.com/security/cve/CVE-2022-3903/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2022-4095 page",
        "url": "https://www.suse.com/security/cve/CVE-2022-4095/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2022-4662 page",
        "url": "https://www.suse.com/security/cve/CVE-2022-4662/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2022-49934 page",
        "url": "https://www.suse.com/security/cve/CVE-2022-49934/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2022-49936 page",
        "url": "https://www.suse.com/security/cve/CVE-2022-49936/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2022-49937 page",
        "url": "https://www.suse.com/security/cve/CVE-2022-49937/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2022-49942 page",
        "url": "https://www.suse.com/security/cve/CVE-2022-49942/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2022-49945 page",
        "url": "https://www.suse.com/security/cve/CVE-2022-49945/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2022-49948 page",
        "url": "https://www.suse.com/security/cve/CVE-2022-49948/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2022-49950 page",
        "url": "https://www.suse.com/security/cve/CVE-2022-49950/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2022-49952 page",
        "url": "https://www.suse.com/security/cve/CVE-2022-49952/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2022-49954 page",
        "url": "https://www.suse.com/security/cve/CVE-2022-49954/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2022-49956 page",
        "url": "https://www.suse.com/security/cve/CVE-2022-49956/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2022-49968 page",
        "url": "https://www.suse.com/security/cve/CVE-2022-49968/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2022-49977 page",
        "url": "https://www.suse.com/security/cve/CVE-2022-49977/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2022-49978 page",
        "url": "https://www.suse.com/security/cve/CVE-2022-49978/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2022-49981 page",
        "url": "https://www.suse.com/security/cve/CVE-2022-49981/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2022-49984 page",
        "url": "https://www.suse.com/security/cve/CVE-2022-49984/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2022-49985 page",
        "url": "https://www.suse.com/security/cve/CVE-2022-49985/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2022-49986 page",
        "url": "https://www.suse.com/security/cve/CVE-2022-49986/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2022-49987 page",
        "url": "https://www.suse.com/security/cve/CVE-2022-49987/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2022-49989 page",
        "url": "https://www.suse.com/security/cve/CVE-2022-49989/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2022-49990 page",
        "url": "https://www.suse.com/security/cve/CVE-2022-49990/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2022-49993 page",
        "url": "https://www.suse.com/security/cve/CVE-2022-49993/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2022-50010 page",
        "url": "https://www.suse.com/security/cve/CVE-2022-50010/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2022-50012 page",
        "url": "https://www.suse.com/security/cve/CVE-2022-50012/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2022-50019 page",
        "url": "https://www.suse.com/security/cve/CVE-2022-50019/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2022-50020 page",
        "url": "https://www.suse.com/security/cve/CVE-2022-50020/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2022-50022 page",
        "url": "https://www.suse.com/security/cve/CVE-2022-50022/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2022-50027 page",
        "url": "https://www.suse.com/security/cve/CVE-2022-50027/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2022-50028 page",
        "url": "https://www.suse.com/security/cve/CVE-2022-50028/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2022-50029 page",
        "url": "https://www.suse.com/security/cve/CVE-2022-50029/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2022-50030 page",
        "url": "https://www.suse.com/security/cve/CVE-2022-50030/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2022-50032 page",
        "url": "https://www.suse.com/security/cve/CVE-2022-50032/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2022-50033 page",
        "url": "https://www.suse.com/security/cve/CVE-2022-50033/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2022-50036 page",
        "url": "https://www.suse.com/security/cve/CVE-2022-50036/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2022-50038 page",
        "url": "https://www.suse.com/security/cve/CVE-2022-50038/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2022-50045 page",
        "url": "https://www.suse.com/security/cve/CVE-2022-50045/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2022-50051 page",
        "url": "https://www.suse.com/security/cve/CVE-2022-50051/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2022-50059 page",
        "url": "https://www.suse.com/security/cve/CVE-2022-50059/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2022-50061 page",
        "url": "https://www.suse.com/security/cve/CVE-2022-50061/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2022-50065 page",
        "url": "https://www.suse.com/security/cve/CVE-2022-50065/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2022-50067 page",
        "url": "https://www.suse.com/security/cve/CVE-2022-50067/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2022-50072 page",
        "url": "https://www.suse.com/security/cve/CVE-2022-50072/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2022-50083 page",
        "url": "https://www.suse.com/security/cve/CVE-2022-50083/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2022-50084 page",
        "url": "https://www.suse.com/security/cve/CVE-2022-50084/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2022-50085 page",
        "url": "https://www.suse.com/security/cve/CVE-2022-50085/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2022-50087 page",
        "url": "https://www.suse.com/security/cve/CVE-2022-50087/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2022-50091 page",
        "url": "https://www.suse.com/security/cve/CVE-2022-50091/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2022-50092 page",
        "url": "https://www.suse.com/security/cve/CVE-2022-50092/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2022-50093 page",
        "url": "https://www.suse.com/security/cve/CVE-2022-50093/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2022-50094 page",
        "url": "https://www.suse.com/security/cve/CVE-2022-50094/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2022-50097 page",
        "url": "https://www.suse.com/security/cve/CVE-2022-50097/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2022-50098 page",
        "url": "https://www.suse.com/security/cve/CVE-2022-50098/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2022-50099 page",
        "url": "https://www.suse.com/security/cve/CVE-2022-50099/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2022-50101 page",
        "url": "https://www.suse.com/security/cve/CVE-2022-50101/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2022-50102 page",
        "url": "https://www.suse.com/security/cve/CVE-2022-50102/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2022-50104 page",
        "url": "https://www.suse.com/security/cve/CVE-2022-50104/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2022-50108 page",
        "url": "https://www.suse.com/security/cve/CVE-2022-50108/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2022-50109 page",
        "url": "https://www.suse.com/security/cve/CVE-2022-50109/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2022-50118 page",
        "url": "https://www.suse.com/security/cve/CVE-2022-50118/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2022-50124 page",
        "url": "https://www.suse.com/security/cve/CVE-2022-50124/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2022-50126 page",
        "url": "https://www.suse.com/security/cve/CVE-2022-50126/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2022-50127 page",
        "url": "https://www.suse.com/security/cve/CVE-2022-50127/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2022-50136 page",
        "url": "https://www.suse.com/security/cve/CVE-2022-50136/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2022-50138 page",
        "url": "https://www.suse.com/security/cve/CVE-2022-50138/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2022-50140 page",
        "url": "https://www.suse.com/security/cve/CVE-2022-50140/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2022-50141 page",
        "url": "https://www.suse.com/security/cve/CVE-2022-50141/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2022-50142 page",
        "url": "https://www.suse.com/security/cve/CVE-2022-50142/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2022-50143 page",
        "url": "https://www.suse.com/security/cve/CVE-2022-50143/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2022-50146 page",
        "url": "https://www.suse.com/security/cve/CVE-2022-50146/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2022-50149 page",
        "url": "https://www.suse.com/security/cve/CVE-2022-50149/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2022-50152 page",
        "url": "https://www.suse.com/security/cve/CVE-2022-50152/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2022-50153 page",
        "url": "https://www.suse.com/security/cve/CVE-2022-50153/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2022-50156 page",
        "url": "https://www.suse.com/security/cve/CVE-2022-50156/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2022-50158 page",
        "url": "https://www.suse.com/security/cve/CVE-2022-50158/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2022-50160 page",
        "url": "https://www.suse.com/security/cve/CVE-2022-50160/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2022-50161 page",
        "url": "https://www.suse.com/security/cve/CVE-2022-50161/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2022-50162 page",
        "url": "https://www.suse.com/security/cve/CVE-2022-50162/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2022-50164 page",
        "url": "https://www.suse.com/security/cve/CVE-2022-50164/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2022-50165 page",
        "url": "https://www.suse.com/security/cve/CVE-2022-50165/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2022-50169 page",
        "url": "https://www.suse.com/security/cve/CVE-2022-50169/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2022-50172 page",
        "url": "https://www.suse.com/security/cve/CVE-2022-50172/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2022-50173 page",
        "url": "https://www.suse.com/security/cve/CVE-2022-50173/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2022-50176 page",
        "url": "https://www.suse.com/security/cve/CVE-2022-50176/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2022-50179 page",
        "url": "https://www.suse.com/security/cve/CVE-2022-50179/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2022-50181 page",
        "url": "https://www.suse.com/security/cve/CVE-2022-50181/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2022-50185 page",
        "url": "https://www.suse.com/security/cve/CVE-2022-50185/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2022-50191 page",
        "url": "https://www.suse.com/security/cve/CVE-2022-50191/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2022-50200 page",
        "url": "https://www.suse.com/security/cve/CVE-2022-50200/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2022-50209 page",
        "url": "https://www.suse.com/security/cve/CVE-2022-50209/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2022-50211 page",
        "url": "https://www.suse.com/security/cve/CVE-2022-50211/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2022-50212 page",
        "url": "https://www.suse.com/security/cve/CVE-2022-50212/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2022-50213 page",
        "url": "https://www.suse.com/security/cve/CVE-2022-50213/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2022-50215 page",
        "url": "https://www.suse.com/security/cve/CVE-2022-50215/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2022-50218 page",
        "url": "https://www.suse.com/security/cve/CVE-2022-50218/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2022-50220 page",
        "url": "https://www.suse.com/security/cve/CVE-2022-50220/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2022-50222 page",
        "url": "https://www.suse.com/security/cve/CVE-2022-50222/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2022-50229 page",
        "url": "https://www.suse.com/security/cve/CVE-2022-50229/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2022-50231 page",
        "url": "https://www.suse.com/security/cve/CVE-2022-50231/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2023-3111 page",
        "url": "https://www.suse.com/security/cve/CVE-2023-3111/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2024-26924 page",
        "url": "https://www.suse.com/security/cve/CVE-2024-26924/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2024-27397 page",
        "url": "https://www.suse.com/security/cve/CVE-2024-27397/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2024-36978 page",
        "url": "https://www.suse.com/security/cve/CVE-2024-36978/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2024-46800 page",
        "url": "https://www.suse.com/security/cve/CVE-2024-46800/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2024-53141 page",
        "url": "https://www.suse.com/security/cve/CVE-2024-53141/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2024-56770 page",
        "url": "https://www.suse.com/security/cve/CVE-2024-56770/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2025-21700 page",
        "url": "https://www.suse.com/security/cve/CVE-2025-21700/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2025-21702 page",
        "url": "https://www.suse.com/security/cve/CVE-2025-21702/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2025-21703 page",
        "url": "https://www.suse.com/security/cve/CVE-2025-21703/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2025-37752 page",
        "url": "https://www.suse.com/security/cve/CVE-2025-37752/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2025-37798 page",
        "url": "https://www.suse.com/security/cve/CVE-2025-37798/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2025-37823 page",
        "url": "https://www.suse.com/security/cve/CVE-2025-37823/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2025-37890 page",
        "url": "https://www.suse.com/security/cve/CVE-2025-37890/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2025-37932 page",
        "url": "https://www.suse.com/security/cve/CVE-2025-37932/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2025-37953 page",
        "url": "https://www.suse.com/security/cve/CVE-2025-37953/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2025-37997 page",
        "url": "https://www.suse.com/security/cve/CVE-2025-37997/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2025-38000 page",
        "url": "https://www.suse.com/security/cve/CVE-2025-38000/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2025-38001 page",
        "url": "https://www.suse.com/security/cve/CVE-2025-38001/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2025-38083 page",
        "url": "https://www.suse.com/security/cve/CVE-2025-38083/"
      }
    ],
    "title": "Security update for the Linux Kernel",
    "tracking": {
      "current_release_date": "2025-07-15T14:20:22Z",
      "generator": {
        "date": "2025-07-15T14:20:22Z",
        "engine": {
          "name": "cve-database.git:bin/generate-csaf.pl",
          "version": "1"
        }
      },
      "id": "SUSE-SU-2025:02320-1",
      "initial_release_date": "2025-07-15T14:20:22Z",
      "revision_history": [
        {
          "date": "2025-07-15T14:20:22Z",
          "number": "1",
          "summary": "Current version"
        }
      ],
      "status": "final",
      "version": "1"
    }
  },
  "product_tree": {
    "branches": [
      {
        "branches": [
          {
            "branches": [
              {
                "category": "product_version",
                "name": "kernel-devel-rt-5.3.18-150300.214.1.noarch",
                "product": {
                  "name": "kernel-devel-rt-5.3.18-150300.214.1.noarch",
                  "product_id": "kernel-devel-rt-5.3.18-150300.214.1.noarch"
                }
              },
              {
                "category": "product_version",
                "name": "kernel-source-rt-5.3.18-150300.214.1.noarch",
                "product": {
                  "name": "kernel-source-rt-5.3.18-150300.214.1.noarch",
                  "product_id": "kernel-source-rt-5.3.18-150300.214.1.noarch"
                }
              }
            ],
            "category": "architecture",
            "name": "noarch"
          },
          {
            "branches": [
              {
                "category": "product_version",
                "name": "cluster-md-kmp-rt-5.3.18-150300.214.1.x86_64",
                "product": {
                  "name": "cluster-md-kmp-rt-5.3.18-150300.214.1.x86_64",
                  "product_id": "cluster-md-kmp-rt-5.3.18-150300.214.1.x86_64"
                }
              },
              {
                "category": "product_version",
                "name": "cluster-md-kmp-rt_debug-5.3.18-150300.214.1.x86_64",
                "product": {
                  "name": "cluster-md-kmp-rt_debug-5.3.18-150300.214.1.x86_64",
                  "product_id": "cluster-md-kmp-rt_debug-5.3.18-150300.214.1.x86_64"
                }
              },
              {
                "category": "product_version",
                "name": "dlm-kmp-rt-5.3.18-150300.214.1.x86_64",
                "product": {
                  "name": "dlm-kmp-rt-5.3.18-150300.214.1.x86_64",
                  "product_id": "dlm-kmp-rt-5.3.18-150300.214.1.x86_64"
                }
              },
              {
                "category": "product_version",
                "name": "dlm-kmp-rt_debug-5.3.18-150300.214.1.x86_64",
                "product": {
                  "name": "dlm-kmp-rt_debug-5.3.18-150300.214.1.x86_64",
                  "product_id": "dlm-kmp-rt_debug-5.3.18-150300.214.1.x86_64"
                }
              },
              {
                "category": "product_version",
                "name": "gfs2-kmp-rt-5.3.18-150300.214.1.x86_64",
                "product": {
                  "name": "gfs2-kmp-rt-5.3.18-150300.214.1.x86_64",
                  "product_id": "gfs2-kmp-rt-5.3.18-150300.214.1.x86_64"
                }
              },
              {
                "category": "product_version",
                "name": "gfs2-kmp-rt_debug-5.3.18-150300.214.1.x86_64",
                "product": {
                  "name": "gfs2-kmp-rt_debug-5.3.18-150300.214.1.x86_64",
                  "product_id": "gfs2-kmp-rt_debug-5.3.18-150300.214.1.x86_64"
                }
              },
              {
                "category": "product_version",
                "name": "kernel-rt-5.3.18-150300.214.1.x86_64",
                "product": {
                  "name": "kernel-rt-5.3.18-150300.214.1.x86_64",
                  "product_id": "kernel-rt-5.3.18-150300.214.1.x86_64"
                }
              },
              {
                "category": "product_version",
                "name": "kernel-rt-devel-5.3.18-150300.214.1.x86_64",
                "product": {
                  "name": "kernel-rt-devel-5.3.18-150300.214.1.x86_64",
                  "product_id": "kernel-rt-devel-5.3.18-150300.214.1.x86_64"
                }
              },
              {
                "category": "product_version",
                "name": "kernel-rt-extra-5.3.18-150300.214.1.x86_64",
                "product": {
                  "name": "kernel-rt-extra-5.3.18-150300.214.1.x86_64",
                  "product_id": "kernel-rt-extra-5.3.18-150300.214.1.x86_64"
                }
              },
              {
                "category": "product_version",
                "name": "kernel-rt-livepatch-devel-5.3.18-150300.214.1.x86_64",
                "product": {
                  "name": "kernel-rt-livepatch-devel-5.3.18-150300.214.1.x86_64",
                  "product_id": "kernel-rt-livepatch-devel-5.3.18-150300.214.1.x86_64"
                }
              },
              {
                "category": "product_version",
                "name": "kernel-rt-optional-5.3.18-150300.214.1.x86_64",
                "product": {
                  "name": "kernel-rt-optional-5.3.18-150300.214.1.x86_64",
                  "product_id": "kernel-rt-optional-5.3.18-150300.214.1.x86_64"
                }
              },
              {
                "category": "product_version",
                "name": "kernel-rt_debug-5.3.18-150300.214.1.x86_64",
                "product": {
                  "name": "kernel-rt_debug-5.3.18-150300.214.1.x86_64",
                  "product_id": "kernel-rt_debug-5.3.18-150300.214.1.x86_64"
                }
              },
              {
                "category": "product_version",
                "name": "kernel-rt_debug-devel-5.3.18-150300.214.1.x86_64",
                "product": {
                  "name": "kernel-rt_debug-devel-5.3.18-150300.214.1.x86_64",
                  "product_id": "kernel-rt_debug-devel-5.3.18-150300.214.1.x86_64"
                }
              },
              {
                "category": "product_version",
                "name": "kernel-rt_debug-extra-5.3.18-150300.214.1.x86_64",
                "product": {
                  "name": "kernel-rt_debug-extra-5.3.18-150300.214.1.x86_64",
                  "product_id": "kernel-rt_debug-extra-5.3.18-150300.214.1.x86_64"
                }
              },
              {
                "category": "product_version",
                "name": "kernel-rt_debug-livepatch-devel-5.3.18-150300.214.1.x86_64",
                "product": {
                  "name": "kernel-rt_debug-livepatch-devel-5.3.18-150300.214.1.x86_64",
                  "product_id": "kernel-rt_debug-livepatch-devel-5.3.18-150300.214.1.x86_64"
                }
              },
              {
                "category": "product_version",
                "name": "kernel-rt_debug-optional-5.3.18-150300.214.1.x86_64",
                "product": {
                  "name": "kernel-rt_debug-optional-5.3.18-150300.214.1.x86_64",
                  "product_id": "kernel-rt_debug-optional-5.3.18-150300.214.1.x86_64"
                }
              },
              {
                "category": "product_version",
                "name": "kselftests-kmp-rt-5.3.18-150300.214.1.x86_64",
                "product": {
                  "name": "kselftests-kmp-rt-5.3.18-150300.214.1.x86_64",
                  "product_id": "kselftests-kmp-rt-5.3.18-150300.214.1.x86_64"
                }
              },
              {
                "category": "product_version",
                "name": "kselftests-kmp-rt_debug-5.3.18-150300.214.1.x86_64",
                "product": {
                  "name": "kselftests-kmp-rt_debug-5.3.18-150300.214.1.x86_64",
                  "product_id": "kselftests-kmp-rt_debug-5.3.18-150300.214.1.x86_64"
                }
              },
              {
                "category": "product_version",
                "name": "ocfs2-kmp-rt-5.3.18-150300.214.1.x86_64",
                "product": {
                  "name": "ocfs2-kmp-rt-5.3.18-150300.214.1.x86_64",
                  "product_id": "ocfs2-kmp-rt-5.3.18-150300.214.1.x86_64"
                }
              },
              {
                "category": "product_version",
                "name": "ocfs2-kmp-rt_debug-5.3.18-150300.214.1.x86_64",
                "product": {
                  "name": "ocfs2-kmp-rt_debug-5.3.18-150300.214.1.x86_64",
                  "product_id": "ocfs2-kmp-rt_debug-5.3.18-150300.214.1.x86_64"
                }
              },
              {
                "category": "product_version",
                "name": "reiserfs-kmp-rt-5.3.18-150300.214.1.x86_64",
                "product": {
                  "name": "reiserfs-kmp-rt-5.3.18-150300.214.1.x86_64",
                  "product_id": "reiserfs-kmp-rt-5.3.18-150300.214.1.x86_64"
                }
              },
              {
                "category": "product_version",
                "name": "reiserfs-kmp-rt_debug-5.3.18-150300.214.1.x86_64",
                "product": {
                  "name": "reiserfs-kmp-rt_debug-5.3.18-150300.214.1.x86_64",
                  "product_id": "reiserfs-kmp-rt_debug-5.3.18-150300.214.1.x86_64"
                }
              }
            ],
            "category": "architecture",
            "name": "x86_64"
          },
          {
            "branches": [
              {
                "category": "product_name",
                "name": "SUSE Linux Enterprise Micro 5.1",
                "product": {
                  "name": "SUSE Linux Enterprise Micro 5.1",
                  "product_id": "SUSE Linux Enterprise Micro 5.1",
                  "product_identification_helper": {
                    "cpe": "cpe:/o:suse:suse-microos:5.1"
                  }
                }
              },
              {
                "category": "product_name",
                "name": "SUSE Linux Enterprise Micro 5.2",
                "product": {
                  "name": "SUSE Linux Enterprise Micro 5.2",
                  "product_id": "SUSE Linux Enterprise Micro 5.2",
                  "product_identification_helper": {
                    "cpe": "cpe:/o:suse:suse-microos:5.2"
                  }
                }
              }
            ],
            "category": "product_family",
            "name": "SUSE Linux Enterprise"
          }
        ],
        "category": "vendor",
        "name": "SUSE"
      }
    ],
    "relationships": [
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-rt-5.3.18-150300.214.1.x86_64 as component of SUSE Linux Enterprise Micro 5.1",
          "product_id": "SUSE Linux Enterprise Micro 5.1:kernel-rt-5.3.18-150300.214.1.x86_64"
        },
        "product_reference": "kernel-rt-5.3.18-150300.214.1.x86_64",
        "relates_to_product_reference": "SUSE Linux Enterprise Micro 5.1"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-source-rt-5.3.18-150300.214.1.noarch as component of SUSE Linux Enterprise Micro 5.1",
          "product_id": "SUSE Linux Enterprise Micro 5.1:kernel-source-rt-5.3.18-150300.214.1.noarch"
        },
        "product_reference": "kernel-source-rt-5.3.18-150300.214.1.noarch",
        "relates_to_product_reference": "SUSE Linux Enterprise Micro 5.1"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-rt-5.3.18-150300.214.1.x86_64 as component of SUSE Linux Enterprise Micro 5.2",
          "product_id": "SUSE Linux Enterprise Micro 5.2:kernel-rt-5.3.18-150300.214.1.x86_64"
        },
        "product_reference": "kernel-rt-5.3.18-150300.214.1.x86_64",
        "relates_to_product_reference": "SUSE Linux Enterprise Micro 5.2"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-source-rt-5.3.18-150300.214.1.noarch as component of SUSE Linux Enterprise Micro 5.2",
          "product_id": "SUSE Linux Enterprise Micro 5.2:kernel-source-rt-5.3.18-150300.214.1.noarch"
        },
        "product_reference": "kernel-source-rt-5.3.18-150300.214.1.noarch",
        "relates_to_product_reference": "SUSE Linux Enterprise Micro 5.2"
      }
    ]
  },
  "vulnerabilities": [
    {
      "cve": "CVE-2022-1679",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2022-1679"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "A use-after-free flaw was found in the Linux kernel\u0027s Atheros wireless adapter driver in the way a user forces the ath9k_htc_wait_for_target function to fail with some input messages. This flaw allows a local user to crash or potentially escalate their privileges on the system.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "SUSE Linux Enterprise Micro 5.1:kernel-rt-5.3.18-150300.214.1.x86_64",
          "SUSE Linux Enterprise Micro 5.1:kernel-source-rt-5.3.18-150300.214.1.noarch",
          "SUSE Linux Enterprise Micro 5.2:kernel-rt-5.3.18-150300.214.1.x86_64",
          "SUSE Linux Enterprise Micro 5.2:kernel-source-rt-5.3.18-150300.214.1.noarch"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2022-1679",
          "url": "https://www.suse.com/security/cve/CVE-2022-1679"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1199487 for CVE-2022-1679",
          "url": "https://bugzilla.suse.com/1199487"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1201080 for CVE-2022-1679",
          "url": "https://bugzilla.suse.com/1201080"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1201832 for CVE-2022-1679",
          "url": "https://bugzilla.suse.com/1201832"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1204132 for CVE-2022-1679",
          "url": "https://bugzilla.suse.com/1204132"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1212316 for CVE-2022-1679",
          "url": "https://bugzilla.suse.com/1212316"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "SUSE Linux Enterprise Micro 5.1:kernel-rt-5.3.18-150300.214.1.x86_64",
            "SUSE Linux Enterprise Micro 5.1:kernel-source-rt-5.3.18-150300.214.1.noarch",
            "SUSE Linux Enterprise Micro 5.2:kernel-rt-5.3.18-150300.214.1.x86_64",
            "SUSE Linux Enterprise Micro 5.2:kernel-source-rt-5.3.18-150300.214.1.noarch"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 7,
            "baseSeverity": "HIGH",
            "vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H",
            "version": "3.1"
          },
          "products": [
            "SUSE Linux Enterprise Micro 5.1:kernel-rt-5.3.18-150300.214.1.x86_64",
            "SUSE Linux Enterprise Micro 5.1:kernel-source-rt-5.3.18-150300.214.1.noarch",
            "SUSE Linux Enterprise Micro 5.2:kernel-rt-5.3.18-150300.214.1.x86_64",
            "SUSE Linux Enterprise Micro 5.2:kernel-source-rt-5.3.18-150300.214.1.noarch"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2025-07-15T14:20:22Z",
          "details": "moderate"
        }
      ],
      "title": "CVE-2022-1679"
    },
    {
      "cve": "CVE-2022-2586",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2022-2586"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "It was discovered that a nft object or expression could reference a nft set on a different nft table, leading to a use-after-free once that table was deleted.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "SUSE Linux Enterprise Micro 5.1:kernel-rt-5.3.18-150300.214.1.x86_64",
          "SUSE Linux Enterprise Micro 5.1:kernel-source-rt-5.3.18-150300.214.1.noarch",
          "SUSE Linux Enterprise Micro 5.2:kernel-rt-5.3.18-150300.214.1.x86_64",
          "SUSE Linux Enterprise Micro 5.2:kernel-source-rt-5.3.18-150300.214.1.noarch"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2022-2586",
          "url": "https://www.suse.com/security/cve/CVE-2022-2586"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1202095 for CVE-2022-2586",
          "url": "https://bugzilla.suse.com/1202095"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1209719 for CVE-2022-2586",
          "url": "https://bugzilla.suse.com/1209719"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "SUSE Linux Enterprise Micro 5.1:kernel-rt-5.3.18-150300.214.1.x86_64",
            "SUSE Linux Enterprise Micro 5.1:kernel-source-rt-5.3.18-150300.214.1.noarch",
            "SUSE Linux Enterprise Micro 5.2:kernel-rt-5.3.18-150300.214.1.x86_64",
            "SUSE Linux Enterprise Micro 5.2:kernel-source-rt-5.3.18-150300.214.1.noarch"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 6.7,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H",
            "version": "3.1"
          },
          "products": [
            "SUSE Linux Enterprise Micro 5.1:kernel-rt-5.3.18-150300.214.1.x86_64",
            "SUSE Linux Enterprise Micro 5.1:kernel-source-rt-5.3.18-150300.214.1.noarch",
            "SUSE Linux Enterprise Micro 5.2:kernel-rt-5.3.18-150300.214.1.x86_64",
            "SUSE Linux Enterprise Micro 5.2:kernel-source-rt-5.3.18-150300.214.1.noarch"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2025-07-15T14:20:22Z",
          "details": "moderate"
        }
      ],
      "title": "CVE-2022-2586"
    },
    {
      "cve": "CVE-2022-2905",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2022-2905"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "An out-of-bounds memory read flaw was found in the Linux kernel\u0027s BPF subsystem in how a user calls the bpf_tail_call function with a key larger than the max_entries of the map. This flaw allows a local user to gain unauthorized access to data.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "SUSE Linux Enterprise Micro 5.1:kernel-rt-5.3.18-150300.214.1.x86_64",
          "SUSE Linux Enterprise Micro 5.1:kernel-source-rt-5.3.18-150300.214.1.noarch",
          "SUSE Linux Enterprise Micro 5.2:kernel-rt-5.3.18-150300.214.1.x86_64",
          "SUSE Linux Enterprise Micro 5.2:kernel-source-rt-5.3.18-150300.214.1.noarch"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2022-2905",
          "url": "https://www.suse.com/security/cve/CVE-2022-2905"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1202860 for CVE-2022-2905",
          "url": "https://bugzilla.suse.com/1202860"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "SUSE Linux Enterprise Micro 5.1:kernel-rt-5.3.18-150300.214.1.x86_64",
            "SUSE Linux Enterprise Micro 5.1:kernel-source-rt-5.3.18-150300.214.1.noarch",
            "SUSE Linux Enterprise Micro 5.2:kernel-rt-5.3.18-150300.214.1.x86_64",
            "SUSE Linux Enterprise Micro 5.2:kernel-source-rt-5.3.18-150300.214.1.noarch"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 6.2,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N",
            "version": "3.1"
          },
          "products": [
            "SUSE Linux Enterprise Micro 5.1:kernel-rt-5.3.18-150300.214.1.x86_64",
            "SUSE Linux Enterprise Micro 5.1:kernel-source-rt-5.3.18-150300.214.1.noarch",
            "SUSE Linux Enterprise Micro 5.2:kernel-rt-5.3.18-150300.214.1.x86_64",
            "SUSE Linux Enterprise Micro 5.2:kernel-source-rt-5.3.18-150300.214.1.noarch"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2025-07-15T14:20:22Z",
          "details": "moderate"
        }
      ],
      "title": "CVE-2022-2905"
    },
    {
      "cve": "CVE-2022-3903",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2022-3903"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "An incorrect read request flaw was found in the Infrared Transceiver USB driver in the Linux kernel. This issue occurs when a user attaches a malicious USB device. A local user could use this flaw to starve the resources, causing denial of service or potentially crashing the system.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "SUSE Linux Enterprise Micro 5.1:kernel-rt-5.3.18-150300.214.1.x86_64",
          "SUSE Linux Enterprise Micro 5.1:kernel-source-rt-5.3.18-150300.214.1.noarch",
          "SUSE Linux Enterprise Micro 5.2:kernel-rt-5.3.18-150300.214.1.x86_64",
          "SUSE Linux Enterprise Micro 5.2:kernel-source-rt-5.3.18-150300.214.1.noarch"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2022-3903",
          "url": "https://www.suse.com/security/cve/CVE-2022-3903"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1205220 for CVE-2022-3903",
          "url": "https://bugzilla.suse.com/1205220"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1212297 for CVE-2022-3903",
          "url": "https://bugzilla.suse.com/1212297"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "SUSE Linux Enterprise Micro 5.1:kernel-rt-5.3.18-150300.214.1.x86_64",
            "SUSE Linux Enterprise Micro 5.1:kernel-source-rt-5.3.18-150300.214.1.noarch",
            "SUSE Linux Enterprise Micro 5.2:kernel-rt-5.3.18-150300.214.1.x86_64",
            "SUSE Linux Enterprise Micro 5.2:kernel-source-rt-5.3.18-150300.214.1.noarch"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 5.5,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
            "version": "3.1"
          },
          "products": [
            "SUSE Linux Enterprise Micro 5.1:kernel-rt-5.3.18-150300.214.1.x86_64",
            "SUSE Linux Enterprise Micro 5.1:kernel-source-rt-5.3.18-150300.214.1.noarch",
            "SUSE Linux Enterprise Micro 5.2:kernel-rt-5.3.18-150300.214.1.x86_64",
            "SUSE Linux Enterprise Micro 5.2:kernel-source-rt-5.3.18-150300.214.1.noarch"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2025-07-15T14:20:22Z",
          "details": "moderate"
        }
      ],
      "title": "CVE-2022-3903"
    },
    {
      "cve": "CVE-2022-4095",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2022-4095"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "A use-after-free flaw was found in Linux kernel before 5.19.2. This issue occurs in cmd_hdl_filter in drivers/staging/rtl8712/rtl8712_cmd.c, allowing an attacker to launch a local denial of service attack and gain escalation of privileges.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "SUSE Linux Enterprise Micro 5.1:kernel-rt-5.3.18-150300.214.1.x86_64",
          "SUSE Linux Enterprise Micro 5.1:kernel-source-rt-5.3.18-150300.214.1.noarch",
          "SUSE Linux Enterprise Micro 5.2:kernel-rt-5.3.18-150300.214.1.x86_64",
          "SUSE Linux Enterprise Micro 5.2:kernel-source-rt-5.3.18-150300.214.1.noarch"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2022-4095",
          "url": "https://www.suse.com/security/cve/CVE-2022-4095"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1205514 for CVE-2022-4095",
          "url": "https://bugzilla.suse.com/1205514"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1205594 for CVE-2022-4095",
          "url": "https://bugzilla.suse.com/1205594"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1208030 for CVE-2022-4095",
          "url": "https://bugzilla.suse.com/1208030"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1208085 for CVE-2022-4095",
          "url": "https://bugzilla.suse.com/1208085"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1212319 for CVE-2022-4095",
          "url": "https://bugzilla.suse.com/1212319"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "SUSE Linux Enterprise Micro 5.1:kernel-rt-5.3.18-150300.214.1.x86_64",
            "SUSE Linux Enterprise Micro 5.1:kernel-source-rt-5.3.18-150300.214.1.noarch",
            "SUSE Linux Enterprise Micro 5.2:kernel-rt-5.3.18-150300.214.1.x86_64",
            "SUSE Linux Enterprise Micro 5.2:kernel-source-rt-5.3.18-150300.214.1.noarch"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 7.8,
            "baseSeverity": "HIGH",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
            "version": "3.1"
          },
          "products": [
            "SUSE Linux Enterprise Micro 5.1:kernel-rt-5.3.18-150300.214.1.x86_64",
            "SUSE Linux Enterprise Micro 5.1:kernel-source-rt-5.3.18-150300.214.1.noarch",
            "SUSE Linux Enterprise Micro 5.2:kernel-rt-5.3.18-150300.214.1.x86_64",
            "SUSE Linux Enterprise Micro 5.2:kernel-source-rt-5.3.18-150300.214.1.noarch"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2025-07-15T14:20:22Z",
          "details": "important"
        }
      ],
      "title": "CVE-2022-4095"
    },
    {
      "cve": "CVE-2022-4662",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2022-4662"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "A flaw incorrect access control in the Linux kernel USB core subsystem was found in the way user attaches usb device. A local user could use this flaw to crash the system.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "SUSE Linux Enterprise Micro 5.1:kernel-rt-5.3.18-150300.214.1.x86_64",
          "SUSE Linux Enterprise Micro 5.1:kernel-source-rt-5.3.18-150300.214.1.noarch",
          "SUSE Linux Enterprise Micro 5.2:kernel-rt-5.3.18-150300.214.1.x86_64",
          "SUSE Linux Enterprise Micro 5.2:kernel-source-rt-5.3.18-150300.214.1.noarch"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2022-4662",
          "url": "https://www.suse.com/security/cve/CVE-2022-4662"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1206664 for CVE-2022-4662",
          "url": "https://bugzilla.suse.com/1206664"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "SUSE Linux Enterprise Micro 5.1:kernel-rt-5.3.18-150300.214.1.x86_64",
            "SUSE Linux Enterprise Micro 5.1:kernel-source-rt-5.3.18-150300.214.1.noarch",
            "SUSE Linux Enterprise Micro 5.2:kernel-rt-5.3.18-150300.214.1.x86_64",
            "SUSE Linux Enterprise Micro 5.2:kernel-source-rt-5.3.18-150300.214.1.noarch"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 4.7,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H",
            "version": "3.1"
          },
          "products": [
            "SUSE Linux Enterprise Micro 5.1:kernel-rt-5.3.18-150300.214.1.x86_64",
            "SUSE Linux Enterprise Micro 5.1:kernel-source-rt-5.3.18-150300.214.1.noarch",
            "SUSE Linux Enterprise Micro 5.2:kernel-rt-5.3.18-150300.214.1.x86_64",
            "SUSE Linux Enterprise Micro 5.2:kernel-source-rt-5.3.18-150300.214.1.noarch"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2025-07-15T14:20:22Z",
          "details": "moderate"
        }
      ],
      "title": "CVE-2022-4662"
    },
    {
      "cve": "CVE-2022-49934",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2022-49934"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "In the Linux kernel, the following vulnerability has been resolved:\n\nwifi: mac80211: Fix UAF in ieee80211_scan_rx()\n\nieee80211_scan_rx() tries to access scan_req-\u003eflags after a\nnull check, but a UAF is observed when the scan is completed\nand __ieee80211_scan_completed() executes, which then calls\ncfg80211_scan_done() leading to the freeing of scan_req.\n\nSince scan_req is rcu_dereference()\u0027d, prevent the racing in\n__ieee80211_scan_completed() by ensuring that from mac80211\u0027s\nPOV it is no longer accessed from an RCU read critical section\nbefore we call cfg80211_scan_done().",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "SUSE Linux Enterprise Micro 5.1:kernel-rt-5.3.18-150300.214.1.x86_64",
          "SUSE Linux Enterprise Micro 5.1:kernel-source-rt-5.3.18-150300.214.1.noarch",
          "SUSE Linux Enterprise Micro 5.2:kernel-rt-5.3.18-150300.214.1.x86_64",
          "SUSE Linux Enterprise Micro 5.2:kernel-source-rt-5.3.18-150300.214.1.noarch"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2022-49934",
          "url": "https://www.suse.com/security/cve/CVE-2022-49934"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1245051 for CVE-2022-49934",
          "url": "https://bugzilla.suse.com/1245051"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "SUSE Linux Enterprise Micro 5.1:kernel-rt-5.3.18-150300.214.1.x86_64",
            "SUSE Linux Enterprise Micro 5.1:kernel-source-rt-5.3.18-150300.214.1.noarch",
            "SUSE Linux Enterprise Micro 5.2:kernel-rt-5.3.18-150300.214.1.x86_64",
            "SUSE Linux Enterprise Micro 5.2:kernel-source-rt-5.3.18-150300.214.1.noarch"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 4.7,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H",
            "version": "3.1"
          },
          "products": [
            "SUSE Linux Enterprise Micro 5.1:kernel-rt-5.3.18-150300.214.1.x86_64",
            "SUSE Linux Enterprise Micro 5.1:kernel-source-rt-5.3.18-150300.214.1.noarch",
            "SUSE Linux Enterprise Micro 5.2:kernel-rt-5.3.18-150300.214.1.x86_64",
            "SUSE Linux Enterprise Micro 5.2:kernel-source-rt-5.3.18-150300.214.1.noarch"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2025-07-15T14:20:22Z",
          "details": "moderate"
        }
      ],
      "title": "CVE-2022-49934"
    },
    {
      "cve": "CVE-2022-49936",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2022-49936"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "In the Linux kernel, the following vulnerability has been resolved:\n\nUSB: core: Prevent nested device-reset calls\n\nAutomatic kernel fuzzing revealed a recursive locking violation in\nusb-storage:\n\n============================================\nWARNING: possible recursive locking detected\n5.18.0 #3 Not tainted\n--------------------------------------------\nkworker/1:3/1205 is trying to acquire lock:\nffff888018638db8 (\u0026us_interface_key[i]){+.+.}-{3:3}, at:\nusb_stor_pre_reset+0x35/0x40 drivers/usb/storage/usb.c:230\n\nbut task is already holding lock:\nffff888018638db8 (\u0026us_interface_key[i]){+.+.}-{3:3}, at:\nusb_stor_pre_reset+0x35/0x40 drivers/usb/storage/usb.c:230\n\n...\n\nstack backtrace:\nCPU: 1 PID: 1205 Comm: kworker/1:3 Not tainted 5.18.0 #3\nHardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS\n1.13.0-1ubuntu1.1 04/01/2014\nWorkqueue: usb_hub_wq hub_event\nCall Trace:\n\u003cTASK\u003e\n__dump_stack lib/dump_stack.c:88 [inline]\ndump_stack_lvl+0xcd/0x134 lib/dump_stack.c:106\nprint_deadlock_bug kernel/locking/lockdep.c:2988 [inline]\ncheck_deadlock kernel/locking/lockdep.c:3031 [inline]\nvalidate_chain kernel/locking/lockdep.c:3816 [inline]\n__lock_acquire.cold+0x152/0x3ca kernel/locking/lockdep.c:5053\nlock_acquire kernel/locking/lockdep.c:5665 [inline]\nlock_acquire+0x1ab/0x520 kernel/locking/lockdep.c:5630\n__mutex_lock_common kernel/locking/mutex.c:603 [inline]\n__mutex_lock+0x14f/0x1610 kernel/locking/mutex.c:747\nusb_stor_pre_reset+0x35/0x40 drivers/usb/storage/usb.c:230\nusb_reset_device+0x37d/0x9a0 drivers/usb/core/hub.c:6109\nr871xu_dev_remove+0x21a/0x270 drivers/staging/rtl8712/usb_intf.c:622\nusb_unbind_interface+0x1bd/0x890 drivers/usb/core/driver.c:458\ndevice_remove drivers/base/dd.c:545 [inline]\ndevice_remove+0x11f/0x170 drivers/base/dd.c:537\n__device_release_driver drivers/base/dd.c:1222 [inline]\ndevice_release_driver_internal+0x1a7/0x2f0 drivers/base/dd.c:1248\nusb_driver_release_interface+0x102/0x180 drivers/usb/core/driver.c:627\nusb_forced_unbind_intf+0x4d/0xa0 drivers/usb/core/driver.c:1118\nusb_reset_device+0x39b/0x9a0 drivers/usb/core/hub.c:6114\n\nThis turned out not to be an error in usb-storage but rather a nested\ndevice reset attempt.  That is, as the rtl8712 driver was being\nunbound from a composite device in preparation for an unrelated USB\nreset (that driver does not have pre_reset or post_reset callbacks),\nits -\u003eremove routine called usb_reset_device() -- thus nesting one\nreset call within another.\n\nPerforming a reset as part of disconnect processing is a questionable\npractice at best.  However, the bug report points out that the USB\ncore does not have any protection against nested resets.  Adding a\nreset_in_progress flag and testing it will prevent such errors in the\nfuture.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "SUSE Linux Enterprise Micro 5.1:kernel-rt-5.3.18-150300.214.1.x86_64",
          "SUSE Linux Enterprise Micro 5.1:kernel-source-rt-5.3.18-150300.214.1.noarch",
          "SUSE Linux Enterprise Micro 5.2:kernel-rt-5.3.18-150300.214.1.x86_64",
          "SUSE Linux Enterprise Micro 5.2:kernel-source-rt-5.3.18-150300.214.1.noarch"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2022-49936",
          "url": "https://www.suse.com/security/cve/CVE-2022-49936"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1244984 for CVE-2022-49936",
          "url": "https://bugzilla.suse.com/1244984"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "SUSE Linux Enterprise Micro 5.1:kernel-rt-5.3.18-150300.214.1.x86_64",
            "SUSE Linux Enterprise Micro 5.1:kernel-source-rt-5.3.18-150300.214.1.noarch",
            "SUSE Linux Enterprise Micro 5.2:kernel-rt-5.3.18-150300.214.1.x86_64",
            "SUSE Linux Enterprise Micro 5.2:kernel-source-rt-5.3.18-150300.214.1.noarch"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 5.5,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
            "version": "3.1"
          },
          "products": [
            "SUSE Linux Enterprise Micro 5.1:kernel-rt-5.3.18-150300.214.1.x86_64",
            "SUSE Linux Enterprise Micro 5.1:kernel-source-rt-5.3.18-150300.214.1.noarch",
            "SUSE Linux Enterprise Micro 5.2:kernel-rt-5.3.18-150300.214.1.x86_64",
            "SUSE Linux Enterprise Micro 5.2:kernel-source-rt-5.3.18-150300.214.1.noarch"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2025-07-15T14:20:22Z",
          "details": "moderate"
        }
      ],
      "title": "CVE-2022-49936"
    },
    {
      "cve": "CVE-2022-49937",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2022-49937"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "In the Linux kernel, the following vulnerability has been resolved:\n\nmedia: mceusb: Use new usb_control_msg_*() routines\n\nAutomatic kernel fuzzing led to a WARN about invalid pipe direction in\nthe mceusb driver:\n\n------------[ cut here ]------------\nusb 6-1: BOGUS control dir, pipe 80000380 doesn\u0027t match bRequestType 40\nWARNING: CPU: 0 PID: 2465 at drivers/usb/core/urb.c:410\nusb_submit_urb+0x1326/0x1820 drivers/usb/core/urb.c:410\nModules linked in:\nCPU: 0 PID: 2465 Comm: kworker/0:2 Not tainted 5.19.0-rc4-00208-g69cb6c6556ad #1\nHardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS\n1.13.0-1ubuntu1.1 04/01/2014\nWorkqueue: usb_hub_wq hub_event\nRIP: 0010:usb_submit_urb+0x1326/0x1820 drivers/usb/core/urb.c:410\nCode: 7c 24 40 e8 ac 23 91 fd 48 8b 7c 24 40 e8 b2 70 1b ff 45 89 e8\n44 89 f1 4c 89 e2 48 89 c6 48 c7 c7 a0 30 a9 86 e8 48 07 11 02 \u003c0f\u003e 0b\ne9 1c f0 ff ff e8 7e 23 91 fd 0f b6 1d 63 22 83 05 31 ff 41\nRSP: 0018:ffffc900032becf0 EFLAGS: 00010282\nRAX: 0000000000000000 RBX: ffff8881100f3058 RCX: 0000000000000000\nRDX: ffffc90004961000 RSI: ffff888114c6d580 RDI: fffff52000657d90\nRBP: ffff888105ad90f0 R08: ffffffff812c3638 R09: 0000000000000000\nR10: 0000000000000005 R11: ffffed1023504ef1 R12: ffff888105ad9000\nR13: 0000000000000040 R14: 0000000080000380 R15: ffff88810ba96500\nFS: 0000000000000000(0000) GS:ffff88811a800000(0000) knlGS:0000000000000000\nCS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033\nCR2: 00007ffe810bda58 CR3: 000000010b720000 CR4: 0000000000350ef0\nCall Trace:\n\u003cTASK\u003e\nusb_start_wait_urb+0x101/0x4c0 drivers/usb/core/message.c:58\nusb_internal_control_msg drivers/usb/core/message.c:102 [inline]\nusb_control_msg+0x31c/0x4a0 drivers/usb/core/message.c:153\nmceusb_gen1_init drivers/media/rc/mceusb.c:1431 [inline]\nmceusb_dev_probe+0x258e/0x33f0 drivers/media/rc/mceusb.c:1807\n\nThe reason for the warning is clear enough; the driver sends an\nunusual read request on endpoint 0 but does not set the USB_DIR_IN bit\nin the bRequestType field.\n\nMore importantly, the whole situation can be avoided and the driver\nsimplified by converting it over to the relatively new\nusb_control_msg_recv() and usb_control_msg_send() routines.  That\u0027s\nwhat this fix does.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "SUSE Linux Enterprise Micro 5.1:kernel-rt-5.3.18-150300.214.1.x86_64",
          "SUSE Linux Enterprise Micro 5.1:kernel-source-rt-5.3.18-150300.214.1.noarch",
          "SUSE Linux Enterprise Micro 5.2:kernel-rt-5.3.18-150300.214.1.x86_64",
          "SUSE Linux Enterprise Micro 5.2:kernel-source-rt-5.3.18-150300.214.1.noarch"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2022-49937",
          "url": "https://www.suse.com/security/cve/CVE-2022-49937"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1245057 for CVE-2022-49937",
          "url": "https://bugzilla.suse.com/1245057"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "SUSE Linux Enterprise Micro 5.1:kernel-rt-5.3.18-150300.214.1.x86_64",
            "SUSE Linux Enterprise Micro 5.1:kernel-source-rt-5.3.18-150300.214.1.noarch",
            "SUSE Linux Enterprise Micro 5.2:kernel-rt-5.3.18-150300.214.1.x86_64",
            "SUSE Linux Enterprise Micro 5.2:kernel-source-rt-5.3.18-150300.214.1.noarch"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 4,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L",
            "version": "3.1"
          },
          "products": [
            "SUSE Linux Enterprise Micro 5.1:kernel-rt-5.3.18-150300.214.1.x86_64",
            "SUSE Linux Enterprise Micro 5.1:kernel-source-rt-5.3.18-150300.214.1.noarch",
            "SUSE Linux Enterprise Micro 5.2:kernel-rt-5.3.18-150300.214.1.x86_64",
            "SUSE Linux Enterprise Micro 5.2:kernel-source-rt-5.3.18-150300.214.1.noarch"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2025-07-15T14:20:22Z",
          "details": "moderate"
        }
      ],
      "title": "CVE-2022-49937"
    },
    {
      "cve": "CVE-2022-49942",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2022-49942"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "In the Linux kernel, the following vulnerability has been resolved:\n\nwifi: mac80211: Don\u0027t finalize CSA in IBSS mode if state is disconnected\n\nWhen we are not connected to a channel, sending channel \"switch\"\nannouncement doesn\u0027t make any sense.\n\nThe BSS list is empty in that case. This causes the for loop in\ncfg80211_get_bss() to be bypassed, so the function returns NULL\n(check line 1424 of net/wireless/scan.c), causing the WARN_ON()\nin ieee80211_ibss_csa_beacon() to get triggered (check line 500\nof net/mac80211/ibss.c), which was consequently reported on the\nsyzkaller dashboard.\n\nThus, check if we have an existing connection before generating\nthe CSA beacon in ieee80211_ibss_finish_csa().",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "SUSE Linux Enterprise Micro 5.1:kernel-rt-5.3.18-150300.214.1.x86_64",
          "SUSE Linux Enterprise Micro 5.1:kernel-source-rt-5.3.18-150300.214.1.noarch",
          "SUSE Linux Enterprise Micro 5.2:kernel-rt-5.3.18-150300.214.1.x86_64",
          "SUSE Linux Enterprise Micro 5.2:kernel-source-rt-5.3.18-150300.214.1.noarch"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2022-49942",
          "url": "https://www.suse.com/security/cve/CVE-2022-49942"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1244881 for CVE-2022-49942",
          "url": "https://bugzilla.suse.com/1244881"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "SUSE Linux Enterprise Micro 5.1:kernel-rt-5.3.18-150300.214.1.x86_64",
            "SUSE Linux Enterprise Micro 5.1:kernel-source-rt-5.3.18-150300.214.1.noarch",
            "SUSE Linux Enterprise Micro 5.2:kernel-rt-5.3.18-150300.214.1.x86_64",
            "SUSE Linux Enterprise Micro 5.2:kernel-source-rt-5.3.18-150300.214.1.noarch"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 5.5,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
            "version": "3.1"
          },
          "products": [
            "SUSE Linux Enterprise Micro 5.1:kernel-rt-5.3.18-150300.214.1.x86_64",
            "SUSE Linux Enterprise Micro 5.1:kernel-source-rt-5.3.18-150300.214.1.noarch",
            "SUSE Linux Enterprise Micro 5.2:kernel-rt-5.3.18-150300.214.1.x86_64",
            "SUSE Linux Enterprise Micro 5.2:kernel-source-rt-5.3.18-150300.214.1.noarch"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2025-07-15T14:20:22Z",
          "details": "moderate"
        }
      ],
      "title": "CVE-2022-49942"
    },
    {
      "cve": "CVE-2022-49945",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2022-49945"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "In the Linux kernel, the following vulnerability has been resolved:\n\nhwmon: (gpio-fan) Fix array out of bounds access\n\nThe driver does not check if the cooling state passed to\ngpio_fan_set_cur_state() exceeds the maximum cooling state as\nstored in fan_data-\u003enum_speeds. Since the cooling state is later\nused as an array index in set_fan_speed(), an array out of bounds\naccess can occur.\nThis can be exploited by setting the state of the thermal cooling device\nto arbitrary values, causing for example a kernel oops when unavailable\nmemory is accessed this way.\n\nExample kernel oops:\n[  807.987276] Unable to handle kernel paging request at virtual address ffffff80d0588064\n[  807.987369] Mem abort info:\n[  807.987398]   ESR = 0x96000005\n[  807.987428]   EC = 0x25: DABT (current EL), IL = 32 bits\n[  807.987477]   SET = 0, FnV = 0\n[  807.987507]   EA = 0, S1PTW = 0\n[  807.987536]   FSC = 0x05: level 1 translation fault\n[  807.987570] Data abort info:\n[  807.987763]   ISV = 0, ISS = 0x00000005\n[  807.987801]   CM = 0, WnR = 0\n[  807.987832] swapper pgtable: 4k pages, 39-bit VAs, pgdp=0000000001165000\n[  807.987872] [ffffff80d0588064] pgd=0000000000000000, p4d=0000000000000000, pud=0000000000000000\n[  807.987961] Internal error: Oops: 96000005 [#1] PREEMPT SMP\n[  807.987992] Modules linked in: cmac algif_hash aes_arm64 algif_skcipher af_alg bnep hci_uart btbcm bluetooth ecdh_generic ecc 8021q garp stp llc snd_soc_hdmi_codec brcmfmac vc4 brcmutil cec drm_kms_helper snd_soc_core cfg80211 snd_compress bcm2835_codec(C) snd_pcm_dmaengine syscopyarea bcm2835_isp(C) bcm2835_v4l2(C) sysfillrect v4l2_mem2mem bcm2835_mmal_vchiq(C) raspberrypi_hwmon sysimgblt videobuf2_dma_contig videobuf2_vmalloc fb_sys_fops videobuf2_memops rfkill videobuf2_v4l2 videobuf2_common i2c_bcm2835 snd_bcm2835(C) videodev snd_pcm snd_timer snd mc vc_sm_cma(C) gpio_fan uio_pdrv_genirq uio drm fuse drm_panel_orientation_quirks backlight ip_tables x_tables ipv6\n[  807.988508] CPU: 0 PID: 1321 Comm: bash Tainted: G         C        5.15.56-v8+ #1575\n[  807.988548] Hardware name: Raspberry Pi 3 Model B Rev 1.2 (DT)\n[  807.988574] pstate: 20000005 (nzCv daif -PAN -UAO -TCO -DIT -SSBS BTYPE=--)\n[  807.988608] pc : set_fan_speed.part.5+0x34/0x80 [gpio_fan]\n[  807.988654] lr : gpio_fan_set_cur_state+0x34/0x50 [gpio_fan]\n[  807.988691] sp : ffffffc008cf3bd0\n[  807.988710] x29: ffffffc008cf3bd0 x28: ffffff80019edac0 x27: 0000000000000000\n[  807.988762] x26: 0000000000000000 x25: 0000000000000000 x24: ffffff800747c920\n[  807.988787] x23: 000000000000000a x22: ffffff800369f000 x21: 000000001999997c\n[  807.988854] x20: ffffff800369f2e8 x19: ffffff8002ae8080 x18: 0000000000000000\n[  807.988877] x17: 0000000000000000 x16: 0000000000000000 x15: 000000559e271b70\n[  807.988938] x14: 0000000000000000 x13: 0000000000000000 x12: 0000000000000000\n[  807.988960] x11: 0000000000000000 x10: ffffffc008cf3c20 x9 : ffffffcfb60c741c\n[  807.989018] x8 : 000000000000000a x7 : 00000000ffffffc9 x6 : 0000000000000009\n[  807.989040] x5 : 000000000000002a x4 : 0000000000000000 x3 : ffffff800369f2e8\n[  807.989062] x2 : 000000000000e780 x1 : 0000000000000001 x0 : ffffff80d0588060\n[  807.989084] Call trace:\n[  807.989091]  set_fan_speed.part.5+0x34/0x80 [gpio_fan]\n[  807.989113]  gpio_fan_set_cur_state+0x34/0x50 [gpio_fan]\n[  807.989199]  cur_state_store+0x84/0xd0\n[  807.989221]  dev_attr_store+0x20/0x38\n[  807.989262]  sysfs_kf_write+0x4c/0x60\n[  807.989282]  kernfs_fop_write_iter+0x130/0x1c0\n[  807.989298]  new_sync_write+0x10c/0x190\n[  807.989315]  vfs_write+0x254/0x378\n[  807.989362]  ksys_write+0x70/0xf8\n[  807.989379]  __arm64_sys_write+0x24/0x30\n[  807.989424]  invoke_syscall+0x4c/0x110\n[  807.989442]  el0_svc_common.constprop.3+0xfc/0x120\n[  807.989458]  do_el0_svc+0x2c/0x90\n[  807.989473]  el0_svc+0x24/0x60\n[  807.989544]  el0t_64_sync_handler+0x90/0xb8\n[  807.989558]  el0t_64_sync+0x1a0/0x1a4\n[  807.989579] Code: b9403801 f9402800 7100003f 8b35cc00 (b9400416)\n[  807.989627] ---[ end t\n---truncated---",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "SUSE Linux Enterprise Micro 5.1:kernel-rt-5.3.18-150300.214.1.x86_64",
          "SUSE Linux Enterprise Micro 5.1:kernel-source-rt-5.3.18-150300.214.1.noarch",
          "SUSE Linux Enterprise Micro 5.2:kernel-rt-5.3.18-150300.214.1.x86_64",
          "SUSE Linux Enterprise Micro 5.2:kernel-source-rt-5.3.18-150300.214.1.noarch"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2022-49945",
          "url": "https://www.suse.com/security/cve/CVE-2022-49945"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1244908 for CVE-2022-49945",
          "url": "https://bugzilla.suse.com/1244908"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "SUSE Linux Enterprise Micro 5.1:kernel-rt-5.3.18-150300.214.1.x86_64",
            "SUSE Linux Enterprise Micro 5.1:kernel-source-rt-5.3.18-150300.214.1.noarch",
            "SUSE Linux Enterprise Micro 5.2:kernel-rt-5.3.18-150300.214.1.x86_64",
            "SUSE Linux Enterprise Micro 5.2:kernel-source-rt-5.3.18-150300.214.1.noarch"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 6.6,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:H",
            "version": "3.1"
          },
          "products": [
            "SUSE Linux Enterprise Micro 5.1:kernel-rt-5.3.18-150300.214.1.x86_64",
            "SUSE Linux Enterprise Micro 5.1:kernel-source-rt-5.3.18-150300.214.1.noarch",
            "SUSE Linux Enterprise Micro 5.2:kernel-rt-5.3.18-150300.214.1.x86_64",
            "SUSE Linux Enterprise Micro 5.2:kernel-source-rt-5.3.18-150300.214.1.noarch"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2025-07-15T14:20:22Z",
          "details": "moderate"
        }
      ],
      "title": "CVE-2022-49945"
    },
    {
      "cve": "CVE-2022-49948",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2022-49948"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "In the Linux kernel, the following vulnerability has been resolved:\n\nvt: Clear selection before changing the font\n\nWhen changing the console font with ioctl(KDFONTOP) the new font size\ncan be bigger than the previous font. A previous selection may thus now\nbe outside of the new screen size and thus trigger out-of-bounds\naccesses to graphics memory if the selection is removed in\nvc_do_resize().\n\nPrevent such out-of-memory accesses by dropping the selection before the\nvarious con_font_set() console handlers are called.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "SUSE Linux Enterprise Micro 5.1:kernel-rt-5.3.18-150300.214.1.x86_64",
          "SUSE Linux Enterprise Micro 5.1:kernel-source-rt-5.3.18-150300.214.1.noarch",
          "SUSE Linux Enterprise Micro 5.2:kernel-rt-5.3.18-150300.214.1.x86_64",
          "SUSE Linux Enterprise Micro 5.2:kernel-source-rt-5.3.18-150300.214.1.noarch"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2022-49948",
          "url": "https://www.suse.com/security/cve/CVE-2022-49948"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1245058 for CVE-2022-49948",
          "url": "https://bugzilla.suse.com/1245058"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "SUSE Linux Enterprise Micro 5.1:kernel-rt-5.3.18-150300.214.1.x86_64",
            "SUSE Linux Enterprise Micro 5.1:kernel-source-rt-5.3.18-150300.214.1.noarch",
            "SUSE Linux Enterprise Micro 5.2:kernel-rt-5.3.18-150300.214.1.x86_64",
            "SUSE Linux Enterprise Micro 5.2:kernel-source-rt-5.3.18-150300.214.1.noarch"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 5.5,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
            "version": "3.1"
          },
          "products": [
            "SUSE Linux Enterprise Micro 5.1:kernel-rt-5.3.18-150300.214.1.x86_64",
            "SUSE Linux Enterprise Micro 5.1:kernel-source-rt-5.3.18-150300.214.1.noarch",
            "SUSE Linux Enterprise Micro 5.2:kernel-rt-5.3.18-150300.214.1.x86_64",
            "SUSE Linux Enterprise Micro 5.2:kernel-source-rt-5.3.18-150300.214.1.noarch"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2025-07-15T14:20:22Z",
          "details": "moderate"
        }
      ],
      "title": "CVE-2022-49948"
    },
    {
      "cve": "CVE-2022-49950",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2022-49950"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "In the Linux kernel, the following vulnerability has been resolved:\n\nmisc: fastrpc: fix memory corruption on open\n\nThe probe session-duplication overflow check incremented the session\ncount also when there were no more available sessions so that memory\nbeyond the fixed-size slab-allocated session array could be corrupted in\nfastrpc_session_alloc() on open().",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "SUSE Linux Enterprise Micro 5.1:kernel-rt-5.3.18-150300.214.1.x86_64",
          "SUSE Linux Enterprise Micro 5.1:kernel-source-rt-5.3.18-150300.214.1.noarch",
          "SUSE Linux Enterprise Micro 5.2:kernel-rt-5.3.18-150300.214.1.x86_64",
          "SUSE Linux Enterprise Micro 5.2:kernel-source-rt-5.3.18-150300.214.1.noarch"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2022-49950",
          "url": "https://www.suse.com/security/cve/CVE-2022-49950"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1244958 for CVE-2022-49950",
          "url": "https://bugzilla.suse.com/1244958"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "SUSE Linux Enterprise Micro 5.1:kernel-rt-5.3.18-150300.214.1.x86_64",
            "SUSE Linux Enterprise Micro 5.1:kernel-source-rt-5.3.18-150300.214.1.noarch",
            "SUSE Linux Enterprise Micro 5.2:kernel-rt-5.3.18-150300.214.1.x86_64",
            "SUSE Linux Enterprise Micro 5.2:kernel-source-rt-5.3.18-150300.214.1.noarch"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 5.5,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
            "version": "3.1"
          },
          "products": [
            "SUSE Linux Enterprise Micro 5.1:kernel-rt-5.3.18-150300.214.1.x86_64",
            "SUSE Linux Enterprise Micro 5.1:kernel-source-rt-5.3.18-150300.214.1.noarch",
            "SUSE Linux Enterprise Micro 5.2:kernel-rt-5.3.18-150300.214.1.x86_64",
            "SUSE Linux Enterprise Micro 5.2:kernel-source-rt-5.3.18-150300.214.1.noarch"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2025-07-15T14:20:22Z",
          "details": "moderate"
        }
      ],
      "title": "CVE-2022-49950"
    },
    {
      "cve": "CVE-2022-49952",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2022-49952"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "In the Linux kernel, the following vulnerability has been resolved:\n\nmisc: fastrpc: fix memory corruption on probe\n\nAdd the missing sanity check on the probed-session count to avoid\ncorrupting memory beyond the fixed-size slab-allocated session array\nwhen there are more than FASTRPC_MAX_SESSIONS sessions defined in the\ndevicetree.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "SUSE Linux Enterprise Micro 5.1:kernel-rt-5.3.18-150300.214.1.x86_64",
          "SUSE Linux Enterprise Micro 5.1:kernel-source-rt-5.3.18-150300.214.1.noarch",
          "SUSE Linux Enterprise Micro 5.2:kernel-rt-5.3.18-150300.214.1.x86_64",
          "SUSE Linux Enterprise Micro 5.2:kernel-source-rt-5.3.18-150300.214.1.noarch"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2022-49952",
          "url": "https://www.suse.com/security/cve/CVE-2022-49952"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1244945 for CVE-2022-49952",
          "url": "https://bugzilla.suse.com/1244945"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "SUSE Linux Enterprise Micro 5.1:kernel-rt-5.3.18-150300.214.1.x86_64",
            "SUSE Linux Enterprise Micro 5.1:kernel-source-rt-5.3.18-150300.214.1.noarch",
            "SUSE Linux Enterprise Micro 5.2:kernel-rt-5.3.18-150300.214.1.x86_64",
            "SUSE Linux Enterprise Micro 5.2:kernel-source-rt-5.3.18-150300.214.1.noarch"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 5.5,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
            "version": "3.1"
          },
          "products": [
            "SUSE Linux Enterprise Micro 5.1:kernel-rt-5.3.18-150300.214.1.x86_64",
            "SUSE Linux Enterprise Micro 5.1:kernel-source-rt-5.3.18-150300.214.1.noarch",
            "SUSE Linux Enterprise Micro 5.2:kernel-rt-5.3.18-150300.214.1.x86_64",
            "SUSE Linux Enterprise Micro 5.2:kernel-source-rt-5.3.18-150300.214.1.noarch"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2025-07-15T14:20:22Z",
          "details": "moderate"
        }
      ],
      "title": "CVE-2022-49952"
    },
    {
      "cve": "CVE-2022-49954",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2022-49954"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "In the Linux kernel, the following vulnerability has been resolved:\n\nInput: iforce - wake up after clearing IFORCE_XMIT_RUNNING flag\n\nsyzbot is reporting hung task at __input_unregister_device() [1], for\niforce_close() waiting at wait_event_interruptible() with dev-\u003emutex held\nis blocking input_disconnect_device() from __input_unregister_device().\n\nIt seems that the cause is simply that commit c2b27ef672992a20 (\"Input:\niforce - wait for command completion when closing the device\") forgot to\ncall wake_up() after clear_bit().\n\nFix this problem by introducing a helper that calls clear_bit() followed\nby wake_up_all().",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "SUSE Linux Enterprise Micro 5.1:kernel-rt-5.3.18-150300.214.1.x86_64",
          "SUSE Linux Enterprise Micro 5.1:kernel-source-rt-5.3.18-150300.214.1.noarch",
          "SUSE Linux Enterprise Micro 5.2:kernel-rt-5.3.18-150300.214.1.x86_64",
          "SUSE Linux Enterprise Micro 5.2:kernel-source-rt-5.3.18-150300.214.1.noarch"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2022-49954",
          "url": "https://www.suse.com/security/cve/CVE-2022-49954"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1244976 for CVE-2022-49954",
          "url": "https://bugzilla.suse.com/1244976"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "SUSE Linux Enterprise Micro 5.1:kernel-rt-5.3.18-150300.214.1.x86_64",
            "SUSE Linux Enterprise Micro 5.1:kernel-source-rt-5.3.18-150300.214.1.noarch",
            "SUSE Linux Enterprise Micro 5.2:kernel-rt-5.3.18-150300.214.1.x86_64",
            "SUSE Linux Enterprise Micro 5.2:kernel-source-rt-5.3.18-150300.214.1.noarch"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 5.5,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
            "version": "3.1"
          },
          "products": [
            "SUSE Linux Enterprise Micro 5.1:kernel-rt-5.3.18-150300.214.1.x86_64",
            "SUSE Linux Enterprise Micro 5.1:kernel-source-rt-5.3.18-150300.214.1.noarch",
            "SUSE Linux Enterprise Micro 5.2:kernel-rt-5.3.18-150300.214.1.x86_64",
            "SUSE Linux Enterprise Micro 5.2:kernel-source-rt-5.3.18-150300.214.1.noarch"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2025-07-15T14:20:22Z",
          "details": "moderate"
        }
      ],
      "title": "CVE-2022-49954"
    },
    {
      "cve": "CVE-2022-49956",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2022-49956"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "In the Linux kernel, the following vulnerability has been resolved:\n\nstaging: rtl8712: fix use after free bugs\n\n_Read/Write_MACREG callbacks are NULL so the read/write_macreg_hdl()\nfunctions don\u0027t do anything except free the \"pcmd\" pointer.  It\nresults in a use after free.  Delete them.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "SUSE Linux Enterprise Micro 5.1:kernel-rt-5.3.18-150300.214.1.x86_64",
          "SUSE Linux Enterprise Micro 5.1:kernel-source-rt-5.3.18-150300.214.1.noarch",
          "SUSE Linux Enterprise Micro 5.2:kernel-rt-5.3.18-150300.214.1.x86_64",
          "SUSE Linux Enterprise Micro 5.2:kernel-source-rt-5.3.18-150300.214.1.noarch"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2022-49956",
          "url": "https://www.suse.com/security/cve/CVE-2022-49956"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1244969 for CVE-2022-49956",
          "url": "https://bugzilla.suse.com/1244969"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "SUSE Linux Enterprise Micro 5.1:kernel-rt-5.3.18-150300.214.1.x86_64",
            "SUSE Linux Enterprise Micro 5.1:kernel-source-rt-5.3.18-150300.214.1.noarch",
            "SUSE Linux Enterprise Micro 5.2:kernel-rt-5.3.18-150300.214.1.x86_64",
            "SUSE Linux Enterprise Micro 5.2:kernel-source-rt-5.3.18-150300.214.1.noarch"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 5.5,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
            "version": "3.1"
          },
          "products": [
            "SUSE Linux Enterprise Micro 5.1:kernel-rt-5.3.18-150300.214.1.x86_64",
            "SUSE Linux Enterprise Micro 5.1:kernel-source-rt-5.3.18-150300.214.1.noarch",
            "SUSE Linux Enterprise Micro 5.2:kernel-rt-5.3.18-150300.214.1.x86_64",
            "SUSE Linux Enterprise Micro 5.2:kernel-source-rt-5.3.18-150300.214.1.noarch"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2025-07-15T14:20:22Z",
          "details": "moderate"
        }
      ],
      "title": "CVE-2022-49956"
    },
    {
      "cve": "CVE-2022-49968",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2022-49968"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "In the Linux kernel, the following vulnerability has been resolved:\n\nieee802154/adf7242: defer destroy_workqueue call\n\nThere is a possible race condition (use-after-free) like below\n\n  (FREE)                     |  (USE)\n  adf7242_remove             |  adf7242_channel\n   cancel_delayed_work_sync  |\n    destroy_workqueue (1)    |   adf7242_cmd_rx\n                             |    mod_delayed_work (2)\n                             |\n\nThe root cause for this race is that the upper layer (ieee802154) is\nunaware of this detaching event and the function adf7242_channel can\nbe called without any checks.\n\nTo fix this, we can add a flag write at the beginning of adf7242_remove\nand add flag check in adf7242_channel. Or we can just defer the\ndestructive operation like other commit 3e0588c291d6 (\"hamradio: defer\nax25 kfree after unregister_netdev\") which let the\nieee802154_unregister_hw() to handle the synchronization. This patch\ntakes the second option.\n\nruns\")",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "SUSE Linux Enterprise Micro 5.1:kernel-rt-5.3.18-150300.214.1.x86_64",
          "SUSE Linux Enterprise Micro 5.1:kernel-source-rt-5.3.18-150300.214.1.noarch",
          "SUSE Linux Enterprise Micro 5.2:kernel-rt-5.3.18-150300.214.1.x86_64",
          "SUSE Linux Enterprise Micro 5.2:kernel-source-rt-5.3.18-150300.214.1.noarch"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2022-49968",
          "url": "https://www.suse.com/security/cve/CVE-2022-49968"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1244959 for CVE-2022-49968",
          "url": "https://bugzilla.suse.com/1244959"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "SUSE Linux Enterprise Micro 5.1:kernel-rt-5.3.18-150300.214.1.x86_64",
            "SUSE Linux Enterprise Micro 5.1:kernel-source-rt-5.3.18-150300.214.1.noarch",
            "SUSE Linux Enterprise Micro 5.2:kernel-rt-5.3.18-150300.214.1.x86_64",
            "SUSE Linux Enterprise Micro 5.2:kernel-source-rt-5.3.18-150300.214.1.noarch"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 5.5,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
            "version": "3.1"
          },
          "products": [
            "SUSE Linux Enterprise Micro 5.1:kernel-rt-5.3.18-150300.214.1.x86_64",
            "SUSE Linux Enterprise Micro 5.1:kernel-source-rt-5.3.18-150300.214.1.noarch",
            "SUSE Linux Enterprise Micro 5.2:kernel-rt-5.3.18-150300.214.1.x86_64",
            "SUSE Linux Enterprise Micro 5.2:kernel-source-rt-5.3.18-150300.214.1.noarch"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2025-07-15T14:20:22Z",
          "details": "moderate"
        }
      ],
      "title": "CVE-2022-49968"
    },
    {
      "cve": "CVE-2022-49977",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2022-49977"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "In the Linux kernel, the following vulnerability has been resolved:\n\nftrace: Fix NULL pointer dereference in is_ftrace_trampoline when ftrace is dead\n\nftrace_startup does not remove ops from ftrace_ops_list when\nftrace_startup_enable fails:\n\nregister_ftrace_function\n  ftrace_startup\n    __register_ftrace_function\n      ...\n      add_ftrace_ops(\u0026ftrace_ops_list, ops)\n      ...\n    ...\n    ftrace_startup_enable // if ftrace failed to modify, ftrace_disabled is set to 1\n    ...\n  return 0 // ops is in the ftrace_ops_list.\n\nWhen ftrace_disabled = 1, unregister_ftrace_function simply returns without doing anything:\nunregister_ftrace_function\n  ftrace_shutdown\n    if (unlikely(ftrace_disabled))\n            return -ENODEV;  // return here, __unregister_ftrace_function is not executed,\n                             // as a result, ops is still in the ftrace_ops_list\n    __unregister_ftrace_function\n    ...\n\nIf ops is dynamically allocated, it will be free later, in this case,\nis_ftrace_trampoline accesses NULL pointer:\n\nis_ftrace_trampoline\n  ftrace_ops_trampoline\n    do_for_each_ftrace_op(op, ftrace_ops_list) // OOPS! op may be NULL!\n\nSyzkaller reports as follows:\n[ 1203.506103] BUG: kernel NULL pointer dereference, address: 000000000000010b\n[ 1203.508039] #PF: supervisor read access in kernel mode\n[ 1203.508798] #PF: error_code(0x0000) - not-present page\n[ 1203.509558] PGD 800000011660b067 P4D 800000011660b067 PUD 130fb8067 PMD 0\n[ 1203.510560] Oops: 0000 [#1] SMP KASAN PTI\n[ 1203.511189] CPU: 6 PID: 29532 Comm: syz-executor.2 Tainted: G    B   W         5.10.0 #8\n[ 1203.512324] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS rel-1.14.0-0-g155821a1990b-prebuilt.qemu.org 04/01/2014\n[ 1203.513895] RIP: 0010:is_ftrace_trampoline+0x26/0xb0\n[ 1203.514644] Code: ff eb d3 90 41 55 41 54 49 89 fc 55 53 e8 f2 00 fd ff 48 8b 1d 3b 35 5d 03 e8 e6 00 fd ff 48 8d bb 90 00 00 00 e8 2a 81 26 00 \u003c48\u003e 8b ab 90 00 00 00 48 85 ed 74 1d e8 c9 00 fd ff 48 8d bb 98 00\n[ 1203.518838] RSP: 0018:ffffc900012cf960 EFLAGS: 00010246\n[ 1203.520092] RAX: 0000000000000000 RBX: 000000000000007b RCX: ffffffff8a331866\n[ 1203.521469] RDX: 0000000000000000 RSI: 0000000000000008 RDI: 000000000000010b\n[ 1203.522583] RBP: 0000000000000000 R08: 0000000000000000 R09: ffffffff8df18b07\n[ 1203.523550] R10: fffffbfff1be3160 R11: 0000000000000001 R12: 0000000000478399\n[ 1203.524596] R13: 0000000000000000 R14: ffff888145088000 R15: 0000000000000008\n[ 1203.525634] FS:  00007f429f5f4700(0000) GS:ffff8881daf00000(0000) knlGS:0000000000000000\n[ 1203.526801] CS:  0010 DS: 0000 ES: 0000 CR0: 0000000080050033\n[ 1203.527626] CR2: 000000000000010b CR3: 0000000170e1e001 CR4: 00000000003706e0\n[ 1203.528611] DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000\n[ 1203.529605] DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400\n\nTherefore, when ftrace_startup_enable fails, we need to rollback registration\nprocess and remove ops from ftrace_ops_list.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "SUSE Linux Enterprise Micro 5.1:kernel-rt-5.3.18-150300.214.1.x86_64",
          "SUSE Linux Enterprise Micro 5.1:kernel-source-rt-5.3.18-150300.214.1.noarch",
          "SUSE Linux Enterprise Micro 5.2:kernel-rt-5.3.18-150300.214.1.x86_64",
          "SUSE Linux Enterprise Micro 5.2:kernel-source-rt-5.3.18-150300.214.1.noarch"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2022-49977",
          "url": "https://www.suse.com/security/cve/CVE-2022-49977"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1244936 for CVE-2022-49977",
          "url": "https://bugzilla.suse.com/1244936"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "SUSE Linux Enterprise Micro 5.1:kernel-rt-5.3.18-150300.214.1.x86_64",
            "SUSE Linux Enterprise Micro 5.1:kernel-source-rt-5.3.18-150300.214.1.noarch",
            "SUSE Linux Enterprise Micro 5.2:kernel-rt-5.3.18-150300.214.1.x86_64",
            "SUSE Linux Enterprise Micro 5.2:kernel-source-rt-5.3.18-150300.214.1.noarch"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 4.4,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H",
            "version": "3.1"
          },
          "products": [
            "SUSE Linux Enterprise Micro 5.1:kernel-rt-5.3.18-150300.214.1.x86_64",
            "SUSE Linux Enterprise Micro 5.1:kernel-source-rt-5.3.18-150300.214.1.noarch",
            "SUSE Linux Enterprise Micro 5.2:kernel-rt-5.3.18-150300.214.1.x86_64",
            "SUSE Linux Enterprise Micro 5.2:kernel-source-rt-5.3.18-150300.214.1.noarch"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2025-07-15T14:20:22Z",
          "details": "moderate"
        }
      ],
      "title": "CVE-2022-49977"
    },
    {
      "cve": "CVE-2022-49978",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2022-49978"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "In the Linux kernel, the following vulnerability has been resolved:\n\nfbdev: fb_pm2fb: Avoid potential divide by zero error\n\nIn `do_fb_ioctl()` of fbmem.c, if cmd is FBIOPUT_VSCREENINFO, var will be\ncopied from user, then go through `fb_set_var()` and\n`info-\u003efbops-\u003efb_check_var()` which could may be `pm2fb_check_var()`.\nAlong the path, `var-\u003epixclock` won\u0027t be modified. This function checks\nwhether reciprocal of `var-\u003epixclock` is too high. If `var-\u003epixclock` is\nzero, there will be a divide by zero error. So, it is necessary to check\nwhether denominator is zero to avoid crash. As this bug is found by\nSyzkaller, logs are listed below.\n\ndivide error in pm2fb_check_var\nCall Trace:\n \u003cTASK\u003e\n fb_set_var+0x367/0xeb0 drivers/video/fbdev/core/fbmem.c:1015\n do_fb_ioctl+0x234/0x670 drivers/video/fbdev/core/fbmem.c:1110\n fb_ioctl+0xdd/0x130 drivers/video/fbdev/core/fbmem.c:1189",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "SUSE Linux Enterprise Micro 5.1:kernel-rt-5.3.18-150300.214.1.x86_64",
          "SUSE Linux Enterprise Micro 5.1:kernel-source-rt-5.3.18-150300.214.1.noarch",
          "SUSE Linux Enterprise Micro 5.2:kernel-rt-5.3.18-150300.214.1.x86_64",
          "SUSE Linux Enterprise Micro 5.2:kernel-source-rt-5.3.18-150300.214.1.noarch"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2022-49978",
          "url": "https://www.suse.com/security/cve/CVE-2022-49978"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1245195 for CVE-2022-49978",
          "url": "https://bugzilla.suse.com/1245195"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "SUSE Linux Enterprise Micro 5.1:kernel-rt-5.3.18-150300.214.1.x86_64",
            "SUSE Linux Enterprise Micro 5.1:kernel-source-rt-5.3.18-150300.214.1.noarch",
            "SUSE Linux Enterprise Micro 5.2:kernel-rt-5.3.18-150300.214.1.x86_64",
            "SUSE Linux Enterprise Micro 5.2:kernel-source-rt-5.3.18-150300.214.1.noarch"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 5.5,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
            "version": "3.1"
          },
          "products": [
            "SUSE Linux Enterprise Micro 5.1:kernel-rt-5.3.18-150300.214.1.x86_64",
            "SUSE Linux Enterprise Micro 5.1:kernel-source-rt-5.3.18-150300.214.1.noarch",
            "SUSE Linux Enterprise Micro 5.2:kernel-rt-5.3.18-150300.214.1.x86_64",
            "SUSE Linux Enterprise Micro 5.2:kernel-source-rt-5.3.18-150300.214.1.noarch"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2025-07-15T14:20:22Z",
          "details": "moderate"
        }
      ],
      "title": "CVE-2022-49978"
    },
    {
      "cve": "CVE-2022-49981",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2022-49981"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "In the Linux kernel, the following vulnerability has been resolved:\n\nHID: hidraw: fix memory leak in hidraw_release()\n\nFree the buffered reports before deleting the list entry.\n\nBUG: memory leak\nunreferenced object 0xffff88810e72f180 (size 32):\n  comm \"softirq\", pid 0, jiffies 4294945143 (age 16.080s)\n  hex dump (first 32 bytes):\n    64 f3 c6 6a d1 88 07 04 00 00 00 00 00 00 00 00  d..j............\n    00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00  ................\n  backtrace:\n    [\u003cffffffff814ac6c3\u003e] kmemdup+0x23/0x50 mm/util.c:128\n    [\u003cffffffff8357c1d2\u003e] kmemdup include/linux/fortify-string.h:440 [inline]\n    [\u003cffffffff8357c1d2\u003e] hidraw_report_event+0xa2/0x150 drivers/hid/hidraw.c:521\n    [\u003cffffffff8356ddad\u003e] hid_report_raw_event+0x27d/0x740 drivers/hid/hid-core.c:1992\n    [\u003cffffffff8356e41e\u003e] hid_input_report+0x1ae/0x270 drivers/hid/hid-core.c:2065\n    [\u003cffffffff835f0d3f\u003e] hid_irq_in+0x1ff/0x250 drivers/hid/usbhid/hid-core.c:284\n    [\u003cffffffff82d3c7f9\u003e] __usb_hcd_giveback_urb+0xf9/0x230 drivers/usb/core/hcd.c:1670\n    [\u003cffffffff82d3cc26\u003e] usb_hcd_giveback_urb+0x1b6/0x1d0 drivers/usb/core/hcd.c:1747\n    [\u003cffffffff82ef1e14\u003e] dummy_timer+0x8e4/0x14c0 drivers/usb/gadget/udc/dummy_hcd.c:1988\n    [\u003cffffffff812f50a8\u003e] call_timer_fn+0x38/0x200 kernel/time/timer.c:1474\n    [\u003cffffffff812f5586\u003e] expire_timers kernel/time/timer.c:1519 [inline]\n    [\u003cffffffff812f5586\u003e] __run_timers.part.0+0x316/0x430 kernel/time/timer.c:1790\n    [\u003cffffffff812f56e4\u003e] __run_timers kernel/time/timer.c:1768 [inline]\n    [\u003cffffffff812f56e4\u003e] run_timer_softirq+0x44/0x90 kernel/time/timer.c:1803\n    [\u003cffffffff848000e6\u003e] __do_softirq+0xe6/0x2ea kernel/softirq.c:571\n    [\u003cffffffff81246db0\u003e] invoke_softirq kernel/softirq.c:445 [inline]\n    [\u003cffffffff81246db0\u003e] __irq_exit_rcu kernel/softirq.c:650 [inline]\n    [\u003cffffffff81246db0\u003e] irq_exit_rcu+0xc0/0x110 kernel/softirq.c:662\n    [\u003cffffffff84574f02\u003e] sysvec_apic_timer_interrupt+0xa2/0xd0 arch/x86/kernel/apic/apic.c:1106\n    [\u003cffffffff84600c8b\u003e] asm_sysvec_apic_timer_interrupt+0x1b/0x20 arch/x86/include/asm/idtentry.h:649\n    [\u003cffffffff8458a070\u003e] native_safe_halt arch/x86/include/asm/irqflags.h:51 [inline]\n    [\u003cffffffff8458a070\u003e] arch_safe_halt arch/x86/include/asm/irqflags.h:89 [inline]\n    [\u003cffffffff8458a070\u003e] acpi_safe_halt drivers/acpi/processor_idle.c:111 [inline]\n    [\u003cffffffff8458a070\u003e] acpi_idle_do_entry+0xc0/0xd0 drivers/acpi/processor_idle.c:554",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "SUSE Linux Enterprise Micro 5.1:kernel-rt-5.3.18-150300.214.1.x86_64",
          "SUSE Linux Enterprise Micro 5.1:kernel-source-rt-5.3.18-150300.214.1.noarch",
          "SUSE Linux Enterprise Micro 5.2:kernel-rt-5.3.18-150300.214.1.x86_64",
          "SUSE Linux Enterprise Micro 5.2:kernel-source-rt-5.3.18-150300.214.1.noarch"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2022-49981",
          "url": "https://www.suse.com/security/cve/CVE-2022-49981"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1245072 for CVE-2022-49981",
          "url": "https://bugzilla.suse.com/1245072"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "SUSE Linux Enterprise Micro 5.1:kernel-rt-5.3.18-150300.214.1.x86_64",
            "SUSE Linux Enterprise Micro 5.1:kernel-source-rt-5.3.18-150300.214.1.noarch",
            "SUSE Linux Enterprise Micro 5.2:kernel-rt-5.3.18-150300.214.1.x86_64",
            "SUSE Linux Enterprise Micro 5.2:kernel-source-rt-5.3.18-150300.214.1.noarch"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 5.5,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
            "version": "3.1"
          },
          "products": [
            "SUSE Linux Enterprise Micro 5.1:kernel-rt-5.3.18-150300.214.1.x86_64",
            "SUSE Linux Enterprise Micro 5.1:kernel-source-rt-5.3.18-150300.214.1.noarch",
            "SUSE Linux Enterprise Micro 5.2:kernel-rt-5.3.18-150300.214.1.x86_64",
            "SUSE Linux Enterprise Micro 5.2:kernel-source-rt-5.3.18-150300.214.1.noarch"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2025-07-15T14:20:22Z",
          "details": "moderate"
        }
      ],
      "title": "CVE-2022-49981"
    },
    {
      "cve": "CVE-2022-49984",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2022-49984"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "In the Linux kernel, the following vulnerability has been resolved:\n\nHID: steam: Prevent NULL pointer dereference in steam_{recv,send}_report\n\nIt is possible for a malicious device to forgo submitting a Feature\nReport.  The HID Steam driver presently makes no prevision for this\nand de-references the \u0027struct hid_report\u0027 pointer obtained from the\nHID devices without first checking its validity.  Let\u0027s change that.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "SUSE Linux Enterprise Micro 5.1:kernel-rt-5.3.18-150300.214.1.x86_64",
          "SUSE Linux Enterprise Micro 5.1:kernel-source-rt-5.3.18-150300.214.1.noarch",
          "SUSE Linux Enterprise Micro 5.2:kernel-rt-5.3.18-150300.214.1.x86_64",
          "SUSE Linux Enterprise Micro 5.2:kernel-source-rt-5.3.18-150300.214.1.noarch"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2022-49984",
          "url": "https://www.suse.com/security/cve/CVE-2022-49984"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1244950 for CVE-2022-49984",
          "url": "https://bugzilla.suse.com/1244950"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "SUSE Linux Enterprise Micro 5.1:kernel-rt-5.3.18-150300.214.1.x86_64",
            "SUSE Linux Enterprise Micro 5.1:kernel-source-rt-5.3.18-150300.214.1.noarch",
            "SUSE Linux Enterprise Micro 5.2:kernel-rt-5.3.18-150300.214.1.x86_64",
            "SUSE Linux Enterprise Micro 5.2:kernel-source-rt-5.3.18-150300.214.1.noarch"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 5.5,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
            "version": "3.1"
          },
          "products": [
            "SUSE Linux Enterprise Micro 5.1:kernel-rt-5.3.18-150300.214.1.x86_64",
            "SUSE Linux Enterprise Micro 5.1:kernel-source-rt-5.3.18-150300.214.1.noarch",
            "SUSE Linux Enterprise Micro 5.2:kernel-rt-5.3.18-150300.214.1.x86_64",
            "SUSE Linux Enterprise Micro 5.2:kernel-source-rt-5.3.18-150300.214.1.noarch"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2025-07-15T14:20:22Z",
          "details": "moderate"
        }
      ],
      "title": "CVE-2022-49984"
    },
    {
      "cve": "CVE-2022-49985",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2022-49985"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "In the Linux kernel, the following vulnerability has been resolved:\n\nbpf: Don\u0027t use tnum_range on array range checking for poke descriptors\n\nHsin-Wei reported a KASAN splat triggered by their BPF runtime fuzzer which\nis based on a customized syzkaller:\n\n  BUG: KASAN: slab-out-of-bounds in bpf_int_jit_compile+0x1257/0x13f0\n  Read of size 8 at addr ffff888004e90b58 by task syz-executor.0/1489\n  CPU: 1 PID: 1489 Comm: syz-executor.0 Not tainted 5.19.0 #1\n  Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS\n  1.13.0-1ubuntu1.1 04/01/2014\n  Call Trace:\n   \u003cTASK\u003e\n   dump_stack_lvl+0x9c/0xc9\n   print_address_description.constprop.0+0x1f/0x1f0\n   ? bpf_int_jit_compile+0x1257/0x13f0\n   kasan_report.cold+0xeb/0x197\n   ? kvmalloc_node+0x170/0x200\n   ? bpf_int_jit_compile+0x1257/0x13f0\n   bpf_int_jit_compile+0x1257/0x13f0\n   ? arch_prepare_bpf_dispatcher+0xd0/0xd0\n   ? rcu_read_lock_sched_held+0x43/0x70\n   bpf_prog_select_runtime+0x3e8/0x640\n   ? bpf_obj_name_cpy+0x149/0x1b0\n   bpf_prog_load+0x102f/0x2220\n   ? __bpf_prog_put.constprop.0+0x220/0x220\n   ? find_held_lock+0x2c/0x110\n   ? __might_fault+0xd6/0x180\n   ? lock_downgrade+0x6e0/0x6e0\n   ? lock_is_held_type+0xa6/0x120\n   ? __might_fault+0x147/0x180\n   __sys_bpf+0x137b/0x6070\n   ? bpf_perf_link_attach+0x530/0x530\n   ? new_sync_read+0x600/0x600\n   ? __fget_files+0x255/0x450\n   ? lock_downgrade+0x6e0/0x6e0\n   ? fput+0x30/0x1a0\n   ? ksys_write+0x1a8/0x260\n   __x64_sys_bpf+0x7a/0xc0\n   ? syscall_enter_from_user_mode+0x21/0x70\n   do_syscall_64+0x3b/0x90\n   entry_SYSCALL_64_after_hwframe+0x63/0xcd\n  RIP: 0033:0x7f917c4e2c2d\n\nThe problem here is that a range of tnum_range(0, map-\u003emax_entries - 1) has\nlimited ability to represent the concrete tight range with the tnum as the\nset of resulting states from value + mask can result in a superset of the\nactual intended range, and as such a tnum_in(range, reg-\u003evar_off) check may\nyield true when it shouldn\u0027t, for example tnum_range(0, 2) would result in\n00XX -\u003e v = 0000, m = 0011 such that the intended set of {0, 1, 2} is here\nrepresented by a less precise superset of {0, 1, 2, 3}. As the register is\nknown const scalar, really just use the concrete reg-\u003evar_off.value for the\nupper index check.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "SUSE Linux Enterprise Micro 5.1:kernel-rt-5.3.18-150300.214.1.x86_64",
          "SUSE Linux Enterprise Micro 5.1:kernel-source-rt-5.3.18-150300.214.1.noarch",
          "SUSE Linux Enterprise Micro 5.2:kernel-rt-5.3.18-150300.214.1.x86_64",
          "SUSE Linux Enterprise Micro 5.2:kernel-source-rt-5.3.18-150300.214.1.noarch"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2022-49985",
          "url": "https://www.suse.com/security/cve/CVE-2022-49985"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1244956 for CVE-2022-49985",
          "url": "https://bugzilla.suse.com/1244956"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "SUSE Linux Enterprise Micro 5.1:kernel-rt-5.3.18-150300.214.1.x86_64",
            "SUSE Linux Enterprise Micro 5.1:kernel-source-rt-5.3.18-150300.214.1.noarch",
            "SUSE Linux Enterprise Micro 5.2:kernel-rt-5.3.18-150300.214.1.x86_64",
            "SUSE Linux Enterprise Micro 5.2:kernel-source-rt-5.3.18-150300.214.1.noarch"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 5.5,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
            "version": "3.1"
          },
          "products": [
            "SUSE Linux Enterprise Micro 5.1:kernel-rt-5.3.18-150300.214.1.x86_64",
            "SUSE Linux Enterprise Micro 5.1:kernel-source-rt-5.3.18-150300.214.1.noarch",
            "SUSE Linux Enterprise Micro 5.2:kernel-rt-5.3.18-150300.214.1.x86_64",
            "SUSE Linux Enterprise Micro 5.2:kernel-source-rt-5.3.18-150300.214.1.noarch"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2025-07-15T14:20:22Z",
          "details": "moderate"
        }
      ],
      "title": "CVE-2022-49985"
    },
    {
      "cve": "CVE-2022-49986",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2022-49986"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "In the Linux kernel, the following vulnerability has been resolved:\n\nscsi: storvsc: Remove WQ_MEM_RECLAIM from storvsc_error_wq\n\nstorvsc_error_wq workqueue should not be marked as WQ_MEM_RECLAIM as it\ndoesn\u0027t need to make forward progress under memory pressure.  Marking this\nworkqueue as WQ_MEM_RECLAIM may cause deadlock while flushing a\nnon-WQ_MEM_RECLAIM workqueue.  In the current state it causes the following\nwarning:\n\n[   14.506347] ------------[ cut here ]------------\n[   14.506354] workqueue: WQ_MEM_RECLAIM storvsc_error_wq_0:storvsc_remove_lun is flushing !WQ_MEM_RECLAIM events_freezable_power_:disk_events_workfn\n[   14.506360] WARNING: CPU: 0 PID: 8 at \u003c-snip-\u003ekernel/workqueue.c:2623 check_flush_dependency+0xb5/0x130\n[   14.506390] CPU: 0 PID: 8 Comm: kworker/u4:0 Not tainted 5.4.0-1086-azure #91~18.04.1-Ubuntu\n[   14.506391] Hardware name: Microsoft Corporation Virtual Machine/Virtual Machine, BIOS Hyper-V UEFI Release v4.1 05/09/2022\n[   14.506393] Workqueue: storvsc_error_wq_0 storvsc_remove_lun\n[   14.506395] RIP: 0010:check_flush_dependency+0xb5/0x130\n\t\t\u003c-snip-\u003e\n[   14.506408] Call Trace:\n[   14.506412]  __flush_work+0xf1/0x1c0\n[   14.506414]  __cancel_work_timer+0x12f/0x1b0\n[   14.506417]  ? kernfs_put+0xf0/0x190\n[   14.506418]  cancel_delayed_work_sync+0x13/0x20\n[   14.506420]  disk_block_events+0x78/0x80\n[   14.506421]  del_gendisk+0x3d/0x2f0\n[   14.506423]  sr_remove+0x28/0x70\n[   14.506427]  device_release_driver_internal+0xef/0x1c0\n[   14.506428]  device_release_driver+0x12/0x20\n[   14.506429]  bus_remove_device+0xe1/0x150\n[   14.506431]  device_del+0x167/0x380\n[   14.506432]  __scsi_remove_device+0x11d/0x150\n[   14.506433]  scsi_remove_device+0x26/0x40\n[   14.506434]  storvsc_remove_lun+0x40/0x60\n[   14.506436]  process_one_work+0x209/0x400\n[   14.506437]  worker_thread+0x34/0x400\n[   14.506439]  kthread+0x121/0x140\n[   14.506440]  ? process_one_work+0x400/0x400\n[   14.506441]  ? kthread_park+0x90/0x90\n[   14.506443]  ret_from_fork+0x35/0x40\n[   14.506445] ---[ end trace 2d9633159fdc6ee7 ]---",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "SUSE Linux Enterprise Micro 5.1:kernel-rt-5.3.18-150300.214.1.x86_64",
          "SUSE Linux Enterprise Micro 5.1:kernel-source-rt-5.3.18-150300.214.1.noarch",
          "SUSE Linux Enterprise Micro 5.2:kernel-rt-5.3.18-150300.214.1.x86_64",
          "SUSE Linux Enterprise Micro 5.2:kernel-source-rt-5.3.18-150300.214.1.noarch"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2022-49986",
          "url": "https://www.suse.com/security/cve/CVE-2022-49986"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1244948 for CVE-2022-49986",
          "url": "https://bugzilla.suse.com/1244948"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "SUSE Linux Enterprise Micro 5.1:kernel-rt-5.3.18-150300.214.1.x86_64",
            "SUSE Linux Enterprise Micro 5.1:kernel-source-rt-5.3.18-150300.214.1.noarch",
            "SUSE Linux Enterprise Micro 5.2:kernel-rt-5.3.18-150300.214.1.x86_64",
            "SUSE Linux Enterprise Micro 5.2:kernel-source-rt-5.3.18-150300.214.1.noarch"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 5.5,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
            "version": "3.1"
          },
          "products": [
            "SUSE Linux Enterprise Micro 5.1:kernel-rt-5.3.18-150300.214.1.x86_64",
            "SUSE Linux Enterprise Micro 5.1:kernel-source-rt-5.3.18-150300.214.1.noarch",
            "SUSE Linux Enterprise Micro 5.2:kernel-rt-5.3.18-150300.214.1.x86_64",
            "SUSE Linux Enterprise Micro 5.2:kernel-source-rt-5.3.18-150300.214.1.noarch"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2025-07-15T14:20:22Z",
          "details": "moderate"
        }
      ],
      "title": "CVE-2022-49986"
    },
    {
      "cve": "CVE-2022-49987",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2022-49987"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "In the Linux kernel, the following vulnerability has been resolved:\n\nmd: call __md_stop_writes in md_stop\n\nFrom the link [1], we can see raid1d was running even after the path\nraid_dtr -\u003e md_stop -\u003e __md_stop.\n\nLet\u0027s stop write first in destructor to align with normal md-raid to\nfix the KASAN issue.\n\n[1]. https://lore.kernel.org/linux-raid/CAPhsuW5gc4AakdGNdF8ubpezAuDLFOYUO_sfMZcec6hQFm8nhg@mail.gmail.com/T/#m7f12bf90481c02c6d2da68c64aeed4779b7df74a",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "SUSE Linux Enterprise Micro 5.1:kernel-rt-5.3.18-150300.214.1.x86_64",
          "SUSE Linux Enterprise Micro 5.1:kernel-source-rt-5.3.18-150300.214.1.noarch",
          "SUSE Linux Enterprise Micro 5.2:kernel-rt-5.3.18-150300.214.1.x86_64",
          "SUSE Linux Enterprise Micro 5.2:kernel-source-rt-5.3.18-150300.214.1.noarch"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2022-49987",
          "url": "https://www.suse.com/security/cve/CVE-2022-49987"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1245024 for CVE-2022-49987",
          "url": "https://bugzilla.suse.com/1245024"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "SUSE Linux Enterprise Micro 5.1:kernel-rt-5.3.18-150300.214.1.x86_64",
            "SUSE Linux Enterprise Micro 5.1:kernel-source-rt-5.3.18-150300.214.1.noarch",
            "SUSE Linux Enterprise Micro 5.2:kernel-rt-5.3.18-150300.214.1.x86_64",
            "SUSE Linux Enterprise Micro 5.2:kernel-source-rt-5.3.18-150300.214.1.noarch"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 5.5,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
            "version": "3.1"
          },
          "products": [
            "SUSE Linux Enterprise Micro 5.1:kernel-rt-5.3.18-150300.214.1.x86_64",
            "SUSE Linux Enterprise Micro 5.1:kernel-source-rt-5.3.18-150300.214.1.noarch",
            "SUSE Linux Enterprise Micro 5.2:kernel-rt-5.3.18-150300.214.1.x86_64",
            "SUSE Linux Enterprise Micro 5.2:kernel-source-rt-5.3.18-150300.214.1.noarch"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2025-07-15T14:20:22Z",
          "details": "moderate"
        }
      ],
      "title": "CVE-2022-49987"
    },
    {
      "cve": "CVE-2022-49989",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2022-49989"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "In the Linux kernel, the following vulnerability has been resolved:\n\nxen/privcmd: fix error exit of privcmd_ioctl_dm_op()\n\nThe error exit of privcmd_ioctl_dm_op() is calling unlock_pages()\npotentially with pages being NULL, leading to a NULL dereference.\n\nAdditionally lock_pages() doesn\u0027t check for pin_user_pages_fast()\nhaving been completely successful, resulting in potentially not\nlocking all pages into memory. This could result in sporadic failures\nwhen using the related memory in user mode.\n\nFix all of that by calling unlock_pages() always with the real number\nof pinned pages, which will be zero in case pages being NULL, and by\nchecking the number of pages pinned by pin_user_pages_fast() matching\nthe expected number of pages.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "SUSE Linux Enterprise Micro 5.1:kernel-rt-5.3.18-150300.214.1.x86_64",
          "SUSE Linux Enterprise Micro 5.1:kernel-source-rt-5.3.18-150300.214.1.noarch",
          "SUSE Linux Enterprise Micro 5.2:kernel-rt-5.3.18-150300.214.1.x86_64",
          "SUSE Linux Enterprise Micro 5.2:kernel-source-rt-5.3.18-150300.214.1.noarch"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2022-49989",
          "url": "https://www.suse.com/security/cve/CVE-2022-49989"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1245007 for CVE-2022-49989",
          "url": "https://bugzilla.suse.com/1245007"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "SUSE Linux Enterprise Micro 5.1:kernel-rt-5.3.18-150300.214.1.x86_64",
            "SUSE Linux Enterprise Micro 5.1:kernel-source-rt-5.3.18-150300.214.1.noarch",
            "SUSE Linux Enterprise Micro 5.2:kernel-rt-5.3.18-150300.214.1.x86_64",
            "SUSE Linux Enterprise Micro 5.2:kernel-source-rt-5.3.18-150300.214.1.noarch"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 5.5,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
            "version": "3.1"
          },
          "products": [
            "SUSE Linux Enterprise Micro 5.1:kernel-rt-5.3.18-150300.214.1.x86_64",
            "SUSE Linux Enterprise Micro 5.1:kernel-source-rt-5.3.18-150300.214.1.noarch",
            "SUSE Linux Enterprise Micro 5.2:kernel-rt-5.3.18-150300.214.1.x86_64",
            "SUSE Linux Enterprise Micro 5.2:kernel-source-rt-5.3.18-150300.214.1.noarch"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2025-07-15T14:20:22Z",
          "details": "moderate"
        }
      ],
      "title": "CVE-2022-49989"
    },
    {
      "cve": "CVE-2022-49990",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2022-49990"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "In the Linux kernel, the following vulnerability has been resolved:\n\ns390: fix double free of GS and RI CBs on fork() failure\n\nThe pointers for guarded storage and runtime instrumentation control\nblocks are stored in the thread_struct of the associated task. These\npointers are initially copied on fork() via arch_dup_task_struct()\nand then cleared via copy_thread() before fork() returns. If fork()\nhappens to fail after the initial task dup and before copy_thread(),\nthe newly allocated task and associated thread_struct memory are\nfreed via free_task() -\u003e arch_release_task_struct(). This results in\na double free of the guarded storage and runtime info structs\nbecause the fields in the failed task still refer to memory\nassociated with the source task.\n\nThis problem can manifest as a BUG_ON() in set_freepointer() (with\nCONFIG_SLAB_FREELIST_HARDENED enabled) or KASAN splat (if enabled)\nwhen running trinity syscall fuzz tests on s390x. To avoid this\nproblem, clear the associated pointer fields in\narch_dup_task_struct() immediately after the new task is copied.\nNote that the RI flag is still cleared in copy_thread() because it\nresides in thread stack memory and that is where stack info is\ncopied.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "SUSE Linux Enterprise Micro 5.1:kernel-rt-5.3.18-150300.214.1.x86_64",
          "SUSE Linux Enterprise Micro 5.1:kernel-source-rt-5.3.18-150300.214.1.noarch",
          "SUSE Linux Enterprise Micro 5.2:kernel-rt-5.3.18-150300.214.1.x86_64",
          "SUSE Linux Enterprise Micro 5.2:kernel-source-rt-5.3.18-150300.214.1.noarch"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2022-49990",
          "url": "https://www.suse.com/security/cve/CVE-2022-49990"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1245006 for CVE-2022-49990",
          "url": "https://bugzilla.suse.com/1245006"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "SUSE Linux Enterprise Micro 5.1:kernel-rt-5.3.18-150300.214.1.x86_64",
            "SUSE Linux Enterprise Micro 5.1:kernel-source-rt-5.3.18-150300.214.1.noarch",
            "SUSE Linux Enterprise Micro 5.2:kernel-rt-5.3.18-150300.214.1.x86_64",
            "SUSE Linux Enterprise Micro 5.2:kernel-source-rt-5.3.18-150300.214.1.noarch"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 5.5,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
            "version": "3.1"
          },
          "products": [
            "SUSE Linux Enterprise Micro 5.1:kernel-rt-5.3.18-150300.214.1.x86_64",
            "SUSE Linux Enterprise Micro 5.1:kernel-source-rt-5.3.18-150300.214.1.noarch",
            "SUSE Linux Enterprise Micro 5.2:kernel-rt-5.3.18-150300.214.1.x86_64",
            "SUSE Linux Enterprise Micro 5.2:kernel-source-rt-5.3.18-150300.214.1.noarch"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2025-07-15T14:20:22Z",
          "details": "moderate"
        }
      ],
      "title": "CVE-2022-49990"
    },
    {
      "cve": "CVE-2022-49993",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2022-49993"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "In the Linux kernel, the following vulnerability has been resolved:\n\nloop: Check for overflow while configuring loop\n\nThe userspace can configure a loop using an ioctl call, wherein\na configuration of type loop_config is passed (see lo_ioctl()\u0027s\ncase on line 1550 of drivers/block/loop.c). This proceeds to call\nloop_configure() which in turn calls loop_set_status_from_info()\n(see line 1050 of loop.c), passing \u0026config-\u003einfo which is of type\nloop_info64*. This function then sets the appropriate values, like\nthe offset.\n\nloop_device has lo_offset of type loff_t (see line 52 of loop.c),\nwhich is typdef-chained to long long, whereas loop_info64 has\nlo_offset of type __u64 (see line 56 of include/uapi/linux/loop.h).\n\nThe function directly copies offset from info to the device as\nfollows (See line 980 of loop.c):\n\tlo-\u003elo_offset = info-\u003elo_offset;\n\nThis results in an overflow, which triggers a warning in iomap_iter()\ndue to a call to iomap_iter_done() which has:\n\tWARN_ON_ONCE(iter-\u003eiomap.offset \u003e iter-\u003epos);\n\nThus, check for negative value during loop_set_status_from_info().\n\nBug report: https://syzkaller.appspot.com/bug?id=c620fe14aac810396d3c3edc9ad73848bf69a29e",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "SUSE Linux Enterprise Micro 5.1:kernel-rt-5.3.18-150300.214.1.x86_64",
          "SUSE Linux Enterprise Micro 5.1:kernel-source-rt-5.3.18-150300.214.1.noarch",
          "SUSE Linux Enterprise Micro 5.2:kernel-rt-5.3.18-150300.214.1.x86_64",
          "SUSE Linux Enterprise Micro 5.2:kernel-source-rt-5.3.18-150300.214.1.noarch"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2022-49993",
          "url": "https://www.suse.com/security/cve/CVE-2022-49993"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1245121 for CVE-2022-49993",
          "url": "https://bugzilla.suse.com/1245121"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "SUSE Linux Enterprise Micro 5.1:kernel-rt-5.3.18-150300.214.1.x86_64",
            "SUSE Linux Enterprise Micro 5.1:kernel-source-rt-5.3.18-150300.214.1.noarch",
            "SUSE Linux Enterprise Micro 5.2:kernel-rt-5.3.18-150300.214.1.x86_64",
            "SUSE Linux Enterprise Micro 5.2:kernel-source-rt-5.3.18-150300.214.1.noarch"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 5.5,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
            "version": "3.1"
          },
          "products": [
            "SUSE Linux Enterprise Micro 5.1:kernel-rt-5.3.18-150300.214.1.x86_64",
            "SUSE Linux Enterprise Micro 5.1:kernel-source-rt-5.3.18-150300.214.1.noarch",
            "SUSE Linux Enterprise Micro 5.2:kernel-rt-5.3.18-150300.214.1.x86_64",
            "SUSE Linux Enterprise Micro 5.2:kernel-source-rt-5.3.18-150300.214.1.noarch"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2025-07-15T14:20:22Z",
          "details": "moderate"
        }
      ],
      "title": "CVE-2022-49993"
    },
    {
      "cve": "CVE-2022-50010",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2022-50010"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "In the Linux kernel, the following vulnerability has been resolved:\n\nvideo: fbdev: i740fb: Check the argument of i740_calc_vclk()\n\nSince the user can control the arguments of the ioctl() from the user\nspace, under special arguments that may result in a divide-by-zero bug.\n\nIf the user provides an improper \u0027pixclock\u0027 value that makes the argumet\nof i740_calc_vclk() less than \u0027I740_RFREQ_FIX\u0027, it will cause a\ndivide-by-zero bug in:\n    drivers/video/fbdev/i740fb.c:353 p_best = min(15, ilog2(I740_MAX_VCO_FREQ / (freq / I740_RFREQ_FIX)));\n\nThe following log can reveal it:\n\ndivide error: 0000 [#1] PREEMPT SMP KASAN PTI\nRIP: 0010:i740_calc_vclk drivers/video/fbdev/i740fb.c:353 [inline]\nRIP: 0010:i740fb_decode_var drivers/video/fbdev/i740fb.c:646 [inline]\nRIP: 0010:i740fb_set_par+0x163f/0x3b70 drivers/video/fbdev/i740fb.c:742\nCall Trace:\n fb_set_var+0x604/0xeb0 drivers/video/fbdev/core/fbmem.c:1034\n do_fb_ioctl+0x234/0x670 drivers/video/fbdev/core/fbmem.c:1110\n fb_ioctl+0xdd/0x130 drivers/video/fbdev/core/fbmem.c:1189\n\nFix this by checking the argument of i740_calc_vclk() first.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "SUSE Linux Enterprise Micro 5.1:kernel-rt-5.3.18-150300.214.1.x86_64",
          "SUSE Linux Enterprise Micro 5.1:kernel-source-rt-5.3.18-150300.214.1.noarch",
          "SUSE Linux Enterprise Micro 5.2:kernel-rt-5.3.18-150300.214.1.x86_64",
          "SUSE Linux Enterprise Micro 5.2:kernel-source-rt-5.3.18-150300.214.1.noarch"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2022-50010",
          "url": "https://www.suse.com/security/cve/CVE-2022-50010"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1245122 for CVE-2022-50010",
          "url": "https://bugzilla.suse.com/1245122"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "SUSE Linux Enterprise Micro 5.1:kernel-rt-5.3.18-150300.214.1.x86_64",
            "SUSE Linux Enterprise Micro 5.1:kernel-source-rt-5.3.18-150300.214.1.noarch",
            "SUSE Linux Enterprise Micro 5.2:kernel-rt-5.3.18-150300.214.1.x86_64",
            "SUSE Linux Enterprise Micro 5.2:kernel-source-rt-5.3.18-150300.214.1.noarch"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 5.5,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
            "version": "3.1"
          },
          "products": [
            "SUSE Linux Enterprise Micro 5.1:kernel-rt-5.3.18-150300.214.1.x86_64",
            "SUSE Linux Enterprise Micro 5.1:kernel-source-rt-5.3.18-150300.214.1.noarch",
            "SUSE Linux Enterprise Micro 5.2:kernel-rt-5.3.18-150300.214.1.x86_64",
            "SUSE Linux Enterprise Micro 5.2:kernel-source-rt-5.3.18-150300.214.1.noarch"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2025-07-15T14:20:22Z",
          "details": "moderate"
        }
      ],
      "title": "CVE-2022-50010"
    },
    {
      "cve": "CVE-2022-50012",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2022-50012"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "In the Linux kernel, the following vulnerability has been resolved:\n\npowerpc/64: Init jump labels before parse_early_param()\n\nOn 64-bit, calling jump_label_init() in setup_feature_keys() is too\nlate because static keys may be used in subroutines of\nparse_early_param() which is again subroutine of early_init_devtree().\n\nFor example booting with \"threadirqs\":\n\n  static_key_enable_cpuslocked(): static key \u00270xc000000002953260\u0027 used before call to jump_label_init()\n  WARNING: CPU: 0 PID: 0 at kernel/jump_label.c:166 static_key_enable_cpuslocked+0xfc/0x120\n  ...\n  NIP static_key_enable_cpuslocked+0xfc/0x120\n  LR  static_key_enable_cpuslocked+0xf8/0x120\n  Call Trace:\n    static_key_enable_cpuslocked+0xf8/0x120 (unreliable)\n    static_key_enable+0x30/0x50\n    setup_forced_irqthreads+0x28/0x40\n    do_early_param+0xa0/0x108\n    parse_args+0x290/0x4e0\n    parse_early_options+0x48/0x5c\n    parse_early_param+0x58/0x84\n    early_init_devtree+0xd4/0x518\n    early_setup+0xb4/0x214\n\nSo call jump_label_init() just before parse_early_param() in\nearly_init_devtree().\n\n[mpe: Add call trace to change log and minor wording edits.]",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "SUSE Linux Enterprise Micro 5.1:kernel-rt-5.3.18-150300.214.1.x86_64",
          "SUSE Linux Enterprise Micro 5.1:kernel-source-rt-5.3.18-150300.214.1.noarch",
          "SUSE Linux Enterprise Micro 5.2:kernel-rt-5.3.18-150300.214.1.x86_64",
          "SUSE Linux Enterprise Micro 5.2:kernel-source-rt-5.3.18-150300.214.1.noarch"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2022-50012",
          "url": "https://www.suse.com/security/cve/CVE-2022-50012"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1245125 for CVE-2022-50012",
          "url": "https://bugzilla.suse.com/1245125"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "SUSE Linux Enterprise Micro 5.1:kernel-rt-5.3.18-150300.214.1.x86_64",
            "SUSE Linux Enterprise Micro 5.1:kernel-source-rt-5.3.18-150300.214.1.noarch",
            "SUSE Linux Enterprise Micro 5.2:kernel-rt-5.3.18-150300.214.1.x86_64",
            "SUSE Linux Enterprise Micro 5.2:kernel-source-rt-5.3.18-150300.214.1.noarch"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 5.5,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
            "version": "3.1"
          },
          "products": [
            "SUSE Linux Enterprise Micro 5.1:kernel-rt-5.3.18-150300.214.1.x86_64",
            "SUSE Linux Enterprise Micro 5.1:kernel-source-rt-5.3.18-150300.214.1.noarch",
            "SUSE Linux Enterprise Micro 5.2:kernel-rt-5.3.18-150300.214.1.x86_64",
            "SUSE Linux Enterprise Micro 5.2:kernel-source-rt-5.3.18-150300.214.1.noarch"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2025-07-15T14:20:22Z",
          "details": "moderate"
        }
      ],
      "title": "CVE-2022-50012"
    },
    {
      "cve": "CVE-2022-50019",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2022-50019"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "In the Linux kernel, the following vulnerability has been resolved:\n\ntty: serial: Fix refcount leak bug in ucc_uart.c\n\nIn soc_info(), of_find_node_by_type() will return a node pointer\nwith refcount incremented. We should use of_node_put() when it is\nnot used anymore.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "SUSE Linux Enterprise Micro 5.1:kernel-rt-5.3.18-150300.214.1.x86_64",
          "SUSE Linux Enterprise Micro 5.1:kernel-source-rt-5.3.18-150300.214.1.noarch",
          "SUSE Linux Enterprise Micro 5.2:kernel-rt-5.3.18-150300.214.1.x86_64",
          "SUSE Linux Enterprise Micro 5.2:kernel-source-rt-5.3.18-150300.214.1.noarch"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2022-50019",
          "url": "https://www.suse.com/security/cve/CVE-2022-50019"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1245098 for CVE-2022-50019",
          "url": "https://bugzilla.suse.com/1245098"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "SUSE Linux Enterprise Micro 5.1:kernel-rt-5.3.18-150300.214.1.x86_64",
            "SUSE Linux Enterprise Micro 5.1:kernel-source-rt-5.3.18-150300.214.1.noarch",
            "SUSE Linux Enterprise Micro 5.2:kernel-rt-5.3.18-150300.214.1.x86_64",
            "SUSE Linux Enterprise Micro 5.2:kernel-source-rt-5.3.18-150300.214.1.noarch"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 5.5,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
            "version": "3.1"
          },
          "products": [
            "SUSE Linux Enterprise Micro 5.1:kernel-rt-5.3.18-150300.214.1.x86_64",
            "SUSE Linux Enterprise Micro 5.1:kernel-source-rt-5.3.18-150300.214.1.noarch",
            "SUSE Linux Enterprise Micro 5.2:kernel-rt-5.3.18-150300.214.1.x86_64",
            "SUSE Linux Enterprise Micro 5.2:kernel-source-rt-5.3.18-150300.214.1.noarch"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2025-07-15T14:20:22Z",
          "details": "moderate"
        }
      ],
      "title": "CVE-2022-50019"
    },
    {
      "cve": "CVE-2022-50020",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2022-50020"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "In the Linux kernel, the following vulnerability has been resolved:\n\next4: avoid resizing to a partial cluster size\n\nThis patch avoids an attempt to resize the filesystem to an\nunaligned cluster boundary.  An online resize to a size that is not\nintegral to cluster size results in the last iteration attempting to\ngrow the fs by a negative amount, which trips a BUG_ON and leaves the fs\nwith a corrupted in-memory superblock.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "SUSE Linux Enterprise Micro 5.1:kernel-rt-5.3.18-150300.214.1.x86_64",
          "SUSE Linux Enterprise Micro 5.1:kernel-source-rt-5.3.18-150300.214.1.noarch",
          "SUSE Linux Enterprise Micro 5.2:kernel-rt-5.3.18-150300.214.1.x86_64",
          "SUSE Linux Enterprise Micro 5.2:kernel-source-rt-5.3.18-150300.214.1.noarch"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2022-50020",
          "url": "https://www.suse.com/security/cve/CVE-2022-50020"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1245129 for CVE-2022-50020",
          "url": "https://bugzilla.suse.com/1245129"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1245130 for CVE-2022-50020",
          "url": "https://bugzilla.suse.com/1245130"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "SUSE Linux Enterprise Micro 5.1:kernel-rt-5.3.18-150300.214.1.x86_64",
            "SUSE Linux Enterprise Micro 5.1:kernel-source-rt-5.3.18-150300.214.1.noarch",
            "SUSE Linux Enterprise Micro 5.2:kernel-rt-5.3.18-150300.214.1.x86_64",
            "SUSE Linux Enterprise Micro 5.2:kernel-source-rt-5.3.18-150300.214.1.noarch"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 6,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:H/A:H",
            "version": "3.1"
          },
          "products": [
            "SUSE Linux Enterprise Micro 5.1:kernel-rt-5.3.18-150300.214.1.x86_64",
            "SUSE Linux Enterprise Micro 5.1:kernel-source-rt-5.3.18-150300.214.1.noarch",
            "SUSE Linux Enterprise Micro 5.2:kernel-rt-5.3.18-150300.214.1.x86_64",
            "SUSE Linux Enterprise Micro 5.2:kernel-source-rt-5.3.18-150300.214.1.noarch"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2025-07-15T14:20:22Z",
          "details": "moderate"
        }
      ],
      "title": "CVE-2022-50020"
    },
    {
      "cve": "CVE-2022-50022",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2022-50022"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "In the Linux kernel, the following vulnerability has been resolved:\n\ndrivers:md:fix a potential use-after-free bug\n\nIn line 2884, \"raid5_release_stripe(sh);\" drops the reference to sh and\nmay cause sh to be released. However, sh is subsequently used in lines\n2886 \"if (sh-\u003ebatch_head \u0026\u0026 sh != sh-\u003ebatch_head)\". This may result in an\nuse-after-free bug.\n\nIt can be fixed by moving \"raid5_release_stripe(sh);\" to the bottom of\nthe function.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "SUSE Linux Enterprise Micro 5.1:kernel-rt-5.3.18-150300.214.1.x86_64",
          "SUSE Linux Enterprise Micro 5.1:kernel-source-rt-5.3.18-150300.214.1.noarch",
          "SUSE Linux Enterprise Micro 5.2:kernel-rt-5.3.18-150300.214.1.x86_64",
          "SUSE Linux Enterprise Micro 5.2:kernel-source-rt-5.3.18-150300.214.1.noarch"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2022-50022",
          "url": "https://www.suse.com/security/cve/CVE-2022-50022"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1245131 for CVE-2022-50022",
          "url": "https://bugzilla.suse.com/1245131"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "SUSE Linux Enterprise Micro 5.1:kernel-rt-5.3.18-150300.214.1.x86_64",
            "SUSE Linux Enterprise Micro 5.1:kernel-source-rt-5.3.18-150300.214.1.noarch",
            "SUSE Linux Enterprise Micro 5.2:kernel-rt-5.3.18-150300.214.1.x86_64",
            "SUSE Linux Enterprise Micro 5.2:kernel-source-rt-5.3.18-150300.214.1.noarch"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 6.6,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:H",
            "version": "3.1"
          },
          "products": [
            "SUSE Linux Enterprise Micro 5.1:kernel-rt-5.3.18-150300.214.1.x86_64",
            "SUSE Linux Enterprise Micro 5.1:kernel-source-rt-5.3.18-150300.214.1.noarch",
            "SUSE Linux Enterprise Micro 5.2:kernel-rt-5.3.18-150300.214.1.x86_64",
            "SUSE Linux Enterprise Micro 5.2:kernel-source-rt-5.3.18-150300.214.1.noarch"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2025-07-15T14:20:22Z",
          "details": "moderate"
        }
      ],
      "title": "CVE-2022-50022"
    },
    {
      "cve": "CVE-2022-50027",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2022-50027"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "In the Linux kernel, the following vulnerability has been resolved:\n\nscsi: lpfc: Fix possible memory leak when failing to issue CMF WQE\n\nThere is no corresponding free routine if lpfc_sli4_issue_wqe fails to\nissue the CMF WQE in lpfc_issue_cmf_sync_wqe.\n\nIf ret_val is non-zero, then free the iocbq request structure.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "SUSE Linux Enterprise Micro 5.1:kernel-rt-5.3.18-150300.214.1.x86_64",
          "SUSE Linux Enterprise Micro 5.1:kernel-source-rt-5.3.18-150300.214.1.noarch",
          "SUSE Linux Enterprise Micro 5.2:kernel-rt-5.3.18-150300.214.1.x86_64",
          "SUSE Linux Enterprise Micro 5.2:kernel-source-rt-5.3.18-150300.214.1.noarch"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2022-50027",
          "url": "https://www.suse.com/security/cve/CVE-2022-50027"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1245073 for CVE-2022-50027",
          "url": "https://bugzilla.suse.com/1245073"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "SUSE Linux Enterprise Micro 5.1:kernel-rt-5.3.18-150300.214.1.x86_64",
            "SUSE Linux Enterprise Micro 5.1:kernel-source-rt-5.3.18-150300.214.1.noarch",
            "SUSE Linux Enterprise Micro 5.2:kernel-rt-5.3.18-150300.214.1.x86_64",
            "SUSE Linux Enterprise Micro 5.2:kernel-source-rt-5.3.18-150300.214.1.noarch"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 5.5,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
            "version": "3.1"
          },
          "products": [
            "SUSE Linux Enterprise Micro 5.1:kernel-rt-5.3.18-150300.214.1.x86_64",
            "SUSE Linux Enterprise Micro 5.1:kernel-source-rt-5.3.18-150300.214.1.noarch",
            "SUSE Linux Enterprise Micro 5.2:kernel-rt-5.3.18-150300.214.1.x86_64",
            "SUSE Linux Enterprise Micro 5.2:kernel-source-rt-5.3.18-150300.214.1.noarch"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2025-07-15T14:20:22Z",
          "details": "moderate"
        }
      ],
      "title": "CVE-2022-50027"
    },
    {
      "cve": "CVE-2022-50028",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2022-50028"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "In the Linux kernel, the following vulnerability has been resolved:\n\ngadgetfs: ep_io - wait until IRQ finishes\n\nafter usb_ep_queue() if wait_for_completion_interruptible() is\ninterrupted we need to wait until IRQ gets finished.\n\nOtherwise complete() from epio_complete() can corrupt stack.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "SUSE Linux Enterprise Micro 5.1:kernel-rt-5.3.18-150300.214.1.x86_64",
          "SUSE Linux Enterprise Micro 5.1:kernel-source-rt-5.3.18-150300.214.1.noarch",
          "SUSE Linux Enterprise Micro 5.2:kernel-rt-5.3.18-150300.214.1.x86_64",
          "SUSE Linux Enterprise Micro 5.2:kernel-source-rt-5.3.18-150300.214.1.noarch"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2022-50028",
          "url": "https://www.suse.com/security/cve/CVE-2022-50028"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1245135 for CVE-2022-50028",
          "url": "https://bugzilla.suse.com/1245135"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "SUSE Linux Enterprise Micro 5.1:kernel-rt-5.3.18-150300.214.1.x86_64",
            "SUSE Linux Enterprise Micro 5.1:kernel-source-rt-5.3.18-150300.214.1.noarch",
            "SUSE Linux Enterprise Micro 5.2:kernel-rt-5.3.18-150300.214.1.x86_64",
            "SUSE Linux Enterprise Micro 5.2:kernel-source-rt-5.3.18-150300.214.1.noarch"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 6.1,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:H",
            "version": "3.1"
          },
          "products": [
            "SUSE Linux Enterprise Micro 5.1:kernel-rt-5.3.18-150300.214.1.x86_64",
            "SUSE Linux Enterprise Micro 5.1:kernel-source-rt-5.3.18-150300.214.1.noarch",
            "SUSE Linux Enterprise Micro 5.2:kernel-rt-5.3.18-150300.214.1.x86_64",
            "SUSE Linux Enterprise Micro 5.2:kernel-source-rt-5.3.18-150300.214.1.noarch"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2025-07-15T14:20:22Z",
          "details": "moderate"
        }
      ],
      "title": "CVE-2022-50028"
    },
    {
      "cve": "CVE-2022-50029",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2022-50029"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "In the Linux kernel, the following vulnerability has been resolved:\n\nclk: qcom: ipq8074: dont disable gcc_sleep_clk_src\n\nOnce the usb sleep clocks are disabled, clock framework is trying to\ndisable the sleep clock source also.\n\nHowever, it seems that it cannot be disabled and trying to do so produces:\n[  245.436390] ------------[ cut here ]------------\n[  245.441233] gcc_sleep_clk_src status stuck at \u0027on\u0027\n[  245.441254] WARNING: CPU: 2 PID: 223 at clk_branch_wait+0x130/0x140\n[  245.450435] Modules linked in: xhci_plat_hcd xhci_hcd dwc3 dwc3_qcom leds_gpio\n[  245.456601] CPU: 2 PID: 223 Comm: sh Not tainted 5.18.0-rc4 #215\n[  245.463889] Hardware name: Xiaomi AX9000 (DT)\n[  245.470050] pstate: 204000c5 (nzCv daIF +PAN -UAO -TCO -DIT -SSBS BTYPE=--)\n[  245.474307] pc : clk_branch_wait+0x130/0x140\n[  245.481073] lr : clk_branch_wait+0x130/0x140\n[  245.485588] sp : ffffffc009f2bad0\n[  245.489838] x29: ffffffc009f2bad0 x28: ffffff8003e6c800 x27: 0000000000000000\n[  245.493057] x26: 0000000000000000 x25: 0000000000000000 x24: ffffff800226ef20\n[  245.500175] x23: ffffffc0089ff550 x22: 0000000000000000 x21: ffffffc008476ad0\n[  245.507294] x20: 0000000000000000 x19: ffffffc00965ac70 x18: fffffffffffc51a7\n[  245.514413] x17: 68702e3030303837 x16: 3a6d726f6674616c x15: ffffffc089f2b777\n[  245.521531] x14: ffffffc0095c9d18 x13: 0000000000000129 x12: 0000000000000129\n[  245.528649] x11: 00000000ffffffea x10: ffffffc009621d18 x9 : 0000000000000001\n[  245.535767] x8 : 0000000000000001 x7 : 0000000000017fe8 x6 : 0000000000000001\n[  245.542885] x5 : ffffff803fdca6d8 x4 : 0000000000000000 x3 : 0000000000000027\n[  245.550002] x2 : 0000000000000027 x1 : 0000000000000023 x0 : 0000000000000026\n[  245.557122] Call trace:\n[  245.564229]  clk_branch_wait+0x130/0x140\n[  245.566490]  clk_branch2_disable+0x2c/0x40\n[  245.570656]  clk_core_disable+0x60/0xb0\n[  245.574561]  clk_core_disable+0x68/0xb0\n[  245.578293]  clk_disable+0x30/0x50\n[  245.582113]  dwc3_qcom_remove+0x60/0xc0 [dwc3_qcom]\n[  245.585588]  platform_remove+0x28/0x60\n[  245.590361]  device_remove+0x4c/0x80\n[  245.594179]  device_release_driver_internal+0x1dc/0x230\n[  245.597914]  device_driver_detach+0x18/0x30\n[  245.602861]  unbind_store+0xec/0x110\n[  245.607027]  drv_attr_store+0x24/0x40\n[  245.610847]  sysfs_kf_write+0x44/0x60\n[  245.614405]  kernfs_fop_write_iter+0x128/0x1c0\n[  245.618052]  new_sync_write+0xc0/0x130\n[  245.622391]  vfs_write+0x1d4/0x2a0\n[  245.626123]  ksys_write+0x58/0xe0\n[  245.629508]  __arm64_sys_write+0x1c/0x30\n[  245.632895]  invoke_syscall.constprop.0+0x5c/0x110\n[  245.636890]  do_el0_svc+0xa0/0x150\n[  245.641488]  el0_svc+0x18/0x60\n[  245.644872]  el0t_64_sync_handler+0xa4/0x130\n[  245.647914]  el0t_64_sync+0x174/0x178\n[  245.652340] ---[ end trace 0000000000000000 ]---\n\nSo, add CLK_IS_CRITICAL flag to the clock so that the kernel won\u0027t try\nto disable the sleep clock.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "SUSE Linux Enterprise Micro 5.1:kernel-rt-5.3.18-150300.214.1.x86_64",
          "SUSE Linux Enterprise Micro 5.1:kernel-source-rt-5.3.18-150300.214.1.noarch",
          "SUSE Linux Enterprise Micro 5.2:kernel-rt-5.3.18-150300.214.1.x86_64",
          "SUSE Linux Enterprise Micro 5.2:kernel-source-rt-5.3.18-150300.214.1.noarch"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2022-50029",
          "url": "https://www.suse.com/security/cve/CVE-2022-50029"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1245146 for CVE-2022-50029",
          "url": "https://bugzilla.suse.com/1245146"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "SUSE Linux Enterprise Micro 5.1:kernel-rt-5.3.18-150300.214.1.x86_64",
            "SUSE Linux Enterprise Micro 5.1:kernel-source-rt-5.3.18-150300.214.1.noarch",
            "SUSE Linux Enterprise Micro 5.2:kernel-rt-5.3.18-150300.214.1.x86_64",
            "SUSE Linux Enterprise Micro 5.2:kernel-source-rt-5.3.18-150300.214.1.noarch"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 5.5,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
            "version": "3.1"
          },
          "products": [
            "SUSE Linux Enterprise Micro 5.1:kernel-rt-5.3.18-150300.214.1.x86_64",
            "SUSE Linux Enterprise Micro 5.1:kernel-source-rt-5.3.18-150300.214.1.noarch",
            "SUSE Linux Enterprise Micro 5.2:kernel-rt-5.3.18-150300.214.1.x86_64",
            "SUSE Linux Enterprise Micro 5.2:kernel-source-rt-5.3.18-150300.214.1.noarch"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2025-07-15T14:20:22Z",
          "details": "moderate"
        }
      ],
      "title": "CVE-2022-50029"
    },
    {
      "cve": "CVE-2022-50030",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2022-50030"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "In the Linux kernel, the following vulnerability has been resolved:\n\nscsi: lpfc: Prevent buffer overflow crashes in debugfs with malformed user input\n\nMalformed user input to debugfs results in buffer overflow crashes.  Adapt\ninput string lengths to fit within internal buffers, leaving space for NULL\nterminators.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "SUSE Linux Enterprise Micro 5.1:kernel-rt-5.3.18-150300.214.1.x86_64",
          "SUSE Linux Enterprise Micro 5.1:kernel-source-rt-5.3.18-150300.214.1.noarch",
          "SUSE Linux Enterprise Micro 5.2:kernel-rt-5.3.18-150300.214.1.x86_64",
          "SUSE Linux Enterprise Micro 5.2:kernel-source-rt-5.3.18-150300.214.1.noarch"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2022-50030",
          "url": "https://www.suse.com/security/cve/CVE-2022-50030"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1245265 for CVE-2022-50030",
          "url": "https://bugzilla.suse.com/1245265"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "SUSE Linux Enterprise Micro 5.1:kernel-rt-5.3.18-150300.214.1.x86_64",
            "SUSE Linux Enterprise Micro 5.1:kernel-source-rt-5.3.18-150300.214.1.noarch",
            "SUSE Linux Enterprise Micro 5.2:kernel-rt-5.3.18-150300.214.1.x86_64",
            "SUSE Linux Enterprise Micro 5.2:kernel-source-rt-5.3.18-150300.214.1.noarch"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 6.4,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H",
            "version": "3.1"
          },
          "products": [
            "SUSE Linux Enterprise Micro 5.1:kernel-rt-5.3.18-150300.214.1.x86_64",
            "SUSE Linux Enterprise Micro 5.1:kernel-source-rt-5.3.18-150300.214.1.noarch",
            "SUSE Linux Enterprise Micro 5.2:kernel-rt-5.3.18-150300.214.1.x86_64",
            "SUSE Linux Enterprise Micro 5.2:kernel-source-rt-5.3.18-150300.214.1.noarch"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2025-07-15T14:20:22Z",
          "details": "important"
        }
      ],
      "title": "CVE-2022-50030"
    },
    {
      "cve": "CVE-2022-50032",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2022-50032"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "In the Linux kernel, the following vulnerability has been resolved:\n\nusb: renesas: Fix refcount leak bug\n\nIn usbhs_rza1_hardware_init(), of_find_node_by_name() will return\na node pointer with refcount incremented. We should use of_node_put()\nwhen it is not used anymore.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "SUSE Linux Enterprise Micro 5.1:kernel-rt-5.3.18-150300.214.1.x86_64",
          "SUSE Linux Enterprise Micro 5.1:kernel-source-rt-5.3.18-150300.214.1.noarch",
          "SUSE Linux Enterprise Micro 5.2:kernel-rt-5.3.18-150300.214.1.x86_64",
          "SUSE Linux Enterprise Micro 5.2:kernel-source-rt-5.3.18-150300.214.1.noarch"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2022-50032",
          "url": "https://www.suse.com/security/cve/CVE-2022-50032"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1245103 for CVE-2022-50032",
          "url": "https://bugzilla.suse.com/1245103"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "SUSE Linux Enterprise Micro 5.1:kernel-rt-5.3.18-150300.214.1.x86_64",
            "SUSE Linux Enterprise Micro 5.1:kernel-source-rt-5.3.18-150300.214.1.noarch",
            "SUSE Linux Enterprise Micro 5.2:kernel-rt-5.3.18-150300.214.1.x86_64",
            "SUSE Linux Enterprise Micro 5.2:kernel-source-rt-5.3.18-150300.214.1.noarch"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 5.5,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
            "version": "3.1"
          },
          "products": [
            "SUSE Linux Enterprise Micro 5.1:kernel-rt-5.3.18-150300.214.1.x86_64",
            "SUSE Linux Enterprise Micro 5.1:kernel-source-rt-5.3.18-150300.214.1.noarch",
            "SUSE Linux Enterprise Micro 5.2:kernel-rt-5.3.18-150300.214.1.x86_64",
            "SUSE Linux Enterprise Micro 5.2:kernel-source-rt-5.3.18-150300.214.1.noarch"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2025-07-15T14:20:22Z",
          "details": "moderate"
        }
      ],
      "title": "CVE-2022-50032"
    },
    {
      "cve": "CVE-2022-50033",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2022-50033"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "In the Linux kernel, the following vulnerability has been resolved:\n\nusb: host: ohci-ppc-of: Fix refcount leak bug\n\nIn ohci_hcd_ppc_of_probe(), of_find_compatible_node() will return\na node pointer with refcount incremented. We should use of_node_put()\nwhen it is not used anymore.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "SUSE Linux Enterprise Micro 5.1:kernel-rt-5.3.18-150300.214.1.x86_64",
          "SUSE Linux Enterprise Micro 5.1:kernel-source-rt-5.3.18-150300.214.1.noarch",
          "SUSE Linux Enterprise Micro 5.2:kernel-rt-5.3.18-150300.214.1.x86_64",
          "SUSE Linux Enterprise Micro 5.2:kernel-source-rt-5.3.18-150300.214.1.noarch"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2022-50033",
          "url": "https://www.suse.com/security/cve/CVE-2022-50033"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1245139 for CVE-2022-50033",
          "url": "https://bugzilla.suse.com/1245139"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "SUSE Linux Enterprise Micro 5.1:kernel-rt-5.3.18-150300.214.1.x86_64",
            "SUSE Linux Enterprise Micro 5.1:kernel-source-rt-5.3.18-150300.214.1.noarch",
            "SUSE Linux Enterprise Micro 5.2:kernel-rt-5.3.18-150300.214.1.x86_64",
            "SUSE Linux Enterprise Micro 5.2:kernel-source-rt-5.3.18-150300.214.1.noarch"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 5.5,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
            "version": "3.1"
          },
          "products": [
            "SUSE Linux Enterprise Micro 5.1:kernel-rt-5.3.18-150300.214.1.x86_64",
            "SUSE Linux Enterprise Micro 5.1:kernel-source-rt-5.3.18-150300.214.1.noarch",
            "SUSE Linux Enterprise Micro 5.2:kernel-rt-5.3.18-150300.214.1.x86_64",
            "SUSE Linux Enterprise Micro 5.2:kernel-source-rt-5.3.18-150300.214.1.noarch"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2025-07-15T14:20:22Z",
          "details": "moderate"
        }
      ],
      "title": "CVE-2022-50033"
    },
    {
      "cve": "CVE-2022-50036",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2022-50036"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "In the Linux kernel, the following vulnerability has been resolved:\n\ndrm/sun4i: dsi: Prevent underflow when computing packet sizes\n\nCurrently, the packet overhead is subtracted using unsigned arithmetic.\nWith a short sync pulse, this could underflow and wrap around to near\nthe maximal u16 value. Fix this by using signed subtraction. The call to\nmax() will correctly handle any negative numbers that are produced.\n\nApply the same fix to the other timings, even though those subtractions\nare less likely to underflow.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "SUSE Linux Enterprise Micro 5.1:kernel-rt-5.3.18-150300.214.1.x86_64",
          "SUSE Linux Enterprise Micro 5.1:kernel-source-rt-5.3.18-150300.214.1.noarch",
          "SUSE Linux Enterprise Micro 5.2:kernel-rt-5.3.18-150300.214.1.x86_64",
          "SUSE Linux Enterprise Micro 5.2:kernel-source-rt-5.3.18-150300.214.1.noarch"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2022-50036",
          "url": "https://www.suse.com/security/cve/CVE-2022-50036"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1244941 for CVE-2022-50036",
          "url": "https://bugzilla.suse.com/1244941"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "SUSE Linux Enterprise Micro 5.1:kernel-rt-5.3.18-150300.214.1.x86_64",
            "SUSE Linux Enterprise Micro 5.1:kernel-source-rt-5.3.18-150300.214.1.noarch",
            "SUSE Linux Enterprise Micro 5.2:kernel-rt-5.3.18-150300.214.1.x86_64",
            "SUSE Linux Enterprise Micro 5.2:kernel-source-rt-5.3.18-150300.214.1.noarch"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 5.5,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
            "version": "3.1"
          },
          "products": [
            "SUSE Linux Enterprise Micro 5.1:kernel-rt-5.3.18-150300.214.1.x86_64",
            "SUSE Linux Enterprise Micro 5.1:kernel-source-rt-5.3.18-150300.214.1.noarch",
            "SUSE Linux Enterprise Micro 5.2:kernel-rt-5.3.18-150300.214.1.x86_64",
            "SUSE Linux Enterprise Micro 5.2:kernel-source-rt-5.3.18-150300.214.1.noarch"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2025-07-15T14:20:22Z",
          "details": "moderate"
        }
      ],
      "title": "CVE-2022-50036"
    },
    {
      "cve": "CVE-2022-50038",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2022-50038"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "In the Linux kernel, the following vulnerability has been resolved:\n\ndrm/meson: Fix refcount bugs in meson_vpu_has_available_connectors()\n\nIn this function, there are two refcount leak bugs:\n(1) when breaking out of for_each_endpoint_of_node(), we need call\nthe of_node_put() for the \u0027ep\u0027;\n(2) we should call of_node_put() for the reference returned by\nof_graph_get_remote_port() when it is not used anymore.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "SUSE Linux Enterprise Micro 5.1:kernel-rt-5.3.18-150300.214.1.x86_64",
          "SUSE Linux Enterprise Micro 5.1:kernel-source-rt-5.3.18-150300.214.1.noarch",
          "SUSE Linux Enterprise Micro 5.2:kernel-rt-5.3.18-150300.214.1.x86_64",
          "SUSE Linux Enterprise Micro 5.2:kernel-source-rt-5.3.18-150300.214.1.noarch"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2022-50038",
          "url": "https://www.suse.com/security/cve/CVE-2022-50038"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1244943 for CVE-2022-50038",
          "url": "https://bugzilla.suse.com/1244943"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "SUSE Linux Enterprise Micro 5.1:kernel-rt-5.3.18-150300.214.1.x86_64",
            "SUSE Linux Enterprise Micro 5.1:kernel-source-rt-5.3.18-150300.214.1.noarch",
            "SUSE Linux Enterprise Micro 5.2:kernel-rt-5.3.18-150300.214.1.x86_64",
            "SUSE Linux Enterprise Micro 5.2:kernel-source-rt-5.3.18-150300.214.1.noarch"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 5.5,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
            "version": "3.1"
          },
          "products": [
            "SUSE Linux Enterprise Micro 5.1:kernel-rt-5.3.18-150300.214.1.x86_64",
            "SUSE Linux Enterprise Micro 5.1:kernel-source-rt-5.3.18-150300.214.1.noarch",
            "SUSE Linux Enterprise Micro 5.2:kernel-rt-5.3.18-150300.214.1.x86_64",
            "SUSE Linux Enterprise Micro 5.2:kernel-source-rt-5.3.18-150300.214.1.noarch"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2025-07-15T14:20:22Z",
          "details": "moderate"
        }
      ],
      "title": "CVE-2022-50038"
    },
    {
      "cve": "CVE-2022-50045",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2022-50045"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "In the Linux kernel, the following vulnerability has been resolved:\n\npowerpc/pci: Fix get_phb_number() locking\n\nThe recent change to get_phb_number() causes a DEBUG_ATOMIC_SLEEP\nwarning on some systems:\n\n  BUG: sleeping function called from invalid context at kernel/locking/mutex.c:580\n  in_atomic(): 1, irqs_disabled(): 0, non_block: 0, pid: 1, name: swapper\n  preempt_count: 1, expected: 0\n  RCU nest depth: 0, expected: 0\n  1 lock held by swapper/1:\n   #0: c157efb0 (hose_spinlock){+.+.}-{2:2}, at: pcibios_alloc_controller+0x64/0x220\n  Preemption disabled at:\n  [\u003c00000000\u003e] 0x0\n  CPU: 0 PID: 1 Comm: swapper Not tainted 5.19.0-yocto-standard+ #1\n  Call Trace:\n  [d101dc90] [c073b264] dump_stack_lvl+0x50/0x8c (unreliable)\n  [d101dcb0] [c0093b70] __might_resched+0x258/0x2a8\n  [d101dcd0] [c0d3e634] __mutex_lock+0x6c/0x6ec\n  [d101dd50] [c0a84174] of_alias_get_id+0x50/0xf4\n  [d101dd80] [c002ec78] pcibios_alloc_controller+0x1b8/0x220\n  [d101ddd0] [c140c9dc] pmac_pci_init+0x198/0x784\n  [d101de50] [c140852c] discover_phbs+0x30/0x4c\n  [d101de60] [c0007fd4] do_one_initcall+0x94/0x344\n  [d101ded0] [c1403b40] kernel_init_freeable+0x1a8/0x22c\n  [d101df10] [c00086e0] kernel_init+0x34/0x160\n  [d101df30] [c001b334] ret_from_kernel_thread+0x5c/0x64\n\nThis is because pcibios_alloc_controller() holds hose_spinlock but\nof_alias_get_id() takes of_mutex which can sleep.\n\nThe hose_spinlock protects the phb_bitmap, and also the hose_list, but\nit doesn\u0027t need to be held while get_phb_number() calls the OF routines,\nbecause those are only looking up information in the device tree.\n\nSo fix it by having get_phb_number() take the hose_spinlock itself, only\nwhere required, and then dropping the lock before returning.\npcibios_alloc_controller() then needs to take the lock again before the\nlist_add() but that\u0027s safe, the order of the list is not important.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "SUSE Linux Enterprise Micro 5.1:kernel-rt-5.3.18-150300.214.1.x86_64",
          "SUSE Linux Enterprise Micro 5.1:kernel-source-rt-5.3.18-150300.214.1.noarch",
          "SUSE Linux Enterprise Micro 5.2:kernel-rt-5.3.18-150300.214.1.x86_64",
          "SUSE Linux Enterprise Micro 5.2:kernel-source-rt-5.3.18-150300.214.1.noarch"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2022-50045",
          "url": "https://www.suse.com/security/cve/CVE-2022-50045"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1244967 for CVE-2022-50045",
          "url": "https://bugzilla.suse.com/1244967"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "SUSE Linux Enterprise Micro 5.1:kernel-rt-5.3.18-150300.214.1.x86_64",
            "SUSE Linux Enterprise Micro 5.1:kernel-source-rt-5.3.18-150300.214.1.noarch",
            "SUSE Linux Enterprise Micro 5.2:kernel-rt-5.3.18-150300.214.1.x86_64",
            "SUSE Linux Enterprise Micro 5.2:kernel-source-rt-5.3.18-150300.214.1.noarch"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 5.5,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
            "version": "3.1"
          },
          "products": [
            "SUSE Linux Enterprise Micro 5.1:kernel-rt-5.3.18-150300.214.1.x86_64",
            "SUSE Linux Enterprise Micro 5.1:kernel-source-rt-5.3.18-150300.214.1.noarch",
            "SUSE Linux Enterprise Micro 5.2:kernel-rt-5.3.18-150300.214.1.x86_64",
            "SUSE Linux Enterprise Micro 5.2:kernel-source-rt-5.3.18-150300.214.1.noarch"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2025-07-15T14:20:22Z",
          "details": "moderate"
        }
      ],
      "title": "CVE-2022-50045"
    },
    {
      "cve": "CVE-2022-50051",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2022-50051"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "In the Linux kernel, the following vulnerability has been resolved:\n\nASoC: SOF: debug: Fix potential buffer overflow by snprintf()\n\nsnprintf() returns the would-be-filled size when the string overflows\nthe given buffer size, hence using this value may result in the buffer\noverflow (although it\u0027s unrealistic).\n\nThis patch replaces with a safer version, scnprintf() for papering\nover such a potential issue.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "SUSE Linux Enterprise Micro 5.1:kernel-rt-5.3.18-150300.214.1.x86_64",
          "SUSE Linux Enterprise Micro 5.1:kernel-source-rt-5.3.18-150300.214.1.noarch",
          "SUSE Linux Enterprise Micro 5.2:kernel-rt-5.3.18-150300.214.1.x86_64",
          "SUSE Linux Enterprise Micro 5.2:kernel-source-rt-5.3.18-150300.214.1.noarch"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2022-50051",
          "url": "https://www.suse.com/security/cve/CVE-2022-50051"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1245041 for CVE-2022-50051",
          "url": "https://bugzilla.suse.com/1245041"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "SUSE Linux Enterprise Micro 5.1:kernel-rt-5.3.18-150300.214.1.x86_64",
            "SUSE Linux Enterprise Micro 5.1:kernel-source-rt-5.3.18-150300.214.1.noarch",
            "SUSE Linux Enterprise Micro 5.2:kernel-rt-5.3.18-150300.214.1.x86_64",
            "SUSE Linux Enterprise Micro 5.2:kernel-source-rt-5.3.18-150300.214.1.noarch"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 5.5,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
            "version": "3.1"
          },
          "products": [
            "SUSE Linux Enterprise Micro 5.1:kernel-rt-5.3.18-150300.214.1.x86_64",
            "SUSE Linux Enterprise Micro 5.1:kernel-source-rt-5.3.18-150300.214.1.noarch",
            "SUSE Linux Enterprise Micro 5.2:kernel-rt-5.3.18-150300.214.1.x86_64",
            "SUSE Linux Enterprise Micro 5.2:kernel-source-rt-5.3.18-150300.214.1.noarch"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2025-07-15T14:20:22Z",
          "details": "moderate"
        }
      ],
      "title": "CVE-2022-50051"
    },
    {
      "cve": "CVE-2022-50059",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2022-50059"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "In the Linux kernel, the following vulnerability has been resolved:\n\nceph: don\u0027t leak snap_rwsem in handle_cap_grant\n\nWhen handle_cap_grant is called on an IMPORT op, then the snap_rwsem is\nheld and the function is expected to release it before returning. It\ncurrently fails to do that in all cases which could lead to a deadlock.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "SUSE Linux Enterprise Micro 5.1:kernel-rt-5.3.18-150300.214.1.x86_64",
          "SUSE Linux Enterprise Micro 5.1:kernel-source-rt-5.3.18-150300.214.1.noarch",
          "SUSE Linux Enterprise Micro 5.2:kernel-rt-5.3.18-150300.214.1.x86_64",
          "SUSE Linux Enterprise Micro 5.2:kernel-source-rt-5.3.18-150300.214.1.noarch"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2022-50059",
          "url": "https://www.suse.com/security/cve/CVE-2022-50059"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1245031 for CVE-2022-50059",
          "url": "https://bugzilla.suse.com/1245031"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "SUSE Linux Enterprise Micro 5.1:kernel-rt-5.3.18-150300.214.1.x86_64",
            "SUSE Linux Enterprise Micro 5.1:kernel-source-rt-5.3.18-150300.214.1.noarch",
            "SUSE Linux Enterprise Micro 5.2:kernel-rt-5.3.18-150300.214.1.x86_64",
            "SUSE Linux Enterprise Micro 5.2:kernel-source-rt-5.3.18-150300.214.1.noarch"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 5.5,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
            "version": "3.1"
          },
          "products": [
            "SUSE Linux Enterprise Micro 5.1:kernel-rt-5.3.18-150300.214.1.x86_64",
            "SUSE Linux Enterprise Micro 5.1:kernel-source-rt-5.3.18-150300.214.1.noarch",
            "SUSE Linux Enterprise Micro 5.2:kernel-rt-5.3.18-150300.214.1.x86_64",
            "SUSE Linux Enterprise Micro 5.2:kernel-source-rt-5.3.18-150300.214.1.noarch"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2025-07-15T14:20:22Z",
          "details": "moderate"
        }
      ],
      "title": "CVE-2022-50059"
    },
    {
      "cve": "CVE-2022-50061",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2022-50061"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "In the Linux kernel, the following vulnerability has been resolved:\n\npinctrl: nomadik: Fix refcount leak in nmk_pinctrl_dt_subnode_to_map\n\nof_parse_phandle() returns a node pointer with refcount\nincremented, we should use of_node_put() on it when not need anymore.\nAdd missing of_node_put() to avoid refcount leak.\"",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "SUSE Linux Enterprise Micro 5.1:kernel-rt-5.3.18-150300.214.1.x86_64",
          "SUSE Linux Enterprise Micro 5.1:kernel-source-rt-5.3.18-150300.214.1.noarch",
          "SUSE Linux Enterprise Micro 5.2:kernel-rt-5.3.18-150300.214.1.x86_64",
          "SUSE Linux Enterprise Micro 5.2:kernel-source-rt-5.3.18-150300.214.1.noarch"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2022-50061",
          "url": "https://www.suse.com/security/cve/CVE-2022-50061"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1245033 for CVE-2022-50061",
          "url": "https://bugzilla.suse.com/1245033"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "SUSE Linux Enterprise Micro 5.1:kernel-rt-5.3.18-150300.214.1.x86_64",
            "SUSE Linux Enterprise Micro 5.1:kernel-source-rt-5.3.18-150300.214.1.noarch",
            "SUSE Linux Enterprise Micro 5.2:kernel-rt-5.3.18-150300.214.1.x86_64",
            "SUSE Linux Enterprise Micro 5.2:kernel-source-rt-5.3.18-150300.214.1.noarch"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 5.5,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
            "version": "3.1"
          },
          "products": [
            "SUSE Linux Enterprise Micro 5.1:kernel-rt-5.3.18-150300.214.1.x86_64",
            "SUSE Linux Enterprise Micro 5.1:kernel-source-rt-5.3.18-150300.214.1.noarch",
            "SUSE Linux Enterprise Micro 5.2:kernel-rt-5.3.18-150300.214.1.x86_64",
            "SUSE Linux Enterprise Micro 5.2:kernel-source-rt-5.3.18-150300.214.1.noarch"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2025-07-15T14:20:22Z",
          "details": "moderate"
        }
      ],
      "title": "CVE-2022-50061"
    },
    {
      "cve": "CVE-2022-50065",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2022-50065"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "In the Linux kernel, the following vulnerability has been resolved:\n\nvirtio_net: fix memory leak inside XPD_TX with mergeable\n\nWhen we call xdp_convert_buff_to_frame() to get xdpf, if it returns\nNULL, we should check if xdp_page was allocated by xdp_linearize_page().\nIf it is newly allocated, it should be freed here alone. Just like any\nother \"goto err_xdp\".",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "SUSE Linux Enterprise Micro 5.1:kernel-rt-5.3.18-150300.214.1.x86_64",
          "SUSE Linux Enterprise Micro 5.1:kernel-source-rt-5.3.18-150300.214.1.noarch",
          "SUSE Linux Enterprise Micro 5.2:kernel-rt-5.3.18-150300.214.1.x86_64",
          "SUSE Linux Enterprise Micro 5.2:kernel-source-rt-5.3.18-150300.214.1.noarch"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2022-50065",
          "url": "https://www.suse.com/security/cve/CVE-2022-50065"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1244986 for CVE-2022-50065",
          "url": "https://bugzilla.suse.com/1244986"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "SUSE Linux Enterprise Micro 5.1:kernel-rt-5.3.18-150300.214.1.x86_64",
            "SUSE Linux Enterprise Micro 5.1:kernel-source-rt-5.3.18-150300.214.1.noarch",
            "SUSE Linux Enterprise Micro 5.2:kernel-rt-5.3.18-150300.214.1.x86_64",
            "SUSE Linux Enterprise Micro 5.2:kernel-source-rt-5.3.18-150300.214.1.noarch"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 5.5,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
            "version": "3.1"
          },
          "products": [
            "SUSE Linux Enterprise Micro 5.1:kernel-rt-5.3.18-150300.214.1.x86_64",
            "SUSE Linux Enterprise Micro 5.1:kernel-source-rt-5.3.18-150300.214.1.noarch",
            "SUSE Linux Enterprise Micro 5.2:kernel-rt-5.3.18-150300.214.1.x86_64",
            "SUSE Linux Enterprise Micro 5.2:kernel-source-rt-5.3.18-150300.214.1.noarch"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2025-07-15T14:20:22Z",
          "details": "moderate"
        }
      ],
      "title": "CVE-2022-50065"
    },
    {
      "cve": "CVE-2022-50067",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2022-50067"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "In the Linux kernel, the following vulnerability has been resolved:\n\nbtrfs: unset reloc control if transaction commit fails in prepare_to_relocate()\n\nIn btrfs_relocate_block_group(), the rc is allocated.  Then\nbtrfs_relocate_block_group() calls\n\nrelocate_block_group()\n  prepare_to_relocate()\n    set_reloc_control()\n\nthat assigns rc to the variable fs_info-\u003ereloc_ctl. When\nprepare_to_relocate() returns, it calls\n\nbtrfs_commit_transaction()\n  btrfs_start_dirty_block_groups()\n    btrfs_alloc_path()\n      kmem_cache_zalloc()\n\nwhich may fail for example (or other errors could happen). When the\nfailure occurs, btrfs_relocate_block_group() detects the error and frees\nrc and doesn\u0027t set fs_info-\u003ereloc_ctl to NULL. After that, in\nbtrfs_init_reloc_root(), rc is retrieved from fs_info-\u003ereloc_ctl and\nthen used, which may cause a use-after-free bug.\n\nThis possible bug can be triggered by calling btrfs_ioctl_balance()\nbefore calling btrfs_ioctl_defrag().\n\nTo fix this possible bug, in prepare_to_relocate(), check if\nbtrfs_commit_transaction() fails. If the failure occurs,\nunset_reloc_control() is called to set fs_info-\u003ereloc_ctl to NULL.\n\nThe error log in our fault-injection testing is shown as follows:\n\n  [   58.751070] BUG: KASAN: use-after-free in btrfs_init_reloc_root+0x7ca/0x920 [btrfs]\n  ...\n  [   58.753577] Call Trace:\n  ...\n  [   58.755800]  kasan_report+0x45/0x60\n  [   58.756066]  btrfs_init_reloc_root+0x7ca/0x920 [btrfs]\n  [   58.757304]  record_root_in_trans+0x792/0xa10 [btrfs]\n  [   58.757748]  btrfs_record_root_in_trans+0x463/0x4f0 [btrfs]\n  [   58.758231]  start_transaction+0x896/0x2950 [btrfs]\n  [   58.758661]  btrfs_defrag_root+0x250/0xc00 [btrfs]\n  [   58.759083]  btrfs_ioctl_defrag+0x467/0xa00 [btrfs]\n  [   58.759513]  btrfs_ioctl+0x3c95/0x114e0 [btrfs]\n  ...\n  [   58.768510] Allocated by task 23683:\n  [   58.768777]  ____kasan_kmalloc+0xb5/0xf0\n  [   58.769069]  __kmalloc+0x227/0x3d0\n  [   58.769325]  alloc_reloc_control+0x10a/0x3d0 [btrfs]\n  [   58.769755]  btrfs_relocate_block_group+0x7aa/0x1e20 [btrfs]\n  [   58.770228]  btrfs_relocate_chunk+0xf1/0x760 [btrfs]\n  [   58.770655]  __btrfs_balance+0x1326/0x1f10 [btrfs]\n  [   58.771071]  btrfs_balance+0x3150/0x3d30 [btrfs]\n  [   58.771472]  btrfs_ioctl_balance+0xd84/0x1410 [btrfs]\n  [   58.771902]  btrfs_ioctl+0x4caa/0x114e0 [btrfs]\n  ...\n  [   58.773337] Freed by task 23683:\n  ...\n  [   58.774815]  kfree+0xda/0x2b0\n  [   58.775038]  free_reloc_control+0x1d6/0x220 [btrfs]\n  [   58.775465]  btrfs_relocate_block_group+0x115c/0x1e20 [btrfs]\n  [   58.775944]  btrfs_relocate_chunk+0xf1/0x760 [btrfs]\n  [   58.776369]  __btrfs_balance+0x1326/0x1f10 [btrfs]\n  [   58.776784]  btrfs_balance+0x3150/0x3d30 [btrfs]\n  [   58.777185]  btrfs_ioctl_balance+0xd84/0x1410 [btrfs]\n  [   58.777621]  btrfs_ioctl+0x4caa/0x114e0 [btrfs]\n  ...",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "SUSE Linux Enterprise Micro 5.1:kernel-rt-5.3.18-150300.214.1.x86_64",
          "SUSE Linux Enterprise Micro 5.1:kernel-source-rt-5.3.18-150300.214.1.noarch",
          "SUSE Linux Enterprise Micro 5.2:kernel-rt-5.3.18-150300.214.1.x86_64",
          "SUSE Linux Enterprise Micro 5.2:kernel-source-rt-5.3.18-150300.214.1.noarch"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2022-50067",
          "url": "https://www.suse.com/security/cve/CVE-2022-50067"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1245047 for CVE-2022-50067",
          "url": "https://bugzilla.suse.com/1245047"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "SUSE Linux Enterprise Micro 5.1:kernel-rt-5.3.18-150300.214.1.x86_64",
            "SUSE Linux Enterprise Micro 5.1:kernel-source-rt-5.3.18-150300.214.1.noarch",
            "SUSE Linux Enterprise Micro 5.2:kernel-rt-5.3.18-150300.214.1.x86_64",
            "SUSE Linux Enterprise Micro 5.2:kernel-source-rt-5.3.18-150300.214.1.noarch"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 5.5,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
            "version": "3.1"
          },
          "products": [
            "SUSE Linux Enterprise Micro 5.1:kernel-rt-5.3.18-150300.214.1.x86_64",
            "SUSE Linux Enterprise Micro 5.1:kernel-source-rt-5.3.18-150300.214.1.noarch",
            "SUSE Linux Enterprise Micro 5.2:kernel-rt-5.3.18-150300.214.1.x86_64",
            "SUSE Linux Enterprise Micro 5.2:kernel-source-rt-5.3.18-150300.214.1.noarch"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2025-07-15T14:20:22Z",
          "details": "moderate"
        }
      ],
      "title": "CVE-2022-50067"
    },
    {
      "cve": "CVE-2022-50072",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2022-50072"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "In the Linux kernel, the following vulnerability has been resolved:\n\nNFSv4/pnfs: Fix a use-after-free bug in open\n\nIf someone cancels the open RPC call, then we must not try to free\neither the open slot or the layoutget operation arguments, since they\nare likely still in use by the hung RPC call.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "SUSE Linux Enterprise Micro 5.1:kernel-rt-5.3.18-150300.214.1.x86_64",
          "SUSE Linux Enterprise Micro 5.1:kernel-source-rt-5.3.18-150300.214.1.noarch",
          "SUSE Linux Enterprise Micro 5.2:kernel-rt-5.3.18-150300.214.1.x86_64",
          "SUSE Linux Enterprise Micro 5.2:kernel-source-rt-5.3.18-150300.214.1.noarch"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2022-50072",
          "url": "https://www.suse.com/security/cve/CVE-2022-50072"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1244979 for CVE-2022-50072",
          "url": "https://bugzilla.suse.com/1244979"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "SUSE Linux Enterprise Micro 5.1:kernel-rt-5.3.18-150300.214.1.x86_64",
            "SUSE Linux Enterprise Micro 5.1:kernel-source-rt-5.3.18-150300.214.1.noarch",
            "SUSE Linux Enterprise Micro 5.2:kernel-rt-5.3.18-150300.214.1.x86_64",
            "SUSE Linux Enterprise Micro 5.2:kernel-source-rt-5.3.18-150300.214.1.noarch"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 5.5,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
            "version": "3.1"
          },
          "products": [
            "SUSE Linux Enterprise Micro 5.1:kernel-rt-5.3.18-150300.214.1.x86_64",
            "SUSE Linux Enterprise Micro 5.1:kernel-source-rt-5.3.18-150300.214.1.noarch",
            "SUSE Linux Enterprise Micro 5.2:kernel-rt-5.3.18-150300.214.1.x86_64",
            "SUSE Linux Enterprise Micro 5.2:kernel-source-rt-5.3.18-150300.214.1.noarch"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2025-07-15T14:20:22Z",
          "details": "moderate"
        }
      ],
      "title": "CVE-2022-50072"
    },
    {
      "cve": "CVE-2022-50083",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2022-50083"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "In the Linux kernel, the following vulnerability has been resolved:\n\next4: add EXT4_INODE_HAS_XATTR_SPACE macro in xattr.h\n\nWhen adding an xattr to an inode, we must ensure that the inode_size is\nnot less than EXT4_GOOD_OLD_INODE_SIZE + extra_isize + pad. Otherwise,\nthe end position may be greater than the start position, resulting in UAF.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "SUSE Linux Enterprise Micro 5.1:kernel-rt-5.3.18-150300.214.1.x86_64",
          "SUSE Linux Enterprise Micro 5.1:kernel-source-rt-5.3.18-150300.214.1.noarch",
          "SUSE Linux Enterprise Micro 5.2:kernel-rt-5.3.18-150300.214.1.x86_64",
          "SUSE Linux Enterprise Micro 5.2:kernel-source-rt-5.3.18-150300.214.1.noarch"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2022-50083",
          "url": "https://www.suse.com/security/cve/CVE-2022-50083"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1244968 for CVE-2022-50083",
          "url": "https://bugzilla.suse.com/1244968"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "SUSE Linux Enterprise Micro 5.1:kernel-rt-5.3.18-150300.214.1.x86_64",
            "SUSE Linux Enterprise Micro 5.1:kernel-source-rt-5.3.18-150300.214.1.noarch",
            "SUSE Linux Enterprise Micro 5.2:kernel-rt-5.3.18-150300.214.1.x86_64",
            "SUSE Linux Enterprise Micro 5.2:kernel-source-rt-5.3.18-150300.214.1.noarch"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 5.5,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
            "version": "3.1"
          },
          "products": [
            "SUSE Linux Enterprise Micro 5.1:kernel-rt-5.3.18-150300.214.1.x86_64",
            "SUSE Linux Enterprise Micro 5.1:kernel-source-rt-5.3.18-150300.214.1.noarch",
            "SUSE Linux Enterprise Micro 5.2:kernel-rt-5.3.18-150300.214.1.x86_64",
            "SUSE Linux Enterprise Micro 5.2:kernel-source-rt-5.3.18-150300.214.1.noarch"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2025-07-15T14:20:22Z",
          "details": "moderate"
        }
      ],
      "title": "CVE-2022-50083"
    },
    {
      "cve": "CVE-2022-50084",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2022-50084"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "In the Linux kernel, the following vulnerability has been resolved:\n\ndm raid: fix address sanitizer warning in raid_status\n\nThere is this warning when using a kernel with the address sanitizer\nand running this testsuite:\nhttps://gitlab.com/cki-project/kernel-tests/-/tree/main/storage/swraid/scsi_raid\n\n==================================================================\nBUG: KASAN: slab-out-of-bounds in raid_status+0x1747/0x2820 [dm_raid]\nRead of size 4 at addr ffff888079d2c7e8 by task lvcreate/13319\nCPU: 0 PID: 13319 Comm: lvcreate Not tainted 5.18.0-0.rc3.\u003csnip\u003e #1\nHardware name: Red Hat KVM, BIOS 0.5.1 01/01/2011\nCall Trace:\n \u003cTASK\u003e\n dump_stack_lvl+0x6a/0x9c\n print_address_description.constprop.0+0x1f/0x1e0\n print_report.cold+0x55/0x244\n kasan_report+0xc9/0x100\n raid_status+0x1747/0x2820 [dm_raid]\n dm_ima_measure_on_table_load+0x4b8/0xca0 [dm_mod]\n table_load+0x35c/0x630 [dm_mod]\n ctl_ioctl+0x411/0x630 [dm_mod]\n dm_ctl_ioctl+0xa/0x10 [dm_mod]\n __x64_sys_ioctl+0x12a/0x1a0\n do_syscall_64+0x5b/0x80\n\nThe warning is caused by reading conf-\u003emax_nr_stripes in raid_status. The\ncode in raid_status reads mddev-\u003eprivate, casts it to struct r5conf and\nreads the entry max_nr_stripes.\n\nHowever, if we have different raid type than 4/5/6, mddev-\u003eprivate\ndoesn\u0027t point to struct r5conf; it may point to struct r0conf, struct\nr1conf, struct r10conf or struct mpconf. If we cast a pointer to one\nof these structs to struct r5conf, we will be reading invalid memory\nand KASAN warns about it.\n\nFix this bug by reading struct r5conf only if raid type is 4, 5 or 6.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "SUSE Linux Enterprise Micro 5.1:kernel-rt-5.3.18-150300.214.1.x86_64",
          "SUSE Linux Enterprise Micro 5.1:kernel-source-rt-5.3.18-150300.214.1.noarch",
          "SUSE Linux Enterprise Micro 5.2:kernel-rt-5.3.18-150300.214.1.x86_64",
          "SUSE Linux Enterprise Micro 5.2:kernel-source-rt-5.3.18-150300.214.1.noarch"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2022-50084",
          "url": "https://www.suse.com/security/cve/CVE-2022-50084"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1245117 for CVE-2022-50084",
          "url": "https://bugzilla.suse.com/1245117"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "SUSE Linux Enterprise Micro 5.1:kernel-rt-5.3.18-150300.214.1.x86_64",
            "SUSE Linux Enterprise Micro 5.1:kernel-source-rt-5.3.18-150300.214.1.noarch",
            "SUSE Linux Enterprise Micro 5.2:kernel-rt-5.3.18-150300.214.1.x86_64",
            "SUSE Linux Enterprise Micro 5.2:kernel-source-rt-5.3.18-150300.214.1.noarch"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 5.5,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
            "version": "3.1"
          },
          "products": [
            "SUSE Linux Enterprise Micro 5.1:kernel-rt-5.3.18-150300.214.1.x86_64",
            "SUSE Linux Enterprise Micro 5.1:kernel-source-rt-5.3.18-150300.214.1.noarch",
            "SUSE Linux Enterprise Micro 5.2:kernel-rt-5.3.18-150300.214.1.x86_64",
            "SUSE Linux Enterprise Micro 5.2:kernel-source-rt-5.3.18-150300.214.1.noarch"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2025-07-15T14:20:22Z",
          "details": "moderate"
        }
      ],
      "title": "CVE-2022-50084"
    },
    {
      "cve": "CVE-2022-50085",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2022-50085"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "In the Linux kernel, the following vulnerability has been resolved:\n\ndm raid: fix address sanitizer warning in raid_resume\n\nThere is a KASAN warning in raid_resume when running the lvm test\nlvconvert-raid.sh. The reason for the warning is that mddev-\u003eraid_disks\nis greater than rs-\u003eraid_disks, so the loop touches one entry beyond\nthe allocated length.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "SUSE Linux Enterprise Micro 5.1:kernel-rt-5.3.18-150300.214.1.x86_64",
          "SUSE Linux Enterprise Micro 5.1:kernel-source-rt-5.3.18-150300.214.1.noarch",
          "SUSE Linux Enterprise Micro 5.2:kernel-rt-5.3.18-150300.214.1.x86_64",
          "SUSE Linux Enterprise Micro 5.2:kernel-source-rt-5.3.18-150300.214.1.noarch"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2022-50085",
          "url": "https://www.suse.com/security/cve/CVE-2022-50085"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1245147 for CVE-2022-50085",
          "url": "https://bugzilla.suse.com/1245147"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "SUSE Linux Enterprise Micro 5.1:kernel-rt-5.3.18-150300.214.1.x86_64",
            "SUSE Linux Enterprise Micro 5.1:kernel-source-rt-5.3.18-150300.214.1.noarch",
            "SUSE Linux Enterprise Micro 5.2:kernel-rt-5.3.18-150300.214.1.x86_64",
            "SUSE Linux Enterprise Micro 5.2:kernel-source-rt-5.3.18-150300.214.1.noarch"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 6.6,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:P/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
            "version": "3.1"
          },
          "products": [
            "SUSE Linux Enterprise Micro 5.1:kernel-rt-5.3.18-150300.214.1.x86_64",
            "SUSE Linux Enterprise Micro 5.1:kernel-source-rt-5.3.18-150300.214.1.noarch",
            "SUSE Linux Enterprise Micro 5.2:kernel-rt-5.3.18-150300.214.1.x86_64",
            "SUSE Linux Enterprise Micro 5.2:kernel-source-rt-5.3.18-150300.214.1.noarch"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2025-07-15T14:20:22Z",
          "details": "moderate"
        }
      ],
      "title": "CVE-2022-50085"
    },
    {
      "cve": "CVE-2022-50087",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2022-50087"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "In the Linux kernel, the following vulnerability has been resolved:\n\nfirmware: arm_scpi: Ensure scpi_info is not assigned if the probe fails\n\nWhen scpi probe fails, at any point, we need to ensure that the scpi_info\nis not set and will remain NULL until the probe succeeds. If it is not\ntaken care, then it could result use-after-free as the value is exported\nvia get_scpi_ops() and could refer to a memory allocated via devm_kzalloc()\nbut freed when the probe fails.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "SUSE Linux Enterprise Micro 5.1:kernel-rt-5.3.18-150300.214.1.x86_64",
          "SUSE Linux Enterprise Micro 5.1:kernel-source-rt-5.3.18-150300.214.1.noarch",
          "SUSE Linux Enterprise Micro 5.2:kernel-rt-5.3.18-150300.214.1.x86_64",
          "SUSE Linux Enterprise Micro 5.2:kernel-source-rt-5.3.18-150300.214.1.noarch"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2022-50087",
          "url": "https://www.suse.com/security/cve/CVE-2022-50087"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1245119 for CVE-2022-50087",
          "url": "https://bugzilla.suse.com/1245119"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1245294 for CVE-2022-50087",
          "url": "https://bugzilla.suse.com/1245294"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "SUSE Linux Enterprise Micro 5.1:kernel-rt-5.3.18-150300.214.1.x86_64",
            "SUSE Linux Enterprise Micro 5.1:kernel-source-rt-5.3.18-150300.214.1.noarch",
            "SUSE Linux Enterprise Micro 5.2:kernel-rt-5.3.18-150300.214.1.x86_64",
            "SUSE Linux Enterprise Micro 5.2:kernel-source-rt-5.3.18-150300.214.1.noarch"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 7,
            "baseSeverity": "HIGH",
            "vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H",
            "version": "3.1"
          },
          "products": [
            "SUSE Linux Enterprise Micro 5.1:kernel-rt-5.3.18-150300.214.1.x86_64",
            "SUSE Linux Enterprise Micro 5.1:kernel-source-rt-5.3.18-150300.214.1.noarch",
            "SUSE Linux Enterprise Micro 5.2:kernel-rt-5.3.18-150300.214.1.x86_64",
            "SUSE Linux Enterprise Micro 5.2:kernel-source-rt-5.3.18-150300.214.1.noarch"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2025-07-15T14:20:22Z",
          "details": "important"
        }
      ],
      "title": "CVE-2022-50087"
    },
    {
      "cve": "CVE-2022-50091",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2022-50091"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "In the Linux kernel, the following vulnerability has been resolved:\n\nlocking/csd_lock: Change csdlock_debug from early_param to __setup\n\nThe csdlock_debug kernel-boot parameter is parsed by the\nearly_param() function csdlock_debug().  If set, csdlock_debug()\ninvokes static_branch_enable() to enable csd_lock_wait feature, which\ntriggers a panic on arm64 for kernels built with CONFIG_SPARSEMEM=y and\nCONFIG_SPARSEMEM_VMEMMAP=n.\n\nWith CONFIG_SPARSEMEM_VMEMMAP=n, __nr_to_section is called in\nstatic_key_enable() and returns NULL, resulting in a NULL dereference\nbecause mem_section is initialized only later in sparse_init().\n\nThis is also a problem for powerpc because early_param() functions\nare invoked earlier than jump_label_init(), also resulting in\nstatic_key_enable() failures.  These failures cause the warning \"static\nkey \u0027xxx\u0027 used before call to jump_label_init()\".\n\nThus, early_param is too early for csd_lock_wait to run\nstatic_branch_enable(), so changes it to __setup to fix these.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "SUSE Linux Enterprise Micro 5.1:kernel-rt-5.3.18-150300.214.1.x86_64",
          "SUSE Linux Enterprise Micro 5.1:kernel-source-rt-5.3.18-150300.214.1.noarch",
          "SUSE Linux Enterprise Micro 5.2:kernel-rt-5.3.18-150300.214.1.x86_64",
          "SUSE Linux Enterprise Micro 5.2:kernel-source-rt-5.3.18-150300.214.1.noarch"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2022-50091",
          "url": "https://www.suse.com/security/cve/CVE-2022-50091"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1244885 for CVE-2022-50091",
          "url": "https://bugzilla.suse.com/1244885"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "SUSE Linux Enterprise Micro 5.1:kernel-rt-5.3.18-150300.214.1.x86_64",
            "SUSE Linux Enterprise Micro 5.1:kernel-source-rt-5.3.18-150300.214.1.noarch",
            "SUSE Linux Enterprise Micro 5.2:kernel-rt-5.3.18-150300.214.1.x86_64",
            "SUSE Linux Enterprise Micro 5.2:kernel-source-rt-5.3.18-150300.214.1.noarch"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 5.5,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
            "version": "3.1"
          },
          "products": [
            "SUSE Linux Enterprise Micro 5.1:kernel-rt-5.3.18-150300.214.1.x86_64",
            "SUSE Linux Enterprise Micro 5.1:kernel-source-rt-5.3.18-150300.214.1.noarch",
            "SUSE Linux Enterprise Micro 5.2:kernel-rt-5.3.18-150300.214.1.x86_64",
            "SUSE Linux Enterprise Micro 5.2:kernel-source-rt-5.3.18-150300.214.1.noarch"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2025-07-15T14:20:22Z",
          "details": "moderate"
        }
      ],
      "title": "CVE-2022-50091"
    },
    {
      "cve": "CVE-2022-50092",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2022-50092"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "In the Linux kernel, the following vulnerability has been resolved:\n\ndm thin: fix use-after-free crash in dm_sm_register_threshold_callback\n\nFault inject on pool metadata device reports:\n  BUG: KASAN: use-after-free in dm_pool_register_metadata_threshold+0x40/0x80\n  Read of size 8 at addr ffff8881b9d50068 by task dmsetup/950\n\n  CPU: 7 PID: 950 Comm: dmsetup Tainted: G        W         5.19.0-rc6 #1\n  Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.14.0-1.fc33 04/01/2014\n  Call Trace:\n   \u003cTASK\u003e\n   dump_stack_lvl+0x34/0x44\n   print_address_description.constprop.0.cold+0xeb/0x3f4\n   kasan_report.cold+0xe6/0x147\n   dm_pool_register_metadata_threshold+0x40/0x80\n   pool_ctr+0xa0a/0x1150\n   dm_table_add_target+0x2c8/0x640\n   table_load+0x1fd/0x430\n   ctl_ioctl+0x2c4/0x5a0\n   dm_ctl_ioctl+0xa/0x10\n   __x64_sys_ioctl+0xb3/0xd0\n   do_syscall_64+0x35/0x80\n   entry_SYSCALL_64_after_hwframe+0x46/0xb0\n\nThis can be easily reproduced using:\n  echo offline \u003e /sys/block/sda/device/state\n  dd if=/dev/zero of=/dev/mapper/thin bs=4k count=10\n  dmsetup load pool --table \"0 20971520 thin-pool /dev/sda /dev/sdb 128 0 0\"\n\nIf a metadata commit fails, the transaction will be aborted and the\nmetadata space maps will be destroyed. If a DM table reload then\nhappens for this failed thin-pool, a use-after-free will occur in\ndm_sm_register_threshold_callback (called from\ndm_pool_register_metadata_threshold).\n\nFix this by in dm_pool_register_metadata_threshold() by returning the\n-EINVAL error if the thin-pool is in fail mode. Also fail pool_ctr()\nwith a new error message: \"Error registering metadata threshold\".",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "SUSE Linux Enterprise Micro 5.1:kernel-rt-5.3.18-150300.214.1.x86_64",
          "SUSE Linux Enterprise Micro 5.1:kernel-source-rt-5.3.18-150300.214.1.noarch",
          "SUSE Linux Enterprise Micro 5.2:kernel-rt-5.3.18-150300.214.1.x86_64",
          "SUSE Linux Enterprise Micro 5.2:kernel-source-rt-5.3.18-150300.214.1.noarch"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2022-50092",
          "url": "https://www.suse.com/security/cve/CVE-2022-50092"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1244848 for CVE-2022-50092",
          "url": "https://bugzilla.suse.com/1244848"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "SUSE Linux Enterprise Micro 5.1:kernel-rt-5.3.18-150300.214.1.x86_64",
            "SUSE Linux Enterprise Micro 5.1:kernel-source-rt-5.3.18-150300.214.1.noarch",
            "SUSE Linux Enterprise Micro 5.2:kernel-rt-5.3.18-150300.214.1.x86_64",
            "SUSE Linux Enterprise Micro 5.2:kernel-source-rt-5.3.18-150300.214.1.noarch"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 5.5,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
            "version": "3.1"
          },
          "products": [
            "SUSE Linux Enterprise Micro 5.1:kernel-rt-5.3.18-150300.214.1.x86_64",
            "SUSE Linux Enterprise Micro 5.1:kernel-source-rt-5.3.18-150300.214.1.noarch",
            "SUSE Linux Enterprise Micro 5.2:kernel-rt-5.3.18-150300.214.1.x86_64",
            "SUSE Linux Enterprise Micro 5.2:kernel-source-rt-5.3.18-150300.214.1.noarch"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2025-07-15T14:20:22Z",
          "details": "moderate"
        }
      ],
      "title": "CVE-2022-50092"
    },
    {
      "cve": "CVE-2022-50093",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2022-50093"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "In the Linux kernel, the following vulnerability has been resolved:\n\niommu/vt-d: avoid invalid memory access via node_online(NUMA_NO_NODE)\n\nKASAN reports:\n\n[ 4.668325][ T0] BUG: KASAN: wild-memory-access in dmar_parse_one_rhsa (arch/x86/include/asm/bitops.h:214 arch/x86/include/asm/bitops.h:226 include/asm-generic/bitops/instrumented-non-atomic.h:142 include/linux/nodemask.h:415 drivers/iommu/intel/dmar.c:497)\n[    4.676149][    T0] Read of size 8 at addr 1fffffff85115558 by task swapper/0/0\n[    4.683454][    T0]\n[    4.685638][    T0] CPU: 0 PID: 0 Comm: swapper/0 Not tainted 5.19.0-rc3-00004-g0e862838f290 #1\n[    4.694331][    T0] Hardware name: Supermicro SYS-5018D-FN4T/X10SDV-8C-TLN4F, BIOS 1.1 03/02/2016\n[    4.703196][    T0] Call Trace:\n[    4.706334][    T0]  \u003cTASK\u003e\n[ 4.709133][ T0] ? dmar_parse_one_rhsa (arch/x86/include/asm/bitops.h:214 arch/x86/include/asm/bitops.h:226 include/asm-generic/bitops/instrumented-non-atomic.h:142 include/linux/nodemask.h:415 drivers/iommu/intel/dmar.c:497)\n\nafter converting the type of the first argument (@nr, bit number)\nof arch_test_bit() from `long` to `unsigned long`[0].\n\nUnder certain conditions (for example, when ACPI NUMA is disabled\nvia command line), pxm_to_node() can return %NUMA_NO_NODE (-1).\nIt is valid \u0027magic\u0027 number of NUMA node, but not valid bit number\nto use in bitops.\nnode_online() eventually descends to test_bit() without checking\nfor the input, assuming it\u0027s on caller side (which might be good\nfor perf-critical tasks). There, -1 becomes %ULONG_MAX which leads\nto an insane array index when calculating bit position in memory.\n\nFor now, add an explicit check for @node being not %NUMA_NO_NODE\nbefore calling test_bit(). The actual logics didn\u0027t change here\nat all.\n\n[0] https://github.com/norov/linux/commit/0e862838f290147ea9c16db852d8d494b552d38d",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "SUSE Linux Enterprise Micro 5.1:kernel-rt-5.3.18-150300.214.1.x86_64",
          "SUSE Linux Enterprise Micro 5.1:kernel-source-rt-5.3.18-150300.214.1.noarch",
          "SUSE Linux Enterprise Micro 5.2:kernel-rt-5.3.18-150300.214.1.x86_64",
          "SUSE Linux Enterprise Micro 5.2:kernel-source-rt-5.3.18-150300.214.1.noarch"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2022-50093",
          "url": "https://www.suse.com/security/cve/CVE-2022-50093"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1244849 for CVE-2022-50093",
          "url": "https://bugzilla.suse.com/1244849"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "SUSE Linux Enterprise Micro 5.1:kernel-rt-5.3.18-150300.214.1.x86_64",
            "SUSE Linux Enterprise Micro 5.1:kernel-source-rt-5.3.18-150300.214.1.noarch",
            "SUSE Linux Enterprise Micro 5.2:kernel-rt-5.3.18-150300.214.1.x86_64",
            "SUSE Linux Enterprise Micro 5.2:kernel-source-rt-5.3.18-150300.214.1.noarch"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 5.5,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
            "version": "3.1"
          },
          "products": [
            "SUSE Linux Enterprise Micro 5.1:kernel-rt-5.3.18-150300.214.1.x86_64",
            "SUSE Linux Enterprise Micro 5.1:kernel-source-rt-5.3.18-150300.214.1.noarch",
            "SUSE Linux Enterprise Micro 5.2:kernel-rt-5.3.18-150300.214.1.x86_64",
            "SUSE Linux Enterprise Micro 5.2:kernel-source-rt-5.3.18-150300.214.1.noarch"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2025-07-15T14:20:22Z",
          "details": "moderate"
        }
      ],
      "title": "CVE-2022-50093"
    },
    {
      "cve": "CVE-2022-50094",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2022-50094"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "In the Linux kernel, the following vulnerability has been resolved:\n\nspmi: trace: fix stack-out-of-bound access in SPMI tracing functions\n\ntrace_spmi_write_begin() and trace_spmi_read_end() both call\nmemcpy() with a length of \"len + 1\".  This leads to one extra\nbyte being read beyond the end of the specified buffer.  Fix\nthis out-of-bound memory access by using a length of \"len\"\ninstead.\n\nHere is a KASAN log showing the issue:\n\nBUG: KASAN: stack-out-of-bounds in trace_event_raw_event_spmi_read_end+0x1d0/0x234\nRead of size 2 at addr ffffffc0265b7540 by task thermal@2.0-ser/1314\n...\nCall trace:\n dump_backtrace+0x0/0x3e8\n show_stack+0x2c/0x3c\n dump_stack_lvl+0xdc/0x11c\n print_address_description+0x74/0x384\n kasan_report+0x188/0x268\n kasan_check_range+0x270/0x2b0\n memcpy+0x90/0xe8\n trace_event_raw_event_spmi_read_end+0x1d0/0x234\n spmi_read_cmd+0x294/0x3ac\n spmi_ext_register_readl+0x84/0x9c\n regmap_spmi_ext_read+0x144/0x1b0 [regmap_spmi]\n _regmap_raw_read+0x40c/0x754\n regmap_raw_read+0x3a0/0x514\n regmap_bulk_read+0x418/0x494\n adc5_gen3_poll_wait_hs+0xe8/0x1e0 [qcom_spmi_adc5_gen3]\n ...\n __arm64_sys_read+0x4c/0x60\n invoke_syscall+0x80/0x218\n el0_svc_common+0xec/0x1c8\n ...\n\naddr ffffffc0265b7540 is located in stack of task thermal@2.0-ser/1314 at offset 32 in frame:\n adc5_gen3_poll_wait_hs+0x0/0x1e0 [qcom_spmi_adc5_gen3]\n\nthis frame has 1 object:\n [32, 33) \u0027status\u0027\n\nMemory state around the buggy address:\n ffffffc0265b7400: 00 00 00 00 00 00 00 00 00 00 00 00 f1 f1 f1 f1\n ffffffc0265b7480: 04 f3 f3 f3 00 00 00 00 00 00 00 00 00 00 00 00\n\u003effffffc0265b7500: 00 00 00 00 f1 f1 f1 f1 01 f3 f3 f3 00 00 00 00\n                                           ^\n ffffffc0265b7580: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00\n ffffffc0265b7600: f1 f1 f1 f1 01 f2 07 f2 f2 f2 01 f3 00 00 00 00\n==================================================================",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "SUSE Linux Enterprise Micro 5.1:kernel-rt-5.3.18-150300.214.1.x86_64",
          "SUSE Linux Enterprise Micro 5.1:kernel-source-rt-5.3.18-150300.214.1.noarch",
          "SUSE Linux Enterprise Micro 5.2:kernel-rt-5.3.18-150300.214.1.x86_64",
          "SUSE Linux Enterprise Micro 5.2:kernel-source-rt-5.3.18-150300.214.1.noarch"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2022-50094",
          "url": "https://www.suse.com/security/cve/CVE-2022-50094"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1244851 for CVE-2022-50094",
          "url": "https://bugzilla.suse.com/1244851"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "SUSE Linux Enterprise Micro 5.1:kernel-rt-5.3.18-150300.214.1.x86_64",
            "SUSE Linux Enterprise Micro 5.1:kernel-source-rt-5.3.18-150300.214.1.noarch",
            "SUSE Linux Enterprise Micro 5.2:kernel-rt-5.3.18-150300.214.1.x86_64",
            "SUSE Linux Enterprise Micro 5.2:kernel-source-rt-5.3.18-150300.214.1.noarch"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 5.5,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
            "version": "3.1"
          },
          "products": [
            "SUSE Linux Enterprise Micro 5.1:kernel-rt-5.3.18-150300.214.1.x86_64",
            "SUSE Linux Enterprise Micro 5.1:kernel-source-rt-5.3.18-150300.214.1.noarch",
            "SUSE Linux Enterprise Micro 5.2:kernel-rt-5.3.18-150300.214.1.x86_64",
            "SUSE Linux Enterprise Micro 5.2:kernel-source-rt-5.3.18-150300.214.1.noarch"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2025-07-15T14:20:22Z",
          "details": "moderate"
        }
      ],
      "title": "CVE-2022-50094"
    },
    {
      "cve": "CVE-2022-50097",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2022-50097"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "In the Linux kernel, the following vulnerability has been resolved:\n\nvideo: fbdev: s3fb: Check the size of screen before memset_io()\n\nIn the function s3fb_set_par(), the value of \u0027screen_size\u0027 is\ncalculated by the user input. If the user provides the improper value,\nthe value of \u0027screen_size\u0027 may larger than \u0027info-\u003escreen_size\u0027, which\nmay cause the following bug:\n\n[   54.083733] BUG: unable to handle page fault for address: ffffc90003000000\n[   54.083742] #PF: supervisor write access in kernel mode\n[   54.083744] #PF: error_code(0x0002) - not-present page\n[   54.083760] RIP: 0010:memset_orig+0x33/0xb0\n[   54.083782] Call Trace:\n[   54.083788]  s3fb_set_par+0x1ec6/0x4040\n[   54.083806]  fb_set_var+0x604/0xeb0\n[   54.083836]  do_fb_ioctl+0x234/0x670\n\nFix the this by checking the value of \u0027screen_size\u0027 before memset_io().",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "SUSE Linux Enterprise Micro 5.1:kernel-rt-5.3.18-150300.214.1.x86_64",
          "SUSE Linux Enterprise Micro 5.1:kernel-source-rt-5.3.18-150300.214.1.noarch",
          "SUSE Linux Enterprise Micro 5.2:kernel-rt-5.3.18-150300.214.1.x86_64",
          "SUSE Linux Enterprise Micro 5.2:kernel-source-rt-5.3.18-150300.214.1.noarch"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2022-50097",
          "url": "https://www.suse.com/security/cve/CVE-2022-50097"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1244845 for CVE-2022-50097",
          "url": "https://bugzilla.suse.com/1244845"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "SUSE Linux Enterprise Micro 5.1:kernel-rt-5.3.18-150300.214.1.x86_64",
            "SUSE Linux Enterprise Micro 5.1:kernel-source-rt-5.3.18-150300.214.1.noarch",
            "SUSE Linux Enterprise Micro 5.2:kernel-rt-5.3.18-150300.214.1.x86_64",
            "SUSE Linux Enterprise Micro 5.2:kernel-source-rt-5.3.18-150300.214.1.noarch"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 5.5,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
            "version": "3.1"
          },
          "products": [
            "SUSE Linux Enterprise Micro 5.1:kernel-rt-5.3.18-150300.214.1.x86_64",
            "SUSE Linux Enterprise Micro 5.1:kernel-source-rt-5.3.18-150300.214.1.noarch",
            "SUSE Linux Enterprise Micro 5.2:kernel-rt-5.3.18-150300.214.1.x86_64",
            "SUSE Linux Enterprise Micro 5.2:kernel-source-rt-5.3.18-150300.214.1.noarch"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2025-07-15T14:20:22Z",
          "details": "moderate"
        }
      ],
      "title": "CVE-2022-50097"
    },
    {
      "cve": "CVE-2022-50098",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2022-50098"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "In the Linux kernel, the following vulnerability has been resolved:\n\nscsi: qla2xxx: Fix crash due to stale SRB access around I/O timeouts\n\nEnsure SRB is returned during I/O timeout error escalation. If that is not\npossible fail the escalation path.\n\nFollowing crash stack was seen:\n\nBUG: unable to handle kernel paging request at 0000002f56aa90f8\nIP: qla_chk_edif_rx_sa_delete_pending+0x14/0x30 [qla2xxx]\nCall Trace:\n ? qla2x00_status_entry+0x19f/0x1c50 [qla2xxx]\n ? qla2x00_start_sp+0x116/0x1170 [qla2xxx]\n ? dma_pool_alloc+0x1d6/0x210\n ? mempool_alloc+0x54/0x130\n ? qla24xx_process_response_queue+0x548/0x12b0 [qla2xxx]\n ? qla_do_work+0x2d/0x40 [qla2xxx]\n ? process_one_work+0x14c/0x390",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "SUSE Linux Enterprise Micro 5.1:kernel-rt-5.3.18-150300.214.1.x86_64",
          "SUSE Linux Enterprise Micro 5.1:kernel-source-rt-5.3.18-150300.214.1.noarch",
          "SUSE Linux Enterprise Micro 5.2:kernel-rt-5.3.18-150300.214.1.x86_64",
          "SUSE Linux Enterprise Micro 5.2:kernel-source-rt-5.3.18-150300.214.1.noarch"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2022-50098",
          "url": "https://www.suse.com/security/cve/CVE-2022-50098"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1244841 for CVE-2022-50098",
          "url": "https://bugzilla.suse.com/1244841"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "SUSE Linux Enterprise Micro 5.1:kernel-rt-5.3.18-150300.214.1.x86_64",
            "SUSE Linux Enterprise Micro 5.1:kernel-source-rt-5.3.18-150300.214.1.noarch",
            "SUSE Linux Enterprise Micro 5.2:kernel-rt-5.3.18-150300.214.1.x86_64",
            "SUSE Linux Enterprise Micro 5.2:kernel-source-rt-5.3.18-150300.214.1.noarch"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 5.5,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
            "version": "3.1"
          },
          "products": [
            "SUSE Linux Enterprise Micro 5.1:kernel-rt-5.3.18-150300.214.1.x86_64",
            "SUSE Linux Enterprise Micro 5.1:kernel-source-rt-5.3.18-150300.214.1.noarch",
            "SUSE Linux Enterprise Micro 5.2:kernel-rt-5.3.18-150300.214.1.x86_64",
            "SUSE Linux Enterprise Micro 5.2:kernel-source-rt-5.3.18-150300.214.1.noarch"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2025-07-15T14:20:22Z",
          "details": "moderate"
        }
      ],
      "title": "CVE-2022-50098"
    },
    {
      "cve": "CVE-2022-50099",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2022-50099"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "In the Linux kernel, the following vulnerability has been resolved:\n\nvideo: fbdev: arkfb: Check the size of screen before memset_io()\n\nIn the function arkfb_set_par(), the value of \u0027screen_size\u0027 is\ncalculated by the user input. If the user provides the improper value,\nthe value of \u0027screen_size\u0027 may larger than \u0027info-\u003escreen_size\u0027, which\nmay cause the following bug:\n\n[  659.399066] BUG: unable to handle page fault for address: ffffc90003000000\n[  659.399077] #PF: supervisor write access in kernel mode\n[  659.399079] #PF: error_code(0x0002) - not-present page\n[  659.399094] RIP: 0010:memset_orig+0x33/0xb0\n[  659.399116] Call Trace:\n[  659.399122]  arkfb_set_par+0x143f/0x24c0\n[  659.399130]  fb_set_var+0x604/0xeb0\n[  659.399161]  do_fb_ioctl+0x234/0x670\n[  659.399189]  fb_ioctl+0xdd/0x130\n\nFix the this by checking the value of \u0027screen_size\u0027 before memset_io().",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "SUSE Linux Enterprise Micro 5.1:kernel-rt-5.3.18-150300.214.1.x86_64",
          "SUSE Linux Enterprise Micro 5.1:kernel-source-rt-5.3.18-150300.214.1.noarch",
          "SUSE Linux Enterprise Micro 5.2:kernel-rt-5.3.18-150300.214.1.x86_64",
          "SUSE Linux Enterprise Micro 5.2:kernel-source-rt-5.3.18-150300.214.1.noarch"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2022-50099",
          "url": "https://www.suse.com/security/cve/CVE-2022-50099"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1244842 for CVE-2022-50099",
          "url": "https://bugzilla.suse.com/1244842"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "SUSE Linux Enterprise Micro 5.1:kernel-rt-5.3.18-150300.214.1.x86_64",
            "SUSE Linux Enterprise Micro 5.1:kernel-source-rt-5.3.18-150300.214.1.noarch",
            "SUSE Linux Enterprise Micro 5.2:kernel-rt-5.3.18-150300.214.1.x86_64",
            "SUSE Linux Enterprise Micro 5.2:kernel-source-rt-5.3.18-150300.214.1.noarch"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 5.5,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
            "version": "3.1"
          },
          "products": [
            "SUSE Linux Enterprise Micro 5.1:kernel-rt-5.3.18-150300.214.1.x86_64",
            "SUSE Linux Enterprise Micro 5.1:kernel-source-rt-5.3.18-150300.214.1.noarch",
            "SUSE Linux Enterprise Micro 5.2:kernel-rt-5.3.18-150300.214.1.x86_64",
            "SUSE Linux Enterprise Micro 5.2:kernel-source-rt-5.3.18-150300.214.1.noarch"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2025-07-15T14:20:22Z",
          "details": "moderate"
        }
      ],
      "title": "CVE-2022-50099"
    },
    {
      "cve": "CVE-2022-50101",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2022-50101"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "In the Linux kernel, the following vulnerability has been resolved:\n\nvideo: fbdev: vt8623fb: Check the size of screen before memset_io()\n\nIn the function vt8623fb_set_par(), the value of \u0027screen_size\u0027 is\ncalculated by the user input. If the user provides the improper value,\nthe value of \u0027screen_size\u0027 may larger than \u0027info-\u003escreen_size\u0027, which\nmay cause the following bug:\n\n[  583.339036] BUG: unable to handle page fault for address: ffffc90005000000\n[  583.339049] #PF: supervisor write access in kernel mode\n[  583.339052] #PF: error_code(0x0002) - not-present page\n[  583.339074] RIP: 0010:memset_orig+0x33/0xb0\n[  583.339110] Call Trace:\n[  583.339118]  vt8623fb_set_par+0x11cd/0x21e0\n[  583.339146]  fb_set_var+0x604/0xeb0\n[  583.339181]  do_fb_ioctl+0x234/0x670\n[  583.339209]  fb_ioctl+0xdd/0x130\n\nFix the this by checking the value of \u0027screen_size\u0027 before memset_io().",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "SUSE Linux Enterprise Micro 5.1:kernel-rt-5.3.18-150300.214.1.x86_64",
          "SUSE Linux Enterprise Micro 5.1:kernel-source-rt-5.3.18-150300.214.1.noarch",
          "SUSE Linux Enterprise Micro 5.2:kernel-rt-5.3.18-150300.214.1.x86_64",
          "SUSE Linux Enterprise Micro 5.2:kernel-source-rt-5.3.18-150300.214.1.noarch"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2022-50101",
          "url": "https://www.suse.com/security/cve/CVE-2022-50101"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1244839 for CVE-2022-50101",
          "url": "https://bugzilla.suse.com/1244839"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "SUSE Linux Enterprise Micro 5.1:kernel-rt-5.3.18-150300.214.1.x86_64",
            "SUSE Linux Enterprise Micro 5.1:kernel-source-rt-5.3.18-150300.214.1.noarch",
            "SUSE Linux Enterprise Micro 5.2:kernel-rt-5.3.18-150300.214.1.x86_64",
            "SUSE Linux Enterprise Micro 5.2:kernel-source-rt-5.3.18-150300.214.1.noarch"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 5.5,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
            "version": "3.1"
          },
          "products": [
            "SUSE Linux Enterprise Micro 5.1:kernel-rt-5.3.18-150300.214.1.x86_64",
            "SUSE Linux Enterprise Micro 5.1:kernel-source-rt-5.3.18-150300.214.1.noarch",
            "SUSE Linux Enterprise Micro 5.2:kernel-rt-5.3.18-150300.214.1.x86_64",
            "SUSE Linux Enterprise Micro 5.2:kernel-source-rt-5.3.18-150300.214.1.noarch"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2025-07-15T14:20:22Z",
          "details": "moderate"
        }
      ],
      "title": "CVE-2022-50101"
    },
    {
      "cve": "CVE-2022-50102",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2022-50102"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "In the Linux kernel, the following vulnerability has been resolved:\n\nvideo: fbdev: arkfb: Fix a divide-by-zero bug in ark_set_pixclock()\n\nSince the user can control the arguments of the ioctl() from the user\nspace, under special arguments that may result in a divide-by-zero bug\nin:\n  drivers/video/fbdev/arkfb.c:784: ark_set_pixclock(info, (hdiv * info-\u003evar.pixclock) / hmul);\nwith hdiv=1, pixclock=1 and hmul=2 you end up with (1*1)/2 = (int) 0.\nand then in:\n  drivers/video/fbdev/arkfb.c:504: rv = dac_set_freq(par-\u003edac, 0, 1000000000 / pixclock);\nwe\u0027ll get a division-by-zero.\n\nThe following log can reveal it:\n\ndivide error: 0000 [#1] PREEMPT SMP KASAN PTI\nRIP: 0010:ark_set_pixclock drivers/video/fbdev/arkfb.c:504 [inline]\nRIP: 0010:arkfb_set_par+0x10fc/0x24c0 drivers/video/fbdev/arkfb.c:784\nCall Trace:\n fb_set_var+0x604/0xeb0 drivers/video/fbdev/core/fbmem.c:1034\n do_fb_ioctl+0x234/0x670 drivers/video/fbdev/core/fbmem.c:1110\n fb_ioctl+0xdd/0x130 drivers/video/fbdev/core/fbmem.c:1189\n\nFix this by checking the argument of ark_set_pixclock() first.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "SUSE Linux Enterprise Micro 5.1:kernel-rt-5.3.18-150300.214.1.x86_64",
          "SUSE Linux Enterprise Micro 5.1:kernel-source-rt-5.3.18-150300.214.1.noarch",
          "SUSE Linux Enterprise Micro 5.2:kernel-rt-5.3.18-150300.214.1.x86_64",
          "SUSE Linux Enterprise Micro 5.2:kernel-source-rt-5.3.18-150300.214.1.noarch"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2022-50102",
          "url": "https://www.suse.com/security/cve/CVE-2022-50102"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1244838 for CVE-2022-50102",
          "url": "https://bugzilla.suse.com/1244838"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "SUSE Linux Enterprise Micro 5.1:kernel-rt-5.3.18-150300.214.1.x86_64",
            "SUSE Linux Enterprise Micro 5.1:kernel-source-rt-5.3.18-150300.214.1.noarch",
            "SUSE Linux Enterprise Micro 5.2:kernel-rt-5.3.18-150300.214.1.x86_64",
            "SUSE Linux Enterprise Micro 5.2:kernel-source-rt-5.3.18-150300.214.1.noarch"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 5.5,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
            "version": "3.1"
          },
          "products": [
            "SUSE Linux Enterprise Micro 5.1:kernel-rt-5.3.18-150300.214.1.x86_64",
            "SUSE Linux Enterprise Micro 5.1:kernel-source-rt-5.3.18-150300.214.1.noarch",
            "SUSE Linux Enterprise Micro 5.2:kernel-rt-5.3.18-150300.214.1.x86_64",
            "SUSE Linux Enterprise Micro 5.2:kernel-source-rt-5.3.18-150300.214.1.noarch"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2025-07-15T14:20:22Z",
          "details": "moderate"
        }
      ],
      "title": "CVE-2022-50102"
    },
    {
      "cve": "CVE-2022-50104",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2022-50104"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "In the Linux kernel, the following vulnerability has been resolved:\n\npowerpc/xive: Fix refcount leak in xive_get_max_prio\n\nof_find_node_by_path() returns a node pointer with\nrefcount incremented, we should use of_node_put() on it when done.\nAdd missing of_node_put() to avoid refcount leak.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "SUSE Linux Enterprise Micro 5.1:kernel-rt-5.3.18-150300.214.1.x86_64",
          "SUSE Linux Enterprise Micro 5.1:kernel-source-rt-5.3.18-150300.214.1.noarch",
          "SUSE Linux Enterprise Micro 5.2:kernel-rt-5.3.18-150300.214.1.x86_64",
          "SUSE Linux Enterprise Micro 5.2:kernel-source-rt-5.3.18-150300.214.1.noarch"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2022-50104",
          "url": "https://www.suse.com/security/cve/CVE-2022-50104"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1244836 for CVE-2022-50104",
          "url": "https://bugzilla.suse.com/1244836"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "SUSE Linux Enterprise Micro 5.1:kernel-rt-5.3.18-150300.214.1.x86_64",
            "SUSE Linux Enterprise Micro 5.1:kernel-source-rt-5.3.18-150300.214.1.noarch",
            "SUSE Linux Enterprise Micro 5.2:kernel-rt-5.3.18-150300.214.1.x86_64",
            "SUSE Linux Enterprise Micro 5.2:kernel-source-rt-5.3.18-150300.214.1.noarch"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 5.5,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
            "version": "3.1"
          },
          "products": [
            "SUSE Linux Enterprise Micro 5.1:kernel-rt-5.3.18-150300.214.1.x86_64",
            "SUSE Linux Enterprise Micro 5.1:kernel-source-rt-5.3.18-150300.214.1.noarch",
            "SUSE Linux Enterprise Micro 5.2:kernel-rt-5.3.18-150300.214.1.x86_64",
            "SUSE Linux Enterprise Micro 5.2:kernel-source-rt-5.3.18-150300.214.1.noarch"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2025-07-15T14:20:22Z",
          "details": "moderate"
        }
      ],
      "title": "CVE-2022-50104"
    },
    {
      "cve": "CVE-2022-50108",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2022-50108"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "In the Linux kernel, the following vulnerability has been resolved:\n\nmfd: max77620: Fix refcount leak in max77620_initialise_fps\n\nof_get_child_by_name() returns a node pointer with refcount\nincremented, we should use of_node_put() on it when not need anymore.\nAdd missing of_node_put() to avoid refcount leak.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "SUSE Linux Enterprise Micro 5.1:kernel-rt-5.3.18-150300.214.1.x86_64",
          "SUSE Linux Enterprise Micro 5.1:kernel-source-rt-5.3.18-150300.214.1.noarch",
          "SUSE Linux Enterprise Micro 5.2:kernel-rt-5.3.18-150300.214.1.x86_64",
          "SUSE Linux Enterprise Micro 5.2:kernel-source-rt-5.3.18-150300.214.1.noarch"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2022-50108",
          "url": "https://www.suse.com/security/cve/CVE-2022-50108"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1244834 for CVE-2022-50108",
          "url": "https://bugzilla.suse.com/1244834"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "SUSE Linux Enterprise Micro 5.1:kernel-rt-5.3.18-150300.214.1.x86_64",
            "SUSE Linux Enterprise Micro 5.1:kernel-source-rt-5.3.18-150300.214.1.noarch",
            "SUSE Linux Enterprise Micro 5.2:kernel-rt-5.3.18-150300.214.1.x86_64",
            "SUSE Linux Enterprise Micro 5.2:kernel-source-rt-5.3.18-150300.214.1.noarch"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 5.5,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
            "version": "3.1"
          },
          "products": [
            "SUSE Linux Enterprise Micro 5.1:kernel-rt-5.3.18-150300.214.1.x86_64",
            "SUSE Linux Enterprise Micro 5.1:kernel-source-rt-5.3.18-150300.214.1.noarch",
            "SUSE Linux Enterprise Micro 5.2:kernel-rt-5.3.18-150300.214.1.x86_64",
            "SUSE Linux Enterprise Micro 5.2:kernel-source-rt-5.3.18-150300.214.1.noarch"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2025-07-15T14:20:22Z",
          "details": "moderate"
        }
      ],
      "title": "CVE-2022-50108"
    },
    {
      "cve": "CVE-2022-50109",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2022-50109"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "In the Linux kernel, the following vulnerability has been resolved:\n\nvideo: fbdev: amba-clcd: Fix refcount leak bugs\n\nIn clcdfb_of_init_display(), we should call of_node_put() for the\nreferences returned by of_graph_get_next_endpoint() and\nof_graph_get_remote_port_parent() which have increased the refcount.\n\nBesides, we should call of_node_put() both in fail path or when\nthe references are not used anymore.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "SUSE Linux Enterprise Micro 5.1:kernel-rt-5.3.18-150300.214.1.x86_64",
          "SUSE Linux Enterprise Micro 5.1:kernel-source-rt-5.3.18-150300.214.1.noarch",
          "SUSE Linux Enterprise Micro 5.2:kernel-rt-5.3.18-150300.214.1.x86_64",
          "SUSE Linux Enterprise Micro 5.2:kernel-source-rt-5.3.18-150300.214.1.noarch"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2022-50109",
          "url": "https://www.suse.com/security/cve/CVE-2022-50109"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1244884 for CVE-2022-50109",
          "url": "https://bugzilla.suse.com/1244884"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "SUSE Linux Enterprise Micro 5.1:kernel-rt-5.3.18-150300.214.1.x86_64",
            "SUSE Linux Enterprise Micro 5.1:kernel-source-rt-5.3.18-150300.214.1.noarch",
            "SUSE Linux Enterprise Micro 5.2:kernel-rt-5.3.18-150300.214.1.x86_64",
            "SUSE Linux Enterprise Micro 5.2:kernel-source-rt-5.3.18-150300.214.1.noarch"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 5.5,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
            "version": "3.1"
          },
          "products": [
            "SUSE Linux Enterprise Micro 5.1:kernel-rt-5.3.18-150300.214.1.x86_64",
            "SUSE Linux Enterprise Micro 5.1:kernel-source-rt-5.3.18-150300.214.1.noarch",
            "SUSE Linux Enterprise Micro 5.2:kernel-rt-5.3.18-150300.214.1.x86_64",
            "SUSE Linux Enterprise Micro 5.2:kernel-source-rt-5.3.18-150300.214.1.noarch"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2025-07-15T14:20:22Z",
          "details": "moderate"
        }
      ],
      "title": "CVE-2022-50109"
    },
    {
      "cve": "CVE-2022-50118",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2022-50118"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "In the Linux kernel, the following vulnerability has been resolved:\n\npowerpc/perf: Optimize clearing the pending PMI and remove WARN_ON for PMI check in power_pmu_disable\n\ncommit 2c9ac51b850d (\"powerpc/perf: Fix PMU callbacks to clear\npending PMI before resetting an overflown PMC\") added a new\nfunction \"pmi_irq_pending\" in hw_irq.h. This function is to check\nif there is a PMI marked as pending in Paca (PACA_IRQ_PMI).This is\nused in power_pmu_disable in a WARN_ON. The intention here is to\nprovide a warning if there is PMI pending, but no counter is found\noverflown.\n\nDuring some of the perf runs, below warning is hit:\n\nWARNING: CPU: 36 PID: 0 at arch/powerpc/perf/core-book3s.c:1332 power_pmu_disable+0x25c/0x2c0\n Modules linked in:\n -----\n\n NIP [c000000000141c3c] power_pmu_disable+0x25c/0x2c0\n LR [c000000000141c8c] power_pmu_disable+0x2ac/0x2c0\n Call Trace:\n [c000000baffcfb90] [c000000000141c8c] power_pmu_disable+0x2ac/0x2c0 (unreliable)\n [c000000baffcfc10] [c0000000003e2f8c] perf_pmu_disable+0x4c/0x60\n [c000000baffcfc30] [c0000000003e3344] group_sched_out.part.124+0x44/0x100\n [c000000baffcfc80] [c0000000003e353c] __perf_event_disable+0x13c/0x240\n [c000000baffcfcd0] [c0000000003dd334] event_function+0xc4/0x140\n [c000000baffcfd20] [c0000000003d855c] remote_function+0x7c/0xa0\n [c000000baffcfd50] [c00000000026c394] flush_smp_call_function_queue+0xd4/0x300\n [c000000baffcfde0] [c000000000065b24] smp_ipi_demux_relaxed+0xa4/0x100\n [c000000baffcfe20] [c0000000000cb2b0] xive_muxed_ipi_action+0x20/0x40\n [c000000baffcfe40] [c000000000207c3c] __handle_irq_event_percpu+0x8c/0x250\n [c000000baffcfee0] [c000000000207e2c] handle_irq_event_percpu+0x2c/0xa0\n [c000000baffcff10] [c000000000210a04] handle_percpu_irq+0x84/0xc0\n [c000000baffcff40] [c000000000205f14] generic_handle_irq+0x54/0x80\n [c000000baffcff60] [c000000000015740] __do_irq+0x90/0x1d0\n [c000000baffcff90] [c000000000016990] __do_IRQ+0xc0/0x140\n [c0000009732f3940] [c000000bafceaca8] 0xc000000bafceaca8\n [c0000009732f39d0] [c000000000016b78] do_IRQ+0x168/0x1c0\n [c0000009732f3a00] [c0000000000090c8] hardware_interrupt_common_virt+0x218/0x220\n\nThis means that there is no PMC overflown among the active events\nin the PMU, but there is a PMU pending in Paca. The function\n\"any_pmc_overflown\" checks the PMCs on active events in\ncpuhw-\u003en_events. Code snippet:\n\n\u003c\u003c\u003e\u003e\nif (any_pmc_overflown(cpuhw))\n \tclear_pmi_irq_pending();\n else\n \tWARN_ON(pmi_irq_pending());\n\u003c\u003c\u003e\u003e\n\nHere the PMC overflown is not from active event. Example: When we do\nperf record, default cycles and instructions will be running on PMC6\nand PMC5 respectively. It could happen that overflowed event is currently\nnot active and pending PMI is for the inactive event. Debug logs from\ntrace_printk:\n\n\u003c\u003c\u003e\u003e\nany_pmc_overflown: idx is 5: pmc value is 0xd9a\npower_pmu_disable: PMC1: 0x0, PMC2: 0x0, PMC3: 0x0, PMC4: 0x0, PMC5: 0xd9a, PMC6: 0x80002011\n\u003c\u003c\u003e\u003e\n\nHere active PMC (from idx) is PMC5 , but overflown PMC is PMC6(0x80002011).\nWhen we handle PMI interrupt for such cases, if the PMC overflown is\nfrom inactive event, it will be ignored. Reference commit:\ncommit bc09c219b2e6 (\"powerpc/perf: Fix finding overflowed PMC in interrupt\")\n\nPatch addresses two changes:\n1) Fix 1 : Removal of warning ( WARN_ON(pmi_irq_pending()); )\n   We were printing warning if no PMC is found overflown among active PMU\n   events, but PMI pending in PACA. But this could happen in cases where\n   PMC overflown is not in active PMC. An inactive event could have caused\n   the overflow. Hence the warning is not needed. To know pending PMI is\n   from an inactive event, we need to loop through all PMC\u0027s which will\n   cause more SPR reads via mfspr and increase in context switch. Also in\n   existing function: perf_event_interrupt, already we ignore PMI\u0027s\n   overflown when it is from an inactive PMC.\n\n2) Fix 2: optimization in clearing pending PMI.\n   Currently we check for any active PMC overflown before clearing PMI\n   pending in Paca. This is causing additional SP\n---truncated---",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "SUSE Linux Enterprise Micro 5.1:kernel-rt-5.3.18-150300.214.1.x86_64",
          "SUSE Linux Enterprise Micro 5.1:kernel-source-rt-5.3.18-150300.214.1.noarch",
          "SUSE Linux Enterprise Micro 5.2:kernel-rt-5.3.18-150300.214.1.x86_64",
          "SUSE Linux Enterprise Micro 5.2:kernel-source-rt-5.3.18-150300.214.1.noarch"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2022-50118",
          "url": "https://www.suse.com/security/cve/CVE-2022-50118"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1244825 for CVE-2022-50118",
          "url": "https://bugzilla.suse.com/1244825"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "SUSE Linux Enterprise Micro 5.1:kernel-rt-5.3.18-150300.214.1.x86_64",
            "SUSE Linux Enterprise Micro 5.1:kernel-source-rt-5.3.18-150300.214.1.noarch",
            "SUSE Linux Enterprise Micro 5.2:kernel-rt-5.3.18-150300.214.1.x86_64",
            "SUSE Linux Enterprise Micro 5.2:kernel-source-rt-5.3.18-150300.214.1.noarch"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 5.5,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
            "version": "3.1"
          },
          "products": [
            "SUSE Linux Enterprise Micro 5.1:kernel-rt-5.3.18-150300.214.1.x86_64",
            "SUSE Linux Enterprise Micro 5.1:kernel-source-rt-5.3.18-150300.214.1.noarch",
            "SUSE Linux Enterprise Micro 5.2:kernel-rt-5.3.18-150300.214.1.x86_64",
            "SUSE Linux Enterprise Micro 5.2:kernel-source-rt-5.3.18-150300.214.1.noarch"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2025-07-15T14:20:22Z",
          "details": "moderate"
        }
      ],
      "title": "CVE-2022-50118"
    },
    {
      "cve": "CVE-2022-50124",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2022-50124"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "In the Linux kernel, the following vulnerability has been resolved:\n\nASoC: mt6797-mt6351: Fix refcount leak in mt6797_mt6351_dev_probe\n\nof_parse_phandle() returns a node pointer with refcount\nincremented, we should use of_node_put() on it when not need anymore.\nAdd missing of_node_put() to avoid refcount leak.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "SUSE Linux Enterprise Micro 5.1:kernel-rt-5.3.18-150300.214.1.x86_64",
          "SUSE Linux Enterprise Micro 5.1:kernel-source-rt-5.3.18-150300.214.1.noarch",
          "SUSE Linux Enterprise Micro 5.2:kernel-rt-5.3.18-150300.214.1.x86_64",
          "SUSE Linux Enterprise Micro 5.2:kernel-source-rt-5.3.18-150300.214.1.noarch"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2022-50124",
          "url": "https://www.suse.com/security/cve/CVE-2022-50124"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1244816 for CVE-2022-50124",
          "url": "https://bugzilla.suse.com/1244816"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "SUSE Linux Enterprise Micro 5.1:kernel-rt-5.3.18-150300.214.1.x86_64",
            "SUSE Linux Enterprise Micro 5.1:kernel-source-rt-5.3.18-150300.214.1.noarch",
            "SUSE Linux Enterprise Micro 5.2:kernel-rt-5.3.18-150300.214.1.x86_64",
            "SUSE Linux Enterprise Micro 5.2:kernel-source-rt-5.3.18-150300.214.1.noarch"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 5.5,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
            "version": "3.1"
          },
          "products": [
            "SUSE Linux Enterprise Micro 5.1:kernel-rt-5.3.18-150300.214.1.x86_64",
            "SUSE Linux Enterprise Micro 5.1:kernel-source-rt-5.3.18-150300.214.1.noarch",
            "SUSE Linux Enterprise Micro 5.2:kernel-rt-5.3.18-150300.214.1.x86_64",
            "SUSE Linux Enterprise Micro 5.2:kernel-source-rt-5.3.18-150300.214.1.noarch"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2025-07-15T14:20:22Z",
          "details": "moderate"
        }
      ],
      "title": "CVE-2022-50124"
    },
    {
      "cve": "CVE-2022-50126",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2022-50126"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "In the Linux kernel, the following vulnerability has been resolved:\n\njbd2: fix assertion \u0027jh-\u003eb_frozen_data == NULL\u0027 failure when journal aborted\n\nFollowing process will fail assertion \u0027jh-\u003eb_frozen_data == NULL\u0027 in\njbd2_journal_dirty_metadata():\n\n                   jbd2_journal_commit_transaction\nunlink(dir/a)\n jh-\u003eb_transaction = trans1\n jh-\u003eb_jlist = BJ_Metadata\n                    journal-\u003ej_running_transaction = NULL\n                    trans1-\u003et_state = T_COMMIT\nunlink(dir/b)\n handle-\u003eh_trans = trans2\n do_get_write_access\n  jh-\u003eb_modified = 0\n  jh-\u003eb_frozen_data = frozen_buffer\n  jh-\u003eb_next_transaction = trans2\n jbd2_journal_dirty_metadata\n  is_handle_aborted\n   is_journal_aborted // return false\n\n           --\u003e jbd2 abort \u003c--\n\n                     while (commit_transaction-\u003et_buffers)\n                      if (is_journal_aborted)\n                       jbd2_journal_refile_buffer\n                        __jbd2_journal_refile_buffer\n                         WRITE_ONCE(jh-\u003eb_transaction,\n\t\t\t\t\t\tjh-\u003eb_next_transaction)\n                         WRITE_ONCE(jh-\u003eb_next_transaction, NULL)\n                         __jbd2_journal_file_buffer(jh, BJ_Reserved)\n        J_ASSERT_JH(jh, jh-\u003eb_frozen_data == NULL) // assertion failure !\n\nThe reproducer (See detail in [Link]) reports:\n ------------[ cut here ]------------\n kernel BUG at fs/jbd2/transaction.c:1629!\n invalid opcode: 0000 [#1] PREEMPT SMP\n CPU: 2 PID: 584 Comm: unlink Tainted: G        W\n 5.19.0-rc6-00115-g4a57a8400075-dirty #697\n RIP: 0010:jbd2_journal_dirty_metadata+0x3c5/0x470\n RSP: 0018:ffffc90000be7ce0 EFLAGS: 00010202\n Call Trace:\n  \u003cTASK\u003e\n  __ext4_handle_dirty_metadata+0xa0/0x290\n  ext4_handle_dirty_dirblock+0x10c/0x1d0\n  ext4_delete_entry+0x104/0x200\n  __ext4_unlink+0x22b/0x360\n  ext4_unlink+0x275/0x390\n  vfs_unlink+0x20b/0x4c0\n  do_unlinkat+0x42f/0x4c0\n  __x64_sys_unlink+0x37/0x50\n  do_syscall_64+0x35/0x80\n\nAfter journal aborting, __jbd2_journal_refile_buffer() is executed with\nholding @jh-\u003eb_state_lock, we can fix it by moving \u0027is_handle_aborted()\u0027\ninto the area protected by @jh-\u003eb_state_lock.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "SUSE Linux Enterprise Micro 5.1:kernel-rt-5.3.18-150300.214.1.x86_64",
          "SUSE Linux Enterprise Micro 5.1:kernel-source-rt-5.3.18-150300.214.1.noarch",
          "SUSE Linux Enterprise Micro 5.2:kernel-rt-5.3.18-150300.214.1.x86_64",
          "SUSE Linux Enterprise Micro 5.2:kernel-source-rt-5.3.18-150300.214.1.noarch"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2022-50126",
          "url": "https://www.suse.com/security/cve/CVE-2022-50126"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1244813 for CVE-2022-50126",
          "url": "https://bugzilla.suse.com/1244813"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "SUSE Linux Enterprise Micro 5.1:kernel-rt-5.3.18-150300.214.1.x86_64",
            "SUSE Linux Enterprise Micro 5.1:kernel-source-rt-5.3.18-150300.214.1.noarch",
            "SUSE Linux Enterprise Micro 5.2:kernel-rt-5.3.18-150300.214.1.x86_64",
            "SUSE Linux Enterprise Micro 5.2:kernel-source-rt-5.3.18-150300.214.1.noarch"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 5.5,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
            "version": "3.1"
          },
          "products": [
            "SUSE Linux Enterprise Micro 5.1:kernel-rt-5.3.18-150300.214.1.x86_64",
            "SUSE Linux Enterprise Micro 5.1:kernel-source-rt-5.3.18-150300.214.1.noarch",
            "SUSE Linux Enterprise Micro 5.2:kernel-rt-5.3.18-150300.214.1.x86_64",
            "SUSE Linux Enterprise Micro 5.2:kernel-source-rt-5.3.18-150300.214.1.noarch"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2025-07-15T14:20:22Z",
          "details": "moderate"
        }
      ],
      "title": "CVE-2022-50126"
    },
    {
      "cve": "CVE-2022-50127",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2022-50127"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "In the Linux kernel, the following vulnerability has been resolved:\n\nRDMA/rxe: Fix error unwind in rxe_create_qp()\n\nIn the function rxe_create_qp(), rxe_qp_from_init() is called to\ninitialize qp, internally things like the spin locks are not setup until\nrxe_qp_init_req().\n\nIf an error occures before this point then the unwind will call\nrxe_cleanup() and eventually to rxe_qp_do_cleanup()/rxe_cleanup_task()\nwhich will oops when trying to access the uninitialized spinlock.\n\nMove the spinlock initializations earlier before any failures.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "SUSE Linux Enterprise Micro 5.1:kernel-rt-5.3.18-150300.214.1.x86_64",
          "SUSE Linux Enterprise Micro 5.1:kernel-source-rt-5.3.18-150300.214.1.noarch",
          "SUSE Linux Enterprise Micro 5.2:kernel-rt-5.3.18-150300.214.1.x86_64",
          "SUSE Linux Enterprise Micro 5.2:kernel-source-rt-5.3.18-150300.214.1.noarch"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2022-50127",
          "url": "https://www.suse.com/security/cve/CVE-2022-50127"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1244815 for CVE-2022-50127",
          "url": "https://bugzilla.suse.com/1244815"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "SUSE Linux Enterprise Micro 5.1:kernel-rt-5.3.18-150300.214.1.x86_64",
            "SUSE Linux Enterprise Micro 5.1:kernel-source-rt-5.3.18-150300.214.1.noarch",
            "SUSE Linux Enterprise Micro 5.2:kernel-rt-5.3.18-150300.214.1.x86_64",
            "SUSE Linux Enterprise Micro 5.2:kernel-source-rt-5.3.18-150300.214.1.noarch"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 5.5,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
            "version": "3.1"
          },
          "products": [
            "SUSE Linux Enterprise Micro 5.1:kernel-rt-5.3.18-150300.214.1.x86_64",
            "SUSE Linux Enterprise Micro 5.1:kernel-source-rt-5.3.18-150300.214.1.noarch",
            "SUSE Linux Enterprise Micro 5.2:kernel-rt-5.3.18-150300.214.1.x86_64",
            "SUSE Linux Enterprise Micro 5.2:kernel-source-rt-5.3.18-150300.214.1.noarch"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2025-07-15T14:20:22Z",
          "details": "moderate"
        }
      ],
      "title": "CVE-2022-50127"
    },
    {
      "cve": "CVE-2022-50136",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2022-50136"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "In the Linux kernel, the following vulnerability has been resolved:\n\nRDMA/siw: Fix duplicated reported IW_CM_EVENT_CONNECT_REPLY event\n\nIf siw_recv_mpa_rr returns -EAGAIN, it means that the MPA reply hasn\u0027t\nbeen received completely, and should not report IW_CM_EVENT_CONNECT_REPLY\nin this case. This may trigger a call trace in iw_cm. A simple way to\ntrigger this:\n server: ib_send_lat\n client: ib_send_lat -R \u003cserver_ip\u003e\n\nThe call trace looks like this:\n\n kernel BUG at drivers/infiniband/core/iwcm.c:894!\n invalid opcode: 0000 [#1] PREEMPT SMP NOPTI\n \u003c...\u003e\n Workqueue: iw_cm_wq cm_work_handler [iw_cm]\n Call Trace:\n  \u003cTASK\u003e\n  cm_work_handler+0x1dd/0x370 [iw_cm]\n  process_one_work+0x1e2/0x3b0\n  worker_thread+0x49/0x2e0\n  ? rescuer_thread+0x370/0x370\n  kthread+0xe5/0x110\n  ? kthread_complete_and_exit+0x20/0x20\n  ret_from_fork+0x1f/0x30\n  \u003c/TASK\u003e",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "SUSE Linux Enterprise Micro 5.1:kernel-rt-5.3.18-150300.214.1.x86_64",
          "SUSE Linux Enterprise Micro 5.1:kernel-source-rt-5.3.18-150300.214.1.noarch",
          "SUSE Linux Enterprise Micro 5.2:kernel-rt-5.3.18-150300.214.1.x86_64",
          "SUSE Linux Enterprise Micro 5.2:kernel-source-rt-5.3.18-150300.214.1.noarch"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2022-50136",
          "url": "https://www.suse.com/security/cve/CVE-2022-50136"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1244804 for CVE-2022-50136",
          "url": "https://bugzilla.suse.com/1244804"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "SUSE Linux Enterprise Micro 5.1:kernel-rt-5.3.18-150300.214.1.x86_64",
            "SUSE Linux Enterprise Micro 5.1:kernel-source-rt-5.3.18-150300.214.1.noarch",
            "SUSE Linux Enterprise Micro 5.2:kernel-rt-5.3.18-150300.214.1.x86_64",
            "SUSE Linux Enterprise Micro 5.2:kernel-source-rt-5.3.18-150300.214.1.noarch"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 5.5,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
            "version": "3.1"
          },
          "products": [
            "SUSE Linux Enterprise Micro 5.1:kernel-rt-5.3.18-150300.214.1.x86_64",
            "SUSE Linux Enterprise Micro 5.1:kernel-source-rt-5.3.18-150300.214.1.noarch",
            "SUSE Linux Enterprise Micro 5.2:kernel-rt-5.3.18-150300.214.1.x86_64",
            "SUSE Linux Enterprise Micro 5.2:kernel-source-rt-5.3.18-150300.214.1.noarch"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2025-07-15T14:20:22Z",
          "details": "moderate"
        }
      ],
      "title": "CVE-2022-50136"
    },
    {
      "cve": "CVE-2022-50138",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2022-50138"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "In the Linux kernel, the following vulnerability has been resolved:\n\nRDMA/qedr: Fix potential memory leak in __qedr_alloc_mr()\n\n__qedr_alloc_mr() allocates a memory chunk for \"mr-\u003einfo.pbl_table\" with\ninit_mr_info(). When rdma_alloc_tid() and rdma_register_tid() fail, \"mr\"\nis released while \"mr-\u003einfo.pbl_table\" is not released, which will lead\nto a memory leak.\n\nWe should release the \"mr-\u003einfo.pbl_table\" with qedr_free_pbl() when error\noccurs to fix the memory leak.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "SUSE Linux Enterprise Micro 5.1:kernel-rt-5.3.18-150300.214.1.x86_64",
          "SUSE Linux Enterprise Micro 5.1:kernel-source-rt-5.3.18-150300.214.1.noarch",
          "SUSE Linux Enterprise Micro 5.2:kernel-rt-5.3.18-150300.214.1.x86_64",
          "SUSE Linux Enterprise Micro 5.2:kernel-source-rt-5.3.18-150300.214.1.noarch"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2022-50138",
          "url": "https://www.suse.com/security/cve/CVE-2022-50138"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1244797 for CVE-2022-50138",
          "url": "https://bugzilla.suse.com/1244797"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "SUSE Linux Enterprise Micro 5.1:kernel-rt-5.3.18-150300.214.1.x86_64",
            "SUSE Linux Enterprise Micro 5.1:kernel-source-rt-5.3.18-150300.214.1.noarch",
            "SUSE Linux Enterprise Micro 5.2:kernel-rt-5.3.18-150300.214.1.x86_64",
            "SUSE Linux Enterprise Micro 5.2:kernel-source-rt-5.3.18-150300.214.1.noarch"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 5.5,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
            "version": "3.1"
          },
          "products": [
            "SUSE Linux Enterprise Micro 5.1:kernel-rt-5.3.18-150300.214.1.x86_64",
            "SUSE Linux Enterprise Micro 5.1:kernel-source-rt-5.3.18-150300.214.1.noarch",
            "SUSE Linux Enterprise Micro 5.2:kernel-rt-5.3.18-150300.214.1.x86_64",
            "SUSE Linux Enterprise Micro 5.2:kernel-source-rt-5.3.18-150300.214.1.noarch"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2025-07-15T14:20:22Z",
          "details": "moderate"
        }
      ],
      "title": "CVE-2022-50138"
    },
    {
      "cve": "CVE-2022-50140",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2022-50140"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "In the Linux kernel, the following vulnerability has been resolved:\n\nmemstick/ms_block: Fix a memory leak\n\n\u0027erased_blocks_bitmap\u0027 is never freed. As it is allocated at the same time\nas \u0027used_blocks_bitmap\u0027, it is likely that it should be freed also at the\nsame time.\n\nAdd the corresponding bitmap_free() in msb_data_clear().",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "SUSE Linux Enterprise Micro 5.1:kernel-rt-5.3.18-150300.214.1.x86_64",
          "SUSE Linux Enterprise Micro 5.1:kernel-source-rt-5.3.18-150300.214.1.noarch",
          "SUSE Linux Enterprise Micro 5.2:kernel-rt-5.3.18-150300.214.1.x86_64",
          "SUSE Linux Enterprise Micro 5.2:kernel-source-rt-5.3.18-150300.214.1.noarch"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2022-50140",
          "url": "https://www.suse.com/security/cve/CVE-2022-50140"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1244793 for CVE-2022-50140",
          "url": "https://bugzilla.suse.com/1244793"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "SUSE Linux Enterprise Micro 5.1:kernel-rt-5.3.18-150300.214.1.x86_64",
            "SUSE Linux Enterprise Micro 5.1:kernel-source-rt-5.3.18-150300.214.1.noarch",
            "SUSE Linux Enterprise Micro 5.2:kernel-rt-5.3.18-150300.214.1.x86_64",
            "SUSE Linux Enterprise Micro 5.2:kernel-source-rt-5.3.18-150300.214.1.noarch"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 5.5,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
            "version": "3.1"
          },
          "products": [
            "SUSE Linux Enterprise Micro 5.1:kernel-rt-5.3.18-150300.214.1.x86_64",
            "SUSE Linux Enterprise Micro 5.1:kernel-source-rt-5.3.18-150300.214.1.noarch",
            "SUSE Linux Enterprise Micro 5.2:kernel-rt-5.3.18-150300.214.1.x86_64",
            "SUSE Linux Enterprise Micro 5.2:kernel-source-rt-5.3.18-150300.214.1.noarch"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2025-07-15T14:20:22Z",
          "details": "moderate"
        }
      ],
      "title": "CVE-2022-50140"
    },
    {
      "cve": "CVE-2022-50141",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2022-50141"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "In the Linux kernel, the following vulnerability has been resolved:\n\nmmc: sdhci-of-esdhc: Fix refcount leak in esdhc_signal_voltage_switch\n\nof_find_matching_node() returns a node pointer with refcount\nincremented, we should use of_node_put() on it when not need anymore.\nAdd missing of_node_put() to avoid refcount leak.\nof_node_put() checks null pointer.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "SUSE Linux Enterprise Micro 5.1:kernel-rt-5.3.18-150300.214.1.x86_64",
          "SUSE Linux Enterprise Micro 5.1:kernel-source-rt-5.3.18-150300.214.1.noarch",
          "SUSE Linux Enterprise Micro 5.2:kernel-rt-5.3.18-150300.214.1.x86_64",
          "SUSE Linux Enterprise Micro 5.2:kernel-source-rt-5.3.18-150300.214.1.noarch"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2022-50141",
          "url": "https://www.suse.com/security/cve/CVE-2022-50141"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1244794 for CVE-2022-50141",
          "url": "https://bugzilla.suse.com/1244794"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "SUSE Linux Enterprise Micro 5.1:kernel-rt-5.3.18-150300.214.1.x86_64",
            "SUSE Linux Enterprise Micro 5.1:kernel-source-rt-5.3.18-150300.214.1.noarch",
            "SUSE Linux Enterprise Micro 5.2:kernel-rt-5.3.18-150300.214.1.x86_64",
            "SUSE Linux Enterprise Micro 5.2:kernel-source-rt-5.3.18-150300.214.1.noarch"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 5.5,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
            "version": "3.1"
          },
          "products": [
            "SUSE Linux Enterprise Micro 5.1:kernel-rt-5.3.18-150300.214.1.x86_64",
            "SUSE Linux Enterprise Micro 5.1:kernel-source-rt-5.3.18-150300.214.1.noarch",
            "SUSE Linux Enterprise Micro 5.2:kernel-rt-5.3.18-150300.214.1.x86_64",
            "SUSE Linux Enterprise Micro 5.2:kernel-source-rt-5.3.18-150300.214.1.noarch"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2025-07-15T14:20:22Z",
          "details": "moderate"
        }
      ],
      "title": "CVE-2022-50141"
    },
    {
      "cve": "CVE-2022-50142",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2022-50142"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "In the Linux kernel, the following vulnerability has been resolved:\n\nintel_th: msu: Fix vmalloced buffers\n\nAfter commit f5ff79fddf0e (\"dma-mapping: remove CONFIG_DMA_REMAP\") there\u0027s\na chance of DMA buffer getting allocated via vmalloc(), which messes up\nthe mmapping code:\n\n\u003e RIP: msc_mmap_fault [intel_th_msu]\n\u003e Call Trace:\n\u003e  \u003cTASK\u003e\n\u003e  __do_fault\n\u003e  do_fault\n...\n\nFix this by accounting for vmalloc possibility.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "SUSE Linux Enterprise Micro 5.1:kernel-rt-5.3.18-150300.214.1.x86_64",
          "SUSE Linux Enterprise Micro 5.1:kernel-source-rt-5.3.18-150300.214.1.noarch",
          "SUSE Linux Enterprise Micro 5.2:kernel-rt-5.3.18-150300.214.1.x86_64",
          "SUSE Linux Enterprise Micro 5.2:kernel-source-rt-5.3.18-150300.214.1.noarch"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2022-50142",
          "url": "https://www.suse.com/security/cve/CVE-2022-50142"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1244796 for CVE-2022-50142",
          "url": "https://bugzilla.suse.com/1244796"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "SUSE Linux Enterprise Micro 5.1:kernel-rt-5.3.18-150300.214.1.x86_64",
            "SUSE Linux Enterprise Micro 5.1:kernel-source-rt-5.3.18-150300.214.1.noarch",
            "SUSE Linux Enterprise Micro 5.2:kernel-rt-5.3.18-150300.214.1.x86_64",
            "SUSE Linux Enterprise Micro 5.2:kernel-source-rt-5.3.18-150300.214.1.noarch"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 5.5,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
            "version": "3.1"
          },
          "products": [
            "SUSE Linux Enterprise Micro 5.1:kernel-rt-5.3.18-150300.214.1.x86_64",
            "SUSE Linux Enterprise Micro 5.1:kernel-source-rt-5.3.18-150300.214.1.noarch",
            "SUSE Linux Enterprise Micro 5.2:kernel-rt-5.3.18-150300.214.1.x86_64",
            "SUSE Linux Enterprise Micro 5.2:kernel-source-rt-5.3.18-150300.214.1.noarch"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2025-07-15T14:20:22Z",
          "details": "moderate"
        }
      ],
      "title": "CVE-2022-50142"
    },
    {
      "cve": "CVE-2022-50143",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2022-50143"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "In the Linux kernel, the following vulnerability has been resolved:\n\nintel_th: Fix a resource leak in an error handling path\n\nIf an error occurs after calling \u0027pci_alloc_irq_vectors()\u0027,\n\u0027pci_free_irq_vectors()\u0027 must be called as already done in the remove\nfunction.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "SUSE Linux Enterprise Micro 5.1:kernel-rt-5.3.18-150300.214.1.x86_64",
          "SUSE Linux Enterprise Micro 5.1:kernel-source-rt-5.3.18-150300.214.1.noarch",
          "SUSE Linux Enterprise Micro 5.2:kernel-rt-5.3.18-150300.214.1.x86_64",
          "SUSE Linux Enterprise Micro 5.2:kernel-source-rt-5.3.18-150300.214.1.noarch"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2022-50143",
          "url": "https://www.suse.com/security/cve/CVE-2022-50143"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1244790 for CVE-2022-50143",
          "url": "https://bugzilla.suse.com/1244790"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "SUSE Linux Enterprise Micro 5.1:kernel-rt-5.3.18-150300.214.1.x86_64",
            "SUSE Linux Enterprise Micro 5.1:kernel-source-rt-5.3.18-150300.214.1.noarch",
            "SUSE Linux Enterprise Micro 5.2:kernel-rt-5.3.18-150300.214.1.x86_64",
            "SUSE Linux Enterprise Micro 5.2:kernel-source-rt-5.3.18-150300.214.1.noarch"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 5.5,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
            "version": "3.1"
          },
          "products": [
            "SUSE Linux Enterprise Micro 5.1:kernel-rt-5.3.18-150300.214.1.x86_64",
            "SUSE Linux Enterprise Micro 5.1:kernel-source-rt-5.3.18-150300.214.1.noarch",
            "SUSE Linux Enterprise Micro 5.2:kernel-rt-5.3.18-150300.214.1.x86_64",
            "SUSE Linux Enterprise Micro 5.2:kernel-source-rt-5.3.18-150300.214.1.noarch"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2025-07-15T14:20:22Z",
          "details": "moderate"
        }
      ],
      "title": "CVE-2022-50143"
    },
    {
      "cve": "CVE-2022-50146",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2022-50146"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "In the Linux kernel, the following vulnerability has been resolved:\n\nPCI: dwc: Deallocate EPC memory on dw_pcie_ep_init() errors\n\nIf dw_pcie_ep_init() fails to perform any action after the EPC memory is\ninitialized and the MSI memory region is allocated, the latter parts won\u0027t\nbe undone thus causing a memory leak.  Add a cleanup-on-error path to fix\nthese leaks.\n\n[bhelgaas: commit log]",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "SUSE Linux Enterprise Micro 5.1:kernel-rt-5.3.18-150300.214.1.x86_64",
          "SUSE Linux Enterprise Micro 5.1:kernel-source-rt-5.3.18-150300.214.1.noarch",
          "SUSE Linux Enterprise Micro 5.2:kernel-rt-5.3.18-150300.214.1.x86_64",
          "SUSE Linux Enterprise Micro 5.2:kernel-source-rt-5.3.18-150300.214.1.noarch"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2022-50146",
          "url": "https://www.suse.com/security/cve/CVE-2022-50146"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1244788 for CVE-2022-50146",
          "url": "https://bugzilla.suse.com/1244788"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "SUSE Linux Enterprise Micro 5.1:kernel-rt-5.3.18-150300.214.1.x86_64",
            "SUSE Linux Enterprise Micro 5.1:kernel-source-rt-5.3.18-150300.214.1.noarch",
            "SUSE Linux Enterprise Micro 5.2:kernel-rt-5.3.18-150300.214.1.x86_64",
            "SUSE Linux Enterprise Micro 5.2:kernel-source-rt-5.3.18-150300.214.1.noarch"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 5.5,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
            "version": "3.1"
          },
          "products": [
            "SUSE Linux Enterprise Micro 5.1:kernel-rt-5.3.18-150300.214.1.x86_64",
            "SUSE Linux Enterprise Micro 5.1:kernel-source-rt-5.3.18-150300.214.1.noarch",
            "SUSE Linux Enterprise Micro 5.2:kernel-rt-5.3.18-150300.214.1.x86_64",
            "SUSE Linux Enterprise Micro 5.2:kernel-source-rt-5.3.18-150300.214.1.noarch"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2025-07-15T14:20:22Z",
          "details": "moderate"
        }
      ],
      "title": "CVE-2022-50146"
    },
    {
      "cve": "CVE-2022-50149",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2022-50149"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "In the Linux kernel, the following vulnerability has been resolved:\n\ndriver core: fix potential deadlock in __driver_attach\n\nIn __driver_attach function, There are also AA deadlock problem,\nlike the commit b232b02bf3c2 (\"driver core: fix deadlock in\n__device_attach\").\n\nstack like commit b232b02bf3c2 (\"driver core: fix deadlock in\n__device_attach\").\nlist below:\n    In __driver_attach function, The lock holding logic is as follows:\n    ...\n    __driver_attach\n    if (driver_allows_async_probing(drv))\n      device_lock(dev)      // get lock dev\n        async_schedule_dev(__driver_attach_async_helper, dev); // func\n          async_schedule_node\n            async_schedule_node_domain(func)\n              entry = kzalloc(sizeof(struct async_entry), GFP_ATOMIC);\n              /* when fail or work limit, sync to execute func, but\n                 __driver_attach_async_helper will get lock dev as\n                 will, which will lead to A-A deadlock.  */\n              if (!entry || atomic_read(\u0026entry_count) \u003e MAX_WORK) {\n                func;\n              else\n                queue_work_node(node, system_unbound_wq, \u0026entry-\u003ework)\n      device_unlock(dev)\n\n    As above show, when it is allowed to do async probes, because of\n    out of memory or work limit, async work is not be allowed, to do\n    sync execute instead. it will lead to A-A deadlock because of\n    __driver_attach_async_helper getting lock dev.\n\nReproduce:\nand it can be reproduce by make the condition\n(if (!entry || atomic_read(\u0026entry_count) \u003e MAX_WORK)) untenable, like\nbelow:\n\n[  370.785650] \"echo 0 \u003e /proc/sys/kernel/hung_task_timeout_secs\" disables\nthis message.\n[  370.787154] task:swapper/0       state:D stack:    0 pid:    1 ppid:\n0 flags:0x00004000\n[  370.788865] Call Trace:\n[  370.789374]  \u003cTASK\u003e\n[  370.789841]  __schedule+0x482/0x1050\n[  370.790613]  schedule+0x92/0x1a0\n[  370.791290]  schedule_preempt_disabled+0x2c/0x50\n[  370.792256]  __mutex_lock.isra.0+0x757/0xec0\n[  370.793158]  __mutex_lock_slowpath+0x1f/0x30\n[  370.794079]  mutex_lock+0x50/0x60\n[  370.794795]  __device_driver_lock+0x2f/0x70\n[  370.795677]  ? driver_probe_device+0xd0/0xd0\n[  370.796576]  __driver_attach_async_helper+0x1d/0xd0\n[  370.797318]  ? driver_probe_device+0xd0/0xd0\n[  370.797957]  async_schedule_node_domain+0xa5/0xc0\n[  370.798652]  async_schedule_node+0x19/0x30\n[  370.799243]  __driver_attach+0x246/0x290\n[  370.799828]  ? driver_allows_async_probing+0xa0/0xa0\n[  370.800548]  bus_for_each_dev+0x9d/0x130\n[  370.801132]  driver_attach+0x22/0x30\n[  370.801666]  bus_add_driver+0x290/0x340\n[  370.802246]  driver_register+0x88/0x140\n[  370.802817]  ? virtio_scsi_init+0x116/0x116\n[  370.803425]  scsi_register_driver+0x1a/0x30\n[  370.804057]  init_sd+0x184/0x226\n[  370.804533]  do_one_initcall+0x71/0x3a0\n[  370.805107]  kernel_init_freeable+0x39a/0x43a\n[  370.805759]  ? rest_init+0x150/0x150\n[  370.806283]  kernel_init+0x26/0x230\n[  370.806799]  ret_from_fork+0x1f/0x30\n\nTo fix the deadlock, move the async_schedule_dev outside device_lock,\nas we can see, in async_schedule_node_domain, the parameter of\nqueue_work_node is system_unbound_wq, so it can accept concurrent\noperations. which will also not change the code logic, and will\nnot lead to deadlock.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "SUSE Linux Enterprise Micro 5.1:kernel-rt-5.3.18-150300.214.1.x86_64",
          "SUSE Linux Enterprise Micro 5.1:kernel-source-rt-5.3.18-150300.214.1.noarch",
          "SUSE Linux Enterprise Micro 5.2:kernel-rt-5.3.18-150300.214.1.x86_64",
          "SUSE Linux Enterprise Micro 5.2:kernel-source-rt-5.3.18-150300.214.1.noarch"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2022-50149",
          "url": "https://www.suse.com/security/cve/CVE-2022-50149"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1244883 for CVE-2022-50149",
          "url": "https://bugzilla.suse.com/1244883"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "SUSE Linux Enterprise Micro 5.1:kernel-rt-5.3.18-150300.214.1.x86_64",
            "SUSE Linux Enterprise Micro 5.1:kernel-source-rt-5.3.18-150300.214.1.noarch",
            "SUSE Linux Enterprise Micro 5.2:kernel-rt-5.3.18-150300.214.1.x86_64",
            "SUSE Linux Enterprise Micro 5.2:kernel-source-rt-5.3.18-150300.214.1.noarch"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 5.5,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
            "version": "3.1"
          },
          "products": [
            "SUSE Linux Enterprise Micro 5.1:kernel-rt-5.3.18-150300.214.1.x86_64",
            "SUSE Linux Enterprise Micro 5.1:kernel-source-rt-5.3.18-150300.214.1.noarch",
            "SUSE Linux Enterprise Micro 5.2:kernel-rt-5.3.18-150300.214.1.x86_64",
            "SUSE Linux Enterprise Micro 5.2:kernel-source-rt-5.3.18-150300.214.1.noarch"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2025-07-15T14:20:22Z",
          "details": "moderate"
        }
      ],
      "title": "CVE-2022-50149"
    },
    {
      "cve": "CVE-2022-50152",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2022-50152"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "In the Linux kernel, the following vulnerability has been resolved:\n\nusb: ohci-nxp: Fix refcount leak in ohci_hcd_nxp_probe\n\nof_parse_phandle() returns a node pointer with refcount\nincremented, we should use of_node_put() on it when not need anymore.\nAdd missing of_node_put() to avoid refcount leak.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "SUSE Linux Enterprise Micro 5.1:kernel-rt-5.3.18-150300.214.1.x86_64",
          "SUSE Linux Enterprise Micro 5.1:kernel-source-rt-5.3.18-150300.214.1.noarch",
          "SUSE Linux Enterprise Micro 5.2:kernel-rt-5.3.18-150300.214.1.x86_64",
          "SUSE Linux Enterprise Micro 5.2:kernel-source-rt-5.3.18-150300.214.1.noarch"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2022-50152",
          "url": "https://www.suse.com/security/cve/CVE-2022-50152"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1244783 for CVE-2022-50152",
          "url": "https://bugzilla.suse.com/1244783"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "SUSE Linux Enterprise Micro 5.1:kernel-rt-5.3.18-150300.214.1.x86_64",
            "SUSE Linux Enterprise Micro 5.1:kernel-source-rt-5.3.18-150300.214.1.noarch",
            "SUSE Linux Enterprise Micro 5.2:kernel-rt-5.3.18-150300.214.1.x86_64",
            "SUSE Linux Enterprise Micro 5.2:kernel-source-rt-5.3.18-150300.214.1.noarch"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 5.5,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
            "version": "3.1"
          },
          "products": [
            "SUSE Linux Enterprise Micro 5.1:kernel-rt-5.3.18-150300.214.1.x86_64",
            "SUSE Linux Enterprise Micro 5.1:kernel-source-rt-5.3.18-150300.214.1.noarch",
            "SUSE Linux Enterprise Micro 5.2:kernel-rt-5.3.18-150300.214.1.x86_64",
            "SUSE Linux Enterprise Micro 5.2:kernel-source-rt-5.3.18-150300.214.1.noarch"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2025-07-15T14:20:22Z",
          "details": "moderate"
        }
      ],
      "title": "CVE-2022-50152"
    },
    {
      "cve": "CVE-2022-50153",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2022-50153"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "In the Linux kernel, the following vulnerability has been resolved:\n\nusb: host: Fix refcount leak in ehci_hcd_ppc_of_probe\n\nof_find_compatible_node() returns a node pointer with refcount\nincremented, we should use of_node_put() on it when done.\nAdd missing of_node_put() to avoid refcount leak.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "SUSE Linux Enterprise Micro 5.1:kernel-rt-5.3.18-150300.214.1.x86_64",
          "SUSE Linux Enterprise Micro 5.1:kernel-source-rt-5.3.18-150300.214.1.noarch",
          "SUSE Linux Enterprise Micro 5.2:kernel-rt-5.3.18-150300.214.1.x86_64",
          "SUSE Linux Enterprise Micro 5.2:kernel-source-rt-5.3.18-150300.214.1.noarch"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2022-50153",
          "url": "https://www.suse.com/security/cve/CVE-2022-50153"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1244786 for CVE-2022-50153",
          "url": "https://bugzilla.suse.com/1244786"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "SUSE Linux Enterprise Micro 5.1:kernel-rt-5.3.18-150300.214.1.x86_64",
            "SUSE Linux Enterprise Micro 5.1:kernel-source-rt-5.3.18-150300.214.1.noarch",
            "SUSE Linux Enterprise Micro 5.2:kernel-rt-5.3.18-150300.214.1.x86_64",
            "SUSE Linux Enterprise Micro 5.2:kernel-source-rt-5.3.18-150300.214.1.noarch"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 5.5,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
            "version": "3.1"
          },
          "products": [
            "SUSE Linux Enterprise Micro 5.1:kernel-rt-5.3.18-150300.214.1.x86_64",
            "SUSE Linux Enterprise Micro 5.1:kernel-source-rt-5.3.18-150300.214.1.noarch",
            "SUSE Linux Enterprise Micro 5.2:kernel-rt-5.3.18-150300.214.1.x86_64",
            "SUSE Linux Enterprise Micro 5.2:kernel-source-rt-5.3.18-150300.214.1.noarch"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2025-07-15T14:20:22Z",
          "details": "moderate"
        }
      ],
      "title": "CVE-2022-50153"
    },
    {
      "cve": "CVE-2022-50156",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2022-50156"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "In the Linux kernel, the following vulnerability has been resolved:\n\nHID: cp2112: prevent a buffer overflow in cp2112_xfer()\n\nSmatch warnings:\ndrivers/hid/hid-cp2112.c:793 cp2112_xfer() error: __memcpy()\n\u0027data-\u003eblock[1]\u0027 too small (33 vs 255)\ndrivers/hid/hid-cp2112.c:793 cp2112_xfer() error: __memcpy() \u0027buf\u0027 too\nsmall (64 vs 255)\n\nThe \u0027read_length\u0027 variable is provided by \u0027data-\u003eblock[0]\u0027 which comes\nfrom user and it(read_length) can take a value between 0-255. Add an\nupper bound to \u0027read_length\u0027 variable to prevent a buffer overflow in\nmemcpy().",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "SUSE Linux Enterprise Micro 5.1:kernel-rt-5.3.18-150300.214.1.x86_64",
          "SUSE Linux Enterprise Micro 5.1:kernel-source-rt-5.3.18-150300.214.1.noarch",
          "SUSE Linux Enterprise Micro 5.2:kernel-rt-5.3.18-150300.214.1.x86_64",
          "SUSE Linux Enterprise Micro 5.2:kernel-source-rt-5.3.18-150300.214.1.noarch"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2022-50156",
          "url": "https://www.suse.com/security/cve/CVE-2022-50156"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1244782 for CVE-2022-50156",
          "url": "https://bugzilla.suse.com/1244782"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "SUSE Linux Enterprise Micro 5.1:kernel-rt-5.3.18-150300.214.1.x86_64",
            "SUSE Linux Enterprise Micro 5.1:kernel-source-rt-5.3.18-150300.214.1.noarch",
            "SUSE Linux Enterprise Micro 5.2:kernel-rt-5.3.18-150300.214.1.x86_64",
            "SUSE Linux Enterprise Micro 5.2:kernel-source-rt-5.3.18-150300.214.1.noarch"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 5.5,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
            "version": "3.1"
          },
          "products": [
            "SUSE Linux Enterprise Micro 5.1:kernel-rt-5.3.18-150300.214.1.x86_64",
            "SUSE Linux Enterprise Micro 5.1:kernel-source-rt-5.3.18-150300.214.1.noarch",
            "SUSE Linux Enterprise Micro 5.2:kernel-rt-5.3.18-150300.214.1.x86_64",
            "SUSE Linux Enterprise Micro 5.2:kernel-source-rt-5.3.18-150300.214.1.noarch"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2025-07-15T14:20:22Z",
          "details": "moderate"
        }
      ],
      "title": "CVE-2022-50156"
    },
    {
      "cve": "CVE-2022-50158",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2022-50158"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "In the Linux kernel, the following vulnerability has been resolved:\n\nmtd: partitions: Fix refcount leak in parse_redboot_of\n\nof_get_child_by_name() returns a node pointer with refcount\nincremented, we should use of_node_put() on it when not need anymore.\nAdd missing of_node_put() to avoid refcount leak.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "SUSE Linux Enterprise Micro 5.1:kernel-rt-5.3.18-150300.214.1.x86_64",
          "SUSE Linux Enterprise Micro 5.1:kernel-source-rt-5.3.18-150300.214.1.noarch",
          "SUSE Linux Enterprise Micro 5.2:kernel-rt-5.3.18-150300.214.1.x86_64",
          "SUSE Linux Enterprise Micro 5.2:kernel-source-rt-5.3.18-150300.214.1.noarch"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2022-50158",
          "url": "https://www.suse.com/security/cve/CVE-2022-50158"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1244779 for CVE-2022-50158",
          "url": "https://bugzilla.suse.com/1244779"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "SUSE Linux Enterprise Micro 5.1:kernel-rt-5.3.18-150300.214.1.x86_64",
            "SUSE Linux Enterprise Micro 5.1:kernel-source-rt-5.3.18-150300.214.1.noarch",
            "SUSE Linux Enterprise Micro 5.2:kernel-rt-5.3.18-150300.214.1.x86_64",
            "SUSE Linux Enterprise Micro 5.2:kernel-source-rt-5.3.18-150300.214.1.noarch"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 5.5,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
            "version": "3.1"
          },
          "products": [
            "SUSE Linux Enterprise Micro 5.1:kernel-rt-5.3.18-150300.214.1.x86_64",
            "SUSE Linux Enterprise Micro 5.1:kernel-source-rt-5.3.18-150300.214.1.noarch",
            "SUSE Linux Enterprise Micro 5.2:kernel-rt-5.3.18-150300.214.1.x86_64",
            "SUSE Linux Enterprise Micro 5.2:kernel-source-rt-5.3.18-150300.214.1.noarch"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2025-07-15T14:20:22Z",
          "details": "moderate"
        }
      ],
      "title": "CVE-2022-50158"
    },
    {
      "cve": "CVE-2022-50160",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2022-50160"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "In the Linux kernel, the following vulnerability has been resolved:\n\nmtd: maps: Fix refcount leak in ap_flash_init\n\nof_find_matching_node() returns a node pointer with refcount\nincremented, we should use of_node_put() on it when not need anymore.\nAdd missing of_node_put() to avoid refcount leak.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "SUSE Linux Enterprise Micro 5.1:kernel-rt-5.3.18-150300.214.1.x86_64",
          "SUSE Linux Enterprise Micro 5.1:kernel-source-rt-5.3.18-150300.214.1.noarch",
          "SUSE Linux Enterprise Micro 5.2:kernel-rt-5.3.18-150300.214.1.x86_64",
          "SUSE Linux Enterprise Micro 5.2:kernel-source-rt-5.3.18-150300.214.1.noarch"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2022-50160",
          "url": "https://www.suse.com/security/cve/CVE-2022-50160"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1244776 for CVE-2022-50160",
          "url": "https://bugzilla.suse.com/1244776"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "SUSE Linux Enterprise Micro 5.1:kernel-rt-5.3.18-150300.214.1.x86_64",
            "SUSE Linux Enterprise Micro 5.1:kernel-source-rt-5.3.18-150300.214.1.noarch",
            "SUSE Linux Enterprise Micro 5.2:kernel-rt-5.3.18-150300.214.1.x86_64",
            "SUSE Linux Enterprise Micro 5.2:kernel-source-rt-5.3.18-150300.214.1.noarch"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 5.5,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
            "version": "3.1"
          },
          "products": [
            "SUSE Linux Enterprise Micro 5.1:kernel-rt-5.3.18-150300.214.1.x86_64",
            "SUSE Linux Enterprise Micro 5.1:kernel-source-rt-5.3.18-150300.214.1.noarch",
            "SUSE Linux Enterprise Micro 5.2:kernel-rt-5.3.18-150300.214.1.x86_64",
            "SUSE Linux Enterprise Micro 5.2:kernel-source-rt-5.3.18-150300.214.1.noarch"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2025-07-15T14:20:22Z",
          "details": "moderate"
        }
      ],
      "title": "CVE-2022-50160"
    },
    {
      "cve": "CVE-2022-50161",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2022-50161"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "In the Linux kernel, the following vulnerability has been resolved:\n\nmtd: maps: Fix refcount leak in of_flash_probe_versatile\n\nof_find_matching_node_and_match() returns a node pointer with refcount\nincremented, we should use of_node_put() on it when not need anymore.\nAdd missing of_node_put() to avoid refcount leak.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "SUSE Linux Enterprise Micro 5.1:kernel-rt-5.3.18-150300.214.1.x86_64",
          "SUSE Linux Enterprise Micro 5.1:kernel-source-rt-5.3.18-150300.214.1.noarch",
          "SUSE Linux Enterprise Micro 5.2:kernel-rt-5.3.18-150300.214.1.x86_64",
          "SUSE Linux Enterprise Micro 5.2:kernel-source-rt-5.3.18-150300.214.1.noarch"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2022-50161",
          "url": "https://www.suse.com/security/cve/CVE-2022-50161"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1244774 for CVE-2022-50161",
          "url": "https://bugzilla.suse.com/1244774"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "SUSE Linux Enterprise Micro 5.1:kernel-rt-5.3.18-150300.214.1.x86_64",
            "SUSE Linux Enterprise Micro 5.1:kernel-source-rt-5.3.18-150300.214.1.noarch",
            "SUSE Linux Enterprise Micro 5.2:kernel-rt-5.3.18-150300.214.1.x86_64",
            "SUSE Linux Enterprise Micro 5.2:kernel-source-rt-5.3.18-150300.214.1.noarch"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 5.5,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
            "version": "3.1"
          },
          "products": [
            "SUSE Linux Enterprise Micro 5.1:kernel-rt-5.3.18-150300.214.1.x86_64",
            "SUSE Linux Enterprise Micro 5.1:kernel-source-rt-5.3.18-150300.214.1.noarch",
            "SUSE Linux Enterprise Micro 5.2:kernel-rt-5.3.18-150300.214.1.x86_64",
            "SUSE Linux Enterprise Micro 5.2:kernel-source-rt-5.3.18-150300.214.1.noarch"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2025-07-15T14:20:22Z",
          "details": "moderate"
        }
      ],
      "title": "CVE-2022-50161"
    },
    {
      "cve": "CVE-2022-50162",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2022-50162"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "In the Linux kernel, the following vulnerability has been resolved:\n\nwifi: libertas: Fix possible refcount leak in if_usb_probe()\n\nusb_get_dev will be called before lbs_get_firmware_async which means that\nusb_put_dev need to be called when lbs_get_firmware_async fails.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "SUSE Linux Enterprise Micro 5.1:kernel-rt-5.3.18-150300.214.1.x86_64",
          "SUSE Linux Enterprise Micro 5.1:kernel-source-rt-5.3.18-150300.214.1.noarch",
          "SUSE Linux Enterprise Micro 5.2:kernel-rt-5.3.18-150300.214.1.x86_64",
          "SUSE Linux Enterprise Micro 5.2:kernel-source-rt-5.3.18-150300.214.1.noarch"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2022-50162",
          "url": "https://www.suse.com/security/cve/CVE-2022-50162"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1244773 for CVE-2022-50162",
          "url": "https://bugzilla.suse.com/1244773"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "SUSE Linux Enterprise Micro 5.1:kernel-rt-5.3.18-150300.214.1.x86_64",
            "SUSE Linux Enterprise Micro 5.1:kernel-source-rt-5.3.18-150300.214.1.noarch",
            "SUSE Linux Enterprise Micro 5.2:kernel-rt-5.3.18-150300.214.1.x86_64",
            "SUSE Linux Enterprise Micro 5.2:kernel-source-rt-5.3.18-150300.214.1.noarch"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 5.5,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
            "version": "3.1"
          },
          "products": [
            "SUSE Linux Enterprise Micro 5.1:kernel-rt-5.3.18-150300.214.1.x86_64",
            "SUSE Linux Enterprise Micro 5.1:kernel-source-rt-5.3.18-150300.214.1.noarch",
            "SUSE Linux Enterprise Micro 5.2:kernel-rt-5.3.18-150300.214.1.x86_64",
            "SUSE Linux Enterprise Micro 5.2:kernel-source-rt-5.3.18-150300.214.1.noarch"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2025-07-15T14:20:22Z",
          "details": "moderate"
        }
      ],
      "title": "CVE-2022-50162"
    },
    {
      "cve": "CVE-2022-50164",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2022-50164"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "In the Linux kernel, the following vulnerability has been resolved:\n\nwifi: iwlwifi: mvm: fix double list_add at iwl_mvm_mac_wake_tx_queue\n\nAfter successfull station association, if station queues are disabled for\nsome reason, the related lists are not emptied. So if some new element is\nadded to the list in iwl_mvm_mac_wake_tx_queue, it can match with the old\none and produce a BUG like this:\n\n[   46.535263] list_add corruption. prev-\u003enext should be next (ffff94c1c318a360), but was 0000000000000000. (prev=ffff94c1d02d3388).\n[   46.535283] ------------[ cut here ]------------\n[   46.535284] kernel BUG at lib/list_debug.c:26!\n[   46.535290] invalid opcode: 0000 [#1] PREEMPT SMP PTI\n[   46.585304] CPU: 0 PID: 623 Comm: wpa_supplicant Not tainted 5.19.0-rc3+ #1\n[   46.592380] Hardware name: Dell Inc. Inspiron 660s/0478VN       , BIOS A07 08/24/2012\n[   46.600336] RIP: 0010:__list_add_valid.cold+0x3d/0x3f\n[   46.605475] Code: f2 4c 89 c1 48 89 fe 48 c7 c7 c8 40 67 93 e8 20 cc fd ff 0f 0b 48 89 d1 4c 89 c6 4c 89 ca 48 c7 c7 70 40 67 93 e8 09 cc fd ff \u003c0f\u003e 0b 48 89 fe 48 c7 c7 00 41 67 93 e8 f8 cb fd ff 0f 0b 48 89 d1\n[   46.624469] RSP: 0018:ffffb20800ab76d8 EFLAGS: 00010286\n[   46.629854] RAX: 0000000000000075 RBX: ffff94c1c318a0e0 RCX: 0000000000000000\n[   46.637105] RDX: 0000000000000201 RSI: ffffffff9365e100 RDI: 00000000ffffffff\n[   46.644356] RBP: ffff94c1c5f43370 R08: 0000000000000075 R09: 3064316334396666\n[   46.651607] R10: 3364323064316334 R11: 39666666663d7665 R12: ffff94c1c5f43388\n[   46.658857] R13: ffff94c1d02d3388 R14: ffff94c1c318a360 R15: ffff94c1cf2289c0\n[   46.666108] FS:  00007f65634ff7c0(0000) GS:ffff94c1da200000(0000) knlGS:0000000000000000\n[   46.674331] CS:  0010 DS: 0000 ES: 0000 CR0: 0000000080050033\n[   46.680170] CR2: 00007f7dfe984460 CR3: 000000010e894003 CR4: 00000000000606f0\n[   46.687422] Call Trace:\n[   46.689906]  \u003cTASK\u003e\n[   46.691950]  iwl_mvm_mac_wake_tx_queue+0xec/0x15c [iwlmvm]\n[   46.697601]  ieee80211_queue_skb+0x4b3/0x720 [mac80211]\n[   46.702973]  ? sta_info_get+0x46/0x60 [mac80211]\n[   46.707703]  ieee80211_tx+0xad/0x110 [mac80211]\n[   46.712355]  __ieee80211_tx_skb_tid_band+0x71/0x90 [mac80211]\n...\n\nIn order to avoid this problem, we must also remove the related lists when\nstation queues are disabled.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "SUSE Linux Enterprise Micro 5.1:kernel-rt-5.3.18-150300.214.1.x86_64",
          "SUSE Linux Enterprise Micro 5.1:kernel-source-rt-5.3.18-150300.214.1.noarch",
          "SUSE Linux Enterprise Micro 5.2:kernel-rt-5.3.18-150300.214.1.x86_64",
          "SUSE Linux Enterprise Micro 5.2:kernel-source-rt-5.3.18-150300.214.1.noarch"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2022-50164",
          "url": "https://www.suse.com/security/cve/CVE-2022-50164"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1244770 for CVE-2022-50164",
          "url": "https://bugzilla.suse.com/1244770"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "SUSE Linux Enterprise Micro 5.1:kernel-rt-5.3.18-150300.214.1.x86_64",
            "SUSE Linux Enterprise Micro 5.1:kernel-source-rt-5.3.18-150300.214.1.noarch",
            "SUSE Linux Enterprise Micro 5.2:kernel-rt-5.3.18-150300.214.1.x86_64",
            "SUSE Linux Enterprise Micro 5.2:kernel-source-rt-5.3.18-150300.214.1.noarch"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 5.5,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
            "version": "3.1"
          },
          "products": [
            "SUSE Linux Enterprise Micro 5.1:kernel-rt-5.3.18-150300.214.1.x86_64",
            "SUSE Linux Enterprise Micro 5.1:kernel-source-rt-5.3.18-150300.214.1.noarch",
            "SUSE Linux Enterprise Micro 5.2:kernel-rt-5.3.18-150300.214.1.x86_64",
            "SUSE Linux Enterprise Micro 5.2:kernel-source-rt-5.3.18-150300.214.1.noarch"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2025-07-15T14:20:22Z",
          "details": "moderate"
        }
      ],
      "title": "CVE-2022-50164"
    },
    {
      "cve": "CVE-2022-50165",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2022-50165"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "In the Linux kernel, the following vulnerability has been resolved:\n\nwifi: wil6210: debugfs: fix uninitialized variable use in `wil_write_file_wmi()`\n\nCommit 7a4836560a61 changes simple_write_to_buffer() with memdup_user()\nbut it forgets to change the value to be returned that came from\nsimple_write_to_buffer() call. It results in the following warning:\n\n  warning: variable \u0027rc\u0027 is uninitialized when used here [-Wuninitialized]\n           return rc;\n                  ^~\n\nRemove rc variable and just return the passed in length if the\nmemdup_user() succeeds.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "SUSE Linux Enterprise Micro 5.1:kernel-rt-5.3.18-150300.214.1.x86_64",
          "SUSE Linux Enterprise Micro 5.1:kernel-source-rt-5.3.18-150300.214.1.noarch",
          "SUSE Linux Enterprise Micro 5.2:kernel-rt-5.3.18-150300.214.1.x86_64",
          "SUSE Linux Enterprise Micro 5.2:kernel-source-rt-5.3.18-150300.214.1.noarch"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2022-50165",
          "url": "https://www.suse.com/security/cve/CVE-2022-50165"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1244771 for CVE-2022-50165",
          "url": "https://bugzilla.suse.com/1244771"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "SUSE Linux Enterprise Micro 5.1:kernel-rt-5.3.18-150300.214.1.x86_64",
            "SUSE Linux Enterprise Micro 5.1:kernel-source-rt-5.3.18-150300.214.1.noarch",
            "SUSE Linux Enterprise Micro 5.2:kernel-rt-5.3.18-150300.214.1.x86_64",
            "SUSE Linux Enterprise Micro 5.2:kernel-source-rt-5.3.18-150300.214.1.noarch"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 4.4,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H",
            "version": "3.1"
          },
          "products": [
            "SUSE Linux Enterprise Micro 5.1:kernel-rt-5.3.18-150300.214.1.x86_64",
            "SUSE Linux Enterprise Micro 5.1:kernel-source-rt-5.3.18-150300.214.1.noarch",
            "SUSE Linux Enterprise Micro 5.2:kernel-rt-5.3.18-150300.214.1.x86_64",
            "SUSE Linux Enterprise Micro 5.2:kernel-source-rt-5.3.18-150300.214.1.noarch"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2025-07-15T14:20:22Z",
          "details": "moderate"
        }
      ],
      "title": "CVE-2022-50165"
    },
    {
      "cve": "CVE-2022-50169",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2022-50169"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "In the Linux kernel, the following vulnerability has been resolved:\n\nwifi: wil6210: debugfs: fix info leak in wil_write_file_wmi()\n\nThe simple_write_to_buffer() function will succeed if even a single\nbyte is initialized.  However, we need to initialize the whole buffer\nto prevent information leaks.  Just use memdup_user().",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "SUSE Linux Enterprise Micro 5.1:kernel-rt-5.3.18-150300.214.1.x86_64",
          "SUSE Linux Enterprise Micro 5.1:kernel-source-rt-5.3.18-150300.214.1.noarch",
          "SUSE Linux Enterprise Micro 5.2:kernel-rt-5.3.18-150300.214.1.x86_64",
          "SUSE Linux Enterprise Micro 5.2:kernel-source-rt-5.3.18-150300.214.1.noarch"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2022-50169",
          "url": "https://www.suse.com/security/cve/CVE-2022-50169"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1244767 for CVE-2022-50169",
          "url": "https://bugzilla.suse.com/1244767"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "SUSE Linux Enterprise Micro 5.1:kernel-rt-5.3.18-150300.214.1.x86_64",
            "SUSE Linux Enterprise Micro 5.1:kernel-source-rt-5.3.18-150300.214.1.noarch",
            "SUSE Linux Enterprise Micro 5.2:kernel-rt-5.3.18-150300.214.1.x86_64",
            "SUSE Linux Enterprise Micro 5.2:kernel-source-rt-5.3.18-150300.214.1.noarch"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 5.5,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
            "version": "3.1"
          },
          "products": [
            "SUSE Linux Enterprise Micro 5.1:kernel-rt-5.3.18-150300.214.1.x86_64",
            "SUSE Linux Enterprise Micro 5.1:kernel-source-rt-5.3.18-150300.214.1.noarch",
            "SUSE Linux Enterprise Micro 5.2:kernel-rt-5.3.18-150300.214.1.x86_64",
            "SUSE Linux Enterprise Micro 5.2:kernel-source-rt-5.3.18-150300.214.1.noarch"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2025-07-15T14:20:22Z",
          "details": "moderate"
        }
      ],
      "title": "CVE-2022-50169"
    },
    {
      "cve": "CVE-2022-50172",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2022-50172"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "In the Linux kernel, the following vulnerability has been resolved:\n\nmt76: mt76x02u: fix possible memory leak in __mt76x02u_mcu_send_msg\n\nFree the skb if mt76u_bulk_msg fails in __mt76x02u_mcu_send_msg routine.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "SUSE Linux Enterprise Micro 5.1:kernel-rt-5.3.18-150300.214.1.x86_64",
          "SUSE Linux Enterprise Micro 5.1:kernel-source-rt-5.3.18-150300.214.1.noarch",
          "SUSE Linux Enterprise Micro 5.2:kernel-rt-5.3.18-150300.214.1.x86_64",
          "SUSE Linux Enterprise Micro 5.2:kernel-source-rt-5.3.18-150300.214.1.noarch"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2022-50172",
          "url": "https://www.suse.com/security/cve/CVE-2022-50172"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1244764 for CVE-2022-50172",
          "url": "https://bugzilla.suse.com/1244764"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "SUSE Linux Enterprise Micro 5.1:kernel-rt-5.3.18-150300.214.1.x86_64",
            "SUSE Linux Enterprise Micro 5.1:kernel-source-rt-5.3.18-150300.214.1.noarch",
            "SUSE Linux Enterprise Micro 5.2:kernel-rt-5.3.18-150300.214.1.x86_64",
            "SUSE Linux Enterprise Micro 5.2:kernel-source-rt-5.3.18-150300.214.1.noarch"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 5.5,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
            "version": "3.1"
          },
          "products": [
            "SUSE Linux Enterprise Micro 5.1:kernel-rt-5.3.18-150300.214.1.x86_64",
            "SUSE Linux Enterprise Micro 5.1:kernel-source-rt-5.3.18-150300.214.1.noarch",
            "SUSE Linux Enterprise Micro 5.2:kernel-rt-5.3.18-150300.214.1.x86_64",
            "SUSE Linux Enterprise Micro 5.2:kernel-source-rt-5.3.18-150300.214.1.noarch"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2025-07-15T14:20:22Z",
          "details": "moderate"
        }
      ],
      "title": "CVE-2022-50172"
    },
    {
      "cve": "CVE-2022-50173",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2022-50173"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "In the Linux kernel, the following vulnerability has been resolved:\n\ndrm/msm/mdp5: Fix global state lock backoff\n\nWe need to grab the lock after the early return for !hwpipe case.\nOtherwise, we could have hit contention yet still returned 0.\n\nFixes an issue that the new CONFIG_DRM_DEBUG_MODESET_LOCK stuff flagged\nin CI:\n\n   WARNING: CPU: 0 PID: 282 at drivers/gpu/drm/drm_modeset_lock.c:296 drm_modeset_lock+0xf8/0x154\n   Modules linked in:\n   CPU: 0 PID: 282 Comm: kms_cursor_lega Tainted: G        W         5.19.0-rc2-15930-g875cc8bc536a #1\n   Hardware name: Qualcomm Technologies, Inc. DB820c (DT)\n   pstate: 60000005 (nZCv daif -PAN -UAO -TCO -DIT -SSBS BTYPE=--)\n   pc : drm_modeset_lock+0xf8/0x154\n   lr : drm_atomic_get_private_obj_state+0x84/0x170\n   sp : ffff80000cfab6a0\n   x29: ffff80000cfab6a0 x28: 0000000000000000 x27: ffff000083bc4d00\n   x26: 0000000000000038 x25: 0000000000000000 x24: ffff80000957ca58\n   x23: 0000000000000000 x22: ffff000081ace080 x21: 0000000000000001\n   x20: ffff000081acec18 x19: ffff80000cfabb80 x18: 0000000000000038\n   x17: 0000000000000000 x16: 0000000000000000 x15: fffffffffffea0d0\n   x14: 0000000000000000 x13: 284e4f5f4e524157 x12: 5f534b434f4c5f47\n   x11: ffff80000a386aa8 x10: 0000000000000029 x9 : ffff80000cfab610\n   x8 : 0000000000000029 x7 : 0000000000000014 x6 : 0000000000000000\n   x5 : 0000000000000001 x4 : ffff8000081ad904 x3 : 0000000000000029\n   x2 : ffff0000801db4c0 x1 : ffff80000cfabb80 x0 : ffff000081aceb58\n   Call trace:\n    drm_modeset_lock+0xf8/0x154\n    drm_atomic_get_private_obj_state+0x84/0x170\n    mdp5_get_global_state+0x54/0x6c\n    mdp5_pipe_release+0x2c/0xd4\n    mdp5_plane_atomic_check+0x2ec/0x414\n    drm_atomic_helper_check_planes+0xd8/0x210\n    drm_atomic_helper_check+0x54/0xb0\n    ...\n   ---[ end trace 0000000000000000 ]---\n   drm_modeset_lock attempting to lock a contended lock without backoff:\n      drm_modeset_lock+0x148/0x154\n      mdp5_get_global_state+0x30/0x6c\n      mdp5_pipe_release+0x2c/0xd4\n      mdp5_plane_atomic_check+0x290/0x414\n      drm_atomic_helper_check_planes+0xd8/0x210\n      drm_atomic_helper_check+0x54/0xb0\n      drm_atomic_check_only+0x4b0/0x8f4\n      drm_atomic_commit+0x68/0xe0\n\nPatchwork: https://patchwork.freedesktop.org/patch/492701/",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "SUSE Linux Enterprise Micro 5.1:kernel-rt-5.3.18-150300.214.1.x86_64",
          "SUSE Linux Enterprise Micro 5.1:kernel-source-rt-5.3.18-150300.214.1.noarch",
          "SUSE Linux Enterprise Micro 5.2:kernel-rt-5.3.18-150300.214.1.x86_64",
          "SUSE Linux Enterprise Micro 5.2:kernel-source-rt-5.3.18-150300.214.1.noarch"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2022-50173",
          "url": "https://www.suse.com/security/cve/CVE-2022-50173"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1244992 for CVE-2022-50173",
          "url": "https://bugzilla.suse.com/1244992"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "SUSE Linux Enterprise Micro 5.1:kernel-rt-5.3.18-150300.214.1.x86_64",
            "SUSE Linux Enterprise Micro 5.1:kernel-source-rt-5.3.18-150300.214.1.noarch",
            "SUSE Linux Enterprise Micro 5.2:kernel-rt-5.3.18-150300.214.1.x86_64",
            "SUSE Linux Enterprise Micro 5.2:kernel-source-rt-5.3.18-150300.214.1.noarch"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 5.5,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
            "version": "3.1"
          },
          "products": [
            "SUSE Linux Enterprise Micro 5.1:kernel-rt-5.3.18-150300.214.1.x86_64",
            "SUSE Linux Enterprise Micro 5.1:kernel-source-rt-5.3.18-150300.214.1.noarch",
            "SUSE Linux Enterprise Micro 5.2:kernel-rt-5.3.18-150300.214.1.x86_64",
            "SUSE Linux Enterprise Micro 5.2:kernel-source-rt-5.3.18-150300.214.1.noarch"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2025-07-15T14:20:22Z",
          "details": "moderate"
        }
      ],
      "title": "CVE-2022-50173"
    },
    {
      "cve": "CVE-2022-50176",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2022-50176"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "In the Linux kernel, the following vulnerability has been resolved:\n\ndrm/mcde: Fix refcount leak in mcde_dsi_bind\n\nEvery iteration of for_each_available_child_of_node() decrements\nthe reference counter of the previous node. There is no decrement\nwhen break out from the loop and results in refcount leak.\nAdd missing of_node_put() to fix this.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "SUSE Linux Enterprise Micro 5.1:kernel-rt-5.3.18-150300.214.1.x86_64",
          "SUSE Linux Enterprise Micro 5.1:kernel-source-rt-5.3.18-150300.214.1.noarch",
          "SUSE Linux Enterprise Micro 5.2:kernel-rt-5.3.18-150300.214.1.x86_64",
          "SUSE Linux Enterprise Micro 5.2:kernel-source-rt-5.3.18-150300.214.1.noarch"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2022-50176",
          "url": "https://www.suse.com/security/cve/CVE-2022-50176"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1244902 for CVE-2022-50176",
          "url": "https://bugzilla.suse.com/1244902"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "SUSE Linux Enterprise Micro 5.1:kernel-rt-5.3.18-150300.214.1.x86_64",
            "SUSE Linux Enterprise Micro 5.1:kernel-source-rt-5.3.18-150300.214.1.noarch",
            "SUSE Linux Enterprise Micro 5.2:kernel-rt-5.3.18-150300.214.1.x86_64",
            "SUSE Linux Enterprise Micro 5.2:kernel-source-rt-5.3.18-150300.214.1.noarch"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 5.5,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
            "version": "3.1"
          },
          "products": [
            "SUSE Linux Enterprise Micro 5.1:kernel-rt-5.3.18-150300.214.1.x86_64",
            "SUSE Linux Enterprise Micro 5.1:kernel-source-rt-5.3.18-150300.214.1.noarch",
            "SUSE Linux Enterprise Micro 5.2:kernel-rt-5.3.18-150300.214.1.x86_64",
            "SUSE Linux Enterprise Micro 5.2:kernel-source-rt-5.3.18-150300.214.1.noarch"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2025-07-15T14:20:22Z",
          "details": "moderate"
        }
      ],
      "title": "CVE-2022-50176"
    },
    {
      "cve": "CVE-2022-50179",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2022-50179"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "In the Linux kernel, the following vulnerability has been resolved:\n\nath9k: fix use-after-free in ath9k_hif_usb_rx_cb\n\nSyzbot reported use-after-free Read in ath9k_hif_usb_rx_cb() [0]. The\nproblem was in incorrect htc_handle-\u003edrv_priv initialization.\n\nProbable call trace which can trigger use-after-free:\n\nath9k_htc_probe_device()\n  /* htc_handle-\u003edrv_priv = priv; */\n  ath9k_htc_wait_for_target()      \u003c--- Failed\n  ieee80211_free_hw()\t\t   \u003c--- priv pointer is freed\n\n\u003cIRQ\u003e\n...\nath9k_hif_usb_rx_cb()\n  ath9k_hif_usb_rx_stream()\n   RX_STAT_INC()\t\t\u003c--- htc_handle-\u003edrv_priv access\n\nIn order to not add fancy protection for drv_priv we can move\nhtc_handle-\u003edrv_priv initialization at the end of the\nath9k_htc_probe_device() and add helper macro to make\nall *_STAT_* macros NULL safe, since syzbot has reported related NULL\nderef in that macros [1]",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "SUSE Linux Enterprise Micro 5.1:kernel-rt-5.3.18-150300.214.1.x86_64",
          "SUSE Linux Enterprise Micro 5.1:kernel-source-rt-5.3.18-150300.214.1.noarch",
          "SUSE Linux Enterprise Micro 5.2:kernel-rt-5.3.18-150300.214.1.x86_64",
          "SUSE Linux Enterprise Micro 5.2:kernel-source-rt-5.3.18-150300.214.1.noarch"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2022-50179",
          "url": "https://www.suse.com/security/cve/CVE-2022-50179"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1244886 for CVE-2022-50179",
          "url": "https://bugzilla.suse.com/1244886"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "SUSE Linux Enterprise Micro 5.1:kernel-rt-5.3.18-150300.214.1.x86_64",
            "SUSE Linux Enterprise Micro 5.1:kernel-source-rt-5.3.18-150300.214.1.noarch",
            "SUSE Linux Enterprise Micro 5.2:kernel-rt-5.3.18-150300.214.1.x86_64",
            "SUSE Linux Enterprise Micro 5.2:kernel-source-rt-5.3.18-150300.214.1.noarch"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 5.5,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
            "version": "3.1"
          },
          "products": [
            "SUSE Linux Enterprise Micro 5.1:kernel-rt-5.3.18-150300.214.1.x86_64",
            "SUSE Linux Enterprise Micro 5.1:kernel-source-rt-5.3.18-150300.214.1.noarch",
            "SUSE Linux Enterprise Micro 5.2:kernel-rt-5.3.18-150300.214.1.x86_64",
            "SUSE Linux Enterprise Micro 5.2:kernel-source-rt-5.3.18-150300.214.1.noarch"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2025-07-15T14:20:22Z",
          "details": "moderate"
        }
      ],
      "title": "CVE-2022-50179"
    },
    {
      "cve": "CVE-2022-50181",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2022-50181"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "In the Linux kernel, the following vulnerability has been resolved:\n\nvirtio-gpu: fix a missing check to avoid NULL dereference\n\n\u0027cache_ent\u0027 could be set NULL inside virtio_gpu_cmd_get_capset()\nand it will lead to a NULL dereference by a lately use of it\n(i.e., ptr = cache_ent-\u003ecaps_cache). Fix it with a NULL check.\n\n\n[ kraxel: minor codestyle fixup ]",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "SUSE Linux Enterprise Micro 5.1:kernel-rt-5.3.18-150300.214.1.x86_64",
          "SUSE Linux Enterprise Micro 5.1:kernel-source-rt-5.3.18-150300.214.1.noarch",
          "SUSE Linux Enterprise Micro 5.2:kernel-rt-5.3.18-150300.214.1.x86_64",
          "SUSE Linux Enterprise Micro 5.2:kernel-source-rt-5.3.18-150300.214.1.noarch"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2022-50181",
          "url": "https://www.suse.com/security/cve/CVE-2022-50181"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1244901 for CVE-2022-50181",
          "url": "https://bugzilla.suse.com/1244901"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "SUSE Linux Enterprise Micro 5.1:kernel-rt-5.3.18-150300.214.1.x86_64",
            "SUSE Linux Enterprise Micro 5.1:kernel-source-rt-5.3.18-150300.214.1.noarch",
            "SUSE Linux Enterprise Micro 5.2:kernel-rt-5.3.18-150300.214.1.x86_64",
            "SUSE Linux Enterprise Micro 5.2:kernel-source-rt-5.3.18-150300.214.1.noarch"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 5.5,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
            "version": "3.1"
          },
          "products": [
            "SUSE Linux Enterprise Micro 5.1:kernel-rt-5.3.18-150300.214.1.x86_64",
            "SUSE Linux Enterprise Micro 5.1:kernel-source-rt-5.3.18-150300.214.1.noarch",
            "SUSE Linux Enterprise Micro 5.2:kernel-rt-5.3.18-150300.214.1.x86_64",
            "SUSE Linux Enterprise Micro 5.2:kernel-source-rt-5.3.18-150300.214.1.noarch"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2025-07-15T14:20:22Z",
          "details": "moderate"
        }
      ],
      "title": "CVE-2022-50181"
    },
    {
      "cve": "CVE-2022-50185",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2022-50185"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "In the Linux kernel, the following vulnerability has been resolved:\n\ndrm/radeon: fix potential buffer overflow in ni_set_mc_special_registers()\n\nThe last case label can write two buffers \u0027mc_reg_address[j]\u0027 and\n\u0027mc_data[j]\u0027 with \u0027j\u0027 offset equal to SMC_NISLANDS_MC_REGISTER_ARRAY_SIZE\nsince there are no checks for this value in both case labels after the\nlast \u0027j++\u0027.\n\nInstead of changing \u0027\u003e\u0027 to \u0027\u003e=\u0027 there, add the bounds check at the start\nof the second \u0027case\u0027 (the first one already has it).\n\nAlso, remove redundant last checks for \u0027j\u0027 index bigger than array size.\nThe expression is always false. Moreover, before or after the patch\n\u0027table-\u003elast\u0027 can be equal to SMC_NISLANDS_MC_REGISTER_ARRAY_SIZE and it\nseems it can be a valid value.\n\nDetected using the static analysis tool - Svace.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "SUSE Linux Enterprise Micro 5.1:kernel-rt-5.3.18-150300.214.1.x86_64",
          "SUSE Linux Enterprise Micro 5.1:kernel-source-rt-5.3.18-150300.214.1.noarch",
          "SUSE Linux Enterprise Micro 5.2:kernel-rt-5.3.18-150300.214.1.x86_64",
          "SUSE Linux Enterprise Micro 5.2:kernel-source-rt-5.3.18-150300.214.1.noarch"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2022-50185",
          "url": "https://www.suse.com/security/cve/CVE-2022-50185"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1244887 for CVE-2022-50185",
          "url": "https://bugzilla.suse.com/1244887"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "SUSE Linux Enterprise Micro 5.1:kernel-rt-5.3.18-150300.214.1.x86_64",
            "SUSE Linux Enterprise Micro 5.1:kernel-source-rt-5.3.18-150300.214.1.noarch",
            "SUSE Linux Enterprise Micro 5.2:kernel-rt-5.3.18-150300.214.1.x86_64",
            "SUSE Linux Enterprise Micro 5.2:kernel-source-rt-5.3.18-150300.214.1.noarch"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 5.5,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
            "version": "3.1"
          },
          "products": [
            "SUSE Linux Enterprise Micro 5.1:kernel-rt-5.3.18-150300.214.1.x86_64",
            "SUSE Linux Enterprise Micro 5.1:kernel-source-rt-5.3.18-150300.214.1.noarch",
            "SUSE Linux Enterprise Micro 5.2:kernel-rt-5.3.18-150300.214.1.x86_64",
            "SUSE Linux Enterprise Micro 5.2:kernel-source-rt-5.3.18-150300.214.1.noarch"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2025-07-15T14:20:22Z",
          "details": "moderate"
        }
      ],
      "title": "CVE-2022-50185"
    },
    {
      "cve": "CVE-2022-50191",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2022-50191"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "In the Linux kernel, the following vulnerability has been resolved:\n\nregulator: of: Fix refcount leak bug in of_get_regulation_constraints()\n\nWe should call the of_node_put() for the reference returned by\nof_get_child_by_name() which has increased the refcount.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "SUSE Linux Enterprise Micro 5.1:kernel-rt-5.3.18-150300.214.1.x86_64",
          "SUSE Linux Enterprise Micro 5.1:kernel-source-rt-5.3.18-150300.214.1.noarch",
          "SUSE Linux Enterprise Micro 5.2:kernel-rt-5.3.18-150300.214.1.x86_64",
          "SUSE Linux Enterprise Micro 5.2:kernel-source-rt-5.3.18-150300.214.1.noarch"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2022-50191",
          "url": "https://www.suse.com/security/cve/CVE-2022-50191"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1244899 for CVE-2022-50191",
          "url": "https://bugzilla.suse.com/1244899"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "SUSE Linux Enterprise Micro 5.1:kernel-rt-5.3.18-150300.214.1.x86_64",
            "SUSE Linux Enterprise Micro 5.1:kernel-source-rt-5.3.18-150300.214.1.noarch",
            "SUSE Linux Enterprise Micro 5.2:kernel-rt-5.3.18-150300.214.1.x86_64",
            "SUSE Linux Enterprise Micro 5.2:kernel-source-rt-5.3.18-150300.214.1.noarch"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 5.5,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
            "version": "3.1"
          },
          "products": [
            "SUSE Linux Enterprise Micro 5.1:kernel-rt-5.3.18-150300.214.1.x86_64",
            "SUSE Linux Enterprise Micro 5.1:kernel-source-rt-5.3.18-150300.214.1.noarch",
            "SUSE Linux Enterprise Micro 5.2:kernel-rt-5.3.18-150300.214.1.x86_64",
            "SUSE Linux Enterprise Micro 5.2:kernel-source-rt-5.3.18-150300.214.1.noarch"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2025-07-15T14:20:22Z",
          "details": "moderate"
        }
      ],
      "title": "CVE-2022-50191"
    },
    {
      "cve": "CVE-2022-50200",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2022-50200"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "In the Linux kernel, the following vulnerability has been resolved:\n\nselinux: Add boundary check in put_entry()\n\nJust like next_entry(), boundary check is necessary to prevent memory\nout-of-bound access.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "SUSE Linux Enterprise Micro 5.1:kernel-rt-5.3.18-150300.214.1.x86_64",
          "SUSE Linux Enterprise Micro 5.1:kernel-source-rt-5.3.18-150300.214.1.noarch",
          "SUSE Linux Enterprise Micro 5.2:kernel-rt-5.3.18-150300.214.1.x86_64",
          "SUSE Linux Enterprise Micro 5.2:kernel-source-rt-5.3.18-150300.214.1.noarch"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2022-50200",
          "url": "https://www.suse.com/security/cve/CVE-2022-50200"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1245149 for CVE-2022-50200",
          "url": "https://bugzilla.suse.com/1245149"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "SUSE Linux Enterprise Micro 5.1:kernel-rt-5.3.18-150300.214.1.x86_64",
            "SUSE Linux Enterprise Micro 5.1:kernel-source-rt-5.3.18-150300.214.1.noarch",
            "SUSE Linux Enterprise Micro 5.2:kernel-rt-5.3.18-150300.214.1.x86_64",
            "SUSE Linux Enterprise Micro 5.2:kernel-source-rt-5.3.18-150300.214.1.noarch"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 7.8,
            "baseSeverity": "HIGH",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
            "version": "3.1"
          },
          "products": [
            "SUSE Linux Enterprise Micro 5.1:kernel-rt-5.3.18-150300.214.1.x86_64",
            "SUSE Linux Enterprise Micro 5.1:kernel-source-rt-5.3.18-150300.214.1.noarch",
            "SUSE Linux Enterprise Micro 5.2:kernel-rt-5.3.18-150300.214.1.x86_64",
            "SUSE Linux Enterprise Micro 5.2:kernel-source-rt-5.3.18-150300.214.1.noarch"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2025-07-15T14:20:22Z",
          "details": "important"
        }
      ],
      "title": "CVE-2022-50200"
    },
    {
      "cve": "CVE-2022-50209",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2022-50209"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "In the Linux kernel, the following vulnerability has been resolved:\n\nmeson-mx-socinfo: Fix refcount leak in meson_mx_socinfo_init\n\nof_find_matching_node() returns a node pointer with refcount\nincremented, we should use of_node_put() on it when not need anymore.\nAdd missing of_node_put() to avoid refcount leak.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "SUSE Linux Enterprise Micro 5.1:kernel-rt-5.3.18-150300.214.1.x86_64",
          "SUSE Linux Enterprise Micro 5.1:kernel-source-rt-5.3.18-150300.214.1.noarch",
          "SUSE Linux Enterprise Micro 5.2:kernel-rt-5.3.18-150300.214.1.x86_64",
          "SUSE Linux Enterprise Micro 5.2:kernel-source-rt-5.3.18-150300.214.1.noarch"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2022-50209",
          "url": "https://www.suse.com/security/cve/CVE-2022-50209"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1244868 for CVE-2022-50209",
          "url": "https://bugzilla.suse.com/1244868"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "SUSE Linux Enterprise Micro 5.1:kernel-rt-5.3.18-150300.214.1.x86_64",
            "SUSE Linux Enterprise Micro 5.1:kernel-source-rt-5.3.18-150300.214.1.noarch",
            "SUSE Linux Enterprise Micro 5.2:kernel-rt-5.3.18-150300.214.1.x86_64",
            "SUSE Linux Enterprise Micro 5.2:kernel-source-rt-5.3.18-150300.214.1.noarch"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 5.5,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
            "version": "3.1"
          },
          "products": [
            "SUSE Linux Enterprise Micro 5.1:kernel-rt-5.3.18-150300.214.1.x86_64",
            "SUSE Linux Enterprise Micro 5.1:kernel-source-rt-5.3.18-150300.214.1.noarch",
            "SUSE Linux Enterprise Micro 5.2:kernel-rt-5.3.18-150300.214.1.x86_64",
            "SUSE Linux Enterprise Micro 5.2:kernel-source-rt-5.3.18-150300.214.1.noarch"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2025-07-15T14:20:22Z",
          "details": "moderate"
        }
      ],
      "title": "CVE-2022-50209"
    },
    {
      "cve": "CVE-2022-50211",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2022-50211"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "In the Linux kernel, the following vulnerability has been resolved:\n\nmd-raid10: fix KASAN warning\n\nThere\u0027s a KASAN warning in raid10_remove_disk when running the lvm\ntest lvconvert-raid-reshape.sh. We fix this warning by verifying that the\nvalue \"number\" is valid.\n\nBUG: KASAN: slab-out-of-bounds in raid10_remove_disk+0x61/0x2a0 [raid10]\nRead of size 8 at addr ffff889108f3d300 by task mdX_raid10/124682\n\nCPU: 3 PID: 124682 Comm: mdX_raid10 Not tainted 5.19.0-rc6 #1\nHardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.14.0-2 04/01/2014\nCall Trace:\n \u003cTASK\u003e\n dump_stack_lvl+0x34/0x44\n print_report.cold+0x45/0x57a\n ? __lock_text_start+0x18/0x18\n ? raid10_remove_disk+0x61/0x2a0 [raid10]\n kasan_report+0xa8/0xe0\n ? raid10_remove_disk+0x61/0x2a0 [raid10]\n raid10_remove_disk+0x61/0x2a0 [raid10]\nBuffer I/O error on dev dm-76, logical block 15344, async page read\n ? __mutex_unlock_slowpath.constprop.0+0x1e0/0x1e0\n remove_and_add_spares+0x367/0x8a0 [md_mod]\n ? super_written+0x1c0/0x1c0 [md_mod]\n ? mutex_trylock+0xac/0x120\n ? _raw_spin_lock+0x72/0xc0\n ? _raw_spin_lock_bh+0xc0/0xc0\n md_check_recovery+0x848/0x960 [md_mod]\n raid10d+0xcf/0x3360 [raid10]\n ? sched_clock_cpu+0x185/0x1a0\n ? rb_erase+0x4d4/0x620\n ? var_wake_function+0xe0/0xe0\n ? psi_group_change+0x411/0x500\n ? preempt_count_sub+0xf/0xc0\n ? _raw_spin_lock_irqsave+0x78/0xc0\n ? __lock_text_start+0x18/0x18\n ? raid10_sync_request+0x36c0/0x36c0 [raid10]\n ? preempt_count_sub+0xf/0xc0\n ? _raw_spin_unlock_irqrestore+0x19/0x40\n ? del_timer_sync+0xa9/0x100\n ? try_to_del_timer_sync+0xc0/0xc0\n ? _raw_spin_lock_irqsave+0x78/0xc0\n ? __lock_text_start+0x18/0x18\n ? _raw_spin_unlock_irq+0x11/0x24\n ? __list_del_entry_valid+0x68/0xa0\n ? finish_wait+0xa3/0x100\n md_thread+0x161/0x260 [md_mod]\n ? unregister_md_personality+0xa0/0xa0 [md_mod]\n ? _raw_spin_lock_irqsave+0x78/0xc0\n ? prepare_to_wait_event+0x2c0/0x2c0\n ? unregister_md_personality+0xa0/0xa0 [md_mod]\n kthread+0x148/0x180\n ? kthread_complete_and_exit+0x20/0x20\n ret_from_fork+0x1f/0x30\n \u003c/TASK\u003e\n\nAllocated by task 124495:\n kasan_save_stack+0x1e/0x40\n __kasan_kmalloc+0x80/0xa0\n setup_conf+0x140/0x5c0 [raid10]\n raid10_run+0x4cd/0x740 [raid10]\n md_run+0x6f9/0x1300 [md_mod]\n raid_ctr+0x2531/0x4ac0 [dm_raid]\n dm_table_add_target+0x2b0/0x620 [dm_mod]\n table_load+0x1c8/0x400 [dm_mod]\n ctl_ioctl+0x29e/0x560 [dm_mod]\n dm_compat_ctl_ioctl+0x7/0x20 [dm_mod]\n __do_compat_sys_ioctl+0xfa/0x160\n do_syscall_64+0x90/0xc0\n entry_SYSCALL_64_after_hwframe+0x46/0xb0\n\nLast potentially related work creation:\n kasan_save_stack+0x1e/0x40\n __kasan_record_aux_stack+0x9e/0xc0\n kvfree_call_rcu+0x84/0x480\n timerfd_release+0x82/0x140\nL __fput+0xfa/0x400\n task_work_run+0x80/0xc0\n exit_to_user_mode_prepare+0x155/0x160\n syscall_exit_to_user_mode+0x12/0x40\n do_syscall_64+0x42/0xc0\n entry_SYSCALL_64_after_hwframe+0x46/0xb0\n\nSecond to last potentially related work creation:\n kasan_save_stack+0x1e/0x40\n __kasan_record_aux_stack+0x9e/0xc0\n kvfree_call_rcu+0x84/0x480\n timerfd_release+0x82/0x140\n __fput+0xfa/0x400\n task_work_run+0x80/0xc0\n exit_to_user_mode_prepare+0x155/0x160\n syscall_exit_to_user_mode+0x12/0x40\n do_syscall_64+0x42/0xc0\n entry_SYSCALL_64_after_hwframe+0x46/0xb0\n\nThe buggy address belongs to the object at ffff889108f3d200\n which belongs to the cache kmalloc-256 of size 256\nThe buggy address is located 0 bytes to the right of\n 256-byte region [ffff889108f3d200, ffff889108f3d300)\n\nThe buggy address belongs to the physical page:\npage:000000007ef2a34c refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1108f3c\nhead:000000007ef2a34c order:2 compound_mapcount:0 compound_pincount:0\nflags: 0x4000000000010200(slab|head|zone=2)\nraw: 4000000000010200 0000000000000000 dead000000000001 ffff889100042b40\nraw: 0000000000000000 0000000080200020 00000001ffffffff 0000000000000000\npage dumped because: kasan: bad access detected\n\nMemory state around the buggy address:\n ffff889108f3d200: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00\n ffff889108f3d280: 00 00\n---truncated---",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "SUSE Linux Enterprise Micro 5.1:kernel-rt-5.3.18-150300.214.1.x86_64",
          "SUSE Linux Enterprise Micro 5.1:kernel-source-rt-5.3.18-150300.214.1.noarch",
          "SUSE Linux Enterprise Micro 5.2:kernel-rt-5.3.18-150300.214.1.x86_64",
          "SUSE Linux Enterprise Micro 5.2:kernel-source-rt-5.3.18-150300.214.1.noarch"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2022-50211",
          "url": "https://www.suse.com/security/cve/CVE-2022-50211"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1245140 for CVE-2022-50211",
          "url": "https://bugzilla.suse.com/1245140"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1245141 for CVE-2022-50211",
          "url": "https://bugzilla.suse.com/1245141"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "SUSE Linux Enterprise Micro 5.1:kernel-rt-5.3.18-150300.214.1.x86_64",
            "SUSE Linux Enterprise Micro 5.1:kernel-source-rt-5.3.18-150300.214.1.noarch",
            "SUSE Linux Enterprise Micro 5.2:kernel-rt-5.3.18-150300.214.1.x86_64",
            "SUSE Linux Enterprise Micro 5.2:kernel-source-rt-5.3.18-150300.214.1.noarch"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 7.8,
            "baseSeverity": "HIGH",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
            "version": "3.1"
          },
          "products": [
            "SUSE Linux Enterprise Micro 5.1:kernel-rt-5.3.18-150300.214.1.x86_64",
            "SUSE Linux Enterprise Micro 5.1:kernel-source-rt-5.3.18-150300.214.1.noarch",
            "SUSE Linux Enterprise Micro 5.2:kernel-rt-5.3.18-150300.214.1.x86_64",
            "SUSE Linux Enterprise Micro 5.2:kernel-source-rt-5.3.18-150300.214.1.noarch"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2025-07-15T14:20:22Z",
          "details": "important"
        }
      ],
      "title": "CVE-2022-50211"
    },
    {
      "cve": "CVE-2022-50212",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2022-50212"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "In the Linux kernel, the following vulnerability has been resolved:\n\nnetfilter: nf_tables: do not allow CHAIN_ID to refer to another table\n\nWhen doing lookups for chains on the same batch by using its ID, a chain\nfrom a different table can be used. If a rule is added to a table but\nrefers to a chain in a different table, it will be linked to the chain in\ntable2, but would have expressions referring to objects in table1.\n\nThen, when table1 is removed, the rule will not be removed as its linked to\na chain in table2. When expressions in the rule are processed or removed,\nthat will lead to a use-after-free.\n\nWhen looking for chains by ID, use the table that was used for the lookup\nby name, and only return chains belonging to that same table.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "SUSE Linux Enterprise Micro 5.1:kernel-rt-5.3.18-150300.214.1.x86_64",
          "SUSE Linux Enterprise Micro 5.1:kernel-source-rt-5.3.18-150300.214.1.noarch",
          "SUSE Linux Enterprise Micro 5.2:kernel-rt-5.3.18-150300.214.1.x86_64",
          "SUSE Linux Enterprise Micro 5.2:kernel-source-rt-5.3.18-150300.214.1.noarch"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2022-50212",
          "url": "https://www.suse.com/security/cve/CVE-2022-50212"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1244869 for CVE-2022-50212",
          "url": "https://bugzilla.suse.com/1244869"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "SUSE Linux Enterprise Micro 5.1:kernel-rt-5.3.18-150300.214.1.x86_64",
            "SUSE Linux Enterprise Micro 5.1:kernel-source-rt-5.3.18-150300.214.1.noarch",
            "SUSE Linux Enterprise Micro 5.2:kernel-rt-5.3.18-150300.214.1.x86_64",
            "SUSE Linux Enterprise Micro 5.2:kernel-source-rt-5.3.18-150300.214.1.noarch"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 5.5,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
            "version": "3.1"
          },
          "products": [
            "SUSE Linux Enterprise Micro 5.1:kernel-rt-5.3.18-150300.214.1.x86_64",
            "SUSE Linux Enterprise Micro 5.1:kernel-source-rt-5.3.18-150300.214.1.noarch",
            "SUSE Linux Enterprise Micro 5.2:kernel-rt-5.3.18-150300.214.1.x86_64",
            "SUSE Linux Enterprise Micro 5.2:kernel-source-rt-5.3.18-150300.214.1.noarch"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2025-07-15T14:20:22Z",
          "details": "moderate"
        }
      ],
      "title": "CVE-2022-50212"
    },
    {
      "cve": "CVE-2022-50213",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2022-50213"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "In the Linux kernel, the following vulnerability has been resolved:\n\nnetfilter: nf_tables: do not allow SET_ID to refer to another table\n\nWhen doing lookups for sets on the same batch by using its ID, a set from a\ndifferent table can be used.\n\nThen, when the table is removed, a reference to the set may be kept after\nthe set is freed, leading to a potential use-after-free.\n\nWhen looking for sets by ID, use the table that was used for the lookup by\nname, and only return sets belonging to that same table.\n\nThis fixes CVE-2022-2586, also reported as ZDI-CAN-17470.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "SUSE Linux Enterprise Micro 5.1:kernel-rt-5.3.18-150300.214.1.x86_64",
          "SUSE Linux Enterprise Micro 5.1:kernel-source-rt-5.3.18-150300.214.1.noarch",
          "SUSE Linux Enterprise Micro 5.2:kernel-rt-5.3.18-150300.214.1.x86_64",
          "SUSE Linux Enterprise Micro 5.2:kernel-source-rt-5.3.18-150300.214.1.noarch"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2022-50213",
          "url": "https://www.suse.com/security/cve/CVE-2022-50213"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1244867 for CVE-2022-50213",
          "url": "https://bugzilla.suse.com/1244867"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "SUSE Linux Enterprise Micro 5.1:kernel-rt-5.3.18-150300.214.1.x86_64",
            "SUSE Linux Enterprise Micro 5.1:kernel-source-rt-5.3.18-150300.214.1.noarch",
            "SUSE Linux Enterprise Micro 5.2:kernel-rt-5.3.18-150300.214.1.x86_64",
            "SUSE Linux Enterprise Micro 5.2:kernel-source-rt-5.3.18-150300.214.1.noarch"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 5.5,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
            "version": "3.1"
          },
          "products": [
            "SUSE Linux Enterprise Micro 5.1:kernel-rt-5.3.18-150300.214.1.x86_64",
            "SUSE Linux Enterprise Micro 5.1:kernel-source-rt-5.3.18-150300.214.1.noarch",
            "SUSE Linux Enterprise Micro 5.2:kernel-rt-5.3.18-150300.214.1.x86_64",
            "SUSE Linux Enterprise Micro 5.2:kernel-source-rt-5.3.18-150300.214.1.noarch"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2025-07-15T14:20:22Z",
          "details": "moderate"
        }
      ],
      "title": "CVE-2022-50213"
    },
    {
      "cve": "CVE-2022-50215",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2022-50215"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "In the Linux kernel, the following vulnerability has been resolved:\n\nscsi: sg: Allow waiting for commands to complete on removed device\n\nWhen a SCSI device is removed while in active use, currently sg will\nimmediately return -ENODEV on any attempt to wait for active commands that\nwere sent before the removal.  This is problematic for commands that use\nSG_FLAG_DIRECT_IO since the data buffer may still be in use by the kernel\nwhen userspace frees or reuses it after getting ENODEV, leading to\ncorrupted userspace memory (in the case of READ-type commands) or corrupted\ndata being sent to the device (in the case of WRITE-type commands).  This\nhas been seen in practice when logging out of a iscsi_tcp session, where\nthe iSCSI driver may still be processing commands after the device has been\nmarked for removal.\n\nChange the policy to allow userspace to wait for active sg commands even\nwhen the device is being removed.  Return -ENODEV only when there are no\nmore responses to read.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "SUSE Linux Enterprise Micro 5.1:kernel-rt-5.3.18-150300.214.1.x86_64",
          "SUSE Linux Enterprise Micro 5.1:kernel-source-rt-5.3.18-150300.214.1.noarch",
          "SUSE Linux Enterprise Micro 5.2:kernel-rt-5.3.18-150300.214.1.x86_64",
          "SUSE Linux Enterprise Micro 5.2:kernel-source-rt-5.3.18-150300.214.1.noarch"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2022-50215",
          "url": "https://www.suse.com/security/cve/CVE-2022-50215"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1245138 for CVE-2022-50215",
          "url": "https://bugzilla.suse.com/1245138"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "SUSE Linux Enterprise Micro 5.1:kernel-rt-5.3.18-150300.214.1.x86_64",
            "SUSE Linux Enterprise Micro 5.1:kernel-source-rt-5.3.18-150300.214.1.noarch",
            "SUSE Linux Enterprise Micro 5.2:kernel-rt-5.3.18-150300.214.1.x86_64",
            "SUSE Linux Enterprise Micro 5.2:kernel-source-rt-5.3.18-150300.214.1.noarch"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 6.1,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:H",
            "version": "3.1"
          },
          "products": [
            "SUSE Linux Enterprise Micro 5.1:kernel-rt-5.3.18-150300.214.1.x86_64",
            "SUSE Linux Enterprise Micro 5.1:kernel-source-rt-5.3.18-150300.214.1.noarch",
            "SUSE Linux Enterprise Micro 5.2:kernel-rt-5.3.18-150300.214.1.x86_64",
            "SUSE Linux Enterprise Micro 5.2:kernel-source-rt-5.3.18-150300.214.1.noarch"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2025-07-15T14:20:22Z",
          "details": "moderate"
        }
      ],
      "title": "CVE-2022-50215"
    },
    {
      "cve": "CVE-2022-50218",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2022-50218"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "In the Linux kernel, the following vulnerability has been resolved:\n\niio: light: isl29028: Fix the warning in isl29028_remove()\n\nThe driver use the non-managed form of the register function in\nisl29028_remove(). To keep the release order as mirroring the ordering\nin probe, the driver should use non-managed form in probe, too.\n\nThe following log reveals it:\n\n[   32.374955] isl29028 0-0010: remove\n[   32.376861] general protection fault, probably for non-canonical address 0xdffffc0000000006: 0000 [#1] PREEMPT SMP KASAN PTI\n[   32.377676] KASAN: null-ptr-deref in range [0x0000000000000030-0x0000000000000037]\n[   32.379432] RIP: 0010:kernfs_find_and_get_ns+0x28/0xe0\n[   32.385461] Call Trace:\n[   32.385807]  sysfs_unmerge_group+0x59/0x110\n[   32.386110]  dpm_sysfs_remove+0x58/0xc0\n[   32.386391]  device_del+0x296/0xe50\n[   32.386959]  cdev_device_del+0x1d/0xd0\n[   32.387231]  devm_iio_device_unreg+0x27/0xb0\n[   32.387542]  devres_release_group+0x319/0x3d0\n[   32.388162]  i2c_device_remove+0x93/0x1f0",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "SUSE Linux Enterprise Micro 5.1:kernel-rt-5.3.18-150300.214.1.x86_64",
          "SUSE Linux Enterprise Micro 5.1:kernel-source-rt-5.3.18-150300.214.1.noarch",
          "SUSE Linux Enterprise Micro 5.2:kernel-rt-5.3.18-150300.214.1.x86_64",
          "SUSE Linux Enterprise Micro 5.2:kernel-source-rt-5.3.18-150300.214.1.noarch"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2022-50218",
          "url": "https://www.suse.com/security/cve/CVE-2022-50218"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1244861 for CVE-2022-50218",
          "url": "https://bugzilla.suse.com/1244861"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "SUSE Linux Enterprise Micro 5.1:kernel-rt-5.3.18-150300.214.1.x86_64",
            "SUSE Linux Enterprise Micro 5.1:kernel-source-rt-5.3.18-150300.214.1.noarch",
            "SUSE Linux Enterprise Micro 5.2:kernel-rt-5.3.18-150300.214.1.x86_64",
            "SUSE Linux Enterprise Micro 5.2:kernel-source-rt-5.3.18-150300.214.1.noarch"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 5.5,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
            "version": "3.1"
          },
          "products": [
            "SUSE Linux Enterprise Micro 5.1:kernel-rt-5.3.18-150300.214.1.x86_64",
            "SUSE Linux Enterprise Micro 5.1:kernel-source-rt-5.3.18-150300.214.1.noarch",
            "SUSE Linux Enterprise Micro 5.2:kernel-rt-5.3.18-150300.214.1.x86_64",
            "SUSE Linux Enterprise Micro 5.2:kernel-source-rt-5.3.18-150300.214.1.noarch"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2025-07-15T14:20:22Z",
          "details": "moderate"
        }
      ],
      "title": "CVE-2022-50218"
    },
    {
      "cve": "CVE-2022-50220",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2022-50220"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "In the Linux kernel, the following vulnerability has been resolved:\n\nusbnet: Fix linkwatch use-after-free on disconnect\n\nusbnet uses the work usbnet_deferred_kevent() to perform tasks which may\nsleep.  On disconnect, completion of the work was originally awaited in\n-\u003endo_stop().  But in 2003, that was moved to -\u003edisconnect() by historic\ncommit \"[PATCH] USB: usbnet, prevent exotic rtnl deadlock\":\n\n  https://git.kernel.org/tglx/history/c/0f138bbfd83c\n\nThe change was made because back then, the kernel\u0027s workqueue\nimplementation did not allow waiting for a single work.  One had to wait\nfor completion of *all* work by calling flush_scheduled_work(), and that\ncould deadlock when waiting for usbnet_deferred_kevent() with rtnl_mutex\nheld in -\u003endo_stop().\n\nThe commit solved one problem but created another:  It causes a\nuse-after-free in USB Ethernet drivers aqc111.c, asix_devices.c,\nax88179_178a.c, ch9200.c and smsc75xx.c:\n\n* If the drivers receive a link change interrupt immediately before\n  disconnect, they raise EVENT_LINK_RESET in their (non-sleepable)\n  -\u003estatus() callback and schedule usbnet_deferred_kevent().\n* usbnet_deferred_kevent() invokes the driver\u0027s -\u003elink_reset() callback,\n  which calls netif_carrier_{on,off}().\n* That in turn schedules the work linkwatch_event().\n\nBecause usbnet_deferred_kevent() is awaited after unregister_netdev(),\nnetif_carrier_{on,off}() may operate on an unregistered netdev and\nlinkwatch_event() may run after free_netdev(), causing a use-after-free.\n\nIn 2010, usbnet was changed to only wait for a single instance of\nusbnet_deferred_kevent() instead of *all* work by commit 23f333a2bfaf\n(\"drivers/net: don\u0027t use flush_scheduled_work()\").\n\nUnfortunately the commit neglected to move the wait back to\n-\u003endo_stop().  Rectify that omission at long last.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "SUSE Linux Enterprise Micro 5.1:kernel-rt-5.3.18-150300.214.1.x86_64",
          "SUSE Linux Enterprise Micro 5.1:kernel-source-rt-5.3.18-150300.214.1.noarch",
          "SUSE Linux Enterprise Micro 5.2:kernel-rt-5.3.18-150300.214.1.x86_64",
          "SUSE Linux Enterprise Micro 5.2:kernel-source-rt-5.3.18-150300.214.1.noarch"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2022-50220",
          "url": "https://www.suse.com/security/cve/CVE-2022-50220"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1245348 for CVE-2022-50220",
          "url": "https://bugzilla.suse.com/1245348"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "SUSE Linux Enterprise Micro 5.1:kernel-rt-5.3.18-150300.214.1.x86_64",
            "SUSE Linux Enterprise Micro 5.1:kernel-source-rt-5.3.18-150300.214.1.noarch",
            "SUSE Linux Enterprise Micro 5.2:kernel-rt-5.3.18-150300.214.1.x86_64",
            "SUSE Linux Enterprise Micro 5.2:kernel-source-rt-5.3.18-150300.214.1.noarch"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 6.5,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:L/I:H/A:H",
            "version": "3.1"
          },
          "products": [
            "SUSE Linux Enterprise Micro 5.1:kernel-rt-5.3.18-150300.214.1.x86_64",
            "SUSE Linux Enterprise Micro 5.1:kernel-source-rt-5.3.18-150300.214.1.noarch",
            "SUSE Linux Enterprise Micro 5.2:kernel-rt-5.3.18-150300.214.1.x86_64",
            "SUSE Linux Enterprise Micro 5.2:kernel-source-rt-5.3.18-150300.214.1.noarch"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2025-07-15T14:20:22Z",
          "details": "moderate"
        }
      ],
      "title": "CVE-2022-50220"
    },
    {
      "cve": "CVE-2022-50222",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2022-50222"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "In the Linux kernel, the following vulnerability has been resolved:\n\ntty: vt: initialize unicode screen buffer\n\nsyzbot reports kernel infoleak at vcs_read() [1], for buffer can be read\nimmediately after resize operation. Initialize buffer using kzalloc().\n\n  ----------\n  #include \u003cfcntl.h\u003e\n  #include \u003cunistd.h\u003e\n  #include \u003csys/ioctl.h\u003e\n  #include \u003clinux/fb.h\u003e\n\n  int main(int argc, char *argv[])\n  {\n    struct fb_var_screeninfo var = { };\n    const int fb_fd = open(\"/dev/fb0\", 3);\n    ioctl(fb_fd, FBIOGET_VSCREENINFO, \u0026var);\n    var.yres = 0x21;\n    ioctl(fb_fd, FBIOPUT_VSCREENINFO, \u0026var);\n    return read(open(\"/dev/vcsu\", O_RDONLY), \u0026var, sizeof(var)) == -1;\n  }\n  ----------",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "SUSE Linux Enterprise Micro 5.1:kernel-rt-5.3.18-150300.214.1.x86_64",
          "SUSE Linux Enterprise Micro 5.1:kernel-source-rt-5.3.18-150300.214.1.noarch",
          "SUSE Linux Enterprise Micro 5.2:kernel-rt-5.3.18-150300.214.1.x86_64",
          "SUSE Linux Enterprise Micro 5.2:kernel-source-rt-5.3.18-150300.214.1.noarch"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2022-50222",
          "url": "https://www.suse.com/security/cve/CVE-2022-50222"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1245136 for CVE-2022-50222",
          "url": "https://bugzilla.suse.com/1245136"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "SUSE Linux Enterprise Micro 5.1:kernel-rt-5.3.18-150300.214.1.x86_64",
            "SUSE Linux Enterprise Micro 5.1:kernel-source-rt-5.3.18-150300.214.1.noarch",
            "SUSE Linux Enterprise Micro 5.2:kernel-rt-5.3.18-150300.214.1.x86_64",
            "SUSE Linux Enterprise Micro 5.2:kernel-source-rt-5.3.18-150300.214.1.noarch"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 3.3,
            "baseSeverity": "LOW",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N",
            "version": "3.1"
          },
          "products": [
            "SUSE Linux Enterprise Micro 5.1:kernel-rt-5.3.18-150300.214.1.x86_64",
            "SUSE Linux Enterprise Micro 5.1:kernel-source-rt-5.3.18-150300.214.1.noarch",
            "SUSE Linux Enterprise Micro 5.2:kernel-rt-5.3.18-150300.214.1.x86_64",
            "SUSE Linux Enterprise Micro 5.2:kernel-source-rt-5.3.18-150300.214.1.noarch"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2025-07-15T14:20:22Z",
          "details": "moderate"
        }
      ],
      "title": "CVE-2022-50222"
    },
    {
      "cve": "CVE-2022-50229",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2022-50229"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "In the Linux kernel, the following vulnerability has been resolved:\n\nALSA: bcd2000: Fix a UAF bug on the error path of probing\n\nWhen the driver fails in snd_card_register() at probe time, it will free\nthe \u0027bcd2k-\u003emidi_out_urb\u0027 before killing it, which may cause a UAF bug.\n\nThe following log can reveal it:\n\n[   50.727020] BUG: KASAN: use-after-free in bcd2000_input_complete+0x1f1/0x2e0 [snd_bcd2000]\n[   50.727623] Read of size 8 at addr ffff88810fab0e88 by task swapper/4/0\n[   50.729530] Call Trace:\n[   50.732899]  bcd2000_input_complete+0x1f1/0x2e0 [snd_bcd2000]\n\nFix this by adding usb_kill_urb() before usb_free_urb().",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "SUSE Linux Enterprise Micro 5.1:kernel-rt-5.3.18-150300.214.1.x86_64",
          "SUSE Linux Enterprise Micro 5.1:kernel-source-rt-5.3.18-150300.214.1.noarch",
          "SUSE Linux Enterprise Micro 5.2:kernel-rt-5.3.18-150300.214.1.x86_64",
          "SUSE Linux Enterprise Micro 5.2:kernel-source-rt-5.3.18-150300.214.1.noarch"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2022-50229",
          "url": "https://www.suse.com/security/cve/CVE-2022-50229"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1244856 for CVE-2022-50229",
          "url": "https://bugzilla.suse.com/1244856"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "SUSE Linux Enterprise Micro 5.1:kernel-rt-5.3.18-150300.214.1.x86_64",
            "SUSE Linux Enterprise Micro 5.1:kernel-source-rt-5.3.18-150300.214.1.noarch",
            "SUSE Linux Enterprise Micro 5.2:kernel-rt-5.3.18-150300.214.1.x86_64",
            "SUSE Linux Enterprise Micro 5.2:kernel-source-rt-5.3.18-150300.214.1.noarch"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 5.5,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
            "version": "3.1"
          },
          "products": [
            "SUSE Linux Enterprise Micro 5.1:kernel-rt-5.3.18-150300.214.1.x86_64",
            "SUSE Linux Enterprise Micro 5.1:kernel-source-rt-5.3.18-150300.214.1.noarch",
            "SUSE Linux Enterprise Micro 5.2:kernel-rt-5.3.18-150300.214.1.x86_64",
            "SUSE Linux Enterprise Micro 5.2:kernel-source-rt-5.3.18-150300.214.1.noarch"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2025-07-15T14:20:22Z",
          "details": "moderate"
        }
      ],
      "title": "CVE-2022-50229"
    },
    {
      "cve": "CVE-2022-50231",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2022-50231"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "In the Linux kernel, the following vulnerability has been resolved:\n\ncrypto: arm64/poly1305 - fix a read out-of-bound\n\nA kasan error was reported during fuzzing:\n\nBUG: KASAN: slab-out-of-bounds in neon_poly1305_blocks.constprop.0+0x1b4/0x250 [poly1305_neon]\nRead of size 4 at addr ffff0010e293f010 by task syz-executor.5/1646715\nCPU: 4 PID: 1646715 Comm: syz-executor.5 Kdump: loaded Not tainted 5.10.0.aarch64 #1\nHardware name: Huawei TaiShan 2280 /BC11SPCD, BIOS 1.59 01/31/2019\nCall trace:\n dump_backtrace+0x0/0x394\n show_stack+0x34/0x4c arch/arm64/kernel/stacktrace.c:196\n __dump_stack lib/dump_stack.c:77 [inline]\n dump_stack+0x158/0x1e4 lib/dump_stack.c:118\n print_address_description.constprop.0+0x68/0x204 mm/kasan/report.c:387\n __kasan_report+0xe0/0x140 mm/kasan/report.c:547\n kasan_report+0x44/0xe0 mm/kasan/report.c:564\n check_memory_region_inline mm/kasan/generic.c:187 [inline]\n __asan_load4+0x94/0xd0 mm/kasan/generic.c:252\n neon_poly1305_blocks.constprop.0+0x1b4/0x250 [poly1305_neon]\n neon_poly1305_do_update+0x6c/0x15c [poly1305_neon]\n neon_poly1305_update+0x9c/0x1c4 [poly1305_neon]\n crypto_shash_update crypto/shash.c:131 [inline]\n shash_finup_unaligned+0x84/0x15c crypto/shash.c:179\n crypto_shash_finup+0x8c/0x140 crypto/shash.c:193\n shash_digest_unaligned+0xb8/0xe4 crypto/shash.c:201\n crypto_shash_digest+0xa4/0xfc crypto/shash.c:217\n crypto_shash_tfm_digest+0xb4/0x150 crypto/shash.c:229\n essiv_skcipher_setkey+0x164/0x200 [essiv]\n crypto_skcipher_setkey+0xb0/0x160 crypto/skcipher.c:612\n skcipher_setkey+0x3c/0x50 crypto/algif_skcipher.c:305\n alg_setkey+0x114/0x2a0 crypto/af_alg.c:220\n alg_setsockopt+0x19c/0x210 crypto/af_alg.c:253\n __sys_setsockopt+0x190/0x2e0 net/socket.c:2123\n __do_sys_setsockopt net/socket.c:2134 [inline]\n __se_sys_setsockopt net/socket.c:2131 [inline]\n __arm64_sys_setsockopt+0x78/0x94 net/socket.c:2131\n __invoke_syscall arch/arm64/kernel/syscall.c:36 [inline]\n invoke_syscall+0x64/0x100 arch/arm64/kernel/syscall.c:48\n el0_svc_common.constprop.0+0x220/0x230 arch/arm64/kernel/syscall.c:155\n do_el0_svc+0xb4/0xd4 arch/arm64/kernel/syscall.c:217\n el0_svc+0x24/0x3c arch/arm64/kernel/entry-common.c:353\n el0_sync_handler+0x160/0x164 arch/arm64/kernel/entry-common.c:369\n el0_sync+0x160/0x180 arch/arm64/kernel/entry.S:683\n\nThis error can be reproduced by the following code compiled as ko on a\nsystem with kasan enabled:\n\n#include \u003clinux/module.h\u003e\n#include \u003clinux/crypto.h\u003e\n#include \u003ccrypto/hash.h\u003e\n#include \u003ccrypto/poly1305.h\u003e\n\nchar test_data[] = \"\\x00\\x01\\x02\\x03\\x04\\x05\\x06\\x07\"\n                   \"\\x08\\x09\\x0a\\x0b\\x0c\\x0d\\x0e\\x0f\"\n                   \"\\x10\\x11\\x12\\x13\\x14\\x15\\x16\\x17\"\n                   \"\\x18\\x19\\x1a\\x1b\\x1c\\x1d\\x1e\";\n\nint init(void)\n{\n        struct crypto_shash *tfm = NULL;\n        char *data = NULL, *out = NULL;\n\n        tfm = crypto_alloc_shash(\"poly1305\", 0, 0);\n        data = kmalloc(POLY1305_KEY_SIZE - 1, GFP_KERNEL);\n        out = kmalloc(POLY1305_DIGEST_SIZE, GFP_KERNEL);\n        memcpy(data, test_data, POLY1305_KEY_SIZE - 1);\n        crypto_shash_tfm_digest(tfm, data, POLY1305_KEY_SIZE - 1, out);\n\n        kfree(data);\n        kfree(out);\n        return 0;\n}\n\nvoid deinit(void)\n{\n}\n\nmodule_init(init)\nmodule_exit(deinit)\nMODULE_LICENSE(\"GPL\");\n\nThe root cause of the bug sits in neon_poly1305_blocks. The logic\nneon_poly1305_blocks() performed is that if it was called with both s[]\nand r[] uninitialized, it will first try to initialize them with the\ndata from the first \"block\" that it believed to be 32 bytes in length.\nFirst 16 bytes are used as the key and the next 16 bytes for s[]. This\nwould lead to the aforementioned read out-of-bound. However, after\ncalling poly1305_init_arch(), only 16 bytes were deducted from the input\nand s[] is initialized yet again with the following 16 bytes. The second\ninitialization of s[] is certainly redundent which indicates that the\nfirst initialization should be for r[] only.\n\nThis patch fixes the issue by calling poly1305_init_arm64() instead o\n---truncated---",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "SUSE Linux Enterprise Micro 5.1:kernel-rt-5.3.18-150300.214.1.x86_64",
          "SUSE Linux Enterprise Micro 5.1:kernel-source-rt-5.3.18-150300.214.1.noarch",
          "SUSE Linux Enterprise Micro 5.2:kernel-rt-5.3.18-150300.214.1.x86_64",
          "SUSE Linux Enterprise Micro 5.2:kernel-source-rt-5.3.18-150300.214.1.noarch"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2022-50231",
          "url": "https://www.suse.com/security/cve/CVE-2022-50231"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1244853 for CVE-2022-50231",
          "url": "https://bugzilla.suse.com/1244853"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "SUSE Linux Enterprise Micro 5.1:kernel-rt-5.3.18-150300.214.1.x86_64",
            "SUSE Linux Enterprise Micro 5.1:kernel-source-rt-5.3.18-150300.214.1.noarch",
            "SUSE Linux Enterprise Micro 5.2:kernel-rt-5.3.18-150300.214.1.x86_64",
            "SUSE Linux Enterprise Micro 5.2:kernel-source-rt-5.3.18-150300.214.1.noarch"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 5.5,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
            "version": "3.1"
          },
          "products": [
            "SUSE Linux Enterprise Micro 5.1:kernel-rt-5.3.18-150300.214.1.x86_64",
            "SUSE Linux Enterprise Micro 5.1:kernel-source-rt-5.3.18-150300.214.1.noarch",
            "SUSE Linux Enterprise Micro 5.2:kernel-rt-5.3.18-150300.214.1.x86_64",
            "SUSE Linux Enterprise Micro 5.2:kernel-source-rt-5.3.18-150300.214.1.noarch"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2025-07-15T14:20:22Z",
          "details": "moderate"
        }
      ],
      "title": "CVE-2022-50231"
    },
    {
      "cve": "CVE-2023-3111",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2023-3111"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "A use after free vulnerability was found in prepare_to_relocate in fs/btrfs/relocation.c in btrfs in the Linux Kernel. This possible flaw can be triggered by calling btrfs_ioctl_balance() before calling btrfs_ioctl_defrag().",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "SUSE Linux Enterprise Micro 5.1:kernel-rt-5.3.18-150300.214.1.x86_64",
          "SUSE Linux Enterprise Micro 5.1:kernel-source-rt-5.3.18-150300.214.1.noarch",
          "SUSE Linux Enterprise Micro 5.2:kernel-rt-5.3.18-150300.214.1.x86_64",
          "SUSE Linux Enterprise Micro 5.2:kernel-source-rt-5.3.18-150300.214.1.noarch"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2023-3111",
          "url": "https://www.suse.com/security/cve/CVE-2023-3111"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1212051 for CVE-2023-3111",
          "url": "https://bugzilla.suse.com/1212051"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1220015 for CVE-2023-3111",
          "url": "https://bugzilla.suse.com/1220015"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "SUSE Linux Enterprise Micro 5.1:kernel-rt-5.3.18-150300.214.1.x86_64",
            "SUSE Linux Enterprise Micro 5.1:kernel-source-rt-5.3.18-150300.214.1.noarch",
            "SUSE Linux Enterprise Micro 5.2:kernel-rt-5.3.18-150300.214.1.x86_64",
            "SUSE Linux Enterprise Micro 5.2:kernel-source-rt-5.3.18-150300.214.1.noarch"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 6.7,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H",
            "version": "3.1"
          },
          "products": [
            "SUSE Linux Enterprise Micro 5.1:kernel-rt-5.3.18-150300.214.1.x86_64",
            "SUSE Linux Enterprise Micro 5.1:kernel-source-rt-5.3.18-150300.214.1.noarch",
            "SUSE Linux Enterprise Micro 5.2:kernel-rt-5.3.18-150300.214.1.x86_64",
            "SUSE Linux Enterprise Micro 5.2:kernel-source-rt-5.3.18-150300.214.1.noarch"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2025-07-15T14:20:22Z",
          "details": "moderate"
        }
      ],
      "title": "CVE-2023-3111"
    },
    {
      "cve": "CVE-2024-26924",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2024-26924"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "In the Linux kernel, the following vulnerability has been resolved:\n\nnetfilter: nft_set_pipapo: do not free live element\n\nPablo reports a crash with large batches of elements with a\nback-to-back add/remove pattern.  Quoting Pablo:\n\n  add_elem(\"00000000\") timeout 100 ms\n  ...\n  add_elem(\"0000000X\") timeout 100 ms\n  del_elem(\"0000000X\") \u003c---------------- delete one that was just added\n  ...\n  add_elem(\"00005000\") timeout 100 ms\n\n  1) nft_pipapo_remove() removes element 0000000X\n  Then, KASAN shows a splat.\n\nLooking at the remove function there is a chance that we will drop a\nrule that maps to a non-deactivated element.\n\nRemoval happens in two steps, first we do a lookup for key k and return the\nto-be-removed element and mark it as inactive in the next generation.\nThen, in a second step, the element gets removed from the set/map.\n\nThe _remove function does not work correctly if we have more than one\nelement that share the same key.\n\nThis can happen if we insert an element into a set when the set already\nholds an element with same key, but the element mapping to the existing\nkey has timed out or is not active in the next generation.\n\nIn such case its possible that removal will unmap the wrong element.\nIf this happens, we will leak the non-deactivated element, it becomes\nunreachable.\n\nThe element that got deactivated (and will be freed later) will\nremain reachable in the set data structure, this can result in\na crash when such an element is retrieved during lookup (stale\npointer).\n\nAdd a check that the fully matching key does in fact map to the element\nthat we have marked as inactive in the deactivation step.\nIf not, we need to continue searching.\n\nAdd a bug/warn trap at the end of the function as well, the remove\nfunction must not ever be called with an invisible/unreachable/non-existent\nelement.\n\nv2: avoid uneeded temporary variable (Stefano)",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "SUSE Linux Enterprise Micro 5.1:kernel-rt-5.3.18-150300.214.1.x86_64",
          "SUSE Linux Enterprise Micro 5.1:kernel-source-rt-5.3.18-150300.214.1.noarch",
          "SUSE Linux Enterprise Micro 5.2:kernel-rt-5.3.18-150300.214.1.x86_64",
          "SUSE Linux Enterprise Micro 5.2:kernel-source-rt-5.3.18-150300.214.1.noarch"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2024-26924",
          "url": "https://www.suse.com/security/cve/CVE-2024-26924"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1223387 for CVE-2024-26924",
          "url": "https://bugzilla.suse.com/1223387"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "SUSE Linux Enterprise Micro 5.1:kernel-rt-5.3.18-150300.214.1.x86_64",
            "SUSE Linux Enterprise Micro 5.1:kernel-source-rt-5.3.18-150300.214.1.noarch",
            "SUSE Linux Enterprise Micro 5.2:kernel-rt-5.3.18-150300.214.1.x86_64",
            "SUSE Linux Enterprise Micro 5.2:kernel-source-rt-5.3.18-150300.214.1.noarch"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 6.7,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H",
            "version": "3.1"
          },
          "products": [
            "SUSE Linux Enterprise Micro 5.1:kernel-rt-5.3.18-150300.214.1.x86_64",
            "SUSE Linux Enterprise Micro 5.1:kernel-source-rt-5.3.18-150300.214.1.noarch",
            "SUSE Linux Enterprise Micro 5.2:kernel-rt-5.3.18-150300.214.1.x86_64",
            "SUSE Linux Enterprise Micro 5.2:kernel-source-rt-5.3.18-150300.214.1.noarch"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2025-07-15T14:20:22Z",
          "details": "moderate"
        }
      ],
      "title": "CVE-2024-26924"
    },
    {
      "cve": "CVE-2024-27397",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2024-27397"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "In the Linux kernel, the following vulnerability has been resolved:\n\nnetfilter: nf_tables: use timestamp to check for set element timeout\n\nAdd a timestamp field at the beginning of the transaction, store it\nin the nftables per-netns area.\n\nUpdate set backend .insert, .deactivate and sync gc path to use the\ntimestamp, this avoids that an element expires while control plane\ntransaction is still unfinished.\n\n.lookup and .update, which are used from packet path, still use the\ncurrent time to check if the element has expired. And .get path and dump\nalso since this runs lockless under rcu read size lock. Then, there is\nasync gc which also needs to check the current time since it runs\nasynchronously from a workqueue.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "SUSE Linux Enterprise Micro 5.1:kernel-rt-5.3.18-150300.214.1.x86_64",
          "SUSE Linux Enterprise Micro 5.1:kernel-source-rt-5.3.18-150300.214.1.noarch",
          "SUSE Linux Enterprise Micro 5.2:kernel-rt-5.3.18-150300.214.1.x86_64",
          "SUSE Linux Enterprise Micro 5.2:kernel-source-rt-5.3.18-150300.214.1.noarch"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2024-27397",
          "url": "https://www.suse.com/security/cve/CVE-2024-27397"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1224095 for CVE-2024-27397",
          "url": "https://bugzilla.suse.com/1224095"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "SUSE Linux Enterprise Micro 5.1:kernel-rt-5.3.18-150300.214.1.x86_64",
            "SUSE Linux Enterprise Micro 5.1:kernel-source-rt-5.3.18-150300.214.1.noarch",
            "SUSE Linux Enterprise Micro 5.2:kernel-rt-5.3.18-150300.214.1.x86_64",
            "SUSE Linux Enterprise Micro 5.2:kernel-source-rt-5.3.18-150300.214.1.noarch"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 6.7,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H",
            "version": "3.1"
          },
          "products": [
            "SUSE Linux Enterprise Micro 5.1:kernel-rt-5.3.18-150300.214.1.x86_64",
            "SUSE Linux Enterprise Micro 5.1:kernel-source-rt-5.3.18-150300.214.1.noarch",
            "SUSE Linux Enterprise Micro 5.2:kernel-rt-5.3.18-150300.214.1.x86_64",
            "SUSE Linux Enterprise Micro 5.2:kernel-source-rt-5.3.18-150300.214.1.noarch"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2025-07-15T14:20:22Z",
          "details": "moderate"
        }
      ],
      "title": "CVE-2024-27397"
    },
    {
      "cve": "CVE-2024-36978",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2024-36978"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "In the Linux kernel, the following vulnerability has been resolved:\n\nnet: sched: sch_multiq: fix possible OOB write in multiq_tune()\n\nq-\u003ebands will be assigned to qopt-\u003ebands to execute subsequent code logic\nafter kmalloc. So the old q-\u003ebands should not be used in kmalloc.\nOtherwise, an out-of-bounds write will occur.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "SUSE Linux Enterprise Micro 5.1:kernel-rt-5.3.18-150300.214.1.x86_64",
          "SUSE Linux Enterprise Micro 5.1:kernel-source-rt-5.3.18-150300.214.1.noarch",
          "SUSE Linux Enterprise Micro 5.2:kernel-rt-5.3.18-150300.214.1.x86_64",
          "SUSE Linux Enterprise Micro 5.2:kernel-source-rt-5.3.18-150300.214.1.noarch"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2024-36978",
          "url": "https://www.suse.com/security/cve/CVE-2024-36978"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1226514 for CVE-2024-36978",
          "url": "https://bugzilla.suse.com/1226514"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1244631 for CVE-2024-36978",
          "url": "https://bugzilla.suse.com/1244631"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "SUSE Linux Enterprise Micro 5.1:kernel-rt-5.3.18-150300.214.1.x86_64",
            "SUSE Linux Enterprise Micro 5.1:kernel-source-rt-5.3.18-150300.214.1.noarch",
            "SUSE Linux Enterprise Micro 5.2:kernel-rt-5.3.18-150300.214.1.x86_64",
            "SUSE Linux Enterprise Micro 5.2:kernel-source-rt-5.3.18-150300.214.1.noarch"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 7.8,
            "baseSeverity": "HIGH",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
            "version": "3.1"
          },
          "products": [
            "SUSE Linux Enterprise Micro 5.1:kernel-rt-5.3.18-150300.214.1.x86_64",
            "SUSE Linux Enterprise Micro 5.1:kernel-source-rt-5.3.18-150300.214.1.noarch",
            "SUSE Linux Enterprise Micro 5.2:kernel-rt-5.3.18-150300.214.1.x86_64",
            "SUSE Linux Enterprise Micro 5.2:kernel-source-rt-5.3.18-150300.214.1.noarch"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2025-07-15T14:20:22Z",
          "details": "important"
        }
      ],
      "title": "CVE-2024-36978"
    },
    {
      "cve": "CVE-2024-46800",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2024-46800"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "In the Linux kernel, the following vulnerability has been resolved:\n\nsch/netem: fix use after free in netem_dequeue\n\nIf netem_dequeue() enqueues packet to inner qdisc and that qdisc\nreturns __NET_XMIT_STOLEN. The packet is dropped but\nqdisc_tree_reduce_backlog() is not called to update the parent\u0027s\nq.qlen, leading to the similar use-after-free as Commit\ne04991a48dbaf382 (\"netem: fix return value if duplicate enqueue\nfails\")\n\nCommands to trigger KASAN UaF:\n\nip link add type dummy\nip link set lo up\nip link set dummy0 up\ntc qdisc add dev lo parent root handle 1: drr\ntc filter add dev lo parent 1: basic classid 1:1\ntc class add dev lo classid 1:1 drr\ntc qdisc add dev lo parent 1:1 handle 2: netem\ntc qdisc add dev lo parent 2: handle 3: drr\ntc filter add dev lo parent 3: basic classid 3:1 action mirred egress\nredirect dev dummy0\ntc class add dev lo classid 3:1 drr\nping -c1 -W0.01 localhost # Trigger bug\ntc class del dev lo classid 1:1\ntc class add dev lo classid 1:1 drr\nping -c1 -W0.01 localhost # UaF",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "SUSE Linux Enterprise Micro 5.1:kernel-rt-5.3.18-150300.214.1.x86_64",
          "SUSE Linux Enterprise Micro 5.1:kernel-source-rt-5.3.18-150300.214.1.noarch",
          "SUSE Linux Enterprise Micro 5.2:kernel-rt-5.3.18-150300.214.1.x86_64",
          "SUSE Linux Enterprise Micro 5.2:kernel-source-rt-5.3.18-150300.214.1.noarch"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2024-46800",
          "url": "https://www.suse.com/security/cve/CVE-2024-46800"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1230827 for CVE-2024-46800",
          "url": "https://bugzilla.suse.com/1230827"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "SUSE Linux Enterprise Micro 5.1:kernel-rt-5.3.18-150300.214.1.x86_64",
            "SUSE Linux Enterprise Micro 5.1:kernel-source-rt-5.3.18-150300.214.1.noarch",
            "SUSE Linux Enterprise Micro 5.2:kernel-rt-5.3.18-150300.214.1.x86_64",
            "SUSE Linux Enterprise Micro 5.2:kernel-source-rt-5.3.18-150300.214.1.noarch"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 5.5,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
            "version": "3.1"
          },
          "products": [
            "SUSE Linux Enterprise Micro 5.1:kernel-rt-5.3.18-150300.214.1.x86_64",
            "SUSE Linux Enterprise Micro 5.1:kernel-source-rt-5.3.18-150300.214.1.noarch",
            "SUSE Linux Enterprise Micro 5.2:kernel-rt-5.3.18-150300.214.1.x86_64",
            "SUSE Linux Enterprise Micro 5.2:kernel-source-rt-5.3.18-150300.214.1.noarch"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2025-07-15T14:20:22Z",
          "details": "moderate"
        }
      ],
      "title": "CVE-2024-46800"
    },
    {
      "cve": "CVE-2024-53141",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2024-53141"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "In the Linux kernel, the following vulnerability has been resolved:\n\nnetfilter: ipset: add missing range check in bitmap_ip_uadt\n\nWhen tb[IPSET_ATTR_IP_TO] is not present but tb[IPSET_ATTR_CIDR] exists,\nthe values of ip and ip_to are slightly swapped. Therefore, the range check\nfor ip should be done later, but this part is missing and it seems that the\nvulnerability occurs.\n\nSo we should add missing range checks and remove unnecessary range checks.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "SUSE Linux Enterprise Micro 5.1:kernel-rt-5.3.18-150300.214.1.x86_64",
          "SUSE Linux Enterprise Micro 5.1:kernel-source-rt-5.3.18-150300.214.1.noarch",
          "SUSE Linux Enterprise Micro 5.2:kernel-rt-5.3.18-150300.214.1.x86_64",
          "SUSE Linux Enterprise Micro 5.2:kernel-source-rt-5.3.18-150300.214.1.noarch"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2024-53141",
          "url": "https://www.suse.com/security/cve/CVE-2024-53141"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1234381 for CVE-2024-53141",
          "url": "https://bugzilla.suse.com/1234381"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1245778 for CVE-2024-53141",
          "url": "https://bugzilla.suse.com/1245778"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "SUSE Linux Enterprise Micro 5.1:kernel-rt-5.3.18-150300.214.1.x86_64",
            "SUSE Linux Enterprise Micro 5.1:kernel-source-rt-5.3.18-150300.214.1.noarch",
            "SUSE Linux Enterprise Micro 5.2:kernel-rt-5.3.18-150300.214.1.x86_64",
            "SUSE Linux Enterprise Micro 5.2:kernel-source-rt-5.3.18-150300.214.1.noarch"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 7.8,
            "baseSeverity": "HIGH",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
            "version": "3.1"
          },
          "products": [
            "SUSE Linux Enterprise Micro 5.1:kernel-rt-5.3.18-150300.214.1.x86_64",
            "SUSE Linux Enterprise Micro 5.1:kernel-source-rt-5.3.18-150300.214.1.noarch",
            "SUSE Linux Enterprise Micro 5.2:kernel-rt-5.3.18-150300.214.1.x86_64",
            "SUSE Linux Enterprise Micro 5.2:kernel-source-rt-5.3.18-150300.214.1.noarch"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2025-07-15T14:20:22Z",
          "details": "important"
        }
      ],
      "title": "CVE-2024-53141"
    },
    {
      "cve": "CVE-2024-56770",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2024-56770"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "In the Linux kernel, the following vulnerability has been resolved:\n\nnet/sched: netem: account for backlog updates from child qdisc\n\nIn general, \u0027qlen\u0027 of any classful qdisc should keep track of the\nnumber of packets that the qdisc itself and all of its children holds.\nIn case of netem, \u0027qlen\u0027 only accounts for the packets in its internal\ntfifo. When netem is used with a child qdisc, the child qdisc can use\n\u0027qdisc_tree_reduce_backlog\u0027 to inform its parent, netem, about created\nor dropped SKBs. This function updates \u0027qlen\u0027 and the backlog statistics\nof netem, but netem does not account for changes made by a child qdisc.\n\u0027qlen\u0027 then indicates the wrong number of packets in the tfifo.\nIf a child qdisc creates new SKBs during enqueue and informs its parent\nabout this, netem\u0027s \u0027qlen\u0027 value is increased. When netem dequeues the\nnewly created SKBs from the child, the \u0027qlen\u0027 in netem is not updated.\nIf \u0027qlen\u0027 reaches the configured sch-\u003elimit, the enqueue function stops\nworking, even though the tfifo is not full.\n\nReproduce the bug:\nEnsure that the sender machine has GSO enabled. Configure netem as root\nqdisc and tbf as its child on the outgoing interface of the machine\nas follows:\n$ tc qdisc add dev \u003coif\u003e root handle 1: netem delay 100ms limit 100\n$ tc qdisc add dev \u003coif\u003e parent 1:0 tbf rate 50Mbit burst 1542 latency 50ms\n\nSend bulk TCP traffic out via this interface, e.g., by running an iPerf3\nclient on the machine. Check the qdisc statistics:\n$ tc -s qdisc show dev \u003coif\u003e\n\nStatistics after 10s of iPerf3 TCP test before the fix (note that\nnetem\u0027s backlog \u003e limit, netem stopped accepting packets):\nqdisc netem 1: root refcnt 2 limit 1000 delay 100ms\n Sent 2767766 bytes 1848 pkt (dropped 652, overlimits 0 requeues 0)\n backlog 4294528236b 1155p requeues 0\nqdisc tbf 10: parent 1:1 rate 50Mbit burst 1537b lat 50ms\n Sent 2767766 bytes 1848 pkt (dropped 327, overlimits 7601 requeues 0)\n backlog 0b 0p requeues 0\n\nStatistics after the fix:\nqdisc netem 1: root refcnt 2 limit 1000 delay 100ms\n Sent 37766372 bytes 24974 pkt (dropped 9, overlimits 0 requeues 0)\n backlog 0b 0p requeues 0\nqdisc tbf 10: parent 1:1 rate 50Mbit burst 1537b lat 50ms\n Sent 37766372 bytes 24974 pkt (dropped 327, overlimits 96017 requeues 0)\n backlog 0b 0p requeues 0\n\ntbf segments the GSO SKBs (tbf_segment) and updates the netem\u0027s \u0027qlen\u0027.\nThe interface fully stops transferring packets and \"locks\". In this case,\nthe child qdisc and tfifo are empty, but \u0027qlen\u0027 indicates the tfifo is at\nits limit and no more packets are accepted.\n\nThis patch adds a counter for the entries in the tfifo. Netem\u0027s \u0027qlen\u0027 is\nonly decreased when a packet is returned by its dequeue function, and not\nduring enqueuing into the child qdisc. External updates to \u0027qlen\u0027 are thus\naccounted for and only the behavior of the backlog statistics changes. As\nin other qdiscs, \u0027qlen\u0027 then keeps track of  how many packets are held in\nnetem and all of its children. As before, sch-\u003elimit remains as the\nmaximum number of packets in the tfifo. The same applies to netem\u0027s\nbacklog statistics.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "SUSE Linux Enterprise Micro 5.1:kernel-rt-5.3.18-150300.214.1.x86_64",
          "SUSE Linux Enterprise Micro 5.1:kernel-source-rt-5.3.18-150300.214.1.noarch",
          "SUSE Linux Enterprise Micro 5.2:kernel-rt-5.3.18-150300.214.1.x86_64",
          "SUSE Linux Enterprise Micro 5.2:kernel-source-rt-5.3.18-150300.214.1.noarch"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2024-56770",
          "url": "https://www.suse.com/security/cve/CVE-2024-56770"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1235637 for CVE-2024-56770",
          "url": "https://bugzilla.suse.com/1235637"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "SUSE Linux Enterprise Micro 5.1:kernel-rt-5.3.18-150300.214.1.x86_64",
            "SUSE Linux Enterprise Micro 5.1:kernel-source-rt-5.3.18-150300.214.1.noarch",
            "SUSE Linux Enterprise Micro 5.2:kernel-rt-5.3.18-150300.214.1.x86_64",
            "SUSE Linux Enterprise Micro 5.2:kernel-source-rt-5.3.18-150300.214.1.noarch"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 5.1,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:L/A:H",
            "version": "3.1"
          },
          "products": [
            "SUSE Linux Enterprise Micro 5.1:kernel-rt-5.3.18-150300.214.1.x86_64",
            "SUSE Linux Enterprise Micro 5.1:kernel-source-rt-5.3.18-150300.214.1.noarch",
            "SUSE Linux Enterprise Micro 5.2:kernel-rt-5.3.18-150300.214.1.x86_64",
            "SUSE Linux Enterprise Micro 5.2:kernel-source-rt-5.3.18-150300.214.1.noarch"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2025-07-15T14:20:22Z",
          "details": "moderate"
        }
      ],
      "title": "CVE-2024-56770"
    },
    {
      "cve": "CVE-2025-21700",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2025-21700"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "In the Linux kernel, the following vulnerability has been resolved:\n\nnet: sched: Disallow replacing of child qdisc from one parent to another\n\nLion Ackermann was able to create a UAF which can be abused for privilege\nescalation with the following script\n\nStep 1. create root qdisc\ntc qdisc add dev lo root handle 1:0 drr\n\nstep2. a class for packet aggregation do demonstrate uaf\ntc class add dev lo classid 1:1 drr\n\nstep3. a class for nesting\ntc class add dev lo classid 1:2 drr\n\nstep4. a class to graft qdisc to\ntc class add dev lo classid 1:3 drr\n\nstep5.\ntc qdisc add dev lo parent 1:1 handle 2:0 plug limit 1024\n\nstep6.\ntc qdisc add dev lo parent 1:2 handle 3:0 drr\n\nstep7.\ntc class add dev lo classid 3:1 drr\n\nstep 8.\ntc qdisc add dev lo parent 3:1 handle 4:0 pfifo\n\nstep 9. Display the class/qdisc layout\n\ntc class ls dev lo\n class drr 1:1 root leaf 2: quantum 64Kb\n class drr 1:2 root leaf 3: quantum 64Kb\n class drr 3:1 root leaf 4: quantum 64Kb\n\ntc qdisc ls\n qdisc drr 1: dev lo root refcnt 2\n qdisc plug 2: dev lo parent 1:1\n qdisc pfifo 4: dev lo parent 3:1 limit 1000p\n qdisc drr 3: dev lo parent 1:2\n\nstep10. trigger the bug \u003c=== prevented by this patch\ntc qdisc replace dev lo parent 1:3 handle 4:0\n\nstep 11. Redisplay again the qdiscs/classes\n\ntc class ls dev lo\n class drr 1:1 root leaf 2: quantum 64Kb\n class drr 1:2 root leaf 3: quantum 64Kb\n class drr 1:3 root leaf 4: quantum 64Kb\n class drr 3:1 root leaf 4: quantum 64Kb\n\ntc qdisc ls\n qdisc drr 1: dev lo root refcnt 2\n qdisc plug 2: dev lo parent 1:1\n qdisc pfifo 4: dev lo parent 3:1 refcnt 2 limit 1000p\n qdisc drr 3: dev lo parent 1:2\n\nObserve that a) parent for 4:0 does not change despite the replace request.\nThere can only be one parent.  b) refcount has gone up by two for 4:0 and\nc) both class 1:3 and 3:1 are pointing to it.\n\nStep 12.  send one packet to plug\necho \"\" | socat -u STDIN UDP4-DATAGRAM:127.0.0.1:8888,priority=$((0x10001))\nstep13.  send one packet to the grafted fifo\necho \"\" | socat -u STDIN UDP4-DATAGRAM:127.0.0.1:8888,priority=$((0x10003))\n\nstep14. lets trigger the uaf\ntc class delete dev lo classid 1:3\ntc class delete dev lo classid 1:1\n\nThe semantics of \"replace\" is for a del/add _on the same node_ and not\na delete from one node(3:1) and add to another node (1:3) as in step10.\nWhile we could \"fix\" with a more complex approach there could be\nconsequences to expectations so the patch takes the preventive approach of\n\"disallow such config\".\n\nJoint work with Lion Ackermann \u003cnnamrec@gmail.com\u003e",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "SUSE Linux Enterprise Micro 5.1:kernel-rt-5.3.18-150300.214.1.x86_64",
          "SUSE Linux Enterprise Micro 5.1:kernel-source-rt-5.3.18-150300.214.1.noarch",
          "SUSE Linux Enterprise Micro 5.2:kernel-rt-5.3.18-150300.214.1.x86_64",
          "SUSE Linux Enterprise Micro 5.2:kernel-source-rt-5.3.18-150300.214.1.noarch"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2025-21700",
          "url": "https://www.suse.com/security/cve/CVE-2025-21700"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1237159 for CVE-2025-21700",
          "url": "https://bugzilla.suse.com/1237159"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "SUSE Linux Enterprise Micro 5.1:kernel-rt-5.3.18-150300.214.1.x86_64",
            "SUSE Linux Enterprise Micro 5.1:kernel-source-rt-5.3.18-150300.214.1.noarch",
            "SUSE Linux Enterprise Micro 5.2:kernel-rt-5.3.18-150300.214.1.x86_64",
            "SUSE Linux Enterprise Micro 5.2:kernel-source-rt-5.3.18-150300.214.1.noarch"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 6.7,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H",
            "version": "3.1"
          },
          "products": [
            "SUSE Linux Enterprise Micro 5.1:kernel-rt-5.3.18-150300.214.1.x86_64",
            "SUSE Linux Enterprise Micro 5.1:kernel-source-rt-5.3.18-150300.214.1.noarch",
            "SUSE Linux Enterprise Micro 5.2:kernel-rt-5.3.18-150300.214.1.x86_64",
            "SUSE Linux Enterprise Micro 5.2:kernel-source-rt-5.3.18-150300.214.1.noarch"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2025-07-15T14:20:22Z",
          "details": "moderate"
        }
      ],
      "title": "CVE-2025-21700"
    },
    {
      "cve": "CVE-2025-21702",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2025-21702"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "In the Linux kernel, the following vulnerability has been resolved:\n\npfifo_tail_enqueue: Drop new packet when sch-\u003elimit == 0\n\nExpected behaviour:\nIn case we reach scheduler\u0027s limit, pfifo_tail_enqueue() will drop a\npacket in scheduler\u0027s queue and decrease scheduler\u0027s qlen by one.\nThen, pfifo_tail_enqueue() enqueue new packet and increase\nscheduler\u0027s qlen by one. Finally, pfifo_tail_enqueue() return\n`NET_XMIT_CN` status code.\n\nWeird behaviour:\nIn case we set `sch-\u003elimit == 0` and trigger pfifo_tail_enqueue() on a\nscheduler that has no packet, the \u0027drop a packet\u0027 step will do nothing.\nThis means the scheduler\u0027s qlen still has value equal 0.\nThen, we continue to enqueue new packet and increase scheduler\u0027s qlen by\none. In summary, we can leverage pfifo_tail_enqueue() to increase qlen by\none and return `NET_XMIT_CN` status code.\n\nThe problem is:\nLet\u0027s say we have two qdiscs: Qdisc_A and Qdisc_B.\n - Qdisc_A\u0027s type must have \u0027-\u003egraft()\u0027 function to create parent/child relationship.\n   Let\u0027s say Qdisc_A\u0027s type is `hfsc`. Enqueue packet to this qdisc will trigger `hfsc_enqueue`.\n - Qdisc_B\u0027s type is pfifo_head_drop. Enqueue packet to this qdisc will trigger `pfifo_tail_enqueue`.\n - Qdisc_B is configured to have `sch-\u003elimit == 0`.\n - Qdisc_A is configured to route the enqueued\u0027s packet to Qdisc_B.\n\nEnqueue packet through Qdisc_A will lead to:\n - hfsc_enqueue(Qdisc_A) -\u003e pfifo_tail_enqueue(Qdisc_B)\n - Qdisc_B-\u003eq.qlen += 1\n - pfifo_tail_enqueue() return `NET_XMIT_CN`\n - hfsc_enqueue() check for `NET_XMIT_SUCCESS` and see `NET_XMIT_CN` =\u003e hfsc_enqueue() don\u0027t increase qlen of Qdisc_A.\n\nThe whole process lead to a situation where Qdisc_A-\u003eq.qlen == 0 and Qdisc_B-\u003eq.qlen == 1.\nReplace \u0027hfsc\u0027 with other type (for example: \u0027drr\u0027) still lead to the same problem.\nThis violate the design where parent\u0027s qlen should equal to the sum of its childrens\u0027qlen.\n\nBug impact: This issue can be used for user-\u003ekernel privilege escalation when it is reachable.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "SUSE Linux Enterprise Micro 5.1:kernel-rt-5.3.18-150300.214.1.x86_64",
          "SUSE Linux Enterprise Micro 5.1:kernel-source-rt-5.3.18-150300.214.1.noarch",
          "SUSE Linux Enterprise Micro 5.2:kernel-rt-5.3.18-150300.214.1.x86_64",
          "SUSE Linux Enterprise Micro 5.2:kernel-source-rt-5.3.18-150300.214.1.noarch"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2025-21702",
          "url": "https://www.suse.com/security/cve/CVE-2025-21702"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1237312 for CVE-2025-21702",
          "url": "https://bugzilla.suse.com/1237312"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1245797 for CVE-2025-21702",
          "url": "https://bugzilla.suse.com/1245797"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "SUSE Linux Enterprise Micro 5.1:kernel-rt-5.3.18-150300.214.1.x86_64",
            "SUSE Linux Enterprise Micro 5.1:kernel-source-rt-5.3.18-150300.214.1.noarch",
            "SUSE Linux Enterprise Micro 5.2:kernel-rt-5.3.18-150300.214.1.x86_64",
            "SUSE Linux Enterprise Micro 5.2:kernel-source-rt-5.3.18-150300.214.1.noarch"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 7.8,
            "baseSeverity": "HIGH",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
            "version": "3.1"
          },
          "products": [
            "SUSE Linux Enterprise Micro 5.1:kernel-rt-5.3.18-150300.214.1.x86_64",
            "SUSE Linux Enterprise Micro 5.1:kernel-source-rt-5.3.18-150300.214.1.noarch",
            "SUSE Linux Enterprise Micro 5.2:kernel-rt-5.3.18-150300.214.1.x86_64",
            "SUSE Linux Enterprise Micro 5.2:kernel-source-rt-5.3.18-150300.214.1.noarch"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2025-07-15T14:20:22Z",
          "details": "important"
        }
      ],
      "title": "CVE-2025-21702"
    },
    {
      "cve": "CVE-2025-21703",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2025-21703"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "In the Linux kernel, the following vulnerability has been resolved:\n\nnetem: Update sch-\u003eq.qlen before qdisc_tree_reduce_backlog()\n\nqdisc_tree_reduce_backlog() notifies parent qdisc only if child\nqdisc becomes empty, therefore we need to reduce the backlog of the\nchild qdisc before calling it. Otherwise it would miss the opportunity\nto call cops-\u003eqlen_notify(), in the case of DRR, it resulted in UAF\nsince DRR uses -\u003eqlen_notify() to maintain its active list.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "SUSE Linux Enterprise Micro 5.1:kernel-rt-5.3.18-150300.214.1.x86_64",
          "SUSE Linux Enterprise Micro 5.1:kernel-source-rt-5.3.18-150300.214.1.noarch",
          "SUSE Linux Enterprise Micro 5.2:kernel-rt-5.3.18-150300.214.1.x86_64",
          "SUSE Linux Enterprise Micro 5.2:kernel-source-rt-5.3.18-150300.214.1.noarch"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2025-21703",
          "url": "https://www.suse.com/security/cve/CVE-2025-21703"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1237313 for CVE-2025-21703",
          "url": "https://bugzilla.suse.com/1237313"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1245796 for CVE-2025-21703",
          "url": "https://bugzilla.suse.com/1245796"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "SUSE Linux Enterprise Micro 5.1:kernel-rt-5.3.18-150300.214.1.x86_64",
            "SUSE Linux Enterprise Micro 5.1:kernel-source-rt-5.3.18-150300.214.1.noarch",
            "SUSE Linux Enterprise Micro 5.2:kernel-rt-5.3.18-150300.214.1.x86_64",
            "SUSE Linux Enterprise Micro 5.2:kernel-source-rt-5.3.18-150300.214.1.noarch"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 7.8,
            "baseSeverity": "HIGH",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
            "version": "3.1"
          },
          "products": [
            "SUSE Linux Enterprise Micro 5.1:kernel-rt-5.3.18-150300.214.1.x86_64",
            "SUSE Linux Enterprise Micro 5.1:kernel-source-rt-5.3.18-150300.214.1.noarch",
            "SUSE Linux Enterprise Micro 5.2:kernel-rt-5.3.18-150300.214.1.x86_64",
            "SUSE Linux Enterprise Micro 5.2:kernel-source-rt-5.3.18-150300.214.1.noarch"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2025-07-15T14:20:22Z",
          "details": "important"
        }
      ],
      "title": "CVE-2025-21703"
    },
    {
      "cve": "CVE-2025-37752",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2025-37752"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "In the Linux kernel, the following vulnerability has been resolved:\n\nnet_sched: sch_sfq: move the limit validation\n\nIt is not sufficient to directly validate the limit on the data that\nthe user passes as it can be updated based on how the other parameters\nare changed.\n\nMove the check at the end of the configuration update process to also\ncatch scenarios where the limit is indirectly updated, for example\nwith the following configurations:\n\ntc qdisc add dev dummy0 handle 1: root sfq limit 2 flows 1 depth 1\ntc qdisc add dev dummy0 handle 1: root sfq limit 2 flows 1 divisor 1\n\nThis fixes the following syzkaller reported crash:\n\n------------[ cut here ]------------\nUBSAN: array-index-out-of-bounds in net/sched/sch_sfq.c:203:6\nindex 65535 is out of range for type \u0027struct sfq_head[128]\u0027\nCPU: 1 UID: 0 PID: 3037 Comm: syz.2.16 Not tainted 6.14.0-rc2-syzkaller #0\nHardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 12/27/2024\nCall Trace:\n \u003cTASK\u003e\n __dump_stack lib/dump_stack.c:94 [inline]\n dump_stack_lvl+0x201/0x300 lib/dump_stack.c:120\n ubsan_epilogue lib/ubsan.c:231 [inline]\n __ubsan_handle_out_of_bounds+0xf5/0x120 lib/ubsan.c:429\n sfq_link net/sched/sch_sfq.c:203 [inline]\n sfq_dec+0x53c/0x610 net/sched/sch_sfq.c:231\n sfq_dequeue+0x34e/0x8c0 net/sched/sch_sfq.c:493\n sfq_reset+0x17/0x60 net/sched/sch_sfq.c:518\n qdisc_reset+0x12e/0x600 net/sched/sch_generic.c:1035\n tbf_reset+0x41/0x110 net/sched/sch_tbf.c:339\n qdisc_reset+0x12e/0x600 net/sched/sch_generic.c:1035\n dev_reset_queue+0x100/0x1b0 net/sched/sch_generic.c:1311\n netdev_for_each_tx_queue include/linux/netdevice.h:2590 [inline]\n dev_deactivate_many+0x7e5/0xe70 net/sched/sch_generic.c:1375",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "SUSE Linux Enterprise Micro 5.1:kernel-rt-5.3.18-150300.214.1.x86_64",
          "SUSE Linux Enterprise Micro 5.1:kernel-source-rt-5.3.18-150300.214.1.noarch",
          "SUSE Linux Enterprise Micro 5.2:kernel-rt-5.3.18-150300.214.1.x86_64",
          "SUSE Linux Enterprise Micro 5.2:kernel-source-rt-5.3.18-150300.214.1.noarch"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2025-37752",
          "url": "https://www.suse.com/security/cve/CVE-2025-37752"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1242504 for CVE-2025-37752",
          "url": "https://bugzilla.suse.com/1242504"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1245776 for CVE-2025-37752",
          "url": "https://bugzilla.suse.com/1245776"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "SUSE Linux Enterprise Micro 5.1:kernel-rt-5.3.18-150300.214.1.x86_64",
            "SUSE Linux Enterprise Micro 5.1:kernel-source-rt-5.3.18-150300.214.1.noarch",
            "SUSE Linux Enterprise Micro 5.2:kernel-rt-5.3.18-150300.214.1.x86_64",
            "SUSE Linux Enterprise Micro 5.2:kernel-source-rt-5.3.18-150300.214.1.noarch"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 7,
            "baseSeverity": "HIGH",
            "vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H",
            "version": "3.1"
          },
          "products": [
            "SUSE Linux Enterprise Micro 5.1:kernel-rt-5.3.18-150300.214.1.x86_64",
            "SUSE Linux Enterprise Micro 5.1:kernel-source-rt-5.3.18-150300.214.1.noarch",
            "SUSE Linux Enterprise Micro 5.2:kernel-rt-5.3.18-150300.214.1.x86_64",
            "SUSE Linux Enterprise Micro 5.2:kernel-source-rt-5.3.18-150300.214.1.noarch"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2025-07-15T14:20:22Z",
          "details": "moderate"
        }
      ],
      "title": "CVE-2025-37752"
    },
    {
      "cve": "CVE-2025-37798",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2025-37798"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "In the Linux kernel, the following vulnerability has been resolved:\n\ncodel: remove sch-\u003eq.qlen check before qdisc_tree_reduce_backlog()\n\nAfter making all -\u003eqlen_notify() callbacks idempotent, now it is safe to\nremove the check of qlen!=0 from both fq_codel_dequeue() and\ncodel_qdisc_dequeue().",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "SUSE Linux Enterprise Micro 5.1:kernel-rt-5.3.18-150300.214.1.x86_64",
          "SUSE Linux Enterprise Micro 5.1:kernel-source-rt-5.3.18-150300.214.1.noarch",
          "SUSE Linux Enterprise Micro 5.2:kernel-rt-5.3.18-150300.214.1.x86_64",
          "SUSE Linux Enterprise Micro 5.2:kernel-source-rt-5.3.18-150300.214.1.noarch"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2025-37798",
          "url": "https://www.suse.com/security/cve/CVE-2025-37798"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1242414 for CVE-2025-37798",
          "url": "https://bugzilla.suse.com/1242414"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1242417 for CVE-2025-37798",
          "url": "https://bugzilla.suse.com/1242417"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "SUSE Linux Enterprise Micro 5.1:kernel-rt-5.3.18-150300.214.1.x86_64",
            "SUSE Linux Enterprise Micro 5.1:kernel-source-rt-5.3.18-150300.214.1.noarch",
            "SUSE Linux Enterprise Micro 5.2:kernel-rt-5.3.18-150300.214.1.x86_64",
            "SUSE Linux Enterprise Micro 5.2:kernel-source-rt-5.3.18-150300.214.1.noarch"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 7.8,
            "baseSeverity": "HIGH",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
            "version": "3.1"
          },
          "products": [
            "SUSE Linux Enterprise Micro 5.1:kernel-rt-5.3.18-150300.214.1.x86_64",
            "SUSE Linux Enterprise Micro 5.1:kernel-source-rt-5.3.18-150300.214.1.noarch",
            "SUSE Linux Enterprise Micro 5.2:kernel-rt-5.3.18-150300.214.1.x86_64",
            "SUSE Linux Enterprise Micro 5.2:kernel-source-rt-5.3.18-150300.214.1.noarch"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2025-07-15T14:20:22Z",
          "details": "important"
        }
      ],
      "title": "CVE-2025-37798"
    },
    {
      "cve": "CVE-2025-37823",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2025-37823"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "In the Linux kernel, the following vulnerability has been resolved:\n\nnet_sched: hfsc: Fix a potential UAF in hfsc_dequeue() too\n\nSimilarly to the previous patch, we need to safe guard hfsc_dequeue()\ntoo. But for this one, we don\u0027t have a reliable reproducer.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "SUSE Linux Enterprise Micro 5.1:kernel-rt-5.3.18-150300.214.1.x86_64",
          "SUSE Linux Enterprise Micro 5.1:kernel-source-rt-5.3.18-150300.214.1.noarch",
          "SUSE Linux Enterprise Micro 5.2:kernel-rt-5.3.18-150300.214.1.x86_64",
          "SUSE Linux Enterprise Micro 5.2:kernel-source-rt-5.3.18-150300.214.1.noarch"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2025-37823",
          "url": "https://www.suse.com/security/cve/CVE-2025-37823"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1242924 for CVE-2025-37823",
          "url": "https://bugzilla.suse.com/1242924"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "SUSE Linux Enterprise Micro 5.1:kernel-rt-5.3.18-150300.214.1.x86_64",
            "SUSE Linux Enterprise Micro 5.1:kernel-source-rt-5.3.18-150300.214.1.noarch",
            "SUSE Linux Enterprise Micro 5.2:kernel-rt-5.3.18-150300.214.1.x86_64",
            "SUSE Linux Enterprise Micro 5.2:kernel-source-rt-5.3.18-150300.214.1.noarch"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 5.5,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
            "version": "3.1"
          },
          "products": [
            "SUSE Linux Enterprise Micro 5.1:kernel-rt-5.3.18-150300.214.1.x86_64",
            "SUSE Linux Enterprise Micro 5.1:kernel-source-rt-5.3.18-150300.214.1.noarch",
            "SUSE Linux Enterprise Micro 5.2:kernel-rt-5.3.18-150300.214.1.x86_64",
            "SUSE Linux Enterprise Micro 5.2:kernel-source-rt-5.3.18-150300.214.1.noarch"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2025-07-15T14:20:22Z",
          "details": "moderate"
        }
      ],
      "title": "CVE-2025-37823"
    },
    {
      "cve": "CVE-2025-37890",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2025-37890"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "In the Linux kernel, the following vulnerability has been resolved:\n\nnet_sched: hfsc: Fix a UAF vulnerability in class with netem as child qdisc\n\nAs described in Gerrard\u0027s report [1], we have a UAF case when an hfsc class\nhas a netem child qdisc. The crux of the issue is that hfsc is assuming\nthat checking for cl-\u003eqdisc-\u003eq.qlen == 0 guarantees that it hasn\u0027t inserted\nthe class in the vttree or eltree (which is not true for the netem\nduplicate case).\n\nThis patch checks the n_active class variable to make sure that the code\nwon\u0027t insert the class in the vttree or eltree twice, catering for the\nreentrant case.\n\n[1] https://lore.kernel.org/netdev/CAHcdcOm+03OD2j6R0=YHKqmy=VgJ8xEOKuP6c7mSgnp-TEJJbw@mail.gmail.com/",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "SUSE Linux Enterprise Micro 5.1:kernel-rt-5.3.18-150300.214.1.x86_64",
          "SUSE Linux Enterprise Micro 5.1:kernel-source-rt-5.3.18-150300.214.1.noarch",
          "SUSE Linux Enterprise Micro 5.2:kernel-rt-5.3.18-150300.214.1.x86_64",
          "SUSE Linux Enterprise Micro 5.2:kernel-source-rt-5.3.18-150300.214.1.noarch"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2025-37890",
          "url": "https://www.suse.com/security/cve/CVE-2025-37890"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1243330 for CVE-2025-37890",
          "url": "https://bugzilla.suse.com/1243330"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1245791 for CVE-2025-37890",
          "url": "https://bugzilla.suse.com/1245791"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "SUSE Linux Enterprise Micro 5.1:kernel-rt-5.3.18-150300.214.1.x86_64",
            "SUSE Linux Enterprise Micro 5.1:kernel-source-rt-5.3.18-150300.214.1.noarch",
            "SUSE Linux Enterprise Micro 5.2:kernel-rt-5.3.18-150300.214.1.x86_64",
            "SUSE Linux Enterprise Micro 5.2:kernel-source-rt-5.3.18-150300.214.1.noarch"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 7,
            "baseSeverity": "HIGH",
            "vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H",
            "version": "3.1"
          },
          "products": [
            "SUSE Linux Enterprise Micro 5.1:kernel-rt-5.3.18-150300.214.1.x86_64",
            "SUSE Linux Enterprise Micro 5.1:kernel-source-rt-5.3.18-150300.214.1.noarch",
            "SUSE Linux Enterprise Micro 5.2:kernel-rt-5.3.18-150300.214.1.x86_64",
            "SUSE Linux Enterprise Micro 5.2:kernel-source-rt-5.3.18-150300.214.1.noarch"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2025-07-15T14:20:22Z",
          "details": "moderate"
        }
      ],
      "title": "CVE-2025-37890"
    },
    {
      "cve": "CVE-2025-37932",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2025-37932"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "In the Linux kernel, the following vulnerability has been resolved:\n\nsch_htb: make htb_qlen_notify() idempotent\n\nhtb_qlen_notify() always deactivates the HTB class and in fact could\ntrigger a warning if it is already deactivated. Therefore, it is not\nidempotent and not friendly to its callers, like fq_codel_dequeue().\n\nLet\u0027s make it idempotent to ease qdisc_tree_reduce_backlog() callers\u0027\nlife.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "SUSE Linux Enterprise Micro 5.1:kernel-rt-5.3.18-150300.214.1.x86_64",
          "SUSE Linux Enterprise Micro 5.1:kernel-source-rt-5.3.18-150300.214.1.noarch",
          "SUSE Linux Enterprise Micro 5.2:kernel-rt-5.3.18-150300.214.1.x86_64",
          "SUSE Linux Enterprise Micro 5.2:kernel-source-rt-5.3.18-150300.214.1.noarch"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2025-37932",
          "url": "https://www.suse.com/security/cve/CVE-2025-37932"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1243627 for CVE-2025-37932",
          "url": "https://bugzilla.suse.com/1243627"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "SUSE Linux Enterprise Micro 5.1:kernel-rt-5.3.18-150300.214.1.x86_64",
            "SUSE Linux Enterprise Micro 5.1:kernel-source-rt-5.3.18-150300.214.1.noarch",
            "SUSE Linux Enterprise Micro 5.2:kernel-rt-5.3.18-150300.214.1.x86_64",
            "SUSE Linux Enterprise Micro 5.2:kernel-source-rt-5.3.18-150300.214.1.noarch"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 0,
            "baseSeverity": "NONE",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:N",
            "version": "3.1"
          },
          "products": [
            "SUSE Linux Enterprise Micro 5.1:kernel-rt-5.3.18-150300.214.1.x86_64",
            "SUSE Linux Enterprise Micro 5.1:kernel-source-rt-5.3.18-150300.214.1.noarch",
            "SUSE Linux Enterprise Micro 5.2:kernel-rt-5.3.18-150300.214.1.x86_64",
            "SUSE Linux Enterprise Micro 5.2:kernel-source-rt-5.3.18-150300.214.1.noarch"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2025-07-15T14:20:22Z",
          "details": "low"
        }
      ],
      "title": "CVE-2025-37932"
    },
    {
      "cve": "CVE-2025-37953",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2025-37953"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "In the Linux kernel, the following vulnerability has been resolved:\n\nsch_htb: make htb_deactivate() idempotent\n\nAlan reported a NULL pointer dereference in htb_next_rb_node()\nafter we made htb_qlen_notify() idempotent.\n\nIt turns out in the following case it introduced some regression:\n\nhtb_dequeue_tree():\n  |-\u003e fq_codel_dequeue()\n    |-\u003e qdisc_tree_reduce_backlog()\n      |-\u003e htb_qlen_notify()\n        |-\u003e htb_deactivate()\n  |-\u003e htb_next_rb_node()\n  |-\u003e htb_deactivate()\n\nFor htb_next_rb_node(), after calling the 1st htb_deactivate(), the\nclprio[prio]-\u003eptr could be already set to  NULL, which means\nhtb_next_rb_node() is vulnerable here.\n\nFor htb_deactivate(), although we checked qlen before calling it, in\ncase of qlen==0 after qdisc_tree_reduce_backlog(), we may call it again\nwhich triggers the warning inside.\n\nTo fix the issues here, we need to:\n\n1) Make htb_deactivate() idempotent, that is, simply return if we\n   already call it before.\n2) Make htb_next_rb_node() safe against ptr==NULL.\n\nMany thanks to Alan for testing and for the reproducer.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "SUSE Linux Enterprise Micro 5.1:kernel-rt-5.3.18-150300.214.1.x86_64",
          "SUSE Linux Enterprise Micro 5.1:kernel-source-rt-5.3.18-150300.214.1.noarch",
          "SUSE Linux Enterprise Micro 5.2:kernel-rt-5.3.18-150300.214.1.x86_64",
          "SUSE Linux Enterprise Micro 5.2:kernel-source-rt-5.3.18-150300.214.1.noarch"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2025-37953",
          "url": "https://www.suse.com/security/cve/CVE-2025-37953"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1243543 for CVE-2025-37953",
          "url": "https://bugzilla.suse.com/1243543"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "SUSE Linux Enterprise Micro 5.1:kernel-rt-5.3.18-150300.214.1.x86_64",
            "SUSE Linux Enterprise Micro 5.1:kernel-source-rt-5.3.18-150300.214.1.noarch",
            "SUSE Linux Enterprise Micro 5.2:kernel-rt-5.3.18-150300.214.1.x86_64",
            "SUSE Linux Enterprise Micro 5.2:kernel-source-rt-5.3.18-150300.214.1.noarch"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 5.5,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
            "version": "3.1"
          },
          "products": [
            "SUSE Linux Enterprise Micro 5.1:kernel-rt-5.3.18-150300.214.1.x86_64",
            "SUSE Linux Enterprise Micro 5.1:kernel-source-rt-5.3.18-150300.214.1.noarch",
            "SUSE Linux Enterprise Micro 5.2:kernel-rt-5.3.18-150300.214.1.x86_64",
            "SUSE Linux Enterprise Micro 5.2:kernel-source-rt-5.3.18-150300.214.1.noarch"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2025-07-15T14:20:22Z",
          "details": "moderate"
        }
      ],
      "title": "CVE-2025-37953"
    },
    {
      "cve": "CVE-2025-37997",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2025-37997"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "In the Linux kernel, the following vulnerability has been resolved:\n\nnetfilter: ipset: fix region locking in hash types\n\nRegion locking introduced in v5.6-rc4 contained three macros to handle\nthe region locks: ahash_bucket_start(), ahash_bucket_end() which gave\nback the start and end hash bucket values belonging to a given region\nlock and ahash_region() which should give back the region lock belonging\nto a given hash bucket. The latter was incorrect which can lead to a\nrace condition between the garbage collector and adding new elements\nwhen a hash type of set is defined with timeouts.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "SUSE Linux Enterprise Micro 5.1:kernel-rt-5.3.18-150300.214.1.x86_64",
          "SUSE Linux Enterprise Micro 5.1:kernel-source-rt-5.3.18-150300.214.1.noarch",
          "SUSE Linux Enterprise Micro 5.2:kernel-rt-5.3.18-150300.214.1.x86_64",
          "SUSE Linux Enterprise Micro 5.2:kernel-source-rt-5.3.18-150300.214.1.noarch"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2025-37997",
          "url": "https://www.suse.com/security/cve/CVE-2025-37997"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1243832 for CVE-2025-37997",
          "url": "https://bugzilla.suse.com/1243832"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1245774 for CVE-2025-37997",
          "url": "https://bugzilla.suse.com/1245774"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "SUSE Linux Enterprise Micro 5.1:kernel-rt-5.3.18-150300.214.1.x86_64",
            "SUSE Linux Enterprise Micro 5.1:kernel-source-rt-5.3.18-150300.214.1.noarch",
            "SUSE Linux Enterprise Micro 5.2:kernel-rt-5.3.18-150300.214.1.x86_64",
            "SUSE Linux Enterprise Micro 5.2:kernel-source-rt-5.3.18-150300.214.1.noarch"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 7,
            "baseSeverity": "HIGH",
            "vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H",
            "version": "3.1"
          },
          "products": [
            "SUSE Linux Enterprise Micro 5.1:kernel-rt-5.3.18-150300.214.1.x86_64",
            "SUSE Linux Enterprise Micro 5.1:kernel-source-rt-5.3.18-150300.214.1.noarch",
            "SUSE Linux Enterprise Micro 5.2:kernel-rt-5.3.18-150300.214.1.x86_64",
            "SUSE Linux Enterprise Micro 5.2:kernel-source-rt-5.3.18-150300.214.1.noarch"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2025-07-15T14:20:22Z",
          "details": "moderate"
        }
      ],
      "title": "CVE-2025-37997"
    },
    {
      "cve": "CVE-2025-38000",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2025-38000"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "In the Linux kernel, the following vulnerability has been resolved:\n\nsch_hfsc: Fix qlen accounting bug when using peek in hfsc_enqueue()\n\nWhen enqueuing the first packet to an HFSC class, hfsc_enqueue() calls the\nchild qdisc\u0027s peek() operation before incrementing sch-\u003eq.qlen and\nsch-\u003eqstats.backlog. If the child qdisc uses qdisc_peek_dequeued(), this may\ntrigger an immediate dequeue and potential packet drop. In such cases,\nqdisc_tree_reduce_backlog() is called, but the HFSC qdisc\u0027s qlen and backlog\nhave not yet been updated, leading to inconsistent queue accounting. This\ncan leave an empty HFSC class in the active list, causing further\nconsequences like use-after-free.\n\nThis patch fixes the bug by moving the increment of sch-\u003eq.qlen and\nsch-\u003eqstats.backlog before the call to the child qdisc\u0027s peek() operation.\nThis ensures that queue length and backlog are always accurate when packet\ndrops or dequeues are triggered during the peek.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "SUSE Linux Enterprise Micro 5.1:kernel-rt-5.3.18-150300.214.1.x86_64",
          "SUSE Linux Enterprise Micro 5.1:kernel-source-rt-5.3.18-150300.214.1.noarch",
          "SUSE Linux Enterprise Micro 5.2:kernel-rt-5.3.18-150300.214.1.x86_64",
          "SUSE Linux Enterprise Micro 5.2:kernel-source-rt-5.3.18-150300.214.1.noarch"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2025-38000",
          "url": "https://www.suse.com/security/cve/CVE-2025-38000"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1244277 for CVE-2025-38000",
          "url": "https://bugzilla.suse.com/1244277"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1245775 for CVE-2025-38000",
          "url": "https://bugzilla.suse.com/1245775"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "SUSE Linux Enterprise Micro 5.1:kernel-rt-5.3.18-150300.214.1.x86_64",
            "SUSE Linux Enterprise Micro 5.1:kernel-source-rt-5.3.18-150300.214.1.noarch",
            "SUSE Linux Enterprise Micro 5.2:kernel-rt-5.3.18-150300.214.1.x86_64",
            "SUSE Linux Enterprise Micro 5.2:kernel-source-rt-5.3.18-150300.214.1.noarch"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 7,
            "baseSeverity": "HIGH",
            "vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H",
            "version": "3.1"
          },
          "products": [
            "SUSE Linux Enterprise Micro 5.1:kernel-rt-5.3.18-150300.214.1.x86_64",
            "SUSE Linux Enterprise Micro 5.1:kernel-source-rt-5.3.18-150300.214.1.noarch",
            "SUSE Linux Enterprise Micro 5.2:kernel-rt-5.3.18-150300.214.1.x86_64",
            "SUSE Linux Enterprise Micro 5.2:kernel-source-rt-5.3.18-150300.214.1.noarch"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2025-07-15T14:20:22Z",
          "details": "important"
        }
      ],
      "title": "CVE-2025-38000"
    },
    {
      "cve": "CVE-2025-38001",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2025-38001"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "In the Linux kernel, the following vulnerability has been resolved:\n\nnet_sched: hfsc: Address reentrant enqueue adding class to eltree twice\n\nSavino says:\n    \"We are writing to report that this recent patch\n    (141d34391abbb315d68556b7c67ad97885407547) [1]\n    can be bypassed, and a UAF can still occur when HFSC is utilized with\n    NETEM.\n\n    The patch only checks the cl-\u003ecl_nactive field to determine whether\n    it is the first insertion or not [2], but this field is only\n    incremented by init_vf [3].\n\n    By using HFSC_RSC (which uses init_ed) [4], it is possible to bypass the\n    check and insert the class twice in the eltree.\n    Under normal conditions, this would lead to an infinite loop in\n    hfsc_dequeue for the reasons we already explained in this report [5].\n\n    However, if TBF is added as root qdisc and it is configured with a\n    very low rate,\n    it can be utilized to prevent packets from being dequeued.\n    This behavior can be exploited to perform subsequent insertions in the\n    HFSC eltree and cause a UAF.\"\n\nTo fix both the UAF and the infinite loop, with netem as an hfsc child,\ncheck explicitly in hfsc_enqueue whether the class is already in the eltree\nwhenever the HFSC_RSC flag is set.\n\n[1] https://web.git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=141d34391abbb315d68556b7c67ad97885407547\n[2] https://elixir.bootlin.com/linux/v6.15-rc5/source/net/sched/sch_hfsc.c#L1572\n[3] https://elixir.bootlin.com/linux/v6.15-rc5/source/net/sched/sch_hfsc.c#L677\n[4] https://elixir.bootlin.com/linux/v6.15-rc5/source/net/sched/sch_hfsc.c#L1574\n[5] https://lore.kernel.org/netdev/8DuRWwfqjoRDLDmBMlIfbrsZg9Gx50DHJc1ilxsEBNe2D6NMoigR_eIRIG0LOjMc3r10nUUZtArXx4oZBIdUfZQrwjcQhdinnMis_0G7VEk=@willsroot.io/T/#u",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "SUSE Linux Enterprise Micro 5.1:kernel-rt-5.3.18-150300.214.1.x86_64",
          "SUSE Linux Enterprise Micro 5.1:kernel-source-rt-5.3.18-150300.214.1.noarch",
          "SUSE Linux Enterprise Micro 5.2:kernel-rt-5.3.18-150300.214.1.x86_64",
          "SUSE Linux Enterprise Micro 5.2:kernel-source-rt-5.3.18-150300.214.1.noarch"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2025-38001",
          "url": "https://www.suse.com/security/cve/CVE-2025-38001"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1244234 for CVE-2025-38001",
          "url": "https://bugzilla.suse.com/1244234"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1244235 for CVE-2025-38001",
          "url": "https://bugzilla.suse.com/1244235"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "SUSE Linux Enterprise Micro 5.1:kernel-rt-5.3.18-150300.214.1.x86_64",
            "SUSE Linux Enterprise Micro 5.1:kernel-source-rt-5.3.18-150300.214.1.noarch",
            "SUSE Linux Enterprise Micro 5.2:kernel-rt-5.3.18-150300.214.1.x86_64",
            "SUSE Linux Enterprise Micro 5.2:kernel-source-rt-5.3.18-150300.214.1.noarch"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 7.8,
            "baseSeverity": "HIGH",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
            "version": "3.1"
          },
          "products": [
            "SUSE Linux Enterprise Micro 5.1:kernel-rt-5.3.18-150300.214.1.x86_64",
            "SUSE Linux Enterprise Micro 5.1:kernel-source-rt-5.3.18-150300.214.1.noarch",
            "SUSE Linux Enterprise Micro 5.2:kernel-rt-5.3.18-150300.214.1.x86_64",
            "SUSE Linux Enterprise Micro 5.2:kernel-source-rt-5.3.18-150300.214.1.noarch"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2025-07-15T14:20:22Z",
          "details": "important"
        }
      ],
      "title": "CVE-2025-38001"
    },
    {
      "cve": "CVE-2025-38083",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2025-38083"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "In the Linux kernel, the following vulnerability has been resolved:\n\nnet_sched: prio: fix a race in prio_tune()\n\nGerrard Tai reported a race condition in PRIO, whenever SFQ perturb timer\nfires at the wrong time.\n\nThe race is as follows:\n\nCPU 0                                 CPU 1\n[1]: lock root\n[2]: qdisc_tree_flush_backlog()\n[3]: unlock root\n |\n |                                    [5]: lock root\n |                                    [6]: rehash\n |                                    [7]: qdisc_tree_reduce_backlog()\n |\n[4]: qdisc_put()\n\nThis can be abused to underflow a parent\u0027s qlen.\n\nCalling qdisc_purge_queue() instead of qdisc_tree_flush_backlog()\nshould fix the race, because all packets will be purged from the qdisc\nbefore releasing the lock.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "SUSE Linux Enterprise Micro 5.1:kernel-rt-5.3.18-150300.214.1.x86_64",
          "SUSE Linux Enterprise Micro 5.1:kernel-source-rt-5.3.18-150300.214.1.noarch",
          "SUSE Linux Enterprise Micro 5.2:kernel-rt-5.3.18-150300.214.1.x86_64",
          "SUSE Linux Enterprise Micro 5.2:kernel-source-rt-5.3.18-150300.214.1.noarch"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2025-38083",
          "url": "https://www.suse.com/security/cve/CVE-2025-38083"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1245183 for CVE-2025-38083",
          "url": "https://bugzilla.suse.com/1245183"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1245350 for CVE-2025-38083",
          "url": "https://bugzilla.suse.com/1245350"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "SUSE Linux Enterprise Micro 5.1:kernel-rt-5.3.18-150300.214.1.x86_64",
            "SUSE Linux Enterprise Micro 5.1:kernel-source-rt-5.3.18-150300.214.1.noarch",
            "SUSE Linux Enterprise Micro 5.2:kernel-rt-5.3.18-150300.214.1.x86_64",
            "SUSE Linux Enterprise Micro 5.2:kernel-source-rt-5.3.18-150300.214.1.noarch"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 7.8,
            "baseSeverity": "HIGH",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
            "version": "3.1"
          },
          "products": [
            "SUSE Linux Enterprise Micro 5.1:kernel-rt-5.3.18-150300.214.1.x86_64",
            "SUSE Linux Enterprise Micro 5.1:kernel-source-rt-5.3.18-150300.214.1.noarch",
            "SUSE Linux Enterprise Micro 5.2:kernel-rt-5.3.18-150300.214.1.x86_64",
            "SUSE Linux Enterprise Micro 5.2:kernel-source-rt-5.3.18-150300.214.1.noarch"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2025-07-15T14:20:22Z",
          "details": "important"
        }
      ],
      "title": "CVE-2025-38083"
    }
  ]
}
  suse-su-2022:4617-1
Vulnerability from csaf_suse
Published
2022-12-23 10:39
    Modified
2022-12-23 10:39
    Summary
Security update for the Linux Kernel
    Notes
Title of the patch
Security update for the Linux Kernel
    Description of the patch
The SUSE Linux Enterprise 15 SP4 RT kernel was updated to receive various security and bugfixes.
The following security bugs were fixed:
- CVE-2022-4378: Fixed stack overflow in __do_proc_dointvec (bsc#1206207).
- CVE-2022-42328: Guests could trigger denial of service via the netback driver (bsc#1206114).
- CVE-2022-42329: Guests could trigger denial of service via the netback driver (bsc#1206113).
- CVE-2022-3643: Guests could trigger NIC interface reset/abort/crash via netback driver (bsc#1206113).
- CVE-2022-3633: Fixed a memory leak in j1939_session_destroy of the file net/can/j1939/transport.c (bsc#1204650).
- CVE-2022-3114: Fixed a denial of service in imx_register_uart_clocks() in drivers/clk/imx/clk.c (bsc#1206391).
- CVE-2022-3619: Fixed a memory leak in l2cap_recv_acldata of the file net/bluetooth/l2cap_core.c (bsc#1204569).
- CVE-2022-3635: Fixed a use-after-free in the tst_timer() of the file drivers/atm/idt77252.c (bsc#1204631).
- CVE-2022-41850: Fixed a race condition in roccat_report_event() in drivers/hid/hid-roccat.c (bsc#1203960).
- CVE-2022-45934: Fixed a integer wraparound via L2CAP_CONF_REQ packets in l2cap_config_req in net/bluetooth/l2cap_core.c (bsc#1205796).
- CVE-2022-3567: Fixed a to race condition in inet6_stream_ops()/inet6_dgram_ops() (bsc#1204414).
- CVE-2022-41858: Fixed a denial of service in sl_tx_timeout() in drivers/net/slip (bsc#1205671).
- CVE-2022-43945: Fixed a buffer overflow in the NFSD implementation (bsc#1205128).
- CVE-2022-4095: Fixed a use-after-free in rtl8712 driver (bsc#1205514).
- CVE-2022-3903: Fixed a denial of service with the Infrared Transceiver USB driver (bsc#1205220).
- CVE-2022-42896: Fixed a use-after-free vulnerability in the net/bluetooth/l2cap_core.c's l2cap_connect() and l2cap_le_connect_req() which may have allowed code execution and leaking kernel memory (respectively) remotely via Bluetooth (bsc#1205709).
- CVE-2022-42895: Fixed an information leak in the net/bluetooth/l2cap_core.c's l2cap_parse_conf_req() which can be used to leak kernel pointers remotely (bsc#1205705).
- CVE-2022-3424: Fixed use-after-free in gru_set_context_option(), gru_fault() and gru_handle_user_call_os() that could lead to kernel panic (bsc#1204166).
- CVE-2022-3628: Fixed potential buffer overflow in brcmf_fweh_event_worker() in wifi/brcmfmac (bsc#1204868).
- CVE-2022-2964: Fixed memory corruption issues in ax88179_178a devices (bsc#1202686).
- CVE-2021-4037: Fixed function logic vulnerability that allowed local users to create files for the XFS file-system with an unintended group ownership and with group execution and SGID permission bits set (bsc#1198702).
- CVE-2022-43750: Fixed vulnerability in usbmon that allowed a user-space client to corrupt the monitor's internal memory (bsc#1204653).
- CVE-2022-3542: Fixed memory leak in bnx2x_tpa_stop() in drivers/net/ethernet/broadcom/bnx2x/bnx2x_cmn.c (bsc#1204402).
- CVE-2022-3629: Fixed memory leak in vsock_connect() in net/vmw_vsock/af_vsock.c (bsc#1204635).
- CVE-2022-3646: Fixed memory leak in nilfs_attach_log_writer() in fs/nilfs2/segment.c (bsc#1204646).
- CVE-2022-3649: Fixed use-after-free in nilfs_new_inode() in fs/nilfs2/inode.c (bsc#1204647).
- CVE-2022-3621: Fixed null pointer dereference in nilfs_bmap_lookup_at_level() in fs/nilfs2/inode.c (bsc#1204574).
- CVE-2022-3594: Fixed excessive data logging in intr_callback() in drivers/net/usb/r8152.c (bsc#1204479).
- CVE-2022-3586: Fixed use-after-free in socket buffer (SKB) that could allow a local unprivileged user to cause a denial of service (bsc#1204439).
- CVE-2022-3565: Fixed use-after-free in del_timer() in drivers/isdn/mISDN/l1oip_core.c (bsc#1204431).
- CVE-2022-3524: Fixed memory leak in ipv6_renew_options() in the IPv6 handler (bsc#1204354).
- CVE-2022-40768: Fixed information leak in the scsi driver which allowed local users to obtain sensitive information from kernel memory (bsc#1203514).
- CVE-2022-42703: Fixed use-after-free in mm/rmap.c related to leaf anon_vma double reuse (bsc#1204168).
- CVE-2022-3169: Fixed an denial of service though request to NVME_IOCTL_RESET and NVME_IOCTL_SUBSYS_RESET (bsc#1203290).
- CVE-2022-3545: Fixed a use-after-free vulnerability is area_cache_get() of the file drivers/net/ethernet/netronome/nfp/nfpcore/nfp_cppcore.c (bsc#1204415).
- CVE-2022-3521: Fixed a race condition in kcm_tx_work() of the file net/kcm/kcmsock.c (bsc#1204355).
- CVE-2022-2153: Fixed a NULL pointer dereference in KVM when attempting to set a SynIC IRQ (bsc#1200788).
- CVE-2022-33981: Fixed a denial of service, because of a concurrency use-after-free flaw after deallocating raw_cmd in the raw_cmd_ioctl function (bsc#1200692).
- CVE-2022-45869: Fixed a race condition in the x86 KVM subsystem which could cause a denial of service (bsc#1205882).
- CVE-2022-45888: Fixed a use-after-free during physical removal of a USB devices when using drivers/char/xillybus/xillyusb.c (bsc#1205764).
- CVE-2022-4139: Fixed an issue with the i915 driver that allowed the GPU to access any physical memory (bsc#1205700).
- CVE-2022-4129: Fixed a denial of service with the Layer 2 Tunneling Protocol (L2TP). A missing lock when clearing sk_user_data can lead to a race condition and NULL pointer dereference. (bsc#1205711)
- CVE-2022-3566: Fixed a race condition in the functions tcp_getsockopt/tcp_setsockopt. The manipulation leads to a race condition (bsc#1204405).
- CVE-2022-2602: Fixed a local privilege escalation vulnerability involving Unix socket Garbage Collection and io_uring (bsc#1204228).
- CVE-2022-3176: Fixed a use-after-free in io_uring related to signalfd_poll() and binder_poll() (bsc#1203391).
- CVE-2022-3707: Fixed a double free in the Intel GVT-g graphics driver (bsc#1204780).
- CVE-2022-3625: Fixed a user-after-free vulnerability in devlink_param_set/devlink_param_get of the file net/core/devlink.c (bsc#1204637).
- CVE-2022-3535: Fixed a memory leak in mvpp2_dbgfs_port_init of the file drivers/net/ethernet/marvell/mvpp2/mvpp2_debugfs.c (bsc#1204417).
- CVE-2022-39189: Fixed an issue were an unprivileged guest users can compromise the guest kernel because TLB flush operations were mishandled in certain KVM_VCPU_PREEMPTED situations (bsc#1203066).
- CVE-2022-3577: Fixed an out-of-bounds memory write in bigben_probe of drivers/hid/hid-bigbenff.c (bsc#1204470).
- CVE-2022-2978: Fixed a use-after-free in the NILFS file system (bsc#1202700).
- CVE-2022-1184: Fixed a use-after-free and memory errors in ext4 when mounting and operating on a corrupted image (bsc#1198577).
- CVE-2022-1263: Fixed a NULL pointer dereference issue was found in KVM when releasing a vCPU with dirty ring support enabled. This flaw allowed an unprivileged local attacker on the host to issue specific ioctl calls, causing a kernel oops condition that results in a denial of service (bsc#1198189).
- CVE-2022-1882: Fixed a use-after-free flaw in free_pipe_info() that could allow a local user to crash or potentially escalate their privileges on the system (bsc#1199904).
- CVE-2022-20369: Fixed possible out of bounds write due to improper input validation in v4l2_m2m_querybuf of v4l2-mem2mem.c (bsc#1202347).
- CVE-2022-2586: Fixed a use-after-free which can be triggered when a nft table is deleted (bsc#1202095).
- CVE-2022-2588: Fixed use-after-free in cls_route (bsc#1202096).
- CVE-2022-26373: Fixed CPU information leak via post-barrier RSB predictions (bsc#1201726).
- CVE-2022-2639: Fixed integer underflow that could lead to out-of-bounds write in reserve_sfa_size() (bsc#1202154).
- CVE-2022-2663: Fixed an issue which allowed a firewall to be bypassed when users are using unencrypted IRC with nf_conntrack_irc configured (bsc#1202097).
- CVE-2022-20368: Fixed slab-out-of-bounds access in packet_recvmsg() (bsc#1202346).
- CVE-2022-28356: Fixed a refcount bug in llc_ui_bind and llc_ui_autobind which could allow an unprivileged user to execute a denial of service. (bsc#1197391)
- CVE-2022-2873: Fixed an out-of-bounds memory access flaw that was found in iSMT SMBus host controller driver (bsc#1202558).
- CVE-2022-2905: Fixed tnum_range usage on array range checking for poke descriptors (bsc#1202860).
- CVE-2022-2938: Fixed a flaw that was found inside the Pressure Stall Information implementation that could have been used to allow an attacker to crash the system or have other memory-corruption side effects (bsc#1202623).
- CVE-2022-2959: Fixed a race condition that was found inside the watch queue due to a missing lock in pipe_resize_ring() (bsc#1202681).
- CVE-2022-2977: Fixed reference counting for struct tpm_chip (bsc#1202672).
- CVE-2022-3028: Fixed a race condition that was found in the IP framework for transforming packets (XFRM subsystem) when multiple calls to xfrm_probe_algs occurred simultaneously (bsc#1202898).
- CVE-2022-3078: Fixed a lack of check after calling vzalloc() and lack of free after allocation in drivers/media/test-drivers/vidtv/vidtv_s302m.c (bsc#1203041).
- CVE-2022-3202: Fixed a NULL pointer dereference flaw in Journaled File System. This could allow a local attacker to crash the system or leak kernel internal information (bsc#1203389).
- CVE-2022-32250: Fixed user-after-free in net/netfilter/nf_tables_api.c that could allow local privilege escalation (bsc#1200015).
- CVE-2022-32296: Fixed vulnerability where TCP servers were allowed to identify clients by observing what source ports are used (bsc#1200288).
- CVE-2022-3239: Fixed an use-after-free in the video4linux driver that could lead a local user to able to crash the system or escalate their privileges (bsc#1203552).
- CVE-2022-3303: Fixed a race condition in the sound subsystem due to improper locking (bsc#1203769).
- CVE-2022-3435: Fixed an out-of-bounds read in fib_nh_match() of the file net/ipv4/fib_semantics.c (bsc#1204171).
- CVE-2022-3526: Fixed a memory leak in macvlan_handle_frame() from drivers/net/macvlan.c (bsc#1204353).
- CVE-2022-3640: Fixed use-after-free in l2cap_conn_del() in net/bluetooth/l2cap_core.c (bsc#1204619).
- CVE-2022-36879: Fixed an issue in xfrm_expand_policies in net/xfrm/xfrm_policy.c where a refcount could be dropped twice (bsc#1201948).
- CVE-2022-36946: Fixed a denial of service inside nfqnl_mangle in net/netfilter/nfnetlink_queue.c (bsc#1201940).
- CVE-2022-39188: Fixed race condition in include/asm-generic/tlb.h where a device driver can free a page while it still has stale TLB entries (bsc#1203107).
- CVE-2022-39190: Fixed an issue that was discovered in net/netfilter/nf_tables_api.c and could cause a denial of service upon binding to an already bound chain (bsc#1203117).
- CVE-2022-40476: Fixed a null pointer dereference in fs/io_uring.c (bsc#1203435).
- CVE-2022-41218: Fixed an use-after-free caused by refcount races in drivers/media/dvb-core/dmxdev.c (bsc#1202960).
- CVE-2022-41674: Fixed a DoS issue where kernel can crash on the reception of specific WiFi Frames (bsc#1203770).
- CVE-2022-41848: Fixed a race condition and resultant use-after-free if a physically proximate attacker removes a PCMCIA device while calling ioctl (bsc#1203987).
- CVE-2022-41849: Fixed a race condition and resultant use-after-free if a physically proximate attacker removes a USB device while calling open (bsc#1203992).
- CVE-2022-42719: Fixed remote code execution with wlan frames when parsing a multi-BSSID element (bsc#1204051).
- CVE-2022-42720: Fixed remote code execution due to refcounting bugs (bsc#1204059).
- CVE-2022-42721: Fixed remote code execution due list corruption in the wlan stack (bsc#1204060).
- CVE-2022-42722: Fixed crash in beacon protection for P2P-device. (bsc#1204125)
- CVE-2021-33135: Fixed uncontrolled resource consumption inside Intel(R) SGX that may have allowed an authenticated user to potentially enable denial of service via local access (bsc#1199515).
- CVE-2020-16119: Fixed a use-after-free vulnerability exploitable by a local attacker due to reuse of a DCCP socket. (bsc#1177471)
- CVE-2020-36516: Fixed an issue in the mixed IPID assignment method where an attacker was able to inject data into or terminate a victim's TCP session (bsc#1196616).
- CVE-2016-3695: Fixed an issue inside the einj_error_inject function in drivers/acpi/apei/einj.c that allowed users to simulate hardware errors and consequently cause a denial of service (bsc#1023051).
The following non-security bugs were fixed:
- 9p: Fix refcounting during full path walks for fid lookups (git-fixes).
- 9p: fix fid refcount leak in v9fs_vfs_atomic_open_dotl (git-fixes).
- 9p: fix fid refcount leak in v9fs_vfs_get_link (git-fixes).
- ACPI / scan: Create platform device for CS35L41 (bsc#1203699).
- ACPI: APEI: Better fix to avoid spamming the console with old error logs (git-fixes).
- ACPI: APEI: Fix integer overflow in ghes_estatus_pool_init() (git-fixes).
- ACPI: APEI: do not add task_work to kernel thread to avoid memory leak (git-fixes).
- ACPI: APEI: explicit init of HEST and GHES in apci_init() (git-fixes).
- ACPI: CPPC: Do not prevent CPPC from working in the future (git-fixes).
- ACPI: EC: Drop the EC_FLAGS_IGNORE_DSDT_GPE quirk (git-fixes).
- ACPI: EC: Remove duplicate ThinkPad X1 Carbon 6th entry from DMI quirks (git-fixes).
- ACPI: HMAT: Fix initiator registration for single-initiator systems (git-fixes).
- ACPI: HMAT: Release platform device in case of platform_device_add_data() fails (git-fixes).
- ACPI: HMAT: remove unnecessary variable initialization (git-fixes).
- ACPI: LPSS: Fix missing check in register_device_clock() (git-fixes).
- ACPI: PM: save NVS memory for Lenovo G40-45 (git-fixes).
- ACPI: VIOT: Fix ACS setup (git-fixes).
- ACPI: extlog: Handle multiple records (git-fixes).
- ACPI: processor idle: Practically limit 'Dummy wait' workaround to old Intel systems (bsc#1203767).
- ACPI: processor/idle: Annotate more functions to live in cpuidle section (git-fixes).
- ACPI: processor: Remove freq Qos request for all CPUs (git-fixes).
- ACPI: property: Return type of acpi_add_nondev_subnodes() should be bool (git-fixes).
- ACPI: resource: skip IRQ override on AMD Zen platforms (git-fixes).
- ACPI: scan: Add CLSA0101 Laptop Support (bsc#1203699).
- ACPI: scan: Add LATT2021 to acpi_ignore_dep_ids[] (git-fixes).
- ACPI: tables: FPDT: Do not call acpi_os_map_memory() on invalid phys address (git-fixes).
- ACPI: thermal: drop an always true check (git-fixes).
- ACPI: utils: Add api to read _SUB from ACPI (bsc#1203699).
- ACPI: video: Add Toshiba Satellite/Portege Z830 quirk (git-fixes).
- ACPI: video: Force backlight native for some TongFang devices (git-fixes).
- ACPI: video: Make backlight class device registration a separate step (v2) (git-fixes).
- ACPI: video: Shortening quirk list by identifying Clevo by board_name only (git-fixes).
- ACPI: x86: Add a quirk for Dell Inspiron 14 2-in-1 for StorageD3Enable (git-fixes).
- ACPI: x86: Add another system to quirk list for forcing StorageD3Enable (git-fixes).
- ALSA: Use del_timer_sync() before freeing timer (git-fixes).
- ALSA: ac97: fix possible memory leak in snd_ac97_dev_register() (git-fixes).
- ALSA: aloop: Fix random zeros in capture data when using jiffies timer (git-fixes).
- ALSA: aoa: Fix I2S device accounting (git-fixes).
- ALSA: aoa: i2sbus: fix possible memory leak in i2sbus_add_dev() (git-fixes).
- ALSA: asihpi - Remove useless code in hpi_meter_get_peak() (git-fixes).
- ALSA: au88x0: use explicitly signed char (git-fixes).
- ALSA: bcd2000: Fix a UAF bug on the error path of probing (git-fixes).
- ALSA: core: Fix double-free at snd_card_new() (git-fixes).
- ALSA: cs35l41: Check hw_config before using it (bsc#1203699).
- ALSA: cs35l41: Enable Internal Boost in shared lib (bsc#1203699).
- ALSA: cs35l41: Move cs35l41_gpio_config to shared lib (bsc#1203699).
- ALSA: cs35l41: Unify hardware configuration (bsc#1203699).
- ALSA: dice: fix regression for Lexicon I-ONIX FW810S (git-fixes).
- ALSA: dmaengine: increment buffer pointer atomically (git-fixes).
- ALSA: emu10k1: Fix out of bounds access in snd_emu10k1_pcm_channel_alloc() (git-fixes).
- ALSA: hda/ca0132: add quirk for EVGA Z390 DARK (git-fixes).
- ALSA: hda/cirrus - support for iMac 12,1 model (git-fixes).
- ALSA: hda/conexant: Add quirk for LENOVO 20149 Notebook model (git-fixes).
- ALSA: hda/conexant: add a new hda codec SN6140 (git-fixes).
- ALSA: hda/cs8409: Add Speaker Playback Switch for Cyborg (bsc#1203699).
- ALSA: hda/cs8409: Add Speaker Playback Switch for Warlock (bsc#1203699).
- ALSA: hda/cs8409: Add new Dolphin HW variants (bsc#1203699).
- ALSA: hda/cs8409: Disable HSBIAS_SENSE_EN for Cyborg (bsc#1203699).
- ALSA: hda/cs8409: Fix Full Scale Volume setting for all variants (bsc#1203699).
- ALSA: hda/cs8409: Fix Warlock to use mono mic configuration (bsc#1203699).
- ALSA: hda/cs8409: Re-order quirk table into ascending order (bsc#1203699).
- ALSA: hda/cs8409: Support manual mode detection for CS42L42 (bsc#1203699).
- ALSA: hda/cs8409: Support new Dolphin Variants (bsc#1203699).
- ALSA: hda/cs8409: Support new Odin Variants (bsc#1203699).
- ALSA: hda/cs8409: Support new Warlock MLK Variants (bsc#1203699).
- ALSA: hda/cs8409: Use general cs42l42 include in cs8409 hda driver (bsc#1203699).
- ALSA: hda/cs8409: change cs8409_fixups v.pins initializers to static (bsc#1203699).
- ALSA: hda/cs_dsp_ctl: Fix mutex inversion when creating controls (bsc#1203699).
- ALSA: hda/hdmi - enable runtime pm for more AMD display audio (git-fixes).
- ALSA: hda/hdmi: Do not skip notification handling during PM operation (git-fixes).
- ALSA: hda/hdmi: Fix the converter allocation for the silent stream (git-fixes).
- ALSA: hda/hdmi: Fix the converter reuse for the silent stream (git-fixes).
- ALSA: hda/hdmi: change type for the 'assigned' variable (git-fixes).
- ALSA: hda/realtek: Add CS35L41 support for Thinkpad laptops (bsc#1203699).
- ALSA: hda/realtek: Add Intel Reference SSID to support headset keys (git-fixes).
- ALSA: hda/realtek: Add Positivo C6300 model quirk (git-fixes).
- ALSA: hda/realtek: Add a quirk for HP OMEN 15 (8786) mute LED (git-fixes).
- ALSA: hda/realtek: Add a quirk for HP OMEN 16 (8902) mute LED (git-fixes).
- ALSA: hda/realtek: Add another HP ZBook G9 model quirks (bsc#1203699).
- ALSA: hda/realtek: Add mute and micmut LED support for Zbook Fury 17 G9 (bsc#1203699).
- ALSA: hda/realtek: Add pincfg for ASUS G513 HP jack (git-fixes).
- ALSA: hda/realtek: Add pincfg for ASUS G533Z HP jack (git-fixes).
- ALSA: hda/realtek: Add quirk for ASUS GA503R laptop (git-fixes).
- ALSA: hda/realtek: Add quirk for ASUS GV601R laptop (git-fixes).
- ALSA: hda/realtek: Add quirk for ASUS Zenbook using CS35L41 (bsc#1203922).
- ALSA: hda/realtek: Add quirk for ASUS Zenbook using CS35L41 (git-fixes).
- ALSA: hda/realtek: Add quirk for Clevo NS50PU, NS70PU (git-fixes).
- ALSA: hda/realtek: Add quirk for Clevo NV45PZ (git-fixes).
- ALSA: hda/realtek: Add quirk for HP Spectre x360 15-eb0xxx (git-fixes).
- ALSA: hda/realtek: Add quirk for HP Zbook Firefly 14 G9 model (bsc#1203699).
- ALSA: hda/realtek: Add quirk for Huawei WRT-WX9 (git-fixes).
- ALSA: hda/realtek: Add quirk for Lenovo Yoga7 14IAL7 (bsc#1203699).
- ALSA: hda/realtek: Add quirk for Lenovo Yoga9 14IAP7 (git-fixes).
- ALSA: hda/realtek: Add quirk for another Asus K42JZ model (git-fixes).
- ALSA: hda/realtek: Add quirks for ASUS Zenbooks using CS35L41 (bsc#1203699).
- ALSA: hda/realtek: Add speaker AMP init for Samsung laptops with ALC298 (git-fixes).
- ALSA: hda/realtek: Add support for HP Laptops (bsc#1203699).
- ALSA: hda/realtek: Add support for Legion 7 16ACHg6 laptop (bsc#1203699).
- ALSA: hda/realtek: Correct pin configs for ASUS G533Z (git-fixes).
- ALSA: hda/realtek: Enable 4-speaker output Dell Precision 5530 laptop (git-fixes).
- ALSA: hda/realtek: Enable 4-speaker output Dell Precision 5570 laptop (git-fixes).
- ALSA: hda/realtek: Enable mute/micmute LEDs and limit mic boost on EliteBook 845/865 G9 (bsc#1203699).
- ALSA: hda/realtek: Enable mute/micmute LEDs support for HP Laptops (bsc#1203699).
- ALSA: hda/realtek: Enable speaker and mute LEDs for HP laptops (bsc#1203699).
- ALSA: hda/realtek: Fix LED on Zbook Studio G9 (bsc#1203699).
- ALSA: hda/realtek: Fix mute led issue on thinkpad with cs35l41 s-codec (bsc#1203699).
- ALSA: hda/realtek: Fix the speaker output on Samsung Galaxy Book Pro 360 (bsc#1205100).
- ALSA: hda/realtek: More robust component matching for CS35L41 (bsc#1203699).
- ALSA: hda/realtek: Re-arrange quirk table entries (git-fixes).
- ALSA: hda/realtek: fix speakers for Samsung Galaxy Book Pro (bsc#1205100).
- ALSA: hda/realtek: remove ALC289_FIXUP_DUAL_SPK for Dell 5530 (git-fixes).
- ALSA: hda/sigmatel: Fix unused variable warning for beep power change (git-fixes).
- ALSA: hda/sigmatel: Keep power up while beep is enabled (bsc#1200544).
- ALSA: hda/tegra: Add Tegra234 hda driver support (git-fixes).
- ALSA: hda/tegra: Align BDL entry to 4KB boundary (git-fixes).
- ALSA: hda/tegra: Update scratch reg. communication (git-fixes).
- ALSA: hda/tegra: set depop delay for tegra (git-fixes).
- ALSA: hda: Fix Nvidia dp infoframe (git-fixes).
- ALSA: hda: Fix dependencies of CS35L41 on SPI/I2C buses (bsc#1203699).
- ALSA: hda: Fix dependency on ASoC cs35l41 codec (bsc#1203699).
- ALSA: hda: Fix hang at HD-audio codec unbinding due to refcount saturation (git-fixes).
- ALSA: hda: Fix position reporting on Poulsbo (git-fixes).
- ALSA: hda: add Intel 5 Series / 3400 PCI DID (git-fixes).
- ALSA: hda: cs35l41: Add Amp Name based on channel and index (bsc#1203699).
- ALSA: hda: cs35l41: Add Boost type flag (bsc#1203699).
- ALSA: hda: cs35l41: Add Support for Interrupts (bsc#1203699).
- ALSA: hda: cs35l41: Add calls to newly added test key function (bsc#1203699).
- ALSA: hda: cs35l41: Add defaulted values into dsp bypass config sequence (bsc#1203699).
- ALSA: hda: cs35l41: Add initial DSP support and firmware loading (bsc#1203699).
- ALSA: hda: cs35l41: Add missing default cases (bsc#1203699).
- ALSA: hda: cs35l41: Add module parameter to control firmware load (bsc#1203699).
- ALSA: hda: cs35l41: Add support for CS35L41 in HDA systems (bsc#1203699).
- ALSA: hda: cs35l41: Allow compilation test on non-ACPI configurations (bsc#1203699).
- ALSA: hda: cs35l41: Always configure the DAI (bsc#1203699).
- ALSA: hda: cs35l41: Avoid overwriting register patch (bsc#1203699).
- ALSA: hda: cs35l41: Clarify support for CSC3551 without _DSD Properties (bsc#1203699).
- ALSA: hda: cs35l41: Consolidate selections under SND_HDA_SCODEC_CS35L41 (bsc#1203699).
- ALSA: hda: cs35l41: Do not dereference fwnode handle (bsc#1203699).
- ALSA: hda: cs35l41: Drop wrong use of ACPI_PTR() (bsc#1203699).
- ALSA: hda: cs35l41: Enable GPIO2 Interrupt for CLSA0100 laptops (bsc#1203699).
- ALSA: hda: cs35l41: Fix I2S params comments (bsc#1203699).
- ALSA: hda: cs35l41: Fix comments wrt serial-multi-instantiate reference (bsc#1203699).
- ALSA: hda: cs35l41: Fix error in spi cs35l41 hda driver name (bsc#1203699).
- ALSA: hda: cs35l41: Handle all external boost setups the same way (bsc#1203699).
- ALSA: hda: cs35l41: Improve dev_err_probe() messaging (bsc#1203699).
- ALSA: hda: cs35l41: Make cs35l41_hda_remove() return void (bsc#1203699).
- ALSA: hda: cs35l41: Make use of the helper function dev_err_probe() (bsc#1203699).
- ALSA: hda: cs35l41: Move boost config to initialization code (bsc#1203699).
- ALSA: hda: cs35l41: Move cs35l41* calls to its own symbol namespace (bsc#1203699).
- ALSA: hda: cs35l41: Move external boost handling to lib for ASoC use (bsc#1203699).
- ALSA: hda: cs35l41: Mute the device before shutdown (bsc#1203699).
- ALSA: hda: cs35l41: Put the device into safe mode for external boost (bsc#1203699).
- ALSA: hda: cs35l41: Read Speaker Calibration data from UEFI variables (bsc#1203699).
- ALSA: hda: cs35l41: Remove Set Channel Map api from binding (bsc#1203699).
- ALSA: hda: cs35l41: Remove cs35l41_hda_reg_sequence struct (bsc#1203699).
- ALSA: hda: cs35l41: Remove suspend/resume hda hooks (bsc#1203699).
- ALSA: hda: cs35l41: Reorganize log for playback actions (bsc#1203699).
- ALSA: hda: cs35l41: Save Subsystem ID inside CS35L41 Driver (bsc#1203699).
- ALSA: hda: cs35l41: Save codec object inside component struct (bsc#1203699).
- ALSA: hda: cs35l41: Set Speaker Position for CLSA0100 Laptop (bsc#1203699).
- ALSA: hda: cs35l41: Support CLSA0101 (bsc#1203699).
- ALSA: hda: cs35l41: Support Firmware switching and reloading (bsc#1203699).
- ALSA: hda: cs35l41: Support Hibernation during Suspend (bsc#1203699).
- ALSA: hda: cs35l41: Support Speaker ID for laptops (bsc#1203699).
- ALSA: hda: cs35l41: Support System Suspend (bsc#1203699).
- ALSA: hda: cs35l41: Support multiple load paths for firmware (bsc#1203699).
- ALSA: hda: cs35l41: Support reading subsystem id from ACPI (bsc#1203699).
- ALSA: hda: cs35l41: Tidyup code (bsc#1203699).
- ALSA: hda: cs35l41: Use the CS35L41 HDA internal define (bsc#1203699).
- ALSA: hda: cs35l41: fix double free on error in probe() (bsc#1203699).
- ALSA: hda: fix potential memleak in 'add_widget_node' (git-fixes).
- ALSA: hda: hda_cs_dsp_ctl: Add Library to support CS_DSP ALSA controls (bsc#1203699).
- ALSA: hda: hda_cs_dsp_ctl: Add apis to write the controls directly (bsc#1203699).
- ALSA: hda: hda_cs_dsp_ctl: Add fw id strings (bsc#1203699).
- ALSA: hda: hda_cs_dsp_ctl: Ensure pwr_lock is held before reading/writing controls (bsc#1203699).
- ALSA: hda: hda_cs_dsp_ctl: Minor clean and redundant code removal (bsc#1203699).
- ALSA: hda: intel-dsp-config: Add RaptorLake PCI IDs (jsc#PED-720).
- ALSA: hda: intel-nhlt: Correct the handling of fmt_config flexible array (git-fixes).
- ALSA: hiface: fix repeated words in comments (git-fixes).
- ALSA: info: Fix llseek return value when using callback (git-fixes).
- ALSA: line6: Replace sprintf() with sysfs_emit() (git-fixes).
- ALSA: line6: remove line6_set_raw declaration (git-fixes).
- ALSA: oss: Fix potential deadlock at unregistration (git-fixes).
- ALSA: pcm: oss: Fix race at SNDCTL_DSP_SYNC (git-fixes).
- ALSA: rawmidi: Drop register_mutex in snd_rawmidi_free() (git-fixes).
- ALSA: rme9652: use explicitly signed char (git-fixes).
- ALSA: scarlett2: Add Focusrite Clarett+ 8Pre support (git-fixes).
- ALSA: scarlett2: Add support for the internal 'standalone' switch (git-fixes).
- ALSA: scarlett2: Split scarlett2_config_items[] into 3 sections (git-fixes).
- ALSA: seq: Fix data-race at module auto-loading (git-fixes).
- ALSA: seq: oss: Fix data-race for max_midi_devs access (git-fixes).
- ALSA: usb-audio: Add DSD support for Accuphase DAC-60 (git-fixes).
- ALSA: usb-audio: Add endianness annotations (git-fixes).
- ALSA: usb-audio: Add mixer mapping for Gigabyte B450/550 Mobos (git-fixes).
- ALSA: usb-audio: Add quirk entry for M-Audio Micro (git-fixes).
- ALSA: usb-audio: Add quirk for Behringer UMC202HD (git-fixes).
- ALSA: usb-audio: Add quirk for LH Labs Geek Out HD Audio 1V5 (git-fixes).
- ALSA: usb-audio: Add quirk to enable Avid Mbox 3 support (git-fixes).
- ALSA: usb-audio: Add quirks for M-Audio Fast Track C400/600 (git-fixes).
- ALSA: usb-audio: Drop snd_BUG_ON() from snd_usbmidi_output_open() (git-fixes).
- ALSA: usb-audio: Fix NULL dererence at error path (git-fixes).
- ALSA: usb-audio: Fix an out-of-bounds bug in __snd_usb_parse_audio_interface() (git-fixes).
- ALSA: usb-audio: Fix last interface check for registration (git-fixes).
- ALSA: usb-audio: Fix potential memory leaks (git-fixes).
- ALSA: usb-audio: Fix regression with Dell Dock jack detection (bsc#1204719).
- ALSA: usb-audio: Inform the delayed registration more properly (git-fixes).
- ALSA: usb-audio: More comprehensive mixer map for ASUS ROG Zenith II (git-fixes).
- ALSA: usb-audio: Register card again for iface over delayed_register option (git-fixes).
- ALSA: usb-audio: Register card at the last interface (git-fixes).
- ALSA: usb-audio: Remove redundant workaround for Roland quirk (bsc#1205111).
- ALSA: usb-audio: Split endpoint setups for hw_params and prepare (git-fixes).
- ALSA: usb-audio: Support jack detection on Dell dock (git-fixes).
- ALSA: usb-audio: Turn off 'manual mode' on Dell dock (git-fixes).
- ALSA: usb-audio: Yet more regression for for the delayed card registration (bsc#1205111).
- ALSA: usb-audio: add quirk to fix Hamedal C20 disconnect issue (git-fixes).
- ALSA: usb-audio: make read-only array marker static const (git-fixes).
- ALSA: usb-audio: remove redundant assignment to variable c (git-fixes).
- ALSA: usb-audio: scarlett2: Use struct_size() helper in scarlett2_usb() (git-fixes).
- ALSA: usb/6fire: fix repeated words in comments (git-fixes).
- ARM: 9216/1: Fix MAX_DMA_ADDRESS overflow (git-fixes).
- ARM: 9242/1: kasan: Only map modules if CONFIG_KASAN_VMALLOC=n (git-fixes).
- ARM: 9244/1: dump: Fix wrong pg_level in walk_pmd() (git-fixes).
- ARM: 9247/1: mm: set readonly for MT_MEMORY_RO with ARM_LPAE (git-fixes).
- ARM: Drop CMDLINE_* dependency on ATAGS (git-fixes).
- ARM: OMAP2+: Fix refcount leak in omap3xxx_prm_late_init (git-fixes).
- ARM: OMAP2+: Fix refcount leak in omapdss_init_of (git-fixes).
- ARM: OMAP2+: display: Fix refcount leak bug (git-fixes).
- ARM: OMAP2+: pdata-quirks: Fix refcount leak bug (git-fixes).
- ARM: at91: rm9200: fix usb device clock id (git-fixes).
- ARM: bcm: Fix refcount leak in bcm_kona_smc_init (git-fixes).
- ARM: decompressor: Include .data.rel.ro.local (git-fixes).
- ARM: defconfig: clean up multi_v4t and multi_v5 configs (git-fixes).
- ARM: defconfig: drop CONFIG_PTP_1588_CLOCK=y (git-fixes).
- ARM: defconfig: drop CONFIG_SERIAL_OMAP references (git-fixes).
- ARM: defconfig: drop CONFIG_USB_FSL_USB2 (git-fixes).
- ARM: dts: BCM5301X: Add DT for Meraki MR26 (git-fixes).
- ARM: dts: am335x-pcm-953: Define fixed regulators in root node (git-fixes).
- ARM: dts: am33xx: Fix MMCHS0 dma properties (git-fixes).
- ARM: dts: armada-38x: Add gpio-ranges for pin muxing (git-fixes).
- ARM: dts: ast2500-evb: fix board compatible (git-fixes).
- ARM: dts: ast2600-evb-a1: fix board compatible (git-fixes).
- ARM: dts: ast2600-evb: fix board compatible (git-fixes).
- ARM: dts: at91: sam9g20ek: enable udc vbus gpio pinctrl (git-fixes).
- ARM: dts: at91: sama5d27_wlsom1: do not keep ldo2 enabled all the time (git-fixes).
- ARM: dts: at91: sama5d27_wlsom1: specify proper regulator output ranges (git-fixes).
- ARM: dts: at91: sama5d2_icp: do not keep vdd_other enabled all the time (git-fixes).
- ARM: dts: at91: sama5d2_icp: specify proper regulator output ranges (git-fixes).
- ARM: dts: exynos: correct s5k6a3 reset polarity on Midas family (git-fixes).
- ARM: dts: exynos: fix polarity of VBUS GPIO of Origen (git-fixes).
- ARM: dts: fix Moxa SDIO 'compatible', remove 'sdhci' misnomer (git-fixes).
- ARM: dts: imx6dl: add missing properties for sram (git-fixes).
- ARM: dts: imx6q-prti6q: Fix ref/tcxo-clock-frequency properties (git-fixes).
- ARM: dts: imx6q: add missing properties for sram (git-fixes).
- ARM: dts: imx6qdl-gw59{10,13}: fix user pushbutton GPIO offset (git-fixes).
- ARM: dts: imx6qdl-kontron-samx6i: fix spi-flash compatible (git-fixes).
- ARM: dts: imx6qdl-kontron-samx6i: hook up DDC i2c bus (git-fixes).
- ARM: dts: imx6qdl-kontron-samx6i: remove duplicated node (git-fixes).
- ARM: dts: imx6qp: add missing properties for sram (git-fixes).
- ARM: dts: imx6sl: add missing properties for sram (git-fixes).
- ARM: dts: imx6sll: add missing properties for sram (git-fixes).
- ARM: dts: imx6sx: add missing properties for sram (git-fixes).
- ARM: dts: imx6ul: add missing properties for sram (git-fixes).
- ARM: dts: imx6ul: change operating-points to uint32-matrix (git-fixes).
- ARM: dts: imx6ul: fix csi node compatible (git-fixes).
- ARM: dts: imx6ul: fix keypad compatible (git-fixes).
- ARM: dts: imx6ul: fix lcdif node compatible (git-fixes).
- ARM: dts: imx6ul: fix qspi node compatible (git-fixes).
- ARM: dts: imx7: Fix NAND controller size-cells (git-fixes).
- ARM: dts: imx7d-colibri-emmc: add cpu1 supply (git-fixes).
- ARM: dts: imx7d-sdb: config the max pressure for tsc2046 (git-fixes).
- ARM: dts: imx: align SPI NOR node name with dtschema (git-fixes).
- ARM: dts: integrator: Tag PCI host with device_type (git-fixes).
- ARM: dts: kirkwood: lsxl: fix serial line (git-fixes).
- ARM: dts: kirkwood: lsxl: remove first ethernet port (git-fixes).
- ARM: dts: qcom: mdm9615: add missing PMIC GPIO reg (git-fixes).
- ARM: dts: qcom: pm8841: add required thermal-sensor-cells (git-fixes).
- ARM: dts: qcom: sdx55: Fix the IRQ trigger type for UART (git-fixes).
- ARM: dts: turris-omnia: Add label for wan port (git-fixes).
- ARM: dts: turris-omnia: Fix mpp26 pin name and comment (git-fixes).
- ARM: dts: uniphier: Fix USB interrupts for PXs2 SoC (git-fixes).
- ARM: findbit: fix overflowing offset (git-fixes).
- ARM: mxs: fix memory leak in mxs_machine_init() (git-fixes).
- ARM: shmobile: rcar-gen2: Increase refcount for new reference (git-fixes).
- ASoC: Intel: bytcht_es8316: Add quirk for the Nanote UMPC-01 (git-fixes).
- ASoC: Intel: sof_sdw: add quirk variant for LAPBC710 NUC15 (git-fixes).
- ASoC: SOF: Intel: pci-tgl: add ADL-PS support (jsc#PED-720).
- ASoC: SOF: Intel: pci-tgl: add RPL-P support (jsc#PED-720).
- ASoC: SOF: Intel: pci-tgl: add RPL-S support (jsc#PED-652).
- ASoC: SOF: debug: Fix potential buffer overflow by snprintf() (git-fixes).
- ASoC: SOF: pci: Change DMI match info to support all Chrome platforms (git-fixes).
- ASoC: audio-graph-card: Add of_node_put() in fail path (git-fixes).
- ASoC: codec: tlv320aic32x4: fix mono playback via I2S (git-fixes).
- ASoC: codecs: da7210: add check for i2c_add_driver (git-fixes).
- ASoC: codecs: jz4725b: Fix spelling mistake 'Sourc' -> 'Source', 'Routee' -> 'Route' (git-fixes).
- ASoC: codecs: jz4725b: add missed Line In power control bit (git-fixes).
- ASoC: codecs: jz4725b: fix capture selector naming (git-fixes).
- ASoC: codecs: jz4725b: fix reported volume for Master ctl (git-fixes).
- ASoC: codecs: jz4725b: use right control for Capture Volume (git-fixes).
- ASoC: codecs: msm8916-wcd-digital: move gains from SX_TLV to S8_TLV (git-fixes).
- ASoC: codecs: tx-macro: fix kcontrol put (git-fixes).
- ASoC: codecs: wcd9335: move gains from SX_TLV to S8_TLV (git-fixes).
- ASoC: core: Fix use-after-free in snd_soc_exit() (git-fixes).
- ASoC: cros_ec_codec: Fix refcount leak in cros_ec_codec_platform_probe (git-fixes).
- ASoC: cs35l41: Add ASP TX3/4 source to register patch (bsc#1203699).
- ASoC: cs35l41: Add bindings for CS35L41 (bsc#1203699).
- ASoC: cs35l41: Add common cs35l41 enter hibernate function (bsc#1203699).
- ASoC: cs35l41: Add cs35l51/53 IDs (bsc#1203699).
- ASoC: cs35l41: Add endianness flag in snd_soc_component_driver (bsc#1203699).
- ASoC: cs35l41: Add one more variable in the debug log (bsc#1203699).
- ASoC: cs35l41: Add support for CLSA3541 ACPI device ID (bsc#1203699).
- ASoC: cs35l41: Add support for hibernate memory retention mode (bsc#1203699).
- ASoC: cs35l41: Binding fixes (bsc#1203699).
- ASoC: cs35l41: CS35L41 Boosted Smart Amplifier (bsc#1203699).
- ASoC: cs35l41: Change monitor widgets to siggens (bsc#1203699).
- ASoC: cs35l41: Combine adjacent register writes (bsc#1203699).
- ASoC: cs35l41: Convert tables to shared source code (bsc#1203699).
- ASoC: cs35l41: Correct DSP power down (bsc#1203699).
- ASoC: cs35l41: Correct handling of some registers in the cache (bsc#1203699).
- ASoC: cs35l41: Correct some control names (bsc#1203699).
- ASoC: cs35l41: Create shared function for boost configuration (bsc#1203699).
- ASoC: cs35l41: Create shared function for errata patches (bsc#1203699).
- ASoC: cs35l41: Create shared function for setting channels (bsc#1203699).
- ASoC: cs35l41: DSP Support (bsc#1203699).
- ASoC: cs35l41: Do not overwrite returned error code (bsc#1203699).
- ASoC: cs35l41: Do not print error when waking from hibernation (bsc#1203699).
- ASoC: cs35l41: Document CS35l41 External Boost (bsc#1203699).
- ASoC: cs35l41: Fix DSP mbox start command and global enable order (bsc#1203699).
- ASoC: cs35l41: Fix GPIO2 configuration (bsc#1203699).
- ASoC: cs35l41: Fix a bunch of trivial code formating/style issues (bsc#1203699).
- ASoC: cs35l41: Fix a shift-out-of-bounds warning found by UBSAN (bsc#1203699).
- ASoC: cs35l41: Fix an out-of-bounds access in otp_packed_element_t (bsc#1203699).
- ASoC: cs35l41: Fix link problem (bsc#1203699).
- ASoC: cs35l41: Fix max number of TX channels (bsc#1203699).
- ASoC: cs35l41: Fix undefined reference to core functions (bsc#1203699).
- ASoC: cs35l41: Fix use of an uninitialised variable (bsc#1203699).
- ASoC: cs35l41: Fixup the error messages (bsc#1203699).
- ASoC: cs35l41: Make cs35l41_remove() return void (bsc#1203699).
- ASoC: cs35l41: Move cs35l41 exit hibernate function into shared code (bsc#1203699).
- ASoC: cs35l41: Move cs35l41 fs errata into shared code (bsc#1203699).
- ASoC: cs35l41: Move cs35l41_otp_unpack to shared code (bsc#1203699).
- ASoC: cs35l41: Move cs35l41_set_cspl_mbox_cmd to shared code (bsc#1203699).
- ASoC: cs35l41: Move cs_dsp config struct into shared code (bsc#1203699).
- ASoC: cs35l41: Move power initializations to reg_sequence (bsc#1203699).
- ASoC: cs35l41: Read System Name from ACPI _SUB to identify firmware (bsc#1203699).
- ASoC: cs35l41: Remove incorrect comment (bsc#1203699).
- ASoC: cs35l41: Remove unnecessary param (bsc#1203699).
- ASoC: cs35l41: Set the max SPI speed for the whole device (bsc#1203699).
- ASoC: cs35l41: Support external boost (bsc#1203699).
- ASoC: cs35l41: Update handling of test key registers (bsc#1203699).
- ASoC: cs35l41: Use regmap_read_poll_timeout to wait for OTP boot (bsc#1203699).
- ASoC: cs42l42: Add control for audio slow-start switch (bsc#1203699).
- ASoC: cs42l42: Add warnings about DETECT_MODE and PLL_START (bsc#1203699).
- ASoC: cs42l42: Allow time for HP/ADC to power-up after enable (bsc#1203699).
- ASoC: cs42l42: Always enable TS_PLUG and TS_UNPLUG interrupts (bsc#1203699).
- ASoC: cs42l42: Change jack_detect_mutex to a lock of all IRQ handling (bsc#1203699).
- ASoC: cs42l42: Do not claim to support 192k (bsc#1203699).
- ASoC: cs42l42: Do not reconfigure the PLL while it is running (bsc#1203699).
- ASoC: cs42l42: Fix WARN in remove() if running without an interrupt (bsc#1203699).
- ASoC: cs42l42: Handle system suspend (bsc#1203699).
- ASoC: cs42l42: Implement Manual Type detection as fallback (bsc#1203699).
- ASoC: cs42l42: Mark OSC_SWITCH_STATUS register volatile (bsc#1203699).
- ASoC: cs42l42: Minor fix all errors reported by checkpatch.pl script (bsc#1203699).
- ASoC: cs42l42: Move CS42L42 register descriptions to general include (bsc#1203699).
- ASoC: cs42l42: Only report button state if there was a button interrupt (git-fixes).
- ASoC: cs42l42: Prevent NULL pointer deref in interrupt handler (bsc#1203699).
- ASoC: cs42l42: Remove redundant pll_divout member (bsc#1203699).
- ASoC: cs42l42: Remove redundant writes to DETECT_MODE (bsc#1203699).
- ASoC: cs42l42: Remove redundant writes to RS_PLUG/RS_UNPLUG masks (bsc#1203699).
- ASoC: cs42l42: Remove unused runtime_suspend/runtime_resume callbacks (bsc#1203699).
- ASoC: cs42l42: Report full jack status when plug is detected (bsc#1203699).
- ASoC: cs42l42: Report initial jack state (bsc#1203699).
- ASoC: cs42l42: Reset and power-down on remove() and failed probe() (bsc#1203699).
- ASoC: cs42l42: Set correct SRC MCLK (bsc#1203699).
- ASoC: cs42l42: Simplify reporting of jack unplug (bsc#1203699).
- ASoC: cs42l42: Use PLL for SCLK > 12.288MHz (bsc#1203699).
- ASoC: cs42l42: Use two thresholds and increased wait time for manual type detection (bsc#1203699).
- ASoC: cs42l42: free_irq() before powering-down on probe() fail (bsc#1203699).
- ASoC: da7219: Fix an error handling path in da7219_register_dai_clks() (git-fixes).
- ASoC: dt-bindings: cs42l42: Convert binding to yaml (bsc#1203699).
- ASoC: eureka-tlv320: Hold reference returned from of_find_xxx API (git-fixes).
- ASoC: fsl-asoc-card: force cast the asrc_format type (git-fixes).
- ASoC: fsl_asrc fsl_esai fsl_sai: allow CONFIG_PM=N (git-fixes).
- ASoC: fsl_asrc: force cast the asrc_format type (git-fixes).
- ASoC: fsl_easrc: use snd_pcm_format_t type for sample_format (git-fixes).
- ASoC: fsl_sai: Remove unnecessary FIFO reset in ISR (git-fixes).
- ASoC: fsl_sai: use local device pointer (git-fixes).
- ASoC: imx-audmux: Silence a clang warning (git-fixes).
- ASoC: imx-card: Fix DSD/PDM mclk frequency (git-fixes).
- ASoC: imx-card: Fix refcount issue with of_node_put (git-fixes).
- ASoC: imx-card: use snd_pcm_format_t type for asrc_format (git-fixes).
- ASoC: max98373: Add checks for devm_kcalloc (git-fixes).
- ASoC: mchp-spdifrx: disable end of block interrupt on failures (git-fixes).
- ASoC: mchp-spdiftx: Fix clang -Wbitfield-constant-conversion (git-fixes).
- ASoC: mchp-spdiftx: remove references to mchp_i2s_caps (git-fixes).
- ASoC: mt6359: Fix refcount leak bug (git-fixes).
- ASoC: mt6359: fix tests for platform_get_irq() failure (git-fixes).
- ASoC: mt6660: Fix PM disable depth imbalance in mt6660_i2c_probe (git-fixes).
- ASoC: mt6660: Keep the pm_runtime enables before component stuff in mt6660_i2c_probe (git-fixes).
- ASoC: mt6797-mt6351: Fix refcount leak in mt6797_mt6351_dev_probe (git-fixes).
- ASoC: nau8824: Fix semaphore unbalance at error paths (git-fixes).
- ASoC: ops: Fix bounds check for _sx controls (git-fixes).
- ASoC: qcom: Fix missing of_node_put() in asoc_qcom_lpass_cpu_platform_probe() (git-fixes).
- ASoC: qcom: lpass-cpu: Mark HDMI TX parity register as volatile (git-fixes).
- ASoC: qcom: lpass-cpu: mark HDMI TX registers as volatile (git-fixes).
- ASoC: qcom: q6dsp: Fix an off-by-one in q6adm_alloc_copp() (git-fixes).
- ASoC: qcom: sm8250: add missing module owner (git-fixes).
- ASoC: rsnd: Add check for rsnd_mod_power_on (git-fixes).
- ASoC: rsnd: care default case on rsnd_ssiu_busif_err_irq_ctrl() (git-fixes).
- ASoC: rt1019: Fix the TDM settings (git-fixes).
- ASoC: samsung: Fix error handling in aries_audio_probe (git-fixes).
- ASoC: samsung: change gpiod_speaker_power and rx1950_audio from global to static variables (git-fixes).
- ASoC: samsung: change neo1973_audio from a global to static (git-fixes).
- ASoC: samsung: h1940_uda1380: include proepr GPIO consumer header (git-fixes).
- ASoC: sgtl5000: Reset the CHIP_CLK_CTRL reg on remove (git-fixes).
- ASoC: soc-pcm: Do not zero TDM masks in __soc_pcm_open() (git-fixes).
- ASoC: soc-utils: Remove __exit for snd_soc_util_exit() (git-fixes).
- ASoC: stm32: dfsdm: manage cb buffers cleanup (git-fixes).
- ASoC: tas2764: Allow mono streams (git-fixes).
- ASoC: tas2764: Drop conflicting set_bias_level power setting (git-fixes).
- ASoC: tas2764: Fix mute/unmute (git-fixes).
- ASoC: tas2764: Fix set_tdm_slot in case of single slot (git-fixes).
- ASoC: tas2770: Allow mono streams (git-fixes).
- ASoC: tas2770: Drop conflicting set_bias_level power setting (git-fixes).
- ASoC: tas2770: Fix handling of mute/unmute (git-fixes).
- ASoC: tas2770: Fix set_tdm_slot in case of single slot (git-fixes).
- ASoC: tas2770: Reinit regcache on reset (git-fixes).
- ASoC: tas2770: Set correct FSYNC polarity (git-fixes).
- ASoC: wcd9335: fix order of Slimbus unprepare/disable (git-fixes).
- ASoC: wcd934x: fix order of Slimbus unprepare/disable (git-fixes).
- ASoC: wm5102: Fix PM disable depth imbalance in wm5102_probe (git-fixes).
- ASoC: wm5110: Fix PM disable depth imbalance in wm5110_probe (git-fixes).
- ASoC: wm8962: Add an event handler for TEMP_HP and TEMP_SPK (git-fixes).
- ASoC: wm8997: Fix PM disable depth imbalance in wm8997_probe (git-fixes).
- ASoC: wm_adsp: Add support for 'toggle' preloaders (bsc#1203699).
- ASoC: wm_adsp: Add trace caps to speaker protection FW (bsc#1203699).
- ASoC: wm_adsp: Cancel ongoing work when removing controls (bsc#1203699).
- ASoC: wm_adsp: Compressed stream DSP memory structs should be __packed (bsc#1203699).
- ASoC: wm_adsp: Correct control read size when parsing compressed buffer (bsc#1203699).
- ASoC: wm_adsp: Expand firmware loading search options (bsc#1203699).
- ASoC: wm_adsp: Fix event for preloader (bsc#1203699).
- ASoC: wm_adsp: Handle optional legacy support (git-fixes).
- ASoC: wm_adsp: Introduce cs_dsp logging macros (bsc#1203699).
- ASoC: wm_adsp: Make compressed buffers optional (bsc#1203699).
- ASoC: wm_adsp: Minor clean and redundant code removal (bsc#1203699).
- ASoC: wm_adsp: Move check for control existence (bsc#1203699).
- ASoC: wm_adsp: Move check of dsp->running to better place (bsc#1203699).
- ASoC: wm_adsp: Move sys_config_size to wm_adsp (bsc#1203699).
- ASoC: wm_adsp: Pass firmware names as parameters when starting DSP core (bsc#1203699).
- ASoC: wm_adsp: Remove pointless string comparison (bsc#1203699).
- ASoC: wm_adsp: Remove the wmfw_add_ctl helper function (bsc#1203699).
- ASoC: wm_adsp: Remove use of snd_ctl_elem_type_t (bsc#1203699).
- ASoC: wm_adsp: Rename generic DSP support (bsc#1203699).
- ASoC: wm_adsp: Separate generic cs_dsp_coeff_ctl handling (bsc#1203699).
- ASoC: wm_adsp: Separate some ASoC and generic functions (bsc#1203699).
- ASoC: wm_adsp: Separate wm_adsp specifics in cs_dsp_client_ops (bsc#1203699).
- ASoC: wm_adsp: Split DSP power operations into helper functions (bsc#1203699).
- ASoC: wm_adsp: Split out struct cs_dsp from struct wm_adsp (bsc#1203699).
- ASoC: wm_adsp: Switch to using wm_coeff_read_ctrl for compressed buffers (bsc#1203699).
- ASoC: wm_adsp: move firmware loading to client (bsc#1203699).
- ASoC: wm_adsp: remove a repeated including (bsc#1203699).
- ASoC: wm_adsp: wm_adsp_control_add() error: uninitialized symbol 'ret' (bsc#1203699).
- Bluetooth: 6LoWPAN: add missing hci_dev_put() in get_l2cap_conn() (git-fixes).
- Bluetooth: Add bt_skb_sendmmsg helper (git-fixes).
- Bluetooth: Add bt_skb_sendmsg helper (git-fixes).
- Bluetooth: Fix bt_skb_sendmmsg not allocating partial chunks (git-fixes).
- Bluetooth: Fix not cleanup led when bt_init fails (git-fixes).
- Bluetooth: Fix passing NULL to PTR_ERR (git-fixes).
- Bluetooth: L2CAP: Fix accepting connection request for invalid SPSM (git-fixes).
- Bluetooth: L2CAP: Fix attempting to access uninitialized memory (git-fixes).
- Bluetooth: L2CAP: Fix build errors in some archs (git-fixes).
- Bluetooth: L2CAP: Fix l2cap_global_chan_by_psm (git-fixes).
- Bluetooth: L2CAP: Fix l2cap_global_chan_by_psm regression (git-fixes).
- Bluetooth: L2CAP: Fix use-after-free caused by l2cap_chan_put (git-fixes).
- Bluetooth: L2CAP: Fix use-after-free caused by l2cap_reassemble_sdu (git-fixes).
- Bluetooth: L2CAP: Fix user-after-free (git-fixes).
- Bluetooth: L2CAP: initialize delayed works at l2cap_chan_create() (git-fixes).
- Bluetooth: MGMT: Fixes build warnings with C=1 (git-fixes).
- Bluetooth: RFCOMM: Fix possible deadlock on socket shutdown/release (git-fixes).
- Bluetooth: RFCOMM: Replace use of memcpy_from_msg with bt_skb_sendmmsg (git-fixes).
- Bluetooth: SCO: Fix sco_send_frame returning skb->len (git-fixes).
- Bluetooth: SCO: Replace use of memcpy_from_msg with bt_skb_sendmsg (git-fixes).
- Bluetooth: btintel: Mark Intel controller to support LE_STATES quirk (git-fixes).
- Bluetooth: btusb: Add Realtek RTL8852C support ID 0x04C5:0x1675 (git-fixes).
- Bluetooth: btusb: Add Realtek RTL8852C support ID 0x04CA:0x4007 (git-fixes).
- Bluetooth: btusb: Add Realtek RTL8852C support ID 0x0CB8:0xC558 (git-fixes).
- Bluetooth: btusb: Add Realtek RTL8852C support ID 0x13D3:0x3586 (git-fixes).
- Bluetooth: btusb: Add Realtek RTL8852C support ID 0x13D3:0x3587 (git-fixes).
- Bluetooth: btusb: Add support of IMC Networks PID 0x3568 (git-fixes).
- Bluetooth: btusb: mediatek: fix WMT failure during runtime suspend (git-fixes).
- Bluetooth: hci_bcm: Add BCM4349B1 variant (git-fixes).
- Bluetooth: hci_bcm: Add DT compatible for CYW55572 (git-fixes).
- Bluetooth: hci_core: Fix not handling link timeouts propertly (git-fixes).
- Bluetooth: hci_intel: Add check for platform_driver_register (git-fixes).
- Bluetooth: hci_sysfs: Fix attempting to call device_add multiple times (git-fixes).
- Bluetooth: hci_{ldisc,serdev}: check percpu_init_rwsem() failure (git-fixes).
- Bluetooth: virtio_bt: Use skb_put to set length (git-fixes).
- Decrease the number of SMB3 smbdirect client SGEs (bsc#1193629).
- Documentation: ACPI: EINJ: Fix obsolete example (git-fixes).
- Documentation: PM: Drop pme_interrupt reference (git-fixes).
- Documentation: add description for net.core.gro_normal_batch (git-fixes).
- Documentation: add description for net.sctp.ecn_enable (git-fixes).
- Documentation: add description for net.sctp.intl_enable (git-fixes).
- Documentation: add description for net.sctp.reconf_enable (git-fixes).
- Documentation: devres: add missing I2C helper (git-fixes).
- Documentation: dm writecache: Render status list as list (git-fixes).
- Documentation: fix sctp_wmem in ip-sysctl.rst (git-fixes).
- Documentation: fix udp_wmem_min in ip-sysctl.rst (git-fixes).
- Documentation: move watch_queue to core-api (git-fixes).
- Documentation: siphash: Fix typo in the name of offsetofend macro (git-fixes).
- Drivers: hv: Always reserve framebuffer region for Gen1 VMs (git-fixes).
- Drivers: hv: Fix syntax errors in comments (git-fixes).
- Drivers: hv: Never allocate anything besides framebuffer from framebuffer memory region (git-fixes).
- Drivers: hv: fix repeated words in comments (git-fixes).
- Drivers: hv: remove duplicate word in a comment (git-fixes).
- Drivers: hv: vmbus: Accept hv_sock offers in isolated guests (git-fixes).
- Drivers: hv: vmbus: Add VMbus IMC device to unsupported list (git-fixes).
- Drivers: hv: vmbus: Do not wait for the ACPI device upon initialization (git-fixes).
- Drivers: hv: vmbus: Fix handling of messages with transaction ID of zero (bsc#1204017).
- Drivers: hv: vmbus: Fix kernel-doc (git-fixes).
- Drivers: hv: vmbus: Introduce vmbus_request_addr_match() (bsc#1204017).
- Drivers: hv: vmbus: Introduce vmbus_sendpacket_getid() (bsc#1204017).
- Drivers: hv: vmbus: Introduce {lock,unlock}_requestor() (bsc#1204017).
- Drivers: hv: vmbus: Optimize vmbus_on_event (git-fixes).
- Drivers: hv: vmbus: Release cpu lock in error case (git-fixes).
- Drivers: hv: vmbus: Use PCI_VENDOR_ID_MICROSOFT for better discoverability (git-fixes).
- Drivers: hv: vmbus: fix double free in the error path of vmbus_add_channel_work() (git-fixes).
- Drivers: hv: vmbus: fix possible memory leak in vmbus_device_register() (git-fixes).
- Drivers: hv: vmbus: fix typo in comment (git-fixes).
- EDAC/dmc520: Do not print an error for each unconfigured interrupt line (bsc#1190497).
- EDAC/ghes: Set the DIMM label unconditionally (bsc#1201768).
- Enable livepatching related packages on -RT (jsc#PED-1706)
- HID: AMD_SFH: Add a DMI quirk entry for Chromebooks (git-fixes).
- HID: add Lenovo Yoga C630 battery quirk (git-fixes).
- HID: alps: Declare U1_UNICORN_LEGACY support (git-fixes).
- HID: amd_sfh: Add NULL check for hid device (git-fixes).
- HID: amd_sfh: Handle condition of 'no sensors' (git-fixes).
- HID: asus: ROG NKey: Ignore portion of 0x5a report (git-fixes).
- HID: core: fix shift-out-of-bounds in hid_report_raw_event (git-fixes).
- HID: cp2112: prevent a buffer overflow in cp2112_xfer() (git-fixes).
- HID: hid-input: add Surface Go battery quirk (git-fixes).
- HID: hid-lg4ff: Add check for empty lbuf (git-fixes).
- HID: hidraw: fix memory leak in hidraw_release() (git-fixes).
- HID: hyperv: fix possible memory leak in mousevsc_probe() (git-fixes).
- HID: ishtp-hid-clientHID: ishtp-hid-client: Fix comment typo (git-fixes).
- HID: magicmouse: Do not set BTN_MOUSE on double report (git-fixes).
- HID: mcp2221: prevent a buffer overflow in mcp_smbus_write() (git-fixes).
- HID: multitouch: Add memory barriers (git-fixes).
- HID: multitouch: new device class fix Lenovo X12 trackpad sticky (git-fixes).
- HID: playstation: add initial DualSense Edge controller support (git-fixes).
- HID: roccat: Fix use-after-free in roccat_read() (git-fixes).
- HID: saitek: add madcatz variant of MMO7 mouse device ID (git-fixes).
- HID: steam: Prevent NULL pointer dereference in steam_{recv,send}_report (git-fies).
- HID: thrustmaster: Add sparco wheel and fix array length (git-fixes).
- HID: usbhid: Add ALWAYS_POLL quirk for some mice (git-fixes).
- HID: wacom: Do not register pad_input for touch switch (git-fixes).
- HID: wacom: Only report rotation for art pen (git-fixes).
- HSI: omap_ssi: Fix refcount leak in ssi_probe (git-fixes).
- HSI: omap_ssi_port: Fix dma_map_sg error check (git-fixes).
- Handle variable number of SGEs in client smbdirect send (bsc#1193629).
- IB/core: Fix a nested dead lock as part of ODP flow (git-fixes)
- IB/hfi1: Correctly move list in sc_disable() (git-fixes)
- IB/rdmavt: Add __init/__exit annotations to module init/exit funcs (git-fixes)
- IB: Set IOVA/LENGTH on IB_MR in core/uverbs layers (git-fixes)
- Input: exc3000 - fix return value check of wait_for_completion_timeout (git-fixes).
- Input: goodix - add compatible string for GT1158 (git-fixes).
- Input: goodix - add support for GT1158 (git-fixes).
- Input: goodix - try resetting the controller when no config is set (git-fixes).
- Input: gscps2 - check return value of ioremap() in gscps2_probe() (git-fixes).
- Input: i8042 - add TUXEDO devices to i8042 quirk tables (git-fies).
- Input: i8042 - add additional TUXEDO devices to i8042 quirk tables (git-fies).
- Input: i8042 - fix leaking of platform device on module removal (git-fixes).
- Input: i8042 - fix refount leak on sparc (git-fixes).
- Input: i8042 - merge quirk tables (git-fies).
- Input: i8042 - move __initconst to fix code styling warning (git-fies).
- Input: iforce - add support for Boeder Force Feedback Wheel (git-fixes).
- Input: iforce - invert valid length check when fetching device IDs (git-fixes).
- Input: iforce - wake up after clearing IFORCE_XMIT_RUNNING flag (git-fixes).
- Input: iqs62x-keys - drop unused device node references (git-fixes).
- Input: melfas_mip4 - fix return value check in mip4_probe() (git-fixes).
- Input: raydium_ts_i2c - fix memory leak in raydium_i2c_send() (git-fixes).
- Input: rk805-pwrkey - fix module autoloading (git-fixes).
- Input: snvs_pwrkey - fix SNVS_HPVIDR1 register address (git-fixes).
- Input: soc_button_array - add Acer Switch V 10 to dmi_use_low_level_irq[] (git-fixes).
- Input: soc_button_array - add use_low_level_irq module parameter (git-fixes).
- Input: synaptics - switch touchpad on HP Laptop 15-da3001TU to RMI mode (git-fixes).
- Input: synaptics-rmi4 - fix firmware update operations with bootloader v8 (git-fixes).
- Input: xpad - add supported devices as contributed on github (git-fixes).
- Input: xpad - fix wireless 360 controller breaking after suspend (git-fixes).
- KABI: cgroup: Restore KABI of css_set (bsc#1201610).
- KEYS: asymmetric: enforce SM2 signature use pkey algo (git-fixes).
- KVM-x86-Avoid-theoretical-NULL-pointer-dereference-i.patch
- KVM-x86-Check-lapic_in_kernel-before-attempting-to-s.patch
- KVM-x86-Forbid-VMM-to-set-SYNIC-STIMER-MSRs-when-Syn.patch
- KVM: LAPIC: Also cancel preemption timer during SET_LAPIC (git-fixes).
- KVM: MMU: shadow nested paging does not have PKU (git-fixes).
- KVM: Move wiping of the kvm->vcpus array to common code (git-fixes).
- KVM: PPC: Book3S HV: Check return value of kvmppc_radix_init (bsc#1194869).
- KVM: PPC: Book3S HV: Prevent POWER7/8 TLB flush flushing SLB (bsc#1156395).
- KVM: PPC: Book3S HV: Remove kvmhv_p9_[set,restore]_lpcr declarations (bsc#1194869).
- KVM: PPC: Book3S HV: Use GLOBAL_TOC for kvmppc_h_set_dabr/xdabr() (bsc#1156395).
- KVM: PPC: Book3S HV: fix incorrect NULL check on list iterator (bsc#1194869).
- KVM: PPC: Book3s HV: Remove unused function kvmppc_bad_interrupt (bsc#1194869).
- KVM: PPC: Fix vmx/vsx mixup in mmio emulation (bsc#1156395).
- KVM: PPC: Use arch_get_random_seed_long instead of powernv variant (bsc#1156395).
- KVM: SEV: Mark nested locking of vcpu->lock (git-fixes).
- KVM: SVM: Create a separate mapping for the GHCB save area (jsc#SLE-19924, jsc#SLE-24814).
- KVM: SVM: Create a separate mapping for the SEV-ES save area (jsc#SLE-19924, jsc#SLE-24814).
- KVM: SVM: Define sev_features and VMPL field in the VMSA (jsc#SLE-19924, jsc#SLE-24814).
- KVM: SVM: Disable SEV-ES support if MMIO caching is disable (git-fixes).
- KVM: SVM: Do not BUG if userspace injects an interrupt with GIF=0 (git-fixes).
- KVM: SVM: Do not intercept #GP for SEV guests (git-fixes).
- KVM: SVM: Exit to userspace on ENOMEM/EFAULT GHCB errors (git-fixes).
- KVM: SVM: Stuff next_rip on emulated INT3 injection if NRIPS is supported (git-fixes).
- KVM: SVM: Unwind 'speculative' RIP advancement if INTn injection 'fails' (git-fixes).
- KVM: SVM: Update the SEV-ES save area mapping (jsc#SLE-19924, jsc#SLE-24814).
- KVM: SVM: adjust register allocation for __svm_vcpu_run() (git-fixes).
- KVM: SVM: fix panic on out-of-bounds guest IRQ (git-fixes).
- KVM: SVM: fix tsc scaling cache logic (bsc#1203263).
- KVM: SVM: move guest vmsave/vmload back to assembly (git-fixes).
- KVM: SVM: replace regs argument of __svm_vcpu_run() with vcpu_svm (git-fixes).
- KVM: SVM: retrieve VMCB from assembly (git-fixes).
- KVM: VMX: Add helper to check if the guest PMU has PERF_GLOBAL_CTRL (git-fixes).
- KVM: VMX: Drop bits 31:16 when shoving exception error code into VMCS (git-fixes).
- KVM: VMX: Heed the 'msr' argument in msr_write_intercepted() (git-fixes).
- KVM: VMX: Inject #PF on ENCLS as 'emulated' #PF (git-fixes).
- KVM: VMX: Mark all PERF_GLOBAL_(OVF)_CTRL bits reserved if there's no vPMU (git-fixes).
- KVM: VMX: Print VM-instruction error as unsigned (git-fixes).
- KVM: VMX: clear vmx_x86_ops.sync_pir_to_irr if APICv is disabled (bsc#1205007).
- KVM: VMX: fully disable SGX if SECONDARY_EXEC_ENCLS_EXITING unavailable (git-fixes).
- KVM: VMX: prepare sync_pir_to_irr for running with APICv disabled (git-fixes).
- KVM: VMX: switch blocked_vcpu_on_cpu_lock to raw spinlock (git-fixes).
- KVM: X86: Fix when shadow_root_level=5 && guest root_level<4 (git-fixes).
- KVM: X86: Use vcpu->arch.walk_mmu for kvm_mmu_invlpg() (git-fixes).
- KVM: X86: avoid uninitialized 'fault.async_page_fault' from fixed-up #PF (git-fixes).
- KVM: arm64: Avoid setting the upper 32 bits of TCR_EL2 and CPTR_EL2 (bsc#1201442)
- KVM: fix avic_set_running for preemptable kernels (git-fixes).
- KVM: nVMX: Always enable TSC scaling for L2 when it was enabled for L1 (git-fixes).
- KVM: nVMX: Attempt to load PERF_GLOBAL_CTRL on nVMX xfer iff it exists (git-fixes).
- KVM: nVMX: Defer APICv updates while L2 is active until L1 is active (git-fixes).
- KVM: nVMX: Ignore SIPI that arrives in L2 when vCPU is not in WFS (git-fixes).
- KVM: nVMX: Inject #UD if VMXON is attempted with incompatible CR0/CR4 (git-fixes).
- KVM: nVMX: Let userspace set nVMX MSR to any _host_ supported value (git-fixes).
- KVM: nVMX: Rename handle_vm{on,off}() to handle_vmx{on,off}() (git-fixes).
- KVM: nVMX: Set UMIP bit CR4_FIXED1 MSR when emulating UMIP (git-fixes).
- KVM: nVMX: Snapshot pre-VM-Enter BNDCFGS for !nested_run_pending case (git-fixes).
- KVM: nVMX: Snapshot pre-VM-Enter DEBUGCTL for !nested_run_pending case (git-fixes).
- KVM: nVMX: Synthesize TRIPLE_FAULT for L2 if emulation is required (git-fixes).
- KVM: nVMX: Unconditionally purge queued/injected events on nested 'exit' (git-fixes).
- KVM: nVMX: do not use vcpu->arch.efer when checking host state on nested state load (git-fixes).
- KVM: s390: Add a routine for setting userspace CPU state (git-fixes jsc#PED-611).
- KVM: s390: Clarify SIGP orders versus STOP/RESTART (git-fixes).
- KVM: s390: Simplify SIGP Set Arch handling (git-fixes jsc#PED-611).
- KVM: s390: pv: do not allow userspace to set the clock under PV (git-fixes).
- KVM: s390: pv: do not present the ecall interrupt twice (bsc#1203229 LTC#199905).
- KVM: s390: pv: leak the topmost page table when destroy fails (git-fixes).
- KVM: s390x: fix SCK locking (git-fixes).
- KVM: selftests: Make sure kvm_create_max_vcpus test won't hit RLIMIT_NOFILE (git-fixes).
- KVM: selftests: Silence compiler warning in the kvm_page_table_test (git-fixes).
- KVM: x86/emulator: Fix handing of POP SS to correctly set interruptibility (git-fixes).
- KVM: x86/mmu: Do not advance iterator after restart due to yielding (git-fixes).
- KVM: x86/mmu: Do not freak out if pml5_root is NULL on 4-level host (git-fixes).
- KVM: x86/mmu: Fix wrong/misleading comments in TDP MMU fast zap (git-fixes).
- KVM: x86/mmu: Move 'invalid' check out of kvm_tdp_mmu_get_root() (git-fixes).
- KVM: x86/mmu: Retry page fault if root is invalidated by memslot update (git-fixes).
- KVM: x86/mmu: WARN if old _or_ new SPTE is REMOVED in non-atomic path (git-fixes).
- KVM: x86/mmu: Zap _all_ roots when unmapping gfn range in TDP MMU (git-fixes).
- KVM: x86/mmu: fix memoryleak in kvm_mmu_vendor_module_init() (git-fixes).
- KVM: x86/mmu: include EFER.LMA in extended mmu role (git-fixes).
- KVM: x86/mmu: make apf token non-zero to fix bug (git-fixes).
- KVM: x86/pmu: Add pmc->intr to refactor kvm_perf_overflow{_intr}() (git-fixes).
- KVM: x86/pmu: Do not truncate the PerfEvtSeln MSR when creating a perf event (git-fixes).
- KVM: x86/pmu: Fix and isolate TSX-specific performance event logic (git-fixes).
- KVM: x86/pmu: Fix available_event_types check for REF_CPU_CYCLES event (git-fixes).
- KVM: x86/pmu: Refactoring find_arch_event() to pmc_perf_hw_id() (git-fixes).
- KVM: x86/pmu: Update AMD PMC sample period to fix guest NMI-watchdog (git-fixes).
- KVM: x86/pmu: Use different raw event masks for AMD and Intel (git-fixes).
- KVM: x86/svm: Account for family 17h event renumberings in amd_pmc_perf_hw_id (git-fixes).
- KVM: x86: Add KVM_CAP_ENABLE_CAP to x86 (git-fixes).
- KVM: x86: Add compat handler for KVM_X86_SET_MSR_FILTER (git-fixes).
- KVM: x86: Always set kvm_run->if_flag (git-fixes).
- KVM: x86: Avoid theoretical NULL pointer dereference in kvm_irq_delivery_to_apic_fast() (git-fixes).
- KVM: x86: Check lapic_in_kernel() before attempting to set a SynIC irq (git-fixes).
- KVM: x86: Forbid VMM to set SYNIC/STIMER MSRs when SynIC wasn't activated (git-fixes).
- KVM: x86: Forcibly leave nested virt when SMM state is toggled (git-fixes).
- KVM: x86: Fully initialize 'struct kvm_lapic_irq' in kvm_pv_kick_cpu_op() (git-fixes).
- KVM: x86: Hide IA32_PLATFORM_DCA_CAP[31:0] from the guest (git-fixes).
- KVM: x86: Inject #UD on emulated XSETBV if XSAVES isn't enabled (git-fixes).
- KVM: x86: Keep MSR_IA32_XSS unchanged for INIT (git-fixes).
- KVM: x86: Mark TSS busy during LTR emulation _after_ all fault checks (git-fixes).
- KVM: x86: Mask off reserved bits in CPUID.80000001H (git-fixes).
- KVM: x86: Mask off reserved bits in CPUID.80000006H (git-fixes).
- KVM: x86: Mask off reserved bits in CPUID.80000008H (git-fixes).
- KVM: x86: Mask off reserved bits in CPUID.8000001AH (git-fixes).
- KVM: x86: Move lookup of indexed CPUID leafs to helper (jsc#SLE-19924, jsc#SLE-24814).
- KVM: x86: Register perf callbacks after calling vendor's hardware_setup() (git-fixes).
- KVM: x86: Report error when setting CPUID if Hyper-V allocation fails (git-fixes).
- KVM: x86: Retry page fault if MMU reload is pending and root has no sp (bsc#1205744).
- KVM: x86: SVM: do not passthrough SMAP/SMEP/PKE bits in !NPT && !gCR0.PG case (git-fixes).
- KVM: x86: Set error code to segment selector on LLDT/LTR non-canonical #GP (git-fixes).
- KVM: x86: Signal #GP, not -EPERM, on bad WRMSR(MCi_CTL/STATUS) (git-fixes).
- KVM: x86: Sync the states size with the XCR0/IA32_XSS at, any time (git-fixes).
- KVM: x86: Treat #DBs from the emulator as fault-like (code and DR7.GD=1) (git-fixes).
- KVM: x86: Update vPMCs when retiring branch instructions (git-fixes).
- KVM: x86: Update vPMCs when retiring instructions (git-fixes).
- KVM: x86: Use __try_cmpxchg_user() to emulate atomic accesses (git-fixes).
- KVM: x86: Use __try_cmpxchg_user() to update guest PTE A/D bits (git-fixes).
- KVM: x86: avoid loading a vCPU after .vm_destroy was called (git-fixes).
- KVM: x86: check PIR even for vCPUs with disabled APICv (git-fixes).
- KVM: x86: do not report preemption if the steal time cache is stale (git-fixes).
- KVM: x86: emulator: em_sysexit should update ctxt->mode (git-fixes).
- KVM: x86: emulator: introduce emulator_recalc_and_set_mode (git-fixes).
- KVM: x86: emulator: update the emulation mode after CR0 write (git-fixes).
- KVM: x86: emulator: update the emulation mode after rsm (git-fixes).
- KVM: x86: hyper-v: Drop redundant 'ex' parameter from kvm_hv_flush_tlb() (git-fixes).
- KVM: x86: hyper-v: Drop redundant 'ex' parameter from kvm_hv_send_ipi() (git-fixes).
- KVM: x86: hyper-v: HVCALL_SEND_IPI_EX is an XMM fast hypercall (git-fixes).
- KVM: x86: ignore APICv if LAPIC is not enabled (git-fixes).
- KVM: x86: nSVM/nVMX: set nested_run_pending on VM entry which is a result of RSM (git-fixes).
- KVM: x86: nSVM: fix potential NULL derefernce on nested migration (git-fixes).
- KVM: x86: nSVM: mark vmcb01 as dirty when restoring SMM saved state (git-fixes).
- KVM: x86: remove PMU FIXED_CTR3 from msrs_to_save_all (git-fixes).
- KVM: x86: revalidate steal time cache if MSR value changes (git-fixes).
- KVM: x86: use a separate asm-offsets.c file (git-fixes).
- MIPS: Loongson: Use hwmon_device_register_with_groups() to register hwmon (git-fixes).
- NFC: nci: Bounds check struct nfc_target arrays (git-fixes).
- NFC: nci: fix memory leak in nci_rx_data_packet() (git-fixes).
- NFS: Fix WARN_ON due to unionization of nfs_inode.nrequests (git-fixes).
- NFS: Fix another fsync() issue after a server reboot (git-fixes).
- NFS: LOOKUP_DIRECTORY is also ok with symlinks (git-fixes).
- NFSD: Clamp WRITE offsets (git-fixes).
- NFSD: Clean up the show_nf_flags() macro (git-fixes).
- NFSD: Fix NFSv3 SETATTR/CREATE's handling of large file sizes (git-fixes).
- NFSD: Fix ia_size underflow (git-fixes).
- NFSD: Fix offset type in I/O trace points (git-fixes).
- NFSD: Fix possible sleep during nfsd4_release_lockowner() (git-fixes).
- NFSD: prevent integer overflow on 32 bit systems (git-fixes).
- NFSD: prevent underflow in nfssvc_decode_writeargs() (git-fixes).
- NFSD: restore EINVAL error translation in nfsd_commit() (git-fixes).
- NFSv4.1: Do not decrease the value of seq_nr_highest_sent (git-fixes).
- NFSv4.1: Handle NFS4ERR_DELAY replies to OP_SEQUENCE correctly (git-fixes).
- NFSv4.1: RECLAIM_COMPLETE must handle EACCES (git-fixes).
- NFSv4.2 fix problems with __nfs42_ssc_open (git-fixes).
- NFSv4.2: Update mode bits after ALLOCATE and DEALLOCATE (git-fixes).
- NFSv4: Fix races in the legacy idmapper upcall (git-fixes).
- NFSv4: Fixes for nfs4_inode_return_delegation() (git-fixes).
- NFSv4: Turn off open-by-filehandle and NFS re-export for NFSv4.0 (git-fixes).
- NTB: ntb_tool: uninitialized heap data in tool_fn_write() (git-fixes).
- PCI/ACPI: Guard ARM64-specific mcfg_quirks (git-fixes).
- PCI/AER: Iterate over error counters instead of error strings (git-fixes).
- PCI/ASPM: Correct LTR_L1.2_THRESHOLD computation (git-fixes).
- PCI/ASPM: Ignore L1 PM Substates if device lacks capability (git-fixes).
- PCI/ASPM: Make Intel DG2 L1 acceptable latency unlimited (jsc#PED-387).
- PCI/portdrv: Do not disable AER reporting in get_port_device_capability() (git-fixes).
- PCI: Add ACS quirk for Broadcom BCM5750x NICs (git-fixes).
- PCI: Correct misspelled words (git-fixes).
- PCI: Disable MSI for Tegra234 Root Ports (git-fixes).
- PCI: Fix used_buses calculation in pci_scan_child_bus_extend() (git-fixes).
- PCI: Move PCI_VENDOR_ID_MICROSOFT/PCI_DEVICE_ID_HYPERV_VIDEO definitions to pci_ids.h (git-fixes).
- PCI: Prefer 'unsigned int' over bare 'unsigned' (git-fixes).
- PCI: Sanitise firmware BAR assignments behind a PCI-PCI bridge (git-fixes).
- PCI: aardvark: Fix reporting Slot capabilities on emulated bridge (git-fixes).
- PCI: dwc: Add unroll iATU space support to dw_pcie_disable_atu() (git-fixes).
- PCI: dwc: Always enable CDM check if 'snps,enable-cdm-check' exists (git-fixes).
- PCI: dwc: Deallocate EPC memory on dw_pcie_ep_init() errors (git-fixes).
- PCI: dwc: Disable outbound windows only for controllers using iATU (git-fixes).
- PCI: dwc: Set INCREASE_REGION_SIZE flag based on limit address (git-fixes).
- PCI: dwc: Stop link on host_init errors and de-initialization (git-fixes).
- PCI: endpoint: Do not stop controller when unbinding endpoint function (git-fixes).
- PCI: hv: Add validation for untrusted Hyper-V values (git-fixes).
- PCI: hv: Fix synchronization between channel callback and hv_compose_msi_msg() (bsc#1204017).
- PCI: hv: Fix synchronization between channel callback and hv_pci_bus_exit() (bsc#1204017).
- PCI: hv: Fix the definition of vector in hv_compose_msi_msg() (git-fixes).
- PCI: hv: Only reuse existing IRTE allocation for Multi-MSI (bsc#1200845).
- PCI: hv: Use vmbus_requestor to generate transaction IDs for VMbus hardening (bsc#1204017).
- PCI: mediatek-gen3: Change driver name to mtk-pcie-gen3 (git-fixes).
- PCI: microchip: Fix refcount leak in mc_pcie_init_irq_domains() (git-fixes).
- PCI: qcom: Power on PHY before IPQ8074 DBI register accesses (git-fixes).
- PCI: qcom: Set up rev 2.1.0 PARF_PHY before enabling clocks (git-fixes).
- PCI: tegra194: Fix PM error handling in tegra_pcie_config_ep() (git-fixes).
- PCI: tegra194: Fix Root Port interrupt handling (git-fixes).
- PCI: tegra194: Fix link up retry sequence (git-fixes).
- PM: domains: Ensure genpd_debugfs_dir exists before remove (git-fixes).
- PM: domains: Fix handling of unavailable/disabled idle states (git-fixes).
- PM: hibernate: Allow hybrid sleep to work with s2idle (git-fixes).
- PM: hibernate: defer device probing when resuming from hibernation (git-fixes).
- RDMA/cm: Fix memory leak in ib_cm_insert_listen (git-fixes)
- RDMA/cm: Use SLID in the work completion as the DLID in responder side (git-fixes)
- RDMA/cma: Fix arguments order in net device validation (git-fixes)
- RDMA/cma: Use output interface for net_dev check (git-fixes)
- RDMA/core: Fix null-ptr-deref in ib_core_cleanup() (git-fixes)
- RDMA/hfi1: Fix potential integer multiplication overflow errors (git-fixes)
- RDMA/hfi1: Prevent panic when SDMA is disabled (git-fixes)
- RDMA/hfi1: Prevent use of lock before it is initialized (git-fixes)
- RDMA/hfi1: fix potential memory leak in setup_base_ctxt() (git-fixes)
- RDMA/hns: Add the detection for CMDQ status in the device initialization process (git-fixes)
- RDMA/hns: Correct the type of variables participating in the shift operation (git-fixes)
- RDMA/hns: Disable local invalidate operation (git-fixes)
- RDMA/hns: Fix incorrect clearing of interrupt status register (git-fixes)
- RDMA/hns: Fix supported page size (git-fixes)
- RDMA/hns: Fix wrong fixed value of qp->rq.wqe_shift (git-fixes)
- RDMA/hns: Remove magic number (git-fixes)
- RDMA/hns: Remove the num_cqc_timer variable (git-fixes)
- RDMA/hns: Remove the num_qpc_timer variable (git-fixes)
- RDMA/hns: Remove unnecessary check for the sgid_attr when modifying QP (git-fixes)
- RDMA/hns: Replace tab with space in the right-side comments (git-fixes)
- RDMA/hns: Use hr_reg_xxx() instead of remaining roce_set_xxx() (git-fixes)
- RDMA/irdma: Add support for address handle re-use (git-fixes)
- RDMA/irdma: Align AE id codes to correct flush code and event (git-fixes)
- RDMA/irdma: Do not advertise 1GB page size for x722 (git-fixes)
- RDMA/irdma: Fix VLAN connection with wildcard address (git-fixes)
- RDMA/irdma: Fix a window for use-after-free (git-fixes)
- RDMA/irdma: Fix deadlock in irdma_cleanup_cm_core() (git-fixes)
- RDMA/irdma: Fix setting of QP context err_rq_idx_valid field (git-fixes)
- RDMA/irdma: Fix sleep from invalid context BUG (git-fixes)
- RDMA/irdma: Move union irdma_sockaddr to header file (git-fixes)
- RDMA/irdma: Remove the unnecessary variable saddr (git-fixes)
- RDMA/irdma: Report RNR NAK generation in device caps (git-fixes)
- RDMA/irdma: Report the correct max cqes from query device (git-fixes)
- RDMA/irdma: Return correct WC error for bind operation failure (git-fixes)
- RDMA/irdma: Return error on MR deregister CQP failure (git-fixes)
- RDMA/irdma: Use net_type to check network type (git-fixes)
- RDMA/irdma: Use s/g array in post send only when its valid (git-fixes)
- RDMA/irdma: Validate udata inlen and outlen (git-fixes)
- RDMA/mlx5: Add missing check for return value in get namespace flow (git-fixes)
- RDMA/mlx5: Do not compare mkey tags in DEVX indirect mkey (git-fixes)
- RDMA/mlx5: Set local port to one when accessing counters (git-fixes)
- RDMA/qedr: Fix potential memory leak in __qedr_alloc_mr() (git-fixes)
- RDMA/qedr: Fix reporting QP timeout attribute (git-fixes)
- RDMA/qedr: clean up work queue on failure in qedr_alloc_resources() (git-fixes)
- RDMA/rtrs-clt: Use the right sg_cnt after ib_dma_map_sg (git-fixes)
- RDMA/rtrs-srv: Fix modinfo output for stringify (git-fixes)
- RDMA/rxe: Fix 'kernel NULL pointer dereference' error (git-fixes)
- RDMA/rxe: Fix deadlock in rxe_do_local_ops() (git-fixes)
- RDMA/rxe: Fix error unwind in rxe_create_qp() (git-fixes)
- RDMA/rxe: Fix mw bind to allow any consumer key portion (git-fixes)
- RDMA/rxe: Fix resize_finish() in rxe_queue.c (git-fixes)
- RDMA/rxe: Fix rnr retry behavior (git-fixes)
- RDMA/rxe: Fix the error caused by qp->sk (git-fixes)
- RDMA/rxe: For invalidate compare according to set keys in mr (git-fixes)
- RDMA/rxe: Generate a completion for unsupported/invalid opcode (git-fixes)
- RDMA/rxe: Limit the number of calls to each tasklet (git-fixes)
- RDMA/rxe: Remove useless pkt parameters (git-fixes)
- RDMA/siw: Always consume all skbuf data in sk_data_ready() upcall. (git-fixes)
- RDMA/siw: Fix QP destroy to wait for all references dropped. (git-fixes)
- RDMA/siw: Fix duplicated reported IW_CM_EVENT_CONNECT_REPLY event (git-fixes)
- RDMA/siw: Pass a pointer to virt_to_page() (git-fixes)
- RDMA/srp: Fix srp_abort() (git-fixes)
- RDMA/srp: Handle dev_set_name() failure (git-fixes)
- RDMA/srp: Rework the srp_add_port() error path (git-fixes)
- RDMA/srp: Set scmnd->result only when scmnd is not NULL (git-fixes)
- RDMA/srp: Support more than 255 rdma ports (git-fixes)
- RDMA/srp: Use the attribute group mechanism for sysfs attributes (git-fixes)
- RDMA/srpt: Duplicate port name members (git-fixes)
- RDMA/srpt: Fix a use-after-free (git-fixes)
- RDMA/srpt: Introduce a reference count in struct srpt_device (git-fixes)
- RDMA/usnic: fix set-but-not-unused variable 'flags' warning (git-fixes)
- RDMA: remove useless condition in siw_create_cq() (git-fixes)
- Reduce client smbdirect max receive segment size (bsc#1193629).
- Refresh nvme in-band authentication patches (bsc#1199086)
- Refresh patches.suse/iommu-vt-d-Acquiring-lock-in-domain-ID-allocation-helpers Fix spin deadlock in intel_iommu (bsc#1203505)
- Refresh patches.suse/iwlwifi-module-firmware-ucode-fix.patch (bsc#1202131) Now iwlwifi queries *-72.ucode, but again, this is non-existing version. Correct to the existing *-71.ucode
- Refresh patches.suse/ppc64-kdump-Limit-kdump-base-to-512MB.patch to upstream version.
- Remove doubly applied amdgpu patches
- Replace the in-house patch by the above upstream version, patches.suse/md-raid0-fix-buffer-overflow-at-debug-print.patch.
- Revert 'ALSA: hda: cs35l41: Allow compilation test on non-ACPI configurations' (bsc#1203699).
- Revert 'ALSA: usb-audio: Split endpoint setups for hw_params and prepare' (git-fixes).
- Revert 'SUNRPC: Remove unreachable error condition' (git-fixes).
- Revert 'arm64: Mitigate MTE issues with str{n}cmp()' (git-fixes)
- Revert 'clk: core: Honor CLK_OPS_PARENT_ENABLE for clk gate ops' (git-fixes).
- Revert 'constraints: increase disk space for all architectures' (bsc#1203693). This reverts commit 43a9011f904bc7328d38dc340f5e71aecb6b19ca.
- Revert 'crypto: qat - reduce size of mapped region' (git-fixes).
- Revert 'drivers/video/backlight/platform_lcd.c: add support for device tree based probe' (git-fixes).
- Revert 'drm/amdgpu: use dirty framebuffer helper' (git-fixes).
- Revert 'drm/i915: Hold reference to intel_context over life of i915_request' (git-fixes).
- Revert 'drm/udl: Kill pending URBs at suspend and disconnect' (bsc#1195917).
- Revert 'drm/vc4: hvs: Reset muxes at probe time (git-fixes).' (bsc#1202341) This reverts commit 303122d0f2160411fa1068220bc59849d848550d. The reverted change clears hardware state on the RPi4, which leaves the screen blank. Without it, the display works correctly.
- Revert 'drm: bridge: analogix/dp: add panel prepare/unprepare in suspend/resume time' (git-fixes).
- Revert 'firmware: arm_scmi: Add clock management to the SCMI power domain' (git-fixes).
- Revert 'ice: Hide bus-info in ethtool for PRs in switchdev mode' (git-fixes).
- Revert 'ipv6: Honor all IPv6 PIO Valid Lifetime values' (bsc#1202989).
- Revert 'net: phy: meson-gxl: improve link-up behavior' (git-fixes).
- Revert 'net: usb: ax88179_178a needs FLAG_SEND_ZLP' (git-fixes).
- Revert 'pNFS: nfs3_set_ds_client should set NFS_CS_NOPING' (git-fixes).
- Revert 'powerpc/rtas: Implement reentrant rtas call' (bsc#1203664 ltc#199236).
- Revert 'scripts/mod/modpost.c: permit '.cranges' secton for sh64 architecture.' (git-fixes).
- Revert 'tty: n_gsm: avoid call of sleeping functions from atomic context' (git-fixes).
- Revert 'tty: n_gsm: replace kicktimer with delayed_work' (git-fixes).
- Revert 'usb: add quirks for Lenovo OneLink+ Dock' (git-fixes).
- Revert 'usb: dwc3: disable USB core PHY management' (git-fixes).
- Revert 'usb: gadget: udc-xilinx: replace memcpy with memcpy_toio' (git-fixes).
- Revert 'usb: storage: Add quirk for Samsung Fit flash' (git-fixes).
- Revert 'workqueue: remove unused cancel_work()' (bsc#1204933).
- Revert 'x86/sev: Expose sev_es_ghcb_hv_call() for use by HyperV' (bsc#1190497).
- Revert selftest patches that have been reverted in stable-5.15.y
- SCSI: scsi_probe_lun: retry INQUIRY after timeout (bsc#1189297).
- SMB3: fix lease break timeout when multiple deferred close handles for the same file (bsc#1193629).
- SUNRPC: Do not call connect() more than once on a TCP socket (git-fixes).
- SUNRPC: Do not leak sockets in xs_local_connect() (git-fixes).
- SUNRPC: Fix NFSD's request deferral on RDMA transports (git-fixes).
- SUNRPC: Fix READ_PLUS crasher (git-fixes).
- SUNRPC: Fix xdr_encode_bool() (git-fixes).
- SUNRPC: Prevent immediate close+reconnect (git-fixes).
- SUNRPC: RPC level errors should set task->tk_rpc_status (git-fixes).
- SUNRPC: Reinitialise the backchannel request buffers before reuse (git-fixes).
- USB: Fix ehci infinite suspend-resume loop issue in zhaoxin (git-fixes).
- USB: Follow-up to SPDX GPL-2.0+ identifiers addition - remove now useless comments (git-fixes).
- USB: Follow-up to SPDX identifiers addition - remove now useless comments (git-fixes).
- USB: add RESET_RESUME quirk for NVIDIA Jetson devices in RCM (git-fixes).
- USB: bcma: Make GPIO explicitly optional (git-fixes).
- USB: cdc-acm: Add Icom PMR F3400 support (0c26:0020) (git-fixes).
- USB: core: Fix RST error in hub.c (git-fixes).
- USB: core: Prevent nested device-reset calls (git-fixes).
- USB: serial: ch314: use usb_control_msg_recv() (git-fixes).
- USB: serial: ch341: fix disabled rx timer on older devices (git-fixes).
- USB: serial: ch341: fix lost character on LCR updates (git-fixes).
- USB: serial: console: move mutex_unlock() before usb_serial_put() (git-fixes).
- USB: serial: cp210x: add Decagon UCA device id (git-fixes).
- USB: serial: fix tty-port initialized comments (git-fixes).
- USB: serial: ftdi_sio: add Omron CS1W-CIF31 device id (git-fixes).
- USB: serial: ftdi_sio: fix 300 bps rate for SIO (git-fixes).
- USB: serial: option: add Fibocom FM160 0x0111 composition (git-fixes).
- USB: serial: option: add Quectel BG95 0x0203 composition (git-fixes).
- USB: serial: option: add Quectel EM060K modem (git-fixes).
- USB: serial: option: add Quectel RM520N (git-fixes).
- USB: serial: option: add Sierra Wireless EM9191 (git-fixes).
- USB: serial: option: add support for Cinterion MV32-WA/WB RmNet mode (git-fixes).
- USB: serial: option: add support for OPPO R11 diag port (git-fixes).
- USB: serial: option: add u-blox LARA-L6 modem (git-fixes).
- USB: serial: option: add u-blox LARA-R6 00B modem (git-fixes).
- USB: serial: option: remove old LARA-R6 PID (git-fixes).
- USB: serial: qcserial: add new usb-id for Dell branded EM7455 (git-fixes).
- XArray: Update the LRU list in xas_split() (git-fixes).
- add another bug reference to some hyperv changes (bsc#1205617).
- apparmor: Fix failed mount permission check error message (git-fixes).
- apparmor: Fix memleak in aa_simple_write_to_buffer() (git-fixes).
- apparmor: fix aa_label_asxprint return check (git-fixes).
- apparmor: fix absroot causing audited secids to begin with = (git-fixes).
- apparmor: fix overlapping attachment computation (git-fixes).
- apparmor: fix quiet_denied for file rules (git-fixes).
- apparmor: fix reference count leak in aa_pivotroot() (git-fixes).
- apparmor: fix setting unconfined mode on a loaded profile (git-fixes).
- arcnet: fix potential memory leak in com20020_probe() (git-fixes).
- arm64/bti: Disable in kernel BTI when cross section thunks are broken (git-fixes)
- arm64/mm: Consolidate TCR_EL1 fields (git-fixes).
- arm64/syscall: Include asm/ptrace.h in syscall_wrapper header (git-fixes).
- arm64: Add AMPERE1 to the Spectre-BHB affected list (git-fixes).
- arm64: Do not forget syscall when starting a new thread (git-fixes).
- arm64: Fix bit-shifting UB in the MIDR_CPU_MODEL() macro (git-fixes)
- arm64: Fix match_list for erratum 1286807 on Arm Cortex-A76 (git-fixes).
- arm64: cpufeature: Allow different PMU versions in ID_DFR0_EL1 (git-fixes).
- arm64: dts: allwinner: a64: orangepi-win: Fix LED node name (git-fixes).
- arm64: dts: imx8: correct clock order (git-fixes).
- arm64: dts: imx8mm: Fix NAND controller size-cells (git-fixes).
- arm64: dts: imx8mn: Fix NAND controller size-cells (git-fixes).
- arm64: dts: imx8mp: Add snps,gfladj-refclk-lpm-sel quirk to USB nodes (git-fixes).
- arm64: dts: imx8mq-librem5: Add bq25895 as max17055's power supply (git-fixes).
- arm64: dts: juno: Add thermal critical trip points (git-fixes).
- arm64: dts: ls1088a: specify clock frequencies for the MDIO controllers (git-fixes).
- arm64: dts: ls208xa: specify clock frequencies for the MDIO controllers (git-fixes).
- arm64: dts: lx2160a: specify clock frequencies for the MDIO controllers (git-fixes).
- arm64: dts: mt7622: fix BPI-R64 WPS button (git-fixes).
- arm64: dts: mt8192: Fix idle-states entry-method (git-fixes).
- arm64: dts: mt8192: Fix idle-states nodes naming scheme (git-fixes).
- arm64: dts: qcom: ipq8074: fix NAND node name (git-fixes).
- arm64: dts: qcom: msm8916: Fix typo in pronto remoteproc node (git-fixes).
- arm64: dts: qcom: qcs404: Fix incorrect USB2 PHYs assignment (git-fixes).
- arm64: dts: qcom: sa8155p-adp: Specify which LDO modes are allowed (git-fixes).
- arm64: dts: qcom: sc7280: Cleanup the lpasscc node (git-fixes).
- arm64: dts: qcom: sm8150-xperia-kumano: Specify which LDO modes are allowed (git-fixes).
- arm64: dts: qcom: sm8250-xperia-edo: Specify which LDO modes are allowed (git-fixes).
- arm64: dts: qcom: sm8250: add missing PCIe PHY clock-cells (git-fixes).
- arm64: dts: qcom: sm8350-hdk: Specify which LDO modes are allowed (git-fixes).
- arm64: dts: qcom: sm8350: fix UFS PHY serdes size (git-fixes).
- arm64: dts: renesas: Fix thermal-sensors on single-zone sensors (git-fixes).
- arm64: dts: renesas: beacon: Fix regulator node names (git-fixes).
- arm64: dts: rockchip: Fix typo in lisense text for PX30.Core (git-fixes).
- arm64: dts: rockchip: Pull up wlan wake# on Gru-Bob (git-fixes).
- arm64: dts: rockchip: Remove 'enable-active-low' from rk3399-puma (git-fixes).
- arm64: dts: rockchip: Set RK3399-Gru PCLK_EDP to 24 MHz (git-fixes).
- arm64: dts: rockchip: add enable-strobe-pulldown to emmc phy on nanopi4 (git-fixes).
- arm64: dts: rockchip: lower rk3399-puma-haikou SD controller clock frequency (git-fixes).
- arm64: dts: ti: k3-j7200: fix main pinmux range (git-fixes).
- arm64: dts: uniphier: Fix USB interrupts for PXs3 SoC (git-fixes).
- arm64: efi: Fix handling of misaligned runtime regions and drop warning (git-fixes).
- arm64: entry: avoid kprobe recursion (git-fixes).
- arm64: errata: Add Cortex-A510 to the repeat tlbi list (git-fixes) Enable this errata fix configuration option to arm64/default.
- arm64: errata: Add Cortex-A55 to the repeat tlbi list (git-fixes). Enable CONFIG_ARM64_ERRATUM_2441007, too
- arm64: errata: Remove AES hwcap for COMPAT tasks (git-fixes) Enable CONFIG_ARM64_ERRATUM_1742098 in arm64/default
- arm64: fix oops in concurrently setting insn_emulation sysctls (git-fixes).
- arm64: fix rodata=full (git-fixes).
- arm64: fix rodata=full again (git-fixes)
- arm64: ftrace: fix module PLTs with mcount (git-fixes).
- arm64: kasan: Revert 'arm64: mte: reset the page tag in page->flags' (git-fixes).
- arm64: kexec_file: use more system keyrings to verify kernel image signature (bsc#1196444).
- arm64: lib: Import latest version of Arm Optimized Routines' strcmp (git-fixes)
- arm64: mte: Avoid setting PG_mte_tagged if no tags cleared or restored (git-fixes).
- arm64: select TRACE_IRQFLAGS_NMI_SUPPORT (git-fixes)
- arm64: set UXN on swapper page tables (git-fixes).
- arm64: tegra: Fix SDMMC1 CD on P2888 (git-fixes).
- arm64: tegra: Fixup SYSRAM references (git-fixes).
- arm64: tegra: Mark BPMP channels as no-memory-wc (git-fixes).
- arm64: tegra: Update Tegra234 BPMP channel addresses (git-fixes).
- arm64: topology: fix possible overflow in amu_fie_setup() (git-fixes).
- arm64: topology: move store_cpu_topology() to shared code (git-fixes).
- arm_pmu: Validate single/group leader events (git-fixes).
- asm-generic: remove a broken and needless ifdef conditional (git-fixes).
- asm-generic: sections: refactor memory_intersects (git-fixes).
- ata: ahci-imx: Fix MODULE_ALIAS (git-fixes).
- ata: fix ata_id_has_devslp() (git-fixes).
- ata: fix ata_id_has_dipm() (git-fixes).
- ata: fix ata_id_has_ncq_autosense() (git-fixes).
- ata: fix ata_id_sense_reporting_enabled() and ata_id_has_sense_reporting() (git-fixes).
- ata: libahci_platform: Sanity check the DT child nodes number (git-fixes).
- ata: libata-core: do not issue non-internal commands once EH is pending (git-fixes).
- ata: libata-eh: Add missing command name (git-fixes).
- ata: libata-scsi: fix SYNCHRONIZE CACHE (16) command failure (git-fixes).
- ata: libata-scsi: simplify __ata_scsi_queuecmd() (git-fixes).
- ata: libata-transport: fix double ata_host_put() in ata_tport_add() (git-fixes).
- ata: libata-transport: fix error handling in ata_tdev_add() (git-fixes).
- ata: libata-transport: fix error handling in ata_tlink_add() (git-fixes).
- ata: libata-transport: fix error handling in ata_tport_add() (git-fixes).
- ata: pata_legacy: fix pdc20230_set_piomode() (git-fixes).
- ath10k: do not enforce interrupt trigger type (git-fixes).
- ath11k: Fix incorrect debug_mask mappings (git-fixes).
- ath11k: fix netdev open race (git-fixes).
- atm: idt77252: fix use-after-free bugs caused by tst_timer (git-fixes).
- audit: fix potential double free on error path from fsnotify_add_inode_mark (git-fixes).
- audit: fix undefined behavior in bit shift for AUDIT_BIT (git-fixes).
- ax25: Fix ax25 session cleanup problems (git-fixes).
- batman-adv: Fix hang up with small MTU hard-interface (git-fixes).
- bitfield.h: Fix 'type of reg too small for mask' test (git-fixes).
- blk-cgroup: fix missing put device in error path from blkg_conf_pref() (git-fixes).
- blk-mq: Properly init requests from blk_mq_alloc_request_hctx() (git-fixes).
- blk-mq: do not create hctx debugfs dir until q->debugfs_dir is created (git-fixes).
- blk-mq: fix io hung due to missing commit_rqs (git-fixes).
- blk-wbt: call rq_qos_add() after wb_normal is initialized (git-fixes).
- blktrace: Trace remapped requests correctly (git-fixes).
- block/rnbd-srv: Set keep_id to true after mutex_trylock (git-fixes).
- block: Do not reread partition table on exclusively open device (bsc#1190969).
- block: Fix fsync always failed if once failed (bsc#1202779).
- block: Fix wrong offset in bio_truncate() (bsc#1202780).
- block: add bio_start_io_acct_time() to control start_time (git-fixes).
- block: blk_queue_enter() / __bio_queue_enter() must return -EAGAIN for nowait (git-fixes).
- block: drop unused includes in <linux/genhd.h> (git-fixes).
- block: fix rq-qos breakage from skipping rq_qos_done_bio() (bsc#1202781).
- block: only mark bio as tracked if it really is tracked (bsc#1202782).
- bnx2x: Invalidate fastpath HSI version for VFs (git-fixes).
- bnx2x: Utilize firmware 7.13.21.0 (git-fixes).
- bnx2x: fix built-in kernel driver load failure (git-fixes).
- bnx2x: fix driver load from initrd (git-fixes).
- bnxt_en: Fix bnxt_refclk_read() (git-fixes).
- bnxt_en: Fix bnxt_reinit_after_abort() code path (git-fixes).
- bnxt_en: fix livepatch query (git-fixes).
- bnxt_en: reclaim max resources if sriov enable fails (git-fixes).
- bonding: 802.3ad: fix no transmission of LACPDUs (git-fixes).
- bonding: ARP monitor spams NETDEV_NOTIFY_PEERS notifiers (git-fixes).
- bridge: switchdev: Fix memory leaks when changing VLAN protocol (git-fixes).
- btrfs-fix-deadlock-between-quota-enable-and-other-qu.patch: (bsc#1205521).
- btrfs: check if root is readonly while setting security xattr (bsc#1206147).
- btrfs: do not allow compression on nodatacow files (bsc#1206149).
- btrfs: export a helper for compression hard check (bsc#1206149).
- btrfs: fix processing of delayed data refs during backref walking (bsc#1206056).
- btrfs: fix processing of delayed tree block refs during backref walking (bsc#1206057).
- btrfs: fix relocation crash due to premature return from btrfs_commit_transaction() (bsc#1203360).
- btrfs: fix space cache corruption and potential double allocations (bsc#1203361).
- btrfs: prevent subvol with swapfile from being deleted (bsc#1206035).
- btrfs: properly flag filesystem with BTRFS_FEATURE_INCOMPAT_BIG_METADATA (git-fixes).
- btrfs: send: always use the rbtree based inode ref management infrastructure (bsc#1206036).
- btrfs: send: fix failures when processing inodes with no links (bsc#1206036).
- btrfs: send: fix send failure of a subcase of orphan inodes (bsc#1206036).
- btrfs: send: fix sending link commands for existing file paths (bsc#1206036).
- btrfs: send: introduce recorded_ref_alloc and recorded_ref_free (bsc#1206036).
- btrfs: send: refactor arguments of get_inode_info() (bsc#1206036).
- btrfs: send: remove unused found_type parameter to lookup_dir_item_inode() (bsc#1206036).
- btrfs: send: remove unused type parameter to iterate_inode_ref_t (bsc#1206036).
- btrfs: send: use boolean types for current inode status (bsc#1206036).
- bus: hisi_lpc: fix missing platform_device_put() in hisi_lpc_acpi_probe() (git-fixes).
- bus: sunxi-rsb: Remove the shutdown callback (git-fixes).
- bus: sunxi-rsb: Support atomic transfers (git-fixes).
- ca8210: Fix crash by zero initializing data (git-fixes).
- can: Break loopback loop on loopback documentation (git-fixes).
- can: af_can: fix NULL pointer dereference in can_rx_register() (git-fixes).
- can: bcm: check the result of can_send() in bcm_can_tx() (git-fixes).
- can: cc770: cc770_isa_probe(): add missing free_cc770dev() (git-fixes).
- can: do not increase rx statistics when generating a CAN rx error message frame (git-fixes).
- can: do not increase rx_bytes statistics for RTR frames (git-fixes).
- can: ems_usb: fix clang's -Wunaligned-access warning (git-fixes).
- can: error: specify the values of data[5..7] of CAN error frames (git-fixes).
- can: etas_es58x: es58x_init_netdev(): free netdev when register_candev() (git-fixes).
- can: gs_usb: gs_can_open(): fix race dev->can.state condition (git-fixes).
- can: hi311x: do not report txerr and rxerr during bus-off (git-fixes).
- can: j1939: j1939_send_one(): fix missing CAN header initialization (git-fixes).
- can: j1939: j1939_sk_queue_activate_next_locked(): replace WARN_ON_ONCE with netdev_warn_once() (git-fixes).
- can: j1939: transport: j1939_session_skb_drop_old(): spin_unlock_irqrestore() before kfree_skb() (git-fixes).
- can: kvaser_usb: Fix possible completions during init_completion (git-fixes).
- can: kvaser_usb: Fix use of uninitialized completion (git-fixes).
- can: kvaser_usb: kvaser_usb_leaf: fix CAN clock frequency regression (git-fixes).
- can: kvaser_usb: make use of units.h in assignment of frequency (git-fixes).
- can: kvaser_usb: replace run-time checks with struct kvaser_usb_driver_info (git-fixes).
- can: kvaser_usb_hydra: do not report txerr and rxerr during bus-off (git-fixes).
- can: kvaser_usb_leaf: Fix CAN state after restart (git-fixes).
- can: kvaser_usb_leaf: Fix TX queue out of sync after restart (git-fixes).
- can: kvaser_usb_leaf: do not report txerr and rxerr during bus-off (git-fixes).
- can: m_can: Add check for devm_clk_get (git-fixes).
- can: m_can: fix typo prescalar -> prescaler (git-fixes).
- can: m_can: is_lec_err(): clean up LEC error handling (git-fixes).
- can: m_can: pci: add missing m_can_class_free_dev() in probe/remove methods (git-fixes).
- can: mcp251x: Fix race condition on receive interrupt (git-fixes).
- can: mcp251x: mcp251x_can_probe(): add missing unregister_candev() in error path (git-fixes).
- can: mcp251xfd: mcp251xfd_dump(): fix comment (git-fixes).
- can: mcp251xfd: mcp251xfd_register_get_dev_id(): fix endianness conversion (git-fixes).
- can: mcp251xfd: mcp251xfd_register_get_dev_id(): use correct length to read dev_id (git-fixes).
- can: mscan: mpc5xxx: mpc5xxx_can_probe(): add missing put_clock() in error path (git-fixes).
- can: netlink: allow configuring of fixed bit rates without need for do_set_bittiming callback (git-fixes).
- can: netlink: allow configuring of fixed data bit rates without need for do_set_data_bittiming callback (git-fixes).
- can: pch_can: do not report txerr and rxerr during bus-off (git-fixes).
- can: pch_can: pch_can_error(): initialize errc before using it (git-fixes).
- can: rcar_can: do not report txerr and rxerr during bus-off (git-fixes).
- can: rx-offload: can_rx_offload_init_queue(): fix typo (git-fixes).
- can: sja1000: do not report txerr and rxerr during bus-off (git-fixes).
- can: sja1000_isa: sja1000_isa_probe(): add missing free_sja1000dev() (git-fixes).
- can: sun4i_can: do not report txerr and rxerr during bus-off (git-fixes).
- can: usb_8dev: do not report txerr and rxerr during bus-off (git-fixes).
- capabilities: fix potential memleak on error path from vfs_getxattr_alloc() (git-fixes).
- capabilities: fix undefined behavior in bit shift for CAP_TO_MASK (git-fixes).
- ceph: allow ceph.dir.rctime xattr to be updatable (bsc#1206050).
- ceph: avoid putting the realm twice when decoding snaps fails (bsc#1206051).
- ceph: do not leak snap_rwsem in handle_cap_grant (bsc#1202823).
- ceph: do not truncate file in atomic_open (bsc#1202824).
- ceph: do not update snapshot context when there is no new snapshot (bsc#1206047).
- ceph: fix inode reference leakage in ceph_get_snapdir() (bsc#1206048).
- ceph: fix memory leak in ceph_readdir when note_last_dentry returns error (bsc#1206049).
- ceph: properly handle statfs on multifs setups (bsc#1206045).
- ceph: switch netfs read ops to use rreq->inode instead of rreq->mapping->host (bsc#1206046).
- ceph: use correct index when encoding client supported features (bsc#1202822).
- cfg80211/mac80211: assume CHECKSUM_COMPLETE includes SNAP (bsc#1202131).
- cgroup/cpuset: Enable update_tasks_cpumask() on top_cpuset (bsc#1204753).
- cgroup: Add missing cpus_read_lock() to cgroup_attach_task_all() (bsc#1196869).
- cgroup: Fix race condition at rebind_subsystems() (bsc#1203902).
- cgroup: Fix threadgroup_rwsem <-> cpus_read_lock() deadlock (bsc#1196869).
- cgroup: Use separate src/dst nodes when preloading css_sets for migration (bsc#1201610).
- cgroup: cgroup_get_from_id() must check the looked-up kn is a directory (bsc#1203906).
- char: tpm: Protect tpm_pm_suspend with locks (git-fixes).
- cifs: Add constructor/destructors for tcon->cfid (bsc#1193629).
- cifs: Add helper function to check smb1+ server (bsc#1193629).
- cifs: Do not access tcon->cfids->cfid directly from is_path_accessible (bsc#1193629).
- cifs: Do not use tcon->cfid directly, use the cfid we get from open_cached_dir (bsc#1193629).
- cifs: Fix connections leak when tlink setup failed (git-fixes).
- cifs: Fix memory leak on the deferred close (bsc#1193629).
- cifs: Fix memory leak when build ntlmssp negotiate blob failed (bsc#1193629).
- cifs: Fix pages array leak when writedata alloc failed in cifs_writedata_alloc() (bsc#1193629).
- cifs: Fix pages leak when writedata alloc failed in cifs_write_from_iter() (bsc#1193629).
- cifs: Fix the error length of VALIDATE_NEGOTIATE_INFO message (bsc#1193629).
- cifs: Fix wrong return value checking when GETFLAGS (git-fixes).
- cifs: Fix xid leak in cifs_copy_file_range() (bsc#1193629).
- cifs: Fix xid leak in cifs_create() (bsc#1193629).
- cifs: Fix xid leak in cifs_flock() (bsc#1193629).
- cifs: Fix xid leak in cifs_get_file_info_unix() (bsc#1193629).
- cifs: Fix xid leak in cifs_ses_add_channel() (bsc#1193629).
- cifs: Make tcon contain a wrapper structure cached_fids instead of cached_fid (bsc#1193629).
- cifs: Move cached-dir functions into a separate file (bsc#1193629).
- cifs: Replace a couple of one-element arrays with flexible-array members (bsc#1193629).
- cifs: Use after free in debug code (git-fixes).
- cifs: Use help macro to get the header preamble size (bsc#1193629).
- cifs: Use help macro to get the mid header size (bsc#1193629).
- cifs: add check for returning value of SMB2_close_init (git-fixes).
- cifs: add check for returning value of SMB2_set_info_init (git-fixes).
- cifs: add missing spinlock around tcon refcount (bsc#1193629).
- cifs: alloc_mid function should be marked as static (bsc#1193629).
- cifs: always initialize struct msghdr smb_msg completely (bsc#1193629).
- cifs: always iterate smb sessions using primary channel (bsc#1193629).
- cifs: avoid deadlocks while updating iface (bsc#1193629).
- cifs: avoid unnecessary iteration of tcp sessions (bsc#1193629).
- cifs: avoid use of global locks for high contention data (bsc#1193629).
- cifs: cache the dirents for entries in a cached directory (bsc#1193629).
- cifs: change iface_list from array to sorted linked list (bsc#1193629).
- cifs: destage dirty pages before re-reading them for cache=none (bsc#1193629).
- cifs: do not send down the destination address to sendmsg for a SOCK_STREAM (bsc#1193629).
- cifs: drop the lease for cached directories on rmdir or rename (bsc#1193629).
- cifs: during reconnect, update interface if necessary (bsc#1193629).
- cifs: enable caching of directories for which a lease is held (bsc#1193629).
- cifs: find and use the dentry for cached non-root directories also (bsc#1193629).
- cifs: fix double-fault crash during ntlmssp (bsc#1193629).
- cifs: fix lock length calculation (bsc#1193629).
- cifs: fix memory leaks in session setup (bsc#1193629).
- cifs: fix missing unlock in cifs_file_copychunk_range() (git-fixes).
- cifs: fix race condition with delayed threads (bsc#1193629).
- cifs: fix reconnect on smb3 mount types (bsc#1201427).
- cifs: fix skipping to incorrect offset in emit_cached_dirents (bsc#1193629).
- cifs: fix small mempool leak in SMB2_negotiate() (bsc#1193629).
- cifs: fix static checker warning (bsc#1193629).
- cifs: fix uninitialised var in smb2_compound_op() (bsc#1193629).
- cifs: fix use-after-free caused by invalid pointer `hostname` (bsc#1193629).
- cifs: fix use-after-free on the link name (bsc#1193629).
- cifs: fix wrong unlock before return from cifs_tree_connect() (bsc#1193629).
- cifs: improve handlecaching (bsc#1193629).
- cifs: improve symlink handling for smb2+ (bsc#1193629).
- cifs: lease key is uninitialized in smb1 paths (bsc#1193629).
- cifs: lease key is uninitialized in two additional functions when smb1 (bsc#1193629).
- cifs: list_for_each() -> list_for_each_entry() (bsc#1193629).
- cifs: misc: fix spelling typo in comment (bsc#1193629).
- cifs: move from strlcpy with unused retval to strscpy (bsc#1193629).
- cifs: periodically query network interfaces from server (bsc#1193629).
- cifs: populate empty hostnames for extra channels (bsc#1193629).
- cifs: prevent copying past input buffer boundaries (bsc#1193629).
- cifs: remove 'cifs_' prefix from init/destroy mids functions (bsc#1193629).
- cifs: remove initialization value (bsc#1193629).
- cifs: remove minor build warning (bsc#1193629).
- cifs: remove redundant initialization to variable mnt_sign_enabled (bsc#1193629).
- cifs: remove remaining build warnings (bsc#1193629).
- cifs: remove some camelCase and also some static build warnings (bsc#1193629).
- cifs: remove unnecessary (void*) conversions (bsc#1193629).
- cifs: remove unnecessary locking of chan_lock while freeing session (bsc#1193629).
- cifs: remove unnecessary type castings (bsc#1193629).
- cifs: remove unused server parameter from calc_smb_size() (bsc#1193629).
- cifs: remove useless DeleteMidQEntry() (bsc#1193629).
- cifs: remove useless parameter 'is_fsctl' from SMB2_ioctl() (bsc#1193629).
- cifs: replace kfree() with kfree_sensitive() for sensitive data (bsc#1193629).
- cifs: return correct error in ->calc_signature() (bsc#1193629).
- cifs: return errors during session setup during reconnects (bsc#1193629).
- cifs: revalidate mapping when doing direct writes (bsc#1193629).
- cifs: secmech: use shash_desc directly, remove sdesc (bsc#1193629).
- cifs: set rc to -ENOENT if we can not get a dentry for the cached dir (bsc#1193629).
- cifs: skip extra NULL byte in filenames (bsc#1193629).
- cifs: store a pointer to a fid in the cfid structure instead of the struct (bsc#1193629).
- cifs: truncate the inode and mapping when we simulate fcollapse (bsc#1193629).
- cifs: update cifs_ses::ip_addr after failover (bsc#1193629).
- cifs: update internal module number (bsc#1193629).
- cifs: use ALIGN() and round_up() macros (bsc#1193629).
- cifs: use LIST_HEAD() and list_move() to simplify code (bsc#1193629).
- cifs: when a channel is not found for server, log its connection id (bsc#1193629).
- cifs: when insecure legacy is disabled shrink amount of SMB1 code (bsc#1193629).
- clk: ast2600: BCLK comes from EPLL (git-fixes).
- clk: at91: fix the build with binutils 2.27 (git-fixes).
- clk: baikal-t1: Add SATA internal ref clock buffer (git-fixes).
- clk: baikal-t1: Add shared xGMAC ref/ptp clocks internal parent (git-fixes).
- clk: baikal-t1: Fix invalid xGMAC PTP clock divider (git-fixes).
- clk: bcm2835: Make peripheral PLLC critical (git-fixes).
- clk: bcm2835: Round UART input clock up (bsc#1188238)
- clk: bcm2835: fix bcm2835_clock_rate_from_divisor declaration (git-fixes).
- clk: bcm: rpi: Add support for VEC clock (bsc#1196632)
- clk: bcm: rpi: Fix error handling of raspberrypi_fw_get_rate (git-fixes).
- clk: bcm: rpi: Prevent out-of-bounds access (git-fixes).
- clk: bcm: rpi: Use correct order for the parameters of devm_kcalloc() (git-fixes).
- clk: berlin: Add of_node_put() for of_get_parent() (git-fixes).
- clk: core: Fix runtime PM sequence in clk_core_unprepare() (git-fixes).
- clk: core: Honor CLK_OPS_PARENT_ENABLE for clk gate ops (git-fixes).
- clk: imx: imx6sx: remove the SET_RATE_PARENT flag for QSPI clocks (git-fixes).
- clk: imx: scu: fix memleak on platform_device_add() fails (git-fixes).
- clk: ingenic-tcu: Properly enable registers before accessing timers (git-fixes).
- clk: iproc: Do not rely on node name for correct PLL setup (git-fixes).
- clk: mediatek: mt8183: mfgcfg: Propagate rate changes to parent (git-fixes).
- clk: mediatek: reset: Fix written reset bit offset (git-fixes).
- clk: meson: Hold reference returned by of_get_parent() (git-fixes).
- clk: oxnas: Hold reference returned by of_get_parent() (git-fixes).
- clk: qcom: apss-ipq6018: mark apcs_alias0_core_clk as critical (git-fixes).
- clk: qcom: camcc-sdm845: Fix topology around titan_top power domain (git-fixes).
- clk: qcom: camcc-sm8250: Fix halt on boot by reducing driver's init level (git-fixes).
- clk: qcom: camcc-sm8250: Fix topology around titan_top power domain (git-fixes).
- clk: qcom: clk-alpha-pll: fix clk_trion_pll_configure description (git-fixes).
- clk: qcom: clk-krait: unlock spin after mux completion (git-fixes).
- clk: qcom: clk-rcg2: Fail Duty-Cycle configuration if MND divider is not enabled (git-fixes).
- clk: qcom: clk-rcg2: Make sure to not write d=0 to the NMD register (git-fixes).
- clk: qcom: gcc-msm8916: use ARRAY_SIZE instead of specifying num_parents (git-fixes).
- clk: qcom: gcc-msm8939: Add missing SYSTEM_MM_NOC_BFDCD_CLK_SRC (git-fixes).
- clk: qcom: gcc-msm8939: Add missing system_mm_noc_bfdcd_clk_src (git-fixes).
- clk: qcom: gcc-msm8939: Fix bimc_ddr_clk_src rcgr base address (git-fixes).
- clk: qcom: gcc-msm8939: Fix weird field spacing in ftbl_gcc_camss_cci_clk (git-fixes).
- clk: qcom: gcc-msm8939: Point MM peripherals to system_mm_noc clock (git-fixes).
- clk: qcom: ipq8074: SW workaround for UBI32 PLL lock (git-fixes).
- clk: qcom: ipq8074: dont disable gcc_sleep_clk_src (git-fixes).
- clk: qcom: ipq8074: fix NSS core PLL-s (git-fixes).
- clk: qcom: ipq8074: fix NSS port frequency tables (git-fixes).
- clk: qcom: ipq8074: set BRANCH_HALT_DELAY flag for UBI clocks (git-fixes).
- clk: qoriq: Hold reference returned by of_get_parent() (git-fixes).
- clk: renesas: r9a06g032: Fix UART clkgrp bitsel (git-fixes).
- clk: sprd: Hold reference returned by of_get_parent() (git-fixes).
- clk: tegra20: Fix refcount leak in tegra20_clock_init (git-fixes).
- clk: tegra: Fix refcount leak in tegra114_clock_init (git-fixes).
- clk: tegra: Fix refcount leak in tegra210_clock_init (git-fixes).
- clk: ti: Stop using legacy clkctrl names for omap4 and 5 (git-fixes).
- clk: ti: dra7-atl: Fix reference leak in of_dra7_atl_clk_probe (git-fixes).
- clk: vc5: Fix 5P49V6901 outputs disabling when enabling FOD (git-fixes).
- clk: zynqmp: Fix stack-out-of-bounds in strncpy` (git-fixes).
- clk: zynqmp: pll: rectify rate rounding in zynqmp_pll_round_rate (git-fixes).
- clocksource/drivers/hyperv: add data structure for reference TSC MSR (git-fixes).
- configfs: fix a race in configfs_{,un}register_subsystem() (git-fixes).
- constraints: increase disk space for all architectures References: bsc#1203693 aarch64 is already suffering. SLE15-SP5 x86_64 stats show that it is very close to the limit.
- cpufreq: intel_pstate: Handle no_turbo in frequency invariance (jsc#PED-849).
- cpufreq: intel_pstate: Support Sapphire Rapids OOB mode (jsc#PED-849).
- cpufreq: qcom: fix memory leak in error path (git-fixes).
- cpufreq: qcom: fix writes in read-only memory region (git-fixes).
- cpufreq: zynq: Fix refcount leak in zynq_get_revision (git-fixes).
- cpuidle: intel_idle: Drop redundant backslash at line end (jsc#PED-1936).
- crypto: akcipher - default implementation for setting a private key (git-fixes).
- crypto: arm64/gcm - Select AEAD for GHASH_ARM64_CE (git-fixes)
- crypto: arm64/poly1305 - fix a read out-of-bound (git-fixes).
- crypto: cavium - prevent integer overflow loading firmware (git-fixes).
- crypto: ccp - During shutdown, check SEV data pointer before using (git-fixes).
- crypto: ccp - Release dma channels before dmaengine unrgister (git-fixes).
- crypto: ccp - Use kzalloc for sev ioctl interfaces to prevent kernel memory leak (git-fixes).
- crypto: hisilicon - Kunpeng916 crypto driver do not sleep when in softirq (git-fixes).
- crypto: hisilicon/hpre - do not use GFP_KERNEL to alloc mem during softirq (git-fixes).
- crypto: hisilicon/sec - do not sleep when in softirq (git-fixes).
- crypto: hisilicon/sec - fix auth key size error (git-fixes).
- crypto: hisilicon/zip - fix mismatch in get/set sgl_sge_nr (git-fixes).
- crypto: inside-secure - Add missing MODULE_DEVICE_TABLE for of (git-fixes).
- crypto: inside-secure - Change swab to swab32 (git-fixes).
- crypto: inside-secure - Replace generic aes with libaes (git-fixes).
- crypto: marvell/octeontx - prevent integer overflows (git-fixes).
- crypto: qat - fix default value of WDT timer (git-fixes).
- crypto: sahara - do not sleep when in softirq (git-fixes).
- crypto: sun8i-ss - do not allocate memory when handling hash requests (git-fixes).
- crypto: sun8i-ss - fix error codes in allocate_flows() (git-fixes).
- crypto: sun8i-ss - fix infinite loop in sun8i_ss_setup_ivs() (git-fixes).
- cs-dsp and serial-multi-instantiate enablement (bsc#1203699)
- device property: Check fwnode->secondary when finding properties (git-fixes).
- device property: Fix documentation for *_match_string() APIs (git-fixes).
- devlink: Fix use-after-free after a failed reload (git-fixes).
- dm btree remove: fix use after free in rebalance_children() (git-fixes).
- dm crypt: make printing of the key constant-time (git-fixes).
- dm era: commit metadata in postsuspend after worker stops (git-fixes).
- dm integrity: fix memory corruption when tag_size is less than digest size (git-fixes).
- dm mirror log: clear log bits up to BITS_PER_LONG boundary (git-fixes).
- dm raid: fix KASAN warning in raid5_add_disks (git-fixes).
- dm raid: fix accesses beyond end of raid member array (git-fixes).
- dm stats: add cond_resched when looping over entries (git-fixes).
- dm thin: fix use-after-free crash in dm_sm_register_threshold_callback (git-fixes).
- dm: fix double accounting of flush with data (git-fixes).
- dm: interlock pending dm_io and dm_wait_for_bios_completion (git-fixes).
- dm: properly fix redundant bio-based IO accounting (git-fixes).
- dm: remove unnecessary assignment statement in alloc_dev() (git-fixes).
- dm: return early from dm_pr_call() if DM device is suspended (git-fixes).
- dm: revert partial fix for redundant bio-based IO accounting (git-fixes).
- dma-buf: fix racing conflict of dma_heap_add() (git-fixes).
- dma-debug: change allocation mode from GFP_NOWAIT to GFP_ATIOMIC (git-fixes).
- dma-debug: make things less spammy under memory pressure (git-fixes).
- dmaengine: at_hdmac: Check return code of dma_async_device_register (git-fixes).
- dmaengine: at_hdmac: Do not allow CPU to reorder channel enable (git-fixes).
- dmaengine: at_hdmac: Do not call the complete callback on device_terminate_all (git-fixes).
- dmaengine: at_hdmac: Do not start transactions at tx_submit level (git-fixes).
- dmaengine: at_hdmac: Fix at_lli struct definition (git-fixes).
- dmaengine: at_hdmac: Fix completion of unissued descriptor in case of errors (git-fixes).
- dmaengine: at_hdmac: Fix concurrency over descriptor (git-fixes).
- dmaengine: at_hdmac: Fix concurrency over the active list (git-fixes).
- dmaengine: at_hdmac: Fix concurrency problems by removing atc_complete_all() (git-fixes).
- dmaengine: at_hdmac: Fix descriptor handling when issuing it to hardware (git-fixes).
- dmaengine: at_hdmac: Fix impossible condition (git-fixes).
- dmaengine: at_hdmac: Fix premature completion of desc in issue_pending (git-fixes).
- dmaengine: at_hdmac: Free the memset buf without holding the chan lock (git-fixes).
- dmaengine: at_hdmac: Protect atchan->status with the channel lock (git-fixes).
- dmaengine: at_hdmac: Start transfer for cyclic channels in issue_pending (git-fixes).
- dmaengine: dw-axi-dmac: do not print NULL LLI during error (git-fixes).
- dmaengine: dw-axi-dmac: ignore interrupt if no descriptor (git-fixes).
- dmaengine: dw-edma: Fix eDMA Rd/Wr-channels and DMA-direction semantics (git-fixes).
- dmaengine: hisilicon: Add multi-thread support for a DMA channel (git-fixes).
- dmaengine: hisilicon: Disable channels when unregister hisi_dma (git-fixes).
- dmaengine: hisilicon: Fix CQ head update (git-fixes).
- dmaengine: idxd: add helper for per interrupt handle drain (jsc#PED-682).
- dmaengine: idxd: add knob for enqcmds retries (jsc#PED-755).
- dmaengine: idxd: change MSIX allocation based on per wq activation (jsc#PED-664).
- dmaengine: idxd: change bandwidth token to read buffers (jsc#PED-679).
- dmaengine: idxd: create locked version of idxd_quiesce() call (jsc#PED-682).
- dmaengine: idxd: deprecate token sysfs attributes for read buffers (jsc#PED-679).
- dmaengine: idxd: embed irq_entry in idxd_wq struct (jsc#PED-664).
- dmaengine: idxd: fix descriptor flushing locking (jsc#PED-664).
- dmaengine: idxd: fix retry value to be constant for duration of function call (git-fixes).
- dmaengine: idxd: force wq context cleanup on device disable path (git-fixes).
- dmaengine: idxd: handle interrupt handle revoked event (jsc#PED-682).
- dmaengine: idxd: handle invalid interrupt handle descriptors (jsc#PED-682).
- dmaengine: idxd: int handle management refactoring (jsc#PED-682).
- dmaengine: idxd: match type for retries var in idxd_enqcmds() (git-fixes).
- dmaengine: idxd: move interrupt handle assignment (jsc#PED-682).
- dmaengine: idxd: rework descriptor free path on failure (jsc#PED-682).
- dmaengine: idxd: set defaults for wq configs (jsc#PED-688).
- dmaengine: idxd: update IAA definitions for user header (jsc#PED-763).
- dmaengine: imx-dma: Cast of_device_get_match_data() with (uintptr_t) (git-fixes).
- dmaengine: ioat: stop mod_timer from resurrecting deleted timer in __cleanup() (git-fixes).
- dmaengine: mv_xor_v2: Fix a resource leak in mv_xor_v2_remove() (git-fixes).
- dmaengine: mxs: use platform_driver_register (git-fixes).
- dmaengine: pxa_dma: use platform_get_irq_optional (git-fixes).
- dmaengine: sf-pdma: Add multithread support for a DMA channel (git-fixes).
- dmaengine: sprd: Cleanup in .remove() after pm_runtime_get_sync() failed (git-fixes).
- dmaengine: stm32-mdma: Remove dead code in stm32_mdma_irq_handler() (git-fixes).
- dmaengine: ti: k3-udma-glue: fix memory leak when register device fail (git-fixes).
- dmaengine: ti: k3-udma-private: Fix refcount leak bug in of_xudma_dev_get() (git-fixes).
- dmaengine: ti: k3-udma: Reset UDMA_CHAN_RT byte counters to prevent overflow (git-fixes).
- dmaengine: xilinx_dma: Fix devm_platform_ioremap_resource error handling (git-fixes).
- dmaengine: xilinx_dma: Report error in case of dma_set_mask_and_coherent API failure (git-fixes).
- dmaengine: xilinx_dma: cleanup for fetching xlnx,num-fstores property (git-fixes).
- docs, kprobes: Fix the wrong location of Kprobes (git-fixes).
- docs/core-api: expand Fedora instructions for GCC plugins (git-fixes).
- docs/kernel-parameters: Update descriptions for 'mitigations=' param with retbleed (git-fixes).
- docs: i2c: i2c-sysfs: fix hyperlinks (git-fixes).
- docs: i2c: i2c-topology: fix incorrect heading (git-fixes).
- docs: zh_CN: fix a broken reference (git-fixes).
- dpaa2-eth: fix ethtool statistics (git-fixes).
- dpaa2-eth: trace the allocated address instead of page struct (git-fixes).
- dpaa2-ptp: Fix refcount leak in dpaa2_ptp_probe (git-fixes).
- driver core: Do not probe devices after bus_type.match() probe deferral (git-fixes).
- driver core: fix potential deadlock in __driver_attach (git-fixes).
- drivers/iio: Remove all strcpy() uses (git-fixes).
- drivers: serial: jsm: fix some leaks in probe (git-fixes).
- drivers: usb: dwc3-qcom: Add sdm660 compatible (git-fixes).
- drm/amd/amd_shared.h: Add missing doc for PP_GFX_DCS_MASK (git-fixes).
- drm/amd/amdgpu: fixing read wrong pf2vf data in SRIOV (git-fixes).
- drm/amd/amdgpu: skip ucode loading if ucode_size == 0 (git-fixes).
- drm/amd/display: Add HUBP surface flip interrupt handler (git-fixes).
- drm/amd/display: Add option to defer works of hpd_rx_irq (git-fixes).
- drm/amd/display: Assume an LTTPR is always present on fixed_vs links (git-fixes).
- drm/amd/display: Avoid MPC infinite loop (git-fixes).
- drm/amd/display: Changed pipe split policy to allow for multi-display (bsc#1152472) Backporting notes: 	* remove changes to non-existing 201 and 31 directories
- drm/amd/display: Check correct bounds for stream encoder instances for DCN303 (git-fixes).
- drm/amd/display: Correct MPC split policy for DCN301 (git-fixes).
- drm/amd/display: Enable building new display engine with KCOV enabled (git-fixes).
- drm/amd/display: Fix HDMI VSIF V3 incorrect issue (git-fixes).
- drm/amd/display: Fix build breakage with CONFIG_DEBUG_FS=n (git-fixes).
- drm/amd/display: Fix double cursor on non-video RGB MPO (git-fixes).
- drm/amd/display: Fix pixel clock programming (git-fixes).
- drm/amd/display: Fix surface optimization regression on Carrizo (git-fixes).
- drm/amd/display: Fix vblank refcount in vrr transition (git-fixes).
- drm/amd/display: For stereo keep 'FLIP_ANY_FRAME' (git-fixes).
- drm/amd/display: Ignore First MST Sideband Message Return Error (git-fixes).
- drm/amd/display: Limit user regamma to a valid value (git-fixes).
- drm/amd/display: Mark dml30's UseMinimumDCFCLK() as noinline for stack usage (git-fixes).
- drm/amd/display: Optimize bandwidth on following fast update (git-fixes).
- drm/amd/display: Reduce number of arguments of dml31's CalculateFlipSchedule() (git-fixes).
- drm/amd/display: Reduce number of arguments of dml31's CalculateWatermarksAndDRAMSpeedChangeSupport() (git-fixes).
- drm/amd/display: Remove interface for periodic interrupt 1 (git-fixes).
- drm/amd/display: Reset DMCUB before HW init (git-fixes).
- drm/amd/display: Revert 'drm/amd/display: turn DPMS off on connector unplug' (git-fixes).
- drm/amd/display: avoid doing vm_init multiple time (git-fixes).
- drm/amd/display: clear optc underflow before turn off odm clock (git-fixes).
- drm/amd/display: skip audio setup when audio stream is enabled (git-fixes).
- drm/amd/display: update gamut remap if plane has changed (git-fixes).
- drm/amd/pm: add missing ->fini_microcode interface for Sienna Cichlid (git-fixes).
- drm/amd/pm: disable BACO entry/exit completely on several sienna cichlid cards (git-fixes).
- drm/amd/pm: smu7_hwmgr: fix potential off-by-one overflow in 'performance_levels' (git-fixes).
- drm/amdgpu/display: change pipe policy for DCN 2.0 (git-fixes).
- drm/amdgpu/display: change pipe policy for DCN 2.1 (git-fixes).
- drm/amdgpu/gfx10: add wraparound gpu counter check for APUs as well (bsc#1152472) Backporting notes: 	* also fix default branch
- drm/amdgpu/gfx9: switch to golden tsc registers for renoir+ (bsc#1152472) Backporting notes: 	* replace IP_VERSION() with CHIP_ constants
- drm/amdgpu: Check BO's requested pinning domains against its preferred_domains (git-fixes).
- drm/amdgpu: Check num_gfx_rings for gfx v9_0 rb setup (git-fixes).
- drm/amdgpu: Increase tlb flush timeout for sriov (git-fixes).
- drm/amdgpu: Move psp_xgmi_terminate call from amdgpu_xgmi_remove_device to psp_hw_fini (git-fixes).
- drm/amdgpu: Remove one duplicated ef removal (git-fixes).
- drm/amdgpu: Separate vf2pf work item init from virt data exchange (git-fixes).
- drm/amdgpu: add missing pci_disable_device() in amdgpu_pmops_runtime_resume() (git-fixes).
- drm/amdgpu: disable BACO on special BEIGE_GOBY card (git-fixes).
- drm/amdgpu: do not register a dirty callback for non-atomic (git-fixes).
- drm/amdgpu: fix initial connector audio value (git-fixes).
- drm/amdgpu: fix sdma doorbell init ordering on APUs (git-fixes).
- drm/amdgpu: make sure to init common IP before gmc (git-fixes).
- drm/amdgpu: mmVM_L2_CNTL3 register not initialized correctly (git-fixes).
- drm/amdgpu: move nbio ih_doorbell_range() into ih code for vega (git-fixes).
- drm/amdgpu: move nbio sdma_doorbell_range() into sdma code for vega (git-fixes).
- drm/amdgpu: remove useless condition in amdgpu_job_stop_all_jobs_on_sched() (git-fixes).
- drm/amdgpu: set vm_update_mode=0 as default for Sienna Cichlid in SRIOV case (git-fixes).
- drm/amdgpu: use dirty framebuffer helper (git-fixes).
- drm/amdkfd: Fix NULL pointer dereference in svm_migrate_to_ram() (git-fixes).
- drm/amdkfd: Fix memory leak in kfd_mem_dmamap_userptr() (git-fixes).
- drm/amdkfd: Migrate in CPU page fault use current mm (git-fixes).
- drm/amdkfd: avoid recursive lock in migrations back to RAM (git-fixes).
- drm/amdkfd: handle CPU fault on COW mapping (git-fixes).
- drm/bridge: Avoid uninitialized variable warning (git-fixes).
- drm/bridge: display-connector: implement bus fmts callbacks (git-fixes).
- drm/bridge: lt8912b: add vsync hsync (git-fixes).
- drm/bridge: lt8912b: fix corrupted image output (git-fixes).
- drm/bridge: lt8912b: set hdmi or dvi mode (git-fixes).
- drm/bridge: lt9611uxc: Cancel only driver's work (git-fixes).
- drm/bridge: megachips: Fix a null pointer dereference bug (git-fixes).
- drm/bridge: parade-ps8640: Fix regulator supply order (git-fixes).
- drm/bridge: tc358767: Fix (e)DP bridge endpoint parsing in dedicated function (git-fixes).
- drm/bridge: tc358767: Make sure Refclk clock are enabled (git-fixes).
- drm/bridge: tc358767: Move (e)DP bridge endpoint parsing into dedicated function (git-fixes).
- drm/doc: Fix comment typo (git-fixes).
- drm/drv: Fix potential memory leak in drm_dev_init() (git-fixes).
- drm/exynos/exynos7_drm_decon: free resources when clk_set_parent() failed (git-fixes).
- drm/gem: Fix GEM handle release errors (git-fixes).
- drm/gem: Properly annotate WW context on drm_gem_lock_reservations() error (git-fixes).
- drm/gma500: Fix BUG: sleeping function called from invalid context errors (git-fixes).
- drm/hyperv: Add ratelimit on error message (git-fixes).
- drm/hyperv: Do not overwrite dirt_needed value set by host (git-fixes).
- drm/i915/display: avoid warnings when registering dual panel backlight (git-fixes).
- drm/i915/dmabuf: fix sg_table handling in map_dma_buf (git-fixes).
- drm/i915/dp: Reset frl trained flag before restarting FRL training (git-fixes).
- drm/i915/ehl: Update MOCS table for EHL (git-fixes).
- drm/i915/glk: ECS Liva Q2 needs GLK HDMI port timing quirk (git-fixes).
- drm/i915/gt: Restrict forced preemption to the active context (git-fixes).
- drm/i915/gt: Skip TLB invalidations once wedged (git-fixes).
- drm/i915/gvt: fix a memory leak in intel_gvt_init_vgpu_types (git-fixes).
- drm/i915/hdmi: convert intel_hdmi_to_dev to intel_hdmi_to_i915 (bsc#1152489) Backporting notes: 	* update additional patch on top
- drm/i915/reg: Fix spelling mistake 'Unsupport' -> 'Unsupported' (git-fixes).
- drm/i915/sdvo: Filter out invalid outputs more sensibly (git-fixes).
- drm/i915/sdvo: Setup DDC fully before output init (git-fixes).
- drm/i915: Implement WaEdpLinkRateDataReload (git-fixes).
- drm/i915: Reject unsupported TMDS rates on ICL+ (git-fixes).
- drm/i915: Skip wm/ddb readout for disabled pipes (git-fixes).
- drm/i915: fix null pointer dereference (git-fixes).
- drm/imx: imx-tve: Fix return type of imx_tve_connector_mode_valid (git-fixes).
- drm/komeda: Fix handling of atomic commits in the atomic_commit_tail hook (git-fixes).
- drm/mcde: Fix refcount leak in mcde_dsi_bind (git-fixes).
- drm/mediatek: Add pull-down MIPI operation in mtk_dsi_poweroff function (git-fixes).
- drm/mediatek: Allow commands to be sent during video mode (git-fixes).
- drm/mediatek: Keep dsi as LP00 before dcs cmds transfer (git-fixes).
- drm/mediatek: Modify dsi funcs to atomic operations (git-fixes).
- drm/mediatek: Separate poweron/poweroff from enable/disable and define new funcs (git-fixes).
- drm/mediatek: dpi: Only enable dpi after the bridge is enabled (git-fixes).
- drm/mediatek: dpi: Remove output format of YUV (git-fixes).
- drm/mediatek: dsi: Add atomic {destroy,duplicate}_state, reset callbacks (git-fixes).
- drm/mediatek: dsi: Move mtk_dsi_stop() call back to mtk_dsi_poweroff() (git-fixes).
- drm/meson: Correct OSD1 global alpha value (git-fixes).
- drm/meson: Fix OSD1 RGB to YCbCr coefficient (git-fixes).
- drm/meson: Fix overflow implicit truncation warnings (git-fixes).
- drm/meson: Fix refcount bugs in meson_vpu_has_available_connectors() (git-fixes).
- drm/meson: explicitly remove aggregate driver at module unload time (git-fixes).
- drm/mipi-dbi: align max_chunk to 2 in spi_transfer (git-fixes).
- drm/mipi-dsi: Detach devices when removing the host (git-fixes).
- drm/msm/dp: Silence inconsistent indent warning (git-fixes).
- drm/msm/dp: correct 1.62G link rate at dp_catalog_ctrl_config_msa() (git-fixes).
- drm/msm/dp: delete DP_RECOVERED_CLOCK_OUT_EN to fix tps4 (git-fixes).
- drm/msm/dp: fix IRQ lifetime (git-fixes).
- drm/msm/dpu: Fix comment typo (git-fixes).
- drm/msm/dpu: Fix for non-visible planes (git-fixes).
- drm/msm/dpu: index dpu_kms->hw_vbif using vbif_idx (git-fixes).
- drm/msm/dsi: Fix number of regulators for SDM660 (git-fixes).
- drm/msm/dsi: Fix number of regulators for msm8996_dsi_cfg (git-fixes).
- drm/msm/dsi: fix memory corruption with too many bridges (git-fixes).
- drm/msm/dsi: fix the inconsistent indenting (git-fixes).
- drm/msm/hdmi: Remove spurious IRQF_ONESHOT flag (git-fixes).
- drm/msm/hdmi: drop empty 'none' regulator lists (git-fixes).
- drm/msm/hdmi: enable core-vcc/core-vdda-supply for 8996 platform (git-fixes).
- drm/msm/hdmi: fix IRQ lifetime (git-fixes).
- drm/msm/hdmi: fix memory corruption with too many bridges (git-fixes).
- drm/msm/mdp5: Fix global state lock backoff (git-fixes).
- drm/msm/rd: Fix FIFO-full deadlock (git-fixes).
- drm/msm: Avoid dirtyfb stalls on video mode displays (v2) (git-fixes).
- drm/msm: Fix dirtyfb refcounting (git-fixes).
- drm/msm: Fix return type of mdp4_lvds_connector_mode_valid (git-fixes).
- drm/msm: Make .remove and .shutdown HW shutdown consistent (git-fixes).
- drm/msm: fix use-after-free on probe deferral (git-fixes).
- drm/nouveau/acpi: Do not print error when we get -EINPROGRESS from pm_runtime (git-fixes).
- drm/nouveau/kms/nv140-: Disable interlacing (git-fixes).
- drm/nouveau/kms: Fix failure path for creating DP connectors (git-fixes).
- drm/nouveau/nouveau_bo: fix potential memory leak in nouveau_bo_alloc() (git-fixes).
- drm/nouveau: Do not pm_runtime_put_sync(), only pm_runtime_put_autosuspend() (git-fixes).
- drm/nouveau: fix a use-after-free in nouveau_gem_prime_import_sg_table() (git-fixes).
- drm/nouveau: fix another off-by-one in nvbios_addr (git-fixes).
- drm/nouveau: recognise GA103 (git-fixes).
- drm/nouveau: wait for the exclusive fence after the shared ones v2 (bsc#1152472) Backporting notes: 	* context changes
- drm/omap: dss: Fix refcount leak bugs (git-fixes).
- drm/panel: simple: Fix innolux_g121i1_l01 bus_format (git-fixes).
- drm/panel: simple: set bpc field for logic technologies displays (git-fixes).
- drm/panfrost: devfreq: set opp to the recommended one to configure regulator (git-fixes).
- drm/radeon: add a force flush to delay work when radeon (git-fixes).
- drm/radeon: fix incorrrect SPDX-License-Identifiers (git-fixes).
- drm/radeon: fix potential buffer overflow in ni_set_mc_special_registers() (git-fixes).
- drm/rockchip: Fix an error handling path rockchip_dp_probe() (git-fixes).
- drm/rockchip: Fix return type of cdn_dp_connector_mode_valid (git-fixes).
- drm/rockchip: dsi: Force synchronous probe (git-fixes).
- drm/rockchip: vop: Do not crash for invalid duplicate_state() (git-fixes).
- drm/scheduler: quieten kernel-doc warnings (git-fixes).
- drm/shmem-helper: Add missing vunmap on error (git-fixes).
- drm/simpledrm: Fix return type of simpledrm_simple_display_pipe_mode_valid() (git-fixes).
- drm/st7735r: Fix module autoloading for Okaya RH128128T (git-fixes).
- drm/sun4i: dsi: Prevent underflow when computing packet sizes (git-fixes).
- drm/tegra: vic: Fix build warning when CONFIG_PM=n (git-fixes).
- drm/ttm: Fix dummy res NULL ptr deref bug (git-fixes).
- drm/udl: Add parameter to set number of URBs (bsc#1195917).
- drm/udl: Add reset_resume (bsc#1195917)
- drm/udl: Do not re-initialize stuff at retrying the URB list allocation (bsc#1195917).
- drm/udl: Drop unneeded alignment (bsc#1195917).
- drm/udl: Enable damage clipping (bsc#1195917).
- drm/udl: Fix inconsistent urbs.count value during udl_free_urb_list() (bsc#1195917).
- drm/udl: Fix potential URB leaks (bsc#1195917).
- drm/udl: Increase the default URB list size to 20 (bsc#1195917).
- drm/udl: Kill pending URBs at suspend and disconnect (bsc#1195917).
- drm/udl: Replace BUG_ON() with WARN_ON() (bsc#1195917).
- drm/udl: Replace semaphore with a simple wait queue (bsc#1195917).
- drm/udl: Restore display mode on resume (bsc#1195917)
- drm/udl: Suppress error print for -EPROTO at URB completion (bsc#1195917).
- drm/udl: Sync pending URBs at suspend / disconnect (bsc#1195917).
- drm/udl: Sync pending URBs at the end of suspend (bsc#1195917).
- drm/vc4: Fix missing platform_unregister_drivers() call in vc4_drm_register() (git-fixes).
- drm/vc4: change vc4_dma_range_matches from a global to static (git-fixes).
- drm/vc4: drv: Adopt the dma configuration from the HVS or V3D component (git-fixes).
- drm/vc4: dsi: Add correct stop condition to vc4_dsi_encoder_disable iteration (git-fixes).
- drm/vc4: dsi: Correct DSI divider calculations (git-fixes).
- drm/vc4: dsi: Correct pixel order for DSI0 (git-fixes).
- drm/vc4: dsi: Fix dsi0 interrupt support (git-fixes).
- drm/vc4: dsi: Register dsi0 as the correct vc4 encoder type (git-fixes).
- drm/vc4: hdmi: Correct HDMI timing registers for interlaced modes (git-fixes).
- drm/vc4: hdmi: Disable audio if dmas property is present but empty (git-fixes).
- drm/vc4: hdmi: Fix timings for interlaced modes (git-fixes).
- drm/vc4: hdmi: Reset HDMI MISC_CONTROL register (git-fixes).
- drm/vc4: kms: Fix IS_ERR() vs NULL check for vc4_kms (git-fixes).
- drm/vc4: plane: Fix margin calculations for the right/bottom edges (git-fixes).
- drm/vc4: plane: Remove subpixel positioning check (git-fixes).
- drm/virtio: Check whether transferred 2D BO is shmem (git-fixes).
- drm/virtio: Unlock reservations on virtio_gpu_object_shmem_init() error (git-fixes).
- drm: Fix potential null-ptr-deref in drm_vblank_destroy_worker() (git-fixes).
- drm: Prevent drm_copy_field() to attempt copying a NULL pointer (git-fixes).
- drm: Use size_t type for len variable in drm_copy_field() (git-fixes).
- drm: adv7511: override i2c address of cec before accessing it (git-fixes).
- drm: bridge: adv7511: Add check for mipi_dsi_driver_register (git-fixes).
- drm: bridge: adv7511: fix CEC power down control register offset (git-fixes).
- drm: bridge: dw_hdmi: only trigger hotplug event on link change (git-fixes).
- drm: bridge: sii8620: fix possible off-by-one (git-fixes).
- drm: fix drm_mipi_dbi build errors (git-fixes).
- drm: panel-orientation-quirks: Add quirk for Anbernic Win600 (git-fixes).
- drm:pl111: Add of_node_put() when breaking out of for_each_available_child_of_node() (git-fixes).
- dsa: mv88e6xxx: fix debug print for SPEED_UNFORCED (git-fixes).
- dt-bindings: PCI: microchip,pcie-host: fix missing clocks properties (git-fixes).
- dt-bindings: PCI: microchip,pcie-host: fix missing dma-ranges (git-fixes).
- dt-bindings: arm: qcom: fix MSM8916 MTP compatibles (git-fixes).
- dt-bindings: arm: qcom: fix MSM8994 boards compatibles (git-fixes).
- dt-bindings: bluetooth: broadcom: Add BCM4349B1 DT binding (git-fixes).
- dt-bindings: clock: qcom,gcc-msm8996: add more GCC clock sources (git-fixes).
- dt-bindings: clocks: imx8mp: Add ID for usb suspend clock (git-fixes).
- dt-bindings: crypto: ti,sa2ul: drop dma-coherent property (git-fixes).
- dt-bindings: display/msm: dpu-sc7180: add missing DPU opp-table (git-fixes).
- dt-bindings: display/msm: dpu-sdm845: add missing DPU opp-table (git-fixes).
- dt-bindings: gpio: zynq: Add missing compatible strings (git-fixes).
- dt-bindings: hwmon: (mr75203) fix 'intel,vm-map' property to be optional (git-fixes).
- dt-bindings: iio: accel: Add DT binding doc for ADXL355 (git-fixes).
- dt-bindings: mtd: intel: lgm-nand: Fix compatible string (git-fixes).
- dt-bindings: mtd: intel: lgm-nand: Fix maximum chip select value (git-fixes).
- dt-bindings: phy: qcom,qmp-usb3-dp: fix bogus clock-cells property (git-fixes).
- dt-bindings: phy: qcom,qmp: fix bogus clock-cells property (git-fixes).
- dt-bindings: power: gpcv2: add power-domains property (git-fixes).
- dt-bindings: usb: mtk-xhci: Allow wakeup interrupt-names to be optional (git-fixes).
- dtb: Do not include sources in src.rpm - refer to kernel-source Same as other kernel binary packages there is no need to carry duplicate sources in dtb packages.
- dyndbg: fix module.dyndbg handling (git-fixes).
- dyndbg: fix static_branch manipulation (git-fixes).
- dyndbg: let query-modname override actual module name (git-fixes).
- e1000e: Fix TX dispatch condition (git-fixes).
- e100: Fix possible use after free in e100_xmit_prepare (git-fixes).
- eeprom: idt_89hpesx: uninitialized data in idt_dbgfs_csr_write() (git-fixes).
- efi/tpm: Pass correct address to memblock_reserve (git-fixes).
- efi: Correct Macmini DMI match in uefi cert quirk (git-fixes).
- efi: capsule-loader: Fix use-after-free in efi_capsule_write (git-fixes).
- efi: libstub: Disable struct randomization (git-fixes).
- efi: libstub: drop pointless get_memory_map() call (git-fixes).
- efi: random: Use 'ACPI reclaim' memory for random seed (git-fixes).
- efi: random: reduce seed size to 32 bytes (git-fixes).
- erofs: fix deadlock when shrink erofs slab (git-fixes).
- eth: alx: take rtnl_lock on resume (git-fixes).
- eth: sun: cassini: remove dead code (git-fixes).
- ethernet: rocker: fix sleep in atomic context bug in neigh_timer_handler (git-fies).
- exfat: Define NLS_NAME_* as bit flags explicitly (bsc#1201725).
- exfat: Downgrade ENAMETOOLONG error message to debug messages (bsc#1201725).
- exfat: Drop superfluous new line for error messages (bsc#1201725).
- exfat: Expand exfat_err() and co directly to pr_*() macro (bsc#1201725).
- exfat: Return ENAMETOOLONG consistently for oversized paths (bsc#1201725).
- exfat: fix i_blocks for files truncated over 4 GiB (git-fixes).
- exfat: fix referencing wrong parent directory information after renaming (git-fixes).
- exfat: reuse exfat_inode_info variable instead of calling EXFAT_I() (git-fixes).
- exfat: use updated exfat_chain directly during renaming (git-fixes).
- export: fix string handling of namespace in EXPORT_SYMBOL_NS (git-fixes).
- ext4: Fix BUG_ON in ext4_bread when write quota data (bsc#1197755).
- ext4: add new helper interface ext4_try_to_trim_range() (bsc#1202783).
- ext4: add reserved GDT blocks check (bsc#1202712).
- ext4: avoid BUG_ON when creating xattrs (bsc#1205496).
- ext4: do not use the orphan list when migrating an inode (bsc#1197756).
- ext4: fast commit may miss tracking unwritten range during ftruncate (bsc#1202759).
- ext4: filter out EXT4_FC_REPLAY from on-disk superblock field s_state (bsc#1202771).
- ext4: fix a possible ABBA deadlock due to busy PA (bsc#1202762).
- ext4: fix bug_on in ext4_writepages (bsc#1200872).
- ext4: fix error handling in ext4_fc_record_modified_inode() (bsc#1202767).
- ext4: fix error handling in ext4_restore_inline_data() (bsc#1197757).
- ext4: fix fallocate to use file_modified to update permissions consistently (bsc#1202769). Refresh ext4-fix-race-condition-between-ext4_write-and-ext4_.patch
- ext4: fix fast commit may miss tracking range for FALLOC_FL_ZERO_RANGE (bsc#1202757).
- ext4: fix fs corruption when tring to remove a non-empty directory with IO error (bsc#1202768).
- ext4: fix incorrect type issue during replay_del_range (bsc#1202867).
- ext4: fix null-ptr-deref in '__ext4_journal_ensure_credits' (bsc#1202764).
- ext4: fix overhead calculation to account for the reserved gdt blocks (bsc#1200869).
- ext4: fix race when reusing xattr blocks (bsc#1198971).
- ext4: fix super block checksum incorrect after mount (bsc#1202773).
- ext4: fix symlink file size not match to file content (bsc#1200868).
- ext4: fix use-after-free in ext4_rename_dir_prepare (bsc#1200871).
- ext4: fix use-after-free in ext4_search_dir (bsc#1202710).
- ext4: fix warning in ext4_handle_inode_extension (bsc#1202711).
- ext4: force overhead calculation if the s_overhead_cluster makes no sense (bsc#1200870).
- ext4: initialize err_blk before calling __ext4_get_inode_loc (bsc#1202763).
- ext4: make sure quota gets properly shutdown on error (bsc#1195480).
- ext4: make sure to reset inode lockdep class when quota enabling fails (bsc#1202761).
- ext4: mark group as trimmed only if it was fully scanned (bsc#1202770).
- ext4: modify the logic of ext4_mb_new_blocks_simple (bsc#1202766).
- ext4: prevent used blocks from being allocated during fast commit replay (bsc#1202765).
- ext4: recover csum seed of tmp_inode after migrating to extents (bsc#1202713).
- ext4: remove EA inode entry from mbcache on inode eviction (bsc#1198971).
- ext4: unindent codeblock in ext4_xattr_block_set() (bsc#1198971).
- ext4: use ext4_ext_remove_space() for fast commit replay delete range (bsc#1202758).
- fat: add ratelimit to fat*_ent_bread() (git-fixes).
- fbcon: Add option to enable legacy hardware acceleration (bsc#1152472) Backporting changes: 	* context fixes in other patch 	* update config
- fbcon: Fix accelerated fbdev scrolling while logo is still shown (bsc#1152472)
- fbcon: Fix boundary checks for fbcon=vc:n1-n2 parameters (git-fixes).
- fbdev: chipsfb: Add missing pci_disable_device() in chipsfb_pci_init() (git-fixes).
- fbdev: cyber2000fb: fix missing pci_disable_device() (git-fixes).
- fbdev: da8xx-fb: Fix error handling in .remove() (git-fixes).
- fbdev: fb_pm2fb: Avoid potential divide by zero error (git-fixes).
- fbdev: fbcon: Properly revert changes when vc_resize() failed (git-fies).
- fbdev: smscufx: Fix several use-after-free bugs (git-fixes).
- fec: Fix timer capture timing in `fec_ptp_enable_pps()` (git-fixes).
- filemap: Handle sibling entries in filemap_get_read_batch() (bsc#1202774).
- firmware: arm_scmi: Add SCMI PM driver remove routine (git-fixes).
- firmware: arm_scmi: Fix the asynchronous reset requests (git-fixes).
- firmware: arm_scmi: Harden accesses to the reset domains (git-fixes).
- firmware: arm_scmi: Harden accesses to the sensor domains (git-fixes).
- firmware: arm_scmi: Improve checks in the info_get operations (git-fixes).
- firmware: arm_scmi: Make Rx chan_setup fail on memory errors (git-fixes).
- firmware: arm_scmi: Suppress the driver's bind attributes (git-fixes).
- firmware: arm_scpi: Ensure scpi_info is not assigned if the probe fails (git-fixes).
- firmware: coreboot: Register bus in module init (git-fixes).
- firmware: cs_dsp: Add lockdep asserts to interface functions (bsc#1203699).
- firmware: cs_dsp: Add memory chunk helpers (bsc#1203699).
- firmware: cs_dsp: Add offset to cs_dsp read/write (bsc#1203699).
- firmware: cs_dsp: Add pre_run callback (bsc#1203699).
- firmware: cs_dsp: Add pre_stop callback (bsc#1203699).
- firmware: cs_dsp: Add support for rev 2 coefficient files (bsc#1203699).
- firmware: cs_dsp: Add version checks on coefficient loading (bsc#1203699).
- firmware: cs_dsp: Allow creation of event controls (bsc#1203699).
- firmware: cs_dsp: Clarify some kernel doc comments (bsc#1203699).
- firmware: cs_dsp: Clear core reset for cache (bsc#1203699).
- firmware: cs_dsp: Fix overrun of unterminated control name string (bsc#1203699).
- firmware: cs_dsp: Move lockdep asserts to avoid potential null pointer (bsc#1203699).
- firmware: cs_dsp: Perform NULL check in cs_dsp_coeff_write/read_ctrl (bsc#1203699).
- firmware: cs_dsp: Print messages from bin files (bsc#1203699).
- firmware: cs_dsp: add driver to support firmware loading on Cirrus Logic DSPs (bsc#1203699).
- firmware: cs_dsp: tidy includes in cs_dsp.c and cs_dsp.h (bsc#1203699).
- firmware: google: Test spinlock on panic path to avoid lockups (git-fixes).
- firmware: tegra: Fix error check return value of debugfs_create_file() (git-fixes).
- firmware: tegra: bpmp: Do only aligned access to IPC memory area (git-fixes).
- fix race between exit_itimers() and /proc/pid/timers (git-fixes).
- fm10k: Fix error handling in fm10k_init_module() (git-fixes).
- fpga: altera-pr-ip: fix unsigned comparison with less than zero (git-fixes).
- fpga: prevent integer overflow in dfl_feature_ioctl_set_irq() (git-fixes).
- fs-writeback: writeback_sb_inodes: Recalculate 'wrote' according skipped pages (bsc#1200873).
- fs/binfmt_elf: Fix memory leak in load_elf_binary() (git-fixes).
- ftrace/x86: Add back ftrace_expected assignment (git-fixes).
- ftrace: Fix NULL pointer dereference in is_ftrace_trampoline when ftrace is dead (git-fixes).
- ftrace: Fix char print issue in print_ip_ins() (git-fixes).
- ftrace: Fix null pointer dereference in ftrace_add_mod() (git-fixes).
- ftrace: Fix the possible incorrect kernel message (git-fixes).
- ftrace: Fix use-after-free for dynamic ftrace_ops (git-fixes).
- ftrace: Optimize the allocation for mcount entries (git-fixes).
- ftrace: Properly unset FTRACE_HASH_FL_MOD (git-fixes).
- fuse: Remove the control interface for virtio-fs (bsc#1203798).
- fuse: add file_modified() to fallocate (bsc#1205332).
- fuse: fix deadlock between atomic O_TRUNC and page invalidation (bsc#1204533).
- fuse: fix readdir cache race (bsc#1205331).
- fuse: ioctl: translate ENOSYS (bsc#1203139).
- fuse: limit nsec (bsc#1203138).
- fuse: lock inode unconditionally in fuse_fallocate() (bsc#1206273).
- gadgetfs: ep_io - wait until IRQ finishes (git-fixes).
- gcov: support GCC 12.1 and newer compilers (git-fixes).
- geneve: do not use RT_TOS for IPv6 flowlabel (git-fixes).
- geneve: fix TOS inheriting for ipv4 (git-fixes).
- gpio: amd8111: Fix PCI device reference count leak (git-fixes).
- gpio: gpiolib-of: Fix refcount bugs in of_mm_gpiochip_add_data() (git-fixes).
- gpio: mockup: fix NULL pointer dereference when removing debugfs (git-fixes).
- gpio: mockup: remove gpio debugfs when remove device (git-fixes).
- gpio: mpc8xxx: Fix support for IRQ_TYPE_LEVEL_LOW flow_type in mpc85xx (git-fixes).
- gpio: mvebu: Fix check for pwm support on non-A8K platforms (git-fixes).
- gpio: pca953x: Add mutex_lock for regcache sync in PM (git-fixes).
- gpiolib: cdev: Set lineevent_state::irq after IRQ register successfully (git-fixes).
- gpu: lontium-lt9611: Fix NULL pointer dereference in lt9611_connector_init() (git-fixes).
- gve: Fix GFP flags when allocing pages (git-fixes).
- habanalabs/gaudi: fix shift out of bounds (git-fixes).
- habanalabs/gaudi: mask constant value before cast (git-fixes).
- hamradio: fix issue of dev reference count leakage in bpq_device_event() (git-fixes).
- hid: hid-logitech-hidpp: avoid unnecessary assignments in hidpp_connect_event (git-fixes).
- hid: intel-ish-hid: ishtp: Fix ishtp client sending disordered message (git-fixes).
- hinic: Avoid some over memory allocation (git-fixes).
- hv_netvsc: Fix potential dereference of NULL pointer (git-fixes).
- hv_netvsc: Fix race between VF offering and VF association message from host (bsc#1204850).
- hv_netvsc: Print value of invalid ID in netvsc_send_{completion,tx_complete}() (git-fixes).
- hv_sock: Add validation for untrusted Hyper-V values (git-fixes).
- hv_sock: Check hv_pkt_iter_first_raw()'s return value (git-fixes).
- hv_sock: Copy packets sent by Hyper-V out of the ring buffer (git-fixes).
- hwmon/coretemp: Handle large core ID value (git-fixes).
- hwmon: (coretemp) Check for null before removing sysfs attrs (git-fixes).
- hwmon: (coretemp) fix pci device refcount leak in nv1a_ram_new() (git-fixes).
- hwmon: (dell-smm) Add Dell XPS 13 7390 to fan control whitelist (git-fixes).
- hwmon: (drivetemp) Add module alias (git-fixes).
- hwmon: (gpio-fan) Fix array out of bounds access (git-fixes).
- hwmon: (gsc-hwmon) Call of_node_get() before of_find_xxx API (git-fixes).
- hwmon: (i5500_temp) fix missing pci_disable_device() (git-fixes).
- hwmon: (ibmpex) Fix possible UAF when ibmpex_register_bmc() fails (git-fixes).
- hwmon: (ina3221) Fix shunt sum critical calculation (git-fixes).
- hwmon: (ltc2947) fix temperature scaling (git-fixes).
- hwmon: (mr75203) enable polling for all VM channels (git-fixes).
- hwmon: (mr75203) fix VM sensor allocation when 'intel,vm-map' not defined (git-fixes).
- hwmon: (mr75203) fix multi-channel voltage reading (git-fixes).
- hwmon: (mr75203) fix voltage equation for negative source input (git-fixes).
- hwmon: (mr75203) update pvt->v_num and vm_num to the actual number of used sensors (git-fixes).
- hwmon: (pmbus/mp2888) Fix sensors readouts for MPS Multi-phase mp2888 controller (git-fixes).
- hwmon: (sht15) Fix wrong assumptions in device remove callback (git-fixes).
- hwmon: (sht4x) do not overflow clamping operation on 32-bit platforms (git-fixes).
- hwmon: (tps23861) fix byte order in resistance register (git-fixes).
- i2c: Fix a potential use after free (git-fixes).
- i2c: acpi: Add an i2c_acpi_client_count() helper function (bsc#1203699).
- i2c: cadence: Support PEC for SMBus block read (git-fixes).
- i2c: designware: Fix handling of real but unexpected device interrupts (git-fixes).
- i2c: i801: Add support for Intel Ice Lake PCH-N (jsc#PED-634).
- i2c: i801: Add support for Intel Meteor Lake-P (jsc#PED-732).
- i2c: i801: Add support for Intel Raptor Lake PCH-S (jsc#PED-634).
- i2c: i801: Improve handling of chip-specific feature definitions (jsc#PED-634).
- i2c: i801: add lis3lv02d's I2C address for Vostro 5568 (git-fixes).
- i2c: imx: If pm_runtime_get_sync() returned 1 device access is possible (git-fixes).
- i2c: imx: Make sure to unregister adapter on remove() (git-fixes).
- i2c: imx: Only DMA messages with I2C_M_DMA_SAFE flag set (git-fixes).
- i2c: mlxbf: Fix frequency calculation (git-fixes).
- i2c: mlxbf: incorrect base address passed during io write (git-fixes).
- i2c: mlxbf: prevent stack overflow in mlxbf_i2c_smbus_start_transaction() (git-fixes).
- i2c: mlxbf: support lock mechanism (git-fixes).
- i2c: mux-gpmux: Add of_node_put() when breaking out of loop (git-fixes).
- i2c: mxs: Silence a clang warning (git-fixes).
- i2c: npcm7xx: Fix error handling in npcm_i2c_init() (git-fixes).
- i2c: npcm: Capitalize the one-line comment (git-fixes).
- i2c: npcm: Correct slave role behavior (git-fixes).
- i2c: npcm: Remove own slave addresses 2:10 (git-fixes).
- i2c: piix4: Fix adapter not be removed in piix4_remove() (git-fixes).
- i2c: qcom-cci: Fix ordering of pm_runtime_xx and i2c_add_adapter (git-fixes).
- i2c: tegra: Allocate DMA memory for DMA engine (git-fixes).
- i2c: xiic: Add platform module alias (git-fixes).
- i40e: Fix call trace in setup_tx_descriptors (git-fixes).
- i40e: Fix dropped jumbo frames statistics (git-fixes).
- i40e: Fix to stop tx_timeout recovery if GLOBR fails (git-fixes).
- iavf: Fix adminq error handling (git-fixes).
- iavf: Fix handling of dummy receive descriptors (git-fixes).
- iavf: Fix reset error handling (git-fixes).
- ibmvnic: Free rwi on reset success (bsc#1184350 ltc#191533 git-fixes).
- ice: Allow operation with reduced device MSI-X (bsc#1201987).
- ice: Do not skip not enabled queues in ice_vc_dis_qs_msg (git-fixes).
- ice: Fix KASAN error in LAG NETDEV_UNREGISTER handler (git-fixes).
- ice: Fix race during aux device (un)plugging (git-fixes).
- ice: Fix switchdev rules book keeping (git-fixes).
- ice: Match on all profiles in slow-path (git-fixes).
- ice: arfs: fix use-after-free when freeing @rx_cpu_rmap (git-fixes).
- ice: check (DD | EOF) bits on Rx descriptor rather than (EOP | RS) (git-fixes).
- ice: do not setup vlan for loopback VSI (git-fixes).
- ice: fix 'scheduling while atomic' on aux critical err interrupt (git-fixes).
- ice: fix crash when writing timestamp on RX rings (git-fixes).
- ice: fix possible under reporting of ethtool Tx and Rx statistics (git-fixes).
- ieee80211: add EHT 1K aggregation definitions (bsc#1202131).
- ieee80211: change HE nominal packet padding value defines (bsc#1202131).
- ieee802154/adf7242: defer destroy_workqueue call (git-fixes).
- ieee802154: cc2520: Fix error return code in cc2520_hw_init() (git-fixes).
- ieee802154: cc2520: add rc code in cc2520_tx() (git-fixes).
- igb: Make DMA faster when CPU is active on the PCIe link (git-fixes).
- igb: fix a use-after-free issue in igb_clean_tx_ring (git-fixes).
- igb: skip phy status check where unavailable (git-fixes).
- iio: ABI: Fix wrong format of differential capacitance channel ABI (git-fixes).
- iio: accel: bma220: Fix alignment for DMA safety (git-fixes).
- iio: accel: bma400: Fix the scale min and max macro values (git-fixes).
- iio: accel: bma400: Reordering of header files (git-fixes).
- iio: accel: sca3000: Fix alignment for DMA safety (git-fixes).
- iio: accel: sca3300: Fix alignment for DMA safety (git-fixes).
- iio: ad7292: Prevent regulator double disable (git-fixes).
- iio: adc: ad7266: Fix alignment for DMA safety (git-fixes).
- iio: adc: ad7292: Fix alignment for DMA safety (git-fixes).
- iio: adc: ad7298: Fix alignment for DMA safety (git-fixes).
- iio: adc: ad7476: Fix alignment for DMA safety (git-fixes).
- iio: adc: ad7766: Fix alignment for DMA safety (git-fixes).
- iio: adc: ad7768-1: Fix alignment for DMA safety (git-fixes).
- iio: adc: ad7887: Fix alignment for DMA safety (git-fixes).
- iio: adc: ad7923: Fix alignment for DMA safety (git-fixes).
- iio: adc: ad7923: fix channel readings for some variants (git-fixes).
- iio: adc: at91-sama5d2_adc: check return status for pressure and touch (git-fixes).
- iio: adc: at91-sama5d2_adc: disable/prepare buffer on suspend/resume (git-fixes).
- iio: adc: at91-sama5d2_adc: fix AT91_SAMA5D2_MR_TRACKTIM_MAX (git-fixes).
- iio: adc: at91-sama5d2_adc: lock around oversampling and sample freq (git-fixes).
- iio: adc: at91_adc: fix possible memory leak in at91_adc_allocate_trigger() (git-fixes).
- iio: adc: hi8435: Fix alignment for DMA safety (git-fixes).
- iio: adc: ltc2496: Fix alignment for DMA safety (git-fixes).
- iio: adc: ltc2497: Fix alignment for DMA safety (git-fixes).
- iio: adc: max1027: Fix alignment for DMA safety (git-fixes).
- iio: adc: max11100: Fix alignment for DMA safety (git-fixes).
- iio: adc: max1118: Fix alignment for DMA safety (git-fixes).
- iio: adc: max1241: Fix alignment for DMA safety (git-fixes).
- iio: adc: mcp320x: Fix alignment for DMA safety (git-fixes).
- iio: adc: mcp3911: make use of the sign bit (git-fixes).
- iio: adc: mcp3911: use correct formula for AD conversion (git-fixes).
- iio: adc: mcp3911: use correct id bits (git-fixes).
- iio: adc: mp2629: fix potential array out of bound access (git-fixes).
- iio: adc: mp2629: fix wrong comparison of channel (git-fixes).
- iio: adc: ti-adc0832: Fix alignment for DMA safety (git-fixes).
- iio: adc: ti-adc084s021: Fix alignment for DMA safety (git-fixes).
- iio: adc: ti-adc108s102: Fix alignment for DMA safety (git-fixes).
- iio: adc: ti-adc12138: Fix alignment for DMA safety (git-fixes).
- iio: adc: ti-adc128s052: Fix alignment for DMA safety (git-fixes).
- iio: adc: ti-adc161s626: Fix alignment for DMA safety (git-fixes).
- iio: adc: ti-ads124s08: Fix alignment for DMA safety (git-fixes).
- iio: adc: ti-ads131e08: Fix alignment for DMA safety (git-fixes).
- iio: adc: ti-ads7950: Fix alignment for DMA safety (git-fixes).
- iio: adc: ti-ads8344: Fix alignment for DMA safety (git-fixes).
- iio: adc: ti-ads8688: Fix alignment for DMA safety (git-fixes).
- iio: adc: ti-tlc4541: Fix alignment for DMA safety (git-fixes).
- iio: adxl372: Fix unsafe buffer attributes (git-fixes).
- iio: amplifiers: ad8366: Fix alignment for DMA safety (git-fixes).
- iio: bmc150-accel-core: Fix unsafe buffer attributes (git-fixes).
- iio: common: ssp: Fix alignment for DMA safety (git-fixes).
- iio: core: Fix IIO_ALIGN and rename as it was not sufficiently large (git-fixes).
- iio: core: Fix entry not deleted when iio_register_sw_trigger_type() fails (git-fixes).
- iio: dac: ad5064: Fix alignment for DMA safety (git-fixes).
- iio: dac: ad5360: Fix alignment for DMA safety (git-fixes).
- iio: dac: ad5421: Fix alignment for DMA safety (git-fixes).
- iio: dac: ad5449: Fix alignment for DMA safety (git-fixes).
- iio: dac: ad5504: Fix alignment for DMA safety (git-fixes).
- iio: dac: ad5593r: Fix i2c read protocol requirements (git-fixes).
- iio: dac: ad5755: Fix alignment for DMA safety (git-fixes).
- iio: dac: ad5761: Fix alignment for DMA safety (git-fixes).
- iio: dac: ad5764: Fix alignment for DMA safety (git-fixes).
- iio: dac: ad5766: Fix alignment for DMA safety (git-fixes).
- iio: dac: ad5770r: Fix alignment for DMA safety (git-fixes).
- iio: dac: ad5791: Fix alignment for DMA saftey (git-fixes).
- iio: dac: ad7303: Fix alignment for DMA safety (git-fixes).
- iio: dac: ad8801: Fix alignment for DMA safety (git-fixes).
- iio: dac: mcp4922: Fix alignment for DMA safety (git-fixes).
- iio: dac: ti-dac082s085: Fix alignment for DMA safety (git-fixes).
- iio: dac: ti-dac5571: Fix alignment for DMA safety (git-fixes).
- iio: dac: ti-dac7311: Fix alignment for DMA safety (git-fixes).
- iio: dac: ti-dac7612: Fix alignment for DMA safety (git-fixes).
- iio: fix iio_format_avail_range() printing for none IIO_VAL_INT (git-fixes).
- iio: frequency: ad9523: Fix alignment for DMA safety (git-fixes).
- iio: frequency: adf4350: Fix alignment for DMA safety (git-fixes).
- iio: frequency: adf4371: Fix alignment for DMA safety (git-fixes).
- iio: gyro: adis16080: Fix alignment for DMA safety (git-fixes).
- iio: gyro: adis16130: Fix alignment for DMA safety (git-fixes).
- iio: gyro: adxrs450: Fix alignment for DMA safety (git-fixes).
- iio: gyro: fxas210002c: Fix alignment for DMA safety (git-fixes).
- iio: health: afe4403: Fix oob read in afe4403_read_raw (git-fixes).
- iio: health: afe4404: Fix oob read in afe4404_[read|write]_raw (git-fixes).
- iio: imu: fxos8700: Fix alignment for DMA safety (git-fixes).
- iio: inkern: fix return value in devm_of_iio_channel_get_by_name() (git-fixes).
- iio: inkern: only release the device node when done with it (git-fixes).
- iio: light: apds9960: fix wrong register for gesture gain (git-fixes).
- iio: light: isl29028: Fix the warning in isl29028_remove() (git-fixes).
- iio: light: rpr0521: add missing Kconfig dependencies (git-fixes).
- iio: light: tsl2583: Fix module unloading (git-fixes).
- iio: ltc2497: Fix reading conversion results (git-fixes).
- iio: magnetometer: yas530: Change data type of hard_offsets to signed (git-fixes).
- iio: ms5611: Simplify IO callback parameters (git-fixes).
- iio: potentiometer: ad5272: Fix alignment for DMA safety (git-fixes).
- iio: potentiometer: max5481: Fix alignment for DMA safety (git-fixes).
- iio: potentiometer: mcp41010: Fix alignment for DMA safety (git-fixes).
- iio: potentiometer: mcp4131: Fix alignment for DMA safety (git-fixes).
- iio: pressure: dps310: Refactor startup procedure (git-fixes).
- iio: pressure: dps310: Reset chip after timeout (git-fixes).
- iio: pressure: ms5611: changed hardcoded SPI speed to value limited (git-fixes).
- iio: pressure: ms5611: fixed value compensation bug (git-fixes).
- iio: proximity: as3935: Fix alignment for DMA safety (git-fixes).
- iio: resolver: ad2s1200: Fix alignment for DMA safety (git-fixes).
- iio: resolver: ad2s90: Fix alignment for DMA safety (git-fixes).
- iio: temp: ltc2983: Fix alignment for DMA safety (git-fixes).
- iio: temp: maxim_thermocouple: Fix alignment for DMA safety (git-fixes).
- iio: temperature: ltc2983: allocate iio channels once (git-fixes).
- iio: trigger: sysfs: fix possible memory leak in iio_sysfs_trig_init() (git-fixes).
- ima: fix blocking of security.ima xattrs of unsupported algorithms (git-fixes).
- inet_diag: fix kernel-infoleak for UDP sockets (git-fixes).
- init/Kconfig: fix CC_HAS_ASM_GOTO_TIED_OUTPUT test with dash (git-fixes).
- intel_idle: Add AlderLake support (jsc#PED-824).
- intel_idle: Fix SPR C6 optimization (jsc#PED-824 jsc#PED-1936).
- intel_idle: Fix the 'preferred_cstates' module parameter (jsc#PED-824 jsc#PED-1936).
- intel_idle: make SPR C1 and C1E be independent (jsc#PED-1936).
- intel_th: Fix a resource leak in an error handling path (git-fixes).
- intel_th: msu-sink: Potential dereference of null pointer (git-fixes).
- intel_th: msu: Fix vmalloced buffers (git-fixes).
- intel_th: pci: Add Meteor Lake-P support (git-fixes).
- intel_th: pci: Add Raptor Lake-S CPU support (git-fixes).
- intel_th: pci: Add Raptor Lake-S PCH support (git-fixes).
- interconnect: imx: fix max_node_id (git-fixes).
- io-wq: Remove duplicate code in io_workqueue_create() (bnc#1205113).
- io-wq: do not retry task_work creation failure on fatal conditions (bnc#1205113).
- io-wq: ensure we exit if thread group is exiting (git-fixes).
- io-wq: exclusively gate signal based exit on get_signal() return (git-fixes).
- io-wq: fix cancellation on create-worker failure (bnc#1205113).
- io-wq: fix silly logic error in io_task_work_match() (bnc#1205113).
- io_uring: add a schedule point in io_add_buffers() (git-fixes).
- io_uring: correct __must_hold annotation (git-fixes).
- io_uring: drop ctx->uring_lock before acquiring sqd->lock (git-fixes).
- io_uring: ensure IORING_REGISTER_IOWQ_MAX_WORKERS works with SQPOLL (git-fixes).
- io_uring: fix io_timeout_remove locking (git-fixes).
- io_uring: fix missing mb() before waitqueue_active (git-fixes).
- io_uring: fix missing sigmask restore in io_cqring_wait() (git-fixes).
- io_uring: fix possible poll event lost in multi shot mode (git-fixes).
- io_uring: pin SQPOLL data before unlocking ring lock (git-fixes).
- io_uring: terminate manual loop iterator loop correctly for non-vecs (git-fixes).
- iommu/amd: Clarify AMD IOMMUv2 initialization messages (git-fixes).
- iommu/amd: Enable swiotlb in all cases (git-fixes).
- iommu/amd: Fix I/O page table memory leak (git-fixes).
- iommu/amd: Recover from event log overflow (git-fixes).
- iommu/amd: Simplify and Consolidate Virtual APIC (AVIC) Enablement (git-fixes).
- iommu/arm-smmu-v3-sva: Fix mm use-after-free (git-fixes).
- iommu/arm-smmu-v3: Fix size calculation in arm_smmu_mm_invalidate_range() (git-fixes).
- iommu/arm-smmu: qcom_iommu: Add of_node_put() when breaking out of loop (git-fixes).
- iommu/dart: Add missing module owner to ops structure (git-fixes).
- iommu/dart: check return value after calling platform_get_resource() (git-fixes).
- iommu/exynos: Handle failed IOMMU device registration properly (git-fixes).
- iommu/iova: Improve 32-bit free space estimate (git-fixes).
- iommu/ipmmu-vmsa: Check for error num after setting mask (git-fixes).
- iommu/mediatek: Add list_del in mtk_iommu_remove (git-fixes).
- iommu/mediatek: Add mutex for m4u_group and m4u_dom in data (git-fixes).
- iommu/mediatek: Fix 2 HW sharing pgtable issue (git-fixes).
- iommu/mediatek: Fix NULL pointer dereference when printing dev_name (git-fixes).
- iommu/mediatek: Remove clk_disable in mtk_iommu_remove (git-fixes).
- iommu/msm: Fix an incorrect NULL check on list iterator (git-fixes).
- iommu/omap: Fix regression in probe for NULL pointer dereference (git-fixes).
- iommu/tegra-smmu: Fix missing put_device() call in tegra_smmu_find (git-fixes).
- iommu/vt-d: Acquiring lock in domain ID allocation helpers (bsc#1200301).
- iommu/vt-d: Calculate mask for non-aligned flushes (git-fixes).
- iommu/vt-d: Do not falsely log intel_iommu is unsupported kernel option (bsc#1204947).
- iommu/vt-d: Drop stop marker messages (git-fixes).
- iommu/vt-d: Fix PCI bus rescan device hot add (git-fixes).
- iommu/vt-d: Fix RID2PASID setup/teardown failure (git-fixes).
- iommu/vt-d: Make DMAR_UNITS_SUPPORTED default 1024 (bsc#1200301).
- iommu/vt-d: Refactor iommu information of each domain (bsc#1200301).
- iommu/vt-d: Remove global g_iommus array (bsc#1200301).
- iommu/vt-d: Remove intel_iommu::domains (bsc#1200301).
- iommu/vt-d: Remove unnecessary check in intel_iommu_add() (bsc#1200301).
- iommu/vt-d: Use IDA interface to manage iommu sequence id (bsc#1200301).
- iommu/vt-d: avoid invalid memory access via node_online(NUMA_NO_NODE) (git-fixes).
- iommu: Fix potential use-after-free during probe (git-fixes).
- iov_iter: Fix iter_xarray_get_pages{,_alloc}() (git-fixes).
- iov_iter: fix build issue due to possible type mis-match (git-fixes).
- ip: Fix data-races around sysctl_ip_fwd_update_priority (git-fixes).
- ipmi: fix initialization when workqueue allocation fails (git-fixes).
- ipv4: Fix data-races around sysctl_fib_multipath_hash_policy (git-fixes).
- ipv6: ping: fix wrong checksum for large frames (bsc#1203183).
- irqchip/ls-extirq: Fix invalid wait context by avoiding to use regmap (git-fixes).
- irqchip/sifive-plic: Add missing thead,c900-plic match string (git-fixes).
- irqchip/tegra: Fix overflow implicit truncation warnings (git-fixes).
- isdn: mISDN: netjet: fix wrong check of device registration (git-fixes).
- iwlwifi/fw: use struct_size over open coded arithmetic (bsc#1202131).
- iwlwifi: ACPI: support revision 3 WGDS tables (bsc#1202131).
- iwlwifi: Add support for getting rf id with blank otp (bsc#1202131).
- iwlwifi: Add support for more BZ HWs (bsc#1202131).
- iwlwifi: BZ Family BUS_MASTER_DISABLE_REQ code duplication (bsc#1202131).
- iwlwifi: BZ Family SW reset support (bsc#1202131).
- iwlwifi: Configure FW debug preset via module param (bsc#1202131).
- iwlwifi: Fix FW name for gl (bsc#1202131).
- iwlwifi: Fix missing error code in iwl_pci_probe() (bsc#1202131).
- iwlwifi: Fix syntax errors in comments (bsc#1202131).
- iwlwifi: Make use of the helper macro LIST_HEAD() (bsc#1202131).
- iwlwifi: Read the correct addresses when getting the crf id (bsc#1202131).
- iwlwifi: Start scratch debug register for Bz family (bsc#1202131).
- iwlwifi: acpi: fix wgds rev 3 size (bsc#1202131).
- iwlwifi: acpi: move ppag code from mvm to fw/acpi (bsc#1202131).
- iwlwifi: add missing entries for Gf4 with So and SoF (bsc#1202131).
- iwlwifi: add new Qu-Hr device (bsc#1202131).
- iwlwifi: add new ax1650 killer device (bsc#1202131).
- iwlwifi: add new device id 7F70 (bsc#1202131).
- iwlwifi: add new pci SoF with JF (bsc#1202131).
- iwlwifi: add some missing kernel-doc in struct iwl_fw (bsc#1202131).
- iwlwifi: add support for BNJ HW (bsc#1202131).
- iwlwifi: add support for BZ-U and BZ-L HW (bsc#1202131).
- iwlwifi: add support for Bz-Z HW (bsc#1202131).
- iwlwifi: add vendor specific capabilities for some RFs (bsc#1202131).
- iwlwifi: advertise support for HE - DCM BPSK RX/TX (bsc#1202131).
- iwlwifi: allow rate-limited error messages (bsc#1202131).
- iwlwifi: api: fix struct iwl_wowlan_status_v7 kernel-doc (bsc#1202131).
- iwlwifi: api: remove ttl field from TX command (bsc#1202131).
- iwlwifi: api: remove unused RX status bits (bsc#1202131).
- iwlwifi: avoid variable shadowing (bsc#1202131).
- iwlwifi: avoid void pointer arithmetic (bsc#1202131).
- iwlwifi: bump FW API to 67 for AX devices (bsc#1202131).
- iwlwifi: bump FW API to 68 for AX devices (bsc#1202131).
- iwlwifi: bump FW API to 69 for AX devices (bsc#1202131).
- iwlwifi: bump FW API to 70 for AX devices (bsc#1202131).
- iwlwifi: bump FW API to 71 for AX devices (bsc#1202131).
- iwlwifi: bump FW API to 72 for AX devices (bsc#1202131).
- iwlwifi: cfg: add support for 1K BA queue (bsc#1202131).
- iwlwifi: dbg-tlv: clean up iwl_dbg_tlv_update_drams() (bsc#1202131).
- iwlwifi: dbg: add infra for tracking free buffer size (bsc#1202131).
- iwlwifi: dbg: check trigger data before access (bsc#1202131).
- iwlwifi: dbg: disable ini debug in 8000 family and below (bsc#1202131).
- iwlwifi: dbg: in sync mode do not call schedule (bsc#1202131).
- iwlwifi: dbg: treat dbgc allocation failure when tlv is missing (bsc#1202131).
- iwlwifi: dbg: treat non active regions as unsupported regions (bsc#1202131).
- iwlwifi: dbg_ini: Split memcpy() to avoid multi-field write (bsc#1202131).
- iwlwifi: de-const properly where needed (bsc#1202131).
- iwlwifi: debugfs: remove useless double condition (bsc#1202131).
- iwlwifi: do not dump_stack() when we get an unexpected interrupt (bsc#1202131).
- iwlwifi: do not use __unused as variable name (bsc#1202131).
- iwlwifi: drv: load tlv debug data earlier (bsc#1202131).
- iwlwifi: dump CSR scratch from outer function (bsc#1202131).
- iwlwifi: dump RCM error tables (bsc#1202131).
- iwlwifi: dump both TCM error tables if present (bsc#1202131).
- iwlwifi: dump host monitor data when NIC does not init (bsc#1202131).
- iwlwifi: dvm: use struct_size over open coded arithmetic (bsc#1202131).
- iwlwifi: eeprom: clean up macros (bsc#1202131).
- iwlwifi: fix LED dependencies (bsc#1202131).
- iwlwifi: fix debug TLV parsing (bsc#1202131).
- iwlwifi: fix fw/img.c license statement (bsc#1202131).
- iwlwifi: fix iwl_legacy_rate_to_fw_idx (bsc#1202131).
- iwlwifi: fix small doc mistake for iwl_fw_ini_addr_val (bsc#1202131).
- iwlwifi: fix various more -Wcast-qual warnings (bsc#1202131).
- iwlwifi: fw dump: add infrastructure for dump scrubbing (bsc#1202131).
- iwlwifi: fw: add support for splitting region type bits (bsc#1202131).
- iwlwifi: fw: api: add link to PHY context command struct v1 (bsc#1202131).
- iwlwifi: fw: correctly detect HW-SMEM region subtype (bsc#1202131).
- iwlwifi: fw: fix some scan kernel-doc (bsc#1202131).
- iwlwifi: fw: init SAR GEO table only if data is present (bsc#1202131).
- iwlwifi: fw: make dump_start callback void (bsc#1202131).
- iwlwifi: fw: remove dead error log code (bsc#1202131).
- iwlwifi: implement reset flow for Bz devices (bsc#1202131).
- iwlwifi: iwl-eeprom-parse: mostly dvm only (bsc#1202131).
- iwlwifi: make iwl_fw_lookup_cmd_ver() take a cmd_id (bsc#1202131).
- iwlwifi: make iwl_txq_dyn_alloc_dma() return the txq (bsc#1202131).
- iwlwifi: make some functions friendly to sparse (bsc#1202131).
- iwlwifi: move symbols into a separate namespace (bsc#1202131).
- iwlwifi: mvm/api: define system control command (bsc#1202131).
- iwlwifi: mvm: Add RTS and CTS flags to iwl_tx_cmd_flags (bsc#1202131).
- iwlwifi: mvm: Add list of OEMs allowed to use TAS (bsc#1202131).
- iwlwifi: mvm: Add support for a new version of scan request command (bsc#1202131).
- iwlwifi: mvm: Add support for new rate_n_flags in tx_cmd (bsc#1202131).
- iwlwifi: mvm: Consider P2P GO operation during scan (bsc#1202131).
- iwlwifi: mvm: Disable WiFi bands selectively with BIOS (bsc#1202131).
- iwlwifi: mvm: Do not fail if PPAG isn't supported (bsc#1202131).
- iwlwifi: mvm: Fix wrong documentation for scan request command (bsc#1202131).
- iwlwifi: mvm: Passively scan non PSC channels only when requested so (bsc#1202131).
- iwlwifi: mvm: Read acpi dsm to get channel activation bitmap (bsc#1202131).
- iwlwifi: mvm: Remove antenna c references (bsc#1202131).
- iwlwifi: mvm: Support new TX_RSP and COMPRESSED_BA_RES versions (bsc#1202131).
- iwlwifi: mvm: Support new rate_n_flags for REPLY_RX_MPDU_CMD and RX_NO_DATA_NOTIF (bsc#1202131).
- iwlwifi: mvm: Support new version of BEACON_TEMPLATE_CMD (bsc#1202131).
- iwlwifi: mvm: Support new version of ranging response notification (bsc#1202131).
- iwlwifi: mvm: Support version 3 of tlc_update_notif (bsc#1202131).
- iwlwifi: mvm: Unify the scan iteration functions (bsc#1202131).
- iwlwifi: mvm: Use all Rx chains for roaming scan (bsc#1202131).
- iwlwifi: mvm: add US/CA to TAS block list if OEM isn't allowed (bsc#1202131).
- iwlwifi: mvm: add a flag to reduce power command (bsc#1202131).
- iwlwifi: mvm: add additional info for boot info failures (bsc#1202131).
- iwlwifi: mvm: add dbg_time_point to debugfs (bsc#1202131).
- iwlwifi: mvm: add definitions for new rate & flags (bsc#1202131).
- iwlwifi: mvm: add lmac/umac PC info in case of error (bsc#1202131).
- iwlwifi: mvm: add missing min_size to kernel-doc (bsc#1202131).
- iwlwifi: mvm: add some missing command strings (bsc#1202131).
- iwlwifi: mvm: add support for 160Mhz in ranging measurements (bsc#1202131).
- iwlwifi: mvm: add support for CT-KILL notification version 2 (bsc#1202131).
- iwlwifi: mvm: add support for IMR based on platform (bsc#1202131).
- iwlwifi: mvm: add support for OCE scan (bsc#1202131).
- iwlwifi: mvm: add support for PHY context command v4 (bsc#1202131).
- iwlwifi: mvm: add support for statistics update version 15 (bsc#1202131).
- iwlwifi: mvm: allow enabling UHB TAS in the USA via ACPI setting (bsc#1202131).
- iwlwifi: mvm: always remove the session protection after association (bsc#1202131).
- iwlwifi: mvm: always store the PPAG table as the latest version (bsc#1202131).
- iwlwifi: mvm: always use 4K RB size by default (bsc#1202131).
- iwlwifi: mvm: change old-SN drop threshold (bsc#1202131).
- iwlwifi: mvm: clean up indenting in iwl_mvm_tlc_update_notif() (bsc#1202131).
- iwlwifi: mvm: convert old rate & flags to the new format (bsc#1202131).
- iwlwifi: mvm: correct sta-state logic for TDLS (bsc#1202131).
- iwlwifi: mvm: correctly set channel flags (bsc#1202131).
- iwlwifi: mvm: correctly set schedule scan profiles (bsc#1202131).
- iwlwifi: mvm: d3: move GTK rekeys condition (bsc#1202131).
- iwlwifi: mvm: d3: support v12 wowlan status (bsc#1202131).
- iwlwifi: mvm: d3: use internal data representation (bsc#1202131).
- iwlwifi: mvm: demote non-compliant kernel-doc header (bsc#1202131).
- iwlwifi: mvm: do not get address of mvm->fwrt just to dereference as a pointer (bsc#1202131).
- iwlwifi: mvm: do not send BAID removal to the FW during hw_restart (bsc#1202131).
- iwlwifi: mvm: do not trust hardware queue number (bsc#1202131).
- iwlwifi: mvm: drop too short packets silently (bsc#1202131).
- iwlwifi: mvm: extend session protection on association (bsc#1202131).
- iwlwifi: mvm: fix WGDS table print in iwl_mvm_chub_update_mcc() (bsc#1202131).
- iwlwifi: mvm: fix a stray tab (bsc#1202131).
- iwlwifi: mvm: fix condition which checks the version of rate_n_flags (bsc#1202131).
- iwlwifi: mvm: fix delBA vs. NSSN queue sync race (bsc#1202131).
- iwlwifi: mvm: fix ieee80211_get_he_iftype_cap() iftype (bsc#1202131).
- iwlwifi: mvm: fix off by one in iwl_mvm_stat_iterator_all_macs() (bsc#1202131).
- iwlwifi: mvm: fw: clean up hcmd struct creation (bsc#1202131).
- iwlwifi: mvm: handle RX checksum on Bz devices (bsc#1202131).
- iwlwifi: mvm: improve log when processing CSA (bsc#1202131).
- iwlwifi: mvm: isolate offload assist (checksum) calculation (bsc#1202131).
- iwlwifi: mvm: make iwl_mvm_reconfig_scd() static (bsc#1202131).
- iwlwifi: mvm: offload channel switch timing to FW (bsc#1202131).
- iwlwifi: mvm: only enable HE DCM if we also support TX (bsc#1202131).
- iwlwifi: mvm: optionally suppress assert log (bsc#1202131).
- iwlwifi: mvm: parse firmware alive message version 6 (bsc#1202131).
- iwlwifi: mvm: read 6E enablement flags from DSM and pass to FW (bsc#1202131).
- iwlwifi: mvm: reduce WARN_ON() in TX status path (bsc#1202131).
- iwlwifi: mvm: refactor iwl_mvm_sta_rx_agg() (bsc#1202131).
- iwlwifi: mvm: refactor setting PPE thresholds in STA_HE_CTXT_CMD (bsc#1202131).
- iwlwifi: mvm: remove card state notification code (bsc#1202131).
- iwlwifi: mvm: remove cipher scheme support (bsc#1202131).
- iwlwifi: mvm: remove csi from iwl_mvm_pass_packet_to_mac80211() (bsc#1202131).
- iwlwifi: mvm: remove iwl_mvm_disable_txq() flags argument (bsc#1202131).
- iwlwifi: mvm: remove session protection after auth/assoc (bsc#1202131).
- iwlwifi: mvm: remove session protection on disassoc (bsc#1202131).
- iwlwifi: mvm: remove session protection upon station removal (bsc#1202131).
- iwlwifi: mvm: rfi: handle deactivation notification (bsc#1202131).
- iwlwifi: mvm: rfi: update rfi table (bsc#1202131).
- iwlwifi: mvm: rfi: use kmemdup() to replace kzalloc + memcpy (bsc#1202131).
- iwlwifi: mvm: scrub key material in firmware dumps (bsc#1202131).
- iwlwifi: mvm: set BT-coex high priority for 802.1X/4-way-HS (bsc#1202131).
- iwlwifi: mvm: set inactivity timeouts also for PS-poll (bsc#1202131).
- iwlwifi: mvm: starting from 22000 we have 32 Rx AMPDU sessions (bsc#1202131).
- iwlwifi: mvm: support Bz TX checksum offload (bsc#1202131).
- iwlwifi: mvm: support RLC configuration command (bsc#1202131).
- iwlwifi: mvm: support new BAID allocation command (bsc#1202131).
- iwlwifi: mvm: support revision 1 of WTAS table (bsc#1202131).
- iwlwifi: mvm: support v3 of station HE context command (bsc#1202131).
- iwlwifi: mvm: update BAID allocation command again (bsc#1202131).
- iwlwifi: mvm: update RFI TLV (bsc#1202131).
- iwlwifi: mvm: update definitions due to new rate & flags (bsc#1202131).
- iwlwifi: mvm: update rate scale in moving back to assoc state (bsc#1202131).
- iwlwifi: mvm: use a define for checksum flags mask (bsc#1202131).
- iwlwifi: mvm: use debug print instead of WARN_ON() (bsc#1202131).
- iwlwifi: nvm: Correct HE capability (bsc#1202131).
- iwlwifi: parse debug exclude data from firmware file (bsc#1202131).
- iwlwifi: parse error tables from debug TLVs (bsc#1202131).
- iwlwifi: pcie: Adapt rx queue write pointer for Bz family (bsc#1202131).
- iwlwifi: pcie: add jacket bit to device configuration parsing (bsc#1202131).
- iwlwifi: pcie: add support for MS devices (bsc#1202131).
- iwlwifi: pcie: adjust to Bz completion descriptor (bsc#1202131).
- iwlwifi: pcie: fix SW error MSI-X mapping (bsc#1202131).
- iwlwifi: pcie: fix constant-conversion warning (bsc#1202131).
- iwlwifi: pcie: fix killer name matching for AX200 (bsc#1202131).
- iwlwifi: pcie: iwlwifi: fix device id 7F70 struct (bsc#1202131).
- iwlwifi: pcie: make sure iwl_rx_packet_payload_len() will not underflow (bsc#1202131).
- iwlwifi: pcie: refactor dev_info lookup (bsc#1202131).
- iwlwifi: pcie: remove duplicate entry (bsc#1202131).
- iwlwifi: pcie: remove two duplicate PNJ device entries (bsc#1202131).
- iwlwifi: pcie: retake ownership after reset (bsc#1202131).
- iwlwifi: pcie: simplify iwl_pci_find_dev_info() (bsc#1202131).
- iwlwifi: pcie: support Bz suspend/resume trigger (bsc#1202131).
- iwlwifi: pcie: try to grab NIC access early (bsc#1202131).
- iwlwifi: pcie: update sw error interrupt for BZ family (bsc#1202131).
- iwlwifi: pnvm: print out the version properly (bsc#1202131).
- iwlwifi: prefer WIDE_ID() over iwl_cmd_id() (bsc#1202131).
- iwlwifi: propagate (const) type qualifier (bsc#1202131).
- iwlwifi: recognize missing PNVM data and then log filename (bsc#1202131).
- iwlwifi: remove MODULE_AUTHOR() statements (bsc#1202131).
- iwlwifi: remove command ID argument from queue allocation (bsc#1202131).
- iwlwifi: remove contact information (bsc#1202131).
- iwlwifi: remove deprecated broadcast filtering feature (bsc#1202131).
- iwlwifi: remove redundant iwl_finish_nic_init() argument (bsc#1202131).
- iwlwifi: remove unused DC2DC_CONFIG_CMD definitions (bsc#1202131).
- iwlwifi: remove unused iwlax210_2ax_cfg_so_hr_a0 structure (bsc#1202131).
- iwlwifi: remove unused macros (bsc#1202131).
- iwlwifi: rename CHANNEL_SWITCH_NOA_NOTIF to CHANNEL_SWITCH_START_NOTIF (bsc#1202131).
- iwlwifi: rename GEO_TX_POWER_LIMIT to PER_CHAIN_LIMIT_OFFSET_CMD (bsc#1202131).
- iwlwifi: rs: add support for TLC config command ver 4 (bsc#1202131).
- iwlwifi: scan: Modify return value of a function (bsc#1202131).
- iwlwifi: support 4-bits in MAC step value (bsc#1202131).
- iwlwifi: support SAR GEO Offset Mapping override via BIOS (bsc#1202131).
- iwlwifi: support new queue allocation command (bsc#1202131).
- iwlwifi: swap 1650i and 1650s killer struct names (bsc#1202131).
- iwlwifi: tlc: Add logs in rs_fw_rate_init func to print TLC configuration (bsc#1202131).
- iwlwifi: use 4k queue size for Bz A-step (bsc#1202131).
- iwlwifi: yoyo: Avoid using dram data if allocation failed (bsc#1202131).
- iwlwifi: yoyo: add IMR DRAM dump support (bsc#1202131).
- iwlwifi: yoyo: disable IMR DRAM region if IMR is disabled (bsc#1202131).
- iwlwifi: yoyo: dump IMR DRAM only for HW and FW error (bsc#1202131).
- iwlwifi: yoyo: fix DBGC allocation flow (bsc#1202131).
- iwlwifi: yoyo: fix DBGI_SRAM ini dump header (bsc#1202131).
- iwlwifi: yoyo: fix issue with new DBGI_SRAM region read (bsc#1202131).
- iwlwifi: yoyo: fw debug config from context info and preset (bsc#1202131).
- iwlwifi: yoyo: send hcmd to fw after dump collection completes (bsc#1202131).
- iwlwifi: yoyo: support TLV-based firmware reset (bsc#1202131).
- iwlwifi: yoyo: support dump policy for the dump size (bsc#1202131).
- iwlwifi: yoyo: support for DBGC4 for dram (bsc#1202131).
- iwlwifi: yoyo: support for ROM usniffer (bsc#1202131).
- ixgbe: Add locking to prevent panic when setting sriov_numvfs to zero (git-fixes).
- ixgbe: fix bcast packets Rx on VF after promisc removal (git-fixes).
- ixgbe: fix unexpected VLAN Rx in promisc mode on VF (git-fixes).
- jbd2: export jbd2_journal_[grab|put]_journal_head (bsc#1202775).
- jbd2: fix assertion 'jh->b_frozen_data == NULL' failure when journal aborted (bsc#1202716).
- jbd2: fix outstanding credits assert in jbd2_journal_commit_transaction() (bsc#1202715).
- kABI workaround for spi changes (bsc#1203699).
- kABI: Add back removed struct paca member (bsc#1203664 ltc#199236).
- kABI: Fix after adding trace_iterator.wait_index (git-fixes).
- kABI: Fix kABI after 'KVM: x86/pmu: Use different raw event masks for AMD and Intel' (git-fixes).
- kABI: Fix kABI after SNP-Guest backport (jsc#SLE-19924, jsc#SLE-24814).
- kABI: Fix kABI after backport Add pmc->intr to refactor  kvm_perf_overflow{_intr}() (git-fixes).
- kABI: Fix kABI after backport Always set kvm_run->if_flag (git-fixes).
- kABI: Fix kABI after backport Forcibly leave nested virt when SMM state  is toggled (git-fixes).
- kABI: Fix kABI after backport Refactoring find_arch_event() to  pmc_perf_hw_id() (git-fixes).
- kABI: fix adding another field to scsi_device (bsc#1203039).
- kABI: reintroduce a non-inline usleep_range (git-fixes).
- kABI: scsi: libiscsi: fix removal of iscsi_create_conn (bsc#1198410).
- kabi/severities: Exclude ppc kvm
- kabi/severities: add Qlogic qed symbols
- kabi/severities: add drivers/scsi/hisi_sas for bsc#1202471
- kabi/severities: add hisilicon hns3 symbols
- kabi/severities: add microchip dsa drivers
- kabi/severities: ignore CS35L41-specific exports (bsc#1203699)
- kabi/severities: ignore kABI changes in mwifiex drivers Those symbols are used only locally in mwifiex (sub-)modules.
- kabi/severities: octeontx2 driver (jsc#SLE-24682)
- kbuild: Add skip_encoding_btf_enum64 option to pahole (git-fixes).
- kbuild: Unify options for BTF generation for vmlinux and modules (bsc#1204693).
- kbuild: disable header exports for UML in a straightforward way (git-fixes).
- kbuild: dummy-tools: avoid tmpdir leak in dummy gcc (git-fixes).
- kbuild: fix the modules order between drivers and libs (git-fixes).
- kbuild: link vmlinux only once for CONFIG_TRIM_UNUSED_KSYMS (2nd attempt) (git-fixes).
- kbuild: remove the target in signal traps when interrupted (git-fixes).
- kbuild: rpm-pkg: fix breakage when V=1 is used (git-fixes).
- kcm: fix strp_init() order and cleanup (git-fies).
- kernel-binary: move @NOSOURCE@ to @SOURCES@ as in other packages
- kernel-source: include the kernel signature file We assume that the upstream tarball is used for released kernels. Then we can also include the signature file and keyring in the kernel-source src.rpm. Because of mkspec code limitation exclude the signature and keyring from binary packages always - mkspec does not parse spec conditionals.
- kernfs: fix use-after-free in __kernfs_remove (git-fixes).
- kexec, KEYS, s390: Make use of built-in and secondary keyring for signature verification (bsc#1196444).
- kexec, KEYS: make the code in bzImage64_verify_sig generic (bsc#1196444).
- kexec: clean up arch_kexec_kernel_verify_sig (bsc#1196444).
- kexec: drop weak attribute from functions (bsc#1196444).
- kexec: turn all kexec_mutex acquisitions into trylocks (git-fixes).
- kexec_file: drop weak attribute from functions (bsc#1196444).
- kfifo: fix kfifo_to_user() return type (git-fixes).
- kselftest/arm64: Fix validatation termination record after EXTRA_CONTEXT (git-fixes).
- kselftest/cgroup: fix test_stress.sh to use OUTPUT dir (git-fixes).
- kselftest/vm: fix tests build with old libc (git-fixes).
- kselftest: Fix vdso_test_abi return status (git-fixes).
- kselftest: signal all child processes (git-fixes).
- kvm: selftests: do not use bitfields larger than 32-bits for PTEs (git-fixes).
- l3mdev: l3mdev_master_upper_ifindex_by_index_rcu should be using netdev_master_upper_dev_get_rcu (git-fixes).
- landlock: Add clang-format exceptions (git-fixes).
- landlock: Change landlock_add_rule(2) argument check ordering (git-fixes).
- landlock: Change landlock_restrict_self(2) check ordering (git-fixes).
- landlock: Create find_rule() from unmask_layers() (git-fixes).
- landlock: Define access_mask_t to enforce a consistent access mask size (git-fixes).
- landlock: Fix landlock_add_rule(2) documentation (git-fixes).
- landlock: Fix same-layer rule unions (git-fixes).
- landlock: Format with clang-format (git-fixes).
- landlock: Reduce the maximum number of layers to 16 (git-fixes).
- landlock: Use square brackets around 'landlock-ruleset' (git-fixes).
- lib/list_debug.c: Detect uninitialized lists (git-fixes).
- lib/raid6/test: fix multiple definition linking error (git-fixes).
- lib/sg_pool: change module_init(sg_pool_init) to subsys_initcall (git-fixes).
- lib/smp_processor_id: fix imbalanced instrumentation_end() call (git-fixes).
- libata: add ATA_HORKAGE_NOLPM for Pioneer BDR-207M and BDR-205 (git-fixes).
- livepatch: Add a missing newline character in klp_module_coming() (bsc#1071995).
- livepatch: fix race between fork and KLP transition (bsc#1071995).
- lkdtm: Disable return thunks in rodata.c (bsc#1190497).
- lockd: detect and reject lock arguments that overflow (git-fixes).
- lockdep: Correct lock_classes index mapping (git-fixes).
- locking/lockdep: Avoid potential access of invalid memory in lock_class (git-fixes).
- locking/lockdep: Fix lockdep_init_map_*() confusion (git-fixes).
- locking/lockdep: Iterate lock_classes directly when reading lockdep files (git-fixes).
- loop: Check for overflow while configuring loop (git-fies).
- loop: Use pr_warn_once() for loop_control_remove() warning (git-fixes).
- loop: use sysfs_emit() in the sysfs xxx show() (git-fixes).
- mISDN: fix misuse of put_device() in mISDN_register_device() (git-fixes).
- mISDN: fix possible memory leak in mISDN_dsp_element_register() (git-fixes).
- mISDN: fix possible memory leak in mISDN_register_device() (git-fixes).
- mISDN: fix use-after-free bugs in l1oip timer handlers (git-fixes).
- mISDN: hfcpci: Fix use-after-free bug in hfcpci_softirq (git-fixes).
- mac80211: fix a memory leak where sta_info is not freed (git-fixes).
- mac80211: introduce channel switch disconnect function (bsc#1202131).
- mac80211: radiotap: Use BIT() instead of shifts (git-fixes).
- mac802154: Fix LQI recording (git-fixes).
- mac802154: fix missing INIT_LIST_HEAD in ieee802154_if_add() (git-fixes).
- macsec: Fix invalid error code set (git-fixes).
- macsec: add missing attribute validation for offload (git-fixes).
- macsec: always read MACSEC_SA_ATTR_PN as a u64 (git-fixes).
- macsec: clear encryption keys from the stack after setting up offload (git-fixes).
- macsec: delete new rxsc when offload fails (git-fixes).
- macsec: fix NULL deref in macsec_add_rxsa (git-fixes).
- macsec: fix detection of RXSCs when toggling offloading (git-fixes).
- macsec: fix error message in macsec_add_rxsa and _txsa (git-fixes).
- macsec: fix secy->n_rx_sc accounting (git-fixes).
- macsec: limit replay window size with XPN (git-fixes).
- macvlan: enforce a consistent minimal mtu (git-fixes).
- mailbox: bcm-ferxrm-mailbox: Fix error check for dma_map_sg (git-fixes).
- mailbox: mpfs: account for mbox offsets while sending (git-fixes).
- mailbox: mpfs: fix handling of the reg property (git-fixes).
- marvell: octeontx2: build error: unknown type name 'u64' (jsc#SLE-24682).
- mbcache: add functions to delete entry if unused (bsc#1198971).
- mbcache: do not reclaim used entries (bsc#1198971).
- md-raid10: fix KASAN warning (git-fixes).
- md/bitmap: do not set sb values if can't pass sanity check (bsc#1197158).
- md/raid0: Ignore RAID0 layout if the second zone has only one device (git-fixes).
- md/raid1: fix missing bitmap update w/o WriteMostly devices (bsc#1203036).
- md/raid5: Ensure stripe_fill happens on non-read IO with journal (git-fixes).
- md/raid5: Remove unnecessary bio_put() in raid5_read_one_chunk() (git-fixes).
- md: Replace snprintf with scnprintf (git-fixes, bsc#1164051).
- md: call __md_stop_writes in md_stop (git-fixes).
- md: unlock mddev before reap sync_thread in action_store (bsc#1197659).
- media: [PATCH] pci: atomisp_cmd: fix three missing checks on list iterator (git-fixes).
- media: aspeed: Fix an error handling path in aspeed_video_probe() (git-fixes).
- media: atmel: atmel-sama7g5-isc: fix warning in configs without OF (git-fixes).
- media: atomisp: prevent integer overflow in sh_css_set_black_frame() (git-fixes).
- media: cedrus: Fix endless loop in cedrus_h265_skip_bits() (git-fixes).
- media: cedrus: Set the platform driver data earlier (git-fixes).
- media: cedrus: h265: Fix flag name (git-fixes).
- media: cedrus: hevc: Add check for invalid timestamp (git-fixes).
- media: coda: Add more H264 levels for CODA960 (git-fixes).
- media: coda: Fix reported H264 profile (git-fixes).
- media: cros-ec-cec: limit msg.len to CEC_MAX_MSG_SIZE (git-fixes).
- media: cx88: Fix a null-ptr-deref bug in buffer_prepare() (git-fixes).
- media: driver/nxp/imx-jpeg: fix a unexpected return value problem (git-fixes).
- media: dvb-frontends/drxk: initialize err to 0 (git-fixes).
- media: dvb_vb2: fix possible out of bound access (git-fixes).
- media: exynos4-is: Change clk_disable to clk_disable_unprepare (git-fixes).
- media: exynos4-is: Fix PM disable depth imbalance in fimc_is_probe (git-fixes).
- media: flexcop-usb: fix endpoint type check (git-fixes).
- media: hantro: postproc: Fix motion vector space size (git-fixes).
- media: hdpvr: fix error value returns in hdpvr_read (git-fixes).
- media: hevc: Embedded indexes in RPS (git-fixes).
- media: imx-jpeg: Add pm-runtime support for imx-jpeg (git-fixes).
- media: imx-jpeg: Add pm-sleep support for imx-jpeg (git-fixes).
- media: imx-jpeg: Correct some definition according specification (git-fixes).
- media: imx-jpeg: Disable slot interrupt when frame done (git-fixes).
- media: imx-jpeg: Fix potential array out of bounds in queue_setup (git-fixes).
- media: imx-jpeg: Leave a blank space before the configuration data (git-fixes).
- media: imx-jpeg: Refactor function mxc_jpeg_parse (git-fixes).
- media: imx-jpeg: use NV12M to represent non contiguous NV12 (git-fixes).
- media: ipu3-imgu: Fix NULL pointer dereference in active selection access (git-fixes).
- media: mceusb: Use new usb_control_msg_*() routines (git-fixes).
- media: mceusb: set timeout to at least timeout provided (git-fixes).
- media: meson: vdec: add missing clk_disable_unprepare on error in vdec_hevc_start() (git-fixes).
- media: meson: vdec: fix possible refcount leak in vdec_probe() (git-fixes).
- media: platform: mtk-mdp: Fix mdp_ipi_comm structure alignment.
- media: pvrusb2: fix memory leak in pvr_probe (git-fixes).
- media: rkisp1: Do not pass the quantization to rkisp1_csm_config() (git-fixes).
- media: rkisp1: Initialize color space on resizer sink and source pads (git-fixes).
- media: rkisp1: Use correct macro for gradient registers (git-fixes).
- media: rkisp1: Zero v4l2_subdev_format fields in when validating links (git-fixes).
- media: rkvdec: Disable H.264 error detection (git-fixes).
- media: s5p_cec: limit msg.len to CEC_MAX_MSG_SIZE (git-fixes).
- media: st-delta: Fix PM disable depth imbalance in delta_probe (git-fixes).
- media: tw686x: Fix memory leak in tw686x_video_init (git-fixes).
- media: tw686x: Register the irq at the end of probe (git-fixes).
- media: uvcvideo: Fix memory leak in uvc_gpio_parse (git-fixes).
- media: uvcvideo: Use entity get_cur in uvc_ctrl_set (git-fixes).
- media: v4l2-compat-ioctl32.c: zero buffer passed to v4l2_compat_get_array_args() (git-fixes).
- media: v4l2-dv-timings: add sanity checks for blanking values (git-fixes).
- media: v4l2-mem2mem: prevent pollerr when last_buffer_dequeued is set (git-fixes).
- media: v4l2: Fix v4l2_i2c_subdev_set_name function documentation (git-fixes).
- media: v4l: subdev: Fail graciously when getting try data for NULL state (git-fixes).
- media: venus: dec: Handle the case where find_format fails (git-fixes).
- media: videodev2.h: V4L2_DV_BT_BLANKING_HEIGHT should check 'interlaced' (git-fixes).
- media: vivid: dev->bitmap_cap wasn't freed in all cases (git-fixes).
- media: vivid: s_fbuf: add more sanity checks (git-fixes).
- media: vivid: set num_in/outputs to 0 if not supported (git-fixes).
- media: vsp1: Fix offset calculation for plane cropping.
- media: xilinx: vipp: Fix refcount leak in xvip_graph_dma_init (git-fixes).
- mediatek: mt76: eeprom: fix missing of_node_put() in mt76_find_power_limits_node() (git-fixes).
- mediatek: mt76: mac80211: Fix missing of_node_put() in mt76_led_init() (git-fixes).
- memory: of: Fix refcount leak bug in of_get_ddr_timings() (git-fixes).
- memory: of: Fix refcount leak bug in of_lpddr3_get_ddr_timings() (git-fixes).
- memory: pl353-smc: Fix refcount leak bug in pl353_smc_probe() (git-fixes).
- memstick/ms_block: Fix a memory leak (git-fixes).
- memstick/ms_block: Fix some incorrect memory allocation (git-fixes).
- meson-mx-socinfo: Fix refcount leak in meson_mx_socinfo_init (git-fixes).
- mfd: fsl-imx25: Fix an error handling path in mx25_tsadc_setup_irq() (git-fixes).
- mfd: fsl-imx25: Fix check for platform_get_irq() errors (git-fixes).
- mfd: intel-lpss: Add Intel Raptor Lake PCH-S PCI IDs (jsc#PED-634).
- mfd: intel_soc_pmic: Fix an error handling path in intel_soc_pmic_i2c_probe() (git-fixes).
- mfd: lp8788: Fix an error handling path in lp8788_irq_init() and lp8788_irq_init() (git-fixes).
- mfd: lp8788: Fix an error handling path in lp8788_probe() (git-fixes).
- mfd: max77620: Fix refcount leak in max77620_initialise_fps (git-fixes).
- mfd: sm501: Add check for platform_driver_register() (git-fixes).
- mfd: t7l66xb: Drop platform disable callback (git-fixes).
- minix: fix bug when opening a file with O_DIRECT (git-fixes).
- misc/vmw_vmci: fix an infoleak in vmci_host_do_receive_datagram() (git-fixes).
- misc: cs35l41: Remove unused pdn variable (bsc#1203699).
- misc: fastrpc: fix memory corruption on open (git-fixes).
- misc: fastrpc: fix memory corruption on probe (git-fixes).
- misc: ocxl: fix possible refcount leak in afu_ioctl() (git-fixes).
- misc: pci_endpoint_test: Aggregate params checking for xfer (git-fixes).
- misc: pci_endpoint_test: Fix pci_endpoint_test_{copy,write,read}() panic (git-fixes).
- misc: rtsx: Fix an error handling path in rtsx_pci_probe() (git-fixes).
- mkspec: eliminate @NOSOURCE@ macro This should be alsways used with @SOURCES@, just include the content there.
- mlxsw: i2c: Fix initialization error flow (git-fixes).
- mlxsw: spectrum: Clear PTP configuration after unregistering the netdevice (git-fixes).
- mlxsw: spectrum_cnt: Reorder counter pools (git-fixes).
- mlxsw: spectrum_router: Fix IPv4 nexthop gateway indication (git-fixes).
- mm/hugetlb: fix races when looking up a CONT-PTE/PMD size hugetlb page (bsc#1204575).
- mm/rmap: Fix anon_vma->degree ambiguity leading to double-reuse (git-fixes). kABI: Fix kABI after 'mm/rmap: Fix anon_vma->degree ambiguity leading to double-reuse' (git-fixes).
- mm: Fix PASID use-after-free issue (bsc#1203908).
- mm: bdi: initialize bdi_min_ratio when bdi is unregistered (bsc#1197763).
- mm: memcontrol: fix potential oom_lock recursion deadlock (bsc#1202447).
- mm: pagewalk: Fix race between unmap and page walker (git-fixes, bsc#1203159).
- mmc: au1xmmc: Fix an error handling path in au1xmmc_probe() (git-fixes).
- mmc: block: Add single read for 4k sector cards (git-fixes).
- mmc: cavium-octeon: Add of_node_put() when breaking out of loop (git-fixes).
- mmc: cavium-thunderx: Add of_node_put() when breaking out of loop (git-fixes).
- mmc: core: Fix UHS-I SD 1.8V workaround branch (git-fixes).
- mmc: core: Fix ambiguous TRIM and DISCARD arg (git-fixes).
- mmc: core: Fix inconsistent sd3_bus_mode at UHS-I SD voltage switch failure (git-fixes).
- mmc: core: Fix kernel panic when remove non-standard SDIO card (git-fixes).
- mmc: core: Replace with already defined values for readability (git-fixes).
- mmc: core: Terminate infinite loop in SD-UHS voltage switch (git-fixes).
- mmc: core: properly select voltage range without power cycle (git-fixes).
- mmc: cqhci: Provide helper for resetting both SDHCI and CQHCI (git-fixes).
- mmc: hsq: Fix data stomping during mmc recovery (git-fixes).
- mmc: meson-gx: Fix an error handling path in meson_mmc_probe() (git-fixes).
- mmc: mmc_test: Fix removal of debugfs file (git-fixes).
- mmc: moxart: fix 4-bit bus width and remove 8-bit bus width (git-fixes).
- mmc: mxcmmc: Silence a clang warning (git-fixes).
- mmc: pxamci: Fix an error handling path in pxamci_probe() (git-fixes).
- mmc: pxamci: Fix another error handling path in pxamci_probe() (git-fixes).
- mmc: renesas_sdhi: Get the reset handle early in the probe (git-fixes).
- mmc: sdhci-brcmstb: Enable Clock Gating to save power (git-fixes).
- mmc: sdhci-brcmstb: Fix SDHCI_RESET_ALL for CQHCI (git-fixes).
- mmc: sdhci-brcmstb: Re-organize flags (git-fixes).
- mmc: sdhci-esdhc-imx: Propagate ESDHC_FLAG_HS400* only on 8bit bus (git-fixes).
- mmc: sdhci-esdhc-imx: correct CQHCI exit halt state check (git-fixes).
- mmc: sdhci-esdhc-imx: use the correct host caps for MMC_CAP_8_BIT_DATA (git-fixes).
- mmc: sdhci-msm: add compatible string check for sdm670 (git-fixes).
- mmc: sdhci-of-arasan: Fix SDHCI_RESET_ALL for CQHCI (git-fixes).
- mmc: sdhci-of-at91: fix set_uhs_signaling rewriting of MC1R (git-fixes).
- mmc: sdhci-of-esdhc: Fix refcount leak in esdhc_signal_voltage_switch (git-fixes).
- mmc: sdhci-pci-core: Disable ES for ASUS BIOS on Jasper Lake (git-fixes).
- mmc: sdhci-pci-o2micro: fix card detect fail issue caused by CD# debounce timeout (git-fixes).
- mmc: sdhci-pci: Fix possible memory leak caused by missing pci_dev_put() (git-fixes).
- mmc: sdhci-sprd: Fix minimum clock limit (git-fixes).
- mmc: sdhci-sprd: Fix no reset data and command after voltage switch (git-fixes).
- mmc: sdhci-tegra: Fix SDHCI_RESET_ALL for CQHCI (git-fixes).
- mmc: sdhci_am654: 'select', not 'depends' REGMAP_MMIO (git-fixes).
- mmc: sdhci_am654: Fix SDHCI_RESET_ALL for CQHCI (git-fixes).
- mmc: tmio: avoid glitches when resetting (git-fixes).
- mmc: wmt-sdmmc: Fix an error handling path in wmt_mci_probe() (git-fixes).
- mms: sdhci-esdhc-imx: Fix SDHCI_RESET_ALL for CQHCI (git-fixes).
- module: change to print useful messages from elf_validity_check() (git-fixes).
- module: fix [e_shstrndx].sh_size=0 OOB access (git-fixes).
- msft-hv-2570-hv_netvsc-Add-support-for-XDP_REDIRECT.patch: (bsc#1199364).
- mt76: mt7615: do not update pm stats in case of error (git-fixes).
- mt76: mt76x02u: fix possible memory leak in __mt76x02u_mcu_send_msg (git-fixes).
- mt76: mt7921: enlarge maximum VHT MPDU length to 11454 (git-fixes).
- mt76: mt7921: fix aggregation subframes setting to HE max (git-fixes).
- mtd: dataflash: Add SPI ID table (git-fixes).
- mtd: devices: docg3: check the return value of devm_ioremap() in the probe (git-fixes).
- mtd: maps: Fix refcount leak in ap_flash_init (git-fixes).
- mtd: maps: Fix refcount leak in of_flash_probe_versatile (git-fixes).
- mtd: parsers: bcm47xxpart: Fix halfblock reads (git-fixes).
- mtd: parsers: bcm47xxpart: print correct offset on read error (git-fixes).
- mtd: parsers: ofpart: Fix refcount leak in bcm4908_partitions_fw_offset (git-fixes).
- mtd: partitions: Fix refcount leak in parse_redboot_of (git-fixes).
- mtd: rawnand: arasan: Fix clock rate in NV-DDR (git-fixes).
- mtd: rawnand: arasan: Update NAND bus clock instead of system clock (git-fixes).
- mtd: rawnand: atmel: Unmap streaming DMA mappings (git-fixes).
- mtd: rawnand: fsl_elbc: Fix none ECC mode (git-fixes).
- mtd: rawnand: gpmi: Set WAIT_FOR_READY timeout based on program/erase times (git-fixes).
- mtd: rawnand: gpmi: validate controller clock rate (git-fixes).
- mtd: rawnand: intel: Do not re-define NAND_DATA_IFACE_CHECK_ONLY (git-fixes).
- mtd: rawnand: intel: Read the chip-select line from the correct OF node (git-fixes).
- mtd: rawnand: intel: Remove undocumented compatible string (git-fixes).
- mtd: rawnand: marvell: Use correct logic for nand-keep-config (git-fixes).
- mtd: rawnand: meson: Fix a potential double free issue (git-fixes).
- mtd: rawnand: meson: fix bit map use in meson_nfc_ecc_correct() (git-fixes).
- mtd: sm_ftl: Fix deadlock caused by cancel_work_sync in sm_release (git-fixes).
- mtd: spi-nor: fix spi_nor_spimem_setup_op() call in spi_nor_erase_{sector,chip}() (git-fixes).
- mtd: spi-nor: intel-spi: Disable write protection only if asked (git-fixes).
- mtd: st_spi_fsm: Add a clk_disable_unprepare() in .probe()'s error path (git-fixes).
- musb: fix USB_MUSB_TUSB6010 dependency (git-fixes).
- mwifiex: Ignore BTCOEX events from the 88W8897 firmware (git-fixes).
- mwifiex: fix sleep in atomic context bugs caused by dev_coredumpv (git-fixes).
- n_gsm: remove unused parameters from gsm_error() (git-fixes).
- nbd: Fix incorrect error handle when first_minor is illegal in nbd_dev_add (git-fixes).
- net/dsa/hirschmann: Add missing of_node_get() in hellcreek_led_setup() (git-fixes).
- net/ice: fix initializing the bitmap in the switch code (git-fixes).
- net/ieee802154: fix uninit value bug in dgram_sendmsg (git-fixes).
- net/mlx4_en: Fix wrong return value on ioctl EEPROM query failure (git-fixes).
- net/mlx5: CT: Fix header-rewrite re-use for tupels (git-fixes).
- net/mlx5: Drain fw_reset when removing device (git-fixes).
- net/mlx5e: Block rx-gro-hw feature in switchdev mode (git-fixes).
- net/mlx5e: Disable softirq in mlx5e_activate_rq to avoid race condition (git-fixes).
- net/mlx5e: Fix enabling sriov while tc nic rules are offloaded (git-fixes).
- net/mlx5e: Properly block HW GRO when XDP is enabled (git-fixes).
- net/mlx5e: Properly block LRO when XDP is enabled (git-fixes).
- net/mlx5e: Properly disable vlan strip on non-UL reps (git-fixes).
- net/mlx5e: Remove HW-GRO from reported features (git-fixes).
- net/mlx5e: Remove WARN_ON when trying to offload an unsupported TLS cipher/version (git-fixes).
- net/mlx5e: Ring the TX doorbell on DMA errors (git-fixes).
- net/mlx5e: TC NIC mode, fix tc chains miss table (git-fixes).
- net/mlx5e: TC, fix decap fallback to uplink when int port not supported (git-fixes).
- net/mlx5e: Update netdev features after changing XDP state (git-fixes).
- net/mlx5e: xsk: Account for XSK RQ UMRs when calculating ICOSQ size (git-fixes).
- net/qla3xxx: Fix a test in ql_reset_work() (git-fixes).
- net/smc: Avoid overwriting the copies of clcsock callback functions (git-fixes).
- net/smc: Fix an error code in smc_lgr_create() (git-fixes).
- net/smc: Fix possible access to freed memory in link clear (git-fixes).
- net/smc: Fix possible leaked pernet namespace in smc_init() (git-fixes).
- net/smc: Fix slab-out-of-bounds issue in fallback (git-fixes).
- net/smc: Fix sock leak when release after smc_shutdown() (git-fixes).
- net/smc: Forward wakeup to smc socket waitqueue after fallback (git-fixes).
- net/smc: Only save the original clcsock callback functions (git-fixes).
- net/smc: Send directly when TCP_CORK is cleared (git-fixes).
- net/smc: kABI workarounds for struct smc_link (git-fixes).
- net/smc: kABI workarounds for struct smc_sock (git-fixes).
- net/smc: send directly on setting TCP_NODELAY (git-fixes).
- net/sunrpc: fix potential memory leaks in rpc_sysfs_xprt_state_change() (git-fixes).
- net/x25: Fix skb leak in x25_lapb_receive_frame() (git-fixes).
- net: altera: Fix refcount leak in altera_tse_mdio_create (git-fixes).
- net: asix: fix 'can't send until first packet is send' issue (git-fixes).
- net: atlantic: fix aq_vec index out of range error (git-fixes).
- net: axienet: fix RX ring refill allocation failure handling (git-fixes).
- net: axienet: reset core on initialization prior to MDIO access (git-fixes).
- net: bcmgenet: Indicate MAC is in charge of PHY PM (git-fixes).
- net: bcmgenet: Revert 'Use stronger register read/writes to assure ordering' (git-fixes).
- net: bcmgenet: Use stronger register read/writes to assure ordering (git-fixes).
- net: bcmgenet: hide status block before TX timestamping (git-fixes).
- net: bgmac: Fix a BUG triggered by wrong bytes_compl (git-fixes).
- net: bgmac: Fix an erroneous kfree() in bgmac_remove() (git-fixes).
- net: bgmac: support MDIO described in DT (git-fixes).
- net: bonding: fix possible NULL deref in rlb code (git-fixes).
- net: bonding: fix use-after-free after 802.3ad slave unbind (git-fixes).
- net: chelsio: cxgb4: Avoid potential negative array offset (git-fixes).
- net: cpsw: add missing of_node_put() in cpsw_probe_dt() (git-fixes).
- net: dp83822: disable false carrier interrupt (git-fixes).
- net: dp83822: disable rx error interrupt (git-fixes).
- net: dsa: b53: Add SPI ID table (git-fixes).
- net: dsa: bcm_sf2: Fix Wake-on-LAN with mac_link_down() (git-fixes).
- net: dsa: bcm_sf2: force pause link settings (git-fixes).
- net: dsa: bcm_sf2_cfp: fix an incorrect NULL check on list iterator (git-fixes).
- net: dsa: felix: Fix memory leak in felix_setup_mmio_filtering (git-fixes).
- net: dsa: felix: fix tagging protocol changes with multiple CPU ports (git-fixes).
- net: dsa: felix: purge skb from TX timestamping queue if it cannot be sent (git-fies).
- net: dsa: felix: suppress -EPROBE_DEFER errors (git-fixes).
- net: dsa: hellcreek: Add STP forwarding rule (git-fixes).
- net: dsa: hellcreek: Add missing PTP via UDP rules (git-fixes).
- net: dsa: hellcreek: Allow PTP P2P measurements on blocked ports (git-fixes).
- net: dsa: hellcreek: Fix insertion of static FDB entries (git-fixes).
- net: dsa: introduce helpers for iterating through ports using dp (git-fixes).
- net: dsa: ksz9477: port mirror sniffing limited to one port (git-fixes).
- net: dsa: lantiq_gswip: Do not set GSWIP_MII_CFG_RMII_CLK (git-fixes).
- net: dsa: lantiq_gswip: Fix refcount leak in gswip_gphy_fw_list (git-fixes).
- net: dsa: lantiq_gswip: fix use after free in gswip_remove() (git-fixes).
- net: dsa: microchip: fix bridging with more than two member ports (git-fixes).
- net: dsa: microchip: implement multi-bridge support (git-fixes).
- net: dsa: microchip: ksz9477: fix fdb_dump last invalid entry (git-fixes).
- net: dsa: microchip: ksz_common: Fix refcount leak bug (git-fixes).
- net: dsa: mt7530: 1G can also support 1000BASE-X link mode (git-fixes).
- net: dsa: mt7530: add missing of_node_put() in mt7530_setup() (git-fixes).
- net: dsa: mv88e6060: prevent crash on an unused port (git-fixes).
- net: dsa: mv88e6xxx: Add fix for erratum 5.2 of 88E6393X family (git-fixes).
- net: dsa: mv88e6xxx: Drop unnecessary check in mv88e6393x_serdes_erratum_4_6() (git-fixes).
- net: dsa: mv88e6xxx: Enable port policy support on 6097 (git-fixes).
- net: dsa: mv88e6xxx: Fix application of erratum 4.8 for 88E6393X (git-fixes).
- net: dsa: mv88e6xxx: Fix inband AN for 2500base-x on 88E6393X family (git-fixes).
- net: dsa: mv88e6xxx: Fix port_hidden_wait to account for port_base_addr (git-fixes).
- net: dsa: mv88e6xxx: Fix refcount leak in mv88e6xxx_mdios_register (git-fixes).
- net: dsa: mv88e6xxx: Link in pcs_get_state() if AN is bypassed (git-fixes).
- net: dsa: mv88e6xxx: Save power by disabling SerDes trasmitter and receiver (git-fixes).
- net: dsa: mv88e6xxx: Unforce speed & duplex in mac_link_down() (git-fixes).
- net: dsa: mv88e6xxx: allow use of PHYs on CPU and DSA ports (git-fixes).
- net: dsa: mv88e6xxx: error handling for serdes_power functions (git-fixes).
- net: dsa: mv88e6xxx: fix 'do not use PHY_DETECT on internal PHY's' (git-fixes).
- net: dsa: mv88e6xxx: use BMSR_ANEGCOMPLETE bit for filling an_complete (git-fixes).
- net: dsa: ocelot: seville: utilize of_mdiobus_register (git-fixes).
- net: dsa: qca8k: fix MTU calculation (git-fixes).
- net: dsa: restrict SMSC_LAN9303_I2C kconfig (git-fixes).
- net: dsa: seville: register the mdiobus under devres (git-fixes).
- net: dsa: sja1105: fix buffer overflow in sja1105_setup_devlink_regions() (git-fixes).
- net: dsa: sja1105: silent spi_device_id warnings (git-fixes).
- net: dsa: tag_ocelot_8021q: break circular dependency with ocelot switch lib (git-fies).
- net: dsa: vitesse-vsc73xx: silent spi_device_id warnings (git-fixes).
- net: emaclite: Add error handling for of_address_to_resource() (git-fixes).
- net: enetc: Use pci_release_region() to release some resources (git-fixes).
- net: enetc: report software timestamping via SO_TIMESTAMPING (git-fixes).
- net: ethernet: bgmac: Fix refcount leak in bcma_mdio_mii_register (git-fixes).
- net: ethernet: mediatek: ppe: fix wrong size passed to memset() (git-fixes).
- net: ethernet: mv643xx: Fix over zealous checking of_get_mac_address() (git-fixes).
- net: ethernet: nixge: fix NULL dereference (git-fixes).
- net: ethernet: renesas: ravb: Fix promiscuous mode after system resumed (git-fixes).
- net: ethernet: stmmac: fix altr_tse_pcs function when using a fixed-link (git-fixes).
- net: ethernet: stmmac: fix write to sgmii_adapter_base (git-fixes).
- net: ethernet: ti: am65-cpsw: Fix devlink port register sequence (git-fixes).
- net: ethernet: ti: am65-cpsw: fix error handling in am65_cpsw_nuss_probe() (git-fixes).
- net: ethernet: ti: davinci_mdio: Add workaround for errata i2329 (git-fixes).
- net: ethernet: ti: davinci_mdio: fix build for mdio bitbang uses (git-fixes).
- net: fec: add missing of_node_put() in fec_enet_init_stop_mode() (git-fixes).
- net: fix IFF_TX_SKB_NO_LINEAR definition (git-fixes).
- net: ftgmac100: Hold reference returned by of_get_child_by_name() (git-fixes).
- net: ftgmac100: access hardware register after clock ready (git-fixes).
- net: hns3: add netdev reset check for hns3_set_tunable() (git-fixes).
- net: hns3: clean residual vf config after disable sriov (git-fixes).
- net: hns3: do not push link state to VF if unalive (git-fixes).
- net: hns3: fix the concurrency between functions reading debugfs (git-fixes).
- net: hns3: set port base vlan tbl_sta to false before removing old vlan (git-fixes).
- net: huawei: hinic: Use devm_kcalloc() instead of devm_kzalloc() (git-fixes).
- net: hyperv: remove use of bpf_op_t (git-fixes).
- net: ieee802154: return -EINVAL for unknown addr type (git-fixes).
- net: ipa: do not assume SMEM is page-aligned (git-fixes).
- net: ipa: get rid of a duplicate initialization (git-fixes).
- net: ipa: kill ipa_cmd_pipeline_clear() (git-fixes).
- net: ipa: record proper RX transaction count (git-fixes).
- net: ipvtap - add __init/__exit annotations to module init/exit funcs (git-fixes).
- net: macb: Fix PTP one step sync support (git-fixes).
- net: macb: Increment rx bd head after allocating skb and buffer (git-fixes).
- net: macsec: fix potential resource leak in macsec_add_rxsa() and macsec_add_txsa() (git-fixes).
- net: mana: Add rmb after checking owner bits (git-fixes).
- net: mana: Add support of XDP_REDIRECT action (bug#1201310, jsc#PED-529).
- net: mana: Add the Linux MANA PF driver (bug#1201309, jsc#PED-529).
- net: mana: Fix race on per-CQ variable napi work_done (git-fixes).
- net: marvell: prestera: fix incorrect structure access (git-fixes).
- net: mdio: Fix ENOMEM return value in BCM6368 mux bus controller (git-fixes).
- net: mdio: fix unbalanced fwnode reference count in mdio_device_release() (git-fixes).
- net: mdiobus: fix unbalanced node reference count (git-fixes).
- net: moxa: get rid of asymmetry in DMA mapping/unmapping (git-fixes).
- net: moxa: pass pdev instead of ndev to DMA functions (git-fixes).
- net: mscc: ocelot: avoid corrupting hardware counters when moving VCAP filters (git-fixes).
- net: mscc: ocelot: correctly report the timestamping RX filters in ethtool (git-fixes).
- net: mscc: ocelot: create a function that replaces an existing VCAP filter (git-fixes).
- net: mscc: ocelot: do not dereference NULL pointers with shared tc filters (git-fixes).
- net: mscc: ocelot: do not downgrade timestamping RX filters in SIOCSHWTSTAMP (git-fixes).
- net: mscc: ocelot: fix VCAP IS2 filters matching on both lookups (git-fixes).
- net: mscc: ocelot: fix address of SYS_COUNT_TX_AGING counter (git-fixes).
- net: mscc: ocelot: fix all IP traffic getting trapped to CPU with PTP over IP (git-fixes).
- net: mscc: ocelot: fix broken IP multicast flooding (git-fixes).
- net: mscc: ocelot: fix incorrect balancing with down LAG ports (git-fixes).
- net: mscc: ocelot: fix last VCAP IS1/IS2 filter persisting in hardware when deleted (git-fixes).
- net: mscc: ocelot: fix missing unlock on error in ocelot_hwstamp_set() (git-fixes).
- net: mscc: ocelot: restrict tc-trap actions to VCAP IS2 lookup 0 (git-fixes).
- net: mscc: ocelot: set up traps for PTP packets (git-fixes).
- net: openvswitch: do not send internal clone attribute to the userspace (git-fixes).
- net: openvswitch: fix leak of nested actions (git-fixes).
- net: openvswitch: fix misuse of the cached connection on tuple changes (git-fixes).
- net: openvswitch: fix parsing of nw_proto for IPv6 fragments (git-fixes).
- net: pcs: xpcs: propagate xpcs_read error to xpcs_get_state_c37_sgmii (git-fixes).
- net: phy: Do not WARN for PHY_READY state in mdio_bus_phy_resume() (git-fixes).
- net: phy: Do not WARN for PHY_UP state in mdio_bus_phy_resume() (git-fixes).
- net: phy: Warn about incorrect mdio_bus_phy_resume() state (git-fixes).
- net: phy: aquantia: wait for the suspend/resume operations to finish (git-fixes).
- net: phy: at803x: move page selection fix to config_init (git-fixes).
- net: phy: dp83822: disable MDI crossover status change interrupt (git-fixes).
- net: phy: dp83867: Extend RX strap quirk for SGMII mode (git-fixes).
- net: phy: fix null-ptr-deref while probe() failed (git-fixes).
- net: phy: marvell: add sleep time after enabling the loopback bit (git-fixes).
- net: phy: mscc: macsec: clear encryption keys when freeing a flow (git-fixes).
- net: phy: smsc: Disable Energy Detect Power-Down in interrupt mode (git-fixes).
- net: ptp: add a definition for the UDP port for IEEE 1588 general messages (git-fixes).
- net: rose: fix netdev reference changes (git-fixes).
- net: smsc95xx: add support for Microchip EVB-LAN8670-USB (git-fixes).
- net: sock: tracing: Fix sock_exceed_buf_limit not to dereference stale pointer (git-fixes).
- net: sparx5: depends on PTP_1588_CLOCK_OPTIONAL (git-fixes).
- net: sparx5: uses, depends on BRIDGE or !BRIDGE (git-fixes).
- net: stmmac: Fix unset max_speed difference between DT and non-DT platforms (git-fixes).
- net: stmmac: Use readl_poll_timeout_atomic() in atomic state (git-fixes).
- net: stmmac: clean up impossible condition (git-fixes).
- net: stmmac: disable Split Header (SPH) for Intel platforms (bsc#1194904).
- net: stmmac: dwc-qos: Disable split header for Tegra194 (bsc#1194904).
- net: stmmac: dwmac-qcom-ethqos: Enable RGMII functional clock on resume (git-fixes).
- net: stmmac: dwmac-qcom-ethqos: add platform level clocks management (git-fixes).
- net: stmmac: dwmac-sun8i: add missing of_node_put() in sun8i_dwmac_register_mdio_mux() (git-fixes).
- net: stmmac: enhance XDP ZC driver level switching performance (git-fixes).
- net: stmmac: fix dma queue left shift overflow issue (git-fixes).
- net: stmmac: fix leaks in probe (git-fixes).
- net: stmmac: fix off-by-one error in sanity check (git-fixes).
- net: stmmac: fix out-of-bounds access in a selftest (git-fixes).
- net: stmmac: fix pm runtime issue in stmmac_dvr_remove() (git-fixes).
- net: stmmac: fix unbalanced ptp clock issue in suspend/resume flow (git-fixes).
- net: stmmac: only enable DMA interrupts when ready (git-fixes).
- net: stmmac: perserve TX and RX coalesce value during XDP setup (git-fixes).
- net: stmmac: remove redunctant disable xPCS EEE call (git-fixes).
- net: stmmac: remove unused get_addr() callback (git-fixes).
- net: stmmac: work around sporadic tx issue on link-up (git-fixes).
- net: sungem_phy: Add of_node_put() for reference returned by of_get_parent() (git-fixes).
- net: systemport: Fix an error handling path in bcm_sysport_probe() (git-fixes).
- net: tap: NULL pointer derefence in dev_parse_header_protocol when skb->dev is null (git-fixes).
- net: thunderbolt: Enable DMA paths only after rings are enabled (git-fixes).
- net: thunderbolt: Fix error handling in tbnet_init() (git-fixes).
- net: thunderbolt: fix memory leak in tbnet_open() (git-fixes).
- net: thunderx: Fix the ACPI memory leak (git-fixes).
- net: usb: Correct PHY handling of smsc95xx (git-fixes).
- net: usb: Correct reset handling of smsc95xx (git-fixes).
- net: usb: ax88179_178a needs FLAG_SEND_ZLP (git-fixes).
- net: usb: ax88179_178a: add Allied Telesis AT-UMCs (git-fixes).
- net: usb: make USB_RTL8153_ECM non user configurable (git-fixes).
- net: usb: qmi_wwan: Add new usb-id for Dell branded EM7455 (git-fixes).
- net: usb: qmi_wwan: add Quectel RM520N (git-fixes).
- net: usb: qmi_wwan: add Telit 0x103a composition (git-fixes).
- net: usb: r8152: Add in new Devices that are supported for Mac-Passthru (git-fixes).
- net: vmxnet3: fix possible NULL pointer dereference in vmxnet3_rq_cleanup() (bsc#1200431).
- net: vmxnet3: fix possible use-after-free bugs in vmxnet3_rq_alloc_rx_buf() (bsc#1200431).
- net: vmxnet3: remove multiple false checks in vmxnet3_ethtool.c (bsc#1200431).
- net: wwan: iosm: Call mutex_init before locking it (git-fixes).
- net: wwan: iosm: fix dma_alloc_coherent incompatible pointer type (git-fixes).
- net: wwan: iosm: fix kernel test robot reported error (git-fixes).
- net: wwan: iosm: remove pointless null check (git-fixes).
- net:enetc: allocate CBD ring data memory using DMA coherent methods (git-fixes).
- net_sched: cls_route: disallow handle of 0 (bsc#1202393).
- netdevsim: fib: Fix reference count leak on route deletion failure (git-fixes).
- nfc/nci: fix race with opening and closing (git-fixes).
- nfc: fdp: Fix potential memory leak in fdp_nci_send() (git-fixes).
- nfc: nfcmrvl: Fix potential memory leak in nfcmrvl_i2c_nci_send() (git-fixes).
- nfc: nxp-nci: Fix potential memory leak in nxp_nci_send() (git-fixes).
- nfc: pn533: Fix use-after-free bugs caused by pn532_cmd_timeout (git-fixes).
- nfc: s3fwrn5: Fix potential memory leak in s3fwrn5_nci_send() (git-fixes).
- nfc: st-nci: fix incorrect sizing calculations in EVT_TRANSACTION (git-fixes).
- nfc: st-nci: fix incorrect validating logic in EVT_TRANSACTION (git-fixes).
- nfc: st-nci: fix memory leaks in EVT_TRANSACTION (git-fixes).
- nfp: ethtool: fix the display error of `ethtool -m DEVNAME` (git-fixes).
- nfsd: eliminate the NFSD_FILE_BREAK_* flags (git-fixes).
- nfsd: fix use-after-free due to delegation race (git-fixes).
- nilfs2: fix NULL pointer dereference in nilfs_palloc_commit_free_entry() (git-fixes).
- nilfs2: fix deadlock in nilfs_count_free_blocks() (git-fixes).
- nilfs2: fix incorrect masking of permission flags for symlinks (git-fixes).
- nilfs2: fix lockdep warnings during disk space reclamation (git-fixes).
- nilfs2: fix lockdep warnings in page operations for btree nodes (git-fixes).
- nilfs2: fix nilfs_sufile_mark_dirty() not set segment usage as dirty (git-fixes).
- nilfs2: fix use-after-free bug of ns_writer on remount (git-fixes).
- nilfs2: replace WARN_ONs by nilfs_error for checkpoint acquisition failure (git-fixes).
- nohz/full, sched/rt: Fix missed tick-reenabling bug in dequeue_task_rt() (bnc#1189999 (Scheduler functional and performance backports)).
- nouveau/svm: Fix to migrate all requested pages (git-fixes).
- nouveau: explicitly wait on the fence in nouveau_bo_move_m2mf (git-fies).
- ntb_hw_amd: Add NTB PCI ID for new gen CPU (bsc#1202113).
- nvme-auth: align to pre-upstream FFDHE implementation (bsc#1202265).
- nvme-auth: retry command if DNR bit is not set (bsc#1201675).
- nvme-fabrics: parse nvme connect Linux error codes (bsc#1201865).
- nvme-rdma: Handle number of queue changes (bsc#1201865).
- nvme-tcp: Handle number of queue changes (bsc#1201865).
- nvme-tcp: fix UAF when detecting digest errors (bsc#1200313 bsc#1201489).
- nvme: consider also host_iface when checking ip options (bsc#1199670).
- nvme: do not print verbose errors for internal passthrough requests (bsc#1202187).
- nvme: fix RCU hole that allowed for endless looping in multipath round robin (bsc#1202636).
- nvme: implement In-Band authentication (jsc#SLE-20183).
- nvme: kabi fixes for in-band authentication (bsc#1199086).
- nvmem: core: Check input parameter for NULL in nvmem_unregister() (bsc#1204241).
- nvmet-auth: expire authentication sessions (jsc#SLE-20183).
- nvmet: Expose max queues to configfs (bsc#1201865).
- nvmet: implement basic In-Band Authentication (jsc#SLE-20183).
- ocfs2: dlmfs: fix error handling of user_dlm_destroy_lock (bsc#1202778).
- ocfs2: fix a deadlock when commit trans (bsc#1202776).
- octeontx2-af: Add KPU changes to parse NGIO as separate layer (jsc#SLE-24682).
- octeontx2-af: Add PTP device id for CN10K and 95O silcons (jsc#SLE-24682).
- octeontx2-af: Add SDP interface support (jsc#SLE-24682).
- octeontx2-af: Add debug messages for failures (jsc#SLE-24682).
- octeontx2-af: Add external ptp input clock (jsc#SLE-24682).
- octeontx2-af: Add free rsrc count mbox msg (jsc#SLE-24682).
- octeontx2-af: Add mbox to retrieve bandwidth profile free count (jsc#SLE-24682).
- octeontx2-af: Add support to flush full CPT CTX cache (jsc#SLE-24682).
- octeontx2-af: Adjust LA pointer for cpt parse header (jsc#SLE-24682).
- octeontx2-af: Allocate low priority entries for PF (jsc#SLE-24682).
- octeontx2-af: Allow to configure flow tag LSB byte as RSS adder (jsc#SLE-24682).
- octeontx2-af: Apply tx nibble fixup always (git-fixes).
- octeontx2-af: Change the order of queue work and interrupt disable (jsc#SLE-24682).
- octeontx2-af: Do not enable Pause frames by default (jsc#SLE-24682).
- octeontx2-af: Enable CPT HW interrupts (jsc#SLE-24682).
- octeontx2-af: Enhance mailbox trace entry (jsc#SLE-24682).
- octeontx2-af: Fix LBK backpressure id count (jsc#SLE-24682).
- octeontx2-af: Fix inconsistent license text (jsc#SLE-24682).
- octeontx2-af: Fix interrupt name strings (jsc#SLE-24682).
- octeontx2-af: Fix key checking for source mac (git-fixes).
- octeontx2-af: Fix mcam entry resource leak (git-fixes).
- octeontx2-af: Fix spelling mistake 'Makesure' -> 'Make sure' (jsc#SLE-24682).
- octeontx2-af: Fix uninitialized variable val (jsc#SLE-24682).
- octeontx2-af: Flow control resource management (jsc#SLE-24682).
- octeontx2-af: Handle return value in block reset (jsc#SLE-24682).
- octeontx2-af: Hardware configuration for inline IPsec (jsc#SLE-24682).
- octeontx2-af: Increase link credit restore polling timeout (jsc#SLE-24682).
- octeontx2-af: Increase number of reserved entries in KPU (jsc#SLE-24682).
- octeontx2-af: Increment ptp refcount before use (jsc#SLE-24682).
- octeontx2-af: Limit KPU parsing for GTPU packets (jsc#SLE-24682).
- octeontx2-af: Modify install flow error codes (jsc#SLE-24682).
- octeontx2-af: Optimize KPU1 processing for variable-length headers (jsc#SLE-24682).
- octeontx2-af: Perform cpt lf teardown in non FLR path (jsc#SLE-24682).
- octeontx2-af: Priority flow control configuration support (jsc#SLE-24682).
- octeontx2-af: Remove channel verification while installing MCAM rules (jsc#SLE-24682).
- octeontx2-af: Remove redundant initialization of variable blkaddr (jsc#SLE-24682).
- octeontx2-af: Remove redundant initialization of variable pin (jsc#SLE-24682).
- octeontx2-af: Reset PTP config in FLR handler (jsc#SLE-24682).
- octeontx2-af: Retry until RVU block reset complete (jsc#SLE-24682).
- octeontx2-af: Use DMA_ATTR_FORCE_CONTIGUOUS attribute in DMA alloc (jsc#SLE-24682).
- octeontx2-af: Use NDC TX for transmit packet data (jsc#SLE-24682).
- octeontx2-af: Use ptp input clock info from firmware data (jsc#SLE-24682).
- octeontx2-af: Wait for TX link idle for credits change (jsc#SLE-24682).
- octeontx2-af: add proper return codes for AF mailbox handlers (jsc#SLE-24682).
- octeontx2-af: cn10K: Get NPC counters value (jsc#SLE-24682).
- octeontx2-af: cn10K: support for sched lmtst and other features (jsc#SLE-24682).
- octeontx2-af: cn10k: DWRR MTU configuration (jsc#SLE-24682).
- octeontx2-af: cn10k: RPM hardware timestamp configuration (jsc#SLE-24682).
- octeontx2-af: cn10k: Set cache lines for NPA batch alloc (jsc#SLE-24682).
- octeontx2-af: cn10k: Use appropriate register for LMAC enable (jsc#SLE-24682).
- octeontx2-af: cn10k: add workaround for ptp errata (jsc#SLE-24682).
- octeontx2-af: cn10k: debugfs for dumping LMTST map table (jsc#SLE-24682).
- octeontx2-af: configure npc for cn10k to allow packets from cpt (jsc#SLE-24682).
- octeontx2-af: debugfs: Add channel and channel mask (jsc#SLE-24682).
- octeontx2-af: debugfs: Minor changes (jsc#SLE-24682).
- octeontx2-af: debugfs: do not corrupt user memory (jsc#SLE-24682).
- octeontx2-af: debugfs: fix error return of allocations (jsc#SLE-24682).
- octeontx2-af: enable tx shaping feature for 96xx C0 (jsc#SLE-24682).
- octeontx2-af: fix array bound error (jsc#SLE-24682).
- octeontx2-af: fix error code in is_valid_offset() (jsc#SLE-24682).
- octeontx2-af: initialize action variable (jsc#SLE-24682).
- octeontx2-af: nix and lbk in loop mode in 98xx (jsc#SLE-24682).
- octeontx2-af: remove redudant second error check on variable err (jsc#SLE-24682).
- octeontx2-af: suppress external profile loading warning (git-fixes).
- octeontx2-af: use swap() to make code cleaner (jsc#SLE-24682).
- octeontx2-af: verify CQ context updates (jsc#SLE-24682).
- octeontx2-nic: fix mixed module build (jsc#SLE-24682).
- octeontx2-nicvf: Add PTP hardware clock support to NIX VF (jsc#SLE-24682).
- octeontx2-nicvf: Free VF PTP resources (jsc#SLE-24682).
- octeontx2-pf: Add TC feature for VFs (jsc#SLE-24682).
- octeontx2-pf: Add XDP support to netdev PF (jsc#SLE-24682).
- octeontx2-pf: Add check for non zero mcam flows (jsc#SLE-24682).
- octeontx2-pf: Add support for adaptive interrupt coalescing (jsc#SLE-24682).
- octeontx2-pf: Add vlan-etype to ntuple filters (jsc#SLE-24682).
- octeontx2-pf: Allow VLAN priority also in ntuple filters (jsc#SLE-24682).
- octeontx2-pf: CN10K: Hide RPM stats over ethtool (jsc#SLE-24682).
- octeontx2-pf: Do not mask out supported link modes (jsc#SLE-24682).
- octeontx2-pf: Enable NETIF_F_RXALL support for VF driver (jsc#SLE-24682).
- octeontx2-pf: Fix NIX_AF_TL3_TL2X_LINKX_CFG register configuration (git-fixes).
- octeontx2-pf: Fix UDP/TCP src and dst port tc filters (git-fixes).
- octeontx2-pf: Fix inconsistent license text (jsc#SLE-24682).
- octeontx2-pf: Ntuple filters support for VF netdev (jsc#SLE-24682).
- octeontx2-pf: PFC config support with DCBx (jsc#SLE-24682).
- octeontx2-pf: Remove unnecessary synchronize_irq() before free_irq() (jsc#SLE-24682).
- octeontx2-pf: Simplify the receive buffer size calculation (jsc#SLE-24682).
- octeontx2-pf: Sort the allocated MCAM entry indices (jsc#SLE-24682).
- octeontx2-pf: Unify flow management variables (jsc#SLE-24682).
- octeontx2-pf: Use hardware register for CQE count (jsc#SLE-24682).
- octeontx2-pf: cn10K: Reserve LMTST lines per core (jsc#SLE-24682).
- octeontx2-pf: cn10k: Config DWRR weight based on MTU (jsc#SLE-24682).
- octeontx2-pf: cn10k: Ensure valid pointers are freed to aura (jsc#SLE-24682).
- octeontx2-pf: cn10k: Fix egress ratelimit configuration (git-fixes).
- octeontx2-pf: cn10k: add support for new ptp timestamp format (jsc#SLE-24682).
- octeontx2-pf: devlink params support to set mcam entry count (jsc#SLE-24682).
- octeontx2-pf: replace bitmap_weight with bitmap_empty where appropriate (jsc#SLE-24682).
- octeontx2-pf: select CONFIG_NET_DEVLINK (jsc#SLE-24682).
- octeontx2-vf: Add support for adaptive interrupt coalescing (jsc#SLE-24682).
- octeontx2: Move devlink registration to be last devlink command (jsc#SLE-24682).
- of/device: Fix up of_dma_configure_id() stub (git-fixes).
- of: fdt: fix off-by-one error in unflatten_dt_nodes() (git-fixes).
- openvswitch: Fix double reporting of drops in dropwatch (git-fixes).
- openvswitch: Fix overreporting of drops in dropwatch (git-fixes).
- openvswitch: Fix setting ipv6 fields causing hw csum failure (git-fixes).
- openvswitch: Fixed nd target mask field in the flow dump (git-fixes).
- openvswitch: add nf_ct_is_confirmed check before assigning the helper (git-fixes).
- openvswitch: always update flow key after nat (git-fixes).
- openvswitch: switch from WARN to pr_warn (git-fixes).
- optee: add error checks in optee_ffa_do_call_with_arg() (git-fixes).
- overflow.h: restore __ab_c_size (git-fixes).
- overflow: Implement size_t saturating arithmetic helpers (jsc#PED-1211).
- pNFS/flexfiles: Report RDMA connection errors to the server (git-fixes).
- padata: Fix list iterator in padata_do_serial() (git-fixes).
- panic, kexec: make __crash_kexec() NMI safe (git-fixes).
- parisc/sticon: fix reverse colors (bsc#1152489)
- parisc/stifb: Fix fb_is_primary_device() only available with (bsc#1152489)
- parisc/stifb: Implement fb_is_primary_device() (bsc#1152489)
- parisc/stifb: Keep track of hardware path of graphics card (bsc#1152489)
- parport_pc: Avoid FIFO port location truncation (git-fixes).
- perf bench futex: Fix memory leak of perf_cpu_map__new() (git-fixes).
- phy: amlogic: phy-meson-axg-mipi-pcie-analog: Hold reference returned by of_get_parent() (git-fixes).
- phy: qualcomm: call clk_disable_unprepare in the error handling (git-fixes).
- phy: ralink: mt7621-pci: add sentinel to quirks table (git-fixes).
- phy: samsung: phy-exynos-pcie: sanitize init/power_on callbacks (git-fixes).
- phy: stm32: fix an error code in probe (git-fixes).
- phy: stm32: fix error return in stm32_usbphyc_phy_init (git-fixes).
- pinctrl: Ingenic: JZ4755 bug fixes (git-fixes).
- pinctrl: alderlake: Add Intel Alder Lake-N pin controller support (jsc#PED-676).
- pinctrl: alderlake: Add Raptor Lake-S ACPI ID (jsc#PED-634).
- pinctrl: alderlake: Fix register offsets for ADL-N variant (jsc#PED-676).
- pinctrl: amd: Do not save/restore interrupt status and wake status bits (git-fixes).
- pinctrl: armada-37xx: Add missing GPIO-only pins (git-fixes).
- pinctrl: armada-37xx: Checks for errors in gpio_request_enable callback (git-fixes).
- pinctrl: armada-37xx: Convert to use dev_err_probe() (git-fixes).
- pinctrl: armada-37xx: Fix definitions for MPP pins 20-22 (git-fixes).
- pinctrl: armada-37xx: Make use of the devm_platform_ioremap_resource() (git-fixes).
- pinctrl: armada-37xx: Use temporary variable for struct device (git-fixes).
- pinctrl: devicetree: fix null pointer dereferencing in pinctrl_dt_to_map (git-fixes).
- pinctrl: intel: Check against matching data instead of ACPI companion (git-fixes).
- pinctrl: intel: Save and restore pins in 'direct IRQ' mode (git-fixes).
- pinctrl: microchip-sgpio: Correct the fwnode_irq_get() return value check (git-fixes).
- pinctrl: nomadik: Fix refcount leak in nmk_pinctrl_dt_subnode_to_map (git-fixes).
- pinctrl: qcom: msm8916: Allow CAMSS GP clocks to be muxed (git-fixes).
- pinctrl: qcom: sc8180x: Fix gpio_wakeirq_map (git-fixes).
- pinctrl: qcom: sc8180x: Fix wrong pin numbers (git-fixes).
- pinctrl: qcom: sm8250: Fix PDC map (git-fixes).
- pinctrl: rockchip: list all pins in a possible mux route for PX30 (git-fixes).
- pinctrl: single: Fix potential division by zero (git-fixes).
- pinctrl: sunxi: Add I/O bias setting for H6 R-PIO (git-fixes).
- pinctrl: sunxi: Fix name for A100 R_PIO (git-fixes).
- platform/chrome: cros_ec: Always expose last resume result (git-fixes).
- platform/chrome: cros_ec: Notify the PM of wake events during resume (git-fixes).
- platform/chrome: cros_ec_proto: Update version on GET_NEXT_EVENT failure (git-fixes).
- platform/chrome: cros_ec_proto: do not show MKBP version if unsupported (git-fixes).
- platform/chrome: cros_ec_typec: Correct alt mode index (git-fixes).
- platform/chrome: fix double-free in chromeos_laptop_prepare() (git-fixes).
- platform/chrome: fix memory corruption in ioctl (git-fixes).
- platform/olpc: Fix uninitialized data in debugfs write (git-fixes).
- platform/surface: aggregator: Do not check for repeated unsequenced packets (git-fixes).
- platform/surface: aggregator_registry: Add support for Surface Laptop Go 2 (git-fixes).
- platform/x86/intel/pmt: Sapphire Rapids PMT errata fix (jsc#PED-2684 bsc#1205683).
- platform/x86/intel: hid: add quirk to support Surface Go 3 (git-fixes).
- platform/x86/intel: pmc: Do not unconditionally attach Intel PMC when virtualized (git-fixes).
- platform/x86: acer-wmi: Acer Aspire One AOD270/Packard Bell Dot keymap fixes (git-fixes).
- platform/x86: acer-wmi: Enable SW_TABLET_MODE on Switch V 10 (SW5-017) (git-fixes).
- platform/x86: asus-wmi: Document the dgpu_disable sysfs attribute (git-fixes).
- platform/x86: asus-wmi: Document the egpu_enable sysfs attribute (git-fixes).
- platform/x86: asus-wmi: Document the panel_od sysfs attribute (git-fixes).
- platform/x86: asus-wmi: add missing pci_dev_put() in asus_wmi_set_xusb2pr() (git-fixes).
- platform/x86: hp-wmi: Ignore Smart Experience App event (git-fixes).
- platform/x86: hp_wmi: Fix rfkill causing soft blocked wifi (git-fixes).
- platform/x86: i2c-multi-instantiate: Rename it for a generic serial driver name (bsc#1203699).
- platform/x86: ideapad-laptop: Disable touchpad_switch (git-fixes).
- platform/x86: msi-laptop: Change DMI match / alias strings to fix module autoloading (git-fixes).
- platform/x86: msi-laptop: Fix old-ec check for backlight registering (git-fixes).
- platform/x86: msi-laptop: Fix resource cleanup (git-fixes).
- platform/x86: pmc_atom: Fix SLP_TYPx bitfield mask (git-fixes).
- platform/x86: pmc_atom: Match all Lex BayTrail boards with critclk_systems DMI table (git-fixes).
- platform/x86: serial-multi-instantiate: Add CLSA0101 Laptop (bsc#1203699).
- platform/x86: serial-multi-instantiate: Add SPI support (bsc#1203699).
- platform/x86: serial-multi-instantiate: Reorganize I2C functions (bsc#1203699).
- platform/x86: touchscreen_dmi: Add info for the RCA Cambio W101 v2 2-in-1 (git-fixes).
- plip: avoid rcu debug splat (git-fixes).
- power: supply: adp5061: fix out-of-bounds read in adp5061_get_chg_type() (git-fixes).
- powerpc-pseries-mobility-set-NMI-watchdog-factor-dur.patch.
- powerpc-watchdog-introduce-a-NMI-watchdog-s-factor.patch.
- powerpc/64: Fix build failure with allyesconfig in book3s_64_entry.S (bsc#1194869).
- powerpc/64: Remove unused SYS_CALL_TABLE symbol (jsc#SLE-9246 git-fixes).
- powerpc/64: pcpu setup avoid reading mmu_linear_psize on 64e or radix (bsc#1204413 ltc#200176).
- powerpc/64s: Fix build failure when CONFIG_PPC_64S_HASH_MMU is not set (bsc#1204413 ltc#200176).
- powerpc/64s: Make flush_and_reload_slb a no-op when radix is enabled (bsc#1204413 ltc#200176).
- powerpc/64s: Make hash MMU support configurable (bsc#1204413 ltc#200176).
- powerpc/64s: Move and rename do_bad_slb_fault as it is not hash specific (bsc#1204413 ltc#200176).
- powerpc/64s: Move hash MMU support code under CONFIG_PPC_64S_HASH_MMU (bsc#1204413 ltc#200176).
- powerpc/64s: Rename hash_hugetlbpage.c to hugetlbpage.c (bsc#1204413 ltc#200176).
- powerpc/boot: Explicitly disable usage of SPE instructions (bsc#1156395).
- powerpc/fadump: align destination address to pagesize (bsc#1204728 ltc#200074).
- powerpc/kprobes: Fix null pointer reference in arch_prepare_kprobe() (jsc#SLE-13847 git-fixes).
- powerpc/kvm: Fix kvm_use_magic_page (bsc#1156395).
- powerpc/mm/64s: Drop pgd_huge() (bsc#1065729).
- powerpc/pci_dn: Add missing of_node_put() (bsc#1065729).
- powerpc/perf: Optimize clearing the pending PMI and remove WARN_ON for PMI check in power_pmu_disable (bsc#1156395).
- powerpc/powernv/kvm: Use darn for H_RANDOM on Power9 (bsc#1065729).
- powerpc/powernv: Avoid crashing if rng is NULL (bsc#1065729).
- powerpc/powernv: add missing of_node_put() in opal_export_attrs() (bsc#1065729).
- powerpc/powernv: delay rng platform device creation until later in boot (bsc#1065729).
- powerpc/powernv: rename remaining rng powernv_ functions to pnv_ (bsc#1065729).
- powerpc/powernv: wire up rng during setup_arch (bsc#1065729).
- powerpc/pseries/vas: Add VAS IRQ primary handler (bsc#1204413 ltc#200176).
- powerpc/pseries/vas: Declare pseries_vas_fault_thread_fn() as static (bsc#1194869).
- powerpc/pseries/vas: Pass hw_cpu_id to node associativity HCALL (bsc#1194869).
- powerpc/pseries: Interface to represent PAPR firmware attributes (bsc#1200465 ltc#197256 jsc#SLE-18130).
- powerpc/pseries: Rename TYPE1_AFFINITY to FORM1_AFFINITY (bsc#1200465 ltc#197256 jsc#SLE-18130).
- powerpc/pseries: Stop selecting PPC_HASH_MMU_NATIVE (bsc#1204413 ltc#200176).
- powerpc/pseries: lparcfg do not include slb_size line in radix mode (bsc#1204413 ltc#200176).
- powerpc/pseries: rename min_common_depth to primary_domain_index (bsc#1200465 ltc#197256 jsc#SLE-18130).
- powerpc/pseries: wire up rng during setup_arch() (bsc#1065729).
- powerpc/xive: Fix refcount leak in xive_get_max_prio (git-fixess).
- powerpc: Avoid discarding flags in system_call_exception() (bsc#1194869).
- powerpc: Enable execve syscall exit tracepoint (bsc#1065729).
- powerpc: Ignore DSI error caused by the copy/paste instruction (bsc#1204413 ltc#200176).
- powerpc: Rename PPC_NATIVE to PPC_HASH_MMU_NATIVE (bsc#1204413 ltc#200176). Update config files.
- powerpc: make memremap_compat_align 64s-only (bsc#1204413 ltc#200176).
- powerpc: powernv: kABI: add back powernv_get_random_long (bsc#1065729).
- ppc64/kdump: Limit kdump base to 512MB (bsc#1203410 ltc#199904).
- printk: add missing memory barrier to wake_up_klogd() (bsc#1204934).
- printk: use atomic updates for klogd work (bsc#1204934).
- printk: wake waiters for safe and NMI contexts (bsc#1204934).
- proc: avoid integer type confusion in get_proc_long (git-fixes).
- proc: fix a dentry lock race between release_task and lookup (git-fixes).
- proc: fix dentry/inode overinstantiating under /proc/${pid}/net (git-fixes).
- proc: proc_skip_spaces() shouldn't think it is working on C strings (git-fixes).
- profiling: fix shift too large makes kernel panic (git-fixes).
- pwm: lpc18xx-sct: Reduce number of devm memory allocations (git-fixes).
- pwm: lpc18xx-sct: Simplify driver by not using pwm_[gs]et_chip_data() (git-fixes).
- pwm: lpc18xx: Fix period handling (git-fixes).
- qed: validate and restrict untrusted VFs vlan promisc mode (git-fixes).
- r8152: add PID for the Lenovo OneLink+ Dock (git-fixes).
- r8152: fix the RX FIFO settings when suspending (git-fixes).
- r8152: fix the units of some registers for RTL8156A (git-fixes).
- random: remove useless header comment (git-fixes).
- ratelimit: Fix data-races in ___ratelimit() (git-fixes).
- rbd: fix possible memory leak in rbd_sysfs_init() (git-fixes).
- regulator: core: Clean up on enable failure (git-fixes).
- regulator: core: Prevent integer underflow (git-fixes).
- regulator: core: fix UAF in destroy_regulator() (git-fixes).
- regulator: core: fix kobject release warning and memory leak in regulator_register() (git-fixes).
- regulator: of: Fix refcount leak bug in of_get_regulation_constraints() (git-fixes).
- regulator: pca9450: Remove restrictions for regulator-name (git-fixes).
- regulator: pfuze100: Fix the global-out-of-bounds access in pfuze100_regulator_probe() (git-fixes).
- regulator: qcom_rpm: Fix circular deferral regression (git-fixes).
- regulator: qcom_smd: Fix pm8916_pldo range (git-fixes).
- regulator: twl6030: re-add TWL6032_SUBCLASS (git-fixes).
- remoteproc: imx_rproc: Fix refcount leak in imx_rproc_addr_init (git-fixes).
- remoteproc: imx_rproc: Simplify some error message (git-fixes).
- remoteproc: k3-r5: Fix refcount leak in k3_r5_cluster_of_init (git-fixes).
- remoteproc: qcom: pas: Check if coredump is enabled (git-fixes).
- remoteproc: qcom: pas: Mark devices as wakeup capable (git-fixes).
- remoteproc: qcom: q6v5-mss: add powerdomains to MSM8996 config (git-fixes).
- remoteproc: qcom: wcnss: Fix handling of IRQs (git-fixes).
- remoteproc: sysmon: Wait for SSCTL service to come up (git-fixes).
- reset: imx7: Fix the iMX8MP PCIe PHY PERST support (git-fixes).
- restore m_can_lec_type (git-fixes).
- ring-buffer: Add ring_buffer_wake_waiters() (git-fixes).
- ring-buffer: Allow splice to read previous partially read pages (git-fixes).
- ring-buffer: Check for NULL cpu_buffer in ring_buffer_wake_waiters() (bsc#1204705).
- ring-buffer: Check pending waiters when doing wake ups as well (git-fixes).
- ring-buffer: Fix race between reset page and reading page (git-fixes).
- ring-buffer: Have the shortest_full queue be the shortest not longest (git-fixes).
- ring-buffer: Include dropped pages in counting dirty patches (git-fixes).
- ring_buffer: Do not deactivate non-existant pages (git-fixes).
- rose: Fix NULL pointer dereference in rose_send_frame() (git-fixes).
- rose: check NULL rose_loopback_neigh->loopback (git-fixes).
- rpm/check-for-config-changes: add TOOLCHAIN_HAS_* to IGNORED_CONFIGS_RE This new form was added in commit b8c86872d1dc (riscv: fix detection of toolchain Zicbom support).
- rpm/check-for-config-changes: loosen pattern for AS_HAS_* This is needed to handle CONFIG_AS_HAS_NON_CONST_LEB128.
- rpm/kernel-binary.spec.in: move vdso to a separate package (bsc#1202385) We do the move only on 15.5+.
- rpm/kernel-binary.spec.in: simplify find for usrmerged The type test and print line are the same for both cases. The usrmerged case only ignores more, so refactor it to make it more obvious.
- rpm/kernel-source.spec.in: simplify finding of broken symlinks 'find -xtype l' will report them, so use that to make the search a bit faster (without using shell).
- rpmsg: char: Add mutex protection for rpmsg_eptdev_open() (git-fixes).
- rpmsg: mtk_rpmsg: Fix circular locking dependency (git-fixes).
- rpmsg: qcom: glink: replace strncpy() with strscpy_pad() (git-fixes).
- rpmsg: qcom_smd: Fix refcount leak in qcom_smd_parse_edge (git-fixes).
- rtc: stmp3xxx: Add failure handling for stmp3xxx_wdt_register() (git-fixes).
- rtmutex: Add acquire semantics for rtmutex lock acquisition slow path (bnc#1203829).
- s390/boot: add secure boot trailer (bsc#1205257 LTC#200451).
- s390/boot: fix absolute zero lowcore corruption on boot (git-fixes).
- s390/cpumf: Handle events cycles and instructions identical (git-fixes).
- s390/crash: fix incorrect number of bytes to copy to user space (git-fixes).
- s390/crash: make copy_oldmem_page() return number of bytes copied (git-fixes).
- s390/dasd: fix Oops in dasd_alias_get_start_dev due to missing pavgroup (git-fixes).
- s390/futex: add missing EX_TABLE entry to __futex_atomic_op() (bsc#1205427 LTC#200502).
- s390/hugetlb: fix prepare_hugepage_range() check for 2 GB hugepages (git-fixes).
- s390/hypfs: avoid error message under KVM (bsc#1032323).
- s390/kexec: handle R_390_PLT32DBL rela in arch_kexec_apply_relocations_add() (git-fixes).
- s390/mm: do not trigger write fault when vma does not allow VM_WRITE (git-fixes).
- s390/mm: use non-quiescing sske for KVM switch to keyed guest (git-fixes).
- s390/pci: add missing EX_TABLE entries to __pcistg_mio_inuser()/__pcilg_mio_inuser() (bsc#1205427 LTC#200502).
- s390/qeth: cache link_info for ethtool (bsc#1202262 LTC#199322).
- s390/smp: enforce lowcore protection on CPU restart (git-fixes).
- s390/stp: clock_delta should be signed (git-fixes).
- s390/uaccess: add missing EX_TABLE entries to __clear_user(), copy_in_user_mvcos(), copy_in_user_mvc(), clear_user_xc() and __strnlen_user() (bsc#1205428 LTC#200501).
- s390/zcore: fix race when reading from hardware system area (git-fixes).
- s390: fix double free of GS and RI CBs on fork() failure (bsc#1203197 LTC#199895).
- s390: fix nospec table alignments (git-fixes).
- samples/landlock: Add clang-format exceptions (git-fixes).
- samples/landlock: Fix path_list memory leak (git-fixes).
- samples/landlock: Format with clang-format (git-fixes).
- sbitmap: Avoid leaving waitqueue in invalid state in __sbq_wake_up() (git-fixes).
- sbitmap: fix possible io hung due to lost wakeup (git-fixes).
- sched-core-Do-not-requeue-task-on-CPU-excluded-from-cpus_mask.patch
- sched/core: Always flush pending blk_plug (bnc#1189999 (Scheduler functional and performance backports)).
- sched/deadline: Fix BUG_ON condition for deboosted tasks (git-fixes)
- sched/fair: Fix cfs_rq_clock_pelt() for throttled cfs_rq (bnc#1189999 (Scheduler functional and performance backports)).
- sched/fair: Fix cfs_rq_clock_pelt() for throttled cfs_rq -kabi (git fixes (sched/fair)).
- sched/fair: Remove redundant word ' *' (bnc#1189999 (Scheduler functional and performance backports)).
- sched/uclamp: Fix iowait boost escaping uclamp restriction (git-fixes)
- sched/uclamp: Fix rq->uclamp_max not set on first enqueue (git-fixes)
- sched: Allow newidle balancing to bail out of load_balance (bnc#1189999 (Scheduler functional and performance backports)).
- sched: Clear ttwu_pending after enqueue_task() (git fixes (sched/core)).
- sched: Disable sched domain debugfs creation on ppc64 unless sched_verbose is specified (bnc#1205653).
- sched: Fix the check of nr_running at queue wakelist (bnc#1189999 (Scheduler functional and performance backports)).
- sched: Remove the limitation of WF_ON_CPU on wakelist if wakee cpu is idle (bnc#1189999 (Scheduler functional and performance backports)). Refresh
- sched: Remove unused function group_first_cpu() (bnc#1189999 (Scheduler functional and performance backports)).
- scripts/dtc: Call pkg-config POSIXly correct (git-fixes).
- scripts/faddr2line: Fix regression in name resolution on ppc64le (git-fixes).
- scripts/faddr2line: Fix vmlinux detection on arm64 (git-fixes).
- scripts/gdb: change kernel config dumping method (git-fixes).
- scripts: sphinx-pre-install: Fix ctex support on Debian (git-fixes).
- scripts: sphinx-pre-install: add required ctex dependency (git-fixes).
- scsi: Revert 'scsi: qla2xxx: Fix disk failure to rediscover' (git-fixes).
- scsi: core: Add BLIST_NO_ASK_VPD_SIZE for some VDASD (bsc#1203039).
- scsi: hisi_sas: Keep controller active between ISR of phyup and the event being processed (bsc#1202471).
- scsi: hisi_sas: Use autosuspend for the host controller (bsc#1202471).
- scsi: ibmvfc: Avoid path failures during live migration (bsc#1065729).
- scsi: ibmvscsis: Increase INITIAL_SRP_LIMIT to 1024 (bsc#1156395).
- scsi: libiscsi: Add iscsi_cls_conn to sysfs after initialization (bsc#1198410).
- scsi: libsas: Fix use-after-free bug in smp_execute_task_sg() (git-fixes).
- scsi: lpfc: Add missing destroy_workqueue() in error path (bsc#1203939).
- scsi: lpfc: Add missing free iocb and nlp kref put for early return VMID cases (bsc#1203939).
- scsi: lpfc: Add reporting capability for Link Degrade Signaling (bsc#1203939).
- scsi: lpfc: Add warning notification period to CMF_SYNC_WQE (bsc#1203063).
- scsi: lpfc: Check the return value of alloc_workqueue() (bsc#1203063).
- scsi: lpfc: Copyright updates for 14.2.0.5 patches (bsc#1201956).
- scsi: lpfc: Copyright updates for 14.2.0.6 patches (bsc#1203063).
- scsi: lpfc: Create a sysfs entry called lpfc_xcvr_data for transceiver info (bsc#1204957).
- scsi: lpfc: Fix FLOGI ACC with wrong SID in PT2PT topology (bsc#1203939).
- scsi: lpfc: Fix attempted FA-PWWN usage after feature disable (bsc#1201956).
- scsi: lpfc: Fix hard lockup when reading the rx_monitor from debugfs (bsc#1204957).
- scsi: lpfc: Fix lost NVMe paths during LIF bounce stress test (bsc#1201956).
- scsi: lpfc: Fix mbuf pool resource detected as busy at driver unload (bsc#1203939).
- scsi: lpfc: Fix memory leak in lpfc_create_port() (bsc#1204957).
- scsi: lpfc: Fix multiple NVMe remoteport registration calls for the same NPort ID (bsc#1203939).
- scsi: lpfc: Fix null ndlp ptr dereference in abnormal exit path for GFT_ID (bsc#1203063).
- scsi: lpfc: Fix possible memory leak when failing to issue CMF WQE (bsc#1201956).
- scsi: lpfc: Fix prli_fc4_req checks in PRLI handling (bsc#1203939).
- scsi: lpfc: Fix spelling mistake 'unsolicted' -> 'unsolicited' (bsc#1204957).
- scsi: lpfc: Fix uninitialized cqe field in lpfc_nvme_cancel_iocb() (bsc#1201956).
- scsi: lpfc: Fix unsolicited FLOGI receive handling during PT2PT discovery (bsc#1203063).
- scsi: lpfc: Fix various issues reported by tools (bsc#1203939).
- scsi: lpfc: Log when congestion management limits are in effect (bsc#1204957).
- scsi: lpfc: Move scsi_host_template outside dynamically allocated/freed phba (bsc#1185032 bsc#1203939). Dropped: patches.suse/lpfc-decouple-port_template-and-vport_template.patch
- scsi: lpfc: Prevent buffer overflow crashes in debugfs with malformed user input (bsc#1201956).
- scsi: lpfc: Refactor lpfc_nvmet_prep_abort_wqe() into lpfc_sli_prep_abort_xri() (bsc#1201956).
- scsi: lpfc: Remove Menlo/Hornet related code (bsc#1201956).
- scsi: lpfc: Remove SANDiags related code (bsc#1203063).
- scsi: lpfc: Remove extra atomic_inc on cmd_pending in queuecommand after VMID (bsc#1201956).
- scsi: lpfc: Remove the unneeded result variable (bsc#1203939).
- scsi: lpfc: Remove unneeded result variable (bsc#1203939).
- scsi: lpfc: Rename mp/bmp dma buffers to rq/rsp in lpfc_fdmi_cmd (bsc#1203939).
- scsi: lpfc: Return DID_TRANSPORT_DISRUPTED instead of DID_REQUEUE (bsc#1203939).
- scsi: lpfc: Revert RSCN_MEMENTO workaround for misbehaved configuration (bsc#1201956).
- scsi: lpfc: Rework FDMI attribute registration for unintential padding (bsc#1203939).
- scsi: lpfc: Rework MIB Rx Monitor debug info logic (bsc#1203063).
- scsi: lpfc: Rework lpfc_fdmi_cmd() routine for cleanup and consistency (bsc#1203939).
- scsi: lpfc: Set PU field when providing D_ID in XMIT_ELS_RSP64_CX iocb (bsc#1201956).
- scsi: lpfc: Set sli4_param's cmf option to zero when CMF is turned off (bsc#1204957).
- scsi: lpfc: Update congestion mode logging for Emulex SAN Manager application (bsc#1203939).
- scsi: lpfc: Update lpfc version to 14.2.0.5 (bsc#1201956).
- scsi: lpfc: Update lpfc version to 14.2.0.6 (bsc#1203063).
- scsi: lpfc: Update lpfc version to 14.2.0.7 (bsc#1203939).
- scsi: lpfc: Update lpfc version to 14.2.0.8 (bsc#1204957).
- scsi: lpfc: Update the obsolete adapter list (bsc#1204142).
- scsi: megaraid: Clear READ queue map's nr_queues (git-fixes).
- scsi: megaraid_sas: Correct value passed to scsi_device_lookup() (git-fixes).
- scsi: mpi3mr: Schedule IRQ kthreads only on non-RT kernels (bnc#1204498).
- scsi: mpt3sas: Fix return value check of dma_get_required_mask() (git-fixes).
- scsi: mpt3sas: Fix use-after-free warning (git-fixes).
- scsi: mpt3sas: Stop fw fault watchdog work item during system shutdown (git-fixes).
- scsi: qedf: Populate sysfs attributes for vport (git-fixes).
- scsi: qla2xxx: Add NVMe parameters support in Auxiliary Image Status (bsc#1203935).
- scsi: qla2xxx: Add debugfs create/delete helpers (bsc#1203935).
- scsi: qla2xxx: Always wait for qlt_sess_work_fn() from qlt_stop_phase1() (bsc#1203935).
- scsi: qla2xxx: Avoid flush_scheduled_work() usage (bsc#1203935).
- scsi: qla2xxx: Check correct variable in qla24xx_async_gffid() (bsc#1201958).
- scsi: qla2xxx: Define static symbols (bsc#1203935).
- scsi: qla2xxx: Disable ATIO interrupt coalesce for quad port ISP27XX (bsc#1203935).
- scsi: qla2xxx: Drop DID_TARGET_FAILURE use (bsc#1203935).
- scsi: qla2xxx: Enhance driver tracing with separate tunable and more (bsc#1203935).
- scsi: qla2xxx: Fix discovery issues in FC-AL topology (bsc#1201958).
- scsi: qla2xxx: Fix disk failure to rediscover (git-fixes).
- scsi: qla2xxx: Fix imbalance vha->vref_count (bsc#1201958).
- scsi: qla2xxx: Fix incorrect display of max frame size (bsc#1201958).
- scsi: qla2xxx: Fix memory leak in __qlt_24xx_handle_abts() (bsc#1203935).
- scsi: qla2xxx: Fix response queue handler reading stale packets (bsc#1201958).
- scsi: qla2xxx: Fix response queue handler reading stale packets (bsc#1203935).
- scsi: qla2xxx: Fix serialization of DCBX TLV data request (bsc#1204963).
- scsi: qla2xxx: Fix sparse warning for dport_data (bsc#1201958).
- scsi: qla2xxx: Fix spelling mistake 'definiton' -> 'definition' (bsc#1203935).
- scsi: qla2xxx: Log message 'skipping scsi_scan_host()' as informational (bsc#1203935).
- scsi: qla2xxx: Remove unused declarations for qla2xxx (bsc#1203935).
- scsi: qla2xxx: Remove unused del_sess_list field (bsc#1203935).
- scsi: qla2xxx: Remove unused qlt_tmr_work() (bsc#1203935).
- scsi: qla2xxx: Revert 'scsi: qla2xxx: Fix response queue handler reading stale packets' (bsc#1203935).
- scsi: qla2xxx: Update manufacturer details (bsc#1201958).
- scsi: qla2xxx: Update version to 10.02.07.800-k (bsc#1201958).
- scsi: qla2xxx: Update version to 10.02.07.900-k (bsc#1203935).
- scsi: qla2xxx: Use transport-defined speed mask for supported_speeds (bsc#1204963).
- scsi: qla2xxx: Zero undefined mailbox IN registers (bsc#1201958).
- scsi: qla2xxx: edif: Fix dropped IKE message (bsc#1201958).
- scsi: scsi_transport_fc: Use %u for dev_loss_tmo (bsc#1202914).
- scsi: scsi_transport_sas: Fix error handling in sas_phy_add() (git-fixes).
- scsi: sg: Allow waiting for commands to complete on removed device (git-fixes).
- scsi: smartpqi: Add module param to disable managed ints (bsc#1203893).
- scsi: smartpqi: Fix DMA direction for RAID requests (git-fixes).
- scsi: smartpqi: Shorten drive visibility after removal (bsc#1200622).
- scsi: storvsc: Drop DID_TARGET_FAILURE use (git-fixes).
- scsi: storvsc: Fix handling of srb_status and capacity change events (git-fixes).
- scsi: storvsc: Fix typo in comment (git-fixes).
- scsi: storvsc: Remove WQ_MEM_RECLAIM from storvsc_error_wq (git-fixes).
- scsi: storvsc: remove an extraneous 'to' in a comment (git-fixes).
- scsi: ufs: core: Fix another task management completion race (git-fixes).
- scsi: ufs: core: Fix task management completion timeout race (git-fixes).
- scsi: ufs: ufs-pci: Add support for Intel ADL (jsc#PED-707).
- scsi: ufs: ufs-pci: Add support for Intel MTL (jsc#PED-732).
- scsi: zfcp: Fix double free of FSF request when qdio send fails (git-fixes).
- scsi: zfcp: Fix missing auto port scan and thus missing target ports (git-fixes).
- seccomp: Invalidate seccomp mode to catch death failures (git-fixes).
- selftest/net/forwarding: declare NETIFS p9 p10 (git-fixes).
- selftest/powerpc: Add PAPR sysfs attributes sniff test (bsc#1200465 ltc#197256 jsc#SLE-18130).
- selftest/vm: fix map_fixed_noreplace test failure (git-fixes).
- selftest/vm: verify mmap addr in mremap_test (git-fixes).
- selftest/vm: verify remap destination address in mremap_test (git-fixes).
- selftest: tpm2: Add Client.__del__() to close /dev/tpm* handle (git-fixes).
- selftests, x86: fix how check_cc.sh is being invoked (git-fixes).
- selftests/exec: Add non-regular to TEST_GEN_PROGS (git-fixes).
- selftests/exec: Remove pipe from TEST_GEN_FILES (git-fixes).
- selftests/fib_tests: Rework fib_rp_filter_test() (git-fixes).
- selftests/ftrace: Do not trace do_softirq because of PREEMPT_RT (git-fixes).
- selftests/ftrace: make kprobe profile testcase description unique (git-fixes).
- selftests/intel_pstate: fix build for ARCH=x86_64 (git-fixes).
- selftests/landlock: Add clang-format exceptions (git-fixes).
- selftests/landlock: Add tests for O_PATH (git-fixes).
- selftests/landlock: Add tests for unknown access rights (git-fixes).
- selftests/landlock: Extend access right tests to directories (git-fixes).
- selftests/landlock: Extend tests for minimal valid attribute size (git-fixes).
- selftests/landlock: Format with clang-format (git-fixes).
- selftests/landlock: Fully test file rename with 'remove' access (git-fixes).
- selftests/landlock: Make tests build with old libc (git-fixes).
- selftests/landlock: Normalize array assignment (git-fixes).
- selftests/landlock: Test landlock_create_ruleset(2) argument check ordering (git-fixes).
- selftests/livepatch: better synchronize test_klp_callbacks_busy (bsc#1071995).
- selftests/memfd: clean up mapping in mfd_fail_write (git-fixes).
- selftests/memfd: remove unused variable (git-fixes).
- selftests/net: pass ipv6_args to udpgso_bench's IPv6 TCP test (git-fixes).
- selftests/net: so_txtime: fix parsing of start time stamp on 32 bit systems (git-fixes).
- selftests/net: so_txtime: usage(): fix documentation of default clock (git-fixes).
- selftests/net: timestamping: Fix bind_phc check (git-fixes).
- selftests/net: udpgso_bench_tx: fix dst ip argument (git-fixes).
- selftests/pidfd_test: Remove the erroneous ',' (git-fixes).
- selftests/powerpc/spectre_v2: Return skip code when miss_percent is high (git-fixes).
- selftests/powerpc: Add a test of sigreturning to the kernel (git-fixes).
- selftests/powerpc: Skip energy_scale_info test on older firmware (git-fixes).
- selftests/resctrl: Fix null pointer dereference on open failed (git-fixes).
- selftests/rseq: Change type of rseq_offset to ptrdiff_t (git-fixes).
- selftests/rseq: Fix ppc32 missing instruction selection 'u' and 'x' for load/store (git-fixes).
- selftests/rseq: Fix ppc32 offsets by using long rather than off_t (git-fixes).
- selftests/rseq: Fix ppc32: wrong rseq_cs 32-bit field pointer on big endian (git-fixes).
- selftests/rseq: Fix warnings about #if checks of undefined tokens (git-fixes).
- selftests/rseq: Fix: work-around asm goto compiler bugs (git-fixes).
- selftests/rseq: Introduce rseq_get_abi() helper (git-fixes).
- selftests/rseq: Introduce thread pointer getters (git-fixes).
- selftests/rseq: Remove arm/mips asm goto compiler work-around (git-fixes).
- selftests/rseq: Remove useless assignment to cpu variable (git-fixes).
- selftests/rseq: Remove volatile from __rseq_abi (git-fixes).
- selftests/rseq: Uplift rseq selftests for compatibility with glibc-2.35 (git-fixes).
- selftests/rseq: introduce own copy of rseq uapi header (git-fixes).
- selftests/rseq: remove ARRAY_SIZE define from individual tests (git-fixes).
- selftests/rseq: x86-32: use %gs segment selector for accessing rseq thread area (git-fixes).
- selftests/rseq: x86-64: use %fs segment selector for accessing rseq thread area (git-fixes).
- selftests/seccomp: Do not call read() on TTY from background pgrp (git-fixes).
- selftests/seccomp: Fix compile warning when CC=clang (git-fixes).
- selftests/seccomp: Fix seccomp failure by adding missing headers (git-fixes).
- selftests/sgx: Treat CC as one argument (git-fixes).
- selftests/vm/transhuge-stress: fix ram size thinko (git-fixes).
- selftests/vm: make charge_reserved_hugetlb.sh work with existing cgroup setting (git-fixes).
- selftests/x86: Add validity check and allow field splitting (git-fixes).
- selftests/zram01.sh: Fix compression ratio calculation (git-fixes).
- selftests/zram: Adapt the situation that /dev/zram0 is being used (git-fixes).
- selftests/zram: Skip max_comp_streams interface on newer kernel (git-fixes).
- selftests: Add duplicate config only for MD5 VRF tests (git-fixes).
- selftests: Fix IPv6 address bind tests (git-fixes).
- selftests: Fix raw socket bind tests with VRF (git-fixes).
- selftests: Fix the if conditions of in test_extra_filter() (git-fixes).
- selftests: add ping test with ping_group_range tuned (git-fixes).
- selftests: cgroup: Make cg_create() use 0755 for permission instead of 0644 (git-fixes).
- selftests: cgroup: Test open-time cgroup namespace usage for migration checks (git-fixes).
- selftests: cgroup: Test open-time credential usage for migration checks (git-fixes).
- selftests: clone3: clone3: add case CLONE3_ARGS_NO_TEST (git-fixes).
- selftests: fixup build warnings in pidfd / clone3 tests (git-fixes).
- selftests: forwarding: Fix failing tests with old libnet (git-fixes).
- selftests: forwarding: add shebang for sch_red.sh (git-fixes).
- selftests: forwarding: fix error message in learning_test (git-fixes).
- selftests: forwarding: fix flood_unicast_test when h2 supports IFF_UNICAST_FLT (git-fixes).
- selftests: forwarding: fix learning_test when h1 supports IFF_UNICAST_FLT (git-fixes).
- selftests: futex: Use variable MAKE instead of make (git-fixes).
- selftests: gpio: fix gpio compiling error (git-fixes).
- selftests: harness: avoid false negatives if test has no ASSERTs (git-fixes).
- selftests: icmp_redirect: pass xfail=0 to log_test() (git-fixes).
- selftests: kvm: set rax before vmcall (git-fixes).
- selftests: mirror_gre_bridge_1q: Avoid changing PVID while interface is operational (git-fixes).
- selftests: mlxsw: resource_scale: Fix return value (git-fixes).
- selftests: mlxsw: tc_police_scale: Make test more robust (git-fixes).
- selftests: mlxsw: vxlan_flooding: Prevent flooding of unwanted packets (git-fixes).
- selftests: mptcp: add csum mib check for mptcp_connect (git-fixes).
- selftests: mptcp: fix diag instability (git-fixes).
- selftests: mptcp: fix ipv6 routing setup (git-fixes).
- selftests: mptcp: fix mibit vs mbit mix up (git-fixes).
- selftests: mptcp: make sendfile selftest work (git-fixes).
- selftests: mptcp: more stable diag tests (git-fixes).
- selftests: mptcp: more stable simult_flows tests (git-fixes).
- selftests: net: Correct case name (git-fixes).
- selftests: net: Correct ping6 expected rc from 2 to 1 (git-fixes).
- selftests: net: Fix a typo in udpgro_fwd.sh (git-fixes).
- selftests: net: tls: remove unused variable and code (git-fixes).
- selftests: net: udpgro_fwd.sh: explicitly checking the available ping feature (git-fixes).
- selftests: net: using ping6 for IPv6 in udpgro_fwd.sh (git-fixes).
- selftests: netfilter: Fix nft_fib.sh for all.rp_filter=1 (git-fixes).
- selftests: netfilter: add a vrf+conntrack testcase (git-fixes).
- selftests: netfilter: correct PKTGEN_SCRIPT_PATHS in nft_concat_range.sh (git-fixes).
- selftests: netfilter: disable rp_filter on router (git-fixes).
- selftests: netfilter: fix exit value for nft_concat_range (git-fixes).
- selftests: nft_concat_range: add test for reload with no element add/del (git-fixes).
- selftests: ocelot: tc_flower_chains: specify conform-exceed action for policer (git-fixes).
- selftests: openat2: Add missing dependency in Makefile (git-fixes).
- selftests: openat2: Print also errno in failure messages (git-fixes).
- selftests: openat2: Skip testcases that fail with EOPNOTSUPP (git-fixes).
- selftests: pmtu.sh: Kill nettest processes launched in subshell (git-fixes).
- selftests: pmtu.sh: Kill tcpdump processes launched by subshell (git-fixes).
- selftests: rtc: Increase test timeout so that all tests run (git-fixes).
- selftests: rtnetlink: correct xfrm policy rule in kci_test_ipsec_offload (git-fixes).
- selftests: skip mincore.check_file_mmap when fs lacks needed support (git-fixes).
- selftests: test_vxlan_under_vrf: Fix broken test case (git-fixes).
- selftests: timers: clocksource-switch: fix passing errors from child (git-fixes).
- selftests: timers: valid-adjtimex: build fix for newer toolchains (git-fixes).
- selftests: vm: Makefile: rename TARGETS to VMTARGETS (git-fixes).
- selftests: vm: fix clang build error multiple output files (git-fixes).
- selftests: x86: fix [-Wstringop-overread] warn in test_process_vm_readv() (git-fixes).
- selinux: Add boundary check in put_entry() (git-fixes).
- selinux: access superblock_security_struct in LSM blob way (git-fixes).
- selinux: allow FIOCLEX and FIONCLEX with policy capability (git-fixes).
- selinux: check return value of sel_make_avc_files (git-fixes).
- selinux: enable use of both GFP_KERNEL and GFP_ATOMIC in convert_context() (git-fixes).
- selinux: fix bad cleanup on error in hashtab_duplicate() (git-fixes).
- selinux: fix double free of cond_list on error paths (git-fixes).
- selinux: fix memleak in security_read_state_kernel() (git-fixes).
- selinux: fix misuse of mutex_is_locked() (git-fixes).
- selinux: use 'grep -E' instead of 'egrep' (git-fixes).
- selinux: use correct type for context length (git-fixes).
- serial: 8250: 8250_omap: Avoid RS485 RTS glitch on ->set_termios() (git-fixes).
- serial: 8250: Add proper clock handling for OxSemi PCIe devices (git-fixes).
- serial: 8250: Export ICR access helpers for internal use (git-fixes).
- serial: 8250: Fall back to non-DMA Rx if IIR_RDI occurs (git-fixes).
- serial: 8250: Fix restoring termios speed after suspend (git-fixes).
- serial: 8250: Flush DMA Rx on RLSI (git-fixes).
- serial: 8250: Fold EndRun device support into OxSemi Tornado code (git-fixes).
- serial: 8250: omap: Fix unpaired pm_runtime_put_sync() in omap8250_remove() (git-fixes).
- serial: 8250: omap: Flush PM QOS work on remove (git-fixes).
- serial: 8250_bcm7271: Save/restore RTS in suspend/resume (git-fixes).
- serial: 8250_dw: Store LSR into lsr_saved_flags in dw8250_tx_wait_empty() (git-fixes).
- serial: 8250_fsl: Do not report FE, PE and OE twice (git-fixes).
- serial: 8250_lpss: Configure DMA also w/o DMA filter (git-fixes).
- serial: 8250_omap: remove wait loop from Errata i202 workaround (git-fixes).
- serial: 8250_pci: Refactor the loop in pci_ite887x_init() (git-fixes).
- serial: 8250_pci: Replace dev_*() by pci_*() macros (git-fixes).
- serial: Create uart_xmit_advance() (git-fixes).
- serial: atmel: remove redundant assignment in rs485_config (git-fixes).
- serial: core: move RS485 configuration tasks from drivers into core (git-fixes).
- serial: fsl_lpuart: RS485 RTS polariy is inverse (git-fixes).
- serial: fsl_lpuart: Reset prior to registration (git-fixes).
- serial: imx: Add missing .thaw_noirq hook (git-fixes).
- serial: mvebu-uart: uart2 error bits clearing (git-fixes).
- serial: tegra-tcu: Use uart_xmit_advance(), fixes icount.tx accounting (git-fixes).
- serial: tegra: Use uart_xmit_advance(), fixes icount.tx accounting (git-fixes).
- sfc: disable softirqs for ptp TX (git-fixes).
- sfc: fix kernel panic when creating VF (git-fixes).
- sfc: fix use after free when disabling sriov (git-fixes).
- signal: break out of wait loops on kthread_stop() (bsc#1204926).
- siox: fix possible memory leak in siox_device_add() (git-fixes).
- slimbus: qcom-ngd: cleanup in probe error path (git-fixes).
- slimbus: qcom-ngd: use correct error in message of pdr_add_lookup() failure (git-fixes).
- slimbus: stream: correct presence rate frequencies (git-fixes).
- smb2: small refactor in smb2_check_message() (bsc#1193629).
- smb3: Move the flush out of smb2_copychunk_range() into its callers (bsc#1193629).
- smb3: add dynamic trace points for tree disconnect (bsc#1193629).
- smb3: add trace point for SMB2_set_eof (bsc#1193629).
- smb3: allow deferred close timeout to be configurable (bsc#1193629).
- smb3: check xattr value length earlier (bsc#1193629).
- smb3: clarify multichannel warning (bsc#1193629).
- smb3: do not log confusing message when server returns no network interfaces (bsc#1193629).
- smb3: fix empty netname context on secondary channels (bsc#1193629).
- smb3: fix oops in calculating shash_setkey (bsc#1193629).
- smb3: fix temporary data corruption in collapse range (bsc#1193629).
- smb3: fix temporary data corruption in insert range (bsc#1193629).
- smb3: improve SMB3 change notification support (bsc#1193629).
- smb3: interface count displayed incorrectly (bsc#1193629).
- smb3: missing inode locks in punch hole (bsc#1193629).
- smb3: missing inode locks in zero range (bsc#1193629).
- smb3: must initialize two ACL struct fields to zero (bsc#1193629).
- smb3: remove unneeded null check in cifs_readdir (bsc#1193629).
- smb3: rename encryption/decryption TFMs (bsc#1193629).
- smb3: use filemap_write_and_wait_range instead of filemap_write_and_wait (bsc#1193629).
- smb3: use netname when available on secondary channels (bsc#1193629).
- smb3: workaround negprot bug in some Samba servers (bsc#1193629).
- smsc95xx: Ignore -ENODEV errors when device is unplugged (git-fixes).
- soc/tegra: fuse: Drop Kconfig dependency on TEGRA20_APB_DMA (git-fixes).
- soc: amlogic: Fix refcount leak in meson-secure-pwrc.c (git-fixes).
- soc: brcmstb: pm-arm: Fix refcount leak and __iomem leak bugs (git-fixes).
- soc: fsl: guts: machine variable might be unset (git-fixes).
- soc: fsl: select FSL_GUTS driver for DPIO (git-fixes).
- soc: imx8m: Enable OCOTP clock before reading the register (git-fixes).
- soc: imx: gpcv2: Assert reset before ungating clock (git-fixes).
- soc: qcom: Make QCOM_RPMPD depend on PM (git-fixes).
- soc: qcom: aoss: Fix refcount leak in qmp_cooling_devices_register (git-fixes).
- soc: qcom: ocmem: Fix refcount leak in of_get_ocmem (git-fixes).
- soc: qcom: smem_state: Add refcounting for the 'state->of_node' (git-fixes).
- soc: qcom: smsm: Fix refcount leak bugs in qcom_smsm_probe() (git-fixes).
- soc: renesas: r8a779a0-sysc: Fix A2DP1 and A2CV[2357] PDR values (git-fixes).
- soc: sunxi: sram: Actually claim SRAM regions (git-fixes).
- soc: sunxi: sram: Fix debugfs info for A64 SRAM C (git-fixes).
- soc: sunxi: sram: Fix probe function ordering issues (git-fixes).
- soc: sunxi: sram: Prevent the driver from being unbound (git-fixes).
- soc: sunxi_sram: Make use of the helper function devm_platform_ioremap_resource() (git-fixes).
- soundwire: bus_type: fix remove and shutdown support (git-fixes).
- soundwire: cadence: Do not overwrite msg->buf during write commands (git-fixes).
- soundwire: intel: Initialize clock stop timeout (bsc#1205507).
- soundwire: intel: fix error handling on dai registration issues (git-fixes).
- soundwire: qcom: Check device status before reading devid (git-fixes).
- soundwire: qcom: check for outanding writes before doing a read (git-fixes).
- soundwire: qcom: fix device status array range (git-fixes).
- soundwire: qcom: reinit broadcast completion (git-fixes).
- speakup: fix a segfault caused by switching consoles (git-fixes).
- spi/omap100k:Fix PM disable depth imbalance in omap1_spi100k_probe (git-fixes).
- spi: Add API to count spi acpi resources (bsc#1203699).
- spi: Create helper API to lookup ACPI info for spi device (bsc#1203699).
- spi: Ensure that sg_table won't be used after being freed (git-fixes).
- spi: Fix incorrect cs_setup delay handling (git-fixes).
- spi: Fix simplification of devm_spi_register_controller (git-fixes).
- spi: Return deferred probe error when controller isn't yet available (bsc#1203699).
- spi: Support selection of the index of the ACPI Spi Resource before alloc (bsc#1203699).
- spi: dt-bindings: cadence: add missing 'required' (git-fixes).
- spi: dt-bindings: zynqmp-qspi: add missing 'required' (git-fixes).
- spi: dw-dma: decrease reference count in dw_spi_dma_init_mfld() (git-fixes).
- spi: dw: Fix PM disable depth imbalance in dw_spi_bt1_probe (git-fixes).
- spi: meson-spicc: add local pow2 clock ops to preserve rate between messages (git-fixes).
- spi: meson-spicc: do not rely on busy flag in pow2 clk ops (git-fixes).
- spi: mt7621: Fix an error message in mt7621_spi_probe() (git-fixes).
- spi: propagate error code to the caller of acpi_spi_device_alloc() (bsc#1203699).
- spi: pxa2xx: Add support for Intel Meteor Lake-P (jsc#PED-732).
- spi: pxa2xx: Add support for Intel Raptor Lake PCH-S (jsc#PED-634).
- spi: qup: add missing clk_disable_unprepare on error in spi_qup_pm_resume_runtime() (git-fixes).
- spi: qup: add missing clk_disable_unprepare on error in spi_qup_resume() (git-fixes).
- spi: s3c64xx: Fix large transfers with DMA (git-fixes).
- spi: spi-altera-dfl: Fix an error handling path (git-fixes).
- spi: spi-imx: Fix spi_bus_clk if requested clock is higher than input clock (git-fixes).
- spi: spi-rspi: Fix PIO fallback on RZ platforms (git-fixes).
- spi: stm32: Print summary 'callbacks suppressed' message (git-fixes).
- spi: stm32: fix stm32_spi_prepare_mbr() that halves spi clk for every run (git-fixes).
- spi: synquacer: Add missing clk_disable_unprepare() (git-fixes).
- spi: tegra20-slink: fix UAF in tegra_slink_remove() (git-fixes).
- spi: tegra210-quad: Fix duplicate resource error (git-fixes).
- spmi: pmic-arb: correct duplicate APID to PPID mapping logic (git-fixes).
- spmi: pmic-arb: do not ack and clear peripheral interrupts in cleanup_irq (git-fixes).
- spmi: trace: fix stack-out-of-bound access in SPMI tracing functions (git-fixes).
- staging: rtl8192u: Fix sleep in atomic context bug in dm_fsync_timer_callback (git-fixes).
- staging: rtl8712: fix use after free bugs (git-fixes).
- staging: rtl8723bs: fix a potential memory leak in rtw_init_cmd_priv() (git-fixes).
- staging: rtl8723bs: fix potential memory leak in rtw_init_drv_sw() (git-fixes).
- staging: vt6655: fix potential memory leak (git-fixes).
- staging: vt6655: fix some erroneous memory clean-up loops (git-fixes).
- stmmac: intel: Add a missing clk_disable_unprepare() call in intel_eth_pci_remove() (git-fixes).
- stmmac: intel: Fix an error handling path in intel_eth_pci_probe() (git-fixes).
- struct ehci_hcd: hide new element going into a hole (git-fixes).
- struct xhci_hcd: restore member now dynamically allocated (git-fixes).
- sunrpc: fix expiry of auth creds (git-fixes).
- supported.conf: Add cs_dsp firmware module (bsc#1203699)
- supported.conf: Add drivers/virt/coco/sevguest/sevguest
- supported.conf: added drivers/net/ethernet/marvell/octeontx2/nic/otx2_ptp and 		changed all octeontx2 modules as supported (jsc#SLE-24682)
- supported.conf: mark drivers/nvme/common as supported (jsc#SLE-20183)
- supported.conf: mark lib/objagg supported as dependency of mlxsw
- supported.conf: mark mlxsw modules supported (jsc#SLE-23766)
- supported.conf: mark spi-pxa2xx-platform as supported (bsc#1203699) It's required for the sound on recent Intel machines
- tee: optee: do not check memref size on return from Secure World (git-fixes).
- tee: tee_get_drvdata(): fix description of return value (git-fixes).
- testing/selftests/mqueue: Fix mq_perf_tests to free the allocated cpu set (git-fixes).
- testing: nvdimm: asm/mce.h is not needed in nfit.c (git-fixes).
- testing: nvdimm: iomap: make __nfit_test_ioremap a macro (git-fixes).
- tests: fix idmapped mount_setattr test (git-fixes).
- thermal/drivers/qcom/tsens-v0_1: Fix MSM8939 fourth sensor hw_id (git-fixes).
- thermal/int340x_thermal: handle data_vault when the value is ZERO_SIZE_PTR (bsc#1201308).
- thermal/tools/tmon: Include pthread and time headers in tmon.h (git-fixes).
- thermal: cpufreq_cooling: Check the policy first in cpufreq_cooling_register() (git-fixes).
- thermal: int340x: Mode setting with new OS handshake (jsc#PED-678).
- thermal: int340x: Update OS policy capability handshake (jsc#PED-678).
- thermal: intel_powerclamp: Use first online CPU as control_cpu (git-fixes).
- thermal: intel_powerclamp: Use get_cpu() instead of smp_processor_id() to avoid crash (git-fixes).
- thermal: sysfs: Fix cooling_device_stats_setup() error code path (git-fixes).
- thunderbolt: Add DP OUT resource when DP tunnel is discovered (git-fixes).
- thunderbolt: Add back Intel Falcon Ridge end-to-end flow control workaround (git-fixes).
- thunderbolt: Add missing device ID to tb_switch_is_alpine_ridge() (git-fixes).
- thunderbolt: Add support for Intel Maple Ridge single port controller (git-fixes).
- thunderbolt: Add support for Intel Raptor Lake (jsc#PED-634).
- thunderbolt: Disable LTTPR on Intel Titan Ridge (git-fixes).
- thunderbolt: Explicitly enable lane adapter hotplug events at startup (git-fixes).
- thunderbolt: Explicitly reset plug events delay back to USB4 spec value (git-fixes).
- thunderbolt: Fix buffer allocation of devices with no DisplayPort adapters (git-fixes).
- thunderbolt: Use the actual buffer in tb_async_error() (git-fixes).
- timers: implement usleep_idle_range() (git-fixes).
- tools include UAPI: Sync sound/asound.h copy with the kernel sources (git-fixes).
- tools/nolibc: fix incorrect truncation of exit code (git-fixes).
- tools/nolibc: i386: fix initial stack alignment (git-fixes).
- tools/nolibc: x86-64: Fix startup code bug (git-fixes).
- tools/testing/scatterlist: add missing defines (git-fixes).
- tools/thermal: Fix possible path truncations (git-fixes).
- tools: hv: Remove an extraneous 'the' (git-fixes).
- tools: hv: kvp: remove unnecessary (void*) conversions (git-fixes).
- tools: iio: iio_generic_buffer: Fix read size (git-fixes).
- tpm: eventlog: Fix section mismatch for DEBUG_SECTION_MISMATCH (git-fixes).
- trace/osnoise: Add migrate-disabled field to the osnoise header (git-fixes).
- trace/timerlat: Add migrate-disabled field to the timerlat header (git-fixes).
- tracing/histograms: Fix memory leak problem (git-fixes).
- tracing/kprobes: Check whether get_kretprobe() returns NULL in kretprobe_dispatcher() (git-fixes).
- tracing/osnoise: Fix duration type (git-fixes).
- tracing/osnoise: Fix possible recursive locking in stop_per_cpu_kthreads (git-fixes).
- tracing/probes: Have kprobes and uprobes use $COMM too (git-fixes).
- tracing/ring-buffer: Have polling block on watermark (git-fixes).
- tracing: Add '(fault)' name injection to kernel probes (git-fixes).
- tracing: Add ioctl() to force ring buffer waiters to wake up (git-fixes).
- tracing: Add tracing_reset_all_online_cpus_unlocked() function (git-fixes).
- tracing: Add ustring operation to filtering string pointers (git-fixes).
- tracing: Disable interrupt or preemption before acquiring arch_spinlock_t (git-fixes).
- tracing: Do not free snapshot if tracer is on cmdline (git-fixes).
- tracing: Fix memory leak in test_gen_synth_cmd() and test_empty_synth_event() (git-fixes).
- tracing: Fix memory leak in tracing_read_pipe() (git-fixes).
- tracing: Fix reading strings from synthetic events (git-fixes).
- tracing: Fix sleeping while atomic in kdb ftdump (git-fixes).
- tracing: Fix wild-memory-access in register_synth_event() (git-fixes).
- tracing: Free buffers when a used dynamic event is removed (git-fixes).
- tracing: Have filter accept 'common_cpu' to be consistent (git-fixes).
- tracing: Move duplicate code of trace_kprobe/eprobe.c into header (git-fixes).
- tracing: Replace deprecated CPU-hotplug functions (git-fixes).
- tracing: Simplify conditional compilation code in tracing_set_tracer() (git-fixes).
- tracing: Use a struct alignof to determine trace event field alignment (git-fixes).
- tracing: Wake up ring buffer waiters on closing of the file (git-fixes).
- tracing: Wake up waiters when tracing is disabled (git-fixes).
- tracing: hold caller_addr to hardirq_{enable,disable}_ip (git-fixes).
- tracing: kprobe: Fix kprobe event gen test module on exit (git-fixes).
- tracing: kprobe: Fix memory leak in test_gen_kprobe/kretprobe_cmd() (git-fixes).
- tracing: kprobe: Fix potential null-ptr-deref on trace_array in kprobe_event_gen_test_exit() (git-fixes).
- tracing: kprobe: Fix potential null-ptr-deref on trace_event_file in kprobe_event_gen_test_exit() (git-fixes).
- tracing: kprobe: Make gen test module work in arm and riscv (git-fixes).
- tty: 8250: Add support for Brainboxes PX cards (git-fixes).
- tty: n_gsm: Delete gsm_disconnect when config requester (git-fixes).
- tty: n_gsm: Delete gsmtty open SABM frame when config requester (git-fixes).
- tty: n_gsm: Modify CR,PF bit printk info when config requester (git-fixes).
- tty: n_gsm: Modify CR,PF bit when config requester (git-fixes).
- tty: n_gsm: Modify cr bit value when config requester (git-fixes).
- tty: n_gsm: Modify gsmtty driver register method when config requester (git-fixes).
- tty: n_gsm: Save dlci address open status when config requester (git-fixes).
- tty: n_gsm: add sanity check for gsm->receive in gsm_receive_buf() (git-fixes).
- tty: n_gsm: avoid call of sleeping functions from atomic context (git-fixes).
- tty: n_gsm: clean up dead code in gsm_queue() (git-fixes).
- tty: n_gsm: clean up implicit CR bit encoding in address field (git-fixes).
- tty: n_gsm: clean up indenting in gsm_queue() (git-fixes).
- tty: n_gsm: fix DM command (git-fixes).
- tty: n_gsm: fix broken virtual tty handling (git-fixes).
- tty: n_gsm: fix buffer over-read in gsm_dlci_data() (git-fixes).
- tty: n_gsm: fix deadlock and link starvation in outgoing data path (git-fixes).
- tty: n_gsm: fix decoupled mux resource (git-fixes).
- tty: n_gsm: fix encoding of command/response bit (git-fixes).
- tty: n_gsm: fix flow control handling in tx path (git-fixes).
- tty: n_gsm: fix frame reception handling (git-fixes).
- tty: n_gsm: fix incorrect UA handling (git-fixes).
- tty: n_gsm: fix insufficient txframe size (git-fixes).
- tty: n_gsm: fix invalid gsmtty_write_room() result (git-fixes).
- tty: n_gsm: fix invalid use of MSC in advanced option (git-fixes).
- tty: n_gsm: fix malformed counter for out of frame data (git-fixes).
- tty: n_gsm: fix missing corner cases in gsmld_poll() (git-fixes).
- tty: n_gsm: fix missing explicit ldisc flush (git-fixes).
- tty: n_gsm: fix missing mux reset on config change at responder (git-fixes).
- tty: n_gsm: fix missing timer to handle stalled links (git-fixes).
- tty: n_gsm: fix missing tty wakeup in convergence layer type 2 (git-fixes).
- tty: n_gsm: fix missing update of modem controls after DLCI open (git-fixes).
- tty: n_gsm: fix mux activation issues in gsm_config() (git-fixes).
- tty: n_gsm: fix mux cleanup after unregister tty device (git-fixes).
- tty: n_gsm: fix non flow control frames during mux flow off (git-fixes).
- tty: n_gsm: fix packet re-transmission without open control channel (git-fixes).
- tty: n_gsm: fix race condition in gsmld_write() (git-fixes).
- tty: n_gsm: fix reset fifo race condition (git-fixes).
- tty: n_gsm: fix resource allocation order in gsm_activate_mux() (git-fixes).
- tty: n_gsm: fix restart handling via CLD command (git-fixes).
- tty: n_gsm: fix sleep-in-atomic-context bug in gsm_control_send (git-fixes).
- tty: n_gsm: fix software flow control handling (git-fixes).
- tty: n_gsm: fix sometimes uninitialized warning in gsm_dlci_modem_output() (git-fixes).
- tty: n_gsm: fix tty registration before control channel open (git-fixes).
- tty: n_gsm: fix user open not possible at responder until initiator open (git-fixes).
- tty: n_gsm: fix wrong DLCI release order (git-fixes).
- tty: n_gsm: fix wrong T1 retry count handling (git-fixes).
- tty: n_gsm: fix wrong command frame length field encoding (git-fixes).
- tty: n_gsm: fix wrong command retry handling (git-fixes).
- tty: n_gsm: fix wrong queuing behavior in gsm_dlci_data_output() (git-fixes).
- tty: n_gsm: fix wrong signal octet encoding in convergence layer type 2 (git-fixes).
- tty: n_gsm: fix wrong signal octets encoding in MSC (git-fixes).
- tty: n_gsm: initialize more members at gsm_alloc_mux() (git-fixes).
- tty: n_gsm: replace kicktimer with delayed_work (git-fixes).
- tty: serial: Fix refcount leak bug in ucc_uart.c (git-fixes).
- tty: serial: atmel: Preserve previous USART mode if RS485 disabled (git-fixes).
- tty: serial: fsl_lpuart: correct the count of break characters (git-fixes).
- tty: serial: fsl_lpuart: disable dma rx/tx use flags in lpuart_dma_shutdown (git-fixes).
- tty: serial: fsl_lpuart: do not break the on-going transfer when global reset (git-fixes).
- tty: serial: lpuart: disable flow control while waiting for the transmit engine to complete (git-fixes).
- tty: vt: initialize unicode screen buffer (git-fixes).
- tty: xilinx_uartps: Fix the ignore_status (git-fixes).
- tun: avoid double free in tun_free_netdev (git-fixes).
- tunnels: do not assume mac header is set in skb_tunnel_check_pmtu() (git-fixes).
- tuntap: add sanity checks about msg_controllen in sendmsg (git-fixes).
- uaccess: fix type mismatch warnings from access_ok() (git-fixes).
- uas: add no-uas quirk for Hiksemi usb_disk (git-fixes).
- uas: ignore UAS for Thinkplus chips (git-fixes).
- ucounts: Base set_cred_ucounts changes on the real user (git-fixes).
- ucounts: Fix rlimit max values check (git-fixes).
- ucounts: Fix systemd LimitNPROC with private users regression (git-fixes).
- ucounts: Handle wrapping in is_ucounts_overlimit (git-fixes).
- ucounts: In set_cred_ucounts assume new->ucounts is non-NULL (git-fixes).
- udf: Fix crash after seekdir (bsc#1194592).
- udmabuf: Set the DMA mask for the udmabuf device (v2) (git-fixes).
- udmabuf: Set ubuf->sg = NULL if the creation of sg table fails (git-fixes).
- udmabuf: add back sanity check (git-fixes).
- units: Add SI metric prefix definitions (git-fixes).
- units: add the HZ macros (git-fixes).
- usb-storage: Add Hiksemi USB3-FW to IGNORE_UAS (git-fixes).
- usb-storage: Add ignore-residue quirk for NXP PN7462AU (git-fixes).
- usb.h: struct usb_device: hide new member (git-fixes).
- usb/hcd: Fix dma_map_sg error check (git-fixes).
- usb: Drop commas after SoC match table sentinels (git-fixes).
- usb: add NO_LPM quirk for Realforce 87U Keyboard (git-fixes).
- usb: add quirks for Lenovo OneLink+ Dock (git-fixes).
- usb: aspeed-vhub: Fix refcount leak bug in ast_vhub_init_desc() (git-fixes).
- usb: bdc: change state when port disconnected (git-fixes).
- usb: cdc-wdm: Use skb_put_data() instead of skb_put/memcpy pair (git-fixes).
- usb: cdns3 fix use-after-free at workaround 2 (git-fixes).
- usb: cdns3: Do not use priv_dev uninitialized in cdns3_gadget_ep_enable() (git-fixes).
- usb: cdns3: change place of 'priv_ep' assignment in cdns3_gadget_ep_dequeue(), cdns3_gadget_ep_enable() (git-fixes).
- usb: cdns3: fix incorrect handling TRB_SMM flag for ISOC transfer (git-fixes).
- usb: cdns3: fix issue with rearming ISO OUT endpoint (git-fixes).
- usb: cdns3: fix random warning message when driver load (git-fixes).
- usb: cdns3: host: fix endless superspeed hub port reset (git-fixes).
- usb: cdnsp: Fix issue with Clear Feature Halt Endpoint (git-fixes).
- usb: cdnsp: fix issue with ZLP - added TD_SIZE = 1 (git-fixes).
- usb: chipidea: fix deadlock in ci_otg_del_timer (git-fixes).
- usb: common: debug: Check non-standard control requests (git-fixes).
- usb: dwc2: fix wrong order of phy_power_on and phy_init (git-fixes).
- usb: dwc2: gadget: remove D+ pull-up while no vbus with usb-role-switch (git-fixes).
- usb: dwc3: core: Deprecate GCTL.CORESOFTRESET (git-fixes).
- usb: dwc3: core: Do not perform GCTL_CORE_SOFTRESET during bootup (git-fixes).
- usb: dwc3: core: Enable GUCTL1 bit 10 for fixing termination error after resume bug (git-fixes).
- usb: dwc3: core: leave default DMA if the controller does not support 64-bit DMA (git-fixes).
- usb: dwc3: disable USB core PHY management (git-fixes).
- usb: dwc3: dwc3-qcom: Add missing platform_device_put() in dwc3_qcom_acpi_register_core (git-fixes).
- usb: dwc3: dwc3-qcom: Fix typo in the dwc3 vbus override API (git-fixes).
- usb: dwc3: exynos: Fix remove() function (git-fixes).
- usb: dwc3: gadget: Avoid duplicate requests to enable Run/Stop (git-fixes).
- usb: dwc3: gadget: Avoid starting DWC3 gadget during UDC unbind (git-fixes).
- usb: dwc3: gadget: Clear ep descriptor last (git-fixes).
- usb: dwc3: gadget: Do not modify GEVNTCOUNT in pullup() (git-fixes).
- usb: dwc3: gadget: Do not set IMI for no_interrupt (git-fixes).
- usb: dwc3: gadget: Refactor pullup() (git-fixes).
- usb: dwc3: gadget: Return -ESHUTDOWN on ep disable (git-fixes).
- usb: dwc3: gadget: Stop processing more requests on IMI (git-fixes).
- usb: dwc3: gadget: conditionally remove requests (git-fixes).
- usb: dwc3: gadget: fix high speed multiplier setting (git-fixes).
- usb: dwc3: gadget: refactor dwc3_repare_one_trb (git-fixes).
- usb: dwc3: pci: Add support for Intel Raptor Lake (git-fixes).
- usb: dwc3: qcom: Add helper functions to enable,disable wake irqs (git-fixes).
- usb: dwc3: qcom: fix missing optional irq warnings (git-fixes).
- usb: dwc3: qcom: fix use-after-free on runtime-PM wakeup (git-fixes).
- usb: ehci: Fix a function name in comments (git-fixes).
- usb: gadget: bdc: fix typo in comment (git-fixes).
- usb: gadget: f_fs: stricter integer overflow checks (git-fixes).
- usb: gadget: f_uac2: clean up some inconsistent indenting (git-fixes).
- usb: gadget: f_uac2: fix superspeed transfer (git-fixes).
- usb: gadget: function: fix dangling pnp_string in f_printer.c (git-fixes).
- usb: gadget: mass_storage: Fix cdrom data transfers on MAC-OS (git-fixes).
- usb: gadget: tegra-xudc: Fix error check in tegra_xudc_powerdomain_init() (git-fixes).
- usb: gadget: udc-xilinx: replace memcpy with memcpy_toio (git-fixes).
- usb: gadget: udc: amd5536 depends on HAS_DMA (git-fixes).
- usb: gadget: uvc: call uvc uvcg_warn on completed status instead of uvcg_info (git-fixes).
- usb: host: Fix refcount leak in ehci_hcd_ppc_of_probe (git-fixes).
- usb: host: ohci-ppc-of: Fix refcount leak bug (git-fixes).
- usb: host: xhci-plat: suspend and resume clocks (git-fixes).
- usb: host: xhci-plat: suspend/resume clks for brcm (git-fixes).
- usb: host: xhci: Fix potential memory leak in xhci_alloc_stream_info() (git-fixes).
- usb: host: xhci: fix a comment typo in xhci_mem_init() (git-fixes).
- usb: host: xhci: use ffs() in xhci_mem_init() (git-fixes).
- usb: host: xhci: use snprintf() in xhci_decode_trb() (git-fixes).
- usb: hub: avoid warm port reset during USB3 disconnect (git-fixes).
- usb: idmouse: fix an uninit-value in idmouse_open (git-fixes).
- usb: mon: make mmapped memory read only (git-fixes).
- usb: mtu3: fix failed runtime suspend in host only mode (git-fixes).
- usb: musb: Fix musb_gadget.c rxstate overflow bug (git-fixes).
- usb: ohci-nxp: Fix refcount leak in ohci_hcd_nxp_probe (git-fixes).
- usb: renesas: Fix refcount leak bug (git-fixes).
- usb: smsc: use eth_hw_addr_set() (git-fixes).
- usb: storage: Add ASUS <0x0b05:0x1932> to IGNORE_UAS (git-fixes).
- usb: typec: altmodes/displayport: correct pin assignment for UFP receptacles (git-fixes).
- usb: typec: intel_pmc_mux: Add new ACPI ID for Meteor Lake IOM device (git-fixes).
- usb: typec: mux: Enter safe mode only when pins need to be reconfigured (git-fixes).
- usb: typec: tcpm: Return ENOTSUPP for power supply prop writes (git-fixes).
- usb: typec: tcpm: fix typo in comment (git-fixes).
- usb: typec: tipd: Add an additional overflow check (git-fixes).
- usb: typec: tipd: Do not read/write more bytes than required (git-fixes).
- usb: typec: ucsi: Acknowledge the GET_ERROR_STATUS command completion (git-fixes).
- usb: typec: ucsi: Remove incorrect warning (git-fixes).
- usb: xhci-mtk: check boundary before check tt (git-fixes).
- usb: xhci-mtk: relax TT periodic bandwidth allocation (git-fixes).
- usb: xhci-mtk: update fs bus bandwidth by bw_budget_table (git-fixes).
- usb: xhci: add XHCI_SPURIOUS_SUCCESS to ASM1042 despite being a V0.96 controller (git-fixes).
- usb: xhci: tegra: Fix error check (git-fixes).
- usbnet: Fix linkwatch use-after-free on disconnect (git-fixes).
- usbnet: Fix memory leak in usbnet_disconnect() (git-fixes).
- usbnet: Run unregister_netdev() before unbind() again (git-fixes).
- usbnet: smsc95xx: Avoid link settings race on interrupt reception (git-fixes).
- usbnet: smsc95xx: Do not clear read-only PHY interrupt (git-fixes).
- usbnet: smsc95xx: Do not reset PHY behind PHY driver's back (git-fixes).
- usbnet: smsc95xx: Fix deadlock on runtime resume (git-fixes).
- usbnet: smsc95xx: Forward PHY interrupts to PHY driver to avoid polling (git-fixes).
- userfaultfd/selftests: fix hugetlb area allocations (git-fixes).
- v3 of 'PCI: hv: Only reuse existing IRTE allocation for Multi-MSI'
- vboxguest: Do not use devm for irq (git-fixes).
- vdpa_sim: avoid putting an uninitialized iova_domain (git-fixes).
- venus: pm_helpers: Fix warning in OPP during probe (git-fixes).
- vfio/ccw: Do not change FSM state in subchannel event (git-fixes).
- vfio/ccw: Remove UUID from s390 debug log (git-fixes).
- vfio/type1: Unpin zero pages (git-fixes).
- vfio: Clear the caps->buf to NULL after free (git-fixes).
- vhost/vsock: Use kvmalloc/kvfree for larger packets (git-fixes).
- video/fbdev/stifb: Implement the stifb_fillrect() function (git-fixes).
- video: fbdev: amba-clcd: Fix refcount leak bugs (git-fixes).
- video: fbdev: arkfb: Check the size of screen before memset_io() (git-fixes).
- video: fbdev: arkfb: Fix a divide-by-zero bug in ark_set_pixclock() (git-fixes).
- video: fbdev: i740fb: Check the argument of i740_calc_vclk() (git-fixes).
- video: fbdev: i740fb: Error out if 'pixclock' equals zero (git-fixes).
- video: fbdev: pxa3xx-gcu: Fix integer overflow in pxa3xx_gcu_write (git-fixes).
- video: fbdev: s3fb: Check the size of screen before memset_io() (git-fixes).
- video: fbdev: sis: fix typos in SiS_GetModeID() (git-fixes).
- video: fbdev: vt8623fb: Check the size of screen before memset_io() (git-fixes).
- virt: Add SEV-SNP guest driver (jsc#SLE-19924, jsc#SLE-24814).
- virt: sevguest: Add documentation for SEV-SNP CPUID Enforcement (jsc#SLE-19924, jsc#SLE-24814).
- virt: sevguest: Add support to derive key (jsc#SLE-19924, jsc#SLE-24814).
- virt: sevguest: Add support to get extended report (jsc#SLE-19924, jsc#SLE-24814).
- virt: sevguest: Fix bool function returning negative value (jsc#SLE-19924, jsc#SLE-24814).
- virt: sevguest: Fix return value check in alloc_shared_pages() (jsc#SLE-19924, jsc#SLE-24814).
- virt: vbox: convert to use dev_groups (git-fixes).
- virtio-blk: Use blk_validate_block_size() to validate block size (git-fixes).
- virtio-gpu: fix a missing check to avoid NULL dereference (git-fixes).
- virtio-net: fix the race between refill work and close (git-fixes).
- virtio_net: fix memory leak inside XPD_TX with mergeable (git-fixes).
- vmxnet3: Implement ethtool's get_channels command (bsc#1200431).
- vmxnet3: Record queue number to incoming packets (bsc#1200431).
- vmxnet3: Remove useless DMA-32 fallback configuration (bsc#1200431).
- vmxnet3: add command to set ring buffer sizes (bsc#1200431).
- vmxnet3: add support for capability registers (bsc#1200431).
- vmxnet3: add support for large passthrough BAR register (bsc#1200431).
- vmxnet3: add support for out of order rx completion (bsc#1200431).
- vmxnet3: correctly report encapsulated LRO packet (git-fixes).
- vmxnet3: disable overlay offloads if UPT device does not support (bsc#1200431).
- vmxnet3: do not reschedule napi for rx processing (bsc#1200431).
- vmxnet3: limit number of TXDs used for TSO packet (bsc#1200431).
- vmxnet3: prepare for version 7 changes (bsc#1200431).
- vmxnet3: switch from 'pci_' to 'dma_' API (bsc#1200431).
- vmxnet3: update to version 7 (bsc#1200431).
- vmxnet3: use correct intrConf reference when using extended queues (git-fixes).
- vmxnet3: use ext1 field to indicate encapsulated packet (bsc#1200431).
- vrf: do not run conntrack on vrf with !dflt qdisc (git-fixes).
- vrf: fix packet sniffing for traffic originating from ip tunnels (git-fixes).
- vsock/virtio: enable VQs early on probe (git-fixes).
- vsock/virtio: initialize vdev->priv before using VQs (git-fixes).
- vsock/virtio: read the negotiated features before using VQs (git-fixes).
- vsock: Fix memory leak in vsock_connect() (git-fixes).
- vsock: Set socket state back to SS_UNCONNECTED in vsock_connect_timeout() (git-fixes).
- vsock: fix possible infinite sleep in vsock_connectible_wait_data() (git-fixes).
- vsock: remove the unused 'wait' in vsock_connectible_recvmsg() (git-fixes).
- vsock: remove vsock from connected table when connect is interrupted by a signal (git-fixes).
- vt: Clear selection before changing the font (git-fixes).
- watch-queue: remove spurious double semicolon (git-fixes).
- watch_queue: Fix missing locking in add_watch_to_object() (git-fixes).
- watch_queue: Fix missing rcu annotation (git-fixes).
- watchdog-export-lockup_detector_reconfigure.patch.
- watchdog/hpwdt: Include nmi.h only if CONFIG_HPWDT_NMI_DECODING (git-fixes).
- watchdog: armada_37xx_wdt: Fix .set_timeout callback (git-fixes).
- watchdog: armada_37xx_wdt: check the return value of devm_ioremap() in armada_37xx_wdt_probe() (git-fixes).
- watchdog: ftwdt010_wdt: fix test for platform_get_irq() failure (git-fixes).
- watchdog: sp5100_tco: Fix a memory leak of EFCH MMIO resource (git-fixes).
- watchdog: wdat_wdt: Set the min and max timeout values properly (bsc#1194023).
- watchqueue: make sure to serialize 'wqueue->defunct' properly (git-fixes).
- wifi: airo: do not assign -1 to unsigned char (git-fixes).
- wifi: ath10k: add peer map clean up for peer delete in ath10k_sta_state() (git-fixes).
- wifi: ath11k: Fix QCN9074 firmware boot on x86 (git-fixes).
- wifi: ath11k: avoid deadlock during regulatory update in ath11k_regd_update() (git-fixes).
- wifi: ath11k: fix number of VHT beamformee spatial streams (git-fixes).
- wifi: ath9k: avoid uninit memory read in ath9k_htc_rx_msg() (git-fixes).
- wifi: brcmfmac: fix invalid address access when enabling SCAN log level (git-fixes).
- wifi: brcmfmac: fix use-after-free bug in brcmf_netdev_start_xmit() (git-fixes).
- wifi: cfg80211/mac80211: reject bad MBSSID elements (git-fixes).
- wifi: cfg80211: debugfs: fix return type in ht40allow_map_read() (git-fixes).
- wifi: cfg80211: do not allow multi-BSSID in S1G (git-fixes).
- wifi: cfg80211: fix buffer overflow in elem comparison (git-fixes).
- wifi: cfg80211: fix ieee80211_data_to_8023_exthdr handling of small packets (git-fixes).
- wifi: cfg80211: fix memory leak in query_regdb_file() (git-fixes).
- wifi: cfg80211: silence a sparse RCU warning (git-fixes).
- wifi: cfg80211: update hidden BSSes to avoid WARN_ON (git-fixes).
- wifi: iwlegacy: 4965: corrected fix for potential off-by-one overflow in il4965_rs_fill_link_cmd() (git-fixes).
- wifi: iwlegacy: 4965: fix potential off-by-one overflow in il4965_rs_fill_link_cmd() (git-fixes).
- wifi: iwlwifi: mvm: fix double list_add at iwl_mvm_mac_wake_tx_queue (git-fixes).
- wifi: iwlwifi: mvm: fix double list_add at iwl_mvm_mac_wake_tx_queue (other cases) (git-fixes).
- wifi: libertas: Fix possible refcount leak in if_usb_probe() (git-fixes).
- wifi: mac80211: Do not finalize CSA in IBSS mode if state is disconnected (git-fixes).
- wifi: mac80211: Fix UAF in ieee80211_scan_rx() (git-fixes).
- wifi: mac80211: Fix ack frame idr leak when mesh has no route (git-fixes).
- wifi: mac80211: allow bw change during channel switch in mesh (git-fixes).
- wifi: mac80211: do not drop packets smaller than the LLC-SNAP header on fast-rx (git-fixes).
- wifi: mac80211: fix decap offload for stations on AP_VLAN interfaces (git-fixes).
- wifi: mac80211: fix memory free error when registering wiphy fail (git-fixes).
- wifi: mac80211: fix probe req HE capabilities access (git-fixes).
- wifi: mac80211: fix regression with non-QoS drivers (git-fixes).
- wifi: mac80211: limit A-MSDU subframes for client too (git-fixes).
- wifi: mac80211_hwsim: add back erroneously removed cast (git-fixes).
- wifi: mac80211_hwsim: avoid mac80211 warning on bad rate (git-fixes).
- wifi: mac80211_hwsim: check length for virtio packets (git-fixes).
- wifi: mac80211_hwsim: fix debugfs attribute ps with rc table support (git-fixes).
- wifi: mac80211_hwsim: fix race condition in pending packet (git-fixes).
- wifi: mac80211_hwsim: use 32-bit skb cookie (git-fixes).
- wifi: mac8021: fix possible oob access in ieee80211_get_rate_duration (git-fixes).
- wifi: mt76: fix reading current per-tid starting sequence number for aggregation (git-fixes).
- wifi: mt76: mt7615: add mt7615_mutex_acquire/release in mt7615_sta_set_decap_offload (git-fixes).
- wifi: mt76: mt7915: do not check state before configuring implicit beamform (git-fixes).
- wifi: mt76: mt7921: reset msta->airtime_ac while clearing up hw value (git-fixes).
- wifi: mt76: sdio: fix transmitting packet hangs (git-fixes).
- wifi: p54: Fix an error handling path in p54spi_probe() (git-fixes).
- wifi: p54: add missing parentheses in p54_flush() (git-fixes).
- wifi: rt2x00: correctly set BBP register 86 for MT7620 (git-fixes).
- wifi: rt2x00: do not run Rt5592 IQ calibration on MT7620 (git-fixes).
- wifi: rt2x00: set SoC wmac clock register (git-fixes).
- wifi: rt2x00: set VGC gain for both chains of MT7620 (git-fixes).
- wifi: rt2x00: set correct TX_SW_CFG1 MAC register for MT7620 (git-fixes).
- wifi: rtl8xxxu: Fix AIFS written to REG_EDCA_*_PARAM (git-fixes).
- wifi: rtl8xxxu: Fix skb misuse in TX queue selection (git-fixes).
- wifi: rtl8xxxu: Improve rtl8xxxu_queue_select (git-fixes).
- wifi: rtl8xxxu: Remove copy-paste leftover in gen2_update_rate_mask (git-fixes).
- wifi: rtl8xxxu: gen2: Fix mistake in path B IQ calibration (git-fixes).
- wifi: rtl8xxxu: tighten bounds checking in rtl8xxxu_read_efuse() (git-fixes).
- wifi: rtlwifi: 8192de: correct checking of IQK reload (git-fixes).
- wifi: rtlwifi: fix error codes in rtl_debugfs_set_write_h2c() (git-fixes).
- wifi: rtlwifi: remove always-true condition pointed out by GCC 12 (git-fies).
- wifi: rtw88: add missing destroy_workqueue() on error path in rtw_core_init() (git-fixes).
- wifi: rtw88: check the return value of alloc_workqueue() (git-fixes).
- wifi: rtw89: 8852a: rfk: fix div 0 exception (git-fixes).
- wifi: wext: use flex array destination for memcpy() (git-fixes).
- wifi: wil6210: debugfs: fix info leak in wil_write_file_wmi() (git-fixes).
- wifi: wil6210: debugfs: fix uninitialized variable use in `wil_write_file_wmi()` (git-fixes).
- wifi: wilc1000: validate length of IEEE80211_P2P_ATTR_CHANNEL_LIST attribute (git-fixes).
- wifi: wilc1000: validate length of IEEE80211_P2P_ATTR_OPER_CHANNEL attribute (git-fixes).
- wifi: wilc1000: validate number of channels (git-fixes).
- wifi: wilc1000: validate pairwise and authentication suite offsets (git-fixes).
- wireguard: device: check for metadata_dst with skb_valid_dst() (git-fixes).
- wireless: Remove redundant 'flush_workqueue()' calls (bsc#1202131).
- workqueue: do not skip lockdep work dependency in cancel_work_sync() (git-fixes).
- wwan_hwsim: fix possible memory leak in wwan_hwsim_dev_new() (git-fixes).
- x86/Hyper-V: Add SEV negotiate protocol support in Isolation VM (bsc#1190497).
- x86/Xen: streamline (and fix) PV CPU enumeration (git-fixes).
- x86/boot: Add Confidential Computing type to setup_data (jsc#SLE-19924, jsc#SLE-24814).
- x86/boot: Add a pointer to Confidential Computing blob in bootparams (jsc#SLE-19924, jsc#SLE-24814).
- x86/boot: Do not propagate uninitialized boot_params->cc_blob_address (bsc#1204970).
- x86/boot: Fix the setup data types max limit (bsc#1204970).
- x86/boot: Introduce helpers for MSR reads/writes (jsc#SLE-19924, jsc#SLE-24814).
- x86/boot: Put globals that are accessed early into the .data section (jsc#SLE-19924, jsc#SLE-24814).
- x86/boot: Use MSR read/write helpers instead of inline assembly (jsc#SLE-19924, jsc#SLE-24814).
- x86/bugs: Make sure MSR_SPEC_CTRL is updated properly upon resume from S3 (bsc#1206037).
- x86/compressed/64: Add identity mapping for Confidential Computing blob (jsc#SLE-19924, jsc#SLE-24814).
- x86/compressed/64: Add identity mappings for setup_data entries (bsc#1204970).
- x86/compressed/64: Add support for SEV-SNP CPUID table in #VC handlers (jsc#SLE-19924, jsc#SLE-24814).
- x86/compressed/64: Detect/setup SEV/SME features earlier during boot (jsc#SLE-19924, jsc#SLE-24814).
- x86/compressed/acpi: Move EFI config table lookup to helper (jsc#SLE-19924, jsc#SLE-24814).
- x86/compressed/acpi: Move EFI detection to helper (jsc#SLE-19924, jsc#SLE-24814).
- x86/compressed/acpi: Move EFI kexec handling into common code (jsc#SLE-19924, jsc#SLE-24814).
- x86/compressed/acpi: Move EFI system table lookup to helper (jsc#SLE-19924, jsc#SLE-24814).
- x86/compressed/acpi: Move EFI vendor table lookup to helper (jsc#SLE-19924, jsc#SLE-24814).
- x86/compressed: Add SEV-SNP feature detection/setup (jsc#SLE-19924, jsc#SLE-24814).
- x86/compressed: Add helper for validating pages in the decompression stage (jsc#SLE-19924, jsc#SLE-24814).
- x86/compressed: Export and rename add_identity_map() (jsc#SLE-19924, jsc#SLE-24814).
- x86/compressed: Register GHCB memory when SEV-SNP is active (jsc#SLE-19924, jsc#SLE-24814).
- x86/compressed: Use firmware-validated CPUID leaves for SEV-SNP guests (jsc#SLE-19924, jsc#SLE-24814).
- x86/cpu: Restore AMD's DE_CFG MSR after resume (bsc#1205473).
- x86/entry: Work around Clang __bdos() bug (git-fixes).
- x86/extable: Extend extable functionality (git-fixes).
- x86/fpu: Drop fpregs lock before inheriting FPU permissions (bnc#1205282).
- x86/futex: Remove .fixup usage (git-fixes).
- x86/head/64: Re-enable stack protection (jsc#SLE-19924, jsc#SLE-24814).
- x86/hyperv: Disable hardlockup detector by default in Hyper-V guests (git-fixes).
- x86/hyperv: Fix 'struct hv_enlightened_vmcs' definition (git-fixes).
- x86/hyperv: Update 'struct hv_enlightened_vmcs' definition (git-fixes).
- x86/hyperv: fix invalid writes to MSRs during root partition kexec (git-fixes).
- x86/ibt,ftrace: Make function-graph play nice (bsc#1203969).
- x86/kernel: Mark the .bss..decrypted section as shared in the RMP table (jsc#SLE-19924, jsc#SLE-24814).
- x86/kernel: Validate ROM memory before accessing when SEV-SNP is active (jsc#SLE-19924, jsc#SLE-24814).
- x86/kexec: Fix double-free of elf header buffer (bsc#1205567).
- x86/kexec: fix memory leak of elf header buffer (bsc#1196444).
- x86/microcode/AMD: Apply the patch early on every logical thread (bsc#1205264).
- x86/mm: Extend cc_attr to include AMD SEV-SNP (jsc#SLE-19924, jsc#SLE-24814).
- x86/mm: Validate memory when changing the C-bit (jsc#SLE-19924, jsc#SLE-24814).
- x86/olpc: fix 'logical not is only applied to the left hand side' (git-fixes).
- x86/retbleed: Add fine grained Kconfig knobs (bsc#1190497).
- x86/sev: Add SEV-SNP feature detection/setup (jsc#SLE-19924, jsc#SLE-24814).
- x86/sev: Add a helper for the PVALIDATE instruction (jsc#SLE-19924, jsc#SLE-24814).
- x86/sev: Add a sev= cmdline option (jsc#SLE-19924, jsc#SLE-24814).
- x86/sev: Add helper for validating pages in early enc attribute changes (jsc#SLE-19924, jsc#SLE-24814).
- x86/sev: Add missing __init annotations to SEV init routines (jsc#SLE-19924 jsc#SLE-24814).
- x86/sev: Annotate stack change in the #VC handler (bsc#1204970).
- x86/sev: Check SEV-SNP features support (jsc#SLE-19924, jsc#SLE-24814).
- x86/sev: Check the VMPL level (jsc#SLE-19924, jsc#SLE-24814).
- x86/sev: Define the Linux-specific guest termination reasons (bsc#1190497).
- x86/sev: Detect/setup SEV/SME features earlier in boot (jsc#SLE-19924, jsc#SLE-24814).
- x86/sev: Do not use cc_platform_has() for early SEV-SNP calls (bsc#1204970).
- x86/sev: Get the AP jump table address from secrets page (jsc#SLE-19924, jsc#SLE-24814).
- x86/sev: Move MSR-based VMGEXITs for CPUID to helper (jsc#SLE-19924, jsc#SLE-24814).
- x86/sev: Provide support for SNP guest request NAEs (jsc#SLE-19924, jsc#SLE-24814).
- x86/sev: Register GHCB memory when SEV-SNP is active (jsc#SLE-19924, jsc#SLE-24814).
- x86/sev: Register SEV-SNP guest request platform device (jsc#SLE-19924, jsc#SLE-24814).
- x86/sev: Remove duplicated assignment to variable info (bsc#1204970).
- x86/sev: Save the negotiated GHCB version (bsc#1190497).
- x86/sev: Use SEV-SNP AP creation to start secondary CPUs (jsc#SLE-19924, jsc#SLE-24814).
- x86/sev: Use firmware-validated CPUID for SEV-SNP guests (jsc#SLE-19924, jsc#SLE-24814).
- x86/uaccess: Implement macros for CMPXCHG on user addresses (git-fixes).
- x86/xen: Remove undefined behavior in setup_features() (git-fixes).
- xen-blkback: Advertise feature-persistent as user requested (git-fixes).
- xen-blkback: Apply 'feature_persistent' parameter when connect (git-fixes).
- xen-blkback: fix persistent grants negotiation (git-fixes).
- xen-blkfront: Advertise feature-persistent as user requested (git-fixes).
- xen-blkfront: Apply 'feature_persistent' parameter when connect (git-fixes).
- xen-blkfront: Cache feature_persistent value before advertisement (git-fixes).
- xen-blkfront: Handle NULL gendisk (git-fixes).
- xen-netback: only remove 'hotplug-status' when the vif is actually destroyed (git-fixes).
- xen/gntdev: Accommodate VMA splitting (git-fixes).
- xen/gntdev: Avoid blocking in unmap_grant_pages() (git-fixes).
- xen/gntdev: Ignore failure to unmap INVALID_GRANT_HANDLE (git-fixes).
- xen/gntdev: Prevent leaking grants (git-fixes).
- xen/gntdev: fix unmap notification order (git-fixes).
- xen/grants: prevent integer overflow in gnttab_dma_alloc_pages() (git-fixes).
- xen/pcpu: fix possible memory leak in register_pcpu() (git-fixes).
- xen/privcmd: fix error exit of privcmd_ioctl_dm_op() (git-fixes).
- xen/usb: do not use arbitrary_virt_to_machine() (git-fixes).
- xen/xenbus: fix return type in xenbus_file_read() (git-fixes).
- xen: delay xen_hvm_init_time_ops() if kdump is boot on vcpu>=32 (git-fixes).
- xen: detect uninitialized xenbus in xenbus_init (git-fixes).
- xen: do not continue xenstore initialization in case of errors (git-fixes).
- xfs: Fix the free logic of state in xfs_attr_node_hasname (git-fixes).
- xfs: check sb_meta_uuid for dabuf buffer recovery (git-fixes).
- xfs: convert XLOG_FORCED_SHUTDOWN() to xlog_is_shutdown() (git-fixes).
- xfs: fix perag reference leak on iteration race with growfs (git-fixes).
- xfs: fix soft lockup via spinning in filestream ag selection loop (git-fixes).
- xfs: fix use-after-free in xattr node block inactivation (git-fixes).
- xfs: fix xfs_ifree() error handling to not leak perag ref (git-fixes).
- xfs: fold perag loop iteration logic into helper function (git-fixes).
- xfs: make xfs_rtalloc_query_range input parameters const (git-fixes).
- xfs: only bother with sync_filesystem during readonly remount (git-fixes).
- xfs: prevent UAF in xfs_log_item_in_current_chkpt (git-fixes).
- xfs: prevent a UAF when log IO errors race with unmount (git-fixes).
- xfs: remove incorrect ASSERT in xfs_rename (git-fixes).
- xfs: rename the next_agno perag iteration variable (git-fixes).
- xfs: reorder iunlink remove operation in xfs_ifree (git-fixes).
- xfs: reserve quota for dir expansion when linking/unlinking files (bsc#1205616).
- xfs: reserve quota for target dir expansion when renaming files (bsc#1205679).
- xfs: revert 'xfs: actually bump warning counts when we send warnings' (git-fixes).
- xfs: terminate perag iteration reliably on agcount (git-fixes).
- xfs: use invalidate_lock to check the state of mmap_lock (git-fixes).
- xfs: use kmem_cache_free() for kmem_cache objects (git-fixes).
- xfs: use setattr_copy to set vfs inode attributes (git-fixes).
- xhci-pci: Set runtime PM as default policy on all xHC 1.2 or later devices (git-fixes).
- xhci: Add quirk to reset host back to default state at shutdown (git-fixes).
- xhci: Allocate separate command structures for each LPM command (git-fixes).
- xhci: Do not show warning for reinit on known broken suspend (git-fixes).
- xhci: Remove device endpoints from bandwidth list when freeing the device (git-fixes).
- xhci: Set HCD flag to defer primary roothub registration (git-fixes).
- xhci: dbc: Fix memory leak in xhci_alloc_dbc() (git-fixes).
- xhci: dbc: Rename xhci_dbc_init and xhci_dbc_exit (git-fixes).
- xhci: dbc: create and remove dbc structure in dbgtty driver (git-fixes).
- xhci: dbc: refactor xhci_dbc_init() (git-fixes).
- xprtrdma: fix pointer derefs in error cases of rpcrdma_ep_create (git-fixes).
- xprtrdma: treat all calls not a bcall when bc_serv is NULL (git-fixes).
- zonefs: Clear inode information flags on inode creation (git-fixes).
- zonefs: Fix management of open zones (git-fixes).
- zonefs: add MODULE_ALIAS_FS (git-fixes).
    Patchnames
SUSE-2022-4617,SUSE-SLE-Micro-5.3-2022-4617,SUSE-SLE-Module-Live-Patching-15-SP4-2022-4617,SUSE-SLE-Module-RT-15-SP4-2022-4617,openSUSE-Leap-Micro-5.3-2022-4617,openSUSE-SLE-15.4-2022-4617
    Terms of use
CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).
    {
  "document": {
    "aggregate_severity": {
      "namespace": "https://www.suse.com/support/security/rating/",
      "text": "important"
    },
    "category": "csaf_security_advisory",
    "csaf_version": "2.0",
    "distribution": {
      "text": "Copyright 2024 SUSE LLC. All rights reserved.",
      "tlp": {
        "label": "WHITE",
        "url": "https://www.first.org/tlp/"
      }
    },
    "lang": "en",
    "notes": [
      {
        "category": "summary",
        "text": "Security update for the Linux Kernel",
        "title": "Title of the patch"
      },
      {
        "category": "description",
        "text": "The SUSE Linux Enterprise 15 SP4 RT kernel was updated to receive various security and bugfixes.\n\n\nThe following security bugs were fixed:\n\n- CVE-2022-4378: Fixed stack overflow in __do_proc_dointvec (bsc#1206207).\n- CVE-2022-42328: Guests could trigger denial of service via the netback driver (bsc#1206114).\n- CVE-2022-42329: Guests could trigger denial of service via the netback driver (bsc#1206113).\n- CVE-2022-3643: Guests could trigger NIC interface reset/abort/crash via netback driver (bsc#1206113).\n- CVE-2022-3633: Fixed a memory leak in j1939_session_destroy of the file net/can/j1939/transport.c (bsc#1204650).\n- CVE-2022-3114: Fixed a denial of service in imx_register_uart_clocks() in drivers/clk/imx/clk.c (bsc#1206391).\n- CVE-2022-3619: Fixed a memory leak in l2cap_recv_acldata of the file net/bluetooth/l2cap_core.c (bsc#1204569).\n- CVE-2022-3635: Fixed a use-after-free in the tst_timer() of the file drivers/atm/idt77252.c (bsc#1204631).\n- CVE-2022-41850: Fixed a race condition in roccat_report_event() in drivers/hid/hid-roccat.c (bsc#1203960).\n- CVE-2022-45934: Fixed a integer wraparound via L2CAP_CONF_REQ packets in l2cap_config_req in net/bluetooth/l2cap_core.c (bsc#1205796).\n- CVE-2022-3567: Fixed a to race condition in inet6_stream_ops()/inet6_dgram_ops() (bsc#1204414).\n- CVE-2022-41858: Fixed a denial of service in sl_tx_timeout() in drivers/net/slip (bsc#1205671).\n- CVE-2022-43945: Fixed a buffer overflow in the NFSD implementation (bsc#1205128).\n- CVE-2022-4095: Fixed a use-after-free in rtl8712 driver (bsc#1205514).\n- CVE-2022-3903: Fixed a denial of service with the Infrared Transceiver USB driver (bsc#1205220).\n- CVE-2022-42896: Fixed a use-after-free vulnerability in the net/bluetooth/l2cap_core.c\u0027s l2cap_connect() and l2cap_le_connect_req() which may have allowed code execution and leaking kernel memory (respectively) remotely via Bluetooth (bsc#1205709).\n- CVE-2022-42895: Fixed an information leak in the net/bluetooth/l2cap_core.c\u0027s l2cap_parse_conf_req() which can be used to leak kernel pointers remotely (bsc#1205705).\n- CVE-2022-3424: Fixed use-after-free in gru_set_context_option(), gru_fault() and gru_handle_user_call_os() that could lead to kernel panic (bsc#1204166).\n- CVE-2022-3628: Fixed potential buffer overflow in brcmf_fweh_event_worker() in wifi/brcmfmac (bsc#1204868).\n- CVE-2022-2964: Fixed memory corruption issues in ax88179_178a devices (bsc#1202686).\n- CVE-2021-4037: Fixed function logic vulnerability that allowed local users to create files for the XFS file-system with an unintended group ownership and with group execution and SGID permission bits set (bsc#1198702).\n- CVE-2022-43750: Fixed vulnerability in usbmon that allowed a user-space client to corrupt the monitor\u0027s internal memory (bsc#1204653).\n- CVE-2022-3542: Fixed memory leak in bnx2x_tpa_stop() in drivers/net/ethernet/broadcom/bnx2x/bnx2x_cmn.c (bsc#1204402).\n- CVE-2022-3629: Fixed memory leak in vsock_connect() in net/vmw_vsock/af_vsock.c (bsc#1204635).\n- CVE-2022-3646: Fixed memory leak in nilfs_attach_log_writer() in fs/nilfs2/segment.c (bsc#1204646).\n- CVE-2022-3649: Fixed use-after-free in nilfs_new_inode() in fs/nilfs2/inode.c (bsc#1204647).\n- CVE-2022-3621: Fixed null pointer dereference in nilfs_bmap_lookup_at_level() in fs/nilfs2/inode.c (bsc#1204574).\n- CVE-2022-3594: Fixed excessive data logging in intr_callback() in drivers/net/usb/r8152.c (bsc#1204479).\n- CVE-2022-3586: Fixed use-after-free in socket buffer (SKB) that could allow a local unprivileged user to cause a denial of service (bsc#1204439).\n- CVE-2022-3565: Fixed use-after-free in del_timer() in drivers/isdn/mISDN/l1oip_core.c (bsc#1204431).\n- CVE-2022-3524: Fixed memory leak in ipv6_renew_options() in the IPv6 handler (bsc#1204354).\n- CVE-2022-40768: Fixed information leak in the scsi driver which allowed local users to obtain sensitive information from kernel memory (bsc#1203514).\n- CVE-2022-42703: Fixed use-after-free in mm/rmap.c related to leaf anon_vma double reuse (bsc#1204168).\n- CVE-2022-3169: Fixed an denial of service though request to NVME_IOCTL_RESET and NVME_IOCTL_SUBSYS_RESET (bsc#1203290).\n- CVE-2022-3545: Fixed a use-after-free vulnerability is area_cache_get() of the file drivers/net/ethernet/netronome/nfp/nfpcore/nfp_cppcore.c (bsc#1204415).\n- CVE-2022-3521: Fixed a race condition in kcm_tx_work() of the file net/kcm/kcmsock.c (bsc#1204355).\n- CVE-2022-2153: Fixed a NULL pointer dereference in KVM when attempting to set a SynIC IRQ (bsc#1200788).\n- CVE-2022-33981: Fixed a denial of service, because of a concurrency use-after-free flaw after deallocating raw_cmd in the raw_cmd_ioctl function (bsc#1200692).\n- CVE-2022-45869: Fixed a race condition in the x86 KVM subsystem which could cause a denial of service (bsc#1205882).\n- CVE-2022-45888: Fixed a use-after-free during physical removal of a USB devices when using drivers/char/xillybus/xillyusb.c (bsc#1205764).\n- CVE-2022-4139: Fixed an issue with the i915 driver that allowed the GPU to access any physical memory (bsc#1205700).\n- CVE-2022-4129: Fixed a denial of service with the Layer 2 Tunneling Protocol (L2TP). A missing lock when clearing sk_user_data can lead to a race condition and NULL pointer dereference. (bsc#1205711)\n- CVE-2022-3566: Fixed a race condition in the functions tcp_getsockopt/tcp_setsockopt. The manipulation leads to a race condition (bsc#1204405).\n- CVE-2022-2602: Fixed a local privilege escalation vulnerability involving Unix socket Garbage Collection and io_uring (bsc#1204228).\n- CVE-2022-3176: Fixed a use-after-free in io_uring related to signalfd_poll() and binder_poll() (bsc#1203391).\n- CVE-2022-3707: Fixed a double free in the Intel GVT-g graphics driver (bsc#1204780).\n- CVE-2022-3625: Fixed a user-after-free vulnerability in devlink_param_set/devlink_param_get of the file net/core/devlink.c (bsc#1204637).\n- CVE-2022-3535: Fixed a memory leak in mvpp2_dbgfs_port_init of the file drivers/net/ethernet/marvell/mvpp2/mvpp2_debugfs.c (bsc#1204417).\n- CVE-2022-39189: Fixed an issue were an unprivileged guest users can compromise the guest kernel because TLB flush operations were mishandled in certain KVM_VCPU_PREEMPTED situations (bsc#1203066).\n- CVE-2022-3577: Fixed an out-of-bounds memory write in bigben_probe of drivers/hid/hid-bigbenff.c (bsc#1204470).\n- CVE-2022-2978: Fixed a use-after-free in the NILFS file system (bsc#1202700).\n- CVE-2022-1184: Fixed a use-after-free and memory errors in ext4 when mounting and operating on a corrupted image (bsc#1198577).\n- CVE-2022-1263: Fixed a NULL pointer dereference issue was found in KVM when releasing a vCPU with dirty ring support enabled. This flaw allowed an unprivileged local attacker on the host to issue specific ioctl calls, causing a kernel oops condition that results in a denial of service (bsc#1198189).\n- CVE-2022-1882: Fixed a use-after-free flaw in free_pipe_info() that could allow a local user to crash or potentially escalate their privileges on the system (bsc#1199904).\n- CVE-2022-20369: Fixed possible out of bounds write due to improper input validation in v4l2_m2m_querybuf of v4l2-mem2mem.c (bsc#1202347).\n- CVE-2022-2586: Fixed a use-after-free which can be triggered when a nft table is deleted (bsc#1202095).\n- CVE-2022-2588: Fixed use-after-free in cls_route (bsc#1202096).\n- CVE-2022-26373: Fixed CPU information leak via post-barrier RSB predictions (bsc#1201726).\n- CVE-2022-2639: Fixed integer underflow that could lead to out-of-bounds write in reserve_sfa_size() (bsc#1202154).\n- CVE-2022-2663: Fixed an issue which allowed a firewall to be bypassed when users are using unencrypted IRC with nf_conntrack_irc configured (bsc#1202097).\n- CVE-2022-20368: Fixed slab-out-of-bounds access in packet_recvmsg() (bsc#1202346).\n- CVE-2022-28356: Fixed a refcount bug in llc_ui_bind and llc_ui_autobind which could allow an unprivileged user to execute a denial of service. (bsc#1197391)\n- CVE-2022-2873: Fixed an out-of-bounds memory access flaw that was found in iSMT SMBus host controller driver (bsc#1202558).\n- CVE-2022-2905: Fixed tnum_range usage on array range checking for poke descriptors (bsc#1202860).\n- CVE-2022-2938: Fixed a flaw that was found inside the Pressure Stall Information implementation that could have been used to allow an attacker to crash the system or have other memory-corruption side effects (bsc#1202623).\n- CVE-2022-2959: Fixed a race condition that was found inside the watch queue due to a missing lock in pipe_resize_ring() (bsc#1202681).\n- CVE-2022-2977: Fixed reference counting for struct tpm_chip (bsc#1202672).\n- CVE-2022-3028: Fixed a race condition that was found in the IP framework for transforming packets (XFRM subsystem) when multiple calls to xfrm_probe_algs occurred simultaneously (bsc#1202898).\n- CVE-2022-3078: Fixed a lack of check after calling vzalloc() and lack of free after allocation in drivers/media/test-drivers/vidtv/vidtv_s302m.c (bsc#1203041).\n- CVE-2022-3202: Fixed a NULL pointer dereference flaw in Journaled File System. This could allow a local attacker to crash the system or leak kernel internal information (bsc#1203389).\n- CVE-2022-32250: Fixed user-after-free in net/netfilter/nf_tables_api.c that could allow local privilege escalation (bsc#1200015).\n- CVE-2022-32296: Fixed vulnerability where TCP servers were allowed to identify clients by observing what source ports are used (bsc#1200288).\n- CVE-2022-3239: Fixed an use-after-free in the video4linux driver that could lead a local user to able to crash the system or escalate their privileges (bsc#1203552).\n- CVE-2022-3303: Fixed a race condition in the sound subsystem due to improper locking (bsc#1203769).\n- CVE-2022-3435: Fixed an out-of-bounds read in fib_nh_match() of the file net/ipv4/fib_semantics.c (bsc#1204171).\n- CVE-2022-3526: Fixed a memory leak in macvlan_handle_frame() from drivers/net/macvlan.c (bsc#1204353).\n- CVE-2022-3640: Fixed use-after-free in l2cap_conn_del() in net/bluetooth/l2cap_core.c (bsc#1204619).\n- CVE-2022-36879: Fixed an issue in xfrm_expand_policies in net/xfrm/xfrm_policy.c where a refcount could be dropped twice (bsc#1201948).\n- CVE-2022-36946: Fixed a denial of service inside nfqnl_mangle in net/netfilter/nfnetlink_queue.c (bsc#1201940).\n- CVE-2022-39188: Fixed race condition in include/asm-generic/tlb.h where a device driver can free a page while it still has stale TLB entries (bsc#1203107).\n- CVE-2022-39190: Fixed an issue that was discovered in net/netfilter/nf_tables_api.c and could cause a denial of service upon binding to an already bound chain (bsc#1203117).\n- CVE-2022-40476: Fixed a null pointer dereference in fs/io_uring.c (bsc#1203435).\n- CVE-2022-41218: Fixed an use-after-free caused by refcount races in drivers/media/dvb-core/dmxdev.c (bsc#1202960).\n- CVE-2022-41674: Fixed a DoS issue where kernel can crash on the reception of specific WiFi Frames (bsc#1203770).\n- CVE-2022-41848: Fixed a race condition and resultant use-after-free if a physically proximate attacker removes a PCMCIA device while calling ioctl (bsc#1203987).\n- CVE-2022-41849: Fixed a race condition and resultant use-after-free if a physically proximate attacker removes a USB device while calling open (bsc#1203992).\n- CVE-2022-42719: Fixed remote code execution with wlan frames when parsing a multi-BSSID element (bsc#1204051).\n- CVE-2022-42720: Fixed remote code execution due to refcounting bugs (bsc#1204059).\n- CVE-2022-42721: Fixed remote code execution due list corruption in the wlan stack (bsc#1204060).\n- CVE-2022-42722: Fixed crash in beacon protection for P2P-device. (bsc#1204125)\n- CVE-2021-33135: Fixed uncontrolled resource consumption inside Intel(R) SGX that may have allowed an authenticated user to potentially enable denial of service via local access (bsc#1199515).\n- CVE-2020-16119: Fixed a use-after-free vulnerability exploitable by a local attacker due to reuse of a DCCP socket. (bsc#1177471)\n- CVE-2020-36516: Fixed an issue in the mixed IPID assignment method where an attacker was able to inject data into or terminate a victim\u0027s TCP session (bsc#1196616).\n- CVE-2016-3695: Fixed an issue inside the einj_error_inject function in drivers/acpi/apei/einj.c that allowed users to simulate hardware errors and consequently cause a denial of service (bsc#1023051).\n\nThe following non-security bugs were fixed:\n\n- 9p: Fix refcounting during full path walks for fid lookups (git-fixes).\n- 9p: fix fid refcount leak in v9fs_vfs_atomic_open_dotl (git-fixes).\n- 9p: fix fid refcount leak in v9fs_vfs_get_link (git-fixes).\n- ACPI / scan: Create platform device for CS35L41 (bsc#1203699).\n- ACPI: APEI: Better fix to avoid spamming the console with old error logs (git-fixes).\n- ACPI: APEI: Fix integer overflow in ghes_estatus_pool_init() (git-fixes).\n- ACPI: APEI: do not add task_work to kernel thread to avoid memory leak (git-fixes).\n- ACPI: APEI: explicit init of HEST and GHES in apci_init() (git-fixes).\n- ACPI: CPPC: Do not prevent CPPC from working in the future (git-fixes).\n- ACPI: EC: Drop the EC_FLAGS_IGNORE_DSDT_GPE quirk (git-fixes).\n- ACPI: EC: Remove duplicate ThinkPad X1 Carbon 6th entry from DMI quirks (git-fixes).\n- ACPI: HMAT: Fix initiator registration for single-initiator systems (git-fixes).\n- ACPI: HMAT: Release platform device in case of platform_device_add_data() fails (git-fixes).\n- ACPI: HMAT: remove unnecessary variable initialization (git-fixes).\n- ACPI: LPSS: Fix missing check in register_device_clock() (git-fixes).\n- ACPI: PM: save NVS memory for Lenovo G40-45 (git-fixes).\n- ACPI: VIOT: Fix ACS setup (git-fixes).\n- ACPI: extlog: Handle multiple records (git-fixes).\n- ACPI: processor idle: Practically limit \u0027Dummy wait\u0027 workaround to old Intel systems (bsc#1203767).\n- ACPI: processor/idle: Annotate more functions to live in cpuidle section (git-fixes).\n- ACPI: processor: Remove freq Qos request for all CPUs (git-fixes).\n- ACPI: property: Return type of acpi_add_nondev_subnodes() should be bool (git-fixes).\n- ACPI: resource: skip IRQ override on AMD Zen platforms (git-fixes).\n- ACPI: scan: Add CLSA0101 Laptop Support (bsc#1203699).\n- ACPI: scan: Add LATT2021 to acpi_ignore_dep_ids[] (git-fixes).\n- ACPI: tables: FPDT: Do not call acpi_os_map_memory() on invalid phys address (git-fixes).\n- ACPI: thermal: drop an always true check (git-fixes).\n- ACPI: utils: Add api to read _SUB from ACPI (bsc#1203699).\n- ACPI: video: Add Toshiba Satellite/Portege Z830 quirk (git-fixes).\n- ACPI: video: Force backlight native for some TongFang devices (git-fixes).\n- ACPI: video: Make backlight class device registration a separate step (v2) (git-fixes).\n- ACPI: video: Shortening quirk list by identifying Clevo by board_name only (git-fixes).\n- ACPI: x86: Add a quirk for Dell Inspiron 14 2-in-1 for StorageD3Enable (git-fixes).\n- ACPI: x86: Add another system to quirk list for forcing StorageD3Enable (git-fixes).\n- ALSA: Use del_timer_sync() before freeing timer (git-fixes).\n- ALSA: ac97: fix possible memory leak in snd_ac97_dev_register() (git-fixes).\n- ALSA: aloop: Fix random zeros in capture data when using jiffies timer (git-fixes).\n- ALSA: aoa: Fix I2S device accounting (git-fixes).\n- ALSA: aoa: i2sbus: fix possible memory leak in i2sbus_add_dev() (git-fixes).\n- ALSA: asihpi - Remove useless code in hpi_meter_get_peak() (git-fixes).\n- ALSA: au88x0: use explicitly signed char (git-fixes).\n- ALSA: bcd2000: Fix a UAF bug on the error path of probing (git-fixes).\n- ALSA: core: Fix double-free at snd_card_new() (git-fixes).\n- ALSA: cs35l41: Check hw_config before using it (bsc#1203699).\n- ALSA: cs35l41: Enable Internal Boost in shared lib (bsc#1203699).\n- ALSA: cs35l41: Move cs35l41_gpio_config to shared lib (bsc#1203699).\n- ALSA: cs35l41: Unify hardware configuration (bsc#1203699).\n- ALSA: dice: fix regression for Lexicon I-ONIX FW810S (git-fixes).\n- ALSA: dmaengine: increment buffer pointer atomically (git-fixes).\n- ALSA: emu10k1: Fix out of bounds access in snd_emu10k1_pcm_channel_alloc() (git-fixes).\n- ALSA: hda/ca0132: add quirk for EVGA Z390 DARK (git-fixes).\n- ALSA: hda/cirrus - support for iMac 12,1 model (git-fixes).\n- ALSA: hda/conexant: Add quirk for LENOVO 20149 Notebook model (git-fixes).\n- ALSA: hda/conexant: add a new hda codec SN6140 (git-fixes).\n- ALSA: hda/cs8409: Add Speaker Playback Switch for Cyborg (bsc#1203699).\n- ALSA: hda/cs8409: Add Speaker Playback Switch for Warlock (bsc#1203699).\n- ALSA: hda/cs8409: Add new Dolphin HW variants (bsc#1203699).\n- ALSA: hda/cs8409: Disable HSBIAS_SENSE_EN for Cyborg (bsc#1203699).\n- ALSA: hda/cs8409: Fix Full Scale Volume setting for all variants (bsc#1203699).\n- ALSA: hda/cs8409: Fix Warlock to use mono mic configuration (bsc#1203699).\n- ALSA: hda/cs8409: Re-order quirk table into ascending order (bsc#1203699).\n- ALSA: hda/cs8409: Support manual mode detection for CS42L42 (bsc#1203699).\n- ALSA: hda/cs8409: Support new Dolphin Variants (bsc#1203699).\n- ALSA: hda/cs8409: Support new Odin Variants (bsc#1203699).\n- ALSA: hda/cs8409: Support new Warlock MLK Variants (bsc#1203699).\n- ALSA: hda/cs8409: Use general cs42l42 include in cs8409 hda driver (bsc#1203699).\n- ALSA: hda/cs8409: change cs8409_fixups v.pins initializers to static (bsc#1203699).\n- ALSA: hda/cs_dsp_ctl: Fix mutex inversion when creating controls (bsc#1203699).\n- ALSA: hda/hdmi - enable runtime pm for more AMD display audio (git-fixes).\n- ALSA: hda/hdmi: Do not skip notification handling during PM operation (git-fixes).\n- ALSA: hda/hdmi: Fix the converter allocation for the silent stream (git-fixes).\n- ALSA: hda/hdmi: Fix the converter reuse for the silent stream (git-fixes).\n- ALSA: hda/hdmi: change type for the \u0027assigned\u0027 variable (git-fixes).\n- ALSA: hda/realtek: Add CS35L41 support for Thinkpad laptops (bsc#1203699).\n- ALSA: hda/realtek: Add Intel Reference SSID to support headset keys (git-fixes).\n- ALSA: hda/realtek: Add Positivo C6300 model quirk (git-fixes).\n- ALSA: hda/realtek: Add a quirk for HP OMEN 15 (8786) mute LED (git-fixes).\n- ALSA: hda/realtek: Add a quirk for HP OMEN 16 (8902) mute LED (git-fixes).\n- ALSA: hda/realtek: Add another HP ZBook G9 model quirks (bsc#1203699).\n- ALSA: hda/realtek: Add mute and micmut LED support for Zbook Fury 17 G9 (bsc#1203699).\n- ALSA: hda/realtek: Add pincfg for ASUS G513 HP jack (git-fixes).\n- ALSA: hda/realtek: Add pincfg for ASUS G533Z HP jack (git-fixes).\n- ALSA: hda/realtek: Add quirk for ASUS GA503R laptop (git-fixes).\n- ALSA: hda/realtek: Add quirk for ASUS GV601R laptop (git-fixes).\n- ALSA: hda/realtek: Add quirk for ASUS Zenbook using CS35L41 (bsc#1203922).\n- ALSA: hda/realtek: Add quirk for ASUS Zenbook using CS35L41 (git-fixes).\n- ALSA: hda/realtek: Add quirk for Clevo NS50PU, NS70PU (git-fixes).\n- ALSA: hda/realtek: Add quirk for Clevo NV45PZ (git-fixes).\n- ALSA: hda/realtek: Add quirk for HP Spectre x360 15-eb0xxx (git-fixes).\n- ALSA: hda/realtek: Add quirk for HP Zbook Firefly 14 G9 model (bsc#1203699).\n- ALSA: hda/realtek: Add quirk for Huawei WRT-WX9 (git-fixes).\n- ALSA: hda/realtek: Add quirk for Lenovo Yoga7 14IAL7 (bsc#1203699).\n- ALSA: hda/realtek: Add quirk for Lenovo Yoga9 14IAP7 (git-fixes).\n- ALSA: hda/realtek: Add quirk for another Asus K42JZ model (git-fixes).\n- ALSA: hda/realtek: Add quirks for ASUS Zenbooks using CS35L41 (bsc#1203699).\n- ALSA: hda/realtek: Add speaker AMP init for Samsung laptops with ALC298 (git-fixes).\n- ALSA: hda/realtek: Add support for HP Laptops (bsc#1203699).\n- ALSA: hda/realtek: Add support for Legion 7 16ACHg6 laptop (bsc#1203699).\n- ALSA: hda/realtek: Correct pin configs for ASUS G533Z (git-fixes).\n- ALSA: hda/realtek: Enable 4-speaker output Dell Precision 5530 laptop (git-fixes).\n- ALSA: hda/realtek: Enable 4-speaker output Dell Precision 5570 laptop (git-fixes).\n- ALSA: hda/realtek: Enable mute/micmute LEDs and limit mic boost on EliteBook 845/865 G9 (bsc#1203699).\n- ALSA: hda/realtek: Enable mute/micmute LEDs support for HP Laptops (bsc#1203699).\n- ALSA: hda/realtek: Enable speaker and mute LEDs for HP laptops (bsc#1203699).\n- ALSA: hda/realtek: Fix LED on Zbook Studio G9 (bsc#1203699).\n- ALSA: hda/realtek: Fix mute led issue on thinkpad with cs35l41 s-codec (bsc#1203699).\n- ALSA: hda/realtek: Fix the speaker output on Samsung Galaxy Book Pro 360 (bsc#1205100).\n- ALSA: hda/realtek: More robust component matching for CS35L41 (bsc#1203699).\n- ALSA: hda/realtek: Re-arrange quirk table entries (git-fixes).\n- ALSA: hda/realtek: fix speakers for Samsung Galaxy Book Pro (bsc#1205100).\n- ALSA: hda/realtek: remove ALC289_FIXUP_DUAL_SPK for Dell 5530 (git-fixes).\n- ALSA: hda/sigmatel: Fix unused variable warning for beep power change (git-fixes).\n- ALSA: hda/sigmatel: Keep power up while beep is enabled (bsc#1200544).\n- ALSA: hda/tegra: Add Tegra234 hda driver support (git-fixes).\n- ALSA: hda/tegra: Align BDL entry to 4KB boundary (git-fixes).\n- ALSA: hda/tegra: Update scratch reg. communication (git-fixes).\n- ALSA: hda/tegra: set depop delay for tegra (git-fixes).\n- ALSA: hda: Fix Nvidia dp infoframe (git-fixes).\n- ALSA: hda: Fix dependencies of CS35L41 on SPI/I2C buses (bsc#1203699).\n- ALSA: hda: Fix dependency on ASoC cs35l41 codec (bsc#1203699).\n- ALSA: hda: Fix hang at HD-audio codec unbinding due to refcount saturation (git-fixes).\n- ALSA: hda: Fix position reporting on Poulsbo (git-fixes).\n- ALSA: hda: add Intel 5 Series / 3400 PCI DID (git-fixes).\n- ALSA: hda: cs35l41: Add Amp Name based on channel and index (bsc#1203699).\n- ALSA: hda: cs35l41: Add Boost type flag (bsc#1203699).\n- ALSA: hda: cs35l41: Add Support for Interrupts (bsc#1203699).\n- ALSA: hda: cs35l41: Add calls to newly added test key function (bsc#1203699).\n- ALSA: hda: cs35l41: Add defaulted values into dsp bypass config sequence (bsc#1203699).\n- ALSA: hda: cs35l41: Add initial DSP support and firmware loading (bsc#1203699).\n- ALSA: hda: cs35l41: Add missing default cases (bsc#1203699).\n- ALSA: hda: cs35l41: Add module parameter to control firmware load (bsc#1203699).\n- ALSA: hda: cs35l41: Add support for CS35L41 in HDA systems (bsc#1203699).\n- ALSA: hda: cs35l41: Allow compilation test on non-ACPI configurations (bsc#1203699).\n- ALSA: hda: cs35l41: Always configure the DAI (bsc#1203699).\n- ALSA: hda: cs35l41: Avoid overwriting register patch (bsc#1203699).\n- ALSA: hda: cs35l41: Clarify support for CSC3551 without _DSD Properties (bsc#1203699).\n- ALSA: hda: cs35l41: Consolidate selections under SND_HDA_SCODEC_CS35L41 (bsc#1203699).\n- ALSA: hda: cs35l41: Do not dereference fwnode handle (bsc#1203699).\n- ALSA: hda: cs35l41: Drop wrong use of ACPI_PTR() (bsc#1203699).\n- ALSA: hda: cs35l41: Enable GPIO2 Interrupt for CLSA0100 laptops (bsc#1203699).\n- ALSA: hda: cs35l41: Fix I2S params comments (bsc#1203699).\n- ALSA: hda: cs35l41: Fix comments wrt serial-multi-instantiate reference (bsc#1203699).\n- ALSA: hda: cs35l41: Fix error in spi cs35l41 hda driver name (bsc#1203699).\n- ALSA: hda: cs35l41: Handle all external boost setups the same way (bsc#1203699).\n- ALSA: hda: cs35l41: Improve dev_err_probe() messaging (bsc#1203699).\n- ALSA: hda: cs35l41: Make cs35l41_hda_remove() return void (bsc#1203699).\n- ALSA: hda: cs35l41: Make use of the helper function dev_err_probe() (bsc#1203699).\n- ALSA: hda: cs35l41: Move boost config to initialization code (bsc#1203699).\n- ALSA: hda: cs35l41: Move cs35l41* calls to its own symbol namespace (bsc#1203699).\n- ALSA: hda: cs35l41: Move external boost handling to lib for ASoC use (bsc#1203699).\n- ALSA: hda: cs35l41: Mute the device before shutdown (bsc#1203699).\n- ALSA: hda: cs35l41: Put the device into safe mode for external boost (bsc#1203699).\n- ALSA: hda: cs35l41: Read Speaker Calibration data from UEFI variables (bsc#1203699).\n- ALSA: hda: cs35l41: Remove Set Channel Map api from binding (bsc#1203699).\n- ALSA: hda: cs35l41: Remove cs35l41_hda_reg_sequence struct (bsc#1203699).\n- ALSA: hda: cs35l41: Remove suspend/resume hda hooks (bsc#1203699).\n- ALSA: hda: cs35l41: Reorganize log for playback actions (bsc#1203699).\n- ALSA: hda: cs35l41: Save Subsystem ID inside CS35L41 Driver (bsc#1203699).\n- ALSA: hda: cs35l41: Save codec object inside component struct (bsc#1203699).\n- ALSA: hda: cs35l41: Set Speaker Position for CLSA0100 Laptop (bsc#1203699).\n- ALSA: hda: cs35l41: Support CLSA0101 (bsc#1203699).\n- ALSA: hda: cs35l41: Support Firmware switching and reloading (bsc#1203699).\n- ALSA: hda: cs35l41: Support Hibernation during Suspend (bsc#1203699).\n- ALSA: hda: cs35l41: Support Speaker ID for laptops (bsc#1203699).\n- ALSA: hda: cs35l41: Support System Suspend (bsc#1203699).\n- ALSA: hda: cs35l41: Support multiple load paths for firmware (bsc#1203699).\n- ALSA: hda: cs35l41: Support reading subsystem id from ACPI (bsc#1203699).\n- ALSA: hda: cs35l41: Tidyup code (bsc#1203699).\n- ALSA: hda: cs35l41: Use the CS35L41 HDA internal define (bsc#1203699).\n- ALSA: hda: cs35l41: fix double free on error in probe() (bsc#1203699).\n- ALSA: hda: fix potential memleak in \u0027add_widget_node\u0027 (git-fixes).\n- ALSA: hda: hda_cs_dsp_ctl: Add Library to support CS_DSP ALSA controls (bsc#1203699).\n- ALSA: hda: hda_cs_dsp_ctl: Add apis to write the controls directly (bsc#1203699).\n- ALSA: hda: hda_cs_dsp_ctl: Add fw id strings (bsc#1203699).\n- ALSA: hda: hda_cs_dsp_ctl: Ensure pwr_lock is held before reading/writing controls (bsc#1203699).\n- ALSA: hda: hda_cs_dsp_ctl: Minor clean and redundant code removal (bsc#1203699).\n- ALSA: hda: intel-dsp-config: Add RaptorLake PCI IDs (jsc#PED-720).\n- ALSA: hda: intel-nhlt: Correct the handling of fmt_config flexible array (git-fixes).\n- ALSA: hiface: fix repeated words in comments (git-fixes).\n- ALSA: info: Fix llseek return value when using callback (git-fixes).\n- ALSA: line6: Replace sprintf() with sysfs_emit() (git-fixes).\n- ALSA: line6: remove line6_set_raw declaration (git-fixes).\n- ALSA: oss: Fix potential deadlock at unregistration (git-fixes).\n- ALSA: pcm: oss: Fix race at SNDCTL_DSP_SYNC (git-fixes).\n- ALSA: rawmidi: Drop register_mutex in snd_rawmidi_free() (git-fixes).\n- ALSA: rme9652: use explicitly signed char (git-fixes).\n- ALSA: scarlett2: Add Focusrite Clarett+ 8Pre support (git-fixes).\n- ALSA: scarlett2: Add support for the internal \u0027standalone\u0027 switch (git-fixes).\n- ALSA: scarlett2: Split scarlett2_config_items[] into 3 sections (git-fixes).\n- ALSA: seq: Fix data-race at module auto-loading (git-fixes).\n- ALSA: seq: oss: Fix data-race for max_midi_devs access (git-fixes).\n- ALSA: usb-audio: Add DSD support for Accuphase DAC-60 (git-fixes).\n- ALSA: usb-audio: Add endianness annotations (git-fixes).\n- ALSA: usb-audio: Add mixer mapping for Gigabyte B450/550 Mobos (git-fixes).\n- ALSA: usb-audio: Add quirk entry for M-Audio Micro (git-fixes).\n- ALSA: usb-audio: Add quirk for Behringer UMC202HD (git-fixes).\n- ALSA: usb-audio: Add quirk for LH Labs Geek Out HD Audio 1V5 (git-fixes).\n- ALSA: usb-audio: Add quirk to enable Avid Mbox 3 support (git-fixes).\n- ALSA: usb-audio: Add quirks for M-Audio Fast Track C400/600 (git-fixes).\n- ALSA: usb-audio: Drop snd_BUG_ON() from snd_usbmidi_output_open() (git-fixes).\n- ALSA: usb-audio: Fix NULL dererence at error path (git-fixes).\n- ALSA: usb-audio: Fix an out-of-bounds bug in __snd_usb_parse_audio_interface() (git-fixes).\n- ALSA: usb-audio: Fix last interface check for registration (git-fixes).\n- ALSA: usb-audio: Fix potential memory leaks (git-fixes).\n- ALSA: usb-audio: Fix regression with Dell Dock jack detection (bsc#1204719).\n- ALSA: usb-audio: Inform the delayed registration more properly (git-fixes).\n- ALSA: usb-audio: More comprehensive mixer map for ASUS ROG Zenith II (git-fixes).\n- ALSA: usb-audio: Register card again for iface over delayed_register option (git-fixes).\n- ALSA: usb-audio: Register card at the last interface (git-fixes).\n- ALSA: usb-audio: Remove redundant workaround for Roland quirk (bsc#1205111).\n- ALSA: usb-audio: Split endpoint setups for hw_params and prepare (git-fixes).\n- ALSA: usb-audio: Support jack detection on Dell dock (git-fixes).\n- ALSA: usb-audio: Turn off \u0027manual mode\u0027 on Dell dock (git-fixes).\n- ALSA: usb-audio: Yet more regression for for the delayed card registration (bsc#1205111).\n- ALSA: usb-audio: add quirk to fix Hamedal C20 disconnect issue (git-fixes).\n- ALSA: usb-audio: make read-only array marker static const (git-fixes).\n- ALSA: usb-audio: remove redundant assignment to variable c (git-fixes).\n- ALSA: usb-audio: scarlett2: Use struct_size() helper in scarlett2_usb() (git-fixes).\n- ALSA: usb/6fire: fix repeated words in comments (git-fixes).\n- ARM: 9216/1: Fix MAX_DMA_ADDRESS overflow (git-fixes).\n- ARM: 9242/1: kasan: Only map modules if CONFIG_KASAN_VMALLOC=n (git-fixes).\n- ARM: 9244/1: dump: Fix wrong pg_level in walk_pmd() (git-fixes).\n- ARM: 9247/1: mm: set readonly for MT_MEMORY_RO with ARM_LPAE (git-fixes).\n- ARM: Drop CMDLINE_* dependency on ATAGS (git-fixes).\n- ARM: OMAP2+: Fix refcount leak in omap3xxx_prm_late_init (git-fixes).\n- ARM: OMAP2+: Fix refcount leak in omapdss_init_of (git-fixes).\n- ARM: OMAP2+: display: Fix refcount leak bug (git-fixes).\n- ARM: OMAP2+: pdata-quirks: Fix refcount leak bug (git-fixes).\n- ARM: at91: rm9200: fix usb device clock id (git-fixes).\n- ARM: bcm: Fix refcount leak in bcm_kona_smc_init (git-fixes).\n- ARM: decompressor: Include .data.rel.ro.local (git-fixes).\n- ARM: defconfig: clean up multi_v4t and multi_v5 configs (git-fixes).\n- ARM: defconfig: drop CONFIG_PTP_1588_CLOCK=y (git-fixes).\n- ARM: defconfig: drop CONFIG_SERIAL_OMAP references (git-fixes).\n- ARM: defconfig: drop CONFIG_USB_FSL_USB2 (git-fixes).\n- ARM: dts: BCM5301X: Add DT for Meraki MR26 (git-fixes).\n- ARM: dts: am335x-pcm-953: Define fixed regulators in root node (git-fixes).\n- ARM: dts: am33xx: Fix MMCHS0 dma properties (git-fixes).\n- ARM: dts: armada-38x: Add gpio-ranges for pin muxing (git-fixes).\n- ARM: dts: ast2500-evb: fix board compatible (git-fixes).\n- ARM: dts: ast2600-evb-a1: fix board compatible (git-fixes).\n- ARM: dts: ast2600-evb: fix board compatible (git-fixes).\n- ARM: dts: at91: sam9g20ek: enable udc vbus gpio pinctrl (git-fixes).\n- ARM: dts: at91: sama5d27_wlsom1: do not keep ldo2 enabled all the time (git-fixes).\n- ARM: dts: at91: sama5d27_wlsom1: specify proper regulator output ranges (git-fixes).\n- ARM: dts: at91: sama5d2_icp: do not keep vdd_other enabled all the time (git-fixes).\n- ARM: dts: at91: sama5d2_icp: specify proper regulator output ranges (git-fixes).\n- ARM: dts: exynos: correct s5k6a3 reset polarity on Midas family (git-fixes).\n- ARM: dts: exynos: fix polarity of VBUS GPIO of Origen (git-fixes).\n- ARM: dts: fix Moxa SDIO \u0027compatible\u0027, remove \u0027sdhci\u0027 misnomer (git-fixes).\n- ARM: dts: imx6dl: add missing properties for sram (git-fixes).\n- ARM: dts: imx6q-prti6q: Fix ref/tcxo-clock-frequency properties (git-fixes).\n- ARM: dts: imx6q: add missing properties for sram (git-fixes).\n- ARM: dts: imx6qdl-gw59{10,13}: fix user pushbutton GPIO offset (git-fixes).\n- ARM: dts: imx6qdl-kontron-samx6i: fix spi-flash compatible (git-fixes).\n- ARM: dts: imx6qdl-kontron-samx6i: hook up DDC i2c bus (git-fixes).\n- ARM: dts: imx6qdl-kontron-samx6i: remove duplicated node (git-fixes).\n- ARM: dts: imx6qp: add missing properties for sram (git-fixes).\n- ARM: dts: imx6sl: add missing properties for sram (git-fixes).\n- ARM: dts: imx6sll: add missing properties for sram (git-fixes).\n- ARM: dts: imx6sx: add missing properties for sram (git-fixes).\n- ARM: dts: imx6ul: add missing properties for sram (git-fixes).\n- ARM: dts: imx6ul: change operating-points to uint32-matrix (git-fixes).\n- ARM: dts: imx6ul: fix csi node compatible (git-fixes).\n- ARM: dts: imx6ul: fix keypad compatible (git-fixes).\n- ARM: dts: imx6ul: fix lcdif node compatible (git-fixes).\n- ARM: dts: imx6ul: fix qspi node compatible (git-fixes).\n- ARM: dts: imx7: Fix NAND controller size-cells (git-fixes).\n- ARM: dts: imx7d-colibri-emmc: add cpu1 supply (git-fixes).\n- ARM: dts: imx7d-sdb: config the max pressure for tsc2046 (git-fixes).\n- ARM: dts: imx: align SPI NOR node name with dtschema (git-fixes).\n- ARM: dts: integrator: Tag PCI host with device_type (git-fixes).\n- ARM: dts: kirkwood: lsxl: fix serial line (git-fixes).\n- ARM: dts: kirkwood: lsxl: remove first ethernet port (git-fixes).\n- ARM: dts: qcom: mdm9615: add missing PMIC GPIO reg (git-fixes).\n- ARM: dts: qcom: pm8841: add required thermal-sensor-cells (git-fixes).\n- ARM: dts: qcom: sdx55: Fix the IRQ trigger type for UART (git-fixes).\n- ARM: dts: turris-omnia: Add label for wan port (git-fixes).\n- ARM: dts: turris-omnia: Fix mpp26 pin name and comment (git-fixes).\n- ARM: dts: uniphier: Fix USB interrupts for PXs2 SoC (git-fixes).\n- ARM: findbit: fix overflowing offset (git-fixes).\n- ARM: mxs: fix memory leak in mxs_machine_init() (git-fixes).\n- ARM: shmobile: rcar-gen2: Increase refcount for new reference (git-fixes).\n- ASoC: Intel: bytcht_es8316: Add quirk for the Nanote UMPC-01 (git-fixes).\n- ASoC: Intel: sof_sdw: add quirk variant for LAPBC710 NUC15 (git-fixes).\n- ASoC: SOF: Intel: pci-tgl: add ADL-PS support (jsc#PED-720).\n- ASoC: SOF: Intel: pci-tgl: add RPL-P support (jsc#PED-720).\n- ASoC: SOF: Intel: pci-tgl: add RPL-S support (jsc#PED-652).\n- ASoC: SOF: debug: Fix potential buffer overflow by snprintf() (git-fixes).\n- ASoC: SOF: pci: Change DMI match info to support all Chrome platforms (git-fixes).\n- ASoC: audio-graph-card: Add of_node_put() in fail path (git-fixes).\n- ASoC: codec: tlv320aic32x4: fix mono playback via I2S (git-fixes).\n- ASoC: codecs: da7210: add check for i2c_add_driver (git-fixes).\n- ASoC: codecs: jz4725b: Fix spelling mistake \u0027Sourc\u0027 -\u003e \u0027Source\u0027, \u0027Routee\u0027 -\u003e \u0027Route\u0027 (git-fixes).\n- ASoC: codecs: jz4725b: add missed Line In power control bit (git-fixes).\n- ASoC: codecs: jz4725b: fix capture selector naming (git-fixes).\n- ASoC: codecs: jz4725b: fix reported volume for Master ctl (git-fixes).\n- ASoC: codecs: jz4725b: use right control for Capture Volume (git-fixes).\n- ASoC: codecs: msm8916-wcd-digital: move gains from SX_TLV to S8_TLV (git-fixes).\n- ASoC: codecs: tx-macro: fix kcontrol put (git-fixes).\n- ASoC: codecs: wcd9335: move gains from SX_TLV to S8_TLV (git-fixes).\n- ASoC: core: Fix use-after-free in snd_soc_exit() (git-fixes).\n- ASoC: cros_ec_codec: Fix refcount leak in cros_ec_codec_platform_probe (git-fixes).\n- ASoC: cs35l41: Add ASP TX3/4 source to register patch (bsc#1203699).\n- ASoC: cs35l41: Add bindings for CS35L41 (bsc#1203699).\n- ASoC: cs35l41: Add common cs35l41 enter hibernate function (bsc#1203699).\n- ASoC: cs35l41: Add cs35l51/53 IDs (bsc#1203699).\n- ASoC: cs35l41: Add endianness flag in snd_soc_component_driver (bsc#1203699).\n- ASoC: cs35l41: Add one more variable in the debug log (bsc#1203699).\n- ASoC: cs35l41: Add support for CLSA3541 ACPI device ID (bsc#1203699).\n- ASoC: cs35l41: Add support for hibernate memory retention mode (bsc#1203699).\n- ASoC: cs35l41: Binding fixes (bsc#1203699).\n- ASoC: cs35l41: CS35L41 Boosted Smart Amplifier (bsc#1203699).\n- ASoC: cs35l41: Change monitor widgets to siggens (bsc#1203699).\n- ASoC: cs35l41: Combine adjacent register writes (bsc#1203699).\n- ASoC: cs35l41: Convert tables to shared source code (bsc#1203699).\n- ASoC: cs35l41: Correct DSP power down (bsc#1203699).\n- ASoC: cs35l41: Correct handling of some registers in the cache (bsc#1203699).\n- ASoC: cs35l41: Correct some control names (bsc#1203699).\n- ASoC: cs35l41: Create shared function for boost configuration (bsc#1203699).\n- ASoC: cs35l41: Create shared function for errata patches (bsc#1203699).\n- ASoC: cs35l41: Create shared function for setting channels (bsc#1203699).\n- ASoC: cs35l41: DSP Support (bsc#1203699).\n- ASoC: cs35l41: Do not overwrite returned error code (bsc#1203699).\n- ASoC: cs35l41: Do not print error when waking from hibernation (bsc#1203699).\n- ASoC: cs35l41: Document CS35l41 External Boost (bsc#1203699).\n- ASoC: cs35l41: Fix DSP mbox start command and global enable order (bsc#1203699).\n- ASoC: cs35l41: Fix GPIO2 configuration (bsc#1203699).\n- ASoC: cs35l41: Fix a bunch of trivial code formating/style issues (bsc#1203699).\n- ASoC: cs35l41: Fix a shift-out-of-bounds warning found by UBSAN (bsc#1203699).\n- ASoC: cs35l41: Fix an out-of-bounds access in otp_packed_element_t (bsc#1203699).\n- ASoC: cs35l41: Fix link problem (bsc#1203699).\n- ASoC: cs35l41: Fix max number of TX channels (bsc#1203699).\n- ASoC: cs35l41: Fix undefined reference to core functions (bsc#1203699).\n- ASoC: cs35l41: Fix use of an uninitialised variable (bsc#1203699).\n- ASoC: cs35l41: Fixup the error messages (bsc#1203699).\n- ASoC: cs35l41: Make cs35l41_remove() return void (bsc#1203699).\n- ASoC: cs35l41: Move cs35l41 exit hibernate function into shared code (bsc#1203699).\n- ASoC: cs35l41: Move cs35l41 fs errata into shared code (bsc#1203699).\n- ASoC: cs35l41: Move cs35l41_otp_unpack to shared code (bsc#1203699).\n- ASoC: cs35l41: Move cs35l41_set_cspl_mbox_cmd to shared code (bsc#1203699).\n- ASoC: cs35l41: Move cs_dsp config struct into shared code (bsc#1203699).\n- ASoC: cs35l41: Move power initializations to reg_sequence (bsc#1203699).\n- ASoC: cs35l41: Read System Name from ACPI _SUB to identify firmware (bsc#1203699).\n- ASoC: cs35l41: Remove incorrect comment (bsc#1203699).\n- ASoC: cs35l41: Remove unnecessary param (bsc#1203699).\n- ASoC: cs35l41: Set the max SPI speed for the whole device (bsc#1203699).\n- ASoC: cs35l41: Support external boost (bsc#1203699).\n- ASoC: cs35l41: Update handling of test key registers (bsc#1203699).\n- ASoC: cs35l41: Use regmap_read_poll_timeout to wait for OTP boot (bsc#1203699).\n- ASoC: cs42l42: Add control for audio slow-start switch (bsc#1203699).\n- ASoC: cs42l42: Add warnings about DETECT_MODE and PLL_START (bsc#1203699).\n- ASoC: cs42l42: Allow time for HP/ADC to power-up after enable (bsc#1203699).\n- ASoC: cs42l42: Always enable TS_PLUG and TS_UNPLUG interrupts (bsc#1203699).\n- ASoC: cs42l42: Change jack_detect_mutex to a lock of all IRQ handling (bsc#1203699).\n- ASoC: cs42l42: Do not claim to support 192k (bsc#1203699).\n- ASoC: cs42l42: Do not reconfigure the PLL while it is running (bsc#1203699).\n- ASoC: cs42l42: Fix WARN in remove() if running without an interrupt (bsc#1203699).\n- ASoC: cs42l42: Handle system suspend (bsc#1203699).\n- ASoC: cs42l42: Implement Manual Type detection as fallback (bsc#1203699).\n- ASoC: cs42l42: Mark OSC_SWITCH_STATUS register volatile (bsc#1203699).\n- ASoC: cs42l42: Minor fix all errors reported by checkpatch.pl script (bsc#1203699).\n- ASoC: cs42l42: Move CS42L42 register descriptions to general include (bsc#1203699).\n- ASoC: cs42l42: Only report button state if there was a button interrupt (git-fixes).\n- ASoC: cs42l42: Prevent NULL pointer deref in interrupt handler (bsc#1203699).\n- ASoC: cs42l42: Remove redundant pll_divout member (bsc#1203699).\n- ASoC: cs42l42: Remove redundant writes to DETECT_MODE (bsc#1203699).\n- ASoC: cs42l42: Remove redundant writes to RS_PLUG/RS_UNPLUG masks (bsc#1203699).\n- ASoC: cs42l42: Remove unused runtime_suspend/runtime_resume callbacks (bsc#1203699).\n- ASoC: cs42l42: Report full jack status when plug is detected (bsc#1203699).\n- ASoC: cs42l42: Report initial jack state (bsc#1203699).\n- ASoC: cs42l42: Reset and power-down on remove() and failed probe() (bsc#1203699).\n- ASoC: cs42l42: Set correct SRC MCLK (bsc#1203699).\n- ASoC: cs42l42: Simplify reporting of jack unplug (bsc#1203699).\n- ASoC: cs42l42: Use PLL for SCLK \u003e 12.288MHz (bsc#1203699).\n- ASoC: cs42l42: Use two thresholds and increased wait time for manual type detection (bsc#1203699).\n- ASoC: cs42l42: free_irq() before powering-down on probe() fail (bsc#1203699).\n- ASoC: da7219: Fix an error handling path in da7219_register_dai_clks() (git-fixes).\n- ASoC: dt-bindings: cs42l42: Convert binding to yaml (bsc#1203699).\n- ASoC: eureka-tlv320: Hold reference returned from of_find_xxx API (git-fixes).\n- ASoC: fsl-asoc-card: force cast the asrc_format type (git-fixes).\n- ASoC: fsl_asrc fsl_esai fsl_sai: allow CONFIG_PM=N (git-fixes).\n- ASoC: fsl_asrc: force cast the asrc_format type (git-fixes).\n- ASoC: fsl_easrc: use snd_pcm_format_t type for sample_format (git-fixes).\n- ASoC: fsl_sai: Remove unnecessary FIFO reset in ISR (git-fixes).\n- ASoC: fsl_sai: use local device pointer (git-fixes).\n- ASoC: imx-audmux: Silence a clang warning (git-fixes).\n- ASoC: imx-card: Fix DSD/PDM mclk frequency (git-fixes).\n- ASoC: imx-card: Fix refcount issue with of_node_put (git-fixes).\n- ASoC: imx-card: use snd_pcm_format_t type for asrc_format (git-fixes).\n- ASoC: max98373: Add checks for devm_kcalloc (git-fixes).\n- ASoC: mchp-spdifrx: disable end of block interrupt on failures (git-fixes).\n- ASoC: mchp-spdiftx: Fix clang -Wbitfield-constant-conversion (git-fixes).\n- ASoC: mchp-spdiftx: remove references to mchp_i2s_caps (git-fixes).\n- ASoC: mt6359: Fix refcount leak bug (git-fixes).\n- ASoC: mt6359: fix tests for platform_get_irq() failure (git-fixes).\n- ASoC: mt6660: Fix PM disable depth imbalance in mt6660_i2c_probe (git-fixes).\n- ASoC: mt6660: Keep the pm_runtime enables before component stuff in mt6660_i2c_probe (git-fixes).\n- ASoC: mt6797-mt6351: Fix refcount leak in mt6797_mt6351_dev_probe (git-fixes).\n- ASoC: nau8824: Fix semaphore unbalance at error paths (git-fixes).\n- ASoC: ops: Fix bounds check for _sx controls (git-fixes).\n- ASoC: qcom: Fix missing of_node_put() in asoc_qcom_lpass_cpu_platform_probe() (git-fixes).\n- ASoC: qcom: lpass-cpu: Mark HDMI TX parity register as volatile (git-fixes).\n- ASoC: qcom: lpass-cpu: mark HDMI TX registers as volatile (git-fixes).\n- ASoC: qcom: q6dsp: Fix an off-by-one in q6adm_alloc_copp() (git-fixes).\n- ASoC: qcom: sm8250: add missing module owner (git-fixes).\n- ASoC: rsnd: Add check for rsnd_mod_power_on (git-fixes).\n- ASoC: rsnd: care default case on rsnd_ssiu_busif_err_irq_ctrl() (git-fixes).\n- ASoC: rt1019: Fix the TDM settings (git-fixes).\n- ASoC: samsung: Fix error handling in aries_audio_probe (git-fixes).\n- ASoC: samsung: change gpiod_speaker_power and rx1950_audio from global to static variables (git-fixes).\n- ASoC: samsung: change neo1973_audio from a global to static (git-fixes).\n- ASoC: samsung: h1940_uda1380: include proepr GPIO consumer header (git-fixes).\n- ASoC: sgtl5000: Reset the CHIP_CLK_CTRL reg on remove (git-fixes).\n- ASoC: soc-pcm: Do not zero TDM masks in __soc_pcm_open() (git-fixes).\n- ASoC: soc-utils: Remove __exit for snd_soc_util_exit() (git-fixes).\n- ASoC: stm32: dfsdm: manage cb buffers cleanup (git-fixes).\n- ASoC: tas2764: Allow mono streams (git-fixes).\n- ASoC: tas2764: Drop conflicting set_bias_level power setting (git-fixes).\n- ASoC: tas2764: Fix mute/unmute (git-fixes).\n- ASoC: tas2764: Fix set_tdm_slot in case of single slot (git-fixes).\n- ASoC: tas2770: Allow mono streams (git-fixes).\n- ASoC: tas2770: Drop conflicting set_bias_level power setting (git-fixes).\n- ASoC: tas2770: Fix handling of mute/unmute (git-fixes).\n- ASoC: tas2770: Fix set_tdm_slot in case of single slot (git-fixes).\n- ASoC: tas2770: Reinit regcache on reset (git-fixes).\n- ASoC: tas2770: Set correct FSYNC polarity (git-fixes).\n- ASoC: wcd9335: fix order of Slimbus unprepare/disable (git-fixes).\n- ASoC: wcd934x: fix order of Slimbus unprepare/disable (git-fixes).\n- ASoC: wm5102: Fix PM disable depth imbalance in wm5102_probe (git-fixes).\n- ASoC: wm5110: Fix PM disable depth imbalance in wm5110_probe (git-fixes).\n- ASoC: wm8962: Add an event handler for TEMP_HP and TEMP_SPK (git-fixes).\n- ASoC: wm8997: Fix PM disable depth imbalance in wm8997_probe (git-fixes).\n- ASoC: wm_adsp: Add support for \u0027toggle\u0027 preloaders (bsc#1203699).\n- ASoC: wm_adsp: Add trace caps to speaker protection FW (bsc#1203699).\n- ASoC: wm_adsp: Cancel ongoing work when removing controls (bsc#1203699).\n- ASoC: wm_adsp: Compressed stream DSP memory structs should be __packed (bsc#1203699).\n- ASoC: wm_adsp: Correct control read size when parsing compressed buffer (bsc#1203699).\n- ASoC: wm_adsp: Expand firmware loading search options (bsc#1203699).\n- ASoC: wm_adsp: Fix event for preloader (bsc#1203699).\n- ASoC: wm_adsp: Handle optional legacy support (git-fixes).\n- ASoC: wm_adsp: Introduce cs_dsp logging macros (bsc#1203699).\n- ASoC: wm_adsp: Make compressed buffers optional (bsc#1203699).\n- ASoC: wm_adsp: Minor clean and redundant code removal (bsc#1203699).\n- ASoC: wm_adsp: Move check for control existence (bsc#1203699).\n- ASoC: wm_adsp: Move check of dsp-\u003erunning to better place (bsc#1203699).\n- ASoC: wm_adsp: Move sys_config_size to wm_adsp (bsc#1203699).\n- ASoC: wm_adsp: Pass firmware names as parameters when starting DSP core (bsc#1203699).\n- ASoC: wm_adsp: Remove pointless string comparison (bsc#1203699).\n- ASoC: wm_adsp: Remove the wmfw_add_ctl helper function (bsc#1203699).\n- ASoC: wm_adsp: Remove use of snd_ctl_elem_type_t (bsc#1203699).\n- ASoC: wm_adsp: Rename generic DSP support (bsc#1203699).\n- ASoC: wm_adsp: Separate generic cs_dsp_coeff_ctl handling (bsc#1203699).\n- ASoC: wm_adsp: Separate some ASoC and generic functions (bsc#1203699).\n- ASoC: wm_adsp: Separate wm_adsp specifics in cs_dsp_client_ops (bsc#1203699).\n- ASoC: wm_adsp: Split DSP power operations into helper functions (bsc#1203699).\n- ASoC: wm_adsp: Split out struct cs_dsp from struct wm_adsp (bsc#1203699).\n- ASoC: wm_adsp: Switch to using wm_coeff_read_ctrl for compressed buffers (bsc#1203699).\n- ASoC: wm_adsp: move firmware loading to client (bsc#1203699).\n- ASoC: wm_adsp: remove a repeated including (bsc#1203699).\n- ASoC: wm_adsp: wm_adsp_control_add() error: uninitialized symbol \u0027ret\u0027 (bsc#1203699).\n- Bluetooth: 6LoWPAN: add missing hci_dev_put() in get_l2cap_conn() (git-fixes).\n- Bluetooth: Add bt_skb_sendmmsg helper (git-fixes).\n- Bluetooth: Add bt_skb_sendmsg helper (git-fixes).\n- Bluetooth: Fix bt_skb_sendmmsg not allocating partial chunks (git-fixes).\n- Bluetooth: Fix not cleanup led when bt_init fails (git-fixes).\n- Bluetooth: Fix passing NULL to PTR_ERR (git-fixes).\n- Bluetooth: L2CAP: Fix accepting connection request for invalid SPSM (git-fixes).\n- Bluetooth: L2CAP: Fix attempting to access uninitialized memory (git-fixes).\n- Bluetooth: L2CAP: Fix build errors in some archs (git-fixes).\n- Bluetooth: L2CAP: Fix l2cap_global_chan_by_psm (git-fixes).\n- Bluetooth: L2CAP: Fix l2cap_global_chan_by_psm regression (git-fixes).\n- Bluetooth: L2CAP: Fix use-after-free caused by l2cap_chan_put (git-fixes).\n- Bluetooth: L2CAP: Fix use-after-free caused by l2cap_reassemble_sdu (git-fixes).\n- Bluetooth: L2CAP: Fix user-after-free (git-fixes).\n- Bluetooth: L2CAP: initialize delayed works at l2cap_chan_create() (git-fixes).\n- Bluetooth: MGMT: Fixes build warnings with C=1 (git-fixes).\n- Bluetooth: RFCOMM: Fix possible deadlock on socket shutdown/release (git-fixes).\n- Bluetooth: RFCOMM: Replace use of memcpy_from_msg with bt_skb_sendmmsg (git-fixes).\n- Bluetooth: SCO: Fix sco_send_frame returning skb-\u003elen (git-fixes).\n- Bluetooth: SCO: Replace use of memcpy_from_msg with bt_skb_sendmsg (git-fixes).\n- Bluetooth: btintel: Mark Intel controller to support LE_STATES quirk (git-fixes).\n- Bluetooth: btusb: Add Realtek RTL8852C support ID 0x04C5:0x1675 (git-fixes).\n- Bluetooth: btusb: Add Realtek RTL8852C support ID 0x04CA:0x4007 (git-fixes).\n- Bluetooth: btusb: Add Realtek RTL8852C support ID 0x0CB8:0xC558 (git-fixes).\n- Bluetooth: btusb: Add Realtek RTL8852C support ID 0x13D3:0x3586 (git-fixes).\n- Bluetooth: btusb: Add Realtek RTL8852C support ID 0x13D3:0x3587 (git-fixes).\n- Bluetooth: btusb: Add support of IMC Networks PID 0x3568 (git-fixes).\n- Bluetooth: btusb: mediatek: fix WMT failure during runtime suspend (git-fixes).\n- Bluetooth: hci_bcm: Add BCM4349B1 variant (git-fixes).\n- Bluetooth: hci_bcm: Add DT compatible for CYW55572 (git-fixes).\n- Bluetooth: hci_core: Fix not handling link timeouts propertly (git-fixes).\n- Bluetooth: hci_intel: Add check for platform_driver_register (git-fixes).\n- Bluetooth: hci_sysfs: Fix attempting to call device_add multiple times (git-fixes).\n- Bluetooth: hci_{ldisc,serdev}: check percpu_init_rwsem() failure (git-fixes).\n- Bluetooth: virtio_bt: Use skb_put to set length (git-fixes).\n- Decrease the number of SMB3 smbdirect client SGEs (bsc#1193629).\n- Documentation: ACPI: EINJ: Fix obsolete example (git-fixes).\n- Documentation: PM: Drop pme_interrupt reference (git-fixes).\n- Documentation: add description for net.core.gro_normal_batch (git-fixes).\n- Documentation: add description for net.sctp.ecn_enable (git-fixes).\n- Documentation: add description for net.sctp.intl_enable (git-fixes).\n- Documentation: add description for net.sctp.reconf_enable (git-fixes).\n- Documentation: devres: add missing I2C helper (git-fixes).\n- Documentation: dm writecache: Render status list as list (git-fixes).\n- Documentation: fix sctp_wmem in ip-sysctl.rst (git-fixes).\n- Documentation: fix udp_wmem_min in ip-sysctl.rst (git-fixes).\n- Documentation: move watch_queue to core-api (git-fixes).\n- Documentation: siphash: Fix typo in the name of offsetofend macro (git-fixes).\n- Drivers: hv: Always reserve framebuffer region for Gen1 VMs (git-fixes).\n- Drivers: hv: Fix syntax errors in comments (git-fixes).\n- Drivers: hv: Never allocate anything besides framebuffer from framebuffer memory region (git-fixes).\n- Drivers: hv: fix repeated words in comments (git-fixes).\n- Drivers: hv: remove duplicate word in a comment (git-fixes).\n- Drivers: hv: vmbus: Accept hv_sock offers in isolated guests (git-fixes).\n- Drivers: hv: vmbus: Add VMbus IMC device to unsupported list (git-fixes).\n- Drivers: hv: vmbus: Do not wait for the ACPI device upon initialization (git-fixes).\n- Drivers: hv: vmbus: Fix handling of messages with transaction ID of zero (bsc#1204017).\n- Drivers: hv: vmbus: Fix kernel-doc (git-fixes).\n- Drivers: hv: vmbus: Introduce vmbus_request_addr_match() (bsc#1204017).\n- Drivers: hv: vmbus: Introduce vmbus_sendpacket_getid() (bsc#1204017).\n- Drivers: hv: vmbus: Introduce {lock,unlock}_requestor() (bsc#1204017).\n- Drivers: hv: vmbus: Optimize vmbus_on_event (git-fixes).\n- Drivers: hv: vmbus: Release cpu lock in error case (git-fixes).\n- Drivers: hv: vmbus: Use PCI_VENDOR_ID_MICROSOFT for better discoverability (git-fixes).\n- Drivers: hv: vmbus: fix double free in the error path of vmbus_add_channel_work() (git-fixes).\n- Drivers: hv: vmbus: fix possible memory leak in vmbus_device_register() (git-fixes).\n- Drivers: hv: vmbus: fix typo in comment (git-fixes).\n- EDAC/dmc520: Do not print an error for each unconfigured interrupt line (bsc#1190497).\n- EDAC/ghes: Set the DIMM label unconditionally (bsc#1201768).\n- Enable livepatching related packages on -RT (jsc#PED-1706)\n- HID: AMD_SFH: Add a DMI quirk entry for Chromebooks (git-fixes).\n- HID: add Lenovo Yoga C630 battery quirk (git-fixes).\n- HID: alps: Declare U1_UNICORN_LEGACY support (git-fixes).\n- HID: amd_sfh: Add NULL check for hid device (git-fixes).\n- HID: amd_sfh: Handle condition of \u0027no sensors\u0027 (git-fixes).\n- HID: asus: ROG NKey: Ignore portion of 0x5a report (git-fixes).\n- HID: core: fix shift-out-of-bounds in hid_report_raw_event (git-fixes).\n- HID: cp2112: prevent a buffer overflow in cp2112_xfer() (git-fixes).\n- HID: hid-input: add Surface Go battery quirk (git-fixes).\n- HID: hid-lg4ff: Add check for empty lbuf (git-fixes).\n- HID: hidraw: fix memory leak in hidraw_release() (git-fixes).\n- HID: hyperv: fix possible memory leak in mousevsc_probe() (git-fixes).\n- HID: ishtp-hid-clientHID: ishtp-hid-client: Fix comment typo (git-fixes).\n- HID: magicmouse: Do not set BTN_MOUSE on double report (git-fixes).\n- HID: mcp2221: prevent a buffer overflow in mcp_smbus_write() (git-fixes).\n- HID: multitouch: Add memory barriers (git-fixes).\n- HID: multitouch: new device class fix Lenovo X12 trackpad sticky (git-fixes).\n- HID: playstation: add initial DualSense Edge controller support (git-fixes).\n- HID: roccat: Fix use-after-free in roccat_read() (git-fixes).\n- HID: saitek: add madcatz variant of MMO7 mouse device ID (git-fixes).\n- HID: steam: Prevent NULL pointer dereference in steam_{recv,send}_report (git-fies).\n- HID: thrustmaster: Add sparco wheel and fix array length (git-fixes).\n- HID: usbhid: Add ALWAYS_POLL quirk for some mice (git-fixes).\n- HID: wacom: Do not register pad_input for touch switch (git-fixes).\n- HID: wacom: Only report rotation for art pen (git-fixes).\n- HSI: omap_ssi: Fix refcount leak in ssi_probe (git-fixes).\n- HSI: omap_ssi_port: Fix dma_map_sg error check (git-fixes).\n- Handle variable number of SGEs in client smbdirect send (bsc#1193629).\n- IB/core: Fix a nested dead lock as part of ODP flow (git-fixes)\n- IB/hfi1: Correctly move list in sc_disable() (git-fixes)\n- IB/rdmavt: Add __init/__exit annotations to module init/exit funcs (git-fixes)\n- IB: Set IOVA/LENGTH on IB_MR in core/uverbs layers (git-fixes)\n- Input: exc3000 - fix return value check of wait_for_completion_timeout (git-fixes).\n- Input: goodix - add compatible string for GT1158 (git-fixes).\n- Input: goodix - add support for GT1158 (git-fixes).\n- Input: goodix - try resetting the controller when no config is set (git-fixes).\n- Input: gscps2 - check return value of ioremap() in gscps2_probe() (git-fixes).\n- Input: i8042 - add TUXEDO devices to i8042 quirk tables (git-fies).\n- Input: i8042 - add additional TUXEDO devices to i8042 quirk tables (git-fies).\n- Input: i8042 - fix leaking of platform device on module removal (git-fixes).\n- Input: i8042 - fix refount leak on sparc (git-fixes).\n- Input: i8042 - merge quirk tables (git-fies).\n- Input: i8042 - move __initconst to fix code styling warning (git-fies).\n- Input: iforce - add support for Boeder Force Feedback Wheel (git-fixes).\n- Input: iforce - invert valid length check when fetching device IDs (git-fixes).\n- Input: iforce - wake up after clearing IFORCE_XMIT_RUNNING flag (git-fixes).\n- Input: iqs62x-keys - drop unused device node references (git-fixes).\n- Input: melfas_mip4 - fix return value check in mip4_probe() (git-fixes).\n- Input: raydium_ts_i2c - fix memory leak in raydium_i2c_send() (git-fixes).\n- Input: rk805-pwrkey - fix module autoloading (git-fixes).\n- Input: snvs_pwrkey - fix SNVS_HPVIDR1 register address (git-fixes).\n- Input: soc_button_array - add Acer Switch V 10 to dmi_use_low_level_irq[] (git-fixes).\n- Input: soc_button_array - add use_low_level_irq module parameter (git-fixes).\n- Input: synaptics - switch touchpad on HP Laptop 15-da3001TU to RMI mode (git-fixes).\n- Input: synaptics-rmi4 - fix firmware update operations with bootloader v8 (git-fixes).\n- Input: xpad - add supported devices as contributed on github (git-fixes).\n- Input: xpad - fix wireless 360 controller breaking after suspend (git-fixes).\n- KABI: cgroup: Restore KABI of css_set (bsc#1201610).\n- KEYS: asymmetric: enforce SM2 signature use pkey algo (git-fixes).\n- KVM-x86-Avoid-theoretical-NULL-pointer-dereference-i.patch\n- KVM-x86-Check-lapic_in_kernel-before-attempting-to-s.patch\n- KVM-x86-Forbid-VMM-to-set-SYNIC-STIMER-MSRs-when-Syn.patch\n- KVM: LAPIC: Also cancel preemption timer during SET_LAPIC (git-fixes).\n- KVM: MMU: shadow nested paging does not have PKU (git-fixes).\n- KVM: Move wiping of the kvm-\u003evcpus array to common code (git-fixes).\n- KVM: PPC: Book3S HV: Check return value of kvmppc_radix_init (bsc#1194869).\n- KVM: PPC: Book3S HV: Prevent POWER7/8 TLB flush flushing SLB (bsc#1156395).\n- KVM: PPC: Book3S HV: Remove kvmhv_p9_[set,restore]_lpcr declarations (bsc#1194869).\n- KVM: PPC: Book3S HV: Use GLOBAL_TOC for kvmppc_h_set_dabr/xdabr() (bsc#1156395).\n- KVM: PPC: Book3S HV: fix incorrect NULL check on list iterator (bsc#1194869).\n- KVM: PPC: Book3s HV: Remove unused function kvmppc_bad_interrupt (bsc#1194869).\n- KVM: PPC: Fix vmx/vsx mixup in mmio emulation (bsc#1156395).\n- KVM: PPC: Use arch_get_random_seed_long instead of powernv variant (bsc#1156395).\n- KVM: SEV: Mark nested locking of vcpu-\u003elock (git-fixes).\n- KVM: SVM: Create a separate mapping for the GHCB save area (jsc#SLE-19924, jsc#SLE-24814).\n- KVM: SVM: Create a separate mapping for the SEV-ES save area (jsc#SLE-19924, jsc#SLE-24814).\n- KVM: SVM: Define sev_features and VMPL field in the VMSA (jsc#SLE-19924, jsc#SLE-24814).\n- KVM: SVM: Disable SEV-ES support if MMIO caching is disable (git-fixes).\n- KVM: SVM: Do not BUG if userspace injects an interrupt with GIF=0 (git-fixes).\n- KVM: SVM: Do not intercept #GP for SEV guests (git-fixes).\n- KVM: SVM: Exit to userspace on ENOMEM/EFAULT GHCB errors (git-fixes).\n- KVM: SVM: Stuff next_rip on emulated INT3 injection if NRIPS is supported (git-fixes).\n- KVM: SVM: Unwind \u0027speculative\u0027 RIP advancement if INTn injection \u0027fails\u0027 (git-fixes).\n- KVM: SVM: Update the SEV-ES save area mapping (jsc#SLE-19924, jsc#SLE-24814).\n- KVM: SVM: adjust register allocation for __svm_vcpu_run() (git-fixes).\n- KVM: SVM: fix panic on out-of-bounds guest IRQ (git-fixes).\n- KVM: SVM: fix tsc scaling cache logic (bsc#1203263).\n- KVM: SVM: move guest vmsave/vmload back to assembly (git-fixes).\n- KVM: SVM: replace regs argument of __svm_vcpu_run() with vcpu_svm (git-fixes).\n- KVM: SVM: retrieve VMCB from assembly (git-fixes).\n- KVM: VMX: Add helper to check if the guest PMU has PERF_GLOBAL_CTRL (git-fixes).\n- KVM: VMX: Drop bits 31:16 when shoving exception error code into VMCS (git-fixes).\n- KVM: VMX: Heed the \u0027msr\u0027 argument in msr_write_intercepted() (git-fixes).\n- KVM: VMX: Inject #PF on ENCLS as \u0027emulated\u0027 #PF (git-fixes).\n- KVM: VMX: Mark all PERF_GLOBAL_(OVF)_CTRL bits reserved if there\u0027s no vPMU (git-fixes).\n- KVM: VMX: Print VM-instruction error as unsigned (git-fixes).\n- KVM: VMX: clear vmx_x86_ops.sync_pir_to_irr if APICv is disabled (bsc#1205007).\n- KVM: VMX: fully disable SGX if SECONDARY_EXEC_ENCLS_EXITING unavailable (git-fixes).\n- KVM: VMX: prepare sync_pir_to_irr for running with APICv disabled (git-fixes).\n- KVM: VMX: switch blocked_vcpu_on_cpu_lock to raw spinlock (git-fixes).\n- KVM: X86: Fix when shadow_root_level=5 \u0026\u0026 guest root_level\u0026lt;4 (git-fixes).\n- KVM: X86: Use vcpu-\u003earch.walk_mmu for kvm_mmu_invlpg() (git-fixes).\n- KVM: X86: avoid uninitialized \u0027fault.async_page_fault\u0027 from fixed-up #PF (git-fixes).\n- KVM: arm64: Avoid setting the upper 32 bits of TCR_EL2 and CPTR_EL2 (bsc#1201442)\n- KVM: fix avic_set_running for preemptable kernels (git-fixes).\n- KVM: nVMX: Always enable TSC scaling for L2 when it was enabled for L1 (git-fixes).\n- KVM: nVMX: Attempt to load PERF_GLOBAL_CTRL on nVMX xfer iff it exists (git-fixes).\n- KVM: nVMX: Defer APICv updates while L2 is active until L1 is active (git-fixes).\n- KVM: nVMX: Ignore SIPI that arrives in L2 when vCPU is not in WFS (git-fixes).\n- KVM: nVMX: Inject #UD if VMXON is attempted with incompatible CR0/CR4 (git-fixes).\n- KVM: nVMX: Let userspace set nVMX MSR to any _host_ supported value (git-fixes).\n- KVM: nVMX: Rename handle_vm{on,off}() to handle_vmx{on,off}() (git-fixes).\n- KVM: nVMX: Set UMIP bit CR4_FIXED1 MSR when emulating UMIP (git-fixes).\n- KVM: nVMX: Snapshot pre-VM-Enter BNDCFGS for !nested_run_pending case (git-fixes).\n- KVM: nVMX: Snapshot pre-VM-Enter DEBUGCTL for !nested_run_pending case (git-fixes).\n- KVM: nVMX: Synthesize TRIPLE_FAULT for L2 if emulation is required (git-fixes).\n- KVM: nVMX: Unconditionally purge queued/injected events on nested \u0027exit\u0027 (git-fixes).\n- KVM: nVMX: do not use vcpu-\u003earch.efer when checking host state on nested state load (git-fixes).\n- KVM: s390: Add a routine for setting userspace CPU state (git-fixes jsc#PED-611).\n- KVM: s390: Clarify SIGP orders versus STOP/RESTART (git-fixes).\n- KVM: s390: Simplify SIGP Set Arch handling (git-fixes jsc#PED-611).\n- KVM: s390: pv: do not allow userspace to set the clock under PV (git-fixes).\n- KVM: s390: pv: do not present the ecall interrupt twice (bsc#1203229 LTC#199905).\n- KVM: s390: pv: leak the topmost page table when destroy fails (git-fixes).\n- KVM: s390x: fix SCK locking (git-fixes).\n- KVM: selftests: Make sure kvm_create_max_vcpus test won\u0027t hit RLIMIT_NOFILE (git-fixes).\n- KVM: selftests: Silence compiler warning in the kvm_page_table_test (git-fixes).\n- KVM: x86/emulator: Fix handing of POP SS to correctly set interruptibility (git-fixes).\n- KVM: x86/mmu: Do not advance iterator after restart due to yielding (git-fixes).\n- KVM: x86/mmu: Do not freak out if pml5_root is NULL on 4-level host (git-fixes).\n- KVM: x86/mmu: Fix wrong/misleading comments in TDP MMU fast zap (git-fixes).\n- KVM: x86/mmu: Move \u0027invalid\u0027 check out of kvm_tdp_mmu_get_root() (git-fixes).\n- KVM: x86/mmu: Retry page fault if root is invalidated by memslot update (git-fixes).\n- KVM: x86/mmu: WARN if old _or_ new SPTE is REMOVED in non-atomic path (git-fixes).\n- KVM: x86/mmu: Zap _all_ roots when unmapping gfn range in TDP MMU (git-fixes).\n- KVM: x86/mmu: fix memoryleak in kvm_mmu_vendor_module_init() (git-fixes).\n- KVM: x86/mmu: include EFER.LMA in extended mmu role (git-fixes).\n- KVM: x86/mmu: make apf token non-zero to fix bug (git-fixes).\n- KVM: x86/pmu: Add pmc-\u003eintr to refactor kvm_perf_overflow{_intr}() (git-fixes).\n- KVM: x86/pmu: Do not truncate the PerfEvtSeln MSR when creating a perf event (git-fixes).\n- KVM: x86/pmu: Fix and isolate TSX-specific performance event logic (git-fixes).\n- KVM: x86/pmu: Fix available_event_types check for REF_CPU_CYCLES event (git-fixes).\n- KVM: x86/pmu: Refactoring find_arch_event() to pmc_perf_hw_id() (git-fixes).\n- KVM: x86/pmu: Update AMD PMC sample period to fix guest NMI-watchdog (git-fixes).\n- KVM: x86/pmu: Use different raw event masks for AMD and Intel (git-fixes).\n- KVM: x86/svm: Account for family 17h event renumberings in amd_pmc_perf_hw_id (git-fixes).\n- KVM: x86: Add KVM_CAP_ENABLE_CAP to x86 (git-fixes).\n- KVM: x86: Add compat handler for KVM_X86_SET_MSR_FILTER (git-fixes).\n- KVM: x86: Always set kvm_run-\u003eif_flag (git-fixes).\n- KVM: x86: Avoid theoretical NULL pointer dereference in kvm_irq_delivery_to_apic_fast() (git-fixes).\n- KVM: x86: Check lapic_in_kernel() before attempting to set a SynIC irq (git-fixes).\n- KVM: x86: Forbid VMM to set SYNIC/STIMER MSRs when SynIC wasn\u0027t activated (git-fixes).\n- KVM: x86: Forcibly leave nested virt when SMM state is toggled (git-fixes).\n- KVM: x86: Fully initialize \u0027struct kvm_lapic_irq\u0027 in kvm_pv_kick_cpu_op() (git-fixes).\n- KVM: x86: Hide IA32_PLATFORM_DCA_CAP[31:0] from the guest (git-fixes).\n- KVM: x86: Inject #UD on emulated XSETBV if XSAVES isn\u0027t enabled (git-fixes).\n- KVM: x86: Keep MSR_IA32_XSS unchanged for INIT (git-fixes).\n- KVM: x86: Mark TSS busy during LTR emulation _after_ all fault checks (git-fixes).\n- KVM: x86: Mask off reserved bits in CPUID.80000001H (git-fixes).\n- KVM: x86: Mask off reserved bits in CPUID.80000006H (git-fixes).\n- KVM: x86: Mask off reserved bits in CPUID.80000008H (git-fixes).\n- KVM: x86: Mask off reserved bits in CPUID.8000001AH (git-fixes).\n- KVM: x86: Move lookup of indexed CPUID leafs to helper (jsc#SLE-19924, jsc#SLE-24814).\n- KVM: x86: Register perf callbacks after calling vendor\u0027s hardware_setup() (git-fixes).\n- KVM: x86: Report error when setting CPUID if Hyper-V allocation fails (git-fixes).\n- KVM: x86: Retry page fault if MMU reload is pending and root has no sp (bsc#1205744).\n- KVM: x86: SVM: do not passthrough SMAP/SMEP/PKE bits in !NPT \u0026\u0026 !gCR0.PG case (git-fixes).\n- KVM: x86: Set error code to segment selector on LLDT/LTR non-canonical #GP (git-fixes).\n- KVM: x86: Signal #GP, not -EPERM, on bad WRMSR(MCi_CTL/STATUS) (git-fixes).\n- KVM: x86: Sync the states size with the XCR0/IA32_XSS at, any time (git-fixes).\n- KVM: x86: Treat #DBs from the emulator as fault-like (code and DR7.GD=1) (git-fixes).\n- KVM: x86: Update vPMCs when retiring branch instructions (git-fixes).\n- KVM: x86: Update vPMCs when retiring instructions (git-fixes).\n- KVM: x86: Use __try_cmpxchg_user() to emulate atomic accesses (git-fixes).\n- KVM: x86: Use __try_cmpxchg_user() to update guest PTE A/D bits (git-fixes).\n- KVM: x86: avoid loading a vCPU after .vm_destroy was called (git-fixes).\n- KVM: x86: check PIR even for vCPUs with disabled APICv (git-fixes).\n- KVM: x86: do not report preemption if the steal time cache is stale (git-fixes).\n- KVM: x86: emulator: em_sysexit should update ctxt-\u003emode (git-fixes).\n- KVM: x86: emulator: introduce emulator_recalc_and_set_mode (git-fixes).\n- KVM: x86: emulator: update the emulation mode after CR0 write (git-fixes).\n- KVM: x86: emulator: update the emulation mode after rsm (git-fixes).\n- KVM: x86: hyper-v: Drop redundant \u0027ex\u0027 parameter from kvm_hv_flush_tlb() (git-fixes).\n- KVM: x86: hyper-v: Drop redundant \u0027ex\u0027 parameter from kvm_hv_send_ipi() (git-fixes).\n- KVM: x86: hyper-v: HVCALL_SEND_IPI_EX is an XMM fast hypercall (git-fixes).\n- KVM: x86: ignore APICv if LAPIC is not enabled (git-fixes).\n- KVM: x86: nSVM/nVMX: set nested_run_pending on VM entry which is a result of RSM (git-fixes).\n- KVM: x86: nSVM: fix potential NULL derefernce on nested migration (git-fixes).\n- KVM: x86: nSVM: mark vmcb01 as dirty when restoring SMM saved state (git-fixes).\n- KVM: x86: remove PMU FIXED_CTR3 from msrs_to_save_all (git-fixes).\n- KVM: x86: revalidate steal time cache if MSR value changes (git-fixes).\n- KVM: x86: use a separate asm-offsets.c file (git-fixes).\n- MIPS: Loongson: Use hwmon_device_register_with_groups() to register hwmon (git-fixes).\n- NFC: nci: Bounds check struct nfc_target arrays (git-fixes).\n- NFC: nci: fix memory leak in nci_rx_data_packet() (git-fixes).\n- NFS: Fix WARN_ON due to unionization of nfs_inode.nrequests (git-fixes).\n- NFS: Fix another fsync() issue after a server reboot (git-fixes).\n- NFS: LOOKUP_DIRECTORY is also ok with symlinks (git-fixes).\n- NFSD: Clamp WRITE offsets (git-fixes).\n- NFSD: Clean up the show_nf_flags() macro (git-fixes).\n- NFSD: Fix NFSv3 SETATTR/CREATE\u0027s handling of large file sizes (git-fixes).\n- NFSD: Fix ia_size underflow (git-fixes).\n- NFSD: Fix offset type in I/O trace points (git-fixes).\n- NFSD: Fix possible sleep during nfsd4_release_lockowner() (git-fixes).\n- NFSD: prevent integer overflow on 32 bit systems (git-fixes).\n- NFSD: prevent underflow in nfssvc_decode_writeargs() (git-fixes).\n- NFSD: restore EINVAL error translation in nfsd_commit() (git-fixes).\n- NFSv4.1: Do not decrease the value of seq_nr_highest_sent (git-fixes).\n- NFSv4.1: Handle NFS4ERR_DELAY replies to OP_SEQUENCE correctly (git-fixes).\n- NFSv4.1: RECLAIM_COMPLETE must handle EACCES (git-fixes).\n- NFSv4.2 fix problems with __nfs42_ssc_open (git-fixes).\n- NFSv4.2: Update mode bits after ALLOCATE and DEALLOCATE (git-fixes).\n- NFSv4: Fix races in the legacy idmapper upcall (git-fixes).\n- NFSv4: Fixes for nfs4_inode_return_delegation() (git-fixes).\n- NFSv4: Turn off open-by-filehandle and NFS re-export for NFSv4.0 (git-fixes).\n- NTB: ntb_tool: uninitialized heap data in tool_fn_write() (git-fixes).\n- PCI/ACPI: Guard ARM64-specific mcfg_quirks (git-fixes).\n- PCI/AER: Iterate over error counters instead of error strings (git-fixes).\n- PCI/ASPM: Correct LTR_L1.2_THRESHOLD computation (git-fixes).\n- PCI/ASPM: Ignore L1 PM Substates if device lacks capability (git-fixes).\n- PCI/ASPM: Make Intel DG2 L1 acceptable latency unlimited (jsc#PED-387).\n- PCI/portdrv: Do not disable AER reporting in get_port_device_capability() (git-fixes).\n- PCI: Add ACS quirk for Broadcom BCM5750x NICs (git-fixes).\n- PCI: Correct misspelled words (git-fixes).\n- PCI: Disable MSI for Tegra234 Root Ports (git-fixes).\n- PCI: Fix used_buses calculation in pci_scan_child_bus_extend() (git-fixes).\n- PCI: Move PCI_VENDOR_ID_MICROSOFT/PCI_DEVICE_ID_HYPERV_VIDEO definitions to pci_ids.h (git-fixes).\n- PCI: Prefer \u0027unsigned int\u0027 over bare \u0027unsigned\u0027 (git-fixes).\n- PCI: Sanitise firmware BAR assignments behind a PCI-PCI bridge (git-fixes).\n- PCI: aardvark: Fix reporting Slot capabilities on emulated bridge (git-fixes).\n- PCI: dwc: Add unroll iATU space support to dw_pcie_disable_atu() (git-fixes).\n- PCI: dwc: Always enable CDM check if \u0027snps,enable-cdm-check\u0027 exists (git-fixes).\n- PCI: dwc: Deallocate EPC memory on dw_pcie_ep_init() errors (git-fixes).\n- PCI: dwc: Disable outbound windows only for controllers using iATU (git-fixes).\n- PCI: dwc: Set INCREASE_REGION_SIZE flag based on limit address (git-fixes).\n- PCI: dwc: Stop link on host_init errors and de-initialization (git-fixes).\n- PCI: endpoint: Do not stop controller when unbinding endpoint function (git-fixes).\n- PCI: hv: Add validation for untrusted Hyper-V values (git-fixes).\n- PCI: hv: Fix synchronization between channel callback and hv_compose_msi_msg() (bsc#1204017).\n- PCI: hv: Fix synchronization between channel callback and hv_pci_bus_exit() (bsc#1204017).\n- PCI: hv: Fix the definition of vector in hv_compose_msi_msg() (git-fixes).\n- PCI: hv: Only reuse existing IRTE allocation for Multi-MSI (bsc#1200845).\n- PCI: hv: Use vmbus_requestor to generate transaction IDs for VMbus hardening (bsc#1204017).\n- PCI: mediatek-gen3: Change driver name to mtk-pcie-gen3 (git-fixes).\n- PCI: microchip: Fix refcount leak in mc_pcie_init_irq_domains() (git-fixes).\n- PCI: qcom: Power on PHY before IPQ8074 DBI register accesses (git-fixes).\n- PCI: qcom: Set up rev 2.1.0 PARF_PHY before enabling clocks (git-fixes).\n- PCI: tegra194: Fix PM error handling in tegra_pcie_config_ep() (git-fixes).\n- PCI: tegra194: Fix Root Port interrupt handling (git-fixes).\n- PCI: tegra194: Fix link up retry sequence (git-fixes).\n- PM: domains: Ensure genpd_debugfs_dir exists before remove (git-fixes).\n- PM: domains: Fix handling of unavailable/disabled idle states (git-fixes).\n- PM: hibernate: Allow hybrid sleep to work with s2idle (git-fixes).\n- PM: hibernate: defer device probing when resuming from hibernation (git-fixes).\n- RDMA/cm: Fix memory leak in ib_cm_insert_listen (git-fixes)\n- RDMA/cm: Use SLID in the work completion as the DLID in responder side (git-fixes)\n- RDMA/cma: Fix arguments order in net device validation (git-fixes)\n- RDMA/cma: Use output interface for net_dev check (git-fixes)\n- RDMA/core: Fix null-ptr-deref in ib_core_cleanup() (git-fixes)\n- RDMA/hfi1: Fix potential integer multiplication overflow errors (git-fixes)\n- RDMA/hfi1: Prevent panic when SDMA is disabled (git-fixes)\n- RDMA/hfi1: Prevent use of lock before it is initialized (git-fixes)\n- RDMA/hfi1: fix potential memory leak in setup_base_ctxt() (git-fixes)\n- RDMA/hns: Add the detection for CMDQ status in the device initialization process (git-fixes)\n- RDMA/hns: Correct the type of variables participating in the shift operation (git-fixes)\n- RDMA/hns: Disable local invalidate operation (git-fixes)\n- RDMA/hns: Fix incorrect clearing of interrupt status register (git-fixes)\n- RDMA/hns: Fix supported page size (git-fixes)\n- RDMA/hns: Fix wrong fixed value of qp-\u003erq.wqe_shift (git-fixes)\n- RDMA/hns: Remove magic number (git-fixes)\n- RDMA/hns: Remove the num_cqc_timer variable (git-fixes)\n- RDMA/hns: Remove the num_qpc_timer variable (git-fixes)\n- RDMA/hns: Remove unnecessary check for the sgid_attr when modifying QP (git-fixes)\n- RDMA/hns: Replace tab with space in the right-side comments (git-fixes)\n- RDMA/hns: Use hr_reg_xxx() instead of remaining roce_set_xxx() (git-fixes)\n- RDMA/irdma: Add support for address handle re-use (git-fixes)\n- RDMA/irdma: Align AE id codes to correct flush code and event (git-fixes)\n- RDMA/irdma: Do not advertise 1GB page size for x722 (git-fixes)\n- RDMA/irdma: Fix VLAN connection with wildcard address (git-fixes)\n- RDMA/irdma: Fix a window for use-after-free (git-fixes)\n- RDMA/irdma: Fix deadlock in irdma_cleanup_cm_core() (git-fixes)\n- RDMA/irdma: Fix setting of QP context err_rq_idx_valid field (git-fixes)\n- RDMA/irdma: Fix sleep from invalid context BUG (git-fixes)\n- RDMA/irdma: Move union irdma_sockaddr to header file (git-fixes)\n- RDMA/irdma: Remove the unnecessary variable saddr (git-fixes)\n- RDMA/irdma: Report RNR NAK generation in device caps (git-fixes)\n- RDMA/irdma: Report the correct max cqes from query device (git-fixes)\n- RDMA/irdma: Return correct WC error for bind operation failure (git-fixes)\n- RDMA/irdma: Return error on MR deregister CQP failure (git-fixes)\n- RDMA/irdma: Use net_type to check network type (git-fixes)\n- RDMA/irdma: Use s/g array in post send only when its valid (git-fixes)\n- RDMA/irdma: Validate udata inlen and outlen (git-fixes)\n- RDMA/mlx5: Add missing check for return value in get namespace flow (git-fixes)\n- RDMA/mlx5: Do not compare mkey tags in DEVX indirect mkey (git-fixes)\n- RDMA/mlx5: Set local port to one when accessing counters (git-fixes)\n- RDMA/qedr: Fix potential memory leak in __qedr_alloc_mr() (git-fixes)\n- RDMA/qedr: Fix reporting QP timeout attribute (git-fixes)\n- RDMA/qedr: clean up work queue on failure in qedr_alloc_resources() (git-fixes)\n- RDMA/rtrs-clt: Use the right sg_cnt after ib_dma_map_sg (git-fixes)\n- RDMA/rtrs-srv: Fix modinfo output for stringify (git-fixes)\n- RDMA/rxe: Fix \u0027kernel NULL pointer dereference\u0027 error (git-fixes)\n- RDMA/rxe: Fix deadlock in rxe_do_local_ops() (git-fixes)\n- RDMA/rxe: Fix error unwind in rxe_create_qp() (git-fixes)\n- RDMA/rxe: Fix mw bind to allow any consumer key portion (git-fixes)\n- RDMA/rxe: Fix resize_finish() in rxe_queue.c (git-fixes)\n- RDMA/rxe: Fix rnr retry behavior (git-fixes)\n- RDMA/rxe: Fix the error caused by qp-\u003esk (git-fixes)\n- RDMA/rxe: For invalidate compare according to set keys in mr (git-fixes)\n- RDMA/rxe: Generate a completion for unsupported/invalid opcode (git-fixes)\n- RDMA/rxe: Limit the number of calls to each tasklet (git-fixes)\n- RDMA/rxe: Remove useless pkt parameters (git-fixes)\n- RDMA/siw: Always consume all skbuf data in sk_data_ready() upcall. (git-fixes)\n- RDMA/siw: Fix QP destroy to wait for all references dropped. (git-fixes)\n- RDMA/siw: Fix duplicated reported IW_CM_EVENT_CONNECT_REPLY event (git-fixes)\n- RDMA/siw: Pass a pointer to virt_to_page() (git-fixes)\n- RDMA/srp: Fix srp_abort() (git-fixes)\n- RDMA/srp: Handle dev_set_name() failure (git-fixes)\n- RDMA/srp: Rework the srp_add_port() error path (git-fixes)\n- RDMA/srp: Set scmnd-\u003eresult only when scmnd is not NULL (git-fixes)\n- RDMA/srp: Support more than 255 rdma ports (git-fixes)\n- RDMA/srp: Use the attribute group mechanism for sysfs attributes (git-fixes)\n- RDMA/srpt: Duplicate port name members (git-fixes)\n- RDMA/srpt: Fix a use-after-free (git-fixes)\n- RDMA/srpt: Introduce a reference count in struct srpt_device (git-fixes)\n- RDMA/usnic: fix set-but-not-unused variable \u0027flags\u0027 warning (git-fixes)\n- RDMA: remove useless condition in siw_create_cq() (git-fixes)\n- Reduce client smbdirect max receive segment size (bsc#1193629).\n- Refresh nvme in-band authentication patches (bsc#1199086)\n- Refresh patches.suse/iommu-vt-d-Acquiring-lock-in-domain-ID-allocation-helpers Fix spin deadlock in intel_iommu (bsc#1203505)\n- Refresh patches.suse/iwlwifi-module-firmware-ucode-fix.patch (bsc#1202131) Now iwlwifi queries *-72.ucode, but again, this is non-existing version. Correct to the existing *-71.ucode\n- Refresh patches.suse/ppc64-kdump-Limit-kdump-base-to-512MB.patch to upstream version.\n- Remove doubly applied amdgpu patches\n- Replace the in-house patch by the above upstream version, patches.suse/md-raid0-fix-buffer-overflow-at-debug-print.patch.\n- Revert \u0027ALSA: hda: cs35l41: Allow compilation test on non-ACPI configurations\u0027 (bsc#1203699).\n- Revert \u0027ALSA: usb-audio: Split endpoint setups for hw_params and prepare\u0027 (git-fixes).\n- Revert \u0027SUNRPC: Remove unreachable error condition\u0027 (git-fixes).\n- Revert \u0027arm64: Mitigate MTE issues with str{n}cmp()\u0027 (git-fixes)\n- Revert \u0027clk: core: Honor CLK_OPS_PARENT_ENABLE for clk gate ops\u0027 (git-fixes).\n- Revert \u0027constraints: increase disk space for all architectures\u0027 (bsc#1203693). This reverts commit 43a9011f904bc7328d38dc340f5e71aecb6b19ca.\n- Revert \u0027crypto: qat - reduce size of mapped region\u0027 (git-fixes).\n- Revert \u0027drivers/video/backlight/platform_lcd.c: add support for device tree based probe\u0027 (git-fixes).\n- Revert \u0027drm/amdgpu: use dirty framebuffer helper\u0027 (git-fixes).\n- Revert \u0027drm/i915: Hold reference to intel_context over life of i915_request\u0027 (git-fixes).\n- Revert \u0027drm/udl: Kill pending URBs at suspend and disconnect\u0027 (bsc#1195917).\n- Revert \u0027drm/vc4: hvs: Reset muxes at probe time (git-fixes).\u0027 (bsc#1202341) This reverts commit 303122d0f2160411fa1068220bc59849d848550d. The reverted change clears hardware state on the RPi4, which leaves the screen blank. Without it, the display works correctly.\n- Revert \u0027drm: bridge: analogix/dp: add panel prepare/unprepare in suspend/resume time\u0027 (git-fixes).\n- Revert \u0027firmware: arm_scmi: Add clock management to the SCMI power domain\u0027 (git-fixes).\n- Revert \u0027ice: Hide bus-info in ethtool for PRs in switchdev mode\u0027 (git-fixes).\n- Revert \u0027ipv6: Honor all IPv6 PIO Valid Lifetime values\u0027 (bsc#1202989).\n- Revert \u0027net: phy: meson-gxl: improve link-up behavior\u0027 (git-fixes).\n- Revert \u0027net: usb: ax88179_178a needs FLAG_SEND_ZLP\u0027 (git-fixes).\n- Revert \u0027pNFS: nfs3_set_ds_client should set NFS_CS_NOPING\u0027 (git-fixes).\n- Revert \u0027powerpc/rtas: Implement reentrant rtas call\u0027 (bsc#1203664 ltc#199236).\n- Revert \u0027scripts/mod/modpost.c: permit \u0027.cranges\u0027 secton for sh64 architecture.\u0027 (git-fixes).\n- Revert \u0027tty: n_gsm: avoid call of sleeping functions from atomic context\u0027 (git-fixes).\n- Revert \u0027tty: n_gsm: replace kicktimer with delayed_work\u0027 (git-fixes).\n- Revert \u0027usb: add quirks for Lenovo OneLink+ Dock\u0027 (git-fixes).\n- Revert \u0027usb: dwc3: disable USB core PHY management\u0027 (git-fixes).\n- Revert \u0027usb: gadget: udc-xilinx: replace memcpy with memcpy_toio\u0027 (git-fixes).\n- Revert \u0027usb: storage: Add quirk for Samsung Fit flash\u0027 (git-fixes).\n- Revert \u0027workqueue: remove unused cancel_work()\u0027 (bsc#1204933).\n- Revert \u0027x86/sev: Expose sev_es_ghcb_hv_call() for use by HyperV\u0027 (bsc#1190497).\n- Revert selftest patches that have been reverted in stable-5.15.y\n- SCSI: scsi_probe_lun: retry INQUIRY after timeout (bsc#1189297).\n- SMB3: fix lease break timeout when multiple deferred close handles for the same file (bsc#1193629).\n- SUNRPC: Do not call connect() more than once on a TCP socket (git-fixes).\n- SUNRPC: Do not leak sockets in xs_local_connect() (git-fixes).\n- SUNRPC: Fix NFSD\u0027s request deferral on RDMA transports (git-fixes).\n- SUNRPC: Fix READ_PLUS crasher (git-fixes).\n- SUNRPC: Fix xdr_encode_bool() (git-fixes).\n- SUNRPC: Prevent immediate close+reconnect (git-fixes).\n- SUNRPC: RPC level errors should set task-\u003etk_rpc_status (git-fixes).\n- SUNRPC: Reinitialise the backchannel request buffers before reuse (git-fixes).\n- USB: Fix ehci infinite suspend-resume loop issue in zhaoxin (git-fixes).\n- USB: Follow-up to SPDX GPL-2.0+ identifiers addition - remove now useless comments (git-fixes).\n- USB: Follow-up to SPDX identifiers addition - remove now useless comments (git-fixes).\n- USB: add RESET_RESUME quirk for NVIDIA Jetson devices in RCM (git-fixes).\n- USB: bcma: Make GPIO explicitly optional (git-fixes).\n- USB: cdc-acm: Add Icom PMR F3400 support (0c26:0020) (git-fixes).\n- USB: core: Fix RST error in hub.c (git-fixes).\n- USB: core: Prevent nested device-reset calls (git-fixes).\n- USB: serial: ch314: use usb_control_msg_recv() (git-fixes).\n- USB: serial: ch341: fix disabled rx timer on older devices (git-fixes).\n- USB: serial: ch341: fix lost character on LCR updates (git-fixes).\n- USB: serial: console: move mutex_unlock() before usb_serial_put() (git-fixes).\n- USB: serial: cp210x: add Decagon UCA device id (git-fixes).\n- USB: serial: fix tty-port initialized comments (git-fixes).\n- USB: serial: ftdi_sio: add Omron CS1W-CIF31 device id (git-fixes).\n- USB: serial: ftdi_sio: fix 300 bps rate for SIO (git-fixes).\n- USB: serial: option: add Fibocom FM160 0x0111 composition (git-fixes).\n- USB: serial: option: add Quectel BG95 0x0203 composition (git-fixes).\n- USB: serial: option: add Quectel EM060K modem (git-fixes).\n- USB: serial: option: add Quectel RM520N (git-fixes).\n- USB: serial: option: add Sierra Wireless EM9191 (git-fixes).\n- USB: serial: option: add support for Cinterion MV32-WA/WB RmNet mode (git-fixes).\n- USB: serial: option: add support for OPPO R11 diag port (git-fixes).\n- USB: serial: option: add u-blox LARA-L6 modem (git-fixes).\n- USB: serial: option: add u-blox LARA-R6 00B modem (git-fixes).\n- USB: serial: option: remove old LARA-R6 PID (git-fixes).\n- USB: serial: qcserial: add new usb-id for Dell branded EM7455 (git-fixes).\n- XArray: Update the LRU list in xas_split() (git-fixes).\n- add another bug reference to some hyperv changes (bsc#1205617).\n- apparmor: Fix failed mount permission check error message (git-fixes).\n- apparmor: Fix memleak in aa_simple_write_to_buffer() (git-fixes).\n- apparmor: fix aa_label_asxprint return check (git-fixes).\n- apparmor: fix absroot causing audited secids to begin with = (git-fixes).\n- apparmor: fix overlapping attachment computation (git-fixes).\n- apparmor: fix quiet_denied for file rules (git-fixes).\n- apparmor: fix reference count leak in aa_pivotroot() (git-fixes).\n- apparmor: fix setting unconfined mode on a loaded profile (git-fixes).\n- arcnet: fix potential memory leak in com20020_probe() (git-fixes).\n- arm64/bti: Disable in kernel BTI when cross section thunks are broken (git-fixes)\n- arm64/mm: Consolidate TCR_EL1 fields (git-fixes).\n- arm64/syscall: Include asm/ptrace.h in syscall_wrapper header (git-fixes).\n- arm64: Add AMPERE1 to the Spectre-BHB affected list (git-fixes).\n- arm64: Do not forget syscall when starting a new thread (git-fixes).\n- arm64: Fix bit-shifting UB in the MIDR_CPU_MODEL() macro (git-fixes)\n- arm64: Fix match_list for erratum 1286807 on Arm Cortex-A76 (git-fixes).\n- arm64: cpufeature: Allow different PMU versions in ID_DFR0_EL1 (git-fixes).\n- arm64: dts: allwinner: a64: orangepi-win: Fix LED node name (git-fixes).\n- arm64: dts: imx8: correct clock order (git-fixes).\n- arm64: dts: imx8mm: Fix NAND controller size-cells (git-fixes).\n- arm64: dts: imx8mn: Fix NAND controller size-cells (git-fixes).\n- arm64: dts: imx8mp: Add snps,gfladj-refclk-lpm-sel quirk to USB nodes (git-fixes).\n- arm64: dts: imx8mq-librem5: Add bq25895 as max17055\u0027s power supply (git-fixes).\n- arm64: dts: juno: Add thermal critical trip points (git-fixes).\n- arm64: dts: ls1088a: specify clock frequencies for the MDIO controllers (git-fixes).\n- arm64: dts: ls208xa: specify clock frequencies for the MDIO controllers (git-fixes).\n- arm64: dts: lx2160a: specify clock frequencies for the MDIO controllers (git-fixes).\n- arm64: dts: mt7622: fix BPI-R64 WPS button (git-fixes).\n- arm64: dts: mt8192: Fix idle-states entry-method (git-fixes).\n- arm64: dts: mt8192: Fix idle-states nodes naming scheme (git-fixes).\n- arm64: dts: qcom: ipq8074: fix NAND node name (git-fixes).\n- arm64: dts: qcom: msm8916: Fix typo in pronto remoteproc node (git-fixes).\n- arm64: dts: qcom: qcs404: Fix incorrect USB2 PHYs assignment (git-fixes).\n- arm64: dts: qcom: sa8155p-adp: Specify which LDO modes are allowed (git-fixes).\n- arm64: dts: qcom: sc7280: Cleanup the lpasscc node (git-fixes).\n- arm64: dts: qcom: sm8150-xperia-kumano: Specify which LDO modes are allowed (git-fixes).\n- arm64: dts: qcom: sm8250-xperia-edo: Specify which LDO modes are allowed (git-fixes).\n- arm64: dts: qcom: sm8250: add missing PCIe PHY clock-cells (git-fixes).\n- arm64: dts: qcom: sm8350-hdk: Specify which LDO modes are allowed (git-fixes).\n- arm64: dts: qcom: sm8350: fix UFS PHY serdes size (git-fixes).\n- arm64: dts: renesas: Fix thermal-sensors on single-zone sensors (git-fixes).\n- arm64: dts: renesas: beacon: Fix regulator node names (git-fixes).\n- arm64: dts: rockchip: Fix typo in lisense text for PX30.Core (git-fixes).\n- arm64: dts: rockchip: Pull up wlan wake# on Gru-Bob (git-fixes).\n- arm64: dts: rockchip: Remove \u0027enable-active-low\u0027 from rk3399-puma (git-fixes).\n- arm64: dts: rockchip: Set RK3399-Gru PCLK_EDP to 24 MHz (git-fixes).\n- arm64: dts: rockchip: add enable-strobe-pulldown to emmc phy on nanopi4 (git-fixes).\n- arm64: dts: rockchip: lower rk3399-puma-haikou SD controller clock frequency (git-fixes).\n- arm64: dts: ti: k3-j7200: fix main pinmux range (git-fixes).\n- arm64: dts: uniphier: Fix USB interrupts for PXs3 SoC (git-fixes).\n- arm64: efi: Fix handling of misaligned runtime regions and drop warning (git-fixes).\n- arm64: entry: avoid kprobe recursion (git-fixes).\n- arm64: errata: Add Cortex-A510 to the repeat tlbi list (git-fixes) Enable this errata fix configuration option to arm64/default.\n- arm64: errata: Add Cortex-A55 to the repeat tlbi list (git-fixes). Enable CONFIG_ARM64_ERRATUM_2441007, too\n- arm64: errata: Remove AES hwcap for COMPAT tasks (git-fixes) Enable CONFIG_ARM64_ERRATUM_1742098 in arm64/default\n- arm64: fix oops in concurrently setting insn_emulation sysctls (git-fixes).\n- arm64: fix rodata=full (git-fixes).\n- arm64: fix rodata=full again (git-fixes)\n- arm64: ftrace: fix module PLTs with mcount (git-fixes).\n- arm64: kasan: Revert \u0027arm64: mte: reset the page tag in page-\u003eflags\u0027 (git-fixes).\n- arm64: kexec_file: use more system keyrings to verify kernel image signature (bsc#1196444).\n- arm64: lib: Import latest version of Arm Optimized Routines\u0027 strcmp (git-fixes)\n- arm64: mte: Avoid setting PG_mte_tagged if no tags cleared or restored (git-fixes).\n- arm64: select TRACE_IRQFLAGS_NMI_SUPPORT (git-fixes)\n- arm64: set UXN on swapper page tables (git-fixes).\n- arm64: tegra: Fix SDMMC1 CD on P2888 (git-fixes).\n- arm64: tegra: Fixup SYSRAM references (git-fixes).\n- arm64: tegra: Mark BPMP channels as no-memory-wc (git-fixes).\n- arm64: tegra: Update Tegra234 BPMP channel addresses (git-fixes).\n- arm64: topology: fix possible overflow in amu_fie_setup() (git-fixes).\n- arm64: topology: move store_cpu_topology() to shared code (git-fixes).\n- arm_pmu: Validate single/group leader events (git-fixes).\n- asm-generic: remove a broken and needless ifdef conditional (git-fixes).\n- asm-generic: sections: refactor memory_intersects (git-fixes).\n- ata: ahci-imx: Fix MODULE_ALIAS (git-fixes).\n- ata: fix ata_id_has_devslp() (git-fixes).\n- ata: fix ata_id_has_dipm() (git-fixes).\n- ata: fix ata_id_has_ncq_autosense() (git-fixes).\n- ata: fix ata_id_sense_reporting_enabled() and ata_id_has_sense_reporting() (git-fixes).\n- ata: libahci_platform: Sanity check the DT child nodes number (git-fixes).\n- ata: libata-core: do not issue non-internal commands once EH is pending (git-fixes).\n- ata: libata-eh: Add missing command name (git-fixes).\n- ata: libata-scsi: fix SYNCHRONIZE CACHE (16) command failure (git-fixes).\n- ata: libata-scsi: simplify __ata_scsi_queuecmd() (git-fixes).\n- ata: libata-transport: fix double ata_host_put() in ata_tport_add() (git-fixes).\n- ata: libata-transport: fix error handling in ata_tdev_add() (git-fixes).\n- ata: libata-transport: fix error handling in ata_tlink_add() (git-fixes).\n- ata: libata-transport: fix error handling in ata_tport_add() (git-fixes).\n- ata: pata_legacy: fix pdc20230_set_piomode() (git-fixes).\n- ath10k: do not enforce interrupt trigger type (git-fixes).\n- ath11k: Fix incorrect debug_mask mappings (git-fixes).\n- ath11k: fix netdev open race (git-fixes).\n- atm: idt77252: fix use-after-free bugs caused by tst_timer (git-fixes).\n- audit: fix potential double free on error path from fsnotify_add_inode_mark (git-fixes).\n- audit: fix undefined behavior in bit shift for AUDIT_BIT (git-fixes).\n- ax25: Fix ax25 session cleanup problems (git-fixes).\n- batman-adv: Fix hang up with small MTU hard-interface (git-fixes).\n- bitfield.h: Fix \u0027type of reg too small for mask\u0027 test (git-fixes).\n- blk-cgroup: fix missing put device in error path from blkg_conf_pref() (git-fixes).\n- blk-mq: Properly init requests from blk_mq_alloc_request_hctx() (git-fixes).\n- blk-mq: do not create hctx debugfs dir until q-\u003edebugfs_dir is created (git-fixes).\n- blk-mq: fix io hung due to missing commit_rqs (git-fixes).\n- blk-wbt: call rq_qos_add() after wb_normal is initialized (git-fixes).\n- blktrace: Trace remapped requests correctly (git-fixes).\n- block/rnbd-srv: Set keep_id to true after mutex_trylock (git-fixes).\n- block: Do not reread partition table on exclusively open device (bsc#1190969).\n- block: Fix fsync always failed if once failed (bsc#1202779).\n- block: Fix wrong offset in bio_truncate() (bsc#1202780).\n- block: add bio_start_io_acct_time() to control start_time (git-fixes).\n- block: blk_queue_enter() / __bio_queue_enter() must return -EAGAIN for nowait (git-fixes).\n- block: drop unused includes in \u0026lt;linux/genhd.h\u003e (git-fixes).\n- block: fix rq-qos breakage from skipping rq_qos_done_bio() (bsc#1202781).\n- block: only mark bio as tracked if it really is tracked (bsc#1202782).\n- bnx2x: Invalidate fastpath HSI version for VFs (git-fixes).\n- bnx2x: Utilize firmware 7.13.21.0 (git-fixes).\n- bnx2x: fix built-in kernel driver load failure (git-fixes).\n- bnx2x: fix driver load from initrd (git-fixes).\n- bnxt_en: Fix bnxt_refclk_read() (git-fixes).\n- bnxt_en: Fix bnxt_reinit_after_abort() code path (git-fixes).\n- bnxt_en: fix livepatch query (git-fixes).\n- bnxt_en: reclaim max resources if sriov enable fails (git-fixes).\n- bonding: 802.3ad: fix no transmission of LACPDUs (git-fixes).\n- bonding: ARP monitor spams NETDEV_NOTIFY_PEERS notifiers (git-fixes).\n- bridge: switchdev: Fix memory leaks when changing VLAN protocol (git-fixes).\n- btrfs-fix-deadlock-between-quota-enable-and-other-qu.patch: (bsc#1205521).\n- btrfs: check if root is readonly while setting security xattr (bsc#1206147).\n- btrfs: do not allow compression on nodatacow files (bsc#1206149).\n- btrfs: export a helper for compression hard check (bsc#1206149).\n- btrfs: fix processing of delayed data refs during backref walking (bsc#1206056).\n- btrfs: fix processing of delayed tree block refs during backref walking (bsc#1206057).\n- btrfs: fix relocation crash due to premature return from btrfs_commit_transaction() (bsc#1203360).\n- btrfs: fix space cache corruption and potential double allocations (bsc#1203361).\n- btrfs: prevent subvol with swapfile from being deleted (bsc#1206035).\n- btrfs: properly flag filesystem with BTRFS_FEATURE_INCOMPAT_BIG_METADATA (git-fixes).\n- btrfs: send: always use the rbtree based inode ref management infrastructure (bsc#1206036).\n- btrfs: send: fix failures when processing inodes with no links (bsc#1206036).\n- btrfs: send: fix send failure of a subcase of orphan inodes (bsc#1206036).\n- btrfs: send: fix sending link commands for existing file paths (bsc#1206036).\n- btrfs: send: introduce recorded_ref_alloc and recorded_ref_free (bsc#1206036).\n- btrfs: send: refactor arguments of get_inode_info() (bsc#1206036).\n- btrfs: send: remove unused found_type parameter to lookup_dir_item_inode() (bsc#1206036).\n- btrfs: send: remove unused type parameter to iterate_inode_ref_t (bsc#1206036).\n- btrfs: send: use boolean types for current inode status (bsc#1206036).\n- bus: hisi_lpc: fix missing platform_device_put() in hisi_lpc_acpi_probe() (git-fixes).\n- bus: sunxi-rsb: Remove the shutdown callback (git-fixes).\n- bus: sunxi-rsb: Support atomic transfers (git-fixes).\n- ca8210: Fix crash by zero initializing data (git-fixes).\n- can: Break loopback loop on loopback documentation (git-fixes).\n- can: af_can: fix NULL pointer dereference in can_rx_register() (git-fixes).\n- can: bcm: check the result of can_send() in bcm_can_tx() (git-fixes).\n- can: cc770: cc770_isa_probe(): add missing free_cc770dev() (git-fixes).\n- can: do not increase rx statistics when generating a CAN rx error message frame (git-fixes).\n- can: do not increase rx_bytes statistics for RTR frames (git-fixes).\n- can: ems_usb: fix clang\u0027s -Wunaligned-access warning (git-fixes).\n- can: error: specify the values of data[5..7] of CAN error frames (git-fixes).\n- can: etas_es58x: es58x_init_netdev(): free netdev when register_candev() (git-fixes).\n- can: gs_usb: gs_can_open(): fix race dev-\u003ecan.state condition (git-fixes).\n- can: hi311x: do not report txerr and rxerr during bus-off (git-fixes).\n- can: j1939: j1939_send_one(): fix missing CAN header initialization (git-fixes).\n- can: j1939: j1939_sk_queue_activate_next_locked(): replace WARN_ON_ONCE with netdev_warn_once() (git-fixes).\n- can: j1939: transport: j1939_session_skb_drop_old(): spin_unlock_irqrestore() before kfree_skb() (git-fixes).\n- can: kvaser_usb: Fix possible completions during init_completion (git-fixes).\n- can: kvaser_usb: Fix use of uninitialized completion (git-fixes).\n- can: kvaser_usb: kvaser_usb_leaf: fix CAN clock frequency regression (git-fixes).\n- can: kvaser_usb: make use of units.h in assignment of frequency (git-fixes).\n- can: kvaser_usb: replace run-time checks with struct kvaser_usb_driver_info (git-fixes).\n- can: kvaser_usb_hydra: do not report txerr and rxerr during bus-off (git-fixes).\n- can: kvaser_usb_leaf: Fix CAN state after restart (git-fixes).\n- can: kvaser_usb_leaf: Fix TX queue out of sync after restart (git-fixes).\n- can: kvaser_usb_leaf: do not report txerr and rxerr during bus-off (git-fixes).\n- can: m_can: Add check for devm_clk_get (git-fixes).\n- can: m_can: fix typo prescalar -\u003e prescaler (git-fixes).\n- can: m_can: is_lec_err(): clean up LEC error handling (git-fixes).\n- can: m_can: pci: add missing m_can_class_free_dev() in probe/remove methods (git-fixes).\n- can: mcp251x: Fix race condition on receive interrupt (git-fixes).\n- can: mcp251x: mcp251x_can_probe(): add missing unregister_candev() in error path (git-fixes).\n- can: mcp251xfd: mcp251xfd_dump(): fix comment (git-fixes).\n- can: mcp251xfd: mcp251xfd_register_get_dev_id(): fix endianness conversion (git-fixes).\n- can: mcp251xfd: mcp251xfd_register_get_dev_id(): use correct length to read dev_id (git-fixes).\n- can: mscan: mpc5xxx: mpc5xxx_can_probe(): add missing put_clock() in error path (git-fixes).\n- can: netlink: allow configuring of fixed bit rates without need for do_set_bittiming callback (git-fixes).\n- can: netlink: allow configuring of fixed data bit rates without need for do_set_data_bittiming callback (git-fixes).\n- can: pch_can: do not report txerr and rxerr during bus-off (git-fixes).\n- can: pch_can: pch_can_error(): initialize errc before using it (git-fixes).\n- can: rcar_can: do not report txerr and rxerr during bus-off (git-fixes).\n- can: rx-offload: can_rx_offload_init_queue(): fix typo (git-fixes).\n- can: sja1000: do not report txerr and rxerr during bus-off (git-fixes).\n- can: sja1000_isa: sja1000_isa_probe(): add missing free_sja1000dev() (git-fixes).\n- can: sun4i_can: do not report txerr and rxerr during bus-off (git-fixes).\n- can: usb_8dev: do not report txerr and rxerr during bus-off (git-fixes).\n- capabilities: fix potential memleak on error path from vfs_getxattr_alloc() (git-fixes).\n- capabilities: fix undefined behavior in bit shift for CAP_TO_MASK (git-fixes).\n- ceph: allow ceph.dir.rctime xattr to be updatable (bsc#1206050).\n- ceph: avoid putting the realm twice when decoding snaps fails (bsc#1206051).\n- ceph: do not leak snap_rwsem in handle_cap_grant (bsc#1202823).\n- ceph: do not truncate file in atomic_open (bsc#1202824).\n- ceph: do not update snapshot context when there is no new snapshot (bsc#1206047).\n- ceph: fix inode reference leakage in ceph_get_snapdir() (bsc#1206048).\n- ceph: fix memory leak in ceph_readdir when note_last_dentry returns error (bsc#1206049).\n- ceph: properly handle statfs on multifs setups (bsc#1206045).\n- ceph: switch netfs read ops to use rreq-\u003einode instead of rreq-\u003emapping-\u003ehost (bsc#1206046).\n- ceph: use correct index when encoding client supported features (bsc#1202822).\n- cfg80211/mac80211: assume CHECKSUM_COMPLETE includes SNAP (bsc#1202131).\n- cgroup/cpuset: Enable update_tasks_cpumask() on top_cpuset (bsc#1204753).\n- cgroup: Add missing cpus_read_lock() to cgroup_attach_task_all() (bsc#1196869).\n- cgroup: Fix race condition at rebind_subsystems() (bsc#1203902).\n- cgroup: Fix threadgroup_rwsem \u0026lt;-\u003e cpus_read_lock() deadlock (bsc#1196869).\n- cgroup: Use separate src/dst nodes when preloading css_sets for migration (bsc#1201610).\n- cgroup: cgroup_get_from_id() must check the looked-up kn is a directory (bsc#1203906).\n- char: tpm: Protect tpm_pm_suspend with locks (git-fixes).\n- cifs: Add constructor/destructors for tcon-\u003ecfid (bsc#1193629).\n- cifs: Add helper function to check smb1+ server (bsc#1193629).\n- cifs: Do not access tcon-\u003ecfids-\u003ecfid directly from is_path_accessible (bsc#1193629).\n- cifs: Do not use tcon-\u003ecfid directly, use the cfid we get from open_cached_dir (bsc#1193629).\n- cifs: Fix connections leak when tlink setup failed (git-fixes).\n- cifs: Fix memory leak on the deferred close (bsc#1193629).\n- cifs: Fix memory leak when build ntlmssp negotiate blob failed (bsc#1193629).\n- cifs: Fix pages array leak when writedata alloc failed in cifs_writedata_alloc() (bsc#1193629).\n- cifs: Fix pages leak when writedata alloc failed in cifs_write_from_iter() (bsc#1193629).\n- cifs: Fix the error length of VALIDATE_NEGOTIATE_INFO message (bsc#1193629).\n- cifs: Fix wrong return value checking when GETFLAGS (git-fixes).\n- cifs: Fix xid leak in cifs_copy_file_range() (bsc#1193629).\n- cifs: Fix xid leak in cifs_create() (bsc#1193629).\n- cifs: Fix xid leak in cifs_flock() (bsc#1193629).\n- cifs: Fix xid leak in cifs_get_file_info_unix() (bsc#1193629).\n- cifs: Fix xid leak in cifs_ses_add_channel() (bsc#1193629).\n- cifs: Make tcon contain a wrapper structure cached_fids instead of cached_fid (bsc#1193629).\n- cifs: Move cached-dir functions into a separate file (bsc#1193629).\n- cifs: Replace a couple of one-element arrays with flexible-array members (bsc#1193629).\n- cifs: Use after free in debug code (git-fixes).\n- cifs: Use help macro to get the header preamble size (bsc#1193629).\n- cifs: Use help macro to get the mid header size (bsc#1193629).\n- cifs: add check for returning value of SMB2_close_init (git-fixes).\n- cifs: add check for returning value of SMB2_set_info_init (git-fixes).\n- cifs: add missing spinlock around tcon refcount (bsc#1193629).\n- cifs: alloc_mid function should be marked as static (bsc#1193629).\n- cifs: always initialize struct msghdr smb_msg completely (bsc#1193629).\n- cifs: always iterate smb sessions using primary channel (bsc#1193629).\n- cifs: avoid deadlocks while updating iface (bsc#1193629).\n- cifs: avoid unnecessary iteration of tcp sessions (bsc#1193629).\n- cifs: avoid use of global locks for high contention data (bsc#1193629).\n- cifs: cache the dirents for entries in a cached directory (bsc#1193629).\n- cifs: change iface_list from array to sorted linked list (bsc#1193629).\n- cifs: destage dirty pages before re-reading them for cache=none (bsc#1193629).\n- cifs: do not send down the destination address to sendmsg for a SOCK_STREAM (bsc#1193629).\n- cifs: drop the lease for cached directories on rmdir or rename (bsc#1193629).\n- cifs: during reconnect, update interface if necessary (bsc#1193629).\n- cifs: enable caching of directories for which a lease is held (bsc#1193629).\n- cifs: find and use the dentry for cached non-root directories also (bsc#1193629).\n- cifs: fix double-fault crash during ntlmssp (bsc#1193629).\n- cifs: fix lock length calculation (bsc#1193629).\n- cifs: fix memory leaks in session setup (bsc#1193629).\n- cifs: fix missing unlock in cifs_file_copychunk_range() (git-fixes).\n- cifs: fix race condition with delayed threads (bsc#1193629).\n- cifs: fix reconnect on smb3 mount types (bsc#1201427).\n- cifs: fix skipping to incorrect offset in emit_cached_dirents (bsc#1193629).\n- cifs: fix small mempool leak in SMB2_negotiate() (bsc#1193629).\n- cifs: fix static checker warning (bsc#1193629).\n- cifs: fix uninitialised var in smb2_compound_op() (bsc#1193629).\n- cifs: fix use-after-free caused by invalid pointer `hostname` (bsc#1193629).\n- cifs: fix use-after-free on the link name (bsc#1193629).\n- cifs: fix wrong unlock before return from cifs_tree_connect() (bsc#1193629).\n- cifs: improve handlecaching (bsc#1193629).\n- cifs: improve symlink handling for smb2+ (bsc#1193629).\n- cifs: lease key is uninitialized in smb1 paths (bsc#1193629).\n- cifs: lease key is uninitialized in two additional functions when smb1 (bsc#1193629).\n- cifs: list_for_each() -\u003e list_for_each_entry() (bsc#1193629).\n- cifs: misc: fix spelling typo in comment (bsc#1193629).\n- cifs: move from strlcpy with unused retval to strscpy (bsc#1193629).\n- cifs: periodically query network interfaces from server (bsc#1193629).\n- cifs: populate empty hostnames for extra channels (bsc#1193629).\n- cifs: prevent copying past input buffer boundaries (bsc#1193629).\n- cifs: remove \u0027cifs_\u0027 prefix from init/destroy mids functions (bsc#1193629).\n- cifs: remove initialization value (bsc#1193629).\n- cifs: remove minor build warning (bsc#1193629).\n- cifs: remove redundant initialization to variable mnt_sign_enabled (bsc#1193629).\n- cifs: remove remaining build warnings (bsc#1193629).\n- cifs: remove some camelCase and also some static build warnings (bsc#1193629).\n- cifs: remove unnecessary (void*) conversions (bsc#1193629).\n- cifs: remove unnecessary locking of chan_lock while freeing session (bsc#1193629).\n- cifs: remove unnecessary type castings (bsc#1193629).\n- cifs: remove unused server parameter from calc_smb_size() (bsc#1193629).\n- cifs: remove useless DeleteMidQEntry() (bsc#1193629).\n- cifs: remove useless parameter \u0027is_fsctl\u0027 from SMB2_ioctl() (bsc#1193629).\n- cifs: replace kfree() with kfree_sensitive() for sensitive data (bsc#1193629).\n- cifs: return correct error in -\u003ecalc_signature() (bsc#1193629).\n- cifs: return errors during session setup during reconnects (bsc#1193629).\n- cifs: revalidate mapping when doing direct writes (bsc#1193629).\n- cifs: secmech: use shash_desc directly, remove sdesc (bsc#1193629).\n- cifs: set rc to -ENOENT if we can not get a dentry for the cached dir (bsc#1193629).\n- cifs: skip extra NULL byte in filenames (bsc#1193629).\n- cifs: store a pointer to a fid in the cfid structure instead of the struct (bsc#1193629).\n- cifs: truncate the inode and mapping when we simulate fcollapse (bsc#1193629).\n- cifs: update cifs_ses::ip_addr after failover (bsc#1193629).\n- cifs: update internal module number (bsc#1193629).\n- cifs: use ALIGN() and round_up() macros (bsc#1193629).\n- cifs: use LIST_HEAD() and list_move() to simplify code (bsc#1193629).\n- cifs: when a channel is not found for server, log its connection id (bsc#1193629).\n- cifs: when insecure legacy is disabled shrink amount of SMB1 code (bsc#1193629).\n- clk: ast2600: BCLK comes from EPLL (git-fixes).\n- clk: at91: fix the build with binutils 2.27 (git-fixes).\n- clk: baikal-t1: Add SATA internal ref clock buffer (git-fixes).\n- clk: baikal-t1: Add shared xGMAC ref/ptp clocks internal parent (git-fixes).\n- clk: baikal-t1: Fix invalid xGMAC PTP clock divider (git-fixes).\n- clk: bcm2835: Make peripheral PLLC critical (git-fixes).\n- clk: bcm2835: Round UART input clock up (bsc#1188238)\n- clk: bcm2835: fix bcm2835_clock_rate_from_divisor declaration (git-fixes).\n- clk: bcm: rpi: Add support for VEC clock (bsc#1196632)\n- clk: bcm: rpi: Fix error handling of raspberrypi_fw_get_rate (git-fixes).\n- clk: bcm: rpi: Prevent out-of-bounds access (git-fixes).\n- clk: bcm: rpi: Use correct order for the parameters of devm_kcalloc() (git-fixes).\n- clk: berlin: Add of_node_put() for of_get_parent() (git-fixes).\n- clk: core: Fix runtime PM sequence in clk_core_unprepare() (git-fixes).\n- clk: core: Honor CLK_OPS_PARENT_ENABLE for clk gate ops (git-fixes).\n- clk: imx: imx6sx: remove the SET_RATE_PARENT flag for QSPI clocks (git-fixes).\n- clk: imx: scu: fix memleak on platform_device_add() fails (git-fixes).\n- clk: ingenic-tcu: Properly enable registers before accessing timers (git-fixes).\n- clk: iproc: Do not rely on node name for correct PLL setup (git-fixes).\n- clk: mediatek: mt8183: mfgcfg: Propagate rate changes to parent (git-fixes).\n- clk: mediatek: reset: Fix written reset bit offset (git-fixes).\n- clk: meson: Hold reference returned by of_get_parent() (git-fixes).\n- clk: oxnas: Hold reference returned by of_get_parent() (git-fixes).\n- clk: qcom: apss-ipq6018: mark apcs_alias0_core_clk as critical (git-fixes).\n- clk: qcom: camcc-sdm845: Fix topology around titan_top power domain (git-fixes).\n- clk: qcom: camcc-sm8250: Fix halt on boot by reducing driver\u0027s init level (git-fixes).\n- clk: qcom: camcc-sm8250: Fix topology around titan_top power domain (git-fixes).\n- clk: qcom: clk-alpha-pll: fix clk_trion_pll_configure description (git-fixes).\n- clk: qcom: clk-krait: unlock spin after mux completion (git-fixes).\n- clk: qcom: clk-rcg2: Fail Duty-Cycle configuration if MND divider is not enabled (git-fixes).\n- clk: qcom: clk-rcg2: Make sure to not write d=0 to the NMD register (git-fixes).\n- clk: qcom: gcc-msm8916: use ARRAY_SIZE instead of specifying num_parents (git-fixes).\n- clk: qcom: gcc-msm8939: Add missing SYSTEM_MM_NOC_BFDCD_CLK_SRC (git-fixes).\n- clk: qcom: gcc-msm8939: Add missing system_mm_noc_bfdcd_clk_src (git-fixes).\n- clk: qcom: gcc-msm8939: Fix bimc_ddr_clk_src rcgr base address (git-fixes).\n- clk: qcom: gcc-msm8939: Fix weird field spacing in ftbl_gcc_camss_cci_clk (git-fixes).\n- clk: qcom: gcc-msm8939: Point MM peripherals to system_mm_noc clock (git-fixes).\n- clk: qcom: ipq8074: SW workaround for UBI32 PLL lock (git-fixes).\n- clk: qcom: ipq8074: dont disable gcc_sleep_clk_src (git-fixes).\n- clk: qcom: ipq8074: fix NSS core PLL-s (git-fixes).\n- clk: qcom: ipq8074: fix NSS port frequency tables (git-fixes).\n- clk: qcom: ipq8074: set BRANCH_HALT_DELAY flag for UBI clocks (git-fixes).\n- clk: qoriq: Hold reference returned by of_get_parent() (git-fixes).\n- clk: renesas: r9a06g032: Fix UART clkgrp bitsel (git-fixes).\n- clk: sprd: Hold reference returned by of_get_parent() (git-fixes).\n- clk: tegra20: Fix refcount leak in tegra20_clock_init (git-fixes).\n- clk: tegra: Fix refcount leak in tegra114_clock_init (git-fixes).\n- clk: tegra: Fix refcount leak in tegra210_clock_init (git-fixes).\n- clk: ti: Stop using legacy clkctrl names for omap4 and 5 (git-fixes).\n- clk: ti: dra7-atl: Fix reference leak in of_dra7_atl_clk_probe (git-fixes).\n- clk: vc5: Fix 5P49V6901 outputs disabling when enabling FOD (git-fixes).\n- clk: zynqmp: Fix stack-out-of-bounds in strncpy` (git-fixes).\n- clk: zynqmp: pll: rectify rate rounding in zynqmp_pll_round_rate (git-fixes).\n- clocksource/drivers/hyperv: add data structure for reference TSC MSR (git-fixes).\n- configfs: fix a race in configfs_{,un}register_subsystem() (git-fixes).\n- constraints: increase disk space for all architectures References: bsc#1203693 aarch64 is already suffering. SLE15-SP5 x86_64 stats show that it is very close to the limit.\n- cpufreq: intel_pstate: Handle no_turbo in frequency invariance (jsc#PED-849).\n- cpufreq: intel_pstate: Support Sapphire Rapids OOB mode (jsc#PED-849).\n- cpufreq: qcom: fix memory leak in error path (git-fixes).\n- cpufreq: qcom: fix writes in read-only memory region (git-fixes).\n- cpufreq: zynq: Fix refcount leak in zynq_get_revision (git-fixes).\n- cpuidle: intel_idle: Drop redundant backslash at line end (jsc#PED-1936).\n- crypto: akcipher - default implementation for setting a private key (git-fixes).\n- crypto: arm64/gcm - Select AEAD for GHASH_ARM64_CE (git-fixes)\n- crypto: arm64/poly1305 - fix a read out-of-bound (git-fixes).\n- crypto: cavium - prevent integer overflow loading firmware (git-fixes).\n- crypto: ccp - During shutdown, check SEV data pointer before using (git-fixes).\n- crypto: ccp - Release dma channels before dmaengine unrgister (git-fixes).\n- crypto: ccp - Use kzalloc for sev ioctl interfaces to prevent kernel memory leak (git-fixes).\n- crypto: hisilicon - Kunpeng916 crypto driver do not sleep when in softirq (git-fixes).\n- crypto: hisilicon/hpre - do not use GFP_KERNEL to alloc mem during softirq (git-fixes).\n- crypto: hisilicon/sec - do not sleep when in softirq (git-fixes).\n- crypto: hisilicon/sec - fix auth key size error (git-fixes).\n- crypto: hisilicon/zip - fix mismatch in get/set sgl_sge_nr (git-fixes).\n- crypto: inside-secure - Add missing MODULE_DEVICE_TABLE for of (git-fixes).\n- crypto: inside-secure - Change swab to swab32 (git-fixes).\n- crypto: inside-secure - Replace generic aes with libaes (git-fixes).\n- crypto: marvell/octeontx - prevent integer overflows (git-fixes).\n- crypto: qat - fix default value of WDT timer (git-fixes).\n- crypto: sahara - do not sleep when in softirq (git-fixes).\n- crypto: sun8i-ss - do not allocate memory when handling hash requests (git-fixes).\n- crypto: sun8i-ss - fix error codes in allocate_flows() (git-fixes).\n- crypto: sun8i-ss - fix infinite loop in sun8i_ss_setup_ivs() (git-fixes).\n- cs-dsp and serial-multi-instantiate enablement (bsc#1203699)\n- device property: Check fwnode-\u003esecondary when finding properties (git-fixes).\n- device property: Fix documentation for *_match_string() APIs (git-fixes).\n- devlink: Fix use-after-free after a failed reload (git-fixes).\n- dm btree remove: fix use after free in rebalance_children() (git-fixes).\n- dm crypt: make printing of the key constant-time (git-fixes).\n- dm era: commit metadata in postsuspend after worker stops (git-fixes).\n- dm integrity: fix memory corruption when tag_size is less than digest size (git-fixes).\n- dm mirror log: clear log bits up to BITS_PER_LONG boundary (git-fixes).\n- dm raid: fix KASAN warning in raid5_add_disks (git-fixes).\n- dm raid: fix accesses beyond end of raid member array (git-fixes).\n- dm stats: add cond_resched when looping over entries (git-fixes).\n- dm thin: fix use-after-free crash in dm_sm_register_threshold_callback (git-fixes).\n- dm: fix double accounting of flush with data (git-fixes).\n- dm: interlock pending dm_io and dm_wait_for_bios_completion (git-fixes).\n- dm: properly fix redundant bio-based IO accounting (git-fixes).\n- dm: remove unnecessary assignment statement in alloc_dev() (git-fixes).\n- dm: return early from dm_pr_call() if DM device is suspended (git-fixes).\n- dm: revert partial fix for redundant bio-based IO accounting (git-fixes).\n- dma-buf: fix racing conflict of dma_heap_add() (git-fixes).\n- dma-debug: change allocation mode from GFP_NOWAIT to GFP_ATIOMIC (git-fixes).\n- dma-debug: make things less spammy under memory pressure (git-fixes).\n- dmaengine: at_hdmac: Check return code of dma_async_device_register (git-fixes).\n- dmaengine: at_hdmac: Do not allow CPU to reorder channel enable (git-fixes).\n- dmaengine: at_hdmac: Do not call the complete callback on device_terminate_all (git-fixes).\n- dmaengine: at_hdmac: Do not start transactions at tx_submit level (git-fixes).\n- dmaengine: at_hdmac: Fix at_lli struct definition (git-fixes).\n- dmaengine: at_hdmac: Fix completion of unissued descriptor in case of errors (git-fixes).\n- dmaengine: at_hdmac: Fix concurrency over descriptor (git-fixes).\n- dmaengine: at_hdmac: Fix concurrency over the active list (git-fixes).\n- dmaengine: at_hdmac: Fix concurrency problems by removing atc_complete_all() (git-fixes).\n- dmaengine: at_hdmac: Fix descriptor handling when issuing it to hardware (git-fixes).\n- dmaengine: at_hdmac: Fix impossible condition (git-fixes).\n- dmaengine: at_hdmac: Fix premature completion of desc in issue_pending (git-fixes).\n- dmaengine: at_hdmac: Free the memset buf without holding the chan lock (git-fixes).\n- dmaengine: at_hdmac: Protect atchan-\u003estatus with the channel lock (git-fixes).\n- dmaengine: at_hdmac: Start transfer for cyclic channels in issue_pending (git-fixes).\n- dmaengine: dw-axi-dmac: do not print NULL LLI during error (git-fixes).\n- dmaengine: dw-axi-dmac: ignore interrupt if no descriptor (git-fixes).\n- dmaengine: dw-edma: Fix eDMA Rd/Wr-channels and DMA-direction semantics (git-fixes).\n- dmaengine: hisilicon: Add multi-thread support for a DMA channel (git-fixes).\n- dmaengine: hisilicon: Disable channels when unregister hisi_dma (git-fixes).\n- dmaengine: hisilicon: Fix CQ head update (git-fixes).\n- dmaengine: idxd: add helper for per interrupt handle drain (jsc#PED-682).\n- dmaengine: idxd: add knob for enqcmds retries (jsc#PED-755).\n- dmaengine: idxd: change MSIX allocation based on per wq activation (jsc#PED-664).\n- dmaengine: idxd: change bandwidth token to read buffers (jsc#PED-679).\n- dmaengine: idxd: create locked version of idxd_quiesce() call (jsc#PED-682).\n- dmaengine: idxd: deprecate token sysfs attributes for read buffers (jsc#PED-679).\n- dmaengine: idxd: embed irq_entry in idxd_wq struct (jsc#PED-664).\n- dmaengine: idxd: fix descriptor flushing locking (jsc#PED-664).\n- dmaengine: idxd: fix retry value to be constant for duration of function call (git-fixes).\n- dmaengine: idxd: force wq context cleanup on device disable path (git-fixes).\n- dmaengine: idxd: handle interrupt handle revoked event (jsc#PED-682).\n- dmaengine: idxd: handle invalid interrupt handle descriptors (jsc#PED-682).\n- dmaengine: idxd: int handle management refactoring (jsc#PED-682).\n- dmaengine: idxd: match type for retries var in idxd_enqcmds() (git-fixes).\n- dmaengine: idxd: move interrupt handle assignment (jsc#PED-682).\n- dmaengine: idxd: rework descriptor free path on failure (jsc#PED-682).\n- dmaengine: idxd: set defaults for wq configs (jsc#PED-688).\n- dmaengine: idxd: update IAA definitions for user header (jsc#PED-763).\n- dmaengine: imx-dma: Cast of_device_get_match_data() with (uintptr_t) (git-fixes).\n- dmaengine: ioat: stop mod_timer from resurrecting deleted timer in __cleanup() (git-fixes).\n- dmaengine: mv_xor_v2: Fix a resource leak in mv_xor_v2_remove() (git-fixes).\n- dmaengine: mxs: use platform_driver_register (git-fixes).\n- dmaengine: pxa_dma: use platform_get_irq_optional (git-fixes).\n- dmaengine: sf-pdma: Add multithread support for a DMA channel (git-fixes).\n- dmaengine: sprd: Cleanup in .remove() after pm_runtime_get_sync() failed (git-fixes).\n- dmaengine: stm32-mdma: Remove dead code in stm32_mdma_irq_handler() (git-fixes).\n- dmaengine: ti: k3-udma-glue: fix memory leak when register device fail (git-fixes).\n- dmaengine: ti: k3-udma-private: Fix refcount leak bug in of_xudma_dev_get() (git-fixes).\n- dmaengine: ti: k3-udma: Reset UDMA_CHAN_RT byte counters to prevent overflow (git-fixes).\n- dmaengine: xilinx_dma: Fix devm_platform_ioremap_resource error handling (git-fixes).\n- dmaengine: xilinx_dma: Report error in case of dma_set_mask_and_coherent API failure (git-fixes).\n- dmaengine: xilinx_dma: cleanup for fetching xlnx,num-fstores property (git-fixes).\n- docs, kprobes: Fix the wrong location of Kprobes (git-fixes).\n- docs/core-api: expand Fedora instructions for GCC plugins (git-fixes).\n- docs/kernel-parameters: Update descriptions for \u0027mitigations=\u0027 param with retbleed (git-fixes).\n- docs: i2c: i2c-sysfs: fix hyperlinks (git-fixes).\n- docs: i2c: i2c-topology: fix incorrect heading (git-fixes).\n- docs: zh_CN: fix a broken reference (git-fixes).\n- dpaa2-eth: fix ethtool statistics (git-fixes).\n- dpaa2-eth: trace the allocated address instead of page struct (git-fixes).\n- dpaa2-ptp: Fix refcount leak in dpaa2_ptp_probe (git-fixes).\n- driver core: Do not probe devices after bus_type.match() probe deferral (git-fixes).\n- driver core: fix potential deadlock in __driver_attach (git-fixes).\n- drivers/iio: Remove all strcpy() uses (git-fixes).\n- drivers: serial: jsm: fix some leaks in probe (git-fixes).\n- drivers: usb: dwc3-qcom: Add sdm660 compatible (git-fixes).\n- drm/amd/amd_shared.h: Add missing doc for PP_GFX_DCS_MASK (git-fixes).\n- drm/amd/amdgpu: fixing read wrong pf2vf data in SRIOV (git-fixes).\n- drm/amd/amdgpu: skip ucode loading if ucode_size == 0 (git-fixes).\n- drm/amd/display: Add HUBP surface flip interrupt handler (git-fixes).\n- drm/amd/display: Add option to defer works of hpd_rx_irq (git-fixes).\n- drm/amd/display: Assume an LTTPR is always present on fixed_vs links (git-fixes).\n- drm/amd/display: Avoid MPC infinite loop (git-fixes).\n- drm/amd/display: Changed pipe split policy to allow for multi-display (bsc#1152472) Backporting notes: \t* remove changes to non-existing 201 and 31 directories\n- drm/amd/display: Check correct bounds for stream encoder instances for DCN303 (git-fixes).\n- drm/amd/display: Correct MPC split policy for DCN301 (git-fixes).\n- drm/amd/display: Enable building new display engine with KCOV enabled (git-fixes).\n- drm/amd/display: Fix HDMI VSIF V3 incorrect issue (git-fixes).\n- drm/amd/display: Fix build breakage with CONFIG_DEBUG_FS=n (git-fixes).\n- drm/amd/display: Fix double cursor on non-video RGB MPO (git-fixes).\n- drm/amd/display: Fix pixel clock programming (git-fixes).\n- drm/amd/display: Fix surface optimization regression on Carrizo (git-fixes).\n- drm/amd/display: Fix vblank refcount in vrr transition (git-fixes).\n- drm/amd/display: For stereo keep \u0027FLIP_ANY_FRAME\u0027 (git-fixes).\n- drm/amd/display: Ignore First MST Sideband Message Return Error (git-fixes).\n- drm/amd/display: Limit user regamma to a valid value (git-fixes).\n- drm/amd/display: Mark dml30\u0027s UseMinimumDCFCLK() as noinline for stack usage (git-fixes).\n- drm/amd/display: Optimize bandwidth on following fast update (git-fixes).\n- drm/amd/display: Reduce number of arguments of dml31\u0027s CalculateFlipSchedule() (git-fixes).\n- drm/amd/display: Reduce number of arguments of dml31\u0027s CalculateWatermarksAndDRAMSpeedChangeSupport() (git-fixes).\n- drm/amd/display: Remove interface for periodic interrupt 1 (git-fixes).\n- drm/amd/display: Reset DMCUB before HW init (git-fixes).\n- drm/amd/display: Revert \u0027drm/amd/display: turn DPMS off on connector unplug\u0027 (git-fixes).\n- drm/amd/display: avoid doing vm_init multiple time (git-fixes).\n- drm/amd/display: clear optc underflow before turn off odm clock (git-fixes).\n- drm/amd/display: skip audio setup when audio stream is enabled (git-fixes).\n- drm/amd/display: update gamut remap if plane has changed (git-fixes).\n- drm/amd/pm: add missing -\u003efini_microcode interface for Sienna Cichlid (git-fixes).\n- drm/amd/pm: disable BACO entry/exit completely on several sienna cichlid cards (git-fixes).\n- drm/amd/pm: smu7_hwmgr: fix potential off-by-one overflow in \u0027performance_levels\u0027 (git-fixes).\n- drm/amdgpu/display: change pipe policy for DCN 2.0 (git-fixes).\n- drm/amdgpu/display: change pipe policy for DCN 2.1 (git-fixes).\n- drm/amdgpu/gfx10: add wraparound gpu counter check for APUs as well (bsc#1152472) Backporting notes: \t* also fix default branch\n- drm/amdgpu/gfx9: switch to golden tsc registers for renoir+ (bsc#1152472) Backporting notes: \t* replace IP_VERSION() with CHIP_ constants\n- drm/amdgpu: Check BO\u0027s requested pinning domains against its preferred_domains (git-fixes).\n- drm/amdgpu: Check num_gfx_rings for gfx v9_0 rb setup (git-fixes).\n- drm/amdgpu: Increase tlb flush timeout for sriov (git-fixes).\n- drm/amdgpu: Move psp_xgmi_terminate call from amdgpu_xgmi_remove_device to psp_hw_fini (git-fixes).\n- drm/amdgpu: Remove one duplicated ef removal (git-fixes).\n- drm/amdgpu: Separate vf2pf work item init from virt data exchange (git-fixes).\n- drm/amdgpu: add missing pci_disable_device() in amdgpu_pmops_runtime_resume() (git-fixes).\n- drm/amdgpu: disable BACO on special BEIGE_GOBY card (git-fixes).\n- drm/amdgpu: do not register a dirty callback for non-atomic (git-fixes).\n- drm/amdgpu: fix initial connector audio value (git-fixes).\n- drm/amdgpu: fix sdma doorbell init ordering on APUs (git-fixes).\n- drm/amdgpu: make sure to init common IP before gmc (git-fixes).\n- drm/amdgpu: mmVM_L2_CNTL3 register not initialized correctly (git-fixes).\n- drm/amdgpu: move nbio ih_doorbell_range() into ih code for vega (git-fixes).\n- drm/amdgpu: move nbio sdma_doorbell_range() into sdma code for vega (git-fixes).\n- drm/amdgpu: remove useless condition in amdgpu_job_stop_all_jobs_on_sched() (git-fixes).\n- drm/amdgpu: set vm_update_mode=0 as default for Sienna Cichlid in SRIOV case (git-fixes).\n- drm/amdgpu: use dirty framebuffer helper (git-fixes).\n- drm/amdkfd: Fix NULL pointer dereference in svm_migrate_to_ram() (git-fixes).\n- drm/amdkfd: Fix memory leak in kfd_mem_dmamap_userptr() (git-fixes).\n- drm/amdkfd: Migrate in CPU page fault use current mm (git-fixes).\n- drm/amdkfd: avoid recursive lock in migrations back to RAM (git-fixes).\n- drm/amdkfd: handle CPU fault on COW mapping (git-fixes).\n- drm/bridge: Avoid uninitialized variable warning (git-fixes).\n- drm/bridge: display-connector: implement bus fmts callbacks (git-fixes).\n- drm/bridge: lt8912b: add vsync hsync (git-fixes).\n- drm/bridge: lt8912b: fix corrupted image output (git-fixes).\n- drm/bridge: lt8912b: set hdmi or dvi mode (git-fixes).\n- drm/bridge: lt9611uxc: Cancel only driver\u0027s work (git-fixes).\n- drm/bridge: megachips: Fix a null pointer dereference bug (git-fixes).\n- drm/bridge: parade-ps8640: Fix regulator supply order (git-fixes).\n- drm/bridge: tc358767: Fix (e)DP bridge endpoint parsing in dedicated function (git-fixes).\n- drm/bridge: tc358767: Make sure Refclk clock are enabled (git-fixes).\n- drm/bridge: tc358767: Move (e)DP bridge endpoint parsing into dedicated function (git-fixes).\n- drm/doc: Fix comment typo (git-fixes).\n- drm/drv: Fix potential memory leak in drm_dev_init() (git-fixes).\n- drm/exynos/exynos7_drm_decon: free resources when clk_set_parent() failed (git-fixes).\n- drm/gem: Fix GEM handle release errors (git-fixes).\n- drm/gem: Properly annotate WW context on drm_gem_lock_reservations() error (git-fixes).\n- drm/gma500: Fix BUG: sleeping function called from invalid context errors (git-fixes).\n- drm/hyperv: Add ratelimit on error message (git-fixes).\n- drm/hyperv: Do not overwrite dirt_needed value set by host (git-fixes).\n- drm/i915/display: avoid warnings when registering dual panel backlight (git-fixes).\n- drm/i915/dmabuf: fix sg_table handling in map_dma_buf (git-fixes).\n- drm/i915/dp: Reset frl trained flag before restarting FRL training (git-fixes).\n- drm/i915/ehl: Update MOCS table for EHL (git-fixes).\n- drm/i915/glk: ECS Liva Q2 needs GLK HDMI port timing quirk (git-fixes).\n- drm/i915/gt: Restrict forced preemption to the active context (git-fixes).\n- drm/i915/gt: Skip TLB invalidations once wedged (git-fixes).\n- drm/i915/gvt: fix a memory leak in intel_gvt_init_vgpu_types (git-fixes).\n- drm/i915/hdmi: convert intel_hdmi_to_dev to intel_hdmi_to_i915 (bsc#1152489) Backporting notes: \t* update additional patch on top\n- drm/i915/reg: Fix spelling mistake \u0027Unsupport\u0027 -\u003e \u0027Unsupported\u0027 (git-fixes).\n- drm/i915/sdvo: Filter out invalid outputs more sensibly (git-fixes).\n- drm/i915/sdvo: Setup DDC fully before output init (git-fixes).\n- drm/i915: Implement WaEdpLinkRateDataReload (git-fixes).\n- drm/i915: Reject unsupported TMDS rates on ICL+ (git-fixes).\n- drm/i915: Skip wm/ddb readout for disabled pipes (git-fixes).\n- drm/i915: fix null pointer dereference (git-fixes).\n- drm/imx: imx-tve: Fix return type of imx_tve_connector_mode_valid (git-fixes).\n- drm/komeda: Fix handling of atomic commits in the atomic_commit_tail hook (git-fixes).\n- drm/mcde: Fix refcount leak in mcde_dsi_bind (git-fixes).\n- drm/mediatek: Add pull-down MIPI operation in mtk_dsi_poweroff function (git-fixes).\n- drm/mediatek: Allow commands to be sent during video mode (git-fixes).\n- drm/mediatek: Keep dsi as LP00 before dcs cmds transfer (git-fixes).\n- drm/mediatek: Modify dsi funcs to atomic operations (git-fixes).\n- drm/mediatek: Separate poweron/poweroff from enable/disable and define new funcs (git-fixes).\n- drm/mediatek: dpi: Only enable dpi after the bridge is enabled (git-fixes).\n- drm/mediatek: dpi: Remove output format of YUV (git-fixes).\n- drm/mediatek: dsi: Add atomic {destroy,duplicate}_state, reset callbacks (git-fixes).\n- drm/mediatek: dsi: Move mtk_dsi_stop() call back to mtk_dsi_poweroff() (git-fixes).\n- drm/meson: Correct OSD1 global alpha value (git-fixes).\n- drm/meson: Fix OSD1 RGB to YCbCr coefficient (git-fixes).\n- drm/meson: Fix overflow implicit truncation warnings (git-fixes).\n- drm/meson: Fix refcount bugs in meson_vpu_has_available_connectors() (git-fixes).\n- drm/meson: explicitly remove aggregate driver at module unload time (git-fixes).\n- drm/mipi-dbi: align max_chunk to 2 in spi_transfer (git-fixes).\n- drm/mipi-dsi: Detach devices when removing the host (git-fixes).\n- drm/msm/dp: Silence inconsistent indent warning (git-fixes).\n- drm/msm/dp: correct 1.62G link rate at dp_catalog_ctrl_config_msa() (git-fixes).\n- drm/msm/dp: delete DP_RECOVERED_CLOCK_OUT_EN to fix tps4 (git-fixes).\n- drm/msm/dp: fix IRQ lifetime (git-fixes).\n- drm/msm/dpu: Fix comment typo (git-fixes).\n- drm/msm/dpu: Fix for non-visible planes (git-fixes).\n- drm/msm/dpu: index dpu_kms-\u003ehw_vbif using vbif_idx (git-fixes).\n- drm/msm/dsi: Fix number of regulators for SDM660 (git-fixes).\n- drm/msm/dsi: Fix number of regulators for msm8996_dsi_cfg (git-fixes).\n- drm/msm/dsi: fix memory corruption with too many bridges (git-fixes).\n- drm/msm/dsi: fix the inconsistent indenting (git-fixes).\n- drm/msm/hdmi: Remove spurious IRQF_ONESHOT flag (git-fixes).\n- drm/msm/hdmi: drop empty \u0027none\u0027 regulator lists (git-fixes).\n- drm/msm/hdmi: enable core-vcc/core-vdda-supply for 8996 platform (git-fixes).\n- drm/msm/hdmi: fix IRQ lifetime (git-fixes).\n- drm/msm/hdmi: fix memory corruption with too many bridges (git-fixes).\n- drm/msm/mdp5: Fix global state lock backoff (git-fixes).\n- drm/msm/rd: Fix FIFO-full deadlock (git-fixes).\n- drm/msm: Avoid dirtyfb stalls on video mode displays (v2) (git-fixes).\n- drm/msm: Fix dirtyfb refcounting (git-fixes).\n- drm/msm: Fix return type of mdp4_lvds_connector_mode_valid (git-fixes).\n- drm/msm: Make .remove and .shutdown HW shutdown consistent (git-fixes).\n- drm/msm: fix use-after-free on probe deferral (git-fixes).\n- drm/nouveau/acpi: Do not print error when we get -EINPROGRESS from pm_runtime (git-fixes).\n- drm/nouveau/kms/nv140-: Disable interlacing (git-fixes).\n- drm/nouveau/kms: Fix failure path for creating DP connectors (git-fixes).\n- drm/nouveau/nouveau_bo: fix potential memory leak in nouveau_bo_alloc() (git-fixes).\n- drm/nouveau: Do not pm_runtime_put_sync(), only pm_runtime_put_autosuspend() (git-fixes).\n- drm/nouveau: fix a use-after-free in nouveau_gem_prime_import_sg_table() (git-fixes).\n- drm/nouveau: fix another off-by-one in nvbios_addr (git-fixes).\n- drm/nouveau: recognise GA103 (git-fixes).\n- drm/nouveau: wait for the exclusive fence after the shared ones v2 (bsc#1152472) Backporting notes: \t* context changes\n- drm/omap: dss: Fix refcount leak bugs (git-fixes).\n- drm/panel: simple: Fix innolux_g121i1_l01 bus_format (git-fixes).\n- drm/panel: simple: set bpc field for logic technologies displays (git-fixes).\n- drm/panfrost: devfreq: set opp to the recommended one to configure regulator (git-fixes).\n- drm/radeon: add a force flush to delay work when radeon (git-fixes).\n- drm/radeon: fix incorrrect SPDX-License-Identifiers (git-fixes).\n- drm/radeon: fix potential buffer overflow in ni_set_mc_special_registers() (git-fixes).\n- drm/rockchip: Fix an error handling path rockchip_dp_probe() (git-fixes).\n- drm/rockchip: Fix return type of cdn_dp_connector_mode_valid (git-fixes).\n- drm/rockchip: dsi: Force synchronous probe (git-fixes).\n- drm/rockchip: vop: Do not crash for invalid duplicate_state() (git-fixes).\n- drm/scheduler: quieten kernel-doc warnings (git-fixes).\n- drm/shmem-helper: Add missing vunmap on error (git-fixes).\n- drm/simpledrm: Fix return type of simpledrm_simple_display_pipe_mode_valid() (git-fixes).\n- drm/st7735r: Fix module autoloading for Okaya RH128128T (git-fixes).\n- drm/sun4i: dsi: Prevent underflow when computing packet sizes (git-fixes).\n- drm/tegra: vic: Fix build warning when CONFIG_PM=n (git-fixes).\n- drm/ttm: Fix dummy res NULL ptr deref bug (git-fixes).\n- drm/udl: Add parameter to set number of URBs (bsc#1195917).\n- drm/udl: Add reset_resume (bsc#1195917)\n- drm/udl: Do not re-initialize stuff at retrying the URB list allocation (bsc#1195917).\n- drm/udl: Drop unneeded alignment (bsc#1195917).\n- drm/udl: Enable damage clipping (bsc#1195917).\n- drm/udl: Fix inconsistent urbs.count value during udl_free_urb_list() (bsc#1195917).\n- drm/udl: Fix potential URB leaks (bsc#1195917).\n- drm/udl: Increase the default URB list size to 20 (bsc#1195917).\n- drm/udl: Kill pending URBs at suspend and disconnect (bsc#1195917).\n- drm/udl: Replace BUG_ON() with WARN_ON() (bsc#1195917).\n- drm/udl: Replace semaphore with a simple wait queue (bsc#1195917).\n- drm/udl: Restore display mode on resume (bsc#1195917)\n- drm/udl: Suppress error print for -EPROTO at URB completion (bsc#1195917).\n- drm/udl: Sync pending URBs at suspend / disconnect (bsc#1195917).\n- drm/udl: Sync pending URBs at the end of suspend (bsc#1195917).\n- drm/vc4: Fix missing platform_unregister_drivers() call in vc4_drm_register() (git-fixes).\n- drm/vc4: change vc4_dma_range_matches from a global to static (git-fixes).\n- drm/vc4: drv: Adopt the dma configuration from the HVS or V3D component (git-fixes).\n- drm/vc4: dsi: Add correct stop condition to vc4_dsi_encoder_disable iteration (git-fixes).\n- drm/vc4: dsi: Correct DSI divider calculations (git-fixes).\n- drm/vc4: dsi: Correct pixel order for DSI0 (git-fixes).\n- drm/vc4: dsi: Fix dsi0 interrupt support (git-fixes).\n- drm/vc4: dsi: Register dsi0 as the correct vc4 encoder type (git-fixes).\n- drm/vc4: hdmi: Correct HDMI timing registers for interlaced modes (git-fixes).\n- drm/vc4: hdmi: Disable audio if dmas property is present but empty (git-fixes).\n- drm/vc4: hdmi: Fix timings for interlaced modes (git-fixes).\n- drm/vc4: hdmi: Reset HDMI MISC_CONTROL register (git-fixes).\n- drm/vc4: kms: Fix IS_ERR() vs NULL check for vc4_kms (git-fixes).\n- drm/vc4: plane: Fix margin calculations for the right/bottom edges (git-fixes).\n- drm/vc4: plane: Remove subpixel positioning check (git-fixes).\n- drm/virtio: Check whether transferred 2D BO is shmem (git-fixes).\n- drm/virtio: Unlock reservations on virtio_gpu_object_shmem_init() error (git-fixes).\n- drm: Fix potential null-ptr-deref in drm_vblank_destroy_worker() (git-fixes).\n- drm: Prevent drm_copy_field() to attempt copying a NULL pointer (git-fixes).\n- drm: Use size_t type for len variable in drm_copy_field() (git-fixes).\n- drm: adv7511: override i2c address of cec before accessing it (git-fixes).\n- drm: bridge: adv7511: Add check for mipi_dsi_driver_register (git-fixes).\n- drm: bridge: adv7511: fix CEC power down control register offset (git-fixes).\n- drm: bridge: dw_hdmi: only trigger hotplug event on link change (git-fixes).\n- drm: bridge: sii8620: fix possible off-by-one (git-fixes).\n- drm: fix drm_mipi_dbi build errors (git-fixes).\n- drm: panel-orientation-quirks: Add quirk for Anbernic Win600 (git-fixes).\n- drm:pl111: Add of_node_put() when breaking out of for_each_available_child_of_node() (git-fixes).\n- dsa: mv88e6xxx: fix debug print for SPEED_UNFORCED (git-fixes).\n- dt-bindings: PCI: microchip,pcie-host: fix missing clocks properties (git-fixes).\n- dt-bindings: PCI: microchip,pcie-host: fix missing dma-ranges (git-fixes).\n- dt-bindings: arm: qcom: fix MSM8916 MTP compatibles (git-fixes).\n- dt-bindings: arm: qcom: fix MSM8994 boards compatibles (git-fixes).\n- dt-bindings: bluetooth: broadcom: Add BCM4349B1 DT binding (git-fixes).\n- dt-bindings: clock: qcom,gcc-msm8996: add more GCC clock sources (git-fixes).\n- dt-bindings: clocks: imx8mp: Add ID for usb suspend clock (git-fixes).\n- dt-bindings: crypto: ti,sa2ul: drop dma-coherent property (git-fixes).\n- dt-bindings: display/msm: dpu-sc7180: add missing DPU opp-table (git-fixes).\n- dt-bindings: display/msm: dpu-sdm845: add missing DPU opp-table (git-fixes).\n- dt-bindings: gpio: zynq: Add missing compatible strings (git-fixes).\n- dt-bindings: hwmon: (mr75203) fix \u0027intel,vm-map\u0027 property to be optional (git-fixes).\n- dt-bindings: iio: accel: Add DT binding doc for ADXL355 (git-fixes).\n- dt-bindings: mtd: intel: lgm-nand: Fix compatible string (git-fixes).\n- dt-bindings: mtd: intel: lgm-nand: Fix maximum chip select value (git-fixes).\n- dt-bindings: phy: qcom,qmp-usb3-dp: fix bogus clock-cells property (git-fixes).\n- dt-bindings: phy: qcom,qmp: fix bogus clock-cells property (git-fixes).\n- dt-bindings: power: gpcv2: add power-domains property (git-fixes).\n- dt-bindings: usb: mtk-xhci: Allow wakeup interrupt-names to be optional (git-fixes).\n- dtb: Do not include sources in src.rpm - refer to kernel-source Same as other kernel binary packages there is no need to carry duplicate sources in dtb packages.\n- dyndbg: fix module.dyndbg handling (git-fixes).\n- dyndbg: fix static_branch manipulation (git-fixes).\n- dyndbg: let query-modname override actual module name (git-fixes).\n- e1000e: Fix TX dispatch condition (git-fixes).\n- e100: Fix possible use after free in e100_xmit_prepare (git-fixes).\n- eeprom: idt_89hpesx: uninitialized data in idt_dbgfs_csr_write() (git-fixes).\n- efi/tpm: Pass correct address to memblock_reserve (git-fixes).\n- efi: Correct Macmini DMI match in uefi cert quirk (git-fixes).\n- efi: capsule-loader: Fix use-after-free in efi_capsule_write (git-fixes).\n- efi: libstub: Disable struct randomization (git-fixes).\n- efi: libstub: drop pointless get_memory_map() call (git-fixes).\n- efi: random: Use \u0027ACPI reclaim\u0027 memory for random seed (git-fixes).\n- efi: random: reduce seed size to 32 bytes (git-fixes).\n- erofs: fix deadlock when shrink erofs slab (git-fixes).\n- eth: alx: take rtnl_lock on resume (git-fixes).\n- eth: sun: cassini: remove dead code (git-fixes).\n- ethernet: rocker: fix sleep in atomic context bug in neigh_timer_handler (git-fies).\n- exfat: Define NLS_NAME_* as bit flags explicitly (bsc#1201725).\n- exfat: Downgrade ENAMETOOLONG error message to debug messages (bsc#1201725).\n- exfat: Drop superfluous new line for error messages (bsc#1201725).\n- exfat: Expand exfat_err() and co directly to pr_*() macro (bsc#1201725).\n- exfat: Return ENAMETOOLONG consistently for oversized paths (bsc#1201725).\n- exfat: fix i_blocks for files truncated over 4 GiB (git-fixes).\n- exfat: fix referencing wrong parent directory information after renaming (git-fixes).\n- exfat: reuse exfat_inode_info variable instead of calling EXFAT_I() (git-fixes).\n- exfat: use updated exfat_chain directly during renaming (git-fixes).\n- export: fix string handling of namespace in EXPORT_SYMBOL_NS (git-fixes).\n- ext4: Fix BUG_ON in ext4_bread when write quota data (bsc#1197755).\n- ext4: add new helper interface ext4_try_to_trim_range() (bsc#1202783).\n- ext4: add reserved GDT blocks check (bsc#1202712).\n- ext4: avoid BUG_ON when creating xattrs (bsc#1205496).\n- ext4: do not use the orphan list when migrating an inode (bsc#1197756).\n- ext4: fast commit may miss tracking unwritten range during ftruncate (bsc#1202759).\n- ext4: filter out EXT4_FC_REPLAY from on-disk superblock field s_state (bsc#1202771).\n- ext4: fix a possible ABBA deadlock due to busy PA (bsc#1202762).\n- ext4: fix bug_on in ext4_writepages (bsc#1200872).\n- ext4: fix error handling in ext4_fc_record_modified_inode() (bsc#1202767).\n- ext4: fix error handling in ext4_restore_inline_data() (bsc#1197757).\n- ext4: fix fallocate to use file_modified to update permissions consistently (bsc#1202769). Refresh ext4-fix-race-condition-between-ext4_write-and-ext4_.patch\n- ext4: fix fast commit may miss tracking range for FALLOC_FL_ZERO_RANGE (bsc#1202757).\n- ext4: fix fs corruption when tring to remove a non-empty directory with IO error (bsc#1202768).\n- ext4: fix incorrect type issue during replay_del_range (bsc#1202867).\n- ext4: fix null-ptr-deref in \u0027__ext4_journal_ensure_credits\u0027 (bsc#1202764).\n- ext4: fix overhead calculation to account for the reserved gdt blocks (bsc#1200869).\n- ext4: fix race when reusing xattr blocks (bsc#1198971).\n- ext4: fix super block checksum incorrect after mount (bsc#1202773).\n- ext4: fix symlink file size not match to file content (bsc#1200868).\n- ext4: fix use-after-free in ext4_rename_dir_prepare (bsc#1200871).\n- ext4: fix use-after-free in ext4_search_dir (bsc#1202710).\n- ext4: fix warning in ext4_handle_inode_extension (bsc#1202711).\n- ext4: force overhead calculation if the s_overhead_cluster makes no sense (bsc#1200870).\n- ext4: initialize err_blk before calling __ext4_get_inode_loc (bsc#1202763).\n- ext4: make sure quota gets properly shutdown on error (bsc#1195480).\n- ext4: make sure to reset inode lockdep class when quota enabling fails (bsc#1202761).\n- ext4: mark group as trimmed only if it was fully scanned (bsc#1202770).\n- ext4: modify the logic of ext4_mb_new_blocks_simple (bsc#1202766).\n- ext4: prevent used blocks from being allocated during fast commit replay (bsc#1202765).\n- ext4: recover csum seed of tmp_inode after migrating to extents (bsc#1202713).\n- ext4: remove EA inode entry from mbcache on inode eviction (bsc#1198971).\n- ext4: unindent codeblock in ext4_xattr_block_set() (bsc#1198971).\n- ext4: use ext4_ext_remove_space() for fast commit replay delete range (bsc#1202758).\n- fat: add ratelimit to fat*_ent_bread() (git-fixes).\n- fbcon: Add option to enable legacy hardware acceleration (bsc#1152472) Backporting changes: \t* context fixes in other patch \t* update config\n- fbcon: Fix accelerated fbdev scrolling while logo is still shown (bsc#1152472)\n- fbcon: Fix boundary checks for fbcon=vc:n1-n2 parameters (git-fixes).\n- fbdev: chipsfb: Add missing pci_disable_device() in chipsfb_pci_init() (git-fixes).\n- fbdev: cyber2000fb: fix missing pci_disable_device() (git-fixes).\n- fbdev: da8xx-fb: Fix error handling in .remove() (git-fixes).\n- fbdev: fb_pm2fb: Avoid potential divide by zero error (git-fixes).\n- fbdev: fbcon: Properly revert changes when vc_resize() failed (git-fies).\n- fbdev: smscufx: Fix several use-after-free bugs (git-fixes).\n- fec: Fix timer capture timing in `fec_ptp_enable_pps()` (git-fixes).\n- filemap: Handle sibling entries in filemap_get_read_batch() (bsc#1202774).\n- firmware: arm_scmi: Add SCMI PM driver remove routine (git-fixes).\n- firmware: arm_scmi: Fix the asynchronous reset requests (git-fixes).\n- firmware: arm_scmi: Harden accesses to the reset domains (git-fixes).\n- firmware: arm_scmi: Harden accesses to the sensor domains (git-fixes).\n- firmware: arm_scmi: Improve checks in the info_get operations (git-fixes).\n- firmware: arm_scmi: Make Rx chan_setup fail on memory errors (git-fixes).\n- firmware: arm_scmi: Suppress the driver\u0027s bind attributes (git-fixes).\n- firmware: arm_scpi: Ensure scpi_info is not assigned if the probe fails (git-fixes).\n- firmware: coreboot: Register bus in module init (git-fixes).\n- firmware: cs_dsp: Add lockdep asserts to interface functions (bsc#1203699).\n- firmware: cs_dsp: Add memory chunk helpers (bsc#1203699).\n- firmware: cs_dsp: Add offset to cs_dsp read/write (bsc#1203699).\n- firmware: cs_dsp: Add pre_run callback (bsc#1203699).\n- firmware: cs_dsp: Add pre_stop callback (bsc#1203699).\n- firmware: cs_dsp: Add support for rev 2 coefficient files (bsc#1203699).\n- firmware: cs_dsp: Add version checks on coefficient loading (bsc#1203699).\n- firmware: cs_dsp: Allow creation of event controls (bsc#1203699).\n- firmware: cs_dsp: Clarify some kernel doc comments (bsc#1203699).\n- firmware: cs_dsp: Clear core reset for cache (bsc#1203699).\n- firmware: cs_dsp: Fix overrun of unterminated control name string (bsc#1203699).\n- firmware: cs_dsp: Move lockdep asserts to avoid potential null pointer (bsc#1203699).\n- firmware: cs_dsp: Perform NULL check in cs_dsp_coeff_write/read_ctrl (bsc#1203699).\n- firmware: cs_dsp: Print messages from bin files (bsc#1203699).\n- firmware: cs_dsp: add driver to support firmware loading on Cirrus Logic DSPs (bsc#1203699).\n- firmware: cs_dsp: tidy includes in cs_dsp.c and cs_dsp.h (bsc#1203699).\n- firmware: google: Test spinlock on panic path to avoid lockups (git-fixes).\n- firmware: tegra: Fix error check return value of debugfs_create_file() (git-fixes).\n- firmware: tegra: bpmp: Do only aligned access to IPC memory area (git-fixes).\n- fix race between exit_itimers() and /proc/pid/timers (git-fixes).\n- fm10k: Fix error handling in fm10k_init_module() (git-fixes).\n- fpga: altera-pr-ip: fix unsigned comparison with less than zero (git-fixes).\n- fpga: prevent integer overflow in dfl_feature_ioctl_set_irq() (git-fixes).\n- fs-writeback: writeback_sb_inodes: Recalculate \u0027wrote\u0027 according skipped pages (bsc#1200873).\n- fs/binfmt_elf: Fix memory leak in load_elf_binary() (git-fixes).\n- ftrace/x86: Add back ftrace_expected assignment (git-fixes).\n- ftrace: Fix NULL pointer dereference in is_ftrace_trampoline when ftrace is dead (git-fixes).\n- ftrace: Fix char print issue in print_ip_ins() (git-fixes).\n- ftrace: Fix null pointer dereference in ftrace_add_mod() (git-fixes).\n- ftrace: Fix the possible incorrect kernel message (git-fixes).\n- ftrace: Fix use-after-free for dynamic ftrace_ops (git-fixes).\n- ftrace: Optimize the allocation for mcount entries (git-fixes).\n- ftrace: Properly unset FTRACE_HASH_FL_MOD (git-fixes).\n- fuse: Remove the control interface for virtio-fs (bsc#1203798).\n- fuse: add file_modified() to fallocate (bsc#1205332).\n- fuse: fix deadlock between atomic O_TRUNC and page invalidation (bsc#1204533).\n- fuse: fix readdir cache race (bsc#1205331).\n- fuse: ioctl: translate ENOSYS (bsc#1203139).\n- fuse: limit nsec (bsc#1203138).\n- fuse: lock inode unconditionally in fuse_fallocate() (bsc#1206273).\n- gadgetfs: ep_io - wait until IRQ finishes (git-fixes).\n- gcov: support GCC 12.1 and newer compilers (git-fixes).\n- geneve: do not use RT_TOS for IPv6 flowlabel (git-fixes).\n- geneve: fix TOS inheriting for ipv4 (git-fixes).\n- gpio: amd8111: Fix PCI device reference count leak (git-fixes).\n- gpio: gpiolib-of: Fix refcount bugs in of_mm_gpiochip_add_data() (git-fixes).\n- gpio: mockup: fix NULL pointer dereference when removing debugfs (git-fixes).\n- gpio: mockup: remove gpio debugfs when remove device (git-fixes).\n- gpio: mpc8xxx: Fix support for IRQ_TYPE_LEVEL_LOW flow_type in mpc85xx (git-fixes).\n- gpio: mvebu: Fix check for pwm support on non-A8K platforms (git-fixes).\n- gpio: pca953x: Add mutex_lock for regcache sync in PM (git-fixes).\n- gpiolib: cdev: Set lineevent_state::irq after IRQ register successfully (git-fixes).\n- gpu: lontium-lt9611: Fix NULL pointer dereference in lt9611_connector_init() (git-fixes).\n- gve: Fix GFP flags when allocing pages (git-fixes).\n- habanalabs/gaudi: fix shift out of bounds (git-fixes).\n- habanalabs/gaudi: mask constant value before cast (git-fixes).\n- hamradio: fix issue of dev reference count leakage in bpq_device_event() (git-fixes).\n- hid: hid-logitech-hidpp: avoid unnecessary assignments in hidpp_connect_event (git-fixes).\n- hid: intel-ish-hid: ishtp: Fix ishtp client sending disordered message (git-fixes).\n- hinic: Avoid some over memory allocation (git-fixes).\n- hv_netvsc: Fix potential dereference of NULL pointer (git-fixes).\n- hv_netvsc: Fix race between VF offering and VF association message from host (bsc#1204850).\n- hv_netvsc: Print value of invalid ID in netvsc_send_{completion,tx_complete}() (git-fixes).\n- hv_sock: Add validation for untrusted Hyper-V values (git-fixes).\n- hv_sock: Check hv_pkt_iter_first_raw()\u0027s return value (git-fixes).\n- hv_sock: Copy packets sent by Hyper-V out of the ring buffer (git-fixes).\n- hwmon/coretemp: Handle large core ID value (git-fixes).\n- hwmon: (coretemp) Check for null before removing sysfs attrs (git-fixes).\n- hwmon: (coretemp) fix pci device refcount leak in nv1a_ram_new() (git-fixes).\n- hwmon: (dell-smm) Add Dell XPS 13 7390 to fan control whitelist (git-fixes).\n- hwmon: (drivetemp) Add module alias (git-fixes).\n- hwmon: (gpio-fan) Fix array out of bounds access (git-fixes).\n- hwmon: (gsc-hwmon) Call of_node_get() before of_find_xxx API (git-fixes).\n- hwmon: (i5500_temp) fix missing pci_disable_device() (git-fixes).\n- hwmon: (ibmpex) Fix possible UAF when ibmpex_register_bmc() fails (git-fixes).\n- hwmon: (ina3221) Fix shunt sum critical calculation (git-fixes).\n- hwmon: (ltc2947) fix temperature scaling (git-fixes).\n- hwmon: (mr75203) enable polling for all VM channels (git-fixes).\n- hwmon: (mr75203) fix VM sensor allocation when \u0027intel,vm-map\u0027 not defined (git-fixes).\n- hwmon: (mr75203) fix multi-channel voltage reading (git-fixes).\n- hwmon: (mr75203) fix voltage equation for negative source input (git-fixes).\n- hwmon: (mr75203) update pvt-\u003ev_num and vm_num to the actual number of used sensors (git-fixes).\n- hwmon: (pmbus/mp2888) Fix sensors readouts for MPS Multi-phase mp2888 controller (git-fixes).\n- hwmon: (sht15) Fix wrong assumptions in device remove callback (git-fixes).\n- hwmon: (sht4x) do not overflow clamping operation on 32-bit platforms (git-fixes).\n- hwmon: (tps23861) fix byte order in resistance register (git-fixes).\n- i2c: Fix a potential use after free (git-fixes).\n- i2c: acpi: Add an i2c_acpi_client_count() helper function (bsc#1203699).\n- i2c: cadence: Support PEC for SMBus block read (git-fixes).\n- i2c: designware: Fix handling of real but unexpected device interrupts (git-fixes).\n- i2c: i801: Add support for Intel Ice Lake PCH-N (jsc#PED-634).\n- i2c: i801: Add support for Intel Meteor Lake-P (jsc#PED-732).\n- i2c: i801: Add support for Intel Raptor Lake PCH-S (jsc#PED-634).\n- i2c: i801: Improve handling of chip-specific feature definitions (jsc#PED-634).\n- i2c: i801: add lis3lv02d\u0027s I2C address for Vostro 5568 (git-fixes).\n- i2c: imx: If pm_runtime_get_sync() returned 1 device access is possible (git-fixes).\n- i2c: imx: Make sure to unregister adapter on remove() (git-fixes).\n- i2c: imx: Only DMA messages with I2C_M_DMA_SAFE flag set (git-fixes).\n- i2c: mlxbf: Fix frequency calculation (git-fixes).\n- i2c: mlxbf: incorrect base address passed during io write (git-fixes).\n- i2c: mlxbf: prevent stack overflow in mlxbf_i2c_smbus_start_transaction() (git-fixes).\n- i2c: mlxbf: support lock mechanism (git-fixes).\n- i2c: mux-gpmux: Add of_node_put() when breaking out of loop (git-fixes).\n- i2c: mxs: Silence a clang warning (git-fixes).\n- i2c: npcm7xx: Fix error handling in npcm_i2c_init() (git-fixes).\n- i2c: npcm: Capitalize the one-line comment (git-fixes).\n- i2c: npcm: Correct slave role behavior (git-fixes).\n- i2c: npcm: Remove own slave addresses 2:10 (git-fixes).\n- i2c: piix4: Fix adapter not be removed in piix4_remove() (git-fixes).\n- i2c: qcom-cci: Fix ordering of pm_runtime_xx and i2c_add_adapter (git-fixes).\n- i2c: tegra: Allocate DMA memory for DMA engine (git-fixes).\n- i2c: xiic: Add platform module alias (git-fixes).\n- i40e: Fix call trace in setup_tx_descriptors (git-fixes).\n- i40e: Fix dropped jumbo frames statistics (git-fixes).\n- i40e: Fix to stop tx_timeout recovery if GLOBR fails (git-fixes).\n- iavf: Fix adminq error handling (git-fixes).\n- iavf: Fix handling of dummy receive descriptors (git-fixes).\n- iavf: Fix reset error handling (git-fixes).\n- ibmvnic: Free rwi on reset success (bsc#1184350 ltc#191533 git-fixes).\n- ice: Allow operation with reduced device MSI-X (bsc#1201987).\n- ice: Do not skip not enabled queues in ice_vc_dis_qs_msg (git-fixes).\n- ice: Fix KASAN error in LAG NETDEV_UNREGISTER handler (git-fixes).\n- ice: Fix race during aux device (un)plugging (git-fixes).\n- ice: Fix switchdev rules book keeping (git-fixes).\n- ice: Match on all profiles in slow-path (git-fixes).\n- ice: arfs: fix use-after-free when freeing @rx_cpu_rmap (git-fixes).\n- ice: check (DD | EOF) bits on Rx descriptor rather than (EOP | RS) (git-fixes).\n- ice: do not setup vlan for loopback VSI (git-fixes).\n- ice: fix \u0027scheduling while atomic\u0027 on aux critical err interrupt (git-fixes).\n- ice: fix crash when writing timestamp on RX rings (git-fixes).\n- ice: fix possible under reporting of ethtool Tx and Rx statistics (git-fixes).\n- ieee80211: add EHT 1K aggregation definitions (bsc#1202131).\n- ieee80211: change HE nominal packet padding value defines (bsc#1202131).\n- ieee802154/adf7242: defer destroy_workqueue call (git-fixes).\n- ieee802154: cc2520: Fix error return code in cc2520_hw_init() (git-fixes).\n- ieee802154: cc2520: add rc code in cc2520_tx() (git-fixes).\n- igb: Make DMA faster when CPU is active on the PCIe link (git-fixes).\n- igb: fix a use-after-free issue in igb_clean_tx_ring (git-fixes).\n- igb: skip phy status check where unavailable (git-fixes).\n- iio: ABI: Fix wrong format of differential capacitance channel ABI (git-fixes).\n- iio: accel: bma220: Fix alignment for DMA safety (git-fixes).\n- iio: accel: bma400: Fix the scale min and max macro values (git-fixes).\n- iio: accel: bma400: Reordering of header files (git-fixes).\n- iio: accel: sca3000: Fix alignment for DMA safety (git-fixes).\n- iio: accel: sca3300: Fix alignment for DMA safety (git-fixes).\n- iio: ad7292: Prevent regulator double disable (git-fixes).\n- iio: adc: ad7266: Fix alignment for DMA safety (git-fixes).\n- iio: adc: ad7292: Fix alignment for DMA safety (git-fixes).\n- iio: adc: ad7298: Fix alignment for DMA safety (git-fixes).\n- iio: adc: ad7476: Fix alignment for DMA safety (git-fixes).\n- iio: adc: ad7766: Fix alignment for DMA safety (git-fixes).\n- iio: adc: ad7768-1: Fix alignment for DMA safety (git-fixes).\n- iio: adc: ad7887: Fix alignment for DMA safety (git-fixes).\n- iio: adc: ad7923: Fix alignment for DMA safety (git-fixes).\n- iio: adc: ad7923: fix channel readings for some variants (git-fixes).\n- iio: adc: at91-sama5d2_adc: check return status for pressure and touch (git-fixes).\n- iio: adc: at91-sama5d2_adc: disable/prepare buffer on suspend/resume (git-fixes).\n- iio: adc: at91-sama5d2_adc: fix AT91_SAMA5D2_MR_TRACKTIM_MAX (git-fixes).\n- iio: adc: at91-sama5d2_adc: lock around oversampling and sample freq (git-fixes).\n- iio: adc: at91_adc: fix possible memory leak in at91_adc_allocate_trigger() (git-fixes).\n- iio: adc: hi8435: Fix alignment for DMA safety (git-fixes).\n- iio: adc: ltc2496: Fix alignment for DMA safety (git-fixes).\n- iio: adc: ltc2497: Fix alignment for DMA safety (git-fixes).\n- iio: adc: max1027: Fix alignment for DMA safety (git-fixes).\n- iio: adc: max11100: Fix alignment for DMA safety (git-fixes).\n- iio: adc: max1118: Fix alignment for DMA safety (git-fixes).\n- iio: adc: max1241: Fix alignment for DMA safety (git-fixes).\n- iio: adc: mcp320x: Fix alignment for DMA safety (git-fixes).\n- iio: adc: mcp3911: make use of the sign bit (git-fixes).\n- iio: adc: mcp3911: use correct formula for AD conversion (git-fixes).\n- iio: adc: mcp3911: use correct id bits (git-fixes).\n- iio: adc: mp2629: fix potential array out of bound access (git-fixes).\n- iio: adc: mp2629: fix wrong comparison of channel (git-fixes).\n- iio: adc: ti-adc0832: Fix alignment for DMA safety (git-fixes).\n- iio: adc: ti-adc084s021: Fix alignment for DMA safety (git-fixes).\n- iio: adc: ti-adc108s102: Fix alignment for DMA safety (git-fixes).\n- iio: adc: ti-adc12138: Fix alignment for DMA safety (git-fixes).\n- iio: adc: ti-adc128s052: Fix alignment for DMA safety (git-fixes).\n- iio: adc: ti-adc161s626: Fix alignment for DMA safety (git-fixes).\n- iio: adc: ti-ads124s08: Fix alignment for DMA safety (git-fixes).\n- iio: adc: ti-ads131e08: Fix alignment for DMA safety (git-fixes).\n- iio: adc: ti-ads7950: Fix alignment for DMA safety (git-fixes).\n- iio: adc: ti-ads8344: Fix alignment for DMA safety (git-fixes).\n- iio: adc: ti-ads8688: Fix alignment for DMA safety (git-fixes).\n- iio: adc: ti-tlc4541: Fix alignment for DMA safety (git-fixes).\n- iio: adxl372: Fix unsafe buffer attributes (git-fixes).\n- iio: amplifiers: ad8366: Fix alignment for DMA safety (git-fixes).\n- iio: bmc150-accel-core: Fix unsafe buffer attributes (git-fixes).\n- iio: common: ssp: Fix alignment for DMA safety (git-fixes).\n- iio: core: Fix IIO_ALIGN and rename as it was not sufficiently large (git-fixes).\n- iio: core: Fix entry not deleted when iio_register_sw_trigger_type() fails (git-fixes).\n- iio: dac: ad5064: Fix alignment for DMA safety (git-fixes).\n- iio: dac: ad5360: Fix alignment for DMA safety (git-fixes).\n- iio: dac: ad5421: Fix alignment for DMA safety (git-fixes).\n- iio: dac: ad5449: Fix alignment for DMA safety (git-fixes).\n- iio: dac: ad5504: Fix alignment for DMA safety (git-fixes).\n- iio: dac: ad5593r: Fix i2c read protocol requirements (git-fixes).\n- iio: dac: ad5755: Fix alignment for DMA safety (git-fixes).\n- iio: dac: ad5761: Fix alignment for DMA safety (git-fixes).\n- iio: dac: ad5764: Fix alignment for DMA safety (git-fixes).\n- iio: dac: ad5766: Fix alignment for DMA safety (git-fixes).\n- iio: dac: ad5770r: Fix alignment for DMA safety (git-fixes).\n- iio: dac: ad5791: Fix alignment for DMA saftey (git-fixes).\n- iio: dac: ad7303: Fix alignment for DMA safety (git-fixes).\n- iio: dac: ad8801: Fix alignment for DMA safety (git-fixes).\n- iio: dac: mcp4922: Fix alignment for DMA safety (git-fixes).\n- iio: dac: ti-dac082s085: Fix alignment for DMA safety (git-fixes).\n- iio: dac: ti-dac5571: Fix alignment for DMA safety (git-fixes).\n- iio: dac: ti-dac7311: Fix alignment for DMA safety (git-fixes).\n- iio: dac: ti-dac7612: Fix alignment for DMA safety (git-fixes).\n- iio: fix iio_format_avail_range() printing for none IIO_VAL_INT (git-fixes).\n- iio: frequency: ad9523: Fix alignment for DMA safety (git-fixes).\n- iio: frequency: adf4350: Fix alignment for DMA safety (git-fixes).\n- iio: frequency: adf4371: Fix alignment for DMA safety (git-fixes).\n- iio: gyro: adis16080: Fix alignment for DMA safety (git-fixes).\n- iio: gyro: adis16130: Fix alignment for DMA safety (git-fixes).\n- iio: gyro: adxrs450: Fix alignment for DMA safety (git-fixes).\n- iio: gyro: fxas210002c: Fix alignment for DMA safety (git-fixes).\n- iio: health: afe4403: Fix oob read in afe4403_read_raw (git-fixes).\n- iio: health: afe4404: Fix oob read in afe4404_[read|write]_raw (git-fixes).\n- iio: imu: fxos8700: Fix alignment for DMA safety (git-fixes).\n- iio: inkern: fix return value in devm_of_iio_channel_get_by_name() (git-fixes).\n- iio: inkern: only release the device node when done with it (git-fixes).\n- iio: light: apds9960: fix wrong register for gesture gain (git-fixes).\n- iio: light: isl29028: Fix the warning in isl29028_remove() (git-fixes).\n- iio: light: rpr0521: add missing Kconfig dependencies (git-fixes).\n- iio: light: tsl2583: Fix module unloading (git-fixes).\n- iio: ltc2497: Fix reading conversion results (git-fixes).\n- iio: magnetometer: yas530: Change data type of hard_offsets to signed (git-fixes).\n- iio: ms5611: Simplify IO callback parameters (git-fixes).\n- iio: potentiometer: ad5272: Fix alignment for DMA safety (git-fixes).\n- iio: potentiometer: max5481: Fix alignment for DMA safety (git-fixes).\n- iio: potentiometer: mcp41010: Fix alignment for DMA safety (git-fixes).\n- iio: potentiometer: mcp4131: Fix alignment for DMA safety (git-fixes).\n- iio: pressure: dps310: Refactor startup procedure (git-fixes).\n- iio: pressure: dps310: Reset chip after timeout (git-fixes).\n- iio: pressure: ms5611: changed hardcoded SPI speed to value limited (git-fixes).\n- iio: pressure: ms5611: fixed value compensation bug (git-fixes).\n- iio: proximity: as3935: Fix alignment for DMA safety (git-fixes).\n- iio: resolver: ad2s1200: Fix alignment for DMA safety (git-fixes).\n- iio: resolver: ad2s90: Fix alignment for DMA safety (git-fixes).\n- iio: temp: ltc2983: Fix alignment for DMA safety (git-fixes).\n- iio: temp: maxim_thermocouple: Fix alignment for DMA safety (git-fixes).\n- iio: temperature: ltc2983: allocate iio channels once (git-fixes).\n- iio: trigger: sysfs: fix possible memory leak in iio_sysfs_trig_init() (git-fixes).\n- ima: fix blocking of security.ima xattrs of unsupported algorithms (git-fixes).\n- inet_diag: fix kernel-infoleak for UDP sockets (git-fixes).\n- init/Kconfig: fix CC_HAS_ASM_GOTO_TIED_OUTPUT test with dash (git-fixes).\n- intel_idle: Add AlderLake support (jsc#PED-824).\n- intel_idle: Fix SPR C6 optimization (jsc#PED-824 jsc#PED-1936).\n- intel_idle: Fix the \u0027preferred_cstates\u0027 module parameter (jsc#PED-824 jsc#PED-1936).\n- intel_idle: make SPR C1 and C1E be independent (jsc#PED-1936).\n- intel_th: Fix a resource leak in an error handling path (git-fixes).\n- intel_th: msu-sink: Potential dereference of null pointer (git-fixes).\n- intel_th: msu: Fix vmalloced buffers (git-fixes).\n- intel_th: pci: Add Meteor Lake-P support (git-fixes).\n- intel_th: pci: Add Raptor Lake-S CPU support (git-fixes).\n- intel_th: pci: Add Raptor Lake-S PCH support (git-fixes).\n- interconnect: imx: fix max_node_id (git-fixes).\n- io-wq: Remove duplicate code in io_workqueue_create() (bnc#1205113).\n- io-wq: do not retry task_work creation failure on fatal conditions (bnc#1205113).\n- io-wq: ensure we exit if thread group is exiting (git-fixes).\n- io-wq: exclusively gate signal based exit on get_signal() return (git-fixes).\n- io-wq: fix cancellation on create-worker failure (bnc#1205113).\n- io-wq: fix silly logic error in io_task_work_match() (bnc#1205113).\n- io_uring: add a schedule point in io_add_buffers() (git-fixes).\n- io_uring: correct __must_hold annotation (git-fixes).\n- io_uring: drop ctx-\u003euring_lock before acquiring sqd-\u003elock (git-fixes).\n- io_uring: ensure IORING_REGISTER_IOWQ_MAX_WORKERS works with SQPOLL (git-fixes).\n- io_uring: fix io_timeout_remove locking (git-fixes).\n- io_uring: fix missing mb() before waitqueue_active (git-fixes).\n- io_uring: fix missing sigmask restore in io_cqring_wait() (git-fixes).\n- io_uring: fix possible poll event lost in multi shot mode (git-fixes).\n- io_uring: pin SQPOLL data before unlocking ring lock (git-fixes).\n- io_uring: terminate manual loop iterator loop correctly for non-vecs (git-fixes).\n- iommu/amd: Clarify AMD IOMMUv2 initialization messages (git-fixes).\n- iommu/amd: Enable swiotlb in all cases (git-fixes).\n- iommu/amd: Fix I/O page table memory leak (git-fixes).\n- iommu/amd: Recover from event log overflow (git-fixes).\n- iommu/amd: Simplify and Consolidate Virtual APIC (AVIC) Enablement (git-fixes).\n- iommu/arm-smmu-v3-sva: Fix mm use-after-free (git-fixes).\n- iommu/arm-smmu-v3: Fix size calculation in arm_smmu_mm_invalidate_range() (git-fixes).\n- iommu/arm-smmu: qcom_iommu: Add of_node_put() when breaking out of loop (git-fixes).\n- iommu/dart: Add missing module owner to ops structure (git-fixes).\n- iommu/dart: check return value after calling platform_get_resource() (git-fixes).\n- iommu/exynos: Handle failed IOMMU device registration properly (git-fixes).\n- iommu/iova: Improve 32-bit free space estimate (git-fixes).\n- iommu/ipmmu-vmsa: Check for error num after setting mask (git-fixes).\n- iommu/mediatek: Add list_del in mtk_iommu_remove (git-fixes).\n- iommu/mediatek: Add mutex for m4u_group and m4u_dom in data (git-fixes).\n- iommu/mediatek: Fix 2 HW sharing pgtable issue (git-fixes).\n- iommu/mediatek: Fix NULL pointer dereference when printing dev_name (git-fixes).\n- iommu/mediatek: Remove clk_disable in mtk_iommu_remove (git-fixes).\n- iommu/msm: Fix an incorrect NULL check on list iterator (git-fixes).\n- iommu/omap: Fix regression in probe for NULL pointer dereference (git-fixes).\n- iommu/tegra-smmu: Fix missing put_device() call in tegra_smmu_find (git-fixes).\n- iommu/vt-d: Acquiring lock in domain ID allocation helpers (bsc#1200301).\n- iommu/vt-d: Calculate mask for non-aligned flushes (git-fixes).\n- iommu/vt-d: Do not falsely log intel_iommu is unsupported kernel option (bsc#1204947).\n- iommu/vt-d: Drop stop marker messages (git-fixes).\n- iommu/vt-d: Fix PCI bus rescan device hot add (git-fixes).\n- iommu/vt-d: Fix RID2PASID setup/teardown failure (git-fixes).\n- iommu/vt-d: Make DMAR_UNITS_SUPPORTED default 1024 (bsc#1200301).\n- iommu/vt-d: Refactor iommu information of each domain (bsc#1200301).\n- iommu/vt-d: Remove global g_iommus array (bsc#1200301).\n- iommu/vt-d: Remove intel_iommu::domains (bsc#1200301).\n- iommu/vt-d: Remove unnecessary check in intel_iommu_add() (bsc#1200301).\n- iommu/vt-d: Use IDA interface to manage iommu sequence id (bsc#1200301).\n- iommu/vt-d: avoid invalid memory access via node_online(NUMA_NO_NODE) (git-fixes).\n- iommu: Fix potential use-after-free during probe (git-fixes).\n- iov_iter: Fix iter_xarray_get_pages{,_alloc}() (git-fixes).\n- iov_iter: fix build issue due to possible type mis-match (git-fixes).\n- ip: Fix data-races around sysctl_ip_fwd_update_priority (git-fixes).\n- ipmi: fix initialization when workqueue allocation fails (git-fixes).\n- ipv4: Fix data-races around sysctl_fib_multipath_hash_policy (git-fixes).\n- ipv6: ping: fix wrong checksum for large frames (bsc#1203183).\n- irqchip/ls-extirq: Fix invalid wait context by avoiding to use regmap (git-fixes).\n- irqchip/sifive-plic: Add missing thead,c900-plic match string (git-fixes).\n- irqchip/tegra: Fix overflow implicit truncation warnings (git-fixes).\n- isdn: mISDN: netjet: fix wrong check of device registration (git-fixes).\n- iwlwifi/fw: use struct_size over open coded arithmetic (bsc#1202131).\n- iwlwifi: ACPI: support revision 3 WGDS tables (bsc#1202131).\n- iwlwifi: Add support for getting rf id with blank otp (bsc#1202131).\n- iwlwifi: Add support for more BZ HWs (bsc#1202131).\n- iwlwifi: BZ Family BUS_MASTER_DISABLE_REQ code duplication (bsc#1202131).\n- iwlwifi: BZ Family SW reset support (bsc#1202131).\n- iwlwifi: Configure FW debug preset via module param (bsc#1202131).\n- iwlwifi: Fix FW name for gl (bsc#1202131).\n- iwlwifi: Fix missing error code in iwl_pci_probe() (bsc#1202131).\n- iwlwifi: Fix syntax errors in comments (bsc#1202131).\n- iwlwifi: Make use of the helper macro LIST_HEAD() (bsc#1202131).\n- iwlwifi: Read the correct addresses when getting the crf id (bsc#1202131).\n- iwlwifi: Start scratch debug register for Bz family (bsc#1202131).\n- iwlwifi: acpi: fix wgds rev 3 size (bsc#1202131).\n- iwlwifi: acpi: move ppag code from mvm to fw/acpi (bsc#1202131).\n- iwlwifi: add missing entries for Gf4 with So and SoF (bsc#1202131).\n- iwlwifi: add new Qu-Hr device (bsc#1202131).\n- iwlwifi: add new ax1650 killer device (bsc#1202131).\n- iwlwifi: add new device id 7F70 (bsc#1202131).\n- iwlwifi: add new pci SoF with JF (bsc#1202131).\n- iwlwifi: add some missing kernel-doc in struct iwl_fw (bsc#1202131).\n- iwlwifi: add support for BNJ HW (bsc#1202131).\n- iwlwifi: add support for BZ-U and BZ-L HW (bsc#1202131).\n- iwlwifi: add support for Bz-Z HW (bsc#1202131).\n- iwlwifi: add vendor specific capabilities for some RFs (bsc#1202131).\n- iwlwifi: advertise support for HE - DCM BPSK RX/TX (bsc#1202131).\n- iwlwifi: allow rate-limited error messages (bsc#1202131).\n- iwlwifi: api: fix struct iwl_wowlan_status_v7 kernel-doc (bsc#1202131).\n- iwlwifi: api: remove ttl field from TX command (bsc#1202131).\n- iwlwifi: api: remove unused RX status bits (bsc#1202131).\n- iwlwifi: avoid variable shadowing (bsc#1202131).\n- iwlwifi: avoid void pointer arithmetic (bsc#1202131).\n- iwlwifi: bump FW API to 67 for AX devices (bsc#1202131).\n- iwlwifi: bump FW API to 68 for AX devices (bsc#1202131).\n- iwlwifi: bump FW API to 69 for AX devices (bsc#1202131).\n- iwlwifi: bump FW API to 70 for AX devices (bsc#1202131).\n- iwlwifi: bump FW API to 71 for AX devices (bsc#1202131).\n- iwlwifi: bump FW API to 72 for AX devices (bsc#1202131).\n- iwlwifi: cfg: add support for 1K BA queue (bsc#1202131).\n- iwlwifi: dbg-tlv: clean up iwl_dbg_tlv_update_drams() (bsc#1202131).\n- iwlwifi: dbg: add infra for tracking free buffer size (bsc#1202131).\n- iwlwifi: dbg: check trigger data before access (bsc#1202131).\n- iwlwifi: dbg: disable ini debug in 8000 family and below (bsc#1202131).\n- iwlwifi: dbg: in sync mode do not call schedule (bsc#1202131).\n- iwlwifi: dbg: treat dbgc allocation failure when tlv is missing (bsc#1202131).\n- iwlwifi: dbg: treat non active regions as unsupported regions (bsc#1202131).\n- iwlwifi: dbg_ini: Split memcpy() to avoid multi-field write (bsc#1202131).\n- iwlwifi: de-const properly where needed (bsc#1202131).\n- iwlwifi: debugfs: remove useless double condition (bsc#1202131).\n- iwlwifi: do not dump_stack() when we get an unexpected interrupt (bsc#1202131).\n- iwlwifi: do not use __unused as variable name (bsc#1202131).\n- iwlwifi: drv: load tlv debug data earlier (bsc#1202131).\n- iwlwifi: dump CSR scratch from outer function (bsc#1202131).\n- iwlwifi: dump RCM error tables (bsc#1202131).\n- iwlwifi: dump both TCM error tables if present (bsc#1202131).\n- iwlwifi: dump host monitor data when NIC does not init (bsc#1202131).\n- iwlwifi: dvm: use struct_size over open coded arithmetic (bsc#1202131).\n- iwlwifi: eeprom: clean up macros (bsc#1202131).\n- iwlwifi: fix LED dependencies (bsc#1202131).\n- iwlwifi: fix debug TLV parsing (bsc#1202131).\n- iwlwifi: fix fw/img.c license statement (bsc#1202131).\n- iwlwifi: fix iwl_legacy_rate_to_fw_idx (bsc#1202131).\n- iwlwifi: fix small doc mistake for iwl_fw_ini_addr_val (bsc#1202131).\n- iwlwifi: fix various more -Wcast-qual warnings (bsc#1202131).\n- iwlwifi: fw dump: add infrastructure for dump scrubbing (bsc#1202131).\n- iwlwifi: fw: add support for splitting region type bits (bsc#1202131).\n- iwlwifi: fw: api: add link to PHY context command struct v1 (bsc#1202131).\n- iwlwifi: fw: correctly detect HW-SMEM region subtype (bsc#1202131).\n- iwlwifi: fw: fix some scan kernel-doc (bsc#1202131).\n- iwlwifi: fw: init SAR GEO table only if data is present (bsc#1202131).\n- iwlwifi: fw: make dump_start callback void (bsc#1202131).\n- iwlwifi: fw: remove dead error log code (bsc#1202131).\n- iwlwifi: implement reset flow for Bz devices (bsc#1202131).\n- iwlwifi: iwl-eeprom-parse: mostly dvm only (bsc#1202131).\n- iwlwifi: make iwl_fw_lookup_cmd_ver() take a cmd_id (bsc#1202131).\n- iwlwifi: make iwl_txq_dyn_alloc_dma() return the txq (bsc#1202131).\n- iwlwifi: make some functions friendly to sparse (bsc#1202131).\n- iwlwifi: move symbols into a separate namespace (bsc#1202131).\n- iwlwifi: mvm/api: define system control command (bsc#1202131).\n- iwlwifi: mvm: Add RTS and CTS flags to iwl_tx_cmd_flags (bsc#1202131).\n- iwlwifi: mvm: Add list of OEMs allowed to use TAS (bsc#1202131).\n- iwlwifi: mvm: Add support for a new version of scan request command (bsc#1202131).\n- iwlwifi: mvm: Add support for new rate_n_flags in tx_cmd (bsc#1202131).\n- iwlwifi: mvm: Consider P2P GO operation during scan (bsc#1202131).\n- iwlwifi: mvm: Disable WiFi bands selectively with BIOS (bsc#1202131).\n- iwlwifi: mvm: Do not fail if PPAG isn\u0027t supported (bsc#1202131).\n- iwlwifi: mvm: Fix wrong documentation for scan request command (bsc#1202131).\n- iwlwifi: mvm: Passively scan non PSC channels only when requested so (bsc#1202131).\n- iwlwifi: mvm: Read acpi dsm to get channel activation bitmap (bsc#1202131).\n- iwlwifi: mvm: Remove antenna c references (bsc#1202131).\n- iwlwifi: mvm: Support new TX_RSP and COMPRESSED_BA_RES versions (bsc#1202131).\n- iwlwifi: mvm: Support new rate_n_flags for REPLY_RX_MPDU_CMD and RX_NO_DATA_NOTIF (bsc#1202131).\n- iwlwifi: mvm: Support new version of BEACON_TEMPLATE_CMD (bsc#1202131).\n- iwlwifi: mvm: Support new version of ranging response notification (bsc#1202131).\n- iwlwifi: mvm: Support version 3 of tlc_update_notif (bsc#1202131).\n- iwlwifi: mvm: Unify the scan iteration functions (bsc#1202131).\n- iwlwifi: mvm: Use all Rx chains for roaming scan (bsc#1202131).\n- iwlwifi: mvm: add US/CA to TAS block list if OEM isn\u0027t allowed (bsc#1202131).\n- iwlwifi: mvm: add a flag to reduce power command (bsc#1202131).\n- iwlwifi: mvm: add additional info for boot info failures (bsc#1202131).\n- iwlwifi: mvm: add dbg_time_point to debugfs (bsc#1202131).\n- iwlwifi: mvm: add definitions for new rate \u0026 flags (bsc#1202131).\n- iwlwifi: mvm: add lmac/umac PC info in case of error (bsc#1202131).\n- iwlwifi: mvm: add missing min_size to kernel-doc (bsc#1202131).\n- iwlwifi: mvm: add some missing command strings (bsc#1202131).\n- iwlwifi: mvm: add support for 160Mhz in ranging measurements (bsc#1202131).\n- iwlwifi: mvm: add support for CT-KILL notification version 2 (bsc#1202131).\n- iwlwifi: mvm: add support for IMR based on platform (bsc#1202131).\n- iwlwifi: mvm: add support for OCE scan (bsc#1202131).\n- iwlwifi: mvm: add support for PHY context command v4 (bsc#1202131).\n- iwlwifi: mvm: add support for statistics update version 15 (bsc#1202131).\n- iwlwifi: mvm: allow enabling UHB TAS in the USA via ACPI setting (bsc#1202131).\n- iwlwifi: mvm: always remove the session protection after association (bsc#1202131).\n- iwlwifi: mvm: always store the PPAG table as the latest version (bsc#1202131).\n- iwlwifi: mvm: always use 4K RB size by default (bsc#1202131).\n- iwlwifi: mvm: change old-SN drop threshold (bsc#1202131).\n- iwlwifi: mvm: clean up indenting in iwl_mvm_tlc_update_notif() (bsc#1202131).\n- iwlwifi: mvm: convert old rate \u0026 flags to the new format (bsc#1202131).\n- iwlwifi: mvm: correct sta-state logic for TDLS (bsc#1202131).\n- iwlwifi: mvm: correctly set channel flags (bsc#1202131).\n- iwlwifi: mvm: correctly set schedule scan profiles (bsc#1202131).\n- iwlwifi: mvm: d3: move GTK rekeys condition (bsc#1202131).\n- iwlwifi: mvm: d3: support v12 wowlan status (bsc#1202131).\n- iwlwifi: mvm: d3: use internal data representation (bsc#1202131).\n- iwlwifi: mvm: demote non-compliant kernel-doc header (bsc#1202131).\n- iwlwifi: mvm: do not get address of mvm-\u003efwrt just to dereference as a pointer (bsc#1202131).\n- iwlwifi: mvm: do not send BAID removal to the FW during hw_restart (bsc#1202131).\n- iwlwifi: mvm: do not trust hardware queue number (bsc#1202131).\n- iwlwifi: mvm: drop too short packets silently (bsc#1202131).\n- iwlwifi: mvm: extend session protection on association (bsc#1202131).\n- iwlwifi: mvm: fix WGDS table print in iwl_mvm_chub_update_mcc() (bsc#1202131).\n- iwlwifi: mvm: fix a stray tab (bsc#1202131).\n- iwlwifi: mvm: fix condition which checks the version of rate_n_flags (bsc#1202131).\n- iwlwifi: mvm: fix delBA vs. NSSN queue sync race (bsc#1202131).\n- iwlwifi: mvm: fix ieee80211_get_he_iftype_cap() iftype (bsc#1202131).\n- iwlwifi: mvm: fix off by one in iwl_mvm_stat_iterator_all_macs() (bsc#1202131).\n- iwlwifi: mvm: fw: clean up hcmd struct creation (bsc#1202131).\n- iwlwifi: mvm: handle RX checksum on Bz devices (bsc#1202131).\n- iwlwifi: mvm: improve log when processing CSA (bsc#1202131).\n- iwlwifi: mvm: isolate offload assist (checksum) calculation (bsc#1202131).\n- iwlwifi: mvm: make iwl_mvm_reconfig_scd() static (bsc#1202131).\n- iwlwifi: mvm: offload channel switch timing to FW (bsc#1202131).\n- iwlwifi: mvm: only enable HE DCM if we also support TX (bsc#1202131).\n- iwlwifi: mvm: optionally suppress assert log (bsc#1202131).\n- iwlwifi: mvm: parse firmware alive message version 6 (bsc#1202131).\n- iwlwifi: mvm: read 6E enablement flags from DSM and pass to FW (bsc#1202131).\n- iwlwifi: mvm: reduce WARN_ON() in TX status path (bsc#1202131).\n- iwlwifi: mvm: refactor iwl_mvm_sta_rx_agg() (bsc#1202131).\n- iwlwifi: mvm: refactor setting PPE thresholds in STA_HE_CTXT_CMD (bsc#1202131).\n- iwlwifi: mvm: remove card state notification code (bsc#1202131).\n- iwlwifi: mvm: remove cipher scheme support (bsc#1202131).\n- iwlwifi: mvm: remove csi from iwl_mvm_pass_packet_to_mac80211() (bsc#1202131).\n- iwlwifi: mvm: remove iwl_mvm_disable_txq() flags argument (bsc#1202131).\n- iwlwifi: mvm: remove session protection after auth/assoc (bsc#1202131).\n- iwlwifi: mvm: remove session protection on disassoc (bsc#1202131).\n- iwlwifi: mvm: remove session protection upon station removal (bsc#1202131).\n- iwlwifi: mvm: rfi: handle deactivation notification (bsc#1202131).\n- iwlwifi: mvm: rfi: update rfi table (bsc#1202131).\n- iwlwifi: mvm: rfi: use kmemdup() to replace kzalloc + memcpy (bsc#1202131).\n- iwlwifi: mvm: scrub key material in firmware dumps (bsc#1202131).\n- iwlwifi: mvm: set BT-coex high priority for 802.1X/4-way-HS (bsc#1202131).\n- iwlwifi: mvm: set inactivity timeouts also for PS-poll (bsc#1202131).\n- iwlwifi: mvm: starting from 22000 we have 32 Rx AMPDU sessions (bsc#1202131).\n- iwlwifi: mvm: support Bz TX checksum offload (bsc#1202131).\n- iwlwifi: mvm: support RLC configuration command (bsc#1202131).\n- iwlwifi: mvm: support new BAID allocation command (bsc#1202131).\n- iwlwifi: mvm: support revision 1 of WTAS table (bsc#1202131).\n- iwlwifi: mvm: support v3 of station HE context command (bsc#1202131).\n- iwlwifi: mvm: update BAID allocation command again (bsc#1202131).\n- iwlwifi: mvm: update RFI TLV (bsc#1202131).\n- iwlwifi: mvm: update definitions due to new rate \u0026 flags (bsc#1202131).\n- iwlwifi: mvm: update rate scale in moving back to assoc state (bsc#1202131).\n- iwlwifi: mvm: use a define for checksum flags mask (bsc#1202131).\n- iwlwifi: mvm: use debug print instead of WARN_ON() (bsc#1202131).\n- iwlwifi: nvm: Correct HE capability (bsc#1202131).\n- iwlwifi: parse debug exclude data from firmware file (bsc#1202131).\n- iwlwifi: parse error tables from debug TLVs (bsc#1202131).\n- iwlwifi: pcie: Adapt rx queue write pointer for Bz family (bsc#1202131).\n- iwlwifi: pcie: add jacket bit to device configuration parsing (bsc#1202131).\n- iwlwifi: pcie: add support for MS devices (bsc#1202131).\n- iwlwifi: pcie: adjust to Bz completion descriptor (bsc#1202131).\n- iwlwifi: pcie: fix SW error MSI-X mapping (bsc#1202131).\n- iwlwifi: pcie: fix constant-conversion warning (bsc#1202131).\n- iwlwifi: pcie: fix killer name matching for AX200 (bsc#1202131).\n- iwlwifi: pcie: iwlwifi: fix device id 7F70 struct (bsc#1202131).\n- iwlwifi: pcie: make sure iwl_rx_packet_payload_len() will not underflow (bsc#1202131).\n- iwlwifi: pcie: refactor dev_info lookup (bsc#1202131).\n- iwlwifi: pcie: remove duplicate entry (bsc#1202131).\n- iwlwifi: pcie: remove two duplicate PNJ device entries (bsc#1202131).\n- iwlwifi: pcie: retake ownership after reset (bsc#1202131).\n- iwlwifi: pcie: simplify iwl_pci_find_dev_info() (bsc#1202131).\n- iwlwifi: pcie: support Bz suspend/resume trigger (bsc#1202131).\n- iwlwifi: pcie: try to grab NIC access early (bsc#1202131).\n- iwlwifi: pcie: update sw error interrupt for BZ family (bsc#1202131).\n- iwlwifi: pnvm: print out the version properly (bsc#1202131).\n- iwlwifi: prefer WIDE_ID() over iwl_cmd_id() (bsc#1202131).\n- iwlwifi: propagate (const) type qualifier (bsc#1202131).\n- iwlwifi: recognize missing PNVM data and then log filename (bsc#1202131).\n- iwlwifi: remove MODULE_AUTHOR() statements (bsc#1202131).\n- iwlwifi: remove command ID argument from queue allocation (bsc#1202131).\n- iwlwifi: remove contact information (bsc#1202131).\n- iwlwifi: remove deprecated broadcast filtering feature (bsc#1202131).\n- iwlwifi: remove redundant iwl_finish_nic_init() argument (bsc#1202131).\n- iwlwifi: remove unused DC2DC_CONFIG_CMD definitions (bsc#1202131).\n- iwlwifi: remove unused iwlax210_2ax_cfg_so_hr_a0 structure (bsc#1202131).\n- iwlwifi: remove unused macros (bsc#1202131).\n- iwlwifi: rename CHANNEL_SWITCH_NOA_NOTIF to CHANNEL_SWITCH_START_NOTIF (bsc#1202131).\n- iwlwifi: rename GEO_TX_POWER_LIMIT to PER_CHAIN_LIMIT_OFFSET_CMD (bsc#1202131).\n- iwlwifi: rs: add support for TLC config command ver 4 (bsc#1202131).\n- iwlwifi: scan: Modify return value of a function (bsc#1202131).\n- iwlwifi: support 4-bits in MAC step value (bsc#1202131).\n- iwlwifi: support SAR GEO Offset Mapping override via BIOS (bsc#1202131).\n- iwlwifi: support new queue allocation command (bsc#1202131).\n- iwlwifi: swap 1650i and 1650s killer struct names (bsc#1202131).\n- iwlwifi: tlc: Add logs in rs_fw_rate_init func to print TLC configuration (bsc#1202131).\n- iwlwifi: use 4k queue size for Bz A-step (bsc#1202131).\n- iwlwifi: yoyo: Avoid using dram data if allocation failed (bsc#1202131).\n- iwlwifi: yoyo: add IMR DRAM dump support (bsc#1202131).\n- iwlwifi: yoyo: disable IMR DRAM region if IMR is disabled (bsc#1202131).\n- iwlwifi: yoyo: dump IMR DRAM only for HW and FW error (bsc#1202131).\n- iwlwifi: yoyo: fix DBGC allocation flow (bsc#1202131).\n- iwlwifi: yoyo: fix DBGI_SRAM ini dump header (bsc#1202131).\n- iwlwifi: yoyo: fix issue with new DBGI_SRAM region read (bsc#1202131).\n- iwlwifi: yoyo: fw debug config from context info and preset (bsc#1202131).\n- iwlwifi: yoyo: send hcmd to fw after dump collection completes (bsc#1202131).\n- iwlwifi: yoyo: support TLV-based firmware reset (bsc#1202131).\n- iwlwifi: yoyo: support dump policy for the dump size (bsc#1202131).\n- iwlwifi: yoyo: support for DBGC4 for dram (bsc#1202131).\n- iwlwifi: yoyo: support for ROM usniffer (bsc#1202131).\n- ixgbe: Add locking to prevent panic when setting sriov_numvfs to zero (git-fixes).\n- ixgbe: fix bcast packets Rx on VF after promisc removal (git-fixes).\n- ixgbe: fix unexpected VLAN Rx in promisc mode on VF (git-fixes).\n- jbd2: export jbd2_journal_[grab|put]_journal_head (bsc#1202775).\n- jbd2: fix assertion \u0027jh-\u003eb_frozen_data == NULL\u0027 failure when journal aborted (bsc#1202716).\n- jbd2: fix outstanding credits assert in jbd2_journal_commit_transaction() (bsc#1202715).\n- kABI workaround for spi changes (bsc#1203699).\n- kABI: Add back removed struct paca member (bsc#1203664 ltc#199236).\n- kABI: Fix after adding trace_iterator.wait_index (git-fixes).\n- kABI: Fix kABI after \u0027KVM: x86/pmu: Use different raw event masks for AMD and Intel\u0027 (git-fixes).\n- kABI: Fix kABI after SNP-Guest backport (jsc#SLE-19924, jsc#SLE-24814).\n- kABI: Fix kABI after backport Add pmc-\u003eintr to refactor  kvm_perf_overflow{_intr}() (git-fixes).\n- kABI: Fix kABI after backport Always set kvm_run-\u003eif_flag (git-fixes).\n- kABI: Fix kABI after backport Forcibly leave nested virt when SMM state  is toggled (git-fixes).\n- kABI: Fix kABI after backport Refactoring find_arch_event() to  pmc_perf_hw_id() (git-fixes).\n- kABI: fix adding another field to scsi_device (bsc#1203039).\n- kABI: reintroduce a non-inline usleep_range (git-fixes).\n- kABI: scsi: libiscsi: fix removal of iscsi_create_conn (bsc#1198410).\n- kabi/severities: Exclude ppc kvm\n- kabi/severities: add Qlogic qed symbols\n- kabi/severities: add drivers/scsi/hisi_sas for bsc#1202471\n- kabi/severities: add hisilicon hns3 symbols\n- kabi/severities: add microchip dsa drivers\n- kabi/severities: ignore CS35L41-specific exports (bsc#1203699)\n- kabi/severities: ignore kABI changes in mwifiex drivers Those symbols are used only locally in mwifiex (sub-)modules.\n- kabi/severities: octeontx2 driver (jsc#SLE-24682)\n- kbuild: Add skip_encoding_btf_enum64 option to pahole (git-fixes).\n- kbuild: Unify options for BTF generation for vmlinux and modules (bsc#1204693).\n- kbuild: disable header exports for UML in a straightforward way (git-fixes).\n- kbuild: dummy-tools: avoid tmpdir leak in dummy gcc (git-fixes).\n- kbuild: fix the modules order between drivers and libs (git-fixes).\n- kbuild: link vmlinux only once for CONFIG_TRIM_UNUSED_KSYMS (2nd attempt) (git-fixes).\n- kbuild: remove the target in signal traps when interrupted (git-fixes).\n- kbuild: rpm-pkg: fix breakage when V=1 is used (git-fixes).\n- kcm: fix strp_init() order and cleanup (git-fies).\n- kernel-binary: move @NOSOURCE@ to @SOURCES@ as in other packages\n- kernel-source: include the kernel signature file We assume that the upstream tarball is used for released kernels. Then we can also include the signature file and keyring in the kernel-source src.rpm. Because of mkspec code limitation exclude the signature and keyring from binary packages always - mkspec does not parse spec conditionals.\n- kernfs: fix use-after-free in __kernfs_remove (git-fixes).\n- kexec, KEYS, s390: Make use of built-in and secondary keyring for signature verification (bsc#1196444).\n- kexec, KEYS: make the code in bzImage64_verify_sig generic (bsc#1196444).\n- kexec: clean up arch_kexec_kernel_verify_sig (bsc#1196444).\n- kexec: drop weak attribute from functions (bsc#1196444).\n- kexec: turn all kexec_mutex acquisitions into trylocks (git-fixes).\n- kexec_file: drop weak attribute from functions (bsc#1196444).\n- kfifo: fix kfifo_to_user() return type (git-fixes).\n- kselftest/arm64: Fix validatation termination record after EXTRA_CONTEXT (git-fixes).\n- kselftest/cgroup: fix test_stress.sh to use OUTPUT dir (git-fixes).\n- kselftest/vm: fix tests build with old libc (git-fixes).\n- kselftest: Fix vdso_test_abi return status (git-fixes).\n- kselftest: signal all child processes (git-fixes).\n- kvm: selftests: do not use bitfields larger than 32-bits for PTEs (git-fixes).\n- l3mdev: l3mdev_master_upper_ifindex_by_index_rcu should be using netdev_master_upper_dev_get_rcu (git-fixes).\n- landlock: Add clang-format exceptions (git-fixes).\n- landlock: Change landlock_add_rule(2) argument check ordering (git-fixes).\n- landlock: Change landlock_restrict_self(2) check ordering (git-fixes).\n- landlock: Create find_rule() from unmask_layers() (git-fixes).\n- landlock: Define access_mask_t to enforce a consistent access mask size (git-fixes).\n- landlock: Fix landlock_add_rule(2) documentation (git-fixes).\n- landlock: Fix same-layer rule unions (git-fixes).\n- landlock: Format with clang-format (git-fixes).\n- landlock: Reduce the maximum number of layers to 16 (git-fixes).\n- landlock: Use square brackets around \u0027landlock-ruleset\u0027 (git-fixes).\n- lib/list_debug.c: Detect uninitialized lists (git-fixes).\n- lib/raid6/test: fix multiple definition linking error (git-fixes).\n- lib/sg_pool: change module_init(sg_pool_init) to subsys_initcall (git-fixes).\n- lib/smp_processor_id: fix imbalanced instrumentation_end() call (git-fixes).\n- libata: add ATA_HORKAGE_NOLPM for Pioneer BDR-207M and BDR-205 (git-fixes).\n- livepatch: Add a missing newline character in klp_module_coming() (bsc#1071995).\n- livepatch: fix race between fork and KLP transition (bsc#1071995).\n- lkdtm: Disable return thunks in rodata.c (bsc#1190497).\n- lockd: detect and reject lock arguments that overflow (git-fixes).\n- lockdep: Correct lock_classes index mapping (git-fixes).\n- locking/lockdep: Avoid potential access of invalid memory in lock_class (git-fixes).\n- locking/lockdep: Fix lockdep_init_map_*() confusion (git-fixes).\n- locking/lockdep: Iterate lock_classes directly when reading lockdep files (git-fixes).\n- loop: Check for overflow while configuring loop (git-fies).\n- loop: Use pr_warn_once() for loop_control_remove() warning (git-fixes).\n- loop: use sysfs_emit() in the sysfs xxx show() (git-fixes).\n- mISDN: fix misuse of put_device() in mISDN_register_device() (git-fixes).\n- mISDN: fix possible memory leak in mISDN_dsp_element_register() (git-fixes).\n- mISDN: fix possible memory leak in mISDN_register_device() (git-fixes).\n- mISDN: fix use-after-free bugs in l1oip timer handlers (git-fixes).\n- mISDN: hfcpci: Fix use-after-free bug in hfcpci_softirq (git-fixes).\n- mac80211: fix a memory leak where sta_info is not freed (git-fixes).\n- mac80211: introduce channel switch disconnect function (bsc#1202131).\n- mac80211: radiotap: Use BIT() instead of shifts (git-fixes).\n- mac802154: Fix LQI recording (git-fixes).\n- mac802154: fix missing INIT_LIST_HEAD in ieee802154_if_add() (git-fixes).\n- macsec: Fix invalid error code set (git-fixes).\n- macsec: add missing attribute validation for offload (git-fixes).\n- macsec: always read MACSEC_SA_ATTR_PN as a u64 (git-fixes).\n- macsec: clear encryption keys from the stack after setting up offload (git-fixes).\n- macsec: delete new rxsc when offload fails (git-fixes).\n- macsec: fix NULL deref in macsec_add_rxsa (git-fixes).\n- macsec: fix detection of RXSCs when toggling offloading (git-fixes).\n- macsec: fix error message in macsec_add_rxsa and _txsa (git-fixes).\n- macsec: fix secy-\u003en_rx_sc accounting (git-fixes).\n- macsec: limit replay window size with XPN (git-fixes).\n- macvlan: enforce a consistent minimal mtu (git-fixes).\n- mailbox: bcm-ferxrm-mailbox: Fix error check for dma_map_sg (git-fixes).\n- mailbox: mpfs: account for mbox offsets while sending (git-fixes).\n- mailbox: mpfs: fix handling of the reg property (git-fixes).\n- marvell: octeontx2: build error: unknown type name \u0027u64\u0027 (jsc#SLE-24682).\n- mbcache: add functions to delete entry if unused (bsc#1198971).\n- mbcache: do not reclaim used entries (bsc#1198971).\n- md-raid10: fix KASAN warning (git-fixes).\n- md/bitmap: do not set sb values if can\u0027t pass sanity check (bsc#1197158).\n- md/raid0: Ignore RAID0 layout if the second zone has only one device (git-fixes).\n- md/raid1: fix missing bitmap update w/o WriteMostly devices (bsc#1203036).\n- md/raid5: Ensure stripe_fill happens on non-read IO with journal (git-fixes).\n- md/raid5: Remove unnecessary bio_put() in raid5_read_one_chunk() (git-fixes).\n- md: Replace snprintf with scnprintf (git-fixes, bsc#1164051).\n- md: call __md_stop_writes in md_stop (git-fixes).\n- md: unlock mddev before reap sync_thread in action_store (bsc#1197659).\n- media: [PATCH] pci: atomisp_cmd: fix three missing checks on list iterator (git-fixes).\n- media: aspeed: Fix an error handling path in aspeed_video_probe() (git-fixes).\n- media: atmel: atmel-sama7g5-isc: fix warning in configs without OF (git-fixes).\n- media: atomisp: prevent integer overflow in sh_css_set_black_frame() (git-fixes).\n- media: cedrus: Fix endless loop in cedrus_h265_skip_bits() (git-fixes).\n- media: cedrus: Set the platform driver data earlier (git-fixes).\n- media: cedrus: h265: Fix flag name (git-fixes).\n- media: cedrus: hevc: Add check for invalid timestamp (git-fixes).\n- media: coda: Add more H264 levels for CODA960 (git-fixes).\n- media: coda: Fix reported H264 profile (git-fixes).\n- media: cros-ec-cec: limit msg.len to CEC_MAX_MSG_SIZE (git-fixes).\n- media: cx88: Fix a null-ptr-deref bug in buffer_prepare() (git-fixes).\n- media: driver/nxp/imx-jpeg: fix a unexpected return value problem (git-fixes).\n- media: dvb-frontends/drxk: initialize err to 0 (git-fixes).\n- media: dvb_vb2: fix possible out of bound access (git-fixes).\n- media: exynos4-is: Change clk_disable to clk_disable_unprepare (git-fixes).\n- media: exynos4-is: Fix PM disable depth imbalance in fimc_is_probe (git-fixes).\n- media: flexcop-usb: fix endpoint type check (git-fixes).\n- media: hantro: postproc: Fix motion vector space size (git-fixes).\n- media: hdpvr: fix error value returns in hdpvr_read (git-fixes).\n- media: hevc: Embedded indexes in RPS (git-fixes).\n- media: imx-jpeg: Add pm-runtime support for imx-jpeg (git-fixes).\n- media: imx-jpeg: Add pm-sleep support for imx-jpeg (git-fixes).\n- media: imx-jpeg: Correct some definition according specification (git-fixes).\n- media: imx-jpeg: Disable slot interrupt when frame done (git-fixes).\n- media: imx-jpeg: Fix potential array out of bounds in queue_setup (git-fixes).\n- media: imx-jpeg: Leave a blank space before the configuration data (git-fixes).\n- media: imx-jpeg: Refactor function mxc_jpeg_parse (git-fixes).\n- media: imx-jpeg: use NV12M to represent non contiguous NV12 (git-fixes).\n- media: ipu3-imgu: Fix NULL pointer dereference in active selection access (git-fixes).\n- media: mceusb: Use new usb_control_msg_*() routines (git-fixes).\n- media: mceusb: set timeout to at least timeout provided (git-fixes).\n- media: meson: vdec: add missing clk_disable_unprepare on error in vdec_hevc_start() (git-fixes).\n- media: meson: vdec: fix possible refcount leak in vdec_probe() (git-fixes).\n- media: platform: mtk-mdp: Fix mdp_ipi_comm structure alignment.\n- media: pvrusb2: fix memory leak in pvr_probe (git-fixes).\n- media: rkisp1: Do not pass the quantization to rkisp1_csm_config() (git-fixes).\n- media: rkisp1: Initialize color space on resizer sink and source pads (git-fixes).\n- media: rkisp1: Use correct macro for gradient registers (git-fixes).\n- media: rkisp1: Zero v4l2_subdev_format fields in when validating links (git-fixes).\n- media: rkvdec: Disable H.264 error detection (git-fixes).\n- media: s5p_cec: limit msg.len to CEC_MAX_MSG_SIZE (git-fixes).\n- media: st-delta: Fix PM disable depth imbalance in delta_probe (git-fixes).\n- media: tw686x: Fix memory leak in tw686x_video_init (git-fixes).\n- media: tw686x: Register the irq at the end of probe (git-fixes).\n- media: uvcvideo: Fix memory leak in uvc_gpio_parse (git-fixes).\n- media: uvcvideo: Use entity get_cur in uvc_ctrl_set (git-fixes).\n- media: v4l2-compat-ioctl32.c: zero buffer passed to v4l2_compat_get_array_args() (git-fixes).\n- media: v4l2-dv-timings: add sanity checks for blanking values (git-fixes).\n- media: v4l2-mem2mem: prevent pollerr when last_buffer_dequeued is set (git-fixes).\n- media: v4l2: Fix v4l2_i2c_subdev_set_name function documentation (git-fixes).\n- media: v4l: subdev: Fail graciously when getting try data for NULL state (git-fixes).\n- media: venus: dec: Handle the case where find_format fails (git-fixes).\n- media: videodev2.h: V4L2_DV_BT_BLANKING_HEIGHT should check \u0027interlaced\u0027 (git-fixes).\n- media: vivid: dev-\u003ebitmap_cap wasn\u0027t freed in all cases (git-fixes).\n- media: vivid: s_fbuf: add more sanity checks (git-fixes).\n- media: vivid: set num_in/outputs to 0 if not supported (git-fixes).\n- media: vsp1: Fix offset calculation for plane cropping.\n- media: xilinx: vipp: Fix refcount leak in xvip_graph_dma_init (git-fixes).\n- mediatek: mt76: eeprom: fix missing of_node_put() in mt76_find_power_limits_node() (git-fixes).\n- mediatek: mt76: mac80211: Fix missing of_node_put() in mt76_led_init() (git-fixes).\n- memory: of: Fix refcount leak bug in of_get_ddr_timings() (git-fixes).\n- memory: of: Fix refcount leak bug in of_lpddr3_get_ddr_timings() (git-fixes).\n- memory: pl353-smc: Fix refcount leak bug in pl353_smc_probe() (git-fixes).\n- memstick/ms_block: Fix a memory leak (git-fixes).\n- memstick/ms_block: Fix some incorrect memory allocation (git-fixes).\n- meson-mx-socinfo: Fix refcount leak in meson_mx_socinfo_init (git-fixes).\n- mfd: fsl-imx25: Fix an error handling path in mx25_tsadc_setup_irq() (git-fixes).\n- mfd: fsl-imx25: Fix check for platform_get_irq() errors (git-fixes).\n- mfd: intel-lpss: Add Intel Raptor Lake PCH-S PCI IDs (jsc#PED-634).\n- mfd: intel_soc_pmic: Fix an error handling path in intel_soc_pmic_i2c_probe() (git-fixes).\n- mfd: lp8788: Fix an error handling path in lp8788_irq_init() and lp8788_irq_init() (git-fixes).\n- mfd: lp8788: Fix an error handling path in lp8788_probe() (git-fixes).\n- mfd: max77620: Fix refcount leak in max77620_initialise_fps (git-fixes).\n- mfd: sm501: Add check for platform_driver_register() (git-fixes).\n- mfd: t7l66xb: Drop platform disable callback (git-fixes).\n- minix: fix bug when opening a file with O_DIRECT (git-fixes).\n- misc/vmw_vmci: fix an infoleak in vmci_host_do_receive_datagram() (git-fixes).\n- misc: cs35l41: Remove unused pdn variable (bsc#1203699).\n- misc: fastrpc: fix memory corruption on open (git-fixes).\n- misc: fastrpc: fix memory corruption on probe (git-fixes).\n- misc: ocxl: fix possible refcount leak in afu_ioctl() (git-fixes).\n- misc: pci_endpoint_test: Aggregate params checking for xfer (git-fixes).\n- misc: pci_endpoint_test: Fix pci_endpoint_test_{copy,write,read}() panic (git-fixes).\n- misc: rtsx: Fix an error handling path in rtsx_pci_probe() (git-fixes).\n- mkspec: eliminate @NOSOURCE@ macro This should be alsways used with @SOURCES@, just include the content there.\n- mlxsw: i2c: Fix initialization error flow (git-fixes).\n- mlxsw: spectrum: Clear PTP configuration after unregistering the netdevice (git-fixes).\n- mlxsw: spectrum_cnt: Reorder counter pools (git-fixes).\n- mlxsw: spectrum_router: Fix IPv4 nexthop gateway indication (git-fixes).\n- mm/hugetlb: fix races when looking up a CONT-PTE/PMD size hugetlb page (bsc#1204575).\n- mm/rmap: Fix anon_vma-\u003edegree ambiguity leading to double-reuse (git-fixes). kABI: Fix kABI after \u0027mm/rmap: Fix anon_vma-\u003edegree ambiguity leading to double-reuse\u0027 (git-fixes).\n- mm: Fix PASID use-after-free issue (bsc#1203908).\n- mm: bdi: initialize bdi_min_ratio when bdi is unregistered (bsc#1197763).\n- mm: memcontrol: fix potential oom_lock recursion deadlock (bsc#1202447).\n- mm: pagewalk: Fix race between unmap and page walker (git-fixes, bsc#1203159).\n- mmc: au1xmmc: Fix an error handling path in au1xmmc_probe() (git-fixes).\n- mmc: block: Add single read for 4k sector cards (git-fixes).\n- mmc: cavium-octeon: Add of_node_put() when breaking out of loop (git-fixes).\n- mmc: cavium-thunderx: Add of_node_put() when breaking out of loop (git-fixes).\n- mmc: core: Fix UHS-I SD 1.8V workaround branch (git-fixes).\n- mmc: core: Fix ambiguous TRIM and DISCARD arg (git-fixes).\n- mmc: core: Fix inconsistent sd3_bus_mode at UHS-I SD voltage switch failure (git-fixes).\n- mmc: core: Fix kernel panic when remove non-standard SDIO card (git-fixes).\n- mmc: core: Replace with already defined values for readability (git-fixes).\n- mmc: core: Terminate infinite loop in SD-UHS voltage switch (git-fixes).\n- mmc: core: properly select voltage range without power cycle (git-fixes).\n- mmc: cqhci: Provide helper for resetting both SDHCI and CQHCI (git-fixes).\n- mmc: hsq: Fix data stomping during mmc recovery (git-fixes).\n- mmc: meson-gx: Fix an error handling path in meson_mmc_probe() (git-fixes).\n- mmc: mmc_test: Fix removal of debugfs file (git-fixes).\n- mmc: moxart: fix 4-bit bus width and remove 8-bit bus width (git-fixes).\n- mmc: mxcmmc: Silence a clang warning (git-fixes).\n- mmc: pxamci: Fix an error handling path in pxamci_probe() (git-fixes).\n- mmc: pxamci: Fix another error handling path in pxamci_probe() (git-fixes).\n- mmc: renesas_sdhi: Get the reset handle early in the probe (git-fixes).\n- mmc: sdhci-brcmstb: Enable Clock Gating to save power (git-fixes).\n- mmc: sdhci-brcmstb: Fix SDHCI_RESET_ALL for CQHCI (git-fixes).\n- mmc: sdhci-brcmstb: Re-organize flags (git-fixes).\n- mmc: sdhci-esdhc-imx: Propagate ESDHC_FLAG_HS400* only on 8bit bus (git-fixes).\n- mmc: sdhci-esdhc-imx: correct CQHCI exit halt state check (git-fixes).\n- mmc: sdhci-esdhc-imx: use the correct host caps for MMC_CAP_8_BIT_DATA (git-fixes).\n- mmc: sdhci-msm: add compatible string check for sdm670 (git-fixes).\n- mmc: sdhci-of-arasan: Fix SDHCI_RESET_ALL for CQHCI (git-fixes).\n- mmc: sdhci-of-at91: fix set_uhs_signaling rewriting of MC1R (git-fixes).\n- mmc: sdhci-of-esdhc: Fix refcount leak in esdhc_signal_voltage_switch (git-fixes).\n- mmc: sdhci-pci-core: Disable ES for ASUS BIOS on Jasper Lake (git-fixes).\n- mmc: sdhci-pci-o2micro: fix card detect fail issue caused by CD# debounce timeout (git-fixes).\n- mmc: sdhci-pci: Fix possible memory leak caused by missing pci_dev_put() (git-fixes).\n- mmc: sdhci-sprd: Fix minimum clock limit (git-fixes).\n- mmc: sdhci-sprd: Fix no reset data and command after voltage switch (git-fixes).\n- mmc: sdhci-tegra: Fix SDHCI_RESET_ALL for CQHCI (git-fixes).\n- mmc: sdhci_am654: \u0027select\u0027, not \u0027depends\u0027 REGMAP_MMIO (git-fixes).\n- mmc: sdhci_am654: Fix SDHCI_RESET_ALL for CQHCI (git-fixes).\n- mmc: tmio: avoid glitches when resetting (git-fixes).\n- mmc: wmt-sdmmc: Fix an error handling path in wmt_mci_probe() (git-fixes).\n- mms: sdhci-esdhc-imx: Fix SDHCI_RESET_ALL for CQHCI (git-fixes).\n- module: change to print useful messages from elf_validity_check() (git-fixes).\n- module: fix [e_shstrndx].sh_size=0 OOB access (git-fixes).\n- msft-hv-2570-hv_netvsc-Add-support-for-XDP_REDIRECT.patch: (bsc#1199364).\n- mt76: mt7615: do not update pm stats in case of error (git-fixes).\n- mt76: mt76x02u: fix possible memory leak in __mt76x02u_mcu_send_msg (git-fixes).\n- mt76: mt7921: enlarge maximum VHT MPDU length to 11454 (git-fixes).\n- mt76: mt7921: fix aggregation subframes setting to HE max (git-fixes).\n- mtd: dataflash: Add SPI ID table (git-fixes).\n- mtd: devices: docg3: check the return value of devm_ioremap() in the probe (git-fixes).\n- mtd: maps: Fix refcount leak in ap_flash_init (git-fixes).\n- mtd: maps: Fix refcount leak in of_flash_probe_versatile (git-fixes).\n- mtd: parsers: bcm47xxpart: Fix halfblock reads (git-fixes).\n- mtd: parsers: bcm47xxpart: print correct offset on read error (git-fixes).\n- mtd: parsers: ofpart: Fix refcount leak in bcm4908_partitions_fw_offset (git-fixes).\n- mtd: partitions: Fix refcount leak in parse_redboot_of (git-fixes).\n- mtd: rawnand: arasan: Fix clock rate in NV-DDR (git-fixes).\n- mtd: rawnand: arasan: Update NAND bus clock instead of system clock (git-fixes).\n- mtd: rawnand: atmel: Unmap streaming DMA mappings (git-fixes).\n- mtd: rawnand: fsl_elbc: Fix none ECC mode (git-fixes).\n- mtd: rawnand: gpmi: Set WAIT_FOR_READY timeout based on program/erase times (git-fixes).\n- mtd: rawnand: gpmi: validate controller clock rate (git-fixes).\n- mtd: rawnand: intel: Do not re-define NAND_DATA_IFACE_CHECK_ONLY (git-fixes).\n- mtd: rawnand: intel: Read the chip-select line from the correct OF node (git-fixes).\n- mtd: rawnand: intel: Remove undocumented compatible string (git-fixes).\n- mtd: rawnand: marvell: Use correct logic for nand-keep-config (git-fixes).\n- mtd: rawnand: meson: Fix a potential double free issue (git-fixes).\n- mtd: rawnand: meson: fix bit map use in meson_nfc_ecc_correct() (git-fixes).\n- mtd: sm_ftl: Fix deadlock caused by cancel_work_sync in sm_release (git-fixes).\n- mtd: spi-nor: fix spi_nor_spimem_setup_op() call in spi_nor_erase_{sector,chip}() (git-fixes).\n- mtd: spi-nor: intel-spi: Disable write protection only if asked (git-fixes).\n- mtd: st_spi_fsm: Add a clk_disable_unprepare() in .probe()\u0027s error path (git-fixes).\n- musb: fix USB_MUSB_TUSB6010 dependency (git-fixes).\n- mwifiex: Ignore BTCOEX events from the 88W8897 firmware (git-fixes).\n- mwifiex: fix sleep in atomic context bugs caused by dev_coredumpv (git-fixes).\n- n_gsm: remove unused parameters from gsm_error() (git-fixes).\n- nbd: Fix incorrect error handle when first_minor is illegal in nbd_dev_add (git-fixes).\n- net/dsa/hirschmann: Add missing of_node_get() in hellcreek_led_setup() (git-fixes).\n- net/ice: fix initializing the bitmap in the switch code (git-fixes).\n- net/ieee802154: fix uninit value bug in dgram_sendmsg (git-fixes).\n- net/mlx4_en: Fix wrong return value on ioctl EEPROM query failure (git-fixes).\n- net/mlx5: CT: Fix header-rewrite re-use for tupels (git-fixes).\n- net/mlx5: Drain fw_reset when removing device (git-fixes).\n- net/mlx5e: Block rx-gro-hw feature in switchdev mode (git-fixes).\n- net/mlx5e: Disable softirq in mlx5e_activate_rq to avoid race condition (git-fixes).\n- net/mlx5e: Fix enabling sriov while tc nic rules are offloaded (git-fixes).\n- net/mlx5e: Properly block HW GRO when XDP is enabled (git-fixes).\n- net/mlx5e: Properly block LRO when XDP is enabled (git-fixes).\n- net/mlx5e: Properly disable vlan strip on non-UL reps (git-fixes).\n- net/mlx5e: Remove HW-GRO from reported features (git-fixes).\n- net/mlx5e: Remove WARN_ON when trying to offload an unsupported TLS cipher/version (git-fixes).\n- net/mlx5e: Ring the TX doorbell on DMA errors (git-fixes).\n- net/mlx5e: TC NIC mode, fix tc chains miss table (git-fixes).\n- net/mlx5e: TC, fix decap fallback to uplink when int port not supported (git-fixes).\n- net/mlx5e: Update netdev features after changing XDP state (git-fixes).\n- net/mlx5e: xsk: Account for XSK RQ UMRs when calculating ICOSQ size (git-fixes).\n- net/qla3xxx: Fix a test in ql_reset_work() (git-fixes).\n- net/smc: Avoid overwriting the copies of clcsock callback functions (git-fixes).\n- net/smc: Fix an error code in smc_lgr_create() (git-fixes).\n- net/smc: Fix possible access to freed memory in link clear (git-fixes).\n- net/smc: Fix possible leaked pernet namespace in smc_init() (git-fixes).\n- net/smc: Fix slab-out-of-bounds issue in fallback (git-fixes).\n- net/smc: Fix sock leak when release after smc_shutdown() (git-fixes).\n- net/smc: Forward wakeup to smc socket waitqueue after fallback (git-fixes).\n- net/smc: Only save the original clcsock callback functions (git-fixes).\n- net/smc: Send directly when TCP_CORK is cleared (git-fixes).\n- net/smc: kABI workarounds for struct smc_link (git-fixes).\n- net/smc: kABI workarounds for struct smc_sock (git-fixes).\n- net/smc: send directly on setting TCP_NODELAY (git-fixes).\n- net/sunrpc: fix potential memory leaks in rpc_sysfs_xprt_state_change() (git-fixes).\n- net/x25: Fix skb leak in x25_lapb_receive_frame() (git-fixes).\n- net: altera: Fix refcount leak in altera_tse_mdio_create (git-fixes).\n- net: asix: fix \u0027can\u0027t send until first packet is send\u0027 issue (git-fixes).\n- net: atlantic: fix aq_vec index out of range error (git-fixes).\n- net: axienet: fix RX ring refill allocation failure handling (git-fixes).\n- net: axienet: reset core on initialization prior to MDIO access (git-fixes).\n- net: bcmgenet: Indicate MAC is in charge of PHY PM (git-fixes).\n- net: bcmgenet: Revert \u0027Use stronger register read/writes to assure ordering\u0027 (git-fixes).\n- net: bcmgenet: Use stronger register read/writes to assure ordering (git-fixes).\n- net: bcmgenet: hide status block before TX timestamping (git-fixes).\n- net: bgmac: Fix a BUG triggered by wrong bytes_compl (git-fixes).\n- net: bgmac: Fix an erroneous kfree() in bgmac_remove() (git-fixes).\n- net: bgmac: support MDIO described in DT (git-fixes).\n- net: bonding: fix possible NULL deref in rlb code (git-fixes).\n- net: bonding: fix use-after-free after 802.3ad slave unbind (git-fixes).\n- net: chelsio: cxgb4: Avoid potential negative array offset (git-fixes).\n- net: cpsw: add missing of_node_put() in cpsw_probe_dt() (git-fixes).\n- net: dp83822: disable false carrier interrupt (git-fixes).\n- net: dp83822: disable rx error interrupt (git-fixes).\n- net: dsa: b53: Add SPI ID table (git-fixes).\n- net: dsa: bcm_sf2: Fix Wake-on-LAN with mac_link_down() (git-fixes).\n- net: dsa: bcm_sf2: force pause link settings (git-fixes).\n- net: dsa: bcm_sf2_cfp: fix an incorrect NULL check on list iterator (git-fixes).\n- net: dsa: felix: Fix memory leak in felix_setup_mmio_filtering (git-fixes).\n- net: dsa: felix: fix tagging protocol changes with multiple CPU ports (git-fixes).\n- net: dsa: felix: purge skb from TX timestamping queue if it cannot be sent (git-fies).\n- net: dsa: felix: suppress -EPROBE_DEFER errors (git-fixes).\n- net: dsa: hellcreek: Add STP forwarding rule (git-fixes).\n- net: dsa: hellcreek: Add missing PTP via UDP rules (git-fixes).\n- net: dsa: hellcreek: Allow PTP P2P measurements on blocked ports (git-fixes).\n- net: dsa: hellcreek: Fix insertion of static FDB entries (git-fixes).\n- net: dsa: introduce helpers for iterating through ports using dp (git-fixes).\n- net: dsa: ksz9477: port mirror sniffing limited to one port (git-fixes).\n- net: dsa: lantiq_gswip: Do not set GSWIP_MII_CFG_RMII_CLK (git-fixes).\n- net: dsa: lantiq_gswip: Fix refcount leak in gswip_gphy_fw_list (git-fixes).\n- net: dsa: lantiq_gswip: fix use after free in gswip_remove() (git-fixes).\n- net: dsa: microchip: fix bridging with more than two member ports (git-fixes).\n- net: dsa: microchip: implement multi-bridge support (git-fixes).\n- net: dsa: microchip: ksz9477: fix fdb_dump last invalid entry (git-fixes).\n- net: dsa: microchip: ksz_common: Fix refcount leak bug (git-fixes).\n- net: dsa: mt7530: 1G can also support 1000BASE-X link mode (git-fixes).\n- net: dsa: mt7530: add missing of_node_put() in mt7530_setup() (git-fixes).\n- net: dsa: mv88e6060: prevent crash on an unused port (git-fixes).\n- net: dsa: mv88e6xxx: Add fix for erratum 5.2 of 88E6393X family (git-fixes).\n- net: dsa: mv88e6xxx: Drop unnecessary check in mv88e6393x_serdes_erratum_4_6() (git-fixes).\n- net: dsa: mv88e6xxx: Enable port policy support on 6097 (git-fixes).\n- net: dsa: mv88e6xxx: Fix application of erratum 4.8 for 88E6393X (git-fixes).\n- net: dsa: mv88e6xxx: Fix inband AN for 2500base-x on 88E6393X family (git-fixes).\n- net: dsa: mv88e6xxx: Fix port_hidden_wait to account for port_base_addr (git-fixes).\n- net: dsa: mv88e6xxx: Fix refcount leak in mv88e6xxx_mdios_register (git-fixes).\n- net: dsa: mv88e6xxx: Link in pcs_get_state() if AN is bypassed (git-fixes).\n- net: dsa: mv88e6xxx: Save power by disabling SerDes trasmitter and receiver (git-fixes).\n- net: dsa: mv88e6xxx: Unforce speed \u0026 duplex in mac_link_down() (git-fixes).\n- net: dsa: mv88e6xxx: allow use of PHYs on CPU and DSA ports (git-fixes).\n- net: dsa: mv88e6xxx: error handling for serdes_power functions (git-fixes).\n- net: dsa: mv88e6xxx: fix \u0027do not use PHY_DETECT on internal PHY\u0027s\u0027 (git-fixes).\n- net: dsa: mv88e6xxx: use BMSR_ANEGCOMPLETE bit for filling an_complete (git-fixes).\n- net: dsa: ocelot: seville: utilize of_mdiobus_register (git-fixes).\n- net: dsa: qca8k: fix MTU calculation (git-fixes).\n- net: dsa: restrict SMSC_LAN9303_I2C kconfig (git-fixes).\n- net: dsa: seville: register the mdiobus under devres (git-fixes).\n- net: dsa: sja1105: fix buffer overflow in sja1105_setup_devlink_regions() (git-fixes).\n- net: dsa: sja1105: silent spi_device_id warnings (git-fixes).\n- net: dsa: tag_ocelot_8021q: break circular dependency with ocelot switch lib (git-fies).\n- net: dsa: vitesse-vsc73xx: silent spi_device_id warnings (git-fixes).\n- net: emaclite: Add error handling for of_address_to_resource() (git-fixes).\n- net: enetc: Use pci_release_region() to release some resources (git-fixes).\n- net: enetc: report software timestamping via SO_TIMESTAMPING (git-fixes).\n- net: ethernet: bgmac: Fix refcount leak in bcma_mdio_mii_register (git-fixes).\n- net: ethernet: mediatek: ppe: fix wrong size passed to memset() (git-fixes).\n- net: ethernet: mv643xx: Fix over zealous checking of_get_mac_address() (git-fixes).\n- net: ethernet: nixge: fix NULL dereference (git-fixes).\n- net: ethernet: renesas: ravb: Fix promiscuous mode after system resumed (git-fixes).\n- net: ethernet: stmmac: fix altr_tse_pcs function when using a fixed-link (git-fixes).\n- net: ethernet: stmmac: fix write to sgmii_adapter_base (git-fixes).\n- net: ethernet: ti: am65-cpsw: Fix devlink port register sequence (git-fixes).\n- net: ethernet: ti: am65-cpsw: fix error handling in am65_cpsw_nuss_probe() (git-fixes).\n- net: ethernet: ti: davinci_mdio: Add workaround for errata i2329 (git-fixes).\n- net: ethernet: ti: davinci_mdio: fix build for mdio bitbang uses (git-fixes).\n- net: fec: add missing of_node_put() in fec_enet_init_stop_mode() (git-fixes).\n- net: fix IFF_TX_SKB_NO_LINEAR definition (git-fixes).\n- net: ftgmac100: Hold reference returned by of_get_child_by_name() (git-fixes).\n- net: ftgmac100: access hardware register after clock ready (git-fixes).\n- net: hns3: add netdev reset check for hns3_set_tunable() (git-fixes).\n- net: hns3: clean residual vf config after disable sriov (git-fixes).\n- net: hns3: do not push link state to VF if unalive (git-fixes).\n- net: hns3: fix the concurrency between functions reading debugfs (git-fixes).\n- net: hns3: set port base vlan tbl_sta to false before removing old vlan (git-fixes).\n- net: huawei: hinic: Use devm_kcalloc() instead of devm_kzalloc() (git-fixes).\n- net: hyperv: remove use of bpf_op_t (git-fixes).\n- net: ieee802154: return -EINVAL for unknown addr type (git-fixes).\n- net: ipa: do not assume SMEM is page-aligned (git-fixes).\n- net: ipa: get rid of a duplicate initialization (git-fixes).\n- net: ipa: kill ipa_cmd_pipeline_clear() (git-fixes).\n- net: ipa: record proper RX transaction count (git-fixes).\n- net: ipvtap - add __init/__exit annotations to module init/exit funcs (git-fixes).\n- net: macb: Fix PTP one step sync support (git-fixes).\n- net: macb: Increment rx bd head after allocating skb and buffer (git-fixes).\n- net: macsec: fix potential resource leak in macsec_add_rxsa() and macsec_add_txsa() (git-fixes).\n- net: mana: Add rmb after checking owner bits (git-fixes).\n- net: mana: Add support of XDP_REDIRECT action (bug#1201310, jsc#PED-529).\n- net: mana: Add the Linux MANA PF driver (bug#1201309, jsc#PED-529).\n- net: mana: Fix race on per-CQ variable napi work_done (git-fixes).\n- net: marvell: prestera: fix incorrect structure access (git-fixes).\n- net: mdio: Fix ENOMEM return value in BCM6368 mux bus controller (git-fixes).\n- net: mdio: fix unbalanced fwnode reference count in mdio_device_release() (git-fixes).\n- net: mdiobus: fix unbalanced node reference count (git-fixes).\n- net: moxa: get rid of asymmetry in DMA mapping/unmapping (git-fixes).\n- net: moxa: pass pdev instead of ndev to DMA functions (git-fixes).\n- net: mscc: ocelot: avoid corrupting hardware counters when moving VCAP filters (git-fixes).\n- net: mscc: ocelot: correctly report the timestamping RX filters in ethtool (git-fixes).\n- net: mscc: ocelot: create a function that replaces an existing VCAP filter (git-fixes).\n- net: mscc: ocelot: do not dereference NULL pointers with shared tc filters (git-fixes).\n- net: mscc: ocelot: do not downgrade timestamping RX filters in SIOCSHWTSTAMP (git-fixes).\n- net: mscc: ocelot: fix VCAP IS2 filters matching on both lookups (git-fixes).\n- net: mscc: ocelot: fix address of SYS_COUNT_TX_AGING counter (git-fixes).\n- net: mscc: ocelot: fix all IP traffic getting trapped to CPU with PTP over IP (git-fixes).\n- net: mscc: ocelot: fix broken IP multicast flooding (git-fixes).\n- net: mscc: ocelot: fix incorrect balancing with down LAG ports (git-fixes).\n- net: mscc: ocelot: fix last VCAP IS1/IS2 filter persisting in hardware when deleted (git-fixes).\n- net: mscc: ocelot: fix missing unlock on error in ocelot_hwstamp_set() (git-fixes).\n- net: mscc: ocelot: restrict tc-trap actions to VCAP IS2 lookup 0 (git-fixes).\n- net: mscc: ocelot: set up traps for PTP packets (git-fixes).\n- net: openvswitch: do not send internal clone attribute to the userspace (git-fixes).\n- net: openvswitch: fix leak of nested actions (git-fixes).\n- net: openvswitch: fix misuse of the cached connection on tuple changes (git-fixes).\n- net: openvswitch: fix parsing of nw_proto for IPv6 fragments (git-fixes).\n- net: pcs: xpcs: propagate xpcs_read error to xpcs_get_state_c37_sgmii (git-fixes).\n- net: phy: Do not WARN for PHY_READY state in mdio_bus_phy_resume() (git-fixes).\n- net: phy: Do not WARN for PHY_UP state in mdio_bus_phy_resume() (git-fixes).\n- net: phy: Warn about incorrect mdio_bus_phy_resume() state (git-fixes).\n- net: phy: aquantia: wait for the suspend/resume operations to finish (git-fixes).\n- net: phy: at803x: move page selection fix to config_init (git-fixes).\n- net: phy: dp83822: disable MDI crossover status change interrupt (git-fixes).\n- net: phy: dp83867: Extend RX strap quirk for SGMII mode (git-fixes).\n- net: phy: fix null-ptr-deref while probe() failed (git-fixes).\n- net: phy: marvell: add sleep time after enabling the loopback bit (git-fixes).\n- net: phy: mscc: macsec: clear encryption keys when freeing a flow (git-fixes).\n- net: phy: smsc: Disable Energy Detect Power-Down in interrupt mode (git-fixes).\n- net: ptp: add a definition for the UDP port for IEEE 1588 general messages (git-fixes).\n- net: rose: fix netdev reference changes (git-fixes).\n- net: smsc95xx: add support for Microchip EVB-LAN8670-USB (git-fixes).\n- net: sock: tracing: Fix sock_exceed_buf_limit not to dereference stale pointer (git-fixes).\n- net: sparx5: depends on PTP_1588_CLOCK_OPTIONAL (git-fixes).\n- net: sparx5: uses, depends on BRIDGE or !BRIDGE (git-fixes).\n- net: stmmac: Fix unset max_speed difference between DT and non-DT platforms (git-fixes).\n- net: stmmac: Use readl_poll_timeout_atomic() in atomic state (git-fixes).\n- net: stmmac: clean up impossible condition (git-fixes).\n- net: stmmac: disable Split Header (SPH) for Intel platforms (bsc#1194904).\n- net: stmmac: dwc-qos: Disable split header for Tegra194 (bsc#1194904).\n- net: stmmac: dwmac-qcom-ethqos: Enable RGMII functional clock on resume (git-fixes).\n- net: stmmac: dwmac-qcom-ethqos: add platform level clocks management (git-fixes).\n- net: stmmac: dwmac-sun8i: add missing of_node_put() in sun8i_dwmac_register_mdio_mux() (git-fixes).\n- net: stmmac: enhance XDP ZC driver level switching performance (git-fixes).\n- net: stmmac: fix dma queue left shift overflow issue (git-fixes).\n- net: stmmac: fix leaks in probe (git-fixes).\n- net: stmmac: fix off-by-one error in sanity check (git-fixes).\n- net: stmmac: fix out-of-bounds access in a selftest (git-fixes).\n- net: stmmac: fix pm runtime issue in stmmac_dvr_remove() (git-fixes).\n- net: stmmac: fix unbalanced ptp clock issue in suspend/resume flow (git-fixes).\n- net: stmmac: only enable DMA interrupts when ready (git-fixes).\n- net: stmmac: perserve TX and RX coalesce value during XDP setup (git-fixes).\n- net: stmmac: remove redunctant disable xPCS EEE call (git-fixes).\n- net: stmmac: remove unused get_addr() callback (git-fixes).\n- net: stmmac: work around sporadic tx issue on link-up (git-fixes).\n- net: sungem_phy: Add of_node_put() for reference returned by of_get_parent() (git-fixes).\n- net: systemport: Fix an error handling path in bcm_sysport_probe() (git-fixes).\n- net: tap: NULL pointer derefence in dev_parse_header_protocol when skb-\u003edev is null (git-fixes).\n- net: thunderbolt: Enable DMA paths only after rings are enabled (git-fixes).\n- net: thunderbolt: Fix error handling in tbnet_init() (git-fixes).\n- net: thunderbolt: fix memory leak in tbnet_open() (git-fixes).\n- net: thunderx: Fix the ACPI memory leak (git-fixes).\n- net: usb: Correct PHY handling of smsc95xx (git-fixes).\n- net: usb: Correct reset handling of smsc95xx (git-fixes).\n- net: usb: ax88179_178a needs FLAG_SEND_ZLP (git-fixes).\n- net: usb: ax88179_178a: add Allied Telesis AT-UMCs (git-fixes).\n- net: usb: make USB_RTL8153_ECM non user configurable (git-fixes).\n- net: usb: qmi_wwan: Add new usb-id for Dell branded EM7455 (git-fixes).\n- net: usb: qmi_wwan: add Quectel RM520N (git-fixes).\n- net: usb: qmi_wwan: add Telit 0x103a composition (git-fixes).\n- net: usb: r8152: Add in new Devices that are supported for Mac-Passthru (git-fixes).\n- net: vmxnet3: fix possible NULL pointer dereference in vmxnet3_rq_cleanup() (bsc#1200431).\n- net: vmxnet3: fix possible use-after-free bugs in vmxnet3_rq_alloc_rx_buf() (bsc#1200431).\n- net: vmxnet3: remove multiple false checks in vmxnet3_ethtool.c (bsc#1200431).\n- net: wwan: iosm: Call mutex_init before locking it (git-fixes).\n- net: wwan: iosm: fix dma_alloc_coherent incompatible pointer type (git-fixes).\n- net: wwan: iosm: fix kernel test robot reported error (git-fixes).\n- net: wwan: iosm: remove pointless null check (git-fixes).\n- net:enetc: allocate CBD ring data memory using DMA coherent methods (git-fixes).\n- net_sched: cls_route: disallow handle of 0 (bsc#1202393).\n- netdevsim: fib: Fix reference count leak on route deletion failure (git-fixes).\n- nfc/nci: fix race with opening and closing (git-fixes).\n- nfc: fdp: Fix potential memory leak in fdp_nci_send() (git-fixes).\n- nfc: nfcmrvl: Fix potential memory leak in nfcmrvl_i2c_nci_send() (git-fixes).\n- nfc: nxp-nci: Fix potential memory leak in nxp_nci_send() (git-fixes).\n- nfc: pn533: Fix use-after-free bugs caused by pn532_cmd_timeout (git-fixes).\n- nfc: s3fwrn5: Fix potential memory leak in s3fwrn5_nci_send() (git-fixes).\n- nfc: st-nci: fix incorrect sizing calculations in EVT_TRANSACTION (git-fixes).\n- nfc: st-nci: fix incorrect validating logic in EVT_TRANSACTION (git-fixes).\n- nfc: st-nci: fix memory leaks in EVT_TRANSACTION (git-fixes).\n- nfp: ethtool: fix the display error of `ethtool -m DEVNAME` (git-fixes).\n- nfsd: eliminate the NFSD_FILE_BREAK_* flags (git-fixes).\n- nfsd: fix use-after-free due to delegation race (git-fixes).\n- nilfs2: fix NULL pointer dereference in nilfs_palloc_commit_free_entry() (git-fixes).\n- nilfs2: fix deadlock in nilfs_count_free_blocks() (git-fixes).\n- nilfs2: fix incorrect masking of permission flags for symlinks (git-fixes).\n- nilfs2: fix lockdep warnings during disk space reclamation (git-fixes).\n- nilfs2: fix lockdep warnings in page operations for btree nodes (git-fixes).\n- nilfs2: fix nilfs_sufile_mark_dirty() not set segment usage as dirty (git-fixes).\n- nilfs2: fix use-after-free bug of ns_writer on remount (git-fixes).\n- nilfs2: replace WARN_ONs by nilfs_error for checkpoint acquisition failure (git-fixes).\n- nohz/full, sched/rt: Fix missed tick-reenabling bug in dequeue_task_rt() (bnc#1189999 (Scheduler functional and performance backports)).\n- nouveau/svm: Fix to migrate all requested pages (git-fixes).\n- nouveau: explicitly wait on the fence in nouveau_bo_move_m2mf (git-fies).\n- ntb_hw_amd: Add NTB PCI ID for new gen CPU (bsc#1202113).\n- nvme-auth: align to pre-upstream FFDHE implementation (bsc#1202265).\n- nvme-auth: retry command if DNR bit is not set (bsc#1201675).\n- nvme-fabrics: parse nvme connect Linux error codes (bsc#1201865).\n- nvme-rdma: Handle number of queue changes (bsc#1201865).\n- nvme-tcp: Handle number of queue changes (bsc#1201865).\n- nvme-tcp: fix UAF when detecting digest errors (bsc#1200313 bsc#1201489).\n- nvme: consider also host_iface when checking ip options (bsc#1199670).\n- nvme: do not print verbose errors for internal passthrough requests (bsc#1202187).\n- nvme: fix RCU hole that allowed for endless looping in multipath round robin (bsc#1202636).\n- nvme: implement In-Band authentication (jsc#SLE-20183).\n- nvme: kabi fixes for in-band authentication (bsc#1199086).\n- nvmem: core: Check input parameter for NULL in nvmem_unregister() (bsc#1204241).\n- nvmet-auth: expire authentication sessions (jsc#SLE-20183).\n- nvmet: Expose max queues to configfs (bsc#1201865).\n- nvmet: implement basic In-Band Authentication (jsc#SLE-20183).\n- ocfs2: dlmfs: fix error handling of user_dlm_destroy_lock (bsc#1202778).\n- ocfs2: fix a deadlock when commit trans (bsc#1202776).\n- octeontx2-af: Add KPU changes to parse NGIO as separate layer (jsc#SLE-24682).\n- octeontx2-af: Add PTP device id for CN10K and 95O silcons (jsc#SLE-24682).\n- octeontx2-af: Add SDP interface support (jsc#SLE-24682).\n- octeontx2-af: Add debug messages for failures (jsc#SLE-24682).\n- octeontx2-af: Add external ptp input clock (jsc#SLE-24682).\n- octeontx2-af: Add free rsrc count mbox msg (jsc#SLE-24682).\n- octeontx2-af: Add mbox to retrieve bandwidth profile free count (jsc#SLE-24682).\n- octeontx2-af: Add support to flush full CPT CTX cache (jsc#SLE-24682).\n- octeontx2-af: Adjust LA pointer for cpt parse header (jsc#SLE-24682).\n- octeontx2-af: Allocate low priority entries for PF (jsc#SLE-24682).\n- octeontx2-af: Allow to configure flow tag LSB byte as RSS adder (jsc#SLE-24682).\n- octeontx2-af: Apply tx nibble fixup always (git-fixes).\n- octeontx2-af: Change the order of queue work and interrupt disable (jsc#SLE-24682).\n- octeontx2-af: Do not enable Pause frames by default (jsc#SLE-24682).\n- octeontx2-af: Enable CPT HW interrupts (jsc#SLE-24682).\n- octeontx2-af: Enhance mailbox trace entry (jsc#SLE-24682).\n- octeontx2-af: Fix LBK backpressure id count (jsc#SLE-24682).\n- octeontx2-af: Fix inconsistent license text (jsc#SLE-24682).\n- octeontx2-af: Fix interrupt name strings (jsc#SLE-24682).\n- octeontx2-af: Fix key checking for source mac (git-fixes).\n- octeontx2-af: Fix mcam entry resource leak (git-fixes).\n- octeontx2-af: Fix spelling mistake \u0027Makesure\u0027 -\u003e \u0027Make sure\u0027 (jsc#SLE-24682).\n- octeontx2-af: Fix uninitialized variable val (jsc#SLE-24682).\n- octeontx2-af: Flow control resource management (jsc#SLE-24682).\n- octeontx2-af: Handle return value in block reset (jsc#SLE-24682).\n- octeontx2-af: Hardware configuration for inline IPsec (jsc#SLE-24682).\n- octeontx2-af: Increase link credit restore polling timeout (jsc#SLE-24682).\n- octeontx2-af: Increase number of reserved entries in KPU (jsc#SLE-24682).\n- octeontx2-af: Increment ptp refcount before use (jsc#SLE-24682).\n- octeontx2-af: Limit KPU parsing for GTPU packets (jsc#SLE-24682).\n- octeontx2-af: Modify install flow error codes (jsc#SLE-24682).\n- octeontx2-af: Optimize KPU1 processing for variable-length headers (jsc#SLE-24682).\n- octeontx2-af: Perform cpt lf teardown in non FLR path (jsc#SLE-24682).\n- octeontx2-af: Priority flow control configuration support (jsc#SLE-24682).\n- octeontx2-af: Remove channel verification while installing MCAM rules (jsc#SLE-24682).\n- octeontx2-af: Remove redundant initialization of variable blkaddr (jsc#SLE-24682).\n- octeontx2-af: Remove redundant initialization of variable pin (jsc#SLE-24682).\n- octeontx2-af: Reset PTP config in FLR handler (jsc#SLE-24682).\n- octeontx2-af: Retry until RVU block reset complete (jsc#SLE-24682).\n- octeontx2-af: Use DMA_ATTR_FORCE_CONTIGUOUS attribute in DMA alloc (jsc#SLE-24682).\n- octeontx2-af: Use NDC TX for transmit packet data (jsc#SLE-24682).\n- octeontx2-af: Use ptp input clock info from firmware data (jsc#SLE-24682).\n- octeontx2-af: Wait for TX link idle for credits change (jsc#SLE-24682).\n- octeontx2-af: add proper return codes for AF mailbox handlers (jsc#SLE-24682).\n- octeontx2-af: cn10K: Get NPC counters value (jsc#SLE-24682).\n- octeontx2-af: cn10K: support for sched lmtst and other features (jsc#SLE-24682).\n- octeontx2-af: cn10k: DWRR MTU configuration (jsc#SLE-24682).\n- octeontx2-af: cn10k: RPM hardware timestamp configuration (jsc#SLE-24682).\n- octeontx2-af: cn10k: Set cache lines for NPA batch alloc (jsc#SLE-24682).\n- octeontx2-af: cn10k: Use appropriate register for LMAC enable (jsc#SLE-24682).\n- octeontx2-af: cn10k: add workaround for ptp errata (jsc#SLE-24682).\n- octeontx2-af: cn10k: debugfs for dumping LMTST map table (jsc#SLE-24682).\n- octeontx2-af: configure npc for cn10k to allow packets from cpt (jsc#SLE-24682).\n- octeontx2-af: debugfs: Add channel and channel mask (jsc#SLE-24682).\n- octeontx2-af: debugfs: Minor changes (jsc#SLE-24682).\n- octeontx2-af: debugfs: do not corrupt user memory (jsc#SLE-24682).\n- octeontx2-af: debugfs: fix error return of allocations (jsc#SLE-24682).\n- octeontx2-af: enable tx shaping feature for 96xx C0 (jsc#SLE-24682).\n- octeontx2-af: fix array bound error (jsc#SLE-24682).\n- octeontx2-af: fix error code in is_valid_offset() (jsc#SLE-24682).\n- octeontx2-af: initialize action variable (jsc#SLE-24682).\n- octeontx2-af: nix and lbk in loop mode in 98xx (jsc#SLE-24682).\n- octeontx2-af: remove redudant second error check on variable err (jsc#SLE-24682).\n- octeontx2-af: suppress external profile loading warning (git-fixes).\n- octeontx2-af: use swap() to make code cleaner (jsc#SLE-24682).\n- octeontx2-af: verify CQ context updates (jsc#SLE-24682).\n- octeontx2-nic: fix mixed module build (jsc#SLE-24682).\n- octeontx2-nicvf: Add PTP hardware clock support to NIX VF (jsc#SLE-24682).\n- octeontx2-nicvf: Free VF PTP resources (jsc#SLE-24682).\n- octeontx2-pf: Add TC feature for VFs (jsc#SLE-24682).\n- octeontx2-pf: Add XDP support to netdev PF (jsc#SLE-24682).\n- octeontx2-pf: Add check for non zero mcam flows (jsc#SLE-24682).\n- octeontx2-pf: Add support for adaptive interrupt coalescing (jsc#SLE-24682).\n- octeontx2-pf: Add vlan-etype to ntuple filters (jsc#SLE-24682).\n- octeontx2-pf: Allow VLAN priority also in ntuple filters (jsc#SLE-24682).\n- octeontx2-pf: CN10K: Hide RPM stats over ethtool (jsc#SLE-24682).\n- octeontx2-pf: Do not mask out supported link modes (jsc#SLE-24682).\n- octeontx2-pf: Enable NETIF_F_RXALL support for VF driver (jsc#SLE-24682).\n- octeontx2-pf: Fix NIX_AF_TL3_TL2X_LINKX_CFG register configuration (git-fixes).\n- octeontx2-pf: Fix UDP/TCP src and dst port tc filters (git-fixes).\n- octeontx2-pf: Fix inconsistent license text (jsc#SLE-24682).\n- octeontx2-pf: Ntuple filters support for VF netdev (jsc#SLE-24682).\n- octeontx2-pf: PFC config support with DCBx (jsc#SLE-24682).\n- octeontx2-pf: Remove unnecessary synchronize_irq() before free_irq() (jsc#SLE-24682).\n- octeontx2-pf: Simplify the receive buffer size calculation (jsc#SLE-24682).\n- octeontx2-pf: Sort the allocated MCAM entry indices (jsc#SLE-24682).\n- octeontx2-pf: Unify flow management variables (jsc#SLE-24682).\n- octeontx2-pf: Use hardware register for CQE count (jsc#SLE-24682).\n- octeontx2-pf: cn10K: Reserve LMTST lines per core (jsc#SLE-24682).\n- octeontx2-pf: cn10k: Config DWRR weight based on MTU (jsc#SLE-24682).\n- octeontx2-pf: cn10k: Ensure valid pointers are freed to aura (jsc#SLE-24682).\n- octeontx2-pf: cn10k: Fix egress ratelimit configuration (git-fixes).\n- octeontx2-pf: cn10k: add support for new ptp timestamp format (jsc#SLE-24682).\n- octeontx2-pf: devlink params support to set mcam entry count (jsc#SLE-24682).\n- octeontx2-pf: replace bitmap_weight with bitmap_empty where appropriate (jsc#SLE-24682).\n- octeontx2-pf: select CONFIG_NET_DEVLINK (jsc#SLE-24682).\n- octeontx2-vf: Add support for adaptive interrupt coalescing (jsc#SLE-24682).\n- octeontx2: Move devlink registration to be last devlink command (jsc#SLE-24682).\n- of/device: Fix up of_dma_configure_id() stub (git-fixes).\n- of: fdt: fix off-by-one error in unflatten_dt_nodes() (git-fixes).\n- openvswitch: Fix double reporting of drops in dropwatch (git-fixes).\n- openvswitch: Fix overreporting of drops in dropwatch (git-fixes).\n- openvswitch: Fix setting ipv6 fields causing hw csum failure (git-fixes).\n- openvswitch: Fixed nd target mask field in the flow dump (git-fixes).\n- openvswitch: add nf_ct_is_confirmed check before assigning the helper (git-fixes).\n- openvswitch: always update flow key after nat (git-fixes).\n- openvswitch: switch from WARN to pr_warn (git-fixes).\n- optee: add error checks in optee_ffa_do_call_with_arg() (git-fixes).\n- overflow.h: restore __ab_c_size (git-fixes).\n- overflow: Implement size_t saturating arithmetic helpers (jsc#PED-1211).\n- pNFS/flexfiles: Report RDMA connection errors to the server (git-fixes).\n- padata: Fix list iterator in padata_do_serial() (git-fixes).\n- panic, kexec: make __crash_kexec() NMI safe (git-fixes).\n- parisc/sticon: fix reverse colors (bsc#1152489)\n- parisc/stifb: Fix fb_is_primary_device() only available with (bsc#1152489)\n- parisc/stifb: Implement fb_is_primary_device() (bsc#1152489)\n- parisc/stifb: Keep track of hardware path of graphics card (bsc#1152489)\n- parport_pc: Avoid FIFO port location truncation (git-fixes).\n- perf bench futex: Fix memory leak of perf_cpu_map__new() (git-fixes).\n- phy: amlogic: phy-meson-axg-mipi-pcie-analog: Hold reference returned by of_get_parent() (git-fixes).\n- phy: qualcomm: call clk_disable_unprepare in the error handling (git-fixes).\n- phy: ralink: mt7621-pci: add sentinel to quirks table (git-fixes).\n- phy: samsung: phy-exynos-pcie: sanitize init/power_on callbacks (git-fixes).\n- phy: stm32: fix an error code in probe (git-fixes).\n- phy: stm32: fix error return in stm32_usbphyc_phy_init (git-fixes).\n- pinctrl: Ingenic: JZ4755 bug fixes (git-fixes).\n- pinctrl: alderlake: Add Intel Alder Lake-N pin controller support (jsc#PED-676).\n- pinctrl: alderlake: Add Raptor Lake-S ACPI ID (jsc#PED-634).\n- pinctrl: alderlake: Fix register offsets for ADL-N variant (jsc#PED-676).\n- pinctrl: amd: Do not save/restore interrupt status and wake status bits (git-fixes).\n- pinctrl: armada-37xx: Add missing GPIO-only pins (git-fixes).\n- pinctrl: armada-37xx: Checks for errors in gpio_request_enable callback (git-fixes).\n- pinctrl: armada-37xx: Convert to use dev_err_probe() (git-fixes).\n- pinctrl: armada-37xx: Fix definitions for MPP pins 20-22 (git-fixes).\n- pinctrl: armada-37xx: Make use of the devm_platform_ioremap_resource() (git-fixes).\n- pinctrl: armada-37xx: Use temporary variable for struct device (git-fixes).\n- pinctrl: devicetree: fix null pointer dereferencing in pinctrl_dt_to_map (git-fixes).\n- pinctrl: intel: Check against matching data instead of ACPI companion (git-fixes).\n- pinctrl: intel: Save and restore pins in \u0027direct IRQ\u0027 mode (git-fixes).\n- pinctrl: microchip-sgpio: Correct the fwnode_irq_get() return value check (git-fixes).\n- pinctrl: nomadik: Fix refcount leak in nmk_pinctrl_dt_subnode_to_map (git-fixes).\n- pinctrl: qcom: msm8916: Allow CAMSS GP clocks to be muxed (git-fixes).\n- pinctrl: qcom: sc8180x: Fix gpio_wakeirq_map (git-fixes).\n- pinctrl: qcom: sc8180x: Fix wrong pin numbers (git-fixes).\n- pinctrl: qcom: sm8250: Fix PDC map (git-fixes).\n- pinctrl: rockchip: list all pins in a possible mux route for PX30 (git-fixes).\n- pinctrl: single: Fix potential division by zero (git-fixes).\n- pinctrl: sunxi: Add I/O bias setting for H6 R-PIO (git-fixes).\n- pinctrl: sunxi: Fix name for A100 R_PIO (git-fixes).\n- platform/chrome: cros_ec: Always expose last resume result (git-fixes).\n- platform/chrome: cros_ec: Notify the PM of wake events during resume (git-fixes).\n- platform/chrome: cros_ec_proto: Update version on GET_NEXT_EVENT failure (git-fixes).\n- platform/chrome: cros_ec_proto: do not show MKBP version if unsupported (git-fixes).\n- platform/chrome: cros_ec_typec: Correct alt mode index (git-fixes).\n- platform/chrome: fix double-free in chromeos_laptop_prepare() (git-fixes).\n- platform/chrome: fix memory corruption in ioctl (git-fixes).\n- platform/olpc: Fix uninitialized data in debugfs write (git-fixes).\n- platform/surface: aggregator: Do not check for repeated unsequenced packets (git-fixes).\n- platform/surface: aggregator_registry: Add support for Surface Laptop Go 2 (git-fixes).\n- platform/x86/intel/pmt: Sapphire Rapids PMT errata fix (jsc#PED-2684 bsc#1205683).\n- platform/x86/intel: hid: add quirk to support Surface Go 3 (git-fixes).\n- platform/x86/intel: pmc: Do not unconditionally attach Intel PMC when virtualized (git-fixes).\n- platform/x86: acer-wmi: Acer Aspire One AOD270/Packard Bell Dot keymap fixes (git-fixes).\n- platform/x86: acer-wmi: Enable SW_TABLET_MODE on Switch V 10 (SW5-017) (git-fixes).\n- platform/x86: asus-wmi: Document the dgpu_disable sysfs attribute (git-fixes).\n- platform/x86: asus-wmi: Document the egpu_enable sysfs attribute (git-fixes).\n- platform/x86: asus-wmi: Document the panel_od sysfs attribute (git-fixes).\n- platform/x86: asus-wmi: add missing pci_dev_put() in asus_wmi_set_xusb2pr() (git-fixes).\n- platform/x86: hp-wmi: Ignore Smart Experience App event (git-fixes).\n- platform/x86: hp_wmi: Fix rfkill causing soft blocked wifi (git-fixes).\n- platform/x86: i2c-multi-instantiate: Rename it for a generic serial driver name (bsc#1203699).\n- platform/x86: ideapad-laptop: Disable touchpad_switch (git-fixes).\n- platform/x86: msi-laptop: Change DMI match / alias strings to fix module autoloading (git-fixes).\n- platform/x86: msi-laptop: Fix old-ec check for backlight registering (git-fixes).\n- platform/x86: msi-laptop: Fix resource cleanup (git-fixes).\n- platform/x86: pmc_atom: Fix SLP_TYPx bitfield mask (git-fixes).\n- platform/x86: pmc_atom: Match all Lex BayTrail boards with critclk_systems DMI table (git-fixes).\n- platform/x86: serial-multi-instantiate: Add CLSA0101 Laptop (bsc#1203699).\n- platform/x86: serial-multi-instantiate: Add SPI support (bsc#1203699).\n- platform/x86: serial-multi-instantiate: Reorganize I2C functions (bsc#1203699).\n- platform/x86: touchscreen_dmi: Add info for the RCA Cambio W101 v2 2-in-1 (git-fixes).\n- plip: avoid rcu debug splat (git-fixes).\n- power: supply: adp5061: fix out-of-bounds read in adp5061_get_chg_type() (git-fixes).\n- powerpc-pseries-mobility-set-NMI-watchdog-factor-dur.patch.\n- powerpc-watchdog-introduce-a-NMI-watchdog-s-factor.patch.\n- powerpc/64: Fix build failure with allyesconfig in book3s_64_entry.S (bsc#1194869).\n- powerpc/64: Remove unused SYS_CALL_TABLE symbol (jsc#SLE-9246 git-fixes).\n- powerpc/64: pcpu setup avoid reading mmu_linear_psize on 64e or radix (bsc#1204413 ltc#200176).\n- powerpc/64s: Fix build failure when CONFIG_PPC_64S_HASH_MMU is not set (bsc#1204413 ltc#200176).\n- powerpc/64s: Make flush_and_reload_slb a no-op when radix is enabled (bsc#1204413 ltc#200176).\n- powerpc/64s: Make hash MMU support configurable (bsc#1204413 ltc#200176).\n- powerpc/64s: Move and rename do_bad_slb_fault as it is not hash specific (bsc#1204413 ltc#200176).\n- powerpc/64s: Move hash MMU support code under CONFIG_PPC_64S_HASH_MMU (bsc#1204413 ltc#200176).\n- powerpc/64s: Rename hash_hugetlbpage.c to hugetlbpage.c (bsc#1204413 ltc#200176).\n- powerpc/boot: Explicitly disable usage of SPE instructions (bsc#1156395).\n- powerpc/fadump: align destination address to pagesize (bsc#1204728 ltc#200074).\n- powerpc/kprobes: Fix null pointer reference in arch_prepare_kprobe() (jsc#SLE-13847 git-fixes).\n- powerpc/kvm: Fix kvm_use_magic_page (bsc#1156395).\n- powerpc/mm/64s: Drop pgd_huge() (bsc#1065729).\n- powerpc/pci_dn: Add missing of_node_put() (bsc#1065729).\n- powerpc/perf: Optimize clearing the pending PMI and remove WARN_ON for PMI check in power_pmu_disable (bsc#1156395).\n- powerpc/powernv/kvm: Use darn for H_RANDOM on Power9 (bsc#1065729).\n- powerpc/powernv: Avoid crashing if rng is NULL (bsc#1065729).\n- powerpc/powernv: add missing of_node_put() in opal_export_attrs() (bsc#1065729).\n- powerpc/powernv: delay rng platform device creation until later in boot (bsc#1065729).\n- powerpc/powernv: rename remaining rng powernv_ functions to pnv_ (bsc#1065729).\n- powerpc/powernv: wire up rng during setup_arch (bsc#1065729).\n- powerpc/pseries/vas: Add VAS IRQ primary handler (bsc#1204413 ltc#200176).\n- powerpc/pseries/vas: Declare pseries_vas_fault_thread_fn() as static (bsc#1194869).\n- powerpc/pseries/vas: Pass hw_cpu_id to node associativity HCALL (bsc#1194869).\n- powerpc/pseries: Interface to represent PAPR firmware attributes (bsc#1200465 ltc#197256 jsc#SLE-18130).\n- powerpc/pseries: Rename TYPE1_AFFINITY to FORM1_AFFINITY (bsc#1200465 ltc#197256 jsc#SLE-18130).\n- powerpc/pseries: Stop selecting PPC_HASH_MMU_NATIVE (bsc#1204413 ltc#200176).\n- powerpc/pseries: lparcfg do not include slb_size line in radix mode (bsc#1204413 ltc#200176).\n- powerpc/pseries: rename min_common_depth to primary_domain_index (bsc#1200465 ltc#197256 jsc#SLE-18130).\n- powerpc/pseries: wire up rng during setup_arch() (bsc#1065729).\n- powerpc/xive: Fix refcount leak in xive_get_max_prio (git-fixess).\n- powerpc: Avoid discarding flags in system_call_exception() (bsc#1194869).\n- powerpc: Enable execve syscall exit tracepoint (bsc#1065729).\n- powerpc: Ignore DSI error caused by the copy/paste instruction (bsc#1204413 ltc#200176).\n- powerpc: Rename PPC_NATIVE to PPC_HASH_MMU_NATIVE (bsc#1204413 ltc#200176). Update config files.\n- powerpc: make memremap_compat_align 64s-only (bsc#1204413 ltc#200176).\n- powerpc: powernv: kABI: add back powernv_get_random_long (bsc#1065729).\n- ppc64/kdump: Limit kdump base to 512MB (bsc#1203410 ltc#199904).\n- printk: add missing memory barrier to wake_up_klogd() (bsc#1204934).\n- printk: use atomic updates for klogd work (bsc#1204934).\n- printk: wake waiters for safe and NMI contexts (bsc#1204934).\n- proc: avoid integer type confusion in get_proc_long (git-fixes).\n- proc: fix a dentry lock race between release_task and lookup (git-fixes).\n- proc: fix dentry/inode overinstantiating under /proc/${pid}/net (git-fixes).\n- proc: proc_skip_spaces() shouldn\u0027t think it is working on C strings (git-fixes).\n- profiling: fix shift too large makes kernel panic (git-fixes).\n- pwm: lpc18xx-sct: Reduce number of devm memory allocations (git-fixes).\n- pwm: lpc18xx-sct: Simplify driver by not using pwm_[gs]et_chip_data() (git-fixes).\n- pwm: lpc18xx: Fix period handling (git-fixes).\n- qed: validate and restrict untrusted VFs vlan promisc mode (git-fixes).\n- r8152: add PID for the Lenovo OneLink+ Dock (git-fixes).\n- r8152: fix the RX FIFO settings when suspending (git-fixes).\n- r8152: fix the units of some registers for RTL8156A (git-fixes).\n- random: remove useless header comment (git-fixes).\n- ratelimit: Fix data-races in ___ratelimit() (git-fixes).\n- rbd: fix possible memory leak in rbd_sysfs_init() (git-fixes).\n- regulator: core: Clean up on enable failure (git-fixes).\n- regulator: core: Prevent integer underflow (git-fixes).\n- regulator: core: fix UAF in destroy_regulator() (git-fixes).\n- regulator: core: fix kobject release warning and memory leak in regulator_register() (git-fixes).\n- regulator: of: Fix refcount leak bug in of_get_regulation_constraints() (git-fixes).\n- regulator: pca9450: Remove restrictions for regulator-name (git-fixes).\n- regulator: pfuze100: Fix the global-out-of-bounds access in pfuze100_regulator_probe() (git-fixes).\n- regulator: qcom_rpm: Fix circular deferral regression (git-fixes).\n- regulator: qcom_smd: Fix pm8916_pldo range (git-fixes).\n- regulator: twl6030: re-add TWL6032_SUBCLASS (git-fixes).\n- remoteproc: imx_rproc: Fix refcount leak in imx_rproc_addr_init (git-fixes).\n- remoteproc: imx_rproc: Simplify some error message (git-fixes).\n- remoteproc: k3-r5: Fix refcount leak in k3_r5_cluster_of_init (git-fixes).\n- remoteproc: qcom: pas: Check if coredump is enabled (git-fixes).\n- remoteproc: qcom: pas: Mark devices as wakeup capable (git-fixes).\n- remoteproc: qcom: q6v5-mss: add powerdomains to MSM8996 config (git-fixes).\n- remoteproc: qcom: wcnss: Fix handling of IRQs (git-fixes).\n- remoteproc: sysmon: Wait for SSCTL service to come up (git-fixes).\n- reset: imx7: Fix the iMX8MP PCIe PHY PERST support (git-fixes).\n- restore m_can_lec_type (git-fixes).\n- ring-buffer: Add ring_buffer_wake_waiters() (git-fixes).\n- ring-buffer: Allow splice to read previous partially read pages (git-fixes).\n- ring-buffer: Check for NULL cpu_buffer in ring_buffer_wake_waiters() (bsc#1204705).\n- ring-buffer: Check pending waiters when doing wake ups as well (git-fixes).\n- ring-buffer: Fix race between reset page and reading page (git-fixes).\n- ring-buffer: Have the shortest_full queue be the shortest not longest (git-fixes).\n- ring-buffer: Include dropped pages in counting dirty patches (git-fixes).\n- ring_buffer: Do not deactivate non-existant pages (git-fixes).\n- rose: Fix NULL pointer dereference in rose_send_frame() (git-fixes).\n- rose: check NULL rose_loopback_neigh-\u003eloopback (git-fixes).\n- rpm/check-for-config-changes: add TOOLCHAIN_HAS_* to IGNORED_CONFIGS_RE This new form was added in commit b8c86872d1dc (riscv: fix detection of toolchain Zicbom support).\n- rpm/check-for-config-changes: loosen pattern for AS_HAS_* This is needed to handle CONFIG_AS_HAS_NON_CONST_LEB128.\n- rpm/kernel-binary.spec.in: move vdso to a separate package (bsc#1202385) We do the move only on 15.5+.\n- rpm/kernel-binary.spec.in: simplify find for usrmerged The type test and print line are the same for both cases. The usrmerged case only ignores more, so refactor it to make it more obvious.\n- rpm/kernel-source.spec.in: simplify finding of broken symlinks \u0027find -xtype l\u0027 will report them, so use that to make the search a bit faster (without using shell).\n- rpmsg: char: Add mutex protection for rpmsg_eptdev_open() (git-fixes).\n- rpmsg: mtk_rpmsg: Fix circular locking dependency (git-fixes).\n- rpmsg: qcom: glink: replace strncpy() with strscpy_pad() (git-fixes).\n- rpmsg: qcom_smd: Fix refcount leak in qcom_smd_parse_edge (git-fixes).\n- rtc: stmp3xxx: Add failure handling for stmp3xxx_wdt_register() (git-fixes).\n- rtmutex: Add acquire semantics for rtmutex lock acquisition slow path (bnc#1203829).\n- s390/boot: add secure boot trailer (bsc#1205257 LTC#200451).\n- s390/boot: fix absolute zero lowcore corruption on boot (git-fixes).\n- s390/cpumf: Handle events cycles and instructions identical (git-fixes).\n- s390/crash: fix incorrect number of bytes to copy to user space (git-fixes).\n- s390/crash: make copy_oldmem_page() return number of bytes copied (git-fixes).\n- s390/dasd: fix Oops in dasd_alias_get_start_dev due to missing pavgroup (git-fixes).\n- s390/futex: add missing EX_TABLE entry to __futex_atomic_op() (bsc#1205427 LTC#200502).\n- s390/hugetlb: fix prepare_hugepage_range() check for 2 GB hugepages (git-fixes).\n- s390/hypfs: avoid error message under KVM (bsc#1032323).\n- s390/kexec: handle R_390_PLT32DBL rela in arch_kexec_apply_relocations_add() (git-fixes).\n- s390/mm: do not trigger write fault when vma does not allow VM_WRITE (git-fixes).\n- s390/mm: use non-quiescing sske for KVM switch to keyed guest (git-fixes).\n- s390/pci: add missing EX_TABLE entries to __pcistg_mio_inuser()/__pcilg_mio_inuser() (bsc#1205427 LTC#200502).\n- s390/qeth: cache link_info for ethtool (bsc#1202262 LTC#199322).\n- s390/smp: enforce lowcore protection on CPU restart (git-fixes).\n- s390/stp: clock_delta should be signed (git-fixes).\n- s390/uaccess: add missing EX_TABLE entries to __clear_user(), copy_in_user_mvcos(), copy_in_user_mvc(), clear_user_xc() and __strnlen_user() (bsc#1205428 LTC#200501).\n- s390/zcore: fix race when reading from hardware system area (git-fixes).\n- s390: fix double free of GS and RI CBs on fork() failure (bsc#1203197 LTC#199895).\n- s390: fix nospec table alignments (git-fixes).\n- samples/landlock: Add clang-format exceptions (git-fixes).\n- samples/landlock: Fix path_list memory leak (git-fixes).\n- samples/landlock: Format with clang-format (git-fixes).\n- sbitmap: Avoid leaving waitqueue in invalid state in __sbq_wake_up() (git-fixes).\n- sbitmap: fix possible io hung due to lost wakeup (git-fixes).\n- sched-core-Do-not-requeue-task-on-CPU-excluded-from-cpus_mask.patch\n- sched/core: Always flush pending blk_plug (bnc#1189999 (Scheduler functional and performance backports)).\n- sched/deadline: Fix BUG_ON condition for deboosted tasks (git-fixes)\n- sched/fair: Fix cfs_rq_clock_pelt() for throttled cfs_rq (bnc#1189999 (Scheduler functional and performance backports)).\n- sched/fair: Fix cfs_rq_clock_pelt() for throttled cfs_rq -kabi (git fixes (sched/fair)).\n- sched/fair: Remove redundant word \u0027 *\u0027 (bnc#1189999 (Scheduler functional and performance backports)).\n- sched/uclamp: Fix iowait boost escaping uclamp restriction (git-fixes)\n- sched/uclamp: Fix rq-\u003euclamp_max not set on first enqueue (git-fixes)\n- sched: Allow newidle balancing to bail out of load_balance (bnc#1189999 (Scheduler functional and performance backports)).\n- sched: Clear ttwu_pending after enqueue_task() (git fixes (sched/core)).\n- sched: Disable sched domain debugfs creation on ppc64 unless sched_verbose is specified (bnc#1205653).\n- sched: Fix the check of nr_running at queue wakelist (bnc#1189999 (Scheduler functional and performance backports)).\n- sched: Remove the limitation of WF_ON_CPU on wakelist if wakee cpu is idle (bnc#1189999 (Scheduler functional and performance backports)). Refresh\n- sched: Remove unused function group_first_cpu() (bnc#1189999 (Scheduler functional and performance backports)).\n- scripts/dtc: Call pkg-config POSIXly correct (git-fixes).\n- scripts/faddr2line: Fix regression in name resolution on ppc64le (git-fixes).\n- scripts/faddr2line: Fix vmlinux detection on arm64 (git-fixes).\n- scripts/gdb: change kernel config dumping method (git-fixes).\n- scripts: sphinx-pre-install: Fix ctex support on Debian (git-fixes).\n- scripts: sphinx-pre-install: add required ctex dependency (git-fixes).\n- scsi: Revert \u0027scsi: qla2xxx: Fix disk failure to rediscover\u0027 (git-fixes).\n- scsi: core: Add BLIST_NO_ASK_VPD_SIZE for some VDASD (bsc#1203039).\n- scsi: hisi_sas: Keep controller active between ISR of phyup and the event being processed (bsc#1202471).\n- scsi: hisi_sas: Use autosuspend for the host controller (bsc#1202471).\n- scsi: ibmvfc: Avoid path failures during live migration (bsc#1065729).\n- scsi: ibmvscsis: Increase INITIAL_SRP_LIMIT to 1024 (bsc#1156395).\n- scsi: libiscsi: Add iscsi_cls_conn to sysfs after initialization (bsc#1198410).\n- scsi: libsas: Fix use-after-free bug in smp_execute_task_sg() (git-fixes).\n- scsi: lpfc: Add missing destroy_workqueue() in error path (bsc#1203939).\n- scsi: lpfc: Add missing free iocb and nlp kref put for early return VMID cases (bsc#1203939).\n- scsi: lpfc: Add reporting capability for Link Degrade Signaling (bsc#1203939).\n- scsi: lpfc: Add warning notification period to CMF_SYNC_WQE (bsc#1203063).\n- scsi: lpfc: Check the return value of alloc_workqueue() (bsc#1203063).\n- scsi: lpfc: Copyright updates for 14.2.0.5 patches (bsc#1201956).\n- scsi: lpfc: Copyright updates for 14.2.0.6 patches (bsc#1203063).\n- scsi: lpfc: Create a sysfs entry called lpfc_xcvr_data for transceiver info (bsc#1204957).\n- scsi: lpfc: Fix FLOGI ACC with wrong SID in PT2PT topology (bsc#1203939).\n- scsi: lpfc: Fix attempted FA-PWWN usage after feature disable (bsc#1201956).\n- scsi: lpfc: Fix hard lockup when reading the rx_monitor from debugfs (bsc#1204957).\n- scsi: lpfc: Fix lost NVMe paths during LIF bounce stress test (bsc#1201956).\n- scsi: lpfc: Fix mbuf pool resource detected as busy at driver unload (bsc#1203939).\n- scsi: lpfc: Fix memory leak in lpfc_create_port() (bsc#1204957).\n- scsi: lpfc: Fix multiple NVMe remoteport registration calls for the same NPort ID (bsc#1203939).\n- scsi: lpfc: Fix null ndlp ptr dereference in abnormal exit path for GFT_ID (bsc#1203063).\n- scsi: lpfc: Fix possible memory leak when failing to issue CMF WQE (bsc#1201956).\n- scsi: lpfc: Fix prli_fc4_req checks in PRLI handling (bsc#1203939).\n- scsi: lpfc: Fix spelling mistake \u0027unsolicted\u0027 -\u003e \u0027unsolicited\u0027 (bsc#1204957).\n- scsi: lpfc: Fix uninitialized cqe field in lpfc_nvme_cancel_iocb() (bsc#1201956).\n- scsi: lpfc: Fix unsolicited FLOGI receive handling during PT2PT discovery (bsc#1203063).\n- scsi: lpfc: Fix various issues reported by tools (bsc#1203939).\n- scsi: lpfc: Log when congestion management limits are in effect (bsc#1204957).\n- scsi: lpfc: Move scsi_host_template outside dynamically allocated/freed phba (bsc#1185032 bsc#1203939). Dropped: patches.suse/lpfc-decouple-port_template-and-vport_template.patch\n- scsi: lpfc: Prevent buffer overflow crashes in debugfs with malformed user input (bsc#1201956).\n- scsi: lpfc: Refactor lpfc_nvmet_prep_abort_wqe() into lpfc_sli_prep_abort_xri() (bsc#1201956).\n- scsi: lpfc: Remove Menlo/Hornet related code (bsc#1201956).\n- scsi: lpfc: Remove SANDiags related code (bsc#1203063).\n- scsi: lpfc: Remove extra atomic_inc on cmd_pending in queuecommand after VMID (bsc#1201956).\n- scsi: lpfc: Remove the unneeded result variable (bsc#1203939).\n- scsi: lpfc: Remove unneeded result variable (bsc#1203939).\n- scsi: lpfc: Rename mp/bmp dma buffers to rq/rsp in lpfc_fdmi_cmd (bsc#1203939).\n- scsi: lpfc: Return DID_TRANSPORT_DISRUPTED instead of DID_REQUEUE (bsc#1203939).\n- scsi: lpfc: Revert RSCN_MEMENTO workaround for misbehaved configuration (bsc#1201956).\n- scsi: lpfc: Rework FDMI attribute registration for unintential padding (bsc#1203939).\n- scsi: lpfc: Rework MIB Rx Monitor debug info logic (bsc#1203063).\n- scsi: lpfc: Rework lpfc_fdmi_cmd() routine for cleanup and consistency (bsc#1203939).\n- scsi: lpfc: Set PU field when providing D_ID in XMIT_ELS_RSP64_CX iocb (bsc#1201956).\n- scsi: lpfc: Set sli4_param\u0027s cmf option to zero when CMF is turned off (bsc#1204957).\n- scsi: lpfc: Update congestion mode logging for Emulex SAN Manager application (bsc#1203939).\n- scsi: lpfc: Update lpfc version to 14.2.0.5 (bsc#1201956).\n- scsi: lpfc: Update lpfc version to 14.2.0.6 (bsc#1203063).\n- scsi: lpfc: Update lpfc version to 14.2.0.7 (bsc#1203939).\n- scsi: lpfc: Update lpfc version to 14.2.0.8 (bsc#1204957).\n- scsi: lpfc: Update the obsolete adapter list (bsc#1204142).\n- scsi: megaraid: Clear READ queue map\u0027s nr_queues (git-fixes).\n- scsi: megaraid_sas: Correct value passed to scsi_device_lookup() (git-fixes).\n- scsi: mpi3mr: Schedule IRQ kthreads only on non-RT kernels (bnc#1204498).\n- scsi: mpt3sas: Fix return value check of dma_get_required_mask() (git-fixes).\n- scsi: mpt3sas: Fix use-after-free warning (git-fixes).\n- scsi: mpt3sas: Stop fw fault watchdog work item during system shutdown (git-fixes).\n- scsi: qedf: Populate sysfs attributes for vport (git-fixes).\n- scsi: qla2xxx: Add NVMe parameters support in Auxiliary Image Status (bsc#1203935).\n- scsi: qla2xxx: Add debugfs create/delete helpers (bsc#1203935).\n- scsi: qla2xxx: Always wait for qlt_sess_work_fn() from qlt_stop_phase1() (bsc#1203935).\n- scsi: qla2xxx: Avoid flush_scheduled_work() usage (bsc#1203935).\n- scsi: qla2xxx: Check correct variable in qla24xx_async_gffid() (bsc#1201958).\n- scsi: qla2xxx: Define static symbols (bsc#1203935).\n- scsi: qla2xxx: Disable ATIO interrupt coalesce for quad port ISP27XX (bsc#1203935).\n- scsi: qla2xxx: Drop DID_TARGET_FAILURE use (bsc#1203935).\n- scsi: qla2xxx: Enhance driver tracing with separate tunable and more (bsc#1203935).\n- scsi: qla2xxx: Fix discovery issues in FC-AL topology (bsc#1201958).\n- scsi: qla2xxx: Fix disk failure to rediscover (git-fixes).\n- scsi: qla2xxx: Fix imbalance vha-\u003evref_count (bsc#1201958).\n- scsi: qla2xxx: Fix incorrect display of max frame size (bsc#1201958).\n- scsi: qla2xxx: Fix memory leak in __qlt_24xx_handle_abts() (bsc#1203935).\n- scsi: qla2xxx: Fix response queue handler reading stale packets (bsc#1201958).\n- scsi: qla2xxx: Fix response queue handler reading stale packets (bsc#1203935).\n- scsi: qla2xxx: Fix serialization of DCBX TLV data request (bsc#1204963).\n- scsi: qla2xxx: Fix sparse warning for dport_data (bsc#1201958).\n- scsi: qla2xxx: Fix spelling mistake \u0027definiton\u0027 -\u003e \u0027definition\u0027 (bsc#1203935).\n- scsi: qla2xxx: Log message \u0027skipping scsi_scan_host()\u0027 as informational (bsc#1203935).\n- scsi: qla2xxx: Remove unused declarations for qla2xxx (bsc#1203935).\n- scsi: qla2xxx: Remove unused del_sess_list field (bsc#1203935).\n- scsi: qla2xxx: Remove unused qlt_tmr_work() (bsc#1203935).\n- scsi: qla2xxx: Revert \u0027scsi: qla2xxx: Fix response queue handler reading stale packets\u0027 (bsc#1203935).\n- scsi: qla2xxx: Update manufacturer details (bsc#1201958).\n- scsi: qla2xxx: Update version to 10.02.07.800-k (bsc#1201958).\n- scsi: qla2xxx: Update version to 10.02.07.900-k (bsc#1203935).\n- scsi: qla2xxx: Use transport-defined speed mask for supported_speeds (bsc#1204963).\n- scsi: qla2xxx: Zero undefined mailbox IN registers (bsc#1201958).\n- scsi: qla2xxx: edif: Fix dropped IKE message (bsc#1201958).\n- scsi: scsi_transport_fc: Use %u for dev_loss_tmo (bsc#1202914).\n- scsi: scsi_transport_sas: Fix error handling in sas_phy_add() (git-fixes).\n- scsi: sg: Allow waiting for commands to complete on removed device (git-fixes).\n- scsi: smartpqi: Add module param to disable managed ints (bsc#1203893).\n- scsi: smartpqi: Fix DMA direction for RAID requests (git-fixes).\n- scsi: smartpqi: Shorten drive visibility after removal (bsc#1200622).\n- scsi: storvsc: Drop DID_TARGET_FAILURE use (git-fixes).\n- scsi: storvsc: Fix handling of srb_status and capacity change events (git-fixes).\n- scsi: storvsc: Fix typo in comment (git-fixes).\n- scsi: storvsc: Remove WQ_MEM_RECLAIM from storvsc_error_wq (git-fixes).\n- scsi: storvsc: remove an extraneous \u0027to\u0027 in a comment (git-fixes).\n- scsi: ufs: core: Fix another task management completion race (git-fixes).\n- scsi: ufs: core: Fix task management completion timeout race (git-fixes).\n- scsi: ufs: ufs-pci: Add support for Intel ADL (jsc#PED-707).\n- scsi: ufs: ufs-pci: Add support for Intel MTL (jsc#PED-732).\n- scsi: zfcp: Fix double free of FSF request when qdio send fails (git-fixes).\n- scsi: zfcp: Fix missing auto port scan and thus missing target ports (git-fixes).\n- seccomp: Invalidate seccomp mode to catch death failures (git-fixes).\n- selftest/net/forwarding: declare NETIFS p9 p10 (git-fixes).\n- selftest/powerpc: Add PAPR sysfs attributes sniff test (bsc#1200465 ltc#197256 jsc#SLE-18130).\n- selftest/vm: fix map_fixed_noreplace test failure (git-fixes).\n- selftest/vm: verify mmap addr in mremap_test (git-fixes).\n- selftest/vm: verify remap destination address in mremap_test (git-fixes).\n- selftest: tpm2: Add Client.__del__() to close /dev/tpm* handle (git-fixes).\n- selftests, x86: fix how check_cc.sh is being invoked (git-fixes).\n- selftests/exec: Add non-regular to TEST_GEN_PROGS (git-fixes).\n- selftests/exec: Remove pipe from TEST_GEN_FILES (git-fixes).\n- selftests/fib_tests: Rework fib_rp_filter_test() (git-fixes).\n- selftests/ftrace: Do not trace do_softirq because of PREEMPT_RT (git-fixes).\n- selftests/ftrace: make kprobe profile testcase description unique (git-fixes).\n- selftests/intel_pstate: fix build for ARCH=x86_64 (git-fixes).\n- selftests/landlock: Add clang-format exceptions (git-fixes).\n- selftests/landlock: Add tests for O_PATH (git-fixes).\n- selftests/landlock: Add tests for unknown access rights (git-fixes).\n- selftests/landlock: Extend access right tests to directories (git-fixes).\n- selftests/landlock: Extend tests for minimal valid attribute size (git-fixes).\n- selftests/landlock: Format with clang-format (git-fixes).\n- selftests/landlock: Fully test file rename with \u0027remove\u0027 access (git-fixes).\n- selftests/landlock: Make tests build with old libc (git-fixes).\n- selftests/landlock: Normalize array assignment (git-fixes).\n- selftests/landlock: Test landlock_create_ruleset(2) argument check ordering (git-fixes).\n- selftests/livepatch: better synchronize test_klp_callbacks_busy (bsc#1071995).\n- selftests/memfd: clean up mapping in mfd_fail_write (git-fixes).\n- selftests/memfd: remove unused variable (git-fixes).\n- selftests/net: pass ipv6_args to udpgso_bench\u0027s IPv6 TCP test (git-fixes).\n- selftests/net: so_txtime: fix parsing of start time stamp on 32 bit systems (git-fixes).\n- selftests/net: so_txtime: usage(): fix documentation of default clock (git-fixes).\n- selftests/net: timestamping: Fix bind_phc check (git-fixes).\n- selftests/net: udpgso_bench_tx: fix dst ip argument (git-fixes).\n- selftests/pidfd_test: Remove the erroneous \u0027,\u0027 (git-fixes).\n- selftests/powerpc/spectre_v2: Return skip code when miss_percent is high (git-fixes).\n- selftests/powerpc: Add a test of sigreturning to the kernel (git-fixes).\n- selftests/powerpc: Skip energy_scale_info test on older firmware (git-fixes).\n- selftests/resctrl: Fix null pointer dereference on open failed (git-fixes).\n- selftests/rseq: Change type of rseq_offset to ptrdiff_t (git-fixes).\n- selftests/rseq: Fix ppc32 missing instruction selection \u0027u\u0027 and \u0027x\u0027 for load/store (git-fixes).\n- selftests/rseq: Fix ppc32 offsets by using long rather than off_t (git-fixes).\n- selftests/rseq: Fix ppc32: wrong rseq_cs 32-bit field pointer on big endian (git-fixes).\n- selftests/rseq: Fix warnings about #if checks of undefined tokens (git-fixes).\n- selftests/rseq: Fix: work-around asm goto compiler bugs (git-fixes).\n- selftests/rseq: Introduce rseq_get_abi() helper (git-fixes).\n- selftests/rseq: Introduce thread pointer getters (git-fixes).\n- selftests/rseq: Remove arm/mips asm goto compiler work-around (git-fixes).\n- selftests/rseq: Remove useless assignment to cpu variable (git-fixes).\n- selftests/rseq: Remove volatile from __rseq_abi (git-fixes).\n- selftests/rseq: Uplift rseq selftests for compatibility with glibc-2.35 (git-fixes).\n- selftests/rseq: introduce own copy of rseq uapi header (git-fixes).\n- selftests/rseq: remove ARRAY_SIZE define from individual tests (git-fixes).\n- selftests/rseq: x86-32: use %gs segment selector for accessing rseq thread area (git-fixes).\n- selftests/rseq: x86-64: use %fs segment selector for accessing rseq thread area (git-fixes).\n- selftests/seccomp: Do not call read() on TTY from background pgrp (git-fixes).\n- selftests/seccomp: Fix compile warning when CC=clang (git-fixes).\n- selftests/seccomp: Fix seccomp failure by adding missing headers (git-fixes).\n- selftests/sgx: Treat CC as one argument (git-fixes).\n- selftests/vm/transhuge-stress: fix ram size thinko (git-fixes).\n- selftests/vm: make charge_reserved_hugetlb.sh work with existing cgroup setting (git-fixes).\n- selftests/x86: Add validity check and allow field splitting (git-fixes).\n- selftests/zram01.sh: Fix compression ratio calculation (git-fixes).\n- selftests/zram: Adapt the situation that /dev/zram0 is being used (git-fixes).\n- selftests/zram: Skip max_comp_streams interface on newer kernel (git-fixes).\n- selftests: Add duplicate config only for MD5 VRF tests (git-fixes).\n- selftests: Fix IPv6 address bind tests (git-fixes).\n- selftests: Fix raw socket bind tests with VRF (git-fixes).\n- selftests: Fix the if conditions of in test_extra_filter() (git-fixes).\n- selftests: add ping test with ping_group_range tuned (git-fixes).\n- selftests: cgroup: Make cg_create() use 0755 for permission instead of 0644 (git-fixes).\n- selftests: cgroup: Test open-time cgroup namespace usage for migration checks (git-fixes).\n- selftests: cgroup: Test open-time credential usage for migration checks (git-fixes).\n- selftests: clone3: clone3: add case CLONE3_ARGS_NO_TEST (git-fixes).\n- selftests: fixup build warnings in pidfd / clone3 tests (git-fixes).\n- selftests: forwarding: Fix failing tests with old libnet (git-fixes).\n- selftests: forwarding: add shebang for sch_red.sh (git-fixes).\n- selftests: forwarding: fix error message in learning_test (git-fixes).\n- selftests: forwarding: fix flood_unicast_test when h2 supports IFF_UNICAST_FLT (git-fixes).\n- selftests: forwarding: fix learning_test when h1 supports IFF_UNICAST_FLT (git-fixes).\n- selftests: futex: Use variable MAKE instead of make (git-fixes).\n- selftests: gpio: fix gpio compiling error (git-fixes).\n- selftests: harness: avoid false negatives if test has no ASSERTs (git-fixes).\n- selftests: icmp_redirect: pass xfail=0 to log_test() (git-fixes).\n- selftests: kvm: set rax before vmcall (git-fixes).\n- selftests: mirror_gre_bridge_1q: Avoid changing PVID while interface is operational (git-fixes).\n- selftests: mlxsw: resource_scale: Fix return value (git-fixes).\n- selftests: mlxsw: tc_police_scale: Make test more robust (git-fixes).\n- selftests: mlxsw: vxlan_flooding: Prevent flooding of unwanted packets (git-fixes).\n- selftests: mptcp: add csum mib check for mptcp_connect (git-fixes).\n- selftests: mptcp: fix diag instability (git-fixes).\n- selftests: mptcp: fix ipv6 routing setup (git-fixes).\n- selftests: mptcp: fix mibit vs mbit mix up (git-fixes).\n- selftests: mptcp: make sendfile selftest work (git-fixes).\n- selftests: mptcp: more stable diag tests (git-fixes).\n- selftests: mptcp: more stable simult_flows tests (git-fixes).\n- selftests: net: Correct case name (git-fixes).\n- selftests: net: Correct ping6 expected rc from 2 to 1 (git-fixes).\n- selftests: net: Fix a typo in udpgro_fwd.sh (git-fixes).\n- selftests: net: tls: remove unused variable and code (git-fixes).\n- selftests: net: udpgro_fwd.sh: explicitly checking the available ping feature (git-fixes).\n- selftests: net: using ping6 for IPv6 in udpgro_fwd.sh (git-fixes).\n- selftests: netfilter: Fix nft_fib.sh for all.rp_filter=1 (git-fixes).\n- selftests: netfilter: add a vrf+conntrack testcase (git-fixes).\n- selftests: netfilter: correct PKTGEN_SCRIPT_PATHS in nft_concat_range.sh (git-fixes).\n- selftests: netfilter: disable rp_filter on router (git-fixes).\n- selftests: netfilter: fix exit value for nft_concat_range (git-fixes).\n- selftests: nft_concat_range: add test for reload with no element add/del (git-fixes).\n- selftests: ocelot: tc_flower_chains: specify conform-exceed action for policer (git-fixes).\n- selftests: openat2: Add missing dependency in Makefile (git-fixes).\n- selftests: openat2: Print also errno in failure messages (git-fixes).\n- selftests: openat2: Skip testcases that fail with EOPNOTSUPP (git-fixes).\n- selftests: pmtu.sh: Kill nettest processes launched in subshell (git-fixes).\n- selftests: pmtu.sh: Kill tcpdump processes launched by subshell (git-fixes).\n- selftests: rtc: Increase test timeout so that all tests run (git-fixes).\n- selftests: rtnetlink: correct xfrm policy rule in kci_test_ipsec_offload (git-fixes).\n- selftests: skip mincore.check_file_mmap when fs lacks needed support (git-fixes).\n- selftests: test_vxlan_under_vrf: Fix broken test case (git-fixes).\n- selftests: timers: clocksource-switch: fix passing errors from child (git-fixes).\n- selftests: timers: valid-adjtimex: build fix for newer toolchains (git-fixes).\n- selftests: vm: Makefile: rename TARGETS to VMTARGETS (git-fixes).\n- selftests: vm: fix clang build error multiple output files (git-fixes).\n- selftests: x86: fix [-Wstringop-overread] warn in test_process_vm_readv() (git-fixes).\n- selinux: Add boundary check in put_entry() (git-fixes).\n- selinux: access superblock_security_struct in LSM blob way (git-fixes).\n- selinux: allow FIOCLEX and FIONCLEX with policy capability (git-fixes).\n- selinux: check return value of sel_make_avc_files (git-fixes).\n- selinux: enable use of both GFP_KERNEL and GFP_ATOMIC in convert_context() (git-fixes).\n- selinux: fix bad cleanup on error in hashtab_duplicate() (git-fixes).\n- selinux: fix double free of cond_list on error paths (git-fixes).\n- selinux: fix memleak in security_read_state_kernel() (git-fixes).\n- selinux: fix misuse of mutex_is_locked() (git-fixes).\n- selinux: use \u0027grep -E\u0027 instead of \u0027egrep\u0027 (git-fixes).\n- selinux: use correct type for context length (git-fixes).\n- serial: 8250: 8250_omap: Avoid RS485 RTS glitch on -\u003eset_termios() (git-fixes).\n- serial: 8250: Add proper clock handling for OxSemi PCIe devices (git-fixes).\n- serial: 8250: Export ICR access helpers for internal use (git-fixes).\n- serial: 8250: Fall back to non-DMA Rx if IIR_RDI occurs (git-fixes).\n- serial: 8250: Fix restoring termios speed after suspend (git-fixes).\n- serial: 8250: Flush DMA Rx on RLSI (git-fixes).\n- serial: 8250: Fold EndRun device support into OxSemi Tornado code (git-fixes).\n- serial: 8250: omap: Fix unpaired pm_runtime_put_sync() in omap8250_remove() (git-fixes).\n- serial: 8250: omap: Flush PM QOS work on remove (git-fixes).\n- serial: 8250_bcm7271: Save/restore RTS in suspend/resume (git-fixes).\n- serial: 8250_dw: Store LSR into lsr_saved_flags in dw8250_tx_wait_empty() (git-fixes).\n- serial: 8250_fsl: Do not report FE, PE and OE twice (git-fixes).\n- serial: 8250_lpss: Configure DMA also w/o DMA filter (git-fixes).\n- serial: 8250_omap: remove wait loop from Errata i202 workaround (git-fixes).\n- serial: 8250_pci: Refactor the loop in pci_ite887x_init() (git-fixes).\n- serial: 8250_pci: Replace dev_*() by pci_*() macros (git-fixes).\n- serial: Create uart_xmit_advance() (git-fixes).\n- serial: atmel: remove redundant assignment in rs485_config (git-fixes).\n- serial: core: move RS485 configuration tasks from drivers into core (git-fixes).\n- serial: fsl_lpuart: RS485 RTS polariy is inverse (git-fixes).\n- serial: fsl_lpuart: Reset prior to registration (git-fixes).\n- serial: imx: Add missing .thaw_noirq hook (git-fixes).\n- serial: mvebu-uart: uart2 error bits clearing (git-fixes).\n- serial: tegra-tcu: Use uart_xmit_advance(), fixes icount.tx accounting (git-fixes).\n- serial: tegra: Use uart_xmit_advance(), fixes icount.tx accounting (git-fixes).\n- sfc: disable softirqs for ptp TX (git-fixes).\n- sfc: fix kernel panic when creating VF (git-fixes).\n- sfc: fix use after free when disabling sriov (git-fixes).\n- signal: break out of wait loops on kthread_stop() (bsc#1204926).\n- siox: fix possible memory leak in siox_device_add() (git-fixes).\n- slimbus: qcom-ngd: cleanup in probe error path (git-fixes).\n- slimbus: qcom-ngd: use correct error in message of pdr_add_lookup() failure (git-fixes).\n- slimbus: stream: correct presence rate frequencies (git-fixes).\n- smb2: small refactor in smb2_check_message() (bsc#1193629).\n- smb3: Move the flush out of smb2_copychunk_range() into its callers (bsc#1193629).\n- smb3: add dynamic trace points for tree disconnect (bsc#1193629).\n- smb3: add trace point for SMB2_set_eof (bsc#1193629).\n- smb3: allow deferred close timeout to be configurable (bsc#1193629).\n- smb3: check xattr value length earlier (bsc#1193629).\n- smb3: clarify multichannel warning (bsc#1193629).\n- smb3: do not log confusing message when server returns no network interfaces (bsc#1193629).\n- smb3: fix empty netname context on secondary channels (bsc#1193629).\n- smb3: fix oops in calculating shash_setkey (bsc#1193629).\n- smb3: fix temporary data corruption in collapse range (bsc#1193629).\n- smb3: fix temporary data corruption in insert range (bsc#1193629).\n- smb3: improve SMB3 change notification support (bsc#1193629).\n- smb3: interface count displayed incorrectly (bsc#1193629).\n- smb3: missing inode locks in punch hole (bsc#1193629).\n- smb3: missing inode locks in zero range (bsc#1193629).\n- smb3: must initialize two ACL struct fields to zero (bsc#1193629).\n- smb3: remove unneeded null check in cifs_readdir (bsc#1193629).\n- smb3: rename encryption/decryption TFMs (bsc#1193629).\n- smb3: use filemap_write_and_wait_range instead of filemap_write_and_wait (bsc#1193629).\n- smb3: use netname when available on secondary channels (bsc#1193629).\n- smb3: workaround negprot bug in some Samba servers (bsc#1193629).\n- smsc95xx: Ignore -ENODEV errors when device is unplugged (git-fixes).\n- soc/tegra: fuse: Drop Kconfig dependency on TEGRA20_APB_DMA (git-fixes).\n- soc: amlogic: Fix refcount leak in meson-secure-pwrc.c (git-fixes).\n- soc: brcmstb: pm-arm: Fix refcount leak and __iomem leak bugs (git-fixes).\n- soc: fsl: guts: machine variable might be unset (git-fixes).\n- soc: fsl: select FSL_GUTS driver for DPIO (git-fixes).\n- soc: imx8m: Enable OCOTP clock before reading the register (git-fixes).\n- soc: imx: gpcv2: Assert reset before ungating clock (git-fixes).\n- soc: qcom: Make QCOM_RPMPD depend on PM (git-fixes).\n- soc: qcom: aoss: Fix refcount leak in qmp_cooling_devices_register (git-fixes).\n- soc: qcom: ocmem: Fix refcount leak in of_get_ocmem (git-fixes).\n- soc: qcom: smem_state: Add refcounting for the \u0027state-\u003eof_node\u0027 (git-fixes).\n- soc: qcom: smsm: Fix refcount leak bugs in qcom_smsm_probe() (git-fixes).\n- soc: renesas: r8a779a0-sysc: Fix A2DP1 and A2CV[2357] PDR values (git-fixes).\n- soc: sunxi: sram: Actually claim SRAM regions (git-fixes).\n- soc: sunxi: sram: Fix debugfs info for A64 SRAM C (git-fixes).\n- soc: sunxi: sram: Fix probe function ordering issues (git-fixes).\n- soc: sunxi: sram: Prevent the driver from being unbound (git-fixes).\n- soc: sunxi_sram: Make use of the helper function devm_platform_ioremap_resource() (git-fixes).\n- soundwire: bus_type: fix remove and shutdown support (git-fixes).\n- soundwire: cadence: Do not overwrite msg-\u003ebuf during write commands (git-fixes).\n- soundwire: intel: Initialize clock stop timeout (bsc#1205507).\n- soundwire: intel: fix error handling on dai registration issues (git-fixes).\n- soundwire: qcom: Check device status before reading devid (git-fixes).\n- soundwire: qcom: check for outanding writes before doing a read (git-fixes).\n- soundwire: qcom: fix device status array range (git-fixes).\n- soundwire: qcom: reinit broadcast completion (git-fixes).\n- speakup: fix a segfault caused by switching consoles (git-fixes).\n- spi/omap100k:Fix PM disable depth imbalance in omap1_spi100k_probe (git-fixes).\n- spi: Add API to count spi acpi resources (bsc#1203699).\n- spi: Create helper API to lookup ACPI info for spi device (bsc#1203699).\n- spi: Ensure that sg_table won\u0027t be used after being freed (git-fixes).\n- spi: Fix incorrect cs_setup delay handling (git-fixes).\n- spi: Fix simplification of devm_spi_register_controller (git-fixes).\n- spi: Return deferred probe error when controller isn\u0027t yet available (bsc#1203699).\n- spi: Support selection of the index of the ACPI Spi Resource before alloc (bsc#1203699).\n- spi: dt-bindings: cadence: add missing \u0027required\u0027 (git-fixes).\n- spi: dt-bindings: zynqmp-qspi: add missing \u0027required\u0027 (git-fixes).\n- spi: dw-dma: decrease reference count in dw_spi_dma_init_mfld() (git-fixes).\n- spi: dw: Fix PM disable depth imbalance in dw_spi_bt1_probe (git-fixes).\n- spi: meson-spicc: add local pow2 clock ops to preserve rate between messages (git-fixes).\n- spi: meson-spicc: do not rely on busy flag in pow2 clk ops (git-fixes).\n- spi: mt7621: Fix an error message in mt7621_spi_probe() (git-fixes).\n- spi: propagate error code to the caller of acpi_spi_device_alloc() (bsc#1203699).\n- spi: pxa2xx: Add support for Intel Meteor Lake-P (jsc#PED-732).\n- spi: pxa2xx: Add support for Intel Raptor Lake PCH-S (jsc#PED-634).\n- spi: qup: add missing clk_disable_unprepare on error in spi_qup_pm_resume_runtime() (git-fixes).\n- spi: qup: add missing clk_disable_unprepare on error in spi_qup_resume() (git-fixes).\n- spi: s3c64xx: Fix large transfers with DMA (git-fixes).\n- spi: spi-altera-dfl: Fix an error handling path (git-fixes).\n- spi: spi-imx: Fix spi_bus_clk if requested clock is higher than input clock (git-fixes).\n- spi: spi-rspi: Fix PIO fallback on RZ platforms (git-fixes).\n- spi: stm32: Print summary \u0027callbacks suppressed\u0027 message (git-fixes).\n- spi: stm32: fix stm32_spi_prepare_mbr() that halves spi clk for every run (git-fixes).\n- spi: synquacer: Add missing clk_disable_unprepare() (git-fixes).\n- spi: tegra20-slink: fix UAF in tegra_slink_remove() (git-fixes).\n- spi: tegra210-quad: Fix duplicate resource error (git-fixes).\n- spmi: pmic-arb: correct duplicate APID to PPID mapping logic (git-fixes).\n- spmi: pmic-arb: do not ack and clear peripheral interrupts in cleanup_irq (git-fixes).\n- spmi: trace: fix stack-out-of-bound access in SPMI tracing functions (git-fixes).\n- staging: rtl8192u: Fix sleep in atomic context bug in dm_fsync_timer_callback (git-fixes).\n- staging: rtl8712: fix use after free bugs (git-fixes).\n- staging: rtl8723bs: fix a potential memory leak in rtw_init_cmd_priv() (git-fixes).\n- staging: rtl8723bs: fix potential memory leak in rtw_init_drv_sw() (git-fixes).\n- staging: vt6655: fix potential memory leak (git-fixes).\n- staging: vt6655: fix some erroneous memory clean-up loops (git-fixes).\n- stmmac: intel: Add a missing clk_disable_unprepare() call in intel_eth_pci_remove() (git-fixes).\n- stmmac: intel: Fix an error handling path in intel_eth_pci_probe() (git-fixes).\n- struct ehci_hcd: hide new element going into a hole (git-fixes).\n- struct xhci_hcd: restore member now dynamically allocated (git-fixes).\n- sunrpc: fix expiry of auth creds (git-fixes).\n- supported.conf: Add cs_dsp firmware module (bsc#1203699)\n- supported.conf: Add drivers/virt/coco/sevguest/sevguest\n- supported.conf: added drivers/net/ethernet/marvell/octeontx2/nic/otx2_ptp and \t\tchanged all octeontx2 modules as supported (jsc#SLE-24682)\n- supported.conf: mark drivers/nvme/common as supported (jsc#SLE-20183)\n- supported.conf: mark lib/objagg supported as dependency of mlxsw\n- supported.conf: mark mlxsw modules supported (jsc#SLE-23766)\n- supported.conf: mark spi-pxa2xx-platform as supported (bsc#1203699) It\u0027s required for the sound on recent Intel machines\n- tee: optee: do not check memref size on return from Secure World (git-fixes).\n- tee: tee_get_drvdata(): fix description of return value (git-fixes).\n- testing/selftests/mqueue: Fix mq_perf_tests to free the allocated cpu set (git-fixes).\n- testing: nvdimm: asm/mce.h is not needed in nfit.c (git-fixes).\n- testing: nvdimm: iomap: make __nfit_test_ioremap a macro (git-fixes).\n- tests: fix idmapped mount_setattr test (git-fixes).\n- thermal/drivers/qcom/tsens-v0_1: Fix MSM8939 fourth sensor hw_id (git-fixes).\n- thermal/int340x_thermal: handle data_vault when the value is ZERO_SIZE_PTR (bsc#1201308).\n- thermal/tools/tmon: Include pthread and time headers in tmon.h (git-fixes).\n- thermal: cpufreq_cooling: Check the policy first in cpufreq_cooling_register() (git-fixes).\n- thermal: int340x: Mode setting with new OS handshake (jsc#PED-678).\n- thermal: int340x: Update OS policy capability handshake (jsc#PED-678).\n- thermal: intel_powerclamp: Use first online CPU as control_cpu (git-fixes).\n- thermal: intel_powerclamp: Use get_cpu() instead of smp_processor_id() to avoid crash (git-fixes).\n- thermal: sysfs: Fix cooling_device_stats_setup() error code path (git-fixes).\n- thunderbolt: Add DP OUT resource when DP tunnel is discovered (git-fixes).\n- thunderbolt: Add back Intel Falcon Ridge end-to-end flow control workaround (git-fixes).\n- thunderbolt: Add missing device ID to tb_switch_is_alpine_ridge() (git-fixes).\n- thunderbolt: Add support for Intel Maple Ridge single port controller (git-fixes).\n- thunderbolt: Add support for Intel Raptor Lake (jsc#PED-634).\n- thunderbolt: Disable LTTPR on Intel Titan Ridge (git-fixes).\n- thunderbolt: Explicitly enable lane adapter hotplug events at startup (git-fixes).\n- thunderbolt: Explicitly reset plug events delay back to USB4 spec value (git-fixes).\n- thunderbolt: Fix buffer allocation of devices with no DisplayPort adapters (git-fixes).\n- thunderbolt: Use the actual buffer in tb_async_error() (git-fixes).\n- timers: implement usleep_idle_range() (git-fixes).\n- tools include UAPI: Sync sound/asound.h copy with the kernel sources (git-fixes).\n- tools/nolibc: fix incorrect truncation of exit code (git-fixes).\n- tools/nolibc: i386: fix initial stack alignment (git-fixes).\n- tools/nolibc: x86-64: Fix startup code bug (git-fixes).\n- tools/testing/scatterlist: add missing defines (git-fixes).\n- tools/thermal: Fix possible path truncations (git-fixes).\n- tools: hv: Remove an extraneous \u0027the\u0027 (git-fixes).\n- tools: hv: kvp: remove unnecessary (void*) conversions (git-fixes).\n- tools: iio: iio_generic_buffer: Fix read size (git-fixes).\n- tpm: eventlog: Fix section mismatch for DEBUG_SECTION_MISMATCH (git-fixes).\n- trace/osnoise: Add migrate-disabled field to the osnoise header (git-fixes).\n- trace/timerlat: Add migrate-disabled field to the timerlat header (git-fixes).\n- tracing/histograms: Fix memory leak problem (git-fixes).\n- tracing/kprobes: Check whether get_kretprobe() returns NULL in kretprobe_dispatcher() (git-fixes).\n- tracing/osnoise: Fix duration type (git-fixes).\n- tracing/osnoise: Fix possible recursive locking in stop_per_cpu_kthreads (git-fixes).\n- tracing/probes: Have kprobes and uprobes use $COMM too (git-fixes).\n- tracing/ring-buffer: Have polling block on watermark (git-fixes).\n- tracing: Add \u0027(fault)\u0027 name injection to kernel probes (git-fixes).\n- tracing: Add ioctl() to force ring buffer waiters to wake up (git-fixes).\n- tracing: Add tracing_reset_all_online_cpus_unlocked() function (git-fixes).\n- tracing: Add ustring operation to filtering string pointers (git-fixes).\n- tracing: Disable interrupt or preemption before acquiring arch_spinlock_t (git-fixes).\n- tracing: Do not free snapshot if tracer is on cmdline (git-fixes).\n- tracing: Fix memory leak in test_gen_synth_cmd() and test_empty_synth_event() (git-fixes).\n- tracing: Fix memory leak in tracing_read_pipe() (git-fixes).\n- tracing: Fix reading strings from synthetic events (git-fixes).\n- tracing: Fix sleeping while atomic in kdb ftdump (git-fixes).\n- tracing: Fix wild-memory-access in register_synth_event() (git-fixes).\n- tracing: Free buffers when a used dynamic event is removed (git-fixes).\n- tracing: Have filter accept \u0027common_cpu\u0027 to be consistent (git-fixes).\n- tracing: Move duplicate code of trace_kprobe/eprobe.c into header (git-fixes).\n- tracing: Replace deprecated CPU-hotplug functions (git-fixes).\n- tracing: Simplify conditional compilation code in tracing_set_tracer() (git-fixes).\n- tracing: Use a struct alignof to determine trace event field alignment (git-fixes).\n- tracing: Wake up ring buffer waiters on closing of the file (git-fixes).\n- tracing: Wake up waiters when tracing is disabled (git-fixes).\n- tracing: hold caller_addr to hardirq_{enable,disable}_ip (git-fixes).\n- tracing: kprobe: Fix kprobe event gen test module on exit (git-fixes).\n- tracing: kprobe: Fix memory leak in test_gen_kprobe/kretprobe_cmd() (git-fixes).\n- tracing: kprobe: Fix potential null-ptr-deref on trace_array in kprobe_event_gen_test_exit() (git-fixes).\n- tracing: kprobe: Fix potential null-ptr-deref on trace_event_file in kprobe_event_gen_test_exit() (git-fixes).\n- tracing: kprobe: Make gen test module work in arm and riscv (git-fixes).\n- tty: 8250: Add support for Brainboxes PX cards (git-fixes).\n- tty: n_gsm: Delete gsm_disconnect when config requester (git-fixes).\n- tty: n_gsm: Delete gsmtty open SABM frame when config requester (git-fixes).\n- tty: n_gsm: Modify CR,PF bit printk info when config requester (git-fixes).\n- tty: n_gsm: Modify CR,PF bit when config requester (git-fixes).\n- tty: n_gsm: Modify cr bit value when config requester (git-fixes).\n- tty: n_gsm: Modify gsmtty driver register method when config requester (git-fixes).\n- tty: n_gsm: Save dlci address open status when config requester (git-fixes).\n- tty: n_gsm: add sanity check for gsm-\u003ereceive in gsm_receive_buf() (git-fixes).\n- tty: n_gsm: avoid call of sleeping functions from atomic context (git-fixes).\n- tty: n_gsm: clean up dead code in gsm_queue() (git-fixes).\n- tty: n_gsm: clean up implicit CR bit encoding in address field (git-fixes).\n- tty: n_gsm: clean up indenting in gsm_queue() (git-fixes).\n- tty: n_gsm: fix DM command (git-fixes).\n- tty: n_gsm: fix broken virtual tty handling (git-fixes).\n- tty: n_gsm: fix buffer over-read in gsm_dlci_data() (git-fixes).\n- tty: n_gsm: fix deadlock and link starvation in outgoing data path (git-fixes).\n- tty: n_gsm: fix decoupled mux resource (git-fixes).\n- tty: n_gsm: fix encoding of command/response bit (git-fixes).\n- tty: n_gsm: fix flow control handling in tx path (git-fixes).\n- tty: n_gsm: fix frame reception handling (git-fixes).\n- tty: n_gsm: fix incorrect UA handling (git-fixes).\n- tty: n_gsm: fix insufficient txframe size (git-fixes).\n- tty: n_gsm: fix invalid gsmtty_write_room() result (git-fixes).\n- tty: n_gsm: fix invalid use of MSC in advanced option (git-fixes).\n- tty: n_gsm: fix malformed counter for out of frame data (git-fixes).\n- tty: n_gsm: fix missing corner cases in gsmld_poll() (git-fixes).\n- tty: n_gsm: fix missing explicit ldisc flush (git-fixes).\n- tty: n_gsm: fix missing mux reset on config change at responder (git-fixes).\n- tty: n_gsm: fix missing timer to handle stalled links (git-fixes).\n- tty: n_gsm: fix missing tty wakeup in convergence layer type 2 (git-fixes).\n- tty: n_gsm: fix missing update of modem controls after DLCI open (git-fixes).\n- tty: n_gsm: fix mux activation issues in gsm_config() (git-fixes).\n- tty: n_gsm: fix mux cleanup after unregister tty device (git-fixes).\n- tty: n_gsm: fix non flow control frames during mux flow off (git-fixes).\n- tty: n_gsm: fix packet re-transmission without open control channel (git-fixes).\n- tty: n_gsm: fix race condition in gsmld_write() (git-fixes).\n- tty: n_gsm: fix reset fifo race condition (git-fixes).\n- tty: n_gsm: fix resource allocation order in gsm_activate_mux() (git-fixes).\n- tty: n_gsm: fix restart handling via CLD command (git-fixes).\n- tty: n_gsm: fix sleep-in-atomic-context bug in gsm_control_send (git-fixes).\n- tty: n_gsm: fix software flow control handling (git-fixes).\n- tty: n_gsm: fix sometimes uninitialized warning in gsm_dlci_modem_output() (git-fixes).\n- tty: n_gsm: fix tty registration before control channel open (git-fixes).\n- tty: n_gsm: fix user open not possible at responder until initiator open (git-fixes).\n- tty: n_gsm: fix wrong DLCI release order (git-fixes).\n- tty: n_gsm: fix wrong T1 retry count handling (git-fixes).\n- tty: n_gsm: fix wrong command frame length field encoding (git-fixes).\n- tty: n_gsm: fix wrong command retry handling (git-fixes).\n- tty: n_gsm: fix wrong queuing behavior in gsm_dlci_data_output() (git-fixes).\n- tty: n_gsm: fix wrong signal octet encoding in convergence layer type 2 (git-fixes).\n- tty: n_gsm: fix wrong signal octets encoding in MSC (git-fixes).\n- tty: n_gsm: initialize more members at gsm_alloc_mux() (git-fixes).\n- tty: n_gsm: replace kicktimer with delayed_work (git-fixes).\n- tty: serial: Fix refcount leak bug in ucc_uart.c (git-fixes).\n- tty: serial: atmel: Preserve previous USART mode if RS485 disabled (git-fixes).\n- tty: serial: fsl_lpuart: correct the count of break characters (git-fixes).\n- tty: serial: fsl_lpuart: disable dma rx/tx use flags in lpuart_dma_shutdown (git-fixes).\n- tty: serial: fsl_lpuart: do not break the on-going transfer when global reset (git-fixes).\n- tty: serial: lpuart: disable flow control while waiting for the transmit engine to complete (git-fixes).\n- tty: vt: initialize unicode screen buffer (git-fixes).\n- tty: xilinx_uartps: Fix the ignore_status (git-fixes).\n- tun: avoid double free in tun_free_netdev (git-fixes).\n- tunnels: do not assume mac header is set in skb_tunnel_check_pmtu() (git-fixes).\n- tuntap: add sanity checks about msg_controllen in sendmsg (git-fixes).\n- uaccess: fix type mismatch warnings from access_ok() (git-fixes).\n- uas: add no-uas quirk for Hiksemi usb_disk (git-fixes).\n- uas: ignore UAS for Thinkplus chips (git-fixes).\n- ucounts: Base set_cred_ucounts changes on the real user (git-fixes).\n- ucounts: Fix rlimit max values check (git-fixes).\n- ucounts: Fix systemd LimitNPROC with private users regression (git-fixes).\n- ucounts: Handle wrapping in is_ucounts_overlimit (git-fixes).\n- ucounts: In set_cred_ucounts assume new-\u003eucounts is non-NULL (git-fixes).\n- udf: Fix crash after seekdir (bsc#1194592).\n- udmabuf: Set the DMA mask for the udmabuf device (v2) (git-fixes).\n- udmabuf: Set ubuf-\u003esg = NULL if the creation of sg table fails (git-fixes).\n- udmabuf: add back sanity check (git-fixes).\n- units: Add SI metric prefix definitions (git-fixes).\n- units: add the HZ macros (git-fixes).\n- usb-storage: Add Hiksemi USB3-FW to IGNORE_UAS (git-fixes).\n- usb-storage: Add ignore-residue quirk for NXP PN7462AU (git-fixes).\n- usb.h: struct usb_device: hide new member (git-fixes).\n- usb/hcd: Fix dma_map_sg error check (git-fixes).\n- usb: Drop commas after SoC match table sentinels (git-fixes).\n- usb: add NO_LPM quirk for Realforce 87U Keyboard (git-fixes).\n- usb: add quirks for Lenovo OneLink+ Dock (git-fixes).\n- usb: aspeed-vhub: Fix refcount leak bug in ast_vhub_init_desc() (git-fixes).\n- usb: bdc: change state when port disconnected (git-fixes).\n- usb: cdc-wdm: Use skb_put_data() instead of skb_put/memcpy pair (git-fixes).\n- usb: cdns3 fix use-after-free at workaround 2 (git-fixes).\n- usb: cdns3: Do not use priv_dev uninitialized in cdns3_gadget_ep_enable() (git-fixes).\n- usb: cdns3: change place of \u0027priv_ep\u0027 assignment in cdns3_gadget_ep_dequeue(), cdns3_gadget_ep_enable() (git-fixes).\n- usb: cdns3: fix incorrect handling TRB_SMM flag for ISOC transfer (git-fixes).\n- usb: cdns3: fix issue with rearming ISO OUT endpoint (git-fixes).\n- usb: cdns3: fix random warning message when driver load (git-fixes).\n- usb: cdns3: host: fix endless superspeed hub port reset (git-fixes).\n- usb: cdnsp: Fix issue with Clear Feature Halt Endpoint (git-fixes).\n- usb: cdnsp: fix issue with ZLP - added TD_SIZE = 1 (git-fixes).\n- usb: chipidea: fix deadlock in ci_otg_del_timer (git-fixes).\n- usb: common: debug: Check non-standard control requests (git-fixes).\n- usb: dwc2: fix wrong order of phy_power_on and phy_init (git-fixes).\n- usb: dwc2: gadget: remove D+ pull-up while no vbus with usb-role-switch (git-fixes).\n- usb: dwc3: core: Deprecate GCTL.CORESOFTRESET (git-fixes).\n- usb: dwc3: core: Do not perform GCTL_CORE_SOFTRESET during bootup (git-fixes).\n- usb: dwc3: core: Enable GUCTL1 bit 10 for fixing termination error after resume bug (git-fixes).\n- usb: dwc3: core: leave default DMA if the controller does not support 64-bit DMA (git-fixes).\n- usb: dwc3: disable USB core PHY management (git-fixes).\n- usb: dwc3: dwc3-qcom: Add missing platform_device_put() in dwc3_qcom_acpi_register_core (git-fixes).\n- usb: dwc3: dwc3-qcom: Fix typo in the dwc3 vbus override API (git-fixes).\n- usb: dwc3: exynos: Fix remove() function (git-fixes).\n- usb: dwc3: gadget: Avoid duplicate requests to enable Run/Stop (git-fixes).\n- usb: dwc3: gadget: Avoid starting DWC3 gadget during UDC unbind (git-fixes).\n- usb: dwc3: gadget: Clear ep descriptor last (git-fixes).\n- usb: dwc3: gadget: Do not modify GEVNTCOUNT in pullup() (git-fixes).\n- usb: dwc3: gadget: Do not set IMI for no_interrupt (git-fixes).\n- usb: dwc3: gadget: Refactor pullup() (git-fixes).\n- usb: dwc3: gadget: Return -ESHUTDOWN on ep disable (git-fixes).\n- usb: dwc3: gadget: Stop processing more requests on IMI (git-fixes).\n- usb: dwc3: gadget: conditionally remove requests (git-fixes).\n- usb: dwc3: gadget: fix high speed multiplier setting (git-fixes).\n- usb: dwc3: gadget: refactor dwc3_repare_one_trb (git-fixes).\n- usb: dwc3: pci: Add support for Intel Raptor Lake (git-fixes).\n- usb: dwc3: qcom: Add helper functions to enable,disable wake irqs (git-fixes).\n- usb: dwc3: qcom: fix missing optional irq warnings (git-fixes).\n- usb: dwc3: qcom: fix use-after-free on runtime-PM wakeup (git-fixes).\n- usb: ehci: Fix a function name in comments (git-fixes).\n- usb: gadget: bdc: fix typo in comment (git-fixes).\n- usb: gadget: f_fs: stricter integer overflow checks (git-fixes).\n- usb: gadget: f_uac2: clean up some inconsistent indenting (git-fixes).\n- usb: gadget: f_uac2: fix superspeed transfer (git-fixes).\n- usb: gadget: function: fix dangling pnp_string in f_printer.c (git-fixes).\n- usb: gadget: mass_storage: Fix cdrom data transfers on MAC-OS (git-fixes).\n- usb: gadget: tegra-xudc: Fix error check in tegra_xudc_powerdomain_init() (git-fixes).\n- usb: gadget: udc-xilinx: replace memcpy with memcpy_toio (git-fixes).\n- usb: gadget: udc: amd5536 depends on HAS_DMA (git-fixes).\n- usb: gadget: uvc: call uvc uvcg_warn on completed status instead of uvcg_info (git-fixes).\n- usb: host: Fix refcount leak in ehci_hcd_ppc_of_probe (git-fixes).\n- usb: host: ohci-ppc-of: Fix refcount leak bug (git-fixes).\n- usb: host: xhci-plat: suspend and resume clocks (git-fixes).\n- usb: host: xhci-plat: suspend/resume clks for brcm (git-fixes).\n- usb: host: xhci: Fix potential memory leak in xhci_alloc_stream_info() (git-fixes).\n- usb: host: xhci: fix a comment typo in xhci_mem_init() (git-fixes).\n- usb: host: xhci: use ffs() in xhci_mem_init() (git-fixes).\n- usb: host: xhci: use snprintf() in xhci_decode_trb() (git-fixes).\n- usb: hub: avoid warm port reset during USB3 disconnect (git-fixes).\n- usb: idmouse: fix an uninit-value in idmouse_open (git-fixes).\n- usb: mon: make mmapped memory read only (git-fixes).\n- usb: mtu3: fix failed runtime suspend in host only mode (git-fixes).\n- usb: musb: Fix musb_gadget.c rxstate overflow bug (git-fixes).\n- usb: ohci-nxp: Fix refcount leak in ohci_hcd_nxp_probe (git-fixes).\n- usb: renesas: Fix refcount leak bug (git-fixes).\n- usb: smsc: use eth_hw_addr_set() (git-fixes).\n- usb: storage: Add ASUS \u0026lt;0x0b05:0x1932\u003e to IGNORE_UAS (git-fixes).\n- usb: typec: altmodes/displayport: correct pin assignment for UFP receptacles (git-fixes).\n- usb: typec: intel_pmc_mux: Add new ACPI ID for Meteor Lake IOM device (git-fixes).\n- usb: typec: mux: Enter safe mode only when pins need to be reconfigured (git-fixes).\n- usb: typec: tcpm: Return ENOTSUPP for power supply prop writes (git-fixes).\n- usb: typec: tcpm: fix typo in comment (git-fixes).\n- usb: typec: tipd: Add an additional overflow check (git-fixes).\n- usb: typec: tipd: Do not read/write more bytes than required (git-fixes).\n- usb: typec: ucsi: Acknowledge the GET_ERROR_STATUS command completion (git-fixes).\n- usb: typec: ucsi: Remove incorrect warning (git-fixes).\n- usb: xhci-mtk: check boundary before check tt (git-fixes).\n- usb: xhci-mtk: relax TT periodic bandwidth allocation (git-fixes).\n- usb: xhci-mtk: update fs bus bandwidth by bw_budget_table (git-fixes).\n- usb: xhci: add XHCI_SPURIOUS_SUCCESS to ASM1042 despite being a V0.96 controller (git-fixes).\n- usb: xhci: tegra: Fix error check (git-fixes).\n- usbnet: Fix linkwatch use-after-free on disconnect (git-fixes).\n- usbnet: Fix memory leak in usbnet_disconnect() (git-fixes).\n- usbnet: Run unregister_netdev() before unbind() again (git-fixes).\n- usbnet: smsc95xx: Avoid link settings race on interrupt reception (git-fixes).\n- usbnet: smsc95xx: Do not clear read-only PHY interrupt (git-fixes).\n- usbnet: smsc95xx: Do not reset PHY behind PHY driver\u0027s back (git-fixes).\n- usbnet: smsc95xx: Fix deadlock on runtime resume (git-fixes).\n- usbnet: smsc95xx: Forward PHY interrupts to PHY driver to avoid polling (git-fixes).\n- userfaultfd/selftests: fix hugetlb area allocations (git-fixes).\n- v3 of \u0027PCI: hv: Only reuse existing IRTE allocation for Multi-MSI\u0027\n- vboxguest: Do not use devm for irq (git-fixes).\n- vdpa_sim: avoid putting an uninitialized iova_domain (git-fixes).\n- venus: pm_helpers: Fix warning in OPP during probe (git-fixes).\n- vfio/ccw: Do not change FSM state in subchannel event (git-fixes).\n- vfio/ccw: Remove UUID from s390 debug log (git-fixes).\n- vfio/type1: Unpin zero pages (git-fixes).\n- vfio: Clear the caps-\u003ebuf to NULL after free (git-fixes).\n- vhost/vsock: Use kvmalloc/kvfree for larger packets (git-fixes).\n- video/fbdev/stifb: Implement the stifb_fillrect() function (git-fixes).\n- video: fbdev: amba-clcd: Fix refcount leak bugs (git-fixes).\n- video: fbdev: arkfb: Check the size of screen before memset_io() (git-fixes).\n- video: fbdev: arkfb: Fix a divide-by-zero bug in ark_set_pixclock() (git-fixes).\n- video: fbdev: i740fb: Check the argument of i740_calc_vclk() (git-fixes).\n- video: fbdev: i740fb: Error out if \u0027pixclock\u0027 equals zero (git-fixes).\n- video: fbdev: pxa3xx-gcu: Fix integer overflow in pxa3xx_gcu_write (git-fixes).\n- video: fbdev: s3fb: Check the size of screen before memset_io() (git-fixes).\n- video: fbdev: sis: fix typos in SiS_GetModeID() (git-fixes).\n- video: fbdev: vt8623fb: Check the size of screen before memset_io() (git-fixes).\n- virt: Add SEV-SNP guest driver (jsc#SLE-19924, jsc#SLE-24814).\n- virt: sevguest: Add documentation for SEV-SNP CPUID Enforcement (jsc#SLE-19924, jsc#SLE-24814).\n- virt: sevguest: Add support to derive key (jsc#SLE-19924, jsc#SLE-24814).\n- virt: sevguest: Add support to get extended report (jsc#SLE-19924, jsc#SLE-24814).\n- virt: sevguest: Fix bool function returning negative value (jsc#SLE-19924, jsc#SLE-24814).\n- virt: sevguest: Fix return value check in alloc_shared_pages() (jsc#SLE-19924, jsc#SLE-24814).\n- virt: vbox: convert to use dev_groups (git-fixes).\n- virtio-blk: Use blk_validate_block_size() to validate block size (git-fixes).\n- virtio-gpu: fix a missing check to avoid NULL dereference (git-fixes).\n- virtio-net: fix the race between refill work and close (git-fixes).\n- virtio_net: fix memory leak inside XPD_TX with mergeable (git-fixes).\n- vmxnet3: Implement ethtool\u0027s get_channels command (bsc#1200431).\n- vmxnet3: Record queue number to incoming packets (bsc#1200431).\n- vmxnet3: Remove useless DMA-32 fallback configuration (bsc#1200431).\n- vmxnet3: add command to set ring buffer sizes (bsc#1200431).\n- vmxnet3: add support for capability registers (bsc#1200431).\n- vmxnet3: add support for large passthrough BAR register (bsc#1200431).\n- vmxnet3: add support for out of order rx completion (bsc#1200431).\n- vmxnet3: correctly report encapsulated LRO packet (git-fixes).\n- vmxnet3: disable overlay offloads if UPT device does not support (bsc#1200431).\n- vmxnet3: do not reschedule napi for rx processing (bsc#1200431).\n- vmxnet3: limit number of TXDs used for TSO packet (bsc#1200431).\n- vmxnet3: prepare for version 7 changes (bsc#1200431).\n- vmxnet3: switch from \u0027pci_\u0027 to \u0027dma_\u0027 API (bsc#1200431).\n- vmxnet3: update to version 7 (bsc#1200431).\n- vmxnet3: use correct intrConf reference when using extended queues (git-fixes).\n- vmxnet3: use ext1 field to indicate encapsulated packet (bsc#1200431).\n- vrf: do not run conntrack on vrf with !dflt qdisc (git-fixes).\n- vrf: fix packet sniffing for traffic originating from ip tunnels (git-fixes).\n- vsock/virtio: enable VQs early on probe (git-fixes).\n- vsock/virtio: initialize vdev-\u003epriv before using VQs (git-fixes).\n- vsock/virtio: read the negotiated features before using VQs (git-fixes).\n- vsock: Fix memory leak in vsock_connect() (git-fixes).\n- vsock: Set socket state back to SS_UNCONNECTED in vsock_connect_timeout() (git-fixes).\n- vsock: fix possible infinite sleep in vsock_connectible_wait_data() (git-fixes).\n- vsock: remove the unused \u0027wait\u0027 in vsock_connectible_recvmsg() (git-fixes).\n- vsock: remove vsock from connected table when connect is interrupted by a signal (git-fixes).\n- vt: Clear selection before changing the font (git-fixes).\n- watch-queue: remove spurious double semicolon (git-fixes).\n- watch_queue: Fix missing locking in add_watch_to_object() (git-fixes).\n- watch_queue: Fix missing rcu annotation (git-fixes).\n- watchdog-export-lockup_detector_reconfigure.patch.\n- watchdog/hpwdt: Include nmi.h only if CONFIG_HPWDT_NMI_DECODING (git-fixes).\n- watchdog: armada_37xx_wdt: Fix .set_timeout callback (git-fixes).\n- watchdog: armada_37xx_wdt: check the return value of devm_ioremap() in armada_37xx_wdt_probe() (git-fixes).\n- watchdog: ftwdt010_wdt: fix test for platform_get_irq() failure (git-fixes).\n- watchdog: sp5100_tco: Fix a memory leak of EFCH MMIO resource (git-fixes).\n- watchdog: wdat_wdt: Set the min and max timeout values properly (bsc#1194023).\n- watchqueue: make sure to serialize \u0027wqueue-\u003edefunct\u0027 properly (git-fixes).\n- wifi: airo: do not assign -1 to unsigned char (git-fixes).\n- wifi: ath10k: add peer map clean up for peer delete in ath10k_sta_state() (git-fixes).\n- wifi: ath11k: Fix QCN9074 firmware boot on x86 (git-fixes).\n- wifi: ath11k: avoid deadlock during regulatory update in ath11k_regd_update() (git-fixes).\n- wifi: ath11k: fix number of VHT beamformee spatial streams (git-fixes).\n- wifi: ath9k: avoid uninit memory read in ath9k_htc_rx_msg() (git-fixes).\n- wifi: brcmfmac: fix invalid address access when enabling SCAN log level (git-fixes).\n- wifi: brcmfmac: fix use-after-free bug in brcmf_netdev_start_xmit() (git-fixes).\n- wifi: cfg80211/mac80211: reject bad MBSSID elements (git-fixes).\n- wifi: cfg80211: debugfs: fix return type in ht40allow_map_read() (git-fixes).\n- wifi: cfg80211: do not allow multi-BSSID in S1G (git-fixes).\n- wifi: cfg80211: fix buffer overflow in elem comparison (git-fixes).\n- wifi: cfg80211: fix ieee80211_data_to_8023_exthdr handling of small packets (git-fixes).\n- wifi: cfg80211: fix memory leak in query_regdb_file() (git-fixes).\n- wifi: cfg80211: silence a sparse RCU warning (git-fixes).\n- wifi: cfg80211: update hidden BSSes to avoid WARN_ON (git-fixes).\n- wifi: iwlegacy: 4965: corrected fix for potential off-by-one overflow in il4965_rs_fill_link_cmd() (git-fixes).\n- wifi: iwlegacy: 4965: fix potential off-by-one overflow in il4965_rs_fill_link_cmd() (git-fixes).\n- wifi: iwlwifi: mvm: fix double list_add at iwl_mvm_mac_wake_tx_queue (git-fixes).\n- wifi: iwlwifi: mvm: fix double list_add at iwl_mvm_mac_wake_tx_queue (other cases) (git-fixes).\n- wifi: libertas: Fix possible refcount leak in if_usb_probe() (git-fixes).\n- wifi: mac80211: Do not finalize CSA in IBSS mode if state is disconnected (git-fixes).\n- wifi: mac80211: Fix UAF in ieee80211_scan_rx() (git-fixes).\n- wifi: mac80211: Fix ack frame idr leak when mesh has no route (git-fixes).\n- wifi: mac80211: allow bw change during channel switch in mesh (git-fixes).\n- wifi: mac80211: do not drop packets smaller than the LLC-SNAP header on fast-rx (git-fixes).\n- wifi: mac80211: fix decap offload for stations on AP_VLAN interfaces (git-fixes).\n- wifi: mac80211: fix memory free error when registering wiphy fail (git-fixes).\n- wifi: mac80211: fix probe req HE capabilities access (git-fixes).\n- wifi: mac80211: fix regression with non-QoS drivers (git-fixes).\n- wifi: mac80211: limit A-MSDU subframes for client too (git-fixes).\n- wifi: mac80211_hwsim: add back erroneously removed cast (git-fixes).\n- wifi: mac80211_hwsim: avoid mac80211 warning on bad rate (git-fixes).\n- wifi: mac80211_hwsim: check length for virtio packets (git-fixes).\n- wifi: mac80211_hwsim: fix debugfs attribute ps with rc table support (git-fixes).\n- wifi: mac80211_hwsim: fix race condition in pending packet (git-fixes).\n- wifi: mac80211_hwsim: use 32-bit skb cookie (git-fixes).\n- wifi: mac8021: fix possible oob access in ieee80211_get_rate_duration (git-fixes).\n- wifi: mt76: fix reading current per-tid starting sequence number for aggregation (git-fixes).\n- wifi: mt76: mt7615: add mt7615_mutex_acquire/release in mt7615_sta_set_decap_offload (git-fixes).\n- wifi: mt76: mt7915: do not check state before configuring implicit beamform (git-fixes).\n- wifi: mt76: mt7921: reset msta-\u003eairtime_ac while clearing up hw value (git-fixes).\n- wifi: mt76: sdio: fix transmitting packet hangs (git-fixes).\n- wifi: p54: Fix an error handling path in p54spi_probe() (git-fixes).\n- wifi: p54: add missing parentheses in p54_flush() (git-fixes).\n- wifi: rt2x00: correctly set BBP register 86 for MT7620 (git-fixes).\n- wifi: rt2x00: do not run Rt5592 IQ calibration on MT7620 (git-fixes).\n- wifi: rt2x00: set SoC wmac clock register (git-fixes).\n- wifi: rt2x00: set VGC gain for both chains of MT7620 (git-fixes).\n- wifi: rt2x00: set correct TX_SW_CFG1 MAC register for MT7620 (git-fixes).\n- wifi: rtl8xxxu: Fix AIFS written to REG_EDCA_*_PARAM (git-fixes).\n- wifi: rtl8xxxu: Fix skb misuse in TX queue selection (git-fixes).\n- wifi: rtl8xxxu: Improve rtl8xxxu_queue_select (git-fixes).\n- wifi: rtl8xxxu: Remove copy-paste leftover in gen2_update_rate_mask (git-fixes).\n- wifi: rtl8xxxu: gen2: Fix mistake in path B IQ calibration (git-fixes).\n- wifi: rtl8xxxu: tighten bounds checking in rtl8xxxu_read_efuse() (git-fixes).\n- wifi: rtlwifi: 8192de: correct checking of IQK reload (git-fixes).\n- wifi: rtlwifi: fix error codes in rtl_debugfs_set_write_h2c() (git-fixes).\n- wifi: rtlwifi: remove always-true condition pointed out by GCC 12 (git-fies).\n- wifi: rtw88: add missing destroy_workqueue() on error path in rtw_core_init() (git-fixes).\n- wifi: rtw88: check the return value of alloc_workqueue() (git-fixes).\n- wifi: rtw89: 8852a: rfk: fix div 0 exception (git-fixes).\n- wifi: wext: use flex array destination for memcpy() (git-fixes).\n- wifi: wil6210: debugfs: fix info leak in wil_write_file_wmi() (git-fixes).\n- wifi: wil6210: debugfs: fix uninitialized variable use in `wil_write_file_wmi()` (git-fixes).\n- wifi: wilc1000: validate length of IEEE80211_P2P_ATTR_CHANNEL_LIST attribute (git-fixes).\n- wifi: wilc1000: validate length of IEEE80211_P2P_ATTR_OPER_CHANNEL attribute (git-fixes).\n- wifi: wilc1000: validate number of channels (git-fixes).\n- wifi: wilc1000: validate pairwise and authentication suite offsets (git-fixes).\n- wireguard: device: check for metadata_dst with skb_valid_dst() (git-fixes).\n- wireless: Remove redundant \u0027flush_workqueue()\u0027 calls (bsc#1202131).\n- workqueue: do not skip lockdep work dependency in cancel_work_sync() (git-fixes).\n- wwan_hwsim: fix possible memory leak in wwan_hwsim_dev_new() (git-fixes).\n- x86/Hyper-V: Add SEV negotiate protocol support in Isolation VM (bsc#1190497).\n- x86/Xen: streamline (and fix) PV CPU enumeration (git-fixes).\n- x86/boot: Add Confidential Computing type to setup_data (jsc#SLE-19924, jsc#SLE-24814).\n- x86/boot: Add a pointer to Confidential Computing blob in bootparams (jsc#SLE-19924, jsc#SLE-24814).\n- x86/boot: Do not propagate uninitialized boot_params-\u003ecc_blob_address (bsc#1204970).\n- x86/boot: Fix the setup data types max limit (bsc#1204970).\n- x86/boot: Introduce helpers for MSR reads/writes (jsc#SLE-19924, jsc#SLE-24814).\n- x86/boot: Put globals that are accessed early into the .data section (jsc#SLE-19924, jsc#SLE-24814).\n- x86/boot: Use MSR read/write helpers instead of inline assembly (jsc#SLE-19924, jsc#SLE-24814).\n- x86/bugs: Make sure MSR_SPEC_CTRL is updated properly upon resume from S3 (bsc#1206037).\n- x86/compressed/64: Add identity mapping for Confidential Computing blob (jsc#SLE-19924, jsc#SLE-24814).\n- x86/compressed/64: Add identity mappings for setup_data entries (bsc#1204970).\n- x86/compressed/64: Add support for SEV-SNP CPUID table in #VC handlers (jsc#SLE-19924, jsc#SLE-24814).\n- x86/compressed/64: Detect/setup SEV/SME features earlier during boot (jsc#SLE-19924, jsc#SLE-24814).\n- x86/compressed/acpi: Move EFI config table lookup to helper (jsc#SLE-19924, jsc#SLE-24814).\n- x86/compressed/acpi: Move EFI detection to helper (jsc#SLE-19924, jsc#SLE-24814).\n- x86/compressed/acpi: Move EFI kexec handling into common code (jsc#SLE-19924, jsc#SLE-24814).\n- x86/compressed/acpi: Move EFI system table lookup to helper (jsc#SLE-19924, jsc#SLE-24814).\n- x86/compressed/acpi: Move EFI vendor table lookup to helper (jsc#SLE-19924, jsc#SLE-24814).\n- x86/compressed: Add SEV-SNP feature detection/setup (jsc#SLE-19924, jsc#SLE-24814).\n- x86/compressed: Add helper for validating pages in the decompression stage (jsc#SLE-19924, jsc#SLE-24814).\n- x86/compressed: Export and rename add_identity_map() (jsc#SLE-19924, jsc#SLE-24814).\n- x86/compressed: Register GHCB memory when SEV-SNP is active (jsc#SLE-19924, jsc#SLE-24814).\n- x86/compressed: Use firmware-validated CPUID leaves for SEV-SNP guests (jsc#SLE-19924, jsc#SLE-24814).\n- x86/cpu: Restore AMD\u0027s DE_CFG MSR after resume (bsc#1205473).\n- x86/entry: Work around Clang __bdos() bug (git-fixes).\n- x86/extable: Extend extable functionality (git-fixes).\n- x86/fpu: Drop fpregs lock before inheriting FPU permissions (bnc#1205282).\n- x86/futex: Remove .fixup usage (git-fixes).\n- x86/head/64: Re-enable stack protection (jsc#SLE-19924, jsc#SLE-24814).\n- x86/hyperv: Disable hardlockup detector by default in Hyper-V guests (git-fixes).\n- x86/hyperv: Fix \u0027struct hv_enlightened_vmcs\u0027 definition (git-fixes).\n- x86/hyperv: Update \u0027struct hv_enlightened_vmcs\u0027 definition (git-fixes).\n- x86/hyperv: fix invalid writes to MSRs during root partition kexec (git-fixes).\n- x86/ibt,ftrace: Make function-graph play nice (bsc#1203969).\n- x86/kernel: Mark the .bss..decrypted section as shared in the RMP table (jsc#SLE-19924, jsc#SLE-24814).\n- x86/kernel: Validate ROM memory before accessing when SEV-SNP is active (jsc#SLE-19924, jsc#SLE-24814).\n- x86/kexec: Fix double-free of elf header buffer (bsc#1205567).\n- x86/kexec: fix memory leak of elf header buffer (bsc#1196444).\n- x86/microcode/AMD: Apply the patch early on every logical thread (bsc#1205264).\n- x86/mm: Extend cc_attr to include AMD SEV-SNP (jsc#SLE-19924, jsc#SLE-24814).\n- x86/mm: Validate memory when changing the C-bit (jsc#SLE-19924, jsc#SLE-24814).\n- x86/olpc: fix \u0027logical not is only applied to the left hand side\u0027 (git-fixes).\n- x86/retbleed: Add fine grained Kconfig knobs (bsc#1190497).\n- x86/sev: Add SEV-SNP feature detection/setup (jsc#SLE-19924, jsc#SLE-24814).\n- x86/sev: Add a helper for the PVALIDATE instruction (jsc#SLE-19924, jsc#SLE-24814).\n- x86/sev: Add a sev= cmdline option (jsc#SLE-19924, jsc#SLE-24814).\n- x86/sev: Add helper for validating pages in early enc attribute changes (jsc#SLE-19924, jsc#SLE-24814).\n- x86/sev: Add missing __init annotations to SEV init routines (jsc#SLE-19924 jsc#SLE-24814).\n- x86/sev: Annotate stack change in the #VC handler (bsc#1204970).\n- x86/sev: Check SEV-SNP features support (jsc#SLE-19924, jsc#SLE-24814).\n- x86/sev: Check the VMPL level (jsc#SLE-19924, jsc#SLE-24814).\n- x86/sev: Define the Linux-specific guest termination reasons (bsc#1190497).\n- x86/sev: Detect/setup SEV/SME features earlier in boot (jsc#SLE-19924, jsc#SLE-24814).\n- x86/sev: Do not use cc_platform_has() for early SEV-SNP calls (bsc#1204970).\n- x86/sev: Get the AP jump table address from secrets page (jsc#SLE-19924, jsc#SLE-24814).\n- x86/sev: Move MSR-based VMGEXITs for CPUID to helper (jsc#SLE-19924, jsc#SLE-24814).\n- x86/sev: Provide support for SNP guest request NAEs (jsc#SLE-19924, jsc#SLE-24814).\n- x86/sev: Register GHCB memory when SEV-SNP is active (jsc#SLE-19924, jsc#SLE-24814).\n- x86/sev: Register SEV-SNP guest request platform device (jsc#SLE-19924, jsc#SLE-24814).\n- x86/sev: Remove duplicated assignment to variable info (bsc#1204970).\n- x86/sev: Save the negotiated GHCB version (bsc#1190497).\n- x86/sev: Use SEV-SNP AP creation to start secondary CPUs (jsc#SLE-19924, jsc#SLE-24814).\n- x86/sev: Use firmware-validated CPUID for SEV-SNP guests (jsc#SLE-19924, jsc#SLE-24814).\n- x86/uaccess: Implement macros for CMPXCHG on user addresses (git-fixes).\n- x86/xen: Remove undefined behavior in setup_features() (git-fixes).\n- xen-blkback: Advertise feature-persistent as user requested (git-fixes).\n- xen-blkback: Apply \u0027feature_persistent\u0027 parameter when connect (git-fixes).\n- xen-blkback: fix persistent grants negotiation (git-fixes).\n- xen-blkfront: Advertise feature-persistent as user requested (git-fixes).\n- xen-blkfront: Apply \u0027feature_persistent\u0027 parameter when connect (git-fixes).\n- xen-blkfront: Cache feature_persistent value before advertisement (git-fixes).\n- xen-blkfront: Handle NULL gendisk (git-fixes).\n- xen-netback: only remove \u0027hotplug-status\u0027 when the vif is actually destroyed (git-fixes).\n- xen/gntdev: Accommodate VMA splitting (git-fixes).\n- xen/gntdev: Avoid blocking in unmap_grant_pages() (git-fixes).\n- xen/gntdev: Ignore failure to unmap INVALID_GRANT_HANDLE (git-fixes).\n- xen/gntdev: Prevent leaking grants (git-fixes).\n- xen/gntdev: fix unmap notification order (git-fixes).\n- xen/grants: prevent integer overflow in gnttab_dma_alloc_pages() (git-fixes).\n- xen/pcpu: fix possible memory leak in register_pcpu() (git-fixes).\n- xen/privcmd: fix error exit of privcmd_ioctl_dm_op() (git-fixes).\n- xen/usb: do not use arbitrary_virt_to_machine() (git-fixes).\n- xen/xenbus: fix return type in xenbus_file_read() (git-fixes).\n- xen: delay xen_hvm_init_time_ops() if kdump is boot on vcpu\u003e=32 (git-fixes).\n- xen: detect uninitialized xenbus in xenbus_init (git-fixes).\n- xen: do not continue xenstore initialization in case of errors (git-fixes).\n- xfs: Fix the free logic of state in xfs_attr_node_hasname (git-fixes).\n- xfs: check sb_meta_uuid for dabuf buffer recovery (git-fixes).\n- xfs: convert XLOG_FORCED_SHUTDOWN() to xlog_is_shutdown() (git-fixes).\n- xfs: fix perag reference leak on iteration race with growfs (git-fixes).\n- xfs: fix soft lockup via spinning in filestream ag selection loop (git-fixes).\n- xfs: fix use-after-free in xattr node block inactivation (git-fixes).\n- xfs: fix xfs_ifree() error handling to not leak perag ref (git-fixes).\n- xfs: fold perag loop iteration logic into helper function (git-fixes).\n- xfs: make xfs_rtalloc_query_range input parameters const (git-fixes).\n- xfs: only bother with sync_filesystem during readonly remount (git-fixes).\n- xfs: prevent UAF in xfs_log_item_in_current_chkpt (git-fixes).\n- xfs: prevent a UAF when log IO errors race with unmount (git-fixes).\n- xfs: remove incorrect ASSERT in xfs_rename (git-fixes).\n- xfs: rename the next_agno perag iteration variable (git-fixes).\n- xfs: reorder iunlink remove operation in xfs_ifree (git-fixes).\n- xfs: reserve quota for dir expansion when linking/unlinking files (bsc#1205616).\n- xfs: reserve quota for target dir expansion when renaming files (bsc#1205679).\n- xfs: revert \u0027xfs: actually bump warning counts when we send warnings\u0027 (git-fixes).\n- xfs: terminate perag iteration reliably on agcount (git-fixes).\n- xfs: use invalidate_lock to check the state of mmap_lock (git-fixes).\n- xfs: use kmem_cache_free() for kmem_cache objects (git-fixes).\n- xfs: use setattr_copy to set vfs inode attributes (git-fixes).\n- xhci-pci: Set runtime PM as default policy on all xHC 1.2 or later devices (git-fixes).\n- xhci: Add quirk to reset host back to default state at shutdown (git-fixes).\n- xhci: Allocate separate command structures for each LPM command (git-fixes).\n- xhci: Do not show warning for reinit on known broken suspend (git-fixes).\n- xhci: Remove device endpoints from bandwidth list when freeing the device (git-fixes).\n- xhci: Set HCD flag to defer primary roothub registration (git-fixes).\n- xhci: dbc: Fix memory leak in xhci_alloc_dbc() (git-fixes).\n- xhci: dbc: Rename xhci_dbc_init and xhci_dbc_exit (git-fixes).\n- xhci: dbc: create and remove dbc structure in dbgtty driver (git-fixes).\n- xhci: dbc: refactor xhci_dbc_init() (git-fixes).\n- xprtrdma: fix pointer derefs in error cases of rpcrdma_ep_create (git-fixes).\n- xprtrdma: treat all calls not a bcall when bc_serv is NULL (git-fixes).\n- zonefs: Clear inode information flags on inode creation (git-fixes).\n- zonefs: Fix management of open zones (git-fixes).\n- zonefs: add MODULE_ALIAS_FS (git-fixes).\n",
        "title": "Description of the patch"
      },
      {
        "category": "details",
        "text": "SUSE-2022-4617,SUSE-SLE-Micro-5.3-2022-4617,SUSE-SLE-Module-Live-Patching-15-SP4-2022-4617,SUSE-SLE-Module-RT-15-SP4-2022-4617,openSUSE-Leap-Micro-5.3-2022-4617,openSUSE-SLE-15.4-2022-4617",
        "title": "Patchnames"
      },
      {
        "category": "legal_disclaimer",
        "text": "CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).",
        "title": "Terms of use"
      }
    ],
    "publisher": {
      "category": "vendor",
      "contact_details": "https://www.suse.com/support/security/contact/",
      "name": "SUSE Product Security Team",
      "namespace": "https://www.suse.com/"
    },
    "references": [
      {
        "category": "external",
        "summary": "SUSE ratings",
        "url": "https://www.suse.com/support/security/rating/"
      },
      {
        "category": "self",
        "summary": "URL of this CSAF notice",
        "url": "https://ftp.suse.com/pub/projects/security/csaf/suse-su-2022_4617-1.json"
      },
      {
        "category": "self",
        "summary": "URL for SUSE-SU-2022:4617-1",
        "url": "https://www.suse.com/support/update/announcement/2022/suse-su-20224617-1/"
      },
      {
        "category": "self",
        "summary": "E-Mail link for SUSE-SU-2022:4617-1",
        "url": "https://lists.suse.com/pipermail/sle-security-updates/2022-December/013342.html"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1023051",
        "url": "https://bugzilla.suse.com/1023051"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1032323",
        "url": "https://bugzilla.suse.com/1032323"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1065729",
        "url": "https://bugzilla.suse.com/1065729"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1071995",
        "url": "https://bugzilla.suse.com/1071995"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1152472",
        "url": "https://bugzilla.suse.com/1152472"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1152489",
        "url": "https://bugzilla.suse.com/1152489"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1156395",
        "url": "https://bugzilla.suse.com/1156395"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1164051",
        "url": "https://bugzilla.suse.com/1164051"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1177471",
        "url": "https://bugzilla.suse.com/1177471"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1184350",
        "url": "https://bugzilla.suse.com/1184350"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1185032",
        "url": "https://bugzilla.suse.com/1185032"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1188238",
        "url": "https://bugzilla.suse.com/1188238"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1189297",
        "url": "https://bugzilla.suse.com/1189297"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1189999",
        "url": "https://bugzilla.suse.com/1189999"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1190256",
        "url": "https://bugzilla.suse.com/1190256"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1190497",
        "url": "https://bugzilla.suse.com/1190497"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1190969",
        "url": "https://bugzilla.suse.com/1190969"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1192968",
        "url": "https://bugzilla.suse.com/1192968"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1193629",
        "url": "https://bugzilla.suse.com/1193629"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1194023",
        "url": "https://bugzilla.suse.com/1194023"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1194592",
        "url": "https://bugzilla.suse.com/1194592"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1194869",
        "url": "https://bugzilla.suse.com/1194869"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1194904",
        "url": "https://bugzilla.suse.com/1194904"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1195480",
        "url": "https://bugzilla.suse.com/1195480"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1195917",
        "url": "https://bugzilla.suse.com/1195917"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1196018",
        "url": "https://bugzilla.suse.com/1196018"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1196444",
        "url": "https://bugzilla.suse.com/1196444"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1196616",
        "url": "https://bugzilla.suse.com/1196616"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1196632",
        "url": "https://bugzilla.suse.com/1196632"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1196867",
        "url": "https://bugzilla.suse.com/1196867"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1196869",
        "url": "https://bugzilla.suse.com/1196869"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1197158",
        "url": "https://bugzilla.suse.com/1197158"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1197391",
        "url": "https://bugzilla.suse.com/1197391"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1197659",
        "url": "https://bugzilla.suse.com/1197659"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1197755",
        "url": "https://bugzilla.suse.com/1197755"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1197756",
        "url": "https://bugzilla.suse.com/1197756"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1197757",
        "url": "https://bugzilla.suse.com/1197757"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1197763",
        "url": "https://bugzilla.suse.com/1197763"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1198189",
        "url": "https://bugzilla.suse.com/1198189"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1198410",
        "url": "https://bugzilla.suse.com/1198410"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1198577",
        "url": "https://bugzilla.suse.com/1198577"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1198702",
        "url": "https://bugzilla.suse.com/1198702"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1198971",
        "url": "https://bugzilla.suse.com/1198971"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1199086",
        "url": "https://bugzilla.suse.com/1199086"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1199364",
        "url": "https://bugzilla.suse.com/1199364"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1199515",
        "url": "https://bugzilla.suse.com/1199515"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1199670",
        "url": "https://bugzilla.suse.com/1199670"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1199904",
        "url": "https://bugzilla.suse.com/1199904"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1200015",
        "url": "https://bugzilla.suse.com/1200015"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1200058",
        "url": "https://bugzilla.suse.com/1200058"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1200268",
        "url": "https://bugzilla.suse.com/1200268"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1200288",
        "url": "https://bugzilla.suse.com/1200288"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1200301",
        "url": "https://bugzilla.suse.com/1200301"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1200313",
        "url": "https://bugzilla.suse.com/1200313"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1200431",
        "url": "https://bugzilla.suse.com/1200431"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1200465",
        "url": "https://bugzilla.suse.com/1200465"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1200494",
        "url": "https://bugzilla.suse.com/1200494"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1200544",
        "url": "https://bugzilla.suse.com/1200544"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1200567",
        "url": "https://bugzilla.suse.com/1200567"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1200622",
        "url": "https://bugzilla.suse.com/1200622"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1200644",
        "url": "https://bugzilla.suse.com/1200644"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1200651",
        "url": "https://bugzilla.suse.com/1200651"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1200692",
        "url": "https://bugzilla.suse.com/1200692"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1200788",
        "url": "https://bugzilla.suse.com/1200788"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1200845",
        "url": "https://bugzilla.suse.com/1200845"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1200868",
        "url": "https://bugzilla.suse.com/1200868"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1200869",
        "url": "https://bugzilla.suse.com/1200869"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1200870",
        "url": "https://bugzilla.suse.com/1200870"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1200871",
        "url": "https://bugzilla.suse.com/1200871"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1200872",
        "url": "https://bugzilla.suse.com/1200872"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1200873",
        "url": "https://bugzilla.suse.com/1200873"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1201019",
        "url": "https://bugzilla.suse.com/1201019"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1201308",
        "url": "https://bugzilla.suse.com/1201308"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1201309",
        "url": "https://bugzilla.suse.com/1201309"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1201310",
        "url": "https://bugzilla.suse.com/1201310"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1201361",
        "url": "https://bugzilla.suse.com/1201361"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1201427",
        "url": "https://bugzilla.suse.com/1201427"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1201442",
        "url": "https://bugzilla.suse.com/1201442"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1201455",
        "url": "https://bugzilla.suse.com/1201455"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1201489",
        "url": "https://bugzilla.suse.com/1201489"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1201610",
        "url": "https://bugzilla.suse.com/1201610"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1201675",
        "url": "https://bugzilla.suse.com/1201675"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1201725",
        "url": "https://bugzilla.suse.com/1201725"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1201726",
        "url": "https://bugzilla.suse.com/1201726"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1201768",
        "url": "https://bugzilla.suse.com/1201768"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1201865",
        "url": "https://bugzilla.suse.com/1201865"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1201940",
        "url": "https://bugzilla.suse.com/1201940"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1201941",
        "url": "https://bugzilla.suse.com/1201941"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1201948",
        "url": "https://bugzilla.suse.com/1201948"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1201954",
        "url": "https://bugzilla.suse.com/1201954"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1201956",
        "url": "https://bugzilla.suse.com/1201956"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1201958",
        "url": "https://bugzilla.suse.com/1201958"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1202095",
        "url": "https://bugzilla.suse.com/1202095"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1202096",
        "url": "https://bugzilla.suse.com/1202096"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1202097",
        "url": "https://bugzilla.suse.com/1202097"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1202113",
        "url": "https://bugzilla.suse.com/1202113"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1202131",
        "url": "https://bugzilla.suse.com/1202131"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1202154",
        "url": "https://bugzilla.suse.com/1202154"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1202187",
        "url": "https://bugzilla.suse.com/1202187"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1202262",
        "url": "https://bugzilla.suse.com/1202262"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1202265",
        "url": "https://bugzilla.suse.com/1202265"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1202312",
        "url": "https://bugzilla.suse.com/1202312"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1202341",
        "url": "https://bugzilla.suse.com/1202341"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1202346",
        "url": "https://bugzilla.suse.com/1202346"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1202347",
        "url": "https://bugzilla.suse.com/1202347"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1202385",
        "url": "https://bugzilla.suse.com/1202385"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1202393",
        "url": "https://bugzilla.suse.com/1202393"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1202447",
        "url": "https://bugzilla.suse.com/1202447"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1202471",
        "url": "https://bugzilla.suse.com/1202471"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1202558",
        "url": "https://bugzilla.suse.com/1202558"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1202623",
        "url": "https://bugzilla.suse.com/1202623"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1202636",
        "url": "https://bugzilla.suse.com/1202636"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1202672",
        "url": "https://bugzilla.suse.com/1202672"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1202681",
        "url": "https://bugzilla.suse.com/1202681"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1202685",
        "url": "https://bugzilla.suse.com/1202685"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1202686",
        "url": "https://bugzilla.suse.com/1202686"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1202700",
        "url": "https://bugzilla.suse.com/1202700"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1202710",
        "url": "https://bugzilla.suse.com/1202710"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1202711",
        "url": "https://bugzilla.suse.com/1202711"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1202712",
        "url": "https://bugzilla.suse.com/1202712"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1202713",
        "url": "https://bugzilla.suse.com/1202713"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1202715",
        "url": "https://bugzilla.suse.com/1202715"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1202716",
        "url": "https://bugzilla.suse.com/1202716"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1202757",
        "url": "https://bugzilla.suse.com/1202757"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1202758",
        "url": "https://bugzilla.suse.com/1202758"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1202759",
        "url": "https://bugzilla.suse.com/1202759"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1202761",
        "url": "https://bugzilla.suse.com/1202761"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1202762",
        "url": "https://bugzilla.suse.com/1202762"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1202763",
        "url": "https://bugzilla.suse.com/1202763"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1202764",
        "url": "https://bugzilla.suse.com/1202764"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1202765",
        "url": "https://bugzilla.suse.com/1202765"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1202766",
        "url": "https://bugzilla.suse.com/1202766"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1202767",
        "url": "https://bugzilla.suse.com/1202767"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1202768",
        "url": "https://bugzilla.suse.com/1202768"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1202769",
        "url": "https://bugzilla.suse.com/1202769"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1202770",
        "url": "https://bugzilla.suse.com/1202770"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1202771",
        "url": "https://bugzilla.suse.com/1202771"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1202773",
        "url": "https://bugzilla.suse.com/1202773"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1202774",
        "url": "https://bugzilla.suse.com/1202774"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1202775",
        "url": "https://bugzilla.suse.com/1202775"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1202776",
        "url": "https://bugzilla.suse.com/1202776"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1202778",
        "url": "https://bugzilla.suse.com/1202778"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1202779",
        "url": "https://bugzilla.suse.com/1202779"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1202780",
        "url": "https://bugzilla.suse.com/1202780"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1202781",
        "url": "https://bugzilla.suse.com/1202781"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1202782",
        "url": "https://bugzilla.suse.com/1202782"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1202783",
        "url": "https://bugzilla.suse.com/1202783"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1202822",
        "url": "https://bugzilla.suse.com/1202822"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1202823",
        "url": "https://bugzilla.suse.com/1202823"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1202824",
        "url": "https://bugzilla.suse.com/1202824"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1202860",
        "url": "https://bugzilla.suse.com/1202860"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1202867",
        "url": "https://bugzilla.suse.com/1202867"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1202872",
        "url": "https://bugzilla.suse.com/1202872"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1202874",
        "url": "https://bugzilla.suse.com/1202874"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1202898",
        "url": "https://bugzilla.suse.com/1202898"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1202914",
        "url": "https://bugzilla.suse.com/1202914"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1202960",
        "url": "https://bugzilla.suse.com/1202960"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1202989",
        "url": "https://bugzilla.suse.com/1202989"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1202992",
        "url": "https://bugzilla.suse.com/1202992"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1202993",
        "url": "https://bugzilla.suse.com/1202993"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1203002",
        "url": "https://bugzilla.suse.com/1203002"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1203008",
        "url": "https://bugzilla.suse.com/1203008"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1203036",
        "url": "https://bugzilla.suse.com/1203036"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1203039",
        "url": "https://bugzilla.suse.com/1203039"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1203041",
        "url": "https://bugzilla.suse.com/1203041"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1203063",
        "url": "https://bugzilla.suse.com/1203063"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1203066",
        "url": "https://bugzilla.suse.com/1203066"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1203067",
        "url": "https://bugzilla.suse.com/1203067"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1203098",
        "url": "https://bugzilla.suse.com/1203098"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1203101",
        "url": "https://bugzilla.suse.com/1203101"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1203107",
        "url": "https://bugzilla.suse.com/1203107"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1203116",
        "url": "https://bugzilla.suse.com/1203116"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1203117",
        "url": "https://bugzilla.suse.com/1203117"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1203138",
        "url": "https://bugzilla.suse.com/1203138"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1203139",
        "url": "https://bugzilla.suse.com/1203139"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1203159",
        "url": "https://bugzilla.suse.com/1203159"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1203183",
        "url": "https://bugzilla.suse.com/1203183"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1203197",
        "url": "https://bugzilla.suse.com/1203197"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1203208",
        "url": "https://bugzilla.suse.com/1203208"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1203229",
        "url": "https://bugzilla.suse.com/1203229"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1203263",
        "url": "https://bugzilla.suse.com/1203263"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1203290",
        "url": "https://bugzilla.suse.com/1203290"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1203338",
        "url": "https://bugzilla.suse.com/1203338"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1203360",
        "url": "https://bugzilla.suse.com/1203360"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1203361",
        "url": "https://bugzilla.suse.com/1203361"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1203389",
        "url": "https://bugzilla.suse.com/1203389"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1203391",
        "url": "https://bugzilla.suse.com/1203391"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1203410",
        "url": "https://bugzilla.suse.com/1203410"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1203435",
        "url": "https://bugzilla.suse.com/1203435"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1203505",
        "url": "https://bugzilla.suse.com/1203505"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1203511",
        "url": "https://bugzilla.suse.com/1203511"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1203514",
        "url": "https://bugzilla.suse.com/1203514"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1203552",
        "url": "https://bugzilla.suse.com/1203552"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1203606",
        "url": "https://bugzilla.suse.com/1203606"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1203664",
        "url": "https://bugzilla.suse.com/1203664"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1203693",
        "url": "https://bugzilla.suse.com/1203693"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1203699",
        "url": "https://bugzilla.suse.com/1203699"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1203767",
        "url": "https://bugzilla.suse.com/1203767"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1203769",
        "url": "https://bugzilla.suse.com/1203769"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1203770",
        "url": "https://bugzilla.suse.com/1203770"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1203794",
        "url": "https://bugzilla.suse.com/1203794"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1203798",
        "url": "https://bugzilla.suse.com/1203798"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1203802",
        "url": "https://bugzilla.suse.com/1203802"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1203829",
        "url": "https://bugzilla.suse.com/1203829"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1203893",
        "url": "https://bugzilla.suse.com/1203893"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1203902",
        "url": "https://bugzilla.suse.com/1203902"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1203906",
        "url": "https://bugzilla.suse.com/1203906"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1203908",
        "url": "https://bugzilla.suse.com/1203908"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1203922",
        "url": "https://bugzilla.suse.com/1203922"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1203935",
        "url": "https://bugzilla.suse.com/1203935"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1203939",
        "url": "https://bugzilla.suse.com/1203939"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1203960",
        "url": "https://bugzilla.suse.com/1203960"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1203969",
        "url": "https://bugzilla.suse.com/1203969"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1203987",
        "url": "https://bugzilla.suse.com/1203987"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1203992",
        "url": "https://bugzilla.suse.com/1203992"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1203994",
        "url": "https://bugzilla.suse.com/1203994"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1204017",
        "url": "https://bugzilla.suse.com/1204017"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1204051",
        "url": "https://bugzilla.suse.com/1204051"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1204059",
        "url": "https://bugzilla.suse.com/1204059"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1204060",
        "url": "https://bugzilla.suse.com/1204060"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1204092",
        "url": "https://bugzilla.suse.com/1204092"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1204125",
        "url": "https://bugzilla.suse.com/1204125"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1204132",
        "url": "https://bugzilla.suse.com/1204132"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1204142",
        "url": "https://bugzilla.suse.com/1204142"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1204166",
        "url": "https://bugzilla.suse.com/1204166"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1204168",
        "url": "https://bugzilla.suse.com/1204168"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1204170",
        "url": "https://bugzilla.suse.com/1204170"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1204171",
        "url": "https://bugzilla.suse.com/1204171"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1204183",
        "url": "https://bugzilla.suse.com/1204183"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1204228",
        "url": "https://bugzilla.suse.com/1204228"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1204241",
        "url": "https://bugzilla.suse.com/1204241"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1204289",
        "url": "https://bugzilla.suse.com/1204289"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1204290",
        "url": "https://bugzilla.suse.com/1204290"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1204291",
        "url": "https://bugzilla.suse.com/1204291"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1204292",
        "url": "https://bugzilla.suse.com/1204292"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1204353",
        "url": "https://bugzilla.suse.com/1204353"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1204354",
        "url": "https://bugzilla.suse.com/1204354"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1204355",
        "url": "https://bugzilla.suse.com/1204355"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1204402",
        "url": "https://bugzilla.suse.com/1204402"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1204405",
        "url": "https://bugzilla.suse.com/1204405"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1204413",
        "url": "https://bugzilla.suse.com/1204413"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1204414",
        "url": "https://bugzilla.suse.com/1204414"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1204415",
        "url": "https://bugzilla.suse.com/1204415"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1204417",
        "url": "https://bugzilla.suse.com/1204417"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1204424",
        "url": "https://bugzilla.suse.com/1204424"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1204428",
        "url": "https://bugzilla.suse.com/1204428"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1204431",
        "url": "https://bugzilla.suse.com/1204431"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1204432",
        "url": "https://bugzilla.suse.com/1204432"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1204439",
        "url": "https://bugzilla.suse.com/1204439"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1204470",
        "url": "https://bugzilla.suse.com/1204470"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1204479",
        "url": "https://bugzilla.suse.com/1204479"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1204486",
        "url": "https://bugzilla.suse.com/1204486"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1204498",
        "url": "https://bugzilla.suse.com/1204498"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1204533",
        "url": "https://bugzilla.suse.com/1204533"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1204569",
        "url": "https://bugzilla.suse.com/1204569"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1204574",
        "url": "https://bugzilla.suse.com/1204574"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1204575",
        "url": "https://bugzilla.suse.com/1204575"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1204576",
        "url": "https://bugzilla.suse.com/1204576"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1204619",
        "url": "https://bugzilla.suse.com/1204619"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1204624",
        "url": "https://bugzilla.suse.com/1204624"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1204631",
        "url": "https://bugzilla.suse.com/1204631"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1204635",
        "url": "https://bugzilla.suse.com/1204635"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1204636",
        "url": "https://bugzilla.suse.com/1204636"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1204637",
        "url": "https://bugzilla.suse.com/1204637"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1204646",
        "url": "https://bugzilla.suse.com/1204646"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1204647",
        "url": "https://bugzilla.suse.com/1204647"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1204650",
        "url": "https://bugzilla.suse.com/1204650"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1204653",
        "url": "https://bugzilla.suse.com/1204653"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1204693",
        "url": "https://bugzilla.suse.com/1204693"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1204705",
        "url": "https://bugzilla.suse.com/1204705"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1204719",
        "url": "https://bugzilla.suse.com/1204719"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1204728",
        "url": "https://bugzilla.suse.com/1204728"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1204745",
        "url": "https://bugzilla.suse.com/1204745"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1204753",
        "url": "https://bugzilla.suse.com/1204753"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1204780",
        "url": "https://bugzilla.suse.com/1204780"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1204810",
        "url": "https://bugzilla.suse.com/1204810"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1204850",
        "url": "https://bugzilla.suse.com/1204850"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1204868",
        "url": "https://bugzilla.suse.com/1204868"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1204926",
        "url": "https://bugzilla.suse.com/1204926"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1204933",
        "url": "https://bugzilla.suse.com/1204933"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1204934",
        "url": "https://bugzilla.suse.com/1204934"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1204947",
        "url": "https://bugzilla.suse.com/1204947"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1204957",
        "url": "https://bugzilla.suse.com/1204957"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1204963",
        "url": "https://bugzilla.suse.com/1204963"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1204970",
        "url": "https://bugzilla.suse.com/1204970"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1205007",
        "url": "https://bugzilla.suse.com/1205007"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1205100",
        "url": "https://bugzilla.suse.com/1205100"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1205111",
        "url": "https://bugzilla.suse.com/1205111"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1205113",
        "url": "https://bugzilla.suse.com/1205113"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1205128",
        "url": "https://bugzilla.suse.com/1205128"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1205130",
        "url": "https://bugzilla.suse.com/1205130"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1205149",
        "url": "https://bugzilla.suse.com/1205149"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1205153",
        "url": "https://bugzilla.suse.com/1205153"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1205220",
        "url": "https://bugzilla.suse.com/1205220"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1205257",
        "url": "https://bugzilla.suse.com/1205257"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1205264",
        "url": "https://bugzilla.suse.com/1205264"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1205282",
        "url": "https://bugzilla.suse.com/1205282"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1205313",
        "url": "https://bugzilla.suse.com/1205313"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1205331",
        "url": "https://bugzilla.suse.com/1205331"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1205332",
        "url": "https://bugzilla.suse.com/1205332"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1205427",
        "url": "https://bugzilla.suse.com/1205427"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1205428",
        "url": "https://bugzilla.suse.com/1205428"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1205473",
        "url": "https://bugzilla.suse.com/1205473"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1205496",
        "url": "https://bugzilla.suse.com/1205496"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1205507",
        "url": "https://bugzilla.suse.com/1205507"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1205514",
        "url": "https://bugzilla.suse.com/1205514"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1205521",
        "url": "https://bugzilla.suse.com/1205521"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1205567",
        "url": "https://bugzilla.suse.com/1205567"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1205616",
        "url": "https://bugzilla.suse.com/1205616"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1205617",
        "url": "https://bugzilla.suse.com/1205617"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1205653",
        "url": "https://bugzilla.suse.com/1205653"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1205671",
        "url": "https://bugzilla.suse.com/1205671"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1205679",
        "url": "https://bugzilla.suse.com/1205679"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1205683",
        "url": "https://bugzilla.suse.com/1205683"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1205700",
        "url": "https://bugzilla.suse.com/1205700"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1205705",
        "url": "https://bugzilla.suse.com/1205705"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1205709",
        "url": "https://bugzilla.suse.com/1205709"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1205711",
        "url": "https://bugzilla.suse.com/1205711"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1205744",
        "url": "https://bugzilla.suse.com/1205744"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1205764",
        "url": "https://bugzilla.suse.com/1205764"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1205796",
        "url": "https://bugzilla.suse.com/1205796"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1205882",
        "url": "https://bugzilla.suse.com/1205882"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1205993",
        "url": "https://bugzilla.suse.com/1205993"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1206035",
        "url": "https://bugzilla.suse.com/1206035"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1206036",
        "url": "https://bugzilla.suse.com/1206036"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1206037",
        "url": "https://bugzilla.suse.com/1206037"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1206045",
        "url": "https://bugzilla.suse.com/1206045"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1206046",
        "url": "https://bugzilla.suse.com/1206046"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1206047",
        "url": "https://bugzilla.suse.com/1206047"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1206048",
        "url": "https://bugzilla.suse.com/1206048"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1206049",
        "url": "https://bugzilla.suse.com/1206049"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1206050",
        "url": "https://bugzilla.suse.com/1206050"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1206051",
        "url": "https://bugzilla.suse.com/1206051"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1206056",
        "url": "https://bugzilla.suse.com/1206056"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1206057",
        "url": "https://bugzilla.suse.com/1206057"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1206113",
        "url": "https://bugzilla.suse.com/1206113"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1206114",
        "url": "https://bugzilla.suse.com/1206114"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1206147",
        "url": "https://bugzilla.suse.com/1206147"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1206149",
        "url": "https://bugzilla.suse.com/1206149"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1206207",
        "url": "https://bugzilla.suse.com/1206207"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1206273",
        "url": "https://bugzilla.suse.com/1206273"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1206391",
        "url": "https://bugzilla.suse.com/1206391"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2016-3695 page",
        "url": "https://www.suse.com/security/cve/CVE-2016-3695/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2020-16119 page",
        "url": "https://www.suse.com/security/cve/CVE-2020-16119/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2020-36516 page",
        "url": "https://www.suse.com/security/cve/CVE-2020-36516/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2021-33135 page",
        "url": "https://www.suse.com/security/cve/CVE-2021-33135/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2021-4037 page",
        "url": "https://www.suse.com/security/cve/CVE-2021-4037/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2022-1184 page",
        "url": "https://www.suse.com/security/cve/CVE-2022-1184/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2022-1263 page",
        "url": "https://www.suse.com/security/cve/CVE-2022-1263/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2022-1882 page",
        "url": "https://www.suse.com/security/cve/CVE-2022-1882/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2022-20368 page",
        "url": "https://www.suse.com/security/cve/CVE-2022-20368/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2022-20369 page",
        "url": "https://www.suse.com/security/cve/CVE-2022-20369/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2022-2153 page",
        "url": "https://www.suse.com/security/cve/CVE-2022-2153/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2022-2586 page",
        "url": "https://www.suse.com/security/cve/CVE-2022-2586/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2022-2588 page",
        "url": "https://www.suse.com/security/cve/CVE-2022-2588/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2022-2602 page",
        "url": "https://www.suse.com/security/cve/CVE-2022-2602/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2022-26373 page",
        "url": "https://www.suse.com/security/cve/CVE-2022-26373/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2022-2639 page",
        "url": "https://www.suse.com/security/cve/CVE-2022-2639/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2022-2663 page",
        "url": "https://www.suse.com/security/cve/CVE-2022-2663/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2022-28356 page",
        "url": "https://www.suse.com/security/cve/CVE-2022-28356/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2022-28693 page",
        "url": "https://www.suse.com/security/cve/CVE-2022-28693/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2022-2873 page",
        "url": "https://www.suse.com/security/cve/CVE-2022-2873/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2022-28748 page",
        "url": "https://www.suse.com/security/cve/CVE-2022-28748/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2022-2905 page",
        "url": "https://www.suse.com/security/cve/CVE-2022-2905/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2022-2938 page",
        "url": "https://www.suse.com/security/cve/CVE-2022-2938/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2022-2959 page",
        "url": "https://www.suse.com/security/cve/CVE-2022-2959/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2022-2964 page",
        "url": "https://www.suse.com/security/cve/CVE-2022-2964/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2022-2977 page",
        "url": "https://www.suse.com/security/cve/CVE-2022-2977/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2022-2978 page",
        "url": "https://www.suse.com/security/cve/CVE-2022-2978/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2022-3028 page",
        "url": "https://www.suse.com/security/cve/CVE-2022-3028/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2022-3078 page",
        "url": "https://www.suse.com/security/cve/CVE-2022-3078/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2022-3114 page",
        "url": "https://www.suse.com/security/cve/CVE-2022-3114/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2022-3169 page",
        "url": "https://www.suse.com/security/cve/CVE-2022-3169/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2022-3176 page",
        "url": "https://www.suse.com/security/cve/CVE-2022-3176/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2022-3202 page",
        "url": "https://www.suse.com/security/cve/CVE-2022-3202/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2022-32250 page",
        "url": "https://www.suse.com/security/cve/CVE-2022-32250/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2022-32296 page",
        "url": "https://www.suse.com/security/cve/CVE-2022-32296/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2022-3239 page",
        "url": "https://www.suse.com/security/cve/CVE-2022-3239/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2022-3303 page",
        "url": "https://www.suse.com/security/cve/CVE-2022-3303/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2022-33981 page",
        "url": "https://www.suse.com/security/cve/CVE-2022-33981/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2022-3424 page",
        "url": "https://www.suse.com/security/cve/CVE-2022-3424/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2022-3435 page",
        "url": "https://www.suse.com/security/cve/CVE-2022-3435/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2022-3521 page",
        "url": "https://www.suse.com/security/cve/CVE-2022-3521/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2022-3524 page",
        "url": "https://www.suse.com/security/cve/CVE-2022-3524/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2022-3526 page",
        "url": "https://www.suse.com/security/cve/CVE-2022-3526/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2022-3535 page",
        "url": "https://www.suse.com/security/cve/CVE-2022-3535/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2022-3542 page",
        "url": "https://www.suse.com/security/cve/CVE-2022-3542/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2022-3545 page",
        "url": "https://www.suse.com/security/cve/CVE-2022-3545/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2022-3565 page",
        "url": "https://www.suse.com/security/cve/CVE-2022-3565/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2022-3566 page",
        "url": "https://www.suse.com/security/cve/CVE-2022-3566/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2022-3567 page",
        "url": "https://www.suse.com/security/cve/CVE-2022-3567/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2022-3577 page",
        "url": "https://www.suse.com/security/cve/CVE-2022-3577/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2022-3586 page",
        "url": "https://www.suse.com/security/cve/CVE-2022-3586/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2022-3594 page",
        "url": "https://www.suse.com/security/cve/CVE-2022-3594/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2022-3619 page",
        "url": "https://www.suse.com/security/cve/CVE-2022-3619/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2022-3621 page",
        "url": "https://www.suse.com/security/cve/CVE-2022-3621/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2022-3625 page",
        "url": "https://www.suse.com/security/cve/CVE-2022-3625/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2022-3628 page",
        "url": "https://www.suse.com/security/cve/CVE-2022-3628/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2022-3629 page",
        "url": "https://www.suse.com/security/cve/CVE-2022-3629/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2022-3633 page",
        "url": "https://www.suse.com/security/cve/CVE-2022-3633/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2022-3635 page",
        "url": "https://www.suse.com/security/cve/CVE-2022-3635/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2022-3640 page",
        "url": "https://www.suse.com/security/cve/CVE-2022-3640/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2022-3643 page",
        "url": "https://www.suse.com/security/cve/CVE-2022-3643/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2022-3646 page",
        "url": "https://www.suse.com/security/cve/CVE-2022-3646/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2022-3649 page",
        "url": "https://www.suse.com/security/cve/CVE-2022-3649/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2022-36879 page",
        "url": "https://www.suse.com/security/cve/CVE-2022-36879/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2022-36946 page",
        "url": "https://www.suse.com/security/cve/CVE-2022-36946/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2022-3707 page",
        "url": "https://www.suse.com/security/cve/CVE-2022-3707/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2022-3903 page",
        "url": "https://www.suse.com/security/cve/CVE-2022-3903/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2022-39188 page",
        "url": "https://www.suse.com/security/cve/CVE-2022-39188/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2022-39189 page",
        "url": "https://www.suse.com/security/cve/CVE-2022-39189/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2022-39190 page",
        "url": "https://www.suse.com/security/cve/CVE-2022-39190/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2022-40476 page",
        "url": "https://www.suse.com/security/cve/CVE-2022-40476/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2022-40768 page",
        "url": "https://www.suse.com/security/cve/CVE-2022-40768/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2022-4095 page",
        "url": "https://www.suse.com/security/cve/CVE-2022-4095/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2022-41218 page",
        "url": "https://www.suse.com/security/cve/CVE-2022-41218/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2022-4129 page",
        "url": "https://www.suse.com/security/cve/CVE-2022-4129/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2022-4139 page",
        "url": "https://www.suse.com/security/cve/CVE-2022-4139/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2022-41674 page",
        "url": "https://www.suse.com/security/cve/CVE-2022-41674/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2022-41848 page",
        "url": "https://www.suse.com/security/cve/CVE-2022-41848/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2022-41849 page",
        "url": "https://www.suse.com/security/cve/CVE-2022-41849/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2022-41850 page",
        "url": "https://www.suse.com/security/cve/CVE-2022-41850/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2022-41858 page",
        "url": "https://www.suse.com/security/cve/CVE-2022-41858/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2022-42328 page",
        "url": "https://www.suse.com/security/cve/CVE-2022-42328/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2022-42329 page",
        "url": "https://www.suse.com/security/cve/CVE-2022-42329/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2022-42703 page",
        "url": "https://www.suse.com/security/cve/CVE-2022-42703/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2022-42719 page",
        "url": "https://www.suse.com/security/cve/CVE-2022-42719/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2022-42720 page",
        "url": "https://www.suse.com/security/cve/CVE-2022-42720/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2022-42721 page",
        "url": "https://www.suse.com/security/cve/CVE-2022-42721/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2022-42722 page",
        "url": "https://www.suse.com/security/cve/CVE-2022-42722/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2022-42895 page",
        "url": "https://www.suse.com/security/cve/CVE-2022-42895/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2022-42896 page",
        "url": "https://www.suse.com/security/cve/CVE-2022-42896/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2022-43750 page",
        "url": "https://www.suse.com/security/cve/CVE-2022-43750/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2022-4378 page",
        "url": "https://www.suse.com/security/cve/CVE-2022-4378/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2022-43945 page",
        "url": "https://www.suse.com/security/cve/CVE-2022-43945/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2022-45869 page",
        "url": "https://www.suse.com/security/cve/CVE-2022-45869/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2022-45888 page",
        "url": "https://www.suse.com/security/cve/CVE-2022-45888/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2022-45934 page",
        "url": "https://www.suse.com/security/cve/CVE-2022-45934/"
      }
    ],
    "title": "Security update for the Linux Kernel",
    "tracking": {
      "current_release_date": "2022-12-23T10:39:17Z",
      "generator": {
        "date": "2022-12-23T10:39:17Z",
        "engine": {
          "name": "cve-database.git:bin/generate-csaf.pl",
          "version": "1"
        }
      },
      "id": "SUSE-SU-2022:4617-1",
      "initial_release_date": "2022-12-23T10:39:17Z",
      "revision_history": [
        {
          "date": "2022-12-23T10:39:17Z",
          "number": "1",
          "summary": "Current version"
        }
      ],
      "status": "final",
      "version": "1"
    }
  },
  "product_tree": {
    "branches": [
      {
        "branches": [
          {
            "branches": [
              {
                "category": "product_version",
                "name": "kernel-devel-rt-5.14.21-150400.15.5.1.noarch",
                "product": {
                  "name": "kernel-devel-rt-5.14.21-150400.15.5.1.noarch",
                  "product_id": "kernel-devel-rt-5.14.21-150400.15.5.1.noarch"
                }
              },
              {
                "category": "product_version",
                "name": "kernel-source-rt-5.14.21-150400.15.5.1.noarch",
                "product": {
                  "name": "kernel-source-rt-5.14.21-150400.15.5.1.noarch",
                  "product_id": "kernel-source-rt-5.14.21-150400.15.5.1.noarch"
                }
              }
            ],
            "category": "architecture",
            "name": "noarch"
          },
          {
            "branches": [
              {
                "category": "product_version",
                "name": "cluster-md-kmp-rt-5.14.21-150400.15.5.1.x86_64",
                "product": {
                  "name": "cluster-md-kmp-rt-5.14.21-150400.15.5.1.x86_64",
                  "product_id": "cluster-md-kmp-rt-5.14.21-150400.15.5.1.x86_64"
                }
              },
              {
                "category": "product_version",
                "name": "dlm-kmp-rt-5.14.21-150400.15.5.1.x86_64",
                "product": {
                  "name": "dlm-kmp-rt-5.14.21-150400.15.5.1.x86_64",
                  "product_id": "dlm-kmp-rt-5.14.21-150400.15.5.1.x86_64"
                }
              },
              {
                "category": "product_version",
                "name": "gfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64",
                "product": {
                  "name": "gfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64",
                  "product_id": "gfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64"
                }
              },
              {
                "category": "product_version",
                "name": "kernel-livepatch-5_14_21-150400_15_5-rt-1-150400.1.3.1.x86_64",
                "product": {
                  "name": "kernel-livepatch-5_14_21-150400_15_5-rt-1-150400.1.3.1.x86_64",
                  "product_id": "kernel-livepatch-5_14_21-150400_15_5-rt-1-150400.1.3.1.x86_64"
                }
              },
              {
                "category": "product_version",
                "name": "kernel-rt-5.14.21-150400.15.5.1.x86_64",
                "product": {
                  "name": "kernel-rt-5.14.21-150400.15.5.1.x86_64",
                  "product_id": "kernel-rt-5.14.21-150400.15.5.1.x86_64"
                }
              },
              {
                "category": "product_version",
                "name": "kernel-rt-devel-5.14.21-150400.15.5.1.x86_64",
                "product": {
                  "name": "kernel-rt-devel-5.14.21-150400.15.5.1.x86_64",
                  "product_id": "kernel-rt-devel-5.14.21-150400.15.5.1.x86_64"
                }
              },
              {
                "category": "product_version",
                "name": "kernel-rt-extra-5.14.21-150400.15.5.1.x86_64",
                "product": {
                  "name": "kernel-rt-extra-5.14.21-150400.15.5.1.x86_64",
                  "product_id": "kernel-rt-extra-5.14.21-150400.15.5.1.x86_64"
                }
              },
              {
                "category": "product_version",
                "name": "kernel-rt-livepatch-5.14.21-150400.15.5.1.x86_64",
                "product": {
                  "name": "kernel-rt-livepatch-5.14.21-150400.15.5.1.x86_64",
                  "product_id": "kernel-rt-livepatch-5.14.21-150400.15.5.1.x86_64"
                }
              },
              {
                "category": "product_version",
                "name": "kernel-rt-livepatch-devel-5.14.21-150400.15.5.1.x86_64",
                "product": {
                  "name": "kernel-rt-livepatch-devel-5.14.21-150400.15.5.1.x86_64",
                  "product_id": "kernel-rt-livepatch-devel-5.14.21-150400.15.5.1.x86_64"
                }
              },
              {
                "category": "product_version",
                "name": "kernel-rt-optional-5.14.21-150400.15.5.1.x86_64",
                "product": {
                  "name": "kernel-rt-optional-5.14.21-150400.15.5.1.x86_64",
                  "product_id": "kernel-rt-optional-5.14.21-150400.15.5.1.x86_64"
                }
              },
              {
                "category": "product_version",
                "name": "kernel-rt_debug-5.14.21-150400.15.5.1.x86_64",
                "product": {
                  "name": "kernel-rt_debug-5.14.21-150400.15.5.1.x86_64",
                  "product_id": "kernel-rt_debug-5.14.21-150400.15.5.1.x86_64"
                }
              },
              {
                "category": "product_version",
                "name": "kernel-rt_debug-devel-5.14.21-150400.15.5.1.x86_64",
                "product": {
                  "name": "kernel-rt_debug-devel-5.14.21-150400.15.5.1.x86_64",
                  "product_id": "kernel-rt_debug-devel-5.14.21-150400.15.5.1.x86_64"
                }
              },
              {
                "category": "product_version",
                "name": "kernel-rt_debug-livepatch-devel-5.14.21-150400.15.5.1.x86_64",
                "product": {
                  "name": "kernel-rt_debug-livepatch-devel-5.14.21-150400.15.5.1.x86_64",
                  "product_id": "kernel-rt_debug-livepatch-devel-5.14.21-150400.15.5.1.x86_64"
                }
              },
              {
                "category": "product_version",
                "name": "kernel-syms-rt-5.14.21-150400.15.5.1.x86_64",
                "product": {
                  "name": "kernel-syms-rt-5.14.21-150400.15.5.1.x86_64",
                  "product_id": "kernel-syms-rt-5.14.21-150400.15.5.1.x86_64"
                }
              },
              {
                "category": "product_version",
                "name": "kselftests-kmp-rt-5.14.21-150400.15.5.1.x86_64",
                "product": {
                  "name": "kselftests-kmp-rt-5.14.21-150400.15.5.1.x86_64",
                  "product_id": "kselftests-kmp-rt-5.14.21-150400.15.5.1.x86_64"
                }
              },
              {
                "category": "product_version",
                "name": "ocfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64",
                "product": {
                  "name": "ocfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64",
                  "product_id": "ocfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64"
                }
              },
              {
                "category": "product_version",
                "name": "reiserfs-kmp-rt-5.14.21-150400.15.5.1.x86_64",
                "product": {
                  "name": "reiserfs-kmp-rt-5.14.21-150400.15.5.1.x86_64",
                  "product_id": "reiserfs-kmp-rt-5.14.21-150400.15.5.1.x86_64"
                }
              }
            ],
            "category": "architecture",
            "name": "x86_64"
          },
          {
            "branches": [
              {
                "category": "product_name",
                "name": "SUSE Linux Enterprise Live Patching 15 SP4",
                "product": {
                  "name": "SUSE Linux Enterprise Live Patching 15 SP4",
                  "product_id": "SUSE Linux Enterprise Live Patching 15 SP4",
                  "product_identification_helper": {
                    "cpe": "cpe:/o:suse:sle-module-live-patching:15:sp4"
                  }
                }
              },
              {
                "category": "product_name",
                "name": "SUSE Real Time Module 15 SP4",
                "product": {
                  "name": "SUSE Real Time Module 15 SP4",
                  "product_id": "SUSE Real Time Module 15 SP4",
                  "product_identification_helper": {
                    "cpe": "cpe:/o:suse:sle-module-rt:15:sp4"
                  }
                }
              },
              {
                "category": "product_name",
                "name": "openSUSE Leap 15.4",
                "product": {
                  "name": "openSUSE Leap 15.4",
                  "product_id": "openSUSE Leap 15.4",
                  "product_identification_helper": {
                    "cpe": "cpe:/o:opensuse:leap:15.4"
                  }
                }
              }
            ],
            "category": "product_family",
            "name": "SUSE Linux Enterprise"
          }
        ],
        "category": "vendor",
        "name": "SUSE"
      }
    ],
    "relationships": [
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-livepatch-5_14_21-150400_15_5-rt-1-150400.1.3.1.x86_64 as component of SUSE Linux Enterprise Live Patching 15 SP4",
          "product_id": "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_15_5-rt-1-150400.1.3.1.x86_64"
        },
        "product_reference": "kernel-livepatch-5_14_21-150400_15_5-rt-1-150400.1.3.1.x86_64",
        "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP4"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "cluster-md-kmp-rt-5.14.21-150400.15.5.1.x86_64 as component of SUSE Real Time Module 15 SP4",
          "product_id": "SUSE Real Time Module 15 SP4:cluster-md-kmp-rt-5.14.21-150400.15.5.1.x86_64"
        },
        "product_reference": "cluster-md-kmp-rt-5.14.21-150400.15.5.1.x86_64",
        "relates_to_product_reference": "SUSE Real Time Module 15 SP4"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "dlm-kmp-rt-5.14.21-150400.15.5.1.x86_64 as component of SUSE Real Time Module 15 SP4",
          "product_id": "SUSE Real Time Module 15 SP4:dlm-kmp-rt-5.14.21-150400.15.5.1.x86_64"
        },
        "product_reference": "dlm-kmp-rt-5.14.21-150400.15.5.1.x86_64",
        "relates_to_product_reference": "SUSE Real Time Module 15 SP4"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "gfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64 as component of SUSE Real Time Module 15 SP4",
          "product_id": "SUSE Real Time Module 15 SP4:gfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64"
        },
        "product_reference": "gfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64",
        "relates_to_product_reference": "SUSE Real Time Module 15 SP4"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-devel-rt-5.14.21-150400.15.5.1.noarch as component of SUSE Real Time Module 15 SP4",
          "product_id": "SUSE Real Time Module 15 SP4:kernel-devel-rt-5.14.21-150400.15.5.1.noarch"
        },
        "product_reference": "kernel-devel-rt-5.14.21-150400.15.5.1.noarch",
        "relates_to_product_reference": "SUSE Real Time Module 15 SP4"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-rt-5.14.21-150400.15.5.1.x86_64 as component of SUSE Real Time Module 15 SP4",
          "product_id": "SUSE Real Time Module 15 SP4:kernel-rt-5.14.21-150400.15.5.1.x86_64"
        },
        "product_reference": "kernel-rt-5.14.21-150400.15.5.1.x86_64",
        "relates_to_product_reference": "SUSE Real Time Module 15 SP4"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-rt-devel-5.14.21-150400.15.5.1.x86_64 as component of SUSE Real Time Module 15 SP4",
          "product_id": "SUSE Real Time Module 15 SP4:kernel-rt-devel-5.14.21-150400.15.5.1.x86_64"
        },
        "product_reference": "kernel-rt-devel-5.14.21-150400.15.5.1.x86_64",
        "relates_to_product_reference": "SUSE Real Time Module 15 SP4"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-rt_debug-5.14.21-150400.15.5.1.x86_64 as component of SUSE Real Time Module 15 SP4",
          "product_id": "SUSE Real Time Module 15 SP4:kernel-rt_debug-5.14.21-150400.15.5.1.x86_64"
        },
        "product_reference": "kernel-rt_debug-5.14.21-150400.15.5.1.x86_64",
        "relates_to_product_reference": "SUSE Real Time Module 15 SP4"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-rt_debug-devel-5.14.21-150400.15.5.1.x86_64 as component of SUSE Real Time Module 15 SP4",
          "product_id": "SUSE Real Time Module 15 SP4:kernel-rt_debug-devel-5.14.21-150400.15.5.1.x86_64"
        },
        "product_reference": "kernel-rt_debug-devel-5.14.21-150400.15.5.1.x86_64",
        "relates_to_product_reference": "SUSE Real Time Module 15 SP4"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-source-rt-5.14.21-150400.15.5.1.noarch as component of SUSE Real Time Module 15 SP4",
          "product_id": "SUSE Real Time Module 15 SP4:kernel-source-rt-5.14.21-150400.15.5.1.noarch"
        },
        "product_reference": "kernel-source-rt-5.14.21-150400.15.5.1.noarch",
        "relates_to_product_reference": "SUSE Real Time Module 15 SP4"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-syms-rt-5.14.21-150400.15.5.1.x86_64 as component of SUSE Real Time Module 15 SP4",
          "product_id": "SUSE Real Time Module 15 SP4:kernel-syms-rt-5.14.21-150400.15.5.1.x86_64"
        },
        "product_reference": "kernel-syms-rt-5.14.21-150400.15.5.1.x86_64",
        "relates_to_product_reference": "SUSE Real Time Module 15 SP4"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "ocfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64 as component of SUSE Real Time Module 15 SP4",
          "product_id": "SUSE Real Time Module 15 SP4:ocfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64"
        },
        "product_reference": "ocfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64",
        "relates_to_product_reference": "SUSE Real Time Module 15 SP4"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "cluster-md-kmp-rt-5.14.21-150400.15.5.1.x86_64 as component of openSUSE Leap 15.4",
          "product_id": "openSUSE Leap 15.4:cluster-md-kmp-rt-5.14.21-150400.15.5.1.x86_64"
        },
        "product_reference": "cluster-md-kmp-rt-5.14.21-150400.15.5.1.x86_64",
        "relates_to_product_reference": "openSUSE Leap 15.4"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "dlm-kmp-rt-5.14.21-150400.15.5.1.x86_64 as component of openSUSE Leap 15.4",
          "product_id": "openSUSE Leap 15.4:dlm-kmp-rt-5.14.21-150400.15.5.1.x86_64"
        },
        "product_reference": "dlm-kmp-rt-5.14.21-150400.15.5.1.x86_64",
        "relates_to_product_reference": "openSUSE Leap 15.4"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "gfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64 as component of openSUSE Leap 15.4",
          "product_id": "openSUSE Leap 15.4:gfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64"
        },
        "product_reference": "gfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64",
        "relates_to_product_reference": "openSUSE Leap 15.4"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-devel-rt-5.14.21-150400.15.5.1.noarch as component of openSUSE Leap 15.4",
          "product_id": "openSUSE Leap 15.4:kernel-devel-rt-5.14.21-150400.15.5.1.noarch"
        },
        "product_reference": "kernel-devel-rt-5.14.21-150400.15.5.1.noarch",
        "relates_to_product_reference": "openSUSE Leap 15.4"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-rt-5.14.21-150400.15.5.1.x86_64 as component of openSUSE Leap 15.4",
          "product_id": "openSUSE Leap 15.4:kernel-rt-5.14.21-150400.15.5.1.x86_64"
        },
        "product_reference": "kernel-rt-5.14.21-150400.15.5.1.x86_64",
        "relates_to_product_reference": "openSUSE Leap 15.4"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-rt-devel-5.14.21-150400.15.5.1.x86_64 as component of openSUSE Leap 15.4",
          "product_id": "openSUSE Leap 15.4:kernel-rt-devel-5.14.21-150400.15.5.1.x86_64"
        },
        "product_reference": "kernel-rt-devel-5.14.21-150400.15.5.1.x86_64",
        "relates_to_product_reference": "openSUSE Leap 15.4"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-rt_debug-5.14.21-150400.15.5.1.x86_64 as component of openSUSE Leap 15.4",
          "product_id": "openSUSE Leap 15.4:kernel-rt_debug-5.14.21-150400.15.5.1.x86_64"
        },
        "product_reference": "kernel-rt_debug-5.14.21-150400.15.5.1.x86_64",
        "relates_to_product_reference": "openSUSE Leap 15.4"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-rt_debug-devel-5.14.21-150400.15.5.1.x86_64 as component of openSUSE Leap 15.4",
          "product_id": "openSUSE Leap 15.4:kernel-rt_debug-devel-5.14.21-150400.15.5.1.x86_64"
        },
        "product_reference": "kernel-rt_debug-devel-5.14.21-150400.15.5.1.x86_64",
        "relates_to_product_reference": "openSUSE Leap 15.4"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-source-rt-5.14.21-150400.15.5.1.noarch as component of openSUSE Leap 15.4",
          "product_id": "openSUSE Leap 15.4:kernel-source-rt-5.14.21-150400.15.5.1.noarch"
        },
        "product_reference": "kernel-source-rt-5.14.21-150400.15.5.1.noarch",
        "relates_to_product_reference": "openSUSE Leap 15.4"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-syms-rt-5.14.21-150400.15.5.1.x86_64 as component of openSUSE Leap 15.4",
          "product_id": "openSUSE Leap 15.4:kernel-syms-rt-5.14.21-150400.15.5.1.x86_64"
        },
        "product_reference": "kernel-syms-rt-5.14.21-150400.15.5.1.x86_64",
        "relates_to_product_reference": "openSUSE Leap 15.4"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "ocfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64 as component of openSUSE Leap 15.4",
          "product_id": "openSUSE Leap 15.4:ocfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64"
        },
        "product_reference": "ocfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64",
        "relates_to_product_reference": "openSUSE Leap 15.4"
      }
    ]
  },
  "vulnerabilities": [
    {
      "cve": "CVE-2016-3695",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2016-3695"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "The einj_error_inject function in drivers/acpi/apei/einj.c in the Linux kernel allows local users to simulate hardware errors and consequently cause a denial of service by leveraging failure to disable APEI error injection through EINJ when securelevel is set.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_15_5-rt-1-150400.1.3.1.x86_64",
          "SUSE Real Time Module 15 SP4:cluster-md-kmp-rt-5.14.21-150400.15.5.1.x86_64",
          "SUSE Real Time Module 15 SP4:dlm-kmp-rt-5.14.21-150400.15.5.1.x86_64",
          "SUSE Real Time Module 15 SP4:gfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64",
          "SUSE Real Time Module 15 SP4:kernel-devel-rt-5.14.21-150400.15.5.1.noarch",
          "SUSE Real Time Module 15 SP4:kernel-rt-5.14.21-150400.15.5.1.x86_64",
          "SUSE Real Time Module 15 SP4:kernel-rt-devel-5.14.21-150400.15.5.1.x86_64",
          "SUSE Real Time Module 15 SP4:kernel-rt_debug-5.14.21-150400.15.5.1.x86_64",
          "SUSE Real Time Module 15 SP4:kernel-rt_debug-devel-5.14.21-150400.15.5.1.x86_64",
          "SUSE Real Time Module 15 SP4:kernel-source-rt-5.14.21-150400.15.5.1.noarch",
          "SUSE Real Time Module 15 SP4:kernel-syms-rt-5.14.21-150400.15.5.1.x86_64",
          "SUSE Real Time Module 15 SP4:ocfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64",
          "openSUSE Leap 15.4:cluster-md-kmp-rt-5.14.21-150400.15.5.1.x86_64",
          "openSUSE Leap 15.4:dlm-kmp-rt-5.14.21-150400.15.5.1.x86_64",
          "openSUSE Leap 15.4:gfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64",
          "openSUSE Leap 15.4:kernel-devel-rt-5.14.21-150400.15.5.1.noarch",
          "openSUSE Leap 15.4:kernel-rt-5.14.21-150400.15.5.1.x86_64",
          "openSUSE Leap 15.4:kernel-rt-devel-5.14.21-150400.15.5.1.x86_64",
          "openSUSE Leap 15.4:kernel-rt_debug-5.14.21-150400.15.5.1.x86_64",
          "openSUSE Leap 15.4:kernel-rt_debug-devel-5.14.21-150400.15.5.1.x86_64",
          "openSUSE Leap 15.4:kernel-source-rt-5.14.21-150400.15.5.1.noarch",
          "openSUSE Leap 15.4:kernel-syms-rt-5.14.21-150400.15.5.1.x86_64",
          "openSUSE Leap 15.4:ocfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2016-3695",
          "url": "https://www.suse.com/security/cve/CVE-2016-3695"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1023051 for CVE-2016-3695",
          "url": "https://bugzilla.suse.com/1023051"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_15_5-rt-1-150400.1.3.1.x86_64",
            "SUSE Real Time Module 15 SP4:cluster-md-kmp-rt-5.14.21-150400.15.5.1.x86_64",
            "SUSE Real Time Module 15 SP4:dlm-kmp-rt-5.14.21-150400.15.5.1.x86_64",
            "SUSE Real Time Module 15 SP4:gfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64",
            "SUSE Real Time Module 15 SP4:kernel-devel-rt-5.14.21-150400.15.5.1.noarch",
            "SUSE Real Time Module 15 SP4:kernel-rt-5.14.21-150400.15.5.1.x86_64",
            "SUSE Real Time Module 15 SP4:kernel-rt-devel-5.14.21-150400.15.5.1.x86_64",
            "SUSE Real Time Module 15 SP4:kernel-rt_debug-5.14.21-150400.15.5.1.x86_64",
            "SUSE Real Time Module 15 SP4:kernel-rt_debug-devel-5.14.21-150400.15.5.1.x86_64",
            "SUSE Real Time Module 15 SP4:kernel-source-rt-5.14.21-150400.15.5.1.noarch",
            "SUSE Real Time Module 15 SP4:kernel-syms-rt-5.14.21-150400.15.5.1.x86_64",
            "SUSE Real Time Module 15 SP4:ocfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64",
            "openSUSE Leap 15.4:cluster-md-kmp-rt-5.14.21-150400.15.5.1.x86_64",
            "openSUSE Leap 15.4:dlm-kmp-rt-5.14.21-150400.15.5.1.x86_64",
            "openSUSE Leap 15.4:gfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64",
            "openSUSE Leap 15.4:kernel-devel-rt-5.14.21-150400.15.5.1.noarch",
            "openSUSE Leap 15.4:kernel-rt-5.14.21-150400.15.5.1.x86_64",
            "openSUSE Leap 15.4:kernel-rt-devel-5.14.21-150400.15.5.1.x86_64",
            "openSUSE Leap 15.4:kernel-rt_debug-5.14.21-150400.15.5.1.x86_64",
            "openSUSE Leap 15.4:kernel-rt_debug-devel-5.14.21-150400.15.5.1.x86_64",
            "openSUSE Leap 15.4:kernel-source-rt-5.14.21-150400.15.5.1.noarch",
            "openSUSE Leap 15.4:kernel-syms-rt-5.14.21-150400.15.5.1.x86_64",
            "openSUSE Leap 15.4:ocfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 2.2,
            "baseSeverity": "LOW",
            "vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:R/S:U/C:N/I:N/A:L",
            "version": "3.1"
          },
          "products": [
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_15_5-rt-1-150400.1.3.1.x86_64",
            "SUSE Real Time Module 15 SP4:cluster-md-kmp-rt-5.14.21-150400.15.5.1.x86_64",
            "SUSE Real Time Module 15 SP4:dlm-kmp-rt-5.14.21-150400.15.5.1.x86_64",
            "SUSE Real Time Module 15 SP4:gfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64",
            "SUSE Real Time Module 15 SP4:kernel-devel-rt-5.14.21-150400.15.5.1.noarch",
            "SUSE Real Time Module 15 SP4:kernel-rt-5.14.21-150400.15.5.1.x86_64",
            "SUSE Real Time Module 15 SP4:kernel-rt-devel-5.14.21-150400.15.5.1.x86_64",
            "SUSE Real Time Module 15 SP4:kernel-rt_debug-5.14.21-150400.15.5.1.x86_64",
            "SUSE Real Time Module 15 SP4:kernel-rt_debug-devel-5.14.21-150400.15.5.1.x86_64",
            "SUSE Real Time Module 15 SP4:kernel-source-rt-5.14.21-150400.15.5.1.noarch",
            "SUSE Real Time Module 15 SP4:kernel-syms-rt-5.14.21-150400.15.5.1.x86_64",
            "SUSE Real Time Module 15 SP4:ocfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64",
            "openSUSE Leap 15.4:cluster-md-kmp-rt-5.14.21-150400.15.5.1.x86_64",
            "openSUSE Leap 15.4:dlm-kmp-rt-5.14.21-150400.15.5.1.x86_64",
            "openSUSE Leap 15.4:gfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64",
            "openSUSE Leap 15.4:kernel-devel-rt-5.14.21-150400.15.5.1.noarch",
            "openSUSE Leap 15.4:kernel-rt-5.14.21-150400.15.5.1.x86_64",
            "openSUSE Leap 15.4:kernel-rt-devel-5.14.21-150400.15.5.1.x86_64",
            "openSUSE Leap 15.4:kernel-rt_debug-5.14.21-150400.15.5.1.x86_64",
            "openSUSE Leap 15.4:kernel-rt_debug-devel-5.14.21-150400.15.5.1.x86_64",
            "openSUSE Leap 15.4:kernel-source-rt-5.14.21-150400.15.5.1.noarch",
            "openSUSE Leap 15.4:kernel-syms-rt-5.14.21-150400.15.5.1.x86_64",
            "openSUSE Leap 15.4:ocfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2022-12-23T10:39:17Z",
          "details": "low"
        }
      ],
      "title": "CVE-2016-3695"
    },
    {
      "cve": "CVE-2020-16119",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2020-16119"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "Use-after-free vulnerability in the Linux kernel exploitable by a local attacker due to reuse of a DCCP socket with an attached dccps_hc_tx_ccid object as a listener after being released. Fixed in Ubuntu Linux kernel 5.4.0-51.56, 5.3.0-68.63, 4.15.0-121.123, 4.4.0-193.224, 3.13.0.182.191 and 3.2.0-149.196.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_15_5-rt-1-150400.1.3.1.x86_64",
          "SUSE Real Time Module 15 SP4:cluster-md-kmp-rt-5.14.21-150400.15.5.1.x86_64",
          "SUSE Real Time Module 15 SP4:dlm-kmp-rt-5.14.21-150400.15.5.1.x86_64",
          "SUSE Real Time Module 15 SP4:gfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64",
          "SUSE Real Time Module 15 SP4:kernel-devel-rt-5.14.21-150400.15.5.1.noarch",
          "SUSE Real Time Module 15 SP4:kernel-rt-5.14.21-150400.15.5.1.x86_64",
          "SUSE Real Time Module 15 SP4:kernel-rt-devel-5.14.21-150400.15.5.1.x86_64",
          "SUSE Real Time Module 15 SP4:kernel-rt_debug-5.14.21-150400.15.5.1.x86_64",
          "SUSE Real Time Module 15 SP4:kernel-rt_debug-devel-5.14.21-150400.15.5.1.x86_64",
          "SUSE Real Time Module 15 SP4:kernel-source-rt-5.14.21-150400.15.5.1.noarch",
          "SUSE Real Time Module 15 SP4:kernel-syms-rt-5.14.21-150400.15.5.1.x86_64",
          "SUSE Real Time Module 15 SP4:ocfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64",
          "openSUSE Leap 15.4:cluster-md-kmp-rt-5.14.21-150400.15.5.1.x86_64",
          "openSUSE Leap 15.4:dlm-kmp-rt-5.14.21-150400.15.5.1.x86_64",
          "openSUSE Leap 15.4:gfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64",
          "openSUSE Leap 15.4:kernel-devel-rt-5.14.21-150400.15.5.1.noarch",
          "openSUSE Leap 15.4:kernel-rt-5.14.21-150400.15.5.1.x86_64",
          "openSUSE Leap 15.4:kernel-rt-devel-5.14.21-150400.15.5.1.x86_64",
          "openSUSE Leap 15.4:kernel-rt_debug-5.14.21-150400.15.5.1.x86_64",
          "openSUSE Leap 15.4:kernel-rt_debug-devel-5.14.21-150400.15.5.1.x86_64",
          "openSUSE Leap 15.4:kernel-source-rt-5.14.21-150400.15.5.1.noarch",
          "openSUSE Leap 15.4:kernel-syms-rt-5.14.21-150400.15.5.1.x86_64",
          "openSUSE Leap 15.4:ocfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2020-16119",
          "url": "https://www.suse.com/security/cve/CVE-2020-16119"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1177471 for CVE-2020-16119",
          "url": "https://bugzilla.suse.com/1177471"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1177742 for CVE-2020-16119",
          "url": "https://bugzilla.suse.com/1177742"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_15_5-rt-1-150400.1.3.1.x86_64",
            "SUSE Real Time Module 15 SP4:cluster-md-kmp-rt-5.14.21-150400.15.5.1.x86_64",
            "SUSE Real Time Module 15 SP4:dlm-kmp-rt-5.14.21-150400.15.5.1.x86_64",
            "SUSE Real Time Module 15 SP4:gfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64",
            "SUSE Real Time Module 15 SP4:kernel-devel-rt-5.14.21-150400.15.5.1.noarch",
            "SUSE Real Time Module 15 SP4:kernel-rt-5.14.21-150400.15.5.1.x86_64",
            "SUSE Real Time Module 15 SP4:kernel-rt-devel-5.14.21-150400.15.5.1.x86_64",
            "SUSE Real Time Module 15 SP4:kernel-rt_debug-5.14.21-150400.15.5.1.x86_64",
            "SUSE Real Time Module 15 SP4:kernel-rt_debug-devel-5.14.21-150400.15.5.1.x86_64",
            "SUSE Real Time Module 15 SP4:kernel-source-rt-5.14.21-150400.15.5.1.noarch",
            "SUSE Real Time Module 15 SP4:kernel-syms-rt-5.14.21-150400.15.5.1.x86_64",
            "SUSE Real Time Module 15 SP4:ocfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64",
            "openSUSE Leap 15.4:cluster-md-kmp-rt-5.14.21-150400.15.5.1.x86_64",
            "openSUSE Leap 15.4:dlm-kmp-rt-5.14.21-150400.15.5.1.x86_64",
            "openSUSE Leap 15.4:gfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64",
            "openSUSE Leap 15.4:kernel-devel-rt-5.14.21-150400.15.5.1.noarch",
            "openSUSE Leap 15.4:kernel-rt-5.14.21-150400.15.5.1.x86_64",
            "openSUSE Leap 15.4:kernel-rt-devel-5.14.21-150400.15.5.1.x86_64",
            "openSUSE Leap 15.4:kernel-rt_debug-5.14.21-150400.15.5.1.x86_64",
            "openSUSE Leap 15.4:kernel-rt_debug-devel-5.14.21-150400.15.5.1.x86_64",
            "openSUSE Leap 15.4:kernel-source-rt-5.14.21-150400.15.5.1.noarch",
            "openSUSE Leap 15.4:kernel-syms-rt-5.14.21-150400.15.5.1.x86_64",
            "openSUSE Leap 15.4:ocfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 7.8,
            "baseSeverity": "HIGH",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
            "version": "3.1"
          },
          "products": [
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_15_5-rt-1-150400.1.3.1.x86_64",
            "SUSE Real Time Module 15 SP4:cluster-md-kmp-rt-5.14.21-150400.15.5.1.x86_64",
            "SUSE Real Time Module 15 SP4:dlm-kmp-rt-5.14.21-150400.15.5.1.x86_64",
            "SUSE Real Time Module 15 SP4:gfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64",
            "SUSE Real Time Module 15 SP4:kernel-devel-rt-5.14.21-150400.15.5.1.noarch",
            "SUSE Real Time Module 15 SP4:kernel-rt-5.14.21-150400.15.5.1.x86_64",
            "SUSE Real Time Module 15 SP4:kernel-rt-devel-5.14.21-150400.15.5.1.x86_64",
            "SUSE Real Time Module 15 SP4:kernel-rt_debug-5.14.21-150400.15.5.1.x86_64",
            "SUSE Real Time Module 15 SP4:kernel-rt_debug-devel-5.14.21-150400.15.5.1.x86_64",
            "SUSE Real Time Module 15 SP4:kernel-source-rt-5.14.21-150400.15.5.1.noarch",
            "SUSE Real Time Module 15 SP4:kernel-syms-rt-5.14.21-150400.15.5.1.x86_64",
            "SUSE Real Time Module 15 SP4:ocfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64",
            "openSUSE Leap 15.4:cluster-md-kmp-rt-5.14.21-150400.15.5.1.x86_64",
            "openSUSE Leap 15.4:dlm-kmp-rt-5.14.21-150400.15.5.1.x86_64",
            "openSUSE Leap 15.4:gfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64",
            "openSUSE Leap 15.4:kernel-devel-rt-5.14.21-150400.15.5.1.noarch",
            "openSUSE Leap 15.4:kernel-rt-5.14.21-150400.15.5.1.x86_64",
            "openSUSE Leap 15.4:kernel-rt-devel-5.14.21-150400.15.5.1.x86_64",
            "openSUSE Leap 15.4:kernel-rt_debug-5.14.21-150400.15.5.1.x86_64",
            "openSUSE Leap 15.4:kernel-rt_debug-devel-5.14.21-150400.15.5.1.x86_64",
            "openSUSE Leap 15.4:kernel-source-rt-5.14.21-150400.15.5.1.noarch",
            "openSUSE Leap 15.4:kernel-syms-rt-5.14.21-150400.15.5.1.x86_64",
            "openSUSE Leap 15.4:ocfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2022-12-23T10:39:17Z",
          "details": "important"
        }
      ],
      "title": "CVE-2020-16119"
    },
    {
      "cve": "CVE-2020-36516",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2020-36516"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "An issue was discovered in the Linux kernel through 5.16.11. The mixed IPID assignment method with the hash-based IPID assignment policy allows an off-path attacker to inject data into a victim\u0027s TCP session or terminate that session.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_15_5-rt-1-150400.1.3.1.x86_64",
          "SUSE Real Time Module 15 SP4:cluster-md-kmp-rt-5.14.21-150400.15.5.1.x86_64",
          "SUSE Real Time Module 15 SP4:dlm-kmp-rt-5.14.21-150400.15.5.1.x86_64",
          "SUSE Real Time Module 15 SP4:gfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64",
          "SUSE Real Time Module 15 SP4:kernel-devel-rt-5.14.21-150400.15.5.1.noarch",
          "SUSE Real Time Module 15 SP4:kernel-rt-5.14.21-150400.15.5.1.x86_64",
          "SUSE Real Time Module 15 SP4:kernel-rt-devel-5.14.21-150400.15.5.1.x86_64",
          "SUSE Real Time Module 15 SP4:kernel-rt_debug-5.14.21-150400.15.5.1.x86_64",
          "SUSE Real Time Module 15 SP4:kernel-rt_debug-devel-5.14.21-150400.15.5.1.x86_64",
          "SUSE Real Time Module 15 SP4:kernel-source-rt-5.14.21-150400.15.5.1.noarch",
          "SUSE Real Time Module 15 SP4:kernel-syms-rt-5.14.21-150400.15.5.1.x86_64",
          "SUSE Real Time Module 15 SP4:ocfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64",
          "openSUSE Leap 15.4:cluster-md-kmp-rt-5.14.21-150400.15.5.1.x86_64",
          "openSUSE Leap 15.4:dlm-kmp-rt-5.14.21-150400.15.5.1.x86_64",
          "openSUSE Leap 15.4:gfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64",
          "openSUSE Leap 15.4:kernel-devel-rt-5.14.21-150400.15.5.1.noarch",
          "openSUSE Leap 15.4:kernel-rt-5.14.21-150400.15.5.1.x86_64",
          "openSUSE Leap 15.4:kernel-rt-devel-5.14.21-150400.15.5.1.x86_64",
          "openSUSE Leap 15.4:kernel-rt_debug-5.14.21-150400.15.5.1.x86_64",
          "openSUSE Leap 15.4:kernel-rt_debug-devel-5.14.21-150400.15.5.1.x86_64",
          "openSUSE Leap 15.4:kernel-source-rt-5.14.21-150400.15.5.1.noarch",
          "openSUSE Leap 15.4:kernel-syms-rt-5.14.21-150400.15.5.1.x86_64",
          "openSUSE Leap 15.4:ocfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2020-36516",
          "url": "https://www.suse.com/security/cve/CVE-2020-36516"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1196616 for CVE-2020-36516",
          "url": "https://bugzilla.suse.com/1196616"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1196867 for CVE-2020-36516",
          "url": "https://bugzilla.suse.com/1196867"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1204092 for CVE-2020-36516",
          "url": "https://bugzilla.suse.com/1204092"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1204183 for CVE-2020-36516",
          "url": "https://bugzilla.suse.com/1204183"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_15_5-rt-1-150400.1.3.1.x86_64",
            "SUSE Real Time Module 15 SP4:cluster-md-kmp-rt-5.14.21-150400.15.5.1.x86_64",
            "SUSE Real Time Module 15 SP4:dlm-kmp-rt-5.14.21-150400.15.5.1.x86_64",
            "SUSE Real Time Module 15 SP4:gfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64",
            "SUSE Real Time Module 15 SP4:kernel-devel-rt-5.14.21-150400.15.5.1.noarch",
            "SUSE Real Time Module 15 SP4:kernel-rt-5.14.21-150400.15.5.1.x86_64",
            "SUSE Real Time Module 15 SP4:kernel-rt-devel-5.14.21-150400.15.5.1.x86_64",
            "SUSE Real Time Module 15 SP4:kernel-rt_debug-5.14.21-150400.15.5.1.x86_64",
            "SUSE Real Time Module 15 SP4:kernel-rt_debug-devel-5.14.21-150400.15.5.1.x86_64",
            "SUSE Real Time Module 15 SP4:kernel-source-rt-5.14.21-150400.15.5.1.noarch",
            "SUSE Real Time Module 15 SP4:kernel-syms-rt-5.14.21-150400.15.5.1.x86_64",
            "SUSE Real Time Module 15 SP4:ocfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64",
            "openSUSE Leap 15.4:cluster-md-kmp-rt-5.14.21-150400.15.5.1.x86_64",
            "openSUSE Leap 15.4:dlm-kmp-rt-5.14.21-150400.15.5.1.x86_64",
            "openSUSE Leap 15.4:gfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64",
            "openSUSE Leap 15.4:kernel-devel-rt-5.14.21-150400.15.5.1.noarch",
            "openSUSE Leap 15.4:kernel-rt-5.14.21-150400.15.5.1.x86_64",
            "openSUSE Leap 15.4:kernel-rt-devel-5.14.21-150400.15.5.1.x86_64",
            "openSUSE Leap 15.4:kernel-rt_debug-5.14.21-150400.15.5.1.x86_64",
            "openSUSE Leap 15.4:kernel-rt_debug-devel-5.14.21-150400.15.5.1.x86_64",
            "openSUSE Leap 15.4:kernel-source-rt-5.14.21-150400.15.5.1.noarch",
            "openSUSE Leap 15.4:kernel-syms-rt-5.14.21-150400.15.5.1.x86_64",
            "openSUSE Leap 15.4:ocfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 8.1,
            "baseSeverity": "HIGH",
            "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:H",
            "version": "3.1"
          },
          "products": [
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_15_5-rt-1-150400.1.3.1.x86_64",
            "SUSE Real Time Module 15 SP4:cluster-md-kmp-rt-5.14.21-150400.15.5.1.x86_64",
            "SUSE Real Time Module 15 SP4:dlm-kmp-rt-5.14.21-150400.15.5.1.x86_64",
            "SUSE Real Time Module 15 SP4:gfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64",
            "SUSE Real Time Module 15 SP4:kernel-devel-rt-5.14.21-150400.15.5.1.noarch",
            "SUSE Real Time Module 15 SP4:kernel-rt-5.14.21-150400.15.5.1.x86_64",
            "SUSE Real Time Module 15 SP4:kernel-rt-devel-5.14.21-150400.15.5.1.x86_64",
            "SUSE Real Time Module 15 SP4:kernel-rt_debug-5.14.21-150400.15.5.1.x86_64",
            "SUSE Real Time Module 15 SP4:kernel-rt_debug-devel-5.14.21-150400.15.5.1.x86_64",
            "SUSE Real Time Module 15 SP4:kernel-source-rt-5.14.21-150400.15.5.1.noarch",
            "SUSE Real Time Module 15 SP4:kernel-syms-rt-5.14.21-150400.15.5.1.x86_64",
            "SUSE Real Time Module 15 SP4:ocfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64",
            "openSUSE Leap 15.4:cluster-md-kmp-rt-5.14.21-150400.15.5.1.x86_64",
            "openSUSE Leap 15.4:dlm-kmp-rt-5.14.21-150400.15.5.1.x86_64",
            "openSUSE Leap 15.4:gfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64",
            "openSUSE Leap 15.4:kernel-devel-rt-5.14.21-150400.15.5.1.noarch",
            "openSUSE Leap 15.4:kernel-rt-5.14.21-150400.15.5.1.x86_64",
            "openSUSE Leap 15.4:kernel-rt-devel-5.14.21-150400.15.5.1.x86_64",
            "openSUSE Leap 15.4:kernel-rt_debug-5.14.21-150400.15.5.1.x86_64",
            "openSUSE Leap 15.4:kernel-rt_debug-devel-5.14.21-150400.15.5.1.x86_64",
            "openSUSE Leap 15.4:kernel-source-rt-5.14.21-150400.15.5.1.noarch",
            "openSUSE Leap 15.4:kernel-syms-rt-5.14.21-150400.15.5.1.x86_64",
            "openSUSE Leap 15.4:ocfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2022-12-23T10:39:17Z",
          "details": "important"
        }
      ],
      "title": "CVE-2020-36516"
    },
    {
      "cve": "CVE-2021-33135",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2021-33135"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "Uncontrolled resource consumption in the Linux kernel drivers for Intel(R) SGX may allow an authenticated user to potentially enable denial of service via local access.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_15_5-rt-1-150400.1.3.1.x86_64",
          "SUSE Real Time Module 15 SP4:cluster-md-kmp-rt-5.14.21-150400.15.5.1.x86_64",
          "SUSE Real Time Module 15 SP4:dlm-kmp-rt-5.14.21-150400.15.5.1.x86_64",
          "SUSE Real Time Module 15 SP4:gfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64",
          "SUSE Real Time Module 15 SP4:kernel-devel-rt-5.14.21-150400.15.5.1.noarch",
          "SUSE Real Time Module 15 SP4:kernel-rt-5.14.21-150400.15.5.1.x86_64",
          "SUSE Real Time Module 15 SP4:kernel-rt-devel-5.14.21-150400.15.5.1.x86_64",
          "SUSE Real Time Module 15 SP4:kernel-rt_debug-5.14.21-150400.15.5.1.x86_64",
          "SUSE Real Time Module 15 SP4:kernel-rt_debug-devel-5.14.21-150400.15.5.1.x86_64",
          "SUSE Real Time Module 15 SP4:kernel-source-rt-5.14.21-150400.15.5.1.noarch",
          "SUSE Real Time Module 15 SP4:kernel-syms-rt-5.14.21-150400.15.5.1.x86_64",
          "SUSE Real Time Module 15 SP4:ocfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64",
          "openSUSE Leap 15.4:cluster-md-kmp-rt-5.14.21-150400.15.5.1.x86_64",
          "openSUSE Leap 15.4:dlm-kmp-rt-5.14.21-150400.15.5.1.x86_64",
          "openSUSE Leap 15.4:gfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64",
          "openSUSE Leap 15.4:kernel-devel-rt-5.14.21-150400.15.5.1.noarch",
          "openSUSE Leap 15.4:kernel-rt-5.14.21-150400.15.5.1.x86_64",
          "openSUSE Leap 15.4:kernel-rt-devel-5.14.21-150400.15.5.1.x86_64",
          "openSUSE Leap 15.4:kernel-rt_debug-5.14.21-150400.15.5.1.x86_64",
          "openSUSE Leap 15.4:kernel-rt_debug-devel-5.14.21-150400.15.5.1.x86_64",
          "openSUSE Leap 15.4:kernel-source-rt-5.14.21-150400.15.5.1.noarch",
          "openSUSE Leap 15.4:kernel-syms-rt-5.14.21-150400.15.5.1.x86_64",
          "openSUSE Leap 15.4:ocfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2021-33135",
          "url": "https://www.suse.com/security/cve/CVE-2021-33135"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1199515 for CVE-2021-33135",
          "url": "https://bugzilla.suse.com/1199515"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_15_5-rt-1-150400.1.3.1.x86_64",
            "SUSE Real Time Module 15 SP4:cluster-md-kmp-rt-5.14.21-150400.15.5.1.x86_64",
            "SUSE Real Time Module 15 SP4:dlm-kmp-rt-5.14.21-150400.15.5.1.x86_64",
            "SUSE Real Time Module 15 SP4:gfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64",
            "SUSE Real Time Module 15 SP4:kernel-devel-rt-5.14.21-150400.15.5.1.noarch",
            "SUSE Real Time Module 15 SP4:kernel-rt-5.14.21-150400.15.5.1.x86_64",
            "SUSE Real Time Module 15 SP4:kernel-rt-devel-5.14.21-150400.15.5.1.x86_64",
            "SUSE Real Time Module 15 SP4:kernel-rt_debug-5.14.21-150400.15.5.1.x86_64",
            "SUSE Real Time Module 15 SP4:kernel-rt_debug-devel-5.14.21-150400.15.5.1.x86_64",
            "SUSE Real Time Module 15 SP4:kernel-source-rt-5.14.21-150400.15.5.1.noarch",
            "SUSE Real Time Module 15 SP4:kernel-syms-rt-5.14.21-150400.15.5.1.x86_64",
            "SUSE Real Time Module 15 SP4:ocfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64",
            "openSUSE Leap 15.4:cluster-md-kmp-rt-5.14.21-150400.15.5.1.x86_64",
            "openSUSE Leap 15.4:dlm-kmp-rt-5.14.21-150400.15.5.1.x86_64",
            "openSUSE Leap 15.4:gfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64",
            "openSUSE Leap 15.4:kernel-devel-rt-5.14.21-150400.15.5.1.noarch",
            "openSUSE Leap 15.4:kernel-rt-5.14.21-150400.15.5.1.x86_64",
            "openSUSE Leap 15.4:kernel-rt-devel-5.14.21-150400.15.5.1.x86_64",
            "openSUSE Leap 15.4:kernel-rt_debug-5.14.21-150400.15.5.1.x86_64",
            "openSUSE Leap 15.4:kernel-rt_debug-devel-5.14.21-150400.15.5.1.x86_64",
            "openSUSE Leap 15.4:kernel-source-rt-5.14.21-150400.15.5.1.noarch",
            "openSUSE Leap 15.4:kernel-syms-rt-5.14.21-150400.15.5.1.x86_64",
            "openSUSE Leap 15.4:ocfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 5.5,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
            "version": "3.1"
          },
          "products": [
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_15_5-rt-1-150400.1.3.1.x86_64",
            "SUSE Real Time Module 15 SP4:cluster-md-kmp-rt-5.14.21-150400.15.5.1.x86_64",
            "SUSE Real Time Module 15 SP4:dlm-kmp-rt-5.14.21-150400.15.5.1.x86_64",
            "SUSE Real Time Module 15 SP4:gfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64",
            "SUSE Real Time Module 15 SP4:kernel-devel-rt-5.14.21-150400.15.5.1.noarch",
            "SUSE Real Time Module 15 SP4:kernel-rt-5.14.21-150400.15.5.1.x86_64",
            "SUSE Real Time Module 15 SP4:kernel-rt-devel-5.14.21-150400.15.5.1.x86_64",
            "SUSE Real Time Module 15 SP4:kernel-rt_debug-5.14.21-150400.15.5.1.x86_64",
            "SUSE Real Time Module 15 SP4:kernel-rt_debug-devel-5.14.21-150400.15.5.1.x86_64",
            "SUSE Real Time Module 15 SP4:kernel-source-rt-5.14.21-150400.15.5.1.noarch",
            "SUSE Real Time Module 15 SP4:kernel-syms-rt-5.14.21-150400.15.5.1.x86_64",
            "SUSE Real Time Module 15 SP4:ocfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64",
            "openSUSE Leap 15.4:cluster-md-kmp-rt-5.14.21-150400.15.5.1.x86_64",
            "openSUSE Leap 15.4:dlm-kmp-rt-5.14.21-150400.15.5.1.x86_64",
            "openSUSE Leap 15.4:gfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64",
            "openSUSE Leap 15.4:kernel-devel-rt-5.14.21-150400.15.5.1.noarch",
            "openSUSE Leap 15.4:kernel-rt-5.14.21-150400.15.5.1.x86_64",
            "openSUSE Leap 15.4:kernel-rt-devel-5.14.21-150400.15.5.1.x86_64",
            "openSUSE Leap 15.4:kernel-rt_debug-5.14.21-150400.15.5.1.x86_64",
            "openSUSE Leap 15.4:kernel-rt_debug-devel-5.14.21-150400.15.5.1.x86_64",
            "openSUSE Leap 15.4:kernel-source-rt-5.14.21-150400.15.5.1.noarch",
            "openSUSE Leap 15.4:kernel-syms-rt-5.14.21-150400.15.5.1.x86_64",
            "openSUSE Leap 15.4:ocfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2022-12-23T10:39:17Z",
          "details": "moderate"
        }
      ],
      "title": "CVE-2021-33135"
    },
    {
      "cve": "CVE-2021-4037",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2021-4037"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "A vulnerability was found in the fs/inode.c:inode_init_owner() function logic of the LInux kernel that allows local users to create files for the XFS file-system with an unintended group ownership and with group execution and SGID permission bits set, in a scenario where a directory is SGID and belongs to a certain group and is writable by a user who is not a member of this group. This can lead to excessive permissions granted in case when they should not. This vulnerability is similar to the previous CVE-2018-13405 and adds the missed fix for the XFS.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_15_5-rt-1-150400.1.3.1.x86_64",
          "SUSE Real Time Module 15 SP4:cluster-md-kmp-rt-5.14.21-150400.15.5.1.x86_64",
          "SUSE Real Time Module 15 SP4:dlm-kmp-rt-5.14.21-150400.15.5.1.x86_64",
          "SUSE Real Time Module 15 SP4:gfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64",
          "SUSE Real Time Module 15 SP4:kernel-devel-rt-5.14.21-150400.15.5.1.noarch",
          "SUSE Real Time Module 15 SP4:kernel-rt-5.14.21-150400.15.5.1.x86_64",
          "SUSE Real Time Module 15 SP4:kernel-rt-devel-5.14.21-150400.15.5.1.x86_64",
          "SUSE Real Time Module 15 SP4:kernel-rt_debug-5.14.21-150400.15.5.1.x86_64",
          "SUSE Real Time Module 15 SP4:kernel-rt_debug-devel-5.14.21-150400.15.5.1.x86_64",
          "SUSE Real Time Module 15 SP4:kernel-source-rt-5.14.21-150400.15.5.1.noarch",
          "SUSE Real Time Module 15 SP4:kernel-syms-rt-5.14.21-150400.15.5.1.x86_64",
          "SUSE Real Time Module 15 SP4:ocfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64",
          "openSUSE Leap 15.4:cluster-md-kmp-rt-5.14.21-150400.15.5.1.x86_64",
          "openSUSE Leap 15.4:dlm-kmp-rt-5.14.21-150400.15.5.1.x86_64",
          "openSUSE Leap 15.4:gfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64",
          "openSUSE Leap 15.4:kernel-devel-rt-5.14.21-150400.15.5.1.noarch",
          "openSUSE Leap 15.4:kernel-rt-5.14.21-150400.15.5.1.x86_64",
          "openSUSE Leap 15.4:kernel-rt-devel-5.14.21-150400.15.5.1.x86_64",
          "openSUSE Leap 15.4:kernel-rt_debug-5.14.21-150400.15.5.1.x86_64",
          "openSUSE Leap 15.4:kernel-rt_debug-devel-5.14.21-150400.15.5.1.x86_64",
          "openSUSE Leap 15.4:kernel-source-rt-5.14.21-150400.15.5.1.noarch",
          "openSUSE Leap 15.4:kernel-syms-rt-5.14.21-150400.15.5.1.x86_64",
          "openSUSE Leap 15.4:ocfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2021-4037",
          "url": "https://www.suse.com/security/cve/CVE-2021-4037"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1198702 for CVE-2021-4037",
          "url": "https://bugzilla.suse.com/1198702"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_15_5-rt-1-150400.1.3.1.x86_64",
            "SUSE Real Time Module 15 SP4:cluster-md-kmp-rt-5.14.21-150400.15.5.1.x86_64",
            "SUSE Real Time Module 15 SP4:dlm-kmp-rt-5.14.21-150400.15.5.1.x86_64",
            "SUSE Real Time Module 15 SP4:gfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64",
            "SUSE Real Time Module 15 SP4:kernel-devel-rt-5.14.21-150400.15.5.1.noarch",
            "SUSE Real Time Module 15 SP4:kernel-rt-5.14.21-150400.15.5.1.x86_64",
            "SUSE Real Time Module 15 SP4:kernel-rt-devel-5.14.21-150400.15.5.1.x86_64",
            "SUSE Real Time Module 15 SP4:kernel-rt_debug-5.14.21-150400.15.5.1.x86_64",
            "SUSE Real Time Module 15 SP4:kernel-rt_debug-devel-5.14.21-150400.15.5.1.x86_64",
            "SUSE Real Time Module 15 SP4:kernel-source-rt-5.14.21-150400.15.5.1.noarch",
            "SUSE Real Time Module 15 SP4:kernel-syms-rt-5.14.21-150400.15.5.1.x86_64",
            "SUSE Real Time Module 15 SP4:ocfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64",
            "openSUSE Leap 15.4:cluster-md-kmp-rt-5.14.21-150400.15.5.1.x86_64",
            "openSUSE Leap 15.4:dlm-kmp-rt-5.14.21-150400.15.5.1.x86_64",
            "openSUSE Leap 15.4:gfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64",
            "openSUSE Leap 15.4:kernel-devel-rt-5.14.21-150400.15.5.1.noarch",
            "openSUSE Leap 15.4:kernel-rt-5.14.21-150400.15.5.1.x86_64",
            "openSUSE Leap 15.4:kernel-rt-devel-5.14.21-150400.15.5.1.x86_64",
            "openSUSE Leap 15.4:kernel-rt_debug-5.14.21-150400.15.5.1.x86_64",
            "openSUSE Leap 15.4:kernel-rt_debug-devel-5.14.21-150400.15.5.1.x86_64",
            "openSUSE Leap 15.4:kernel-source-rt-5.14.21-150400.15.5.1.noarch",
            "openSUSE Leap 15.4:kernel-syms-rt-5.14.21-150400.15.5.1.x86_64",
            "openSUSE Leap 15.4:ocfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 4.4,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:N",
            "version": "3.1"
          },
          "products": [
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_15_5-rt-1-150400.1.3.1.x86_64",
            "SUSE Real Time Module 15 SP4:cluster-md-kmp-rt-5.14.21-150400.15.5.1.x86_64",
            "SUSE Real Time Module 15 SP4:dlm-kmp-rt-5.14.21-150400.15.5.1.x86_64",
            "SUSE Real Time Module 15 SP4:gfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64",
            "SUSE Real Time Module 15 SP4:kernel-devel-rt-5.14.21-150400.15.5.1.noarch",
            "SUSE Real Time Module 15 SP4:kernel-rt-5.14.21-150400.15.5.1.x86_64",
            "SUSE Real Time Module 15 SP4:kernel-rt-devel-5.14.21-150400.15.5.1.x86_64",
            "SUSE Real Time Module 15 SP4:kernel-rt_debug-5.14.21-150400.15.5.1.x86_64",
            "SUSE Real Time Module 15 SP4:kernel-rt_debug-devel-5.14.21-150400.15.5.1.x86_64",
            "SUSE Real Time Module 15 SP4:kernel-source-rt-5.14.21-150400.15.5.1.noarch",
            "SUSE Real Time Module 15 SP4:kernel-syms-rt-5.14.21-150400.15.5.1.x86_64",
            "SUSE Real Time Module 15 SP4:ocfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64",
            "openSUSE Leap 15.4:cluster-md-kmp-rt-5.14.21-150400.15.5.1.x86_64",
            "openSUSE Leap 15.4:dlm-kmp-rt-5.14.21-150400.15.5.1.x86_64",
            "openSUSE Leap 15.4:gfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64",
            "openSUSE Leap 15.4:kernel-devel-rt-5.14.21-150400.15.5.1.noarch",
            "openSUSE Leap 15.4:kernel-rt-5.14.21-150400.15.5.1.x86_64",
            "openSUSE Leap 15.4:kernel-rt-devel-5.14.21-150400.15.5.1.x86_64",
            "openSUSE Leap 15.4:kernel-rt_debug-5.14.21-150400.15.5.1.x86_64",
            "openSUSE Leap 15.4:kernel-rt_debug-devel-5.14.21-150400.15.5.1.x86_64",
            "openSUSE Leap 15.4:kernel-source-rt-5.14.21-150400.15.5.1.noarch",
            "openSUSE Leap 15.4:kernel-syms-rt-5.14.21-150400.15.5.1.x86_64",
            "openSUSE Leap 15.4:ocfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2022-12-23T10:39:17Z",
          "details": "moderate"
        }
      ],
      "title": "CVE-2021-4037"
    },
    {
      "cve": "CVE-2022-1184",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2022-1184"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "A use-after-free flaw was found in fs/ext4/namei.c:dx_insert_block() in the Linux kernel\u0027s filesystem sub-component. This flaw allows a local attacker with a user privilege to cause a denial of service.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_15_5-rt-1-150400.1.3.1.x86_64",
          "SUSE Real Time Module 15 SP4:cluster-md-kmp-rt-5.14.21-150400.15.5.1.x86_64",
          "SUSE Real Time Module 15 SP4:dlm-kmp-rt-5.14.21-150400.15.5.1.x86_64",
          "SUSE Real Time Module 15 SP4:gfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64",
          "SUSE Real Time Module 15 SP4:kernel-devel-rt-5.14.21-150400.15.5.1.noarch",
          "SUSE Real Time Module 15 SP4:kernel-rt-5.14.21-150400.15.5.1.x86_64",
          "SUSE Real Time Module 15 SP4:kernel-rt-devel-5.14.21-150400.15.5.1.x86_64",
          "SUSE Real Time Module 15 SP4:kernel-rt_debug-5.14.21-150400.15.5.1.x86_64",
          "SUSE Real Time Module 15 SP4:kernel-rt_debug-devel-5.14.21-150400.15.5.1.x86_64",
          "SUSE Real Time Module 15 SP4:kernel-source-rt-5.14.21-150400.15.5.1.noarch",
          "SUSE Real Time Module 15 SP4:kernel-syms-rt-5.14.21-150400.15.5.1.x86_64",
          "SUSE Real Time Module 15 SP4:ocfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64",
          "openSUSE Leap 15.4:cluster-md-kmp-rt-5.14.21-150400.15.5.1.x86_64",
          "openSUSE Leap 15.4:dlm-kmp-rt-5.14.21-150400.15.5.1.x86_64",
          "openSUSE Leap 15.4:gfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64",
          "openSUSE Leap 15.4:kernel-devel-rt-5.14.21-150400.15.5.1.noarch",
          "openSUSE Leap 15.4:kernel-rt-5.14.21-150400.15.5.1.x86_64",
          "openSUSE Leap 15.4:kernel-rt-devel-5.14.21-150400.15.5.1.x86_64",
          "openSUSE Leap 15.4:kernel-rt_debug-5.14.21-150400.15.5.1.x86_64",
          "openSUSE Leap 15.4:kernel-rt_debug-devel-5.14.21-150400.15.5.1.x86_64",
          "openSUSE Leap 15.4:kernel-source-rt-5.14.21-150400.15.5.1.noarch",
          "openSUSE Leap 15.4:kernel-syms-rt-5.14.21-150400.15.5.1.x86_64",
          "openSUSE Leap 15.4:ocfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2022-1184",
          "url": "https://www.suse.com/security/cve/CVE-2022-1184"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1198577 for CVE-2022-1184",
          "url": "https://bugzilla.suse.com/1198577"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1210859 for CVE-2022-1184",
          "url": "https://bugzilla.suse.com/1210859"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_15_5-rt-1-150400.1.3.1.x86_64",
            "SUSE Real Time Module 15 SP4:cluster-md-kmp-rt-5.14.21-150400.15.5.1.x86_64",
            "SUSE Real Time Module 15 SP4:dlm-kmp-rt-5.14.21-150400.15.5.1.x86_64",
            "SUSE Real Time Module 15 SP4:gfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64",
            "SUSE Real Time Module 15 SP4:kernel-devel-rt-5.14.21-150400.15.5.1.noarch",
            "SUSE Real Time Module 15 SP4:kernel-rt-5.14.21-150400.15.5.1.x86_64",
            "SUSE Real Time Module 15 SP4:kernel-rt-devel-5.14.21-150400.15.5.1.x86_64",
            "SUSE Real Time Module 15 SP4:kernel-rt_debug-5.14.21-150400.15.5.1.x86_64",
            "SUSE Real Time Module 15 SP4:kernel-rt_debug-devel-5.14.21-150400.15.5.1.x86_64",
            "SUSE Real Time Module 15 SP4:kernel-source-rt-5.14.21-150400.15.5.1.noarch",
            "SUSE Real Time Module 15 SP4:kernel-syms-rt-5.14.21-150400.15.5.1.x86_64",
            "SUSE Real Time Module 15 SP4:ocfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64",
            "openSUSE Leap 15.4:cluster-md-kmp-rt-5.14.21-150400.15.5.1.x86_64",
            "openSUSE Leap 15.4:dlm-kmp-rt-5.14.21-150400.15.5.1.x86_64",
            "openSUSE Leap 15.4:gfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64",
            "openSUSE Leap 15.4:kernel-devel-rt-5.14.21-150400.15.5.1.noarch",
            "openSUSE Leap 15.4:kernel-rt-5.14.21-150400.15.5.1.x86_64",
            "openSUSE Leap 15.4:kernel-rt-devel-5.14.21-150400.15.5.1.x86_64",
            "openSUSE Leap 15.4:kernel-rt_debug-5.14.21-150400.15.5.1.x86_64",
            "openSUSE Leap 15.4:kernel-rt_debug-devel-5.14.21-150400.15.5.1.x86_64",
            "openSUSE Leap 15.4:kernel-source-rt-5.14.21-150400.15.5.1.noarch",
            "openSUSE Leap 15.4:kernel-syms-rt-5.14.21-150400.15.5.1.x86_64",
            "openSUSE Leap 15.4:ocfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 5.5,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
            "version": "3.1"
          },
          "products": [
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_15_5-rt-1-150400.1.3.1.x86_64",
            "SUSE Real Time Module 15 SP4:cluster-md-kmp-rt-5.14.21-150400.15.5.1.x86_64",
            "SUSE Real Time Module 15 SP4:dlm-kmp-rt-5.14.21-150400.15.5.1.x86_64",
            "SUSE Real Time Module 15 SP4:gfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64",
            "SUSE Real Time Module 15 SP4:kernel-devel-rt-5.14.21-150400.15.5.1.noarch",
            "SUSE Real Time Module 15 SP4:kernel-rt-5.14.21-150400.15.5.1.x86_64",
            "SUSE Real Time Module 15 SP4:kernel-rt-devel-5.14.21-150400.15.5.1.x86_64",
            "SUSE Real Time Module 15 SP4:kernel-rt_debug-5.14.21-150400.15.5.1.x86_64",
            "SUSE Real Time Module 15 SP4:kernel-rt_debug-devel-5.14.21-150400.15.5.1.x86_64",
            "SUSE Real Time Module 15 SP4:kernel-source-rt-5.14.21-150400.15.5.1.noarch",
            "SUSE Real Time Module 15 SP4:kernel-syms-rt-5.14.21-150400.15.5.1.x86_64",
            "SUSE Real Time Module 15 SP4:ocfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64",
            "openSUSE Leap 15.4:cluster-md-kmp-rt-5.14.21-150400.15.5.1.x86_64",
            "openSUSE Leap 15.4:dlm-kmp-rt-5.14.21-150400.15.5.1.x86_64",
            "openSUSE Leap 15.4:gfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64",
            "openSUSE Leap 15.4:kernel-devel-rt-5.14.21-150400.15.5.1.noarch",
            "openSUSE Leap 15.4:kernel-rt-5.14.21-150400.15.5.1.x86_64",
            "openSUSE Leap 15.4:kernel-rt-devel-5.14.21-150400.15.5.1.x86_64",
            "openSUSE Leap 15.4:kernel-rt_debug-5.14.21-150400.15.5.1.x86_64",
            "openSUSE Leap 15.4:kernel-rt_debug-devel-5.14.21-150400.15.5.1.x86_64",
            "openSUSE Leap 15.4:kernel-source-rt-5.14.21-150400.15.5.1.noarch",
            "openSUSE Leap 15.4:kernel-syms-rt-5.14.21-150400.15.5.1.x86_64",
            "openSUSE Leap 15.4:ocfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2022-12-23T10:39:17Z",
          "details": "moderate"
        }
      ],
      "title": "CVE-2022-1184"
    },
    {
      "cve": "CVE-2022-1263",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2022-1263"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "A NULL pointer dereference issue was found in KVM when releasing a vCPU with dirty ring support enabled. This flaw allows an unprivileged local attacker on the host to issue specific ioctl calls, causing a kernel oops condition that results in a denial of service.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_15_5-rt-1-150400.1.3.1.x86_64",
          "SUSE Real Time Module 15 SP4:cluster-md-kmp-rt-5.14.21-150400.15.5.1.x86_64",
          "SUSE Real Time Module 15 SP4:dlm-kmp-rt-5.14.21-150400.15.5.1.x86_64",
          "SUSE Real Time Module 15 SP4:gfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64",
          "SUSE Real Time Module 15 SP4:kernel-devel-rt-5.14.21-150400.15.5.1.noarch",
          "SUSE Real Time Module 15 SP4:kernel-rt-5.14.21-150400.15.5.1.x86_64",
          "SUSE Real Time Module 15 SP4:kernel-rt-devel-5.14.21-150400.15.5.1.x86_64",
          "SUSE Real Time Module 15 SP4:kernel-rt_debug-5.14.21-150400.15.5.1.x86_64",
          "SUSE Real Time Module 15 SP4:kernel-rt_debug-devel-5.14.21-150400.15.5.1.x86_64",
          "SUSE Real Time Module 15 SP4:kernel-source-rt-5.14.21-150400.15.5.1.noarch",
          "SUSE Real Time Module 15 SP4:kernel-syms-rt-5.14.21-150400.15.5.1.x86_64",
          "SUSE Real Time Module 15 SP4:ocfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64",
          "openSUSE Leap 15.4:cluster-md-kmp-rt-5.14.21-150400.15.5.1.x86_64",
          "openSUSE Leap 15.4:dlm-kmp-rt-5.14.21-150400.15.5.1.x86_64",
          "openSUSE Leap 15.4:gfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64",
          "openSUSE Leap 15.4:kernel-devel-rt-5.14.21-150400.15.5.1.noarch",
          "openSUSE Leap 15.4:kernel-rt-5.14.21-150400.15.5.1.x86_64",
          "openSUSE Leap 15.4:kernel-rt-devel-5.14.21-150400.15.5.1.x86_64",
          "openSUSE Leap 15.4:kernel-rt_debug-5.14.21-150400.15.5.1.x86_64",
          "openSUSE Leap 15.4:kernel-rt_debug-devel-5.14.21-150400.15.5.1.x86_64",
          "openSUSE Leap 15.4:kernel-source-rt-5.14.21-150400.15.5.1.noarch",
          "openSUSE Leap 15.4:kernel-syms-rt-5.14.21-150400.15.5.1.x86_64",
          "openSUSE Leap 15.4:ocfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2022-1263",
          "url": "https://www.suse.com/security/cve/CVE-2022-1263"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1198189 for CVE-2022-1263",
          "url": "https://bugzilla.suse.com/1198189"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_15_5-rt-1-150400.1.3.1.x86_64",
            "SUSE Real Time Module 15 SP4:cluster-md-kmp-rt-5.14.21-150400.15.5.1.x86_64",
            "SUSE Real Time Module 15 SP4:dlm-kmp-rt-5.14.21-150400.15.5.1.x86_64",
            "SUSE Real Time Module 15 SP4:gfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64",
            "SUSE Real Time Module 15 SP4:kernel-devel-rt-5.14.21-150400.15.5.1.noarch",
            "SUSE Real Time Module 15 SP4:kernel-rt-5.14.21-150400.15.5.1.x86_64",
            "SUSE Real Time Module 15 SP4:kernel-rt-devel-5.14.21-150400.15.5.1.x86_64",
            "SUSE Real Time Module 15 SP4:kernel-rt_debug-5.14.21-150400.15.5.1.x86_64",
            "SUSE Real Time Module 15 SP4:kernel-rt_debug-devel-5.14.21-150400.15.5.1.x86_64",
            "SUSE Real Time Module 15 SP4:kernel-source-rt-5.14.21-150400.15.5.1.noarch",
            "SUSE Real Time Module 15 SP4:kernel-syms-rt-5.14.21-150400.15.5.1.x86_64",
            "SUSE Real Time Module 15 SP4:ocfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64",
            "openSUSE Leap 15.4:cluster-md-kmp-rt-5.14.21-150400.15.5.1.x86_64",
            "openSUSE Leap 15.4:dlm-kmp-rt-5.14.21-150400.15.5.1.x86_64",
            "openSUSE Leap 15.4:gfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64",
            "openSUSE Leap 15.4:kernel-devel-rt-5.14.21-150400.15.5.1.noarch",
            "openSUSE Leap 15.4:kernel-rt-5.14.21-150400.15.5.1.x86_64",
            "openSUSE Leap 15.4:kernel-rt-devel-5.14.21-150400.15.5.1.x86_64",
            "openSUSE Leap 15.4:kernel-rt_debug-5.14.21-150400.15.5.1.x86_64",
            "openSUSE Leap 15.4:kernel-rt_debug-devel-5.14.21-150400.15.5.1.x86_64",
            "openSUSE Leap 15.4:kernel-source-rt-5.14.21-150400.15.5.1.noarch",
            "openSUSE Leap 15.4:kernel-syms-rt-5.14.21-150400.15.5.1.x86_64",
            "openSUSE Leap 15.4:ocfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 4.7,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H",
            "version": "3.1"
          },
          "products": [
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_15_5-rt-1-150400.1.3.1.x86_64",
            "SUSE Real Time Module 15 SP4:cluster-md-kmp-rt-5.14.21-150400.15.5.1.x86_64",
            "SUSE Real Time Module 15 SP4:dlm-kmp-rt-5.14.21-150400.15.5.1.x86_64",
            "SUSE Real Time Module 15 SP4:gfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64",
            "SUSE Real Time Module 15 SP4:kernel-devel-rt-5.14.21-150400.15.5.1.noarch",
            "SUSE Real Time Module 15 SP4:kernel-rt-5.14.21-150400.15.5.1.x86_64",
            "SUSE Real Time Module 15 SP4:kernel-rt-devel-5.14.21-150400.15.5.1.x86_64",
            "SUSE Real Time Module 15 SP4:kernel-rt_debug-5.14.21-150400.15.5.1.x86_64",
            "SUSE Real Time Module 15 SP4:kernel-rt_debug-devel-5.14.21-150400.15.5.1.x86_64",
            "SUSE Real Time Module 15 SP4:kernel-source-rt-5.14.21-150400.15.5.1.noarch",
            "SUSE Real Time Module 15 SP4:kernel-syms-rt-5.14.21-150400.15.5.1.x86_64",
            "SUSE Real Time Module 15 SP4:ocfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64",
            "openSUSE Leap 15.4:cluster-md-kmp-rt-5.14.21-150400.15.5.1.x86_64",
            "openSUSE Leap 15.4:dlm-kmp-rt-5.14.21-150400.15.5.1.x86_64",
            "openSUSE Leap 15.4:gfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64",
            "openSUSE Leap 15.4:kernel-devel-rt-5.14.21-150400.15.5.1.noarch",
            "openSUSE Leap 15.4:kernel-rt-5.14.21-150400.15.5.1.x86_64",
            "openSUSE Leap 15.4:kernel-rt-devel-5.14.21-150400.15.5.1.x86_64",
            "openSUSE Leap 15.4:kernel-rt_debug-5.14.21-150400.15.5.1.x86_64",
            "openSUSE Leap 15.4:kernel-rt_debug-devel-5.14.21-150400.15.5.1.x86_64",
            "openSUSE Leap 15.4:kernel-source-rt-5.14.21-150400.15.5.1.noarch",
            "openSUSE Leap 15.4:kernel-syms-rt-5.14.21-150400.15.5.1.x86_64",
            "openSUSE Leap 15.4:ocfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2022-12-23T10:39:17Z",
          "details": "moderate"
        }
      ],
      "title": "CVE-2022-1263"
    },
    {
      "cve": "CVE-2022-1882",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2022-1882"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "A use-after-free flaw was found in the Linux kernel\u0027s pipes functionality in how a user performs manipulations with the pipe post_one_notification() after free_pipe_info() that is already called. This flaw allows a local user to crash or potentially escalate their privileges on the system.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_15_5-rt-1-150400.1.3.1.x86_64",
          "SUSE Real Time Module 15 SP4:cluster-md-kmp-rt-5.14.21-150400.15.5.1.x86_64",
          "SUSE Real Time Module 15 SP4:dlm-kmp-rt-5.14.21-150400.15.5.1.x86_64",
          "SUSE Real Time Module 15 SP4:gfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64",
          "SUSE Real Time Module 15 SP4:kernel-devel-rt-5.14.21-150400.15.5.1.noarch",
          "SUSE Real Time Module 15 SP4:kernel-rt-5.14.21-150400.15.5.1.x86_64",
          "SUSE Real Time Module 15 SP4:kernel-rt-devel-5.14.21-150400.15.5.1.x86_64",
          "SUSE Real Time Module 15 SP4:kernel-rt_debug-5.14.21-150400.15.5.1.x86_64",
          "SUSE Real Time Module 15 SP4:kernel-rt_debug-devel-5.14.21-150400.15.5.1.x86_64",
          "SUSE Real Time Module 15 SP4:kernel-source-rt-5.14.21-150400.15.5.1.noarch",
          "SUSE Real Time Module 15 SP4:kernel-syms-rt-5.14.21-150400.15.5.1.x86_64",
          "SUSE Real Time Module 15 SP4:ocfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64",
          "openSUSE Leap 15.4:cluster-md-kmp-rt-5.14.21-150400.15.5.1.x86_64",
          "openSUSE Leap 15.4:dlm-kmp-rt-5.14.21-150400.15.5.1.x86_64",
          "openSUSE Leap 15.4:gfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64",
          "openSUSE Leap 15.4:kernel-devel-rt-5.14.21-150400.15.5.1.noarch",
          "openSUSE Leap 15.4:kernel-rt-5.14.21-150400.15.5.1.x86_64",
          "openSUSE Leap 15.4:kernel-rt-devel-5.14.21-150400.15.5.1.x86_64",
          "openSUSE Leap 15.4:kernel-rt_debug-5.14.21-150400.15.5.1.x86_64",
          "openSUSE Leap 15.4:kernel-rt_debug-devel-5.14.21-150400.15.5.1.x86_64",
          "openSUSE Leap 15.4:kernel-source-rt-5.14.21-150400.15.5.1.noarch",
          "openSUSE Leap 15.4:kernel-syms-rt-5.14.21-150400.15.5.1.x86_64",
          "openSUSE Leap 15.4:ocfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2022-1882",
          "url": "https://www.suse.com/security/cve/CVE-2022-1882"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1199904 for CVE-2022-1882",
          "url": "https://bugzilla.suse.com/1199904"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1200058 for CVE-2022-1882",
          "url": "https://bugzilla.suse.com/1200058"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_15_5-rt-1-150400.1.3.1.x86_64",
            "SUSE Real Time Module 15 SP4:cluster-md-kmp-rt-5.14.21-150400.15.5.1.x86_64",
            "SUSE Real Time Module 15 SP4:dlm-kmp-rt-5.14.21-150400.15.5.1.x86_64",
            "SUSE Real Time Module 15 SP4:gfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64",
            "SUSE Real Time Module 15 SP4:kernel-devel-rt-5.14.21-150400.15.5.1.noarch",
            "SUSE Real Time Module 15 SP4:kernel-rt-5.14.21-150400.15.5.1.x86_64",
            "SUSE Real Time Module 15 SP4:kernel-rt-devel-5.14.21-150400.15.5.1.x86_64",
            "SUSE Real Time Module 15 SP4:kernel-rt_debug-5.14.21-150400.15.5.1.x86_64",
            "SUSE Real Time Module 15 SP4:kernel-rt_debug-devel-5.14.21-150400.15.5.1.x86_64",
            "SUSE Real Time Module 15 SP4:kernel-source-rt-5.14.21-150400.15.5.1.noarch",
            "SUSE Real Time Module 15 SP4:kernel-syms-rt-5.14.21-150400.15.5.1.x86_64",
            "SUSE Real Time Module 15 SP4:ocfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64",
            "openSUSE Leap 15.4:cluster-md-kmp-rt-5.14.21-150400.15.5.1.x86_64",
            "openSUSE Leap 15.4:dlm-kmp-rt-5.14.21-150400.15.5.1.x86_64",
            "openSUSE Leap 15.4:gfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64",
            "openSUSE Leap 15.4:kernel-devel-rt-5.14.21-150400.15.5.1.noarch",
            "openSUSE Leap 15.4:kernel-rt-5.14.21-150400.15.5.1.x86_64",
            "openSUSE Leap 15.4:kernel-rt-devel-5.14.21-150400.15.5.1.x86_64",
            "openSUSE Leap 15.4:kernel-rt_debug-5.14.21-150400.15.5.1.x86_64",
            "openSUSE Leap 15.4:kernel-rt_debug-devel-5.14.21-150400.15.5.1.x86_64",
            "openSUSE Leap 15.4:kernel-source-rt-5.14.21-150400.15.5.1.noarch",
            "openSUSE Leap 15.4:kernel-syms-rt-5.14.21-150400.15.5.1.x86_64",
            "openSUSE Leap 15.4:ocfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 8.4,
            "baseSeverity": "HIGH",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
            "version": "3.1"
          },
          "products": [
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_15_5-rt-1-150400.1.3.1.x86_64",
            "SUSE Real Time Module 15 SP4:cluster-md-kmp-rt-5.14.21-150400.15.5.1.x86_64",
            "SUSE Real Time Module 15 SP4:dlm-kmp-rt-5.14.21-150400.15.5.1.x86_64",
            "SUSE Real Time Module 15 SP4:gfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64",
            "SUSE Real Time Module 15 SP4:kernel-devel-rt-5.14.21-150400.15.5.1.noarch",
            "SUSE Real Time Module 15 SP4:kernel-rt-5.14.21-150400.15.5.1.x86_64",
            "SUSE Real Time Module 15 SP4:kernel-rt-devel-5.14.21-150400.15.5.1.x86_64",
            "SUSE Real Time Module 15 SP4:kernel-rt_debug-5.14.21-150400.15.5.1.x86_64",
            "SUSE Real Time Module 15 SP4:kernel-rt_debug-devel-5.14.21-150400.15.5.1.x86_64",
            "SUSE Real Time Module 15 SP4:kernel-source-rt-5.14.21-150400.15.5.1.noarch",
            "SUSE Real Time Module 15 SP4:kernel-syms-rt-5.14.21-150400.15.5.1.x86_64",
            "SUSE Real Time Module 15 SP4:ocfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64",
            "openSUSE Leap 15.4:cluster-md-kmp-rt-5.14.21-150400.15.5.1.x86_64",
            "openSUSE Leap 15.4:dlm-kmp-rt-5.14.21-150400.15.5.1.x86_64",
            "openSUSE Leap 15.4:gfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64",
            "openSUSE Leap 15.4:kernel-devel-rt-5.14.21-150400.15.5.1.noarch",
            "openSUSE Leap 15.4:kernel-rt-5.14.21-150400.15.5.1.x86_64",
            "openSUSE Leap 15.4:kernel-rt-devel-5.14.21-150400.15.5.1.x86_64",
            "openSUSE Leap 15.4:kernel-rt_debug-5.14.21-150400.15.5.1.x86_64",
            "openSUSE Leap 15.4:kernel-rt_debug-devel-5.14.21-150400.15.5.1.x86_64",
            "openSUSE Leap 15.4:kernel-source-rt-5.14.21-150400.15.5.1.noarch",
            "openSUSE Leap 15.4:kernel-syms-rt-5.14.21-150400.15.5.1.x86_64",
            "openSUSE Leap 15.4:ocfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2022-12-23T10:39:17Z",
          "details": "important"
        }
      ],
      "title": "CVE-2022-1882"
    },
    {
      "cve": "CVE-2022-20368",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2022-20368"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "Product: AndroidVersions: Android kernelAndroid ID: A-224546354References: Upstream kernel",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_15_5-rt-1-150400.1.3.1.x86_64",
          "SUSE Real Time Module 15 SP4:cluster-md-kmp-rt-5.14.21-150400.15.5.1.x86_64",
          "SUSE Real Time Module 15 SP4:dlm-kmp-rt-5.14.21-150400.15.5.1.x86_64",
          "SUSE Real Time Module 15 SP4:gfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64",
          "SUSE Real Time Module 15 SP4:kernel-devel-rt-5.14.21-150400.15.5.1.noarch",
          "SUSE Real Time Module 15 SP4:kernel-rt-5.14.21-150400.15.5.1.x86_64",
          "SUSE Real Time Module 15 SP4:kernel-rt-devel-5.14.21-150400.15.5.1.x86_64",
          "SUSE Real Time Module 15 SP4:kernel-rt_debug-5.14.21-150400.15.5.1.x86_64",
          "SUSE Real Time Module 15 SP4:kernel-rt_debug-devel-5.14.21-150400.15.5.1.x86_64",
          "SUSE Real Time Module 15 SP4:kernel-source-rt-5.14.21-150400.15.5.1.noarch",
          "SUSE Real Time Module 15 SP4:kernel-syms-rt-5.14.21-150400.15.5.1.x86_64",
          "SUSE Real Time Module 15 SP4:ocfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64",
          "openSUSE Leap 15.4:cluster-md-kmp-rt-5.14.21-150400.15.5.1.x86_64",
          "openSUSE Leap 15.4:dlm-kmp-rt-5.14.21-150400.15.5.1.x86_64",
          "openSUSE Leap 15.4:gfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64",
          "openSUSE Leap 15.4:kernel-devel-rt-5.14.21-150400.15.5.1.noarch",
          "openSUSE Leap 15.4:kernel-rt-5.14.21-150400.15.5.1.x86_64",
          "openSUSE Leap 15.4:kernel-rt-devel-5.14.21-150400.15.5.1.x86_64",
          "openSUSE Leap 15.4:kernel-rt_debug-5.14.21-150400.15.5.1.x86_64",
          "openSUSE Leap 15.4:kernel-rt_debug-devel-5.14.21-150400.15.5.1.x86_64",
          "openSUSE Leap 15.4:kernel-source-rt-5.14.21-150400.15.5.1.noarch",
          "openSUSE Leap 15.4:kernel-syms-rt-5.14.21-150400.15.5.1.x86_64",
          "openSUSE Leap 15.4:ocfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2022-20368",
          "url": "https://www.suse.com/security/cve/CVE-2022-20368"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1202346 for CVE-2022-20368",
          "url": "https://bugzilla.suse.com/1202346"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1212311 for CVE-2022-20368",
          "url": "https://bugzilla.suse.com/1212311"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_15_5-rt-1-150400.1.3.1.x86_64",
            "SUSE Real Time Module 15 SP4:cluster-md-kmp-rt-5.14.21-150400.15.5.1.x86_64",
            "SUSE Real Time Module 15 SP4:dlm-kmp-rt-5.14.21-150400.15.5.1.x86_64",
            "SUSE Real Time Module 15 SP4:gfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64",
            "SUSE Real Time Module 15 SP4:kernel-devel-rt-5.14.21-150400.15.5.1.noarch",
            "SUSE Real Time Module 15 SP4:kernel-rt-5.14.21-150400.15.5.1.x86_64",
            "SUSE Real Time Module 15 SP4:kernel-rt-devel-5.14.21-150400.15.5.1.x86_64",
            "SUSE Real Time Module 15 SP4:kernel-rt_debug-5.14.21-150400.15.5.1.x86_64",
            "SUSE Real Time Module 15 SP4:kernel-rt_debug-devel-5.14.21-150400.15.5.1.x86_64",
            "SUSE Real Time Module 15 SP4:kernel-source-rt-5.14.21-150400.15.5.1.noarch",
            "SUSE Real Time Module 15 SP4:kernel-syms-rt-5.14.21-150400.15.5.1.x86_64",
            "SUSE Real Time Module 15 SP4:ocfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64",
            "openSUSE Leap 15.4:cluster-md-kmp-rt-5.14.21-150400.15.5.1.x86_64",
            "openSUSE Leap 15.4:dlm-kmp-rt-5.14.21-150400.15.5.1.x86_64",
            "openSUSE Leap 15.4:gfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64",
            "openSUSE Leap 15.4:kernel-devel-rt-5.14.21-150400.15.5.1.noarch",
            "openSUSE Leap 15.4:kernel-rt-5.14.21-150400.15.5.1.x86_64",
            "openSUSE Leap 15.4:kernel-rt-devel-5.14.21-150400.15.5.1.x86_64",
            "openSUSE Leap 15.4:kernel-rt_debug-5.14.21-150400.15.5.1.x86_64",
            "openSUSE Leap 15.4:kernel-rt_debug-devel-5.14.21-150400.15.5.1.x86_64",
            "openSUSE Leap 15.4:kernel-source-rt-5.14.21-150400.15.5.1.noarch",
            "openSUSE Leap 15.4:kernel-syms-rt-5.14.21-150400.15.5.1.x86_64",
            "openSUSE Leap 15.4:ocfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 5.5,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
            "version": "3.1"
          },
          "products": [
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_15_5-rt-1-150400.1.3.1.x86_64",
            "SUSE Real Time Module 15 SP4:cluster-md-kmp-rt-5.14.21-150400.15.5.1.x86_64",
            "SUSE Real Time Module 15 SP4:dlm-kmp-rt-5.14.21-150400.15.5.1.x86_64",
            "SUSE Real Time Module 15 SP4:gfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64",
            "SUSE Real Time Module 15 SP4:kernel-devel-rt-5.14.21-150400.15.5.1.noarch",
            "SUSE Real Time Module 15 SP4:kernel-rt-5.14.21-150400.15.5.1.x86_64",
            "SUSE Real Time Module 15 SP4:kernel-rt-devel-5.14.21-150400.15.5.1.x86_64",
            "SUSE Real Time Module 15 SP4:kernel-rt_debug-5.14.21-150400.15.5.1.x86_64",
            "SUSE Real Time Module 15 SP4:kernel-rt_debug-devel-5.14.21-150400.15.5.1.x86_64",
            "SUSE Real Time Module 15 SP4:kernel-source-rt-5.14.21-150400.15.5.1.noarch",
            "SUSE Real Time Module 15 SP4:kernel-syms-rt-5.14.21-150400.15.5.1.x86_64",
            "SUSE Real Time Module 15 SP4:ocfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64",
            "openSUSE Leap 15.4:cluster-md-kmp-rt-5.14.21-150400.15.5.1.x86_64",
            "openSUSE Leap 15.4:dlm-kmp-rt-5.14.21-150400.15.5.1.x86_64",
            "openSUSE Leap 15.4:gfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64",
            "openSUSE Leap 15.4:kernel-devel-rt-5.14.21-150400.15.5.1.noarch",
            "openSUSE Leap 15.4:kernel-rt-5.14.21-150400.15.5.1.x86_64",
            "openSUSE Leap 15.4:kernel-rt-devel-5.14.21-150400.15.5.1.x86_64",
            "openSUSE Leap 15.4:kernel-rt_debug-5.14.21-150400.15.5.1.x86_64",
            "openSUSE Leap 15.4:kernel-rt_debug-devel-5.14.21-150400.15.5.1.x86_64",
            "openSUSE Leap 15.4:kernel-source-rt-5.14.21-150400.15.5.1.noarch",
            "openSUSE Leap 15.4:kernel-syms-rt-5.14.21-150400.15.5.1.x86_64",
            "openSUSE Leap 15.4:ocfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2022-12-23T10:39:17Z",
          "details": "moderate"
        }
      ],
      "title": "CVE-2022-20368"
    },
    {
      "cve": "CVE-2022-20369",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2022-20369"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "In v4l2_m2m_querybuf of v4l2-mem2mem.c, there is a possible out of bounds write due to improper input validation. This could lead to local escalation of privilege with System execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android kernelAndroid ID: A-223375145References: Upstream kernel",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_15_5-rt-1-150400.1.3.1.x86_64",
          "SUSE Real Time Module 15 SP4:cluster-md-kmp-rt-5.14.21-150400.15.5.1.x86_64",
          "SUSE Real Time Module 15 SP4:dlm-kmp-rt-5.14.21-150400.15.5.1.x86_64",
          "SUSE Real Time Module 15 SP4:gfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64",
          "SUSE Real Time Module 15 SP4:kernel-devel-rt-5.14.21-150400.15.5.1.noarch",
          "SUSE Real Time Module 15 SP4:kernel-rt-5.14.21-150400.15.5.1.x86_64",
          "SUSE Real Time Module 15 SP4:kernel-rt-devel-5.14.21-150400.15.5.1.x86_64",
          "SUSE Real Time Module 15 SP4:kernel-rt_debug-5.14.21-150400.15.5.1.x86_64",
          "SUSE Real Time Module 15 SP4:kernel-rt_debug-devel-5.14.21-150400.15.5.1.x86_64",
          "SUSE Real Time Module 15 SP4:kernel-source-rt-5.14.21-150400.15.5.1.noarch",
          "SUSE Real Time Module 15 SP4:kernel-syms-rt-5.14.21-150400.15.5.1.x86_64",
          "SUSE Real Time Module 15 SP4:ocfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64",
          "openSUSE Leap 15.4:cluster-md-kmp-rt-5.14.21-150400.15.5.1.x86_64",
          "openSUSE Leap 15.4:dlm-kmp-rt-5.14.21-150400.15.5.1.x86_64",
          "openSUSE Leap 15.4:gfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64",
          "openSUSE Leap 15.4:kernel-devel-rt-5.14.21-150400.15.5.1.noarch",
          "openSUSE Leap 15.4:kernel-rt-5.14.21-150400.15.5.1.x86_64",
          "openSUSE Leap 15.4:kernel-rt-devel-5.14.21-150400.15.5.1.x86_64",
          "openSUSE Leap 15.4:kernel-rt_debug-5.14.21-150400.15.5.1.x86_64",
          "openSUSE Leap 15.4:kernel-rt_debug-devel-5.14.21-150400.15.5.1.x86_64",
          "openSUSE Leap 15.4:kernel-source-rt-5.14.21-150400.15.5.1.noarch",
          "openSUSE Leap 15.4:kernel-syms-rt-5.14.21-150400.15.5.1.x86_64",
          "openSUSE Leap 15.4:ocfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2022-20369",
          "url": "https://www.suse.com/security/cve/CVE-2022-20369"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1202347 for CVE-2022-20369",
          "url": "https://bugzilla.suse.com/1202347"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1212321 for CVE-2022-20369",
          "url": "https://bugzilla.suse.com/1212321"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_15_5-rt-1-150400.1.3.1.x86_64",
            "SUSE Real Time Module 15 SP4:cluster-md-kmp-rt-5.14.21-150400.15.5.1.x86_64",
            "SUSE Real Time Module 15 SP4:dlm-kmp-rt-5.14.21-150400.15.5.1.x86_64",
            "SUSE Real Time Module 15 SP4:gfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64",
            "SUSE Real Time Module 15 SP4:kernel-devel-rt-5.14.21-150400.15.5.1.noarch",
            "SUSE Real Time Module 15 SP4:kernel-rt-5.14.21-150400.15.5.1.x86_64",
            "SUSE Real Time Module 15 SP4:kernel-rt-devel-5.14.21-150400.15.5.1.x86_64",
            "SUSE Real Time Module 15 SP4:kernel-rt_debug-5.14.21-150400.15.5.1.x86_64",
            "SUSE Real Time Module 15 SP4:kernel-rt_debug-devel-5.14.21-150400.15.5.1.x86_64",
            "SUSE Real Time Module 15 SP4:kernel-source-rt-5.14.21-150400.15.5.1.noarch",
            "SUSE Real Time Module 15 SP4:kernel-syms-rt-5.14.21-150400.15.5.1.x86_64",
            "SUSE Real Time Module 15 SP4:ocfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64",
            "openSUSE Leap 15.4:cluster-md-kmp-rt-5.14.21-150400.15.5.1.x86_64",
            "openSUSE Leap 15.4:dlm-kmp-rt-5.14.21-150400.15.5.1.x86_64",
            "openSUSE Leap 15.4:gfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64",
            "openSUSE Leap 15.4:kernel-devel-rt-5.14.21-150400.15.5.1.noarch",
            "openSUSE Leap 15.4:kernel-rt-5.14.21-150400.15.5.1.x86_64",
            "openSUSE Leap 15.4:kernel-rt-devel-5.14.21-150400.15.5.1.x86_64",
            "openSUSE Leap 15.4:kernel-rt_debug-5.14.21-150400.15.5.1.x86_64",
            "openSUSE Leap 15.4:kernel-rt_debug-devel-5.14.21-150400.15.5.1.x86_64",
            "openSUSE Leap 15.4:kernel-source-rt-5.14.21-150400.15.5.1.noarch",
            "openSUSE Leap 15.4:kernel-syms-rt-5.14.21-150400.15.5.1.x86_64",
            "openSUSE Leap 15.4:ocfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 5.5,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
            "version": "3.1"
          },
          "products": [
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_15_5-rt-1-150400.1.3.1.x86_64",
            "SUSE Real Time Module 15 SP4:cluster-md-kmp-rt-5.14.21-150400.15.5.1.x86_64",
            "SUSE Real Time Module 15 SP4:dlm-kmp-rt-5.14.21-150400.15.5.1.x86_64",
            "SUSE Real Time Module 15 SP4:gfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64",
            "SUSE Real Time Module 15 SP4:kernel-devel-rt-5.14.21-150400.15.5.1.noarch",
            "SUSE Real Time Module 15 SP4:kernel-rt-5.14.21-150400.15.5.1.x86_64",
            "SUSE Real Time Module 15 SP4:kernel-rt-devel-5.14.21-150400.15.5.1.x86_64",
            "SUSE Real Time Module 15 SP4:kernel-rt_debug-5.14.21-150400.15.5.1.x86_64",
            "SUSE Real Time Module 15 SP4:kernel-rt_debug-devel-5.14.21-150400.15.5.1.x86_64",
            "SUSE Real Time Module 15 SP4:kernel-source-rt-5.14.21-150400.15.5.1.noarch",
            "SUSE Real Time Module 15 SP4:kernel-syms-rt-5.14.21-150400.15.5.1.x86_64",
            "SUSE Real Time Module 15 SP4:ocfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64",
            "openSUSE Leap 15.4:cluster-md-kmp-rt-5.14.21-150400.15.5.1.x86_64",
            "openSUSE Leap 15.4:dlm-kmp-rt-5.14.21-150400.15.5.1.x86_64",
            "openSUSE Leap 15.4:gfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64",
            "openSUSE Leap 15.4:kernel-devel-rt-5.14.21-150400.15.5.1.noarch",
            "openSUSE Leap 15.4:kernel-rt-5.14.21-150400.15.5.1.x86_64",
            "openSUSE Leap 15.4:kernel-rt-devel-5.14.21-150400.15.5.1.x86_64",
            "openSUSE Leap 15.4:kernel-rt_debug-5.14.21-150400.15.5.1.x86_64",
            "openSUSE Leap 15.4:kernel-rt_debug-devel-5.14.21-150400.15.5.1.x86_64",
            "openSUSE Leap 15.4:kernel-source-rt-5.14.21-150400.15.5.1.noarch",
            "openSUSE Leap 15.4:kernel-syms-rt-5.14.21-150400.15.5.1.x86_64",
            "openSUSE Leap 15.4:ocfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2022-12-23T10:39:17Z",
          "details": "moderate"
        }
      ],
      "title": "CVE-2022-20369"
    },
    {
      "cve": "CVE-2022-2153",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2022-2153"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "A flaw was found in the Linux kernel\u0027s KVM when attempting to set a SynIC IRQ. This issue makes it possible for a misbehaving VMM to write to SYNIC/STIMER MSRs, causing a NULL pointer dereference. This flaw allows an unprivileged local attacker on the host to issue specific ioctl calls, causing a kernel oops condition that results in a denial of service.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_15_5-rt-1-150400.1.3.1.x86_64",
          "SUSE Real Time Module 15 SP4:cluster-md-kmp-rt-5.14.21-150400.15.5.1.x86_64",
          "SUSE Real Time Module 15 SP4:dlm-kmp-rt-5.14.21-150400.15.5.1.x86_64",
          "SUSE Real Time Module 15 SP4:gfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64",
          "SUSE Real Time Module 15 SP4:kernel-devel-rt-5.14.21-150400.15.5.1.noarch",
          "SUSE Real Time Module 15 SP4:kernel-rt-5.14.21-150400.15.5.1.x86_64",
          "SUSE Real Time Module 15 SP4:kernel-rt-devel-5.14.21-150400.15.5.1.x86_64",
          "SUSE Real Time Module 15 SP4:kernel-rt_debug-5.14.21-150400.15.5.1.x86_64",
          "SUSE Real Time Module 15 SP4:kernel-rt_debug-devel-5.14.21-150400.15.5.1.x86_64",
          "SUSE Real Time Module 15 SP4:kernel-source-rt-5.14.21-150400.15.5.1.noarch",
          "SUSE Real Time Module 15 SP4:kernel-syms-rt-5.14.21-150400.15.5.1.x86_64",
          "SUSE Real Time Module 15 SP4:ocfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64",
          "openSUSE Leap 15.4:cluster-md-kmp-rt-5.14.21-150400.15.5.1.x86_64",
          "openSUSE Leap 15.4:dlm-kmp-rt-5.14.21-150400.15.5.1.x86_64",
          "openSUSE Leap 15.4:gfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64",
          "openSUSE Leap 15.4:kernel-devel-rt-5.14.21-150400.15.5.1.noarch",
          "openSUSE Leap 15.4:kernel-rt-5.14.21-150400.15.5.1.x86_64",
          "openSUSE Leap 15.4:kernel-rt-devel-5.14.21-150400.15.5.1.x86_64",
          "openSUSE Leap 15.4:kernel-rt_debug-5.14.21-150400.15.5.1.x86_64",
          "openSUSE Leap 15.4:kernel-rt_debug-devel-5.14.21-150400.15.5.1.x86_64",
          "openSUSE Leap 15.4:kernel-source-rt-5.14.21-150400.15.5.1.noarch",
          "openSUSE Leap 15.4:kernel-syms-rt-5.14.21-150400.15.5.1.x86_64",
          "openSUSE Leap 15.4:ocfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2022-2153",
          "url": "https://www.suse.com/security/cve/CVE-2022-2153"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1200788 for CVE-2022-2153",
          "url": "https://bugzilla.suse.com/1200788"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_15_5-rt-1-150400.1.3.1.x86_64",
            "SUSE Real Time Module 15 SP4:cluster-md-kmp-rt-5.14.21-150400.15.5.1.x86_64",
            "SUSE Real Time Module 15 SP4:dlm-kmp-rt-5.14.21-150400.15.5.1.x86_64",
            "SUSE Real Time Module 15 SP4:gfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64",
            "SUSE Real Time Module 15 SP4:kernel-devel-rt-5.14.21-150400.15.5.1.noarch",
            "SUSE Real Time Module 15 SP4:kernel-rt-5.14.21-150400.15.5.1.x86_64",
            "SUSE Real Time Module 15 SP4:kernel-rt-devel-5.14.21-150400.15.5.1.x86_64",
            "SUSE Real Time Module 15 SP4:kernel-rt_debug-5.14.21-150400.15.5.1.x86_64",
            "SUSE Real Time Module 15 SP4:kernel-rt_debug-devel-5.14.21-150400.15.5.1.x86_64",
            "SUSE Real Time Module 15 SP4:kernel-source-rt-5.14.21-150400.15.5.1.noarch",
            "SUSE Real Time Module 15 SP4:kernel-syms-rt-5.14.21-150400.15.5.1.x86_64",
            "SUSE Real Time Module 15 SP4:ocfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64",
            "openSUSE Leap 15.4:cluster-md-kmp-rt-5.14.21-150400.15.5.1.x86_64",
            "openSUSE Leap 15.4:dlm-kmp-rt-5.14.21-150400.15.5.1.x86_64",
            "openSUSE Leap 15.4:gfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64",
            "openSUSE Leap 15.4:kernel-devel-rt-5.14.21-150400.15.5.1.noarch",
            "openSUSE Leap 15.4:kernel-rt-5.14.21-150400.15.5.1.x86_64",
            "openSUSE Leap 15.4:kernel-rt-devel-5.14.21-150400.15.5.1.x86_64",
            "openSUSE Leap 15.4:kernel-rt_debug-5.14.21-150400.15.5.1.x86_64",
            "openSUSE Leap 15.4:kernel-rt_debug-devel-5.14.21-150400.15.5.1.x86_64",
            "openSUSE Leap 15.4:kernel-source-rt-5.14.21-150400.15.5.1.noarch",
            "openSUSE Leap 15.4:kernel-syms-rt-5.14.21-150400.15.5.1.x86_64",
            "openSUSE Leap 15.4:ocfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 6.5,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:N/I:N/A:H",
            "version": "3.1"
          },
          "products": [
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_15_5-rt-1-150400.1.3.1.x86_64",
            "SUSE Real Time Module 15 SP4:cluster-md-kmp-rt-5.14.21-150400.15.5.1.x86_64",
            "SUSE Real Time Module 15 SP4:dlm-kmp-rt-5.14.21-150400.15.5.1.x86_64",
            "SUSE Real Time Module 15 SP4:gfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64",
            "SUSE Real Time Module 15 SP4:kernel-devel-rt-5.14.21-150400.15.5.1.noarch",
            "SUSE Real Time Module 15 SP4:kernel-rt-5.14.21-150400.15.5.1.x86_64",
            "SUSE Real Time Module 15 SP4:kernel-rt-devel-5.14.21-150400.15.5.1.x86_64",
            "SUSE Real Time Module 15 SP4:kernel-rt_debug-5.14.21-150400.15.5.1.x86_64",
            "SUSE Real Time Module 15 SP4:kernel-rt_debug-devel-5.14.21-150400.15.5.1.x86_64",
            "SUSE Real Time Module 15 SP4:kernel-source-rt-5.14.21-150400.15.5.1.noarch",
            "SUSE Real Time Module 15 SP4:kernel-syms-rt-5.14.21-150400.15.5.1.x86_64",
            "SUSE Real Time Module 15 SP4:ocfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64",
            "openSUSE Leap 15.4:cluster-md-kmp-rt-5.14.21-150400.15.5.1.x86_64",
            "openSUSE Leap 15.4:dlm-kmp-rt-5.14.21-150400.15.5.1.x86_64",
            "openSUSE Leap 15.4:gfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64",
            "openSUSE Leap 15.4:kernel-devel-rt-5.14.21-150400.15.5.1.noarch",
            "openSUSE Leap 15.4:kernel-rt-5.14.21-150400.15.5.1.x86_64",
            "openSUSE Leap 15.4:kernel-rt-devel-5.14.21-150400.15.5.1.x86_64",
            "openSUSE Leap 15.4:kernel-rt_debug-5.14.21-150400.15.5.1.x86_64",
            "openSUSE Leap 15.4:kernel-rt_debug-devel-5.14.21-150400.15.5.1.x86_64",
            "openSUSE Leap 15.4:kernel-source-rt-5.14.21-150400.15.5.1.noarch",
            "openSUSE Leap 15.4:kernel-syms-rt-5.14.21-150400.15.5.1.x86_64",
            "openSUSE Leap 15.4:ocfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2022-12-23T10:39:17Z",
          "details": "moderate"
        }
      ],
      "title": "CVE-2022-2153"
    },
    {
      "cve": "CVE-2022-2586",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2022-2586"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "It was discovered that a nft object or expression could reference a nft set on a different nft table, leading to a use-after-free once that table was deleted.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_15_5-rt-1-150400.1.3.1.x86_64",
          "SUSE Real Time Module 15 SP4:cluster-md-kmp-rt-5.14.21-150400.15.5.1.x86_64",
          "SUSE Real Time Module 15 SP4:dlm-kmp-rt-5.14.21-150400.15.5.1.x86_64",
          "SUSE Real Time Module 15 SP4:gfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64",
          "SUSE Real Time Module 15 SP4:kernel-devel-rt-5.14.21-150400.15.5.1.noarch",
          "SUSE Real Time Module 15 SP4:kernel-rt-5.14.21-150400.15.5.1.x86_64",
          "SUSE Real Time Module 15 SP4:kernel-rt-devel-5.14.21-150400.15.5.1.x86_64",
          "SUSE Real Time Module 15 SP4:kernel-rt_debug-5.14.21-150400.15.5.1.x86_64",
          "SUSE Real Time Module 15 SP4:kernel-rt_debug-devel-5.14.21-150400.15.5.1.x86_64",
          "SUSE Real Time Module 15 SP4:kernel-source-rt-5.14.21-150400.15.5.1.noarch",
          "SUSE Real Time Module 15 SP4:kernel-syms-rt-5.14.21-150400.15.5.1.x86_64",
          "SUSE Real Time Module 15 SP4:ocfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64",
          "openSUSE Leap 15.4:cluster-md-kmp-rt-5.14.21-150400.15.5.1.x86_64",
          "openSUSE Leap 15.4:dlm-kmp-rt-5.14.21-150400.15.5.1.x86_64",
          "openSUSE Leap 15.4:gfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64",
          "openSUSE Leap 15.4:kernel-devel-rt-5.14.21-150400.15.5.1.noarch",
          "openSUSE Leap 15.4:kernel-rt-5.14.21-150400.15.5.1.x86_64",
          "openSUSE Leap 15.4:kernel-rt-devel-5.14.21-150400.15.5.1.x86_64",
          "openSUSE Leap 15.4:kernel-rt_debug-5.14.21-150400.15.5.1.x86_64",
          "openSUSE Leap 15.4:kernel-rt_debug-devel-5.14.21-150400.15.5.1.x86_64",
          "openSUSE Leap 15.4:kernel-source-rt-5.14.21-150400.15.5.1.noarch",
          "openSUSE Leap 15.4:kernel-syms-rt-5.14.21-150400.15.5.1.x86_64",
          "openSUSE Leap 15.4:ocfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2022-2586",
          "url": "https://www.suse.com/security/cve/CVE-2022-2586"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1202095 for CVE-2022-2586",
          "url": "https://bugzilla.suse.com/1202095"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1209719 for CVE-2022-2586",
          "url": "https://bugzilla.suse.com/1209719"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_15_5-rt-1-150400.1.3.1.x86_64",
            "SUSE Real Time Module 15 SP4:cluster-md-kmp-rt-5.14.21-150400.15.5.1.x86_64",
            "SUSE Real Time Module 15 SP4:dlm-kmp-rt-5.14.21-150400.15.5.1.x86_64",
            "SUSE Real Time Module 15 SP4:gfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64",
            "SUSE Real Time Module 15 SP4:kernel-devel-rt-5.14.21-150400.15.5.1.noarch",
            "SUSE Real Time Module 15 SP4:kernel-rt-5.14.21-150400.15.5.1.x86_64",
            "SUSE Real Time Module 15 SP4:kernel-rt-devel-5.14.21-150400.15.5.1.x86_64",
            "SUSE Real Time Module 15 SP4:kernel-rt_debug-5.14.21-150400.15.5.1.x86_64",
            "SUSE Real Time Module 15 SP4:kernel-rt_debug-devel-5.14.21-150400.15.5.1.x86_64",
            "SUSE Real Time Module 15 SP4:kernel-source-rt-5.14.21-150400.15.5.1.noarch",
            "SUSE Real Time Module 15 SP4:kernel-syms-rt-5.14.21-150400.15.5.1.x86_64",
            "SUSE Real Time Module 15 SP4:ocfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64",
            "openSUSE Leap 15.4:cluster-md-kmp-rt-5.14.21-150400.15.5.1.x86_64",
            "openSUSE Leap 15.4:dlm-kmp-rt-5.14.21-150400.15.5.1.x86_64",
            "openSUSE Leap 15.4:gfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64",
            "openSUSE Leap 15.4:kernel-devel-rt-5.14.21-150400.15.5.1.noarch",
            "openSUSE Leap 15.4:kernel-rt-5.14.21-150400.15.5.1.x86_64",
            "openSUSE Leap 15.4:kernel-rt-devel-5.14.21-150400.15.5.1.x86_64",
            "openSUSE Leap 15.4:kernel-rt_debug-5.14.21-150400.15.5.1.x86_64",
            "openSUSE Leap 15.4:kernel-rt_debug-devel-5.14.21-150400.15.5.1.x86_64",
            "openSUSE Leap 15.4:kernel-source-rt-5.14.21-150400.15.5.1.noarch",
            "openSUSE Leap 15.4:kernel-syms-rt-5.14.21-150400.15.5.1.x86_64",
            "openSUSE Leap 15.4:ocfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 6.7,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H",
            "version": "3.1"
          },
          "products": [
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_15_5-rt-1-150400.1.3.1.x86_64",
            "SUSE Real Time Module 15 SP4:cluster-md-kmp-rt-5.14.21-150400.15.5.1.x86_64",
            "SUSE Real Time Module 15 SP4:dlm-kmp-rt-5.14.21-150400.15.5.1.x86_64",
            "SUSE Real Time Module 15 SP4:gfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64",
            "SUSE Real Time Module 15 SP4:kernel-devel-rt-5.14.21-150400.15.5.1.noarch",
            "SUSE Real Time Module 15 SP4:kernel-rt-5.14.21-150400.15.5.1.x86_64",
            "SUSE Real Time Module 15 SP4:kernel-rt-devel-5.14.21-150400.15.5.1.x86_64",
            "SUSE Real Time Module 15 SP4:kernel-rt_debug-5.14.21-150400.15.5.1.x86_64",
            "SUSE Real Time Module 15 SP4:kernel-rt_debug-devel-5.14.21-150400.15.5.1.x86_64",
            "SUSE Real Time Module 15 SP4:kernel-source-rt-5.14.21-150400.15.5.1.noarch",
            "SUSE Real Time Module 15 SP4:kernel-syms-rt-5.14.21-150400.15.5.1.x86_64",
            "SUSE Real Time Module 15 SP4:ocfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64",
            "openSUSE Leap 15.4:cluster-md-kmp-rt-5.14.21-150400.15.5.1.x86_64",
            "openSUSE Leap 15.4:dlm-kmp-rt-5.14.21-150400.15.5.1.x86_64",
            "openSUSE Leap 15.4:gfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64",
            "openSUSE Leap 15.4:kernel-devel-rt-5.14.21-150400.15.5.1.noarch",
            "openSUSE Leap 15.4:kernel-rt-5.14.21-150400.15.5.1.x86_64",
            "openSUSE Leap 15.4:kernel-rt-devel-5.14.21-150400.15.5.1.x86_64",
            "openSUSE Leap 15.4:kernel-rt_debug-5.14.21-150400.15.5.1.x86_64",
            "openSUSE Leap 15.4:kernel-rt_debug-devel-5.14.21-150400.15.5.1.x86_64",
            "openSUSE Leap 15.4:kernel-source-rt-5.14.21-150400.15.5.1.noarch",
            "openSUSE Leap 15.4:kernel-syms-rt-5.14.21-150400.15.5.1.x86_64",
            "openSUSE Leap 15.4:ocfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2022-12-23T10:39:17Z",
          "details": "moderate"
        }
      ],
      "title": "CVE-2022-2586"
    },
    {
      "cve": "CVE-2022-2588",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2022-2588"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "It was discovered that the cls_route filter implementation in the Linux kernel would not remove an old filter from the hashtable before freeing it if its handle had the value 0.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_15_5-rt-1-150400.1.3.1.x86_64",
          "SUSE Real Time Module 15 SP4:cluster-md-kmp-rt-5.14.21-150400.15.5.1.x86_64",
          "SUSE Real Time Module 15 SP4:dlm-kmp-rt-5.14.21-150400.15.5.1.x86_64",
          "SUSE Real Time Module 15 SP4:gfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64",
          "SUSE Real Time Module 15 SP4:kernel-devel-rt-5.14.21-150400.15.5.1.noarch",
          "SUSE Real Time Module 15 SP4:kernel-rt-5.14.21-150400.15.5.1.x86_64",
          "SUSE Real Time Module 15 SP4:kernel-rt-devel-5.14.21-150400.15.5.1.x86_64",
          "SUSE Real Time Module 15 SP4:kernel-rt_debug-5.14.21-150400.15.5.1.x86_64",
          "SUSE Real Time Module 15 SP4:kernel-rt_debug-devel-5.14.21-150400.15.5.1.x86_64",
          "SUSE Real Time Module 15 SP4:kernel-source-rt-5.14.21-150400.15.5.1.noarch",
          "SUSE Real Time Module 15 SP4:kernel-syms-rt-5.14.21-150400.15.5.1.x86_64",
          "SUSE Real Time Module 15 SP4:ocfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64",
          "openSUSE Leap 15.4:cluster-md-kmp-rt-5.14.21-150400.15.5.1.x86_64",
          "openSUSE Leap 15.4:dlm-kmp-rt-5.14.21-150400.15.5.1.x86_64",
          "openSUSE Leap 15.4:gfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64",
          "openSUSE Leap 15.4:kernel-devel-rt-5.14.21-150400.15.5.1.noarch",
          "openSUSE Leap 15.4:kernel-rt-5.14.21-150400.15.5.1.x86_64",
          "openSUSE Leap 15.4:kernel-rt-devel-5.14.21-150400.15.5.1.x86_64",
          "openSUSE Leap 15.4:kernel-rt_debug-5.14.21-150400.15.5.1.x86_64",
          "openSUSE Leap 15.4:kernel-rt_debug-devel-5.14.21-150400.15.5.1.x86_64",
          "openSUSE Leap 15.4:kernel-source-rt-5.14.21-150400.15.5.1.noarch",
          "openSUSE Leap 15.4:kernel-syms-rt-5.14.21-150400.15.5.1.x86_64",
          "openSUSE Leap 15.4:ocfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2022-2588",
          "url": "https://www.suse.com/security/cve/CVE-2022-2588"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1202096 for CVE-2022-2588",
          "url": "https://bugzilla.suse.com/1202096"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1203613 for CVE-2022-2588",
          "url": "https://bugzilla.suse.com/1203613"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1204183 for CVE-2022-2588",
          "url": "https://bugzilla.suse.com/1204183"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1209225 for CVE-2022-2588",
          "url": "https://bugzilla.suse.com/1209225"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_15_5-rt-1-150400.1.3.1.x86_64",
            "SUSE Real Time Module 15 SP4:cluster-md-kmp-rt-5.14.21-150400.15.5.1.x86_64",
            "SUSE Real Time Module 15 SP4:dlm-kmp-rt-5.14.21-150400.15.5.1.x86_64",
            "SUSE Real Time Module 15 SP4:gfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64",
            "SUSE Real Time Module 15 SP4:kernel-devel-rt-5.14.21-150400.15.5.1.noarch",
            "SUSE Real Time Module 15 SP4:kernel-rt-5.14.21-150400.15.5.1.x86_64",
            "SUSE Real Time Module 15 SP4:kernel-rt-devel-5.14.21-150400.15.5.1.x86_64",
            "SUSE Real Time Module 15 SP4:kernel-rt_debug-5.14.21-150400.15.5.1.x86_64",
            "SUSE Real Time Module 15 SP4:kernel-rt_debug-devel-5.14.21-150400.15.5.1.x86_64",
            "SUSE Real Time Module 15 SP4:kernel-source-rt-5.14.21-150400.15.5.1.noarch",
            "SUSE Real Time Module 15 SP4:kernel-syms-rt-5.14.21-150400.15.5.1.x86_64",
            "SUSE Real Time Module 15 SP4:ocfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64",
            "openSUSE Leap 15.4:cluster-md-kmp-rt-5.14.21-150400.15.5.1.x86_64",
            "openSUSE Leap 15.4:dlm-kmp-rt-5.14.21-150400.15.5.1.x86_64",
            "openSUSE Leap 15.4:gfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64",
            "openSUSE Leap 15.4:kernel-devel-rt-5.14.21-150400.15.5.1.noarch",
            "openSUSE Leap 15.4:kernel-rt-5.14.21-150400.15.5.1.x86_64",
            "openSUSE Leap 15.4:kernel-rt-devel-5.14.21-150400.15.5.1.x86_64",
            "openSUSE Leap 15.4:kernel-rt_debug-5.14.21-150400.15.5.1.x86_64",
            "openSUSE Leap 15.4:kernel-rt_debug-devel-5.14.21-150400.15.5.1.x86_64",
            "openSUSE Leap 15.4:kernel-source-rt-5.14.21-150400.15.5.1.noarch",
            "openSUSE Leap 15.4:kernel-syms-rt-5.14.21-150400.15.5.1.x86_64",
            "openSUSE Leap 15.4:ocfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 7.8,
            "baseSeverity": "HIGH",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
            "version": "3.1"
          },
          "products": [
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_15_5-rt-1-150400.1.3.1.x86_64",
            "SUSE Real Time Module 15 SP4:cluster-md-kmp-rt-5.14.21-150400.15.5.1.x86_64",
            "SUSE Real Time Module 15 SP4:dlm-kmp-rt-5.14.21-150400.15.5.1.x86_64",
            "SUSE Real Time Module 15 SP4:gfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64",
            "SUSE Real Time Module 15 SP4:kernel-devel-rt-5.14.21-150400.15.5.1.noarch",
            "SUSE Real Time Module 15 SP4:kernel-rt-5.14.21-150400.15.5.1.x86_64",
            "SUSE Real Time Module 15 SP4:kernel-rt-devel-5.14.21-150400.15.5.1.x86_64",
            "SUSE Real Time Module 15 SP4:kernel-rt_debug-5.14.21-150400.15.5.1.x86_64",
            "SUSE Real Time Module 15 SP4:kernel-rt_debug-devel-5.14.21-150400.15.5.1.x86_64",
            "SUSE Real Time Module 15 SP4:kernel-source-rt-5.14.21-150400.15.5.1.noarch",
            "SUSE Real Time Module 15 SP4:kernel-syms-rt-5.14.21-150400.15.5.1.x86_64",
            "SUSE Real Time Module 15 SP4:ocfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64",
            "openSUSE Leap 15.4:cluster-md-kmp-rt-5.14.21-150400.15.5.1.x86_64",
            "openSUSE Leap 15.4:dlm-kmp-rt-5.14.21-150400.15.5.1.x86_64",
            "openSUSE Leap 15.4:gfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64",
            "openSUSE Leap 15.4:kernel-devel-rt-5.14.21-150400.15.5.1.noarch",
            "openSUSE Leap 15.4:kernel-rt-5.14.21-150400.15.5.1.x86_64",
            "openSUSE Leap 15.4:kernel-rt-devel-5.14.21-150400.15.5.1.x86_64",
            "openSUSE Leap 15.4:kernel-rt_debug-5.14.21-150400.15.5.1.x86_64",
            "openSUSE Leap 15.4:kernel-rt_debug-devel-5.14.21-150400.15.5.1.x86_64",
            "openSUSE Leap 15.4:kernel-source-rt-5.14.21-150400.15.5.1.noarch",
            "openSUSE Leap 15.4:kernel-syms-rt-5.14.21-150400.15.5.1.x86_64",
            "openSUSE Leap 15.4:ocfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2022-12-23T10:39:17Z",
          "details": "important"
        }
      ],
      "title": "CVE-2022-2588"
    },
    {
      "cve": "CVE-2022-2602",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2022-2602"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "io_uring UAF, Unix SCM garbage collection",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_15_5-rt-1-150400.1.3.1.x86_64",
          "SUSE Real Time Module 15 SP4:cluster-md-kmp-rt-5.14.21-150400.15.5.1.x86_64",
          "SUSE Real Time Module 15 SP4:dlm-kmp-rt-5.14.21-150400.15.5.1.x86_64",
          "SUSE Real Time Module 15 SP4:gfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64",
          "SUSE Real Time Module 15 SP4:kernel-devel-rt-5.14.21-150400.15.5.1.noarch",
          "SUSE Real Time Module 15 SP4:kernel-rt-5.14.21-150400.15.5.1.x86_64",
          "SUSE Real Time Module 15 SP4:kernel-rt-devel-5.14.21-150400.15.5.1.x86_64",
          "SUSE Real Time Module 15 SP4:kernel-rt_debug-5.14.21-150400.15.5.1.x86_64",
          "SUSE Real Time Module 15 SP4:kernel-rt_debug-devel-5.14.21-150400.15.5.1.x86_64",
          "SUSE Real Time Module 15 SP4:kernel-source-rt-5.14.21-150400.15.5.1.noarch",
          "SUSE Real Time Module 15 SP4:kernel-syms-rt-5.14.21-150400.15.5.1.x86_64",
          "SUSE Real Time Module 15 SP4:ocfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64",
          "openSUSE Leap 15.4:cluster-md-kmp-rt-5.14.21-150400.15.5.1.x86_64",
          "openSUSE Leap 15.4:dlm-kmp-rt-5.14.21-150400.15.5.1.x86_64",
          "openSUSE Leap 15.4:gfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64",
          "openSUSE Leap 15.4:kernel-devel-rt-5.14.21-150400.15.5.1.noarch",
          "openSUSE Leap 15.4:kernel-rt-5.14.21-150400.15.5.1.x86_64",
          "openSUSE Leap 15.4:kernel-rt-devel-5.14.21-150400.15.5.1.x86_64",
          "openSUSE Leap 15.4:kernel-rt_debug-5.14.21-150400.15.5.1.x86_64",
          "openSUSE Leap 15.4:kernel-rt_debug-devel-5.14.21-150400.15.5.1.x86_64",
          "openSUSE Leap 15.4:kernel-source-rt-5.14.21-150400.15.5.1.noarch",
          "openSUSE Leap 15.4:kernel-syms-rt-5.14.21-150400.15.5.1.x86_64",
          "openSUSE Leap 15.4:ocfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2022-2602",
          "url": "https://www.suse.com/security/cve/CVE-2022-2602"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1204228 for CVE-2022-2602",
          "url": "https://bugzilla.suse.com/1204228"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1205186 for CVE-2022-2602",
          "url": "https://bugzilla.suse.com/1205186"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_15_5-rt-1-150400.1.3.1.x86_64",
            "SUSE Real Time Module 15 SP4:cluster-md-kmp-rt-5.14.21-150400.15.5.1.x86_64",
            "SUSE Real Time Module 15 SP4:dlm-kmp-rt-5.14.21-150400.15.5.1.x86_64",
            "SUSE Real Time Module 15 SP4:gfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64",
            "SUSE Real Time Module 15 SP4:kernel-devel-rt-5.14.21-150400.15.5.1.noarch",
            "SUSE Real Time Module 15 SP4:kernel-rt-5.14.21-150400.15.5.1.x86_64",
            "SUSE Real Time Module 15 SP4:kernel-rt-devel-5.14.21-150400.15.5.1.x86_64",
            "SUSE Real Time Module 15 SP4:kernel-rt_debug-5.14.21-150400.15.5.1.x86_64",
            "SUSE Real Time Module 15 SP4:kernel-rt_debug-devel-5.14.21-150400.15.5.1.x86_64",
            "SUSE Real Time Module 15 SP4:kernel-source-rt-5.14.21-150400.15.5.1.noarch",
            "SUSE Real Time Module 15 SP4:kernel-syms-rt-5.14.21-150400.15.5.1.x86_64",
            "SUSE Real Time Module 15 SP4:ocfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64",
            "openSUSE Leap 15.4:cluster-md-kmp-rt-5.14.21-150400.15.5.1.x86_64",
            "openSUSE Leap 15.4:dlm-kmp-rt-5.14.21-150400.15.5.1.x86_64",
            "openSUSE Leap 15.4:gfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64",
            "openSUSE Leap 15.4:kernel-devel-rt-5.14.21-150400.15.5.1.noarch",
            "openSUSE Leap 15.4:kernel-rt-5.14.21-150400.15.5.1.x86_64",
            "openSUSE Leap 15.4:kernel-rt-devel-5.14.21-150400.15.5.1.x86_64",
            "openSUSE Leap 15.4:kernel-rt_debug-5.14.21-150400.15.5.1.x86_64",
            "openSUSE Leap 15.4:kernel-rt_debug-devel-5.14.21-150400.15.5.1.x86_64",
            "openSUSE Leap 15.4:kernel-source-rt-5.14.21-150400.15.5.1.noarch",
            "openSUSE Leap 15.4:kernel-syms-rt-5.14.21-150400.15.5.1.x86_64",
            "openSUSE Leap 15.4:ocfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 7.8,
            "baseSeverity": "HIGH",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
            "version": "3.1"
          },
          "products": [
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_15_5-rt-1-150400.1.3.1.x86_64",
            "SUSE Real Time Module 15 SP4:cluster-md-kmp-rt-5.14.21-150400.15.5.1.x86_64",
            "SUSE Real Time Module 15 SP4:dlm-kmp-rt-5.14.21-150400.15.5.1.x86_64",
            "SUSE Real Time Module 15 SP4:gfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64",
            "SUSE Real Time Module 15 SP4:kernel-devel-rt-5.14.21-150400.15.5.1.noarch",
            "SUSE Real Time Module 15 SP4:kernel-rt-5.14.21-150400.15.5.1.x86_64",
            "SUSE Real Time Module 15 SP4:kernel-rt-devel-5.14.21-150400.15.5.1.x86_64",
            "SUSE Real Time Module 15 SP4:kernel-rt_debug-5.14.21-150400.15.5.1.x86_64",
            "SUSE Real Time Module 15 SP4:kernel-rt_debug-devel-5.14.21-150400.15.5.1.x86_64",
            "SUSE Real Time Module 15 SP4:kernel-source-rt-5.14.21-150400.15.5.1.noarch",
            "SUSE Real Time Module 15 SP4:kernel-syms-rt-5.14.21-150400.15.5.1.x86_64",
            "SUSE Real Time Module 15 SP4:ocfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64",
            "openSUSE Leap 15.4:cluster-md-kmp-rt-5.14.21-150400.15.5.1.x86_64",
            "openSUSE Leap 15.4:dlm-kmp-rt-5.14.21-150400.15.5.1.x86_64",
            "openSUSE Leap 15.4:gfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64",
            "openSUSE Leap 15.4:kernel-devel-rt-5.14.21-150400.15.5.1.noarch",
            "openSUSE Leap 15.4:kernel-rt-5.14.21-150400.15.5.1.x86_64",
            "openSUSE Leap 15.4:kernel-rt-devel-5.14.21-150400.15.5.1.x86_64",
            "openSUSE Leap 15.4:kernel-rt_debug-5.14.21-150400.15.5.1.x86_64",
            "openSUSE Leap 15.4:kernel-rt_debug-devel-5.14.21-150400.15.5.1.x86_64",
            "openSUSE Leap 15.4:kernel-source-rt-5.14.21-150400.15.5.1.noarch",
            "openSUSE Leap 15.4:kernel-syms-rt-5.14.21-150400.15.5.1.x86_64",
            "openSUSE Leap 15.4:ocfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2022-12-23T10:39:17Z",
          "details": "important"
        }
      ],
      "title": "CVE-2022-2602"
    },
    {
      "cve": "CVE-2022-26373",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2022-26373"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "Non-transparent sharing of return predictor targets between contexts in some Intel(R) Processors may allow an authorized user to potentially enable information disclosure via local access.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_15_5-rt-1-150400.1.3.1.x86_64",
          "SUSE Real Time Module 15 SP4:cluster-md-kmp-rt-5.14.21-150400.15.5.1.x86_64",
          "SUSE Real Time Module 15 SP4:dlm-kmp-rt-5.14.21-150400.15.5.1.x86_64",
          "SUSE Real Time Module 15 SP4:gfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64",
          "SUSE Real Time Module 15 SP4:kernel-devel-rt-5.14.21-150400.15.5.1.noarch",
          "SUSE Real Time Module 15 SP4:kernel-rt-5.14.21-150400.15.5.1.x86_64",
          "SUSE Real Time Module 15 SP4:kernel-rt-devel-5.14.21-150400.15.5.1.x86_64",
          "SUSE Real Time Module 15 SP4:kernel-rt_debug-5.14.21-150400.15.5.1.x86_64",
          "SUSE Real Time Module 15 SP4:kernel-rt_debug-devel-5.14.21-150400.15.5.1.x86_64",
          "SUSE Real Time Module 15 SP4:kernel-source-rt-5.14.21-150400.15.5.1.noarch",
          "SUSE Real Time Module 15 SP4:kernel-syms-rt-5.14.21-150400.15.5.1.x86_64",
          "SUSE Real Time Module 15 SP4:ocfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64",
          "openSUSE Leap 15.4:cluster-md-kmp-rt-5.14.21-150400.15.5.1.x86_64",
          "openSUSE Leap 15.4:dlm-kmp-rt-5.14.21-150400.15.5.1.x86_64",
          "openSUSE Leap 15.4:gfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64",
          "openSUSE Leap 15.4:kernel-devel-rt-5.14.21-150400.15.5.1.noarch",
          "openSUSE Leap 15.4:kernel-rt-5.14.21-150400.15.5.1.x86_64",
          "openSUSE Leap 15.4:kernel-rt-devel-5.14.21-150400.15.5.1.x86_64",
          "openSUSE Leap 15.4:kernel-rt_debug-5.14.21-150400.15.5.1.x86_64",
          "openSUSE Leap 15.4:kernel-rt_debug-devel-5.14.21-150400.15.5.1.x86_64",
          "openSUSE Leap 15.4:kernel-source-rt-5.14.21-150400.15.5.1.noarch",
          "openSUSE Leap 15.4:kernel-syms-rt-5.14.21-150400.15.5.1.x86_64",
          "openSUSE Leap 15.4:ocfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2022-26373",
          "url": "https://www.suse.com/security/cve/CVE-2022-26373"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1201726 for CVE-2022-26373",
          "url": "https://bugzilla.suse.com/1201726"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1209619 for CVE-2022-26373",
          "url": "https://bugzilla.suse.com/1209619"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_15_5-rt-1-150400.1.3.1.x86_64",
            "SUSE Real Time Module 15 SP4:cluster-md-kmp-rt-5.14.21-150400.15.5.1.x86_64",
            "SUSE Real Time Module 15 SP4:dlm-kmp-rt-5.14.21-150400.15.5.1.x86_64",
            "SUSE Real Time Module 15 SP4:gfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64",
            "SUSE Real Time Module 15 SP4:kernel-devel-rt-5.14.21-150400.15.5.1.noarch",
            "SUSE Real Time Module 15 SP4:kernel-rt-5.14.21-150400.15.5.1.x86_64",
            "SUSE Real Time Module 15 SP4:kernel-rt-devel-5.14.21-150400.15.5.1.x86_64",
            "SUSE Real Time Module 15 SP4:kernel-rt_debug-5.14.21-150400.15.5.1.x86_64",
            "SUSE Real Time Module 15 SP4:kernel-rt_debug-devel-5.14.21-150400.15.5.1.x86_64",
            "SUSE Real Time Module 15 SP4:kernel-source-rt-5.14.21-150400.15.5.1.noarch",
            "SUSE Real Time Module 15 SP4:kernel-syms-rt-5.14.21-150400.15.5.1.x86_64",
            "SUSE Real Time Module 15 SP4:ocfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64",
            "openSUSE Leap 15.4:cluster-md-kmp-rt-5.14.21-150400.15.5.1.x86_64",
            "openSUSE Leap 15.4:dlm-kmp-rt-5.14.21-150400.15.5.1.x86_64",
            "openSUSE Leap 15.4:gfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64",
            "openSUSE Leap 15.4:kernel-devel-rt-5.14.21-150400.15.5.1.noarch",
            "openSUSE Leap 15.4:kernel-rt-5.14.21-150400.15.5.1.x86_64",
            "openSUSE Leap 15.4:kernel-rt-devel-5.14.21-150400.15.5.1.x86_64",
            "openSUSE Leap 15.4:kernel-rt_debug-5.14.21-150400.15.5.1.x86_64",
            "openSUSE Leap 15.4:kernel-rt_debug-devel-5.14.21-150400.15.5.1.x86_64",
            "openSUSE Leap 15.4:kernel-source-rt-5.14.21-150400.15.5.1.noarch",
            "openSUSE Leap 15.4:kernel-syms-rt-5.14.21-150400.15.5.1.x86_64",
            "openSUSE Leap 15.4:ocfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 5.5,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N",
            "version": "3.1"
          },
          "products": [
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_15_5-rt-1-150400.1.3.1.x86_64",
            "SUSE Real Time Module 15 SP4:cluster-md-kmp-rt-5.14.21-150400.15.5.1.x86_64",
            "SUSE Real Time Module 15 SP4:dlm-kmp-rt-5.14.21-150400.15.5.1.x86_64",
            "SUSE Real Time Module 15 SP4:gfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64",
            "SUSE Real Time Module 15 SP4:kernel-devel-rt-5.14.21-150400.15.5.1.noarch",
            "SUSE Real Time Module 15 SP4:kernel-rt-5.14.21-150400.15.5.1.x86_64",
            "SUSE Real Time Module 15 SP4:kernel-rt-devel-5.14.21-150400.15.5.1.x86_64",
            "SUSE Real Time Module 15 SP4:kernel-rt_debug-5.14.21-150400.15.5.1.x86_64",
            "SUSE Real Time Module 15 SP4:kernel-rt_debug-devel-5.14.21-150400.15.5.1.x86_64",
            "SUSE Real Time Module 15 SP4:kernel-source-rt-5.14.21-150400.15.5.1.noarch",
            "SUSE Real Time Module 15 SP4:kernel-syms-rt-5.14.21-150400.15.5.1.x86_64",
            "SUSE Real Time Module 15 SP4:ocfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64",
            "openSUSE Leap 15.4:cluster-md-kmp-rt-5.14.21-150400.15.5.1.x86_64",
            "openSUSE Leap 15.4:dlm-kmp-rt-5.14.21-150400.15.5.1.x86_64",
            "openSUSE Leap 15.4:gfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64",
            "openSUSE Leap 15.4:kernel-devel-rt-5.14.21-150400.15.5.1.noarch",
            "openSUSE Leap 15.4:kernel-rt-5.14.21-150400.15.5.1.x86_64",
            "openSUSE Leap 15.4:kernel-rt-devel-5.14.21-150400.15.5.1.x86_64",
            "openSUSE Leap 15.4:kernel-rt_debug-5.14.21-150400.15.5.1.x86_64",
            "openSUSE Leap 15.4:kernel-rt_debug-devel-5.14.21-150400.15.5.1.x86_64",
            "openSUSE Leap 15.4:kernel-source-rt-5.14.21-150400.15.5.1.noarch",
            "openSUSE Leap 15.4:kernel-syms-rt-5.14.21-150400.15.5.1.x86_64",
            "openSUSE Leap 15.4:ocfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2022-12-23T10:39:17Z",
          "details": "moderate"
        }
      ],
      "title": "CVE-2022-26373"
    },
    {
      "cve": "CVE-2022-2639",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2022-2639"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "An integer coercion error was found in the openvswitch kernel module. Given a sufficiently large number of actions, while copying and reserving memory for a new action of a new flow, the reserve_sfa_size() function does not return -EMSGSIZE as expected, potentially leading to an out-of-bounds write access. This flaw allows a local user to crash or potentially escalate their privileges on the system.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_15_5-rt-1-150400.1.3.1.x86_64",
          "SUSE Real Time Module 15 SP4:cluster-md-kmp-rt-5.14.21-150400.15.5.1.x86_64",
          "SUSE Real Time Module 15 SP4:dlm-kmp-rt-5.14.21-150400.15.5.1.x86_64",
          "SUSE Real Time Module 15 SP4:gfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64",
          "SUSE Real Time Module 15 SP4:kernel-devel-rt-5.14.21-150400.15.5.1.noarch",
          "SUSE Real Time Module 15 SP4:kernel-rt-5.14.21-150400.15.5.1.x86_64",
          "SUSE Real Time Module 15 SP4:kernel-rt-devel-5.14.21-150400.15.5.1.x86_64",
          "SUSE Real Time Module 15 SP4:kernel-rt_debug-5.14.21-150400.15.5.1.x86_64",
          "SUSE Real Time Module 15 SP4:kernel-rt_debug-devel-5.14.21-150400.15.5.1.x86_64",
          "SUSE Real Time Module 15 SP4:kernel-source-rt-5.14.21-150400.15.5.1.noarch",
          "SUSE Real Time Module 15 SP4:kernel-syms-rt-5.14.21-150400.15.5.1.x86_64",
          "SUSE Real Time Module 15 SP4:ocfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64",
          "openSUSE Leap 15.4:cluster-md-kmp-rt-5.14.21-150400.15.5.1.x86_64",
          "openSUSE Leap 15.4:dlm-kmp-rt-5.14.21-150400.15.5.1.x86_64",
          "openSUSE Leap 15.4:gfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64",
          "openSUSE Leap 15.4:kernel-devel-rt-5.14.21-150400.15.5.1.noarch",
          "openSUSE Leap 15.4:kernel-rt-5.14.21-150400.15.5.1.x86_64",
          "openSUSE Leap 15.4:kernel-rt-devel-5.14.21-150400.15.5.1.x86_64",
          "openSUSE Leap 15.4:kernel-rt_debug-5.14.21-150400.15.5.1.x86_64",
          "openSUSE Leap 15.4:kernel-rt_debug-devel-5.14.21-150400.15.5.1.x86_64",
          "openSUSE Leap 15.4:kernel-source-rt-5.14.21-150400.15.5.1.noarch",
          "openSUSE Leap 15.4:kernel-syms-rt-5.14.21-150400.15.5.1.x86_64",
          "openSUSE Leap 15.4:ocfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2022-2639",
          "url": "https://www.suse.com/security/cve/CVE-2022-2639"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1202154 for CVE-2022-2639",
          "url": "https://bugzilla.suse.com/1202154"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_15_5-rt-1-150400.1.3.1.x86_64",
            "SUSE Real Time Module 15 SP4:cluster-md-kmp-rt-5.14.21-150400.15.5.1.x86_64",
            "SUSE Real Time Module 15 SP4:dlm-kmp-rt-5.14.21-150400.15.5.1.x86_64",
            "SUSE Real Time Module 15 SP4:gfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64",
            "SUSE Real Time Module 15 SP4:kernel-devel-rt-5.14.21-150400.15.5.1.noarch",
            "SUSE Real Time Module 15 SP4:kernel-rt-5.14.21-150400.15.5.1.x86_64",
            "SUSE Real Time Module 15 SP4:kernel-rt-devel-5.14.21-150400.15.5.1.x86_64",
            "SUSE Real Time Module 15 SP4:kernel-rt_debug-5.14.21-150400.15.5.1.x86_64",
            "SUSE Real Time Module 15 SP4:kernel-rt_debug-devel-5.14.21-150400.15.5.1.x86_64",
            "SUSE Real Time Module 15 SP4:kernel-source-rt-5.14.21-150400.15.5.1.noarch",
            "SUSE Real Time Module 15 SP4:kernel-syms-rt-5.14.21-150400.15.5.1.x86_64",
            "SUSE Real Time Module 15 SP4:ocfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64",
            "openSUSE Leap 15.4:cluster-md-kmp-rt-5.14.21-150400.15.5.1.x86_64",
            "openSUSE Leap 15.4:dlm-kmp-rt-5.14.21-150400.15.5.1.x86_64",
            "openSUSE Leap 15.4:gfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64",
            "openSUSE Leap 15.4:kernel-devel-rt-5.14.21-150400.15.5.1.noarch",
            "openSUSE Leap 15.4:kernel-rt-5.14.21-150400.15.5.1.x86_64",
            "openSUSE Leap 15.4:kernel-rt-devel-5.14.21-150400.15.5.1.x86_64",
            "openSUSE Leap 15.4:kernel-rt_debug-5.14.21-150400.15.5.1.x86_64",
            "openSUSE Leap 15.4:kernel-rt_debug-devel-5.14.21-150400.15.5.1.x86_64",
            "openSUSE Leap 15.4:kernel-source-rt-5.14.21-150400.15.5.1.noarch",
            "openSUSE Leap 15.4:kernel-syms-rt-5.14.21-150400.15.5.1.x86_64",
            "openSUSE Leap 15.4:ocfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 6.1,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:H",
            "version": "3.1"
          },
          "products": [
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_15_5-rt-1-150400.1.3.1.x86_64",
            "SUSE Real Time Module 15 SP4:cluster-md-kmp-rt-5.14.21-150400.15.5.1.x86_64",
            "SUSE Real Time Module 15 SP4:dlm-kmp-rt-5.14.21-150400.15.5.1.x86_64",
            "SUSE Real Time Module 15 SP4:gfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64",
            "SUSE Real Time Module 15 SP4:kernel-devel-rt-5.14.21-150400.15.5.1.noarch",
            "SUSE Real Time Module 15 SP4:kernel-rt-5.14.21-150400.15.5.1.x86_64",
            "SUSE Real Time Module 15 SP4:kernel-rt-devel-5.14.21-150400.15.5.1.x86_64",
            "SUSE Real Time Module 15 SP4:kernel-rt_debug-5.14.21-150400.15.5.1.x86_64",
            "SUSE Real Time Module 15 SP4:kernel-rt_debug-devel-5.14.21-150400.15.5.1.x86_64",
            "SUSE Real Time Module 15 SP4:kernel-source-rt-5.14.21-150400.15.5.1.noarch",
            "SUSE Real Time Module 15 SP4:kernel-syms-rt-5.14.21-150400.15.5.1.x86_64",
            "SUSE Real Time Module 15 SP4:ocfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64",
            "openSUSE Leap 15.4:cluster-md-kmp-rt-5.14.21-150400.15.5.1.x86_64",
            "openSUSE Leap 15.4:dlm-kmp-rt-5.14.21-150400.15.5.1.x86_64",
            "openSUSE Leap 15.4:gfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64",
            "openSUSE Leap 15.4:kernel-devel-rt-5.14.21-150400.15.5.1.noarch",
            "openSUSE Leap 15.4:kernel-rt-5.14.21-150400.15.5.1.x86_64",
            "openSUSE Leap 15.4:kernel-rt-devel-5.14.21-150400.15.5.1.x86_64",
            "openSUSE Leap 15.4:kernel-rt_debug-5.14.21-150400.15.5.1.x86_64",
            "openSUSE Leap 15.4:kernel-rt_debug-devel-5.14.21-150400.15.5.1.x86_64",
            "openSUSE Leap 15.4:kernel-source-rt-5.14.21-150400.15.5.1.noarch",
            "openSUSE Leap 15.4:kernel-syms-rt-5.14.21-150400.15.5.1.x86_64",
            "openSUSE Leap 15.4:ocfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2022-12-23T10:39:17Z",
          "details": "moderate"
        }
      ],
      "title": "CVE-2022-2639"
    },
    {
      "cve": "CVE-2022-2663",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2022-2663"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "An issue was found in the Linux kernel in nf_conntrack_irc where the message handling can be confused and incorrectly matches the message. A firewall may be able to be bypassed when users are using unencrypted IRC with nf_conntrack_irc configured.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_15_5-rt-1-150400.1.3.1.x86_64",
          "SUSE Real Time Module 15 SP4:cluster-md-kmp-rt-5.14.21-150400.15.5.1.x86_64",
          "SUSE Real Time Module 15 SP4:dlm-kmp-rt-5.14.21-150400.15.5.1.x86_64",
          "SUSE Real Time Module 15 SP4:gfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64",
          "SUSE Real Time Module 15 SP4:kernel-devel-rt-5.14.21-150400.15.5.1.noarch",
          "SUSE Real Time Module 15 SP4:kernel-rt-5.14.21-150400.15.5.1.x86_64",
          "SUSE Real Time Module 15 SP4:kernel-rt-devel-5.14.21-150400.15.5.1.x86_64",
          "SUSE Real Time Module 15 SP4:kernel-rt_debug-5.14.21-150400.15.5.1.x86_64",
          "SUSE Real Time Module 15 SP4:kernel-rt_debug-devel-5.14.21-150400.15.5.1.x86_64",
          "SUSE Real Time Module 15 SP4:kernel-source-rt-5.14.21-150400.15.5.1.noarch",
          "SUSE Real Time Module 15 SP4:kernel-syms-rt-5.14.21-150400.15.5.1.x86_64",
          "SUSE Real Time Module 15 SP4:ocfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64",
          "openSUSE Leap 15.4:cluster-md-kmp-rt-5.14.21-150400.15.5.1.x86_64",
          "openSUSE Leap 15.4:dlm-kmp-rt-5.14.21-150400.15.5.1.x86_64",
          "openSUSE Leap 15.4:gfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64",
          "openSUSE Leap 15.4:kernel-devel-rt-5.14.21-150400.15.5.1.noarch",
          "openSUSE Leap 15.4:kernel-rt-5.14.21-150400.15.5.1.x86_64",
          "openSUSE Leap 15.4:kernel-rt-devel-5.14.21-150400.15.5.1.x86_64",
          "openSUSE Leap 15.4:kernel-rt_debug-5.14.21-150400.15.5.1.x86_64",
          "openSUSE Leap 15.4:kernel-rt_debug-devel-5.14.21-150400.15.5.1.x86_64",
          "openSUSE Leap 15.4:kernel-source-rt-5.14.21-150400.15.5.1.noarch",
          "openSUSE Leap 15.4:kernel-syms-rt-5.14.21-150400.15.5.1.x86_64",
          "openSUSE Leap 15.4:ocfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2022-2663",
          "url": "https://www.suse.com/security/cve/CVE-2022-2663"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1202097 for CVE-2022-2663",
          "url": "https://bugzilla.suse.com/1202097"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1212299 for CVE-2022-2663",
          "url": "https://bugzilla.suse.com/1212299"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_15_5-rt-1-150400.1.3.1.x86_64",
            "SUSE Real Time Module 15 SP4:cluster-md-kmp-rt-5.14.21-150400.15.5.1.x86_64",
            "SUSE Real Time Module 15 SP4:dlm-kmp-rt-5.14.21-150400.15.5.1.x86_64",
            "SUSE Real Time Module 15 SP4:gfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64",
            "SUSE Real Time Module 15 SP4:kernel-devel-rt-5.14.21-150400.15.5.1.noarch",
            "SUSE Real Time Module 15 SP4:kernel-rt-5.14.21-150400.15.5.1.x86_64",
            "SUSE Real Time Module 15 SP4:kernel-rt-devel-5.14.21-150400.15.5.1.x86_64",
            "SUSE Real Time Module 15 SP4:kernel-rt_debug-5.14.21-150400.15.5.1.x86_64",
            "SUSE Real Time Module 15 SP4:kernel-rt_debug-devel-5.14.21-150400.15.5.1.x86_64",
            "SUSE Real Time Module 15 SP4:kernel-source-rt-5.14.21-150400.15.5.1.noarch",
            "SUSE Real Time Module 15 SP4:kernel-syms-rt-5.14.21-150400.15.5.1.x86_64",
            "SUSE Real Time Module 15 SP4:ocfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64",
            "openSUSE Leap 15.4:cluster-md-kmp-rt-5.14.21-150400.15.5.1.x86_64",
            "openSUSE Leap 15.4:dlm-kmp-rt-5.14.21-150400.15.5.1.x86_64",
            "openSUSE Leap 15.4:gfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64",
            "openSUSE Leap 15.4:kernel-devel-rt-5.14.21-150400.15.5.1.noarch",
            "openSUSE Leap 15.4:kernel-rt-5.14.21-150400.15.5.1.x86_64",
            "openSUSE Leap 15.4:kernel-rt-devel-5.14.21-150400.15.5.1.x86_64",
            "openSUSE Leap 15.4:kernel-rt_debug-5.14.21-150400.15.5.1.x86_64",
            "openSUSE Leap 15.4:kernel-rt_debug-devel-5.14.21-150400.15.5.1.x86_64",
            "openSUSE Leap 15.4:kernel-source-rt-5.14.21-150400.15.5.1.noarch",
            "openSUSE Leap 15.4:kernel-syms-rt-5.14.21-150400.15.5.1.x86_64",
            "openSUSE Leap 15.4:ocfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 5.9,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:N",
            "version": "3.1"
          },
          "products": [
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_15_5-rt-1-150400.1.3.1.x86_64",
            "SUSE Real Time Module 15 SP4:cluster-md-kmp-rt-5.14.21-150400.15.5.1.x86_64",
            "SUSE Real Time Module 15 SP4:dlm-kmp-rt-5.14.21-150400.15.5.1.x86_64",
            "SUSE Real Time Module 15 SP4:gfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64",
            "SUSE Real Time Module 15 SP4:kernel-devel-rt-5.14.21-150400.15.5.1.noarch",
            "SUSE Real Time Module 15 SP4:kernel-rt-5.14.21-150400.15.5.1.x86_64",
            "SUSE Real Time Module 15 SP4:kernel-rt-devel-5.14.21-150400.15.5.1.x86_64",
            "SUSE Real Time Module 15 SP4:kernel-rt_debug-5.14.21-150400.15.5.1.x86_64",
            "SUSE Real Time Module 15 SP4:kernel-rt_debug-devel-5.14.21-150400.15.5.1.x86_64",
            "SUSE Real Time Module 15 SP4:kernel-source-rt-5.14.21-150400.15.5.1.noarch",
            "SUSE Real Time Module 15 SP4:kernel-syms-rt-5.14.21-150400.15.5.1.x86_64",
            "SUSE Real Time Module 15 SP4:ocfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64",
            "openSUSE Leap 15.4:cluster-md-kmp-rt-5.14.21-150400.15.5.1.x86_64",
            "openSUSE Leap 15.4:dlm-kmp-rt-5.14.21-150400.15.5.1.x86_64",
            "openSUSE Leap 15.4:gfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64",
            "openSUSE Leap 15.4:kernel-devel-rt-5.14.21-150400.15.5.1.noarch",
            "openSUSE Leap 15.4:kernel-rt-5.14.21-150400.15.5.1.x86_64",
            "openSUSE Leap 15.4:kernel-rt-devel-5.14.21-150400.15.5.1.x86_64",
            "openSUSE Leap 15.4:kernel-rt_debug-5.14.21-150400.15.5.1.x86_64",
            "openSUSE Leap 15.4:kernel-rt_debug-devel-5.14.21-150400.15.5.1.x86_64",
            "openSUSE Leap 15.4:kernel-source-rt-5.14.21-150400.15.5.1.noarch",
            "openSUSE Leap 15.4:kernel-syms-rt-5.14.21-150400.15.5.1.x86_64",
            "openSUSE Leap 15.4:ocfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2022-12-23T10:39:17Z",
          "details": "moderate"
        }
      ],
      "title": "CVE-2022-2663"
    },
    {
      "cve": "CVE-2022-28356",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2022-28356"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "In the Linux kernel before 5.17.1, a refcount leak bug was found in net/llc/af_llc.c.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_15_5-rt-1-150400.1.3.1.x86_64",
          "SUSE Real Time Module 15 SP4:cluster-md-kmp-rt-5.14.21-150400.15.5.1.x86_64",
          "SUSE Real Time Module 15 SP4:dlm-kmp-rt-5.14.21-150400.15.5.1.x86_64",
          "SUSE Real Time Module 15 SP4:gfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64",
          "SUSE Real Time Module 15 SP4:kernel-devel-rt-5.14.21-150400.15.5.1.noarch",
          "SUSE Real Time Module 15 SP4:kernel-rt-5.14.21-150400.15.5.1.x86_64",
          "SUSE Real Time Module 15 SP4:kernel-rt-devel-5.14.21-150400.15.5.1.x86_64",
          "SUSE Real Time Module 15 SP4:kernel-rt_debug-5.14.21-150400.15.5.1.x86_64",
          "SUSE Real Time Module 15 SP4:kernel-rt_debug-devel-5.14.21-150400.15.5.1.x86_64",
          "SUSE Real Time Module 15 SP4:kernel-source-rt-5.14.21-150400.15.5.1.noarch",
          "SUSE Real Time Module 15 SP4:kernel-syms-rt-5.14.21-150400.15.5.1.x86_64",
          "SUSE Real Time Module 15 SP4:ocfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64",
          "openSUSE Leap 15.4:cluster-md-kmp-rt-5.14.21-150400.15.5.1.x86_64",
          "openSUSE Leap 15.4:dlm-kmp-rt-5.14.21-150400.15.5.1.x86_64",
          "openSUSE Leap 15.4:gfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64",
          "openSUSE Leap 15.4:kernel-devel-rt-5.14.21-150400.15.5.1.noarch",
          "openSUSE Leap 15.4:kernel-rt-5.14.21-150400.15.5.1.x86_64",
          "openSUSE Leap 15.4:kernel-rt-devel-5.14.21-150400.15.5.1.x86_64",
          "openSUSE Leap 15.4:kernel-rt_debug-5.14.21-150400.15.5.1.x86_64",
          "openSUSE Leap 15.4:kernel-rt_debug-devel-5.14.21-150400.15.5.1.x86_64",
          "openSUSE Leap 15.4:kernel-source-rt-5.14.21-150400.15.5.1.noarch",
          "openSUSE Leap 15.4:kernel-syms-rt-5.14.21-150400.15.5.1.x86_64",
          "openSUSE Leap 15.4:ocfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2022-28356",
          "url": "https://www.suse.com/security/cve/CVE-2022-28356"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1197391 for CVE-2022-28356",
          "url": "https://bugzilla.suse.com/1197391"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_15_5-rt-1-150400.1.3.1.x86_64",
            "SUSE Real Time Module 15 SP4:cluster-md-kmp-rt-5.14.21-150400.15.5.1.x86_64",
            "SUSE Real Time Module 15 SP4:dlm-kmp-rt-5.14.21-150400.15.5.1.x86_64",
            "SUSE Real Time Module 15 SP4:gfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64",
            "SUSE Real Time Module 15 SP4:kernel-devel-rt-5.14.21-150400.15.5.1.noarch",
            "SUSE Real Time Module 15 SP4:kernel-rt-5.14.21-150400.15.5.1.x86_64",
            "SUSE Real Time Module 15 SP4:kernel-rt-devel-5.14.21-150400.15.5.1.x86_64",
            "SUSE Real Time Module 15 SP4:kernel-rt_debug-5.14.21-150400.15.5.1.x86_64",
            "SUSE Real Time Module 15 SP4:kernel-rt_debug-devel-5.14.21-150400.15.5.1.x86_64",
            "SUSE Real Time Module 15 SP4:kernel-source-rt-5.14.21-150400.15.5.1.noarch",
            "SUSE Real Time Module 15 SP4:kernel-syms-rt-5.14.21-150400.15.5.1.x86_64",
            "SUSE Real Time Module 15 SP4:ocfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64",
            "openSUSE Leap 15.4:cluster-md-kmp-rt-5.14.21-150400.15.5.1.x86_64",
            "openSUSE Leap 15.4:dlm-kmp-rt-5.14.21-150400.15.5.1.x86_64",
            "openSUSE Leap 15.4:gfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64",
            "openSUSE Leap 15.4:kernel-devel-rt-5.14.21-150400.15.5.1.noarch",
            "openSUSE Leap 15.4:kernel-rt-5.14.21-150400.15.5.1.x86_64",
            "openSUSE Leap 15.4:kernel-rt-devel-5.14.21-150400.15.5.1.x86_64",
            "openSUSE Leap 15.4:kernel-rt_debug-5.14.21-150400.15.5.1.x86_64",
            "openSUSE Leap 15.4:kernel-rt_debug-devel-5.14.21-150400.15.5.1.x86_64",
            "openSUSE Leap 15.4:kernel-source-rt-5.14.21-150400.15.5.1.noarch",
            "openSUSE Leap 15.4:kernel-syms-rt-5.14.21-150400.15.5.1.x86_64",
            "openSUSE Leap 15.4:ocfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 5.5,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
            "version": "3.1"
          },
          "products": [
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_15_5-rt-1-150400.1.3.1.x86_64",
            "SUSE Real Time Module 15 SP4:cluster-md-kmp-rt-5.14.21-150400.15.5.1.x86_64",
            "SUSE Real Time Module 15 SP4:dlm-kmp-rt-5.14.21-150400.15.5.1.x86_64",
            "SUSE Real Time Module 15 SP4:gfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64",
            "SUSE Real Time Module 15 SP4:kernel-devel-rt-5.14.21-150400.15.5.1.noarch",
            "SUSE Real Time Module 15 SP4:kernel-rt-5.14.21-150400.15.5.1.x86_64",
            "SUSE Real Time Module 15 SP4:kernel-rt-devel-5.14.21-150400.15.5.1.x86_64",
            "SUSE Real Time Module 15 SP4:kernel-rt_debug-5.14.21-150400.15.5.1.x86_64",
            "SUSE Real Time Module 15 SP4:kernel-rt_debug-devel-5.14.21-150400.15.5.1.x86_64",
            "SUSE Real Time Module 15 SP4:kernel-source-rt-5.14.21-150400.15.5.1.noarch",
            "SUSE Real Time Module 15 SP4:kernel-syms-rt-5.14.21-150400.15.5.1.x86_64",
            "SUSE Real Time Module 15 SP4:ocfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64",
            "openSUSE Leap 15.4:cluster-md-kmp-rt-5.14.21-150400.15.5.1.x86_64",
            "openSUSE Leap 15.4:dlm-kmp-rt-5.14.21-150400.15.5.1.x86_64",
            "openSUSE Leap 15.4:gfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64",
            "openSUSE Leap 15.4:kernel-devel-rt-5.14.21-150400.15.5.1.noarch",
            "openSUSE Leap 15.4:kernel-rt-5.14.21-150400.15.5.1.x86_64",
            "openSUSE Leap 15.4:kernel-rt-devel-5.14.21-150400.15.5.1.x86_64",
            "openSUSE Leap 15.4:kernel-rt_debug-5.14.21-150400.15.5.1.x86_64",
            "openSUSE Leap 15.4:kernel-rt_debug-devel-5.14.21-150400.15.5.1.x86_64",
            "openSUSE Leap 15.4:kernel-source-rt-5.14.21-150400.15.5.1.noarch",
            "openSUSE Leap 15.4:kernel-syms-rt-5.14.21-150400.15.5.1.x86_64",
            "openSUSE Leap 15.4:ocfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2022-12-23T10:39:17Z",
          "details": "moderate"
        }
      ],
      "title": "CVE-2022-28356"
    },
    {
      "cve": "CVE-2022-28693",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2022-28693"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "Unprotected alternative channel of return branch target prediction in some Intel(R) Processors may allow an authorized user to potentially enable information disclosure via local access.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_15_5-rt-1-150400.1.3.1.x86_64",
          "SUSE Real Time Module 15 SP4:cluster-md-kmp-rt-5.14.21-150400.15.5.1.x86_64",
          "SUSE Real Time Module 15 SP4:dlm-kmp-rt-5.14.21-150400.15.5.1.x86_64",
          "SUSE Real Time Module 15 SP4:gfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64",
          "SUSE Real Time Module 15 SP4:kernel-devel-rt-5.14.21-150400.15.5.1.noarch",
          "SUSE Real Time Module 15 SP4:kernel-rt-5.14.21-150400.15.5.1.x86_64",
          "SUSE Real Time Module 15 SP4:kernel-rt-devel-5.14.21-150400.15.5.1.x86_64",
          "SUSE Real Time Module 15 SP4:kernel-rt_debug-5.14.21-150400.15.5.1.x86_64",
          "SUSE Real Time Module 15 SP4:kernel-rt_debug-devel-5.14.21-150400.15.5.1.x86_64",
          "SUSE Real Time Module 15 SP4:kernel-source-rt-5.14.21-150400.15.5.1.noarch",
          "SUSE Real Time Module 15 SP4:kernel-syms-rt-5.14.21-150400.15.5.1.x86_64",
          "SUSE Real Time Module 15 SP4:ocfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64",
          "openSUSE Leap 15.4:cluster-md-kmp-rt-5.14.21-150400.15.5.1.x86_64",
          "openSUSE Leap 15.4:dlm-kmp-rt-5.14.21-150400.15.5.1.x86_64",
          "openSUSE Leap 15.4:gfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64",
          "openSUSE Leap 15.4:kernel-devel-rt-5.14.21-150400.15.5.1.noarch",
          "openSUSE Leap 15.4:kernel-rt-5.14.21-150400.15.5.1.x86_64",
          "openSUSE Leap 15.4:kernel-rt-devel-5.14.21-150400.15.5.1.x86_64",
          "openSUSE Leap 15.4:kernel-rt_debug-5.14.21-150400.15.5.1.x86_64",
          "openSUSE Leap 15.4:kernel-rt_debug-devel-5.14.21-150400.15.5.1.x86_64",
          "openSUSE Leap 15.4:kernel-source-rt-5.14.21-150400.15.5.1.noarch",
          "openSUSE Leap 15.4:kernel-syms-rt-5.14.21-150400.15.5.1.x86_64",
          "openSUSE Leap 15.4:ocfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2022-28693",
          "url": "https://www.suse.com/security/cve/CVE-2022-28693"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1201455 for CVE-2022-28693",
          "url": "https://bugzilla.suse.com/1201455"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_15_5-rt-1-150400.1.3.1.x86_64",
            "SUSE Real Time Module 15 SP4:cluster-md-kmp-rt-5.14.21-150400.15.5.1.x86_64",
            "SUSE Real Time Module 15 SP4:dlm-kmp-rt-5.14.21-150400.15.5.1.x86_64",
            "SUSE Real Time Module 15 SP4:gfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64",
            "SUSE Real Time Module 15 SP4:kernel-devel-rt-5.14.21-150400.15.5.1.noarch",
            "SUSE Real Time Module 15 SP4:kernel-rt-5.14.21-150400.15.5.1.x86_64",
            "SUSE Real Time Module 15 SP4:kernel-rt-devel-5.14.21-150400.15.5.1.x86_64",
            "SUSE Real Time Module 15 SP4:kernel-rt_debug-5.14.21-150400.15.5.1.x86_64",
            "SUSE Real Time Module 15 SP4:kernel-rt_debug-devel-5.14.21-150400.15.5.1.x86_64",
            "SUSE Real Time Module 15 SP4:kernel-source-rt-5.14.21-150400.15.5.1.noarch",
            "SUSE Real Time Module 15 SP4:kernel-syms-rt-5.14.21-150400.15.5.1.x86_64",
            "SUSE Real Time Module 15 SP4:ocfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64",
            "openSUSE Leap 15.4:cluster-md-kmp-rt-5.14.21-150400.15.5.1.x86_64",
            "openSUSE Leap 15.4:dlm-kmp-rt-5.14.21-150400.15.5.1.x86_64",
            "openSUSE Leap 15.4:gfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64",
            "openSUSE Leap 15.4:kernel-devel-rt-5.14.21-150400.15.5.1.noarch",
            "openSUSE Leap 15.4:kernel-rt-5.14.21-150400.15.5.1.x86_64",
            "openSUSE Leap 15.4:kernel-rt-devel-5.14.21-150400.15.5.1.x86_64",
            "openSUSE Leap 15.4:kernel-rt_debug-5.14.21-150400.15.5.1.x86_64",
            "openSUSE Leap 15.4:kernel-rt_debug-devel-5.14.21-150400.15.5.1.x86_64",
            "openSUSE Leap 15.4:kernel-source-rt-5.14.21-150400.15.5.1.noarch",
            "openSUSE Leap 15.4:kernel-syms-rt-5.14.21-150400.15.5.1.x86_64",
            "openSUSE Leap 15.4:ocfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 4.7,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:N/A:N",
            "version": "3.1"
          },
          "products": [
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_15_5-rt-1-150400.1.3.1.x86_64",
            "SUSE Real Time Module 15 SP4:cluster-md-kmp-rt-5.14.21-150400.15.5.1.x86_64",
            "SUSE Real Time Module 15 SP4:dlm-kmp-rt-5.14.21-150400.15.5.1.x86_64",
            "SUSE Real Time Module 15 SP4:gfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64",
            "SUSE Real Time Module 15 SP4:kernel-devel-rt-5.14.21-150400.15.5.1.noarch",
            "SUSE Real Time Module 15 SP4:kernel-rt-5.14.21-150400.15.5.1.x86_64",
            "SUSE Real Time Module 15 SP4:kernel-rt-devel-5.14.21-150400.15.5.1.x86_64",
            "SUSE Real Time Module 15 SP4:kernel-rt_debug-5.14.21-150400.15.5.1.x86_64",
            "SUSE Real Time Module 15 SP4:kernel-rt_debug-devel-5.14.21-150400.15.5.1.x86_64",
            "SUSE Real Time Module 15 SP4:kernel-source-rt-5.14.21-150400.15.5.1.noarch",
            "SUSE Real Time Module 15 SP4:kernel-syms-rt-5.14.21-150400.15.5.1.x86_64",
            "SUSE Real Time Module 15 SP4:ocfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64",
            "openSUSE Leap 15.4:cluster-md-kmp-rt-5.14.21-150400.15.5.1.x86_64",
            "openSUSE Leap 15.4:dlm-kmp-rt-5.14.21-150400.15.5.1.x86_64",
            "openSUSE Leap 15.4:gfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64",
            "openSUSE Leap 15.4:kernel-devel-rt-5.14.21-150400.15.5.1.noarch",
            "openSUSE Leap 15.4:kernel-rt-5.14.21-150400.15.5.1.x86_64",
            "openSUSE Leap 15.4:kernel-rt-devel-5.14.21-150400.15.5.1.x86_64",
            "openSUSE Leap 15.4:kernel-rt_debug-5.14.21-150400.15.5.1.x86_64",
            "openSUSE Leap 15.4:kernel-rt_debug-devel-5.14.21-150400.15.5.1.x86_64",
            "openSUSE Leap 15.4:kernel-source-rt-5.14.21-150400.15.5.1.noarch",
            "openSUSE Leap 15.4:kernel-syms-rt-5.14.21-150400.15.5.1.x86_64",
            "openSUSE Leap 15.4:ocfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2022-12-23T10:39:17Z",
          "details": "moderate"
        }
      ],
      "title": "CVE-2022-28693"
    },
    {
      "cve": "CVE-2022-2873",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2022-2873"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "An out-of-bounds memory access flaw was found in the Linux kernel Intel\u0027s iSMT SMBus host controller driver in the way a user triggers the I2C_SMBUS_BLOCK_DATA (with the ioctl I2C_SMBUS) with malicious input data. This flaw allows a local user to crash the system.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_15_5-rt-1-150400.1.3.1.x86_64",
          "SUSE Real Time Module 15 SP4:cluster-md-kmp-rt-5.14.21-150400.15.5.1.x86_64",
          "SUSE Real Time Module 15 SP4:dlm-kmp-rt-5.14.21-150400.15.5.1.x86_64",
          "SUSE Real Time Module 15 SP4:gfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64",
          "SUSE Real Time Module 15 SP4:kernel-devel-rt-5.14.21-150400.15.5.1.noarch",
          "SUSE Real Time Module 15 SP4:kernel-rt-5.14.21-150400.15.5.1.x86_64",
          "SUSE Real Time Module 15 SP4:kernel-rt-devel-5.14.21-150400.15.5.1.x86_64",
          "SUSE Real Time Module 15 SP4:kernel-rt_debug-5.14.21-150400.15.5.1.x86_64",
          "SUSE Real Time Module 15 SP4:kernel-rt_debug-devel-5.14.21-150400.15.5.1.x86_64",
          "SUSE Real Time Module 15 SP4:kernel-source-rt-5.14.21-150400.15.5.1.noarch",
          "SUSE Real Time Module 15 SP4:kernel-syms-rt-5.14.21-150400.15.5.1.x86_64",
          "SUSE Real Time Module 15 SP4:ocfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64",
          "openSUSE Leap 15.4:cluster-md-kmp-rt-5.14.21-150400.15.5.1.x86_64",
          "openSUSE Leap 15.4:dlm-kmp-rt-5.14.21-150400.15.5.1.x86_64",
          "openSUSE Leap 15.4:gfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64",
          "openSUSE Leap 15.4:kernel-devel-rt-5.14.21-150400.15.5.1.noarch",
          "openSUSE Leap 15.4:kernel-rt-5.14.21-150400.15.5.1.x86_64",
          "openSUSE Leap 15.4:kernel-rt-devel-5.14.21-150400.15.5.1.x86_64",
          "openSUSE Leap 15.4:kernel-rt_debug-5.14.21-150400.15.5.1.x86_64",
          "openSUSE Leap 15.4:kernel-rt_debug-devel-5.14.21-150400.15.5.1.x86_64",
          "openSUSE Leap 15.4:kernel-source-rt-5.14.21-150400.15.5.1.noarch",
          "openSUSE Leap 15.4:kernel-syms-rt-5.14.21-150400.15.5.1.x86_64",
          "openSUSE Leap 15.4:ocfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2022-2873",
          "url": "https://www.suse.com/security/cve/CVE-2022-2873"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1202558 for CVE-2022-2873",
          "url": "https://bugzilla.suse.com/1202558"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_15_5-rt-1-150400.1.3.1.x86_64",
            "SUSE Real Time Module 15 SP4:cluster-md-kmp-rt-5.14.21-150400.15.5.1.x86_64",
            "SUSE Real Time Module 15 SP4:dlm-kmp-rt-5.14.21-150400.15.5.1.x86_64",
            "SUSE Real Time Module 15 SP4:gfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64",
            "SUSE Real Time Module 15 SP4:kernel-devel-rt-5.14.21-150400.15.5.1.noarch",
            "SUSE Real Time Module 15 SP4:kernel-rt-5.14.21-150400.15.5.1.x86_64",
            "SUSE Real Time Module 15 SP4:kernel-rt-devel-5.14.21-150400.15.5.1.x86_64",
            "SUSE Real Time Module 15 SP4:kernel-rt_debug-5.14.21-150400.15.5.1.x86_64",
            "SUSE Real Time Module 15 SP4:kernel-rt_debug-devel-5.14.21-150400.15.5.1.x86_64",
            "SUSE Real Time Module 15 SP4:kernel-source-rt-5.14.21-150400.15.5.1.noarch",
            "SUSE Real Time Module 15 SP4:kernel-syms-rt-5.14.21-150400.15.5.1.x86_64",
            "SUSE Real Time Module 15 SP4:ocfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64",
            "openSUSE Leap 15.4:cluster-md-kmp-rt-5.14.21-150400.15.5.1.x86_64",
            "openSUSE Leap 15.4:dlm-kmp-rt-5.14.21-150400.15.5.1.x86_64",
            "openSUSE Leap 15.4:gfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64",
            "openSUSE Leap 15.4:kernel-devel-rt-5.14.21-150400.15.5.1.noarch",
            "openSUSE Leap 15.4:kernel-rt-5.14.21-150400.15.5.1.x86_64",
            "openSUSE Leap 15.4:kernel-rt-devel-5.14.21-150400.15.5.1.x86_64",
            "openSUSE Leap 15.4:kernel-rt_debug-5.14.21-150400.15.5.1.x86_64",
            "openSUSE Leap 15.4:kernel-rt_debug-devel-5.14.21-150400.15.5.1.x86_64",
            "openSUSE Leap 15.4:kernel-source-rt-5.14.21-150400.15.5.1.noarch",
            "openSUSE Leap 15.4:kernel-syms-rt-5.14.21-150400.15.5.1.x86_64",
            "openSUSE Leap 15.4:ocfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 4.2,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:R/S:U/C:N/I:N/A:H",
            "version": "3.1"
          },
          "products": [
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_15_5-rt-1-150400.1.3.1.x86_64",
            "SUSE Real Time Module 15 SP4:cluster-md-kmp-rt-5.14.21-150400.15.5.1.x86_64",
            "SUSE Real Time Module 15 SP4:dlm-kmp-rt-5.14.21-150400.15.5.1.x86_64",
            "SUSE Real Time Module 15 SP4:gfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64",
            "SUSE Real Time Module 15 SP4:kernel-devel-rt-5.14.21-150400.15.5.1.noarch",
            "SUSE Real Time Module 15 SP4:kernel-rt-5.14.21-150400.15.5.1.x86_64",
            "SUSE Real Time Module 15 SP4:kernel-rt-devel-5.14.21-150400.15.5.1.x86_64",
            "SUSE Real Time Module 15 SP4:kernel-rt_debug-5.14.21-150400.15.5.1.x86_64",
            "SUSE Real Time Module 15 SP4:kernel-rt_debug-devel-5.14.21-150400.15.5.1.x86_64",
            "SUSE Real Time Module 15 SP4:kernel-source-rt-5.14.21-150400.15.5.1.noarch",
            "SUSE Real Time Module 15 SP4:kernel-syms-rt-5.14.21-150400.15.5.1.x86_64",
            "SUSE Real Time Module 15 SP4:ocfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64",
            "openSUSE Leap 15.4:cluster-md-kmp-rt-5.14.21-150400.15.5.1.x86_64",
            "openSUSE Leap 15.4:dlm-kmp-rt-5.14.21-150400.15.5.1.x86_64",
            "openSUSE Leap 15.4:gfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64",
            "openSUSE Leap 15.4:kernel-devel-rt-5.14.21-150400.15.5.1.noarch",
            "openSUSE Leap 15.4:kernel-rt-5.14.21-150400.15.5.1.x86_64",
            "openSUSE Leap 15.4:kernel-rt-devel-5.14.21-150400.15.5.1.x86_64",
            "openSUSE Leap 15.4:kernel-rt_debug-5.14.21-150400.15.5.1.x86_64",
            "openSUSE Leap 15.4:kernel-rt_debug-devel-5.14.21-150400.15.5.1.x86_64",
            "openSUSE Leap 15.4:kernel-source-rt-5.14.21-150400.15.5.1.noarch",
            "openSUSE Leap 15.4:kernel-syms-rt-5.14.21-150400.15.5.1.x86_64",
            "openSUSE Leap 15.4:ocfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2022-12-23T10:39:17Z",
          "details": "moderate"
        }
      ],
      "title": "CVE-2022-2873"
    },
    {
      "cve": "CVE-2022-28748",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2022-28748"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "** REJECT ** DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: CVE-2022-2964. Reason: This candidate is a reservation duplicate of CVE-2022-2964. Notes: All CVE users should reference CVE-2022-2964 instead of this candidate. All references and descriptions in this candidate have been removed to prevent accidental usage.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_15_5-rt-1-150400.1.3.1.x86_64",
          "SUSE Real Time Module 15 SP4:cluster-md-kmp-rt-5.14.21-150400.15.5.1.x86_64",
          "SUSE Real Time Module 15 SP4:dlm-kmp-rt-5.14.21-150400.15.5.1.x86_64",
          "SUSE Real Time Module 15 SP4:gfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64",
          "SUSE Real Time Module 15 SP4:kernel-devel-rt-5.14.21-150400.15.5.1.noarch",
          "SUSE Real Time Module 15 SP4:kernel-rt-5.14.21-150400.15.5.1.x86_64",
          "SUSE Real Time Module 15 SP4:kernel-rt-devel-5.14.21-150400.15.5.1.x86_64",
          "SUSE Real Time Module 15 SP4:kernel-rt_debug-5.14.21-150400.15.5.1.x86_64",
          "SUSE Real Time Module 15 SP4:kernel-rt_debug-devel-5.14.21-150400.15.5.1.x86_64",
          "SUSE Real Time Module 15 SP4:kernel-source-rt-5.14.21-150400.15.5.1.noarch",
          "SUSE Real Time Module 15 SP4:kernel-syms-rt-5.14.21-150400.15.5.1.x86_64",
          "SUSE Real Time Module 15 SP4:ocfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64",
          "openSUSE Leap 15.4:cluster-md-kmp-rt-5.14.21-150400.15.5.1.x86_64",
          "openSUSE Leap 15.4:dlm-kmp-rt-5.14.21-150400.15.5.1.x86_64",
          "openSUSE Leap 15.4:gfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64",
          "openSUSE Leap 15.4:kernel-devel-rt-5.14.21-150400.15.5.1.noarch",
          "openSUSE Leap 15.4:kernel-rt-5.14.21-150400.15.5.1.x86_64",
          "openSUSE Leap 15.4:kernel-rt-devel-5.14.21-150400.15.5.1.x86_64",
          "openSUSE Leap 15.4:kernel-rt_debug-5.14.21-150400.15.5.1.x86_64",
          "openSUSE Leap 15.4:kernel-rt_debug-devel-5.14.21-150400.15.5.1.x86_64",
          "openSUSE Leap 15.4:kernel-source-rt-5.14.21-150400.15.5.1.noarch",
          "openSUSE Leap 15.4:kernel-syms-rt-5.14.21-150400.15.5.1.x86_64",
          "openSUSE Leap 15.4:ocfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2022-28748",
          "url": "https://www.suse.com/security/cve/CVE-2022-28748"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1196018 for CVE-2022-28748",
          "url": "https://bugzilla.suse.com/1196018"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_15_5-rt-1-150400.1.3.1.x86_64",
            "SUSE Real Time Module 15 SP4:cluster-md-kmp-rt-5.14.21-150400.15.5.1.x86_64",
            "SUSE Real Time Module 15 SP4:dlm-kmp-rt-5.14.21-150400.15.5.1.x86_64",
            "SUSE Real Time Module 15 SP4:gfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64",
            "SUSE Real Time Module 15 SP4:kernel-devel-rt-5.14.21-150400.15.5.1.noarch",
            "SUSE Real Time Module 15 SP4:kernel-rt-5.14.21-150400.15.5.1.x86_64",
            "SUSE Real Time Module 15 SP4:kernel-rt-devel-5.14.21-150400.15.5.1.x86_64",
            "SUSE Real Time Module 15 SP4:kernel-rt_debug-5.14.21-150400.15.5.1.x86_64",
            "SUSE Real Time Module 15 SP4:kernel-rt_debug-devel-5.14.21-150400.15.5.1.x86_64",
            "SUSE Real Time Module 15 SP4:kernel-source-rt-5.14.21-150400.15.5.1.noarch",
            "SUSE Real Time Module 15 SP4:kernel-syms-rt-5.14.21-150400.15.5.1.x86_64",
            "SUSE Real Time Module 15 SP4:ocfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64",
            "openSUSE Leap 15.4:cluster-md-kmp-rt-5.14.21-150400.15.5.1.x86_64",
            "openSUSE Leap 15.4:dlm-kmp-rt-5.14.21-150400.15.5.1.x86_64",
            "openSUSE Leap 15.4:gfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64",
            "openSUSE Leap 15.4:kernel-devel-rt-5.14.21-150400.15.5.1.noarch",
            "openSUSE Leap 15.4:kernel-rt-5.14.21-150400.15.5.1.x86_64",
            "openSUSE Leap 15.4:kernel-rt-devel-5.14.21-150400.15.5.1.x86_64",
            "openSUSE Leap 15.4:kernel-rt_debug-5.14.21-150400.15.5.1.x86_64",
            "openSUSE Leap 15.4:kernel-rt_debug-devel-5.14.21-150400.15.5.1.x86_64",
            "openSUSE Leap 15.4:kernel-source-rt-5.14.21-150400.15.5.1.noarch",
            "openSUSE Leap 15.4:kernel-syms-rt-5.14.21-150400.15.5.1.x86_64",
            "openSUSE Leap 15.4:ocfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 3.7,
            "baseSeverity": "LOW",
            "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:N",
            "version": "3.1"
          },
          "products": [
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_15_5-rt-1-150400.1.3.1.x86_64",
            "SUSE Real Time Module 15 SP4:cluster-md-kmp-rt-5.14.21-150400.15.5.1.x86_64",
            "SUSE Real Time Module 15 SP4:dlm-kmp-rt-5.14.21-150400.15.5.1.x86_64",
            "SUSE Real Time Module 15 SP4:gfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64",
            "SUSE Real Time Module 15 SP4:kernel-devel-rt-5.14.21-150400.15.5.1.noarch",
            "SUSE Real Time Module 15 SP4:kernel-rt-5.14.21-150400.15.5.1.x86_64",
            "SUSE Real Time Module 15 SP4:kernel-rt-devel-5.14.21-150400.15.5.1.x86_64",
            "SUSE Real Time Module 15 SP4:kernel-rt_debug-5.14.21-150400.15.5.1.x86_64",
            "SUSE Real Time Module 15 SP4:kernel-rt_debug-devel-5.14.21-150400.15.5.1.x86_64",
            "SUSE Real Time Module 15 SP4:kernel-source-rt-5.14.21-150400.15.5.1.noarch",
            "SUSE Real Time Module 15 SP4:kernel-syms-rt-5.14.21-150400.15.5.1.x86_64",
            "SUSE Real Time Module 15 SP4:ocfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64",
            "openSUSE Leap 15.4:cluster-md-kmp-rt-5.14.21-150400.15.5.1.x86_64",
            "openSUSE Leap 15.4:dlm-kmp-rt-5.14.21-150400.15.5.1.x86_64",
            "openSUSE Leap 15.4:gfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64",
            "openSUSE Leap 15.4:kernel-devel-rt-5.14.21-150400.15.5.1.noarch",
            "openSUSE Leap 15.4:kernel-rt-5.14.21-150400.15.5.1.x86_64",
            "openSUSE Leap 15.4:kernel-rt-devel-5.14.21-150400.15.5.1.x86_64",
            "openSUSE Leap 15.4:kernel-rt_debug-5.14.21-150400.15.5.1.x86_64",
            "openSUSE Leap 15.4:kernel-rt_debug-devel-5.14.21-150400.15.5.1.x86_64",
            "openSUSE Leap 15.4:kernel-source-rt-5.14.21-150400.15.5.1.noarch",
            "openSUSE Leap 15.4:kernel-syms-rt-5.14.21-150400.15.5.1.x86_64",
            "openSUSE Leap 15.4:ocfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2022-12-23T10:39:17Z",
          "details": "low"
        }
      ],
      "title": "CVE-2022-28748"
    },
    {
      "cve": "CVE-2022-2905",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2022-2905"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "An out-of-bounds memory read flaw was found in the Linux kernel\u0027s BPF subsystem in how a user calls the bpf_tail_call function with a key larger than the max_entries of the map. This flaw allows a local user to gain unauthorized access to data.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_15_5-rt-1-150400.1.3.1.x86_64",
          "SUSE Real Time Module 15 SP4:cluster-md-kmp-rt-5.14.21-150400.15.5.1.x86_64",
          "SUSE Real Time Module 15 SP4:dlm-kmp-rt-5.14.21-150400.15.5.1.x86_64",
          "SUSE Real Time Module 15 SP4:gfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64",
          "SUSE Real Time Module 15 SP4:kernel-devel-rt-5.14.21-150400.15.5.1.noarch",
          "SUSE Real Time Module 15 SP4:kernel-rt-5.14.21-150400.15.5.1.x86_64",
          "SUSE Real Time Module 15 SP4:kernel-rt-devel-5.14.21-150400.15.5.1.x86_64",
          "SUSE Real Time Module 15 SP4:kernel-rt_debug-5.14.21-150400.15.5.1.x86_64",
          "SUSE Real Time Module 15 SP4:kernel-rt_debug-devel-5.14.21-150400.15.5.1.x86_64",
          "SUSE Real Time Module 15 SP4:kernel-source-rt-5.14.21-150400.15.5.1.noarch",
          "SUSE Real Time Module 15 SP4:kernel-syms-rt-5.14.21-150400.15.5.1.x86_64",
          "SUSE Real Time Module 15 SP4:ocfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64",
          "openSUSE Leap 15.4:cluster-md-kmp-rt-5.14.21-150400.15.5.1.x86_64",
          "openSUSE Leap 15.4:dlm-kmp-rt-5.14.21-150400.15.5.1.x86_64",
          "openSUSE Leap 15.4:gfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64",
          "openSUSE Leap 15.4:kernel-devel-rt-5.14.21-150400.15.5.1.noarch",
          "openSUSE Leap 15.4:kernel-rt-5.14.21-150400.15.5.1.x86_64",
          "openSUSE Leap 15.4:kernel-rt-devel-5.14.21-150400.15.5.1.x86_64",
          "openSUSE Leap 15.4:kernel-rt_debug-5.14.21-150400.15.5.1.x86_64",
          "openSUSE Leap 15.4:kernel-rt_debug-devel-5.14.21-150400.15.5.1.x86_64",
          "openSUSE Leap 15.4:kernel-source-rt-5.14.21-150400.15.5.1.noarch",
          "openSUSE Leap 15.4:kernel-syms-rt-5.14.21-150400.15.5.1.x86_64",
          "openSUSE Leap 15.4:ocfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2022-2905",
          "url": "https://www.suse.com/security/cve/CVE-2022-2905"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1202860 for CVE-2022-2905",
          "url": "https://bugzilla.suse.com/1202860"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_15_5-rt-1-150400.1.3.1.x86_64",
            "SUSE Real Time Module 15 SP4:cluster-md-kmp-rt-5.14.21-150400.15.5.1.x86_64",
            "SUSE Real Time Module 15 SP4:dlm-kmp-rt-5.14.21-150400.15.5.1.x86_64",
            "SUSE Real Time Module 15 SP4:gfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64",
            "SUSE Real Time Module 15 SP4:kernel-devel-rt-5.14.21-150400.15.5.1.noarch",
            "SUSE Real Time Module 15 SP4:kernel-rt-5.14.21-150400.15.5.1.x86_64",
            "SUSE Real Time Module 15 SP4:kernel-rt-devel-5.14.21-150400.15.5.1.x86_64",
            "SUSE Real Time Module 15 SP4:kernel-rt_debug-5.14.21-150400.15.5.1.x86_64",
            "SUSE Real Time Module 15 SP4:kernel-rt_debug-devel-5.14.21-150400.15.5.1.x86_64",
            "SUSE Real Time Module 15 SP4:kernel-source-rt-5.14.21-150400.15.5.1.noarch",
            "SUSE Real Time Module 15 SP4:kernel-syms-rt-5.14.21-150400.15.5.1.x86_64",
            "SUSE Real Time Module 15 SP4:ocfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64",
            "openSUSE Leap 15.4:cluster-md-kmp-rt-5.14.21-150400.15.5.1.x86_64",
            "openSUSE Leap 15.4:dlm-kmp-rt-5.14.21-150400.15.5.1.x86_64",
            "openSUSE Leap 15.4:gfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64",
            "openSUSE Leap 15.4:kernel-devel-rt-5.14.21-150400.15.5.1.noarch",
            "openSUSE Leap 15.4:kernel-rt-5.14.21-150400.15.5.1.x86_64",
            "openSUSE Leap 15.4:kernel-rt-devel-5.14.21-150400.15.5.1.x86_64",
            "openSUSE Leap 15.4:kernel-rt_debug-5.14.21-150400.15.5.1.x86_64",
            "openSUSE Leap 15.4:kernel-rt_debug-devel-5.14.21-150400.15.5.1.x86_64",
            "openSUSE Leap 15.4:kernel-source-rt-5.14.21-150400.15.5.1.noarch",
            "openSUSE Leap 15.4:kernel-syms-rt-5.14.21-150400.15.5.1.x86_64",
            "openSUSE Leap 15.4:ocfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 6.2,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N",
            "version": "3.1"
          },
          "products": [
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_15_5-rt-1-150400.1.3.1.x86_64",
            "SUSE Real Time Module 15 SP4:cluster-md-kmp-rt-5.14.21-150400.15.5.1.x86_64",
            "SUSE Real Time Module 15 SP4:dlm-kmp-rt-5.14.21-150400.15.5.1.x86_64",
            "SUSE Real Time Module 15 SP4:gfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64",
            "SUSE Real Time Module 15 SP4:kernel-devel-rt-5.14.21-150400.15.5.1.noarch",
            "SUSE Real Time Module 15 SP4:kernel-rt-5.14.21-150400.15.5.1.x86_64",
            "SUSE Real Time Module 15 SP4:kernel-rt-devel-5.14.21-150400.15.5.1.x86_64",
            "SUSE Real Time Module 15 SP4:kernel-rt_debug-5.14.21-150400.15.5.1.x86_64",
            "SUSE Real Time Module 15 SP4:kernel-rt_debug-devel-5.14.21-150400.15.5.1.x86_64",
            "SUSE Real Time Module 15 SP4:kernel-source-rt-5.14.21-150400.15.5.1.noarch",
            "SUSE Real Time Module 15 SP4:kernel-syms-rt-5.14.21-150400.15.5.1.x86_64",
            "SUSE Real Time Module 15 SP4:ocfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64",
            "openSUSE Leap 15.4:cluster-md-kmp-rt-5.14.21-150400.15.5.1.x86_64",
            "openSUSE Leap 15.4:dlm-kmp-rt-5.14.21-150400.15.5.1.x86_64",
            "openSUSE Leap 15.4:gfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64",
            "openSUSE Leap 15.4:kernel-devel-rt-5.14.21-150400.15.5.1.noarch",
            "openSUSE Leap 15.4:kernel-rt-5.14.21-150400.15.5.1.x86_64",
            "openSUSE Leap 15.4:kernel-rt-devel-5.14.21-150400.15.5.1.x86_64",
            "openSUSE Leap 15.4:kernel-rt_debug-5.14.21-150400.15.5.1.x86_64",
            "openSUSE Leap 15.4:kernel-rt_debug-devel-5.14.21-150400.15.5.1.x86_64",
            "openSUSE Leap 15.4:kernel-source-rt-5.14.21-150400.15.5.1.noarch",
            "openSUSE Leap 15.4:kernel-syms-rt-5.14.21-150400.15.5.1.x86_64",
            "openSUSE Leap 15.4:ocfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2022-12-23T10:39:17Z",
          "details": "moderate"
        }
      ],
      "title": "CVE-2022-2905"
    },
    {
      "cve": "CVE-2022-2938",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2022-2938"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "A flaw was found in the Linux kernel\u0027s implementation of Pressure Stall Information. While the feature is disabled by default, it could allow an attacker to crash the system or have other memory-corruption side effects.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_15_5-rt-1-150400.1.3.1.x86_64",
          "SUSE Real Time Module 15 SP4:cluster-md-kmp-rt-5.14.21-150400.15.5.1.x86_64",
          "SUSE Real Time Module 15 SP4:dlm-kmp-rt-5.14.21-150400.15.5.1.x86_64",
          "SUSE Real Time Module 15 SP4:gfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64",
          "SUSE Real Time Module 15 SP4:kernel-devel-rt-5.14.21-150400.15.5.1.noarch",
          "SUSE Real Time Module 15 SP4:kernel-rt-5.14.21-150400.15.5.1.x86_64",
          "SUSE Real Time Module 15 SP4:kernel-rt-devel-5.14.21-150400.15.5.1.x86_64",
          "SUSE Real Time Module 15 SP4:kernel-rt_debug-5.14.21-150400.15.5.1.x86_64",
          "SUSE Real Time Module 15 SP4:kernel-rt_debug-devel-5.14.21-150400.15.5.1.x86_64",
          "SUSE Real Time Module 15 SP4:kernel-source-rt-5.14.21-150400.15.5.1.noarch",
          "SUSE Real Time Module 15 SP4:kernel-syms-rt-5.14.21-150400.15.5.1.x86_64",
          "SUSE Real Time Module 15 SP4:ocfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64",
          "openSUSE Leap 15.4:cluster-md-kmp-rt-5.14.21-150400.15.5.1.x86_64",
          "openSUSE Leap 15.4:dlm-kmp-rt-5.14.21-150400.15.5.1.x86_64",
          "openSUSE Leap 15.4:gfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64",
          "openSUSE Leap 15.4:kernel-devel-rt-5.14.21-150400.15.5.1.noarch",
          "openSUSE Leap 15.4:kernel-rt-5.14.21-150400.15.5.1.x86_64",
          "openSUSE Leap 15.4:kernel-rt-devel-5.14.21-150400.15.5.1.x86_64",
          "openSUSE Leap 15.4:kernel-rt_debug-5.14.21-150400.15.5.1.x86_64",
          "openSUSE Leap 15.4:kernel-rt_debug-devel-5.14.21-150400.15.5.1.x86_64",
          "openSUSE Leap 15.4:kernel-source-rt-5.14.21-150400.15.5.1.noarch",
          "openSUSE Leap 15.4:kernel-syms-rt-5.14.21-150400.15.5.1.x86_64",
          "openSUSE Leap 15.4:ocfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2022-2938",
          "url": "https://www.suse.com/security/cve/CVE-2022-2938"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1202623 for CVE-2022-2938",
          "url": "https://bugzilla.suse.com/1202623"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_15_5-rt-1-150400.1.3.1.x86_64",
            "SUSE Real Time Module 15 SP4:cluster-md-kmp-rt-5.14.21-150400.15.5.1.x86_64",
            "SUSE Real Time Module 15 SP4:dlm-kmp-rt-5.14.21-150400.15.5.1.x86_64",
            "SUSE Real Time Module 15 SP4:gfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64",
            "SUSE Real Time Module 15 SP4:kernel-devel-rt-5.14.21-150400.15.5.1.noarch",
            "SUSE Real Time Module 15 SP4:kernel-rt-5.14.21-150400.15.5.1.x86_64",
            "SUSE Real Time Module 15 SP4:kernel-rt-devel-5.14.21-150400.15.5.1.x86_64",
            "SUSE Real Time Module 15 SP4:kernel-rt_debug-5.14.21-150400.15.5.1.x86_64",
            "SUSE Real Time Module 15 SP4:kernel-rt_debug-devel-5.14.21-150400.15.5.1.x86_64",
            "SUSE Real Time Module 15 SP4:kernel-source-rt-5.14.21-150400.15.5.1.noarch",
            "SUSE Real Time Module 15 SP4:kernel-syms-rt-5.14.21-150400.15.5.1.x86_64",
            "SUSE Real Time Module 15 SP4:ocfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64",
            "openSUSE Leap 15.4:cluster-md-kmp-rt-5.14.21-150400.15.5.1.x86_64",
            "openSUSE Leap 15.4:dlm-kmp-rt-5.14.21-150400.15.5.1.x86_64",
            "openSUSE Leap 15.4:gfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64",
            "openSUSE Leap 15.4:kernel-devel-rt-5.14.21-150400.15.5.1.noarch",
            "openSUSE Leap 15.4:kernel-rt-5.14.21-150400.15.5.1.x86_64",
            "openSUSE Leap 15.4:kernel-rt-devel-5.14.21-150400.15.5.1.x86_64",
            "openSUSE Leap 15.4:kernel-rt_debug-5.14.21-150400.15.5.1.x86_64",
            "openSUSE Leap 15.4:kernel-rt_debug-devel-5.14.21-150400.15.5.1.x86_64",
            "openSUSE Leap 15.4:kernel-source-rt-5.14.21-150400.15.5.1.noarch",
            "openSUSE Leap 15.4:kernel-syms-rt-5.14.21-150400.15.5.1.x86_64",
            "openSUSE Leap 15.4:ocfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 6.7,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:R/S:U/C:H/I:H/A:H",
            "version": "3.1"
          },
          "products": [
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_15_5-rt-1-150400.1.3.1.x86_64",
            "SUSE Real Time Module 15 SP4:cluster-md-kmp-rt-5.14.21-150400.15.5.1.x86_64",
            "SUSE Real Time Module 15 SP4:dlm-kmp-rt-5.14.21-150400.15.5.1.x86_64",
            "SUSE Real Time Module 15 SP4:gfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64",
            "SUSE Real Time Module 15 SP4:kernel-devel-rt-5.14.21-150400.15.5.1.noarch",
            "SUSE Real Time Module 15 SP4:kernel-rt-5.14.21-150400.15.5.1.x86_64",
            "SUSE Real Time Module 15 SP4:kernel-rt-devel-5.14.21-150400.15.5.1.x86_64",
            "SUSE Real Time Module 15 SP4:kernel-rt_debug-5.14.21-150400.15.5.1.x86_64",
            "SUSE Real Time Module 15 SP4:kernel-rt_debug-devel-5.14.21-150400.15.5.1.x86_64",
            "SUSE Real Time Module 15 SP4:kernel-source-rt-5.14.21-150400.15.5.1.noarch",
            "SUSE Real Time Module 15 SP4:kernel-syms-rt-5.14.21-150400.15.5.1.x86_64",
            "SUSE Real Time Module 15 SP4:ocfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64",
            "openSUSE Leap 15.4:cluster-md-kmp-rt-5.14.21-150400.15.5.1.x86_64",
            "openSUSE Leap 15.4:dlm-kmp-rt-5.14.21-150400.15.5.1.x86_64",
            "openSUSE Leap 15.4:gfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64",
            "openSUSE Leap 15.4:kernel-devel-rt-5.14.21-150400.15.5.1.noarch",
            "openSUSE Leap 15.4:kernel-rt-5.14.21-150400.15.5.1.x86_64",
            "openSUSE Leap 15.4:kernel-rt-devel-5.14.21-150400.15.5.1.x86_64",
            "openSUSE Leap 15.4:kernel-rt_debug-5.14.21-150400.15.5.1.x86_64",
            "openSUSE Leap 15.4:kernel-rt_debug-devel-5.14.21-150400.15.5.1.x86_64",
            "openSUSE Leap 15.4:kernel-source-rt-5.14.21-150400.15.5.1.noarch",
            "openSUSE Leap 15.4:kernel-syms-rt-5.14.21-150400.15.5.1.x86_64",
            "openSUSE Leap 15.4:ocfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2022-12-23T10:39:17Z",
          "details": "moderate"
        }
      ],
      "title": "CVE-2022-2938"
    },
    {
      "cve": "CVE-2022-2959",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2022-2959"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "A race condition was found in the Linux kernel\u0027s watch queue due to a missing lock in pipe_resize_ring(). The specific flaw exists within the handling of pipe buffers. The issue results from the lack of proper locking when performing operations on an object. This flaw allows a local user to crash the system or escalate their privileges on the system.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_15_5-rt-1-150400.1.3.1.x86_64",
          "SUSE Real Time Module 15 SP4:cluster-md-kmp-rt-5.14.21-150400.15.5.1.x86_64",
          "SUSE Real Time Module 15 SP4:dlm-kmp-rt-5.14.21-150400.15.5.1.x86_64",
          "SUSE Real Time Module 15 SP4:gfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64",
          "SUSE Real Time Module 15 SP4:kernel-devel-rt-5.14.21-150400.15.5.1.noarch",
          "SUSE Real Time Module 15 SP4:kernel-rt-5.14.21-150400.15.5.1.x86_64",
          "SUSE Real Time Module 15 SP4:kernel-rt-devel-5.14.21-150400.15.5.1.x86_64",
          "SUSE Real Time Module 15 SP4:kernel-rt_debug-5.14.21-150400.15.5.1.x86_64",
          "SUSE Real Time Module 15 SP4:kernel-rt_debug-devel-5.14.21-150400.15.5.1.x86_64",
          "SUSE Real Time Module 15 SP4:kernel-source-rt-5.14.21-150400.15.5.1.noarch",
          "SUSE Real Time Module 15 SP4:kernel-syms-rt-5.14.21-150400.15.5.1.x86_64",
          "SUSE Real Time Module 15 SP4:ocfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64",
          "openSUSE Leap 15.4:cluster-md-kmp-rt-5.14.21-150400.15.5.1.x86_64",
          "openSUSE Leap 15.4:dlm-kmp-rt-5.14.21-150400.15.5.1.x86_64",
          "openSUSE Leap 15.4:gfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64",
          "openSUSE Leap 15.4:kernel-devel-rt-5.14.21-150400.15.5.1.noarch",
          "openSUSE Leap 15.4:kernel-rt-5.14.21-150400.15.5.1.x86_64",
          "openSUSE Leap 15.4:kernel-rt-devel-5.14.21-150400.15.5.1.x86_64",
          "openSUSE Leap 15.4:kernel-rt_debug-5.14.21-150400.15.5.1.x86_64",
          "openSUSE Leap 15.4:kernel-rt_debug-devel-5.14.21-150400.15.5.1.x86_64",
          "openSUSE Leap 15.4:kernel-source-rt-5.14.21-150400.15.5.1.noarch",
          "openSUSE Leap 15.4:kernel-syms-rt-5.14.21-150400.15.5.1.x86_64",
          "openSUSE Leap 15.4:ocfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2022-2959",
          "url": "https://www.suse.com/security/cve/CVE-2022-2959"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1202681 for CVE-2022-2959",
          "url": "https://bugzilla.suse.com/1202681"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1202685 for CVE-2022-2959",
          "url": "https://bugzilla.suse.com/1202685"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_15_5-rt-1-150400.1.3.1.x86_64",
            "SUSE Real Time Module 15 SP4:cluster-md-kmp-rt-5.14.21-150400.15.5.1.x86_64",
            "SUSE Real Time Module 15 SP4:dlm-kmp-rt-5.14.21-150400.15.5.1.x86_64",
            "SUSE Real Time Module 15 SP4:gfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64",
            "SUSE Real Time Module 15 SP4:kernel-devel-rt-5.14.21-150400.15.5.1.noarch",
            "SUSE Real Time Module 15 SP4:kernel-rt-5.14.21-150400.15.5.1.x86_64",
            "SUSE Real Time Module 15 SP4:kernel-rt-devel-5.14.21-150400.15.5.1.x86_64",
            "SUSE Real Time Module 15 SP4:kernel-rt_debug-5.14.21-150400.15.5.1.x86_64",
            "SUSE Real Time Module 15 SP4:kernel-rt_debug-devel-5.14.21-150400.15.5.1.x86_64",
            "SUSE Real Time Module 15 SP4:kernel-source-rt-5.14.21-150400.15.5.1.noarch",
            "SUSE Real Time Module 15 SP4:kernel-syms-rt-5.14.21-150400.15.5.1.x86_64",
            "SUSE Real Time Module 15 SP4:ocfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64",
            "openSUSE Leap 15.4:cluster-md-kmp-rt-5.14.21-150400.15.5.1.x86_64",
            "openSUSE Leap 15.4:dlm-kmp-rt-5.14.21-150400.15.5.1.x86_64",
            "openSUSE Leap 15.4:gfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64",
            "openSUSE Leap 15.4:kernel-devel-rt-5.14.21-150400.15.5.1.noarch",
            "openSUSE Leap 15.4:kernel-rt-5.14.21-150400.15.5.1.x86_64",
            "openSUSE Leap 15.4:kernel-rt-devel-5.14.21-150400.15.5.1.x86_64",
            "openSUSE Leap 15.4:kernel-rt_debug-5.14.21-150400.15.5.1.x86_64",
            "openSUSE Leap 15.4:kernel-rt_debug-devel-5.14.21-150400.15.5.1.x86_64",
            "openSUSE Leap 15.4:kernel-source-rt-5.14.21-150400.15.5.1.noarch",
            "openSUSE Leap 15.4:kernel-syms-rt-5.14.21-150400.15.5.1.x86_64",
            "openSUSE Leap 15.4:ocfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 7.8,
            "baseSeverity": "HIGH",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
            "version": "3.1"
          },
          "products": [
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_15_5-rt-1-150400.1.3.1.x86_64",
            "SUSE Real Time Module 15 SP4:cluster-md-kmp-rt-5.14.21-150400.15.5.1.x86_64",
            "SUSE Real Time Module 15 SP4:dlm-kmp-rt-5.14.21-150400.15.5.1.x86_64",
            "SUSE Real Time Module 15 SP4:gfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64",
            "SUSE Real Time Module 15 SP4:kernel-devel-rt-5.14.21-150400.15.5.1.noarch",
            "SUSE Real Time Module 15 SP4:kernel-rt-5.14.21-150400.15.5.1.x86_64",
            "SUSE Real Time Module 15 SP4:kernel-rt-devel-5.14.21-150400.15.5.1.x86_64",
            "SUSE Real Time Module 15 SP4:kernel-rt_debug-5.14.21-150400.15.5.1.x86_64",
            "SUSE Real Time Module 15 SP4:kernel-rt_debug-devel-5.14.21-150400.15.5.1.x86_64",
            "SUSE Real Time Module 15 SP4:kernel-source-rt-5.14.21-150400.15.5.1.noarch",
            "SUSE Real Time Module 15 SP4:kernel-syms-rt-5.14.21-150400.15.5.1.x86_64",
            "SUSE Real Time Module 15 SP4:ocfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64",
            "openSUSE Leap 15.4:cluster-md-kmp-rt-5.14.21-150400.15.5.1.x86_64",
            "openSUSE Leap 15.4:dlm-kmp-rt-5.14.21-150400.15.5.1.x86_64",
            "openSUSE Leap 15.4:gfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64",
            "openSUSE Leap 15.4:kernel-devel-rt-5.14.21-150400.15.5.1.noarch",
            "openSUSE Leap 15.4:kernel-rt-5.14.21-150400.15.5.1.x86_64",
            "openSUSE Leap 15.4:kernel-rt-devel-5.14.21-150400.15.5.1.x86_64",
            "openSUSE Leap 15.4:kernel-rt_debug-5.14.21-150400.15.5.1.x86_64",
            "openSUSE Leap 15.4:kernel-rt_debug-devel-5.14.21-150400.15.5.1.x86_64",
            "openSUSE Leap 15.4:kernel-source-rt-5.14.21-150400.15.5.1.noarch",
            "openSUSE Leap 15.4:kernel-syms-rt-5.14.21-150400.15.5.1.x86_64",
            "openSUSE Leap 15.4:ocfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2022-12-23T10:39:17Z",
          "details": "important"
        }
      ],
      "title": "CVE-2022-2959"
    },
    {
      "cve": "CVE-2022-2964",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2022-2964"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "A flaw was found in the Linux kernel\u0027s driver for the ASIX AX88179_178A-based USB 2.0/3.0 Gigabit Ethernet Devices. The vulnerability contains multiple out-of-bounds reads and possible out-of-bounds writes.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_15_5-rt-1-150400.1.3.1.x86_64",
          "SUSE Real Time Module 15 SP4:cluster-md-kmp-rt-5.14.21-150400.15.5.1.x86_64",
          "SUSE Real Time Module 15 SP4:dlm-kmp-rt-5.14.21-150400.15.5.1.x86_64",
          "SUSE Real Time Module 15 SP4:gfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64",
          "SUSE Real Time Module 15 SP4:kernel-devel-rt-5.14.21-150400.15.5.1.noarch",
          "SUSE Real Time Module 15 SP4:kernel-rt-5.14.21-150400.15.5.1.x86_64",
          "SUSE Real Time Module 15 SP4:kernel-rt-devel-5.14.21-150400.15.5.1.x86_64",
          "SUSE Real Time Module 15 SP4:kernel-rt_debug-5.14.21-150400.15.5.1.x86_64",
          "SUSE Real Time Module 15 SP4:kernel-rt_debug-devel-5.14.21-150400.15.5.1.x86_64",
          "SUSE Real Time Module 15 SP4:kernel-source-rt-5.14.21-150400.15.5.1.noarch",
          "SUSE Real Time Module 15 SP4:kernel-syms-rt-5.14.21-150400.15.5.1.x86_64",
          "SUSE Real Time Module 15 SP4:ocfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64",
          "openSUSE Leap 15.4:cluster-md-kmp-rt-5.14.21-150400.15.5.1.x86_64",
          "openSUSE Leap 15.4:dlm-kmp-rt-5.14.21-150400.15.5.1.x86_64",
          "openSUSE Leap 15.4:gfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64",
          "openSUSE Leap 15.4:kernel-devel-rt-5.14.21-150400.15.5.1.noarch",
          "openSUSE Leap 15.4:kernel-rt-5.14.21-150400.15.5.1.x86_64",
          "openSUSE Leap 15.4:kernel-rt-devel-5.14.21-150400.15.5.1.x86_64",
          "openSUSE Leap 15.4:kernel-rt_debug-5.14.21-150400.15.5.1.x86_64",
          "openSUSE Leap 15.4:kernel-rt_debug-devel-5.14.21-150400.15.5.1.x86_64",
          "openSUSE Leap 15.4:kernel-source-rt-5.14.21-150400.15.5.1.noarch",
          "openSUSE Leap 15.4:kernel-syms-rt-5.14.21-150400.15.5.1.x86_64",
          "openSUSE Leap 15.4:ocfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2022-2964",
          "url": "https://www.suse.com/security/cve/CVE-2022-2964"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1202686 for CVE-2022-2964",
          "url": "https://bugzilla.suse.com/1202686"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1203008 for CVE-2022-2964",
          "url": "https://bugzilla.suse.com/1203008"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1208044 for CVE-2022-2964",
          "url": "https://bugzilla.suse.com/1208044"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_15_5-rt-1-150400.1.3.1.x86_64",
            "SUSE Real Time Module 15 SP4:cluster-md-kmp-rt-5.14.21-150400.15.5.1.x86_64",
            "SUSE Real Time Module 15 SP4:dlm-kmp-rt-5.14.21-150400.15.5.1.x86_64",
            "SUSE Real Time Module 15 SP4:gfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64",
            "SUSE Real Time Module 15 SP4:kernel-devel-rt-5.14.21-150400.15.5.1.noarch",
            "SUSE Real Time Module 15 SP4:kernel-rt-5.14.21-150400.15.5.1.x86_64",
            "SUSE Real Time Module 15 SP4:kernel-rt-devel-5.14.21-150400.15.5.1.x86_64",
            "SUSE Real Time Module 15 SP4:kernel-rt_debug-5.14.21-150400.15.5.1.x86_64",
            "SUSE Real Time Module 15 SP4:kernel-rt_debug-devel-5.14.21-150400.15.5.1.x86_64",
            "SUSE Real Time Module 15 SP4:kernel-source-rt-5.14.21-150400.15.5.1.noarch",
            "SUSE Real Time Module 15 SP4:kernel-syms-rt-5.14.21-150400.15.5.1.x86_64",
            "SUSE Real Time Module 15 SP4:ocfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64",
            "openSUSE Leap 15.4:cluster-md-kmp-rt-5.14.21-150400.15.5.1.x86_64",
            "openSUSE Leap 15.4:dlm-kmp-rt-5.14.21-150400.15.5.1.x86_64",
            "openSUSE Leap 15.4:gfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64",
            "openSUSE Leap 15.4:kernel-devel-rt-5.14.21-150400.15.5.1.noarch",
            "openSUSE Leap 15.4:kernel-rt-5.14.21-150400.15.5.1.x86_64",
            "openSUSE Leap 15.4:kernel-rt-devel-5.14.21-150400.15.5.1.x86_64",
            "openSUSE Leap 15.4:kernel-rt_debug-5.14.21-150400.15.5.1.x86_64",
            "openSUSE Leap 15.4:kernel-rt_debug-devel-5.14.21-150400.15.5.1.x86_64",
            "openSUSE Leap 15.4:kernel-source-rt-5.14.21-150400.15.5.1.noarch",
            "openSUSE Leap 15.4:kernel-syms-rt-5.14.21-150400.15.5.1.x86_64",
            "openSUSE Leap 15.4:ocfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 7.8,
            "baseSeverity": "HIGH",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
            "version": "3.1"
          },
          "products": [
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_15_5-rt-1-150400.1.3.1.x86_64",
            "SUSE Real Time Module 15 SP4:cluster-md-kmp-rt-5.14.21-150400.15.5.1.x86_64",
            "SUSE Real Time Module 15 SP4:dlm-kmp-rt-5.14.21-150400.15.5.1.x86_64",
            "SUSE Real Time Module 15 SP4:gfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64",
            "SUSE Real Time Module 15 SP4:kernel-devel-rt-5.14.21-150400.15.5.1.noarch",
            "SUSE Real Time Module 15 SP4:kernel-rt-5.14.21-150400.15.5.1.x86_64",
            "SUSE Real Time Module 15 SP4:kernel-rt-devel-5.14.21-150400.15.5.1.x86_64",
            "SUSE Real Time Module 15 SP4:kernel-rt_debug-5.14.21-150400.15.5.1.x86_64",
            "SUSE Real Time Module 15 SP4:kernel-rt_debug-devel-5.14.21-150400.15.5.1.x86_64",
            "SUSE Real Time Module 15 SP4:kernel-source-rt-5.14.21-150400.15.5.1.noarch",
            "SUSE Real Time Module 15 SP4:kernel-syms-rt-5.14.21-150400.15.5.1.x86_64",
            "SUSE Real Time Module 15 SP4:ocfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64",
            "openSUSE Leap 15.4:cluster-md-kmp-rt-5.14.21-150400.15.5.1.x86_64",
            "openSUSE Leap 15.4:dlm-kmp-rt-5.14.21-150400.15.5.1.x86_64",
            "openSUSE Leap 15.4:gfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64",
            "openSUSE Leap 15.4:kernel-devel-rt-5.14.21-150400.15.5.1.noarch",
            "openSUSE Leap 15.4:kernel-rt-5.14.21-150400.15.5.1.x86_64",
            "openSUSE Leap 15.4:kernel-rt-devel-5.14.21-150400.15.5.1.x86_64",
            "openSUSE Leap 15.4:kernel-rt_debug-5.14.21-150400.15.5.1.x86_64",
            "openSUSE Leap 15.4:kernel-rt_debug-devel-5.14.21-150400.15.5.1.x86_64",
            "openSUSE Leap 15.4:kernel-source-rt-5.14.21-150400.15.5.1.noarch",
            "openSUSE Leap 15.4:kernel-syms-rt-5.14.21-150400.15.5.1.x86_64",
            "openSUSE Leap 15.4:ocfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2022-12-23T10:39:17Z",
          "details": "important"
        }
      ],
      "title": "CVE-2022-2964"
    },
    {
      "cve": "CVE-2022-2977",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2022-2977"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "A flaw was found in the Linux kernel implementation of proxied virtualized TPM devices. On a system where virtualized TPM devices are configured (this is not the default) a local attacker can create a use-after-free and create a situation where it may be possible to escalate privileges on the system.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_15_5-rt-1-150400.1.3.1.x86_64",
          "SUSE Real Time Module 15 SP4:cluster-md-kmp-rt-5.14.21-150400.15.5.1.x86_64",
          "SUSE Real Time Module 15 SP4:dlm-kmp-rt-5.14.21-150400.15.5.1.x86_64",
          "SUSE Real Time Module 15 SP4:gfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64",
          "SUSE Real Time Module 15 SP4:kernel-devel-rt-5.14.21-150400.15.5.1.noarch",
          "SUSE Real Time Module 15 SP4:kernel-rt-5.14.21-150400.15.5.1.x86_64",
          "SUSE Real Time Module 15 SP4:kernel-rt-devel-5.14.21-150400.15.5.1.x86_64",
          "SUSE Real Time Module 15 SP4:kernel-rt_debug-5.14.21-150400.15.5.1.x86_64",
          "SUSE Real Time Module 15 SP4:kernel-rt_debug-devel-5.14.21-150400.15.5.1.x86_64",
          "SUSE Real Time Module 15 SP4:kernel-source-rt-5.14.21-150400.15.5.1.noarch",
          "SUSE Real Time Module 15 SP4:kernel-syms-rt-5.14.21-150400.15.5.1.x86_64",
          "SUSE Real Time Module 15 SP4:ocfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64",
          "openSUSE Leap 15.4:cluster-md-kmp-rt-5.14.21-150400.15.5.1.x86_64",
          "openSUSE Leap 15.4:dlm-kmp-rt-5.14.21-150400.15.5.1.x86_64",
          "openSUSE Leap 15.4:gfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64",
          "openSUSE Leap 15.4:kernel-devel-rt-5.14.21-150400.15.5.1.noarch",
          "openSUSE Leap 15.4:kernel-rt-5.14.21-150400.15.5.1.x86_64",
          "openSUSE Leap 15.4:kernel-rt-devel-5.14.21-150400.15.5.1.x86_64",
          "openSUSE Leap 15.4:kernel-rt_debug-5.14.21-150400.15.5.1.x86_64",
          "openSUSE Leap 15.4:kernel-rt_debug-devel-5.14.21-150400.15.5.1.x86_64",
          "openSUSE Leap 15.4:kernel-source-rt-5.14.21-150400.15.5.1.noarch",
          "openSUSE Leap 15.4:kernel-syms-rt-5.14.21-150400.15.5.1.x86_64",
          "openSUSE Leap 15.4:ocfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2022-2977",
          "url": "https://www.suse.com/security/cve/CVE-2022-2977"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1202672 for CVE-2022-2977",
          "url": "https://bugzilla.suse.com/1202672"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_15_5-rt-1-150400.1.3.1.x86_64",
            "SUSE Real Time Module 15 SP4:cluster-md-kmp-rt-5.14.21-150400.15.5.1.x86_64",
            "SUSE Real Time Module 15 SP4:dlm-kmp-rt-5.14.21-150400.15.5.1.x86_64",
            "SUSE Real Time Module 15 SP4:gfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64",
            "SUSE Real Time Module 15 SP4:kernel-devel-rt-5.14.21-150400.15.5.1.noarch",
            "SUSE Real Time Module 15 SP4:kernel-rt-5.14.21-150400.15.5.1.x86_64",
            "SUSE Real Time Module 15 SP4:kernel-rt-devel-5.14.21-150400.15.5.1.x86_64",
            "SUSE Real Time Module 15 SP4:kernel-rt_debug-5.14.21-150400.15.5.1.x86_64",
            "SUSE Real Time Module 15 SP4:kernel-rt_debug-devel-5.14.21-150400.15.5.1.x86_64",
            "SUSE Real Time Module 15 SP4:kernel-source-rt-5.14.21-150400.15.5.1.noarch",
            "SUSE Real Time Module 15 SP4:kernel-syms-rt-5.14.21-150400.15.5.1.x86_64",
            "SUSE Real Time Module 15 SP4:ocfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64",
            "openSUSE Leap 15.4:cluster-md-kmp-rt-5.14.21-150400.15.5.1.x86_64",
            "openSUSE Leap 15.4:dlm-kmp-rt-5.14.21-150400.15.5.1.x86_64",
            "openSUSE Leap 15.4:gfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64",
            "openSUSE Leap 15.4:kernel-devel-rt-5.14.21-150400.15.5.1.noarch",
            "openSUSE Leap 15.4:kernel-rt-5.14.21-150400.15.5.1.x86_64",
            "openSUSE Leap 15.4:kernel-rt-devel-5.14.21-150400.15.5.1.x86_64",
            "openSUSE Leap 15.4:kernel-rt_debug-5.14.21-150400.15.5.1.x86_64",
            "openSUSE Leap 15.4:kernel-rt_debug-devel-5.14.21-150400.15.5.1.x86_64",
            "openSUSE Leap 15.4:kernel-source-rt-5.14.21-150400.15.5.1.noarch",
            "openSUSE Leap 15.4:kernel-syms-rt-5.14.21-150400.15.5.1.x86_64",
            "openSUSE Leap 15.4:ocfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 4.2,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:R/S:U/C:N/I:N/A:H",
            "version": "3.1"
          },
          "products": [
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_15_5-rt-1-150400.1.3.1.x86_64",
            "SUSE Real Time Module 15 SP4:cluster-md-kmp-rt-5.14.21-150400.15.5.1.x86_64",
            "SUSE Real Time Module 15 SP4:dlm-kmp-rt-5.14.21-150400.15.5.1.x86_64",
            "SUSE Real Time Module 15 SP4:gfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64",
            "SUSE Real Time Module 15 SP4:kernel-devel-rt-5.14.21-150400.15.5.1.noarch",
            "SUSE Real Time Module 15 SP4:kernel-rt-5.14.21-150400.15.5.1.x86_64",
            "SUSE Real Time Module 15 SP4:kernel-rt-devel-5.14.21-150400.15.5.1.x86_64",
            "SUSE Real Time Module 15 SP4:kernel-rt_debug-5.14.21-150400.15.5.1.x86_64",
            "SUSE Real Time Module 15 SP4:kernel-rt_debug-devel-5.14.21-150400.15.5.1.x86_64",
            "SUSE Real Time Module 15 SP4:kernel-source-rt-5.14.21-150400.15.5.1.noarch",
            "SUSE Real Time Module 15 SP4:kernel-syms-rt-5.14.21-150400.15.5.1.x86_64",
            "SUSE Real Time Module 15 SP4:ocfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64",
            "openSUSE Leap 15.4:cluster-md-kmp-rt-5.14.21-150400.15.5.1.x86_64",
            "openSUSE Leap 15.4:dlm-kmp-rt-5.14.21-150400.15.5.1.x86_64",
            "openSUSE Leap 15.4:gfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64",
            "openSUSE Leap 15.4:kernel-devel-rt-5.14.21-150400.15.5.1.noarch",
            "openSUSE Leap 15.4:kernel-rt-5.14.21-150400.15.5.1.x86_64",
            "openSUSE Leap 15.4:kernel-rt-devel-5.14.21-150400.15.5.1.x86_64",
            "openSUSE Leap 15.4:kernel-rt_debug-5.14.21-150400.15.5.1.x86_64",
            "openSUSE Leap 15.4:kernel-rt_debug-devel-5.14.21-150400.15.5.1.x86_64",
            "openSUSE Leap 15.4:kernel-source-rt-5.14.21-150400.15.5.1.noarch",
            "openSUSE Leap 15.4:kernel-syms-rt-5.14.21-150400.15.5.1.x86_64",
            "openSUSE Leap 15.4:ocfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2022-12-23T10:39:17Z",
          "details": "moderate"
        }
      ],
      "title": "CVE-2022-2977"
    },
    {
      "cve": "CVE-2022-2978",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2022-2978"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "A flaw use after free in the Linux kernel NILFS file system was found in the way user triggers function security_inode_alloc to fail with following call to function nilfs_mdt_destroy. A local user could use this flaw to crash the system or potentially escalate their privileges on the system.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_15_5-rt-1-150400.1.3.1.x86_64",
          "SUSE Real Time Module 15 SP4:cluster-md-kmp-rt-5.14.21-150400.15.5.1.x86_64",
          "SUSE Real Time Module 15 SP4:dlm-kmp-rt-5.14.21-150400.15.5.1.x86_64",
          "SUSE Real Time Module 15 SP4:gfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64",
          "SUSE Real Time Module 15 SP4:kernel-devel-rt-5.14.21-150400.15.5.1.noarch",
          "SUSE Real Time Module 15 SP4:kernel-rt-5.14.21-150400.15.5.1.x86_64",
          "SUSE Real Time Module 15 SP4:kernel-rt-devel-5.14.21-150400.15.5.1.x86_64",
          "SUSE Real Time Module 15 SP4:kernel-rt_debug-5.14.21-150400.15.5.1.x86_64",
          "SUSE Real Time Module 15 SP4:kernel-rt_debug-devel-5.14.21-150400.15.5.1.x86_64",
          "SUSE Real Time Module 15 SP4:kernel-source-rt-5.14.21-150400.15.5.1.noarch",
          "SUSE Real Time Module 15 SP4:kernel-syms-rt-5.14.21-150400.15.5.1.x86_64",
          "SUSE Real Time Module 15 SP4:ocfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64",
          "openSUSE Leap 15.4:cluster-md-kmp-rt-5.14.21-150400.15.5.1.x86_64",
          "openSUSE Leap 15.4:dlm-kmp-rt-5.14.21-150400.15.5.1.x86_64",
          "openSUSE Leap 15.4:gfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64",
          "openSUSE Leap 15.4:kernel-devel-rt-5.14.21-150400.15.5.1.noarch",
          "openSUSE Leap 15.4:kernel-rt-5.14.21-150400.15.5.1.x86_64",
          "openSUSE Leap 15.4:kernel-rt-devel-5.14.21-150400.15.5.1.x86_64",
          "openSUSE Leap 15.4:kernel-rt_debug-5.14.21-150400.15.5.1.x86_64",
          "openSUSE Leap 15.4:kernel-rt_debug-devel-5.14.21-150400.15.5.1.x86_64",
          "openSUSE Leap 15.4:kernel-source-rt-5.14.21-150400.15.5.1.noarch",
          "openSUSE Leap 15.4:kernel-syms-rt-5.14.21-150400.15.5.1.x86_64",
          "openSUSE Leap 15.4:ocfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2022-2978",
          "url": "https://www.suse.com/security/cve/CVE-2022-2978"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1202700 for CVE-2022-2978",
          "url": "https://bugzilla.suse.com/1202700"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1204745 for CVE-2022-2978",
          "url": "https://bugzilla.suse.com/1204745"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_15_5-rt-1-150400.1.3.1.x86_64",
            "SUSE Real Time Module 15 SP4:cluster-md-kmp-rt-5.14.21-150400.15.5.1.x86_64",
            "SUSE Real Time Module 15 SP4:dlm-kmp-rt-5.14.21-150400.15.5.1.x86_64",
            "SUSE Real Time Module 15 SP4:gfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64",
            "SUSE Real Time Module 15 SP4:kernel-devel-rt-5.14.21-150400.15.5.1.noarch",
            "SUSE Real Time Module 15 SP4:kernel-rt-5.14.21-150400.15.5.1.x86_64",
            "SUSE Real Time Module 15 SP4:kernel-rt-devel-5.14.21-150400.15.5.1.x86_64",
            "SUSE Real Time Module 15 SP4:kernel-rt_debug-5.14.21-150400.15.5.1.x86_64",
            "SUSE Real Time Module 15 SP4:kernel-rt_debug-devel-5.14.21-150400.15.5.1.x86_64",
            "SUSE Real Time Module 15 SP4:kernel-source-rt-5.14.21-150400.15.5.1.noarch",
            "SUSE Real Time Module 15 SP4:kernel-syms-rt-5.14.21-150400.15.5.1.x86_64",
            "SUSE Real Time Module 15 SP4:ocfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64",
            "openSUSE Leap 15.4:cluster-md-kmp-rt-5.14.21-150400.15.5.1.x86_64",
            "openSUSE Leap 15.4:dlm-kmp-rt-5.14.21-150400.15.5.1.x86_64",
            "openSUSE Leap 15.4:gfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64",
            "openSUSE Leap 15.4:kernel-devel-rt-5.14.21-150400.15.5.1.noarch",
            "openSUSE Leap 15.4:kernel-rt-5.14.21-150400.15.5.1.x86_64",
            "openSUSE Leap 15.4:kernel-rt-devel-5.14.21-150400.15.5.1.x86_64",
            "openSUSE Leap 15.4:kernel-rt_debug-5.14.21-150400.15.5.1.x86_64",
            "openSUSE Leap 15.4:kernel-rt_debug-devel-5.14.21-150400.15.5.1.x86_64",
            "openSUSE Leap 15.4:kernel-source-rt-5.14.21-150400.15.5.1.noarch",
            "openSUSE Leap 15.4:kernel-syms-rt-5.14.21-150400.15.5.1.x86_64",
            "openSUSE Leap 15.4:ocfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 7,
            "baseSeverity": "HIGH",
            "vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H",
            "version": "3.1"
          },
          "products": [
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_15_5-rt-1-150400.1.3.1.x86_64",
            "SUSE Real Time Module 15 SP4:cluster-md-kmp-rt-5.14.21-150400.15.5.1.x86_64",
            "SUSE Real Time Module 15 SP4:dlm-kmp-rt-5.14.21-150400.15.5.1.x86_64",
            "SUSE Real Time Module 15 SP4:gfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64",
            "SUSE Real Time Module 15 SP4:kernel-devel-rt-5.14.21-150400.15.5.1.noarch",
            "SUSE Real Time Module 15 SP4:kernel-rt-5.14.21-150400.15.5.1.x86_64",
            "SUSE Real Time Module 15 SP4:kernel-rt-devel-5.14.21-150400.15.5.1.x86_64",
            "SUSE Real Time Module 15 SP4:kernel-rt_debug-5.14.21-150400.15.5.1.x86_64",
            "SUSE Real Time Module 15 SP4:kernel-rt_debug-devel-5.14.21-150400.15.5.1.x86_64",
            "SUSE Real Time Module 15 SP4:kernel-source-rt-5.14.21-150400.15.5.1.noarch",
            "SUSE Real Time Module 15 SP4:kernel-syms-rt-5.14.21-150400.15.5.1.x86_64",
            "SUSE Real Time Module 15 SP4:ocfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64",
            "openSUSE Leap 15.4:cluster-md-kmp-rt-5.14.21-150400.15.5.1.x86_64",
            "openSUSE Leap 15.4:dlm-kmp-rt-5.14.21-150400.15.5.1.x86_64",
            "openSUSE Leap 15.4:gfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64",
            "openSUSE Leap 15.4:kernel-devel-rt-5.14.21-150400.15.5.1.noarch",
            "openSUSE Leap 15.4:kernel-rt-5.14.21-150400.15.5.1.x86_64",
            "openSUSE Leap 15.4:kernel-rt-devel-5.14.21-150400.15.5.1.x86_64",
            "openSUSE Leap 15.4:kernel-rt_debug-5.14.21-150400.15.5.1.x86_64",
            "openSUSE Leap 15.4:kernel-rt_debug-devel-5.14.21-150400.15.5.1.x86_64",
            "openSUSE Leap 15.4:kernel-source-rt-5.14.21-150400.15.5.1.noarch",
            "openSUSE Leap 15.4:kernel-syms-rt-5.14.21-150400.15.5.1.x86_64",
            "openSUSE Leap 15.4:ocfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2022-12-23T10:39:17Z",
          "details": "moderate"
        }
      ],
      "title": "CVE-2022-2978"
    },
    {
      "cve": "CVE-2022-3028",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2022-3028"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "A race condition was found in the Linux kernel\u0027s IP framework for transforming packets (XFRM subsystem) when multiple calls to xfrm_probe_algs occurred simultaneously. This flaw could allow a local attacker to potentially trigger an out-of-bounds write or leak kernel heap memory by performing an out-of-bounds read and copying it into a socket.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_15_5-rt-1-150400.1.3.1.x86_64",
          "SUSE Real Time Module 15 SP4:cluster-md-kmp-rt-5.14.21-150400.15.5.1.x86_64",
          "SUSE Real Time Module 15 SP4:dlm-kmp-rt-5.14.21-150400.15.5.1.x86_64",
          "SUSE Real Time Module 15 SP4:gfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64",
          "SUSE Real Time Module 15 SP4:kernel-devel-rt-5.14.21-150400.15.5.1.noarch",
          "SUSE Real Time Module 15 SP4:kernel-rt-5.14.21-150400.15.5.1.x86_64",
          "SUSE Real Time Module 15 SP4:kernel-rt-devel-5.14.21-150400.15.5.1.x86_64",
          "SUSE Real Time Module 15 SP4:kernel-rt_debug-5.14.21-150400.15.5.1.x86_64",
          "SUSE Real Time Module 15 SP4:kernel-rt_debug-devel-5.14.21-150400.15.5.1.x86_64",
          "SUSE Real Time Module 15 SP4:kernel-source-rt-5.14.21-150400.15.5.1.noarch",
          "SUSE Real Time Module 15 SP4:kernel-syms-rt-5.14.21-150400.15.5.1.x86_64",
          "SUSE Real Time Module 15 SP4:ocfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64",
          "openSUSE Leap 15.4:cluster-md-kmp-rt-5.14.21-150400.15.5.1.x86_64",
          "openSUSE Leap 15.4:dlm-kmp-rt-5.14.21-150400.15.5.1.x86_64",
          "openSUSE Leap 15.4:gfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64",
          "openSUSE Leap 15.4:kernel-devel-rt-5.14.21-150400.15.5.1.noarch",
          "openSUSE Leap 15.4:kernel-rt-5.14.21-150400.15.5.1.x86_64",
          "openSUSE Leap 15.4:kernel-rt-devel-5.14.21-150400.15.5.1.x86_64",
          "openSUSE Leap 15.4:kernel-rt_debug-5.14.21-150400.15.5.1.x86_64",
          "openSUSE Leap 15.4:kernel-rt_debug-devel-5.14.21-150400.15.5.1.x86_64",
          "openSUSE Leap 15.4:kernel-source-rt-5.14.21-150400.15.5.1.noarch",
          "openSUSE Leap 15.4:kernel-syms-rt-5.14.21-150400.15.5.1.x86_64",
          "openSUSE Leap 15.4:ocfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2022-3028",
          "url": "https://www.suse.com/security/cve/CVE-2022-3028"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1202898 for CVE-2022-3028",
          "url": "https://bugzilla.suse.com/1202898"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1212296 for CVE-2022-3028",
          "url": "https://bugzilla.suse.com/1212296"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_15_5-rt-1-150400.1.3.1.x86_64",
            "SUSE Real Time Module 15 SP4:cluster-md-kmp-rt-5.14.21-150400.15.5.1.x86_64",
            "SUSE Real Time Module 15 SP4:dlm-kmp-rt-5.14.21-150400.15.5.1.x86_64",
            "SUSE Real Time Module 15 SP4:gfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64",
            "SUSE Real Time Module 15 SP4:kernel-devel-rt-5.14.21-150400.15.5.1.noarch",
            "SUSE Real Time Module 15 SP4:kernel-rt-5.14.21-150400.15.5.1.x86_64",
            "SUSE Real Time Module 15 SP4:kernel-rt-devel-5.14.21-150400.15.5.1.x86_64",
            "SUSE Real Time Module 15 SP4:kernel-rt_debug-5.14.21-150400.15.5.1.x86_64",
            "SUSE Real Time Module 15 SP4:kernel-rt_debug-devel-5.14.21-150400.15.5.1.x86_64",
            "SUSE Real Time Module 15 SP4:kernel-source-rt-5.14.21-150400.15.5.1.noarch",
            "SUSE Real Time Module 15 SP4:kernel-syms-rt-5.14.21-150400.15.5.1.x86_64",
            "SUSE Real Time Module 15 SP4:ocfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64",
            "openSUSE Leap 15.4:cluster-md-kmp-rt-5.14.21-150400.15.5.1.x86_64",
            "openSUSE Leap 15.4:dlm-kmp-rt-5.14.21-150400.15.5.1.x86_64",
            "openSUSE Leap 15.4:gfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64",
            "openSUSE Leap 15.4:kernel-devel-rt-5.14.21-150400.15.5.1.noarch",
            "openSUSE Leap 15.4:kernel-rt-5.14.21-150400.15.5.1.x86_64",
            "openSUSE Leap 15.4:kernel-rt-devel-5.14.21-150400.15.5.1.x86_64",
            "openSUSE Leap 15.4:kernel-rt_debug-5.14.21-150400.15.5.1.x86_64",
            "openSUSE Leap 15.4:kernel-rt_debug-devel-5.14.21-150400.15.5.1.x86_64",
            "openSUSE Leap 15.4:kernel-source-rt-5.14.21-150400.15.5.1.noarch",
            "openSUSE Leap 15.4:kernel-syms-rt-5.14.21-150400.15.5.1.x86_64",
            "openSUSE Leap 15.4:ocfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 6.7,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H",
            "version": "3.1"
          },
          "products": [
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_15_5-rt-1-150400.1.3.1.x86_64",
            "SUSE Real Time Module 15 SP4:cluster-md-kmp-rt-5.14.21-150400.15.5.1.x86_64",
            "SUSE Real Time Module 15 SP4:dlm-kmp-rt-5.14.21-150400.15.5.1.x86_64",
            "SUSE Real Time Module 15 SP4:gfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64",
            "SUSE Real Time Module 15 SP4:kernel-devel-rt-5.14.21-150400.15.5.1.noarch",
            "SUSE Real Time Module 15 SP4:kernel-rt-5.14.21-150400.15.5.1.x86_64",
            "SUSE Real Time Module 15 SP4:kernel-rt-devel-5.14.21-150400.15.5.1.x86_64",
            "SUSE Real Time Module 15 SP4:kernel-rt_debug-5.14.21-150400.15.5.1.x86_64",
            "SUSE Real Time Module 15 SP4:kernel-rt_debug-devel-5.14.21-150400.15.5.1.x86_64",
            "SUSE Real Time Module 15 SP4:kernel-source-rt-5.14.21-150400.15.5.1.noarch",
            "SUSE Real Time Module 15 SP4:kernel-syms-rt-5.14.21-150400.15.5.1.x86_64",
            "SUSE Real Time Module 15 SP4:ocfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64",
            "openSUSE Leap 15.4:cluster-md-kmp-rt-5.14.21-150400.15.5.1.x86_64",
            "openSUSE Leap 15.4:dlm-kmp-rt-5.14.21-150400.15.5.1.x86_64",
            "openSUSE Leap 15.4:gfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64",
            "openSUSE Leap 15.4:kernel-devel-rt-5.14.21-150400.15.5.1.noarch",
            "openSUSE Leap 15.4:kernel-rt-5.14.21-150400.15.5.1.x86_64",
            "openSUSE Leap 15.4:kernel-rt-devel-5.14.21-150400.15.5.1.x86_64",
            "openSUSE Leap 15.4:kernel-rt_debug-5.14.21-150400.15.5.1.x86_64",
            "openSUSE Leap 15.4:kernel-rt_debug-devel-5.14.21-150400.15.5.1.x86_64",
            "openSUSE Leap 15.4:kernel-source-rt-5.14.21-150400.15.5.1.noarch",
            "openSUSE Leap 15.4:kernel-syms-rt-5.14.21-150400.15.5.1.x86_64",
            "openSUSE Leap 15.4:ocfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2022-12-23T10:39:17Z",
          "details": "moderate"
        }
      ],
      "title": "CVE-2022-3028"
    },
    {
      "cve": "CVE-2022-3078",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2022-3078"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "An issue was discovered in the Linux kernel through 5.16-rc6. There is a lack of check after calling vzalloc() and lack of free after allocation in drivers/media/test-drivers/vidtv/vidtv_s302m.c.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_15_5-rt-1-150400.1.3.1.x86_64",
          "SUSE Real Time Module 15 SP4:cluster-md-kmp-rt-5.14.21-150400.15.5.1.x86_64",
          "SUSE Real Time Module 15 SP4:dlm-kmp-rt-5.14.21-150400.15.5.1.x86_64",
          "SUSE Real Time Module 15 SP4:gfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64",
          "SUSE Real Time Module 15 SP4:kernel-devel-rt-5.14.21-150400.15.5.1.noarch",
          "SUSE Real Time Module 15 SP4:kernel-rt-5.14.21-150400.15.5.1.x86_64",
          "SUSE Real Time Module 15 SP4:kernel-rt-devel-5.14.21-150400.15.5.1.x86_64",
          "SUSE Real Time Module 15 SP4:kernel-rt_debug-5.14.21-150400.15.5.1.x86_64",
          "SUSE Real Time Module 15 SP4:kernel-rt_debug-devel-5.14.21-150400.15.5.1.x86_64",
          "SUSE Real Time Module 15 SP4:kernel-source-rt-5.14.21-150400.15.5.1.noarch",
          "SUSE Real Time Module 15 SP4:kernel-syms-rt-5.14.21-150400.15.5.1.x86_64",
          "SUSE Real Time Module 15 SP4:ocfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64",
          "openSUSE Leap 15.4:cluster-md-kmp-rt-5.14.21-150400.15.5.1.x86_64",
          "openSUSE Leap 15.4:dlm-kmp-rt-5.14.21-150400.15.5.1.x86_64",
          "openSUSE Leap 15.4:gfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64",
          "openSUSE Leap 15.4:kernel-devel-rt-5.14.21-150400.15.5.1.noarch",
          "openSUSE Leap 15.4:kernel-rt-5.14.21-150400.15.5.1.x86_64",
          "openSUSE Leap 15.4:kernel-rt-devel-5.14.21-150400.15.5.1.x86_64",
          "openSUSE Leap 15.4:kernel-rt_debug-5.14.21-150400.15.5.1.x86_64",
          "openSUSE Leap 15.4:kernel-rt_debug-devel-5.14.21-150400.15.5.1.x86_64",
          "openSUSE Leap 15.4:kernel-source-rt-5.14.21-150400.15.5.1.noarch",
          "openSUSE Leap 15.4:kernel-syms-rt-5.14.21-150400.15.5.1.x86_64",
          "openSUSE Leap 15.4:ocfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2022-3078",
          "url": "https://www.suse.com/security/cve/CVE-2022-3078"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1203041 for CVE-2022-3078",
          "url": "https://bugzilla.suse.com/1203041"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_15_5-rt-1-150400.1.3.1.x86_64",
            "SUSE Real Time Module 15 SP4:cluster-md-kmp-rt-5.14.21-150400.15.5.1.x86_64",
            "SUSE Real Time Module 15 SP4:dlm-kmp-rt-5.14.21-150400.15.5.1.x86_64",
            "SUSE Real Time Module 15 SP4:gfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64",
            "SUSE Real Time Module 15 SP4:kernel-devel-rt-5.14.21-150400.15.5.1.noarch",
            "SUSE Real Time Module 15 SP4:kernel-rt-5.14.21-150400.15.5.1.x86_64",
            "SUSE Real Time Module 15 SP4:kernel-rt-devel-5.14.21-150400.15.5.1.x86_64",
            "SUSE Real Time Module 15 SP4:kernel-rt_debug-5.14.21-150400.15.5.1.x86_64",
            "SUSE Real Time Module 15 SP4:kernel-rt_debug-devel-5.14.21-150400.15.5.1.x86_64",
            "SUSE Real Time Module 15 SP4:kernel-source-rt-5.14.21-150400.15.5.1.noarch",
            "SUSE Real Time Module 15 SP4:kernel-syms-rt-5.14.21-150400.15.5.1.x86_64",
            "SUSE Real Time Module 15 SP4:ocfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64",
            "openSUSE Leap 15.4:cluster-md-kmp-rt-5.14.21-150400.15.5.1.x86_64",
            "openSUSE Leap 15.4:dlm-kmp-rt-5.14.21-150400.15.5.1.x86_64",
            "openSUSE Leap 15.4:gfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64",
            "openSUSE Leap 15.4:kernel-devel-rt-5.14.21-150400.15.5.1.noarch",
            "openSUSE Leap 15.4:kernel-rt-5.14.21-150400.15.5.1.x86_64",
            "openSUSE Leap 15.4:kernel-rt-devel-5.14.21-150400.15.5.1.x86_64",
            "openSUSE Leap 15.4:kernel-rt_debug-5.14.21-150400.15.5.1.x86_64",
            "openSUSE Leap 15.4:kernel-rt_debug-devel-5.14.21-150400.15.5.1.x86_64",
            "openSUSE Leap 15.4:kernel-source-rt-5.14.21-150400.15.5.1.noarch",
            "openSUSE Leap 15.4:kernel-syms-rt-5.14.21-150400.15.5.1.x86_64",
            "openSUSE Leap 15.4:ocfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 4,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L",
            "version": "3.1"
          },
          "products": [
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_15_5-rt-1-150400.1.3.1.x86_64",
            "SUSE Real Time Module 15 SP4:cluster-md-kmp-rt-5.14.21-150400.15.5.1.x86_64",
            "SUSE Real Time Module 15 SP4:dlm-kmp-rt-5.14.21-150400.15.5.1.x86_64",
            "SUSE Real Time Module 15 SP4:gfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64",
            "SUSE Real Time Module 15 SP4:kernel-devel-rt-5.14.21-150400.15.5.1.noarch",
            "SUSE Real Time Module 15 SP4:kernel-rt-5.14.21-150400.15.5.1.x86_64",
            "SUSE Real Time Module 15 SP4:kernel-rt-devel-5.14.21-150400.15.5.1.x86_64",
            "SUSE Real Time Module 15 SP4:kernel-rt_debug-5.14.21-150400.15.5.1.x86_64",
            "SUSE Real Time Module 15 SP4:kernel-rt_debug-devel-5.14.21-150400.15.5.1.x86_64",
            "SUSE Real Time Module 15 SP4:kernel-source-rt-5.14.21-150400.15.5.1.noarch",
            "SUSE Real Time Module 15 SP4:kernel-syms-rt-5.14.21-150400.15.5.1.x86_64",
            "SUSE Real Time Module 15 SP4:ocfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64",
            "openSUSE Leap 15.4:cluster-md-kmp-rt-5.14.21-150400.15.5.1.x86_64",
            "openSUSE Leap 15.4:dlm-kmp-rt-5.14.21-150400.15.5.1.x86_64",
            "openSUSE Leap 15.4:gfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64",
            "openSUSE Leap 15.4:kernel-devel-rt-5.14.21-150400.15.5.1.noarch",
            "openSUSE Leap 15.4:kernel-rt-5.14.21-150400.15.5.1.x86_64",
            "openSUSE Leap 15.4:kernel-rt-devel-5.14.21-150400.15.5.1.x86_64",
            "openSUSE Leap 15.4:kernel-rt_debug-5.14.21-150400.15.5.1.x86_64",
            "openSUSE Leap 15.4:kernel-rt_debug-devel-5.14.21-150400.15.5.1.x86_64",
            "openSUSE Leap 15.4:kernel-source-rt-5.14.21-150400.15.5.1.noarch",
            "openSUSE Leap 15.4:kernel-syms-rt-5.14.21-150400.15.5.1.x86_64",
            "openSUSE Leap 15.4:ocfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2022-12-23T10:39:17Z",
          "details": "low"
        }
      ],
      "title": "CVE-2022-3078"
    },
    {
      "cve": "CVE-2022-3114",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2022-3114"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "An issue was discovered in the Linux kernel through 5.16-rc6. imx_register_uart_clocks in drivers/clk/imx/clk.c lacks check of the return value of kcalloc() and will cause the null pointer dereference.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_15_5-rt-1-150400.1.3.1.x86_64",
          "SUSE Real Time Module 15 SP4:cluster-md-kmp-rt-5.14.21-150400.15.5.1.x86_64",
          "SUSE Real Time Module 15 SP4:dlm-kmp-rt-5.14.21-150400.15.5.1.x86_64",
          "SUSE Real Time Module 15 SP4:gfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64",
          "SUSE Real Time Module 15 SP4:kernel-devel-rt-5.14.21-150400.15.5.1.noarch",
          "SUSE Real Time Module 15 SP4:kernel-rt-5.14.21-150400.15.5.1.x86_64",
          "SUSE Real Time Module 15 SP4:kernel-rt-devel-5.14.21-150400.15.5.1.x86_64",
          "SUSE Real Time Module 15 SP4:kernel-rt_debug-5.14.21-150400.15.5.1.x86_64",
          "SUSE Real Time Module 15 SP4:kernel-rt_debug-devel-5.14.21-150400.15.5.1.x86_64",
          "SUSE Real Time Module 15 SP4:kernel-source-rt-5.14.21-150400.15.5.1.noarch",
          "SUSE Real Time Module 15 SP4:kernel-syms-rt-5.14.21-150400.15.5.1.x86_64",
          "SUSE Real Time Module 15 SP4:ocfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64",
          "openSUSE Leap 15.4:cluster-md-kmp-rt-5.14.21-150400.15.5.1.x86_64",
          "openSUSE Leap 15.4:dlm-kmp-rt-5.14.21-150400.15.5.1.x86_64",
          "openSUSE Leap 15.4:gfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64",
          "openSUSE Leap 15.4:kernel-devel-rt-5.14.21-150400.15.5.1.noarch",
          "openSUSE Leap 15.4:kernel-rt-5.14.21-150400.15.5.1.x86_64",
          "openSUSE Leap 15.4:kernel-rt-devel-5.14.21-150400.15.5.1.x86_64",
          "openSUSE Leap 15.4:kernel-rt_debug-5.14.21-150400.15.5.1.x86_64",
          "openSUSE Leap 15.4:kernel-rt_debug-devel-5.14.21-150400.15.5.1.x86_64",
          "openSUSE Leap 15.4:kernel-source-rt-5.14.21-150400.15.5.1.noarch",
          "openSUSE Leap 15.4:kernel-syms-rt-5.14.21-150400.15.5.1.x86_64",
          "openSUSE Leap 15.4:ocfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2022-3114",
          "url": "https://www.suse.com/security/cve/CVE-2022-3114"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1206391 for CVE-2022-3114",
          "url": "https://bugzilla.suse.com/1206391"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_15_5-rt-1-150400.1.3.1.x86_64",
            "SUSE Real Time Module 15 SP4:cluster-md-kmp-rt-5.14.21-150400.15.5.1.x86_64",
            "SUSE Real Time Module 15 SP4:dlm-kmp-rt-5.14.21-150400.15.5.1.x86_64",
            "SUSE Real Time Module 15 SP4:gfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64",
            "SUSE Real Time Module 15 SP4:kernel-devel-rt-5.14.21-150400.15.5.1.noarch",
            "SUSE Real Time Module 15 SP4:kernel-rt-5.14.21-150400.15.5.1.x86_64",
            "SUSE Real Time Module 15 SP4:kernel-rt-devel-5.14.21-150400.15.5.1.x86_64",
            "SUSE Real Time Module 15 SP4:kernel-rt_debug-5.14.21-150400.15.5.1.x86_64",
            "SUSE Real Time Module 15 SP4:kernel-rt_debug-devel-5.14.21-150400.15.5.1.x86_64",
            "SUSE Real Time Module 15 SP4:kernel-source-rt-5.14.21-150400.15.5.1.noarch",
            "SUSE Real Time Module 15 SP4:kernel-syms-rt-5.14.21-150400.15.5.1.x86_64",
            "SUSE Real Time Module 15 SP4:ocfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64",
            "openSUSE Leap 15.4:cluster-md-kmp-rt-5.14.21-150400.15.5.1.x86_64",
            "openSUSE Leap 15.4:dlm-kmp-rt-5.14.21-150400.15.5.1.x86_64",
            "openSUSE Leap 15.4:gfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64",
            "openSUSE Leap 15.4:kernel-devel-rt-5.14.21-150400.15.5.1.noarch",
            "openSUSE Leap 15.4:kernel-rt-5.14.21-150400.15.5.1.x86_64",
            "openSUSE Leap 15.4:kernel-rt-devel-5.14.21-150400.15.5.1.x86_64",
            "openSUSE Leap 15.4:kernel-rt_debug-5.14.21-150400.15.5.1.x86_64",
            "openSUSE Leap 15.4:kernel-rt_debug-devel-5.14.21-150400.15.5.1.x86_64",
            "openSUSE Leap 15.4:kernel-source-rt-5.14.21-150400.15.5.1.noarch",
            "openSUSE Leap 15.4:kernel-syms-rt-5.14.21-150400.15.5.1.x86_64",
            "openSUSE Leap 15.4:ocfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 5.5,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
            "version": "3.1"
          },
          "products": [
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_15_5-rt-1-150400.1.3.1.x86_64",
            "SUSE Real Time Module 15 SP4:cluster-md-kmp-rt-5.14.21-150400.15.5.1.x86_64",
            "SUSE Real Time Module 15 SP4:dlm-kmp-rt-5.14.21-150400.15.5.1.x86_64",
            "SUSE Real Time Module 15 SP4:gfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64",
            "SUSE Real Time Module 15 SP4:kernel-devel-rt-5.14.21-150400.15.5.1.noarch",
            "SUSE Real Time Module 15 SP4:kernel-rt-5.14.21-150400.15.5.1.x86_64",
            "SUSE Real Time Module 15 SP4:kernel-rt-devel-5.14.21-150400.15.5.1.x86_64",
            "SUSE Real Time Module 15 SP4:kernel-rt_debug-5.14.21-150400.15.5.1.x86_64",
            "SUSE Real Time Module 15 SP4:kernel-rt_debug-devel-5.14.21-150400.15.5.1.x86_64",
            "SUSE Real Time Module 15 SP4:kernel-source-rt-5.14.21-150400.15.5.1.noarch",
            "SUSE Real Time Module 15 SP4:kernel-syms-rt-5.14.21-150400.15.5.1.x86_64",
            "SUSE Real Time Module 15 SP4:ocfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64",
            "openSUSE Leap 15.4:cluster-md-kmp-rt-5.14.21-150400.15.5.1.x86_64",
            "openSUSE Leap 15.4:dlm-kmp-rt-5.14.21-150400.15.5.1.x86_64",
            "openSUSE Leap 15.4:gfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64",
            "openSUSE Leap 15.4:kernel-devel-rt-5.14.21-150400.15.5.1.noarch",
            "openSUSE Leap 15.4:kernel-rt-5.14.21-150400.15.5.1.x86_64",
            "openSUSE Leap 15.4:kernel-rt-devel-5.14.21-150400.15.5.1.x86_64",
            "openSUSE Leap 15.4:kernel-rt_debug-5.14.21-150400.15.5.1.x86_64",
            "openSUSE Leap 15.4:kernel-rt_debug-devel-5.14.21-150400.15.5.1.x86_64",
            "openSUSE Leap 15.4:kernel-source-rt-5.14.21-150400.15.5.1.noarch",
            "openSUSE Leap 15.4:kernel-syms-rt-5.14.21-150400.15.5.1.x86_64",
            "openSUSE Leap 15.4:ocfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2022-12-23T10:39:17Z",
          "details": "moderate"
        }
      ],
      "title": "CVE-2022-3114"
    },
    {
      "cve": "CVE-2022-3169",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2022-3169"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "A flaw was found in the Linux kernel. A denial of service flaw may occur if there is a consecutive request of the NVME_IOCTL_RESET and the NVME_IOCTL_SUBSYS_RESET through the device file of the driver, resulting in a PCIe link disconnect.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_15_5-rt-1-150400.1.3.1.x86_64",
          "SUSE Real Time Module 15 SP4:cluster-md-kmp-rt-5.14.21-150400.15.5.1.x86_64",
          "SUSE Real Time Module 15 SP4:dlm-kmp-rt-5.14.21-150400.15.5.1.x86_64",
          "SUSE Real Time Module 15 SP4:gfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64",
          "SUSE Real Time Module 15 SP4:kernel-devel-rt-5.14.21-150400.15.5.1.noarch",
          "SUSE Real Time Module 15 SP4:kernel-rt-5.14.21-150400.15.5.1.x86_64",
          "SUSE Real Time Module 15 SP4:kernel-rt-devel-5.14.21-150400.15.5.1.x86_64",
          "SUSE Real Time Module 15 SP4:kernel-rt_debug-5.14.21-150400.15.5.1.x86_64",
          "SUSE Real Time Module 15 SP4:kernel-rt_debug-devel-5.14.21-150400.15.5.1.x86_64",
          "SUSE Real Time Module 15 SP4:kernel-source-rt-5.14.21-150400.15.5.1.noarch",
          "SUSE Real Time Module 15 SP4:kernel-syms-rt-5.14.21-150400.15.5.1.x86_64",
          "SUSE Real Time Module 15 SP4:ocfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64",
          "openSUSE Leap 15.4:cluster-md-kmp-rt-5.14.21-150400.15.5.1.x86_64",
          "openSUSE Leap 15.4:dlm-kmp-rt-5.14.21-150400.15.5.1.x86_64",
          "openSUSE Leap 15.4:gfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64",
          "openSUSE Leap 15.4:kernel-devel-rt-5.14.21-150400.15.5.1.noarch",
          "openSUSE Leap 15.4:kernel-rt-5.14.21-150400.15.5.1.x86_64",
          "openSUSE Leap 15.4:kernel-rt-devel-5.14.21-150400.15.5.1.x86_64",
          "openSUSE Leap 15.4:kernel-rt_debug-5.14.21-150400.15.5.1.x86_64",
          "openSUSE Leap 15.4:kernel-rt_debug-devel-5.14.21-150400.15.5.1.x86_64",
          "openSUSE Leap 15.4:kernel-source-rt-5.14.21-150400.15.5.1.noarch",
          "openSUSE Leap 15.4:kernel-syms-rt-5.14.21-150400.15.5.1.x86_64",
          "openSUSE Leap 15.4:ocfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2022-3169",
          "url": "https://www.suse.com/security/cve/CVE-2022-3169"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1203290 for CVE-2022-3169",
          "url": "https://bugzilla.suse.com/1203290"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_15_5-rt-1-150400.1.3.1.x86_64",
            "SUSE Real Time Module 15 SP4:cluster-md-kmp-rt-5.14.21-150400.15.5.1.x86_64",
            "SUSE Real Time Module 15 SP4:dlm-kmp-rt-5.14.21-150400.15.5.1.x86_64",
            "SUSE Real Time Module 15 SP4:gfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64",
            "SUSE Real Time Module 15 SP4:kernel-devel-rt-5.14.21-150400.15.5.1.noarch",
            "SUSE Real Time Module 15 SP4:kernel-rt-5.14.21-150400.15.5.1.x86_64",
            "SUSE Real Time Module 15 SP4:kernel-rt-devel-5.14.21-150400.15.5.1.x86_64",
            "SUSE Real Time Module 15 SP4:kernel-rt_debug-5.14.21-150400.15.5.1.x86_64",
            "SUSE Real Time Module 15 SP4:kernel-rt_debug-devel-5.14.21-150400.15.5.1.x86_64",
            "SUSE Real Time Module 15 SP4:kernel-source-rt-5.14.21-150400.15.5.1.noarch",
            "SUSE Real Time Module 15 SP4:kernel-syms-rt-5.14.21-150400.15.5.1.x86_64",
            "SUSE Real Time Module 15 SP4:ocfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64",
            "openSUSE Leap 15.4:cluster-md-kmp-rt-5.14.21-150400.15.5.1.x86_64",
            "openSUSE Leap 15.4:dlm-kmp-rt-5.14.21-150400.15.5.1.x86_64",
            "openSUSE Leap 15.4:gfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64",
            "openSUSE Leap 15.4:kernel-devel-rt-5.14.21-150400.15.5.1.noarch",
            "openSUSE Leap 15.4:kernel-rt-5.14.21-150400.15.5.1.x86_64",
            "openSUSE Leap 15.4:kernel-rt-devel-5.14.21-150400.15.5.1.x86_64",
            "openSUSE Leap 15.4:kernel-rt_debug-5.14.21-150400.15.5.1.x86_64",
            "openSUSE Leap 15.4:kernel-rt_debug-devel-5.14.21-150400.15.5.1.x86_64",
            "openSUSE Leap 15.4:kernel-source-rt-5.14.21-150400.15.5.1.noarch",
            "openSUSE Leap 15.4:kernel-syms-rt-5.14.21-150400.15.5.1.x86_64",
            "openSUSE Leap 15.4:ocfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 6.2,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
            "version": "3.1"
          },
          "products": [
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_15_5-rt-1-150400.1.3.1.x86_64",
            "SUSE Real Time Module 15 SP4:cluster-md-kmp-rt-5.14.21-150400.15.5.1.x86_64",
            "SUSE Real Time Module 15 SP4:dlm-kmp-rt-5.14.21-150400.15.5.1.x86_64",
            "SUSE Real Time Module 15 SP4:gfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64",
            "SUSE Real Time Module 15 SP4:kernel-devel-rt-5.14.21-150400.15.5.1.noarch",
            "SUSE Real Time Module 15 SP4:kernel-rt-5.14.21-150400.15.5.1.x86_64",
            "SUSE Real Time Module 15 SP4:kernel-rt-devel-5.14.21-150400.15.5.1.x86_64",
            "SUSE Real Time Module 15 SP4:kernel-rt_debug-5.14.21-150400.15.5.1.x86_64",
            "SUSE Real Time Module 15 SP4:kernel-rt_debug-devel-5.14.21-150400.15.5.1.x86_64",
            "SUSE Real Time Module 15 SP4:kernel-source-rt-5.14.21-150400.15.5.1.noarch",
            "SUSE Real Time Module 15 SP4:kernel-syms-rt-5.14.21-150400.15.5.1.x86_64",
            "SUSE Real Time Module 15 SP4:ocfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64",
            "openSUSE Leap 15.4:cluster-md-kmp-rt-5.14.21-150400.15.5.1.x86_64",
            "openSUSE Leap 15.4:dlm-kmp-rt-5.14.21-150400.15.5.1.x86_64",
            "openSUSE Leap 15.4:gfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64",
            "openSUSE Leap 15.4:kernel-devel-rt-5.14.21-150400.15.5.1.noarch",
            "openSUSE Leap 15.4:kernel-rt-5.14.21-150400.15.5.1.x86_64",
            "openSUSE Leap 15.4:kernel-rt-devel-5.14.21-150400.15.5.1.x86_64",
            "openSUSE Leap 15.4:kernel-rt_debug-5.14.21-150400.15.5.1.x86_64",
            "openSUSE Leap 15.4:kernel-rt_debug-devel-5.14.21-150400.15.5.1.x86_64",
            "openSUSE Leap 15.4:kernel-source-rt-5.14.21-150400.15.5.1.noarch",
            "openSUSE Leap 15.4:kernel-syms-rt-5.14.21-150400.15.5.1.x86_64",
            "openSUSE Leap 15.4:ocfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2022-12-23T10:39:17Z",
          "details": "moderate"
        }
      ],
      "title": "CVE-2022-3169"
    },
    {
      "cve": "CVE-2022-3176",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2022-3176"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "There exists a use-after-free in io_uring in the Linux kernel. Signalfd_poll() and binder_poll() use a waitqueue whose lifetime is the current task. It will send a POLLFREE notification to all waiters before the queue is freed. Unfortunately, the io_uring poll doesn\u0027t handle POLLFREE. This allows a use-after-free to occur if a signalfd or binder fd is polled with io_uring poll, and the waitqueue gets freed. We recommend upgrading past commit fc78b2fc21f10c4c9c4d5d659a685710ffa63659",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_15_5-rt-1-150400.1.3.1.x86_64",
          "SUSE Real Time Module 15 SP4:cluster-md-kmp-rt-5.14.21-150400.15.5.1.x86_64",
          "SUSE Real Time Module 15 SP4:dlm-kmp-rt-5.14.21-150400.15.5.1.x86_64",
          "SUSE Real Time Module 15 SP4:gfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64",
          "SUSE Real Time Module 15 SP4:kernel-devel-rt-5.14.21-150400.15.5.1.noarch",
          "SUSE Real Time Module 15 SP4:kernel-rt-5.14.21-150400.15.5.1.x86_64",
          "SUSE Real Time Module 15 SP4:kernel-rt-devel-5.14.21-150400.15.5.1.x86_64",
          "SUSE Real Time Module 15 SP4:kernel-rt_debug-5.14.21-150400.15.5.1.x86_64",
          "SUSE Real Time Module 15 SP4:kernel-rt_debug-devel-5.14.21-150400.15.5.1.x86_64",
          "SUSE Real Time Module 15 SP4:kernel-source-rt-5.14.21-150400.15.5.1.noarch",
          "SUSE Real Time Module 15 SP4:kernel-syms-rt-5.14.21-150400.15.5.1.x86_64",
          "SUSE Real Time Module 15 SP4:ocfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64",
          "openSUSE Leap 15.4:cluster-md-kmp-rt-5.14.21-150400.15.5.1.x86_64",
          "openSUSE Leap 15.4:dlm-kmp-rt-5.14.21-150400.15.5.1.x86_64",
          "openSUSE Leap 15.4:gfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64",
          "openSUSE Leap 15.4:kernel-devel-rt-5.14.21-150400.15.5.1.noarch",
          "openSUSE Leap 15.4:kernel-rt-5.14.21-150400.15.5.1.x86_64",
          "openSUSE Leap 15.4:kernel-rt-devel-5.14.21-150400.15.5.1.x86_64",
          "openSUSE Leap 15.4:kernel-rt_debug-5.14.21-150400.15.5.1.x86_64",
          "openSUSE Leap 15.4:kernel-rt_debug-devel-5.14.21-150400.15.5.1.x86_64",
          "openSUSE Leap 15.4:kernel-source-rt-5.14.21-150400.15.5.1.noarch",
          "openSUSE Leap 15.4:kernel-syms-rt-5.14.21-150400.15.5.1.x86_64",
          "openSUSE Leap 15.4:ocfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2022-3176",
          "url": "https://www.suse.com/security/cve/CVE-2022-3176"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1203391 for CVE-2022-3176",
          "url": "https://bugzilla.suse.com/1203391"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1203511 for CVE-2022-3176",
          "url": "https://bugzilla.suse.com/1203511"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_15_5-rt-1-150400.1.3.1.x86_64",
            "SUSE Real Time Module 15 SP4:cluster-md-kmp-rt-5.14.21-150400.15.5.1.x86_64",
            "SUSE Real Time Module 15 SP4:dlm-kmp-rt-5.14.21-150400.15.5.1.x86_64",
            "SUSE Real Time Module 15 SP4:gfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64",
            "SUSE Real Time Module 15 SP4:kernel-devel-rt-5.14.21-150400.15.5.1.noarch",
            "SUSE Real Time Module 15 SP4:kernel-rt-5.14.21-150400.15.5.1.x86_64",
            "SUSE Real Time Module 15 SP4:kernel-rt-devel-5.14.21-150400.15.5.1.x86_64",
            "SUSE Real Time Module 15 SP4:kernel-rt_debug-5.14.21-150400.15.5.1.x86_64",
            "SUSE Real Time Module 15 SP4:kernel-rt_debug-devel-5.14.21-150400.15.5.1.x86_64",
            "SUSE Real Time Module 15 SP4:kernel-source-rt-5.14.21-150400.15.5.1.noarch",
            "SUSE Real Time Module 15 SP4:kernel-syms-rt-5.14.21-150400.15.5.1.x86_64",
            "SUSE Real Time Module 15 SP4:ocfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64",
            "openSUSE Leap 15.4:cluster-md-kmp-rt-5.14.21-150400.15.5.1.x86_64",
            "openSUSE Leap 15.4:dlm-kmp-rt-5.14.21-150400.15.5.1.x86_64",
            "openSUSE Leap 15.4:gfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64",
            "openSUSE Leap 15.4:kernel-devel-rt-5.14.21-150400.15.5.1.noarch",
            "openSUSE Leap 15.4:kernel-rt-5.14.21-150400.15.5.1.x86_64",
            "openSUSE Leap 15.4:kernel-rt-devel-5.14.21-150400.15.5.1.x86_64",
            "openSUSE Leap 15.4:kernel-rt_debug-5.14.21-150400.15.5.1.x86_64",
            "openSUSE Leap 15.4:kernel-rt_debug-devel-5.14.21-150400.15.5.1.x86_64",
            "openSUSE Leap 15.4:kernel-source-rt-5.14.21-150400.15.5.1.noarch",
            "openSUSE Leap 15.4:kernel-syms-rt-5.14.21-150400.15.5.1.x86_64",
            "openSUSE Leap 15.4:ocfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 7.8,
            "baseSeverity": "HIGH",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
            "version": "3.1"
          },
          "products": [
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_15_5-rt-1-150400.1.3.1.x86_64",
            "SUSE Real Time Module 15 SP4:cluster-md-kmp-rt-5.14.21-150400.15.5.1.x86_64",
            "SUSE Real Time Module 15 SP4:dlm-kmp-rt-5.14.21-150400.15.5.1.x86_64",
            "SUSE Real Time Module 15 SP4:gfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64",
            "SUSE Real Time Module 15 SP4:kernel-devel-rt-5.14.21-150400.15.5.1.noarch",
            "SUSE Real Time Module 15 SP4:kernel-rt-5.14.21-150400.15.5.1.x86_64",
            "SUSE Real Time Module 15 SP4:kernel-rt-devel-5.14.21-150400.15.5.1.x86_64",
            "SUSE Real Time Module 15 SP4:kernel-rt_debug-5.14.21-150400.15.5.1.x86_64",
            "SUSE Real Time Module 15 SP4:kernel-rt_debug-devel-5.14.21-150400.15.5.1.x86_64",
            "SUSE Real Time Module 15 SP4:kernel-source-rt-5.14.21-150400.15.5.1.noarch",
            "SUSE Real Time Module 15 SP4:kernel-syms-rt-5.14.21-150400.15.5.1.x86_64",
            "SUSE Real Time Module 15 SP4:ocfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64",
            "openSUSE Leap 15.4:cluster-md-kmp-rt-5.14.21-150400.15.5.1.x86_64",
            "openSUSE Leap 15.4:dlm-kmp-rt-5.14.21-150400.15.5.1.x86_64",
            "openSUSE Leap 15.4:gfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64",
            "openSUSE Leap 15.4:kernel-devel-rt-5.14.21-150400.15.5.1.noarch",
            "openSUSE Leap 15.4:kernel-rt-5.14.21-150400.15.5.1.x86_64",
            "openSUSE Leap 15.4:kernel-rt-devel-5.14.21-150400.15.5.1.x86_64",
            "openSUSE Leap 15.4:kernel-rt_debug-5.14.21-150400.15.5.1.x86_64",
            "openSUSE Leap 15.4:kernel-rt_debug-devel-5.14.21-150400.15.5.1.x86_64",
            "openSUSE Leap 15.4:kernel-source-rt-5.14.21-150400.15.5.1.noarch",
            "openSUSE Leap 15.4:kernel-syms-rt-5.14.21-150400.15.5.1.x86_64",
            "openSUSE Leap 15.4:ocfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2022-12-23T10:39:17Z",
          "details": "important"
        }
      ],
      "title": "CVE-2022-3176"
    },
    {
      "cve": "CVE-2022-3202",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2022-3202"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "A NULL pointer dereference flaw in diFree in fs/jfs/inode.c in Journaled File System (JFS)in the Linux kernel. This could allow a local attacker to crash the system or leak kernel internal information.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_15_5-rt-1-150400.1.3.1.x86_64",
          "SUSE Real Time Module 15 SP4:cluster-md-kmp-rt-5.14.21-150400.15.5.1.x86_64",
          "SUSE Real Time Module 15 SP4:dlm-kmp-rt-5.14.21-150400.15.5.1.x86_64",
          "SUSE Real Time Module 15 SP4:gfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64",
          "SUSE Real Time Module 15 SP4:kernel-devel-rt-5.14.21-150400.15.5.1.noarch",
          "SUSE Real Time Module 15 SP4:kernel-rt-5.14.21-150400.15.5.1.x86_64",
          "SUSE Real Time Module 15 SP4:kernel-rt-devel-5.14.21-150400.15.5.1.x86_64",
          "SUSE Real Time Module 15 SP4:kernel-rt_debug-5.14.21-150400.15.5.1.x86_64",
          "SUSE Real Time Module 15 SP4:kernel-rt_debug-devel-5.14.21-150400.15.5.1.x86_64",
          "SUSE Real Time Module 15 SP4:kernel-source-rt-5.14.21-150400.15.5.1.noarch",
          "SUSE Real Time Module 15 SP4:kernel-syms-rt-5.14.21-150400.15.5.1.x86_64",
          "SUSE Real Time Module 15 SP4:ocfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64",
          "openSUSE Leap 15.4:cluster-md-kmp-rt-5.14.21-150400.15.5.1.x86_64",
          "openSUSE Leap 15.4:dlm-kmp-rt-5.14.21-150400.15.5.1.x86_64",
          "openSUSE Leap 15.4:gfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64",
          "openSUSE Leap 15.4:kernel-devel-rt-5.14.21-150400.15.5.1.noarch",
          "openSUSE Leap 15.4:kernel-rt-5.14.21-150400.15.5.1.x86_64",
          "openSUSE Leap 15.4:kernel-rt-devel-5.14.21-150400.15.5.1.x86_64",
          "openSUSE Leap 15.4:kernel-rt_debug-5.14.21-150400.15.5.1.x86_64",
          "openSUSE Leap 15.4:kernel-rt_debug-devel-5.14.21-150400.15.5.1.x86_64",
          "openSUSE Leap 15.4:kernel-source-rt-5.14.21-150400.15.5.1.noarch",
          "openSUSE Leap 15.4:kernel-syms-rt-5.14.21-150400.15.5.1.x86_64",
          "openSUSE Leap 15.4:ocfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2022-3202",
          "url": "https://www.suse.com/security/cve/CVE-2022-3202"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1203389 for CVE-2022-3202",
          "url": "https://bugzilla.suse.com/1203389"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_15_5-rt-1-150400.1.3.1.x86_64",
            "SUSE Real Time Module 15 SP4:cluster-md-kmp-rt-5.14.21-150400.15.5.1.x86_64",
            "SUSE Real Time Module 15 SP4:dlm-kmp-rt-5.14.21-150400.15.5.1.x86_64",
            "SUSE Real Time Module 15 SP4:gfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64",
            "SUSE Real Time Module 15 SP4:kernel-devel-rt-5.14.21-150400.15.5.1.noarch",
            "SUSE Real Time Module 15 SP4:kernel-rt-5.14.21-150400.15.5.1.x86_64",
            "SUSE Real Time Module 15 SP4:kernel-rt-devel-5.14.21-150400.15.5.1.x86_64",
            "SUSE Real Time Module 15 SP4:kernel-rt_debug-5.14.21-150400.15.5.1.x86_64",
            "SUSE Real Time Module 15 SP4:kernel-rt_debug-devel-5.14.21-150400.15.5.1.x86_64",
            "SUSE Real Time Module 15 SP4:kernel-source-rt-5.14.21-150400.15.5.1.noarch",
            "SUSE Real Time Module 15 SP4:kernel-syms-rt-5.14.21-150400.15.5.1.x86_64",
            "SUSE Real Time Module 15 SP4:ocfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64",
            "openSUSE Leap 15.4:cluster-md-kmp-rt-5.14.21-150400.15.5.1.x86_64",
            "openSUSE Leap 15.4:dlm-kmp-rt-5.14.21-150400.15.5.1.x86_64",
            "openSUSE Leap 15.4:gfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64",
            "openSUSE Leap 15.4:kernel-devel-rt-5.14.21-150400.15.5.1.noarch",
            "openSUSE Leap 15.4:kernel-rt-5.14.21-150400.15.5.1.x86_64",
            "openSUSE Leap 15.4:kernel-rt-devel-5.14.21-150400.15.5.1.x86_64",
            "openSUSE Leap 15.4:kernel-rt_debug-5.14.21-150400.15.5.1.x86_64",
            "openSUSE Leap 15.4:kernel-rt_debug-devel-5.14.21-150400.15.5.1.x86_64",
            "openSUSE Leap 15.4:kernel-source-rt-5.14.21-150400.15.5.1.noarch",
            "openSUSE Leap 15.4:kernel-syms-rt-5.14.21-150400.15.5.1.x86_64",
            "openSUSE Leap 15.4:ocfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 6.3,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:N/A:H",
            "version": "3.1"
          },
          "products": [
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_15_5-rt-1-150400.1.3.1.x86_64",
            "SUSE Real Time Module 15 SP4:cluster-md-kmp-rt-5.14.21-150400.15.5.1.x86_64",
            "SUSE Real Time Module 15 SP4:dlm-kmp-rt-5.14.21-150400.15.5.1.x86_64",
            "SUSE Real Time Module 15 SP4:gfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64",
            "SUSE Real Time Module 15 SP4:kernel-devel-rt-5.14.21-150400.15.5.1.noarch",
            "SUSE Real Time Module 15 SP4:kernel-rt-5.14.21-150400.15.5.1.x86_64",
            "SUSE Real Time Module 15 SP4:kernel-rt-devel-5.14.21-150400.15.5.1.x86_64",
            "SUSE Real Time Module 15 SP4:kernel-rt_debug-5.14.21-150400.15.5.1.x86_64",
            "SUSE Real Time Module 15 SP4:kernel-rt_debug-devel-5.14.21-150400.15.5.1.x86_64",
            "SUSE Real Time Module 15 SP4:kernel-source-rt-5.14.21-150400.15.5.1.noarch",
            "SUSE Real Time Module 15 SP4:kernel-syms-rt-5.14.21-150400.15.5.1.x86_64",
            "SUSE Real Time Module 15 SP4:ocfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64",
            "openSUSE Leap 15.4:cluster-md-kmp-rt-5.14.21-150400.15.5.1.x86_64",
            "openSUSE Leap 15.4:dlm-kmp-rt-5.14.21-150400.15.5.1.x86_64",
            "openSUSE Leap 15.4:gfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64",
            "openSUSE Leap 15.4:kernel-devel-rt-5.14.21-150400.15.5.1.noarch",
            "openSUSE Leap 15.4:kernel-rt-5.14.21-150400.15.5.1.x86_64",
            "openSUSE Leap 15.4:kernel-rt-devel-5.14.21-150400.15.5.1.x86_64",
            "openSUSE Leap 15.4:kernel-rt_debug-5.14.21-150400.15.5.1.x86_64",
            "openSUSE Leap 15.4:kernel-rt_debug-devel-5.14.21-150400.15.5.1.x86_64",
            "openSUSE Leap 15.4:kernel-source-rt-5.14.21-150400.15.5.1.noarch",
            "openSUSE Leap 15.4:kernel-syms-rt-5.14.21-150400.15.5.1.x86_64",
            "openSUSE Leap 15.4:ocfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2022-12-23T10:39:17Z",
          "details": "moderate"
        }
      ],
      "title": "CVE-2022-3202"
    },
    {
      "cve": "CVE-2022-32250",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2022-32250"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "net/netfilter/nf_tables_api.c in the Linux kernel through 5.18.1 allows a local user (able to create user/net namespaces) to escalate privileges to root because an incorrect NFT_STATEFUL_EXPR check leads to a use-after-free.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_15_5-rt-1-150400.1.3.1.x86_64",
          "SUSE Real Time Module 15 SP4:cluster-md-kmp-rt-5.14.21-150400.15.5.1.x86_64",
          "SUSE Real Time Module 15 SP4:dlm-kmp-rt-5.14.21-150400.15.5.1.x86_64",
          "SUSE Real Time Module 15 SP4:gfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64",
          "SUSE Real Time Module 15 SP4:kernel-devel-rt-5.14.21-150400.15.5.1.noarch",
          "SUSE Real Time Module 15 SP4:kernel-rt-5.14.21-150400.15.5.1.x86_64",
          "SUSE Real Time Module 15 SP4:kernel-rt-devel-5.14.21-150400.15.5.1.x86_64",
          "SUSE Real Time Module 15 SP4:kernel-rt_debug-5.14.21-150400.15.5.1.x86_64",
          "SUSE Real Time Module 15 SP4:kernel-rt_debug-devel-5.14.21-150400.15.5.1.x86_64",
          "SUSE Real Time Module 15 SP4:kernel-source-rt-5.14.21-150400.15.5.1.noarch",
          "SUSE Real Time Module 15 SP4:kernel-syms-rt-5.14.21-150400.15.5.1.x86_64",
          "SUSE Real Time Module 15 SP4:ocfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64",
          "openSUSE Leap 15.4:cluster-md-kmp-rt-5.14.21-150400.15.5.1.x86_64",
          "openSUSE Leap 15.4:dlm-kmp-rt-5.14.21-150400.15.5.1.x86_64",
          "openSUSE Leap 15.4:gfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64",
          "openSUSE Leap 15.4:kernel-devel-rt-5.14.21-150400.15.5.1.noarch",
          "openSUSE Leap 15.4:kernel-rt-5.14.21-150400.15.5.1.x86_64",
          "openSUSE Leap 15.4:kernel-rt-devel-5.14.21-150400.15.5.1.x86_64",
          "openSUSE Leap 15.4:kernel-rt_debug-5.14.21-150400.15.5.1.x86_64",
          "openSUSE Leap 15.4:kernel-rt_debug-devel-5.14.21-150400.15.5.1.x86_64",
          "openSUSE Leap 15.4:kernel-source-rt-5.14.21-150400.15.5.1.noarch",
          "openSUSE Leap 15.4:kernel-syms-rt-5.14.21-150400.15.5.1.x86_64",
          "openSUSE Leap 15.4:ocfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2022-32250",
          "url": "https://www.suse.com/security/cve/CVE-2022-32250"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1200015 for CVE-2022-32250",
          "url": "https://bugzilla.suse.com/1200015"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1200268 for CVE-2022-32250",
          "url": "https://bugzilla.suse.com/1200268"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1200494 for CVE-2022-32250",
          "url": "https://bugzilla.suse.com/1200494"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1202992 for CVE-2022-32250",
          "url": "https://bugzilla.suse.com/1202992"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1202993 for CVE-2022-32250",
          "url": "https://bugzilla.suse.com/1202993"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1203002 for CVE-2022-32250",
          "url": "https://bugzilla.suse.com/1203002"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_15_5-rt-1-150400.1.3.1.x86_64",
            "SUSE Real Time Module 15 SP4:cluster-md-kmp-rt-5.14.21-150400.15.5.1.x86_64",
            "SUSE Real Time Module 15 SP4:dlm-kmp-rt-5.14.21-150400.15.5.1.x86_64",
            "SUSE Real Time Module 15 SP4:gfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64",
            "SUSE Real Time Module 15 SP4:kernel-devel-rt-5.14.21-150400.15.5.1.noarch",
            "SUSE Real Time Module 15 SP4:kernel-rt-5.14.21-150400.15.5.1.x86_64",
            "SUSE Real Time Module 15 SP4:kernel-rt-devel-5.14.21-150400.15.5.1.x86_64",
            "SUSE Real Time Module 15 SP4:kernel-rt_debug-5.14.21-150400.15.5.1.x86_64",
            "SUSE Real Time Module 15 SP4:kernel-rt_debug-devel-5.14.21-150400.15.5.1.x86_64",
            "SUSE Real Time Module 15 SP4:kernel-source-rt-5.14.21-150400.15.5.1.noarch",
            "SUSE Real Time Module 15 SP4:kernel-syms-rt-5.14.21-150400.15.5.1.x86_64",
            "SUSE Real Time Module 15 SP4:ocfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64",
            "openSUSE Leap 15.4:cluster-md-kmp-rt-5.14.21-150400.15.5.1.x86_64",
            "openSUSE Leap 15.4:dlm-kmp-rt-5.14.21-150400.15.5.1.x86_64",
            "openSUSE Leap 15.4:gfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64",
            "openSUSE Leap 15.4:kernel-devel-rt-5.14.21-150400.15.5.1.noarch",
            "openSUSE Leap 15.4:kernel-rt-5.14.21-150400.15.5.1.x86_64",
            "openSUSE Leap 15.4:kernel-rt-devel-5.14.21-150400.15.5.1.x86_64",
            "openSUSE Leap 15.4:kernel-rt_debug-5.14.21-150400.15.5.1.x86_64",
            "openSUSE Leap 15.4:kernel-rt_debug-devel-5.14.21-150400.15.5.1.x86_64",
            "openSUSE Leap 15.4:kernel-source-rt-5.14.21-150400.15.5.1.noarch",
            "openSUSE Leap 15.4:kernel-syms-rt-5.14.21-150400.15.5.1.x86_64",
            "openSUSE Leap 15.4:ocfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 7.8,
            "baseSeverity": "HIGH",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
            "version": "3.1"
          },
          "products": [
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_15_5-rt-1-150400.1.3.1.x86_64",
            "SUSE Real Time Module 15 SP4:cluster-md-kmp-rt-5.14.21-150400.15.5.1.x86_64",
            "SUSE Real Time Module 15 SP4:dlm-kmp-rt-5.14.21-150400.15.5.1.x86_64",
            "SUSE Real Time Module 15 SP4:gfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64",
            "SUSE Real Time Module 15 SP4:kernel-devel-rt-5.14.21-150400.15.5.1.noarch",
            "SUSE Real Time Module 15 SP4:kernel-rt-5.14.21-150400.15.5.1.x86_64",
            "SUSE Real Time Module 15 SP4:kernel-rt-devel-5.14.21-150400.15.5.1.x86_64",
            "SUSE Real Time Module 15 SP4:kernel-rt_debug-5.14.21-150400.15.5.1.x86_64",
            "SUSE Real Time Module 15 SP4:kernel-rt_debug-devel-5.14.21-150400.15.5.1.x86_64",
            "SUSE Real Time Module 15 SP4:kernel-source-rt-5.14.21-150400.15.5.1.noarch",
            "SUSE Real Time Module 15 SP4:kernel-syms-rt-5.14.21-150400.15.5.1.x86_64",
            "SUSE Real Time Module 15 SP4:ocfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64",
            "openSUSE Leap 15.4:cluster-md-kmp-rt-5.14.21-150400.15.5.1.x86_64",
            "openSUSE Leap 15.4:dlm-kmp-rt-5.14.21-150400.15.5.1.x86_64",
            "openSUSE Leap 15.4:gfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64",
            "openSUSE Leap 15.4:kernel-devel-rt-5.14.21-150400.15.5.1.noarch",
            "openSUSE Leap 15.4:kernel-rt-5.14.21-150400.15.5.1.x86_64",
            "openSUSE Leap 15.4:kernel-rt-devel-5.14.21-150400.15.5.1.x86_64",
            "openSUSE Leap 15.4:kernel-rt_debug-5.14.21-150400.15.5.1.x86_64",
            "openSUSE Leap 15.4:kernel-rt_debug-devel-5.14.21-150400.15.5.1.x86_64",
            "openSUSE Leap 15.4:kernel-source-rt-5.14.21-150400.15.5.1.noarch",
            "openSUSE Leap 15.4:kernel-syms-rt-5.14.21-150400.15.5.1.x86_64",
            "openSUSE Leap 15.4:ocfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2022-12-23T10:39:17Z",
          "details": "important"
        }
      ],
      "title": "CVE-2022-32250"
    },
    {
      "cve": "CVE-2022-32296",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2022-32296"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "The Linux kernel before 5.17.9 allows TCP servers to identify clients by observing what source ports are used. This occurs because of use of Algorithm 4 (\"Double-Hash Port Selection Algorithm\") of RFC 6056.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_15_5-rt-1-150400.1.3.1.x86_64",
          "SUSE Real Time Module 15 SP4:cluster-md-kmp-rt-5.14.21-150400.15.5.1.x86_64",
          "SUSE Real Time Module 15 SP4:dlm-kmp-rt-5.14.21-150400.15.5.1.x86_64",
          "SUSE Real Time Module 15 SP4:gfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64",
          "SUSE Real Time Module 15 SP4:kernel-devel-rt-5.14.21-150400.15.5.1.noarch",
          "SUSE Real Time Module 15 SP4:kernel-rt-5.14.21-150400.15.5.1.x86_64",
          "SUSE Real Time Module 15 SP4:kernel-rt-devel-5.14.21-150400.15.5.1.x86_64",
          "SUSE Real Time Module 15 SP4:kernel-rt_debug-5.14.21-150400.15.5.1.x86_64",
          "SUSE Real Time Module 15 SP4:kernel-rt_debug-devel-5.14.21-150400.15.5.1.x86_64",
          "SUSE Real Time Module 15 SP4:kernel-source-rt-5.14.21-150400.15.5.1.noarch",
          "SUSE Real Time Module 15 SP4:kernel-syms-rt-5.14.21-150400.15.5.1.x86_64",
          "SUSE Real Time Module 15 SP4:ocfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64",
          "openSUSE Leap 15.4:cluster-md-kmp-rt-5.14.21-150400.15.5.1.x86_64",
          "openSUSE Leap 15.4:dlm-kmp-rt-5.14.21-150400.15.5.1.x86_64",
          "openSUSE Leap 15.4:gfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64",
          "openSUSE Leap 15.4:kernel-devel-rt-5.14.21-150400.15.5.1.noarch",
          "openSUSE Leap 15.4:kernel-rt-5.14.21-150400.15.5.1.x86_64",
          "openSUSE Leap 15.4:kernel-rt-devel-5.14.21-150400.15.5.1.x86_64",
          "openSUSE Leap 15.4:kernel-rt_debug-5.14.21-150400.15.5.1.x86_64",
          "openSUSE Leap 15.4:kernel-rt_debug-devel-5.14.21-150400.15.5.1.x86_64",
          "openSUSE Leap 15.4:kernel-source-rt-5.14.21-150400.15.5.1.noarch",
          "openSUSE Leap 15.4:kernel-syms-rt-5.14.21-150400.15.5.1.x86_64",
          "openSUSE Leap 15.4:ocfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2022-32296",
          "url": "https://www.suse.com/security/cve/CVE-2022-32296"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1200288 for CVE-2022-32296",
          "url": "https://bugzilla.suse.com/1200288"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_15_5-rt-1-150400.1.3.1.x86_64",
            "SUSE Real Time Module 15 SP4:cluster-md-kmp-rt-5.14.21-150400.15.5.1.x86_64",
            "SUSE Real Time Module 15 SP4:dlm-kmp-rt-5.14.21-150400.15.5.1.x86_64",
            "SUSE Real Time Module 15 SP4:gfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64",
            "SUSE Real Time Module 15 SP4:kernel-devel-rt-5.14.21-150400.15.5.1.noarch",
            "SUSE Real Time Module 15 SP4:kernel-rt-5.14.21-150400.15.5.1.x86_64",
            "SUSE Real Time Module 15 SP4:kernel-rt-devel-5.14.21-150400.15.5.1.x86_64",
            "SUSE Real Time Module 15 SP4:kernel-rt_debug-5.14.21-150400.15.5.1.x86_64",
            "SUSE Real Time Module 15 SP4:kernel-rt_debug-devel-5.14.21-150400.15.5.1.x86_64",
            "SUSE Real Time Module 15 SP4:kernel-source-rt-5.14.21-150400.15.5.1.noarch",
            "SUSE Real Time Module 15 SP4:kernel-syms-rt-5.14.21-150400.15.5.1.x86_64",
            "SUSE Real Time Module 15 SP4:ocfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64",
            "openSUSE Leap 15.4:cluster-md-kmp-rt-5.14.21-150400.15.5.1.x86_64",
            "openSUSE Leap 15.4:dlm-kmp-rt-5.14.21-150400.15.5.1.x86_64",
            "openSUSE Leap 15.4:gfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64",
            "openSUSE Leap 15.4:kernel-devel-rt-5.14.21-150400.15.5.1.noarch",
            "openSUSE Leap 15.4:kernel-rt-5.14.21-150400.15.5.1.x86_64",
            "openSUSE Leap 15.4:kernel-rt-devel-5.14.21-150400.15.5.1.x86_64",
            "openSUSE Leap 15.4:kernel-rt_debug-5.14.21-150400.15.5.1.x86_64",
            "openSUSE Leap 15.4:kernel-rt_debug-devel-5.14.21-150400.15.5.1.x86_64",
            "openSUSE Leap 15.4:kernel-source-rt-5.14.21-150400.15.5.1.noarch",
            "openSUSE Leap 15.4:kernel-syms-rt-5.14.21-150400.15.5.1.x86_64",
            "openSUSE Leap 15.4:ocfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 5.3,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:N/A:N",
            "version": "3.1"
          },
          "products": [
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_15_5-rt-1-150400.1.3.1.x86_64",
            "SUSE Real Time Module 15 SP4:cluster-md-kmp-rt-5.14.21-150400.15.5.1.x86_64",
            "SUSE Real Time Module 15 SP4:dlm-kmp-rt-5.14.21-150400.15.5.1.x86_64",
            "SUSE Real Time Module 15 SP4:gfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64",
            "SUSE Real Time Module 15 SP4:kernel-devel-rt-5.14.21-150400.15.5.1.noarch",
            "SUSE Real Time Module 15 SP4:kernel-rt-5.14.21-150400.15.5.1.x86_64",
            "SUSE Real Time Module 15 SP4:kernel-rt-devel-5.14.21-150400.15.5.1.x86_64",
            "SUSE Real Time Module 15 SP4:kernel-rt_debug-5.14.21-150400.15.5.1.x86_64",
            "SUSE Real Time Module 15 SP4:kernel-rt_debug-devel-5.14.21-150400.15.5.1.x86_64",
            "SUSE Real Time Module 15 SP4:kernel-source-rt-5.14.21-150400.15.5.1.noarch",
            "SUSE Real Time Module 15 SP4:kernel-syms-rt-5.14.21-150400.15.5.1.x86_64",
            "SUSE Real Time Module 15 SP4:ocfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64",
            "openSUSE Leap 15.4:cluster-md-kmp-rt-5.14.21-150400.15.5.1.x86_64",
            "openSUSE Leap 15.4:dlm-kmp-rt-5.14.21-150400.15.5.1.x86_64",
            "openSUSE Leap 15.4:gfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64",
            "openSUSE Leap 15.4:kernel-devel-rt-5.14.21-150400.15.5.1.noarch",
            "openSUSE Leap 15.4:kernel-rt-5.14.21-150400.15.5.1.x86_64",
            "openSUSE Leap 15.4:kernel-rt-devel-5.14.21-150400.15.5.1.x86_64",
            "openSUSE Leap 15.4:kernel-rt_debug-5.14.21-150400.15.5.1.x86_64",
            "openSUSE Leap 15.4:kernel-rt_debug-devel-5.14.21-150400.15.5.1.x86_64",
            "openSUSE Leap 15.4:kernel-source-rt-5.14.21-150400.15.5.1.noarch",
            "openSUSE Leap 15.4:kernel-syms-rt-5.14.21-150400.15.5.1.x86_64",
            "openSUSE Leap 15.4:ocfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2022-12-23T10:39:17Z",
          "details": "moderate"
        }
      ],
      "title": "CVE-2022-32296"
    },
    {
      "cve": "CVE-2022-3239",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2022-3239"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "A flaw use after free in the Linux kernel video4linux driver was found in the way user triggers em28xx_usb_probe() for the Empia 28xx based TV cards. A local user could use this flaw to crash the system or potentially escalate their privileges on the system.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_15_5-rt-1-150400.1.3.1.x86_64",
          "SUSE Real Time Module 15 SP4:cluster-md-kmp-rt-5.14.21-150400.15.5.1.x86_64",
          "SUSE Real Time Module 15 SP4:dlm-kmp-rt-5.14.21-150400.15.5.1.x86_64",
          "SUSE Real Time Module 15 SP4:gfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64",
          "SUSE Real Time Module 15 SP4:kernel-devel-rt-5.14.21-150400.15.5.1.noarch",
          "SUSE Real Time Module 15 SP4:kernel-rt-5.14.21-150400.15.5.1.x86_64",
          "SUSE Real Time Module 15 SP4:kernel-rt-devel-5.14.21-150400.15.5.1.x86_64",
          "SUSE Real Time Module 15 SP4:kernel-rt_debug-5.14.21-150400.15.5.1.x86_64",
          "SUSE Real Time Module 15 SP4:kernel-rt_debug-devel-5.14.21-150400.15.5.1.x86_64",
          "SUSE Real Time Module 15 SP4:kernel-source-rt-5.14.21-150400.15.5.1.noarch",
          "SUSE Real Time Module 15 SP4:kernel-syms-rt-5.14.21-150400.15.5.1.x86_64",
          "SUSE Real Time Module 15 SP4:ocfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64",
          "openSUSE Leap 15.4:cluster-md-kmp-rt-5.14.21-150400.15.5.1.x86_64",
          "openSUSE Leap 15.4:dlm-kmp-rt-5.14.21-150400.15.5.1.x86_64",
          "openSUSE Leap 15.4:gfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64",
          "openSUSE Leap 15.4:kernel-devel-rt-5.14.21-150400.15.5.1.noarch",
          "openSUSE Leap 15.4:kernel-rt-5.14.21-150400.15.5.1.x86_64",
          "openSUSE Leap 15.4:kernel-rt-devel-5.14.21-150400.15.5.1.x86_64",
          "openSUSE Leap 15.4:kernel-rt_debug-5.14.21-150400.15.5.1.x86_64",
          "openSUSE Leap 15.4:kernel-rt_debug-devel-5.14.21-150400.15.5.1.x86_64",
          "openSUSE Leap 15.4:kernel-source-rt-5.14.21-150400.15.5.1.noarch",
          "openSUSE Leap 15.4:kernel-syms-rt-5.14.21-150400.15.5.1.x86_64",
          "openSUSE Leap 15.4:ocfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2022-3239",
          "url": "https://www.suse.com/security/cve/CVE-2022-3239"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1203552 for CVE-2022-3239",
          "url": "https://bugzilla.suse.com/1203552"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_15_5-rt-1-150400.1.3.1.x86_64",
            "SUSE Real Time Module 15 SP4:cluster-md-kmp-rt-5.14.21-150400.15.5.1.x86_64",
            "SUSE Real Time Module 15 SP4:dlm-kmp-rt-5.14.21-150400.15.5.1.x86_64",
            "SUSE Real Time Module 15 SP4:gfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64",
            "SUSE Real Time Module 15 SP4:kernel-devel-rt-5.14.21-150400.15.5.1.noarch",
            "SUSE Real Time Module 15 SP4:kernel-rt-5.14.21-150400.15.5.1.x86_64",
            "SUSE Real Time Module 15 SP4:kernel-rt-devel-5.14.21-150400.15.5.1.x86_64",
            "SUSE Real Time Module 15 SP4:kernel-rt_debug-5.14.21-150400.15.5.1.x86_64",
            "SUSE Real Time Module 15 SP4:kernel-rt_debug-devel-5.14.21-150400.15.5.1.x86_64",
            "SUSE Real Time Module 15 SP4:kernel-source-rt-5.14.21-150400.15.5.1.noarch",
            "SUSE Real Time Module 15 SP4:kernel-syms-rt-5.14.21-150400.15.5.1.x86_64",
            "SUSE Real Time Module 15 SP4:ocfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64",
            "openSUSE Leap 15.4:cluster-md-kmp-rt-5.14.21-150400.15.5.1.x86_64",
            "openSUSE Leap 15.4:dlm-kmp-rt-5.14.21-150400.15.5.1.x86_64",
            "openSUSE Leap 15.4:gfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64",
            "openSUSE Leap 15.4:kernel-devel-rt-5.14.21-150400.15.5.1.noarch",
            "openSUSE Leap 15.4:kernel-rt-5.14.21-150400.15.5.1.x86_64",
            "openSUSE Leap 15.4:kernel-rt-devel-5.14.21-150400.15.5.1.x86_64",
            "openSUSE Leap 15.4:kernel-rt_debug-5.14.21-150400.15.5.1.x86_64",
            "openSUSE Leap 15.4:kernel-rt_debug-devel-5.14.21-150400.15.5.1.x86_64",
            "openSUSE Leap 15.4:kernel-source-rt-5.14.21-150400.15.5.1.noarch",
            "openSUSE Leap 15.4:kernel-syms-rt-5.14.21-150400.15.5.1.x86_64",
            "openSUSE Leap 15.4:ocfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 6.4,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H",
            "version": "3.1"
          },
          "products": [
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_15_5-rt-1-150400.1.3.1.x86_64",
            "SUSE Real Time Module 15 SP4:cluster-md-kmp-rt-5.14.21-150400.15.5.1.x86_64",
            "SUSE Real Time Module 15 SP4:dlm-kmp-rt-5.14.21-150400.15.5.1.x86_64",
            "SUSE Real Time Module 15 SP4:gfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64",
            "SUSE Real Time Module 15 SP4:kernel-devel-rt-5.14.21-150400.15.5.1.noarch",
            "SUSE Real Time Module 15 SP4:kernel-rt-5.14.21-150400.15.5.1.x86_64",
            "SUSE Real Time Module 15 SP4:kernel-rt-devel-5.14.21-150400.15.5.1.x86_64",
            "SUSE Real Time Module 15 SP4:kernel-rt_debug-5.14.21-150400.15.5.1.x86_64",
            "SUSE Real Time Module 15 SP4:kernel-rt_debug-devel-5.14.21-150400.15.5.1.x86_64",
            "SUSE Real Time Module 15 SP4:kernel-source-rt-5.14.21-150400.15.5.1.noarch",
            "SUSE Real Time Module 15 SP4:kernel-syms-rt-5.14.21-150400.15.5.1.x86_64",
            "SUSE Real Time Module 15 SP4:ocfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64",
            "openSUSE Leap 15.4:cluster-md-kmp-rt-5.14.21-150400.15.5.1.x86_64",
            "openSUSE Leap 15.4:dlm-kmp-rt-5.14.21-150400.15.5.1.x86_64",
            "openSUSE Leap 15.4:gfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64",
            "openSUSE Leap 15.4:kernel-devel-rt-5.14.21-150400.15.5.1.noarch",
            "openSUSE Leap 15.4:kernel-rt-5.14.21-150400.15.5.1.x86_64",
            "openSUSE Leap 15.4:kernel-rt-devel-5.14.21-150400.15.5.1.x86_64",
            "openSUSE Leap 15.4:kernel-rt_debug-5.14.21-150400.15.5.1.x86_64",
            "openSUSE Leap 15.4:kernel-rt_debug-devel-5.14.21-150400.15.5.1.x86_64",
            "openSUSE Leap 15.4:kernel-source-rt-5.14.21-150400.15.5.1.noarch",
            "openSUSE Leap 15.4:kernel-syms-rt-5.14.21-150400.15.5.1.x86_64",
            "openSUSE Leap 15.4:ocfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2022-12-23T10:39:17Z",
          "details": "moderate"
        }
      ],
      "title": "CVE-2022-3239"
    },
    {
      "cve": "CVE-2022-3303",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2022-3303"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "A race condition flaw was found in the Linux kernel sound subsystem due to improper locking. It could lead to a NULL pointer dereference while handling the SNDCTL_DSP_SYNC ioctl. A privileged local user (root or member of the audio group) could use this flaw to crash the system, resulting in a denial of service condition",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_15_5-rt-1-150400.1.3.1.x86_64",
          "SUSE Real Time Module 15 SP4:cluster-md-kmp-rt-5.14.21-150400.15.5.1.x86_64",
          "SUSE Real Time Module 15 SP4:dlm-kmp-rt-5.14.21-150400.15.5.1.x86_64",
          "SUSE Real Time Module 15 SP4:gfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64",
          "SUSE Real Time Module 15 SP4:kernel-devel-rt-5.14.21-150400.15.5.1.noarch",
          "SUSE Real Time Module 15 SP4:kernel-rt-5.14.21-150400.15.5.1.x86_64",
          "SUSE Real Time Module 15 SP4:kernel-rt-devel-5.14.21-150400.15.5.1.x86_64",
          "SUSE Real Time Module 15 SP4:kernel-rt_debug-5.14.21-150400.15.5.1.x86_64",
          "SUSE Real Time Module 15 SP4:kernel-rt_debug-devel-5.14.21-150400.15.5.1.x86_64",
          "SUSE Real Time Module 15 SP4:kernel-source-rt-5.14.21-150400.15.5.1.noarch",
          "SUSE Real Time Module 15 SP4:kernel-syms-rt-5.14.21-150400.15.5.1.x86_64",
          "SUSE Real Time Module 15 SP4:ocfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64",
          "openSUSE Leap 15.4:cluster-md-kmp-rt-5.14.21-150400.15.5.1.x86_64",
          "openSUSE Leap 15.4:dlm-kmp-rt-5.14.21-150400.15.5.1.x86_64",
          "openSUSE Leap 15.4:gfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64",
          "openSUSE Leap 15.4:kernel-devel-rt-5.14.21-150400.15.5.1.noarch",
          "openSUSE Leap 15.4:kernel-rt-5.14.21-150400.15.5.1.x86_64",
          "openSUSE Leap 15.4:kernel-rt-devel-5.14.21-150400.15.5.1.x86_64",
          "openSUSE Leap 15.4:kernel-rt_debug-5.14.21-150400.15.5.1.x86_64",
          "openSUSE Leap 15.4:kernel-rt_debug-devel-5.14.21-150400.15.5.1.x86_64",
          "openSUSE Leap 15.4:kernel-source-rt-5.14.21-150400.15.5.1.noarch",
          "openSUSE Leap 15.4:kernel-syms-rt-5.14.21-150400.15.5.1.x86_64",
          "openSUSE Leap 15.4:ocfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2022-3303",
          "url": "https://www.suse.com/security/cve/CVE-2022-3303"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1203769 for CVE-2022-3303",
          "url": "https://bugzilla.suse.com/1203769"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1212304 for CVE-2022-3303",
          "url": "https://bugzilla.suse.com/1212304"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_15_5-rt-1-150400.1.3.1.x86_64",
            "SUSE Real Time Module 15 SP4:cluster-md-kmp-rt-5.14.21-150400.15.5.1.x86_64",
            "SUSE Real Time Module 15 SP4:dlm-kmp-rt-5.14.21-150400.15.5.1.x86_64",
            "SUSE Real Time Module 15 SP4:gfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64",
            "SUSE Real Time Module 15 SP4:kernel-devel-rt-5.14.21-150400.15.5.1.noarch",
            "SUSE Real Time Module 15 SP4:kernel-rt-5.14.21-150400.15.5.1.x86_64",
            "SUSE Real Time Module 15 SP4:kernel-rt-devel-5.14.21-150400.15.5.1.x86_64",
            "SUSE Real Time Module 15 SP4:kernel-rt_debug-5.14.21-150400.15.5.1.x86_64",
            "SUSE Real Time Module 15 SP4:kernel-rt_debug-devel-5.14.21-150400.15.5.1.x86_64",
            "SUSE Real Time Module 15 SP4:kernel-source-rt-5.14.21-150400.15.5.1.noarch",
            "SUSE Real Time Module 15 SP4:kernel-syms-rt-5.14.21-150400.15.5.1.x86_64",
            "SUSE Real Time Module 15 SP4:ocfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64",
            "openSUSE Leap 15.4:cluster-md-kmp-rt-5.14.21-150400.15.5.1.x86_64",
            "openSUSE Leap 15.4:dlm-kmp-rt-5.14.21-150400.15.5.1.x86_64",
            "openSUSE Leap 15.4:gfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64",
            "openSUSE Leap 15.4:kernel-devel-rt-5.14.21-150400.15.5.1.noarch",
            "openSUSE Leap 15.4:kernel-rt-5.14.21-150400.15.5.1.x86_64",
            "openSUSE Leap 15.4:kernel-rt-devel-5.14.21-150400.15.5.1.x86_64",
            "openSUSE Leap 15.4:kernel-rt_debug-5.14.21-150400.15.5.1.x86_64",
            "openSUSE Leap 15.4:kernel-rt_debug-devel-5.14.21-150400.15.5.1.x86_64",
            "openSUSE Leap 15.4:kernel-source-rt-5.14.21-150400.15.5.1.noarch",
            "openSUSE Leap 15.4:kernel-syms-rt-5.14.21-150400.15.5.1.x86_64",
            "openSUSE Leap 15.4:ocfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 4.4,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H",
            "version": "3.1"
          },
          "products": [
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_15_5-rt-1-150400.1.3.1.x86_64",
            "SUSE Real Time Module 15 SP4:cluster-md-kmp-rt-5.14.21-150400.15.5.1.x86_64",
            "SUSE Real Time Module 15 SP4:dlm-kmp-rt-5.14.21-150400.15.5.1.x86_64",
            "SUSE Real Time Module 15 SP4:gfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64",
            "SUSE Real Time Module 15 SP4:kernel-devel-rt-5.14.21-150400.15.5.1.noarch",
            "SUSE Real Time Module 15 SP4:kernel-rt-5.14.21-150400.15.5.1.x86_64",
            "SUSE Real Time Module 15 SP4:kernel-rt-devel-5.14.21-150400.15.5.1.x86_64",
            "SUSE Real Time Module 15 SP4:kernel-rt_debug-5.14.21-150400.15.5.1.x86_64",
            "SUSE Real Time Module 15 SP4:kernel-rt_debug-devel-5.14.21-150400.15.5.1.x86_64",
            "SUSE Real Time Module 15 SP4:kernel-source-rt-5.14.21-150400.15.5.1.noarch",
            "SUSE Real Time Module 15 SP4:kernel-syms-rt-5.14.21-150400.15.5.1.x86_64",
            "SUSE Real Time Module 15 SP4:ocfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64",
            "openSUSE Leap 15.4:cluster-md-kmp-rt-5.14.21-150400.15.5.1.x86_64",
            "openSUSE Leap 15.4:dlm-kmp-rt-5.14.21-150400.15.5.1.x86_64",
            "openSUSE Leap 15.4:gfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64",
            "openSUSE Leap 15.4:kernel-devel-rt-5.14.21-150400.15.5.1.noarch",
            "openSUSE Leap 15.4:kernel-rt-5.14.21-150400.15.5.1.x86_64",
            "openSUSE Leap 15.4:kernel-rt-devel-5.14.21-150400.15.5.1.x86_64",
            "openSUSE Leap 15.4:kernel-rt_debug-5.14.21-150400.15.5.1.x86_64",
            "openSUSE Leap 15.4:kernel-rt_debug-devel-5.14.21-150400.15.5.1.x86_64",
            "openSUSE Leap 15.4:kernel-source-rt-5.14.21-150400.15.5.1.noarch",
            "openSUSE Leap 15.4:kernel-syms-rt-5.14.21-150400.15.5.1.x86_64",
            "openSUSE Leap 15.4:ocfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2022-12-23T10:39:17Z",
          "details": "moderate"
        }
      ],
      "title": "CVE-2022-3303"
    },
    {
      "cve": "CVE-2022-33981",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2022-33981"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "drivers/block/floppy.c in the Linux kernel before 5.17.6 is vulnerable to a denial of service, because of a concurrency use-after-free flaw after deallocating raw_cmd in the raw_cmd_ioctl function.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_15_5-rt-1-150400.1.3.1.x86_64",
          "SUSE Real Time Module 15 SP4:cluster-md-kmp-rt-5.14.21-150400.15.5.1.x86_64",
          "SUSE Real Time Module 15 SP4:dlm-kmp-rt-5.14.21-150400.15.5.1.x86_64",
          "SUSE Real Time Module 15 SP4:gfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64",
          "SUSE Real Time Module 15 SP4:kernel-devel-rt-5.14.21-150400.15.5.1.noarch",
          "SUSE Real Time Module 15 SP4:kernel-rt-5.14.21-150400.15.5.1.x86_64",
          "SUSE Real Time Module 15 SP4:kernel-rt-devel-5.14.21-150400.15.5.1.x86_64",
          "SUSE Real Time Module 15 SP4:kernel-rt_debug-5.14.21-150400.15.5.1.x86_64",
          "SUSE Real Time Module 15 SP4:kernel-rt_debug-devel-5.14.21-150400.15.5.1.x86_64",
          "SUSE Real Time Module 15 SP4:kernel-source-rt-5.14.21-150400.15.5.1.noarch",
          "SUSE Real Time Module 15 SP4:kernel-syms-rt-5.14.21-150400.15.5.1.x86_64",
          "SUSE Real Time Module 15 SP4:ocfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64",
          "openSUSE Leap 15.4:cluster-md-kmp-rt-5.14.21-150400.15.5.1.x86_64",
          "openSUSE Leap 15.4:dlm-kmp-rt-5.14.21-150400.15.5.1.x86_64",
          "openSUSE Leap 15.4:gfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64",
          "openSUSE Leap 15.4:kernel-devel-rt-5.14.21-150400.15.5.1.noarch",
          "openSUSE Leap 15.4:kernel-rt-5.14.21-150400.15.5.1.x86_64",
          "openSUSE Leap 15.4:kernel-rt-devel-5.14.21-150400.15.5.1.x86_64",
          "openSUSE Leap 15.4:kernel-rt_debug-5.14.21-150400.15.5.1.x86_64",
          "openSUSE Leap 15.4:kernel-rt_debug-devel-5.14.21-150400.15.5.1.x86_64",
          "openSUSE Leap 15.4:kernel-source-rt-5.14.21-150400.15.5.1.noarch",
          "openSUSE Leap 15.4:kernel-syms-rt-5.14.21-150400.15.5.1.x86_64",
          "openSUSE Leap 15.4:ocfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2022-33981",
          "url": "https://www.suse.com/security/cve/CVE-2022-33981"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1200692 for CVE-2022-33981",
          "url": "https://bugzilla.suse.com/1200692"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_15_5-rt-1-150400.1.3.1.x86_64",
            "SUSE Real Time Module 15 SP4:cluster-md-kmp-rt-5.14.21-150400.15.5.1.x86_64",
            "SUSE Real Time Module 15 SP4:dlm-kmp-rt-5.14.21-150400.15.5.1.x86_64",
            "SUSE Real Time Module 15 SP4:gfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64",
            "SUSE Real Time Module 15 SP4:kernel-devel-rt-5.14.21-150400.15.5.1.noarch",
            "SUSE Real Time Module 15 SP4:kernel-rt-5.14.21-150400.15.5.1.x86_64",
            "SUSE Real Time Module 15 SP4:kernel-rt-devel-5.14.21-150400.15.5.1.x86_64",
            "SUSE Real Time Module 15 SP4:kernel-rt_debug-5.14.21-150400.15.5.1.x86_64",
            "SUSE Real Time Module 15 SP4:kernel-rt_debug-devel-5.14.21-150400.15.5.1.x86_64",
            "SUSE Real Time Module 15 SP4:kernel-source-rt-5.14.21-150400.15.5.1.noarch",
            "SUSE Real Time Module 15 SP4:kernel-syms-rt-5.14.21-150400.15.5.1.x86_64",
            "SUSE Real Time Module 15 SP4:ocfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64",
            "openSUSE Leap 15.4:cluster-md-kmp-rt-5.14.21-150400.15.5.1.x86_64",
            "openSUSE Leap 15.4:dlm-kmp-rt-5.14.21-150400.15.5.1.x86_64",
            "openSUSE Leap 15.4:gfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64",
            "openSUSE Leap 15.4:kernel-devel-rt-5.14.21-150400.15.5.1.noarch",
            "openSUSE Leap 15.4:kernel-rt-5.14.21-150400.15.5.1.x86_64",
            "openSUSE Leap 15.4:kernel-rt-devel-5.14.21-150400.15.5.1.x86_64",
            "openSUSE Leap 15.4:kernel-rt_debug-5.14.21-150400.15.5.1.x86_64",
            "openSUSE Leap 15.4:kernel-rt_debug-devel-5.14.21-150400.15.5.1.x86_64",
            "openSUSE Leap 15.4:kernel-source-rt-5.14.21-150400.15.5.1.noarch",
            "openSUSE Leap 15.4:kernel-syms-rt-5.14.21-150400.15.5.1.x86_64",
            "openSUSE Leap 15.4:ocfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 5.5,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
            "version": "3.1"
          },
          "products": [
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_15_5-rt-1-150400.1.3.1.x86_64",
            "SUSE Real Time Module 15 SP4:cluster-md-kmp-rt-5.14.21-150400.15.5.1.x86_64",
            "SUSE Real Time Module 15 SP4:dlm-kmp-rt-5.14.21-150400.15.5.1.x86_64",
            "SUSE Real Time Module 15 SP4:gfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64",
            "SUSE Real Time Module 15 SP4:kernel-devel-rt-5.14.21-150400.15.5.1.noarch",
            "SUSE Real Time Module 15 SP4:kernel-rt-5.14.21-150400.15.5.1.x86_64",
            "SUSE Real Time Module 15 SP4:kernel-rt-devel-5.14.21-150400.15.5.1.x86_64",
            "SUSE Real Time Module 15 SP4:kernel-rt_debug-5.14.21-150400.15.5.1.x86_64",
            "SUSE Real Time Module 15 SP4:kernel-rt_debug-devel-5.14.21-150400.15.5.1.x86_64",
            "SUSE Real Time Module 15 SP4:kernel-source-rt-5.14.21-150400.15.5.1.noarch",
            "SUSE Real Time Module 15 SP4:kernel-syms-rt-5.14.21-150400.15.5.1.x86_64",
            "SUSE Real Time Module 15 SP4:ocfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64",
            "openSUSE Leap 15.4:cluster-md-kmp-rt-5.14.21-150400.15.5.1.x86_64",
            "openSUSE Leap 15.4:dlm-kmp-rt-5.14.21-150400.15.5.1.x86_64",
            "openSUSE Leap 15.4:gfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64",
            "openSUSE Leap 15.4:kernel-devel-rt-5.14.21-150400.15.5.1.noarch",
            "openSUSE Leap 15.4:kernel-rt-5.14.21-150400.15.5.1.x86_64",
            "openSUSE Leap 15.4:kernel-rt-devel-5.14.21-150400.15.5.1.x86_64",
            "openSUSE Leap 15.4:kernel-rt_debug-5.14.21-150400.15.5.1.x86_64",
            "openSUSE Leap 15.4:kernel-rt_debug-devel-5.14.21-150400.15.5.1.x86_64",
            "openSUSE Leap 15.4:kernel-source-rt-5.14.21-150400.15.5.1.noarch",
            "openSUSE Leap 15.4:kernel-syms-rt-5.14.21-150400.15.5.1.x86_64",
            "openSUSE Leap 15.4:ocfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2022-12-23T10:39:17Z",
          "details": "moderate"
        }
      ],
      "title": "CVE-2022-33981"
    },
    {
      "cve": "CVE-2022-3424",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2022-3424"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "A use-after-free flaw was found in the Linux kernel\u0027s SGI GRU driver in the way the first gru_file_unlocked_ioctl function is called by the user, where a fail pass occurs in the gru_check_chiplet_assignment function. This flaw allows a local user to crash or potentially escalate their privileges on the system.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_15_5-rt-1-150400.1.3.1.x86_64",
          "SUSE Real Time Module 15 SP4:cluster-md-kmp-rt-5.14.21-150400.15.5.1.x86_64",
          "SUSE Real Time Module 15 SP4:dlm-kmp-rt-5.14.21-150400.15.5.1.x86_64",
          "SUSE Real Time Module 15 SP4:gfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64",
          "SUSE Real Time Module 15 SP4:kernel-devel-rt-5.14.21-150400.15.5.1.noarch",
          "SUSE Real Time Module 15 SP4:kernel-rt-5.14.21-150400.15.5.1.x86_64",
          "SUSE Real Time Module 15 SP4:kernel-rt-devel-5.14.21-150400.15.5.1.x86_64",
          "SUSE Real Time Module 15 SP4:kernel-rt_debug-5.14.21-150400.15.5.1.x86_64",
          "SUSE Real Time Module 15 SP4:kernel-rt_debug-devel-5.14.21-150400.15.5.1.x86_64",
          "SUSE Real Time Module 15 SP4:kernel-source-rt-5.14.21-150400.15.5.1.noarch",
          "SUSE Real Time Module 15 SP4:kernel-syms-rt-5.14.21-150400.15.5.1.x86_64",
          "SUSE Real Time Module 15 SP4:ocfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64",
          "openSUSE Leap 15.4:cluster-md-kmp-rt-5.14.21-150400.15.5.1.x86_64",
          "openSUSE Leap 15.4:dlm-kmp-rt-5.14.21-150400.15.5.1.x86_64",
          "openSUSE Leap 15.4:gfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64",
          "openSUSE Leap 15.4:kernel-devel-rt-5.14.21-150400.15.5.1.noarch",
          "openSUSE Leap 15.4:kernel-rt-5.14.21-150400.15.5.1.x86_64",
          "openSUSE Leap 15.4:kernel-rt-devel-5.14.21-150400.15.5.1.x86_64",
          "openSUSE Leap 15.4:kernel-rt_debug-5.14.21-150400.15.5.1.x86_64",
          "openSUSE Leap 15.4:kernel-rt_debug-devel-5.14.21-150400.15.5.1.x86_64",
          "openSUSE Leap 15.4:kernel-source-rt-5.14.21-150400.15.5.1.noarch",
          "openSUSE Leap 15.4:kernel-syms-rt-5.14.21-150400.15.5.1.x86_64",
          "openSUSE Leap 15.4:ocfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2022-3424",
          "url": "https://www.suse.com/security/cve/CVE-2022-3424"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1204166 for CVE-2022-3424",
          "url": "https://bugzilla.suse.com/1204166"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1204167 for CVE-2022-3424",
          "url": "https://bugzilla.suse.com/1204167"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1208044 for CVE-2022-3424",
          "url": "https://bugzilla.suse.com/1208044"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1212309 for CVE-2022-3424",
          "url": "https://bugzilla.suse.com/1212309"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_15_5-rt-1-150400.1.3.1.x86_64",
            "SUSE Real Time Module 15 SP4:cluster-md-kmp-rt-5.14.21-150400.15.5.1.x86_64",
            "SUSE Real Time Module 15 SP4:dlm-kmp-rt-5.14.21-150400.15.5.1.x86_64",
            "SUSE Real Time Module 15 SP4:gfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64",
            "SUSE Real Time Module 15 SP4:kernel-devel-rt-5.14.21-150400.15.5.1.noarch",
            "SUSE Real Time Module 15 SP4:kernel-rt-5.14.21-150400.15.5.1.x86_64",
            "SUSE Real Time Module 15 SP4:kernel-rt-devel-5.14.21-150400.15.5.1.x86_64",
            "SUSE Real Time Module 15 SP4:kernel-rt_debug-5.14.21-150400.15.5.1.x86_64",
            "SUSE Real Time Module 15 SP4:kernel-rt_debug-devel-5.14.21-150400.15.5.1.x86_64",
            "SUSE Real Time Module 15 SP4:kernel-source-rt-5.14.21-150400.15.5.1.noarch",
            "SUSE Real Time Module 15 SP4:kernel-syms-rt-5.14.21-150400.15.5.1.x86_64",
            "SUSE Real Time Module 15 SP4:ocfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64",
            "openSUSE Leap 15.4:cluster-md-kmp-rt-5.14.21-150400.15.5.1.x86_64",
            "openSUSE Leap 15.4:dlm-kmp-rt-5.14.21-150400.15.5.1.x86_64",
            "openSUSE Leap 15.4:gfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64",
            "openSUSE Leap 15.4:kernel-devel-rt-5.14.21-150400.15.5.1.noarch",
            "openSUSE Leap 15.4:kernel-rt-5.14.21-150400.15.5.1.x86_64",
            "openSUSE Leap 15.4:kernel-rt-devel-5.14.21-150400.15.5.1.x86_64",
            "openSUSE Leap 15.4:kernel-rt_debug-5.14.21-150400.15.5.1.x86_64",
            "openSUSE Leap 15.4:kernel-rt_debug-devel-5.14.21-150400.15.5.1.x86_64",
            "openSUSE Leap 15.4:kernel-source-rt-5.14.21-150400.15.5.1.noarch",
            "openSUSE Leap 15.4:kernel-syms-rt-5.14.21-150400.15.5.1.x86_64",
            "openSUSE Leap 15.4:ocfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 7,
            "baseSeverity": "HIGH",
            "vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H",
            "version": "3.1"
          },
          "products": [
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_15_5-rt-1-150400.1.3.1.x86_64",
            "SUSE Real Time Module 15 SP4:cluster-md-kmp-rt-5.14.21-150400.15.5.1.x86_64",
            "SUSE Real Time Module 15 SP4:dlm-kmp-rt-5.14.21-150400.15.5.1.x86_64",
            "SUSE Real Time Module 15 SP4:gfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64",
            "SUSE Real Time Module 15 SP4:kernel-devel-rt-5.14.21-150400.15.5.1.noarch",
            "SUSE Real Time Module 15 SP4:kernel-rt-5.14.21-150400.15.5.1.x86_64",
            "SUSE Real Time Module 15 SP4:kernel-rt-devel-5.14.21-150400.15.5.1.x86_64",
            "SUSE Real Time Module 15 SP4:kernel-rt_debug-5.14.21-150400.15.5.1.x86_64",
            "SUSE Real Time Module 15 SP4:kernel-rt_debug-devel-5.14.21-150400.15.5.1.x86_64",
            "SUSE Real Time Module 15 SP4:kernel-source-rt-5.14.21-150400.15.5.1.noarch",
            "SUSE Real Time Module 15 SP4:kernel-syms-rt-5.14.21-150400.15.5.1.x86_64",
            "SUSE Real Time Module 15 SP4:ocfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64",
            "openSUSE Leap 15.4:cluster-md-kmp-rt-5.14.21-150400.15.5.1.x86_64",
            "openSUSE Leap 15.4:dlm-kmp-rt-5.14.21-150400.15.5.1.x86_64",
            "openSUSE Leap 15.4:gfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64",
            "openSUSE Leap 15.4:kernel-devel-rt-5.14.21-150400.15.5.1.noarch",
            "openSUSE Leap 15.4:kernel-rt-5.14.21-150400.15.5.1.x86_64",
            "openSUSE Leap 15.4:kernel-rt-devel-5.14.21-150400.15.5.1.x86_64",
            "openSUSE Leap 15.4:kernel-rt_debug-5.14.21-150400.15.5.1.x86_64",
            "openSUSE Leap 15.4:kernel-rt_debug-devel-5.14.21-150400.15.5.1.x86_64",
            "openSUSE Leap 15.4:kernel-source-rt-5.14.21-150400.15.5.1.noarch",
            "openSUSE Leap 15.4:kernel-syms-rt-5.14.21-150400.15.5.1.x86_64",
            "openSUSE Leap 15.4:ocfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2022-12-23T10:39:17Z",
          "details": "moderate"
        }
      ],
      "title": "CVE-2022-3424"
    },
    {
      "cve": "CVE-2022-3435",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2022-3435"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "A vulnerability classified as problematic has been found in Linux Kernel. This affects the function fib_nh_match of the file net/ipv4/fib_semantics.c of the component IPv4 Handler. The manipulation leads to out-of-bounds read. It is possible to initiate the attack remotely. It is recommended to apply a patch to fix this issue. The identifier VDB-210357 was assigned to this vulnerability.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_15_5-rt-1-150400.1.3.1.x86_64",
          "SUSE Real Time Module 15 SP4:cluster-md-kmp-rt-5.14.21-150400.15.5.1.x86_64",
          "SUSE Real Time Module 15 SP4:dlm-kmp-rt-5.14.21-150400.15.5.1.x86_64",
          "SUSE Real Time Module 15 SP4:gfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64",
          "SUSE Real Time Module 15 SP4:kernel-devel-rt-5.14.21-150400.15.5.1.noarch",
          "SUSE Real Time Module 15 SP4:kernel-rt-5.14.21-150400.15.5.1.x86_64",
          "SUSE Real Time Module 15 SP4:kernel-rt-devel-5.14.21-150400.15.5.1.x86_64",
          "SUSE Real Time Module 15 SP4:kernel-rt_debug-5.14.21-150400.15.5.1.x86_64",
          "SUSE Real Time Module 15 SP4:kernel-rt_debug-devel-5.14.21-150400.15.5.1.x86_64",
          "SUSE Real Time Module 15 SP4:kernel-source-rt-5.14.21-150400.15.5.1.noarch",
          "SUSE Real Time Module 15 SP4:kernel-syms-rt-5.14.21-150400.15.5.1.x86_64",
          "SUSE Real Time Module 15 SP4:ocfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64",
          "openSUSE Leap 15.4:cluster-md-kmp-rt-5.14.21-150400.15.5.1.x86_64",
          "openSUSE Leap 15.4:dlm-kmp-rt-5.14.21-150400.15.5.1.x86_64",
          "openSUSE Leap 15.4:gfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64",
          "openSUSE Leap 15.4:kernel-devel-rt-5.14.21-150400.15.5.1.noarch",
          "openSUSE Leap 15.4:kernel-rt-5.14.21-150400.15.5.1.x86_64",
          "openSUSE Leap 15.4:kernel-rt-devel-5.14.21-150400.15.5.1.x86_64",
          "openSUSE Leap 15.4:kernel-rt_debug-5.14.21-150400.15.5.1.x86_64",
          "openSUSE Leap 15.4:kernel-rt_debug-devel-5.14.21-150400.15.5.1.x86_64",
          "openSUSE Leap 15.4:kernel-source-rt-5.14.21-150400.15.5.1.noarch",
          "openSUSE Leap 15.4:kernel-syms-rt-5.14.21-150400.15.5.1.x86_64",
          "openSUSE Leap 15.4:ocfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2022-3435",
          "url": "https://www.suse.com/security/cve/CVE-2022-3435"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1204171 for CVE-2022-3435",
          "url": "https://bugzilla.suse.com/1204171"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_15_5-rt-1-150400.1.3.1.x86_64",
            "SUSE Real Time Module 15 SP4:cluster-md-kmp-rt-5.14.21-150400.15.5.1.x86_64",
            "SUSE Real Time Module 15 SP4:dlm-kmp-rt-5.14.21-150400.15.5.1.x86_64",
            "SUSE Real Time Module 15 SP4:gfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64",
            "SUSE Real Time Module 15 SP4:kernel-devel-rt-5.14.21-150400.15.5.1.noarch",
            "SUSE Real Time Module 15 SP4:kernel-rt-5.14.21-150400.15.5.1.x86_64",
            "SUSE Real Time Module 15 SP4:kernel-rt-devel-5.14.21-150400.15.5.1.x86_64",
            "SUSE Real Time Module 15 SP4:kernel-rt_debug-5.14.21-150400.15.5.1.x86_64",
            "SUSE Real Time Module 15 SP4:kernel-rt_debug-devel-5.14.21-150400.15.5.1.x86_64",
            "SUSE Real Time Module 15 SP4:kernel-source-rt-5.14.21-150400.15.5.1.noarch",
            "SUSE Real Time Module 15 SP4:kernel-syms-rt-5.14.21-150400.15.5.1.x86_64",
            "SUSE Real Time Module 15 SP4:ocfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64",
            "openSUSE Leap 15.4:cluster-md-kmp-rt-5.14.21-150400.15.5.1.x86_64",
            "openSUSE Leap 15.4:dlm-kmp-rt-5.14.21-150400.15.5.1.x86_64",
            "openSUSE Leap 15.4:gfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64",
            "openSUSE Leap 15.4:kernel-devel-rt-5.14.21-150400.15.5.1.noarch",
            "openSUSE Leap 15.4:kernel-rt-5.14.21-150400.15.5.1.x86_64",
            "openSUSE Leap 15.4:kernel-rt-devel-5.14.21-150400.15.5.1.x86_64",
            "openSUSE Leap 15.4:kernel-rt_debug-5.14.21-150400.15.5.1.x86_64",
            "openSUSE Leap 15.4:kernel-rt_debug-devel-5.14.21-150400.15.5.1.x86_64",
            "openSUSE Leap 15.4:kernel-source-rt-5.14.21-150400.15.5.1.noarch",
            "openSUSE Leap 15.4:kernel-syms-rt-5.14.21-150400.15.5.1.x86_64",
            "openSUSE Leap 15.4:ocfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 5.3,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:L/I:N/A:H",
            "version": "3.1"
          },
          "products": [
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_15_5-rt-1-150400.1.3.1.x86_64",
            "SUSE Real Time Module 15 SP4:cluster-md-kmp-rt-5.14.21-150400.15.5.1.x86_64",
            "SUSE Real Time Module 15 SP4:dlm-kmp-rt-5.14.21-150400.15.5.1.x86_64",
            "SUSE Real Time Module 15 SP4:gfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64",
            "SUSE Real Time Module 15 SP4:kernel-devel-rt-5.14.21-150400.15.5.1.noarch",
            "SUSE Real Time Module 15 SP4:kernel-rt-5.14.21-150400.15.5.1.x86_64",
            "SUSE Real Time Module 15 SP4:kernel-rt-devel-5.14.21-150400.15.5.1.x86_64",
            "SUSE Real Time Module 15 SP4:kernel-rt_debug-5.14.21-150400.15.5.1.x86_64",
            "SUSE Real Time Module 15 SP4:kernel-rt_debug-devel-5.14.21-150400.15.5.1.x86_64",
            "SUSE Real Time Module 15 SP4:kernel-source-rt-5.14.21-150400.15.5.1.noarch",
            "SUSE Real Time Module 15 SP4:kernel-syms-rt-5.14.21-150400.15.5.1.x86_64",
            "SUSE Real Time Module 15 SP4:ocfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64",
            "openSUSE Leap 15.4:cluster-md-kmp-rt-5.14.21-150400.15.5.1.x86_64",
            "openSUSE Leap 15.4:dlm-kmp-rt-5.14.21-150400.15.5.1.x86_64",
            "openSUSE Leap 15.4:gfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64",
            "openSUSE Leap 15.4:kernel-devel-rt-5.14.21-150400.15.5.1.noarch",
            "openSUSE Leap 15.4:kernel-rt-5.14.21-150400.15.5.1.x86_64",
            "openSUSE Leap 15.4:kernel-rt-devel-5.14.21-150400.15.5.1.x86_64",
            "openSUSE Leap 15.4:kernel-rt_debug-5.14.21-150400.15.5.1.x86_64",
            "openSUSE Leap 15.4:kernel-rt_debug-devel-5.14.21-150400.15.5.1.x86_64",
            "openSUSE Leap 15.4:kernel-source-rt-5.14.21-150400.15.5.1.noarch",
            "openSUSE Leap 15.4:kernel-syms-rt-5.14.21-150400.15.5.1.x86_64",
            "openSUSE Leap 15.4:ocfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2022-12-23T10:39:17Z",
          "details": "moderate"
        }
      ],
      "title": "CVE-2022-3435"
    },
    {
      "cve": "CVE-2022-3521",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2022-3521"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "A vulnerability has been found in Linux Kernel and classified as problematic. This vulnerability affects the function kcm_tx_work of the file net/kcm/kcmsock.c of the component kcm. The manipulation leads to race condition. It is recommended to apply a patch to fix this issue. VDB-211018 is the identifier assigned to this vulnerability.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_15_5-rt-1-150400.1.3.1.x86_64",
          "SUSE Real Time Module 15 SP4:cluster-md-kmp-rt-5.14.21-150400.15.5.1.x86_64",
          "SUSE Real Time Module 15 SP4:dlm-kmp-rt-5.14.21-150400.15.5.1.x86_64",
          "SUSE Real Time Module 15 SP4:gfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64",
          "SUSE Real Time Module 15 SP4:kernel-devel-rt-5.14.21-150400.15.5.1.noarch",
          "SUSE Real Time Module 15 SP4:kernel-rt-5.14.21-150400.15.5.1.x86_64",
          "SUSE Real Time Module 15 SP4:kernel-rt-devel-5.14.21-150400.15.5.1.x86_64",
          "SUSE Real Time Module 15 SP4:kernel-rt_debug-5.14.21-150400.15.5.1.x86_64",
          "SUSE Real Time Module 15 SP4:kernel-rt_debug-devel-5.14.21-150400.15.5.1.x86_64",
          "SUSE Real Time Module 15 SP4:kernel-source-rt-5.14.21-150400.15.5.1.noarch",
          "SUSE Real Time Module 15 SP4:kernel-syms-rt-5.14.21-150400.15.5.1.x86_64",
          "SUSE Real Time Module 15 SP4:ocfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64",
          "openSUSE Leap 15.4:cluster-md-kmp-rt-5.14.21-150400.15.5.1.x86_64",
          "openSUSE Leap 15.4:dlm-kmp-rt-5.14.21-150400.15.5.1.x86_64",
          "openSUSE Leap 15.4:gfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64",
          "openSUSE Leap 15.4:kernel-devel-rt-5.14.21-150400.15.5.1.noarch",
          "openSUSE Leap 15.4:kernel-rt-5.14.21-150400.15.5.1.x86_64",
          "openSUSE Leap 15.4:kernel-rt-devel-5.14.21-150400.15.5.1.x86_64",
          "openSUSE Leap 15.4:kernel-rt_debug-5.14.21-150400.15.5.1.x86_64",
          "openSUSE Leap 15.4:kernel-rt_debug-devel-5.14.21-150400.15.5.1.x86_64",
          "openSUSE Leap 15.4:kernel-source-rt-5.14.21-150400.15.5.1.noarch",
          "openSUSE Leap 15.4:kernel-syms-rt-5.14.21-150400.15.5.1.x86_64",
          "openSUSE Leap 15.4:ocfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2022-3521",
          "url": "https://www.suse.com/security/cve/CVE-2022-3521"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1204355 for CVE-2022-3521",
          "url": "https://bugzilla.suse.com/1204355"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1217458 for CVE-2022-3521",
          "url": "https://bugzilla.suse.com/1217458"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_15_5-rt-1-150400.1.3.1.x86_64",
            "SUSE Real Time Module 15 SP4:cluster-md-kmp-rt-5.14.21-150400.15.5.1.x86_64",
            "SUSE Real Time Module 15 SP4:dlm-kmp-rt-5.14.21-150400.15.5.1.x86_64",
            "SUSE Real Time Module 15 SP4:gfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64",
            "SUSE Real Time Module 15 SP4:kernel-devel-rt-5.14.21-150400.15.5.1.noarch",
            "SUSE Real Time Module 15 SP4:kernel-rt-5.14.21-150400.15.5.1.x86_64",
            "SUSE Real Time Module 15 SP4:kernel-rt-devel-5.14.21-150400.15.5.1.x86_64",
            "SUSE Real Time Module 15 SP4:kernel-rt_debug-5.14.21-150400.15.5.1.x86_64",
            "SUSE Real Time Module 15 SP4:kernel-rt_debug-devel-5.14.21-150400.15.5.1.x86_64",
            "SUSE Real Time Module 15 SP4:kernel-source-rt-5.14.21-150400.15.5.1.noarch",
            "SUSE Real Time Module 15 SP4:kernel-syms-rt-5.14.21-150400.15.5.1.x86_64",
            "SUSE Real Time Module 15 SP4:ocfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64",
            "openSUSE Leap 15.4:cluster-md-kmp-rt-5.14.21-150400.15.5.1.x86_64",
            "openSUSE Leap 15.4:dlm-kmp-rt-5.14.21-150400.15.5.1.x86_64",
            "openSUSE Leap 15.4:gfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64",
            "openSUSE Leap 15.4:kernel-devel-rt-5.14.21-150400.15.5.1.noarch",
            "openSUSE Leap 15.4:kernel-rt-5.14.21-150400.15.5.1.x86_64",
            "openSUSE Leap 15.4:kernel-rt-devel-5.14.21-150400.15.5.1.x86_64",
            "openSUSE Leap 15.4:kernel-rt_debug-5.14.21-150400.15.5.1.x86_64",
            "openSUSE Leap 15.4:kernel-rt_debug-devel-5.14.21-150400.15.5.1.x86_64",
            "openSUSE Leap 15.4:kernel-source-rt-5.14.21-150400.15.5.1.noarch",
            "openSUSE Leap 15.4:kernel-syms-rt-5.14.21-150400.15.5.1.x86_64",
            "openSUSE Leap 15.4:ocfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 5.1,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H",
            "version": "3.1"
          },
          "products": [
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_15_5-rt-1-150400.1.3.1.x86_64",
            "SUSE Real Time Module 15 SP4:cluster-md-kmp-rt-5.14.21-150400.15.5.1.x86_64",
            "SUSE Real Time Module 15 SP4:dlm-kmp-rt-5.14.21-150400.15.5.1.x86_64",
            "SUSE Real Time Module 15 SP4:gfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64",
            "SUSE Real Time Module 15 SP4:kernel-devel-rt-5.14.21-150400.15.5.1.noarch",
            "SUSE Real Time Module 15 SP4:kernel-rt-5.14.21-150400.15.5.1.x86_64",
            "SUSE Real Time Module 15 SP4:kernel-rt-devel-5.14.21-150400.15.5.1.x86_64",
            "SUSE Real Time Module 15 SP4:kernel-rt_debug-5.14.21-150400.15.5.1.x86_64",
            "SUSE Real Time Module 15 SP4:kernel-rt_debug-devel-5.14.21-150400.15.5.1.x86_64",
            "SUSE Real Time Module 15 SP4:kernel-source-rt-5.14.21-150400.15.5.1.noarch",
            "SUSE Real Time Module 15 SP4:kernel-syms-rt-5.14.21-150400.15.5.1.x86_64",
            "SUSE Real Time Module 15 SP4:ocfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64",
            "openSUSE Leap 15.4:cluster-md-kmp-rt-5.14.21-150400.15.5.1.x86_64",
            "openSUSE Leap 15.4:dlm-kmp-rt-5.14.21-150400.15.5.1.x86_64",
            "openSUSE Leap 15.4:gfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64",
            "openSUSE Leap 15.4:kernel-devel-rt-5.14.21-150400.15.5.1.noarch",
            "openSUSE Leap 15.4:kernel-rt-5.14.21-150400.15.5.1.x86_64",
            "openSUSE Leap 15.4:kernel-rt-devel-5.14.21-150400.15.5.1.x86_64",
            "openSUSE Leap 15.4:kernel-rt_debug-5.14.21-150400.15.5.1.x86_64",
            "openSUSE Leap 15.4:kernel-rt_debug-devel-5.14.21-150400.15.5.1.x86_64",
            "openSUSE Leap 15.4:kernel-source-rt-5.14.21-150400.15.5.1.noarch",
            "openSUSE Leap 15.4:kernel-syms-rt-5.14.21-150400.15.5.1.x86_64",
            "openSUSE Leap 15.4:ocfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2022-12-23T10:39:17Z",
          "details": "moderate"
        }
      ],
      "title": "CVE-2022-3521"
    },
    {
      "cve": "CVE-2022-3524",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2022-3524"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "A vulnerability was found in Linux Kernel. It has been declared as problematic. Affected by this vulnerability is the function ipv6_renew_options of the component IPv6 Handler. The manipulation leads to memory leak. The attack can be launched remotely. It is recommended to apply a patch to fix this issue. The identifier VDB-211021 was assigned to this vulnerability.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_15_5-rt-1-150400.1.3.1.x86_64",
          "SUSE Real Time Module 15 SP4:cluster-md-kmp-rt-5.14.21-150400.15.5.1.x86_64",
          "SUSE Real Time Module 15 SP4:dlm-kmp-rt-5.14.21-150400.15.5.1.x86_64",
          "SUSE Real Time Module 15 SP4:gfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64",
          "SUSE Real Time Module 15 SP4:kernel-devel-rt-5.14.21-150400.15.5.1.noarch",
          "SUSE Real Time Module 15 SP4:kernel-rt-5.14.21-150400.15.5.1.x86_64",
          "SUSE Real Time Module 15 SP4:kernel-rt-devel-5.14.21-150400.15.5.1.x86_64",
          "SUSE Real Time Module 15 SP4:kernel-rt_debug-5.14.21-150400.15.5.1.x86_64",
          "SUSE Real Time Module 15 SP4:kernel-rt_debug-devel-5.14.21-150400.15.5.1.x86_64",
          "SUSE Real Time Module 15 SP4:kernel-source-rt-5.14.21-150400.15.5.1.noarch",
          "SUSE Real Time Module 15 SP4:kernel-syms-rt-5.14.21-150400.15.5.1.x86_64",
          "SUSE Real Time Module 15 SP4:ocfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64",
          "openSUSE Leap 15.4:cluster-md-kmp-rt-5.14.21-150400.15.5.1.x86_64",
          "openSUSE Leap 15.4:dlm-kmp-rt-5.14.21-150400.15.5.1.x86_64",
          "openSUSE Leap 15.4:gfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64",
          "openSUSE Leap 15.4:kernel-devel-rt-5.14.21-150400.15.5.1.noarch",
          "openSUSE Leap 15.4:kernel-rt-5.14.21-150400.15.5.1.x86_64",
          "openSUSE Leap 15.4:kernel-rt-devel-5.14.21-150400.15.5.1.x86_64",
          "openSUSE Leap 15.4:kernel-rt_debug-5.14.21-150400.15.5.1.x86_64",
          "openSUSE Leap 15.4:kernel-rt_debug-devel-5.14.21-150400.15.5.1.x86_64",
          "openSUSE Leap 15.4:kernel-source-rt-5.14.21-150400.15.5.1.noarch",
          "openSUSE Leap 15.4:kernel-syms-rt-5.14.21-150400.15.5.1.x86_64",
          "openSUSE Leap 15.4:ocfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2022-3524",
          "url": "https://www.suse.com/security/cve/CVE-2022-3524"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1204354 for CVE-2022-3524",
          "url": "https://bugzilla.suse.com/1204354"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1212320 for CVE-2022-3524",
          "url": "https://bugzilla.suse.com/1212320"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_15_5-rt-1-150400.1.3.1.x86_64",
            "SUSE Real Time Module 15 SP4:cluster-md-kmp-rt-5.14.21-150400.15.5.1.x86_64",
            "SUSE Real Time Module 15 SP4:dlm-kmp-rt-5.14.21-150400.15.5.1.x86_64",
            "SUSE Real Time Module 15 SP4:gfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64",
            "SUSE Real Time Module 15 SP4:kernel-devel-rt-5.14.21-150400.15.5.1.noarch",
            "SUSE Real Time Module 15 SP4:kernel-rt-5.14.21-150400.15.5.1.x86_64",
            "SUSE Real Time Module 15 SP4:kernel-rt-devel-5.14.21-150400.15.5.1.x86_64",
            "SUSE Real Time Module 15 SP4:kernel-rt_debug-5.14.21-150400.15.5.1.x86_64",
            "SUSE Real Time Module 15 SP4:kernel-rt_debug-devel-5.14.21-150400.15.5.1.x86_64",
            "SUSE Real Time Module 15 SP4:kernel-source-rt-5.14.21-150400.15.5.1.noarch",
            "SUSE Real Time Module 15 SP4:kernel-syms-rt-5.14.21-150400.15.5.1.x86_64",
            "SUSE Real Time Module 15 SP4:ocfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64",
            "openSUSE Leap 15.4:cluster-md-kmp-rt-5.14.21-150400.15.5.1.x86_64",
            "openSUSE Leap 15.4:dlm-kmp-rt-5.14.21-150400.15.5.1.x86_64",
            "openSUSE Leap 15.4:gfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64",
            "openSUSE Leap 15.4:kernel-devel-rt-5.14.21-150400.15.5.1.noarch",
            "openSUSE Leap 15.4:kernel-rt-5.14.21-150400.15.5.1.x86_64",
            "openSUSE Leap 15.4:kernel-rt-devel-5.14.21-150400.15.5.1.x86_64",
            "openSUSE Leap 15.4:kernel-rt_debug-5.14.21-150400.15.5.1.x86_64",
            "openSUSE Leap 15.4:kernel-rt_debug-devel-5.14.21-150400.15.5.1.x86_64",
            "openSUSE Leap 15.4:kernel-source-rt-5.14.21-150400.15.5.1.noarch",
            "openSUSE Leap 15.4:kernel-syms-rt-5.14.21-150400.15.5.1.x86_64",
            "openSUSE Leap 15.4:ocfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 4.7,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H",
            "version": "3.1"
          },
          "products": [
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_15_5-rt-1-150400.1.3.1.x86_64",
            "SUSE Real Time Module 15 SP4:cluster-md-kmp-rt-5.14.21-150400.15.5.1.x86_64",
            "SUSE Real Time Module 15 SP4:dlm-kmp-rt-5.14.21-150400.15.5.1.x86_64",
            "SUSE Real Time Module 15 SP4:gfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64",
            "SUSE Real Time Module 15 SP4:kernel-devel-rt-5.14.21-150400.15.5.1.noarch",
            "SUSE Real Time Module 15 SP4:kernel-rt-5.14.21-150400.15.5.1.x86_64",
            "SUSE Real Time Module 15 SP4:kernel-rt-devel-5.14.21-150400.15.5.1.x86_64",
            "SUSE Real Time Module 15 SP4:kernel-rt_debug-5.14.21-150400.15.5.1.x86_64",
            "SUSE Real Time Module 15 SP4:kernel-rt_debug-devel-5.14.21-150400.15.5.1.x86_64",
            "SUSE Real Time Module 15 SP4:kernel-source-rt-5.14.21-150400.15.5.1.noarch",
            "SUSE Real Time Module 15 SP4:kernel-syms-rt-5.14.21-150400.15.5.1.x86_64",
            "SUSE Real Time Module 15 SP4:ocfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64",
            "openSUSE Leap 15.4:cluster-md-kmp-rt-5.14.21-150400.15.5.1.x86_64",
            "openSUSE Leap 15.4:dlm-kmp-rt-5.14.21-150400.15.5.1.x86_64",
            "openSUSE Leap 15.4:gfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64",
            "openSUSE Leap 15.4:kernel-devel-rt-5.14.21-150400.15.5.1.noarch",
            "openSUSE Leap 15.4:kernel-rt-5.14.21-150400.15.5.1.x86_64",
            "openSUSE Leap 15.4:kernel-rt-devel-5.14.21-150400.15.5.1.x86_64",
            "openSUSE Leap 15.4:kernel-rt_debug-5.14.21-150400.15.5.1.x86_64",
            "openSUSE Leap 15.4:kernel-rt_debug-devel-5.14.21-150400.15.5.1.x86_64",
            "openSUSE Leap 15.4:kernel-source-rt-5.14.21-150400.15.5.1.noarch",
            "openSUSE Leap 15.4:kernel-syms-rt-5.14.21-150400.15.5.1.x86_64",
            "openSUSE Leap 15.4:ocfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2022-12-23T10:39:17Z",
          "details": "moderate"
        }
      ],
      "title": "CVE-2022-3524"
    },
    {
      "cve": "CVE-2022-3526",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2022-3526"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "A vulnerability classified as problematic was found in Linux Kernel. This vulnerability affects the function macvlan_handle_frame of the file drivers/net/macvlan.c of the component skb. The manipulation leads to memory leak. The attack can be initiated remotely. It is recommended to apply a patch to fix this issue. The identifier of this vulnerability is VDB-211024.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_15_5-rt-1-150400.1.3.1.x86_64",
          "SUSE Real Time Module 15 SP4:cluster-md-kmp-rt-5.14.21-150400.15.5.1.x86_64",
          "SUSE Real Time Module 15 SP4:dlm-kmp-rt-5.14.21-150400.15.5.1.x86_64",
          "SUSE Real Time Module 15 SP4:gfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64",
          "SUSE Real Time Module 15 SP4:kernel-devel-rt-5.14.21-150400.15.5.1.noarch",
          "SUSE Real Time Module 15 SP4:kernel-rt-5.14.21-150400.15.5.1.x86_64",
          "SUSE Real Time Module 15 SP4:kernel-rt-devel-5.14.21-150400.15.5.1.x86_64",
          "SUSE Real Time Module 15 SP4:kernel-rt_debug-5.14.21-150400.15.5.1.x86_64",
          "SUSE Real Time Module 15 SP4:kernel-rt_debug-devel-5.14.21-150400.15.5.1.x86_64",
          "SUSE Real Time Module 15 SP4:kernel-source-rt-5.14.21-150400.15.5.1.noarch",
          "SUSE Real Time Module 15 SP4:kernel-syms-rt-5.14.21-150400.15.5.1.x86_64",
          "SUSE Real Time Module 15 SP4:ocfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64",
          "openSUSE Leap 15.4:cluster-md-kmp-rt-5.14.21-150400.15.5.1.x86_64",
          "openSUSE Leap 15.4:dlm-kmp-rt-5.14.21-150400.15.5.1.x86_64",
          "openSUSE Leap 15.4:gfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64",
          "openSUSE Leap 15.4:kernel-devel-rt-5.14.21-150400.15.5.1.noarch",
          "openSUSE Leap 15.4:kernel-rt-5.14.21-150400.15.5.1.x86_64",
          "openSUSE Leap 15.4:kernel-rt-devel-5.14.21-150400.15.5.1.x86_64",
          "openSUSE Leap 15.4:kernel-rt_debug-5.14.21-150400.15.5.1.x86_64",
          "openSUSE Leap 15.4:kernel-rt_debug-devel-5.14.21-150400.15.5.1.x86_64",
          "openSUSE Leap 15.4:kernel-source-rt-5.14.21-150400.15.5.1.noarch",
          "openSUSE Leap 15.4:kernel-syms-rt-5.14.21-150400.15.5.1.x86_64",
          "openSUSE Leap 15.4:ocfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2022-3526",
          "url": "https://www.suse.com/security/cve/CVE-2022-3526"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1204353 for CVE-2022-3526",
          "url": "https://bugzilla.suse.com/1204353"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_15_5-rt-1-150400.1.3.1.x86_64",
            "SUSE Real Time Module 15 SP4:cluster-md-kmp-rt-5.14.21-150400.15.5.1.x86_64",
            "SUSE Real Time Module 15 SP4:dlm-kmp-rt-5.14.21-150400.15.5.1.x86_64",
            "SUSE Real Time Module 15 SP4:gfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64",
            "SUSE Real Time Module 15 SP4:kernel-devel-rt-5.14.21-150400.15.5.1.noarch",
            "SUSE Real Time Module 15 SP4:kernel-rt-5.14.21-150400.15.5.1.x86_64",
            "SUSE Real Time Module 15 SP4:kernel-rt-devel-5.14.21-150400.15.5.1.x86_64",
            "SUSE Real Time Module 15 SP4:kernel-rt_debug-5.14.21-150400.15.5.1.x86_64",
            "SUSE Real Time Module 15 SP4:kernel-rt_debug-devel-5.14.21-150400.15.5.1.x86_64",
            "SUSE Real Time Module 15 SP4:kernel-source-rt-5.14.21-150400.15.5.1.noarch",
            "SUSE Real Time Module 15 SP4:kernel-syms-rt-5.14.21-150400.15.5.1.x86_64",
            "SUSE Real Time Module 15 SP4:ocfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64",
            "openSUSE Leap 15.4:cluster-md-kmp-rt-5.14.21-150400.15.5.1.x86_64",
            "openSUSE Leap 15.4:dlm-kmp-rt-5.14.21-150400.15.5.1.x86_64",
            "openSUSE Leap 15.4:gfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64",
            "openSUSE Leap 15.4:kernel-devel-rt-5.14.21-150400.15.5.1.noarch",
            "openSUSE Leap 15.4:kernel-rt-5.14.21-150400.15.5.1.x86_64",
            "openSUSE Leap 15.4:kernel-rt-devel-5.14.21-150400.15.5.1.x86_64",
            "openSUSE Leap 15.4:kernel-rt_debug-5.14.21-150400.15.5.1.x86_64",
            "openSUSE Leap 15.4:kernel-rt_debug-devel-5.14.21-150400.15.5.1.x86_64",
            "openSUSE Leap 15.4:kernel-source-rt-5.14.21-150400.15.5.1.noarch",
            "openSUSE Leap 15.4:kernel-syms-rt-5.14.21-150400.15.5.1.x86_64",
            "openSUSE Leap 15.4:ocfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 5.9,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H",
            "version": "3.1"
          },
          "products": [
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_15_5-rt-1-150400.1.3.1.x86_64",
            "SUSE Real Time Module 15 SP4:cluster-md-kmp-rt-5.14.21-150400.15.5.1.x86_64",
            "SUSE Real Time Module 15 SP4:dlm-kmp-rt-5.14.21-150400.15.5.1.x86_64",
            "SUSE Real Time Module 15 SP4:gfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64",
            "SUSE Real Time Module 15 SP4:kernel-devel-rt-5.14.21-150400.15.5.1.noarch",
            "SUSE Real Time Module 15 SP4:kernel-rt-5.14.21-150400.15.5.1.x86_64",
            "SUSE Real Time Module 15 SP4:kernel-rt-devel-5.14.21-150400.15.5.1.x86_64",
            "SUSE Real Time Module 15 SP4:kernel-rt_debug-5.14.21-150400.15.5.1.x86_64",
            "SUSE Real Time Module 15 SP4:kernel-rt_debug-devel-5.14.21-150400.15.5.1.x86_64",
            "SUSE Real Time Module 15 SP4:kernel-source-rt-5.14.21-150400.15.5.1.noarch",
            "SUSE Real Time Module 15 SP4:kernel-syms-rt-5.14.21-150400.15.5.1.x86_64",
            "SUSE Real Time Module 15 SP4:ocfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64",
            "openSUSE Leap 15.4:cluster-md-kmp-rt-5.14.21-150400.15.5.1.x86_64",
            "openSUSE Leap 15.4:dlm-kmp-rt-5.14.21-150400.15.5.1.x86_64",
            "openSUSE Leap 15.4:gfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64",
            "openSUSE Leap 15.4:kernel-devel-rt-5.14.21-150400.15.5.1.noarch",
            "openSUSE Leap 15.4:kernel-rt-5.14.21-150400.15.5.1.x86_64",
            "openSUSE Leap 15.4:kernel-rt-devel-5.14.21-150400.15.5.1.x86_64",
            "openSUSE Leap 15.4:kernel-rt_debug-5.14.21-150400.15.5.1.x86_64",
            "openSUSE Leap 15.4:kernel-rt_debug-devel-5.14.21-150400.15.5.1.x86_64",
            "openSUSE Leap 15.4:kernel-source-rt-5.14.21-150400.15.5.1.noarch",
            "openSUSE Leap 15.4:kernel-syms-rt-5.14.21-150400.15.5.1.x86_64",
            "openSUSE Leap 15.4:ocfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2022-12-23T10:39:17Z",
          "details": "moderate"
        }
      ],
      "title": "CVE-2022-3526"
    },
    {
      "cve": "CVE-2022-3535",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2022-3535"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "** REJECT ** DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: none. Reason: This candidate was withdrawn by its CNA. Further investigation showed that it was not a security issue. Notes: none.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_15_5-rt-1-150400.1.3.1.x86_64",
          "SUSE Real Time Module 15 SP4:cluster-md-kmp-rt-5.14.21-150400.15.5.1.x86_64",
          "SUSE Real Time Module 15 SP4:dlm-kmp-rt-5.14.21-150400.15.5.1.x86_64",
          "SUSE Real Time Module 15 SP4:gfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64",
          "SUSE Real Time Module 15 SP4:kernel-devel-rt-5.14.21-150400.15.5.1.noarch",
          "SUSE Real Time Module 15 SP4:kernel-rt-5.14.21-150400.15.5.1.x86_64",
          "SUSE Real Time Module 15 SP4:kernel-rt-devel-5.14.21-150400.15.5.1.x86_64",
          "SUSE Real Time Module 15 SP4:kernel-rt_debug-5.14.21-150400.15.5.1.x86_64",
          "SUSE Real Time Module 15 SP4:kernel-rt_debug-devel-5.14.21-150400.15.5.1.x86_64",
          "SUSE Real Time Module 15 SP4:kernel-source-rt-5.14.21-150400.15.5.1.noarch",
          "SUSE Real Time Module 15 SP4:kernel-syms-rt-5.14.21-150400.15.5.1.x86_64",
          "SUSE Real Time Module 15 SP4:ocfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64",
          "openSUSE Leap 15.4:cluster-md-kmp-rt-5.14.21-150400.15.5.1.x86_64",
          "openSUSE Leap 15.4:dlm-kmp-rt-5.14.21-150400.15.5.1.x86_64",
          "openSUSE Leap 15.4:gfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64",
          "openSUSE Leap 15.4:kernel-devel-rt-5.14.21-150400.15.5.1.noarch",
          "openSUSE Leap 15.4:kernel-rt-5.14.21-150400.15.5.1.x86_64",
          "openSUSE Leap 15.4:kernel-rt-devel-5.14.21-150400.15.5.1.x86_64",
          "openSUSE Leap 15.4:kernel-rt_debug-5.14.21-150400.15.5.1.x86_64",
          "openSUSE Leap 15.4:kernel-rt_debug-devel-5.14.21-150400.15.5.1.x86_64",
          "openSUSE Leap 15.4:kernel-source-rt-5.14.21-150400.15.5.1.noarch",
          "openSUSE Leap 15.4:kernel-syms-rt-5.14.21-150400.15.5.1.x86_64",
          "openSUSE Leap 15.4:ocfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2022-3535",
          "url": "https://www.suse.com/security/cve/CVE-2022-3535"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1204417 for CVE-2022-3535",
          "url": "https://bugzilla.suse.com/1204417"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_15_5-rt-1-150400.1.3.1.x86_64",
            "SUSE Real Time Module 15 SP4:cluster-md-kmp-rt-5.14.21-150400.15.5.1.x86_64",
            "SUSE Real Time Module 15 SP4:dlm-kmp-rt-5.14.21-150400.15.5.1.x86_64",
            "SUSE Real Time Module 15 SP4:gfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64",
            "SUSE Real Time Module 15 SP4:kernel-devel-rt-5.14.21-150400.15.5.1.noarch",
            "SUSE Real Time Module 15 SP4:kernel-rt-5.14.21-150400.15.5.1.x86_64",
            "SUSE Real Time Module 15 SP4:kernel-rt-devel-5.14.21-150400.15.5.1.x86_64",
            "SUSE Real Time Module 15 SP4:kernel-rt_debug-5.14.21-150400.15.5.1.x86_64",
            "SUSE Real Time Module 15 SP4:kernel-rt_debug-devel-5.14.21-150400.15.5.1.x86_64",
            "SUSE Real Time Module 15 SP4:kernel-source-rt-5.14.21-150400.15.5.1.noarch",
            "SUSE Real Time Module 15 SP4:kernel-syms-rt-5.14.21-150400.15.5.1.x86_64",
            "SUSE Real Time Module 15 SP4:ocfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64",
            "openSUSE Leap 15.4:cluster-md-kmp-rt-5.14.21-150400.15.5.1.x86_64",
            "openSUSE Leap 15.4:dlm-kmp-rt-5.14.21-150400.15.5.1.x86_64",
            "openSUSE Leap 15.4:gfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64",
            "openSUSE Leap 15.4:kernel-devel-rt-5.14.21-150400.15.5.1.noarch",
            "openSUSE Leap 15.4:kernel-rt-5.14.21-150400.15.5.1.x86_64",
            "openSUSE Leap 15.4:kernel-rt-devel-5.14.21-150400.15.5.1.x86_64",
            "openSUSE Leap 15.4:kernel-rt_debug-5.14.21-150400.15.5.1.x86_64",
            "openSUSE Leap 15.4:kernel-rt_debug-devel-5.14.21-150400.15.5.1.x86_64",
            "openSUSE Leap 15.4:kernel-source-rt-5.14.21-150400.15.5.1.noarch",
            "openSUSE Leap 15.4:kernel-syms-rt-5.14.21-150400.15.5.1.x86_64",
            "openSUSE Leap 15.4:ocfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 2.3,
            "baseSeverity": "LOW",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:L",
            "version": "3.1"
          },
          "products": [
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_15_5-rt-1-150400.1.3.1.x86_64",
            "SUSE Real Time Module 15 SP4:cluster-md-kmp-rt-5.14.21-150400.15.5.1.x86_64",
            "SUSE Real Time Module 15 SP4:dlm-kmp-rt-5.14.21-150400.15.5.1.x86_64",
            "SUSE Real Time Module 15 SP4:gfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64",
            "SUSE Real Time Module 15 SP4:kernel-devel-rt-5.14.21-150400.15.5.1.noarch",
            "SUSE Real Time Module 15 SP4:kernel-rt-5.14.21-150400.15.5.1.x86_64",
            "SUSE Real Time Module 15 SP4:kernel-rt-devel-5.14.21-150400.15.5.1.x86_64",
            "SUSE Real Time Module 15 SP4:kernel-rt_debug-5.14.21-150400.15.5.1.x86_64",
            "SUSE Real Time Module 15 SP4:kernel-rt_debug-devel-5.14.21-150400.15.5.1.x86_64",
            "SUSE Real Time Module 15 SP4:kernel-source-rt-5.14.21-150400.15.5.1.noarch",
            "SUSE Real Time Module 15 SP4:kernel-syms-rt-5.14.21-150400.15.5.1.x86_64",
            "SUSE Real Time Module 15 SP4:ocfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64",
            "openSUSE Leap 15.4:cluster-md-kmp-rt-5.14.21-150400.15.5.1.x86_64",
            "openSUSE Leap 15.4:dlm-kmp-rt-5.14.21-150400.15.5.1.x86_64",
            "openSUSE Leap 15.4:gfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64",
            "openSUSE Leap 15.4:kernel-devel-rt-5.14.21-150400.15.5.1.noarch",
            "openSUSE Leap 15.4:kernel-rt-5.14.21-150400.15.5.1.x86_64",
            "openSUSE Leap 15.4:kernel-rt-devel-5.14.21-150400.15.5.1.x86_64",
            "openSUSE Leap 15.4:kernel-rt_debug-5.14.21-150400.15.5.1.x86_64",
            "openSUSE Leap 15.4:kernel-rt_debug-devel-5.14.21-150400.15.5.1.x86_64",
            "openSUSE Leap 15.4:kernel-source-rt-5.14.21-150400.15.5.1.noarch",
            "openSUSE Leap 15.4:kernel-syms-rt-5.14.21-150400.15.5.1.x86_64",
            "openSUSE Leap 15.4:ocfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2022-12-23T10:39:17Z",
          "details": "low"
        }
      ],
      "title": "CVE-2022-3535"
    },
    {
      "cve": "CVE-2022-3542",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2022-3542"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "** REJECT ** DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: none. Reason: This candidate was withdrawn by its CNA. Further investigation showed that it was not a security issue. Notes: none.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_15_5-rt-1-150400.1.3.1.x86_64",
          "SUSE Real Time Module 15 SP4:cluster-md-kmp-rt-5.14.21-150400.15.5.1.x86_64",
          "SUSE Real Time Module 15 SP4:dlm-kmp-rt-5.14.21-150400.15.5.1.x86_64",
          "SUSE Real Time Module 15 SP4:gfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64",
          "SUSE Real Time Module 15 SP4:kernel-devel-rt-5.14.21-150400.15.5.1.noarch",
          "SUSE Real Time Module 15 SP4:kernel-rt-5.14.21-150400.15.5.1.x86_64",
          "SUSE Real Time Module 15 SP4:kernel-rt-devel-5.14.21-150400.15.5.1.x86_64",
          "SUSE Real Time Module 15 SP4:kernel-rt_debug-5.14.21-150400.15.5.1.x86_64",
          "SUSE Real Time Module 15 SP4:kernel-rt_debug-devel-5.14.21-150400.15.5.1.x86_64",
          "SUSE Real Time Module 15 SP4:kernel-source-rt-5.14.21-150400.15.5.1.noarch",
          "SUSE Real Time Module 15 SP4:kernel-syms-rt-5.14.21-150400.15.5.1.x86_64",
          "SUSE Real Time Module 15 SP4:ocfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64",
          "openSUSE Leap 15.4:cluster-md-kmp-rt-5.14.21-150400.15.5.1.x86_64",
          "openSUSE Leap 15.4:dlm-kmp-rt-5.14.21-150400.15.5.1.x86_64",
          "openSUSE Leap 15.4:gfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64",
          "openSUSE Leap 15.4:kernel-devel-rt-5.14.21-150400.15.5.1.noarch",
          "openSUSE Leap 15.4:kernel-rt-5.14.21-150400.15.5.1.x86_64",
          "openSUSE Leap 15.4:kernel-rt-devel-5.14.21-150400.15.5.1.x86_64",
          "openSUSE Leap 15.4:kernel-rt_debug-5.14.21-150400.15.5.1.x86_64",
          "openSUSE Leap 15.4:kernel-rt_debug-devel-5.14.21-150400.15.5.1.x86_64",
          "openSUSE Leap 15.4:kernel-source-rt-5.14.21-150400.15.5.1.noarch",
          "openSUSE Leap 15.4:kernel-syms-rt-5.14.21-150400.15.5.1.x86_64",
          "openSUSE Leap 15.4:ocfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2022-3542",
          "url": "https://www.suse.com/security/cve/CVE-2022-3542"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1204402 for CVE-2022-3542",
          "url": "https://bugzilla.suse.com/1204402"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1217458 for CVE-2022-3542",
          "url": "https://bugzilla.suse.com/1217458"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_15_5-rt-1-150400.1.3.1.x86_64",
            "SUSE Real Time Module 15 SP4:cluster-md-kmp-rt-5.14.21-150400.15.5.1.x86_64",
            "SUSE Real Time Module 15 SP4:dlm-kmp-rt-5.14.21-150400.15.5.1.x86_64",
            "SUSE Real Time Module 15 SP4:gfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64",
            "SUSE Real Time Module 15 SP4:kernel-devel-rt-5.14.21-150400.15.5.1.noarch",
            "SUSE Real Time Module 15 SP4:kernel-rt-5.14.21-150400.15.5.1.x86_64",
            "SUSE Real Time Module 15 SP4:kernel-rt-devel-5.14.21-150400.15.5.1.x86_64",
            "SUSE Real Time Module 15 SP4:kernel-rt_debug-5.14.21-150400.15.5.1.x86_64",
            "SUSE Real Time Module 15 SP4:kernel-rt_debug-devel-5.14.21-150400.15.5.1.x86_64",
            "SUSE Real Time Module 15 SP4:kernel-source-rt-5.14.21-150400.15.5.1.noarch",
            "SUSE Real Time Module 15 SP4:kernel-syms-rt-5.14.21-150400.15.5.1.x86_64",
            "SUSE Real Time Module 15 SP4:ocfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64",
            "openSUSE Leap 15.4:cluster-md-kmp-rt-5.14.21-150400.15.5.1.x86_64",
            "openSUSE Leap 15.4:dlm-kmp-rt-5.14.21-150400.15.5.1.x86_64",
            "openSUSE Leap 15.4:gfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64",
            "openSUSE Leap 15.4:kernel-devel-rt-5.14.21-150400.15.5.1.noarch",
            "openSUSE Leap 15.4:kernel-rt-5.14.21-150400.15.5.1.x86_64",
            "openSUSE Leap 15.4:kernel-rt-devel-5.14.21-150400.15.5.1.x86_64",
            "openSUSE Leap 15.4:kernel-rt_debug-5.14.21-150400.15.5.1.x86_64",
            "openSUSE Leap 15.4:kernel-rt_debug-devel-5.14.21-150400.15.5.1.x86_64",
            "openSUSE Leap 15.4:kernel-source-rt-5.14.21-150400.15.5.1.noarch",
            "openSUSE Leap 15.4:kernel-syms-rt-5.14.21-150400.15.5.1.x86_64",
            "openSUSE Leap 15.4:ocfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 5.9,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H",
            "version": "3.1"
          },
          "products": [
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_15_5-rt-1-150400.1.3.1.x86_64",
            "SUSE Real Time Module 15 SP4:cluster-md-kmp-rt-5.14.21-150400.15.5.1.x86_64",
            "SUSE Real Time Module 15 SP4:dlm-kmp-rt-5.14.21-150400.15.5.1.x86_64",
            "SUSE Real Time Module 15 SP4:gfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64",
            "SUSE Real Time Module 15 SP4:kernel-devel-rt-5.14.21-150400.15.5.1.noarch",
            "SUSE Real Time Module 15 SP4:kernel-rt-5.14.21-150400.15.5.1.x86_64",
            "SUSE Real Time Module 15 SP4:kernel-rt-devel-5.14.21-150400.15.5.1.x86_64",
            "SUSE Real Time Module 15 SP4:kernel-rt_debug-5.14.21-150400.15.5.1.x86_64",
            "SUSE Real Time Module 15 SP4:kernel-rt_debug-devel-5.14.21-150400.15.5.1.x86_64",
            "SUSE Real Time Module 15 SP4:kernel-source-rt-5.14.21-150400.15.5.1.noarch",
            "SUSE Real Time Module 15 SP4:kernel-syms-rt-5.14.21-150400.15.5.1.x86_64",
            "SUSE Real Time Module 15 SP4:ocfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64",
            "openSUSE Leap 15.4:cluster-md-kmp-rt-5.14.21-150400.15.5.1.x86_64",
            "openSUSE Leap 15.4:dlm-kmp-rt-5.14.21-150400.15.5.1.x86_64",
            "openSUSE Leap 15.4:gfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64",
            "openSUSE Leap 15.4:kernel-devel-rt-5.14.21-150400.15.5.1.noarch",
            "openSUSE Leap 15.4:kernel-rt-5.14.21-150400.15.5.1.x86_64",
            "openSUSE Leap 15.4:kernel-rt-devel-5.14.21-150400.15.5.1.x86_64",
            "openSUSE Leap 15.4:kernel-rt_debug-5.14.21-150400.15.5.1.x86_64",
            "openSUSE Leap 15.4:kernel-rt_debug-devel-5.14.21-150400.15.5.1.x86_64",
            "openSUSE Leap 15.4:kernel-source-rt-5.14.21-150400.15.5.1.noarch",
            "openSUSE Leap 15.4:kernel-syms-rt-5.14.21-150400.15.5.1.x86_64",
            "openSUSE Leap 15.4:ocfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2022-12-23T10:39:17Z",
          "details": "moderate"
        }
      ],
      "title": "CVE-2022-3542"
    },
    {
      "cve": "CVE-2022-3545",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2022-3545"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "A vulnerability has been found in Linux Kernel and classified as critical. Affected by this vulnerability is the function area_cache_get of the file drivers/net/ethernet/netronome/nfp/nfpcore/nfp_cppcore.c of the component IPsec. The manipulation leads to use after free. It is recommended to apply a patch to fix this issue. The identifier VDB-211045 was assigned to this vulnerability.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_15_5-rt-1-150400.1.3.1.x86_64",
          "SUSE Real Time Module 15 SP4:cluster-md-kmp-rt-5.14.21-150400.15.5.1.x86_64",
          "SUSE Real Time Module 15 SP4:dlm-kmp-rt-5.14.21-150400.15.5.1.x86_64",
          "SUSE Real Time Module 15 SP4:gfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64",
          "SUSE Real Time Module 15 SP4:kernel-devel-rt-5.14.21-150400.15.5.1.noarch",
          "SUSE Real Time Module 15 SP4:kernel-rt-5.14.21-150400.15.5.1.x86_64",
          "SUSE Real Time Module 15 SP4:kernel-rt-devel-5.14.21-150400.15.5.1.x86_64",
          "SUSE Real Time Module 15 SP4:kernel-rt_debug-5.14.21-150400.15.5.1.x86_64",
          "SUSE Real Time Module 15 SP4:kernel-rt_debug-devel-5.14.21-150400.15.5.1.x86_64",
          "SUSE Real Time Module 15 SP4:kernel-source-rt-5.14.21-150400.15.5.1.noarch",
          "SUSE Real Time Module 15 SP4:kernel-syms-rt-5.14.21-150400.15.5.1.x86_64",
          "SUSE Real Time Module 15 SP4:ocfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64",
          "openSUSE Leap 15.4:cluster-md-kmp-rt-5.14.21-150400.15.5.1.x86_64",
          "openSUSE Leap 15.4:dlm-kmp-rt-5.14.21-150400.15.5.1.x86_64",
          "openSUSE Leap 15.4:gfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64",
          "openSUSE Leap 15.4:kernel-devel-rt-5.14.21-150400.15.5.1.noarch",
          "openSUSE Leap 15.4:kernel-rt-5.14.21-150400.15.5.1.x86_64",
          "openSUSE Leap 15.4:kernel-rt-devel-5.14.21-150400.15.5.1.x86_64",
          "openSUSE Leap 15.4:kernel-rt_debug-5.14.21-150400.15.5.1.x86_64",
          "openSUSE Leap 15.4:kernel-rt_debug-devel-5.14.21-150400.15.5.1.x86_64",
          "openSUSE Leap 15.4:kernel-source-rt-5.14.21-150400.15.5.1.noarch",
          "openSUSE Leap 15.4:kernel-syms-rt-5.14.21-150400.15.5.1.x86_64",
          "openSUSE Leap 15.4:ocfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2022-3545",
          "url": "https://www.suse.com/security/cve/CVE-2022-3545"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1204415 for CVE-2022-3545",
          "url": "https://bugzilla.suse.com/1204415"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1204424 for CVE-2022-3545",
          "url": "https://bugzilla.suse.com/1204424"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1209225 for CVE-2022-3545",
          "url": "https://bugzilla.suse.com/1209225"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1217531 for CVE-2022-3545",
          "url": "https://bugzilla.suse.com/1217531"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_15_5-rt-1-150400.1.3.1.x86_64",
            "SUSE Real Time Module 15 SP4:cluster-md-kmp-rt-5.14.21-150400.15.5.1.x86_64",
            "SUSE Real Time Module 15 SP4:dlm-kmp-rt-5.14.21-150400.15.5.1.x86_64",
            "SUSE Real Time Module 15 SP4:gfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64",
            "SUSE Real Time Module 15 SP4:kernel-devel-rt-5.14.21-150400.15.5.1.noarch",
            "SUSE Real Time Module 15 SP4:kernel-rt-5.14.21-150400.15.5.1.x86_64",
            "SUSE Real Time Module 15 SP4:kernel-rt-devel-5.14.21-150400.15.5.1.x86_64",
            "SUSE Real Time Module 15 SP4:kernel-rt_debug-5.14.21-150400.15.5.1.x86_64",
            "SUSE Real Time Module 15 SP4:kernel-rt_debug-devel-5.14.21-150400.15.5.1.x86_64",
            "SUSE Real Time Module 15 SP4:kernel-source-rt-5.14.21-150400.15.5.1.noarch",
            "SUSE Real Time Module 15 SP4:kernel-syms-rt-5.14.21-150400.15.5.1.x86_64",
            "SUSE Real Time Module 15 SP4:ocfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64",
            "openSUSE Leap 15.4:cluster-md-kmp-rt-5.14.21-150400.15.5.1.x86_64",
            "openSUSE Leap 15.4:dlm-kmp-rt-5.14.21-150400.15.5.1.x86_64",
            "openSUSE Leap 15.4:gfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64",
            "openSUSE Leap 15.4:kernel-devel-rt-5.14.21-150400.15.5.1.noarch",
            "openSUSE Leap 15.4:kernel-rt-5.14.21-150400.15.5.1.x86_64",
            "openSUSE Leap 15.4:kernel-rt-devel-5.14.21-150400.15.5.1.x86_64",
            "openSUSE Leap 15.4:kernel-rt_debug-5.14.21-150400.15.5.1.x86_64",
            "openSUSE Leap 15.4:kernel-rt_debug-devel-5.14.21-150400.15.5.1.x86_64",
            "openSUSE Leap 15.4:kernel-source-rt-5.14.21-150400.15.5.1.noarch",
            "openSUSE Leap 15.4:kernel-syms-rt-5.14.21-150400.15.5.1.x86_64",
            "openSUSE Leap 15.4:ocfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 7.4,
            "baseSeverity": "HIGH",
            "vectorString": "CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H",
            "version": "3.1"
          },
          "products": [
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_15_5-rt-1-150400.1.3.1.x86_64",
            "SUSE Real Time Module 15 SP4:cluster-md-kmp-rt-5.14.21-150400.15.5.1.x86_64",
            "SUSE Real Time Module 15 SP4:dlm-kmp-rt-5.14.21-150400.15.5.1.x86_64",
            "SUSE Real Time Module 15 SP4:gfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64",
            "SUSE Real Time Module 15 SP4:kernel-devel-rt-5.14.21-150400.15.5.1.noarch",
            "SUSE Real Time Module 15 SP4:kernel-rt-5.14.21-150400.15.5.1.x86_64",
            "SUSE Real Time Module 15 SP4:kernel-rt-devel-5.14.21-150400.15.5.1.x86_64",
            "SUSE Real Time Module 15 SP4:kernel-rt_debug-5.14.21-150400.15.5.1.x86_64",
            "SUSE Real Time Module 15 SP4:kernel-rt_debug-devel-5.14.21-150400.15.5.1.x86_64",
            "SUSE Real Time Module 15 SP4:kernel-source-rt-5.14.21-150400.15.5.1.noarch",
            "SUSE Real Time Module 15 SP4:kernel-syms-rt-5.14.21-150400.15.5.1.x86_64",
            "SUSE Real Time Module 15 SP4:ocfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64",
            "openSUSE Leap 15.4:cluster-md-kmp-rt-5.14.21-150400.15.5.1.x86_64",
            "openSUSE Leap 15.4:dlm-kmp-rt-5.14.21-150400.15.5.1.x86_64",
            "openSUSE Leap 15.4:gfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64",
            "openSUSE Leap 15.4:kernel-devel-rt-5.14.21-150400.15.5.1.noarch",
            "openSUSE Leap 15.4:kernel-rt-5.14.21-150400.15.5.1.x86_64",
            "openSUSE Leap 15.4:kernel-rt-devel-5.14.21-150400.15.5.1.x86_64",
            "openSUSE Leap 15.4:kernel-rt_debug-5.14.21-150400.15.5.1.x86_64",
            "openSUSE Leap 15.4:kernel-rt_debug-devel-5.14.21-150400.15.5.1.x86_64",
            "openSUSE Leap 15.4:kernel-source-rt-5.14.21-150400.15.5.1.noarch",
            "openSUSE Leap 15.4:kernel-syms-rt-5.14.21-150400.15.5.1.x86_64",
            "openSUSE Leap 15.4:ocfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2022-12-23T10:39:17Z",
          "details": "important"
        }
      ],
      "title": "CVE-2022-3545"
    },
    {
      "cve": "CVE-2022-3565",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2022-3565"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "A vulnerability, which was classified as critical, has been found in Linux Kernel. Affected by this issue is the function del_timer of the file drivers/isdn/mISDN/l1oip_core.c of the component Bluetooth. The manipulation leads to use after free. It is recommended to apply a patch to fix this issue. The identifier of this vulnerability is VDB-211088.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_15_5-rt-1-150400.1.3.1.x86_64",
          "SUSE Real Time Module 15 SP4:cluster-md-kmp-rt-5.14.21-150400.15.5.1.x86_64",
          "SUSE Real Time Module 15 SP4:dlm-kmp-rt-5.14.21-150400.15.5.1.x86_64",
          "SUSE Real Time Module 15 SP4:gfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64",
          "SUSE Real Time Module 15 SP4:kernel-devel-rt-5.14.21-150400.15.5.1.noarch",
          "SUSE Real Time Module 15 SP4:kernel-rt-5.14.21-150400.15.5.1.x86_64",
          "SUSE Real Time Module 15 SP4:kernel-rt-devel-5.14.21-150400.15.5.1.x86_64",
          "SUSE Real Time Module 15 SP4:kernel-rt_debug-5.14.21-150400.15.5.1.x86_64",
          "SUSE Real Time Module 15 SP4:kernel-rt_debug-devel-5.14.21-150400.15.5.1.x86_64",
          "SUSE Real Time Module 15 SP4:kernel-source-rt-5.14.21-150400.15.5.1.noarch",
          "SUSE Real Time Module 15 SP4:kernel-syms-rt-5.14.21-150400.15.5.1.x86_64",
          "SUSE Real Time Module 15 SP4:ocfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64",
          "openSUSE Leap 15.4:cluster-md-kmp-rt-5.14.21-150400.15.5.1.x86_64",
          "openSUSE Leap 15.4:dlm-kmp-rt-5.14.21-150400.15.5.1.x86_64",
          "openSUSE Leap 15.4:gfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64",
          "openSUSE Leap 15.4:kernel-devel-rt-5.14.21-150400.15.5.1.noarch",
          "openSUSE Leap 15.4:kernel-rt-5.14.21-150400.15.5.1.x86_64",
          "openSUSE Leap 15.4:kernel-rt-devel-5.14.21-150400.15.5.1.x86_64",
          "openSUSE Leap 15.4:kernel-rt_debug-5.14.21-150400.15.5.1.x86_64",
          "openSUSE Leap 15.4:kernel-rt_debug-devel-5.14.21-150400.15.5.1.x86_64",
          "openSUSE Leap 15.4:kernel-source-rt-5.14.21-150400.15.5.1.noarch",
          "openSUSE Leap 15.4:kernel-syms-rt-5.14.21-150400.15.5.1.x86_64",
          "openSUSE Leap 15.4:ocfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2022-3565",
          "url": "https://www.suse.com/security/cve/CVE-2022-3565"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1204431 for CVE-2022-3565",
          "url": "https://bugzilla.suse.com/1204431"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1204432 for CVE-2022-3565",
          "url": "https://bugzilla.suse.com/1204432"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1208044 for CVE-2022-3565",
          "url": "https://bugzilla.suse.com/1208044"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1212323 for CVE-2022-3565",
          "url": "https://bugzilla.suse.com/1212323"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_15_5-rt-1-150400.1.3.1.x86_64",
            "SUSE Real Time Module 15 SP4:cluster-md-kmp-rt-5.14.21-150400.15.5.1.x86_64",
            "SUSE Real Time Module 15 SP4:dlm-kmp-rt-5.14.21-150400.15.5.1.x86_64",
            "SUSE Real Time Module 15 SP4:gfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64",
            "SUSE Real Time Module 15 SP4:kernel-devel-rt-5.14.21-150400.15.5.1.noarch",
            "SUSE Real Time Module 15 SP4:kernel-rt-5.14.21-150400.15.5.1.x86_64",
            "SUSE Real Time Module 15 SP4:kernel-rt-devel-5.14.21-150400.15.5.1.x86_64",
            "SUSE Real Time Module 15 SP4:kernel-rt_debug-5.14.21-150400.15.5.1.x86_64",
            "SUSE Real Time Module 15 SP4:kernel-rt_debug-devel-5.14.21-150400.15.5.1.x86_64",
            "SUSE Real Time Module 15 SP4:kernel-source-rt-5.14.21-150400.15.5.1.noarch",
            "SUSE Real Time Module 15 SP4:kernel-syms-rt-5.14.21-150400.15.5.1.x86_64",
            "SUSE Real Time Module 15 SP4:ocfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64",
            "openSUSE Leap 15.4:cluster-md-kmp-rt-5.14.21-150400.15.5.1.x86_64",
            "openSUSE Leap 15.4:dlm-kmp-rt-5.14.21-150400.15.5.1.x86_64",
            "openSUSE Leap 15.4:gfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64",
            "openSUSE Leap 15.4:kernel-devel-rt-5.14.21-150400.15.5.1.noarch",
            "openSUSE Leap 15.4:kernel-rt-5.14.21-150400.15.5.1.x86_64",
            "openSUSE Leap 15.4:kernel-rt-devel-5.14.21-150400.15.5.1.x86_64",
            "openSUSE Leap 15.4:kernel-rt_debug-5.14.21-150400.15.5.1.x86_64",
            "openSUSE Leap 15.4:kernel-rt_debug-devel-5.14.21-150400.15.5.1.x86_64",
            "openSUSE Leap 15.4:kernel-source-rt-5.14.21-150400.15.5.1.noarch",
            "openSUSE Leap 15.4:kernel-syms-rt-5.14.21-150400.15.5.1.x86_64",
            "openSUSE Leap 15.4:ocfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 7.4,
            "baseSeverity": "HIGH",
            "vectorString": "CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H",
            "version": "3.1"
          },
          "products": [
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_15_5-rt-1-150400.1.3.1.x86_64",
            "SUSE Real Time Module 15 SP4:cluster-md-kmp-rt-5.14.21-150400.15.5.1.x86_64",
            "SUSE Real Time Module 15 SP4:dlm-kmp-rt-5.14.21-150400.15.5.1.x86_64",
            "SUSE Real Time Module 15 SP4:gfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64",
            "SUSE Real Time Module 15 SP4:kernel-devel-rt-5.14.21-150400.15.5.1.noarch",
            "SUSE Real Time Module 15 SP4:kernel-rt-5.14.21-150400.15.5.1.x86_64",
            "SUSE Real Time Module 15 SP4:kernel-rt-devel-5.14.21-150400.15.5.1.x86_64",
            "SUSE Real Time Module 15 SP4:kernel-rt_debug-5.14.21-150400.15.5.1.x86_64",
            "SUSE Real Time Module 15 SP4:kernel-rt_debug-devel-5.14.21-150400.15.5.1.x86_64",
            "SUSE Real Time Module 15 SP4:kernel-source-rt-5.14.21-150400.15.5.1.noarch",
            "SUSE Real Time Module 15 SP4:kernel-syms-rt-5.14.21-150400.15.5.1.x86_64",
            "SUSE Real Time Module 15 SP4:ocfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64",
            "openSUSE Leap 15.4:cluster-md-kmp-rt-5.14.21-150400.15.5.1.x86_64",
            "openSUSE Leap 15.4:dlm-kmp-rt-5.14.21-150400.15.5.1.x86_64",
            "openSUSE Leap 15.4:gfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64",
            "openSUSE Leap 15.4:kernel-devel-rt-5.14.21-150400.15.5.1.noarch",
            "openSUSE Leap 15.4:kernel-rt-5.14.21-150400.15.5.1.x86_64",
            "openSUSE Leap 15.4:kernel-rt-devel-5.14.21-150400.15.5.1.x86_64",
            "openSUSE Leap 15.4:kernel-rt_debug-5.14.21-150400.15.5.1.x86_64",
            "openSUSE Leap 15.4:kernel-rt_debug-devel-5.14.21-150400.15.5.1.x86_64",
            "openSUSE Leap 15.4:kernel-source-rt-5.14.21-150400.15.5.1.noarch",
            "openSUSE Leap 15.4:kernel-syms-rt-5.14.21-150400.15.5.1.x86_64",
            "openSUSE Leap 15.4:ocfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2022-12-23T10:39:17Z",
          "details": "important"
        }
      ],
      "title": "CVE-2022-3565"
    },
    {
      "cve": "CVE-2022-3566",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2022-3566"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "A vulnerability, which was classified as problematic, was found in Linux Kernel. This affects the function tcp_getsockopt/tcp_setsockopt of the component TCP Handler. The manipulation leads to race condition. It is recommended to apply a patch to fix this issue. The identifier VDB-211089 was assigned to this vulnerability.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_15_5-rt-1-150400.1.3.1.x86_64",
          "SUSE Real Time Module 15 SP4:cluster-md-kmp-rt-5.14.21-150400.15.5.1.x86_64",
          "SUSE Real Time Module 15 SP4:dlm-kmp-rt-5.14.21-150400.15.5.1.x86_64",
          "SUSE Real Time Module 15 SP4:gfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64",
          "SUSE Real Time Module 15 SP4:kernel-devel-rt-5.14.21-150400.15.5.1.noarch",
          "SUSE Real Time Module 15 SP4:kernel-rt-5.14.21-150400.15.5.1.x86_64",
          "SUSE Real Time Module 15 SP4:kernel-rt-devel-5.14.21-150400.15.5.1.x86_64",
          "SUSE Real Time Module 15 SP4:kernel-rt_debug-5.14.21-150400.15.5.1.x86_64",
          "SUSE Real Time Module 15 SP4:kernel-rt_debug-devel-5.14.21-150400.15.5.1.x86_64",
          "SUSE Real Time Module 15 SP4:kernel-source-rt-5.14.21-150400.15.5.1.noarch",
          "SUSE Real Time Module 15 SP4:kernel-syms-rt-5.14.21-150400.15.5.1.x86_64",
          "SUSE Real Time Module 15 SP4:ocfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64",
          "openSUSE Leap 15.4:cluster-md-kmp-rt-5.14.21-150400.15.5.1.x86_64",
          "openSUSE Leap 15.4:dlm-kmp-rt-5.14.21-150400.15.5.1.x86_64",
          "openSUSE Leap 15.4:gfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64",
          "openSUSE Leap 15.4:kernel-devel-rt-5.14.21-150400.15.5.1.noarch",
          "openSUSE Leap 15.4:kernel-rt-5.14.21-150400.15.5.1.x86_64",
          "openSUSE Leap 15.4:kernel-rt-devel-5.14.21-150400.15.5.1.x86_64",
          "openSUSE Leap 15.4:kernel-rt_debug-5.14.21-150400.15.5.1.x86_64",
          "openSUSE Leap 15.4:kernel-rt_debug-devel-5.14.21-150400.15.5.1.x86_64",
          "openSUSE Leap 15.4:kernel-source-rt-5.14.21-150400.15.5.1.noarch",
          "openSUSE Leap 15.4:kernel-syms-rt-5.14.21-150400.15.5.1.x86_64",
          "openSUSE Leap 15.4:ocfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2022-3566",
          "url": "https://www.suse.com/security/cve/CVE-2022-3566"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1204405 for CVE-2022-3566",
          "url": "https://bugzilla.suse.com/1204405"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_15_5-rt-1-150400.1.3.1.x86_64",
            "SUSE Real Time Module 15 SP4:cluster-md-kmp-rt-5.14.21-150400.15.5.1.x86_64",
            "SUSE Real Time Module 15 SP4:dlm-kmp-rt-5.14.21-150400.15.5.1.x86_64",
            "SUSE Real Time Module 15 SP4:gfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64",
            "SUSE Real Time Module 15 SP4:kernel-devel-rt-5.14.21-150400.15.5.1.noarch",
            "SUSE Real Time Module 15 SP4:kernel-rt-5.14.21-150400.15.5.1.x86_64",
            "SUSE Real Time Module 15 SP4:kernel-rt-devel-5.14.21-150400.15.5.1.x86_64",
            "SUSE Real Time Module 15 SP4:kernel-rt_debug-5.14.21-150400.15.5.1.x86_64",
            "SUSE Real Time Module 15 SP4:kernel-rt_debug-devel-5.14.21-150400.15.5.1.x86_64",
            "SUSE Real Time Module 15 SP4:kernel-source-rt-5.14.21-150400.15.5.1.noarch",
            "SUSE Real Time Module 15 SP4:kernel-syms-rt-5.14.21-150400.15.5.1.x86_64",
            "SUSE Real Time Module 15 SP4:ocfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64",
            "openSUSE Leap 15.4:cluster-md-kmp-rt-5.14.21-150400.15.5.1.x86_64",
            "openSUSE Leap 15.4:dlm-kmp-rt-5.14.21-150400.15.5.1.x86_64",
            "openSUSE Leap 15.4:gfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64",
            "openSUSE Leap 15.4:kernel-devel-rt-5.14.21-150400.15.5.1.noarch",
            "openSUSE Leap 15.4:kernel-rt-5.14.21-150400.15.5.1.x86_64",
            "openSUSE Leap 15.4:kernel-rt-devel-5.14.21-150400.15.5.1.x86_64",
            "openSUSE Leap 15.4:kernel-rt_debug-5.14.21-150400.15.5.1.x86_64",
            "openSUSE Leap 15.4:kernel-rt_debug-devel-5.14.21-150400.15.5.1.x86_64",
            "openSUSE Leap 15.4:kernel-source-rt-5.14.21-150400.15.5.1.noarch",
            "openSUSE Leap 15.4:kernel-syms-rt-5.14.21-150400.15.5.1.x86_64",
            "openSUSE Leap 15.4:ocfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 4.7,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H",
            "version": "3.1"
          },
          "products": [
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_15_5-rt-1-150400.1.3.1.x86_64",
            "SUSE Real Time Module 15 SP4:cluster-md-kmp-rt-5.14.21-150400.15.5.1.x86_64",
            "SUSE Real Time Module 15 SP4:dlm-kmp-rt-5.14.21-150400.15.5.1.x86_64",
            "SUSE Real Time Module 15 SP4:gfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64",
            "SUSE Real Time Module 15 SP4:kernel-devel-rt-5.14.21-150400.15.5.1.noarch",
            "SUSE Real Time Module 15 SP4:kernel-rt-5.14.21-150400.15.5.1.x86_64",
            "SUSE Real Time Module 15 SP4:kernel-rt-devel-5.14.21-150400.15.5.1.x86_64",
            "SUSE Real Time Module 15 SP4:kernel-rt_debug-5.14.21-150400.15.5.1.x86_64",
            "SUSE Real Time Module 15 SP4:kernel-rt_debug-devel-5.14.21-150400.15.5.1.x86_64",
            "SUSE Real Time Module 15 SP4:kernel-source-rt-5.14.21-150400.15.5.1.noarch",
            "SUSE Real Time Module 15 SP4:kernel-syms-rt-5.14.21-150400.15.5.1.x86_64",
            "SUSE Real Time Module 15 SP4:ocfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64",
            "openSUSE Leap 15.4:cluster-md-kmp-rt-5.14.21-150400.15.5.1.x86_64",
            "openSUSE Leap 15.4:dlm-kmp-rt-5.14.21-150400.15.5.1.x86_64",
            "openSUSE Leap 15.4:gfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64",
            "openSUSE Leap 15.4:kernel-devel-rt-5.14.21-150400.15.5.1.noarch",
            "openSUSE Leap 15.4:kernel-rt-5.14.21-150400.15.5.1.x86_64",
            "openSUSE Leap 15.4:kernel-rt-devel-5.14.21-150400.15.5.1.x86_64",
            "openSUSE Leap 15.4:kernel-rt_debug-5.14.21-150400.15.5.1.x86_64",
            "openSUSE Leap 15.4:kernel-rt_debug-devel-5.14.21-150400.15.5.1.x86_64",
            "openSUSE Leap 15.4:kernel-source-rt-5.14.21-150400.15.5.1.noarch",
            "openSUSE Leap 15.4:kernel-syms-rt-5.14.21-150400.15.5.1.x86_64",
            "openSUSE Leap 15.4:ocfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2022-12-23T10:39:17Z",
          "details": "moderate"
        }
      ],
      "title": "CVE-2022-3566"
    },
    {
      "cve": "CVE-2022-3567",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2022-3567"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "A vulnerability has been found in Linux Kernel and classified as problematic. This vulnerability affects the function inet6_stream_ops/inet6_dgram_ops of the component IPv6 Handler. The manipulation leads to race condition. It is recommended to apply a patch to fix this issue. VDB-211090 is the identifier assigned to this vulnerability.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_15_5-rt-1-150400.1.3.1.x86_64",
          "SUSE Real Time Module 15 SP4:cluster-md-kmp-rt-5.14.21-150400.15.5.1.x86_64",
          "SUSE Real Time Module 15 SP4:dlm-kmp-rt-5.14.21-150400.15.5.1.x86_64",
          "SUSE Real Time Module 15 SP4:gfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64",
          "SUSE Real Time Module 15 SP4:kernel-devel-rt-5.14.21-150400.15.5.1.noarch",
          "SUSE Real Time Module 15 SP4:kernel-rt-5.14.21-150400.15.5.1.x86_64",
          "SUSE Real Time Module 15 SP4:kernel-rt-devel-5.14.21-150400.15.5.1.x86_64",
          "SUSE Real Time Module 15 SP4:kernel-rt_debug-5.14.21-150400.15.5.1.x86_64",
          "SUSE Real Time Module 15 SP4:kernel-rt_debug-devel-5.14.21-150400.15.5.1.x86_64",
          "SUSE Real Time Module 15 SP4:kernel-source-rt-5.14.21-150400.15.5.1.noarch",
          "SUSE Real Time Module 15 SP4:kernel-syms-rt-5.14.21-150400.15.5.1.x86_64",
          "SUSE Real Time Module 15 SP4:ocfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64",
          "openSUSE Leap 15.4:cluster-md-kmp-rt-5.14.21-150400.15.5.1.x86_64",
          "openSUSE Leap 15.4:dlm-kmp-rt-5.14.21-150400.15.5.1.x86_64",
          "openSUSE Leap 15.4:gfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64",
          "openSUSE Leap 15.4:kernel-devel-rt-5.14.21-150400.15.5.1.noarch",
          "openSUSE Leap 15.4:kernel-rt-5.14.21-150400.15.5.1.x86_64",
          "openSUSE Leap 15.4:kernel-rt-devel-5.14.21-150400.15.5.1.x86_64",
          "openSUSE Leap 15.4:kernel-rt_debug-5.14.21-150400.15.5.1.x86_64",
          "openSUSE Leap 15.4:kernel-rt_debug-devel-5.14.21-150400.15.5.1.x86_64",
          "openSUSE Leap 15.4:kernel-source-rt-5.14.21-150400.15.5.1.noarch",
          "openSUSE Leap 15.4:kernel-syms-rt-5.14.21-150400.15.5.1.x86_64",
          "openSUSE Leap 15.4:ocfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2022-3567",
          "url": "https://www.suse.com/security/cve/CVE-2022-3567"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1204414 for CVE-2022-3567",
          "url": "https://bugzilla.suse.com/1204414"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_15_5-rt-1-150400.1.3.1.x86_64",
            "SUSE Real Time Module 15 SP4:cluster-md-kmp-rt-5.14.21-150400.15.5.1.x86_64",
            "SUSE Real Time Module 15 SP4:dlm-kmp-rt-5.14.21-150400.15.5.1.x86_64",
            "SUSE Real Time Module 15 SP4:gfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64",
            "SUSE Real Time Module 15 SP4:kernel-devel-rt-5.14.21-150400.15.5.1.noarch",
            "SUSE Real Time Module 15 SP4:kernel-rt-5.14.21-150400.15.5.1.x86_64",
            "SUSE Real Time Module 15 SP4:kernel-rt-devel-5.14.21-150400.15.5.1.x86_64",
            "SUSE Real Time Module 15 SP4:kernel-rt_debug-5.14.21-150400.15.5.1.x86_64",
            "SUSE Real Time Module 15 SP4:kernel-rt_debug-devel-5.14.21-150400.15.5.1.x86_64",
            "SUSE Real Time Module 15 SP4:kernel-source-rt-5.14.21-150400.15.5.1.noarch",
            "SUSE Real Time Module 15 SP4:kernel-syms-rt-5.14.21-150400.15.5.1.x86_64",
            "SUSE Real Time Module 15 SP4:ocfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64",
            "openSUSE Leap 15.4:cluster-md-kmp-rt-5.14.21-150400.15.5.1.x86_64",
            "openSUSE Leap 15.4:dlm-kmp-rt-5.14.21-150400.15.5.1.x86_64",
            "openSUSE Leap 15.4:gfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64",
            "openSUSE Leap 15.4:kernel-devel-rt-5.14.21-150400.15.5.1.noarch",
            "openSUSE Leap 15.4:kernel-rt-5.14.21-150400.15.5.1.x86_64",
            "openSUSE Leap 15.4:kernel-rt-devel-5.14.21-150400.15.5.1.x86_64",
            "openSUSE Leap 15.4:kernel-rt_debug-5.14.21-150400.15.5.1.x86_64",
            "openSUSE Leap 15.4:kernel-rt_debug-devel-5.14.21-150400.15.5.1.x86_64",
            "openSUSE Leap 15.4:kernel-source-rt-5.14.21-150400.15.5.1.noarch",
            "openSUSE Leap 15.4:kernel-syms-rt-5.14.21-150400.15.5.1.x86_64",
            "openSUSE Leap 15.4:ocfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 5.3,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H",
            "version": "3.1"
          },
          "products": [
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_15_5-rt-1-150400.1.3.1.x86_64",
            "SUSE Real Time Module 15 SP4:cluster-md-kmp-rt-5.14.21-150400.15.5.1.x86_64",
            "SUSE Real Time Module 15 SP4:dlm-kmp-rt-5.14.21-150400.15.5.1.x86_64",
            "SUSE Real Time Module 15 SP4:gfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64",
            "SUSE Real Time Module 15 SP4:kernel-devel-rt-5.14.21-150400.15.5.1.noarch",
            "SUSE Real Time Module 15 SP4:kernel-rt-5.14.21-150400.15.5.1.x86_64",
            "SUSE Real Time Module 15 SP4:kernel-rt-devel-5.14.21-150400.15.5.1.x86_64",
            "SUSE Real Time Module 15 SP4:kernel-rt_debug-5.14.21-150400.15.5.1.x86_64",
            "SUSE Real Time Module 15 SP4:kernel-rt_debug-devel-5.14.21-150400.15.5.1.x86_64",
            "SUSE Real Time Module 15 SP4:kernel-source-rt-5.14.21-150400.15.5.1.noarch",
            "SUSE Real Time Module 15 SP4:kernel-syms-rt-5.14.21-150400.15.5.1.x86_64",
            "SUSE Real Time Module 15 SP4:ocfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64",
            "openSUSE Leap 15.4:cluster-md-kmp-rt-5.14.21-150400.15.5.1.x86_64",
            "openSUSE Leap 15.4:dlm-kmp-rt-5.14.21-150400.15.5.1.x86_64",
            "openSUSE Leap 15.4:gfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64",
            "openSUSE Leap 15.4:kernel-devel-rt-5.14.21-150400.15.5.1.noarch",
            "openSUSE Leap 15.4:kernel-rt-5.14.21-150400.15.5.1.x86_64",
            "openSUSE Leap 15.4:kernel-rt-devel-5.14.21-150400.15.5.1.x86_64",
            "openSUSE Leap 15.4:kernel-rt_debug-5.14.21-150400.15.5.1.x86_64",
            "openSUSE Leap 15.4:kernel-rt_debug-devel-5.14.21-150400.15.5.1.x86_64",
            "openSUSE Leap 15.4:kernel-source-rt-5.14.21-150400.15.5.1.noarch",
            "openSUSE Leap 15.4:kernel-syms-rt-5.14.21-150400.15.5.1.x86_64",
            "openSUSE Leap 15.4:ocfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2022-12-23T10:39:17Z",
          "details": "moderate"
        }
      ],
      "title": "CVE-2022-3567"
    },
    {
      "cve": "CVE-2022-3577",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2022-3577"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "An out-of-bounds memory write flaw was found in the Linux kernel\u0027s Kid-friendly Wired Controller driver. This flaw allows a local user to crash or potentially escalate their privileges on the system. It is in bigben_probe of drivers/hid/hid-bigbenff.c. The reason is incorrect assumption - bigben devices all have inputs. However, malicious devices can break this assumption, leaking to out-of-bound write.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_15_5-rt-1-150400.1.3.1.x86_64",
          "SUSE Real Time Module 15 SP4:cluster-md-kmp-rt-5.14.21-150400.15.5.1.x86_64",
          "SUSE Real Time Module 15 SP4:dlm-kmp-rt-5.14.21-150400.15.5.1.x86_64",
          "SUSE Real Time Module 15 SP4:gfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64",
          "SUSE Real Time Module 15 SP4:kernel-devel-rt-5.14.21-150400.15.5.1.noarch",
          "SUSE Real Time Module 15 SP4:kernel-rt-5.14.21-150400.15.5.1.x86_64",
          "SUSE Real Time Module 15 SP4:kernel-rt-devel-5.14.21-150400.15.5.1.x86_64",
          "SUSE Real Time Module 15 SP4:kernel-rt_debug-5.14.21-150400.15.5.1.x86_64",
          "SUSE Real Time Module 15 SP4:kernel-rt_debug-devel-5.14.21-150400.15.5.1.x86_64",
          "SUSE Real Time Module 15 SP4:kernel-source-rt-5.14.21-150400.15.5.1.noarch",
          "SUSE Real Time Module 15 SP4:kernel-syms-rt-5.14.21-150400.15.5.1.x86_64",
          "SUSE Real Time Module 15 SP4:ocfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64",
          "openSUSE Leap 15.4:cluster-md-kmp-rt-5.14.21-150400.15.5.1.x86_64",
          "openSUSE Leap 15.4:dlm-kmp-rt-5.14.21-150400.15.5.1.x86_64",
          "openSUSE Leap 15.4:gfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64",
          "openSUSE Leap 15.4:kernel-devel-rt-5.14.21-150400.15.5.1.noarch",
          "openSUSE Leap 15.4:kernel-rt-5.14.21-150400.15.5.1.x86_64",
          "openSUSE Leap 15.4:kernel-rt-devel-5.14.21-150400.15.5.1.x86_64",
          "openSUSE Leap 15.4:kernel-rt_debug-5.14.21-150400.15.5.1.x86_64",
          "openSUSE Leap 15.4:kernel-rt_debug-devel-5.14.21-150400.15.5.1.x86_64",
          "openSUSE Leap 15.4:kernel-source-rt-5.14.21-150400.15.5.1.noarch",
          "openSUSE Leap 15.4:kernel-syms-rt-5.14.21-150400.15.5.1.x86_64",
          "openSUSE Leap 15.4:ocfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2022-3577",
          "url": "https://www.suse.com/security/cve/CVE-2022-3577"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1204470 for CVE-2022-3577",
          "url": "https://bugzilla.suse.com/1204470"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1204486 for CVE-2022-3577",
          "url": "https://bugzilla.suse.com/1204486"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_15_5-rt-1-150400.1.3.1.x86_64",
            "SUSE Real Time Module 15 SP4:cluster-md-kmp-rt-5.14.21-150400.15.5.1.x86_64",
            "SUSE Real Time Module 15 SP4:dlm-kmp-rt-5.14.21-150400.15.5.1.x86_64",
            "SUSE Real Time Module 15 SP4:gfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64",
            "SUSE Real Time Module 15 SP4:kernel-devel-rt-5.14.21-150400.15.5.1.noarch",
            "SUSE Real Time Module 15 SP4:kernel-rt-5.14.21-150400.15.5.1.x86_64",
            "SUSE Real Time Module 15 SP4:kernel-rt-devel-5.14.21-150400.15.5.1.x86_64",
            "SUSE Real Time Module 15 SP4:kernel-rt_debug-5.14.21-150400.15.5.1.x86_64",
            "SUSE Real Time Module 15 SP4:kernel-rt_debug-devel-5.14.21-150400.15.5.1.x86_64",
            "SUSE Real Time Module 15 SP4:kernel-source-rt-5.14.21-150400.15.5.1.noarch",
            "SUSE Real Time Module 15 SP4:kernel-syms-rt-5.14.21-150400.15.5.1.x86_64",
            "SUSE Real Time Module 15 SP4:ocfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64",
            "openSUSE Leap 15.4:cluster-md-kmp-rt-5.14.21-150400.15.5.1.x86_64",
            "openSUSE Leap 15.4:dlm-kmp-rt-5.14.21-150400.15.5.1.x86_64",
            "openSUSE Leap 15.4:gfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64",
            "openSUSE Leap 15.4:kernel-devel-rt-5.14.21-150400.15.5.1.noarch",
            "openSUSE Leap 15.4:kernel-rt-5.14.21-150400.15.5.1.x86_64",
            "openSUSE Leap 15.4:kernel-rt-devel-5.14.21-150400.15.5.1.x86_64",
            "openSUSE Leap 15.4:kernel-rt_debug-5.14.21-150400.15.5.1.x86_64",
            "openSUSE Leap 15.4:kernel-rt_debug-devel-5.14.21-150400.15.5.1.x86_64",
            "openSUSE Leap 15.4:kernel-source-rt-5.14.21-150400.15.5.1.noarch",
            "openSUSE Leap 15.4:kernel-syms-rt-5.14.21-150400.15.5.1.x86_64",
            "openSUSE Leap 15.4:ocfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 7,
            "baseSeverity": "HIGH",
            "vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H",
            "version": "3.1"
          },
          "products": [
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_15_5-rt-1-150400.1.3.1.x86_64",
            "SUSE Real Time Module 15 SP4:cluster-md-kmp-rt-5.14.21-150400.15.5.1.x86_64",
            "SUSE Real Time Module 15 SP4:dlm-kmp-rt-5.14.21-150400.15.5.1.x86_64",
            "SUSE Real Time Module 15 SP4:gfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64",
            "SUSE Real Time Module 15 SP4:kernel-devel-rt-5.14.21-150400.15.5.1.noarch",
            "SUSE Real Time Module 15 SP4:kernel-rt-5.14.21-150400.15.5.1.x86_64",
            "SUSE Real Time Module 15 SP4:kernel-rt-devel-5.14.21-150400.15.5.1.x86_64",
            "SUSE Real Time Module 15 SP4:kernel-rt_debug-5.14.21-150400.15.5.1.x86_64",
            "SUSE Real Time Module 15 SP4:kernel-rt_debug-devel-5.14.21-150400.15.5.1.x86_64",
            "SUSE Real Time Module 15 SP4:kernel-source-rt-5.14.21-150400.15.5.1.noarch",
            "SUSE Real Time Module 15 SP4:kernel-syms-rt-5.14.21-150400.15.5.1.x86_64",
            "SUSE Real Time Module 15 SP4:ocfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64",
            "openSUSE Leap 15.4:cluster-md-kmp-rt-5.14.21-150400.15.5.1.x86_64",
            "openSUSE Leap 15.4:dlm-kmp-rt-5.14.21-150400.15.5.1.x86_64",
            "openSUSE Leap 15.4:gfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64",
            "openSUSE Leap 15.4:kernel-devel-rt-5.14.21-150400.15.5.1.noarch",
            "openSUSE Leap 15.4:kernel-rt-5.14.21-150400.15.5.1.x86_64",
            "openSUSE Leap 15.4:kernel-rt-devel-5.14.21-150400.15.5.1.x86_64",
            "openSUSE Leap 15.4:kernel-rt_debug-5.14.21-150400.15.5.1.x86_64",
            "openSUSE Leap 15.4:kernel-rt_debug-devel-5.14.21-150400.15.5.1.x86_64",
            "openSUSE Leap 15.4:kernel-source-rt-5.14.21-150400.15.5.1.noarch",
            "openSUSE Leap 15.4:kernel-syms-rt-5.14.21-150400.15.5.1.x86_64",
            "openSUSE Leap 15.4:ocfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2022-12-23T10:39:17Z",
          "details": "moderate"
        }
      ],
      "title": "CVE-2022-3577"
    },
    {
      "cve": "CVE-2022-3586",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2022-3586"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "A flaw was found in the Linux kernel\u0027s networking code. A use-after-free was found in the way the sch_sfb enqueue function used the socket buffer (SKB) cb field after the same SKB had been enqueued (and freed) into a child qdisc. This flaw allows a local, unprivileged user to crash the system, causing a denial of service.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_15_5-rt-1-150400.1.3.1.x86_64",
          "SUSE Real Time Module 15 SP4:cluster-md-kmp-rt-5.14.21-150400.15.5.1.x86_64",
          "SUSE Real Time Module 15 SP4:dlm-kmp-rt-5.14.21-150400.15.5.1.x86_64",
          "SUSE Real Time Module 15 SP4:gfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64",
          "SUSE Real Time Module 15 SP4:kernel-devel-rt-5.14.21-150400.15.5.1.noarch",
          "SUSE Real Time Module 15 SP4:kernel-rt-5.14.21-150400.15.5.1.x86_64",
          "SUSE Real Time Module 15 SP4:kernel-rt-devel-5.14.21-150400.15.5.1.x86_64",
          "SUSE Real Time Module 15 SP4:kernel-rt_debug-5.14.21-150400.15.5.1.x86_64",
          "SUSE Real Time Module 15 SP4:kernel-rt_debug-devel-5.14.21-150400.15.5.1.x86_64",
          "SUSE Real Time Module 15 SP4:kernel-source-rt-5.14.21-150400.15.5.1.noarch",
          "SUSE Real Time Module 15 SP4:kernel-syms-rt-5.14.21-150400.15.5.1.x86_64",
          "SUSE Real Time Module 15 SP4:ocfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64",
          "openSUSE Leap 15.4:cluster-md-kmp-rt-5.14.21-150400.15.5.1.x86_64",
          "openSUSE Leap 15.4:dlm-kmp-rt-5.14.21-150400.15.5.1.x86_64",
          "openSUSE Leap 15.4:gfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64",
          "openSUSE Leap 15.4:kernel-devel-rt-5.14.21-150400.15.5.1.noarch",
          "openSUSE Leap 15.4:kernel-rt-5.14.21-150400.15.5.1.x86_64",
          "openSUSE Leap 15.4:kernel-rt-devel-5.14.21-150400.15.5.1.x86_64",
          "openSUSE Leap 15.4:kernel-rt_debug-5.14.21-150400.15.5.1.x86_64",
          "openSUSE Leap 15.4:kernel-rt_debug-devel-5.14.21-150400.15.5.1.x86_64",
          "openSUSE Leap 15.4:kernel-source-rt-5.14.21-150400.15.5.1.noarch",
          "openSUSE Leap 15.4:kernel-syms-rt-5.14.21-150400.15.5.1.x86_64",
          "openSUSE Leap 15.4:ocfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2022-3586",
          "url": "https://www.suse.com/security/cve/CVE-2022-3586"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1204439 for CVE-2022-3586",
          "url": "https://bugzilla.suse.com/1204439"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1204576 for CVE-2022-3586",
          "url": "https://bugzilla.suse.com/1204576"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1208044 for CVE-2022-3586",
          "url": "https://bugzilla.suse.com/1208044"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1209225 for CVE-2022-3586",
          "url": "https://bugzilla.suse.com/1209225"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1212294 for CVE-2022-3586",
          "url": "https://bugzilla.suse.com/1212294"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_15_5-rt-1-150400.1.3.1.x86_64",
            "SUSE Real Time Module 15 SP4:cluster-md-kmp-rt-5.14.21-150400.15.5.1.x86_64",
            "SUSE Real Time Module 15 SP4:dlm-kmp-rt-5.14.21-150400.15.5.1.x86_64",
            "SUSE Real Time Module 15 SP4:gfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64",
            "SUSE Real Time Module 15 SP4:kernel-devel-rt-5.14.21-150400.15.5.1.noarch",
            "SUSE Real Time Module 15 SP4:kernel-rt-5.14.21-150400.15.5.1.x86_64",
            "SUSE Real Time Module 15 SP4:kernel-rt-devel-5.14.21-150400.15.5.1.x86_64",
            "SUSE Real Time Module 15 SP4:kernel-rt_debug-5.14.21-150400.15.5.1.x86_64",
            "SUSE Real Time Module 15 SP4:kernel-rt_debug-devel-5.14.21-150400.15.5.1.x86_64",
            "SUSE Real Time Module 15 SP4:kernel-source-rt-5.14.21-150400.15.5.1.noarch",
            "SUSE Real Time Module 15 SP4:kernel-syms-rt-5.14.21-150400.15.5.1.x86_64",
            "SUSE Real Time Module 15 SP4:ocfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64",
            "openSUSE Leap 15.4:cluster-md-kmp-rt-5.14.21-150400.15.5.1.x86_64",
            "openSUSE Leap 15.4:dlm-kmp-rt-5.14.21-150400.15.5.1.x86_64",
            "openSUSE Leap 15.4:gfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64",
            "openSUSE Leap 15.4:kernel-devel-rt-5.14.21-150400.15.5.1.noarch",
            "openSUSE Leap 15.4:kernel-rt-5.14.21-150400.15.5.1.x86_64",
            "openSUSE Leap 15.4:kernel-rt-devel-5.14.21-150400.15.5.1.x86_64",
            "openSUSE Leap 15.4:kernel-rt_debug-5.14.21-150400.15.5.1.x86_64",
            "openSUSE Leap 15.4:kernel-rt_debug-devel-5.14.21-150400.15.5.1.x86_64",
            "openSUSE Leap 15.4:kernel-source-rt-5.14.21-150400.15.5.1.noarch",
            "openSUSE Leap 15.4:kernel-syms-rt-5.14.21-150400.15.5.1.x86_64",
            "openSUSE Leap 15.4:ocfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 7,
            "baseSeverity": "HIGH",
            "vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H",
            "version": "3.1"
          },
          "products": [
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_15_5-rt-1-150400.1.3.1.x86_64",
            "SUSE Real Time Module 15 SP4:cluster-md-kmp-rt-5.14.21-150400.15.5.1.x86_64",
            "SUSE Real Time Module 15 SP4:dlm-kmp-rt-5.14.21-150400.15.5.1.x86_64",
            "SUSE Real Time Module 15 SP4:gfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64",
            "SUSE Real Time Module 15 SP4:kernel-devel-rt-5.14.21-150400.15.5.1.noarch",
            "SUSE Real Time Module 15 SP4:kernel-rt-5.14.21-150400.15.5.1.x86_64",
            "SUSE Real Time Module 15 SP4:kernel-rt-devel-5.14.21-150400.15.5.1.x86_64",
            "SUSE Real Time Module 15 SP4:kernel-rt_debug-5.14.21-150400.15.5.1.x86_64",
            "SUSE Real Time Module 15 SP4:kernel-rt_debug-devel-5.14.21-150400.15.5.1.x86_64",
            "SUSE Real Time Module 15 SP4:kernel-source-rt-5.14.21-150400.15.5.1.noarch",
            "SUSE Real Time Module 15 SP4:kernel-syms-rt-5.14.21-150400.15.5.1.x86_64",
            "SUSE Real Time Module 15 SP4:ocfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64",
            "openSUSE Leap 15.4:cluster-md-kmp-rt-5.14.21-150400.15.5.1.x86_64",
            "openSUSE Leap 15.4:dlm-kmp-rt-5.14.21-150400.15.5.1.x86_64",
            "openSUSE Leap 15.4:gfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64",
            "openSUSE Leap 15.4:kernel-devel-rt-5.14.21-150400.15.5.1.noarch",
            "openSUSE Leap 15.4:kernel-rt-5.14.21-150400.15.5.1.x86_64",
            "openSUSE Leap 15.4:kernel-rt-devel-5.14.21-150400.15.5.1.x86_64",
            "openSUSE Leap 15.4:kernel-rt_debug-5.14.21-150400.15.5.1.x86_64",
            "openSUSE Leap 15.4:kernel-rt_debug-devel-5.14.21-150400.15.5.1.x86_64",
            "openSUSE Leap 15.4:kernel-source-rt-5.14.21-150400.15.5.1.noarch",
            "openSUSE Leap 15.4:kernel-syms-rt-5.14.21-150400.15.5.1.x86_64",
            "openSUSE Leap 15.4:ocfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2022-12-23T10:39:17Z",
          "details": "moderate"
        }
      ],
      "title": "CVE-2022-3586"
    },
    {
      "cve": "CVE-2022-3594",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2022-3594"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "A vulnerability was found in Linux Kernel. It has been declared as problematic. Affected by this vulnerability is the function intr_callback of the file drivers/net/usb/r8152.c of the component BPF. The manipulation leads to logging of excessive data. The attack can be launched remotely. It is recommended to apply a patch to fix this issue. The associated identifier of this vulnerability is VDB-211363.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_15_5-rt-1-150400.1.3.1.x86_64",
          "SUSE Real Time Module 15 SP4:cluster-md-kmp-rt-5.14.21-150400.15.5.1.x86_64",
          "SUSE Real Time Module 15 SP4:dlm-kmp-rt-5.14.21-150400.15.5.1.x86_64",
          "SUSE Real Time Module 15 SP4:gfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64",
          "SUSE Real Time Module 15 SP4:kernel-devel-rt-5.14.21-150400.15.5.1.noarch",
          "SUSE Real Time Module 15 SP4:kernel-rt-5.14.21-150400.15.5.1.x86_64",
          "SUSE Real Time Module 15 SP4:kernel-rt-devel-5.14.21-150400.15.5.1.x86_64",
          "SUSE Real Time Module 15 SP4:kernel-rt_debug-5.14.21-150400.15.5.1.x86_64",
          "SUSE Real Time Module 15 SP4:kernel-rt_debug-devel-5.14.21-150400.15.5.1.x86_64",
          "SUSE Real Time Module 15 SP4:kernel-source-rt-5.14.21-150400.15.5.1.noarch",
          "SUSE Real Time Module 15 SP4:kernel-syms-rt-5.14.21-150400.15.5.1.x86_64",
          "SUSE Real Time Module 15 SP4:ocfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64",
          "openSUSE Leap 15.4:cluster-md-kmp-rt-5.14.21-150400.15.5.1.x86_64",
          "openSUSE Leap 15.4:dlm-kmp-rt-5.14.21-150400.15.5.1.x86_64",
          "openSUSE Leap 15.4:gfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64",
          "openSUSE Leap 15.4:kernel-devel-rt-5.14.21-150400.15.5.1.noarch",
          "openSUSE Leap 15.4:kernel-rt-5.14.21-150400.15.5.1.x86_64",
          "openSUSE Leap 15.4:kernel-rt-devel-5.14.21-150400.15.5.1.x86_64",
          "openSUSE Leap 15.4:kernel-rt_debug-5.14.21-150400.15.5.1.x86_64",
          "openSUSE Leap 15.4:kernel-rt_debug-devel-5.14.21-150400.15.5.1.x86_64",
          "openSUSE Leap 15.4:kernel-source-rt-5.14.21-150400.15.5.1.noarch",
          "openSUSE Leap 15.4:kernel-syms-rt-5.14.21-150400.15.5.1.x86_64",
          "openSUSE Leap 15.4:ocfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2022-3594",
          "url": "https://www.suse.com/security/cve/CVE-2022-3594"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1204479 for CVE-2022-3594",
          "url": "https://bugzilla.suse.com/1204479"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1217458 for CVE-2022-3594",
          "url": "https://bugzilla.suse.com/1217458"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_15_5-rt-1-150400.1.3.1.x86_64",
            "SUSE Real Time Module 15 SP4:cluster-md-kmp-rt-5.14.21-150400.15.5.1.x86_64",
            "SUSE Real Time Module 15 SP4:dlm-kmp-rt-5.14.21-150400.15.5.1.x86_64",
            "SUSE Real Time Module 15 SP4:gfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64",
            "SUSE Real Time Module 15 SP4:kernel-devel-rt-5.14.21-150400.15.5.1.noarch",
            "SUSE Real Time Module 15 SP4:kernel-rt-5.14.21-150400.15.5.1.x86_64",
            "SUSE Real Time Module 15 SP4:kernel-rt-devel-5.14.21-150400.15.5.1.x86_64",
            "SUSE Real Time Module 15 SP4:kernel-rt_debug-5.14.21-150400.15.5.1.x86_64",
            "SUSE Real Time Module 15 SP4:kernel-rt_debug-devel-5.14.21-150400.15.5.1.x86_64",
            "SUSE Real Time Module 15 SP4:kernel-source-rt-5.14.21-150400.15.5.1.noarch",
            "SUSE Real Time Module 15 SP4:kernel-syms-rt-5.14.21-150400.15.5.1.x86_64",
            "SUSE Real Time Module 15 SP4:ocfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64",
            "openSUSE Leap 15.4:cluster-md-kmp-rt-5.14.21-150400.15.5.1.x86_64",
            "openSUSE Leap 15.4:dlm-kmp-rt-5.14.21-150400.15.5.1.x86_64",
            "openSUSE Leap 15.4:gfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64",
            "openSUSE Leap 15.4:kernel-devel-rt-5.14.21-150400.15.5.1.noarch",
            "openSUSE Leap 15.4:kernel-rt-5.14.21-150400.15.5.1.x86_64",
            "openSUSE Leap 15.4:kernel-rt-devel-5.14.21-150400.15.5.1.x86_64",
            "openSUSE Leap 15.4:kernel-rt_debug-5.14.21-150400.15.5.1.x86_64",
            "openSUSE Leap 15.4:kernel-rt_debug-devel-5.14.21-150400.15.5.1.x86_64",
            "openSUSE Leap 15.4:kernel-source-rt-5.14.21-150400.15.5.1.noarch",
            "openSUSE Leap 15.4:kernel-syms-rt-5.14.21-150400.15.5.1.x86_64",
            "openSUSE Leap 15.4:ocfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 5.1,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H",
            "version": "3.1"
          },
          "products": [
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_15_5-rt-1-150400.1.3.1.x86_64",
            "SUSE Real Time Module 15 SP4:cluster-md-kmp-rt-5.14.21-150400.15.5.1.x86_64",
            "SUSE Real Time Module 15 SP4:dlm-kmp-rt-5.14.21-150400.15.5.1.x86_64",
            "SUSE Real Time Module 15 SP4:gfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64",
            "SUSE Real Time Module 15 SP4:kernel-devel-rt-5.14.21-150400.15.5.1.noarch",
            "SUSE Real Time Module 15 SP4:kernel-rt-5.14.21-150400.15.5.1.x86_64",
            "SUSE Real Time Module 15 SP4:kernel-rt-devel-5.14.21-150400.15.5.1.x86_64",
            "SUSE Real Time Module 15 SP4:kernel-rt_debug-5.14.21-150400.15.5.1.x86_64",
            "SUSE Real Time Module 15 SP4:kernel-rt_debug-devel-5.14.21-150400.15.5.1.x86_64",
            "SUSE Real Time Module 15 SP4:kernel-source-rt-5.14.21-150400.15.5.1.noarch",
            "SUSE Real Time Module 15 SP4:kernel-syms-rt-5.14.21-150400.15.5.1.x86_64",
            "SUSE Real Time Module 15 SP4:ocfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64",
            "openSUSE Leap 15.4:cluster-md-kmp-rt-5.14.21-150400.15.5.1.x86_64",
            "openSUSE Leap 15.4:dlm-kmp-rt-5.14.21-150400.15.5.1.x86_64",
            "openSUSE Leap 15.4:gfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64",
            "openSUSE Leap 15.4:kernel-devel-rt-5.14.21-150400.15.5.1.noarch",
            "openSUSE Leap 15.4:kernel-rt-5.14.21-150400.15.5.1.x86_64",
            "openSUSE Leap 15.4:kernel-rt-devel-5.14.21-150400.15.5.1.x86_64",
            "openSUSE Leap 15.4:kernel-rt_debug-5.14.21-150400.15.5.1.x86_64",
            "openSUSE Leap 15.4:kernel-rt_debug-devel-5.14.21-150400.15.5.1.x86_64",
            "openSUSE Leap 15.4:kernel-source-rt-5.14.21-150400.15.5.1.noarch",
            "openSUSE Leap 15.4:kernel-syms-rt-5.14.21-150400.15.5.1.x86_64",
            "openSUSE Leap 15.4:ocfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2022-12-23T10:39:17Z",
          "details": "moderate"
        }
      ],
      "title": "CVE-2022-3594"
    },
    {
      "cve": "CVE-2022-3619",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2022-3619"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "A vulnerability has been found in Linux Kernel and classified as problematic. This vulnerability affects the function l2cap_recv_acldata of the file net/bluetooth/l2cap_core.c of the component Bluetooth. The manipulation leads to memory leak. It is recommended to apply a patch to fix this issue. VDB-211918 is the identifier assigned to this vulnerability.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_15_5-rt-1-150400.1.3.1.x86_64",
          "SUSE Real Time Module 15 SP4:cluster-md-kmp-rt-5.14.21-150400.15.5.1.x86_64",
          "SUSE Real Time Module 15 SP4:dlm-kmp-rt-5.14.21-150400.15.5.1.x86_64",
          "SUSE Real Time Module 15 SP4:gfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64",
          "SUSE Real Time Module 15 SP4:kernel-devel-rt-5.14.21-150400.15.5.1.noarch",
          "SUSE Real Time Module 15 SP4:kernel-rt-5.14.21-150400.15.5.1.x86_64",
          "SUSE Real Time Module 15 SP4:kernel-rt-devel-5.14.21-150400.15.5.1.x86_64",
          "SUSE Real Time Module 15 SP4:kernel-rt_debug-5.14.21-150400.15.5.1.x86_64",
          "SUSE Real Time Module 15 SP4:kernel-rt_debug-devel-5.14.21-150400.15.5.1.x86_64",
          "SUSE Real Time Module 15 SP4:kernel-source-rt-5.14.21-150400.15.5.1.noarch",
          "SUSE Real Time Module 15 SP4:kernel-syms-rt-5.14.21-150400.15.5.1.x86_64",
          "SUSE Real Time Module 15 SP4:ocfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64",
          "openSUSE Leap 15.4:cluster-md-kmp-rt-5.14.21-150400.15.5.1.x86_64",
          "openSUSE Leap 15.4:dlm-kmp-rt-5.14.21-150400.15.5.1.x86_64",
          "openSUSE Leap 15.4:gfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64",
          "openSUSE Leap 15.4:kernel-devel-rt-5.14.21-150400.15.5.1.noarch",
          "openSUSE Leap 15.4:kernel-rt-5.14.21-150400.15.5.1.x86_64",
          "openSUSE Leap 15.4:kernel-rt-devel-5.14.21-150400.15.5.1.x86_64",
          "openSUSE Leap 15.4:kernel-rt_debug-5.14.21-150400.15.5.1.x86_64",
          "openSUSE Leap 15.4:kernel-rt_debug-devel-5.14.21-150400.15.5.1.x86_64",
          "openSUSE Leap 15.4:kernel-source-rt-5.14.21-150400.15.5.1.noarch",
          "openSUSE Leap 15.4:kernel-syms-rt-5.14.21-150400.15.5.1.x86_64",
          "openSUSE Leap 15.4:ocfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2022-3619",
          "url": "https://www.suse.com/security/cve/CVE-2022-3619"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1204569 for CVE-2022-3619",
          "url": "https://bugzilla.suse.com/1204569"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_15_5-rt-1-150400.1.3.1.x86_64",
            "SUSE Real Time Module 15 SP4:cluster-md-kmp-rt-5.14.21-150400.15.5.1.x86_64",
            "SUSE Real Time Module 15 SP4:dlm-kmp-rt-5.14.21-150400.15.5.1.x86_64",
            "SUSE Real Time Module 15 SP4:gfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64",
            "SUSE Real Time Module 15 SP4:kernel-devel-rt-5.14.21-150400.15.5.1.noarch",
            "SUSE Real Time Module 15 SP4:kernel-rt-5.14.21-150400.15.5.1.x86_64",
            "SUSE Real Time Module 15 SP4:kernel-rt-devel-5.14.21-150400.15.5.1.x86_64",
            "SUSE Real Time Module 15 SP4:kernel-rt_debug-5.14.21-150400.15.5.1.x86_64",
            "SUSE Real Time Module 15 SP4:kernel-rt_debug-devel-5.14.21-150400.15.5.1.x86_64",
            "SUSE Real Time Module 15 SP4:kernel-source-rt-5.14.21-150400.15.5.1.noarch",
            "SUSE Real Time Module 15 SP4:kernel-syms-rt-5.14.21-150400.15.5.1.x86_64",
            "SUSE Real Time Module 15 SP4:ocfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64",
            "openSUSE Leap 15.4:cluster-md-kmp-rt-5.14.21-150400.15.5.1.x86_64",
            "openSUSE Leap 15.4:dlm-kmp-rt-5.14.21-150400.15.5.1.x86_64",
            "openSUSE Leap 15.4:gfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64",
            "openSUSE Leap 15.4:kernel-devel-rt-5.14.21-150400.15.5.1.noarch",
            "openSUSE Leap 15.4:kernel-rt-5.14.21-150400.15.5.1.x86_64",
            "openSUSE Leap 15.4:kernel-rt-devel-5.14.21-150400.15.5.1.x86_64",
            "openSUSE Leap 15.4:kernel-rt_debug-5.14.21-150400.15.5.1.x86_64",
            "openSUSE Leap 15.4:kernel-rt_debug-devel-5.14.21-150400.15.5.1.x86_64",
            "openSUSE Leap 15.4:kernel-source-rt-5.14.21-150400.15.5.1.noarch",
            "openSUSE Leap 15.4:kernel-syms-rt-5.14.21-150400.15.5.1.x86_64",
            "openSUSE Leap 15.4:ocfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 5.3,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:A/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H",
            "version": "3.1"
          },
          "products": [
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_15_5-rt-1-150400.1.3.1.x86_64",
            "SUSE Real Time Module 15 SP4:cluster-md-kmp-rt-5.14.21-150400.15.5.1.x86_64",
            "SUSE Real Time Module 15 SP4:dlm-kmp-rt-5.14.21-150400.15.5.1.x86_64",
            "SUSE Real Time Module 15 SP4:gfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64",
            "SUSE Real Time Module 15 SP4:kernel-devel-rt-5.14.21-150400.15.5.1.noarch",
            "SUSE Real Time Module 15 SP4:kernel-rt-5.14.21-150400.15.5.1.x86_64",
            "SUSE Real Time Module 15 SP4:kernel-rt-devel-5.14.21-150400.15.5.1.x86_64",
            "SUSE Real Time Module 15 SP4:kernel-rt_debug-5.14.21-150400.15.5.1.x86_64",
            "SUSE Real Time Module 15 SP4:kernel-rt_debug-devel-5.14.21-150400.15.5.1.x86_64",
            "SUSE Real Time Module 15 SP4:kernel-source-rt-5.14.21-150400.15.5.1.noarch",
            "SUSE Real Time Module 15 SP4:kernel-syms-rt-5.14.21-150400.15.5.1.x86_64",
            "SUSE Real Time Module 15 SP4:ocfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64",
            "openSUSE Leap 15.4:cluster-md-kmp-rt-5.14.21-150400.15.5.1.x86_64",
            "openSUSE Leap 15.4:dlm-kmp-rt-5.14.21-150400.15.5.1.x86_64",
            "openSUSE Leap 15.4:gfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64",
            "openSUSE Leap 15.4:kernel-devel-rt-5.14.21-150400.15.5.1.noarch",
            "openSUSE Leap 15.4:kernel-rt-5.14.21-150400.15.5.1.x86_64",
            "openSUSE Leap 15.4:kernel-rt-devel-5.14.21-150400.15.5.1.x86_64",
            "openSUSE Leap 15.4:kernel-rt_debug-5.14.21-150400.15.5.1.x86_64",
            "openSUSE Leap 15.4:kernel-rt_debug-devel-5.14.21-150400.15.5.1.x86_64",
            "openSUSE Leap 15.4:kernel-source-rt-5.14.21-150400.15.5.1.noarch",
            "openSUSE Leap 15.4:kernel-syms-rt-5.14.21-150400.15.5.1.x86_64",
            "openSUSE Leap 15.4:ocfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2022-12-23T10:39:17Z",
          "details": "moderate"
        }
      ],
      "title": "CVE-2022-3619"
    },
    {
      "cve": "CVE-2022-3621",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2022-3621"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "A vulnerability was found in Linux Kernel. It has been classified as problematic. Affected is the function nilfs_bmap_lookup_at_level of the file fs/nilfs2/inode.c of the component nilfs2. The manipulation leads to null pointer dereference. It is possible to launch the attack remotely. It is recommended to apply a patch to fix this issue. The identifier of this vulnerability is VDB-211920.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_15_5-rt-1-150400.1.3.1.x86_64",
          "SUSE Real Time Module 15 SP4:cluster-md-kmp-rt-5.14.21-150400.15.5.1.x86_64",
          "SUSE Real Time Module 15 SP4:dlm-kmp-rt-5.14.21-150400.15.5.1.x86_64",
          "SUSE Real Time Module 15 SP4:gfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64",
          "SUSE Real Time Module 15 SP4:kernel-devel-rt-5.14.21-150400.15.5.1.noarch",
          "SUSE Real Time Module 15 SP4:kernel-rt-5.14.21-150400.15.5.1.x86_64",
          "SUSE Real Time Module 15 SP4:kernel-rt-devel-5.14.21-150400.15.5.1.x86_64",
          "SUSE Real Time Module 15 SP4:kernel-rt_debug-5.14.21-150400.15.5.1.x86_64",
          "SUSE Real Time Module 15 SP4:kernel-rt_debug-devel-5.14.21-150400.15.5.1.x86_64",
          "SUSE Real Time Module 15 SP4:kernel-source-rt-5.14.21-150400.15.5.1.noarch",
          "SUSE Real Time Module 15 SP4:kernel-syms-rt-5.14.21-150400.15.5.1.x86_64",
          "SUSE Real Time Module 15 SP4:ocfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64",
          "openSUSE Leap 15.4:cluster-md-kmp-rt-5.14.21-150400.15.5.1.x86_64",
          "openSUSE Leap 15.4:dlm-kmp-rt-5.14.21-150400.15.5.1.x86_64",
          "openSUSE Leap 15.4:gfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64",
          "openSUSE Leap 15.4:kernel-devel-rt-5.14.21-150400.15.5.1.noarch",
          "openSUSE Leap 15.4:kernel-rt-5.14.21-150400.15.5.1.x86_64",
          "openSUSE Leap 15.4:kernel-rt-devel-5.14.21-150400.15.5.1.x86_64",
          "openSUSE Leap 15.4:kernel-rt_debug-5.14.21-150400.15.5.1.x86_64",
          "openSUSE Leap 15.4:kernel-rt_debug-devel-5.14.21-150400.15.5.1.x86_64",
          "openSUSE Leap 15.4:kernel-source-rt-5.14.21-150400.15.5.1.noarch",
          "openSUSE Leap 15.4:kernel-syms-rt-5.14.21-150400.15.5.1.x86_64",
          "openSUSE Leap 15.4:ocfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2022-3621",
          "url": "https://www.suse.com/security/cve/CVE-2022-3621"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1204574 for CVE-2022-3621",
          "url": "https://bugzilla.suse.com/1204574"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1212295 for CVE-2022-3621",
          "url": "https://bugzilla.suse.com/1212295"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_15_5-rt-1-150400.1.3.1.x86_64",
            "SUSE Real Time Module 15 SP4:cluster-md-kmp-rt-5.14.21-150400.15.5.1.x86_64",
            "SUSE Real Time Module 15 SP4:dlm-kmp-rt-5.14.21-150400.15.5.1.x86_64",
            "SUSE Real Time Module 15 SP4:gfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64",
            "SUSE Real Time Module 15 SP4:kernel-devel-rt-5.14.21-150400.15.5.1.noarch",
            "SUSE Real Time Module 15 SP4:kernel-rt-5.14.21-150400.15.5.1.x86_64",
            "SUSE Real Time Module 15 SP4:kernel-rt-devel-5.14.21-150400.15.5.1.x86_64",
            "SUSE Real Time Module 15 SP4:kernel-rt_debug-5.14.21-150400.15.5.1.x86_64",
            "SUSE Real Time Module 15 SP4:kernel-rt_debug-devel-5.14.21-150400.15.5.1.x86_64",
            "SUSE Real Time Module 15 SP4:kernel-source-rt-5.14.21-150400.15.5.1.noarch",
            "SUSE Real Time Module 15 SP4:kernel-syms-rt-5.14.21-150400.15.5.1.x86_64",
            "SUSE Real Time Module 15 SP4:ocfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64",
            "openSUSE Leap 15.4:cluster-md-kmp-rt-5.14.21-150400.15.5.1.x86_64",
            "openSUSE Leap 15.4:dlm-kmp-rt-5.14.21-150400.15.5.1.x86_64",
            "openSUSE Leap 15.4:gfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64",
            "openSUSE Leap 15.4:kernel-devel-rt-5.14.21-150400.15.5.1.noarch",
            "openSUSE Leap 15.4:kernel-rt-5.14.21-150400.15.5.1.x86_64",
            "openSUSE Leap 15.4:kernel-rt-devel-5.14.21-150400.15.5.1.x86_64",
            "openSUSE Leap 15.4:kernel-rt_debug-5.14.21-150400.15.5.1.x86_64",
            "openSUSE Leap 15.4:kernel-rt_debug-devel-5.14.21-150400.15.5.1.x86_64",
            "openSUSE Leap 15.4:kernel-source-rt-5.14.21-150400.15.5.1.noarch",
            "openSUSE Leap 15.4:kernel-syms-rt-5.14.21-150400.15.5.1.x86_64",
            "openSUSE Leap 15.4:ocfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 4.3,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:P/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
            "version": "3.1"
          },
          "products": [
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_15_5-rt-1-150400.1.3.1.x86_64",
            "SUSE Real Time Module 15 SP4:cluster-md-kmp-rt-5.14.21-150400.15.5.1.x86_64",
            "SUSE Real Time Module 15 SP4:dlm-kmp-rt-5.14.21-150400.15.5.1.x86_64",
            "SUSE Real Time Module 15 SP4:gfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64",
            "SUSE Real Time Module 15 SP4:kernel-devel-rt-5.14.21-150400.15.5.1.noarch",
            "SUSE Real Time Module 15 SP4:kernel-rt-5.14.21-150400.15.5.1.x86_64",
            "SUSE Real Time Module 15 SP4:kernel-rt-devel-5.14.21-150400.15.5.1.x86_64",
            "SUSE Real Time Module 15 SP4:kernel-rt_debug-5.14.21-150400.15.5.1.x86_64",
            "SUSE Real Time Module 15 SP4:kernel-rt_debug-devel-5.14.21-150400.15.5.1.x86_64",
            "SUSE Real Time Module 15 SP4:kernel-source-rt-5.14.21-150400.15.5.1.noarch",
            "SUSE Real Time Module 15 SP4:kernel-syms-rt-5.14.21-150400.15.5.1.x86_64",
            "SUSE Real Time Module 15 SP4:ocfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64",
            "openSUSE Leap 15.4:cluster-md-kmp-rt-5.14.21-150400.15.5.1.x86_64",
            "openSUSE Leap 15.4:dlm-kmp-rt-5.14.21-150400.15.5.1.x86_64",
            "openSUSE Leap 15.4:gfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64",
            "openSUSE Leap 15.4:kernel-devel-rt-5.14.21-150400.15.5.1.noarch",
            "openSUSE Leap 15.4:kernel-rt-5.14.21-150400.15.5.1.x86_64",
            "openSUSE Leap 15.4:kernel-rt-devel-5.14.21-150400.15.5.1.x86_64",
            "openSUSE Leap 15.4:kernel-rt_debug-5.14.21-150400.15.5.1.x86_64",
            "openSUSE Leap 15.4:kernel-rt_debug-devel-5.14.21-150400.15.5.1.x86_64",
            "openSUSE Leap 15.4:kernel-source-rt-5.14.21-150400.15.5.1.noarch",
            "openSUSE Leap 15.4:kernel-syms-rt-5.14.21-150400.15.5.1.x86_64",
            "openSUSE Leap 15.4:ocfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2022-12-23T10:39:17Z",
          "details": "moderate"
        }
      ],
      "title": "CVE-2022-3621"
    },
    {
      "cve": "CVE-2022-3625",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2022-3625"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "A vulnerability was found in Linux Kernel. It has been classified as critical. This affects the function devlink_param_set/devlink_param_get of the file net/core/devlink.c of the component IPsec. The manipulation leads to use after free. It is recommended to apply a patch to fix this issue. The identifier VDB-211929 was assigned to this vulnerability.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_15_5-rt-1-150400.1.3.1.x86_64",
          "SUSE Real Time Module 15 SP4:cluster-md-kmp-rt-5.14.21-150400.15.5.1.x86_64",
          "SUSE Real Time Module 15 SP4:dlm-kmp-rt-5.14.21-150400.15.5.1.x86_64",
          "SUSE Real Time Module 15 SP4:gfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64",
          "SUSE Real Time Module 15 SP4:kernel-devel-rt-5.14.21-150400.15.5.1.noarch",
          "SUSE Real Time Module 15 SP4:kernel-rt-5.14.21-150400.15.5.1.x86_64",
          "SUSE Real Time Module 15 SP4:kernel-rt-devel-5.14.21-150400.15.5.1.x86_64",
          "SUSE Real Time Module 15 SP4:kernel-rt_debug-5.14.21-150400.15.5.1.x86_64",
          "SUSE Real Time Module 15 SP4:kernel-rt_debug-devel-5.14.21-150400.15.5.1.x86_64",
          "SUSE Real Time Module 15 SP4:kernel-source-rt-5.14.21-150400.15.5.1.noarch",
          "SUSE Real Time Module 15 SP4:kernel-syms-rt-5.14.21-150400.15.5.1.x86_64",
          "SUSE Real Time Module 15 SP4:ocfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64",
          "openSUSE Leap 15.4:cluster-md-kmp-rt-5.14.21-150400.15.5.1.x86_64",
          "openSUSE Leap 15.4:dlm-kmp-rt-5.14.21-150400.15.5.1.x86_64",
          "openSUSE Leap 15.4:gfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64",
          "openSUSE Leap 15.4:kernel-devel-rt-5.14.21-150400.15.5.1.noarch",
          "openSUSE Leap 15.4:kernel-rt-5.14.21-150400.15.5.1.x86_64",
          "openSUSE Leap 15.4:kernel-rt-devel-5.14.21-150400.15.5.1.x86_64",
          "openSUSE Leap 15.4:kernel-rt_debug-5.14.21-150400.15.5.1.x86_64",
          "openSUSE Leap 15.4:kernel-rt_debug-devel-5.14.21-150400.15.5.1.x86_64",
          "openSUSE Leap 15.4:kernel-source-rt-5.14.21-150400.15.5.1.noarch",
          "openSUSE Leap 15.4:kernel-syms-rt-5.14.21-150400.15.5.1.x86_64",
          "openSUSE Leap 15.4:ocfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2022-3625",
          "url": "https://www.suse.com/security/cve/CVE-2022-3625"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1204637 for CVE-2022-3625",
          "url": "https://bugzilla.suse.com/1204637"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_15_5-rt-1-150400.1.3.1.x86_64",
            "SUSE Real Time Module 15 SP4:cluster-md-kmp-rt-5.14.21-150400.15.5.1.x86_64",
            "SUSE Real Time Module 15 SP4:dlm-kmp-rt-5.14.21-150400.15.5.1.x86_64",
            "SUSE Real Time Module 15 SP4:gfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64",
            "SUSE Real Time Module 15 SP4:kernel-devel-rt-5.14.21-150400.15.5.1.noarch",
            "SUSE Real Time Module 15 SP4:kernel-rt-5.14.21-150400.15.5.1.x86_64",
            "SUSE Real Time Module 15 SP4:kernel-rt-devel-5.14.21-150400.15.5.1.x86_64",
            "SUSE Real Time Module 15 SP4:kernel-rt_debug-5.14.21-150400.15.5.1.x86_64",
            "SUSE Real Time Module 15 SP4:kernel-rt_debug-devel-5.14.21-150400.15.5.1.x86_64",
            "SUSE Real Time Module 15 SP4:kernel-source-rt-5.14.21-150400.15.5.1.noarch",
            "SUSE Real Time Module 15 SP4:kernel-syms-rt-5.14.21-150400.15.5.1.x86_64",
            "SUSE Real Time Module 15 SP4:ocfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64",
            "openSUSE Leap 15.4:cluster-md-kmp-rt-5.14.21-150400.15.5.1.x86_64",
            "openSUSE Leap 15.4:dlm-kmp-rt-5.14.21-150400.15.5.1.x86_64",
            "openSUSE Leap 15.4:gfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64",
            "openSUSE Leap 15.4:kernel-devel-rt-5.14.21-150400.15.5.1.noarch",
            "openSUSE Leap 15.4:kernel-rt-5.14.21-150400.15.5.1.x86_64",
            "openSUSE Leap 15.4:kernel-rt-devel-5.14.21-150400.15.5.1.x86_64",
            "openSUSE Leap 15.4:kernel-rt_debug-5.14.21-150400.15.5.1.x86_64",
            "openSUSE Leap 15.4:kernel-rt_debug-devel-5.14.21-150400.15.5.1.x86_64",
            "openSUSE Leap 15.4:kernel-source-rt-5.14.21-150400.15.5.1.noarch",
            "openSUSE Leap 15.4:kernel-syms-rt-5.14.21-150400.15.5.1.x86_64",
            "openSUSE Leap 15.4:ocfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 6.4,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H",
            "version": "3.1"
          },
          "products": [
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_15_5-rt-1-150400.1.3.1.x86_64",
            "SUSE Real Time Module 15 SP4:cluster-md-kmp-rt-5.14.21-150400.15.5.1.x86_64",
            "SUSE Real Time Module 15 SP4:dlm-kmp-rt-5.14.21-150400.15.5.1.x86_64",
            "SUSE Real Time Module 15 SP4:gfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64",
            "SUSE Real Time Module 15 SP4:kernel-devel-rt-5.14.21-150400.15.5.1.noarch",
            "SUSE Real Time Module 15 SP4:kernel-rt-5.14.21-150400.15.5.1.x86_64",
            "SUSE Real Time Module 15 SP4:kernel-rt-devel-5.14.21-150400.15.5.1.x86_64",
            "SUSE Real Time Module 15 SP4:kernel-rt_debug-5.14.21-150400.15.5.1.x86_64",
            "SUSE Real Time Module 15 SP4:kernel-rt_debug-devel-5.14.21-150400.15.5.1.x86_64",
            "SUSE Real Time Module 15 SP4:kernel-source-rt-5.14.21-150400.15.5.1.noarch",
            "SUSE Real Time Module 15 SP4:kernel-syms-rt-5.14.21-150400.15.5.1.x86_64",
            "SUSE Real Time Module 15 SP4:ocfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64",
            "openSUSE Leap 15.4:cluster-md-kmp-rt-5.14.21-150400.15.5.1.x86_64",
            "openSUSE Leap 15.4:dlm-kmp-rt-5.14.21-150400.15.5.1.x86_64",
            "openSUSE Leap 15.4:gfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64",
            "openSUSE Leap 15.4:kernel-devel-rt-5.14.21-150400.15.5.1.noarch",
            "openSUSE Leap 15.4:kernel-rt-5.14.21-150400.15.5.1.x86_64",
            "openSUSE Leap 15.4:kernel-rt-devel-5.14.21-150400.15.5.1.x86_64",
            "openSUSE Leap 15.4:kernel-rt_debug-5.14.21-150400.15.5.1.x86_64",
            "openSUSE Leap 15.4:kernel-rt_debug-devel-5.14.21-150400.15.5.1.x86_64",
            "openSUSE Leap 15.4:kernel-source-rt-5.14.21-150400.15.5.1.noarch",
            "openSUSE Leap 15.4:kernel-syms-rt-5.14.21-150400.15.5.1.x86_64",
            "openSUSE Leap 15.4:ocfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2022-12-23T10:39:17Z",
          "details": "moderate"
        }
      ],
      "title": "CVE-2022-3625"
    },
    {
      "cve": "CVE-2022-3628",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2022-3628"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "A buffer overflow flaw was found in the Linux kernel Broadcom Full MAC Wi-Fi driver. This issue occurs when a user connects to a malicious USB device. This can allow a local user to crash the system or escalate their privileges.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_15_5-rt-1-150400.1.3.1.x86_64",
          "SUSE Real Time Module 15 SP4:cluster-md-kmp-rt-5.14.21-150400.15.5.1.x86_64",
          "SUSE Real Time Module 15 SP4:dlm-kmp-rt-5.14.21-150400.15.5.1.x86_64",
          "SUSE Real Time Module 15 SP4:gfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64",
          "SUSE Real Time Module 15 SP4:kernel-devel-rt-5.14.21-150400.15.5.1.noarch",
          "SUSE Real Time Module 15 SP4:kernel-rt-5.14.21-150400.15.5.1.x86_64",
          "SUSE Real Time Module 15 SP4:kernel-rt-devel-5.14.21-150400.15.5.1.x86_64",
          "SUSE Real Time Module 15 SP4:kernel-rt_debug-5.14.21-150400.15.5.1.x86_64",
          "SUSE Real Time Module 15 SP4:kernel-rt_debug-devel-5.14.21-150400.15.5.1.x86_64",
          "SUSE Real Time Module 15 SP4:kernel-source-rt-5.14.21-150400.15.5.1.noarch",
          "SUSE Real Time Module 15 SP4:kernel-syms-rt-5.14.21-150400.15.5.1.x86_64",
          "SUSE Real Time Module 15 SP4:ocfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64",
          "openSUSE Leap 15.4:cluster-md-kmp-rt-5.14.21-150400.15.5.1.x86_64",
          "openSUSE Leap 15.4:dlm-kmp-rt-5.14.21-150400.15.5.1.x86_64",
          "openSUSE Leap 15.4:gfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64",
          "openSUSE Leap 15.4:kernel-devel-rt-5.14.21-150400.15.5.1.noarch",
          "openSUSE Leap 15.4:kernel-rt-5.14.21-150400.15.5.1.x86_64",
          "openSUSE Leap 15.4:kernel-rt-devel-5.14.21-150400.15.5.1.x86_64",
          "openSUSE Leap 15.4:kernel-rt_debug-5.14.21-150400.15.5.1.x86_64",
          "openSUSE Leap 15.4:kernel-rt_debug-devel-5.14.21-150400.15.5.1.x86_64",
          "openSUSE Leap 15.4:kernel-source-rt-5.14.21-150400.15.5.1.noarch",
          "openSUSE Leap 15.4:kernel-syms-rt-5.14.21-150400.15.5.1.x86_64",
          "openSUSE Leap 15.4:ocfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2022-3628",
          "url": "https://www.suse.com/security/cve/CVE-2022-3628"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1204868 for CVE-2022-3628",
          "url": "https://bugzilla.suse.com/1204868"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_15_5-rt-1-150400.1.3.1.x86_64",
            "SUSE Real Time Module 15 SP4:cluster-md-kmp-rt-5.14.21-150400.15.5.1.x86_64",
            "SUSE Real Time Module 15 SP4:dlm-kmp-rt-5.14.21-150400.15.5.1.x86_64",
            "SUSE Real Time Module 15 SP4:gfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64",
            "SUSE Real Time Module 15 SP4:kernel-devel-rt-5.14.21-150400.15.5.1.noarch",
            "SUSE Real Time Module 15 SP4:kernel-rt-5.14.21-150400.15.5.1.x86_64",
            "SUSE Real Time Module 15 SP4:kernel-rt-devel-5.14.21-150400.15.5.1.x86_64",
            "SUSE Real Time Module 15 SP4:kernel-rt_debug-5.14.21-150400.15.5.1.x86_64",
            "SUSE Real Time Module 15 SP4:kernel-rt_debug-devel-5.14.21-150400.15.5.1.x86_64",
            "SUSE Real Time Module 15 SP4:kernel-source-rt-5.14.21-150400.15.5.1.noarch",
            "SUSE Real Time Module 15 SP4:kernel-syms-rt-5.14.21-150400.15.5.1.x86_64",
            "SUSE Real Time Module 15 SP4:ocfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64",
            "openSUSE Leap 15.4:cluster-md-kmp-rt-5.14.21-150400.15.5.1.x86_64",
            "openSUSE Leap 15.4:dlm-kmp-rt-5.14.21-150400.15.5.1.x86_64",
            "openSUSE Leap 15.4:gfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64",
            "openSUSE Leap 15.4:kernel-devel-rt-5.14.21-150400.15.5.1.noarch",
            "openSUSE Leap 15.4:kernel-rt-5.14.21-150400.15.5.1.x86_64",
            "openSUSE Leap 15.4:kernel-rt-devel-5.14.21-150400.15.5.1.x86_64",
            "openSUSE Leap 15.4:kernel-rt_debug-5.14.21-150400.15.5.1.x86_64",
            "openSUSE Leap 15.4:kernel-rt_debug-devel-5.14.21-150400.15.5.1.x86_64",
            "openSUSE Leap 15.4:kernel-source-rt-5.14.21-150400.15.5.1.noarch",
            "openSUSE Leap 15.4:kernel-syms-rt-5.14.21-150400.15.5.1.x86_64",
            "openSUSE Leap 15.4:ocfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 4.6,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
            "version": "3.1"
          },
          "products": [
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_15_5-rt-1-150400.1.3.1.x86_64",
            "SUSE Real Time Module 15 SP4:cluster-md-kmp-rt-5.14.21-150400.15.5.1.x86_64",
            "SUSE Real Time Module 15 SP4:dlm-kmp-rt-5.14.21-150400.15.5.1.x86_64",
            "SUSE Real Time Module 15 SP4:gfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64",
            "SUSE Real Time Module 15 SP4:kernel-devel-rt-5.14.21-150400.15.5.1.noarch",
            "SUSE Real Time Module 15 SP4:kernel-rt-5.14.21-150400.15.5.1.x86_64",
            "SUSE Real Time Module 15 SP4:kernel-rt-devel-5.14.21-150400.15.5.1.x86_64",
            "SUSE Real Time Module 15 SP4:kernel-rt_debug-5.14.21-150400.15.5.1.x86_64",
            "SUSE Real Time Module 15 SP4:kernel-rt_debug-devel-5.14.21-150400.15.5.1.x86_64",
            "SUSE Real Time Module 15 SP4:kernel-source-rt-5.14.21-150400.15.5.1.noarch",
            "SUSE Real Time Module 15 SP4:kernel-syms-rt-5.14.21-150400.15.5.1.x86_64",
            "SUSE Real Time Module 15 SP4:ocfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64",
            "openSUSE Leap 15.4:cluster-md-kmp-rt-5.14.21-150400.15.5.1.x86_64",
            "openSUSE Leap 15.4:dlm-kmp-rt-5.14.21-150400.15.5.1.x86_64",
            "openSUSE Leap 15.4:gfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64",
            "openSUSE Leap 15.4:kernel-devel-rt-5.14.21-150400.15.5.1.noarch",
            "openSUSE Leap 15.4:kernel-rt-5.14.21-150400.15.5.1.x86_64",
            "openSUSE Leap 15.4:kernel-rt-devel-5.14.21-150400.15.5.1.x86_64",
            "openSUSE Leap 15.4:kernel-rt_debug-5.14.21-150400.15.5.1.x86_64",
            "openSUSE Leap 15.4:kernel-rt_debug-devel-5.14.21-150400.15.5.1.x86_64",
            "openSUSE Leap 15.4:kernel-source-rt-5.14.21-150400.15.5.1.noarch",
            "openSUSE Leap 15.4:kernel-syms-rt-5.14.21-150400.15.5.1.x86_64",
            "openSUSE Leap 15.4:ocfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2022-12-23T10:39:17Z",
          "details": "moderate"
        }
      ],
      "title": "CVE-2022-3628"
    },
    {
      "cve": "CVE-2022-3629",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2022-3629"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "A vulnerability was found in Linux Kernel. It has been declared as problematic. This vulnerability affects the function vsock_connect of the file net/vmw_vsock/af_vsock.c. The manipulation leads to memory leak. The complexity of an attack is rather high. The exploitation appears to be difficult. It is recommended to apply a patch to fix this issue. VDB-211930 is the identifier assigned to this vulnerability.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_15_5-rt-1-150400.1.3.1.x86_64",
          "SUSE Real Time Module 15 SP4:cluster-md-kmp-rt-5.14.21-150400.15.5.1.x86_64",
          "SUSE Real Time Module 15 SP4:dlm-kmp-rt-5.14.21-150400.15.5.1.x86_64",
          "SUSE Real Time Module 15 SP4:gfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64",
          "SUSE Real Time Module 15 SP4:kernel-devel-rt-5.14.21-150400.15.5.1.noarch",
          "SUSE Real Time Module 15 SP4:kernel-rt-5.14.21-150400.15.5.1.x86_64",
          "SUSE Real Time Module 15 SP4:kernel-rt-devel-5.14.21-150400.15.5.1.x86_64",
          "SUSE Real Time Module 15 SP4:kernel-rt_debug-5.14.21-150400.15.5.1.x86_64",
          "SUSE Real Time Module 15 SP4:kernel-rt_debug-devel-5.14.21-150400.15.5.1.x86_64",
          "SUSE Real Time Module 15 SP4:kernel-source-rt-5.14.21-150400.15.5.1.noarch",
          "SUSE Real Time Module 15 SP4:kernel-syms-rt-5.14.21-150400.15.5.1.x86_64",
          "SUSE Real Time Module 15 SP4:ocfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64",
          "openSUSE Leap 15.4:cluster-md-kmp-rt-5.14.21-150400.15.5.1.x86_64",
          "openSUSE Leap 15.4:dlm-kmp-rt-5.14.21-150400.15.5.1.x86_64",
          "openSUSE Leap 15.4:gfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64",
          "openSUSE Leap 15.4:kernel-devel-rt-5.14.21-150400.15.5.1.noarch",
          "openSUSE Leap 15.4:kernel-rt-5.14.21-150400.15.5.1.x86_64",
          "openSUSE Leap 15.4:kernel-rt-devel-5.14.21-150400.15.5.1.x86_64",
          "openSUSE Leap 15.4:kernel-rt_debug-5.14.21-150400.15.5.1.x86_64",
          "openSUSE Leap 15.4:kernel-rt_debug-devel-5.14.21-150400.15.5.1.x86_64",
          "openSUSE Leap 15.4:kernel-source-rt-5.14.21-150400.15.5.1.noarch",
          "openSUSE Leap 15.4:kernel-syms-rt-5.14.21-150400.15.5.1.x86_64",
          "openSUSE Leap 15.4:ocfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2022-3629",
          "url": "https://www.suse.com/security/cve/CVE-2022-3629"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1204635 for CVE-2022-3629",
          "url": "https://bugzilla.suse.com/1204635"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_15_5-rt-1-150400.1.3.1.x86_64",
            "SUSE Real Time Module 15 SP4:cluster-md-kmp-rt-5.14.21-150400.15.5.1.x86_64",
            "SUSE Real Time Module 15 SP4:dlm-kmp-rt-5.14.21-150400.15.5.1.x86_64",
            "SUSE Real Time Module 15 SP4:gfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64",
            "SUSE Real Time Module 15 SP4:kernel-devel-rt-5.14.21-150400.15.5.1.noarch",
            "SUSE Real Time Module 15 SP4:kernel-rt-5.14.21-150400.15.5.1.x86_64",
            "SUSE Real Time Module 15 SP4:kernel-rt-devel-5.14.21-150400.15.5.1.x86_64",
            "SUSE Real Time Module 15 SP4:kernel-rt_debug-5.14.21-150400.15.5.1.x86_64",
            "SUSE Real Time Module 15 SP4:kernel-rt_debug-devel-5.14.21-150400.15.5.1.x86_64",
            "SUSE Real Time Module 15 SP4:kernel-source-rt-5.14.21-150400.15.5.1.noarch",
            "SUSE Real Time Module 15 SP4:kernel-syms-rt-5.14.21-150400.15.5.1.x86_64",
            "SUSE Real Time Module 15 SP4:ocfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64",
            "openSUSE Leap 15.4:cluster-md-kmp-rt-5.14.21-150400.15.5.1.x86_64",
            "openSUSE Leap 15.4:dlm-kmp-rt-5.14.21-150400.15.5.1.x86_64",
            "openSUSE Leap 15.4:gfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64",
            "openSUSE Leap 15.4:kernel-devel-rt-5.14.21-150400.15.5.1.noarch",
            "openSUSE Leap 15.4:kernel-rt-5.14.21-150400.15.5.1.x86_64",
            "openSUSE Leap 15.4:kernel-rt-devel-5.14.21-150400.15.5.1.x86_64",
            "openSUSE Leap 15.4:kernel-rt_debug-5.14.21-150400.15.5.1.x86_64",
            "openSUSE Leap 15.4:kernel-rt_debug-devel-5.14.21-150400.15.5.1.x86_64",
            "openSUSE Leap 15.4:kernel-source-rt-5.14.21-150400.15.5.1.noarch",
            "openSUSE Leap 15.4:kernel-syms-rt-5.14.21-150400.15.5.1.x86_64",
            "openSUSE Leap 15.4:ocfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 2.5,
            "baseSeverity": "LOW",
            "vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:L",
            "version": "3.1"
          },
          "products": [
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_15_5-rt-1-150400.1.3.1.x86_64",
            "SUSE Real Time Module 15 SP4:cluster-md-kmp-rt-5.14.21-150400.15.5.1.x86_64",
            "SUSE Real Time Module 15 SP4:dlm-kmp-rt-5.14.21-150400.15.5.1.x86_64",
            "SUSE Real Time Module 15 SP4:gfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64",
            "SUSE Real Time Module 15 SP4:kernel-devel-rt-5.14.21-150400.15.5.1.noarch",
            "SUSE Real Time Module 15 SP4:kernel-rt-5.14.21-150400.15.5.1.x86_64",
            "SUSE Real Time Module 15 SP4:kernel-rt-devel-5.14.21-150400.15.5.1.x86_64",
            "SUSE Real Time Module 15 SP4:kernel-rt_debug-5.14.21-150400.15.5.1.x86_64",
            "SUSE Real Time Module 15 SP4:kernel-rt_debug-devel-5.14.21-150400.15.5.1.x86_64",
            "SUSE Real Time Module 15 SP4:kernel-source-rt-5.14.21-150400.15.5.1.noarch",
            "SUSE Real Time Module 15 SP4:kernel-syms-rt-5.14.21-150400.15.5.1.x86_64",
            "SUSE Real Time Module 15 SP4:ocfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64",
            "openSUSE Leap 15.4:cluster-md-kmp-rt-5.14.21-150400.15.5.1.x86_64",
            "openSUSE Leap 15.4:dlm-kmp-rt-5.14.21-150400.15.5.1.x86_64",
            "openSUSE Leap 15.4:gfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64",
            "openSUSE Leap 15.4:kernel-devel-rt-5.14.21-150400.15.5.1.noarch",
            "openSUSE Leap 15.4:kernel-rt-5.14.21-150400.15.5.1.x86_64",
            "openSUSE Leap 15.4:kernel-rt-devel-5.14.21-150400.15.5.1.x86_64",
            "openSUSE Leap 15.4:kernel-rt_debug-5.14.21-150400.15.5.1.x86_64",
            "openSUSE Leap 15.4:kernel-rt_debug-devel-5.14.21-150400.15.5.1.x86_64",
            "openSUSE Leap 15.4:kernel-source-rt-5.14.21-150400.15.5.1.noarch",
            "openSUSE Leap 15.4:kernel-syms-rt-5.14.21-150400.15.5.1.x86_64",
            "openSUSE Leap 15.4:ocfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2022-12-23T10:39:17Z",
          "details": "low"
        }
      ],
      "title": "CVE-2022-3629"
    },
    {
      "cve": "CVE-2022-3633",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2022-3633"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "A vulnerability classified as problematic has been found in Linux Kernel. Affected is the function j1939_session_destroy of the file net/can/j1939/transport.c. The manipulation leads to memory leak. It is recommended to apply a patch to fix this issue. The identifier of this vulnerability is VDB-211932.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_15_5-rt-1-150400.1.3.1.x86_64",
          "SUSE Real Time Module 15 SP4:cluster-md-kmp-rt-5.14.21-150400.15.5.1.x86_64",
          "SUSE Real Time Module 15 SP4:dlm-kmp-rt-5.14.21-150400.15.5.1.x86_64",
          "SUSE Real Time Module 15 SP4:gfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64",
          "SUSE Real Time Module 15 SP4:kernel-devel-rt-5.14.21-150400.15.5.1.noarch",
          "SUSE Real Time Module 15 SP4:kernel-rt-5.14.21-150400.15.5.1.x86_64",
          "SUSE Real Time Module 15 SP4:kernel-rt-devel-5.14.21-150400.15.5.1.x86_64",
          "SUSE Real Time Module 15 SP4:kernel-rt_debug-5.14.21-150400.15.5.1.x86_64",
          "SUSE Real Time Module 15 SP4:kernel-rt_debug-devel-5.14.21-150400.15.5.1.x86_64",
          "SUSE Real Time Module 15 SP4:kernel-source-rt-5.14.21-150400.15.5.1.noarch",
          "SUSE Real Time Module 15 SP4:kernel-syms-rt-5.14.21-150400.15.5.1.x86_64",
          "SUSE Real Time Module 15 SP4:ocfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64",
          "openSUSE Leap 15.4:cluster-md-kmp-rt-5.14.21-150400.15.5.1.x86_64",
          "openSUSE Leap 15.4:dlm-kmp-rt-5.14.21-150400.15.5.1.x86_64",
          "openSUSE Leap 15.4:gfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64",
          "openSUSE Leap 15.4:kernel-devel-rt-5.14.21-150400.15.5.1.noarch",
          "openSUSE Leap 15.4:kernel-rt-5.14.21-150400.15.5.1.x86_64",
          "openSUSE Leap 15.4:kernel-rt-devel-5.14.21-150400.15.5.1.x86_64",
          "openSUSE Leap 15.4:kernel-rt_debug-5.14.21-150400.15.5.1.x86_64",
          "openSUSE Leap 15.4:kernel-rt_debug-devel-5.14.21-150400.15.5.1.x86_64",
          "openSUSE Leap 15.4:kernel-source-rt-5.14.21-150400.15.5.1.noarch",
          "openSUSE Leap 15.4:kernel-syms-rt-5.14.21-150400.15.5.1.x86_64",
          "openSUSE Leap 15.4:ocfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2022-3633",
          "url": "https://www.suse.com/security/cve/CVE-2022-3633"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1204650 for CVE-2022-3633",
          "url": "https://bugzilla.suse.com/1204650"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_15_5-rt-1-150400.1.3.1.x86_64",
            "SUSE Real Time Module 15 SP4:cluster-md-kmp-rt-5.14.21-150400.15.5.1.x86_64",
            "SUSE Real Time Module 15 SP4:dlm-kmp-rt-5.14.21-150400.15.5.1.x86_64",
            "SUSE Real Time Module 15 SP4:gfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64",
            "SUSE Real Time Module 15 SP4:kernel-devel-rt-5.14.21-150400.15.5.1.noarch",
            "SUSE Real Time Module 15 SP4:kernel-rt-5.14.21-150400.15.5.1.x86_64",
            "SUSE Real Time Module 15 SP4:kernel-rt-devel-5.14.21-150400.15.5.1.x86_64",
            "SUSE Real Time Module 15 SP4:kernel-rt_debug-5.14.21-150400.15.5.1.x86_64",
            "SUSE Real Time Module 15 SP4:kernel-rt_debug-devel-5.14.21-150400.15.5.1.x86_64",
            "SUSE Real Time Module 15 SP4:kernel-source-rt-5.14.21-150400.15.5.1.noarch",
            "SUSE Real Time Module 15 SP4:kernel-syms-rt-5.14.21-150400.15.5.1.x86_64",
            "SUSE Real Time Module 15 SP4:ocfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64",
            "openSUSE Leap 15.4:cluster-md-kmp-rt-5.14.21-150400.15.5.1.x86_64",
            "openSUSE Leap 15.4:dlm-kmp-rt-5.14.21-150400.15.5.1.x86_64",
            "openSUSE Leap 15.4:gfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64",
            "openSUSE Leap 15.4:kernel-devel-rt-5.14.21-150400.15.5.1.noarch",
            "openSUSE Leap 15.4:kernel-rt-5.14.21-150400.15.5.1.x86_64",
            "openSUSE Leap 15.4:kernel-rt-devel-5.14.21-150400.15.5.1.x86_64",
            "openSUSE Leap 15.4:kernel-rt_debug-5.14.21-150400.15.5.1.x86_64",
            "openSUSE Leap 15.4:kernel-rt_debug-devel-5.14.21-150400.15.5.1.x86_64",
            "openSUSE Leap 15.4:kernel-source-rt-5.14.21-150400.15.5.1.noarch",
            "openSUSE Leap 15.4:kernel-syms-rt-5.14.21-150400.15.5.1.x86_64",
            "openSUSE Leap 15.4:ocfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 2.5,
            "baseSeverity": "LOW",
            "vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:L",
            "version": "3.1"
          },
          "products": [
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_15_5-rt-1-150400.1.3.1.x86_64",
            "SUSE Real Time Module 15 SP4:cluster-md-kmp-rt-5.14.21-150400.15.5.1.x86_64",
            "SUSE Real Time Module 15 SP4:dlm-kmp-rt-5.14.21-150400.15.5.1.x86_64",
            "SUSE Real Time Module 15 SP4:gfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64",
            "SUSE Real Time Module 15 SP4:kernel-devel-rt-5.14.21-150400.15.5.1.noarch",
            "SUSE Real Time Module 15 SP4:kernel-rt-5.14.21-150400.15.5.1.x86_64",
            "SUSE Real Time Module 15 SP4:kernel-rt-devel-5.14.21-150400.15.5.1.x86_64",
            "SUSE Real Time Module 15 SP4:kernel-rt_debug-5.14.21-150400.15.5.1.x86_64",
            "SUSE Real Time Module 15 SP4:kernel-rt_debug-devel-5.14.21-150400.15.5.1.x86_64",
            "SUSE Real Time Module 15 SP4:kernel-source-rt-5.14.21-150400.15.5.1.noarch",
            "SUSE Real Time Module 15 SP4:kernel-syms-rt-5.14.21-150400.15.5.1.x86_64",
            "SUSE Real Time Module 15 SP4:ocfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64",
            "openSUSE Leap 15.4:cluster-md-kmp-rt-5.14.21-150400.15.5.1.x86_64",
            "openSUSE Leap 15.4:dlm-kmp-rt-5.14.21-150400.15.5.1.x86_64",
            "openSUSE Leap 15.4:gfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64",
            "openSUSE Leap 15.4:kernel-devel-rt-5.14.21-150400.15.5.1.noarch",
            "openSUSE Leap 15.4:kernel-rt-5.14.21-150400.15.5.1.x86_64",
            "openSUSE Leap 15.4:kernel-rt-devel-5.14.21-150400.15.5.1.x86_64",
            "openSUSE Leap 15.4:kernel-rt_debug-5.14.21-150400.15.5.1.x86_64",
            "openSUSE Leap 15.4:kernel-rt_debug-devel-5.14.21-150400.15.5.1.x86_64",
            "openSUSE Leap 15.4:kernel-source-rt-5.14.21-150400.15.5.1.noarch",
            "openSUSE Leap 15.4:kernel-syms-rt-5.14.21-150400.15.5.1.x86_64",
            "openSUSE Leap 15.4:ocfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2022-12-23T10:39:17Z",
          "details": "low"
        }
      ],
      "title": "CVE-2022-3633"
    },
    {
      "cve": "CVE-2022-3635",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2022-3635"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "A vulnerability, which was classified as critical, has been found in Linux Kernel. Affected by this issue is the function tst_timer of the file drivers/atm/idt77252.c of the component IPsec. The manipulation leads to use after free. It is recommended to apply a patch to fix this issue. VDB-211934 is the identifier assigned to this vulnerability.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_15_5-rt-1-150400.1.3.1.x86_64",
          "SUSE Real Time Module 15 SP4:cluster-md-kmp-rt-5.14.21-150400.15.5.1.x86_64",
          "SUSE Real Time Module 15 SP4:dlm-kmp-rt-5.14.21-150400.15.5.1.x86_64",
          "SUSE Real Time Module 15 SP4:gfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64",
          "SUSE Real Time Module 15 SP4:kernel-devel-rt-5.14.21-150400.15.5.1.noarch",
          "SUSE Real Time Module 15 SP4:kernel-rt-5.14.21-150400.15.5.1.x86_64",
          "SUSE Real Time Module 15 SP4:kernel-rt-devel-5.14.21-150400.15.5.1.x86_64",
          "SUSE Real Time Module 15 SP4:kernel-rt_debug-5.14.21-150400.15.5.1.x86_64",
          "SUSE Real Time Module 15 SP4:kernel-rt_debug-devel-5.14.21-150400.15.5.1.x86_64",
          "SUSE Real Time Module 15 SP4:kernel-source-rt-5.14.21-150400.15.5.1.noarch",
          "SUSE Real Time Module 15 SP4:kernel-syms-rt-5.14.21-150400.15.5.1.x86_64",
          "SUSE Real Time Module 15 SP4:ocfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64",
          "openSUSE Leap 15.4:cluster-md-kmp-rt-5.14.21-150400.15.5.1.x86_64",
          "openSUSE Leap 15.4:dlm-kmp-rt-5.14.21-150400.15.5.1.x86_64",
          "openSUSE Leap 15.4:gfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64",
          "openSUSE Leap 15.4:kernel-devel-rt-5.14.21-150400.15.5.1.noarch",
          "openSUSE Leap 15.4:kernel-rt-5.14.21-150400.15.5.1.x86_64",
          "openSUSE Leap 15.4:kernel-rt-devel-5.14.21-150400.15.5.1.x86_64",
          "openSUSE Leap 15.4:kernel-rt_debug-5.14.21-150400.15.5.1.x86_64",
          "openSUSE Leap 15.4:kernel-rt_debug-devel-5.14.21-150400.15.5.1.x86_64",
          "openSUSE Leap 15.4:kernel-source-rt-5.14.21-150400.15.5.1.noarch",
          "openSUSE Leap 15.4:kernel-syms-rt-5.14.21-150400.15.5.1.x86_64",
          "openSUSE Leap 15.4:ocfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2022-3635",
          "url": "https://www.suse.com/security/cve/CVE-2022-3635"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1204631 for CVE-2022-3635",
          "url": "https://bugzilla.suse.com/1204631"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1204636 for CVE-2022-3635",
          "url": "https://bugzilla.suse.com/1204636"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1208044 for CVE-2022-3635",
          "url": "https://bugzilla.suse.com/1208044"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1212289 for CVE-2022-3635",
          "url": "https://bugzilla.suse.com/1212289"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_15_5-rt-1-150400.1.3.1.x86_64",
            "SUSE Real Time Module 15 SP4:cluster-md-kmp-rt-5.14.21-150400.15.5.1.x86_64",
            "SUSE Real Time Module 15 SP4:dlm-kmp-rt-5.14.21-150400.15.5.1.x86_64",
            "SUSE Real Time Module 15 SP4:gfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64",
            "SUSE Real Time Module 15 SP4:kernel-devel-rt-5.14.21-150400.15.5.1.noarch",
            "SUSE Real Time Module 15 SP4:kernel-rt-5.14.21-150400.15.5.1.x86_64",
            "SUSE Real Time Module 15 SP4:kernel-rt-devel-5.14.21-150400.15.5.1.x86_64",
            "SUSE Real Time Module 15 SP4:kernel-rt_debug-5.14.21-150400.15.5.1.x86_64",
            "SUSE Real Time Module 15 SP4:kernel-rt_debug-devel-5.14.21-150400.15.5.1.x86_64",
            "SUSE Real Time Module 15 SP4:kernel-source-rt-5.14.21-150400.15.5.1.noarch",
            "SUSE Real Time Module 15 SP4:kernel-syms-rt-5.14.21-150400.15.5.1.x86_64",
            "SUSE Real Time Module 15 SP4:ocfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64",
            "openSUSE Leap 15.4:cluster-md-kmp-rt-5.14.21-150400.15.5.1.x86_64",
            "openSUSE Leap 15.4:dlm-kmp-rt-5.14.21-150400.15.5.1.x86_64",
            "openSUSE Leap 15.4:gfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64",
            "openSUSE Leap 15.4:kernel-devel-rt-5.14.21-150400.15.5.1.noarch",
            "openSUSE Leap 15.4:kernel-rt-5.14.21-150400.15.5.1.x86_64",
            "openSUSE Leap 15.4:kernel-rt-devel-5.14.21-150400.15.5.1.x86_64",
            "openSUSE Leap 15.4:kernel-rt_debug-5.14.21-150400.15.5.1.x86_64",
            "openSUSE Leap 15.4:kernel-rt_debug-devel-5.14.21-150400.15.5.1.x86_64",
            "openSUSE Leap 15.4:kernel-source-rt-5.14.21-150400.15.5.1.noarch",
            "openSUSE Leap 15.4:kernel-syms-rt-5.14.21-150400.15.5.1.x86_64",
            "openSUSE Leap 15.4:ocfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 7,
            "baseSeverity": "HIGH",
            "vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H",
            "version": "3.1"
          },
          "products": [
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_15_5-rt-1-150400.1.3.1.x86_64",
            "SUSE Real Time Module 15 SP4:cluster-md-kmp-rt-5.14.21-150400.15.5.1.x86_64",
            "SUSE Real Time Module 15 SP4:dlm-kmp-rt-5.14.21-150400.15.5.1.x86_64",
            "SUSE Real Time Module 15 SP4:gfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64",
            "SUSE Real Time Module 15 SP4:kernel-devel-rt-5.14.21-150400.15.5.1.noarch",
            "SUSE Real Time Module 15 SP4:kernel-rt-5.14.21-150400.15.5.1.x86_64",
            "SUSE Real Time Module 15 SP4:kernel-rt-devel-5.14.21-150400.15.5.1.x86_64",
            "SUSE Real Time Module 15 SP4:kernel-rt_debug-5.14.21-150400.15.5.1.x86_64",
            "SUSE Real Time Module 15 SP4:kernel-rt_debug-devel-5.14.21-150400.15.5.1.x86_64",
            "SUSE Real Time Module 15 SP4:kernel-source-rt-5.14.21-150400.15.5.1.noarch",
            "SUSE Real Time Module 15 SP4:kernel-syms-rt-5.14.21-150400.15.5.1.x86_64",
            "SUSE Real Time Module 15 SP4:ocfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64",
            "openSUSE Leap 15.4:cluster-md-kmp-rt-5.14.21-150400.15.5.1.x86_64",
            "openSUSE Leap 15.4:dlm-kmp-rt-5.14.21-150400.15.5.1.x86_64",
            "openSUSE Leap 15.4:gfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64",
            "openSUSE Leap 15.4:kernel-devel-rt-5.14.21-150400.15.5.1.noarch",
            "openSUSE Leap 15.4:kernel-rt-5.14.21-150400.15.5.1.x86_64",
            "openSUSE Leap 15.4:kernel-rt-devel-5.14.21-150400.15.5.1.x86_64",
            "openSUSE Leap 15.4:kernel-rt_debug-5.14.21-150400.15.5.1.x86_64",
            "openSUSE Leap 15.4:kernel-rt_debug-devel-5.14.21-150400.15.5.1.x86_64",
            "openSUSE Leap 15.4:kernel-source-rt-5.14.21-150400.15.5.1.noarch",
            "openSUSE Leap 15.4:kernel-syms-rt-5.14.21-150400.15.5.1.x86_64",
            "openSUSE Leap 15.4:ocfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2022-12-23T10:39:17Z",
          "details": "important"
        }
      ],
      "title": "CVE-2022-3635"
    },
    {
      "cve": "CVE-2022-3640",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2022-3640"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "A vulnerability, which was classified as critical, was found in Linux Kernel. Affected is the function l2cap_conn_del of the file net/bluetooth/l2cap_core.c of the component Bluetooth. The manipulation leads to use after free. It is recommended to apply a patch to fix this issue. The identifier of this vulnerability is VDB-211944.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_15_5-rt-1-150400.1.3.1.x86_64",
          "SUSE Real Time Module 15 SP4:cluster-md-kmp-rt-5.14.21-150400.15.5.1.x86_64",
          "SUSE Real Time Module 15 SP4:dlm-kmp-rt-5.14.21-150400.15.5.1.x86_64",
          "SUSE Real Time Module 15 SP4:gfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64",
          "SUSE Real Time Module 15 SP4:kernel-devel-rt-5.14.21-150400.15.5.1.noarch",
          "SUSE Real Time Module 15 SP4:kernel-rt-5.14.21-150400.15.5.1.x86_64",
          "SUSE Real Time Module 15 SP4:kernel-rt-devel-5.14.21-150400.15.5.1.x86_64",
          "SUSE Real Time Module 15 SP4:kernel-rt_debug-5.14.21-150400.15.5.1.x86_64",
          "SUSE Real Time Module 15 SP4:kernel-rt_debug-devel-5.14.21-150400.15.5.1.x86_64",
          "SUSE Real Time Module 15 SP4:kernel-source-rt-5.14.21-150400.15.5.1.noarch",
          "SUSE Real Time Module 15 SP4:kernel-syms-rt-5.14.21-150400.15.5.1.x86_64",
          "SUSE Real Time Module 15 SP4:ocfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64",
          "openSUSE Leap 15.4:cluster-md-kmp-rt-5.14.21-150400.15.5.1.x86_64",
          "openSUSE Leap 15.4:dlm-kmp-rt-5.14.21-150400.15.5.1.x86_64",
          "openSUSE Leap 15.4:gfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64",
          "openSUSE Leap 15.4:kernel-devel-rt-5.14.21-150400.15.5.1.noarch",
          "openSUSE Leap 15.4:kernel-rt-5.14.21-150400.15.5.1.x86_64",
          "openSUSE Leap 15.4:kernel-rt-devel-5.14.21-150400.15.5.1.x86_64",
          "openSUSE Leap 15.4:kernel-rt_debug-5.14.21-150400.15.5.1.x86_64",
          "openSUSE Leap 15.4:kernel-rt_debug-devel-5.14.21-150400.15.5.1.x86_64",
          "openSUSE Leap 15.4:kernel-source-rt-5.14.21-150400.15.5.1.noarch",
          "openSUSE Leap 15.4:kernel-syms-rt-5.14.21-150400.15.5.1.x86_64",
          "openSUSE Leap 15.4:ocfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2022-3640",
          "url": "https://www.suse.com/security/cve/CVE-2022-3640"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1204619 for CVE-2022-3640",
          "url": "https://bugzilla.suse.com/1204619"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1204624 for CVE-2022-3640",
          "url": "https://bugzilla.suse.com/1204624"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1209225 for CVE-2022-3640",
          "url": "https://bugzilla.suse.com/1209225"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_15_5-rt-1-150400.1.3.1.x86_64",
            "SUSE Real Time Module 15 SP4:cluster-md-kmp-rt-5.14.21-150400.15.5.1.x86_64",
            "SUSE Real Time Module 15 SP4:dlm-kmp-rt-5.14.21-150400.15.5.1.x86_64",
            "SUSE Real Time Module 15 SP4:gfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64",
            "SUSE Real Time Module 15 SP4:kernel-devel-rt-5.14.21-150400.15.5.1.noarch",
            "SUSE Real Time Module 15 SP4:kernel-rt-5.14.21-150400.15.5.1.x86_64",
            "SUSE Real Time Module 15 SP4:kernel-rt-devel-5.14.21-150400.15.5.1.x86_64",
            "SUSE Real Time Module 15 SP4:kernel-rt_debug-5.14.21-150400.15.5.1.x86_64",
            "SUSE Real Time Module 15 SP4:kernel-rt_debug-devel-5.14.21-150400.15.5.1.x86_64",
            "SUSE Real Time Module 15 SP4:kernel-source-rt-5.14.21-150400.15.5.1.noarch",
            "SUSE Real Time Module 15 SP4:kernel-syms-rt-5.14.21-150400.15.5.1.x86_64",
            "SUSE Real Time Module 15 SP4:ocfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64",
            "openSUSE Leap 15.4:cluster-md-kmp-rt-5.14.21-150400.15.5.1.x86_64",
            "openSUSE Leap 15.4:dlm-kmp-rt-5.14.21-150400.15.5.1.x86_64",
            "openSUSE Leap 15.4:gfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64",
            "openSUSE Leap 15.4:kernel-devel-rt-5.14.21-150400.15.5.1.noarch",
            "openSUSE Leap 15.4:kernel-rt-5.14.21-150400.15.5.1.x86_64",
            "openSUSE Leap 15.4:kernel-rt-devel-5.14.21-150400.15.5.1.x86_64",
            "openSUSE Leap 15.4:kernel-rt_debug-5.14.21-150400.15.5.1.x86_64",
            "openSUSE Leap 15.4:kernel-rt_debug-devel-5.14.21-150400.15.5.1.x86_64",
            "openSUSE Leap 15.4:kernel-source-rt-5.14.21-150400.15.5.1.noarch",
            "openSUSE Leap 15.4:kernel-syms-rt-5.14.21-150400.15.5.1.x86_64",
            "openSUSE Leap 15.4:ocfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 7.1,
            "baseSeverity": "HIGH",
            "vectorString": "CVSS:3.1/AV:A/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H",
            "version": "3.1"
          },
          "products": [
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_15_5-rt-1-150400.1.3.1.x86_64",
            "SUSE Real Time Module 15 SP4:cluster-md-kmp-rt-5.14.21-150400.15.5.1.x86_64",
            "SUSE Real Time Module 15 SP4:dlm-kmp-rt-5.14.21-150400.15.5.1.x86_64",
            "SUSE Real Time Module 15 SP4:gfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64",
            "SUSE Real Time Module 15 SP4:kernel-devel-rt-5.14.21-150400.15.5.1.noarch",
            "SUSE Real Time Module 15 SP4:kernel-rt-5.14.21-150400.15.5.1.x86_64",
            "SUSE Real Time Module 15 SP4:kernel-rt-devel-5.14.21-150400.15.5.1.x86_64",
            "SUSE Real Time Module 15 SP4:kernel-rt_debug-5.14.21-150400.15.5.1.x86_64",
            "SUSE Real Time Module 15 SP4:kernel-rt_debug-devel-5.14.21-150400.15.5.1.x86_64",
            "SUSE Real Time Module 15 SP4:kernel-source-rt-5.14.21-150400.15.5.1.noarch",
            "SUSE Real Time Module 15 SP4:kernel-syms-rt-5.14.21-150400.15.5.1.x86_64",
            "SUSE Real Time Module 15 SP4:ocfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64",
            "openSUSE Leap 15.4:cluster-md-kmp-rt-5.14.21-150400.15.5.1.x86_64",
            "openSUSE Leap 15.4:dlm-kmp-rt-5.14.21-150400.15.5.1.x86_64",
            "openSUSE Leap 15.4:gfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64",
            "openSUSE Leap 15.4:kernel-devel-rt-5.14.21-150400.15.5.1.noarch",
            "openSUSE Leap 15.4:kernel-rt-5.14.21-150400.15.5.1.x86_64",
            "openSUSE Leap 15.4:kernel-rt-devel-5.14.21-150400.15.5.1.x86_64",
            "openSUSE Leap 15.4:kernel-rt_debug-5.14.21-150400.15.5.1.x86_64",
            "openSUSE Leap 15.4:kernel-rt_debug-devel-5.14.21-150400.15.5.1.x86_64",
            "openSUSE Leap 15.4:kernel-source-rt-5.14.21-150400.15.5.1.noarch",
            "openSUSE Leap 15.4:kernel-syms-rt-5.14.21-150400.15.5.1.x86_64",
            "openSUSE Leap 15.4:ocfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2022-12-23T10:39:17Z",
          "details": "important"
        }
      ],
      "title": "CVE-2022-3640"
    },
    {
      "cve": "CVE-2022-3643",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2022-3643"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "Guests can trigger NIC interface reset/abort/crash via netback It is possible for a guest to trigger a NIC interface reset/abort/crash in a Linux based network backend by sending certain kinds of packets. It appears to be an (unwritten?) assumption in the rest of the Linux network stack that packet protocol headers are all contained within the linear section of the SKB and some NICs behave badly if this is not the case. This has been reported to occur with Cisco (enic) and Broadcom NetXtrem II BCM5780 (bnx2x) though it may be an issue with other NICs/drivers as well. In case the frontend is sending requests with split headers, netback will forward those violating above mentioned assumption to the networking core, resulting in said misbehavior.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_15_5-rt-1-150400.1.3.1.x86_64",
          "SUSE Real Time Module 15 SP4:cluster-md-kmp-rt-5.14.21-150400.15.5.1.x86_64",
          "SUSE Real Time Module 15 SP4:dlm-kmp-rt-5.14.21-150400.15.5.1.x86_64",
          "SUSE Real Time Module 15 SP4:gfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64",
          "SUSE Real Time Module 15 SP4:kernel-devel-rt-5.14.21-150400.15.5.1.noarch",
          "SUSE Real Time Module 15 SP4:kernel-rt-5.14.21-150400.15.5.1.x86_64",
          "SUSE Real Time Module 15 SP4:kernel-rt-devel-5.14.21-150400.15.5.1.x86_64",
          "SUSE Real Time Module 15 SP4:kernel-rt_debug-5.14.21-150400.15.5.1.x86_64",
          "SUSE Real Time Module 15 SP4:kernel-rt_debug-devel-5.14.21-150400.15.5.1.x86_64",
          "SUSE Real Time Module 15 SP4:kernel-source-rt-5.14.21-150400.15.5.1.noarch",
          "SUSE Real Time Module 15 SP4:kernel-syms-rt-5.14.21-150400.15.5.1.x86_64",
          "SUSE Real Time Module 15 SP4:ocfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64",
          "openSUSE Leap 15.4:cluster-md-kmp-rt-5.14.21-150400.15.5.1.x86_64",
          "openSUSE Leap 15.4:dlm-kmp-rt-5.14.21-150400.15.5.1.x86_64",
          "openSUSE Leap 15.4:gfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64",
          "openSUSE Leap 15.4:kernel-devel-rt-5.14.21-150400.15.5.1.noarch",
          "openSUSE Leap 15.4:kernel-rt-5.14.21-150400.15.5.1.x86_64",
          "openSUSE Leap 15.4:kernel-rt-devel-5.14.21-150400.15.5.1.x86_64",
          "openSUSE Leap 15.4:kernel-rt_debug-5.14.21-150400.15.5.1.x86_64",
          "openSUSE Leap 15.4:kernel-rt_debug-devel-5.14.21-150400.15.5.1.x86_64",
          "openSUSE Leap 15.4:kernel-source-rt-5.14.21-150400.15.5.1.noarch",
          "openSUSE Leap 15.4:kernel-syms-rt-5.14.21-150400.15.5.1.x86_64",
          "openSUSE Leap 15.4:ocfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2022-3643",
          "url": "https://www.suse.com/security/cve/CVE-2022-3643"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1206113 for CVE-2022-3643",
          "url": "https://bugzilla.suse.com/1206113"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_15_5-rt-1-150400.1.3.1.x86_64",
            "SUSE Real Time Module 15 SP4:cluster-md-kmp-rt-5.14.21-150400.15.5.1.x86_64",
            "SUSE Real Time Module 15 SP4:dlm-kmp-rt-5.14.21-150400.15.5.1.x86_64",
            "SUSE Real Time Module 15 SP4:gfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64",
            "SUSE Real Time Module 15 SP4:kernel-devel-rt-5.14.21-150400.15.5.1.noarch",
            "SUSE Real Time Module 15 SP4:kernel-rt-5.14.21-150400.15.5.1.x86_64",
            "SUSE Real Time Module 15 SP4:kernel-rt-devel-5.14.21-150400.15.5.1.x86_64",
            "SUSE Real Time Module 15 SP4:kernel-rt_debug-5.14.21-150400.15.5.1.x86_64",
            "SUSE Real Time Module 15 SP4:kernel-rt_debug-devel-5.14.21-150400.15.5.1.x86_64",
            "SUSE Real Time Module 15 SP4:kernel-source-rt-5.14.21-150400.15.5.1.noarch",
            "SUSE Real Time Module 15 SP4:kernel-syms-rt-5.14.21-150400.15.5.1.x86_64",
            "SUSE Real Time Module 15 SP4:ocfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64",
            "openSUSE Leap 15.4:cluster-md-kmp-rt-5.14.21-150400.15.5.1.x86_64",
            "openSUSE Leap 15.4:dlm-kmp-rt-5.14.21-150400.15.5.1.x86_64",
            "openSUSE Leap 15.4:gfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64",
            "openSUSE Leap 15.4:kernel-devel-rt-5.14.21-150400.15.5.1.noarch",
            "openSUSE Leap 15.4:kernel-rt-5.14.21-150400.15.5.1.x86_64",
            "openSUSE Leap 15.4:kernel-rt-devel-5.14.21-150400.15.5.1.x86_64",
            "openSUSE Leap 15.4:kernel-rt_debug-5.14.21-150400.15.5.1.x86_64",
            "openSUSE Leap 15.4:kernel-rt_debug-devel-5.14.21-150400.15.5.1.x86_64",
            "openSUSE Leap 15.4:kernel-source-rt-5.14.21-150400.15.5.1.noarch",
            "openSUSE Leap 15.4:kernel-syms-rt-5.14.21-150400.15.5.1.x86_64",
            "openSUSE Leap 15.4:ocfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 6.3,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:A/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:H",
            "version": "3.1"
          },
          "products": [
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_15_5-rt-1-150400.1.3.1.x86_64",
            "SUSE Real Time Module 15 SP4:cluster-md-kmp-rt-5.14.21-150400.15.5.1.x86_64",
            "SUSE Real Time Module 15 SP4:dlm-kmp-rt-5.14.21-150400.15.5.1.x86_64",
            "SUSE Real Time Module 15 SP4:gfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64",
            "SUSE Real Time Module 15 SP4:kernel-devel-rt-5.14.21-150400.15.5.1.noarch",
            "SUSE Real Time Module 15 SP4:kernel-rt-5.14.21-150400.15.5.1.x86_64",
            "SUSE Real Time Module 15 SP4:kernel-rt-devel-5.14.21-150400.15.5.1.x86_64",
            "SUSE Real Time Module 15 SP4:kernel-rt_debug-5.14.21-150400.15.5.1.x86_64",
            "SUSE Real Time Module 15 SP4:kernel-rt_debug-devel-5.14.21-150400.15.5.1.x86_64",
            "SUSE Real Time Module 15 SP4:kernel-source-rt-5.14.21-150400.15.5.1.noarch",
            "SUSE Real Time Module 15 SP4:kernel-syms-rt-5.14.21-150400.15.5.1.x86_64",
            "SUSE Real Time Module 15 SP4:ocfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64",
            "openSUSE Leap 15.4:cluster-md-kmp-rt-5.14.21-150400.15.5.1.x86_64",
            "openSUSE Leap 15.4:dlm-kmp-rt-5.14.21-150400.15.5.1.x86_64",
            "openSUSE Leap 15.4:gfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64",
            "openSUSE Leap 15.4:kernel-devel-rt-5.14.21-150400.15.5.1.noarch",
            "openSUSE Leap 15.4:kernel-rt-5.14.21-150400.15.5.1.x86_64",
            "openSUSE Leap 15.4:kernel-rt-devel-5.14.21-150400.15.5.1.x86_64",
            "openSUSE Leap 15.4:kernel-rt_debug-5.14.21-150400.15.5.1.x86_64",
            "openSUSE Leap 15.4:kernel-rt_debug-devel-5.14.21-150400.15.5.1.x86_64",
            "openSUSE Leap 15.4:kernel-source-rt-5.14.21-150400.15.5.1.noarch",
            "openSUSE Leap 15.4:kernel-syms-rt-5.14.21-150400.15.5.1.x86_64",
            "openSUSE Leap 15.4:ocfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2022-12-23T10:39:17Z",
          "details": "moderate"
        }
      ],
      "title": "CVE-2022-3643"
    },
    {
      "cve": "CVE-2022-3646",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2022-3646"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "A vulnerability, which was classified as problematic, has been found in Linux Kernel. This issue affects the function nilfs_attach_log_writer of the file fs/nilfs2/segment.c of the component BPF. The manipulation leads to memory leak. The attack may be initiated remotely. It is recommended to apply a patch to fix this issue. The identifier VDB-211961 was assigned to this vulnerability.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_15_5-rt-1-150400.1.3.1.x86_64",
          "SUSE Real Time Module 15 SP4:cluster-md-kmp-rt-5.14.21-150400.15.5.1.x86_64",
          "SUSE Real Time Module 15 SP4:dlm-kmp-rt-5.14.21-150400.15.5.1.x86_64",
          "SUSE Real Time Module 15 SP4:gfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64",
          "SUSE Real Time Module 15 SP4:kernel-devel-rt-5.14.21-150400.15.5.1.noarch",
          "SUSE Real Time Module 15 SP4:kernel-rt-5.14.21-150400.15.5.1.x86_64",
          "SUSE Real Time Module 15 SP4:kernel-rt-devel-5.14.21-150400.15.5.1.x86_64",
          "SUSE Real Time Module 15 SP4:kernel-rt_debug-5.14.21-150400.15.5.1.x86_64",
          "SUSE Real Time Module 15 SP4:kernel-rt_debug-devel-5.14.21-150400.15.5.1.x86_64",
          "SUSE Real Time Module 15 SP4:kernel-source-rt-5.14.21-150400.15.5.1.noarch",
          "SUSE Real Time Module 15 SP4:kernel-syms-rt-5.14.21-150400.15.5.1.x86_64",
          "SUSE Real Time Module 15 SP4:ocfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64",
          "openSUSE Leap 15.4:cluster-md-kmp-rt-5.14.21-150400.15.5.1.x86_64",
          "openSUSE Leap 15.4:dlm-kmp-rt-5.14.21-150400.15.5.1.x86_64",
          "openSUSE Leap 15.4:gfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64",
          "openSUSE Leap 15.4:kernel-devel-rt-5.14.21-150400.15.5.1.noarch",
          "openSUSE Leap 15.4:kernel-rt-5.14.21-150400.15.5.1.x86_64",
          "openSUSE Leap 15.4:kernel-rt-devel-5.14.21-150400.15.5.1.x86_64",
          "openSUSE Leap 15.4:kernel-rt_debug-5.14.21-150400.15.5.1.x86_64",
          "openSUSE Leap 15.4:kernel-rt_debug-devel-5.14.21-150400.15.5.1.x86_64",
          "openSUSE Leap 15.4:kernel-source-rt-5.14.21-150400.15.5.1.noarch",
          "openSUSE Leap 15.4:kernel-syms-rt-5.14.21-150400.15.5.1.x86_64",
          "openSUSE Leap 15.4:ocfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2022-3646",
          "url": "https://www.suse.com/security/cve/CVE-2022-3646"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1204646 for CVE-2022-3646",
          "url": "https://bugzilla.suse.com/1204646"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_15_5-rt-1-150400.1.3.1.x86_64",
            "SUSE Real Time Module 15 SP4:cluster-md-kmp-rt-5.14.21-150400.15.5.1.x86_64",
            "SUSE Real Time Module 15 SP4:dlm-kmp-rt-5.14.21-150400.15.5.1.x86_64",
            "SUSE Real Time Module 15 SP4:gfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64",
            "SUSE Real Time Module 15 SP4:kernel-devel-rt-5.14.21-150400.15.5.1.noarch",
            "SUSE Real Time Module 15 SP4:kernel-rt-5.14.21-150400.15.5.1.x86_64",
            "SUSE Real Time Module 15 SP4:kernel-rt-devel-5.14.21-150400.15.5.1.x86_64",
            "SUSE Real Time Module 15 SP4:kernel-rt_debug-5.14.21-150400.15.5.1.x86_64",
            "SUSE Real Time Module 15 SP4:kernel-rt_debug-devel-5.14.21-150400.15.5.1.x86_64",
            "SUSE Real Time Module 15 SP4:kernel-source-rt-5.14.21-150400.15.5.1.noarch",
            "SUSE Real Time Module 15 SP4:kernel-syms-rt-5.14.21-150400.15.5.1.x86_64",
            "SUSE Real Time Module 15 SP4:ocfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64",
            "openSUSE Leap 15.4:cluster-md-kmp-rt-5.14.21-150400.15.5.1.x86_64",
            "openSUSE Leap 15.4:dlm-kmp-rt-5.14.21-150400.15.5.1.x86_64",
            "openSUSE Leap 15.4:gfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64",
            "openSUSE Leap 15.4:kernel-devel-rt-5.14.21-150400.15.5.1.noarch",
            "openSUSE Leap 15.4:kernel-rt-5.14.21-150400.15.5.1.x86_64",
            "openSUSE Leap 15.4:kernel-rt-devel-5.14.21-150400.15.5.1.x86_64",
            "openSUSE Leap 15.4:kernel-rt_debug-5.14.21-150400.15.5.1.x86_64",
            "openSUSE Leap 15.4:kernel-rt_debug-devel-5.14.21-150400.15.5.1.x86_64",
            "openSUSE Leap 15.4:kernel-source-rt-5.14.21-150400.15.5.1.noarch",
            "openSUSE Leap 15.4:kernel-syms-rt-5.14.21-150400.15.5.1.x86_64",
            "openSUSE Leap 15.4:ocfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 2.5,
            "baseSeverity": "LOW",
            "vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:L",
            "version": "3.1"
          },
          "products": [
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_15_5-rt-1-150400.1.3.1.x86_64",
            "SUSE Real Time Module 15 SP4:cluster-md-kmp-rt-5.14.21-150400.15.5.1.x86_64",
            "SUSE Real Time Module 15 SP4:dlm-kmp-rt-5.14.21-150400.15.5.1.x86_64",
            "SUSE Real Time Module 15 SP4:gfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64",
            "SUSE Real Time Module 15 SP4:kernel-devel-rt-5.14.21-150400.15.5.1.noarch",
            "SUSE Real Time Module 15 SP4:kernel-rt-5.14.21-150400.15.5.1.x86_64",
            "SUSE Real Time Module 15 SP4:kernel-rt-devel-5.14.21-150400.15.5.1.x86_64",
            "SUSE Real Time Module 15 SP4:kernel-rt_debug-5.14.21-150400.15.5.1.x86_64",
            "SUSE Real Time Module 15 SP4:kernel-rt_debug-devel-5.14.21-150400.15.5.1.x86_64",
            "SUSE Real Time Module 15 SP4:kernel-source-rt-5.14.21-150400.15.5.1.noarch",
            "SUSE Real Time Module 15 SP4:kernel-syms-rt-5.14.21-150400.15.5.1.x86_64",
            "SUSE Real Time Module 15 SP4:ocfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64",
            "openSUSE Leap 15.4:cluster-md-kmp-rt-5.14.21-150400.15.5.1.x86_64",
            "openSUSE Leap 15.4:dlm-kmp-rt-5.14.21-150400.15.5.1.x86_64",
            "openSUSE Leap 15.4:gfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64",
            "openSUSE Leap 15.4:kernel-devel-rt-5.14.21-150400.15.5.1.noarch",
            "openSUSE Leap 15.4:kernel-rt-5.14.21-150400.15.5.1.x86_64",
            "openSUSE Leap 15.4:kernel-rt-devel-5.14.21-150400.15.5.1.x86_64",
            "openSUSE Leap 15.4:kernel-rt_debug-5.14.21-150400.15.5.1.x86_64",
            "openSUSE Leap 15.4:kernel-rt_debug-devel-5.14.21-150400.15.5.1.x86_64",
            "openSUSE Leap 15.4:kernel-source-rt-5.14.21-150400.15.5.1.noarch",
            "openSUSE Leap 15.4:kernel-syms-rt-5.14.21-150400.15.5.1.x86_64",
            "openSUSE Leap 15.4:ocfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2022-12-23T10:39:17Z",
          "details": "low"
        }
      ],
      "title": "CVE-2022-3646"
    },
    {
      "cve": "CVE-2022-3649",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2022-3649"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "A vulnerability was found in Linux Kernel. It has been classified as problematic. Affected is the function nilfs_new_inode of the file fs/nilfs2/inode.c of the component BPF. The manipulation leads to use after free. It is possible to launch the attack remotely. It is recommended to apply a patch to fix this issue. The identifier of this vulnerability is VDB-211992.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_15_5-rt-1-150400.1.3.1.x86_64",
          "SUSE Real Time Module 15 SP4:cluster-md-kmp-rt-5.14.21-150400.15.5.1.x86_64",
          "SUSE Real Time Module 15 SP4:dlm-kmp-rt-5.14.21-150400.15.5.1.x86_64",
          "SUSE Real Time Module 15 SP4:gfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64",
          "SUSE Real Time Module 15 SP4:kernel-devel-rt-5.14.21-150400.15.5.1.noarch",
          "SUSE Real Time Module 15 SP4:kernel-rt-5.14.21-150400.15.5.1.x86_64",
          "SUSE Real Time Module 15 SP4:kernel-rt-devel-5.14.21-150400.15.5.1.x86_64",
          "SUSE Real Time Module 15 SP4:kernel-rt_debug-5.14.21-150400.15.5.1.x86_64",
          "SUSE Real Time Module 15 SP4:kernel-rt_debug-devel-5.14.21-150400.15.5.1.x86_64",
          "SUSE Real Time Module 15 SP4:kernel-source-rt-5.14.21-150400.15.5.1.noarch",
          "SUSE Real Time Module 15 SP4:kernel-syms-rt-5.14.21-150400.15.5.1.x86_64",
          "SUSE Real Time Module 15 SP4:ocfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64",
          "openSUSE Leap 15.4:cluster-md-kmp-rt-5.14.21-150400.15.5.1.x86_64",
          "openSUSE Leap 15.4:dlm-kmp-rt-5.14.21-150400.15.5.1.x86_64",
          "openSUSE Leap 15.4:gfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64",
          "openSUSE Leap 15.4:kernel-devel-rt-5.14.21-150400.15.5.1.noarch",
          "openSUSE Leap 15.4:kernel-rt-5.14.21-150400.15.5.1.x86_64",
          "openSUSE Leap 15.4:kernel-rt-devel-5.14.21-150400.15.5.1.x86_64",
          "openSUSE Leap 15.4:kernel-rt_debug-5.14.21-150400.15.5.1.x86_64",
          "openSUSE Leap 15.4:kernel-rt_debug-devel-5.14.21-150400.15.5.1.x86_64",
          "openSUSE Leap 15.4:kernel-source-rt-5.14.21-150400.15.5.1.noarch",
          "openSUSE Leap 15.4:kernel-syms-rt-5.14.21-150400.15.5.1.x86_64",
          "openSUSE Leap 15.4:ocfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2022-3649",
          "url": "https://www.suse.com/security/cve/CVE-2022-3649"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1204647 for CVE-2022-3649",
          "url": "https://bugzilla.suse.com/1204647"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1212318 for CVE-2022-3649",
          "url": "https://bugzilla.suse.com/1212318"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_15_5-rt-1-150400.1.3.1.x86_64",
            "SUSE Real Time Module 15 SP4:cluster-md-kmp-rt-5.14.21-150400.15.5.1.x86_64",
            "SUSE Real Time Module 15 SP4:dlm-kmp-rt-5.14.21-150400.15.5.1.x86_64",
            "SUSE Real Time Module 15 SP4:gfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64",
            "SUSE Real Time Module 15 SP4:kernel-devel-rt-5.14.21-150400.15.5.1.noarch",
            "SUSE Real Time Module 15 SP4:kernel-rt-5.14.21-150400.15.5.1.x86_64",
            "SUSE Real Time Module 15 SP4:kernel-rt-devel-5.14.21-150400.15.5.1.x86_64",
            "SUSE Real Time Module 15 SP4:kernel-rt_debug-5.14.21-150400.15.5.1.x86_64",
            "SUSE Real Time Module 15 SP4:kernel-rt_debug-devel-5.14.21-150400.15.5.1.x86_64",
            "SUSE Real Time Module 15 SP4:kernel-source-rt-5.14.21-150400.15.5.1.noarch",
            "SUSE Real Time Module 15 SP4:kernel-syms-rt-5.14.21-150400.15.5.1.x86_64",
            "SUSE Real Time Module 15 SP4:ocfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64",
            "openSUSE Leap 15.4:cluster-md-kmp-rt-5.14.21-150400.15.5.1.x86_64",
            "openSUSE Leap 15.4:dlm-kmp-rt-5.14.21-150400.15.5.1.x86_64",
            "openSUSE Leap 15.4:gfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64",
            "openSUSE Leap 15.4:kernel-devel-rt-5.14.21-150400.15.5.1.noarch",
            "openSUSE Leap 15.4:kernel-rt-5.14.21-150400.15.5.1.x86_64",
            "openSUSE Leap 15.4:kernel-rt-devel-5.14.21-150400.15.5.1.x86_64",
            "openSUSE Leap 15.4:kernel-rt_debug-5.14.21-150400.15.5.1.x86_64",
            "openSUSE Leap 15.4:kernel-rt_debug-devel-5.14.21-150400.15.5.1.x86_64",
            "openSUSE Leap 15.4:kernel-source-rt-5.14.21-150400.15.5.1.noarch",
            "openSUSE Leap 15.4:kernel-syms-rt-5.14.21-150400.15.5.1.x86_64",
            "openSUSE Leap 15.4:ocfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 3.1,
            "baseSeverity": "LOW",
            "vectorString": "CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:L",
            "version": "3.1"
          },
          "products": [
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_15_5-rt-1-150400.1.3.1.x86_64",
            "SUSE Real Time Module 15 SP4:cluster-md-kmp-rt-5.14.21-150400.15.5.1.x86_64",
            "SUSE Real Time Module 15 SP4:dlm-kmp-rt-5.14.21-150400.15.5.1.x86_64",
            "SUSE Real Time Module 15 SP4:gfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64",
            "SUSE Real Time Module 15 SP4:kernel-devel-rt-5.14.21-150400.15.5.1.noarch",
            "SUSE Real Time Module 15 SP4:kernel-rt-5.14.21-150400.15.5.1.x86_64",
            "SUSE Real Time Module 15 SP4:kernel-rt-devel-5.14.21-150400.15.5.1.x86_64",
            "SUSE Real Time Module 15 SP4:kernel-rt_debug-5.14.21-150400.15.5.1.x86_64",
            "SUSE Real Time Module 15 SP4:kernel-rt_debug-devel-5.14.21-150400.15.5.1.x86_64",
            "SUSE Real Time Module 15 SP4:kernel-source-rt-5.14.21-150400.15.5.1.noarch",
            "SUSE Real Time Module 15 SP4:kernel-syms-rt-5.14.21-150400.15.5.1.x86_64",
            "SUSE Real Time Module 15 SP4:ocfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64",
            "openSUSE Leap 15.4:cluster-md-kmp-rt-5.14.21-150400.15.5.1.x86_64",
            "openSUSE Leap 15.4:dlm-kmp-rt-5.14.21-150400.15.5.1.x86_64",
            "openSUSE Leap 15.4:gfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64",
            "openSUSE Leap 15.4:kernel-devel-rt-5.14.21-150400.15.5.1.noarch",
            "openSUSE Leap 15.4:kernel-rt-5.14.21-150400.15.5.1.x86_64",
            "openSUSE Leap 15.4:kernel-rt-devel-5.14.21-150400.15.5.1.x86_64",
            "openSUSE Leap 15.4:kernel-rt_debug-5.14.21-150400.15.5.1.x86_64",
            "openSUSE Leap 15.4:kernel-rt_debug-devel-5.14.21-150400.15.5.1.x86_64",
            "openSUSE Leap 15.4:kernel-source-rt-5.14.21-150400.15.5.1.noarch",
            "openSUSE Leap 15.4:kernel-syms-rt-5.14.21-150400.15.5.1.x86_64",
            "openSUSE Leap 15.4:ocfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2022-12-23T10:39:17Z",
          "details": "low"
        }
      ],
      "title": "CVE-2022-3649"
    },
    {
      "cve": "CVE-2022-36879",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2022-36879"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "An issue was discovered in the Linux kernel through 5.18.14. xfrm_expand_policies in net/xfrm/xfrm_policy.c can cause a refcount to be dropped twice.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_15_5-rt-1-150400.1.3.1.x86_64",
          "SUSE Real Time Module 15 SP4:cluster-md-kmp-rt-5.14.21-150400.15.5.1.x86_64",
          "SUSE Real Time Module 15 SP4:dlm-kmp-rt-5.14.21-150400.15.5.1.x86_64",
          "SUSE Real Time Module 15 SP4:gfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64",
          "SUSE Real Time Module 15 SP4:kernel-devel-rt-5.14.21-150400.15.5.1.noarch",
          "SUSE Real Time Module 15 SP4:kernel-rt-5.14.21-150400.15.5.1.x86_64",
          "SUSE Real Time Module 15 SP4:kernel-rt-devel-5.14.21-150400.15.5.1.x86_64",
          "SUSE Real Time Module 15 SP4:kernel-rt_debug-5.14.21-150400.15.5.1.x86_64",
          "SUSE Real Time Module 15 SP4:kernel-rt_debug-devel-5.14.21-150400.15.5.1.x86_64",
          "SUSE Real Time Module 15 SP4:kernel-source-rt-5.14.21-150400.15.5.1.noarch",
          "SUSE Real Time Module 15 SP4:kernel-syms-rt-5.14.21-150400.15.5.1.x86_64",
          "SUSE Real Time Module 15 SP4:ocfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64",
          "openSUSE Leap 15.4:cluster-md-kmp-rt-5.14.21-150400.15.5.1.x86_64",
          "openSUSE Leap 15.4:dlm-kmp-rt-5.14.21-150400.15.5.1.x86_64",
          "openSUSE Leap 15.4:gfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64",
          "openSUSE Leap 15.4:kernel-devel-rt-5.14.21-150400.15.5.1.noarch",
          "openSUSE Leap 15.4:kernel-rt-5.14.21-150400.15.5.1.x86_64",
          "openSUSE Leap 15.4:kernel-rt-devel-5.14.21-150400.15.5.1.x86_64",
          "openSUSE Leap 15.4:kernel-rt_debug-5.14.21-150400.15.5.1.x86_64",
          "openSUSE Leap 15.4:kernel-rt_debug-devel-5.14.21-150400.15.5.1.x86_64",
          "openSUSE Leap 15.4:kernel-source-rt-5.14.21-150400.15.5.1.noarch",
          "openSUSE Leap 15.4:kernel-syms-rt-5.14.21-150400.15.5.1.x86_64",
          "openSUSE Leap 15.4:ocfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2022-36879",
          "url": "https://www.suse.com/security/cve/CVE-2022-36879"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1201948 for CVE-2022-36879",
          "url": "https://bugzilla.suse.com/1201948"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1212327 for CVE-2022-36879",
          "url": "https://bugzilla.suse.com/1212327"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_15_5-rt-1-150400.1.3.1.x86_64",
            "SUSE Real Time Module 15 SP4:cluster-md-kmp-rt-5.14.21-150400.15.5.1.x86_64",
            "SUSE Real Time Module 15 SP4:dlm-kmp-rt-5.14.21-150400.15.5.1.x86_64",
            "SUSE Real Time Module 15 SP4:gfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64",
            "SUSE Real Time Module 15 SP4:kernel-devel-rt-5.14.21-150400.15.5.1.noarch",
            "SUSE Real Time Module 15 SP4:kernel-rt-5.14.21-150400.15.5.1.x86_64",
            "SUSE Real Time Module 15 SP4:kernel-rt-devel-5.14.21-150400.15.5.1.x86_64",
            "SUSE Real Time Module 15 SP4:kernel-rt_debug-5.14.21-150400.15.5.1.x86_64",
            "SUSE Real Time Module 15 SP4:kernel-rt_debug-devel-5.14.21-150400.15.5.1.x86_64",
            "SUSE Real Time Module 15 SP4:kernel-source-rt-5.14.21-150400.15.5.1.noarch",
            "SUSE Real Time Module 15 SP4:kernel-syms-rt-5.14.21-150400.15.5.1.x86_64",
            "SUSE Real Time Module 15 SP4:ocfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64",
            "openSUSE Leap 15.4:cluster-md-kmp-rt-5.14.21-150400.15.5.1.x86_64",
            "openSUSE Leap 15.4:dlm-kmp-rt-5.14.21-150400.15.5.1.x86_64",
            "openSUSE Leap 15.4:gfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64",
            "openSUSE Leap 15.4:kernel-devel-rt-5.14.21-150400.15.5.1.noarch",
            "openSUSE Leap 15.4:kernel-rt-5.14.21-150400.15.5.1.x86_64",
            "openSUSE Leap 15.4:kernel-rt-devel-5.14.21-150400.15.5.1.x86_64",
            "openSUSE Leap 15.4:kernel-rt_debug-5.14.21-150400.15.5.1.x86_64",
            "openSUSE Leap 15.4:kernel-rt_debug-devel-5.14.21-150400.15.5.1.x86_64",
            "openSUSE Leap 15.4:kernel-source-rt-5.14.21-150400.15.5.1.noarch",
            "openSUSE Leap 15.4:kernel-syms-rt-5.14.21-150400.15.5.1.x86_64",
            "openSUSE Leap 15.4:ocfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 4.1,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:N/I:N/A:H",
            "version": "3.1"
          },
          "products": [
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_15_5-rt-1-150400.1.3.1.x86_64",
            "SUSE Real Time Module 15 SP4:cluster-md-kmp-rt-5.14.21-150400.15.5.1.x86_64",
            "SUSE Real Time Module 15 SP4:dlm-kmp-rt-5.14.21-150400.15.5.1.x86_64",
            "SUSE Real Time Module 15 SP4:gfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64",
            "SUSE Real Time Module 15 SP4:kernel-devel-rt-5.14.21-150400.15.5.1.noarch",
            "SUSE Real Time Module 15 SP4:kernel-rt-5.14.21-150400.15.5.1.x86_64",
            "SUSE Real Time Module 15 SP4:kernel-rt-devel-5.14.21-150400.15.5.1.x86_64",
            "SUSE Real Time Module 15 SP4:kernel-rt_debug-5.14.21-150400.15.5.1.x86_64",
            "SUSE Real Time Module 15 SP4:kernel-rt_debug-devel-5.14.21-150400.15.5.1.x86_64",
            "SUSE Real Time Module 15 SP4:kernel-source-rt-5.14.21-150400.15.5.1.noarch",
            "SUSE Real Time Module 15 SP4:kernel-syms-rt-5.14.21-150400.15.5.1.x86_64",
            "SUSE Real Time Module 15 SP4:ocfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64",
            "openSUSE Leap 15.4:cluster-md-kmp-rt-5.14.21-150400.15.5.1.x86_64",
            "openSUSE Leap 15.4:dlm-kmp-rt-5.14.21-150400.15.5.1.x86_64",
            "openSUSE Leap 15.4:gfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64",
            "openSUSE Leap 15.4:kernel-devel-rt-5.14.21-150400.15.5.1.noarch",
            "openSUSE Leap 15.4:kernel-rt-5.14.21-150400.15.5.1.x86_64",
            "openSUSE Leap 15.4:kernel-rt-devel-5.14.21-150400.15.5.1.x86_64",
            "openSUSE Leap 15.4:kernel-rt_debug-5.14.21-150400.15.5.1.x86_64",
            "openSUSE Leap 15.4:kernel-rt_debug-devel-5.14.21-150400.15.5.1.x86_64",
            "openSUSE Leap 15.4:kernel-source-rt-5.14.21-150400.15.5.1.noarch",
            "openSUSE Leap 15.4:kernel-syms-rt-5.14.21-150400.15.5.1.x86_64",
            "openSUSE Leap 15.4:ocfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2022-12-23T10:39:17Z",
          "details": "moderate"
        }
      ],
      "title": "CVE-2022-36879"
    },
    {
      "cve": "CVE-2022-36946",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2022-36946"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "nfqnl_mangle in net/netfilter/nfnetlink_queue.c in the Linux kernel through 5.18.14 allows remote attackers to cause a denial of service (panic) because, in the case of an nf_queue verdict with a one-byte nfta_payload attribute, an skb_pull can encounter a negative skb-\u003elen.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_15_5-rt-1-150400.1.3.1.x86_64",
          "SUSE Real Time Module 15 SP4:cluster-md-kmp-rt-5.14.21-150400.15.5.1.x86_64",
          "SUSE Real Time Module 15 SP4:dlm-kmp-rt-5.14.21-150400.15.5.1.x86_64",
          "SUSE Real Time Module 15 SP4:gfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64",
          "SUSE Real Time Module 15 SP4:kernel-devel-rt-5.14.21-150400.15.5.1.noarch",
          "SUSE Real Time Module 15 SP4:kernel-rt-5.14.21-150400.15.5.1.x86_64",
          "SUSE Real Time Module 15 SP4:kernel-rt-devel-5.14.21-150400.15.5.1.x86_64",
          "SUSE Real Time Module 15 SP4:kernel-rt_debug-5.14.21-150400.15.5.1.x86_64",
          "SUSE Real Time Module 15 SP4:kernel-rt_debug-devel-5.14.21-150400.15.5.1.x86_64",
          "SUSE Real Time Module 15 SP4:kernel-source-rt-5.14.21-150400.15.5.1.noarch",
          "SUSE Real Time Module 15 SP4:kernel-syms-rt-5.14.21-150400.15.5.1.x86_64",
          "SUSE Real Time Module 15 SP4:ocfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64",
          "openSUSE Leap 15.4:cluster-md-kmp-rt-5.14.21-150400.15.5.1.x86_64",
          "openSUSE Leap 15.4:dlm-kmp-rt-5.14.21-150400.15.5.1.x86_64",
          "openSUSE Leap 15.4:gfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64",
          "openSUSE Leap 15.4:kernel-devel-rt-5.14.21-150400.15.5.1.noarch",
          "openSUSE Leap 15.4:kernel-rt-5.14.21-150400.15.5.1.x86_64",
          "openSUSE Leap 15.4:kernel-rt-devel-5.14.21-150400.15.5.1.x86_64",
          "openSUSE Leap 15.4:kernel-rt_debug-5.14.21-150400.15.5.1.x86_64",
          "openSUSE Leap 15.4:kernel-rt_debug-devel-5.14.21-150400.15.5.1.x86_64",
          "openSUSE Leap 15.4:kernel-source-rt-5.14.21-150400.15.5.1.noarch",
          "openSUSE Leap 15.4:kernel-syms-rt-5.14.21-150400.15.5.1.x86_64",
          "openSUSE Leap 15.4:ocfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2022-36946",
          "url": "https://www.suse.com/security/cve/CVE-2022-36946"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1201940 for CVE-2022-36946",
          "url": "https://bugzilla.suse.com/1201940"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1201941 for CVE-2022-36946",
          "url": "https://bugzilla.suse.com/1201941"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1202312 for CVE-2022-36946",
          "url": "https://bugzilla.suse.com/1202312"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1202874 for CVE-2022-36946",
          "url": "https://bugzilla.suse.com/1202874"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1203208 for CVE-2022-36946",
          "url": "https://bugzilla.suse.com/1203208"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1204132 for CVE-2022-36946",
          "url": "https://bugzilla.suse.com/1204132"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1205313 for CVE-2022-36946",
          "url": "https://bugzilla.suse.com/1205313"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1212310 for CVE-2022-36946",
          "url": "https://bugzilla.suse.com/1212310"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_15_5-rt-1-150400.1.3.1.x86_64",
            "SUSE Real Time Module 15 SP4:cluster-md-kmp-rt-5.14.21-150400.15.5.1.x86_64",
            "SUSE Real Time Module 15 SP4:dlm-kmp-rt-5.14.21-150400.15.5.1.x86_64",
            "SUSE Real Time Module 15 SP4:gfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64",
            "SUSE Real Time Module 15 SP4:kernel-devel-rt-5.14.21-150400.15.5.1.noarch",
            "SUSE Real Time Module 15 SP4:kernel-rt-5.14.21-150400.15.5.1.x86_64",
            "SUSE Real Time Module 15 SP4:kernel-rt-devel-5.14.21-150400.15.5.1.x86_64",
            "SUSE Real Time Module 15 SP4:kernel-rt_debug-5.14.21-150400.15.5.1.x86_64",
            "SUSE Real Time Module 15 SP4:kernel-rt_debug-devel-5.14.21-150400.15.5.1.x86_64",
            "SUSE Real Time Module 15 SP4:kernel-source-rt-5.14.21-150400.15.5.1.noarch",
            "SUSE Real Time Module 15 SP4:kernel-syms-rt-5.14.21-150400.15.5.1.x86_64",
            "SUSE Real Time Module 15 SP4:ocfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64",
            "openSUSE Leap 15.4:cluster-md-kmp-rt-5.14.21-150400.15.5.1.x86_64",
            "openSUSE Leap 15.4:dlm-kmp-rt-5.14.21-150400.15.5.1.x86_64",
            "openSUSE Leap 15.4:gfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64",
            "openSUSE Leap 15.4:kernel-devel-rt-5.14.21-150400.15.5.1.noarch",
            "openSUSE Leap 15.4:kernel-rt-5.14.21-150400.15.5.1.x86_64",
            "openSUSE Leap 15.4:kernel-rt-devel-5.14.21-150400.15.5.1.x86_64",
            "openSUSE Leap 15.4:kernel-rt_debug-5.14.21-150400.15.5.1.x86_64",
            "openSUSE Leap 15.4:kernel-rt_debug-devel-5.14.21-150400.15.5.1.x86_64",
            "openSUSE Leap 15.4:kernel-source-rt-5.14.21-150400.15.5.1.noarch",
            "openSUSE Leap 15.4:kernel-syms-rt-5.14.21-150400.15.5.1.x86_64",
            "openSUSE Leap 15.4:ocfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 7.5,
            "baseSeverity": "HIGH",
            "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
            "version": "3.1"
          },
          "products": [
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_15_5-rt-1-150400.1.3.1.x86_64",
            "SUSE Real Time Module 15 SP4:cluster-md-kmp-rt-5.14.21-150400.15.5.1.x86_64",
            "SUSE Real Time Module 15 SP4:dlm-kmp-rt-5.14.21-150400.15.5.1.x86_64",
            "SUSE Real Time Module 15 SP4:gfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64",
            "SUSE Real Time Module 15 SP4:kernel-devel-rt-5.14.21-150400.15.5.1.noarch",
            "SUSE Real Time Module 15 SP4:kernel-rt-5.14.21-150400.15.5.1.x86_64",
            "SUSE Real Time Module 15 SP4:kernel-rt-devel-5.14.21-150400.15.5.1.x86_64",
            "SUSE Real Time Module 15 SP4:kernel-rt_debug-5.14.21-150400.15.5.1.x86_64",
            "SUSE Real Time Module 15 SP4:kernel-rt_debug-devel-5.14.21-150400.15.5.1.x86_64",
            "SUSE Real Time Module 15 SP4:kernel-source-rt-5.14.21-150400.15.5.1.noarch",
            "SUSE Real Time Module 15 SP4:kernel-syms-rt-5.14.21-150400.15.5.1.x86_64",
            "SUSE Real Time Module 15 SP4:ocfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64",
            "openSUSE Leap 15.4:cluster-md-kmp-rt-5.14.21-150400.15.5.1.x86_64",
            "openSUSE Leap 15.4:dlm-kmp-rt-5.14.21-150400.15.5.1.x86_64",
            "openSUSE Leap 15.4:gfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64",
            "openSUSE Leap 15.4:kernel-devel-rt-5.14.21-150400.15.5.1.noarch",
            "openSUSE Leap 15.4:kernel-rt-5.14.21-150400.15.5.1.x86_64",
            "openSUSE Leap 15.4:kernel-rt-devel-5.14.21-150400.15.5.1.x86_64",
            "openSUSE Leap 15.4:kernel-rt_debug-5.14.21-150400.15.5.1.x86_64",
            "openSUSE Leap 15.4:kernel-rt_debug-devel-5.14.21-150400.15.5.1.x86_64",
            "openSUSE Leap 15.4:kernel-source-rt-5.14.21-150400.15.5.1.noarch",
            "openSUSE Leap 15.4:kernel-syms-rt-5.14.21-150400.15.5.1.x86_64",
            "openSUSE Leap 15.4:ocfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2022-12-23T10:39:17Z",
          "details": "important"
        }
      ],
      "title": "CVE-2022-36946"
    },
    {
      "cve": "CVE-2022-3707",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2022-3707"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "A double-free memory flaw was found in the Linux kernel. The Intel GVT-g graphics driver triggers VGA card system resource overload, causing a fail in the intel_gvt_dma_map_guest_page function. This issue could allow a local user to crash the system.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_15_5-rt-1-150400.1.3.1.x86_64",
          "SUSE Real Time Module 15 SP4:cluster-md-kmp-rt-5.14.21-150400.15.5.1.x86_64",
          "SUSE Real Time Module 15 SP4:dlm-kmp-rt-5.14.21-150400.15.5.1.x86_64",
          "SUSE Real Time Module 15 SP4:gfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64",
          "SUSE Real Time Module 15 SP4:kernel-devel-rt-5.14.21-150400.15.5.1.noarch",
          "SUSE Real Time Module 15 SP4:kernel-rt-5.14.21-150400.15.5.1.x86_64",
          "SUSE Real Time Module 15 SP4:kernel-rt-devel-5.14.21-150400.15.5.1.x86_64",
          "SUSE Real Time Module 15 SP4:kernel-rt_debug-5.14.21-150400.15.5.1.x86_64",
          "SUSE Real Time Module 15 SP4:kernel-rt_debug-devel-5.14.21-150400.15.5.1.x86_64",
          "SUSE Real Time Module 15 SP4:kernel-source-rt-5.14.21-150400.15.5.1.noarch",
          "SUSE Real Time Module 15 SP4:kernel-syms-rt-5.14.21-150400.15.5.1.x86_64",
          "SUSE Real Time Module 15 SP4:ocfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64",
          "openSUSE Leap 15.4:cluster-md-kmp-rt-5.14.21-150400.15.5.1.x86_64",
          "openSUSE Leap 15.4:dlm-kmp-rt-5.14.21-150400.15.5.1.x86_64",
          "openSUSE Leap 15.4:gfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64",
          "openSUSE Leap 15.4:kernel-devel-rt-5.14.21-150400.15.5.1.noarch",
          "openSUSE Leap 15.4:kernel-rt-5.14.21-150400.15.5.1.x86_64",
          "openSUSE Leap 15.4:kernel-rt-devel-5.14.21-150400.15.5.1.x86_64",
          "openSUSE Leap 15.4:kernel-rt_debug-5.14.21-150400.15.5.1.x86_64",
          "openSUSE Leap 15.4:kernel-rt_debug-devel-5.14.21-150400.15.5.1.x86_64",
          "openSUSE Leap 15.4:kernel-source-rt-5.14.21-150400.15.5.1.noarch",
          "openSUSE Leap 15.4:kernel-syms-rt-5.14.21-150400.15.5.1.x86_64",
          "openSUSE Leap 15.4:ocfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2022-3707",
          "url": "https://www.suse.com/security/cve/CVE-2022-3707"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1204780 for CVE-2022-3707",
          "url": "https://bugzilla.suse.com/1204780"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_15_5-rt-1-150400.1.3.1.x86_64",
            "SUSE Real Time Module 15 SP4:cluster-md-kmp-rt-5.14.21-150400.15.5.1.x86_64",
            "SUSE Real Time Module 15 SP4:dlm-kmp-rt-5.14.21-150400.15.5.1.x86_64",
            "SUSE Real Time Module 15 SP4:gfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64",
            "SUSE Real Time Module 15 SP4:kernel-devel-rt-5.14.21-150400.15.5.1.noarch",
            "SUSE Real Time Module 15 SP4:kernel-rt-5.14.21-150400.15.5.1.x86_64",
            "SUSE Real Time Module 15 SP4:kernel-rt-devel-5.14.21-150400.15.5.1.x86_64",
            "SUSE Real Time Module 15 SP4:kernel-rt_debug-5.14.21-150400.15.5.1.x86_64",
            "SUSE Real Time Module 15 SP4:kernel-rt_debug-devel-5.14.21-150400.15.5.1.x86_64",
            "SUSE Real Time Module 15 SP4:kernel-source-rt-5.14.21-150400.15.5.1.noarch",
            "SUSE Real Time Module 15 SP4:kernel-syms-rt-5.14.21-150400.15.5.1.x86_64",
            "SUSE Real Time Module 15 SP4:ocfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64",
            "openSUSE Leap 15.4:cluster-md-kmp-rt-5.14.21-150400.15.5.1.x86_64",
            "openSUSE Leap 15.4:dlm-kmp-rt-5.14.21-150400.15.5.1.x86_64",
            "openSUSE Leap 15.4:gfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64",
            "openSUSE Leap 15.4:kernel-devel-rt-5.14.21-150400.15.5.1.noarch",
            "openSUSE Leap 15.4:kernel-rt-5.14.21-150400.15.5.1.x86_64",
            "openSUSE Leap 15.4:kernel-rt-devel-5.14.21-150400.15.5.1.x86_64",
            "openSUSE Leap 15.4:kernel-rt_debug-5.14.21-150400.15.5.1.x86_64",
            "openSUSE Leap 15.4:kernel-rt_debug-devel-5.14.21-150400.15.5.1.x86_64",
            "openSUSE Leap 15.4:kernel-source-rt-5.14.21-150400.15.5.1.noarch",
            "openSUSE Leap 15.4:kernel-syms-rt-5.14.21-150400.15.5.1.x86_64",
            "openSUSE Leap 15.4:ocfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 5.1,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H",
            "version": "3.1"
          },
          "products": [
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_15_5-rt-1-150400.1.3.1.x86_64",
            "SUSE Real Time Module 15 SP4:cluster-md-kmp-rt-5.14.21-150400.15.5.1.x86_64",
            "SUSE Real Time Module 15 SP4:dlm-kmp-rt-5.14.21-150400.15.5.1.x86_64",
            "SUSE Real Time Module 15 SP4:gfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64",
            "SUSE Real Time Module 15 SP4:kernel-devel-rt-5.14.21-150400.15.5.1.noarch",
            "SUSE Real Time Module 15 SP4:kernel-rt-5.14.21-150400.15.5.1.x86_64",
            "SUSE Real Time Module 15 SP4:kernel-rt-devel-5.14.21-150400.15.5.1.x86_64",
            "SUSE Real Time Module 15 SP4:kernel-rt_debug-5.14.21-150400.15.5.1.x86_64",
            "SUSE Real Time Module 15 SP4:kernel-rt_debug-devel-5.14.21-150400.15.5.1.x86_64",
            "SUSE Real Time Module 15 SP4:kernel-source-rt-5.14.21-150400.15.5.1.noarch",
            "SUSE Real Time Module 15 SP4:kernel-syms-rt-5.14.21-150400.15.5.1.x86_64",
            "SUSE Real Time Module 15 SP4:ocfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64",
            "openSUSE Leap 15.4:cluster-md-kmp-rt-5.14.21-150400.15.5.1.x86_64",
            "openSUSE Leap 15.4:dlm-kmp-rt-5.14.21-150400.15.5.1.x86_64",
            "openSUSE Leap 15.4:gfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64",
            "openSUSE Leap 15.4:kernel-devel-rt-5.14.21-150400.15.5.1.noarch",
            "openSUSE Leap 15.4:kernel-rt-5.14.21-150400.15.5.1.x86_64",
            "openSUSE Leap 15.4:kernel-rt-devel-5.14.21-150400.15.5.1.x86_64",
            "openSUSE Leap 15.4:kernel-rt_debug-5.14.21-150400.15.5.1.x86_64",
            "openSUSE Leap 15.4:kernel-rt_debug-devel-5.14.21-150400.15.5.1.x86_64",
            "openSUSE Leap 15.4:kernel-source-rt-5.14.21-150400.15.5.1.noarch",
            "openSUSE Leap 15.4:kernel-syms-rt-5.14.21-150400.15.5.1.x86_64",
            "openSUSE Leap 15.4:ocfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2022-12-23T10:39:17Z",
          "details": "moderate"
        }
      ],
      "title": "CVE-2022-3707"
    },
    {
      "cve": "CVE-2022-3903",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2022-3903"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "An incorrect read request flaw was found in the Infrared Transceiver USB driver in the Linux kernel. This issue occurs when a user attaches a malicious USB device. A local user could use this flaw to starve the resources, causing denial of service or potentially crashing the system.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_15_5-rt-1-150400.1.3.1.x86_64",
          "SUSE Real Time Module 15 SP4:cluster-md-kmp-rt-5.14.21-150400.15.5.1.x86_64",
          "SUSE Real Time Module 15 SP4:dlm-kmp-rt-5.14.21-150400.15.5.1.x86_64",
          "SUSE Real Time Module 15 SP4:gfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64",
          "SUSE Real Time Module 15 SP4:kernel-devel-rt-5.14.21-150400.15.5.1.noarch",
          "SUSE Real Time Module 15 SP4:kernel-rt-5.14.21-150400.15.5.1.x86_64",
          "SUSE Real Time Module 15 SP4:kernel-rt-devel-5.14.21-150400.15.5.1.x86_64",
          "SUSE Real Time Module 15 SP4:kernel-rt_debug-5.14.21-150400.15.5.1.x86_64",
          "SUSE Real Time Module 15 SP4:kernel-rt_debug-devel-5.14.21-150400.15.5.1.x86_64",
          "SUSE Real Time Module 15 SP4:kernel-source-rt-5.14.21-150400.15.5.1.noarch",
          "SUSE Real Time Module 15 SP4:kernel-syms-rt-5.14.21-150400.15.5.1.x86_64",
          "SUSE Real Time Module 15 SP4:ocfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64",
          "openSUSE Leap 15.4:cluster-md-kmp-rt-5.14.21-150400.15.5.1.x86_64",
          "openSUSE Leap 15.4:dlm-kmp-rt-5.14.21-150400.15.5.1.x86_64",
          "openSUSE Leap 15.4:gfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64",
          "openSUSE Leap 15.4:kernel-devel-rt-5.14.21-150400.15.5.1.noarch",
          "openSUSE Leap 15.4:kernel-rt-5.14.21-150400.15.5.1.x86_64",
          "openSUSE Leap 15.4:kernel-rt-devel-5.14.21-150400.15.5.1.x86_64",
          "openSUSE Leap 15.4:kernel-rt_debug-5.14.21-150400.15.5.1.x86_64",
          "openSUSE Leap 15.4:kernel-rt_debug-devel-5.14.21-150400.15.5.1.x86_64",
          "openSUSE Leap 15.4:kernel-source-rt-5.14.21-150400.15.5.1.noarch",
          "openSUSE Leap 15.4:kernel-syms-rt-5.14.21-150400.15.5.1.x86_64",
          "openSUSE Leap 15.4:ocfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2022-3903",
          "url": "https://www.suse.com/security/cve/CVE-2022-3903"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1205220 for CVE-2022-3903",
          "url": "https://bugzilla.suse.com/1205220"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1212297 for CVE-2022-3903",
          "url": "https://bugzilla.suse.com/1212297"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_15_5-rt-1-150400.1.3.1.x86_64",
            "SUSE Real Time Module 15 SP4:cluster-md-kmp-rt-5.14.21-150400.15.5.1.x86_64",
            "SUSE Real Time Module 15 SP4:dlm-kmp-rt-5.14.21-150400.15.5.1.x86_64",
            "SUSE Real Time Module 15 SP4:gfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64",
            "SUSE Real Time Module 15 SP4:kernel-devel-rt-5.14.21-150400.15.5.1.noarch",
            "SUSE Real Time Module 15 SP4:kernel-rt-5.14.21-150400.15.5.1.x86_64",
            "SUSE Real Time Module 15 SP4:kernel-rt-devel-5.14.21-150400.15.5.1.x86_64",
            "SUSE Real Time Module 15 SP4:kernel-rt_debug-5.14.21-150400.15.5.1.x86_64",
            "SUSE Real Time Module 15 SP4:kernel-rt_debug-devel-5.14.21-150400.15.5.1.x86_64",
            "SUSE Real Time Module 15 SP4:kernel-source-rt-5.14.21-150400.15.5.1.noarch",
            "SUSE Real Time Module 15 SP4:kernel-syms-rt-5.14.21-150400.15.5.1.x86_64",
            "SUSE Real Time Module 15 SP4:ocfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64",
            "openSUSE Leap 15.4:cluster-md-kmp-rt-5.14.21-150400.15.5.1.x86_64",
            "openSUSE Leap 15.4:dlm-kmp-rt-5.14.21-150400.15.5.1.x86_64",
            "openSUSE Leap 15.4:gfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64",
            "openSUSE Leap 15.4:kernel-devel-rt-5.14.21-150400.15.5.1.noarch",
            "openSUSE Leap 15.4:kernel-rt-5.14.21-150400.15.5.1.x86_64",
            "openSUSE Leap 15.4:kernel-rt-devel-5.14.21-150400.15.5.1.x86_64",
            "openSUSE Leap 15.4:kernel-rt_debug-5.14.21-150400.15.5.1.x86_64",
            "openSUSE Leap 15.4:kernel-rt_debug-devel-5.14.21-150400.15.5.1.x86_64",
            "openSUSE Leap 15.4:kernel-source-rt-5.14.21-150400.15.5.1.noarch",
            "openSUSE Leap 15.4:kernel-syms-rt-5.14.21-150400.15.5.1.x86_64",
            "openSUSE Leap 15.4:ocfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 5.5,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
            "version": "3.1"
          },
          "products": [
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_15_5-rt-1-150400.1.3.1.x86_64",
            "SUSE Real Time Module 15 SP4:cluster-md-kmp-rt-5.14.21-150400.15.5.1.x86_64",
            "SUSE Real Time Module 15 SP4:dlm-kmp-rt-5.14.21-150400.15.5.1.x86_64",
            "SUSE Real Time Module 15 SP4:gfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64",
            "SUSE Real Time Module 15 SP4:kernel-devel-rt-5.14.21-150400.15.5.1.noarch",
            "SUSE Real Time Module 15 SP4:kernel-rt-5.14.21-150400.15.5.1.x86_64",
            "SUSE Real Time Module 15 SP4:kernel-rt-devel-5.14.21-150400.15.5.1.x86_64",
            "SUSE Real Time Module 15 SP4:kernel-rt_debug-5.14.21-150400.15.5.1.x86_64",
            "SUSE Real Time Module 15 SP4:kernel-rt_debug-devel-5.14.21-150400.15.5.1.x86_64",
            "SUSE Real Time Module 15 SP4:kernel-source-rt-5.14.21-150400.15.5.1.noarch",
            "SUSE Real Time Module 15 SP4:kernel-syms-rt-5.14.21-150400.15.5.1.x86_64",
            "SUSE Real Time Module 15 SP4:ocfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64",
            "openSUSE Leap 15.4:cluster-md-kmp-rt-5.14.21-150400.15.5.1.x86_64",
            "openSUSE Leap 15.4:dlm-kmp-rt-5.14.21-150400.15.5.1.x86_64",
            "openSUSE Leap 15.4:gfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64",
            "openSUSE Leap 15.4:kernel-devel-rt-5.14.21-150400.15.5.1.noarch",
            "openSUSE Leap 15.4:kernel-rt-5.14.21-150400.15.5.1.x86_64",
            "openSUSE Leap 15.4:kernel-rt-devel-5.14.21-150400.15.5.1.x86_64",
            "openSUSE Leap 15.4:kernel-rt_debug-5.14.21-150400.15.5.1.x86_64",
            "openSUSE Leap 15.4:kernel-rt_debug-devel-5.14.21-150400.15.5.1.x86_64",
            "openSUSE Leap 15.4:kernel-source-rt-5.14.21-150400.15.5.1.noarch",
            "openSUSE Leap 15.4:kernel-syms-rt-5.14.21-150400.15.5.1.x86_64",
            "openSUSE Leap 15.4:ocfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2022-12-23T10:39:17Z",
          "details": "moderate"
        }
      ],
      "title": "CVE-2022-3903"
    },
    {
      "cve": "CVE-2022-39188",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2022-39188"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "An issue was discovered in include/asm-generic/tlb.h in the Linux kernel before 5.19. Because of a race condition (unmap_mapping_range versus munmap), a device driver can free a page while it still has stale TLB entries. This only occurs in situations with VM_PFNMAP VMAs.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_15_5-rt-1-150400.1.3.1.x86_64",
          "SUSE Real Time Module 15 SP4:cluster-md-kmp-rt-5.14.21-150400.15.5.1.x86_64",
          "SUSE Real Time Module 15 SP4:dlm-kmp-rt-5.14.21-150400.15.5.1.x86_64",
          "SUSE Real Time Module 15 SP4:gfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64",
          "SUSE Real Time Module 15 SP4:kernel-devel-rt-5.14.21-150400.15.5.1.noarch",
          "SUSE Real Time Module 15 SP4:kernel-rt-5.14.21-150400.15.5.1.x86_64",
          "SUSE Real Time Module 15 SP4:kernel-rt-devel-5.14.21-150400.15.5.1.x86_64",
          "SUSE Real Time Module 15 SP4:kernel-rt_debug-5.14.21-150400.15.5.1.x86_64",
          "SUSE Real Time Module 15 SP4:kernel-rt_debug-devel-5.14.21-150400.15.5.1.x86_64",
          "SUSE Real Time Module 15 SP4:kernel-source-rt-5.14.21-150400.15.5.1.noarch",
          "SUSE Real Time Module 15 SP4:kernel-syms-rt-5.14.21-150400.15.5.1.x86_64",
          "SUSE Real Time Module 15 SP4:ocfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64",
          "openSUSE Leap 15.4:cluster-md-kmp-rt-5.14.21-150400.15.5.1.x86_64",
          "openSUSE Leap 15.4:dlm-kmp-rt-5.14.21-150400.15.5.1.x86_64",
          "openSUSE Leap 15.4:gfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64",
          "openSUSE Leap 15.4:kernel-devel-rt-5.14.21-150400.15.5.1.noarch",
          "openSUSE Leap 15.4:kernel-rt-5.14.21-150400.15.5.1.x86_64",
          "openSUSE Leap 15.4:kernel-rt-devel-5.14.21-150400.15.5.1.x86_64",
          "openSUSE Leap 15.4:kernel-rt_debug-5.14.21-150400.15.5.1.x86_64",
          "openSUSE Leap 15.4:kernel-rt_debug-devel-5.14.21-150400.15.5.1.x86_64",
          "openSUSE Leap 15.4:kernel-source-rt-5.14.21-150400.15.5.1.noarch",
          "openSUSE Leap 15.4:kernel-syms-rt-5.14.21-150400.15.5.1.x86_64",
          "openSUSE Leap 15.4:ocfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2022-39188",
          "url": "https://www.suse.com/security/cve/CVE-2022-39188"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1203107 for CVE-2022-39188",
          "url": "https://bugzilla.suse.com/1203107"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1203116 for CVE-2022-39188",
          "url": "https://bugzilla.suse.com/1203116"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1205313 for CVE-2022-39188",
          "url": "https://bugzilla.suse.com/1205313"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1209225 for CVE-2022-39188",
          "url": "https://bugzilla.suse.com/1209225"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1212326 for CVE-2022-39188",
          "url": "https://bugzilla.suse.com/1212326"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_15_5-rt-1-150400.1.3.1.x86_64",
            "SUSE Real Time Module 15 SP4:cluster-md-kmp-rt-5.14.21-150400.15.5.1.x86_64",
            "SUSE Real Time Module 15 SP4:dlm-kmp-rt-5.14.21-150400.15.5.1.x86_64",
            "SUSE Real Time Module 15 SP4:gfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64",
            "SUSE Real Time Module 15 SP4:kernel-devel-rt-5.14.21-150400.15.5.1.noarch",
            "SUSE Real Time Module 15 SP4:kernel-rt-5.14.21-150400.15.5.1.x86_64",
            "SUSE Real Time Module 15 SP4:kernel-rt-devel-5.14.21-150400.15.5.1.x86_64",
            "SUSE Real Time Module 15 SP4:kernel-rt_debug-5.14.21-150400.15.5.1.x86_64",
            "SUSE Real Time Module 15 SP4:kernel-rt_debug-devel-5.14.21-150400.15.5.1.x86_64",
            "SUSE Real Time Module 15 SP4:kernel-source-rt-5.14.21-150400.15.5.1.noarch",
            "SUSE Real Time Module 15 SP4:kernel-syms-rt-5.14.21-150400.15.5.1.x86_64",
            "SUSE Real Time Module 15 SP4:ocfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64",
            "openSUSE Leap 15.4:cluster-md-kmp-rt-5.14.21-150400.15.5.1.x86_64",
            "openSUSE Leap 15.4:dlm-kmp-rt-5.14.21-150400.15.5.1.x86_64",
            "openSUSE Leap 15.4:gfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64",
            "openSUSE Leap 15.4:kernel-devel-rt-5.14.21-150400.15.5.1.noarch",
            "openSUSE Leap 15.4:kernel-rt-5.14.21-150400.15.5.1.x86_64",
            "openSUSE Leap 15.4:kernel-rt-devel-5.14.21-150400.15.5.1.x86_64",
            "openSUSE Leap 15.4:kernel-rt_debug-5.14.21-150400.15.5.1.x86_64",
            "openSUSE Leap 15.4:kernel-rt_debug-devel-5.14.21-150400.15.5.1.x86_64",
            "openSUSE Leap 15.4:kernel-source-rt-5.14.21-150400.15.5.1.noarch",
            "openSUSE Leap 15.4:kernel-syms-rt-5.14.21-150400.15.5.1.x86_64",
            "openSUSE Leap 15.4:ocfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 7,
            "baseSeverity": "HIGH",
            "vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H",
            "version": "3.1"
          },
          "products": [
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_15_5-rt-1-150400.1.3.1.x86_64",
            "SUSE Real Time Module 15 SP4:cluster-md-kmp-rt-5.14.21-150400.15.5.1.x86_64",
            "SUSE Real Time Module 15 SP4:dlm-kmp-rt-5.14.21-150400.15.5.1.x86_64",
            "SUSE Real Time Module 15 SP4:gfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64",
            "SUSE Real Time Module 15 SP4:kernel-devel-rt-5.14.21-150400.15.5.1.noarch",
            "SUSE Real Time Module 15 SP4:kernel-rt-5.14.21-150400.15.5.1.x86_64",
            "SUSE Real Time Module 15 SP4:kernel-rt-devel-5.14.21-150400.15.5.1.x86_64",
            "SUSE Real Time Module 15 SP4:kernel-rt_debug-5.14.21-150400.15.5.1.x86_64",
            "SUSE Real Time Module 15 SP4:kernel-rt_debug-devel-5.14.21-150400.15.5.1.x86_64",
            "SUSE Real Time Module 15 SP4:kernel-source-rt-5.14.21-150400.15.5.1.noarch",
            "SUSE Real Time Module 15 SP4:kernel-syms-rt-5.14.21-150400.15.5.1.x86_64",
            "SUSE Real Time Module 15 SP4:ocfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64",
            "openSUSE Leap 15.4:cluster-md-kmp-rt-5.14.21-150400.15.5.1.x86_64",
            "openSUSE Leap 15.4:dlm-kmp-rt-5.14.21-150400.15.5.1.x86_64",
            "openSUSE Leap 15.4:gfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64",
            "openSUSE Leap 15.4:kernel-devel-rt-5.14.21-150400.15.5.1.noarch",
            "openSUSE Leap 15.4:kernel-rt-5.14.21-150400.15.5.1.x86_64",
            "openSUSE Leap 15.4:kernel-rt-devel-5.14.21-150400.15.5.1.x86_64",
            "openSUSE Leap 15.4:kernel-rt_debug-5.14.21-150400.15.5.1.x86_64",
            "openSUSE Leap 15.4:kernel-rt_debug-devel-5.14.21-150400.15.5.1.x86_64",
            "openSUSE Leap 15.4:kernel-source-rt-5.14.21-150400.15.5.1.noarch",
            "openSUSE Leap 15.4:kernel-syms-rt-5.14.21-150400.15.5.1.x86_64",
            "openSUSE Leap 15.4:ocfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2022-12-23T10:39:17Z",
          "details": "moderate"
        }
      ],
      "title": "CVE-2022-39188"
    },
    {
      "cve": "CVE-2022-39189",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2022-39189"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "An issue was discovered the x86 KVM subsystem in the Linux kernel before 5.18.17. Unprivileged guest users can compromise the guest kernel because TLB flush operations are mishandled in certain KVM_VCPU_PREEMPTED situations.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_15_5-rt-1-150400.1.3.1.x86_64",
          "SUSE Real Time Module 15 SP4:cluster-md-kmp-rt-5.14.21-150400.15.5.1.x86_64",
          "SUSE Real Time Module 15 SP4:dlm-kmp-rt-5.14.21-150400.15.5.1.x86_64",
          "SUSE Real Time Module 15 SP4:gfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64",
          "SUSE Real Time Module 15 SP4:kernel-devel-rt-5.14.21-150400.15.5.1.noarch",
          "SUSE Real Time Module 15 SP4:kernel-rt-5.14.21-150400.15.5.1.x86_64",
          "SUSE Real Time Module 15 SP4:kernel-rt-devel-5.14.21-150400.15.5.1.x86_64",
          "SUSE Real Time Module 15 SP4:kernel-rt_debug-5.14.21-150400.15.5.1.x86_64",
          "SUSE Real Time Module 15 SP4:kernel-rt_debug-devel-5.14.21-150400.15.5.1.x86_64",
          "SUSE Real Time Module 15 SP4:kernel-source-rt-5.14.21-150400.15.5.1.noarch",
          "SUSE Real Time Module 15 SP4:kernel-syms-rt-5.14.21-150400.15.5.1.x86_64",
          "SUSE Real Time Module 15 SP4:ocfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64",
          "openSUSE Leap 15.4:cluster-md-kmp-rt-5.14.21-150400.15.5.1.x86_64",
          "openSUSE Leap 15.4:dlm-kmp-rt-5.14.21-150400.15.5.1.x86_64",
          "openSUSE Leap 15.4:gfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64",
          "openSUSE Leap 15.4:kernel-devel-rt-5.14.21-150400.15.5.1.noarch",
          "openSUSE Leap 15.4:kernel-rt-5.14.21-150400.15.5.1.x86_64",
          "openSUSE Leap 15.4:kernel-rt-devel-5.14.21-150400.15.5.1.x86_64",
          "openSUSE Leap 15.4:kernel-rt_debug-5.14.21-150400.15.5.1.x86_64",
          "openSUSE Leap 15.4:kernel-rt_debug-devel-5.14.21-150400.15.5.1.x86_64",
          "openSUSE Leap 15.4:kernel-source-rt-5.14.21-150400.15.5.1.noarch",
          "openSUSE Leap 15.4:kernel-syms-rt-5.14.21-150400.15.5.1.x86_64",
          "openSUSE Leap 15.4:ocfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2022-39189",
          "url": "https://www.suse.com/security/cve/CVE-2022-39189"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1203066 for CVE-2022-39189",
          "url": "https://bugzilla.suse.com/1203066"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1203067 for CVE-2022-39189",
          "url": "https://bugzilla.suse.com/1203067"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1209225 for CVE-2022-39189",
          "url": "https://bugzilla.suse.com/1209225"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_15_5-rt-1-150400.1.3.1.x86_64",
            "SUSE Real Time Module 15 SP4:cluster-md-kmp-rt-5.14.21-150400.15.5.1.x86_64",
            "SUSE Real Time Module 15 SP4:dlm-kmp-rt-5.14.21-150400.15.5.1.x86_64",
            "SUSE Real Time Module 15 SP4:gfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64",
            "SUSE Real Time Module 15 SP4:kernel-devel-rt-5.14.21-150400.15.5.1.noarch",
            "SUSE Real Time Module 15 SP4:kernel-rt-5.14.21-150400.15.5.1.x86_64",
            "SUSE Real Time Module 15 SP4:kernel-rt-devel-5.14.21-150400.15.5.1.x86_64",
            "SUSE Real Time Module 15 SP4:kernel-rt_debug-5.14.21-150400.15.5.1.x86_64",
            "SUSE Real Time Module 15 SP4:kernel-rt_debug-devel-5.14.21-150400.15.5.1.x86_64",
            "SUSE Real Time Module 15 SP4:kernel-source-rt-5.14.21-150400.15.5.1.noarch",
            "SUSE Real Time Module 15 SP4:kernel-syms-rt-5.14.21-150400.15.5.1.x86_64",
            "SUSE Real Time Module 15 SP4:ocfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64",
            "openSUSE Leap 15.4:cluster-md-kmp-rt-5.14.21-150400.15.5.1.x86_64",
            "openSUSE Leap 15.4:dlm-kmp-rt-5.14.21-150400.15.5.1.x86_64",
            "openSUSE Leap 15.4:gfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64",
            "openSUSE Leap 15.4:kernel-devel-rt-5.14.21-150400.15.5.1.noarch",
            "openSUSE Leap 15.4:kernel-rt-5.14.21-150400.15.5.1.x86_64",
            "openSUSE Leap 15.4:kernel-rt-devel-5.14.21-150400.15.5.1.x86_64",
            "openSUSE Leap 15.4:kernel-rt_debug-5.14.21-150400.15.5.1.x86_64",
            "openSUSE Leap 15.4:kernel-rt_debug-devel-5.14.21-150400.15.5.1.x86_64",
            "openSUSE Leap 15.4:kernel-source-rt-5.14.21-150400.15.5.1.noarch",
            "openSUSE Leap 15.4:kernel-syms-rt-5.14.21-150400.15.5.1.x86_64",
            "openSUSE Leap 15.4:ocfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 7,
            "baseSeverity": "HIGH",
            "vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H",
            "version": "3.1"
          },
          "products": [
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_15_5-rt-1-150400.1.3.1.x86_64",
            "SUSE Real Time Module 15 SP4:cluster-md-kmp-rt-5.14.21-150400.15.5.1.x86_64",
            "SUSE Real Time Module 15 SP4:dlm-kmp-rt-5.14.21-150400.15.5.1.x86_64",
            "SUSE Real Time Module 15 SP4:gfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64",
            "SUSE Real Time Module 15 SP4:kernel-devel-rt-5.14.21-150400.15.5.1.noarch",
            "SUSE Real Time Module 15 SP4:kernel-rt-5.14.21-150400.15.5.1.x86_64",
            "SUSE Real Time Module 15 SP4:kernel-rt-devel-5.14.21-150400.15.5.1.x86_64",
            "SUSE Real Time Module 15 SP4:kernel-rt_debug-5.14.21-150400.15.5.1.x86_64",
            "SUSE Real Time Module 15 SP4:kernel-rt_debug-devel-5.14.21-150400.15.5.1.x86_64",
            "SUSE Real Time Module 15 SP4:kernel-source-rt-5.14.21-150400.15.5.1.noarch",
            "SUSE Real Time Module 15 SP4:kernel-syms-rt-5.14.21-150400.15.5.1.x86_64",
            "SUSE Real Time Module 15 SP4:ocfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64",
            "openSUSE Leap 15.4:cluster-md-kmp-rt-5.14.21-150400.15.5.1.x86_64",
            "openSUSE Leap 15.4:dlm-kmp-rt-5.14.21-150400.15.5.1.x86_64",
            "openSUSE Leap 15.4:gfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64",
            "openSUSE Leap 15.4:kernel-devel-rt-5.14.21-150400.15.5.1.noarch",
            "openSUSE Leap 15.4:kernel-rt-5.14.21-150400.15.5.1.x86_64",
            "openSUSE Leap 15.4:kernel-rt-devel-5.14.21-150400.15.5.1.x86_64",
            "openSUSE Leap 15.4:kernel-rt_debug-5.14.21-150400.15.5.1.x86_64",
            "openSUSE Leap 15.4:kernel-rt_debug-devel-5.14.21-150400.15.5.1.x86_64",
            "openSUSE Leap 15.4:kernel-source-rt-5.14.21-150400.15.5.1.noarch",
            "openSUSE Leap 15.4:kernel-syms-rt-5.14.21-150400.15.5.1.x86_64",
            "openSUSE Leap 15.4:ocfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2022-12-23T10:39:17Z",
          "details": "moderate"
        }
      ],
      "title": "CVE-2022-39189"
    },
    {
      "cve": "CVE-2022-39190",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2022-39190"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "An issue was discovered in net/netfilter/nf_tables_api.c in the Linux kernel before 5.19.6. A denial of service can occur upon binding to an already bound chain.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_15_5-rt-1-150400.1.3.1.x86_64",
          "SUSE Real Time Module 15 SP4:cluster-md-kmp-rt-5.14.21-150400.15.5.1.x86_64",
          "SUSE Real Time Module 15 SP4:dlm-kmp-rt-5.14.21-150400.15.5.1.x86_64",
          "SUSE Real Time Module 15 SP4:gfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64",
          "SUSE Real Time Module 15 SP4:kernel-devel-rt-5.14.21-150400.15.5.1.noarch",
          "SUSE Real Time Module 15 SP4:kernel-rt-5.14.21-150400.15.5.1.x86_64",
          "SUSE Real Time Module 15 SP4:kernel-rt-devel-5.14.21-150400.15.5.1.x86_64",
          "SUSE Real Time Module 15 SP4:kernel-rt_debug-5.14.21-150400.15.5.1.x86_64",
          "SUSE Real Time Module 15 SP4:kernel-rt_debug-devel-5.14.21-150400.15.5.1.x86_64",
          "SUSE Real Time Module 15 SP4:kernel-source-rt-5.14.21-150400.15.5.1.noarch",
          "SUSE Real Time Module 15 SP4:kernel-syms-rt-5.14.21-150400.15.5.1.x86_64",
          "SUSE Real Time Module 15 SP4:ocfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64",
          "openSUSE Leap 15.4:cluster-md-kmp-rt-5.14.21-150400.15.5.1.x86_64",
          "openSUSE Leap 15.4:dlm-kmp-rt-5.14.21-150400.15.5.1.x86_64",
          "openSUSE Leap 15.4:gfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64",
          "openSUSE Leap 15.4:kernel-devel-rt-5.14.21-150400.15.5.1.noarch",
          "openSUSE Leap 15.4:kernel-rt-5.14.21-150400.15.5.1.x86_64",
          "openSUSE Leap 15.4:kernel-rt-devel-5.14.21-150400.15.5.1.x86_64",
          "openSUSE Leap 15.4:kernel-rt_debug-5.14.21-150400.15.5.1.x86_64",
          "openSUSE Leap 15.4:kernel-rt_debug-devel-5.14.21-150400.15.5.1.x86_64",
          "openSUSE Leap 15.4:kernel-source-rt-5.14.21-150400.15.5.1.noarch",
          "openSUSE Leap 15.4:kernel-syms-rt-5.14.21-150400.15.5.1.x86_64",
          "openSUSE Leap 15.4:ocfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2022-39190",
          "url": "https://www.suse.com/security/cve/CVE-2022-39190"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1203117 for CVE-2022-39190",
          "url": "https://bugzilla.suse.com/1203117"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_15_5-rt-1-150400.1.3.1.x86_64",
            "SUSE Real Time Module 15 SP4:cluster-md-kmp-rt-5.14.21-150400.15.5.1.x86_64",
            "SUSE Real Time Module 15 SP4:dlm-kmp-rt-5.14.21-150400.15.5.1.x86_64",
            "SUSE Real Time Module 15 SP4:gfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64",
            "SUSE Real Time Module 15 SP4:kernel-devel-rt-5.14.21-150400.15.5.1.noarch",
            "SUSE Real Time Module 15 SP4:kernel-rt-5.14.21-150400.15.5.1.x86_64",
            "SUSE Real Time Module 15 SP4:kernel-rt-devel-5.14.21-150400.15.5.1.x86_64",
            "SUSE Real Time Module 15 SP4:kernel-rt_debug-5.14.21-150400.15.5.1.x86_64",
            "SUSE Real Time Module 15 SP4:kernel-rt_debug-devel-5.14.21-150400.15.5.1.x86_64",
            "SUSE Real Time Module 15 SP4:kernel-source-rt-5.14.21-150400.15.5.1.noarch",
            "SUSE Real Time Module 15 SP4:kernel-syms-rt-5.14.21-150400.15.5.1.x86_64",
            "SUSE Real Time Module 15 SP4:ocfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64",
            "openSUSE Leap 15.4:cluster-md-kmp-rt-5.14.21-150400.15.5.1.x86_64",
            "openSUSE Leap 15.4:dlm-kmp-rt-5.14.21-150400.15.5.1.x86_64",
            "openSUSE Leap 15.4:gfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64",
            "openSUSE Leap 15.4:kernel-devel-rt-5.14.21-150400.15.5.1.noarch",
            "openSUSE Leap 15.4:kernel-rt-5.14.21-150400.15.5.1.x86_64",
            "openSUSE Leap 15.4:kernel-rt-devel-5.14.21-150400.15.5.1.x86_64",
            "openSUSE Leap 15.4:kernel-rt_debug-5.14.21-150400.15.5.1.x86_64",
            "openSUSE Leap 15.4:kernel-rt_debug-devel-5.14.21-150400.15.5.1.x86_64",
            "openSUSE Leap 15.4:kernel-source-rt-5.14.21-150400.15.5.1.noarch",
            "openSUSE Leap 15.4:kernel-syms-rt-5.14.21-150400.15.5.1.x86_64",
            "openSUSE Leap 15.4:ocfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 5.5,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
            "version": "3.1"
          },
          "products": [
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_15_5-rt-1-150400.1.3.1.x86_64",
            "SUSE Real Time Module 15 SP4:cluster-md-kmp-rt-5.14.21-150400.15.5.1.x86_64",
            "SUSE Real Time Module 15 SP4:dlm-kmp-rt-5.14.21-150400.15.5.1.x86_64",
            "SUSE Real Time Module 15 SP4:gfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64",
            "SUSE Real Time Module 15 SP4:kernel-devel-rt-5.14.21-150400.15.5.1.noarch",
            "SUSE Real Time Module 15 SP4:kernel-rt-5.14.21-150400.15.5.1.x86_64",
            "SUSE Real Time Module 15 SP4:kernel-rt-devel-5.14.21-150400.15.5.1.x86_64",
            "SUSE Real Time Module 15 SP4:kernel-rt_debug-5.14.21-150400.15.5.1.x86_64",
            "SUSE Real Time Module 15 SP4:kernel-rt_debug-devel-5.14.21-150400.15.5.1.x86_64",
            "SUSE Real Time Module 15 SP4:kernel-source-rt-5.14.21-150400.15.5.1.noarch",
            "SUSE Real Time Module 15 SP4:kernel-syms-rt-5.14.21-150400.15.5.1.x86_64",
            "SUSE Real Time Module 15 SP4:ocfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64",
            "openSUSE Leap 15.4:cluster-md-kmp-rt-5.14.21-150400.15.5.1.x86_64",
            "openSUSE Leap 15.4:dlm-kmp-rt-5.14.21-150400.15.5.1.x86_64",
            "openSUSE Leap 15.4:gfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64",
            "openSUSE Leap 15.4:kernel-devel-rt-5.14.21-150400.15.5.1.noarch",
            "openSUSE Leap 15.4:kernel-rt-5.14.21-150400.15.5.1.x86_64",
            "openSUSE Leap 15.4:kernel-rt-devel-5.14.21-150400.15.5.1.x86_64",
            "openSUSE Leap 15.4:kernel-rt_debug-5.14.21-150400.15.5.1.x86_64",
            "openSUSE Leap 15.4:kernel-rt_debug-devel-5.14.21-150400.15.5.1.x86_64",
            "openSUSE Leap 15.4:kernel-source-rt-5.14.21-150400.15.5.1.noarch",
            "openSUSE Leap 15.4:kernel-syms-rt-5.14.21-150400.15.5.1.x86_64",
            "openSUSE Leap 15.4:ocfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2022-12-23T10:39:17Z",
          "details": "moderate"
        }
      ],
      "title": "CVE-2022-39190"
    },
    {
      "cve": "CVE-2022-40476",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2022-40476"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "A null pointer dereference issue was discovered in fs/io_uring.c in the Linux kernel before 5.15.62. A local user could use this flaw to crash the system or potentially cause a denial of service.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_15_5-rt-1-150400.1.3.1.x86_64",
          "SUSE Real Time Module 15 SP4:cluster-md-kmp-rt-5.14.21-150400.15.5.1.x86_64",
          "SUSE Real Time Module 15 SP4:dlm-kmp-rt-5.14.21-150400.15.5.1.x86_64",
          "SUSE Real Time Module 15 SP4:gfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64",
          "SUSE Real Time Module 15 SP4:kernel-devel-rt-5.14.21-150400.15.5.1.noarch",
          "SUSE Real Time Module 15 SP4:kernel-rt-5.14.21-150400.15.5.1.x86_64",
          "SUSE Real Time Module 15 SP4:kernel-rt-devel-5.14.21-150400.15.5.1.x86_64",
          "SUSE Real Time Module 15 SP4:kernel-rt_debug-5.14.21-150400.15.5.1.x86_64",
          "SUSE Real Time Module 15 SP4:kernel-rt_debug-devel-5.14.21-150400.15.5.1.x86_64",
          "SUSE Real Time Module 15 SP4:kernel-source-rt-5.14.21-150400.15.5.1.noarch",
          "SUSE Real Time Module 15 SP4:kernel-syms-rt-5.14.21-150400.15.5.1.x86_64",
          "SUSE Real Time Module 15 SP4:ocfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64",
          "openSUSE Leap 15.4:cluster-md-kmp-rt-5.14.21-150400.15.5.1.x86_64",
          "openSUSE Leap 15.4:dlm-kmp-rt-5.14.21-150400.15.5.1.x86_64",
          "openSUSE Leap 15.4:gfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64",
          "openSUSE Leap 15.4:kernel-devel-rt-5.14.21-150400.15.5.1.noarch",
          "openSUSE Leap 15.4:kernel-rt-5.14.21-150400.15.5.1.x86_64",
          "openSUSE Leap 15.4:kernel-rt-devel-5.14.21-150400.15.5.1.x86_64",
          "openSUSE Leap 15.4:kernel-rt_debug-5.14.21-150400.15.5.1.x86_64",
          "openSUSE Leap 15.4:kernel-rt_debug-devel-5.14.21-150400.15.5.1.x86_64",
          "openSUSE Leap 15.4:kernel-source-rt-5.14.21-150400.15.5.1.noarch",
          "openSUSE Leap 15.4:kernel-syms-rt-5.14.21-150400.15.5.1.x86_64",
          "openSUSE Leap 15.4:ocfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2022-40476",
          "url": "https://www.suse.com/security/cve/CVE-2022-40476"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1203435 for CVE-2022-40476",
          "url": "https://bugzilla.suse.com/1203435"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_15_5-rt-1-150400.1.3.1.x86_64",
            "SUSE Real Time Module 15 SP4:cluster-md-kmp-rt-5.14.21-150400.15.5.1.x86_64",
            "SUSE Real Time Module 15 SP4:dlm-kmp-rt-5.14.21-150400.15.5.1.x86_64",
            "SUSE Real Time Module 15 SP4:gfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64",
            "SUSE Real Time Module 15 SP4:kernel-devel-rt-5.14.21-150400.15.5.1.noarch",
            "SUSE Real Time Module 15 SP4:kernel-rt-5.14.21-150400.15.5.1.x86_64",
            "SUSE Real Time Module 15 SP4:kernel-rt-devel-5.14.21-150400.15.5.1.x86_64",
            "SUSE Real Time Module 15 SP4:kernel-rt_debug-5.14.21-150400.15.5.1.x86_64",
            "SUSE Real Time Module 15 SP4:kernel-rt_debug-devel-5.14.21-150400.15.5.1.x86_64",
            "SUSE Real Time Module 15 SP4:kernel-source-rt-5.14.21-150400.15.5.1.noarch",
            "SUSE Real Time Module 15 SP4:kernel-syms-rt-5.14.21-150400.15.5.1.x86_64",
            "SUSE Real Time Module 15 SP4:ocfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64",
            "openSUSE Leap 15.4:cluster-md-kmp-rt-5.14.21-150400.15.5.1.x86_64",
            "openSUSE Leap 15.4:dlm-kmp-rt-5.14.21-150400.15.5.1.x86_64",
            "openSUSE Leap 15.4:gfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64",
            "openSUSE Leap 15.4:kernel-devel-rt-5.14.21-150400.15.5.1.noarch",
            "openSUSE Leap 15.4:kernel-rt-5.14.21-150400.15.5.1.x86_64",
            "openSUSE Leap 15.4:kernel-rt-devel-5.14.21-150400.15.5.1.x86_64",
            "openSUSE Leap 15.4:kernel-rt_debug-5.14.21-150400.15.5.1.x86_64",
            "openSUSE Leap 15.4:kernel-rt_debug-devel-5.14.21-150400.15.5.1.x86_64",
            "openSUSE Leap 15.4:kernel-source-rt-5.14.21-150400.15.5.1.noarch",
            "openSUSE Leap 15.4:kernel-syms-rt-5.14.21-150400.15.5.1.x86_64",
            "openSUSE Leap 15.4:ocfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 5.5,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
            "version": "3.1"
          },
          "products": [
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_15_5-rt-1-150400.1.3.1.x86_64",
            "SUSE Real Time Module 15 SP4:cluster-md-kmp-rt-5.14.21-150400.15.5.1.x86_64",
            "SUSE Real Time Module 15 SP4:dlm-kmp-rt-5.14.21-150400.15.5.1.x86_64",
            "SUSE Real Time Module 15 SP4:gfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64",
            "SUSE Real Time Module 15 SP4:kernel-devel-rt-5.14.21-150400.15.5.1.noarch",
            "SUSE Real Time Module 15 SP4:kernel-rt-5.14.21-150400.15.5.1.x86_64",
            "SUSE Real Time Module 15 SP4:kernel-rt-devel-5.14.21-150400.15.5.1.x86_64",
            "SUSE Real Time Module 15 SP4:kernel-rt_debug-5.14.21-150400.15.5.1.x86_64",
            "SUSE Real Time Module 15 SP4:kernel-rt_debug-devel-5.14.21-150400.15.5.1.x86_64",
            "SUSE Real Time Module 15 SP4:kernel-source-rt-5.14.21-150400.15.5.1.noarch",
            "SUSE Real Time Module 15 SP4:kernel-syms-rt-5.14.21-150400.15.5.1.x86_64",
            "SUSE Real Time Module 15 SP4:ocfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64",
            "openSUSE Leap 15.4:cluster-md-kmp-rt-5.14.21-150400.15.5.1.x86_64",
            "openSUSE Leap 15.4:dlm-kmp-rt-5.14.21-150400.15.5.1.x86_64",
            "openSUSE Leap 15.4:gfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64",
            "openSUSE Leap 15.4:kernel-devel-rt-5.14.21-150400.15.5.1.noarch",
            "openSUSE Leap 15.4:kernel-rt-5.14.21-150400.15.5.1.x86_64",
            "openSUSE Leap 15.4:kernel-rt-devel-5.14.21-150400.15.5.1.x86_64",
            "openSUSE Leap 15.4:kernel-rt_debug-5.14.21-150400.15.5.1.x86_64",
            "openSUSE Leap 15.4:kernel-rt_debug-devel-5.14.21-150400.15.5.1.x86_64",
            "openSUSE Leap 15.4:kernel-source-rt-5.14.21-150400.15.5.1.noarch",
            "openSUSE Leap 15.4:kernel-syms-rt-5.14.21-150400.15.5.1.x86_64",
            "openSUSE Leap 15.4:ocfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2022-12-23T10:39:17Z",
          "details": "moderate"
        }
      ],
      "title": "CVE-2022-40476"
    },
    {
      "cve": "CVE-2022-40768",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2022-40768"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "drivers/scsi/stex.c in the Linux kernel through 5.19.9 allows local users to obtain sensitive information from kernel memory because stex_queuecommand_lck lacks a memset for the PASSTHRU_CMD case.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_15_5-rt-1-150400.1.3.1.x86_64",
          "SUSE Real Time Module 15 SP4:cluster-md-kmp-rt-5.14.21-150400.15.5.1.x86_64",
          "SUSE Real Time Module 15 SP4:dlm-kmp-rt-5.14.21-150400.15.5.1.x86_64",
          "SUSE Real Time Module 15 SP4:gfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64",
          "SUSE Real Time Module 15 SP4:kernel-devel-rt-5.14.21-150400.15.5.1.noarch",
          "SUSE Real Time Module 15 SP4:kernel-rt-5.14.21-150400.15.5.1.x86_64",
          "SUSE Real Time Module 15 SP4:kernel-rt-devel-5.14.21-150400.15.5.1.x86_64",
          "SUSE Real Time Module 15 SP4:kernel-rt_debug-5.14.21-150400.15.5.1.x86_64",
          "SUSE Real Time Module 15 SP4:kernel-rt_debug-devel-5.14.21-150400.15.5.1.x86_64",
          "SUSE Real Time Module 15 SP4:kernel-source-rt-5.14.21-150400.15.5.1.noarch",
          "SUSE Real Time Module 15 SP4:kernel-syms-rt-5.14.21-150400.15.5.1.x86_64",
          "SUSE Real Time Module 15 SP4:ocfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64",
          "openSUSE Leap 15.4:cluster-md-kmp-rt-5.14.21-150400.15.5.1.x86_64",
          "openSUSE Leap 15.4:dlm-kmp-rt-5.14.21-150400.15.5.1.x86_64",
          "openSUSE Leap 15.4:gfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64",
          "openSUSE Leap 15.4:kernel-devel-rt-5.14.21-150400.15.5.1.noarch",
          "openSUSE Leap 15.4:kernel-rt-5.14.21-150400.15.5.1.x86_64",
          "openSUSE Leap 15.4:kernel-rt-devel-5.14.21-150400.15.5.1.x86_64",
          "openSUSE Leap 15.4:kernel-rt_debug-5.14.21-150400.15.5.1.x86_64",
          "openSUSE Leap 15.4:kernel-rt_debug-devel-5.14.21-150400.15.5.1.x86_64",
          "openSUSE Leap 15.4:kernel-source-rt-5.14.21-150400.15.5.1.noarch",
          "openSUSE Leap 15.4:kernel-syms-rt-5.14.21-150400.15.5.1.x86_64",
          "openSUSE Leap 15.4:ocfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2022-40768",
          "url": "https://www.suse.com/security/cve/CVE-2022-40768"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1203514 for CVE-2022-40768",
          "url": "https://bugzilla.suse.com/1203514"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_15_5-rt-1-150400.1.3.1.x86_64",
            "SUSE Real Time Module 15 SP4:cluster-md-kmp-rt-5.14.21-150400.15.5.1.x86_64",
            "SUSE Real Time Module 15 SP4:dlm-kmp-rt-5.14.21-150400.15.5.1.x86_64",
            "SUSE Real Time Module 15 SP4:gfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64",
            "SUSE Real Time Module 15 SP4:kernel-devel-rt-5.14.21-150400.15.5.1.noarch",
            "SUSE Real Time Module 15 SP4:kernel-rt-5.14.21-150400.15.5.1.x86_64",
            "SUSE Real Time Module 15 SP4:kernel-rt-devel-5.14.21-150400.15.5.1.x86_64",
            "SUSE Real Time Module 15 SP4:kernel-rt_debug-5.14.21-150400.15.5.1.x86_64",
            "SUSE Real Time Module 15 SP4:kernel-rt_debug-devel-5.14.21-150400.15.5.1.x86_64",
            "SUSE Real Time Module 15 SP4:kernel-source-rt-5.14.21-150400.15.5.1.noarch",
            "SUSE Real Time Module 15 SP4:kernel-syms-rt-5.14.21-150400.15.5.1.x86_64",
            "SUSE Real Time Module 15 SP4:ocfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64",
            "openSUSE Leap 15.4:cluster-md-kmp-rt-5.14.21-150400.15.5.1.x86_64",
            "openSUSE Leap 15.4:dlm-kmp-rt-5.14.21-150400.15.5.1.x86_64",
            "openSUSE Leap 15.4:gfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64",
            "openSUSE Leap 15.4:kernel-devel-rt-5.14.21-150400.15.5.1.noarch",
            "openSUSE Leap 15.4:kernel-rt-5.14.21-150400.15.5.1.x86_64",
            "openSUSE Leap 15.4:kernel-rt-devel-5.14.21-150400.15.5.1.x86_64",
            "openSUSE Leap 15.4:kernel-rt_debug-5.14.21-150400.15.5.1.x86_64",
            "openSUSE Leap 15.4:kernel-rt_debug-devel-5.14.21-150400.15.5.1.x86_64",
            "openSUSE Leap 15.4:kernel-source-rt-5.14.21-150400.15.5.1.noarch",
            "openSUSE Leap 15.4:kernel-syms-rt-5.14.21-150400.15.5.1.x86_64",
            "openSUSE Leap 15.4:ocfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 5.5,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N",
            "version": "3.1"
          },
          "products": [
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_15_5-rt-1-150400.1.3.1.x86_64",
            "SUSE Real Time Module 15 SP4:cluster-md-kmp-rt-5.14.21-150400.15.5.1.x86_64",
            "SUSE Real Time Module 15 SP4:dlm-kmp-rt-5.14.21-150400.15.5.1.x86_64",
            "SUSE Real Time Module 15 SP4:gfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64",
            "SUSE Real Time Module 15 SP4:kernel-devel-rt-5.14.21-150400.15.5.1.noarch",
            "SUSE Real Time Module 15 SP4:kernel-rt-5.14.21-150400.15.5.1.x86_64",
            "SUSE Real Time Module 15 SP4:kernel-rt-devel-5.14.21-150400.15.5.1.x86_64",
            "SUSE Real Time Module 15 SP4:kernel-rt_debug-5.14.21-150400.15.5.1.x86_64",
            "SUSE Real Time Module 15 SP4:kernel-rt_debug-devel-5.14.21-150400.15.5.1.x86_64",
            "SUSE Real Time Module 15 SP4:kernel-source-rt-5.14.21-150400.15.5.1.noarch",
            "SUSE Real Time Module 15 SP4:kernel-syms-rt-5.14.21-150400.15.5.1.x86_64",
            "SUSE Real Time Module 15 SP4:ocfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64",
            "openSUSE Leap 15.4:cluster-md-kmp-rt-5.14.21-150400.15.5.1.x86_64",
            "openSUSE Leap 15.4:dlm-kmp-rt-5.14.21-150400.15.5.1.x86_64",
            "openSUSE Leap 15.4:gfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64",
            "openSUSE Leap 15.4:kernel-devel-rt-5.14.21-150400.15.5.1.noarch",
            "openSUSE Leap 15.4:kernel-rt-5.14.21-150400.15.5.1.x86_64",
            "openSUSE Leap 15.4:kernel-rt-devel-5.14.21-150400.15.5.1.x86_64",
            "openSUSE Leap 15.4:kernel-rt_debug-5.14.21-150400.15.5.1.x86_64",
            "openSUSE Leap 15.4:kernel-rt_debug-devel-5.14.21-150400.15.5.1.x86_64",
            "openSUSE Leap 15.4:kernel-source-rt-5.14.21-150400.15.5.1.noarch",
            "openSUSE Leap 15.4:kernel-syms-rt-5.14.21-150400.15.5.1.x86_64",
            "openSUSE Leap 15.4:ocfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2022-12-23T10:39:17Z",
          "details": "moderate"
        }
      ],
      "title": "CVE-2022-40768"
    },
    {
      "cve": "CVE-2022-4095",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2022-4095"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "A use-after-free flaw was found in Linux kernel before 5.19.2. This issue occurs in cmd_hdl_filter in drivers/staging/rtl8712/rtl8712_cmd.c, allowing an attacker to launch a local denial of service attack and gain escalation of privileges.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_15_5-rt-1-150400.1.3.1.x86_64",
          "SUSE Real Time Module 15 SP4:cluster-md-kmp-rt-5.14.21-150400.15.5.1.x86_64",
          "SUSE Real Time Module 15 SP4:dlm-kmp-rt-5.14.21-150400.15.5.1.x86_64",
          "SUSE Real Time Module 15 SP4:gfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64",
          "SUSE Real Time Module 15 SP4:kernel-devel-rt-5.14.21-150400.15.5.1.noarch",
          "SUSE Real Time Module 15 SP4:kernel-rt-5.14.21-150400.15.5.1.x86_64",
          "SUSE Real Time Module 15 SP4:kernel-rt-devel-5.14.21-150400.15.5.1.x86_64",
          "SUSE Real Time Module 15 SP4:kernel-rt_debug-5.14.21-150400.15.5.1.x86_64",
          "SUSE Real Time Module 15 SP4:kernel-rt_debug-devel-5.14.21-150400.15.5.1.x86_64",
          "SUSE Real Time Module 15 SP4:kernel-source-rt-5.14.21-150400.15.5.1.noarch",
          "SUSE Real Time Module 15 SP4:kernel-syms-rt-5.14.21-150400.15.5.1.x86_64",
          "SUSE Real Time Module 15 SP4:ocfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64",
          "openSUSE Leap 15.4:cluster-md-kmp-rt-5.14.21-150400.15.5.1.x86_64",
          "openSUSE Leap 15.4:dlm-kmp-rt-5.14.21-150400.15.5.1.x86_64",
          "openSUSE Leap 15.4:gfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64",
          "openSUSE Leap 15.4:kernel-devel-rt-5.14.21-150400.15.5.1.noarch",
          "openSUSE Leap 15.4:kernel-rt-5.14.21-150400.15.5.1.x86_64",
          "openSUSE Leap 15.4:kernel-rt-devel-5.14.21-150400.15.5.1.x86_64",
          "openSUSE Leap 15.4:kernel-rt_debug-5.14.21-150400.15.5.1.x86_64",
          "openSUSE Leap 15.4:kernel-rt_debug-devel-5.14.21-150400.15.5.1.x86_64",
          "openSUSE Leap 15.4:kernel-source-rt-5.14.21-150400.15.5.1.noarch",
          "openSUSE Leap 15.4:kernel-syms-rt-5.14.21-150400.15.5.1.x86_64",
          "openSUSE Leap 15.4:ocfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2022-4095",
          "url": "https://www.suse.com/security/cve/CVE-2022-4095"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1205514 for CVE-2022-4095",
          "url": "https://bugzilla.suse.com/1205514"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1205594 for CVE-2022-4095",
          "url": "https://bugzilla.suse.com/1205594"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1208030 for CVE-2022-4095",
          "url": "https://bugzilla.suse.com/1208030"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1208085 for CVE-2022-4095",
          "url": "https://bugzilla.suse.com/1208085"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1212319 for CVE-2022-4095",
          "url": "https://bugzilla.suse.com/1212319"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_15_5-rt-1-150400.1.3.1.x86_64",
            "SUSE Real Time Module 15 SP4:cluster-md-kmp-rt-5.14.21-150400.15.5.1.x86_64",
            "SUSE Real Time Module 15 SP4:dlm-kmp-rt-5.14.21-150400.15.5.1.x86_64",
            "SUSE Real Time Module 15 SP4:gfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64",
            "SUSE Real Time Module 15 SP4:kernel-devel-rt-5.14.21-150400.15.5.1.noarch",
            "SUSE Real Time Module 15 SP4:kernel-rt-5.14.21-150400.15.5.1.x86_64",
            "SUSE Real Time Module 15 SP4:kernel-rt-devel-5.14.21-150400.15.5.1.x86_64",
            "SUSE Real Time Module 15 SP4:kernel-rt_debug-5.14.21-150400.15.5.1.x86_64",
            "SUSE Real Time Module 15 SP4:kernel-rt_debug-devel-5.14.21-150400.15.5.1.x86_64",
            "SUSE Real Time Module 15 SP4:kernel-source-rt-5.14.21-150400.15.5.1.noarch",
            "SUSE Real Time Module 15 SP4:kernel-syms-rt-5.14.21-150400.15.5.1.x86_64",
            "SUSE Real Time Module 15 SP4:ocfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64",
            "openSUSE Leap 15.4:cluster-md-kmp-rt-5.14.21-150400.15.5.1.x86_64",
            "openSUSE Leap 15.4:dlm-kmp-rt-5.14.21-150400.15.5.1.x86_64",
            "openSUSE Leap 15.4:gfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64",
            "openSUSE Leap 15.4:kernel-devel-rt-5.14.21-150400.15.5.1.noarch",
            "openSUSE Leap 15.4:kernel-rt-5.14.21-150400.15.5.1.x86_64",
            "openSUSE Leap 15.4:kernel-rt-devel-5.14.21-150400.15.5.1.x86_64",
            "openSUSE Leap 15.4:kernel-rt_debug-5.14.21-150400.15.5.1.x86_64",
            "openSUSE Leap 15.4:kernel-rt_debug-devel-5.14.21-150400.15.5.1.x86_64",
            "openSUSE Leap 15.4:kernel-source-rt-5.14.21-150400.15.5.1.noarch",
            "openSUSE Leap 15.4:kernel-syms-rt-5.14.21-150400.15.5.1.x86_64",
            "openSUSE Leap 15.4:ocfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 7.8,
            "baseSeverity": "HIGH",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
            "version": "3.1"
          },
          "products": [
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_15_5-rt-1-150400.1.3.1.x86_64",
            "SUSE Real Time Module 15 SP4:cluster-md-kmp-rt-5.14.21-150400.15.5.1.x86_64",
            "SUSE Real Time Module 15 SP4:dlm-kmp-rt-5.14.21-150400.15.5.1.x86_64",
            "SUSE Real Time Module 15 SP4:gfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64",
            "SUSE Real Time Module 15 SP4:kernel-devel-rt-5.14.21-150400.15.5.1.noarch",
            "SUSE Real Time Module 15 SP4:kernel-rt-5.14.21-150400.15.5.1.x86_64",
            "SUSE Real Time Module 15 SP4:kernel-rt-devel-5.14.21-150400.15.5.1.x86_64",
            "SUSE Real Time Module 15 SP4:kernel-rt_debug-5.14.21-150400.15.5.1.x86_64",
            "SUSE Real Time Module 15 SP4:kernel-rt_debug-devel-5.14.21-150400.15.5.1.x86_64",
            "SUSE Real Time Module 15 SP4:kernel-source-rt-5.14.21-150400.15.5.1.noarch",
            "SUSE Real Time Module 15 SP4:kernel-syms-rt-5.14.21-150400.15.5.1.x86_64",
            "SUSE Real Time Module 15 SP4:ocfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64",
            "openSUSE Leap 15.4:cluster-md-kmp-rt-5.14.21-150400.15.5.1.x86_64",
            "openSUSE Leap 15.4:dlm-kmp-rt-5.14.21-150400.15.5.1.x86_64",
            "openSUSE Leap 15.4:gfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64",
            "openSUSE Leap 15.4:kernel-devel-rt-5.14.21-150400.15.5.1.noarch",
            "openSUSE Leap 15.4:kernel-rt-5.14.21-150400.15.5.1.x86_64",
            "openSUSE Leap 15.4:kernel-rt-devel-5.14.21-150400.15.5.1.x86_64",
            "openSUSE Leap 15.4:kernel-rt_debug-5.14.21-150400.15.5.1.x86_64",
            "openSUSE Leap 15.4:kernel-rt_debug-devel-5.14.21-150400.15.5.1.x86_64",
            "openSUSE Leap 15.4:kernel-source-rt-5.14.21-150400.15.5.1.noarch",
            "openSUSE Leap 15.4:kernel-syms-rt-5.14.21-150400.15.5.1.x86_64",
            "openSUSE Leap 15.4:ocfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2022-12-23T10:39:17Z",
          "details": "important"
        }
      ],
      "title": "CVE-2022-4095"
    },
    {
      "cve": "CVE-2022-41218",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2022-41218"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "In drivers/media/dvb-core/dmxdev.c in the Linux kernel through 5.19.10, there is a use-after-free caused by refcount races, affecting dvb_demux_open and dvb_dmxdev_release.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_15_5-rt-1-150400.1.3.1.x86_64",
          "SUSE Real Time Module 15 SP4:cluster-md-kmp-rt-5.14.21-150400.15.5.1.x86_64",
          "SUSE Real Time Module 15 SP4:dlm-kmp-rt-5.14.21-150400.15.5.1.x86_64",
          "SUSE Real Time Module 15 SP4:gfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64",
          "SUSE Real Time Module 15 SP4:kernel-devel-rt-5.14.21-150400.15.5.1.noarch",
          "SUSE Real Time Module 15 SP4:kernel-rt-5.14.21-150400.15.5.1.x86_64",
          "SUSE Real Time Module 15 SP4:kernel-rt-devel-5.14.21-150400.15.5.1.x86_64",
          "SUSE Real Time Module 15 SP4:kernel-rt_debug-5.14.21-150400.15.5.1.x86_64",
          "SUSE Real Time Module 15 SP4:kernel-rt_debug-devel-5.14.21-150400.15.5.1.x86_64",
          "SUSE Real Time Module 15 SP4:kernel-source-rt-5.14.21-150400.15.5.1.noarch",
          "SUSE Real Time Module 15 SP4:kernel-syms-rt-5.14.21-150400.15.5.1.x86_64",
          "SUSE Real Time Module 15 SP4:ocfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64",
          "openSUSE Leap 15.4:cluster-md-kmp-rt-5.14.21-150400.15.5.1.x86_64",
          "openSUSE Leap 15.4:dlm-kmp-rt-5.14.21-150400.15.5.1.x86_64",
          "openSUSE Leap 15.4:gfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64",
          "openSUSE Leap 15.4:kernel-devel-rt-5.14.21-150400.15.5.1.noarch",
          "openSUSE Leap 15.4:kernel-rt-5.14.21-150400.15.5.1.x86_64",
          "openSUSE Leap 15.4:kernel-rt-devel-5.14.21-150400.15.5.1.x86_64",
          "openSUSE Leap 15.4:kernel-rt_debug-5.14.21-150400.15.5.1.x86_64",
          "openSUSE Leap 15.4:kernel-rt_debug-devel-5.14.21-150400.15.5.1.x86_64",
          "openSUSE Leap 15.4:kernel-source-rt-5.14.21-150400.15.5.1.noarch",
          "openSUSE Leap 15.4:kernel-syms-rt-5.14.21-150400.15.5.1.x86_64",
          "openSUSE Leap 15.4:ocfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2022-41218",
          "url": "https://www.suse.com/security/cve/CVE-2022-41218"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1202960 for CVE-2022-41218",
          "url": "https://bugzilla.suse.com/1202960"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1203606 for CVE-2022-41218",
          "url": "https://bugzilla.suse.com/1203606"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1205313 for CVE-2022-41218",
          "url": "https://bugzilla.suse.com/1205313"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1209225 for CVE-2022-41218",
          "url": "https://bugzilla.suse.com/1209225"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_15_5-rt-1-150400.1.3.1.x86_64",
            "SUSE Real Time Module 15 SP4:cluster-md-kmp-rt-5.14.21-150400.15.5.1.x86_64",
            "SUSE Real Time Module 15 SP4:dlm-kmp-rt-5.14.21-150400.15.5.1.x86_64",
            "SUSE Real Time Module 15 SP4:gfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64",
            "SUSE Real Time Module 15 SP4:kernel-devel-rt-5.14.21-150400.15.5.1.noarch",
            "SUSE Real Time Module 15 SP4:kernel-rt-5.14.21-150400.15.5.1.x86_64",
            "SUSE Real Time Module 15 SP4:kernel-rt-devel-5.14.21-150400.15.5.1.x86_64",
            "SUSE Real Time Module 15 SP4:kernel-rt_debug-5.14.21-150400.15.5.1.x86_64",
            "SUSE Real Time Module 15 SP4:kernel-rt_debug-devel-5.14.21-150400.15.5.1.x86_64",
            "SUSE Real Time Module 15 SP4:kernel-source-rt-5.14.21-150400.15.5.1.noarch",
            "SUSE Real Time Module 15 SP4:kernel-syms-rt-5.14.21-150400.15.5.1.x86_64",
            "SUSE Real Time Module 15 SP4:ocfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64",
            "openSUSE Leap 15.4:cluster-md-kmp-rt-5.14.21-150400.15.5.1.x86_64",
            "openSUSE Leap 15.4:dlm-kmp-rt-5.14.21-150400.15.5.1.x86_64",
            "openSUSE Leap 15.4:gfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64",
            "openSUSE Leap 15.4:kernel-devel-rt-5.14.21-150400.15.5.1.noarch",
            "openSUSE Leap 15.4:kernel-rt-5.14.21-150400.15.5.1.x86_64",
            "openSUSE Leap 15.4:kernel-rt-devel-5.14.21-150400.15.5.1.x86_64",
            "openSUSE Leap 15.4:kernel-rt_debug-5.14.21-150400.15.5.1.x86_64",
            "openSUSE Leap 15.4:kernel-rt_debug-devel-5.14.21-150400.15.5.1.x86_64",
            "openSUSE Leap 15.4:kernel-source-rt-5.14.21-150400.15.5.1.noarch",
            "openSUSE Leap 15.4:kernel-syms-rt-5.14.21-150400.15.5.1.x86_64",
            "openSUSE Leap 15.4:ocfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 8.4,
            "baseSeverity": "HIGH",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
            "version": "3.1"
          },
          "products": [
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_15_5-rt-1-150400.1.3.1.x86_64",
            "SUSE Real Time Module 15 SP4:cluster-md-kmp-rt-5.14.21-150400.15.5.1.x86_64",
            "SUSE Real Time Module 15 SP4:dlm-kmp-rt-5.14.21-150400.15.5.1.x86_64",
            "SUSE Real Time Module 15 SP4:gfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64",
            "SUSE Real Time Module 15 SP4:kernel-devel-rt-5.14.21-150400.15.5.1.noarch",
            "SUSE Real Time Module 15 SP4:kernel-rt-5.14.21-150400.15.5.1.x86_64",
            "SUSE Real Time Module 15 SP4:kernel-rt-devel-5.14.21-150400.15.5.1.x86_64",
            "SUSE Real Time Module 15 SP4:kernel-rt_debug-5.14.21-150400.15.5.1.x86_64",
            "SUSE Real Time Module 15 SP4:kernel-rt_debug-devel-5.14.21-150400.15.5.1.x86_64",
            "SUSE Real Time Module 15 SP4:kernel-source-rt-5.14.21-150400.15.5.1.noarch",
            "SUSE Real Time Module 15 SP4:kernel-syms-rt-5.14.21-150400.15.5.1.x86_64",
            "SUSE Real Time Module 15 SP4:ocfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64",
            "openSUSE Leap 15.4:cluster-md-kmp-rt-5.14.21-150400.15.5.1.x86_64",
            "openSUSE Leap 15.4:dlm-kmp-rt-5.14.21-150400.15.5.1.x86_64",
            "openSUSE Leap 15.4:gfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64",
            "openSUSE Leap 15.4:kernel-devel-rt-5.14.21-150400.15.5.1.noarch",
            "openSUSE Leap 15.4:kernel-rt-5.14.21-150400.15.5.1.x86_64",
            "openSUSE Leap 15.4:kernel-rt-devel-5.14.21-150400.15.5.1.x86_64",
            "openSUSE Leap 15.4:kernel-rt_debug-5.14.21-150400.15.5.1.x86_64",
            "openSUSE Leap 15.4:kernel-rt_debug-devel-5.14.21-150400.15.5.1.x86_64",
            "openSUSE Leap 15.4:kernel-source-rt-5.14.21-150400.15.5.1.noarch",
            "openSUSE Leap 15.4:kernel-syms-rt-5.14.21-150400.15.5.1.x86_64",
            "openSUSE Leap 15.4:ocfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2022-12-23T10:39:17Z",
          "details": "important"
        }
      ],
      "title": "CVE-2022-41218"
    },
    {
      "cve": "CVE-2022-4129",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2022-4129"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "A flaw was found in the Linux kernel\u0027s Layer 2 Tunneling Protocol (L2TP). A missing lock when clearing sk_user_data can lead to a race condition and NULL pointer dereference. A local user could use this flaw to potentially crash the system causing a denial of service.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_15_5-rt-1-150400.1.3.1.x86_64",
          "SUSE Real Time Module 15 SP4:cluster-md-kmp-rt-5.14.21-150400.15.5.1.x86_64",
          "SUSE Real Time Module 15 SP4:dlm-kmp-rt-5.14.21-150400.15.5.1.x86_64",
          "SUSE Real Time Module 15 SP4:gfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64",
          "SUSE Real Time Module 15 SP4:kernel-devel-rt-5.14.21-150400.15.5.1.noarch",
          "SUSE Real Time Module 15 SP4:kernel-rt-5.14.21-150400.15.5.1.x86_64",
          "SUSE Real Time Module 15 SP4:kernel-rt-devel-5.14.21-150400.15.5.1.x86_64",
          "SUSE Real Time Module 15 SP4:kernel-rt_debug-5.14.21-150400.15.5.1.x86_64",
          "SUSE Real Time Module 15 SP4:kernel-rt_debug-devel-5.14.21-150400.15.5.1.x86_64",
          "SUSE Real Time Module 15 SP4:kernel-source-rt-5.14.21-150400.15.5.1.noarch",
          "SUSE Real Time Module 15 SP4:kernel-syms-rt-5.14.21-150400.15.5.1.x86_64",
          "SUSE Real Time Module 15 SP4:ocfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64",
          "openSUSE Leap 15.4:cluster-md-kmp-rt-5.14.21-150400.15.5.1.x86_64",
          "openSUSE Leap 15.4:dlm-kmp-rt-5.14.21-150400.15.5.1.x86_64",
          "openSUSE Leap 15.4:gfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64",
          "openSUSE Leap 15.4:kernel-devel-rt-5.14.21-150400.15.5.1.noarch",
          "openSUSE Leap 15.4:kernel-rt-5.14.21-150400.15.5.1.x86_64",
          "openSUSE Leap 15.4:kernel-rt-devel-5.14.21-150400.15.5.1.x86_64",
          "openSUSE Leap 15.4:kernel-rt_debug-5.14.21-150400.15.5.1.x86_64",
          "openSUSE Leap 15.4:kernel-rt_debug-devel-5.14.21-150400.15.5.1.x86_64",
          "openSUSE Leap 15.4:kernel-source-rt-5.14.21-150400.15.5.1.noarch",
          "openSUSE Leap 15.4:kernel-syms-rt-5.14.21-150400.15.5.1.x86_64",
          "openSUSE Leap 15.4:ocfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2022-4129",
          "url": "https://www.suse.com/security/cve/CVE-2022-4129"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1205711 for CVE-2022-4129",
          "url": "https://bugzilla.suse.com/1205711"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_15_5-rt-1-150400.1.3.1.x86_64",
            "SUSE Real Time Module 15 SP4:cluster-md-kmp-rt-5.14.21-150400.15.5.1.x86_64",
            "SUSE Real Time Module 15 SP4:dlm-kmp-rt-5.14.21-150400.15.5.1.x86_64",
            "SUSE Real Time Module 15 SP4:gfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64",
            "SUSE Real Time Module 15 SP4:kernel-devel-rt-5.14.21-150400.15.5.1.noarch",
            "SUSE Real Time Module 15 SP4:kernel-rt-5.14.21-150400.15.5.1.x86_64",
            "SUSE Real Time Module 15 SP4:kernel-rt-devel-5.14.21-150400.15.5.1.x86_64",
            "SUSE Real Time Module 15 SP4:kernel-rt_debug-5.14.21-150400.15.5.1.x86_64",
            "SUSE Real Time Module 15 SP4:kernel-rt_debug-devel-5.14.21-150400.15.5.1.x86_64",
            "SUSE Real Time Module 15 SP4:kernel-source-rt-5.14.21-150400.15.5.1.noarch",
            "SUSE Real Time Module 15 SP4:kernel-syms-rt-5.14.21-150400.15.5.1.x86_64",
            "SUSE Real Time Module 15 SP4:ocfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64",
            "openSUSE Leap 15.4:cluster-md-kmp-rt-5.14.21-150400.15.5.1.x86_64",
            "openSUSE Leap 15.4:dlm-kmp-rt-5.14.21-150400.15.5.1.x86_64",
            "openSUSE Leap 15.4:gfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64",
            "openSUSE Leap 15.4:kernel-devel-rt-5.14.21-150400.15.5.1.noarch",
            "openSUSE Leap 15.4:kernel-rt-5.14.21-150400.15.5.1.x86_64",
            "openSUSE Leap 15.4:kernel-rt-devel-5.14.21-150400.15.5.1.x86_64",
            "openSUSE Leap 15.4:kernel-rt_debug-5.14.21-150400.15.5.1.x86_64",
            "openSUSE Leap 15.4:kernel-rt_debug-devel-5.14.21-150400.15.5.1.x86_64",
            "openSUSE Leap 15.4:kernel-source-rt-5.14.21-150400.15.5.1.noarch",
            "openSUSE Leap 15.4:kernel-syms-rt-5.14.21-150400.15.5.1.x86_64",
            "openSUSE Leap 15.4:ocfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 5.5,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
            "version": "3.1"
          },
          "products": [
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_15_5-rt-1-150400.1.3.1.x86_64",
            "SUSE Real Time Module 15 SP4:cluster-md-kmp-rt-5.14.21-150400.15.5.1.x86_64",
            "SUSE Real Time Module 15 SP4:dlm-kmp-rt-5.14.21-150400.15.5.1.x86_64",
            "SUSE Real Time Module 15 SP4:gfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64",
            "SUSE Real Time Module 15 SP4:kernel-devel-rt-5.14.21-150400.15.5.1.noarch",
            "SUSE Real Time Module 15 SP4:kernel-rt-5.14.21-150400.15.5.1.x86_64",
            "SUSE Real Time Module 15 SP4:kernel-rt-devel-5.14.21-150400.15.5.1.x86_64",
            "SUSE Real Time Module 15 SP4:kernel-rt_debug-5.14.21-150400.15.5.1.x86_64",
            "SUSE Real Time Module 15 SP4:kernel-rt_debug-devel-5.14.21-150400.15.5.1.x86_64",
            "SUSE Real Time Module 15 SP4:kernel-source-rt-5.14.21-150400.15.5.1.noarch",
            "SUSE Real Time Module 15 SP4:kernel-syms-rt-5.14.21-150400.15.5.1.x86_64",
            "SUSE Real Time Module 15 SP4:ocfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64",
            "openSUSE Leap 15.4:cluster-md-kmp-rt-5.14.21-150400.15.5.1.x86_64",
            "openSUSE Leap 15.4:dlm-kmp-rt-5.14.21-150400.15.5.1.x86_64",
            "openSUSE Leap 15.4:gfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64",
            "openSUSE Leap 15.4:kernel-devel-rt-5.14.21-150400.15.5.1.noarch",
            "openSUSE Leap 15.4:kernel-rt-5.14.21-150400.15.5.1.x86_64",
            "openSUSE Leap 15.4:kernel-rt-devel-5.14.21-150400.15.5.1.x86_64",
            "openSUSE Leap 15.4:kernel-rt_debug-5.14.21-150400.15.5.1.x86_64",
            "openSUSE Leap 15.4:kernel-rt_debug-devel-5.14.21-150400.15.5.1.x86_64",
            "openSUSE Leap 15.4:kernel-source-rt-5.14.21-150400.15.5.1.noarch",
            "openSUSE Leap 15.4:kernel-syms-rt-5.14.21-150400.15.5.1.x86_64",
            "openSUSE Leap 15.4:ocfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2022-12-23T10:39:17Z",
          "details": "moderate"
        }
      ],
      "title": "CVE-2022-4129"
    },
    {
      "cve": "CVE-2022-4139",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2022-4139"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "An incorrect TLB flush issue was found in the Linux kernel\u0027s GPU i915 kernel driver, potentially leading to random memory corruption or data leaks. This flaw could allow a local user to crash the system or escalate their privileges on the system.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_15_5-rt-1-150400.1.3.1.x86_64",
          "SUSE Real Time Module 15 SP4:cluster-md-kmp-rt-5.14.21-150400.15.5.1.x86_64",
          "SUSE Real Time Module 15 SP4:dlm-kmp-rt-5.14.21-150400.15.5.1.x86_64",
          "SUSE Real Time Module 15 SP4:gfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64",
          "SUSE Real Time Module 15 SP4:kernel-devel-rt-5.14.21-150400.15.5.1.noarch",
          "SUSE Real Time Module 15 SP4:kernel-rt-5.14.21-150400.15.5.1.x86_64",
          "SUSE Real Time Module 15 SP4:kernel-rt-devel-5.14.21-150400.15.5.1.x86_64",
          "SUSE Real Time Module 15 SP4:kernel-rt_debug-5.14.21-150400.15.5.1.x86_64",
          "SUSE Real Time Module 15 SP4:kernel-rt_debug-devel-5.14.21-150400.15.5.1.x86_64",
          "SUSE Real Time Module 15 SP4:kernel-source-rt-5.14.21-150400.15.5.1.noarch",
          "SUSE Real Time Module 15 SP4:kernel-syms-rt-5.14.21-150400.15.5.1.x86_64",
          "SUSE Real Time Module 15 SP4:ocfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64",
          "openSUSE Leap 15.4:cluster-md-kmp-rt-5.14.21-150400.15.5.1.x86_64",
          "openSUSE Leap 15.4:dlm-kmp-rt-5.14.21-150400.15.5.1.x86_64",
          "openSUSE Leap 15.4:gfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64",
          "openSUSE Leap 15.4:kernel-devel-rt-5.14.21-150400.15.5.1.noarch",
          "openSUSE Leap 15.4:kernel-rt-5.14.21-150400.15.5.1.x86_64",
          "openSUSE Leap 15.4:kernel-rt-devel-5.14.21-150400.15.5.1.x86_64",
          "openSUSE Leap 15.4:kernel-rt_debug-5.14.21-150400.15.5.1.x86_64",
          "openSUSE Leap 15.4:kernel-rt_debug-devel-5.14.21-150400.15.5.1.x86_64",
          "openSUSE Leap 15.4:kernel-source-rt-5.14.21-150400.15.5.1.noarch",
          "openSUSE Leap 15.4:kernel-syms-rt-5.14.21-150400.15.5.1.x86_64",
          "openSUSE Leap 15.4:ocfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2022-4139",
          "url": "https://www.suse.com/security/cve/CVE-2022-4139"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1205700 for CVE-2022-4139",
          "url": "https://bugzilla.suse.com/1205700"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1205815 for CVE-2022-4139",
          "url": "https://bugzilla.suse.com/1205815"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1209225 for CVE-2022-4139",
          "url": "https://bugzilla.suse.com/1209225"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_15_5-rt-1-150400.1.3.1.x86_64",
            "SUSE Real Time Module 15 SP4:cluster-md-kmp-rt-5.14.21-150400.15.5.1.x86_64",
            "SUSE Real Time Module 15 SP4:dlm-kmp-rt-5.14.21-150400.15.5.1.x86_64",
            "SUSE Real Time Module 15 SP4:gfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64",
            "SUSE Real Time Module 15 SP4:kernel-devel-rt-5.14.21-150400.15.5.1.noarch",
            "SUSE Real Time Module 15 SP4:kernel-rt-5.14.21-150400.15.5.1.x86_64",
            "SUSE Real Time Module 15 SP4:kernel-rt-devel-5.14.21-150400.15.5.1.x86_64",
            "SUSE Real Time Module 15 SP4:kernel-rt_debug-5.14.21-150400.15.5.1.x86_64",
            "SUSE Real Time Module 15 SP4:kernel-rt_debug-devel-5.14.21-150400.15.5.1.x86_64",
            "SUSE Real Time Module 15 SP4:kernel-source-rt-5.14.21-150400.15.5.1.noarch",
            "SUSE Real Time Module 15 SP4:kernel-syms-rt-5.14.21-150400.15.5.1.x86_64",
            "SUSE Real Time Module 15 SP4:ocfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64",
            "openSUSE Leap 15.4:cluster-md-kmp-rt-5.14.21-150400.15.5.1.x86_64",
            "openSUSE Leap 15.4:dlm-kmp-rt-5.14.21-150400.15.5.1.x86_64",
            "openSUSE Leap 15.4:gfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64",
            "openSUSE Leap 15.4:kernel-devel-rt-5.14.21-150400.15.5.1.noarch",
            "openSUSE Leap 15.4:kernel-rt-5.14.21-150400.15.5.1.x86_64",
            "openSUSE Leap 15.4:kernel-rt-devel-5.14.21-150400.15.5.1.x86_64",
            "openSUSE Leap 15.4:kernel-rt_debug-5.14.21-150400.15.5.1.x86_64",
            "openSUSE Leap 15.4:kernel-rt_debug-devel-5.14.21-150400.15.5.1.x86_64",
            "openSUSE Leap 15.4:kernel-source-rt-5.14.21-150400.15.5.1.noarch",
            "openSUSE Leap 15.4:kernel-syms-rt-5.14.21-150400.15.5.1.x86_64",
            "openSUSE Leap 15.4:ocfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 7,
            "baseSeverity": "HIGH",
            "vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H",
            "version": "3.1"
          },
          "products": [
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_15_5-rt-1-150400.1.3.1.x86_64",
            "SUSE Real Time Module 15 SP4:cluster-md-kmp-rt-5.14.21-150400.15.5.1.x86_64",
            "SUSE Real Time Module 15 SP4:dlm-kmp-rt-5.14.21-150400.15.5.1.x86_64",
            "SUSE Real Time Module 15 SP4:gfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64",
            "SUSE Real Time Module 15 SP4:kernel-devel-rt-5.14.21-150400.15.5.1.noarch",
            "SUSE Real Time Module 15 SP4:kernel-rt-5.14.21-150400.15.5.1.x86_64",
            "SUSE Real Time Module 15 SP4:kernel-rt-devel-5.14.21-150400.15.5.1.x86_64",
            "SUSE Real Time Module 15 SP4:kernel-rt_debug-5.14.21-150400.15.5.1.x86_64",
            "SUSE Real Time Module 15 SP4:kernel-rt_debug-devel-5.14.21-150400.15.5.1.x86_64",
            "SUSE Real Time Module 15 SP4:kernel-source-rt-5.14.21-150400.15.5.1.noarch",
            "SUSE Real Time Module 15 SP4:kernel-syms-rt-5.14.21-150400.15.5.1.x86_64",
            "SUSE Real Time Module 15 SP4:ocfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64",
            "openSUSE Leap 15.4:cluster-md-kmp-rt-5.14.21-150400.15.5.1.x86_64",
            "openSUSE Leap 15.4:dlm-kmp-rt-5.14.21-150400.15.5.1.x86_64",
            "openSUSE Leap 15.4:gfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64",
            "openSUSE Leap 15.4:kernel-devel-rt-5.14.21-150400.15.5.1.noarch",
            "openSUSE Leap 15.4:kernel-rt-5.14.21-150400.15.5.1.x86_64",
            "openSUSE Leap 15.4:kernel-rt-devel-5.14.21-150400.15.5.1.x86_64",
            "openSUSE Leap 15.4:kernel-rt_debug-5.14.21-150400.15.5.1.x86_64",
            "openSUSE Leap 15.4:kernel-rt_debug-devel-5.14.21-150400.15.5.1.x86_64",
            "openSUSE Leap 15.4:kernel-source-rt-5.14.21-150400.15.5.1.noarch",
            "openSUSE Leap 15.4:kernel-syms-rt-5.14.21-150400.15.5.1.x86_64",
            "openSUSE Leap 15.4:ocfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2022-12-23T10:39:17Z",
          "details": "moderate"
        }
      ],
      "title": "CVE-2022-4139"
    },
    {
      "cve": "CVE-2022-41674",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2022-41674"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "An issue was discovered in the Linux kernel before 5.19.16. Attackers able to inject WLAN frames could cause a buffer overflow in the ieee80211_bss_info_update function in net/mac80211/scan.c.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_15_5-rt-1-150400.1.3.1.x86_64",
          "SUSE Real Time Module 15 SP4:cluster-md-kmp-rt-5.14.21-150400.15.5.1.x86_64",
          "SUSE Real Time Module 15 SP4:dlm-kmp-rt-5.14.21-150400.15.5.1.x86_64",
          "SUSE Real Time Module 15 SP4:gfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64",
          "SUSE Real Time Module 15 SP4:kernel-devel-rt-5.14.21-150400.15.5.1.noarch",
          "SUSE Real Time Module 15 SP4:kernel-rt-5.14.21-150400.15.5.1.x86_64",
          "SUSE Real Time Module 15 SP4:kernel-rt-devel-5.14.21-150400.15.5.1.x86_64",
          "SUSE Real Time Module 15 SP4:kernel-rt_debug-5.14.21-150400.15.5.1.x86_64",
          "SUSE Real Time Module 15 SP4:kernel-rt_debug-devel-5.14.21-150400.15.5.1.x86_64",
          "SUSE Real Time Module 15 SP4:kernel-source-rt-5.14.21-150400.15.5.1.noarch",
          "SUSE Real Time Module 15 SP4:kernel-syms-rt-5.14.21-150400.15.5.1.x86_64",
          "SUSE Real Time Module 15 SP4:ocfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64",
          "openSUSE Leap 15.4:cluster-md-kmp-rt-5.14.21-150400.15.5.1.x86_64",
          "openSUSE Leap 15.4:dlm-kmp-rt-5.14.21-150400.15.5.1.x86_64",
          "openSUSE Leap 15.4:gfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64",
          "openSUSE Leap 15.4:kernel-devel-rt-5.14.21-150400.15.5.1.noarch",
          "openSUSE Leap 15.4:kernel-rt-5.14.21-150400.15.5.1.x86_64",
          "openSUSE Leap 15.4:kernel-rt-devel-5.14.21-150400.15.5.1.x86_64",
          "openSUSE Leap 15.4:kernel-rt_debug-5.14.21-150400.15.5.1.x86_64",
          "openSUSE Leap 15.4:kernel-rt_debug-devel-5.14.21-150400.15.5.1.x86_64",
          "openSUSE Leap 15.4:kernel-source-rt-5.14.21-150400.15.5.1.noarch",
          "openSUSE Leap 15.4:kernel-syms-rt-5.14.21-150400.15.5.1.x86_64",
          "openSUSE Leap 15.4:ocfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2022-41674",
          "url": "https://www.suse.com/security/cve/CVE-2022-41674"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1203770 for CVE-2022-41674",
          "url": "https://bugzilla.suse.com/1203770"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1203994 for CVE-2022-41674",
          "url": "https://bugzilla.suse.com/1203994"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1209225 for CVE-2022-41674",
          "url": "https://bugzilla.suse.com/1209225"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_15_5-rt-1-150400.1.3.1.x86_64",
            "SUSE Real Time Module 15 SP4:cluster-md-kmp-rt-5.14.21-150400.15.5.1.x86_64",
            "SUSE Real Time Module 15 SP4:dlm-kmp-rt-5.14.21-150400.15.5.1.x86_64",
            "SUSE Real Time Module 15 SP4:gfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64",
            "SUSE Real Time Module 15 SP4:kernel-devel-rt-5.14.21-150400.15.5.1.noarch",
            "SUSE Real Time Module 15 SP4:kernel-rt-5.14.21-150400.15.5.1.x86_64",
            "SUSE Real Time Module 15 SP4:kernel-rt-devel-5.14.21-150400.15.5.1.x86_64",
            "SUSE Real Time Module 15 SP4:kernel-rt_debug-5.14.21-150400.15.5.1.x86_64",
            "SUSE Real Time Module 15 SP4:kernel-rt_debug-devel-5.14.21-150400.15.5.1.x86_64",
            "SUSE Real Time Module 15 SP4:kernel-source-rt-5.14.21-150400.15.5.1.noarch",
            "SUSE Real Time Module 15 SP4:kernel-syms-rt-5.14.21-150400.15.5.1.x86_64",
            "SUSE Real Time Module 15 SP4:ocfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64",
            "openSUSE Leap 15.4:cluster-md-kmp-rt-5.14.21-150400.15.5.1.x86_64",
            "openSUSE Leap 15.4:dlm-kmp-rt-5.14.21-150400.15.5.1.x86_64",
            "openSUSE Leap 15.4:gfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64",
            "openSUSE Leap 15.4:kernel-devel-rt-5.14.21-150400.15.5.1.noarch",
            "openSUSE Leap 15.4:kernel-rt-5.14.21-150400.15.5.1.x86_64",
            "openSUSE Leap 15.4:kernel-rt-devel-5.14.21-150400.15.5.1.x86_64",
            "openSUSE Leap 15.4:kernel-rt_debug-5.14.21-150400.15.5.1.x86_64",
            "openSUSE Leap 15.4:kernel-rt_debug-devel-5.14.21-150400.15.5.1.x86_64",
            "openSUSE Leap 15.4:kernel-source-rt-5.14.21-150400.15.5.1.noarch",
            "openSUSE Leap 15.4:kernel-syms-rt-5.14.21-150400.15.5.1.x86_64",
            "openSUSE Leap 15.4:ocfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 8.8,
            "baseSeverity": "HIGH",
            "vectorString": "CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
            "version": "3.1"
          },
          "products": [
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_15_5-rt-1-150400.1.3.1.x86_64",
            "SUSE Real Time Module 15 SP4:cluster-md-kmp-rt-5.14.21-150400.15.5.1.x86_64",
            "SUSE Real Time Module 15 SP4:dlm-kmp-rt-5.14.21-150400.15.5.1.x86_64",
            "SUSE Real Time Module 15 SP4:gfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64",
            "SUSE Real Time Module 15 SP4:kernel-devel-rt-5.14.21-150400.15.5.1.noarch",
            "SUSE Real Time Module 15 SP4:kernel-rt-5.14.21-150400.15.5.1.x86_64",
            "SUSE Real Time Module 15 SP4:kernel-rt-devel-5.14.21-150400.15.5.1.x86_64",
            "SUSE Real Time Module 15 SP4:kernel-rt_debug-5.14.21-150400.15.5.1.x86_64",
            "SUSE Real Time Module 15 SP4:kernel-rt_debug-devel-5.14.21-150400.15.5.1.x86_64",
            "SUSE Real Time Module 15 SP4:kernel-source-rt-5.14.21-150400.15.5.1.noarch",
            "SUSE Real Time Module 15 SP4:kernel-syms-rt-5.14.21-150400.15.5.1.x86_64",
            "SUSE Real Time Module 15 SP4:ocfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64",
            "openSUSE Leap 15.4:cluster-md-kmp-rt-5.14.21-150400.15.5.1.x86_64",
            "openSUSE Leap 15.4:dlm-kmp-rt-5.14.21-150400.15.5.1.x86_64",
            "openSUSE Leap 15.4:gfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64",
            "openSUSE Leap 15.4:kernel-devel-rt-5.14.21-150400.15.5.1.noarch",
            "openSUSE Leap 15.4:kernel-rt-5.14.21-150400.15.5.1.x86_64",
            "openSUSE Leap 15.4:kernel-rt-devel-5.14.21-150400.15.5.1.x86_64",
            "openSUSE Leap 15.4:kernel-rt_debug-5.14.21-150400.15.5.1.x86_64",
            "openSUSE Leap 15.4:kernel-rt_debug-devel-5.14.21-150400.15.5.1.x86_64",
            "openSUSE Leap 15.4:kernel-source-rt-5.14.21-150400.15.5.1.noarch",
            "openSUSE Leap 15.4:kernel-syms-rt-5.14.21-150400.15.5.1.x86_64",
            "openSUSE Leap 15.4:ocfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2022-12-23T10:39:17Z",
          "details": "important"
        }
      ],
      "title": "CVE-2022-41674"
    },
    {
      "cve": "CVE-2022-41848",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2022-41848"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "drivers/char/pcmcia/synclink_cs.c in the Linux kernel through 5.19.12 has a race condition and resultant use-after-free if a physically proximate attacker removes a PCMCIA device while calling ioctl, aka a race condition between mgslpc_ioctl and mgslpc_detach.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_15_5-rt-1-150400.1.3.1.x86_64",
          "SUSE Real Time Module 15 SP4:cluster-md-kmp-rt-5.14.21-150400.15.5.1.x86_64",
          "SUSE Real Time Module 15 SP4:dlm-kmp-rt-5.14.21-150400.15.5.1.x86_64",
          "SUSE Real Time Module 15 SP4:gfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64",
          "SUSE Real Time Module 15 SP4:kernel-devel-rt-5.14.21-150400.15.5.1.noarch",
          "SUSE Real Time Module 15 SP4:kernel-rt-5.14.21-150400.15.5.1.x86_64",
          "SUSE Real Time Module 15 SP4:kernel-rt-devel-5.14.21-150400.15.5.1.x86_64",
          "SUSE Real Time Module 15 SP4:kernel-rt_debug-5.14.21-150400.15.5.1.x86_64",
          "SUSE Real Time Module 15 SP4:kernel-rt_debug-devel-5.14.21-150400.15.5.1.x86_64",
          "SUSE Real Time Module 15 SP4:kernel-source-rt-5.14.21-150400.15.5.1.noarch",
          "SUSE Real Time Module 15 SP4:kernel-syms-rt-5.14.21-150400.15.5.1.x86_64",
          "SUSE Real Time Module 15 SP4:ocfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64",
          "openSUSE Leap 15.4:cluster-md-kmp-rt-5.14.21-150400.15.5.1.x86_64",
          "openSUSE Leap 15.4:dlm-kmp-rt-5.14.21-150400.15.5.1.x86_64",
          "openSUSE Leap 15.4:gfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64",
          "openSUSE Leap 15.4:kernel-devel-rt-5.14.21-150400.15.5.1.noarch",
          "openSUSE Leap 15.4:kernel-rt-5.14.21-150400.15.5.1.x86_64",
          "openSUSE Leap 15.4:kernel-rt-devel-5.14.21-150400.15.5.1.x86_64",
          "openSUSE Leap 15.4:kernel-rt_debug-5.14.21-150400.15.5.1.x86_64",
          "openSUSE Leap 15.4:kernel-rt_debug-devel-5.14.21-150400.15.5.1.x86_64",
          "openSUSE Leap 15.4:kernel-source-rt-5.14.21-150400.15.5.1.noarch",
          "openSUSE Leap 15.4:kernel-syms-rt-5.14.21-150400.15.5.1.x86_64",
          "openSUSE Leap 15.4:ocfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2022-41848",
          "url": "https://www.suse.com/security/cve/CVE-2022-41848"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1203987 for CVE-2022-41848",
          "url": "https://bugzilla.suse.com/1203987"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1211484 for CVE-2022-41848",
          "url": "https://bugzilla.suse.com/1211484"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1212317 for CVE-2022-41848",
          "url": "https://bugzilla.suse.com/1212317"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_15_5-rt-1-150400.1.3.1.x86_64",
            "SUSE Real Time Module 15 SP4:cluster-md-kmp-rt-5.14.21-150400.15.5.1.x86_64",
            "SUSE Real Time Module 15 SP4:dlm-kmp-rt-5.14.21-150400.15.5.1.x86_64",
            "SUSE Real Time Module 15 SP4:gfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64",
            "SUSE Real Time Module 15 SP4:kernel-devel-rt-5.14.21-150400.15.5.1.noarch",
            "SUSE Real Time Module 15 SP4:kernel-rt-5.14.21-150400.15.5.1.x86_64",
            "SUSE Real Time Module 15 SP4:kernel-rt-devel-5.14.21-150400.15.5.1.x86_64",
            "SUSE Real Time Module 15 SP4:kernel-rt_debug-5.14.21-150400.15.5.1.x86_64",
            "SUSE Real Time Module 15 SP4:kernel-rt_debug-devel-5.14.21-150400.15.5.1.x86_64",
            "SUSE Real Time Module 15 SP4:kernel-source-rt-5.14.21-150400.15.5.1.noarch",
            "SUSE Real Time Module 15 SP4:kernel-syms-rt-5.14.21-150400.15.5.1.x86_64",
            "SUSE Real Time Module 15 SP4:ocfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64",
            "openSUSE Leap 15.4:cluster-md-kmp-rt-5.14.21-150400.15.5.1.x86_64",
            "openSUSE Leap 15.4:dlm-kmp-rt-5.14.21-150400.15.5.1.x86_64",
            "openSUSE Leap 15.4:gfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64",
            "openSUSE Leap 15.4:kernel-devel-rt-5.14.21-150400.15.5.1.noarch",
            "openSUSE Leap 15.4:kernel-rt-5.14.21-150400.15.5.1.x86_64",
            "openSUSE Leap 15.4:kernel-rt-devel-5.14.21-150400.15.5.1.x86_64",
            "openSUSE Leap 15.4:kernel-rt_debug-5.14.21-150400.15.5.1.x86_64",
            "openSUSE Leap 15.4:kernel-rt_debug-devel-5.14.21-150400.15.5.1.x86_64",
            "openSUSE Leap 15.4:kernel-source-rt-5.14.21-150400.15.5.1.noarch",
            "openSUSE Leap 15.4:kernel-syms-rt-5.14.21-150400.15.5.1.x86_64",
            "openSUSE Leap 15.4:ocfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 6.4,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:P/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H",
            "version": "3.1"
          },
          "products": [
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_15_5-rt-1-150400.1.3.1.x86_64",
            "SUSE Real Time Module 15 SP4:cluster-md-kmp-rt-5.14.21-150400.15.5.1.x86_64",
            "SUSE Real Time Module 15 SP4:dlm-kmp-rt-5.14.21-150400.15.5.1.x86_64",
            "SUSE Real Time Module 15 SP4:gfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64",
            "SUSE Real Time Module 15 SP4:kernel-devel-rt-5.14.21-150400.15.5.1.noarch",
            "SUSE Real Time Module 15 SP4:kernel-rt-5.14.21-150400.15.5.1.x86_64",
            "SUSE Real Time Module 15 SP4:kernel-rt-devel-5.14.21-150400.15.5.1.x86_64",
            "SUSE Real Time Module 15 SP4:kernel-rt_debug-5.14.21-150400.15.5.1.x86_64",
            "SUSE Real Time Module 15 SP4:kernel-rt_debug-devel-5.14.21-150400.15.5.1.x86_64",
            "SUSE Real Time Module 15 SP4:kernel-source-rt-5.14.21-150400.15.5.1.noarch",
            "SUSE Real Time Module 15 SP4:kernel-syms-rt-5.14.21-150400.15.5.1.x86_64",
            "SUSE Real Time Module 15 SP4:ocfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64",
            "openSUSE Leap 15.4:cluster-md-kmp-rt-5.14.21-150400.15.5.1.x86_64",
            "openSUSE Leap 15.4:dlm-kmp-rt-5.14.21-150400.15.5.1.x86_64",
            "openSUSE Leap 15.4:gfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64",
            "openSUSE Leap 15.4:kernel-devel-rt-5.14.21-150400.15.5.1.noarch",
            "openSUSE Leap 15.4:kernel-rt-5.14.21-150400.15.5.1.x86_64",
            "openSUSE Leap 15.4:kernel-rt-devel-5.14.21-150400.15.5.1.x86_64",
            "openSUSE Leap 15.4:kernel-rt_debug-5.14.21-150400.15.5.1.x86_64",
            "openSUSE Leap 15.4:kernel-rt_debug-devel-5.14.21-150400.15.5.1.x86_64",
            "openSUSE Leap 15.4:kernel-source-rt-5.14.21-150400.15.5.1.noarch",
            "openSUSE Leap 15.4:kernel-syms-rt-5.14.21-150400.15.5.1.x86_64",
            "openSUSE Leap 15.4:ocfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2022-12-23T10:39:17Z",
          "details": "moderate"
        }
      ],
      "title": "CVE-2022-41848"
    },
    {
      "cve": "CVE-2022-41849",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2022-41849"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "drivers/video/fbdev/smscufx.c in the Linux kernel through 5.19.12 has a race condition and resultant use-after-free if a physically proximate attacker removes a USB device while calling open(), aka a race condition between ufx_ops_open and ufx_usb_disconnect.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_15_5-rt-1-150400.1.3.1.x86_64",
          "SUSE Real Time Module 15 SP4:cluster-md-kmp-rt-5.14.21-150400.15.5.1.x86_64",
          "SUSE Real Time Module 15 SP4:dlm-kmp-rt-5.14.21-150400.15.5.1.x86_64",
          "SUSE Real Time Module 15 SP4:gfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64",
          "SUSE Real Time Module 15 SP4:kernel-devel-rt-5.14.21-150400.15.5.1.noarch",
          "SUSE Real Time Module 15 SP4:kernel-rt-5.14.21-150400.15.5.1.x86_64",
          "SUSE Real Time Module 15 SP4:kernel-rt-devel-5.14.21-150400.15.5.1.x86_64",
          "SUSE Real Time Module 15 SP4:kernel-rt_debug-5.14.21-150400.15.5.1.x86_64",
          "SUSE Real Time Module 15 SP4:kernel-rt_debug-devel-5.14.21-150400.15.5.1.x86_64",
          "SUSE Real Time Module 15 SP4:kernel-source-rt-5.14.21-150400.15.5.1.noarch",
          "SUSE Real Time Module 15 SP4:kernel-syms-rt-5.14.21-150400.15.5.1.x86_64",
          "SUSE Real Time Module 15 SP4:ocfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64",
          "openSUSE Leap 15.4:cluster-md-kmp-rt-5.14.21-150400.15.5.1.x86_64",
          "openSUSE Leap 15.4:dlm-kmp-rt-5.14.21-150400.15.5.1.x86_64",
          "openSUSE Leap 15.4:gfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64",
          "openSUSE Leap 15.4:kernel-devel-rt-5.14.21-150400.15.5.1.noarch",
          "openSUSE Leap 15.4:kernel-rt-5.14.21-150400.15.5.1.x86_64",
          "openSUSE Leap 15.4:kernel-rt-devel-5.14.21-150400.15.5.1.x86_64",
          "openSUSE Leap 15.4:kernel-rt_debug-5.14.21-150400.15.5.1.x86_64",
          "openSUSE Leap 15.4:kernel-rt_debug-devel-5.14.21-150400.15.5.1.x86_64",
          "openSUSE Leap 15.4:kernel-source-rt-5.14.21-150400.15.5.1.noarch",
          "openSUSE Leap 15.4:kernel-syms-rt-5.14.21-150400.15.5.1.x86_64",
          "openSUSE Leap 15.4:ocfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2022-41849",
          "url": "https://www.suse.com/security/cve/CVE-2022-41849"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1203992 for CVE-2022-41849",
          "url": "https://bugzilla.suse.com/1203992"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1217458 for CVE-2022-41849",
          "url": "https://bugzilla.suse.com/1217458"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_15_5-rt-1-150400.1.3.1.x86_64",
            "SUSE Real Time Module 15 SP4:cluster-md-kmp-rt-5.14.21-150400.15.5.1.x86_64",
            "SUSE Real Time Module 15 SP4:dlm-kmp-rt-5.14.21-150400.15.5.1.x86_64",
            "SUSE Real Time Module 15 SP4:gfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64",
            "SUSE Real Time Module 15 SP4:kernel-devel-rt-5.14.21-150400.15.5.1.noarch",
            "SUSE Real Time Module 15 SP4:kernel-rt-5.14.21-150400.15.5.1.x86_64",
            "SUSE Real Time Module 15 SP4:kernel-rt-devel-5.14.21-150400.15.5.1.x86_64",
            "SUSE Real Time Module 15 SP4:kernel-rt_debug-5.14.21-150400.15.5.1.x86_64",
            "SUSE Real Time Module 15 SP4:kernel-rt_debug-devel-5.14.21-150400.15.5.1.x86_64",
            "SUSE Real Time Module 15 SP4:kernel-source-rt-5.14.21-150400.15.5.1.noarch",
            "SUSE Real Time Module 15 SP4:kernel-syms-rt-5.14.21-150400.15.5.1.x86_64",
            "SUSE Real Time Module 15 SP4:ocfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64",
            "openSUSE Leap 15.4:cluster-md-kmp-rt-5.14.21-150400.15.5.1.x86_64",
            "openSUSE Leap 15.4:dlm-kmp-rt-5.14.21-150400.15.5.1.x86_64",
            "openSUSE Leap 15.4:gfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64",
            "openSUSE Leap 15.4:kernel-devel-rt-5.14.21-150400.15.5.1.noarch",
            "openSUSE Leap 15.4:kernel-rt-5.14.21-150400.15.5.1.x86_64",
            "openSUSE Leap 15.4:kernel-rt-devel-5.14.21-150400.15.5.1.x86_64",
            "openSUSE Leap 15.4:kernel-rt_debug-5.14.21-150400.15.5.1.x86_64",
            "openSUSE Leap 15.4:kernel-rt_debug-devel-5.14.21-150400.15.5.1.x86_64",
            "openSUSE Leap 15.4:kernel-source-rt-5.14.21-150400.15.5.1.noarch",
            "openSUSE Leap 15.4:kernel-syms-rt-5.14.21-150400.15.5.1.x86_64",
            "openSUSE Leap 15.4:ocfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 6.3,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:P/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H",
            "version": "3.1"
          },
          "products": [
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_15_5-rt-1-150400.1.3.1.x86_64",
            "SUSE Real Time Module 15 SP4:cluster-md-kmp-rt-5.14.21-150400.15.5.1.x86_64",
            "SUSE Real Time Module 15 SP4:dlm-kmp-rt-5.14.21-150400.15.5.1.x86_64",
            "SUSE Real Time Module 15 SP4:gfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64",
            "SUSE Real Time Module 15 SP4:kernel-devel-rt-5.14.21-150400.15.5.1.noarch",
            "SUSE Real Time Module 15 SP4:kernel-rt-5.14.21-150400.15.5.1.x86_64",
            "SUSE Real Time Module 15 SP4:kernel-rt-devel-5.14.21-150400.15.5.1.x86_64",
            "SUSE Real Time Module 15 SP4:kernel-rt_debug-5.14.21-150400.15.5.1.x86_64",
            "SUSE Real Time Module 15 SP4:kernel-rt_debug-devel-5.14.21-150400.15.5.1.x86_64",
            "SUSE Real Time Module 15 SP4:kernel-source-rt-5.14.21-150400.15.5.1.noarch",
            "SUSE Real Time Module 15 SP4:kernel-syms-rt-5.14.21-150400.15.5.1.x86_64",
            "SUSE Real Time Module 15 SP4:ocfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64",
            "openSUSE Leap 15.4:cluster-md-kmp-rt-5.14.21-150400.15.5.1.x86_64",
            "openSUSE Leap 15.4:dlm-kmp-rt-5.14.21-150400.15.5.1.x86_64",
            "openSUSE Leap 15.4:gfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64",
            "openSUSE Leap 15.4:kernel-devel-rt-5.14.21-150400.15.5.1.noarch",
            "openSUSE Leap 15.4:kernel-rt-5.14.21-150400.15.5.1.x86_64",
            "openSUSE Leap 15.4:kernel-rt-devel-5.14.21-150400.15.5.1.x86_64",
            "openSUSE Leap 15.4:kernel-rt_debug-5.14.21-150400.15.5.1.x86_64",
            "openSUSE Leap 15.4:kernel-rt_debug-devel-5.14.21-150400.15.5.1.x86_64",
            "openSUSE Leap 15.4:kernel-source-rt-5.14.21-150400.15.5.1.noarch",
            "openSUSE Leap 15.4:kernel-syms-rt-5.14.21-150400.15.5.1.x86_64",
            "openSUSE Leap 15.4:ocfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2022-12-23T10:39:17Z",
          "details": "moderate"
        }
      ],
      "title": "CVE-2022-41849"
    },
    {
      "cve": "CVE-2022-41850",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2022-41850"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "roccat_report_event in drivers/hid/hid-roccat.c in the Linux kernel through 5.19.12 has a race condition and resultant use-after-free in certain situations where a report is received while copying a report-\u003evalue is in progress.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_15_5-rt-1-150400.1.3.1.x86_64",
          "SUSE Real Time Module 15 SP4:cluster-md-kmp-rt-5.14.21-150400.15.5.1.x86_64",
          "SUSE Real Time Module 15 SP4:dlm-kmp-rt-5.14.21-150400.15.5.1.x86_64",
          "SUSE Real Time Module 15 SP4:gfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64",
          "SUSE Real Time Module 15 SP4:kernel-devel-rt-5.14.21-150400.15.5.1.noarch",
          "SUSE Real Time Module 15 SP4:kernel-rt-5.14.21-150400.15.5.1.x86_64",
          "SUSE Real Time Module 15 SP4:kernel-rt-devel-5.14.21-150400.15.5.1.x86_64",
          "SUSE Real Time Module 15 SP4:kernel-rt_debug-5.14.21-150400.15.5.1.x86_64",
          "SUSE Real Time Module 15 SP4:kernel-rt_debug-devel-5.14.21-150400.15.5.1.x86_64",
          "SUSE Real Time Module 15 SP4:kernel-source-rt-5.14.21-150400.15.5.1.noarch",
          "SUSE Real Time Module 15 SP4:kernel-syms-rt-5.14.21-150400.15.5.1.x86_64",
          "SUSE Real Time Module 15 SP4:ocfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64",
          "openSUSE Leap 15.4:cluster-md-kmp-rt-5.14.21-150400.15.5.1.x86_64",
          "openSUSE Leap 15.4:dlm-kmp-rt-5.14.21-150400.15.5.1.x86_64",
          "openSUSE Leap 15.4:gfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64",
          "openSUSE Leap 15.4:kernel-devel-rt-5.14.21-150400.15.5.1.noarch",
          "openSUSE Leap 15.4:kernel-rt-5.14.21-150400.15.5.1.x86_64",
          "openSUSE Leap 15.4:kernel-rt-devel-5.14.21-150400.15.5.1.x86_64",
          "openSUSE Leap 15.4:kernel-rt_debug-5.14.21-150400.15.5.1.x86_64",
          "openSUSE Leap 15.4:kernel-rt_debug-devel-5.14.21-150400.15.5.1.x86_64",
          "openSUSE Leap 15.4:kernel-source-rt-5.14.21-150400.15.5.1.noarch",
          "openSUSE Leap 15.4:kernel-syms-rt-5.14.21-150400.15.5.1.x86_64",
          "openSUSE Leap 15.4:ocfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2022-41850",
          "url": "https://www.suse.com/security/cve/CVE-2022-41850"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1203960 for CVE-2022-41850",
          "url": "https://bugzilla.suse.com/1203960"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1212314 for CVE-2022-41850",
          "url": "https://bugzilla.suse.com/1212314"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_15_5-rt-1-150400.1.3.1.x86_64",
            "SUSE Real Time Module 15 SP4:cluster-md-kmp-rt-5.14.21-150400.15.5.1.x86_64",
            "SUSE Real Time Module 15 SP4:dlm-kmp-rt-5.14.21-150400.15.5.1.x86_64",
            "SUSE Real Time Module 15 SP4:gfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64",
            "SUSE Real Time Module 15 SP4:kernel-devel-rt-5.14.21-150400.15.5.1.noarch",
            "SUSE Real Time Module 15 SP4:kernel-rt-5.14.21-150400.15.5.1.x86_64",
            "SUSE Real Time Module 15 SP4:kernel-rt-devel-5.14.21-150400.15.5.1.x86_64",
            "SUSE Real Time Module 15 SP4:kernel-rt_debug-5.14.21-150400.15.5.1.x86_64",
            "SUSE Real Time Module 15 SP4:kernel-rt_debug-devel-5.14.21-150400.15.5.1.x86_64",
            "SUSE Real Time Module 15 SP4:kernel-source-rt-5.14.21-150400.15.5.1.noarch",
            "SUSE Real Time Module 15 SP4:kernel-syms-rt-5.14.21-150400.15.5.1.x86_64",
            "SUSE Real Time Module 15 SP4:ocfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64",
            "openSUSE Leap 15.4:cluster-md-kmp-rt-5.14.21-150400.15.5.1.x86_64",
            "openSUSE Leap 15.4:dlm-kmp-rt-5.14.21-150400.15.5.1.x86_64",
            "openSUSE Leap 15.4:gfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64",
            "openSUSE Leap 15.4:kernel-devel-rt-5.14.21-150400.15.5.1.noarch",
            "openSUSE Leap 15.4:kernel-rt-5.14.21-150400.15.5.1.x86_64",
            "openSUSE Leap 15.4:kernel-rt-devel-5.14.21-150400.15.5.1.x86_64",
            "openSUSE Leap 15.4:kernel-rt_debug-5.14.21-150400.15.5.1.x86_64",
            "openSUSE Leap 15.4:kernel-rt_debug-devel-5.14.21-150400.15.5.1.x86_64",
            "openSUSE Leap 15.4:kernel-source-rt-5.14.21-150400.15.5.1.noarch",
            "openSUSE Leap 15.4:kernel-syms-rt-5.14.21-150400.15.5.1.x86_64",
            "openSUSE Leap 15.4:ocfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 4,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:L",
            "version": "3.1"
          },
          "products": [
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_15_5-rt-1-150400.1.3.1.x86_64",
            "SUSE Real Time Module 15 SP4:cluster-md-kmp-rt-5.14.21-150400.15.5.1.x86_64",
            "SUSE Real Time Module 15 SP4:dlm-kmp-rt-5.14.21-150400.15.5.1.x86_64",
            "SUSE Real Time Module 15 SP4:gfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64",
            "SUSE Real Time Module 15 SP4:kernel-devel-rt-5.14.21-150400.15.5.1.noarch",
            "SUSE Real Time Module 15 SP4:kernel-rt-5.14.21-150400.15.5.1.x86_64",
            "SUSE Real Time Module 15 SP4:kernel-rt-devel-5.14.21-150400.15.5.1.x86_64",
            "SUSE Real Time Module 15 SP4:kernel-rt_debug-5.14.21-150400.15.5.1.x86_64",
            "SUSE Real Time Module 15 SP4:kernel-rt_debug-devel-5.14.21-150400.15.5.1.x86_64",
            "SUSE Real Time Module 15 SP4:kernel-source-rt-5.14.21-150400.15.5.1.noarch",
            "SUSE Real Time Module 15 SP4:kernel-syms-rt-5.14.21-150400.15.5.1.x86_64",
            "SUSE Real Time Module 15 SP4:ocfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64",
            "openSUSE Leap 15.4:cluster-md-kmp-rt-5.14.21-150400.15.5.1.x86_64",
            "openSUSE Leap 15.4:dlm-kmp-rt-5.14.21-150400.15.5.1.x86_64",
            "openSUSE Leap 15.4:gfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64",
            "openSUSE Leap 15.4:kernel-devel-rt-5.14.21-150400.15.5.1.noarch",
            "openSUSE Leap 15.4:kernel-rt-5.14.21-150400.15.5.1.x86_64",
            "openSUSE Leap 15.4:kernel-rt-devel-5.14.21-150400.15.5.1.x86_64",
            "openSUSE Leap 15.4:kernel-rt_debug-5.14.21-150400.15.5.1.x86_64",
            "openSUSE Leap 15.4:kernel-rt_debug-devel-5.14.21-150400.15.5.1.x86_64",
            "openSUSE Leap 15.4:kernel-source-rt-5.14.21-150400.15.5.1.noarch",
            "openSUSE Leap 15.4:kernel-syms-rt-5.14.21-150400.15.5.1.x86_64",
            "openSUSE Leap 15.4:ocfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2022-12-23T10:39:17Z",
          "details": "low"
        }
      ],
      "title": "CVE-2022-41850"
    },
    {
      "cve": "CVE-2022-41858",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2022-41858"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "A flaw was found in the Linux kernel. A NULL pointer dereference may occur while a slip driver is in progress to detach in sl_tx_timeout in drivers/net/slip/slip.c. This issue could allow an attacker to crash the system or leak internal kernel information.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_15_5-rt-1-150400.1.3.1.x86_64",
          "SUSE Real Time Module 15 SP4:cluster-md-kmp-rt-5.14.21-150400.15.5.1.x86_64",
          "SUSE Real Time Module 15 SP4:dlm-kmp-rt-5.14.21-150400.15.5.1.x86_64",
          "SUSE Real Time Module 15 SP4:gfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64",
          "SUSE Real Time Module 15 SP4:kernel-devel-rt-5.14.21-150400.15.5.1.noarch",
          "SUSE Real Time Module 15 SP4:kernel-rt-5.14.21-150400.15.5.1.x86_64",
          "SUSE Real Time Module 15 SP4:kernel-rt-devel-5.14.21-150400.15.5.1.x86_64",
          "SUSE Real Time Module 15 SP4:kernel-rt_debug-5.14.21-150400.15.5.1.x86_64",
          "SUSE Real Time Module 15 SP4:kernel-rt_debug-devel-5.14.21-150400.15.5.1.x86_64",
          "SUSE Real Time Module 15 SP4:kernel-source-rt-5.14.21-150400.15.5.1.noarch",
          "SUSE Real Time Module 15 SP4:kernel-syms-rt-5.14.21-150400.15.5.1.x86_64",
          "SUSE Real Time Module 15 SP4:ocfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64",
          "openSUSE Leap 15.4:cluster-md-kmp-rt-5.14.21-150400.15.5.1.x86_64",
          "openSUSE Leap 15.4:dlm-kmp-rt-5.14.21-150400.15.5.1.x86_64",
          "openSUSE Leap 15.4:gfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64",
          "openSUSE Leap 15.4:kernel-devel-rt-5.14.21-150400.15.5.1.noarch",
          "openSUSE Leap 15.4:kernel-rt-5.14.21-150400.15.5.1.x86_64",
          "openSUSE Leap 15.4:kernel-rt-devel-5.14.21-150400.15.5.1.x86_64",
          "openSUSE Leap 15.4:kernel-rt_debug-5.14.21-150400.15.5.1.x86_64",
          "openSUSE Leap 15.4:kernel-rt_debug-devel-5.14.21-150400.15.5.1.x86_64",
          "openSUSE Leap 15.4:kernel-source-rt-5.14.21-150400.15.5.1.noarch",
          "openSUSE Leap 15.4:kernel-syms-rt-5.14.21-150400.15.5.1.x86_64",
          "openSUSE Leap 15.4:ocfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2022-41858",
          "url": "https://www.suse.com/security/cve/CVE-2022-41858"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1205671 for CVE-2022-41858",
          "url": "https://bugzilla.suse.com/1205671"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1211484 for CVE-2022-41858",
          "url": "https://bugzilla.suse.com/1211484"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1212300 for CVE-2022-41858",
          "url": "https://bugzilla.suse.com/1212300"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_15_5-rt-1-150400.1.3.1.x86_64",
            "SUSE Real Time Module 15 SP4:cluster-md-kmp-rt-5.14.21-150400.15.5.1.x86_64",
            "SUSE Real Time Module 15 SP4:dlm-kmp-rt-5.14.21-150400.15.5.1.x86_64",
            "SUSE Real Time Module 15 SP4:gfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64",
            "SUSE Real Time Module 15 SP4:kernel-devel-rt-5.14.21-150400.15.5.1.noarch",
            "SUSE Real Time Module 15 SP4:kernel-rt-5.14.21-150400.15.5.1.x86_64",
            "SUSE Real Time Module 15 SP4:kernel-rt-devel-5.14.21-150400.15.5.1.x86_64",
            "SUSE Real Time Module 15 SP4:kernel-rt_debug-5.14.21-150400.15.5.1.x86_64",
            "SUSE Real Time Module 15 SP4:kernel-rt_debug-devel-5.14.21-150400.15.5.1.x86_64",
            "SUSE Real Time Module 15 SP4:kernel-source-rt-5.14.21-150400.15.5.1.noarch",
            "SUSE Real Time Module 15 SP4:kernel-syms-rt-5.14.21-150400.15.5.1.x86_64",
            "SUSE Real Time Module 15 SP4:ocfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64",
            "openSUSE Leap 15.4:cluster-md-kmp-rt-5.14.21-150400.15.5.1.x86_64",
            "openSUSE Leap 15.4:dlm-kmp-rt-5.14.21-150400.15.5.1.x86_64",
            "openSUSE Leap 15.4:gfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64",
            "openSUSE Leap 15.4:kernel-devel-rt-5.14.21-150400.15.5.1.noarch",
            "openSUSE Leap 15.4:kernel-rt-5.14.21-150400.15.5.1.x86_64",
            "openSUSE Leap 15.4:kernel-rt-devel-5.14.21-150400.15.5.1.x86_64",
            "openSUSE Leap 15.4:kernel-rt_debug-5.14.21-150400.15.5.1.x86_64",
            "openSUSE Leap 15.4:kernel-rt_debug-devel-5.14.21-150400.15.5.1.x86_64",
            "openSUSE Leap 15.4:kernel-source-rt-5.14.21-150400.15.5.1.noarch",
            "openSUSE Leap 15.4:kernel-syms-rt-5.14.21-150400.15.5.1.x86_64",
            "openSUSE Leap 15.4:ocfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 4.4,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H",
            "version": "3.1"
          },
          "products": [
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_15_5-rt-1-150400.1.3.1.x86_64",
            "SUSE Real Time Module 15 SP4:cluster-md-kmp-rt-5.14.21-150400.15.5.1.x86_64",
            "SUSE Real Time Module 15 SP4:dlm-kmp-rt-5.14.21-150400.15.5.1.x86_64",
            "SUSE Real Time Module 15 SP4:gfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64",
            "SUSE Real Time Module 15 SP4:kernel-devel-rt-5.14.21-150400.15.5.1.noarch",
            "SUSE Real Time Module 15 SP4:kernel-rt-5.14.21-150400.15.5.1.x86_64",
            "SUSE Real Time Module 15 SP4:kernel-rt-devel-5.14.21-150400.15.5.1.x86_64",
            "SUSE Real Time Module 15 SP4:kernel-rt_debug-5.14.21-150400.15.5.1.x86_64",
            "SUSE Real Time Module 15 SP4:kernel-rt_debug-devel-5.14.21-150400.15.5.1.x86_64",
            "SUSE Real Time Module 15 SP4:kernel-source-rt-5.14.21-150400.15.5.1.noarch",
            "SUSE Real Time Module 15 SP4:kernel-syms-rt-5.14.21-150400.15.5.1.x86_64",
            "SUSE Real Time Module 15 SP4:ocfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64",
            "openSUSE Leap 15.4:cluster-md-kmp-rt-5.14.21-150400.15.5.1.x86_64",
            "openSUSE Leap 15.4:dlm-kmp-rt-5.14.21-150400.15.5.1.x86_64",
            "openSUSE Leap 15.4:gfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64",
            "openSUSE Leap 15.4:kernel-devel-rt-5.14.21-150400.15.5.1.noarch",
            "openSUSE Leap 15.4:kernel-rt-5.14.21-150400.15.5.1.x86_64",
            "openSUSE Leap 15.4:kernel-rt-devel-5.14.21-150400.15.5.1.x86_64",
            "openSUSE Leap 15.4:kernel-rt_debug-5.14.21-150400.15.5.1.x86_64",
            "openSUSE Leap 15.4:kernel-rt_debug-devel-5.14.21-150400.15.5.1.x86_64",
            "openSUSE Leap 15.4:kernel-source-rt-5.14.21-150400.15.5.1.noarch",
            "openSUSE Leap 15.4:kernel-syms-rt-5.14.21-150400.15.5.1.x86_64",
            "openSUSE Leap 15.4:ocfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2022-12-23T10:39:17Z",
          "details": "moderate"
        }
      ],
      "title": "CVE-2022-41858"
    },
    {
      "cve": "CVE-2022-42328",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2022-42328"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "Guests can trigger deadlock in Linux netback driver T[his CNA information record relates to multiple CVEs; the text explains which aspects/vulnerabilities correspond to which CVE.] The patch for XSA-392 introduced another issue which might result in a deadlock when trying to free the SKB of a packet dropped due to the XSA-392 handling (CVE-2022-42328). Additionally when dropping packages for other reasons the same deadlock could occur in case of netpoll being active for the interface the xen-netback driver is connected to (CVE-2022-42329).",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_15_5-rt-1-150400.1.3.1.x86_64",
          "SUSE Real Time Module 15 SP4:cluster-md-kmp-rt-5.14.21-150400.15.5.1.x86_64",
          "SUSE Real Time Module 15 SP4:dlm-kmp-rt-5.14.21-150400.15.5.1.x86_64",
          "SUSE Real Time Module 15 SP4:gfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64",
          "SUSE Real Time Module 15 SP4:kernel-devel-rt-5.14.21-150400.15.5.1.noarch",
          "SUSE Real Time Module 15 SP4:kernel-rt-5.14.21-150400.15.5.1.x86_64",
          "SUSE Real Time Module 15 SP4:kernel-rt-devel-5.14.21-150400.15.5.1.x86_64",
          "SUSE Real Time Module 15 SP4:kernel-rt_debug-5.14.21-150400.15.5.1.x86_64",
          "SUSE Real Time Module 15 SP4:kernel-rt_debug-devel-5.14.21-150400.15.5.1.x86_64",
          "SUSE Real Time Module 15 SP4:kernel-source-rt-5.14.21-150400.15.5.1.noarch",
          "SUSE Real Time Module 15 SP4:kernel-syms-rt-5.14.21-150400.15.5.1.x86_64",
          "SUSE Real Time Module 15 SP4:ocfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64",
          "openSUSE Leap 15.4:cluster-md-kmp-rt-5.14.21-150400.15.5.1.x86_64",
          "openSUSE Leap 15.4:dlm-kmp-rt-5.14.21-150400.15.5.1.x86_64",
          "openSUSE Leap 15.4:gfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64",
          "openSUSE Leap 15.4:kernel-devel-rt-5.14.21-150400.15.5.1.noarch",
          "openSUSE Leap 15.4:kernel-rt-5.14.21-150400.15.5.1.x86_64",
          "openSUSE Leap 15.4:kernel-rt-devel-5.14.21-150400.15.5.1.x86_64",
          "openSUSE Leap 15.4:kernel-rt_debug-5.14.21-150400.15.5.1.x86_64",
          "openSUSE Leap 15.4:kernel-rt_debug-devel-5.14.21-150400.15.5.1.x86_64",
          "openSUSE Leap 15.4:kernel-source-rt-5.14.21-150400.15.5.1.noarch",
          "openSUSE Leap 15.4:kernel-syms-rt-5.14.21-150400.15.5.1.x86_64",
          "openSUSE Leap 15.4:ocfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2022-42328",
          "url": "https://www.suse.com/security/cve/CVE-2022-42328"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1206114 for CVE-2022-42328",
          "url": "https://bugzilla.suse.com/1206114"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_15_5-rt-1-150400.1.3.1.x86_64",
            "SUSE Real Time Module 15 SP4:cluster-md-kmp-rt-5.14.21-150400.15.5.1.x86_64",
            "SUSE Real Time Module 15 SP4:dlm-kmp-rt-5.14.21-150400.15.5.1.x86_64",
            "SUSE Real Time Module 15 SP4:gfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64",
            "SUSE Real Time Module 15 SP4:kernel-devel-rt-5.14.21-150400.15.5.1.noarch",
            "SUSE Real Time Module 15 SP4:kernel-rt-5.14.21-150400.15.5.1.x86_64",
            "SUSE Real Time Module 15 SP4:kernel-rt-devel-5.14.21-150400.15.5.1.x86_64",
            "SUSE Real Time Module 15 SP4:kernel-rt_debug-5.14.21-150400.15.5.1.x86_64",
            "SUSE Real Time Module 15 SP4:kernel-rt_debug-devel-5.14.21-150400.15.5.1.x86_64",
            "SUSE Real Time Module 15 SP4:kernel-source-rt-5.14.21-150400.15.5.1.noarch",
            "SUSE Real Time Module 15 SP4:kernel-syms-rt-5.14.21-150400.15.5.1.x86_64",
            "SUSE Real Time Module 15 SP4:ocfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64",
            "openSUSE Leap 15.4:cluster-md-kmp-rt-5.14.21-150400.15.5.1.x86_64",
            "openSUSE Leap 15.4:dlm-kmp-rt-5.14.21-150400.15.5.1.x86_64",
            "openSUSE Leap 15.4:gfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64",
            "openSUSE Leap 15.4:kernel-devel-rt-5.14.21-150400.15.5.1.noarch",
            "openSUSE Leap 15.4:kernel-rt-5.14.21-150400.15.5.1.x86_64",
            "openSUSE Leap 15.4:kernel-rt-devel-5.14.21-150400.15.5.1.x86_64",
            "openSUSE Leap 15.4:kernel-rt_debug-5.14.21-150400.15.5.1.x86_64",
            "openSUSE Leap 15.4:kernel-rt_debug-devel-5.14.21-150400.15.5.1.x86_64",
            "openSUSE Leap 15.4:kernel-source-rt-5.14.21-150400.15.5.1.noarch",
            "openSUSE Leap 15.4:kernel-syms-rt-5.14.21-150400.15.5.1.x86_64",
            "openSUSE Leap 15.4:ocfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 5.7,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:A/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
            "version": "3.1"
          },
          "products": [
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_15_5-rt-1-150400.1.3.1.x86_64",
            "SUSE Real Time Module 15 SP4:cluster-md-kmp-rt-5.14.21-150400.15.5.1.x86_64",
            "SUSE Real Time Module 15 SP4:dlm-kmp-rt-5.14.21-150400.15.5.1.x86_64",
            "SUSE Real Time Module 15 SP4:gfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64",
            "SUSE Real Time Module 15 SP4:kernel-devel-rt-5.14.21-150400.15.5.1.noarch",
            "SUSE Real Time Module 15 SP4:kernel-rt-5.14.21-150400.15.5.1.x86_64",
            "SUSE Real Time Module 15 SP4:kernel-rt-devel-5.14.21-150400.15.5.1.x86_64",
            "SUSE Real Time Module 15 SP4:kernel-rt_debug-5.14.21-150400.15.5.1.x86_64",
            "SUSE Real Time Module 15 SP4:kernel-rt_debug-devel-5.14.21-150400.15.5.1.x86_64",
            "SUSE Real Time Module 15 SP4:kernel-source-rt-5.14.21-150400.15.5.1.noarch",
            "SUSE Real Time Module 15 SP4:kernel-syms-rt-5.14.21-150400.15.5.1.x86_64",
            "SUSE Real Time Module 15 SP4:ocfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64",
            "openSUSE Leap 15.4:cluster-md-kmp-rt-5.14.21-150400.15.5.1.x86_64",
            "openSUSE Leap 15.4:dlm-kmp-rt-5.14.21-150400.15.5.1.x86_64",
            "openSUSE Leap 15.4:gfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64",
            "openSUSE Leap 15.4:kernel-devel-rt-5.14.21-150400.15.5.1.noarch",
            "openSUSE Leap 15.4:kernel-rt-5.14.21-150400.15.5.1.x86_64",
            "openSUSE Leap 15.4:kernel-rt-devel-5.14.21-150400.15.5.1.x86_64",
            "openSUSE Leap 15.4:kernel-rt_debug-5.14.21-150400.15.5.1.x86_64",
            "openSUSE Leap 15.4:kernel-rt_debug-devel-5.14.21-150400.15.5.1.x86_64",
            "openSUSE Leap 15.4:kernel-source-rt-5.14.21-150400.15.5.1.noarch",
            "openSUSE Leap 15.4:kernel-syms-rt-5.14.21-150400.15.5.1.x86_64",
            "openSUSE Leap 15.4:ocfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2022-12-23T10:39:17Z",
          "details": "moderate"
        }
      ],
      "title": "CVE-2022-42328"
    },
    {
      "cve": "CVE-2022-42329",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2022-42329"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "Guests can trigger deadlock in Linux netback driver T[his CNA information record relates to multiple CVEs; the text explains which aspects/vulnerabilities correspond to which CVE.] The patch for XSA-392 introduced another issue which might result in a deadlock when trying to free the SKB of a packet dropped due to the XSA-392 handling (CVE-2022-42328). Additionally when dropping packages for other reasons the same deadlock could occur in case of netpoll being active for the interface the xen-netback driver is connected to (CVE-2022-42329).",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_15_5-rt-1-150400.1.3.1.x86_64",
          "SUSE Real Time Module 15 SP4:cluster-md-kmp-rt-5.14.21-150400.15.5.1.x86_64",
          "SUSE Real Time Module 15 SP4:dlm-kmp-rt-5.14.21-150400.15.5.1.x86_64",
          "SUSE Real Time Module 15 SP4:gfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64",
          "SUSE Real Time Module 15 SP4:kernel-devel-rt-5.14.21-150400.15.5.1.noarch",
          "SUSE Real Time Module 15 SP4:kernel-rt-5.14.21-150400.15.5.1.x86_64",
          "SUSE Real Time Module 15 SP4:kernel-rt-devel-5.14.21-150400.15.5.1.x86_64",
          "SUSE Real Time Module 15 SP4:kernel-rt_debug-5.14.21-150400.15.5.1.x86_64",
          "SUSE Real Time Module 15 SP4:kernel-rt_debug-devel-5.14.21-150400.15.5.1.x86_64",
          "SUSE Real Time Module 15 SP4:kernel-source-rt-5.14.21-150400.15.5.1.noarch",
          "SUSE Real Time Module 15 SP4:kernel-syms-rt-5.14.21-150400.15.5.1.x86_64",
          "SUSE Real Time Module 15 SP4:ocfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64",
          "openSUSE Leap 15.4:cluster-md-kmp-rt-5.14.21-150400.15.5.1.x86_64",
          "openSUSE Leap 15.4:dlm-kmp-rt-5.14.21-150400.15.5.1.x86_64",
          "openSUSE Leap 15.4:gfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64",
          "openSUSE Leap 15.4:kernel-devel-rt-5.14.21-150400.15.5.1.noarch",
          "openSUSE Leap 15.4:kernel-rt-5.14.21-150400.15.5.1.x86_64",
          "openSUSE Leap 15.4:kernel-rt-devel-5.14.21-150400.15.5.1.x86_64",
          "openSUSE Leap 15.4:kernel-rt_debug-5.14.21-150400.15.5.1.x86_64",
          "openSUSE Leap 15.4:kernel-rt_debug-devel-5.14.21-150400.15.5.1.x86_64",
          "openSUSE Leap 15.4:kernel-source-rt-5.14.21-150400.15.5.1.noarch",
          "openSUSE Leap 15.4:kernel-syms-rt-5.14.21-150400.15.5.1.x86_64",
          "openSUSE Leap 15.4:ocfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2022-42329",
          "url": "https://www.suse.com/security/cve/CVE-2022-42329"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1206114 for CVE-2022-42329",
          "url": "https://bugzilla.suse.com/1206114"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_15_5-rt-1-150400.1.3.1.x86_64",
            "SUSE Real Time Module 15 SP4:cluster-md-kmp-rt-5.14.21-150400.15.5.1.x86_64",
            "SUSE Real Time Module 15 SP4:dlm-kmp-rt-5.14.21-150400.15.5.1.x86_64",
            "SUSE Real Time Module 15 SP4:gfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64",
            "SUSE Real Time Module 15 SP4:kernel-devel-rt-5.14.21-150400.15.5.1.noarch",
            "SUSE Real Time Module 15 SP4:kernel-rt-5.14.21-150400.15.5.1.x86_64",
            "SUSE Real Time Module 15 SP4:kernel-rt-devel-5.14.21-150400.15.5.1.x86_64",
            "SUSE Real Time Module 15 SP4:kernel-rt_debug-5.14.21-150400.15.5.1.x86_64",
            "SUSE Real Time Module 15 SP4:kernel-rt_debug-devel-5.14.21-150400.15.5.1.x86_64",
            "SUSE Real Time Module 15 SP4:kernel-source-rt-5.14.21-150400.15.5.1.noarch",
            "SUSE Real Time Module 15 SP4:kernel-syms-rt-5.14.21-150400.15.5.1.x86_64",
            "SUSE Real Time Module 15 SP4:ocfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64",
            "openSUSE Leap 15.4:cluster-md-kmp-rt-5.14.21-150400.15.5.1.x86_64",
            "openSUSE Leap 15.4:dlm-kmp-rt-5.14.21-150400.15.5.1.x86_64",
            "openSUSE Leap 15.4:gfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64",
            "openSUSE Leap 15.4:kernel-devel-rt-5.14.21-150400.15.5.1.noarch",
            "openSUSE Leap 15.4:kernel-rt-5.14.21-150400.15.5.1.x86_64",
            "openSUSE Leap 15.4:kernel-rt-devel-5.14.21-150400.15.5.1.x86_64",
            "openSUSE Leap 15.4:kernel-rt_debug-5.14.21-150400.15.5.1.x86_64",
            "openSUSE Leap 15.4:kernel-rt_debug-devel-5.14.21-150400.15.5.1.x86_64",
            "openSUSE Leap 15.4:kernel-source-rt-5.14.21-150400.15.5.1.noarch",
            "openSUSE Leap 15.4:kernel-syms-rt-5.14.21-150400.15.5.1.x86_64",
            "openSUSE Leap 15.4:ocfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 5.7,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:A/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
            "version": "3.1"
          },
          "products": [
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_15_5-rt-1-150400.1.3.1.x86_64",
            "SUSE Real Time Module 15 SP4:cluster-md-kmp-rt-5.14.21-150400.15.5.1.x86_64",
            "SUSE Real Time Module 15 SP4:dlm-kmp-rt-5.14.21-150400.15.5.1.x86_64",
            "SUSE Real Time Module 15 SP4:gfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64",
            "SUSE Real Time Module 15 SP4:kernel-devel-rt-5.14.21-150400.15.5.1.noarch",
            "SUSE Real Time Module 15 SP4:kernel-rt-5.14.21-150400.15.5.1.x86_64",
            "SUSE Real Time Module 15 SP4:kernel-rt-devel-5.14.21-150400.15.5.1.x86_64",
            "SUSE Real Time Module 15 SP4:kernel-rt_debug-5.14.21-150400.15.5.1.x86_64",
            "SUSE Real Time Module 15 SP4:kernel-rt_debug-devel-5.14.21-150400.15.5.1.x86_64",
            "SUSE Real Time Module 15 SP4:kernel-source-rt-5.14.21-150400.15.5.1.noarch",
            "SUSE Real Time Module 15 SP4:kernel-syms-rt-5.14.21-150400.15.5.1.x86_64",
            "SUSE Real Time Module 15 SP4:ocfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64",
            "openSUSE Leap 15.4:cluster-md-kmp-rt-5.14.21-150400.15.5.1.x86_64",
            "openSUSE Leap 15.4:dlm-kmp-rt-5.14.21-150400.15.5.1.x86_64",
            "openSUSE Leap 15.4:gfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64",
            "openSUSE Leap 15.4:kernel-devel-rt-5.14.21-150400.15.5.1.noarch",
            "openSUSE Leap 15.4:kernel-rt-5.14.21-150400.15.5.1.x86_64",
            "openSUSE Leap 15.4:kernel-rt-devel-5.14.21-150400.15.5.1.x86_64",
            "openSUSE Leap 15.4:kernel-rt_debug-5.14.21-150400.15.5.1.x86_64",
            "openSUSE Leap 15.4:kernel-rt_debug-devel-5.14.21-150400.15.5.1.x86_64",
            "openSUSE Leap 15.4:kernel-source-rt-5.14.21-150400.15.5.1.noarch",
            "openSUSE Leap 15.4:kernel-syms-rt-5.14.21-150400.15.5.1.x86_64",
            "openSUSE Leap 15.4:ocfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2022-12-23T10:39:17Z",
          "details": "moderate"
        }
      ],
      "title": "CVE-2022-42329"
    },
    {
      "cve": "CVE-2022-42703",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2022-42703"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "mm/rmap.c in the Linux kernel before 5.19.7 has a use-after-free related to leaf anon_vma double reuse.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_15_5-rt-1-150400.1.3.1.x86_64",
          "SUSE Real Time Module 15 SP4:cluster-md-kmp-rt-5.14.21-150400.15.5.1.x86_64",
          "SUSE Real Time Module 15 SP4:dlm-kmp-rt-5.14.21-150400.15.5.1.x86_64",
          "SUSE Real Time Module 15 SP4:gfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64",
          "SUSE Real Time Module 15 SP4:kernel-devel-rt-5.14.21-150400.15.5.1.noarch",
          "SUSE Real Time Module 15 SP4:kernel-rt-5.14.21-150400.15.5.1.x86_64",
          "SUSE Real Time Module 15 SP4:kernel-rt-devel-5.14.21-150400.15.5.1.x86_64",
          "SUSE Real Time Module 15 SP4:kernel-rt_debug-5.14.21-150400.15.5.1.x86_64",
          "SUSE Real Time Module 15 SP4:kernel-rt_debug-devel-5.14.21-150400.15.5.1.x86_64",
          "SUSE Real Time Module 15 SP4:kernel-source-rt-5.14.21-150400.15.5.1.noarch",
          "SUSE Real Time Module 15 SP4:kernel-syms-rt-5.14.21-150400.15.5.1.x86_64",
          "SUSE Real Time Module 15 SP4:ocfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64",
          "openSUSE Leap 15.4:cluster-md-kmp-rt-5.14.21-150400.15.5.1.x86_64",
          "openSUSE Leap 15.4:dlm-kmp-rt-5.14.21-150400.15.5.1.x86_64",
          "openSUSE Leap 15.4:gfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64",
          "openSUSE Leap 15.4:kernel-devel-rt-5.14.21-150400.15.5.1.noarch",
          "openSUSE Leap 15.4:kernel-rt-5.14.21-150400.15.5.1.x86_64",
          "openSUSE Leap 15.4:kernel-rt-devel-5.14.21-150400.15.5.1.x86_64",
          "openSUSE Leap 15.4:kernel-rt_debug-5.14.21-150400.15.5.1.x86_64",
          "openSUSE Leap 15.4:kernel-rt_debug-devel-5.14.21-150400.15.5.1.x86_64",
          "openSUSE Leap 15.4:kernel-source-rt-5.14.21-150400.15.5.1.noarch",
          "openSUSE Leap 15.4:kernel-syms-rt-5.14.21-150400.15.5.1.x86_64",
          "openSUSE Leap 15.4:ocfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2022-42703",
          "url": "https://www.suse.com/security/cve/CVE-2022-42703"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1204168 for CVE-2022-42703",
          "url": "https://bugzilla.suse.com/1204168"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1204170 for CVE-2022-42703",
          "url": "https://bugzilla.suse.com/1204170"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1206463 for CVE-2022-42703",
          "url": "https://bugzilla.suse.com/1206463"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1208044 for CVE-2022-42703",
          "url": "https://bugzilla.suse.com/1208044"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1209225 for CVE-2022-42703",
          "url": "https://bugzilla.suse.com/1209225"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_15_5-rt-1-150400.1.3.1.x86_64",
            "SUSE Real Time Module 15 SP4:cluster-md-kmp-rt-5.14.21-150400.15.5.1.x86_64",
            "SUSE Real Time Module 15 SP4:dlm-kmp-rt-5.14.21-150400.15.5.1.x86_64",
            "SUSE Real Time Module 15 SP4:gfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64",
            "SUSE Real Time Module 15 SP4:kernel-devel-rt-5.14.21-150400.15.5.1.noarch",
            "SUSE Real Time Module 15 SP4:kernel-rt-5.14.21-150400.15.5.1.x86_64",
            "SUSE Real Time Module 15 SP4:kernel-rt-devel-5.14.21-150400.15.5.1.x86_64",
            "SUSE Real Time Module 15 SP4:kernel-rt_debug-5.14.21-150400.15.5.1.x86_64",
            "SUSE Real Time Module 15 SP4:kernel-rt_debug-devel-5.14.21-150400.15.5.1.x86_64",
            "SUSE Real Time Module 15 SP4:kernel-source-rt-5.14.21-150400.15.5.1.noarch",
            "SUSE Real Time Module 15 SP4:kernel-syms-rt-5.14.21-150400.15.5.1.x86_64",
            "SUSE Real Time Module 15 SP4:ocfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64",
            "openSUSE Leap 15.4:cluster-md-kmp-rt-5.14.21-150400.15.5.1.x86_64",
            "openSUSE Leap 15.4:dlm-kmp-rt-5.14.21-150400.15.5.1.x86_64",
            "openSUSE Leap 15.4:gfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64",
            "openSUSE Leap 15.4:kernel-devel-rt-5.14.21-150400.15.5.1.noarch",
            "openSUSE Leap 15.4:kernel-rt-5.14.21-150400.15.5.1.x86_64",
            "openSUSE Leap 15.4:kernel-rt-devel-5.14.21-150400.15.5.1.x86_64",
            "openSUSE Leap 15.4:kernel-rt_debug-5.14.21-150400.15.5.1.x86_64",
            "openSUSE Leap 15.4:kernel-rt_debug-devel-5.14.21-150400.15.5.1.x86_64",
            "openSUSE Leap 15.4:kernel-source-rt-5.14.21-150400.15.5.1.noarch",
            "openSUSE Leap 15.4:kernel-syms-rt-5.14.21-150400.15.5.1.x86_64",
            "openSUSE Leap 15.4:ocfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 7,
            "baseSeverity": "HIGH",
            "vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H",
            "version": "3.1"
          },
          "products": [
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_15_5-rt-1-150400.1.3.1.x86_64",
            "SUSE Real Time Module 15 SP4:cluster-md-kmp-rt-5.14.21-150400.15.5.1.x86_64",
            "SUSE Real Time Module 15 SP4:dlm-kmp-rt-5.14.21-150400.15.5.1.x86_64",
            "SUSE Real Time Module 15 SP4:gfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64",
            "SUSE Real Time Module 15 SP4:kernel-devel-rt-5.14.21-150400.15.5.1.noarch",
            "SUSE Real Time Module 15 SP4:kernel-rt-5.14.21-150400.15.5.1.x86_64",
            "SUSE Real Time Module 15 SP4:kernel-rt-devel-5.14.21-150400.15.5.1.x86_64",
            "SUSE Real Time Module 15 SP4:kernel-rt_debug-5.14.21-150400.15.5.1.x86_64",
            "SUSE Real Time Module 15 SP4:kernel-rt_debug-devel-5.14.21-150400.15.5.1.x86_64",
            "SUSE Real Time Module 15 SP4:kernel-source-rt-5.14.21-150400.15.5.1.noarch",
            "SUSE Real Time Module 15 SP4:kernel-syms-rt-5.14.21-150400.15.5.1.x86_64",
            "SUSE Real Time Module 15 SP4:ocfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64",
            "openSUSE Leap 15.4:cluster-md-kmp-rt-5.14.21-150400.15.5.1.x86_64",
            "openSUSE Leap 15.4:dlm-kmp-rt-5.14.21-150400.15.5.1.x86_64",
            "openSUSE Leap 15.4:gfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64",
            "openSUSE Leap 15.4:kernel-devel-rt-5.14.21-150400.15.5.1.noarch",
            "openSUSE Leap 15.4:kernel-rt-5.14.21-150400.15.5.1.x86_64",
            "openSUSE Leap 15.4:kernel-rt-devel-5.14.21-150400.15.5.1.x86_64",
            "openSUSE Leap 15.4:kernel-rt_debug-5.14.21-150400.15.5.1.x86_64",
            "openSUSE Leap 15.4:kernel-rt_debug-devel-5.14.21-150400.15.5.1.x86_64",
            "openSUSE Leap 15.4:kernel-source-rt-5.14.21-150400.15.5.1.noarch",
            "openSUSE Leap 15.4:kernel-syms-rt-5.14.21-150400.15.5.1.x86_64",
            "openSUSE Leap 15.4:ocfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2022-12-23T10:39:17Z",
          "details": "important"
        }
      ],
      "title": "CVE-2022-42703"
    },
    {
      "cve": "CVE-2022-42719",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2022-42719"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "A use-after-free in the mac80211 stack when parsing a multi-BSSID element in the Linux kernel 5.2 through 5.19.x before 5.19.16 could be used by attackers (able to inject WLAN frames) to crash the kernel and potentially execute code.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_15_5-rt-1-150400.1.3.1.x86_64",
          "SUSE Real Time Module 15 SP4:cluster-md-kmp-rt-5.14.21-150400.15.5.1.x86_64",
          "SUSE Real Time Module 15 SP4:dlm-kmp-rt-5.14.21-150400.15.5.1.x86_64",
          "SUSE Real Time Module 15 SP4:gfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64",
          "SUSE Real Time Module 15 SP4:kernel-devel-rt-5.14.21-150400.15.5.1.noarch",
          "SUSE Real Time Module 15 SP4:kernel-rt-5.14.21-150400.15.5.1.x86_64",
          "SUSE Real Time Module 15 SP4:kernel-rt-devel-5.14.21-150400.15.5.1.x86_64",
          "SUSE Real Time Module 15 SP4:kernel-rt_debug-5.14.21-150400.15.5.1.x86_64",
          "SUSE Real Time Module 15 SP4:kernel-rt_debug-devel-5.14.21-150400.15.5.1.x86_64",
          "SUSE Real Time Module 15 SP4:kernel-source-rt-5.14.21-150400.15.5.1.noarch",
          "SUSE Real Time Module 15 SP4:kernel-syms-rt-5.14.21-150400.15.5.1.x86_64",
          "SUSE Real Time Module 15 SP4:ocfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64",
          "openSUSE Leap 15.4:cluster-md-kmp-rt-5.14.21-150400.15.5.1.x86_64",
          "openSUSE Leap 15.4:dlm-kmp-rt-5.14.21-150400.15.5.1.x86_64",
          "openSUSE Leap 15.4:gfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64",
          "openSUSE Leap 15.4:kernel-devel-rt-5.14.21-150400.15.5.1.noarch",
          "openSUSE Leap 15.4:kernel-rt-5.14.21-150400.15.5.1.x86_64",
          "openSUSE Leap 15.4:kernel-rt-devel-5.14.21-150400.15.5.1.x86_64",
          "openSUSE Leap 15.4:kernel-rt_debug-5.14.21-150400.15.5.1.x86_64",
          "openSUSE Leap 15.4:kernel-rt_debug-devel-5.14.21-150400.15.5.1.x86_64",
          "openSUSE Leap 15.4:kernel-source-rt-5.14.21-150400.15.5.1.noarch",
          "openSUSE Leap 15.4:kernel-syms-rt-5.14.21-150400.15.5.1.x86_64",
          "openSUSE Leap 15.4:ocfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2022-42719",
          "url": "https://www.suse.com/security/cve/CVE-2022-42719"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1204051 for CVE-2022-42719",
          "url": "https://bugzilla.suse.com/1204051"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1204292 for CVE-2022-42719",
          "url": "https://bugzilla.suse.com/1204292"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1209225 for CVE-2022-42719",
          "url": "https://bugzilla.suse.com/1209225"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_15_5-rt-1-150400.1.3.1.x86_64",
            "SUSE Real Time Module 15 SP4:cluster-md-kmp-rt-5.14.21-150400.15.5.1.x86_64",
            "SUSE Real Time Module 15 SP4:dlm-kmp-rt-5.14.21-150400.15.5.1.x86_64",
            "SUSE Real Time Module 15 SP4:gfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64",
            "SUSE Real Time Module 15 SP4:kernel-devel-rt-5.14.21-150400.15.5.1.noarch",
            "SUSE Real Time Module 15 SP4:kernel-rt-5.14.21-150400.15.5.1.x86_64",
            "SUSE Real Time Module 15 SP4:kernel-rt-devel-5.14.21-150400.15.5.1.x86_64",
            "SUSE Real Time Module 15 SP4:kernel-rt_debug-5.14.21-150400.15.5.1.x86_64",
            "SUSE Real Time Module 15 SP4:kernel-rt_debug-devel-5.14.21-150400.15.5.1.x86_64",
            "SUSE Real Time Module 15 SP4:kernel-source-rt-5.14.21-150400.15.5.1.noarch",
            "SUSE Real Time Module 15 SP4:kernel-syms-rt-5.14.21-150400.15.5.1.x86_64",
            "SUSE Real Time Module 15 SP4:ocfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64",
            "openSUSE Leap 15.4:cluster-md-kmp-rt-5.14.21-150400.15.5.1.x86_64",
            "openSUSE Leap 15.4:dlm-kmp-rt-5.14.21-150400.15.5.1.x86_64",
            "openSUSE Leap 15.4:gfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64",
            "openSUSE Leap 15.4:kernel-devel-rt-5.14.21-150400.15.5.1.noarch",
            "openSUSE Leap 15.4:kernel-rt-5.14.21-150400.15.5.1.x86_64",
            "openSUSE Leap 15.4:kernel-rt-devel-5.14.21-150400.15.5.1.x86_64",
            "openSUSE Leap 15.4:kernel-rt_debug-5.14.21-150400.15.5.1.x86_64",
            "openSUSE Leap 15.4:kernel-rt_debug-devel-5.14.21-150400.15.5.1.x86_64",
            "openSUSE Leap 15.4:kernel-source-rt-5.14.21-150400.15.5.1.noarch",
            "openSUSE Leap 15.4:kernel-syms-rt-5.14.21-150400.15.5.1.x86_64",
            "openSUSE Leap 15.4:ocfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 7.5,
            "baseSeverity": "HIGH",
            "vectorString": "CVSS:3.1/AV:A/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H",
            "version": "3.1"
          },
          "products": [
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_15_5-rt-1-150400.1.3.1.x86_64",
            "SUSE Real Time Module 15 SP4:cluster-md-kmp-rt-5.14.21-150400.15.5.1.x86_64",
            "SUSE Real Time Module 15 SP4:dlm-kmp-rt-5.14.21-150400.15.5.1.x86_64",
            "SUSE Real Time Module 15 SP4:gfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64",
            "SUSE Real Time Module 15 SP4:kernel-devel-rt-5.14.21-150400.15.5.1.noarch",
            "SUSE Real Time Module 15 SP4:kernel-rt-5.14.21-150400.15.5.1.x86_64",
            "SUSE Real Time Module 15 SP4:kernel-rt-devel-5.14.21-150400.15.5.1.x86_64",
            "SUSE Real Time Module 15 SP4:kernel-rt_debug-5.14.21-150400.15.5.1.x86_64",
            "SUSE Real Time Module 15 SP4:kernel-rt_debug-devel-5.14.21-150400.15.5.1.x86_64",
            "SUSE Real Time Module 15 SP4:kernel-source-rt-5.14.21-150400.15.5.1.noarch",
            "SUSE Real Time Module 15 SP4:kernel-syms-rt-5.14.21-150400.15.5.1.x86_64",
            "SUSE Real Time Module 15 SP4:ocfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64",
            "openSUSE Leap 15.4:cluster-md-kmp-rt-5.14.21-150400.15.5.1.x86_64",
            "openSUSE Leap 15.4:dlm-kmp-rt-5.14.21-150400.15.5.1.x86_64",
            "openSUSE Leap 15.4:gfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64",
            "openSUSE Leap 15.4:kernel-devel-rt-5.14.21-150400.15.5.1.noarch",
            "openSUSE Leap 15.4:kernel-rt-5.14.21-150400.15.5.1.x86_64",
            "openSUSE Leap 15.4:kernel-rt-devel-5.14.21-150400.15.5.1.x86_64",
            "openSUSE Leap 15.4:kernel-rt_debug-5.14.21-150400.15.5.1.x86_64",
            "openSUSE Leap 15.4:kernel-rt_debug-devel-5.14.21-150400.15.5.1.x86_64",
            "openSUSE Leap 15.4:kernel-source-rt-5.14.21-150400.15.5.1.noarch",
            "openSUSE Leap 15.4:kernel-syms-rt-5.14.21-150400.15.5.1.x86_64",
            "openSUSE Leap 15.4:ocfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2022-12-23T10:39:17Z",
          "details": "important"
        }
      ],
      "title": "CVE-2022-42719"
    },
    {
      "cve": "CVE-2022-42720",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2022-42720"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "Various refcounting bugs in the multi-BSS handling in the mac80211 stack in the Linux kernel 5.1 through 5.19.x before 5.19.16 could be used by local attackers (able to inject WLAN frames) to trigger use-after-free conditions to potentially execute code.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_15_5-rt-1-150400.1.3.1.x86_64",
          "SUSE Real Time Module 15 SP4:cluster-md-kmp-rt-5.14.21-150400.15.5.1.x86_64",
          "SUSE Real Time Module 15 SP4:dlm-kmp-rt-5.14.21-150400.15.5.1.x86_64",
          "SUSE Real Time Module 15 SP4:gfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64",
          "SUSE Real Time Module 15 SP4:kernel-devel-rt-5.14.21-150400.15.5.1.noarch",
          "SUSE Real Time Module 15 SP4:kernel-rt-5.14.21-150400.15.5.1.x86_64",
          "SUSE Real Time Module 15 SP4:kernel-rt-devel-5.14.21-150400.15.5.1.x86_64",
          "SUSE Real Time Module 15 SP4:kernel-rt_debug-5.14.21-150400.15.5.1.x86_64",
          "SUSE Real Time Module 15 SP4:kernel-rt_debug-devel-5.14.21-150400.15.5.1.x86_64",
          "SUSE Real Time Module 15 SP4:kernel-source-rt-5.14.21-150400.15.5.1.noarch",
          "SUSE Real Time Module 15 SP4:kernel-syms-rt-5.14.21-150400.15.5.1.x86_64",
          "SUSE Real Time Module 15 SP4:ocfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64",
          "openSUSE Leap 15.4:cluster-md-kmp-rt-5.14.21-150400.15.5.1.x86_64",
          "openSUSE Leap 15.4:dlm-kmp-rt-5.14.21-150400.15.5.1.x86_64",
          "openSUSE Leap 15.4:gfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64",
          "openSUSE Leap 15.4:kernel-devel-rt-5.14.21-150400.15.5.1.noarch",
          "openSUSE Leap 15.4:kernel-rt-5.14.21-150400.15.5.1.x86_64",
          "openSUSE Leap 15.4:kernel-rt-devel-5.14.21-150400.15.5.1.x86_64",
          "openSUSE Leap 15.4:kernel-rt_debug-5.14.21-150400.15.5.1.x86_64",
          "openSUSE Leap 15.4:kernel-rt_debug-devel-5.14.21-150400.15.5.1.x86_64",
          "openSUSE Leap 15.4:kernel-source-rt-5.14.21-150400.15.5.1.noarch",
          "openSUSE Leap 15.4:kernel-syms-rt-5.14.21-150400.15.5.1.x86_64",
          "openSUSE Leap 15.4:ocfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2022-42720",
          "url": "https://www.suse.com/security/cve/CVE-2022-42720"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1204059 for CVE-2022-42720",
          "url": "https://bugzilla.suse.com/1204059"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1204291 for CVE-2022-42720",
          "url": "https://bugzilla.suse.com/1204291"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1209225 for CVE-2022-42720",
          "url": "https://bugzilla.suse.com/1209225"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_15_5-rt-1-150400.1.3.1.x86_64",
            "SUSE Real Time Module 15 SP4:cluster-md-kmp-rt-5.14.21-150400.15.5.1.x86_64",
            "SUSE Real Time Module 15 SP4:dlm-kmp-rt-5.14.21-150400.15.5.1.x86_64",
            "SUSE Real Time Module 15 SP4:gfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64",
            "SUSE Real Time Module 15 SP4:kernel-devel-rt-5.14.21-150400.15.5.1.noarch",
            "SUSE Real Time Module 15 SP4:kernel-rt-5.14.21-150400.15.5.1.x86_64",
            "SUSE Real Time Module 15 SP4:kernel-rt-devel-5.14.21-150400.15.5.1.x86_64",
            "SUSE Real Time Module 15 SP4:kernel-rt_debug-5.14.21-150400.15.5.1.x86_64",
            "SUSE Real Time Module 15 SP4:kernel-rt_debug-devel-5.14.21-150400.15.5.1.x86_64",
            "SUSE Real Time Module 15 SP4:kernel-source-rt-5.14.21-150400.15.5.1.noarch",
            "SUSE Real Time Module 15 SP4:kernel-syms-rt-5.14.21-150400.15.5.1.x86_64",
            "SUSE Real Time Module 15 SP4:ocfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64",
            "openSUSE Leap 15.4:cluster-md-kmp-rt-5.14.21-150400.15.5.1.x86_64",
            "openSUSE Leap 15.4:dlm-kmp-rt-5.14.21-150400.15.5.1.x86_64",
            "openSUSE Leap 15.4:gfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64",
            "openSUSE Leap 15.4:kernel-devel-rt-5.14.21-150400.15.5.1.noarch",
            "openSUSE Leap 15.4:kernel-rt-5.14.21-150400.15.5.1.x86_64",
            "openSUSE Leap 15.4:kernel-rt-devel-5.14.21-150400.15.5.1.x86_64",
            "openSUSE Leap 15.4:kernel-rt_debug-5.14.21-150400.15.5.1.x86_64",
            "openSUSE Leap 15.4:kernel-rt_debug-devel-5.14.21-150400.15.5.1.x86_64",
            "openSUSE Leap 15.4:kernel-source-rt-5.14.21-150400.15.5.1.noarch",
            "openSUSE Leap 15.4:kernel-syms-rt-5.14.21-150400.15.5.1.x86_64",
            "openSUSE Leap 15.4:ocfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 7.5,
            "baseSeverity": "HIGH",
            "vectorString": "CVSS:3.1/AV:A/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H",
            "version": "3.1"
          },
          "products": [
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_15_5-rt-1-150400.1.3.1.x86_64",
            "SUSE Real Time Module 15 SP4:cluster-md-kmp-rt-5.14.21-150400.15.5.1.x86_64",
            "SUSE Real Time Module 15 SP4:dlm-kmp-rt-5.14.21-150400.15.5.1.x86_64",
            "SUSE Real Time Module 15 SP4:gfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64",
            "SUSE Real Time Module 15 SP4:kernel-devel-rt-5.14.21-150400.15.5.1.noarch",
            "SUSE Real Time Module 15 SP4:kernel-rt-5.14.21-150400.15.5.1.x86_64",
            "SUSE Real Time Module 15 SP4:kernel-rt-devel-5.14.21-150400.15.5.1.x86_64",
            "SUSE Real Time Module 15 SP4:kernel-rt_debug-5.14.21-150400.15.5.1.x86_64",
            "SUSE Real Time Module 15 SP4:kernel-rt_debug-devel-5.14.21-150400.15.5.1.x86_64",
            "SUSE Real Time Module 15 SP4:kernel-source-rt-5.14.21-150400.15.5.1.noarch",
            "SUSE Real Time Module 15 SP4:kernel-syms-rt-5.14.21-150400.15.5.1.x86_64",
            "SUSE Real Time Module 15 SP4:ocfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64",
            "openSUSE Leap 15.4:cluster-md-kmp-rt-5.14.21-150400.15.5.1.x86_64",
            "openSUSE Leap 15.4:dlm-kmp-rt-5.14.21-150400.15.5.1.x86_64",
            "openSUSE Leap 15.4:gfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64",
            "openSUSE Leap 15.4:kernel-devel-rt-5.14.21-150400.15.5.1.noarch",
            "openSUSE Leap 15.4:kernel-rt-5.14.21-150400.15.5.1.x86_64",
            "openSUSE Leap 15.4:kernel-rt-devel-5.14.21-150400.15.5.1.x86_64",
            "openSUSE Leap 15.4:kernel-rt_debug-5.14.21-150400.15.5.1.x86_64",
            "openSUSE Leap 15.4:kernel-rt_debug-devel-5.14.21-150400.15.5.1.x86_64",
            "openSUSE Leap 15.4:kernel-source-rt-5.14.21-150400.15.5.1.noarch",
            "openSUSE Leap 15.4:kernel-syms-rt-5.14.21-150400.15.5.1.x86_64",
            "openSUSE Leap 15.4:ocfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2022-12-23T10:39:17Z",
          "details": "important"
        }
      ],
      "title": "CVE-2022-42720"
    },
    {
      "cve": "CVE-2022-42721",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2022-42721"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "A list management bug in BSS handling in the mac80211 stack in the Linux kernel 5.1 through 5.19.x before 5.19.16 could be used by local attackers (able to inject WLAN frames) to corrupt a linked list and, in turn, potentially execute code.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_15_5-rt-1-150400.1.3.1.x86_64",
          "SUSE Real Time Module 15 SP4:cluster-md-kmp-rt-5.14.21-150400.15.5.1.x86_64",
          "SUSE Real Time Module 15 SP4:dlm-kmp-rt-5.14.21-150400.15.5.1.x86_64",
          "SUSE Real Time Module 15 SP4:gfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64",
          "SUSE Real Time Module 15 SP4:kernel-devel-rt-5.14.21-150400.15.5.1.noarch",
          "SUSE Real Time Module 15 SP4:kernel-rt-5.14.21-150400.15.5.1.x86_64",
          "SUSE Real Time Module 15 SP4:kernel-rt-devel-5.14.21-150400.15.5.1.x86_64",
          "SUSE Real Time Module 15 SP4:kernel-rt_debug-5.14.21-150400.15.5.1.x86_64",
          "SUSE Real Time Module 15 SP4:kernel-rt_debug-devel-5.14.21-150400.15.5.1.x86_64",
          "SUSE Real Time Module 15 SP4:kernel-source-rt-5.14.21-150400.15.5.1.noarch",
          "SUSE Real Time Module 15 SP4:kernel-syms-rt-5.14.21-150400.15.5.1.x86_64",
          "SUSE Real Time Module 15 SP4:ocfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64",
          "openSUSE Leap 15.4:cluster-md-kmp-rt-5.14.21-150400.15.5.1.x86_64",
          "openSUSE Leap 15.4:dlm-kmp-rt-5.14.21-150400.15.5.1.x86_64",
          "openSUSE Leap 15.4:gfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64",
          "openSUSE Leap 15.4:kernel-devel-rt-5.14.21-150400.15.5.1.noarch",
          "openSUSE Leap 15.4:kernel-rt-5.14.21-150400.15.5.1.x86_64",
          "openSUSE Leap 15.4:kernel-rt-devel-5.14.21-150400.15.5.1.x86_64",
          "openSUSE Leap 15.4:kernel-rt_debug-5.14.21-150400.15.5.1.x86_64",
          "openSUSE Leap 15.4:kernel-rt_debug-devel-5.14.21-150400.15.5.1.x86_64",
          "openSUSE Leap 15.4:kernel-source-rt-5.14.21-150400.15.5.1.noarch",
          "openSUSE Leap 15.4:kernel-syms-rt-5.14.21-150400.15.5.1.x86_64",
          "openSUSE Leap 15.4:ocfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2022-42721",
          "url": "https://www.suse.com/security/cve/CVE-2022-42721"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1204060 for CVE-2022-42721",
          "url": "https://bugzilla.suse.com/1204060"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1204290 for CVE-2022-42721",
          "url": "https://bugzilla.suse.com/1204290"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1209225 for CVE-2022-42721",
          "url": "https://bugzilla.suse.com/1209225"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_15_5-rt-1-150400.1.3.1.x86_64",
            "SUSE Real Time Module 15 SP4:cluster-md-kmp-rt-5.14.21-150400.15.5.1.x86_64",
            "SUSE Real Time Module 15 SP4:dlm-kmp-rt-5.14.21-150400.15.5.1.x86_64",
            "SUSE Real Time Module 15 SP4:gfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64",
            "SUSE Real Time Module 15 SP4:kernel-devel-rt-5.14.21-150400.15.5.1.noarch",
            "SUSE Real Time Module 15 SP4:kernel-rt-5.14.21-150400.15.5.1.x86_64",
            "SUSE Real Time Module 15 SP4:kernel-rt-devel-5.14.21-150400.15.5.1.x86_64",
            "SUSE Real Time Module 15 SP4:kernel-rt_debug-5.14.21-150400.15.5.1.x86_64",
            "SUSE Real Time Module 15 SP4:kernel-rt_debug-devel-5.14.21-150400.15.5.1.x86_64",
            "SUSE Real Time Module 15 SP4:kernel-source-rt-5.14.21-150400.15.5.1.noarch",
            "SUSE Real Time Module 15 SP4:kernel-syms-rt-5.14.21-150400.15.5.1.x86_64",
            "SUSE Real Time Module 15 SP4:ocfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64",
            "openSUSE Leap 15.4:cluster-md-kmp-rt-5.14.21-150400.15.5.1.x86_64",
            "openSUSE Leap 15.4:dlm-kmp-rt-5.14.21-150400.15.5.1.x86_64",
            "openSUSE Leap 15.4:gfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64",
            "openSUSE Leap 15.4:kernel-devel-rt-5.14.21-150400.15.5.1.noarch",
            "openSUSE Leap 15.4:kernel-rt-5.14.21-150400.15.5.1.x86_64",
            "openSUSE Leap 15.4:kernel-rt-devel-5.14.21-150400.15.5.1.x86_64",
            "openSUSE Leap 15.4:kernel-rt_debug-5.14.21-150400.15.5.1.x86_64",
            "openSUSE Leap 15.4:kernel-rt_debug-devel-5.14.21-150400.15.5.1.x86_64",
            "openSUSE Leap 15.4:kernel-source-rt-5.14.21-150400.15.5.1.noarch",
            "openSUSE Leap 15.4:kernel-syms-rt-5.14.21-150400.15.5.1.x86_64",
            "openSUSE Leap 15.4:ocfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 7.5,
            "baseSeverity": "HIGH",
            "vectorString": "CVSS:3.1/AV:A/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H",
            "version": "3.1"
          },
          "products": [
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_15_5-rt-1-150400.1.3.1.x86_64",
            "SUSE Real Time Module 15 SP4:cluster-md-kmp-rt-5.14.21-150400.15.5.1.x86_64",
            "SUSE Real Time Module 15 SP4:dlm-kmp-rt-5.14.21-150400.15.5.1.x86_64",
            "SUSE Real Time Module 15 SP4:gfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64",
            "SUSE Real Time Module 15 SP4:kernel-devel-rt-5.14.21-150400.15.5.1.noarch",
            "SUSE Real Time Module 15 SP4:kernel-rt-5.14.21-150400.15.5.1.x86_64",
            "SUSE Real Time Module 15 SP4:kernel-rt-devel-5.14.21-150400.15.5.1.x86_64",
            "SUSE Real Time Module 15 SP4:kernel-rt_debug-5.14.21-150400.15.5.1.x86_64",
            "SUSE Real Time Module 15 SP4:kernel-rt_debug-devel-5.14.21-150400.15.5.1.x86_64",
            "SUSE Real Time Module 15 SP4:kernel-source-rt-5.14.21-150400.15.5.1.noarch",
            "SUSE Real Time Module 15 SP4:kernel-syms-rt-5.14.21-150400.15.5.1.x86_64",
            "SUSE Real Time Module 15 SP4:ocfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64",
            "openSUSE Leap 15.4:cluster-md-kmp-rt-5.14.21-150400.15.5.1.x86_64",
            "openSUSE Leap 15.4:dlm-kmp-rt-5.14.21-150400.15.5.1.x86_64",
            "openSUSE Leap 15.4:gfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64",
            "openSUSE Leap 15.4:kernel-devel-rt-5.14.21-150400.15.5.1.noarch",
            "openSUSE Leap 15.4:kernel-rt-5.14.21-150400.15.5.1.x86_64",
            "openSUSE Leap 15.4:kernel-rt-devel-5.14.21-150400.15.5.1.x86_64",
            "openSUSE Leap 15.4:kernel-rt_debug-5.14.21-150400.15.5.1.x86_64",
            "openSUSE Leap 15.4:kernel-rt_debug-devel-5.14.21-150400.15.5.1.x86_64",
            "openSUSE Leap 15.4:kernel-source-rt-5.14.21-150400.15.5.1.noarch",
            "openSUSE Leap 15.4:kernel-syms-rt-5.14.21-150400.15.5.1.x86_64",
            "openSUSE Leap 15.4:ocfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2022-12-23T10:39:17Z",
          "details": "important"
        }
      ],
      "title": "CVE-2022-42721"
    },
    {
      "cve": "CVE-2022-42722",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2022-42722"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "In the Linux kernel 5.8 through 5.19.x before 5.19.16, local attackers able to inject WLAN frames into the mac80211 stack could cause a NULL pointer dereference denial-of-service attack against the beacon protection of P2P devices.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_15_5-rt-1-150400.1.3.1.x86_64",
          "SUSE Real Time Module 15 SP4:cluster-md-kmp-rt-5.14.21-150400.15.5.1.x86_64",
          "SUSE Real Time Module 15 SP4:dlm-kmp-rt-5.14.21-150400.15.5.1.x86_64",
          "SUSE Real Time Module 15 SP4:gfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64",
          "SUSE Real Time Module 15 SP4:kernel-devel-rt-5.14.21-150400.15.5.1.noarch",
          "SUSE Real Time Module 15 SP4:kernel-rt-5.14.21-150400.15.5.1.x86_64",
          "SUSE Real Time Module 15 SP4:kernel-rt-devel-5.14.21-150400.15.5.1.x86_64",
          "SUSE Real Time Module 15 SP4:kernel-rt_debug-5.14.21-150400.15.5.1.x86_64",
          "SUSE Real Time Module 15 SP4:kernel-rt_debug-devel-5.14.21-150400.15.5.1.x86_64",
          "SUSE Real Time Module 15 SP4:kernel-source-rt-5.14.21-150400.15.5.1.noarch",
          "SUSE Real Time Module 15 SP4:kernel-syms-rt-5.14.21-150400.15.5.1.x86_64",
          "SUSE Real Time Module 15 SP4:ocfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64",
          "openSUSE Leap 15.4:cluster-md-kmp-rt-5.14.21-150400.15.5.1.x86_64",
          "openSUSE Leap 15.4:dlm-kmp-rt-5.14.21-150400.15.5.1.x86_64",
          "openSUSE Leap 15.4:gfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64",
          "openSUSE Leap 15.4:kernel-devel-rt-5.14.21-150400.15.5.1.noarch",
          "openSUSE Leap 15.4:kernel-rt-5.14.21-150400.15.5.1.x86_64",
          "openSUSE Leap 15.4:kernel-rt-devel-5.14.21-150400.15.5.1.x86_64",
          "openSUSE Leap 15.4:kernel-rt_debug-5.14.21-150400.15.5.1.x86_64",
          "openSUSE Leap 15.4:kernel-rt_debug-devel-5.14.21-150400.15.5.1.x86_64",
          "openSUSE Leap 15.4:kernel-source-rt-5.14.21-150400.15.5.1.noarch",
          "openSUSE Leap 15.4:kernel-syms-rt-5.14.21-150400.15.5.1.x86_64",
          "openSUSE Leap 15.4:ocfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2022-42722",
          "url": "https://www.suse.com/security/cve/CVE-2022-42722"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1204125 for CVE-2022-42722",
          "url": "https://bugzilla.suse.com/1204125"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1204289 for CVE-2022-42722",
          "url": "https://bugzilla.suse.com/1204289"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1209225 for CVE-2022-42722",
          "url": "https://bugzilla.suse.com/1209225"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_15_5-rt-1-150400.1.3.1.x86_64",
            "SUSE Real Time Module 15 SP4:cluster-md-kmp-rt-5.14.21-150400.15.5.1.x86_64",
            "SUSE Real Time Module 15 SP4:dlm-kmp-rt-5.14.21-150400.15.5.1.x86_64",
            "SUSE Real Time Module 15 SP4:gfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64",
            "SUSE Real Time Module 15 SP4:kernel-devel-rt-5.14.21-150400.15.5.1.noarch",
            "SUSE Real Time Module 15 SP4:kernel-rt-5.14.21-150400.15.5.1.x86_64",
            "SUSE Real Time Module 15 SP4:kernel-rt-devel-5.14.21-150400.15.5.1.x86_64",
            "SUSE Real Time Module 15 SP4:kernel-rt_debug-5.14.21-150400.15.5.1.x86_64",
            "SUSE Real Time Module 15 SP4:kernel-rt_debug-devel-5.14.21-150400.15.5.1.x86_64",
            "SUSE Real Time Module 15 SP4:kernel-source-rt-5.14.21-150400.15.5.1.noarch",
            "SUSE Real Time Module 15 SP4:kernel-syms-rt-5.14.21-150400.15.5.1.x86_64",
            "SUSE Real Time Module 15 SP4:ocfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64",
            "openSUSE Leap 15.4:cluster-md-kmp-rt-5.14.21-150400.15.5.1.x86_64",
            "openSUSE Leap 15.4:dlm-kmp-rt-5.14.21-150400.15.5.1.x86_64",
            "openSUSE Leap 15.4:gfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64",
            "openSUSE Leap 15.4:kernel-devel-rt-5.14.21-150400.15.5.1.noarch",
            "openSUSE Leap 15.4:kernel-rt-5.14.21-150400.15.5.1.x86_64",
            "openSUSE Leap 15.4:kernel-rt-devel-5.14.21-150400.15.5.1.x86_64",
            "openSUSE Leap 15.4:kernel-rt_debug-5.14.21-150400.15.5.1.x86_64",
            "openSUSE Leap 15.4:kernel-rt_debug-devel-5.14.21-150400.15.5.1.x86_64",
            "openSUSE Leap 15.4:kernel-source-rt-5.14.21-150400.15.5.1.noarch",
            "openSUSE Leap 15.4:kernel-syms-rt-5.14.21-150400.15.5.1.x86_64",
            "openSUSE Leap 15.4:ocfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 7.5,
            "baseSeverity": "HIGH",
            "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
            "version": "3.1"
          },
          "products": [
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_15_5-rt-1-150400.1.3.1.x86_64",
            "SUSE Real Time Module 15 SP4:cluster-md-kmp-rt-5.14.21-150400.15.5.1.x86_64",
            "SUSE Real Time Module 15 SP4:dlm-kmp-rt-5.14.21-150400.15.5.1.x86_64",
            "SUSE Real Time Module 15 SP4:gfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64",
            "SUSE Real Time Module 15 SP4:kernel-devel-rt-5.14.21-150400.15.5.1.noarch",
            "SUSE Real Time Module 15 SP4:kernel-rt-5.14.21-150400.15.5.1.x86_64",
            "SUSE Real Time Module 15 SP4:kernel-rt-devel-5.14.21-150400.15.5.1.x86_64",
            "SUSE Real Time Module 15 SP4:kernel-rt_debug-5.14.21-150400.15.5.1.x86_64",
            "SUSE Real Time Module 15 SP4:kernel-rt_debug-devel-5.14.21-150400.15.5.1.x86_64",
            "SUSE Real Time Module 15 SP4:kernel-source-rt-5.14.21-150400.15.5.1.noarch",
            "SUSE Real Time Module 15 SP4:kernel-syms-rt-5.14.21-150400.15.5.1.x86_64",
            "SUSE Real Time Module 15 SP4:ocfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64",
            "openSUSE Leap 15.4:cluster-md-kmp-rt-5.14.21-150400.15.5.1.x86_64",
            "openSUSE Leap 15.4:dlm-kmp-rt-5.14.21-150400.15.5.1.x86_64",
            "openSUSE Leap 15.4:gfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64",
            "openSUSE Leap 15.4:kernel-devel-rt-5.14.21-150400.15.5.1.noarch",
            "openSUSE Leap 15.4:kernel-rt-5.14.21-150400.15.5.1.x86_64",
            "openSUSE Leap 15.4:kernel-rt-devel-5.14.21-150400.15.5.1.x86_64",
            "openSUSE Leap 15.4:kernel-rt_debug-5.14.21-150400.15.5.1.x86_64",
            "openSUSE Leap 15.4:kernel-rt_debug-devel-5.14.21-150400.15.5.1.x86_64",
            "openSUSE Leap 15.4:kernel-source-rt-5.14.21-150400.15.5.1.noarch",
            "openSUSE Leap 15.4:kernel-syms-rt-5.14.21-150400.15.5.1.x86_64",
            "openSUSE Leap 15.4:ocfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2022-12-23T10:39:17Z",
          "details": "important"
        }
      ],
      "title": "CVE-2022-42722"
    },
    {
      "cve": "CVE-2022-42895",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2022-42895"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "There is an infoleak vulnerability in the Linux kernel\u0027s net/bluetooth/l2cap_core.c\u0027s l2cap_parse_conf_req function which can be used to leak kernel pointers remotely. We recommend upgrading past commit https://github.com/torvalds/linux/commit/b1a2cd50c0357f243b7435a732b4e62ba3157a2e https://www.google.com/url",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_15_5-rt-1-150400.1.3.1.x86_64",
          "SUSE Real Time Module 15 SP4:cluster-md-kmp-rt-5.14.21-150400.15.5.1.x86_64",
          "SUSE Real Time Module 15 SP4:dlm-kmp-rt-5.14.21-150400.15.5.1.x86_64",
          "SUSE Real Time Module 15 SP4:gfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64",
          "SUSE Real Time Module 15 SP4:kernel-devel-rt-5.14.21-150400.15.5.1.noarch",
          "SUSE Real Time Module 15 SP4:kernel-rt-5.14.21-150400.15.5.1.x86_64",
          "SUSE Real Time Module 15 SP4:kernel-rt-devel-5.14.21-150400.15.5.1.x86_64",
          "SUSE Real Time Module 15 SP4:kernel-rt_debug-5.14.21-150400.15.5.1.x86_64",
          "SUSE Real Time Module 15 SP4:kernel-rt_debug-devel-5.14.21-150400.15.5.1.x86_64",
          "SUSE Real Time Module 15 SP4:kernel-source-rt-5.14.21-150400.15.5.1.noarch",
          "SUSE Real Time Module 15 SP4:kernel-syms-rt-5.14.21-150400.15.5.1.x86_64",
          "SUSE Real Time Module 15 SP4:ocfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64",
          "openSUSE Leap 15.4:cluster-md-kmp-rt-5.14.21-150400.15.5.1.x86_64",
          "openSUSE Leap 15.4:dlm-kmp-rt-5.14.21-150400.15.5.1.x86_64",
          "openSUSE Leap 15.4:gfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64",
          "openSUSE Leap 15.4:kernel-devel-rt-5.14.21-150400.15.5.1.noarch",
          "openSUSE Leap 15.4:kernel-rt-5.14.21-150400.15.5.1.x86_64",
          "openSUSE Leap 15.4:kernel-rt-devel-5.14.21-150400.15.5.1.x86_64",
          "openSUSE Leap 15.4:kernel-rt_debug-5.14.21-150400.15.5.1.x86_64",
          "openSUSE Leap 15.4:kernel-rt_debug-devel-5.14.21-150400.15.5.1.x86_64",
          "openSUSE Leap 15.4:kernel-source-rt-5.14.21-150400.15.5.1.noarch",
          "openSUSE Leap 15.4:kernel-syms-rt-5.14.21-150400.15.5.1.x86_64",
          "openSUSE Leap 15.4:ocfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2022-42895",
          "url": "https://www.suse.com/security/cve/CVE-2022-42895"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1205705 for CVE-2022-42895",
          "url": "https://bugzilla.suse.com/1205705"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_15_5-rt-1-150400.1.3.1.x86_64",
            "SUSE Real Time Module 15 SP4:cluster-md-kmp-rt-5.14.21-150400.15.5.1.x86_64",
            "SUSE Real Time Module 15 SP4:dlm-kmp-rt-5.14.21-150400.15.5.1.x86_64",
            "SUSE Real Time Module 15 SP4:gfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64",
            "SUSE Real Time Module 15 SP4:kernel-devel-rt-5.14.21-150400.15.5.1.noarch",
            "SUSE Real Time Module 15 SP4:kernel-rt-5.14.21-150400.15.5.1.x86_64",
            "SUSE Real Time Module 15 SP4:kernel-rt-devel-5.14.21-150400.15.5.1.x86_64",
            "SUSE Real Time Module 15 SP4:kernel-rt_debug-5.14.21-150400.15.5.1.x86_64",
            "SUSE Real Time Module 15 SP4:kernel-rt_debug-devel-5.14.21-150400.15.5.1.x86_64",
            "SUSE Real Time Module 15 SP4:kernel-source-rt-5.14.21-150400.15.5.1.noarch",
            "SUSE Real Time Module 15 SP4:kernel-syms-rt-5.14.21-150400.15.5.1.x86_64",
            "SUSE Real Time Module 15 SP4:ocfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64",
            "openSUSE Leap 15.4:cluster-md-kmp-rt-5.14.21-150400.15.5.1.x86_64",
            "openSUSE Leap 15.4:dlm-kmp-rt-5.14.21-150400.15.5.1.x86_64",
            "openSUSE Leap 15.4:gfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64",
            "openSUSE Leap 15.4:kernel-devel-rt-5.14.21-150400.15.5.1.noarch",
            "openSUSE Leap 15.4:kernel-rt-5.14.21-150400.15.5.1.x86_64",
            "openSUSE Leap 15.4:kernel-rt-devel-5.14.21-150400.15.5.1.x86_64",
            "openSUSE Leap 15.4:kernel-rt_debug-5.14.21-150400.15.5.1.x86_64",
            "openSUSE Leap 15.4:kernel-rt_debug-devel-5.14.21-150400.15.5.1.x86_64",
            "openSUSE Leap 15.4:kernel-source-rt-5.14.21-150400.15.5.1.noarch",
            "openSUSE Leap 15.4:kernel-syms-rt-5.14.21-150400.15.5.1.x86_64",
            "openSUSE Leap 15.4:ocfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 6.8,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:A/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:H",
            "version": "3.1"
          },
          "products": [
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_15_5-rt-1-150400.1.3.1.x86_64",
            "SUSE Real Time Module 15 SP4:cluster-md-kmp-rt-5.14.21-150400.15.5.1.x86_64",
            "SUSE Real Time Module 15 SP4:dlm-kmp-rt-5.14.21-150400.15.5.1.x86_64",
            "SUSE Real Time Module 15 SP4:gfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64",
            "SUSE Real Time Module 15 SP4:kernel-devel-rt-5.14.21-150400.15.5.1.noarch",
            "SUSE Real Time Module 15 SP4:kernel-rt-5.14.21-150400.15.5.1.x86_64",
            "SUSE Real Time Module 15 SP4:kernel-rt-devel-5.14.21-150400.15.5.1.x86_64",
            "SUSE Real Time Module 15 SP4:kernel-rt_debug-5.14.21-150400.15.5.1.x86_64",
            "SUSE Real Time Module 15 SP4:kernel-rt_debug-devel-5.14.21-150400.15.5.1.x86_64",
            "SUSE Real Time Module 15 SP4:kernel-source-rt-5.14.21-150400.15.5.1.noarch",
            "SUSE Real Time Module 15 SP4:kernel-syms-rt-5.14.21-150400.15.5.1.x86_64",
            "SUSE Real Time Module 15 SP4:ocfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64",
            "openSUSE Leap 15.4:cluster-md-kmp-rt-5.14.21-150400.15.5.1.x86_64",
            "openSUSE Leap 15.4:dlm-kmp-rt-5.14.21-150400.15.5.1.x86_64",
            "openSUSE Leap 15.4:gfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64",
            "openSUSE Leap 15.4:kernel-devel-rt-5.14.21-150400.15.5.1.noarch",
            "openSUSE Leap 15.4:kernel-rt-5.14.21-150400.15.5.1.x86_64",
            "openSUSE Leap 15.4:kernel-rt-devel-5.14.21-150400.15.5.1.x86_64",
            "openSUSE Leap 15.4:kernel-rt_debug-5.14.21-150400.15.5.1.x86_64",
            "openSUSE Leap 15.4:kernel-rt_debug-devel-5.14.21-150400.15.5.1.x86_64",
            "openSUSE Leap 15.4:kernel-source-rt-5.14.21-150400.15.5.1.noarch",
            "openSUSE Leap 15.4:kernel-syms-rt-5.14.21-150400.15.5.1.x86_64",
            "openSUSE Leap 15.4:ocfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2022-12-23T10:39:17Z",
          "details": "moderate"
        }
      ],
      "title": "CVE-2022-42895"
    },
    {
      "cve": "CVE-2022-42896",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2022-42896"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "There are use-after-free vulnerabilities in the Linux kernel\u0027s net/bluetooth/l2cap_core.c\u0027s l2cap_connect and l2cap_le_connect_req functions which may allow code execution and leaking kernel memory (respectively) remotely via Bluetooth. A remote attacker could execute code leaking kernel memory via Bluetooth if within proximity of the victim. We recommend upgrading past commit https://www.google.com/url https://github.com/torvalds/linux/commit/711f8c3fb3db61897080468586b970c87c61d9e4 https://www.google.com/url",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_15_5-rt-1-150400.1.3.1.x86_64",
          "SUSE Real Time Module 15 SP4:cluster-md-kmp-rt-5.14.21-150400.15.5.1.x86_64",
          "SUSE Real Time Module 15 SP4:dlm-kmp-rt-5.14.21-150400.15.5.1.x86_64",
          "SUSE Real Time Module 15 SP4:gfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64",
          "SUSE Real Time Module 15 SP4:kernel-devel-rt-5.14.21-150400.15.5.1.noarch",
          "SUSE Real Time Module 15 SP4:kernel-rt-5.14.21-150400.15.5.1.x86_64",
          "SUSE Real Time Module 15 SP4:kernel-rt-devel-5.14.21-150400.15.5.1.x86_64",
          "SUSE Real Time Module 15 SP4:kernel-rt_debug-5.14.21-150400.15.5.1.x86_64",
          "SUSE Real Time Module 15 SP4:kernel-rt_debug-devel-5.14.21-150400.15.5.1.x86_64",
          "SUSE Real Time Module 15 SP4:kernel-source-rt-5.14.21-150400.15.5.1.noarch",
          "SUSE Real Time Module 15 SP4:kernel-syms-rt-5.14.21-150400.15.5.1.x86_64",
          "SUSE Real Time Module 15 SP4:ocfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64",
          "openSUSE Leap 15.4:cluster-md-kmp-rt-5.14.21-150400.15.5.1.x86_64",
          "openSUSE Leap 15.4:dlm-kmp-rt-5.14.21-150400.15.5.1.x86_64",
          "openSUSE Leap 15.4:gfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64",
          "openSUSE Leap 15.4:kernel-devel-rt-5.14.21-150400.15.5.1.noarch",
          "openSUSE Leap 15.4:kernel-rt-5.14.21-150400.15.5.1.x86_64",
          "openSUSE Leap 15.4:kernel-rt-devel-5.14.21-150400.15.5.1.x86_64",
          "openSUSE Leap 15.4:kernel-rt_debug-5.14.21-150400.15.5.1.x86_64",
          "openSUSE Leap 15.4:kernel-rt_debug-devel-5.14.21-150400.15.5.1.x86_64",
          "openSUSE Leap 15.4:kernel-source-rt-5.14.21-150400.15.5.1.noarch",
          "openSUSE Leap 15.4:kernel-syms-rt-5.14.21-150400.15.5.1.x86_64",
          "openSUSE Leap 15.4:ocfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2022-42896",
          "url": "https://www.suse.com/security/cve/CVE-2022-42896"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1205709 for CVE-2022-42896",
          "url": "https://bugzilla.suse.com/1205709"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_15_5-rt-1-150400.1.3.1.x86_64",
            "SUSE Real Time Module 15 SP4:cluster-md-kmp-rt-5.14.21-150400.15.5.1.x86_64",
            "SUSE Real Time Module 15 SP4:dlm-kmp-rt-5.14.21-150400.15.5.1.x86_64",
            "SUSE Real Time Module 15 SP4:gfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64",
            "SUSE Real Time Module 15 SP4:kernel-devel-rt-5.14.21-150400.15.5.1.noarch",
            "SUSE Real Time Module 15 SP4:kernel-rt-5.14.21-150400.15.5.1.x86_64",
            "SUSE Real Time Module 15 SP4:kernel-rt-devel-5.14.21-150400.15.5.1.x86_64",
            "SUSE Real Time Module 15 SP4:kernel-rt_debug-5.14.21-150400.15.5.1.x86_64",
            "SUSE Real Time Module 15 SP4:kernel-rt_debug-devel-5.14.21-150400.15.5.1.x86_64",
            "SUSE Real Time Module 15 SP4:kernel-source-rt-5.14.21-150400.15.5.1.noarch",
            "SUSE Real Time Module 15 SP4:kernel-syms-rt-5.14.21-150400.15.5.1.x86_64",
            "SUSE Real Time Module 15 SP4:ocfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64",
            "openSUSE Leap 15.4:cluster-md-kmp-rt-5.14.21-150400.15.5.1.x86_64",
            "openSUSE Leap 15.4:dlm-kmp-rt-5.14.21-150400.15.5.1.x86_64",
            "openSUSE Leap 15.4:gfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64",
            "openSUSE Leap 15.4:kernel-devel-rt-5.14.21-150400.15.5.1.noarch",
            "openSUSE Leap 15.4:kernel-rt-5.14.21-150400.15.5.1.x86_64",
            "openSUSE Leap 15.4:kernel-rt-devel-5.14.21-150400.15.5.1.x86_64",
            "openSUSE Leap 15.4:kernel-rt_debug-5.14.21-150400.15.5.1.x86_64",
            "openSUSE Leap 15.4:kernel-rt_debug-devel-5.14.21-150400.15.5.1.x86_64",
            "openSUSE Leap 15.4:kernel-source-rt-5.14.21-150400.15.5.1.noarch",
            "openSUSE Leap 15.4:kernel-syms-rt-5.14.21-150400.15.5.1.x86_64",
            "openSUSE Leap 15.4:ocfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 6.8,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:A/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N",
            "version": "3.1"
          },
          "products": [
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_15_5-rt-1-150400.1.3.1.x86_64",
            "SUSE Real Time Module 15 SP4:cluster-md-kmp-rt-5.14.21-150400.15.5.1.x86_64",
            "SUSE Real Time Module 15 SP4:dlm-kmp-rt-5.14.21-150400.15.5.1.x86_64",
            "SUSE Real Time Module 15 SP4:gfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64",
            "SUSE Real Time Module 15 SP4:kernel-devel-rt-5.14.21-150400.15.5.1.noarch",
            "SUSE Real Time Module 15 SP4:kernel-rt-5.14.21-150400.15.5.1.x86_64",
            "SUSE Real Time Module 15 SP4:kernel-rt-devel-5.14.21-150400.15.5.1.x86_64",
            "SUSE Real Time Module 15 SP4:kernel-rt_debug-5.14.21-150400.15.5.1.x86_64",
            "SUSE Real Time Module 15 SP4:kernel-rt_debug-devel-5.14.21-150400.15.5.1.x86_64",
            "SUSE Real Time Module 15 SP4:kernel-source-rt-5.14.21-150400.15.5.1.noarch",
            "SUSE Real Time Module 15 SP4:kernel-syms-rt-5.14.21-150400.15.5.1.x86_64",
            "SUSE Real Time Module 15 SP4:ocfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64",
            "openSUSE Leap 15.4:cluster-md-kmp-rt-5.14.21-150400.15.5.1.x86_64",
            "openSUSE Leap 15.4:dlm-kmp-rt-5.14.21-150400.15.5.1.x86_64",
            "openSUSE Leap 15.4:gfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64",
            "openSUSE Leap 15.4:kernel-devel-rt-5.14.21-150400.15.5.1.noarch",
            "openSUSE Leap 15.4:kernel-rt-5.14.21-150400.15.5.1.x86_64",
            "openSUSE Leap 15.4:kernel-rt-devel-5.14.21-150400.15.5.1.x86_64",
            "openSUSE Leap 15.4:kernel-rt_debug-5.14.21-150400.15.5.1.x86_64",
            "openSUSE Leap 15.4:kernel-rt_debug-devel-5.14.21-150400.15.5.1.x86_64",
            "openSUSE Leap 15.4:kernel-source-rt-5.14.21-150400.15.5.1.noarch",
            "openSUSE Leap 15.4:kernel-syms-rt-5.14.21-150400.15.5.1.x86_64",
            "openSUSE Leap 15.4:ocfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2022-12-23T10:39:17Z",
          "details": "moderate"
        }
      ],
      "title": "CVE-2022-42896"
    },
    {
      "cve": "CVE-2022-43750",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2022-43750"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "drivers/usb/mon/mon_bin.c in usbmon in the Linux kernel before 5.19.15 and 6.x before 6.0.1 allows a user-space client to corrupt the monitor\u0027s internal memory.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_15_5-rt-1-150400.1.3.1.x86_64",
          "SUSE Real Time Module 15 SP4:cluster-md-kmp-rt-5.14.21-150400.15.5.1.x86_64",
          "SUSE Real Time Module 15 SP4:dlm-kmp-rt-5.14.21-150400.15.5.1.x86_64",
          "SUSE Real Time Module 15 SP4:gfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64",
          "SUSE Real Time Module 15 SP4:kernel-devel-rt-5.14.21-150400.15.5.1.noarch",
          "SUSE Real Time Module 15 SP4:kernel-rt-5.14.21-150400.15.5.1.x86_64",
          "SUSE Real Time Module 15 SP4:kernel-rt-devel-5.14.21-150400.15.5.1.x86_64",
          "SUSE Real Time Module 15 SP4:kernel-rt_debug-5.14.21-150400.15.5.1.x86_64",
          "SUSE Real Time Module 15 SP4:kernel-rt_debug-devel-5.14.21-150400.15.5.1.x86_64",
          "SUSE Real Time Module 15 SP4:kernel-source-rt-5.14.21-150400.15.5.1.noarch",
          "SUSE Real Time Module 15 SP4:kernel-syms-rt-5.14.21-150400.15.5.1.x86_64",
          "SUSE Real Time Module 15 SP4:ocfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64",
          "openSUSE Leap 15.4:cluster-md-kmp-rt-5.14.21-150400.15.5.1.x86_64",
          "openSUSE Leap 15.4:dlm-kmp-rt-5.14.21-150400.15.5.1.x86_64",
          "openSUSE Leap 15.4:gfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64",
          "openSUSE Leap 15.4:kernel-devel-rt-5.14.21-150400.15.5.1.noarch",
          "openSUSE Leap 15.4:kernel-rt-5.14.21-150400.15.5.1.x86_64",
          "openSUSE Leap 15.4:kernel-rt-devel-5.14.21-150400.15.5.1.x86_64",
          "openSUSE Leap 15.4:kernel-rt_debug-5.14.21-150400.15.5.1.x86_64",
          "openSUSE Leap 15.4:kernel-rt_debug-devel-5.14.21-150400.15.5.1.x86_64",
          "openSUSE Leap 15.4:kernel-source-rt-5.14.21-150400.15.5.1.noarch",
          "openSUSE Leap 15.4:kernel-syms-rt-5.14.21-150400.15.5.1.x86_64",
          "openSUSE Leap 15.4:ocfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2022-43750",
          "url": "https://www.suse.com/security/cve/CVE-2022-43750"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1204653 for CVE-2022-43750",
          "url": "https://bugzilla.suse.com/1204653"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1211484 for CVE-2022-43750",
          "url": "https://bugzilla.suse.com/1211484"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_15_5-rt-1-150400.1.3.1.x86_64",
            "SUSE Real Time Module 15 SP4:cluster-md-kmp-rt-5.14.21-150400.15.5.1.x86_64",
            "SUSE Real Time Module 15 SP4:dlm-kmp-rt-5.14.21-150400.15.5.1.x86_64",
            "SUSE Real Time Module 15 SP4:gfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64",
            "SUSE Real Time Module 15 SP4:kernel-devel-rt-5.14.21-150400.15.5.1.noarch",
            "SUSE Real Time Module 15 SP4:kernel-rt-5.14.21-150400.15.5.1.x86_64",
            "SUSE Real Time Module 15 SP4:kernel-rt-devel-5.14.21-150400.15.5.1.x86_64",
            "SUSE Real Time Module 15 SP4:kernel-rt_debug-5.14.21-150400.15.5.1.x86_64",
            "SUSE Real Time Module 15 SP4:kernel-rt_debug-devel-5.14.21-150400.15.5.1.x86_64",
            "SUSE Real Time Module 15 SP4:kernel-source-rt-5.14.21-150400.15.5.1.noarch",
            "SUSE Real Time Module 15 SP4:kernel-syms-rt-5.14.21-150400.15.5.1.x86_64",
            "SUSE Real Time Module 15 SP4:ocfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64",
            "openSUSE Leap 15.4:cluster-md-kmp-rt-5.14.21-150400.15.5.1.x86_64",
            "openSUSE Leap 15.4:dlm-kmp-rt-5.14.21-150400.15.5.1.x86_64",
            "openSUSE Leap 15.4:gfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64",
            "openSUSE Leap 15.4:kernel-devel-rt-5.14.21-150400.15.5.1.noarch",
            "openSUSE Leap 15.4:kernel-rt-5.14.21-150400.15.5.1.x86_64",
            "openSUSE Leap 15.4:kernel-rt-devel-5.14.21-150400.15.5.1.x86_64",
            "openSUSE Leap 15.4:kernel-rt_debug-5.14.21-150400.15.5.1.x86_64",
            "openSUSE Leap 15.4:kernel-rt_debug-devel-5.14.21-150400.15.5.1.x86_64",
            "openSUSE Leap 15.4:kernel-source-rt-5.14.21-150400.15.5.1.noarch",
            "openSUSE Leap 15.4:kernel-syms-rt-5.14.21-150400.15.5.1.x86_64",
            "openSUSE Leap 15.4:ocfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 6.7,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H",
            "version": "3.1"
          },
          "products": [
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_15_5-rt-1-150400.1.3.1.x86_64",
            "SUSE Real Time Module 15 SP4:cluster-md-kmp-rt-5.14.21-150400.15.5.1.x86_64",
            "SUSE Real Time Module 15 SP4:dlm-kmp-rt-5.14.21-150400.15.5.1.x86_64",
            "SUSE Real Time Module 15 SP4:gfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64",
            "SUSE Real Time Module 15 SP4:kernel-devel-rt-5.14.21-150400.15.5.1.noarch",
            "SUSE Real Time Module 15 SP4:kernel-rt-5.14.21-150400.15.5.1.x86_64",
            "SUSE Real Time Module 15 SP4:kernel-rt-devel-5.14.21-150400.15.5.1.x86_64",
            "SUSE Real Time Module 15 SP4:kernel-rt_debug-5.14.21-150400.15.5.1.x86_64",
            "SUSE Real Time Module 15 SP4:kernel-rt_debug-devel-5.14.21-150400.15.5.1.x86_64",
            "SUSE Real Time Module 15 SP4:kernel-source-rt-5.14.21-150400.15.5.1.noarch",
            "SUSE Real Time Module 15 SP4:kernel-syms-rt-5.14.21-150400.15.5.1.x86_64",
            "SUSE Real Time Module 15 SP4:ocfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64",
            "openSUSE Leap 15.4:cluster-md-kmp-rt-5.14.21-150400.15.5.1.x86_64",
            "openSUSE Leap 15.4:dlm-kmp-rt-5.14.21-150400.15.5.1.x86_64",
            "openSUSE Leap 15.4:gfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64",
            "openSUSE Leap 15.4:kernel-devel-rt-5.14.21-150400.15.5.1.noarch",
            "openSUSE Leap 15.4:kernel-rt-5.14.21-150400.15.5.1.x86_64",
            "openSUSE Leap 15.4:kernel-rt-devel-5.14.21-150400.15.5.1.x86_64",
            "openSUSE Leap 15.4:kernel-rt_debug-5.14.21-150400.15.5.1.x86_64",
            "openSUSE Leap 15.4:kernel-rt_debug-devel-5.14.21-150400.15.5.1.x86_64",
            "openSUSE Leap 15.4:kernel-source-rt-5.14.21-150400.15.5.1.noarch",
            "openSUSE Leap 15.4:kernel-syms-rt-5.14.21-150400.15.5.1.x86_64",
            "openSUSE Leap 15.4:ocfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2022-12-23T10:39:17Z",
          "details": "moderate"
        }
      ],
      "title": "CVE-2022-43750"
    },
    {
      "cve": "CVE-2022-4378",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2022-4378"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "A stack overflow flaw was found in the Linux kernel\u0027s SYSCTL subsystem in how a user changes certain kernel parameters and variables. This flaw allows a local user to crash or potentially escalate their privileges on the system.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_15_5-rt-1-150400.1.3.1.x86_64",
          "SUSE Real Time Module 15 SP4:cluster-md-kmp-rt-5.14.21-150400.15.5.1.x86_64",
          "SUSE Real Time Module 15 SP4:dlm-kmp-rt-5.14.21-150400.15.5.1.x86_64",
          "SUSE Real Time Module 15 SP4:gfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64",
          "SUSE Real Time Module 15 SP4:kernel-devel-rt-5.14.21-150400.15.5.1.noarch",
          "SUSE Real Time Module 15 SP4:kernel-rt-5.14.21-150400.15.5.1.x86_64",
          "SUSE Real Time Module 15 SP4:kernel-rt-devel-5.14.21-150400.15.5.1.x86_64",
          "SUSE Real Time Module 15 SP4:kernel-rt_debug-5.14.21-150400.15.5.1.x86_64",
          "SUSE Real Time Module 15 SP4:kernel-rt_debug-devel-5.14.21-150400.15.5.1.x86_64",
          "SUSE Real Time Module 15 SP4:kernel-source-rt-5.14.21-150400.15.5.1.noarch",
          "SUSE Real Time Module 15 SP4:kernel-syms-rt-5.14.21-150400.15.5.1.x86_64",
          "SUSE Real Time Module 15 SP4:ocfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64",
          "openSUSE Leap 15.4:cluster-md-kmp-rt-5.14.21-150400.15.5.1.x86_64",
          "openSUSE Leap 15.4:dlm-kmp-rt-5.14.21-150400.15.5.1.x86_64",
          "openSUSE Leap 15.4:gfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64",
          "openSUSE Leap 15.4:kernel-devel-rt-5.14.21-150400.15.5.1.noarch",
          "openSUSE Leap 15.4:kernel-rt-5.14.21-150400.15.5.1.x86_64",
          "openSUSE Leap 15.4:kernel-rt-devel-5.14.21-150400.15.5.1.x86_64",
          "openSUSE Leap 15.4:kernel-rt_debug-5.14.21-150400.15.5.1.x86_64",
          "openSUSE Leap 15.4:kernel-rt_debug-devel-5.14.21-150400.15.5.1.x86_64",
          "openSUSE Leap 15.4:kernel-source-rt-5.14.21-150400.15.5.1.noarch",
          "openSUSE Leap 15.4:kernel-syms-rt-5.14.21-150400.15.5.1.x86_64",
          "openSUSE Leap 15.4:ocfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2022-4378",
          "url": "https://www.suse.com/security/cve/CVE-2022-4378"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1206207 for CVE-2022-4378",
          "url": "https://bugzilla.suse.com/1206207"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1206228 for CVE-2022-4378",
          "url": "https://bugzilla.suse.com/1206228"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1208030 for CVE-2022-4378",
          "url": "https://bugzilla.suse.com/1208030"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1208085 for CVE-2022-4378",
          "url": "https://bugzilla.suse.com/1208085"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1209225 for CVE-2022-4378",
          "url": "https://bugzilla.suse.com/1209225"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1211118 for CVE-2022-4378",
          "url": "https://bugzilla.suse.com/1211118"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1214268 for CVE-2022-4378",
          "url": "https://bugzilla.suse.com/1214268"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1218483 for CVE-2022-4378",
          "url": "https://bugzilla.suse.com/1218483"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1218966 for CVE-2022-4378",
          "url": "https://bugzilla.suse.com/1218966"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_15_5-rt-1-150400.1.3.1.x86_64",
            "SUSE Real Time Module 15 SP4:cluster-md-kmp-rt-5.14.21-150400.15.5.1.x86_64",
            "SUSE Real Time Module 15 SP4:dlm-kmp-rt-5.14.21-150400.15.5.1.x86_64",
            "SUSE Real Time Module 15 SP4:gfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64",
            "SUSE Real Time Module 15 SP4:kernel-devel-rt-5.14.21-150400.15.5.1.noarch",
            "SUSE Real Time Module 15 SP4:kernel-rt-5.14.21-150400.15.5.1.x86_64",
            "SUSE Real Time Module 15 SP4:kernel-rt-devel-5.14.21-150400.15.5.1.x86_64",
            "SUSE Real Time Module 15 SP4:kernel-rt_debug-5.14.21-150400.15.5.1.x86_64",
            "SUSE Real Time Module 15 SP4:kernel-rt_debug-devel-5.14.21-150400.15.5.1.x86_64",
            "SUSE Real Time Module 15 SP4:kernel-source-rt-5.14.21-150400.15.5.1.noarch",
            "SUSE Real Time Module 15 SP4:kernel-syms-rt-5.14.21-150400.15.5.1.x86_64",
            "SUSE Real Time Module 15 SP4:ocfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64",
            "openSUSE Leap 15.4:cluster-md-kmp-rt-5.14.21-150400.15.5.1.x86_64",
            "openSUSE Leap 15.4:dlm-kmp-rt-5.14.21-150400.15.5.1.x86_64",
            "openSUSE Leap 15.4:gfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64",
            "openSUSE Leap 15.4:kernel-devel-rt-5.14.21-150400.15.5.1.noarch",
            "openSUSE Leap 15.4:kernel-rt-5.14.21-150400.15.5.1.x86_64",
            "openSUSE Leap 15.4:kernel-rt-devel-5.14.21-150400.15.5.1.x86_64",
            "openSUSE Leap 15.4:kernel-rt_debug-5.14.21-150400.15.5.1.x86_64",
            "openSUSE Leap 15.4:kernel-rt_debug-devel-5.14.21-150400.15.5.1.x86_64",
            "openSUSE Leap 15.4:kernel-source-rt-5.14.21-150400.15.5.1.noarch",
            "openSUSE Leap 15.4:kernel-syms-rt-5.14.21-150400.15.5.1.x86_64",
            "openSUSE Leap 15.4:ocfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 8.4,
            "baseSeverity": "HIGH",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
            "version": "3.1"
          },
          "products": [
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_15_5-rt-1-150400.1.3.1.x86_64",
            "SUSE Real Time Module 15 SP4:cluster-md-kmp-rt-5.14.21-150400.15.5.1.x86_64",
            "SUSE Real Time Module 15 SP4:dlm-kmp-rt-5.14.21-150400.15.5.1.x86_64",
            "SUSE Real Time Module 15 SP4:gfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64",
            "SUSE Real Time Module 15 SP4:kernel-devel-rt-5.14.21-150400.15.5.1.noarch",
            "SUSE Real Time Module 15 SP4:kernel-rt-5.14.21-150400.15.5.1.x86_64",
            "SUSE Real Time Module 15 SP4:kernel-rt-devel-5.14.21-150400.15.5.1.x86_64",
            "SUSE Real Time Module 15 SP4:kernel-rt_debug-5.14.21-150400.15.5.1.x86_64",
            "SUSE Real Time Module 15 SP4:kernel-rt_debug-devel-5.14.21-150400.15.5.1.x86_64",
            "SUSE Real Time Module 15 SP4:kernel-source-rt-5.14.21-150400.15.5.1.noarch",
            "SUSE Real Time Module 15 SP4:kernel-syms-rt-5.14.21-150400.15.5.1.x86_64",
            "SUSE Real Time Module 15 SP4:ocfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64",
            "openSUSE Leap 15.4:cluster-md-kmp-rt-5.14.21-150400.15.5.1.x86_64",
            "openSUSE Leap 15.4:dlm-kmp-rt-5.14.21-150400.15.5.1.x86_64",
            "openSUSE Leap 15.4:gfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64",
            "openSUSE Leap 15.4:kernel-devel-rt-5.14.21-150400.15.5.1.noarch",
            "openSUSE Leap 15.4:kernel-rt-5.14.21-150400.15.5.1.x86_64",
            "openSUSE Leap 15.4:kernel-rt-devel-5.14.21-150400.15.5.1.x86_64",
            "openSUSE Leap 15.4:kernel-rt_debug-5.14.21-150400.15.5.1.x86_64",
            "openSUSE Leap 15.4:kernel-rt_debug-devel-5.14.21-150400.15.5.1.x86_64",
            "openSUSE Leap 15.4:kernel-source-rt-5.14.21-150400.15.5.1.noarch",
            "openSUSE Leap 15.4:kernel-syms-rt-5.14.21-150400.15.5.1.x86_64",
            "openSUSE Leap 15.4:ocfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2022-12-23T10:39:17Z",
          "details": "important"
        }
      ],
      "title": "CVE-2022-4378"
    },
    {
      "cve": "CVE-2022-43945",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2022-43945"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "The Linux kernel NFSD implementation prior to versions 5.19.17 and 6.0.2 are vulnerable to buffer overflow. NFSD tracks the number of pages held by each NFSD thread by combining the receive and send buffers of a remote procedure call (RPC) into a single array of pages. A client can force the send buffer to shrink by sending an RPC message over TCP with garbage data added at the end of the message. The RPC message with garbage data is still correctly formed according to the specification and is passed forward to handlers. Vulnerable code in NFSD is not expecting the oversized request and writes beyond the allocated buffer space. CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_15_5-rt-1-150400.1.3.1.x86_64",
          "SUSE Real Time Module 15 SP4:cluster-md-kmp-rt-5.14.21-150400.15.5.1.x86_64",
          "SUSE Real Time Module 15 SP4:dlm-kmp-rt-5.14.21-150400.15.5.1.x86_64",
          "SUSE Real Time Module 15 SP4:gfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64",
          "SUSE Real Time Module 15 SP4:kernel-devel-rt-5.14.21-150400.15.5.1.noarch",
          "SUSE Real Time Module 15 SP4:kernel-rt-5.14.21-150400.15.5.1.x86_64",
          "SUSE Real Time Module 15 SP4:kernel-rt-devel-5.14.21-150400.15.5.1.x86_64",
          "SUSE Real Time Module 15 SP4:kernel-rt_debug-5.14.21-150400.15.5.1.x86_64",
          "SUSE Real Time Module 15 SP4:kernel-rt_debug-devel-5.14.21-150400.15.5.1.x86_64",
          "SUSE Real Time Module 15 SP4:kernel-source-rt-5.14.21-150400.15.5.1.noarch",
          "SUSE Real Time Module 15 SP4:kernel-syms-rt-5.14.21-150400.15.5.1.x86_64",
          "SUSE Real Time Module 15 SP4:ocfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64",
          "openSUSE Leap 15.4:cluster-md-kmp-rt-5.14.21-150400.15.5.1.x86_64",
          "openSUSE Leap 15.4:dlm-kmp-rt-5.14.21-150400.15.5.1.x86_64",
          "openSUSE Leap 15.4:gfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64",
          "openSUSE Leap 15.4:kernel-devel-rt-5.14.21-150400.15.5.1.noarch",
          "openSUSE Leap 15.4:kernel-rt-5.14.21-150400.15.5.1.x86_64",
          "openSUSE Leap 15.4:kernel-rt-devel-5.14.21-150400.15.5.1.x86_64",
          "openSUSE Leap 15.4:kernel-rt_debug-5.14.21-150400.15.5.1.x86_64",
          "openSUSE Leap 15.4:kernel-rt_debug-devel-5.14.21-150400.15.5.1.x86_64",
          "openSUSE Leap 15.4:kernel-source-rt-5.14.21-150400.15.5.1.noarch",
          "openSUSE Leap 15.4:kernel-syms-rt-5.14.21-150400.15.5.1.x86_64",
          "openSUSE Leap 15.4:ocfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2022-43945",
          "url": "https://www.suse.com/security/cve/CVE-2022-43945"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1205128 for CVE-2022-43945",
          "url": "https://bugzilla.suse.com/1205128"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1205130 for CVE-2022-43945",
          "url": "https://bugzilla.suse.com/1205130"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1208030 for CVE-2022-43945",
          "url": "https://bugzilla.suse.com/1208030"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1208085 for CVE-2022-43945",
          "url": "https://bugzilla.suse.com/1208085"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1209225 for CVE-2022-43945",
          "url": "https://bugzilla.suse.com/1209225"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1210124 for CVE-2022-43945",
          "url": "https://bugzilla.suse.com/1210124"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_15_5-rt-1-150400.1.3.1.x86_64",
            "SUSE Real Time Module 15 SP4:cluster-md-kmp-rt-5.14.21-150400.15.5.1.x86_64",
            "SUSE Real Time Module 15 SP4:dlm-kmp-rt-5.14.21-150400.15.5.1.x86_64",
            "SUSE Real Time Module 15 SP4:gfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64",
            "SUSE Real Time Module 15 SP4:kernel-devel-rt-5.14.21-150400.15.5.1.noarch",
            "SUSE Real Time Module 15 SP4:kernel-rt-5.14.21-150400.15.5.1.x86_64",
            "SUSE Real Time Module 15 SP4:kernel-rt-devel-5.14.21-150400.15.5.1.x86_64",
            "SUSE Real Time Module 15 SP4:kernel-rt_debug-5.14.21-150400.15.5.1.x86_64",
            "SUSE Real Time Module 15 SP4:kernel-rt_debug-devel-5.14.21-150400.15.5.1.x86_64",
            "SUSE Real Time Module 15 SP4:kernel-source-rt-5.14.21-150400.15.5.1.noarch",
            "SUSE Real Time Module 15 SP4:kernel-syms-rt-5.14.21-150400.15.5.1.x86_64",
            "SUSE Real Time Module 15 SP4:ocfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64",
            "openSUSE Leap 15.4:cluster-md-kmp-rt-5.14.21-150400.15.5.1.x86_64",
            "openSUSE Leap 15.4:dlm-kmp-rt-5.14.21-150400.15.5.1.x86_64",
            "openSUSE Leap 15.4:gfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64",
            "openSUSE Leap 15.4:kernel-devel-rt-5.14.21-150400.15.5.1.noarch",
            "openSUSE Leap 15.4:kernel-rt-5.14.21-150400.15.5.1.x86_64",
            "openSUSE Leap 15.4:kernel-rt-devel-5.14.21-150400.15.5.1.x86_64",
            "openSUSE Leap 15.4:kernel-rt_debug-5.14.21-150400.15.5.1.x86_64",
            "openSUSE Leap 15.4:kernel-rt_debug-devel-5.14.21-150400.15.5.1.x86_64",
            "openSUSE Leap 15.4:kernel-source-rt-5.14.21-150400.15.5.1.noarch",
            "openSUSE Leap 15.4:kernel-syms-rt-5.14.21-150400.15.5.1.x86_64",
            "openSUSE Leap 15.4:ocfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 8.8,
            "baseSeverity": "HIGH",
            "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
            "version": "3.1"
          },
          "products": [
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_15_5-rt-1-150400.1.3.1.x86_64",
            "SUSE Real Time Module 15 SP4:cluster-md-kmp-rt-5.14.21-150400.15.5.1.x86_64",
            "SUSE Real Time Module 15 SP4:dlm-kmp-rt-5.14.21-150400.15.5.1.x86_64",
            "SUSE Real Time Module 15 SP4:gfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64",
            "SUSE Real Time Module 15 SP4:kernel-devel-rt-5.14.21-150400.15.5.1.noarch",
            "SUSE Real Time Module 15 SP4:kernel-rt-5.14.21-150400.15.5.1.x86_64",
            "SUSE Real Time Module 15 SP4:kernel-rt-devel-5.14.21-150400.15.5.1.x86_64",
            "SUSE Real Time Module 15 SP4:kernel-rt_debug-5.14.21-150400.15.5.1.x86_64",
            "SUSE Real Time Module 15 SP4:kernel-rt_debug-devel-5.14.21-150400.15.5.1.x86_64",
            "SUSE Real Time Module 15 SP4:kernel-source-rt-5.14.21-150400.15.5.1.noarch",
            "SUSE Real Time Module 15 SP4:kernel-syms-rt-5.14.21-150400.15.5.1.x86_64",
            "SUSE Real Time Module 15 SP4:ocfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64",
            "openSUSE Leap 15.4:cluster-md-kmp-rt-5.14.21-150400.15.5.1.x86_64",
            "openSUSE Leap 15.4:dlm-kmp-rt-5.14.21-150400.15.5.1.x86_64",
            "openSUSE Leap 15.4:gfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64",
            "openSUSE Leap 15.4:kernel-devel-rt-5.14.21-150400.15.5.1.noarch",
            "openSUSE Leap 15.4:kernel-rt-5.14.21-150400.15.5.1.x86_64",
            "openSUSE Leap 15.4:kernel-rt-devel-5.14.21-150400.15.5.1.x86_64",
            "openSUSE Leap 15.4:kernel-rt_debug-5.14.21-150400.15.5.1.x86_64",
            "openSUSE Leap 15.4:kernel-rt_debug-devel-5.14.21-150400.15.5.1.x86_64",
            "openSUSE Leap 15.4:kernel-source-rt-5.14.21-150400.15.5.1.noarch",
            "openSUSE Leap 15.4:kernel-syms-rt-5.14.21-150400.15.5.1.x86_64",
            "openSUSE Leap 15.4:ocfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2022-12-23T10:39:17Z",
          "details": "important"
        }
      ],
      "title": "CVE-2022-43945"
    },
    {
      "cve": "CVE-2022-45869",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2022-45869"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "A race condition in the x86 KVM subsystem in the Linux kernel through 6.1-rc6 allows guest OS users to cause a denial of service (host OS crash or host OS memory corruption) when nested virtualisation and the TDP MMU are enabled.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_15_5-rt-1-150400.1.3.1.x86_64",
          "SUSE Real Time Module 15 SP4:cluster-md-kmp-rt-5.14.21-150400.15.5.1.x86_64",
          "SUSE Real Time Module 15 SP4:dlm-kmp-rt-5.14.21-150400.15.5.1.x86_64",
          "SUSE Real Time Module 15 SP4:gfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64",
          "SUSE Real Time Module 15 SP4:kernel-devel-rt-5.14.21-150400.15.5.1.noarch",
          "SUSE Real Time Module 15 SP4:kernel-rt-5.14.21-150400.15.5.1.x86_64",
          "SUSE Real Time Module 15 SP4:kernel-rt-devel-5.14.21-150400.15.5.1.x86_64",
          "SUSE Real Time Module 15 SP4:kernel-rt_debug-5.14.21-150400.15.5.1.x86_64",
          "SUSE Real Time Module 15 SP4:kernel-rt_debug-devel-5.14.21-150400.15.5.1.x86_64",
          "SUSE Real Time Module 15 SP4:kernel-source-rt-5.14.21-150400.15.5.1.noarch",
          "SUSE Real Time Module 15 SP4:kernel-syms-rt-5.14.21-150400.15.5.1.x86_64",
          "SUSE Real Time Module 15 SP4:ocfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64",
          "openSUSE Leap 15.4:cluster-md-kmp-rt-5.14.21-150400.15.5.1.x86_64",
          "openSUSE Leap 15.4:dlm-kmp-rt-5.14.21-150400.15.5.1.x86_64",
          "openSUSE Leap 15.4:gfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64",
          "openSUSE Leap 15.4:kernel-devel-rt-5.14.21-150400.15.5.1.noarch",
          "openSUSE Leap 15.4:kernel-rt-5.14.21-150400.15.5.1.x86_64",
          "openSUSE Leap 15.4:kernel-rt-devel-5.14.21-150400.15.5.1.x86_64",
          "openSUSE Leap 15.4:kernel-rt_debug-5.14.21-150400.15.5.1.x86_64",
          "openSUSE Leap 15.4:kernel-rt_debug-devel-5.14.21-150400.15.5.1.x86_64",
          "openSUSE Leap 15.4:kernel-source-rt-5.14.21-150400.15.5.1.noarch",
          "openSUSE Leap 15.4:kernel-syms-rt-5.14.21-150400.15.5.1.x86_64",
          "openSUSE Leap 15.4:ocfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2022-45869",
          "url": "https://www.suse.com/security/cve/CVE-2022-45869"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1205882 for CVE-2022-45869",
          "url": "https://bugzilla.suse.com/1205882"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_15_5-rt-1-150400.1.3.1.x86_64",
            "SUSE Real Time Module 15 SP4:cluster-md-kmp-rt-5.14.21-150400.15.5.1.x86_64",
            "SUSE Real Time Module 15 SP4:dlm-kmp-rt-5.14.21-150400.15.5.1.x86_64",
            "SUSE Real Time Module 15 SP4:gfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64",
            "SUSE Real Time Module 15 SP4:kernel-devel-rt-5.14.21-150400.15.5.1.noarch",
            "SUSE Real Time Module 15 SP4:kernel-rt-5.14.21-150400.15.5.1.x86_64",
            "SUSE Real Time Module 15 SP4:kernel-rt-devel-5.14.21-150400.15.5.1.x86_64",
            "SUSE Real Time Module 15 SP4:kernel-rt_debug-5.14.21-150400.15.5.1.x86_64",
            "SUSE Real Time Module 15 SP4:kernel-rt_debug-devel-5.14.21-150400.15.5.1.x86_64",
            "SUSE Real Time Module 15 SP4:kernel-source-rt-5.14.21-150400.15.5.1.noarch",
            "SUSE Real Time Module 15 SP4:kernel-syms-rt-5.14.21-150400.15.5.1.x86_64",
            "SUSE Real Time Module 15 SP4:ocfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64",
            "openSUSE Leap 15.4:cluster-md-kmp-rt-5.14.21-150400.15.5.1.x86_64",
            "openSUSE Leap 15.4:dlm-kmp-rt-5.14.21-150400.15.5.1.x86_64",
            "openSUSE Leap 15.4:gfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64",
            "openSUSE Leap 15.4:kernel-devel-rt-5.14.21-150400.15.5.1.noarch",
            "openSUSE Leap 15.4:kernel-rt-5.14.21-150400.15.5.1.x86_64",
            "openSUSE Leap 15.4:kernel-rt-devel-5.14.21-150400.15.5.1.x86_64",
            "openSUSE Leap 15.4:kernel-rt_debug-5.14.21-150400.15.5.1.x86_64",
            "openSUSE Leap 15.4:kernel-rt_debug-devel-5.14.21-150400.15.5.1.x86_64",
            "openSUSE Leap 15.4:kernel-source-rt-5.14.21-150400.15.5.1.noarch",
            "openSUSE Leap 15.4:kernel-syms-rt-5.14.21-150400.15.5.1.x86_64",
            "openSUSE Leap 15.4:ocfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 4.1,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:N/I:N/A:H",
            "version": "3.1"
          },
          "products": [
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_15_5-rt-1-150400.1.3.1.x86_64",
            "SUSE Real Time Module 15 SP4:cluster-md-kmp-rt-5.14.21-150400.15.5.1.x86_64",
            "SUSE Real Time Module 15 SP4:dlm-kmp-rt-5.14.21-150400.15.5.1.x86_64",
            "SUSE Real Time Module 15 SP4:gfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64",
            "SUSE Real Time Module 15 SP4:kernel-devel-rt-5.14.21-150400.15.5.1.noarch",
            "SUSE Real Time Module 15 SP4:kernel-rt-5.14.21-150400.15.5.1.x86_64",
            "SUSE Real Time Module 15 SP4:kernel-rt-devel-5.14.21-150400.15.5.1.x86_64",
            "SUSE Real Time Module 15 SP4:kernel-rt_debug-5.14.21-150400.15.5.1.x86_64",
            "SUSE Real Time Module 15 SP4:kernel-rt_debug-devel-5.14.21-150400.15.5.1.x86_64",
            "SUSE Real Time Module 15 SP4:kernel-source-rt-5.14.21-150400.15.5.1.noarch",
            "SUSE Real Time Module 15 SP4:kernel-syms-rt-5.14.21-150400.15.5.1.x86_64",
            "SUSE Real Time Module 15 SP4:ocfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64",
            "openSUSE Leap 15.4:cluster-md-kmp-rt-5.14.21-150400.15.5.1.x86_64",
            "openSUSE Leap 15.4:dlm-kmp-rt-5.14.21-150400.15.5.1.x86_64",
            "openSUSE Leap 15.4:gfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64",
            "openSUSE Leap 15.4:kernel-devel-rt-5.14.21-150400.15.5.1.noarch",
            "openSUSE Leap 15.4:kernel-rt-5.14.21-150400.15.5.1.x86_64",
            "openSUSE Leap 15.4:kernel-rt-devel-5.14.21-150400.15.5.1.x86_64",
            "openSUSE Leap 15.4:kernel-rt_debug-5.14.21-150400.15.5.1.x86_64",
            "openSUSE Leap 15.4:kernel-rt_debug-devel-5.14.21-150400.15.5.1.x86_64",
            "openSUSE Leap 15.4:kernel-source-rt-5.14.21-150400.15.5.1.noarch",
            "openSUSE Leap 15.4:kernel-syms-rt-5.14.21-150400.15.5.1.x86_64",
            "openSUSE Leap 15.4:ocfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2022-12-23T10:39:17Z",
          "details": "moderate"
        }
      ],
      "title": "CVE-2022-45869"
    },
    {
      "cve": "CVE-2022-45888",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2022-45888"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "An issue was discovered in the Linux kernel through 6.0.9. drivers/char/xillybus/xillyusb.c has a race condition and use-after-free during physical removal of a USB device.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_15_5-rt-1-150400.1.3.1.x86_64",
          "SUSE Real Time Module 15 SP4:cluster-md-kmp-rt-5.14.21-150400.15.5.1.x86_64",
          "SUSE Real Time Module 15 SP4:dlm-kmp-rt-5.14.21-150400.15.5.1.x86_64",
          "SUSE Real Time Module 15 SP4:gfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64",
          "SUSE Real Time Module 15 SP4:kernel-devel-rt-5.14.21-150400.15.5.1.noarch",
          "SUSE Real Time Module 15 SP4:kernel-rt-5.14.21-150400.15.5.1.x86_64",
          "SUSE Real Time Module 15 SP4:kernel-rt-devel-5.14.21-150400.15.5.1.x86_64",
          "SUSE Real Time Module 15 SP4:kernel-rt_debug-5.14.21-150400.15.5.1.x86_64",
          "SUSE Real Time Module 15 SP4:kernel-rt_debug-devel-5.14.21-150400.15.5.1.x86_64",
          "SUSE Real Time Module 15 SP4:kernel-source-rt-5.14.21-150400.15.5.1.noarch",
          "SUSE Real Time Module 15 SP4:kernel-syms-rt-5.14.21-150400.15.5.1.x86_64",
          "SUSE Real Time Module 15 SP4:ocfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64",
          "openSUSE Leap 15.4:cluster-md-kmp-rt-5.14.21-150400.15.5.1.x86_64",
          "openSUSE Leap 15.4:dlm-kmp-rt-5.14.21-150400.15.5.1.x86_64",
          "openSUSE Leap 15.4:gfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64",
          "openSUSE Leap 15.4:kernel-devel-rt-5.14.21-150400.15.5.1.noarch",
          "openSUSE Leap 15.4:kernel-rt-5.14.21-150400.15.5.1.x86_64",
          "openSUSE Leap 15.4:kernel-rt-devel-5.14.21-150400.15.5.1.x86_64",
          "openSUSE Leap 15.4:kernel-rt_debug-5.14.21-150400.15.5.1.x86_64",
          "openSUSE Leap 15.4:kernel-rt_debug-devel-5.14.21-150400.15.5.1.x86_64",
          "openSUSE Leap 15.4:kernel-source-rt-5.14.21-150400.15.5.1.noarch",
          "openSUSE Leap 15.4:kernel-syms-rt-5.14.21-150400.15.5.1.x86_64",
          "openSUSE Leap 15.4:ocfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2022-45888",
          "url": "https://www.suse.com/security/cve/CVE-2022-45888"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1205764 for CVE-2022-45888",
          "url": "https://bugzilla.suse.com/1205764"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_15_5-rt-1-150400.1.3.1.x86_64",
            "SUSE Real Time Module 15 SP4:cluster-md-kmp-rt-5.14.21-150400.15.5.1.x86_64",
            "SUSE Real Time Module 15 SP4:dlm-kmp-rt-5.14.21-150400.15.5.1.x86_64",
            "SUSE Real Time Module 15 SP4:gfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64",
            "SUSE Real Time Module 15 SP4:kernel-devel-rt-5.14.21-150400.15.5.1.noarch",
            "SUSE Real Time Module 15 SP4:kernel-rt-5.14.21-150400.15.5.1.x86_64",
            "SUSE Real Time Module 15 SP4:kernel-rt-devel-5.14.21-150400.15.5.1.x86_64",
            "SUSE Real Time Module 15 SP4:kernel-rt_debug-5.14.21-150400.15.5.1.x86_64",
            "SUSE Real Time Module 15 SP4:kernel-rt_debug-devel-5.14.21-150400.15.5.1.x86_64",
            "SUSE Real Time Module 15 SP4:kernel-source-rt-5.14.21-150400.15.5.1.noarch",
            "SUSE Real Time Module 15 SP4:kernel-syms-rt-5.14.21-150400.15.5.1.x86_64",
            "SUSE Real Time Module 15 SP4:ocfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64",
            "openSUSE Leap 15.4:cluster-md-kmp-rt-5.14.21-150400.15.5.1.x86_64",
            "openSUSE Leap 15.4:dlm-kmp-rt-5.14.21-150400.15.5.1.x86_64",
            "openSUSE Leap 15.4:gfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64",
            "openSUSE Leap 15.4:kernel-devel-rt-5.14.21-150400.15.5.1.noarch",
            "openSUSE Leap 15.4:kernel-rt-5.14.21-150400.15.5.1.x86_64",
            "openSUSE Leap 15.4:kernel-rt-devel-5.14.21-150400.15.5.1.x86_64",
            "openSUSE Leap 15.4:kernel-rt_debug-5.14.21-150400.15.5.1.x86_64",
            "openSUSE Leap 15.4:kernel-rt_debug-devel-5.14.21-150400.15.5.1.x86_64",
            "openSUSE Leap 15.4:kernel-source-rt-5.14.21-150400.15.5.1.noarch",
            "openSUSE Leap 15.4:kernel-syms-rt-5.14.21-150400.15.5.1.x86_64",
            "openSUSE Leap 15.4:ocfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 4,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:L/AC:H/PR:H/UI:R/S:U/C:N/I:N/A:H",
            "version": "3.1"
          },
          "products": [
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_15_5-rt-1-150400.1.3.1.x86_64",
            "SUSE Real Time Module 15 SP4:cluster-md-kmp-rt-5.14.21-150400.15.5.1.x86_64",
            "SUSE Real Time Module 15 SP4:dlm-kmp-rt-5.14.21-150400.15.5.1.x86_64",
            "SUSE Real Time Module 15 SP4:gfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64",
            "SUSE Real Time Module 15 SP4:kernel-devel-rt-5.14.21-150400.15.5.1.noarch",
            "SUSE Real Time Module 15 SP4:kernel-rt-5.14.21-150400.15.5.1.x86_64",
            "SUSE Real Time Module 15 SP4:kernel-rt-devel-5.14.21-150400.15.5.1.x86_64",
            "SUSE Real Time Module 15 SP4:kernel-rt_debug-5.14.21-150400.15.5.1.x86_64",
            "SUSE Real Time Module 15 SP4:kernel-rt_debug-devel-5.14.21-150400.15.5.1.x86_64",
            "SUSE Real Time Module 15 SP4:kernel-source-rt-5.14.21-150400.15.5.1.noarch",
            "SUSE Real Time Module 15 SP4:kernel-syms-rt-5.14.21-150400.15.5.1.x86_64",
            "SUSE Real Time Module 15 SP4:ocfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64",
            "openSUSE Leap 15.4:cluster-md-kmp-rt-5.14.21-150400.15.5.1.x86_64",
            "openSUSE Leap 15.4:dlm-kmp-rt-5.14.21-150400.15.5.1.x86_64",
            "openSUSE Leap 15.4:gfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64",
            "openSUSE Leap 15.4:kernel-devel-rt-5.14.21-150400.15.5.1.noarch",
            "openSUSE Leap 15.4:kernel-rt-5.14.21-150400.15.5.1.x86_64",
            "openSUSE Leap 15.4:kernel-rt-devel-5.14.21-150400.15.5.1.x86_64",
            "openSUSE Leap 15.4:kernel-rt_debug-5.14.21-150400.15.5.1.x86_64",
            "openSUSE Leap 15.4:kernel-rt_debug-devel-5.14.21-150400.15.5.1.x86_64",
            "openSUSE Leap 15.4:kernel-source-rt-5.14.21-150400.15.5.1.noarch",
            "openSUSE Leap 15.4:kernel-syms-rt-5.14.21-150400.15.5.1.x86_64",
            "openSUSE Leap 15.4:ocfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2022-12-23T10:39:17Z",
          "details": "low"
        }
      ],
      "title": "CVE-2022-45888"
    },
    {
      "cve": "CVE-2022-45934",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2022-45934"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "An issue was discovered in the Linux kernel through 6.0.10. l2cap_config_req in net/bluetooth/l2cap_core.c has an integer wraparound via L2CAP_CONF_REQ packets.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_15_5-rt-1-150400.1.3.1.x86_64",
          "SUSE Real Time Module 15 SP4:cluster-md-kmp-rt-5.14.21-150400.15.5.1.x86_64",
          "SUSE Real Time Module 15 SP4:dlm-kmp-rt-5.14.21-150400.15.5.1.x86_64",
          "SUSE Real Time Module 15 SP4:gfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64",
          "SUSE Real Time Module 15 SP4:kernel-devel-rt-5.14.21-150400.15.5.1.noarch",
          "SUSE Real Time Module 15 SP4:kernel-rt-5.14.21-150400.15.5.1.x86_64",
          "SUSE Real Time Module 15 SP4:kernel-rt-devel-5.14.21-150400.15.5.1.x86_64",
          "SUSE Real Time Module 15 SP4:kernel-rt_debug-5.14.21-150400.15.5.1.x86_64",
          "SUSE Real Time Module 15 SP4:kernel-rt_debug-devel-5.14.21-150400.15.5.1.x86_64",
          "SUSE Real Time Module 15 SP4:kernel-source-rt-5.14.21-150400.15.5.1.noarch",
          "SUSE Real Time Module 15 SP4:kernel-syms-rt-5.14.21-150400.15.5.1.x86_64",
          "SUSE Real Time Module 15 SP4:ocfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64",
          "openSUSE Leap 15.4:cluster-md-kmp-rt-5.14.21-150400.15.5.1.x86_64",
          "openSUSE Leap 15.4:dlm-kmp-rt-5.14.21-150400.15.5.1.x86_64",
          "openSUSE Leap 15.4:gfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64",
          "openSUSE Leap 15.4:kernel-devel-rt-5.14.21-150400.15.5.1.noarch",
          "openSUSE Leap 15.4:kernel-rt-5.14.21-150400.15.5.1.x86_64",
          "openSUSE Leap 15.4:kernel-rt-devel-5.14.21-150400.15.5.1.x86_64",
          "openSUSE Leap 15.4:kernel-rt_debug-5.14.21-150400.15.5.1.x86_64",
          "openSUSE Leap 15.4:kernel-rt_debug-devel-5.14.21-150400.15.5.1.x86_64",
          "openSUSE Leap 15.4:kernel-source-rt-5.14.21-150400.15.5.1.noarch",
          "openSUSE Leap 15.4:kernel-syms-rt-5.14.21-150400.15.5.1.x86_64",
          "openSUSE Leap 15.4:ocfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2022-45934",
          "url": "https://www.suse.com/security/cve/CVE-2022-45934"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1205796 for CVE-2022-45934",
          "url": "https://bugzilla.suse.com/1205796"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1212292 for CVE-2022-45934",
          "url": "https://bugzilla.suse.com/1212292"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_15_5-rt-1-150400.1.3.1.x86_64",
            "SUSE Real Time Module 15 SP4:cluster-md-kmp-rt-5.14.21-150400.15.5.1.x86_64",
            "SUSE Real Time Module 15 SP4:dlm-kmp-rt-5.14.21-150400.15.5.1.x86_64",
            "SUSE Real Time Module 15 SP4:gfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64",
            "SUSE Real Time Module 15 SP4:kernel-devel-rt-5.14.21-150400.15.5.1.noarch",
            "SUSE Real Time Module 15 SP4:kernel-rt-5.14.21-150400.15.5.1.x86_64",
            "SUSE Real Time Module 15 SP4:kernel-rt-devel-5.14.21-150400.15.5.1.x86_64",
            "SUSE Real Time Module 15 SP4:kernel-rt_debug-5.14.21-150400.15.5.1.x86_64",
            "SUSE Real Time Module 15 SP4:kernel-rt_debug-devel-5.14.21-150400.15.5.1.x86_64",
            "SUSE Real Time Module 15 SP4:kernel-source-rt-5.14.21-150400.15.5.1.noarch",
            "SUSE Real Time Module 15 SP4:kernel-syms-rt-5.14.21-150400.15.5.1.x86_64",
            "SUSE Real Time Module 15 SP4:ocfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64",
            "openSUSE Leap 15.4:cluster-md-kmp-rt-5.14.21-150400.15.5.1.x86_64",
            "openSUSE Leap 15.4:dlm-kmp-rt-5.14.21-150400.15.5.1.x86_64",
            "openSUSE Leap 15.4:gfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64",
            "openSUSE Leap 15.4:kernel-devel-rt-5.14.21-150400.15.5.1.noarch",
            "openSUSE Leap 15.4:kernel-rt-5.14.21-150400.15.5.1.x86_64",
            "openSUSE Leap 15.4:kernel-rt-devel-5.14.21-150400.15.5.1.x86_64",
            "openSUSE Leap 15.4:kernel-rt_debug-5.14.21-150400.15.5.1.x86_64",
            "openSUSE Leap 15.4:kernel-rt_debug-devel-5.14.21-150400.15.5.1.x86_64",
            "openSUSE Leap 15.4:kernel-source-rt-5.14.21-150400.15.5.1.noarch",
            "openSUSE Leap 15.4:kernel-syms-rt-5.14.21-150400.15.5.1.x86_64",
            "openSUSE Leap 15.4:ocfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 5.3,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L",
            "version": "3.1"
          },
          "products": [
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_15_5-rt-1-150400.1.3.1.x86_64",
            "SUSE Real Time Module 15 SP4:cluster-md-kmp-rt-5.14.21-150400.15.5.1.x86_64",
            "SUSE Real Time Module 15 SP4:dlm-kmp-rt-5.14.21-150400.15.5.1.x86_64",
            "SUSE Real Time Module 15 SP4:gfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64",
            "SUSE Real Time Module 15 SP4:kernel-devel-rt-5.14.21-150400.15.5.1.noarch",
            "SUSE Real Time Module 15 SP4:kernel-rt-5.14.21-150400.15.5.1.x86_64",
            "SUSE Real Time Module 15 SP4:kernel-rt-devel-5.14.21-150400.15.5.1.x86_64",
            "SUSE Real Time Module 15 SP4:kernel-rt_debug-5.14.21-150400.15.5.1.x86_64",
            "SUSE Real Time Module 15 SP4:kernel-rt_debug-devel-5.14.21-150400.15.5.1.x86_64",
            "SUSE Real Time Module 15 SP4:kernel-source-rt-5.14.21-150400.15.5.1.noarch",
            "SUSE Real Time Module 15 SP4:kernel-syms-rt-5.14.21-150400.15.5.1.x86_64",
            "SUSE Real Time Module 15 SP4:ocfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64",
            "openSUSE Leap 15.4:cluster-md-kmp-rt-5.14.21-150400.15.5.1.x86_64",
            "openSUSE Leap 15.4:dlm-kmp-rt-5.14.21-150400.15.5.1.x86_64",
            "openSUSE Leap 15.4:gfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64",
            "openSUSE Leap 15.4:kernel-devel-rt-5.14.21-150400.15.5.1.noarch",
            "openSUSE Leap 15.4:kernel-rt-5.14.21-150400.15.5.1.x86_64",
            "openSUSE Leap 15.4:kernel-rt-devel-5.14.21-150400.15.5.1.x86_64",
            "openSUSE Leap 15.4:kernel-rt_debug-5.14.21-150400.15.5.1.x86_64",
            "openSUSE Leap 15.4:kernel-rt_debug-devel-5.14.21-150400.15.5.1.x86_64",
            "openSUSE Leap 15.4:kernel-source-rt-5.14.21-150400.15.5.1.noarch",
            "openSUSE Leap 15.4:kernel-syms-rt-5.14.21-150400.15.5.1.x86_64",
            "openSUSE Leap 15.4:ocfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2022-12-23T10:39:17Z",
          "details": "moderate"
        }
      ],
      "title": "CVE-2022-45934"
    }
  ]
}
  suse-su-2025:02321-1
Vulnerability from csaf_suse
Published
2025-07-15 14:31
    Modified
2025-07-15 14:31
    Summary
Security update for the Linux Kernel
    Notes
Title of the patch
Security update for the Linux Kernel
    Description of the patch
The SUSE Linux Enterprise 15 SP5 RT kernel was updated to receive various security bugfixes.
The following security bugs were fixed:
- CVE-2021-47557: net/sched: sch_ets: do not peek at classes beyond 'nbands' (bsc#1207361 bsc#1225468).
- CVE-2021-47595: net/sched: sch_ets: do not remove idle classes from the round-robin list (bsc#1207361 bsc#1226552).
- CVE-2023-52924: netfilter: nf_tables: do not skip expired elements during walk (bsc#1236821).
- CVE-2023-52925: netfilter: nf_tables: do not fail inserts if duplicate has expired (bsc#1236822).
- CVE-2024-26808: netfilter: nft_chain_filter: handle NETDEV_UNREGISTER for inet/ingress basechain (bsc#1222634).
- CVE-2024-26924: scsi: lpfc: Release hbalock before calling lpfc_worker_wake_up() (bsc#1225820).
- CVE-2024-27397: kabi: place tstamp needed for nftables set in a hole (bsc#1224095).
- CVE-2024-28956: x86/its: Add support for ITS-safe indirect thunk (bsc#1242006).
- CVE-2024-36978: net: sched: sch_multiq: fix possible OOB write in multiq_tune() (bsc#1226514).
- CVE-2024-46800: sch/netem: fix use after free in netem_dequeue (bsc#1230827).
- CVE-2024-53125: bpf: sync_linked_regs() must preserve subreg_def (bsc#1234156).
- CVE-2024-53141: netfilter: ipset: add missing range check in bitmap_ip_uadt (bsc#1234381).
- CVE-2024-53197: ALSA: usb-audio: Fix potential out-of-bound accesses for Extigy and Mbox devices (bsc#1235464).
- CVE-2024-56770: sch/netem: fix use after free in netem_dequeue (bsc#1235637).
- CVE-2025-21700: net: sched: Disallow replacing of child qdisc from one parent to another (bsc#1237159).
- CVE-2025-21702: pfifo_tail_enqueue: Drop new packet when sch->limit == 0 (bsc#1237312).
- CVE-2025-21703: netem: Update sch->q.qlen before qdisc_tree_reduce_backlog() (bsc#1237313).
- CVE-2025-21756: vsock: Orphan socket after transport release (bsc#1238876).
- CVE-2025-23141: KVM: x86: Acquire SRCU in KVM_GET_MP_STATE to protect guest memory accesses (bsc#1242782).
- CVE-2025-37752: net_sched: sch_sfq: move the limit validation (bsc#1242504).
- CVE-2025-37785: ext4: fix OOB read when checking dotdot dir (bsc#1241640).
- CVE-2025-37823: net_sched: hfsc: Fix a potential UAF in hfsc_dequeue() too (bsc#1242924).
- CVE-2025-37890: net_sched: hfsc: Fix a UAF vulnerability in class with netem as child qdisc (bsc#1243330).
- CVE-2025-37997: netfilter: ipset: fix region locking in hash types (bsc#1243832).
- CVE-2025-38000: sch_hfsc: Fix qlen accounting bug when using peek in hfsc_enqueue() (bsc#1244277).
- CVE-2025-38001: net_sched: hfsc: Address reentrant enqueue adding class to eltree twice (bsc#1244234).
- CVE-2025-38014: dmaengine: idxd: Refactor remove call with idxd_cleanup() helper (bsc#1244732).
- CVE-2025-38060: bpf: abort verification if env->cur_state->loop_entry != NULL (bsc#1245155).
- CVE-2025-38083: net_sched: prio: fix a race in prio_tune() (bsc#1245183).
The following non-security bugs were fixed:
- ALSA: usb-audio: Fix a DMA to stack memory bug (git-fixes).
- Fix conditional for selecting gcc-13 Fixes: 51dacec21eb1 ('Use gcc-13 for build on SLE16 (jsc#PED-10028).')
- Fix reference in 'net_sched: sch_sfq: use a temporary work area for validating configuration' (bsc#1242504)
- MyBS: Correctly generate build flags for non-multibuild package limit (bsc# 1244241) Fixes: 0999112774fc ('MyBS: Use buildflags to set which package to build')
- MyBS: Do not build kernel-obs-qa with limit_packages Fixes: 58e3f8c34b2b ('bs-upload-kernel: Pass limit_packages also on multibuild')
- MyBS: Simplify qa_expr generation Start with a 0 which makes the expression valid even if there are no QA repositories (currently does not happen). Then separator is always needed.
- Require zstd in kernel-default-devel when module compression is zstd To use ksym-provides tool modules need to be uncompressed. Without zstd at least kernel-default-base does not have provides. Link: https://github.com/openSUSE/rpm-config-SUSE/pull/82
- Use gcc-13 for build on SLE16 (jsc#PED-10028).
- add nf_tables for iptables non-legacy network handling This is needed for example by docker on the Alpine Linux distribution, but can also be used on openSUSE.
- bs-upload-kernel: Pass limit_packages also on multibuild Fixes: 0999112774fc ('MyBS: Use buildflags to set which package to build') Fixes: 747f601d4156 ('bs-upload-kernel, MyBS, Buildresults: Support multibuild (JSC-SLE#5501, boo#1211226, bsc#1218184)')
- check-for-config-changes: Fix flag name typo
- doc/README.SUSE: Point to the updated version of LKMPG
- hugetlb: unshare some PMDs when splitting VMAs (bsc#1245431).
- kernel-obs-qa: Use srchash for dependency as well
- kernel-source: Also replace bin/env
- kernel-source: Also update the search to match bin/env Fixes: dc2037cd8f94 ('kernel-source: Also replace bin/env'
- kernel-source: Remove log.sh from sources
- mkspec: Exclude rt flavor from kernel-syms dependencies (bsc#1244337).
- mm/hugetlb: fix huge_pmd_unshare() vs GUP-fast race (bsc#1245431).
- mm/hugetlb: unshare page tables during VMA split, not before (bsc#1245431).
- net_sched: sch_fifo: implement lockless __fifo_dump() (bsc#1237312)
- net_sched: sch_sfq: use a temporary work area for validating configuration (bsc#1232504)
- ovl: fix use inode directly in rcu-walk mode (bsc#1241900).
- packaging: Turn gcc version into config.sh variable Fixes: 51dacec21eb1 ('Use gcc-13 for build on SLE16 (jsc#PED-10028).')
- powerpc/powernv/memtrace: Fix out of bounds issue in memtrace mmap (bsc#1244309 ltc#213790).
- powerpc/vas: Return -EINVAL if the offset is non-zero in mmap() (bsc#1244309 ltc#213790).
- rpm/check-for-config-changes: Add GCC_ASM_FLAG_OUTPUT_BROKEN
- rpm/check-for-config-changes: Add GCC_ASM_FLAG_OUTPUT_BROKEN Both spellings are actually used
- rpm/check-for-config-changes: add LD_CAN_ to IGNORED_CONFIGS_RE
- rpm/check-for-config-changes: add more to IGNORED_CONFIGS_RE Useful when someone tries (needs) to build the kernel with clang.
- rpm/check-for-config-changes: ignore DRM_MSM_VALIDATE_XML This option is dynamically enabled to build-test different configurations. This makes run_oldconfig.sh complain sporadically for arm64.
- rpm/kernel-binary.spec.in: Also order against update-bootloader (boo#1228659, boo#1240785, boo#1241038).
- rpm/kernel-binary.spec.in: Fix missing 20-kernel-default-extra.conf (bsc#1239986) sle_version was obsoleted for SLE16. It has to be combined with suse_version check.
- rpm/kernel-binary.spec.in: Use OrderWithRequires (boo#1228659 boo#1241038). OrderWithRequires was introduced in rpm 4.9 (ie. SLE12+) to allow a package to inform the order of installation of other package without hard requiring that package. This means our kernel-binary packages no longer need to hard require perl-Bootloader or dracut, resolving the long-commented issue there. This is also needed for udev & systemd-boot to ensure those packages are installed before being called by dracut (boo#1228659)
- rpm/kernel-binary.spec.in: fix KMPs build on 6.13+ (bsc#1234454)
- rpm/kernel-docs.spec.in: Workaround for reproducible builds (bsc#1238303)
- rpm/package-descriptions: Add rt and rt_debug descriptions
- rpm/release-projects: Update the ALP projects again (bsc#1231293).
- rpm/split-modules: Fix optional splitting with usrmerge (bsc#1238570)
- rpm: Stop using is_kotd_qa macro
- scsi: storvsc: Do not report the host packet status as the hv status (git-fixes).
- scsi: storvsc: Increase the timeouts to storvsc_timeout (bsc#1245455).
    Patchnames
SUSE-2025-2321,SUSE-SLE-Micro-5.5-2025-2321
    Terms of use
CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).
    {
  "document": {
    "aggregate_severity": {
      "namespace": "https://www.suse.com/support/security/rating/",
      "text": "important"
    },
    "category": "csaf_security_advisory",
    "csaf_version": "2.0",
    "distribution": {
      "text": "Copyright 2024 SUSE LLC. All rights reserved.",
      "tlp": {
        "label": "WHITE",
        "url": "https://www.first.org/tlp/"
      }
    },
    "lang": "en",
    "notes": [
      {
        "category": "summary",
        "text": "Security update for the Linux Kernel",
        "title": "Title of the patch"
      },
      {
        "category": "description",
        "text": "\nThe SUSE Linux Enterprise 15 SP5 RT kernel was updated to receive various security bugfixes.\n\n\nThe following security bugs were fixed:\n\n- CVE-2021-47557: net/sched: sch_ets: do not peek at classes beyond \u0027nbands\u0027 (bsc#1207361 bsc#1225468).\n- CVE-2021-47595: net/sched: sch_ets: do not remove idle classes from the round-robin list (bsc#1207361 bsc#1226552).\n- CVE-2023-52924: netfilter: nf_tables: do not skip expired elements during walk (bsc#1236821).\n- CVE-2023-52925: netfilter: nf_tables: do not fail inserts if duplicate has expired (bsc#1236822).\n- CVE-2024-26808: netfilter: nft_chain_filter: handle NETDEV_UNREGISTER for inet/ingress basechain (bsc#1222634).\n- CVE-2024-26924: scsi: lpfc: Release hbalock before calling lpfc_worker_wake_up() (bsc#1225820).\n- CVE-2024-27397: kabi: place tstamp needed for nftables set in a hole (bsc#1224095).\n- CVE-2024-28956: x86/its: Add support for ITS-safe indirect thunk (bsc#1242006).\n- CVE-2024-36978: net: sched: sch_multiq: fix possible OOB write in multiq_tune() (bsc#1226514).\n- CVE-2024-46800: sch/netem: fix use after free in netem_dequeue (bsc#1230827).\n- CVE-2024-53125: bpf: sync_linked_regs() must preserve subreg_def (bsc#1234156).\n- CVE-2024-53141: netfilter: ipset: add missing range check in bitmap_ip_uadt (bsc#1234381).\n- CVE-2024-53197: ALSA: usb-audio: Fix potential out-of-bound accesses for Extigy and Mbox devices (bsc#1235464).\n- CVE-2024-56770: sch/netem: fix use after free in netem_dequeue (bsc#1235637).\n- CVE-2025-21700: net: sched: Disallow replacing of child qdisc from one parent to another (bsc#1237159).\n- CVE-2025-21702: pfifo_tail_enqueue: Drop new packet when sch-\u003elimit == 0 (bsc#1237312).\n- CVE-2025-21703: netem: Update sch-\u003eq.qlen before qdisc_tree_reduce_backlog() (bsc#1237313).\n- CVE-2025-21756: vsock: Orphan socket after transport release (bsc#1238876).\n- CVE-2025-23141: KVM: x86: Acquire SRCU in KVM_GET_MP_STATE to protect guest memory accesses (bsc#1242782).\n- CVE-2025-37752: net_sched: sch_sfq: move the limit validation (bsc#1242504).\n- CVE-2025-37785: ext4: fix OOB read when checking dotdot dir (bsc#1241640).\n- CVE-2025-37823: net_sched: hfsc: Fix a potential UAF in hfsc_dequeue() too (bsc#1242924).\n- CVE-2025-37890: net_sched: hfsc: Fix a UAF vulnerability in class with netem as child qdisc (bsc#1243330).\n- CVE-2025-37997: netfilter: ipset: fix region locking in hash types (bsc#1243832).\n- CVE-2025-38000: sch_hfsc: Fix qlen accounting bug when using peek in hfsc_enqueue() (bsc#1244277).\n- CVE-2025-38001: net_sched: hfsc: Address reentrant enqueue adding class to eltree twice (bsc#1244234).\n- CVE-2025-38014: dmaengine: idxd: Refactor remove call with idxd_cleanup() helper (bsc#1244732).\n- CVE-2025-38060: bpf: abort verification if env-\u003ecur_state-\u003eloop_entry != NULL (bsc#1245155).\n- CVE-2025-38083: net_sched: prio: fix a race in prio_tune() (bsc#1245183).\n\nThe following non-security bugs were fixed:\n\n- ALSA: usb-audio: Fix a DMA to stack memory bug (git-fixes).\n- Fix conditional for selecting gcc-13 Fixes: 51dacec21eb1 (\u0027Use gcc-13 for build on SLE16 (jsc#PED-10028).\u0027)\n- Fix reference in \u0027net_sched: sch_sfq: use a temporary work area for validating configuration\u0027 (bsc#1242504)\n- MyBS: Correctly generate build flags for non-multibuild package limit (bsc# 1244241) Fixes: 0999112774fc (\u0027MyBS: Use buildflags to set which package to build\u0027)\n- MyBS: Do not build kernel-obs-qa with limit_packages Fixes: 58e3f8c34b2b (\u0027bs-upload-kernel: Pass limit_packages also on multibuild\u0027)\n- MyBS: Simplify qa_expr generation Start with a 0 which makes the expression valid even if there are no QA repositories (currently does not happen). Then separator is always needed.\n- Require zstd in kernel-default-devel when module compression is zstd To use ksym-provides tool modules need to be uncompressed. Without zstd at least kernel-default-base does not have provides. Link: https://github.com/openSUSE/rpm-config-SUSE/pull/82\n- Use gcc-13 for build on SLE16 (jsc#PED-10028).\n- add nf_tables for iptables non-legacy network handling This is needed for example by docker on the Alpine Linux distribution, but can also be used on openSUSE.\n- bs-upload-kernel: Pass limit_packages also on multibuild Fixes: 0999112774fc (\u0027MyBS: Use buildflags to set which package to build\u0027) Fixes: 747f601d4156 (\u0027bs-upload-kernel, MyBS, Buildresults: Support multibuild (JSC-SLE#5501, boo#1211226, bsc#1218184)\u0027)\n- check-for-config-changes: Fix flag name typo\n- doc/README.SUSE: Point to the updated version of LKMPG\n- hugetlb: unshare some PMDs when splitting VMAs (bsc#1245431).\n- kernel-obs-qa: Use srchash for dependency as well\n- kernel-source: Also replace bin/env\n- kernel-source: Also update the search to match bin/env Fixes: dc2037cd8f94 (\u0027kernel-source: Also replace bin/env\u0027\n- kernel-source: Remove log.sh from sources\n- mkspec: Exclude rt flavor from kernel-syms dependencies (bsc#1244337).\n- mm/hugetlb: fix huge_pmd_unshare() vs GUP-fast race (bsc#1245431).\n- mm/hugetlb: unshare page tables during VMA split, not before (bsc#1245431).\n- net_sched: sch_fifo: implement lockless __fifo_dump() (bsc#1237312)\n- net_sched: sch_sfq: use a temporary work area for validating configuration (bsc#1232504)\n- ovl: fix use inode directly in rcu-walk mode (bsc#1241900).\n- packaging: Turn gcc version into config.sh variable Fixes: 51dacec21eb1 (\u0027Use gcc-13 for build on SLE16 (jsc#PED-10028).\u0027)\n- powerpc/powernv/memtrace: Fix out of bounds issue in memtrace mmap (bsc#1244309 ltc#213790).\n- powerpc/vas: Return -EINVAL if the offset is non-zero in mmap() (bsc#1244309 ltc#213790).\n- rpm/check-for-config-changes: Add GCC_ASM_FLAG_OUTPUT_BROKEN\n- rpm/check-for-config-changes: Add GCC_ASM_FLAG_OUTPUT_BROKEN Both spellings are actually used\n- rpm/check-for-config-changes: add LD_CAN_ to IGNORED_CONFIGS_RE\n- rpm/check-for-config-changes: add more to IGNORED_CONFIGS_RE Useful when someone tries (needs) to build the kernel with clang.\n- rpm/check-for-config-changes: ignore DRM_MSM_VALIDATE_XML This option is dynamically enabled to build-test different configurations. This makes run_oldconfig.sh complain sporadically for arm64.\n- rpm/kernel-binary.spec.in: Also order against update-bootloader (boo#1228659, boo#1240785, boo#1241038).\n- rpm/kernel-binary.spec.in: Fix missing 20-kernel-default-extra.conf (bsc#1239986) sle_version was obsoleted for SLE16. It has to be combined with suse_version check.\n- rpm/kernel-binary.spec.in: Use OrderWithRequires (boo#1228659 boo#1241038). OrderWithRequires was introduced in rpm 4.9 (ie. SLE12+) to allow a package to inform the order of installation of other package without hard requiring that package. This means our kernel-binary packages no longer need to hard require perl-Bootloader or dracut, resolving the long-commented issue there. This is also needed for udev \u0026 systemd-boot to ensure those packages are installed before being called by dracut (boo#1228659)\n- rpm/kernel-binary.spec.in: fix KMPs build on 6.13+ (bsc#1234454)\n- rpm/kernel-docs.spec.in: Workaround for reproducible builds (bsc#1238303)\n- rpm/package-descriptions: Add rt and rt_debug descriptions\n- rpm/release-projects: Update the ALP projects again (bsc#1231293).\n- rpm/split-modules: Fix optional splitting with usrmerge (bsc#1238570)\n- rpm: Stop using is_kotd_qa macro\n- scsi: storvsc: Do not report the host packet status as the hv status (git-fixes).\n- scsi: storvsc: Increase the timeouts to storvsc_timeout (bsc#1245455).\n",
        "title": "Description of the patch"
      },
      {
        "category": "details",
        "text": "SUSE-2025-2321,SUSE-SLE-Micro-5.5-2025-2321",
        "title": "Patchnames"
      },
      {
        "category": "legal_disclaimer",
        "text": "CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).",
        "title": "Terms of use"
      }
    ],
    "publisher": {
      "category": "vendor",
      "contact_details": "https://www.suse.com/support/security/contact/",
      "name": "SUSE Product Security Team",
      "namespace": "https://www.suse.com/"
    },
    "references": [
      {
        "category": "external",
        "summary": "SUSE ratings",
        "url": "https://www.suse.com/support/security/rating/"
      },
      {
        "category": "self",
        "summary": "URL of this CSAF notice",
        "url": "https://ftp.suse.com/pub/projects/security/csaf/suse-su-2025_02321-1.json"
      },
      {
        "category": "self",
        "summary": "URL for SUSE-SU-2025:02321-1",
        "url": "https://www.suse.com/support/update/announcement/2025/suse-su-202502321-1/"
      },
      {
        "category": "self",
        "summary": "E-Mail link for SUSE-SU-2025:02321-1",
        "url": "https://lists.suse.com/pipermail/sle-updates/2025-July/040713.html"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1065729",
        "url": "https://bugzilla.suse.com/1065729"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1156395",
        "url": "https://bugzilla.suse.com/1156395"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1193629",
        "url": "https://bugzilla.suse.com/1193629"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1194869",
        "url": "https://bugzilla.suse.com/1194869"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1198410",
        "url": "https://bugzilla.suse.com/1198410"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1199356",
        "url": "https://bugzilla.suse.com/1199356"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1199487",
        "url": "https://bugzilla.suse.com/1199487"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1201160",
        "url": "https://bugzilla.suse.com/1201160"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1201956",
        "url": "https://bugzilla.suse.com/1201956"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1202094",
        "url": "https://bugzilla.suse.com/1202094"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1202095",
        "url": "https://bugzilla.suse.com/1202095"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1202564",
        "url": "https://bugzilla.suse.com/1202564"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1202716",
        "url": "https://bugzilla.suse.com/1202716"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1202823",
        "url": "https://bugzilla.suse.com/1202823"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1202860",
        "url": "https://bugzilla.suse.com/1202860"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1203197",
        "url": "https://bugzilla.suse.com/1203197"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1203361",
        "url": "https://bugzilla.suse.com/1203361"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1205220",
        "url": "https://bugzilla.suse.com/1205220"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1205514",
        "url": "https://bugzilla.suse.com/1205514"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1205701",
        "url": "https://bugzilla.suse.com/1205701"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1206451",
        "url": "https://bugzilla.suse.com/1206451"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1206664",
        "url": "https://bugzilla.suse.com/1206664"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1206878",
        "url": "https://bugzilla.suse.com/1206878"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1206880",
        "url": "https://bugzilla.suse.com/1206880"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1207361",
        "url": "https://bugzilla.suse.com/1207361"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1207638",
        "url": "https://bugzilla.suse.com/1207638"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1211226",
        "url": "https://bugzilla.suse.com/1211226"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1212051",
        "url": "https://bugzilla.suse.com/1212051"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1213090",
        "url": "https://bugzilla.suse.com/1213090"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1218184",
        "url": "https://bugzilla.suse.com/1218184"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1218234",
        "url": "https://bugzilla.suse.com/1218234"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1218470",
        "url": "https://bugzilla.suse.com/1218470"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1222634",
        "url": "https://bugzilla.suse.com/1222634"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1223675",
        "url": "https://bugzilla.suse.com/1223675"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1224095",
        "url": "https://bugzilla.suse.com/1224095"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1224597",
        "url": "https://bugzilla.suse.com/1224597"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1225468",
        "url": "https://bugzilla.suse.com/1225468"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1225820",
        "url": "https://bugzilla.suse.com/1225820"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1226514",
        "url": "https://bugzilla.suse.com/1226514"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1226552",
        "url": "https://bugzilla.suse.com/1226552"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1228659",
        "url": "https://bugzilla.suse.com/1228659"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1230827",
        "url": "https://bugzilla.suse.com/1230827"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1231293",
        "url": "https://bugzilla.suse.com/1231293"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1232504",
        "url": "https://bugzilla.suse.com/1232504"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1234156",
        "url": "https://bugzilla.suse.com/1234156"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1234381",
        "url": "https://bugzilla.suse.com/1234381"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1234454",
        "url": "https://bugzilla.suse.com/1234454"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1235464",
        "url": "https://bugzilla.suse.com/1235464"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1235637",
        "url": "https://bugzilla.suse.com/1235637"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1236821",
        "url": "https://bugzilla.suse.com/1236821"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1236822",
        "url": "https://bugzilla.suse.com/1236822"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1237159",
        "url": "https://bugzilla.suse.com/1237159"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1237312",
        "url": "https://bugzilla.suse.com/1237312"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1237313",
        "url": "https://bugzilla.suse.com/1237313"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1238303",
        "url": "https://bugzilla.suse.com/1238303"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1238526",
        "url": "https://bugzilla.suse.com/1238526"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1238570",
        "url": "https://bugzilla.suse.com/1238570"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1238876",
        "url": "https://bugzilla.suse.com/1238876"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1239986",
        "url": "https://bugzilla.suse.com/1239986"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1240785",
        "url": "https://bugzilla.suse.com/1240785"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1241038",
        "url": "https://bugzilla.suse.com/1241038"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1241640",
        "url": "https://bugzilla.suse.com/1241640"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1241900",
        "url": "https://bugzilla.suse.com/1241900"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1242006",
        "url": "https://bugzilla.suse.com/1242006"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1242221",
        "url": "https://bugzilla.suse.com/1242221"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1242414",
        "url": "https://bugzilla.suse.com/1242414"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1242504",
        "url": "https://bugzilla.suse.com/1242504"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1242596",
        "url": "https://bugzilla.suse.com/1242596"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1242778",
        "url": "https://bugzilla.suse.com/1242778"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1242782",
        "url": "https://bugzilla.suse.com/1242782"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1242924",
        "url": "https://bugzilla.suse.com/1242924"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1243330",
        "url": "https://bugzilla.suse.com/1243330"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1243543",
        "url": "https://bugzilla.suse.com/1243543"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1243627",
        "url": "https://bugzilla.suse.com/1243627"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1243649",
        "url": "https://bugzilla.suse.com/1243649"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1243660",
        "url": "https://bugzilla.suse.com/1243660"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1243832",
        "url": "https://bugzilla.suse.com/1243832"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1244114",
        "url": "https://bugzilla.suse.com/1244114"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1244179",
        "url": "https://bugzilla.suse.com/1244179"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1244180",
        "url": "https://bugzilla.suse.com/1244180"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1244234",
        "url": "https://bugzilla.suse.com/1244234"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1244241",
        "url": "https://bugzilla.suse.com/1244241"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1244277",
        "url": "https://bugzilla.suse.com/1244277"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1244309",
        "url": "https://bugzilla.suse.com/1244309"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1244337",
        "url": "https://bugzilla.suse.com/1244337"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1244732",
        "url": "https://bugzilla.suse.com/1244732"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1244764",
        "url": "https://bugzilla.suse.com/1244764"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1244765",
        "url": "https://bugzilla.suse.com/1244765"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1244767",
        "url": "https://bugzilla.suse.com/1244767"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1244770",
        "url": "https://bugzilla.suse.com/1244770"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1244771",
        "url": "https://bugzilla.suse.com/1244771"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1244772",
        "url": "https://bugzilla.suse.com/1244772"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1244773",
        "url": "https://bugzilla.suse.com/1244773"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1244774",
        "url": "https://bugzilla.suse.com/1244774"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1244776",
        "url": "https://bugzilla.suse.com/1244776"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1244779",
        "url": "https://bugzilla.suse.com/1244779"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1244780",
        "url": "https://bugzilla.suse.com/1244780"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1244781",
        "url": "https://bugzilla.suse.com/1244781"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1244782",
        "url": "https://bugzilla.suse.com/1244782"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1244783",
        "url": "https://bugzilla.suse.com/1244783"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1244784",
        "url": "https://bugzilla.suse.com/1244784"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1244786",
        "url": "https://bugzilla.suse.com/1244786"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1244787",
        "url": "https://bugzilla.suse.com/1244787"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1244788",
        "url": "https://bugzilla.suse.com/1244788"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1244790",
        "url": "https://bugzilla.suse.com/1244790"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1244791",
        "url": "https://bugzilla.suse.com/1244791"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1244793",
        "url": "https://bugzilla.suse.com/1244793"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1244794",
        "url": "https://bugzilla.suse.com/1244794"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1244796",
        "url": "https://bugzilla.suse.com/1244796"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1244797",
        "url": "https://bugzilla.suse.com/1244797"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1244798",
        "url": "https://bugzilla.suse.com/1244798"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1244800",
        "url": "https://bugzilla.suse.com/1244800"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1244802",
        "url": "https://bugzilla.suse.com/1244802"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1244804",
        "url": "https://bugzilla.suse.com/1244804"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1244805",
        "url": "https://bugzilla.suse.com/1244805"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1244806",
        "url": "https://bugzilla.suse.com/1244806"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1244807",
        "url": "https://bugzilla.suse.com/1244807"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1244808",
        "url": "https://bugzilla.suse.com/1244808"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1244811",
        "url": "https://bugzilla.suse.com/1244811"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1244813",
        "url": "https://bugzilla.suse.com/1244813"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1244814",
        "url": "https://bugzilla.suse.com/1244814"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1244815",
        "url": "https://bugzilla.suse.com/1244815"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1244816",
        "url": "https://bugzilla.suse.com/1244816"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1244819",
        "url": "https://bugzilla.suse.com/1244819"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1244820",
        "url": "https://bugzilla.suse.com/1244820"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1244823",
        "url": "https://bugzilla.suse.com/1244823"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1244824",
        "url": "https://bugzilla.suse.com/1244824"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1244825",
        "url": "https://bugzilla.suse.com/1244825"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1244826",
        "url": "https://bugzilla.suse.com/1244826"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1244827",
        "url": "https://bugzilla.suse.com/1244827"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1244830",
        "url": "https://bugzilla.suse.com/1244830"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1244831",
        "url": "https://bugzilla.suse.com/1244831"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1244832",
        "url": "https://bugzilla.suse.com/1244832"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1244834",
        "url": "https://bugzilla.suse.com/1244834"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1244836",
        "url": "https://bugzilla.suse.com/1244836"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1244838",
        "url": "https://bugzilla.suse.com/1244838"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1244839",
        "url": "https://bugzilla.suse.com/1244839"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1244840",
        "url": "https://bugzilla.suse.com/1244840"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1244841",
        "url": "https://bugzilla.suse.com/1244841"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1244842",
        "url": "https://bugzilla.suse.com/1244842"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1244843",
        "url": "https://bugzilla.suse.com/1244843"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1244845",
        "url": "https://bugzilla.suse.com/1244845"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1244846",
        "url": "https://bugzilla.suse.com/1244846"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1244848",
        "url": "https://bugzilla.suse.com/1244848"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1244849",
        "url": "https://bugzilla.suse.com/1244849"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1244851",
        "url": "https://bugzilla.suse.com/1244851"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1244853",
        "url": "https://bugzilla.suse.com/1244853"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1244854",
        "url": "https://bugzilla.suse.com/1244854"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1244856",
        "url": "https://bugzilla.suse.com/1244856"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1244858",
        "url": "https://bugzilla.suse.com/1244858"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1244860",
        "url": "https://bugzilla.suse.com/1244860"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1244861",
        "url": "https://bugzilla.suse.com/1244861"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1244866",
        "url": "https://bugzilla.suse.com/1244866"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1244867",
        "url": "https://bugzilla.suse.com/1244867"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1244868",
        "url": "https://bugzilla.suse.com/1244868"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1244869",
        "url": "https://bugzilla.suse.com/1244869"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1244870",
        "url": "https://bugzilla.suse.com/1244870"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1244871",
        "url": "https://bugzilla.suse.com/1244871"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1244872",
        "url": "https://bugzilla.suse.com/1244872"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1244873",
        "url": "https://bugzilla.suse.com/1244873"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1244875",
        "url": "https://bugzilla.suse.com/1244875"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1244876",
        "url": "https://bugzilla.suse.com/1244876"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1244878",
        "url": "https://bugzilla.suse.com/1244878"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1244879",
        "url": "https://bugzilla.suse.com/1244879"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1244881",
        "url": "https://bugzilla.suse.com/1244881"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1244883",
        "url": "https://bugzilla.suse.com/1244883"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1244884",
        "url": "https://bugzilla.suse.com/1244884"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1244886",
        "url": "https://bugzilla.suse.com/1244886"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1244887",
        "url": "https://bugzilla.suse.com/1244887"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1244888",
        "url": "https://bugzilla.suse.com/1244888"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1244890",
        "url": "https://bugzilla.suse.com/1244890"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1244892",
        "url": "https://bugzilla.suse.com/1244892"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1244893",
        "url": "https://bugzilla.suse.com/1244893"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1244895",
        "url": "https://bugzilla.suse.com/1244895"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1244898",
        "url": "https://bugzilla.suse.com/1244898"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1244899",
        "url": "https://bugzilla.suse.com/1244899"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1244900",
        "url": "https://bugzilla.suse.com/1244900"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1244901",
        "url": "https://bugzilla.suse.com/1244901"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1244902",
        "url": "https://bugzilla.suse.com/1244902"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1244903",
        "url": "https://bugzilla.suse.com/1244903"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1244904",
        "url": "https://bugzilla.suse.com/1244904"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1244905",
        "url": "https://bugzilla.suse.com/1244905"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1244908",
        "url": "https://bugzilla.suse.com/1244908"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1244911",
        "url": "https://bugzilla.suse.com/1244911"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1244912",
        "url": "https://bugzilla.suse.com/1244912"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1244914",
        "url": "https://bugzilla.suse.com/1244914"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1244915",
        "url": "https://bugzilla.suse.com/1244915"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1244928",
        "url": "https://bugzilla.suse.com/1244928"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1244936",
        "url": "https://bugzilla.suse.com/1244936"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1244940",
        "url": "https://bugzilla.suse.com/1244940"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1244941",
        "url": "https://bugzilla.suse.com/1244941"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1244942",
        "url": "https://bugzilla.suse.com/1244942"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1244943",
        "url": "https://bugzilla.suse.com/1244943"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1244944",
        "url": "https://bugzilla.suse.com/1244944"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1244945",
        "url": "https://bugzilla.suse.com/1244945"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1244948",
        "url": "https://bugzilla.suse.com/1244948"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1244949",
        "url": "https://bugzilla.suse.com/1244949"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1244950",
        "url": "https://bugzilla.suse.com/1244950"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1244953",
        "url": "https://bugzilla.suse.com/1244953"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1244955",
        "url": "https://bugzilla.suse.com/1244955"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1244956",
        "url": "https://bugzilla.suse.com/1244956"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1244957",
        "url": "https://bugzilla.suse.com/1244957"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1244958",
        "url": "https://bugzilla.suse.com/1244958"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1244959",
        "url": "https://bugzilla.suse.com/1244959"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1244960",
        "url": "https://bugzilla.suse.com/1244960"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1244961",
        "url": "https://bugzilla.suse.com/1244961"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1244965",
        "url": "https://bugzilla.suse.com/1244965"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1244966",
        "url": "https://bugzilla.suse.com/1244966"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1244967",
        "url": "https://bugzilla.suse.com/1244967"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1244968",
        "url": "https://bugzilla.suse.com/1244968"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1244969",
        "url": "https://bugzilla.suse.com/1244969"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1244970",
        "url": "https://bugzilla.suse.com/1244970"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1244973",
        "url": "https://bugzilla.suse.com/1244973"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1244974",
        "url": "https://bugzilla.suse.com/1244974"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1244976",
        "url": "https://bugzilla.suse.com/1244976"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1244977",
        "url": "https://bugzilla.suse.com/1244977"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1244978",
        "url": "https://bugzilla.suse.com/1244978"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1244979",
        "url": "https://bugzilla.suse.com/1244979"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1244983",
        "url": "https://bugzilla.suse.com/1244983"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1244984",
        "url": "https://bugzilla.suse.com/1244984"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1244985",
        "url": "https://bugzilla.suse.com/1244985"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1244986",
        "url": "https://bugzilla.suse.com/1244986"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1244987",
        "url": "https://bugzilla.suse.com/1244987"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1244991",
        "url": "https://bugzilla.suse.com/1244991"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1244992",
        "url": "https://bugzilla.suse.com/1244992"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1244993",
        "url": "https://bugzilla.suse.com/1244993"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1245006",
        "url": "https://bugzilla.suse.com/1245006"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1245007",
        "url": "https://bugzilla.suse.com/1245007"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1245009",
        "url": "https://bugzilla.suse.com/1245009"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1245011",
        "url": "https://bugzilla.suse.com/1245011"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1245012",
        "url": "https://bugzilla.suse.com/1245012"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1245015",
        "url": "https://bugzilla.suse.com/1245015"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1245018",
        "url": "https://bugzilla.suse.com/1245018"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1245019",
        "url": "https://bugzilla.suse.com/1245019"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1245023",
        "url": "https://bugzilla.suse.com/1245023"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1245024",
        "url": "https://bugzilla.suse.com/1245024"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1245028",
        "url": "https://bugzilla.suse.com/1245028"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1245031",
        "url": "https://bugzilla.suse.com/1245031"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1245032",
        "url": "https://bugzilla.suse.com/1245032"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1245033",
        "url": "https://bugzilla.suse.com/1245033"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1245038",
        "url": "https://bugzilla.suse.com/1245038"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1245039",
        "url": "https://bugzilla.suse.com/1245039"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1245040",
        "url": "https://bugzilla.suse.com/1245040"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1245041",
        "url": "https://bugzilla.suse.com/1245041"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1245047",
        "url": "https://bugzilla.suse.com/1245047"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1245048",
        "url": "https://bugzilla.suse.com/1245048"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1245051",
        "url": "https://bugzilla.suse.com/1245051"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1245052",
        "url": "https://bugzilla.suse.com/1245052"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1245057",
        "url": "https://bugzilla.suse.com/1245057"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1245058",
        "url": "https://bugzilla.suse.com/1245058"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1245060",
        "url": "https://bugzilla.suse.com/1245060"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1245062",
        "url": "https://bugzilla.suse.com/1245062"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1245063",
        "url": "https://bugzilla.suse.com/1245063"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1245064",
        "url": "https://bugzilla.suse.com/1245064"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1245069",
        "url": "https://bugzilla.suse.com/1245069"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1245070",
        "url": "https://bugzilla.suse.com/1245070"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1245072",
        "url": "https://bugzilla.suse.com/1245072"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1245073",
        "url": "https://bugzilla.suse.com/1245073"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1245088",
        "url": "https://bugzilla.suse.com/1245088"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1245089",
        "url": "https://bugzilla.suse.com/1245089"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1245092",
        "url": "https://bugzilla.suse.com/1245092"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1245093",
        "url": "https://bugzilla.suse.com/1245093"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1245094",
        "url": "https://bugzilla.suse.com/1245094"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1245098",
        "url": "https://bugzilla.suse.com/1245098"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1245103",
        "url": "https://bugzilla.suse.com/1245103"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1245116",
        "url": "https://bugzilla.suse.com/1245116"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1245117",
        "url": "https://bugzilla.suse.com/1245117"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1245118",
        "url": "https://bugzilla.suse.com/1245118"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1245119",
        "url": "https://bugzilla.suse.com/1245119"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1245121",
        "url": "https://bugzilla.suse.com/1245121"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1245122",
        "url": "https://bugzilla.suse.com/1245122"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1245125",
        "url": "https://bugzilla.suse.com/1245125"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1245129",
        "url": "https://bugzilla.suse.com/1245129"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1245131",
        "url": "https://bugzilla.suse.com/1245131"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1245133",
        "url": "https://bugzilla.suse.com/1245133"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1245134",
        "url": "https://bugzilla.suse.com/1245134"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1245135",
        "url": "https://bugzilla.suse.com/1245135"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1245136",
        "url": "https://bugzilla.suse.com/1245136"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1245138",
        "url": "https://bugzilla.suse.com/1245138"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1245139",
        "url": "https://bugzilla.suse.com/1245139"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1245140",
        "url": "https://bugzilla.suse.com/1245140"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1245142",
        "url": "https://bugzilla.suse.com/1245142"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1245146",
        "url": "https://bugzilla.suse.com/1245146"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1245147",
        "url": "https://bugzilla.suse.com/1245147"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1245149",
        "url": "https://bugzilla.suse.com/1245149"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1245152",
        "url": "https://bugzilla.suse.com/1245152"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1245154",
        "url": "https://bugzilla.suse.com/1245154"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1245155",
        "url": "https://bugzilla.suse.com/1245155"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1245180",
        "url": "https://bugzilla.suse.com/1245180"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1245183",
        "url": "https://bugzilla.suse.com/1245183"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1245189",
        "url": "https://bugzilla.suse.com/1245189"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1245191",
        "url": "https://bugzilla.suse.com/1245191"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1245195",
        "url": "https://bugzilla.suse.com/1245195"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1245197",
        "url": "https://bugzilla.suse.com/1245197"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1245265",
        "url": "https://bugzilla.suse.com/1245265"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1245340",
        "url": "https://bugzilla.suse.com/1245340"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1245348",
        "url": "https://bugzilla.suse.com/1245348"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1245431",
        "url": "https://bugzilla.suse.com/1245431"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1245455",
        "url": "https://bugzilla.suse.com/1245455"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2021-47557 page",
        "url": "https://www.suse.com/security/cve/CVE-2021-47557/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2021-47595 page",
        "url": "https://www.suse.com/security/cve/CVE-2021-47595/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2022-1679 page",
        "url": "https://www.suse.com/security/cve/CVE-2022-1679/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2022-2585 page",
        "url": "https://www.suse.com/security/cve/CVE-2022-2585/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2022-2586 page",
        "url": "https://www.suse.com/security/cve/CVE-2022-2586/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2022-2905 page",
        "url": "https://www.suse.com/security/cve/CVE-2022-2905/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2022-3903 page",
        "url": "https://www.suse.com/security/cve/CVE-2022-3903/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2022-4095 page",
        "url": "https://www.suse.com/security/cve/CVE-2022-4095/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2022-4662 page",
        "url": "https://www.suse.com/security/cve/CVE-2022-4662/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2022-49934 page",
        "url": "https://www.suse.com/security/cve/CVE-2022-49934/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2022-49935 page",
        "url": "https://www.suse.com/security/cve/CVE-2022-49935/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2022-49936 page",
        "url": "https://www.suse.com/security/cve/CVE-2022-49936/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2022-49937 page",
        "url": "https://www.suse.com/security/cve/CVE-2022-49937/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2022-49938 page",
        "url": "https://www.suse.com/security/cve/CVE-2022-49938/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2022-49940 page",
        "url": "https://www.suse.com/security/cve/CVE-2022-49940/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2022-49942 page",
        "url": "https://www.suse.com/security/cve/CVE-2022-49942/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2022-49943 page",
        "url": "https://www.suse.com/security/cve/CVE-2022-49943/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2022-49944 page",
        "url": "https://www.suse.com/security/cve/CVE-2022-49944/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2022-49945 page",
        "url": "https://www.suse.com/security/cve/CVE-2022-49945/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2022-49946 page",
        "url": "https://www.suse.com/security/cve/CVE-2022-49946/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2022-49948 page",
        "url": "https://www.suse.com/security/cve/CVE-2022-49948/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2022-49949 page",
        "url": "https://www.suse.com/security/cve/CVE-2022-49949/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2022-49950 page",
        "url": "https://www.suse.com/security/cve/CVE-2022-49950/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2022-49951 page",
        "url": "https://www.suse.com/security/cve/CVE-2022-49951/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2022-49952 page",
        "url": "https://www.suse.com/security/cve/CVE-2022-49952/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2022-49954 page",
        "url": "https://www.suse.com/security/cve/CVE-2022-49954/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2022-49956 page",
        "url": "https://www.suse.com/security/cve/CVE-2022-49956/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2022-49957 page",
        "url": "https://www.suse.com/security/cve/CVE-2022-49957/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2022-49958 page",
        "url": "https://www.suse.com/security/cve/CVE-2022-49958/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2022-49960 page",
        "url": "https://www.suse.com/security/cve/CVE-2022-49960/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2022-49962 page",
        "url": "https://www.suse.com/security/cve/CVE-2022-49962/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2022-49963 page",
        "url": "https://www.suse.com/security/cve/CVE-2022-49963/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2022-49964 page",
        "url": "https://www.suse.com/security/cve/CVE-2022-49964/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2022-49965 page",
        "url": "https://www.suse.com/security/cve/CVE-2022-49965/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2022-49966 page",
        "url": "https://www.suse.com/security/cve/CVE-2022-49966/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2022-49968 page",
        "url": "https://www.suse.com/security/cve/CVE-2022-49968/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2022-49969 page",
        "url": "https://www.suse.com/security/cve/CVE-2022-49969/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2022-49971 page",
        "url": "https://www.suse.com/security/cve/CVE-2022-49971/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2022-49972 page",
        "url": "https://www.suse.com/security/cve/CVE-2022-49972/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2022-49977 page",
        "url": "https://www.suse.com/security/cve/CVE-2022-49977/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2022-49978 page",
        "url": "https://www.suse.com/security/cve/CVE-2022-49978/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2022-49980 page",
        "url": "https://www.suse.com/security/cve/CVE-2022-49980/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2022-49981 page",
        "url": "https://www.suse.com/security/cve/CVE-2022-49981/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2022-49982 page",
        "url": "https://www.suse.com/security/cve/CVE-2022-49982/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2022-49983 page",
        "url": "https://www.suse.com/security/cve/CVE-2022-49983/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2022-49984 page",
        "url": "https://www.suse.com/security/cve/CVE-2022-49984/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2022-49985 page",
        "url": "https://www.suse.com/security/cve/CVE-2022-49985/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2022-49986 page",
        "url": "https://www.suse.com/security/cve/CVE-2022-49986/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2022-49987 page",
        "url": "https://www.suse.com/security/cve/CVE-2022-49987/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2022-49989 page",
        "url": "https://www.suse.com/security/cve/CVE-2022-49989/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2022-49990 page",
        "url": "https://www.suse.com/security/cve/CVE-2022-49990/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2022-49993 page",
        "url": "https://www.suse.com/security/cve/CVE-2022-49993/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2022-49995 page",
        "url": "https://www.suse.com/security/cve/CVE-2022-49995/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2022-49999 page",
        "url": "https://www.suse.com/security/cve/CVE-2022-49999/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2022-50002 page",
        "url": "https://www.suse.com/security/cve/CVE-2022-50002/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2022-50003 page",
        "url": "https://www.suse.com/security/cve/CVE-2022-50003/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2022-50005 page",
        "url": "https://www.suse.com/security/cve/CVE-2022-50005/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2022-50006 page",
        "url": "https://www.suse.com/security/cve/CVE-2022-50006/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2022-50008 page",
        "url": "https://www.suse.com/security/cve/CVE-2022-50008/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2022-50010 page",
        "url": "https://www.suse.com/security/cve/CVE-2022-50010/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2022-50011 page",
        "url": "https://www.suse.com/security/cve/CVE-2022-50011/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2022-50012 page",
        "url": "https://www.suse.com/security/cve/CVE-2022-50012/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2022-50015 page",
        "url": "https://www.suse.com/security/cve/CVE-2022-50015/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2022-50016 page",
        "url": "https://www.suse.com/security/cve/CVE-2022-50016/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2022-50019 page",
        "url": "https://www.suse.com/security/cve/CVE-2022-50019/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2022-50020 page",
        "url": "https://www.suse.com/security/cve/CVE-2022-50020/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2022-50021 page",
        "url": "https://www.suse.com/security/cve/CVE-2022-50021/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2022-50022 page",
        "url": "https://www.suse.com/security/cve/CVE-2022-50022/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2022-50023 page",
        "url": "https://www.suse.com/security/cve/CVE-2022-50023/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2022-50024 page",
        "url": "https://www.suse.com/security/cve/CVE-2022-50024/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2022-50026 page",
        "url": "https://www.suse.com/security/cve/CVE-2022-50026/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2022-50027 page",
        "url": "https://www.suse.com/security/cve/CVE-2022-50027/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2022-50028 page",
        "url": "https://www.suse.com/security/cve/CVE-2022-50028/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2022-50029 page",
        "url": "https://www.suse.com/security/cve/CVE-2022-50029/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2022-50030 page",
        "url": "https://www.suse.com/security/cve/CVE-2022-50030/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2022-50031 page",
        "url": "https://www.suse.com/security/cve/CVE-2022-50031/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2022-50032 page",
        "url": "https://www.suse.com/security/cve/CVE-2022-50032/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2022-50033 page",
        "url": "https://www.suse.com/security/cve/CVE-2022-50033/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2022-50034 page",
        "url": "https://www.suse.com/security/cve/CVE-2022-50034/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2022-50035 page",
        "url": "https://www.suse.com/security/cve/CVE-2022-50035/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2022-50036 page",
        "url": "https://www.suse.com/security/cve/CVE-2022-50036/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2022-50037 page",
        "url": "https://www.suse.com/security/cve/CVE-2022-50037/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2022-50038 page",
        "url": "https://www.suse.com/security/cve/CVE-2022-50038/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2022-50039 page",
        "url": "https://www.suse.com/security/cve/CVE-2022-50039/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2022-50040 page",
        "url": "https://www.suse.com/security/cve/CVE-2022-50040/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2022-50041 page",
        "url": "https://www.suse.com/security/cve/CVE-2022-50041/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2022-50044 page",
        "url": "https://www.suse.com/security/cve/CVE-2022-50044/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2022-50045 page",
        "url": "https://www.suse.com/security/cve/CVE-2022-50045/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2022-50046 page",
        "url": "https://www.suse.com/security/cve/CVE-2022-50046/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2022-50047 page",
        "url": "https://www.suse.com/security/cve/CVE-2022-50047/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2022-50049 page",
        "url": "https://www.suse.com/security/cve/CVE-2022-50049/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2022-50050 page",
        "url": "https://www.suse.com/security/cve/CVE-2022-50050/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2022-50051 page",
        "url": "https://www.suse.com/security/cve/CVE-2022-50051/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2022-50052 page",
        "url": "https://www.suse.com/security/cve/CVE-2022-50052/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2022-50053 page",
        "url": "https://www.suse.com/security/cve/CVE-2022-50053/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2022-50054 page",
        "url": "https://www.suse.com/security/cve/CVE-2022-50054/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2022-50055 page",
        "url": "https://www.suse.com/security/cve/CVE-2022-50055/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2022-50059 page",
        "url": "https://www.suse.com/security/cve/CVE-2022-50059/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2022-50060 page",
        "url": "https://www.suse.com/security/cve/CVE-2022-50060/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2022-50061 page",
        "url": "https://www.suse.com/security/cve/CVE-2022-50061/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2022-50062 page",
        "url": "https://www.suse.com/security/cve/CVE-2022-50062/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2022-50065 page",
        "url": "https://www.suse.com/security/cve/CVE-2022-50065/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2022-50066 page",
        "url": "https://www.suse.com/security/cve/CVE-2022-50066/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2022-50067 page",
        "url": "https://www.suse.com/security/cve/CVE-2022-50067/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2022-50068 page",
        "url": "https://www.suse.com/security/cve/CVE-2022-50068/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2022-50072 page",
        "url": "https://www.suse.com/security/cve/CVE-2022-50072/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2022-50073 page",
        "url": "https://www.suse.com/security/cve/CVE-2022-50073/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2022-50074 page",
        "url": "https://www.suse.com/security/cve/CVE-2022-50074/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2022-50076 page",
        "url": "https://www.suse.com/security/cve/CVE-2022-50076/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2022-50077 page",
        "url": "https://www.suse.com/security/cve/CVE-2022-50077/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2022-50079 page",
        "url": "https://www.suse.com/security/cve/CVE-2022-50079/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2022-50083 page",
        "url": "https://www.suse.com/security/cve/CVE-2022-50083/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2022-50084 page",
        "url": "https://www.suse.com/security/cve/CVE-2022-50084/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2022-50085 page",
        "url": "https://www.suse.com/security/cve/CVE-2022-50085/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2022-50086 page",
        "url": "https://www.suse.com/security/cve/CVE-2022-50086/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2022-50087 page",
        "url": "https://www.suse.com/security/cve/CVE-2022-50087/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2022-50092 page",
        "url": "https://www.suse.com/security/cve/CVE-2022-50092/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2022-50093 page",
        "url": "https://www.suse.com/security/cve/CVE-2022-50093/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2022-50094 page",
        "url": "https://www.suse.com/security/cve/CVE-2022-50094/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2022-50095 page",
        "url": "https://www.suse.com/security/cve/CVE-2022-50095/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2022-50097 page",
        "url": "https://www.suse.com/security/cve/CVE-2022-50097/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2022-50098 page",
        "url": "https://www.suse.com/security/cve/CVE-2022-50098/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2022-50099 page",
        "url": "https://www.suse.com/security/cve/CVE-2022-50099/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2022-50100 page",
        "url": "https://www.suse.com/security/cve/CVE-2022-50100/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2022-50101 page",
        "url": "https://www.suse.com/security/cve/CVE-2022-50101/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2022-50102 page",
        "url": "https://www.suse.com/security/cve/CVE-2022-50102/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2022-50103 page",
        "url": "https://www.suse.com/security/cve/CVE-2022-50103/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2022-50104 page",
        "url": "https://www.suse.com/security/cve/CVE-2022-50104/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2022-50108 page",
        "url": "https://www.suse.com/security/cve/CVE-2022-50108/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2022-50109 page",
        "url": "https://www.suse.com/security/cve/CVE-2022-50109/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2022-50110 page",
        "url": "https://www.suse.com/security/cve/CVE-2022-50110/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2022-50111 page",
        "url": "https://www.suse.com/security/cve/CVE-2022-50111/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2022-50112 page",
        "url": "https://www.suse.com/security/cve/CVE-2022-50112/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2022-50115 page",
        "url": "https://www.suse.com/security/cve/CVE-2022-50115/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2022-50116 page",
        "url": "https://www.suse.com/security/cve/CVE-2022-50116/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2022-50117 page",
        "url": "https://www.suse.com/security/cve/CVE-2022-50117/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2022-50118 page",
        "url": "https://www.suse.com/security/cve/CVE-2022-50118/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2022-50120 page",
        "url": "https://www.suse.com/security/cve/CVE-2022-50120/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2022-50121 page",
        "url": "https://www.suse.com/security/cve/CVE-2022-50121/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2022-50124 page",
        "url": "https://www.suse.com/security/cve/CVE-2022-50124/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2022-50125 page",
        "url": "https://www.suse.com/security/cve/CVE-2022-50125/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2022-50126 page",
        "url": "https://www.suse.com/security/cve/CVE-2022-50126/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2022-50127 page",
        "url": "https://www.suse.com/security/cve/CVE-2022-50127/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2022-50129 page",
        "url": "https://www.suse.com/security/cve/CVE-2022-50129/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2022-50131 page",
        "url": "https://www.suse.com/security/cve/CVE-2022-50131/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2022-50132 page",
        "url": "https://www.suse.com/security/cve/CVE-2022-50132/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2022-50133 page",
        "url": "https://www.suse.com/security/cve/CVE-2022-50133/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2022-50134 page",
        "url": "https://www.suse.com/security/cve/CVE-2022-50134/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2022-50135 page",
        "url": "https://www.suse.com/security/cve/CVE-2022-50135/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2022-50136 page",
        "url": "https://www.suse.com/security/cve/CVE-2022-50136/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2022-50137 page",
        "url": "https://www.suse.com/security/cve/CVE-2022-50137/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2022-50138 page",
        "url": "https://www.suse.com/security/cve/CVE-2022-50138/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2022-50139 page",
        "url": "https://www.suse.com/security/cve/CVE-2022-50139/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2022-50140 page",
        "url": "https://www.suse.com/security/cve/CVE-2022-50140/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2022-50141 page",
        "url": "https://www.suse.com/security/cve/CVE-2022-50141/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2022-50142 page",
        "url": "https://www.suse.com/security/cve/CVE-2022-50142/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2022-50143 page",
        "url": "https://www.suse.com/security/cve/CVE-2022-50143/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2022-50144 page",
        "url": "https://www.suse.com/security/cve/CVE-2022-50144/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2022-50145 page",
        "url": "https://www.suse.com/security/cve/CVE-2022-50145/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2022-50146 page",
        "url": "https://www.suse.com/security/cve/CVE-2022-50146/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2022-50149 page",
        "url": "https://www.suse.com/security/cve/CVE-2022-50149/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2022-50151 page",
        "url": "https://www.suse.com/security/cve/CVE-2022-50151/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2022-50152 page",
        "url": "https://www.suse.com/security/cve/CVE-2022-50152/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2022-50153 page",
        "url": "https://www.suse.com/security/cve/CVE-2022-50153/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2022-50154 page",
        "url": "https://www.suse.com/security/cve/CVE-2022-50154/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2022-50155 page",
        "url": "https://www.suse.com/security/cve/CVE-2022-50155/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2022-50156 page",
        "url": "https://www.suse.com/security/cve/CVE-2022-50156/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2022-50157 page",
        "url": "https://www.suse.com/security/cve/CVE-2022-50157/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2022-50158 page",
        "url": "https://www.suse.com/security/cve/CVE-2022-50158/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2022-50160 page",
        "url": "https://www.suse.com/security/cve/CVE-2022-50160/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2022-50161 page",
        "url": "https://www.suse.com/security/cve/CVE-2022-50161/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2022-50162 page",
        "url": "https://www.suse.com/security/cve/CVE-2022-50162/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2022-50164 page",
        "url": "https://www.suse.com/security/cve/CVE-2022-50164/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2022-50165 page",
        "url": "https://www.suse.com/security/cve/CVE-2022-50165/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2022-50166 page",
        "url": "https://www.suse.com/security/cve/CVE-2022-50166/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2022-50169 page",
        "url": "https://www.suse.com/security/cve/CVE-2022-50169/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2022-50171 page",
        "url": "https://www.suse.com/security/cve/CVE-2022-50171/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2022-50172 page",
        "url": "https://www.suse.com/security/cve/CVE-2022-50172/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2022-50173 page",
        "url": "https://www.suse.com/security/cve/CVE-2022-50173/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2022-50175 page",
        "url": "https://www.suse.com/security/cve/CVE-2022-50175/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2022-50176 page",
        "url": "https://www.suse.com/security/cve/CVE-2022-50176/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2022-50178 page",
        "url": "https://www.suse.com/security/cve/CVE-2022-50178/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2022-50179 page",
        "url": "https://www.suse.com/security/cve/CVE-2022-50179/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2022-50181 page",
        "url": "https://www.suse.com/security/cve/CVE-2022-50181/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2022-50183 page",
        "url": "https://www.suse.com/security/cve/CVE-2022-50183/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2022-50184 page",
        "url": "https://www.suse.com/security/cve/CVE-2022-50184/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2022-50185 page",
        "url": "https://www.suse.com/security/cve/CVE-2022-50185/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2022-50186 page",
        "url": "https://www.suse.com/security/cve/CVE-2022-50186/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2022-50187 page",
        "url": "https://www.suse.com/security/cve/CVE-2022-50187/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2022-50188 page",
        "url": "https://www.suse.com/security/cve/CVE-2022-50188/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2022-50190 page",
        "url": "https://www.suse.com/security/cve/CVE-2022-50190/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2022-50191 page",
        "url": "https://www.suse.com/security/cve/CVE-2022-50191/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2022-50192 page",
        "url": "https://www.suse.com/security/cve/CVE-2022-50192/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2022-50194 page",
        "url": "https://www.suse.com/security/cve/CVE-2022-50194/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2022-50196 page",
        "url": "https://www.suse.com/security/cve/CVE-2022-50196/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2022-50197 page",
        "url": "https://www.suse.com/security/cve/CVE-2022-50197/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2022-50198 page",
        "url": "https://www.suse.com/security/cve/CVE-2022-50198/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2022-50199 page",
        "url": "https://www.suse.com/security/cve/CVE-2022-50199/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2022-50200 page",
        "url": "https://www.suse.com/security/cve/CVE-2022-50200/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2022-50201 page",
        "url": "https://www.suse.com/security/cve/CVE-2022-50201/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2022-50202 page",
        "url": "https://www.suse.com/security/cve/CVE-2022-50202/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2022-50203 page",
        "url": "https://www.suse.com/security/cve/CVE-2022-50203/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2022-50204 page",
        "url": "https://www.suse.com/security/cve/CVE-2022-50204/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2022-50206 page",
        "url": "https://www.suse.com/security/cve/CVE-2022-50206/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2022-50207 page",
        "url": "https://www.suse.com/security/cve/CVE-2022-50207/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2022-50208 page",
        "url": "https://www.suse.com/security/cve/CVE-2022-50208/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2022-50209 page",
        "url": "https://www.suse.com/security/cve/CVE-2022-50209/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2022-50211 page",
        "url": "https://www.suse.com/security/cve/CVE-2022-50211/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2022-50212 page",
        "url": "https://www.suse.com/security/cve/CVE-2022-50212/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2022-50213 page",
        "url": "https://www.suse.com/security/cve/CVE-2022-50213/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2022-50215 page",
        "url": "https://www.suse.com/security/cve/CVE-2022-50215/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2022-50218 page",
        "url": "https://www.suse.com/security/cve/CVE-2022-50218/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2022-50220 page",
        "url": "https://www.suse.com/security/cve/CVE-2022-50220/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2022-50221 page",
        "url": "https://www.suse.com/security/cve/CVE-2022-50221/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2022-50222 page",
        "url": "https://www.suse.com/security/cve/CVE-2022-50222/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2022-50226 page",
        "url": "https://www.suse.com/security/cve/CVE-2022-50226/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2022-50228 page",
        "url": "https://www.suse.com/security/cve/CVE-2022-50228/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2022-50229 page",
        "url": "https://www.suse.com/security/cve/CVE-2022-50229/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2022-50231 page",
        "url": "https://www.suse.com/security/cve/CVE-2022-50231/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2023-3111 page",
        "url": "https://www.suse.com/security/cve/CVE-2023-3111/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2023-52924 page",
        "url": "https://www.suse.com/security/cve/CVE-2023-52924/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2023-52925 page",
        "url": "https://www.suse.com/security/cve/CVE-2023-52925/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2023-53046 page",
        "url": "https://www.suse.com/security/cve/CVE-2023-53046/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2023-53048 page",
        "url": "https://www.suse.com/security/cve/CVE-2023-53048/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2023-53076 page",
        "url": "https://www.suse.com/security/cve/CVE-2023-53076/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2023-53097 page",
        "url": "https://www.suse.com/security/cve/CVE-2023-53097/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2024-26808 page",
        "url": "https://www.suse.com/security/cve/CVE-2024-26808/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2024-26924 page",
        "url": "https://www.suse.com/security/cve/CVE-2024-26924/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2024-26935 page",
        "url": "https://www.suse.com/security/cve/CVE-2024-26935/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2024-27397 page",
        "url": "https://www.suse.com/security/cve/CVE-2024-27397/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2024-28956 page",
        "url": "https://www.suse.com/security/cve/CVE-2024-28956/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2024-35840 page",
        "url": "https://www.suse.com/security/cve/CVE-2024-35840/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2024-36978 page",
        "url": "https://www.suse.com/security/cve/CVE-2024-36978/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2024-46800 page",
        "url": "https://www.suse.com/security/cve/CVE-2024-46800/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2024-53125 page",
        "url": "https://www.suse.com/security/cve/CVE-2024-53125/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2024-53141 page",
        "url": "https://www.suse.com/security/cve/CVE-2024-53141/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2024-53197 page",
        "url": "https://www.suse.com/security/cve/CVE-2024-53197/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2024-56770 page",
        "url": "https://www.suse.com/security/cve/CVE-2024-56770/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2024-57999 page",
        "url": "https://www.suse.com/security/cve/CVE-2024-57999/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2025-21700 page",
        "url": "https://www.suse.com/security/cve/CVE-2025-21700/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2025-21702 page",
        "url": "https://www.suse.com/security/cve/CVE-2025-21702/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2025-21703 page",
        "url": "https://www.suse.com/security/cve/CVE-2025-21703/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2025-21756 page",
        "url": "https://www.suse.com/security/cve/CVE-2025-21756/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2025-23141 page",
        "url": "https://www.suse.com/security/cve/CVE-2025-23141/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2025-23145 page",
        "url": "https://www.suse.com/security/cve/CVE-2025-23145/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2025-37752 page",
        "url": "https://www.suse.com/security/cve/CVE-2025-37752/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2025-37785 page",
        "url": "https://www.suse.com/security/cve/CVE-2025-37785/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2025-37798 page",
        "url": "https://www.suse.com/security/cve/CVE-2025-37798/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2025-37823 page",
        "url": "https://www.suse.com/security/cve/CVE-2025-37823/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2025-37890 page",
        "url": "https://www.suse.com/security/cve/CVE-2025-37890/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2025-37932 page",
        "url": "https://www.suse.com/security/cve/CVE-2025-37932/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2025-37948 page",
        "url": "https://www.suse.com/security/cve/CVE-2025-37948/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2025-37953 page",
        "url": "https://www.suse.com/security/cve/CVE-2025-37953/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2025-37963 page",
        "url": "https://www.suse.com/security/cve/CVE-2025-37963/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2025-37997 page",
        "url": "https://www.suse.com/security/cve/CVE-2025-37997/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2025-38000 page",
        "url": "https://www.suse.com/security/cve/CVE-2025-38000/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2025-38001 page",
        "url": "https://www.suse.com/security/cve/CVE-2025-38001/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2025-38014 page",
        "url": "https://www.suse.com/security/cve/CVE-2025-38014/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2025-38060 page",
        "url": "https://www.suse.com/security/cve/CVE-2025-38060/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2025-38083 page",
        "url": "https://www.suse.com/security/cve/CVE-2025-38083/"
      }
    ],
    "title": "Security update for the Linux Kernel",
    "tracking": {
      "current_release_date": "2025-07-15T14:31:35Z",
      "generator": {
        "date": "2025-07-15T14:31:35Z",
        "engine": {
          "name": "cve-database.git:bin/generate-csaf.pl",
          "version": "1"
        }
      },
      "id": "SUSE-SU-2025:02321-1",
      "initial_release_date": "2025-07-15T14:31:35Z",
      "revision_history": [
        {
          "date": "2025-07-15T14:31:35Z",
          "number": "1",
          "summary": "Current version"
        }
      ],
      "status": "final",
      "version": "1"
    }
  },
  "product_tree": {
    "branches": [
      {
        "branches": [
          {
            "branches": [
              {
                "category": "product_version",
                "name": "kernel-devel-rt-5.14.21-150500.13.100.1.noarch",
                "product": {
                  "name": "kernel-devel-rt-5.14.21-150500.13.100.1.noarch",
                  "product_id": "kernel-devel-rt-5.14.21-150500.13.100.1.noarch"
                }
              },
              {
                "category": "product_version",
                "name": "kernel-source-rt-5.14.21-150500.13.100.1.noarch",
                "product": {
                  "name": "kernel-source-rt-5.14.21-150500.13.100.1.noarch",
                  "product_id": "kernel-source-rt-5.14.21-150500.13.100.1.noarch"
                }
              }
            ],
            "category": "architecture",
            "name": "noarch"
          },
          {
            "branches": [
              {
                "category": "product_version",
                "name": "cluster-md-kmp-rt-5.14.21-150500.13.100.2.x86_64",
                "product": {
                  "name": "cluster-md-kmp-rt-5.14.21-150500.13.100.2.x86_64",
                  "product_id": "cluster-md-kmp-rt-5.14.21-150500.13.100.2.x86_64"
                }
              },
              {
                "category": "product_version",
                "name": "dlm-kmp-rt-5.14.21-150500.13.100.2.x86_64",
                "product": {
                  "name": "dlm-kmp-rt-5.14.21-150500.13.100.2.x86_64",
                  "product_id": "dlm-kmp-rt-5.14.21-150500.13.100.2.x86_64"
                }
              },
              {
                "category": "product_version",
                "name": "gfs2-kmp-rt-5.14.21-150500.13.100.2.x86_64",
                "product": {
                  "name": "gfs2-kmp-rt-5.14.21-150500.13.100.2.x86_64",
                  "product_id": "gfs2-kmp-rt-5.14.21-150500.13.100.2.x86_64"
                }
              },
              {
                "category": "product_version",
                "name": "kernel-rt-5.14.21-150500.13.100.2.x86_64",
                "product": {
                  "name": "kernel-rt-5.14.21-150500.13.100.2.x86_64",
                  "product_id": "kernel-rt-5.14.21-150500.13.100.2.x86_64"
                }
              },
              {
                "category": "product_version",
                "name": "kernel-rt-devel-5.14.21-150500.13.100.2.x86_64",
                "product": {
                  "name": "kernel-rt-devel-5.14.21-150500.13.100.2.x86_64",
                  "product_id": "kernel-rt-devel-5.14.21-150500.13.100.2.x86_64"
                }
              },
              {
                "category": "product_version",
                "name": "kernel-rt-extra-5.14.21-150500.13.100.2.x86_64",
                "product": {
                  "name": "kernel-rt-extra-5.14.21-150500.13.100.2.x86_64",
                  "product_id": "kernel-rt-extra-5.14.21-150500.13.100.2.x86_64"
                }
              },
              {
                "category": "product_version",
                "name": "kernel-rt-livepatch-5.14.21-150500.13.100.2.x86_64",
                "product": {
                  "name": "kernel-rt-livepatch-5.14.21-150500.13.100.2.x86_64",
                  "product_id": "kernel-rt-livepatch-5.14.21-150500.13.100.2.x86_64"
                }
              },
              {
                "category": "product_version",
                "name": "kernel-rt-livepatch-devel-5.14.21-150500.13.100.2.x86_64",
                "product": {
                  "name": "kernel-rt-livepatch-devel-5.14.21-150500.13.100.2.x86_64",
                  "product_id": "kernel-rt-livepatch-devel-5.14.21-150500.13.100.2.x86_64"
                }
              },
              {
                "category": "product_version",
                "name": "kernel-rt-optional-5.14.21-150500.13.100.2.x86_64",
                "product": {
                  "name": "kernel-rt-optional-5.14.21-150500.13.100.2.x86_64",
                  "product_id": "kernel-rt-optional-5.14.21-150500.13.100.2.x86_64"
                }
              },
              {
                "category": "product_version",
                "name": "kernel-rt-vdso-5.14.21-150500.13.100.2.x86_64",
                "product": {
                  "name": "kernel-rt-vdso-5.14.21-150500.13.100.2.x86_64",
                  "product_id": "kernel-rt-vdso-5.14.21-150500.13.100.2.x86_64"
                }
              },
              {
                "category": "product_version",
                "name": "kernel-rt_debug-5.14.21-150500.13.100.2.x86_64",
                "product": {
                  "name": "kernel-rt_debug-5.14.21-150500.13.100.2.x86_64",
                  "product_id": "kernel-rt_debug-5.14.21-150500.13.100.2.x86_64"
                }
              },
              {
                "category": "product_version",
                "name": "kernel-rt_debug-devel-5.14.21-150500.13.100.2.x86_64",
                "product": {
                  "name": "kernel-rt_debug-devel-5.14.21-150500.13.100.2.x86_64",
                  "product_id": "kernel-rt_debug-devel-5.14.21-150500.13.100.2.x86_64"
                }
              },
              {
                "category": "product_version",
                "name": "kernel-rt_debug-vdso-5.14.21-150500.13.100.2.x86_64",
                "product": {
                  "name": "kernel-rt_debug-vdso-5.14.21-150500.13.100.2.x86_64",
                  "product_id": "kernel-rt_debug-vdso-5.14.21-150500.13.100.2.x86_64"
                }
              },
              {
                "category": "product_version",
                "name": "kselftests-kmp-rt-5.14.21-150500.13.100.2.x86_64",
                "product": {
                  "name": "kselftests-kmp-rt-5.14.21-150500.13.100.2.x86_64",
                  "product_id": "kselftests-kmp-rt-5.14.21-150500.13.100.2.x86_64"
                }
              },
              {
                "category": "product_version",
                "name": "ocfs2-kmp-rt-5.14.21-150500.13.100.2.x86_64",
                "product": {
                  "name": "ocfs2-kmp-rt-5.14.21-150500.13.100.2.x86_64",
                  "product_id": "ocfs2-kmp-rt-5.14.21-150500.13.100.2.x86_64"
                }
              },
              {
                "category": "product_version",
                "name": "reiserfs-kmp-rt-5.14.21-150500.13.100.2.x86_64",
                "product": {
                  "name": "reiserfs-kmp-rt-5.14.21-150500.13.100.2.x86_64",
                  "product_id": "reiserfs-kmp-rt-5.14.21-150500.13.100.2.x86_64"
                }
              }
            ],
            "category": "architecture",
            "name": "x86_64"
          },
          {
            "branches": [
              {
                "category": "product_name",
                "name": "SUSE Linux Enterprise Micro 5.5",
                "product": {
                  "name": "SUSE Linux Enterprise Micro 5.5",
                  "product_id": "SUSE Linux Enterprise Micro 5.5",
                  "product_identification_helper": {
                    "cpe": "cpe:/o:suse:sle-micro:5.5"
                  }
                }
              }
            ],
            "category": "product_family",
            "name": "SUSE Linux Enterprise"
          }
        ],
        "category": "vendor",
        "name": "SUSE"
      }
    ],
    "relationships": [
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-devel-rt-5.14.21-150500.13.100.1.noarch as component of SUSE Linux Enterprise Micro 5.5",
          "product_id": "SUSE Linux Enterprise Micro 5.5:kernel-devel-rt-5.14.21-150500.13.100.1.noarch"
        },
        "product_reference": "kernel-devel-rt-5.14.21-150500.13.100.1.noarch",
        "relates_to_product_reference": "SUSE Linux Enterprise Micro 5.5"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-rt-5.14.21-150500.13.100.2.x86_64 as component of SUSE Linux Enterprise Micro 5.5",
          "product_id": "SUSE Linux Enterprise Micro 5.5:kernel-rt-5.14.21-150500.13.100.2.x86_64"
        },
        "product_reference": "kernel-rt-5.14.21-150500.13.100.2.x86_64",
        "relates_to_product_reference": "SUSE Linux Enterprise Micro 5.5"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-source-rt-5.14.21-150500.13.100.1.noarch as component of SUSE Linux Enterprise Micro 5.5",
          "product_id": "SUSE Linux Enterprise Micro 5.5:kernel-source-rt-5.14.21-150500.13.100.1.noarch"
        },
        "product_reference": "kernel-source-rt-5.14.21-150500.13.100.1.noarch",
        "relates_to_product_reference": "SUSE Linux Enterprise Micro 5.5"
      }
    ]
  },
  "vulnerabilities": [
    {
      "cve": "CVE-2021-47557",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2021-47557"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "In the Linux kernel, the following vulnerability has been resolved:\n\nnet/sched: sch_ets: don\u0027t peek at classes beyond \u0027nbands\u0027\n\nwhen the number of DRR classes decreases, the round-robin active list can\ncontain elements that have already been freed in ets_qdisc_change(). As a\nconsequence, it\u0027s possible to see a NULL dereference crash, caused by the\nattempt to call cl-\u003eqdisc-\u003eops-\u003epeek(cl-\u003eqdisc) when cl-\u003eqdisc is NULL:\n\n BUG: kernel NULL pointer dereference, address: 0000000000000018\n #PF: supervisor read access in kernel mode\n #PF: error_code(0x0000) - not-present page\n PGD 0 P4D 0\n Oops: 0000 [#1] PREEMPT SMP NOPTI\n CPU: 1 PID: 910 Comm: mausezahn Not tainted 5.16.0-rc1+ #475\n Hardware name: Red Hat KVM, BIOS 1.11.1-4.module+el8.1.0+4066+0f1aadab 04/01/2014\n RIP: 0010:ets_qdisc_dequeue+0x129/0x2c0 [sch_ets]\n Code: c5 01 41 39 ad e4 02 00 00 0f 87 18 ff ff ff 49 8b 85 c0 02 00 00 49 39 c4 0f 84 ba 00 00 00 49 8b ad c0 02 00 00 48 8b 7d 10 \u003c48\u003e 8b 47 18 48 8b 40 38 0f ae e8 ff d0 48 89 c3 48 85 c0 0f 84 9d\n RSP: 0000:ffffbb36c0b5fdd8 EFLAGS: 00010287\n RAX: ffff956678efed30 RBX: 0000000000000000 RCX: 0000000000000000\n RDX: 0000000000000002 RSI: ffffffff9b938dc9 RDI: 0000000000000000\n RBP: ffff956678efed30 R08: e2f3207fe360129c R09: 0000000000000000\n R10: 0000000000000001 R11: 0000000000000001 R12: ffff956678efeac0\n R13: ffff956678efe800 R14: ffff956611545000 R15: ffff95667ac8f100\n FS:  00007f2aa9120740(0000) GS:ffff95667b800000(0000) knlGS:0000000000000000\n CS:  0010 DS: 0000 ES: 0000 CR0: 0000000080050033\n CR2: 0000000000000018 CR3: 000000011070c000 CR4: 0000000000350ee0\n Call Trace:\n  \u003cTASK\u003e\n  qdisc_peek_dequeued+0x29/0x70 [sch_ets]\n  tbf_dequeue+0x22/0x260 [sch_tbf]\n  __qdisc_run+0x7f/0x630\n  net_tx_action+0x290/0x4c0\n  __do_softirq+0xee/0x4f8\n  irq_exit_rcu+0xf4/0x130\n  sysvec_apic_timer_interrupt+0x52/0xc0\n  asm_sysvec_apic_timer_interrupt+0x12/0x20\n RIP: 0033:0x7f2aa7fc9ad4\n Code: b9 ff ff 48 8b 54 24 18 48 83 c4 08 48 89 ee 48 89 df 5b 5d e9 ed fc ff ff 0f 1f 00 66 2e 0f 1f 84 00 00 00 00 00 f3 0f 1e fa \u003c53\u003e 48 83 ec 10 48 8b 05 10 64 33 00 48 8b 00 48 85 c0 0f 85 84 00\n RSP: 002b:00007ffe5d33fab8 EFLAGS: 00000202\n RAX: 0000000000000002 RBX: 0000561f72c31460 RCX: 0000561f72c31720\n RDX: 0000000000000002 RSI: 0000561f72c31722 RDI: 0000561f72c31720\n RBP: 000000000000002a R08: 00007ffe5d33fa40 R09: 0000000000000014\n R10: 0000000000000000 R11: 0000000000000246 R12: 0000561f7187e380\n R13: 0000000000000000 R14: 0000000000000000 R15: 0000561f72c31460\n  \u003c/TASK\u003e\n Modules linked in: sch_ets sch_tbf dummy rfkill iTCO_wdt intel_rapl_msr iTCO_vendor_support intel_rapl_common joydev virtio_balloon lpc_ich i2c_i801 i2c_smbus pcspkr ip_tables xfs libcrc32c crct10dif_pclmul crc32_pclmul crc32c_intel ahci libahci ghash_clmulni_intel serio_raw libata virtio_blk virtio_console virtio_net net_failover failover sunrpc dm_mirror dm_region_hash dm_log dm_mod\n CR2: 0000000000000018\n\nEnsuring that \u0027alist\u0027 was never zeroed [1] was not sufficient, we need to\nremove from the active list those elements that are no more SP nor DRR.\n\n[1] https://lore.kernel.org/netdev/60d274838bf09777f0371253416e8af71360bc08.1633609148.git.dcaratti@redhat.com/\n\nv3: fix race between ets_qdisc_change() and ets_qdisc_dequeue() delisting\n    DRR classes beyond \u0027nbands\u0027 in ets_qdisc_change() with the qdisc lock\n    acquired, thanks to Cong Wang.\n\nv2: when a NULL qdisc is found in the DRR active list, try to dequeue skb\n    from the next list item.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "SUSE Linux Enterprise Micro 5.5:kernel-devel-rt-5.14.21-150500.13.100.1.noarch",
          "SUSE Linux Enterprise Micro 5.5:kernel-rt-5.14.21-150500.13.100.2.x86_64",
          "SUSE Linux Enterprise Micro 5.5:kernel-source-rt-5.14.21-150500.13.100.1.noarch"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2021-47557",
          "url": "https://www.suse.com/security/cve/CVE-2021-47557"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1225468 for CVE-2021-47557",
          "url": "https://bugzilla.suse.com/1225468"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "SUSE Linux Enterprise Micro 5.5:kernel-devel-rt-5.14.21-150500.13.100.1.noarch",
            "SUSE Linux Enterprise Micro 5.5:kernel-rt-5.14.21-150500.13.100.2.x86_64",
            "SUSE Linux Enterprise Micro 5.5:kernel-source-rt-5.14.21-150500.13.100.1.noarch"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 5.5,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
            "version": "3.1"
          },
          "products": [
            "SUSE Linux Enterprise Micro 5.5:kernel-devel-rt-5.14.21-150500.13.100.1.noarch",
            "SUSE Linux Enterprise Micro 5.5:kernel-rt-5.14.21-150500.13.100.2.x86_64",
            "SUSE Linux Enterprise Micro 5.5:kernel-source-rt-5.14.21-150500.13.100.1.noarch"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2025-07-15T14:31:35Z",
          "details": "moderate"
        }
      ],
      "title": "CVE-2021-47557"
    },
    {
      "cve": "CVE-2021-47595",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2021-47595"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "In the Linux kernel, the following vulnerability has been resolved:\n\nnet/sched: sch_ets: don\u0027t remove idle classes from the round-robin list\n\nShuang reported that the following script:\n\n 1) tc qdisc add dev ddd0 handle 10: parent 1: ets bands 8 strict 4 priomap 7 7 7 7 7 7 7 7 7 7 7 7 7 7 7 7\n 2) mausezahn ddd0  -A 10.10.10.1 -B 10.10.10.2 -c 0 -a own -b 00:c1:a0:c1:a0:00 -t udp \u0026\n 3) tc qdisc change dev ddd0 handle 10: ets bands 4 strict 2 quanta 2500 2500 priomap 3 3 3 3 3 3 3 3 3 3 3 3 3 3 3 3\n\ncrashes systematically when line 2) is commented:\n\n list_del corruption, ffff8e028404bd30-\u003enext is LIST_POISON1 (dead000000000100)\n ------------[ cut here ]------------\n kernel BUG at lib/list_debug.c:47!\n invalid opcode: 0000 [#1] PREEMPT SMP NOPTI\n CPU: 0 PID: 954 Comm: tc Not tainted 5.16.0-rc4+ #478\n Hardware name: Red Hat KVM, BIOS 1.11.1-4.module+el8.1.0+4066+0f1aadab 04/01/2014\n RIP: 0010:__list_del_entry_valid.cold.1+0x12/0x47\n Code: fe ff 0f 0b 48 89 c1 4c 89 c6 48 c7 c7 08 42 1b 87 e8 1d c5 fe ff 0f 0b 48 89 fe 48 89 c2 48 c7 c7 98 42 1b 87 e8 09 c5 fe ff \u003c0f\u003e 0b 48 c7 c7 48 43 1b 87 e8 fb c4 fe ff 0f 0b 48 89 f2 48 89 fe\n RSP: 0018:ffffae46807a3888 EFLAGS: 00010246\n RAX: 000000000000004e RBX: 0000000000000007 RCX: 0000000000000202\n RDX: 0000000000000000 RSI: ffffffff871ac536 RDI: 00000000ffffffff\n RBP: ffffae46807a3a10 R08: 0000000000000000 R09: c0000000ffff7fff\n R10: 0000000000000001 R11: ffffae46807a36a8 R12: ffff8e028404b800\n R13: ffff8e028404bd30 R14: dead000000000100 R15: ffff8e02fafa2400\n FS:  00007efdc92e4480(0000) GS:ffff8e02fb600000(0000) knlGS:0000000000000000\n CS:  0010 DS: 0000 ES: 0000 CR0: 0000000080050033\n CR2: 0000000000682f48 CR3: 00000001058be000 CR4: 0000000000350ef0\n Call Trace:\n  \u003cTASK\u003e\n  ets_qdisc_change+0x58b/0xa70 [sch_ets]\n  tc_modify_qdisc+0x323/0x880\n  rtnetlink_rcv_msg+0x169/0x4a0\n  netlink_rcv_skb+0x50/0x100\n  netlink_unicast+0x1a5/0x280\n  netlink_sendmsg+0x257/0x4d0\n  sock_sendmsg+0x5b/0x60\n  ____sys_sendmsg+0x1f2/0x260\n  ___sys_sendmsg+0x7c/0xc0\n  __sys_sendmsg+0x57/0xa0\n  do_syscall_64+0x3a/0x80\n  entry_SYSCALL_64_after_hwframe+0x44/0xae\n RIP: 0033:0x7efdc8031338\n Code: 89 02 48 c7 c0 ff ff ff ff eb b5 0f 1f 80 00 00 00 00 f3 0f 1e fa 48 8d 05 25 43 2c 00 8b 00 85 c0 75 17 b8 2e 00 00 00 0f 05 \u003c48\u003e 3d 00 f0 ff ff 77 58 c3 0f 1f 80 00 00 00 00 41 54 41 89 d4 55\n RSP: 002b:00007ffdf1ce9828 EFLAGS: 00000246 ORIG_RAX: 000000000000002e\n RAX: ffffffffffffffda RBX: 0000000061b37a97 RCX: 00007efdc8031338\n RDX: 0000000000000000 RSI: 00007ffdf1ce9890 RDI: 0000000000000003\n RBP: 0000000000000000 R08: 0000000000000001 R09: 000000000078a940\n R10: 000000000000000c R11: 0000000000000246 R12: 0000000000000001\n R13: 0000000000688880 R14: 0000000000000000 R15: 0000000000000000\n  \u003c/TASK\u003e\n Modules linked in: sch_ets sch_tbf dummy rfkill iTCO_wdt iTCO_vendor_support intel_rapl_msr intel_rapl_common joydev pcspkr i2c_i801 virtio_balloon i2c_smbus lpc_ich ip_tables xfs libcrc32c crct10dif_pclmul crc32_pclmul crc32c_intel serio_raw ghash_clmulni_intel ahci libahci libata virtio_blk virtio_console virtio_net net_failover failover sunrpc dm_mirror dm_region_hash dm_log dm_mod [last unloaded: sch_ets]\n ---[ end trace f35878d1912655c2 ]---\n RIP: 0010:__list_del_entry_valid.cold.1+0x12/0x47\n Code: fe ff 0f 0b 48 89 c1 4c 89 c6 48 c7 c7 08 42 1b 87 e8 1d c5 fe ff 0f 0b 48 89 fe 48 89 c2 48 c7 c7 98 42 1b 87 e8 09 c5 fe ff \u003c0f\u003e 0b 48 c7 c7 48 43 1b 87 e8 fb c4 fe ff 0f 0b 48 89 f2 48 89 fe\n RSP: 0018:ffffae46807a3888 EFLAGS: 00010246\n RAX: 000000000000004e RBX: 0000000000000007 RCX: 0000000000000202\n RDX: 0000000000000000 RSI: ffffffff871ac536 RDI: 00000000ffffffff\n RBP: ffffae46807a3a10 R08: 0000000000000000 R09: c0000000ffff7fff\n R10: 0000000000000001 R11: ffffae46807a36a8 R12: ffff8e028404b800\n R13: ffff8e028404bd30 R14: dead000000000100 R15: ffff8e02fafa2400\n FS:  00007efdc92e4480(0000) GS:ffff8e02fb600000(0000) knlGS:0000000000000000\n CS:  0010 DS: 0000 ES: 0000 CR0: 0000000080050033\n CR2: 000000000\n---truncated---",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "SUSE Linux Enterprise Micro 5.5:kernel-devel-rt-5.14.21-150500.13.100.1.noarch",
          "SUSE Linux Enterprise Micro 5.5:kernel-rt-5.14.21-150500.13.100.2.x86_64",
          "SUSE Linux Enterprise Micro 5.5:kernel-source-rt-5.14.21-150500.13.100.1.noarch"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2021-47595",
          "url": "https://www.suse.com/security/cve/CVE-2021-47595"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1226552 for CVE-2021-47595",
          "url": "https://bugzilla.suse.com/1226552"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "SUSE Linux Enterprise Micro 5.5:kernel-devel-rt-5.14.21-150500.13.100.1.noarch",
            "SUSE Linux Enterprise Micro 5.5:kernel-rt-5.14.21-150500.13.100.2.x86_64",
            "SUSE Linux Enterprise Micro 5.5:kernel-source-rt-5.14.21-150500.13.100.1.noarch"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 5.5,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
            "version": "3.1"
          },
          "products": [
            "SUSE Linux Enterprise Micro 5.5:kernel-devel-rt-5.14.21-150500.13.100.1.noarch",
            "SUSE Linux Enterprise Micro 5.5:kernel-rt-5.14.21-150500.13.100.2.x86_64",
            "SUSE Linux Enterprise Micro 5.5:kernel-source-rt-5.14.21-150500.13.100.1.noarch"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2025-07-15T14:31:35Z",
          "details": "moderate"
        }
      ],
      "title": "CVE-2021-47595"
    },
    {
      "cve": "CVE-2022-1679",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2022-1679"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "A use-after-free flaw was found in the Linux kernel\u0027s Atheros wireless adapter driver in the way a user forces the ath9k_htc_wait_for_target function to fail with some input messages. This flaw allows a local user to crash or potentially escalate their privileges on the system.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "SUSE Linux Enterprise Micro 5.5:kernel-devel-rt-5.14.21-150500.13.100.1.noarch",
          "SUSE Linux Enterprise Micro 5.5:kernel-rt-5.14.21-150500.13.100.2.x86_64",
          "SUSE Linux Enterprise Micro 5.5:kernel-source-rt-5.14.21-150500.13.100.1.noarch"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2022-1679",
          "url": "https://www.suse.com/security/cve/CVE-2022-1679"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1199487 for CVE-2022-1679",
          "url": "https://bugzilla.suse.com/1199487"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1201080 for CVE-2022-1679",
          "url": "https://bugzilla.suse.com/1201080"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1201832 for CVE-2022-1679",
          "url": "https://bugzilla.suse.com/1201832"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1204132 for CVE-2022-1679",
          "url": "https://bugzilla.suse.com/1204132"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1212316 for CVE-2022-1679",
          "url": "https://bugzilla.suse.com/1212316"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "SUSE Linux Enterprise Micro 5.5:kernel-devel-rt-5.14.21-150500.13.100.1.noarch",
            "SUSE Linux Enterprise Micro 5.5:kernel-rt-5.14.21-150500.13.100.2.x86_64",
            "SUSE Linux Enterprise Micro 5.5:kernel-source-rt-5.14.21-150500.13.100.1.noarch"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 7,
            "baseSeverity": "HIGH",
            "vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H",
            "version": "3.1"
          },
          "products": [
            "SUSE Linux Enterprise Micro 5.5:kernel-devel-rt-5.14.21-150500.13.100.1.noarch",
            "SUSE Linux Enterprise Micro 5.5:kernel-rt-5.14.21-150500.13.100.2.x86_64",
            "SUSE Linux Enterprise Micro 5.5:kernel-source-rt-5.14.21-150500.13.100.1.noarch"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2025-07-15T14:31:35Z",
          "details": "moderate"
        }
      ],
      "title": "CVE-2022-1679"
    },
    {
      "cve": "CVE-2022-2585",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2022-2585"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "It was discovered that when exec\u0027ing from a non-leader thread, armed POSIX CPU timers would be left on a list but freed, leading to a use-after-free.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "SUSE Linux Enterprise Micro 5.5:kernel-devel-rt-5.14.21-150500.13.100.1.noarch",
          "SUSE Linux Enterprise Micro 5.5:kernel-rt-5.14.21-150500.13.100.2.x86_64",
          "SUSE Linux Enterprise Micro 5.5:kernel-source-rt-5.14.21-150500.13.100.1.noarch"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2022-2585",
          "url": "https://www.suse.com/security/cve/CVE-2022-2585"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1202094 for CVE-2022-2585",
          "url": "https://bugzilla.suse.com/1202094"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1202163 for CVE-2022-2585",
          "url": "https://bugzilla.suse.com/1202163"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "SUSE Linux Enterprise Micro 5.5:kernel-devel-rt-5.14.21-150500.13.100.1.noarch",
            "SUSE Linux Enterprise Micro 5.5:kernel-rt-5.14.21-150500.13.100.2.x86_64",
            "SUSE Linux Enterprise Micro 5.5:kernel-source-rt-5.14.21-150500.13.100.1.noarch"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 8.4,
            "baseSeverity": "HIGH",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
            "version": "3.1"
          },
          "products": [
            "SUSE Linux Enterprise Micro 5.5:kernel-devel-rt-5.14.21-150500.13.100.1.noarch",
            "SUSE Linux Enterprise Micro 5.5:kernel-rt-5.14.21-150500.13.100.2.x86_64",
            "SUSE Linux Enterprise Micro 5.5:kernel-source-rt-5.14.21-150500.13.100.1.noarch"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2025-07-15T14:31:35Z",
          "details": "important"
        }
      ],
      "title": "CVE-2022-2585"
    },
    {
      "cve": "CVE-2022-2586",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2022-2586"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "It was discovered that a nft object or expression could reference a nft set on a different nft table, leading to a use-after-free once that table was deleted.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "SUSE Linux Enterprise Micro 5.5:kernel-devel-rt-5.14.21-150500.13.100.1.noarch",
          "SUSE Linux Enterprise Micro 5.5:kernel-rt-5.14.21-150500.13.100.2.x86_64",
          "SUSE Linux Enterprise Micro 5.5:kernel-source-rt-5.14.21-150500.13.100.1.noarch"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2022-2586",
          "url": "https://www.suse.com/security/cve/CVE-2022-2586"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1202095 for CVE-2022-2586",
          "url": "https://bugzilla.suse.com/1202095"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1209719 for CVE-2022-2586",
          "url": "https://bugzilla.suse.com/1209719"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "SUSE Linux Enterprise Micro 5.5:kernel-devel-rt-5.14.21-150500.13.100.1.noarch",
            "SUSE Linux Enterprise Micro 5.5:kernel-rt-5.14.21-150500.13.100.2.x86_64",
            "SUSE Linux Enterprise Micro 5.5:kernel-source-rt-5.14.21-150500.13.100.1.noarch"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 6.7,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H",
            "version": "3.1"
          },
          "products": [
            "SUSE Linux Enterprise Micro 5.5:kernel-devel-rt-5.14.21-150500.13.100.1.noarch",
            "SUSE Linux Enterprise Micro 5.5:kernel-rt-5.14.21-150500.13.100.2.x86_64",
            "SUSE Linux Enterprise Micro 5.5:kernel-source-rt-5.14.21-150500.13.100.1.noarch"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2025-07-15T14:31:35Z",
          "details": "moderate"
        }
      ],
      "title": "CVE-2022-2586"
    },
    {
      "cve": "CVE-2022-2905",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2022-2905"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "An out-of-bounds memory read flaw was found in the Linux kernel\u0027s BPF subsystem in how a user calls the bpf_tail_call function with a key larger than the max_entries of the map. This flaw allows a local user to gain unauthorized access to data.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "SUSE Linux Enterprise Micro 5.5:kernel-devel-rt-5.14.21-150500.13.100.1.noarch",
          "SUSE Linux Enterprise Micro 5.5:kernel-rt-5.14.21-150500.13.100.2.x86_64",
          "SUSE Linux Enterprise Micro 5.5:kernel-source-rt-5.14.21-150500.13.100.1.noarch"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2022-2905",
          "url": "https://www.suse.com/security/cve/CVE-2022-2905"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1202860 for CVE-2022-2905",
          "url": "https://bugzilla.suse.com/1202860"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "SUSE Linux Enterprise Micro 5.5:kernel-devel-rt-5.14.21-150500.13.100.1.noarch",
            "SUSE Linux Enterprise Micro 5.5:kernel-rt-5.14.21-150500.13.100.2.x86_64",
            "SUSE Linux Enterprise Micro 5.5:kernel-source-rt-5.14.21-150500.13.100.1.noarch"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 6.2,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N",
            "version": "3.1"
          },
          "products": [
            "SUSE Linux Enterprise Micro 5.5:kernel-devel-rt-5.14.21-150500.13.100.1.noarch",
            "SUSE Linux Enterprise Micro 5.5:kernel-rt-5.14.21-150500.13.100.2.x86_64",
            "SUSE Linux Enterprise Micro 5.5:kernel-source-rt-5.14.21-150500.13.100.1.noarch"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2025-07-15T14:31:35Z",
          "details": "moderate"
        }
      ],
      "title": "CVE-2022-2905"
    },
    {
      "cve": "CVE-2022-3903",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2022-3903"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "An incorrect read request flaw was found in the Infrared Transceiver USB driver in the Linux kernel. This issue occurs when a user attaches a malicious USB device. A local user could use this flaw to starve the resources, causing denial of service or potentially crashing the system.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "SUSE Linux Enterprise Micro 5.5:kernel-devel-rt-5.14.21-150500.13.100.1.noarch",
          "SUSE Linux Enterprise Micro 5.5:kernel-rt-5.14.21-150500.13.100.2.x86_64",
          "SUSE Linux Enterprise Micro 5.5:kernel-source-rt-5.14.21-150500.13.100.1.noarch"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2022-3903",
          "url": "https://www.suse.com/security/cve/CVE-2022-3903"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1205220 for CVE-2022-3903",
          "url": "https://bugzilla.suse.com/1205220"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1212297 for CVE-2022-3903",
          "url": "https://bugzilla.suse.com/1212297"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "SUSE Linux Enterprise Micro 5.5:kernel-devel-rt-5.14.21-150500.13.100.1.noarch",
            "SUSE Linux Enterprise Micro 5.5:kernel-rt-5.14.21-150500.13.100.2.x86_64",
            "SUSE Linux Enterprise Micro 5.5:kernel-source-rt-5.14.21-150500.13.100.1.noarch"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 5.5,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
            "version": "3.1"
          },
          "products": [
            "SUSE Linux Enterprise Micro 5.5:kernel-devel-rt-5.14.21-150500.13.100.1.noarch",
            "SUSE Linux Enterprise Micro 5.5:kernel-rt-5.14.21-150500.13.100.2.x86_64",
            "SUSE Linux Enterprise Micro 5.5:kernel-source-rt-5.14.21-150500.13.100.1.noarch"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2025-07-15T14:31:35Z",
          "details": "moderate"
        }
      ],
      "title": "CVE-2022-3903"
    },
    {
      "cve": "CVE-2022-4095",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2022-4095"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "A use-after-free flaw was found in Linux kernel before 5.19.2. This issue occurs in cmd_hdl_filter in drivers/staging/rtl8712/rtl8712_cmd.c, allowing an attacker to launch a local denial of service attack and gain escalation of privileges.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "SUSE Linux Enterprise Micro 5.5:kernel-devel-rt-5.14.21-150500.13.100.1.noarch",
          "SUSE Linux Enterprise Micro 5.5:kernel-rt-5.14.21-150500.13.100.2.x86_64",
          "SUSE Linux Enterprise Micro 5.5:kernel-source-rt-5.14.21-150500.13.100.1.noarch"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2022-4095",
          "url": "https://www.suse.com/security/cve/CVE-2022-4095"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1205514 for CVE-2022-4095",
          "url": "https://bugzilla.suse.com/1205514"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1205594 for CVE-2022-4095",
          "url": "https://bugzilla.suse.com/1205594"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1208030 for CVE-2022-4095",
          "url": "https://bugzilla.suse.com/1208030"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1208085 for CVE-2022-4095",
          "url": "https://bugzilla.suse.com/1208085"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1212319 for CVE-2022-4095",
          "url": "https://bugzilla.suse.com/1212319"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "SUSE Linux Enterprise Micro 5.5:kernel-devel-rt-5.14.21-150500.13.100.1.noarch",
            "SUSE Linux Enterprise Micro 5.5:kernel-rt-5.14.21-150500.13.100.2.x86_64",
            "SUSE Linux Enterprise Micro 5.5:kernel-source-rt-5.14.21-150500.13.100.1.noarch"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 7.8,
            "baseSeverity": "HIGH",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
            "version": "3.1"
          },
          "products": [
            "SUSE Linux Enterprise Micro 5.5:kernel-devel-rt-5.14.21-150500.13.100.1.noarch",
            "SUSE Linux Enterprise Micro 5.5:kernel-rt-5.14.21-150500.13.100.2.x86_64",
            "SUSE Linux Enterprise Micro 5.5:kernel-source-rt-5.14.21-150500.13.100.1.noarch"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2025-07-15T14:31:35Z",
          "details": "important"
        }
      ],
      "title": "CVE-2022-4095"
    },
    {
      "cve": "CVE-2022-4662",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2022-4662"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "A flaw incorrect access control in the Linux kernel USB core subsystem was found in the way user attaches usb device. A local user could use this flaw to crash the system.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "SUSE Linux Enterprise Micro 5.5:kernel-devel-rt-5.14.21-150500.13.100.1.noarch",
          "SUSE Linux Enterprise Micro 5.5:kernel-rt-5.14.21-150500.13.100.2.x86_64",
          "SUSE Linux Enterprise Micro 5.5:kernel-source-rt-5.14.21-150500.13.100.1.noarch"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2022-4662",
          "url": "https://www.suse.com/security/cve/CVE-2022-4662"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1206664 for CVE-2022-4662",
          "url": "https://bugzilla.suse.com/1206664"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "SUSE Linux Enterprise Micro 5.5:kernel-devel-rt-5.14.21-150500.13.100.1.noarch",
            "SUSE Linux Enterprise Micro 5.5:kernel-rt-5.14.21-150500.13.100.2.x86_64",
            "SUSE Linux Enterprise Micro 5.5:kernel-source-rt-5.14.21-150500.13.100.1.noarch"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 4.7,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H",
            "version": "3.1"
          },
          "products": [
            "SUSE Linux Enterprise Micro 5.5:kernel-devel-rt-5.14.21-150500.13.100.1.noarch",
            "SUSE Linux Enterprise Micro 5.5:kernel-rt-5.14.21-150500.13.100.2.x86_64",
            "SUSE Linux Enterprise Micro 5.5:kernel-source-rt-5.14.21-150500.13.100.1.noarch"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2025-07-15T14:31:35Z",
          "details": "moderate"
        }
      ],
      "title": "CVE-2022-4662"
    },
    {
      "cve": "CVE-2022-49934",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2022-49934"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "In the Linux kernel, the following vulnerability has been resolved:\n\nwifi: mac80211: Fix UAF in ieee80211_scan_rx()\n\nieee80211_scan_rx() tries to access scan_req-\u003eflags after a\nnull check, but a UAF is observed when the scan is completed\nand __ieee80211_scan_completed() executes, which then calls\ncfg80211_scan_done() leading to the freeing of scan_req.\n\nSince scan_req is rcu_dereference()\u0027d, prevent the racing in\n__ieee80211_scan_completed() by ensuring that from mac80211\u0027s\nPOV it is no longer accessed from an RCU read critical section\nbefore we call cfg80211_scan_done().",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "SUSE Linux Enterprise Micro 5.5:kernel-devel-rt-5.14.21-150500.13.100.1.noarch",
          "SUSE Linux Enterprise Micro 5.5:kernel-rt-5.14.21-150500.13.100.2.x86_64",
          "SUSE Linux Enterprise Micro 5.5:kernel-source-rt-5.14.21-150500.13.100.1.noarch"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2022-49934",
          "url": "https://www.suse.com/security/cve/CVE-2022-49934"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1245051 for CVE-2022-49934",
          "url": "https://bugzilla.suse.com/1245051"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "SUSE Linux Enterprise Micro 5.5:kernel-devel-rt-5.14.21-150500.13.100.1.noarch",
            "SUSE Linux Enterprise Micro 5.5:kernel-rt-5.14.21-150500.13.100.2.x86_64",
            "SUSE Linux Enterprise Micro 5.5:kernel-source-rt-5.14.21-150500.13.100.1.noarch"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 4.7,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H",
            "version": "3.1"
          },
          "products": [
            "SUSE Linux Enterprise Micro 5.5:kernel-devel-rt-5.14.21-150500.13.100.1.noarch",
            "SUSE Linux Enterprise Micro 5.5:kernel-rt-5.14.21-150500.13.100.2.x86_64",
            "SUSE Linux Enterprise Micro 5.5:kernel-source-rt-5.14.21-150500.13.100.1.noarch"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2025-07-15T14:31:35Z",
          "details": "moderate"
        }
      ],
      "title": "CVE-2022-49934"
    },
    {
      "cve": "CVE-2022-49935",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2022-49935"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "In the Linux kernel, the following vulnerability has been resolved:\n\ndma-buf/dma-resv: check if the new fence is really later\n\nPreviously when we added a fence to a dma_resv object we always\nassumed the the newer than all the existing fences.\n\nWith Jason\u0027s work to add an UAPI to explicit export/import that\u0027s not\nnecessary the case any more. So without this check we would allow\nuserspace to force the kernel into an use after free error.\n\nSince the change is very small and defensive it\u0027s probably a good\nidea to backport this to stable kernels as well just in case others\nare using the dma_resv object in the same way.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "SUSE Linux Enterprise Micro 5.5:kernel-devel-rt-5.14.21-150500.13.100.1.noarch",
          "SUSE Linux Enterprise Micro 5.5:kernel-rt-5.14.21-150500.13.100.2.x86_64",
          "SUSE Linux Enterprise Micro 5.5:kernel-source-rt-5.14.21-150500.13.100.1.noarch"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2022-49935",
          "url": "https://www.suse.com/security/cve/CVE-2022-49935"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1245052 for CVE-2022-49935",
          "url": "https://bugzilla.suse.com/1245052"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "SUSE Linux Enterprise Micro 5.5:kernel-devel-rt-5.14.21-150500.13.100.1.noarch",
            "SUSE Linux Enterprise Micro 5.5:kernel-rt-5.14.21-150500.13.100.2.x86_64",
            "SUSE Linux Enterprise Micro 5.5:kernel-source-rt-5.14.21-150500.13.100.1.noarch"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 5.5,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
            "version": "3.1"
          },
          "products": [
            "SUSE Linux Enterprise Micro 5.5:kernel-devel-rt-5.14.21-150500.13.100.1.noarch",
            "SUSE Linux Enterprise Micro 5.5:kernel-rt-5.14.21-150500.13.100.2.x86_64",
            "SUSE Linux Enterprise Micro 5.5:kernel-source-rt-5.14.21-150500.13.100.1.noarch"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2025-07-15T14:31:35Z",
          "details": "moderate"
        }
      ],
      "title": "CVE-2022-49935"
    },
    {
      "cve": "CVE-2022-49936",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2022-49936"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "In the Linux kernel, the following vulnerability has been resolved:\n\nUSB: core: Prevent nested device-reset calls\n\nAutomatic kernel fuzzing revealed a recursive locking violation in\nusb-storage:\n\n============================================\nWARNING: possible recursive locking detected\n5.18.0 #3 Not tainted\n--------------------------------------------\nkworker/1:3/1205 is trying to acquire lock:\nffff888018638db8 (\u0026us_interface_key[i]){+.+.}-{3:3}, at:\nusb_stor_pre_reset+0x35/0x40 drivers/usb/storage/usb.c:230\n\nbut task is already holding lock:\nffff888018638db8 (\u0026us_interface_key[i]){+.+.}-{3:3}, at:\nusb_stor_pre_reset+0x35/0x40 drivers/usb/storage/usb.c:230\n\n...\n\nstack backtrace:\nCPU: 1 PID: 1205 Comm: kworker/1:3 Not tainted 5.18.0 #3\nHardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS\n1.13.0-1ubuntu1.1 04/01/2014\nWorkqueue: usb_hub_wq hub_event\nCall Trace:\n\u003cTASK\u003e\n__dump_stack lib/dump_stack.c:88 [inline]\ndump_stack_lvl+0xcd/0x134 lib/dump_stack.c:106\nprint_deadlock_bug kernel/locking/lockdep.c:2988 [inline]\ncheck_deadlock kernel/locking/lockdep.c:3031 [inline]\nvalidate_chain kernel/locking/lockdep.c:3816 [inline]\n__lock_acquire.cold+0x152/0x3ca kernel/locking/lockdep.c:5053\nlock_acquire kernel/locking/lockdep.c:5665 [inline]\nlock_acquire+0x1ab/0x520 kernel/locking/lockdep.c:5630\n__mutex_lock_common kernel/locking/mutex.c:603 [inline]\n__mutex_lock+0x14f/0x1610 kernel/locking/mutex.c:747\nusb_stor_pre_reset+0x35/0x40 drivers/usb/storage/usb.c:230\nusb_reset_device+0x37d/0x9a0 drivers/usb/core/hub.c:6109\nr871xu_dev_remove+0x21a/0x270 drivers/staging/rtl8712/usb_intf.c:622\nusb_unbind_interface+0x1bd/0x890 drivers/usb/core/driver.c:458\ndevice_remove drivers/base/dd.c:545 [inline]\ndevice_remove+0x11f/0x170 drivers/base/dd.c:537\n__device_release_driver drivers/base/dd.c:1222 [inline]\ndevice_release_driver_internal+0x1a7/0x2f0 drivers/base/dd.c:1248\nusb_driver_release_interface+0x102/0x180 drivers/usb/core/driver.c:627\nusb_forced_unbind_intf+0x4d/0xa0 drivers/usb/core/driver.c:1118\nusb_reset_device+0x39b/0x9a0 drivers/usb/core/hub.c:6114\n\nThis turned out not to be an error in usb-storage but rather a nested\ndevice reset attempt.  That is, as the rtl8712 driver was being\nunbound from a composite device in preparation for an unrelated USB\nreset (that driver does not have pre_reset or post_reset callbacks),\nits -\u003eremove routine called usb_reset_device() -- thus nesting one\nreset call within another.\n\nPerforming a reset as part of disconnect processing is a questionable\npractice at best.  However, the bug report points out that the USB\ncore does not have any protection against nested resets.  Adding a\nreset_in_progress flag and testing it will prevent such errors in the\nfuture.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "SUSE Linux Enterprise Micro 5.5:kernel-devel-rt-5.14.21-150500.13.100.1.noarch",
          "SUSE Linux Enterprise Micro 5.5:kernel-rt-5.14.21-150500.13.100.2.x86_64",
          "SUSE Linux Enterprise Micro 5.5:kernel-source-rt-5.14.21-150500.13.100.1.noarch"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2022-49936",
          "url": "https://www.suse.com/security/cve/CVE-2022-49936"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1244984 for CVE-2022-49936",
          "url": "https://bugzilla.suse.com/1244984"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "SUSE Linux Enterprise Micro 5.5:kernel-devel-rt-5.14.21-150500.13.100.1.noarch",
            "SUSE Linux Enterprise Micro 5.5:kernel-rt-5.14.21-150500.13.100.2.x86_64",
            "SUSE Linux Enterprise Micro 5.5:kernel-source-rt-5.14.21-150500.13.100.1.noarch"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 5.5,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
            "version": "3.1"
          },
          "products": [
            "SUSE Linux Enterprise Micro 5.5:kernel-devel-rt-5.14.21-150500.13.100.1.noarch",
            "SUSE Linux Enterprise Micro 5.5:kernel-rt-5.14.21-150500.13.100.2.x86_64",
            "SUSE Linux Enterprise Micro 5.5:kernel-source-rt-5.14.21-150500.13.100.1.noarch"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2025-07-15T14:31:35Z",
          "details": "moderate"
        }
      ],
      "title": "CVE-2022-49936"
    },
    {
      "cve": "CVE-2022-49937",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2022-49937"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "In the Linux kernel, the following vulnerability has been resolved:\n\nmedia: mceusb: Use new usb_control_msg_*() routines\n\nAutomatic kernel fuzzing led to a WARN about invalid pipe direction in\nthe mceusb driver:\n\n------------[ cut here ]------------\nusb 6-1: BOGUS control dir, pipe 80000380 doesn\u0027t match bRequestType 40\nWARNING: CPU: 0 PID: 2465 at drivers/usb/core/urb.c:410\nusb_submit_urb+0x1326/0x1820 drivers/usb/core/urb.c:410\nModules linked in:\nCPU: 0 PID: 2465 Comm: kworker/0:2 Not tainted 5.19.0-rc4-00208-g69cb6c6556ad #1\nHardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS\n1.13.0-1ubuntu1.1 04/01/2014\nWorkqueue: usb_hub_wq hub_event\nRIP: 0010:usb_submit_urb+0x1326/0x1820 drivers/usb/core/urb.c:410\nCode: 7c 24 40 e8 ac 23 91 fd 48 8b 7c 24 40 e8 b2 70 1b ff 45 89 e8\n44 89 f1 4c 89 e2 48 89 c6 48 c7 c7 a0 30 a9 86 e8 48 07 11 02 \u003c0f\u003e 0b\ne9 1c f0 ff ff e8 7e 23 91 fd 0f b6 1d 63 22 83 05 31 ff 41\nRSP: 0018:ffffc900032becf0 EFLAGS: 00010282\nRAX: 0000000000000000 RBX: ffff8881100f3058 RCX: 0000000000000000\nRDX: ffffc90004961000 RSI: ffff888114c6d580 RDI: fffff52000657d90\nRBP: ffff888105ad90f0 R08: ffffffff812c3638 R09: 0000000000000000\nR10: 0000000000000005 R11: ffffed1023504ef1 R12: ffff888105ad9000\nR13: 0000000000000040 R14: 0000000080000380 R15: ffff88810ba96500\nFS: 0000000000000000(0000) GS:ffff88811a800000(0000) knlGS:0000000000000000\nCS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033\nCR2: 00007ffe810bda58 CR3: 000000010b720000 CR4: 0000000000350ef0\nCall Trace:\n\u003cTASK\u003e\nusb_start_wait_urb+0x101/0x4c0 drivers/usb/core/message.c:58\nusb_internal_control_msg drivers/usb/core/message.c:102 [inline]\nusb_control_msg+0x31c/0x4a0 drivers/usb/core/message.c:153\nmceusb_gen1_init drivers/media/rc/mceusb.c:1431 [inline]\nmceusb_dev_probe+0x258e/0x33f0 drivers/media/rc/mceusb.c:1807\n\nThe reason for the warning is clear enough; the driver sends an\nunusual read request on endpoint 0 but does not set the USB_DIR_IN bit\nin the bRequestType field.\n\nMore importantly, the whole situation can be avoided and the driver\nsimplified by converting it over to the relatively new\nusb_control_msg_recv() and usb_control_msg_send() routines.  That\u0027s\nwhat this fix does.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "SUSE Linux Enterprise Micro 5.5:kernel-devel-rt-5.14.21-150500.13.100.1.noarch",
          "SUSE Linux Enterprise Micro 5.5:kernel-rt-5.14.21-150500.13.100.2.x86_64",
          "SUSE Linux Enterprise Micro 5.5:kernel-source-rt-5.14.21-150500.13.100.1.noarch"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2022-49937",
          "url": "https://www.suse.com/security/cve/CVE-2022-49937"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1245057 for CVE-2022-49937",
          "url": "https://bugzilla.suse.com/1245057"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "SUSE Linux Enterprise Micro 5.5:kernel-devel-rt-5.14.21-150500.13.100.1.noarch",
            "SUSE Linux Enterprise Micro 5.5:kernel-rt-5.14.21-150500.13.100.2.x86_64",
            "SUSE Linux Enterprise Micro 5.5:kernel-source-rt-5.14.21-150500.13.100.1.noarch"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 4,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L",
            "version": "3.1"
          },
          "products": [
            "SUSE Linux Enterprise Micro 5.5:kernel-devel-rt-5.14.21-150500.13.100.1.noarch",
            "SUSE Linux Enterprise Micro 5.5:kernel-rt-5.14.21-150500.13.100.2.x86_64",
            "SUSE Linux Enterprise Micro 5.5:kernel-source-rt-5.14.21-150500.13.100.1.noarch"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2025-07-15T14:31:35Z",
          "details": "moderate"
        }
      ],
      "title": "CVE-2022-49937"
    },
    {
      "cve": "CVE-2022-49938",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2022-49938"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "In the Linux kernel, the following vulnerability has been resolved:\n\ncifs: fix small mempool leak in SMB2_negotiate()\n\nIn some cases of failure (dialect mismatches) in SMB2_negotiate(), after\nthe request is sent, the checks would return -EIO when they should be\nrather setting rc = -EIO and jumping to neg_exit to free the response\nbuffer from mempool.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "SUSE Linux Enterprise Micro 5.5:kernel-devel-rt-5.14.21-150500.13.100.1.noarch",
          "SUSE Linux Enterprise Micro 5.5:kernel-rt-5.14.21-150500.13.100.2.x86_64",
          "SUSE Linux Enterprise Micro 5.5:kernel-source-rt-5.14.21-150500.13.100.1.noarch"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2022-49938",
          "url": "https://www.suse.com/security/cve/CVE-2022-49938"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1244820 for CVE-2022-49938",
          "url": "https://bugzilla.suse.com/1244820"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "SUSE Linux Enterprise Micro 5.5:kernel-devel-rt-5.14.21-150500.13.100.1.noarch",
            "SUSE Linux Enterprise Micro 5.5:kernel-rt-5.14.21-150500.13.100.2.x86_64",
            "SUSE Linux Enterprise Micro 5.5:kernel-source-rt-5.14.21-150500.13.100.1.noarch"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 3.3,
            "baseSeverity": "LOW",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L",
            "version": "3.1"
          },
          "products": [
            "SUSE Linux Enterprise Micro 5.5:kernel-devel-rt-5.14.21-150500.13.100.1.noarch",
            "SUSE Linux Enterprise Micro 5.5:kernel-rt-5.14.21-150500.13.100.2.x86_64",
            "SUSE Linux Enterprise Micro 5.5:kernel-source-rt-5.14.21-150500.13.100.1.noarch"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2025-07-15T14:31:35Z",
          "details": "low"
        }
      ],
      "title": "CVE-2022-49938"
    },
    {
      "cve": "CVE-2022-49940",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2022-49940"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "In the Linux kernel, the following vulnerability has been resolved:\n\ntty: n_gsm: add sanity check for gsm-\u003ereceive in gsm_receive_buf()\n\nA null pointer dereference can happen when attempting to access the\n\"gsm-\u003ereceive()\" function in gsmld_receive_buf(). Currently, the code\nassumes that gsm-\u003erecieve is only called after MUX activation.\nSince the gsmld_receive_buf() function can be accessed without the need to\ninitialize the MUX, the gsm-\u003ereceive() function will not be set and a\nNULL pointer dereference will occur.\n\nFix this by avoiding the call to \"gsm-\u003ereceive()\" in case the function is\nnot initialized by adding a sanity check.\n\nCall Trace:\n \u003cTASK\u003e\n gsmld_receive_buf+0x1c2/0x2f0 drivers/tty/n_gsm.c:2861\n tiocsti drivers/tty/tty_io.c:2293 [inline]\n tty_ioctl+0xa75/0x15d0 drivers/tty/tty_io.c:2692\n vfs_ioctl fs/ioctl.c:51 [inline]\n __do_sys_ioctl fs/ioctl.c:870 [inline]\n __se_sys_ioctl fs/ioctl.c:856 [inline]\n __x64_sys_ioctl+0x193/0x200 fs/ioctl.c:856\n do_syscall_x64 arch/x86/entry/common.c:50 [inline]\n do_syscall_64+0x35/0xb0 arch/x86/entry/common.c:80\n entry_SYSCALL_64_after_hwframe+0x63/0xcd",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "SUSE Linux Enterprise Micro 5.5:kernel-devel-rt-5.14.21-150500.13.100.1.noarch",
          "SUSE Linux Enterprise Micro 5.5:kernel-rt-5.14.21-150500.13.100.2.x86_64",
          "SUSE Linux Enterprise Micro 5.5:kernel-source-rt-5.14.21-150500.13.100.1.noarch"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2022-49940",
          "url": "https://www.suse.com/security/cve/CVE-2022-49940"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1244866 for CVE-2022-49940",
          "url": "https://bugzilla.suse.com/1244866"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "SUSE Linux Enterprise Micro 5.5:kernel-devel-rt-5.14.21-150500.13.100.1.noarch",
            "SUSE Linux Enterprise Micro 5.5:kernel-rt-5.14.21-150500.13.100.2.x86_64",
            "SUSE Linux Enterprise Micro 5.5:kernel-source-rt-5.14.21-150500.13.100.1.noarch"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 5.5,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
            "version": "3.1"
          },
          "products": [
            "SUSE Linux Enterprise Micro 5.5:kernel-devel-rt-5.14.21-150500.13.100.1.noarch",
            "SUSE Linux Enterprise Micro 5.5:kernel-rt-5.14.21-150500.13.100.2.x86_64",
            "SUSE Linux Enterprise Micro 5.5:kernel-source-rt-5.14.21-150500.13.100.1.noarch"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2025-07-15T14:31:35Z",
          "details": "moderate"
        }
      ],
      "title": "CVE-2022-49940"
    },
    {
      "cve": "CVE-2022-49942",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2022-49942"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "In the Linux kernel, the following vulnerability has been resolved:\n\nwifi: mac80211: Don\u0027t finalize CSA in IBSS mode if state is disconnected\n\nWhen we are not connected to a channel, sending channel \"switch\"\nannouncement doesn\u0027t make any sense.\n\nThe BSS list is empty in that case. This causes the for loop in\ncfg80211_get_bss() to be bypassed, so the function returns NULL\n(check line 1424 of net/wireless/scan.c), causing the WARN_ON()\nin ieee80211_ibss_csa_beacon() to get triggered (check line 500\nof net/mac80211/ibss.c), which was consequently reported on the\nsyzkaller dashboard.\n\nThus, check if we have an existing connection before generating\nthe CSA beacon in ieee80211_ibss_finish_csa().",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "SUSE Linux Enterprise Micro 5.5:kernel-devel-rt-5.14.21-150500.13.100.1.noarch",
          "SUSE Linux Enterprise Micro 5.5:kernel-rt-5.14.21-150500.13.100.2.x86_64",
          "SUSE Linux Enterprise Micro 5.5:kernel-source-rt-5.14.21-150500.13.100.1.noarch"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2022-49942",
          "url": "https://www.suse.com/security/cve/CVE-2022-49942"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1244881 for CVE-2022-49942",
          "url": "https://bugzilla.suse.com/1244881"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "SUSE Linux Enterprise Micro 5.5:kernel-devel-rt-5.14.21-150500.13.100.1.noarch",
            "SUSE Linux Enterprise Micro 5.5:kernel-rt-5.14.21-150500.13.100.2.x86_64",
            "SUSE Linux Enterprise Micro 5.5:kernel-source-rt-5.14.21-150500.13.100.1.noarch"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 5.5,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
            "version": "3.1"
          },
          "products": [
            "SUSE Linux Enterprise Micro 5.5:kernel-devel-rt-5.14.21-150500.13.100.1.noarch",
            "SUSE Linux Enterprise Micro 5.5:kernel-rt-5.14.21-150500.13.100.2.x86_64",
            "SUSE Linux Enterprise Micro 5.5:kernel-source-rt-5.14.21-150500.13.100.1.noarch"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2025-07-15T14:31:35Z",
          "details": "moderate"
        }
      ],
      "title": "CVE-2022-49942"
    },
    {
      "cve": "CVE-2022-49943",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2022-49943"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "In the Linux kernel, the following vulnerability has been resolved:\n\nUSB: gadget: Fix obscure lockdep violation for udc_mutex\n\nA recent commit expanding the scope of the udc_lock mutex in the\ngadget core managed to cause an obscure and slightly bizarre lockdep\nviolation.  In abbreviated form:\n\n======================================================\nWARNING: possible circular locking dependency detected\n5.19.0-rc7+ #12510 Not tainted\n------------------------------------------------------\nudevadm/312 is trying to acquire lock:\nffff80000aae1058 (udc_lock){+.+.}-{3:3}, at: usb_udc_uevent+0x54/0xe0\n\nbut task is already holding lock:\nffff000002277548 (kn-\u003eactive#4){++++}-{0:0}, at: kernfs_seq_start+0x34/0xe0\n\nwhich lock already depends on the new lock.\n\nthe existing dependency chain (in reverse order) is:\n\n-\u003e #3 (kn-\u003eactive#4){++++}-{0:0}:\n              lock_acquire+0x68/0x84\n              __kernfs_remove+0x268/0x380\n              kernfs_remove_by_name_ns+0x58/0xac\n              sysfs_remove_file_ns+0x18/0x24\n              device_del+0x15c/0x440\n\n-\u003e #2 (device_links_lock){+.+.}-{3:3}:\n              lock_acquire+0x68/0x84\n              __mutex_lock+0x9c/0x430\n              mutex_lock_nested+0x38/0x64\n              device_link_remove+0x3c/0xa0\n              _regulator_put.part.0+0x168/0x190\n              regulator_put+0x3c/0x54\n              devm_regulator_release+0x14/0x20\n\n-\u003e #1 (regulator_list_mutex){+.+.}-{3:3}:\n              lock_acquire+0x68/0x84\n              __mutex_lock+0x9c/0x430\n              mutex_lock_nested+0x38/0x64\n              regulator_lock_dependent+0x54/0x284\n              regulator_enable+0x34/0x80\n              phy_power_on+0x24/0x130\n              __dwc2_lowlevel_hw_enable+0x100/0x130\n              dwc2_lowlevel_hw_enable+0x18/0x40\n              dwc2_hsotg_udc_start+0x6c/0x2f0\n              gadget_bind_driver+0x124/0x1f4\n\n-\u003e #0 (udc_lock){+.+.}-{3:3}:\n              __lock_acquire+0x1298/0x20cc\n              lock_acquire.part.0+0xe0/0x230\n              lock_acquire+0x68/0x84\n              __mutex_lock+0x9c/0x430\n              mutex_lock_nested+0x38/0x64\n              usb_udc_uevent+0x54/0xe0\n\nEvidently this was caused by the scope of udc_mutex being too large.\nThe mutex is only meant to protect udc-\u003edriver along with a few other\nthings.  As far as I can tell, there\u0027s no reason for the mutex to be\nheld while the gadget core calls a gadget driver\u0027s -\u003ebind or -\u003eunbind\nroutine, or while a UDC is being started or stopped.  (This accounts\nfor link #1 in the chain above, where the mutex is held while the\ndwc2_hsotg_udc is started as part of driver probing.)\n\nGadget drivers\u0027 -\u003edisconnect callbacks are problematic.  Even though\nusb_gadget_disconnect() will now acquire the udc_mutex, there\u0027s a\nwindow in usb_gadget_bind_driver() between the times when the mutex is\nreleased and the -\u003ebind callback is invoked.  If a disconnect occurred\nduring that window, we could call the driver\u0027s -\u003edisconnect routine\nbefore its -\u003ebind routine.  To prevent this from happening, it will be\nnecessary to prevent a UDC from connecting while it has no gadget\ndriver.  This should be done already but it doesn\u0027t seem to be;\ncurrently usb_gadget_connect() has no check for this.  Such a check\nwill have to be added later.\n\nSome degree of mutual exclusion is required in soft_connect_store(),\nwhich can dereference udc-\u003edriver at arbitrary times since it is a\nsysfs callback.  The solution here is to acquire the gadget\u0027s device\nlock rather than the udc_mutex.  Since the driver core guarantees that\nthe device lock is always held during driver binding and unbinding,\nthis will make the accesses in soft_connect_store() mutually exclusive\nwith any changes to udc-\u003edriver.\n\nLastly, it turns out there is one place which should hold the\nudc_mutex but currently does not: The function_show() routine needs\nprotection while it dereferences udc-\u003edriver.  The missing lock and\nunlock calls are added.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "SUSE Linux Enterprise Micro 5.5:kernel-devel-rt-5.14.21-150500.13.100.1.noarch",
          "SUSE Linux Enterprise Micro 5.5:kernel-rt-5.14.21-150500.13.100.2.x86_64",
          "SUSE Linux Enterprise Micro 5.5:kernel-source-rt-5.14.21-150500.13.100.1.noarch"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2022-49943",
          "url": "https://www.suse.com/security/cve/CVE-2022-49943"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1244904 for CVE-2022-49943",
          "url": "https://bugzilla.suse.com/1244904"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "SUSE Linux Enterprise Micro 5.5:kernel-devel-rt-5.14.21-150500.13.100.1.noarch",
            "SUSE Linux Enterprise Micro 5.5:kernel-rt-5.14.21-150500.13.100.2.x86_64",
            "SUSE Linux Enterprise Micro 5.5:kernel-source-rt-5.14.21-150500.13.100.1.noarch"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 5.8,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:L/I:L/A:H",
            "version": "3.1"
          },
          "products": [
            "SUSE Linux Enterprise Micro 5.5:kernel-devel-rt-5.14.21-150500.13.100.1.noarch",
            "SUSE Linux Enterprise Micro 5.5:kernel-rt-5.14.21-150500.13.100.2.x86_64",
            "SUSE Linux Enterprise Micro 5.5:kernel-source-rt-5.14.21-150500.13.100.1.noarch"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2025-07-15T14:31:35Z",
          "details": "moderate"
        }
      ],
      "title": "CVE-2022-49943"
    },
    {
      "cve": "CVE-2022-49944",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2022-49944"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "In the Linux kernel, the following vulnerability has been resolved:\n\nRevert \"usb: typec: ucsi: add a common function ucsi_unregister_connectors()\"\n\nThe recent commit 87d0e2f41b8c (\"usb: typec: ucsi: add a common\nfunction ucsi_unregister_connectors()\") introduced a regression that\ncaused NULL dereference at reading the power supply sysfs.  It\u0027s a\nstale sysfs entry that should have been removed but remains with NULL\nops.  The commit changed the error handling to skip the entries after\na NULL con-\u003ewq, and this leaves the power device unreleased.\n\nFor addressing the regression, the straight revert is applied here.\nFurther code improvements can be done from the scratch again.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "SUSE Linux Enterprise Micro 5.5:kernel-devel-rt-5.14.21-150500.13.100.1.noarch",
          "SUSE Linux Enterprise Micro 5.5:kernel-rt-5.14.21-150500.13.100.2.x86_64",
          "SUSE Linux Enterprise Micro 5.5:kernel-source-rt-5.14.21-150500.13.100.1.noarch"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2022-49944",
          "url": "https://www.suse.com/security/cve/CVE-2022-49944"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1244905 for CVE-2022-49944",
          "url": "https://bugzilla.suse.com/1244905"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "SUSE Linux Enterprise Micro 5.5:kernel-devel-rt-5.14.21-150500.13.100.1.noarch",
            "SUSE Linux Enterprise Micro 5.5:kernel-rt-5.14.21-150500.13.100.2.x86_64",
            "SUSE Linux Enterprise Micro 5.5:kernel-source-rt-5.14.21-150500.13.100.1.noarch"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 5.5,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
            "version": "3.1"
          },
          "products": [
            "SUSE Linux Enterprise Micro 5.5:kernel-devel-rt-5.14.21-150500.13.100.1.noarch",
            "SUSE Linux Enterprise Micro 5.5:kernel-rt-5.14.21-150500.13.100.2.x86_64",
            "SUSE Linux Enterprise Micro 5.5:kernel-source-rt-5.14.21-150500.13.100.1.noarch"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2025-07-15T14:31:35Z",
          "details": "moderate"
        }
      ],
      "title": "CVE-2022-49944"
    },
    {
      "cve": "CVE-2022-49945",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2022-49945"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "In the Linux kernel, the following vulnerability has been resolved:\n\nhwmon: (gpio-fan) Fix array out of bounds access\n\nThe driver does not check if the cooling state passed to\ngpio_fan_set_cur_state() exceeds the maximum cooling state as\nstored in fan_data-\u003enum_speeds. Since the cooling state is later\nused as an array index in set_fan_speed(), an array out of bounds\naccess can occur.\nThis can be exploited by setting the state of the thermal cooling device\nto arbitrary values, causing for example a kernel oops when unavailable\nmemory is accessed this way.\n\nExample kernel oops:\n[  807.987276] Unable to handle kernel paging request at virtual address ffffff80d0588064\n[  807.987369] Mem abort info:\n[  807.987398]   ESR = 0x96000005\n[  807.987428]   EC = 0x25: DABT (current EL), IL = 32 bits\n[  807.987477]   SET = 0, FnV = 0\n[  807.987507]   EA = 0, S1PTW = 0\n[  807.987536]   FSC = 0x05: level 1 translation fault\n[  807.987570] Data abort info:\n[  807.987763]   ISV = 0, ISS = 0x00000005\n[  807.987801]   CM = 0, WnR = 0\n[  807.987832] swapper pgtable: 4k pages, 39-bit VAs, pgdp=0000000001165000\n[  807.987872] [ffffff80d0588064] pgd=0000000000000000, p4d=0000000000000000, pud=0000000000000000\n[  807.987961] Internal error: Oops: 96000005 [#1] PREEMPT SMP\n[  807.987992] Modules linked in: cmac algif_hash aes_arm64 algif_skcipher af_alg bnep hci_uart btbcm bluetooth ecdh_generic ecc 8021q garp stp llc snd_soc_hdmi_codec brcmfmac vc4 brcmutil cec drm_kms_helper snd_soc_core cfg80211 snd_compress bcm2835_codec(C) snd_pcm_dmaengine syscopyarea bcm2835_isp(C) bcm2835_v4l2(C) sysfillrect v4l2_mem2mem bcm2835_mmal_vchiq(C) raspberrypi_hwmon sysimgblt videobuf2_dma_contig videobuf2_vmalloc fb_sys_fops videobuf2_memops rfkill videobuf2_v4l2 videobuf2_common i2c_bcm2835 snd_bcm2835(C) videodev snd_pcm snd_timer snd mc vc_sm_cma(C) gpio_fan uio_pdrv_genirq uio drm fuse drm_panel_orientation_quirks backlight ip_tables x_tables ipv6\n[  807.988508] CPU: 0 PID: 1321 Comm: bash Tainted: G         C        5.15.56-v8+ #1575\n[  807.988548] Hardware name: Raspberry Pi 3 Model B Rev 1.2 (DT)\n[  807.988574] pstate: 20000005 (nzCv daif -PAN -UAO -TCO -DIT -SSBS BTYPE=--)\n[  807.988608] pc : set_fan_speed.part.5+0x34/0x80 [gpio_fan]\n[  807.988654] lr : gpio_fan_set_cur_state+0x34/0x50 [gpio_fan]\n[  807.988691] sp : ffffffc008cf3bd0\n[  807.988710] x29: ffffffc008cf3bd0 x28: ffffff80019edac0 x27: 0000000000000000\n[  807.988762] x26: 0000000000000000 x25: 0000000000000000 x24: ffffff800747c920\n[  807.988787] x23: 000000000000000a x22: ffffff800369f000 x21: 000000001999997c\n[  807.988854] x20: ffffff800369f2e8 x19: ffffff8002ae8080 x18: 0000000000000000\n[  807.988877] x17: 0000000000000000 x16: 0000000000000000 x15: 000000559e271b70\n[  807.988938] x14: 0000000000000000 x13: 0000000000000000 x12: 0000000000000000\n[  807.988960] x11: 0000000000000000 x10: ffffffc008cf3c20 x9 : ffffffcfb60c741c\n[  807.989018] x8 : 000000000000000a x7 : 00000000ffffffc9 x6 : 0000000000000009\n[  807.989040] x5 : 000000000000002a x4 : 0000000000000000 x3 : ffffff800369f2e8\n[  807.989062] x2 : 000000000000e780 x1 : 0000000000000001 x0 : ffffff80d0588060\n[  807.989084] Call trace:\n[  807.989091]  set_fan_speed.part.5+0x34/0x80 [gpio_fan]\n[  807.989113]  gpio_fan_set_cur_state+0x34/0x50 [gpio_fan]\n[  807.989199]  cur_state_store+0x84/0xd0\n[  807.989221]  dev_attr_store+0x20/0x38\n[  807.989262]  sysfs_kf_write+0x4c/0x60\n[  807.989282]  kernfs_fop_write_iter+0x130/0x1c0\n[  807.989298]  new_sync_write+0x10c/0x190\n[  807.989315]  vfs_write+0x254/0x378\n[  807.989362]  ksys_write+0x70/0xf8\n[  807.989379]  __arm64_sys_write+0x24/0x30\n[  807.989424]  invoke_syscall+0x4c/0x110\n[  807.989442]  el0_svc_common.constprop.3+0xfc/0x120\n[  807.989458]  do_el0_svc+0x2c/0x90\n[  807.989473]  el0_svc+0x24/0x60\n[  807.989544]  el0t_64_sync_handler+0x90/0xb8\n[  807.989558]  el0t_64_sync+0x1a0/0x1a4\n[  807.989579] Code: b9403801 f9402800 7100003f 8b35cc00 (b9400416)\n[  807.989627] ---[ end t\n---truncated---",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "SUSE Linux Enterprise Micro 5.5:kernel-devel-rt-5.14.21-150500.13.100.1.noarch",
          "SUSE Linux Enterprise Micro 5.5:kernel-rt-5.14.21-150500.13.100.2.x86_64",
          "SUSE Linux Enterprise Micro 5.5:kernel-source-rt-5.14.21-150500.13.100.1.noarch"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2022-49945",
          "url": "https://www.suse.com/security/cve/CVE-2022-49945"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1244908 for CVE-2022-49945",
          "url": "https://bugzilla.suse.com/1244908"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "SUSE Linux Enterprise Micro 5.5:kernel-devel-rt-5.14.21-150500.13.100.1.noarch",
            "SUSE Linux Enterprise Micro 5.5:kernel-rt-5.14.21-150500.13.100.2.x86_64",
            "SUSE Linux Enterprise Micro 5.5:kernel-source-rt-5.14.21-150500.13.100.1.noarch"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 6.6,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:H",
            "version": "3.1"
          },
          "products": [
            "SUSE Linux Enterprise Micro 5.5:kernel-devel-rt-5.14.21-150500.13.100.1.noarch",
            "SUSE Linux Enterprise Micro 5.5:kernel-rt-5.14.21-150500.13.100.2.x86_64",
            "SUSE Linux Enterprise Micro 5.5:kernel-source-rt-5.14.21-150500.13.100.1.noarch"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2025-07-15T14:31:35Z",
          "details": "moderate"
        }
      ],
      "title": "CVE-2022-49945"
    },
    {
      "cve": "CVE-2022-49946",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2022-49946"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "In the Linux kernel, the following vulnerability has been resolved:\n\nclk: bcm: rpi: Prevent out-of-bounds access\n\nThe while loop in raspberrypi_discover_clocks() relies on the assumption\nthat the id of the last clock element is zero. Because this data comes\nfrom the Videocore firmware and it doesn\u0027t guarantuee such a behavior\nthis could lead to out-of-bounds access. So fix this by providing\na sentinel element.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "SUSE Linux Enterprise Micro 5.5:kernel-devel-rt-5.14.21-150500.13.100.1.noarch",
          "SUSE Linux Enterprise Micro 5.5:kernel-rt-5.14.21-150500.13.100.2.x86_64",
          "SUSE Linux Enterprise Micro 5.5:kernel-source-rt-5.14.21-150500.13.100.1.noarch"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2022-49946",
          "url": "https://www.suse.com/security/cve/CVE-2022-49946"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1244944 for CVE-2022-49946",
          "url": "https://bugzilla.suse.com/1244944"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "SUSE Linux Enterprise Micro 5.5:kernel-devel-rt-5.14.21-150500.13.100.1.noarch",
            "SUSE Linux Enterprise Micro 5.5:kernel-rt-5.14.21-150500.13.100.2.x86_64",
            "SUSE Linux Enterprise Micro 5.5:kernel-source-rt-5.14.21-150500.13.100.1.noarch"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 5.5,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
            "version": "3.1"
          },
          "products": [
            "SUSE Linux Enterprise Micro 5.5:kernel-devel-rt-5.14.21-150500.13.100.1.noarch",
            "SUSE Linux Enterprise Micro 5.5:kernel-rt-5.14.21-150500.13.100.2.x86_64",
            "SUSE Linux Enterprise Micro 5.5:kernel-source-rt-5.14.21-150500.13.100.1.noarch"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2025-07-15T14:31:35Z",
          "details": "moderate"
        }
      ],
      "title": "CVE-2022-49946"
    },
    {
      "cve": "CVE-2022-49948",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2022-49948"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "In the Linux kernel, the following vulnerability has been resolved:\n\nvt: Clear selection before changing the font\n\nWhen changing the console font with ioctl(KDFONTOP) the new font size\ncan be bigger than the previous font. A previous selection may thus now\nbe outside of the new screen size and thus trigger out-of-bounds\naccesses to graphics memory if the selection is removed in\nvc_do_resize().\n\nPrevent such out-of-memory accesses by dropping the selection before the\nvarious con_font_set() console handlers are called.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "SUSE Linux Enterprise Micro 5.5:kernel-devel-rt-5.14.21-150500.13.100.1.noarch",
          "SUSE Linux Enterprise Micro 5.5:kernel-rt-5.14.21-150500.13.100.2.x86_64",
          "SUSE Linux Enterprise Micro 5.5:kernel-source-rt-5.14.21-150500.13.100.1.noarch"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2022-49948",
          "url": "https://www.suse.com/security/cve/CVE-2022-49948"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1245058 for CVE-2022-49948",
          "url": "https://bugzilla.suse.com/1245058"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "SUSE Linux Enterprise Micro 5.5:kernel-devel-rt-5.14.21-150500.13.100.1.noarch",
            "SUSE Linux Enterprise Micro 5.5:kernel-rt-5.14.21-150500.13.100.2.x86_64",
            "SUSE Linux Enterprise Micro 5.5:kernel-source-rt-5.14.21-150500.13.100.1.noarch"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 5.5,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
            "version": "3.1"
          },
          "products": [
            "SUSE Linux Enterprise Micro 5.5:kernel-devel-rt-5.14.21-150500.13.100.1.noarch",
            "SUSE Linux Enterprise Micro 5.5:kernel-rt-5.14.21-150500.13.100.2.x86_64",
            "SUSE Linux Enterprise Micro 5.5:kernel-source-rt-5.14.21-150500.13.100.1.noarch"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2025-07-15T14:31:35Z",
          "details": "moderate"
        }
      ],
      "title": "CVE-2022-49948"
    },
    {
      "cve": "CVE-2022-49949",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2022-49949"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "In the Linux kernel, the following vulnerability has been resolved:\n\nfirmware_loader: Fix memory leak in firmware upload\n\nIn the case of firmware-upload, an instance of struct fw_upload is\nallocated in firmware_upload_register(). This data needs to be freed\nin fw_dev_release(). Create a new fw_upload_free() function in\nsysfs_upload.c to handle the firmware-upload specific memory frees\nand incorporate the missing kfree call for the fw_upload structure.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "SUSE Linux Enterprise Micro 5.5:kernel-devel-rt-5.14.21-150500.13.100.1.noarch",
          "SUSE Linux Enterprise Micro 5.5:kernel-rt-5.14.21-150500.13.100.2.x86_64",
          "SUSE Linux Enterprise Micro 5.5:kernel-source-rt-5.14.21-150500.13.100.1.noarch"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2022-49949",
          "url": "https://www.suse.com/security/cve/CVE-2022-49949"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1244928 for CVE-2022-49949",
          "url": "https://bugzilla.suse.com/1244928"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "SUSE Linux Enterprise Micro 5.5:kernel-devel-rt-5.14.21-150500.13.100.1.noarch",
            "SUSE Linux Enterprise Micro 5.5:kernel-rt-5.14.21-150500.13.100.2.x86_64",
            "SUSE Linux Enterprise Micro 5.5:kernel-source-rt-5.14.21-150500.13.100.1.noarch"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 5.5,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
            "version": "3.1"
          },
          "products": [
            "SUSE Linux Enterprise Micro 5.5:kernel-devel-rt-5.14.21-150500.13.100.1.noarch",
            "SUSE Linux Enterprise Micro 5.5:kernel-rt-5.14.21-150500.13.100.2.x86_64",
            "SUSE Linux Enterprise Micro 5.5:kernel-source-rt-5.14.21-150500.13.100.1.noarch"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2025-07-15T14:31:35Z",
          "details": "moderate"
        }
      ],
      "title": "CVE-2022-49949"
    },
    {
      "cve": "CVE-2022-49950",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2022-49950"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "In the Linux kernel, the following vulnerability has been resolved:\n\nmisc: fastrpc: fix memory corruption on open\n\nThe probe session-duplication overflow check incremented the session\ncount also when there were no more available sessions so that memory\nbeyond the fixed-size slab-allocated session array could be corrupted in\nfastrpc_session_alloc() on open().",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "SUSE Linux Enterprise Micro 5.5:kernel-devel-rt-5.14.21-150500.13.100.1.noarch",
          "SUSE Linux Enterprise Micro 5.5:kernel-rt-5.14.21-150500.13.100.2.x86_64",
          "SUSE Linux Enterprise Micro 5.5:kernel-source-rt-5.14.21-150500.13.100.1.noarch"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2022-49950",
          "url": "https://www.suse.com/security/cve/CVE-2022-49950"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1244958 for CVE-2022-49950",
          "url": "https://bugzilla.suse.com/1244958"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "SUSE Linux Enterprise Micro 5.5:kernel-devel-rt-5.14.21-150500.13.100.1.noarch",
            "SUSE Linux Enterprise Micro 5.5:kernel-rt-5.14.21-150500.13.100.2.x86_64",
            "SUSE Linux Enterprise Micro 5.5:kernel-source-rt-5.14.21-150500.13.100.1.noarch"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 5.5,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
            "version": "3.1"
          },
          "products": [
            "SUSE Linux Enterprise Micro 5.5:kernel-devel-rt-5.14.21-150500.13.100.1.noarch",
            "SUSE Linux Enterprise Micro 5.5:kernel-rt-5.14.21-150500.13.100.2.x86_64",
            "SUSE Linux Enterprise Micro 5.5:kernel-source-rt-5.14.21-150500.13.100.1.noarch"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2025-07-15T14:31:35Z",
          "details": "moderate"
        }
      ],
      "title": "CVE-2022-49950"
    },
    {
      "cve": "CVE-2022-49951",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2022-49951"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "In the Linux kernel, the following vulnerability has been resolved:\n\nfirmware_loader: Fix use-after-free during unregister\n\nIn the following code within firmware_upload_unregister(), the call to\ndevice_unregister() could result in the dev_release function freeing the\nfw_upload_priv structure before it is dereferenced for the call to\nmodule_put(). This bug was found by the kernel test robot using\nCONFIG_KASAN while running the firmware selftests.\n\n  device_unregister(\u0026fw_sysfs-\u003edev);\n  module_put(fw_upload_priv-\u003emodule);\n\nThe problem is fixed by copying fw_upload_priv-\u003emodule to a local variable\nfor use when calling device_unregister().",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "SUSE Linux Enterprise Micro 5.5:kernel-devel-rt-5.14.21-150500.13.100.1.noarch",
          "SUSE Linux Enterprise Micro 5.5:kernel-rt-5.14.21-150500.13.100.2.x86_64",
          "SUSE Linux Enterprise Micro 5.5:kernel-source-rt-5.14.21-150500.13.100.1.noarch"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2022-49951",
          "url": "https://www.suse.com/security/cve/CVE-2022-49951"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1244940 for CVE-2022-49951",
          "url": "https://bugzilla.suse.com/1244940"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "SUSE Linux Enterprise Micro 5.5:kernel-devel-rt-5.14.21-150500.13.100.1.noarch",
            "SUSE Linux Enterprise Micro 5.5:kernel-rt-5.14.21-150500.13.100.2.x86_64",
            "SUSE Linux Enterprise Micro 5.5:kernel-source-rt-5.14.21-150500.13.100.1.noarch"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 5.5,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
            "version": "3.1"
          },
          "products": [
            "SUSE Linux Enterprise Micro 5.5:kernel-devel-rt-5.14.21-150500.13.100.1.noarch",
            "SUSE Linux Enterprise Micro 5.5:kernel-rt-5.14.21-150500.13.100.2.x86_64",
            "SUSE Linux Enterprise Micro 5.5:kernel-source-rt-5.14.21-150500.13.100.1.noarch"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2025-07-15T14:31:35Z",
          "details": "moderate"
        }
      ],
      "title": "CVE-2022-49951"
    },
    {
      "cve": "CVE-2022-49952",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2022-49952"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "In the Linux kernel, the following vulnerability has been resolved:\n\nmisc: fastrpc: fix memory corruption on probe\n\nAdd the missing sanity check on the probed-session count to avoid\ncorrupting memory beyond the fixed-size slab-allocated session array\nwhen there are more than FASTRPC_MAX_SESSIONS sessions defined in the\ndevicetree.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "SUSE Linux Enterprise Micro 5.5:kernel-devel-rt-5.14.21-150500.13.100.1.noarch",
          "SUSE Linux Enterprise Micro 5.5:kernel-rt-5.14.21-150500.13.100.2.x86_64",
          "SUSE Linux Enterprise Micro 5.5:kernel-source-rt-5.14.21-150500.13.100.1.noarch"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2022-49952",
          "url": "https://www.suse.com/security/cve/CVE-2022-49952"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1244945 for CVE-2022-49952",
          "url": "https://bugzilla.suse.com/1244945"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "SUSE Linux Enterprise Micro 5.5:kernel-devel-rt-5.14.21-150500.13.100.1.noarch",
            "SUSE Linux Enterprise Micro 5.5:kernel-rt-5.14.21-150500.13.100.2.x86_64",
            "SUSE Linux Enterprise Micro 5.5:kernel-source-rt-5.14.21-150500.13.100.1.noarch"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 5.5,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
            "version": "3.1"
          },
          "products": [
            "SUSE Linux Enterprise Micro 5.5:kernel-devel-rt-5.14.21-150500.13.100.1.noarch",
            "SUSE Linux Enterprise Micro 5.5:kernel-rt-5.14.21-150500.13.100.2.x86_64",
            "SUSE Linux Enterprise Micro 5.5:kernel-source-rt-5.14.21-150500.13.100.1.noarch"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2025-07-15T14:31:35Z",
          "details": "moderate"
        }
      ],
      "title": "CVE-2022-49952"
    },
    {
      "cve": "CVE-2022-49954",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2022-49954"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "In the Linux kernel, the following vulnerability has been resolved:\n\nInput: iforce - wake up after clearing IFORCE_XMIT_RUNNING flag\n\nsyzbot is reporting hung task at __input_unregister_device() [1], for\niforce_close() waiting at wait_event_interruptible() with dev-\u003emutex held\nis blocking input_disconnect_device() from __input_unregister_device().\n\nIt seems that the cause is simply that commit c2b27ef672992a20 (\"Input:\niforce - wait for command completion when closing the device\") forgot to\ncall wake_up() after clear_bit().\n\nFix this problem by introducing a helper that calls clear_bit() followed\nby wake_up_all().",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "SUSE Linux Enterprise Micro 5.5:kernel-devel-rt-5.14.21-150500.13.100.1.noarch",
          "SUSE Linux Enterprise Micro 5.5:kernel-rt-5.14.21-150500.13.100.2.x86_64",
          "SUSE Linux Enterprise Micro 5.5:kernel-source-rt-5.14.21-150500.13.100.1.noarch"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2022-49954",
          "url": "https://www.suse.com/security/cve/CVE-2022-49954"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1244976 for CVE-2022-49954",
          "url": "https://bugzilla.suse.com/1244976"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "SUSE Linux Enterprise Micro 5.5:kernel-devel-rt-5.14.21-150500.13.100.1.noarch",
            "SUSE Linux Enterprise Micro 5.5:kernel-rt-5.14.21-150500.13.100.2.x86_64",
            "SUSE Linux Enterprise Micro 5.5:kernel-source-rt-5.14.21-150500.13.100.1.noarch"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 5.5,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
            "version": "3.1"
          },
          "products": [
            "SUSE Linux Enterprise Micro 5.5:kernel-devel-rt-5.14.21-150500.13.100.1.noarch",
            "SUSE Linux Enterprise Micro 5.5:kernel-rt-5.14.21-150500.13.100.2.x86_64",
            "SUSE Linux Enterprise Micro 5.5:kernel-source-rt-5.14.21-150500.13.100.1.noarch"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2025-07-15T14:31:35Z",
          "details": "moderate"
        }
      ],
      "title": "CVE-2022-49954"
    },
    {
      "cve": "CVE-2022-49956",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2022-49956"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "In the Linux kernel, the following vulnerability has been resolved:\n\nstaging: rtl8712: fix use after free bugs\n\n_Read/Write_MACREG callbacks are NULL so the read/write_macreg_hdl()\nfunctions don\u0027t do anything except free the \"pcmd\" pointer.  It\nresults in a use after free.  Delete them.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "SUSE Linux Enterprise Micro 5.5:kernel-devel-rt-5.14.21-150500.13.100.1.noarch",
          "SUSE Linux Enterprise Micro 5.5:kernel-rt-5.14.21-150500.13.100.2.x86_64",
          "SUSE Linux Enterprise Micro 5.5:kernel-source-rt-5.14.21-150500.13.100.1.noarch"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2022-49956",
          "url": "https://www.suse.com/security/cve/CVE-2022-49956"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1244969 for CVE-2022-49956",
          "url": "https://bugzilla.suse.com/1244969"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "SUSE Linux Enterprise Micro 5.5:kernel-devel-rt-5.14.21-150500.13.100.1.noarch",
            "SUSE Linux Enterprise Micro 5.5:kernel-rt-5.14.21-150500.13.100.2.x86_64",
            "SUSE Linux Enterprise Micro 5.5:kernel-source-rt-5.14.21-150500.13.100.1.noarch"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 5.5,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
            "version": "3.1"
          },
          "products": [
            "SUSE Linux Enterprise Micro 5.5:kernel-devel-rt-5.14.21-150500.13.100.1.noarch",
            "SUSE Linux Enterprise Micro 5.5:kernel-rt-5.14.21-150500.13.100.2.x86_64",
            "SUSE Linux Enterprise Micro 5.5:kernel-source-rt-5.14.21-150500.13.100.1.noarch"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2025-07-15T14:31:35Z",
          "details": "moderate"
        }
      ],
      "title": "CVE-2022-49956"
    },
    {
      "cve": "CVE-2022-49957",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2022-49957"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "In the Linux kernel, the following vulnerability has been resolved:\n\nkcm: fix strp_init() order and cleanup\n\nstrp_init() is called just a few lines above this csk-\u003esk_user_data\ncheck, it also initializes strp-\u003ework etc., therefore, it is\nunnecessary to call strp_done() to cancel the freshly initialized\nwork.\n\nAnd if sk_user_data is already used by KCM, psock-\u003estrp should not be\ntouched, particularly strp-\u003ework state, so we need to move strp_init()\nafter the csk-\u003esk_user_data check.\n\nThis also makes a lockdep warning reported by syzbot go away.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "SUSE Linux Enterprise Micro 5.5:kernel-devel-rt-5.14.21-150500.13.100.1.noarch",
          "SUSE Linux Enterprise Micro 5.5:kernel-rt-5.14.21-150500.13.100.2.x86_64",
          "SUSE Linux Enterprise Micro 5.5:kernel-source-rt-5.14.21-150500.13.100.1.noarch"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2022-49957",
          "url": "https://www.suse.com/security/cve/CVE-2022-49957"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1244966 for CVE-2022-49957",
          "url": "https://bugzilla.suse.com/1244966"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "SUSE Linux Enterprise Micro 5.5:kernel-devel-rt-5.14.21-150500.13.100.1.noarch",
            "SUSE Linux Enterprise Micro 5.5:kernel-rt-5.14.21-150500.13.100.2.x86_64",
            "SUSE Linux Enterprise Micro 5.5:kernel-source-rt-5.14.21-150500.13.100.1.noarch"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 5.5,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
            "version": "3.1"
          },
          "products": [
            "SUSE Linux Enterprise Micro 5.5:kernel-devel-rt-5.14.21-150500.13.100.1.noarch",
            "SUSE Linux Enterprise Micro 5.5:kernel-rt-5.14.21-150500.13.100.2.x86_64",
            "SUSE Linux Enterprise Micro 5.5:kernel-source-rt-5.14.21-150500.13.100.1.noarch"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2025-07-15T14:31:35Z",
          "details": "moderate"
        }
      ],
      "title": "CVE-2022-49957"
    },
    {
      "cve": "CVE-2022-49958",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2022-49958"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "In the Linux kernel, the following vulnerability has been resolved:\n\nnet/sched: fix netdevice reference leaks in attach_default_qdiscs()\n\nIn attach_default_qdiscs(), if a dev has multiple queues and queue 0 fails\nto attach qdisc because there is no memory in attach_one_default_qdisc().\nThen dev-\u003eqdisc will be noop_qdisc by default. But the other queues may be\nable to successfully attach to default qdisc.\n\nIn this case, the fallback to noqueue process will be triggered. If the\noriginal attached qdisc is not released and a new one is directly\nattached, this will cause netdevice reference leaks.\n\nThe following is the bug log:\n\nveth0: default qdisc (fq_codel) fail, fallback to noqueue\nunregister_netdevice: waiting for veth0 to become free. Usage count = 32\nleaked reference.\n qdisc_alloc+0x12e/0x210\n qdisc_create_dflt+0x62/0x140\n attach_one_default_qdisc.constprop.41+0x44/0x70\n dev_activate+0x128/0x290\n __dev_open+0x12a/0x190\n __dev_change_flags+0x1a2/0x1f0\n dev_change_flags+0x23/0x60\n do_setlink+0x332/0x1150\n __rtnl_newlink+0x52f/0x8e0\n rtnl_newlink+0x43/0x70\n rtnetlink_rcv_msg+0x140/0x3b0\n netlink_rcv_skb+0x50/0x100\n netlink_unicast+0x1bb/0x290\n netlink_sendmsg+0x37c/0x4e0\n sock_sendmsg+0x5f/0x70\n ____sys_sendmsg+0x208/0x280\n\nFix this bug by clearing any non-noop qdiscs that may have been assigned\nbefore trying to re-attach.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "SUSE Linux Enterprise Micro 5.5:kernel-devel-rt-5.14.21-150500.13.100.1.noarch",
          "SUSE Linux Enterprise Micro 5.5:kernel-rt-5.14.21-150500.13.100.2.x86_64",
          "SUSE Linux Enterprise Micro 5.5:kernel-source-rt-5.14.21-150500.13.100.1.noarch"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2022-49958",
          "url": "https://www.suse.com/security/cve/CVE-2022-49958"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1244974 for CVE-2022-49958",
          "url": "https://bugzilla.suse.com/1244974"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "SUSE Linux Enterprise Micro 5.5:kernel-devel-rt-5.14.21-150500.13.100.1.noarch",
            "SUSE Linux Enterprise Micro 5.5:kernel-rt-5.14.21-150500.13.100.2.x86_64",
            "SUSE Linux Enterprise Micro 5.5:kernel-source-rt-5.14.21-150500.13.100.1.noarch"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 5.5,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
            "version": "3.1"
          },
          "products": [
            "SUSE Linux Enterprise Micro 5.5:kernel-devel-rt-5.14.21-150500.13.100.1.noarch",
            "SUSE Linux Enterprise Micro 5.5:kernel-rt-5.14.21-150500.13.100.2.x86_64",
            "SUSE Linux Enterprise Micro 5.5:kernel-source-rt-5.14.21-150500.13.100.1.noarch"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2025-07-15T14:31:35Z",
          "details": "moderate"
        }
      ],
      "title": "CVE-2022-49958"
    },
    {
      "cve": "CVE-2022-49960",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2022-49960"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "In the Linux kernel, the following vulnerability has been resolved:\n\ndrm/i915: fix null pointer dereference\n\nAsus chromebook CX550 crashes during boot on v5.17-rc1 kernel.\nThe root cause is null pointer defeference of bi_next\nin tgl_get_bw_info() in drivers/gpu/drm/i915/display/intel_bw.c.\n\nBUG: kernel NULL pointer dereference, address: 000000000000002e\nPGD 0 P4D 0\nOops: 0002 [#1] PREEMPT SMP NOPTI\nCPU: 0 PID: 1 Comm: swapper/0 Tainted: G     U            5.17.0-rc1\nHardware name: Google Delbin/Delbin, BIOS Google_Delbin.13672.156.3 05/14/2021\nRIP: 0010:tgl_get_bw_info+0x2de/0x510\n...\n[    2.554467] Call Trace:\n[    2.554467]  \u003cTASK\u003e\n[    2.554467]  intel_bw_init_hw+0x14a/0x434\n[    2.554467]  ? _printk+0x59/0x73\n[    2.554467]  ? _dev_err+0x77/0x91\n[    2.554467]  i915_driver_hw_probe+0x329/0x33e\n[    2.554467]  i915_driver_probe+0x4c8/0x638\n[    2.554467]  i915_pci_probe+0xf8/0x14e\n[    2.554467]  ? _raw_spin_unlock_irqrestore+0x12/0x2c\n[    2.554467]  pci_device_probe+0xaa/0x142\n[    2.554467]  really_probe+0x13f/0x2f4\n[    2.554467]  __driver_probe_device+0x9e/0xd3\n[    2.554467]  driver_probe_device+0x24/0x7c\n[    2.554467]  __driver_attach+0xba/0xcf\n[    2.554467]  ? driver_attach+0x1f/0x1f\n[    2.554467]  bus_for_each_dev+0x8c/0xc0\n[    2.554467]  bus_add_driver+0x11b/0x1f7\n[    2.554467]  driver_register+0x60/0xea\n[    2.554467]  ? mipi_dsi_bus_init+0x16/0x16\n[    2.554467]  i915_init+0x2c/0xb9\n[    2.554467]  ? mipi_dsi_bus_init+0x16/0x16\n[    2.554467]  do_one_initcall+0x12e/0x2b3\n[    2.554467]  do_initcall_level+0xd6/0xf3\n[    2.554467]  do_initcalls+0x4e/0x79\n[    2.554467]  kernel_init_freeable+0xed/0x14d\n[    2.554467]  ? rest_init+0xc1/0xc1\n[    2.554467]  kernel_init+0x1a/0x120\n[    2.554467]  ret_from_fork+0x1f/0x30\n[    2.554467]  \u003c/TASK\u003e\n...\nKernel panic - not syncing: Fatal exception\n\n(cherry picked from commit c247cd03898c4c43c3bce6d4014730403bc13032)",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "SUSE Linux Enterprise Micro 5.5:kernel-devel-rt-5.14.21-150500.13.100.1.noarch",
          "SUSE Linux Enterprise Micro 5.5:kernel-rt-5.14.21-150500.13.100.2.x86_64",
          "SUSE Linux Enterprise Micro 5.5:kernel-source-rt-5.14.21-150500.13.100.1.noarch"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2022-49960",
          "url": "https://www.suse.com/security/cve/CVE-2022-49960"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1244911 for CVE-2022-49960",
          "url": "https://bugzilla.suse.com/1244911"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "SUSE Linux Enterprise Micro 5.5:kernel-devel-rt-5.14.21-150500.13.100.1.noarch",
            "SUSE Linux Enterprise Micro 5.5:kernel-rt-5.14.21-150500.13.100.2.x86_64",
            "SUSE Linux Enterprise Micro 5.5:kernel-source-rt-5.14.21-150500.13.100.1.noarch"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 4.4,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H",
            "version": "3.1"
          },
          "products": [
            "SUSE Linux Enterprise Micro 5.5:kernel-devel-rt-5.14.21-150500.13.100.1.noarch",
            "SUSE Linux Enterprise Micro 5.5:kernel-rt-5.14.21-150500.13.100.2.x86_64",
            "SUSE Linux Enterprise Micro 5.5:kernel-source-rt-5.14.21-150500.13.100.1.noarch"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2025-07-15T14:31:35Z",
          "details": "moderate"
        }
      ],
      "title": "CVE-2022-49960"
    },
    {
      "cve": "CVE-2022-49962",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2022-49962"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "In the Linux kernel, the following vulnerability has been resolved:\n\nxhci: Fix null pointer dereference in remove if xHC has only one roothub\n\nThe remove path in xhci platform driver tries to remove and put both main\nand shared hcds even if only a main hcd exists (one roothub)\n\nThis causes a null pointer dereference in reboot for those controllers.\n\nCheck that the shared_hcd exists before trying to remove it.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "SUSE Linux Enterprise Micro 5.5:kernel-devel-rt-5.14.21-150500.13.100.1.noarch",
          "SUSE Linux Enterprise Micro 5.5:kernel-rt-5.14.21-150500.13.100.2.x86_64",
          "SUSE Linux Enterprise Micro 5.5:kernel-source-rt-5.14.21-150500.13.100.1.noarch"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2022-49962",
          "url": "https://www.suse.com/security/cve/CVE-2022-49962"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1244912 for CVE-2022-49962",
          "url": "https://bugzilla.suse.com/1244912"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "SUSE Linux Enterprise Micro 5.5:kernel-devel-rt-5.14.21-150500.13.100.1.noarch",
            "SUSE Linux Enterprise Micro 5.5:kernel-rt-5.14.21-150500.13.100.2.x86_64",
            "SUSE Linux Enterprise Micro 5.5:kernel-source-rt-5.14.21-150500.13.100.1.noarch"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 5.5,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
            "version": "3.1"
          },
          "products": [
            "SUSE Linux Enterprise Micro 5.5:kernel-devel-rt-5.14.21-150500.13.100.1.noarch",
            "SUSE Linux Enterprise Micro 5.5:kernel-rt-5.14.21-150500.13.100.2.x86_64",
            "SUSE Linux Enterprise Micro 5.5:kernel-source-rt-5.14.21-150500.13.100.1.noarch"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2025-07-15T14:31:35Z",
          "details": "moderate"
        }
      ],
      "title": "CVE-2022-49962"
    },
    {
      "cve": "CVE-2022-49963",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2022-49963"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "In the Linux kernel, the following vulnerability has been resolved:\n\ndrm/i915/ttm: fix CCS handling\n\nCrucible + recent Mesa seems to sometimes hit:\n\nGEM_BUG_ON(num_ccs_blks \u003e NUM_CCS_BLKS_PER_XFER)\n\nAnd it looks like we can also trigger this with gem_lmem_swapping, if we\nmodify the test to use slightly larger object sizes.\n\nLooking closer it looks like we have the following issues in\nmigrate_copy():\n\n  - We are using plain integer in various places, which we can easily\n    overflow with a large object.\n\n  - We pass the entire object size (when the src is lmem) into\n    emit_pte() and then try to copy it, which doesn\u0027t work, since we\n    only have a few fixed sized windows in which to map the pages and\n    perform the copy. With an object \u003e 8M we therefore aren\u0027t properly\n    copying the pages. And then with an object \u003e 64M we trigger the\n    GEM_BUG_ON(num_ccs_blks \u003e NUM_CCS_BLKS_PER_XFER).\n\nSo it looks like our copy handling for any object \u003e 8M (which is our\nCHUNK_SZ) is currently broken on DG2.\n\nTestcase: igt@gem_lmem_swapping\n(cherry picked from commit 8676145eb2f53a9940ff70910caf0125bd8a4bc2)",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "SUSE Linux Enterprise Micro 5.5:kernel-devel-rt-5.14.21-150500.13.100.1.noarch",
          "SUSE Linux Enterprise Micro 5.5:kernel-rt-5.14.21-150500.13.100.2.x86_64",
          "SUSE Linux Enterprise Micro 5.5:kernel-source-rt-5.14.21-150500.13.100.1.noarch"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2022-49963",
          "url": "https://www.suse.com/security/cve/CVE-2022-49963"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1244914 for CVE-2022-49963",
          "url": "https://bugzilla.suse.com/1244914"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "SUSE Linux Enterprise Micro 5.5:kernel-devel-rt-5.14.21-150500.13.100.1.noarch",
            "SUSE Linux Enterprise Micro 5.5:kernel-rt-5.14.21-150500.13.100.2.x86_64",
            "SUSE Linux Enterprise Micro 5.5:kernel-source-rt-5.14.21-150500.13.100.1.noarch"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 5.5,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
            "version": "3.1"
          },
          "products": [
            "SUSE Linux Enterprise Micro 5.5:kernel-devel-rt-5.14.21-150500.13.100.1.noarch",
            "SUSE Linux Enterprise Micro 5.5:kernel-rt-5.14.21-150500.13.100.2.x86_64",
            "SUSE Linux Enterprise Micro 5.5:kernel-source-rt-5.14.21-150500.13.100.1.noarch"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2025-07-15T14:31:35Z",
          "details": "moderate"
        }
      ],
      "title": "CVE-2022-49963"
    },
    {
      "cve": "CVE-2022-49964",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2022-49964"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "In the Linux kernel, the following vulnerability has been resolved:\n\narm64: cacheinfo: Fix incorrect assignment of signed error value to unsigned fw_level\n\nThough acpi_find_last_cache_level() always returned signed value and the\ndocument states it will return any errors caused by lack of a PPTT table,\nit never returned negative values before.\n\nCommit 0c80f9e165f8 (\"ACPI: PPTT: Leave the table mapped for the runtime usage\")\nhowever changed it by returning -ENOENT if no PPTT was found. The value\nreturned from acpi_find_last_cache_level() is then assigned to unsigned\nfw_level.\n\nIt will result in the number of cache leaves calculated incorrectly as\na huge value which will then cause the following warning from __alloc_pages\nas the order would be great than MAX_ORDER because of incorrect and huge\ncache leaves value.\n\n  |  WARNING: CPU: 0 PID: 1 at mm/page_alloc.c:5407 __alloc_pages+0x74/0x314\n  |  Modules linked in:\n  |  CPU: 0 PID: 1 Comm: swapper/0 Not tainted 5.19.0-10393-g7c2a8d3ac4c0 #73\n  |  pstate: 20000005 (nzCv daif -PAN -UAO -TCO -DIT -SSBS BTYPE=--)\n  |  pc : __alloc_pages+0x74/0x314\n  |  lr : alloc_pages+0xe8/0x318\n  |  Call trace:\n  |   __alloc_pages+0x74/0x314\n  |   alloc_pages+0xe8/0x318\n  |   kmalloc_order_trace+0x68/0x1dc\n  |   __kmalloc+0x240/0x338\n  |   detect_cache_attributes+0xe0/0x56c\n  |   update_siblings_masks+0x38/0x284\n  |   store_cpu_topology+0x78/0x84\n  |   smp_prepare_cpus+0x48/0x134\n  |   kernel_init_freeable+0xc4/0x14c\n  |   kernel_init+0x2c/0x1b4\n  |   ret_from_fork+0x10/0x20\n\nFix the same by changing fw_level to be signed integer and return the\nerror from init_cache_level() early in case of error.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "SUSE Linux Enterprise Micro 5.5:kernel-devel-rt-5.14.21-150500.13.100.1.noarch",
          "SUSE Linux Enterprise Micro 5.5:kernel-rt-5.14.21-150500.13.100.2.x86_64",
          "SUSE Linux Enterprise Micro 5.5:kernel-source-rt-5.14.21-150500.13.100.1.noarch"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2022-49964",
          "url": "https://www.suse.com/security/cve/CVE-2022-49964"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1245064 for CVE-2022-49964",
          "url": "https://bugzilla.suse.com/1245064"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "SUSE Linux Enterprise Micro 5.5:kernel-devel-rt-5.14.21-150500.13.100.1.noarch",
            "SUSE Linux Enterprise Micro 5.5:kernel-rt-5.14.21-150500.13.100.2.x86_64",
            "SUSE Linux Enterprise Micro 5.5:kernel-source-rt-5.14.21-150500.13.100.1.noarch"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 6.1,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:H",
            "version": "3.1"
          },
          "products": [
            "SUSE Linux Enterprise Micro 5.5:kernel-devel-rt-5.14.21-150500.13.100.1.noarch",
            "SUSE Linux Enterprise Micro 5.5:kernel-rt-5.14.21-150500.13.100.2.x86_64",
            "SUSE Linux Enterprise Micro 5.5:kernel-source-rt-5.14.21-150500.13.100.1.noarch"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2025-07-15T14:31:35Z",
          "details": "moderate"
        }
      ],
      "title": "CVE-2022-49964"
    },
    {
      "cve": "CVE-2022-49965",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2022-49965"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "In the Linux kernel, the following vulnerability has been resolved:\n\ndrm/amd/pm: add missing -\u003efini_xxxx interfaces for some SMU13 asics\n\nWithout these, potential memory leak may be induced.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "SUSE Linux Enterprise Micro 5.5:kernel-devel-rt-5.14.21-150500.13.100.1.noarch",
          "SUSE Linux Enterprise Micro 5.5:kernel-rt-5.14.21-150500.13.100.2.x86_64",
          "SUSE Linux Enterprise Micro 5.5:kernel-source-rt-5.14.21-150500.13.100.1.noarch"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2022-49965",
          "url": "https://www.suse.com/security/cve/CVE-2022-49965"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1245063 for CVE-2022-49965",
          "url": "https://bugzilla.suse.com/1245063"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "SUSE Linux Enterprise Micro 5.5:kernel-devel-rt-5.14.21-150500.13.100.1.noarch",
            "SUSE Linux Enterprise Micro 5.5:kernel-rt-5.14.21-150500.13.100.2.x86_64",
            "SUSE Linux Enterprise Micro 5.5:kernel-source-rt-5.14.21-150500.13.100.1.noarch"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 4.4,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:L",
            "version": "3.1"
          },
          "products": [
            "SUSE Linux Enterprise Micro 5.5:kernel-devel-rt-5.14.21-150500.13.100.1.noarch",
            "SUSE Linux Enterprise Micro 5.5:kernel-rt-5.14.21-150500.13.100.2.x86_64",
            "SUSE Linux Enterprise Micro 5.5:kernel-source-rt-5.14.21-150500.13.100.1.noarch"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2025-07-15T14:31:35Z",
          "details": "moderate"
        }
      ],
      "title": "CVE-2022-49965"
    },
    {
      "cve": "CVE-2022-49966",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2022-49966"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "In the Linux kernel, the following vulnerability has been resolved:\n\ndrm/amd/pm: add missing -\u003efini_microcode interface for Sienna Cichlid\n\nTo avoid any potential memory leak.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "SUSE Linux Enterprise Micro 5.5:kernel-devel-rt-5.14.21-150500.13.100.1.noarch",
          "SUSE Linux Enterprise Micro 5.5:kernel-rt-5.14.21-150500.13.100.2.x86_64",
          "SUSE Linux Enterprise Micro 5.5:kernel-source-rt-5.14.21-150500.13.100.1.noarch"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2022-49966",
          "url": "https://www.suse.com/security/cve/CVE-2022-49966"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1245062 for CVE-2022-49966",
          "url": "https://bugzilla.suse.com/1245062"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "SUSE Linux Enterprise Micro 5.5:kernel-devel-rt-5.14.21-150500.13.100.1.noarch",
            "SUSE Linux Enterprise Micro 5.5:kernel-rt-5.14.21-150500.13.100.2.x86_64",
            "SUSE Linux Enterprise Micro 5.5:kernel-source-rt-5.14.21-150500.13.100.1.noarch"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 4.4,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:L",
            "version": "3.1"
          },
          "products": [
            "SUSE Linux Enterprise Micro 5.5:kernel-devel-rt-5.14.21-150500.13.100.1.noarch",
            "SUSE Linux Enterprise Micro 5.5:kernel-rt-5.14.21-150500.13.100.2.x86_64",
            "SUSE Linux Enterprise Micro 5.5:kernel-source-rt-5.14.21-150500.13.100.1.noarch"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2025-07-15T14:31:35Z",
          "details": "moderate"
        }
      ],
      "title": "CVE-2022-49966"
    },
    {
      "cve": "CVE-2022-49968",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2022-49968"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "In the Linux kernel, the following vulnerability has been resolved:\n\nieee802154/adf7242: defer destroy_workqueue call\n\nThere is a possible race condition (use-after-free) like below\n\n  (FREE)                     |  (USE)\n  adf7242_remove             |  adf7242_channel\n   cancel_delayed_work_sync  |\n    destroy_workqueue (1)    |   adf7242_cmd_rx\n                             |    mod_delayed_work (2)\n                             |\n\nThe root cause for this race is that the upper layer (ieee802154) is\nunaware of this detaching event and the function adf7242_channel can\nbe called without any checks.\n\nTo fix this, we can add a flag write at the beginning of adf7242_remove\nand add flag check in adf7242_channel. Or we can just defer the\ndestructive operation like other commit 3e0588c291d6 (\"hamradio: defer\nax25 kfree after unregister_netdev\") which let the\nieee802154_unregister_hw() to handle the synchronization. This patch\ntakes the second option.\n\nruns\")",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "SUSE Linux Enterprise Micro 5.5:kernel-devel-rt-5.14.21-150500.13.100.1.noarch",
          "SUSE Linux Enterprise Micro 5.5:kernel-rt-5.14.21-150500.13.100.2.x86_64",
          "SUSE Linux Enterprise Micro 5.5:kernel-source-rt-5.14.21-150500.13.100.1.noarch"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2022-49968",
          "url": "https://www.suse.com/security/cve/CVE-2022-49968"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1244959 for CVE-2022-49968",
          "url": "https://bugzilla.suse.com/1244959"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "SUSE Linux Enterprise Micro 5.5:kernel-devel-rt-5.14.21-150500.13.100.1.noarch",
            "SUSE Linux Enterprise Micro 5.5:kernel-rt-5.14.21-150500.13.100.2.x86_64",
            "SUSE Linux Enterprise Micro 5.5:kernel-source-rt-5.14.21-150500.13.100.1.noarch"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 5.5,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
            "version": "3.1"
          },
          "products": [
            "SUSE Linux Enterprise Micro 5.5:kernel-devel-rt-5.14.21-150500.13.100.1.noarch",
            "SUSE Linux Enterprise Micro 5.5:kernel-rt-5.14.21-150500.13.100.2.x86_64",
            "SUSE Linux Enterprise Micro 5.5:kernel-source-rt-5.14.21-150500.13.100.1.noarch"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2025-07-15T14:31:35Z",
          "details": "moderate"
        }
      ],
      "title": "CVE-2022-49968"
    },
    {
      "cve": "CVE-2022-49969",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2022-49969"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "In the Linux kernel, the following vulnerability has been resolved:\n\ndrm/amd/display: clear optc underflow before turn off odm clock\n\n[Why]\nAfter ODM clock off, optc underflow bit will be kept there always and clear not work.\nWe need to clear that before clock off.\n\n[How]\nClear that if have when clock off.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "SUSE Linux Enterprise Micro 5.5:kernel-devel-rt-5.14.21-150500.13.100.1.noarch",
          "SUSE Linux Enterprise Micro 5.5:kernel-rt-5.14.21-150500.13.100.2.x86_64",
          "SUSE Linux Enterprise Micro 5.5:kernel-source-rt-5.14.21-150500.13.100.1.noarch"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2022-49969",
          "url": "https://www.suse.com/security/cve/CVE-2022-49969"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1245060 for CVE-2022-49969",
          "url": "https://bugzilla.suse.com/1245060"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "SUSE Linux Enterprise Micro 5.5:kernel-devel-rt-5.14.21-150500.13.100.1.noarch",
            "SUSE Linux Enterprise Micro 5.5:kernel-rt-5.14.21-150500.13.100.2.x86_64",
            "SUSE Linux Enterprise Micro 5.5:kernel-source-rt-5.14.21-150500.13.100.1.noarch"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 3.3,
            "baseSeverity": "LOW",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L",
            "version": "3.1"
          },
          "products": [
            "SUSE Linux Enterprise Micro 5.5:kernel-devel-rt-5.14.21-150500.13.100.1.noarch",
            "SUSE Linux Enterprise Micro 5.5:kernel-rt-5.14.21-150500.13.100.2.x86_64",
            "SUSE Linux Enterprise Micro 5.5:kernel-source-rt-5.14.21-150500.13.100.1.noarch"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2025-07-15T14:31:35Z",
          "details": "moderate"
        }
      ],
      "title": "CVE-2022-49969"
    },
    {
      "cve": "CVE-2022-49971",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2022-49971"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "In the Linux kernel, the following vulnerability has been resolved:\n\ndrm/amd/pm: Fix a potential gpu_metrics_table memory leak\n\nMemory is allocated for gpu_metrics_table in\nsmu_v13_0_4_init_smc_tables(), but not freed in\nsmu_v13_0_4_fini_smc_tables(). This may cause memory leaks, fix it.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "SUSE Linux Enterprise Micro 5.5:kernel-devel-rt-5.14.21-150500.13.100.1.noarch",
          "SUSE Linux Enterprise Micro 5.5:kernel-rt-5.14.21-150500.13.100.2.x86_64",
          "SUSE Linux Enterprise Micro 5.5:kernel-source-rt-5.14.21-150500.13.100.1.noarch"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2022-49971",
          "url": "https://www.suse.com/security/cve/CVE-2022-49971"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1245070 for CVE-2022-49971",
          "url": "https://bugzilla.suse.com/1245070"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "SUSE Linux Enterprise Micro 5.5:kernel-devel-rt-5.14.21-150500.13.100.1.noarch",
            "SUSE Linux Enterprise Micro 5.5:kernel-rt-5.14.21-150500.13.100.2.x86_64",
            "SUSE Linux Enterprise Micro 5.5:kernel-source-rt-5.14.21-150500.13.100.1.noarch"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 5.5,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
            "version": "3.1"
          },
          "products": [
            "SUSE Linux Enterprise Micro 5.5:kernel-devel-rt-5.14.21-150500.13.100.1.noarch",
            "SUSE Linux Enterprise Micro 5.5:kernel-rt-5.14.21-150500.13.100.2.x86_64",
            "SUSE Linux Enterprise Micro 5.5:kernel-source-rt-5.14.21-150500.13.100.1.noarch"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2025-07-15T14:31:35Z",
          "details": "moderate"
        }
      ],
      "title": "CVE-2022-49971"
    },
    {
      "cve": "CVE-2022-49972",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2022-49972"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "In the Linux kernel, the following vulnerability has been resolved:\n\nxsk: Fix corrupted packets for XDP_SHARED_UMEM\n\nFix an issue in XDP_SHARED_UMEM mode together with aligned mode where\npackets are corrupted for the second and any further sockets bound to\nthe same umem. In other words, this does not affect the first socket\nbound to the umem. The culprit for this bug is that the initialization\nof the DMA addresses for the pre-populated xsk buffer pool entries was\nnot performed for any socket but the first one bound to the umem. Only\nthe linear array of DMA addresses was populated. Fix this by populating\nthe DMA addresses in the xsk buffer pool for every socket bound to the\nsame umem.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "SUSE Linux Enterprise Micro 5.5:kernel-devel-rt-5.14.21-150500.13.100.1.noarch",
          "SUSE Linux Enterprise Micro 5.5:kernel-rt-5.14.21-150500.13.100.2.x86_64",
          "SUSE Linux Enterprise Micro 5.5:kernel-source-rt-5.14.21-150500.13.100.1.noarch"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2022-49972",
          "url": "https://www.suse.com/security/cve/CVE-2022-49972"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1244960 for CVE-2022-49972",
          "url": "https://bugzilla.suse.com/1244960"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "SUSE Linux Enterprise Micro 5.5:kernel-devel-rt-5.14.21-150500.13.100.1.noarch",
            "SUSE Linux Enterprise Micro 5.5:kernel-rt-5.14.21-150500.13.100.2.x86_64",
            "SUSE Linux Enterprise Micro 5.5:kernel-source-rt-5.14.21-150500.13.100.1.noarch"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 5.5,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
            "version": "3.1"
          },
          "products": [
            "SUSE Linux Enterprise Micro 5.5:kernel-devel-rt-5.14.21-150500.13.100.1.noarch",
            "SUSE Linux Enterprise Micro 5.5:kernel-rt-5.14.21-150500.13.100.2.x86_64",
            "SUSE Linux Enterprise Micro 5.5:kernel-source-rt-5.14.21-150500.13.100.1.noarch"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2025-07-15T14:31:35Z",
          "details": "moderate"
        }
      ],
      "title": "CVE-2022-49972"
    },
    {
      "cve": "CVE-2022-49977",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2022-49977"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "In the Linux kernel, the following vulnerability has been resolved:\n\nftrace: Fix NULL pointer dereference in is_ftrace_trampoline when ftrace is dead\n\nftrace_startup does not remove ops from ftrace_ops_list when\nftrace_startup_enable fails:\n\nregister_ftrace_function\n  ftrace_startup\n    __register_ftrace_function\n      ...\n      add_ftrace_ops(\u0026ftrace_ops_list, ops)\n      ...\n    ...\n    ftrace_startup_enable // if ftrace failed to modify, ftrace_disabled is set to 1\n    ...\n  return 0 // ops is in the ftrace_ops_list.\n\nWhen ftrace_disabled = 1, unregister_ftrace_function simply returns without doing anything:\nunregister_ftrace_function\n  ftrace_shutdown\n    if (unlikely(ftrace_disabled))\n            return -ENODEV;  // return here, __unregister_ftrace_function is not executed,\n                             // as a result, ops is still in the ftrace_ops_list\n    __unregister_ftrace_function\n    ...\n\nIf ops is dynamically allocated, it will be free later, in this case,\nis_ftrace_trampoline accesses NULL pointer:\n\nis_ftrace_trampoline\n  ftrace_ops_trampoline\n    do_for_each_ftrace_op(op, ftrace_ops_list) // OOPS! op may be NULL!\n\nSyzkaller reports as follows:\n[ 1203.506103] BUG: kernel NULL pointer dereference, address: 000000000000010b\n[ 1203.508039] #PF: supervisor read access in kernel mode\n[ 1203.508798] #PF: error_code(0x0000) - not-present page\n[ 1203.509558] PGD 800000011660b067 P4D 800000011660b067 PUD 130fb8067 PMD 0\n[ 1203.510560] Oops: 0000 [#1] SMP KASAN PTI\n[ 1203.511189] CPU: 6 PID: 29532 Comm: syz-executor.2 Tainted: G    B   W         5.10.0 #8\n[ 1203.512324] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS rel-1.14.0-0-g155821a1990b-prebuilt.qemu.org 04/01/2014\n[ 1203.513895] RIP: 0010:is_ftrace_trampoline+0x26/0xb0\n[ 1203.514644] Code: ff eb d3 90 41 55 41 54 49 89 fc 55 53 e8 f2 00 fd ff 48 8b 1d 3b 35 5d 03 e8 e6 00 fd ff 48 8d bb 90 00 00 00 e8 2a 81 26 00 \u003c48\u003e 8b ab 90 00 00 00 48 85 ed 74 1d e8 c9 00 fd ff 48 8d bb 98 00\n[ 1203.518838] RSP: 0018:ffffc900012cf960 EFLAGS: 00010246\n[ 1203.520092] RAX: 0000000000000000 RBX: 000000000000007b RCX: ffffffff8a331866\n[ 1203.521469] RDX: 0000000000000000 RSI: 0000000000000008 RDI: 000000000000010b\n[ 1203.522583] RBP: 0000000000000000 R08: 0000000000000000 R09: ffffffff8df18b07\n[ 1203.523550] R10: fffffbfff1be3160 R11: 0000000000000001 R12: 0000000000478399\n[ 1203.524596] R13: 0000000000000000 R14: ffff888145088000 R15: 0000000000000008\n[ 1203.525634] FS:  00007f429f5f4700(0000) GS:ffff8881daf00000(0000) knlGS:0000000000000000\n[ 1203.526801] CS:  0010 DS: 0000 ES: 0000 CR0: 0000000080050033\n[ 1203.527626] CR2: 000000000000010b CR3: 0000000170e1e001 CR4: 00000000003706e0\n[ 1203.528611] DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000\n[ 1203.529605] DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400\n\nTherefore, when ftrace_startup_enable fails, we need to rollback registration\nprocess and remove ops from ftrace_ops_list.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "SUSE Linux Enterprise Micro 5.5:kernel-devel-rt-5.14.21-150500.13.100.1.noarch",
          "SUSE Linux Enterprise Micro 5.5:kernel-rt-5.14.21-150500.13.100.2.x86_64",
          "SUSE Linux Enterprise Micro 5.5:kernel-source-rt-5.14.21-150500.13.100.1.noarch"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2022-49977",
          "url": "https://www.suse.com/security/cve/CVE-2022-49977"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1244936 for CVE-2022-49977",
          "url": "https://bugzilla.suse.com/1244936"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "SUSE Linux Enterprise Micro 5.5:kernel-devel-rt-5.14.21-150500.13.100.1.noarch",
            "SUSE Linux Enterprise Micro 5.5:kernel-rt-5.14.21-150500.13.100.2.x86_64",
            "SUSE Linux Enterprise Micro 5.5:kernel-source-rt-5.14.21-150500.13.100.1.noarch"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 4.4,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H",
            "version": "3.1"
          },
          "products": [
            "SUSE Linux Enterprise Micro 5.5:kernel-devel-rt-5.14.21-150500.13.100.1.noarch",
            "SUSE Linux Enterprise Micro 5.5:kernel-rt-5.14.21-150500.13.100.2.x86_64",
            "SUSE Linux Enterprise Micro 5.5:kernel-source-rt-5.14.21-150500.13.100.1.noarch"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2025-07-15T14:31:35Z",
          "details": "moderate"
        }
      ],
      "title": "CVE-2022-49977"
    },
    {
      "cve": "CVE-2022-49978",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2022-49978"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "In the Linux kernel, the following vulnerability has been resolved:\n\nfbdev: fb_pm2fb: Avoid potential divide by zero error\n\nIn `do_fb_ioctl()` of fbmem.c, if cmd is FBIOPUT_VSCREENINFO, var will be\ncopied from user, then go through `fb_set_var()` and\n`info-\u003efbops-\u003efb_check_var()` which could may be `pm2fb_check_var()`.\nAlong the path, `var-\u003epixclock` won\u0027t be modified. This function checks\nwhether reciprocal of `var-\u003epixclock` is too high. If `var-\u003epixclock` is\nzero, there will be a divide by zero error. So, it is necessary to check\nwhether denominator is zero to avoid crash. As this bug is found by\nSyzkaller, logs are listed below.\n\ndivide error in pm2fb_check_var\nCall Trace:\n \u003cTASK\u003e\n fb_set_var+0x367/0xeb0 drivers/video/fbdev/core/fbmem.c:1015\n do_fb_ioctl+0x234/0x670 drivers/video/fbdev/core/fbmem.c:1110\n fb_ioctl+0xdd/0x130 drivers/video/fbdev/core/fbmem.c:1189",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "SUSE Linux Enterprise Micro 5.5:kernel-devel-rt-5.14.21-150500.13.100.1.noarch",
          "SUSE Linux Enterprise Micro 5.5:kernel-rt-5.14.21-150500.13.100.2.x86_64",
          "SUSE Linux Enterprise Micro 5.5:kernel-source-rt-5.14.21-150500.13.100.1.noarch"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2022-49978",
          "url": "https://www.suse.com/security/cve/CVE-2022-49978"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1245195 for CVE-2022-49978",
          "url": "https://bugzilla.suse.com/1245195"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "SUSE Linux Enterprise Micro 5.5:kernel-devel-rt-5.14.21-150500.13.100.1.noarch",
            "SUSE Linux Enterprise Micro 5.5:kernel-rt-5.14.21-150500.13.100.2.x86_64",
            "SUSE Linux Enterprise Micro 5.5:kernel-source-rt-5.14.21-150500.13.100.1.noarch"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 5.5,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
            "version": "3.1"
          },
          "products": [
            "SUSE Linux Enterprise Micro 5.5:kernel-devel-rt-5.14.21-150500.13.100.1.noarch",
            "SUSE Linux Enterprise Micro 5.5:kernel-rt-5.14.21-150500.13.100.2.x86_64",
            "SUSE Linux Enterprise Micro 5.5:kernel-source-rt-5.14.21-150500.13.100.1.noarch"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2025-07-15T14:31:35Z",
          "details": "moderate"
        }
      ],
      "title": "CVE-2022-49978"
    },
    {
      "cve": "CVE-2022-49980",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2022-49980"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "In the Linux kernel, the following vulnerability has been resolved:\n\nUSB: gadget: Fix use-after-free Read in usb_udc_uevent()\n\nThe syzbot fuzzer found a race between uevent callbacks and gadget\ndriver unregistration that can cause a use-after-free bug:\n\n---------------------------------------------------------------\nBUG: KASAN: use-after-free in usb_udc_uevent+0x11f/0x130\ndrivers/usb/gadget/udc/core.c:1732\nRead of size 8 at addr ffff888078ce2050 by task udevd/2968\n\nCPU: 1 PID: 2968 Comm: udevd Not tainted 5.19.0-rc4-next-20220628-syzkaller #0\nHardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google\n06/29/2022\nCall Trace:\n \u003cTASK\u003e\n __dump_stack lib/dump_stack.c:88 [inline]\n dump_stack_lvl+0xcd/0x134 lib/dump_stack.c:106\n print_address_description mm/kasan/report.c:317 [inline]\n print_report.cold+0x2ba/0x719 mm/kasan/report.c:433\n kasan_report+0xbe/0x1f0 mm/kasan/report.c:495\n usb_udc_uevent+0x11f/0x130 drivers/usb/gadget/udc/core.c:1732\n dev_uevent+0x290/0x770 drivers/base/core.c:2424\n---------------------------------------------------------------\n\nThe bug occurs because usb_udc_uevent() dereferences udc-\u003edriver but\ndoes so without acquiring the udc_lock mutex, which protects this\nfield.  If the gadget driver is unbound from the udc concurrently with\nuevent processing, the driver structure may be accessed after it has\nbeen deallocated.\n\nTo prevent the race, we make sure that the routine holds the mutex\naround the racing accesses.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "SUSE Linux Enterprise Micro 5.5:kernel-devel-rt-5.14.21-150500.13.100.1.noarch",
          "SUSE Linux Enterprise Micro 5.5:kernel-rt-5.14.21-150500.13.100.2.x86_64",
          "SUSE Linux Enterprise Micro 5.5:kernel-source-rt-5.14.21-150500.13.100.1.noarch"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2022-49980",
          "url": "https://www.suse.com/security/cve/CVE-2022-49980"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1245110 for CVE-2022-49980",
          "url": "https://bugzilla.suse.com/1245110"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1245111 for CVE-2022-49980",
          "url": "https://bugzilla.suse.com/1245111"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "SUSE Linux Enterprise Micro 5.5:kernel-devel-rt-5.14.21-150500.13.100.1.noarch",
            "SUSE Linux Enterprise Micro 5.5:kernel-rt-5.14.21-150500.13.100.2.x86_64",
            "SUSE Linux Enterprise Micro 5.5:kernel-source-rt-5.14.21-150500.13.100.1.noarch"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 7,
            "baseSeverity": "HIGH",
            "vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H",
            "version": "3.1"
          },
          "products": [
            "SUSE Linux Enterprise Micro 5.5:kernel-devel-rt-5.14.21-150500.13.100.1.noarch",
            "SUSE Linux Enterprise Micro 5.5:kernel-rt-5.14.21-150500.13.100.2.x86_64",
            "SUSE Linux Enterprise Micro 5.5:kernel-source-rt-5.14.21-150500.13.100.1.noarch"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2025-07-15T14:31:35Z",
          "details": "important"
        }
      ],
      "title": "CVE-2022-49980"
    },
    {
      "cve": "CVE-2022-49981",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2022-49981"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "In the Linux kernel, the following vulnerability has been resolved:\n\nHID: hidraw: fix memory leak in hidraw_release()\n\nFree the buffered reports before deleting the list entry.\n\nBUG: memory leak\nunreferenced object 0xffff88810e72f180 (size 32):\n  comm \"softirq\", pid 0, jiffies 4294945143 (age 16.080s)\n  hex dump (first 32 bytes):\n    64 f3 c6 6a d1 88 07 04 00 00 00 00 00 00 00 00  d..j............\n    00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00  ................\n  backtrace:\n    [\u003cffffffff814ac6c3\u003e] kmemdup+0x23/0x50 mm/util.c:128\n    [\u003cffffffff8357c1d2\u003e] kmemdup include/linux/fortify-string.h:440 [inline]\n    [\u003cffffffff8357c1d2\u003e] hidraw_report_event+0xa2/0x150 drivers/hid/hidraw.c:521\n    [\u003cffffffff8356ddad\u003e] hid_report_raw_event+0x27d/0x740 drivers/hid/hid-core.c:1992\n    [\u003cffffffff8356e41e\u003e] hid_input_report+0x1ae/0x270 drivers/hid/hid-core.c:2065\n    [\u003cffffffff835f0d3f\u003e] hid_irq_in+0x1ff/0x250 drivers/hid/usbhid/hid-core.c:284\n    [\u003cffffffff82d3c7f9\u003e] __usb_hcd_giveback_urb+0xf9/0x230 drivers/usb/core/hcd.c:1670\n    [\u003cffffffff82d3cc26\u003e] usb_hcd_giveback_urb+0x1b6/0x1d0 drivers/usb/core/hcd.c:1747\n    [\u003cffffffff82ef1e14\u003e] dummy_timer+0x8e4/0x14c0 drivers/usb/gadget/udc/dummy_hcd.c:1988\n    [\u003cffffffff812f50a8\u003e] call_timer_fn+0x38/0x200 kernel/time/timer.c:1474\n    [\u003cffffffff812f5586\u003e] expire_timers kernel/time/timer.c:1519 [inline]\n    [\u003cffffffff812f5586\u003e] __run_timers.part.0+0x316/0x430 kernel/time/timer.c:1790\n    [\u003cffffffff812f56e4\u003e] __run_timers kernel/time/timer.c:1768 [inline]\n    [\u003cffffffff812f56e4\u003e] run_timer_softirq+0x44/0x90 kernel/time/timer.c:1803\n    [\u003cffffffff848000e6\u003e] __do_softirq+0xe6/0x2ea kernel/softirq.c:571\n    [\u003cffffffff81246db0\u003e] invoke_softirq kernel/softirq.c:445 [inline]\n    [\u003cffffffff81246db0\u003e] __irq_exit_rcu kernel/softirq.c:650 [inline]\n    [\u003cffffffff81246db0\u003e] irq_exit_rcu+0xc0/0x110 kernel/softirq.c:662\n    [\u003cffffffff84574f02\u003e] sysvec_apic_timer_interrupt+0xa2/0xd0 arch/x86/kernel/apic/apic.c:1106\n    [\u003cffffffff84600c8b\u003e] asm_sysvec_apic_timer_interrupt+0x1b/0x20 arch/x86/include/asm/idtentry.h:649\n    [\u003cffffffff8458a070\u003e] native_safe_halt arch/x86/include/asm/irqflags.h:51 [inline]\n    [\u003cffffffff8458a070\u003e] arch_safe_halt arch/x86/include/asm/irqflags.h:89 [inline]\n    [\u003cffffffff8458a070\u003e] acpi_safe_halt drivers/acpi/processor_idle.c:111 [inline]\n    [\u003cffffffff8458a070\u003e] acpi_idle_do_entry+0xc0/0xd0 drivers/acpi/processor_idle.c:554",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "SUSE Linux Enterprise Micro 5.5:kernel-devel-rt-5.14.21-150500.13.100.1.noarch",
          "SUSE Linux Enterprise Micro 5.5:kernel-rt-5.14.21-150500.13.100.2.x86_64",
          "SUSE Linux Enterprise Micro 5.5:kernel-source-rt-5.14.21-150500.13.100.1.noarch"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2022-49981",
          "url": "https://www.suse.com/security/cve/CVE-2022-49981"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1245072 for CVE-2022-49981",
          "url": "https://bugzilla.suse.com/1245072"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "SUSE Linux Enterprise Micro 5.5:kernel-devel-rt-5.14.21-150500.13.100.1.noarch",
            "SUSE Linux Enterprise Micro 5.5:kernel-rt-5.14.21-150500.13.100.2.x86_64",
            "SUSE Linux Enterprise Micro 5.5:kernel-source-rt-5.14.21-150500.13.100.1.noarch"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 5.5,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
            "version": "3.1"
          },
          "products": [
            "SUSE Linux Enterprise Micro 5.5:kernel-devel-rt-5.14.21-150500.13.100.1.noarch",
            "SUSE Linux Enterprise Micro 5.5:kernel-rt-5.14.21-150500.13.100.2.x86_64",
            "SUSE Linux Enterprise Micro 5.5:kernel-source-rt-5.14.21-150500.13.100.1.noarch"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2025-07-15T14:31:35Z",
          "details": "moderate"
        }
      ],
      "title": "CVE-2022-49981"
    },
    {
      "cve": "CVE-2022-49982",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2022-49982"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "In the Linux kernel, the following vulnerability has been resolved:\n\nmedia: pvrusb2: fix memory leak in pvr_probe\n\nThe error handling code in pvr2_hdw_create forgets to unregister the\nv4l2 device. When pvr2_hdw_create returns back to pvr2_context_create,\nit calls pvr2_context_destroy to destroy context, but mp-\u003ehdw is NULL,\nwhich leads to that pvr2_hdw_destroy directly returns.\n\nFix this by adding v4l2_device_unregister to decrease the refcount of\nusb interface.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "SUSE Linux Enterprise Micro 5.5:kernel-devel-rt-5.14.21-150500.13.100.1.noarch",
          "SUSE Linux Enterprise Micro 5.5:kernel-rt-5.14.21-150500.13.100.2.x86_64",
          "SUSE Linux Enterprise Micro 5.5:kernel-source-rt-5.14.21-150500.13.100.1.noarch"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2022-49982",
          "url": "https://www.suse.com/security/cve/CVE-2022-49982"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1245069 for CVE-2022-49982",
          "url": "https://bugzilla.suse.com/1245069"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "SUSE Linux Enterprise Micro 5.5:kernel-devel-rt-5.14.21-150500.13.100.1.noarch",
            "SUSE Linux Enterprise Micro 5.5:kernel-rt-5.14.21-150500.13.100.2.x86_64",
            "SUSE Linux Enterprise Micro 5.5:kernel-source-rt-5.14.21-150500.13.100.1.noarch"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 5.5,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
            "version": "3.1"
          },
          "products": [
            "SUSE Linux Enterprise Micro 5.5:kernel-devel-rt-5.14.21-150500.13.100.1.noarch",
            "SUSE Linux Enterprise Micro 5.5:kernel-rt-5.14.21-150500.13.100.2.x86_64",
            "SUSE Linux Enterprise Micro 5.5:kernel-source-rt-5.14.21-150500.13.100.1.noarch"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2025-07-15T14:31:35Z",
          "details": "moderate"
        }
      ],
      "title": "CVE-2022-49982"
    },
    {
      "cve": "CVE-2022-49983",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2022-49983"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "In the Linux kernel, the following vulnerability has been resolved:\n\nudmabuf: Set the DMA mask for the udmabuf device (v2)\n\nIf the DMA mask is not set explicitly, the following warning occurs\nwhen the userspace tries to access the dma-buf via the CPU as\nreported by syzbot here:\n\nWARNING: CPU: 1 PID: 3595 at kernel/dma/mapping.c:188\n__dma_map_sg_attrs+0x181/0x1f0 kernel/dma/mapping.c:188\nModules linked in:\nCPU: 0 PID: 3595 Comm: syz-executor249 Not tainted\n5.17.0-rc2-syzkaller-00316-g0457e5153e0e #0\nHardware name: Google Google Compute Engine/Google Compute Engine, BIOS\nGoogle 01/01/2011\nRIP: 0010:__dma_map_sg_attrs+0x181/0x1f0 kernel/dma/mapping.c:188\nCode: 00 00 00 00 00 fc ff df 48 c1 e8 03 80 3c 10 00 75 71 4c 8b 3d c0\n83 b5 0d e9 db fe ff ff e8 b6 0f 13 00 0f 0b e8 af 0f 13 00 \u003c0f\u003e 0b 45\n   31 e4 e9 54 ff ff ff e8 a0 0f 13 00 49 8d 7f 50 48 b8 00\nRSP: 0018:ffffc90002a07d68 EFLAGS: 00010293\nRAX: 0000000000000000 RBX: 0000000000000000 RCX: 0000000000000000\nRDX: ffff88807e25e2c0 RSI: ffffffff81649e91 RDI: ffff88801b848408\nRBP: ffff88801b848000 R08: 0000000000000002 R09: ffff88801d86c74f\nR10: ffffffff81649d72 R11: 0000000000000001 R12: 0000000000000002\nR13: ffff88801d86c680 R14: 0000000000000001 R15: 0000000000000000\nFS:  0000555556e30300(0000) GS:ffff8880b9d00000(0000)\nknlGS:0000000000000000\nCS:  0010 DS: 0000 ES: 0000 CR0: 0000000080050033\nCR2: 00000000200000cc CR3: 000000001d74a000 CR4: 00000000003506e0\nDR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000\nDR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400\nCall Trace:\n \u003cTASK\u003e\n dma_map_sgtable+0x70/0xf0 kernel/dma/mapping.c:264\n get_sg_table.isra.0+0xe0/0x160 drivers/dma-buf/udmabuf.c:72\n begin_cpu_udmabuf+0x130/0x1d0 drivers/dma-buf/udmabuf.c:126\n dma_buf_begin_cpu_access+0xfd/0x1d0 drivers/dma-buf/dma-buf.c:1164\n dma_buf_ioctl+0x259/0x2b0 drivers/dma-buf/dma-buf.c:363\n vfs_ioctl fs/ioctl.c:51 [inline]\n __do_sys_ioctl fs/ioctl.c:874 [inline]\n __se_sys_ioctl fs/ioctl.c:860 [inline]\n __x64_sys_ioctl+0x193/0x200 fs/ioctl.c:860\n do_syscall_x64 arch/x86/entry/common.c:50 [inline]\n do_syscall_64+0x35/0xb0 arch/x86/entry/common.c:80\n entry_SYSCALL_64_after_hwframe+0x44/0xae\nRIP: 0033:0x7f62fcf530f9\nCode: 28 c3 e8 2a 14 00 00 66 2e 0f 1f 84 00 00 00 00 00 48 89 f8 48 89\nf7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 \u003c48\u003e 3d 01\nf0 ff ff 73 01 c3 48 c7 c1 c0 ff ff ff f7 d8 64 89 01 48\nRSP: 002b:00007ffe3edab9b8 EFLAGS: 00000246 ORIG_RAX: 0000000000000010\nRAX: ffffffffffffffda RBX: 0000000000000000 RCX: 00007f62fcf530f9\nRDX: 0000000020000200 RSI: 0000000040086200 RDI: 0000000000000006\nRBP: 00007f62fcf170e0 R08: 0000000000000000 R09: 0000000000000000\nR10: 0000000000000000 R11: 0000000000000246 R12: 00007f62fcf17170\nR13: 0000000000000000 R14: 0000000000000000 R15: 0000000000000000\n \u003c/TASK\u003e\n\nv2: Dont\u0027t forget to deregister if DMA mask setup fails.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "SUSE Linux Enterprise Micro 5.5:kernel-devel-rt-5.14.21-150500.13.100.1.noarch",
          "SUSE Linux Enterprise Micro 5.5:kernel-rt-5.14.21-150500.13.100.2.x86_64",
          "SUSE Linux Enterprise Micro 5.5:kernel-source-rt-5.14.21-150500.13.100.1.noarch"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2022-49983",
          "url": "https://www.suse.com/security/cve/CVE-2022-49983"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1245092 for CVE-2022-49983",
          "url": "https://bugzilla.suse.com/1245092"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "SUSE Linux Enterprise Micro 5.5:kernel-devel-rt-5.14.21-150500.13.100.1.noarch",
            "SUSE Linux Enterprise Micro 5.5:kernel-rt-5.14.21-150500.13.100.2.x86_64",
            "SUSE Linux Enterprise Micro 5.5:kernel-source-rt-5.14.21-150500.13.100.1.noarch"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 5.5,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
            "version": "3.1"
          },
          "products": [
            "SUSE Linux Enterprise Micro 5.5:kernel-devel-rt-5.14.21-150500.13.100.1.noarch",
            "SUSE Linux Enterprise Micro 5.5:kernel-rt-5.14.21-150500.13.100.2.x86_64",
            "SUSE Linux Enterprise Micro 5.5:kernel-source-rt-5.14.21-150500.13.100.1.noarch"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2025-07-15T14:31:35Z",
          "details": "moderate"
        }
      ],
      "title": "CVE-2022-49983"
    },
    {
      "cve": "CVE-2022-49984",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2022-49984"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "In the Linux kernel, the following vulnerability has been resolved:\n\nHID: steam: Prevent NULL pointer dereference in steam_{recv,send}_report\n\nIt is possible for a malicious device to forgo submitting a Feature\nReport.  The HID Steam driver presently makes no prevision for this\nand de-references the \u0027struct hid_report\u0027 pointer obtained from the\nHID devices without first checking its validity.  Let\u0027s change that.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "SUSE Linux Enterprise Micro 5.5:kernel-devel-rt-5.14.21-150500.13.100.1.noarch",
          "SUSE Linux Enterprise Micro 5.5:kernel-rt-5.14.21-150500.13.100.2.x86_64",
          "SUSE Linux Enterprise Micro 5.5:kernel-source-rt-5.14.21-150500.13.100.1.noarch"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2022-49984",
          "url": "https://www.suse.com/security/cve/CVE-2022-49984"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1244950 for CVE-2022-49984",
          "url": "https://bugzilla.suse.com/1244950"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "SUSE Linux Enterprise Micro 5.5:kernel-devel-rt-5.14.21-150500.13.100.1.noarch",
            "SUSE Linux Enterprise Micro 5.5:kernel-rt-5.14.21-150500.13.100.2.x86_64",
            "SUSE Linux Enterprise Micro 5.5:kernel-source-rt-5.14.21-150500.13.100.1.noarch"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 5.5,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
            "version": "3.1"
          },
          "products": [
            "SUSE Linux Enterprise Micro 5.5:kernel-devel-rt-5.14.21-150500.13.100.1.noarch",
            "SUSE Linux Enterprise Micro 5.5:kernel-rt-5.14.21-150500.13.100.2.x86_64",
            "SUSE Linux Enterprise Micro 5.5:kernel-source-rt-5.14.21-150500.13.100.1.noarch"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2025-07-15T14:31:35Z",
          "details": "moderate"
        }
      ],
      "title": "CVE-2022-49984"
    },
    {
      "cve": "CVE-2022-49985",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2022-49985"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "In the Linux kernel, the following vulnerability has been resolved:\n\nbpf: Don\u0027t use tnum_range on array range checking for poke descriptors\n\nHsin-Wei reported a KASAN splat triggered by their BPF runtime fuzzer which\nis based on a customized syzkaller:\n\n  BUG: KASAN: slab-out-of-bounds in bpf_int_jit_compile+0x1257/0x13f0\n  Read of size 8 at addr ffff888004e90b58 by task syz-executor.0/1489\n  CPU: 1 PID: 1489 Comm: syz-executor.0 Not tainted 5.19.0 #1\n  Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS\n  1.13.0-1ubuntu1.1 04/01/2014\n  Call Trace:\n   \u003cTASK\u003e\n   dump_stack_lvl+0x9c/0xc9\n   print_address_description.constprop.0+0x1f/0x1f0\n   ? bpf_int_jit_compile+0x1257/0x13f0\n   kasan_report.cold+0xeb/0x197\n   ? kvmalloc_node+0x170/0x200\n   ? bpf_int_jit_compile+0x1257/0x13f0\n   bpf_int_jit_compile+0x1257/0x13f0\n   ? arch_prepare_bpf_dispatcher+0xd0/0xd0\n   ? rcu_read_lock_sched_held+0x43/0x70\n   bpf_prog_select_runtime+0x3e8/0x640\n   ? bpf_obj_name_cpy+0x149/0x1b0\n   bpf_prog_load+0x102f/0x2220\n   ? __bpf_prog_put.constprop.0+0x220/0x220\n   ? find_held_lock+0x2c/0x110\n   ? __might_fault+0xd6/0x180\n   ? lock_downgrade+0x6e0/0x6e0\n   ? lock_is_held_type+0xa6/0x120\n   ? __might_fault+0x147/0x180\n   __sys_bpf+0x137b/0x6070\n   ? bpf_perf_link_attach+0x530/0x530\n   ? new_sync_read+0x600/0x600\n   ? __fget_files+0x255/0x450\n   ? lock_downgrade+0x6e0/0x6e0\n   ? fput+0x30/0x1a0\n   ? ksys_write+0x1a8/0x260\n   __x64_sys_bpf+0x7a/0xc0\n   ? syscall_enter_from_user_mode+0x21/0x70\n   do_syscall_64+0x3b/0x90\n   entry_SYSCALL_64_after_hwframe+0x63/0xcd\n  RIP: 0033:0x7f917c4e2c2d\n\nThe problem here is that a range of tnum_range(0, map-\u003emax_entries - 1) has\nlimited ability to represent the concrete tight range with the tnum as the\nset of resulting states from value + mask can result in a superset of the\nactual intended range, and as such a tnum_in(range, reg-\u003evar_off) check may\nyield true when it shouldn\u0027t, for example tnum_range(0, 2) would result in\n00XX -\u003e v = 0000, m = 0011 such that the intended set of {0, 1, 2} is here\nrepresented by a less precise superset of {0, 1, 2, 3}. As the register is\nknown const scalar, really just use the concrete reg-\u003evar_off.value for the\nupper index check.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "SUSE Linux Enterprise Micro 5.5:kernel-devel-rt-5.14.21-150500.13.100.1.noarch",
          "SUSE Linux Enterprise Micro 5.5:kernel-rt-5.14.21-150500.13.100.2.x86_64",
          "SUSE Linux Enterprise Micro 5.5:kernel-source-rt-5.14.21-150500.13.100.1.noarch"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2022-49985",
          "url": "https://www.suse.com/security/cve/CVE-2022-49985"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1244956 for CVE-2022-49985",
          "url": "https://bugzilla.suse.com/1244956"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "SUSE Linux Enterprise Micro 5.5:kernel-devel-rt-5.14.21-150500.13.100.1.noarch",
            "SUSE Linux Enterprise Micro 5.5:kernel-rt-5.14.21-150500.13.100.2.x86_64",
            "SUSE Linux Enterprise Micro 5.5:kernel-source-rt-5.14.21-150500.13.100.1.noarch"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 5.5,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
            "version": "3.1"
          },
          "products": [
            "SUSE Linux Enterprise Micro 5.5:kernel-devel-rt-5.14.21-150500.13.100.1.noarch",
            "SUSE Linux Enterprise Micro 5.5:kernel-rt-5.14.21-150500.13.100.2.x86_64",
            "SUSE Linux Enterprise Micro 5.5:kernel-source-rt-5.14.21-150500.13.100.1.noarch"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2025-07-15T14:31:35Z",
          "details": "moderate"
        }
      ],
      "title": "CVE-2022-49985"
    },
    {
      "cve": "CVE-2022-49986",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2022-49986"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "In the Linux kernel, the following vulnerability has been resolved:\n\nscsi: storvsc: Remove WQ_MEM_RECLAIM from storvsc_error_wq\n\nstorvsc_error_wq workqueue should not be marked as WQ_MEM_RECLAIM as it\ndoesn\u0027t need to make forward progress under memory pressure.  Marking this\nworkqueue as WQ_MEM_RECLAIM may cause deadlock while flushing a\nnon-WQ_MEM_RECLAIM workqueue.  In the current state it causes the following\nwarning:\n\n[   14.506347] ------------[ cut here ]------------\n[   14.506354] workqueue: WQ_MEM_RECLAIM storvsc_error_wq_0:storvsc_remove_lun is flushing !WQ_MEM_RECLAIM events_freezable_power_:disk_events_workfn\n[   14.506360] WARNING: CPU: 0 PID: 8 at \u003c-snip-\u003ekernel/workqueue.c:2623 check_flush_dependency+0xb5/0x130\n[   14.506390] CPU: 0 PID: 8 Comm: kworker/u4:0 Not tainted 5.4.0-1086-azure #91~18.04.1-Ubuntu\n[   14.506391] Hardware name: Microsoft Corporation Virtual Machine/Virtual Machine, BIOS Hyper-V UEFI Release v4.1 05/09/2022\n[   14.506393] Workqueue: storvsc_error_wq_0 storvsc_remove_lun\n[   14.506395] RIP: 0010:check_flush_dependency+0xb5/0x130\n\t\t\u003c-snip-\u003e\n[   14.506408] Call Trace:\n[   14.506412]  __flush_work+0xf1/0x1c0\n[   14.506414]  __cancel_work_timer+0x12f/0x1b0\n[   14.506417]  ? kernfs_put+0xf0/0x190\n[   14.506418]  cancel_delayed_work_sync+0x13/0x20\n[   14.506420]  disk_block_events+0x78/0x80\n[   14.506421]  del_gendisk+0x3d/0x2f0\n[   14.506423]  sr_remove+0x28/0x70\n[   14.506427]  device_release_driver_internal+0xef/0x1c0\n[   14.506428]  device_release_driver+0x12/0x20\n[   14.506429]  bus_remove_device+0xe1/0x150\n[   14.506431]  device_del+0x167/0x380\n[   14.506432]  __scsi_remove_device+0x11d/0x150\n[   14.506433]  scsi_remove_device+0x26/0x40\n[   14.506434]  storvsc_remove_lun+0x40/0x60\n[   14.506436]  process_one_work+0x209/0x400\n[   14.506437]  worker_thread+0x34/0x400\n[   14.506439]  kthread+0x121/0x140\n[   14.506440]  ? process_one_work+0x400/0x400\n[   14.506441]  ? kthread_park+0x90/0x90\n[   14.506443]  ret_from_fork+0x35/0x40\n[   14.506445] ---[ end trace 2d9633159fdc6ee7 ]---",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "SUSE Linux Enterprise Micro 5.5:kernel-devel-rt-5.14.21-150500.13.100.1.noarch",
          "SUSE Linux Enterprise Micro 5.5:kernel-rt-5.14.21-150500.13.100.2.x86_64",
          "SUSE Linux Enterprise Micro 5.5:kernel-source-rt-5.14.21-150500.13.100.1.noarch"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2022-49986",
          "url": "https://www.suse.com/security/cve/CVE-2022-49986"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1244948 for CVE-2022-49986",
          "url": "https://bugzilla.suse.com/1244948"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "SUSE Linux Enterprise Micro 5.5:kernel-devel-rt-5.14.21-150500.13.100.1.noarch",
            "SUSE Linux Enterprise Micro 5.5:kernel-rt-5.14.21-150500.13.100.2.x86_64",
            "SUSE Linux Enterprise Micro 5.5:kernel-source-rt-5.14.21-150500.13.100.1.noarch"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 5.5,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
            "version": "3.1"
          },
          "products": [
            "SUSE Linux Enterprise Micro 5.5:kernel-devel-rt-5.14.21-150500.13.100.1.noarch",
            "SUSE Linux Enterprise Micro 5.5:kernel-rt-5.14.21-150500.13.100.2.x86_64",
            "SUSE Linux Enterprise Micro 5.5:kernel-source-rt-5.14.21-150500.13.100.1.noarch"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2025-07-15T14:31:35Z",
          "details": "moderate"
        }
      ],
      "title": "CVE-2022-49986"
    },
    {
      "cve": "CVE-2022-49987",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2022-49987"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "In the Linux kernel, the following vulnerability has been resolved:\n\nmd: call __md_stop_writes in md_stop\n\nFrom the link [1], we can see raid1d was running even after the path\nraid_dtr -\u003e md_stop -\u003e __md_stop.\n\nLet\u0027s stop write first in destructor to align with normal md-raid to\nfix the KASAN issue.\n\n[1]. https://lore.kernel.org/linux-raid/CAPhsuW5gc4AakdGNdF8ubpezAuDLFOYUO_sfMZcec6hQFm8nhg@mail.gmail.com/T/#m7f12bf90481c02c6d2da68c64aeed4779b7df74a",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "SUSE Linux Enterprise Micro 5.5:kernel-devel-rt-5.14.21-150500.13.100.1.noarch",
          "SUSE Linux Enterprise Micro 5.5:kernel-rt-5.14.21-150500.13.100.2.x86_64",
          "SUSE Linux Enterprise Micro 5.5:kernel-source-rt-5.14.21-150500.13.100.1.noarch"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2022-49987",
          "url": "https://www.suse.com/security/cve/CVE-2022-49987"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1245024 for CVE-2022-49987",
          "url": "https://bugzilla.suse.com/1245024"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "SUSE Linux Enterprise Micro 5.5:kernel-devel-rt-5.14.21-150500.13.100.1.noarch",
            "SUSE Linux Enterprise Micro 5.5:kernel-rt-5.14.21-150500.13.100.2.x86_64",
            "SUSE Linux Enterprise Micro 5.5:kernel-source-rt-5.14.21-150500.13.100.1.noarch"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 5.5,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
            "version": "3.1"
          },
          "products": [
            "SUSE Linux Enterprise Micro 5.5:kernel-devel-rt-5.14.21-150500.13.100.1.noarch",
            "SUSE Linux Enterprise Micro 5.5:kernel-rt-5.14.21-150500.13.100.2.x86_64",
            "SUSE Linux Enterprise Micro 5.5:kernel-source-rt-5.14.21-150500.13.100.1.noarch"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2025-07-15T14:31:35Z",
          "details": "moderate"
        }
      ],
      "title": "CVE-2022-49987"
    },
    {
      "cve": "CVE-2022-49989",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2022-49989"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "In the Linux kernel, the following vulnerability has been resolved:\n\nxen/privcmd: fix error exit of privcmd_ioctl_dm_op()\n\nThe error exit of privcmd_ioctl_dm_op() is calling unlock_pages()\npotentially with pages being NULL, leading to a NULL dereference.\n\nAdditionally lock_pages() doesn\u0027t check for pin_user_pages_fast()\nhaving been completely successful, resulting in potentially not\nlocking all pages into memory. This could result in sporadic failures\nwhen using the related memory in user mode.\n\nFix all of that by calling unlock_pages() always with the real number\nof pinned pages, which will be zero in case pages being NULL, and by\nchecking the number of pages pinned by pin_user_pages_fast() matching\nthe expected number of pages.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "SUSE Linux Enterprise Micro 5.5:kernel-devel-rt-5.14.21-150500.13.100.1.noarch",
          "SUSE Linux Enterprise Micro 5.5:kernel-rt-5.14.21-150500.13.100.2.x86_64",
          "SUSE Linux Enterprise Micro 5.5:kernel-source-rt-5.14.21-150500.13.100.1.noarch"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2022-49989",
          "url": "https://www.suse.com/security/cve/CVE-2022-49989"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1245007 for CVE-2022-49989",
          "url": "https://bugzilla.suse.com/1245007"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "SUSE Linux Enterprise Micro 5.5:kernel-devel-rt-5.14.21-150500.13.100.1.noarch",
            "SUSE Linux Enterprise Micro 5.5:kernel-rt-5.14.21-150500.13.100.2.x86_64",
            "SUSE Linux Enterprise Micro 5.5:kernel-source-rt-5.14.21-150500.13.100.1.noarch"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 5.5,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
            "version": "3.1"
          },
          "products": [
            "SUSE Linux Enterprise Micro 5.5:kernel-devel-rt-5.14.21-150500.13.100.1.noarch",
            "SUSE Linux Enterprise Micro 5.5:kernel-rt-5.14.21-150500.13.100.2.x86_64",
            "SUSE Linux Enterprise Micro 5.5:kernel-source-rt-5.14.21-150500.13.100.1.noarch"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2025-07-15T14:31:35Z",
          "details": "moderate"
        }
      ],
      "title": "CVE-2022-49989"
    },
    {
      "cve": "CVE-2022-49990",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2022-49990"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "In the Linux kernel, the following vulnerability has been resolved:\n\ns390: fix double free of GS and RI CBs on fork() failure\n\nThe pointers for guarded storage and runtime instrumentation control\nblocks are stored in the thread_struct of the associated task. These\npointers are initially copied on fork() via arch_dup_task_struct()\nand then cleared via copy_thread() before fork() returns. If fork()\nhappens to fail after the initial task dup and before copy_thread(),\nthe newly allocated task and associated thread_struct memory are\nfreed via free_task() -\u003e arch_release_task_struct(). This results in\na double free of the guarded storage and runtime info structs\nbecause the fields in the failed task still refer to memory\nassociated with the source task.\n\nThis problem can manifest as a BUG_ON() in set_freepointer() (with\nCONFIG_SLAB_FREELIST_HARDENED enabled) or KASAN splat (if enabled)\nwhen running trinity syscall fuzz tests on s390x. To avoid this\nproblem, clear the associated pointer fields in\narch_dup_task_struct() immediately after the new task is copied.\nNote that the RI flag is still cleared in copy_thread() because it\nresides in thread stack memory and that is where stack info is\ncopied.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "SUSE Linux Enterprise Micro 5.5:kernel-devel-rt-5.14.21-150500.13.100.1.noarch",
          "SUSE Linux Enterprise Micro 5.5:kernel-rt-5.14.21-150500.13.100.2.x86_64",
          "SUSE Linux Enterprise Micro 5.5:kernel-source-rt-5.14.21-150500.13.100.1.noarch"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2022-49990",
          "url": "https://www.suse.com/security/cve/CVE-2022-49990"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1245006 for CVE-2022-49990",
          "url": "https://bugzilla.suse.com/1245006"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "SUSE Linux Enterprise Micro 5.5:kernel-devel-rt-5.14.21-150500.13.100.1.noarch",
            "SUSE Linux Enterprise Micro 5.5:kernel-rt-5.14.21-150500.13.100.2.x86_64",
            "SUSE Linux Enterprise Micro 5.5:kernel-source-rt-5.14.21-150500.13.100.1.noarch"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 5.5,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
            "version": "3.1"
          },
          "products": [
            "SUSE Linux Enterprise Micro 5.5:kernel-devel-rt-5.14.21-150500.13.100.1.noarch",
            "SUSE Linux Enterprise Micro 5.5:kernel-rt-5.14.21-150500.13.100.2.x86_64",
            "SUSE Linux Enterprise Micro 5.5:kernel-source-rt-5.14.21-150500.13.100.1.noarch"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2025-07-15T14:31:35Z",
          "details": "moderate"
        }
      ],
      "title": "CVE-2022-49990"
    },
    {
      "cve": "CVE-2022-49993",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2022-49993"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "In the Linux kernel, the following vulnerability has been resolved:\n\nloop: Check for overflow while configuring loop\n\nThe userspace can configure a loop using an ioctl call, wherein\na configuration of type loop_config is passed (see lo_ioctl()\u0027s\ncase on line 1550 of drivers/block/loop.c). This proceeds to call\nloop_configure() which in turn calls loop_set_status_from_info()\n(see line 1050 of loop.c), passing \u0026config-\u003einfo which is of type\nloop_info64*. This function then sets the appropriate values, like\nthe offset.\n\nloop_device has lo_offset of type loff_t (see line 52 of loop.c),\nwhich is typdef-chained to long long, whereas loop_info64 has\nlo_offset of type __u64 (see line 56 of include/uapi/linux/loop.h).\n\nThe function directly copies offset from info to the device as\nfollows (See line 980 of loop.c):\n\tlo-\u003elo_offset = info-\u003elo_offset;\n\nThis results in an overflow, which triggers a warning in iomap_iter()\ndue to a call to iomap_iter_done() which has:\n\tWARN_ON_ONCE(iter-\u003eiomap.offset \u003e iter-\u003epos);\n\nThus, check for negative value during loop_set_status_from_info().\n\nBug report: https://syzkaller.appspot.com/bug?id=c620fe14aac810396d3c3edc9ad73848bf69a29e",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "SUSE Linux Enterprise Micro 5.5:kernel-devel-rt-5.14.21-150500.13.100.1.noarch",
          "SUSE Linux Enterprise Micro 5.5:kernel-rt-5.14.21-150500.13.100.2.x86_64",
          "SUSE Linux Enterprise Micro 5.5:kernel-source-rt-5.14.21-150500.13.100.1.noarch"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2022-49993",
          "url": "https://www.suse.com/security/cve/CVE-2022-49993"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1245121 for CVE-2022-49993",
          "url": "https://bugzilla.suse.com/1245121"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "SUSE Linux Enterprise Micro 5.5:kernel-devel-rt-5.14.21-150500.13.100.1.noarch",
            "SUSE Linux Enterprise Micro 5.5:kernel-rt-5.14.21-150500.13.100.2.x86_64",
            "SUSE Linux Enterprise Micro 5.5:kernel-source-rt-5.14.21-150500.13.100.1.noarch"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 5.5,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
            "version": "3.1"
          },
          "products": [
            "SUSE Linux Enterprise Micro 5.5:kernel-devel-rt-5.14.21-150500.13.100.1.noarch",
            "SUSE Linux Enterprise Micro 5.5:kernel-rt-5.14.21-150500.13.100.2.x86_64",
            "SUSE Linux Enterprise Micro 5.5:kernel-source-rt-5.14.21-150500.13.100.1.noarch"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2025-07-15T14:31:35Z",
          "details": "moderate"
        }
      ],
      "title": "CVE-2022-49993"
    },
    {
      "cve": "CVE-2022-49995",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2022-49995"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "In the Linux kernel, the following vulnerability has been resolved:\n\nwriteback: avoid use-after-free after removing device\n\nWhen a disk is removed, bdi_unregister gets called to stop further\nwriteback and wait for associated delayed work to complete.  However,\nwb_inode_writeback_end() may schedule bandwidth estimation dwork after\nthis has completed, which can result in the timer attempting to access the\njust freed bdi_writeback.\n\nFix this by checking if the bdi_writeback is alive, similar to when\nscheduling writeback work.\n\nSince this requires wb-\u003ework_lock, and wb_inode_writeback_end() may get\ncalled from interrupt, switch wb-\u003ework_lock to an irqsafe lock.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "SUSE Linux Enterprise Micro 5.5:kernel-devel-rt-5.14.21-150500.13.100.1.noarch",
          "SUSE Linux Enterprise Micro 5.5:kernel-rt-5.14.21-150500.13.100.2.x86_64",
          "SUSE Linux Enterprise Micro 5.5:kernel-source-rt-5.14.21-150500.13.100.1.noarch"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2022-49995",
          "url": "https://www.suse.com/security/cve/CVE-2022-49995"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1245012 for CVE-2022-49995",
          "url": "https://bugzilla.suse.com/1245012"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "SUSE Linux Enterprise Micro 5.5:kernel-devel-rt-5.14.21-150500.13.100.1.noarch",
            "SUSE Linux Enterprise Micro 5.5:kernel-rt-5.14.21-150500.13.100.2.x86_64",
            "SUSE Linux Enterprise Micro 5.5:kernel-source-rt-5.14.21-150500.13.100.1.noarch"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 5.5,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
            "version": "3.1"
          },
          "products": [
            "SUSE Linux Enterprise Micro 5.5:kernel-devel-rt-5.14.21-150500.13.100.1.noarch",
            "SUSE Linux Enterprise Micro 5.5:kernel-rt-5.14.21-150500.13.100.2.x86_64",
            "SUSE Linux Enterprise Micro 5.5:kernel-source-rt-5.14.21-150500.13.100.1.noarch"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2025-07-15T14:31:35Z",
          "details": "moderate"
        }
      ],
      "title": "CVE-2022-49995"
    },
    {
      "cve": "CVE-2022-49999",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2022-49999"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "In the Linux kernel, the following vulnerability has been resolved:\n\nbtrfs: fix space cache corruption and potential double allocations\n\nWhen testing space_cache v2 on a large set of machines, we encountered a\nfew symptoms:\n\n1. \"unable to add free space :-17\" (EEXIST) errors.\n2. Missing free space info items, sometimes caught with a \"missing free\n   space info for X\" error.\n3. Double-accounted space: ranges that were allocated in the extent tree\n   and also marked as free in the free space tree, ranges that were\n   marked as allocated twice in the extent tree, or ranges that were\n   marked as free twice in the free space tree. If the latter made it\n   onto disk, the next reboot would hit the BUG_ON() in\n   add_new_free_space().\n4. On some hosts with no on-disk corruption or error messages, the\n   in-memory space cache (dumped with drgn) disagreed with the free\n   space tree.\n\nAll of these symptoms have the same underlying cause: a race between\ncaching the free space for a block group and returning free space to the\nin-memory space cache for pinned extents causes us to double-add a free\nrange to the space cache. This race exists when free space is cached\nfrom the free space tree (space_cache=v2) or the extent tree\n(nospace_cache, or space_cache=v1 if the cache needs to be regenerated).\nstruct btrfs_block_group::last_byte_to_unpin and struct\nbtrfs_block_group::progress are supposed to protect against this race,\nbut commit d0c2f4fa555e (\"btrfs: make concurrent fsyncs wait less when\nwaiting for a transaction commit\") subtly broke this by allowing\nmultiple transactions to be unpinning extents at the same time.\n\nSpecifically, the race is as follows:\n\n1. An extent is deleted from an uncached block group in transaction A.\n2. btrfs_commit_transaction() is called for transaction A.\n3. btrfs_run_delayed_refs() -\u003e __btrfs_free_extent() runs the delayed\n   ref for the deleted extent.\n4. __btrfs_free_extent() -\u003e do_free_extent_accounting() -\u003e\n   add_to_free_space_tree() adds the deleted extent back to the free\n   space tree.\n5. do_free_extent_accounting() -\u003e btrfs_update_block_group() -\u003e\n   btrfs_cache_block_group() queues up the block group to get cached.\n   block_group-\u003eprogress is set to block_group-\u003estart.\n6. btrfs_commit_transaction() for transaction A calls\n   switch_commit_roots(). It sets block_group-\u003elast_byte_to_unpin to\n   block_group-\u003eprogress, which is block_group-\u003estart because the block\n   group hasn\u0027t been cached yet.\n7. The caching thread gets to our block group. Since the commit roots\n   were already switched, load_free_space_tree() sees the deleted extent\n   as free and adds it to the space cache. It finishes caching and sets\n   block_group-\u003eprogress to U64_MAX.\n8. btrfs_commit_transaction() advances transaction A to\n   TRANS_STATE_SUPER_COMMITTED.\n9. fsync calls btrfs_commit_transaction() for transaction B. Since\n   transaction A is already in TRANS_STATE_SUPER_COMMITTED and the\n   commit is for fsync, it advances.\n10. btrfs_commit_transaction() for transaction B calls\n    switch_commit_roots(). This time, the block group has already been\n    cached, so it sets block_group-\u003elast_byte_to_unpin to U64_MAX.\n11. btrfs_commit_transaction() for transaction A calls\n    btrfs_finish_extent_commit(), which calls unpin_extent_range() for\n    the deleted extent. It sees last_byte_to_unpin set to U64_MAX (by\n    transaction B!), so it adds the deleted extent to the space cache\n    again!\n\nThis explains all of our symptoms above:\n\n* If the sequence of events is exactly as described above, when the free\n  space is re-added in step 11, it will fail with EEXIST.\n* If another thread reallocates the deleted extent in between steps 7\n  and 11, then step 11 will silently re-add that space to the space\n  cache as free even though it is actually allocated. Then, if that\n  space is allocated *again*, the free space tree will be corrupted\n  (namely, the wrong item will be deleted).\n* If we don\u0027t catch this free space tree corr\n---truncated---",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "SUSE Linux Enterprise Micro 5.5:kernel-devel-rt-5.14.21-150500.13.100.1.noarch",
          "SUSE Linux Enterprise Micro 5.5:kernel-rt-5.14.21-150500.13.100.2.x86_64",
          "SUSE Linux Enterprise Micro 5.5:kernel-source-rt-5.14.21-150500.13.100.1.noarch"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2022-49999",
          "url": "https://www.suse.com/security/cve/CVE-2022-49999"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1245019 for CVE-2022-49999",
          "url": "https://bugzilla.suse.com/1245019"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "SUSE Linux Enterprise Micro 5.5:kernel-devel-rt-5.14.21-150500.13.100.1.noarch",
            "SUSE Linux Enterprise Micro 5.5:kernel-rt-5.14.21-150500.13.100.2.x86_64",
            "SUSE Linux Enterprise Micro 5.5:kernel-source-rt-5.14.21-150500.13.100.1.noarch"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 5.5,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
            "version": "3.1"
          },
          "products": [
            "SUSE Linux Enterprise Micro 5.5:kernel-devel-rt-5.14.21-150500.13.100.1.noarch",
            "SUSE Linux Enterprise Micro 5.5:kernel-rt-5.14.21-150500.13.100.2.x86_64",
            "SUSE Linux Enterprise Micro 5.5:kernel-source-rt-5.14.21-150500.13.100.1.noarch"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2025-07-15T14:31:35Z",
          "details": "moderate"
        }
      ],
      "title": "CVE-2022-49999"
    },
    {
      "cve": "CVE-2022-50002",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2022-50002"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "In the Linux kernel, the following vulnerability has been resolved:\n\nnet/mlx5: LAG, fix logic over MLX5_LAG_FLAG_NDEVS_READY\n\nOnly set MLX5_LAG_FLAG_NDEVS_READY if both netdevices are registered.\nDoing so guarantees that both ldev-\u003epf[MLX5_LAG_P0].dev and\nldev-\u003epf[MLX5_LAG_P1].dev have valid pointers when\nMLX5_LAG_FLAG_NDEVS_READY is set.\n\nThe core issue is asymmetry in setting MLX5_LAG_FLAG_NDEVS_READY and\nclearing it. Setting it is done wrongly when both\nldev-\u003epf[MLX5_LAG_P0].dev and ldev-\u003epf[MLX5_LAG_P1].dev are set;\nclearing it is done right when either of ldev-\u003epf[i].netdev is cleared.\n\nConsider the following scenario:\n1. PF0 loads and sets ldev-\u003epf[MLX5_LAG_P0].dev to a valid pointer\n2. PF1 loads and sets both ldev-\u003epf[MLX5_LAG_P1].dev and\n   ldev-\u003epf[MLX5_LAG_P1].netdev with valid pointers. This results in\n   MLX5_LAG_FLAG_NDEVS_READY is set.\n3. PF0 is unloaded before setting dev-\u003epf[MLX5_LAG_P0].netdev.\n   MLX5_LAG_FLAG_NDEVS_READY remains set.\n\nFurther execution of mlx5_do_bond() will result in null pointer\ndereference when calling mlx5_lag_is_multipath()\n\nThis patch fixes the following call trace actually encountered:\n\n[ 1293.475195] BUG: kernel NULL pointer dereference, address: 00000000000009a8\n[ 1293.478756] #PF: supervisor read access in kernel mode\n[ 1293.481320] #PF: error_code(0x0000) - not-present page\n[ 1293.483686] PGD 0 P4D 0\n[ 1293.484434] Oops: 0000 [#1] SMP PTI\n[ 1293.485377] CPU: 1 PID: 23690 Comm: kworker/u16:2 Not tainted 5.18.0-rc5_for_upstream_min_debug_2022_05_05_10_13 #1\n[ 1293.488039] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS rel-1.13.0-0-gf21b5a4aeb02-prebuilt.qemu.org 04/01/2014\n[ 1293.490836] Workqueue: mlx5_lag mlx5_do_bond_work [mlx5_core]\n[ 1293.492448] RIP: 0010:mlx5_lag_is_multipath+0x5/0x50 [mlx5_core]\n[ 1293.494044] Code: e8 70 40 ff e0 48 8b 14 24 48 83 05 5c 1a 1b 00 01 e9 19 ff ff ff 48 83 05 47 1a 1b 00 01 eb d7 0f 1f 44 00 00 0f 1f 44 00 00 \u003c48\u003e 8b 87 a8 09 00 00 48 85 c0 74 26 48 83 05 a7 1b 1b 00 01 41 b8\n[ 1293.498673] RSP: 0018:ffff88811b2fbe40 EFLAGS: 00010202\n[ 1293.500152] RAX: ffff88818a94e1c0 RBX: ffff888165eca6c0 RCX: 0000000000000000\n[ 1293.501841] RDX: 0000000000000001 RSI: ffff88818a94e1c0 RDI: 0000000000000000\n[ 1293.503585] RBP: 0000000000000000 R08: ffff888119886740 R09: ffff888165eca73c\n[ 1293.505286] R10: 0000000000000018 R11: 0000000000000018 R12: ffff88818a94e1c0\n[ 1293.506979] R13: ffff888112729800 R14: 0000000000000000 R15: ffff888112729858\n[ 1293.508753] FS:  0000000000000000(0000) GS:ffff88852cc40000(0000) knlGS:0000000000000000\n[ 1293.510782] CS:  0010 DS: 0000 ES: 0000 CR0: 0000000080050033\n[ 1293.512265] CR2: 00000000000009a8 CR3: 00000001032d4002 CR4: 0000000000370ea0\n[ 1293.514001] DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000\n[ 1293.515806] DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "SUSE Linux Enterprise Micro 5.5:kernel-devel-rt-5.14.21-150500.13.100.1.noarch",
          "SUSE Linux Enterprise Micro 5.5:kernel-rt-5.14.21-150500.13.100.2.x86_64",
          "SUSE Linux Enterprise Micro 5.5:kernel-source-rt-5.14.21-150500.13.100.1.noarch"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2022-50002",
          "url": "https://www.suse.com/security/cve/CVE-2022-50002"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1245023 for CVE-2022-50002",
          "url": "https://bugzilla.suse.com/1245023"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "SUSE Linux Enterprise Micro 5.5:kernel-devel-rt-5.14.21-150500.13.100.1.noarch",
            "SUSE Linux Enterprise Micro 5.5:kernel-rt-5.14.21-150500.13.100.2.x86_64",
            "SUSE Linux Enterprise Micro 5.5:kernel-source-rt-5.14.21-150500.13.100.1.noarch"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 5.5,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
            "version": "3.1"
          },
          "products": [
            "SUSE Linux Enterprise Micro 5.5:kernel-devel-rt-5.14.21-150500.13.100.1.noarch",
            "SUSE Linux Enterprise Micro 5.5:kernel-rt-5.14.21-150500.13.100.2.x86_64",
            "SUSE Linux Enterprise Micro 5.5:kernel-source-rt-5.14.21-150500.13.100.1.noarch"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2025-07-15T14:31:35Z",
          "details": "moderate"
        }
      ],
      "title": "CVE-2022-50002"
    },
    {
      "cve": "CVE-2022-50003",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2022-50003"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "In the Linux kernel, the following vulnerability has been resolved:\n\nice: xsk: prohibit usage of non-balanced queue id\n\nFix the following scenario:\n1. ethtool -L $IFACE rx 8 tx 96\n2. xdpsock -q 10 -t -z\n\nAbove refers to a case where user would like to attach XSK socket in\ntxonly mode at a queue id that does not have a corresponding Rx queue.\nAt this moment ice\u0027s XSK logic is tightly bound to act on a \"queue pair\",\ne.g. both Tx and Rx queues at a given queue id are disabled/enabled and\nboth of them will get XSK pool assigned, which is broken for the presented\nqueue configuration. This results in the splat included at the bottom,\nwhich is basically an OOB access to Rx ring array.\n\nTo fix this, allow using the ids only in scope of \"combined\" queues\nreported by ethtool. However, logic should be rewritten to allow such\nconfigurations later on, which would end up as a complete rewrite of the\ncontrol path, so let us go with this temporary fix.\n\n[420160.558008] BUG: kernel NULL pointer dereference, address: 0000000000000082\n[420160.566359] #PF: supervisor read access in kernel mode\n[420160.572657] #PF: error_code(0x0000) - not-present page\n[420160.579002] PGD 0 P4D 0\n[420160.582756] Oops: 0000 [#1] PREEMPT SMP NOPTI\n[420160.588396] CPU: 10 PID: 21232 Comm: xdpsock Tainted: G           OE     5.19.0-rc7+ #10\n[420160.597893] Hardware name: Intel Corporation S2600WFT/S2600WFT, BIOS SE5C620.86B.02.01.0008.031920191559 03/19/2019\n[420160.609894] RIP: 0010:ice_xsk_pool_setup+0x44/0x7d0 [ice]\n[420160.616968] Code: f3 48 83 ec 40 48 8b 4f 20 48 8b 3f 65 48 8b 04 25 28 00 00 00 48 89 44 24 38 31 c0 48 8d 04 ed 00 00 00 00 48 01 c1 48 8b 11 \u003c0f\u003e b7 92 82 00 00 00 48 85 d2 0f 84 2d 75 00 00 48 8d 72 ff 48 85\n[420160.639421] RSP: 0018:ffffc9002d2afd48 EFLAGS: 00010282\n[420160.646650] RAX: 0000000000000050 RBX: ffff88811d8bdd00 RCX: ffff888112c14ff8\n[420160.655893] RDX: 0000000000000000 RSI: ffff88811d8bdd00 RDI: ffff888109861000\n[420160.665166] RBP: 000000000000000a R08: 000000000000000a R09: 0000000000000000\n[420160.674493] R10: 000000000000889f R11: 0000000000000000 R12: 000000000000000a\n[420160.683833] R13: 000000000000000a R14: 0000000000000000 R15: ffff888117611828\n[420160.693211] FS:  00007fa869fc1f80(0000) GS:ffff8897e0880000(0000) knlGS:0000000000000000\n[420160.703645] CS:  0010 DS: 0000 ES: 0000 CR0: 0000000080050033\n[420160.711783] CR2: 0000000000000082 CR3: 00000001d076c001 CR4: 00000000007706e0\n[420160.721399] DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000\n[420160.731045] DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400\n[420160.740707] PKRU: 55555554\n[420160.745960] Call Trace:\n[420160.750962]  \u003cTASK\u003e\n[420160.755597]  ? kmalloc_large_node+0x79/0x90\n[420160.762703]  ? __kmalloc_node+0x3f5/0x4b0\n[420160.769341]  xp_assign_dev+0xfd/0x210\n[420160.775661]  ? shmem_file_read_iter+0x29a/0x420\n[420160.782896]  xsk_bind+0x152/0x490\n[420160.788943]  __sys_bind+0xd0/0x100\n[420160.795097]  ? exit_to_user_mode_prepare+0x20/0x120\n[420160.802801]  __x64_sys_bind+0x16/0x20\n[420160.809298]  do_syscall_64+0x38/0x90\n[420160.815741]  entry_SYSCALL_64_after_hwframe+0x63/0xcd\n[420160.823731] RIP: 0033:0x7fa86a0dd2fb\n[420160.830264] Code: c3 66 0f 1f 44 00 00 48 8b 15 69 8b 0c 00 f7 d8 64 89 02 b8 ff ff ff ff eb bc 0f 1f 44 00 00 f3 0f 1e fa b8 31 00 00 00 0f 05 \u003c48\u003e 3d 01 f0 ff ff 73 01 c3 48 8b 0d 3d 8b 0c 00 f7 d8 64 89 01 48\n[420160.855410] RSP: 002b:00007ffc1146f618 EFLAGS: 00000246 ORIG_RAX: 0000000000000031\n[420160.866366] RAX: ffffffffffffffda RBX: 0000000000000000 RCX: 00007fa86a0dd2fb\n[420160.876957] RDX: 0000000000000010 RSI: 00007ffc1146f680 RDI: 0000000000000003\n[420160.887604] RBP: 000055d7113a0520 R08: 00007fa868fb8000 R09: 0000000080000000\n[420160.898293] R10: 0000000000008001 R11: 0000000000000246 R12: 000055d7113a04e0\n[420160.909038] R13: 000055d7113a0320 R14: 000000000000000a R15: 0000000000000000\n[420160.919817]  \u003c/TASK\u003e\n[420160.925659] Modules linked in: ice(OE) af_packet binfmt_misc\n---truncated---",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "SUSE Linux Enterprise Micro 5.5:kernel-devel-rt-5.14.21-150500.13.100.1.noarch",
          "SUSE Linux Enterprise Micro 5.5:kernel-rt-5.14.21-150500.13.100.2.x86_64",
          "SUSE Linux Enterprise Micro 5.5:kernel-source-rt-5.14.21-150500.13.100.1.noarch"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2022-50003",
          "url": "https://www.suse.com/security/cve/CVE-2022-50003"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1245015 for CVE-2022-50003",
          "url": "https://bugzilla.suse.com/1245015"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "SUSE Linux Enterprise Micro 5.5:kernel-devel-rt-5.14.21-150500.13.100.1.noarch",
            "SUSE Linux Enterprise Micro 5.5:kernel-rt-5.14.21-150500.13.100.2.x86_64",
            "SUSE Linux Enterprise Micro 5.5:kernel-source-rt-5.14.21-150500.13.100.1.noarch"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 5.5,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
            "version": "3.1"
          },
          "products": [
            "SUSE Linux Enterprise Micro 5.5:kernel-devel-rt-5.14.21-150500.13.100.1.noarch",
            "SUSE Linux Enterprise Micro 5.5:kernel-rt-5.14.21-150500.13.100.2.x86_64",
            "SUSE Linux Enterprise Micro 5.5:kernel-source-rt-5.14.21-150500.13.100.1.noarch"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2025-07-15T14:31:35Z",
          "details": "moderate"
        }
      ],
      "title": "CVE-2022-50003"
    },
    {
      "cve": "CVE-2022-50005",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2022-50005"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "In the Linux kernel, the following vulnerability has been resolved:\n\nnfc: pn533: Fix use-after-free bugs caused by pn532_cmd_timeout\n\nWhen the pn532 uart device is detaching, the pn532_uart_remove()\nis called. But there are no functions in pn532_uart_remove() that\ncould delete the cmd_timeout timer, which will cause use-after-free\nbugs. The process is shown below:\n\n    (thread 1)                  |        (thread 2)\n                                |  pn532_uart_send_frame\npn532_uart_remove               |    mod_timer(\u0026pn532-\u003ecmd_timeout,...)\n  ...                           |    (wait a time)\n  kfree(pn532) //FREE           |    pn532_cmd_timeout\n                                |      pn532_uart_send_frame\n                                |        pn532-\u003e... //USE\n\nThis patch adds del_timer_sync() in pn532_uart_remove() in order to\nprevent the use-after-free bugs. What\u0027s more, the pn53x_unregister_nfc()\nis well synchronized, it sets nfc_dev-\u003eshutting_down to true and there\nare no syscalls could restart the cmd_timeout timer.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "SUSE Linux Enterprise Micro 5.5:kernel-devel-rt-5.14.21-150500.13.100.1.noarch",
          "SUSE Linux Enterprise Micro 5.5:kernel-rt-5.14.21-150500.13.100.2.x86_64",
          "SUSE Linux Enterprise Micro 5.5:kernel-source-rt-5.14.21-150500.13.100.1.noarch"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2022-50005",
          "url": "https://www.suse.com/security/cve/CVE-2022-50005"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1245011 for CVE-2022-50005",
          "url": "https://bugzilla.suse.com/1245011"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "SUSE Linux Enterprise Micro 5.5:kernel-devel-rt-5.14.21-150500.13.100.1.noarch",
            "SUSE Linux Enterprise Micro 5.5:kernel-rt-5.14.21-150500.13.100.2.x86_64",
            "SUSE Linux Enterprise Micro 5.5:kernel-source-rt-5.14.21-150500.13.100.1.noarch"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 5.5,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
            "version": "3.1"
          },
          "products": [
            "SUSE Linux Enterprise Micro 5.5:kernel-devel-rt-5.14.21-150500.13.100.1.noarch",
            "SUSE Linux Enterprise Micro 5.5:kernel-rt-5.14.21-150500.13.100.2.x86_64",
            "SUSE Linux Enterprise Micro 5.5:kernel-source-rt-5.14.21-150500.13.100.1.noarch"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2025-07-15T14:31:35Z",
          "details": "moderate"
        }
      ],
      "title": "CVE-2022-50005"
    },
    {
      "cve": "CVE-2022-50006",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2022-50006"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "In the Linux kernel, the following vulnerability has been resolved:\n\nNFSv4.2 fix problems with __nfs42_ssc_open\n\nA destination server while doing a COPY shouldn\u0027t accept using the\npassed in filehandle if its not a regular filehandle.\n\nIf alloc_file_pseudo() has failed, we need to decrement a reference\non the newly created inode, otherwise it leaks.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "SUSE Linux Enterprise Micro 5.5:kernel-devel-rt-5.14.21-150500.13.100.1.noarch",
          "SUSE Linux Enterprise Micro 5.5:kernel-rt-5.14.21-150500.13.100.2.x86_64",
          "SUSE Linux Enterprise Micro 5.5:kernel-source-rt-5.14.21-150500.13.100.1.noarch"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2022-50006",
          "url": "https://www.suse.com/security/cve/CVE-2022-50006"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1245018 for CVE-2022-50006",
          "url": "https://bugzilla.suse.com/1245018"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "SUSE Linux Enterprise Micro 5.5:kernel-devel-rt-5.14.21-150500.13.100.1.noarch",
            "SUSE Linux Enterprise Micro 5.5:kernel-rt-5.14.21-150500.13.100.2.x86_64",
            "SUSE Linux Enterprise Micro 5.5:kernel-source-rt-5.14.21-150500.13.100.1.noarch"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 5.5,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
            "version": "3.1"
          },
          "products": [
            "SUSE Linux Enterprise Micro 5.5:kernel-devel-rt-5.14.21-150500.13.100.1.noarch",
            "SUSE Linux Enterprise Micro 5.5:kernel-rt-5.14.21-150500.13.100.2.x86_64",
            "SUSE Linux Enterprise Micro 5.5:kernel-source-rt-5.14.21-150500.13.100.1.noarch"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2025-07-15T14:31:35Z",
          "details": "moderate"
        }
      ],
      "title": "CVE-2022-50006"
    },
    {
      "cve": "CVE-2022-50008",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2022-50008"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "In the Linux kernel, the following vulnerability has been resolved:\n\nkprobes: don\u0027t call disarm_kprobe() for disabled kprobes\n\nThe assumption in __disable_kprobe() is wrong, and it could try to disarm\nan already disarmed kprobe and fire the WARN_ONCE() below. [0]  We can\neasily reproduce this issue.\n\n1. Write 0 to /sys/kernel/debug/kprobes/enabled.\n\n  # echo 0 \u003e /sys/kernel/debug/kprobes/enabled\n\n2. Run execsnoop.  At this time, one kprobe is disabled.\n\n  # /usr/share/bcc/tools/execsnoop \u0026\n  [1] 2460\n  PCOMM            PID    PPID   RET ARGS\n\n  # cat /sys/kernel/debug/kprobes/list\n  ffffffff91345650  r  __x64_sys_execve+0x0    [FTRACE]\n  ffffffff91345650  k  __x64_sys_execve+0x0    [DISABLED][FTRACE]\n\n3. Write 1 to /sys/kernel/debug/kprobes/enabled, which changes\n   kprobes_all_disarmed to false but does not arm the disabled kprobe.\n\n  # echo 1 \u003e /sys/kernel/debug/kprobes/enabled\n\n  # cat /sys/kernel/debug/kprobes/list\n  ffffffff91345650  r  __x64_sys_execve+0x0    [FTRACE]\n  ffffffff91345650  k  __x64_sys_execve+0x0    [DISABLED][FTRACE]\n\n4. Kill execsnoop, when __disable_kprobe() calls disarm_kprobe() for the\n   disabled kprobe and hits the WARN_ONCE() in __disarm_kprobe_ftrace().\n\n  # fg\n  /usr/share/bcc/tools/execsnoop\n  ^C\n\nActually, WARN_ONCE() is fired twice, and __unregister_kprobe_top() misses\nsome cleanups and leaves the aggregated kprobe in the hash table.  Then,\n__unregister_trace_kprobe() initialises tk-\u003erp.kp.list and creates an\ninfinite loop like this.\n\n  aggregated kprobe.list -\u003e kprobe.list -.\n                                     ^    |\n                                     \u0027.__.\u0027\n\nIn this situation, these commands fall into the infinite loop and result\nin RCU stall or soft lockup.\n\n  cat /sys/kernel/debug/kprobes/list : show_kprobe_addr() enters into the\n                                       infinite loop with RCU.\n\n  /usr/share/bcc/tools/execsnoop : warn_kprobe_rereg() holds kprobe_mutex,\n                                   and __get_valid_kprobe() is stuck in\n\t\t\t\t   the loop.\n\nTo avoid the issue, make sure we don\u0027t call disarm_kprobe() for disabled\nkprobes.\n\n[0]\nFailed to disarm kprobe-ftrace at __x64_sys_execve+0x0/0x40 (error -2)\nWARNING: CPU: 6 PID: 2460 at kernel/kprobes.c:1130 __disarm_kprobe_ftrace.isra.19 (kernel/kprobes.c:1129)\nModules linked in: ena\nCPU: 6 PID: 2460 Comm: execsnoop Not tainted 5.19.0+ #28\nHardware name: Amazon EC2 c5.2xlarge/, BIOS 1.0 10/16/2017\nRIP: 0010:__disarm_kprobe_ftrace.isra.19 (kernel/kprobes.c:1129)\nCode: 24 8b 02 eb c1 80 3d c4 83 f2 01 00 75 d4 48 8b 75 00 89 c2 48 c7 c7 90 fa 0f 92 89 04 24 c6 05 ab 83 01 e8 e4 94 f0 ff \u003c0f\u003e 0b 8b 04 24 eb b1 89 c6 48 c7 c7 60 fa 0f 92 89 04 24 e8 cc 94\nRSP: 0018:ffff9e6ec154bd98 EFLAGS: 00010282\nRAX: 0000000000000000 RBX: ffffffff930f7b00 RCX: 0000000000000001\nRDX: 0000000080000001 RSI: ffffffff921461c5 RDI: 00000000ffffffff\nRBP: ffff89c504286da8 R08: 0000000000000000 R09: c0000000fffeffff\nR10: 0000000000000000 R11: ffff9e6ec154bc28 R12: ffff89c502394e40\nR13: ffff89c502394c00 R14: ffff9e6ec154bc00 R15: 0000000000000000\nFS:  00007fe800398740(0000) GS:ffff89c812d80000(0000) knlGS:0000000000000000\nCS:  0010 DS: 0000 ES: 0000 CR0: 0000000080050033\nCR2: 000000c00057f010 CR3: 0000000103b54006 CR4: 00000000007706e0\nDR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000\nDR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400\nPKRU: 55555554\nCall Trace:\n\u003cTASK\u003e\n __disable_kprobe (kernel/kprobes.c:1716)\n disable_kprobe (kernel/kprobes.c:2392)\n __disable_trace_kprobe (kernel/trace/trace_kprobe.c:340)\n disable_trace_kprobe (kernel/trace/trace_kprobe.c:429)\n perf_trace_event_unreg.isra.2 (./include/linux/tracepoint.h:93 kernel/trace/trace_event_perf.c:168)\n perf_kprobe_destroy (kernel/trace/trace_event_perf.c:295)\n _free_event (kernel/events/core.c:4971)\n perf_event_release_kernel (kernel/events/core.c:5176)\n perf_release (kernel/events/core.c:5186)\n __fput (fs/file_table.c:321)\n task_work_run (./include/linux/\n---truncated---",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "SUSE Linux Enterprise Micro 5.5:kernel-devel-rt-5.14.21-150500.13.100.1.noarch",
          "SUSE Linux Enterprise Micro 5.5:kernel-rt-5.14.21-150500.13.100.2.x86_64",
          "SUSE Linux Enterprise Micro 5.5:kernel-source-rt-5.14.21-150500.13.100.1.noarch"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2022-50008",
          "url": "https://www.suse.com/security/cve/CVE-2022-50008"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1245009 for CVE-2022-50008",
          "url": "https://bugzilla.suse.com/1245009"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "SUSE Linux Enterprise Micro 5.5:kernel-devel-rt-5.14.21-150500.13.100.1.noarch",
            "SUSE Linux Enterprise Micro 5.5:kernel-rt-5.14.21-150500.13.100.2.x86_64",
            "SUSE Linux Enterprise Micro 5.5:kernel-source-rt-5.14.21-150500.13.100.1.noarch"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 5.5,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
            "version": "3.1"
          },
          "products": [
            "SUSE Linux Enterprise Micro 5.5:kernel-devel-rt-5.14.21-150500.13.100.1.noarch",
            "SUSE Linux Enterprise Micro 5.5:kernel-rt-5.14.21-150500.13.100.2.x86_64",
            "SUSE Linux Enterprise Micro 5.5:kernel-source-rt-5.14.21-150500.13.100.1.noarch"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2025-07-15T14:31:35Z",
          "details": "moderate"
        }
      ],
      "title": "CVE-2022-50008"
    },
    {
      "cve": "CVE-2022-50010",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2022-50010"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "In the Linux kernel, the following vulnerability has been resolved:\n\nvideo: fbdev: i740fb: Check the argument of i740_calc_vclk()\n\nSince the user can control the arguments of the ioctl() from the user\nspace, under special arguments that may result in a divide-by-zero bug.\n\nIf the user provides an improper \u0027pixclock\u0027 value that makes the argumet\nof i740_calc_vclk() less than \u0027I740_RFREQ_FIX\u0027, it will cause a\ndivide-by-zero bug in:\n    drivers/video/fbdev/i740fb.c:353 p_best = min(15, ilog2(I740_MAX_VCO_FREQ / (freq / I740_RFREQ_FIX)));\n\nThe following log can reveal it:\n\ndivide error: 0000 [#1] PREEMPT SMP KASAN PTI\nRIP: 0010:i740_calc_vclk drivers/video/fbdev/i740fb.c:353 [inline]\nRIP: 0010:i740fb_decode_var drivers/video/fbdev/i740fb.c:646 [inline]\nRIP: 0010:i740fb_set_par+0x163f/0x3b70 drivers/video/fbdev/i740fb.c:742\nCall Trace:\n fb_set_var+0x604/0xeb0 drivers/video/fbdev/core/fbmem.c:1034\n do_fb_ioctl+0x234/0x670 drivers/video/fbdev/core/fbmem.c:1110\n fb_ioctl+0xdd/0x130 drivers/video/fbdev/core/fbmem.c:1189\n\nFix this by checking the argument of i740_calc_vclk() first.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "SUSE Linux Enterprise Micro 5.5:kernel-devel-rt-5.14.21-150500.13.100.1.noarch",
          "SUSE Linux Enterprise Micro 5.5:kernel-rt-5.14.21-150500.13.100.2.x86_64",
          "SUSE Linux Enterprise Micro 5.5:kernel-source-rt-5.14.21-150500.13.100.1.noarch"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2022-50010",
          "url": "https://www.suse.com/security/cve/CVE-2022-50010"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1245122 for CVE-2022-50010",
          "url": "https://bugzilla.suse.com/1245122"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "SUSE Linux Enterprise Micro 5.5:kernel-devel-rt-5.14.21-150500.13.100.1.noarch",
            "SUSE Linux Enterprise Micro 5.5:kernel-rt-5.14.21-150500.13.100.2.x86_64",
            "SUSE Linux Enterprise Micro 5.5:kernel-source-rt-5.14.21-150500.13.100.1.noarch"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 5.5,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
            "version": "3.1"
          },
          "products": [
            "SUSE Linux Enterprise Micro 5.5:kernel-devel-rt-5.14.21-150500.13.100.1.noarch",
            "SUSE Linux Enterprise Micro 5.5:kernel-rt-5.14.21-150500.13.100.2.x86_64",
            "SUSE Linux Enterprise Micro 5.5:kernel-source-rt-5.14.21-150500.13.100.1.noarch"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2025-07-15T14:31:35Z",
          "details": "moderate"
        }
      ],
      "title": "CVE-2022-50010"
    },
    {
      "cve": "CVE-2022-50011",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2022-50011"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "In the Linux kernel, the following vulnerability has been resolved:\n\nvenus: pm_helpers: Fix warning in OPP during probe\n\nFix the following WARN triggered during Venus driver probe on\n5.19.0-rc8-next-20220728:\n\n WARNING: CPU: 7 PID: 339 at drivers/opp/core.c:2471 dev_pm_opp_set_config+0x49c/0x610\n Modules linked in: qcom_spmi_adc5 rtc_pm8xxx qcom_spmi_adc_tm5 leds_qcom_lpg led_class_multicolor\n  qcom_pon qcom_vadc_common venus_core(+) qcom_spmi_temp_alarm v4l2_mem2mem videobuf2_v4l2 msm(+)\n  videobuf2_common crct10dif_ce spi_geni_qcom snd_soc_sm8250 i2c_qcom_geni gpu_sched\n  snd_soc_qcom_common videodev qcom_q6v5_pas soundwire_qcom drm_dp_aux_bus qcom_stats\n  drm_display_helper qcom_pil_info soundwire_bus snd_soc_lpass_va_macro mc qcom_q6v5\n  phy_qcom_snps_femto_v2 qcom_rng snd_soc_lpass_macro_common snd_soc_lpass_wsa_macro\n  lpass_gfm_sm8250 slimbus qcom_sysmon qcom_common qcom_glink_smem qmi_helpers\n  qcom_wdt mdt_loader socinfo icc_osm_l3 display_connector\n  drm_kms_helper qnoc_sm8250 drm fuse ip_tables x_tables ipv6\n CPU: 7 PID: 339 Comm: systemd-udevd Not tainted 5.19.0-rc8-next-20220728 #4\n Hardware name: Qualcomm Technologies, Inc. Robotics RB5 (DT)\n pstate: 80400005 (Nzcv daif +PAN -UAO -TCO -DIT -SSBS BTYPE=--)\n pc : dev_pm_opp_set_config+0x49c/0x610\n lr : dev_pm_opp_set_config+0x58/0x610\n sp : ffff8000093c3710\n x29: ffff8000093c3710 x28: ffffbca3959d82b8 x27: ffff8000093c3d00\n x26: ffffbca3959d8e08 x25: ffff4396cac98118 x24: ffff4396c0e24810\n x23: ffff4396c4272c40 x22: ffff4396c0e24810 x21: ffff8000093c3810\n x20: ffff4396cac36800 x19: ffff4396cac96800 x18: 0000000000000000\n x17: 0000000000000003 x16: ffffbca3f4edf198 x15: 0000001cba64a858\n x14: 0000000000000180 x13: 000000000000017e x12: 0000000000000000\n x11: 0000000000000002 x10: 0000000000000a60 x9 : ffff8000093c35c0\n x8 : ffff4396c4273700 x7 : ffff43983efca6c0 x6 : ffff43983efca640\n x5 : 00000000410fd0d0 x4 : ffff4396c4272c40 x3 : ffffbca3f5d1e008\n x2 : 0000000000000000 x1 : ffff4396c2421600 x0 : ffff4396cac96860\n Call trace:\n  dev_pm_opp_set_config+0x49c/0x610\n  devm_pm_opp_set_config+0x18/0x70\n  vcodec_domains_get+0xb8/0x1638 [venus_core]\n  core_get_v4+0x1d8/0x218 [venus_core]\n  venus_probe+0xf4/0x468 [venus_core]\n  platform_probe+0x68/0xd8\n  really_probe+0xbc/0x2a8\n  __driver_probe_device+0x78/0xe0\n  driver_probe_device+0x3c/0xf0\n  __driver_attach+0x70/0x120\n  bus_for_each_dev+0x70/0xc0\n  driver_attach+0x24/0x30\n  bus_add_driver+0x150/0x200\n  driver_register+0x64/0x120\n  __platform_driver_register+0x28/0x38\n  qcom_venus_driver_init+0x24/0x1000 [venus_core]\n  do_one_initcall+0x54/0x1c8\n  do_init_module+0x44/0x1d0\n  load_module+0x16c8/0x1aa0\n  __do_sys_finit_module+0xbc/0x110\n  __arm64_sys_finit_module+0x20/0x30\n  invoke_syscall+0x44/0x108\n  el0_svc_common.constprop.0+0xcc/0xf0\n  do_el0_svc+0x2c/0xb8\n  el0_svc+0x2c/0x88\n  el0t_64_sync_handler+0xb8/0xc0\n  el0t_64_sync+0x18c/0x190\n  qcom-venus: probe of aa00000.video-codec failed with error -16\n\nThe fix is re-ordering the code related to OPP core. The OPP core\nexpects all configuration options to be provided before the OPP\ntable is added.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "SUSE Linux Enterprise Micro 5.5:kernel-devel-rt-5.14.21-150500.13.100.1.noarch",
          "SUSE Linux Enterprise Micro 5.5:kernel-rt-5.14.21-150500.13.100.2.x86_64",
          "SUSE Linux Enterprise Micro 5.5:kernel-source-rt-5.14.21-150500.13.100.1.noarch"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2022-50011",
          "url": "https://www.suse.com/security/cve/CVE-2022-50011"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1244915 for CVE-2022-50011",
          "url": "https://bugzilla.suse.com/1244915"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "SUSE Linux Enterprise Micro 5.5:kernel-devel-rt-5.14.21-150500.13.100.1.noarch",
            "SUSE Linux Enterprise Micro 5.5:kernel-rt-5.14.21-150500.13.100.2.x86_64",
            "SUSE Linux Enterprise Micro 5.5:kernel-source-rt-5.14.21-150500.13.100.1.noarch"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 5.5,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
            "version": "3.1"
          },
          "products": [
            "SUSE Linux Enterprise Micro 5.5:kernel-devel-rt-5.14.21-150500.13.100.1.noarch",
            "SUSE Linux Enterprise Micro 5.5:kernel-rt-5.14.21-150500.13.100.2.x86_64",
            "SUSE Linux Enterprise Micro 5.5:kernel-source-rt-5.14.21-150500.13.100.1.noarch"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2025-07-15T14:31:35Z",
          "details": "moderate"
        }
      ],
      "title": "CVE-2022-50011"
    },
    {
      "cve": "CVE-2022-50012",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2022-50012"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "In the Linux kernel, the following vulnerability has been resolved:\n\npowerpc/64: Init jump labels before parse_early_param()\n\nOn 64-bit, calling jump_label_init() in setup_feature_keys() is too\nlate because static keys may be used in subroutines of\nparse_early_param() which is again subroutine of early_init_devtree().\n\nFor example booting with \"threadirqs\":\n\n  static_key_enable_cpuslocked(): static key \u00270xc000000002953260\u0027 used before call to jump_label_init()\n  WARNING: CPU: 0 PID: 0 at kernel/jump_label.c:166 static_key_enable_cpuslocked+0xfc/0x120\n  ...\n  NIP static_key_enable_cpuslocked+0xfc/0x120\n  LR  static_key_enable_cpuslocked+0xf8/0x120\n  Call Trace:\n    static_key_enable_cpuslocked+0xf8/0x120 (unreliable)\n    static_key_enable+0x30/0x50\n    setup_forced_irqthreads+0x28/0x40\n    do_early_param+0xa0/0x108\n    parse_args+0x290/0x4e0\n    parse_early_options+0x48/0x5c\n    parse_early_param+0x58/0x84\n    early_init_devtree+0xd4/0x518\n    early_setup+0xb4/0x214\n\nSo call jump_label_init() just before parse_early_param() in\nearly_init_devtree().\n\n[mpe: Add call trace to change log and minor wording edits.]",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "SUSE Linux Enterprise Micro 5.5:kernel-devel-rt-5.14.21-150500.13.100.1.noarch",
          "SUSE Linux Enterprise Micro 5.5:kernel-rt-5.14.21-150500.13.100.2.x86_64",
          "SUSE Linux Enterprise Micro 5.5:kernel-source-rt-5.14.21-150500.13.100.1.noarch"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2022-50012",
          "url": "https://www.suse.com/security/cve/CVE-2022-50012"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1245125 for CVE-2022-50012",
          "url": "https://bugzilla.suse.com/1245125"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "SUSE Linux Enterprise Micro 5.5:kernel-devel-rt-5.14.21-150500.13.100.1.noarch",
            "SUSE Linux Enterprise Micro 5.5:kernel-rt-5.14.21-150500.13.100.2.x86_64",
            "SUSE Linux Enterprise Micro 5.5:kernel-source-rt-5.14.21-150500.13.100.1.noarch"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 5.5,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
            "version": "3.1"
          },
          "products": [
            "SUSE Linux Enterprise Micro 5.5:kernel-devel-rt-5.14.21-150500.13.100.1.noarch",
            "SUSE Linux Enterprise Micro 5.5:kernel-rt-5.14.21-150500.13.100.2.x86_64",
            "SUSE Linux Enterprise Micro 5.5:kernel-source-rt-5.14.21-150500.13.100.1.noarch"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2025-07-15T14:31:35Z",
          "details": "moderate"
        }
      ],
      "title": "CVE-2022-50012"
    },
    {
      "cve": "CVE-2022-50015",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2022-50015"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "In the Linux kernel, the following vulnerability has been resolved:\n\nASoC: SOF: Intel: hda-ipc: Do not process IPC reply before firmware boot\n\nIt is not yet clear, but it is possible to create a firmware so broken\nthat it will send a reply message before a FW_READY message (it is not\nyet clear if FW_READY will arrive later).\nSince the reply_data is allocated only after the FW_READY message, this\nwill lead to a NULL pointer dereference if not filtered out.\n\nThe issue was reported with IPC4 firmware but the same condition is present\nfor IPC3.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "SUSE Linux Enterprise Micro 5.5:kernel-devel-rt-5.14.21-150500.13.100.1.noarch",
          "SUSE Linux Enterprise Micro 5.5:kernel-rt-5.14.21-150500.13.100.2.x86_64",
          "SUSE Linux Enterprise Micro 5.5:kernel-source-rt-5.14.21-150500.13.100.1.noarch"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2022-50015",
          "url": "https://www.suse.com/security/cve/CVE-2022-50015"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1245094 for CVE-2022-50015",
          "url": "https://bugzilla.suse.com/1245094"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "SUSE Linux Enterprise Micro 5.5:kernel-devel-rt-5.14.21-150500.13.100.1.noarch",
            "SUSE Linux Enterprise Micro 5.5:kernel-rt-5.14.21-150500.13.100.2.x86_64",
            "SUSE Linux Enterprise Micro 5.5:kernel-source-rt-5.14.21-150500.13.100.1.noarch"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 5.5,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
            "version": "3.1"
          },
          "products": [
            "SUSE Linux Enterprise Micro 5.5:kernel-devel-rt-5.14.21-150500.13.100.1.noarch",
            "SUSE Linux Enterprise Micro 5.5:kernel-rt-5.14.21-150500.13.100.2.x86_64",
            "SUSE Linux Enterprise Micro 5.5:kernel-source-rt-5.14.21-150500.13.100.1.noarch"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2025-07-15T14:31:35Z",
          "details": "moderate"
        }
      ],
      "title": "CVE-2022-50015"
    },
    {
      "cve": "CVE-2022-50016",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2022-50016"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "In the Linux kernel, the following vulnerability has been resolved:\n\nASoC: SOF: Intel: cnl: Do not process IPC reply before firmware boot\n\nIt is not yet clear, but it is possible to create a firmware so broken\nthat it will send a reply message before a FW_READY message (it is not\nyet clear if FW_READY will arrive later).\nSince the reply_data is allocated only after the FW_READY message, this\nwill lead to a NULL pointer dereference if not filtered out.\n\nThe issue was reported with IPC4 firmware but the same condition is present\nfor IPC3.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "SUSE Linux Enterprise Micro 5.5:kernel-devel-rt-5.14.21-150500.13.100.1.noarch",
          "SUSE Linux Enterprise Micro 5.5:kernel-rt-5.14.21-150500.13.100.2.x86_64",
          "SUSE Linux Enterprise Micro 5.5:kernel-source-rt-5.14.21-150500.13.100.1.noarch"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2022-50016",
          "url": "https://www.suse.com/security/cve/CVE-2022-50016"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1245340 for CVE-2022-50016",
          "url": "https://bugzilla.suse.com/1245340"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "SUSE Linux Enterprise Micro 5.5:kernel-devel-rt-5.14.21-150500.13.100.1.noarch",
            "SUSE Linux Enterprise Micro 5.5:kernel-rt-5.14.21-150500.13.100.2.x86_64",
            "SUSE Linux Enterprise Micro 5.5:kernel-source-rt-5.14.21-150500.13.100.1.noarch"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 5.5,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
            "version": "3.1"
          },
          "products": [
            "SUSE Linux Enterprise Micro 5.5:kernel-devel-rt-5.14.21-150500.13.100.1.noarch",
            "SUSE Linux Enterprise Micro 5.5:kernel-rt-5.14.21-150500.13.100.2.x86_64",
            "SUSE Linux Enterprise Micro 5.5:kernel-source-rt-5.14.21-150500.13.100.1.noarch"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2025-07-15T14:31:35Z",
          "details": "moderate"
        }
      ],
      "title": "CVE-2022-50016"
    },
    {
      "cve": "CVE-2022-50019",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2022-50019"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "In the Linux kernel, the following vulnerability has been resolved:\n\ntty: serial: Fix refcount leak bug in ucc_uart.c\n\nIn soc_info(), of_find_node_by_type() will return a node pointer\nwith refcount incremented. We should use of_node_put() when it is\nnot used anymore.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "SUSE Linux Enterprise Micro 5.5:kernel-devel-rt-5.14.21-150500.13.100.1.noarch",
          "SUSE Linux Enterprise Micro 5.5:kernel-rt-5.14.21-150500.13.100.2.x86_64",
          "SUSE Linux Enterprise Micro 5.5:kernel-source-rt-5.14.21-150500.13.100.1.noarch"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2022-50019",
          "url": "https://www.suse.com/security/cve/CVE-2022-50019"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1245098 for CVE-2022-50019",
          "url": "https://bugzilla.suse.com/1245098"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "SUSE Linux Enterprise Micro 5.5:kernel-devel-rt-5.14.21-150500.13.100.1.noarch",
            "SUSE Linux Enterprise Micro 5.5:kernel-rt-5.14.21-150500.13.100.2.x86_64",
            "SUSE Linux Enterprise Micro 5.5:kernel-source-rt-5.14.21-150500.13.100.1.noarch"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 5.5,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
            "version": "3.1"
          },
          "products": [
            "SUSE Linux Enterprise Micro 5.5:kernel-devel-rt-5.14.21-150500.13.100.1.noarch",
            "SUSE Linux Enterprise Micro 5.5:kernel-rt-5.14.21-150500.13.100.2.x86_64",
            "SUSE Linux Enterprise Micro 5.5:kernel-source-rt-5.14.21-150500.13.100.1.noarch"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2025-07-15T14:31:35Z",
          "details": "moderate"
        }
      ],
      "title": "CVE-2022-50019"
    },
    {
      "cve": "CVE-2022-50020",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2022-50020"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "In the Linux kernel, the following vulnerability has been resolved:\n\next4: avoid resizing to a partial cluster size\n\nThis patch avoids an attempt to resize the filesystem to an\nunaligned cluster boundary.  An online resize to a size that is not\nintegral to cluster size results in the last iteration attempting to\ngrow the fs by a negative amount, which trips a BUG_ON and leaves the fs\nwith a corrupted in-memory superblock.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "SUSE Linux Enterprise Micro 5.5:kernel-devel-rt-5.14.21-150500.13.100.1.noarch",
          "SUSE Linux Enterprise Micro 5.5:kernel-rt-5.14.21-150500.13.100.2.x86_64",
          "SUSE Linux Enterprise Micro 5.5:kernel-source-rt-5.14.21-150500.13.100.1.noarch"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2022-50020",
          "url": "https://www.suse.com/security/cve/CVE-2022-50020"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1245129 for CVE-2022-50020",
          "url": "https://bugzilla.suse.com/1245129"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1245130 for CVE-2022-50020",
          "url": "https://bugzilla.suse.com/1245130"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "SUSE Linux Enterprise Micro 5.5:kernel-devel-rt-5.14.21-150500.13.100.1.noarch",
            "SUSE Linux Enterprise Micro 5.5:kernel-rt-5.14.21-150500.13.100.2.x86_64",
            "SUSE Linux Enterprise Micro 5.5:kernel-source-rt-5.14.21-150500.13.100.1.noarch"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 6,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:H/A:H",
            "version": "3.1"
          },
          "products": [
            "SUSE Linux Enterprise Micro 5.5:kernel-devel-rt-5.14.21-150500.13.100.1.noarch",
            "SUSE Linux Enterprise Micro 5.5:kernel-rt-5.14.21-150500.13.100.2.x86_64",
            "SUSE Linux Enterprise Micro 5.5:kernel-source-rt-5.14.21-150500.13.100.1.noarch"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2025-07-15T14:31:35Z",
          "details": "moderate"
        }
      ],
      "title": "CVE-2022-50020"
    },
    {
      "cve": "CVE-2022-50021",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2022-50021"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "In the Linux kernel, the following vulnerability has been resolved:\n\next4: block range must be validated before use in ext4_mb_clear_bb()\n\nBlock range to free is validated in ext4_free_blocks() using\next4_inode_block_valid() and then it\u0027s passed to ext4_mb_clear_bb().\nHowever in some situations on bigalloc file system the range might be\nadjusted after the validation in ext4_free_blocks() which can lead to\ntroubles on corrupted file systems such as one found by syzkaller that\nresulted in the following BUG\n\nkernel BUG at fs/ext4/ext4.h:3319!\nPREEMPT SMP NOPTI\nCPU: 28 PID: 4243 Comm: repro Kdump: loaded Not tainted 5.19.0-rc6+ #1\nHardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.15.0-1.fc35 04/01/2014\nRIP: 0010:ext4_free_blocks+0x95e/0xa90\nCall Trace:\n \u003cTASK\u003e\n ? lock_timer_base+0x61/0x80\n ? __es_remove_extent+0x5a/0x760\n ? __mod_timer+0x256/0x380\n ? ext4_ind_truncate_ensure_credits+0x90/0x220\n ext4_clear_blocks+0x107/0x1b0\n ext4_free_data+0x15b/0x170\n ext4_ind_truncate+0x214/0x2c0\n ? _raw_spin_unlock+0x15/0x30\n ? ext4_discard_preallocations+0x15a/0x410\n ? ext4_journal_check_start+0xe/0x90\n ? __ext4_journal_start_sb+0x2f/0x110\n ext4_truncate+0x1b5/0x460\n ? __ext4_journal_start_sb+0x2f/0x110\n ext4_evict_inode+0x2b4/0x6f0\n evict+0xd0/0x1d0\n ext4_enable_quotas+0x11f/0x1f0\n ext4_orphan_cleanup+0x3de/0x430\n ? proc_create_seq_private+0x43/0x50\n ext4_fill_super+0x295f/0x3ae0\n ? snprintf+0x39/0x40\n ? sget_fc+0x19c/0x330\n ? ext4_reconfigure+0x850/0x850\n get_tree_bdev+0x16d/0x260\n vfs_get_tree+0x25/0xb0\n path_mount+0x431/0xa70\n __x64_sys_mount+0xe2/0x120\n do_syscall_64+0x5b/0x80\n ? do_user_addr_fault+0x1e2/0x670\n ? exc_page_fault+0x70/0x170\n entry_SYSCALL_64_after_hwframe+0x46/0xb0\nRIP: 0033:0x7fdf4e512ace\n\nFix it by making sure that the block range is properly validated before\nused every time it changes in ext4_free_blocks() or ext4_mb_clear_bb().",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "SUSE Linux Enterprise Micro 5.5:kernel-devel-rt-5.14.21-150500.13.100.1.noarch",
          "SUSE Linux Enterprise Micro 5.5:kernel-rt-5.14.21-150500.13.100.2.x86_64",
          "SUSE Linux Enterprise Micro 5.5:kernel-source-rt-5.14.21-150500.13.100.1.noarch"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2022-50021",
          "url": "https://www.suse.com/security/cve/CVE-2022-50021"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1245180 for CVE-2022-50021",
          "url": "https://bugzilla.suse.com/1245180"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "SUSE Linux Enterprise Micro 5.5:kernel-devel-rt-5.14.21-150500.13.100.1.noarch",
            "SUSE Linux Enterprise Micro 5.5:kernel-rt-5.14.21-150500.13.100.2.x86_64",
            "SUSE Linux Enterprise Micro 5.5:kernel-source-rt-5.14.21-150500.13.100.1.noarch"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 6.1,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:H",
            "version": "3.1"
          },
          "products": [
            "SUSE Linux Enterprise Micro 5.5:kernel-devel-rt-5.14.21-150500.13.100.1.noarch",
            "SUSE Linux Enterprise Micro 5.5:kernel-rt-5.14.21-150500.13.100.2.x86_64",
            "SUSE Linux Enterprise Micro 5.5:kernel-source-rt-5.14.21-150500.13.100.1.noarch"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2025-07-15T14:31:35Z",
          "details": "moderate"
        }
      ],
      "title": "CVE-2022-50021"
    },
    {
      "cve": "CVE-2022-50022",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2022-50022"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "In the Linux kernel, the following vulnerability has been resolved:\n\ndrivers:md:fix a potential use-after-free bug\n\nIn line 2884, \"raid5_release_stripe(sh);\" drops the reference to sh and\nmay cause sh to be released. However, sh is subsequently used in lines\n2886 \"if (sh-\u003ebatch_head \u0026\u0026 sh != sh-\u003ebatch_head)\". This may result in an\nuse-after-free bug.\n\nIt can be fixed by moving \"raid5_release_stripe(sh);\" to the bottom of\nthe function.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "SUSE Linux Enterprise Micro 5.5:kernel-devel-rt-5.14.21-150500.13.100.1.noarch",
          "SUSE Linux Enterprise Micro 5.5:kernel-rt-5.14.21-150500.13.100.2.x86_64",
          "SUSE Linux Enterprise Micro 5.5:kernel-source-rt-5.14.21-150500.13.100.1.noarch"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2022-50022",
          "url": "https://www.suse.com/security/cve/CVE-2022-50022"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1245131 for CVE-2022-50022",
          "url": "https://bugzilla.suse.com/1245131"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "SUSE Linux Enterprise Micro 5.5:kernel-devel-rt-5.14.21-150500.13.100.1.noarch",
            "SUSE Linux Enterprise Micro 5.5:kernel-rt-5.14.21-150500.13.100.2.x86_64",
            "SUSE Linux Enterprise Micro 5.5:kernel-source-rt-5.14.21-150500.13.100.1.noarch"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 6.6,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:H",
            "version": "3.1"
          },
          "products": [
            "SUSE Linux Enterprise Micro 5.5:kernel-devel-rt-5.14.21-150500.13.100.1.noarch",
            "SUSE Linux Enterprise Micro 5.5:kernel-rt-5.14.21-150500.13.100.2.x86_64",
            "SUSE Linux Enterprise Micro 5.5:kernel-source-rt-5.14.21-150500.13.100.1.noarch"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2025-07-15T14:31:35Z",
          "details": "moderate"
        }
      ],
      "title": "CVE-2022-50022"
    },
    {
      "cve": "CVE-2022-50023",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2022-50023"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "In the Linux kernel, the following vulnerability has been resolved:\n\ndmaengine: dw-axi-dmac: ignore interrupt if no descriptor\n\nIf the channel has no descriptor and the interrupt is raised then the\nkernel will OOPS. Check the result of vchan_next_desc() in the handler\naxi_chan_block_xfer_complete() to avoid the error happening.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "SUSE Linux Enterprise Micro 5.5:kernel-devel-rt-5.14.21-150500.13.100.1.noarch",
          "SUSE Linux Enterprise Micro 5.5:kernel-rt-5.14.21-150500.13.100.2.x86_64",
          "SUSE Linux Enterprise Micro 5.5:kernel-source-rt-5.14.21-150500.13.100.1.noarch"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2022-50023",
          "url": "https://www.suse.com/security/cve/CVE-2022-50023"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1245134 for CVE-2022-50023",
          "url": "https://bugzilla.suse.com/1245134"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "SUSE Linux Enterprise Micro 5.5:kernel-devel-rt-5.14.21-150500.13.100.1.noarch",
            "SUSE Linux Enterprise Micro 5.5:kernel-rt-5.14.21-150500.13.100.2.x86_64",
            "SUSE Linux Enterprise Micro 5.5:kernel-source-rt-5.14.21-150500.13.100.1.noarch"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 5.5,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
            "version": "3.1"
          },
          "products": [
            "SUSE Linux Enterprise Micro 5.5:kernel-devel-rt-5.14.21-150500.13.100.1.noarch",
            "SUSE Linux Enterprise Micro 5.5:kernel-rt-5.14.21-150500.13.100.2.x86_64",
            "SUSE Linux Enterprise Micro 5.5:kernel-source-rt-5.14.21-150500.13.100.1.noarch"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2025-07-15T14:31:35Z",
          "details": "moderate"
        }
      ],
      "title": "CVE-2022-50023"
    },
    {
      "cve": "CVE-2022-50024",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2022-50024"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "In the Linux kernel, the following vulnerability has been resolved:\n\ndmaengine: dw-axi-dmac: do not print NULL LLI during error\n\nDuring debugging we have seen an issue where axi_chan_dump_lli()\nis passed a NULL LLI pointer which ends up causing an OOPS due\nto trying to get fields from it. Simply print NULL LLI and exit\nto avoid this.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "SUSE Linux Enterprise Micro 5.5:kernel-devel-rt-5.14.21-150500.13.100.1.noarch",
          "SUSE Linux Enterprise Micro 5.5:kernel-rt-5.14.21-150500.13.100.2.x86_64",
          "SUSE Linux Enterprise Micro 5.5:kernel-source-rt-5.14.21-150500.13.100.1.noarch"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2022-50024",
          "url": "https://www.suse.com/security/cve/CVE-2022-50024"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1245133 for CVE-2022-50024",
          "url": "https://bugzilla.suse.com/1245133"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "SUSE Linux Enterprise Micro 5.5:kernel-devel-rt-5.14.21-150500.13.100.1.noarch",
            "SUSE Linux Enterprise Micro 5.5:kernel-rt-5.14.21-150500.13.100.2.x86_64",
            "SUSE Linux Enterprise Micro 5.5:kernel-source-rt-5.14.21-150500.13.100.1.noarch"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 5.5,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
            "version": "3.1"
          },
          "products": [
            "SUSE Linux Enterprise Micro 5.5:kernel-devel-rt-5.14.21-150500.13.100.1.noarch",
            "SUSE Linux Enterprise Micro 5.5:kernel-rt-5.14.21-150500.13.100.2.x86_64",
            "SUSE Linux Enterprise Micro 5.5:kernel-source-rt-5.14.21-150500.13.100.1.noarch"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2025-07-15T14:31:35Z",
          "details": "moderate"
        }
      ],
      "title": "CVE-2022-50024"
    },
    {
      "cve": "CVE-2022-50026",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2022-50026"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "In the Linux kernel, the following vulnerability has been resolved:\n\nhabanalabs/gaudi: fix shift out of bounds\n\nWhen validating NIC queues, queue offset calculation must be\nperformed only for NIC queues.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "SUSE Linux Enterprise Micro 5.5:kernel-devel-rt-5.14.21-150500.13.100.1.noarch",
          "SUSE Linux Enterprise Micro 5.5:kernel-rt-5.14.21-150500.13.100.2.x86_64",
          "SUSE Linux Enterprise Micro 5.5:kernel-source-rt-5.14.21-150500.13.100.1.noarch"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2022-50026",
          "url": "https://www.suse.com/security/cve/CVE-2022-50026"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1245088 for CVE-2022-50026",
          "url": "https://bugzilla.suse.com/1245088"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "SUSE Linux Enterprise Micro 5.5:kernel-devel-rt-5.14.21-150500.13.100.1.noarch",
            "SUSE Linux Enterprise Micro 5.5:kernel-rt-5.14.21-150500.13.100.2.x86_64",
            "SUSE Linux Enterprise Micro 5.5:kernel-source-rt-5.14.21-150500.13.100.1.noarch"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 5.5,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
            "version": "3.1"
          },
          "products": [
            "SUSE Linux Enterprise Micro 5.5:kernel-devel-rt-5.14.21-150500.13.100.1.noarch",
            "SUSE Linux Enterprise Micro 5.5:kernel-rt-5.14.21-150500.13.100.2.x86_64",
            "SUSE Linux Enterprise Micro 5.5:kernel-source-rt-5.14.21-150500.13.100.1.noarch"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2025-07-15T14:31:35Z",
          "details": "moderate"
        }
      ],
      "title": "CVE-2022-50026"
    },
    {
      "cve": "CVE-2022-50027",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2022-50027"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "In the Linux kernel, the following vulnerability has been resolved:\n\nscsi: lpfc: Fix possible memory leak when failing to issue CMF WQE\n\nThere is no corresponding free routine if lpfc_sli4_issue_wqe fails to\nissue the CMF WQE in lpfc_issue_cmf_sync_wqe.\n\nIf ret_val is non-zero, then free the iocbq request structure.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "SUSE Linux Enterprise Micro 5.5:kernel-devel-rt-5.14.21-150500.13.100.1.noarch",
          "SUSE Linux Enterprise Micro 5.5:kernel-rt-5.14.21-150500.13.100.2.x86_64",
          "SUSE Linux Enterprise Micro 5.5:kernel-source-rt-5.14.21-150500.13.100.1.noarch"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2022-50027",
          "url": "https://www.suse.com/security/cve/CVE-2022-50027"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1245073 for CVE-2022-50027",
          "url": "https://bugzilla.suse.com/1245073"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "SUSE Linux Enterprise Micro 5.5:kernel-devel-rt-5.14.21-150500.13.100.1.noarch",
            "SUSE Linux Enterprise Micro 5.5:kernel-rt-5.14.21-150500.13.100.2.x86_64",
            "SUSE Linux Enterprise Micro 5.5:kernel-source-rt-5.14.21-150500.13.100.1.noarch"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 5.5,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
            "version": "3.1"
          },
          "products": [
            "SUSE Linux Enterprise Micro 5.5:kernel-devel-rt-5.14.21-150500.13.100.1.noarch",
            "SUSE Linux Enterprise Micro 5.5:kernel-rt-5.14.21-150500.13.100.2.x86_64",
            "SUSE Linux Enterprise Micro 5.5:kernel-source-rt-5.14.21-150500.13.100.1.noarch"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2025-07-15T14:31:35Z",
          "details": "moderate"
        }
      ],
      "title": "CVE-2022-50027"
    },
    {
      "cve": "CVE-2022-50028",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2022-50028"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "In the Linux kernel, the following vulnerability has been resolved:\n\ngadgetfs: ep_io - wait until IRQ finishes\n\nafter usb_ep_queue() if wait_for_completion_interruptible() is\ninterrupted we need to wait until IRQ gets finished.\n\nOtherwise complete() from epio_complete() can corrupt stack.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "SUSE Linux Enterprise Micro 5.5:kernel-devel-rt-5.14.21-150500.13.100.1.noarch",
          "SUSE Linux Enterprise Micro 5.5:kernel-rt-5.14.21-150500.13.100.2.x86_64",
          "SUSE Linux Enterprise Micro 5.5:kernel-source-rt-5.14.21-150500.13.100.1.noarch"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2022-50028",
          "url": "https://www.suse.com/security/cve/CVE-2022-50028"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1245135 for CVE-2022-50028",
          "url": "https://bugzilla.suse.com/1245135"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "SUSE Linux Enterprise Micro 5.5:kernel-devel-rt-5.14.21-150500.13.100.1.noarch",
            "SUSE Linux Enterprise Micro 5.5:kernel-rt-5.14.21-150500.13.100.2.x86_64",
            "SUSE Linux Enterprise Micro 5.5:kernel-source-rt-5.14.21-150500.13.100.1.noarch"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 6.1,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:H",
            "version": "3.1"
          },
          "products": [
            "SUSE Linux Enterprise Micro 5.5:kernel-devel-rt-5.14.21-150500.13.100.1.noarch",
            "SUSE Linux Enterprise Micro 5.5:kernel-rt-5.14.21-150500.13.100.2.x86_64",
            "SUSE Linux Enterprise Micro 5.5:kernel-source-rt-5.14.21-150500.13.100.1.noarch"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2025-07-15T14:31:35Z",
          "details": "moderate"
        }
      ],
      "title": "CVE-2022-50028"
    },
    {
      "cve": "CVE-2022-50029",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2022-50029"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "In the Linux kernel, the following vulnerability has been resolved:\n\nclk: qcom: ipq8074: dont disable gcc_sleep_clk_src\n\nOnce the usb sleep clocks are disabled, clock framework is trying to\ndisable the sleep clock source also.\n\nHowever, it seems that it cannot be disabled and trying to do so produces:\n[  245.436390] ------------[ cut here ]------------\n[  245.441233] gcc_sleep_clk_src status stuck at \u0027on\u0027\n[  245.441254] WARNING: CPU: 2 PID: 223 at clk_branch_wait+0x130/0x140\n[  245.450435] Modules linked in: xhci_plat_hcd xhci_hcd dwc3 dwc3_qcom leds_gpio\n[  245.456601] CPU: 2 PID: 223 Comm: sh Not tainted 5.18.0-rc4 #215\n[  245.463889] Hardware name: Xiaomi AX9000 (DT)\n[  245.470050] pstate: 204000c5 (nzCv daIF +PAN -UAO -TCO -DIT -SSBS BTYPE=--)\n[  245.474307] pc : clk_branch_wait+0x130/0x140\n[  245.481073] lr : clk_branch_wait+0x130/0x140\n[  245.485588] sp : ffffffc009f2bad0\n[  245.489838] x29: ffffffc009f2bad0 x28: ffffff8003e6c800 x27: 0000000000000000\n[  245.493057] x26: 0000000000000000 x25: 0000000000000000 x24: ffffff800226ef20\n[  245.500175] x23: ffffffc0089ff550 x22: 0000000000000000 x21: ffffffc008476ad0\n[  245.507294] x20: 0000000000000000 x19: ffffffc00965ac70 x18: fffffffffffc51a7\n[  245.514413] x17: 68702e3030303837 x16: 3a6d726f6674616c x15: ffffffc089f2b777\n[  245.521531] x14: ffffffc0095c9d18 x13: 0000000000000129 x12: 0000000000000129\n[  245.528649] x11: 00000000ffffffea x10: ffffffc009621d18 x9 : 0000000000000001\n[  245.535767] x8 : 0000000000000001 x7 : 0000000000017fe8 x6 : 0000000000000001\n[  245.542885] x5 : ffffff803fdca6d8 x4 : 0000000000000000 x3 : 0000000000000027\n[  245.550002] x2 : 0000000000000027 x1 : 0000000000000023 x0 : 0000000000000026\n[  245.557122] Call trace:\n[  245.564229]  clk_branch_wait+0x130/0x140\n[  245.566490]  clk_branch2_disable+0x2c/0x40\n[  245.570656]  clk_core_disable+0x60/0xb0\n[  245.574561]  clk_core_disable+0x68/0xb0\n[  245.578293]  clk_disable+0x30/0x50\n[  245.582113]  dwc3_qcom_remove+0x60/0xc0 [dwc3_qcom]\n[  245.585588]  platform_remove+0x28/0x60\n[  245.590361]  device_remove+0x4c/0x80\n[  245.594179]  device_release_driver_internal+0x1dc/0x230\n[  245.597914]  device_driver_detach+0x18/0x30\n[  245.602861]  unbind_store+0xec/0x110\n[  245.607027]  drv_attr_store+0x24/0x40\n[  245.610847]  sysfs_kf_write+0x44/0x60\n[  245.614405]  kernfs_fop_write_iter+0x128/0x1c0\n[  245.618052]  new_sync_write+0xc0/0x130\n[  245.622391]  vfs_write+0x1d4/0x2a0\n[  245.626123]  ksys_write+0x58/0xe0\n[  245.629508]  __arm64_sys_write+0x1c/0x30\n[  245.632895]  invoke_syscall.constprop.0+0x5c/0x110\n[  245.636890]  do_el0_svc+0xa0/0x150\n[  245.641488]  el0_svc+0x18/0x60\n[  245.644872]  el0t_64_sync_handler+0xa4/0x130\n[  245.647914]  el0t_64_sync+0x174/0x178\n[  245.652340] ---[ end trace 0000000000000000 ]---\n\nSo, add CLK_IS_CRITICAL flag to the clock so that the kernel won\u0027t try\nto disable the sleep clock.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "SUSE Linux Enterprise Micro 5.5:kernel-devel-rt-5.14.21-150500.13.100.1.noarch",
          "SUSE Linux Enterprise Micro 5.5:kernel-rt-5.14.21-150500.13.100.2.x86_64",
          "SUSE Linux Enterprise Micro 5.5:kernel-source-rt-5.14.21-150500.13.100.1.noarch"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2022-50029",
          "url": "https://www.suse.com/security/cve/CVE-2022-50029"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1245146 for CVE-2022-50029",
          "url": "https://bugzilla.suse.com/1245146"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "SUSE Linux Enterprise Micro 5.5:kernel-devel-rt-5.14.21-150500.13.100.1.noarch",
            "SUSE Linux Enterprise Micro 5.5:kernel-rt-5.14.21-150500.13.100.2.x86_64",
            "SUSE Linux Enterprise Micro 5.5:kernel-source-rt-5.14.21-150500.13.100.1.noarch"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 5.5,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
            "version": "3.1"
          },
          "products": [
            "SUSE Linux Enterprise Micro 5.5:kernel-devel-rt-5.14.21-150500.13.100.1.noarch",
            "SUSE Linux Enterprise Micro 5.5:kernel-rt-5.14.21-150500.13.100.2.x86_64",
            "SUSE Linux Enterprise Micro 5.5:kernel-source-rt-5.14.21-150500.13.100.1.noarch"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2025-07-15T14:31:35Z",
          "details": "moderate"
        }
      ],
      "title": "CVE-2022-50029"
    },
    {
      "cve": "CVE-2022-50030",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2022-50030"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "In the Linux kernel, the following vulnerability has been resolved:\n\nscsi: lpfc: Prevent buffer overflow crashes in debugfs with malformed user input\n\nMalformed user input to debugfs results in buffer overflow crashes.  Adapt\ninput string lengths to fit within internal buffers, leaving space for NULL\nterminators.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "SUSE Linux Enterprise Micro 5.5:kernel-devel-rt-5.14.21-150500.13.100.1.noarch",
          "SUSE Linux Enterprise Micro 5.5:kernel-rt-5.14.21-150500.13.100.2.x86_64",
          "SUSE Linux Enterprise Micro 5.5:kernel-source-rt-5.14.21-150500.13.100.1.noarch"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2022-50030",
          "url": "https://www.suse.com/security/cve/CVE-2022-50030"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1245265 for CVE-2022-50030",
          "url": "https://bugzilla.suse.com/1245265"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "SUSE Linux Enterprise Micro 5.5:kernel-devel-rt-5.14.21-150500.13.100.1.noarch",
            "SUSE Linux Enterprise Micro 5.5:kernel-rt-5.14.21-150500.13.100.2.x86_64",
            "SUSE Linux Enterprise Micro 5.5:kernel-source-rt-5.14.21-150500.13.100.1.noarch"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 6.4,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H",
            "version": "3.1"
          },
          "products": [
            "SUSE Linux Enterprise Micro 5.5:kernel-devel-rt-5.14.21-150500.13.100.1.noarch",
            "SUSE Linux Enterprise Micro 5.5:kernel-rt-5.14.21-150500.13.100.2.x86_64",
            "SUSE Linux Enterprise Micro 5.5:kernel-source-rt-5.14.21-150500.13.100.1.noarch"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2025-07-15T14:31:35Z",
          "details": "important"
        }
      ],
      "title": "CVE-2022-50030"
    },
    {
      "cve": "CVE-2022-50031",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2022-50031"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "In the Linux kernel, the following vulnerability has been resolved:\n\nscsi: iscsi: Fix HW conn removal use after free\n\nIf qla4xxx doesn\u0027t remove the connection before the session, the iSCSI\nclass tries to remove the connection for it. We were doing a\niscsi_put_conn() in the iter function which is not needed and will result\nin a use after free because iscsi_remove_conn() will free the connection.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "SUSE Linux Enterprise Micro 5.5:kernel-devel-rt-5.14.21-150500.13.100.1.noarch",
          "SUSE Linux Enterprise Micro 5.5:kernel-rt-5.14.21-150500.13.100.2.x86_64",
          "SUSE Linux Enterprise Micro 5.5:kernel-source-rt-5.14.21-150500.13.100.1.noarch"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2022-50031",
          "url": "https://www.suse.com/security/cve/CVE-2022-50031"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1245118 for CVE-2022-50031",
          "url": "https://bugzilla.suse.com/1245118"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "SUSE Linux Enterprise Micro 5.5:kernel-devel-rt-5.14.21-150500.13.100.1.noarch",
            "SUSE Linux Enterprise Micro 5.5:kernel-rt-5.14.21-150500.13.100.2.x86_64",
            "SUSE Linux Enterprise Micro 5.5:kernel-source-rt-5.14.21-150500.13.100.1.noarch"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 5.5,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
            "version": "3.1"
          },
          "products": [
            "SUSE Linux Enterprise Micro 5.5:kernel-devel-rt-5.14.21-150500.13.100.1.noarch",
            "SUSE Linux Enterprise Micro 5.5:kernel-rt-5.14.21-150500.13.100.2.x86_64",
            "SUSE Linux Enterprise Micro 5.5:kernel-source-rt-5.14.21-150500.13.100.1.noarch"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2025-07-15T14:31:35Z",
          "details": "moderate"
        }
      ],
      "title": "CVE-2022-50031"
    },
    {
      "cve": "CVE-2022-50032",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2022-50032"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "In the Linux kernel, the following vulnerability has been resolved:\n\nusb: renesas: Fix refcount leak bug\n\nIn usbhs_rza1_hardware_init(), of_find_node_by_name() will return\na node pointer with refcount incremented. We should use of_node_put()\nwhen it is not used anymore.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "SUSE Linux Enterprise Micro 5.5:kernel-devel-rt-5.14.21-150500.13.100.1.noarch",
          "SUSE Linux Enterprise Micro 5.5:kernel-rt-5.14.21-150500.13.100.2.x86_64",
          "SUSE Linux Enterprise Micro 5.5:kernel-source-rt-5.14.21-150500.13.100.1.noarch"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2022-50032",
          "url": "https://www.suse.com/security/cve/CVE-2022-50032"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1245103 for CVE-2022-50032",
          "url": "https://bugzilla.suse.com/1245103"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "SUSE Linux Enterprise Micro 5.5:kernel-devel-rt-5.14.21-150500.13.100.1.noarch",
            "SUSE Linux Enterprise Micro 5.5:kernel-rt-5.14.21-150500.13.100.2.x86_64",
            "SUSE Linux Enterprise Micro 5.5:kernel-source-rt-5.14.21-150500.13.100.1.noarch"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 5.5,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
            "version": "3.1"
          },
          "products": [
            "SUSE Linux Enterprise Micro 5.5:kernel-devel-rt-5.14.21-150500.13.100.1.noarch",
            "SUSE Linux Enterprise Micro 5.5:kernel-rt-5.14.21-150500.13.100.2.x86_64",
            "SUSE Linux Enterprise Micro 5.5:kernel-source-rt-5.14.21-150500.13.100.1.noarch"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2025-07-15T14:31:35Z",
          "details": "moderate"
        }
      ],
      "title": "CVE-2022-50032"
    },
    {
      "cve": "CVE-2022-50033",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2022-50033"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "In the Linux kernel, the following vulnerability has been resolved:\n\nusb: host: ohci-ppc-of: Fix refcount leak bug\n\nIn ohci_hcd_ppc_of_probe(), of_find_compatible_node() will return\na node pointer with refcount incremented. We should use of_node_put()\nwhen it is not used anymore.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "SUSE Linux Enterprise Micro 5.5:kernel-devel-rt-5.14.21-150500.13.100.1.noarch",
          "SUSE Linux Enterprise Micro 5.5:kernel-rt-5.14.21-150500.13.100.2.x86_64",
          "SUSE Linux Enterprise Micro 5.5:kernel-source-rt-5.14.21-150500.13.100.1.noarch"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2022-50033",
          "url": "https://www.suse.com/security/cve/CVE-2022-50033"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1245139 for CVE-2022-50033",
          "url": "https://bugzilla.suse.com/1245139"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "SUSE Linux Enterprise Micro 5.5:kernel-devel-rt-5.14.21-150500.13.100.1.noarch",
            "SUSE Linux Enterprise Micro 5.5:kernel-rt-5.14.21-150500.13.100.2.x86_64",
            "SUSE Linux Enterprise Micro 5.5:kernel-source-rt-5.14.21-150500.13.100.1.noarch"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 5.5,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
            "version": "3.1"
          },
          "products": [
            "SUSE Linux Enterprise Micro 5.5:kernel-devel-rt-5.14.21-150500.13.100.1.noarch",
            "SUSE Linux Enterprise Micro 5.5:kernel-rt-5.14.21-150500.13.100.2.x86_64",
            "SUSE Linux Enterprise Micro 5.5:kernel-source-rt-5.14.21-150500.13.100.1.noarch"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2025-07-15T14:31:35Z",
          "details": "moderate"
        }
      ],
      "title": "CVE-2022-50033"
    },
    {
      "cve": "CVE-2022-50034",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2022-50034"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "In the Linux kernel, the following vulnerability has been resolved:\n\nusb: cdns3 fix use-after-free at workaround 2\n\nBUG: KFENCE: use-after-free read in __list_del_entry_valid+0x10/0xac\n\ncdns3_wa2_remove_old_request()\n{\n\t...\n\tkfree(priv_req-\u003erequest.buf);\n\tcdns3_gadget_ep_free_request(\u0026priv_ep-\u003eendpoint, \u0026priv_req-\u003erequest);\n\tlist_del_init(\u0026priv_req-\u003elist);\n\t^^^ use after free\n\t...\n}\n\ncdns3_gadget_ep_free_request() free the space pointed by priv_req,\nbut priv_req is used in the following list_del_init().\n\nThis patch move list_del_init() before cdns3_gadget_ep_free_request().",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "SUSE Linux Enterprise Micro 5.5:kernel-devel-rt-5.14.21-150500.13.100.1.noarch",
          "SUSE Linux Enterprise Micro 5.5:kernel-rt-5.14.21-150500.13.100.2.x86_64",
          "SUSE Linux Enterprise Micro 5.5:kernel-source-rt-5.14.21-150500.13.100.1.noarch"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2022-50034",
          "url": "https://www.suse.com/security/cve/CVE-2022-50034"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1245089 for CVE-2022-50034",
          "url": "https://bugzilla.suse.com/1245089"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "SUSE Linux Enterprise Micro 5.5:kernel-devel-rt-5.14.21-150500.13.100.1.noarch",
            "SUSE Linux Enterprise Micro 5.5:kernel-rt-5.14.21-150500.13.100.2.x86_64",
            "SUSE Linux Enterprise Micro 5.5:kernel-source-rt-5.14.21-150500.13.100.1.noarch"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 5.5,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
            "version": "3.1"
          },
          "products": [
            "SUSE Linux Enterprise Micro 5.5:kernel-devel-rt-5.14.21-150500.13.100.1.noarch",
            "SUSE Linux Enterprise Micro 5.5:kernel-rt-5.14.21-150500.13.100.2.x86_64",
            "SUSE Linux Enterprise Micro 5.5:kernel-source-rt-5.14.21-150500.13.100.1.noarch"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2025-07-15T14:31:35Z",
          "details": "moderate"
        }
      ],
      "title": "CVE-2022-50034"
    },
    {
      "cve": "CVE-2022-50035",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2022-50035"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "In the Linux kernel, the following vulnerability has been resolved:\n\ndrm/amdgpu: Fix use-after-free on amdgpu_bo_list mutex\n\nIf amdgpu_cs_vm_handling returns r != 0, then it will unlock the\nbo_list_mutex inside the function amdgpu_cs_vm_handling and again on\namdgpu_cs_parser_fini. This problem results in the following\nuse-after-free problem:\n\n[ 220.280990] ------------[ cut here ]------------\n[ 220.281000] refcount_t: underflow; use-after-free.\n[ 220.281019] WARNING: CPU: 1 PID: 3746 at lib/refcount.c:28 refcount_warn_saturate+0xba/0x110\n[ 220.281029] ------------[ cut here ]------------\n[ 220.281415] CPU: 1 PID: 3746 Comm: chrome:cs0 Tainted: G W L ------- --- 5.20.0-0.rc0.20220812git7ebfc85e2cd7.10.fc38.x86_64 #1\n[ 220.281421] Hardware name: System manufacturer System Product Name/ROG STRIX X570-I GAMING, BIOS 4403 04/27/2022\n[ 220.281426] RIP: 0010:refcount_warn_saturate+0xba/0x110\n[ 220.281431] Code: 01 01 e8 79 4a 6f 00 0f 0b e9 42 47 a5 00 80 3d de\n7e be 01 00 75 85 48 c7 c7 f8 98 8e 98 c6 05 ce 7e be 01 01 e8 56 4a\n6f 00 \u003c0f\u003e 0b e9 1f 47 a5 00 80 3d b9 7e be 01 00 0f 85 5e ff ff ff 48\nc7\n[ 220.281437] RSP: 0018:ffffb4b0d18d7a80 EFLAGS: 00010282\n[ 220.281443] RAX: 0000000000000026 RBX: 0000000000000003 RCX: 0000000000000000\n[ 220.281448] RDX: 0000000000000001 RSI: ffffffff988d06dc RDI: 00000000ffffffff\n[ 220.281452] RBP: 00000000ffffffff R08: 0000000000000000 R09: ffffb4b0d18d7930\n[ 220.281457] R10: 0000000000000003 R11: ffffa0672e2fffe8 R12: ffffa058ca360400\n[ 220.281461] R13: ffffa05846c50a18 R14: 00000000fffffe00 R15: 0000000000000003\n[ 220.281465] FS: 00007f82683e06c0(0000) GS:ffffa066e2e00000(0000) knlGS:0000000000000000\n[ 220.281470] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033\n[ 220.281475] CR2: 00003590005cc000 CR3: 00000001fca46000 CR4: 0000000000350ee0\n[ 220.281480] Call Trace:\n[ 220.281485] \u003cTASK\u003e\n[ 220.281490] amdgpu_cs_ioctl+0x4e2/0x2070 [amdgpu]\n[ 220.281806] ? amdgpu_cs_find_mapping+0xe0/0xe0 [amdgpu]\n[ 220.282028] drm_ioctl_kernel+0xa4/0x150\n[ 220.282043] drm_ioctl+0x21f/0x420\n[ 220.282053] ? amdgpu_cs_find_mapping+0xe0/0xe0 [amdgpu]\n[ 220.282275] ? lock_release+0x14f/0x460\n[ 220.282282] ? _raw_spin_unlock_irqrestore+0x30/0x60\n[ 220.282290] ? _raw_spin_unlock_irqrestore+0x30/0x60\n[ 220.282297] ? lockdep_hardirqs_on+0x7d/0x100\n[ 220.282305] ? _raw_spin_unlock_irqrestore+0x40/0x60\n[ 220.282317] amdgpu_drm_ioctl+0x4a/0x80 [amdgpu]\n[ 220.282534] __x64_sys_ioctl+0x90/0xd0\n[ 220.282545] do_syscall_64+0x5b/0x80\n[ 220.282551] ? futex_wake+0x6c/0x150\n[ 220.282568] ? lock_is_held_type+0xe8/0x140\n[ 220.282580] ? do_syscall_64+0x67/0x80\n[ 220.282585] ? lockdep_hardirqs_on+0x7d/0x100\n[ 220.282592] ? do_syscall_64+0x67/0x80\n[ 220.282597] ? do_syscall_64+0x67/0x80\n[ 220.282602] ? lockdep_hardirqs_on+0x7d/0x100\n[ 220.282609] entry_SYSCALL_64_after_hwframe+0x63/0xcd\n[ 220.282616] RIP: 0033:0x7f8282a4f8bf\n[ 220.282639] Code: 00 48 89 44 24 18 31 c0 48 8d 44 24 60 c7 04 24 10\n00 00 00 48 89 44 24 08 48 8d 44 24 20 48 89 44 24 10 b8 10 00 00 00\n0f 05 \u003c89\u003e c2 3d 00 f0 ff ff 77 18 48 8b 44 24 18 64 48 2b 04 25 28 00\n00\n[ 220.282644] RSP: 002b:00007f82683df410 EFLAGS: 00000246 ORIG_RAX: 0000000000000010\n[ 220.282651] RAX: ffffffffffffffda RBX: 00007f82683df588 RCX: 00007f8282a4f8bf\n[ 220.282655] RDX: 00007f82683df4d0 RSI: 00000000c0186444 RDI: 0000000000000018\n[ 220.282659] RBP: 00007f82683df4d0 R08: 00007f82683df5e0 R09: 00007f82683df4b0\n[ 220.282663] R10: 00001d04000a0600 R11: 0000000000000246 R12: 00000000c0186444\n[ 220.282667] R13: 0000000000000018 R14: 00007f82683df588 R15: 0000000000000003\n[ 220.282689] \u003c/TASK\u003e\n[ 220.282693] irq event stamp: 6232311\n[ 220.282697] hardirqs last enabled at (6232319): [\u003cffffffff9718cd7e\u003e] __up_console_sem+0x5e/0x70\n[ 220.282704] hardirqs last disabled at (6232326): [\u003cffffffff9718cd63\u003e] __up_console_sem+0x43/0x70\n[ 220.282709] softirqs last enabled at (6232072): [\u003cffffffff970ff669\u003e] __irq_exit_rcu+0xf9/0x170\n[ 220.282716] softirqs last disabled at (6232061): [\u003cffffffff97\n---truncated---",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "SUSE Linux Enterprise Micro 5.5:kernel-devel-rt-5.14.21-150500.13.100.1.noarch",
          "SUSE Linux Enterprise Micro 5.5:kernel-rt-5.14.21-150500.13.100.2.x86_64",
          "SUSE Linux Enterprise Micro 5.5:kernel-source-rt-5.14.21-150500.13.100.1.noarch"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2022-50035",
          "url": "https://www.suse.com/security/cve/CVE-2022-50035"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1244955 for CVE-2022-50035",
          "url": "https://bugzilla.suse.com/1244955"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "SUSE Linux Enterprise Micro 5.5:kernel-devel-rt-5.14.21-150500.13.100.1.noarch",
            "SUSE Linux Enterprise Micro 5.5:kernel-rt-5.14.21-150500.13.100.2.x86_64",
            "SUSE Linux Enterprise Micro 5.5:kernel-source-rt-5.14.21-150500.13.100.1.noarch"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 5.5,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
            "version": "3.1"
          },
          "products": [
            "SUSE Linux Enterprise Micro 5.5:kernel-devel-rt-5.14.21-150500.13.100.1.noarch",
            "SUSE Linux Enterprise Micro 5.5:kernel-rt-5.14.21-150500.13.100.2.x86_64",
            "SUSE Linux Enterprise Micro 5.5:kernel-source-rt-5.14.21-150500.13.100.1.noarch"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2025-07-15T14:31:35Z",
          "details": "moderate"
        }
      ],
      "title": "CVE-2022-50035"
    },
    {
      "cve": "CVE-2022-50036",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2022-50036"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "In the Linux kernel, the following vulnerability has been resolved:\n\ndrm/sun4i: dsi: Prevent underflow when computing packet sizes\n\nCurrently, the packet overhead is subtracted using unsigned arithmetic.\nWith a short sync pulse, this could underflow and wrap around to near\nthe maximal u16 value. Fix this by using signed subtraction. The call to\nmax() will correctly handle any negative numbers that are produced.\n\nApply the same fix to the other timings, even though those subtractions\nare less likely to underflow.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "SUSE Linux Enterprise Micro 5.5:kernel-devel-rt-5.14.21-150500.13.100.1.noarch",
          "SUSE Linux Enterprise Micro 5.5:kernel-rt-5.14.21-150500.13.100.2.x86_64",
          "SUSE Linux Enterprise Micro 5.5:kernel-source-rt-5.14.21-150500.13.100.1.noarch"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2022-50036",
          "url": "https://www.suse.com/security/cve/CVE-2022-50036"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1244941 for CVE-2022-50036",
          "url": "https://bugzilla.suse.com/1244941"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "SUSE Linux Enterprise Micro 5.5:kernel-devel-rt-5.14.21-150500.13.100.1.noarch",
            "SUSE Linux Enterprise Micro 5.5:kernel-rt-5.14.21-150500.13.100.2.x86_64",
            "SUSE Linux Enterprise Micro 5.5:kernel-source-rt-5.14.21-150500.13.100.1.noarch"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 5.5,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
            "version": "3.1"
          },
          "products": [
            "SUSE Linux Enterprise Micro 5.5:kernel-devel-rt-5.14.21-150500.13.100.1.noarch",
            "SUSE Linux Enterprise Micro 5.5:kernel-rt-5.14.21-150500.13.100.2.x86_64",
            "SUSE Linux Enterprise Micro 5.5:kernel-source-rt-5.14.21-150500.13.100.1.noarch"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2025-07-15T14:31:35Z",
          "details": "moderate"
        }
      ],
      "title": "CVE-2022-50036"
    },
    {
      "cve": "CVE-2022-50037",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2022-50037"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "In the Linux kernel, the following vulnerability has been resolved:\n\ndrm/i915/ttm: don\u0027t leak the ccs state\n\nThe kernel only manages the ccs state with lmem-only objects, however\nthe kernel should still take care not to leak the CCS state from the\nprevious user.\n\n(cherry picked from commit 353819d85f87be46aeb9c1dd929d445a006fc6ec)",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "SUSE Linux Enterprise Micro 5.5:kernel-devel-rt-5.14.21-150500.13.100.1.noarch",
          "SUSE Linux Enterprise Micro 5.5:kernel-rt-5.14.21-150500.13.100.2.x86_64",
          "SUSE Linux Enterprise Micro 5.5:kernel-source-rt-5.14.21-150500.13.100.1.noarch"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2022-50037",
          "url": "https://www.suse.com/security/cve/CVE-2022-50037"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1244953 for CVE-2022-50037",
          "url": "https://bugzilla.suse.com/1244953"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "SUSE Linux Enterprise Micro 5.5:kernel-devel-rt-5.14.21-150500.13.100.1.noarch",
            "SUSE Linux Enterprise Micro 5.5:kernel-rt-5.14.21-150500.13.100.2.x86_64",
            "SUSE Linux Enterprise Micro 5.5:kernel-source-rt-5.14.21-150500.13.100.1.noarch"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 5.5,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
            "version": "3.1"
          },
          "products": [
            "SUSE Linux Enterprise Micro 5.5:kernel-devel-rt-5.14.21-150500.13.100.1.noarch",
            "SUSE Linux Enterprise Micro 5.5:kernel-rt-5.14.21-150500.13.100.2.x86_64",
            "SUSE Linux Enterprise Micro 5.5:kernel-source-rt-5.14.21-150500.13.100.1.noarch"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2025-07-15T14:31:35Z",
          "details": "moderate"
        }
      ],
      "title": "CVE-2022-50037"
    },
    {
      "cve": "CVE-2022-50038",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2022-50038"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "In the Linux kernel, the following vulnerability has been resolved:\n\ndrm/meson: Fix refcount bugs in meson_vpu_has_available_connectors()\n\nIn this function, there are two refcount leak bugs:\n(1) when breaking out of for_each_endpoint_of_node(), we need call\nthe of_node_put() for the \u0027ep\u0027;\n(2) we should call of_node_put() for the reference returned by\nof_graph_get_remote_port() when it is not used anymore.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "SUSE Linux Enterprise Micro 5.5:kernel-devel-rt-5.14.21-150500.13.100.1.noarch",
          "SUSE Linux Enterprise Micro 5.5:kernel-rt-5.14.21-150500.13.100.2.x86_64",
          "SUSE Linux Enterprise Micro 5.5:kernel-source-rt-5.14.21-150500.13.100.1.noarch"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2022-50038",
          "url": "https://www.suse.com/security/cve/CVE-2022-50038"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1244943 for CVE-2022-50038",
          "url": "https://bugzilla.suse.com/1244943"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "SUSE Linux Enterprise Micro 5.5:kernel-devel-rt-5.14.21-150500.13.100.1.noarch",
            "SUSE Linux Enterprise Micro 5.5:kernel-rt-5.14.21-150500.13.100.2.x86_64",
            "SUSE Linux Enterprise Micro 5.5:kernel-source-rt-5.14.21-150500.13.100.1.noarch"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 5.5,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
            "version": "3.1"
          },
          "products": [
            "SUSE Linux Enterprise Micro 5.5:kernel-devel-rt-5.14.21-150500.13.100.1.noarch",
            "SUSE Linux Enterprise Micro 5.5:kernel-rt-5.14.21-150500.13.100.2.x86_64",
            "SUSE Linux Enterprise Micro 5.5:kernel-source-rt-5.14.21-150500.13.100.1.noarch"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2025-07-15T14:31:35Z",
          "details": "moderate"
        }
      ],
      "title": "CVE-2022-50038"
    },
    {
      "cve": "CVE-2022-50039",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2022-50039"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "In the Linux kernel, the following vulnerability has been resolved:\n\nstmmac: intel: Add a missing clk_disable_unprepare() call in intel_eth_pci_remove()\n\nCommit 09f012e64e4b (\"stmmac: intel: Fix clock handling on error and remove\npaths\") removed this clk_disable_unprepare()\n\nThis was partly revert by commit ac322f86b56c (\"net: stmmac: Fix clock\nhandling on remove path\") which removed this clk_disable_unprepare()\nbecause:\n\"\n   While unloading the dwmac-intel driver, clk_disable_unprepare() is\n   being called twice in stmmac_dvr_remove() and\n   intel_eth_pci_remove(). This causes kernel panic on the second call.\n\"\n\nHowever later on, commit 5ec55823438e8 (\"net: stmmac: add clocks management\nfor gmac driver\") has updated stmmac_dvr_remove() which do not call\nclk_disable_unprepare() anymore.\n\nSo this call should now be called from intel_eth_pci_remove().",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "SUSE Linux Enterprise Micro 5.5:kernel-devel-rt-5.14.21-150500.13.100.1.noarch",
          "SUSE Linux Enterprise Micro 5.5:kernel-rt-5.14.21-150500.13.100.2.x86_64",
          "SUSE Linux Enterprise Micro 5.5:kernel-source-rt-5.14.21-150500.13.100.1.noarch"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2022-50039",
          "url": "https://www.suse.com/security/cve/CVE-2022-50039"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1244942 for CVE-2022-50039",
          "url": "https://bugzilla.suse.com/1244942"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "SUSE Linux Enterprise Micro 5.5:kernel-devel-rt-5.14.21-150500.13.100.1.noarch",
            "SUSE Linux Enterprise Micro 5.5:kernel-rt-5.14.21-150500.13.100.2.x86_64",
            "SUSE Linux Enterprise Micro 5.5:kernel-source-rt-5.14.21-150500.13.100.1.noarch"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 5.5,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
            "version": "3.1"
          },
          "products": [
            "SUSE Linux Enterprise Micro 5.5:kernel-devel-rt-5.14.21-150500.13.100.1.noarch",
            "SUSE Linux Enterprise Micro 5.5:kernel-rt-5.14.21-150500.13.100.2.x86_64",
            "SUSE Linux Enterprise Micro 5.5:kernel-source-rt-5.14.21-150500.13.100.1.noarch"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2025-07-15T14:31:35Z",
          "details": "moderate"
        }
      ],
      "title": "CVE-2022-50039"
    },
    {
      "cve": "CVE-2022-50040",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2022-50040"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "In the Linux kernel, the following vulnerability has been resolved:\n\nnet: dsa: sja1105: fix buffer overflow in sja1105_setup_devlink_regions()\n\nIf an error occurs in dsa_devlink_region_create(), then \u0027priv-\u003eregions\u0027\narray will be accessed by negative index \u0027-1\u0027.\n\nFound by Linux Verification Center (linuxtesting.org) with SVACE.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "SUSE Linux Enterprise Micro 5.5:kernel-devel-rt-5.14.21-150500.13.100.1.noarch",
          "SUSE Linux Enterprise Micro 5.5:kernel-rt-5.14.21-150500.13.100.2.x86_64",
          "SUSE Linux Enterprise Micro 5.5:kernel-source-rt-5.14.21-150500.13.100.1.noarch"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2022-50040",
          "url": "https://www.suse.com/security/cve/CVE-2022-50040"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1244949 for CVE-2022-50040",
          "url": "https://bugzilla.suse.com/1244949"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "SUSE Linux Enterprise Micro 5.5:kernel-devel-rt-5.14.21-150500.13.100.1.noarch",
            "SUSE Linux Enterprise Micro 5.5:kernel-rt-5.14.21-150500.13.100.2.x86_64",
            "SUSE Linux Enterprise Micro 5.5:kernel-source-rt-5.14.21-150500.13.100.1.noarch"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 5.5,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
            "version": "3.1"
          },
          "products": [
            "SUSE Linux Enterprise Micro 5.5:kernel-devel-rt-5.14.21-150500.13.100.1.noarch",
            "SUSE Linux Enterprise Micro 5.5:kernel-rt-5.14.21-150500.13.100.2.x86_64",
            "SUSE Linux Enterprise Micro 5.5:kernel-source-rt-5.14.21-150500.13.100.1.noarch"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2025-07-15T14:31:35Z",
          "details": "moderate"
        }
      ],
      "title": "CVE-2022-50040"
    },
    {
      "cve": "CVE-2022-50041",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2022-50041"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "In the Linux kernel, the following vulnerability has been resolved:\n\nice: Fix call trace with null VSI during VF reset\n\nDuring stress test with attaching and detaching VF from KVM and\nsimultaneously changing VFs spoofcheck and trust there was a\ncall trace in ice_reset_vf that VF\u0027s VSI is null.\n\n[145237.352797] WARNING: CPU: 46 PID: 840629 at drivers/net/ethernet/intel/ice/ice_vf_lib.c:508 ice_reset_vf+0x3d6/0x410 [ice]\n[145237.352851] Modules linked in: ice(E) vfio_pci vfio_pci_core vfio_virqfd vfio_iommu_type1 vfio iavf dm_mod xt_CHECKSUM xt_MASQUERADE\nxt_conntrack ipt_REJECT nf_reject_ipv4 nft_compat nft_chain_nat nf_nat nf_conntrack nf_defrag_ipv6 nf_defrag_ipv4 nf_tables nfnetlink tun\n bridge stp llc sunrpc intel_rapl_msr intel_rapl_common sb_edac x86_pkg_temp_thermal intel_powerclamp coretemp kvm_intel kvm iTCO_wdt iTC\nO_vendor_support irqbypass crct10dif_pclmul crc32_pclmul ghash_clmulni_intel rapl ipmi_si intel_cstate ipmi_devintf joydev intel_uncore m\nei_me ipmi_msghandler i2c_i801 pcspkr mei lpc_ich ioatdma i2c_smbus acpi_pad acpi_power_meter ip_tables xfs libcrc32c i2c_algo_bit drm_sh\nmem_helper drm_kms_helper sd_mod t10_pi crc64_rocksoft syscopyarea crc64 sysfillrect sg sysimgblt fb_sys_fops drm i40e ixgbe ahci libahci\n libata crc32c_intel mdio dca wmi fuse [last unloaded: ice]\n[145237.352917] CPU: 46 PID: 840629 Comm: kworker/46:2 Tainted: G S      W I E     5.19.0-rc6+ #24\n[145237.352921] Hardware name: Intel Corporation S2600WTT/S2600WTT, BIOS SE5C610.86B.01.01.0008.021120151325 02/11/2015\n[145237.352923] Workqueue: ice ice_service_task [ice]\n[145237.352948] RIP: 0010:ice_reset_vf+0x3d6/0x410 [ice]\n[145237.352984] Code: 30 ec f3 cc e9 28 fd ff ff 0f b7 4b 50 48 c7 c2 48 19 9c c0 4c 89 ee 48 c7 c7 30 fe 9e c0 e8 d1 21 9d cc 31 c0 e9 a\n9 fe ff ff \u003c0f\u003e 0b b8 ea ff ff ff e9 c1 fc ff ff 0f 0b b8 fb ff ff ff e9 91 fe\n[145237.352987] RSP: 0018:ffffb453e257fdb8 EFLAGS: 00010246\n[145237.352990] RAX: ffff8bd0040181c0 RBX: ffff8be68db8f800 RCX: 0000000000000000\n[145237.352991] RDX: 000000000000ffff RSI: 0000000000000000 RDI: ffff8be68db8f800\n[145237.352993] RBP: ffff8bd0040181c0 R08: 0000000000001000 R09: ffff8bcfd520e000\n[145237.352995] R10: 0000000000000000 R11: 00008417b5ab0bc0 R12: 0000000000000005\n[145237.352996] R13: ffff8bcee061c0d0 R14: ffff8bd004019640 R15: 0000000000000000\n[145237.352998] FS:  0000000000000000(0000) GS:ffff8be5dfb00000(0000) knlGS:0000000000000000\n[145237.353000] CS:  0010 DS: 0000 ES: 0000 CR0: 0000000080050033\n[145237.353002] CR2: 00007fd81f651d68 CR3: 0000001a0fe10001 CR4: 00000000001726e0\n[145237.353003] Call Trace:\n[145237.353008]  \u003cTASK\u003e\n[145237.353011]  ice_process_vflr_event+0x8d/0xb0 [ice]\n[145237.353049]  ice_service_task+0x79f/0xef0 [ice]\n[145237.353074]  process_one_work+0x1c8/0x390\n[145237.353081]  ? process_one_work+0x390/0x390\n[145237.353084]  worker_thread+0x30/0x360\n[145237.353087]  ? process_one_work+0x390/0x390\n[145237.353090]  kthread+0xe8/0x110\n[145237.353094]  ? kthread_complete_and_exit+0x20/0x20\n[145237.353097]  ret_from_fork+0x22/0x30\n[145237.353103]  \u003c/TASK\u003e\n\nRemove WARN_ON() from check if VSI is null in ice_reset_vf.\nAdd \"VF is already removed\\n\" in dev_dbg().\n\nThis WARN_ON() is unnecessary and causes call trace, despite that\ncall trace, driver still works. There is no need for this warn\nbecause this piece of code is responsible for disabling VF\u0027s Tx/Rx\nqueues when VF is disabled, but when VF is already removed there\nis no need to do reset or disable queues.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "SUSE Linux Enterprise Micro 5.5:kernel-devel-rt-5.14.21-150500.13.100.1.noarch",
          "SUSE Linux Enterprise Micro 5.5:kernel-rt-5.14.21-150500.13.100.2.x86_64",
          "SUSE Linux Enterprise Micro 5.5:kernel-source-rt-5.14.21-150500.13.100.1.noarch"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2022-50041",
          "url": "https://www.suse.com/security/cve/CVE-2022-50041"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1244957 for CVE-2022-50041",
          "url": "https://bugzilla.suse.com/1244957"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "SUSE Linux Enterprise Micro 5.5:kernel-devel-rt-5.14.21-150500.13.100.1.noarch",
            "SUSE Linux Enterprise Micro 5.5:kernel-rt-5.14.21-150500.13.100.2.x86_64",
            "SUSE Linux Enterprise Micro 5.5:kernel-source-rt-5.14.21-150500.13.100.1.noarch"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 5.5,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
            "version": "3.1"
          },
          "products": [
            "SUSE Linux Enterprise Micro 5.5:kernel-devel-rt-5.14.21-150500.13.100.1.noarch",
            "SUSE Linux Enterprise Micro 5.5:kernel-rt-5.14.21-150500.13.100.2.x86_64",
            "SUSE Linux Enterprise Micro 5.5:kernel-source-rt-5.14.21-150500.13.100.1.noarch"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2025-07-15T14:31:35Z",
          "details": "moderate"
        }
      ],
      "title": "CVE-2022-50041"
    },
    {
      "cve": "CVE-2022-50044",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2022-50044"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "In the Linux kernel, the following vulnerability has been resolved:\n\nnet: qrtr: start MHI channel after endpoit creation\n\nMHI channel may generates event/interrupt right after enabling.\nIt may leads to 2 race conditions issues.\n\n1)\nSuch event may be dropped by qcom_mhi_qrtr_dl_callback() at check:\n\n\tif (!qdev || mhi_res-\u003etransaction_status)\n\t\treturn;\n\nBecause dev_set_drvdata(\u0026mhi_dev-\u003edev, qdev) may be not performed at\nthis moment. In this situation qrtr-ns will be unable to enumerate\nservices in device.\n---------------------------------------------------------------\n\n2)\nSuch event may come at the moment after dev_set_drvdata() and\nbefore qrtr_endpoint_register(). In this case kernel will panic with\naccessing wrong pointer at qcom_mhi_qrtr_dl_callback():\n\n\trc = qrtr_endpoint_post(\u0026qdev-\u003eep, mhi_res-\u003ebuf_addr,\n\t\t\t\tmhi_res-\u003ebytes_xferd);\n\nBecause endpoint is not created yet.\n--------------------------------------------------------------\nSo move mhi_prepare_for_transfer_autoqueue after endpoint creation\nto fix it.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "SUSE Linux Enterprise Micro 5.5:kernel-devel-rt-5.14.21-150500.13.100.1.noarch",
          "SUSE Linux Enterprise Micro 5.5:kernel-rt-5.14.21-150500.13.100.2.x86_64",
          "SUSE Linux Enterprise Micro 5.5:kernel-source-rt-5.14.21-150500.13.100.1.noarch"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2022-50044",
          "url": "https://www.suse.com/security/cve/CVE-2022-50044"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1244961 for CVE-2022-50044",
          "url": "https://bugzilla.suse.com/1244961"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "SUSE Linux Enterprise Micro 5.5:kernel-devel-rt-5.14.21-150500.13.100.1.noarch",
            "SUSE Linux Enterprise Micro 5.5:kernel-rt-5.14.21-150500.13.100.2.x86_64",
            "SUSE Linux Enterprise Micro 5.5:kernel-source-rt-5.14.21-150500.13.100.1.noarch"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 5.5,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
            "version": "3.1"
          },
          "products": [
            "SUSE Linux Enterprise Micro 5.5:kernel-devel-rt-5.14.21-150500.13.100.1.noarch",
            "SUSE Linux Enterprise Micro 5.5:kernel-rt-5.14.21-150500.13.100.2.x86_64",
            "SUSE Linux Enterprise Micro 5.5:kernel-source-rt-5.14.21-150500.13.100.1.noarch"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2025-07-15T14:31:35Z",
          "details": "moderate"
        }
      ],
      "title": "CVE-2022-50044"
    },
    {
      "cve": "CVE-2022-50045",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2022-50045"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "In the Linux kernel, the following vulnerability has been resolved:\n\npowerpc/pci: Fix get_phb_number() locking\n\nThe recent change to get_phb_number() causes a DEBUG_ATOMIC_SLEEP\nwarning on some systems:\n\n  BUG: sleeping function called from invalid context at kernel/locking/mutex.c:580\n  in_atomic(): 1, irqs_disabled(): 0, non_block: 0, pid: 1, name: swapper\n  preempt_count: 1, expected: 0\n  RCU nest depth: 0, expected: 0\n  1 lock held by swapper/1:\n   #0: c157efb0 (hose_spinlock){+.+.}-{2:2}, at: pcibios_alloc_controller+0x64/0x220\n  Preemption disabled at:\n  [\u003c00000000\u003e] 0x0\n  CPU: 0 PID: 1 Comm: swapper Not tainted 5.19.0-yocto-standard+ #1\n  Call Trace:\n  [d101dc90] [c073b264] dump_stack_lvl+0x50/0x8c (unreliable)\n  [d101dcb0] [c0093b70] __might_resched+0x258/0x2a8\n  [d101dcd0] [c0d3e634] __mutex_lock+0x6c/0x6ec\n  [d101dd50] [c0a84174] of_alias_get_id+0x50/0xf4\n  [d101dd80] [c002ec78] pcibios_alloc_controller+0x1b8/0x220\n  [d101ddd0] [c140c9dc] pmac_pci_init+0x198/0x784\n  [d101de50] [c140852c] discover_phbs+0x30/0x4c\n  [d101de60] [c0007fd4] do_one_initcall+0x94/0x344\n  [d101ded0] [c1403b40] kernel_init_freeable+0x1a8/0x22c\n  [d101df10] [c00086e0] kernel_init+0x34/0x160\n  [d101df30] [c001b334] ret_from_kernel_thread+0x5c/0x64\n\nThis is because pcibios_alloc_controller() holds hose_spinlock but\nof_alias_get_id() takes of_mutex which can sleep.\n\nThe hose_spinlock protects the phb_bitmap, and also the hose_list, but\nit doesn\u0027t need to be held while get_phb_number() calls the OF routines,\nbecause those are only looking up information in the device tree.\n\nSo fix it by having get_phb_number() take the hose_spinlock itself, only\nwhere required, and then dropping the lock before returning.\npcibios_alloc_controller() then needs to take the lock again before the\nlist_add() but that\u0027s safe, the order of the list is not important.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "SUSE Linux Enterprise Micro 5.5:kernel-devel-rt-5.14.21-150500.13.100.1.noarch",
          "SUSE Linux Enterprise Micro 5.5:kernel-rt-5.14.21-150500.13.100.2.x86_64",
          "SUSE Linux Enterprise Micro 5.5:kernel-source-rt-5.14.21-150500.13.100.1.noarch"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2022-50045",
          "url": "https://www.suse.com/security/cve/CVE-2022-50045"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1244967 for CVE-2022-50045",
          "url": "https://bugzilla.suse.com/1244967"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "SUSE Linux Enterprise Micro 5.5:kernel-devel-rt-5.14.21-150500.13.100.1.noarch",
            "SUSE Linux Enterprise Micro 5.5:kernel-rt-5.14.21-150500.13.100.2.x86_64",
            "SUSE Linux Enterprise Micro 5.5:kernel-source-rt-5.14.21-150500.13.100.1.noarch"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 5.5,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
            "version": "3.1"
          },
          "products": [
            "SUSE Linux Enterprise Micro 5.5:kernel-devel-rt-5.14.21-150500.13.100.1.noarch",
            "SUSE Linux Enterprise Micro 5.5:kernel-rt-5.14.21-150500.13.100.2.x86_64",
            "SUSE Linux Enterprise Micro 5.5:kernel-source-rt-5.14.21-150500.13.100.1.noarch"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2025-07-15T14:31:35Z",
          "details": "moderate"
        }
      ],
      "title": "CVE-2022-50045"
    },
    {
      "cve": "CVE-2022-50046",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2022-50046"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "In the Linux kernel, the following vulnerability has been resolved:\n\nnet/sunrpc: fix potential memory leaks in rpc_sysfs_xprt_state_change()\n\nThe issue happens on some error handling paths. When the function\nfails to grab the object `xprt`, it simply returns 0, forgetting to\ndecrease the reference count of another object `xps`, which is\nincreased by rpc_sysfs_xprt_kobj_get_xprt_switch(), causing refcount\nleaks. Also, the function forgets to check whether `xps` is valid\nbefore using it, which may result in NULL-dereferencing issues.\n\nFix it by adding proper error handling code when either `xprt` or\n`xps` is NULL.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "SUSE Linux Enterprise Micro 5.5:kernel-devel-rt-5.14.21-150500.13.100.1.noarch",
          "SUSE Linux Enterprise Micro 5.5:kernel-rt-5.14.21-150500.13.100.2.x86_64",
          "SUSE Linux Enterprise Micro 5.5:kernel-source-rt-5.14.21-150500.13.100.1.noarch"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2022-50046",
          "url": "https://www.suse.com/security/cve/CVE-2022-50046"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1244991 for CVE-2022-50046",
          "url": "https://bugzilla.suse.com/1244991"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "SUSE Linux Enterprise Micro 5.5:kernel-devel-rt-5.14.21-150500.13.100.1.noarch",
            "SUSE Linux Enterprise Micro 5.5:kernel-rt-5.14.21-150500.13.100.2.x86_64",
            "SUSE Linux Enterprise Micro 5.5:kernel-source-rt-5.14.21-150500.13.100.1.noarch"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 5.5,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
            "version": "3.1"
          },
          "products": [
            "SUSE Linux Enterprise Micro 5.5:kernel-devel-rt-5.14.21-150500.13.100.1.noarch",
            "SUSE Linux Enterprise Micro 5.5:kernel-rt-5.14.21-150500.13.100.2.x86_64",
            "SUSE Linux Enterprise Micro 5.5:kernel-source-rt-5.14.21-150500.13.100.1.noarch"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2025-07-15T14:31:35Z",
          "details": "moderate"
        }
      ],
      "title": "CVE-2022-50046"
    },
    {
      "cve": "CVE-2022-50047",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2022-50047"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "In the Linux kernel, the following vulnerability has been resolved:\n\nnet: dsa: mv88e6060: prevent crash on an unused port\n\nIf the port isn\u0027t a CPU port nor a user port, \u0027cpu_dp\u0027\nis a null pointer and a crash happened on dereferencing\nit in mv88e6060_setup_port():\n\n[    9.575872] Unable to handle kernel NULL pointer dereference at virtual address 00000014\n...\n[    9.942216]  mv88e6060_setup from dsa_register_switch+0x814/0xe84\n[    9.948616]  dsa_register_switch from mdio_probe+0x2c/0x54\n[    9.954433]  mdio_probe from really_probe.part.0+0x98/0x2a0\n[    9.960375]  really_probe.part.0 from driver_probe_device+0x30/0x10c\n[    9.967029]  driver_probe_device from __device_attach_driver+0xb8/0x13c\n[    9.973946]  __device_attach_driver from bus_for_each_drv+0x90/0xe0\n[    9.980509]  bus_for_each_drv from __device_attach+0x110/0x184\n[    9.986632]  __device_attach from bus_probe_device+0x8c/0x94\n[    9.992577]  bus_probe_device from deferred_probe_work_func+0x78/0xa8\n[    9.999311]  deferred_probe_work_func from process_one_work+0x290/0x73c\n[   10.006292]  process_one_work from worker_thread+0x30/0x4b8\n[   10.012155]  worker_thread from kthread+0xd4/0x10c\n[   10.017238]  kthread from ret_from_fork+0x14/0x3c",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "SUSE Linux Enterprise Micro 5.5:kernel-devel-rt-5.14.21-150500.13.100.1.noarch",
          "SUSE Linux Enterprise Micro 5.5:kernel-rt-5.14.21-150500.13.100.2.x86_64",
          "SUSE Linux Enterprise Micro 5.5:kernel-source-rt-5.14.21-150500.13.100.1.noarch"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2022-50047",
          "url": "https://www.suse.com/security/cve/CVE-2022-50047"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1244993 for CVE-2022-50047",
          "url": "https://bugzilla.suse.com/1244993"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "SUSE Linux Enterprise Micro 5.5:kernel-devel-rt-5.14.21-150500.13.100.1.noarch",
            "SUSE Linux Enterprise Micro 5.5:kernel-rt-5.14.21-150500.13.100.2.x86_64",
            "SUSE Linux Enterprise Micro 5.5:kernel-source-rt-5.14.21-150500.13.100.1.noarch"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 5.5,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
            "version": "3.1"
          },
          "products": [
            "SUSE Linux Enterprise Micro 5.5:kernel-devel-rt-5.14.21-150500.13.100.1.noarch",
            "SUSE Linux Enterprise Micro 5.5:kernel-rt-5.14.21-150500.13.100.2.x86_64",
            "SUSE Linux Enterprise Micro 5.5:kernel-source-rt-5.14.21-150500.13.100.1.noarch"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2025-07-15T14:31:35Z",
          "details": "moderate"
        }
      ],
      "title": "CVE-2022-50047"
    },
    {
      "cve": "CVE-2022-50049",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2022-50049"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "In the Linux kernel, the following vulnerability has been resolved:\n\nASoC: DPCM: Don\u0027t pick up BE without substream\n\nWhen DPCM tries to add valid BE connections at dpcm_add_paths(), it\ndoesn\u0027t check whether the picked BE actually supports for the given\nstream direction.  Due to that, when an asymmetric BE stream is\npresent, it picks up wrongly and this may result in a NULL dereference\nat a later point where the code assumes the existence of a\ncorresponding BE substream.\n\nThis patch adds the check for the presence of the substream for the\ntarget BE for avoiding the problem above.\n\nNote that we have already some fix for non-existing BE substream at\ncommit 6246f283d5e0 (\"ASoC: dpcm: skip missing substream while\napplying symmetry\").  But the code path we\u0027ve hit recently is rather\nhappening before the previous fix.  So this patch tries to fix at\npicking up a BE instead of parsing BE lists.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "SUSE Linux Enterprise Micro 5.5:kernel-devel-rt-5.14.21-150500.13.100.1.noarch",
          "SUSE Linux Enterprise Micro 5.5:kernel-rt-5.14.21-150500.13.100.2.x86_64",
          "SUSE Linux Enterprise Micro 5.5:kernel-source-rt-5.14.21-150500.13.100.1.noarch"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2022-50049",
          "url": "https://www.suse.com/security/cve/CVE-2022-50049"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1244973 for CVE-2022-50049",
          "url": "https://bugzilla.suse.com/1244973"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "SUSE Linux Enterprise Micro 5.5:kernel-devel-rt-5.14.21-150500.13.100.1.noarch",
            "SUSE Linux Enterprise Micro 5.5:kernel-rt-5.14.21-150500.13.100.2.x86_64",
            "SUSE Linux Enterprise Micro 5.5:kernel-source-rt-5.14.21-150500.13.100.1.noarch"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 5.5,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
            "version": "3.1"
          },
          "products": [
            "SUSE Linux Enterprise Micro 5.5:kernel-devel-rt-5.14.21-150500.13.100.1.noarch",
            "SUSE Linux Enterprise Micro 5.5:kernel-rt-5.14.21-150500.13.100.2.x86_64",
            "SUSE Linux Enterprise Micro 5.5:kernel-source-rt-5.14.21-150500.13.100.1.noarch"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2025-07-15T14:31:35Z",
          "details": "moderate"
        }
      ],
      "title": "CVE-2022-50049"
    },
    {
      "cve": "CVE-2022-50050",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2022-50050"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "In the Linux kernel, the following vulnerability has been resolved:\n\nASoC: SOF: Intel: hda: Fix potential buffer overflow by snprintf()\n\nsnprintf() returns the would-be-filled size when the string overflows\nthe given buffer size, hence using this value may result in the buffer\noverflow (although it\u0027s unrealistic).\n\nThis patch replaces with a safer version, scnprintf() for papering\nover such a potential issue.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "SUSE Linux Enterprise Micro 5.5:kernel-devel-rt-5.14.21-150500.13.100.1.noarch",
          "SUSE Linux Enterprise Micro 5.5:kernel-rt-5.14.21-150500.13.100.2.x86_64",
          "SUSE Linux Enterprise Micro 5.5:kernel-source-rt-5.14.21-150500.13.100.1.noarch"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2022-50050",
          "url": "https://www.suse.com/security/cve/CVE-2022-50050"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1244987 for CVE-2022-50050",
          "url": "https://bugzilla.suse.com/1244987"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "SUSE Linux Enterprise Micro 5.5:kernel-devel-rt-5.14.21-150500.13.100.1.noarch",
            "SUSE Linux Enterprise Micro 5.5:kernel-rt-5.14.21-150500.13.100.2.x86_64",
            "SUSE Linux Enterprise Micro 5.5:kernel-source-rt-5.14.21-150500.13.100.1.noarch"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 5.5,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
            "version": "3.1"
          },
          "products": [
            "SUSE Linux Enterprise Micro 5.5:kernel-devel-rt-5.14.21-150500.13.100.1.noarch",
            "SUSE Linux Enterprise Micro 5.5:kernel-rt-5.14.21-150500.13.100.2.x86_64",
            "SUSE Linux Enterprise Micro 5.5:kernel-source-rt-5.14.21-150500.13.100.1.noarch"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2025-07-15T14:31:35Z",
          "details": "moderate"
        }
      ],
      "title": "CVE-2022-50050"
    },
    {
      "cve": "CVE-2022-50051",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2022-50051"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "In the Linux kernel, the following vulnerability has been resolved:\n\nASoC: SOF: debug: Fix potential buffer overflow by snprintf()\n\nsnprintf() returns the would-be-filled size when the string overflows\nthe given buffer size, hence using this value may result in the buffer\noverflow (although it\u0027s unrealistic).\n\nThis patch replaces with a safer version, scnprintf() for papering\nover such a potential issue.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "SUSE Linux Enterprise Micro 5.5:kernel-devel-rt-5.14.21-150500.13.100.1.noarch",
          "SUSE Linux Enterprise Micro 5.5:kernel-rt-5.14.21-150500.13.100.2.x86_64",
          "SUSE Linux Enterprise Micro 5.5:kernel-source-rt-5.14.21-150500.13.100.1.noarch"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2022-50051",
          "url": "https://www.suse.com/security/cve/CVE-2022-50051"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1245041 for CVE-2022-50051",
          "url": "https://bugzilla.suse.com/1245041"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "SUSE Linux Enterprise Micro 5.5:kernel-devel-rt-5.14.21-150500.13.100.1.noarch",
            "SUSE Linux Enterprise Micro 5.5:kernel-rt-5.14.21-150500.13.100.2.x86_64",
            "SUSE Linux Enterprise Micro 5.5:kernel-source-rt-5.14.21-150500.13.100.1.noarch"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 5.5,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
            "version": "3.1"
          },
          "products": [
            "SUSE Linux Enterprise Micro 5.5:kernel-devel-rt-5.14.21-150500.13.100.1.noarch",
            "SUSE Linux Enterprise Micro 5.5:kernel-rt-5.14.21-150500.13.100.2.x86_64",
            "SUSE Linux Enterprise Micro 5.5:kernel-source-rt-5.14.21-150500.13.100.1.noarch"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2025-07-15T14:31:35Z",
          "details": "moderate"
        }
      ],
      "title": "CVE-2022-50051"
    },
    {
      "cve": "CVE-2022-50052",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2022-50052"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "In the Linux kernel, the following vulnerability has been resolved:\n\nASoC: Intel: avs: Fix potential buffer overflow by snprintf()\n\nsnprintf() returns the would-be-filled size when the string overflows\nthe given buffer size, hence using this value may result in a buffer\noverflow (although it\u0027s unrealistic).\n\nThis patch replaces it with a safer version, scnprintf() for papering\nover such a potential issue.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "SUSE Linux Enterprise Micro 5.5:kernel-devel-rt-5.14.21-150500.13.100.1.noarch",
          "SUSE Linux Enterprise Micro 5.5:kernel-rt-5.14.21-150500.13.100.2.x86_64",
          "SUSE Linux Enterprise Micro 5.5:kernel-source-rt-5.14.21-150500.13.100.1.noarch"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2022-50052",
          "url": "https://www.suse.com/security/cve/CVE-2022-50052"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1245048 for CVE-2022-50052",
          "url": "https://bugzilla.suse.com/1245048"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "SUSE Linux Enterprise Micro 5.5:kernel-devel-rt-5.14.21-150500.13.100.1.noarch",
            "SUSE Linux Enterprise Micro 5.5:kernel-rt-5.14.21-150500.13.100.2.x86_64",
            "SUSE Linux Enterprise Micro 5.5:kernel-source-rt-5.14.21-150500.13.100.1.noarch"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 5.5,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
            "version": "3.1"
          },
          "products": [
            "SUSE Linux Enterprise Micro 5.5:kernel-devel-rt-5.14.21-150500.13.100.1.noarch",
            "SUSE Linux Enterprise Micro 5.5:kernel-rt-5.14.21-150500.13.100.2.x86_64",
            "SUSE Linux Enterprise Micro 5.5:kernel-source-rt-5.14.21-150500.13.100.1.noarch"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2025-07-15T14:31:35Z",
          "details": "moderate"
        }
      ],
      "title": "CVE-2022-50052"
    },
    {
      "cve": "CVE-2022-50053",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2022-50053"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "In the Linux kernel, the following vulnerability has been resolved:\n\niavf: Fix reset error handling\n\nDo not call iavf_close in iavf_reset_task error handling. Doing so can\nlead to double call of napi_disable, which can lead to deadlock there.\nRemoving VF would lead to iavf_remove task being stuck, because it\nrequires crit_lock, which is held by iavf_close.\nCall iavf_disable_vf if reset fail, so that driver will clean up\nremaining invalid resources.\nDuring rapid VF resets, HW can fail to setup VF mailbox. Wrong\nerror handling can lead to iavf_remove being stuck with:\n[ 5218.999087] iavf 0000:82:01.0: Failed to init adminq: -53\n...\n[ 5267.189211] INFO: task repro.sh:11219 blocked for more than 30 seconds.\n[ 5267.189520]       Tainted: G S          E     5.18.0-04958-ga54ce3703613-dirty #1\n[ 5267.189764] \"echo 0 \u003e /proc/sys/kernel/hung_task_timeout_secs\" disables this message.\n[ 5267.190062] task:repro.sh        state:D stack:    0 pid:11219 ppid:  8162 flags:0x00000000\n[ 5267.190347] Call Trace:\n[ 5267.190647]  \u003cTASK\u003e\n[ 5267.190927]  __schedule+0x460/0x9f0\n[ 5267.191264]  schedule+0x44/0xb0\n[ 5267.191563]  schedule_preempt_disabled+0x14/0x20\n[ 5267.191890]  __mutex_lock.isra.12+0x6e3/0xac0\n[ 5267.192237]  ? iavf_remove+0xf9/0x6c0 [iavf]\n[ 5267.192565]  iavf_remove+0x12a/0x6c0 [iavf]\n[ 5267.192911]  ? _raw_spin_unlock_irqrestore+0x1e/0x40\n[ 5267.193285]  pci_device_remove+0x36/0xb0\n[ 5267.193619]  device_release_driver_internal+0xc1/0x150\n[ 5267.193974]  pci_stop_bus_device+0x69/0x90\n[ 5267.194361]  pci_stop_and_remove_bus_device+0xe/0x20\n[ 5267.194735]  pci_iov_remove_virtfn+0xba/0x120\n[ 5267.195130]  sriov_disable+0x2f/0xe0\n[ 5267.195506]  ice_free_vfs+0x7d/0x2f0 [ice]\n[ 5267.196056]  ? pci_get_device+0x4f/0x70\n[ 5267.196496]  ice_sriov_configure+0x78/0x1a0 [ice]\n[ 5267.196995]  sriov_numvfs_store+0xfe/0x140\n[ 5267.197466]  kernfs_fop_write_iter+0x12e/0x1c0\n[ 5267.197918]  new_sync_write+0x10c/0x190\n[ 5267.198404]  vfs_write+0x24e/0x2d0\n[ 5267.198886]  ksys_write+0x5c/0xd0\n[ 5267.199367]  do_syscall_64+0x3a/0x80\n[ 5267.199827]  entry_SYSCALL_64_after_hwframe+0x46/0xb0\n[ 5267.200317] RIP: 0033:0x7f5b381205c8\n[ 5267.200814] RSP: 002b:00007fff8c7e8c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000001\n[ 5267.201981] RAX: ffffffffffffffda RBX: 0000000000000002 RCX: 00007f5b381205c8\n[ 5267.202620] RDX: 0000000000000002 RSI: 00005569420ee900 RDI: 0000000000000001\n[ 5267.203426] RBP: 00005569420ee900 R08: 000000000000000a R09: 00007f5b38180820\n[ 5267.204327] R10: 000000000000000a R11: 0000000000000246 R12: 00007f5b383c06e0\n[ 5267.205193] R13: 0000000000000002 R14: 00007f5b383bb880 R15: 0000000000000002\n[ 5267.206041]  \u003c/TASK\u003e\n[ 5267.206970] Kernel panic - not syncing: hung_task: blocked tasks\n[ 5267.207809] CPU: 48 PID: 551 Comm: khungtaskd Kdump: loaded Tainted: G S          E     5.18.0-04958-ga54ce3703613-dirty #1\n[ 5267.208726] Hardware name: Dell Inc. PowerEdge R730/0WCJNT, BIOS 2.11.0 11/02/2019\n[ 5267.209623] Call Trace:\n[ 5267.210569]  \u003cTASK\u003e\n[ 5267.211480]  dump_stack_lvl+0x33/0x42\n[ 5267.212472]  panic+0x107/0x294\n[ 5267.213467]  watchdog.cold.8+0xc/0xbb\n[ 5267.214413]  ? proc_dohung_task_timeout_secs+0x30/0x30\n[ 5267.215511]  kthread+0xf4/0x120\n[ 5267.216459]  ? kthread_complete_and_exit+0x20/0x20\n[ 5267.217505]  ret_from_fork+0x22/0x30\n[ 5267.218459]  \u003c/TASK\u003e",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "SUSE Linux Enterprise Micro 5.5:kernel-devel-rt-5.14.21-150500.13.100.1.noarch",
          "SUSE Linux Enterprise Micro 5.5:kernel-rt-5.14.21-150500.13.100.2.x86_64",
          "SUSE Linux Enterprise Micro 5.5:kernel-source-rt-5.14.21-150500.13.100.1.noarch"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2022-50053",
          "url": "https://www.suse.com/security/cve/CVE-2022-50053"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1245038 for CVE-2022-50053",
          "url": "https://bugzilla.suse.com/1245038"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "SUSE Linux Enterprise Micro 5.5:kernel-devel-rt-5.14.21-150500.13.100.1.noarch",
            "SUSE Linux Enterprise Micro 5.5:kernel-rt-5.14.21-150500.13.100.2.x86_64",
            "SUSE Linux Enterprise Micro 5.5:kernel-source-rt-5.14.21-150500.13.100.1.noarch"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 5.5,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
            "version": "3.1"
          },
          "products": [
            "SUSE Linux Enterprise Micro 5.5:kernel-devel-rt-5.14.21-150500.13.100.1.noarch",
            "SUSE Linux Enterprise Micro 5.5:kernel-rt-5.14.21-150500.13.100.2.x86_64",
            "SUSE Linux Enterprise Micro 5.5:kernel-source-rt-5.14.21-150500.13.100.1.noarch"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2025-07-15T14:31:35Z",
          "details": "moderate"
        }
      ],
      "title": "CVE-2022-50053"
    },
    {
      "cve": "CVE-2022-50054",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2022-50054"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "In the Linux kernel, the following vulnerability has been resolved:\n\niavf: Fix NULL pointer dereference in iavf_get_link_ksettings\n\nFix possible NULL pointer dereference, due to freeing of adapter-\u003evf_res\nin iavf_init_get_resources. Previous commit introduced a regression,\nwhere receiving IAVF_ERR_ADMIN_QUEUE_NO_WORK from iavf_get_vf_config\nwould free adapter-\u003evf_res. However, netdev is still registered, so\nethtool_ops can be called. Calling iavf_get_link_ksettings with no vf_res,\nwill result with:\n[ 9385.242676] BUG: kernel NULL pointer dereference, address: 0000000000000008\n[ 9385.242683] #PF: supervisor read access in kernel mode\n[ 9385.242686] #PF: error_code(0x0000) - not-present page\n[ 9385.242690] PGD 0 P4D 0\n[ 9385.242696] Oops: 0000 [#1] PREEMPT SMP DEBUG_PAGEALLOC PTI\n[ 9385.242701] CPU: 6 PID: 3217 Comm: pmdalinux Kdump: loaded Tainted: G S          E     5.18.0-04958-ga54ce3703613-dirty #1\n[ 9385.242708] Hardware name: Dell Inc. PowerEdge R730/0WCJNT, BIOS 2.11.0 11/02/2019\n[ 9385.242710] RIP: 0010:iavf_get_link_ksettings+0x29/0xd0 [iavf]\n[ 9385.242745] Code: 00 0f 1f 44 00 00 b8 01 ef ff ff 48 c7 46 30 00 00 00 00 48 c7 46 38 00 00 00 00 c6 46 0b 00 66 89 46 08 48 8b 87 68 0e 00 00 \u003cf6\u003e 40 08 80 75 50 8b 87 5c 0e 00 00 83 f8 08 74 7a 76 1d 83 f8 20\n[ 9385.242749] RSP: 0018:ffffc0560ec7fbd0 EFLAGS: 00010246\n[ 9385.242755] RAX: 0000000000000000 RBX: ffffc0560ec7fc08 RCX: 0000000000000000\n[ 9385.242759] RDX: ffffffffc0ad4550 RSI: ffffc0560ec7fc08 RDI: ffffa0fc66674000\n[ 9385.242762] RBP: 00007ffd1fb2bf50 R08: b6a2d54b892363ee R09: ffffa101dc14fb00\n[ 9385.242765] R10: 0000000000000000 R11: 0000000000000004 R12: ffffa0fc66674000\n[ 9385.242768] R13: 0000000000000000 R14: ffffa0fc66674000 R15: 00000000ffffffa1\n[ 9385.242771] FS:  00007f93711a2980(0000) GS:ffffa0fad72c0000(0000) knlGS:0000000000000000\n[ 9385.242775] CS:  0010 DS: 0000 ES: 0000 CR0: 0000000080050033\n[ 9385.242778] CR2: 0000000000000008 CR3: 0000000a8e61c003 CR4: 00000000003706e0\n[ 9385.242781] DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000\n[ 9385.242784] DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400\n[ 9385.242787] Call Trace:\n[ 9385.242791]  \u003cTASK\u003e\n[ 9385.242793]  ethtool_get_settings+0x71/0x1a0\n[ 9385.242814]  __dev_ethtool+0x426/0x2f40\n[ 9385.242823]  ? slab_post_alloc_hook+0x4f/0x280\n[ 9385.242836]  ? kmem_cache_alloc_trace+0x15d/0x2f0\n[ 9385.242841]  ? dev_ethtool+0x59/0x170\n[ 9385.242848]  dev_ethtool+0xa7/0x170\n[ 9385.242856]  dev_ioctl+0xc3/0x520\n[ 9385.242866]  sock_do_ioctl+0xa0/0xe0\n[ 9385.242877]  sock_ioctl+0x22f/0x320\n[ 9385.242885]  __x64_sys_ioctl+0x84/0xc0\n[ 9385.242896]  do_syscall_64+0x3a/0x80\n[ 9385.242904]  entry_SYSCALL_64_after_hwframe+0x46/0xb0\n[ 9385.242918] RIP: 0033:0x7f93702396db\n[ 9385.242923] Code: 73 01 c3 48 8b 0d ad 57 38 00 f7 d8 64 89 01 48 83 c8 ff c3 66 2e 0f 1f 84 00 00 00 00 00 90 f3 0f 1e fa b8 10 00 00 00 0f 05 \u003c48\u003e 3d 01 f0 ff ff 73 01 c3 48 8b 0d 7d 57 38 00 f7 d8 64 89 01 48\n[ 9385.242927] RSP: 002b:00007ffd1fb2bf18 EFLAGS: 00000246 ORIG_RAX: 0000000000000010\n[ 9385.242932] RAX: ffffffffffffffda RBX: 000055671b1d2fe0 RCX: 00007f93702396db\n[ 9385.242935] RDX: 00007ffd1fb2bf20 RSI: 0000000000008946 RDI: 0000000000000007\n[ 9385.242937] RBP: 00007ffd1fb2bf20 R08: 0000000000000003 R09: 0030763066307330\n[ 9385.242940] R10: 0000000000000000 R11: 0000000000000246 R12: 00007ffd1fb2bf80\n[ 9385.242942] R13: 0000000000000007 R14: 0000556719f6de90 R15: 00007ffd1fb2c1b0\n[ 9385.242948]  \u003c/TASK\u003e\n[ 9385.242949] Modules linked in: iavf(E) xt_CHECKSUM xt_MASQUERADE xt_conntrack ipt_REJECT nft_compat nf_nat_tftp nft_objref nf_conntrack_tftp bridge stp llc nft_fib_inet nft_fib_ipv4 nft_fib_ipv6 nft_fib nft_reject_inet nf_reject_ipv4 nf_reject_ipv6 nft_reject nft_ct nft_chain_nat nf_nat nf_conntrack nf_defrag_ipv6 nf_defrag_ipv4 ip_set nf_tables rfkill nfnetlink vfat fat irdma ib_uverbs ib_core intel_rapl_msr intel_rapl_common sb_edac x86_pkg_temp_thermal intel_powerclamp coretem\n---truncated---",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "SUSE Linux Enterprise Micro 5.5:kernel-devel-rt-5.14.21-150500.13.100.1.noarch",
          "SUSE Linux Enterprise Micro 5.5:kernel-rt-5.14.21-150500.13.100.2.x86_64",
          "SUSE Linux Enterprise Micro 5.5:kernel-source-rt-5.14.21-150500.13.100.1.noarch"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2022-50054",
          "url": "https://www.suse.com/security/cve/CVE-2022-50054"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1245040 for CVE-2022-50054",
          "url": "https://bugzilla.suse.com/1245040"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "SUSE Linux Enterprise Micro 5.5:kernel-devel-rt-5.14.21-150500.13.100.1.noarch",
            "SUSE Linux Enterprise Micro 5.5:kernel-rt-5.14.21-150500.13.100.2.x86_64",
            "SUSE Linux Enterprise Micro 5.5:kernel-source-rt-5.14.21-150500.13.100.1.noarch"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 5.5,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
            "version": "3.1"
          },
          "products": [
            "SUSE Linux Enterprise Micro 5.5:kernel-devel-rt-5.14.21-150500.13.100.1.noarch",
            "SUSE Linux Enterprise Micro 5.5:kernel-rt-5.14.21-150500.13.100.2.x86_64",
            "SUSE Linux Enterprise Micro 5.5:kernel-source-rt-5.14.21-150500.13.100.1.noarch"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2025-07-15T14:31:35Z",
          "details": "moderate"
        }
      ],
      "title": "CVE-2022-50054"
    },
    {
      "cve": "CVE-2022-50055",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2022-50055"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "In the Linux kernel, the following vulnerability has been resolved:\n\niavf: Fix adminq error handling\n\niavf_alloc_asq_bufs/iavf_alloc_arq_bufs allocates with dma_alloc_coherent\nmemory for VF mailbox.\nFree DMA regions for both ASQ and ARQ in case error happens during\nconfiguration of ASQ/ARQ registers.\nWithout this change it is possible to see when unloading interface:\n74626.583369: dma_debug_device_change: device driver has pending DMA allocations while released from device [count=32]\nOne of leaked entries details: [device address=0x0000000b27ff9000] [size=4096 bytes] [mapped with DMA_BIDIRECTIONAL] [mapped as coherent]",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "SUSE Linux Enterprise Micro 5.5:kernel-devel-rt-5.14.21-150500.13.100.1.noarch",
          "SUSE Linux Enterprise Micro 5.5:kernel-rt-5.14.21-150500.13.100.2.x86_64",
          "SUSE Linux Enterprise Micro 5.5:kernel-source-rt-5.14.21-150500.13.100.1.noarch"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2022-50055",
          "url": "https://www.suse.com/security/cve/CVE-2022-50055"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1245039 for CVE-2022-50055",
          "url": "https://bugzilla.suse.com/1245039"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "SUSE Linux Enterprise Micro 5.5:kernel-devel-rt-5.14.21-150500.13.100.1.noarch",
            "SUSE Linux Enterprise Micro 5.5:kernel-rt-5.14.21-150500.13.100.2.x86_64",
            "SUSE Linux Enterprise Micro 5.5:kernel-source-rt-5.14.21-150500.13.100.1.noarch"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 5.5,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
            "version": "3.1"
          },
          "products": [
            "SUSE Linux Enterprise Micro 5.5:kernel-devel-rt-5.14.21-150500.13.100.1.noarch",
            "SUSE Linux Enterprise Micro 5.5:kernel-rt-5.14.21-150500.13.100.2.x86_64",
            "SUSE Linux Enterprise Micro 5.5:kernel-source-rt-5.14.21-150500.13.100.1.noarch"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2025-07-15T14:31:35Z",
          "details": "moderate"
        }
      ],
      "title": "CVE-2022-50055"
    },
    {
      "cve": "CVE-2022-50059",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2022-50059"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "In the Linux kernel, the following vulnerability has been resolved:\n\nceph: don\u0027t leak snap_rwsem in handle_cap_grant\n\nWhen handle_cap_grant is called on an IMPORT op, then the snap_rwsem is\nheld and the function is expected to release it before returning. It\ncurrently fails to do that in all cases which could lead to a deadlock.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "SUSE Linux Enterprise Micro 5.5:kernel-devel-rt-5.14.21-150500.13.100.1.noarch",
          "SUSE Linux Enterprise Micro 5.5:kernel-rt-5.14.21-150500.13.100.2.x86_64",
          "SUSE Linux Enterprise Micro 5.5:kernel-source-rt-5.14.21-150500.13.100.1.noarch"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2022-50059",
          "url": "https://www.suse.com/security/cve/CVE-2022-50059"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1245031 for CVE-2022-50059",
          "url": "https://bugzilla.suse.com/1245031"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "SUSE Linux Enterprise Micro 5.5:kernel-devel-rt-5.14.21-150500.13.100.1.noarch",
            "SUSE Linux Enterprise Micro 5.5:kernel-rt-5.14.21-150500.13.100.2.x86_64",
            "SUSE Linux Enterprise Micro 5.5:kernel-source-rt-5.14.21-150500.13.100.1.noarch"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 5.5,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
            "version": "3.1"
          },
          "products": [
            "SUSE Linux Enterprise Micro 5.5:kernel-devel-rt-5.14.21-150500.13.100.1.noarch",
            "SUSE Linux Enterprise Micro 5.5:kernel-rt-5.14.21-150500.13.100.2.x86_64",
            "SUSE Linux Enterprise Micro 5.5:kernel-source-rt-5.14.21-150500.13.100.1.noarch"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2025-07-15T14:31:35Z",
          "details": "moderate"
        }
      ],
      "title": "CVE-2022-50059"
    },
    {
      "cve": "CVE-2022-50060",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2022-50060"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "In the Linux kernel, the following vulnerability has been resolved:\n\nocteontx2-af: Fix mcam entry resource leak\n\nThe teardown sequence in FLR handler returns if no NIX LF\nis attached to PF/VF because it indicates that graceful\nshutdown of resources already happened. But there is a\nchance of all allocated MCAM entries not being freed by\nPF/VF. Hence free mcam entries even in case of detached LF.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "SUSE Linux Enterprise Micro 5.5:kernel-devel-rt-5.14.21-150500.13.100.1.noarch",
          "SUSE Linux Enterprise Micro 5.5:kernel-rt-5.14.21-150500.13.100.2.x86_64",
          "SUSE Linux Enterprise Micro 5.5:kernel-source-rt-5.14.21-150500.13.100.1.noarch"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2022-50060",
          "url": "https://www.suse.com/security/cve/CVE-2022-50060"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1245032 for CVE-2022-50060",
          "url": "https://bugzilla.suse.com/1245032"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "SUSE Linux Enterprise Micro 5.5:kernel-devel-rt-5.14.21-150500.13.100.1.noarch",
            "SUSE Linux Enterprise Micro 5.5:kernel-rt-5.14.21-150500.13.100.2.x86_64",
            "SUSE Linux Enterprise Micro 5.5:kernel-source-rt-5.14.21-150500.13.100.1.noarch"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 5.5,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
            "version": "3.1"
          },
          "products": [
            "SUSE Linux Enterprise Micro 5.5:kernel-devel-rt-5.14.21-150500.13.100.1.noarch",
            "SUSE Linux Enterprise Micro 5.5:kernel-rt-5.14.21-150500.13.100.2.x86_64",
            "SUSE Linux Enterprise Micro 5.5:kernel-source-rt-5.14.21-150500.13.100.1.noarch"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2025-07-15T14:31:35Z",
          "details": "moderate"
        }
      ],
      "title": "CVE-2022-50060"
    },
    {
      "cve": "CVE-2022-50061",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2022-50061"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "In the Linux kernel, the following vulnerability has been resolved:\n\npinctrl: nomadik: Fix refcount leak in nmk_pinctrl_dt_subnode_to_map\n\nof_parse_phandle() returns a node pointer with refcount\nincremented, we should use of_node_put() on it when not need anymore.\nAdd missing of_node_put() to avoid refcount leak.\"",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "SUSE Linux Enterprise Micro 5.5:kernel-devel-rt-5.14.21-150500.13.100.1.noarch",
          "SUSE Linux Enterprise Micro 5.5:kernel-rt-5.14.21-150500.13.100.2.x86_64",
          "SUSE Linux Enterprise Micro 5.5:kernel-source-rt-5.14.21-150500.13.100.1.noarch"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2022-50061",
          "url": "https://www.suse.com/security/cve/CVE-2022-50061"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1245033 for CVE-2022-50061",
          "url": "https://bugzilla.suse.com/1245033"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "SUSE Linux Enterprise Micro 5.5:kernel-devel-rt-5.14.21-150500.13.100.1.noarch",
            "SUSE Linux Enterprise Micro 5.5:kernel-rt-5.14.21-150500.13.100.2.x86_64",
            "SUSE Linux Enterprise Micro 5.5:kernel-source-rt-5.14.21-150500.13.100.1.noarch"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 5.5,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
            "version": "3.1"
          },
          "products": [
            "SUSE Linux Enterprise Micro 5.5:kernel-devel-rt-5.14.21-150500.13.100.1.noarch",
            "SUSE Linux Enterprise Micro 5.5:kernel-rt-5.14.21-150500.13.100.2.x86_64",
            "SUSE Linux Enterprise Micro 5.5:kernel-source-rt-5.14.21-150500.13.100.1.noarch"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2025-07-15T14:31:35Z",
          "details": "moderate"
        }
      ],
      "title": "CVE-2022-50061"
    },
    {
      "cve": "CVE-2022-50062",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2022-50062"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "In the Linux kernel, the following vulnerability has been resolved:\n\nnet: bgmac: Fix a BUG triggered by wrong bytes_compl\n\nOn one of our machines we got:\n\nkernel BUG at lib/dynamic_queue_limits.c:27!\nInternal error: Oops - BUG: 0 [#1] PREEMPT SMP ARM\nCPU: 0 PID: 1166 Comm: irq/41-bgmac Tainted: G        W  O    4.14.275-rt132 #1\nHardware name: BRCM XGS iProc\ntask: ee3415c0 task.stack: ee32a000\nPC is at dql_completed+0x168/0x178\nLR is at bgmac_poll+0x18c/0x6d8\npc : [\u003cc03b9430\u003e]    lr : [\u003cc04b5a18\u003e]    psr: 800a0313\nsp : ee32be14  ip : 000005ea  fp : 00000bd4\nr10: ee558500  r9 : c0116298  r8 : 00000002\nr7 : 00000000  r6 : ef128810  r5 : 01993267  r4 : 01993851\nr3 : ee558000  r2 : 000070e1  r1 : 00000bd4  r0 : ee52c180\nFlags: Nzcv  IRQs on  FIQs on  Mode SVC_32  ISA ARM  Segment none\nControl: 12c5387d  Table: 8e88c04a  DAC: 00000051\nProcess irq/41-bgmac (pid: 1166, stack limit = 0xee32a210)\nStack: (0xee32be14 to 0xee32c000)\nbe00:                                              ee558520 ee52c100 ef128810\nbe20: 00000000 00000002 c0116298 c04b5a18 00000000 c0a0c8c4 c0951780 00000040\nbe40: c0701780 ee558500 ee55d520 ef05b340 ef6f9780 ee558520 00000001 00000040\nbe60: ffffe000 c0a56878 ef6fa040 c0952040 0000012c c0528744 ef6f97b0 fffcfb6a\nbe80: c0a04104 2eda8000 c0a0c4ec c0a0d368 ee32bf44 c0153534 ee32be98 ee32be98\nbea0: ee32bea0 ee32bea0 ee32bea8 ee32bea8 00000000 c01462e4 ffffe000 ef6f22a8\nbec0: ffffe000 00000008 ee32bee4 c0147430 ffffe000 c094a2a8 00000003 ffffe000\nbee0: c0a54528 00208040 0000000c c0a0c8c4 c0a65980 c0124d3c 00000008 ee558520\nbf00: c094a23c c0a02080 00000000 c07a9910 ef136970 ef136970 ee30a440 ef136900\nbf20: ee30a440 00000001 ef136900 ee30a440 c016d990 00000000 c0108db0 c012500c\nbf40: ef136900 c016da14 ee30a464 ffffe000 00000001 c016dd14 00000000 c016db28\nbf60: ffffe000 ee21a080 ee30a400 00000000 ee32a000 ee30a440 c016dbfc ee25fd70\nbf80: ee21a09c c013edcc ee32a000 ee30a400 c013ec7c 00000000 00000000 00000000\nbfa0: 00000000 00000000 00000000 c0108470 00000000 00000000 00000000 00000000\nbfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000\nbfe0: 00000000 00000000 00000000 00000000 00000013 00000000 00000000 00000000\n[\u003cc03b9430\u003e] (dql_completed) from [\u003cc04b5a18\u003e] (bgmac_poll+0x18c/0x6d8)\n[\u003cc04b5a18\u003e] (bgmac_poll) from [\u003cc0528744\u003e] (net_rx_action+0x1c4/0x494)\n[\u003cc0528744\u003e] (net_rx_action) from [\u003cc0124d3c\u003e] (do_current_softirqs+0x1ec/0x43c)\n[\u003cc0124d3c\u003e] (do_current_softirqs) from [\u003cc012500c\u003e] (__local_bh_enable+0x80/0x98)\n[\u003cc012500c\u003e] (__local_bh_enable) from [\u003cc016da14\u003e] (irq_forced_thread_fn+0x84/0x98)\n[\u003cc016da14\u003e] (irq_forced_thread_fn) from [\u003cc016dd14\u003e] (irq_thread+0x118/0x1c0)\n[\u003cc016dd14\u003e] (irq_thread) from [\u003cc013edcc\u003e] (kthread+0x150/0x158)\n[\u003cc013edcc\u003e] (kthread) from [\u003cc0108470\u003e] (ret_from_fork+0x14/0x24)\nCode: a83f15e0 0200001a 0630a0e1 c3ffffea (f201f0e7)\n\nThe issue seems similar to commit 90b3b339364c (\"net: hisilicon: Fix a BUG\ntrigered by wrong bytes_compl\") and potentially introduced by commit\nb38c83dd0866 (\"bgmac: simplify tx ring index handling\").\n\nIf there is an RX interrupt between setting ring-\u003eend\nand netdev_sent_queue() we can hit the BUG_ON as bgmac_dma_tx_free()\ncan miscalculate the queue size while called from bgmac_poll().\n\nThe machine which triggered the BUG runs a v4.14 RT kernel - but the issue\nseems present in mainline too.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "SUSE Linux Enterprise Micro 5.5:kernel-devel-rt-5.14.21-150500.13.100.1.noarch",
          "SUSE Linux Enterprise Micro 5.5:kernel-rt-5.14.21-150500.13.100.2.x86_64",
          "SUSE Linux Enterprise Micro 5.5:kernel-source-rt-5.14.21-150500.13.100.1.noarch"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2022-50062",
          "url": "https://www.suse.com/security/cve/CVE-2022-50062"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1245028 for CVE-2022-50062",
          "url": "https://bugzilla.suse.com/1245028"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "SUSE Linux Enterprise Micro 5.5:kernel-devel-rt-5.14.21-150500.13.100.1.noarch",
            "SUSE Linux Enterprise Micro 5.5:kernel-rt-5.14.21-150500.13.100.2.x86_64",
            "SUSE Linux Enterprise Micro 5.5:kernel-source-rt-5.14.21-150500.13.100.1.noarch"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 5.5,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
            "version": "3.1"
          },
          "products": [
            "SUSE Linux Enterprise Micro 5.5:kernel-devel-rt-5.14.21-150500.13.100.1.noarch",
            "SUSE Linux Enterprise Micro 5.5:kernel-rt-5.14.21-150500.13.100.2.x86_64",
            "SUSE Linux Enterprise Micro 5.5:kernel-source-rt-5.14.21-150500.13.100.1.noarch"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2025-07-15T14:31:35Z",
          "details": "moderate"
        }
      ],
      "title": "CVE-2022-50062"
    },
    {
      "cve": "CVE-2022-50065",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2022-50065"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "In the Linux kernel, the following vulnerability has been resolved:\n\nvirtio_net: fix memory leak inside XPD_TX with mergeable\n\nWhen we call xdp_convert_buff_to_frame() to get xdpf, if it returns\nNULL, we should check if xdp_page was allocated by xdp_linearize_page().\nIf it is newly allocated, it should be freed here alone. Just like any\nother \"goto err_xdp\".",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "SUSE Linux Enterprise Micro 5.5:kernel-devel-rt-5.14.21-150500.13.100.1.noarch",
          "SUSE Linux Enterprise Micro 5.5:kernel-rt-5.14.21-150500.13.100.2.x86_64",
          "SUSE Linux Enterprise Micro 5.5:kernel-source-rt-5.14.21-150500.13.100.1.noarch"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2022-50065",
          "url": "https://www.suse.com/security/cve/CVE-2022-50065"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1244986 for CVE-2022-50065",
          "url": "https://bugzilla.suse.com/1244986"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "SUSE Linux Enterprise Micro 5.5:kernel-devel-rt-5.14.21-150500.13.100.1.noarch",
            "SUSE Linux Enterprise Micro 5.5:kernel-rt-5.14.21-150500.13.100.2.x86_64",
            "SUSE Linux Enterprise Micro 5.5:kernel-source-rt-5.14.21-150500.13.100.1.noarch"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 5.5,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
            "version": "3.1"
          },
          "products": [
            "SUSE Linux Enterprise Micro 5.5:kernel-devel-rt-5.14.21-150500.13.100.1.noarch",
            "SUSE Linux Enterprise Micro 5.5:kernel-rt-5.14.21-150500.13.100.2.x86_64",
            "SUSE Linux Enterprise Micro 5.5:kernel-source-rt-5.14.21-150500.13.100.1.noarch"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2025-07-15T14:31:35Z",
          "details": "moderate"
        }
      ],
      "title": "CVE-2022-50065"
    },
    {
      "cve": "CVE-2022-50066",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2022-50066"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "In the Linux kernel, the following vulnerability has been resolved:\n\nnet: atlantic: fix aq_vec index out of range error\n\nThe final update statement of the for loop exceeds the array range, the\ndereference of self-\u003eaq_vec[i] is not checked and then leads to the\nindex out of range error.\nAlso fixed this kind of coding style in other for loop.\n\n[   97.937604] UBSAN: array-index-out-of-bounds in drivers/net/ethernet/aquantia/atlantic/aq_nic.c:1404:48\n[   97.937607] index 8 is out of range for type \u0027aq_vec_s *[8]\u0027\n[   97.937608] CPU: 38 PID: 3767 Comm: kworker/u256:18 Not tainted 5.19.0+ #2\n[   97.937610] Hardware name: Dell Inc. Precision 7865 Tower/, BIOS 1.0.0 06/12/2022\n[   97.937611] Workqueue: events_unbound async_run_entry_fn\n[   97.937616] Call Trace:\n[   97.937617]  \u003cTASK\u003e\n[   97.937619]  dump_stack_lvl+0x49/0x63\n[   97.937624]  dump_stack+0x10/0x16\n[   97.937626]  ubsan_epilogue+0x9/0x3f\n[   97.937627]  __ubsan_handle_out_of_bounds.cold+0x44/0x49\n[   97.937629]  ? __scm_send+0x348/0x440\n[   97.937632]  ? aq_vec_stop+0x72/0x80 [atlantic]\n[   97.937639]  aq_nic_stop+0x1b6/0x1c0 [atlantic]\n[   97.937644]  aq_suspend_common+0x88/0x90 [atlantic]\n[   97.937648]  aq_pm_suspend_poweroff+0xe/0x20 [atlantic]\n[   97.937653]  pci_pm_suspend+0x7e/0x1a0\n[   97.937655]  ? pci_pm_suspend_noirq+0x2b0/0x2b0\n[   97.937657]  dpm_run_callback+0x54/0x190\n[   97.937660]  __device_suspend+0x14c/0x4d0\n[   97.937661]  async_suspend+0x23/0x70\n[   97.937663]  async_run_entry_fn+0x33/0x120\n[   97.937664]  process_one_work+0x21f/0x3f0\n[   97.937666]  worker_thread+0x4a/0x3c0\n[   97.937668]  ? process_one_work+0x3f0/0x3f0\n[   97.937669]  kthread+0xf0/0x120\n[   97.937671]  ? kthread_complete_and_exit+0x20/0x20\n[   97.937672]  ret_from_fork+0x22/0x30\n[   97.937676]  \u003c/TASK\u003e\n\nv2. fixed \"warning: variable \u0027aq_vec\u0027 set but not used\"\n\nv3. simplified a for loop",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "SUSE Linux Enterprise Micro 5.5:kernel-devel-rt-5.14.21-150500.13.100.1.noarch",
          "SUSE Linux Enterprise Micro 5.5:kernel-rt-5.14.21-150500.13.100.2.x86_64",
          "SUSE Linux Enterprise Micro 5.5:kernel-source-rt-5.14.21-150500.13.100.1.noarch"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2022-50066",
          "url": "https://www.suse.com/security/cve/CVE-2022-50066"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1244985 for CVE-2022-50066",
          "url": "https://bugzilla.suse.com/1244985"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "SUSE Linux Enterprise Micro 5.5:kernel-devel-rt-5.14.21-150500.13.100.1.noarch",
            "SUSE Linux Enterprise Micro 5.5:kernel-rt-5.14.21-150500.13.100.2.x86_64",
            "SUSE Linux Enterprise Micro 5.5:kernel-source-rt-5.14.21-150500.13.100.1.noarch"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 5.5,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
            "version": "3.1"
          },
          "products": [
            "SUSE Linux Enterprise Micro 5.5:kernel-devel-rt-5.14.21-150500.13.100.1.noarch",
            "SUSE Linux Enterprise Micro 5.5:kernel-rt-5.14.21-150500.13.100.2.x86_64",
            "SUSE Linux Enterprise Micro 5.5:kernel-source-rt-5.14.21-150500.13.100.1.noarch"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2025-07-15T14:31:35Z",
          "details": "moderate"
        }
      ],
      "title": "CVE-2022-50066"
    },
    {
      "cve": "CVE-2022-50067",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2022-50067"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "In the Linux kernel, the following vulnerability has been resolved:\n\nbtrfs: unset reloc control if transaction commit fails in prepare_to_relocate()\n\nIn btrfs_relocate_block_group(), the rc is allocated.  Then\nbtrfs_relocate_block_group() calls\n\nrelocate_block_group()\n  prepare_to_relocate()\n    set_reloc_control()\n\nthat assigns rc to the variable fs_info-\u003ereloc_ctl. When\nprepare_to_relocate() returns, it calls\n\nbtrfs_commit_transaction()\n  btrfs_start_dirty_block_groups()\n    btrfs_alloc_path()\n      kmem_cache_zalloc()\n\nwhich may fail for example (or other errors could happen). When the\nfailure occurs, btrfs_relocate_block_group() detects the error and frees\nrc and doesn\u0027t set fs_info-\u003ereloc_ctl to NULL. After that, in\nbtrfs_init_reloc_root(), rc is retrieved from fs_info-\u003ereloc_ctl and\nthen used, which may cause a use-after-free bug.\n\nThis possible bug can be triggered by calling btrfs_ioctl_balance()\nbefore calling btrfs_ioctl_defrag().\n\nTo fix this possible bug, in prepare_to_relocate(), check if\nbtrfs_commit_transaction() fails. If the failure occurs,\nunset_reloc_control() is called to set fs_info-\u003ereloc_ctl to NULL.\n\nThe error log in our fault-injection testing is shown as follows:\n\n  [   58.751070] BUG: KASAN: use-after-free in btrfs_init_reloc_root+0x7ca/0x920 [btrfs]\n  ...\n  [   58.753577] Call Trace:\n  ...\n  [   58.755800]  kasan_report+0x45/0x60\n  [   58.756066]  btrfs_init_reloc_root+0x7ca/0x920 [btrfs]\n  [   58.757304]  record_root_in_trans+0x792/0xa10 [btrfs]\n  [   58.757748]  btrfs_record_root_in_trans+0x463/0x4f0 [btrfs]\n  [   58.758231]  start_transaction+0x896/0x2950 [btrfs]\n  [   58.758661]  btrfs_defrag_root+0x250/0xc00 [btrfs]\n  [   58.759083]  btrfs_ioctl_defrag+0x467/0xa00 [btrfs]\n  [   58.759513]  btrfs_ioctl+0x3c95/0x114e0 [btrfs]\n  ...\n  [   58.768510] Allocated by task 23683:\n  [   58.768777]  ____kasan_kmalloc+0xb5/0xf0\n  [   58.769069]  __kmalloc+0x227/0x3d0\n  [   58.769325]  alloc_reloc_control+0x10a/0x3d0 [btrfs]\n  [   58.769755]  btrfs_relocate_block_group+0x7aa/0x1e20 [btrfs]\n  [   58.770228]  btrfs_relocate_chunk+0xf1/0x760 [btrfs]\n  [   58.770655]  __btrfs_balance+0x1326/0x1f10 [btrfs]\n  [   58.771071]  btrfs_balance+0x3150/0x3d30 [btrfs]\n  [   58.771472]  btrfs_ioctl_balance+0xd84/0x1410 [btrfs]\n  [   58.771902]  btrfs_ioctl+0x4caa/0x114e0 [btrfs]\n  ...\n  [   58.773337] Freed by task 23683:\n  ...\n  [   58.774815]  kfree+0xda/0x2b0\n  [   58.775038]  free_reloc_control+0x1d6/0x220 [btrfs]\n  [   58.775465]  btrfs_relocate_block_group+0x115c/0x1e20 [btrfs]\n  [   58.775944]  btrfs_relocate_chunk+0xf1/0x760 [btrfs]\n  [   58.776369]  __btrfs_balance+0x1326/0x1f10 [btrfs]\n  [   58.776784]  btrfs_balance+0x3150/0x3d30 [btrfs]\n  [   58.777185]  btrfs_ioctl_balance+0xd84/0x1410 [btrfs]\n  [   58.777621]  btrfs_ioctl+0x4caa/0x114e0 [btrfs]\n  ...",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "SUSE Linux Enterprise Micro 5.5:kernel-devel-rt-5.14.21-150500.13.100.1.noarch",
          "SUSE Linux Enterprise Micro 5.5:kernel-rt-5.14.21-150500.13.100.2.x86_64",
          "SUSE Linux Enterprise Micro 5.5:kernel-source-rt-5.14.21-150500.13.100.1.noarch"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2022-50067",
          "url": "https://www.suse.com/security/cve/CVE-2022-50067"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1245047 for CVE-2022-50067",
          "url": "https://bugzilla.suse.com/1245047"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "SUSE Linux Enterprise Micro 5.5:kernel-devel-rt-5.14.21-150500.13.100.1.noarch",
            "SUSE Linux Enterprise Micro 5.5:kernel-rt-5.14.21-150500.13.100.2.x86_64",
            "SUSE Linux Enterprise Micro 5.5:kernel-source-rt-5.14.21-150500.13.100.1.noarch"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 5.5,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
            "version": "3.1"
          },
          "products": [
            "SUSE Linux Enterprise Micro 5.5:kernel-devel-rt-5.14.21-150500.13.100.1.noarch",
            "SUSE Linux Enterprise Micro 5.5:kernel-rt-5.14.21-150500.13.100.2.x86_64",
            "SUSE Linux Enterprise Micro 5.5:kernel-source-rt-5.14.21-150500.13.100.1.noarch"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2025-07-15T14:31:35Z",
          "details": "moderate"
        }
      ],
      "title": "CVE-2022-50067"
    },
    {
      "cve": "CVE-2022-50068",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2022-50068"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "In the Linux kernel, the following vulnerability has been resolved:\n\ndrm/ttm: Fix dummy res NULL ptr deref bug\n\nCheck the bo-\u003eresource value before accessing the resource\nmem_type.\n\nv2: Fix commit description unwrapped warning\n\n\u003clog snip\u003e\n[   40.191227][  T184] general protection fault, probably for non-canonical address 0xdffffc0000000002: 0000 [#1] SMP KASAN PTI\n[   40.192995][  T184] KASAN: null-ptr-deref in range [0x0000000000000010-0x0000000000000017]\n[   40.194411][  T184] CPU: 1 PID: 184 Comm: systemd-udevd Not tainted 5.19.0-rc4-00721-gb297c22b7070 #1\n[   40.196063][  T184] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.16.0-debian-1.16.0-4 04/01/2014\n[   40.199605][  T184] RIP: 0010:ttm_bo_validate+0x1b3/0x240 [ttm]\n[   40.200754][  T184] Code: e8 72 c5 ff ff 83 f8 b8 74 d4 85 c0 75 54 49 8b 9e 58 01 00 00 48 b8 00 00 00 00 00 fc ff df 48 8d 7b 10 48 89 fa 48 c1 ea 03 \u003c0f\u003e b6 04 02 84 c0 74 04 3c 03 7e 44 8b 53 10 31 c0 85 d2 0f 85 58\n[   40.203685][  T184] RSP: 0018:ffffc900006df0c8 EFLAGS: 00010202\n[   40.204630][  T184] RAX: dffffc0000000000 RBX: 0000000000000000 RCX: 1ffff1102f4bb71b\n[   40.205864][  T184] RDX: 0000000000000002 RSI: ffffc900006df208 RDI: 0000000000000010\n[   40.207102][  T184] RBP: 1ffff920000dbe1a R08: ffffc900006df208 R09: 0000000000000000\n[   40.208394][  T184] R10: ffff88817a5f0000 R11: 0000000000000001 R12: ffffc900006df110\n[   40.209692][  T184] R13: ffffc900006df0f0 R14: ffff88817a5db800 R15: ffffc900006df208\n[   40.210862][  T184] FS:  00007f6b1d16e8c0(0000) GS:ffff88839d700000(0000) knlGS:0000000000000000\n[   40.212250][  T184] CS:  0010 DS: 0000 ES: 0000 CR0: 0000000080050033\n[   40.213275][  T184] CR2: 000055a1001d4ff0 CR3: 00000001700f4000 CR4: 00000000000006e0\n[   40.214469][  T184] Call Trace:\n[   40.214974][  T184]  \u003cTASK\u003e\n[   40.215438][  T184]  ? ttm_bo_bounce_temp_buffer+0x140/0x140 [ttm]\n[   40.216572][  T184]  ? mutex_spin_on_owner+0x240/0x240\n[   40.217456][  T184]  ? drm_vma_offset_add+0xaa/0x100 [drm]\n[   40.218457][  T184]  ttm_bo_init_reserved+0x3d6/0x540 [ttm]\n[   40.219410][  T184]  ? shmem_get_inode+0x744/0x980\n[   40.220231][  T184]  ttm_bo_init_validate+0xb1/0x200 [ttm]\n[   40.221172][  T184]  ? bo_driver_evict_flags+0x340/0x340 [drm_vram_helper]\n[   40.222530][  T184]  ? ttm_bo_init_reserved+0x540/0x540 [ttm]\n[   40.223643][  T184]  ? __do_sys_finit_module+0x11a/0x1c0\n[   40.224654][  T184]  ? __shmem_file_setup+0x102/0x280\n[   40.234764][  T184]  drm_gem_vram_create+0x305/0x480 [drm_vram_helper]\n[   40.235766][  T184]  ? bo_driver_evict_flags+0x340/0x340 [drm_vram_helper]\n[   40.236846][  T184]  ? __kasan_slab_free+0x108/0x180\n[   40.237650][  T184]  drm_gem_vram_fill_create_dumb+0x134/0x340 [drm_vram_helper]\n[   40.238864][  T184]  ? local_pci_probe+0xdf/0x180\n[   40.239674][  T184]  ? drmm_vram_helper_init+0x400/0x400 [drm_vram_helper]\n[   40.240826][  T184]  drm_client_framebuffer_create+0x19c/0x400 [drm]\n[   40.241955][  T184]  ? drm_client_buffer_delete+0x200/0x200 [drm]\n[   40.243001][  T184]  ? drm_client_pick_crtcs+0x554/0xb80 [drm]\n[   40.244030][  T184]  drm_fb_helper_generic_probe+0x23f/0x940 [drm_kms_helper]\n[   40.245226][  T184]  ? __cond_resched+0x1c/0xc0\n[   40.245987][  T184]  ? drm_fb_helper_memory_range_to_clip+0x180/0x180 [drm_kms_helper]\n[   40.247316][  T184]  ? mutex_unlock+0x80/0x100\n[   40.248005][  T184]  ? __mutex_unlock_slowpath+0x2c0/0x2c0\n[   40.249083][  T184]  drm_fb_helper_single_fb_probe+0x907/0xf00 [drm_kms_helper]\n[   40.250314][  T184]  ? drm_fb_helper_check_var+0x1180/0x1180 [drm_kms_helper]\n[   40.251540][  T184]  ? __cond_resched+0x1c/0xc0\n[   40.252321][  T184]  ? mutex_lock+0x9f/0x100\n[   40.253062][  T184]  __drm_fb_helper_initial_config_and_unlock+0xb9/0x2c0 [drm_kms_helper]\n[   40.254394][  T184]  drm_fbdev_client_hotplug+0x56f/0x840 [drm_kms_helper]\n[   40.255477][  T184]  drm_fbdev_generic_setup+0x165/0x3c0 [drm_kms_helper]\n[   40.256607][  T184]  bochs_pci_probe+0x6b7/0x900 [bochs]\n[   \n---truncated---",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "SUSE Linux Enterprise Micro 5.5:kernel-devel-rt-5.14.21-150500.13.100.1.noarch",
          "SUSE Linux Enterprise Micro 5.5:kernel-rt-5.14.21-150500.13.100.2.x86_64",
          "SUSE Linux Enterprise Micro 5.5:kernel-source-rt-5.14.21-150500.13.100.1.noarch"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2022-50068",
          "url": "https://www.suse.com/security/cve/CVE-2022-50068"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1245142 for CVE-2022-50068",
          "url": "https://bugzilla.suse.com/1245142"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "SUSE Linux Enterprise Micro 5.5:kernel-devel-rt-5.14.21-150500.13.100.1.noarch",
            "SUSE Linux Enterprise Micro 5.5:kernel-rt-5.14.21-150500.13.100.2.x86_64",
            "SUSE Linux Enterprise Micro 5.5:kernel-source-rt-5.14.21-150500.13.100.1.noarch"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 5.5,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
            "version": "3.1"
          },
          "products": [
            "SUSE Linux Enterprise Micro 5.5:kernel-devel-rt-5.14.21-150500.13.100.1.noarch",
            "SUSE Linux Enterprise Micro 5.5:kernel-rt-5.14.21-150500.13.100.2.x86_64",
            "SUSE Linux Enterprise Micro 5.5:kernel-source-rt-5.14.21-150500.13.100.1.noarch"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2025-07-15T14:31:35Z",
          "details": "moderate"
        }
      ],
      "title": "CVE-2022-50068"
    },
    {
      "cve": "CVE-2022-50072",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2022-50072"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "In the Linux kernel, the following vulnerability has been resolved:\n\nNFSv4/pnfs: Fix a use-after-free bug in open\n\nIf someone cancels the open RPC call, then we must not try to free\neither the open slot or the layoutget operation arguments, since they\nare likely still in use by the hung RPC call.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "SUSE Linux Enterprise Micro 5.5:kernel-devel-rt-5.14.21-150500.13.100.1.noarch",
          "SUSE Linux Enterprise Micro 5.5:kernel-rt-5.14.21-150500.13.100.2.x86_64",
          "SUSE Linux Enterprise Micro 5.5:kernel-source-rt-5.14.21-150500.13.100.1.noarch"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2022-50072",
          "url": "https://www.suse.com/security/cve/CVE-2022-50072"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1244979 for CVE-2022-50072",
          "url": "https://bugzilla.suse.com/1244979"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "SUSE Linux Enterprise Micro 5.5:kernel-devel-rt-5.14.21-150500.13.100.1.noarch",
            "SUSE Linux Enterprise Micro 5.5:kernel-rt-5.14.21-150500.13.100.2.x86_64",
            "SUSE Linux Enterprise Micro 5.5:kernel-source-rt-5.14.21-150500.13.100.1.noarch"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 5.5,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
            "version": "3.1"
          },
          "products": [
            "SUSE Linux Enterprise Micro 5.5:kernel-devel-rt-5.14.21-150500.13.100.1.noarch",
            "SUSE Linux Enterprise Micro 5.5:kernel-rt-5.14.21-150500.13.100.2.x86_64",
            "SUSE Linux Enterprise Micro 5.5:kernel-source-rt-5.14.21-150500.13.100.1.noarch"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2025-07-15T14:31:35Z",
          "details": "moderate"
        }
      ],
      "title": "CVE-2022-50072"
    },
    {
      "cve": "CVE-2022-50073",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2022-50073"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "In the Linux kernel, the following vulnerability has been resolved:\n\nnet: tap: NULL pointer derefence in dev_parse_header_protocol when skb-\u003edev is null\n\nFixes a NULL pointer derefence bug triggered from tap driver.\nWhen tap_get_user calls virtio_net_hdr_to_skb the skb-\u003edev is null\n(in tap.c skb-\u003edev is set after the call to virtio_net_hdr_to_skb)\nvirtio_net_hdr_to_skb calls dev_parse_header_protocol which\nneeds skb-\u003edev field to be valid.\n\nThe line that trigers the bug is in dev_parse_header_protocol\n(dev is at offset 0x10 from skb and is stored in RAX register)\n  if (!dev-\u003eheader_ops || !dev-\u003eheader_ops-\u003eparse_protocol)\n  22e1:   mov    0x10(%rbx),%rax\n  22e5:\t  mov    0x230(%rax),%rax\n\nSetting skb-\u003edev before the call in tap.c fixes the issue.\n\nBUG: kernel NULL pointer dereference, address: 0000000000000230\nRIP: 0010:virtio_net_hdr_to_skb.constprop.0+0x335/0x410 [tap]\nCode: c0 0f 85 b7 fd ff ff eb d4 41 39 c6 77 cf 29 c6 48 89 df 44 01 f6 e8 7a 79 83 c1 48 85 c0 0f 85 d9 fd ff ff eb b7 48 8b 43 10 \u003c48\u003e 8b 80 30 02 00 00 48 85 c0 74 55 48 8b 40 28 48 85 c0 74 4c 48\nRSP: 0018:ffffc90005c27c38 EFLAGS: 00010246\nRAX: 0000000000000000 RBX: ffff888298f25300 RCX: 0000000000000010\nRDX: 0000000000000005 RSI: ffffc90005c27cb6 RDI: ffff888298f25300\nRBP: ffffc90005c27c80 R08: 00000000ffffffea R09: 00000000000007e8\nR10: ffff88858ec77458 R11: 0000000000000000 R12: 0000000000000001\nR13: 0000000000000014 R14: ffffc90005c27e08 R15: ffffc90005c27cb6\nFS:  0000000000000000(0000) GS:ffff88858ec40000(0000) knlGS:0000000000000000\nCS:  0010 DS: 0000 ES: 0000 CR0: 0000000080050033\nCR2: 0000000000000230 CR3: 0000000281408006 CR4: 00000000003706e0\nCall Trace:\n tap_get_user+0x3f1/0x540 [tap]\n tap_sendmsg+0x56/0x362 [tap]\n ? get_tx_bufs+0xc2/0x1e0 [vhost_net]\n handle_tx_copy+0x114/0x670 [vhost_net]\n handle_tx+0xb0/0xe0 [vhost_net]\n handle_tx_kick+0x15/0x20 [vhost_net]\n vhost_worker+0x7b/0xc0 [vhost]\n ? vhost_vring_call_reset+0x40/0x40 [vhost]\n kthread+0xfa/0x120\n ? kthread_complete_and_exit+0x20/0x20\n ret_from_fork+0x1f/0x30",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "SUSE Linux Enterprise Micro 5.5:kernel-devel-rt-5.14.21-150500.13.100.1.noarch",
          "SUSE Linux Enterprise Micro 5.5:kernel-rt-5.14.21-150500.13.100.2.x86_64",
          "SUSE Linux Enterprise Micro 5.5:kernel-source-rt-5.14.21-150500.13.100.1.noarch"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2022-50073",
          "url": "https://www.suse.com/security/cve/CVE-2022-50073"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1244978 for CVE-2022-50073",
          "url": "https://bugzilla.suse.com/1244978"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "SUSE Linux Enterprise Micro 5.5:kernel-devel-rt-5.14.21-150500.13.100.1.noarch",
            "SUSE Linux Enterprise Micro 5.5:kernel-rt-5.14.21-150500.13.100.2.x86_64",
            "SUSE Linux Enterprise Micro 5.5:kernel-source-rt-5.14.21-150500.13.100.1.noarch"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 5.5,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
            "version": "3.1"
          },
          "products": [
            "SUSE Linux Enterprise Micro 5.5:kernel-devel-rt-5.14.21-150500.13.100.1.noarch",
            "SUSE Linux Enterprise Micro 5.5:kernel-rt-5.14.21-150500.13.100.2.x86_64",
            "SUSE Linux Enterprise Micro 5.5:kernel-source-rt-5.14.21-150500.13.100.1.noarch"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2025-07-15T14:31:35Z",
          "details": "moderate"
        }
      ],
      "title": "CVE-2022-50073"
    },
    {
      "cve": "CVE-2022-50074",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2022-50074"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "In the Linux kernel, the following vulnerability has been resolved:\n\napparmor: Fix memleak in aa_simple_write_to_buffer()\n\nWhen copy_from_user failed, the memory is freed by kvfree. however the\nmanagement struct and data blob are allocated independently, so only\nkvfree(data) cause a memleak issue here. Use aa_put_loaddata(data) to\nfix this issue.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "SUSE Linux Enterprise Micro 5.5:kernel-devel-rt-5.14.21-150500.13.100.1.noarch",
          "SUSE Linux Enterprise Micro 5.5:kernel-rt-5.14.21-150500.13.100.2.x86_64",
          "SUSE Linux Enterprise Micro 5.5:kernel-source-rt-5.14.21-150500.13.100.1.noarch"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2022-50074",
          "url": "https://www.suse.com/security/cve/CVE-2022-50074"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1244965 for CVE-2022-50074",
          "url": "https://bugzilla.suse.com/1244965"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "SUSE Linux Enterprise Micro 5.5:kernel-devel-rt-5.14.21-150500.13.100.1.noarch",
            "SUSE Linux Enterprise Micro 5.5:kernel-rt-5.14.21-150500.13.100.2.x86_64",
            "SUSE Linux Enterprise Micro 5.5:kernel-source-rt-5.14.21-150500.13.100.1.noarch"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 5.5,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
            "version": "3.1"
          },
          "products": [
            "SUSE Linux Enterprise Micro 5.5:kernel-devel-rt-5.14.21-150500.13.100.1.noarch",
            "SUSE Linux Enterprise Micro 5.5:kernel-rt-5.14.21-150500.13.100.2.x86_64",
            "SUSE Linux Enterprise Micro 5.5:kernel-source-rt-5.14.21-150500.13.100.1.noarch"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2025-07-15T14:31:35Z",
          "details": "moderate"
        }
      ],
      "title": "CVE-2022-50074"
    },
    {
      "cve": "CVE-2022-50076",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2022-50076"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "In the Linux kernel, the following vulnerability has been resolved:\n\ncifs: Fix memory leak on the deferred close\n\nxfstests on smb21 report kmemleak as below:\n\n  unreferenced object 0xffff8881767d6200 (size 64):\n    comm \"xfs_io\", pid 1284, jiffies 4294777434 (age 20.789s)\n    hex dump (first 32 bytes):\n      80 5a d0 11 81 88 ff ff 78 8a aa 63 81 88 ff ff  .Z......x..c....\n      00 71 99 76 81 88 ff ff 00 00 00 00 00 00 00 00  .q.v............\n    backtrace:\n      [\u003c00000000ad04e6ea\u003e] cifs_close+0x92/0x2c0\n      [\u003c0000000028b93c82\u003e] __fput+0xff/0x3f0\n      [\u003c00000000d8116851\u003e] task_work_run+0x85/0xc0\n      [\u003c0000000027e14f9e\u003e] do_exit+0x5e5/0x1240\n      [\u003c00000000fb492b95\u003e] do_group_exit+0x58/0xe0\n      [\u003c00000000129a32d9\u003e] __x64_sys_exit_group+0x28/0x30\n      [\u003c00000000e3f7d8e9\u003e] do_syscall_64+0x35/0x80\n      [\u003c00000000102e8a0b\u003e] entry_SYSCALL_64_after_hwframe+0x46/0xb0\n\nWhen cancel the deferred close work, we should also cleanup the struct\ncifs_deferred_close.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "SUSE Linux Enterprise Micro 5.5:kernel-devel-rt-5.14.21-150500.13.100.1.noarch",
          "SUSE Linux Enterprise Micro 5.5:kernel-rt-5.14.21-150500.13.100.2.x86_64",
          "SUSE Linux Enterprise Micro 5.5:kernel-source-rt-5.14.21-150500.13.100.1.noarch"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2022-50076",
          "url": "https://www.suse.com/security/cve/CVE-2022-50076"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1244983 for CVE-2022-50076",
          "url": "https://bugzilla.suse.com/1244983"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "SUSE Linux Enterprise Micro 5.5:kernel-devel-rt-5.14.21-150500.13.100.1.noarch",
            "SUSE Linux Enterprise Micro 5.5:kernel-rt-5.14.21-150500.13.100.2.x86_64",
            "SUSE Linux Enterprise Micro 5.5:kernel-source-rt-5.14.21-150500.13.100.1.noarch"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 5.5,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
            "version": "3.1"
          },
          "products": [
            "SUSE Linux Enterprise Micro 5.5:kernel-devel-rt-5.14.21-150500.13.100.1.noarch",
            "SUSE Linux Enterprise Micro 5.5:kernel-rt-5.14.21-150500.13.100.2.x86_64",
            "SUSE Linux Enterprise Micro 5.5:kernel-source-rt-5.14.21-150500.13.100.1.noarch"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2025-07-15T14:31:35Z",
          "details": "moderate"
        }
      ],
      "title": "CVE-2022-50076"
    },
    {
      "cve": "CVE-2022-50077",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2022-50077"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "In the Linux kernel, the following vulnerability has been resolved:\n\napparmor: fix reference count leak in aa_pivotroot()\n\nThe aa_pivotroot() function has a reference counting bug in a specific\npath. When aa_replace_current_label() returns on success, the function\nforgets to decrement the reference count of \"target\", which is\nincreased earlier by build_pivotroot(), causing a reference leak.\n\nFix it by decreasing the refcount of \"target\" in that path.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "SUSE Linux Enterprise Micro 5.5:kernel-devel-rt-5.14.21-150500.13.100.1.noarch",
          "SUSE Linux Enterprise Micro 5.5:kernel-rt-5.14.21-150500.13.100.2.x86_64",
          "SUSE Linux Enterprise Micro 5.5:kernel-source-rt-5.14.21-150500.13.100.1.noarch"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2022-50077",
          "url": "https://www.suse.com/security/cve/CVE-2022-50077"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1244977 for CVE-2022-50077",
          "url": "https://bugzilla.suse.com/1244977"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "SUSE Linux Enterprise Micro 5.5:kernel-devel-rt-5.14.21-150500.13.100.1.noarch",
            "SUSE Linux Enterprise Micro 5.5:kernel-rt-5.14.21-150500.13.100.2.x86_64",
            "SUSE Linux Enterprise Micro 5.5:kernel-source-rt-5.14.21-150500.13.100.1.noarch"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 5.5,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
            "version": "3.1"
          },
          "products": [
            "SUSE Linux Enterprise Micro 5.5:kernel-devel-rt-5.14.21-150500.13.100.1.noarch",
            "SUSE Linux Enterprise Micro 5.5:kernel-rt-5.14.21-150500.13.100.2.x86_64",
            "SUSE Linux Enterprise Micro 5.5:kernel-source-rt-5.14.21-150500.13.100.1.noarch"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2025-07-15T14:31:35Z",
          "details": "moderate"
        }
      ],
      "title": "CVE-2022-50077"
    },
    {
      "cve": "CVE-2022-50079",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2022-50079"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "In the Linux kernel, the following vulnerability has been resolved:\n\ndrm/amd/display: Check correct bounds for stream encoder instances for DCN303\n\n[Why \u0026 How]\neng_id for DCN303 cannot be more than 1, since we have only two\ninstances of stream encoders.\n\nCheck the correct boundary condition for engine ID for DCN303 prevent\nthe potential out of bounds access.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "SUSE Linux Enterprise Micro 5.5:kernel-devel-rt-5.14.21-150500.13.100.1.noarch",
          "SUSE Linux Enterprise Micro 5.5:kernel-rt-5.14.21-150500.13.100.2.x86_64",
          "SUSE Linux Enterprise Micro 5.5:kernel-source-rt-5.14.21-150500.13.100.1.noarch"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2022-50079",
          "url": "https://www.suse.com/security/cve/CVE-2022-50079"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1244970 for CVE-2022-50079",
          "url": "https://bugzilla.suse.com/1244970"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "SUSE Linux Enterprise Micro 5.5:kernel-devel-rt-5.14.21-150500.13.100.1.noarch",
            "SUSE Linux Enterprise Micro 5.5:kernel-rt-5.14.21-150500.13.100.2.x86_64",
            "SUSE Linux Enterprise Micro 5.5:kernel-source-rt-5.14.21-150500.13.100.1.noarch"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 5.5,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
            "version": "3.1"
          },
          "products": [
            "SUSE Linux Enterprise Micro 5.5:kernel-devel-rt-5.14.21-150500.13.100.1.noarch",
            "SUSE Linux Enterprise Micro 5.5:kernel-rt-5.14.21-150500.13.100.2.x86_64",
            "SUSE Linux Enterprise Micro 5.5:kernel-source-rt-5.14.21-150500.13.100.1.noarch"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2025-07-15T14:31:35Z",
          "details": "moderate"
        }
      ],
      "title": "CVE-2022-50079"
    },
    {
      "cve": "CVE-2022-50083",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2022-50083"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "In the Linux kernel, the following vulnerability has been resolved:\n\next4: add EXT4_INODE_HAS_XATTR_SPACE macro in xattr.h\n\nWhen adding an xattr to an inode, we must ensure that the inode_size is\nnot less than EXT4_GOOD_OLD_INODE_SIZE + extra_isize + pad. Otherwise,\nthe end position may be greater than the start position, resulting in UAF.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "SUSE Linux Enterprise Micro 5.5:kernel-devel-rt-5.14.21-150500.13.100.1.noarch",
          "SUSE Linux Enterprise Micro 5.5:kernel-rt-5.14.21-150500.13.100.2.x86_64",
          "SUSE Linux Enterprise Micro 5.5:kernel-source-rt-5.14.21-150500.13.100.1.noarch"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2022-50083",
          "url": "https://www.suse.com/security/cve/CVE-2022-50083"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1244968 for CVE-2022-50083",
          "url": "https://bugzilla.suse.com/1244968"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "SUSE Linux Enterprise Micro 5.5:kernel-devel-rt-5.14.21-150500.13.100.1.noarch",
            "SUSE Linux Enterprise Micro 5.5:kernel-rt-5.14.21-150500.13.100.2.x86_64",
            "SUSE Linux Enterprise Micro 5.5:kernel-source-rt-5.14.21-150500.13.100.1.noarch"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 5.5,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
            "version": "3.1"
          },
          "products": [
            "SUSE Linux Enterprise Micro 5.5:kernel-devel-rt-5.14.21-150500.13.100.1.noarch",
            "SUSE Linux Enterprise Micro 5.5:kernel-rt-5.14.21-150500.13.100.2.x86_64",
            "SUSE Linux Enterprise Micro 5.5:kernel-source-rt-5.14.21-150500.13.100.1.noarch"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2025-07-15T14:31:35Z",
          "details": "moderate"
        }
      ],
      "title": "CVE-2022-50083"
    },
    {
      "cve": "CVE-2022-50084",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2022-50084"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "In the Linux kernel, the following vulnerability has been resolved:\n\ndm raid: fix address sanitizer warning in raid_status\n\nThere is this warning when using a kernel with the address sanitizer\nand running this testsuite:\nhttps://gitlab.com/cki-project/kernel-tests/-/tree/main/storage/swraid/scsi_raid\n\n==================================================================\nBUG: KASAN: slab-out-of-bounds in raid_status+0x1747/0x2820 [dm_raid]\nRead of size 4 at addr ffff888079d2c7e8 by task lvcreate/13319\nCPU: 0 PID: 13319 Comm: lvcreate Not tainted 5.18.0-0.rc3.\u003csnip\u003e #1\nHardware name: Red Hat KVM, BIOS 0.5.1 01/01/2011\nCall Trace:\n \u003cTASK\u003e\n dump_stack_lvl+0x6a/0x9c\n print_address_description.constprop.0+0x1f/0x1e0\n print_report.cold+0x55/0x244\n kasan_report+0xc9/0x100\n raid_status+0x1747/0x2820 [dm_raid]\n dm_ima_measure_on_table_load+0x4b8/0xca0 [dm_mod]\n table_load+0x35c/0x630 [dm_mod]\n ctl_ioctl+0x411/0x630 [dm_mod]\n dm_ctl_ioctl+0xa/0x10 [dm_mod]\n __x64_sys_ioctl+0x12a/0x1a0\n do_syscall_64+0x5b/0x80\n\nThe warning is caused by reading conf-\u003emax_nr_stripes in raid_status. The\ncode in raid_status reads mddev-\u003eprivate, casts it to struct r5conf and\nreads the entry max_nr_stripes.\n\nHowever, if we have different raid type than 4/5/6, mddev-\u003eprivate\ndoesn\u0027t point to struct r5conf; it may point to struct r0conf, struct\nr1conf, struct r10conf or struct mpconf. If we cast a pointer to one\nof these structs to struct r5conf, we will be reading invalid memory\nand KASAN warns about it.\n\nFix this bug by reading struct r5conf only if raid type is 4, 5 or 6.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "SUSE Linux Enterprise Micro 5.5:kernel-devel-rt-5.14.21-150500.13.100.1.noarch",
          "SUSE Linux Enterprise Micro 5.5:kernel-rt-5.14.21-150500.13.100.2.x86_64",
          "SUSE Linux Enterprise Micro 5.5:kernel-source-rt-5.14.21-150500.13.100.1.noarch"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2022-50084",
          "url": "https://www.suse.com/security/cve/CVE-2022-50084"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1245117 for CVE-2022-50084",
          "url": "https://bugzilla.suse.com/1245117"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "SUSE Linux Enterprise Micro 5.5:kernel-devel-rt-5.14.21-150500.13.100.1.noarch",
            "SUSE Linux Enterprise Micro 5.5:kernel-rt-5.14.21-150500.13.100.2.x86_64",
            "SUSE Linux Enterprise Micro 5.5:kernel-source-rt-5.14.21-150500.13.100.1.noarch"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 5.5,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
            "version": "3.1"
          },
          "products": [
            "SUSE Linux Enterprise Micro 5.5:kernel-devel-rt-5.14.21-150500.13.100.1.noarch",
            "SUSE Linux Enterprise Micro 5.5:kernel-rt-5.14.21-150500.13.100.2.x86_64",
            "SUSE Linux Enterprise Micro 5.5:kernel-source-rt-5.14.21-150500.13.100.1.noarch"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2025-07-15T14:31:35Z",
          "details": "moderate"
        }
      ],
      "title": "CVE-2022-50084"
    },
    {
      "cve": "CVE-2022-50085",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2022-50085"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "In the Linux kernel, the following vulnerability has been resolved:\n\ndm raid: fix address sanitizer warning in raid_resume\n\nThere is a KASAN warning in raid_resume when running the lvm test\nlvconvert-raid.sh. The reason for the warning is that mddev-\u003eraid_disks\nis greater than rs-\u003eraid_disks, so the loop touches one entry beyond\nthe allocated length.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "SUSE Linux Enterprise Micro 5.5:kernel-devel-rt-5.14.21-150500.13.100.1.noarch",
          "SUSE Linux Enterprise Micro 5.5:kernel-rt-5.14.21-150500.13.100.2.x86_64",
          "SUSE Linux Enterprise Micro 5.5:kernel-source-rt-5.14.21-150500.13.100.1.noarch"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2022-50085",
          "url": "https://www.suse.com/security/cve/CVE-2022-50085"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1245147 for CVE-2022-50085",
          "url": "https://bugzilla.suse.com/1245147"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "SUSE Linux Enterprise Micro 5.5:kernel-devel-rt-5.14.21-150500.13.100.1.noarch",
            "SUSE Linux Enterprise Micro 5.5:kernel-rt-5.14.21-150500.13.100.2.x86_64",
            "SUSE Linux Enterprise Micro 5.5:kernel-source-rt-5.14.21-150500.13.100.1.noarch"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 6.6,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:P/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
            "version": "3.1"
          },
          "products": [
            "SUSE Linux Enterprise Micro 5.5:kernel-devel-rt-5.14.21-150500.13.100.1.noarch",
            "SUSE Linux Enterprise Micro 5.5:kernel-rt-5.14.21-150500.13.100.2.x86_64",
            "SUSE Linux Enterprise Micro 5.5:kernel-source-rt-5.14.21-150500.13.100.1.noarch"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2025-07-15T14:31:35Z",
          "details": "moderate"
        }
      ],
      "title": "CVE-2022-50085"
    },
    {
      "cve": "CVE-2022-50086",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2022-50086"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "In the Linux kernel, the following vulnerability has been resolved:\n\nblock: don\u0027t allow the same type rq_qos add more than once\n\nIn our test of iocost, we encountered some list add/del corruptions of\ninner_walk list in ioc_timer_fn.\n\nThe reason can be described as follows:\n\ncpu 0\t\t\t\t\tcpu 1\nioc_qos_write\t\t\t\tioc_qos_write\n\nioc = q_to_ioc(queue);\nif (!ioc) {\n        ioc = kzalloc();\n\t\t\t\t\tioc = q_to_ioc(queue);\n\t\t\t\t\tif (!ioc) {\n\t\t\t\t\t\tioc = kzalloc();\n\t\t\t\t\t\t...\n\t\t\t\t\t\trq_qos_add(q, rqos);\n\t\t\t\t\t}\n        ...\n        rq_qos_add(q, rqos);\n        ...\n}\n\nWhen the io.cost.qos file is written by two cpus concurrently, rq_qos may\nbe added to one disk twice. In that case, there will be two iocs enabled\nand running on one disk. They own different iocgs on their active list. In\nthe ioc_timer_fn function, because of the iocgs from two iocs have the\nsame root iocg, the root iocg\u0027s walk_list may be overwritten by each other\nand this leads to list add/del corruptions in building or destroying the\ninner_walk list.\n\nAnd so far, the blk-rq-qos framework works in case that one instance for\none type rq_qos per queue by default. This patch make this explicit and\nalso fix the crash above.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "SUSE Linux Enterprise Micro 5.5:kernel-devel-rt-5.14.21-150500.13.100.1.noarch",
          "SUSE Linux Enterprise Micro 5.5:kernel-rt-5.14.21-150500.13.100.2.x86_64",
          "SUSE Linux Enterprise Micro 5.5:kernel-source-rt-5.14.21-150500.13.100.1.noarch"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2022-50086",
          "url": "https://www.suse.com/security/cve/CVE-2022-50086"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1245116 for CVE-2022-50086",
          "url": "https://bugzilla.suse.com/1245116"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "SUSE Linux Enterprise Micro 5.5:kernel-devel-rt-5.14.21-150500.13.100.1.noarch",
            "SUSE Linux Enterprise Micro 5.5:kernel-rt-5.14.21-150500.13.100.2.x86_64",
            "SUSE Linux Enterprise Micro 5.5:kernel-source-rt-5.14.21-150500.13.100.1.noarch"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 5.5,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
            "version": "3.1"
          },
          "products": [
            "SUSE Linux Enterprise Micro 5.5:kernel-devel-rt-5.14.21-150500.13.100.1.noarch",
            "SUSE Linux Enterprise Micro 5.5:kernel-rt-5.14.21-150500.13.100.2.x86_64",
            "SUSE Linux Enterprise Micro 5.5:kernel-source-rt-5.14.21-150500.13.100.1.noarch"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2025-07-15T14:31:35Z",
          "details": "moderate"
        }
      ],
      "title": "CVE-2022-50086"
    },
    {
      "cve": "CVE-2022-50087",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2022-50087"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "In the Linux kernel, the following vulnerability has been resolved:\n\nfirmware: arm_scpi: Ensure scpi_info is not assigned if the probe fails\n\nWhen scpi probe fails, at any point, we need to ensure that the scpi_info\nis not set and will remain NULL until the probe succeeds. If it is not\ntaken care, then it could result use-after-free as the value is exported\nvia get_scpi_ops() and could refer to a memory allocated via devm_kzalloc()\nbut freed when the probe fails.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "SUSE Linux Enterprise Micro 5.5:kernel-devel-rt-5.14.21-150500.13.100.1.noarch",
          "SUSE Linux Enterprise Micro 5.5:kernel-rt-5.14.21-150500.13.100.2.x86_64",
          "SUSE Linux Enterprise Micro 5.5:kernel-source-rt-5.14.21-150500.13.100.1.noarch"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2022-50087",
          "url": "https://www.suse.com/security/cve/CVE-2022-50087"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1245119 for CVE-2022-50087",
          "url": "https://bugzilla.suse.com/1245119"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1245294 for CVE-2022-50087",
          "url": "https://bugzilla.suse.com/1245294"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "SUSE Linux Enterprise Micro 5.5:kernel-devel-rt-5.14.21-150500.13.100.1.noarch",
            "SUSE Linux Enterprise Micro 5.5:kernel-rt-5.14.21-150500.13.100.2.x86_64",
            "SUSE Linux Enterprise Micro 5.5:kernel-source-rt-5.14.21-150500.13.100.1.noarch"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 7,
            "baseSeverity": "HIGH",
            "vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H",
            "version": "3.1"
          },
          "products": [
            "SUSE Linux Enterprise Micro 5.5:kernel-devel-rt-5.14.21-150500.13.100.1.noarch",
            "SUSE Linux Enterprise Micro 5.5:kernel-rt-5.14.21-150500.13.100.2.x86_64",
            "SUSE Linux Enterprise Micro 5.5:kernel-source-rt-5.14.21-150500.13.100.1.noarch"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2025-07-15T14:31:35Z",
          "details": "important"
        }
      ],
      "title": "CVE-2022-50087"
    },
    {
      "cve": "CVE-2022-50092",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2022-50092"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "In the Linux kernel, the following vulnerability has been resolved:\n\ndm thin: fix use-after-free crash in dm_sm_register_threshold_callback\n\nFault inject on pool metadata device reports:\n  BUG: KASAN: use-after-free in dm_pool_register_metadata_threshold+0x40/0x80\n  Read of size 8 at addr ffff8881b9d50068 by task dmsetup/950\n\n  CPU: 7 PID: 950 Comm: dmsetup Tainted: G        W         5.19.0-rc6 #1\n  Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.14.0-1.fc33 04/01/2014\n  Call Trace:\n   \u003cTASK\u003e\n   dump_stack_lvl+0x34/0x44\n   print_address_description.constprop.0.cold+0xeb/0x3f4\n   kasan_report.cold+0xe6/0x147\n   dm_pool_register_metadata_threshold+0x40/0x80\n   pool_ctr+0xa0a/0x1150\n   dm_table_add_target+0x2c8/0x640\n   table_load+0x1fd/0x430\n   ctl_ioctl+0x2c4/0x5a0\n   dm_ctl_ioctl+0xa/0x10\n   __x64_sys_ioctl+0xb3/0xd0\n   do_syscall_64+0x35/0x80\n   entry_SYSCALL_64_after_hwframe+0x46/0xb0\n\nThis can be easily reproduced using:\n  echo offline \u003e /sys/block/sda/device/state\n  dd if=/dev/zero of=/dev/mapper/thin bs=4k count=10\n  dmsetup load pool --table \"0 20971520 thin-pool /dev/sda /dev/sdb 128 0 0\"\n\nIf a metadata commit fails, the transaction will be aborted and the\nmetadata space maps will be destroyed. If a DM table reload then\nhappens for this failed thin-pool, a use-after-free will occur in\ndm_sm_register_threshold_callback (called from\ndm_pool_register_metadata_threshold).\n\nFix this by in dm_pool_register_metadata_threshold() by returning the\n-EINVAL error if the thin-pool is in fail mode. Also fail pool_ctr()\nwith a new error message: \"Error registering metadata threshold\".",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "SUSE Linux Enterprise Micro 5.5:kernel-devel-rt-5.14.21-150500.13.100.1.noarch",
          "SUSE Linux Enterprise Micro 5.5:kernel-rt-5.14.21-150500.13.100.2.x86_64",
          "SUSE Linux Enterprise Micro 5.5:kernel-source-rt-5.14.21-150500.13.100.1.noarch"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2022-50092",
          "url": "https://www.suse.com/security/cve/CVE-2022-50092"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1244848 for CVE-2022-50092",
          "url": "https://bugzilla.suse.com/1244848"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "SUSE Linux Enterprise Micro 5.5:kernel-devel-rt-5.14.21-150500.13.100.1.noarch",
            "SUSE Linux Enterprise Micro 5.5:kernel-rt-5.14.21-150500.13.100.2.x86_64",
            "SUSE Linux Enterprise Micro 5.5:kernel-source-rt-5.14.21-150500.13.100.1.noarch"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 5.5,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
            "version": "3.1"
          },
          "products": [
            "SUSE Linux Enterprise Micro 5.5:kernel-devel-rt-5.14.21-150500.13.100.1.noarch",
            "SUSE Linux Enterprise Micro 5.5:kernel-rt-5.14.21-150500.13.100.2.x86_64",
            "SUSE Linux Enterprise Micro 5.5:kernel-source-rt-5.14.21-150500.13.100.1.noarch"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2025-07-15T14:31:35Z",
          "details": "moderate"
        }
      ],
      "title": "CVE-2022-50092"
    },
    {
      "cve": "CVE-2022-50093",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2022-50093"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "In the Linux kernel, the following vulnerability has been resolved:\n\niommu/vt-d: avoid invalid memory access via node_online(NUMA_NO_NODE)\n\nKASAN reports:\n\n[ 4.668325][ T0] BUG: KASAN: wild-memory-access in dmar_parse_one_rhsa (arch/x86/include/asm/bitops.h:214 arch/x86/include/asm/bitops.h:226 include/asm-generic/bitops/instrumented-non-atomic.h:142 include/linux/nodemask.h:415 drivers/iommu/intel/dmar.c:497)\n[    4.676149][    T0] Read of size 8 at addr 1fffffff85115558 by task swapper/0/0\n[    4.683454][    T0]\n[    4.685638][    T0] CPU: 0 PID: 0 Comm: swapper/0 Not tainted 5.19.0-rc3-00004-g0e862838f290 #1\n[    4.694331][    T0] Hardware name: Supermicro SYS-5018D-FN4T/X10SDV-8C-TLN4F, BIOS 1.1 03/02/2016\n[    4.703196][    T0] Call Trace:\n[    4.706334][    T0]  \u003cTASK\u003e\n[ 4.709133][ T0] ? dmar_parse_one_rhsa (arch/x86/include/asm/bitops.h:214 arch/x86/include/asm/bitops.h:226 include/asm-generic/bitops/instrumented-non-atomic.h:142 include/linux/nodemask.h:415 drivers/iommu/intel/dmar.c:497)\n\nafter converting the type of the first argument (@nr, bit number)\nof arch_test_bit() from `long` to `unsigned long`[0].\n\nUnder certain conditions (for example, when ACPI NUMA is disabled\nvia command line), pxm_to_node() can return %NUMA_NO_NODE (-1).\nIt is valid \u0027magic\u0027 number of NUMA node, but not valid bit number\nto use in bitops.\nnode_online() eventually descends to test_bit() without checking\nfor the input, assuming it\u0027s on caller side (which might be good\nfor perf-critical tasks). There, -1 becomes %ULONG_MAX which leads\nto an insane array index when calculating bit position in memory.\n\nFor now, add an explicit check for @node being not %NUMA_NO_NODE\nbefore calling test_bit(). The actual logics didn\u0027t change here\nat all.\n\n[0] https://github.com/norov/linux/commit/0e862838f290147ea9c16db852d8d494b552d38d",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "SUSE Linux Enterprise Micro 5.5:kernel-devel-rt-5.14.21-150500.13.100.1.noarch",
          "SUSE Linux Enterprise Micro 5.5:kernel-rt-5.14.21-150500.13.100.2.x86_64",
          "SUSE Linux Enterprise Micro 5.5:kernel-source-rt-5.14.21-150500.13.100.1.noarch"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2022-50093",
          "url": "https://www.suse.com/security/cve/CVE-2022-50093"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1244849 for CVE-2022-50093",
          "url": "https://bugzilla.suse.com/1244849"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "SUSE Linux Enterprise Micro 5.5:kernel-devel-rt-5.14.21-150500.13.100.1.noarch",
            "SUSE Linux Enterprise Micro 5.5:kernel-rt-5.14.21-150500.13.100.2.x86_64",
            "SUSE Linux Enterprise Micro 5.5:kernel-source-rt-5.14.21-150500.13.100.1.noarch"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 5.5,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
            "version": "3.1"
          },
          "products": [
            "SUSE Linux Enterprise Micro 5.5:kernel-devel-rt-5.14.21-150500.13.100.1.noarch",
            "SUSE Linux Enterprise Micro 5.5:kernel-rt-5.14.21-150500.13.100.2.x86_64",
            "SUSE Linux Enterprise Micro 5.5:kernel-source-rt-5.14.21-150500.13.100.1.noarch"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2025-07-15T14:31:35Z",
          "details": "moderate"
        }
      ],
      "title": "CVE-2022-50093"
    },
    {
      "cve": "CVE-2022-50094",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2022-50094"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "In the Linux kernel, the following vulnerability has been resolved:\n\nspmi: trace: fix stack-out-of-bound access in SPMI tracing functions\n\ntrace_spmi_write_begin() and trace_spmi_read_end() both call\nmemcpy() with a length of \"len + 1\".  This leads to one extra\nbyte being read beyond the end of the specified buffer.  Fix\nthis out-of-bound memory access by using a length of \"len\"\ninstead.\n\nHere is a KASAN log showing the issue:\n\nBUG: KASAN: stack-out-of-bounds in trace_event_raw_event_spmi_read_end+0x1d0/0x234\nRead of size 2 at addr ffffffc0265b7540 by task thermal@2.0-ser/1314\n...\nCall trace:\n dump_backtrace+0x0/0x3e8\n show_stack+0x2c/0x3c\n dump_stack_lvl+0xdc/0x11c\n print_address_description+0x74/0x384\n kasan_report+0x188/0x268\n kasan_check_range+0x270/0x2b0\n memcpy+0x90/0xe8\n trace_event_raw_event_spmi_read_end+0x1d0/0x234\n spmi_read_cmd+0x294/0x3ac\n spmi_ext_register_readl+0x84/0x9c\n regmap_spmi_ext_read+0x144/0x1b0 [regmap_spmi]\n _regmap_raw_read+0x40c/0x754\n regmap_raw_read+0x3a0/0x514\n regmap_bulk_read+0x418/0x494\n adc5_gen3_poll_wait_hs+0xe8/0x1e0 [qcom_spmi_adc5_gen3]\n ...\n __arm64_sys_read+0x4c/0x60\n invoke_syscall+0x80/0x218\n el0_svc_common+0xec/0x1c8\n ...\n\naddr ffffffc0265b7540 is located in stack of task thermal@2.0-ser/1314 at offset 32 in frame:\n adc5_gen3_poll_wait_hs+0x0/0x1e0 [qcom_spmi_adc5_gen3]\n\nthis frame has 1 object:\n [32, 33) \u0027status\u0027\n\nMemory state around the buggy address:\n ffffffc0265b7400: 00 00 00 00 00 00 00 00 00 00 00 00 f1 f1 f1 f1\n ffffffc0265b7480: 04 f3 f3 f3 00 00 00 00 00 00 00 00 00 00 00 00\n\u003effffffc0265b7500: 00 00 00 00 f1 f1 f1 f1 01 f3 f3 f3 00 00 00 00\n                                           ^\n ffffffc0265b7580: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00\n ffffffc0265b7600: f1 f1 f1 f1 01 f2 07 f2 f2 f2 01 f3 00 00 00 00\n==================================================================",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "SUSE Linux Enterprise Micro 5.5:kernel-devel-rt-5.14.21-150500.13.100.1.noarch",
          "SUSE Linux Enterprise Micro 5.5:kernel-rt-5.14.21-150500.13.100.2.x86_64",
          "SUSE Linux Enterprise Micro 5.5:kernel-source-rt-5.14.21-150500.13.100.1.noarch"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2022-50094",
          "url": "https://www.suse.com/security/cve/CVE-2022-50094"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1244851 for CVE-2022-50094",
          "url": "https://bugzilla.suse.com/1244851"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "SUSE Linux Enterprise Micro 5.5:kernel-devel-rt-5.14.21-150500.13.100.1.noarch",
            "SUSE Linux Enterprise Micro 5.5:kernel-rt-5.14.21-150500.13.100.2.x86_64",
            "SUSE Linux Enterprise Micro 5.5:kernel-source-rt-5.14.21-150500.13.100.1.noarch"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 5.5,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
            "version": "3.1"
          },
          "products": [
            "SUSE Linux Enterprise Micro 5.5:kernel-devel-rt-5.14.21-150500.13.100.1.noarch",
            "SUSE Linux Enterprise Micro 5.5:kernel-rt-5.14.21-150500.13.100.2.x86_64",
            "SUSE Linux Enterprise Micro 5.5:kernel-source-rt-5.14.21-150500.13.100.1.noarch"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2025-07-15T14:31:35Z",
          "details": "moderate"
        }
      ],
      "title": "CVE-2022-50094"
    },
    {
      "cve": "CVE-2022-50095",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2022-50095"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "In the Linux kernel, the following vulnerability has been resolved:\n\nposix-cpu-timers: Cleanup CPU timers before freeing them during exec\n\nCommit 55e8c8eb2c7b (\"posix-cpu-timers: Store a reference to a pid not a\ntask\") started looking up tasks by PID when deleting a CPU timer.\n\nWhen a non-leader thread calls execve, it will switch PIDs with the leader\nprocess. Then, as it calls exit_itimers, posix_cpu_timer_del cannot find\nthe task because the timer still points out to the old PID.\n\nThat means that armed timers won\u0027t be disarmed, that is, they won\u0027t be\nremoved from the timerqueue_list. exit_itimers will still release their\nmemory, and when that list is later processed, it leads to a\nuse-after-free.\n\nClean up the timers from the de-threaded task before freeing them. This\nprevents a reported use-after-free.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "SUSE Linux Enterprise Micro 5.5:kernel-devel-rt-5.14.21-150500.13.100.1.noarch",
          "SUSE Linux Enterprise Micro 5.5:kernel-rt-5.14.21-150500.13.100.2.x86_64",
          "SUSE Linux Enterprise Micro 5.5:kernel-source-rt-5.14.21-150500.13.100.1.noarch"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2022-50095",
          "url": "https://www.suse.com/security/cve/CVE-2022-50095"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1244846 for CVE-2022-50095",
          "url": "https://bugzilla.suse.com/1244846"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "SUSE Linux Enterprise Micro 5.5:kernel-devel-rt-5.14.21-150500.13.100.1.noarch",
            "SUSE Linux Enterprise Micro 5.5:kernel-rt-5.14.21-150500.13.100.2.x86_64",
            "SUSE Linux Enterprise Micro 5.5:kernel-source-rt-5.14.21-150500.13.100.1.noarch"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 5.5,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
            "version": "3.1"
          },
          "products": [
            "SUSE Linux Enterprise Micro 5.5:kernel-devel-rt-5.14.21-150500.13.100.1.noarch",
            "SUSE Linux Enterprise Micro 5.5:kernel-rt-5.14.21-150500.13.100.2.x86_64",
            "SUSE Linux Enterprise Micro 5.5:kernel-source-rt-5.14.21-150500.13.100.1.noarch"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2025-07-15T14:31:35Z",
          "details": "moderate"
        }
      ],
      "title": "CVE-2022-50095"
    },
    {
      "cve": "CVE-2022-50097",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2022-50097"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "In the Linux kernel, the following vulnerability has been resolved:\n\nvideo: fbdev: s3fb: Check the size of screen before memset_io()\n\nIn the function s3fb_set_par(), the value of \u0027screen_size\u0027 is\ncalculated by the user input. If the user provides the improper value,\nthe value of \u0027screen_size\u0027 may larger than \u0027info-\u003escreen_size\u0027, which\nmay cause the following bug:\n\n[   54.083733] BUG: unable to handle page fault for address: ffffc90003000000\n[   54.083742] #PF: supervisor write access in kernel mode\n[   54.083744] #PF: error_code(0x0002) - not-present page\n[   54.083760] RIP: 0010:memset_orig+0x33/0xb0\n[   54.083782] Call Trace:\n[   54.083788]  s3fb_set_par+0x1ec6/0x4040\n[   54.083806]  fb_set_var+0x604/0xeb0\n[   54.083836]  do_fb_ioctl+0x234/0x670\n\nFix the this by checking the value of \u0027screen_size\u0027 before memset_io().",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "SUSE Linux Enterprise Micro 5.5:kernel-devel-rt-5.14.21-150500.13.100.1.noarch",
          "SUSE Linux Enterprise Micro 5.5:kernel-rt-5.14.21-150500.13.100.2.x86_64",
          "SUSE Linux Enterprise Micro 5.5:kernel-source-rt-5.14.21-150500.13.100.1.noarch"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2022-50097",
          "url": "https://www.suse.com/security/cve/CVE-2022-50097"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1244845 for CVE-2022-50097",
          "url": "https://bugzilla.suse.com/1244845"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "SUSE Linux Enterprise Micro 5.5:kernel-devel-rt-5.14.21-150500.13.100.1.noarch",
            "SUSE Linux Enterprise Micro 5.5:kernel-rt-5.14.21-150500.13.100.2.x86_64",
            "SUSE Linux Enterprise Micro 5.5:kernel-source-rt-5.14.21-150500.13.100.1.noarch"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 5.5,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
            "version": "3.1"
          },
          "products": [
            "SUSE Linux Enterprise Micro 5.5:kernel-devel-rt-5.14.21-150500.13.100.1.noarch",
            "SUSE Linux Enterprise Micro 5.5:kernel-rt-5.14.21-150500.13.100.2.x86_64",
            "SUSE Linux Enterprise Micro 5.5:kernel-source-rt-5.14.21-150500.13.100.1.noarch"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2025-07-15T14:31:35Z",
          "details": "moderate"
        }
      ],
      "title": "CVE-2022-50097"
    },
    {
      "cve": "CVE-2022-50098",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2022-50098"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "In the Linux kernel, the following vulnerability has been resolved:\n\nscsi: qla2xxx: Fix crash due to stale SRB access around I/O timeouts\n\nEnsure SRB is returned during I/O timeout error escalation. If that is not\npossible fail the escalation path.\n\nFollowing crash stack was seen:\n\nBUG: unable to handle kernel paging request at 0000002f56aa90f8\nIP: qla_chk_edif_rx_sa_delete_pending+0x14/0x30 [qla2xxx]\nCall Trace:\n ? qla2x00_status_entry+0x19f/0x1c50 [qla2xxx]\n ? qla2x00_start_sp+0x116/0x1170 [qla2xxx]\n ? dma_pool_alloc+0x1d6/0x210\n ? mempool_alloc+0x54/0x130\n ? qla24xx_process_response_queue+0x548/0x12b0 [qla2xxx]\n ? qla_do_work+0x2d/0x40 [qla2xxx]\n ? process_one_work+0x14c/0x390",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "SUSE Linux Enterprise Micro 5.5:kernel-devel-rt-5.14.21-150500.13.100.1.noarch",
          "SUSE Linux Enterprise Micro 5.5:kernel-rt-5.14.21-150500.13.100.2.x86_64",
          "SUSE Linux Enterprise Micro 5.5:kernel-source-rt-5.14.21-150500.13.100.1.noarch"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2022-50098",
          "url": "https://www.suse.com/security/cve/CVE-2022-50098"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1244841 for CVE-2022-50098",
          "url": "https://bugzilla.suse.com/1244841"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "SUSE Linux Enterprise Micro 5.5:kernel-devel-rt-5.14.21-150500.13.100.1.noarch",
            "SUSE Linux Enterprise Micro 5.5:kernel-rt-5.14.21-150500.13.100.2.x86_64",
            "SUSE Linux Enterprise Micro 5.5:kernel-source-rt-5.14.21-150500.13.100.1.noarch"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 5.5,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
            "version": "3.1"
          },
          "products": [
            "SUSE Linux Enterprise Micro 5.5:kernel-devel-rt-5.14.21-150500.13.100.1.noarch",
            "SUSE Linux Enterprise Micro 5.5:kernel-rt-5.14.21-150500.13.100.2.x86_64",
            "SUSE Linux Enterprise Micro 5.5:kernel-source-rt-5.14.21-150500.13.100.1.noarch"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2025-07-15T14:31:35Z",
          "details": "moderate"
        }
      ],
      "title": "CVE-2022-50098"
    },
    {
      "cve": "CVE-2022-50099",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2022-50099"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "In the Linux kernel, the following vulnerability has been resolved:\n\nvideo: fbdev: arkfb: Check the size of screen before memset_io()\n\nIn the function arkfb_set_par(), the value of \u0027screen_size\u0027 is\ncalculated by the user input. If the user provides the improper value,\nthe value of \u0027screen_size\u0027 may larger than \u0027info-\u003escreen_size\u0027, which\nmay cause the following bug:\n\n[  659.399066] BUG: unable to handle page fault for address: ffffc90003000000\n[  659.399077] #PF: supervisor write access in kernel mode\n[  659.399079] #PF: error_code(0x0002) - not-present page\n[  659.399094] RIP: 0010:memset_orig+0x33/0xb0\n[  659.399116] Call Trace:\n[  659.399122]  arkfb_set_par+0x143f/0x24c0\n[  659.399130]  fb_set_var+0x604/0xeb0\n[  659.399161]  do_fb_ioctl+0x234/0x670\n[  659.399189]  fb_ioctl+0xdd/0x130\n\nFix the this by checking the value of \u0027screen_size\u0027 before memset_io().",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "SUSE Linux Enterprise Micro 5.5:kernel-devel-rt-5.14.21-150500.13.100.1.noarch",
          "SUSE Linux Enterprise Micro 5.5:kernel-rt-5.14.21-150500.13.100.2.x86_64",
          "SUSE Linux Enterprise Micro 5.5:kernel-source-rt-5.14.21-150500.13.100.1.noarch"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2022-50099",
          "url": "https://www.suse.com/security/cve/CVE-2022-50099"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1244842 for CVE-2022-50099",
          "url": "https://bugzilla.suse.com/1244842"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "SUSE Linux Enterprise Micro 5.5:kernel-devel-rt-5.14.21-150500.13.100.1.noarch",
            "SUSE Linux Enterprise Micro 5.5:kernel-rt-5.14.21-150500.13.100.2.x86_64",
            "SUSE Linux Enterprise Micro 5.5:kernel-source-rt-5.14.21-150500.13.100.1.noarch"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 5.5,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
            "version": "3.1"
          },
          "products": [
            "SUSE Linux Enterprise Micro 5.5:kernel-devel-rt-5.14.21-150500.13.100.1.noarch",
            "SUSE Linux Enterprise Micro 5.5:kernel-rt-5.14.21-150500.13.100.2.x86_64",
            "SUSE Linux Enterprise Micro 5.5:kernel-source-rt-5.14.21-150500.13.100.1.noarch"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2025-07-15T14:31:35Z",
          "details": "moderate"
        }
      ],
      "title": "CVE-2022-50099"
    },
    {
      "cve": "CVE-2022-50100",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2022-50100"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "In the Linux kernel, the following vulnerability has been resolved:\n\nsched/core: Do not requeue task on CPU excluded from cpus_mask\n\nThe following warning was triggered on a large machine early in boot on\na distribution kernel but the same problem should also affect mainline.\n\n   WARNING: CPU: 439 PID: 10 at ../kernel/workqueue.c:2231 process_one_work+0x4d/0x440\n   Call Trace:\n    \u003cTASK\u003e\n    rescuer_thread+0x1f6/0x360\n    kthread+0x156/0x180\n    ret_from_fork+0x22/0x30\n    \u003c/TASK\u003e\n\nCommit c6e7bd7afaeb (\"sched/core: Optimize ttwu() spinning on p-\u003eon_cpu\")\noptimises ttwu by queueing a task that is descheduling on the wakelist,\nbut does not check if the task descheduling is still allowed to run on that CPU.\n\nIn this warning, the problematic task is a workqueue rescue thread which\nchecks if the rescue is for a per-cpu workqueue and running on the wrong CPU.\nWhile this is early in boot and it should be possible to create workers,\nthe rescue thread may still used if the MAYDAY_INITIAL_TIMEOUT is reached\nor MAYDAY_INTERVAL and on a sufficiently large machine, the rescue\nthread is being used frequently.\n\nTracing confirmed that the task should have migrated properly using the\nstopper thread to handle the migration. However, a parallel wakeup from udev\nrunning on another CPU that does not share CPU cache observes p-\u003eon_cpu and\nuses task_cpu(p), queues the task on the old CPU and triggers the warning.\n\nCheck that the wakee task that is descheduling is still allowed to run\non its current CPU and if not, wait for the descheduling to complete\nand select an allowed CPU.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "SUSE Linux Enterprise Micro 5.5:kernel-devel-rt-5.14.21-150500.13.100.1.noarch",
          "SUSE Linux Enterprise Micro 5.5:kernel-rt-5.14.21-150500.13.100.2.x86_64",
          "SUSE Linux Enterprise Micro 5.5:kernel-source-rt-5.14.21-150500.13.100.1.noarch"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2022-50100",
          "url": "https://www.suse.com/security/cve/CVE-2022-50100"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1244843 for CVE-2022-50100",
          "url": "https://bugzilla.suse.com/1244843"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "SUSE Linux Enterprise Micro 5.5:kernel-devel-rt-5.14.21-150500.13.100.1.noarch",
            "SUSE Linux Enterprise Micro 5.5:kernel-rt-5.14.21-150500.13.100.2.x86_64",
            "SUSE Linux Enterprise Micro 5.5:kernel-source-rt-5.14.21-150500.13.100.1.noarch"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 5.5,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
            "version": "3.1"
          },
          "products": [
            "SUSE Linux Enterprise Micro 5.5:kernel-devel-rt-5.14.21-150500.13.100.1.noarch",
            "SUSE Linux Enterprise Micro 5.5:kernel-rt-5.14.21-150500.13.100.2.x86_64",
            "SUSE Linux Enterprise Micro 5.5:kernel-source-rt-5.14.21-150500.13.100.1.noarch"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2025-07-15T14:31:35Z",
          "details": "moderate"
        }
      ],
      "title": "CVE-2022-50100"
    },
    {
      "cve": "CVE-2022-50101",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2022-50101"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "In the Linux kernel, the following vulnerability has been resolved:\n\nvideo: fbdev: vt8623fb: Check the size of screen before memset_io()\n\nIn the function vt8623fb_set_par(), the value of \u0027screen_size\u0027 is\ncalculated by the user input. If the user provides the improper value,\nthe value of \u0027screen_size\u0027 may larger than \u0027info-\u003escreen_size\u0027, which\nmay cause the following bug:\n\n[  583.339036] BUG: unable to handle page fault for address: ffffc90005000000\n[  583.339049] #PF: supervisor write access in kernel mode\n[  583.339052] #PF: error_code(0x0002) - not-present page\n[  583.339074] RIP: 0010:memset_orig+0x33/0xb0\n[  583.339110] Call Trace:\n[  583.339118]  vt8623fb_set_par+0x11cd/0x21e0\n[  583.339146]  fb_set_var+0x604/0xeb0\n[  583.339181]  do_fb_ioctl+0x234/0x670\n[  583.339209]  fb_ioctl+0xdd/0x130\n\nFix the this by checking the value of \u0027screen_size\u0027 before memset_io().",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "SUSE Linux Enterprise Micro 5.5:kernel-devel-rt-5.14.21-150500.13.100.1.noarch",
          "SUSE Linux Enterprise Micro 5.5:kernel-rt-5.14.21-150500.13.100.2.x86_64",
          "SUSE Linux Enterprise Micro 5.5:kernel-source-rt-5.14.21-150500.13.100.1.noarch"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2022-50101",
          "url": "https://www.suse.com/security/cve/CVE-2022-50101"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1244839 for CVE-2022-50101",
          "url": "https://bugzilla.suse.com/1244839"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "SUSE Linux Enterprise Micro 5.5:kernel-devel-rt-5.14.21-150500.13.100.1.noarch",
            "SUSE Linux Enterprise Micro 5.5:kernel-rt-5.14.21-150500.13.100.2.x86_64",
            "SUSE Linux Enterprise Micro 5.5:kernel-source-rt-5.14.21-150500.13.100.1.noarch"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 5.5,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
            "version": "3.1"
          },
          "products": [
            "SUSE Linux Enterprise Micro 5.5:kernel-devel-rt-5.14.21-150500.13.100.1.noarch",
            "SUSE Linux Enterprise Micro 5.5:kernel-rt-5.14.21-150500.13.100.2.x86_64",
            "SUSE Linux Enterprise Micro 5.5:kernel-source-rt-5.14.21-150500.13.100.1.noarch"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2025-07-15T14:31:35Z",
          "details": "moderate"
        }
      ],
      "title": "CVE-2022-50101"
    },
    {
      "cve": "CVE-2022-50102",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2022-50102"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "In the Linux kernel, the following vulnerability has been resolved:\n\nvideo: fbdev: arkfb: Fix a divide-by-zero bug in ark_set_pixclock()\n\nSince the user can control the arguments of the ioctl() from the user\nspace, under special arguments that may result in a divide-by-zero bug\nin:\n  drivers/video/fbdev/arkfb.c:784: ark_set_pixclock(info, (hdiv * info-\u003evar.pixclock) / hmul);\nwith hdiv=1, pixclock=1 and hmul=2 you end up with (1*1)/2 = (int) 0.\nand then in:\n  drivers/video/fbdev/arkfb.c:504: rv = dac_set_freq(par-\u003edac, 0, 1000000000 / pixclock);\nwe\u0027ll get a division-by-zero.\n\nThe following log can reveal it:\n\ndivide error: 0000 [#1] PREEMPT SMP KASAN PTI\nRIP: 0010:ark_set_pixclock drivers/video/fbdev/arkfb.c:504 [inline]\nRIP: 0010:arkfb_set_par+0x10fc/0x24c0 drivers/video/fbdev/arkfb.c:784\nCall Trace:\n fb_set_var+0x604/0xeb0 drivers/video/fbdev/core/fbmem.c:1034\n do_fb_ioctl+0x234/0x670 drivers/video/fbdev/core/fbmem.c:1110\n fb_ioctl+0xdd/0x130 drivers/video/fbdev/core/fbmem.c:1189\n\nFix this by checking the argument of ark_set_pixclock() first.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "SUSE Linux Enterprise Micro 5.5:kernel-devel-rt-5.14.21-150500.13.100.1.noarch",
          "SUSE Linux Enterprise Micro 5.5:kernel-rt-5.14.21-150500.13.100.2.x86_64",
          "SUSE Linux Enterprise Micro 5.5:kernel-source-rt-5.14.21-150500.13.100.1.noarch"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2022-50102",
          "url": "https://www.suse.com/security/cve/CVE-2022-50102"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1244838 for CVE-2022-50102",
          "url": "https://bugzilla.suse.com/1244838"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "SUSE Linux Enterprise Micro 5.5:kernel-devel-rt-5.14.21-150500.13.100.1.noarch",
            "SUSE Linux Enterprise Micro 5.5:kernel-rt-5.14.21-150500.13.100.2.x86_64",
            "SUSE Linux Enterprise Micro 5.5:kernel-source-rt-5.14.21-150500.13.100.1.noarch"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 5.5,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
            "version": "3.1"
          },
          "products": [
            "SUSE Linux Enterprise Micro 5.5:kernel-devel-rt-5.14.21-150500.13.100.1.noarch",
            "SUSE Linux Enterprise Micro 5.5:kernel-rt-5.14.21-150500.13.100.2.x86_64",
            "SUSE Linux Enterprise Micro 5.5:kernel-source-rt-5.14.21-150500.13.100.1.noarch"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2025-07-15T14:31:35Z",
          "details": "moderate"
        }
      ],
      "title": "CVE-2022-50102"
    },
    {
      "cve": "CVE-2022-50103",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2022-50103"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "In the Linux kernel, the following vulnerability has been resolved:\n\nsched, cpuset: Fix dl_cpu_busy() panic due to empty cs-\u003ecpus_allowed\n\nWith cgroup v2, the cpuset\u0027s cpus_allowed mask can be empty indicating\nthat the cpuset will just use the effective CPUs of its parent. So\ncpuset_can_attach() can call task_can_attach() with an empty mask.\nThis can lead to cpumask_any_and() returns nr_cpu_ids causing the call\nto dl_bw_of() to crash due to percpu value access of an out of bound\nCPU value. For example:\n\n\t[80468.182258] BUG: unable to handle page fault for address: ffffffff8b6648b0\n\t  :\n\t[80468.191019] RIP: 0010:dl_cpu_busy+0x30/0x2b0\n\t  :\n\t[80468.207946] Call Trace:\n\t[80468.208947]  cpuset_can_attach+0xa0/0x140\n\t[80468.209953]  cgroup_migrate_execute+0x8c/0x490\n\t[80468.210931]  cgroup_update_dfl_csses+0x254/0x270\n\t[80468.211898]  cgroup_subtree_control_write+0x322/0x400\n\t[80468.212854]  kernfs_fop_write_iter+0x11c/0x1b0\n\t[80468.213777]  new_sync_write+0x11f/0x1b0\n\t[80468.214689]  vfs_write+0x1eb/0x280\n\t[80468.215592]  ksys_write+0x5f/0xe0\n\t[80468.216463]  do_syscall_64+0x5c/0x80\n\t[80468.224287]  entry_SYSCALL_64_after_hwframe+0x44/0xae\n\nFix that by using effective_cpus instead. For cgroup v1, effective_cpus\nis the same as cpus_allowed. For v2, effective_cpus is the real cpumask\nto be used by tasks within the cpuset anyway.\n\nAlso update task_can_attach()\u0027s 2nd argument name to cs_effective_cpus to\nreflect the change. In addition, a check is added to task_can_attach()\nto guard against the possibility that cpumask_any_and() may return a\nvalue \u003e= nr_cpu_ids.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "SUSE Linux Enterprise Micro 5.5:kernel-devel-rt-5.14.21-150500.13.100.1.noarch",
          "SUSE Linux Enterprise Micro 5.5:kernel-rt-5.14.21-150500.13.100.2.x86_64",
          "SUSE Linux Enterprise Micro 5.5:kernel-source-rt-5.14.21-150500.13.100.1.noarch"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2022-50103",
          "url": "https://www.suse.com/security/cve/CVE-2022-50103"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1244840 for CVE-2022-50103",
          "url": "https://bugzilla.suse.com/1244840"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "SUSE Linux Enterprise Micro 5.5:kernel-devel-rt-5.14.21-150500.13.100.1.noarch",
            "SUSE Linux Enterprise Micro 5.5:kernel-rt-5.14.21-150500.13.100.2.x86_64",
            "SUSE Linux Enterprise Micro 5.5:kernel-source-rt-5.14.21-150500.13.100.1.noarch"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 5.5,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
            "version": "3.1"
          },
          "products": [
            "SUSE Linux Enterprise Micro 5.5:kernel-devel-rt-5.14.21-150500.13.100.1.noarch",
            "SUSE Linux Enterprise Micro 5.5:kernel-rt-5.14.21-150500.13.100.2.x86_64",
            "SUSE Linux Enterprise Micro 5.5:kernel-source-rt-5.14.21-150500.13.100.1.noarch"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2025-07-15T14:31:35Z",
          "details": "moderate"
        }
      ],
      "title": "CVE-2022-50103"
    },
    {
      "cve": "CVE-2022-50104",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2022-50104"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "In the Linux kernel, the following vulnerability has been resolved:\n\npowerpc/xive: Fix refcount leak in xive_get_max_prio\n\nof_find_node_by_path() returns a node pointer with\nrefcount incremented, we should use of_node_put() on it when done.\nAdd missing of_node_put() to avoid refcount leak.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "SUSE Linux Enterprise Micro 5.5:kernel-devel-rt-5.14.21-150500.13.100.1.noarch",
          "SUSE Linux Enterprise Micro 5.5:kernel-rt-5.14.21-150500.13.100.2.x86_64",
          "SUSE Linux Enterprise Micro 5.5:kernel-source-rt-5.14.21-150500.13.100.1.noarch"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2022-50104",
          "url": "https://www.suse.com/security/cve/CVE-2022-50104"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1244836 for CVE-2022-50104",
          "url": "https://bugzilla.suse.com/1244836"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "SUSE Linux Enterprise Micro 5.5:kernel-devel-rt-5.14.21-150500.13.100.1.noarch",
            "SUSE Linux Enterprise Micro 5.5:kernel-rt-5.14.21-150500.13.100.2.x86_64",
            "SUSE Linux Enterprise Micro 5.5:kernel-source-rt-5.14.21-150500.13.100.1.noarch"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 5.5,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
            "version": "3.1"
          },
          "products": [
            "SUSE Linux Enterprise Micro 5.5:kernel-devel-rt-5.14.21-150500.13.100.1.noarch",
            "SUSE Linux Enterprise Micro 5.5:kernel-rt-5.14.21-150500.13.100.2.x86_64",
            "SUSE Linux Enterprise Micro 5.5:kernel-source-rt-5.14.21-150500.13.100.1.noarch"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2025-07-15T14:31:35Z",
          "details": "moderate"
        }
      ],
      "title": "CVE-2022-50104"
    },
    {
      "cve": "CVE-2022-50108",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2022-50108"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "In the Linux kernel, the following vulnerability has been resolved:\n\nmfd: max77620: Fix refcount leak in max77620_initialise_fps\n\nof_get_child_by_name() returns a node pointer with refcount\nincremented, we should use of_node_put() on it when not need anymore.\nAdd missing of_node_put() to avoid refcount leak.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "SUSE Linux Enterprise Micro 5.5:kernel-devel-rt-5.14.21-150500.13.100.1.noarch",
          "SUSE Linux Enterprise Micro 5.5:kernel-rt-5.14.21-150500.13.100.2.x86_64",
          "SUSE Linux Enterprise Micro 5.5:kernel-source-rt-5.14.21-150500.13.100.1.noarch"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2022-50108",
          "url": "https://www.suse.com/security/cve/CVE-2022-50108"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1244834 for CVE-2022-50108",
          "url": "https://bugzilla.suse.com/1244834"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "SUSE Linux Enterprise Micro 5.5:kernel-devel-rt-5.14.21-150500.13.100.1.noarch",
            "SUSE Linux Enterprise Micro 5.5:kernel-rt-5.14.21-150500.13.100.2.x86_64",
            "SUSE Linux Enterprise Micro 5.5:kernel-source-rt-5.14.21-150500.13.100.1.noarch"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 5.5,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
            "version": "3.1"
          },
          "products": [
            "SUSE Linux Enterprise Micro 5.5:kernel-devel-rt-5.14.21-150500.13.100.1.noarch",
            "SUSE Linux Enterprise Micro 5.5:kernel-rt-5.14.21-150500.13.100.2.x86_64",
            "SUSE Linux Enterprise Micro 5.5:kernel-source-rt-5.14.21-150500.13.100.1.noarch"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2025-07-15T14:31:35Z",
          "details": "moderate"
        }
      ],
      "title": "CVE-2022-50108"
    },
    {
      "cve": "CVE-2022-50109",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2022-50109"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "In the Linux kernel, the following vulnerability has been resolved:\n\nvideo: fbdev: amba-clcd: Fix refcount leak bugs\n\nIn clcdfb_of_init_display(), we should call of_node_put() for the\nreferences returned by of_graph_get_next_endpoint() and\nof_graph_get_remote_port_parent() which have increased the refcount.\n\nBesides, we should call of_node_put() both in fail path or when\nthe references are not used anymore.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "SUSE Linux Enterprise Micro 5.5:kernel-devel-rt-5.14.21-150500.13.100.1.noarch",
          "SUSE Linux Enterprise Micro 5.5:kernel-rt-5.14.21-150500.13.100.2.x86_64",
          "SUSE Linux Enterprise Micro 5.5:kernel-source-rt-5.14.21-150500.13.100.1.noarch"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2022-50109",
          "url": "https://www.suse.com/security/cve/CVE-2022-50109"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1244884 for CVE-2022-50109",
          "url": "https://bugzilla.suse.com/1244884"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "SUSE Linux Enterprise Micro 5.5:kernel-devel-rt-5.14.21-150500.13.100.1.noarch",
            "SUSE Linux Enterprise Micro 5.5:kernel-rt-5.14.21-150500.13.100.2.x86_64",
            "SUSE Linux Enterprise Micro 5.5:kernel-source-rt-5.14.21-150500.13.100.1.noarch"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 5.5,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
            "version": "3.1"
          },
          "products": [
            "SUSE Linux Enterprise Micro 5.5:kernel-devel-rt-5.14.21-150500.13.100.1.noarch",
            "SUSE Linux Enterprise Micro 5.5:kernel-rt-5.14.21-150500.13.100.2.x86_64",
            "SUSE Linux Enterprise Micro 5.5:kernel-source-rt-5.14.21-150500.13.100.1.noarch"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2025-07-15T14:31:35Z",
          "details": "moderate"
        }
      ],
      "title": "CVE-2022-50109"
    },
    {
      "cve": "CVE-2022-50110",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2022-50110"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "In the Linux kernel, the following vulnerability has been resolved:\n\nwatchdog: sp5100_tco: Fix a memory leak of EFCH MMIO resource\n\nUnlike release_mem_region(), a call to release_resource() does not\nfree the resource, so it has to be freed explicitly to avoid a memory\nleak.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "SUSE Linux Enterprise Micro 5.5:kernel-devel-rt-5.14.21-150500.13.100.1.noarch",
          "SUSE Linux Enterprise Micro 5.5:kernel-rt-5.14.21-150500.13.100.2.x86_64",
          "SUSE Linux Enterprise Micro 5.5:kernel-source-rt-5.14.21-150500.13.100.1.noarch"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2022-50110",
          "url": "https://www.suse.com/security/cve/CVE-2022-50110"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1244830 for CVE-2022-50110",
          "url": "https://bugzilla.suse.com/1244830"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "SUSE Linux Enterprise Micro 5.5:kernel-devel-rt-5.14.21-150500.13.100.1.noarch",
            "SUSE Linux Enterprise Micro 5.5:kernel-rt-5.14.21-150500.13.100.2.x86_64",
            "SUSE Linux Enterprise Micro 5.5:kernel-source-rt-5.14.21-150500.13.100.1.noarch"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 5.5,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
            "version": "3.1"
          },
          "products": [
            "SUSE Linux Enterprise Micro 5.5:kernel-devel-rt-5.14.21-150500.13.100.1.noarch",
            "SUSE Linux Enterprise Micro 5.5:kernel-rt-5.14.21-150500.13.100.2.x86_64",
            "SUSE Linux Enterprise Micro 5.5:kernel-source-rt-5.14.21-150500.13.100.1.noarch"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2025-07-15T14:31:35Z",
          "details": "moderate"
        }
      ],
      "title": "CVE-2022-50110"
    },
    {
      "cve": "CVE-2022-50111",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2022-50111"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "In the Linux kernel, the following vulnerability has been resolved:\n\nASoC: mt6359: Fix refcount leak bug\n\nIn mt6359_parse_dt() and mt6359_accdet_parse_dt(), we should call\nof_node_put() for the reference returned by of_get_child_by_name()\nwhich has increased the refcount.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "SUSE Linux Enterprise Micro 5.5:kernel-devel-rt-5.14.21-150500.13.100.1.noarch",
          "SUSE Linux Enterprise Micro 5.5:kernel-rt-5.14.21-150500.13.100.2.x86_64",
          "SUSE Linux Enterprise Micro 5.5:kernel-source-rt-5.14.21-150500.13.100.1.noarch"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2022-50111",
          "url": "https://www.suse.com/security/cve/CVE-2022-50111"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1244831 for CVE-2022-50111",
          "url": "https://bugzilla.suse.com/1244831"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "SUSE Linux Enterprise Micro 5.5:kernel-devel-rt-5.14.21-150500.13.100.1.noarch",
            "SUSE Linux Enterprise Micro 5.5:kernel-rt-5.14.21-150500.13.100.2.x86_64",
            "SUSE Linux Enterprise Micro 5.5:kernel-source-rt-5.14.21-150500.13.100.1.noarch"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 5.5,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
            "version": "3.1"
          },
          "products": [
            "SUSE Linux Enterprise Micro 5.5:kernel-devel-rt-5.14.21-150500.13.100.1.noarch",
            "SUSE Linux Enterprise Micro 5.5:kernel-rt-5.14.21-150500.13.100.2.x86_64",
            "SUSE Linux Enterprise Micro 5.5:kernel-source-rt-5.14.21-150500.13.100.1.noarch"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2025-07-15T14:31:35Z",
          "details": "moderate"
        }
      ],
      "title": "CVE-2022-50111"
    },
    {
      "cve": "CVE-2022-50112",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2022-50112"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "In the Linux kernel, the following vulnerability has been resolved:\n\nrpmsg: qcom_smd: Fix refcount leak in qcom_smd_parse_edge\n\nof_parse_phandle() returns a node pointer with refcount\nincremented, we should use of_node_put() on it when done.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "SUSE Linux Enterprise Micro 5.5:kernel-devel-rt-5.14.21-150500.13.100.1.noarch",
          "SUSE Linux Enterprise Micro 5.5:kernel-rt-5.14.21-150500.13.100.2.x86_64",
          "SUSE Linux Enterprise Micro 5.5:kernel-source-rt-5.14.21-150500.13.100.1.noarch"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2022-50112",
          "url": "https://www.suse.com/security/cve/CVE-2022-50112"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1244832 for CVE-2022-50112",
          "url": "https://bugzilla.suse.com/1244832"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "SUSE Linux Enterprise Micro 5.5:kernel-devel-rt-5.14.21-150500.13.100.1.noarch",
            "SUSE Linux Enterprise Micro 5.5:kernel-rt-5.14.21-150500.13.100.2.x86_64",
            "SUSE Linux Enterprise Micro 5.5:kernel-source-rt-5.14.21-150500.13.100.1.noarch"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 5.5,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
            "version": "3.1"
          },
          "products": [
            "SUSE Linux Enterprise Micro 5.5:kernel-devel-rt-5.14.21-150500.13.100.1.noarch",
            "SUSE Linux Enterprise Micro 5.5:kernel-rt-5.14.21-150500.13.100.2.x86_64",
            "SUSE Linux Enterprise Micro 5.5:kernel-source-rt-5.14.21-150500.13.100.1.noarch"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2025-07-15T14:31:35Z",
          "details": "moderate"
        }
      ],
      "title": "CVE-2022-50112"
    },
    {
      "cve": "CVE-2022-50115",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2022-50115"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "In the Linux kernel, the following vulnerability has been resolved:\n\nASoC: SOF: ipc3-topology: Prevent double freeing of ipc_control_data via load_bytes\n\nWe have sanity checks for byte controls and if any of the fail the locally\nallocated scontrol-\u003eipc_control_data is freed up, but not set to NULL.\n\nOn a rollback path of the error the higher level code will also try to free\nthe scontrol-\u003eipc_control_data which will eventually going to lead to\nmemory corruption as double freeing memory is not a good thing.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "SUSE Linux Enterprise Micro 5.5:kernel-devel-rt-5.14.21-150500.13.100.1.noarch",
          "SUSE Linux Enterprise Micro 5.5:kernel-rt-5.14.21-150500.13.100.2.x86_64",
          "SUSE Linux Enterprise Micro 5.5:kernel-source-rt-5.14.21-150500.13.100.1.noarch"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2022-50115",
          "url": "https://www.suse.com/security/cve/CVE-2022-50115"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1244827 for CVE-2022-50115",
          "url": "https://bugzilla.suse.com/1244827"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "SUSE Linux Enterprise Micro 5.5:kernel-devel-rt-5.14.21-150500.13.100.1.noarch",
            "SUSE Linux Enterprise Micro 5.5:kernel-rt-5.14.21-150500.13.100.2.x86_64",
            "SUSE Linux Enterprise Micro 5.5:kernel-source-rt-5.14.21-150500.13.100.1.noarch"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 5.5,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
            "version": "3.1"
          },
          "products": [
            "SUSE Linux Enterprise Micro 5.5:kernel-devel-rt-5.14.21-150500.13.100.1.noarch",
            "SUSE Linux Enterprise Micro 5.5:kernel-rt-5.14.21-150500.13.100.2.x86_64",
            "SUSE Linux Enterprise Micro 5.5:kernel-source-rt-5.14.21-150500.13.100.1.noarch"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2025-07-15T14:31:35Z",
          "details": "moderate"
        }
      ],
      "title": "CVE-2022-50115"
    },
    {
      "cve": "CVE-2022-50116",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2022-50116"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "In the Linux kernel, the following vulnerability has been resolved:\n\ntty: n_gsm: fix deadlock and link starvation in outgoing data path\n\nThe current implementation queues up new control and user packets as needed\nand processes this queue down to the ldisc in the same code path.\nThat means that the upper and the lower layer are hard coupled in the code.\nDue to this deadlocks can happen as seen below while transmitting data,\nespecially during ldisc congestion. Furthermore, the data channels starve\nthe control channel on high transmission load on the ldisc.\n\nIntroduce an additional control channel data queue to prevent timeouts and\nlink hangups during ldisc congestion. This is being processed before the\nuser channel data queue in gsm_data_kick(), i.e. with the highest priority.\nPut the queue to ldisc data path into a workqueue and trigger it whenever\nnew data has been put into the transmission queue. Change\ngsm_dlci_data_sweep() accordingly to fill up the transmission queue until\nTX_THRESH_HI. This solves the locking issue, keeps latency low and provides\ngood performance on high data load.\nNote that now all packets from a DLCI are removed from the internal queue\nif the associated DLCI was closed. This ensures that no data is sent by the\nintroduced write task to an already closed DLCI.\n\nBUG: spinlock recursion on CPU#0, test_v24_loop/124\n lock: serial8250_ports+0x3a8/0x7500, .magic: dead4ead, .owner: test_v24_loop/124, .owner_cpu: 0\nCPU: 0 PID: 124 Comm: test_v24_loop Tainted: G           O      5.18.0-rc2 #3\nHardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.15.0-1 04/01/2014\nCall Trace:\n \u003cIRQ\u003e\n dump_stack_lvl+0x34/0x44\n do_raw_spin_lock+0x76/0xa0\n _raw_spin_lock_irqsave+0x72/0x80\n uart_write_room+0x3b/0xc0\n gsm_data_kick+0x14b/0x240 [n_gsm]\n gsmld_write_wakeup+0x35/0x70 [n_gsm]\n tty_wakeup+0x53/0x60\n tty_port_default_wakeup+0x1b/0x30\n serial8250_tx_chars+0x12f/0x220\n serial8250_handle_irq.part.0+0xfe/0x150\n serial8250_default_handle_irq+0x48/0x80\n serial8250_interrupt+0x56/0xa0\n __handle_irq_event_percpu+0x78/0x1f0\n handle_irq_event+0x34/0x70\n handle_fasteoi_irq+0x90/0x1e0\n __common_interrupt+0x69/0x100\n common_interrupt+0x48/0xc0\n asm_common_interrupt+0x1e/0x40\nRIP: 0010:__do_softirq+0x83/0x34e\nCode: 2a 0a ff 0f b7 ed c7 44 24 10 0a 00 00 00 48 c7 c7 51 2a 64 82 e8 2d\ne2 d5 ff 65 66 c7 05 83 af 1e 7e 00 00 fb b8 ff ff ff ff \u003c49\u003e c7 c2 40 61\n80 82 0f bc c5 41 89 c4 41 83 c4 01 0f 84 e6 00 00\nRSP: 0018:ffffc90000003f98 EFLAGS: 00000286\nRAX: 00000000ffffffff RBX: 0000000000000000 RCX: 0000000000000000\nRDX: 0000000000000000 RSI: ffffffff82642a51 RDI: ffffffff825bb5e7\nRBP: 0000000000000200 R08: 00000008de3271a8 R09: 0000000000000000\nR10: 0000000000000001 R11: 0000000000000000 R12: 0000000000000000\nR13: 0000000000000030 R14: 0000000000000000 R15: 0000000000000000\n ? __do_softirq+0x73/0x34e\n irq_exit_rcu+0xb5/0x100\n common_interrupt+0xa4/0xc0\n \u003c/IRQ\u003e\n \u003cTASK\u003e\n asm_common_interrupt+0x1e/0x40\nRIP: 0010:_raw_spin_unlock_irqrestore+0x2e/0x50\nCode: 00 55 48 89 fd 48 83 c7 18 53 48 89 f3 48 8b 74 24 10 e8 85 28 36 ff\n48 89 ef e8 cd 58 36 ff 80 e7 02 74 01 fb bf 01 00 00 00 \u003ce8\u003e 3d 97 33 ff\n65 8b 05 96 23 2b 7e 85 c0 74 03 5b 5d c3 0f 1f 44\nRSP: 0018:ffffc9000020fd08 EFLAGS: 00000202\nRAX: 0000000000000000 RBX: 0000000000000246 RCX: 0000000000000000\nRDX: 0000000000000004 RSI: ffffffff8257fd74 RDI: 0000000000000001\nRBP: ffff8880057de3a0 R08: 00000008de233000 R09: 0000000000000000\nR10: 0000000000000001 R11: 0000000000000000 R12: 0000000000000000\nR13: 0000000000000100 R14: 0000000000000202 R15: ffff8880057df0b8\n ? _raw_spin_unlock_irqrestore+0x23/0x50\n gsmtty_write+0x65/0x80 [n_gsm]\n n_tty_write+0x33f/0x530\n ? swake_up_all+0xe0/0xe0\n file_tty_write.constprop.0+0x1b1/0x320\n ? n_tty_flush_buffer+0xb0/0xb0\n new_sync_write+0x10c/0x190\n vfs_write+0x282/0x310\n ksys_write+0x68/0xe0\n do_syscall_64+0x3b/0x90\n entry_SYSCALL_64_after_hwframe+0x44/0xae\nRIP: 0033:0x7f3e5e35c15c\nCode: 8b 7c 24 08 89 c5 e8 c5 ff ff ff 89 ef 89 44 24\n---truncated---",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "SUSE Linux Enterprise Micro 5.5:kernel-devel-rt-5.14.21-150500.13.100.1.noarch",
          "SUSE Linux Enterprise Micro 5.5:kernel-rt-5.14.21-150500.13.100.2.x86_64",
          "SUSE Linux Enterprise Micro 5.5:kernel-source-rt-5.14.21-150500.13.100.1.noarch"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2022-50116",
          "url": "https://www.suse.com/security/cve/CVE-2022-50116"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1244824 for CVE-2022-50116",
          "url": "https://bugzilla.suse.com/1244824"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "SUSE Linux Enterprise Micro 5.5:kernel-devel-rt-5.14.21-150500.13.100.1.noarch",
            "SUSE Linux Enterprise Micro 5.5:kernel-rt-5.14.21-150500.13.100.2.x86_64",
            "SUSE Linux Enterprise Micro 5.5:kernel-source-rt-5.14.21-150500.13.100.1.noarch"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 5.5,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
            "version": "3.1"
          },
          "products": [
            "SUSE Linux Enterprise Micro 5.5:kernel-devel-rt-5.14.21-150500.13.100.1.noarch",
            "SUSE Linux Enterprise Micro 5.5:kernel-rt-5.14.21-150500.13.100.2.x86_64",
            "SUSE Linux Enterprise Micro 5.5:kernel-source-rt-5.14.21-150500.13.100.1.noarch"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2025-07-15T14:31:35Z",
          "details": "moderate"
        }
      ],
      "title": "CVE-2022-50116"
    },
    {
      "cve": "CVE-2022-50117",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2022-50117"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "In the Linux kernel, the following vulnerability has been resolved:\n\nvfio: Split migration ops from main device ops\n\nvfio core checks whether the driver sets some migration op (e.g.\nset_state/get_state) and accordingly calls its op.\n\nHowever, currently mlx5 driver sets the above ops without regards to its\nmigration caps.\n\nThis might lead to unexpected usage/Oops if user space may call to the\nabove ops even if the driver doesn\u0027t support migration. As for example,\nthe migration state_mutex is not initialized in that case.\n\nThe cleanest way to manage that seems to split the migration ops from\nthe main device ops, this will let the driver setting them separately\nfrom the main ops when it\u0027s applicable.\n\nAs part of that, validate ops construction on registration and include a\ncheck for VFIO_MIGRATION_STOP_COPY since the uAPI claims it must be set\nin migration_flags.\n\nHISI driver was changed as well to match this scheme.\n\nThis scheme may enable down the road to come with some extra group of\nops (e.g. DMA log) that can be set without regards to the other options\nbased on driver caps.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "SUSE Linux Enterprise Micro 5.5:kernel-devel-rt-5.14.21-150500.13.100.1.noarch",
          "SUSE Linux Enterprise Micro 5.5:kernel-rt-5.14.21-150500.13.100.2.x86_64",
          "SUSE Linux Enterprise Micro 5.5:kernel-source-rt-5.14.21-150500.13.100.1.noarch"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2022-50117",
          "url": "https://www.suse.com/security/cve/CVE-2022-50117"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1244826 for CVE-2022-50117",
          "url": "https://bugzilla.suse.com/1244826"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "SUSE Linux Enterprise Micro 5.5:kernel-devel-rt-5.14.21-150500.13.100.1.noarch",
            "SUSE Linux Enterprise Micro 5.5:kernel-rt-5.14.21-150500.13.100.2.x86_64",
            "SUSE Linux Enterprise Micro 5.5:kernel-source-rt-5.14.21-150500.13.100.1.noarch"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 5.5,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
            "version": "3.1"
          },
          "products": [
            "SUSE Linux Enterprise Micro 5.5:kernel-devel-rt-5.14.21-150500.13.100.1.noarch",
            "SUSE Linux Enterprise Micro 5.5:kernel-rt-5.14.21-150500.13.100.2.x86_64",
            "SUSE Linux Enterprise Micro 5.5:kernel-source-rt-5.14.21-150500.13.100.1.noarch"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2025-07-15T14:31:35Z",
          "details": "moderate"
        }
      ],
      "title": "CVE-2022-50117"
    },
    {
      "cve": "CVE-2022-50118",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2022-50118"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "In the Linux kernel, the following vulnerability has been resolved:\n\npowerpc/perf: Optimize clearing the pending PMI and remove WARN_ON for PMI check in power_pmu_disable\n\ncommit 2c9ac51b850d (\"powerpc/perf: Fix PMU callbacks to clear\npending PMI before resetting an overflown PMC\") added a new\nfunction \"pmi_irq_pending\" in hw_irq.h. This function is to check\nif there is a PMI marked as pending in Paca (PACA_IRQ_PMI).This is\nused in power_pmu_disable in a WARN_ON. The intention here is to\nprovide a warning if there is PMI pending, but no counter is found\noverflown.\n\nDuring some of the perf runs, below warning is hit:\n\nWARNING: CPU: 36 PID: 0 at arch/powerpc/perf/core-book3s.c:1332 power_pmu_disable+0x25c/0x2c0\n Modules linked in:\n -----\n\n NIP [c000000000141c3c] power_pmu_disable+0x25c/0x2c0\n LR [c000000000141c8c] power_pmu_disable+0x2ac/0x2c0\n Call Trace:\n [c000000baffcfb90] [c000000000141c8c] power_pmu_disable+0x2ac/0x2c0 (unreliable)\n [c000000baffcfc10] [c0000000003e2f8c] perf_pmu_disable+0x4c/0x60\n [c000000baffcfc30] [c0000000003e3344] group_sched_out.part.124+0x44/0x100\n [c000000baffcfc80] [c0000000003e353c] __perf_event_disable+0x13c/0x240\n [c000000baffcfcd0] [c0000000003dd334] event_function+0xc4/0x140\n [c000000baffcfd20] [c0000000003d855c] remote_function+0x7c/0xa0\n [c000000baffcfd50] [c00000000026c394] flush_smp_call_function_queue+0xd4/0x300\n [c000000baffcfde0] [c000000000065b24] smp_ipi_demux_relaxed+0xa4/0x100\n [c000000baffcfe20] [c0000000000cb2b0] xive_muxed_ipi_action+0x20/0x40\n [c000000baffcfe40] [c000000000207c3c] __handle_irq_event_percpu+0x8c/0x250\n [c000000baffcfee0] [c000000000207e2c] handle_irq_event_percpu+0x2c/0xa0\n [c000000baffcff10] [c000000000210a04] handle_percpu_irq+0x84/0xc0\n [c000000baffcff40] [c000000000205f14] generic_handle_irq+0x54/0x80\n [c000000baffcff60] [c000000000015740] __do_irq+0x90/0x1d0\n [c000000baffcff90] [c000000000016990] __do_IRQ+0xc0/0x140\n [c0000009732f3940] [c000000bafceaca8] 0xc000000bafceaca8\n [c0000009732f39d0] [c000000000016b78] do_IRQ+0x168/0x1c0\n [c0000009732f3a00] [c0000000000090c8] hardware_interrupt_common_virt+0x218/0x220\n\nThis means that there is no PMC overflown among the active events\nin the PMU, but there is a PMU pending in Paca. The function\n\"any_pmc_overflown\" checks the PMCs on active events in\ncpuhw-\u003en_events. Code snippet:\n\n\u003c\u003c\u003e\u003e\nif (any_pmc_overflown(cpuhw))\n \tclear_pmi_irq_pending();\n else\n \tWARN_ON(pmi_irq_pending());\n\u003c\u003c\u003e\u003e\n\nHere the PMC overflown is not from active event. Example: When we do\nperf record, default cycles and instructions will be running on PMC6\nand PMC5 respectively. It could happen that overflowed event is currently\nnot active and pending PMI is for the inactive event. Debug logs from\ntrace_printk:\n\n\u003c\u003c\u003e\u003e\nany_pmc_overflown: idx is 5: pmc value is 0xd9a\npower_pmu_disable: PMC1: 0x0, PMC2: 0x0, PMC3: 0x0, PMC4: 0x0, PMC5: 0xd9a, PMC6: 0x80002011\n\u003c\u003c\u003e\u003e\n\nHere active PMC (from idx) is PMC5 , but overflown PMC is PMC6(0x80002011).\nWhen we handle PMI interrupt for such cases, if the PMC overflown is\nfrom inactive event, it will be ignored. Reference commit:\ncommit bc09c219b2e6 (\"powerpc/perf: Fix finding overflowed PMC in interrupt\")\n\nPatch addresses two changes:\n1) Fix 1 : Removal of warning ( WARN_ON(pmi_irq_pending()); )\n   We were printing warning if no PMC is found overflown among active PMU\n   events, but PMI pending in PACA. But this could happen in cases where\n   PMC overflown is not in active PMC. An inactive event could have caused\n   the overflow. Hence the warning is not needed. To know pending PMI is\n   from an inactive event, we need to loop through all PMC\u0027s which will\n   cause more SPR reads via mfspr and increase in context switch. Also in\n   existing function: perf_event_interrupt, already we ignore PMI\u0027s\n   overflown when it is from an inactive PMC.\n\n2) Fix 2: optimization in clearing pending PMI.\n   Currently we check for any active PMC overflown before clearing PMI\n   pending in Paca. This is causing additional SP\n---truncated---",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "SUSE Linux Enterprise Micro 5.5:kernel-devel-rt-5.14.21-150500.13.100.1.noarch",
          "SUSE Linux Enterprise Micro 5.5:kernel-rt-5.14.21-150500.13.100.2.x86_64",
          "SUSE Linux Enterprise Micro 5.5:kernel-source-rt-5.14.21-150500.13.100.1.noarch"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2022-50118",
          "url": "https://www.suse.com/security/cve/CVE-2022-50118"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1244825 for CVE-2022-50118",
          "url": "https://bugzilla.suse.com/1244825"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "SUSE Linux Enterprise Micro 5.5:kernel-devel-rt-5.14.21-150500.13.100.1.noarch",
            "SUSE Linux Enterprise Micro 5.5:kernel-rt-5.14.21-150500.13.100.2.x86_64",
            "SUSE Linux Enterprise Micro 5.5:kernel-source-rt-5.14.21-150500.13.100.1.noarch"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 5.5,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
            "version": "3.1"
          },
          "products": [
            "SUSE Linux Enterprise Micro 5.5:kernel-devel-rt-5.14.21-150500.13.100.1.noarch",
            "SUSE Linux Enterprise Micro 5.5:kernel-rt-5.14.21-150500.13.100.2.x86_64",
            "SUSE Linux Enterprise Micro 5.5:kernel-source-rt-5.14.21-150500.13.100.1.noarch"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2025-07-15T14:31:35Z",
          "details": "moderate"
        }
      ],
      "title": "CVE-2022-50118"
    },
    {
      "cve": "CVE-2022-50120",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2022-50120"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "In the Linux kernel, the following vulnerability has been resolved:\n\nremoteproc: imx_rproc: Fix refcount leak in imx_rproc_addr_init\n\nof_parse_phandle() returns a node pointer with refcount\nincremented, we should use of_node_put() on it when not needed anymore.\nThis function has two paths missing of_node_put().",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "SUSE Linux Enterprise Micro 5.5:kernel-devel-rt-5.14.21-150500.13.100.1.noarch",
          "SUSE Linux Enterprise Micro 5.5:kernel-rt-5.14.21-150500.13.100.2.x86_64",
          "SUSE Linux Enterprise Micro 5.5:kernel-source-rt-5.14.21-150500.13.100.1.noarch"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2022-50120",
          "url": "https://www.suse.com/security/cve/CVE-2022-50120"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1244819 for CVE-2022-50120",
          "url": "https://bugzilla.suse.com/1244819"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "SUSE Linux Enterprise Micro 5.5:kernel-devel-rt-5.14.21-150500.13.100.1.noarch",
            "SUSE Linux Enterprise Micro 5.5:kernel-rt-5.14.21-150500.13.100.2.x86_64",
            "SUSE Linux Enterprise Micro 5.5:kernel-source-rt-5.14.21-150500.13.100.1.noarch"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 5.5,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
            "version": "3.1"
          },
          "products": [
            "SUSE Linux Enterprise Micro 5.5:kernel-devel-rt-5.14.21-150500.13.100.1.noarch",
            "SUSE Linux Enterprise Micro 5.5:kernel-rt-5.14.21-150500.13.100.2.x86_64",
            "SUSE Linux Enterprise Micro 5.5:kernel-source-rt-5.14.21-150500.13.100.1.noarch"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2025-07-15T14:31:35Z",
          "details": "moderate"
        }
      ],
      "title": "CVE-2022-50120"
    },
    {
      "cve": "CVE-2022-50121",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2022-50121"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "In the Linux kernel, the following vulnerability has been resolved:\n\nremoteproc: k3-r5: Fix refcount leak in k3_r5_cluster_of_init\n\nEvery iteration of for_each_available_child_of_node() decrements\nthe reference count of the previous node.\nWhen breaking early from a for_each_available_child_of_node() loop,\nwe need to explicitly call of_node_put() on the child node.\nAdd missing of_node_put() to avoid refcount leak.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "SUSE Linux Enterprise Micro 5.5:kernel-devel-rt-5.14.21-150500.13.100.1.noarch",
          "SUSE Linux Enterprise Micro 5.5:kernel-rt-5.14.21-150500.13.100.2.x86_64",
          "SUSE Linux Enterprise Micro 5.5:kernel-source-rt-5.14.21-150500.13.100.1.noarch"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2022-50121",
          "url": "https://www.suse.com/security/cve/CVE-2022-50121"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1244823 for CVE-2022-50121",
          "url": "https://bugzilla.suse.com/1244823"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "SUSE Linux Enterprise Micro 5.5:kernel-devel-rt-5.14.21-150500.13.100.1.noarch",
            "SUSE Linux Enterprise Micro 5.5:kernel-rt-5.14.21-150500.13.100.2.x86_64",
            "SUSE Linux Enterprise Micro 5.5:kernel-source-rt-5.14.21-150500.13.100.1.noarch"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 5.5,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
            "version": "3.1"
          },
          "products": [
            "SUSE Linux Enterprise Micro 5.5:kernel-devel-rt-5.14.21-150500.13.100.1.noarch",
            "SUSE Linux Enterprise Micro 5.5:kernel-rt-5.14.21-150500.13.100.2.x86_64",
            "SUSE Linux Enterprise Micro 5.5:kernel-source-rt-5.14.21-150500.13.100.1.noarch"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2025-07-15T14:31:35Z",
          "details": "moderate"
        }
      ],
      "title": "CVE-2022-50121"
    },
    {
      "cve": "CVE-2022-50124",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2022-50124"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "In the Linux kernel, the following vulnerability has been resolved:\n\nASoC: mt6797-mt6351: Fix refcount leak in mt6797_mt6351_dev_probe\n\nof_parse_phandle() returns a node pointer with refcount\nincremented, we should use of_node_put() on it when not need anymore.\nAdd missing of_node_put() to avoid refcount leak.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "SUSE Linux Enterprise Micro 5.5:kernel-devel-rt-5.14.21-150500.13.100.1.noarch",
          "SUSE Linux Enterprise Micro 5.5:kernel-rt-5.14.21-150500.13.100.2.x86_64",
          "SUSE Linux Enterprise Micro 5.5:kernel-source-rt-5.14.21-150500.13.100.1.noarch"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2022-50124",
          "url": "https://www.suse.com/security/cve/CVE-2022-50124"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1244816 for CVE-2022-50124",
          "url": "https://bugzilla.suse.com/1244816"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "SUSE Linux Enterprise Micro 5.5:kernel-devel-rt-5.14.21-150500.13.100.1.noarch",
            "SUSE Linux Enterprise Micro 5.5:kernel-rt-5.14.21-150500.13.100.2.x86_64",
            "SUSE Linux Enterprise Micro 5.5:kernel-source-rt-5.14.21-150500.13.100.1.noarch"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 5.5,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
            "version": "3.1"
          },
          "products": [
            "SUSE Linux Enterprise Micro 5.5:kernel-devel-rt-5.14.21-150500.13.100.1.noarch",
            "SUSE Linux Enterprise Micro 5.5:kernel-rt-5.14.21-150500.13.100.2.x86_64",
            "SUSE Linux Enterprise Micro 5.5:kernel-source-rt-5.14.21-150500.13.100.1.noarch"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2025-07-15T14:31:35Z",
          "details": "moderate"
        }
      ],
      "title": "CVE-2022-50124"
    },
    {
      "cve": "CVE-2022-50125",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2022-50125"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "In the Linux kernel, the following vulnerability has been resolved:\n\nASoC: cros_ec_codec: Fix refcount leak in cros_ec_codec_platform_probe\n\nof_parse_phandle() returns a node pointer with refcount\nincremented, we should use of_node_put() on it when not need anymore.\nAdd missing of_node_put() to avoid refcount leak.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "SUSE Linux Enterprise Micro 5.5:kernel-devel-rt-5.14.21-150500.13.100.1.noarch",
          "SUSE Linux Enterprise Micro 5.5:kernel-rt-5.14.21-150500.13.100.2.x86_64",
          "SUSE Linux Enterprise Micro 5.5:kernel-source-rt-5.14.21-150500.13.100.1.noarch"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2022-50125",
          "url": "https://www.suse.com/security/cve/CVE-2022-50125"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1244814 for CVE-2022-50125",
          "url": "https://bugzilla.suse.com/1244814"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "SUSE Linux Enterprise Micro 5.5:kernel-devel-rt-5.14.21-150500.13.100.1.noarch",
            "SUSE Linux Enterprise Micro 5.5:kernel-rt-5.14.21-150500.13.100.2.x86_64",
            "SUSE Linux Enterprise Micro 5.5:kernel-source-rt-5.14.21-150500.13.100.1.noarch"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 5.5,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
            "version": "3.1"
          },
          "products": [
            "SUSE Linux Enterprise Micro 5.5:kernel-devel-rt-5.14.21-150500.13.100.1.noarch",
            "SUSE Linux Enterprise Micro 5.5:kernel-rt-5.14.21-150500.13.100.2.x86_64",
            "SUSE Linux Enterprise Micro 5.5:kernel-source-rt-5.14.21-150500.13.100.1.noarch"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2025-07-15T14:31:35Z",
          "details": "moderate"
        }
      ],
      "title": "CVE-2022-50125"
    },
    {
      "cve": "CVE-2022-50126",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2022-50126"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "In the Linux kernel, the following vulnerability has been resolved:\n\njbd2: fix assertion \u0027jh-\u003eb_frozen_data == NULL\u0027 failure when journal aborted\n\nFollowing process will fail assertion \u0027jh-\u003eb_frozen_data == NULL\u0027 in\njbd2_journal_dirty_metadata():\n\n                   jbd2_journal_commit_transaction\nunlink(dir/a)\n jh-\u003eb_transaction = trans1\n jh-\u003eb_jlist = BJ_Metadata\n                    journal-\u003ej_running_transaction = NULL\n                    trans1-\u003et_state = T_COMMIT\nunlink(dir/b)\n handle-\u003eh_trans = trans2\n do_get_write_access\n  jh-\u003eb_modified = 0\n  jh-\u003eb_frozen_data = frozen_buffer\n  jh-\u003eb_next_transaction = trans2\n jbd2_journal_dirty_metadata\n  is_handle_aborted\n   is_journal_aborted // return false\n\n           --\u003e jbd2 abort \u003c--\n\n                     while (commit_transaction-\u003et_buffers)\n                      if (is_journal_aborted)\n                       jbd2_journal_refile_buffer\n                        __jbd2_journal_refile_buffer\n                         WRITE_ONCE(jh-\u003eb_transaction,\n\t\t\t\t\t\tjh-\u003eb_next_transaction)\n                         WRITE_ONCE(jh-\u003eb_next_transaction, NULL)\n                         __jbd2_journal_file_buffer(jh, BJ_Reserved)\n        J_ASSERT_JH(jh, jh-\u003eb_frozen_data == NULL) // assertion failure !\n\nThe reproducer (See detail in [Link]) reports:\n ------------[ cut here ]------------\n kernel BUG at fs/jbd2/transaction.c:1629!\n invalid opcode: 0000 [#1] PREEMPT SMP\n CPU: 2 PID: 584 Comm: unlink Tainted: G        W\n 5.19.0-rc6-00115-g4a57a8400075-dirty #697\n RIP: 0010:jbd2_journal_dirty_metadata+0x3c5/0x470\n RSP: 0018:ffffc90000be7ce0 EFLAGS: 00010202\n Call Trace:\n  \u003cTASK\u003e\n  __ext4_handle_dirty_metadata+0xa0/0x290\n  ext4_handle_dirty_dirblock+0x10c/0x1d0\n  ext4_delete_entry+0x104/0x200\n  __ext4_unlink+0x22b/0x360\n  ext4_unlink+0x275/0x390\n  vfs_unlink+0x20b/0x4c0\n  do_unlinkat+0x42f/0x4c0\n  __x64_sys_unlink+0x37/0x50\n  do_syscall_64+0x35/0x80\n\nAfter journal aborting, __jbd2_journal_refile_buffer() is executed with\nholding @jh-\u003eb_state_lock, we can fix it by moving \u0027is_handle_aborted()\u0027\ninto the area protected by @jh-\u003eb_state_lock.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "SUSE Linux Enterprise Micro 5.5:kernel-devel-rt-5.14.21-150500.13.100.1.noarch",
          "SUSE Linux Enterprise Micro 5.5:kernel-rt-5.14.21-150500.13.100.2.x86_64",
          "SUSE Linux Enterprise Micro 5.5:kernel-source-rt-5.14.21-150500.13.100.1.noarch"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2022-50126",
          "url": "https://www.suse.com/security/cve/CVE-2022-50126"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1244813 for CVE-2022-50126",
          "url": "https://bugzilla.suse.com/1244813"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "SUSE Linux Enterprise Micro 5.5:kernel-devel-rt-5.14.21-150500.13.100.1.noarch",
            "SUSE Linux Enterprise Micro 5.5:kernel-rt-5.14.21-150500.13.100.2.x86_64",
            "SUSE Linux Enterprise Micro 5.5:kernel-source-rt-5.14.21-150500.13.100.1.noarch"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 5.5,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
            "version": "3.1"
          },
          "products": [
            "SUSE Linux Enterprise Micro 5.5:kernel-devel-rt-5.14.21-150500.13.100.1.noarch",
            "SUSE Linux Enterprise Micro 5.5:kernel-rt-5.14.21-150500.13.100.2.x86_64",
            "SUSE Linux Enterprise Micro 5.5:kernel-source-rt-5.14.21-150500.13.100.1.noarch"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2025-07-15T14:31:35Z",
          "details": "moderate"
        }
      ],
      "title": "CVE-2022-50126"
    },
    {
      "cve": "CVE-2022-50127",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2022-50127"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "In the Linux kernel, the following vulnerability has been resolved:\n\nRDMA/rxe: Fix error unwind in rxe_create_qp()\n\nIn the function rxe_create_qp(), rxe_qp_from_init() is called to\ninitialize qp, internally things like the spin locks are not setup until\nrxe_qp_init_req().\n\nIf an error occures before this point then the unwind will call\nrxe_cleanup() and eventually to rxe_qp_do_cleanup()/rxe_cleanup_task()\nwhich will oops when trying to access the uninitialized spinlock.\n\nMove the spinlock initializations earlier before any failures.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "SUSE Linux Enterprise Micro 5.5:kernel-devel-rt-5.14.21-150500.13.100.1.noarch",
          "SUSE Linux Enterprise Micro 5.5:kernel-rt-5.14.21-150500.13.100.2.x86_64",
          "SUSE Linux Enterprise Micro 5.5:kernel-source-rt-5.14.21-150500.13.100.1.noarch"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2022-50127",
          "url": "https://www.suse.com/security/cve/CVE-2022-50127"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1244815 for CVE-2022-50127",
          "url": "https://bugzilla.suse.com/1244815"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "SUSE Linux Enterprise Micro 5.5:kernel-devel-rt-5.14.21-150500.13.100.1.noarch",
            "SUSE Linux Enterprise Micro 5.5:kernel-rt-5.14.21-150500.13.100.2.x86_64",
            "SUSE Linux Enterprise Micro 5.5:kernel-source-rt-5.14.21-150500.13.100.1.noarch"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 5.5,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
            "version": "3.1"
          },
          "products": [
            "SUSE Linux Enterprise Micro 5.5:kernel-devel-rt-5.14.21-150500.13.100.1.noarch",
            "SUSE Linux Enterprise Micro 5.5:kernel-rt-5.14.21-150500.13.100.2.x86_64",
            "SUSE Linux Enterprise Micro 5.5:kernel-source-rt-5.14.21-150500.13.100.1.noarch"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2025-07-15T14:31:35Z",
          "details": "moderate"
        }
      ],
      "title": "CVE-2022-50127"
    },
    {
      "cve": "CVE-2022-50129",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2022-50129"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "In the Linux kernel, the following vulnerability has been resolved:\n\nRDMA/srpt: Fix a use-after-free\n\nChange the LIO port members inside struct srpt_port from regular members\ninto pointers. Allocate the LIO port data structures from inside\nsrpt_make_tport() and free these from inside srpt_make_tport(). Keep\nstruct srpt_device as long as either an RDMA port or a LIO target port is\nassociated with it. This patch decouples the lifetime of struct srpt_port\n(controlled by the RDMA core) and struct srpt_port_id (controlled by LIO).\nThis patch fixes the following KASAN complaint:\n\n  BUG: KASAN: use-after-free in srpt_enable_tpg+0x31/0x70 [ib_srpt]\n  Read of size 8 at addr ffff888141cc34b8 by task check/5093\n\n  Call Trace:\n   \u003cTASK\u003e\n   show_stack+0x4e/0x53\n   dump_stack_lvl+0x51/0x66\n   print_address_description.constprop.0.cold+0xea/0x41e\n   print_report.cold+0x90/0x205\n   kasan_report+0xb9/0xf0\n   __asan_load8+0x69/0x90\n   srpt_enable_tpg+0x31/0x70 [ib_srpt]\n   target_fabric_tpg_base_enable_store+0xe2/0x140 [target_core_mod]\n   configfs_write_iter+0x18b/0x210\n   new_sync_write+0x1f2/0x2f0\n   vfs_write+0x3e3/0x540\n   ksys_write+0xbb/0x140\n   __x64_sys_write+0x42/0x50\n   do_syscall_64+0x34/0x80\n   entry_SYSCALL_64_after_hwframe+0x46/0xb0\n   \u003c/TASK\u003e",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "SUSE Linux Enterprise Micro 5.5:kernel-devel-rt-5.14.21-150500.13.100.1.noarch",
          "SUSE Linux Enterprise Micro 5.5:kernel-rt-5.14.21-150500.13.100.2.x86_64",
          "SUSE Linux Enterprise Micro 5.5:kernel-source-rt-5.14.21-150500.13.100.1.noarch"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2022-50129",
          "url": "https://www.suse.com/security/cve/CVE-2022-50129"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1244811 for CVE-2022-50129",
          "url": "https://bugzilla.suse.com/1244811"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "SUSE Linux Enterprise Micro 5.5:kernel-devel-rt-5.14.21-150500.13.100.1.noarch",
            "SUSE Linux Enterprise Micro 5.5:kernel-rt-5.14.21-150500.13.100.2.x86_64",
            "SUSE Linux Enterprise Micro 5.5:kernel-source-rt-5.14.21-150500.13.100.1.noarch"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 5.5,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
            "version": "3.1"
          },
          "products": [
            "SUSE Linux Enterprise Micro 5.5:kernel-devel-rt-5.14.21-150500.13.100.1.noarch",
            "SUSE Linux Enterprise Micro 5.5:kernel-rt-5.14.21-150500.13.100.2.x86_64",
            "SUSE Linux Enterprise Micro 5.5:kernel-source-rt-5.14.21-150500.13.100.1.noarch"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2025-07-15T14:31:35Z",
          "details": "moderate"
        }
      ],
      "title": "CVE-2022-50129"
    },
    {
      "cve": "CVE-2022-50131",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2022-50131"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "In the Linux kernel, the following vulnerability has been resolved:\n\nHID: mcp2221: prevent a buffer overflow in mcp_smbus_write()\n\nSmatch Warning:\ndrivers/hid/hid-mcp2221.c:388 mcp_smbus_write() error: __memcpy()\n\u0027\u0026mcp-\u003etxbuf[5]\u0027 too small (59 vs 255)\ndrivers/hid/hid-mcp2221.c:388 mcp_smbus_write() error: __memcpy() \u0027buf\u0027\ntoo small (34 vs 255)\n\nThe \u0027len\u0027 variable can take a value between 0-255 as it can come from\ndata-\u003eblock[0] and it is user data. So add an bound check to prevent a\nbuffer overflow in memcpy().",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "SUSE Linux Enterprise Micro 5.5:kernel-devel-rt-5.14.21-150500.13.100.1.noarch",
          "SUSE Linux Enterprise Micro 5.5:kernel-rt-5.14.21-150500.13.100.2.x86_64",
          "SUSE Linux Enterprise Micro 5.5:kernel-source-rt-5.14.21-150500.13.100.1.noarch"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2022-50131",
          "url": "https://www.suse.com/security/cve/CVE-2022-50131"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1244807 for CVE-2022-50131",
          "url": "https://bugzilla.suse.com/1244807"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "SUSE Linux Enterprise Micro 5.5:kernel-devel-rt-5.14.21-150500.13.100.1.noarch",
            "SUSE Linux Enterprise Micro 5.5:kernel-rt-5.14.21-150500.13.100.2.x86_64",
            "SUSE Linux Enterprise Micro 5.5:kernel-source-rt-5.14.21-150500.13.100.1.noarch"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 5.5,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
            "version": "3.1"
          },
          "products": [
            "SUSE Linux Enterprise Micro 5.5:kernel-devel-rt-5.14.21-150500.13.100.1.noarch",
            "SUSE Linux Enterprise Micro 5.5:kernel-rt-5.14.21-150500.13.100.2.x86_64",
            "SUSE Linux Enterprise Micro 5.5:kernel-source-rt-5.14.21-150500.13.100.1.noarch"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2025-07-15T14:31:35Z",
          "details": "moderate"
        }
      ],
      "title": "CVE-2022-50131"
    },
    {
      "cve": "CVE-2022-50132",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2022-50132"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "In the Linux kernel, the following vulnerability has been resolved:\n\nusb: cdns3: change place of \u0027priv_ep\u0027 assignment in cdns3_gadget_ep_dequeue(), cdns3_gadget_ep_enable()\n\nIf \u0027ep\u0027 is NULL, result of ep_to_cdns3_ep(ep) is invalid pointer\nand its dereference with priv_ep-\u003ecdns3_dev may cause panic.\n\nFound by Linux Verification Center (linuxtesting.org) with SVACE.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "SUSE Linux Enterprise Micro 5.5:kernel-devel-rt-5.14.21-150500.13.100.1.noarch",
          "SUSE Linux Enterprise Micro 5.5:kernel-rt-5.14.21-150500.13.100.2.x86_64",
          "SUSE Linux Enterprise Micro 5.5:kernel-source-rt-5.14.21-150500.13.100.1.noarch"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2022-50132",
          "url": "https://www.suse.com/security/cve/CVE-2022-50132"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1244808 for CVE-2022-50132",
          "url": "https://bugzilla.suse.com/1244808"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "SUSE Linux Enterprise Micro 5.5:kernel-devel-rt-5.14.21-150500.13.100.1.noarch",
            "SUSE Linux Enterprise Micro 5.5:kernel-rt-5.14.21-150500.13.100.2.x86_64",
            "SUSE Linux Enterprise Micro 5.5:kernel-source-rt-5.14.21-150500.13.100.1.noarch"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 5.5,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
            "version": "3.1"
          },
          "products": [
            "SUSE Linux Enterprise Micro 5.5:kernel-devel-rt-5.14.21-150500.13.100.1.noarch",
            "SUSE Linux Enterprise Micro 5.5:kernel-rt-5.14.21-150500.13.100.2.x86_64",
            "SUSE Linux Enterprise Micro 5.5:kernel-source-rt-5.14.21-150500.13.100.1.noarch"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2025-07-15T14:31:35Z",
          "details": "moderate"
        }
      ],
      "title": "CVE-2022-50132"
    },
    {
      "cve": "CVE-2022-50133",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2022-50133"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "In the Linux kernel, the following vulnerability has been resolved:\n\nusb: xhci_plat_remove: avoid NULL dereference\n\nSince commit 4736ebd7fcaff1eb8481c140ba494962847d6e0a (\"usb: host:\nxhci-plat: omit shared hcd if either root hub has no ports\")\nxhci-\u003eshared_hcd can be NULL, which causes the following Oops\non reboot:\n\n[  710.124450] systemd-shutdown[1]: Rebooting.\n[  710.298861] xhci-hcd xhci-hcd.2.auto: remove, state 4\n[  710.304217] usb usb3: USB disconnect, device number 1\n[  710.317441] xhci-hcd xhci-hcd.2.auto: USB bus 3 deregistered\n[  710.323280] xhci-hcd xhci-hcd.2.auto: remove, state 1\n[  710.328401] usb usb2: USB disconnect, device number 1\n[  710.333515] usb 2-3: USB disconnect, device number 2\n[  710.467649] xhci-hcd xhci-hcd.2.auto: USB bus 2 deregistered\n[  710.475450] Unable to handle kernel NULL pointer dereference at virtual address 00000000000003b8\n[  710.484425] Mem abort info:\n[  710.487265]   ESR = 0x0000000096000004\n[  710.491060]   EC = 0x25: DABT (current EL), IL = 32 bits\n[  710.496427]   SET = 0, FnV = 0\n[  710.499525]   EA = 0, S1PTW = 0\n[  710.502716]   FSC = 0x04: level 0 translation fault\n[  710.507648] Data abort info:\n[  710.510577]   ISV = 0, ISS = 0x00000004\n[  710.514462]   CM = 0, WnR = 0\n[  710.517480] user pgtable: 4k pages, 48-bit VAs, pgdp=00000008b0050000\n[  710.523976] [00000000000003b8] pgd=0000000000000000, p4d=0000000000000000\n[  710.530961] Internal error: Oops: 96000004 [#1] PREEMPT SMP\n[  710.536551] Modules linked in: rfkill input_leds snd_soc_simple_card snd_soc_simple_card_utils snd_soc_nau8822 designware_i2s snd_soc_core dw_hdmi_ahb_audio snd_pcm_dmaengine arm_ccn panfrost ac97_bus gpu_sched snd_pcm at24 fuse configfs sdhci_of_dwcmshc sdhci_pltfm sdhci nvme led_class mmc_core nvme_core bt1_pvt polynomial tp_serio snd_seq_midi snd_seq_midi_event snd_seq snd_timer snd_rawmidi snd_seq_device snd soundcore efivarfs ipv6\n[  710.575286] CPU: 7 PID: 1 Comm: systemd-shutdow Not tainted 5.19.0-rc7-00043-gfd8619f4fd54 #1\n[  710.583822] Hardware name: T-Platforms TF307-MB/BM1BM1-A, BIOS 5.6 07/06/2022\n[  710.590972] pstate: 40000005 (nZcv daif -PAN -UAO -TCO -DIT -SSBS BTYPE=--)\n[  710.597949] pc : usb_remove_hcd+0x34/0x1e4\n[  710.602067] lr : xhci_plat_remove+0x74/0x140\n[  710.606351] sp : ffff800009f3b7c0\n[  710.609674] x29: ffff800009f3b7c0 x28: ffff000800960040 x27: 0000000000000000\n[  710.616833] x26: ffff800008dc22a0 x25: 0000000000000000 x24: 0000000000000000\n[  710.623992] x23: 0000000000000000 x22: ffff000805465810 x21: ffff000805465800\n[  710.631149] x20: ffff000800f80000 x19: 0000000000000000 x18: ffffffffffffffff\n[  710.638307] x17: ffff000805096000 x16: ffff00080633b800 x15: ffff000806537a1c\n[  710.645465] x14: 0000000000000001 x13: 0000000000000000 x12: ffff00080378d6f0\n[  710.652621] x11: ffff00080041a900 x10: ffff800009b204e8 x9 : ffff8000088abaa4\n[  710.659779] x8 : ffff000800960040 x7 : ffff800009409000 x6 : 0000000000000001\n[  710.666936] x5 : ffff800009241000 x4 : ffff800009241440 x3 : 0000000000000000\n[  710.674094] x2 : ffff000800960040 x1 : ffff000800960040 x0 : 0000000000000000\n[  710.681251] Call trace:\n[  710.683704]  usb_remove_hcd+0x34/0x1e4\n[  710.687467]  xhci_plat_remove+0x74/0x140\n[  710.691400]  platform_remove+0x34/0x70\n[  710.695165]  device_remove+0x54/0x90\n[  710.698753]  device_release_driver_internal+0x200/0x270\n[  710.703992]  device_release_driver+0x24/0x30\n[  710.708273]  bus_remove_device+0xe0/0x16c\n[  710.712293]  device_del+0x178/0x390\n[  710.715797]  platform_device_del.part.0+0x24/0x90\n[  710.720514]  platform_device_unregister+0x30/0x50\n[  710.725232]  dwc3_host_exit+0x20/0x30\n[  710.728907]  dwc3_remove+0x174/0x1b0\n[  710.732494]  platform_remove+0x34/0x70\n[  710.736254]  device_remove+0x54/0x90\n[  710.739840]  device_release_driver_internal+0x200/0x270\n[  710.745078]  device_release_driver+0x24/0x30\n[  710.749359]  bus_remove_device+0xe0/0x16c\n[  710.753380]  device_del+0x178/0x390\n[  710.756881]  platform_device_del.part\n---truncated---",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "SUSE Linux Enterprise Micro 5.5:kernel-devel-rt-5.14.21-150500.13.100.1.noarch",
          "SUSE Linux Enterprise Micro 5.5:kernel-rt-5.14.21-150500.13.100.2.x86_64",
          "SUSE Linux Enterprise Micro 5.5:kernel-source-rt-5.14.21-150500.13.100.1.noarch"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2022-50133",
          "url": "https://www.suse.com/security/cve/CVE-2022-50133"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1244806 for CVE-2022-50133",
          "url": "https://bugzilla.suse.com/1244806"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "SUSE Linux Enterprise Micro 5.5:kernel-devel-rt-5.14.21-150500.13.100.1.noarch",
            "SUSE Linux Enterprise Micro 5.5:kernel-rt-5.14.21-150500.13.100.2.x86_64",
            "SUSE Linux Enterprise Micro 5.5:kernel-source-rt-5.14.21-150500.13.100.1.noarch"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 5.5,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
            "version": "3.1"
          },
          "products": [
            "SUSE Linux Enterprise Micro 5.5:kernel-devel-rt-5.14.21-150500.13.100.1.noarch",
            "SUSE Linux Enterprise Micro 5.5:kernel-rt-5.14.21-150500.13.100.2.x86_64",
            "SUSE Linux Enterprise Micro 5.5:kernel-source-rt-5.14.21-150500.13.100.1.noarch"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2025-07-15T14:31:35Z",
          "details": "moderate"
        }
      ],
      "title": "CVE-2022-50133"
    },
    {
      "cve": "CVE-2022-50134",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2022-50134"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "In the Linux kernel, the following vulnerability has been resolved:\n\nRDMA/hfi1: fix potential memory leak in setup_base_ctxt()\n\nsetup_base_ctxt() allocates a memory chunk for uctxt-\u003egroups with\nhfi1_alloc_ctxt_rcv_groups(). When init_user_ctxt() fails, uctxt-\u003egroups\nis not released, which will lead to a memory leak.\n\nWe should release the uctxt-\u003egroups with hfi1_free_ctxt_rcv_groups()\nwhen init_user_ctxt() fails.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "SUSE Linux Enterprise Micro 5.5:kernel-devel-rt-5.14.21-150500.13.100.1.noarch",
          "SUSE Linux Enterprise Micro 5.5:kernel-rt-5.14.21-150500.13.100.2.x86_64",
          "SUSE Linux Enterprise Micro 5.5:kernel-source-rt-5.14.21-150500.13.100.1.noarch"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2022-50134",
          "url": "https://www.suse.com/security/cve/CVE-2022-50134"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1244802 for CVE-2022-50134",
          "url": "https://bugzilla.suse.com/1244802"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "SUSE Linux Enterprise Micro 5.5:kernel-devel-rt-5.14.21-150500.13.100.1.noarch",
            "SUSE Linux Enterprise Micro 5.5:kernel-rt-5.14.21-150500.13.100.2.x86_64",
            "SUSE Linux Enterprise Micro 5.5:kernel-source-rt-5.14.21-150500.13.100.1.noarch"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 5.5,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
            "version": "3.1"
          },
          "products": [
            "SUSE Linux Enterprise Micro 5.5:kernel-devel-rt-5.14.21-150500.13.100.1.noarch",
            "SUSE Linux Enterprise Micro 5.5:kernel-rt-5.14.21-150500.13.100.2.x86_64",
            "SUSE Linux Enterprise Micro 5.5:kernel-source-rt-5.14.21-150500.13.100.1.noarch"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2025-07-15T14:31:35Z",
          "details": "moderate"
        }
      ],
      "title": "CVE-2022-50134"
    },
    {
      "cve": "CVE-2022-50135",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2022-50135"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "In the Linux kernel, the following vulnerability has been resolved:\n\nRDMA/rxe: Fix BUG: KASAN: null-ptr-deref in rxe_qp_do_cleanup\n\nThe function rxe_create_qp calls rxe_qp_from_init. If some error\noccurs, the error handler of function rxe_qp_from_init will set\nboth scq and rcq to NULL.\n\nThen rxe_create_qp calls rxe_put to handle qp. In the end,\nrxe_qp_do_cleanup is called by rxe_put. rxe_qp_do_cleanup directly\naccesses scq and rcq before checking them. This will cause\nnull-ptr-deref error.\n\nThe call graph is as below:\n\nrxe_create_qp {\n  ...\n  rxe_qp_from_init {\n    ...\n  err1:\n    ...\n    qp-\u003ercq = NULL;  \u003c---rcq is set to NULL\n    qp-\u003escq = NULL;  \u003c---scq is set to NULL\n    ...\n  }\n\nqp_init:\n  rxe_put{\n    ...\n    rxe_qp_do_cleanup {\n      ...\n      atomic_dec(\u0026qp-\u003escq-\u003enum_wq); \u003c--- scq is accessed\n      ...\n      atomic_dec(\u0026qp-\u003ercq-\u003enum_wq); \u003c--- rcq is accessed\n    }\n}",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "SUSE Linux Enterprise Micro 5.5:kernel-devel-rt-5.14.21-150500.13.100.1.noarch",
          "SUSE Linux Enterprise Micro 5.5:kernel-rt-5.14.21-150500.13.100.2.x86_64",
          "SUSE Linux Enterprise Micro 5.5:kernel-source-rt-5.14.21-150500.13.100.1.noarch"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2022-50135",
          "url": "https://www.suse.com/security/cve/CVE-2022-50135"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1244805 for CVE-2022-50135",
          "url": "https://bugzilla.suse.com/1244805"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "SUSE Linux Enterprise Micro 5.5:kernel-devel-rt-5.14.21-150500.13.100.1.noarch",
            "SUSE Linux Enterprise Micro 5.5:kernel-rt-5.14.21-150500.13.100.2.x86_64",
            "SUSE Linux Enterprise Micro 5.5:kernel-source-rt-5.14.21-150500.13.100.1.noarch"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 5.5,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
            "version": "3.1"
          },
          "products": [
            "SUSE Linux Enterprise Micro 5.5:kernel-devel-rt-5.14.21-150500.13.100.1.noarch",
            "SUSE Linux Enterprise Micro 5.5:kernel-rt-5.14.21-150500.13.100.2.x86_64",
            "SUSE Linux Enterprise Micro 5.5:kernel-source-rt-5.14.21-150500.13.100.1.noarch"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2025-07-15T14:31:35Z",
          "details": "moderate"
        }
      ],
      "title": "CVE-2022-50135"
    },
    {
      "cve": "CVE-2022-50136",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2022-50136"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "In the Linux kernel, the following vulnerability has been resolved:\n\nRDMA/siw: Fix duplicated reported IW_CM_EVENT_CONNECT_REPLY event\n\nIf siw_recv_mpa_rr returns -EAGAIN, it means that the MPA reply hasn\u0027t\nbeen received completely, and should not report IW_CM_EVENT_CONNECT_REPLY\nin this case. This may trigger a call trace in iw_cm. A simple way to\ntrigger this:\n server: ib_send_lat\n client: ib_send_lat -R \u003cserver_ip\u003e\n\nThe call trace looks like this:\n\n kernel BUG at drivers/infiniband/core/iwcm.c:894!\n invalid opcode: 0000 [#1] PREEMPT SMP NOPTI\n \u003c...\u003e\n Workqueue: iw_cm_wq cm_work_handler [iw_cm]\n Call Trace:\n  \u003cTASK\u003e\n  cm_work_handler+0x1dd/0x370 [iw_cm]\n  process_one_work+0x1e2/0x3b0\n  worker_thread+0x49/0x2e0\n  ? rescuer_thread+0x370/0x370\n  kthread+0xe5/0x110\n  ? kthread_complete_and_exit+0x20/0x20\n  ret_from_fork+0x1f/0x30\n  \u003c/TASK\u003e",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "SUSE Linux Enterprise Micro 5.5:kernel-devel-rt-5.14.21-150500.13.100.1.noarch",
          "SUSE Linux Enterprise Micro 5.5:kernel-rt-5.14.21-150500.13.100.2.x86_64",
          "SUSE Linux Enterprise Micro 5.5:kernel-source-rt-5.14.21-150500.13.100.1.noarch"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2022-50136",
          "url": "https://www.suse.com/security/cve/CVE-2022-50136"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1244804 for CVE-2022-50136",
          "url": "https://bugzilla.suse.com/1244804"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "SUSE Linux Enterprise Micro 5.5:kernel-devel-rt-5.14.21-150500.13.100.1.noarch",
            "SUSE Linux Enterprise Micro 5.5:kernel-rt-5.14.21-150500.13.100.2.x86_64",
            "SUSE Linux Enterprise Micro 5.5:kernel-source-rt-5.14.21-150500.13.100.1.noarch"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 5.5,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
            "version": "3.1"
          },
          "products": [
            "SUSE Linux Enterprise Micro 5.5:kernel-devel-rt-5.14.21-150500.13.100.1.noarch",
            "SUSE Linux Enterprise Micro 5.5:kernel-rt-5.14.21-150500.13.100.2.x86_64",
            "SUSE Linux Enterprise Micro 5.5:kernel-source-rt-5.14.21-150500.13.100.1.noarch"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2025-07-15T14:31:35Z",
          "details": "moderate"
        }
      ],
      "title": "CVE-2022-50136"
    },
    {
      "cve": "CVE-2022-50137",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2022-50137"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "In the Linux kernel, the following vulnerability has been resolved:\n\nRDMA/irdma: Fix a window for use-after-free\n\nDuring a destroy CQ an interrupt may cause processing of a CQE after CQ\nresources are freed by irdma_cq_free_rsrc(). Fix this by moving the call\nto irdma_cq_free_rsrc() after the irdma_sc_cleanup_ceqes(), which is\ncalled under the cq_lock.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "SUSE Linux Enterprise Micro 5.5:kernel-devel-rt-5.14.21-150500.13.100.1.noarch",
          "SUSE Linux Enterprise Micro 5.5:kernel-rt-5.14.21-150500.13.100.2.x86_64",
          "SUSE Linux Enterprise Micro 5.5:kernel-source-rt-5.14.21-150500.13.100.1.noarch"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2022-50137",
          "url": "https://www.suse.com/security/cve/CVE-2022-50137"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1244800 for CVE-2022-50137",
          "url": "https://bugzilla.suse.com/1244800"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "SUSE Linux Enterprise Micro 5.5:kernel-devel-rt-5.14.21-150500.13.100.1.noarch",
            "SUSE Linux Enterprise Micro 5.5:kernel-rt-5.14.21-150500.13.100.2.x86_64",
            "SUSE Linux Enterprise Micro 5.5:kernel-source-rt-5.14.21-150500.13.100.1.noarch"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 5.5,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
            "version": "3.1"
          },
          "products": [
            "SUSE Linux Enterprise Micro 5.5:kernel-devel-rt-5.14.21-150500.13.100.1.noarch",
            "SUSE Linux Enterprise Micro 5.5:kernel-rt-5.14.21-150500.13.100.2.x86_64",
            "SUSE Linux Enterprise Micro 5.5:kernel-source-rt-5.14.21-150500.13.100.1.noarch"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2025-07-15T14:31:35Z",
          "details": "moderate"
        }
      ],
      "title": "CVE-2022-50137"
    },
    {
      "cve": "CVE-2022-50138",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2022-50138"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "In the Linux kernel, the following vulnerability has been resolved:\n\nRDMA/qedr: Fix potential memory leak in __qedr_alloc_mr()\n\n__qedr_alloc_mr() allocates a memory chunk for \"mr-\u003einfo.pbl_table\" with\ninit_mr_info(). When rdma_alloc_tid() and rdma_register_tid() fail, \"mr\"\nis released while \"mr-\u003einfo.pbl_table\" is not released, which will lead\nto a memory leak.\n\nWe should release the \"mr-\u003einfo.pbl_table\" with qedr_free_pbl() when error\noccurs to fix the memory leak.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "SUSE Linux Enterprise Micro 5.5:kernel-devel-rt-5.14.21-150500.13.100.1.noarch",
          "SUSE Linux Enterprise Micro 5.5:kernel-rt-5.14.21-150500.13.100.2.x86_64",
          "SUSE Linux Enterprise Micro 5.5:kernel-source-rt-5.14.21-150500.13.100.1.noarch"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2022-50138",
          "url": "https://www.suse.com/security/cve/CVE-2022-50138"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1244797 for CVE-2022-50138",
          "url": "https://bugzilla.suse.com/1244797"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "SUSE Linux Enterprise Micro 5.5:kernel-devel-rt-5.14.21-150500.13.100.1.noarch",
            "SUSE Linux Enterprise Micro 5.5:kernel-rt-5.14.21-150500.13.100.2.x86_64",
            "SUSE Linux Enterprise Micro 5.5:kernel-source-rt-5.14.21-150500.13.100.1.noarch"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 5.5,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
            "version": "3.1"
          },
          "products": [
            "SUSE Linux Enterprise Micro 5.5:kernel-devel-rt-5.14.21-150500.13.100.1.noarch",
            "SUSE Linux Enterprise Micro 5.5:kernel-rt-5.14.21-150500.13.100.2.x86_64",
            "SUSE Linux Enterprise Micro 5.5:kernel-source-rt-5.14.21-150500.13.100.1.noarch"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2025-07-15T14:31:35Z",
          "details": "moderate"
        }
      ],
      "title": "CVE-2022-50138"
    },
    {
      "cve": "CVE-2022-50139",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2022-50139"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "In the Linux kernel, the following vulnerability has been resolved:\n\nusb: aspeed-vhub: Fix refcount leak bug in ast_vhub_init_desc()\n\nWe should call of_node_put() for the reference returned by\nof_get_child_by_name() which has increased the refcount.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "SUSE Linux Enterprise Micro 5.5:kernel-devel-rt-5.14.21-150500.13.100.1.noarch",
          "SUSE Linux Enterprise Micro 5.5:kernel-rt-5.14.21-150500.13.100.2.x86_64",
          "SUSE Linux Enterprise Micro 5.5:kernel-source-rt-5.14.21-150500.13.100.1.noarch"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2022-50139",
          "url": "https://www.suse.com/security/cve/CVE-2022-50139"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1244798 for CVE-2022-50139",
          "url": "https://bugzilla.suse.com/1244798"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "SUSE Linux Enterprise Micro 5.5:kernel-devel-rt-5.14.21-150500.13.100.1.noarch",
            "SUSE Linux Enterprise Micro 5.5:kernel-rt-5.14.21-150500.13.100.2.x86_64",
            "SUSE Linux Enterprise Micro 5.5:kernel-source-rt-5.14.21-150500.13.100.1.noarch"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 5.5,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
            "version": "3.1"
          },
          "products": [
            "SUSE Linux Enterprise Micro 5.5:kernel-devel-rt-5.14.21-150500.13.100.1.noarch",
            "SUSE Linux Enterprise Micro 5.5:kernel-rt-5.14.21-150500.13.100.2.x86_64",
            "SUSE Linux Enterprise Micro 5.5:kernel-source-rt-5.14.21-150500.13.100.1.noarch"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2025-07-15T14:31:35Z",
          "details": "moderate"
        }
      ],
      "title": "CVE-2022-50139"
    },
    {
      "cve": "CVE-2022-50140",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2022-50140"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "In the Linux kernel, the following vulnerability has been resolved:\n\nmemstick/ms_block: Fix a memory leak\n\n\u0027erased_blocks_bitmap\u0027 is never freed. As it is allocated at the same time\nas \u0027used_blocks_bitmap\u0027, it is likely that it should be freed also at the\nsame time.\n\nAdd the corresponding bitmap_free() in msb_data_clear().",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "SUSE Linux Enterprise Micro 5.5:kernel-devel-rt-5.14.21-150500.13.100.1.noarch",
          "SUSE Linux Enterprise Micro 5.5:kernel-rt-5.14.21-150500.13.100.2.x86_64",
          "SUSE Linux Enterprise Micro 5.5:kernel-source-rt-5.14.21-150500.13.100.1.noarch"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2022-50140",
          "url": "https://www.suse.com/security/cve/CVE-2022-50140"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1244793 for CVE-2022-50140",
          "url": "https://bugzilla.suse.com/1244793"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "SUSE Linux Enterprise Micro 5.5:kernel-devel-rt-5.14.21-150500.13.100.1.noarch",
            "SUSE Linux Enterprise Micro 5.5:kernel-rt-5.14.21-150500.13.100.2.x86_64",
            "SUSE Linux Enterprise Micro 5.5:kernel-source-rt-5.14.21-150500.13.100.1.noarch"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 5.5,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
            "version": "3.1"
          },
          "products": [
            "SUSE Linux Enterprise Micro 5.5:kernel-devel-rt-5.14.21-150500.13.100.1.noarch",
            "SUSE Linux Enterprise Micro 5.5:kernel-rt-5.14.21-150500.13.100.2.x86_64",
            "SUSE Linux Enterprise Micro 5.5:kernel-source-rt-5.14.21-150500.13.100.1.noarch"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2025-07-15T14:31:35Z",
          "details": "moderate"
        }
      ],
      "title": "CVE-2022-50140"
    },
    {
      "cve": "CVE-2022-50141",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2022-50141"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "In the Linux kernel, the following vulnerability has been resolved:\n\nmmc: sdhci-of-esdhc: Fix refcount leak in esdhc_signal_voltage_switch\n\nof_find_matching_node() returns a node pointer with refcount\nincremented, we should use of_node_put() on it when not need anymore.\nAdd missing of_node_put() to avoid refcount leak.\nof_node_put() checks null pointer.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "SUSE Linux Enterprise Micro 5.5:kernel-devel-rt-5.14.21-150500.13.100.1.noarch",
          "SUSE Linux Enterprise Micro 5.5:kernel-rt-5.14.21-150500.13.100.2.x86_64",
          "SUSE Linux Enterprise Micro 5.5:kernel-source-rt-5.14.21-150500.13.100.1.noarch"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2022-50141",
          "url": "https://www.suse.com/security/cve/CVE-2022-50141"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1244794 for CVE-2022-50141",
          "url": "https://bugzilla.suse.com/1244794"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "SUSE Linux Enterprise Micro 5.5:kernel-devel-rt-5.14.21-150500.13.100.1.noarch",
            "SUSE Linux Enterprise Micro 5.5:kernel-rt-5.14.21-150500.13.100.2.x86_64",
            "SUSE Linux Enterprise Micro 5.5:kernel-source-rt-5.14.21-150500.13.100.1.noarch"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 5.5,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
            "version": "3.1"
          },
          "products": [
            "SUSE Linux Enterprise Micro 5.5:kernel-devel-rt-5.14.21-150500.13.100.1.noarch",
            "SUSE Linux Enterprise Micro 5.5:kernel-rt-5.14.21-150500.13.100.2.x86_64",
            "SUSE Linux Enterprise Micro 5.5:kernel-source-rt-5.14.21-150500.13.100.1.noarch"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2025-07-15T14:31:35Z",
          "details": "moderate"
        }
      ],
      "title": "CVE-2022-50141"
    },
    {
      "cve": "CVE-2022-50142",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2022-50142"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "In the Linux kernel, the following vulnerability has been resolved:\n\nintel_th: msu: Fix vmalloced buffers\n\nAfter commit f5ff79fddf0e (\"dma-mapping: remove CONFIG_DMA_REMAP\") there\u0027s\na chance of DMA buffer getting allocated via vmalloc(), which messes up\nthe mmapping code:\n\n\u003e RIP: msc_mmap_fault [intel_th_msu]\n\u003e Call Trace:\n\u003e  \u003cTASK\u003e\n\u003e  __do_fault\n\u003e  do_fault\n...\n\nFix this by accounting for vmalloc possibility.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "SUSE Linux Enterprise Micro 5.5:kernel-devel-rt-5.14.21-150500.13.100.1.noarch",
          "SUSE Linux Enterprise Micro 5.5:kernel-rt-5.14.21-150500.13.100.2.x86_64",
          "SUSE Linux Enterprise Micro 5.5:kernel-source-rt-5.14.21-150500.13.100.1.noarch"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2022-50142",
          "url": "https://www.suse.com/security/cve/CVE-2022-50142"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1244796 for CVE-2022-50142",
          "url": "https://bugzilla.suse.com/1244796"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "SUSE Linux Enterprise Micro 5.5:kernel-devel-rt-5.14.21-150500.13.100.1.noarch",
            "SUSE Linux Enterprise Micro 5.5:kernel-rt-5.14.21-150500.13.100.2.x86_64",
            "SUSE Linux Enterprise Micro 5.5:kernel-source-rt-5.14.21-150500.13.100.1.noarch"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 5.5,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
            "version": "3.1"
          },
          "products": [
            "SUSE Linux Enterprise Micro 5.5:kernel-devel-rt-5.14.21-150500.13.100.1.noarch",
            "SUSE Linux Enterprise Micro 5.5:kernel-rt-5.14.21-150500.13.100.2.x86_64",
            "SUSE Linux Enterprise Micro 5.5:kernel-source-rt-5.14.21-150500.13.100.1.noarch"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2025-07-15T14:31:35Z",
          "details": "moderate"
        }
      ],
      "title": "CVE-2022-50142"
    },
    {
      "cve": "CVE-2022-50143",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2022-50143"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "In the Linux kernel, the following vulnerability has been resolved:\n\nintel_th: Fix a resource leak in an error handling path\n\nIf an error occurs after calling \u0027pci_alloc_irq_vectors()\u0027,\n\u0027pci_free_irq_vectors()\u0027 must be called as already done in the remove\nfunction.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "SUSE Linux Enterprise Micro 5.5:kernel-devel-rt-5.14.21-150500.13.100.1.noarch",
          "SUSE Linux Enterprise Micro 5.5:kernel-rt-5.14.21-150500.13.100.2.x86_64",
          "SUSE Linux Enterprise Micro 5.5:kernel-source-rt-5.14.21-150500.13.100.1.noarch"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2022-50143",
          "url": "https://www.suse.com/security/cve/CVE-2022-50143"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1244790 for CVE-2022-50143",
          "url": "https://bugzilla.suse.com/1244790"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "SUSE Linux Enterprise Micro 5.5:kernel-devel-rt-5.14.21-150500.13.100.1.noarch",
            "SUSE Linux Enterprise Micro 5.5:kernel-rt-5.14.21-150500.13.100.2.x86_64",
            "SUSE Linux Enterprise Micro 5.5:kernel-source-rt-5.14.21-150500.13.100.1.noarch"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 5.5,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
            "version": "3.1"
          },
          "products": [
            "SUSE Linux Enterprise Micro 5.5:kernel-devel-rt-5.14.21-150500.13.100.1.noarch",
            "SUSE Linux Enterprise Micro 5.5:kernel-rt-5.14.21-150500.13.100.2.x86_64",
            "SUSE Linux Enterprise Micro 5.5:kernel-source-rt-5.14.21-150500.13.100.1.noarch"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2025-07-15T14:31:35Z",
          "details": "moderate"
        }
      ],
      "title": "CVE-2022-50143"
    },
    {
      "cve": "CVE-2022-50144",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2022-50144"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "In the Linux kernel, the following vulnerability has been resolved:\n\nsoundwire: revisit driver bind/unbind and callbacks\n\nIn the SoundWire probe, we store a pointer from the driver ops into\nthe \u0027slave\u0027 structure. This can lead to kernel oopses when unbinding\ncodec drivers, e.g. with the following sequence to remove machine\ndriver and codec driver.\n\n/sbin/modprobe -r snd_soc_sof_sdw\n/sbin/modprobe -r snd_soc_rt711\n\nThe full details can be found in the BugLink below, for reference the\ntwo following examples show different cases of driver ops/callbacks\nbeing invoked after the driver .remove().\n\nkernel: BUG: kernel NULL pointer dereference, address: 0000000000000150\nkernel: Workqueue: events cdns_update_slave_status_work [soundwire_cadence]\nkernel: RIP: 0010:mutex_lock+0x19/0x30\nkernel: Call Trace:\nkernel:  ? sdw_handle_slave_status+0x426/0xe00 [soundwire_bus 94ff184bf398570c3f8ff7efe9e32529f532e4ae]\nkernel:  ? newidle_balance+0x26a/0x400\nkernel:  ? cdns_update_slave_status_work+0x1e9/0x200 [soundwire_cadence 1bcf98eebe5ba9833cd433323769ac923c9c6f82]\n\nkernel: BUG: unable to handle page fault for address: ffffffffc07654c8\nkernel: Workqueue: pm pm_runtime_work\nkernel: RIP: 0010:sdw_bus_prep_clk_stop+0x6f/0x160 [soundwire_bus]\nkernel: Call Trace:\nkernel:  \u003cTASK\u003e\nkernel:  sdw_cdns_clock_stop+0xb5/0x1b0 [soundwire_cadence 1bcf98eebe5ba9833cd433323769ac923c9c6f82]\nkernel:  intel_suspend_runtime+0x5f/0x120 [soundwire_intel aca858f7c87048d3152a4a41bb68abb9b663a1dd]\nkernel:  ? dpm_sysfs_remove+0x60/0x60\n\nThis was not detected earlier in Intel tests since the tests first\nremove the parent PCI device and shut down the bus. The sequence\nabove is a corner case which keeps the bus operational but without a\ndriver bound.\n\nWhile trying to solve this kernel oopses, it became clear that the\nexisting SoundWire bus does not deal well with the unbind case.\n\nCommit 528be501b7d4a (\"soundwire: sdw_slave: add probe_complete structure and new fields\")\nadded a \u0027probed\u0027 status variable and a \u0027probe_complete\u0027\nstruct completion. This status is however not reset on remove and\nlikewise the \u0027probe complete\u0027 is not re-initialized, so the\nbind/unbind/bind test cases would fail. The timeout used before the\n\u0027update_status\u0027 callback was also a bad idea in hindsight, there\nshould really be no timing assumption as to if and when a driver is\nbound to a device.\n\nAn initial draft was based on device_lock() and device_unlock() was\ntested. This proved too complicated, with deadlocks created during the\nsuspend-resume sequences, which also use the same device_lock/unlock()\nas the bind/unbind sequences. On a CometLake device, a bad DSDT/BIOS\ncaused spurious resumes and the use of device_lock() caused hangs\nduring suspend. After multiple weeks or testing and painful\nreverse-engineering of deadlocks on different devices, we looked for\nalternatives that did not interfere with the device core.\n\nA bus notifier was used successfully to keep track of DRIVER_BOUND and\nDRIVER_UNBIND events. This solved the bind-unbind-bind case in tests,\nbut it can still be defeated with a theoretical corner case where the\nmemory is freed by a .remove while the callback is in use. The\nnotifier only helps make sure the driver callbacks are valid, but not\nthat the memory allocated in probe remains valid while the callbacks\nare invoked.\n\nThis patch suggests the introduction of a new \u0027sdw_dev_lock\u0027 mutex\nprotecting probe/remove and all driver callbacks. Since this mutex is\n\u0027local\u0027 to SoundWire only, it does not interfere with existing locks\nand does not create deadlocks. In addition, this patch removes the\n\u0027probe_complete\u0027 completion, instead we directly invoke the\n\u0027update_status\u0027 from the probe routine. That removes any sort of\ntiming dependency and a much better support for the device/driver\nmodel, the driver could be bound before the bus started, or eons after\nthe bus started and the hardware would be properly initialized in all\ncases.\n\nBugLink: https://github.com/thesofproject/linux/is\n---truncated---",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "SUSE Linux Enterprise Micro 5.5:kernel-devel-rt-5.14.21-150500.13.100.1.noarch",
          "SUSE Linux Enterprise Micro 5.5:kernel-rt-5.14.21-150500.13.100.2.x86_64",
          "SUSE Linux Enterprise Micro 5.5:kernel-source-rt-5.14.21-150500.13.100.1.noarch"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2022-50144",
          "url": "https://www.suse.com/security/cve/CVE-2022-50144"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1244791 for CVE-2022-50144",
          "url": "https://bugzilla.suse.com/1244791"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "SUSE Linux Enterprise Micro 5.5:kernel-devel-rt-5.14.21-150500.13.100.1.noarch",
            "SUSE Linux Enterprise Micro 5.5:kernel-rt-5.14.21-150500.13.100.2.x86_64",
            "SUSE Linux Enterprise Micro 5.5:kernel-source-rt-5.14.21-150500.13.100.1.noarch"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 5.5,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
            "version": "3.1"
          },
          "products": [
            "SUSE Linux Enterprise Micro 5.5:kernel-devel-rt-5.14.21-150500.13.100.1.noarch",
            "SUSE Linux Enterprise Micro 5.5:kernel-rt-5.14.21-150500.13.100.2.x86_64",
            "SUSE Linux Enterprise Micro 5.5:kernel-source-rt-5.14.21-150500.13.100.1.noarch"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2025-07-15T14:31:35Z",
          "details": "moderate"
        }
      ],
      "title": "CVE-2022-50144"
    },
    {
      "cve": "CVE-2022-50145",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2022-50145"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "In the Linux kernel, the following vulnerability has been resolved:\n\ndmaengine: sf-pdma: Add multithread support for a DMA channel\n\nWhen we get a DMA channel and try to use it in multiple threads it\nwill cause oops and hanging the system.\n\n% echo 64 \u003e /sys/module/dmatest/parameters/threads_per_chan\n% echo 10000 \u003e /sys/module/dmatest/parameters/iterations\n% echo 1 \u003e /sys/module/dmatest/parameters/run\n[   89.480664] Unable to handle kernel NULL pointer dereference at virtual\n               address 00000000000000a0\n[   89.488725] Oops [#1]\n[   89.494708] CPU: 2 PID: 1008 Comm: dma0chan0-copy0 Not tainted\n               5.17.0-rc5\n[   89.509385] epc : vchan_find_desc+0x32/0x46\n[   89.513553]  ra : sf_pdma_tx_status+0xca/0xd6\n\nThis happens because of data race. Each thread rewrite channels\u0027s\ndescriptor as soon as device_prep_dma_memcpy() is called. It leads to the\nsituation when the driver thinks that it uses right descriptor that\nactually is freed or substituted for other one.\n\nWith current fixes a descriptor changes its value only when it has\nbeen used. A new descriptor is acquired from vc-\u003edesc_issued queue that\nis already filled with descriptors that are ready to be sent. Threads\nhave no direct access to DMA channel descriptor. Now it is just possible\nto queue a descriptor for further processing.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "SUSE Linux Enterprise Micro 5.5:kernel-devel-rt-5.14.21-150500.13.100.1.noarch",
          "SUSE Linux Enterprise Micro 5.5:kernel-rt-5.14.21-150500.13.100.2.x86_64",
          "SUSE Linux Enterprise Micro 5.5:kernel-source-rt-5.14.21-150500.13.100.1.noarch"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2022-50145",
          "url": "https://www.suse.com/security/cve/CVE-2022-50145"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1244787 for CVE-2022-50145",
          "url": "https://bugzilla.suse.com/1244787"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "SUSE Linux Enterprise Micro 5.5:kernel-devel-rt-5.14.21-150500.13.100.1.noarch",
            "SUSE Linux Enterprise Micro 5.5:kernel-rt-5.14.21-150500.13.100.2.x86_64",
            "SUSE Linux Enterprise Micro 5.5:kernel-source-rt-5.14.21-150500.13.100.1.noarch"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 5.5,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
            "version": "3.1"
          },
          "products": [
            "SUSE Linux Enterprise Micro 5.5:kernel-devel-rt-5.14.21-150500.13.100.1.noarch",
            "SUSE Linux Enterprise Micro 5.5:kernel-rt-5.14.21-150500.13.100.2.x86_64",
            "SUSE Linux Enterprise Micro 5.5:kernel-source-rt-5.14.21-150500.13.100.1.noarch"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2025-07-15T14:31:35Z",
          "details": "moderate"
        }
      ],
      "title": "CVE-2022-50145"
    },
    {
      "cve": "CVE-2022-50146",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2022-50146"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "In the Linux kernel, the following vulnerability has been resolved:\n\nPCI: dwc: Deallocate EPC memory on dw_pcie_ep_init() errors\n\nIf dw_pcie_ep_init() fails to perform any action after the EPC memory is\ninitialized and the MSI memory region is allocated, the latter parts won\u0027t\nbe undone thus causing a memory leak.  Add a cleanup-on-error path to fix\nthese leaks.\n\n[bhelgaas: commit log]",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "SUSE Linux Enterprise Micro 5.5:kernel-devel-rt-5.14.21-150500.13.100.1.noarch",
          "SUSE Linux Enterprise Micro 5.5:kernel-rt-5.14.21-150500.13.100.2.x86_64",
          "SUSE Linux Enterprise Micro 5.5:kernel-source-rt-5.14.21-150500.13.100.1.noarch"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2022-50146",
          "url": "https://www.suse.com/security/cve/CVE-2022-50146"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1244788 for CVE-2022-50146",
          "url": "https://bugzilla.suse.com/1244788"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "SUSE Linux Enterprise Micro 5.5:kernel-devel-rt-5.14.21-150500.13.100.1.noarch",
            "SUSE Linux Enterprise Micro 5.5:kernel-rt-5.14.21-150500.13.100.2.x86_64",
            "SUSE Linux Enterprise Micro 5.5:kernel-source-rt-5.14.21-150500.13.100.1.noarch"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 5.5,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
            "version": "3.1"
          },
          "products": [
            "SUSE Linux Enterprise Micro 5.5:kernel-devel-rt-5.14.21-150500.13.100.1.noarch",
            "SUSE Linux Enterprise Micro 5.5:kernel-rt-5.14.21-150500.13.100.2.x86_64",
            "SUSE Linux Enterprise Micro 5.5:kernel-source-rt-5.14.21-150500.13.100.1.noarch"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2025-07-15T14:31:35Z",
          "details": "moderate"
        }
      ],
      "title": "CVE-2022-50146"
    },
    {
      "cve": "CVE-2022-50149",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2022-50149"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "In the Linux kernel, the following vulnerability has been resolved:\n\ndriver core: fix potential deadlock in __driver_attach\n\nIn __driver_attach function, There are also AA deadlock problem,\nlike the commit b232b02bf3c2 (\"driver core: fix deadlock in\n__device_attach\").\n\nstack like commit b232b02bf3c2 (\"driver core: fix deadlock in\n__device_attach\").\nlist below:\n    In __driver_attach function, The lock holding logic is as follows:\n    ...\n    __driver_attach\n    if (driver_allows_async_probing(drv))\n      device_lock(dev)      // get lock dev\n        async_schedule_dev(__driver_attach_async_helper, dev); // func\n          async_schedule_node\n            async_schedule_node_domain(func)\n              entry = kzalloc(sizeof(struct async_entry), GFP_ATOMIC);\n              /* when fail or work limit, sync to execute func, but\n                 __driver_attach_async_helper will get lock dev as\n                 will, which will lead to A-A deadlock.  */\n              if (!entry || atomic_read(\u0026entry_count) \u003e MAX_WORK) {\n                func;\n              else\n                queue_work_node(node, system_unbound_wq, \u0026entry-\u003ework)\n      device_unlock(dev)\n\n    As above show, when it is allowed to do async probes, because of\n    out of memory or work limit, async work is not be allowed, to do\n    sync execute instead. it will lead to A-A deadlock because of\n    __driver_attach_async_helper getting lock dev.\n\nReproduce:\nand it can be reproduce by make the condition\n(if (!entry || atomic_read(\u0026entry_count) \u003e MAX_WORK)) untenable, like\nbelow:\n\n[  370.785650] \"echo 0 \u003e /proc/sys/kernel/hung_task_timeout_secs\" disables\nthis message.\n[  370.787154] task:swapper/0       state:D stack:    0 pid:    1 ppid:\n0 flags:0x00004000\n[  370.788865] Call Trace:\n[  370.789374]  \u003cTASK\u003e\n[  370.789841]  __schedule+0x482/0x1050\n[  370.790613]  schedule+0x92/0x1a0\n[  370.791290]  schedule_preempt_disabled+0x2c/0x50\n[  370.792256]  __mutex_lock.isra.0+0x757/0xec0\n[  370.793158]  __mutex_lock_slowpath+0x1f/0x30\n[  370.794079]  mutex_lock+0x50/0x60\n[  370.794795]  __device_driver_lock+0x2f/0x70\n[  370.795677]  ? driver_probe_device+0xd0/0xd0\n[  370.796576]  __driver_attach_async_helper+0x1d/0xd0\n[  370.797318]  ? driver_probe_device+0xd0/0xd0\n[  370.797957]  async_schedule_node_domain+0xa5/0xc0\n[  370.798652]  async_schedule_node+0x19/0x30\n[  370.799243]  __driver_attach+0x246/0x290\n[  370.799828]  ? driver_allows_async_probing+0xa0/0xa0\n[  370.800548]  bus_for_each_dev+0x9d/0x130\n[  370.801132]  driver_attach+0x22/0x30\n[  370.801666]  bus_add_driver+0x290/0x340\n[  370.802246]  driver_register+0x88/0x140\n[  370.802817]  ? virtio_scsi_init+0x116/0x116\n[  370.803425]  scsi_register_driver+0x1a/0x30\n[  370.804057]  init_sd+0x184/0x226\n[  370.804533]  do_one_initcall+0x71/0x3a0\n[  370.805107]  kernel_init_freeable+0x39a/0x43a\n[  370.805759]  ? rest_init+0x150/0x150\n[  370.806283]  kernel_init+0x26/0x230\n[  370.806799]  ret_from_fork+0x1f/0x30\n\nTo fix the deadlock, move the async_schedule_dev outside device_lock,\nas we can see, in async_schedule_node_domain, the parameter of\nqueue_work_node is system_unbound_wq, so it can accept concurrent\noperations. which will also not change the code logic, and will\nnot lead to deadlock.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "SUSE Linux Enterprise Micro 5.5:kernel-devel-rt-5.14.21-150500.13.100.1.noarch",
          "SUSE Linux Enterprise Micro 5.5:kernel-rt-5.14.21-150500.13.100.2.x86_64",
          "SUSE Linux Enterprise Micro 5.5:kernel-source-rt-5.14.21-150500.13.100.1.noarch"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2022-50149",
          "url": "https://www.suse.com/security/cve/CVE-2022-50149"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1244883 for CVE-2022-50149",
          "url": "https://bugzilla.suse.com/1244883"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "SUSE Linux Enterprise Micro 5.5:kernel-devel-rt-5.14.21-150500.13.100.1.noarch",
            "SUSE Linux Enterprise Micro 5.5:kernel-rt-5.14.21-150500.13.100.2.x86_64",
            "SUSE Linux Enterprise Micro 5.5:kernel-source-rt-5.14.21-150500.13.100.1.noarch"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 5.5,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
            "version": "3.1"
          },
          "products": [
            "SUSE Linux Enterprise Micro 5.5:kernel-devel-rt-5.14.21-150500.13.100.1.noarch",
            "SUSE Linux Enterprise Micro 5.5:kernel-rt-5.14.21-150500.13.100.2.x86_64",
            "SUSE Linux Enterprise Micro 5.5:kernel-source-rt-5.14.21-150500.13.100.1.noarch"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2025-07-15T14:31:35Z",
          "details": "moderate"
        }
      ],
      "title": "CVE-2022-50149"
    },
    {
      "cve": "CVE-2022-50151",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2022-50151"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "In the Linux kernel, the following vulnerability has been resolved:\n\nusb: cdns3: fix random warning message when driver load\n\nWarning log:\n[    4.141392] Unexpected gfp: 0x4 (GFP_DMA32). Fixing up to gfp: 0xa20 (GFP_ATOMIC). Fix your code!\n[    4.150340] CPU: 1 PID: 175 Comm: 1-0050 Not tainted 5.15.5-00039-g2fd9ae1b568c #20\n[    4.158010] Hardware name: Freescale i.MX8QXP MEK (DT)\n[    4.163155] Call trace:\n[    4.165600]  dump_backtrace+0x0/0x1b0\n[    4.169286]  show_stack+0x18/0x68\n[    4.172611]  dump_stack_lvl+0x68/0x84\n[    4.176286]  dump_stack+0x18/0x34\n[    4.179613]  kmalloc_fix_flags+0x60/0x88\n[    4.183550]  new_slab+0x334/0x370\n[    4.186878]  ___slab_alloc.part.108+0x4d4/0x748\n[    4.191419]  __slab_alloc.isra.109+0x30/0x78\n[    4.195702]  kmem_cache_alloc+0x40c/0x420\n[    4.199725]  dma_pool_alloc+0xac/0x1f8\n[    4.203486]  cdns3_allocate_trb_pool+0xb4/0xd0\n\npool_alloc_page(struct dma_pool *pool, gfp_t mem_flags)\n{\n\t...\n\tpage = kmalloc(sizeof(*page), mem_flags);\n\tpage-\u003evaddr = dma_alloc_coherent(pool-\u003edev, pool-\u003eallocation,\n\t\t\t\t\t \u0026page-\u003edma, mem_flags);\n\t...\n}\n\nkmalloc was called with mem_flags, which is passed down in\ncdns3_allocate_trb_pool() and have GFP_DMA32 flags.\nkmall_fix_flags() report warning.\n\nGFP_DMA32 is not useful at all. dma_alloc_coherent() will handle\nDMA memory region correctly by pool-\u003edev. GFP_DMA32 can be removed\nsafely.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "SUSE Linux Enterprise Micro 5.5:kernel-devel-rt-5.14.21-150500.13.100.1.noarch",
          "SUSE Linux Enterprise Micro 5.5:kernel-rt-5.14.21-150500.13.100.2.x86_64",
          "SUSE Linux Enterprise Micro 5.5:kernel-source-rt-5.14.21-150500.13.100.1.noarch"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2022-50151",
          "url": "https://www.suse.com/security/cve/CVE-2022-50151"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1245093 for CVE-2022-50151",
          "url": "https://bugzilla.suse.com/1245093"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "SUSE Linux Enterprise Micro 5.5:kernel-devel-rt-5.14.21-150500.13.100.1.noarch",
            "SUSE Linux Enterprise Micro 5.5:kernel-rt-5.14.21-150500.13.100.2.x86_64",
            "SUSE Linux Enterprise Micro 5.5:kernel-source-rt-5.14.21-150500.13.100.1.noarch"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 5.5,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
            "version": "3.1"
          },
          "products": [
            "SUSE Linux Enterprise Micro 5.5:kernel-devel-rt-5.14.21-150500.13.100.1.noarch",
            "SUSE Linux Enterprise Micro 5.5:kernel-rt-5.14.21-150500.13.100.2.x86_64",
            "SUSE Linux Enterprise Micro 5.5:kernel-source-rt-5.14.21-150500.13.100.1.noarch"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2025-07-15T14:31:35Z",
          "details": "moderate"
        }
      ],
      "title": "CVE-2022-50151"
    },
    {
      "cve": "CVE-2022-50152",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2022-50152"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "In the Linux kernel, the following vulnerability has been resolved:\n\nusb: ohci-nxp: Fix refcount leak in ohci_hcd_nxp_probe\n\nof_parse_phandle() returns a node pointer with refcount\nincremented, we should use of_node_put() on it when not need anymore.\nAdd missing of_node_put() to avoid refcount leak.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "SUSE Linux Enterprise Micro 5.5:kernel-devel-rt-5.14.21-150500.13.100.1.noarch",
          "SUSE Linux Enterprise Micro 5.5:kernel-rt-5.14.21-150500.13.100.2.x86_64",
          "SUSE Linux Enterprise Micro 5.5:kernel-source-rt-5.14.21-150500.13.100.1.noarch"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2022-50152",
          "url": "https://www.suse.com/security/cve/CVE-2022-50152"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1244783 for CVE-2022-50152",
          "url": "https://bugzilla.suse.com/1244783"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "SUSE Linux Enterprise Micro 5.5:kernel-devel-rt-5.14.21-150500.13.100.1.noarch",
            "SUSE Linux Enterprise Micro 5.5:kernel-rt-5.14.21-150500.13.100.2.x86_64",
            "SUSE Linux Enterprise Micro 5.5:kernel-source-rt-5.14.21-150500.13.100.1.noarch"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 5.5,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
            "version": "3.1"
          },
          "products": [
            "SUSE Linux Enterprise Micro 5.5:kernel-devel-rt-5.14.21-150500.13.100.1.noarch",
            "SUSE Linux Enterprise Micro 5.5:kernel-rt-5.14.21-150500.13.100.2.x86_64",
            "SUSE Linux Enterprise Micro 5.5:kernel-source-rt-5.14.21-150500.13.100.1.noarch"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2025-07-15T14:31:35Z",
          "details": "moderate"
        }
      ],
      "title": "CVE-2022-50152"
    },
    {
      "cve": "CVE-2022-50153",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2022-50153"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "In the Linux kernel, the following vulnerability has been resolved:\n\nusb: host: Fix refcount leak in ehci_hcd_ppc_of_probe\n\nof_find_compatible_node() returns a node pointer with refcount\nincremented, we should use of_node_put() on it when done.\nAdd missing of_node_put() to avoid refcount leak.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "SUSE Linux Enterprise Micro 5.5:kernel-devel-rt-5.14.21-150500.13.100.1.noarch",
          "SUSE Linux Enterprise Micro 5.5:kernel-rt-5.14.21-150500.13.100.2.x86_64",
          "SUSE Linux Enterprise Micro 5.5:kernel-source-rt-5.14.21-150500.13.100.1.noarch"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2022-50153",
          "url": "https://www.suse.com/security/cve/CVE-2022-50153"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1244786 for CVE-2022-50153",
          "url": "https://bugzilla.suse.com/1244786"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "SUSE Linux Enterprise Micro 5.5:kernel-devel-rt-5.14.21-150500.13.100.1.noarch",
            "SUSE Linux Enterprise Micro 5.5:kernel-rt-5.14.21-150500.13.100.2.x86_64",
            "SUSE Linux Enterprise Micro 5.5:kernel-source-rt-5.14.21-150500.13.100.1.noarch"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 5.5,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
            "version": "3.1"
          },
          "products": [
            "SUSE Linux Enterprise Micro 5.5:kernel-devel-rt-5.14.21-150500.13.100.1.noarch",
            "SUSE Linux Enterprise Micro 5.5:kernel-rt-5.14.21-150500.13.100.2.x86_64",
            "SUSE Linux Enterprise Micro 5.5:kernel-source-rt-5.14.21-150500.13.100.1.noarch"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2025-07-15T14:31:35Z",
          "details": "moderate"
        }
      ],
      "title": "CVE-2022-50153"
    },
    {
      "cve": "CVE-2022-50154",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2022-50154"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "In the Linux kernel, the following vulnerability has been resolved:\n\nPCI: mediatek-gen3: Fix refcount leak in mtk_pcie_init_irq_domains()\n\nof_get_child_by_name() returns a node pointer with refcount incremented, so\nwe should use of_node_put() on it when we don\u0027t need it anymore.\n\nAdd missing of_node_put() to avoid refcount leak.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "SUSE Linux Enterprise Micro 5.5:kernel-devel-rt-5.14.21-150500.13.100.1.noarch",
          "SUSE Linux Enterprise Micro 5.5:kernel-rt-5.14.21-150500.13.100.2.x86_64",
          "SUSE Linux Enterprise Micro 5.5:kernel-source-rt-5.14.21-150500.13.100.1.noarch"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2022-50154",
          "url": "https://www.suse.com/security/cve/CVE-2022-50154"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1244784 for CVE-2022-50154",
          "url": "https://bugzilla.suse.com/1244784"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "SUSE Linux Enterprise Micro 5.5:kernel-devel-rt-5.14.21-150500.13.100.1.noarch",
            "SUSE Linux Enterprise Micro 5.5:kernel-rt-5.14.21-150500.13.100.2.x86_64",
            "SUSE Linux Enterprise Micro 5.5:kernel-source-rt-5.14.21-150500.13.100.1.noarch"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 5.5,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
            "version": "3.1"
          },
          "products": [
            "SUSE Linux Enterprise Micro 5.5:kernel-devel-rt-5.14.21-150500.13.100.1.noarch",
            "SUSE Linux Enterprise Micro 5.5:kernel-rt-5.14.21-150500.13.100.2.x86_64",
            "SUSE Linux Enterprise Micro 5.5:kernel-source-rt-5.14.21-150500.13.100.1.noarch"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2025-07-15T14:31:35Z",
          "details": "moderate"
        }
      ],
      "title": "CVE-2022-50154"
    },
    {
      "cve": "CVE-2022-50155",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2022-50155"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "In the Linux kernel, the following vulnerability has been resolved:\n\nmtd: parsers: ofpart: Fix refcount leak in bcm4908_partitions_fw_offset\n\nof_find_node_by_path() returns a node pointer with refcount incremented,\nwe should use of_node_put() on it when not need anymore.\nAdd missing of_node_put() to avoid refcount leak.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "SUSE Linux Enterprise Micro 5.5:kernel-devel-rt-5.14.21-150500.13.100.1.noarch",
          "SUSE Linux Enterprise Micro 5.5:kernel-rt-5.14.21-150500.13.100.2.x86_64",
          "SUSE Linux Enterprise Micro 5.5:kernel-source-rt-5.14.21-150500.13.100.1.noarch"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2022-50155",
          "url": "https://www.suse.com/security/cve/CVE-2022-50155"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1244781 for CVE-2022-50155",
          "url": "https://bugzilla.suse.com/1244781"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "SUSE Linux Enterprise Micro 5.5:kernel-devel-rt-5.14.21-150500.13.100.1.noarch",
            "SUSE Linux Enterprise Micro 5.5:kernel-rt-5.14.21-150500.13.100.2.x86_64",
            "SUSE Linux Enterprise Micro 5.5:kernel-source-rt-5.14.21-150500.13.100.1.noarch"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 5.5,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
            "version": "3.1"
          },
          "products": [
            "SUSE Linux Enterprise Micro 5.5:kernel-devel-rt-5.14.21-150500.13.100.1.noarch",
            "SUSE Linux Enterprise Micro 5.5:kernel-rt-5.14.21-150500.13.100.2.x86_64",
            "SUSE Linux Enterprise Micro 5.5:kernel-source-rt-5.14.21-150500.13.100.1.noarch"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2025-07-15T14:31:35Z",
          "details": "moderate"
        }
      ],
      "title": "CVE-2022-50155"
    },
    {
      "cve": "CVE-2022-50156",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2022-50156"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "In the Linux kernel, the following vulnerability has been resolved:\n\nHID: cp2112: prevent a buffer overflow in cp2112_xfer()\n\nSmatch warnings:\ndrivers/hid/hid-cp2112.c:793 cp2112_xfer() error: __memcpy()\n\u0027data-\u003eblock[1]\u0027 too small (33 vs 255)\ndrivers/hid/hid-cp2112.c:793 cp2112_xfer() error: __memcpy() \u0027buf\u0027 too\nsmall (64 vs 255)\n\nThe \u0027read_length\u0027 variable is provided by \u0027data-\u003eblock[0]\u0027 which comes\nfrom user and it(read_length) can take a value between 0-255. Add an\nupper bound to \u0027read_length\u0027 variable to prevent a buffer overflow in\nmemcpy().",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "SUSE Linux Enterprise Micro 5.5:kernel-devel-rt-5.14.21-150500.13.100.1.noarch",
          "SUSE Linux Enterprise Micro 5.5:kernel-rt-5.14.21-150500.13.100.2.x86_64",
          "SUSE Linux Enterprise Micro 5.5:kernel-source-rt-5.14.21-150500.13.100.1.noarch"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2022-50156",
          "url": "https://www.suse.com/security/cve/CVE-2022-50156"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1244782 for CVE-2022-50156",
          "url": "https://bugzilla.suse.com/1244782"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "SUSE Linux Enterprise Micro 5.5:kernel-devel-rt-5.14.21-150500.13.100.1.noarch",
            "SUSE Linux Enterprise Micro 5.5:kernel-rt-5.14.21-150500.13.100.2.x86_64",
            "SUSE Linux Enterprise Micro 5.5:kernel-source-rt-5.14.21-150500.13.100.1.noarch"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 5.5,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
            "version": "3.1"
          },
          "products": [
            "SUSE Linux Enterprise Micro 5.5:kernel-devel-rt-5.14.21-150500.13.100.1.noarch",
            "SUSE Linux Enterprise Micro 5.5:kernel-rt-5.14.21-150500.13.100.2.x86_64",
            "SUSE Linux Enterprise Micro 5.5:kernel-source-rt-5.14.21-150500.13.100.1.noarch"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2025-07-15T14:31:35Z",
          "details": "moderate"
        }
      ],
      "title": "CVE-2022-50156"
    },
    {
      "cve": "CVE-2022-50157",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2022-50157"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "In the Linux kernel, the following vulnerability has been resolved:\n\nPCI: microchip: Fix refcount leak in mc_pcie_init_irq_domains()\n\nof_get_next_child() returns a node pointer with refcount incremented, so we\nshould use of_node_put() on it when we don\u0027t need it anymore.\n\nmc_pcie_init_irq_domains() only calls of_node_put() in the normal path,\nmissing it in some error paths.  Add missing of_node_put() to avoid\nrefcount leak.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "SUSE Linux Enterprise Micro 5.5:kernel-devel-rt-5.14.21-150500.13.100.1.noarch",
          "SUSE Linux Enterprise Micro 5.5:kernel-rt-5.14.21-150500.13.100.2.x86_64",
          "SUSE Linux Enterprise Micro 5.5:kernel-source-rt-5.14.21-150500.13.100.1.noarch"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2022-50157",
          "url": "https://www.suse.com/security/cve/CVE-2022-50157"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1244780 for CVE-2022-50157",
          "url": "https://bugzilla.suse.com/1244780"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "SUSE Linux Enterprise Micro 5.5:kernel-devel-rt-5.14.21-150500.13.100.1.noarch",
            "SUSE Linux Enterprise Micro 5.5:kernel-rt-5.14.21-150500.13.100.2.x86_64",
            "SUSE Linux Enterprise Micro 5.5:kernel-source-rt-5.14.21-150500.13.100.1.noarch"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 5.5,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
            "version": "3.1"
          },
          "products": [
            "SUSE Linux Enterprise Micro 5.5:kernel-devel-rt-5.14.21-150500.13.100.1.noarch",
            "SUSE Linux Enterprise Micro 5.5:kernel-rt-5.14.21-150500.13.100.2.x86_64",
            "SUSE Linux Enterprise Micro 5.5:kernel-source-rt-5.14.21-150500.13.100.1.noarch"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2025-07-15T14:31:35Z",
          "details": "moderate"
        }
      ],
      "title": "CVE-2022-50157"
    },
    {
      "cve": "CVE-2022-50158",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2022-50158"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "In the Linux kernel, the following vulnerability has been resolved:\n\nmtd: partitions: Fix refcount leak in parse_redboot_of\n\nof_get_child_by_name() returns a node pointer with refcount\nincremented, we should use of_node_put() on it when not need anymore.\nAdd missing of_node_put() to avoid refcount leak.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "SUSE Linux Enterprise Micro 5.5:kernel-devel-rt-5.14.21-150500.13.100.1.noarch",
          "SUSE Linux Enterprise Micro 5.5:kernel-rt-5.14.21-150500.13.100.2.x86_64",
          "SUSE Linux Enterprise Micro 5.5:kernel-source-rt-5.14.21-150500.13.100.1.noarch"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2022-50158",
          "url": "https://www.suse.com/security/cve/CVE-2022-50158"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1244779 for CVE-2022-50158",
          "url": "https://bugzilla.suse.com/1244779"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "SUSE Linux Enterprise Micro 5.5:kernel-devel-rt-5.14.21-150500.13.100.1.noarch",
            "SUSE Linux Enterprise Micro 5.5:kernel-rt-5.14.21-150500.13.100.2.x86_64",
            "SUSE Linux Enterprise Micro 5.5:kernel-source-rt-5.14.21-150500.13.100.1.noarch"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 5.5,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
            "version": "3.1"
          },
          "products": [
            "SUSE Linux Enterprise Micro 5.5:kernel-devel-rt-5.14.21-150500.13.100.1.noarch",
            "SUSE Linux Enterprise Micro 5.5:kernel-rt-5.14.21-150500.13.100.2.x86_64",
            "SUSE Linux Enterprise Micro 5.5:kernel-source-rt-5.14.21-150500.13.100.1.noarch"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2025-07-15T14:31:35Z",
          "details": "moderate"
        }
      ],
      "title": "CVE-2022-50158"
    },
    {
      "cve": "CVE-2022-50160",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2022-50160"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "In the Linux kernel, the following vulnerability has been resolved:\n\nmtd: maps: Fix refcount leak in ap_flash_init\n\nof_find_matching_node() returns a node pointer with refcount\nincremented, we should use of_node_put() on it when not need anymore.\nAdd missing of_node_put() to avoid refcount leak.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "SUSE Linux Enterprise Micro 5.5:kernel-devel-rt-5.14.21-150500.13.100.1.noarch",
          "SUSE Linux Enterprise Micro 5.5:kernel-rt-5.14.21-150500.13.100.2.x86_64",
          "SUSE Linux Enterprise Micro 5.5:kernel-source-rt-5.14.21-150500.13.100.1.noarch"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2022-50160",
          "url": "https://www.suse.com/security/cve/CVE-2022-50160"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1244776 for CVE-2022-50160",
          "url": "https://bugzilla.suse.com/1244776"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "SUSE Linux Enterprise Micro 5.5:kernel-devel-rt-5.14.21-150500.13.100.1.noarch",
            "SUSE Linux Enterprise Micro 5.5:kernel-rt-5.14.21-150500.13.100.2.x86_64",
            "SUSE Linux Enterprise Micro 5.5:kernel-source-rt-5.14.21-150500.13.100.1.noarch"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 5.5,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
            "version": "3.1"
          },
          "products": [
            "SUSE Linux Enterprise Micro 5.5:kernel-devel-rt-5.14.21-150500.13.100.1.noarch",
            "SUSE Linux Enterprise Micro 5.5:kernel-rt-5.14.21-150500.13.100.2.x86_64",
            "SUSE Linux Enterprise Micro 5.5:kernel-source-rt-5.14.21-150500.13.100.1.noarch"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2025-07-15T14:31:35Z",
          "details": "moderate"
        }
      ],
      "title": "CVE-2022-50160"
    },
    {
      "cve": "CVE-2022-50161",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2022-50161"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "In the Linux kernel, the following vulnerability has been resolved:\n\nmtd: maps: Fix refcount leak in of_flash_probe_versatile\n\nof_find_matching_node_and_match() returns a node pointer with refcount\nincremented, we should use of_node_put() on it when not need anymore.\nAdd missing of_node_put() to avoid refcount leak.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "SUSE Linux Enterprise Micro 5.5:kernel-devel-rt-5.14.21-150500.13.100.1.noarch",
          "SUSE Linux Enterprise Micro 5.5:kernel-rt-5.14.21-150500.13.100.2.x86_64",
          "SUSE Linux Enterprise Micro 5.5:kernel-source-rt-5.14.21-150500.13.100.1.noarch"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2022-50161",
          "url": "https://www.suse.com/security/cve/CVE-2022-50161"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1244774 for CVE-2022-50161",
          "url": "https://bugzilla.suse.com/1244774"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "SUSE Linux Enterprise Micro 5.5:kernel-devel-rt-5.14.21-150500.13.100.1.noarch",
            "SUSE Linux Enterprise Micro 5.5:kernel-rt-5.14.21-150500.13.100.2.x86_64",
            "SUSE Linux Enterprise Micro 5.5:kernel-source-rt-5.14.21-150500.13.100.1.noarch"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 5.5,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
            "version": "3.1"
          },
          "products": [
            "SUSE Linux Enterprise Micro 5.5:kernel-devel-rt-5.14.21-150500.13.100.1.noarch",
            "SUSE Linux Enterprise Micro 5.5:kernel-rt-5.14.21-150500.13.100.2.x86_64",
            "SUSE Linux Enterprise Micro 5.5:kernel-source-rt-5.14.21-150500.13.100.1.noarch"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2025-07-15T14:31:35Z",
          "details": "moderate"
        }
      ],
      "title": "CVE-2022-50161"
    },
    {
      "cve": "CVE-2022-50162",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2022-50162"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "In the Linux kernel, the following vulnerability has been resolved:\n\nwifi: libertas: Fix possible refcount leak in if_usb_probe()\n\nusb_get_dev will be called before lbs_get_firmware_async which means that\nusb_put_dev need to be called when lbs_get_firmware_async fails.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "SUSE Linux Enterprise Micro 5.5:kernel-devel-rt-5.14.21-150500.13.100.1.noarch",
          "SUSE Linux Enterprise Micro 5.5:kernel-rt-5.14.21-150500.13.100.2.x86_64",
          "SUSE Linux Enterprise Micro 5.5:kernel-source-rt-5.14.21-150500.13.100.1.noarch"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2022-50162",
          "url": "https://www.suse.com/security/cve/CVE-2022-50162"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1244773 for CVE-2022-50162",
          "url": "https://bugzilla.suse.com/1244773"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "SUSE Linux Enterprise Micro 5.5:kernel-devel-rt-5.14.21-150500.13.100.1.noarch",
            "SUSE Linux Enterprise Micro 5.5:kernel-rt-5.14.21-150500.13.100.2.x86_64",
            "SUSE Linux Enterprise Micro 5.5:kernel-source-rt-5.14.21-150500.13.100.1.noarch"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 5.5,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
            "version": "3.1"
          },
          "products": [
            "SUSE Linux Enterprise Micro 5.5:kernel-devel-rt-5.14.21-150500.13.100.1.noarch",
            "SUSE Linux Enterprise Micro 5.5:kernel-rt-5.14.21-150500.13.100.2.x86_64",
            "SUSE Linux Enterprise Micro 5.5:kernel-source-rt-5.14.21-150500.13.100.1.noarch"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2025-07-15T14:31:35Z",
          "details": "moderate"
        }
      ],
      "title": "CVE-2022-50162"
    },
    {
      "cve": "CVE-2022-50164",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2022-50164"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "In the Linux kernel, the following vulnerability has been resolved:\n\nwifi: iwlwifi: mvm: fix double list_add at iwl_mvm_mac_wake_tx_queue\n\nAfter successfull station association, if station queues are disabled for\nsome reason, the related lists are not emptied. So if some new element is\nadded to the list in iwl_mvm_mac_wake_tx_queue, it can match with the old\none and produce a BUG like this:\n\n[   46.535263] list_add corruption. prev-\u003enext should be next (ffff94c1c318a360), but was 0000000000000000. (prev=ffff94c1d02d3388).\n[   46.535283] ------------[ cut here ]------------\n[   46.535284] kernel BUG at lib/list_debug.c:26!\n[   46.535290] invalid opcode: 0000 [#1] PREEMPT SMP PTI\n[   46.585304] CPU: 0 PID: 623 Comm: wpa_supplicant Not tainted 5.19.0-rc3+ #1\n[   46.592380] Hardware name: Dell Inc. Inspiron 660s/0478VN       , BIOS A07 08/24/2012\n[   46.600336] RIP: 0010:__list_add_valid.cold+0x3d/0x3f\n[   46.605475] Code: f2 4c 89 c1 48 89 fe 48 c7 c7 c8 40 67 93 e8 20 cc fd ff 0f 0b 48 89 d1 4c 89 c6 4c 89 ca 48 c7 c7 70 40 67 93 e8 09 cc fd ff \u003c0f\u003e 0b 48 89 fe 48 c7 c7 00 41 67 93 e8 f8 cb fd ff 0f 0b 48 89 d1\n[   46.624469] RSP: 0018:ffffb20800ab76d8 EFLAGS: 00010286\n[   46.629854] RAX: 0000000000000075 RBX: ffff94c1c318a0e0 RCX: 0000000000000000\n[   46.637105] RDX: 0000000000000201 RSI: ffffffff9365e100 RDI: 00000000ffffffff\n[   46.644356] RBP: ffff94c1c5f43370 R08: 0000000000000075 R09: 3064316334396666\n[   46.651607] R10: 3364323064316334 R11: 39666666663d7665 R12: ffff94c1c5f43388\n[   46.658857] R13: ffff94c1d02d3388 R14: ffff94c1c318a360 R15: ffff94c1cf2289c0\n[   46.666108] FS:  00007f65634ff7c0(0000) GS:ffff94c1da200000(0000) knlGS:0000000000000000\n[   46.674331] CS:  0010 DS: 0000 ES: 0000 CR0: 0000000080050033\n[   46.680170] CR2: 00007f7dfe984460 CR3: 000000010e894003 CR4: 00000000000606f0\n[   46.687422] Call Trace:\n[   46.689906]  \u003cTASK\u003e\n[   46.691950]  iwl_mvm_mac_wake_tx_queue+0xec/0x15c [iwlmvm]\n[   46.697601]  ieee80211_queue_skb+0x4b3/0x720 [mac80211]\n[   46.702973]  ? sta_info_get+0x46/0x60 [mac80211]\n[   46.707703]  ieee80211_tx+0xad/0x110 [mac80211]\n[   46.712355]  __ieee80211_tx_skb_tid_band+0x71/0x90 [mac80211]\n...\n\nIn order to avoid this problem, we must also remove the related lists when\nstation queues are disabled.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "SUSE Linux Enterprise Micro 5.5:kernel-devel-rt-5.14.21-150500.13.100.1.noarch",
          "SUSE Linux Enterprise Micro 5.5:kernel-rt-5.14.21-150500.13.100.2.x86_64",
          "SUSE Linux Enterprise Micro 5.5:kernel-source-rt-5.14.21-150500.13.100.1.noarch"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2022-50164",
          "url": "https://www.suse.com/security/cve/CVE-2022-50164"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1244770 for CVE-2022-50164",
          "url": "https://bugzilla.suse.com/1244770"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "SUSE Linux Enterprise Micro 5.5:kernel-devel-rt-5.14.21-150500.13.100.1.noarch",
            "SUSE Linux Enterprise Micro 5.5:kernel-rt-5.14.21-150500.13.100.2.x86_64",
            "SUSE Linux Enterprise Micro 5.5:kernel-source-rt-5.14.21-150500.13.100.1.noarch"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 5.5,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
            "version": "3.1"
          },
          "products": [
            "SUSE Linux Enterprise Micro 5.5:kernel-devel-rt-5.14.21-150500.13.100.1.noarch",
            "SUSE Linux Enterprise Micro 5.5:kernel-rt-5.14.21-150500.13.100.2.x86_64",
            "SUSE Linux Enterprise Micro 5.5:kernel-source-rt-5.14.21-150500.13.100.1.noarch"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2025-07-15T14:31:35Z",
          "details": "moderate"
        }
      ],
      "title": "CVE-2022-50164"
    },
    {
      "cve": "CVE-2022-50165",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2022-50165"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "In the Linux kernel, the following vulnerability has been resolved:\n\nwifi: wil6210: debugfs: fix uninitialized variable use in `wil_write_file_wmi()`\n\nCommit 7a4836560a61 changes simple_write_to_buffer() with memdup_user()\nbut it forgets to change the value to be returned that came from\nsimple_write_to_buffer() call. It results in the following warning:\n\n  warning: variable \u0027rc\u0027 is uninitialized when used here [-Wuninitialized]\n           return rc;\n                  ^~\n\nRemove rc variable and just return the passed in length if the\nmemdup_user() succeeds.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "SUSE Linux Enterprise Micro 5.5:kernel-devel-rt-5.14.21-150500.13.100.1.noarch",
          "SUSE Linux Enterprise Micro 5.5:kernel-rt-5.14.21-150500.13.100.2.x86_64",
          "SUSE Linux Enterprise Micro 5.5:kernel-source-rt-5.14.21-150500.13.100.1.noarch"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2022-50165",
          "url": "https://www.suse.com/security/cve/CVE-2022-50165"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1244771 for CVE-2022-50165",
          "url": "https://bugzilla.suse.com/1244771"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "SUSE Linux Enterprise Micro 5.5:kernel-devel-rt-5.14.21-150500.13.100.1.noarch",
            "SUSE Linux Enterprise Micro 5.5:kernel-rt-5.14.21-150500.13.100.2.x86_64",
            "SUSE Linux Enterprise Micro 5.5:kernel-source-rt-5.14.21-150500.13.100.1.noarch"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 4.4,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H",
            "version": "3.1"
          },
          "products": [
            "SUSE Linux Enterprise Micro 5.5:kernel-devel-rt-5.14.21-150500.13.100.1.noarch",
            "SUSE Linux Enterprise Micro 5.5:kernel-rt-5.14.21-150500.13.100.2.x86_64",
            "SUSE Linux Enterprise Micro 5.5:kernel-source-rt-5.14.21-150500.13.100.1.noarch"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2025-07-15T14:31:35Z",
          "details": "moderate"
        }
      ],
      "title": "CVE-2022-50165"
    },
    {
      "cve": "CVE-2022-50166",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2022-50166"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "In the Linux kernel, the following vulnerability has been resolved:\n\nBluetooth: When HCI work queue is drained, only queue chained work\n\nThe HCI command, event, and data packet processing workqueue is drained\nto avoid deadlock in commit\n76727c02c1e1 (\"Bluetooth: Call drain_workqueue() before resetting state\").\n\nThere is another delayed work, which will queue command to this drained\nworkqueue. Which results in the following error report:\n\nBluetooth: hci2: command 0x040f tx timeout\nWARNING: CPU: 1 PID: 18374 at kernel/workqueue.c:1438 __queue_work+0xdad/0x1140\nWorkqueue: events hci_cmd_timeout\nRIP: 0010:__queue_work+0xdad/0x1140\nRSP: 0000:ffffc90002cffc60 EFLAGS: 00010093\nRAX: 0000000000000000 RBX: ffff8880b9d3ec00 RCX: 0000000000000000\nRDX: ffff888024ba0000 RSI: ffffffff814e048d RDI: ffff8880b9d3ec08\nRBP: 0000000000000008 R08: 0000000000000000 R09: 00000000b9d39700\nR10: ffffffff814f73c6 R11: 0000000000000000 R12: ffff88807cce4c60\nR13: 0000000000000000 R14: ffff8880796d8800 R15: ffff8880796d8800\nFS:  0000000000000000(0000) GS:ffff8880b9d00000(0000) knlGS:0000000000000000\nCS:  0010 DS: 0000 ES: 0000 CR0: 0000000080050033\nCR2: 000000c0174b4000 CR3: 000000007cae9000 CR4: 00000000003506e0\nDR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000\nDR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400\nCall Trace:\n \u003cTASK\u003e\n ? queue_work_on+0xcb/0x110\n ? lockdep_hardirqs_off+0x90/0xd0\n queue_work_on+0xee/0x110\n process_one_work+0x996/0x1610\n ? pwq_dec_nr_in_flight+0x2a0/0x2a0\n ? rwlock_bug.part.0+0x90/0x90\n ? _raw_spin_lock_irq+0x41/0x50\n worker_thread+0x665/0x1080\n ? process_one_work+0x1610/0x1610\n kthread+0x2e9/0x3a0\n ? kthread_complete_and_exit+0x40/0x40\n ret_from_fork+0x1f/0x30\n \u003c/TASK\u003e\n\nTo fix this, we can add a new HCI_DRAIN_WQ flag, and don\u0027t queue the\ntimeout workqueue while command workqueue is draining.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "SUSE Linux Enterprise Micro 5.5:kernel-devel-rt-5.14.21-150500.13.100.1.noarch",
          "SUSE Linux Enterprise Micro 5.5:kernel-rt-5.14.21-150500.13.100.2.x86_64",
          "SUSE Linux Enterprise Micro 5.5:kernel-source-rt-5.14.21-150500.13.100.1.noarch"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2022-50166",
          "url": "https://www.suse.com/security/cve/CVE-2022-50166"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1244772 for CVE-2022-50166",
          "url": "https://bugzilla.suse.com/1244772"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "SUSE Linux Enterprise Micro 5.5:kernel-devel-rt-5.14.21-150500.13.100.1.noarch",
            "SUSE Linux Enterprise Micro 5.5:kernel-rt-5.14.21-150500.13.100.2.x86_64",
            "SUSE Linux Enterprise Micro 5.5:kernel-source-rt-5.14.21-150500.13.100.1.noarch"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 5.5,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
            "version": "3.1"
          },
          "products": [
            "SUSE Linux Enterprise Micro 5.5:kernel-devel-rt-5.14.21-150500.13.100.1.noarch",
            "SUSE Linux Enterprise Micro 5.5:kernel-rt-5.14.21-150500.13.100.2.x86_64",
            "SUSE Linux Enterprise Micro 5.5:kernel-source-rt-5.14.21-150500.13.100.1.noarch"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2025-07-15T14:31:35Z",
          "details": "moderate"
        }
      ],
      "title": "CVE-2022-50166"
    },
    {
      "cve": "CVE-2022-50169",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2022-50169"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "In the Linux kernel, the following vulnerability has been resolved:\n\nwifi: wil6210: debugfs: fix info leak in wil_write_file_wmi()\n\nThe simple_write_to_buffer() function will succeed if even a single\nbyte is initialized.  However, we need to initialize the whole buffer\nto prevent information leaks.  Just use memdup_user().",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "SUSE Linux Enterprise Micro 5.5:kernel-devel-rt-5.14.21-150500.13.100.1.noarch",
          "SUSE Linux Enterprise Micro 5.5:kernel-rt-5.14.21-150500.13.100.2.x86_64",
          "SUSE Linux Enterprise Micro 5.5:kernel-source-rt-5.14.21-150500.13.100.1.noarch"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2022-50169",
          "url": "https://www.suse.com/security/cve/CVE-2022-50169"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1244767 for CVE-2022-50169",
          "url": "https://bugzilla.suse.com/1244767"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "SUSE Linux Enterprise Micro 5.5:kernel-devel-rt-5.14.21-150500.13.100.1.noarch",
            "SUSE Linux Enterprise Micro 5.5:kernel-rt-5.14.21-150500.13.100.2.x86_64",
            "SUSE Linux Enterprise Micro 5.5:kernel-source-rt-5.14.21-150500.13.100.1.noarch"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 5.5,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
            "version": "3.1"
          },
          "products": [
            "SUSE Linux Enterprise Micro 5.5:kernel-devel-rt-5.14.21-150500.13.100.1.noarch",
            "SUSE Linux Enterprise Micro 5.5:kernel-rt-5.14.21-150500.13.100.2.x86_64",
            "SUSE Linux Enterprise Micro 5.5:kernel-source-rt-5.14.21-150500.13.100.1.noarch"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2025-07-15T14:31:35Z",
          "details": "moderate"
        }
      ],
      "title": "CVE-2022-50169"
    },
    {
      "cve": "CVE-2022-50171",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2022-50171"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "In the Linux kernel, the following vulnerability has been resolved:\n\ncrypto: hisilicon/sec - don\u0027t sleep when in softirq\n\nWhen kunpeng920 encryption driver is used to deencrypt and decrypt\npackets during the softirq, it is not allowed to use mutex lock. The\nkernel will report the following error:\n\nBUG: scheduling while atomic: swapper/57/0/0x00000300\nCall trace:\ndump_backtrace+0x0/0x1e4\nshow_stack+0x20/0x2c\ndump_stack+0xd8/0x140\n__schedule_bug+0x68/0x80\n__schedule+0x728/0x840\nschedule+0x50/0xe0\nschedule_preempt_disabled+0x18/0x24\n__mutex_lock.constprop.0+0x594/0x5dc\n__mutex_lock_slowpath+0x1c/0x30\nmutex_lock+0x50/0x60\nsec_request_init+0x8c/0x1a0 [hisi_sec2]\nsec_process+0x28/0x1ac [hisi_sec2]\nsec_skcipher_crypto+0xf4/0x1d4 [hisi_sec2]\nsec_skcipher_encrypt+0x1c/0x30 [hisi_sec2]\ncrypto_skcipher_encrypt+0x2c/0x40\ncrypto_authenc_encrypt+0xc8/0xfc [authenc]\ncrypto_aead_encrypt+0x2c/0x40\nechainiv_encrypt+0x144/0x1a0 [echainiv]\ncrypto_aead_encrypt+0x2c/0x40\nesp_output_tail+0x348/0x5c0 [esp4]\nesp_output+0x120/0x19c [esp4]\nxfrm_output_one+0x25c/0x4d4\nxfrm_output_resume+0x6c/0x1fc\nxfrm_output+0xac/0x3c0\nxfrm4_output+0x64/0x130\nip_build_and_send_pkt+0x158/0x20c\ntcp_v4_send_synack+0xdc/0x1f0\ntcp_conn_request+0x7d0/0x994\ntcp_v4_conn_request+0x58/0x6c\ntcp_v6_conn_request+0xf0/0x100\ntcp_rcv_state_process+0x1cc/0xd60\ntcp_v4_do_rcv+0x10c/0x250\ntcp_v4_rcv+0xfc4/0x10a4\nip_protocol_deliver_rcu+0xf4/0x200\nip_local_deliver_finish+0x58/0x70\nip_local_deliver+0x68/0x120\nip_sublist_rcv_finish+0x70/0x94\nip_list_rcv_finish.constprop.0+0x17c/0x1d0\nip_sublist_rcv+0x40/0xb0\nip_list_rcv+0x140/0x1dc\n__netif_receive_skb_list_core+0x154/0x28c\n__netif_receive_skb_list+0x120/0x1a0\nnetif_receive_skb_list_internal+0xe4/0x1f0\nnapi_complete_done+0x70/0x1f0\ngro_cell_poll+0x9c/0xb0\nnapi_poll+0xcc/0x264\nnet_rx_action+0xd4/0x21c\n__do_softirq+0x130/0x358\nirq_exit+0x11c/0x13c\n__handle_domain_irq+0x88/0xf0\ngic_handle_irq+0x78/0x2c0\nel1_irq+0xb8/0x140\narch_cpu_idle+0x18/0x40\ndefault_idle_call+0x5c/0x1c0\ncpuidle_idle_call+0x174/0x1b0\ndo_idle+0xc8/0x160\ncpu_startup_entry+0x30/0x11c\nsecondary_start_kernel+0x158/0x1e4\nsoftirq: huh, entered softirq 3 NET_RX 0000000093774ee4 with\npreempt_count 00000100, exited with fffffe00?",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "SUSE Linux Enterprise Micro 5.5:kernel-devel-rt-5.14.21-150500.13.100.1.noarch",
          "SUSE Linux Enterprise Micro 5.5:kernel-rt-5.14.21-150500.13.100.2.x86_64",
          "SUSE Linux Enterprise Micro 5.5:kernel-source-rt-5.14.21-150500.13.100.1.noarch"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2022-50171",
          "url": "https://www.suse.com/security/cve/CVE-2022-50171"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1244765 for CVE-2022-50171",
          "url": "https://bugzilla.suse.com/1244765"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "SUSE Linux Enterprise Micro 5.5:kernel-devel-rt-5.14.21-150500.13.100.1.noarch",
            "SUSE Linux Enterprise Micro 5.5:kernel-rt-5.14.21-150500.13.100.2.x86_64",
            "SUSE Linux Enterprise Micro 5.5:kernel-source-rt-5.14.21-150500.13.100.1.noarch"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 5.5,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
            "version": "3.1"
          },
          "products": [
            "SUSE Linux Enterprise Micro 5.5:kernel-devel-rt-5.14.21-150500.13.100.1.noarch",
            "SUSE Linux Enterprise Micro 5.5:kernel-rt-5.14.21-150500.13.100.2.x86_64",
            "SUSE Linux Enterprise Micro 5.5:kernel-source-rt-5.14.21-150500.13.100.1.noarch"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2025-07-15T14:31:35Z",
          "details": "moderate"
        }
      ],
      "title": "CVE-2022-50171"
    },
    {
      "cve": "CVE-2022-50172",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2022-50172"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "In the Linux kernel, the following vulnerability has been resolved:\n\nmt76: mt76x02u: fix possible memory leak in __mt76x02u_mcu_send_msg\n\nFree the skb if mt76u_bulk_msg fails in __mt76x02u_mcu_send_msg routine.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "SUSE Linux Enterprise Micro 5.5:kernel-devel-rt-5.14.21-150500.13.100.1.noarch",
          "SUSE Linux Enterprise Micro 5.5:kernel-rt-5.14.21-150500.13.100.2.x86_64",
          "SUSE Linux Enterprise Micro 5.5:kernel-source-rt-5.14.21-150500.13.100.1.noarch"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2022-50172",
          "url": "https://www.suse.com/security/cve/CVE-2022-50172"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1244764 for CVE-2022-50172",
          "url": "https://bugzilla.suse.com/1244764"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "SUSE Linux Enterprise Micro 5.5:kernel-devel-rt-5.14.21-150500.13.100.1.noarch",
            "SUSE Linux Enterprise Micro 5.5:kernel-rt-5.14.21-150500.13.100.2.x86_64",
            "SUSE Linux Enterprise Micro 5.5:kernel-source-rt-5.14.21-150500.13.100.1.noarch"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 5.5,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
            "version": "3.1"
          },
          "products": [
            "SUSE Linux Enterprise Micro 5.5:kernel-devel-rt-5.14.21-150500.13.100.1.noarch",
            "SUSE Linux Enterprise Micro 5.5:kernel-rt-5.14.21-150500.13.100.2.x86_64",
            "SUSE Linux Enterprise Micro 5.5:kernel-source-rt-5.14.21-150500.13.100.1.noarch"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2025-07-15T14:31:35Z",
          "details": "moderate"
        }
      ],
      "title": "CVE-2022-50172"
    },
    {
      "cve": "CVE-2022-50173",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2022-50173"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "In the Linux kernel, the following vulnerability has been resolved:\n\ndrm/msm/mdp5: Fix global state lock backoff\n\nWe need to grab the lock after the early return for !hwpipe case.\nOtherwise, we could have hit contention yet still returned 0.\n\nFixes an issue that the new CONFIG_DRM_DEBUG_MODESET_LOCK stuff flagged\nin CI:\n\n   WARNING: CPU: 0 PID: 282 at drivers/gpu/drm/drm_modeset_lock.c:296 drm_modeset_lock+0xf8/0x154\n   Modules linked in:\n   CPU: 0 PID: 282 Comm: kms_cursor_lega Tainted: G        W         5.19.0-rc2-15930-g875cc8bc536a #1\n   Hardware name: Qualcomm Technologies, Inc. DB820c (DT)\n   pstate: 60000005 (nZCv daif -PAN -UAO -TCO -DIT -SSBS BTYPE=--)\n   pc : drm_modeset_lock+0xf8/0x154\n   lr : drm_atomic_get_private_obj_state+0x84/0x170\n   sp : ffff80000cfab6a0\n   x29: ffff80000cfab6a0 x28: 0000000000000000 x27: ffff000083bc4d00\n   x26: 0000000000000038 x25: 0000000000000000 x24: ffff80000957ca58\n   x23: 0000000000000000 x22: ffff000081ace080 x21: 0000000000000001\n   x20: ffff000081acec18 x19: ffff80000cfabb80 x18: 0000000000000038\n   x17: 0000000000000000 x16: 0000000000000000 x15: fffffffffffea0d0\n   x14: 0000000000000000 x13: 284e4f5f4e524157 x12: 5f534b434f4c5f47\n   x11: ffff80000a386aa8 x10: 0000000000000029 x9 : ffff80000cfab610\n   x8 : 0000000000000029 x7 : 0000000000000014 x6 : 0000000000000000\n   x5 : 0000000000000001 x4 : ffff8000081ad904 x3 : 0000000000000029\n   x2 : ffff0000801db4c0 x1 : ffff80000cfabb80 x0 : ffff000081aceb58\n   Call trace:\n    drm_modeset_lock+0xf8/0x154\n    drm_atomic_get_private_obj_state+0x84/0x170\n    mdp5_get_global_state+0x54/0x6c\n    mdp5_pipe_release+0x2c/0xd4\n    mdp5_plane_atomic_check+0x2ec/0x414\n    drm_atomic_helper_check_planes+0xd8/0x210\n    drm_atomic_helper_check+0x54/0xb0\n    ...\n   ---[ end trace 0000000000000000 ]---\n   drm_modeset_lock attempting to lock a contended lock without backoff:\n      drm_modeset_lock+0x148/0x154\n      mdp5_get_global_state+0x30/0x6c\n      mdp5_pipe_release+0x2c/0xd4\n      mdp5_plane_atomic_check+0x290/0x414\n      drm_atomic_helper_check_planes+0xd8/0x210\n      drm_atomic_helper_check+0x54/0xb0\n      drm_atomic_check_only+0x4b0/0x8f4\n      drm_atomic_commit+0x68/0xe0\n\nPatchwork: https://patchwork.freedesktop.org/patch/492701/",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "SUSE Linux Enterprise Micro 5.5:kernel-devel-rt-5.14.21-150500.13.100.1.noarch",
          "SUSE Linux Enterprise Micro 5.5:kernel-rt-5.14.21-150500.13.100.2.x86_64",
          "SUSE Linux Enterprise Micro 5.5:kernel-source-rt-5.14.21-150500.13.100.1.noarch"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2022-50173",
          "url": "https://www.suse.com/security/cve/CVE-2022-50173"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1244992 for CVE-2022-50173",
          "url": "https://bugzilla.suse.com/1244992"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "SUSE Linux Enterprise Micro 5.5:kernel-devel-rt-5.14.21-150500.13.100.1.noarch",
            "SUSE Linux Enterprise Micro 5.5:kernel-rt-5.14.21-150500.13.100.2.x86_64",
            "SUSE Linux Enterprise Micro 5.5:kernel-source-rt-5.14.21-150500.13.100.1.noarch"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 5.5,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
            "version": "3.1"
          },
          "products": [
            "SUSE Linux Enterprise Micro 5.5:kernel-devel-rt-5.14.21-150500.13.100.1.noarch",
            "SUSE Linux Enterprise Micro 5.5:kernel-rt-5.14.21-150500.13.100.2.x86_64",
            "SUSE Linux Enterprise Micro 5.5:kernel-source-rt-5.14.21-150500.13.100.1.noarch"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2025-07-15T14:31:35Z",
          "details": "moderate"
        }
      ],
      "title": "CVE-2022-50173"
    },
    {
      "cve": "CVE-2022-50175",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2022-50175"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "In the Linux kernel, the following vulnerability has been resolved:\n\nmedia: tw686x: Fix memory leak in tw686x_video_init\n\nvideo_device_alloc() allocates memory for vdev,\nwhen video_register_device() fails, it doesn\u0027t release the memory and\nleads to memory leak, call video_device_release() to fix this.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "SUSE Linux Enterprise Micro 5.5:kernel-devel-rt-5.14.21-150500.13.100.1.noarch",
          "SUSE Linux Enterprise Micro 5.5:kernel-rt-5.14.21-150500.13.100.2.x86_64",
          "SUSE Linux Enterprise Micro 5.5:kernel-source-rt-5.14.21-150500.13.100.1.noarch"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2022-50175",
          "url": "https://www.suse.com/security/cve/CVE-2022-50175"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1244903 for CVE-2022-50175",
          "url": "https://bugzilla.suse.com/1244903"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "SUSE Linux Enterprise Micro 5.5:kernel-devel-rt-5.14.21-150500.13.100.1.noarch",
            "SUSE Linux Enterprise Micro 5.5:kernel-rt-5.14.21-150500.13.100.2.x86_64",
            "SUSE Linux Enterprise Micro 5.5:kernel-source-rt-5.14.21-150500.13.100.1.noarch"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 5.5,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
            "version": "3.1"
          },
          "products": [
            "SUSE Linux Enterprise Micro 5.5:kernel-devel-rt-5.14.21-150500.13.100.1.noarch",
            "SUSE Linux Enterprise Micro 5.5:kernel-rt-5.14.21-150500.13.100.2.x86_64",
            "SUSE Linux Enterprise Micro 5.5:kernel-source-rt-5.14.21-150500.13.100.1.noarch"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2025-07-15T14:31:35Z",
          "details": "moderate"
        }
      ],
      "title": "CVE-2022-50175"
    },
    {
      "cve": "CVE-2022-50176",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2022-50176"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "In the Linux kernel, the following vulnerability has been resolved:\n\ndrm/mcde: Fix refcount leak in mcde_dsi_bind\n\nEvery iteration of for_each_available_child_of_node() decrements\nthe reference counter of the previous node. There is no decrement\nwhen break out from the loop and results in refcount leak.\nAdd missing of_node_put() to fix this.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "SUSE Linux Enterprise Micro 5.5:kernel-devel-rt-5.14.21-150500.13.100.1.noarch",
          "SUSE Linux Enterprise Micro 5.5:kernel-rt-5.14.21-150500.13.100.2.x86_64",
          "SUSE Linux Enterprise Micro 5.5:kernel-source-rt-5.14.21-150500.13.100.1.noarch"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2022-50176",
          "url": "https://www.suse.com/security/cve/CVE-2022-50176"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1244902 for CVE-2022-50176",
          "url": "https://bugzilla.suse.com/1244902"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "SUSE Linux Enterprise Micro 5.5:kernel-devel-rt-5.14.21-150500.13.100.1.noarch",
            "SUSE Linux Enterprise Micro 5.5:kernel-rt-5.14.21-150500.13.100.2.x86_64",
            "SUSE Linux Enterprise Micro 5.5:kernel-source-rt-5.14.21-150500.13.100.1.noarch"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 5.5,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
            "version": "3.1"
          },
          "products": [
            "SUSE Linux Enterprise Micro 5.5:kernel-devel-rt-5.14.21-150500.13.100.1.noarch",
            "SUSE Linux Enterprise Micro 5.5:kernel-rt-5.14.21-150500.13.100.2.x86_64",
            "SUSE Linux Enterprise Micro 5.5:kernel-source-rt-5.14.21-150500.13.100.1.noarch"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2025-07-15T14:31:35Z",
          "details": "moderate"
        }
      ],
      "title": "CVE-2022-50176"
    },
    {
      "cve": "CVE-2022-50178",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2022-50178"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "In the Linux kernel, the following vulnerability has been resolved:\n\nwifi: rtw89: 8852a: rfk: fix div 0 exception\n\nThe DPK is a kind of RF calibration whose algorithm is to fine tune\nparameters and calibrate, and check the result. If the result isn\u0027t good\nenough, it could adjust parameters and try again.\n\nThis issue is to read and show the result, but it could be a negative\ncalibration result that causes divisor 0 and core dump. So, fix it by\nphy_div() that does division only if divisor isn\u0027t zero; otherwise,\nzero is adopted.\n\n  divide error: 0000 [#1] PREEMPT SMP NOPTI\n  CPU: 1 PID: 728 Comm: wpa_supplicant Not tainted 5.10.114-16019-g462a1661811a #1 \u003cHASH:d024 28\u003e\n  RIP: 0010:rtw8852a_dpk+0x14ae/0x288f [rtw89_core]\n  RSP: 0018:ffffa9bb412a7520 EFLAGS: 00010246\n  RAX: 0000000000000000 RBX: 0000000000000000 RCX: 0000000000000000\n  RDX: 0000000000000000 RSI: 00000000000180fc RDI: ffffa141d01023c0\n  RBP: ffffa9bb412a76a0 R08: 0000000000001319 R09: 00000000ffffff92\n  R10: ffffffffc0292de3 R11: ffffffffc00d2f51 R12: 0000000000000000\n  R13: ffffa141d01023c0 R14: ffffffffc0290250 R15: ffffa141d0102638\n  FS:  00007fa99f5c2740(0000) GS:ffffa142e5e80000(0000) knlGS:0000000000000000\n  CS:  0010 DS: 0000 ES: 0000 CR0: 0000000080050033\n  CR2: 0000000013e8e010 CR3: 0000000110d2c000 CR4: 0000000000750ee0\n  PKRU: 55555554\n  Call Trace:\n   rtw89_core_sta_add+0x95/0x9c [rtw89_core \u003cHASH:d239 29\u003e]\n   rtw89_ops_sta_state+0x5d/0x108 [rtw89_core \u003cHASH:d239 29\u003e]\n   drv_sta_state+0x115/0x66f [mac80211 \u003cHASH:81fe 30\u003e]\n   sta_info_insert_rcu+0x45c/0x713 [mac80211 \u003cHASH:81fe 30\u003e]\n   sta_info_insert+0xf/0x1b [mac80211 \u003cHASH:81fe 30\u003e]\n   ieee80211_prep_connection+0x9d6/0xb0c [mac80211 \u003cHASH:81fe 30\u003e]\n   ieee80211_mgd_auth+0x2aa/0x352 [mac80211 \u003cHASH:81fe 30\u003e]\n   cfg80211_mlme_auth+0x160/0x1f6 [cfg80211 \u003cHASH:00cd 31\u003e]\n   nl80211_authenticate+0x2e5/0x306 [cfg80211 \u003cHASH:00cd 31\u003e]\n   genl_rcv_msg+0x371/0x3a1\n   ? nl80211_stop_sched_scan+0xe5/0xe5 [cfg80211 \u003cHASH:00cd 31\u003e]\n   ? genl_rcv+0x36/0x36\n   netlink_rcv_skb+0x8a/0xf9\n   genl_rcv+0x28/0x36\n   netlink_unicast+0x27b/0x3a0\n   netlink_sendmsg+0x2aa/0x469\n   sock_sendmsg_nosec+0x49/0x4d\n   ____sys_sendmsg+0xe5/0x213\n   __sys_sendmsg+0xec/0x157\n   ? syscall_enter_from_user_mode+0xd7/0x116\n   do_syscall_64+0x43/0x55\n   entry_SYSCALL_64_after_hwframe+0x44/0xa9\n  RIP: 0033:0x7fa99f6e689b",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "SUSE Linux Enterprise Micro 5.5:kernel-devel-rt-5.14.21-150500.13.100.1.noarch",
          "SUSE Linux Enterprise Micro 5.5:kernel-rt-5.14.21-150500.13.100.2.x86_64",
          "SUSE Linux Enterprise Micro 5.5:kernel-source-rt-5.14.21-150500.13.100.1.noarch"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2022-50178",
          "url": "https://www.suse.com/security/cve/CVE-2022-50178"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1244900 for CVE-2022-50178",
          "url": "https://bugzilla.suse.com/1244900"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "SUSE Linux Enterprise Micro 5.5:kernel-devel-rt-5.14.21-150500.13.100.1.noarch",
            "SUSE Linux Enterprise Micro 5.5:kernel-rt-5.14.21-150500.13.100.2.x86_64",
            "SUSE Linux Enterprise Micro 5.5:kernel-source-rt-5.14.21-150500.13.100.1.noarch"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 5.5,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
            "version": "3.1"
          },
          "products": [
            "SUSE Linux Enterprise Micro 5.5:kernel-devel-rt-5.14.21-150500.13.100.1.noarch",
            "SUSE Linux Enterprise Micro 5.5:kernel-rt-5.14.21-150500.13.100.2.x86_64",
            "SUSE Linux Enterprise Micro 5.5:kernel-source-rt-5.14.21-150500.13.100.1.noarch"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2025-07-15T14:31:35Z",
          "details": "moderate"
        }
      ],
      "title": "CVE-2022-50178"
    },
    {
      "cve": "CVE-2022-50179",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2022-50179"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "In the Linux kernel, the following vulnerability has been resolved:\n\nath9k: fix use-after-free in ath9k_hif_usb_rx_cb\n\nSyzbot reported use-after-free Read in ath9k_hif_usb_rx_cb() [0]. The\nproblem was in incorrect htc_handle-\u003edrv_priv initialization.\n\nProbable call trace which can trigger use-after-free:\n\nath9k_htc_probe_device()\n  /* htc_handle-\u003edrv_priv = priv; */\n  ath9k_htc_wait_for_target()      \u003c--- Failed\n  ieee80211_free_hw()\t\t   \u003c--- priv pointer is freed\n\n\u003cIRQ\u003e\n...\nath9k_hif_usb_rx_cb()\n  ath9k_hif_usb_rx_stream()\n   RX_STAT_INC()\t\t\u003c--- htc_handle-\u003edrv_priv access\n\nIn order to not add fancy protection for drv_priv we can move\nhtc_handle-\u003edrv_priv initialization at the end of the\nath9k_htc_probe_device() and add helper macro to make\nall *_STAT_* macros NULL safe, since syzbot has reported related NULL\nderef in that macros [1]",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "SUSE Linux Enterprise Micro 5.5:kernel-devel-rt-5.14.21-150500.13.100.1.noarch",
          "SUSE Linux Enterprise Micro 5.5:kernel-rt-5.14.21-150500.13.100.2.x86_64",
          "SUSE Linux Enterprise Micro 5.5:kernel-source-rt-5.14.21-150500.13.100.1.noarch"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2022-50179",
          "url": "https://www.suse.com/security/cve/CVE-2022-50179"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1244886 for CVE-2022-50179",
          "url": "https://bugzilla.suse.com/1244886"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "SUSE Linux Enterprise Micro 5.5:kernel-devel-rt-5.14.21-150500.13.100.1.noarch",
            "SUSE Linux Enterprise Micro 5.5:kernel-rt-5.14.21-150500.13.100.2.x86_64",
            "SUSE Linux Enterprise Micro 5.5:kernel-source-rt-5.14.21-150500.13.100.1.noarch"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 5.5,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
            "version": "3.1"
          },
          "products": [
            "SUSE Linux Enterprise Micro 5.5:kernel-devel-rt-5.14.21-150500.13.100.1.noarch",
            "SUSE Linux Enterprise Micro 5.5:kernel-rt-5.14.21-150500.13.100.2.x86_64",
            "SUSE Linux Enterprise Micro 5.5:kernel-source-rt-5.14.21-150500.13.100.1.noarch"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2025-07-15T14:31:35Z",
          "details": "moderate"
        }
      ],
      "title": "CVE-2022-50179"
    },
    {
      "cve": "CVE-2022-50181",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2022-50181"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "In the Linux kernel, the following vulnerability has been resolved:\n\nvirtio-gpu: fix a missing check to avoid NULL dereference\n\n\u0027cache_ent\u0027 could be set NULL inside virtio_gpu_cmd_get_capset()\nand it will lead to a NULL dereference by a lately use of it\n(i.e., ptr = cache_ent-\u003ecaps_cache). Fix it with a NULL check.\n\n\n[ kraxel: minor codestyle fixup ]",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "SUSE Linux Enterprise Micro 5.5:kernel-devel-rt-5.14.21-150500.13.100.1.noarch",
          "SUSE Linux Enterprise Micro 5.5:kernel-rt-5.14.21-150500.13.100.2.x86_64",
          "SUSE Linux Enterprise Micro 5.5:kernel-source-rt-5.14.21-150500.13.100.1.noarch"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2022-50181",
          "url": "https://www.suse.com/security/cve/CVE-2022-50181"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1244901 for CVE-2022-50181",
          "url": "https://bugzilla.suse.com/1244901"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "SUSE Linux Enterprise Micro 5.5:kernel-devel-rt-5.14.21-150500.13.100.1.noarch",
            "SUSE Linux Enterprise Micro 5.5:kernel-rt-5.14.21-150500.13.100.2.x86_64",
            "SUSE Linux Enterprise Micro 5.5:kernel-source-rt-5.14.21-150500.13.100.1.noarch"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 5.5,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
            "version": "3.1"
          },
          "products": [
            "SUSE Linux Enterprise Micro 5.5:kernel-devel-rt-5.14.21-150500.13.100.1.noarch",
            "SUSE Linux Enterprise Micro 5.5:kernel-rt-5.14.21-150500.13.100.2.x86_64",
            "SUSE Linux Enterprise Micro 5.5:kernel-source-rt-5.14.21-150500.13.100.1.noarch"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2025-07-15T14:31:35Z",
          "details": "moderate"
        }
      ],
      "title": "CVE-2022-50181"
    },
    {
      "cve": "CVE-2022-50183",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2022-50183"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "In the Linux kernel, the following vulnerability has been resolved:\n\ndrm/meson: encoder_cvbs: Fix refcount leak in meson_encoder_cvbs_init\n\nof_graph_get_remote_node() returns remote device nodepointer with\nrefcount incremented, we should use of_node_put() on it when done.\nAdd missing of_node_put() to avoid refcount leak.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "SUSE Linux Enterprise Micro 5.5:kernel-devel-rt-5.14.21-150500.13.100.1.noarch",
          "SUSE Linux Enterprise Micro 5.5:kernel-rt-5.14.21-150500.13.100.2.x86_64",
          "SUSE Linux Enterprise Micro 5.5:kernel-source-rt-5.14.21-150500.13.100.1.noarch"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2022-50183",
          "url": "https://www.suse.com/security/cve/CVE-2022-50183"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1244893 for CVE-2022-50183",
          "url": "https://bugzilla.suse.com/1244893"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "SUSE Linux Enterprise Micro 5.5:kernel-devel-rt-5.14.21-150500.13.100.1.noarch",
            "SUSE Linux Enterprise Micro 5.5:kernel-rt-5.14.21-150500.13.100.2.x86_64",
            "SUSE Linux Enterprise Micro 5.5:kernel-source-rt-5.14.21-150500.13.100.1.noarch"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 5.5,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
            "version": "3.1"
          },
          "products": [
            "SUSE Linux Enterprise Micro 5.5:kernel-devel-rt-5.14.21-150500.13.100.1.noarch",
            "SUSE Linux Enterprise Micro 5.5:kernel-rt-5.14.21-150500.13.100.2.x86_64",
            "SUSE Linux Enterprise Micro 5.5:kernel-source-rt-5.14.21-150500.13.100.1.noarch"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2025-07-15T14:31:35Z",
          "details": "moderate"
        }
      ],
      "title": "CVE-2022-50183"
    },
    {
      "cve": "CVE-2022-50184",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2022-50184"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "In the Linux kernel, the following vulnerability has been resolved:\n\ndrm/meson: encoder_hdmi: Fix refcount leak in meson_encoder_hdmi_init\n\nof_graph_get_remote_node() returns remote device nodepointer with\nrefcount incremented, we should use of_node_put() on it when done.\nAdd missing of_node_put() to avoid refcount leak.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "SUSE Linux Enterprise Micro 5.5:kernel-devel-rt-5.14.21-150500.13.100.1.noarch",
          "SUSE Linux Enterprise Micro 5.5:kernel-rt-5.14.21-150500.13.100.2.x86_64",
          "SUSE Linux Enterprise Micro 5.5:kernel-source-rt-5.14.21-150500.13.100.1.noarch"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2022-50184",
          "url": "https://www.suse.com/security/cve/CVE-2022-50184"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1244898 for CVE-2022-50184",
          "url": "https://bugzilla.suse.com/1244898"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "SUSE Linux Enterprise Micro 5.5:kernel-devel-rt-5.14.21-150500.13.100.1.noarch",
            "SUSE Linux Enterprise Micro 5.5:kernel-rt-5.14.21-150500.13.100.2.x86_64",
            "SUSE Linux Enterprise Micro 5.5:kernel-source-rt-5.14.21-150500.13.100.1.noarch"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 5.5,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
            "version": "3.1"
          },
          "products": [
            "SUSE Linux Enterprise Micro 5.5:kernel-devel-rt-5.14.21-150500.13.100.1.noarch",
            "SUSE Linux Enterprise Micro 5.5:kernel-rt-5.14.21-150500.13.100.2.x86_64",
            "SUSE Linux Enterprise Micro 5.5:kernel-source-rt-5.14.21-150500.13.100.1.noarch"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2025-07-15T14:31:35Z",
          "details": "moderate"
        }
      ],
      "title": "CVE-2022-50184"
    },
    {
      "cve": "CVE-2022-50185",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2022-50185"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "In the Linux kernel, the following vulnerability has been resolved:\n\ndrm/radeon: fix potential buffer overflow in ni_set_mc_special_registers()\n\nThe last case label can write two buffers \u0027mc_reg_address[j]\u0027 and\n\u0027mc_data[j]\u0027 with \u0027j\u0027 offset equal to SMC_NISLANDS_MC_REGISTER_ARRAY_SIZE\nsince there are no checks for this value in both case labels after the\nlast \u0027j++\u0027.\n\nInstead of changing \u0027\u003e\u0027 to \u0027\u003e=\u0027 there, add the bounds check at the start\nof the second \u0027case\u0027 (the first one already has it).\n\nAlso, remove redundant last checks for \u0027j\u0027 index bigger than array size.\nThe expression is always false. Moreover, before or after the patch\n\u0027table-\u003elast\u0027 can be equal to SMC_NISLANDS_MC_REGISTER_ARRAY_SIZE and it\nseems it can be a valid value.\n\nDetected using the static analysis tool - Svace.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "SUSE Linux Enterprise Micro 5.5:kernel-devel-rt-5.14.21-150500.13.100.1.noarch",
          "SUSE Linux Enterprise Micro 5.5:kernel-rt-5.14.21-150500.13.100.2.x86_64",
          "SUSE Linux Enterprise Micro 5.5:kernel-source-rt-5.14.21-150500.13.100.1.noarch"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2022-50185",
          "url": "https://www.suse.com/security/cve/CVE-2022-50185"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1244887 for CVE-2022-50185",
          "url": "https://bugzilla.suse.com/1244887"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "SUSE Linux Enterprise Micro 5.5:kernel-devel-rt-5.14.21-150500.13.100.1.noarch",
            "SUSE Linux Enterprise Micro 5.5:kernel-rt-5.14.21-150500.13.100.2.x86_64",
            "SUSE Linux Enterprise Micro 5.5:kernel-source-rt-5.14.21-150500.13.100.1.noarch"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 5.5,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
            "version": "3.1"
          },
          "products": [
            "SUSE Linux Enterprise Micro 5.5:kernel-devel-rt-5.14.21-150500.13.100.1.noarch",
            "SUSE Linux Enterprise Micro 5.5:kernel-rt-5.14.21-150500.13.100.2.x86_64",
            "SUSE Linux Enterprise Micro 5.5:kernel-source-rt-5.14.21-150500.13.100.1.noarch"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2025-07-15T14:31:35Z",
          "details": "moderate"
        }
      ],
      "title": "CVE-2022-50185"
    },
    {
      "cve": "CVE-2022-50186",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2022-50186"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "In the Linux kernel, the following vulnerability has been resolved:\n\nath11k: fix missing skb drop on htc_tx_completion error\n\nOn htc_tx_completion error the skb is not dropped. This is wrong since\nthe completion_handler logic expect the skb to be consumed anyway even\nwhen an error is triggered. Not freeing the skb on error is a memory\nleak since the skb won\u0027t be freed anywere else. Correctly free the\npacket on eid \u003e= ATH11K_HTC_EP_COUNT before returning.\n\nTested-on: IPQ8074 hw2.0 AHB WLAN.HK.2.5.0.1-01208-QCAHKSWPL_SILICONZ-1",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "SUSE Linux Enterprise Micro 5.5:kernel-devel-rt-5.14.21-150500.13.100.1.noarch",
          "SUSE Linux Enterprise Micro 5.5:kernel-rt-5.14.21-150500.13.100.2.x86_64",
          "SUSE Linux Enterprise Micro 5.5:kernel-source-rt-5.14.21-150500.13.100.1.noarch"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2022-50186",
          "url": "https://www.suse.com/security/cve/CVE-2022-50186"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1244888 for CVE-2022-50186",
          "url": "https://bugzilla.suse.com/1244888"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "SUSE Linux Enterprise Micro 5.5:kernel-devel-rt-5.14.21-150500.13.100.1.noarch",
            "SUSE Linux Enterprise Micro 5.5:kernel-rt-5.14.21-150500.13.100.2.x86_64",
            "SUSE Linux Enterprise Micro 5.5:kernel-source-rt-5.14.21-150500.13.100.1.noarch"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 5.5,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
            "version": "3.1"
          },
          "products": [
            "SUSE Linux Enterprise Micro 5.5:kernel-devel-rt-5.14.21-150500.13.100.1.noarch",
            "SUSE Linux Enterprise Micro 5.5:kernel-rt-5.14.21-150500.13.100.2.x86_64",
            "SUSE Linux Enterprise Micro 5.5:kernel-source-rt-5.14.21-150500.13.100.1.noarch"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2025-07-15T14:31:35Z",
          "details": "moderate"
        }
      ],
      "title": "CVE-2022-50186"
    },
    {
      "cve": "CVE-2022-50187",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2022-50187"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "In the Linux kernel, the following vulnerability has been resolved:\n\nath11k: fix netdev open race\n\nMake sure to allocate resources needed before registering the device.\n\nThis specifically avoids having a racing open() trigger a BUG_ON() in\nmod_timer() when ath11k_mac_op_start() is called before the\nmon_reap_timer as been set up.\n\nI did not see this issue with next-20220310, but I hit it on every probe\nwith next-20220511. Perhaps some timing changed in between.\n\nHere\u0027s the backtrace:\n\n[   51.346947] kernel BUG at kernel/time/timer.c:990!\n[   51.346958] Internal error: Oops - BUG: 0 [#1] PREEMPT SMP\n...\n[   51.578225] Call trace:\n[   51.583293]  __mod_timer+0x298/0x390\n[   51.589518]  mod_timer+0x14/0x20\n[   51.595368]  ath11k_mac_op_start+0x41c/0x4a0 [ath11k]\n[   51.603165]  drv_start+0x38/0x60 [mac80211]\n[   51.610110]  ieee80211_do_open+0x29c/0x7d0 [mac80211]\n[   51.617945]  ieee80211_open+0x60/0xb0 [mac80211]\n[   51.625311]  __dev_open+0x100/0x1c0\n[   51.631420]  __dev_change_flags+0x194/0x210\n[   51.638214]  dev_change_flags+0x24/0x70\n[   51.644646]  do_setlink+0x228/0xdb0\n[   51.650723]  __rtnl_newlink+0x460/0x830\n[   51.657162]  rtnl_newlink+0x4c/0x80\n[   51.663229]  rtnetlink_rcv_msg+0x124/0x390\n[   51.669917]  netlink_rcv_skb+0x58/0x130\n[   51.676314]  rtnetlink_rcv+0x18/0x30\n[   51.682460]  netlink_unicast+0x250/0x310\n[   51.688960]  netlink_sendmsg+0x19c/0x3e0\n[   51.695458]  ____sys_sendmsg+0x220/0x290\n[   51.701938]  ___sys_sendmsg+0x7c/0xc0\n[   51.708148]  __sys_sendmsg+0x68/0xd0\n[   51.714254]  __arm64_sys_sendmsg+0x28/0x40\n[   51.720900]  invoke_syscall+0x48/0x120\n\nTested-on: WCN6855 hw2.0 PCI WLAN.HSP.1.1-03125-QCAHSPSWPL_V1_V2_SILICONZ_LITE-3",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "SUSE Linux Enterprise Micro 5.5:kernel-devel-rt-5.14.21-150500.13.100.1.noarch",
          "SUSE Linux Enterprise Micro 5.5:kernel-rt-5.14.21-150500.13.100.2.x86_64",
          "SUSE Linux Enterprise Micro 5.5:kernel-source-rt-5.14.21-150500.13.100.1.noarch"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2022-50187",
          "url": "https://www.suse.com/security/cve/CVE-2022-50187"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1244890 for CVE-2022-50187",
          "url": "https://bugzilla.suse.com/1244890"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "SUSE Linux Enterprise Micro 5.5:kernel-devel-rt-5.14.21-150500.13.100.1.noarch",
            "SUSE Linux Enterprise Micro 5.5:kernel-rt-5.14.21-150500.13.100.2.x86_64",
            "SUSE Linux Enterprise Micro 5.5:kernel-source-rt-5.14.21-150500.13.100.1.noarch"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 5.5,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
            "version": "3.1"
          },
          "products": [
            "SUSE Linux Enterprise Micro 5.5:kernel-devel-rt-5.14.21-150500.13.100.1.noarch",
            "SUSE Linux Enterprise Micro 5.5:kernel-rt-5.14.21-150500.13.100.2.x86_64",
            "SUSE Linux Enterprise Micro 5.5:kernel-source-rt-5.14.21-150500.13.100.1.noarch"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2025-07-15T14:31:35Z",
          "details": "moderate"
        }
      ],
      "title": "CVE-2022-50187"
    },
    {
      "cve": "CVE-2022-50188",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2022-50188"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "In the Linux kernel, the following vulnerability has been resolved:\n\ndrm/meson: Fix refcount leak in meson_encoder_hdmi_init\n\nof_find_device_by_node() takes reference, we should use put_device()\nto release it when not need anymore.\nAdd missing put_device() in error path to avoid refcount\nleak.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "SUSE Linux Enterprise Micro 5.5:kernel-devel-rt-5.14.21-150500.13.100.1.noarch",
          "SUSE Linux Enterprise Micro 5.5:kernel-rt-5.14.21-150500.13.100.2.x86_64",
          "SUSE Linux Enterprise Micro 5.5:kernel-source-rt-5.14.21-150500.13.100.1.noarch"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2022-50188",
          "url": "https://www.suse.com/security/cve/CVE-2022-50188"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1244892 for CVE-2022-50188",
          "url": "https://bugzilla.suse.com/1244892"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "SUSE Linux Enterprise Micro 5.5:kernel-devel-rt-5.14.21-150500.13.100.1.noarch",
            "SUSE Linux Enterprise Micro 5.5:kernel-rt-5.14.21-150500.13.100.2.x86_64",
            "SUSE Linux Enterprise Micro 5.5:kernel-source-rt-5.14.21-150500.13.100.1.noarch"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 5.5,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
            "version": "3.1"
          },
          "products": [
            "SUSE Linux Enterprise Micro 5.5:kernel-devel-rt-5.14.21-150500.13.100.1.noarch",
            "SUSE Linux Enterprise Micro 5.5:kernel-rt-5.14.21-150500.13.100.2.x86_64",
            "SUSE Linux Enterprise Micro 5.5:kernel-source-rt-5.14.21-150500.13.100.1.noarch"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2025-07-15T14:31:35Z",
          "details": "moderate"
        }
      ],
      "title": "CVE-2022-50188"
    },
    {
      "cve": "CVE-2022-50190",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2022-50190"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "In the Linux kernel, the following vulnerability has been resolved:\n\nspi: Fix simplification of devm_spi_register_controller\n\nThis reverts commit 59ebbe40fb51 (\"spi: simplify\ndevm_spi_register_controller\").\n\nIf devm_add_action() fails in devm_add_action_or_reset(),\ndevm_spi_unregister() will be called, it decreases the\nrefcount of \u0027ctlr-\u003edev\u0027 to 0, then it will cause uaf in\nthe drivers that calling spi_put_controller() in error path.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "SUSE Linux Enterprise Micro 5.5:kernel-devel-rt-5.14.21-150500.13.100.1.noarch",
          "SUSE Linux Enterprise Micro 5.5:kernel-rt-5.14.21-150500.13.100.2.x86_64",
          "SUSE Linux Enterprise Micro 5.5:kernel-source-rt-5.14.21-150500.13.100.1.noarch"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2022-50190",
          "url": "https://www.suse.com/security/cve/CVE-2022-50190"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1244895 for CVE-2022-50190",
          "url": "https://bugzilla.suse.com/1244895"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "SUSE Linux Enterprise Micro 5.5:kernel-devel-rt-5.14.21-150500.13.100.1.noarch",
            "SUSE Linux Enterprise Micro 5.5:kernel-rt-5.14.21-150500.13.100.2.x86_64",
            "SUSE Linux Enterprise Micro 5.5:kernel-source-rt-5.14.21-150500.13.100.1.noarch"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 5.5,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
            "version": "3.1"
          },
          "products": [
            "SUSE Linux Enterprise Micro 5.5:kernel-devel-rt-5.14.21-150500.13.100.1.noarch",
            "SUSE Linux Enterprise Micro 5.5:kernel-rt-5.14.21-150500.13.100.2.x86_64",
            "SUSE Linux Enterprise Micro 5.5:kernel-source-rt-5.14.21-150500.13.100.1.noarch"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2025-07-15T14:31:35Z",
          "details": "moderate"
        }
      ],
      "title": "CVE-2022-50190"
    },
    {
      "cve": "CVE-2022-50191",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2022-50191"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "In the Linux kernel, the following vulnerability has been resolved:\n\nregulator: of: Fix refcount leak bug in of_get_regulation_constraints()\n\nWe should call the of_node_put() for the reference returned by\nof_get_child_by_name() which has increased the refcount.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "SUSE Linux Enterprise Micro 5.5:kernel-devel-rt-5.14.21-150500.13.100.1.noarch",
          "SUSE Linux Enterprise Micro 5.5:kernel-rt-5.14.21-150500.13.100.2.x86_64",
          "SUSE Linux Enterprise Micro 5.5:kernel-source-rt-5.14.21-150500.13.100.1.noarch"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2022-50191",
          "url": "https://www.suse.com/security/cve/CVE-2022-50191"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1244899 for CVE-2022-50191",
          "url": "https://bugzilla.suse.com/1244899"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "SUSE Linux Enterprise Micro 5.5:kernel-devel-rt-5.14.21-150500.13.100.1.noarch",
            "SUSE Linux Enterprise Micro 5.5:kernel-rt-5.14.21-150500.13.100.2.x86_64",
            "SUSE Linux Enterprise Micro 5.5:kernel-source-rt-5.14.21-150500.13.100.1.noarch"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 5.5,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
            "version": "3.1"
          },
          "products": [
            "SUSE Linux Enterprise Micro 5.5:kernel-devel-rt-5.14.21-150500.13.100.1.noarch",
            "SUSE Linux Enterprise Micro 5.5:kernel-rt-5.14.21-150500.13.100.2.x86_64",
            "SUSE Linux Enterprise Micro 5.5:kernel-source-rt-5.14.21-150500.13.100.1.noarch"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2025-07-15T14:31:35Z",
          "details": "moderate"
        }
      ],
      "title": "CVE-2022-50191"
    },
    {
      "cve": "CVE-2022-50192",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2022-50192"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "In the Linux kernel, the following vulnerability has been resolved:\n\nspi: tegra20-slink: fix UAF in tegra_slink_remove()\n\nAfter calling spi_unregister_master(), the refcount of master will\nbe decrease to 0, and it will be freed in spi_controller_release(),\nthe device data also will be freed, so it will lead a UAF when using\n\u0027tspi\u0027. To fix this, get the master before unregister and put it when\nfinish using it.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "SUSE Linux Enterprise Micro 5.5:kernel-devel-rt-5.14.21-150500.13.100.1.noarch",
          "SUSE Linux Enterprise Micro 5.5:kernel-rt-5.14.21-150500.13.100.2.x86_64",
          "SUSE Linux Enterprise Micro 5.5:kernel-source-rt-5.14.21-150500.13.100.1.noarch"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2022-50192",
          "url": "https://www.suse.com/security/cve/CVE-2022-50192"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1244879 for CVE-2022-50192",
          "url": "https://bugzilla.suse.com/1244879"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "SUSE Linux Enterprise Micro 5.5:kernel-devel-rt-5.14.21-150500.13.100.1.noarch",
            "SUSE Linux Enterprise Micro 5.5:kernel-rt-5.14.21-150500.13.100.2.x86_64",
            "SUSE Linux Enterprise Micro 5.5:kernel-source-rt-5.14.21-150500.13.100.1.noarch"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 5.5,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
            "version": "3.1"
          },
          "products": [
            "SUSE Linux Enterprise Micro 5.5:kernel-devel-rt-5.14.21-150500.13.100.1.noarch",
            "SUSE Linux Enterprise Micro 5.5:kernel-rt-5.14.21-150500.13.100.2.x86_64",
            "SUSE Linux Enterprise Micro 5.5:kernel-source-rt-5.14.21-150500.13.100.1.noarch"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2025-07-15T14:31:35Z",
          "details": "moderate"
        }
      ],
      "title": "CVE-2022-50192"
    },
    {
      "cve": "CVE-2022-50194",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2022-50194"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "In the Linux kernel, the following vulnerability has been resolved:\n\nsoc: qcom: aoss: Fix refcount leak in qmp_cooling_devices_register\n\nEvery iteration of for_each_available_child_of_node() decrements\nthe reference count of the previous node.\nWhen breaking early from a for_each_available_child_of_node() loop,\nwe need to explicitly call of_node_put() on the child node.\nAdd missing of_node_put() to avoid refcount leak.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "SUSE Linux Enterprise Micro 5.5:kernel-devel-rt-5.14.21-150500.13.100.1.noarch",
          "SUSE Linux Enterprise Micro 5.5:kernel-rt-5.14.21-150500.13.100.2.x86_64",
          "SUSE Linux Enterprise Micro 5.5:kernel-source-rt-5.14.21-150500.13.100.1.noarch"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2022-50194",
          "url": "https://www.suse.com/security/cve/CVE-2022-50194"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1244878 for CVE-2022-50194",
          "url": "https://bugzilla.suse.com/1244878"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "SUSE Linux Enterprise Micro 5.5:kernel-devel-rt-5.14.21-150500.13.100.1.noarch",
            "SUSE Linux Enterprise Micro 5.5:kernel-rt-5.14.21-150500.13.100.2.x86_64",
            "SUSE Linux Enterprise Micro 5.5:kernel-source-rt-5.14.21-150500.13.100.1.noarch"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 5.5,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
            "version": "3.1"
          },
          "products": [
            "SUSE Linux Enterprise Micro 5.5:kernel-devel-rt-5.14.21-150500.13.100.1.noarch",
            "SUSE Linux Enterprise Micro 5.5:kernel-rt-5.14.21-150500.13.100.2.x86_64",
            "SUSE Linux Enterprise Micro 5.5:kernel-source-rt-5.14.21-150500.13.100.1.noarch"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2025-07-15T14:31:35Z",
          "details": "moderate"
        }
      ],
      "title": "CVE-2022-50194"
    },
    {
      "cve": "CVE-2022-50196",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2022-50196"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "In the Linux kernel, the following vulnerability has been resolved:\n\nsoc: qcom: ocmem: Fix refcount leak in of_get_ocmem\n\nof_parse_phandle() returns a node pointer with refcount\nincremented, we should use of_node_put() on it when not need anymore.\nAdd missing of_node_put() to avoid refcount leak.\nof_node_put() will check NULL pointer.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "SUSE Linux Enterprise Micro 5.5:kernel-devel-rt-5.14.21-150500.13.100.1.noarch",
          "SUSE Linux Enterprise Micro 5.5:kernel-rt-5.14.21-150500.13.100.2.x86_64",
          "SUSE Linux Enterprise Micro 5.5:kernel-source-rt-5.14.21-150500.13.100.1.noarch"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2022-50196",
          "url": "https://www.suse.com/security/cve/CVE-2022-50196"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1244875 for CVE-2022-50196",
          "url": "https://bugzilla.suse.com/1244875"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "SUSE Linux Enterprise Micro 5.5:kernel-devel-rt-5.14.21-150500.13.100.1.noarch",
            "SUSE Linux Enterprise Micro 5.5:kernel-rt-5.14.21-150500.13.100.2.x86_64",
            "SUSE Linux Enterprise Micro 5.5:kernel-source-rt-5.14.21-150500.13.100.1.noarch"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 5.5,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
            "version": "3.1"
          },
          "products": [
            "SUSE Linux Enterprise Micro 5.5:kernel-devel-rt-5.14.21-150500.13.100.1.noarch",
            "SUSE Linux Enterprise Micro 5.5:kernel-rt-5.14.21-150500.13.100.2.x86_64",
            "SUSE Linux Enterprise Micro 5.5:kernel-source-rt-5.14.21-150500.13.100.1.noarch"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2025-07-15T14:31:35Z",
          "details": "moderate"
        }
      ],
      "title": "CVE-2022-50196"
    },
    {
      "cve": "CVE-2022-50197",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2022-50197"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "In the Linux kernel, the following vulnerability has been resolved:\n\ncpufreq: zynq: Fix refcount leak in zynq_get_revision\n\nof_find_compatible_node() returns a node pointer with refcount\nincremented, we should use of_node_put() on it when done.\nAdd missing of_node_put() to avoid refcount leak.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "SUSE Linux Enterprise Micro 5.5:kernel-devel-rt-5.14.21-150500.13.100.1.noarch",
          "SUSE Linux Enterprise Micro 5.5:kernel-rt-5.14.21-150500.13.100.2.x86_64",
          "SUSE Linux Enterprise Micro 5.5:kernel-source-rt-5.14.21-150500.13.100.1.noarch"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2022-50197",
          "url": "https://www.suse.com/security/cve/CVE-2022-50197"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1244876 for CVE-2022-50197",
          "url": "https://bugzilla.suse.com/1244876"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "SUSE Linux Enterprise Micro 5.5:kernel-devel-rt-5.14.21-150500.13.100.1.noarch",
            "SUSE Linux Enterprise Micro 5.5:kernel-rt-5.14.21-150500.13.100.2.x86_64",
            "SUSE Linux Enterprise Micro 5.5:kernel-source-rt-5.14.21-150500.13.100.1.noarch"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 5.5,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
            "version": "3.1"
          },
          "products": [
            "SUSE Linux Enterprise Micro 5.5:kernel-devel-rt-5.14.21-150500.13.100.1.noarch",
            "SUSE Linux Enterprise Micro 5.5:kernel-rt-5.14.21-150500.13.100.2.x86_64",
            "SUSE Linux Enterprise Micro 5.5:kernel-source-rt-5.14.21-150500.13.100.1.noarch"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2025-07-15T14:31:35Z",
          "details": "moderate"
        }
      ],
      "title": "CVE-2022-50197"
    },
    {
      "cve": "CVE-2022-50198",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2022-50198"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "In the Linux kernel, the following vulnerability has been resolved:\n\nARM: OMAP2+: Fix refcount leak in omap3xxx_prm_late_init\n\nof_find_matching_node() returns a node pointer with refcount\nincremented, we should use of_node_put() on it when not need anymore.\nAdd missing of_node_put() to avoid refcount leak.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "SUSE Linux Enterprise Micro 5.5:kernel-devel-rt-5.14.21-150500.13.100.1.noarch",
          "SUSE Linux Enterprise Micro 5.5:kernel-rt-5.14.21-150500.13.100.2.x86_64",
          "SUSE Linux Enterprise Micro 5.5:kernel-source-rt-5.14.21-150500.13.100.1.noarch"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2022-50198",
          "url": "https://www.suse.com/security/cve/CVE-2022-50198"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1244872 for CVE-2022-50198",
          "url": "https://bugzilla.suse.com/1244872"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "SUSE Linux Enterprise Micro 5.5:kernel-devel-rt-5.14.21-150500.13.100.1.noarch",
            "SUSE Linux Enterprise Micro 5.5:kernel-rt-5.14.21-150500.13.100.2.x86_64",
            "SUSE Linux Enterprise Micro 5.5:kernel-source-rt-5.14.21-150500.13.100.1.noarch"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 5.5,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
            "version": "3.1"
          },
          "products": [
            "SUSE Linux Enterprise Micro 5.5:kernel-devel-rt-5.14.21-150500.13.100.1.noarch",
            "SUSE Linux Enterprise Micro 5.5:kernel-rt-5.14.21-150500.13.100.2.x86_64",
            "SUSE Linux Enterprise Micro 5.5:kernel-source-rt-5.14.21-150500.13.100.1.noarch"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2025-07-15T14:31:35Z",
          "details": "moderate"
        }
      ],
      "title": "CVE-2022-50198"
    },
    {
      "cve": "CVE-2022-50199",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2022-50199"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "In the Linux kernel, the following vulnerability has been resolved:\n\nARM: OMAP2+: Fix refcount leak in omapdss_init_of\n\nomapdss_find_dss_of_node() calls of_find_compatible_node() to get device\nnode. of_find_compatible_node() returns a node pointer with refcount\nincremented, we should use of_node_put() on it when done.\nAdd missing of_node_put() in later error path and normal path.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "SUSE Linux Enterprise Micro 5.5:kernel-devel-rt-5.14.21-150500.13.100.1.noarch",
          "SUSE Linux Enterprise Micro 5.5:kernel-rt-5.14.21-150500.13.100.2.x86_64",
          "SUSE Linux Enterprise Micro 5.5:kernel-source-rt-5.14.21-150500.13.100.1.noarch"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2022-50199",
          "url": "https://www.suse.com/security/cve/CVE-2022-50199"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1244873 for CVE-2022-50199",
          "url": "https://bugzilla.suse.com/1244873"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "SUSE Linux Enterprise Micro 5.5:kernel-devel-rt-5.14.21-150500.13.100.1.noarch",
            "SUSE Linux Enterprise Micro 5.5:kernel-rt-5.14.21-150500.13.100.2.x86_64",
            "SUSE Linux Enterprise Micro 5.5:kernel-source-rt-5.14.21-150500.13.100.1.noarch"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 5.5,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
            "version": "3.1"
          },
          "products": [
            "SUSE Linux Enterprise Micro 5.5:kernel-devel-rt-5.14.21-150500.13.100.1.noarch",
            "SUSE Linux Enterprise Micro 5.5:kernel-rt-5.14.21-150500.13.100.2.x86_64",
            "SUSE Linux Enterprise Micro 5.5:kernel-source-rt-5.14.21-150500.13.100.1.noarch"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2025-07-15T14:31:35Z",
          "details": "moderate"
        }
      ],
      "title": "CVE-2022-50199"
    },
    {
      "cve": "CVE-2022-50200",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2022-50200"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "In the Linux kernel, the following vulnerability has been resolved:\n\nselinux: Add boundary check in put_entry()\n\nJust like next_entry(), boundary check is necessary to prevent memory\nout-of-bound access.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "SUSE Linux Enterprise Micro 5.5:kernel-devel-rt-5.14.21-150500.13.100.1.noarch",
          "SUSE Linux Enterprise Micro 5.5:kernel-rt-5.14.21-150500.13.100.2.x86_64",
          "SUSE Linux Enterprise Micro 5.5:kernel-source-rt-5.14.21-150500.13.100.1.noarch"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2022-50200",
          "url": "https://www.suse.com/security/cve/CVE-2022-50200"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1245149 for CVE-2022-50200",
          "url": "https://bugzilla.suse.com/1245149"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "SUSE Linux Enterprise Micro 5.5:kernel-devel-rt-5.14.21-150500.13.100.1.noarch",
            "SUSE Linux Enterprise Micro 5.5:kernel-rt-5.14.21-150500.13.100.2.x86_64",
            "SUSE Linux Enterprise Micro 5.5:kernel-source-rt-5.14.21-150500.13.100.1.noarch"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 7.8,
            "baseSeverity": "HIGH",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
            "version": "3.1"
          },
          "products": [
            "SUSE Linux Enterprise Micro 5.5:kernel-devel-rt-5.14.21-150500.13.100.1.noarch",
            "SUSE Linux Enterprise Micro 5.5:kernel-rt-5.14.21-150500.13.100.2.x86_64",
            "SUSE Linux Enterprise Micro 5.5:kernel-source-rt-5.14.21-150500.13.100.1.noarch"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2025-07-15T14:31:35Z",
          "details": "important"
        }
      ],
      "title": "CVE-2022-50200"
    },
    {
      "cve": "CVE-2022-50201",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2022-50201"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "In the Linux kernel, the following vulnerability has been resolved:\n\nselinux: fix memleak in security_read_state_kernel()\n\nIn this function, it directly returns the result of __security_read_policy\nwithout freeing the allocated memory in *data, cause memory leak issue,\nso free the memory if __security_read_policy failed.\n\n[PM: subject line tweak]",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "SUSE Linux Enterprise Micro 5.5:kernel-devel-rt-5.14.21-150500.13.100.1.noarch",
          "SUSE Linux Enterprise Micro 5.5:kernel-rt-5.14.21-150500.13.100.2.x86_64",
          "SUSE Linux Enterprise Micro 5.5:kernel-source-rt-5.14.21-150500.13.100.1.noarch"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2022-50201",
          "url": "https://www.suse.com/security/cve/CVE-2022-50201"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1245197 for CVE-2022-50201",
          "url": "https://bugzilla.suse.com/1245197"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "SUSE Linux Enterprise Micro 5.5:kernel-devel-rt-5.14.21-150500.13.100.1.noarch",
            "SUSE Linux Enterprise Micro 5.5:kernel-rt-5.14.21-150500.13.100.2.x86_64",
            "SUSE Linux Enterprise Micro 5.5:kernel-source-rt-5.14.21-150500.13.100.1.noarch"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 4.4,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H",
            "version": "3.1"
          },
          "products": [
            "SUSE Linux Enterprise Micro 5.5:kernel-devel-rt-5.14.21-150500.13.100.1.noarch",
            "SUSE Linux Enterprise Micro 5.5:kernel-rt-5.14.21-150500.13.100.2.x86_64",
            "SUSE Linux Enterprise Micro 5.5:kernel-source-rt-5.14.21-150500.13.100.1.noarch"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2025-07-15T14:31:35Z",
          "details": "moderate"
        }
      ],
      "title": "CVE-2022-50201"
    },
    {
      "cve": "CVE-2022-50202",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2022-50202"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "In the Linux kernel, the following vulnerability has been resolved:\n\nPM: hibernate: defer device probing when resuming from hibernation\n\nsyzbot is reporting hung task at misc_open() [1], for there is a race\nwindow of AB-BA deadlock which involves probe_count variable. Currently\nwait_for_device_probe() from snapshot_open() from misc_open() can sleep\nforever with misc_mtx held if probe_count cannot become 0.\n\nWhen a device is probed by hub_event() work function, probe_count is\nincremented before the probe function starts, and probe_count is\ndecremented after the probe function completed.\n\nThere are three cases that can prevent probe_count from dropping to 0.\n\n  (a) A device being probed stopped responding (i.e. broken/malicious\n      hardware).\n\n  (b) A process emulating a USB device using /dev/raw-gadget interface\n      stopped responding for some reason.\n\n  (c) New device probe requests keeps coming in before existing device\n      probe requests complete.\n\nThe phenomenon syzbot is reporting is (b). A process which is holding\nsystem_transition_mutex and misc_mtx is waiting for probe_count to become\n0 inside wait_for_device_probe(), but the probe function which is called\n from hub_event() work function is waiting for the processes which are\nblocked at mutex_lock(\u0026misc_mtx) to respond via /dev/raw-gadget interface.\n\nThis patch mitigates (b) by deferring wait_for_device_probe() from\nsnapshot_open() to snapshot_write() and snapshot_ioctl(). Please note that\nthe possibility of (b) remains as long as any thread which is emulating a\nUSB device via /dev/raw-gadget interface can be blocked by uninterruptible\nblocking operations (e.g. mutex_lock()).\n\nPlease also note that (a) and (c) are not addressed. Regarding (c), we\nshould change the code to wait for only one device which contains the\nimage for resuming from hibernation. I don\u0027t know how to address (a), for\nuse of timeout for wait_for_device_probe() might result in loss of user\ndata in the image. Maybe we should require the userland to wait for the\nimage device before opening /dev/snapshot interface.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "SUSE Linux Enterprise Micro 5.5:kernel-devel-rt-5.14.21-150500.13.100.1.noarch",
          "SUSE Linux Enterprise Micro 5.5:kernel-rt-5.14.21-150500.13.100.2.x86_64",
          "SUSE Linux Enterprise Micro 5.5:kernel-source-rt-5.14.21-150500.13.100.1.noarch"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2022-50202",
          "url": "https://www.suse.com/security/cve/CVE-2022-50202"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1245154 for CVE-2022-50202",
          "url": "https://bugzilla.suse.com/1245154"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "SUSE Linux Enterprise Micro 5.5:kernel-devel-rt-5.14.21-150500.13.100.1.noarch",
            "SUSE Linux Enterprise Micro 5.5:kernel-rt-5.14.21-150500.13.100.2.x86_64",
            "SUSE Linux Enterprise Micro 5.5:kernel-source-rt-5.14.21-150500.13.100.1.noarch"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 4.1,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:N/I:N/A:H",
            "version": "3.1"
          },
          "products": [
            "SUSE Linux Enterprise Micro 5.5:kernel-devel-rt-5.14.21-150500.13.100.1.noarch",
            "SUSE Linux Enterprise Micro 5.5:kernel-rt-5.14.21-150500.13.100.2.x86_64",
            "SUSE Linux Enterprise Micro 5.5:kernel-source-rt-5.14.21-150500.13.100.1.noarch"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2025-07-15T14:31:35Z",
          "details": "moderate"
        }
      ],
      "title": "CVE-2022-50202"
    },
    {
      "cve": "CVE-2022-50203",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2022-50203"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "In the Linux kernel, the following vulnerability has been resolved:\n\nARM: OMAP2+: display: Fix refcount leak bug\n\nIn omapdss_init_fbdev(), of_find_node_by_name() will return a node\npointer with refcount incremented. We should use of_node_put() when\nit is not used anymore.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "SUSE Linux Enterprise Micro 5.5:kernel-devel-rt-5.14.21-150500.13.100.1.noarch",
          "SUSE Linux Enterprise Micro 5.5:kernel-rt-5.14.21-150500.13.100.2.x86_64",
          "SUSE Linux Enterprise Micro 5.5:kernel-source-rt-5.14.21-150500.13.100.1.noarch"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2022-50203",
          "url": "https://www.suse.com/security/cve/CVE-2022-50203"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1245189 for CVE-2022-50203",
          "url": "https://bugzilla.suse.com/1245189"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "SUSE Linux Enterprise Micro 5.5:kernel-devel-rt-5.14.21-150500.13.100.1.noarch",
            "SUSE Linux Enterprise Micro 5.5:kernel-rt-5.14.21-150500.13.100.2.x86_64",
            "SUSE Linux Enterprise Micro 5.5:kernel-source-rt-5.14.21-150500.13.100.1.noarch"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 5.5,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
            "version": "3.1"
          },
          "products": [
            "SUSE Linux Enterprise Micro 5.5:kernel-devel-rt-5.14.21-150500.13.100.1.noarch",
            "SUSE Linux Enterprise Micro 5.5:kernel-rt-5.14.21-150500.13.100.2.x86_64",
            "SUSE Linux Enterprise Micro 5.5:kernel-source-rt-5.14.21-150500.13.100.1.noarch"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2025-07-15T14:31:35Z",
          "details": "moderate"
        }
      ],
      "title": "CVE-2022-50203"
    },
    {
      "cve": "CVE-2022-50204",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2022-50204"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "In the Linux kernel, the following vulnerability has been resolved:\n\nARM: OMAP2+: pdata-quirks: Fix refcount leak bug\n\nIn pdata_quirks_init_clocks(), the loop contains\nof_find_node_by_name() but without corresponding of_node_put().",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "SUSE Linux Enterprise Micro 5.5:kernel-devel-rt-5.14.21-150500.13.100.1.noarch",
          "SUSE Linux Enterprise Micro 5.5:kernel-rt-5.14.21-150500.13.100.2.x86_64",
          "SUSE Linux Enterprise Micro 5.5:kernel-source-rt-5.14.21-150500.13.100.1.noarch"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2022-50204",
          "url": "https://www.suse.com/security/cve/CVE-2022-50204"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1245191 for CVE-2022-50204",
          "url": "https://bugzilla.suse.com/1245191"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "SUSE Linux Enterprise Micro 5.5:kernel-devel-rt-5.14.21-150500.13.100.1.noarch",
            "SUSE Linux Enterprise Micro 5.5:kernel-rt-5.14.21-150500.13.100.2.x86_64",
            "SUSE Linux Enterprise Micro 5.5:kernel-source-rt-5.14.21-150500.13.100.1.noarch"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 5.5,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
            "version": "3.1"
          },
          "products": [
            "SUSE Linux Enterprise Micro 5.5:kernel-devel-rt-5.14.21-150500.13.100.1.noarch",
            "SUSE Linux Enterprise Micro 5.5:kernel-rt-5.14.21-150500.13.100.2.x86_64",
            "SUSE Linux Enterprise Micro 5.5:kernel-source-rt-5.14.21-150500.13.100.1.noarch"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2025-07-15T14:31:35Z",
          "details": "moderate"
        }
      ],
      "title": "CVE-2022-50204"
    },
    {
      "cve": "CVE-2022-50206",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2022-50206"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "In the Linux kernel, the following vulnerability has been resolved:\n\narm64: fix oops in concurrently setting insn_emulation sysctls\n\nemulation_proc_handler() changes table-\u003edata for proc_dointvec_minmax\nand can generate the following Oops if called concurrently with itself:\n\n | Unable to handle kernel NULL pointer dereference at virtual address 0000000000000010\n | Internal error: Oops: 96000006 [#1] SMP\n | Call trace:\n | update_insn_emulation_mode+0xc0/0x148\n | emulation_proc_handler+0x64/0xb8\n | proc_sys_call_handler+0x9c/0xf8\n | proc_sys_write+0x18/0x20\n | __vfs_write+0x20/0x48\n | vfs_write+0xe4/0x1d0\n | ksys_write+0x70/0xf8\n | __arm64_sys_write+0x20/0x28\n | el0_svc_common.constprop.0+0x7c/0x1c0\n | el0_svc_handler+0x2c/0xa0\n | el0_svc+0x8/0x200\n\nTo fix this issue, keep the table-\u003edata as \u0026insn-\u003ecurrent_mode and\nuse container_of() to retrieve the insn pointer. Another mutex is\nused to protect against the current_mode update but not for retrieving\ninsn_emulation as table-\u003edata is no longer changing.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "SUSE Linux Enterprise Micro 5.5:kernel-devel-rt-5.14.21-150500.13.100.1.noarch",
          "SUSE Linux Enterprise Micro 5.5:kernel-rt-5.14.21-150500.13.100.2.x86_64",
          "SUSE Linux Enterprise Micro 5.5:kernel-source-rt-5.14.21-150500.13.100.1.noarch"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2022-50206",
          "url": "https://www.suse.com/security/cve/CVE-2022-50206"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1245152 for CVE-2022-50206",
          "url": "https://bugzilla.suse.com/1245152"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "SUSE Linux Enterprise Micro 5.5:kernel-devel-rt-5.14.21-150500.13.100.1.noarch",
            "SUSE Linux Enterprise Micro 5.5:kernel-rt-5.14.21-150500.13.100.2.x86_64",
            "SUSE Linux Enterprise Micro 5.5:kernel-source-rt-5.14.21-150500.13.100.1.noarch"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 4.7,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H",
            "version": "3.1"
          },
          "products": [
            "SUSE Linux Enterprise Micro 5.5:kernel-devel-rt-5.14.21-150500.13.100.1.noarch",
            "SUSE Linux Enterprise Micro 5.5:kernel-rt-5.14.21-150500.13.100.2.x86_64",
            "SUSE Linux Enterprise Micro 5.5:kernel-source-rt-5.14.21-150500.13.100.1.noarch"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2025-07-15T14:31:35Z",
          "details": "moderate"
        }
      ],
      "title": "CVE-2022-50206"
    },
    {
      "cve": "CVE-2022-50207",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2022-50207"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "In the Linux kernel, the following vulnerability has been resolved:\n\nARM: bcm: Fix refcount leak in bcm_kona_smc_init\n\nof_find_matching_node() returns a node pointer with refcount\nincremented, we should use of_node_put() on it when not need anymore.\nAdd missing of_node_put() to avoid refcount leak.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "SUSE Linux Enterprise Micro 5.5:kernel-devel-rt-5.14.21-150500.13.100.1.noarch",
          "SUSE Linux Enterprise Micro 5.5:kernel-rt-5.14.21-150500.13.100.2.x86_64",
          "SUSE Linux Enterprise Micro 5.5:kernel-source-rt-5.14.21-150500.13.100.1.noarch"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2022-50207",
          "url": "https://www.suse.com/security/cve/CVE-2022-50207"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1244871 for CVE-2022-50207",
          "url": "https://bugzilla.suse.com/1244871"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "SUSE Linux Enterprise Micro 5.5:kernel-devel-rt-5.14.21-150500.13.100.1.noarch",
            "SUSE Linux Enterprise Micro 5.5:kernel-rt-5.14.21-150500.13.100.2.x86_64",
            "SUSE Linux Enterprise Micro 5.5:kernel-source-rt-5.14.21-150500.13.100.1.noarch"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 5.5,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
            "version": "3.1"
          },
          "products": [
            "SUSE Linux Enterprise Micro 5.5:kernel-devel-rt-5.14.21-150500.13.100.1.noarch",
            "SUSE Linux Enterprise Micro 5.5:kernel-rt-5.14.21-150500.13.100.2.x86_64",
            "SUSE Linux Enterprise Micro 5.5:kernel-source-rt-5.14.21-150500.13.100.1.noarch"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2025-07-15T14:31:35Z",
          "details": "moderate"
        }
      ],
      "title": "CVE-2022-50207"
    },
    {
      "cve": "CVE-2022-50208",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2022-50208"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "In the Linux kernel, the following vulnerability has been resolved:\n\nsoc: amlogic: Fix refcount leak in meson-secure-pwrc.c\n\nIn meson_secure_pwrc_probe(), there is a refcount leak in one fail\npath.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "SUSE Linux Enterprise Micro 5.5:kernel-devel-rt-5.14.21-150500.13.100.1.noarch",
          "SUSE Linux Enterprise Micro 5.5:kernel-rt-5.14.21-150500.13.100.2.x86_64",
          "SUSE Linux Enterprise Micro 5.5:kernel-source-rt-5.14.21-150500.13.100.1.noarch"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2022-50208",
          "url": "https://www.suse.com/security/cve/CVE-2022-50208"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1244870 for CVE-2022-50208",
          "url": "https://bugzilla.suse.com/1244870"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "SUSE Linux Enterprise Micro 5.5:kernel-devel-rt-5.14.21-150500.13.100.1.noarch",
            "SUSE Linux Enterprise Micro 5.5:kernel-rt-5.14.21-150500.13.100.2.x86_64",
            "SUSE Linux Enterprise Micro 5.5:kernel-source-rt-5.14.21-150500.13.100.1.noarch"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 5.5,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
            "version": "3.1"
          },
          "products": [
            "SUSE Linux Enterprise Micro 5.5:kernel-devel-rt-5.14.21-150500.13.100.1.noarch",
            "SUSE Linux Enterprise Micro 5.5:kernel-rt-5.14.21-150500.13.100.2.x86_64",
            "SUSE Linux Enterprise Micro 5.5:kernel-source-rt-5.14.21-150500.13.100.1.noarch"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2025-07-15T14:31:35Z",
          "details": "moderate"
        }
      ],
      "title": "CVE-2022-50208"
    },
    {
      "cve": "CVE-2022-50209",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2022-50209"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "In the Linux kernel, the following vulnerability has been resolved:\n\nmeson-mx-socinfo: Fix refcount leak in meson_mx_socinfo_init\n\nof_find_matching_node() returns a node pointer with refcount\nincremented, we should use of_node_put() on it when not need anymore.\nAdd missing of_node_put() to avoid refcount leak.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "SUSE Linux Enterprise Micro 5.5:kernel-devel-rt-5.14.21-150500.13.100.1.noarch",
          "SUSE Linux Enterprise Micro 5.5:kernel-rt-5.14.21-150500.13.100.2.x86_64",
          "SUSE Linux Enterprise Micro 5.5:kernel-source-rt-5.14.21-150500.13.100.1.noarch"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2022-50209",
          "url": "https://www.suse.com/security/cve/CVE-2022-50209"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1244868 for CVE-2022-50209",
          "url": "https://bugzilla.suse.com/1244868"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "SUSE Linux Enterprise Micro 5.5:kernel-devel-rt-5.14.21-150500.13.100.1.noarch",
            "SUSE Linux Enterprise Micro 5.5:kernel-rt-5.14.21-150500.13.100.2.x86_64",
            "SUSE Linux Enterprise Micro 5.5:kernel-source-rt-5.14.21-150500.13.100.1.noarch"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 5.5,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
            "version": "3.1"
          },
          "products": [
            "SUSE Linux Enterprise Micro 5.5:kernel-devel-rt-5.14.21-150500.13.100.1.noarch",
            "SUSE Linux Enterprise Micro 5.5:kernel-rt-5.14.21-150500.13.100.2.x86_64",
            "SUSE Linux Enterprise Micro 5.5:kernel-source-rt-5.14.21-150500.13.100.1.noarch"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2025-07-15T14:31:35Z",
          "details": "moderate"
        }
      ],
      "title": "CVE-2022-50209"
    },
    {
      "cve": "CVE-2022-50211",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2022-50211"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "In the Linux kernel, the following vulnerability has been resolved:\n\nmd-raid10: fix KASAN warning\n\nThere\u0027s a KASAN warning in raid10_remove_disk when running the lvm\ntest lvconvert-raid-reshape.sh. We fix this warning by verifying that the\nvalue \"number\" is valid.\n\nBUG: KASAN: slab-out-of-bounds in raid10_remove_disk+0x61/0x2a0 [raid10]\nRead of size 8 at addr ffff889108f3d300 by task mdX_raid10/124682\n\nCPU: 3 PID: 124682 Comm: mdX_raid10 Not tainted 5.19.0-rc6 #1\nHardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.14.0-2 04/01/2014\nCall Trace:\n \u003cTASK\u003e\n dump_stack_lvl+0x34/0x44\n print_report.cold+0x45/0x57a\n ? __lock_text_start+0x18/0x18\n ? raid10_remove_disk+0x61/0x2a0 [raid10]\n kasan_report+0xa8/0xe0\n ? raid10_remove_disk+0x61/0x2a0 [raid10]\n raid10_remove_disk+0x61/0x2a0 [raid10]\nBuffer I/O error on dev dm-76, logical block 15344, async page read\n ? __mutex_unlock_slowpath.constprop.0+0x1e0/0x1e0\n remove_and_add_spares+0x367/0x8a0 [md_mod]\n ? super_written+0x1c0/0x1c0 [md_mod]\n ? mutex_trylock+0xac/0x120\n ? _raw_spin_lock+0x72/0xc0\n ? _raw_spin_lock_bh+0xc0/0xc0\n md_check_recovery+0x848/0x960 [md_mod]\n raid10d+0xcf/0x3360 [raid10]\n ? sched_clock_cpu+0x185/0x1a0\n ? rb_erase+0x4d4/0x620\n ? var_wake_function+0xe0/0xe0\n ? psi_group_change+0x411/0x500\n ? preempt_count_sub+0xf/0xc0\n ? _raw_spin_lock_irqsave+0x78/0xc0\n ? __lock_text_start+0x18/0x18\n ? raid10_sync_request+0x36c0/0x36c0 [raid10]\n ? preempt_count_sub+0xf/0xc0\n ? _raw_spin_unlock_irqrestore+0x19/0x40\n ? del_timer_sync+0xa9/0x100\n ? try_to_del_timer_sync+0xc0/0xc0\n ? _raw_spin_lock_irqsave+0x78/0xc0\n ? __lock_text_start+0x18/0x18\n ? _raw_spin_unlock_irq+0x11/0x24\n ? __list_del_entry_valid+0x68/0xa0\n ? finish_wait+0xa3/0x100\n md_thread+0x161/0x260 [md_mod]\n ? unregister_md_personality+0xa0/0xa0 [md_mod]\n ? _raw_spin_lock_irqsave+0x78/0xc0\n ? prepare_to_wait_event+0x2c0/0x2c0\n ? unregister_md_personality+0xa0/0xa0 [md_mod]\n kthread+0x148/0x180\n ? kthread_complete_and_exit+0x20/0x20\n ret_from_fork+0x1f/0x30\n \u003c/TASK\u003e\n\nAllocated by task 124495:\n kasan_save_stack+0x1e/0x40\n __kasan_kmalloc+0x80/0xa0\n setup_conf+0x140/0x5c0 [raid10]\n raid10_run+0x4cd/0x740 [raid10]\n md_run+0x6f9/0x1300 [md_mod]\n raid_ctr+0x2531/0x4ac0 [dm_raid]\n dm_table_add_target+0x2b0/0x620 [dm_mod]\n table_load+0x1c8/0x400 [dm_mod]\n ctl_ioctl+0x29e/0x560 [dm_mod]\n dm_compat_ctl_ioctl+0x7/0x20 [dm_mod]\n __do_compat_sys_ioctl+0xfa/0x160\n do_syscall_64+0x90/0xc0\n entry_SYSCALL_64_after_hwframe+0x46/0xb0\n\nLast potentially related work creation:\n kasan_save_stack+0x1e/0x40\n __kasan_record_aux_stack+0x9e/0xc0\n kvfree_call_rcu+0x84/0x480\n timerfd_release+0x82/0x140\nL __fput+0xfa/0x400\n task_work_run+0x80/0xc0\n exit_to_user_mode_prepare+0x155/0x160\n syscall_exit_to_user_mode+0x12/0x40\n do_syscall_64+0x42/0xc0\n entry_SYSCALL_64_after_hwframe+0x46/0xb0\n\nSecond to last potentially related work creation:\n kasan_save_stack+0x1e/0x40\n __kasan_record_aux_stack+0x9e/0xc0\n kvfree_call_rcu+0x84/0x480\n timerfd_release+0x82/0x140\n __fput+0xfa/0x400\n task_work_run+0x80/0xc0\n exit_to_user_mode_prepare+0x155/0x160\n syscall_exit_to_user_mode+0x12/0x40\n do_syscall_64+0x42/0xc0\n entry_SYSCALL_64_after_hwframe+0x46/0xb0\n\nThe buggy address belongs to the object at ffff889108f3d200\n which belongs to the cache kmalloc-256 of size 256\nThe buggy address is located 0 bytes to the right of\n 256-byte region [ffff889108f3d200, ffff889108f3d300)\n\nThe buggy address belongs to the physical page:\npage:000000007ef2a34c refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1108f3c\nhead:000000007ef2a34c order:2 compound_mapcount:0 compound_pincount:0\nflags: 0x4000000000010200(slab|head|zone=2)\nraw: 4000000000010200 0000000000000000 dead000000000001 ffff889100042b40\nraw: 0000000000000000 0000000080200020 00000001ffffffff 0000000000000000\npage dumped because: kasan: bad access detected\n\nMemory state around the buggy address:\n ffff889108f3d200: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00\n ffff889108f3d280: 00 00\n---truncated---",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "SUSE Linux Enterprise Micro 5.5:kernel-devel-rt-5.14.21-150500.13.100.1.noarch",
          "SUSE Linux Enterprise Micro 5.5:kernel-rt-5.14.21-150500.13.100.2.x86_64",
          "SUSE Linux Enterprise Micro 5.5:kernel-source-rt-5.14.21-150500.13.100.1.noarch"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2022-50211",
          "url": "https://www.suse.com/security/cve/CVE-2022-50211"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1245140 for CVE-2022-50211",
          "url": "https://bugzilla.suse.com/1245140"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1245141 for CVE-2022-50211",
          "url": "https://bugzilla.suse.com/1245141"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "SUSE Linux Enterprise Micro 5.5:kernel-devel-rt-5.14.21-150500.13.100.1.noarch",
            "SUSE Linux Enterprise Micro 5.5:kernel-rt-5.14.21-150500.13.100.2.x86_64",
            "SUSE Linux Enterprise Micro 5.5:kernel-source-rt-5.14.21-150500.13.100.1.noarch"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 7.8,
            "baseSeverity": "HIGH",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
            "version": "3.1"
          },
          "products": [
            "SUSE Linux Enterprise Micro 5.5:kernel-devel-rt-5.14.21-150500.13.100.1.noarch",
            "SUSE Linux Enterprise Micro 5.5:kernel-rt-5.14.21-150500.13.100.2.x86_64",
            "SUSE Linux Enterprise Micro 5.5:kernel-source-rt-5.14.21-150500.13.100.1.noarch"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2025-07-15T14:31:35Z",
          "details": "important"
        }
      ],
      "title": "CVE-2022-50211"
    },
    {
      "cve": "CVE-2022-50212",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2022-50212"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "In the Linux kernel, the following vulnerability has been resolved:\n\nnetfilter: nf_tables: do not allow CHAIN_ID to refer to another table\n\nWhen doing lookups for chains on the same batch by using its ID, a chain\nfrom a different table can be used. If a rule is added to a table but\nrefers to a chain in a different table, it will be linked to the chain in\ntable2, but would have expressions referring to objects in table1.\n\nThen, when table1 is removed, the rule will not be removed as its linked to\na chain in table2. When expressions in the rule are processed or removed,\nthat will lead to a use-after-free.\n\nWhen looking for chains by ID, use the table that was used for the lookup\nby name, and only return chains belonging to that same table.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "SUSE Linux Enterprise Micro 5.5:kernel-devel-rt-5.14.21-150500.13.100.1.noarch",
          "SUSE Linux Enterprise Micro 5.5:kernel-rt-5.14.21-150500.13.100.2.x86_64",
          "SUSE Linux Enterprise Micro 5.5:kernel-source-rt-5.14.21-150500.13.100.1.noarch"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2022-50212",
          "url": "https://www.suse.com/security/cve/CVE-2022-50212"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1244869 for CVE-2022-50212",
          "url": "https://bugzilla.suse.com/1244869"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "SUSE Linux Enterprise Micro 5.5:kernel-devel-rt-5.14.21-150500.13.100.1.noarch",
            "SUSE Linux Enterprise Micro 5.5:kernel-rt-5.14.21-150500.13.100.2.x86_64",
            "SUSE Linux Enterprise Micro 5.5:kernel-source-rt-5.14.21-150500.13.100.1.noarch"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 5.5,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
            "version": "3.1"
          },
          "products": [
            "SUSE Linux Enterprise Micro 5.5:kernel-devel-rt-5.14.21-150500.13.100.1.noarch",
            "SUSE Linux Enterprise Micro 5.5:kernel-rt-5.14.21-150500.13.100.2.x86_64",
            "SUSE Linux Enterprise Micro 5.5:kernel-source-rt-5.14.21-150500.13.100.1.noarch"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2025-07-15T14:31:35Z",
          "details": "moderate"
        }
      ],
      "title": "CVE-2022-50212"
    },
    {
      "cve": "CVE-2022-50213",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2022-50213"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "In the Linux kernel, the following vulnerability has been resolved:\n\nnetfilter: nf_tables: do not allow SET_ID to refer to another table\n\nWhen doing lookups for sets on the same batch by using its ID, a set from a\ndifferent table can be used.\n\nThen, when the table is removed, a reference to the set may be kept after\nthe set is freed, leading to a potential use-after-free.\n\nWhen looking for sets by ID, use the table that was used for the lookup by\nname, and only return sets belonging to that same table.\n\nThis fixes CVE-2022-2586, also reported as ZDI-CAN-17470.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "SUSE Linux Enterprise Micro 5.5:kernel-devel-rt-5.14.21-150500.13.100.1.noarch",
          "SUSE Linux Enterprise Micro 5.5:kernel-rt-5.14.21-150500.13.100.2.x86_64",
          "SUSE Linux Enterprise Micro 5.5:kernel-source-rt-5.14.21-150500.13.100.1.noarch"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2022-50213",
          "url": "https://www.suse.com/security/cve/CVE-2022-50213"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1244867 for CVE-2022-50213",
          "url": "https://bugzilla.suse.com/1244867"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "SUSE Linux Enterprise Micro 5.5:kernel-devel-rt-5.14.21-150500.13.100.1.noarch",
            "SUSE Linux Enterprise Micro 5.5:kernel-rt-5.14.21-150500.13.100.2.x86_64",
            "SUSE Linux Enterprise Micro 5.5:kernel-source-rt-5.14.21-150500.13.100.1.noarch"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 5.5,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
            "version": "3.1"
          },
          "products": [
            "SUSE Linux Enterprise Micro 5.5:kernel-devel-rt-5.14.21-150500.13.100.1.noarch",
            "SUSE Linux Enterprise Micro 5.5:kernel-rt-5.14.21-150500.13.100.2.x86_64",
            "SUSE Linux Enterprise Micro 5.5:kernel-source-rt-5.14.21-150500.13.100.1.noarch"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2025-07-15T14:31:35Z",
          "details": "moderate"
        }
      ],
      "title": "CVE-2022-50213"
    },
    {
      "cve": "CVE-2022-50215",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2022-50215"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "In the Linux kernel, the following vulnerability has been resolved:\n\nscsi: sg: Allow waiting for commands to complete on removed device\n\nWhen a SCSI device is removed while in active use, currently sg will\nimmediately return -ENODEV on any attempt to wait for active commands that\nwere sent before the removal.  This is problematic for commands that use\nSG_FLAG_DIRECT_IO since the data buffer may still be in use by the kernel\nwhen userspace frees or reuses it after getting ENODEV, leading to\ncorrupted userspace memory (in the case of READ-type commands) or corrupted\ndata being sent to the device (in the case of WRITE-type commands).  This\nhas been seen in practice when logging out of a iscsi_tcp session, where\nthe iSCSI driver may still be processing commands after the device has been\nmarked for removal.\n\nChange the policy to allow userspace to wait for active sg commands even\nwhen the device is being removed.  Return -ENODEV only when there are no\nmore responses to read.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "SUSE Linux Enterprise Micro 5.5:kernel-devel-rt-5.14.21-150500.13.100.1.noarch",
          "SUSE Linux Enterprise Micro 5.5:kernel-rt-5.14.21-150500.13.100.2.x86_64",
          "SUSE Linux Enterprise Micro 5.5:kernel-source-rt-5.14.21-150500.13.100.1.noarch"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2022-50215",
          "url": "https://www.suse.com/security/cve/CVE-2022-50215"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1245138 for CVE-2022-50215",
          "url": "https://bugzilla.suse.com/1245138"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "SUSE Linux Enterprise Micro 5.5:kernel-devel-rt-5.14.21-150500.13.100.1.noarch",
            "SUSE Linux Enterprise Micro 5.5:kernel-rt-5.14.21-150500.13.100.2.x86_64",
            "SUSE Linux Enterprise Micro 5.5:kernel-source-rt-5.14.21-150500.13.100.1.noarch"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 6.1,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:H",
            "version": "3.1"
          },
          "products": [
            "SUSE Linux Enterprise Micro 5.5:kernel-devel-rt-5.14.21-150500.13.100.1.noarch",
            "SUSE Linux Enterprise Micro 5.5:kernel-rt-5.14.21-150500.13.100.2.x86_64",
            "SUSE Linux Enterprise Micro 5.5:kernel-source-rt-5.14.21-150500.13.100.1.noarch"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2025-07-15T14:31:35Z",
          "details": "moderate"
        }
      ],
      "title": "CVE-2022-50215"
    },
    {
      "cve": "CVE-2022-50218",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2022-50218"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "In the Linux kernel, the following vulnerability has been resolved:\n\niio: light: isl29028: Fix the warning in isl29028_remove()\n\nThe driver use the non-managed form of the register function in\nisl29028_remove(). To keep the release order as mirroring the ordering\nin probe, the driver should use non-managed form in probe, too.\n\nThe following log reveals it:\n\n[   32.374955] isl29028 0-0010: remove\n[   32.376861] general protection fault, probably for non-canonical address 0xdffffc0000000006: 0000 [#1] PREEMPT SMP KASAN PTI\n[   32.377676] KASAN: null-ptr-deref in range [0x0000000000000030-0x0000000000000037]\n[   32.379432] RIP: 0010:kernfs_find_and_get_ns+0x28/0xe0\n[   32.385461] Call Trace:\n[   32.385807]  sysfs_unmerge_group+0x59/0x110\n[   32.386110]  dpm_sysfs_remove+0x58/0xc0\n[   32.386391]  device_del+0x296/0xe50\n[   32.386959]  cdev_device_del+0x1d/0xd0\n[   32.387231]  devm_iio_device_unreg+0x27/0xb0\n[   32.387542]  devres_release_group+0x319/0x3d0\n[   32.388162]  i2c_device_remove+0x93/0x1f0",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "SUSE Linux Enterprise Micro 5.5:kernel-devel-rt-5.14.21-150500.13.100.1.noarch",
          "SUSE Linux Enterprise Micro 5.5:kernel-rt-5.14.21-150500.13.100.2.x86_64",
          "SUSE Linux Enterprise Micro 5.5:kernel-source-rt-5.14.21-150500.13.100.1.noarch"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2022-50218",
          "url": "https://www.suse.com/security/cve/CVE-2022-50218"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1244861 for CVE-2022-50218",
          "url": "https://bugzilla.suse.com/1244861"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "SUSE Linux Enterprise Micro 5.5:kernel-devel-rt-5.14.21-150500.13.100.1.noarch",
            "SUSE Linux Enterprise Micro 5.5:kernel-rt-5.14.21-150500.13.100.2.x86_64",
            "SUSE Linux Enterprise Micro 5.5:kernel-source-rt-5.14.21-150500.13.100.1.noarch"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 5.5,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
            "version": "3.1"
          },
          "products": [
            "SUSE Linux Enterprise Micro 5.5:kernel-devel-rt-5.14.21-150500.13.100.1.noarch",
            "SUSE Linux Enterprise Micro 5.5:kernel-rt-5.14.21-150500.13.100.2.x86_64",
            "SUSE Linux Enterprise Micro 5.5:kernel-source-rt-5.14.21-150500.13.100.1.noarch"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2025-07-15T14:31:35Z",
          "details": "moderate"
        }
      ],
      "title": "CVE-2022-50218"
    },
    {
      "cve": "CVE-2022-50220",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2022-50220"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "In the Linux kernel, the following vulnerability has been resolved:\n\nusbnet: Fix linkwatch use-after-free on disconnect\n\nusbnet uses the work usbnet_deferred_kevent() to perform tasks which may\nsleep.  On disconnect, completion of the work was originally awaited in\n-\u003endo_stop().  But in 2003, that was moved to -\u003edisconnect() by historic\ncommit \"[PATCH] USB: usbnet, prevent exotic rtnl deadlock\":\n\n  https://git.kernel.org/tglx/history/c/0f138bbfd83c\n\nThe change was made because back then, the kernel\u0027s workqueue\nimplementation did not allow waiting for a single work.  One had to wait\nfor completion of *all* work by calling flush_scheduled_work(), and that\ncould deadlock when waiting for usbnet_deferred_kevent() with rtnl_mutex\nheld in -\u003endo_stop().\n\nThe commit solved one problem but created another:  It causes a\nuse-after-free in USB Ethernet drivers aqc111.c, asix_devices.c,\nax88179_178a.c, ch9200.c and smsc75xx.c:\n\n* If the drivers receive a link change interrupt immediately before\n  disconnect, they raise EVENT_LINK_RESET in their (non-sleepable)\n  -\u003estatus() callback and schedule usbnet_deferred_kevent().\n* usbnet_deferred_kevent() invokes the driver\u0027s -\u003elink_reset() callback,\n  which calls netif_carrier_{on,off}().\n* That in turn schedules the work linkwatch_event().\n\nBecause usbnet_deferred_kevent() is awaited after unregister_netdev(),\nnetif_carrier_{on,off}() may operate on an unregistered netdev and\nlinkwatch_event() may run after free_netdev(), causing a use-after-free.\n\nIn 2010, usbnet was changed to only wait for a single instance of\nusbnet_deferred_kevent() instead of *all* work by commit 23f333a2bfaf\n(\"drivers/net: don\u0027t use flush_scheduled_work()\").\n\nUnfortunately the commit neglected to move the wait back to\n-\u003endo_stop().  Rectify that omission at long last.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "SUSE Linux Enterprise Micro 5.5:kernel-devel-rt-5.14.21-150500.13.100.1.noarch",
          "SUSE Linux Enterprise Micro 5.5:kernel-rt-5.14.21-150500.13.100.2.x86_64",
          "SUSE Linux Enterprise Micro 5.5:kernel-source-rt-5.14.21-150500.13.100.1.noarch"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2022-50220",
          "url": "https://www.suse.com/security/cve/CVE-2022-50220"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1245348 for CVE-2022-50220",
          "url": "https://bugzilla.suse.com/1245348"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "SUSE Linux Enterprise Micro 5.5:kernel-devel-rt-5.14.21-150500.13.100.1.noarch",
            "SUSE Linux Enterprise Micro 5.5:kernel-rt-5.14.21-150500.13.100.2.x86_64",
            "SUSE Linux Enterprise Micro 5.5:kernel-source-rt-5.14.21-150500.13.100.1.noarch"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 6.5,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:L/I:H/A:H",
            "version": "3.1"
          },
          "products": [
            "SUSE Linux Enterprise Micro 5.5:kernel-devel-rt-5.14.21-150500.13.100.1.noarch",
            "SUSE Linux Enterprise Micro 5.5:kernel-rt-5.14.21-150500.13.100.2.x86_64",
            "SUSE Linux Enterprise Micro 5.5:kernel-source-rt-5.14.21-150500.13.100.1.noarch"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2025-07-15T14:31:35Z",
          "details": "moderate"
        }
      ],
      "title": "CVE-2022-50220"
    },
    {
      "cve": "CVE-2022-50221",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2022-50221"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "In the Linux kernel, the following vulnerability has been resolved:\n\ndrm/fb-helper: Fix out-of-bounds access\n\nClip memory range to screen-buffer size to avoid out-of-bounds access\nin fbdev deferred I/O\u0027s damage handling.\n\nFbdev\u0027s deferred I/O can only track pages. From the range of pages, the\ndamage handler computes the clipping rectangle for the display update.\nIf the fbdev screen buffer ends near the beginning of a page, that page\ncould contain more scanlines. The damage handler would then track these\nnon-existing scanlines as dirty and provoke an out-of-bounds access\nduring the screen update. Hence, clip the maximum memory range to the\nsize of the screen buffer.\n\nWhile at it, rename the variables min/max to min_off/max_off in\ndrm_fb_helper_deferred_io(). This avoids confusion with the macros of\nthe same name.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "SUSE Linux Enterprise Micro 5.5:kernel-devel-rt-5.14.21-150500.13.100.1.noarch",
          "SUSE Linux Enterprise Micro 5.5:kernel-rt-5.14.21-150500.13.100.2.x86_64",
          "SUSE Linux Enterprise Micro 5.5:kernel-source-rt-5.14.21-150500.13.100.1.noarch"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2022-50221",
          "url": "https://www.suse.com/security/cve/CVE-2022-50221"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1244858 for CVE-2022-50221",
          "url": "https://bugzilla.suse.com/1244858"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "SUSE Linux Enterprise Micro 5.5:kernel-devel-rt-5.14.21-150500.13.100.1.noarch",
            "SUSE Linux Enterprise Micro 5.5:kernel-rt-5.14.21-150500.13.100.2.x86_64",
            "SUSE Linux Enterprise Micro 5.5:kernel-source-rt-5.14.21-150500.13.100.1.noarch"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 5.5,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
            "version": "3.1"
          },
          "products": [
            "SUSE Linux Enterprise Micro 5.5:kernel-devel-rt-5.14.21-150500.13.100.1.noarch",
            "SUSE Linux Enterprise Micro 5.5:kernel-rt-5.14.21-150500.13.100.2.x86_64",
            "SUSE Linux Enterprise Micro 5.5:kernel-source-rt-5.14.21-150500.13.100.1.noarch"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2025-07-15T14:31:35Z",
          "details": "moderate"
        }
      ],
      "title": "CVE-2022-50221"
    },
    {
      "cve": "CVE-2022-50222",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2022-50222"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "In the Linux kernel, the following vulnerability has been resolved:\n\ntty: vt: initialize unicode screen buffer\n\nsyzbot reports kernel infoleak at vcs_read() [1], for buffer can be read\nimmediately after resize operation. Initialize buffer using kzalloc().\n\n  ----------\n  #include \u003cfcntl.h\u003e\n  #include \u003cunistd.h\u003e\n  #include \u003csys/ioctl.h\u003e\n  #include \u003clinux/fb.h\u003e\n\n  int main(int argc, char *argv[])\n  {\n    struct fb_var_screeninfo var = { };\n    const int fb_fd = open(\"/dev/fb0\", 3);\n    ioctl(fb_fd, FBIOGET_VSCREENINFO, \u0026var);\n    var.yres = 0x21;\n    ioctl(fb_fd, FBIOPUT_VSCREENINFO, \u0026var);\n    return read(open(\"/dev/vcsu\", O_RDONLY), \u0026var, sizeof(var)) == -1;\n  }\n  ----------",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "SUSE Linux Enterprise Micro 5.5:kernel-devel-rt-5.14.21-150500.13.100.1.noarch",
          "SUSE Linux Enterprise Micro 5.5:kernel-rt-5.14.21-150500.13.100.2.x86_64",
          "SUSE Linux Enterprise Micro 5.5:kernel-source-rt-5.14.21-150500.13.100.1.noarch"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2022-50222",
          "url": "https://www.suse.com/security/cve/CVE-2022-50222"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1245136 for CVE-2022-50222",
          "url": "https://bugzilla.suse.com/1245136"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "SUSE Linux Enterprise Micro 5.5:kernel-devel-rt-5.14.21-150500.13.100.1.noarch",
            "SUSE Linux Enterprise Micro 5.5:kernel-rt-5.14.21-150500.13.100.2.x86_64",
            "SUSE Linux Enterprise Micro 5.5:kernel-source-rt-5.14.21-150500.13.100.1.noarch"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 3.3,
            "baseSeverity": "LOW",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N",
            "version": "3.1"
          },
          "products": [
            "SUSE Linux Enterprise Micro 5.5:kernel-devel-rt-5.14.21-150500.13.100.1.noarch",
            "SUSE Linux Enterprise Micro 5.5:kernel-rt-5.14.21-150500.13.100.2.x86_64",
            "SUSE Linux Enterprise Micro 5.5:kernel-source-rt-5.14.21-150500.13.100.1.noarch"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2025-07-15T14:31:35Z",
          "details": "moderate"
        }
      ],
      "title": "CVE-2022-50222"
    },
    {
      "cve": "CVE-2022-50226",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2022-50226"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "In the Linux kernel, the following vulnerability has been resolved:\n\ncrypto: ccp - Use kzalloc for sev ioctl interfaces to prevent kernel memory leak\n\nFor some sev ioctl interfaces, input may be passed that is less than or\nequal to SEV_FW_BLOB_MAX_SIZE, but larger than the data that PSP\nfirmware returns. In this case, kmalloc will allocate memory that is the\nsize of the input rather than the size of the data. Since PSP firmware\ndoesn\u0027t fully overwrite the buffer, the sev ioctl interfaces with the\nissue may return uninitialized slab memory.\n\nCurrently, all of the ioctl interfaces in the ccp driver are safe, but\nto prevent future problems, change all ioctl interfaces that allocate\nmemory with kmalloc to use kzalloc and memset the data buffer to zero\nin sev_ioctl_do_platform_status.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "SUSE Linux Enterprise Micro 5.5:kernel-devel-rt-5.14.21-150500.13.100.1.noarch",
          "SUSE Linux Enterprise Micro 5.5:kernel-rt-5.14.21-150500.13.100.2.x86_64",
          "SUSE Linux Enterprise Micro 5.5:kernel-source-rt-5.14.21-150500.13.100.1.noarch"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2022-50226",
          "url": "https://www.suse.com/security/cve/CVE-2022-50226"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1244860 for CVE-2022-50226",
          "url": "https://bugzilla.suse.com/1244860"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "SUSE Linux Enterprise Micro 5.5:kernel-devel-rt-5.14.21-150500.13.100.1.noarch",
            "SUSE Linux Enterprise Micro 5.5:kernel-rt-5.14.21-150500.13.100.2.x86_64",
            "SUSE Linux Enterprise Micro 5.5:kernel-source-rt-5.14.21-150500.13.100.1.noarch"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 5.5,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
            "version": "3.1"
          },
          "products": [
            "SUSE Linux Enterprise Micro 5.5:kernel-devel-rt-5.14.21-150500.13.100.1.noarch",
            "SUSE Linux Enterprise Micro 5.5:kernel-rt-5.14.21-150500.13.100.2.x86_64",
            "SUSE Linux Enterprise Micro 5.5:kernel-source-rt-5.14.21-150500.13.100.1.noarch"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2025-07-15T14:31:35Z",
          "details": "moderate"
        }
      ],
      "title": "CVE-2022-50226"
    },
    {
      "cve": "CVE-2022-50228",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2022-50228"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "In the Linux kernel, the following vulnerability has been resolved:\n\nKVM: SVM: Don\u0027t BUG if userspace injects an interrupt with GIF=0\n\nDon\u0027t BUG/WARN on interrupt injection due to GIF being cleared,\nsince it\u0027s trivial for userspace to force the situation via\nKVM_SET_VCPU_EVENTS (even if having at least a WARN there would be correct\nfor KVM internally generated injections).\n\n  kernel BUG at arch/x86/kvm/svm/svm.c:3386!\n  invalid opcode: 0000 [#1] SMP\n  CPU: 15 PID: 926 Comm: smm_test Not tainted 5.17.0-rc3+ #264\n  Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 0.0.0 02/06/2015\n  RIP: 0010:svm_inject_irq+0xab/0xb0 [kvm_amd]\n  Code: \u003c0f\u003e 0b 0f 1f 00 0f 1f 44 00 00 80 3d ac b3 01 00 00 55 48 89 f5 53\n  RSP: 0018:ffffc90000b37d88 EFLAGS: 00010246\n  RAX: 0000000000000000 RBX: ffff88810a234ac0 RCX: 0000000000000006\n  RDX: 0000000000000000 RSI: ffffc90000b37df7 RDI: ffff88810a234ac0\n  RBP: ffffc90000b37df7 R08: ffff88810a1fa410 R09: 0000000000000000\n  R10: 0000000000000000 R11: 0000000000000000 R12: 0000000000000000\n  R13: ffff888109571000 R14: ffff88810a234ac0 R15: 0000000000000000\n  FS:  0000000001821380(0000) GS:ffff88846fdc0000(0000) knlGS:0000000000000000\n  CS:  0010 DS: 0000 ES: 0000 CR0: 0000000080050033\n  CR2: 00007f74fc550008 CR3: 000000010a6fe000 CR4: 0000000000350ea0\n  Call Trace:\n   \u003cTASK\u003e\n   inject_pending_event+0x2f7/0x4c0 [kvm]\n   kvm_arch_vcpu_ioctl_run+0x791/0x17a0 [kvm]\n   kvm_vcpu_ioctl+0x26d/0x650 [kvm]\n   __x64_sys_ioctl+0x82/0xb0\n   do_syscall_64+0x3b/0xc0\n   entry_SYSCALL_64_after_hwframe+0x44/0xae\n   \u003c/TASK\u003e",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "SUSE Linux Enterprise Micro 5.5:kernel-devel-rt-5.14.21-150500.13.100.1.noarch",
          "SUSE Linux Enterprise Micro 5.5:kernel-rt-5.14.21-150500.13.100.2.x86_64",
          "SUSE Linux Enterprise Micro 5.5:kernel-source-rt-5.14.21-150500.13.100.1.noarch"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2022-50228",
          "url": "https://www.suse.com/security/cve/CVE-2022-50228"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1244854 for CVE-2022-50228",
          "url": "https://bugzilla.suse.com/1244854"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "SUSE Linux Enterprise Micro 5.5:kernel-devel-rt-5.14.21-150500.13.100.1.noarch",
            "SUSE Linux Enterprise Micro 5.5:kernel-rt-5.14.21-150500.13.100.2.x86_64",
            "SUSE Linux Enterprise Micro 5.5:kernel-source-rt-5.14.21-150500.13.100.1.noarch"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 5.5,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
            "version": "3.1"
          },
          "products": [
            "SUSE Linux Enterprise Micro 5.5:kernel-devel-rt-5.14.21-150500.13.100.1.noarch",
            "SUSE Linux Enterprise Micro 5.5:kernel-rt-5.14.21-150500.13.100.2.x86_64",
            "SUSE Linux Enterprise Micro 5.5:kernel-source-rt-5.14.21-150500.13.100.1.noarch"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2025-07-15T14:31:35Z",
          "details": "moderate"
        }
      ],
      "title": "CVE-2022-50228"
    },
    {
      "cve": "CVE-2022-50229",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2022-50229"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "In the Linux kernel, the following vulnerability has been resolved:\n\nALSA: bcd2000: Fix a UAF bug on the error path of probing\n\nWhen the driver fails in snd_card_register() at probe time, it will free\nthe \u0027bcd2k-\u003emidi_out_urb\u0027 before killing it, which may cause a UAF bug.\n\nThe following log can reveal it:\n\n[   50.727020] BUG: KASAN: use-after-free in bcd2000_input_complete+0x1f1/0x2e0 [snd_bcd2000]\n[   50.727623] Read of size 8 at addr ffff88810fab0e88 by task swapper/4/0\n[   50.729530] Call Trace:\n[   50.732899]  bcd2000_input_complete+0x1f1/0x2e0 [snd_bcd2000]\n\nFix this by adding usb_kill_urb() before usb_free_urb().",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "SUSE Linux Enterprise Micro 5.5:kernel-devel-rt-5.14.21-150500.13.100.1.noarch",
          "SUSE Linux Enterprise Micro 5.5:kernel-rt-5.14.21-150500.13.100.2.x86_64",
          "SUSE Linux Enterprise Micro 5.5:kernel-source-rt-5.14.21-150500.13.100.1.noarch"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2022-50229",
          "url": "https://www.suse.com/security/cve/CVE-2022-50229"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1244856 for CVE-2022-50229",
          "url": "https://bugzilla.suse.com/1244856"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "SUSE Linux Enterprise Micro 5.5:kernel-devel-rt-5.14.21-150500.13.100.1.noarch",
            "SUSE Linux Enterprise Micro 5.5:kernel-rt-5.14.21-150500.13.100.2.x86_64",
            "SUSE Linux Enterprise Micro 5.5:kernel-source-rt-5.14.21-150500.13.100.1.noarch"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 5.5,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
            "version": "3.1"
          },
          "products": [
            "SUSE Linux Enterprise Micro 5.5:kernel-devel-rt-5.14.21-150500.13.100.1.noarch",
            "SUSE Linux Enterprise Micro 5.5:kernel-rt-5.14.21-150500.13.100.2.x86_64",
            "SUSE Linux Enterprise Micro 5.5:kernel-source-rt-5.14.21-150500.13.100.1.noarch"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2025-07-15T14:31:35Z",
          "details": "moderate"
        }
      ],
      "title": "CVE-2022-50229"
    },
    {
      "cve": "CVE-2022-50231",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2022-50231"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "In the Linux kernel, the following vulnerability has been resolved:\n\ncrypto: arm64/poly1305 - fix a read out-of-bound\n\nA kasan error was reported during fuzzing:\n\nBUG: KASAN: slab-out-of-bounds in neon_poly1305_blocks.constprop.0+0x1b4/0x250 [poly1305_neon]\nRead of size 4 at addr ffff0010e293f010 by task syz-executor.5/1646715\nCPU: 4 PID: 1646715 Comm: syz-executor.5 Kdump: loaded Not tainted 5.10.0.aarch64 #1\nHardware name: Huawei TaiShan 2280 /BC11SPCD, BIOS 1.59 01/31/2019\nCall trace:\n dump_backtrace+0x0/0x394\n show_stack+0x34/0x4c arch/arm64/kernel/stacktrace.c:196\n __dump_stack lib/dump_stack.c:77 [inline]\n dump_stack+0x158/0x1e4 lib/dump_stack.c:118\n print_address_description.constprop.0+0x68/0x204 mm/kasan/report.c:387\n __kasan_report+0xe0/0x140 mm/kasan/report.c:547\n kasan_report+0x44/0xe0 mm/kasan/report.c:564\n check_memory_region_inline mm/kasan/generic.c:187 [inline]\n __asan_load4+0x94/0xd0 mm/kasan/generic.c:252\n neon_poly1305_blocks.constprop.0+0x1b4/0x250 [poly1305_neon]\n neon_poly1305_do_update+0x6c/0x15c [poly1305_neon]\n neon_poly1305_update+0x9c/0x1c4 [poly1305_neon]\n crypto_shash_update crypto/shash.c:131 [inline]\n shash_finup_unaligned+0x84/0x15c crypto/shash.c:179\n crypto_shash_finup+0x8c/0x140 crypto/shash.c:193\n shash_digest_unaligned+0xb8/0xe4 crypto/shash.c:201\n crypto_shash_digest+0xa4/0xfc crypto/shash.c:217\n crypto_shash_tfm_digest+0xb4/0x150 crypto/shash.c:229\n essiv_skcipher_setkey+0x164/0x200 [essiv]\n crypto_skcipher_setkey+0xb0/0x160 crypto/skcipher.c:612\n skcipher_setkey+0x3c/0x50 crypto/algif_skcipher.c:305\n alg_setkey+0x114/0x2a0 crypto/af_alg.c:220\n alg_setsockopt+0x19c/0x210 crypto/af_alg.c:253\n __sys_setsockopt+0x190/0x2e0 net/socket.c:2123\n __do_sys_setsockopt net/socket.c:2134 [inline]\n __se_sys_setsockopt net/socket.c:2131 [inline]\n __arm64_sys_setsockopt+0x78/0x94 net/socket.c:2131\n __invoke_syscall arch/arm64/kernel/syscall.c:36 [inline]\n invoke_syscall+0x64/0x100 arch/arm64/kernel/syscall.c:48\n el0_svc_common.constprop.0+0x220/0x230 arch/arm64/kernel/syscall.c:155\n do_el0_svc+0xb4/0xd4 arch/arm64/kernel/syscall.c:217\n el0_svc+0x24/0x3c arch/arm64/kernel/entry-common.c:353\n el0_sync_handler+0x160/0x164 arch/arm64/kernel/entry-common.c:369\n el0_sync+0x160/0x180 arch/arm64/kernel/entry.S:683\n\nThis error can be reproduced by the following code compiled as ko on a\nsystem with kasan enabled:\n\n#include \u003clinux/module.h\u003e\n#include \u003clinux/crypto.h\u003e\n#include \u003ccrypto/hash.h\u003e\n#include \u003ccrypto/poly1305.h\u003e\n\nchar test_data[] = \"\\x00\\x01\\x02\\x03\\x04\\x05\\x06\\x07\"\n                   \"\\x08\\x09\\x0a\\x0b\\x0c\\x0d\\x0e\\x0f\"\n                   \"\\x10\\x11\\x12\\x13\\x14\\x15\\x16\\x17\"\n                   \"\\x18\\x19\\x1a\\x1b\\x1c\\x1d\\x1e\";\n\nint init(void)\n{\n        struct crypto_shash *tfm = NULL;\n        char *data = NULL, *out = NULL;\n\n        tfm = crypto_alloc_shash(\"poly1305\", 0, 0);\n        data = kmalloc(POLY1305_KEY_SIZE - 1, GFP_KERNEL);\n        out = kmalloc(POLY1305_DIGEST_SIZE, GFP_KERNEL);\n        memcpy(data, test_data, POLY1305_KEY_SIZE - 1);\n        crypto_shash_tfm_digest(tfm, data, POLY1305_KEY_SIZE - 1, out);\n\n        kfree(data);\n        kfree(out);\n        return 0;\n}\n\nvoid deinit(void)\n{\n}\n\nmodule_init(init)\nmodule_exit(deinit)\nMODULE_LICENSE(\"GPL\");\n\nThe root cause of the bug sits in neon_poly1305_blocks. The logic\nneon_poly1305_blocks() performed is that if it was called with both s[]\nand r[] uninitialized, it will first try to initialize them with the\ndata from the first \"block\" that it believed to be 32 bytes in length.\nFirst 16 bytes are used as the key and the next 16 bytes for s[]. This\nwould lead to the aforementioned read out-of-bound. However, after\ncalling poly1305_init_arch(), only 16 bytes were deducted from the input\nand s[] is initialized yet again with the following 16 bytes. The second\ninitialization of s[] is certainly redundent which indicates that the\nfirst initialization should be for r[] only.\n\nThis patch fixes the issue by calling poly1305_init_arm64() instead o\n---truncated---",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "SUSE Linux Enterprise Micro 5.5:kernel-devel-rt-5.14.21-150500.13.100.1.noarch",
          "SUSE Linux Enterprise Micro 5.5:kernel-rt-5.14.21-150500.13.100.2.x86_64",
          "SUSE Linux Enterprise Micro 5.5:kernel-source-rt-5.14.21-150500.13.100.1.noarch"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2022-50231",
          "url": "https://www.suse.com/security/cve/CVE-2022-50231"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1244853 for CVE-2022-50231",
          "url": "https://bugzilla.suse.com/1244853"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "SUSE Linux Enterprise Micro 5.5:kernel-devel-rt-5.14.21-150500.13.100.1.noarch",
            "SUSE Linux Enterprise Micro 5.5:kernel-rt-5.14.21-150500.13.100.2.x86_64",
            "SUSE Linux Enterprise Micro 5.5:kernel-source-rt-5.14.21-150500.13.100.1.noarch"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 5.5,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
            "version": "3.1"
          },
          "products": [
            "SUSE Linux Enterprise Micro 5.5:kernel-devel-rt-5.14.21-150500.13.100.1.noarch",
            "SUSE Linux Enterprise Micro 5.5:kernel-rt-5.14.21-150500.13.100.2.x86_64",
            "SUSE Linux Enterprise Micro 5.5:kernel-source-rt-5.14.21-150500.13.100.1.noarch"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2025-07-15T14:31:35Z",
          "details": "moderate"
        }
      ],
      "title": "CVE-2022-50231"
    },
    {
      "cve": "CVE-2023-3111",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2023-3111"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "A use after free vulnerability was found in prepare_to_relocate in fs/btrfs/relocation.c in btrfs in the Linux Kernel. This possible flaw can be triggered by calling btrfs_ioctl_balance() before calling btrfs_ioctl_defrag().",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "SUSE Linux Enterprise Micro 5.5:kernel-devel-rt-5.14.21-150500.13.100.1.noarch",
          "SUSE Linux Enterprise Micro 5.5:kernel-rt-5.14.21-150500.13.100.2.x86_64",
          "SUSE Linux Enterprise Micro 5.5:kernel-source-rt-5.14.21-150500.13.100.1.noarch"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2023-3111",
          "url": "https://www.suse.com/security/cve/CVE-2023-3111"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1212051 for CVE-2023-3111",
          "url": "https://bugzilla.suse.com/1212051"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1220015 for CVE-2023-3111",
          "url": "https://bugzilla.suse.com/1220015"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "SUSE Linux Enterprise Micro 5.5:kernel-devel-rt-5.14.21-150500.13.100.1.noarch",
            "SUSE Linux Enterprise Micro 5.5:kernel-rt-5.14.21-150500.13.100.2.x86_64",
            "SUSE Linux Enterprise Micro 5.5:kernel-source-rt-5.14.21-150500.13.100.1.noarch"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 6.7,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H",
            "version": "3.1"
          },
          "products": [
            "SUSE Linux Enterprise Micro 5.5:kernel-devel-rt-5.14.21-150500.13.100.1.noarch",
            "SUSE Linux Enterprise Micro 5.5:kernel-rt-5.14.21-150500.13.100.2.x86_64",
            "SUSE Linux Enterprise Micro 5.5:kernel-source-rt-5.14.21-150500.13.100.1.noarch"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2025-07-15T14:31:35Z",
          "details": "moderate"
        }
      ],
      "title": "CVE-2023-3111"
    },
    {
      "cve": "CVE-2023-52924",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2023-52924"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "In the Linux kernel, the following vulnerability has been resolved:\n\nnetfilter: nf_tables: don\u0027t skip expired elements during walk\n\nThere is an asymmetry between commit/abort and preparation phase if the\nfollowing conditions are met:\n\n1. set is a verdict map (\"1.2.3.4 : jump foo\")\n2. timeouts are enabled\n\nIn this case, following sequence is problematic:\n\n1. element E in set S refers to chain C\n2. userspace requests removal of set S\n3. kernel does a set walk to decrement chain-\u003euse count for all elements\n   from preparation phase\n4. kernel does another set walk to remove elements from the commit phase\n   (or another walk to do a chain-\u003euse increment for all elements from\n    abort phase)\n\nIf E has already expired in 1), it will be ignored during list walk, so its use count\nwon\u0027t have been changed.\n\nThen, when set is culled, -\u003edestroy callback will zap the element via\nnf_tables_set_elem_destroy(), but this function is only safe for\nelements that have been deactivated earlier from the preparation phase:\nlack of earlier deactivate removes the element but leaks the chain use\ncount, which results in a WARN splat when the chain gets removed later,\nplus a leak of the nft_chain structure.\n\nUpdate pipapo_get() not to skip expired elements, otherwise flush\ncommand reports bogus ENOENT errors.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "SUSE Linux Enterprise Micro 5.5:kernel-devel-rt-5.14.21-150500.13.100.1.noarch",
          "SUSE Linux Enterprise Micro 5.5:kernel-rt-5.14.21-150500.13.100.2.x86_64",
          "SUSE Linux Enterprise Micro 5.5:kernel-source-rt-5.14.21-150500.13.100.1.noarch"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2023-52924",
          "url": "https://www.suse.com/security/cve/CVE-2023-52924"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1236821 for CVE-2023-52924",
          "url": "https://bugzilla.suse.com/1236821"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1244630 for CVE-2023-52924",
          "url": "https://bugzilla.suse.com/1244630"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "SUSE Linux Enterprise Micro 5.5:kernel-devel-rt-5.14.21-150500.13.100.1.noarch",
            "SUSE Linux Enterprise Micro 5.5:kernel-rt-5.14.21-150500.13.100.2.x86_64",
            "SUSE Linux Enterprise Micro 5.5:kernel-source-rt-5.14.21-150500.13.100.1.noarch"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 7.8,
            "baseSeverity": "HIGH",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
            "version": "3.1"
          },
          "products": [
            "SUSE Linux Enterprise Micro 5.5:kernel-devel-rt-5.14.21-150500.13.100.1.noarch",
            "SUSE Linux Enterprise Micro 5.5:kernel-rt-5.14.21-150500.13.100.2.x86_64",
            "SUSE Linux Enterprise Micro 5.5:kernel-source-rt-5.14.21-150500.13.100.1.noarch"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2025-07-15T14:31:35Z",
          "details": "important"
        }
      ],
      "title": "CVE-2023-52924"
    },
    {
      "cve": "CVE-2023-52925",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2023-52925"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "In the Linux kernel, the following vulnerability has been resolved:\n\nnetfilter: nf_tables: don\u0027t fail inserts if duplicate has expired\n\nnftables selftests fail:\nrun-tests.sh testcases/sets/0044interval_overlap_0\nExpected: 0-2 . 0-3, got:\nW: [FAILED]     ./testcases/sets/0044interval_overlap_0: got 1\n\nInsertion must ignore duplicate but expired entries.\n\nMoreover, there is a strange asymmetry in nft_pipapo_activate:\n\nIt refetches the current element, whereas the other -\u003eactivate callbacks\n(bitmap, hash, rhash, rbtree) use elem-\u003epriv.\nSame for .remove: other set implementations take elem-\u003epriv,\nnft_pipapo_remove fetches elem-\u003epriv, then does a relookup,\nremove this.\n\nI suspect this was the reason for the change that prompted the\nremoval of the expired check in pipapo_get() in the first place,\nbut skipping exired elements there makes no sense to me, this helper\nis used for normal get requests, insertions (duplicate check)\nand deactivate callback.\n\nIn first two cases expired elements must be skipped.\n\nFor -\u003edeactivate(), this gets called for DELSETELEM, so it\nseems to me that expired elements should be skipped as well, i.e.\ndelete request should fail with -ENOENT error.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "SUSE Linux Enterprise Micro 5.5:kernel-devel-rt-5.14.21-150500.13.100.1.noarch",
          "SUSE Linux Enterprise Micro 5.5:kernel-rt-5.14.21-150500.13.100.2.x86_64",
          "SUSE Linux Enterprise Micro 5.5:kernel-source-rt-5.14.21-150500.13.100.1.noarch"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2023-52925",
          "url": "https://www.suse.com/security/cve/CVE-2023-52925"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1236822 for CVE-2023-52925",
          "url": "https://bugzilla.suse.com/1236822"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "SUSE Linux Enterprise Micro 5.5:kernel-devel-rt-5.14.21-150500.13.100.1.noarch",
            "SUSE Linux Enterprise Micro 5.5:kernel-rt-5.14.21-150500.13.100.2.x86_64",
            "SUSE Linux Enterprise Micro 5.5:kernel-source-rt-5.14.21-150500.13.100.1.noarch"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 7.8,
            "baseSeverity": "HIGH",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
            "version": "3.1"
          },
          "products": [
            "SUSE Linux Enterprise Micro 5.5:kernel-devel-rt-5.14.21-150500.13.100.1.noarch",
            "SUSE Linux Enterprise Micro 5.5:kernel-rt-5.14.21-150500.13.100.2.x86_64",
            "SUSE Linux Enterprise Micro 5.5:kernel-source-rt-5.14.21-150500.13.100.1.noarch"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2025-07-15T14:31:35Z",
          "details": "important"
        }
      ],
      "title": "CVE-2023-52925"
    },
    {
      "cve": "CVE-2023-53046",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2023-53046"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "In the Linux kernel, the following vulnerability has been resolved:\n\nBluetooth: Fix race condition in hci_cmd_sync_clear\n\nThere is a potential race condition in hci_cmd_sync_work and\nhci_cmd_sync_clear, and could lead to use-after-free. For instance,\nhci_cmd_sync_work is added to the \u0027req_workqueue\u0027 after cancel_work_sync\nThe entry of \u0027cmd_sync_work_list\u0027 may be freed in hci_cmd_sync_clear, and\ncausing kernel panic when it is used in \u0027hci_cmd_sync_work\u0027.\n\nHere\u0027s the call trace:\n\ndump_stack_lvl+0x49/0x63\nprint_report.cold+0x5e/0x5d3\n? hci_cmd_sync_work+0x282/0x320\nkasan_report+0xaa/0x120\n? hci_cmd_sync_work+0x282/0x320\n__asan_report_load8_noabort+0x14/0x20\nhci_cmd_sync_work+0x282/0x320\nprocess_one_work+0x77b/0x11c0\n? _raw_spin_lock_irq+0x8e/0xf0\nworker_thread+0x544/0x1180\n? poll_idle+0x1e0/0x1e0\nkthread+0x285/0x320\n? process_one_work+0x11c0/0x11c0\n? kthread_complete_and_exit+0x30/0x30\nret_from_fork+0x22/0x30\n\u003c/TASK\u003e\n\nAllocated by task 266:\nkasan_save_stack+0x26/0x50\n__kasan_kmalloc+0xae/0xe0\nkmem_cache_alloc_trace+0x191/0x350\nhci_cmd_sync_queue+0x97/0x2b0\nhci_update_passive_scan+0x176/0x1d0\nle_conn_complete_evt+0x1b5/0x1a00\nhci_le_conn_complete_evt+0x234/0x340\nhci_le_meta_evt+0x231/0x4e0\nhci_event_packet+0x4c5/0xf00\nhci_rx_work+0x37d/0x880\nprocess_one_work+0x77b/0x11c0\nworker_thread+0x544/0x1180\nkthread+0x285/0x320\nret_from_fork+0x22/0x30\n\nFreed by task 269:\nkasan_save_stack+0x26/0x50\nkasan_set_track+0x25/0x40\nkasan_set_free_info+0x24/0x40\n____kasan_slab_free+0x176/0x1c0\n__kasan_slab_free+0x12/0x20\nslab_free_freelist_hook+0x95/0x1a0\nkfree+0xba/0x2f0\nhci_cmd_sync_clear+0x14c/0x210\nhci_unregister_dev+0xff/0x440\nvhci_release+0x7b/0xf0\n__fput+0x1f3/0x970\n____fput+0xe/0x20\ntask_work_run+0xd4/0x160\ndo_exit+0x8b0/0x22a0\ndo_group_exit+0xba/0x2a0\nget_signal+0x1e4a/0x25b0\narch_do_signal_or_restart+0x93/0x1f80\nexit_to_user_mode_prepare+0xf5/0x1a0\nsyscall_exit_to_user_mode+0x26/0x50\nret_from_fork+0x15/0x30",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "SUSE Linux Enterprise Micro 5.5:kernel-devel-rt-5.14.21-150500.13.100.1.noarch",
          "SUSE Linux Enterprise Micro 5.5:kernel-rt-5.14.21-150500.13.100.2.x86_64",
          "SUSE Linux Enterprise Micro 5.5:kernel-source-rt-5.14.21-150500.13.100.1.noarch"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2023-53046",
          "url": "https://www.suse.com/security/cve/CVE-2023-53046"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1244180 for CVE-2023-53046",
          "url": "https://bugzilla.suse.com/1244180"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "SUSE Linux Enterprise Micro 5.5:kernel-devel-rt-5.14.21-150500.13.100.1.noarch",
            "SUSE Linux Enterprise Micro 5.5:kernel-rt-5.14.21-150500.13.100.2.x86_64",
            "SUSE Linux Enterprise Micro 5.5:kernel-source-rt-5.14.21-150500.13.100.1.noarch"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 5.5,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
            "version": "3.1"
          },
          "products": [
            "SUSE Linux Enterprise Micro 5.5:kernel-devel-rt-5.14.21-150500.13.100.1.noarch",
            "SUSE Linux Enterprise Micro 5.5:kernel-rt-5.14.21-150500.13.100.2.x86_64",
            "SUSE Linux Enterprise Micro 5.5:kernel-source-rt-5.14.21-150500.13.100.1.noarch"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2025-07-15T14:31:35Z",
          "details": "moderate"
        }
      ],
      "title": "CVE-2023-53046"
    },
    {
      "cve": "CVE-2023-53048",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2023-53048"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "In the Linux kernel, the following vulnerability has been resolved:\n\nusb: typec: tcpm: fix warning when handle discover_identity message\n\nSince both source and sink device can send discover_identity message in\nPD3, kernel may dump below warning:\n\n------------[ cut here ]------------\nWARNING: CPU: 0 PID: 169 at drivers/usb/typec/tcpm/tcpm.c:1446 tcpm_queue_vdm+0xe0/0xf0\nModules linked in:\nCPU: 0 PID: 169 Comm: 1-0050 Not tainted 6.1.1-00038-g6a3c36cf1da2-dirty #567\nHardware name: NXP i.MX8MPlus EVK board (DT)\npstate: 20000005 (nzCv daif -PAN -UAO -TCO -DIT -SSBS BTYPE=--)\npc : tcpm_queue_vdm+0xe0/0xf0\nlr : tcpm_queue_vdm+0x2c/0xf0\nsp : ffff80000c19bcd0\nx29: ffff80000c19bcd0 x28: 0000000000000001 x27: ffff0000d11c8ab8\nx26: ffff0000d11cc000 x25: 0000000000000000 x24: 00000000ff008081\nx23: 0000000000000001 x22: 00000000ff00a081 x21: ffff80000c19bdbc\nx20: 0000000000000000 x19: ffff0000d11c8080 x18: ffffffffffffffff\nx17: 0000000000000000 x16: 0000000000000000 x15: ffff0000d716f580\nx14: 0000000000000001 x13: ffff0000d716f507 x12: 0000000000000001\nx11: 0000000000000000 x10: 0000000000000020 x9 : 00000000000ee098\nx8 : 00000000ffffffff x7 : 000000000000001c x6 : ffff0000d716f580\nx5 : 0000000000000000 x4 : 0000000000000000 x3 : 0000000000000000\nx2 : ffff80000c19bdbc x1 : 00000000ff00a081 x0 : 0000000000000004\nCall trace:\ntcpm_queue_vdm+0xe0/0xf0\ntcpm_pd_rx_handler+0x340/0x1ab0\nkthread_worker_fn+0xcc/0x18c\nkthread+0x10c/0x110\nret_from_fork+0x10/0x20\n---[ end trace 0000000000000000 ]---\n\nBelow sequences may trigger this warning:\n\ntcpm_send_discover_work(work)\n  tcpm_send_vdm(port, USB_SID_PD, CMD_DISCOVER_IDENT, NULL, 0);\n   tcpm_queue_vdm(port, header, data, count);\n    port-\u003evdm_state = VDM_STATE_READY;\n\nvdm_state_machine_work(work);\n\t\t\t\u003c-- received discover_identity from partner\n vdm_run_state_machine(port);\n  port-\u003evdm_state = VDM_STATE_SEND_MESSAGE;\n   mod_vdm_delayed_work(port, x);\n\ntcpm_pd_rx_handler(work);\n tcpm_pd_data_request(port, msg);\n  tcpm_handle_vdm_request(port, msg-\u003epayload, cnt);\n   tcpm_queue_vdm(port, response[0], \u0026response[1], rlen - 1);\n--\u003e WARN_ON(port-\u003evdm_state \u003e VDM_STATE_DONE);\n\nFor this case, the state machine could still send out discover\nidentity message later if we skip current discover_identity message.\nSo we should handle the received message firstly and override the pending\ndiscover_identity message without warning in this case. Then, a delayed\nsend_discover work will send discover_identity message again.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "SUSE Linux Enterprise Micro 5.5:kernel-devel-rt-5.14.21-150500.13.100.1.noarch",
          "SUSE Linux Enterprise Micro 5.5:kernel-rt-5.14.21-150500.13.100.2.x86_64",
          "SUSE Linux Enterprise Micro 5.5:kernel-source-rt-5.14.21-150500.13.100.1.noarch"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2023-53048",
          "url": "https://www.suse.com/security/cve/CVE-2023-53048"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1244179 for CVE-2023-53048",
          "url": "https://bugzilla.suse.com/1244179"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "SUSE Linux Enterprise Micro 5.5:kernel-devel-rt-5.14.21-150500.13.100.1.noarch",
            "SUSE Linux Enterprise Micro 5.5:kernel-rt-5.14.21-150500.13.100.2.x86_64",
            "SUSE Linux Enterprise Micro 5.5:kernel-source-rt-5.14.21-150500.13.100.1.noarch"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 5.5,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
            "version": "3.1"
          },
          "products": [
            "SUSE Linux Enterprise Micro 5.5:kernel-devel-rt-5.14.21-150500.13.100.1.noarch",
            "SUSE Linux Enterprise Micro 5.5:kernel-rt-5.14.21-150500.13.100.2.x86_64",
            "SUSE Linux Enterprise Micro 5.5:kernel-source-rt-5.14.21-150500.13.100.1.noarch"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2025-07-15T14:31:35Z",
          "details": "moderate"
        }
      ],
      "title": "CVE-2023-53048"
    },
    {
      "cve": "CVE-2023-53076",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2023-53076"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "This CVE ID has been rejected or withdrawn by its CVE Numbering Authority.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "SUSE Linux Enterprise Micro 5.5:kernel-devel-rt-5.14.21-150500.13.100.1.noarch",
          "SUSE Linux Enterprise Micro 5.5:kernel-rt-5.14.21-150500.13.100.2.x86_64",
          "SUSE Linux Enterprise Micro 5.5:kernel-source-rt-5.14.21-150500.13.100.1.noarch"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2023-53076",
          "url": "https://www.suse.com/security/cve/CVE-2023-53076"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1242221 for CVE-2023-53076",
          "url": "https://bugzilla.suse.com/1242221"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "SUSE Linux Enterprise Micro 5.5:kernel-devel-rt-5.14.21-150500.13.100.1.noarch",
            "SUSE Linux Enterprise Micro 5.5:kernel-rt-5.14.21-150500.13.100.2.x86_64",
            "SUSE Linux Enterprise Micro 5.5:kernel-source-rt-5.14.21-150500.13.100.1.noarch"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 5.5,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
            "version": "3.1"
          },
          "products": [
            "SUSE Linux Enterprise Micro 5.5:kernel-devel-rt-5.14.21-150500.13.100.1.noarch",
            "SUSE Linux Enterprise Micro 5.5:kernel-rt-5.14.21-150500.13.100.2.x86_64",
            "SUSE Linux Enterprise Micro 5.5:kernel-source-rt-5.14.21-150500.13.100.1.noarch"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2025-07-15T14:31:35Z",
          "details": "moderate"
        }
      ],
      "title": "CVE-2023-53076"
    },
    {
      "cve": "CVE-2023-53097",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2023-53097"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "In the Linux kernel, the following vulnerability has been resolved:\n\npowerpc/iommu: fix memory leak with using debugfs_lookup()\n\nWhen calling debugfs_lookup() the result must have dput() called on it,\notherwise the memory will leak over time.  To make things simpler, just\ncall debugfs_lookup_and_remove() instead which handles all of the logic\nat once.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "SUSE Linux Enterprise Micro 5.5:kernel-devel-rt-5.14.21-150500.13.100.1.noarch",
          "SUSE Linux Enterprise Micro 5.5:kernel-rt-5.14.21-150500.13.100.2.x86_64",
          "SUSE Linux Enterprise Micro 5.5:kernel-source-rt-5.14.21-150500.13.100.1.noarch"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2023-53097",
          "url": "https://www.suse.com/security/cve/CVE-2023-53097"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1244114 for CVE-2023-53097",
          "url": "https://bugzilla.suse.com/1244114"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "SUSE Linux Enterprise Micro 5.5:kernel-devel-rt-5.14.21-150500.13.100.1.noarch",
            "SUSE Linux Enterprise Micro 5.5:kernel-rt-5.14.21-150500.13.100.2.x86_64",
            "SUSE Linux Enterprise Micro 5.5:kernel-source-rt-5.14.21-150500.13.100.1.noarch"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 5.5,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
            "version": "3.1"
          },
          "products": [
            "SUSE Linux Enterprise Micro 5.5:kernel-devel-rt-5.14.21-150500.13.100.1.noarch",
            "SUSE Linux Enterprise Micro 5.5:kernel-rt-5.14.21-150500.13.100.2.x86_64",
            "SUSE Linux Enterprise Micro 5.5:kernel-source-rt-5.14.21-150500.13.100.1.noarch"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2025-07-15T14:31:35Z",
          "details": "moderate"
        }
      ],
      "title": "CVE-2023-53097"
    },
    {
      "cve": "CVE-2024-26808",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2024-26808"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "In the Linux kernel, the following vulnerability has been resolved:\n\nnetfilter: nft_chain_filter: handle NETDEV_UNREGISTER for inet/ingress basechain\n\nRemove netdevice from inet/ingress basechain in case NETDEV_UNREGISTER\nevent is reported, otherwise a stale reference to netdevice remains in\nthe hook list.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "SUSE Linux Enterprise Micro 5.5:kernel-devel-rt-5.14.21-150500.13.100.1.noarch",
          "SUSE Linux Enterprise Micro 5.5:kernel-rt-5.14.21-150500.13.100.2.x86_64",
          "SUSE Linux Enterprise Micro 5.5:kernel-source-rt-5.14.21-150500.13.100.1.noarch"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2024-26808",
          "url": "https://www.suse.com/security/cve/CVE-2024-26808"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1222634 for CVE-2024-26808",
          "url": "https://bugzilla.suse.com/1222634"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "SUSE Linux Enterprise Micro 5.5:kernel-devel-rt-5.14.21-150500.13.100.1.noarch",
            "SUSE Linux Enterprise Micro 5.5:kernel-rt-5.14.21-150500.13.100.2.x86_64",
            "SUSE Linux Enterprise Micro 5.5:kernel-source-rt-5.14.21-150500.13.100.1.noarch"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 7.8,
            "baseSeverity": "HIGH",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
            "version": "3.1"
          },
          "products": [
            "SUSE Linux Enterprise Micro 5.5:kernel-devel-rt-5.14.21-150500.13.100.1.noarch",
            "SUSE Linux Enterprise Micro 5.5:kernel-rt-5.14.21-150500.13.100.2.x86_64",
            "SUSE Linux Enterprise Micro 5.5:kernel-source-rt-5.14.21-150500.13.100.1.noarch"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2025-07-15T14:31:35Z",
          "details": "important"
        }
      ],
      "title": "CVE-2024-26808"
    },
    {
      "cve": "CVE-2024-26924",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2024-26924"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "In the Linux kernel, the following vulnerability has been resolved:\n\nnetfilter: nft_set_pipapo: do not free live element\n\nPablo reports a crash with large batches of elements with a\nback-to-back add/remove pattern.  Quoting Pablo:\n\n  add_elem(\"00000000\") timeout 100 ms\n  ...\n  add_elem(\"0000000X\") timeout 100 ms\n  del_elem(\"0000000X\") \u003c---------------- delete one that was just added\n  ...\n  add_elem(\"00005000\") timeout 100 ms\n\n  1) nft_pipapo_remove() removes element 0000000X\n  Then, KASAN shows a splat.\n\nLooking at the remove function there is a chance that we will drop a\nrule that maps to a non-deactivated element.\n\nRemoval happens in two steps, first we do a lookup for key k and return the\nto-be-removed element and mark it as inactive in the next generation.\nThen, in a second step, the element gets removed from the set/map.\n\nThe _remove function does not work correctly if we have more than one\nelement that share the same key.\n\nThis can happen if we insert an element into a set when the set already\nholds an element with same key, but the element mapping to the existing\nkey has timed out or is not active in the next generation.\n\nIn such case its possible that removal will unmap the wrong element.\nIf this happens, we will leak the non-deactivated element, it becomes\nunreachable.\n\nThe element that got deactivated (and will be freed later) will\nremain reachable in the set data structure, this can result in\na crash when such an element is retrieved during lookup (stale\npointer).\n\nAdd a check that the fully matching key does in fact map to the element\nthat we have marked as inactive in the deactivation step.\nIf not, we need to continue searching.\n\nAdd a bug/warn trap at the end of the function as well, the remove\nfunction must not ever be called with an invisible/unreachable/non-existent\nelement.\n\nv2: avoid uneeded temporary variable (Stefano)",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "SUSE Linux Enterprise Micro 5.5:kernel-devel-rt-5.14.21-150500.13.100.1.noarch",
          "SUSE Linux Enterprise Micro 5.5:kernel-rt-5.14.21-150500.13.100.2.x86_64",
          "SUSE Linux Enterprise Micro 5.5:kernel-source-rt-5.14.21-150500.13.100.1.noarch"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2024-26924",
          "url": "https://www.suse.com/security/cve/CVE-2024-26924"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1223387 for CVE-2024-26924",
          "url": "https://bugzilla.suse.com/1223387"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "SUSE Linux Enterprise Micro 5.5:kernel-devel-rt-5.14.21-150500.13.100.1.noarch",
            "SUSE Linux Enterprise Micro 5.5:kernel-rt-5.14.21-150500.13.100.2.x86_64",
            "SUSE Linux Enterprise Micro 5.5:kernel-source-rt-5.14.21-150500.13.100.1.noarch"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 6.7,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H",
            "version": "3.1"
          },
          "products": [
            "SUSE Linux Enterprise Micro 5.5:kernel-devel-rt-5.14.21-150500.13.100.1.noarch",
            "SUSE Linux Enterprise Micro 5.5:kernel-rt-5.14.21-150500.13.100.2.x86_64",
            "SUSE Linux Enterprise Micro 5.5:kernel-source-rt-5.14.21-150500.13.100.1.noarch"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2025-07-15T14:31:35Z",
          "details": "moderate"
        }
      ],
      "title": "CVE-2024-26924"
    },
    {
      "cve": "CVE-2024-26935",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2024-26935"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "In the Linux kernel, the following vulnerability has been resolved:\n\nscsi: core: Fix unremoved procfs host directory regression\n\nCommit fc663711b944 (\"scsi: core: Remove the /proc/scsi/${proc_name}\ndirectory earlier\") fixed a bug related to modules loading/unloading, by\nadding a call to scsi_proc_hostdir_rm() on scsi_remove_host(). But that led\nto a potential duplicate call to the hostdir_rm() routine, since it\u0027s also\ncalled from scsi_host_dev_release(). That triggered a regression report,\nwhich was then fixed by commit be03df3d4bfe (\"scsi: core: Fix a procfs host\ndirectory removal regression\"). The fix just dropped the hostdir_rm() call\nfrom dev_release().\n\nBut it happens that this proc directory is created on scsi_host_alloc(),\nand that function \"pairs\" with scsi_host_dev_release(), while\nscsi_remove_host() pairs with scsi_add_host(). In other words, it seems the\nreason for removing the proc directory on dev_release() was meant to cover\ncases in which a SCSI host structure was allocated, but the call to\nscsi_add_host() didn\u0027t happen. And that pattern happens to exist in some\nerror paths, for example.\n\nSyzkaller causes that by using USB raw gadget device, error\u0027ing on\nusb-storage driver, at usb_stor_probe2(). By checking that path, we can see\nthat the BadDevice label leads to a scsi_host_put() after a SCSI host\nallocation, but there\u0027s no call to scsi_add_host() in such path. That leads\nto messages like this in dmesg (and a leak of the SCSI host proc\nstructure):\n\nusb-storage 4-1:87.51: USB Mass Storage device detected\nproc_dir_entry \u0027scsi/usb-storage\u0027 already registered\nWARNING: CPU: 1 PID: 3519 at fs/proc/generic.c:377 proc_register+0x347/0x4e0 fs/proc/generic.c:376\n\nThe proper fix seems to still call scsi_proc_hostdir_rm() on dev_release(),\nbut guard that with the state check for SHOST_CREATED; there is even a\ncomment in scsi_host_dev_release() detailing that: such conditional is\nmeant for cases where the SCSI host was allocated but there was no calls to\n{add,remove}_host(), like the usb-storage case.\n\nThis is what we propose here and with that, the error path of usb-storage\ndoes not trigger the warning anymore.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "SUSE Linux Enterprise Micro 5.5:kernel-devel-rt-5.14.21-150500.13.100.1.noarch",
          "SUSE Linux Enterprise Micro 5.5:kernel-rt-5.14.21-150500.13.100.2.x86_64",
          "SUSE Linux Enterprise Micro 5.5:kernel-source-rt-5.14.21-150500.13.100.1.noarch"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2024-26935",
          "url": "https://www.suse.com/security/cve/CVE-2024-26935"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1223675 for CVE-2024-26935",
          "url": "https://bugzilla.suse.com/1223675"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "SUSE Linux Enterprise Micro 5.5:kernel-devel-rt-5.14.21-150500.13.100.1.noarch",
            "SUSE Linux Enterprise Micro 5.5:kernel-rt-5.14.21-150500.13.100.2.x86_64",
            "SUSE Linux Enterprise Micro 5.5:kernel-source-rt-5.14.21-150500.13.100.1.noarch"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 3.3,
            "baseSeverity": "LOW",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L",
            "version": "3.1"
          },
          "products": [
            "SUSE Linux Enterprise Micro 5.5:kernel-devel-rt-5.14.21-150500.13.100.1.noarch",
            "SUSE Linux Enterprise Micro 5.5:kernel-rt-5.14.21-150500.13.100.2.x86_64",
            "SUSE Linux Enterprise Micro 5.5:kernel-source-rt-5.14.21-150500.13.100.1.noarch"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2025-07-15T14:31:35Z",
          "details": "low"
        }
      ],
      "title": "CVE-2024-26935"
    },
    {
      "cve": "CVE-2024-27397",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2024-27397"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "In the Linux kernel, the following vulnerability has been resolved:\n\nnetfilter: nf_tables: use timestamp to check for set element timeout\n\nAdd a timestamp field at the beginning of the transaction, store it\nin the nftables per-netns area.\n\nUpdate set backend .insert, .deactivate and sync gc path to use the\ntimestamp, this avoids that an element expires while control plane\ntransaction is still unfinished.\n\n.lookup and .update, which are used from packet path, still use the\ncurrent time to check if the element has expired. And .get path and dump\nalso since this runs lockless under rcu read size lock. Then, there is\nasync gc which also needs to check the current time since it runs\nasynchronously from a workqueue.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "SUSE Linux Enterprise Micro 5.5:kernel-devel-rt-5.14.21-150500.13.100.1.noarch",
          "SUSE Linux Enterprise Micro 5.5:kernel-rt-5.14.21-150500.13.100.2.x86_64",
          "SUSE Linux Enterprise Micro 5.5:kernel-source-rt-5.14.21-150500.13.100.1.noarch"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2024-27397",
          "url": "https://www.suse.com/security/cve/CVE-2024-27397"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1224095 for CVE-2024-27397",
          "url": "https://bugzilla.suse.com/1224095"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "SUSE Linux Enterprise Micro 5.5:kernel-devel-rt-5.14.21-150500.13.100.1.noarch",
            "SUSE Linux Enterprise Micro 5.5:kernel-rt-5.14.21-150500.13.100.2.x86_64",
            "SUSE Linux Enterprise Micro 5.5:kernel-source-rt-5.14.21-150500.13.100.1.noarch"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 6.7,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H",
            "version": "3.1"
          },
          "products": [
            "SUSE Linux Enterprise Micro 5.5:kernel-devel-rt-5.14.21-150500.13.100.1.noarch",
            "SUSE Linux Enterprise Micro 5.5:kernel-rt-5.14.21-150500.13.100.2.x86_64",
            "SUSE Linux Enterprise Micro 5.5:kernel-source-rt-5.14.21-150500.13.100.1.noarch"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2025-07-15T14:31:35Z",
          "details": "moderate"
        }
      ],
      "title": "CVE-2024-27397"
    },
    {
      "cve": "CVE-2024-28956",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2024-28956"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "Exposure of Sensitive Information in Shared Microarchitectural Structures during Transient Execution for some Intel(R) Processors may allow an authenticated user to potentially enable information disclosure via local access.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "SUSE Linux Enterprise Micro 5.5:kernel-devel-rt-5.14.21-150500.13.100.1.noarch",
          "SUSE Linux Enterprise Micro 5.5:kernel-rt-5.14.21-150500.13.100.2.x86_64",
          "SUSE Linux Enterprise Micro 5.5:kernel-source-rt-5.14.21-150500.13.100.1.noarch"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2024-28956",
          "url": "https://www.suse.com/security/cve/CVE-2024-28956"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1242006 for CVE-2024-28956",
          "url": "https://bugzilla.suse.com/1242006"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "SUSE Linux Enterprise Micro 5.5:kernel-devel-rt-5.14.21-150500.13.100.1.noarch",
            "SUSE Linux Enterprise Micro 5.5:kernel-rt-5.14.21-150500.13.100.2.x86_64",
            "SUSE Linux Enterprise Micro 5.5:kernel-source-rt-5.14.21-150500.13.100.1.noarch"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 5.6,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N",
            "version": "3.1"
          },
          "products": [
            "SUSE Linux Enterprise Micro 5.5:kernel-devel-rt-5.14.21-150500.13.100.1.noarch",
            "SUSE Linux Enterprise Micro 5.5:kernel-rt-5.14.21-150500.13.100.2.x86_64",
            "SUSE Linux Enterprise Micro 5.5:kernel-source-rt-5.14.21-150500.13.100.1.noarch"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2025-07-15T14:31:35Z",
          "details": "moderate"
        }
      ],
      "title": "CVE-2024-28956"
    },
    {
      "cve": "CVE-2024-35840",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2024-35840"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "In the Linux kernel, the following vulnerability has been resolved:\n\nmptcp: use OPTION_MPTCP_MPJ_SYNACK in subflow_finish_connect()\n\nsubflow_finish_connect() uses four fields (backup, join_id, thmac, none)\nthat may contain garbage unless OPTION_MPTCP_MPJ_SYNACK has been set\nin mptcp_parse_option()",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "SUSE Linux Enterprise Micro 5.5:kernel-devel-rt-5.14.21-150500.13.100.1.noarch",
          "SUSE Linux Enterprise Micro 5.5:kernel-rt-5.14.21-150500.13.100.2.x86_64",
          "SUSE Linux Enterprise Micro 5.5:kernel-source-rt-5.14.21-150500.13.100.1.noarch"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2024-35840",
          "url": "https://www.suse.com/security/cve/CVE-2024-35840"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1224597 for CVE-2024-35840",
          "url": "https://bugzilla.suse.com/1224597"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "SUSE Linux Enterprise Micro 5.5:kernel-devel-rt-5.14.21-150500.13.100.1.noarch",
            "SUSE Linux Enterprise Micro 5.5:kernel-rt-5.14.21-150500.13.100.2.x86_64",
            "SUSE Linux Enterprise Micro 5.5:kernel-source-rt-5.14.21-150500.13.100.1.noarch"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 5.5,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
            "version": "3.1"
          },
          "products": [
            "SUSE Linux Enterprise Micro 5.5:kernel-devel-rt-5.14.21-150500.13.100.1.noarch",
            "SUSE Linux Enterprise Micro 5.5:kernel-rt-5.14.21-150500.13.100.2.x86_64",
            "SUSE Linux Enterprise Micro 5.5:kernel-source-rt-5.14.21-150500.13.100.1.noarch"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2025-07-15T14:31:35Z",
          "details": "moderate"
        }
      ],
      "title": "CVE-2024-35840"
    },
    {
      "cve": "CVE-2024-36978",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2024-36978"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "In the Linux kernel, the following vulnerability has been resolved:\n\nnet: sched: sch_multiq: fix possible OOB write in multiq_tune()\n\nq-\u003ebands will be assigned to qopt-\u003ebands to execute subsequent code logic\nafter kmalloc. So the old q-\u003ebands should not be used in kmalloc.\nOtherwise, an out-of-bounds write will occur.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "SUSE Linux Enterprise Micro 5.5:kernel-devel-rt-5.14.21-150500.13.100.1.noarch",
          "SUSE Linux Enterprise Micro 5.5:kernel-rt-5.14.21-150500.13.100.2.x86_64",
          "SUSE Linux Enterprise Micro 5.5:kernel-source-rt-5.14.21-150500.13.100.1.noarch"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2024-36978",
          "url": "https://www.suse.com/security/cve/CVE-2024-36978"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1226514 for CVE-2024-36978",
          "url": "https://bugzilla.suse.com/1226514"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1244631 for CVE-2024-36978",
          "url": "https://bugzilla.suse.com/1244631"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "SUSE Linux Enterprise Micro 5.5:kernel-devel-rt-5.14.21-150500.13.100.1.noarch",
            "SUSE Linux Enterprise Micro 5.5:kernel-rt-5.14.21-150500.13.100.2.x86_64",
            "SUSE Linux Enterprise Micro 5.5:kernel-source-rt-5.14.21-150500.13.100.1.noarch"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 7.8,
            "baseSeverity": "HIGH",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
            "version": "3.1"
          },
          "products": [
            "SUSE Linux Enterprise Micro 5.5:kernel-devel-rt-5.14.21-150500.13.100.1.noarch",
            "SUSE Linux Enterprise Micro 5.5:kernel-rt-5.14.21-150500.13.100.2.x86_64",
            "SUSE Linux Enterprise Micro 5.5:kernel-source-rt-5.14.21-150500.13.100.1.noarch"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2025-07-15T14:31:35Z",
          "details": "important"
        }
      ],
      "title": "CVE-2024-36978"
    },
    {
      "cve": "CVE-2024-46800",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2024-46800"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "In the Linux kernel, the following vulnerability has been resolved:\n\nsch/netem: fix use after free in netem_dequeue\n\nIf netem_dequeue() enqueues packet to inner qdisc and that qdisc\nreturns __NET_XMIT_STOLEN. The packet is dropped but\nqdisc_tree_reduce_backlog() is not called to update the parent\u0027s\nq.qlen, leading to the similar use-after-free as Commit\ne04991a48dbaf382 (\"netem: fix return value if duplicate enqueue\nfails\")\n\nCommands to trigger KASAN UaF:\n\nip link add type dummy\nip link set lo up\nip link set dummy0 up\ntc qdisc add dev lo parent root handle 1: drr\ntc filter add dev lo parent 1: basic classid 1:1\ntc class add dev lo classid 1:1 drr\ntc qdisc add dev lo parent 1:1 handle 2: netem\ntc qdisc add dev lo parent 2: handle 3: drr\ntc filter add dev lo parent 3: basic classid 3:1 action mirred egress\nredirect dev dummy0\ntc class add dev lo classid 3:1 drr\nping -c1 -W0.01 localhost # Trigger bug\ntc class del dev lo classid 1:1\ntc class add dev lo classid 1:1 drr\nping -c1 -W0.01 localhost # UaF",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "SUSE Linux Enterprise Micro 5.5:kernel-devel-rt-5.14.21-150500.13.100.1.noarch",
          "SUSE Linux Enterprise Micro 5.5:kernel-rt-5.14.21-150500.13.100.2.x86_64",
          "SUSE Linux Enterprise Micro 5.5:kernel-source-rt-5.14.21-150500.13.100.1.noarch"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2024-46800",
          "url": "https://www.suse.com/security/cve/CVE-2024-46800"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1230827 for CVE-2024-46800",
          "url": "https://bugzilla.suse.com/1230827"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "SUSE Linux Enterprise Micro 5.5:kernel-devel-rt-5.14.21-150500.13.100.1.noarch",
            "SUSE Linux Enterprise Micro 5.5:kernel-rt-5.14.21-150500.13.100.2.x86_64",
            "SUSE Linux Enterprise Micro 5.5:kernel-source-rt-5.14.21-150500.13.100.1.noarch"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 5.5,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
            "version": "3.1"
          },
          "products": [
            "SUSE Linux Enterprise Micro 5.5:kernel-devel-rt-5.14.21-150500.13.100.1.noarch",
            "SUSE Linux Enterprise Micro 5.5:kernel-rt-5.14.21-150500.13.100.2.x86_64",
            "SUSE Linux Enterprise Micro 5.5:kernel-source-rt-5.14.21-150500.13.100.1.noarch"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2025-07-15T14:31:35Z",
          "details": "moderate"
        }
      ],
      "title": "CVE-2024-46800"
    },
    {
      "cve": "CVE-2024-53125",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2024-53125"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "In the Linux kernel, the following vulnerability has been resolved:\n\nbpf: sync_linked_regs() must preserve subreg_def\n\nRange propagation must not affect subreg_def marks, otherwise the\nfollowing example is rewritten by verifier incorrectly when\nBPF_F_TEST_RND_HI32 flag is set:\n\n  0: call bpf_ktime_get_ns                   call bpf_ktime_get_ns\n  1: r0 \u0026= 0x7fffffff       after verifier   r0 \u0026= 0x7fffffff\n  2: w1 = w0                rewrites         w1 = w0\n  3: if w0 \u003c 10 goto +0     --------------\u003e  r11 = 0x2f5674a6     (r)\n  4: r1 \u003e\u003e= 32                               r11 \u003c\u003c= 32           (r)\n  5: r0 = r1                                 r1 |= r11            (r)\n  6: exit;                                   if w0 \u003c 0xa goto pc+0\n                                             r1 \u003e\u003e= 32\n                                             r0 = r1\n                                             exit\n\n(or zero extension of w1 at (2) is missing for architectures that\n require zero extension for upper register half).\n\nThe following happens w/o this patch:\n- r0 is marked as not a subreg at (0);\n- w1 is marked as subreg at (2);\n- w1 subreg_def is overridden at (3) by copy_register_state();\n- w1 is read at (5) but mark_insn_zext() does not mark (2)\n  for zero extension, because w1 subreg_def is not set;\n- because of BPF_F_TEST_RND_HI32 flag verifier inserts random\n  value for hi32 bits of (2) (marked (r));\n- this random value is read at (5).",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "SUSE Linux Enterprise Micro 5.5:kernel-devel-rt-5.14.21-150500.13.100.1.noarch",
          "SUSE Linux Enterprise Micro 5.5:kernel-rt-5.14.21-150500.13.100.2.x86_64",
          "SUSE Linux Enterprise Micro 5.5:kernel-source-rt-5.14.21-150500.13.100.1.noarch"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2024-53125",
          "url": "https://www.suse.com/security/cve/CVE-2024-53125"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1234156 for CVE-2024-53125",
          "url": "https://bugzilla.suse.com/1234156"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "SUSE Linux Enterprise Micro 5.5:kernel-devel-rt-5.14.21-150500.13.100.1.noarch",
            "SUSE Linux Enterprise Micro 5.5:kernel-rt-5.14.21-150500.13.100.2.x86_64",
            "SUSE Linux Enterprise Micro 5.5:kernel-source-rt-5.14.21-150500.13.100.1.noarch"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 7.8,
            "baseSeverity": "HIGH",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
            "version": "3.1"
          },
          "products": [
            "SUSE Linux Enterprise Micro 5.5:kernel-devel-rt-5.14.21-150500.13.100.1.noarch",
            "SUSE Linux Enterprise Micro 5.5:kernel-rt-5.14.21-150500.13.100.2.x86_64",
            "SUSE Linux Enterprise Micro 5.5:kernel-source-rt-5.14.21-150500.13.100.1.noarch"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2025-07-15T14:31:35Z",
          "details": "important"
        }
      ],
      "title": "CVE-2024-53125"
    },
    {
      "cve": "CVE-2024-53141",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2024-53141"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "In the Linux kernel, the following vulnerability has been resolved:\n\nnetfilter: ipset: add missing range check in bitmap_ip_uadt\n\nWhen tb[IPSET_ATTR_IP_TO] is not present but tb[IPSET_ATTR_CIDR] exists,\nthe values of ip and ip_to are slightly swapped. Therefore, the range check\nfor ip should be done later, but this part is missing and it seems that the\nvulnerability occurs.\n\nSo we should add missing range checks and remove unnecessary range checks.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "SUSE Linux Enterprise Micro 5.5:kernel-devel-rt-5.14.21-150500.13.100.1.noarch",
          "SUSE Linux Enterprise Micro 5.5:kernel-rt-5.14.21-150500.13.100.2.x86_64",
          "SUSE Linux Enterprise Micro 5.5:kernel-source-rt-5.14.21-150500.13.100.1.noarch"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2024-53141",
          "url": "https://www.suse.com/security/cve/CVE-2024-53141"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1234381 for CVE-2024-53141",
          "url": "https://bugzilla.suse.com/1234381"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1245778 for CVE-2024-53141",
          "url": "https://bugzilla.suse.com/1245778"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "SUSE Linux Enterprise Micro 5.5:kernel-devel-rt-5.14.21-150500.13.100.1.noarch",
            "SUSE Linux Enterprise Micro 5.5:kernel-rt-5.14.21-150500.13.100.2.x86_64",
            "SUSE Linux Enterprise Micro 5.5:kernel-source-rt-5.14.21-150500.13.100.1.noarch"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 7.8,
            "baseSeverity": "HIGH",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
            "version": "3.1"
          },
          "products": [
            "SUSE Linux Enterprise Micro 5.5:kernel-devel-rt-5.14.21-150500.13.100.1.noarch",
            "SUSE Linux Enterprise Micro 5.5:kernel-rt-5.14.21-150500.13.100.2.x86_64",
            "SUSE Linux Enterprise Micro 5.5:kernel-source-rt-5.14.21-150500.13.100.1.noarch"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2025-07-15T14:31:35Z",
          "details": "important"
        }
      ],
      "title": "CVE-2024-53141"
    },
    {
      "cve": "CVE-2024-53197",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2024-53197"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "In the Linux kernel, the following vulnerability has been resolved:\n\nALSA: usb-audio: Fix potential out-of-bound accesses for Extigy and Mbox devices\n\nA bogus device can provide a bNumConfigurations value that exceeds the\ninitial value used in usb_get_configuration for allocating dev-\u003econfig.\n\nThis can lead to out-of-bounds accesses later, e.g. in\nusb_destroy_configuration.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "SUSE Linux Enterprise Micro 5.5:kernel-devel-rt-5.14.21-150500.13.100.1.noarch",
          "SUSE Linux Enterprise Micro 5.5:kernel-rt-5.14.21-150500.13.100.2.x86_64",
          "SUSE Linux Enterprise Micro 5.5:kernel-source-rt-5.14.21-150500.13.100.1.noarch"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2024-53197",
          "url": "https://www.suse.com/security/cve/CVE-2024-53197"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1235464 for CVE-2024-53197",
          "url": "https://bugzilla.suse.com/1235464"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "SUSE Linux Enterprise Micro 5.5:kernel-devel-rt-5.14.21-150500.13.100.1.noarch",
            "SUSE Linux Enterprise Micro 5.5:kernel-rt-5.14.21-150500.13.100.2.x86_64",
            "SUSE Linux Enterprise Micro 5.5:kernel-source-rt-5.14.21-150500.13.100.1.noarch"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 4.1,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:N/A:N",
            "version": "3.1"
          },
          "products": [
            "SUSE Linux Enterprise Micro 5.5:kernel-devel-rt-5.14.21-150500.13.100.1.noarch",
            "SUSE Linux Enterprise Micro 5.5:kernel-rt-5.14.21-150500.13.100.2.x86_64",
            "SUSE Linux Enterprise Micro 5.5:kernel-source-rt-5.14.21-150500.13.100.1.noarch"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2025-07-15T14:31:35Z",
          "details": "moderate"
        }
      ],
      "title": "CVE-2024-53197"
    },
    {
      "cve": "CVE-2024-56770",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2024-56770"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "In the Linux kernel, the following vulnerability has been resolved:\n\nnet/sched: netem: account for backlog updates from child qdisc\n\nIn general, \u0027qlen\u0027 of any classful qdisc should keep track of the\nnumber of packets that the qdisc itself and all of its children holds.\nIn case of netem, \u0027qlen\u0027 only accounts for the packets in its internal\ntfifo. When netem is used with a child qdisc, the child qdisc can use\n\u0027qdisc_tree_reduce_backlog\u0027 to inform its parent, netem, about created\nor dropped SKBs. This function updates \u0027qlen\u0027 and the backlog statistics\nof netem, but netem does not account for changes made by a child qdisc.\n\u0027qlen\u0027 then indicates the wrong number of packets in the tfifo.\nIf a child qdisc creates new SKBs during enqueue and informs its parent\nabout this, netem\u0027s \u0027qlen\u0027 value is increased. When netem dequeues the\nnewly created SKBs from the child, the \u0027qlen\u0027 in netem is not updated.\nIf \u0027qlen\u0027 reaches the configured sch-\u003elimit, the enqueue function stops\nworking, even though the tfifo is not full.\n\nReproduce the bug:\nEnsure that the sender machine has GSO enabled. Configure netem as root\nqdisc and tbf as its child on the outgoing interface of the machine\nas follows:\n$ tc qdisc add dev \u003coif\u003e root handle 1: netem delay 100ms limit 100\n$ tc qdisc add dev \u003coif\u003e parent 1:0 tbf rate 50Mbit burst 1542 latency 50ms\n\nSend bulk TCP traffic out via this interface, e.g., by running an iPerf3\nclient on the machine. Check the qdisc statistics:\n$ tc -s qdisc show dev \u003coif\u003e\n\nStatistics after 10s of iPerf3 TCP test before the fix (note that\nnetem\u0027s backlog \u003e limit, netem stopped accepting packets):\nqdisc netem 1: root refcnt 2 limit 1000 delay 100ms\n Sent 2767766 bytes 1848 pkt (dropped 652, overlimits 0 requeues 0)\n backlog 4294528236b 1155p requeues 0\nqdisc tbf 10: parent 1:1 rate 50Mbit burst 1537b lat 50ms\n Sent 2767766 bytes 1848 pkt (dropped 327, overlimits 7601 requeues 0)\n backlog 0b 0p requeues 0\n\nStatistics after the fix:\nqdisc netem 1: root refcnt 2 limit 1000 delay 100ms\n Sent 37766372 bytes 24974 pkt (dropped 9, overlimits 0 requeues 0)\n backlog 0b 0p requeues 0\nqdisc tbf 10: parent 1:1 rate 50Mbit burst 1537b lat 50ms\n Sent 37766372 bytes 24974 pkt (dropped 327, overlimits 96017 requeues 0)\n backlog 0b 0p requeues 0\n\ntbf segments the GSO SKBs (tbf_segment) and updates the netem\u0027s \u0027qlen\u0027.\nThe interface fully stops transferring packets and \"locks\". In this case,\nthe child qdisc and tfifo are empty, but \u0027qlen\u0027 indicates the tfifo is at\nits limit and no more packets are accepted.\n\nThis patch adds a counter for the entries in the tfifo. Netem\u0027s \u0027qlen\u0027 is\nonly decreased when a packet is returned by its dequeue function, and not\nduring enqueuing into the child qdisc. External updates to \u0027qlen\u0027 are thus\naccounted for and only the behavior of the backlog statistics changes. As\nin other qdiscs, \u0027qlen\u0027 then keeps track of  how many packets are held in\nnetem and all of its children. As before, sch-\u003elimit remains as the\nmaximum number of packets in the tfifo. The same applies to netem\u0027s\nbacklog statistics.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "SUSE Linux Enterprise Micro 5.5:kernel-devel-rt-5.14.21-150500.13.100.1.noarch",
          "SUSE Linux Enterprise Micro 5.5:kernel-rt-5.14.21-150500.13.100.2.x86_64",
          "SUSE Linux Enterprise Micro 5.5:kernel-source-rt-5.14.21-150500.13.100.1.noarch"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2024-56770",
          "url": "https://www.suse.com/security/cve/CVE-2024-56770"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1235637 for CVE-2024-56770",
          "url": "https://bugzilla.suse.com/1235637"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "SUSE Linux Enterprise Micro 5.5:kernel-devel-rt-5.14.21-150500.13.100.1.noarch",
            "SUSE Linux Enterprise Micro 5.5:kernel-rt-5.14.21-150500.13.100.2.x86_64",
            "SUSE Linux Enterprise Micro 5.5:kernel-source-rt-5.14.21-150500.13.100.1.noarch"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 5.1,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:L/A:H",
            "version": "3.1"
          },
          "products": [
            "SUSE Linux Enterprise Micro 5.5:kernel-devel-rt-5.14.21-150500.13.100.1.noarch",
            "SUSE Linux Enterprise Micro 5.5:kernel-rt-5.14.21-150500.13.100.2.x86_64",
            "SUSE Linux Enterprise Micro 5.5:kernel-source-rt-5.14.21-150500.13.100.1.noarch"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2025-07-15T14:31:35Z",
          "details": "moderate"
        }
      ],
      "title": "CVE-2024-56770"
    },
    {
      "cve": "CVE-2024-57999",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2024-57999"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "In the Linux kernel, the following vulnerability has been resolved:\n\npowerpc/pseries/iommu: IOMMU incorrectly marks MMIO range in DDW\n\nPower Hypervisor can possibily allocate MMIO window intersecting with\nDynamic DMA Window (DDW) range, which is over 32-bit addressing.\n\nThese MMIO pages needs to be marked as reserved so that IOMMU doesn\u0027t map\nDMA buffers in this range.\n\nThe current code is not marking these pages correctly which is resulting\nin LPAR to OOPS while booting. The stack is at below\n\nBUG: Unable to handle kernel data access on read at 0xc00800005cd40000\nFaulting instruction address: 0xc00000000005cdac\nOops: Kernel access of bad area, sig: 11 [#1]\nLE PAGE_SIZE=64K MMU=Hash SMP NR_CPUS=2048 NUMA pSeries\nModules linked in: af_packet rfkill ibmveth(X) lpfc(+) nvmet_fc nvmet nvme_keyring crct10dif_vpmsum nvme_fc nvme_fabrics nvme_core be2net(+) nvme_auth rtc_generic nfsd auth_rpcgss nfs_acl lockd grace sunrpc fuse configfs ip_tables x_tables xfs libcrc32c dm_service_time ibmvfc(X) scsi_transport_fc vmx_crypto gf128mul crc32c_vpmsum dm_mirror dm_region_hash dm_log dm_multipath dm_mod sd_mod scsi_dh_emc scsi_dh_rdac scsi_dh_alua t10_pi crc64_rocksoft_generic crc64_rocksoft sg crc64 scsi_mod\nSupported: Yes, External\nCPU: 8 PID: 241 Comm: kworker/8:1 Kdump: loaded Not tainted 6.4.0-150600.23.14-default #1 SLE15-SP6 b44ee71c81261b9e4bab5e0cde1f2ed891d5359b\nHardware name: IBM,9080-M9S POWER9 (raw) 0x4e2103 0xf000005 of:IBM,FW950.B0 (VH950_149) hv:phyp pSeries\nWorkqueue: events work_for_cpu_fn\nNIP:  c00000000005cdac LR: c00000000005e830 CTR: 0000000000000000\nREGS: c00001400c9ff770 TRAP: 0300   Not tainted  (6.4.0-150600.23.14-default)\nMSR:  800000000280b033 \u003cSF,VEC,VSX,EE,FP,ME,IR,DR,RI,LE\u003e  CR: 24228448  XER: 00000001\nCFAR: c00000000005cdd4 DAR: c00800005cd40000 DSISR: 40000000 IRQMASK: 0\nGPR00: c00000000005e830 c00001400c9ffa10 c000000001987d00 c00001400c4fe800\nGPR04: 0000080000000000 0000000000000001 0000000004000000 0000000000800000\nGPR08: 0000000004000000 0000000000000001 c00800005cd40000 ffffffffffffffff\nGPR12: 0000000084228882 c00000000a4c4f00 0000000000000010 0000080000000000\nGPR16: c00001400c4fe800 0000000004000000 0800000000000000 c00000006088b800\nGPR20: c00001401a7be980 c00001400eff3800 c000000002a2da68 000000000000002b\nGPR24: c0000000026793a8 c000000002679368 000000000000002a c0000000026793c8\nGPR28: 000008007effffff 0000080000000000 0000000000800000 c00001400c4fe800\nNIP [c00000000005cdac] iommu_table_reserve_pages+0xac/0x100\nLR [c00000000005e830] iommu_init_table+0x80/0x1e0\nCall Trace:\n[c00001400c9ffa10] [c00000000005e810] iommu_init_table+0x60/0x1e0 (unreliable)\n[c00001400c9ffa90] [c00000000010356c] iommu_bypass_supported_pSeriesLP+0x9cc/0xe40\n[c00001400c9ffc30] [c00000000005c300] dma_iommu_dma_supported+0xf0/0x230\n[c00001400c9ffcb0] [c00000000024b0c4] dma_supported+0x44/0x90\n[c00001400c9ffcd0] [c00000000024b14c] dma_set_mask+0x3c/0x80\n[c00001400c9ffd00] [c0080000555b715c] be_probe+0xc4/0xb90 [be2net]\n[c00001400c9ffdc0] [c000000000986f3c] local_pci_probe+0x6c/0x110\n[c00001400c9ffe40] [c000000000188f28] work_for_cpu_fn+0x38/0x60\n[c00001400c9ffe70] [c00000000018e454] process_one_work+0x314/0x620\n[c00001400c9fff10] [c00000000018f280] worker_thread+0x2b0/0x620\n[c00001400c9fff90] [c00000000019bb18] kthread+0x148/0x150\n[c00001400c9fffe0] [c00000000000ded8] start_kernel_thread+0x14/0x18\n\nThere are 2 issues in the code\n\n1. The index is \"int\" while the address is \"unsigned long\". This results in\n   negative value when setting the bitmap.\n\n2. The DMA offset is page shifted but the MMIO range is used as-is (64-bit\n   address). MMIO address needs to be page shifted as well.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "SUSE Linux Enterprise Micro 5.5:kernel-devel-rt-5.14.21-150500.13.100.1.noarch",
          "SUSE Linux Enterprise Micro 5.5:kernel-rt-5.14.21-150500.13.100.2.x86_64",
          "SUSE Linux Enterprise Micro 5.5:kernel-source-rt-5.14.21-150500.13.100.1.noarch"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2024-57999",
          "url": "https://www.suse.com/security/cve/CVE-2024-57999"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1238526 for CVE-2024-57999",
          "url": "https://bugzilla.suse.com/1238526"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "SUSE Linux Enterprise Micro 5.5:kernel-devel-rt-5.14.21-150500.13.100.1.noarch",
            "SUSE Linux Enterprise Micro 5.5:kernel-rt-5.14.21-150500.13.100.2.x86_64",
            "SUSE Linux Enterprise Micro 5.5:kernel-source-rt-5.14.21-150500.13.100.1.noarch"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 5.5,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
            "version": "3.1"
          },
          "products": [
            "SUSE Linux Enterprise Micro 5.5:kernel-devel-rt-5.14.21-150500.13.100.1.noarch",
            "SUSE Linux Enterprise Micro 5.5:kernel-rt-5.14.21-150500.13.100.2.x86_64",
            "SUSE Linux Enterprise Micro 5.5:kernel-source-rt-5.14.21-150500.13.100.1.noarch"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2025-07-15T14:31:35Z",
          "details": "moderate"
        }
      ],
      "title": "CVE-2024-57999"
    },
    {
      "cve": "CVE-2025-21700",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2025-21700"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "In the Linux kernel, the following vulnerability has been resolved:\n\nnet: sched: Disallow replacing of child qdisc from one parent to another\n\nLion Ackermann was able to create a UAF which can be abused for privilege\nescalation with the following script\n\nStep 1. create root qdisc\ntc qdisc add dev lo root handle 1:0 drr\n\nstep2. a class for packet aggregation do demonstrate uaf\ntc class add dev lo classid 1:1 drr\n\nstep3. a class for nesting\ntc class add dev lo classid 1:2 drr\n\nstep4. a class to graft qdisc to\ntc class add dev lo classid 1:3 drr\n\nstep5.\ntc qdisc add dev lo parent 1:1 handle 2:0 plug limit 1024\n\nstep6.\ntc qdisc add dev lo parent 1:2 handle 3:0 drr\n\nstep7.\ntc class add dev lo classid 3:1 drr\n\nstep 8.\ntc qdisc add dev lo parent 3:1 handle 4:0 pfifo\n\nstep 9. Display the class/qdisc layout\n\ntc class ls dev lo\n class drr 1:1 root leaf 2: quantum 64Kb\n class drr 1:2 root leaf 3: quantum 64Kb\n class drr 3:1 root leaf 4: quantum 64Kb\n\ntc qdisc ls\n qdisc drr 1: dev lo root refcnt 2\n qdisc plug 2: dev lo parent 1:1\n qdisc pfifo 4: dev lo parent 3:1 limit 1000p\n qdisc drr 3: dev lo parent 1:2\n\nstep10. trigger the bug \u003c=== prevented by this patch\ntc qdisc replace dev lo parent 1:3 handle 4:0\n\nstep 11. Redisplay again the qdiscs/classes\n\ntc class ls dev lo\n class drr 1:1 root leaf 2: quantum 64Kb\n class drr 1:2 root leaf 3: quantum 64Kb\n class drr 1:3 root leaf 4: quantum 64Kb\n class drr 3:1 root leaf 4: quantum 64Kb\n\ntc qdisc ls\n qdisc drr 1: dev lo root refcnt 2\n qdisc plug 2: dev lo parent 1:1\n qdisc pfifo 4: dev lo parent 3:1 refcnt 2 limit 1000p\n qdisc drr 3: dev lo parent 1:2\n\nObserve that a) parent for 4:0 does not change despite the replace request.\nThere can only be one parent.  b) refcount has gone up by two for 4:0 and\nc) both class 1:3 and 3:1 are pointing to it.\n\nStep 12.  send one packet to plug\necho \"\" | socat -u STDIN UDP4-DATAGRAM:127.0.0.1:8888,priority=$((0x10001))\nstep13.  send one packet to the grafted fifo\necho \"\" | socat -u STDIN UDP4-DATAGRAM:127.0.0.1:8888,priority=$((0x10003))\n\nstep14. lets trigger the uaf\ntc class delete dev lo classid 1:3\ntc class delete dev lo classid 1:1\n\nThe semantics of \"replace\" is for a del/add _on the same node_ and not\na delete from one node(3:1) and add to another node (1:3) as in step10.\nWhile we could \"fix\" with a more complex approach there could be\nconsequences to expectations so the patch takes the preventive approach of\n\"disallow such config\".\n\nJoint work with Lion Ackermann \u003cnnamrec@gmail.com\u003e",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "SUSE Linux Enterprise Micro 5.5:kernel-devel-rt-5.14.21-150500.13.100.1.noarch",
          "SUSE Linux Enterprise Micro 5.5:kernel-rt-5.14.21-150500.13.100.2.x86_64",
          "SUSE Linux Enterprise Micro 5.5:kernel-source-rt-5.14.21-150500.13.100.1.noarch"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2025-21700",
          "url": "https://www.suse.com/security/cve/CVE-2025-21700"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1237159 for CVE-2025-21700",
          "url": "https://bugzilla.suse.com/1237159"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "SUSE Linux Enterprise Micro 5.5:kernel-devel-rt-5.14.21-150500.13.100.1.noarch",
            "SUSE Linux Enterprise Micro 5.5:kernel-rt-5.14.21-150500.13.100.2.x86_64",
            "SUSE Linux Enterprise Micro 5.5:kernel-source-rt-5.14.21-150500.13.100.1.noarch"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 6.7,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H",
            "version": "3.1"
          },
          "products": [
            "SUSE Linux Enterprise Micro 5.5:kernel-devel-rt-5.14.21-150500.13.100.1.noarch",
            "SUSE Linux Enterprise Micro 5.5:kernel-rt-5.14.21-150500.13.100.2.x86_64",
            "SUSE Linux Enterprise Micro 5.5:kernel-source-rt-5.14.21-150500.13.100.1.noarch"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2025-07-15T14:31:35Z",
          "details": "moderate"
        }
      ],
      "title": "CVE-2025-21700"
    },
    {
      "cve": "CVE-2025-21702",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2025-21702"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "In the Linux kernel, the following vulnerability has been resolved:\n\npfifo_tail_enqueue: Drop new packet when sch-\u003elimit == 0\n\nExpected behaviour:\nIn case we reach scheduler\u0027s limit, pfifo_tail_enqueue() will drop a\npacket in scheduler\u0027s queue and decrease scheduler\u0027s qlen by one.\nThen, pfifo_tail_enqueue() enqueue new packet and increase\nscheduler\u0027s qlen by one. Finally, pfifo_tail_enqueue() return\n`NET_XMIT_CN` status code.\n\nWeird behaviour:\nIn case we set `sch-\u003elimit == 0` and trigger pfifo_tail_enqueue() on a\nscheduler that has no packet, the \u0027drop a packet\u0027 step will do nothing.\nThis means the scheduler\u0027s qlen still has value equal 0.\nThen, we continue to enqueue new packet and increase scheduler\u0027s qlen by\none. In summary, we can leverage pfifo_tail_enqueue() to increase qlen by\none and return `NET_XMIT_CN` status code.\n\nThe problem is:\nLet\u0027s say we have two qdiscs: Qdisc_A and Qdisc_B.\n - Qdisc_A\u0027s type must have \u0027-\u003egraft()\u0027 function to create parent/child relationship.\n   Let\u0027s say Qdisc_A\u0027s type is `hfsc`. Enqueue packet to this qdisc will trigger `hfsc_enqueue`.\n - Qdisc_B\u0027s type is pfifo_head_drop. Enqueue packet to this qdisc will trigger `pfifo_tail_enqueue`.\n - Qdisc_B is configured to have `sch-\u003elimit == 0`.\n - Qdisc_A is configured to route the enqueued\u0027s packet to Qdisc_B.\n\nEnqueue packet through Qdisc_A will lead to:\n - hfsc_enqueue(Qdisc_A) -\u003e pfifo_tail_enqueue(Qdisc_B)\n - Qdisc_B-\u003eq.qlen += 1\n - pfifo_tail_enqueue() return `NET_XMIT_CN`\n - hfsc_enqueue() check for `NET_XMIT_SUCCESS` and see `NET_XMIT_CN` =\u003e hfsc_enqueue() don\u0027t increase qlen of Qdisc_A.\n\nThe whole process lead to a situation where Qdisc_A-\u003eq.qlen == 0 and Qdisc_B-\u003eq.qlen == 1.\nReplace \u0027hfsc\u0027 with other type (for example: \u0027drr\u0027) still lead to the same problem.\nThis violate the design where parent\u0027s qlen should equal to the sum of its childrens\u0027qlen.\n\nBug impact: This issue can be used for user-\u003ekernel privilege escalation when it is reachable.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "SUSE Linux Enterprise Micro 5.5:kernel-devel-rt-5.14.21-150500.13.100.1.noarch",
          "SUSE Linux Enterprise Micro 5.5:kernel-rt-5.14.21-150500.13.100.2.x86_64",
          "SUSE Linux Enterprise Micro 5.5:kernel-source-rt-5.14.21-150500.13.100.1.noarch"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2025-21702",
          "url": "https://www.suse.com/security/cve/CVE-2025-21702"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1237312 for CVE-2025-21702",
          "url": "https://bugzilla.suse.com/1237312"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1245797 for CVE-2025-21702",
          "url": "https://bugzilla.suse.com/1245797"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "SUSE Linux Enterprise Micro 5.5:kernel-devel-rt-5.14.21-150500.13.100.1.noarch",
            "SUSE Linux Enterprise Micro 5.5:kernel-rt-5.14.21-150500.13.100.2.x86_64",
            "SUSE Linux Enterprise Micro 5.5:kernel-source-rt-5.14.21-150500.13.100.1.noarch"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 7.8,
            "baseSeverity": "HIGH",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
            "version": "3.1"
          },
          "products": [
            "SUSE Linux Enterprise Micro 5.5:kernel-devel-rt-5.14.21-150500.13.100.1.noarch",
            "SUSE Linux Enterprise Micro 5.5:kernel-rt-5.14.21-150500.13.100.2.x86_64",
            "SUSE Linux Enterprise Micro 5.5:kernel-source-rt-5.14.21-150500.13.100.1.noarch"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2025-07-15T14:31:35Z",
          "details": "important"
        }
      ],
      "title": "CVE-2025-21702"
    },
    {
      "cve": "CVE-2025-21703",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2025-21703"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "In the Linux kernel, the following vulnerability has been resolved:\n\nnetem: Update sch-\u003eq.qlen before qdisc_tree_reduce_backlog()\n\nqdisc_tree_reduce_backlog() notifies parent qdisc only if child\nqdisc becomes empty, therefore we need to reduce the backlog of the\nchild qdisc before calling it. Otherwise it would miss the opportunity\nto call cops-\u003eqlen_notify(), in the case of DRR, it resulted in UAF\nsince DRR uses -\u003eqlen_notify() to maintain its active list.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "SUSE Linux Enterprise Micro 5.5:kernel-devel-rt-5.14.21-150500.13.100.1.noarch",
          "SUSE Linux Enterprise Micro 5.5:kernel-rt-5.14.21-150500.13.100.2.x86_64",
          "SUSE Linux Enterprise Micro 5.5:kernel-source-rt-5.14.21-150500.13.100.1.noarch"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2025-21703",
          "url": "https://www.suse.com/security/cve/CVE-2025-21703"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1237313 for CVE-2025-21703",
          "url": "https://bugzilla.suse.com/1237313"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1245796 for CVE-2025-21703",
          "url": "https://bugzilla.suse.com/1245796"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "SUSE Linux Enterprise Micro 5.5:kernel-devel-rt-5.14.21-150500.13.100.1.noarch",
            "SUSE Linux Enterprise Micro 5.5:kernel-rt-5.14.21-150500.13.100.2.x86_64",
            "SUSE Linux Enterprise Micro 5.5:kernel-source-rt-5.14.21-150500.13.100.1.noarch"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 7.8,
            "baseSeverity": "HIGH",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
            "version": "3.1"
          },
          "products": [
            "SUSE Linux Enterprise Micro 5.5:kernel-devel-rt-5.14.21-150500.13.100.1.noarch",
            "SUSE Linux Enterprise Micro 5.5:kernel-rt-5.14.21-150500.13.100.2.x86_64",
            "SUSE Linux Enterprise Micro 5.5:kernel-source-rt-5.14.21-150500.13.100.1.noarch"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2025-07-15T14:31:35Z",
          "details": "important"
        }
      ],
      "title": "CVE-2025-21703"
    },
    {
      "cve": "CVE-2025-21756",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2025-21756"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "In the Linux kernel, the following vulnerability has been resolved:\n\nvsock: Keep the binding until socket destruction\n\nPreserve sockets bindings; this includes both resulting from an explicit\nbind() and those implicitly bound through autobind during connect().\n\nPrevents socket unbinding during a transport reassignment, which fixes a\nuse-after-free:\n\n    1. vsock_create() (refcnt=1) calls vsock_insert_unbound() (refcnt=2)\n    2. transport-\u003erelease() calls vsock_remove_bound() without checking if\n       sk was bound and moved to bound list (refcnt=1)\n    3. vsock_bind() assumes sk is in unbound list and before\n       __vsock_insert_bound(vsock_bound_sockets()) calls\n       __vsock_remove_bound() which does:\n           list_del_init(\u0026vsk-\u003ebound_table); // nop\n           sock_put(\u0026vsk-\u003esk);               // refcnt=0\n\nBUG: KASAN: slab-use-after-free in __vsock_bind+0x62e/0x730\nRead of size 4 at addr ffff88816b46a74c by task a.out/2057\n dump_stack_lvl+0x68/0x90\n print_report+0x174/0x4f6\n kasan_report+0xb9/0x190\n __vsock_bind+0x62e/0x730\n vsock_bind+0x97/0xe0\n __sys_bind+0x154/0x1f0\n __x64_sys_bind+0x6e/0xb0\n do_syscall_64+0x93/0x1b0\n entry_SYSCALL_64_after_hwframe+0x76/0x7e\n\nAllocated by task 2057:\n kasan_save_stack+0x1e/0x40\n kasan_save_track+0x10/0x30\n __kasan_slab_alloc+0x85/0x90\n kmem_cache_alloc_noprof+0x131/0x450\n sk_prot_alloc+0x5b/0x220\n sk_alloc+0x2c/0x870\n __vsock_create.constprop.0+0x2e/0xb60\n vsock_create+0xe4/0x420\n __sock_create+0x241/0x650\n __sys_socket+0xf2/0x1a0\n __x64_sys_socket+0x6e/0xb0\n do_syscall_64+0x93/0x1b0\n entry_SYSCALL_64_after_hwframe+0x76/0x7e\n\nFreed by task 2057:\n kasan_save_stack+0x1e/0x40\n kasan_save_track+0x10/0x30\n kasan_save_free_info+0x37/0x60\n __kasan_slab_free+0x4b/0x70\n kmem_cache_free+0x1a1/0x590\n __sk_destruct+0x388/0x5a0\n __vsock_bind+0x5e1/0x730\n vsock_bind+0x97/0xe0\n __sys_bind+0x154/0x1f0\n __x64_sys_bind+0x6e/0xb0\n do_syscall_64+0x93/0x1b0\n entry_SYSCALL_64_after_hwframe+0x76/0x7e\n\nrefcount_t: addition on 0; use-after-free.\nWARNING: CPU: 7 PID: 2057 at lib/refcount.c:25 refcount_warn_saturate+0xce/0x150\nRIP: 0010:refcount_warn_saturate+0xce/0x150\n __vsock_bind+0x66d/0x730\n vsock_bind+0x97/0xe0\n __sys_bind+0x154/0x1f0\n __x64_sys_bind+0x6e/0xb0\n do_syscall_64+0x93/0x1b0\n entry_SYSCALL_64_after_hwframe+0x76/0x7e\n\nrefcount_t: underflow; use-after-free.\nWARNING: CPU: 7 PID: 2057 at lib/refcount.c:28 refcount_warn_saturate+0xee/0x150\nRIP: 0010:refcount_warn_saturate+0xee/0x150\n vsock_remove_bound+0x187/0x1e0\n __vsock_release+0x383/0x4a0\n vsock_release+0x90/0x120\n __sock_release+0xa3/0x250\n sock_close+0x14/0x20\n __fput+0x359/0xa80\n task_work_run+0x107/0x1d0\n do_exit+0x847/0x2560\n do_group_exit+0xb8/0x250\n __x64_sys_exit_group+0x3a/0x50\n x64_sys_call+0xfec/0x14f0\n do_syscall_64+0x93/0x1b0\n entry_SYSCALL_64_after_hwframe+0x76/0x7e",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "SUSE Linux Enterprise Micro 5.5:kernel-devel-rt-5.14.21-150500.13.100.1.noarch",
          "SUSE Linux Enterprise Micro 5.5:kernel-rt-5.14.21-150500.13.100.2.x86_64",
          "SUSE Linux Enterprise Micro 5.5:kernel-source-rt-5.14.21-150500.13.100.1.noarch"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2025-21756",
          "url": "https://www.suse.com/security/cve/CVE-2025-21756"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1238876 for CVE-2025-21756",
          "url": "https://bugzilla.suse.com/1238876"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1245795 for CVE-2025-21756",
          "url": "https://bugzilla.suse.com/1245795"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "SUSE Linux Enterprise Micro 5.5:kernel-devel-rt-5.14.21-150500.13.100.1.noarch",
            "SUSE Linux Enterprise Micro 5.5:kernel-rt-5.14.21-150500.13.100.2.x86_64",
            "SUSE Linux Enterprise Micro 5.5:kernel-source-rt-5.14.21-150500.13.100.1.noarch"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 7.8,
            "baseSeverity": "HIGH",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
            "version": "3.1"
          },
          "products": [
            "SUSE Linux Enterprise Micro 5.5:kernel-devel-rt-5.14.21-150500.13.100.1.noarch",
            "SUSE Linux Enterprise Micro 5.5:kernel-rt-5.14.21-150500.13.100.2.x86_64",
            "SUSE Linux Enterprise Micro 5.5:kernel-source-rt-5.14.21-150500.13.100.1.noarch"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2025-07-15T14:31:35Z",
          "details": "important"
        }
      ],
      "title": "CVE-2025-21756"
    },
    {
      "cve": "CVE-2025-23141",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2025-23141"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "In the Linux kernel, the following vulnerability has been resolved:\n\nKVM: x86: Acquire SRCU in KVM_GET_MP_STATE to protect guest memory accesses\n\nAcquire a lock on kvm-\u003esrcu when userspace is getting MP state to handle a\nrather extreme edge case where \"accepting\" APIC events, i.e. processing\npending INIT or SIPI, can trigger accesses to guest memory.  If the vCPU\nis in L2 with INIT *and* a TRIPLE_FAULT request pending, then getting MP\nstate will trigger a nested VM-Exit by way of -\u003echeck_nested_events(), and\nemuating the nested VM-Exit can access guest memory.\n\nThe splat was originally hit by syzkaller on a Google-internal kernel, and\nreproduced on an upstream kernel by hacking the triple_fault_event_test\nselftest to stuff a pending INIT, store an MSR on VM-Exit (to generate a\nmemory access on VMX), and do vcpu_mp_state_get() to trigger the scenario.\n\n  =============================\n  WARNING: suspicious RCU usage\n  6.14.0-rc3-b112d356288b-vmx/pi_lockdep_false_pos-lock #3 Not tainted\n  -----------------------------\n  include/linux/kvm_host.h:1058 suspicious rcu_dereference_check() usage!\n\n  other info that might help us debug this:\n\n  rcu_scheduler_active = 2, debug_locks = 1\n  1 lock held by triple_fault_ev/1256:\n   #0: ffff88810df5a330 (\u0026vcpu-\u003emutex){+.+.}-{4:4}, at: kvm_vcpu_ioctl+0x8b/0x9a0 [kvm]\n\n  stack backtrace:\n  CPU: 11 UID: 1000 PID: 1256 Comm: triple_fault_ev Not tainted 6.14.0-rc3-b112d356288b-vmx #3\n  Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 0.0.0 02/06/2015\n  Call Trace:\n   \u003cTASK\u003e\n   dump_stack_lvl+0x7f/0x90\n   lockdep_rcu_suspicious+0x144/0x190\n   kvm_vcpu_gfn_to_memslot+0x156/0x180 [kvm]\n   kvm_vcpu_read_guest+0x3e/0x90 [kvm]\n   read_and_check_msr_entry+0x2e/0x180 [kvm_intel]\n   __nested_vmx_vmexit+0x550/0xde0 [kvm_intel]\n   kvm_check_nested_events+0x1b/0x30 [kvm]\n   kvm_apic_accept_events+0x33/0x100 [kvm]\n   kvm_arch_vcpu_ioctl_get_mpstate+0x30/0x1d0 [kvm]\n   kvm_vcpu_ioctl+0x33e/0x9a0 [kvm]\n   __x64_sys_ioctl+0x8b/0xb0\n   do_syscall_64+0x6c/0x170\n   entry_SYSCALL_64_after_hwframe+0x4b/0x53\n   \u003c/TASK\u003e",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "SUSE Linux Enterprise Micro 5.5:kernel-devel-rt-5.14.21-150500.13.100.1.noarch",
          "SUSE Linux Enterprise Micro 5.5:kernel-rt-5.14.21-150500.13.100.2.x86_64",
          "SUSE Linux Enterprise Micro 5.5:kernel-source-rt-5.14.21-150500.13.100.1.noarch"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2025-23141",
          "url": "https://www.suse.com/security/cve/CVE-2025-23141"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1242782 for CVE-2025-23141",
          "url": "https://bugzilla.suse.com/1242782"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "SUSE Linux Enterprise Micro 5.5:kernel-devel-rt-5.14.21-150500.13.100.1.noarch",
            "SUSE Linux Enterprise Micro 5.5:kernel-rt-5.14.21-150500.13.100.2.x86_64",
            "SUSE Linux Enterprise Micro 5.5:kernel-source-rt-5.14.21-150500.13.100.1.noarch"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 5.5,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
            "version": "3.1"
          },
          "products": [
            "SUSE Linux Enterprise Micro 5.5:kernel-devel-rt-5.14.21-150500.13.100.1.noarch",
            "SUSE Linux Enterprise Micro 5.5:kernel-rt-5.14.21-150500.13.100.2.x86_64",
            "SUSE Linux Enterprise Micro 5.5:kernel-source-rt-5.14.21-150500.13.100.1.noarch"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2025-07-15T14:31:35Z",
          "details": "moderate"
        }
      ],
      "title": "CVE-2025-23141"
    },
    {
      "cve": "CVE-2025-23145",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2025-23145"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "In the Linux kernel, the following vulnerability has been resolved:\n\nmptcp: fix NULL pointer in can_accept_new_subflow\n\nWhen testing valkey benchmark tool with MPTCP, the kernel panics in\n\u0027mptcp_can_accept_new_subflow\u0027 because subflow_req-\u003emsk is NULL.\n\nCall trace:\n\n  mptcp_can_accept_new_subflow (./net/mptcp/subflow.c:63 (discriminator 4)) (P)\n  subflow_syn_recv_sock (./net/mptcp/subflow.c:854)\n  tcp_check_req (./net/ipv4/tcp_minisocks.c:863)\n  tcp_v4_rcv (./net/ipv4/tcp_ipv4.c:2268)\n  ip_protocol_deliver_rcu (./net/ipv4/ip_input.c:207)\n  ip_local_deliver_finish (./net/ipv4/ip_input.c:234)\n  ip_local_deliver (./net/ipv4/ip_input.c:254)\n  ip_rcv_finish (./net/ipv4/ip_input.c:449)\n  ...\n\nAccording to the debug log, the same req received two SYN-ACK in a very\nshort time, very likely because the client retransmits the syn ack due\nto multiple reasons.\n\nEven if the packets are transmitted with a relevant time interval, they\ncan be processed by the server on different CPUs concurrently). The\n\u0027subflow_req-\u003emsk\u0027 ownership is transferred to the subflow the first,\nand there will be a risk of a null pointer dereference here.\n\nThis patch fixes this issue by moving the \u0027subflow_req-\u003emsk\u0027 under the\n`own_req == true` conditional.\n\nNote that the !msk check in subflow_hmac_valid() can be dropped, because\nthe same check already exists under the own_req mpj branch where the\ncode has been moved to.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "SUSE Linux Enterprise Micro 5.5:kernel-devel-rt-5.14.21-150500.13.100.1.noarch",
          "SUSE Linux Enterprise Micro 5.5:kernel-rt-5.14.21-150500.13.100.2.x86_64",
          "SUSE Linux Enterprise Micro 5.5:kernel-source-rt-5.14.21-150500.13.100.1.noarch"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2025-23145",
          "url": "https://www.suse.com/security/cve/CVE-2025-23145"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1242596 for CVE-2025-23145",
          "url": "https://bugzilla.suse.com/1242596"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1242882 for CVE-2025-23145",
          "url": "https://bugzilla.suse.com/1242882"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "SUSE Linux Enterprise Micro 5.5:kernel-devel-rt-5.14.21-150500.13.100.1.noarch",
            "SUSE Linux Enterprise Micro 5.5:kernel-rt-5.14.21-150500.13.100.2.x86_64",
            "SUSE Linux Enterprise Micro 5.5:kernel-source-rt-5.14.21-150500.13.100.1.noarch"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 7.5,
            "baseSeverity": "HIGH",
            "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
            "version": "3.1"
          },
          "products": [
            "SUSE Linux Enterprise Micro 5.5:kernel-devel-rt-5.14.21-150500.13.100.1.noarch",
            "SUSE Linux Enterprise Micro 5.5:kernel-rt-5.14.21-150500.13.100.2.x86_64",
            "SUSE Linux Enterprise Micro 5.5:kernel-source-rt-5.14.21-150500.13.100.1.noarch"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2025-07-15T14:31:35Z",
          "details": "important"
        }
      ],
      "title": "CVE-2025-23145"
    },
    {
      "cve": "CVE-2025-37752",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2025-37752"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "In the Linux kernel, the following vulnerability has been resolved:\n\nnet_sched: sch_sfq: move the limit validation\n\nIt is not sufficient to directly validate the limit on the data that\nthe user passes as it can be updated based on how the other parameters\nare changed.\n\nMove the check at the end of the configuration update process to also\ncatch scenarios where the limit is indirectly updated, for example\nwith the following configurations:\n\ntc qdisc add dev dummy0 handle 1: root sfq limit 2 flows 1 depth 1\ntc qdisc add dev dummy0 handle 1: root sfq limit 2 flows 1 divisor 1\n\nThis fixes the following syzkaller reported crash:\n\n------------[ cut here ]------------\nUBSAN: array-index-out-of-bounds in net/sched/sch_sfq.c:203:6\nindex 65535 is out of range for type \u0027struct sfq_head[128]\u0027\nCPU: 1 UID: 0 PID: 3037 Comm: syz.2.16 Not tainted 6.14.0-rc2-syzkaller #0\nHardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 12/27/2024\nCall Trace:\n \u003cTASK\u003e\n __dump_stack lib/dump_stack.c:94 [inline]\n dump_stack_lvl+0x201/0x300 lib/dump_stack.c:120\n ubsan_epilogue lib/ubsan.c:231 [inline]\n __ubsan_handle_out_of_bounds+0xf5/0x120 lib/ubsan.c:429\n sfq_link net/sched/sch_sfq.c:203 [inline]\n sfq_dec+0x53c/0x610 net/sched/sch_sfq.c:231\n sfq_dequeue+0x34e/0x8c0 net/sched/sch_sfq.c:493\n sfq_reset+0x17/0x60 net/sched/sch_sfq.c:518\n qdisc_reset+0x12e/0x600 net/sched/sch_generic.c:1035\n tbf_reset+0x41/0x110 net/sched/sch_tbf.c:339\n qdisc_reset+0x12e/0x600 net/sched/sch_generic.c:1035\n dev_reset_queue+0x100/0x1b0 net/sched/sch_generic.c:1311\n netdev_for_each_tx_queue include/linux/netdevice.h:2590 [inline]\n dev_deactivate_many+0x7e5/0xe70 net/sched/sch_generic.c:1375",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "SUSE Linux Enterprise Micro 5.5:kernel-devel-rt-5.14.21-150500.13.100.1.noarch",
          "SUSE Linux Enterprise Micro 5.5:kernel-rt-5.14.21-150500.13.100.2.x86_64",
          "SUSE Linux Enterprise Micro 5.5:kernel-source-rt-5.14.21-150500.13.100.1.noarch"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2025-37752",
          "url": "https://www.suse.com/security/cve/CVE-2025-37752"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1242504 for CVE-2025-37752",
          "url": "https://bugzilla.suse.com/1242504"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1245776 for CVE-2025-37752",
          "url": "https://bugzilla.suse.com/1245776"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "SUSE Linux Enterprise Micro 5.5:kernel-devel-rt-5.14.21-150500.13.100.1.noarch",
            "SUSE Linux Enterprise Micro 5.5:kernel-rt-5.14.21-150500.13.100.2.x86_64",
            "SUSE Linux Enterprise Micro 5.5:kernel-source-rt-5.14.21-150500.13.100.1.noarch"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 7,
            "baseSeverity": "HIGH",
            "vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H",
            "version": "3.1"
          },
          "products": [
            "SUSE Linux Enterprise Micro 5.5:kernel-devel-rt-5.14.21-150500.13.100.1.noarch",
            "SUSE Linux Enterprise Micro 5.5:kernel-rt-5.14.21-150500.13.100.2.x86_64",
            "SUSE Linux Enterprise Micro 5.5:kernel-source-rt-5.14.21-150500.13.100.1.noarch"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2025-07-15T14:31:35Z",
          "details": "moderate"
        }
      ],
      "title": "CVE-2025-37752"
    },
    {
      "cve": "CVE-2025-37785",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2025-37785"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "In the Linux kernel, the following vulnerability has been resolved:\n\next4: fix OOB read when checking dotdot dir\n\nMounting a corrupted filesystem with directory which contains \u0027.\u0027 dir\nentry with rec_len == block size results in out-of-bounds read (later\non, when the corrupted directory is removed).\n\next4_empty_dir() assumes every ext4 directory contains at least \u0027.\u0027\nand \u0027..\u0027 as directory entries in the first data block. It first loads\nthe \u0027.\u0027 dir entry, performs sanity checks by calling ext4_check_dir_entry()\nand then uses its rec_len member to compute the location of \u0027..\u0027 dir\nentry (in ext4_next_entry). It assumes the \u0027..\u0027 dir entry fits into the\nsame data block.\n\nIf the rec_len of \u0027.\u0027 is precisely one block (4KB), it slips through the\nsanity checks (it is considered the last directory entry in the data\nblock) and leaves \"struct ext4_dir_entry_2 *de\" point exactly past the\nmemory slot allocated to the data block. The following call to\next4_check_dir_entry() on new value of de then dereferences this pointer\nwhich results in out-of-bounds mem access.\n\nFix this by extending __ext4_check_dir_entry() to check for \u0027.\u0027 dir\nentries that reach the end of data block. Make sure to ignore the phony\ndir entries for checksum (by checking name_len for non-zero).\n\nNote: This is reported by KASAN as use-after-free in case another\nstructure was recently freed from the slot past the bound, but it is\nreally an OOB read.\n\nThis issue was found by syzkaller tool.\n\nCall Trace:\n[   38.594108] BUG: KASAN: slab-use-after-free in __ext4_check_dir_entry+0x67e/0x710\n[   38.594649] Read of size 2 at addr ffff88802b41a004 by task syz-executor/5375\n[   38.595158]\n[   38.595288] CPU: 0 UID: 0 PID: 5375 Comm: syz-executor Not tainted 6.14.0-rc7 #1\n[   38.595298] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS rel-1.16.3-0-ga6ed6b701f0a-prebuilt.qemu.org 04/01/2014\n[   38.595304] Call Trace:\n[   38.595308]  \u003cTASK\u003e\n[   38.595311]  dump_stack_lvl+0xa7/0xd0\n[   38.595325]  print_address_description.constprop.0+0x2c/0x3f0\n[   38.595339]  ? __ext4_check_dir_entry+0x67e/0x710\n[   38.595349]  print_report+0xaa/0x250\n[   38.595359]  ? __ext4_check_dir_entry+0x67e/0x710\n[   38.595368]  ? kasan_addr_to_slab+0x9/0x90\n[   38.595378]  kasan_report+0xab/0xe0\n[   38.595389]  ? __ext4_check_dir_entry+0x67e/0x710\n[   38.595400]  __ext4_check_dir_entry+0x67e/0x710\n[   38.595410]  ext4_empty_dir+0x465/0x990\n[   38.595421]  ? __pfx_ext4_empty_dir+0x10/0x10\n[   38.595432]  ext4_rmdir.part.0+0x29a/0xd10\n[   38.595441]  ? __dquot_initialize+0x2a7/0xbf0\n[   38.595455]  ? __pfx_ext4_rmdir.part.0+0x10/0x10\n[   38.595464]  ? __pfx___dquot_initialize+0x10/0x10\n[   38.595478]  ? down_write+0xdb/0x140\n[   38.595487]  ? __pfx_down_write+0x10/0x10\n[   38.595497]  ext4_rmdir+0xee/0x140\n[   38.595506]  vfs_rmdir+0x209/0x670\n[   38.595517]  ? lookup_one_qstr_excl+0x3b/0x190\n[   38.595529]  do_rmdir+0x363/0x3c0\n[   38.595537]  ? __pfx_do_rmdir+0x10/0x10\n[   38.595544]  ? strncpy_from_user+0x1ff/0x2e0\n[   38.595561]  __x64_sys_unlinkat+0xf0/0x130\n[   38.595570]  do_syscall_64+0x5b/0x180\n[   38.595583]  entry_SYSCALL_64_after_hwframe+0x76/0x7e",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "SUSE Linux Enterprise Micro 5.5:kernel-devel-rt-5.14.21-150500.13.100.1.noarch",
          "SUSE Linux Enterprise Micro 5.5:kernel-rt-5.14.21-150500.13.100.2.x86_64",
          "SUSE Linux Enterprise Micro 5.5:kernel-source-rt-5.14.21-150500.13.100.1.noarch"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2025-37785",
          "url": "https://www.suse.com/security/cve/CVE-2025-37785"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1241640 for CVE-2025-37785",
          "url": "https://bugzilla.suse.com/1241640"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1241698 for CVE-2025-37785",
          "url": "https://bugzilla.suse.com/1241698"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "SUSE Linux Enterprise Micro 5.5:kernel-devel-rt-5.14.21-150500.13.100.1.noarch",
            "SUSE Linux Enterprise Micro 5.5:kernel-rt-5.14.21-150500.13.100.2.x86_64",
            "SUSE Linux Enterprise Micro 5.5:kernel-source-rt-5.14.21-150500.13.100.1.noarch"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 6,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:N/A:H",
            "version": "3.1"
          },
          "products": [
            "SUSE Linux Enterprise Micro 5.5:kernel-devel-rt-5.14.21-150500.13.100.1.noarch",
            "SUSE Linux Enterprise Micro 5.5:kernel-rt-5.14.21-150500.13.100.2.x86_64",
            "SUSE Linux Enterprise Micro 5.5:kernel-source-rt-5.14.21-150500.13.100.1.noarch"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2025-07-15T14:31:35Z",
          "details": "moderate"
        }
      ],
      "title": "CVE-2025-37785"
    },
    {
      "cve": "CVE-2025-37798",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2025-37798"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "In the Linux kernel, the following vulnerability has been resolved:\n\ncodel: remove sch-\u003eq.qlen check before qdisc_tree_reduce_backlog()\n\nAfter making all -\u003eqlen_notify() callbacks idempotent, now it is safe to\nremove the check of qlen!=0 from both fq_codel_dequeue() and\ncodel_qdisc_dequeue().",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "SUSE Linux Enterprise Micro 5.5:kernel-devel-rt-5.14.21-150500.13.100.1.noarch",
          "SUSE Linux Enterprise Micro 5.5:kernel-rt-5.14.21-150500.13.100.2.x86_64",
          "SUSE Linux Enterprise Micro 5.5:kernel-source-rt-5.14.21-150500.13.100.1.noarch"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2025-37798",
          "url": "https://www.suse.com/security/cve/CVE-2025-37798"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1242414 for CVE-2025-37798",
          "url": "https://bugzilla.suse.com/1242414"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1242417 for CVE-2025-37798",
          "url": "https://bugzilla.suse.com/1242417"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "SUSE Linux Enterprise Micro 5.5:kernel-devel-rt-5.14.21-150500.13.100.1.noarch",
            "SUSE Linux Enterprise Micro 5.5:kernel-rt-5.14.21-150500.13.100.2.x86_64",
            "SUSE Linux Enterprise Micro 5.5:kernel-source-rt-5.14.21-150500.13.100.1.noarch"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 7.8,
            "baseSeverity": "HIGH",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
            "version": "3.1"
          },
          "products": [
            "SUSE Linux Enterprise Micro 5.5:kernel-devel-rt-5.14.21-150500.13.100.1.noarch",
            "SUSE Linux Enterprise Micro 5.5:kernel-rt-5.14.21-150500.13.100.2.x86_64",
            "SUSE Linux Enterprise Micro 5.5:kernel-source-rt-5.14.21-150500.13.100.1.noarch"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2025-07-15T14:31:35Z",
          "details": "important"
        }
      ],
      "title": "CVE-2025-37798"
    },
    {
      "cve": "CVE-2025-37823",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2025-37823"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "In the Linux kernel, the following vulnerability has been resolved:\n\nnet_sched: hfsc: Fix a potential UAF in hfsc_dequeue() too\n\nSimilarly to the previous patch, we need to safe guard hfsc_dequeue()\ntoo. But for this one, we don\u0027t have a reliable reproducer.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "SUSE Linux Enterprise Micro 5.5:kernel-devel-rt-5.14.21-150500.13.100.1.noarch",
          "SUSE Linux Enterprise Micro 5.5:kernel-rt-5.14.21-150500.13.100.2.x86_64",
          "SUSE Linux Enterprise Micro 5.5:kernel-source-rt-5.14.21-150500.13.100.1.noarch"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2025-37823",
          "url": "https://www.suse.com/security/cve/CVE-2025-37823"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1242924 for CVE-2025-37823",
          "url": "https://bugzilla.suse.com/1242924"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "SUSE Linux Enterprise Micro 5.5:kernel-devel-rt-5.14.21-150500.13.100.1.noarch",
            "SUSE Linux Enterprise Micro 5.5:kernel-rt-5.14.21-150500.13.100.2.x86_64",
            "SUSE Linux Enterprise Micro 5.5:kernel-source-rt-5.14.21-150500.13.100.1.noarch"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 5.5,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
            "version": "3.1"
          },
          "products": [
            "SUSE Linux Enterprise Micro 5.5:kernel-devel-rt-5.14.21-150500.13.100.1.noarch",
            "SUSE Linux Enterprise Micro 5.5:kernel-rt-5.14.21-150500.13.100.2.x86_64",
            "SUSE Linux Enterprise Micro 5.5:kernel-source-rt-5.14.21-150500.13.100.1.noarch"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2025-07-15T14:31:35Z",
          "details": "moderate"
        }
      ],
      "title": "CVE-2025-37823"
    },
    {
      "cve": "CVE-2025-37890",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2025-37890"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "In the Linux kernel, the following vulnerability has been resolved:\n\nnet_sched: hfsc: Fix a UAF vulnerability in class with netem as child qdisc\n\nAs described in Gerrard\u0027s report [1], we have a UAF case when an hfsc class\nhas a netem child qdisc. The crux of the issue is that hfsc is assuming\nthat checking for cl-\u003eqdisc-\u003eq.qlen == 0 guarantees that it hasn\u0027t inserted\nthe class in the vttree or eltree (which is not true for the netem\nduplicate case).\n\nThis patch checks the n_active class variable to make sure that the code\nwon\u0027t insert the class in the vttree or eltree twice, catering for the\nreentrant case.\n\n[1] https://lore.kernel.org/netdev/CAHcdcOm+03OD2j6R0=YHKqmy=VgJ8xEOKuP6c7mSgnp-TEJJbw@mail.gmail.com/",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "SUSE Linux Enterprise Micro 5.5:kernel-devel-rt-5.14.21-150500.13.100.1.noarch",
          "SUSE Linux Enterprise Micro 5.5:kernel-rt-5.14.21-150500.13.100.2.x86_64",
          "SUSE Linux Enterprise Micro 5.5:kernel-source-rt-5.14.21-150500.13.100.1.noarch"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2025-37890",
          "url": "https://www.suse.com/security/cve/CVE-2025-37890"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1243330 for CVE-2025-37890",
          "url": "https://bugzilla.suse.com/1243330"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1245791 for CVE-2025-37890",
          "url": "https://bugzilla.suse.com/1245791"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "SUSE Linux Enterprise Micro 5.5:kernel-devel-rt-5.14.21-150500.13.100.1.noarch",
            "SUSE Linux Enterprise Micro 5.5:kernel-rt-5.14.21-150500.13.100.2.x86_64",
            "SUSE Linux Enterprise Micro 5.5:kernel-source-rt-5.14.21-150500.13.100.1.noarch"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 7,
            "baseSeverity": "HIGH",
            "vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H",
            "version": "3.1"
          },
          "products": [
            "SUSE Linux Enterprise Micro 5.5:kernel-devel-rt-5.14.21-150500.13.100.1.noarch",
            "SUSE Linux Enterprise Micro 5.5:kernel-rt-5.14.21-150500.13.100.2.x86_64",
            "SUSE Linux Enterprise Micro 5.5:kernel-source-rt-5.14.21-150500.13.100.1.noarch"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2025-07-15T14:31:35Z",
          "details": "moderate"
        }
      ],
      "title": "CVE-2025-37890"
    },
    {
      "cve": "CVE-2025-37932",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2025-37932"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "In the Linux kernel, the following vulnerability has been resolved:\n\nsch_htb: make htb_qlen_notify() idempotent\n\nhtb_qlen_notify() always deactivates the HTB class and in fact could\ntrigger a warning if it is already deactivated. Therefore, it is not\nidempotent and not friendly to its callers, like fq_codel_dequeue().\n\nLet\u0027s make it idempotent to ease qdisc_tree_reduce_backlog() callers\u0027\nlife.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "SUSE Linux Enterprise Micro 5.5:kernel-devel-rt-5.14.21-150500.13.100.1.noarch",
          "SUSE Linux Enterprise Micro 5.5:kernel-rt-5.14.21-150500.13.100.2.x86_64",
          "SUSE Linux Enterprise Micro 5.5:kernel-source-rt-5.14.21-150500.13.100.1.noarch"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2025-37932",
          "url": "https://www.suse.com/security/cve/CVE-2025-37932"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1243627 for CVE-2025-37932",
          "url": "https://bugzilla.suse.com/1243627"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "SUSE Linux Enterprise Micro 5.5:kernel-devel-rt-5.14.21-150500.13.100.1.noarch",
            "SUSE Linux Enterprise Micro 5.5:kernel-rt-5.14.21-150500.13.100.2.x86_64",
            "SUSE Linux Enterprise Micro 5.5:kernel-source-rt-5.14.21-150500.13.100.1.noarch"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 0,
            "baseSeverity": "NONE",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:N",
            "version": "3.1"
          },
          "products": [
            "SUSE Linux Enterprise Micro 5.5:kernel-devel-rt-5.14.21-150500.13.100.1.noarch",
            "SUSE Linux Enterprise Micro 5.5:kernel-rt-5.14.21-150500.13.100.2.x86_64",
            "SUSE Linux Enterprise Micro 5.5:kernel-source-rt-5.14.21-150500.13.100.1.noarch"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2025-07-15T14:31:35Z",
          "details": "low"
        }
      ],
      "title": "CVE-2025-37932"
    },
    {
      "cve": "CVE-2025-37948",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2025-37948"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "In the Linux kernel, the following vulnerability has been resolved:\n\narm64: bpf: Add BHB mitigation to the epilogue for cBPF programs\n\nA malicious BPF program may manipulate the branch history to influence\nwhat the hardware speculates will happen next.\n\nOn exit from a BPF program, emit the BHB mititgation sequence.\n\nThis is only applied for \u0027classic\u0027 cBPF programs that are loaded by\nseccomp.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "SUSE Linux Enterprise Micro 5.5:kernel-devel-rt-5.14.21-150500.13.100.1.noarch",
          "SUSE Linux Enterprise Micro 5.5:kernel-rt-5.14.21-150500.13.100.2.x86_64",
          "SUSE Linux Enterprise Micro 5.5:kernel-source-rt-5.14.21-150500.13.100.1.noarch"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2025-37948",
          "url": "https://www.suse.com/security/cve/CVE-2025-37948"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1243649 for CVE-2025-37948",
          "url": "https://bugzilla.suse.com/1243649"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "SUSE Linux Enterprise Micro 5.5:kernel-devel-rt-5.14.21-150500.13.100.1.noarch",
            "SUSE Linux Enterprise Micro 5.5:kernel-rt-5.14.21-150500.13.100.2.x86_64",
            "SUSE Linux Enterprise Micro 5.5:kernel-source-rt-5.14.21-150500.13.100.1.noarch"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 6.3,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:H/A:H",
            "version": "3.1"
          },
          "products": [
            "SUSE Linux Enterprise Micro 5.5:kernel-devel-rt-5.14.21-150500.13.100.1.noarch",
            "SUSE Linux Enterprise Micro 5.5:kernel-rt-5.14.21-150500.13.100.2.x86_64",
            "SUSE Linux Enterprise Micro 5.5:kernel-source-rt-5.14.21-150500.13.100.1.noarch"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2025-07-15T14:31:35Z",
          "details": "moderate"
        }
      ],
      "title": "CVE-2025-37948"
    },
    {
      "cve": "CVE-2025-37953",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2025-37953"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "In the Linux kernel, the following vulnerability has been resolved:\n\nsch_htb: make htb_deactivate() idempotent\n\nAlan reported a NULL pointer dereference in htb_next_rb_node()\nafter we made htb_qlen_notify() idempotent.\n\nIt turns out in the following case it introduced some regression:\n\nhtb_dequeue_tree():\n  |-\u003e fq_codel_dequeue()\n    |-\u003e qdisc_tree_reduce_backlog()\n      |-\u003e htb_qlen_notify()\n        |-\u003e htb_deactivate()\n  |-\u003e htb_next_rb_node()\n  |-\u003e htb_deactivate()\n\nFor htb_next_rb_node(), after calling the 1st htb_deactivate(), the\nclprio[prio]-\u003eptr could be already set to  NULL, which means\nhtb_next_rb_node() is vulnerable here.\n\nFor htb_deactivate(), although we checked qlen before calling it, in\ncase of qlen==0 after qdisc_tree_reduce_backlog(), we may call it again\nwhich triggers the warning inside.\n\nTo fix the issues here, we need to:\n\n1) Make htb_deactivate() idempotent, that is, simply return if we\n   already call it before.\n2) Make htb_next_rb_node() safe against ptr==NULL.\n\nMany thanks to Alan for testing and for the reproducer.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "SUSE Linux Enterprise Micro 5.5:kernel-devel-rt-5.14.21-150500.13.100.1.noarch",
          "SUSE Linux Enterprise Micro 5.5:kernel-rt-5.14.21-150500.13.100.2.x86_64",
          "SUSE Linux Enterprise Micro 5.5:kernel-source-rt-5.14.21-150500.13.100.1.noarch"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2025-37953",
          "url": "https://www.suse.com/security/cve/CVE-2025-37953"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1243543 for CVE-2025-37953",
          "url": "https://bugzilla.suse.com/1243543"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "SUSE Linux Enterprise Micro 5.5:kernel-devel-rt-5.14.21-150500.13.100.1.noarch",
            "SUSE Linux Enterprise Micro 5.5:kernel-rt-5.14.21-150500.13.100.2.x86_64",
            "SUSE Linux Enterprise Micro 5.5:kernel-source-rt-5.14.21-150500.13.100.1.noarch"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 5.5,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
            "version": "3.1"
          },
          "products": [
            "SUSE Linux Enterprise Micro 5.5:kernel-devel-rt-5.14.21-150500.13.100.1.noarch",
            "SUSE Linux Enterprise Micro 5.5:kernel-rt-5.14.21-150500.13.100.2.x86_64",
            "SUSE Linux Enterprise Micro 5.5:kernel-source-rt-5.14.21-150500.13.100.1.noarch"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2025-07-15T14:31:35Z",
          "details": "moderate"
        }
      ],
      "title": "CVE-2025-37953"
    },
    {
      "cve": "CVE-2025-37963",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2025-37963"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "In the Linux kernel, the following vulnerability has been resolved:\n\narm64: bpf: Only mitigate cBPF programs loaded by unprivileged users\n\nSupport for eBPF programs loaded by unprivileged users is typically\ndisabled. This means only cBPF programs need to be mitigated for BHB.\n\nIn addition, only mitigate cBPF programs that were loaded by an\nunprivileged user. Privileged users can also load the same program\nvia eBPF, making the mitigation pointless.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "SUSE Linux Enterprise Micro 5.5:kernel-devel-rt-5.14.21-150500.13.100.1.noarch",
          "SUSE Linux Enterprise Micro 5.5:kernel-rt-5.14.21-150500.13.100.2.x86_64",
          "SUSE Linux Enterprise Micro 5.5:kernel-source-rt-5.14.21-150500.13.100.1.noarch"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2025-37963",
          "url": "https://www.suse.com/security/cve/CVE-2025-37963"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1243660 for CVE-2025-37963",
          "url": "https://bugzilla.suse.com/1243660"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "SUSE Linux Enterprise Micro 5.5:kernel-devel-rt-5.14.21-150500.13.100.1.noarch",
            "SUSE Linux Enterprise Micro 5.5:kernel-rt-5.14.21-150500.13.100.2.x86_64",
            "SUSE Linux Enterprise Micro 5.5:kernel-source-rt-5.14.21-150500.13.100.1.noarch"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 2.5,
            "baseSeverity": "LOW",
            "vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:L",
            "version": "3.1"
          },
          "products": [
            "SUSE Linux Enterprise Micro 5.5:kernel-devel-rt-5.14.21-150500.13.100.1.noarch",
            "SUSE Linux Enterprise Micro 5.5:kernel-rt-5.14.21-150500.13.100.2.x86_64",
            "SUSE Linux Enterprise Micro 5.5:kernel-source-rt-5.14.21-150500.13.100.1.noarch"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2025-07-15T14:31:35Z",
          "details": "low"
        }
      ],
      "title": "CVE-2025-37963"
    },
    {
      "cve": "CVE-2025-37997",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2025-37997"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "In the Linux kernel, the following vulnerability has been resolved:\n\nnetfilter: ipset: fix region locking in hash types\n\nRegion locking introduced in v5.6-rc4 contained three macros to handle\nthe region locks: ahash_bucket_start(), ahash_bucket_end() which gave\nback the start and end hash bucket values belonging to a given region\nlock and ahash_region() which should give back the region lock belonging\nto a given hash bucket. The latter was incorrect which can lead to a\nrace condition between the garbage collector and adding new elements\nwhen a hash type of set is defined with timeouts.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "SUSE Linux Enterprise Micro 5.5:kernel-devel-rt-5.14.21-150500.13.100.1.noarch",
          "SUSE Linux Enterprise Micro 5.5:kernel-rt-5.14.21-150500.13.100.2.x86_64",
          "SUSE Linux Enterprise Micro 5.5:kernel-source-rt-5.14.21-150500.13.100.1.noarch"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2025-37997",
          "url": "https://www.suse.com/security/cve/CVE-2025-37997"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1243832 for CVE-2025-37997",
          "url": "https://bugzilla.suse.com/1243832"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1245774 for CVE-2025-37997",
          "url": "https://bugzilla.suse.com/1245774"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "SUSE Linux Enterprise Micro 5.5:kernel-devel-rt-5.14.21-150500.13.100.1.noarch",
            "SUSE Linux Enterprise Micro 5.5:kernel-rt-5.14.21-150500.13.100.2.x86_64",
            "SUSE Linux Enterprise Micro 5.5:kernel-source-rt-5.14.21-150500.13.100.1.noarch"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 7,
            "baseSeverity": "HIGH",
            "vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H",
            "version": "3.1"
          },
          "products": [
            "SUSE Linux Enterprise Micro 5.5:kernel-devel-rt-5.14.21-150500.13.100.1.noarch",
            "SUSE Linux Enterprise Micro 5.5:kernel-rt-5.14.21-150500.13.100.2.x86_64",
            "SUSE Linux Enterprise Micro 5.5:kernel-source-rt-5.14.21-150500.13.100.1.noarch"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2025-07-15T14:31:35Z",
          "details": "moderate"
        }
      ],
      "title": "CVE-2025-37997"
    },
    {
      "cve": "CVE-2025-38000",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2025-38000"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "In the Linux kernel, the following vulnerability has been resolved:\n\nsch_hfsc: Fix qlen accounting bug when using peek in hfsc_enqueue()\n\nWhen enqueuing the first packet to an HFSC class, hfsc_enqueue() calls the\nchild qdisc\u0027s peek() operation before incrementing sch-\u003eq.qlen and\nsch-\u003eqstats.backlog. If the child qdisc uses qdisc_peek_dequeued(), this may\ntrigger an immediate dequeue and potential packet drop. In such cases,\nqdisc_tree_reduce_backlog() is called, but the HFSC qdisc\u0027s qlen and backlog\nhave not yet been updated, leading to inconsistent queue accounting. This\ncan leave an empty HFSC class in the active list, causing further\nconsequences like use-after-free.\n\nThis patch fixes the bug by moving the increment of sch-\u003eq.qlen and\nsch-\u003eqstats.backlog before the call to the child qdisc\u0027s peek() operation.\nThis ensures that queue length and backlog are always accurate when packet\ndrops or dequeues are triggered during the peek.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "SUSE Linux Enterprise Micro 5.5:kernel-devel-rt-5.14.21-150500.13.100.1.noarch",
          "SUSE Linux Enterprise Micro 5.5:kernel-rt-5.14.21-150500.13.100.2.x86_64",
          "SUSE Linux Enterprise Micro 5.5:kernel-source-rt-5.14.21-150500.13.100.1.noarch"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2025-38000",
          "url": "https://www.suse.com/security/cve/CVE-2025-38000"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1244277 for CVE-2025-38000",
          "url": "https://bugzilla.suse.com/1244277"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1245775 for CVE-2025-38000",
          "url": "https://bugzilla.suse.com/1245775"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "SUSE Linux Enterprise Micro 5.5:kernel-devel-rt-5.14.21-150500.13.100.1.noarch",
            "SUSE Linux Enterprise Micro 5.5:kernel-rt-5.14.21-150500.13.100.2.x86_64",
            "SUSE Linux Enterprise Micro 5.5:kernel-source-rt-5.14.21-150500.13.100.1.noarch"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 7,
            "baseSeverity": "HIGH",
            "vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H",
            "version": "3.1"
          },
          "products": [
            "SUSE Linux Enterprise Micro 5.5:kernel-devel-rt-5.14.21-150500.13.100.1.noarch",
            "SUSE Linux Enterprise Micro 5.5:kernel-rt-5.14.21-150500.13.100.2.x86_64",
            "SUSE Linux Enterprise Micro 5.5:kernel-source-rt-5.14.21-150500.13.100.1.noarch"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2025-07-15T14:31:35Z",
          "details": "important"
        }
      ],
      "title": "CVE-2025-38000"
    },
    {
      "cve": "CVE-2025-38001",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2025-38001"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "In the Linux kernel, the following vulnerability has been resolved:\n\nnet_sched: hfsc: Address reentrant enqueue adding class to eltree twice\n\nSavino says:\n    \"We are writing to report that this recent patch\n    (141d34391abbb315d68556b7c67ad97885407547) [1]\n    can be bypassed, and a UAF can still occur when HFSC is utilized with\n    NETEM.\n\n    The patch only checks the cl-\u003ecl_nactive field to determine whether\n    it is the first insertion or not [2], but this field is only\n    incremented by init_vf [3].\n\n    By using HFSC_RSC (which uses init_ed) [4], it is possible to bypass the\n    check and insert the class twice in the eltree.\n    Under normal conditions, this would lead to an infinite loop in\n    hfsc_dequeue for the reasons we already explained in this report [5].\n\n    However, if TBF is added as root qdisc and it is configured with a\n    very low rate,\n    it can be utilized to prevent packets from being dequeued.\n    This behavior can be exploited to perform subsequent insertions in the\n    HFSC eltree and cause a UAF.\"\n\nTo fix both the UAF and the infinite loop, with netem as an hfsc child,\ncheck explicitly in hfsc_enqueue whether the class is already in the eltree\nwhenever the HFSC_RSC flag is set.\n\n[1] https://web.git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=141d34391abbb315d68556b7c67ad97885407547\n[2] https://elixir.bootlin.com/linux/v6.15-rc5/source/net/sched/sch_hfsc.c#L1572\n[3] https://elixir.bootlin.com/linux/v6.15-rc5/source/net/sched/sch_hfsc.c#L677\n[4] https://elixir.bootlin.com/linux/v6.15-rc5/source/net/sched/sch_hfsc.c#L1574\n[5] https://lore.kernel.org/netdev/8DuRWwfqjoRDLDmBMlIfbrsZg9Gx50DHJc1ilxsEBNe2D6NMoigR_eIRIG0LOjMc3r10nUUZtArXx4oZBIdUfZQrwjcQhdinnMis_0G7VEk=@willsroot.io/T/#u",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "SUSE Linux Enterprise Micro 5.5:kernel-devel-rt-5.14.21-150500.13.100.1.noarch",
          "SUSE Linux Enterprise Micro 5.5:kernel-rt-5.14.21-150500.13.100.2.x86_64",
          "SUSE Linux Enterprise Micro 5.5:kernel-source-rt-5.14.21-150500.13.100.1.noarch"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2025-38001",
          "url": "https://www.suse.com/security/cve/CVE-2025-38001"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1244234 for CVE-2025-38001",
          "url": "https://bugzilla.suse.com/1244234"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1244235 for CVE-2025-38001",
          "url": "https://bugzilla.suse.com/1244235"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "SUSE Linux Enterprise Micro 5.5:kernel-devel-rt-5.14.21-150500.13.100.1.noarch",
            "SUSE Linux Enterprise Micro 5.5:kernel-rt-5.14.21-150500.13.100.2.x86_64",
            "SUSE Linux Enterprise Micro 5.5:kernel-source-rt-5.14.21-150500.13.100.1.noarch"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 7.8,
            "baseSeverity": "HIGH",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
            "version": "3.1"
          },
          "products": [
            "SUSE Linux Enterprise Micro 5.5:kernel-devel-rt-5.14.21-150500.13.100.1.noarch",
            "SUSE Linux Enterprise Micro 5.5:kernel-rt-5.14.21-150500.13.100.2.x86_64",
            "SUSE Linux Enterprise Micro 5.5:kernel-source-rt-5.14.21-150500.13.100.1.noarch"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2025-07-15T14:31:35Z",
          "details": "important"
        }
      ],
      "title": "CVE-2025-38001"
    },
    {
      "cve": "CVE-2025-38014",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2025-38014"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "In the Linux kernel, the following vulnerability has been resolved:\n\ndmaengine: idxd: Refactor remove call with idxd_cleanup() helper\n\nThe idxd_cleanup() helper cleans up perfmon, interrupts, internals and\nso on. Refactor remove call with the idxd_cleanup() helper to avoid code\nduplication. Note, this also fixes the missing put_device() for idxd\ngroups, enginces and wqs.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "SUSE Linux Enterprise Micro 5.5:kernel-devel-rt-5.14.21-150500.13.100.1.noarch",
          "SUSE Linux Enterprise Micro 5.5:kernel-rt-5.14.21-150500.13.100.2.x86_64",
          "SUSE Linux Enterprise Micro 5.5:kernel-source-rt-5.14.21-150500.13.100.1.noarch"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2025-38014",
          "url": "https://www.suse.com/security/cve/CVE-2025-38014"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1244732 for CVE-2025-38014",
          "url": "https://bugzilla.suse.com/1244732"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1244733 for CVE-2025-38014",
          "url": "https://bugzilla.suse.com/1244733"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "SUSE Linux Enterprise Micro 5.5:kernel-devel-rt-5.14.21-150500.13.100.1.noarch",
            "SUSE Linux Enterprise Micro 5.5:kernel-rt-5.14.21-150500.13.100.2.x86_64",
            "SUSE Linux Enterprise Micro 5.5:kernel-source-rt-5.14.21-150500.13.100.1.noarch"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 4.1,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:N/I:N/A:H",
            "version": "3.1"
          },
          "products": [
            "SUSE Linux Enterprise Micro 5.5:kernel-devel-rt-5.14.21-150500.13.100.1.noarch",
            "SUSE Linux Enterprise Micro 5.5:kernel-rt-5.14.21-150500.13.100.2.x86_64",
            "SUSE Linux Enterprise Micro 5.5:kernel-source-rt-5.14.21-150500.13.100.1.noarch"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2025-07-15T14:31:35Z",
          "details": "moderate"
        }
      ],
      "title": "CVE-2025-38014"
    },
    {
      "cve": "CVE-2025-38060",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2025-38060"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "In the Linux kernel, the following vulnerability has been resolved:\n\nbpf: copy_verifier_state() should copy \u0027loop_entry\u0027 field\n\nThe bpf_verifier_state.loop_entry state should be copied by\ncopy_verifier_state(). Otherwise, .loop_entry values from unrelated\nstates would poison env-\u003ecur_state.\n\nAdditionally, env-\u003estack should not contain any states with\n.loop_entry != NULL. The states in env-\u003estack are yet to be verified,\nwhile .loop_entry is set for states that reached an equivalent state.\nThis means that env-\u003ecur_state-\u003eloop_entry should always be NULL after\npop_stack().\n\nSee the selftest in the next commit for an example of the program that\nis not safe yet is accepted by verifier w/o this fix.\n\nThis change has some verification performance impact for selftests:\n\nFile                                Program                       Insns (A)  Insns (B)  Insns   (DIFF)  States (A)  States (B)  States (DIFF)\n----------------------------------  ----------------------------  ---------  ---------  --------------  ----------  ----------  -------------\narena_htab.bpf.o                    arena_htab_llvm                     717        426  -291 (-40.59%)          57          37  -20 (-35.09%)\narena_htab_asm.bpf.o                arena_htab_asm                      597        445  -152 (-25.46%)          47          37  -10 (-21.28%)\narena_list.bpf.o                    arena_list_del                      309        279    -30 (-9.71%)          23          14   -9 (-39.13%)\niters.bpf.o                         iter_subprog_check_stacksafe        155        141    -14 (-9.03%)          15          14    -1 (-6.67%)\niters.bpf.o                         iter_subprog_iters                 1094       1003    -91 (-8.32%)          88          83    -5 (-5.68%)\niters.bpf.o                         loop_state_deps2                    479        725  +246 (+51.36%)          46          63  +17 (+36.96%)\nkmem_cache_iter.bpf.o               open_coded_iter                      63         59     -4 (-6.35%)           7           6   -1 (-14.29%)\nverifier_bits_iter.bpf.o            max_words                            92         84     -8 (-8.70%)           8           7   -1 (-12.50%)\nverifier_iterating_callbacks.bpf.o  cond_break2                         113        107     -6 (-5.31%)          12          12    +0 (+0.00%)\n\nAnd significant negative impact for sched_ext:\n\nFile               Program                 Insns (A)  Insns (B)  Insns         (DIFF)  States (A)  States (B)  States      (DIFF)\n-----------------  ----------------------  ---------  ---------  --------------------  ----------  ----------  ------------------\nbpf.bpf.o          lavd_init                    7039      14723      +7684 (+109.16%)         490        1139     +649 (+132.45%)\nbpf.bpf.o          layered_dispatch            11485      10548         -937 (-8.16%)         848         762       -86 (-10.14%)\nbpf.bpf.o          layered_dump                 7422    1000001  +992579 (+13373.47%)         681       31178  +30497 (+4478.27%)\nbpf.bpf.o          layered_enqueue             16854      71127     +54273 (+322.02%)        1611        6450    +4839 (+300.37%)\nbpf.bpf.o          p2dq_dispatch                 665        791        +126 (+18.95%)          68          78       +10 (+14.71%)\nbpf.bpf.o          p2dq_init                    2343       2980        +637 (+27.19%)         201         237       +36 (+17.91%)\nbpf.bpf.o          refresh_layer_cpumasks      16487     674760   +658273 (+3992.68%)        1770       65370  +63600 (+3593.22%)\nbpf.bpf.o          rusty_select_cpu             1937      40872    +38935 (+2010.07%)         177        3210   +3033 (+1713.56%)\nscx_central.bpf.o  central_dispatch              636       2687      +2051 (+322.48%)          63         227     +164 (+260.32%)\nscx_nest.bpf.o     nest_init                     636        815        +179 (+28.14%)          60          73       +13 (+21.67%)\nscx_qmap.bpf.o     qmap_dispatch      \n---truncated---",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "SUSE Linux Enterprise Micro 5.5:kernel-devel-rt-5.14.21-150500.13.100.1.noarch",
          "SUSE Linux Enterprise Micro 5.5:kernel-rt-5.14.21-150500.13.100.2.x86_64",
          "SUSE Linux Enterprise Micro 5.5:kernel-source-rt-5.14.21-150500.13.100.1.noarch"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2025-38060",
          "url": "https://www.suse.com/security/cve/CVE-2025-38060"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1245155 for CVE-2025-38060",
          "url": "https://bugzilla.suse.com/1245155"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1245156 for CVE-2025-38060",
          "url": "https://bugzilla.suse.com/1245156"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "SUSE Linux Enterprise Micro 5.5:kernel-devel-rt-5.14.21-150500.13.100.1.noarch",
            "SUSE Linux Enterprise Micro 5.5:kernel-rt-5.14.21-150500.13.100.2.x86_64",
            "SUSE Linux Enterprise Micro 5.5:kernel-source-rt-5.14.21-150500.13.100.1.noarch"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 7.8,
            "baseSeverity": "HIGH",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
            "version": "3.1"
          },
          "products": [
            "SUSE Linux Enterprise Micro 5.5:kernel-devel-rt-5.14.21-150500.13.100.1.noarch",
            "SUSE Linux Enterprise Micro 5.5:kernel-rt-5.14.21-150500.13.100.2.x86_64",
            "SUSE Linux Enterprise Micro 5.5:kernel-source-rt-5.14.21-150500.13.100.1.noarch"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2025-07-15T14:31:35Z",
          "details": "important"
        }
      ],
      "title": "CVE-2025-38060"
    },
    {
      "cve": "CVE-2025-38083",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2025-38083"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "In the Linux kernel, the following vulnerability has been resolved:\n\nnet_sched: prio: fix a race in prio_tune()\n\nGerrard Tai reported a race condition in PRIO, whenever SFQ perturb timer\nfires at the wrong time.\n\nThe race is as follows:\n\nCPU 0                                 CPU 1\n[1]: lock root\n[2]: qdisc_tree_flush_backlog()\n[3]: unlock root\n |\n |                                    [5]: lock root\n |                                    [6]: rehash\n |                                    [7]: qdisc_tree_reduce_backlog()\n |\n[4]: qdisc_put()\n\nThis can be abused to underflow a parent\u0027s qlen.\n\nCalling qdisc_purge_queue() instead of qdisc_tree_flush_backlog()\nshould fix the race, because all packets will be purged from the qdisc\nbefore releasing the lock.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "SUSE Linux Enterprise Micro 5.5:kernel-devel-rt-5.14.21-150500.13.100.1.noarch",
          "SUSE Linux Enterprise Micro 5.5:kernel-rt-5.14.21-150500.13.100.2.x86_64",
          "SUSE Linux Enterprise Micro 5.5:kernel-source-rt-5.14.21-150500.13.100.1.noarch"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2025-38083",
          "url": "https://www.suse.com/security/cve/CVE-2025-38083"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1245183 for CVE-2025-38083",
          "url": "https://bugzilla.suse.com/1245183"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1245350 for CVE-2025-38083",
          "url": "https://bugzilla.suse.com/1245350"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "SUSE Linux Enterprise Micro 5.5:kernel-devel-rt-5.14.21-150500.13.100.1.noarch",
            "SUSE Linux Enterprise Micro 5.5:kernel-rt-5.14.21-150500.13.100.2.x86_64",
            "SUSE Linux Enterprise Micro 5.5:kernel-source-rt-5.14.21-150500.13.100.1.noarch"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 7.8,
            "baseSeverity": "HIGH",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
            "version": "3.1"
          },
          "products": [
            "SUSE Linux Enterprise Micro 5.5:kernel-devel-rt-5.14.21-150500.13.100.1.noarch",
            "SUSE Linux Enterprise Micro 5.5:kernel-rt-5.14.21-150500.13.100.2.x86_64",
            "SUSE Linux Enterprise Micro 5.5:kernel-source-rt-5.14.21-150500.13.100.1.noarch"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2025-07-15T14:31:35Z",
          "details": "important"
        }
      ],
      "title": "CVE-2025-38083"
    }
  ]
}
  suse-su-2025:02537-1
Vulnerability from csaf_suse
Published
2025-07-28 15:09
    Modified
2025-07-28 15:09
    Summary
Security update for the Linux Kernel
    Notes
Title of the patch
Security update for the Linux Kernel
    Description of the patch
The SUSE Linux Enterprise 15 SP4 kernel was updated to receive various security bugfixes.
The following security bugs were fixed:
- CVE-2021-47557: net/sched: sch_ets: do not peek at classes beyond 'nbands' (bsc#1207361 bsc#1225468).
- CVE-2021-47595: net/sched: sch_ets: do not remove idle classes from the round-robin list (bsc#1207361 bsc#1226552).
- CVE-2023-52924: netfilter: nf_tables: do not skip expired elements during walk (bsc#1236821).
- CVE-2023-52925: netfilter: nf_tables: do not fail inserts if duplicate has expired (bsc#1236822).
- CVE-2024-26808: netfilter: nft_chain_filter: handle NETDEV_UNREGISTER for inet/ingress basechain (bsc#1222634).
- CVE-2024-26924: scsi: lpfc: Release hbalock before calling lpfc_worker_wake_up() (bsc#1225820).
- CVE-2024-27397: kabi: place tstamp needed for nftables set in a hole (bsc#1224095).
- CVE-2024-36978: net: sched: sch_multiq: fix possible OOB write in multiq_tune() (bsc#1226514).
- CVE-2024-46800: sch/netem: fix use after free in netem_dequeue (bsc#1230827).
- CVE-2024-53057: net/sched: stop qdisc_tree_reduce_backlog on TC_H_ROOT (bsc#1233551).
- CVE-2024-53125: bpf: sync_linked_regs() must preserve subreg_def (bsc#1234156).
- CVE-2024-53141: netfilter: ipset: add missing range check in bitmap_ip_uadt (bsc#1234381).
- CVE-2024-56770: sch/netem: fix use after free in netem_dequeue (bsc#1235637).
- CVE-2024-57947: netfilter: nf_set_pipapo: fix initial map fill (bsc#1236333).
- CVE-2025-21700: net: sched: Disallow replacing of child qdisc from one parent to another (bsc#1237159).
- CVE-2025-21702: pfifo_tail_enqueue: Drop new packet when sch->limit == 0 (bsc#1237312).
- CVE-2025-21703: netem: Update sch->q.qlen before qdisc_tree_reduce_backlog() (bsc#1237313).
- CVE-2025-21756: vsock: Orphan socket after transport release (bsc#1238876).
- CVE-2025-23141: KVM: x86: Acquire SRCU in KVM_GET_MP_STATE to protect guest memory accesses (bsc#1242782).
- CVE-2025-37752: net_sched: sch_sfq: move the limit validation (bsc#1242504).
- CVE-2025-37797: net_sched: hfsc: Fix a UAF vulnerability in class handling (bsc#1242417).
- CVE-2025-37823: net_sched: hfsc: Fix a potential UAF in hfsc_dequeue() too (bsc#1242924).
- CVE-2025-37890: net_sched: hfsc: Fix a UAF vulnerability in class with netem as child qdisc (bsc#1243330).
- CVE-2025-37997: netfilter: ipset: fix region locking in hash types (bsc#1243832).
- CVE-2025-38000: sch_hfsc: Fix qlen accounting bug when using peek in hfsc_enqueue() (bsc#1244277).
- CVE-2025-38001: net_sched: hfsc: Address reentrant enqueue adding class to eltree twice (bsc#1244234).
- CVE-2025-38014: dmaengine: idxd: Refactor remove call with idxd_cleanup() helper (bsc#1244732).
- CVE-2025-38083: net_sched: prio: fix a race in prio_tune() (bsc#1245183).
The following non-security bugs were fixed:
- Fix conditional for selecting gcc-13 Fixes: 51dacec21eb1 ('Use gcc-13 for build on SLE16 (jsc#PED-10028).')
- Fix reference in 'net_sched: sch_sfq: use a temporary work area for validating configuration' (bsc#1242504)
- MyBS: Correctly generate build flags for non-multibuild package limit (bsc# 1244241) Fixes: 0999112774fc ('MyBS: Use buildflags to set which package to build')
- MyBS: Do not build kernel-obs-qa with limit_packages Fixes: 58e3f8c34b2b ('bs-upload-kernel: Pass limit_packages also on multibuild')
- MyBS: Simplify qa_expr generation Start with a 0 which makes the expression valid even if there are no QA repositories (currently does not happen). Then separator is always needed.
- Require zstd in kernel-default-devel when module compression is zstd To use ksym-provides tool modules need to be uncompressed. Without zstd at least kernel-default-base does not have provides. Link: https://github.com/openSUSE/rpm-config-SUSE/pull/82
- Use gcc-13 for build on SLE16 (jsc#PED-10028).
- add nf_tables for iptables non-legacy network handling This is needed for example by docker on the Alpine Linux distribution, but can also be used on openSUSE.
- bs-upload-kernel: Pass limit_packages also on multibuild Fixes: 0999112774fc ('MyBS: Use buildflags to set which package to build') Fixes: 747f601d4156 ('bs-upload-kernel, MyBS, Buildresults: Support multibuild (JSC-SLE#5501, boo#1211226, bsc#1218184)')
- check-for-config-changes: Fix flag name typo
- doc/README.SUSE: Point to the updated version of LKMPG
- hugetlb: unshare some PMDs when splitting VMAs (bsc#1245431).
- kernel-binary: Support livepatch_rt with merged RT branch
- kernel-obs-qa: Use srchash for dependency as well
- kernel-source: Also replace bin/env
- kernel-source: Also update the search to match bin/env Fixes: dc2037cd8f94 ('kernel-source: Also replace bin/env'
- kernel-source: Remove log.sh from sources
- mkspec: Exclude rt flavor from kernel-syms dependencies (bsc#1244337).
- mm/hugetlb: fix huge_pmd_unshare() vs GUP-fast race (bsc#1245431).
- mm/hugetlb: unshare page tables during VMA split, not before (bsc#1245431).
- net_sched: sch_fifo: implement lockless __fifo_dump() (bsc#1237312)
- net_sched: sch_sfq: use a temporary work area for validating configuration (bsc#1232504)
- packaging: Patch Makefile to pre-select gcc version (jsc#PED-12251).
- packaging: Turn gcc version into config.sh variable Fixes: 51dacec21eb1 ('Use gcc-13 for build on SLE16 (jsc#PED-10028).')
- powerpc/powernv/memtrace: Fix out of bounds issue in memtrace mmap (bsc#1244309 ltc#213790).
- powerpc/vas: Return -EINVAL if the offset is non-zero in mmap() (bsc#1244309 ltc#213790).
- rpm/check-for-config-changes: Add GCC_ASM_FLAG_OUTPUT_BROKEN
- rpm/check-for-config-changes: Add GCC_ASM_FLAG_OUTPUT_BROKEN Both spellings are actually used
- rpm/check-for-config-changes: add LD_CAN_ to IGNORED_CONFIGS_RE
- rpm/check-for-config-changes: add more to IGNORED_CONFIGS_RE Useful when someone tries (needs) to build the kernel with clang.
- rpm/check-for-config-changes: ignore DRM_MSM_VALIDATE_XML This option is dynamically enabled to build-test different configurations. This makes run_oldconfig.sh complain sporadically for arm64.
- rpm/kernel-binary.spec.in: Also order against update-bootloader (boo#1228659, boo#1240785, boo#1241038).
- rpm/kernel-binary.spec.in: Fix missing 20-kernel-default-extra.conf (bsc#1239986) sle_version was obsoleted for SLE16. It has to be combined with suse_version check.
- rpm/kernel-binary.spec.in: Use OrderWithRequires (boo#1228659 boo#1241038).
- rpm/kernel-binary.spec.in: fix KMPs build on 6.13+ (bsc#1234454)
- rpm/kernel-docs.spec.in: Workaround for reproducible builds (bsc#1238303)
- rpm/package-descriptions: Add rt and rt_debug descriptions
- rpm/release-projects: Update the ALP projects again (bsc#1231293).
- rpm/split-modules: Fix optional splitting with usrmerge (bsc#1238570)
- rpm: Stop using is_kotd_qa macro
- scsi: storvsc: Do not report the host packet status as the hv status (git-fixes).
- scsi: storvsc: Increase the timeouts to storvsc_timeout (bsc#1245455).
- wifi: cfg80211: Add my certificate (bsc#1243001).
- wifi: cfg80211: fix certs build to not depend on file order (bsc#1243001).
    Patchnames
SUSE-2025-2537,SUSE-SLE-Micro-5.3-2025-2537,SUSE-SLE-Micro-5.4-2025-2537,SUSE-SLE-Module-Live-Patching-15-SP4-2025-2537,SUSE-SLE-Product-HA-15-SP4-2025-2537,SUSE-SLE-Product-HPC-15-SP4-ESPOS-2025-2537,SUSE-SLE-Product-HPC-15-SP4-LTSS-2025-2537,SUSE-SLE-Product-SLES-15-SP4-LTSS-2025-2537,SUSE-SLE-Product-SLES_SAP-15-SP4-2025-2537,SUSE-SLE-Product-SUSE-Manager-Proxy-4.3-2025-2537,SUSE-SLE-Product-SUSE-Manager-Server-4.3-2025-2537
    Terms of use
CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).
    {
  "document": {
    "aggregate_severity": {
      "namespace": "https://www.suse.com/support/security/rating/",
      "text": "important"
    },
    "category": "csaf_security_advisory",
    "csaf_version": "2.0",
    "distribution": {
      "text": "Copyright 2024 SUSE LLC. All rights reserved.",
      "tlp": {
        "label": "WHITE",
        "url": "https://www.first.org/tlp/"
      }
    },
    "lang": "en",
    "notes": [
      {
        "category": "summary",
        "text": "Security update for the Linux Kernel",
        "title": "Title of the patch"
      },
      {
        "category": "description",
        "text": "\nThe SUSE Linux Enterprise 15 SP4 kernel was updated to receive various security bugfixes.\n\n\nThe following security bugs were fixed:\n\n- CVE-2021-47557: net/sched: sch_ets: do not peek at classes beyond \u0027nbands\u0027 (bsc#1207361 bsc#1225468).\n- CVE-2021-47595: net/sched: sch_ets: do not remove idle classes from the round-robin list (bsc#1207361 bsc#1226552).\n- CVE-2023-52924: netfilter: nf_tables: do not skip expired elements during walk (bsc#1236821).\n- CVE-2023-52925: netfilter: nf_tables: do not fail inserts if duplicate has expired (bsc#1236822).\n- CVE-2024-26808: netfilter: nft_chain_filter: handle NETDEV_UNREGISTER for inet/ingress basechain (bsc#1222634).\n- CVE-2024-26924: scsi: lpfc: Release hbalock before calling lpfc_worker_wake_up() (bsc#1225820).\n- CVE-2024-27397: kabi: place tstamp needed for nftables set in a hole (bsc#1224095).\n- CVE-2024-36978: net: sched: sch_multiq: fix possible OOB write in multiq_tune() (bsc#1226514).\n- CVE-2024-46800: sch/netem: fix use after free in netem_dequeue (bsc#1230827).\n- CVE-2024-53057: net/sched: stop qdisc_tree_reduce_backlog on TC_H_ROOT (bsc#1233551).\n- CVE-2024-53125: bpf: sync_linked_regs() must preserve subreg_def (bsc#1234156).\n- CVE-2024-53141: netfilter: ipset: add missing range check in bitmap_ip_uadt (bsc#1234381).\n- CVE-2024-56770: sch/netem: fix use after free in netem_dequeue (bsc#1235637).\n- CVE-2024-57947: netfilter: nf_set_pipapo: fix initial map fill (bsc#1236333).\n- CVE-2025-21700: net: sched: Disallow replacing of child qdisc from one parent to another (bsc#1237159).\n- CVE-2025-21702: pfifo_tail_enqueue: Drop new packet when sch-\u003elimit == 0 (bsc#1237312).\n- CVE-2025-21703: netem: Update sch-\u003eq.qlen before qdisc_tree_reduce_backlog() (bsc#1237313).\n- CVE-2025-21756: vsock: Orphan socket after transport release (bsc#1238876).\n- CVE-2025-23141: KVM: x86: Acquire SRCU in KVM_GET_MP_STATE to protect guest memory accesses (bsc#1242782).\n- CVE-2025-37752: net_sched: sch_sfq: move the limit validation (bsc#1242504).\n- CVE-2025-37797: net_sched: hfsc: Fix a UAF vulnerability in class handling (bsc#1242417).\n- CVE-2025-37823: net_sched: hfsc: Fix a potential UAF in hfsc_dequeue() too (bsc#1242924).\n- CVE-2025-37890: net_sched: hfsc: Fix a UAF vulnerability in class with netem as child qdisc (bsc#1243330).\n- CVE-2025-37997: netfilter: ipset: fix region locking in hash types (bsc#1243832).\n- CVE-2025-38000: sch_hfsc: Fix qlen accounting bug when using peek in hfsc_enqueue() (bsc#1244277).\n- CVE-2025-38001: net_sched: hfsc: Address reentrant enqueue adding class to eltree twice (bsc#1244234).\n- CVE-2025-38014: dmaengine: idxd: Refactor remove call with idxd_cleanup() helper (bsc#1244732).\n- CVE-2025-38083: net_sched: prio: fix a race in prio_tune() (bsc#1245183).\n\nThe following non-security bugs were fixed:\n\n- Fix conditional for selecting gcc-13 Fixes: 51dacec21eb1 (\u0027Use gcc-13 for build on SLE16 (jsc#PED-10028).\u0027)\n- Fix reference in \u0027net_sched: sch_sfq: use a temporary work area for validating configuration\u0027 (bsc#1242504)\n- MyBS: Correctly generate build flags for non-multibuild package limit (bsc# 1244241) Fixes: 0999112774fc (\u0027MyBS: Use buildflags to set which package to build\u0027)\n- MyBS: Do not build kernel-obs-qa with limit_packages Fixes: 58e3f8c34b2b (\u0027bs-upload-kernel: Pass limit_packages also on multibuild\u0027)\n- MyBS: Simplify qa_expr generation Start with a 0 which makes the expression valid even if there are no QA repositories (currently does not happen). Then separator is always needed.\n- Require zstd in kernel-default-devel when module compression is zstd To use ksym-provides tool modules need to be uncompressed. Without zstd at least kernel-default-base does not have provides. Link: https://github.com/openSUSE/rpm-config-SUSE/pull/82\n- Use gcc-13 for build on SLE16 (jsc#PED-10028).\n- add nf_tables for iptables non-legacy network handling This is needed for example by docker on the Alpine Linux distribution, but can also be used on openSUSE.\n- bs-upload-kernel: Pass limit_packages also on multibuild Fixes: 0999112774fc (\u0027MyBS: Use buildflags to set which package to build\u0027) Fixes: 747f601d4156 (\u0027bs-upload-kernel, MyBS, Buildresults: Support multibuild (JSC-SLE#5501, boo#1211226, bsc#1218184)\u0027)\n- check-for-config-changes: Fix flag name typo\n- doc/README.SUSE: Point to the updated version of LKMPG\n- hugetlb: unshare some PMDs when splitting VMAs (bsc#1245431).\n- kernel-binary: Support livepatch_rt with merged RT branch\n- kernel-obs-qa: Use srchash for dependency as well\n- kernel-source: Also replace bin/env\n- kernel-source: Also update the search to match bin/env Fixes: dc2037cd8f94 (\u0027kernel-source: Also replace bin/env\u0027\n- kernel-source: Remove log.sh from sources\n- mkspec: Exclude rt flavor from kernel-syms dependencies (bsc#1244337).\n- mm/hugetlb: fix huge_pmd_unshare() vs GUP-fast race (bsc#1245431).\n- mm/hugetlb: unshare page tables during VMA split, not before (bsc#1245431).\n- net_sched: sch_fifo: implement lockless __fifo_dump() (bsc#1237312)\n- net_sched: sch_sfq: use a temporary work area for validating configuration (bsc#1232504)\n- packaging: Patch Makefile to pre-select gcc version (jsc#PED-12251).\n- packaging: Turn gcc version into config.sh variable Fixes: 51dacec21eb1 (\u0027Use gcc-13 for build on SLE16 (jsc#PED-10028).\u0027)\n- powerpc/powernv/memtrace: Fix out of bounds issue in memtrace mmap (bsc#1244309 ltc#213790).\n- powerpc/vas: Return -EINVAL if the offset is non-zero in mmap() (bsc#1244309 ltc#213790).\n- rpm/check-for-config-changes: Add GCC_ASM_FLAG_OUTPUT_BROKEN\n- rpm/check-for-config-changes: Add GCC_ASM_FLAG_OUTPUT_BROKEN Both spellings are actually used\n- rpm/check-for-config-changes: add LD_CAN_ to IGNORED_CONFIGS_RE\n- rpm/check-for-config-changes: add more to IGNORED_CONFIGS_RE Useful when someone tries (needs) to build the kernel with clang.\n- rpm/check-for-config-changes: ignore DRM_MSM_VALIDATE_XML This option is dynamically enabled to build-test different configurations. This makes run_oldconfig.sh complain sporadically for arm64.\n- rpm/kernel-binary.spec.in: Also order against update-bootloader (boo#1228659, boo#1240785, boo#1241038).\n- rpm/kernel-binary.spec.in: Fix missing 20-kernel-default-extra.conf (bsc#1239986) sle_version was obsoleted for SLE16. It has to be combined with suse_version check.\n- rpm/kernel-binary.spec.in: Use OrderWithRequires (boo#1228659 boo#1241038).\n- rpm/kernel-binary.spec.in: fix KMPs build on 6.13+ (bsc#1234454)\n- rpm/kernel-docs.spec.in: Workaround for reproducible builds (bsc#1238303)\n- rpm/package-descriptions: Add rt and rt_debug descriptions\n- rpm/release-projects: Update the ALP projects again (bsc#1231293).\n- rpm/split-modules: Fix optional splitting with usrmerge (bsc#1238570)\n- rpm: Stop using is_kotd_qa macro\n- scsi: storvsc: Do not report the host packet status as the hv status (git-fixes).\n- scsi: storvsc: Increase the timeouts to storvsc_timeout (bsc#1245455).\n- wifi: cfg80211: Add my certificate (bsc#1243001).\n- wifi: cfg80211: fix certs build to not depend on file order (bsc#1243001).\n",
        "title": "Description of the patch"
      },
      {
        "category": "details",
        "text": "SUSE-2025-2537,SUSE-SLE-Micro-5.3-2025-2537,SUSE-SLE-Micro-5.4-2025-2537,SUSE-SLE-Module-Live-Patching-15-SP4-2025-2537,SUSE-SLE-Product-HA-15-SP4-2025-2537,SUSE-SLE-Product-HPC-15-SP4-ESPOS-2025-2537,SUSE-SLE-Product-HPC-15-SP4-LTSS-2025-2537,SUSE-SLE-Product-SLES-15-SP4-LTSS-2025-2537,SUSE-SLE-Product-SLES_SAP-15-SP4-2025-2537,SUSE-SLE-Product-SUSE-Manager-Proxy-4.3-2025-2537,SUSE-SLE-Product-SUSE-Manager-Server-4.3-2025-2537",
        "title": "Patchnames"
      },
      {
        "category": "legal_disclaimer",
        "text": "CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).",
        "title": "Terms of use"
      }
    ],
    "publisher": {
      "category": "vendor",
      "contact_details": "https://www.suse.com/support/security/contact/",
      "name": "SUSE Product Security Team",
      "namespace": "https://www.suse.com/"
    },
    "references": [
      {
        "category": "external",
        "summary": "SUSE ratings",
        "url": "https://www.suse.com/support/security/rating/"
      },
      {
        "category": "self",
        "summary": "URL of this CSAF notice",
        "url": "https://ftp.suse.com/pub/projects/security/csaf/suse-su-2025_02537-1.json"
      },
      {
        "category": "self",
        "summary": "URL for SUSE-SU-2025:02537-1",
        "url": "https://www.suse.com/support/update/announcement/2025/suse-su-202502537-1/"
      },
      {
        "category": "self",
        "summary": "E-Mail link for SUSE-SU-2025:02537-1",
        "url": "https://lists.suse.com/pipermail/sle-updates/2025-July/040942.html"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1065729",
        "url": "https://bugzilla.suse.com/1065729"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1156395",
        "url": "https://bugzilla.suse.com/1156395"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1193629",
        "url": "https://bugzilla.suse.com/1193629"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1194869",
        "url": "https://bugzilla.suse.com/1194869"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1198410",
        "url": "https://bugzilla.suse.com/1198410"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1199356",
        "url": "https://bugzilla.suse.com/1199356"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1199487",
        "url": "https://bugzilla.suse.com/1199487"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1201160",
        "url": "https://bugzilla.suse.com/1201160"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1201956",
        "url": "https://bugzilla.suse.com/1201956"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1202094",
        "url": "https://bugzilla.suse.com/1202094"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1202095",
        "url": "https://bugzilla.suse.com/1202095"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1202564",
        "url": "https://bugzilla.suse.com/1202564"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1202716",
        "url": "https://bugzilla.suse.com/1202716"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1202823",
        "url": "https://bugzilla.suse.com/1202823"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1202860",
        "url": "https://bugzilla.suse.com/1202860"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1203197",
        "url": "https://bugzilla.suse.com/1203197"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1203361",
        "url": "https://bugzilla.suse.com/1203361"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1205220",
        "url": "https://bugzilla.suse.com/1205220"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1205514",
        "url": "https://bugzilla.suse.com/1205514"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1206664",
        "url": "https://bugzilla.suse.com/1206664"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1206878",
        "url": "https://bugzilla.suse.com/1206878"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1206880",
        "url": "https://bugzilla.suse.com/1206880"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1207361",
        "url": "https://bugzilla.suse.com/1207361"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1207638",
        "url": "https://bugzilla.suse.com/1207638"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1211226",
        "url": "https://bugzilla.suse.com/1211226"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1212051",
        "url": "https://bugzilla.suse.com/1212051"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1213090",
        "url": "https://bugzilla.suse.com/1213090"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1218184",
        "url": "https://bugzilla.suse.com/1218184"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1218234",
        "url": "https://bugzilla.suse.com/1218234"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1218470",
        "url": "https://bugzilla.suse.com/1218470"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1222634",
        "url": "https://bugzilla.suse.com/1222634"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1223675",
        "url": "https://bugzilla.suse.com/1223675"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1224095",
        "url": "https://bugzilla.suse.com/1224095"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1224597",
        "url": "https://bugzilla.suse.com/1224597"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1225468",
        "url": "https://bugzilla.suse.com/1225468"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1225820",
        "url": "https://bugzilla.suse.com/1225820"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1226514",
        "url": "https://bugzilla.suse.com/1226514"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1226552",
        "url": "https://bugzilla.suse.com/1226552"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1228659",
        "url": "https://bugzilla.suse.com/1228659"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1230827",
        "url": "https://bugzilla.suse.com/1230827"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1231293",
        "url": "https://bugzilla.suse.com/1231293"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1232504",
        "url": "https://bugzilla.suse.com/1232504"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1233551",
        "url": "https://bugzilla.suse.com/1233551"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1234156",
        "url": "https://bugzilla.suse.com/1234156"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1234381",
        "url": "https://bugzilla.suse.com/1234381"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1234454",
        "url": "https://bugzilla.suse.com/1234454"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1235637",
        "url": "https://bugzilla.suse.com/1235637"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1236333",
        "url": "https://bugzilla.suse.com/1236333"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1236821",
        "url": "https://bugzilla.suse.com/1236821"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1236822",
        "url": "https://bugzilla.suse.com/1236822"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1237159",
        "url": "https://bugzilla.suse.com/1237159"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1237312",
        "url": "https://bugzilla.suse.com/1237312"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1237313",
        "url": "https://bugzilla.suse.com/1237313"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1238303",
        "url": "https://bugzilla.suse.com/1238303"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1238526",
        "url": "https://bugzilla.suse.com/1238526"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1238570",
        "url": "https://bugzilla.suse.com/1238570"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1238876",
        "url": "https://bugzilla.suse.com/1238876"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1239986",
        "url": "https://bugzilla.suse.com/1239986"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1240785",
        "url": "https://bugzilla.suse.com/1240785"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1241038",
        "url": "https://bugzilla.suse.com/1241038"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1242221",
        "url": "https://bugzilla.suse.com/1242221"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1242414",
        "url": "https://bugzilla.suse.com/1242414"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1242417",
        "url": "https://bugzilla.suse.com/1242417"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1242504",
        "url": "https://bugzilla.suse.com/1242504"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1242596",
        "url": "https://bugzilla.suse.com/1242596"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1242782",
        "url": "https://bugzilla.suse.com/1242782"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1242924",
        "url": "https://bugzilla.suse.com/1242924"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1243001",
        "url": "https://bugzilla.suse.com/1243001"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1243330",
        "url": "https://bugzilla.suse.com/1243330"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1243543",
        "url": "https://bugzilla.suse.com/1243543"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1243627",
        "url": "https://bugzilla.suse.com/1243627"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1243832",
        "url": "https://bugzilla.suse.com/1243832"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1244114",
        "url": "https://bugzilla.suse.com/1244114"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1244179",
        "url": "https://bugzilla.suse.com/1244179"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1244234",
        "url": "https://bugzilla.suse.com/1244234"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1244241",
        "url": "https://bugzilla.suse.com/1244241"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1244277",
        "url": "https://bugzilla.suse.com/1244277"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1244309",
        "url": "https://bugzilla.suse.com/1244309"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1244337",
        "url": "https://bugzilla.suse.com/1244337"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1244732",
        "url": "https://bugzilla.suse.com/1244732"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1244764",
        "url": "https://bugzilla.suse.com/1244764"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1244765",
        "url": "https://bugzilla.suse.com/1244765"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1244767",
        "url": "https://bugzilla.suse.com/1244767"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1244770",
        "url": "https://bugzilla.suse.com/1244770"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1244771",
        "url": "https://bugzilla.suse.com/1244771"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1244773",
        "url": "https://bugzilla.suse.com/1244773"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1244774",
        "url": "https://bugzilla.suse.com/1244774"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1244776",
        "url": "https://bugzilla.suse.com/1244776"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1244779",
        "url": "https://bugzilla.suse.com/1244779"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1244780",
        "url": "https://bugzilla.suse.com/1244780"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1244781",
        "url": "https://bugzilla.suse.com/1244781"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1244782",
        "url": "https://bugzilla.suse.com/1244782"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1244783",
        "url": "https://bugzilla.suse.com/1244783"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1244784",
        "url": "https://bugzilla.suse.com/1244784"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1244786",
        "url": "https://bugzilla.suse.com/1244786"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1244787",
        "url": "https://bugzilla.suse.com/1244787"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1244788",
        "url": "https://bugzilla.suse.com/1244788"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1244790",
        "url": "https://bugzilla.suse.com/1244790"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1244793",
        "url": "https://bugzilla.suse.com/1244793"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1244794",
        "url": "https://bugzilla.suse.com/1244794"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1244796",
        "url": "https://bugzilla.suse.com/1244796"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1244797",
        "url": "https://bugzilla.suse.com/1244797"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1244798",
        "url": "https://bugzilla.suse.com/1244798"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1244800",
        "url": "https://bugzilla.suse.com/1244800"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1244802",
        "url": "https://bugzilla.suse.com/1244802"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1244804",
        "url": "https://bugzilla.suse.com/1244804"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1244807",
        "url": "https://bugzilla.suse.com/1244807"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1244808",
        "url": "https://bugzilla.suse.com/1244808"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1244811",
        "url": "https://bugzilla.suse.com/1244811"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1244813",
        "url": "https://bugzilla.suse.com/1244813"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1244814",
        "url": "https://bugzilla.suse.com/1244814"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1244815",
        "url": "https://bugzilla.suse.com/1244815"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1244816",
        "url": "https://bugzilla.suse.com/1244816"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1244819",
        "url": "https://bugzilla.suse.com/1244819"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1244820",
        "url": "https://bugzilla.suse.com/1244820"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1244823",
        "url": "https://bugzilla.suse.com/1244823"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1244824",
        "url": "https://bugzilla.suse.com/1244824"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1244825",
        "url": "https://bugzilla.suse.com/1244825"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1244830",
        "url": "https://bugzilla.suse.com/1244830"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1244831",
        "url": "https://bugzilla.suse.com/1244831"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1244832",
        "url": "https://bugzilla.suse.com/1244832"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1244834",
        "url": "https://bugzilla.suse.com/1244834"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1244836",
        "url": "https://bugzilla.suse.com/1244836"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1244838",
        "url": "https://bugzilla.suse.com/1244838"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1244839",
        "url": "https://bugzilla.suse.com/1244839"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1244840",
        "url": "https://bugzilla.suse.com/1244840"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1244841",
        "url": "https://bugzilla.suse.com/1244841"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1244842",
        "url": "https://bugzilla.suse.com/1244842"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1244843",
        "url": "https://bugzilla.suse.com/1244843"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1244845",
        "url": "https://bugzilla.suse.com/1244845"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1244846",
        "url": "https://bugzilla.suse.com/1244846"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1244848",
        "url": "https://bugzilla.suse.com/1244848"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1244849",
        "url": "https://bugzilla.suse.com/1244849"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1244851",
        "url": "https://bugzilla.suse.com/1244851"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1244853",
        "url": "https://bugzilla.suse.com/1244853"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1244854",
        "url": "https://bugzilla.suse.com/1244854"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1244856",
        "url": "https://bugzilla.suse.com/1244856"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1244860",
        "url": "https://bugzilla.suse.com/1244860"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1244861",
        "url": "https://bugzilla.suse.com/1244861"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1244866",
        "url": "https://bugzilla.suse.com/1244866"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1244867",
        "url": "https://bugzilla.suse.com/1244867"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1244868",
        "url": "https://bugzilla.suse.com/1244868"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1244869",
        "url": "https://bugzilla.suse.com/1244869"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1244870",
        "url": "https://bugzilla.suse.com/1244870"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1244871",
        "url": "https://bugzilla.suse.com/1244871"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1244872",
        "url": "https://bugzilla.suse.com/1244872"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1244873",
        "url": "https://bugzilla.suse.com/1244873"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1244875",
        "url": "https://bugzilla.suse.com/1244875"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1244876",
        "url": "https://bugzilla.suse.com/1244876"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1244878",
        "url": "https://bugzilla.suse.com/1244878"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1244879",
        "url": "https://bugzilla.suse.com/1244879"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1244881",
        "url": "https://bugzilla.suse.com/1244881"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1244883",
        "url": "https://bugzilla.suse.com/1244883"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1244884",
        "url": "https://bugzilla.suse.com/1244884"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1244886",
        "url": "https://bugzilla.suse.com/1244886"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1244887",
        "url": "https://bugzilla.suse.com/1244887"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1244890",
        "url": "https://bugzilla.suse.com/1244890"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1244895",
        "url": "https://bugzilla.suse.com/1244895"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1244899",
        "url": "https://bugzilla.suse.com/1244899"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1244900",
        "url": "https://bugzilla.suse.com/1244900"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1244901",
        "url": "https://bugzilla.suse.com/1244901"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1244902",
        "url": "https://bugzilla.suse.com/1244902"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1244903",
        "url": "https://bugzilla.suse.com/1244903"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1244908",
        "url": "https://bugzilla.suse.com/1244908"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1244911",
        "url": "https://bugzilla.suse.com/1244911"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1244915",
        "url": "https://bugzilla.suse.com/1244915"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1244936",
        "url": "https://bugzilla.suse.com/1244936"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1244941",
        "url": "https://bugzilla.suse.com/1244941"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1244942",
        "url": "https://bugzilla.suse.com/1244942"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1244943",
        "url": "https://bugzilla.suse.com/1244943"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1244944",
        "url": "https://bugzilla.suse.com/1244944"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1244945",
        "url": "https://bugzilla.suse.com/1244945"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1244948",
        "url": "https://bugzilla.suse.com/1244948"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1244949",
        "url": "https://bugzilla.suse.com/1244949"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1244950",
        "url": "https://bugzilla.suse.com/1244950"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1244956",
        "url": "https://bugzilla.suse.com/1244956"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1244958",
        "url": "https://bugzilla.suse.com/1244958"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1244959",
        "url": "https://bugzilla.suse.com/1244959"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1244965",
        "url": "https://bugzilla.suse.com/1244965"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1244966",
        "url": "https://bugzilla.suse.com/1244966"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1244967",
        "url": "https://bugzilla.suse.com/1244967"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1244968",
        "url": "https://bugzilla.suse.com/1244968"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1244969",
        "url": "https://bugzilla.suse.com/1244969"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1244970",
        "url": "https://bugzilla.suse.com/1244970"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1244974",
        "url": "https://bugzilla.suse.com/1244974"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1244976",
        "url": "https://bugzilla.suse.com/1244976"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1244977",
        "url": "https://bugzilla.suse.com/1244977"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1244978",
        "url": "https://bugzilla.suse.com/1244978"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1244979",
        "url": "https://bugzilla.suse.com/1244979"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1244983",
        "url": "https://bugzilla.suse.com/1244983"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1244984",
        "url": "https://bugzilla.suse.com/1244984"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1244985",
        "url": "https://bugzilla.suse.com/1244985"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1244986",
        "url": "https://bugzilla.suse.com/1244986"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1244991",
        "url": "https://bugzilla.suse.com/1244991"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1244992",
        "url": "https://bugzilla.suse.com/1244992"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1244993",
        "url": "https://bugzilla.suse.com/1244993"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1245006",
        "url": "https://bugzilla.suse.com/1245006"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1245007",
        "url": "https://bugzilla.suse.com/1245007"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1245009",
        "url": "https://bugzilla.suse.com/1245009"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1245011",
        "url": "https://bugzilla.suse.com/1245011"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1245012",
        "url": "https://bugzilla.suse.com/1245012"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1245018",
        "url": "https://bugzilla.suse.com/1245018"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1245019",
        "url": "https://bugzilla.suse.com/1245019"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1245024",
        "url": "https://bugzilla.suse.com/1245024"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1245028",
        "url": "https://bugzilla.suse.com/1245028"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1245031",
        "url": "https://bugzilla.suse.com/1245031"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1245032",
        "url": "https://bugzilla.suse.com/1245032"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1245033",
        "url": "https://bugzilla.suse.com/1245033"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1245038",
        "url": "https://bugzilla.suse.com/1245038"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1245039",
        "url": "https://bugzilla.suse.com/1245039"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1245041",
        "url": "https://bugzilla.suse.com/1245041"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1245047",
        "url": "https://bugzilla.suse.com/1245047"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1245051",
        "url": "https://bugzilla.suse.com/1245051"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1245057",
        "url": "https://bugzilla.suse.com/1245057"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1245058",
        "url": "https://bugzilla.suse.com/1245058"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1245060",
        "url": "https://bugzilla.suse.com/1245060"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1245062",
        "url": "https://bugzilla.suse.com/1245062"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1245064",
        "url": "https://bugzilla.suse.com/1245064"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1245069",
        "url": "https://bugzilla.suse.com/1245069"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1245072",
        "url": "https://bugzilla.suse.com/1245072"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1245073",
        "url": "https://bugzilla.suse.com/1245073"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1245088",
        "url": "https://bugzilla.suse.com/1245088"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1245089",
        "url": "https://bugzilla.suse.com/1245089"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1245092",
        "url": "https://bugzilla.suse.com/1245092"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1245093",
        "url": "https://bugzilla.suse.com/1245093"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1245098",
        "url": "https://bugzilla.suse.com/1245098"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1245103",
        "url": "https://bugzilla.suse.com/1245103"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1245117",
        "url": "https://bugzilla.suse.com/1245117"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1245118",
        "url": "https://bugzilla.suse.com/1245118"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1245119",
        "url": "https://bugzilla.suse.com/1245119"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1245121",
        "url": "https://bugzilla.suse.com/1245121"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1245122",
        "url": "https://bugzilla.suse.com/1245122"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1245125",
        "url": "https://bugzilla.suse.com/1245125"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1245129",
        "url": "https://bugzilla.suse.com/1245129"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1245131",
        "url": "https://bugzilla.suse.com/1245131"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1245133",
        "url": "https://bugzilla.suse.com/1245133"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1245134",
        "url": "https://bugzilla.suse.com/1245134"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1245135",
        "url": "https://bugzilla.suse.com/1245135"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1245136",
        "url": "https://bugzilla.suse.com/1245136"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1245138",
        "url": "https://bugzilla.suse.com/1245138"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1245139",
        "url": "https://bugzilla.suse.com/1245139"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1245140",
        "url": "https://bugzilla.suse.com/1245140"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1245142",
        "url": "https://bugzilla.suse.com/1245142"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1245146",
        "url": "https://bugzilla.suse.com/1245146"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1245147",
        "url": "https://bugzilla.suse.com/1245147"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1245149",
        "url": "https://bugzilla.suse.com/1245149"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1245152",
        "url": "https://bugzilla.suse.com/1245152"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1245154",
        "url": "https://bugzilla.suse.com/1245154"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1245180",
        "url": "https://bugzilla.suse.com/1245180"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1245183",
        "url": "https://bugzilla.suse.com/1245183"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1245189",
        "url": "https://bugzilla.suse.com/1245189"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1245191",
        "url": "https://bugzilla.suse.com/1245191"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1245195",
        "url": "https://bugzilla.suse.com/1245195"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1245197",
        "url": "https://bugzilla.suse.com/1245197"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1245265",
        "url": "https://bugzilla.suse.com/1245265"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1245348",
        "url": "https://bugzilla.suse.com/1245348"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1245431",
        "url": "https://bugzilla.suse.com/1245431"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1245455",
        "url": "https://bugzilla.suse.com/1245455"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2021-47557 page",
        "url": "https://www.suse.com/security/cve/CVE-2021-47557/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2021-47595 page",
        "url": "https://www.suse.com/security/cve/CVE-2021-47595/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2022-1679 page",
        "url": "https://www.suse.com/security/cve/CVE-2022-1679/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2022-2585 page",
        "url": "https://www.suse.com/security/cve/CVE-2022-2585/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2022-2586 page",
        "url": "https://www.suse.com/security/cve/CVE-2022-2586/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2022-2905 page",
        "url": "https://www.suse.com/security/cve/CVE-2022-2905/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2022-3903 page",
        "url": "https://www.suse.com/security/cve/CVE-2022-3903/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2022-4095 page",
        "url": "https://www.suse.com/security/cve/CVE-2022-4095/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2022-4662 page",
        "url": "https://www.suse.com/security/cve/CVE-2022-4662/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2022-49934 page",
        "url": "https://www.suse.com/security/cve/CVE-2022-49934/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2022-49936 page",
        "url": "https://www.suse.com/security/cve/CVE-2022-49936/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2022-49937 page",
        "url": "https://www.suse.com/security/cve/CVE-2022-49937/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2022-49938 page",
        "url": "https://www.suse.com/security/cve/CVE-2022-49938/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2022-49940 page",
        "url": "https://www.suse.com/security/cve/CVE-2022-49940/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2022-49942 page",
        "url": "https://www.suse.com/security/cve/CVE-2022-49942/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2022-49945 page",
        "url": "https://www.suse.com/security/cve/CVE-2022-49945/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2022-49946 page",
        "url": "https://www.suse.com/security/cve/CVE-2022-49946/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2022-49948 page",
        "url": "https://www.suse.com/security/cve/CVE-2022-49948/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2022-49950 page",
        "url": "https://www.suse.com/security/cve/CVE-2022-49950/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2022-49952 page",
        "url": "https://www.suse.com/security/cve/CVE-2022-49952/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2022-49954 page",
        "url": "https://www.suse.com/security/cve/CVE-2022-49954/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2022-49956 page",
        "url": "https://www.suse.com/security/cve/CVE-2022-49956/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2022-49957 page",
        "url": "https://www.suse.com/security/cve/CVE-2022-49957/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2022-49958 page",
        "url": "https://www.suse.com/security/cve/CVE-2022-49958/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2022-49960 page",
        "url": "https://www.suse.com/security/cve/CVE-2022-49960/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2022-49964 page",
        "url": "https://www.suse.com/security/cve/CVE-2022-49964/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2022-49966 page",
        "url": "https://www.suse.com/security/cve/CVE-2022-49966/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2022-49968 page",
        "url": "https://www.suse.com/security/cve/CVE-2022-49968/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2022-49969 page",
        "url": "https://www.suse.com/security/cve/CVE-2022-49969/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2022-49977 page",
        "url": "https://www.suse.com/security/cve/CVE-2022-49977/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2022-49978 page",
        "url": "https://www.suse.com/security/cve/CVE-2022-49978/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2022-49981 page",
        "url": "https://www.suse.com/security/cve/CVE-2022-49981/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2022-49982 page",
        "url": "https://www.suse.com/security/cve/CVE-2022-49982/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2022-49983 page",
        "url": "https://www.suse.com/security/cve/CVE-2022-49983/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2022-49984 page",
        "url": "https://www.suse.com/security/cve/CVE-2022-49984/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2022-49985 page",
        "url": "https://www.suse.com/security/cve/CVE-2022-49985/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2022-49986 page",
        "url": "https://www.suse.com/security/cve/CVE-2022-49986/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2022-49987 page",
        "url": "https://www.suse.com/security/cve/CVE-2022-49987/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2022-49989 page",
        "url": "https://www.suse.com/security/cve/CVE-2022-49989/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2022-49990 page",
        "url": "https://www.suse.com/security/cve/CVE-2022-49990/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2022-49993 page",
        "url": "https://www.suse.com/security/cve/CVE-2022-49993/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2022-49995 page",
        "url": "https://www.suse.com/security/cve/CVE-2022-49995/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2022-49999 page",
        "url": "https://www.suse.com/security/cve/CVE-2022-49999/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2022-50005 page",
        "url": "https://www.suse.com/security/cve/CVE-2022-50005/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2022-50006 page",
        "url": "https://www.suse.com/security/cve/CVE-2022-50006/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2022-50008 page",
        "url": "https://www.suse.com/security/cve/CVE-2022-50008/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2022-50010 page",
        "url": "https://www.suse.com/security/cve/CVE-2022-50010/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2022-50011 page",
        "url": "https://www.suse.com/security/cve/CVE-2022-50011/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2022-50012 page",
        "url": "https://www.suse.com/security/cve/CVE-2022-50012/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2022-50019 page",
        "url": "https://www.suse.com/security/cve/CVE-2022-50019/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2022-50020 page",
        "url": "https://www.suse.com/security/cve/CVE-2022-50020/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2022-50021 page",
        "url": "https://www.suse.com/security/cve/CVE-2022-50021/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2022-50022 page",
        "url": "https://www.suse.com/security/cve/CVE-2022-50022/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2022-50023 page",
        "url": "https://www.suse.com/security/cve/CVE-2022-50023/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2022-50024 page",
        "url": "https://www.suse.com/security/cve/CVE-2022-50024/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2022-50026 page",
        "url": "https://www.suse.com/security/cve/CVE-2022-50026/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2022-50027 page",
        "url": "https://www.suse.com/security/cve/CVE-2022-50027/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2022-50028 page",
        "url": "https://www.suse.com/security/cve/CVE-2022-50028/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2022-50029 page",
        "url": "https://www.suse.com/security/cve/CVE-2022-50029/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2022-50030 page",
        "url": "https://www.suse.com/security/cve/CVE-2022-50030/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2022-50031 page",
        "url": "https://www.suse.com/security/cve/CVE-2022-50031/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2022-50032 page",
        "url": "https://www.suse.com/security/cve/CVE-2022-50032/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2022-50033 page",
        "url": "https://www.suse.com/security/cve/CVE-2022-50033/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2022-50034 page",
        "url": "https://www.suse.com/security/cve/CVE-2022-50034/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2022-50036 page",
        "url": "https://www.suse.com/security/cve/CVE-2022-50036/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2022-50038 page",
        "url": "https://www.suse.com/security/cve/CVE-2022-50038/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2022-50039 page",
        "url": "https://www.suse.com/security/cve/CVE-2022-50039/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2022-50040 page",
        "url": "https://www.suse.com/security/cve/CVE-2022-50040/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2022-50045 page",
        "url": "https://www.suse.com/security/cve/CVE-2022-50045/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2022-50046 page",
        "url": "https://www.suse.com/security/cve/CVE-2022-50046/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2022-50047 page",
        "url": "https://www.suse.com/security/cve/CVE-2022-50047/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2022-50051 page",
        "url": "https://www.suse.com/security/cve/CVE-2022-50051/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2022-50053 page",
        "url": "https://www.suse.com/security/cve/CVE-2022-50053/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2022-50055 page",
        "url": "https://www.suse.com/security/cve/CVE-2022-50055/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2022-50059 page",
        "url": "https://www.suse.com/security/cve/CVE-2022-50059/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2022-50060 page",
        "url": "https://www.suse.com/security/cve/CVE-2022-50060/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2022-50061 page",
        "url": "https://www.suse.com/security/cve/CVE-2022-50061/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2022-50062 page",
        "url": "https://www.suse.com/security/cve/CVE-2022-50062/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2022-50065 page",
        "url": "https://www.suse.com/security/cve/CVE-2022-50065/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2022-50066 page",
        "url": "https://www.suse.com/security/cve/CVE-2022-50066/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2022-50067 page",
        "url": "https://www.suse.com/security/cve/CVE-2022-50067/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2022-50068 page",
        "url": "https://www.suse.com/security/cve/CVE-2022-50068/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2022-50072 page",
        "url": "https://www.suse.com/security/cve/CVE-2022-50072/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2022-50073 page",
        "url": "https://www.suse.com/security/cve/CVE-2022-50073/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2022-50074 page",
        "url": "https://www.suse.com/security/cve/CVE-2022-50074/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2022-50076 page",
        "url": "https://www.suse.com/security/cve/CVE-2022-50076/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2022-50077 page",
        "url": "https://www.suse.com/security/cve/CVE-2022-50077/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2022-50079 page",
        "url": "https://www.suse.com/security/cve/CVE-2022-50079/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2022-50083 page",
        "url": "https://www.suse.com/security/cve/CVE-2022-50083/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2022-50084 page",
        "url": "https://www.suse.com/security/cve/CVE-2022-50084/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2022-50085 page",
        "url": "https://www.suse.com/security/cve/CVE-2022-50085/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2022-50087 page",
        "url": "https://www.suse.com/security/cve/CVE-2022-50087/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2022-50092 page",
        "url": "https://www.suse.com/security/cve/CVE-2022-50092/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2022-50093 page",
        "url": "https://www.suse.com/security/cve/CVE-2022-50093/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2022-50094 page",
        "url": "https://www.suse.com/security/cve/CVE-2022-50094/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2022-50095 page",
        "url": "https://www.suse.com/security/cve/CVE-2022-50095/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2022-50097 page",
        "url": "https://www.suse.com/security/cve/CVE-2022-50097/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2022-50098 page",
        "url": "https://www.suse.com/security/cve/CVE-2022-50098/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2022-50099 page",
        "url": "https://www.suse.com/security/cve/CVE-2022-50099/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2022-50100 page",
        "url": "https://www.suse.com/security/cve/CVE-2022-50100/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2022-50101 page",
        "url": "https://www.suse.com/security/cve/CVE-2022-50101/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2022-50102 page",
        "url": "https://www.suse.com/security/cve/CVE-2022-50102/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2022-50103 page",
        "url": "https://www.suse.com/security/cve/CVE-2022-50103/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2022-50104 page",
        "url": "https://www.suse.com/security/cve/CVE-2022-50104/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2022-50108 page",
        "url": "https://www.suse.com/security/cve/CVE-2022-50108/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2022-50109 page",
        "url": "https://www.suse.com/security/cve/CVE-2022-50109/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2022-50110 page",
        "url": "https://www.suse.com/security/cve/CVE-2022-50110/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2022-50111 page",
        "url": "https://www.suse.com/security/cve/CVE-2022-50111/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2022-50112 page",
        "url": "https://www.suse.com/security/cve/CVE-2022-50112/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2022-50116 page",
        "url": "https://www.suse.com/security/cve/CVE-2022-50116/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2022-50118 page",
        "url": "https://www.suse.com/security/cve/CVE-2022-50118/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2022-50120 page",
        "url": "https://www.suse.com/security/cve/CVE-2022-50120/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2022-50121 page",
        "url": "https://www.suse.com/security/cve/CVE-2022-50121/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2022-50124 page",
        "url": "https://www.suse.com/security/cve/CVE-2022-50124/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2022-50125 page",
        "url": "https://www.suse.com/security/cve/CVE-2022-50125/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2022-50126 page",
        "url": "https://www.suse.com/security/cve/CVE-2022-50126/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2022-50127 page",
        "url": "https://www.suse.com/security/cve/CVE-2022-50127/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2022-50129 page",
        "url": "https://www.suse.com/security/cve/CVE-2022-50129/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2022-50131 page",
        "url": "https://www.suse.com/security/cve/CVE-2022-50131/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2022-50132 page",
        "url": "https://www.suse.com/security/cve/CVE-2022-50132/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2022-50134 page",
        "url": "https://www.suse.com/security/cve/CVE-2022-50134/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2022-50136 page",
        "url": "https://www.suse.com/security/cve/CVE-2022-50136/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2022-50137 page",
        "url": "https://www.suse.com/security/cve/CVE-2022-50137/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2022-50138 page",
        "url": "https://www.suse.com/security/cve/CVE-2022-50138/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2022-50139 page",
        "url": "https://www.suse.com/security/cve/CVE-2022-50139/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2022-50140 page",
        "url": "https://www.suse.com/security/cve/CVE-2022-50140/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2022-50141 page",
        "url": "https://www.suse.com/security/cve/CVE-2022-50141/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2022-50142 page",
        "url": "https://www.suse.com/security/cve/CVE-2022-50142/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2022-50143 page",
        "url": "https://www.suse.com/security/cve/CVE-2022-50143/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2022-50145 page",
        "url": "https://www.suse.com/security/cve/CVE-2022-50145/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2022-50146 page",
        "url": "https://www.suse.com/security/cve/CVE-2022-50146/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2022-50149 page",
        "url": "https://www.suse.com/security/cve/CVE-2022-50149/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2022-50151 page",
        "url": "https://www.suse.com/security/cve/CVE-2022-50151/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2022-50152 page",
        "url": "https://www.suse.com/security/cve/CVE-2022-50152/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2022-50153 page",
        "url": "https://www.suse.com/security/cve/CVE-2022-50153/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2022-50154 page",
        "url": "https://www.suse.com/security/cve/CVE-2022-50154/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2022-50155 page",
        "url": "https://www.suse.com/security/cve/CVE-2022-50155/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2022-50156 page",
        "url": "https://www.suse.com/security/cve/CVE-2022-50156/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2022-50157 page",
        "url": "https://www.suse.com/security/cve/CVE-2022-50157/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2022-50158 page",
        "url": "https://www.suse.com/security/cve/CVE-2022-50158/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2022-50160 page",
        "url": "https://www.suse.com/security/cve/CVE-2022-50160/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2022-50161 page",
        "url": "https://www.suse.com/security/cve/CVE-2022-50161/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2022-50162 page",
        "url": "https://www.suse.com/security/cve/CVE-2022-50162/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2022-50164 page",
        "url": "https://www.suse.com/security/cve/CVE-2022-50164/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2022-50165 page",
        "url": "https://www.suse.com/security/cve/CVE-2022-50165/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2022-50169 page",
        "url": "https://www.suse.com/security/cve/CVE-2022-50169/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2022-50171 page",
        "url": "https://www.suse.com/security/cve/CVE-2022-50171/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2022-50172 page",
        "url": "https://www.suse.com/security/cve/CVE-2022-50172/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2022-50173 page",
        "url": "https://www.suse.com/security/cve/CVE-2022-50173/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2022-50175 page",
        "url": "https://www.suse.com/security/cve/CVE-2022-50175/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2022-50176 page",
        "url": "https://www.suse.com/security/cve/CVE-2022-50176/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2022-50178 page",
        "url": "https://www.suse.com/security/cve/CVE-2022-50178/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2022-50179 page",
        "url": "https://www.suse.com/security/cve/CVE-2022-50179/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2022-50181 page",
        "url": "https://www.suse.com/security/cve/CVE-2022-50181/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2022-50185 page",
        "url": "https://www.suse.com/security/cve/CVE-2022-50185/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2022-50187 page",
        "url": "https://www.suse.com/security/cve/CVE-2022-50187/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2022-50190 page",
        "url": "https://www.suse.com/security/cve/CVE-2022-50190/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2022-50191 page",
        "url": "https://www.suse.com/security/cve/CVE-2022-50191/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2022-50192 page",
        "url": "https://www.suse.com/security/cve/CVE-2022-50192/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2022-50194 page",
        "url": "https://www.suse.com/security/cve/CVE-2022-50194/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2022-50196 page",
        "url": "https://www.suse.com/security/cve/CVE-2022-50196/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2022-50197 page",
        "url": "https://www.suse.com/security/cve/CVE-2022-50197/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2022-50198 page",
        "url": "https://www.suse.com/security/cve/CVE-2022-50198/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2022-50199 page",
        "url": "https://www.suse.com/security/cve/CVE-2022-50199/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2022-50200 page",
        "url": "https://www.suse.com/security/cve/CVE-2022-50200/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2022-50201 page",
        "url": "https://www.suse.com/security/cve/CVE-2022-50201/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2022-50202 page",
        "url": "https://www.suse.com/security/cve/CVE-2022-50202/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2022-50203 page",
        "url": "https://www.suse.com/security/cve/CVE-2022-50203/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2022-50204 page",
        "url": "https://www.suse.com/security/cve/CVE-2022-50204/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2022-50206 page",
        "url": "https://www.suse.com/security/cve/CVE-2022-50206/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2022-50207 page",
        "url": "https://www.suse.com/security/cve/CVE-2022-50207/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2022-50208 page",
        "url": "https://www.suse.com/security/cve/CVE-2022-50208/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2022-50209 page",
        "url": "https://www.suse.com/security/cve/CVE-2022-50209/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2022-50211 page",
        "url": "https://www.suse.com/security/cve/CVE-2022-50211/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2022-50212 page",
        "url": "https://www.suse.com/security/cve/CVE-2022-50212/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2022-50213 page",
        "url": "https://www.suse.com/security/cve/CVE-2022-50213/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2022-50215 page",
        "url": "https://www.suse.com/security/cve/CVE-2022-50215/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2022-50218 page",
        "url": "https://www.suse.com/security/cve/CVE-2022-50218/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2022-50220 page",
        "url": "https://www.suse.com/security/cve/CVE-2022-50220/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2022-50222 page",
        "url": "https://www.suse.com/security/cve/CVE-2022-50222/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2022-50226 page",
        "url": "https://www.suse.com/security/cve/CVE-2022-50226/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2022-50228 page",
        "url": "https://www.suse.com/security/cve/CVE-2022-50228/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2022-50229 page",
        "url": "https://www.suse.com/security/cve/CVE-2022-50229/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2022-50231 page",
        "url": "https://www.suse.com/security/cve/CVE-2022-50231/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2023-3111 page",
        "url": "https://www.suse.com/security/cve/CVE-2023-3111/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2023-52924 page",
        "url": "https://www.suse.com/security/cve/CVE-2023-52924/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2023-52925 page",
        "url": "https://www.suse.com/security/cve/CVE-2023-52925/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2023-53048 page",
        "url": "https://www.suse.com/security/cve/CVE-2023-53048/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2023-53076 page",
        "url": "https://www.suse.com/security/cve/CVE-2023-53076/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2023-53097 page",
        "url": "https://www.suse.com/security/cve/CVE-2023-53097/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2024-26808 page",
        "url": "https://www.suse.com/security/cve/CVE-2024-26808/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2024-26924 page",
        "url": "https://www.suse.com/security/cve/CVE-2024-26924/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2024-26935 page",
        "url": "https://www.suse.com/security/cve/CVE-2024-26935/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2024-27397 page",
        "url": "https://www.suse.com/security/cve/CVE-2024-27397/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2024-35840 page",
        "url": "https://www.suse.com/security/cve/CVE-2024-35840/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2024-36978 page",
        "url": "https://www.suse.com/security/cve/CVE-2024-36978/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2024-46800 page",
        "url": "https://www.suse.com/security/cve/CVE-2024-46800/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2024-53057 page",
        "url": "https://www.suse.com/security/cve/CVE-2024-53057/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2024-53125 page",
        "url": "https://www.suse.com/security/cve/CVE-2024-53125/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2024-53141 page",
        "url": "https://www.suse.com/security/cve/CVE-2024-53141/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2024-56770 page",
        "url": "https://www.suse.com/security/cve/CVE-2024-56770/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2024-57947 page",
        "url": "https://www.suse.com/security/cve/CVE-2024-57947/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2024-57999 page",
        "url": "https://www.suse.com/security/cve/CVE-2024-57999/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2025-21700 page",
        "url": "https://www.suse.com/security/cve/CVE-2025-21700/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2025-21702 page",
        "url": "https://www.suse.com/security/cve/CVE-2025-21702/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2025-21703 page",
        "url": "https://www.suse.com/security/cve/CVE-2025-21703/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2025-21756 page",
        "url": "https://www.suse.com/security/cve/CVE-2025-21756/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2025-23141 page",
        "url": "https://www.suse.com/security/cve/CVE-2025-23141/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2025-23145 page",
        "url": "https://www.suse.com/security/cve/CVE-2025-23145/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2025-37752 page",
        "url": "https://www.suse.com/security/cve/CVE-2025-37752/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2025-37797 page",
        "url": "https://www.suse.com/security/cve/CVE-2025-37797/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2025-37798 page",
        "url": "https://www.suse.com/security/cve/CVE-2025-37798/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2025-37823 page",
        "url": "https://www.suse.com/security/cve/CVE-2025-37823/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2025-37890 page",
        "url": "https://www.suse.com/security/cve/CVE-2025-37890/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2025-37932 page",
        "url": "https://www.suse.com/security/cve/CVE-2025-37932/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2025-37953 page",
        "url": "https://www.suse.com/security/cve/CVE-2025-37953/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2025-37997 page",
        "url": "https://www.suse.com/security/cve/CVE-2025-37997/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2025-38000 page",
        "url": "https://www.suse.com/security/cve/CVE-2025-38000/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2025-38001 page",
        "url": "https://www.suse.com/security/cve/CVE-2025-38001/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2025-38014 page",
        "url": "https://www.suse.com/security/cve/CVE-2025-38014/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2025-38083 page",
        "url": "https://www.suse.com/security/cve/CVE-2025-38083/"
      }
    ],
    "title": "Security update for the Linux Kernel",
    "tracking": {
      "current_release_date": "2025-07-28T15:09:33Z",
      "generator": {
        "date": "2025-07-28T15:09:33Z",
        "engine": {
          "name": "cve-database.git:bin/generate-csaf.pl",
          "version": "1"
        }
      },
      "id": "SUSE-SU-2025:02537-1",
      "initial_release_date": "2025-07-28T15:09:33Z",
      "revision_history": [
        {
          "date": "2025-07-28T15:09:33Z",
          "number": "1",
          "summary": "Current version"
        }
      ],
      "status": "final",
      "version": "1"
    }
  },
  "product_tree": {
    "branches": [
      {
        "branches": [
          {
            "branches": [
              {
                "category": "product_version",
                "name": "cluster-md-kmp-64kb-5.14.21-150400.24.170.2.aarch64",
                "product": {
                  "name": "cluster-md-kmp-64kb-5.14.21-150400.24.170.2.aarch64",
                  "product_id": "cluster-md-kmp-64kb-5.14.21-150400.24.170.2.aarch64"
                }
              },
              {
                "category": "product_version",
                "name": "cluster-md-kmp-default-5.14.21-150400.24.170.2.aarch64",
                "product": {
                  "name": "cluster-md-kmp-default-5.14.21-150400.24.170.2.aarch64",
                  "product_id": "cluster-md-kmp-default-5.14.21-150400.24.170.2.aarch64"
                }
              },
              {
                "category": "product_version",
                "name": "dlm-kmp-64kb-5.14.21-150400.24.170.2.aarch64",
                "product": {
                  "name": "dlm-kmp-64kb-5.14.21-150400.24.170.2.aarch64",
                  "product_id": "dlm-kmp-64kb-5.14.21-150400.24.170.2.aarch64"
                }
              },
              {
                "category": "product_version",
                "name": "dlm-kmp-default-5.14.21-150400.24.170.2.aarch64",
                "product": {
                  "name": "dlm-kmp-default-5.14.21-150400.24.170.2.aarch64",
                  "product_id": "dlm-kmp-default-5.14.21-150400.24.170.2.aarch64"
                }
              },
              {
                "category": "product_version",
                "name": "dtb-allwinner-5.14.21-150400.24.170.1.aarch64",
                "product": {
                  "name": "dtb-allwinner-5.14.21-150400.24.170.1.aarch64",
                  "product_id": "dtb-allwinner-5.14.21-150400.24.170.1.aarch64"
                }
              },
              {
                "category": "product_version",
                "name": "dtb-altera-5.14.21-150400.24.170.1.aarch64",
                "product": {
                  "name": "dtb-altera-5.14.21-150400.24.170.1.aarch64",
                  "product_id": "dtb-altera-5.14.21-150400.24.170.1.aarch64"
                }
              },
              {
                "category": "product_version",
                "name": "dtb-amazon-5.14.21-150400.24.170.1.aarch64",
                "product": {
                  "name": "dtb-amazon-5.14.21-150400.24.170.1.aarch64",
                  "product_id": "dtb-amazon-5.14.21-150400.24.170.1.aarch64"
                }
              },
              {
                "category": "product_version",
                "name": "dtb-amd-5.14.21-150400.24.170.1.aarch64",
                "product": {
                  "name": "dtb-amd-5.14.21-150400.24.170.1.aarch64",
                  "product_id": "dtb-amd-5.14.21-150400.24.170.1.aarch64"
                }
              },
              {
                "category": "product_version",
                "name": "dtb-amlogic-5.14.21-150400.24.170.1.aarch64",
                "product": {
                  "name": "dtb-amlogic-5.14.21-150400.24.170.1.aarch64",
                  "product_id": "dtb-amlogic-5.14.21-150400.24.170.1.aarch64"
                }
              },
              {
                "category": "product_version",
                "name": "dtb-apm-5.14.21-150400.24.170.1.aarch64",
                "product": {
                  "name": "dtb-apm-5.14.21-150400.24.170.1.aarch64",
                  "product_id": "dtb-apm-5.14.21-150400.24.170.1.aarch64"
                }
              },
              {
                "category": "product_version",
                "name": "dtb-apple-5.14.21-150400.24.170.1.aarch64",
                "product": {
                  "name": "dtb-apple-5.14.21-150400.24.170.1.aarch64",
                  "product_id": "dtb-apple-5.14.21-150400.24.170.1.aarch64"
                }
              },
              {
                "category": "product_version",
                "name": "dtb-arm-5.14.21-150400.24.170.1.aarch64",
                "product": {
                  "name": "dtb-arm-5.14.21-150400.24.170.1.aarch64",
                  "product_id": "dtb-arm-5.14.21-150400.24.170.1.aarch64"
                }
              },
              {
                "category": "product_version",
                "name": "dtb-broadcom-5.14.21-150400.24.170.1.aarch64",
                "product": {
                  "name": "dtb-broadcom-5.14.21-150400.24.170.1.aarch64",
                  "product_id": "dtb-broadcom-5.14.21-150400.24.170.1.aarch64"
                }
              },
              {
                "category": "product_version",
                "name": "dtb-cavium-5.14.21-150400.24.170.1.aarch64",
                "product": {
                  "name": "dtb-cavium-5.14.21-150400.24.170.1.aarch64",
                  "product_id": "dtb-cavium-5.14.21-150400.24.170.1.aarch64"
                }
              },
              {
                "category": "product_version",
                "name": "dtb-exynos-5.14.21-150400.24.170.1.aarch64",
                "product": {
                  "name": "dtb-exynos-5.14.21-150400.24.170.1.aarch64",
                  "product_id": "dtb-exynos-5.14.21-150400.24.170.1.aarch64"
                }
              },
              {
                "category": "product_version",
                "name": "dtb-freescale-5.14.21-150400.24.170.1.aarch64",
                "product": {
                  "name": "dtb-freescale-5.14.21-150400.24.170.1.aarch64",
                  "product_id": "dtb-freescale-5.14.21-150400.24.170.1.aarch64"
                }
              },
              {
                "category": "product_version",
                "name": "dtb-hisilicon-5.14.21-150400.24.170.1.aarch64",
                "product": {
                  "name": "dtb-hisilicon-5.14.21-150400.24.170.1.aarch64",
                  "product_id": "dtb-hisilicon-5.14.21-150400.24.170.1.aarch64"
                }
              },
              {
                "category": "product_version",
                "name": "dtb-lg-5.14.21-150400.24.170.1.aarch64",
                "product": {
                  "name": "dtb-lg-5.14.21-150400.24.170.1.aarch64",
                  "product_id": "dtb-lg-5.14.21-150400.24.170.1.aarch64"
                }
              },
              {
                "category": "product_version",
                "name": "dtb-marvell-5.14.21-150400.24.170.1.aarch64",
                "product": {
                  "name": "dtb-marvell-5.14.21-150400.24.170.1.aarch64",
                  "product_id": "dtb-marvell-5.14.21-150400.24.170.1.aarch64"
                }
              },
              {
                "category": "product_version",
                "name": "dtb-mediatek-5.14.21-150400.24.170.1.aarch64",
                "product": {
                  "name": "dtb-mediatek-5.14.21-150400.24.170.1.aarch64",
                  "product_id": "dtb-mediatek-5.14.21-150400.24.170.1.aarch64"
                }
              },
              {
                "category": "product_version",
                "name": "dtb-nvidia-5.14.21-150400.24.170.1.aarch64",
                "product": {
                  "name": "dtb-nvidia-5.14.21-150400.24.170.1.aarch64",
                  "product_id": "dtb-nvidia-5.14.21-150400.24.170.1.aarch64"
                }
              },
              {
                "category": "product_version",
                "name": "dtb-qcom-5.14.21-150400.24.170.1.aarch64",
                "product": {
                  "name": "dtb-qcom-5.14.21-150400.24.170.1.aarch64",
                  "product_id": "dtb-qcom-5.14.21-150400.24.170.1.aarch64"
                }
              },
              {
                "category": "product_version",
                "name": "dtb-renesas-5.14.21-150400.24.170.1.aarch64",
                "product": {
                  "name": "dtb-renesas-5.14.21-150400.24.170.1.aarch64",
                  "product_id": "dtb-renesas-5.14.21-150400.24.170.1.aarch64"
                }
              },
              {
                "category": "product_version",
                "name": "dtb-rockchip-5.14.21-150400.24.170.1.aarch64",
                "product": {
                  "name": "dtb-rockchip-5.14.21-150400.24.170.1.aarch64",
                  "product_id": "dtb-rockchip-5.14.21-150400.24.170.1.aarch64"
                }
              },
              {
                "category": "product_version",
                "name": "dtb-socionext-5.14.21-150400.24.170.1.aarch64",
                "product": {
                  "name": "dtb-socionext-5.14.21-150400.24.170.1.aarch64",
                  "product_id": "dtb-socionext-5.14.21-150400.24.170.1.aarch64"
                }
              },
              {
                "category": "product_version",
                "name": "dtb-sprd-5.14.21-150400.24.170.1.aarch64",
                "product": {
                  "name": "dtb-sprd-5.14.21-150400.24.170.1.aarch64",
                  "product_id": "dtb-sprd-5.14.21-150400.24.170.1.aarch64"
                }
              },
              {
                "category": "product_version",
                "name": "dtb-xilinx-5.14.21-150400.24.170.1.aarch64",
                "product": {
                  "name": "dtb-xilinx-5.14.21-150400.24.170.1.aarch64",
                  "product_id": "dtb-xilinx-5.14.21-150400.24.170.1.aarch64"
                }
              },
              {
                "category": "product_version",
                "name": "gfs2-kmp-64kb-5.14.21-150400.24.170.2.aarch64",
                "product": {
                  "name": "gfs2-kmp-64kb-5.14.21-150400.24.170.2.aarch64",
                  "product_id": "gfs2-kmp-64kb-5.14.21-150400.24.170.2.aarch64"
                }
              },
              {
                "category": "product_version",
                "name": "gfs2-kmp-default-5.14.21-150400.24.170.2.aarch64",
                "product": {
                  "name": "gfs2-kmp-default-5.14.21-150400.24.170.2.aarch64",
                  "product_id": "gfs2-kmp-default-5.14.21-150400.24.170.2.aarch64"
                }
              },
              {
                "category": "product_version",
                "name": "kernel-64kb-5.14.21-150400.24.170.2.aarch64",
                "product": {
                  "name": "kernel-64kb-5.14.21-150400.24.170.2.aarch64",
                  "product_id": "kernel-64kb-5.14.21-150400.24.170.2.aarch64"
                }
              },
              {
                "category": "product_version",
                "name": "kernel-64kb-devel-5.14.21-150400.24.170.2.aarch64",
                "product": {
                  "name": "kernel-64kb-devel-5.14.21-150400.24.170.2.aarch64",
                  "product_id": "kernel-64kb-devel-5.14.21-150400.24.170.2.aarch64"
                }
              },
              {
                "category": "product_version",
                "name": "kernel-64kb-extra-5.14.21-150400.24.170.2.aarch64",
                "product": {
                  "name": "kernel-64kb-extra-5.14.21-150400.24.170.2.aarch64",
                  "product_id": "kernel-64kb-extra-5.14.21-150400.24.170.2.aarch64"
                }
              },
              {
                "category": "product_version",
                "name": "kernel-64kb-optional-5.14.21-150400.24.170.2.aarch64",
                "product": {
                  "name": "kernel-64kb-optional-5.14.21-150400.24.170.2.aarch64",
                  "product_id": "kernel-64kb-optional-5.14.21-150400.24.170.2.aarch64"
                }
              },
              {
                "category": "product_version",
                "name": "kernel-default-5.14.21-150400.24.170.2.aarch64",
                "product": {
                  "name": "kernel-default-5.14.21-150400.24.170.2.aarch64",
                  "product_id": "kernel-default-5.14.21-150400.24.170.2.aarch64"
                }
              },
              {
                "category": "product_version",
                "name": "kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.aarch64",
                "product": {
                  "name": "kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.aarch64",
                  "product_id": "kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.aarch64"
                }
              },
              {
                "category": "product_version",
                "name": "kernel-default-base-rebuild-5.14.21-150400.24.170.2.150400.24.86.2.aarch64",
                "product": {
                  "name": "kernel-default-base-rebuild-5.14.21-150400.24.170.2.150400.24.86.2.aarch64",
                  "product_id": "kernel-default-base-rebuild-5.14.21-150400.24.170.2.150400.24.86.2.aarch64"
                }
              },
              {
                "category": "product_version",
                "name": "kernel-default-devel-5.14.21-150400.24.170.2.aarch64",
                "product": {
                  "name": "kernel-default-devel-5.14.21-150400.24.170.2.aarch64",
                  "product_id": "kernel-default-devel-5.14.21-150400.24.170.2.aarch64"
                }
              },
              {
                "category": "product_version",
                "name": "kernel-default-extra-5.14.21-150400.24.170.2.aarch64",
                "product": {
                  "name": "kernel-default-extra-5.14.21-150400.24.170.2.aarch64",
                  "product_id": "kernel-default-extra-5.14.21-150400.24.170.2.aarch64"
                }
              },
              {
                "category": "product_version",
                "name": "kernel-default-livepatch-5.14.21-150400.24.170.2.aarch64",
                "product": {
                  "name": "kernel-default-livepatch-5.14.21-150400.24.170.2.aarch64",
                  "product_id": "kernel-default-livepatch-5.14.21-150400.24.170.2.aarch64"
                }
              },
              {
                "category": "product_version",
                "name": "kernel-default-optional-5.14.21-150400.24.170.2.aarch64",
                "product": {
                  "name": "kernel-default-optional-5.14.21-150400.24.170.2.aarch64",
                  "product_id": "kernel-default-optional-5.14.21-150400.24.170.2.aarch64"
                }
              },
              {
                "category": "product_version",
                "name": "kernel-kvmsmall-5.14.21-150400.24.170.2.aarch64",
                "product": {
                  "name": "kernel-kvmsmall-5.14.21-150400.24.170.2.aarch64",
                  "product_id": "kernel-kvmsmall-5.14.21-150400.24.170.2.aarch64"
                }
              },
              {
                "category": "product_version",
                "name": "kernel-kvmsmall-devel-5.14.21-150400.24.170.2.aarch64",
                "product": {
                  "name": "kernel-kvmsmall-devel-5.14.21-150400.24.170.2.aarch64",
                  "product_id": "kernel-kvmsmall-devel-5.14.21-150400.24.170.2.aarch64"
                }
              },
              {
                "category": "product_version",
                "name": "kernel-obs-build-5.14.21-150400.24.170.2.aarch64",
                "product": {
                  "name": "kernel-obs-build-5.14.21-150400.24.170.2.aarch64",
                  "product_id": "kernel-obs-build-5.14.21-150400.24.170.2.aarch64"
                }
              },
              {
                "category": "product_version",
                "name": "kernel-obs-qa-5.14.21-150400.24.170.1.aarch64",
                "product": {
                  "name": "kernel-obs-qa-5.14.21-150400.24.170.1.aarch64",
                  "product_id": "kernel-obs-qa-5.14.21-150400.24.170.1.aarch64"
                }
              },
              {
                "category": "product_version",
                "name": "kernel-syms-5.14.21-150400.24.170.1.aarch64",
                "product": {
                  "name": "kernel-syms-5.14.21-150400.24.170.1.aarch64",
                  "product_id": "kernel-syms-5.14.21-150400.24.170.1.aarch64"
                }
              },
              {
                "category": "product_version",
                "name": "kselftests-kmp-64kb-5.14.21-150400.24.170.2.aarch64",
                "product": {
                  "name": "kselftests-kmp-64kb-5.14.21-150400.24.170.2.aarch64",
                  "product_id": "kselftests-kmp-64kb-5.14.21-150400.24.170.2.aarch64"
                }
              },
              {
                "category": "product_version",
                "name": "kselftests-kmp-default-5.14.21-150400.24.170.2.aarch64",
                "product": {
                  "name": "kselftests-kmp-default-5.14.21-150400.24.170.2.aarch64",
                  "product_id": "kselftests-kmp-default-5.14.21-150400.24.170.2.aarch64"
                }
              },
              {
                "category": "product_version",
                "name": "ocfs2-kmp-64kb-5.14.21-150400.24.170.2.aarch64",
                "product": {
                  "name": "ocfs2-kmp-64kb-5.14.21-150400.24.170.2.aarch64",
                  "product_id": "ocfs2-kmp-64kb-5.14.21-150400.24.170.2.aarch64"
                }
              },
              {
                "category": "product_version",
                "name": "ocfs2-kmp-default-5.14.21-150400.24.170.2.aarch64",
                "product": {
                  "name": "ocfs2-kmp-default-5.14.21-150400.24.170.2.aarch64",
                  "product_id": "ocfs2-kmp-default-5.14.21-150400.24.170.2.aarch64"
                }
              },
              {
                "category": "product_version",
                "name": "reiserfs-kmp-64kb-5.14.21-150400.24.170.2.aarch64",
                "product": {
                  "name": "reiserfs-kmp-64kb-5.14.21-150400.24.170.2.aarch64",
                  "product_id": "reiserfs-kmp-64kb-5.14.21-150400.24.170.2.aarch64"
                }
              },
              {
                "category": "product_version",
                "name": "reiserfs-kmp-default-5.14.21-150400.24.170.2.aarch64",
                "product": {
                  "name": "reiserfs-kmp-default-5.14.21-150400.24.170.2.aarch64",
                  "product_id": "reiserfs-kmp-default-5.14.21-150400.24.170.2.aarch64"
                }
              }
            ],
            "category": "architecture",
            "name": "aarch64"
          },
          {
            "branches": [
              {
                "category": "product_version",
                "name": "kernel-devel-5.14.21-150400.24.170.1.noarch",
                "product": {
                  "name": "kernel-devel-5.14.21-150400.24.170.1.noarch",
                  "product_id": "kernel-devel-5.14.21-150400.24.170.1.noarch"
                }
              },
              {
                "category": "product_version",
                "name": "kernel-docs-5.14.21-150400.24.170.1.noarch",
                "product": {
                  "name": "kernel-docs-5.14.21-150400.24.170.1.noarch",
                  "product_id": "kernel-docs-5.14.21-150400.24.170.1.noarch"
                }
              },
              {
                "category": "product_version",
                "name": "kernel-docs-html-5.14.21-150400.24.170.1.noarch",
                "product": {
                  "name": "kernel-docs-html-5.14.21-150400.24.170.1.noarch",
                  "product_id": "kernel-docs-html-5.14.21-150400.24.170.1.noarch"
                }
              },
              {
                "category": "product_version",
                "name": "kernel-macros-5.14.21-150400.24.170.1.noarch",
                "product": {
                  "name": "kernel-macros-5.14.21-150400.24.170.1.noarch",
                  "product_id": "kernel-macros-5.14.21-150400.24.170.1.noarch"
                }
              },
              {
                "category": "product_version",
                "name": "kernel-source-5.14.21-150400.24.170.1.noarch",
                "product": {
                  "name": "kernel-source-5.14.21-150400.24.170.1.noarch",
                  "product_id": "kernel-source-5.14.21-150400.24.170.1.noarch"
                }
              },
              {
                "category": "product_version",
                "name": "kernel-source-vanilla-5.14.21-150400.24.170.1.noarch",
                "product": {
                  "name": "kernel-source-vanilla-5.14.21-150400.24.170.1.noarch",
                  "product_id": "kernel-source-vanilla-5.14.21-150400.24.170.1.noarch"
                }
              }
            ],
            "category": "architecture",
            "name": "noarch"
          },
          {
            "branches": [
              {
                "category": "product_version",
                "name": "cluster-md-kmp-default-5.14.21-150400.24.170.2.ppc64le",
                "product": {
                  "name": "cluster-md-kmp-default-5.14.21-150400.24.170.2.ppc64le",
                  "product_id": "cluster-md-kmp-default-5.14.21-150400.24.170.2.ppc64le"
                }
              },
              {
                "category": "product_version",
                "name": "dlm-kmp-default-5.14.21-150400.24.170.2.ppc64le",
                "product": {
                  "name": "dlm-kmp-default-5.14.21-150400.24.170.2.ppc64le",
                  "product_id": "dlm-kmp-default-5.14.21-150400.24.170.2.ppc64le"
                }
              },
              {
                "category": "product_version",
                "name": "gfs2-kmp-default-5.14.21-150400.24.170.2.ppc64le",
                "product": {
                  "name": "gfs2-kmp-default-5.14.21-150400.24.170.2.ppc64le",
                  "product_id": "gfs2-kmp-default-5.14.21-150400.24.170.2.ppc64le"
                }
              },
              {
                "category": "product_version",
                "name": "kernel-default-5.14.21-150400.24.170.2.ppc64le",
                "product": {
                  "name": "kernel-default-5.14.21-150400.24.170.2.ppc64le",
                  "product_id": "kernel-default-5.14.21-150400.24.170.2.ppc64le"
                }
              },
              {
                "category": "product_version",
                "name": "kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.ppc64le",
                "product": {
                  "name": "kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.ppc64le",
                  "product_id": "kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.ppc64le"
                }
              },
              {
                "category": "product_version",
                "name": "kernel-default-base-rebuild-5.14.21-150400.24.170.2.150400.24.86.2.ppc64le",
                "product": {
                  "name": "kernel-default-base-rebuild-5.14.21-150400.24.170.2.150400.24.86.2.ppc64le",
                  "product_id": "kernel-default-base-rebuild-5.14.21-150400.24.170.2.150400.24.86.2.ppc64le"
                }
              },
              {
                "category": "product_version",
                "name": "kernel-default-devel-5.14.21-150400.24.170.2.ppc64le",
                "product": {
                  "name": "kernel-default-devel-5.14.21-150400.24.170.2.ppc64le",
                  "product_id": "kernel-default-devel-5.14.21-150400.24.170.2.ppc64le"
                }
              },
              {
                "category": "product_version",
                "name": "kernel-default-extra-5.14.21-150400.24.170.2.ppc64le",
                "product": {
                  "name": "kernel-default-extra-5.14.21-150400.24.170.2.ppc64le",
                  "product_id": "kernel-default-extra-5.14.21-150400.24.170.2.ppc64le"
                }
              },
              {
                "category": "product_version",
                "name": "kernel-default-livepatch-5.14.21-150400.24.170.2.ppc64le",
                "product": {
                  "name": "kernel-default-livepatch-5.14.21-150400.24.170.2.ppc64le",
                  "product_id": "kernel-default-livepatch-5.14.21-150400.24.170.2.ppc64le"
                }
              },
              {
                "category": "product_version",
                "name": "kernel-default-livepatch-devel-5.14.21-150400.24.170.2.ppc64le",
                "product": {
                  "name": "kernel-default-livepatch-devel-5.14.21-150400.24.170.2.ppc64le",
                  "product_id": "kernel-default-livepatch-devel-5.14.21-150400.24.170.2.ppc64le"
                }
              },
              {
                "category": "product_version",
                "name": "kernel-default-optional-5.14.21-150400.24.170.2.ppc64le",
                "product": {
                  "name": "kernel-default-optional-5.14.21-150400.24.170.2.ppc64le",
                  "product_id": "kernel-default-optional-5.14.21-150400.24.170.2.ppc64le"
                }
              },
              {
                "category": "product_version",
                "name": "kernel-kvmsmall-5.14.21-150400.24.170.2.ppc64le",
                "product": {
                  "name": "kernel-kvmsmall-5.14.21-150400.24.170.2.ppc64le",
                  "product_id": "kernel-kvmsmall-5.14.21-150400.24.170.2.ppc64le"
                }
              },
              {
                "category": "product_version",
                "name": "kernel-kvmsmall-devel-5.14.21-150400.24.170.2.ppc64le",
                "product": {
                  "name": "kernel-kvmsmall-devel-5.14.21-150400.24.170.2.ppc64le",
                  "product_id": "kernel-kvmsmall-devel-5.14.21-150400.24.170.2.ppc64le"
                }
              },
              {
                "category": "product_version",
                "name": "kernel-livepatch-5_14_21-150400_24_170-default-1-150400.9.3.2.ppc64le",
                "product": {
                  "name": "kernel-livepatch-5_14_21-150400_24_170-default-1-150400.9.3.2.ppc64le",
                  "product_id": "kernel-livepatch-5_14_21-150400_24_170-default-1-150400.9.3.2.ppc64le"
                }
              },
              {
                "category": "product_version",
                "name": "kernel-obs-build-5.14.21-150400.24.170.2.ppc64le",
                "product": {
                  "name": "kernel-obs-build-5.14.21-150400.24.170.2.ppc64le",
                  "product_id": "kernel-obs-build-5.14.21-150400.24.170.2.ppc64le"
                }
              },
              {
                "category": "product_version",
                "name": "kernel-obs-qa-5.14.21-150400.24.170.1.ppc64le",
                "product": {
                  "name": "kernel-obs-qa-5.14.21-150400.24.170.1.ppc64le",
                  "product_id": "kernel-obs-qa-5.14.21-150400.24.170.1.ppc64le"
                }
              },
              {
                "category": "product_version",
                "name": "kernel-syms-5.14.21-150400.24.170.1.ppc64le",
                "product": {
                  "name": "kernel-syms-5.14.21-150400.24.170.1.ppc64le",
                  "product_id": "kernel-syms-5.14.21-150400.24.170.1.ppc64le"
                }
              },
              {
                "category": "product_version",
                "name": "kselftests-kmp-default-5.14.21-150400.24.170.2.ppc64le",
                "product": {
                  "name": "kselftests-kmp-default-5.14.21-150400.24.170.2.ppc64le",
                  "product_id": "kselftests-kmp-default-5.14.21-150400.24.170.2.ppc64le"
                }
              },
              {
                "category": "product_version",
                "name": "ocfs2-kmp-default-5.14.21-150400.24.170.2.ppc64le",
                "product": {
                  "name": "ocfs2-kmp-default-5.14.21-150400.24.170.2.ppc64le",
                  "product_id": "ocfs2-kmp-default-5.14.21-150400.24.170.2.ppc64le"
                }
              },
              {
                "category": "product_version",
                "name": "reiserfs-kmp-default-5.14.21-150400.24.170.2.ppc64le",
                "product": {
                  "name": "reiserfs-kmp-default-5.14.21-150400.24.170.2.ppc64le",
                  "product_id": "reiserfs-kmp-default-5.14.21-150400.24.170.2.ppc64le"
                }
              }
            ],
            "category": "architecture",
            "name": "ppc64le"
          },
          {
            "branches": [
              {
                "category": "product_version",
                "name": "cluster-md-kmp-default-5.14.21-150400.24.170.2.s390x",
                "product": {
                  "name": "cluster-md-kmp-default-5.14.21-150400.24.170.2.s390x",
                  "product_id": "cluster-md-kmp-default-5.14.21-150400.24.170.2.s390x"
                }
              },
              {
                "category": "product_version",
                "name": "dlm-kmp-default-5.14.21-150400.24.170.2.s390x",
                "product": {
                  "name": "dlm-kmp-default-5.14.21-150400.24.170.2.s390x",
                  "product_id": "dlm-kmp-default-5.14.21-150400.24.170.2.s390x"
                }
              },
              {
                "category": "product_version",
                "name": "gfs2-kmp-default-5.14.21-150400.24.170.2.s390x",
                "product": {
                  "name": "gfs2-kmp-default-5.14.21-150400.24.170.2.s390x",
                  "product_id": "gfs2-kmp-default-5.14.21-150400.24.170.2.s390x"
                }
              },
              {
                "category": "product_version",
                "name": "kernel-default-5.14.21-150400.24.170.2.s390x",
                "product": {
                  "name": "kernel-default-5.14.21-150400.24.170.2.s390x",
                  "product_id": "kernel-default-5.14.21-150400.24.170.2.s390x"
                }
              },
              {
                "category": "product_version",
                "name": "kernel-default-devel-5.14.21-150400.24.170.2.s390x",
                "product": {
                  "name": "kernel-default-devel-5.14.21-150400.24.170.2.s390x",
                  "product_id": "kernel-default-devel-5.14.21-150400.24.170.2.s390x"
                }
              },
              {
                "category": "product_version",
                "name": "kernel-default-extra-5.14.21-150400.24.170.2.s390x",
                "product": {
                  "name": "kernel-default-extra-5.14.21-150400.24.170.2.s390x",
                  "product_id": "kernel-default-extra-5.14.21-150400.24.170.2.s390x"
                }
              },
              {
                "category": "product_version",
                "name": "kernel-default-livepatch-5.14.21-150400.24.170.2.s390x",
                "product": {
                  "name": "kernel-default-livepatch-5.14.21-150400.24.170.2.s390x",
                  "product_id": "kernel-default-livepatch-5.14.21-150400.24.170.2.s390x"
                }
              },
              {
                "category": "product_version",
                "name": "kernel-default-livepatch-devel-5.14.21-150400.24.170.2.s390x",
                "product": {
                  "name": "kernel-default-livepatch-devel-5.14.21-150400.24.170.2.s390x",
                  "product_id": "kernel-default-livepatch-devel-5.14.21-150400.24.170.2.s390x"
                }
              },
              {
                "category": "product_version",
                "name": "kernel-default-optional-5.14.21-150400.24.170.2.s390x",
                "product": {
                  "name": "kernel-default-optional-5.14.21-150400.24.170.2.s390x",
                  "product_id": "kernel-default-optional-5.14.21-150400.24.170.2.s390x"
                }
              },
              {
                "category": "product_version",
                "name": "kernel-livepatch-5_14_21-150400_24_170-default-1-150400.9.3.2.s390x",
                "product": {
                  "name": "kernel-livepatch-5_14_21-150400_24_170-default-1-150400.9.3.2.s390x",
                  "product_id": "kernel-livepatch-5_14_21-150400_24_170-default-1-150400.9.3.2.s390x"
                }
              },
              {
                "category": "product_version",
                "name": "kernel-obs-build-5.14.21-150400.24.170.2.s390x",
                "product": {
                  "name": "kernel-obs-build-5.14.21-150400.24.170.2.s390x",
                  "product_id": "kernel-obs-build-5.14.21-150400.24.170.2.s390x"
                }
              },
              {
                "category": "product_version",
                "name": "kernel-obs-qa-5.14.21-150400.24.170.1.s390x",
                "product": {
                  "name": "kernel-obs-qa-5.14.21-150400.24.170.1.s390x",
                  "product_id": "kernel-obs-qa-5.14.21-150400.24.170.1.s390x"
                }
              },
              {
                "category": "product_version",
                "name": "kernel-syms-5.14.21-150400.24.170.1.s390x",
                "product": {
                  "name": "kernel-syms-5.14.21-150400.24.170.1.s390x",
                  "product_id": "kernel-syms-5.14.21-150400.24.170.1.s390x"
                }
              },
              {
                "category": "product_version",
                "name": "kernel-zfcpdump-5.14.21-150400.24.170.2.s390x",
                "product": {
                  "name": "kernel-zfcpdump-5.14.21-150400.24.170.2.s390x",
                  "product_id": "kernel-zfcpdump-5.14.21-150400.24.170.2.s390x"
                }
              },
              {
                "category": "product_version",
                "name": "kselftests-kmp-default-5.14.21-150400.24.170.2.s390x",
                "product": {
                  "name": "kselftests-kmp-default-5.14.21-150400.24.170.2.s390x",
                  "product_id": "kselftests-kmp-default-5.14.21-150400.24.170.2.s390x"
                }
              },
              {
                "category": "product_version",
                "name": "ocfs2-kmp-default-5.14.21-150400.24.170.2.s390x",
                "product": {
                  "name": "ocfs2-kmp-default-5.14.21-150400.24.170.2.s390x",
                  "product_id": "ocfs2-kmp-default-5.14.21-150400.24.170.2.s390x"
                }
              },
              {
                "category": "product_version",
                "name": "reiserfs-kmp-default-5.14.21-150400.24.170.2.s390x",
                "product": {
                  "name": "reiserfs-kmp-default-5.14.21-150400.24.170.2.s390x",
                  "product_id": "reiserfs-kmp-default-5.14.21-150400.24.170.2.s390x"
                }
              }
            ],
            "category": "architecture",
            "name": "s390x"
          },
          {
            "branches": [
              {
                "category": "product_version",
                "name": "cluster-md-kmp-default-5.14.21-150400.24.170.2.x86_64",
                "product": {
                  "name": "cluster-md-kmp-default-5.14.21-150400.24.170.2.x86_64",
                  "product_id": "cluster-md-kmp-default-5.14.21-150400.24.170.2.x86_64"
                }
              },
              {
                "category": "product_version",
                "name": "dlm-kmp-default-5.14.21-150400.24.170.2.x86_64",
                "product": {
                  "name": "dlm-kmp-default-5.14.21-150400.24.170.2.x86_64",
                  "product_id": "dlm-kmp-default-5.14.21-150400.24.170.2.x86_64"
                }
              },
              {
                "category": "product_version",
                "name": "gfs2-kmp-default-5.14.21-150400.24.170.2.x86_64",
                "product": {
                  "name": "gfs2-kmp-default-5.14.21-150400.24.170.2.x86_64",
                  "product_id": "gfs2-kmp-default-5.14.21-150400.24.170.2.x86_64"
                }
              },
              {
                "category": "product_version",
                "name": "kernel-default-5.14.21-150400.24.170.2.x86_64",
                "product": {
                  "name": "kernel-default-5.14.21-150400.24.170.2.x86_64",
                  "product_id": "kernel-default-5.14.21-150400.24.170.2.x86_64"
                }
              },
              {
                "category": "product_version",
                "name": "kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
                "product": {
                  "name": "kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
                  "product_id": "kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64"
                }
              },
              {
                "category": "product_version",
                "name": "kernel-default-base-rebuild-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
                "product": {
                  "name": "kernel-default-base-rebuild-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
                  "product_id": "kernel-default-base-rebuild-5.14.21-150400.24.170.2.150400.24.86.2.x86_64"
                }
              },
              {
                "category": "product_version",
                "name": "kernel-default-devel-5.14.21-150400.24.170.2.x86_64",
                "product": {
                  "name": "kernel-default-devel-5.14.21-150400.24.170.2.x86_64",
                  "product_id": "kernel-default-devel-5.14.21-150400.24.170.2.x86_64"
                }
              },
              {
                "category": "product_version",
                "name": "kernel-default-extra-5.14.21-150400.24.170.2.x86_64",
                "product": {
                  "name": "kernel-default-extra-5.14.21-150400.24.170.2.x86_64",
                  "product_id": "kernel-default-extra-5.14.21-150400.24.170.2.x86_64"
                }
              },
              {
                "category": "product_version",
                "name": "kernel-default-livepatch-5.14.21-150400.24.170.2.x86_64",
                "product": {
                  "name": "kernel-default-livepatch-5.14.21-150400.24.170.2.x86_64",
                  "product_id": "kernel-default-livepatch-5.14.21-150400.24.170.2.x86_64"
                }
              },
              {
                "category": "product_version",
                "name": "kernel-default-livepatch-devel-5.14.21-150400.24.170.2.x86_64",
                "product": {
                  "name": "kernel-default-livepatch-devel-5.14.21-150400.24.170.2.x86_64",
                  "product_id": "kernel-default-livepatch-devel-5.14.21-150400.24.170.2.x86_64"
                }
              },
              {
                "category": "product_version",
                "name": "kernel-default-optional-5.14.21-150400.24.170.2.x86_64",
                "product": {
                  "name": "kernel-default-optional-5.14.21-150400.24.170.2.x86_64",
                  "product_id": "kernel-default-optional-5.14.21-150400.24.170.2.x86_64"
                }
              },
              {
                "category": "product_version",
                "name": "kernel-kvmsmall-5.14.21-150400.24.170.2.x86_64",
                "product": {
                  "name": "kernel-kvmsmall-5.14.21-150400.24.170.2.x86_64",
                  "product_id": "kernel-kvmsmall-5.14.21-150400.24.170.2.x86_64"
                }
              },
              {
                "category": "product_version",
                "name": "kernel-kvmsmall-devel-5.14.21-150400.24.170.2.x86_64",
                "product": {
                  "name": "kernel-kvmsmall-devel-5.14.21-150400.24.170.2.x86_64",
                  "product_id": "kernel-kvmsmall-devel-5.14.21-150400.24.170.2.x86_64"
                }
              },
              {
                "category": "product_version",
                "name": "kernel-livepatch-5_14_21-150400_24_170-default-1-150400.9.3.2.x86_64",
                "product": {
                  "name": "kernel-livepatch-5_14_21-150400_24_170-default-1-150400.9.3.2.x86_64",
                  "product_id": "kernel-livepatch-5_14_21-150400_24_170-default-1-150400.9.3.2.x86_64"
                }
              },
              {
                "category": "product_version",
                "name": "kernel-obs-build-5.14.21-150400.24.170.2.x86_64",
                "product": {
                  "name": "kernel-obs-build-5.14.21-150400.24.170.2.x86_64",
                  "product_id": "kernel-obs-build-5.14.21-150400.24.170.2.x86_64"
                }
              },
              {
                "category": "product_version",
                "name": "kernel-obs-qa-5.14.21-150400.24.170.1.x86_64",
                "product": {
                  "name": "kernel-obs-qa-5.14.21-150400.24.170.1.x86_64",
                  "product_id": "kernel-obs-qa-5.14.21-150400.24.170.1.x86_64"
                }
              },
              {
                "category": "product_version",
                "name": "kernel-syms-5.14.21-150400.24.170.1.x86_64",
                "product": {
                  "name": "kernel-syms-5.14.21-150400.24.170.1.x86_64",
                  "product_id": "kernel-syms-5.14.21-150400.24.170.1.x86_64"
                }
              },
              {
                "category": "product_version",
                "name": "kselftests-kmp-default-5.14.21-150400.24.170.2.x86_64",
                "product": {
                  "name": "kselftests-kmp-default-5.14.21-150400.24.170.2.x86_64",
                  "product_id": "kselftests-kmp-default-5.14.21-150400.24.170.2.x86_64"
                }
              },
              {
                "category": "product_version",
                "name": "ocfs2-kmp-default-5.14.21-150400.24.170.2.x86_64",
                "product": {
                  "name": "ocfs2-kmp-default-5.14.21-150400.24.170.2.x86_64",
                  "product_id": "ocfs2-kmp-default-5.14.21-150400.24.170.2.x86_64"
                }
              },
              {
                "category": "product_version",
                "name": "reiserfs-kmp-default-5.14.21-150400.24.170.2.x86_64",
                "product": {
                  "name": "reiserfs-kmp-default-5.14.21-150400.24.170.2.x86_64",
                  "product_id": "reiserfs-kmp-default-5.14.21-150400.24.170.2.x86_64"
                }
              }
            ],
            "category": "architecture",
            "name": "x86_64"
          },
          {
            "branches": [
              {
                "category": "product_name",
                "name": "SUSE Linux Enterprise Micro 5.3",
                "product": {
                  "name": "SUSE Linux Enterprise Micro 5.3",
                  "product_id": "SUSE Linux Enterprise Micro 5.3",
                  "product_identification_helper": {
                    "cpe": "cpe:/o:suse:sle-micro:5.3"
                  }
                }
              },
              {
                "category": "product_name",
                "name": "SUSE Linux Enterprise Micro 5.4",
                "product": {
                  "name": "SUSE Linux Enterprise Micro 5.4",
                  "product_id": "SUSE Linux Enterprise Micro 5.4",
                  "product_identification_helper": {
                    "cpe": "cpe:/o:suse:sle-micro:5.4"
                  }
                }
              },
              {
                "category": "product_name",
                "name": "SUSE Linux Enterprise Live Patching 15 SP4",
                "product": {
                  "name": "SUSE Linux Enterprise Live Patching 15 SP4",
                  "product_id": "SUSE Linux Enterprise Live Patching 15 SP4",
                  "product_identification_helper": {
                    "cpe": "cpe:/o:suse:sle-module-live-patching:15:sp4"
                  }
                }
              },
              {
                "category": "product_name",
                "name": "SUSE Linux Enterprise High Availability Extension 15 SP4",
                "product": {
                  "name": "SUSE Linux Enterprise High Availability Extension 15 SP4",
                  "product_id": "SUSE Linux Enterprise High Availability Extension 15 SP4",
                  "product_identification_helper": {
                    "cpe": "cpe:/o:suse:sle-ha:15:sp4"
                  }
                }
              },
              {
                "category": "product_name",
                "name": "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS",
                "product": {
                  "name": "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS",
                  "product_id": "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS",
                  "product_identification_helper": {
                    "cpe": "cpe:/o:suse:sle_hpc-espos:15:sp4"
                  }
                }
              },
              {
                "category": "product_name",
                "name": "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS",
                "product": {
                  "name": "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS",
                  "product_id": "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS",
                  "product_identification_helper": {
                    "cpe": "cpe:/o:suse:sle_hpc-ltss:15:sp4"
                  }
                }
              },
              {
                "category": "product_name",
                "name": "SUSE Linux Enterprise Server 15 SP4-LTSS",
                "product": {
                  "name": "SUSE Linux Enterprise Server 15 SP4-LTSS",
                  "product_id": "SUSE Linux Enterprise Server 15 SP4-LTSS",
                  "product_identification_helper": {
                    "cpe": "cpe:/o:suse:sles-ltss:15:sp4"
                  }
                }
              },
              {
                "category": "product_name",
                "name": "SUSE Linux Enterprise Server for SAP Applications 15 SP4",
                "product": {
                  "name": "SUSE Linux Enterprise Server for SAP Applications 15 SP4",
                  "product_id": "SUSE Linux Enterprise Server for SAP Applications 15 SP4",
                  "product_identification_helper": {
                    "cpe": "cpe:/o:suse:sles_sap:15:sp4"
                  }
                }
              },
              {
                "category": "product_name",
                "name": "SUSE Manager Proxy 4.3",
                "product": {
                  "name": "SUSE Manager Proxy 4.3",
                  "product_id": "SUSE Manager Proxy 4.3",
                  "product_identification_helper": {
                    "cpe": "cpe:/o:suse:suse-manager-proxy:4.3"
                  }
                }
              },
              {
                "category": "product_name",
                "name": "SUSE Manager Server 4.3",
                "product": {
                  "name": "SUSE Manager Server 4.3",
                  "product_id": "SUSE Manager Server 4.3",
                  "product_identification_helper": {
                    "cpe": "cpe:/o:suse:suse-manager-server:4.3"
                  }
                }
              }
            ],
            "category": "product_family",
            "name": "SUSE Linux Enterprise"
          }
        ],
        "category": "vendor",
        "name": "SUSE"
      }
    ],
    "relationships": [
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-default-5.14.21-150400.24.170.2.aarch64 as component of SUSE Linux Enterprise Micro 5.3",
          "product_id": "SUSE Linux Enterprise Micro 5.3:kernel-default-5.14.21-150400.24.170.2.aarch64"
        },
        "product_reference": "kernel-default-5.14.21-150400.24.170.2.aarch64",
        "relates_to_product_reference": "SUSE Linux Enterprise Micro 5.3"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-default-5.14.21-150400.24.170.2.s390x as component of SUSE Linux Enterprise Micro 5.3",
          "product_id": "SUSE Linux Enterprise Micro 5.3:kernel-default-5.14.21-150400.24.170.2.s390x"
        },
        "product_reference": "kernel-default-5.14.21-150400.24.170.2.s390x",
        "relates_to_product_reference": "SUSE Linux Enterprise Micro 5.3"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-default-5.14.21-150400.24.170.2.x86_64 as component of SUSE Linux Enterprise Micro 5.3",
          "product_id": "SUSE Linux Enterprise Micro 5.3:kernel-default-5.14.21-150400.24.170.2.x86_64"
        },
        "product_reference": "kernel-default-5.14.21-150400.24.170.2.x86_64",
        "relates_to_product_reference": "SUSE Linux Enterprise Micro 5.3"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.aarch64 as component of SUSE Linux Enterprise Micro 5.3",
          "product_id": "SUSE Linux Enterprise Micro 5.3:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.aarch64"
        },
        "product_reference": "kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.aarch64",
        "relates_to_product_reference": "SUSE Linux Enterprise Micro 5.3"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64 as component of SUSE Linux Enterprise Micro 5.3",
          "product_id": "SUSE Linux Enterprise Micro 5.3:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64"
        },
        "product_reference": "kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
        "relates_to_product_reference": "SUSE Linux Enterprise Micro 5.3"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-default-5.14.21-150400.24.170.2.aarch64 as component of SUSE Linux Enterprise Micro 5.4",
          "product_id": "SUSE Linux Enterprise Micro 5.4:kernel-default-5.14.21-150400.24.170.2.aarch64"
        },
        "product_reference": "kernel-default-5.14.21-150400.24.170.2.aarch64",
        "relates_to_product_reference": "SUSE Linux Enterprise Micro 5.4"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-default-5.14.21-150400.24.170.2.s390x as component of SUSE Linux Enterprise Micro 5.4",
          "product_id": "SUSE Linux Enterprise Micro 5.4:kernel-default-5.14.21-150400.24.170.2.s390x"
        },
        "product_reference": "kernel-default-5.14.21-150400.24.170.2.s390x",
        "relates_to_product_reference": "SUSE Linux Enterprise Micro 5.4"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-default-5.14.21-150400.24.170.2.x86_64 as component of SUSE Linux Enterprise Micro 5.4",
          "product_id": "SUSE Linux Enterprise Micro 5.4:kernel-default-5.14.21-150400.24.170.2.x86_64"
        },
        "product_reference": "kernel-default-5.14.21-150400.24.170.2.x86_64",
        "relates_to_product_reference": "SUSE Linux Enterprise Micro 5.4"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.aarch64 as component of SUSE Linux Enterprise Micro 5.4",
          "product_id": "SUSE Linux Enterprise Micro 5.4:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.aarch64"
        },
        "product_reference": "kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.aarch64",
        "relates_to_product_reference": "SUSE Linux Enterprise Micro 5.4"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64 as component of SUSE Linux Enterprise Micro 5.4",
          "product_id": "SUSE Linux Enterprise Micro 5.4:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64"
        },
        "product_reference": "kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
        "relates_to_product_reference": "SUSE Linux Enterprise Micro 5.4"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-default-livepatch-5.14.21-150400.24.170.2.ppc64le as component of SUSE Linux Enterprise Live Patching 15 SP4",
          "product_id": "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.170.2.ppc64le"
        },
        "product_reference": "kernel-default-livepatch-5.14.21-150400.24.170.2.ppc64le",
        "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP4"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-default-livepatch-5.14.21-150400.24.170.2.s390x as component of SUSE Linux Enterprise Live Patching 15 SP4",
          "product_id": "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.170.2.s390x"
        },
        "product_reference": "kernel-default-livepatch-5.14.21-150400.24.170.2.s390x",
        "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP4"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-default-livepatch-5.14.21-150400.24.170.2.x86_64 as component of SUSE Linux Enterprise Live Patching 15 SP4",
          "product_id": "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.170.2.x86_64"
        },
        "product_reference": "kernel-default-livepatch-5.14.21-150400.24.170.2.x86_64",
        "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP4"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-default-livepatch-devel-5.14.21-150400.24.170.2.ppc64le as component of SUSE Linux Enterprise Live Patching 15 SP4",
          "product_id": "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.170.2.ppc64le"
        },
        "product_reference": "kernel-default-livepatch-devel-5.14.21-150400.24.170.2.ppc64le",
        "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP4"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-default-livepatch-devel-5.14.21-150400.24.170.2.s390x as component of SUSE Linux Enterprise Live Patching 15 SP4",
          "product_id": "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.170.2.s390x"
        },
        "product_reference": "kernel-default-livepatch-devel-5.14.21-150400.24.170.2.s390x",
        "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP4"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-default-livepatch-devel-5.14.21-150400.24.170.2.x86_64 as component of SUSE Linux Enterprise Live Patching 15 SP4",
          "product_id": "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.170.2.x86_64"
        },
        "product_reference": "kernel-default-livepatch-devel-5.14.21-150400.24.170.2.x86_64",
        "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP4"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-livepatch-5_14_21-150400_24_170-default-1-150400.9.3.2.ppc64le as component of SUSE Linux Enterprise Live Patching 15 SP4",
          "product_id": "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_170-default-1-150400.9.3.2.ppc64le"
        },
        "product_reference": "kernel-livepatch-5_14_21-150400_24_170-default-1-150400.9.3.2.ppc64le",
        "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP4"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-livepatch-5_14_21-150400_24_170-default-1-150400.9.3.2.s390x as component of SUSE Linux Enterprise Live Patching 15 SP4",
          "product_id": "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_170-default-1-150400.9.3.2.s390x"
        },
        "product_reference": "kernel-livepatch-5_14_21-150400_24_170-default-1-150400.9.3.2.s390x",
        "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP4"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-livepatch-5_14_21-150400_24_170-default-1-150400.9.3.2.x86_64 as component of SUSE Linux Enterprise Live Patching 15 SP4",
          "product_id": "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_170-default-1-150400.9.3.2.x86_64"
        },
        "product_reference": "kernel-livepatch-5_14_21-150400_24_170-default-1-150400.9.3.2.x86_64",
        "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP4"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "cluster-md-kmp-default-5.14.21-150400.24.170.2.aarch64 as component of SUSE Linux Enterprise High Availability Extension 15 SP4",
          "product_id": "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.170.2.aarch64"
        },
        "product_reference": "cluster-md-kmp-default-5.14.21-150400.24.170.2.aarch64",
        "relates_to_product_reference": "SUSE Linux Enterprise High Availability Extension 15 SP4"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "cluster-md-kmp-default-5.14.21-150400.24.170.2.ppc64le as component of SUSE Linux Enterprise High Availability Extension 15 SP4",
          "product_id": "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.170.2.ppc64le"
        },
        "product_reference": "cluster-md-kmp-default-5.14.21-150400.24.170.2.ppc64le",
        "relates_to_product_reference": "SUSE Linux Enterprise High Availability Extension 15 SP4"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "cluster-md-kmp-default-5.14.21-150400.24.170.2.s390x as component of SUSE Linux Enterprise High Availability Extension 15 SP4",
          "product_id": "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.170.2.s390x"
        },
        "product_reference": "cluster-md-kmp-default-5.14.21-150400.24.170.2.s390x",
        "relates_to_product_reference": "SUSE Linux Enterprise High Availability Extension 15 SP4"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "cluster-md-kmp-default-5.14.21-150400.24.170.2.x86_64 as component of SUSE Linux Enterprise High Availability Extension 15 SP4",
          "product_id": "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.170.2.x86_64"
        },
        "product_reference": "cluster-md-kmp-default-5.14.21-150400.24.170.2.x86_64",
        "relates_to_product_reference": "SUSE Linux Enterprise High Availability Extension 15 SP4"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "dlm-kmp-default-5.14.21-150400.24.170.2.aarch64 as component of SUSE Linux Enterprise High Availability Extension 15 SP4",
          "product_id": "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.170.2.aarch64"
        },
        "product_reference": "dlm-kmp-default-5.14.21-150400.24.170.2.aarch64",
        "relates_to_product_reference": "SUSE Linux Enterprise High Availability Extension 15 SP4"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "dlm-kmp-default-5.14.21-150400.24.170.2.ppc64le as component of SUSE Linux Enterprise High Availability Extension 15 SP4",
          "product_id": "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.170.2.ppc64le"
        },
        "product_reference": "dlm-kmp-default-5.14.21-150400.24.170.2.ppc64le",
        "relates_to_product_reference": "SUSE Linux Enterprise High Availability Extension 15 SP4"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "dlm-kmp-default-5.14.21-150400.24.170.2.s390x as component of SUSE Linux Enterprise High Availability Extension 15 SP4",
          "product_id": "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.170.2.s390x"
        },
        "product_reference": "dlm-kmp-default-5.14.21-150400.24.170.2.s390x",
        "relates_to_product_reference": "SUSE Linux Enterprise High Availability Extension 15 SP4"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "dlm-kmp-default-5.14.21-150400.24.170.2.x86_64 as component of SUSE Linux Enterprise High Availability Extension 15 SP4",
          "product_id": "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.170.2.x86_64"
        },
        "product_reference": "dlm-kmp-default-5.14.21-150400.24.170.2.x86_64",
        "relates_to_product_reference": "SUSE Linux Enterprise High Availability Extension 15 SP4"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "gfs2-kmp-default-5.14.21-150400.24.170.2.aarch64 as component of SUSE Linux Enterprise High Availability Extension 15 SP4",
          "product_id": "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.170.2.aarch64"
        },
        "product_reference": "gfs2-kmp-default-5.14.21-150400.24.170.2.aarch64",
        "relates_to_product_reference": "SUSE Linux Enterprise High Availability Extension 15 SP4"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "gfs2-kmp-default-5.14.21-150400.24.170.2.ppc64le as component of SUSE Linux Enterprise High Availability Extension 15 SP4",
          "product_id": "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.170.2.ppc64le"
        },
        "product_reference": "gfs2-kmp-default-5.14.21-150400.24.170.2.ppc64le",
        "relates_to_product_reference": "SUSE Linux Enterprise High Availability Extension 15 SP4"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "gfs2-kmp-default-5.14.21-150400.24.170.2.s390x as component of SUSE Linux Enterprise High Availability Extension 15 SP4",
          "product_id": "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.170.2.s390x"
        },
        "product_reference": "gfs2-kmp-default-5.14.21-150400.24.170.2.s390x",
        "relates_to_product_reference": "SUSE Linux Enterprise High Availability Extension 15 SP4"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "gfs2-kmp-default-5.14.21-150400.24.170.2.x86_64 as component of SUSE Linux Enterprise High Availability Extension 15 SP4",
          "product_id": "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.170.2.x86_64"
        },
        "product_reference": "gfs2-kmp-default-5.14.21-150400.24.170.2.x86_64",
        "relates_to_product_reference": "SUSE Linux Enterprise High Availability Extension 15 SP4"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "ocfs2-kmp-default-5.14.21-150400.24.170.2.aarch64 as component of SUSE Linux Enterprise High Availability Extension 15 SP4",
          "product_id": "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.170.2.aarch64"
        },
        "product_reference": "ocfs2-kmp-default-5.14.21-150400.24.170.2.aarch64",
        "relates_to_product_reference": "SUSE Linux Enterprise High Availability Extension 15 SP4"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "ocfs2-kmp-default-5.14.21-150400.24.170.2.ppc64le as component of SUSE Linux Enterprise High Availability Extension 15 SP4",
          "product_id": "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.170.2.ppc64le"
        },
        "product_reference": "ocfs2-kmp-default-5.14.21-150400.24.170.2.ppc64le",
        "relates_to_product_reference": "SUSE Linux Enterprise High Availability Extension 15 SP4"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "ocfs2-kmp-default-5.14.21-150400.24.170.2.s390x as component of SUSE Linux Enterprise High Availability Extension 15 SP4",
          "product_id": "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.170.2.s390x"
        },
        "product_reference": "ocfs2-kmp-default-5.14.21-150400.24.170.2.s390x",
        "relates_to_product_reference": "SUSE Linux Enterprise High Availability Extension 15 SP4"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "ocfs2-kmp-default-5.14.21-150400.24.170.2.x86_64 as component of SUSE Linux Enterprise High Availability Extension 15 SP4",
          "product_id": "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.170.2.x86_64"
        },
        "product_reference": "ocfs2-kmp-default-5.14.21-150400.24.170.2.x86_64",
        "relates_to_product_reference": "SUSE Linux Enterprise High Availability Extension 15 SP4"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-64kb-5.14.21-150400.24.170.2.aarch64 as component of SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS",
          "product_id": "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-64kb-5.14.21-150400.24.170.2.aarch64"
        },
        "product_reference": "kernel-64kb-5.14.21-150400.24.170.2.aarch64",
        "relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-64kb-devel-5.14.21-150400.24.170.2.aarch64 as component of SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS",
          "product_id": "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-64kb-devel-5.14.21-150400.24.170.2.aarch64"
        },
        "product_reference": "kernel-64kb-devel-5.14.21-150400.24.170.2.aarch64",
        "relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-default-5.14.21-150400.24.170.2.aarch64 as component of SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS",
          "product_id": "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-5.14.21-150400.24.170.2.aarch64"
        },
        "product_reference": "kernel-default-5.14.21-150400.24.170.2.aarch64",
        "relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-default-5.14.21-150400.24.170.2.x86_64 as component of SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS",
          "product_id": "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-5.14.21-150400.24.170.2.x86_64"
        },
        "product_reference": "kernel-default-5.14.21-150400.24.170.2.x86_64",
        "relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.aarch64 as component of SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS",
          "product_id": "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.aarch64"
        },
        "product_reference": "kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.aarch64",
        "relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64 as component of SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS",
          "product_id": "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64"
        },
        "product_reference": "kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
        "relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-default-devel-5.14.21-150400.24.170.2.aarch64 as component of SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS",
          "product_id": "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-devel-5.14.21-150400.24.170.2.aarch64"
        },
        "product_reference": "kernel-default-devel-5.14.21-150400.24.170.2.aarch64",
        "relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-default-devel-5.14.21-150400.24.170.2.x86_64 as component of SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS",
          "product_id": "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-devel-5.14.21-150400.24.170.2.x86_64"
        },
        "product_reference": "kernel-default-devel-5.14.21-150400.24.170.2.x86_64",
        "relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-devel-5.14.21-150400.24.170.1.noarch as component of SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS",
          "product_id": "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-devel-5.14.21-150400.24.170.1.noarch"
        },
        "product_reference": "kernel-devel-5.14.21-150400.24.170.1.noarch",
        "relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-docs-5.14.21-150400.24.170.1.noarch as component of SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS",
          "product_id": "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-docs-5.14.21-150400.24.170.1.noarch"
        },
        "product_reference": "kernel-docs-5.14.21-150400.24.170.1.noarch",
        "relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-macros-5.14.21-150400.24.170.1.noarch as component of SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS",
          "product_id": "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-macros-5.14.21-150400.24.170.1.noarch"
        },
        "product_reference": "kernel-macros-5.14.21-150400.24.170.1.noarch",
        "relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-obs-build-5.14.21-150400.24.170.2.aarch64 as component of SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS",
          "product_id": "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-obs-build-5.14.21-150400.24.170.2.aarch64"
        },
        "product_reference": "kernel-obs-build-5.14.21-150400.24.170.2.aarch64",
        "relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-obs-build-5.14.21-150400.24.170.2.x86_64 as component of SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS",
          "product_id": "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-obs-build-5.14.21-150400.24.170.2.x86_64"
        },
        "product_reference": "kernel-obs-build-5.14.21-150400.24.170.2.x86_64",
        "relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-source-5.14.21-150400.24.170.1.noarch as component of SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS",
          "product_id": "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-source-5.14.21-150400.24.170.1.noarch"
        },
        "product_reference": "kernel-source-5.14.21-150400.24.170.1.noarch",
        "relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-syms-5.14.21-150400.24.170.1.aarch64 as component of SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS",
          "product_id": "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-syms-5.14.21-150400.24.170.1.aarch64"
        },
        "product_reference": "kernel-syms-5.14.21-150400.24.170.1.aarch64",
        "relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-syms-5.14.21-150400.24.170.1.x86_64 as component of SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS",
          "product_id": "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-syms-5.14.21-150400.24.170.1.x86_64"
        },
        "product_reference": "kernel-syms-5.14.21-150400.24.170.1.x86_64",
        "relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "reiserfs-kmp-default-5.14.21-150400.24.170.2.aarch64 as component of SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS",
          "product_id": "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:reiserfs-kmp-default-5.14.21-150400.24.170.2.aarch64"
        },
        "product_reference": "reiserfs-kmp-default-5.14.21-150400.24.170.2.aarch64",
        "relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "reiserfs-kmp-default-5.14.21-150400.24.170.2.x86_64 as component of SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS",
          "product_id": "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:reiserfs-kmp-default-5.14.21-150400.24.170.2.x86_64"
        },
        "product_reference": "reiserfs-kmp-default-5.14.21-150400.24.170.2.x86_64",
        "relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-64kb-5.14.21-150400.24.170.2.aarch64 as component of SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS",
          "product_id": "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-64kb-5.14.21-150400.24.170.2.aarch64"
        },
        "product_reference": "kernel-64kb-5.14.21-150400.24.170.2.aarch64",
        "relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-64kb-devel-5.14.21-150400.24.170.2.aarch64 as component of SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS",
          "product_id": "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-64kb-devel-5.14.21-150400.24.170.2.aarch64"
        },
        "product_reference": "kernel-64kb-devel-5.14.21-150400.24.170.2.aarch64",
        "relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-default-5.14.21-150400.24.170.2.aarch64 as component of SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS",
          "product_id": "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-5.14.21-150400.24.170.2.aarch64"
        },
        "product_reference": "kernel-default-5.14.21-150400.24.170.2.aarch64",
        "relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-default-5.14.21-150400.24.170.2.x86_64 as component of SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS",
          "product_id": "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-5.14.21-150400.24.170.2.x86_64"
        },
        "product_reference": "kernel-default-5.14.21-150400.24.170.2.x86_64",
        "relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.aarch64 as component of SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS",
          "product_id": "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.aarch64"
        },
        "product_reference": "kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.aarch64",
        "relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64 as component of SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS",
          "product_id": "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64"
        },
        "product_reference": "kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
        "relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-default-devel-5.14.21-150400.24.170.2.aarch64 as component of SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS",
          "product_id": "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.170.2.aarch64"
        },
        "product_reference": "kernel-default-devel-5.14.21-150400.24.170.2.aarch64",
        "relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-default-devel-5.14.21-150400.24.170.2.x86_64 as component of SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS",
          "product_id": "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.170.2.x86_64"
        },
        "product_reference": "kernel-default-devel-5.14.21-150400.24.170.2.x86_64",
        "relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-devel-5.14.21-150400.24.170.1.noarch as component of SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS",
          "product_id": "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-devel-5.14.21-150400.24.170.1.noarch"
        },
        "product_reference": "kernel-devel-5.14.21-150400.24.170.1.noarch",
        "relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-docs-5.14.21-150400.24.170.1.noarch as component of SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS",
          "product_id": "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-docs-5.14.21-150400.24.170.1.noarch"
        },
        "product_reference": "kernel-docs-5.14.21-150400.24.170.1.noarch",
        "relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-macros-5.14.21-150400.24.170.1.noarch as component of SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS",
          "product_id": "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-macros-5.14.21-150400.24.170.1.noarch"
        },
        "product_reference": "kernel-macros-5.14.21-150400.24.170.1.noarch",
        "relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-obs-build-5.14.21-150400.24.170.2.aarch64 as component of SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS",
          "product_id": "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.170.2.aarch64"
        },
        "product_reference": "kernel-obs-build-5.14.21-150400.24.170.2.aarch64",
        "relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-obs-build-5.14.21-150400.24.170.2.x86_64 as component of SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS",
          "product_id": "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.170.2.x86_64"
        },
        "product_reference": "kernel-obs-build-5.14.21-150400.24.170.2.x86_64",
        "relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-source-5.14.21-150400.24.170.1.noarch as component of SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS",
          "product_id": "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-source-5.14.21-150400.24.170.1.noarch"
        },
        "product_reference": "kernel-source-5.14.21-150400.24.170.1.noarch",
        "relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-syms-5.14.21-150400.24.170.1.aarch64 as component of SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS",
          "product_id": "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.170.1.aarch64"
        },
        "product_reference": "kernel-syms-5.14.21-150400.24.170.1.aarch64",
        "relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-syms-5.14.21-150400.24.170.1.x86_64 as component of SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS",
          "product_id": "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.170.1.x86_64"
        },
        "product_reference": "kernel-syms-5.14.21-150400.24.170.1.x86_64",
        "relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "reiserfs-kmp-default-5.14.21-150400.24.170.2.aarch64 as component of SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS",
          "product_id": "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.170.2.aarch64"
        },
        "product_reference": "reiserfs-kmp-default-5.14.21-150400.24.170.2.aarch64",
        "relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "reiserfs-kmp-default-5.14.21-150400.24.170.2.x86_64 as component of SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS",
          "product_id": "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.170.2.x86_64"
        },
        "product_reference": "reiserfs-kmp-default-5.14.21-150400.24.170.2.x86_64",
        "relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-64kb-5.14.21-150400.24.170.2.aarch64 as component of SUSE Linux Enterprise Server 15 SP4-LTSS",
          "product_id": "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-64kb-5.14.21-150400.24.170.2.aarch64"
        },
        "product_reference": "kernel-64kb-5.14.21-150400.24.170.2.aarch64",
        "relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP4-LTSS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-64kb-devel-5.14.21-150400.24.170.2.aarch64 as component of SUSE Linux Enterprise Server 15 SP4-LTSS",
          "product_id": "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-64kb-devel-5.14.21-150400.24.170.2.aarch64"
        },
        "product_reference": "kernel-64kb-devel-5.14.21-150400.24.170.2.aarch64",
        "relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP4-LTSS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-default-5.14.21-150400.24.170.2.aarch64 as component of SUSE Linux Enterprise Server 15 SP4-LTSS",
          "product_id": "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-5.14.21-150400.24.170.2.aarch64"
        },
        "product_reference": "kernel-default-5.14.21-150400.24.170.2.aarch64",
        "relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP4-LTSS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-default-5.14.21-150400.24.170.2.ppc64le as component of SUSE Linux Enterprise Server 15 SP4-LTSS",
          "product_id": "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-5.14.21-150400.24.170.2.ppc64le"
        },
        "product_reference": "kernel-default-5.14.21-150400.24.170.2.ppc64le",
        "relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP4-LTSS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-default-5.14.21-150400.24.170.2.s390x as component of SUSE Linux Enterprise Server 15 SP4-LTSS",
          "product_id": "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-5.14.21-150400.24.170.2.s390x"
        },
        "product_reference": "kernel-default-5.14.21-150400.24.170.2.s390x",
        "relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP4-LTSS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-default-5.14.21-150400.24.170.2.x86_64 as component of SUSE Linux Enterprise Server 15 SP4-LTSS",
          "product_id": "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-5.14.21-150400.24.170.2.x86_64"
        },
        "product_reference": "kernel-default-5.14.21-150400.24.170.2.x86_64",
        "relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP4-LTSS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.aarch64 as component of SUSE Linux Enterprise Server 15 SP4-LTSS",
          "product_id": "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.aarch64"
        },
        "product_reference": "kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.aarch64",
        "relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP4-LTSS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.ppc64le as component of SUSE Linux Enterprise Server 15 SP4-LTSS",
          "product_id": "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.ppc64le"
        },
        "product_reference": "kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.ppc64le",
        "relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP4-LTSS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64 as component of SUSE Linux Enterprise Server 15 SP4-LTSS",
          "product_id": "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64"
        },
        "product_reference": "kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
        "relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP4-LTSS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-default-devel-5.14.21-150400.24.170.2.aarch64 as component of SUSE Linux Enterprise Server 15 SP4-LTSS",
          "product_id": "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.170.2.aarch64"
        },
        "product_reference": "kernel-default-devel-5.14.21-150400.24.170.2.aarch64",
        "relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP4-LTSS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-default-devel-5.14.21-150400.24.170.2.ppc64le as component of SUSE Linux Enterprise Server 15 SP4-LTSS",
          "product_id": "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.170.2.ppc64le"
        },
        "product_reference": "kernel-default-devel-5.14.21-150400.24.170.2.ppc64le",
        "relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP4-LTSS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-default-devel-5.14.21-150400.24.170.2.s390x as component of SUSE Linux Enterprise Server 15 SP4-LTSS",
          "product_id": "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.170.2.s390x"
        },
        "product_reference": "kernel-default-devel-5.14.21-150400.24.170.2.s390x",
        "relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP4-LTSS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-default-devel-5.14.21-150400.24.170.2.x86_64 as component of SUSE Linux Enterprise Server 15 SP4-LTSS",
          "product_id": "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.170.2.x86_64"
        },
        "product_reference": "kernel-default-devel-5.14.21-150400.24.170.2.x86_64",
        "relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP4-LTSS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-devel-5.14.21-150400.24.170.1.noarch as component of SUSE Linux Enterprise Server 15 SP4-LTSS",
          "product_id": "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-devel-5.14.21-150400.24.170.1.noarch"
        },
        "product_reference": "kernel-devel-5.14.21-150400.24.170.1.noarch",
        "relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP4-LTSS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-docs-5.14.21-150400.24.170.1.noarch as component of SUSE Linux Enterprise Server 15 SP4-LTSS",
          "product_id": "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-docs-5.14.21-150400.24.170.1.noarch"
        },
        "product_reference": "kernel-docs-5.14.21-150400.24.170.1.noarch",
        "relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP4-LTSS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-macros-5.14.21-150400.24.170.1.noarch as component of SUSE Linux Enterprise Server 15 SP4-LTSS",
          "product_id": "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-macros-5.14.21-150400.24.170.1.noarch"
        },
        "product_reference": "kernel-macros-5.14.21-150400.24.170.1.noarch",
        "relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP4-LTSS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-obs-build-5.14.21-150400.24.170.2.aarch64 as component of SUSE Linux Enterprise Server 15 SP4-LTSS",
          "product_id": "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.170.2.aarch64"
        },
        "product_reference": "kernel-obs-build-5.14.21-150400.24.170.2.aarch64",
        "relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP4-LTSS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-obs-build-5.14.21-150400.24.170.2.ppc64le as component of SUSE Linux Enterprise Server 15 SP4-LTSS",
          "product_id": "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.170.2.ppc64le"
        },
        "product_reference": "kernel-obs-build-5.14.21-150400.24.170.2.ppc64le",
        "relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP4-LTSS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-obs-build-5.14.21-150400.24.170.2.s390x as component of SUSE Linux Enterprise Server 15 SP4-LTSS",
          "product_id": "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.170.2.s390x"
        },
        "product_reference": "kernel-obs-build-5.14.21-150400.24.170.2.s390x",
        "relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP4-LTSS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-obs-build-5.14.21-150400.24.170.2.x86_64 as component of SUSE Linux Enterprise Server 15 SP4-LTSS",
          "product_id": "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.170.2.x86_64"
        },
        "product_reference": "kernel-obs-build-5.14.21-150400.24.170.2.x86_64",
        "relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP4-LTSS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-source-5.14.21-150400.24.170.1.noarch as component of SUSE Linux Enterprise Server 15 SP4-LTSS",
          "product_id": "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-source-5.14.21-150400.24.170.1.noarch"
        },
        "product_reference": "kernel-source-5.14.21-150400.24.170.1.noarch",
        "relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP4-LTSS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-syms-5.14.21-150400.24.170.1.aarch64 as component of SUSE Linux Enterprise Server 15 SP4-LTSS",
          "product_id": "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.170.1.aarch64"
        },
        "product_reference": "kernel-syms-5.14.21-150400.24.170.1.aarch64",
        "relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP4-LTSS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-syms-5.14.21-150400.24.170.1.ppc64le as component of SUSE Linux Enterprise Server 15 SP4-LTSS",
          "product_id": "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.170.1.ppc64le"
        },
        "product_reference": "kernel-syms-5.14.21-150400.24.170.1.ppc64le",
        "relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP4-LTSS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-syms-5.14.21-150400.24.170.1.s390x as component of SUSE Linux Enterprise Server 15 SP4-LTSS",
          "product_id": "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.170.1.s390x"
        },
        "product_reference": "kernel-syms-5.14.21-150400.24.170.1.s390x",
        "relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP4-LTSS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-syms-5.14.21-150400.24.170.1.x86_64 as component of SUSE Linux Enterprise Server 15 SP4-LTSS",
          "product_id": "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.170.1.x86_64"
        },
        "product_reference": "kernel-syms-5.14.21-150400.24.170.1.x86_64",
        "relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP4-LTSS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-zfcpdump-5.14.21-150400.24.170.2.s390x as component of SUSE Linux Enterprise Server 15 SP4-LTSS",
          "product_id": "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-zfcpdump-5.14.21-150400.24.170.2.s390x"
        },
        "product_reference": "kernel-zfcpdump-5.14.21-150400.24.170.2.s390x",
        "relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP4-LTSS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "reiserfs-kmp-default-5.14.21-150400.24.170.2.aarch64 as component of SUSE Linux Enterprise Server 15 SP4-LTSS",
          "product_id": "SUSE Linux Enterprise Server 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.170.2.aarch64"
        },
        "product_reference": "reiserfs-kmp-default-5.14.21-150400.24.170.2.aarch64",
        "relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP4-LTSS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "reiserfs-kmp-default-5.14.21-150400.24.170.2.ppc64le as component of SUSE Linux Enterprise Server 15 SP4-LTSS",
          "product_id": "SUSE Linux Enterprise Server 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.170.2.ppc64le"
        },
        "product_reference": "reiserfs-kmp-default-5.14.21-150400.24.170.2.ppc64le",
        "relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP4-LTSS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "reiserfs-kmp-default-5.14.21-150400.24.170.2.s390x as component of SUSE Linux Enterprise Server 15 SP4-LTSS",
          "product_id": "SUSE Linux Enterprise Server 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.170.2.s390x"
        },
        "product_reference": "reiserfs-kmp-default-5.14.21-150400.24.170.2.s390x",
        "relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP4-LTSS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "reiserfs-kmp-default-5.14.21-150400.24.170.2.x86_64 as component of SUSE Linux Enterprise Server 15 SP4-LTSS",
          "product_id": "SUSE Linux Enterprise Server 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.170.2.x86_64"
        },
        "product_reference": "reiserfs-kmp-default-5.14.21-150400.24.170.2.x86_64",
        "relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP4-LTSS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-default-5.14.21-150400.24.170.2.ppc64le as component of SUSE Linux Enterprise Server for SAP Applications 15 SP4",
          "product_id": "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-5.14.21-150400.24.170.2.ppc64le"
        },
        "product_reference": "kernel-default-5.14.21-150400.24.170.2.ppc64le",
        "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 15 SP4"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-default-5.14.21-150400.24.170.2.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 15 SP4",
          "product_id": "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-5.14.21-150400.24.170.2.x86_64"
        },
        "product_reference": "kernel-default-5.14.21-150400.24.170.2.x86_64",
        "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 15 SP4"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.ppc64le as component of SUSE Linux Enterprise Server for SAP Applications 15 SP4",
          "product_id": "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.ppc64le"
        },
        "product_reference": "kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.ppc64le",
        "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 15 SP4"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 15 SP4",
          "product_id": "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64"
        },
        "product_reference": "kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
        "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 15 SP4"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-default-devel-5.14.21-150400.24.170.2.ppc64le as component of SUSE Linux Enterprise Server for SAP Applications 15 SP4",
          "product_id": "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-devel-5.14.21-150400.24.170.2.ppc64le"
        },
        "product_reference": "kernel-default-devel-5.14.21-150400.24.170.2.ppc64le",
        "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 15 SP4"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-default-devel-5.14.21-150400.24.170.2.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 15 SP4",
          "product_id": "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-devel-5.14.21-150400.24.170.2.x86_64"
        },
        "product_reference": "kernel-default-devel-5.14.21-150400.24.170.2.x86_64",
        "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 15 SP4"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-devel-5.14.21-150400.24.170.1.noarch as component of SUSE Linux Enterprise Server for SAP Applications 15 SP4",
          "product_id": "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-devel-5.14.21-150400.24.170.1.noarch"
        },
        "product_reference": "kernel-devel-5.14.21-150400.24.170.1.noarch",
        "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 15 SP4"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-docs-5.14.21-150400.24.170.1.noarch as component of SUSE Linux Enterprise Server for SAP Applications 15 SP4",
          "product_id": "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-docs-5.14.21-150400.24.170.1.noarch"
        },
        "product_reference": "kernel-docs-5.14.21-150400.24.170.1.noarch",
        "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 15 SP4"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-macros-5.14.21-150400.24.170.1.noarch as component of SUSE Linux Enterprise Server for SAP Applications 15 SP4",
          "product_id": "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-macros-5.14.21-150400.24.170.1.noarch"
        },
        "product_reference": "kernel-macros-5.14.21-150400.24.170.1.noarch",
        "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 15 SP4"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-obs-build-5.14.21-150400.24.170.2.ppc64le as component of SUSE Linux Enterprise Server for SAP Applications 15 SP4",
          "product_id": "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-obs-build-5.14.21-150400.24.170.2.ppc64le"
        },
        "product_reference": "kernel-obs-build-5.14.21-150400.24.170.2.ppc64le",
        "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 15 SP4"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-obs-build-5.14.21-150400.24.170.2.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 15 SP4",
          "product_id": "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-obs-build-5.14.21-150400.24.170.2.x86_64"
        },
        "product_reference": "kernel-obs-build-5.14.21-150400.24.170.2.x86_64",
        "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 15 SP4"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-source-5.14.21-150400.24.170.1.noarch as component of SUSE Linux Enterprise Server for SAP Applications 15 SP4",
          "product_id": "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-source-5.14.21-150400.24.170.1.noarch"
        },
        "product_reference": "kernel-source-5.14.21-150400.24.170.1.noarch",
        "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 15 SP4"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-syms-5.14.21-150400.24.170.1.ppc64le as component of SUSE Linux Enterprise Server for SAP Applications 15 SP4",
          "product_id": "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-syms-5.14.21-150400.24.170.1.ppc64le"
        },
        "product_reference": "kernel-syms-5.14.21-150400.24.170.1.ppc64le",
        "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 15 SP4"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-syms-5.14.21-150400.24.170.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 15 SP4",
          "product_id": "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-syms-5.14.21-150400.24.170.1.x86_64"
        },
        "product_reference": "kernel-syms-5.14.21-150400.24.170.1.x86_64",
        "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 15 SP4"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "reiserfs-kmp-default-5.14.21-150400.24.170.2.ppc64le as component of SUSE Linux Enterprise Server for SAP Applications 15 SP4",
          "product_id": "SUSE Linux Enterprise Server for SAP Applications 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.170.2.ppc64le"
        },
        "product_reference": "reiserfs-kmp-default-5.14.21-150400.24.170.2.ppc64le",
        "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 15 SP4"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "reiserfs-kmp-default-5.14.21-150400.24.170.2.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 15 SP4",
          "product_id": "SUSE Linux Enterprise Server for SAP Applications 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.170.2.x86_64"
        },
        "product_reference": "reiserfs-kmp-default-5.14.21-150400.24.170.2.x86_64",
        "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 15 SP4"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-default-5.14.21-150400.24.170.2.x86_64 as component of SUSE Manager Proxy 4.3",
          "product_id": "SUSE Manager Proxy 4.3:kernel-default-5.14.21-150400.24.170.2.x86_64"
        },
        "product_reference": "kernel-default-5.14.21-150400.24.170.2.x86_64",
        "relates_to_product_reference": "SUSE Manager Proxy 4.3"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64 as component of SUSE Manager Proxy 4.3",
          "product_id": "SUSE Manager Proxy 4.3:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64"
        },
        "product_reference": "kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
        "relates_to_product_reference": "SUSE Manager Proxy 4.3"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-default-devel-5.14.21-150400.24.170.2.x86_64 as component of SUSE Manager Proxy 4.3",
          "product_id": "SUSE Manager Proxy 4.3:kernel-default-devel-5.14.21-150400.24.170.2.x86_64"
        },
        "product_reference": "kernel-default-devel-5.14.21-150400.24.170.2.x86_64",
        "relates_to_product_reference": "SUSE Manager Proxy 4.3"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-devel-5.14.21-150400.24.170.1.noarch as component of SUSE Manager Proxy 4.3",
          "product_id": "SUSE Manager Proxy 4.3:kernel-devel-5.14.21-150400.24.170.1.noarch"
        },
        "product_reference": "kernel-devel-5.14.21-150400.24.170.1.noarch",
        "relates_to_product_reference": "SUSE Manager Proxy 4.3"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-macros-5.14.21-150400.24.170.1.noarch as component of SUSE Manager Proxy 4.3",
          "product_id": "SUSE Manager Proxy 4.3:kernel-macros-5.14.21-150400.24.170.1.noarch"
        },
        "product_reference": "kernel-macros-5.14.21-150400.24.170.1.noarch",
        "relates_to_product_reference": "SUSE Manager Proxy 4.3"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-source-5.14.21-150400.24.170.1.noarch as component of SUSE Manager Proxy 4.3",
          "product_id": "SUSE Manager Proxy 4.3:kernel-source-5.14.21-150400.24.170.1.noarch"
        },
        "product_reference": "kernel-source-5.14.21-150400.24.170.1.noarch",
        "relates_to_product_reference": "SUSE Manager Proxy 4.3"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-syms-5.14.21-150400.24.170.1.x86_64 as component of SUSE Manager Proxy 4.3",
          "product_id": "SUSE Manager Proxy 4.3:kernel-syms-5.14.21-150400.24.170.1.x86_64"
        },
        "product_reference": "kernel-syms-5.14.21-150400.24.170.1.x86_64",
        "relates_to_product_reference": "SUSE Manager Proxy 4.3"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-default-5.14.21-150400.24.170.2.ppc64le as component of SUSE Manager Server 4.3",
          "product_id": "SUSE Manager Server 4.3:kernel-default-5.14.21-150400.24.170.2.ppc64le"
        },
        "product_reference": "kernel-default-5.14.21-150400.24.170.2.ppc64le",
        "relates_to_product_reference": "SUSE Manager Server 4.3"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-default-5.14.21-150400.24.170.2.s390x as component of SUSE Manager Server 4.3",
          "product_id": "SUSE Manager Server 4.3:kernel-default-5.14.21-150400.24.170.2.s390x"
        },
        "product_reference": "kernel-default-5.14.21-150400.24.170.2.s390x",
        "relates_to_product_reference": "SUSE Manager Server 4.3"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-default-5.14.21-150400.24.170.2.x86_64 as component of SUSE Manager Server 4.3",
          "product_id": "SUSE Manager Server 4.3:kernel-default-5.14.21-150400.24.170.2.x86_64"
        },
        "product_reference": "kernel-default-5.14.21-150400.24.170.2.x86_64",
        "relates_to_product_reference": "SUSE Manager Server 4.3"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.ppc64le as component of SUSE Manager Server 4.3",
          "product_id": "SUSE Manager Server 4.3:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.ppc64le"
        },
        "product_reference": "kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.ppc64le",
        "relates_to_product_reference": "SUSE Manager Server 4.3"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64 as component of SUSE Manager Server 4.3",
          "product_id": "SUSE Manager Server 4.3:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64"
        },
        "product_reference": "kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
        "relates_to_product_reference": "SUSE Manager Server 4.3"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-default-devel-5.14.21-150400.24.170.2.ppc64le as component of SUSE Manager Server 4.3",
          "product_id": "SUSE Manager Server 4.3:kernel-default-devel-5.14.21-150400.24.170.2.ppc64le"
        },
        "product_reference": "kernel-default-devel-5.14.21-150400.24.170.2.ppc64le",
        "relates_to_product_reference": "SUSE Manager Server 4.3"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-default-devel-5.14.21-150400.24.170.2.s390x as component of SUSE Manager Server 4.3",
          "product_id": "SUSE Manager Server 4.3:kernel-default-devel-5.14.21-150400.24.170.2.s390x"
        },
        "product_reference": "kernel-default-devel-5.14.21-150400.24.170.2.s390x",
        "relates_to_product_reference": "SUSE Manager Server 4.3"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-default-devel-5.14.21-150400.24.170.2.x86_64 as component of SUSE Manager Server 4.3",
          "product_id": "SUSE Manager Server 4.3:kernel-default-devel-5.14.21-150400.24.170.2.x86_64"
        },
        "product_reference": "kernel-default-devel-5.14.21-150400.24.170.2.x86_64",
        "relates_to_product_reference": "SUSE Manager Server 4.3"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-devel-5.14.21-150400.24.170.1.noarch as component of SUSE Manager Server 4.3",
          "product_id": "SUSE Manager Server 4.3:kernel-devel-5.14.21-150400.24.170.1.noarch"
        },
        "product_reference": "kernel-devel-5.14.21-150400.24.170.1.noarch",
        "relates_to_product_reference": "SUSE Manager Server 4.3"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-macros-5.14.21-150400.24.170.1.noarch as component of SUSE Manager Server 4.3",
          "product_id": "SUSE Manager Server 4.3:kernel-macros-5.14.21-150400.24.170.1.noarch"
        },
        "product_reference": "kernel-macros-5.14.21-150400.24.170.1.noarch",
        "relates_to_product_reference": "SUSE Manager Server 4.3"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-source-5.14.21-150400.24.170.1.noarch as component of SUSE Manager Server 4.3",
          "product_id": "SUSE Manager Server 4.3:kernel-source-5.14.21-150400.24.170.1.noarch"
        },
        "product_reference": "kernel-source-5.14.21-150400.24.170.1.noarch",
        "relates_to_product_reference": "SUSE Manager Server 4.3"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-syms-5.14.21-150400.24.170.1.ppc64le as component of SUSE Manager Server 4.3",
          "product_id": "SUSE Manager Server 4.3:kernel-syms-5.14.21-150400.24.170.1.ppc64le"
        },
        "product_reference": "kernel-syms-5.14.21-150400.24.170.1.ppc64le",
        "relates_to_product_reference": "SUSE Manager Server 4.3"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-syms-5.14.21-150400.24.170.1.s390x as component of SUSE Manager Server 4.3",
          "product_id": "SUSE Manager Server 4.3:kernel-syms-5.14.21-150400.24.170.1.s390x"
        },
        "product_reference": "kernel-syms-5.14.21-150400.24.170.1.s390x",
        "relates_to_product_reference": "SUSE Manager Server 4.3"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-syms-5.14.21-150400.24.170.1.x86_64 as component of SUSE Manager Server 4.3",
          "product_id": "SUSE Manager Server 4.3:kernel-syms-5.14.21-150400.24.170.1.x86_64"
        },
        "product_reference": "kernel-syms-5.14.21-150400.24.170.1.x86_64",
        "relates_to_product_reference": "SUSE Manager Server 4.3"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-zfcpdump-5.14.21-150400.24.170.2.s390x as component of SUSE Manager Server 4.3",
          "product_id": "SUSE Manager Server 4.3:kernel-zfcpdump-5.14.21-150400.24.170.2.s390x"
        },
        "product_reference": "kernel-zfcpdump-5.14.21-150400.24.170.2.s390x",
        "relates_to_product_reference": "SUSE Manager Server 4.3"
      }
    ]
  },
  "vulnerabilities": [
    {
      "cve": "CVE-2021-47557",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2021-47557"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "In the Linux kernel, the following vulnerability has been resolved:\n\nnet/sched: sch_ets: don\u0027t peek at classes beyond \u0027nbands\u0027\n\nwhen the number of DRR classes decreases, the round-robin active list can\ncontain elements that have already been freed in ets_qdisc_change(). As a\nconsequence, it\u0027s possible to see a NULL dereference crash, caused by the\nattempt to call cl-\u003eqdisc-\u003eops-\u003epeek(cl-\u003eqdisc) when cl-\u003eqdisc is NULL:\n\n BUG: kernel NULL pointer dereference, address: 0000000000000018\n #PF: supervisor read access in kernel mode\n #PF: error_code(0x0000) - not-present page\n PGD 0 P4D 0\n Oops: 0000 [#1] PREEMPT SMP NOPTI\n CPU: 1 PID: 910 Comm: mausezahn Not tainted 5.16.0-rc1+ #475\n Hardware name: Red Hat KVM, BIOS 1.11.1-4.module+el8.1.0+4066+0f1aadab 04/01/2014\n RIP: 0010:ets_qdisc_dequeue+0x129/0x2c0 [sch_ets]\n Code: c5 01 41 39 ad e4 02 00 00 0f 87 18 ff ff ff 49 8b 85 c0 02 00 00 49 39 c4 0f 84 ba 00 00 00 49 8b ad c0 02 00 00 48 8b 7d 10 \u003c48\u003e 8b 47 18 48 8b 40 38 0f ae e8 ff d0 48 89 c3 48 85 c0 0f 84 9d\n RSP: 0000:ffffbb36c0b5fdd8 EFLAGS: 00010287\n RAX: ffff956678efed30 RBX: 0000000000000000 RCX: 0000000000000000\n RDX: 0000000000000002 RSI: ffffffff9b938dc9 RDI: 0000000000000000\n RBP: ffff956678efed30 R08: e2f3207fe360129c R09: 0000000000000000\n R10: 0000000000000001 R11: 0000000000000001 R12: ffff956678efeac0\n R13: ffff956678efe800 R14: ffff956611545000 R15: ffff95667ac8f100\n FS:  00007f2aa9120740(0000) GS:ffff95667b800000(0000) knlGS:0000000000000000\n CS:  0010 DS: 0000 ES: 0000 CR0: 0000000080050033\n CR2: 0000000000000018 CR3: 000000011070c000 CR4: 0000000000350ee0\n Call Trace:\n  \u003cTASK\u003e\n  qdisc_peek_dequeued+0x29/0x70 [sch_ets]\n  tbf_dequeue+0x22/0x260 [sch_tbf]\n  __qdisc_run+0x7f/0x630\n  net_tx_action+0x290/0x4c0\n  __do_softirq+0xee/0x4f8\n  irq_exit_rcu+0xf4/0x130\n  sysvec_apic_timer_interrupt+0x52/0xc0\n  asm_sysvec_apic_timer_interrupt+0x12/0x20\n RIP: 0033:0x7f2aa7fc9ad4\n Code: b9 ff ff 48 8b 54 24 18 48 83 c4 08 48 89 ee 48 89 df 5b 5d e9 ed fc ff ff 0f 1f 00 66 2e 0f 1f 84 00 00 00 00 00 f3 0f 1e fa \u003c53\u003e 48 83 ec 10 48 8b 05 10 64 33 00 48 8b 00 48 85 c0 0f 85 84 00\n RSP: 002b:00007ffe5d33fab8 EFLAGS: 00000202\n RAX: 0000000000000002 RBX: 0000561f72c31460 RCX: 0000561f72c31720\n RDX: 0000000000000002 RSI: 0000561f72c31722 RDI: 0000561f72c31720\n RBP: 000000000000002a R08: 00007ffe5d33fa40 R09: 0000000000000014\n R10: 0000000000000000 R11: 0000000000000246 R12: 0000561f7187e380\n R13: 0000000000000000 R14: 0000000000000000 R15: 0000561f72c31460\n  \u003c/TASK\u003e\n Modules linked in: sch_ets sch_tbf dummy rfkill iTCO_wdt intel_rapl_msr iTCO_vendor_support intel_rapl_common joydev virtio_balloon lpc_ich i2c_i801 i2c_smbus pcspkr ip_tables xfs libcrc32c crct10dif_pclmul crc32_pclmul crc32c_intel ahci libahci ghash_clmulni_intel serio_raw libata virtio_blk virtio_console virtio_net net_failover failover sunrpc dm_mirror dm_region_hash dm_log dm_mod\n CR2: 0000000000000018\n\nEnsuring that \u0027alist\u0027 was never zeroed [1] was not sufficient, we need to\nremove from the active list those elements that are no more SP nor DRR.\n\n[1] https://lore.kernel.org/netdev/60d274838bf09777f0371253416e8af71360bc08.1633609148.git.dcaratti@redhat.com/\n\nv3: fix race between ets_qdisc_change() and ets_qdisc_dequeue() delisting\n    DRR classes beyond \u0027nbands\u0027 in ets_qdisc_change() with the qdisc lock\n    acquired, thanks to Cong Wang.\n\nv2: when a NULL qdisc is found in the DRR active list, try to dequeue skb\n    from the next list item.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.170.2.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.170.2.s390x",
          "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.170.2.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.170.2.s390x",
          "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.170.2.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.170.2.s390x",
          "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.170.2.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.170.2.s390x",
          "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-64kb-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-64kb-devel-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-devel-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-devel-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-devel-5.14.21-150400.24.170.1.noarch",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-docs-5.14.21-150400.24.170.1.noarch",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-macros-5.14.21-150400.24.170.1.noarch",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-obs-build-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-obs-build-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-source-5.14.21-150400.24.170.1.noarch",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-syms-5.14.21-150400.24.170.1.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-syms-5.14.21-150400.24.170.1.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:reiserfs-kmp-default-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:reiserfs-kmp-default-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-64kb-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-64kb-devel-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-devel-5.14.21-150400.24.170.1.noarch",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-docs-5.14.21-150400.24.170.1.noarch",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-macros-5.14.21-150400.24.170.1.noarch",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-source-5.14.21-150400.24.170.1.noarch",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.170.1.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.170.1.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.170.2.ppc64le",
          "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.170.2.s390x",
          "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.170.2.ppc64le",
          "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.170.2.s390x",
          "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_170-default-1-150400.9.3.2.ppc64le",
          "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_170-default-1-150400.9.3.2.s390x",
          "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_170-default-1-150400.9.3.2.x86_64",
          "SUSE Linux Enterprise Micro 5.3:kernel-default-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise Micro 5.3:kernel-default-5.14.21-150400.24.170.2.s390x",
          "SUSE Linux Enterprise Micro 5.3:kernel-default-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise Micro 5.3:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.aarch64",
          "SUSE Linux Enterprise Micro 5.3:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
          "SUSE Linux Enterprise Micro 5.4:kernel-default-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise Micro 5.4:kernel-default-5.14.21-150400.24.170.2.s390x",
          "SUSE Linux Enterprise Micro 5.4:kernel-default-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise Micro 5.4:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.aarch64",
          "SUSE Linux Enterprise Micro 5.4:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-64kb-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-64kb-devel-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-5.14.21-150400.24.170.2.ppc64le",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-5.14.21-150400.24.170.2.s390x",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.aarch64",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.ppc64le",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.170.2.ppc64le",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.170.2.s390x",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-devel-5.14.21-150400.24.170.1.noarch",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-docs-5.14.21-150400.24.170.1.noarch",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-macros-5.14.21-150400.24.170.1.noarch",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.170.2.ppc64le",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.170.2.s390x",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-source-5.14.21-150400.24.170.1.noarch",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.170.1.aarch64",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.170.1.ppc64le",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.170.1.s390x",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.170.1.x86_64",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-zfcpdump-5.14.21-150400.24.170.2.s390x",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.170.2.ppc64le",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.170.2.s390x",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-5.14.21-150400.24.170.2.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-devel-5.14.21-150400.24.170.2.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-devel-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-devel-5.14.21-150400.24.170.1.noarch",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-docs-5.14.21-150400.24.170.1.noarch",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-macros-5.14.21-150400.24.170.1.noarch",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-obs-build-5.14.21-150400.24.170.2.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-obs-build-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-source-5.14.21-150400.24.170.1.noarch",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-syms-5.14.21-150400.24.170.1.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-syms-5.14.21-150400.24.170.1.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.170.2.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.170.2.x86_64",
          "SUSE Manager Proxy 4.3:kernel-default-5.14.21-150400.24.170.2.x86_64",
          "SUSE Manager Proxy 4.3:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
          "SUSE Manager Proxy 4.3:kernel-default-devel-5.14.21-150400.24.170.2.x86_64",
          "SUSE Manager Proxy 4.3:kernel-devel-5.14.21-150400.24.170.1.noarch",
          "SUSE Manager Proxy 4.3:kernel-macros-5.14.21-150400.24.170.1.noarch",
          "SUSE Manager Proxy 4.3:kernel-source-5.14.21-150400.24.170.1.noarch",
          "SUSE Manager Proxy 4.3:kernel-syms-5.14.21-150400.24.170.1.x86_64",
          "SUSE Manager Server 4.3:kernel-default-5.14.21-150400.24.170.2.ppc64le",
          "SUSE Manager Server 4.3:kernel-default-5.14.21-150400.24.170.2.s390x",
          "SUSE Manager Server 4.3:kernel-default-5.14.21-150400.24.170.2.x86_64",
          "SUSE Manager Server 4.3:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.ppc64le",
          "SUSE Manager Server 4.3:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
          "SUSE Manager Server 4.3:kernel-default-devel-5.14.21-150400.24.170.2.ppc64le",
          "SUSE Manager Server 4.3:kernel-default-devel-5.14.21-150400.24.170.2.s390x",
          "SUSE Manager Server 4.3:kernel-default-devel-5.14.21-150400.24.170.2.x86_64",
          "SUSE Manager Server 4.3:kernel-devel-5.14.21-150400.24.170.1.noarch",
          "SUSE Manager Server 4.3:kernel-macros-5.14.21-150400.24.170.1.noarch",
          "SUSE Manager Server 4.3:kernel-source-5.14.21-150400.24.170.1.noarch",
          "SUSE Manager Server 4.3:kernel-syms-5.14.21-150400.24.170.1.ppc64le",
          "SUSE Manager Server 4.3:kernel-syms-5.14.21-150400.24.170.1.s390x",
          "SUSE Manager Server 4.3:kernel-syms-5.14.21-150400.24.170.1.x86_64",
          "SUSE Manager Server 4.3:kernel-zfcpdump-5.14.21-150400.24.170.2.s390x"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2021-47557",
          "url": "https://www.suse.com/security/cve/CVE-2021-47557"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1225468 for CVE-2021-47557",
          "url": "https://bugzilla.suse.com/1225468"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-64kb-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-64kb-devel-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-devel-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-devel-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-devel-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-docs-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-macros-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-obs-build-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-obs-build-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-source-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-syms-5.14.21-150400.24.170.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-syms-5.14.21-150400.24.170.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:reiserfs-kmp-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:reiserfs-kmp-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-64kb-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-64kb-devel-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-devel-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-docs-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-macros-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-source-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.170.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.170.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_170-default-1-150400.9.3.2.ppc64le",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_170-default-1-150400.9.3.2.s390x",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_170-default-1-150400.9.3.2.x86_64",
            "SUSE Linux Enterprise Micro 5.3:kernel-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise Micro 5.3:kernel-default-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise Micro 5.3:kernel-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Micro 5.3:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.aarch64",
            "SUSE Linux Enterprise Micro 5.3:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
            "SUSE Linux Enterprise Micro 5.4:kernel-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise Micro 5.4:kernel-default-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise Micro 5.4:kernel-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Micro 5.4:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.aarch64",
            "SUSE Linux Enterprise Micro 5.4:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-64kb-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-64kb-devel-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.aarch64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.ppc64le",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-devel-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-docs-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-macros-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-source-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.170.1.aarch64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.170.1.ppc64le",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.170.1.s390x",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.170.1.x86_64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-zfcpdump-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-devel-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-devel-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-devel-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-docs-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-macros-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-obs-build-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-obs-build-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-source-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-syms-5.14.21-150400.24.170.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-syms-5.14.21-150400.24.170.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Manager Proxy 4.3:kernel-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Manager Proxy 4.3:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
            "SUSE Manager Proxy 4.3:kernel-default-devel-5.14.21-150400.24.170.2.x86_64",
            "SUSE Manager Proxy 4.3:kernel-devel-5.14.21-150400.24.170.1.noarch",
            "SUSE Manager Proxy 4.3:kernel-macros-5.14.21-150400.24.170.1.noarch",
            "SUSE Manager Proxy 4.3:kernel-source-5.14.21-150400.24.170.1.noarch",
            "SUSE Manager Proxy 4.3:kernel-syms-5.14.21-150400.24.170.1.x86_64",
            "SUSE Manager Server 4.3:kernel-default-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Manager Server 4.3:kernel-default-5.14.21-150400.24.170.2.s390x",
            "SUSE Manager Server 4.3:kernel-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Manager Server 4.3:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.ppc64le",
            "SUSE Manager Server 4.3:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
            "SUSE Manager Server 4.3:kernel-default-devel-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Manager Server 4.3:kernel-default-devel-5.14.21-150400.24.170.2.s390x",
            "SUSE Manager Server 4.3:kernel-default-devel-5.14.21-150400.24.170.2.x86_64",
            "SUSE Manager Server 4.3:kernel-devel-5.14.21-150400.24.170.1.noarch",
            "SUSE Manager Server 4.3:kernel-macros-5.14.21-150400.24.170.1.noarch",
            "SUSE Manager Server 4.3:kernel-source-5.14.21-150400.24.170.1.noarch",
            "SUSE Manager Server 4.3:kernel-syms-5.14.21-150400.24.170.1.ppc64le",
            "SUSE Manager Server 4.3:kernel-syms-5.14.21-150400.24.170.1.s390x",
            "SUSE Manager Server 4.3:kernel-syms-5.14.21-150400.24.170.1.x86_64",
            "SUSE Manager Server 4.3:kernel-zfcpdump-5.14.21-150400.24.170.2.s390x"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 5.5,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
            "version": "3.1"
          },
          "products": [
            "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-64kb-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-64kb-devel-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-devel-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-devel-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-devel-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-docs-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-macros-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-obs-build-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-obs-build-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-source-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-syms-5.14.21-150400.24.170.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-syms-5.14.21-150400.24.170.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:reiserfs-kmp-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:reiserfs-kmp-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-64kb-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-64kb-devel-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-devel-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-docs-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-macros-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-source-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.170.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.170.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_170-default-1-150400.9.3.2.ppc64le",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_170-default-1-150400.9.3.2.s390x",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_170-default-1-150400.9.3.2.x86_64",
            "SUSE Linux Enterprise Micro 5.3:kernel-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise Micro 5.3:kernel-default-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise Micro 5.3:kernel-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Micro 5.3:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.aarch64",
            "SUSE Linux Enterprise Micro 5.3:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
            "SUSE Linux Enterprise Micro 5.4:kernel-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise Micro 5.4:kernel-default-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise Micro 5.4:kernel-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Micro 5.4:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.aarch64",
            "SUSE Linux Enterprise Micro 5.4:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-64kb-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-64kb-devel-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.aarch64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.ppc64le",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-devel-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-docs-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-macros-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-source-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.170.1.aarch64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.170.1.ppc64le",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.170.1.s390x",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.170.1.x86_64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-zfcpdump-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-devel-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-devel-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-devel-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-docs-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-macros-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-obs-build-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-obs-build-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-source-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-syms-5.14.21-150400.24.170.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-syms-5.14.21-150400.24.170.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Manager Proxy 4.3:kernel-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Manager Proxy 4.3:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
            "SUSE Manager Proxy 4.3:kernel-default-devel-5.14.21-150400.24.170.2.x86_64",
            "SUSE Manager Proxy 4.3:kernel-devel-5.14.21-150400.24.170.1.noarch",
            "SUSE Manager Proxy 4.3:kernel-macros-5.14.21-150400.24.170.1.noarch",
            "SUSE Manager Proxy 4.3:kernel-source-5.14.21-150400.24.170.1.noarch",
            "SUSE Manager Proxy 4.3:kernel-syms-5.14.21-150400.24.170.1.x86_64",
            "SUSE Manager Server 4.3:kernel-default-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Manager Server 4.3:kernel-default-5.14.21-150400.24.170.2.s390x",
            "SUSE Manager Server 4.3:kernel-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Manager Server 4.3:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.ppc64le",
            "SUSE Manager Server 4.3:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
            "SUSE Manager Server 4.3:kernel-default-devel-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Manager Server 4.3:kernel-default-devel-5.14.21-150400.24.170.2.s390x",
            "SUSE Manager Server 4.3:kernel-default-devel-5.14.21-150400.24.170.2.x86_64",
            "SUSE Manager Server 4.3:kernel-devel-5.14.21-150400.24.170.1.noarch",
            "SUSE Manager Server 4.3:kernel-macros-5.14.21-150400.24.170.1.noarch",
            "SUSE Manager Server 4.3:kernel-source-5.14.21-150400.24.170.1.noarch",
            "SUSE Manager Server 4.3:kernel-syms-5.14.21-150400.24.170.1.ppc64le",
            "SUSE Manager Server 4.3:kernel-syms-5.14.21-150400.24.170.1.s390x",
            "SUSE Manager Server 4.3:kernel-syms-5.14.21-150400.24.170.1.x86_64",
            "SUSE Manager Server 4.3:kernel-zfcpdump-5.14.21-150400.24.170.2.s390x"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2025-07-28T15:09:33Z",
          "details": "moderate"
        }
      ],
      "title": "CVE-2021-47557"
    },
    {
      "cve": "CVE-2021-47595",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2021-47595"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "In the Linux kernel, the following vulnerability has been resolved:\n\nnet/sched: sch_ets: don\u0027t remove idle classes from the round-robin list\n\nShuang reported that the following script:\n\n 1) tc qdisc add dev ddd0 handle 10: parent 1: ets bands 8 strict 4 priomap 7 7 7 7 7 7 7 7 7 7 7 7 7 7 7 7\n 2) mausezahn ddd0  -A 10.10.10.1 -B 10.10.10.2 -c 0 -a own -b 00:c1:a0:c1:a0:00 -t udp \u0026\n 3) tc qdisc change dev ddd0 handle 10: ets bands 4 strict 2 quanta 2500 2500 priomap 3 3 3 3 3 3 3 3 3 3 3 3 3 3 3 3\n\ncrashes systematically when line 2) is commented:\n\n list_del corruption, ffff8e028404bd30-\u003enext is LIST_POISON1 (dead000000000100)\n ------------[ cut here ]------------\n kernel BUG at lib/list_debug.c:47!\n invalid opcode: 0000 [#1] PREEMPT SMP NOPTI\n CPU: 0 PID: 954 Comm: tc Not tainted 5.16.0-rc4+ #478\n Hardware name: Red Hat KVM, BIOS 1.11.1-4.module+el8.1.0+4066+0f1aadab 04/01/2014\n RIP: 0010:__list_del_entry_valid.cold.1+0x12/0x47\n Code: fe ff 0f 0b 48 89 c1 4c 89 c6 48 c7 c7 08 42 1b 87 e8 1d c5 fe ff 0f 0b 48 89 fe 48 89 c2 48 c7 c7 98 42 1b 87 e8 09 c5 fe ff \u003c0f\u003e 0b 48 c7 c7 48 43 1b 87 e8 fb c4 fe ff 0f 0b 48 89 f2 48 89 fe\n RSP: 0018:ffffae46807a3888 EFLAGS: 00010246\n RAX: 000000000000004e RBX: 0000000000000007 RCX: 0000000000000202\n RDX: 0000000000000000 RSI: ffffffff871ac536 RDI: 00000000ffffffff\n RBP: ffffae46807a3a10 R08: 0000000000000000 R09: c0000000ffff7fff\n R10: 0000000000000001 R11: ffffae46807a36a8 R12: ffff8e028404b800\n R13: ffff8e028404bd30 R14: dead000000000100 R15: ffff8e02fafa2400\n FS:  00007efdc92e4480(0000) GS:ffff8e02fb600000(0000) knlGS:0000000000000000\n CS:  0010 DS: 0000 ES: 0000 CR0: 0000000080050033\n CR2: 0000000000682f48 CR3: 00000001058be000 CR4: 0000000000350ef0\n Call Trace:\n  \u003cTASK\u003e\n  ets_qdisc_change+0x58b/0xa70 [sch_ets]\n  tc_modify_qdisc+0x323/0x880\n  rtnetlink_rcv_msg+0x169/0x4a0\n  netlink_rcv_skb+0x50/0x100\n  netlink_unicast+0x1a5/0x280\n  netlink_sendmsg+0x257/0x4d0\n  sock_sendmsg+0x5b/0x60\n  ____sys_sendmsg+0x1f2/0x260\n  ___sys_sendmsg+0x7c/0xc0\n  __sys_sendmsg+0x57/0xa0\n  do_syscall_64+0x3a/0x80\n  entry_SYSCALL_64_after_hwframe+0x44/0xae\n RIP: 0033:0x7efdc8031338\n Code: 89 02 48 c7 c0 ff ff ff ff eb b5 0f 1f 80 00 00 00 00 f3 0f 1e fa 48 8d 05 25 43 2c 00 8b 00 85 c0 75 17 b8 2e 00 00 00 0f 05 \u003c48\u003e 3d 00 f0 ff ff 77 58 c3 0f 1f 80 00 00 00 00 41 54 41 89 d4 55\n RSP: 002b:00007ffdf1ce9828 EFLAGS: 00000246 ORIG_RAX: 000000000000002e\n RAX: ffffffffffffffda RBX: 0000000061b37a97 RCX: 00007efdc8031338\n RDX: 0000000000000000 RSI: 00007ffdf1ce9890 RDI: 0000000000000003\n RBP: 0000000000000000 R08: 0000000000000001 R09: 000000000078a940\n R10: 000000000000000c R11: 0000000000000246 R12: 0000000000000001\n R13: 0000000000688880 R14: 0000000000000000 R15: 0000000000000000\n  \u003c/TASK\u003e\n Modules linked in: sch_ets sch_tbf dummy rfkill iTCO_wdt iTCO_vendor_support intel_rapl_msr intel_rapl_common joydev pcspkr i2c_i801 virtio_balloon i2c_smbus lpc_ich ip_tables xfs libcrc32c crct10dif_pclmul crc32_pclmul crc32c_intel serio_raw ghash_clmulni_intel ahci libahci libata virtio_blk virtio_console virtio_net net_failover failover sunrpc dm_mirror dm_region_hash dm_log dm_mod [last unloaded: sch_ets]\n ---[ end trace f35878d1912655c2 ]---\n RIP: 0010:__list_del_entry_valid.cold.1+0x12/0x47\n Code: fe ff 0f 0b 48 89 c1 4c 89 c6 48 c7 c7 08 42 1b 87 e8 1d c5 fe ff 0f 0b 48 89 fe 48 89 c2 48 c7 c7 98 42 1b 87 e8 09 c5 fe ff \u003c0f\u003e 0b 48 c7 c7 48 43 1b 87 e8 fb c4 fe ff 0f 0b 48 89 f2 48 89 fe\n RSP: 0018:ffffae46807a3888 EFLAGS: 00010246\n RAX: 000000000000004e RBX: 0000000000000007 RCX: 0000000000000202\n RDX: 0000000000000000 RSI: ffffffff871ac536 RDI: 00000000ffffffff\n RBP: ffffae46807a3a10 R08: 0000000000000000 R09: c0000000ffff7fff\n R10: 0000000000000001 R11: ffffae46807a36a8 R12: ffff8e028404b800\n R13: ffff8e028404bd30 R14: dead000000000100 R15: ffff8e02fafa2400\n FS:  00007efdc92e4480(0000) GS:ffff8e02fb600000(0000) knlGS:0000000000000000\n CS:  0010 DS: 0000 ES: 0000 CR0: 0000000080050033\n CR2: 000000000\n---truncated---",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.170.2.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.170.2.s390x",
          "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.170.2.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.170.2.s390x",
          "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.170.2.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.170.2.s390x",
          "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.170.2.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.170.2.s390x",
          "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-64kb-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-64kb-devel-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-devel-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-devel-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-devel-5.14.21-150400.24.170.1.noarch",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-docs-5.14.21-150400.24.170.1.noarch",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-macros-5.14.21-150400.24.170.1.noarch",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-obs-build-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-obs-build-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-source-5.14.21-150400.24.170.1.noarch",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-syms-5.14.21-150400.24.170.1.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-syms-5.14.21-150400.24.170.1.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:reiserfs-kmp-default-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:reiserfs-kmp-default-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-64kb-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-64kb-devel-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-devel-5.14.21-150400.24.170.1.noarch",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-docs-5.14.21-150400.24.170.1.noarch",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-macros-5.14.21-150400.24.170.1.noarch",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-source-5.14.21-150400.24.170.1.noarch",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.170.1.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.170.1.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.170.2.ppc64le",
          "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.170.2.s390x",
          "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.170.2.ppc64le",
          "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.170.2.s390x",
          "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_170-default-1-150400.9.3.2.ppc64le",
          "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_170-default-1-150400.9.3.2.s390x",
          "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_170-default-1-150400.9.3.2.x86_64",
          "SUSE Linux Enterprise Micro 5.3:kernel-default-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise Micro 5.3:kernel-default-5.14.21-150400.24.170.2.s390x",
          "SUSE Linux Enterprise Micro 5.3:kernel-default-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise Micro 5.3:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.aarch64",
          "SUSE Linux Enterprise Micro 5.3:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
          "SUSE Linux Enterprise Micro 5.4:kernel-default-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise Micro 5.4:kernel-default-5.14.21-150400.24.170.2.s390x",
          "SUSE Linux Enterprise Micro 5.4:kernel-default-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise Micro 5.4:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.aarch64",
          "SUSE Linux Enterprise Micro 5.4:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-64kb-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-64kb-devel-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-5.14.21-150400.24.170.2.ppc64le",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-5.14.21-150400.24.170.2.s390x",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.aarch64",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.ppc64le",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.170.2.ppc64le",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.170.2.s390x",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-devel-5.14.21-150400.24.170.1.noarch",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-docs-5.14.21-150400.24.170.1.noarch",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-macros-5.14.21-150400.24.170.1.noarch",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.170.2.ppc64le",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.170.2.s390x",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-source-5.14.21-150400.24.170.1.noarch",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.170.1.aarch64",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.170.1.ppc64le",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.170.1.s390x",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.170.1.x86_64",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-zfcpdump-5.14.21-150400.24.170.2.s390x",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.170.2.ppc64le",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.170.2.s390x",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-5.14.21-150400.24.170.2.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-devel-5.14.21-150400.24.170.2.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-devel-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-devel-5.14.21-150400.24.170.1.noarch",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-docs-5.14.21-150400.24.170.1.noarch",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-macros-5.14.21-150400.24.170.1.noarch",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-obs-build-5.14.21-150400.24.170.2.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-obs-build-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-source-5.14.21-150400.24.170.1.noarch",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-syms-5.14.21-150400.24.170.1.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-syms-5.14.21-150400.24.170.1.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.170.2.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.170.2.x86_64",
          "SUSE Manager Proxy 4.3:kernel-default-5.14.21-150400.24.170.2.x86_64",
          "SUSE Manager Proxy 4.3:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
          "SUSE Manager Proxy 4.3:kernel-default-devel-5.14.21-150400.24.170.2.x86_64",
          "SUSE Manager Proxy 4.3:kernel-devel-5.14.21-150400.24.170.1.noarch",
          "SUSE Manager Proxy 4.3:kernel-macros-5.14.21-150400.24.170.1.noarch",
          "SUSE Manager Proxy 4.3:kernel-source-5.14.21-150400.24.170.1.noarch",
          "SUSE Manager Proxy 4.3:kernel-syms-5.14.21-150400.24.170.1.x86_64",
          "SUSE Manager Server 4.3:kernel-default-5.14.21-150400.24.170.2.ppc64le",
          "SUSE Manager Server 4.3:kernel-default-5.14.21-150400.24.170.2.s390x",
          "SUSE Manager Server 4.3:kernel-default-5.14.21-150400.24.170.2.x86_64",
          "SUSE Manager Server 4.3:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.ppc64le",
          "SUSE Manager Server 4.3:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
          "SUSE Manager Server 4.3:kernel-default-devel-5.14.21-150400.24.170.2.ppc64le",
          "SUSE Manager Server 4.3:kernel-default-devel-5.14.21-150400.24.170.2.s390x",
          "SUSE Manager Server 4.3:kernel-default-devel-5.14.21-150400.24.170.2.x86_64",
          "SUSE Manager Server 4.3:kernel-devel-5.14.21-150400.24.170.1.noarch",
          "SUSE Manager Server 4.3:kernel-macros-5.14.21-150400.24.170.1.noarch",
          "SUSE Manager Server 4.3:kernel-source-5.14.21-150400.24.170.1.noarch",
          "SUSE Manager Server 4.3:kernel-syms-5.14.21-150400.24.170.1.ppc64le",
          "SUSE Manager Server 4.3:kernel-syms-5.14.21-150400.24.170.1.s390x",
          "SUSE Manager Server 4.3:kernel-syms-5.14.21-150400.24.170.1.x86_64",
          "SUSE Manager Server 4.3:kernel-zfcpdump-5.14.21-150400.24.170.2.s390x"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2021-47595",
          "url": "https://www.suse.com/security/cve/CVE-2021-47595"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1226552 for CVE-2021-47595",
          "url": "https://bugzilla.suse.com/1226552"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-64kb-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-64kb-devel-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-devel-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-devel-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-devel-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-docs-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-macros-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-obs-build-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-obs-build-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-source-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-syms-5.14.21-150400.24.170.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-syms-5.14.21-150400.24.170.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:reiserfs-kmp-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:reiserfs-kmp-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-64kb-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-64kb-devel-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-devel-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-docs-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-macros-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-source-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.170.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.170.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_170-default-1-150400.9.3.2.ppc64le",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_170-default-1-150400.9.3.2.s390x",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_170-default-1-150400.9.3.2.x86_64",
            "SUSE Linux Enterprise Micro 5.3:kernel-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise Micro 5.3:kernel-default-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise Micro 5.3:kernel-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Micro 5.3:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.aarch64",
            "SUSE Linux Enterprise Micro 5.3:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
            "SUSE Linux Enterprise Micro 5.4:kernel-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise Micro 5.4:kernel-default-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise Micro 5.4:kernel-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Micro 5.4:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.aarch64",
            "SUSE Linux Enterprise Micro 5.4:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-64kb-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-64kb-devel-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.aarch64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.ppc64le",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-devel-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-docs-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-macros-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-source-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.170.1.aarch64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.170.1.ppc64le",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.170.1.s390x",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.170.1.x86_64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-zfcpdump-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-devel-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-devel-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-devel-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-docs-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-macros-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-obs-build-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-obs-build-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-source-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-syms-5.14.21-150400.24.170.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-syms-5.14.21-150400.24.170.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Manager Proxy 4.3:kernel-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Manager Proxy 4.3:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
            "SUSE Manager Proxy 4.3:kernel-default-devel-5.14.21-150400.24.170.2.x86_64",
            "SUSE Manager Proxy 4.3:kernel-devel-5.14.21-150400.24.170.1.noarch",
            "SUSE Manager Proxy 4.3:kernel-macros-5.14.21-150400.24.170.1.noarch",
            "SUSE Manager Proxy 4.3:kernel-source-5.14.21-150400.24.170.1.noarch",
            "SUSE Manager Proxy 4.3:kernel-syms-5.14.21-150400.24.170.1.x86_64",
            "SUSE Manager Server 4.3:kernel-default-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Manager Server 4.3:kernel-default-5.14.21-150400.24.170.2.s390x",
            "SUSE Manager Server 4.3:kernel-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Manager Server 4.3:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.ppc64le",
            "SUSE Manager Server 4.3:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
            "SUSE Manager Server 4.3:kernel-default-devel-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Manager Server 4.3:kernel-default-devel-5.14.21-150400.24.170.2.s390x",
            "SUSE Manager Server 4.3:kernel-default-devel-5.14.21-150400.24.170.2.x86_64",
            "SUSE Manager Server 4.3:kernel-devel-5.14.21-150400.24.170.1.noarch",
            "SUSE Manager Server 4.3:kernel-macros-5.14.21-150400.24.170.1.noarch",
            "SUSE Manager Server 4.3:kernel-source-5.14.21-150400.24.170.1.noarch",
            "SUSE Manager Server 4.3:kernel-syms-5.14.21-150400.24.170.1.ppc64le",
            "SUSE Manager Server 4.3:kernel-syms-5.14.21-150400.24.170.1.s390x",
            "SUSE Manager Server 4.3:kernel-syms-5.14.21-150400.24.170.1.x86_64",
            "SUSE Manager Server 4.3:kernel-zfcpdump-5.14.21-150400.24.170.2.s390x"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 5.5,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
            "version": "3.1"
          },
          "products": [
            "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-64kb-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-64kb-devel-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-devel-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-devel-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-devel-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-docs-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-macros-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-obs-build-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-obs-build-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-source-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-syms-5.14.21-150400.24.170.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-syms-5.14.21-150400.24.170.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:reiserfs-kmp-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:reiserfs-kmp-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-64kb-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-64kb-devel-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-devel-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-docs-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-macros-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-source-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.170.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.170.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_170-default-1-150400.9.3.2.ppc64le",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_170-default-1-150400.9.3.2.s390x",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_170-default-1-150400.9.3.2.x86_64",
            "SUSE Linux Enterprise Micro 5.3:kernel-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise Micro 5.3:kernel-default-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise Micro 5.3:kernel-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Micro 5.3:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.aarch64",
            "SUSE Linux Enterprise Micro 5.3:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
            "SUSE Linux Enterprise Micro 5.4:kernel-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise Micro 5.4:kernel-default-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise Micro 5.4:kernel-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Micro 5.4:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.aarch64",
            "SUSE Linux Enterprise Micro 5.4:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-64kb-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-64kb-devel-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.aarch64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.ppc64le",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-devel-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-docs-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-macros-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-source-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.170.1.aarch64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.170.1.ppc64le",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.170.1.s390x",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.170.1.x86_64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-zfcpdump-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-devel-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-devel-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-devel-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-docs-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-macros-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-obs-build-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-obs-build-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-source-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-syms-5.14.21-150400.24.170.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-syms-5.14.21-150400.24.170.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Manager Proxy 4.3:kernel-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Manager Proxy 4.3:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
            "SUSE Manager Proxy 4.3:kernel-default-devel-5.14.21-150400.24.170.2.x86_64",
            "SUSE Manager Proxy 4.3:kernel-devel-5.14.21-150400.24.170.1.noarch",
            "SUSE Manager Proxy 4.3:kernel-macros-5.14.21-150400.24.170.1.noarch",
            "SUSE Manager Proxy 4.3:kernel-source-5.14.21-150400.24.170.1.noarch",
            "SUSE Manager Proxy 4.3:kernel-syms-5.14.21-150400.24.170.1.x86_64",
            "SUSE Manager Server 4.3:kernel-default-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Manager Server 4.3:kernel-default-5.14.21-150400.24.170.2.s390x",
            "SUSE Manager Server 4.3:kernel-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Manager Server 4.3:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.ppc64le",
            "SUSE Manager Server 4.3:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
            "SUSE Manager Server 4.3:kernel-default-devel-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Manager Server 4.3:kernel-default-devel-5.14.21-150400.24.170.2.s390x",
            "SUSE Manager Server 4.3:kernel-default-devel-5.14.21-150400.24.170.2.x86_64",
            "SUSE Manager Server 4.3:kernel-devel-5.14.21-150400.24.170.1.noarch",
            "SUSE Manager Server 4.3:kernel-macros-5.14.21-150400.24.170.1.noarch",
            "SUSE Manager Server 4.3:kernel-source-5.14.21-150400.24.170.1.noarch",
            "SUSE Manager Server 4.3:kernel-syms-5.14.21-150400.24.170.1.ppc64le",
            "SUSE Manager Server 4.3:kernel-syms-5.14.21-150400.24.170.1.s390x",
            "SUSE Manager Server 4.3:kernel-syms-5.14.21-150400.24.170.1.x86_64",
            "SUSE Manager Server 4.3:kernel-zfcpdump-5.14.21-150400.24.170.2.s390x"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2025-07-28T15:09:33Z",
          "details": "moderate"
        }
      ],
      "title": "CVE-2021-47595"
    },
    {
      "cve": "CVE-2022-1679",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2022-1679"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "A use-after-free flaw was found in the Linux kernel\u0027s Atheros wireless adapter driver in the way a user forces the ath9k_htc_wait_for_target function to fail with some input messages. This flaw allows a local user to crash or potentially escalate their privileges on the system.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.170.2.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.170.2.s390x",
          "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.170.2.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.170.2.s390x",
          "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.170.2.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.170.2.s390x",
          "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.170.2.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.170.2.s390x",
          "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-64kb-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-64kb-devel-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-devel-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-devel-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-devel-5.14.21-150400.24.170.1.noarch",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-docs-5.14.21-150400.24.170.1.noarch",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-macros-5.14.21-150400.24.170.1.noarch",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-obs-build-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-obs-build-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-source-5.14.21-150400.24.170.1.noarch",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-syms-5.14.21-150400.24.170.1.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-syms-5.14.21-150400.24.170.1.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:reiserfs-kmp-default-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:reiserfs-kmp-default-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-64kb-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-64kb-devel-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-devel-5.14.21-150400.24.170.1.noarch",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-docs-5.14.21-150400.24.170.1.noarch",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-macros-5.14.21-150400.24.170.1.noarch",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-source-5.14.21-150400.24.170.1.noarch",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.170.1.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.170.1.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.170.2.ppc64le",
          "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.170.2.s390x",
          "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.170.2.ppc64le",
          "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.170.2.s390x",
          "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_170-default-1-150400.9.3.2.ppc64le",
          "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_170-default-1-150400.9.3.2.s390x",
          "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_170-default-1-150400.9.3.2.x86_64",
          "SUSE Linux Enterprise Micro 5.3:kernel-default-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise Micro 5.3:kernel-default-5.14.21-150400.24.170.2.s390x",
          "SUSE Linux Enterprise Micro 5.3:kernel-default-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise Micro 5.3:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.aarch64",
          "SUSE Linux Enterprise Micro 5.3:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
          "SUSE Linux Enterprise Micro 5.4:kernel-default-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise Micro 5.4:kernel-default-5.14.21-150400.24.170.2.s390x",
          "SUSE Linux Enterprise Micro 5.4:kernel-default-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise Micro 5.4:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.aarch64",
          "SUSE Linux Enterprise Micro 5.4:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-64kb-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-64kb-devel-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-5.14.21-150400.24.170.2.ppc64le",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-5.14.21-150400.24.170.2.s390x",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.aarch64",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.ppc64le",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.170.2.ppc64le",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.170.2.s390x",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-devel-5.14.21-150400.24.170.1.noarch",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-docs-5.14.21-150400.24.170.1.noarch",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-macros-5.14.21-150400.24.170.1.noarch",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.170.2.ppc64le",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.170.2.s390x",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-source-5.14.21-150400.24.170.1.noarch",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.170.1.aarch64",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.170.1.ppc64le",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.170.1.s390x",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.170.1.x86_64",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-zfcpdump-5.14.21-150400.24.170.2.s390x",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.170.2.ppc64le",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.170.2.s390x",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-5.14.21-150400.24.170.2.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-devel-5.14.21-150400.24.170.2.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-devel-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-devel-5.14.21-150400.24.170.1.noarch",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-docs-5.14.21-150400.24.170.1.noarch",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-macros-5.14.21-150400.24.170.1.noarch",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-obs-build-5.14.21-150400.24.170.2.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-obs-build-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-source-5.14.21-150400.24.170.1.noarch",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-syms-5.14.21-150400.24.170.1.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-syms-5.14.21-150400.24.170.1.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.170.2.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.170.2.x86_64",
          "SUSE Manager Proxy 4.3:kernel-default-5.14.21-150400.24.170.2.x86_64",
          "SUSE Manager Proxy 4.3:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
          "SUSE Manager Proxy 4.3:kernel-default-devel-5.14.21-150400.24.170.2.x86_64",
          "SUSE Manager Proxy 4.3:kernel-devel-5.14.21-150400.24.170.1.noarch",
          "SUSE Manager Proxy 4.3:kernel-macros-5.14.21-150400.24.170.1.noarch",
          "SUSE Manager Proxy 4.3:kernel-source-5.14.21-150400.24.170.1.noarch",
          "SUSE Manager Proxy 4.3:kernel-syms-5.14.21-150400.24.170.1.x86_64",
          "SUSE Manager Server 4.3:kernel-default-5.14.21-150400.24.170.2.ppc64le",
          "SUSE Manager Server 4.3:kernel-default-5.14.21-150400.24.170.2.s390x",
          "SUSE Manager Server 4.3:kernel-default-5.14.21-150400.24.170.2.x86_64",
          "SUSE Manager Server 4.3:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.ppc64le",
          "SUSE Manager Server 4.3:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
          "SUSE Manager Server 4.3:kernel-default-devel-5.14.21-150400.24.170.2.ppc64le",
          "SUSE Manager Server 4.3:kernel-default-devel-5.14.21-150400.24.170.2.s390x",
          "SUSE Manager Server 4.3:kernel-default-devel-5.14.21-150400.24.170.2.x86_64",
          "SUSE Manager Server 4.3:kernel-devel-5.14.21-150400.24.170.1.noarch",
          "SUSE Manager Server 4.3:kernel-macros-5.14.21-150400.24.170.1.noarch",
          "SUSE Manager Server 4.3:kernel-source-5.14.21-150400.24.170.1.noarch",
          "SUSE Manager Server 4.3:kernel-syms-5.14.21-150400.24.170.1.ppc64le",
          "SUSE Manager Server 4.3:kernel-syms-5.14.21-150400.24.170.1.s390x",
          "SUSE Manager Server 4.3:kernel-syms-5.14.21-150400.24.170.1.x86_64",
          "SUSE Manager Server 4.3:kernel-zfcpdump-5.14.21-150400.24.170.2.s390x"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2022-1679",
          "url": "https://www.suse.com/security/cve/CVE-2022-1679"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1199487 for CVE-2022-1679",
          "url": "https://bugzilla.suse.com/1199487"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1201080 for CVE-2022-1679",
          "url": "https://bugzilla.suse.com/1201080"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1201832 for CVE-2022-1679",
          "url": "https://bugzilla.suse.com/1201832"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1204132 for CVE-2022-1679",
          "url": "https://bugzilla.suse.com/1204132"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1212316 for CVE-2022-1679",
          "url": "https://bugzilla.suse.com/1212316"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-64kb-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-64kb-devel-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-devel-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-devel-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-devel-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-docs-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-macros-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-obs-build-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-obs-build-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-source-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-syms-5.14.21-150400.24.170.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-syms-5.14.21-150400.24.170.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:reiserfs-kmp-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:reiserfs-kmp-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-64kb-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-64kb-devel-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-devel-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-docs-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-macros-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-source-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.170.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.170.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_170-default-1-150400.9.3.2.ppc64le",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_170-default-1-150400.9.3.2.s390x",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_170-default-1-150400.9.3.2.x86_64",
            "SUSE Linux Enterprise Micro 5.3:kernel-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise Micro 5.3:kernel-default-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise Micro 5.3:kernel-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Micro 5.3:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.aarch64",
            "SUSE Linux Enterprise Micro 5.3:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
            "SUSE Linux Enterprise Micro 5.4:kernel-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise Micro 5.4:kernel-default-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise Micro 5.4:kernel-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Micro 5.4:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.aarch64",
            "SUSE Linux Enterprise Micro 5.4:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-64kb-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-64kb-devel-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.aarch64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.ppc64le",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-devel-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-docs-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-macros-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-source-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.170.1.aarch64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.170.1.ppc64le",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.170.1.s390x",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.170.1.x86_64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-zfcpdump-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-devel-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-devel-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-devel-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-docs-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-macros-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-obs-build-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-obs-build-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-source-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-syms-5.14.21-150400.24.170.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-syms-5.14.21-150400.24.170.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Manager Proxy 4.3:kernel-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Manager Proxy 4.3:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
            "SUSE Manager Proxy 4.3:kernel-default-devel-5.14.21-150400.24.170.2.x86_64",
            "SUSE Manager Proxy 4.3:kernel-devel-5.14.21-150400.24.170.1.noarch",
            "SUSE Manager Proxy 4.3:kernel-macros-5.14.21-150400.24.170.1.noarch",
            "SUSE Manager Proxy 4.3:kernel-source-5.14.21-150400.24.170.1.noarch",
            "SUSE Manager Proxy 4.3:kernel-syms-5.14.21-150400.24.170.1.x86_64",
            "SUSE Manager Server 4.3:kernel-default-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Manager Server 4.3:kernel-default-5.14.21-150400.24.170.2.s390x",
            "SUSE Manager Server 4.3:kernel-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Manager Server 4.3:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.ppc64le",
            "SUSE Manager Server 4.3:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
            "SUSE Manager Server 4.3:kernel-default-devel-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Manager Server 4.3:kernel-default-devel-5.14.21-150400.24.170.2.s390x",
            "SUSE Manager Server 4.3:kernel-default-devel-5.14.21-150400.24.170.2.x86_64",
            "SUSE Manager Server 4.3:kernel-devel-5.14.21-150400.24.170.1.noarch",
            "SUSE Manager Server 4.3:kernel-macros-5.14.21-150400.24.170.1.noarch",
            "SUSE Manager Server 4.3:kernel-source-5.14.21-150400.24.170.1.noarch",
            "SUSE Manager Server 4.3:kernel-syms-5.14.21-150400.24.170.1.ppc64le",
            "SUSE Manager Server 4.3:kernel-syms-5.14.21-150400.24.170.1.s390x",
            "SUSE Manager Server 4.3:kernel-syms-5.14.21-150400.24.170.1.x86_64",
            "SUSE Manager Server 4.3:kernel-zfcpdump-5.14.21-150400.24.170.2.s390x"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 7,
            "baseSeverity": "HIGH",
            "vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H",
            "version": "3.1"
          },
          "products": [
            "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-64kb-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-64kb-devel-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-devel-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-devel-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-devel-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-docs-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-macros-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-obs-build-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-obs-build-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-source-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-syms-5.14.21-150400.24.170.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-syms-5.14.21-150400.24.170.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:reiserfs-kmp-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:reiserfs-kmp-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-64kb-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-64kb-devel-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-devel-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-docs-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-macros-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-source-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.170.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.170.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_170-default-1-150400.9.3.2.ppc64le",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_170-default-1-150400.9.3.2.s390x",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_170-default-1-150400.9.3.2.x86_64",
            "SUSE Linux Enterprise Micro 5.3:kernel-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise Micro 5.3:kernel-default-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise Micro 5.3:kernel-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Micro 5.3:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.aarch64",
            "SUSE Linux Enterprise Micro 5.3:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
            "SUSE Linux Enterprise Micro 5.4:kernel-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise Micro 5.4:kernel-default-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise Micro 5.4:kernel-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Micro 5.4:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.aarch64",
            "SUSE Linux Enterprise Micro 5.4:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-64kb-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-64kb-devel-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.aarch64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.ppc64le",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-devel-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-docs-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-macros-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-source-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.170.1.aarch64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.170.1.ppc64le",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.170.1.s390x",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.170.1.x86_64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-zfcpdump-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-devel-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-devel-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-devel-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-docs-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-macros-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-obs-build-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-obs-build-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-source-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-syms-5.14.21-150400.24.170.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-syms-5.14.21-150400.24.170.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Manager Proxy 4.3:kernel-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Manager Proxy 4.3:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
            "SUSE Manager Proxy 4.3:kernel-default-devel-5.14.21-150400.24.170.2.x86_64",
            "SUSE Manager Proxy 4.3:kernel-devel-5.14.21-150400.24.170.1.noarch",
            "SUSE Manager Proxy 4.3:kernel-macros-5.14.21-150400.24.170.1.noarch",
            "SUSE Manager Proxy 4.3:kernel-source-5.14.21-150400.24.170.1.noarch",
            "SUSE Manager Proxy 4.3:kernel-syms-5.14.21-150400.24.170.1.x86_64",
            "SUSE Manager Server 4.3:kernel-default-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Manager Server 4.3:kernel-default-5.14.21-150400.24.170.2.s390x",
            "SUSE Manager Server 4.3:kernel-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Manager Server 4.3:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.ppc64le",
            "SUSE Manager Server 4.3:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
            "SUSE Manager Server 4.3:kernel-default-devel-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Manager Server 4.3:kernel-default-devel-5.14.21-150400.24.170.2.s390x",
            "SUSE Manager Server 4.3:kernel-default-devel-5.14.21-150400.24.170.2.x86_64",
            "SUSE Manager Server 4.3:kernel-devel-5.14.21-150400.24.170.1.noarch",
            "SUSE Manager Server 4.3:kernel-macros-5.14.21-150400.24.170.1.noarch",
            "SUSE Manager Server 4.3:kernel-source-5.14.21-150400.24.170.1.noarch",
            "SUSE Manager Server 4.3:kernel-syms-5.14.21-150400.24.170.1.ppc64le",
            "SUSE Manager Server 4.3:kernel-syms-5.14.21-150400.24.170.1.s390x",
            "SUSE Manager Server 4.3:kernel-syms-5.14.21-150400.24.170.1.x86_64",
            "SUSE Manager Server 4.3:kernel-zfcpdump-5.14.21-150400.24.170.2.s390x"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2025-07-28T15:09:33Z",
          "details": "moderate"
        }
      ],
      "title": "CVE-2022-1679"
    },
    {
      "cve": "CVE-2022-2585",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2022-2585"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "It was discovered that when exec\u0027ing from a non-leader thread, armed POSIX CPU timers would be left on a list but freed, leading to a use-after-free.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.170.2.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.170.2.s390x",
          "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.170.2.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.170.2.s390x",
          "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.170.2.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.170.2.s390x",
          "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.170.2.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.170.2.s390x",
          "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-64kb-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-64kb-devel-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-devel-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-devel-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-devel-5.14.21-150400.24.170.1.noarch",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-docs-5.14.21-150400.24.170.1.noarch",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-macros-5.14.21-150400.24.170.1.noarch",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-obs-build-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-obs-build-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-source-5.14.21-150400.24.170.1.noarch",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-syms-5.14.21-150400.24.170.1.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-syms-5.14.21-150400.24.170.1.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:reiserfs-kmp-default-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:reiserfs-kmp-default-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-64kb-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-64kb-devel-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-devel-5.14.21-150400.24.170.1.noarch",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-docs-5.14.21-150400.24.170.1.noarch",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-macros-5.14.21-150400.24.170.1.noarch",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-source-5.14.21-150400.24.170.1.noarch",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.170.1.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.170.1.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.170.2.ppc64le",
          "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.170.2.s390x",
          "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.170.2.ppc64le",
          "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.170.2.s390x",
          "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_170-default-1-150400.9.3.2.ppc64le",
          "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_170-default-1-150400.9.3.2.s390x",
          "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_170-default-1-150400.9.3.2.x86_64",
          "SUSE Linux Enterprise Micro 5.3:kernel-default-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise Micro 5.3:kernel-default-5.14.21-150400.24.170.2.s390x",
          "SUSE Linux Enterprise Micro 5.3:kernel-default-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise Micro 5.3:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.aarch64",
          "SUSE Linux Enterprise Micro 5.3:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
          "SUSE Linux Enterprise Micro 5.4:kernel-default-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise Micro 5.4:kernel-default-5.14.21-150400.24.170.2.s390x",
          "SUSE Linux Enterprise Micro 5.4:kernel-default-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise Micro 5.4:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.aarch64",
          "SUSE Linux Enterprise Micro 5.4:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-64kb-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-64kb-devel-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-5.14.21-150400.24.170.2.ppc64le",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-5.14.21-150400.24.170.2.s390x",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.aarch64",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.ppc64le",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.170.2.ppc64le",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.170.2.s390x",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-devel-5.14.21-150400.24.170.1.noarch",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-docs-5.14.21-150400.24.170.1.noarch",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-macros-5.14.21-150400.24.170.1.noarch",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.170.2.ppc64le",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.170.2.s390x",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-source-5.14.21-150400.24.170.1.noarch",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.170.1.aarch64",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.170.1.ppc64le",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.170.1.s390x",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.170.1.x86_64",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-zfcpdump-5.14.21-150400.24.170.2.s390x",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.170.2.ppc64le",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.170.2.s390x",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-5.14.21-150400.24.170.2.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-devel-5.14.21-150400.24.170.2.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-devel-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-devel-5.14.21-150400.24.170.1.noarch",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-docs-5.14.21-150400.24.170.1.noarch",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-macros-5.14.21-150400.24.170.1.noarch",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-obs-build-5.14.21-150400.24.170.2.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-obs-build-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-source-5.14.21-150400.24.170.1.noarch",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-syms-5.14.21-150400.24.170.1.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-syms-5.14.21-150400.24.170.1.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.170.2.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.170.2.x86_64",
          "SUSE Manager Proxy 4.3:kernel-default-5.14.21-150400.24.170.2.x86_64",
          "SUSE Manager Proxy 4.3:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
          "SUSE Manager Proxy 4.3:kernel-default-devel-5.14.21-150400.24.170.2.x86_64",
          "SUSE Manager Proxy 4.3:kernel-devel-5.14.21-150400.24.170.1.noarch",
          "SUSE Manager Proxy 4.3:kernel-macros-5.14.21-150400.24.170.1.noarch",
          "SUSE Manager Proxy 4.3:kernel-source-5.14.21-150400.24.170.1.noarch",
          "SUSE Manager Proxy 4.3:kernel-syms-5.14.21-150400.24.170.1.x86_64",
          "SUSE Manager Server 4.3:kernel-default-5.14.21-150400.24.170.2.ppc64le",
          "SUSE Manager Server 4.3:kernel-default-5.14.21-150400.24.170.2.s390x",
          "SUSE Manager Server 4.3:kernel-default-5.14.21-150400.24.170.2.x86_64",
          "SUSE Manager Server 4.3:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.ppc64le",
          "SUSE Manager Server 4.3:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
          "SUSE Manager Server 4.3:kernel-default-devel-5.14.21-150400.24.170.2.ppc64le",
          "SUSE Manager Server 4.3:kernel-default-devel-5.14.21-150400.24.170.2.s390x",
          "SUSE Manager Server 4.3:kernel-default-devel-5.14.21-150400.24.170.2.x86_64",
          "SUSE Manager Server 4.3:kernel-devel-5.14.21-150400.24.170.1.noarch",
          "SUSE Manager Server 4.3:kernel-macros-5.14.21-150400.24.170.1.noarch",
          "SUSE Manager Server 4.3:kernel-source-5.14.21-150400.24.170.1.noarch",
          "SUSE Manager Server 4.3:kernel-syms-5.14.21-150400.24.170.1.ppc64le",
          "SUSE Manager Server 4.3:kernel-syms-5.14.21-150400.24.170.1.s390x",
          "SUSE Manager Server 4.3:kernel-syms-5.14.21-150400.24.170.1.x86_64",
          "SUSE Manager Server 4.3:kernel-zfcpdump-5.14.21-150400.24.170.2.s390x"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2022-2585",
          "url": "https://www.suse.com/security/cve/CVE-2022-2585"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1202094 for CVE-2022-2585",
          "url": "https://bugzilla.suse.com/1202094"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1202163 for CVE-2022-2585",
          "url": "https://bugzilla.suse.com/1202163"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-64kb-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-64kb-devel-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-devel-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-devel-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-devel-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-docs-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-macros-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-obs-build-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-obs-build-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-source-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-syms-5.14.21-150400.24.170.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-syms-5.14.21-150400.24.170.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:reiserfs-kmp-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:reiserfs-kmp-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-64kb-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-64kb-devel-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-devel-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-docs-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-macros-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-source-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.170.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.170.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_170-default-1-150400.9.3.2.ppc64le",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_170-default-1-150400.9.3.2.s390x",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_170-default-1-150400.9.3.2.x86_64",
            "SUSE Linux Enterprise Micro 5.3:kernel-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise Micro 5.3:kernel-default-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise Micro 5.3:kernel-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Micro 5.3:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.aarch64",
            "SUSE Linux Enterprise Micro 5.3:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
            "SUSE Linux Enterprise Micro 5.4:kernel-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise Micro 5.4:kernel-default-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise Micro 5.4:kernel-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Micro 5.4:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.aarch64",
            "SUSE Linux Enterprise Micro 5.4:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-64kb-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-64kb-devel-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.aarch64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.ppc64le",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-devel-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-docs-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-macros-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-source-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.170.1.aarch64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.170.1.ppc64le",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.170.1.s390x",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.170.1.x86_64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-zfcpdump-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-devel-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-devel-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-devel-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-docs-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-macros-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-obs-build-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-obs-build-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-source-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-syms-5.14.21-150400.24.170.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-syms-5.14.21-150400.24.170.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Manager Proxy 4.3:kernel-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Manager Proxy 4.3:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
            "SUSE Manager Proxy 4.3:kernel-default-devel-5.14.21-150400.24.170.2.x86_64",
            "SUSE Manager Proxy 4.3:kernel-devel-5.14.21-150400.24.170.1.noarch",
            "SUSE Manager Proxy 4.3:kernel-macros-5.14.21-150400.24.170.1.noarch",
            "SUSE Manager Proxy 4.3:kernel-source-5.14.21-150400.24.170.1.noarch",
            "SUSE Manager Proxy 4.3:kernel-syms-5.14.21-150400.24.170.1.x86_64",
            "SUSE Manager Server 4.3:kernel-default-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Manager Server 4.3:kernel-default-5.14.21-150400.24.170.2.s390x",
            "SUSE Manager Server 4.3:kernel-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Manager Server 4.3:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.ppc64le",
            "SUSE Manager Server 4.3:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
            "SUSE Manager Server 4.3:kernel-default-devel-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Manager Server 4.3:kernel-default-devel-5.14.21-150400.24.170.2.s390x",
            "SUSE Manager Server 4.3:kernel-default-devel-5.14.21-150400.24.170.2.x86_64",
            "SUSE Manager Server 4.3:kernel-devel-5.14.21-150400.24.170.1.noarch",
            "SUSE Manager Server 4.3:kernel-macros-5.14.21-150400.24.170.1.noarch",
            "SUSE Manager Server 4.3:kernel-source-5.14.21-150400.24.170.1.noarch",
            "SUSE Manager Server 4.3:kernel-syms-5.14.21-150400.24.170.1.ppc64le",
            "SUSE Manager Server 4.3:kernel-syms-5.14.21-150400.24.170.1.s390x",
            "SUSE Manager Server 4.3:kernel-syms-5.14.21-150400.24.170.1.x86_64",
            "SUSE Manager Server 4.3:kernel-zfcpdump-5.14.21-150400.24.170.2.s390x"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 8.4,
            "baseSeverity": "HIGH",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
            "version": "3.1"
          },
          "products": [
            "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-64kb-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-64kb-devel-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-devel-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-devel-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-devel-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-docs-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-macros-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-obs-build-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-obs-build-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-source-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-syms-5.14.21-150400.24.170.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-syms-5.14.21-150400.24.170.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:reiserfs-kmp-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:reiserfs-kmp-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-64kb-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-64kb-devel-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-devel-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-docs-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-macros-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-source-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.170.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.170.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_170-default-1-150400.9.3.2.ppc64le",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_170-default-1-150400.9.3.2.s390x",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_170-default-1-150400.9.3.2.x86_64",
            "SUSE Linux Enterprise Micro 5.3:kernel-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise Micro 5.3:kernel-default-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise Micro 5.3:kernel-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Micro 5.3:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.aarch64",
            "SUSE Linux Enterprise Micro 5.3:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
            "SUSE Linux Enterprise Micro 5.4:kernel-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise Micro 5.4:kernel-default-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise Micro 5.4:kernel-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Micro 5.4:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.aarch64",
            "SUSE Linux Enterprise Micro 5.4:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-64kb-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-64kb-devel-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.aarch64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.ppc64le",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-devel-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-docs-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-macros-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-source-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.170.1.aarch64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.170.1.ppc64le",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.170.1.s390x",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.170.1.x86_64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-zfcpdump-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-devel-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-devel-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-devel-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-docs-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-macros-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-obs-build-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-obs-build-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-source-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-syms-5.14.21-150400.24.170.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-syms-5.14.21-150400.24.170.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Manager Proxy 4.3:kernel-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Manager Proxy 4.3:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
            "SUSE Manager Proxy 4.3:kernel-default-devel-5.14.21-150400.24.170.2.x86_64",
            "SUSE Manager Proxy 4.3:kernel-devel-5.14.21-150400.24.170.1.noarch",
            "SUSE Manager Proxy 4.3:kernel-macros-5.14.21-150400.24.170.1.noarch",
            "SUSE Manager Proxy 4.3:kernel-source-5.14.21-150400.24.170.1.noarch",
            "SUSE Manager Proxy 4.3:kernel-syms-5.14.21-150400.24.170.1.x86_64",
            "SUSE Manager Server 4.3:kernel-default-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Manager Server 4.3:kernel-default-5.14.21-150400.24.170.2.s390x",
            "SUSE Manager Server 4.3:kernel-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Manager Server 4.3:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.ppc64le",
            "SUSE Manager Server 4.3:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
            "SUSE Manager Server 4.3:kernel-default-devel-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Manager Server 4.3:kernel-default-devel-5.14.21-150400.24.170.2.s390x",
            "SUSE Manager Server 4.3:kernel-default-devel-5.14.21-150400.24.170.2.x86_64",
            "SUSE Manager Server 4.3:kernel-devel-5.14.21-150400.24.170.1.noarch",
            "SUSE Manager Server 4.3:kernel-macros-5.14.21-150400.24.170.1.noarch",
            "SUSE Manager Server 4.3:kernel-source-5.14.21-150400.24.170.1.noarch",
            "SUSE Manager Server 4.3:kernel-syms-5.14.21-150400.24.170.1.ppc64le",
            "SUSE Manager Server 4.3:kernel-syms-5.14.21-150400.24.170.1.s390x",
            "SUSE Manager Server 4.3:kernel-syms-5.14.21-150400.24.170.1.x86_64",
            "SUSE Manager Server 4.3:kernel-zfcpdump-5.14.21-150400.24.170.2.s390x"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2025-07-28T15:09:33Z",
          "details": "important"
        }
      ],
      "title": "CVE-2022-2585"
    },
    {
      "cve": "CVE-2022-2586",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2022-2586"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "It was discovered that a nft object or expression could reference a nft set on a different nft table, leading to a use-after-free once that table was deleted.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.170.2.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.170.2.s390x",
          "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.170.2.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.170.2.s390x",
          "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.170.2.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.170.2.s390x",
          "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.170.2.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.170.2.s390x",
          "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-64kb-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-64kb-devel-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-devel-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-devel-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-devel-5.14.21-150400.24.170.1.noarch",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-docs-5.14.21-150400.24.170.1.noarch",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-macros-5.14.21-150400.24.170.1.noarch",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-obs-build-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-obs-build-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-source-5.14.21-150400.24.170.1.noarch",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-syms-5.14.21-150400.24.170.1.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-syms-5.14.21-150400.24.170.1.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:reiserfs-kmp-default-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:reiserfs-kmp-default-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-64kb-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-64kb-devel-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-devel-5.14.21-150400.24.170.1.noarch",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-docs-5.14.21-150400.24.170.1.noarch",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-macros-5.14.21-150400.24.170.1.noarch",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-source-5.14.21-150400.24.170.1.noarch",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.170.1.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.170.1.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.170.2.ppc64le",
          "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.170.2.s390x",
          "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.170.2.ppc64le",
          "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.170.2.s390x",
          "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_170-default-1-150400.9.3.2.ppc64le",
          "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_170-default-1-150400.9.3.2.s390x",
          "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_170-default-1-150400.9.3.2.x86_64",
          "SUSE Linux Enterprise Micro 5.3:kernel-default-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise Micro 5.3:kernel-default-5.14.21-150400.24.170.2.s390x",
          "SUSE Linux Enterprise Micro 5.3:kernel-default-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise Micro 5.3:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.aarch64",
          "SUSE Linux Enterprise Micro 5.3:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
          "SUSE Linux Enterprise Micro 5.4:kernel-default-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise Micro 5.4:kernel-default-5.14.21-150400.24.170.2.s390x",
          "SUSE Linux Enterprise Micro 5.4:kernel-default-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise Micro 5.4:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.aarch64",
          "SUSE Linux Enterprise Micro 5.4:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-64kb-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-64kb-devel-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-5.14.21-150400.24.170.2.ppc64le",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-5.14.21-150400.24.170.2.s390x",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.aarch64",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.ppc64le",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.170.2.ppc64le",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.170.2.s390x",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-devel-5.14.21-150400.24.170.1.noarch",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-docs-5.14.21-150400.24.170.1.noarch",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-macros-5.14.21-150400.24.170.1.noarch",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.170.2.ppc64le",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.170.2.s390x",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-source-5.14.21-150400.24.170.1.noarch",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.170.1.aarch64",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.170.1.ppc64le",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.170.1.s390x",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.170.1.x86_64",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-zfcpdump-5.14.21-150400.24.170.2.s390x",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.170.2.ppc64le",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.170.2.s390x",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-5.14.21-150400.24.170.2.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-devel-5.14.21-150400.24.170.2.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-devel-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-devel-5.14.21-150400.24.170.1.noarch",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-docs-5.14.21-150400.24.170.1.noarch",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-macros-5.14.21-150400.24.170.1.noarch",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-obs-build-5.14.21-150400.24.170.2.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-obs-build-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-source-5.14.21-150400.24.170.1.noarch",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-syms-5.14.21-150400.24.170.1.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-syms-5.14.21-150400.24.170.1.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.170.2.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.170.2.x86_64",
          "SUSE Manager Proxy 4.3:kernel-default-5.14.21-150400.24.170.2.x86_64",
          "SUSE Manager Proxy 4.3:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
          "SUSE Manager Proxy 4.3:kernel-default-devel-5.14.21-150400.24.170.2.x86_64",
          "SUSE Manager Proxy 4.3:kernel-devel-5.14.21-150400.24.170.1.noarch",
          "SUSE Manager Proxy 4.3:kernel-macros-5.14.21-150400.24.170.1.noarch",
          "SUSE Manager Proxy 4.3:kernel-source-5.14.21-150400.24.170.1.noarch",
          "SUSE Manager Proxy 4.3:kernel-syms-5.14.21-150400.24.170.1.x86_64",
          "SUSE Manager Server 4.3:kernel-default-5.14.21-150400.24.170.2.ppc64le",
          "SUSE Manager Server 4.3:kernel-default-5.14.21-150400.24.170.2.s390x",
          "SUSE Manager Server 4.3:kernel-default-5.14.21-150400.24.170.2.x86_64",
          "SUSE Manager Server 4.3:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.ppc64le",
          "SUSE Manager Server 4.3:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
          "SUSE Manager Server 4.3:kernel-default-devel-5.14.21-150400.24.170.2.ppc64le",
          "SUSE Manager Server 4.3:kernel-default-devel-5.14.21-150400.24.170.2.s390x",
          "SUSE Manager Server 4.3:kernel-default-devel-5.14.21-150400.24.170.2.x86_64",
          "SUSE Manager Server 4.3:kernel-devel-5.14.21-150400.24.170.1.noarch",
          "SUSE Manager Server 4.3:kernel-macros-5.14.21-150400.24.170.1.noarch",
          "SUSE Manager Server 4.3:kernel-source-5.14.21-150400.24.170.1.noarch",
          "SUSE Manager Server 4.3:kernel-syms-5.14.21-150400.24.170.1.ppc64le",
          "SUSE Manager Server 4.3:kernel-syms-5.14.21-150400.24.170.1.s390x",
          "SUSE Manager Server 4.3:kernel-syms-5.14.21-150400.24.170.1.x86_64",
          "SUSE Manager Server 4.3:kernel-zfcpdump-5.14.21-150400.24.170.2.s390x"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2022-2586",
          "url": "https://www.suse.com/security/cve/CVE-2022-2586"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1202095 for CVE-2022-2586",
          "url": "https://bugzilla.suse.com/1202095"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1209719 for CVE-2022-2586",
          "url": "https://bugzilla.suse.com/1209719"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-64kb-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-64kb-devel-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-devel-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-devel-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-devel-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-docs-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-macros-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-obs-build-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-obs-build-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-source-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-syms-5.14.21-150400.24.170.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-syms-5.14.21-150400.24.170.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:reiserfs-kmp-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:reiserfs-kmp-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-64kb-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-64kb-devel-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-devel-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-docs-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-macros-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-source-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.170.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.170.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_170-default-1-150400.9.3.2.ppc64le",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_170-default-1-150400.9.3.2.s390x",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_170-default-1-150400.9.3.2.x86_64",
            "SUSE Linux Enterprise Micro 5.3:kernel-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise Micro 5.3:kernel-default-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise Micro 5.3:kernel-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Micro 5.3:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.aarch64",
            "SUSE Linux Enterprise Micro 5.3:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
            "SUSE Linux Enterprise Micro 5.4:kernel-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise Micro 5.4:kernel-default-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise Micro 5.4:kernel-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Micro 5.4:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.aarch64",
            "SUSE Linux Enterprise Micro 5.4:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-64kb-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-64kb-devel-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.aarch64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.ppc64le",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-devel-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-docs-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-macros-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-source-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.170.1.aarch64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.170.1.ppc64le",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.170.1.s390x",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.170.1.x86_64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-zfcpdump-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-devel-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-devel-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-devel-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-docs-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-macros-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-obs-build-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-obs-build-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-source-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-syms-5.14.21-150400.24.170.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-syms-5.14.21-150400.24.170.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Manager Proxy 4.3:kernel-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Manager Proxy 4.3:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
            "SUSE Manager Proxy 4.3:kernel-default-devel-5.14.21-150400.24.170.2.x86_64",
            "SUSE Manager Proxy 4.3:kernel-devel-5.14.21-150400.24.170.1.noarch",
            "SUSE Manager Proxy 4.3:kernel-macros-5.14.21-150400.24.170.1.noarch",
            "SUSE Manager Proxy 4.3:kernel-source-5.14.21-150400.24.170.1.noarch",
            "SUSE Manager Proxy 4.3:kernel-syms-5.14.21-150400.24.170.1.x86_64",
            "SUSE Manager Server 4.3:kernel-default-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Manager Server 4.3:kernel-default-5.14.21-150400.24.170.2.s390x",
            "SUSE Manager Server 4.3:kernel-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Manager Server 4.3:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.ppc64le",
            "SUSE Manager Server 4.3:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
            "SUSE Manager Server 4.3:kernel-default-devel-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Manager Server 4.3:kernel-default-devel-5.14.21-150400.24.170.2.s390x",
            "SUSE Manager Server 4.3:kernel-default-devel-5.14.21-150400.24.170.2.x86_64",
            "SUSE Manager Server 4.3:kernel-devel-5.14.21-150400.24.170.1.noarch",
            "SUSE Manager Server 4.3:kernel-macros-5.14.21-150400.24.170.1.noarch",
            "SUSE Manager Server 4.3:kernel-source-5.14.21-150400.24.170.1.noarch",
            "SUSE Manager Server 4.3:kernel-syms-5.14.21-150400.24.170.1.ppc64le",
            "SUSE Manager Server 4.3:kernel-syms-5.14.21-150400.24.170.1.s390x",
            "SUSE Manager Server 4.3:kernel-syms-5.14.21-150400.24.170.1.x86_64",
            "SUSE Manager Server 4.3:kernel-zfcpdump-5.14.21-150400.24.170.2.s390x"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 6.7,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H",
            "version": "3.1"
          },
          "products": [
            "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-64kb-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-64kb-devel-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-devel-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-devel-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-devel-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-docs-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-macros-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-obs-build-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-obs-build-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-source-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-syms-5.14.21-150400.24.170.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-syms-5.14.21-150400.24.170.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:reiserfs-kmp-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:reiserfs-kmp-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-64kb-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-64kb-devel-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-devel-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-docs-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-macros-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-source-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.170.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.170.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_170-default-1-150400.9.3.2.ppc64le",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_170-default-1-150400.9.3.2.s390x",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_170-default-1-150400.9.3.2.x86_64",
            "SUSE Linux Enterprise Micro 5.3:kernel-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise Micro 5.3:kernel-default-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise Micro 5.3:kernel-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Micro 5.3:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.aarch64",
            "SUSE Linux Enterprise Micro 5.3:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
            "SUSE Linux Enterprise Micro 5.4:kernel-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise Micro 5.4:kernel-default-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise Micro 5.4:kernel-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Micro 5.4:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.aarch64",
            "SUSE Linux Enterprise Micro 5.4:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-64kb-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-64kb-devel-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.aarch64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.ppc64le",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-devel-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-docs-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-macros-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-source-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.170.1.aarch64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.170.1.ppc64le",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.170.1.s390x",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.170.1.x86_64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-zfcpdump-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-devel-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-devel-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-devel-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-docs-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-macros-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-obs-build-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-obs-build-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-source-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-syms-5.14.21-150400.24.170.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-syms-5.14.21-150400.24.170.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Manager Proxy 4.3:kernel-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Manager Proxy 4.3:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
            "SUSE Manager Proxy 4.3:kernel-default-devel-5.14.21-150400.24.170.2.x86_64",
            "SUSE Manager Proxy 4.3:kernel-devel-5.14.21-150400.24.170.1.noarch",
            "SUSE Manager Proxy 4.3:kernel-macros-5.14.21-150400.24.170.1.noarch",
            "SUSE Manager Proxy 4.3:kernel-source-5.14.21-150400.24.170.1.noarch",
            "SUSE Manager Proxy 4.3:kernel-syms-5.14.21-150400.24.170.1.x86_64",
            "SUSE Manager Server 4.3:kernel-default-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Manager Server 4.3:kernel-default-5.14.21-150400.24.170.2.s390x",
            "SUSE Manager Server 4.3:kernel-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Manager Server 4.3:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.ppc64le",
            "SUSE Manager Server 4.3:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
            "SUSE Manager Server 4.3:kernel-default-devel-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Manager Server 4.3:kernel-default-devel-5.14.21-150400.24.170.2.s390x",
            "SUSE Manager Server 4.3:kernel-default-devel-5.14.21-150400.24.170.2.x86_64",
            "SUSE Manager Server 4.3:kernel-devel-5.14.21-150400.24.170.1.noarch",
            "SUSE Manager Server 4.3:kernel-macros-5.14.21-150400.24.170.1.noarch",
            "SUSE Manager Server 4.3:kernel-source-5.14.21-150400.24.170.1.noarch",
            "SUSE Manager Server 4.3:kernel-syms-5.14.21-150400.24.170.1.ppc64le",
            "SUSE Manager Server 4.3:kernel-syms-5.14.21-150400.24.170.1.s390x",
            "SUSE Manager Server 4.3:kernel-syms-5.14.21-150400.24.170.1.x86_64",
            "SUSE Manager Server 4.3:kernel-zfcpdump-5.14.21-150400.24.170.2.s390x"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2025-07-28T15:09:33Z",
          "details": "moderate"
        }
      ],
      "title": "CVE-2022-2586"
    },
    {
      "cve": "CVE-2022-2905",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2022-2905"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "An out-of-bounds memory read flaw was found in the Linux kernel\u0027s BPF subsystem in how a user calls the bpf_tail_call function with a key larger than the max_entries of the map. This flaw allows a local user to gain unauthorized access to data.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.170.2.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.170.2.s390x",
          "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.170.2.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.170.2.s390x",
          "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.170.2.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.170.2.s390x",
          "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.170.2.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.170.2.s390x",
          "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-64kb-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-64kb-devel-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-devel-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-devel-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-devel-5.14.21-150400.24.170.1.noarch",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-docs-5.14.21-150400.24.170.1.noarch",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-macros-5.14.21-150400.24.170.1.noarch",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-obs-build-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-obs-build-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-source-5.14.21-150400.24.170.1.noarch",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-syms-5.14.21-150400.24.170.1.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-syms-5.14.21-150400.24.170.1.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:reiserfs-kmp-default-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:reiserfs-kmp-default-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-64kb-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-64kb-devel-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-devel-5.14.21-150400.24.170.1.noarch",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-docs-5.14.21-150400.24.170.1.noarch",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-macros-5.14.21-150400.24.170.1.noarch",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-source-5.14.21-150400.24.170.1.noarch",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.170.1.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.170.1.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.170.2.ppc64le",
          "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.170.2.s390x",
          "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.170.2.ppc64le",
          "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.170.2.s390x",
          "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_170-default-1-150400.9.3.2.ppc64le",
          "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_170-default-1-150400.9.3.2.s390x",
          "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_170-default-1-150400.9.3.2.x86_64",
          "SUSE Linux Enterprise Micro 5.3:kernel-default-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise Micro 5.3:kernel-default-5.14.21-150400.24.170.2.s390x",
          "SUSE Linux Enterprise Micro 5.3:kernel-default-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise Micro 5.3:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.aarch64",
          "SUSE Linux Enterprise Micro 5.3:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
          "SUSE Linux Enterprise Micro 5.4:kernel-default-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise Micro 5.4:kernel-default-5.14.21-150400.24.170.2.s390x",
          "SUSE Linux Enterprise Micro 5.4:kernel-default-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise Micro 5.4:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.aarch64",
          "SUSE Linux Enterprise Micro 5.4:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-64kb-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-64kb-devel-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-5.14.21-150400.24.170.2.ppc64le",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-5.14.21-150400.24.170.2.s390x",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.aarch64",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.ppc64le",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.170.2.ppc64le",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.170.2.s390x",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-devel-5.14.21-150400.24.170.1.noarch",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-docs-5.14.21-150400.24.170.1.noarch",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-macros-5.14.21-150400.24.170.1.noarch",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.170.2.ppc64le",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.170.2.s390x",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-source-5.14.21-150400.24.170.1.noarch",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.170.1.aarch64",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.170.1.ppc64le",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.170.1.s390x",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.170.1.x86_64",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-zfcpdump-5.14.21-150400.24.170.2.s390x",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.170.2.ppc64le",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.170.2.s390x",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-5.14.21-150400.24.170.2.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-devel-5.14.21-150400.24.170.2.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-devel-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-devel-5.14.21-150400.24.170.1.noarch",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-docs-5.14.21-150400.24.170.1.noarch",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-macros-5.14.21-150400.24.170.1.noarch",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-obs-build-5.14.21-150400.24.170.2.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-obs-build-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-source-5.14.21-150400.24.170.1.noarch",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-syms-5.14.21-150400.24.170.1.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-syms-5.14.21-150400.24.170.1.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.170.2.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.170.2.x86_64",
          "SUSE Manager Proxy 4.3:kernel-default-5.14.21-150400.24.170.2.x86_64",
          "SUSE Manager Proxy 4.3:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
          "SUSE Manager Proxy 4.3:kernel-default-devel-5.14.21-150400.24.170.2.x86_64",
          "SUSE Manager Proxy 4.3:kernel-devel-5.14.21-150400.24.170.1.noarch",
          "SUSE Manager Proxy 4.3:kernel-macros-5.14.21-150400.24.170.1.noarch",
          "SUSE Manager Proxy 4.3:kernel-source-5.14.21-150400.24.170.1.noarch",
          "SUSE Manager Proxy 4.3:kernel-syms-5.14.21-150400.24.170.1.x86_64",
          "SUSE Manager Server 4.3:kernel-default-5.14.21-150400.24.170.2.ppc64le",
          "SUSE Manager Server 4.3:kernel-default-5.14.21-150400.24.170.2.s390x",
          "SUSE Manager Server 4.3:kernel-default-5.14.21-150400.24.170.2.x86_64",
          "SUSE Manager Server 4.3:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.ppc64le",
          "SUSE Manager Server 4.3:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
          "SUSE Manager Server 4.3:kernel-default-devel-5.14.21-150400.24.170.2.ppc64le",
          "SUSE Manager Server 4.3:kernel-default-devel-5.14.21-150400.24.170.2.s390x",
          "SUSE Manager Server 4.3:kernel-default-devel-5.14.21-150400.24.170.2.x86_64",
          "SUSE Manager Server 4.3:kernel-devel-5.14.21-150400.24.170.1.noarch",
          "SUSE Manager Server 4.3:kernel-macros-5.14.21-150400.24.170.1.noarch",
          "SUSE Manager Server 4.3:kernel-source-5.14.21-150400.24.170.1.noarch",
          "SUSE Manager Server 4.3:kernel-syms-5.14.21-150400.24.170.1.ppc64le",
          "SUSE Manager Server 4.3:kernel-syms-5.14.21-150400.24.170.1.s390x",
          "SUSE Manager Server 4.3:kernel-syms-5.14.21-150400.24.170.1.x86_64",
          "SUSE Manager Server 4.3:kernel-zfcpdump-5.14.21-150400.24.170.2.s390x"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2022-2905",
          "url": "https://www.suse.com/security/cve/CVE-2022-2905"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1202860 for CVE-2022-2905",
          "url": "https://bugzilla.suse.com/1202860"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-64kb-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-64kb-devel-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-devel-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-devel-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-devel-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-docs-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-macros-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-obs-build-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-obs-build-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-source-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-syms-5.14.21-150400.24.170.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-syms-5.14.21-150400.24.170.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:reiserfs-kmp-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:reiserfs-kmp-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-64kb-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-64kb-devel-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-devel-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-docs-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-macros-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-source-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.170.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.170.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_170-default-1-150400.9.3.2.ppc64le",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_170-default-1-150400.9.3.2.s390x",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_170-default-1-150400.9.3.2.x86_64",
            "SUSE Linux Enterprise Micro 5.3:kernel-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise Micro 5.3:kernel-default-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise Micro 5.3:kernel-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Micro 5.3:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.aarch64",
            "SUSE Linux Enterprise Micro 5.3:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
            "SUSE Linux Enterprise Micro 5.4:kernel-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise Micro 5.4:kernel-default-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise Micro 5.4:kernel-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Micro 5.4:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.aarch64",
            "SUSE Linux Enterprise Micro 5.4:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-64kb-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-64kb-devel-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.aarch64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.ppc64le",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-devel-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-docs-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-macros-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-source-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.170.1.aarch64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.170.1.ppc64le",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.170.1.s390x",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.170.1.x86_64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-zfcpdump-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-devel-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-devel-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-devel-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-docs-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-macros-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-obs-build-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-obs-build-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-source-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-syms-5.14.21-150400.24.170.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-syms-5.14.21-150400.24.170.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Manager Proxy 4.3:kernel-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Manager Proxy 4.3:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
            "SUSE Manager Proxy 4.3:kernel-default-devel-5.14.21-150400.24.170.2.x86_64",
            "SUSE Manager Proxy 4.3:kernel-devel-5.14.21-150400.24.170.1.noarch",
            "SUSE Manager Proxy 4.3:kernel-macros-5.14.21-150400.24.170.1.noarch",
            "SUSE Manager Proxy 4.3:kernel-source-5.14.21-150400.24.170.1.noarch",
            "SUSE Manager Proxy 4.3:kernel-syms-5.14.21-150400.24.170.1.x86_64",
            "SUSE Manager Server 4.3:kernel-default-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Manager Server 4.3:kernel-default-5.14.21-150400.24.170.2.s390x",
            "SUSE Manager Server 4.3:kernel-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Manager Server 4.3:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.ppc64le",
            "SUSE Manager Server 4.3:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
            "SUSE Manager Server 4.3:kernel-default-devel-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Manager Server 4.3:kernel-default-devel-5.14.21-150400.24.170.2.s390x",
            "SUSE Manager Server 4.3:kernel-default-devel-5.14.21-150400.24.170.2.x86_64",
            "SUSE Manager Server 4.3:kernel-devel-5.14.21-150400.24.170.1.noarch",
            "SUSE Manager Server 4.3:kernel-macros-5.14.21-150400.24.170.1.noarch",
            "SUSE Manager Server 4.3:kernel-source-5.14.21-150400.24.170.1.noarch",
            "SUSE Manager Server 4.3:kernel-syms-5.14.21-150400.24.170.1.ppc64le",
            "SUSE Manager Server 4.3:kernel-syms-5.14.21-150400.24.170.1.s390x",
            "SUSE Manager Server 4.3:kernel-syms-5.14.21-150400.24.170.1.x86_64",
            "SUSE Manager Server 4.3:kernel-zfcpdump-5.14.21-150400.24.170.2.s390x"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 6.2,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N",
            "version": "3.1"
          },
          "products": [
            "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-64kb-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-64kb-devel-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-devel-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-devel-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-devel-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-docs-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-macros-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-obs-build-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-obs-build-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-source-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-syms-5.14.21-150400.24.170.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-syms-5.14.21-150400.24.170.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:reiserfs-kmp-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:reiserfs-kmp-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-64kb-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-64kb-devel-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-devel-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-docs-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-macros-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-source-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.170.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.170.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_170-default-1-150400.9.3.2.ppc64le",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_170-default-1-150400.9.3.2.s390x",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_170-default-1-150400.9.3.2.x86_64",
            "SUSE Linux Enterprise Micro 5.3:kernel-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise Micro 5.3:kernel-default-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise Micro 5.3:kernel-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Micro 5.3:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.aarch64",
            "SUSE Linux Enterprise Micro 5.3:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
            "SUSE Linux Enterprise Micro 5.4:kernel-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise Micro 5.4:kernel-default-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise Micro 5.4:kernel-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Micro 5.4:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.aarch64",
            "SUSE Linux Enterprise Micro 5.4:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-64kb-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-64kb-devel-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.aarch64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.ppc64le",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-devel-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-docs-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-macros-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-source-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.170.1.aarch64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.170.1.ppc64le",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.170.1.s390x",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.170.1.x86_64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-zfcpdump-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-devel-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-devel-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-devel-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-docs-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-macros-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-obs-build-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-obs-build-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-source-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-syms-5.14.21-150400.24.170.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-syms-5.14.21-150400.24.170.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Manager Proxy 4.3:kernel-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Manager Proxy 4.3:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
            "SUSE Manager Proxy 4.3:kernel-default-devel-5.14.21-150400.24.170.2.x86_64",
            "SUSE Manager Proxy 4.3:kernel-devel-5.14.21-150400.24.170.1.noarch",
            "SUSE Manager Proxy 4.3:kernel-macros-5.14.21-150400.24.170.1.noarch",
            "SUSE Manager Proxy 4.3:kernel-source-5.14.21-150400.24.170.1.noarch",
            "SUSE Manager Proxy 4.3:kernel-syms-5.14.21-150400.24.170.1.x86_64",
            "SUSE Manager Server 4.3:kernel-default-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Manager Server 4.3:kernel-default-5.14.21-150400.24.170.2.s390x",
            "SUSE Manager Server 4.3:kernel-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Manager Server 4.3:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.ppc64le",
            "SUSE Manager Server 4.3:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
            "SUSE Manager Server 4.3:kernel-default-devel-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Manager Server 4.3:kernel-default-devel-5.14.21-150400.24.170.2.s390x",
            "SUSE Manager Server 4.3:kernel-default-devel-5.14.21-150400.24.170.2.x86_64",
            "SUSE Manager Server 4.3:kernel-devel-5.14.21-150400.24.170.1.noarch",
            "SUSE Manager Server 4.3:kernel-macros-5.14.21-150400.24.170.1.noarch",
            "SUSE Manager Server 4.3:kernel-source-5.14.21-150400.24.170.1.noarch",
            "SUSE Manager Server 4.3:kernel-syms-5.14.21-150400.24.170.1.ppc64le",
            "SUSE Manager Server 4.3:kernel-syms-5.14.21-150400.24.170.1.s390x",
            "SUSE Manager Server 4.3:kernel-syms-5.14.21-150400.24.170.1.x86_64",
            "SUSE Manager Server 4.3:kernel-zfcpdump-5.14.21-150400.24.170.2.s390x"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2025-07-28T15:09:33Z",
          "details": "moderate"
        }
      ],
      "title": "CVE-2022-2905"
    },
    {
      "cve": "CVE-2022-3903",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2022-3903"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "An incorrect read request flaw was found in the Infrared Transceiver USB driver in the Linux kernel. This issue occurs when a user attaches a malicious USB device. A local user could use this flaw to starve the resources, causing denial of service or potentially crashing the system.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.170.2.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.170.2.s390x",
          "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.170.2.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.170.2.s390x",
          "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.170.2.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.170.2.s390x",
          "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.170.2.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.170.2.s390x",
          "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-64kb-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-64kb-devel-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-devel-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-devel-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-devel-5.14.21-150400.24.170.1.noarch",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-docs-5.14.21-150400.24.170.1.noarch",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-macros-5.14.21-150400.24.170.1.noarch",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-obs-build-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-obs-build-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-source-5.14.21-150400.24.170.1.noarch",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-syms-5.14.21-150400.24.170.1.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-syms-5.14.21-150400.24.170.1.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:reiserfs-kmp-default-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:reiserfs-kmp-default-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-64kb-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-64kb-devel-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-devel-5.14.21-150400.24.170.1.noarch",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-docs-5.14.21-150400.24.170.1.noarch",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-macros-5.14.21-150400.24.170.1.noarch",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-source-5.14.21-150400.24.170.1.noarch",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.170.1.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.170.1.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.170.2.ppc64le",
          "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.170.2.s390x",
          "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.170.2.ppc64le",
          "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.170.2.s390x",
          "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_170-default-1-150400.9.3.2.ppc64le",
          "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_170-default-1-150400.9.3.2.s390x",
          "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_170-default-1-150400.9.3.2.x86_64",
          "SUSE Linux Enterprise Micro 5.3:kernel-default-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise Micro 5.3:kernel-default-5.14.21-150400.24.170.2.s390x",
          "SUSE Linux Enterprise Micro 5.3:kernel-default-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise Micro 5.3:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.aarch64",
          "SUSE Linux Enterprise Micro 5.3:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
          "SUSE Linux Enterprise Micro 5.4:kernel-default-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise Micro 5.4:kernel-default-5.14.21-150400.24.170.2.s390x",
          "SUSE Linux Enterprise Micro 5.4:kernel-default-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise Micro 5.4:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.aarch64",
          "SUSE Linux Enterprise Micro 5.4:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-64kb-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-64kb-devel-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-5.14.21-150400.24.170.2.ppc64le",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-5.14.21-150400.24.170.2.s390x",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.aarch64",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.ppc64le",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.170.2.ppc64le",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.170.2.s390x",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-devel-5.14.21-150400.24.170.1.noarch",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-docs-5.14.21-150400.24.170.1.noarch",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-macros-5.14.21-150400.24.170.1.noarch",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.170.2.ppc64le",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.170.2.s390x",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-source-5.14.21-150400.24.170.1.noarch",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.170.1.aarch64",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.170.1.ppc64le",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.170.1.s390x",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.170.1.x86_64",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-zfcpdump-5.14.21-150400.24.170.2.s390x",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.170.2.ppc64le",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.170.2.s390x",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-5.14.21-150400.24.170.2.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-devel-5.14.21-150400.24.170.2.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-devel-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-devel-5.14.21-150400.24.170.1.noarch",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-docs-5.14.21-150400.24.170.1.noarch",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-macros-5.14.21-150400.24.170.1.noarch",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-obs-build-5.14.21-150400.24.170.2.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-obs-build-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-source-5.14.21-150400.24.170.1.noarch",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-syms-5.14.21-150400.24.170.1.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-syms-5.14.21-150400.24.170.1.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.170.2.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.170.2.x86_64",
          "SUSE Manager Proxy 4.3:kernel-default-5.14.21-150400.24.170.2.x86_64",
          "SUSE Manager Proxy 4.3:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
          "SUSE Manager Proxy 4.3:kernel-default-devel-5.14.21-150400.24.170.2.x86_64",
          "SUSE Manager Proxy 4.3:kernel-devel-5.14.21-150400.24.170.1.noarch",
          "SUSE Manager Proxy 4.3:kernel-macros-5.14.21-150400.24.170.1.noarch",
          "SUSE Manager Proxy 4.3:kernel-source-5.14.21-150400.24.170.1.noarch",
          "SUSE Manager Proxy 4.3:kernel-syms-5.14.21-150400.24.170.1.x86_64",
          "SUSE Manager Server 4.3:kernel-default-5.14.21-150400.24.170.2.ppc64le",
          "SUSE Manager Server 4.3:kernel-default-5.14.21-150400.24.170.2.s390x",
          "SUSE Manager Server 4.3:kernel-default-5.14.21-150400.24.170.2.x86_64",
          "SUSE Manager Server 4.3:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.ppc64le",
          "SUSE Manager Server 4.3:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
          "SUSE Manager Server 4.3:kernel-default-devel-5.14.21-150400.24.170.2.ppc64le",
          "SUSE Manager Server 4.3:kernel-default-devel-5.14.21-150400.24.170.2.s390x",
          "SUSE Manager Server 4.3:kernel-default-devel-5.14.21-150400.24.170.2.x86_64",
          "SUSE Manager Server 4.3:kernel-devel-5.14.21-150400.24.170.1.noarch",
          "SUSE Manager Server 4.3:kernel-macros-5.14.21-150400.24.170.1.noarch",
          "SUSE Manager Server 4.3:kernel-source-5.14.21-150400.24.170.1.noarch",
          "SUSE Manager Server 4.3:kernel-syms-5.14.21-150400.24.170.1.ppc64le",
          "SUSE Manager Server 4.3:kernel-syms-5.14.21-150400.24.170.1.s390x",
          "SUSE Manager Server 4.3:kernel-syms-5.14.21-150400.24.170.1.x86_64",
          "SUSE Manager Server 4.3:kernel-zfcpdump-5.14.21-150400.24.170.2.s390x"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2022-3903",
          "url": "https://www.suse.com/security/cve/CVE-2022-3903"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1205220 for CVE-2022-3903",
          "url": "https://bugzilla.suse.com/1205220"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1212297 for CVE-2022-3903",
          "url": "https://bugzilla.suse.com/1212297"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-64kb-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-64kb-devel-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-devel-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-devel-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-devel-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-docs-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-macros-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-obs-build-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-obs-build-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-source-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-syms-5.14.21-150400.24.170.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-syms-5.14.21-150400.24.170.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:reiserfs-kmp-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:reiserfs-kmp-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-64kb-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-64kb-devel-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-devel-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-docs-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-macros-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-source-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.170.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.170.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_170-default-1-150400.9.3.2.ppc64le",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_170-default-1-150400.9.3.2.s390x",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_170-default-1-150400.9.3.2.x86_64",
            "SUSE Linux Enterprise Micro 5.3:kernel-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise Micro 5.3:kernel-default-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise Micro 5.3:kernel-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Micro 5.3:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.aarch64",
            "SUSE Linux Enterprise Micro 5.3:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
            "SUSE Linux Enterprise Micro 5.4:kernel-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise Micro 5.4:kernel-default-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise Micro 5.4:kernel-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Micro 5.4:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.aarch64",
            "SUSE Linux Enterprise Micro 5.4:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-64kb-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-64kb-devel-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.aarch64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.ppc64le",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-devel-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-docs-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-macros-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-source-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.170.1.aarch64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.170.1.ppc64le",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.170.1.s390x",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.170.1.x86_64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-zfcpdump-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-devel-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-devel-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-devel-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-docs-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-macros-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-obs-build-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-obs-build-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-source-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-syms-5.14.21-150400.24.170.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-syms-5.14.21-150400.24.170.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Manager Proxy 4.3:kernel-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Manager Proxy 4.3:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
            "SUSE Manager Proxy 4.3:kernel-default-devel-5.14.21-150400.24.170.2.x86_64",
            "SUSE Manager Proxy 4.3:kernel-devel-5.14.21-150400.24.170.1.noarch",
            "SUSE Manager Proxy 4.3:kernel-macros-5.14.21-150400.24.170.1.noarch",
            "SUSE Manager Proxy 4.3:kernel-source-5.14.21-150400.24.170.1.noarch",
            "SUSE Manager Proxy 4.3:kernel-syms-5.14.21-150400.24.170.1.x86_64",
            "SUSE Manager Server 4.3:kernel-default-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Manager Server 4.3:kernel-default-5.14.21-150400.24.170.2.s390x",
            "SUSE Manager Server 4.3:kernel-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Manager Server 4.3:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.ppc64le",
            "SUSE Manager Server 4.3:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
            "SUSE Manager Server 4.3:kernel-default-devel-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Manager Server 4.3:kernel-default-devel-5.14.21-150400.24.170.2.s390x",
            "SUSE Manager Server 4.3:kernel-default-devel-5.14.21-150400.24.170.2.x86_64",
            "SUSE Manager Server 4.3:kernel-devel-5.14.21-150400.24.170.1.noarch",
            "SUSE Manager Server 4.3:kernel-macros-5.14.21-150400.24.170.1.noarch",
            "SUSE Manager Server 4.3:kernel-source-5.14.21-150400.24.170.1.noarch",
            "SUSE Manager Server 4.3:kernel-syms-5.14.21-150400.24.170.1.ppc64le",
            "SUSE Manager Server 4.3:kernel-syms-5.14.21-150400.24.170.1.s390x",
            "SUSE Manager Server 4.3:kernel-syms-5.14.21-150400.24.170.1.x86_64",
            "SUSE Manager Server 4.3:kernel-zfcpdump-5.14.21-150400.24.170.2.s390x"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 5.5,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
            "version": "3.1"
          },
          "products": [
            "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-64kb-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-64kb-devel-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-devel-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-devel-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-devel-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-docs-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-macros-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-obs-build-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-obs-build-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-source-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-syms-5.14.21-150400.24.170.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-syms-5.14.21-150400.24.170.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:reiserfs-kmp-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:reiserfs-kmp-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-64kb-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-64kb-devel-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-devel-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-docs-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-macros-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-source-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.170.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.170.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_170-default-1-150400.9.3.2.ppc64le",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_170-default-1-150400.9.3.2.s390x",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_170-default-1-150400.9.3.2.x86_64",
            "SUSE Linux Enterprise Micro 5.3:kernel-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise Micro 5.3:kernel-default-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise Micro 5.3:kernel-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Micro 5.3:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.aarch64",
            "SUSE Linux Enterprise Micro 5.3:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
            "SUSE Linux Enterprise Micro 5.4:kernel-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise Micro 5.4:kernel-default-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise Micro 5.4:kernel-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Micro 5.4:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.aarch64",
            "SUSE Linux Enterprise Micro 5.4:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-64kb-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-64kb-devel-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.aarch64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.ppc64le",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-devel-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-docs-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-macros-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-source-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.170.1.aarch64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.170.1.ppc64le",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.170.1.s390x",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.170.1.x86_64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-zfcpdump-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-devel-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-devel-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-devel-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-docs-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-macros-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-obs-build-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-obs-build-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-source-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-syms-5.14.21-150400.24.170.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-syms-5.14.21-150400.24.170.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Manager Proxy 4.3:kernel-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Manager Proxy 4.3:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
            "SUSE Manager Proxy 4.3:kernel-default-devel-5.14.21-150400.24.170.2.x86_64",
            "SUSE Manager Proxy 4.3:kernel-devel-5.14.21-150400.24.170.1.noarch",
            "SUSE Manager Proxy 4.3:kernel-macros-5.14.21-150400.24.170.1.noarch",
            "SUSE Manager Proxy 4.3:kernel-source-5.14.21-150400.24.170.1.noarch",
            "SUSE Manager Proxy 4.3:kernel-syms-5.14.21-150400.24.170.1.x86_64",
            "SUSE Manager Server 4.3:kernel-default-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Manager Server 4.3:kernel-default-5.14.21-150400.24.170.2.s390x",
            "SUSE Manager Server 4.3:kernel-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Manager Server 4.3:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.ppc64le",
            "SUSE Manager Server 4.3:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
            "SUSE Manager Server 4.3:kernel-default-devel-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Manager Server 4.3:kernel-default-devel-5.14.21-150400.24.170.2.s390x",
            "SUSE Manager Server 4.3:kernel-default-devel-5.14.21-150400.24.170.2.x86_64",
            "SUSE Manager Server 4.3:kernel-devel-5.14.21-150400.24.170.1.noarch",
            "SUSE Manager Server 4.3:kernel-macros-5.14.21-150400.24.170.1.noarch",
            "SUSE Manager Server 4.3:kernel-source-5.14.21-150400.24.170.1.noarch",
            "SUSE Manager Server 4.3:kernel-syms-5.14.21-150400.24.170.1.ppc64le",
            "SUSE Manager Server 4.3:kernel-syms-5.14.21-150400.24.170.1.s390x",
            "SUSE Manager Server 4.3:kernel-syms-5.14.21-150400.24.170.1.x86_64",
            "SUSE Manager Server 4.3:kernel-zfcpdump-5.14.21-150400.24.170.2.s390x"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2025-07-28T15:09:33Z",
          "details": "moderate"
        }
      ],
      "title": "CVE-2022-3903"
    },
    {
      "cve": "CVE-2022-4095",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2022-4095"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "A use-after-free flaw was found in Linux kernel before 5.19.2. This issue occurs in cmd_hdl_filter in drivers/staging/rtl8712/rtl8712_cmd.c, allowing an attacker to launch a local denial of service attack and gain escalation of privileges.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.170.2.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.170.2.s390x",
          "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.170.2.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.170.2.s390x",
          "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.170.2.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.170.2.s390x",
          "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.170.2.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.170.2.s390x",
          "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-64kb-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-64kb-devel-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-devel-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-devel-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-devel-5.14.21-150400.24.170.1.noarch",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-docs-5.14.21-150400.24.170.1.noarch",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-macros-5.14.21-150400.24.170.1.noarch",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-obs-build-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-obs-build-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-source-5.14.21-150400.24.170.1.noarch",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-syms-5.14.21-150400.24.170.1.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-syms-5.14.21-150400.24.170.1.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:reiserfs-kmp-default-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:reiserfs-kmp-default-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-64kb-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-64kb-devel-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-devel-5.14.21-150400.24.170.1.noarch",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-docs-5.14.21-150400.24.170.1.noarch",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-macros-5.14.21-150400.24.170.1.noarch",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-source-5.14.21-150400.24.170.1.noarch",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.170.1.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.170.1.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.170.2.ppc64le",
          "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.170.2.s390x",
          "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.170.2.ppc64le",
          "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.170.2.s390x",
          "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_170-default-1-150400.9.3.2.ppc64le",
          "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_170-default-1-150400.9.3.2.s390x",
          "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_170-default-1-150400.9.3.2.x86_64",
          "SUSE Linux Enterprise Micro 5.3:kernel-default-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise Micro 5.3:kernel-default-5.14.21-150400.24.170.2.s390x",
          "SUSE Linux Enterprise Micro 5.3:kernel-default-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise Micro 5.3:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.aarch64",
          "SUSE Linux Enterprise Micro 5.3:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
          "SUSE Linux Enterprise Micro 5.4:kernel-default-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise Micro 5.4:kernel-default-5.14.21-150400.24.170.2.s390x",
          "SUSE Linux Enterprise Micro 5.4:kernel-default-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise Micro 5.4:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.aarch64",
          "SUSE Linux Enterprise Micro 5.4:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-64kb-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-64kb-devel-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-5.14.21-150400.24.170.2.ppc64le",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-5.14.21-150400.24.170.2.s390x",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.aarch64",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.ppc64le",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.170.2.ppc64le",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.170.2.s390x",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-devel-5.14.21-150400.24.170.1.noarch",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-docs-5.14.21-150400.24.170.1.noarch",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-macros-5.14.21-150400.24.170.1.noarch",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.170.2.ppc64le",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.170.2.s390x",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-source-5.14.21-150400.24.170.1.noarch",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.170.1.aarch64",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.170.1.ppc64le",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.170.1.s390x",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.170.1.x86_64",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-zfcpdump-5.14.21-150400.24.170.2.s390x",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.170.2.ppc64le",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.170.2.s390x",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-5.14.21-150400.24.170.2.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-devel-5.14.21-150400.24.170.2.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-devel-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-devel-5.14.21-150400.24.170.1.noarch",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-docs-5.14.21-150400.24.170.1.noarch",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-macros-5.14.21-150400.24.170.1.noarch",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-obs-build-5.14.21-150400.24.170.2.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-obs-build-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-source-5.14.21-150400.24.170.1.noarch",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-syms-5.14.21-150400.24.170.1.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-syms-5.14.21-150400.24.170.1.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.170.2.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.170.2.x86_64",
          "SUSE Manager Proxy 4.3:kernel-default-5.14.21-150400.24.170.2.x86_64",
          "SUSE Manager Proxy 4.3:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
          "SUSE Manager Proxy 4.3:kernel-default-devel-5.14.21-150400.24.170.2.x86_64",
          "SUSE Manager Proxy 4.3:kernel-devel-5.14.21-150400.24.170.1.noarch",
          "SUSE Manager Proxy 4.3:kernel-macros-5.14.21-150400.24.170.1.noarch",
          "SUSE Manager Proxy 4.3:kernel-source-5.14.21-150400.24.170.1.noarch",
          "SUSE Manager Proxy 4.3:kernel-syms-5.14.21-150400.24.170.1.x86_64",
          "SUSE Manager Server 4.3:kernel-default-5.14.21-150400.24.170.2.ppc64le",
          "SUSE Manager Server 4.3:kernel-default-5.14.21-150400.24.170.2.s390x",
          "SUSE Manager Server 4.3:kernel-default-5.14.21-150400.24.170.2.x86_64",
          "SUSE Manager Server 4.3:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.ppc64le",
          "SUSE Manager Server 4.3:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
          "SUSE Manager Server 4.3:kernel-default-devel-5.14.21-150400.24.170.2.ppc64le",
          "SUSE Manager Server 4.3:kernel-default-devel-5.14.21-150400.24.170.2.s390x",
          "SUSE Manager Server 4.3:kernel-default-devel-5.14.21-150400.24.170.2.x86_64",
          "SUSE Manager Server 4.3:kernel-devel-5.14.21-150400.24.170.1.noarch",
          "SUSE Manager Server 4.3:kernel-macros-5.14.21-150400.24.170.1.noarch",
          "SUSE Manager Server 4.3:kernel-source-5.14.21-150400.24.170.1.noarch",
          "SUSE Manager Server 4.3:kernel-syms-5.14.21-150400.24.170.1.ppc64le",
          "SUSE Manager Server 4.3:kernel-syms-5.14.21-150400.24.170.1.s390x",
          "SUSE Manager Server 4.3:kernel-syms-5.14.21-150400.24.170.1.x86_64",
          "SUSE Manager Server 4.3:kernel-zfcpdump-5.14.21-150400.24.170.2.s390x"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2022-4095",
          "url": "https://www.suse.com/security/cve/CVE-2022-4095"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1205514 for CVE-2022-4095",
          "url": "https://bugzilla.suse.com/1205514"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1205594 for CVE-2022-4095",
          "url": "https://bugzilla.suse.com/1205594"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1208030 for CVE-2022-4095",
          "url": "https://bugzilla.suse.com/1208030"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1208085 for CVE-2022-4095",
          "url": "https://bugzilla.suse.com/1208085"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1212319 for CVE-2022-4095",
          "url": "https://bugzilla.suse.com/1212319"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-64kb-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-64kb-devel-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-devel-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-devel-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-devel-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-docs-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-macros-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-obs-build-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-obs-build-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-source-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-syms-5.14.21-150400.24.170.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-syms-5.14.21-150400.24.170.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:reiserfs-kmp-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:reiserfs-kmp-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-64kb-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-64kb-devel-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-devel-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-docs-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-macros-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-source-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.170.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.170.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_170-default-1-150400.9.3.2.ppc64le",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_170-default-1-150400.9.3.2.s390x",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_170-default-1-150400.9.3.2.x86_64",
            "SUSE Linux Enterprise Micro 5.3:kernel-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise Micro 5.3:kernel-default-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise Micro 5.3:kernel-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Micro 5.3:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.aarch64",
            "SUSE Linux Enterprise Micro 5.3:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
            "SUSE Linux Enterprise Micro 5.4:kernel-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise Micro 5.4:kernel-default-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise Micro 5.4:kernel-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Micro 5.4:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.aarch64",
            "SUSE Linux Enterprise Micro 5.4:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-64kb-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-64kb-devel-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.aarch64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.ppc64le",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-devel-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-docs-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-macros-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-source-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.170.1.aarch64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.170.1.ppc64le",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.170.1.s390x",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.170.1.x86_64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-zfcpdump-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-devel-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-devel-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-devel-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-docs-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-macros-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-obs-build-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-obs-build-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-source-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-syms-5.14.21-150400.24.170.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-syms-5.14.21-150400.24.170.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Manager Proxy 4.3:kernel-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Manager Proxy 4.3:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
            "SUSE Manager Proxy 4.3:kernel-default-devel-5.14.21-150400.24.170.2.x86_64",
            "SUSE Manager Proxy 4.3:kernel-devel-5.14.21-150400.24.170.1.noarch",
            "SUSE Manager Proxy 4.3:kernel-macros-5.14.21-150400.24.170.1.noarch",
            "SUSE Manager Proxy 4.3:kernel-source-5.14.21-150400.24.170.1.noarch",
            "SUSE Manager Proxy 4.3:kernel-syms-5.14.21-150400.24.170.1.x86_64",
            "SUSE Manager Server 4.3:kernel-default-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Manager Server 4.3:kernel-default-5.14.21-150400.24.170.2.s390x",
            "SUSE Manager Server 4.3:kernel-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Manager Server 4.3:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.ppc64le",
            "SUSE Manager Server 4.3:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
            "SUSE Manager Server 4.3:kernel-default-devel-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Manager Server 4.3:kernel-default-devel-5.14.21-150400.24.170.2.s390x",
            "SUSE Manager Server 4.3:kernel-default-devel-5.14.21-150400.24.170.2.x86_64",
            "SUSE Manager Server 4.3:kernel-devel-5.14.21-150400.24.170.1.noarch",
            "SUSE Manager Server 4.3:kernel-macros-5.14.21-150400.24.170.1.noarch",
            "SUSE Manager Server 4.3:kernel-source-5.14.21-150400.24.170.1.noarch",
            "SUSE Manager Server 4.3:kernel-syms-5.14.21-150400.24.170.1.ppc64le",
            "SUSE Manager Server 4.3:kernel-syms-5.14.21-150400.24.170.1.s390x",
            "SUSE Manager Server 4.3:kernel-syms-5.14.21-150400.24.170.1.x86_64",
            "SUSE Manager Server 4.3:kernel-zfcpdump-5.14.21-150400.24.170.2.s390x"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 7.8,
            "baseSeverity": "HIGH",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
            "version": "3.1"
          },
          "products": [
            "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-64kb-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-64kb-devel-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-devel-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-devel-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-devel-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-docs-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-macros-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-obs-build-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-obs-build-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-source-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-syms-5.14.21-150400.24.170.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-syms-5.14.21-150400.24.170.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:reiserfs-kmp-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:reiserfs-kmp-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-64kb-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-64kb-devel-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-devel-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-docs-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-macros-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-source-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.170.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.170.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_170-default-1-150400.9.3.2.ppc64le",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_170-default-1-150400.9.3.2.s390x",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_170-default-1-150400.9.3.2.x86_64",
            "SUSE Linux Enterprise Micro 5.3:kernel-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise Micro 5.3:kernel-default-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise Micro 5.3:kernel-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Micro 5.3:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.aarch64",
            "SUSE Linux Enterprise Micro 5.3:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
            "SUSE Linux Enterprise Micro 5.4:kernel-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise Micro 5.4:kernel-default-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise Micro 5.4:kernel-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Micro 5.4:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.aarch64",
            "SUSE Linux Enterprise Micro 5.4:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-64kb-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-64kb-devel-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.aarch64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.ppc64le",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-devel-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-docs-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-macros-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-source-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.170.1.aarch64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.170.1.ppc64le",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.170.1.s390x",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.170.1.x86_64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-zfcpdump-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-devel-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-devel-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-devel-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-docs-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-macros-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-obs-build-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-obs-build-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-source-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-syms-5.14.21-150400.24.170.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-syms-5.14.21-150400.24.170.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Manager Proxy 4.3:kernel-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Manager Proxy 4.3:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
            "SUSE Manager Proxy 4.3:kernel-default-devel-5.14.21-150400.24.170.2.x86_64",
            "SUSE Manager Proxy 4.3:kernel-devel-5.14.21-150400.24.170.1.noarch",
            "SUSE Manager Proxy 4.3:kernel-macros-5.14.21-150400.24.170.1.noarch",
            "SUSE Manager Proxy 4.3:kernel-source-5.14.21-150400.24.170.1.noarch",
            "SUSE Manager Proxy 4.3:kernel-syms-5.14.21-150400.24.170.1.x86_64",
            "SUSE Manager Server 4.3:kernel-default-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Manager Server 4.3:kernel-default-5.14.21-150400.24.170.2.s390x",
            "SUSE Manager Server 4.3:kernel-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Manager Server 4.3:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.ppc64le",
            "SUSE Manager Server 4.3:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
            "SUSE Manager Server 4.3:kernel-default-devel-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Manager Server 4.3:kernel-default-devel-5.14.21-150400.24.170.2.s390x",
            "SUSE Manager Server 4.3:kernel-default-devel-5.14.21-150400.24.170.2.x86_64",
            "SUSE Manager Server 4.3:kernel-devel-5.14.21-150400.24.170.1.noarch",
            "SUSE Manager Server 4.3:kernel-macros-5.14.21-150400.24.170.1.noarch",
            "SUSE Manager Server 4.3:kernel-source-5.14.21-150400.24.170.1.noarch",
            "SUSE Manager Server 4.3:kernel-syms-5.14.21-150400.24.170.1.ppc64le",
            "SUSE Manager Server 4.3:kernel-syms-5.14.21-150400.24.170.1.s390x",
            "SUSE Manager Server 4.3:kernel-syms-5.14.21-150400.24.170.1.x86_64",
            "SUSE Manager Server 4.3:kernel-zfcpdump-5.14.21-150400.24.170.2.s390x"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2025-07-28T15:09:33Z",
          "details": "important"
        }
      ],
      "title": "CVE-2022-4095"
    },
    {
      "cve": "CVE-2022-4662",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2022-4662"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "A flaw incorrect access control in the Linux kernel USB core subsystem was found in the way user attaches usb device. A local user could use this flaw to crash the system.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.170.2.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.170.2.s390x",
          "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.170.2.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.170.2.s390x",
          "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.170.2.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.170.2.s390x",
          "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.170.2.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.170.2.s390x",
          "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-64kb-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-64kb-devel-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-devel-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-devel-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-devel-5.14.21-150400.24.170.1.noarch",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-docs-5.14.21-150400.24.170.1.noarch",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-macros-5.14.21-150400.24.170.1.noarch",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-obs-build-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-obs-build-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-source-5.14.21-150400.24.170.1.noarch",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-syms-5.14.21-150400.24.170.1.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-syms-5.14.21-150400.24.170.1.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:reiserfs-kmp-default-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:reiserfs-kmp-default-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-64kb-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-64kb-devel-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-devel-5.14.21-150400.24.170.1.noarch",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-docs-5.14.21-150400.24.170.1.noarch",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-macros-5.14.21-150400.24.170.1.noarch",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-source-5.14.21-150400.24.170.1.noarch",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.170.1.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.170.1.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.170.2.ppc64le",
          "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.170.2.s390x",
          "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.170.2.ppc64le",
          "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.170.2.s390x",
          "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_170-default-1-150400.9.3.2.ppc64le",
          "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_170-default-1-150400.9.3.2.s390x",
          "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_170-default-1-150400.9.3.2.x86_64",
          "SUSE Linux Enterprise Micro 5.3:kernel-default-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise Micro 5.3:kernel-default-5.14.21-150400.24.170.2.s390x",
          "SUSE Linux Enterprise Micro 5.3:kernel-default-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise Micro 5.3:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.aarch64",
          "SUSE Linux Enterprise Micro 5.3:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
          "SUSE Linux Enterprise Micro 5.4:kernel-default-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise Micro 5.4:kernel-default-5.14.21-150400.24.170.2.s390x",
          "SUSE Linux Enterprise Micro 5.4:kernel-default-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise Micro 5.4:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.aarch64",
          "SUSE Linux Enterprise Micro 5.4:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-64kb-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-64kb-devel-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-5.14.21-150400.24.170.2.ppc64le",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-5.14.21-150400.24.170.2.s390x",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.aarch64",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.ppc64le",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.170.2.ppc64le",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.170.2.s390x",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-devel-5.14.21-150400.24.170.1.noarch",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-docs-5.14.21-150400.24.170.1.noarch",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-macros-5.14.21-150400.24.170.1.noarch",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.170.2.ppc64le",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.170.2.s390x",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-source-5.14.21-150400.24.170.1.noarch",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.170.1.aarch64",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.170.1.ppc64le",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.170.1.s390x",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.170.1.x86_64",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-zfcpdump-5.14.21-150400.24.170.2.s390x",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.170.2.ppc64le",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.170.2.s390x",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-5.14.21-150400.24.170.2.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-devel-5.14.21-150400.24.170.2.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-devel-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-devel-5.14.21-150400.24.170.1.noarch",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-docs-5.14.21-150400.24.170.1.noarch",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-macros-5.14.21-150400.24.170.1.noarch",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-obs-build-5.14.21-150400.24.170.2.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-obs-build-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-source-5.14.21-150400.24.170.1.noarch",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-syms-5.14.21-150400.24.170.1.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-syms-5.14.21-150400.24.170.1.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.170.2.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.170.2.x86_64",
          "SUSE Manager Proxy 4.3:kernel-default-5.14.21-150400.24.170.2.x86_64",
          "SUSE Manager Proxy 4.3:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
          "SUSE Manager Proxy 4.3:kernel-default-devel-5.14.21-150400.24.170.2.x86_64",
          "SUSE Manager Proxy 4.3:kernel-devel-5.14.21-150400.24.170.1.noarch",
          "SUSE Manager Proxy 4.3:kernel-macros-5.14.21-150400.24.170.1.noarch",
          "SUSE Manager Proxy 4.3:kernel-source-5.14.21-150400.24.170.1.noarch",
          "SUSE Manager Proxy 4.3:kernel-syms-5.14.21-150400.24.170.1.x86_64",
          "SUSE Manager Server 4.3:kernel-default-5.14.21-150400.24.170.2.ppc64le",
          "SUSE Manager Server 4.3:kernel-default-5.14.21-150400.24.170.2.s390x",
          "SUSE Manager Server 4.3:kernel-default-5.14.21-150400.24.170.2.x86_64",
          "SUSE Manager Server 4.3:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.ppc64le",
          "SUSE Manager Server 4.3:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
          "SUSE Manager Server 4.3:kernel-default-devel-5.14.21-150400.24.170.2.ppc64le",
          "SUSE Manager Server 4.3:kernel-default-devel-5.14.21-150400.24.170.2.s390x",
          "SUSE Manager Server 4.3:kernel-default-devel-5.14.21-150400.24.170.2.x86_64",
          "SUSE Manager Server 4.3:kernel-devel-5.14.21-150400.24.170.1.noarch",
          "SUSE Manager Server 4.3:kernel-macros-5.14.21-150400.24.170.1.noarch",
          "SUSE Manager Server 4.3:kernel-source-5.14.21-150400.24.170.1.noarch",
          "SUSE Manager Server 4.3:kernel-syms-5.14.21-150400.24.170.1.ppc64le",
          "SUSE Manager Server 4.3:kernel-syms-5.14.21-150400.24.170.1.s390x",
          "SUSE Manager Server 4.3:kernel-syms-5.14.21-150400.24.170.1.x86_64",
          "SUSE Manager Server 4.3:kernel-zfcpdump-5.14.21-150400.24.170.2.s390x"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2022-4662",
          "url": "https://www.suse.com/security/cve/CVE-2022-4662"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1206664 for CVE-2022-4662",
          "url": "https://bugzilla.suse.com/1206664"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-64kb-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-64kb-devel-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-devel-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-devel-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-devel-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-docs-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-macros-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-obs-build-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-obs-build-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-source-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-syms-5.14.21-150400.24.170.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-syms-5.14.21-150400.24.170.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:reiserfs-kmp-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:reiserfs-kmp-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-64kb-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-64kb-devel-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-devel-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-docs-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-macros-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-source-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.170.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.170.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_170-default-1-150400.9.3.2.ppc64le",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_170-default-1-150400.9.3.2.s390x",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_170-default-1-150400.9.3.2.x86_64",
            "SUSE Linux Enterprise Micro 5.3:kernel-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise Micro 5.3:kernel-default-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise Micro 5.3:kernel-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Micro 5.3:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.aarch64",
            "SUSE Linux Enterprise Micro 5.3:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
            "SUSE Linux Enterprise Micro 5.4:kernel-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise Micro 5.4:kernel-default-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise Micro 5.4:kernel-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Micro 5.4:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.aarch64",
            "SUSE Linux Enterprise Micro 5.4:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-64kb-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-64kb-devel-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.aarch64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.ppc64le",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-devel-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-docs-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-macros-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-source-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.170.1.aarch64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.170.1.ppc64le",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.170.1.s390x",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.170.1.x86_64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-zfcpdump-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-devel-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-devel-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-devel-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-docs-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-macros-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-obs-build-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-obs-build-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-source-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-syms-5.14.21-150400.24.170.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-syms-5.14.21-150400.24.170.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Manager Proxy 4.3:kernel-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Manager Proxy 4.3:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
            "SUSE Manager Proxy 4.3:kernel-default-devel-5.14.21-150400.24.170.2.x86_64",
            "SUSE Manager Proxy 4.3:kernel-devel-5.14.21-150400.24.170.1.noarch",
            "SUSE Manager Proxy 4.3:kernel-macros-5.14.21-150400.24.170.1.noarch",
            "SUSE Manager Proxy 4.3:kernel-source-5.14.21-150400.24.170.1.noarch",
            "SUSE Manager Proxy 4.3:kernel-syms-5.14.21-150400.24.170.1.x86_64",
            "SUSE Manager Server 4.3:kernel-default-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Manager Server 4.3:kernel-default-5.14.21-150400.24.170.2.s390x",
            "SUSE Manager Server 4.3:kernel-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Manager Server 4.3:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.ppc64le",
            "SUSE Manager Server 4.3:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
            "SUSE Manager Server 4.3:kernel-default-devel-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Manager Server 4.3:kernel-default-devel-5.14.21-150400.24.170.2.s390x",
            "SUSE Manager Server 4.3:kernel-default-devel-5.14.21-150400.24.170.2.x86_64",
            "SUSE Manager Server 4.3:kernel-devel-5.14.21-150400.24.170.1.noarch",
            "SUSE Manager Server 4.3:kernel-macros-5.14.21-150400.24.170.1.noarch",
            "SUSE Manager Server 4.3:kernel-source-5.14.21-150400.24.170.1.noarch",
            "SUSE Manager Server 4.3:kernel-syms-5.14.21-150400.24.170.1.ppc64le",
            "SUSE Manager Server 4.3:kernel-syms-5.14.21-150400.24.170.1.s390x",
            "SUSE Manager Server 4.3:kernel-syms-5.14.21-150400.24.170.1.x86_64",
            "SUSE Manager Server 4.3:kernel-zfcpdump-5.14.21-150400.24.170.2.s390x"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 4.7,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H",
            "version": "3.1"
          },
          "products": [
            "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-64kb-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-64kb-devel-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-devel-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-devel-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-devel-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-docs-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-macros-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-obs-build-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-obs-build-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-source-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-syms-5.14.21-150400.24.170.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-syms-5.14.21-150400.24.170.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:reiserfs-kmp-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:reiserfs-kmp-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-64kb-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-64kb-devel-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-devel-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-docs-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-macros-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-source-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.170.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.170.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_170-default-1-150400.9.3.2.ppc64le",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_170-default-1-150400.9.3.2.s390x",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_170-default-1-150400.9.3.2.x86_64",
            "SUSE Linux Enterprise Micro 5.3:kernel-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise Micro 5.3:kernel-default-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise Micro 5.3:kernel-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Micro 5.3:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.aarch64",
            "SUSE Linux Enterprise Micro 5.3:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
            "SUSE Linux Enterprise Micro 5.4:kernel-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise Micro 5.4:kernel-default-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise Micro 5.4:kernel-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Micro 5.4:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.aarch64",
            "SUSE Linux Enterprise Micro 5.4:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-64kb-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-64kb-devel-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.aarch64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.ppc64le",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-devel-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-docs-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-macros-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-source-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.170.1.aarch64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.170.1.ppc64le",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.170.1.s390x",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.170.1.x86_64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-zfcpdump-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-devel-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-devel-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-devel-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-docs-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-macros-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-obs-build-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-obs-build-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-source-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-syms-5.14.21-150400.24.170.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-syms-5.14.21-150400.24.170.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Manager Proxy 4.3:kernel-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Manager Proxy 4.3:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
            "SUSE Manager Proxy 4.3:kernel-default-devel-5.14.21-150400.24.170.2.x86_64",
            "SUSE Manager Proxy 4.3:kernel-devel-5.14.21-150400.24.170.1.noarch",
            "SUSE Manager Proxy 4.3:kernel-macros-5.14.21-150400.24.170.1.noarch",
            "SUSE Manager Proxy 4.3:kernel-source-5.14.21-150400.24.170.1.noarch",
            "SUSE Manager Proxy 4.3:kernel-syms-5.14.21-150400.24.170.1.x86_64",
            "SUSE Manager Server 4.3:kernel-default-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Manager Server 4.3:kernel-default-5.14.21-150400.24.170.2.s390x",
            "SUSE Manager Server 4.3:kernel-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Manager Server 4.3:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.ppc64le",
            "SUSE Manager Server 4.3:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
            "SUSE Manager Server 4.3:kernel-default-devel-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Manager Server 4.3:kernel-default-devel-5.14.21-150400.24.170.2.s390x",
            "SUSE Manager Server 4.3:kernel-default-devel-5.14.21-150400.24.170.2.x86_64",
            "SUSE Manager Server 4.3:kernel-devel-5.14.21-150400.24.170.1.noarch",
            "SUSE Manager Server 4.3:kernel-macros-5.14.21-150400.24.170.1.noarch",
            "SUSE Manager Server 4.3:kernel-source-5.14.21-150400.24.170.1.noarch",
            "SUSE Manager Server 4.3:kernel-syms-5.14.21-150400.24.170.1.ppc64le",
            "SUSE Manager Server 4.3:kernel-syms-5.14.21-150400.24.170.1.s390x",
            "SUSE Manager Server 4.3:kernel-syms-5.14.21-150400.24.170.1.x86_64",
            "SUSE Manager Server 4.3:kernel-zfcpdump-5.14.21-150400.24.170.2.s390x"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2025-07-28T15:09:33Z",
          "details": "moderate"
        }
      ],
      "title": "CVE-2022-4662"
    },
    {
      "cve": "CVE-2022-49934",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2022-49934"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "In the Linux kernel, the following vulnerability has been resolved:\n\nwifi: mac80211: Fix UAF in ieee80211_scan_rx()\n\nieee80211_scan_rx() tries to access scan_req-\u003eflags after a\nnull check, but a UAF is observed when the scan is completed\nand __ieee80211_scan_completed() executes, which then calls\ncfg80211_scan_done() leading to the freeing of scan_req.\n\nSince scan_req is rcu_dereference()\u0027d, prevent the racing in\n__ieee80211_scan_completed() by ensuring that from mac80211\u0027s\nPOV it is no longer accessed from an RCU read critical section\nbefore we call cfg80211_scan_done().",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.170.2.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.170.2.s390x",
          "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.170.2.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.170.2.s390x",
          "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.170.2.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.170.2.s390x",
          "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.170.2.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.170.2.s390x",
          "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-64kb-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-64kb-devel-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-devel-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-devel-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-devel-5.14.21-150400.24.170.1.noarch",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-docs-5.14.21-150400.24.170.1.noarch",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-macros-5.14.21-150400.24.170.1.noarch",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-obs-build-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-obs-build-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-source-5.14.21-150400.24.170.1.noarch",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-syms-5.14.21-150400.24.170.1.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-syms-5.14.21-150400.24.170.1.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:reiserfs-kmp-default-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:reiserfs-kmp-default-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-64kb-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-64kb-devel-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-devel-5.14.21-150400.24.170.1.noarch",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-docs-5.14.21-150400.24.170.1.noarch",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-macros-5.14.21-150400.24.170.1.noarch",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-source-5.14.21-150400.24.170.1.noarch",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.170.1.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.170.1.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.170.2.ppc64le",
          "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.170.2.s390x",
          "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.170.2.ppc64le",
          "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.170.2.s390x",
          "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_170-default-1-150400.9.3.2.ppc64le",
          "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_170-default-1-150400.9.3.2.s390x",
          "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_170-default-1-150400.9.3.2.x86_64",
          "SUSE Linux Enterprise Micro 5.3:kernel-default-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise Micro 5.3:kernel-default-5.14.21-150400.24.170.2.s390x",
          "SUSE Linux Enterprise Micro 5.3:kernel-default-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise Micro 5.3:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.aarch64",
          "SUSE Linux Enterprise Micro 5.3:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
          "SUSE Linux Enterprise Micro 5.4:kernel-default-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise Micro 5.4:kernel-default-5.14.21-150400.24.170.2.s390x",
          "SUSE Linux Enterprise Micro 5.4:kernel-default-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise Micro 5.4:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.aarch64",
          "SUSE Linux Enterprise Micro 5.4:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-64kb-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-64kb-devel-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-5.14.21-150400.24.170.2.ppc64le",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-5.14.21-150400.24.170.2.s390x",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.aarch64",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.ppc64le",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.170.2.ppc64le",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.170.2.s390x",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-devel-5.14.21-150400.24.170.1.noarch",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-docs-5.14.21-150400.24.170.1.noarch",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-macros-5.14.21-150400.24.170.1.noarch",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.170.2.ppc64le",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.170.2.s390x",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-source-5.14.21-150400.24.170.1.noarch",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.170.1.aarch64",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.170.1.ppc64le",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.170.1.s390x",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.170.1.x86_64",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-zfcpdump-5.14.21-150400.24.170.2.s390x",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.170.2.ppc64le",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.170.2.s390x",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-5.14.21-150400.24.170.2.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-devel-5.14.21-150400.24.170.2.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-devel-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-devel-5.14.21-150400.24.170.1.noarch",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-docs-5.14.21-150400.24.170.1.noarch",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-macros-5.14.21-150400.24.170.1.noarch",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-obs-build-5.14.21-150400.24.170.2.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-obs-build-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-source-5.14.21-150400.24.170.1.noarch",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-syms-5.14.21-150400.24.170.1.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-syms-5.14.21-150400.24.170.1.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.170.2.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.170.2.x86_64",
          "SUSE Manager Proxy 4.3:kernel-default-5.14.21-150400.24.170.2.x86_64",
          "SUSE Manager Proxy 4.3:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
          "SUSE Manager Proxy 4.3:kernel-default-devel-5.14.21-150400.24.170.2.x86_64",
          "SUSE Manager Proxy 4.3:kernel-devel-5.14.21-150400.24.170.1.noarch",
          "SUSE Manager Proxy 4.3:kernel-macros-5.14.21-150400.24.170.1.noarch",
          "SUSE Manager Proxy 4.3:kernel-source-5.14.21-150400.24.170.1.noarch",
          "SUSE Manager Proxy 4.3:kernel-syms-5.14.21-150400.24.170.1.x86_64",
          "SUSE Manager Server 4.3:kernel-default-5.14.21-150400.24.170.2.ppc64le",
          "SUSE Manager Server 4.3:kernel-default-5.14.21-150400.24.170.2.s390x",
          "SUSE Manager Server 4.3:kernel-default-5.14.21-150400.24.170.2.x86_64",
          "SUSE Manager Server 4.3:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.ppc64le",
          "SUSE Manager Server 4.3:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
          "SUSE Manager Server 4.3:kernel-default-devel-5.14.21-150400.24.170.2.ppc64le",
          "SUSE Manager Server 4.3:kernel-default-devel-5.14.21-150400.24.170.2.s390x",
          "SUSE Manager Server 4.3:kernel-default-devel-5.14.21-150400.24.170.2.x86_64",
          "SUSE Manager Server 4.3:kernel-devel-5.14.21-150400.24.170.1.noarch",
          "SUSE Manager Server 4.3:kernel-macros-5.14.21-150400.24.170.1.noarch",
          "SUSE Manager Server 4.3:kernel-source-5.14.21-150400.24.170.1.noarch",
          "SUSE Manager Server 4.3:kernel-syms-5.14.21-150400.24.170.1.ppc64le",
          "SUSE Manager Server 4.3:kernel-syms-5.14.21-150400.24.170.1.s390x",
          "SUSE Manager Server 4.3:kernel-syms-5.14.21-150400.24.170.1.x86_64",
          "SUSE Manager Server 4.3:kernel-zfcpdump-5.14.21-150400.24.170.2.s390x"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2022-49934",
          "url": "https://www.suse.com/security/cve/CVE-2022-49934"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1245051 for CVE-2022-49934",
          "url": "https://bugzilla.suse.com/1245051"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-64kb-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-64kb-devel-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-devel-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-devel-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-devel-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-docs-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-macros-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-obs-build-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-obs-build-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-source-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-syms-5.14.21-150400.24.170.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-syms-5.14.21-150400.24.170.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:reiserfs-kmp-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:reiserfs-kmp-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-64kb-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-64kb-devel-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-devel-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-docs-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-macros-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-source-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.170.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.170.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_170-default-1-150400.9.3.2.ppc64le",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_170-default-1-150400.9.3.2.s390x",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_170-default-1-150400.9.3.2.x86_64",
            "SUSE Linux Enterprise Micro 5.3:kernel-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise Micro 5.3:kernel-default-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise Micro 5.3:kernel-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Micro 5.3:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.aarch64",
            "SUSE Linux Enterprise Micro 5.3:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
            "SUSE Linux Enterprise Micro 5.4:kernel-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise Micro 5.4:kernel-default-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise Micro 5.4:kernel-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Micro 5.4:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.aarch64",
            "SUSE Linux Enterprise Micro 5.4:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-64kb-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-64kb-devel-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.aarch64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.ppc64le",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-devel-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-docs-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-macros-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-source-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.170.1.aarch64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.170.1.ppc64le",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.170.1.s390x",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.170.1.x86_64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-zfcpdump-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-devel-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-devel-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-devel-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-docs-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-macros-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-obs-build-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-obs-build-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-source-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-syms-5.14.21-150400.24.170.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-syms-5.14.21-150400.24.170.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Manager Proxy 4.3:kernel-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Manager Proxy 4.3:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
            "SUSE Manager Proxy 4.3:kernel-default-devel-5.14.21-150400.24.170.2.x86_64",
            "SUSE Manager Proxy 4.3:kernel-devel-5.14.21-150400.24.170.1.noarch",
            "SUSE Manager Proxy 4.3:kernel-macros-5.14.21-150400.24.170.1.noarch",
            "SUSE Manager Proxy 4.3:kernel-source-5.14.21-150400.24.170.1.noarch",
            "SUSE Manager Proxy 4.3:kernel-syms-5.14.21-150400.24.170.1.x86_64",
            "SUSE Manager Server 4.3:kernel-default-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Manager Server 4.3:kernel-default-5.14.21-150400.24.170.2.s390x",
            "SUSE Manager Server 4.3:kernel-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Manager Server 4.3:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.ppc64le",
            "SUSE Manager Server 4.3:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
            "SUSE Manager Server 4.3:kernel-default-devel-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Manager Server 4.3:kernel-default-devel-5.14.21-150400.24.170.2.s390x",
            "SUSE Manager Server 4.3:kernel-default-devel-5.14.21-150400.24.170.2.x86_64",
            "SUSE Manager Server 4.3:kernel-devel-5.14.21-150400.24.170.1.noarch",
            "SUSE Manager Server 4.3:kernel-macros-5.14.21-150400.24.170.1.noarch",
            "SUSE Manager Server 4.3:kernel-source-5.14.21-150400.24.170.1.noarch",
            "SUSE Manager Server 4.3:kernel-syms-5.14.21-150400.24.170.1.ppc64le",
            "SUSE Manager Server 4.3:kernel-syms-5.14.21-150400.24.170.1.s390x",
            "SUSE Manager Server 4.3:kernel-syms-5.14.21-150400.24.170.1.x86_64",
            "SUSE Manager Server 4.3:kernel-zfcpdump-5.14.21-150400.24.170.2.s390x"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 4.7,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H",
            "version": "3.1"
          },
          "products": [
            "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-64kb-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-64kb-devel-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-devel-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-devel-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-devel-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-docs-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-macros-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-obs-build-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-obs-build-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-source-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-syms-5.14.21-150400.24.170.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-syms-5.14.21-150400.24.170.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:reiserfs-kmp-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:reiserfs-kmp-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-64kb-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-64kb-devel-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-devel-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-docs-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-macros-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-source-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.170.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.170.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_170-default-1-150400.9.3.2.ppc64le",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_170-default-1-150400.9.3.2.s390x",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_170-default-1-150400.9.3.2.x86_64",
            "SUSE Linux Enterprise Micro 5.3:kernel-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise Micro 5.3:kernel-default-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise Micro 5.3:kernel-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Micro 5.3:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.aarch64",
            "SUSE Linux Enterprise Micro 5.3:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
            "SUSE Linux Enterprise Micro 5.4:kernel-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise Micro 5.4:kernel-default-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise Micro 5.4:kernel-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Micro 5.4:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.aarch64",
            "SUSE Linux Enterprise Micro 5.4:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-64kb-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-64kb-devel-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.aarch64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.ppc64le",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-devel-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-docs-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-macros-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-source-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.170.1.aarch64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.170.1.ppc64le",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.170.1.s390x",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.170.1.x86_64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-zfcpdump-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-devel-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-devel-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-devel-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-docs-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-macros-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-obs-build-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-obs-build-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-source-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-syms-5.14.21-150400.24.170.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-syms-5.14.21-150400.24.170.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Manager Proxy 4.3:kernel-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Manager Proxy 4.3:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
            "SUSE Manager Proxy 4.3:kernel-default-devel-5.14.21-150400.24.170.2.x86_64",
            "SUSE Manager Proxy 4.3:kernel-devel-5.14.21-150400.24.170.1.noarch",
            "SUSE Manager Proxy 4.3:kernel-macros-5.14.21-150400.24.170.1.noarch",
            "SUSE Manager Proxy 4.3:kernel-source-5.14.21-150400.24.170.1.noarch",
            "SUSE Manager Proxy 4.3:kernel-syms-5.14.21-150400.24.170.1.x86_64",
            "SUSE Manager Server 4.3:kernel-default-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Manager Server 4.3:kernel-default-5.14.21-150400.24.170.2.s390x",
            "SUSE Manager Server 4.3:kernel-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Manager Server 4.3:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.ppc64le",
            "SUSE Manager Server 4.3:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
            "SUSE Manager Server 4.3:kernel-default-devel-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Manager Server 4.3:kernel-default-devel-5.14.21-150400.24.170.2.s390x",
            "SUSE Manager Server 4.3:kernel-default-devel-5.14.21-150400.24.170.2.x86_64",
            "SUSE Manager Server 4.3:kernel-devel-5.14.21-150400.24.170.1.noarch",
            "SUSE Manager Server 4.3:kernel-macros-5.14.21-150400.24.170.1.noarch",
            "SUSE Manager Server 4.3:kernel-source-5.14.21-150400.24.170.1.noarch",
            "SUSE Manager Server 4.3:kernel-syms-5.14.21-150400.24.170.1.ppc64le",
            "SUSE Manager Server 4.3:kernel-syms-5.14.21-150400.24.170.1.s390x",
            "SUSE Manager Server 4.3:kernel-syms-5.14.21-150400.24.170.1.x86_64",
            "SUSE Manager Server 4.3:kernel-zfcpdump-5.14.21-150400.24.170.2.s390x"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2025-07-28T15:09:33Z",
          "details": "moderate"
        }
      ],
      "title": "CVE-2022-49934"
    },
    {
      "cve": "CVE-2022-49936",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2022-49936"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "In the Linux kernel, the following vulnerability has been resolved:\n\nUSB: core: Prevent nested device-reset calls\n\nAutomatic kernel fuzzing revealed a recursive locking violation in\nusb-storage:\n\n============================================\nWARNING: possible recursive locking detected\n5.18.0 #3 Not tainted\n--------------------------------------------\nkworker/1:3/1205 is trying to acquire lock:\nffff888018638db8 (\u0026us_interface_key[i]){+.+.}-{3:3}, at:\nusb_stor_pre_reset+0x35/0x40 drivers/usb/storage/usb.c:230\n\nbut task is already holding lock:\nffff888018638db8 (\u0026us_interface_key[i]){+.+.}-{3:3}, at:\nusb_stor_pre_reset+0x35/0x40 drivers/usb/storage/usb.c:230\n\n...\n\nstack backtrace:\nCPU: 1 PID: 1205 Comm: kworker/1:3 Not tainted 5.18.0 #3\nHardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS\n1.13.0-1ubuntu1.1 04/01/2014\nWorkqueue: usb_hub_wq hub_event\nCall Trace:\n\u003cTASK\u003e\n__dump_stack lib/dump_stack.c:88 [inline]\ndump_stack_lvl+0xcd/0x134 lib/dump_stack.c:106\nprint_deadlock_bug kernel/locking/lockdep.c:2988 [inline]\ncheck_deadlock kernel/locking/lockdep.c:3031 [inline]\nvalidate_chain kernel/locking/lockdep.c:3816 [inline]\n__lock_acquire.cold+0x152/0x3ca kernel/locking/lockdep.c:5053\nlock_acquire kernel/locking/lockdep.c:5665 [inline]\nlock_acquire+0x1ab/0x520 kernel/locking/lockdep.c:5630\n__mutex_lock_common kernel/locking/mutex.c:603 [inline]\n__mutex_lock+0x14f/0x1610 kernel/locking/mutex.c:747\nusb_stor_pre_reset+0x35/0x40 drivers/usb/storage/usb.c:230\nusb_reset_device+0x37d/0x9a0 drivers/usb/core/hub.c:6109\nr871xu_dev_remove+0x21a/0x270 drivers/staging/rtl8712/usb_intf.c:622\nusb_unbind_interface+0x1bd/0x890 drivers/usb/core/driver.c:458\ndevice_remove drivers/base/dd.c:545 [inline]\ndevice_remove+0x11f/0x170 drivers/base/dd.c:537\n__device_release_driver drivers/base/dd.c:1222 [inline]\ndevice_release_driver_internal+0x1a7/0x2f0 drivers/base/dd.c:1248\nusb_driver_release_interface+0x102/0x180 drivers/usb/core/driver.c:627\nusb_forced_unbind_intf+0x4d/0xa0 drivers/usb/core/driver.c:1118\nusb_reset_device+0x39b/0x9a0 drivers/usb/core/hub.c:6114\n\nThis turned out not to be an error in usb-storage but rather a nested\ndevice reset attempt.  That is, as the rtl8712 driver was being\nunbound from a composite device in preparation for an unrelated USB\nreset (that driver does not have pre_reset or post_reset callbacks),\nits -\u003eremove routine called usb_reset_device() -- thus nesting one\nreset call within another.\n\nPerforming a reset as part of disconnect processing is a questionable\npractice at best.  However, the bug report points out that the USB\ncore does not have any protection against nested resets.  Adding a\nreset_in_progress flag and testing it will prevent such errors in the\nfuture.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.170.2.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.170.2.s390x",
          "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.170.2.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.170.2.s390x",
          "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.170.2.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.170.2.s390x",
          "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.170.2.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.170.2.s390x",
          "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-64kb-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-64kb-devel-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-devel-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-devel-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-devel-5.14.21-150400.24.170.1.noarch",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-docs-5.14.21-150400.24.170.1.noarch",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-macros-5.14.21-150400.24.170.1.noarch",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-obs-build-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-obs-build-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-source-5.14.21-150400.24.170.1.noarch",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-syms-5.14.21-150400.24.170.1.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-syms-5.14.21-150400.24.170.1.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:reiserfs-kmp-default-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:reiserfs-kmp-default-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-64kb-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-64kb-devel-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-devel-5.14.21-150400.24.170.1.noarch",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-docs-5.14.21-150400.24.170.1.noarch",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-macros-5.14.21-150400.24.170.1.noarch",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-source-5.14.21-150400.24.170.1.noarch",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.170.1.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.170.1.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.170.2.ppc64le",
          "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.170.2.s390x",
          "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.170.2.ppc64le",
          "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.170.2.s390x",
          "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_170-default-1-150400.9.3.2.ppc64le",
          "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_170-default-1-150400.9.3.2.s390x",
          "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_170-default-1-150400.9.3.2.x86_64",
          "SUSE Linux Enterprise Micro 5.3:kernel-default-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise Micro 5.3:kernel-default-5.14.21-150400.24.170.2.s390x",
          "SUSE Linux Enterprise Micro 5.3:kernel-default-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise Micro 5.3:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.aarch64",
          "SUSE Linux Enterprise Micro 5.3:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
          "SUSE Linux Enterprise Micro 5.4:kernel-default-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise Micro 5.4:kernel-default-5.14.21-150400.24.170.2.s390x",
          "SUSE Linux Enterprise Micro 5.4:kernel-default-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise Micro 5.4:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.aarch64",
          "SUSE Linux Enterprise Micro 5.4:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-64kb-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-64kb-devel-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-5.14.21-150400.24.170.2.ppc64le",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-5.14.21-150400.24.170.2.s390x",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.aarch64",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.ppc64le",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.170.2.ppc64le",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.170.2.s390x",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-devel-5.14.21-150400.24.170.1.noarch",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-docs-5.14.21-150400.24.170.1.noarch",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-macros-5.14.21-150400.24.170.1.noarch",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.170.2.ppc64le",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.170.2.s390x",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-source-5.14.21-150400.24.170.1.noarch",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.170.1.aarch64",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.170.1.ppc64le",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.170.1.s390x",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.170.1.x86_64",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-zfcpdump-5.14.21-150400.24.170.2.s390x",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.170.2.ppc64le",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.170.2.s390x",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-5.14.21-150400.24.170.2.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-devel-5.14.21-150400.24.170.2.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-devel-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-devel-5.14.21-150400.24.170.1.noarch",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-docs-5.14.21-150400.24.170.1.noarch",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-macros-5.14.21-150400.24.170.1.noarch",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-obs-build-5.14.21-150400.24.170.2.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-obs-build-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-source-5.14.21-150400.24.170.1.noarch",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-syms-5.14.21-150400.24.170.1.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-syms-5.14.21-150400.24.170.1.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.170.2.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.170.2.x86_64",
          "SUSE Manager Proxy 4.3:kernel-default-5.14.21-150400.24.170.2.x86_64",
          "SUSE Manager Proxy 4.3:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
          "SUSE Manager Proxy 4.3:kernel-default-devel-5.14.21-150400.24.170.2.x86_64",
          "SUSE Manager Proxy 4.3:kernel-devel-5.14.21-150400.24.170.1.noarch",
          "SUSE Manager Proxy 4.3:kernel-macros-5.14.21-150400.24.170.1.noarch",
          "SUSE Manager Proxy 4.3:kernel-source-5.14.21-150400.24.170.1.noarch",
          "SUSE Manager Proxy 4.3:kernel-syms-5.14.21-150400.24.170.1.x86_64",
          "SUSE Manager Server 4.3:kernel-default-5.14.21-150400.24.170.2.ppc64le",
          "SUSE Manager Server 4.3:kernel-default-5.14.21-150400.24.170.2.s390x",
          "SUSE Manager Server 4.3:kernel-default-5.14.21-150400.24.170.2.x86_64",
          "SUSE Manager Server 4.3:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.ppc64le",
          "SUSE Manager Server 4.3:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
          "SUSE Manager Server 4.3:kernel-default-devel-5.14.21-150400.24.170.2.ppc64le",
          "SUSE Manager Server 4.3:kernel-default-devel-5.14.21-150400.24.170.2.s390x",
          "SUSE Manager Server 4.3:kernel-default-devel-5.14.21-150400.24.170.2.x86_64",
          "SUSE Manager Server 4.3:kernel-devel-5.14.21-150400.24.170.1.noarch",
          "SUSE Manager Server 4.3:kernel-macros-5.14.21-150400.24.170.1.noarch",
          "SUSE Manager Server 4.3:kernel-source-5.14.21-150400.24.170.1.noarch",
          "SUSE Manager Server 4.3:kernel-syms-5.14.21-150400.24.170.1.ppc64le",
          "SUSE Manager Server 4.3:kernel-syms-5.14.21-150400.24.170.1.s390x",
          "SUSE Manager Server 4.3:kernel-syms-5.14.21-150400.24.170.1.x86_64",
          "SUSE Manager Server 4.3:kernel-zfcpdump-5.14.21-150400.24.170.2.s390x"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2022-49936",
          "url": "https://www.suse.com/security/cve/CVE-2022-49936"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1244984 for CVE-2022-49936",
          "url": "https://bugzilla.suse.com/1244984"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-64kb-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-64kb-devel-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-devel-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-devel-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-devel-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-docs-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-macros-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-obs-build-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-obs-build-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-source-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-syms-5.14.21-150400.24.170.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-syms-5.14.21-150400.24.170.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:reiserfs-kmp-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:reiserfs-kmp-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-64kb-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-64kb-devel-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-devel-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-docs-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-macros-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-source-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.170.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.170.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_170-default-1-150400.9.3.2.ppc64le",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_170-default-1-150400.9.3.2.s390x",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_170-default-1-150400.9.3.2.x86_64",
            "SUSE Linux Enterprise Micro 5.3:kernel-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise Micro 5.3:kernel-default-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise Micro 5.3:kernel-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Micro 5.3:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.aarch64",
            "SUSE Linux Enterprise Micro 5.3:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
            "SUSE Linux Enterprise Micro 5.4:kernel-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise Micro 5.4:kernel-default-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise Micro 5.4:kernel-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Micro 5.4:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.aarch64",
            "SUSE Linux Enterprise Micro 5.4:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-64kb-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-64kb-devel-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.aarch64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.ppc64le",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-devel-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-docs-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-macros-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-source-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.170.1.aarch64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.170.1.ppc64le",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.170.1.s390x",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.170.1.x86_64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-zfcpdump-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-devel-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-devel-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-devel-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-docs-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-macros-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-obs-build-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-obs-build-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-source-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-syms-5.14.21-150400.24.170.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-syms-5.14.21-150400.24.170.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Manager Proxy 4.3:kernel-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Manager Proxy 4.3:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
            "SUSE Manager Proxy 4.3:kernel-default-devel-5.14.21-150400.24.170.2.x86_64",
            "SUSE Manager Proxy 4.3:kernel-devel-5.14.21-150400.24.170.1.noarch",
            "SUSE Manager Proxy 4.3:kernel-macros-5.14.21-150400.24.170.1.noarch",
            "SUSE Manager Proxy 4.3:kernel-source-5.14.21-150400.24.170.1.noarch",
            "SUSE Manager Proxy 4.3:kernel-syms-5.14.21-150400.24.170.1.x86_64",
            "SUSE Manager Server 4.3:kernel-default-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Manager Server 4.3:kernel-default-5.14.21-150400.24.170.2.s390x",
            "SUSE Manager Server 4.3:kernel-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Manager Server 4.3:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.ppc64le",
            "SUSE Manager Server 4.3:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
            "SUSE Manager Server 4.3:kernel-default-devel-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Manager Server 4.3:kernel-default-devel-5.14.21-150400.24.170.2.s390x",
            "SUSE Manager Server 4.3:kernel-default-devel-5.14.21-150400.24.170.2.x86_64",
            "SUSE Manager Server 4.3:kernel-devel-5.14.21-150400.24.170.1.noarch",
            "SUSE Manager Server 4.3:kernel-macros-5.14.21-150400.24.170.1.noarch",
            "SUSE Manager Server 4.3:kernel-source-5.14.21-150400.24.170.1.noarch",
            "SUSE Manager Server 4.3:kernel-syms-5.14.21-150400.24.170.1.ppc64le",
            "SUSE Manager Server 4.3:kernel-syms-5.14.21-150400.24.170.1.s390x",
            "SUSE Manager Server 4.3:kernel-syms-5.14.21-150400.24.170.1.x86_64",
            "SUSE Manager Server 4.3:kernel-zfcpdump-5.14.21-150400.24.170.2.s390x"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 5.5,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
            "version": "3.1"
          },
          "products": [
            "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-64kb-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-64kb-devel-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-devel-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-devel-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-devel-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-docs-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-macros-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-obs-build-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-obs-build-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-source-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-syms-5.14.21-150400.24.170.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-syms-5.14.21-150400.24.170.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:reiserfs-kmp-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:reiserfs-kmp-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-64kb-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-64kb-devel-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-devel-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-docs-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-macros-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-source-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.170.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.170.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_170-default-1-150400.9.3.2.ppc64le",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_170-default-1-150400.9.3.2.s390x",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_170-default-1-150400.9.3.2.x86_64",
            "SUSE Linux Enterprise Micro 5.3:kernel-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise Micro 5.3:kernel-default-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise Micro 5.3:kernel-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Micro 5.3:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.aarch64",
            "SUSE Linux Enterprise Micro 5.3:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
            "SUSE Linux Enterprise Micro 5.4:kernel-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise Micro 5.4:kernel-default-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise Micro 5.4:kernel-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Micro 5.4:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.aarch64",
            "SUSE Linux Enterprise Micro 5.4:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-64kb-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-64kb-devel-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.aarch64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.ppc64le",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-devel-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-docs-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-macros-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-source-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.170.1.aarch64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.170.1.ppc64le",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.170.1.s390x",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.170.1.x86_64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-zfcpdump-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-devel-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-devel-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-devel-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-docs-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-macros-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-obs-build-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-obs-build-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-source-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-syms-5.14.21-150400.24.170.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-syms-5.14.21-150400.24.170.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Manager Proxy 4.3:kernel-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Manager Proxy 4.3:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
            "SUSE Manager Proxy 4.3:kernel-default-devel-5.14.21-150400.24.170.2.x86_64",
            "SUSE Manager Proxy 4.3:kernel-devel-5.14.21-150400.24.170.1.noarch",
            "SUSE Manager Proxy 4.3:kernel-macros-5.14.21-150400.24.170.1.noarch",
            "SUSE Manager Proxy 4.3:kernel-source-5.14.21-150400.24.170.1.noarch",
            "SUSE Manager Proxy 4.3:kernel-syms-5.14.21-150400.24.170.1.x86_64",
            "SUSE Manager Server 4.3:kernel-default-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Manager Server 4.3:kernel-default-5.14.21-150400.24.170.2.s390x",
            "SUSE Manager Server 4.3:kernel-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Manager Server 4.3:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.ppc64le",
            "SUSE Manager Server 4.3:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
            "SUSE Manager Server 4.3:kernel-default-devel-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Manager Server 4.3:kernel-default-devel-5.14.21-150400.24.170.2.s390x",
            "SUSE Manager Server 4.3:kernel-default-devel-5.14.21-150400.24.170.2.x86_64",
            "SUSE Manager Server 4.3:kernel-devel-5.14.21-150400.24.170.1.noarch",
            "SUSE Manager Server 4.3:kernel-macros-5.14.21-150400.24.170.1.noarch",
            "SUSE Manager Server 4.3:kernel-source-5.14.21-150400.24.170.1.noarch",
            "SUSE Manager Server 4.3:kernel-syms-5.14.21-150400.24.170.1.ppc64le",
            "SUSE Manager Server 4.3:kernel-syms-5.14.21-150400.24.170.1.s390x",
            "SUSE Manager Server 4.3:kernel-syms-5.14.21-150400.24.170.1.x86_64",
            "SUSE Manager Server 4.3:kernel-zfcpdump-5.14.21-150400.24.170.2.s390x"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2025-07-28T15:09:33Z",
          "details": "moderate"
        }
      ],
      "title": "CVE-2022-49936"
    },
    {
      "cve": "CVE-2022-49937",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2022-49937"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "In the Linux kernel, the following vulnerability has been resolved:\n\nmedia: mceusb: Use new usb_control_msg_*() routines\n\nAutomatic kernel fuzzing led to a WARN about invalid pipe direction in\nthe mceusb driver:\n\n------------[ cut here ]------------\nusb 6-1: BOGUS control dir, pipe 80000380 doesn\u0027t match bRequestType 40\nWARNING: CPU: 0 PID: 2465 at drivers/usb/core/urb.c:410\nusb_submit_urb+0x1326/0x1820 drivers/usb/core/urb.c:410\nModules linked in:\nCPU: 0 PID: 2465 Comm: kworker/0:2 Not tainted 5.19.0-rc4-00208-g69cb6c6556ad #1\nHardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS\n1.13.0-1ubuntu1.1 04/01/2014\nWorkqueue: usb_hub_wq hub_event\nRIP: 0010:usb_submit_urb+0x1326/0x1820 drivers/usb/core/urb.c:410\nCode: 7c 24 40 e8 ac 23 91 fd 48 8b 7c 24 40 e8 b2 70 1b ff 45 89 e8\n44 89 f1 4c 89 e2 48 89 c6 48 c7 c7 a0 30 a9 86 e8 48 07 11 02 \u003c0f\u003e 0b\ne9 1c f0 ff ff e8 7e 23 91 fd 0f b6 1d 63 22 83 05 31 ff 41\nRSP: 0018:ffffc900032becf0 EFLAGS: 00010282\nRAX: 0000000000000000 RBX: ffff8881100f3058 RCX: 0000000000000000\nRDX: ffffc90004961000 RSI: ffff888114c6d580 RDI: fffff52000657d90\nRBP: ffff888105ad90f0 R08: ffffffff812c3638 R09: 0000000000000000\nR10: 0000000000000005 R11: ffffed1023504ef1 R12: ffff888105ad9000\nR13: 0000000000000040 R14: 0000000080000380 R15: ffff88810ba96500\nFS: 0000000000000000(0000) GS:ffff88811a800000(0000) knlGS:0000000000000000\nCS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033\nCR2: 00007ffe810bda58 CR3: 000000010b720000 CR4: 0000000000350ef0\nCall Trace:\n\u003cTASK\u003e\nusb_start_wait_urb+0x101/0x4c0 drivers/usb/core/message.c:58\nusb_internal_control_msg drivers/usb/core/message.c:102 [inline]\nusb_control_msg+0x31c/0x4a0 drivers/usb/core/message.c:153\nmceusb_gen1_init drivers/media/rc/mceusb.c:1431 [inline]\nmceusb_dev_probe+0x258e/0x33f0 drivers/media/rc/mceusb.c:1807\n\nThe reason for the warning is clear enough; the driver sends an\nunusual read request on endpoint 0 but does not set the USB_DIR_IN bit\nin the bRequestType field.\n\nMore importantly, the whole situation can be avoided and the driver\nsimplified by converting it over to the relatively new\nusb_control_msg_recv() and usb_control_msg_send() routines.  That\u0027s\nwhat this fix does.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.170.2.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.170.2.s390x",
          "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.170.2.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.170.2.s390x",
          "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.170.2.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.170.2.s390x",
          "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.170.2.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.170.2.s390x",
          "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-64kb-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-64kb-devel-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-devel-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-devel-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-devel-5.14.21-150400.24.170.1.noarch",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-docs-5.14.21-150400.24.170.1.noarch",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-macros-5.14.21-150400.24.170.1.noarch",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-obs-build-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-obs-build-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-source-5.14.21-150400.24.170.1.noarch",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-syms-5.14.21-150400.24.170.1.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-syms-5.14.21-150400.24.170.1.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:reiserfs-kmp-default-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:reiserfs-kmp-default-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-64kb-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-64kb-devel-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-devel-5.14.21-150400.24.170.1.noarch",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-docs-5.14.21-150400.24.170.1.noarch",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-macros-5.14.21-150400.24.170.1.noarch",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-source-5.14.21-150400.24.170.1.noarch",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.170.1.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.170.1.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.170.2.ppc64le",
          "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.170.2.s390x",
          "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.170.2.ppc64le",
          "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.170.2.s390x",
          "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_170-default-1-150400.9.3.2.ppc64le",
          "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_170-default-1-150400.9.3.2.s390x",
          "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_170-default-1-150400.9.3.2.x86_64",
          "SUSE Linux Enterprise Micro 5.3:kernel-default-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise Micro 5.3:kernel-default-5.14.21-150400.24.170.2.s390x",
          "SUSE Linux Enterprise Micro 5.3:kernel-default-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise Micro 5.3:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.aarch64",
          "SUSE Linux Enterprise Micro 5.3:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
          "SUSE Linux Enterprise Micro 5.4:kernel-default-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise Micro 5.4:kernel-default-5.14.21-150400.24.170.2.s390x",
          "SUSE Linux Enterprise Micro 5.4:kernel-default-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise Micro 5.4:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.aarch64",
          "SUSE Linux Enterprise Micro 5.4:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-64kb-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-64kb-devel-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-5.14.21-150400.24.170.2.ppc64le",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-5.14.21-150400.24.170.2.s390x",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.aarch64",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.ppc64le",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.170.2.ppc64le",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.170.2.s390x",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-devel-5.14.21-150400.24.170.1.noarch",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-docs-5.14.21-150400.24.170.1.noarch",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-macros-5.14.21-150400.24.170.1.noarch",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.170.2.ppc64le",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.170.2.s390x",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-source-5.14.21-150400.24.170.1.noarch",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.170.1.aarch64",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.170.1.ppc64le",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.170.1.s390x",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.170.1.x86_64",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-zfcpdump-5.14.21-150400.24.170.2.s390x",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.170.2.ppc64le",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.170.2.s390x",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-5.14.21-150400.24.170.2.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-devel-5.14.21-150400.24.170.2.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-devel-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-devel-5.14.21-150400.24.170.1.noarch",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-docs-5.14.21-150400.24.170.1.noarch",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-macros-5.14.21-150400.24.170.1.noarch",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-obs-build-5.14.21-150400.24.170.2.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-obs-build-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-source-5.14.21-150400.24.170.1.noarch",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-syms-5.14.21-150400.24.170.1.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-syms-5.14.21-150400.24.170.1.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.170.2.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.170.2.x86_64",
          "SUSE Manager Proxy 4.3:kernel-default-5.14.21-150400.24.170.2.x86_64",
          "SUSE Manager Proxy 4.3:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
          "SUSE Manager Proxy 4.3:kernel-default-devel-5.14.21-150400.24.170.2.x86_64",
          "SUSE Manager Proxy 4.3:kernel-devel-5.14.21-150400.24.170.1.noarch",
          "SUSE Manager Proxy 4.3:kernel-macros-5.14.21-150400.24.170.1.noarch",
          "SUSE Manager Proxy 4.3:kernel-source-5.14.21-150400.24.170.1.noarch",
          "SUSE Manager Proxy 4.3:kernel-syms-5.14.21-150400.24.170.1.x86_64",
          "SUSE Manager Server 4.3:kernel-default-5.14.21-150400.24.170.2.ppc64le",
          "SUSE Manager Server 4.3:kernel-default-5.14.21-150400.24.170.2.s390x",
          "SUSE Manager Server 4.3:kernel-default-5.14.21-150400.24.170.2.x86_64",
          "SUSE Manager Server 4.3:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.ppc64le",
          "SUSE Manager Server 4.3:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
          "SUSE Manager Server 4.3:kernel-default-devel-5.14.21-150400.24.170.2.ppc64le",
          "SUSE Manager Server 4.3:kernel-default-devel-5.14.21-150400.24.170.2.s390x",
          "SUSE Manager Server 4.3:kernel-default-devel-5.14.21-150400.24.170.2.x86_64",
          "SUSE Manager Server 4.3:kernel-devel-5.14.21-150400.24.170.1.noarch",
          "SUSE Manager Server 4.3:kernel-macros-5.14.21-150400.24.170.1.noarch",
          "SUSE Manager Server 4.3:kernel-source-5.14.21-150400.24.170.1.noarch",
          "SUSE Manager Server 4.3:kernel-syms-5.14.21-150400.24.170.1.ppc64le",
          "SUSE Manager Server 4.3:kernel-syms-5.14.21-150400.24.170.1.s390x",
          "SUSE Manager Server 4.3:kernel-syms-5.14.21-150400.24.170.1.x86_64",
          "SUSE Manager Server 4.3:kernel-zfcpdump-5.14.21-150400.24.170.2.s390x"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2022-49937",
          "url": "https://www.suse.com/security/cve/CVE-2022-49937"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1245057 for CVE-2022-49937",
          "url": "https://bugzilla.suse.com/1245057"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-64kb-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-64kb-devel-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-devel-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-devel-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-devel-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-docs-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-macros-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-obs-build-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-obs-build-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-source-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-syms-5.14.21-150400.24.170.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-syms-5.14.21-150400.24.170.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:reiserfs-kmp-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:reiserfs-kmp-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-64kb-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-64kb-devel-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-devel-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-docs-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-macros-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-source-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.170.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.170.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_170-default-1-150400.9.3.2.ppc64le",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_170-default-1-150400.9.3.2.s390x",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_170-default-1-150400.9.3.2.x86_64",
            "SUSE Linux Enterprise Micro 5.3:kernel-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise Micro 5.3:kernel-default-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise Micro 5.3:kernel-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Micro 5.3:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.aarch64",
            "SUSE Linux Enterprise Micro 5.3:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
            "SUSE Linux Enterprise Micro 5.4:kernel-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise Micro 5.4:kernel-default-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise Micro 5.4:kernel-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Micro 5.4:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.aarch64",
            "SUSE Linux Enterprise Micro 5.4:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-64kb-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-64kb-devel-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.aarch64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.ppc64le",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-devel-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-docs-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-macros-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-source-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.170.1.aarch64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.170.1.ppc64le",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.170.1.s390x",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.170.1.x86_64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-zfcpdump-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-devel-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-devel-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-devel-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-docs-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-macros-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-obs-build-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-obs-build-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-source-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-syms-5.14.21-150400.24.170.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-syms-5.14.21-150400.24.170.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Manager Proxy 4.3:kernel-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Manager Proxy 4.3:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
            "SUSE Manager Proxy 4.3:kernel-default-devel-5.14.21-150400.24.170.2.x86_64",
            "SUSE Manager Proxy 4.3:kernel-devel-5.14.21-150400.24.170.1.noarch",
            "SUSE Manager Proxy 4.3:kernel-macros-5.14.21-150400.24.170.1.noarch",
            "SUSE Manager Proxy 4.3:kernel-source-5.14.21-150400.24.170.1.noarch",
            "SUSE Manager Proxy 4.3:kernel-syms-5.14.21-150400.24.170.1.x86_64",
            "SUSE Manager Server 4.3:kernel-default-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Manager Server 4.3:kernel-default-5.14.21-150400.24.170.2.s390x",
            "SUSE Manager Server 4.3:kernel-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Manager Server 4.3:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.ppc64le",
            "SUSE Manager Server 4.3:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
            "SUSE Manager Server 4.3:kernel-default-devel-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Manager Server 4.3:kernel-default-devel-5.14.21-150400.24.170.2.s390x",
            "SUSE Manager Server 4.3:kernel-default-devel-5.14.21-150400.24.170.2.x86_64",
            "SUSE Manager Server 4.3:kernel-devel-5.14.21-150400.24.170.1.noarch",
            "SUSE Manager Server 4.3:kernel-macros-5.14.21-150400.24.170.1.noarch",
            "SUSE Manager Server 4.3:kernel-source-5.14.21-150400.24.170.1.noarch",
            "SUSE Manager Server 4.3:kernel-syms-5.14.21-150400.24.170.1.ppc64le",
            "SUSE Manager Server 4.3:kernel-syms-5.14.21-150400.24.170.1.s390x",
            "SUSE Manager Server 4.3:kernel-syms-5.14.21-150400.24.170.1.x86_64",
            "SUSE Manager Server 4.3:kernel-zfcpdump-5.14.21-150400.24.170.2.s390x"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 4,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L",
            "version": "3.1"
          },
          "products": [
            "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-64kb-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-64kb-devel-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-devel-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-devel-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-devel-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-docs-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-macros-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-obs-build-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-obs-build-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-source-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-syms-5.14.21-150400.24.170.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-syms-5.14.21-150400.24.170.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:reiserfs-kmp-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:reiserfs-kmp-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-64kb-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-64kb-devel-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-devel-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-docs-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-macros-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-source-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.170.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.170.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_170-default-1-150400.9.3.2.ppc64le",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_170-default-1-150400.9.3.2.s390x",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_170-default-1-150400.9.3.2.x86_64",
            "SUSE Linux Enterprise Micro 5.3:kernel-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise Micro 5.3:kernel-default-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise Micro 5.3:kernel-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Micro 5.3:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.aarch64",
            "SUSE Linux Enterprise Micro 5.3:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
            "SUSE Linux Enterprise Micro 5.4:kernel-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise Micro 5.4:kernel-default-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise Micro 5.4:kernel-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Micro 5.4:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.aarch64",
            "SUSE Linux Enterprise Micro 5.4:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-64kb-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-64kb-devel-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.aarch64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.ppc64le",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-devel-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-docs-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-macros-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-source-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.170.1.aarch64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.170.1.ppc64le",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.170.1.s390x",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.170.1.x86_64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-zfcpdump-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-devel-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-devel-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-devel-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-docs-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-macros-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-obs-build-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-obs-build-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-source-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-syms-5.14.21-150400.24.170.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-syms-5.14.21-150400.24.170.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Manager Proxy 4.3:kernel-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Manager Proxy 4.3:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
            "SUSE Manager Proxy 4.3:kernel-default-devel-5.14.21-150400.24.170.2.x86_64",
            "SUSE Manager Proxy 4.3:kernel-devel-5.14.21-150400.24.170.1.noarch",
            "SUSE Manager Proxy 4.3:kernel-macros-5.14.21-150400.24.170.1.noarch",
            "SUSE Manager Proxy 4.3:kernel-source-5.14.21-150400.24.170.1.noarch",
            "SUSE Manager Proxy 4.3:kernel-syms-5.14.21-150400.24.170.1.x86_64",
            "SUSE Manager Server 4.3:kernel-default-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Manager Server 4.3:kernel-default-5.14.21-150400.24.170.2.s390x",
            "SUSE Manager Server 4.3:kernel-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Manager Server 4.3:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.ppc64le",
            "SUSE Manager Server 4.3:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
            "SUSE Manager Server 4.3:kernel-default-devel-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Manager Server 4.3:kernel-default-devel-5.14.21-150400.24.170.2.s390x",
            "SUSE Manager Server 4.3:kernel-default-devel-5.14.21-150400.24.170.2.x86_64",
            "SUSE Manager Server 4.3:kernel-devel-5.14.21-150400.24.170.1.noarch",
            "SUSE Manager Server 4.3:kernel-macros-5.14.21-150400.24.170.1.noarch",
            "SUSE Manager Server 4.3:kernel-source-5.14.21-150400.24.170.1.noarch",
            "SUSE Manager Server 4.3:kernel-syms-5.14.21-150400.24.170.1.ppc64le",
            "SUSE Manager Server 4.3:kernel-syms-5.14.21-150400.24.170.1.s390x",
            "SUSE Manager Server 4.3:kernel-syms-5.14.21-150400.24.170.1.x86_64",
            "SUSE Manager Server 4.3:kernel-zfcpdump-5.14.21-150400.24.170.2.s390x"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2025-07-28T15:09:33Z",
          "details": "low"
        }
      ],
      "title": "CVE-2022-49937"
    },
    {
      "cve": "CVE-2022-49938",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2022-49938"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "In the Linux kernel, the following vulnerability has been resolved:\n\ncifs: fix small mempool leak in SMB2_negotiate()\n\nIn some cases of failure (dialect mismatches) in SMB2_negotiate(), after\nthe request is sent, the checks would return -EIO when they should be\nrather setting rc = -EIO and jumping to neg_exit to free the response\nbuffer from mempool.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.170.2.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.170.2.s390x",
          "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.170.2.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.170.2.s390x",
          "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.170.2.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.170.2.s390x",
          "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.170.2.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.170.2.s390x",
          "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-64kb-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-64kb-devel-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-devel-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-devel-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-devel-5.14.21-150400.24.170.1.noarch",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-docs-5.14.21-150400.24.170.1.noarch",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-macros-5.14.21-150400.24.170.1.noarch",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-obs-build-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-obs-build-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-source-5.14.21-150400.24.170.1.noarch",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-syms-5.14.21-150400.24.170.1.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-syms-5.14.21-150400.24.170.1.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:reiserfs-kmp-default-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:reiserfs-kmp-default-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-64kb-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-64kb-devel-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-devel-5.14.21-150400.24.170.1.noarch",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-docs-5.14.21-150400.24.170.1.noarch",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-macros-5.14.21-150400.24.170.1.noarch",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-source-5.14.21-150400.24.170.1.noarch",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.170.1.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.170.1.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.170.2.ppc64le",
          "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.170.2.s390x",
          "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.170.2.ppc64le",
          "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.170.2.s390x",
          "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_170-default-1-150400.9.3.2.ppc64le",
          "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_170-default-1-150400.9.3.2.s390x",
          "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_170-default-1-150400.9.3.2.x86_64",
          "SUSE Linux Enterprise Micro 5.3:kernel-default-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise Micro 5.3:kernel-default-5.14.21-150400.24.170.2.s390x",
          "SUSE Linux Enterprise Micro 5.3:kernel-default-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise Micro 5.3:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.aarch64",
          "SUSE Linux Enterprise Micro 5.3:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
          "SUSE Linux Enterprise Micro 5.4:kernel-default-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise Micro 5.4:kernel-default-5.14.21-150400.24.170.2.s390x",
          "SUSE Linux Enterprise Micro 5.4:kernel-default-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise Micro 5.4:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.aarch64",
          "SUSE Linux Enterprise Micro 5.4:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-64kb-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-64kb-devel-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-5.14.21-150400.24.170.2.ppc64le",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-5.14.21-150400.24.170.2.s390x",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.aarch64",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.ppc64le",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.170.2.ppc64le",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.170.2.s390x",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-devel-5.14.21-150400.24.170.1.noarch",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-docs-5.14.21-150400.24.170.1.noarch",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-macros-5.14.21-150400.24.170.1.noarch",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.170.2.ppc64le",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.170.2.s390x",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-source-5.14.21-150400.24.170.1.noarch",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.170.1.aarch64",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.170.1.ppc64le",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.170.1.s390x",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.170.1.x86_64",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-zfcpdump-5.14.21-150400.24.170.2.s390x",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.170.2.ppc64le",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.170.2.s390x",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-5.14.21-150400.24.170.2.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-devel-5.14.21-150400.24.170.2.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-devel-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-devel-5.14.21-150400.24.170.1.noarch",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-docs-5.14.21-150400.24.170.1.noarch",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-macros-5.14.21-150400.24.170.1.noarch",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-obs-build-5.14.21-150400.24.170.2.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-obs-build-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-source-5.14.21-150400.24.170.1.noarch",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-syms-5.14.21-150400.24.170.1.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-syms-5.14.21-150400.24.170.1.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.170.2.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.170.2.x86_64",
          "SUSE Manager Proxy 4.3:kernel-default-5.14.21-150400.24.170.2.x86_64",
          "SUSE Manager Proxy 4.3:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
          "SUSE Manager Proxy 4.3:kernel-default-devel-5.14.21-150400.24.170.2.x86_64",
          "SUSE Manager Proxy 4.3:kernel-devel-5.14.21-150400.24.170.1.noarch",
          "SUSE Manager Proxy 4.3:kernel-macros-5.14.21-150400.24.170.1.noarch",
          "SUSE Manager Proxy 4.3:kernel-source-5.14.21-150400.24.170.1.noarch",
          "SUSE Manager Proxy 4.3:kernel-syms-5.14.21-150400.24.170.1.x86_64",
          "SUSE Manager Server 4.3:kernel-default-5.14.21-150400.24.170.2.ppc64le",
          "SUSE Manager Server 4.3:kernel-default-5.14.21-150400.24.170.2.s390x",
          "SUSE Manager Server 4.3:kernel-default-5.14.21-150400.24.170.2.x86_64",
          "SUSE Manager Server 4.3:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.ppc64le",
          "SUSE Manager Server 4.3:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
          "SUSE Manager Server 4.3:kernel-default-devel-5.14.21-150400.24.170.2.ppc64le",
          "SUSE Manager Server 4.3:kernel-default-devel-5.14.21-150400.24.170.2.s390x",
          "SUSE Manager Server 4.3:kernel-default-devel-5.14.21-150400.24.170.2.x86_64",
          "SUSE Manager Server 4.3:kernel-devel-5.14.21-150400.24.170.1.noarch",
          "SUSE Manager Server 4.3:kernel-macros-5.14.21-150400.24.170.1.noarch",
          "SUSE Manager Server 4.3:kernel-source-5.14.21-150400.24.170.1.noarch",
          "SUSE Manager Server 4.3:kernel-syms-5.14.21-150400.24.170.1.ppc64le",
          "SUSE Manager Server 4.3:kernel-syms-5.14.21-150400.24.170.1.s390x",
          "SUSE Manager Server 4.3:kernel-syms-5.14.21-150400.24.170.1.x86_64",
          "SUSE Manager Server 4.3:kernel-zfcpdump-5.14.21-150400.24.170.2.s390x"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2022-49938",
          "url": "https://www.suse.com/security/cve/CVE-2022-49938"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1244820 for CVE-2022-49938",
          "url": "https://bugzilla.suse.com/1244820"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-64kb-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-64kb-devel-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-devel-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-devel-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-devel-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-docs-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-macros-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-obs-build-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-obs-build-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-source-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-syms-5.14.21-150400.24.170.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-syms-5.14.21-150400.24.170.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:reiserfs-kmp-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:reiserfs-kmp-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-64kb-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-64kb-devel-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-devel-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-docs-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-macros-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-source-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.170.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.170.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_170-default-1-150400.9.3.2.ppc64le",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_170-default-1-150400.9.3.2.s390x",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_170-default-1-150400.9.3.2.x86_64",
            "SUSE Linux Enterprise Micro 5.3:kernel-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise Micro 5.3:kernel-default-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise Micro 5.3:kernel-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Micro 5.3:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.aarch64",
            "SUSE Linux Enterprise Micro 5.3:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
            "SUSE Linux Enterprise Micro 5.4:kernel-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise Micro 5.4:kernel-default-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise Micro 5.4:kernel-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Micro 5.4:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.aarch64",
            "SUSE Linux Enterprise Micro 5.4:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-64kb-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-64kb-devel-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.aarch64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.ppc64le",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-devel-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-docs-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-macros-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-source-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.170.1.aarch64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.170.1.ppc64le",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.170.1.s390x",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.170.1.x86_64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-zfcpdump-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-devel-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-devel-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-devel-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-docs-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-macros-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-obs-build-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-obs-build-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-source-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-syms-5.14.21-150400.24.170.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-syms-5.14.21-150400.24.170.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Manager Proxy 4.3:kernel-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Manager Proxy 4.3:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
            "SUSE Manager Proxy 4.3:kernel-default-devel-5.14.21-150400.24.170.2.x86_64",
            "SUSE Manager Proxy 4.3:kernel-devel-5.14.21-150400.24.170.1.noarch",
            "SUSE Manager Proxy 4.3:kernel-macros-5.14.21-150400.24.170.1.noarch",
            "SUSE Manager Proxy 4.3:kernel-source-5.14.21-150400.24.170.1.noarch",
            "SUSE Manager Proxy 4.3:kernel-syms-5.14.21-150400.24.170.1.x86_64",
            "SUSE Manager Server 4.3:kernel-default-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Manager Server 4.3:kernel-default-5.14.21-150400.24.170.2.s390x",
            "SUSE Manager Server 4.3:kernel-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Manager Server 4.3:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.ppc64le",
            "SUSE Manager Server 4.3:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
            "SUSE Manager Server 4.3:kernel-default-devel-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Manager Server 4.3:kernel-default-devel-5.14.21-150400.24.170.2.s390x",
            "SUSE Manager Server 4.3:kernel-default-devel-5.14.21-150400.24.170.2.x86_64",
            "SUSE Manager Server 4.3:kernel-devel-5.14.21-150400.24.170.1.noarch",
            "SUSE Manager Server 4.3:kernel-macros-5.14.21-150400.24.170.1.noarch",
            "SUSE Manager Server 4.3:kernel-source-5.14.21-150400.24.170.1.noarch",
            "SUSE Manager Server 4.3:kernel-syms-5.14.21-150400.24.170.1.ppc64le",
            "SUSE Manager Server 4.3:kernel-syms-5.14.21-150400.24.170.1.s390x",
            "SUSE Manager Server 4.3:kernel-syms-5.14.21-150400.24.170.1.x86_64",
            "SUSE Manager Server 4.3:kernel-zfcpdump-5.14.21-150400.24.170.2.s390x"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 3.3,
            "baseSeverity": "LOW",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L",
            "version": "3.1"
          },
          "products": [
            "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-64kb-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-64kb-devel-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-devel-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-devel-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-devel-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-docs-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-macros-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-obs-build-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-obs-build-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-source-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-syms-5.14.21-150400.24.170.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-syms-5.14.21-150400.24.170.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:reiserfs-kmp-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:reiserfs-kmp-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-64kb-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-64kb-devel-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-devel-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-docs-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-macros-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-source-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.170.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.170.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_170-default-1-150400.9.3.2.ppc64le",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_170-default-1-150400.9.3.2.s390x",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_170-default-1-150400.9.3.2.x86_64",
            "SUSE Linux Enterprise Micro 5.3:kernel-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise Micro 5.3:kernel-default-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise Micro 5.3:kernel-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Micro 5.3:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.aarch64",
            "SUSE Linux Enterprise Micro 5.3:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
            "SUSE Linux Enterprise Micro 5.4:kernel-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise Micro 5.4:kernel-default-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise Micro 5.4:kernel-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Micro 5.4:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.aarch64",
            "SUSE Linux Enterprise Micro 5.4:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-64kb-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-64kb-devel-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.aarch64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.ppc64le",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-devel-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-docs-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-macros-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-source-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.170.1.aarch64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.170.1.ppc64le",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.170.1.s390x",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.170.1.x86_64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-zfcpdump-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-devel-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-devel-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-devel-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-docs-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-macros-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-obs-build-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-obs-build-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-source-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-syms-5.14.21-150400.24.170.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-syms-5.14.21-150400.24.170.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Manager Proxy 4.3:kernel-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Manager Proxy 4.3:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
            "SUSE Manager Proxy 4.3:kernel-default-devel-5.14.21-150400.24.170.2.x86_64",
            "SUSE Manager Proxy 4.3:kernel-devel-5.14.21-150400.24.170.1.noarch",
            "SUSE Manager Proxy 4.3:kernel-macros-5.14.21-150400.24.170.1.noarch",
            "SUSE Manager Proxy 4.3:kernel-source-5.14.21-150400.24.170.1.noarch",
            "SUSE Manager Proxy 4.3:kernel-syms-5.14.21-150400.24.170.1.x86_64",
            "SUSE Manager Server 4.3:kernel-default-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Manager Server 4.3:kernel-default-5.14.21-150400.24.170.2.s390x",
            "SUSE Manager Server 4.3:kernel-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Manager Server 4.3:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.ppc64le",
            "SUSE Manager Server 4.3:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
            "SUSE Manager Server 4.3:kernel-default-devel-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Manager Server 4.3:kernel-default-devel-5.14.21-150400.24.170.2.s390x",
            "SUSE Manager Server 4.3:kernel-default-devel-5.14.21-150400.24.170.2.x86_64",
            "SUSE Manager Server 4.3:kernel-devel-5.14.21-150400.24.170.1.noarch",
            "SUSE Manager Server 4.3:kernel-macros-5.14.21-150400.24.170.1.noarch",
            "SUSE Manager Server 4.3:kernel-source-5.14.21-150400.24.170.1.noarch",
            "SUSE Manager Server 4.3:kernel-syms-5.14.21-150400.24.170.1.ppc64le",
            "SUSE Manager Server 4.3:kernel-syms-5.14.21-150400.24.170.1.s390x",
            "SUSE Manager Server 4.3:kernel-syms-5.14.21-150400.24.170.1.x86_64",
            "SUSE Manager Server 4.3:kernel-zfcpdump-5.14.21-150400.24.170.2.s390x"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2025-07-28T15:09:33Z",
          "details": "low"
        }
      ],
      "title": "CVE-2022-49938"
    },
    {
      "cve": "CVE-2022-49940",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2022-49940"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "In the Linux kernel, the following vulnerability has been resolved:\n\ntty: n_gsm: add sanity check for gsm-\u003ereceive in gsm_receive_buf()\n\nA null pointer dereference can happen when attempting to access the\n\"gsm-\u003ereceive()\" function in gsmld_receive_buf(). Currently, the code\nassumes that gsm-\u003erecieve is only called after MUX activation.\nSince the gsmld_receive_buf() function can be accessed without the need to\ninitialize the MUX, the gsm-\u003ereceive() function will not be set and a\nNULL pointer dereference will occur.\n\nFix this by avoiding the call to \"gsm-\u003ereceive()\" in case the function is\nnot initialized by adding a sanity check.\n\nCall Trace:\n \u003cTASK\u003e\n gsmld_receive_buf+0x1c2/0x2f0 drivers/tty/n_gsm.c:2861\n tiocsti drivers/tty/tty_io.c:2293 [inline]\n tty_ioctl+0xa75/0x15d0 drivers/tty/tty_io.c:2692\n vfs_ioctl fs/ioctl.c:51 [inline]\n __do_sys_ioctl fs/ioctl.c:870 [inline]\n __se_sys_ioctl fs/ioctl.c:856 [inline]\n __x64_sys_ioctl+0x193/0x200 fs/ioctl.c:856\n do_syscall_x64 arch/x86/entry/common.c:50 [inline]\n do_syscall_64+0x35/0xb0 arch/x86/entry/common.c:80\n entry_SYSCALL_64_after_hwframe+0x63/0xcd",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.170.2.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.170.2.s390x",
          "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.170.2.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.170.2.s390x",
          "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.170.2.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.170.2.s390x",
          "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.170.2.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.170.2.s390x",
          "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-64kb-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-64kb-devel-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-devel-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-devel-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-devel-5.14.21-150400.24.170.1.noarch",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-docs-5.14.21-150400.24.170.1.noarch",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-macros-5.14.21-150400.24.170.1.noarch",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-obs-build-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-obs-build-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-source-5.14.21-150400.24.170.1.noarch",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-syms-5.14.21-150400.24.170.1.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-syms-5.14.21-150400.24.170.1.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:reiserfs-kmp-default-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:reiserfs-kmp-default-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-64kb-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-64kb-devel-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-devel-5.14.21-150400.24.170.1.noarch",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-docs-5.14.21-150400.24.170.1.noarch",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-macros-5.14.21-150400.24.170.1.noarch",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-source-5.14.21-150400.24.170.1.noarch",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.170.1.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.170.1.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.170.2.ppc64le",
          "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.170.2.s390x",
          "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.170.2.ppc64le",
          "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.170.2.s390x",
          "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_170-default-1-150400.9.3.2.ppc64le",
          "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_170-default-1-150400.9.3.2.s390x",
          "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_170-default-1-150400.9.3.2.x86_64",
          "SUSE Linux Enterprise Micro 5.3:kernel-default-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise Micro 5.3:kernel-default-5.14.21-150400.24.170.2.s390x",
          "SUSE Linux Enterprise Micro 5.3:kernel-default-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise Micro 5.3:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.aarch64",
          "SUSE Linux Enterprise Micro 5.3:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
          "SUSE Linux Enterprise Micro 5.4:kernel-default-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise Micro 5.4:kernel-default-5.14.21-150400.24.170.2.s390x",
          "SUSE Linux Enterprise Micro 5.4:kernel-default-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise Micro 5.4:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.aarch64",
          "SUSE Linux Enterprise Micro 5.4:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-64kb-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-64kb-devel-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-5.14.21-150400.24.170.2.ppc64le",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-5.14.21-150400.24.170.2.s390x",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.aarch64",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.ppc64le",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.170.2.ppc64le",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.170.2.s390x",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-devel-5.14.21-150400.24.170.1.noarch",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-docs-5.14.21-150400.24.170.1.noarch",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-macros-5.14.21-150400.24.170.1.noarch",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.170.2.ppc64le",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.170.2.s390x",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-source-5.14.21-150400.24.170.1.noarch",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.170.1.aarch64",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.170.1.ppc64le",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.170.1.s390x",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.170.1.x86_64",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-zfcpdump-5.14.21-150400.24.170.2.s390x",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.170.2.ppc64le",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.170.2.s390x",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-5.14.21-150400.24.170.2.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-devel-5.14.21-150400.24.170.2.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-devel-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-devel-5.14.21-150400.24.170.1.noarch",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-docs-5.14.21-150400.24.170.1.noarch",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-macros-5.14.21-150400.24.170.1.noarch",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-obs-build-5.14.21-150400.24.170.2.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-obs-build-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-source-5.14.21-150400.24.170.1.noarch",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-syms-5.14.21-150400.24.170.1.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-syms-5.14.21-150400.24.170.1.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.170.2.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.170.2.x86_64",
          "SUSE Manager Proxy 4.3:kernel-default-5.14.21-150400.24.170.2.x86_64",
          "SUSE Manager Proxy 4.3:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
          "SUSE Manager Proxy 4.3:kernel-default-devel-5.14.21-150400.24.170.2.x86_64",
          "SUSE Manager Proxy 4.3:kernel-devel-5.14.21-150400.24.170.1.noarch",
          "SUSE Manager Proxy 4.3:kernel-macros-5.14.21-150400.24.170.1.noarch",
          "SUSE Manager Proxy 4.3:kernel-source-5.14.21-150400.24.170.1.noarch",
          "SUSE Manager Proxy 4.3:kernel-syms-5.14.21-150400.24.170.1.x86_64",
          "SUSE Manager Server 4.3:kernel-default-5.14.21-150400.24.170.2.ppc64le",
          "SUSE Manager Server 4.3:kernel-default-5.14.21-150400.24.170.2.s390x",
          "SUSE Manager Server 4.3:kernel-default-5.14.21-150400.24.170.2.x86_64",
          "SUSE Manager Server 4.3:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.ppc64le",
          "SUSE Manager Server 4.3:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
          "SUSE Manager Server 4.3:kernel-default-devel-5.14.21-150400.24.170.2.ppc64le",
          "SUSE Manager Server 4.3:kernel-default-devel-5.14.21-150400.24.170.2.s390x",
          "SUSE Manager Server 4.3:kernel-default-devel-5.14.21-150400.24.170.2.x86_64",
          "SUSE Manager Server 4.3:kernel-devel-5.14.21-150400.24.170.1.noarch",
          "SUSE Manager Server 4.3:kernel-macros-5.14.21-150400.24.170.1.noarch",
          "SUSE Manager Server 4.3:kernel-source-5.14.21-150400.24.170.1.noarch",
          "SUSE Manager Server 4.3:kernel-syms-5.14.21-150400.24.170.1.ppc64le",
          "SUSE Manager Server 4.3:kernel-syms-5.14.21-150400.24.170.1.s390x",
          "SUSE Manager Server 4.3:kernel-syms-5.14.21-150400.24.170.1.x86_64",
          "SUSE Manager Server 4.3:kernel-zfcpdump-5.14.21-150400.24.170.2.s390x"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2022-49940",
          "url": "https://www.suse.com/security/cve/CVE-2022-49940"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1244866 for CVE-2022-49940",
          "url": "https://bugzilla.suse.com/1244866"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-64kb-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-64kb-devel-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-devel-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-devel-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-devel-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-docs-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-macros-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-obs-build-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-obs-build-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-source-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-syms-5.14.21-150400.24.170.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-syms-5.14.21-150400.24.170.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:reiserfs-kmp-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:reiserfs-kmp-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-64kb-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-64kb-devel-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-devel-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-docs-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-macros-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-source-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.170.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.170.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_170-default-1-150400.9.3.2.ppc64le",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_170-default-1-150400.9.3.2.s390x",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_170-default-1-150400.9.3.2.x86_64",
            "SUSE Linux Enterprise Micro 5.3:kernel-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise Micro 5.3:kernel-default-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise Micro 5.3:kernel-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Micro 5.3:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.aarch64",
            "SUSE Linux Enterprise Micro 5.3:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
            "SUSE Linux Enterprise Micro 5.4:kernel-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise Micro 5.4:kernel-default-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise Micro 5.4:kernel-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Micro 5.4:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.aarch64",
            "SUSE Linux Enterprise Micro 5.4:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-64kb-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-64kb-devel-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.aarch64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.ppc64le",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-devel-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-docs-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-macros-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-source-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.170.1.aarch64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.170.1.ppc64le",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.170.1.s390x",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.170.1.x86_64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-zfcpdump-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-devel-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-devel-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-devel-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-docs-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-macros-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-obs-build-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-obs-build-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-source-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-syms-5.14.21-150400.24.170.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-syms-5.14.21-150400.24.170.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Manager Proxy 4.3:kernel-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Manager Proxy 4.3:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
            "SUSE Manager Proxy 4.3:kernel-default-devel-5.14.21-150400.24.170.2.x86_64",
            "SUSE Manager Proxy 4.3:kernel-devel-5.14.21-150400.24.170.1.noarch",
            "SUSE Manager Proxy 4.3:kernel-macros-5.14.21-150400.24.170.1.noarch",
            "SUSE Manager Proxy 4.3:kernel-source-5.14.21-150400.24.170.1.noarch",
            "SUSE Manager Proxy 4.3:kernel-syms-5.14.21-150400.24.170.1.x86_64",
            "SUSE Manager Server 4.3:kernel-default-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Manager Server 4.3:kernel-default-5.14.21-150400.24.170.2.s390x",
            "SUSE Manager Server 4.3:kernel-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Manager Server 4.3:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.ppc64le",
            "SUSE Manager Server 4.3:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
            "SUSE Manager Server 4.3:kernel-default-devel-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Manager Server 4.3:kernel-default-devel-5.14.21-150400.24.170.2.s390x",
            "SUSE Manager Server 4.3:kernel-default-devel-5.14.21-150400.24.170.2.x86_64",
            "SUSE Manager Server 4.3:kernel-devel-5.14.21-150400.24.170.1.noarch",
            "SUSE Manager Server 4.3:kernel-macros-5.14.21-150400.24.170.1.noarch",
            "SUSE Manager Server 4.3:kernel-source-5.14.21-150400.24.170.1.noarch",
            "SUSE Manager Server 4.3:kernel-syms-5.14.21-150400.24.170.1.ppc64le",
            "SUSE Manager Server 4.3:kernel-syms-5.14.21-150400.24.170.1.s390x",
            "SUSE Manager Server 4.3:kernel-syms-5.14.21-150400.24.170.1.x86_64",
            "SUSE Manager Server 4.3:kernel-zfcpdump-5.14.21-150400.24.170.2.s390x"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 5.5,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
            "version": "3.1"
          },
          "products": [
            "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-64kb-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-64kb-devel-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-devel-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-devel-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-devel-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-docs-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-macros-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-obs-build-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-obs-build-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-source-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-syms-5.14.21-150400.24.170.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-syms-5.14.21-150400.24.170.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:reiserfs-kmp-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:reiserfs-kmp-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-64kb-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-64kb-devel-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-devel-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-docs-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-macros-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-source-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.170.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.170.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_170-default-1-150400.9.3.2.ppc64le",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_170-default-1-150400.9.3.2.s390x",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_170-default-1-150400.9.3.2.x86_64",
            "SUSE Linux Enterprise Micro 5.3:kernel-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise Micro 5.3:kernel-default-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise Micro 5.3:kernel-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Micro 5.3:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.aarch64",
            "SUSE Linux Enterprise Micro 5.3:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
            "SUSE Linux Enterprise Micro 5.4:kernel-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise Micro 5.4:kernel-default-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise Micro 5.4:kernel-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Micro 5.4:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.aarch64",
            "SUSE Linux Enterprise Micro 5.4:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-64kb-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-64kb-devel-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.aarch64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.ppc64le",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-devel-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-docs-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-macros-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-source-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.170.1.aarch64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.170.1.ppc64le",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.170.1.s390x",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.170.1.x86_64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-zfcpdump-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-devel-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-devel-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-devel-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-docs-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-macros-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-obs-build-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-obs-build-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-source-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-syms-5.14.21-150400.24.170.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-syms-5.14.21-150400.24.170.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Manager Proxy 4.3:kernel-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Manager Proxy 4.3:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
            "SUSE Manager Proxy 4.3:kernel-default-devel-5.14.21-150400.24.170.2.x86_64",
            "SUSE Manager Proxy 4.3:kernel-devel-5.14.21-150400.24.170.1.noarch",
            "SUSE Manager Proxy 4.3:kernel-macros-5.14.21-150400.24.170.1.noarch",
            "SUSE Manager Proxy 4.3:kernel-source-5.14.21-150400.24.170.1.noarch",
            "SUSE Manager Proxy 4.3:kernel-syms-5.14.21-150400.24.170.1.x86_64",
            "SUSE Manager Server 4.3:kernel-default-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Manager Server 4.3:kernel-default-5.14.21-150400.24.170.2.s390x",
            "SUSE Manager Server 4.3:kernel-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Manager Server 4.3:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.ppc64le",
            "SUSE Manager Server 4.3:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
            "SUSE Manager Server 4.3:kernel-default-devel-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Manager Server 4.3:kernel-default-devel-5.14.21-150400.24.170.2.s390x",
            "SUSE Manager Server 4.3:kernel-default-devel-5.14.21-150400.24.170.2.x86_64",
            "SUSE Manager Server 4.3:kernel-devel-5.14.21-150400.24.170.1.noarch",
            "SUSE Manager Server 4.3:kernel-macros-5.14.21-150400.24.170.1.noarch",
            "SUSE Manager Server 4.3:kernel-source-5.14.21-150400.24.170.1.noarch",
            "SUSE Manager Server 4.3:kernel-syms-5.14.21-150400.24.170.1.ppc64le",
            "SUSE Manager Server 4.3:kernel-syms-5.14.21-150400.24.170.1.s390x",
            "SUSE Manager Server 4.3:kernel-syms-5.14.21-150400.24.170.1.x86_64",
            "SUSE Manager Server 4.3:kernel-zfcpdump-5.14.21-150400.24.170.2.s390x"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2025-07-28T15:09:33Z",
          "details": "moderate"
        }
      ],
      "title": "CVE-2022-49940"
    },
    {
      "cve": "CVE-2022-49942",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2022-49942"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "In the Linux kernel, the following vulnerability has been resolved:\n\nwifi: mac80211: Don\u0027t finalize CSA in IBSS mode if state is disconnected\n\nWhen we are not connected to a channel, sending channel \"switch\"\nannouncement doesn\u0027t make any sense.\n\nThe BSS list is empty in that case. This causes the for loop in\ncfg80211_get_bss() to be bypassed, so the function returns NULL\n(check line 1424 of net/wireless/scan.c), causing the WARN_ON()\nin ieee80211_ibss_csa_beacon() to get triggered (check line 500\nof net/mac80211/ibss.c), which was consequently reported on the\nsyzkaller dashboard.\n\nThus, check if we have an existing connection before generating\nthe CSA beacon in ieee80211_ibss_finish_csa().",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.170.2.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.170.2.s390x",
          "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.170.2.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.170.2.s390x",
          "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.170.2.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.170.2.s390x",
          "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.170.2.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.170.2.s390x",
          "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-64kb-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-64kb-devel-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-devel-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-devel-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-devel-5.14.21-150400.24.170.1.noarch",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-docs-5.14.21-150400.24.170.1.noarch",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-macros-5.14.21-150400.24.170.1.noarch",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-obs-build-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-obs-build-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-source-5.14.21-150400.24.170.1.noarch",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-syms-5.14.21-150400.24.170.1.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-syms-5.14.21-150400.24.170.1.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:reiserfs-kmp-default-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:reiserfs-kmp-default-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-64kb-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-64kb-devel-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-devel-5.14.21-150400.24.170.1.noarch",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-docs-5.14.21-150400.24.170.1.noarch",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-macros-5.14.21-150400.24.170.1.noarch",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-source-5.14.21-150400.24.170.1.noarch",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.170.1.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.170.1.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.170.2.ppc64le",
          "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.170.2.s390x",
          "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.170.2.ppc64le",
          "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.170.2.s390x",
          "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_170-default-1-150400.9.3.2.ppc64le",
          "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_170-default-1-150400.9.3.2.s390x",
          "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_170-default-1-150400.9.3.2.x86_64",
          "SUSE Linux Enterprise Micro 5.3:kernel-default-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise Micro 5.3:kernel-default-5.14.21-150400.24.170.2.s390x",
          "SUSE Linux Enterprise Micro 5.3:kernel-default-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise Micro 5.3:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.aarch64",
          "SUSE Linux Enterprise Micro 5.3:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
          "SUSE Linux Enterprise Micro 5.4:kernel-default-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise Micro 5.4:kernel-default-5.14.21-150400.24.170.2.s390x",
          "SUSE Linux Enterprise Micro 5.4:kernel-default-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise Micro 5.4:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.aarch64",
          "SUSE Linux Enterprise Micro 5.4:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-64kb-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-64kb-devel-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-5.14.21-150400.24.170.2.ppc64le",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-5.14.21-150400.24.170.2.s390x",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.aarch64",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.ppc64le",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.170.2.ppc64le",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.170.2.s390x",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-devel-5.14.21-150400.24.170.1.noarch",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-docs-5.14.21-150400.24.170.1.noarch",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-macros-5.14.21-150400.24.170.1.noarch",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.170.2.ppc64le",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.170.2.s390x",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-source-5.14.21-150400.24.170.1.noarch",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.170.1.aarch64",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.170.1.ppc64le",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.170.1.s390x",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.170.1.x86_64",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-zfcpdump-5.14.21-150400.24.170.2.s390x",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.170.2.ppc64le",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.170.2.s390x",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-5.14.21-150400.24.170.2.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-devel-5.14.21-150400.24.170.2.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-devel-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-devel-5.14.21-150400.24.170.1.noarch",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-docs-5.14.21-150400.24.170.1.noarch",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-macros-5.14.21-150400.24.170.1.noarch",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-obs-build-5.14.21-150400.24.170.2.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-obs-build-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-source-5.14.21-150400.24.170.1.noarch",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-syms-5.14.21-150400.24.170.1.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-syms-5.14.21-150400.24.170.1.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.170.2.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.170.2.x86_64",
          "SUSE Manager Proxy 4.3:kernel-default-5.14.21-150400.24.170.2.x86_64",
          "SUSE Manager Proxy 4.3:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
          "SUSE Manager Proxy 4.3:kernel-default-devel-5.14.21-150400.24.170.2.x86_64",
          "SUSE Manager Proxy 4.3:kernel-devel-5.14.21-150400.24.170.1.noarch",
          "SUSE Manager Proxy 4.3:kernel-macros-5.14.21-150400.24.170.1.noarch",
          "SUSE Manager Proxy 4.3:kernel-source-5.14.21-150400.24.170.1.noarch",
          "SUSE Manager Proxy 4.3:kernel-syms-5.14.21-150400.24.170.1.x86_64",
          "SUSE Manager Server 4.3:kernel-default-5.14.21-150400.24.170.2.ppc64le",
          "SUSE Manager Server 4.3:kernel-default-5.14.21-150400.24.170.2.s390x",
          "SUSE Manager Server 4.3:kernel-default-5.14.21-150400.24.170.2.x86_64",
          "SUSE Manager Server 4.3:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.ppc64le",
          "SUSE Manager Server 4.3:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
          "SUSE Manager Server 4.3:kernel-default-devel-5.14.21-150400.24.170.2.ppc64le",
          "SUSE Manager Server 4.3:kernel-default-devel-5.14.21-150400.24.170.2.s390x",
          "SUSE Manager Server 4.3:kernel-default-devel-5.14.21-150400.24.170.2.x86_64",
          "SUSE Manager Server 4.3:kernel-devel-5.14.21-150400.24.170.1.noarch",
          "SUSE Manager Server 4.3:kernel-macros-5.14.21-150400.24.170.1.noarch",
          "SUSE Manager Server 4.3:kernel-source-5.14.21-150400.24.170.1.noarch",
          "SUSE Manager Server 4.3:kernel-syms-5.14.21-150400.24.170.1.ppc64le",
          "SUSE Manager Server 4.3:kernel-syms-5.14.21-150400.24.170.1.s390x",
          "SUSE Manager Server 4.3:kernel-syms-5.14.21-150400.24.170.1.x86_64",
          "SUSE Manager Server 4.3:kernel-zfcpdump-5.14.21-150400.24.170.2.s390x"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2022-49942",
          "url": "https://www.suse.com/security/cve/CVE-2022-49942"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1244881 for CVE-2022-49942",
          "url": "https://bugzilla.suse.com/1244881"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-64kb-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-64kb-devel-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-devel-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-devel-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-devel-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-docs-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-macros-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-obs-build-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-obs-build-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-source-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-syms-5.14.21-150400.24.170.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-syms-5.14.21-150400.24.170.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:reiserfs-kmp-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:reiserfs-kmp-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-64kb-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-64kb-devel-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-devel-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-docs-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-macros-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-source-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.170.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.170.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_170-default-1-150400.9.3.2.ppc64le",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_170-default-1-150400.9.3.2.s390x",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_170-default-1-150400.9.3.2.x86_64",
            "SUSE Linux Enterprise Micro 5.3:kernel-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise Micro 5.3:kernel-default-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise Micro 5.3:kernel-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Micro 5.3:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.aarch64",
            "SUSE Linux Enterprise Micro 5.3:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
            "SUSE Linux Enterprise Micro 5.4:kernel-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise Micro 5.4:kernel-default-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise Micro 5.4:kernel-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Micro 5.4:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.aarch64",
            "SUSE Linux Enterprise Micro 5.4:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-64kb-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-64kb-devel-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.aarch64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.ppc64le",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-devel-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-docs-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-macros-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-source-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.170.1.aarch64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.170.1.ppc64le",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.170.1.s390x",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.170.1.x86_64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-zfcpdump-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-devel-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-devel-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-devel-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-docs-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-macros-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-obs-build-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-obs-build-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-source-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-syms-5.14.21-150400.24.170.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-syms-5.14.21-150400.24.170.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Manager Proxy 4.3:kernel-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Manager Proxy 4.3:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
            "SUSE Manager Proxy 4.3:kernel-default-devel-5.14.21-150400.24.170.2.x86_64",
            "SUSE Manager Proxy 4.3:kernel-devel-5.14.21-150400.24.170.1.noarch",
            "SUSE Manager Proxy 4.3:kernel-macros-5.14.21-150400.24.170.1.noarch",
            "SUSE Manager Proxy 4.3:kernel-source-5.14.21-150400.24.170.1.noarch",
            "SUSE Manager Proxy 4.3:kernel-syms-5.14.21-150400.24.170.1.x86_64",
            "SUSE Manager Server 4.3:kernel-default-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Manager Server 4.3:kernel-default-5.14.21-150400.24.170.2.s390x",
            "SUSE Manager Server 4.3:kernel-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Manager Server 4.3:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.ppc64le",
            "SUSE Manager Server 4.3:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
            "SUSE Manager Server 4.3:kernel-default-devel-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Manager Server 4.3:kernel-default-devel-5.14.21-150400.24.170.2.s390x",
            "SUSE Manager Server 4.3:kernel-default-devel-5.14.21-150400.24.170.2.x86_64",
            "SUSE Manager Server 4.3:kernel-devel-5.14.21-150400.24.170.1.noarch",
            "SUSE Manager Server 4.3:kernel-macros-5.14.21-150400.24.170.1.noarch",
            "SUSE Manager Server 4.3:kernel-source-5.14.21-150400.24.170.1.noarch",
            "SUSE Manager Server 4.3:kernel-syms-5.14.21-150400.24.170.1.ppc64le",
            "SUSE Manager Server 4.3:kernel-syms-5.14.21-150400.24.170.1.s390x",
            "SUSE Manager Server 4.3:kernel-syms-5.14.21-150400.24.170.1.x86_64",
            "SUSE Manager Server 4.3:kernel-zfcpdump-5.14.21-150400.24.170.2.s390x"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 5.5,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
            "version": "3.1"
          },
          "products": [
            "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-64kb-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-64kb-devel-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-devel-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-devel-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-devel-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-docs-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-macros-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-obs-build-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-obs-build-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-source-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-syms-5.14.21-150400.24.170.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-syms-5.14.21-150400.24.170.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:reiserfs-kmp-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:reiserfs-kmp-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-64kb-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-64kb-devel-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-devel-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-docs-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-macros-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-source-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.170.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.170.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_170-default-1-150400.9.3.2.ppc64le",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_170-default-1-150400.9.3.2.s390x",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_170-default-1-150400.9.3.2.x86_64",
            "SUSE Linux Enterprise Micro 5.3:kernel-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise Micro 5.3:kernel-default-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise Micro 5.3:kernel-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Micro 5.3:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.aarch64",
            "SUSE Linux Enterprise Micro 5.3:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
            "SUSE Linux Enterprise Micro 5.4:kernel-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise Micro 5.4:kernel-default-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise Micro 5.4:kernel-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Micro 5.4:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.aarch64",
            "SUSE Linux Enterprise Micro 5.4:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-64kb-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-64kb-devel-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.aarch64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.ppc64le",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-devel-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-docs-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-macros-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-source-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.170.1.aarch64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.170.1.ppc64le",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.170.1.s390x",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.170.1.x86_64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-zfcpdump-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-devel-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-devel-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-devel-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-docs-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-macros-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-obs-build-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-obs-build-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-source-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-syms-5.14.21-150400.24.170.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-syms-5.14.21-150400.24.170.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Manager Proxy 4.3:kernel-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Manager Proxy 4.3:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
            "SUSE Manager Proxy 4.3:kernel-default-devel-5.14.21-150400.24.170.2.x86_64",
            "SUSE Manager Proxy 4.3:kernel-devel-5.14.21-150400.24.170.1.noarch",
            "SUSE Manager Proxy 4.3:kernel-macros-5.14.21-150400.24.170.1.noarch",
            "SUSE Manager Proxy 4.3:kernel-source-5.14.21-150400.24.170.1.noarch",
            "SUSE Manager Proxy 4.3:kernel-syms-5.14.21-150400.24.170.1.x86_64",
            "SUSE Manager Server 4.3:kernel-default-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Manager Server 4.3:kernel-default-5.14.21-150400.24.170.2.s390x",
            "SUSE Manager Server 4.3:kernel-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Manager Server 4.3:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.ppc64le",
            "SUSE Manager Server 4.3:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
            "SUSE Manager Server 4.3:kernel-default-devel-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Manager Server 4.3:kernel-default-devel-5.14.21-150400.24.170.2.s390x",
            "SUSE Manager Server 4.3:kernel-default-devel-5.14.21-150400.24.170.2.x86_64",
            "SUSE Manager Server 4.3:kernel-devel-5.14.21-150400.24.170.1.noarch",
            "SUSE Manager Server 4.3:kernel-macros-5.14.21-150400.24.170.1.noarch",
            "SUSE Manager Server 4.3:kernel-source-5.14.21-150400.24.170.1.noarch",
            "SUSE Manager Server 4.3:kernel-syms-5.14.21-150400.24.170.1.ppc64le",
            "SUSE Manager Server 4.3:kernel-syms-5.14.21-150400.24.170.1.s390x",
            "SUSE Manager Server 4.3:kernel-syms-5.14.21-150400.24.170.1.x86_64",
            "SUSE Manager Server 4.3:kernel-zfcpdump-5.14.21-150400.24.170.2.s390x"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2025-07-28T15:09:33Z",
          "details": "moderate"
        }
      ],
      "title": "CVE-2022-49942"
    },
    {
      "cve": "CVE-2022-49945",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2022-49945"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "In the Linux kernel, the following vulnerability has been resolved:\n\nhwmon: (gpio-fan) Fix array out of bounds access\n\nThe driver does not check if the cooling state passed to\ngpio_fan_set_cur_state() exceeds the maximum cooling state as\nstored in fan_data-\u003enum_speeds. Since the cooling state is later\nused as an array index in set_fan_speed(), an array out of bounds\naccess can occur.\nThis can be exploited by setting the state of the thermal cooling device\nto arbitrary values, causing for example a kernel oops when unavailable\nmemory is accessed this way.\n\nExample kernel oops:\n[  807.987276] Unable to handle kernel paging request at virtual address ffffff80d0588064\n[  807.987369] Mem abort info:\n[  807.987398]   ESR = 0x96000005\n[  807.987428]   EC = 0x25: DABT (current EL), IL = 32 bits\n[  807.987477]   SET = 0, FnV = 0\n[  807.987507]   EA = 0, S1PTW = 0\n[  807.987536]   FSC = 0x05: level 1 translation fault\n[  807.987570] Data abort info:\n[  807.987763]   ISV = 0, ISS = 0x00000005\n[  807.987801]   CM = 0, WnR = 0\n[  807.987832] swapper pgtable: 4k pages, 39-bit VAs, pgdp=0000000001165000\n[  807.987872] [ffffff80d0588064] pgd=0000000000000000, p4d=0000000000000000, pud=0000000000000000\n[  807.987961] Internal error: Oops: 96000005 [#1] PREEMPT SMP\n[  807.987992] Modules linked in: cmac algif_hash aes_arm64 algif_skcipher af_alg bnep hci_uart btbcm bluetooth ecdh_generic ecc 8021q garp stp llc snd_soc_hdmi_codec brcmfmac vc4 brcmutil cec drm_kms_helper snd_soc_core cfg80211 snd_compress bcm2835_codec(C) snd_pcm_dmaengine syscopyarea bcm2835_isp(C) bcm2835_v4l2(C) sysfillrect v4l2_mem2mem bcm2835_mmal_vchiq(C) raspberrypi_hwmon sysimgblt videobuf2_dma_contig videobuf2_vmalloc fb_sys_fops videobuf2_memops rfkill videobuf2_v4l2 videobuf2_common i2c_bcm2835 snd_bcm2835(C) videodev snd_pcm snd_timer snd mc vc_sm_cma(C) gpio_fan uio_pdrv_genirq uio drm fuse drm_panel_orientation_quirks backlight ip_tables x_tables ipv6\n[  807.988508] CPU: 0 PID: 1321 Comm: bash Tainted: G         C        5.15.56-v8+ #1575\n[  807.988548] Hardware name: Raspberry Pi 3 Model B Rev 1.2 (DT)\n[  807.988574] pstate: 20000005 (nzCv daif -PAN -UAO -TCO -DIT -SSBS BTYPE=--)\n[  807.988608] pc : set_fan_speed.part.5+0x34/0x80 [gpio_fan]\n[  807.988654] lr : gpio_fan_set_cur_state+0x34/0x50 [gpio_fan]\n[  807.988691] sp : ffffffc008cf3bd0\n[  807.988710] x29: ffffffc008cf3bd0 x28: ffffff80019edac0 x27: 0000000000000000\n[  807.988762] x26: 0000000000000000 x25: 0000000000000000 x24: ffffff800747c920\n[  807.988787] x23: 000000000000000a x22: ffffff800369f000 x21: 000000001999997c\n[  807.988854] x20: ffffff800369f2e8 x19: ffffff8002ae8080 x18: 0000000000000000\n[  807.988877] x17: 0000000000000000 x16: 0000000000000000 x15: 000000559e271b70\n[  807.988938] x14: 0000000000000000 x13: 0000000000000000 x12: 0000000000000000\n[  807.988960] x11: 0000000000000000 x10: ffffffc008cf3c20 x9 : ffffffcfb60c741c\n[  807.989018] x8 : 000000000000000a x7 : 00000000ffffffc9 x6 : 0000000000000009\n[  807.989040] x5 : 000000000000002a x4 : 0000000000000000 x3 : ffffff800369f2e8\n[  807.989062] x2 : 000000000000e780 x1 : 0000000000000001 x0 : ffffff80d0588060\n[  807.989084] Call trace:\n[  807.989091]  set_fan_speed.part.5+0x34/0x80 [gpio_fan]\n[  807.989113]  gpio_fan_set_cur_state+0x34/0x50 [gpio_fan]\n[  807.989199]  cur_state_store+0x84/0xd0\n[  807.989221]  dev_attr_store+0x20/0x38\n[  807.989262]  sysfs_kf_write+0x4c/0x60\n[  807.989282]  kernfs_fop_write_iter+0x130/0x1c0\n[  807.989298]  new_sync_write+0x10c/0x190\n[  807.989315]  vfs_write+0x254/0x378\n[  807.989362]  ksys_write+0x70/0xf8\n[  807.989379]  __arm64_sys_write+0x24/0x30\n[  807.989424]  invoke_syscall+0x4c/0x110\n[  807.989442]  el0_svc_common.constprop.3+0xfc/0x120\n[  807.989458]  do_el0_svc+0x2c/0x90\n[  807.989473]  el0_svc+0x24/0x60\n[  807.989544]  el0t_64_sync_handler+0x90/0xb8\n[  807.989558]  el0t_64_sync+0x1a0/0x1a4\n[  807.989579] Code: b9403801 f9402800 7100003f 8b35cc00 (b9400416)\n[  807.989627] ---[ end t\n---truncated---",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.170.2.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.170.2.s390x",
          "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.170.2.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.170.2.s390x",
          "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.170.2.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.170.2.s390x",
          "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.170.2.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.170.2.s390x",
          "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-64kb-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-64kb-devel-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-devel-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-devel-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-devel-5.14.21-150400.24.170.1.noarch",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-docs-5.14.21-150400.24.170.1.noarch",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-macros-5.14.21-150400.24.170.1.noarch",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-obs-build-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-obs-build-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-source-5.14.21-150400.24.170.1.noarch",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-syms-5.14.21-150400.24.170.1.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-syms-5.14.21-150400.24.170.1.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:reiserfs-kmp-default-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:reiserfs-kmp-default-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-64kb-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-64kb-devel-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-devel-5.14.21-150400.24.170.1.noarch",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-docs-5.14.21-150400.24.170.1.noarch",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-macros-5.14.21-150400.24.170.1.noarch",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-source-5.14.21-150400.24.170.1.noarch",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.170.1.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.170.1.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.170.2.ppc64le",
          "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.170.2.s390x",
          "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.170.2.ppc64le",
          "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.170.2.s390x",
          "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_170-default-1-150400.9.3.2.ppc64le",
          "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_170-default-1-150400.9.3.2.s390x",
          "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_170-default-1-150400.9.3.2.x86_64",
          "SUSE Linux Enterprise Micro 5.3:kernel-default-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise Micro 5.3:kernel-default-5.14.21-150400.24.170.2.s390x",
          "SUSE Linux Enterprise Micro 5.3:kernel-default-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise Micro 5.3:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.aarch64",
          "SUSE Linux Enterprise Micro 5.3:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
          "SUSE Linux Enterprise Micro 5.4:kernel-default-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise Micro 5.4:kernel-default-5.14.21-150400.24.170.2.s390x",
          "SUSE Linux Enterprise Micro 5.4:kernel-default-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise Micro 5.4:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.aarch64",
          "SUSE Linux Enterprise Micro 5.4:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-64kb-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-64kb-devel-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-5.14.21-150400.24.170.2.ppc64le",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-5.14.21-150400.24.170.2.s390x",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.aarch64",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.ppc64le",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.170.2.ppc64le",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.170.2.s390x",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-devel-5.14.21-150400.24.170.1.noarch",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-docs-5.14.21-150400.24.170.1.noarch",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-macros-5.14.21-150400.24.170.1.noarch",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.170.2.ppc64le",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.170.2.s390x",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-source-5.14.21-150400.24.170.1.noarch",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.170.1.aarch64",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.170.1.ppc64le",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.170.1.s390x",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.170.1.x86_64",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-zfcpdump-5.14.21-150400.24.170.2.s390x",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.170.2.ppc64le",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.170.2.s390x",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-5.14.21-150400.24.170.2.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-devel-5.14.21-150400.24.170.2.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-devel-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-devel-5.14.21-150400.24.170.1.noarch",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-docs-5.14.21-150400.24.170.1.noarch",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-macros-5.14.21-150400.24.170.1.noarch",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-obs-build-5.14.21-150400.24.170.2.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-obs-build-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-source-5.14.21-150400.24.170.1.noarch",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-syms-5.14.21-150400.24.170.1.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-syms-5.14.21-150400.24.170.1.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.170.2.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.170.2.x86_64",
          "SUSE Manager Proxy 4.3:kernel-default-5.14.21-150400.24.170.2.x86_64",
          "SUSE Manager Proxy 4.3:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
          "SUSE Manager Proxy 4.3:kernel-default-devel-5.14.21-150400.24.170.2.x86_64",
          "SUSE Manager Proxy 4.3:kernel-devel-5.14.21-150400.24.170.1.noarch",
          "SUSE Manager Proxy 4.3:kernel-macros-5.14.21-150400.24.170.1.noarch",
          "SUSE Manager Proxy 4.3:kernel-source-5.14.21-150400.24.170.1.noarch",
          "SUSE Manager Proxy 4.3:kernel-syms-5.14.21-150400.24.170.1.x86_64",
          "SUSE Manager Server 4.3:kernel-default-5.14.21-150400.24.170.2.ppc64le",
          "SUSE Manager Server 4.3:kernel-default-5.14.21-150400.24.170.2.s390x",
          "SUSE Manager Server 4.3:kernel-default-5.14.21-150400.24.170.2.x86_64",
          "SUSE Manager Server 4.3:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.ppc64le",
          "SUSE Manager Server 4.3:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
          "SUSE Manager Server 4.3:kernel-default-devel-5.14.21-150400.24.170.2.ppc64le",
          "SUSE Manager Server 4.3:kernel-default-devel-5.14.21-150400.24.170.2.s390x",
          "SUSE Manager Server 4.3:kernel-default-devel-5.14.21-150400.24.170.2.x86_64",
          "SUSE Manager Server 4.3:kernel-devel-5.14.21-150400.24.170.1.noarch",
          "SUSE Manager Server 4.3:kernel-macros-5.14.21-150400.24.170.1.noarch",
          "SUSE Manager Server 4.3:kernel-source-5.14.21-150400.24.170.1.noarch",
          "SUSE Manager Server 4.3:kernel-syms-5.14.21-150400.24.170.1.ppc64le",
          "SUSE Manager Server 4.3:kernel-syms-5.14.21-150400.24.170.1.s390x",
          "SUSE Manager Server 4.3:kernel-syms-5.14.21-150400.24.170.1.x86_64",
          "SUSE Manager Server 4.3:kernel-zfcpdump-5.14.21-150400.24.170.2.s390x"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2022-49945",
          "url": "https://www.suse.com/security/cve/CVE-2022-49945"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1244908 for CVE-2022-49945",
          "url": "https://bugzilla.suse.com/1244908"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-64kb-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-64kb-devel-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-devel-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-devel-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-devel-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-docs-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-macros-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-obs-build-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-obs-build-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-source-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-syms-5.14.21-150400.24.170.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-syms-5.14.21-150400.24.170.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:reiserfs-kmp-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:reiserfs-kmp-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-64kb-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-64kb-devel-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-devel-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-docs-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-macros-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-source-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.170.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.170.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_170-default-1-150400.9.3.2.ppc64le",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_170-default-1-150400.9.3.2.s390x",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_170-default-1-150400.9.3.2.x86_64",
            "SUSE Linux Enterprise Micro 5.3:kernel-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise Micro 5.3:kernel-default-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise Micro 5.3:kernel-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Micro 5.3:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.aarch64",
            "SUSE Linux Enterprise Micro 5.3:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
            "SUSE Linux Enterprise Micro 5.4:kernel-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise Micro 5.4:kernel-default-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise Micro 5.4:kernel-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Micro 5.4:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.aarch64",
            "SUSE Linux Enterprise Micro 5.4:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-64kb-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-64kb-devel-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.aarch64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.ppc64le",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-devel-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-docs-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-macros-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-source-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.170.1.aarch64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.170.1.ppc64le",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.170.1.s390x",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.170.1.x86_64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-zfcpdump-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-devel-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-devel-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-devel-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-docs-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-macros-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-obs-build-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-obs-build-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-source-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-syms-5.14.21-150400.24.170.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-syms-5.14.21-150400.24.170.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Manager Proxy 4.3:kernel-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Manager Proxy 4.3:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
            "SUSE Manager Proxy 4.3:kernel-default-devel-5.14.21-150400.24.170.2.x86_64",
            "SUSE Manager Proxy 4.3:kernel-devel-5.14.21-150400.24.170.1.noarch",
            "SUSE Manager Proxy 4.3:kernel-macros-5.14.21-150400.24.170.1.noarch",
            "SUSE Manager Proxy 4.3:kernel-source-5.14.21-150400.24.170.1.noarch",
            "SUSE Manager Proxy 4.3:kernel-syms-5.14.21-150400.24.170.1.x86_64",
            "SUSE Manager Server 4.3:kernel-default-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Manager Server 4.3:kernel-default-5.14.21-150400.24.170.2.s390x",
            "SUSE Manager Server 4.3:kernel-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Manager Server 4.3:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.ppc64le",
            "SUSE Manager Server 4.3:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
            "SUSE Manager Server 4.3:kernel-default-devel-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Manager Server 4.3:kernel-default-devel-5.14.21-150400.24.170.2.s390x",
            "SUSE Manager Server 4.3:kernel-default-devel-5.14.21-150400.24.170.2.x86_64",
            "SUSE Manager Server 4.3:kernel-devel-5.14.21-150400.24.170.1.noarch",
            "SUSE Manager Server 4.3:kernel-macros-5.14.21-150400.24.170.1.noarch",
            "SUSE Manager Server 4.3:kernel-source-5.14.21-150400.24.170.1.noarch",
            "SUSE Manager Server 4.3:kernel-syms-5.14.21-150400.24.170.1.ppc64le",
            "SUSE Manager Server 4.3:kernel-syms-5.14.21-150400.24.170.1.s390x",
            "SUSE Manager Server 4.3:kernel-syms-5.14.21-150400.24.170.1.x86_64",
            "SUSE Manager Server 4.3:kernel-zfcpdump-5.14.21-150400.24.170.2.s390x"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 6.6,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:H",
            "version": "3.1"
          },
          "products": [
            "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-64kb-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-64kb-devel-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-devel-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-devel-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-devel-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-docs-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-macros-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-obs-build-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-obs-build-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-source-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-syms-5.14.21-150400.24.170.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-syms-5.14.21-150400.24.170.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:reiserfs-kmp-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:reiserfs-kmp-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-64kb-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-64kb-devel-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-devel-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-docs-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-macros-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-source-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.170.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.170.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_170-default-1-150400.9.3.2.ppc64le",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_170-default-1-150400.9.3.2.s390x",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_170-default-1-150400.9.3.2.x86_64",
            "SUSE Linux Enterprise Micro 5.3:kernel-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise Micro 5.3:kernel-default-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise Micro 5.3:kernel-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Micro 5.3:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.aarch64",
            "SUSE Linux Enterprise Micro 5.3:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
            "SUSE Linux Enterprise Micro 5.4:kernel-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise Micro 5.4:kernel-default-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise Micro 5.4:kernel-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Micro 5.4:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.aarch64",
            "SUSE Linux Enterprise Micro 5.4:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-64kb-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-64kb-devel-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.aarch64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.ppc64le",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-devel-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-docs-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-macros-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-source-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.170.1.aarch64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.170.1.ppc64le",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.170.1.s390x",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.170.1.x86_64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-zfcpdump-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-devel-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-devel-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-devel-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-docs-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-macros-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-obs-build-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-obs-build-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-source-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-syms-5.14.21-150400.24.170.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-syms-5.14.21-150400.24.170.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Manager Proxy 4.3:kernel-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Manager Proxy 4.3:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
            "SUSE Manager Proxy 4.3:kernel-default-devel-5.14.21-150400.24.170.2.x86_64",
            "SUSE Manager Proxy 4.3:kernel-devel-5.14.21-150400.24.170.1.noarch",
            "SUSE Manager Proxy 4.3:kernel-macros-5.14.21-150400.24.170.1.noarch",
            "SUSE Manager Proxy 4.3:kernel-source-5.14.21-150400.24.170.1.noarch",
            "SUSE Manager Proxy 4.3:kernel-syms-5.14.21-150400.24.170.1.x86_64",
            "SUSE Manager Server 4.3:kernel-default-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Manager Server 4.3:kernel-default-5.14.21-150400.24.170.2.s390x",
            "SUSE Manager Server 4.3:kernel-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Manager Server 4.3:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.ppc64le",
            "SUSE Manager Server 4.3:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
            "SUSE Manager Server 4.3:kernel-default-devel-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Manager Server 4.3:kernel-default-devel-5.14.21-150400.24.170.2.s390x",
            "SUSE Manager Server 4.3:kernel-default-devel-5.14.21-150400.24.170.2.x86_64",
            "SUSE Manager Server 4.3:kernel-devel-5.14.21-150400.24.170.1.noarch",
            "SUSE Manager Server 4.3:kernel-macros-5.14.21-150400.24.170.1.noarch",
            "SUSE Manager Server 4.3:kernel-source-5.14.21-150400.24.170.1.noarch",
            "SUSE Manager Server 4.3:kernel-syms-5.14.21-150400.24.170.1.ppc64le",
            "SUSE Manager Server 4.3:kernel-syms-5.14.21-150400.24.170.1.s390x",
            "SUSE Manager Server 4.3:kernel-syms-5.14.21-150400.24.170.1.x86_64",
            "SUSE Manager Server 4.3:kernel-zfcpdump-5.14.21-150400.24.170.2.s390x"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2025-07-28T15:09:33Z",
          "details": "moderate"
        }
      ],
      "title": "CVE-2022-49945"
    },
    {
      "cve": "CVE-2022-49946",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2022-49946"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "In the Linux kernel, the following vulnerability has been resolved:\n\nclk: bcm: rpi: Prevent out-of-bounds access\n\nThe while loop in raspberrypi_discover_clocks() relies on the assumption\nthat the id of the last clock element is zero. Because this data comes\nfrom the Videocore firmware and it doesn\u0027t guarantuee such a behavior\nthis could lead to out-of-bounds access. So fix this by providing\na sentinel element.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.170.2.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.170.2.s390x",
          "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.170.2.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.170.2.s390x",
          "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.170.2.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.170.2.s390x",
          "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.170.2.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.170.2.s390x",
          "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-64kb-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-64kb-devel-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-devel-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-devel-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-devel-5.14.21-150400.24.170.1.noarch",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-docs-5.14.21-150400.24.170.1.noarch",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-macros-5.14.21-150400.24.170.1.noarch",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-obs-build-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-obs-build-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-source-5.14.21-150400.24.170.1.noarch",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-syms-5.14.21-150400.24.170.1.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-syms-5.14.21-150400.24.170.1.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:reiserfs-kmp-default-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:reiserfs-kmp-default-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-64kb-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-64kb-devel-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-devel-5.14.21-150400.24.170.1.noarch",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-docs-5.14.21-150400.24.170.1.noarch",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-macros-5.14.21-150400.24.170.1.noarch",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-source-5.14.21-150400.24.170.1.noarch",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.170.1.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.170.1.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.170.2.ppc64le",
          "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.170.2.s390x",
          "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.170.2.ppc64le",
          "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.170.2.s390x",
          "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_170-default-1-150400.9.3.2.ppc64le",
          "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_170-default-1-150400.9.3.2.s390x",
          "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_170-default-1-150400.9.3.2.x86_64",
          "SUSE Linux Enterprise Micro 5.3:kernel-default-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise Micro 5.3:kernel-default-5.14.21-150400.24.170.2.s390x",
          "SUSE Linux Enterprise Micro 5.3:kernel-default-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise Micro 5.3:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.aarch64",
          "SUSE Linux Enterprise Micro 5.3:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
          "SUSE Linux Enterprise Micro 5.4:kernel-default-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise Micro 5.4:kernel-default-5.14.21-150400.24.170.2.s390x",
          "SUSE Linux Enterprise Micro 5.4:kernel-default-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise Micro 5.4:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.aarch64",
          "SUSE Linux Enterprise Micro 5.4:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-64kb-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-64kb-devel-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-5.14.21-150400.24.170.2.ppc64le",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-5.14.21-150400.24.170.2.s390x",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.aarch64",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.ppc64le",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.170.2.ppc64le",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.170.2.s390x",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-devel-5.14.21-150400.24.170.1.noarch",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-docs-5.14.21-150400.24.170.1.noarch",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-macros-5.14.21-150400.24.170.1.noarch",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.170.2.ppc64le",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.170.2.s390x",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-source-5.14.21-150400.24.170.1.noarch",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.170.1.aarch64",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.170.1.ppc64le",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.170.1.s390x",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.170.1.x86_64",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-zfcpdump-5.14.21-150400.24.170.2.s390x",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.170.2.ppc64le",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.170.2.s390x",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-5.14.21-150400.24.170.2.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-devel-5.14.21-150400.24.170.2.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-devel-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-devel-5.14.21-150400.24.170.1.noarch",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-docs-5.14.21-150400.24.170.1.noarch",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-macros-5.14.21-150400.24.170.1.noarch",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-obs-build-5.14.21-150400.24.170.2.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-obs-build-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-source-5.14.21-150400.24.170.1.noarch",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-syms-5.14.21-150400.24.170.1.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-syms-5.14.21-150400.24.170.1.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.170.2.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.170.2.x86_64",
          "SUSE Manager Proxy 4.3:kernel-default-5.14.21-150400.24.170.2.x86_64",
          "SUSE Manager Proxy 4.3:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
          "SUSE Manager Proxy 4.3:kernel-default-devel-5.14.21-150400.24.170.2.x86_64",
          "SUSE Manager Proxy 4.3:kernel-devel-5.14.21-150400.24.170.1.noarch",
          "SUSE Manager Proxy 4.3:kernel-macros-5.14.21-150400.24.170.1.noarch",
          "SUSE Manager Proxy 4.3:kernel-source-5.14.21-150400.24.170.1.noarch",
          "SUSE Manager Proxy 4.3:kernel-syms-5.14.21-150400.24.170.1.x86_64",
          "SUSE Manager Server 4.3:kernel-default-5.14.21-150400.24.170.2.ppc64le",
          "SUSE Manager Server 4.3:kernel-default-5.14.21-150400.24.170.2.s390x",
          "SUSE Manager Server 4.3:kernel-default-5.14.21-150400.24.170.2.x86_64",
          "SUSE Manager Server 4.3:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.ppc64le",
          "SUSE Manager Server 4.3:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
          "SUSE Manager Server 4.3:kernel-default-devel-5.14.21-150400.24.170.2.ppc64le",
          "SUSE Manager Server 4.3:kernel-default-devel-5.14.21-150400.24.170.2.s390x",
          "SUSE Manager Server 4.3:kernel-default-devel-5.14.21-150400.24.170.2.x86_64",
          "SUSE Manager Server 4.3:kernel-devel-5.14.21-150400.24.170.1.noarch",
          "SUSE Manager Server 4.3:kernel-macros-5.14.21-150400.24.170.1.noarch",
          "SUSE Manager Server 4.3:kernel-source-5.14.21-150400.24.170.1.noarch",
          "SUSE Manager Server 4.3:kernel-syms-5.14.21-150400.24.170.1.ppc64le",
          "SUSE Manager Server 4.3:kernel-syms-5.14.21-150400.24.170.1.s390x",
          "SUSE Manager Server 4.3:kernel-syms-5.14.21-150400.24.170.1.x86_64",
          "SUSE Manager Server 4.3:kernel-zfcpdump-5.14.21-150400.24.170.2.s390x"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2022-49946",
          "url": "https://www.suse.com/security/cve/CVE-2022-49946"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1244944 for CVE-2022-49946",
          "url": "https://bugzilla.suse.com/1244944"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-64kb-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-64kb-devel-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-devel-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-devel-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-devel-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-docs-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-macros-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-obs-build-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-obs-build-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-source-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-syms-5.14.21-150400.24.170.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-syms-5.14.21-150400.24.170.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:reiserfs-kmp-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:reiserfs-kmp-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-64kb-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-64kb-devel-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-devel-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-docs-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-macros-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-source-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.170.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.170.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_170-default-1-150400.9.3.2.ppc64le",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_170-default-1-150400.9.3.2.s390x",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_170-default-1-150400.9.3.2.x86_64",
            "SUSE Linux Enterprise Micro 5.3:kernel-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise Micro 5.3:kernel-default-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise Micro 5.3:kernel-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Micro 5.3:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.aarch64",
            "SUSE Linux Enterprise Micro 5.3:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
            "SUSE Linux Enterprise Micro 5.4:kernel-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise Micro 5.4:kernel-default-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise Micro 5.4:kernel-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Micro 5.4:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.aarch64",
            "SUSE Linux Enterprise Micro 5.4:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-64kb-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-64kb-devel-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.aarch64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.ppc64le",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-devel-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-docs-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-macros-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-source-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.170.1.aarch64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.170.1.ppc64le",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.170.1.s390x",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.170.1.x86_64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-zfcpdump-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-devel-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-devel-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-devel-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-docs-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-macros-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-obs-build-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-obs-build-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-source-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-syms-5.14.21-150400.24.170.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-syms-5.14.21-150400.24.170.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Manager Proxy 4.3:kernel-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Manager Proxy 4.3:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
            "SUSE Manager Proxy 4.3:kernel-default-devel-5.14.21-150400.24.170.2.x86_64",
            "SUSE Manager Proxy 4.3:kernel-devel-5.14.21-150400.24.170.1.noarch",
            "SUSE Manager Proxy 4.3:kernel-macros-5.14.21-150400.24.170.1.noarch",
            "SUSE Manager Proxy 4.3:kernel-source-5.14.21-150400.24.170.1.noarch",
            "SUSE Manager Proxy 4.3:kernel-syms-5.14.21-150400.24.170.1.x86_64",
            "SUSE Manager Server 4.3:kernel-default-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Manager Server 4.3:kernel-default-5.14.21-150400.24.170.2.s390x",
            "SUSE Manager Server 4.3:kernel-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Manager Server 4.3:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.ppc64le",
            "SUSE Manager Server 4.3:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
            "SUSE Manager Server 4.3:kernel-default-devel-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Manager Server 4.3:kernel-default-devel-5.14.21-150400.24.170.2.s390x",
            "SUSE Manager Server 4.3:kernel-default-devel-5.14.21-150400.24.170.2.x86_64",
            "SUSE Manager Server 4.3:kernel-devel-5.14.21-150400.24.170.1.noarch",
            "SUSE Manager Server 4.3:kernel-macros-5.14.21-150400.24.170.1.noarch",
            "SUSE Manager Server 4.3:kernel-source-5.14.21-150400.24.170.1.noarch",
            "SUSE Manager Server 4.3:kernel-syms-5.14.21-150400.24.170.1.ppc64le",
            "SUSE Manager Server 4.3:kernel-syms-5.14.21-150400.24.170.1.s390x",
            "SUSE Manager Server 4.3:kernel-syms-5.14.21-150400.24.170.1.x86_64",
            "SUSE Manager Server 4.3:kernel-zfcpdump-5.14.21-150400.24.170.2.s390x"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 5.5,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
            "version": "3.1"
          },
          "products": [
            "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-64kb-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-64kb-devel-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-devel-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-devel-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-devel-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-docs-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-macros-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-obs-build-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-obs-build-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-source-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-syms-5.14.21-150400.24.170.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-syms-5.14.21-150400.24.170.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:reiserfs-kmp-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:reiserfs-kmp-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-64kb-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-64kb-devel-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-devel-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-docs-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-macros-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-source-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.170.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.170.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_170-default-1-150400.9.3.2.ppc64le",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_170-default-1-150400.9.3.2.s390x",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_170-default-1-150400.9.3.2.x86_64",
            "SUSE Linux Enterprise Micro 5.3:kernel-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise Micro 5.3:kernel-default-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise Micro 5.3:kernel-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Micro 5.3:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.aarch64",
            "SUSE Linux Enterprise Micro 5.3:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
            "SUSE Linux Enterprise Micro 5.4:kernel-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise Micro 5.4:kernel-default-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise Micro 5.4:kernel-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Micro 5.4:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.aarch64",
            "SUSE Linux Enterprise Micro 5.4:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-64kb-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-64kb-devel-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.aarch64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.ppc64le",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-devel-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-docs-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-macros-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-source-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.170.1.aarch64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.170.1.ppc64le",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.170.1.s390x",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.170.1.x86_64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-zfcpdump-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-devel-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-devel-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-devel-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-docs-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-macros-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-obs-build-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-obs-build-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-source-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-syms-5.14.21-150400.24.170.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-syms-5.14.21-150400.24.170.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Manager Proxy 4.3:kernel-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Manager Proxy 4.3:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
            "SUSE Manager Proxy 4.3:kernel-default-devel-5.14.21-150400.24.170.2.x86_64",
            "SUSE Manager Proxy 4.3:kernel-devel-5.14.21-150400.24.170.1.noarch",
            "SUSE Manager Proxy 4.3:kernel-macros-5.14.21-150400.24.170.1.noarch",
            "SUSE Manager Proxy 4.3:kernel-source-5.14.21-150400.24.170.1.noarch",
            "SUSE Manager Proxy 4.3:kernel-syms-5.14.21-150400.24.170.1.x86_64",
            "SUSE Manager Server 4.3:kernel-default-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Manager Server 4.3:kernel-default-5.14.21-150400.24.170.2.s390x",
            "SUSE Manager Server 4.3:kernel-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Manager Server 4.3:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.ppc64le",
            "SUSE Manager Server 4.3:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
            "SUSE Manager Server 4.3:kernel-default-devel-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Manager Server 4.3:kernel-default-devel-5.14.21-150400.24.170.2.s390x",
            "SUSE Manager Server 4.3:kernel-default-devel-5.14.21-150400.24.170.2.x86_64",
            "SUSE Manager Server 4.3:kernel-devel-5.14.21-150400.24.170.1.noarch",
            "SUSE Manager Server 4.3:kernel-macros-5.14.21-150400.24.170.1.noarch",
            "SUSE Manager Server 4.3:kernel-source-5.14.21-150400.24.170.1.noarch",
            "SUSE Manager Server 4.3:kernel-syms-5.14.21-150400.24.170.1.ppc64le",
            "SUSE Manager Server 4.3:kernel-syms-5.14.21-150400.24.170.1.s390x",
            "SUSE Manager Server 4.3:kernel-syms-5.14.21-150400.24.170.1.x86_64",
            "SUSE Manager Server 4.3:kernel-zfcpdump-5.14.21-150400.24.170.2.s390x"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2025-07-28T15:09:33Z",
          "details": "moderate"
        }
      ],
      "title": "CVE-2022-49946"
    },
    {
      "cve": "CVE-2022-49948",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2022-49948"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "In the Linux kernel, the following vulnerability has been resolved:\n\nvt: Clear selection before changing the font\n\nWhen changing the console font with ioctl(KDFONTOP) the new font size\ncan be bigger than the previous font. A previous selection may thus now\nbe outside of the new screen size and thus trigger out-of-bounds\naccesses to graphics memory if the selection is removed in\nvc_do_resize().\n\nPrevent such out-of-memory accesses by dropping the selection before the\nvarious con_font_set() console handlers are called.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.170.2.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.170.2.s390x",
          "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.170.2.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.170.2.s390x",
          "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.170.2.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.170.2.s390x",
          "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.170.2.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.170.2.s390x",
          "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-64kb-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-64kb-devel-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-devel-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-devel-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-devel-5.14.21-150400.24.170.1.noarch",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-docs-5.14.21-150400.24.170.1.noarch",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-macros-5.14.21-150400.24.170.1.noarch",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-obs-build-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-obs-build-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-source-5.14.21-150400.24.170.1.noarch",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-syms-5.14.21-150400.24.170.1.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-syms-5.14.21-150400.24.170.1.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:reiserfs-kmp-default-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:reiserfs-kmp-default-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-64kb-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-64kb-devel-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-devel-5.14.21-150400.24.170.1.noarch",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-docs-5.14.21-150400.24.170.1.noarch",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-macros-5.14.21-150400.24.170.1.noarch",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-source-5.14.21-150400.24.170.1.noarch",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.170.1.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.170.1.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.170.2.ppc64le",
          "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.170.2.s390x",
          "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.170.2.ppc64le",
          "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.170.2.s390x",
          "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_170-default-1-150400.9.3.2.ppc64le",
          "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_170-default-1-150400.9.3.2.s390x",
          "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_170-default-1-150400.9.3.2.x86_64",
          "SUSE Linux Enterprise Micro 5.3:kernel-default-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise Micro 5.3:kernel-default-5.14.21-150400.24.170.2.s390x",
          "SUSE Linux Enterprise Micro 5.3:kernel-default-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise Micro 5.3:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.aarch64",
          "SUSE Linux Enterprise Micro 5.3:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
          "SUSE Linux Enterprise Micro 5.4:kernel-default-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise Micro 5.4:kernel-default-5.14.21-150400.24.170.2.s390x",
          "SUSE Linux Enterprise Micro 5.4:kernel-default-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise Micro 5.4:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.aarch64",
          "SUSE Linux Enterprise Micro 5.4:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-64kb-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-64kb-devel-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-5.14.21-150400.24.170.2.ppc64le",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-5.14.21-150400.24.170.2.s390x",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.aarch64",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.ppc64le",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.170.2.ppc64le",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.170.2.s390x",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-devel-5.14.21-150400.24.170.1.noarch",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-docs-5.14.21-150400.24.170.1.noarch",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-macros-5.14.21-150400.24.170.1.noarch",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.170.2.ppc64le",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.170.2.s390x",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-source-5.14.21-150400.24.170.1.noarch",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.170.1.aarch64",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.170.1.ppc64le",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.170.1.s390x",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.170.1.x86_64",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-zfcpdump-5.14.21-150400.24.170.2.s390x",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.170.2.ppc64le",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.170.2.s390x",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-5.14.21-150400.24.170.2.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-devel-5.14.21-150400.24.170.2.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-devel-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-devel-5.14.21-150400.24.170.1.noarch",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-docs-5.14.21-150400.24.170.1.noarch",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-macros-5.14.21-150400.24.170.1.noarch",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-obs-build-5.14.21-150400.24.170.2.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-obs-build-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-source-5.14.21-150400.24.170.1.noarch",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-syms-5.14.21-150400.24.170.1.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-syms-5.14.21-150400.24.170.1.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.170.2.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.170.2.x86_64",
          "SUSE Manager Proxy 4.3:kernel-default-5.14.21-150400.24.170.2.x86_64",
          "SUSE Manager Proxy 4.3:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
          "SUSE Manager Proxy 4.3:kernel-default-devel-5.14.21-150400.24.170.2.x86_64",
          "SUSE Manager Proxy 4.3:kernel-devel-5.14.21-150400.24.170.1.noarch",
          "SUSE Manager Proxy 4.3:kernel-macros-5.14.21-150400.24.170.1.noarch",
          "SUSE Manager Proxy 4.3:kernel-source-5.14.21-150400.24.170.1.noarch",
          "SUSE Manager Proxy 4.3:kernel-syms-5.14.21-150400.24.170.1.x86_64",
          "SUSE Manager Server 4.3:kernel-default-5.14.21-150400.24.170.2.ppc64le",
          "SUSE Manager Server 4.3:kernel-default-5.14.21-150400.24.170.2.s390x",
          "SUSE Manager Server 4.3:kernel-default-5.14.21-150400.24.170.2.x86_64",
          "SUSE Manager Server 4.3:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.ppc64le",
          "SUSE Manager Server 4.3:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
          "SUSE Manager Server 4.3:kernel-default-devel-5.14.21-150400.24.170.2.ppc64le",
          "SUSE Manager Server 4.3:kernel-default-devel-5.14.21-150400.24.170.2.s390x",
          "SUSE Manager Server 4.3:kernel-default-devel-5.14.21-150400.24.170.2.x86_64",
          "SUSE Manager Server 4.3:kernel-devel-5.14.21-150400.24.170.1.noarch",
          "SUSE Manager Server 4.3:kernel-macros-5.14.21-150400.24.170.1.noarch",
          "SUSE Manager Server 4.3:kernel-source-5.14.21-150400.24.170.1.noarch",
          "SUSE Manager Server 4.3:kernel-syms-5.14.21-150400.24.170.1.ppc64le",
          "SUSE Manager Server 4.3:kernel-syms-5.14.21-150400.24.170.1.s390x",
          "SUSE Manager Server 4.3:kernel-syms-5.14.21-150400.24.170.1.x86_64",
          "SUSE Manager Server 4.3:kernel-zfcpdump-5.14.21-150400.24.170.2.s390x"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2022-49948",
          "url": "https://www.suse.com/security/cve/CVE-2022-49948"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1245058 for CVE-2022-49948",
          "url": "https://bugzilla.suse.com/1245058"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-64kb-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-64kb-devel-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-devel-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-devel-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-devel-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-docs-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-macros-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-obs-build-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-obs-build-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-source-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-syms-5.14.21-150400.24.170.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-syms-5.14.21-150400.24.170.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:reiserfs-kmp-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:reiserfs-kmp-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-64kb-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-64kb-devel-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-devel-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-docs-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-macros-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-source-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.170.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.170.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_170-default-1-150400.9.3.2.ppc64le",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_170-default-1-150400.9.3.2.s390x",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_170-default-1-150400.9.3.2.x86_64",
            "SUSE Linux Enterprise Micro 5.3:kernel-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise Micro 5.3:kernel-default-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise Micro 5.3:kernel-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Micro 5.3:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.aarch64",
            "SUSE Linux Enterprise Micro 5.3:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
            "SUSE Linux Enterprise Micro 5.4:kernel-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise Micro 5.4:kernel-default-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise Micro 5.4:kernel-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Micro 5.4:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.aarch64",
            "SUSE Linux Enterprise Micro 5.4:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-64kb-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-64kb-devel-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.aarch64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.ppc64le",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-devel-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-docs-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-macros-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-source-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.170.1.aarch64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.170.1.ppc64le",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.170.1.s390x",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.170.1.x86_64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-zfcpdump-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-devel-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-devel-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-devel-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-docs-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-macros-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-obs-build-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-obs-build-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-source-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-syms-5.14.21-150400.24.170.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-syms-5.14.21-150400.24.170.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Manager Proxy 4.3:kernel-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Manager Proxy 4.3:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
            "SUSE Manager Proxy 4.3:kernel-default-devel-5.14.21-150400.24.170.2.x86_64",
            "SUSE Manager Proxy 4.3:kernel-devel-5.14.21-150400.24.170.1.noarch",
            "SUSE Manager Proxy 4.3:kernel-macros-5.14.21-150400.24.170.1.noarch",
            "SUSE Manager Proxy 4.3:kernel-source-5.14.21-150400.24.170.1.noarch",
            "SUSE Manager Proxy 4.3:kernel-syms-5.14.21-150400.24.170.1.x86_64",
            "SUSE Manager Server 4.3:kernel-default-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Manager Server 4.3:kernel-default-5.14.21-150400.24.170.2.s390x",
            "SUSE Manager Server 4.3:kernel-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Manager Server 4.3:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.ppc64le",
            "SUSE Manager Server 4.3:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
            "SUSE Manager Server 4.3:kernel-default-devel-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Manager Server 4.3:kernel-default-devel-5.14.21-150400.24.170.2.s390x",
            "SUSE Manager Server 4.3:kernel-default-devel-5.14.21-150400.24.170.2.x86_64",
            "SUSE Manager Server 4.3:kernel-devel-5.14.21-150400.24.170.1.noarch",
            "SUSE Manager Server 4.3:kernel-macros-5.14.21-150400.24.170.1.noarch",
            "SUSE Manager Server 4.3:kernel-source-5.14.21-150400.24.170.1.noarch",
            "SUSE Manager Server 4.3:kernel-syms-5.14.21-150400.24.170.1.ppc64le",
            "SUSE Manager Server 4.3:kernel-syms-5.14.21-150400.24.170.1.s390x",
            "SUSE Manager Server 4.3:kernel-syms-5.14.21-150400.24.170.1.x86_64",
            "SUSE Manager Server 4.3:kernel-zfcpdump-5.14.21-150400.24.170.2.s390x"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 5.5,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
            "version": "3.1"
          },
          "products": [
            "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-64kb-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-64kb-devel-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-devel-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-devel-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-devel-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-docs-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-macros-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-obs-build-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-obs-build-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-source-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-syms-5.14.21-150400.24.170.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-syms-5.14.21-150400.24.170.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:reiserfs-kmp-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:reiserfs-kmp-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-64kb-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-64kb-devel-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-devel-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-docs-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-macros-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-source-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.170.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.170.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_170-default-1-150400.9.3.2.ppc64le",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_170-default-1-150400.9.3.2.s390x",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_170-default-1-150400.9.3.2.x86_64",
            "SUSE Linux Enterprise Micro 5.3:kernel-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise Micro 5.3:kernel-default-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise Micro 5.3:kernel-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Micro 5.3:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.aarch64",
            "SUSE Linux Enterprise Micro 5.3:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
            "SUSE Linux Enterprise Micro 5.4:kernel-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise Micro 5.4:kernel-default-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise Micro 5.4:kernel-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Micro 5.4:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.aarch64",
            "SUSE Linux Enterprise Micro 5.4:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-64kb-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-64kb-devel-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.aarch64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.ppc64le",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-devel-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-docs-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-macros-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-source-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.170.1.aarch64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.170.1.ppc64le",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.170.1.s390x",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.170.1.x86_64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-zfcpdump-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-devel-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-devel-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-devel-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-docs-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-macros-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-obs-build-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-obs-build-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-source-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-syms-5.14.21-150400.24.170.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-syms-5.14.21-150400.24.170.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Manager Proxy 4.3:kernel-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Manager Proxy 4.3:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
            "SUSE Manager Proxy 4.3:kernel-default-devel-5.14.21-150400.24.170.2.x86_64",
            "SUSE Manager Proxy 4.3:kernel-devel-5.14.21-150400.24.170.1.noarch",
            "SUSE Manager Proxy 4.3:kernel-macros-5.14.21-150400.24.170.1.noarch",
            "SUSE Manager Proxy 4.3:kernel-source-5.14.21-150400.24.170.1.noarch",
            "SUSE Manager Proxy 4.3:kernel-syms-5.14.21-150400.24.170.1.x86_64",
            "SUSE Manager Server 4.3:kernel-default-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Manager Server 4.3:kernel-default-5.14.21-150400.24.170.2.s390x",
            "SUSE Manager Server 4.3:kernel-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Manager Server 4.3:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.ppc64le",
            "SUSE Manager Server 4.3:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
            "SUSE Manager Server 4.3:kernel-default-devel-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Manager Server 4.3:kernel-default-devel-5.14.21-150400.24.170.2.s390x",
            "SUSE Manager Server 4.3:kernel-default-devel-5.14.21-150400.24.170.2.x86_64",
            "SUSE Manager Server 4.3:kernel-devel-5.14.21-150400.24.170.1.noarch",
            "SUSE Manager Server 4.3:kernel-macros-5.14.21-150400.24.170.1.noarch",
            "SUSE Manager Server 4.3:kernel-source-5.14.21-150400.24.170.1.noarch",
            "SUSE Manager Server 4.3:kernel-syms-5.14.21-150400.24.170.1.ppc64le",
            "SUSE Manager Server 4.3:kernel-syms-5.14.21-150400.24.170.1.s390x",
            "SUSE Manager Server 4.3:kernel-syms-5.14.21-150400.24.170.1.x86_64",
            "SUSE Manager Server 4.3:kernel-zfcpdump-5.14.21-150400.24.170.2.s390x"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2025-07-28T15:09:33Z",
          "details": "moderate"
        }
      ],
      "title": "CVE-2022-49948"
    },
    {
      "cve": "CVE-2022-49950",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2022-49950"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "In the Linux kernel, the following vulnerability has been resolved:\n\nmisc: fastrpc: fix memory corruption on open\n\nThe probe session-duplication overflow check incremented the session\ncount also when there were no more available sessions so that memory\nbeyond the fixed-size slab-allocated session array could be corrupted in\nfastrpc_session_alloc() on open().",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.170.2.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.170.2.s390x",
          "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.170.2.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.170.2.s390x",
          "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.170.2.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.170.2.s390x",
          "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.170.2.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.170.2.s390x",
          "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-64kb-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-64kb-devel-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-devel-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-devel-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-devel-5.14.21-150400.24.170.1.noarch",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-docs-5.14.21-150400.24.170.1.noarch",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-macros-5.14.21-150400.24.170.1.noarch",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-obs-build-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-obs-build-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-source-5.14.21-150400.24.170.1.noarch",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-syms-5.14.21-150400.24.170.1.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-syms-5.14.21-150400.24.170.1.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:reiserfs-kmp-default-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:reiserfs-kmp-default-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-64kb-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-64kb-devel-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-devel-5.14.21-150400.24.170.1.noarch",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-docs-5.14.21-150400.24.170.1.noarch",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-macros-5.14.21-150400.24.170.1.noarch",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-source-5.14.21-150400.24.170.1.noarch",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.170.1.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.170.1.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.170.2.ppc64le",
          "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.170.2.s390x",
          "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.170.2.ppc64le",
          "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.170.2.s390x",
          "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_170-default-1-150400.9.3.2.ppc64le",
          "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_170-default-1-150400.9.3.2.s390x",
          "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_170-default-1-150400.9.3.2.x86_64",
          "SUSE Linux Enterprise Micro 5.3:kernel-default-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise Micro 5.3:kernel-default-5.14.21-150400.24.170.2.s390x",
          "SUSE Linux Enterprise Micro 5.3:kernel-default-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise Micro 5.3:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.aarch64",
          "SUSE Linux Enterprise Micro 5.3:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
          "SUSE Linux Enterprise Micro 5.4:kernel-default-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise Micro 5.4:kernel-default-5.14.21-150400.24.170.2.s390x",
          "SUSE Linux Enterprise Micro 5.4:kernel-default-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise Micro 5.4:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.aarch64",
          "SUSE Linux Enterprise Micro 5.4:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-64kb-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-64kb-devel-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-5.14.21-150400.24.170.2.ppc64le",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-5.14.21-150400.24.170.2.s390x",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.aarch64",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.ppc64le",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.170.2.ppc64le",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.170.2.s390x",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-devel-5.14.21-150400.24.170.1.noarch",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-docs-5.14.21-150400.24.170.1.noarch",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-macros-5.14.21-150400.24.170.1.noarch",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.170.2.ppc64le",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.170.2.s390x",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-source-5.14.21-150400.24.170.1.noarch",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.170.1.aarch64",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.170.1.ppc64le",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.170.1.s390x",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.170.1.x86_64",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-zfcpdump-5.14.21-150400.24.170.2.s390x",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.170.2.ppc64le",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.170.2.s390x",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-5.14.21-150400.24.170.2.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-devel-5.14.21-150400.24.170.2.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-devel-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-devel-5.14.21-150400.24.170.1.noarch",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-docs-5.14.21-150400.24.170.1.noarch",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-macros-5.14.21-150400.24.170.1.noarch",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-obs-build-5.14.21-150400.24.170.2.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-obs-build-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-source-5.14.21-150400.24.170.1.noarch",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-syms-5.14.21-150400.24.170.1.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-syms-5.14.21-150400.24.170.1.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.170.2.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.170.2.x86_64",
          "SUSE Manager Proxy 4.3:kernel-default-5.14.21-150400.24.170.2.x86_64",
          "SUSE Manager Proxy 4.3:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
          "SUSE Manager Proxy 4.3:kernel-default-devel-5.14.21-150400.24.170.2.x86_64",
          "SUSE Manager Proxy 4.3:kernel-devel-5.14.21-150400.24.170.1.noarch",
          "SUSE Manager Proxy 4.3:kernel-macros-5.14.21-150400.24.170.1.noarch",
          "SUSE Manager Proxy 4.3:kernel-source-5.14.21-150400.24.170.1.noarch",
          "SUSE Manager Proxy 4.3:kernel-syms-5.14.21-150400.24.170.1.x86_64",
          "SUSE Manager Server 4.3:kernel-default-5.14.21-150400.24.170.2.ppc64le",
          "SUSE Manager Server 4.3:kernel-default-5.14.21-150400.24.170.2.s390x",
          "SUSE Manager Server 4.3:kernel-default-5.14.21-150400.24.170.2.x86_64",
          "SUSE Manager Server 4.3:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.ppc64le",
          "SUSE Manager Server 4.3:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
          "SUSE Manager Server 4.3:kernel-default-devel-5.14.21-150400.24.170.2.ppc64le",
          "SUSE Manager Server 4.3:kernel-default-devel-5.14.21-150400.24.170.2.s390x",
          "SUSE Manager Server 4.3:kernel-default-devel-5.14.21-150400.24.170.2.x86_64",
          "SUSE Manager Server 4.3:kernel-devel-5.14.21-150400.24.170.1.noarch",
          "SUSE Manager Server 4.3:kernel-macros-5.14.21-150400.24.170.1.noarch",
          "SUSE Manager Server 4.3:kernel-source-5.14.21-150400.24.170.1.noarch",
          "SUSE Manager Server 4.3:kernel-syms-5.14.21-150400.24.170.1.ppc64le",
          "SUSE Manager Server 4.3:kernel-syms-5.14.21-150400.24.170.1.s390x",
          "SUSE Manager Server 4.3:kernel-syms-5.14.21-150400.24.170.1.x86_64",
          "SUSE Manager Server 4.3:kernel-zfcpdump-5.14.21-150400.24.170.2.s390x"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2022-49950",
          "url": "https://www.suse.com/security/cve/CVE-2022-49950"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1244958 for CVE-2022-49950",
          "url": "https://bugzilla.suse.com/1244958"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-64kb-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-64kb-devel-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-devel-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-devel-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-devel-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-docs-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-macros-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-obs-build-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-obs-build-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-source-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-syms-5.14.21-150400.24.170.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-syms-5.14.21-150400.24.170.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:reiserfs-kmp-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:reiserfs-kmp-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-64kb-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-64kb-devel-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-devel-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-docs-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-macros-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-source-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.170.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.170.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_170-default-1-150400.9.3.2.ppc64le",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_170-default-1-150400.9.3.2.s390x",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_170-default-1-150400.9.3.2.x86_64",
            "SUSE Linux Enterprise Micro 5.3:kernel-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise Micro 5.3:kernel-default-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise Micro 5.3:kernel-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Micro 5.3:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.aarch64",
            "SUSE Linux Enterprise Micro 5.3:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
            "SUSE Linux Enterprise Micro 5.4:kernel-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise Micro 5.4:kernel-default-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise Micro 5.4:kernel-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Micro 5.4:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.aarch64",
            "SUSE Linux Enterprise Micro 5.4:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-64kb-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-64kb-devel-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.aarch64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.ppc64le",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-devel-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-docs-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-macros-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-source-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.170.1.aarch64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.170.1.ppc64le",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.170.1.s390x",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.170.1.x86_64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-zfcpdump-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-devel-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-devel-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-devel-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-docs-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-macros-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-obs-build-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-obs-build-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-source-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-syms-5.14.21-150400.24.170.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-syms-5.14.21-150400.24.170.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Manager Proxy 4.3:kernel-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Manager Proxy 4.3:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
            "SUSE Manager Proxy 4.3:kernel-default-devel-5.14.21-150400.24.170.2.x86_64",
            "SUSE Manager Proxy 4.3:kernel-devel-5.14.21-150400.24.170.1.noarch",
            "SUSE Manager Proxy 4.3:kernel-macros-5.14.21-150400.24.170.1.noarch",
            "SUSE Manager Proxy 4.3:kernel-source-5.14.21-150400.24.170.1.noarch",
            "SUSE Manager Proxy 4.3:kernel-syms-5.14.21-150400.24.170.1.x86_64",
            "SUSE Manager Server 4.3:kernel-default-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Manager Server 4.3:kernel-default-5.14.21-150400.24.170.2.s390x",
            "SUSE Manager Server 4.3:kernel-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Manager Server 4.3:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.ppc64le",
            "SUSE Manager Server 4.3:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
            "SUSE Manager Server 4.3:kernel-default-devel-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Manager Server 4.3:kernel-default-devel-5.14.21-150400.24.170.2.s390x",
            "SUSE Manager Server 4.3:kernel-default-devel-5.14.21-150400.24.170.2.x86_64",
            "SUSE Manager Server 4.3:kernel-devel-5.14.21-150400.24.170.1.noarch",
            "SUSE Manager Server 4.3:kernel-macros-5.14.21-150400.24.170.1.noarch",
            "SUSE Manager Server 4.3:kernel-source-5.14.21-150400.24.170.1.noarch",
            "SUSE Manager Server 4.3:kernel-syms-5.14.21-150400.24.170.1.ppc64le",
            "SUSE Manager Server 4.3:kernel-syms-5.14.21-150400.24.170.1.s390x",
            "SUSE Manager Server 4.3:kernel-syms-5.14.21-150400.24.170.1.x86_64",
            "SUSE Manager Server 4.3:kernel-zfcpdump-5.14.21-150400.24.170.2.s390x"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 5.5,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
            "version": "3.1"
          },
          "products": [
            "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-64kb-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-64kb-devel-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-devel-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-devel-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-devel-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-docs-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-macros-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-obs-build-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-obs-build-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-source-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-syms-5.14.21-150400.24.170.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-syms-5.14.21-150400.24.170.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:reiserfs-kmp-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:reiserfs-kmp-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-64kb-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-64kb-devel-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-devel-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-docs-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-macros-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-source-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.170.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.170.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_170-default-1-150400.9.3.2.ppc64le",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_170-default-1-150400.9.3.2.s390x",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_170-default-1-150400.9.3.2.x86_64",
            "SUSE Linux Enterprise Micro 5.3:kernel-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise Micro 5.3:kernel-default-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise Micro 5.3:kernel-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Micro 5.3:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.aarch64",
            "SUSE Linux Enterprise Micro 5.3:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
            "SUSE Linux Enterprise Micro 5.4:kernel-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise Micro 5.4:kernel-default-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise Micro 5.4:kernel-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Micro 5.4:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.aarch64",
            "SUSE Linux Enterprise Micro 5.4:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-64kb-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-64kb-devel-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.aarch64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.ppc64le",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-devel-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-docs-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-macros-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-source-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.170.1.aarch64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.170.1.ppc64le",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.170.1.s390x",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.170.1.x86_64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-zfcpdump-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-devel-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-devel-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-devel-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-docs-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-macros-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-obs-build-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-obs-build-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-source-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-syms-5.14.21-150400.24.170.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-syms-5.14.21-150400.24.170.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Manager Proxy 4.3:kernel-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Manager Proxy 4.3:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
            "SUSE Manager Proxy 4.3:kernel-default-devel-5.14.21-150400.24.170.2.x86_64",
            "SUSE Manager Proxy 4.3:kernel-devel-5.14.21-150400.24.170.1.noarch",
            "SUSE Manager Proxy 4.3:kernel-macros-5.14.21-150400.24.170.1.noarch",
            "SUSE Manager Proxy 4.3:kernel-source-5.14.21-150400.24.170.1.noarch",
            "SUSE Manager Proxy 4.3:kernel-syms-5.14.21-150400.24.170.1.x86_64",
            "SUSE Manager Server 4.3:kernel-default-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Manager Server 4.3:kernel-default-5.14.21-150400.24.170.2.s390x",
            "SUSE Manager Server 4.3:kernel-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Manager Server 4.3:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.ppc64le",
            "SUSE Manager Server 4.3:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
            "SUSE Manager Server 4.3:kernel-default-devel-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Manager Server 4.3:kernel-default-devel-5.14.21-150400.24.170.2.s390x",
            "SUSE Manager Server 4.3:kernel-default-devel-5.14.21-150400.24.170.2.x86_64",
            "SUSE Manager Server 4.3:kernel-devel-5.14.21-150400.24.170.1.noarch",
            "SUSE Manager Server 4.3:kernel-macros-5.14.21-150400.24.170.1.noarch",
            "SUSE Manager Server 4.3:kernel-source-5.14.21-150400.24.170.1.noarch",
            "SUSE Manager Server 4.3:kernel-syms-5.14.21-150400.24.170.1.ppc64le",
            "SUSE Manager Server 4.3:kernel-syms-5.14.21-150400.24.170.1.s390x",
            "SUSE Manager Server 4.3:kernel-syms-5.14.21-150400.24.170.1.x86_64",
            "SUSE Manager Server 4.3:kernel-zfcpdump-5.14.21-150400.24.170.2.s390x"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2025-07-28T15:09:33Z",
          "details": "moderate"
        }
      ],
      "title": "CVE-2022-49950"
    },
    {
      "cve": "CVE-2022-49952",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2022-49952"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "In the Linux kernel, the following vulnerability has been resolved:\n\nmisc: fastrpc: fix memory corruption on probe\n\nAdd the missing sanity check on the probed-session count to avoid\ncorrupting memory beyond the fixed-size slab-allocated session array\nwhen there are more than FASTRPC_MAX_SESSIONS sessions defined in the\ndevicetree.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.170.2.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.170.2.s390x",
          "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.170.2.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.170.2.s390x",
          "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.170.2.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.170.2.s390x",
          "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.170.2.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.170.2.s390x",
          "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-64kb-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-64kb-devel-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-devel-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-devel-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-devel-5.14.21-150400.24.170.1.noarch",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-docs-5.14.21-150400.24.170.1.noarch",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-macros-5.14.21-150400.24.170.1.noarch",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-obs-build-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-obs-build-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-source-5.14.21-150400.24.170.1.noarch",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-syms-5.14.21-150400.24.170.1.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-syms-5.14.21-150400.24.170.1.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:reiserfs-kmp-default-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:reiserfs-kmp-default-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-64kb-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-64kb-devel-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-devel-5.14.21-150400.24.170.1.noarch",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-docs-5.14.21-150400.24.170.1.noarch",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-macros-5.14.21-150400.24.170.1.noarch",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-source-5.14.21-150400.24.170.1.noarch",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.170.1.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.170.1.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.170.2.ppc64le",
          "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.170.2.s390x",
          "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.170.2.ppc64le",
          "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.170.2.s390x",
          "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_170-default-1-150400.9.3.2.ppc64le",
          "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_170-default-1-150400.9.3.2.s390x",
          "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_170-default-1-150400.9.3.2.x86_64",
          "SUSE Linux Enterprise Micro 5.3:kernel-default-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise Micro 5.3:kernel-default-5.14.21-150400.24.170.2.s390x",
          "SUSE Linux Enterprise Micro 5.3:kernel-default-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise Micro 5.3:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.aarch64",
          "SUSE Linux Enterprise Micro 5.3:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
          "SUSE Linux Enterprise Micro 5.4:kernel-default-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise Micro 5.4:kernel-default-5.14.21-150400.24.170.2.s390x",
          "SUSE Linux Enterprise Micro 5.4:kernel-default-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise Micro 5.4:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.aarch64",
          "SUSE Linux Enterprise Micro 5.4:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-64kb-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-64kb-devel-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-5.14.21-150400.24.170.2.ppc64le",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-5.14.21-150400.24.170.2.s390x",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.aarch64",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.ppc64le",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.170.2.ppc64le",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.170.2.s390x",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-devel-5.14.21-150400.24.170.1.noarch",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-docs-5.14.21-150400.24.170.1.noarch",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-macros-5.14.21-150400.24.170.1.noarch",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.170.2.ppc64le",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.170.2.s390x",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-source-5.14.21-150400.24.170.1.noarch",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.170.1.aarch64",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.170.1.ppc64le",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.170.1.s390x",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.170.1.x86_64",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-zfcpdump-5.14.21-150400.24.170.2.s390x",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.170.2.ppc64le",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.170.2.s390x",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-5.14.21-150400.24.170.2.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-devel-5.14.21-150400.24.170.2.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-devel-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-devel-5.14.21-150400.24.170.1.noarch",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-docs-5.14.21-150400.24.170.1.noarch",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-macros-5.14.21-150400.24.170.1.noarch",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-obs-build-5.14.21-150400.24.170.2.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-obs-build-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-source-5.14.21-150400.24.170.1.noarch",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-syms-5.14.21-150400.24.170.1.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-syms-5.14.21-150400.24.170.1.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.170.2.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.170.2.x86_64",
          "SUSE Manager Proxy 4.3:kernel-default-5.14.21-150400.24.170.2.x86_64",
          "SUSE Manager Proxy 4.3:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
          "SUSE Manager Proxy 4.3:kernel-default-devel-5.14.21-150400.24.170.2.x86_64",
          "SUSE Manager Proxy 4.3:kernel-devel-5.14.21-150400.24.170.1.noarch",
          "SUSE Manager Proxy 4.3:kernel-macros-5.14.21-150400.24.170.1.noarch",
          "SUSE Manager Proxy 4.3:kernel-source-5.14.21-150400.24.170.1.noarch",
          "SUSE Manager Proxy 4.3:kernel-syms-5.14.21-150400.24.170.1.x86_64",
          "SUSE Manager Server 4.3:kernel-default-5.14.21-150400.24.170.2.ppc64le",
          "SUSE Manager Server 4.3:kernel-default-5.14.21-150400.24.170.2.s390x",
          "SUSE Manager Server 4.3:kernel-default-5.14.21-150400.24.170.2.x86_64",
          "SUSE Manager Server 4.3:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.ppc64le",
          "SUSE Manager Server 4.3:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
          "SUSE Manager Server 4.3:kernel-default-devel-5.14.21-150400.24.170.2.ppc64le",
          "SUSE Manager Server 4.3:kernel-default-devel-5.14.21-150400.24.170.2.s390x",
          "SUSE Manager Server 4.3:kernel-default-devel-5.14.21-150400.24.170.2.x86_64",
          "SUSE Manager Server 4.3:kernel-devel-5.14.21-150400.24.170.1.noarch",
          "SUSE Manager Server 4.3:kernel-macros-5.14.21-150400.24.170.1.noarch",
          "SUSE Manager Server 4.3:kernel-source-5.14.21-150400.24.170.1.noarch",
          "SUSE Manager Server 4.3:kernel-syms-5.14.21-150400.24.170.1.ppc64le",
          "SUSE Manager Server 4.3:kernel-syms-5.14.21-150400.24.170.1.s390x",
          "SUSE Manager Server 4.3:kernel-syms-5.14.21-150400.24.170.1.x86_64",
          "SUSE Manager Server 4.3:kernel-zfcpdump-5.14.21-150400.24.170.2.s390x"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2022-49952",
          "url": "https://www.suse.com/security/cve/CVE-2022-49952"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1244945 for CVE-2022-49952",
          "url": "https://bugzilla.suse.com/1244945"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-64kb-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-64kb-devel-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-devel-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-devel-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-devel-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-docs-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-macros-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-obs-build-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-obs-build-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-source-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-syms-5.14.21-150400.24.170.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-syms-5.14.21-150400.24.170.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:reiserfs-kmp-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:reiserfs-kmp-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-64kb-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-64kb-devel-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-devel-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-docs-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-macros-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-source-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.170.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.170.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_170-default-1-150400.9.3.2.ppc64le",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_170-default-1-150400.9.3.2.s390x",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_170-default-1-150400.9.3.2.x86_64",
            "SUSE Linux Enterprise Micro 5.3:kernel-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise Micro 5.3:kernel-default-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise Micro 5.3:kernel-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Micro 5.3:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.aarch64",
            "SUSE Linux Enterprise Micro 5.3:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
            "SUSE Linux Enterprise Micro 5.4:kernel-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise Micro 5.4:kernel-default-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise Micro 5.4:kernel-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Micro 5.4:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.aarch64",
            "SUSE Linux Enterprise Micro 5.4:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-64kb-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-64kb-devel-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.aarch64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.ppc64le",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-devel-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-docs-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-macros-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-source-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.170.1.aarch64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.170.1.ppc64le",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.170.1.s390x",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.170.1.x86_64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-zfcpdump-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-devel-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-devel-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-devel-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-docs-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-macros-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-obs-build-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-obs-build-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-source-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-syms-5.14.21-150400.24.170.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-syms-5.14.21-150400.24.170.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Manager Proxy 4.3:kernel-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Manager Proxy 4.3:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
            "SUSE Manager Proxy 4.3:kernel-default-devel-5.14.21-150400.24.170.2.x86_64",
            "SUSE Manager Proxy 4.3:kernel-devel-5.14.21-150400.24.170.1.noarch",
            "SUSE Manager Proxy 4.3:kernel-macros-5.14.21-150400.24.170.1.noarch",
            "SUSE Manager Proxy 4.3:kernel-source-5.14.21-150400.24.170.1.noarch",
            "SUSE Manager Proxy 4.3:kernel-syms-5.14.21-150400.24.170.1.x86_64",
            "SUSE Manager Server 4.3:kernel-default-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Manager Server 4.3:kernel-default-5.14.21-150400.24.170.2.s390x",
            "SUSE Manager Server 4.3:kernel-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Manager Server 4.3:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.ppc64le",
            "SUSE Manager Server 4.3:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
            "SUSE Manager Server 4.3:kernel-default-devel-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Manager Server 4.3:kernel-default-devel-5.14.21-150400.24.170.2.s390x",
            "SUSE Manager Server 4.3:kernel-default-devel-5.14.21-150400.24.170.2.x86_64",
            "SUSE Manager Server 4.3:kernel-devel-5.14.21-150400.24.170.1.noarch",
            "SUSE Manager Server 4.3:kernel-macros-5.14.21-150400.24.170.1.noarch",
            "SUSE Manager Server 4.3:kernel-source-5.14.21-150400.24.170.1.noarch",
            "SUSE Manager Server 4.3:kernel-syms-5.14.21-150400.24.170.1.ppc64le",
            "SUSE Manager Server 4.3:kernel-syms-5.14.21-150400.24.170.1.s390x",
            "SUSE Manager Server 4.3:kernel-syms-5.14.21-150400.24.170.1.x86_64",
            "SUSE Manager Server 4.3:kernel-zfcpdump-5.14.21-150400.24.170.2.s390x"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 5.5,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
            "version": "3.1"
          },
          "products": [
            "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-64kb-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-64kb-devel-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-devel-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-devel-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-devel-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-docs-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-macros-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-obs-build-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-obs-build-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-source-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-syms-5.14.21-150400.24.170.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-syms-5.14.21-150400.24.170.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:reiserfs-kmp-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:reiserfs-kmp-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-64kb-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-64kb-devel-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-devel-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-docs-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-macros-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-source-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.170.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.170.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_170-default-1-150400.9.3.2.ppc64le",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_170-default-1-150400.9.3.2.s390x",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_170-default-1-150400.9.3.2.x86_64",
            "SUSE Linux Enterprise Micro 5.3:kernel-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise Micro 5.3:kernel-default-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise Micro 5.3:kernel-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Micro 5.3:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.aarch64",
            "SUSE Linux Enterprise Micro 5.3:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
            "SUSE Linux Enterprise Micro 5.4:kernel-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise Micro 5.4:kernel-default-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise Micro 5.4:kernel-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Micro 5.4:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.aarch64",
            "SUSE Linux Enterprise Micro 5.4:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-64kb-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-64kb-devel-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.aarch64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.ppc64le",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-devel-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-docs-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-macros-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-source-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.170.1.aarch64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.170.1.ppc64le",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.170.1.s390x",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.170.1.x86_64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-zfcpdump-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-devel-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-devel-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-devel-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-docs-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-macros-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-obs-build-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-obs-build-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-source-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-syms-5.14.21-150400.24.170.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-syms-5.14.21-150400.24.170.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Manager Proxy 4.3:kernel-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Manager Proxy 4.3:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
            "SUSE Manager Proxy 4.3:kernel-default-devel-5.14.21-150400.24.170.2.x86_64",
            "SUSE Manager Proxy 4.3:kernel-devel-5.14.21-150400.24.170.1.noarch",
            "SUSE Manager Proxy 4.3:kernel-macros-5.14.21-150400.24.170.1.noarch",
            "SUSE Manager Proxy 4.3:kernel-source-5.14.21-150400.24.170.1.noarch",
            "SUSE Manager Proxy 4.3:kernel-syms-5.14.21-150400.24.170.1.x86_64",
            "SUSE Manager Server 4.3:kernel-default-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Manager Server 4.3:kernel-default-5.14.21-150400.24.170.2.s390x",
            "SUSE Manager Server 4.3:kernel-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Manager Server 4.3:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.ppc64le",
            "SUSE Manager Server 4.3:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
            "SUSE Manager Server 4.3:kernel-default-devel-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Manager Server 4.3:kernel-default-devel-5.14.21-150400.24.170.2.s390x",
            "SUSE Manager Server 4.3:kernel-default-devel-5.14.21-150400.24.170.2.x86_64",
            "SUSE Manager Server 4.3:kernel-devel-5.14.21-150400.24.170.1.noarch",
            "SUSE Manager Server 4.3:kernel-macros-5.14.21-150400.24.170.1.noarch",
            "SUSE Manager Server 4.3:kernel-source-5.14.21-150400.24.170.1.noarch",
            "SUSE Manager Server 4.3:kernel-syms-5.14.21-150400.24.170.1.ppc64le",
            "SUSE Manager Server 4.3:kernel-syms-5.14.21-150400.24.170.1.s390x",
            "SUSE Manager Server 4.3:kernel-syms-5.14.21-150400.24.170.1.x86_64",
            "SUSE Manager Server 4.3:kernel-zfcpdump-5.14.21-150400.24.170.2.s390x"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2025-07-28T15:09:33Z",
          "details": "moderate"
        }
      ],
      "title": "CVE-2022-49952"
    },
    {
      "cve": "CVE-2022-49954",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2022-49954"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "In the Linux kernel, the following vulnerability has been resolved:\n\nInput: iforce - wake up after clearing IFORCE_XMIT_RUNNING flag\n\nsyzbot is reporting hung task at __input_unregister_device() [1], for\niforce_close() waiting at wait_event_interruptible() with dev-\u003emutex held\nis blocking input_disconnect_device() from __input_unregister_device().\n\nIt seems that the cause is simply that commit c2b27ef672992a20 (\"Input:\niforce - wait for command completion when closing the device\") forgot to\ncall wake_up() after clear_bit().\n\nFix this problem by introducing a helper that calls clear_bit() followed\nby wake_up_all().",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.170.2.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.170.2.s390x",
          "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.170.2.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.170.2.s390x",
          "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.170.2.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.170.2.s390x",
          "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.170.2.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.170.2.s390x",
          "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-64kb-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-64kb-devel-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-devel-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-devel-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-devel-5.14.21-150400.24.170.1.noarch",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-docs-5.14.21-150400.24.170.1.noarch",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-macros-5.14.21-150400.24.170.1.noarch",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-obs-build-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-obs-build-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-source-5.14.21-150400.24.170.1.noarch",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-syms-5.14.21-150400.24.170.1.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-syms-5.14.21-150400.24.170.1.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:reiserfs-kmp-default-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:reiserfs-kmp-default-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-64kb-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-64kb-devel-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-devel-5.14.21-150400.24.170.1.noarch",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-docs-5.14.21-150400.24.170.1.noarch",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-macros-5.14.21-150400.24.170.1.noarch",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-source-5.14.21-150400.24.170.1.noarch",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.170.1.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.170.1.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.170.2.ppc64le",
          "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.170.2.s390x",
          "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.170.2.ppc64le",
          "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.170.2.s390x",
          "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_170-default-1-150400.9.3.2.ppc64le",
          "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_170-default-1-150400.9.3.2.s390x",
          "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_170-default-1-150400.9.3.2.x86_64",
          "SUSE Linux Enterprise Micro 5.3:kernel-default-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise Micro 5.3:kernel-default-5.14.21-150400.24.170.2.s390x",
          "SUSE Linux Enterprise Micro 5.3:kernel-default-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise Micro 5.3:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.aarch64",
          "SUSE Linux Enterprise Micro 5.3:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
          "SUSE Linux Enterprise Micro 5.4:kernel-default-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise Micro 5.4:kernel-default-5.14.21-150400.24.170.2.s390x",
          "SUSE Linux Enterprise Micro 5.4:kernel-default-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise Micro 5.4:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.aarch64",
          "SUSE Linux Enterprise Micro 5.4:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-64kb-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-64kb-devel-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-5.14.21-150400.24.170.2.ppc64le",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-5.14.21-150400.24.170.2.s390x",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.aarch64",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.ppc64le",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.170.2.ppc64le",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.170.2.s390x",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-devel-5.14.21-150400.24.170.1.noarch",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-docs-5.14.21-150400.24.170.1.noarch",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-macros-5.14.21-150400.24.170.1.noarch",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.170.2.ppc64le",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.170.2.s390x",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-source-5.14.21-150400.24.170.1.noarch",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.170.1.aarch64",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.170.1.ppc64le",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.170.1.s390x",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.170.1.x86_64",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-zfcpdump-5.14.21-150400.24.170.2.s390x",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.170.2.ppc64le",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.170.2.s390x",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-5.14.21-150400.24.170.2.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-devel-5.14.21-150400.24.170.2.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-devel-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-devel-5.14.21-150400.24.170.1.noarch",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-docs-5.14.21-150400.24.170.1.noarch",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-macros-5.14.21-150400.24.170.1.noarch",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-obs-build-5.14.21-150400.24.170.2.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-obs-build-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-source-5.14.21-150400.24.170.1.noarch",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-syms-5.14.21-150400.24.170.1.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-syms-5.14.21-150400.24.170.1.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.170.2.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.170.2.x86_64",
          "SUSE Manager Proxy 4.3:kernel-default-5.14.21-150400.24.170.2.x86_64",
          "SUSE Manager Proxy 4.3:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
          "SUSE Manager Proxy 4.3:kernel-default-devel-5.14.21-150400.24.170.2.x86_64",
          "SUSE Manager Proxy 4.3:kernel-devel-5.14.21-150400.24.170.1.noarch",
          "SUSE Manager Proxy 4.3:kernel-macros-5.14.21-150400.24.170.1.noarch",
          "SUSE Manager Proxy 4.3:kernel-source-5.14.21-150400.24.170.1.noarch",
          "SUSE Manager Proxy 4.3:kernel-syms-5.14.21-150400.24.170.1.x86_64",
          "SUSE Manager Server 4.3:kernel-default-5.14.21-150400.24.170.2.ppc64le",
          "SUSE Manager Server 4.3:kernel-default-5.14.21-150400.24.170.2.s390x",
          "SUSE Manager Server 4.3:kernel-default-5.14.21-150400.24.170.2.x86_64",
          "SUSE Manager Server 4.3:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.ppc64le",
          "SUSE Manager Server 4.3:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
          "SUSE Manager Server 4.3:kernel-default-devel-5.14.21-150400.24.170.2.ppc64le",
          "SUSE Manager Server 4.3:kernel-default-devel-5.14.21-150400.24.170.2.s390x",
          "SUSE Manager Server 4.3:kernel-default-devel-5.14.21-150400.24.170.2.x86_64",
          "SUSE Manager Server 4.3:kernel-devel-5.14.21-150400.24.170.1.noarch",
          "SUSE Manager Server 4.3:kernel-macros-5.14.21-150400.24.170.1.noarch",
          "SUSE Manager Server 4.3:kernel-source-5.14.21-150400.24.170.1.noarch",
          "SUSE Manager Server 4.3:kernel-syms-5.14.21-150400.24.170.1.ppc64le",
          "SUSE Manager Server 4.3:kernel-syms-5.14.21-150400.24.170.1.s390x",
          "SUSE Manager Server 4.3:kernel-syms-5.14.21-150400.24.170.1.x86_64",
          "SUSE Manager Server 4.3:kernel-zfcpdump-5.14.21-150400.24.170.2.s390x"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2022-49954",
          "url": "https://www.suse.com/security/cve/CVE-2022-49954"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1244976 for CVE-2022-49954",
          "url": "https://bugzilla.suse.com/1244976"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-64kb-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-64kb-devel-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-devel-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-devel-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-devel-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-docs-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-macros-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-obs-build-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-obs-build-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-source-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-syms-5.14.21-150400.24.170.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-syms-5.14.21-150400.24.170.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:reiserfs-kmp-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:reiserfs-kmp-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-64kb-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-64kb-devel-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-devel-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-docs-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-macros-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-source-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.170.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.170.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_170-default-1-150400.9.3.2.ppc64le",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_170-default-1-150400.9.3.2.s390x",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_170-default-1-150400.9.3.2.x86_64",
            "SUSE Linux Enterprise Micro 5.3:kernel-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise Micro 5.3:kernel-default-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise Micro 5.3:kernel-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Micro 5.3:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.aarch64",
            "SUSE Linux Enterprise Micro 5.3:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
            "SUSE Linux Enterprise Micro 5.4:kernel-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise Micro 5.4:kernel-default-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise Micro 5.4:kernel-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Micro 5.4:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.aarch64",
            "SUSE Linux Enterprise Micro 5.4:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-64kb-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-64kb-devel-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.aarch64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.ppc64le",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-devel-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-docs-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-macros-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-source-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.170.1.aarch64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.170.1.ppc64le",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.170.1.s390x",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.170.1.x86_64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-zfcpdump-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-devel-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-devel-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-devel-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-docs-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-macros-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-obs-build-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-obs-build-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-source-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-syms-5.14.21-150400.24.170.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-syms-5.14.21-150400.24.170.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Manager Proxy 4.3:kernel-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Manager Proxy 4.3:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
            "SUSE Manager Proxy 4.3:kernel-default-devel-5.14.21-150400.24.170.2.x86_64",
            "SUSE Manager Proxy 4.3:kernel-devel-5.14.21-150400.24.170.1.noarch",
            "SUSE Manager Proxy 4.3:kernel-macros-5.14.21-150400.24.170.1.noarch",
            "SUSE Manager Proxy 4.3:kernel-source-5.14.21-150400.24.170.1.noarch",
            "SUSE Manager Proxy 4.3:kernel-syms-5.14.21-150400.24.170.1.x86_64",
            "SUSE Manager Server 4.3:kernel-default-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Manager Server 4.3:kernel-default-5.14.21-150400.24.170.2.s390x",
            "SUSE Manager Server 4.3:kernel-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Manager Server 4.3:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.ppc64le",
            "SUSE Manager Server 4.3:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
            "SUSE Manager Server 4.3:kernel-default-devel-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Manager Server 4.3:kernel-default-devel-5.14.21-150400.24.170.2.s390x",
            "SUSE Manager Server 4.3:kernel-default-devel-5.14.21-150400.24.170.2.x86_64",
            "SUSE Manager Server 4.3:kernel-devel-5.14.21-150400.24.170.1.noarch",
            "SUSE Manager Server 4.3:kernel-macros-5.14.21-150400.24.170.1.noarch",
            "SUSE Manager Server 4.3:kernel-source-5.14.21-150400.24.170.1.noarch",
            "SUSE Manager Server 4.3:kernel-syms-5.14.21-150400.24.170.1.ppc64le",
            "SUSE Manager Server 4.3:kernel-syms-5.14.21-150400.24.170.1.s390x",
            "SUSE Manager Server 4.3:kernel-syms-5.14.21-150400.24.170.1.x86_64",
            "SUSE Manager Server 4.3:kernel-zfcpdump-5.14.21-150400.24.170.2.s390x"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 5.5,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
            "version": "3.1"
          },
          "products": [
            "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-64kb-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-64kb-devel-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-devel-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-devel-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-devel-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-docs-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-macros-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-obs-build-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-obs-build-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-source-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-syms-5.14.21-150400.24.170.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-syms-5.14.21-150400.24.170.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:reiserfs-kmp-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:reiserfs-kmp-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-64kb-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-64kb-devel-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-devel-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-docs-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-macros-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-source-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.170.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.170.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_170-default-1-150400.9.3.2.ppc64le",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_170-default-1-150400.9.3.2.s390x",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_170-default-1-150400.9.3.2.x86_64",
            "SUSE Linux Enterprise Micro 5.3:kernel-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise Micro 5.3:kernel-default-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise Micro 5.3:kernel-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Micro 5.3:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.aarch64",
            "SUSE Linux Enterprise Micro 5.3:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
            "SUSE Linux Enterprise Micro 5.4:kernel-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise Micro 5.4:kernel-default-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise Micro 5.4:kernel-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Micro 5.4:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.aarch64",
            "SUSE Linux Enterprise Micro 5.4:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-64kb-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-64kb-devel-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.aarch64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.ppc64le",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-devel-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-docs-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-macros-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-source-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.170.1.aarch64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.170.1.ppc64le",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.170.1.s390x",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.170.1.x86_64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-zfcpdump-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-devel-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-devel-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-devel-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-docs-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-macros-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-obs-build-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-obs-build-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-source-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-syms-5.14.21-150400.24.170.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-syms-5.14.21-150400.24.170.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Manager Proxy 4.3:kernel-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Manager Proxy 4.3:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
            "SUSE Manager Proxy 4.3:kernel-default-devel-5.14.21-150400.24.170.2.x86_64",
            "SUSE Manager Proxy 4.3:kernel-devel-5.14.21-150400.24.170.1.noarch",
            "SUSE Manager Proxy 4.3:kernel-macros-5.14.21-150400.24.170.1.noarch",
            "SUSE Manager Proxy 4.3:kernel-source-5.14.21-150400.24.170.1.noarch",
            "SUSE Manager Proxy 4.3:kernel-syms-5.14.21-150400.24.170.1.x86_64",
            "SUSE Manager Server 4.3:kernel-default-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Manager Server 4.3:kernel-default-5.14.21-150400.24.170.2.s390x",
            "SUSE Manager Server 4.3:kernel-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Manager Server 4.3:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.ppc64le",
            "SUSE Manager Server 4.3:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
            "SUSE Manager Server 4.3:kernel-default-devel-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Manager Server 4.3:kernel-default-devel-5.14.21-150400.24.170.2.s390x",
            "SUSE Manager Server 4.3:kernel-default-devel-5.14.21-150400.24.170.2.x86_64",
            "SUSE Manager Server 4.3:kernel-devel-5.14.21-150400.24.170.1.noarch",
            "SUSE Manager Server 4.3:kernel-macros-5.14.21-150400.24.170.1.noarch",
            "SUSE Manager Server 4.3:kernel-source-5.14.21-150400.24.170.1.noarch",
            "SUSE Manager Server 4.3:kernel-syms-5.14.21-150400.24.170.1.ppc64le",
            "SUSE Manager Server 4.3:kernel-syms-5.14.21-150400.24.170.1.s390x",
            "SUSE Manager Server 4.3:kernel-syms-5.14.21-150400.24.170.1.x86_64",
            "SUSE Manager Server 4.3:kernel-zfcpdump-5.14.21-150400.24.170.2.s390x"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2025-07-28T15:09:33Z",
          "details": "moderate"
        }
      ],
      "title": "CVE-2022-49954"
    },
    {
      "cve": "CVE-2022-49956",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2022-49956"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "In the Linux kernel, the following vulnerability has been resolved:\n\nstaging: rtl8712: fix use after free bugs\n\n_Read/Write_MACREG callbacks are NULL so the read/write_macreg_hdl()\nfunctions don\u0027t do anything except free the \"pcmd\" pointer.  It\nresults in a use after free.  Delete them.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.170.2.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.170.2.s390x",
          "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.170.2.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.170.2.s390x",
          "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.170.2.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.170.2.s390x",
          "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.170.2.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.170.2.s390x",
          "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-64kb-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-64kb-devel-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-devel-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-devel-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-devel-5.14.21-150400.24.170.1.noarch",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-docs-5.14.21-150400.24.170.1.noarch",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-macros-5.14.21-150400.24.170.1.noarch",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-obs-build-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-obs-build-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-source-5.14.21-150400.24.170.1.noarch",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-syms-5.14.21-150400.24.170.1.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-syms-5.14.21-150400.24.170.1.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:reiserfs-kmp-default-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:reiserfs-kmp-default-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-64kb-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-64kb-devel-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-devel-5.14.21-150400.24.170.1.noarch",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-docs-5.14.21-150400.24.170.1.noarch",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-macros-5.14.21-150400.24.170.1.noarch",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-source-5.14.21-150400.24.170.1.noarch",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.170.1.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.170.1.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.170.2.ppc64le",
          "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.170.2.s390x",
          "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.170.2.ppc64le",
          "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.170.2.s390x",
          "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_170-default-1-150400.9.3.2.ppc64le",
          "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_170-default-1-150400.9.3.2.s390x",
          "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_170-default-1-150400.9.3.2.x86_64",
          "SUSE Linux Enterprise Micro 5.3:kernel-default-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise Micro 5.3:kernel-default-5.14.21-150400.24.170.2.s390x",
          "SUSE Linux Enterprise Micro 5.3:kernel-default-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise Micro 5.3:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.aarch64",
          "SUSE Linux Enterprise Micro 5.3:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
          "SUSE Linux Enterprise Micro 5.4:kernel-default-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise Micro 5.4:kernel-default-5.14.21-150400.24.170.2.s390x",
          "SUSE Linux Enterprise Micro 5.4:kernel-default-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise Micro 5.4:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.aarch64",
          "SUSE Linux Enterprise Micro 5.4:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-64kb-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-64kb-devel-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-5.14.21-150400.24.170.2.ppc64le",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-5.14.21-150400.24.170.2.s390x",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.aarch64",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.ppc64le",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.170.2.ppc64le",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.170.2.s390x",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-devel-5.14.21-150400.24.170.1.noarch",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-docs-5.14.21-150400.24.170.1.noarch",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-macros-5.14.21-150400.24.170.1.noarch",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.170.2.ppc64le",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.170.2.s390x",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-source-5.14.21-150400.24.170.1.noarch",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.170.1.aarch64",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.170.1.ppc64le",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.170.1.s390x",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.170.1.x86_64",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-zfcpdump-5.14.21-150400.24.170.2.s390x",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.170.2.ppc64le",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.170.2.s390x",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-5.14.21-150400.24.170.2.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-devel-5.14.21-150400.24.170.2.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-devel-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-devel-5.14.21-150400.24.170.1.noarch",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-docs-5.14.21-150400.24.170.1.noarch",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-macros-5.14.21-150400.24.170.1.noarch",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-obs-build-5.14.21-150400.24.170.2.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-obs-build-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-source-5.14.21-150400.24.170.1.noarch",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-syms-5.14.21-150400.24.170.1.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-syms-5.14.21-150400.24.170.1.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.170.2.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.170.2.x86_64",
          "SUSE Manager Proxy 4.3:kernel-default-5.14.21-150400.24.170.2.x86_64",
          "SUSE Manager Proxy 4.3:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
          "SUSE Manager Proxy 4.3:kernel-default-devel-5.14.21-150400.24.170.2.x86_64",
          "SUSE Manager Proxy 4.3:kernel-devel-5.14.21-150400.24.170.1.noarch",
          "SUSE Manager Proxy 4.3:kernel-macros-5.14.21-150400.24.170.1.noarch",
          "SUSE Manager Proxy 4.3:kernel-source-5.14.21-150400.24.170.1.noarch",
          "SUSE Manager Proxy 4.3:kernel-syms-5.14.21-150400.24.170.1.x86_64",
          "SUSE Manager Server 4.3:kernel-default-5.14.21-150400.24.170.2.ppc64le",
          "SUSE Manager Server 4.3:kernel-default-5.14.21-150400.24.170.2.s390x",
          "SUSE Manager Server 4.3:kernel-default-5.14.21-150400.24.170.2.x86_64",
          "SUSE Manager Server 4.3:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.ppc64le",
          "SUSE Manager Server 4.3:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
          "SUSE Manager Server 4.3:kernel-default-devel-5.14.21-150400.24.170.2.ppc64le",
          "SUSE Manager Server 4.3:kernel-default-devel-5.14.21-150400.24.170.2.s390x",
          "SUSE Manager Server 4.3:kernel-default-devel-5.14.21-150400.24.170.2.x86_64",
          "SUSE Manager Server 4.3:kernel-devel-5.14.21-150400.24.170.1.noarch",
          "SUSE Manager Server 4.3:kernel-macros-5.14.21-150400.24.170.1.noarch",
          "SUSE Manager Server 4.3:kernel-source-5.14.21-150400.24.170.1.noarch",
          "SUSE Manager Server 4.3:kernel-syms-5.14.21-150400.24.170.1.ppc64le",
          "SUSE Manager Server 4.3:kernel-syms-5.14.21-150400.24.170.1.s390x",
          "SUSE Manager Server 4.3:kernel-syms-5.14.21-150400.24.170.1.x86_64",
          "SUSE Manager Server 4.3:kernel-zfcpdump-5.14.21-150400.24.170.2.s390x"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2022-49956",
          "url": "https://www.suse.com/security/cve/CVE-2022-49956"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1244969 for CVE-2022-49956",
          "url": "https://bugzilla.suse.com/1244969"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-64kb-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-64kb-devel-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-devel-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-devel-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-devel-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-docs-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-macros-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-obs-build-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-obs-build-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-source-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-syms-5.14.21-150400.24.170.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-syms-5.14.21-150400.24.170.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:reiserfs-kmp-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:reiserfs-kmp-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-64kb-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-64kb-devel-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-devel-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-docs-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-macros-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-source-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.170.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.170.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_170-default-1-150400.9.3.2.ppc64le",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_170-default-1-150400.9.3.2.s390x",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_170-default-1-150400.9.3.2.x86_64",
            "SUSE Linux Enterprise Micro 5.3:kernel-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise Micro 5.3:kernel-default-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise Micro 5.3:kernel-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Micro 5.3:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.aarch64",
            "SUSE Linux Enterprise Micro 5.3:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
            "SUSE Linux Enterprise Micro 5.4:kernel-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise Micro 5.4:kernel-default-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise Micro 5.4:kernel-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Micro 5.4:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.aarch64",
            "SUSE Linux Enterprise Micro 5.4:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-64kb-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-64kb-devel-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.aarch64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.ppc64le",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-devel-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-docs-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-macros-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-source-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.170.1.aarch64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.170.1.ppc64le",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.170.1.s390x",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.170.1.x86_64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-zfcpdump-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-devel-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-devel-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-devel-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-docs-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-macros-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-obs-build-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-obs-build-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-source-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-syms-5.14.21-150400.24.170.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-syms-5.14.21-150400.24.170.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Manager Proxy 4.3:kernel-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Manager Proxy 4.3:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
            "SUSE Manager Proxy 4.3:kernel-default-devel-5.14.21-150400.24.170.2.x86_64",
            "SUSE Manager Proxy 4.3:kernel-devel-5.14.21-150400.24.170.1.noarch",
            "SUSE Manager Proxy 4.3:kernel-macros-5.14.21-150400.24.170.1.noarch",
            "SUSE Manager Proxy 4.3:kernel-source-5.14.21-150400.24.170.1.noarch",
            "SUSE Manager Proxy 4.3:kernel-syms-5.14.21-150400.24.170.1.x86_64",
            "SUSE Manager Server 4.3:kernel-default-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Manager Server 4.3:kernel-default-5.14.21-150400.24.170.2.s390x",
            "SUSE Manager Server 4.3:kernel-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Manager Server 4.3:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.ppc64le",
            "SUSE Manager Server 4.3:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
            "SUSE Manager Server 4.3:kernel-default-devel-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Manager Server 4.3:kernel-default-devel-5.14.21-150400.24.170.2.s390x",
            "SUSE Manager Server 4.3:kernel-default-devel-5.14.21-150400.24.170.2.x86_64",
            "SUSE Manager Server 4.3:kernel-devel-5.14.21-150400.24.170.1.noarch",
            "SUSE Manager Server 4.3:kernel-macros-5.14.21-150400.24.170.1.noarch",
            "SUSE Manager Server 4.3:kernel-source-5.14.21-150400.24.170.1.noarch",
            "SUSE Manager Server 4.3:kernel-syms-5.14.21-150400.24.170.1.ppc64le",
            "SUSE Manager Server 4.3:kernel-syms-5.14.21-150400.24.170.1.s390x",
            "SUSE Manager Server 4.3:kernel-syms-5.14.21-150400.24.170.1.x86_64",
            "SUSE Manager Server 4.3:kernel-zfcpdump-5.14.21-150400.24.170.2.s390x"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 5.5,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
            "version": "3.1"
          },
          "products": [
            "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-64kb-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-64kb-devel-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-devel-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-devel-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-devel-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-docs-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-macros-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-obs-build-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-obs-build-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-source-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-syms-5.14.21-150400.24.170.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-syms-5.14.21-150400.24.170.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:reiserfs-kmp-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:reiserfs-kmp-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-64kb-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-64kb-devel-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-devel-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-docs-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-macros-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-source-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.170.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.170.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_170-default-1-150400.9.3.2.ppc64le",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_170-default-1-150400.9.3.2.s390x",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_170-default-1-150400.9.3.2.x86_64",
            "SUSE Linux Enterprise Micro 5.3:kernel-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise Micro 5.3:kernel-default-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise Micro 5.3:kernel-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Micro 5.3:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.aarch64",
            "SUSE Linux Enterprise Micro 5.3:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
            "SUSE Linux Enterprise Micro 5.4:kernel-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise Micro 5.4:kernel-default-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise Micro 5.4:kernel-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Micro 5.4:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.aarch64",
            "SUSE Linux Enterprise Micro 5.4:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-64kb-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-64kb-devel-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.aarch64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.ppc64le",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-devel-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-docs-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-macros-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-source-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.170.1.aarch64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.170.1.ppc64le",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.170.1.s390x",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.170.1.x86_64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-zfcpdump-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-devel-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-devel-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-devel-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-docs-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-macros-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-obs-build-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-obs-build-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-source-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-syms-5.14.21-150400.24.170.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-syms-5.14.21-150400.24.170.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Manager Proxy 4.3:kernel-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Manager Proxy 4.3:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
            "SUSE Manager Proxy 4.3:kernel-default-devel-5.14.21-150400.24.170.2.x86_64",
            "SUSE Manager Proxy 4.3:kernel-devel-5.14.21-150400.24.170.1.noarch",
            "SUSE Manager Proxy 4.3:kernel-macros-5.14.21-150400.24.170.1.noarch",
            "SUSE Manager Proxy 4.3:kernel-source-5.14.21-150400.24.170.1.noarch",
            "SUSE Manager Proxy 4.3:kernel-syms-5.14.21-150400.24.170.1.x86_64",
            "SUSE Manager Server 4.3:kernel-default-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Manager Server 4.3:kernel-default-5.14.21-150400.24.170.2.s390x",
            "SUSE Manager Server 4.3:kernel-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Manager Server 4.3:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.ppc64le",
            "SUSE Manager Server 4.3:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
            "SUSE Manager Server 4.3:kernel-default-devel-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Manager Server 4.3:kernel-default-devel-5.14.21-150400.24.170.2.s390x",
            "SUSE Manager Server 4.3:kernel-default-devel-5.14.21-150400.24.170.2.x86_64",
            "SUSE Manager Server 4.3:kernel-devel-5.14.21-150400.24.170.1.noarch",
            "SUSE Manager Server 4.3:kernel-macros-5.14.21-150400.24.170.1.noarch",
            "SUSE Manager Server 4.3:kernel-source-5.14.21-150400.24.170.1.noarch",
            "SUSE Manager Server 4.3:kernel-syms-5.14.21-150400.24.170.1.ppc64le",
            "SUSE Manager Server 4.3:kernel-syms-5.14.21-150400.24.170.1.s390x",
            "SUSE Manager Server 4.3:kernel-syms-5.14.21-150400.24.170.1.x86_64",
            "SUSE Manager Server 4.3:kernel-zfcpdump-5.14.21-150400.24.170.2.s390x"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2025-07-28T15:09:33Z",
          "details": "moderate"
        }
      ],
      "title": "CVE-2022-49956"
    },
    {
      "cve": "CVE-2022-49957",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2022-49957"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "In the Linux kernel, the following vulnerability has been resolved:\n\nkcm: fix strp_init() order and cleanup\n\nstrp_init() is called just a few lines above this csk-\u003esk_user_data\ncheck, it also initializes strp-\u003ework etc., therefore, it is\nunnecessary to call strp_done() to cancel the freshly initialized\nwork.\n\nAnd if sk_user_data is already used by KCM, psock-\u003estrp should not be\ntouched, particularly strp-\u003ework state, so we need to move strp_init()\nafter the csk-\u003esk_user_data check.\n\nThis also makes a lockdep warning reported by syzbot go away.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.170.2.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.170.2.s390x",
          "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.170.2.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.170.2.s390x",
          "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.170.2.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.170.2.s390x",
          "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.170.2.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.170.2.s390x",
          "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-64kb-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-64kb-devel-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-devel-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-devel-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-devel-5.14.21-150400.24.170.1.noarch",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-docs-5.14.21-150400.24.170.1.noarch",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-macros-5.14.21-150400.24.170.1.noarch",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-obs-build-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-obs-build-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-source-5.14.21-150400.24.170.1.noarch",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-syms-5.14.21-150400.24.170.1.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-syms-5.14.21-150400.24.170.1.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:reiserfs-kmp-default-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:reiserfs-kmp-default-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-64kb-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-64kb-devel-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-devel-5.14.21-150400.24.170.1.noarch",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-docs-5.14.21-150400.24.170.1.noarch",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-macros-5.14.21-150400.24.170.1.noarch",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-source-5.14.21-150400.24.170.1.noarch",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.170.1.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.170.1.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.170.2.ppc64le",
          "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.170.2.s390x",
          "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.170.2.ppc64le",
          "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.170.2.s390x",
          "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_170-default-1-150400.9.3.2.ppc64le",
          "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_170-default-1-150400.9.3.2.s390x",
          "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_170-default-1-150400.9.3.2.x86_64",
          "SUSE Linux Enterprise Micro 5.3:kernel-default-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise Micro 5.3:kernel-default-5.14.21-150400.24.170.2.s390x",
          "SUSE Linux Enterprise Micro 5.3:kernel-default-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise Micro 5.3:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.aarch64",
          "SUSE Linux Enterprise Micro 5.3:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
          "SUSE Linux Enterprise Micro 5.4:kernel-default-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise Micro 5.4:kernel-default-5.14.21-150400.24.170.2.s390x",
          "SUSE Linux Enterprise Micro 5.4:kernel-default-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise Micro 5.4:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.aarch64",
          "SUSE Linux Enterprise Micro 5.4:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-64kb-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-64kb-devel-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-5.14.21-150400.24.170.2.ppc64le",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-5.14.21-150400.24.170.2.s390x",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.aarch64",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.ppc64le",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.170.2.ppc64le",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.170.2.s390x",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-devel-5.14.21-150400.24.170.1.noarch",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-docs-5.14.21-150400.24.170.1.noarch",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-macros-5.14.21-150400.24.170.1.noarch",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.170.2.ppc64le",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.170.2.s390x",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-source-5.14.21-150400.24.170.1.noarch",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.170.1.aarch64",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.170.1.ppc64le",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.170.1.s390x",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.170.1.x86_64",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-zfcpdump-5.14.21-150400.24.170.2.s390x",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.170.2.ppc64le",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.170.2.s390x",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-5.14.21-150400.24.170.2.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-devel-5.14.21-150400.24.170.2.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-devel-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-devel-5.14.21-150400.24.170.1.noarch",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-docs-5.14.21-150400.24.170.1.noarch",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-macros-5.14.21-150400.24.170.1.noarch",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-obs-build-5.14.21-150400.24.170.2.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-obs-build-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-source-5.14.21-150400.24.170.1.noarch",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-syms-5.14.21-150400.24.170.1.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-syms-5.14.21-150400.24.170.1.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.170.2.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.170.2.x86_64",
          "SUSE Manager Proxy 4.3:kernel-default-5.14.21-150400.24.170.2.x86_64",
          "SUSE Manager Proxy 4.3:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
          "SUSE Manager Proxy 4.3:kernel-default-devel-5.14.21-150400.24.170.2.x86_64",
          "SUSE Manager Proxy 4.3:kernel-devel-5.14.21-150400.24.170.1.noarch",
          "SUSE Manager Proxy 4.3:kernel-macros-5.14.21-150400.24.170.1.noarch",
          "SUSE Manager Proxy 4.3:kernel-source-5.14.21-150400.24.170.1.noarch",
          "SUSE Manager Proxy 4.3:kernel-syms-5.14.21-150400.24.170.1.x86_64",
          "SUSE Manager Server 4.3:kernel-default-5.14.21-150400.24.170.2.ppc64le",
          "SUSE Manager Server 4.3:kernel-default-5.14.21-150400.24.170.2.s390x",
          "SUSE Manager Server 4.3:kernel-default-5.14.21-150400.24.170.2.x86_64",
          "SUSE Manager Server 4.3:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.ppc64le",
          "SUSE Manager Server 4.3:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
          "SUSE Manager Server 4.3:kernel-default-devel-5.14.21-150400.24.170.2.ppc64le",
          "SUSE Manager Server 4.3:kernel-default-devel-5.14.21-150400.24.170.2.s390x",
          "SUSE Manager Server 4.3:kernel-default-devel-5.14.21-150400.24.170.2.x86_64",
          "SUSE Manager Server 4.3:kernel-devel-5.14.21-150400.24.170.1.noarch",
          "SUSE Manager Server 4.3:kernel-macros-5.14.21-150400.24.170.1.noarch",
          "SUSE Manager Server 4.3:kernel-source-5.14.21-150400.24.170.1.noarch",
          "SUSE Manager Server 4.3:kernel-syms-5.14.21-150400.24.170.1.ppc64le",
          "SUSE Manager Server 4.3:kernel-syms-5.14.21-150400.24.170.1.s390x",
          "SUSE Manager Server 4.3:kernel-syms-5.14.21-150400.24.170.1.x86_64",
          "SUSE Manager Server 4.3:kernel-zfcpdump-5.14.21-150400.24.170.2.s390x"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2022-49957",
          "url": "https://www.suse.com/security/cve/CVE-2022-49957"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1244966 for CVE-2022-49957",
          "url": "https://bugzilla.suse.com/1244966"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-64kb-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-64kb-devel-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-devel-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-devel-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-devel-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-docs-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-macros-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-obs-build-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-obs-build-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-source-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-syms-5.14.21-150400.24.170.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-syms-5.14.21-150400.24.170.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:reiserfs-kmp-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:reiserfs-kmp-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-64kb-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-64kb-devel-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-devel-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-docs-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-macros-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-source-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.170.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.170.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_170-default-1-150400.9.3.2.ppc64le",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_170-default-1-150400.9.3.2.s390x",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_170-default-1-150400.9.3.2.x86_64",
            "SUSE Linux Enterprise Micro 5.3:kernel-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise Micro 5.3:kernel-default-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise Micro 5.3:kernel-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Micro 5.3:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.aarch64",
            "SUSE Linux Enterprise Micro 5.3:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
            "SUSE Linux Enterprise Micro 5.4:kernel-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise Micro 5.4:kernel-default-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise Micro 5.4:kernel-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Micro 5.4:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.aarch64",
            "SUSE Linux Enterprise Micro 5.4:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-64kb-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-64kb-devel-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.aarch64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.ppc64le",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-devel-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-docs-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-macros-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-source-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.170.1.aarch64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.170.1.ppc64le",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.170.1.s390x",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.170.1.x86_64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-zfcpdump-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-devel-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-devel-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-devel-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-docs-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-macros-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-obs-build-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-obs-build-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-source-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-syms-5.14.21-150400.24.170.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-syms-5.14.21-150400.24.170.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Manager Proxy 4.3:kernel-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Manager Proxy 4.3:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
            "SUSE Manager Proxy 4.3:kernel-default-devel-5.14.21-150400.24.170.2.x86_64",
            "SUSE Manager Proxy 4.3:kernel-devel-5.14.21-150400.24.170.1.noarch",
            "SUSE Manager Proxy 4.3:kernel-macros-5.14.21-150400.24.170.1.noarch",
            "SUSE Manager Proxy 4.3:kernel-source-5.14.21-150400.24.170.1.noarch",
            "SUSE Manager Proxy 4.3:kernel-syms-5.14.21-150400.24.170.1.x86_64",
            "SUSE Manager Server 4.3:kernel-default-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Manager Server 4.3:kernel-default-5.14.21-150400.24.170.2.s390x",
            "SUSE Manager Server 4.3:kernel-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Manager Server 4.3:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.ppc64le",
            "SUSE Manager Server 4.3:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
            "SUSE Manager Server 4.3:kernel-default-devel-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Manager Server 4.3:kernel-default-devel-5.14.21-150400.24.170.2.s390x",
            "SUSE Manager Server 4.3:kernel-default-devel-5.14.21-150400.24.170.2.x86_64",
            "SUSE Manager Server 4.3:kernel-devel-5.14.21-150400.24.170.1.noarch",
            "SUSE Manager Server 4.3:kernel-macros-5.14.21-150400.24.170.1.noarch",
            "SUSE Manager Server 4.3:kernel-source-5.14.21-150400.24.170.1.noarch",
            "SUSE Manager Server 4.3:kernel-syms-5.14.21-150400.24.170.1.ppc64le",
            "SUSE Manager Server 4.3:kernel-syms-5.14.21-150400.24.170.1.s390x",
            "SUSE Manager Server 4.3:kernel-syms-5.14.21-150400.24.170.1.x86_64",
            "SUSE Manager Server 4.3:kernel-zfcpdump-5.14.21-150400.24.170.2.s390x"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 5.5,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
            "version": "3.1"
          },
          "products": [
            "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-64kb-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-64kb-devel-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-devel-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-devel-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-devel-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-docs-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-macros-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-obs-build-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-obs-build-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-source-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-syms-5.14.21-150400.24.170.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-syms-5.14.21-150400.24.170.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:reiserfs-kmp-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:reiserfs-kmp-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-64kb-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-64kb-devel-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-devel-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-docs-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-macros-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-source-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.170.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.170.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_170-default-1-150400.9.3.2.ppc64le",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_170-default-1-150400.9.3.2.s390x",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_170-default-1-150400.9.3.2.x86_64",
            "SUSE Linux Enterprise Micro 5.3:kernel-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise Micro 5.3:kernel-default-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise Micro 5.3:kernel-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Micro 5.3:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.aarch64",
            "SUSE Linux Enterprise Micro 5.3:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
            "SUSE Linux Enterprise Micro 5.4:kernel-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise Micro 5.4:kernel-default-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise Micro 5.4:kernel-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Micro 5.4:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.aarch64",
            "SUSE Linux Enterprise Micro 5.4:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-64kb-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-64kb-devel-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.aarch64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.ppc64le",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-devel-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-docs-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-macros-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-source-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.170.1.aarch64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.170.1.ppc64le",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.170.1.s390x",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.170.1.x86_64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-zfcpdump-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-devel-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-devel-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-devel-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-docs-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-macros-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-obs-build-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-obs-build-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-source-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-syms-5.14.21-150400.24.170.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-syms-5.14.21-150400.24.170.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Manager Proxy 4.3:kernel-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Manager Proxy 4.3:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
            "SUSE Manager Proxy 4.3:kernel-default-devel-5.14.21-150400.24.170.2.x86_64",
            "SUSE Manager Proxy 4.3:kernel-devel-5.14.21-150400.24.170.1.noarch",
            "SUSE Manager Proxy 4.3:kernel-macros-5.14.21-150400.24.170.1.noarch",
            "SUSE Manager Proxy 4.3:kernel-source-5.14.21-150400.24.170.1.noarch",
            "SUSE Manager Proxy 4.3:kernel-syms-5.14.21-150400.24.170.1.x86_64",
            "SUSE Manager Server 4.3:kernel-default-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Manager Server 4.3:kernel-default-5.14.21-150400.24.170.2.s390x",
            "SUSE Manager Server 4.3:kernel-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Manager Server 4.3:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.ppc64le",
            "SUSE Manager Server 4.3:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
            "SUSE Manager Server 4.3:kernel-default-devel-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Manager Server 4.3:kernel-default-devel-5.14.21-150400.24.170.2.s390x",
            "SUSE Manager Server 4.3:kernel-default-devel-5.14.21-150400.24.170.2.x86_64",
            "SUSE Manager Server 4.3:kernel-devel-5.14.21-150400.24.170.1.noarch",
            "SUSE Manager Server 4.3:kernel-macros-5.14.21-150400.24.170.1.noarch",
            "SUSE Manager Server 4.3:kernel-source-5.14.21-150400.24.170.1.noarch",
            "SUSE Manager Server 4.3:kernel-syms-5.14.21-150400.24.170.1.ppc64le",
            "SUSE Manager Server 4.3:kernel-syms-5.14.21-150400.24.170.1.s390x",
            "SUSE Manager Server 4.3:kernel-syms-5.14.21-150400.24.170.1.x86_64",
            "SUSE Manager Server 4.3:kernel-zfcpdump-5.14.21-150400.24.170.2.s390x"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2025-07-28T15:09:33Z",
          "details": "moderate"
        }
      ],
      "title": "CVE-2022-49957"
    },
    {
      "cve": "CVE-2022-49958",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2022-49958"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "In the Linux kernel, the following vulnerability has been resolved:\n\nnet/sched: fix netdevice reference leaks in attach_default_qdiscs()\n\nIn attach_default_qdiscs(), if a dev has multiple queues and queue 0 fails\nto attach qdisc because there is no memory in attach_one_default_qdisc().\nThen dev-\u003eqdisc will be noop_qdisc by default. But the other queues may be\nable to successfully attach to default qdisc.\n\nIn this case, the fallback to noqueue process will be triggered. If the\noriginal attached qdisc is not released and a new one is directly\nattached, this will cause netdevice reference leaks.\n\nThe following is the bug log:\n\nveth0: default qdisc (fq_codel) fail, fallback to noqueue\nunregister_netdevice: waiting for veth0 to become free. Usage count = 32\nleaked reference.\n qdisc_alloc+0x12e/0x210\n qdisc_create_dflt+0x62/0x140\n attach_one_default_qdisc.constprop.41+0x44/0x70\n dev_activate+0x128/0x290\n __dev_open+0x12a/0x190\n __dev_change_flags+0x1a2/0x1f0\n dev_change_flags+0x23/0x60\n do_setlink+0x332/0x1150\n __rtnl_newlink+0x52f/0x8e0\n rtnl_newlink+0x43/0x70\n rtnetlink_rcv_msg+0x140/0x3b0\n netlink_rcv_skb+0x50/0x100\n netlink_unicast+0x1bb/0x290\n netlink_sendmsg+0x37c/0x4e0\n sock_sendmsg+0x5f/0x70\n ____sys_sendmsg+0x208/0x280\n\nFix this bug by clearing any non-noop qdiscs that may have been assigned\nbefore trying to re-attach.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.170.2.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.170.2.s390x",
          "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.170.2.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.170.2.s390x",
          "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.170.2.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.170.2.s390x",
          "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.170.2.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.170.2.s390x",
          "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-64kb-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-64kb-devel-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-devel-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-devel-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-devel-5.14.21-150400.24.170.1.noarch",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-docs-5.14.21-150400.24.170.1.noarch",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-macros-5.14.21-150400.24.170.1.noarch",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-obs-build-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-obs-build-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-source-5.14.21-150400.24.170.1.noarch",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-syms-5.14.21-150400.24.170.1.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-syms-5.14.21-150400.24.170.1.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:reiserfs-kmp-default-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:reiserfs-kmp-default-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-64kb-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-64kb-devel-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-devel-5.14.21-150400.24.170.1.noarch",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-docs-5.14.21-150400.24.170.1.noarch",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-macros-5.14.21-150400.24.170.1.noarch",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-source-5.14.21-150400.24.170.1.noarch",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.170.1.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.170.1.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.170.2.ppc64le",
          "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.170.2.s390x",
          "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.170.2.ppc64le",
          "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.170.2.s390x",
          "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_170-default-1-150400.9.3.2.ppc64le",
          "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_170-default-1-150400.9.3.2.s390x",
          "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_170-default-1-150400.9.3.2.x86_64",
          "SUSE Linux Enterprise Micro 5.3:kernel-default-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise Micro 5.3:kernel-default-5.14.21-150400.24.170.2.s390x",
          "SUSE Linux Enterprise Micro 5.3:kernel-default-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise Micro 5.3:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.aarch64",
          "SUSE Linux Enterprise Micro 5.3:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
          "SUSE Linux Enterprise Micro 5.4:kernel-default-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise Micro 5.4:kernel-default-5.14.21-150400.24.170.2.s390x",
          "SUSE Linux Enterprise Micro 5.4:kernel-default-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise Micro 5.4:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.aarch64",
          "SUSE Linux Enterprise Micro 5.4:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-64kb-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-64kb-devel-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-5.14.21-150400.24.170.2.ppc64le",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-5.14.21-150400.24.170.2.s390x",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.aarch64",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.ppc64le",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.170.2.ppc64le",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.170.2.s390x",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-devel-5.14.21-150400.24.170.1.noarch",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-docs-5.14.21-150400.24.170.1.noarch",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-macros-5.14.21-150400.24.170.1.noarch",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.170.2.ppc64le",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.170.2.s390x",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-source-5.14.21-150400.24.170.1.noarch",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.170.1.aarch64",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.170.1.ppc64le",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.170.1.s390x",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.170.1.x86_64",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-zfcpdump-5.14.21-150400.24.170.2.s390x",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.170.2.ppc64le",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.170.2.s390x",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-5.14.21-150400.24.170.2.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-devel-5.14.21-150400.24.170.2.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-devel-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-devel-5.14.21-150400.24.170.1.noarch",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-docs-5.14.21-150400.24.170.1.noarch",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-macros-5.14.21-150400.24.170.1.noarch",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-obs-build-5.14.21-150400.24.170.2.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-obs-build-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-source-5.14.21-150400.24.170.1.noarch",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-syms-5.14.21-150400.24.170.1.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-syms-5.14.21-150400.24.170.1.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.170.2.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.170.2.x86_64",
          "SUSE Manager Proxy 4.3:kernel-default-5.14.21-150400.24.170.2.x86_64",
          "SUSE Manager Proxy 4.3:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
          "SUSE Manager Proxy 4.3:kernel-default-devel-5.14.21-150400.24.170.2.x86_64",
          "SUSE Manager Proxy 4.3:kernel-devel-5.14.21-150400.24.170.1.noarch",
          "SUSE Manager Proxy 4.3:kernel-macros-5.14.21-150400.24.170.1.noarch",
          "SUSE Manager Proxy 4.3:kernel-source-5.14.21-150400.24.170.1.noarch",
          "SUSE Manager Proxy 4.3:kernel-syms-5.14.21-150400.24.170.1.x86_64",
          "SUSE Manager Server 4.3:kernel-default-5.14.21-150400.24.170.2.ppc64le",
          "SUSE Manager Server 4.3:kernel-default-5.14.21-150400.24.170.2.s390x",
          "SUSE Manager Server 4.3:kernel-default-5.14.21-150400.24.170.2.x86_64",
          "SUSE Manager Server 4.3:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.ppc64le",
          "SUSE Manager Server 4.3:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
          "SUSE Manager Server 4.3:kernel-default-devel-5.14.21-150400.24.170.2.ppc64le",
          "SUSE Manager Server 4.3:kernel-default-devel-5.14.21-150400.24.170.2.s390x",
          "SUSE Manager Server 4.3:kernel-default-devel-5.14.21-150400.24.170.2.x86_64",
          "SUSE Manager Server 4.3:kernel-devel-5.14.21-150400.24.170.1.noarch",
          "SUSE Manager Server 4.3:kernel-macros-5.14.21-150400.24.170.1.noarch",
          "SUSE Manager Server 4.3:kernel-source-5.14.21-150400.24.170.1.noarch",
          "SUSE Manager Server 4.3:kernel-syms-5.14.21-150400.24.170.1.ppc64le",
          "SUSE Manager Server 4.3:kernel-syms-5.14.21-150400.24.170.1.s390x",
          "SUSE Manager Server 4.3:kernel-syms-5.14.21-150400.24.170.1.x86_64",
          "SUSE Manager Server 4.3:kernel-zfcpdump-5.14.21-150400.24.170.2.s390x"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2022-49958",
          "url": "https://www.suse.com/security/cve/CVE-2022-49958"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1244974 for CVE-2022-49958",
          "url": "https://bugzilla.suse.com/1244974"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-64kb-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-64kb-devel-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-devel-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-devel-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-devel-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-docs-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-macros-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-obs-build-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-obs-build-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-source-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-syms-5.14.21-150400.24.170.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-syms-5.14.21-150400.24.170.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:reiserfs-kmp-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:reiserfs-kmp-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-64kb-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-64kb-devel-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-devel-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-docs-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-macros-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-source-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.170.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.170.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_170-default-1-150400.9.3.2.ppc64le",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_170-default-1-150400.9.3.2.s390x",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_170-default-1-150400.9.3.2.x86_64",
            "SUSE Linux Enterprise Micro 5.3:kernel-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise Micro 5.3:kernel-default-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise Micro 5.3:kernel-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Micro 5.3:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.aarch64",
            "SUSE Linux Enterprise Micro 5.3:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
            "SUSE Linux Enterprise Micro 5.4:kernel-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise Micro 5.4:kernel-default-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise Micro 5.4:kernel-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Micro 5.4:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.aarch64",
            "SUSE Linux Enterprise Micro 5.4:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-64kb-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-64kb-devel-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.aarch64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.ppc64le",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-devel-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-docs-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-macros-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-source-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.170.1.aarch64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.170.1.ppc64le",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.170.1.s390x",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.170.1.x86_64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-zfcpdump-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-devel-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-devel-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-devel-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-docs-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-macros-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-obs-build-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-obs-build-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-source-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-syms-5.14.21-150400.24.170.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-syms-5.14.21-150400.24.170.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Manager Proxy 4.3:kernel-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Manager Proxy 4.3:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
            "SUSE Manager Proxy 4.3:kernel-default-devel-5.14.21-150400.24.170.2.x86_64",
            "SUSE Manager Proxy 4.3:kernel-devel-5.14.21-150400.24.170.1.noarch",
            "SUSE Manager Proxy 4.3:kernel-macros-5.14.21-150400.24.170.1.noarch",
            "SUSE Manager Proxy 4.3:kernel-source-5.14.21-150400.24.170.1.noarch",
            "SUSE Manager Proxy 4.3:kernel-syms-5.14.21-150400.24.170.1.x86_64",
            "SUSE Manager Server 4.3:kernel-default-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Manager Server 4.3:kernel-default-5.14.21-150400.24.170.2.s390x",
            "SUSE Manager Server 4.3:kernel-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Manager Server 4.3:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.ppc64le",
            "SUSE Manager Server 4.3:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
            "SUSE Manager Server 4.3:kernel-default-devel-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Manager Server 4.3:kernel-default-devel-5.14.21-150400.24.170.2.s390x",
            "SUSE Manager Server 4.3:kernel-default-devel-5.14.21-150400.24.170.2.x86_64",
            "SUSE Manager Server 4.3:kernel-devel-5.14.21-150400.24.170.1.noarch",
            "SUSE Manager Server 4.3:kernel-macros-5.14.21-150400.24.170.1.noarch",
            "SUSE Manager Server 4.3:kernel-source-5.14.21-150400.24.170.1.noarch",
            "SUSE Manager Server 4.3:kernel-syms-5.14.21-150400.24.170.1.ppc64le",
            "SUSE Manager Server 4.3:kernel-syms-5.14.21-150400.24.170.1.s390x",
            "SUSE Manager Server 4.3:kernel-syms-5.14.21-150400.24.170.1.x86_64",
            "SUSE Manager Server 4.3:kernel-zfcpdump-5.14.21-150400.24.170.2.s390x"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 5.5,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
            "version": "3.1"
          },
          "products": [
            "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-64kb-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-64kb-devel-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-devel-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-devel-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-devel-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-docs-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-macros-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-obs-build-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-obs-build-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-source-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-syms-5.14.21-150400.24.170.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-syms-5.14.21-150400.24.170.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:reiserfs-kmp-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:reiserfs-kmp-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-64kb-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-64kb-devel-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-devel-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-docs-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-macros-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-source-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.170.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.170.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_170-default-1-150400.9.3.2.ppc64le",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_170-default-1-150400.9.3.2.s390x",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_170-default-1-150400.9.3.2.x86_64",
            "SUSE Linux Enterprise Micro 5.3:kernel-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise Micro 5.3:kernel-default-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise Micro 5.3:kernel-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Micro 5.3:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.aarch64",
            "SUSE Linux Enterprise Micro 5.3:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
            "SUSE Linux Enterprise Micro 5.4:kernel-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise Micro 5.4:kernel-default-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise Micro 5.4:kernel-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Micro 5.4:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.aarch64",
            "SUSE Linux Enterprise Micro 5.4:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-64kb-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-64kb-devel-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.aarch64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.ppc64le",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-devel-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-docs-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-macros-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-source-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.170.1.aarch64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.170.1.ppc64le",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.170.1.s390x",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.170.1.x86_64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-zfcpdump-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-devel-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-devel-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-devel-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-docs-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-macros-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-obs-build-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-obs-build-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-source-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-syms-5.14.21-150400.24.170.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-syms-5.14.21-150400.24.170.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Manager Proxy 4.3:kernel-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Manager Proxy 4.3:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
            "SUSE Manager Proxy 4.3:kernel-default-devel-5.14.21-150400.24.170.2.x86_64",
            "SUSE Manager Proxy 4.3:kernel-devel-5.14.21-150400.24.170.1.noarch",
            "SUSE Manager Proxy 4.3:kernel-macros-5.14.21-150400.24.170.1.noarch",
            "SUSE Manager Proxy 4.3:kernel-source-5.14.21-150400.24.170.1.noarch",
            "SUSE Manager Proxy 4.3:kernel-syms-5.14.21-150400.24.170.1.x86_64",
            "SUSE Manager Server 4.3:kernel-default-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Manager Server 4.3:kernel-default-5.14.21-150400.24.170.2.s390x",
            "SUSE Manager Server 4.3:kernel-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Manager Server 4.3:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.ppc64le",
            "SUSE Manager Server 4.3:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
            "SUSE Manager Server 4.3:kernel-default-devel-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Manager Server 4.3:kernel-default-devel-5.14.21-150400.24.170.2.s390x",
            "SUSE Manager Server 4.3:kernel-default-devel-5.14.21-150400.24.170.2.x86_64",
            "SUSE Manager Server 4.3:kernel-devel-5.14.21-150400.24.170.1.noarch",
            "SUSE Manager Server 4.3:kernel-macros-5.14.21-150400.24.170.1.noarch",
            "SUSE Manager Server 4.3:kernel-source-5.14.21-150400.24.170.1.noarch",
            "SUSE Manager Server 4.3:kernel-syms-5.14.21-150400.24.170.1.ppc64le",
            "SUSE Manager Server 4.3:kernel-syms-5.14.21-150400.24.170.1.s390x",
            "SUSE Manager Server 4.3:kernel-syms-5.14.21-150400.24.170.1.x86_64",
            "SUSE Manager Server 4.3:kernel-zfcpdump-5.14.21-150400.24.170.2.s390x"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2025-07-28T15:09:33Z",
          "details": "moderate"
        }
      ],
      "title": "CVE-2022-49958"
    },
    {
      "cve": "CVE-2022-49960",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2022-49960"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "In the Linux kernel, the following vulnerability has been resolved:\n\ndrm/i915: fix null pointer dereference\n\nAsus chromebook CX550 crashes during boot on v5.17-rc1 kernel.\nThe root cause is null pointer defeference of bi_next\nin tgl_get_bw_info() in drivers/gpu/drm/i915/display/intel_bw.c.\n\nBUG: kernel NULL pointer dereference, address: 000000000000002e\nPGD 0 P4D 0\nOops: 0002 [#1] PREEMPT SMP NOPTI\nCPU: 0 PID: 1 Comm: swapper/0 Tainted: G     U            5.17.0-rc1\nHardware name: Google Delbin/Delbin, BIOS Google_Delbin.13672.156.3 05/14/2021\nRIP: 0010:tgl_get_bw_info+0x2de/0x510\n...\n[    2.554467] Call Trace:\n[    2.554467]  \u003cTASK\u003e\n[    2.554467]  intel_bw_init_hw+0x14a/0x434\n[    2.554467]  ? _printk+0x59/0x73\n[    2.554467]  ? _dev_err+0x77/0x91\n[    2.554467]  i915_driver_hw_probe+0x329/0x33e\n[    2.554467]  i915_driver_probe+0x4c8/0x638\n[    2.554467]  i915_pci_probe+0xf8/0x14e\n[    2.554467]  ? _raw_spin_unlock_irqrestore+0x12/0x2c\n[    2.554467]  pci_device_probe+0xaa/0x142\n[    2.554467]  really_probe+0x13f/0x2f4\n[    2.554467]  __driver_probe_device+0x9e/0xd3\n[    2.554467]  driver_probe_device+0x24/0x7c\n[    2.554467]  __driver_attach+0xba/0xcf\n[    2.554467]  ? driver_attach+0x1f/0x1f\n[    2.554467]  bus_for_each_dev+0x8c/0xc0\n[    2.554467]  bus_add_driver+0x11b/0x1f7\n[    2.554467]  driver_register+0x60/0xea\n[    2.554467]  ? mipi_dsi_bus_init+0x16/0x16\n[    2.554467]  i915_init+0x2c/0xb9\n[    2.554467]  ? mipi_dsi_bus_init+0x16/0x16\n[    2.554467]  do_one_initcall+0x12e/0x2b3\n[    2.554467]  do_initcall_level+0xd6/0xf3\n[    2.554467]  do_initcalls+0x4e/0x79\n[    2.554467]  kernel_init_freeable+0xed/0x14d\n[    2.554467]  ? rest_init+0xc1/0xc1\n[    2.554467]  kernel_init+0x1a/0x120\n[    2.554467]  ret_from_fork+0x1f/0x30\n[    2.554467]  \u003c/TASK\u003e\n...\nKernel panic - not syncing: Fatal exception\n\n(cherry picked from commit c247cd03898c4c43c3bce6d4014730403bc13032)",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.170.2.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.170.2.s390x",
          "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.170.2.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.170.2.s390x",
          "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.170.2.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.170.2.s390x",
          "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.170.2.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.170.2.s390x",
          "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-64kb-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-64kb-devel-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-devel-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-devel-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-devel-5.14.21-150400.24.170.1.noarch",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-docs-5.14.21-150400.24.170.1.noarch",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-macros-5.14.21-150400.24.170.1.noarch",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-obs-build-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-obs-build-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-source-5.14.21-150400.24.170.1.noarch",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-syms-5.14.21-150400.24.170.1.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-syms-5.14.21-150400.24.170.1.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:reiserfs-kmp-default-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:reiserfs-kmp-default-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-64kb-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-64kb-devel-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-devel-5.14.21-150400.24.170.1.noarch",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-docs-5.14.21-150400.24.170.1.noarch",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-macros-5.14.21-150400.24.170.1.noarch",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-source-5.14.21-150400.24.170.1.noarch",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.170.1.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.170.1.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.170.2.ppc64le",
          "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.170.2.s390x",
          "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.170.2.ppc64le",
          "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.170.2.s390x",
          "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_170-default-1-150400.9.3.2.ppc64le",
          "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_170-default-1-150400.9.3.2.s390x",
          "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_170-default-1-150400.9.3.2.x86_64",
          "SUSE Linux Enterprise Micro 5.3:kernel-default-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise Micro 5.3:kernel-default-5.14.21-150400.24.170.2.s390x",
          "SUSE Linux Enterprise Micro 5.3:kernel-default-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise Micro 5.3:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.aarch64",
          "SUSE Linux Enterprise Micro 5.3:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
          "SUSE Linux Enterprise Micro 5.4:kernel-default-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise Micro 5.4:kernel-default-5.14.21-150400.24.170.2.s390x",
          "SUSE Linux Enterprise Micro 5.4:kernel-default-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise Micro 5.4:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.aarch64",
          "SUSE Linux Enterprise Micro 5.4:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-64kb-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-64kb-devel-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-5.14.21-150400.24.170.2.ppc64le",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-5.14.21-150400.24.170.2.s390x",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.aarch64",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.ppc64le",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.170.2.ppc64le",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.170.2.s390x",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-devel-5.14.21-150400.24.170.1.noarch",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-docs-5.14.21-150400.24.170.1.noarch",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-macros-5.14.21-150400.24.170.1.noarch",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.170.2.ppc64le",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.170.2.s390x",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-source-5.14.21-150400.24.170.1.noarch",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.170.1.aarch64",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.170.1.ppc64le",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.170.1.s390x",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.170.1.x86_64",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-zfcpdump-5.14.21-150400.24.170.2.s390x",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.170.2.ppc64le",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.170.2.s390x",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-5.14.21-150400.24.170.2.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-devel-5.14.21-150400.24.170.2.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-devel-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-devel-5.14.21-150400.24.170.1.noarch",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-docs-5.14.21-150400.24.170.1.noarch",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-macros-5.14.21-150400.24.170.1.noarch",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-obs-build-5.14.21-150400.24.170.2.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-obs-build-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-source-5.14.21-150400.24.170.1.noarch",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-syms-5.14.21-150400.24.170.1.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-syms-5.14.21-150400.24.170.1.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.170.2.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.170.2.x86_64",
          "SUSE Manager Proxy 4.3:kernel-default-5.14.21-150400.24.170.2.x86_64",
          "SUSE Manager Proxy 4.3:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
          "SUSE Manager Proxy 4.3:kernel-default-devel-5.14.21-150400.24.170.2.x86_64",
          "SUSE Manager Proxy 4.3:kernel-devel-5.14.21-150400.24.170.1.noarch",
          "SUSE Manager Proxy 4.3:kernel-macros-5.14.21-150400.24.170.1.noarch",
          "SUSE Manager Proxy 4.3:kernel-source-5.14.21-150400.24.170.1.noarch",
          "SUSE Manager Proxy 4.3:kernel-syms-5.14.21-150400.24.170.1.x86_64",
          "SUSE Manager Server 4.3:kernel-default-5.14.21-150400.24.170.2.ppc64le",
          "SUSE Manager Server 4.3:kernel-default-5.14.21-150400.24.170.2.s390x",
          "SUSE Manager Server 4.3:kernel-default-5.14.21-150400.24.170.2.x86_64",
          "SUSE Manager Server 4.3:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.ppc64le",
          "SUSE Manager Server 4.3:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
          "SUSE Manager Server 4.3:kernel-default-devel-5.14.21-150400.24.170.2.ppc64le",
          "SUSE Manager Server 4.3:kernel-default-devel-5.14.21-150400.24.170.2.s390x",
          "SUSE Manager Server 4.3:kernel-default-devel-5.14.21-150400.24.170.2.x86_64",
          "SUSE Manager Server 4.3:kernel-devel-5.14.21-150400.24.170.1.noarch",
          "SUSE Manager Server 4.3:kernel-macros-5.14.21-150400.24.170.1.noarch",
          "SUSE Manager Server 4.3:kernel-source-5.14.21-150400.24.170.1.noarch",
          "SUSE Manager Server 4.3:kernel-syms-5.14.21-150400.24.170.1.ppc64le",
          "SUSE Manager Server 4.3:kernel-syms-5.14.21-150400.24.170.1.s390x",
          "SUSE Manager Server 4.3:kernel-syms-5.14.21-150400.24.170.1.x86_64",
          "SUSE Manager Server 4.3:kernel-zfcpdump-5.14.21-150400.24.170.2.s390x"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2022-49960",
          "url": "https://www.suse.com/security/cve/CVE-2022-49960"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1244911 for CVE-2022-49960",
          "url": "https://bugzilla.suse.com/1244911"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-64kb-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-64kb-devel-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-devel-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-devel-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-devel-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-docs-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-macros-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-obs-build-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-obs-build-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-source-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-syms-5.14.21-150400.24.170.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-syms-5.14.21-150400.24.170.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:reiserfs-kmp-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:reiserfs-kmp-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-64kb-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-64kb-devel-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-devel-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-docs-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-macros-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-source-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.170.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.170.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_170-default-1-150400.9.3.2.ppc64le",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_170-default-1-150400.9.3.2.s390x",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_170-default-1-150400.9.3.2.x86_64",
            "SUSE Linux Enterprise Micro 5.3:kernel-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise Micro 5.3:kernel-default-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise Micro 5.3:kernel-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Micro 5.3:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.aarch64",
            "SUSE Linux Enterprise Micro 5.3:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
            "SUSE Linux Enterprise Micro 5.4:kernel-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise Micro 5.4:kernel-default-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise Micro 5.4:kernel-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Micro 5.4:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.aarch64",
            "SUSE Linux Enterprise Micro 5.4:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-64kb-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-64kb-devel-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.aarch64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.ppc64le",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-devel-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-docs-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-macros-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-source-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.170.1.aarch64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.170.1.ppc64le",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.170.1.s390x",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.170.1.x86_64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-zfcpdump-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-devel-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-devel-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-devel-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-docs-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-macros-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-obs-build-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-obs-build-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-source-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-syms-5.14.21-150400.24.170.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-syms-5.14.21-150400.24.170.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Manager Proxy 4.3:kernel-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Manager Proxy 4.3:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
            "SUSE Manager Proxy 4.3:kernel-default-devel-5.14.21-150400.24.170.2.x86_64",
            "SUSE Manager Proxy 4.3:kernel-devel-5.14.21-150400.24.170.1.noarch",
            "SUSE Manager Proxy 4.3:kernel-macros-5.14.21-150400.24.170.1.noarch",
            "SUSE Manager Proxy 4.3:kernel-source-5.14.21-150400.24.170.1.noarch",
            "SUSE Manager Proxy 4.3:kernel-syms-5.14.21-150400.24.170.1.x86_64",
            "SUSE Manager Server 4.3:kernel-default-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Manager Server 4.3:kernel-default-5.14.21-150400.24.170.2.s390x",
            "SUSE Manager Server 4.3:kernel-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Manager Server 4.3:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.ppc64le",
            "SUSE Manager Server 4.3:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
            "SUSE Manager Server 4.3:kernel-default-devel-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Manager Server 4.3:kernel-default-devel-5.14.21-150400.24.170.2.s390x",
            "SUSE Manager Server 4.3:kernel-default-devel-5.14.21-150400.24.170.2.x86_64",
            "SUSE Manager Server 4.3:kernel-devel-5.14.21-150400.24.170.1.noarch",
            "SUSE Manager Server 4.3:kernel-macros-5.14.21-150400.24.170.1.noarch",
            "SUSE Manager Server 4.3:kernel-source-5.14.21-150400.24.170.1.noarch",
            "SUSE Manager Server 4.3:kernel-syms-5.14.21-150400.24.170.1.ppc64le",
            "SUSE Manager Server 4.3:kernel-syms-5.14.21-150400.24.170.1.s390x",
            "SUSE Manager Server 4.3:kernel-syms-5.14.21-150400.24.170.1.x86_64",
            "SUSE Manager Server 4.3:kernel-zfcpdump-5.14.21-150400.24.170.2.s390x"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 4.4,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H",
            "version": "3.1"
          },
          "products": [
            "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-64kb-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-64kb-devel-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-devel-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-devel-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-devel-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-docs-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-macros-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-obs-build-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-obs-build-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-source-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-syms-5.14.21-150400.24.170.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-syms-5.14.21-150400.24.170.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:reiserfs-kmp-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:reiserfs-kmp-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-64kb-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-64kb-devel-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-devel-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-docs-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-macros-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-source-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.170.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.170.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_170-default-1-150400.9.3.2.ppc64le",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_170-default-1-150400.9.3.2.s390x",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_170-default-1-150400.9.3.2.x86_64",
            "SUSE Linux Enterprise Micro 5.3:kernel-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise Micro 5.3:kernel-default-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise Micro 5.3:kernel-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Micro 5.3:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.aarch64",
            "SUSE Linux Enterprise Micro 5.3:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
            "SUSE Linux Enterprise Micro 5.4:kernel-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise Micro 5.4:kernel-default-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise Micro 5.4:kernel-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Micro 5.4:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.aarch64",
            "SUSE Linux Enterprise Micro 5.4:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-64kb-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-64kb-devel-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.aarch64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.ppc64le",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-devel-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-docs-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-macros-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-source-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.170.1.aarch64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.170.1.ppc64le",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.170.1.s390x",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.170.1.x86_64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-zfcpdump-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-devel-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-devel-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-devel-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-docs-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-macros-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-obs-build-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-obs-build-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-source-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-syms-5.14.21-150400.24.170.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-syms-5.14.21-150400.24.170.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Manager Proxy 4.3:kernel-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Manager Proxy 4.3:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
            "SUSE Manager Proxy 4.3:kernel-default-devel-5.14.21-150400.24.170.2.x86_64",
            "SUSE Manager Proxy 4.3:kernel-devel-5.14.21-150400.24.170.1.noarch",
            "SUSE Manager Proxy 4.3:kernel-macros-5.14.21-150400.24.170.1.noarch",
            "SUSE Manager Proxy 4.3:kernel-source-5.14.21-150400.24.170.1.noarch",
            "SUSE Manager Proxy 4.3:kernel-syms-5.14.21-150400.24.170.1.x86_64",
            "SUSE Manager Server 4.3:kernel-default-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Manager Server 4.3:kernel-default-5.14.21-150400.24.170.2.s390x",
            "SUSE Manager Server 4.3:kernel-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Manager Server 4.3:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.ppc64le",
            "SUSE Manager Server 4.3:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
            "SUSE Manager Server 4.3:kernel-default-devel-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Manager Server 4.3:kernel-default-devel-5.14.21-150400.24.170.2.s390x",
            "SUSE Manager Server 4.3:kernel-default-devel-5.14.21-150400.24.170.2.x86_64",
            "SUSE Manager Server 4.3:kernel-devel-5.14.21-150400.24.170.1.noarch",
            "SUSE Manager Server 4.3:kernel-macros-5.14.21-150400.24.170.1.noarch",
            "SUSE Manager Server 4.3:kernel-source-5.14.21-150400.24.170.1.noarch",
            "SUSE Manager Server 4.3:kernel-syms-5.14.21-150400.24.170.1.ppc64le",
            "SUSE Manager Server 4.3:kernel-syms-5.14.21-150400.24.170.1.s390x",
            "SUSE Manager Server 4.3:kernel-syms-5.14.21-150400.24.170.1.x86_64",
            "SUSE Manager Server 4.3:kernel-zfcpdump-5.14.21-150400.24.170.2.s390x"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2025-07-28T15:09:33Z",
          "details": "moderate"
        }
      ],
      "title": "CVE-2022-49960"
    },
    {
      "cve": "CVE-2022-49964",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2022-49964"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "In the Linux kernel, the following vulnerability has been resolved:\n\narm64: cacheinfo: Fix incorrect assignment of signed error value to unsigned fw_level\n\nThough acpi_find_last_cache_level() always returned signed value and the\ndocument states it will return any errors caused by lack of a PPTT table,\nit never returned negative values before.\n\nCommit 0c80f9e165f8 (\"ACPI: PPTT: Leave the table mapped for the runtime usage\")\nhowever changed it by returning -ENOENT if no PPTT was found. The value\nreturned from acpi_find_last_cache_level() is then assigned to unsigned\nfw_level.\n\nIt will result in the number of cache leaves calculated incorrectly as\na huge value which will then cause the following warning from __alloc_pages\nas the order would be great than MAX_ORDER because of incorrect and huge\ncache leaves value.\n\n  |  WARNING: CPU: 0 PID: 1 at mm/page_alloc.c:5407 __alloc_pages+0x74/0x314\n  |  Modules linked in:\n  |  CPU: 0 PID: 1 Comm: swapper/0 Not tainted 5.19.0-10393-g7c2a8d3ac4c0 #73\n  |  pstate: 20000005 (nzCv daif -PAN -UAO -TCO -DIT -SSBS BTYPE=--)\n  |  pc : __alloc_pages+0x74/0x314\n  |  lr : alloc_pages+0xe8/0x318\n  |  Call trace:\n  |   __alloc_pages+0x74/0x314\n  |   alloc_pages+0xe8/0x318\n  |   kmalloc_order_trace+0x68/0x1dc\n  |   __kmalloc+0x240/0x338\n  |   detect_cache_attributes+0xe0/0x56c\n  |   update_siblings_masks+0x38/0x284\n  |   store_cpu_topology+0x78/0x84\n  |   smp_prepare_cpus+0x48/0x134\n  |   kernel_init_freeable+0xc4/0x14c\n  |   kernel_init+0x2c/0x1b4\n  |   ret_from_fork+0x10/0x20\n\nFix the same by changing fw_level to be signed integer and return the\nerror from init_cache_level() early in case of error.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.170.2.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.170.2.s390x",
          "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.170.2.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.170.2.s390x",
          "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.170.2.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.170.2.s390x",
          "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.170.2.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.170.2.s390x",
          "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-64kb-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-64kb-devel-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-devel-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-devel-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-devel-5.14.21-150400.24.170.1.noarch",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-docs-5.14.21-150400.24.170.1.noarch",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-macros-5.14.21-150400.24.170.1.noarch",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-obs-build-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-obs-build-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-source-5.14.21-150400.24.170.1.noarch",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-syms-5.14.21-150400.24.170.1.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-syms-5.14.21-150400.24.170.1.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:reiserfs-kmp-default-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:reiserfs-kmp-default-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-64kb-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-64kb-devel-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-devel-5.14.21-150400.24.170.1.noarch",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-docs-5.14.21-150400.24.170.1.noarch",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-macros-5.14.21-150400.24.170.1.noarch",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-source-5.14.21-150400.24.170.1.noarch",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.170.1.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.170.1.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.170.2.ppc64le",
          "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.170.2.s390x",
          "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.170.2.ppc64le",
          "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.170.2.s390x",
          "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_170-default-1-150400.9.3.2.ppc64le",
          "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_170-default-1-150400.9.3.2.s390x",
          "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_170-default-1-150400.9.3.2.x86_64",
          "SUSE Linux Enterprise Micro 5.3:kernel-default-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise Micro 5.3:kernel-default-5.14.21-150400.24.170.2.s390x",
          "SUSE Linux Enterprise Micro 5.3:kernel-default-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise Micro 5.3:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.aarch64",
          "SUSE Linux Enterprise Micro 5.3:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
          "SUSE Linux Enterprise Micro 5.4:kernel-default-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise Micro 5.4:kernel-default-5.14.21-150400.24.170.2.s390x",
          "SUSE Linux Enterprise Micro 5.4:kernel-default-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise Micro 5.4:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.aarch64",
          "SUSE Linux Enterprise Micro 5.4:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-64kb-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-64kb-devel-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-5.14.21-150400.24.170.2.ppc64le",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-5.14.21-150400.24.170.2.s390x",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.aarch64",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.ppc64le",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.170.2.ppc64le",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.170.2.s390x",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-devel-5.14.21-150400.24.170.1.noarch",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-docs-5.14.21-150400.24.170.1.noarch",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-macros-5.14.21-150400.24.170.1.noarch",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.170.2.ppc64le",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.170.2.s390x",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-source-5.14.21-150400.24.170.1.noarch",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.170.1.aarch64",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.170.1.ppc64le",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.170.1.s390x",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.170.1.x86_64",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-zfcpdump-5.14.21-150400.24.170.2.s390x",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.170.2.ppc64le",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.170.2.s390x",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-5.14.21-150400.24.170.2.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-devel-5.14.21-150400.24.170.2.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-devel-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-devel-5.14.21-150400.24.170.1.noarch",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-docs-5.14.21-150400.24.170.1.noarch",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-macros-5.14.21-150400.24.170.1.noarch",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-obs-build-5.14.21-150400.24.170.2.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-obs-build-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-source-5.14.21-150400.24.170.1.noarch",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-syms-5.14.21-150400.24.170.1.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-syms-5.14.21-150400.24.170.1.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.170.2.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.170.2.x86_64",
          "SUSE Manager Proxy 4.3:kernel-default-5.14.21-150400.24.170.2.x86_64",
          "SUSE Manager Proxy 4.3:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
          "SUSE Manager Proxy 4.3:kernel-default-devel-5.14.21-150400.24.170.2.x86_64",
          "SUSE Manager Proxy 4.3:kernel-devel-5.14.21-150400.24.170.1.noarch",
          "SUSE Manager Proxy 4.3:kernel-macros-5.14.21-150400.24.170.1.noarch",
          "SUSE Manager Proxy 4.3:kernel-source-5.14.21-150400.24.170.1.noarch",
          "SUSE Manager Proxy 4.3:kernel-syms-5.14.21-150400.24.170.1.x86_64",
          "SUSE Manager Server 4.3:kernel-default-5.14.21-150400.24.170.2.ppc64le",
          "SUSE Manager Server 4.3:kernel-default-5.14.21-150400.24.170.2.s390x",
          "SUSE Manager Server 4.3:kernel-default-5.14.21-150400.24.170.2.x86_64",
          "SUSE Manager Server 4.3:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.ppc64le",
          "SUSE Manager Server 4.3:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
          "SUSE Manager Server 4.3:kernel-default-devel-5.14.21-150400.24.170.2.ppc64le",
          "SUSE Manager Server 4.3:kernel-default-devel-5.14.21-150400.24.170.2.s390x",
          "SUSE Manager Server 4.3:kernel-default-devel-5.14.21-150400.24.170.2.x86_64",
          "SUSE Manager Server 4.3:kernel-devel-5.14.21-150400.24.170.1.noarch",
          "SUSE Manager Server 4.3:kernel-macros-5.14.21-150400.24.170.1.noarch",
          "SUSE Manager Server 4.3:kernel-source-5.14.21-150400.24.170.1.noarch",
          "SUSE Manager Server 4.3:kernel-syms-5.14.21-150400.24.170.1.ppc64le",
          "SUSE Manager Server 4.3:kernel-syms-5.14.21-150400.24.170.1.s390x",
          "SUSE Manager Server 4.3:kernel-syms-5.14.21-150400.24.170.1.x86_64",
          "SUSE Manager Server 4.3:kernel-zfcpdump-5.14.21-150400.24.170.2.s390x"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2022-49964",
          "url": "https://www.suse.com/security/cve/CVE-2022-49964"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1245064 for CVE-2022-49964",
          "url": "https://bugzilla.suse.com/1245064"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-64kb-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-64kb-devel-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-devel-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-devel-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-devel-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-docs-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-macros-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-obs-build-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-obs-build-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-source-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-syms-5.14.21-150400.24.170.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-syms-5.14.21-150400.24.170.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:reiserfs-kmp-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:reiserfs-kmp-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-64kb-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-64kb-devel-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-devel-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-docs-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-macros-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-source-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.170.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.170.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_170-default-1-150400.9.3.2.ppc64le",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_170-default-1-150400.9.3.2.s390x",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_170-default-1-150400.9.3.2.x86_64",
            "SUSE Linux Enterprise Micro 5.3:kernel-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise Micro 5.3:kernel-default-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise Micro 5.3:kernel-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Micro 5.3:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.aarch64",
            "SUSE Linux Enterprise Micro 5.3:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
            "SUSE Linux Enterprise Micro 5.4:kernel-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise Micro 5.4:kernel-default-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise Micro 5.4:kernel-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Micro 5.4:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.aarch64",
            "SUSE Linux Enterprise Micro 5.4:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-64kb-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-64kb-devel-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.aarch64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.ppc64le",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-devel-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-docs-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-macros-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-source-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.170.1.aarch64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.170.1.ppc64le",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.170.1.s390x",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.170.1.x86_64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-zfcpdump-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-devel-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-devel-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-devel-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-docs-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-macros-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-obs-build-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-obs-build-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-source-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-syms-5.14.21-150400.24.170.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-syms-5.14.21-150400.24.170.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Manager Proxy 4.3:kernel-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Manager Proxy 4.3:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
            "SUSE Manager Proxy 4.3:kernel-default-devel-5.14.21-150400.24.170.2.x86_64",
            "SUSE Manager Proxy 4.3:kernel-devel-5.14.21-150400.24.170.1.noarch",
            "SUSE Manager Proxy 4.3:kernel-macros-5.14.21-150400.24.170.1.noarch",
            "SUSE Manager Proxy 4.3:kernel-source-5.14.21-150400.24.170.1.noarch",
            "SUSE Manager Proxy 4.3:kernel-syms-5.14.21-150400.24.170.1.x86_64",
            "SUSE Manager Server 4.3:kernel-default-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Manager Server 4.3:kernel-default-5.14.21-150400.24.170.2.s390x",
            "SUSE Manager Server 4.3:kernel-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Manager Server 4.3:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.ppc64le",
            "SUSE Manager Server 4.3:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
            "SUSE Manager Server 4.3:kernel-default-devel-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Manager Server 4.3:kernel-default-devel-5.14.21-150400.24.170.2.s390x",
            "SUSE Manager Server 4.3:kernel-default-devel-5.14.21-150400.24.170.2.x86_64",
            "SUSE Manager Server 4.3:kernel-devel-5.14.21-150400.24.170.1.noarch",
            "SUSE Manager Server 4.3:kernel-macros-5.14.21-150400.24.170.1.noarch",
            "SUSE Manager Server 4.3:kernel-source-5.14.21-150400.24.170.1.noarch",
            "SUSE Manager Server 4.3:kernel-syms-5.14.21-150400.24.170.1.ppc64le",
            "SUSE Manager Server 4.3:kernel-syms-5.14.21-150400.24.170.1.s390x",
            "SUSE Manager Server 4.3:kernel-syms-5.14.21-150400.24.170.1.x86_64",
            "SUSE Manager Server 4.3:kernel-zfcpdump-5.14.21-150400.24.170.2.s390x"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 6.1,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:H",
            "version": "3.1"
          },
          "products": [
            "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-64kb-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-64kb-devel-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-devel-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-devel-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-devel-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-docs-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-macros-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-obs-build-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-obs-build-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-source-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-syms-5.14.21-150400.24.170.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-syms-5.14.21-150400.24.170.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:reiserfs-kmp-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:reiserfs-kmp-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-64kb-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-64kb-devel-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-devel-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-docs-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-macros-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-source-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.170.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.170.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_170-default-1-150400.9.3.2.ppc64le",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_170-default-1-150400.9.3.2.s390x",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_170-default-1-150400.9.3.2.x86_64",
            "SUSE Linux Enterprise Micro 5.3:kernel-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise Micro 5.3:kernel-default-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise Micro 5.3:kernel-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Micro 5.3:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.aarch64",
            "SUSE Linux Enterprise Micro 5.3:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
            "SUSE Linux Enterprise Micro 5.4:kernel-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise Micro 5.4:kernel-default-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise Micro 5.4:kernel-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Micro 5.4:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.aarch64",
            "SUSE Linux Enterprise Micro 5.4:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-64kb-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-64kb-devel-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.aarch64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.ppc64le",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-devel-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-docs-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-macros-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-source-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.170.1.aarch64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.170.1.ppc64le",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.170.1.s390x",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.170.1.x86_64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-zfcpdump-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-devel-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-devel-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-devel-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-docs-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-macros-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-obs-build-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-obs-build-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-source-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-syms-5.14.21-150400.24.170.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-syms-5.14.21-150400.24.170.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Manager Proxy 4.3:kernel-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Manager Proxy 4.3:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
            "SUSE Manager Proxy 4.3:kernel-default-devel-5.14.21-150400.24.170.2.x86_64",
            "SUSE Manager Proxy 4.3:kernel-devel-5.14.21-150400.24.170.1.noarch",
            "SUSE Manager Proxy 4.3:kernel-macros-5.14.21-150400.24.170.1.noarch",
            "SUSE Manager Proxy 4.3:kernel-source-5.14.21-150400.24.170.1.noarch",
            "SUSE Manager Proxy 4.3:kernel-syms-5.14.21-150400.24.170.1.x86_64",
            "SUSE Manager Server 4.3:kernel-default-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Manager Server 4.3:kernel-default-5.14.21-150400.24.170.2.s390x",
            "SUSE Manager Server 4.3:kernel-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Manager Server 4.3:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.ppc64le",
            "SUSE Manager Server 4.3:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
            "SUSE Manager Server 4.3:kernel-default-devel-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Manager Server 4.3:kernel-default-devel-5.14.21-150400.24.170.2.s390x",
            "SUSE Manager Server 4.3:kernel-default-devel-5.14.21-150400.24.170.2.x86_64",
            "SUSE Manager Server 4.3:kernel-devel-5.14.21-150400.24.170.1.noarch",
            "SUSE Manager Server 4.3:kernel-macros-5.14.21-150400.24.170.1.noarch",
            "SUSE Manager Server 4.3:kernel-source-5.14.21-150400.24.170.1.noarch",
            "SUSE Manager Server 4.3:kernel-syms-5.14.21-150400.24.170.1.ppc64le",
            "SUSE Manager Server 4.3:kernel-syms-5.14.21-150400.24.170.1.s390x",
            "SUSE Manager Server 4.3:kernel-syms-5.14.21-150400.24.170.1.x86_64",
            "SUSE Manager Server 4.3:kernel-zfcpdump-5.14.21-150400.24.170.2.s390x"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2025-07-28T15:09:33Z",
          "details": "moderate"
        }
      ],
      "title": "CVE-2022-49964"
    },
    {
      "cve": "CVE-2022-49966",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2022-49966"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "In the Linux kernel, the following vulnerability has been resolved:\n\ndrm/amd/pm: add missing -\u003efini_microcode interface for Sienna Cichlid\n\nTo avoid any potential memory leak.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.170.2.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.170.2.s390x",
          "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.170.2.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.170.2.s390x",
          "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.170.2.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.170.2.s390x",
          "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.170.2.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.170.2.s390x",
          "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-64kb-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-64kb-devel-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-devel-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-devel-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-devel-5.14.21-150400.24.170.1.noarch",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-docs-5.14.21-150400.24.170.1.noarch",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-macros-5.14.21-150400.24.170.1.noarch",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-obs-build-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-obs-build-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-source-5.14.21-150400.24.170.1.noarch",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-syms-5.14.21-150400.24.170.1.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-syms-5.14.21-150400.24.170.1.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:reiserfs-kmp-default-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:reiserfs-kmp-default-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-64kb-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-64kb-devel-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-devel-5.14.21-150400.24.170.1.noarch",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-docs-5.14.21-150400.24.170.1.noarch",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-macros-5.14.21-150400.24.170.1.noarch",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-source-5.14.21-150400.24.170.1.noarch",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.170.1.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.170.1.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.170.2.ppc64le",
          "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.170.2.s390x",
          "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.170.2.ppc64le",
          "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.170.2.s390x",
          "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_170-default-1-150400.9.3.2.ppc64le",
          "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_170-default-1-150400.9.3.2.s390x",
          "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_170-default-1-150400.9.3.2.x86_64",
          "SUSE Linux Enterprise Micro 5.3:kernel-default-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise Micro 5.3:kernel-default-5.14.21-150400.24.170.2.s390x",
          "SUSE Linux Enterprise Micro 5.3:kernel-default-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise Micro 5.3:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.aarch64",
          "SUSE Linux Enterprise Micro 5.3:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
          "SUSE Linux Enterprise Micro 5.4:kernel-default-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise Micro 5.4:kernel-default-5.14.21-150400.24.170.2.s390x",
          "SUSE Linux Enterprise Micro 5.4:kernel-default-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise Micro 5.4:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.aarch64",
          "SUSE Linux Enterprise Micro 5.4:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-64kb-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-64kb-devel-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-5.14.21-150400.24.170.2.ppc64le",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-5.14.21-150400.24.170.2.s390x",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.aarch64",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.ppc64le",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.170.2.ppc64le",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.170.2.s390x",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-devel-5.14.21-150400.24.170.1.noarch",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-docs-5.14.21-150400.24.170.1.noarch",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-macros-5.14.21-150400.24.170.1.noarch",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.170.2.ppc64le",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.170.2.s390x",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-source-5.14.21-150400.24.170.1.noarch",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.170.1.aarch64",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.170.1.ppc64le",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.170.1.s390x",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.170.1.x86_64",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-zfcpdump-5.14.21-150400.24.170.2.s390x",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.170.2.ppc64le",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.170.2.s390x",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-5.14.21-150400.24.170.2.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-devel-5.14.21-150400.24.170.2.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-devel-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-devel-5.14.21-150400.24.170.1.noarch",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-docs-5.14.21-150400.24.170.1.noarch",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-macros-5.14.21-150400.24.170.1.noarch",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-obs-build-5.14.21-150400.24.170.2.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-obs-build-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-source-5.14.21-150400.24.170.1.noarch",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-syms-5.14.21-150400.24.170.1.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-syms-5.14.21-150400.24.170.1.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.170.2.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.170.2.x86_64",
          "SUSE Manager Proxy 4.3:kernel-default-5.14.21-150400.24.170.2.x86_64",
          "SUSE Manager Proxy 4.3:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
          "SUSE Manager Proxy 4.3:kernel-default-devel-5.14.21-150400.24.170.2.x86_64",
          "SUSE Manager Proxy 4.3:kernel-devel-5.14.21-150400.24.170.1.noarch",
          "SUSE Manager Proxy 4.3:kernel-macros-5.14.21-150400.24.170.1.noarch",
          "SUSE Manager Proxy 4.3:kernel-source-5.14.21-150400.24.170.1.noarch",
          "SUSE Manager Proxy 4.3:kernel-syms-5.14.21-150400.24.170.1.x86_64",
          "SUSE Manager Server 4.3:kernel-default-5.14.21-150400.24.170.2.ppc64le",
          "SUSE Manager Server 4.3:kernel-default-5.14.21-150400.24.170.2.s390x",
          "SUSE Manager Server 4.3:kernel-default-5.14.21-150400.24.170.2.x86_64",
          "SUSE Manager Server 4.3:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.ppc64le",
          "SUSE Manager Server 4.3:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
          "SUSE Manager Server 4.3:kernel-default-devel-5.14.21-150400.24.170.2.ppc64le",
          "SUSE Manager Server 4.3:kernel-default-devel-5.14.21-150400.24.170.2.s390x",
          "SUSE Manager Server 4.3:kernel-default-devel-5.14.21-150400.24.170.2.x86_64",
          "SUSE Manager Server 4.3:kernel-devel-5.14.21-150400.24.170.1.noarch",
          "SUSE Manager Server 4.3:kernel-macros-5.14.21-150400.24.170.1.noarch",
          "SUSE Manager Server 4.3:kernel-source-5.14.21-150400.24.170.1.noarch",
          "SUSE Manager Server 4.3:kernel-syms-5.14.21-150400.24.170.1.ppc64le",
          "SUSE Manager Server 4.3:kernel-syms-5.14.21-150400.24.170.1.s390x",
          "SUSE Manager Server 4.3:kernel-syms-5.14.21-150400.24.170.1.x86_64",
          "SUSE Manager Server 4.3:kernel-zfcpdump-5.14.21-150400.24.170.2.s390x"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2022-49966",
          "url": "https://www.suse.com/security/cve/CVE-2022-49966"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1245062 for CVE-2022-49966",
          "url": "https://bugzilla.suse.com/1245062"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-64kb-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-64kb-devel-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-devel-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-devel-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-devel-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-docs-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-macros-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-obs-build-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-obs-build-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-source-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-syms-5.14.21-150400.24.170.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-syms-5.14.21-150400.24.170.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:reiserfs-kmp-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:reiserfs-kmp-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-64kb-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-64kb-devel-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-devel-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-docs-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-macros-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-source-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.170.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.170.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_170-default-1-150400.9.3.2.ppc64le",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_170-default-1-150400.9.3.2.s390x",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_170-default-1-150400.9.3.2.x86_64",
            "SUSE Linux Enterprise Micro 5.3:kernel-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise Micro 5.3:kernel-default-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise Micro 5.3:kernel-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Micro 5.3:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.aarch64",
            "SUSE Linux Enterprise Micro 5.3:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
            "SUSE Linux Enterprise Micro 5.4:kernel-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise Micro 5.4:kernel-default-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise Micro 5.4:kernel-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Micro 5.4:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.aarch64",
            "SUSE Linux Enterprise Micro 5.4:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-64kb-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-64kb-devel-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.aarch64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.ppc64le",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-devel-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-docs-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-macros-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-source-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.170.1.aarch64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.170.1.ppc64le",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.170.1.s390x",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.170.1.x86_64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-zfcpdump-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-devel-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-devel-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-devel-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-docs-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-macros-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-obs-build-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-obs-build-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-source-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-syms-5.14.21-150400.24.170.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-syms-5.14.21-150400.24.170.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Manager Proxy 4.3:kernel-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Manager Proxy 4.3:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
            "SUSE Manager Proxy 4.3:kernel-default-devel-5.14.21-150400.24.170.2.x86_64",
            "SUSE Manager Proxy 4.3:kernel-devel-5.14.21-150400.24.170.1.noarch",
            "SUSE Manager Proxy 4.3:kernel-macros-5.14.21-150400.24.170.1.noarch",
            "SUSE Manager Proxy 4.3:kernel-source-5.14.21-150400.24.170.1.noarch",
            "SUSE Manager Proxy 4.3:kernel-syms-5.14.21-150400.24.170.1.x86_64",
            "SUSE Manager Server 4.3:kernel-default-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Manager Server 4.3:kernel-default-5.14.21-150400.24.170.2.s390x",
            "SUSE Manager Server 4.3:kernel-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Manager Server 4.3:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.ppc64le",
            "SUSE Manager Server 4.3:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
            "SUSE Manager Server 4.3:kernel-default-devel-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Manager Server 4.3:kernel-default-devel-5.14.21-150400.24.170.2.s390x",
            "SUSE Manager Server 4.3:kernel-default-devel-5.14.21-150400.24.170.2.x86_64",
            "SUSE Manager Server 4.3:kernel-devel-5.14.21-150400.24.170.1.noarch",
            "SUSE Manager Server 4.3:kernel-macros-5.14.21-150400.24.170.1.noarch",
            "SUSE Manager Server 4.3:kernel-source-5.14.21-150400.24.170.1.noarch",
            "SUSE Manager Server 4.3:kernel-syms-5.14.21-150400.24.170.1.ppc64le",
            "SUSE Manager Server 4.3:kernel-syms-5.14.21-150400.24.170.1.s390x",
            "SUSE Manager Server 4.3:kernel-syms-5.14.21-150400.24.170.1.x86_64",
            "SUSE Manager Server 4.3:kernel-zfcpdump-5.14.21-150400.24.170.2.s390x"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 4.4,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:L",
            "version": "3.1"
          },
          "products": [
            "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-64kb-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-64kb-devel-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-devel-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-devel-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-devel-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-docs-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-macros-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-obs-build-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-obs-build-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-source-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-syms-5.14.21-150400.24.170.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-syms-5.14.21-150400.24.170.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:reiserfs-kmp-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:reiserfs-kmp-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-64kb-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-64kb-devel-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-devel-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-docs-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-macros-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-source-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.170.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.170.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_170-default-1-150400.9.3.2.ppc64le",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_170-default-1-150400.9.3.2.s390x",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_170-default-1-150400.9.3.2.x86_64",
            "SUSE Linux Enterprise Micro 5.3:kernel-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise Micro 5.3:kernel-default-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise Micro 5.3:kernel-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Micro 5.3:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.aarch64",
            "SUSE Linux Enterprise Micro 5.3:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
            "SUSE Linux Enterprise Micro 5.4:kernel-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise Micro 5.4:kernel-default-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise Micro 5.4:kernel-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Micro 5.4:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.aarch64",
            "SUSE Linux Enterprise Micro 5.4:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-64kb-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-64kb-devel-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.aarch64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.ppc64le",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-devel-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-docs-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-macros-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-source-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.170.1.aarch64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.170.1.ppc64le",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.170.1.s390x",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.170.1.x86_64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-zfcpdump-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-devel-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-devel-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-devel-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-docs-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-macros-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-obs-build-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-obs-build-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-source-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-syms-5.14.21-150400.24.170.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-syms-5.14.21-150400.24.170.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Manager Proxy 4.3:kernel-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Manager Proxy 4.3:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
            "SUSE Manager Proxy 4.3:kernel-default-devel-5.14.21-150400.24.170.2.x86_64",
            "SUSE Manager Proxy 4.3:kernel-devel-5.14.21-150400.24.170.1.noarch",
            "SUSE Manager Proxy 4.3:kernel-macros-5.14.21-150400.24.170.1.noarch",
            "SUSE Manager Proxy 4.3:kernel-source-5.14.21-150400.24.170.1.noarch",
            "SUSE Manager Proxy 4.3:kernel-syms-5.14.21-150400.24.170.1.x86_64",
            "SUSE Manager Server 4.3:kernel-default-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Manager Server 4.3:kernel-default-5.14.21-150400.24.170.2.s390x",
            "SUSE Manager Server 4.3:kernel-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Manager Server 4.3:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.ppc64le",
            "SUSE Manager Server 4.3:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
            "SUSE Manager Server 4.3:kernel-default-devel-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Manager Server 4.3:kernel-default-devel-5.14.21-150400.24.170.2.s390x",
            "SUSE Manager Server 4.3:kernel-default-devel-5.14.21-150400.24.170.2.x86_64",
            "SUSE Manager Server 4.3:kernel-devel-5.14.21-150400.24.170.1.noarch",
            "SUSE Manager Server 4.3:kernel-macros-5.14.21-150400.24.170.1.noarch",
            "SUSE Manager Server 4.3:kernel-source-5.14.21-150400.24.170.1.noarch",
            "SUSE Manager Server 4.3:kernel-syms-5.14.21-150400.24.170.1.ppc64le",
            "SUSE Manager Server 4.3:kernel-syms-5.14.21-150400.24.170.1.s390x",
            "SUSE Manager Server 4.3:kernel-syms-5.14.21-150400.24.170.1.x86_64",
            "SUSE Manager Server 4.3:kernel-zfcpdump-5.14.21-150400.24.170.2.s390x"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2025-07-28T15:09:33Z",
          "details": "moderate"
        }
      ],
      "title": "CVE-2022-49966"
    },
    {
      "cve": "CVE-2022-49968",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2022-49968"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "In the Linux kernel, the following vulnerability has been resolved:\n\nieee802154/adf7242: defer destroy_workqueue call\n\nThere is a possible race condition (use-after-free) like below\n\n  (FREE)                     |  (USE)\n  adf7242_remove             |  adf7242_channel\n   cancel_delayed_work_sync  |\n    destroy_workqueue (1)    |   adf7242_cmd_rx\n                             |    mod_delayed_work (2)\n                             |\n\nThe root cause for this race is that the upper layer (ieee802154) is\nunaware of this detaching event and the function adf7242_channel can\nbe called without any checks.\n\nTo fix this, we can add a flag write at the beginning of adf7242_remove\nand add flag check in adf7242_channel. Or we can just defer the\ndestructive operation like other commit 3e0588c291d6 (\"hamradio: defer\nax25 kfree after unregister_netdev\") which let the\nieee802154_unregister_hw() to handle the synchronization. This patch\ntakes the second option.\n\nruns\")",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.170.2.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.170.2.s390x",
          "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.170.2.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.170.2.s390x",
          "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.170.2.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.170.2.s390x",
          "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.170.2.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.170.2.s390x",
          "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-64kb-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-64kb-devel-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-devel-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-devel-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-devel-5.14.21-150400.24.170.1.noarch",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-docs-5.14.21-150400.24.170.1.noarch",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-macros-5.14.21-150400.24.170.1.noarch",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-obs-build-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-obs-build-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-source-5.14.21-150400.24.170.1.noarch",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-syms-5.14.21-150400.24.170.1.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-syms-5.14.21-150400.24.170.1.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:reiserfs-kmp-default-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:reiserfs-kmp-default-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-64kb-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-64kb-devel-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-devel-5.14.21-150400.24.170.1.noarch",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-docs-5.14.21-150400.24.170.1.noarch",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-macros-5.14.21-150400.24.170.1.noarch",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-source-5.14.21-150400.24.170.1.noarch",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.170.1.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.170.1.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.170.2.ppc64le",
          "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.170.2.s390x",
          "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.170.2.ppc64le",
          "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.170.2.s390x",
          "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_170-default-1-150400.9.3.2.ppc64le",
          "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_170-default-1-150400.9.3.2.s390x",
          "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_170-default-1-150400.9.3.2.x86_64",
          "SUSE Linux Enterprise Micro 5.3:kernel-default-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise Micro 5.3:kernel-default-5.14.21-150400.24.170.2.s390x",
          "SUSE Linux Enterprise Micro 5.3:kernel-default-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise Micro 5.3:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.aarch64",
          "SUSE Linux Enterprise Micro 5.3:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
          "SUSE Linux Enterprise Micro 5.4:kernel-default-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise Micro 5.4:kernel-default-5.14.21-150400.24.170.2.s390x",
          "SUSE Linux Enterprise Micro 5.4:kernel-default-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise Micro 5.4:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.aarch64",
          "SUSE Linux Enterprise Micro 5.4:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-64kb-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-64kb-devel-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-5.14.21-150400.24.170.2.ppc64le",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-5.14.21-150400.24.170.2.s390x",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.aarch64",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.ppc64le",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.170.2.ppc64le",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.170.2.s390x",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-devel-5.14.21-150400.24.170.1.noarch",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-docs-5.14.21-150400.24.170.1.noarch",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-macros-5.14.21-150400.24.170.1.noarch",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.170.2.ppc64le",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.170.2.s390x",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-source-5.14.21-150400.24.170.1.noarch",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.170.1.aarch64",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.170.1.ppc64le",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.170.1.s390x",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.170.1.x86_64",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-zfcpdump-5.14.21-150400.24.170.2.s390x",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.170.2.ppc64le",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.170.2.s390x",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-5.14.21-150400.24.170.2.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-devel-5.14.21-150400.24.170.2.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-devel-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-devel-5.14.21-150400.24.170.1.noarch",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-docs-5.14.21-150400.24.170.1.noarch",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-macros-5.14.21-150400.24.170.1.noarch",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-obs-build-5.14.21-150400.24.170.2.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-obs-build-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-source-5.14.21-150400.24.170.1.noarch",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-syms-5.14.21-150400.24.170.1.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-syms-5.14.21-150400.24.170.1.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.170.2.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.170.2.x86_64",
          "SUSE Manager Proxy 4.3:kernel-default-5.14.21-150400.24.170.2.x86_64",
          "SUSE Manager Proxy 4.3:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
          "SUSE Manager Proxy 4.3:kernel-default-devel-5.14.21-150400.24.170.2.x86_64",
          "SUSE Manager Proxy 4.3:kernel-devel-5.14.21-150400.24.170.1.noarch",
          "SUSE Manager Proxy 4.3:kernel-macros-5.14.21-150400.24.170.1.noarch",
          "SUSE Manager Proxy 4.3:kernel-source-5.14.21-150400.24.170.1.noarch",
          "SUSE Manager Proxy 4.3:kernel-syms-5.14.21-150400.24.170.1.x86_64",
          "SUSE Manager Server 4.3:kernel-default-5.14.21-150400.24.170.2.ppc64le",
          "SUSE Manager Server 4.3:kernel-default-5.14.21-150400.24.170.2.s390x",
          "SUSE Manager Server 4.3:kernel-default-5.14.21-150400.24.170.2.x86_64",
          "SUSE Manager Server 4.3:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.ppc64le",
          "SUSE Manager Server 4.3:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
          "SUSE Manager Server 4.3:kernel-default-devel-5.14.21-150400.24.170.2.ppc64le",
          "SUSE Manager Server 4.3:kernel-default-devel-5.14.21-150400.24.170.2.s390x",
          "SUSE Manager Server 4.3:kernel-default-devel-5.14.21-150400.24.170.2.x86_64",
          "SUSE Manager Server 4.3:kernel-devel-5.14.21-150400.24.170.1.noarch",
          "SUSE Manager Server 4.3:kernel-macros-5.14.21-150400.24.170.1.noarch",
          "SUSE Manager Server 4.3:kernel-source-5.14.21-150400.24.170.1.noarch",
          "SUSE Manager Server 4.3:kernel-syms-5.14.21-150400.24.170.1.ppc64le",
          "SUSE Manager Server 4.3:kernel-syms-5.14.21-150400.24.170.1.s390x",
          "SUSE Manager Server 4.3:kernel-syms-5.14.21-150400.24.170.1.x86_64",
          "SUSE Manager Server 4.3:kernel-zfcpdump-5.14.21-150400.24.170.2.s390x"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2022-49968",
          "url": "https://www.suse.com/security/cve/CVE-2022-49968"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1244959 for CVE-2022-49968",
          "url": "https://bugzilla.suse.com/1244959"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-64kb-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-64kb-devel-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-devel-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-devel-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-devel-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-docs-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-macros-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-obs-build-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-obs-build-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-source-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-syms-5.14.21-150400.24.170.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-syms-5.14.21-150400.24.170.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:reiserfs-kmp-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:reiserfs-kmp-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-64kb-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-64kb-devel-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-devel-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-docs-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-macros-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-source-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.170.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.170.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_170-default-1-150400.9.3.2.ppc64le",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_170-default-1-150400.9.3.2.s390x",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_170-default-1-150400.9.3.2.x86_64",
            "SUSE Linux Enterprise Micro 5.3:kernel-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise Micro 5.3:kernel-default-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise Micro 5.3:kernel-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Micro 5.3:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.aarch64",
            "SUSE Linux Enterprise Micro 5.3:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
            "SUSE Linux Enterprise Micro 5.4:kernel-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise Micro 5.4:kernel-default-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise Micro 5.4:kernel-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Micro 5.4:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.aarch64",
            "SUSE Linux Enterprise Micro 5.4:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-64kb-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-64kb-devel-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.aarch64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.ppc64le",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-devel-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-docs-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-macros-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-source-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.170.1.aarch64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.170.1.ppc64le",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.170.1.s390x",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.170.1.x86_64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-zfcpdump-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-devel-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-devel-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-devel-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-docs-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-macros-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-obs-build-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-obs-build-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-source-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-syms-5.14.21-150400.24.170.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-syms-5.14.21-150400.24.170.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Manager Proxy 4.3:kernel-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Manager Proxy 4.3:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
            "SUSE Manager Proxy 4.3:kernel-default-devel-5.14.21-150400.24.170.2.x86_64",
            "SUSE Manager Proxy 4.3:kernel-devel-5.14.21-150400.24.170.1.noarch",
            "SUSE Manager Proxy 4.3:kernel-macros-5.14.21-150400.24.170.1.noarch",
            "SUSE Manager Proxy 4.3:kernel-source-5.14.21-150400.24.170.1.noarch",
            "SUSE Manager Proxy 4.3:kernel-syms-5.14.21-150400.24.170.1.x86_64",
            "SUSE Manager Server 4.3:kernel-default-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Manager Server 4.3:kernel-default-5.14.21-150400.24.170.2.s390x",
            "SUSE Manager Server 4.3:kernel-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Manager Server 4.3:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.ppc64le",
            "SUSE Manager Server 4.3:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
            "SUSE Manager Server 4.3:kernel-default-devel-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Manager Server 4.3:kernel-default-devel-5.14.21-150400.24.170.2.s390x",
            "SUSE Manager Server 4.3:kernel-default-devel-5.14.21-150400.24.170.2.x86_64",
            "SUSE Manager Server 4.3:kernel-devel-5.14.21-150400.24.170.1.noarch",
            "SUSE Manager Server 4.3:kernel-macros-5.14.21-150400.24.170.1.noarch",
            "SUSE Manager Server 4.3:kernel-source-5.14.21-150400.24.170.1.noarch",
            "SUSE Manager Server 4.3:kernel-syms-5.14.21-150400.24.170.1.ppc64le",
            "SUSE Manager Server 4.3:kernel-syms-5.14.21-150400.24.170.1.s390x",
            "SUSE Manager Server 4.3:kernel-syms-5.14.21-150400.24.170.1.x86_64",
            "SUSE Manager Server 4.3:kernel-zfcpdump-5.14.21-150400.24.170.2.s390x"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 5.5,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
            "version": "3.1"
          },
          "products": [
            "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-64kb-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-64kb-devel-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-devel-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-devel-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-devel-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-docs-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-macros-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-obs-build-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-obs-build-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-source-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-syms-5.14.21-150400.24.170.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-syms-5.14.21-150400.24.170.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:reiserfs-kmp-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:reiserfs-kmp-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-64kb-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-64kb-devel-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-devel-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-docs-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-macros-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-source-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.170.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.170.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_170-default-1-150400.9.3.2.ppc64le",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_170-default-1-150400.9.3.2.s390x",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_170-default-1-150400.9.3.2.x86_64",
            "SUSE Linux Enterprise Micro 5.3:kernel-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise Micro 5.3:kernel-default-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise Micro 5.3:kernel-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Micro 5.3:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.aarch64",
            "SUSE Linux Enterprise Micro 5.3:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
            "SUSE Linux Enterprise Micro 5.4:kernel-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise Micro 5.4:kernel-default-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise Micro 5.4:kernel-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Micro 5.4:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.aarch64",
            "SUSE Linux Enterprise Micro 5.4:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-64kb-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-64kb-devel-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.aarch64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.ppc64le",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-devel-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-docs-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-macros-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-source-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.170.1.aarch64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.170.1.ppc64le",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.170.1.s390x",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.170.1.x86_64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-zfcpdump-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-devel-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-devel-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-devel-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-docs-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-macros-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-obs-build-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-obs-build-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-source-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-syms-5.14.21-150400.24.170.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-syms-5.14.21-150400.24.170.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Manager Proxy 4.3:kernel-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Manager Proxy 4.3:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
            "SUSE Manager Proxy 4.3:kernel-default-devel-5.14.21-150400.24.170.2.x86_64",
            "SUSE Manager Proxy 4.3:kernel-devel-5.14.21-150400.24.170.1.noarch",
            "SUSE Manager Proxy 4.3:kernel-macros-5.14.21-150400.24.170.1.noarch",
            "SUSE Manager Proxy 4.3:kernel-source-5.14.21-150400.24.170.1.noarch",
            "SUSE Manager Proxy 4.3:kernel-syms-5.14.21-150400.24.170.1.x86_64",
            "SUSE Manager Server 4.3:kernel-default-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Manager Server 4.3:kernel-default-5.14.21-150400.24.170.2.s390x",
            "SUSE Manager Server 4.3:kernel-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Manager Server 4.3:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.ppc64le",
            "SUSE Manager Server 4.3:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
            "SUSE Manager Server 4.3:kernel-default-devel-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Manager Server 4.3:kernel-default-devel-5.14.21-150400.24.170.2.s390x",
            "SUSE Manager Server 4.3:kernel-default-devel-5.14.21-150400.24.170.2.x86_64",
            "SUSE Manager Server 4.3:kernel-devel-5.14.21-150400.24.170.1.noarch",
            "SUSE Manager Server 4.3:kernel-macros-5.14.21-150400.24.170.1.noarch",
            "SUSE Manager Server 4.3:kernel-source-5.14.21-150400.24.170.1.noarch",
            "SUSE Manager Server 4.3:kernel-syms-5.14.21-150400.24.170.1.ppc64le",
            "SUSE Manager Server 4.3:kernel-syms-5.14.21-150400.24.170.1.s390x",
            "SUSE Manager Server 4.3:kernel-syms-5.14.21-150400.24.170.1.x86_64",
            "SUSE Manager Server 4.3:kernel-zfcpdump-5.14.21-150400.24.170.2.s390x"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2025-07-28T15:09:33Z",
          "details": "moderate"
        }
      ],
      "title": "CVE-2022-49968"
    },
    {
      "cve": "CVE-2022-49969",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2022-49969"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "In the Linux kernel, the following vulnerability has been resolved:\n\ndrm/amd/display: clear optc underflow before turn off odm clock\n\n[Why]\nAfter ODM clock off, optc underflow bit will be kept there always and clear not work.\nWe need to clear that before clock off.\n\n[How]\nClear that if have when clock off.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.170.2.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.170.2.s390x",
          "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.170.2.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.170.2.s390x",
          "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.170.2.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.170.2.s390x",
          "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.170.2.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.170.2.s390x",
          "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-64kb-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-64kb-devel-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-devel-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-devel-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-devel-5.14.21-150400.24.170.1.noarch",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-docs-5.14.21-150400.24.170.1.noarch",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-macros-5.14.21-150400.24.170.1.noarch",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-obs-build-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-obs-build-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-source-5.14.21-150400.24.170.1.noarch",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-syms-5.14.21-150400.24.170.1.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-syms-5.14.21-150400.24.170.1.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:reiserfs-kmp-default-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:reiserfs-kmp-default-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-64kb-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-64kb-devel-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-devel-5.14.21-150400.24.170.1.noarch",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-docs-5.14.21-150400.24.170.1.noarch",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-macros-5.14.21-150400.24.170.1.noarch",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-source-5.14.21-150400.24.170.1.noarch",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.170.1.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.170.1.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.170.2.ppc64le",
          "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.170.2.s390x",
          "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.170.2.ppc64le",
          "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.170.2.s390x",
          "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_170-default-1-150400.9.3.2.ppc64le",
          "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_170-default-1-150400.9.3.2.s390x",
          "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_170-default-1-150400.9.3.2.x86_64",
          "SUSE Linux Enterprise Micro 5.3:kernel-default-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise Micro 5.3:kernel-default-5.14.21-150400.24.170.2.s390x",
          "SUSE Linux Enterprise Micro 5.3:kernel-default-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise Micro 5.3:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.aarch64",
          "SUSE Linux Enterprise Micro 5.3:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
          "SUSE Linux Enterprise Micro 5.4:kernel-default-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise Micro 5.4:kernel-default-5.14.21-150400.24.170.2.s390x",
          "SUSE Linux Enterprise Micro 5.4:kernel-default-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise Micro 5.4:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.aarch64",
          "SUSE Linux Enterprise Micro 5.4:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-64kb-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-64kb-devel-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-5.14.21-150400.24.170.2.ppc64le",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-5.14.21-150400.24.170.2.s390x",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.aarch64",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.ppc64le",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.170.2.ppc64le",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.170.2.s390x",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-devel-5.14.21-150400.24.170.1.noarch",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-docs-5.14.21-150400.24.170.1.noarch",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-macros-5.14.21-150400.24.170.1.noarch",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.170.2.ppc64le",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.170.2.s390x",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-source-5.14.21-150400.24.170.1.noarch",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.170.1.aarch64",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.170.1.ppc64le",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.170.1.s390x",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.170.1.x86_64",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-zfcpdump-5.14.21-150400.24.170.2.s390x",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.170.2.ppc64le",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.170.2.s390x",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-5.14.21-150400.24.170.2.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-devel-5.14.21-150400.24.170.2.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-devel-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-devel-5.14.21-150400.24.170.1.noarch",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-docs-5.14.21-150400.24.170.1.noarch",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-macros-5.14.21-150400.24.170.1.noarch",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-obs-build-5.14.21-150400.24.170.2.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-obs-build-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-source-5.14.21-150400.24.170.1.noarch",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-syms-5.14.21-150400.24.170.1.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-syms-5.14.21-150400.24.170.1.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.170.2.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.170.2.x86_64",
          "SUSE Manager Proxy 4.3:kernel-default-5.14.21-150400.24.170.2.x86_64",
          "SUSE Manager Proxy 4.3:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
          "SUSE Manager Proxy 4.3:kernel-default-devel-5.14.21-150400.24.170.2.x86_64",
          "SUSE Manager Proxy 4.3:kernel-devel-5.14.21-150400.24.170.1.noarch",
          "SUSE Manager Proxy 4.3:kernel-macros-5.14.21-150400.24.170.1.noarch",
          "SUSE Manager Proxy 4.3:kernel-source-5.14.21-150400.24.170.1.noarch",
          "SUSE Manager Proxy 4.3:kernel-syms-5.14.21-150400.24.170.1.x86_64",
          "SUSE Manager Server 4.3:kernel-default-5.14.21-150400.24.170.2.ppc64le",
          "SUSE Manager Server 4.3:kernel-default-5.14.21-150400.24.170.2.s390x",
          "SUSE Manager Server 4.3:kernel-default-5.14.21-150400.24.170.2.x86_64",
          "SUSE Manager Server 4.3:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.ppc64le",
          "SUSE Manager Server 4.3:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
          "SUSE Manager Server 4.3:kernel-default-devel-5.14.21-150400.24.170.2.ppc64le",
          "SUSE Manager Server 4.3:kernel-default-devel-5.14.21-150400.24.170.2.s390x",
          "SUSE Manager Server 4.3:kernel-default-devel-5.14.21-150400.24.170.2.x86_64",
          "SUSE Manager Server 4.3:kernel-devel-5.14.21-150400.24.170.1.noarch",
          "SUSE Manager Server 4.3:kernel-macros-5.14.21-150400.24.170.1.noarch",
          "SUSE Manager Server 4.3:kernel-source-5.14.21-150400.24.170.1.noarch",
          "SUSE Manager Server 4.3:kernel-syms-5.14.21-150400.24.170.1.ppc64le",
          "SUSE Manager Server 4.3:kernel-syms-5.14.21-150400.24.170.1.s390x",
          "SUSE Manager Server 4.3:kernel-syms-5.14.21-150400.24.170.1.x86_64",
          "SUSE Manager Server 4.3:kernel-zfcpdump-5.14.21-150400.24.170.2.s390x"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2022-49969",
          "url": "https://www.suse.com/security/cve/CVE-2022-49969"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1245060 for CVE-2022-49969",
          "url": "https://bugzilla.suse.com/1245060"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-64kb-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-64kb-devel-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-devel-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-devel-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-devel-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-docs-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-macros-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-obs-build-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-obs-build-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-source-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-syms-5.14.21-150400.24.170.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-syms-5.14.21-150400.24.170.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:reiserfs-kmp-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:reiserfs-kmp-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-64kb-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-64kb-devel-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-devel-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-docs-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-macros-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-source-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.170.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.170.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_170-default-1-150400.9.3.2.ppc64le",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_170-default-1-150400.9.3.2.s390x",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_170-default-1-150400.9.3.2.x86_64",
            "SUSE Linux Enterprise Micro 5.3:kernel-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise Micro 5.3:kernel-default-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise Micro 5.3:kernel-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Micro 5.3:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.aarch64",
            "SUSE Linux Enterprise Micro 5.3:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
            "SUSE Linux Enterprise Micro 5.4:kernel-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise Micro 5.4:kernel-default-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise Micro 5.4:kernel-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Micro 5.4:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.aarch64",
            "SUSE Linux Enterprise Micro 5.4:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-64kb-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-64kb-devel-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.aarch64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.ppc64le",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-devel-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-docs-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-macros-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-source-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.170.1.aarch64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.170.1.ppc64le",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.170.1.s390x",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.170.1.x86_64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-zfcpdump-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-devel-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-devel-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-devel-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-docs-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-macros-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-obs-build-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-obs-build-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-source-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-syms-5.14.21-150400.24.170.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-syms-5.14.21-150400.24.170.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Manager Proxy 4.3:kernel-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Manager Proxy 4.3:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
            "SUSE Manager Proxy 4.3:kernel-default-devel-5.14.21-150400.24.170.2.x86_64",
            "SUSE Manager Proxy 4.3:kernel-devel-5.14.21-150400.24.170.1.noarch",
            "SUSE Manager Proxy 4.3:kernel-macros-5.14.21-150400.24.170.1.noarch",
            "SUSE Manager Proxy 4.3:kernel-source-5.14.21-150400.24.170.1.noarch",
            "SUSE Manager Proxy 4.3:kernel-syms-5.14.21-150400.24.170.1.x86_64",
            "SUSE Manager Server 4.3:kernel-default-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Manager Server 4.3:kernel-default-5.14.21-150400.24.170.2.s390x",
            "SUSE Manager Server 4.3:kernel-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Manager Server 4.3:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.ppc64le",
            "SUSE Manager Server 4.3:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
            "SUSE Manager Server 4.3:kernel-default-devel-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Manager Server 4.3:kernel-default-devel-5.14.21-150400.24.170.2.s390x",
            "SUSE Manager Server 4.3:kernel-default-devel-5.14.21-150400.24.170.2.x86_64",
            "SUSE Manager Server 4.3:kernel-devel-5.14.21-150400.24.170.1.noarch",
            "SUSE Manager Server 4.3:kernel-macros-5.14.21-150400.24.170.1.noarch",
            "SUSE Manager Server 4.3:kernel-source-5.14.21-150400.24.170.1.noarch",
            "SUSE Manager Server 4.3:kernel-syms-5.14.21-150400.24.170.1.ppc64le",
            "SUSE Manager Server 4.3:kernel-syms-5.14.21-150400.24.170.1.s390x",
            "SUSE Manager Server 4.3:kernel-syms-5.14.21-150400.24.170.1.x86_64",
            "SUSE Manager Server 4.3:kernel-zfcpdump-5.14.21-150400.24.170.2.s390x"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 3.3,
            "baseSeverity": "LOW",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L",
            "version": "3.1"
          },
          "products": [
            "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-64kb-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-64kb-devel-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-devel-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-devel-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-devel-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-docs-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-macros-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-obs-build-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-obs-build-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-source-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-syms-5.14.21-150400.24.170.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-syms-5.14.21-150400.24.170.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:reiserfs-kmp-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:reiserfs-kmp-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-64kb-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-64kb-devel-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-devel-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-docs-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-macros-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-source-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.170.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.170.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_170-default-1-150400.9.3.2.ppc64le",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_170-default-1-150400.9.3.2.s390x",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_170-default-1-150400.9.3.2.x86_64",
            "SUSE Linux Enterprise Micro 5.3:kernel-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise Micro 5.3:kernel-default-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise Micro 5.3:kernel-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Micro 5.3:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.aarch64",
            "SUSE Linux Enterprise Micro 5.3:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
            "SUSE Linux Enterprise Micro 5.4:kernel-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise Micro 5.4:kernel-default-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise Micro 5.4:kernel-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Micro 5.4:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.aarch64",
            "SUSE Linux Enterprise Micro 5.4:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-64kb-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-64kb-devel-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.aarch64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.ppc64le",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-devel-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-docs-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-macros-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-source-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.170.1.aarch64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.170.1.ppc64le",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.170.1.s390x",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.170.1.x86_64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-zfcpdump-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-devel-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-devel-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-devel-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-docs-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-macros-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-obs-build-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-obs-build-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-source-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-syms-5.14.21-150400.24.170.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-syms-5.14.21-150400.24.170.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Manager Proxy 4.3:kernel-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Manager Proxy 4.3:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
            "SUSE Manager Proxy 4.3:kernel-default-devel-5.14.21-150400.24.170.2.x86_64",
            "SUSE Manager Proxy 4.3:kernel-devel-5.14.21-150400.24.170.1.noarch",
            "SUSE Manager Proxy 4.3:kernel-macros-5.14.21-150400.24.170.1.noarch",
            "SUSE Manager Proxy 4.3:kernel-source-5.14.21-150400.24.170.1.noarch",
            "SUSE Manager Proxy 4.3:kernel-syms-5.14.21-150400.24.170.1.x86_64",
            "SUSE Manager Server 4.3:kernel-default-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Manager Server 4.3:kernel-default-5.14.21-150400.24.170.2.s390x",
            "SUSE Manager Server 4.3:kernel-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Manager Server 4.3:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.ppc64le",
            "SUSE Manager Server 4.3:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
            "SUSE Manager Server 4.3:kernel-default-devel-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Manager Server 4.3:kernel-default-devel-5.14.21-150400.24.170.2.s390x",
            "SUSE Manager Server 4.3:kernel-default-devel-5.14.21-150400.24.170.2.x86_64",
            "SUSE Manager Server 4.3:kernel-devel-5.14.21-150400.24.170.1.noarch",
            "SUSE Manager Server 4.3:kernel-macros-5.14.21-150400.24.170.1.noarch",
            "SUSE Manager Server 4.3:kernel-source-5.14.21-150400.24.170.1.noarch",
            "SUSE Manager Server 4.3:kernel-syms-5.14.21-150400.24.170.1.ppc64le",
            "SUSE Manager Server 4.3:kernel-syms-5.14.21-150400.24.170.1.s390x",
            "SUSE Manager Server 4.3:kernel-syms-5.14.21-150400.24.170.1.x86_64",
            "SUSE Manager Server 4.3:kernel-zfcpdump-5.14.21-150400.24.170.2.s390x"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2025-07-28T15:09:33Z",
          "details": "low"
        }
      ],
      "title": "CVE-2022-49969"
    },
    {
      "cve": "CVE-2022-49977",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2022-49977"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "In the Linux kernel, the following vulnerability has been resolved:\n\nftrace: Fix NULL pointer dereference in is_ftrace_trampoline when ftrace is dead\n\nftrace_startup does not remove ops from ftrace_ops_list when\nftrace_startup_enable fails:\n\nregister_ftrace_function\n  ftrace_startup\n    __register_ftrace_function\n      ...\n      add_ftrace_ops(\u0026ftrace_ops_list, ops)\n      ...\n    ...\n    ftrace_startup_enable // if ftrace failed to modify, ftrace_disabled is set to 1\n    ...\n  return 0 // ops is in the ftrace_ops_list.\n\nWhen ftrace_disabled = 1, unregister_ftrace_function simply returns without doing anything:\nunregister_ftrace_function\n  ftrace_shutdown\n    if (unlikely(ftrace_disabled))\n            return -ENODEV;  // return here, __unregister_ftrace_function is not executed,\n                             // as a result, ops is still in the ftrace_ops_list\n    __unregister_ftrace_function\n    ...\n\nIf ops is dynamically allocated, it will be free later, in this case,\nis_ftrace_trampoline accesses NULL pointer:\n\nis_ftrace_trampoline\n  ftrace_ops_trampoline\n    do_for_each_ftrace_op(op, ftrace_ops_list) // OOPS! op may be NULL!\n\nSyzkaller reports as follows:\n[ 1203.506103] BUG: kernel NULL pointer dereference, address: 000000000000010b\n[ 1203.508039] #PF: supervisor read access in kernel mode\n[ 1203.508798] #PF: error_code(0x0000) - not-present page\n[ 1203.509558] PGD 800000011660b067 P4D 800000011660b067 PUD 130fb8067 PMD 0\n[ 1203.510560] Oops: 0000 [#1] SMP KASAN PTI\n[ 1203.511189] CPU: 6 PID: 29532 Comm: syz-executor.2 Tainted: G    B   W         5.10.0 #8\n[ 1203.512324] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS rel-1.14.0-0-g155821a1990b-prebuilt.qemu.org 04/01/2014\n[ 1203.513895] RIP: 0010:is_ftrace_trampoline+0x26/0xb0\n[ 1203.514644] Code: ff eb d3 90 41 55 41 54 49 89 fc 55 53 e8 f2 00 fd ff 48 8b 1d 3b 35 5d 03 e8 e6 00 fd ff 48 8d bb 90 00 00 00 e8 2a 81 26 00 \u003c48\u003e 8b ab 90 00 00 00 48 85 ed 74 1d e8 c9 00 fd ff 48 8d bb 98 00\n[ 1203.518838] RSP: 0018:ffffc900012cf960 EFLAGS: 00010246\n[ 1203.520092] RAX: 0000000000000000 RBX: 000000000000007b RCX: ffffffff8a331866\n[ 1203.521469] RDX: 0000000000000000 RSI: 0000000000000008 RDI: 000000000000010b\n[ 1203.522583] RBP: 0000000000000000 R08: 0000000000000000 R09: ffffffff8df18b07\n[ 1203.523550] R10: fffffbfff1be3160 R11: 0000000000000001 R12: 0000000000478399\n[ 1203.524596] R13: 0000000000000000 R14: ffff888145088000 R15: 0000000000000008\n[ 1203.525634] FS:  00007f429f5f4700(0000) GS:ffff8881daf00000(0000) knlGS:0000000000000000\n[ 1203.526801] CS:  0010 DS: 0000 ES: 0000 CR0: 0000000080050033\n[ 1203.527626] CR2: 000000000000010b CR3: 0000000170e1e001 CR4: 00000000003706e0\n[ 1203.528611] DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000\n[ 1203.529605] DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400\n\nTherefore, when ftrace_startup_enable fails, we need to rollback registration\nprocess and remove ops from ftrace_ops_list.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.170.2.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.170.2.s390x",
          "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.170.2.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.170.2.s390x",
          "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.170.2.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.170.2.s390x",
          "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.170.2.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.170.2.s390x",
          "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-64kb-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-64kb-devel-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-devel-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-devel-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-devel-5.14.21-150400.24.170.1.noarch",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-docs-5.14.21-150400.24.170.1.noarch",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-macros-5.14.21-150400.24.170.1.noarch",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-obs-build-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-obs-build-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-source-5.14.21-150400.24.170.1.noarch",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-syms-5.14.21-150400.24.170.1.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-syms-5.14.21-150400.24.170.1.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:reiserfs-kmp-default-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:reiserfs-kmp-default-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-64kb-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-64kb-devel-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-devel-5.14.21-150400.24.170.1.noarch",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-docs-5.14.21-150400.24.170.1.noarch",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-macros-5.14.21-150400.24.170.1.noarch",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-source-5.14.21-150400.24.170.1.noarch",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.170.1.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.170.1.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.170.2.ppc64le",
          "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.170.2.s390x",
          "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.170.2.ppc64le",
          "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.170.2.s390x",
          "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_170-default-1-150400.9.3.2.ppc64le",
          "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_170-default-1-150400.9.3.2.s390x",
          "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_170-default-1-150400.9.3.2.x86_64",
          "SUSE Linux Enterprise Micro 5.3:kernel-default-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise Micro 5.3:kernel-default-5.14.21-150400.24.170.2.s390x",
          "SUSE Linux Enterprise Micro 5.3:kernel-default-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise Micro 5.3:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.aarch64",
          "SUSE Linux Enterprise Micro 5.3:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
          "SUSE Linux Enterprise Micro 5.4:kernel-default-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise Micro 5.4:kernel-default-5.14.21-150400.24.170.2.s390x",
          "SUSE Linux Enterprise Micro 5.4:kernel-default-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise Micro 5.4:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.aarch64",
          "SUSE Linux Enterprise Micro 5.4:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-64kb-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-64kb-devel-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-5.14.21-150400.24.170.2.ppc64le",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-5.14.21-150400.24.170.2.s390x",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.aarch64",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.ppc64le",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.170.2.ppc64le",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.170.2.s390x",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-devel-5.14.21-150400.24.170.1.noarch",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-docs-5.14.21-150400.24.170.1.noarch",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-macros-5.14.21-150400.24.170.1.noarch",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.170.2.ppc64le",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.170.2.s390x",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-source-5.14.21-150400.24.170.1.noarch",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.170.1.aarch64",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.170.1.ppc64le",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.170.1.s390x",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.170.1.x86_64",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-zfcpdump-5.14.21-150400.24.170.2.s390x",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.170.2.ppc64le",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.170.2.s390x",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-5.14.21-150400.24.170.2.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-devel-5.14.21-150400.24.170.2.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-devel-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-devel-5.14.21-150400.24.170.1.noarch",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-docs-5.14.21-150400.24.170.1.noarch",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-macros-5.14.21-150400.24.170.1.noarch",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-obs-build-5.14.21-150400.24.170.2.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-obs-build-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-source-5.14.21-150400.24.170.1.noarch",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-syms-5.14.21-150400.24.170.1.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-syms-5.14.21-150400.24.170.1.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.170.2.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.170.2.x86_64",
          "SUSE Manager Proxy 4.3:kernel-default-5.14.21-150400.24.170.2.x86_64",
          "SUSE Manager Proxy 4.3:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
          "SUSE Manager Proxy 4.3:kernel-default-devel-5.14.21-150400.24.170.2.x86_64",
          "SUSE Manager Proxy 4.3:kernel-devel-5.14.21-150400.24.170.1.noarch",
          "SUSE Manager Proxy 4.3:kernel-macros-5.14.21-150400.24.170.1.noarch",
          "SUSE Manager Proxy 4.3:kernel-source-5.14.21-150400.24.170.1.noarch",
          "SUSE Manager Proxy 4.3:kernel-syms-5.14.21-150400.24.170.1.x86_64",
          "SUSE Manager Server 4.3:kernel-default-5.14.21-150400.24.170.2.ppc64le",
          "SUSE Manager Server 4.3:kernel-default-5.14.21-150400.24.170.2.s390x",
          "SUSE Manager Server 4.3:kernel-default-5.14.21-150400.24.170.2.x86_64",
          "SUSE Manager Server 4.3:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.ppc64le",
          "SUSE Manager Server 4.3:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
          "SUSE Manager Server 4.3:kernel-default-devel-5.14.21-150400.24.170.2.ppc64le",
          "SUSE Manager Server 4.3:kernel-default-devel-5.14.21-150400.24.170.2.s390x",
          "SUSE Manager Server 4.3:kernel-default-devel-5.14.21-150400.24.170.2.x86_64",
          "SUSE Manager Server 4.3:kernel-devel-5.14.21-150400.24.170.1.noarch",
          "SUSE Manager Server 4.3:kernel-macros-5.14.21-150400.24.170.1.noarch",
          "SUSE Manager Server 4.3:kernel-source-5.14.21-150400.24.170.1.noarch",
          "SUSE Manager Server 4.3:kernel-syms-5.14.21-150400.24.170.1.ppc64le",
          "SUSE Manager Server 4.3:kernel-syms-5.14.21-150400.24.170.1.s390x",
          "SUSE Manager Server 4.3:kernel-syms-5.14.21-150400.24.170.1.x86_64",
          "SUSE Manager Server 4.3:kernel-zfcpdump-5.14.21-150400.24.170.2.s390x"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2022-49977",
          "url": "https://www.suse.com/security/cve/CVE-2022-49977"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1244936 for CVE-2022-49977",
          "url": "https://bugzilla.suse.com/1244936"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-64kb-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-64kb-devel-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-devel-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-devel-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-devel-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-docs-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-macros-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-obs-build-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-obs-build-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-source-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-syms-5.14.21-150400.24.170.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-syms-5.14.21-150400.24.170.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:reiserfs-kmp-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:reiserfs-kmp-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-64kb-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-64kb-devel-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-devel-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-docs-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-macros-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-source-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.170.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.170.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_170-default-1-150400.9.3.2.ppc64le",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_170-default-1-150400.9.3.2.s390x",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_170-default-1-150400.9.3.2.x86_64",
            "SUSE Linux Enterprise Micro 5.3:kernel-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise Micro 5.3:kernel-default-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise Micro 5.3:kernel-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Micro 5.3:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.aarch64",
            "SUSE Linux Enterprise Micro 5.3:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
            "SUSE Linux Enterprise Micro 5.4:kernel-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise Micro 5.4:kernel-default-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise Micro 5.4:kernel-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Micro 5.4:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.aarch64",
            "SUSE Linux Enterprise Micro 5.4:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-64kb-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-64kb-devel-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.aarch64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.ppc64le",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-devel-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-docs-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-macros-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-source-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.170.1.aarch64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.170.1.ppc64le",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.170.1.s390x",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.170.1.x86_64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-zfcpdump-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-devel-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-devel-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-devel-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-docs-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-macros-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-obs-build-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-obs-build-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-source-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-syms-5.14.21-150400.24.170.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-syms-5.14.21-150400.24.170.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Manager Proxy 4.3:kernel-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Manager Proxy 4.3:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
            "SUSE Manager Proxy 4.3:kernel-default-devel-5.14.21-150400.24.170.2.x86_64",
            "SUSE Manager Proxy 4.3:kernel-devel-5.14.21-150400.24.170.1.noarch",
            "SUSE Manager Proxy 4.3:kernel-macros-5.14.21-150400.24.170.1.noarch",
            "SUSE Manager Proxy 4.3:kernel-source-5.14.21-150400.24.170.1.noarch",
            "SUSE Manager Proxy 4.3:kernel-syms-5.14.21-150400.24.170.1.x86_64",
            "SUSE Manager Server 4.3:kernel-default-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Manager Server 4.3:kernel-default-5.14.21-150400.24.170.2.s390x",
            "SUSE Manager Server 4.3:kernel-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Manager Server 4.3:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.ppc64le",
            "SUSE Manager Server 4.3:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
            "SUSE Manager Server 4.3:kernel-default-devel-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Manager Server 4.3:kernel-default-devel-5.14.21-150400.24.170.2.s390x",
            "SUSE Manager Server 4.3:kernel-default-devel-5.14.21-150400.24.170.2.x86_64",
            "SUSE Manager Server 4.3:kernel-devel-5.14.21-150400.24.170.1.noarch",
            "SUSE Manager Server 4.3:kernel-macros-5.14.21-150400.24.170.1.noarch",
            "SUSE Manager Server 4.3:kernel-source-5.14.21-150400.24.170.1.noarch",
            "SUSE Manager Server 4.3:kernel-syms-5.14.21-150400.24.170.1.ppc64le",
            "SUSE Manager Server 4.3:kernel-syms-5.14.21-150400.24.170.1.s390x",
            "SUSE Manager Server 4.3:kernel-syms-5.14.21-150400.24.170.1.x86_64",
            "SUSE Manager Server 4.3:kernel-zfcpdump-5.14.21-150400.24.170.2.s390x"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 4.4,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H",
            "version": "3.1"
          },
          "products": [
            "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-64kb-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-64kb-devel-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-devel-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-devel-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-devel-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-docs-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-macros-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-obs-build-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-obs-build-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-source-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-syms-5.14.21-150400.24.170.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-syms-5.14.21-150400.24.170.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:reiserfs-kmp-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:reiserfs-kmp-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-64kb-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-64kb-devel-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-devel-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-docs-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-macros-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-source-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.170.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.170.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_170-default-1-150400.9.3.2.ppc64le",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_170-default-1-150400.9.3.2.s390x",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_170-default-1-150400.9.3.2.x86_64",
            "SUSE Linux Enterprise Micro 5.3:kernel-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise Micro 5.3:kernel-default-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise Micro 5.3:kernel-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Micro 5.3:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.aarch64",
            "SUSE Linux Enterprise Micro 5.3:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
            "SUSE Linux Enterprise Micro 5.4:kernel-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise Micro 5.4:kernel-default-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise Micro 5.4:kernel-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Micro 5.4:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.aarch64",
            "SUSE Linux Enterprise Micro 5.4:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-64kb-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-64kb-devel-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.aarch64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.ppc64le",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-devel-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-docs-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-macros-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-source-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.170.1.aarch64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.170.1.ppc64le",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.170.1.s390x",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.170.1.x86_64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-zfcpdump-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-devel-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-devel-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-devel-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-docs-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-macros-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-obs-build-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-obs-build-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-source-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-syms-5.14.21-150400.24.170.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-syms-5.14.21-150400.24.170.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Manager Proxy 4.3:kernel-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Manager Proxy 4.3:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
            "SUSE Manager Proxy 4.3:kernel-default-devel-5.14.21-150400.24.170.2.x86_64",
            "SUSE Manager Proxy 4.3:kernel-devel-5.14.21-150400.24.170.1.noarch",
            "SUSE Manager Proxy 4.3:kernel-macros-5.14.21-150400.24.170.1.noarch",
            "SUSE Manager Proxy 4.3:kernel-source-5.14.21-150400.24.170.1.noarch",
            "SUSE Manager Proxy 4.3:kernel-syms-5.14.21-150400.24.170.1.x86_64",
            "SUSE Manager Server 4.3:kernel-default-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Manager Server 4.3:kernel-default-5.14.21-150400.24.170.2.s390x",
            "SUSE Manager Server 4.3:kernel-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Manager Server 4.3:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.ppc64le",
            "SUSE Manager Server 4.3:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
            "SUSE Manager Server 4.3:kernel-default-devel-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Manager Server 4.3:kernel-default-devel-5.14.21-150400.24.170.2.s390x",
            "SUSE Manager Server 4.3:kernel-default-devel-5.14.21-150400.24.170.2.x86_64",
            "SUSE Manager Server 4.3:kernel-devel-5.14.21-150400.24.170.1.noarch",
            "SUSE Manager Server 4.3:kernel-macros-5.14.21-150400.24.170.1.noarch",
            "SUSE Manager Server 4.3:kernel-source-5.14.21-150400.24.170.1.noarch",
            "SUSE Manager Server 4.3:kernel-syms-5.14.21-150400.24.170.1.ppc64le",
            "SUSE Manager Server 4.3:kernel-syms-5.14.21-150400.24.170.1.s390x",
            "SUSE Manager Server 4.3:kernel-syms-5.14.21-150400.24.170.1.x86_64",
            "SUSE Manager Server 4.3:kernel-zfcpdump-5.14.21-150400.24.170.2.s390x"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2025-07-28T15:09:33Z",
          "details": "moderate"
        }
      ],
      "title": "CVE-2022-49977"
    },
    {
      "cve": "CVE-2022-49978",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2022-49978"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "In the Linux kernel, the following vulnerability has been resolved:\n\nfbdev: fb_pm2fb: Avoid potential divide by zero error\n\nIn `do_fb_ioctl()` of fbmem.c, if cmd is FBIOPUT_VSCREENINFO, var will be\ncopied from user, then go through `fb_set_var()` and\n`info-\u003efbops-\u003efb_check_var()` which could may be `pm2fb_check_var()`.\nAlong the path, `var-\u003epixclock` won\u0027t be modified. This function checks\nwhether reciprocal of `var-\u003epixclock` is too high. If `var-\u003epixclock` is\nzero, there will be a divide by zero error. So, it is necessary to check\nwhether denominator is zero to avoid crash. As this bug is found by\nSyzkaller, logs are listed below.\n\ndivide error in pm2fb_check_var\nCall Trace:\n \u003cTASK\u003e\n fb_set_var+0x367/0xeb0 drivers/video/fbdev/core/fbmem.c:1015\n do_fb_ioctl+0x234/0x670 drivers/video/fbdev/core/fbmem.c:1110\n fb_ioctl+0xdd/0x130 drivers/video/fbdev/core/fbmem.c:1189",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.170.2.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.170.2.s390x",
          "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.170.2.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.170.2.s390x",
          "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.170.2.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.170.2.s390x",
          "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.170.2.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.170.2.s390x",
          "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-64kb-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-64kb-devel-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-devel-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-devel-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-devel-5.14.21-150400.24.170.1.noarch",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-docs-5.14.21-150400.24.170.1.noarch",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-macros-5.14.21-150400.24.170.1.noarch",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-obs-build-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-obs-build-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-source-5.14.21-150400.24.170.1.noarch",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-syms-5.14.21-150400.24.170.1.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-syms-5.14.21-150400.24.170.1.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:reiserfs-kmp-default-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:reiserfs-kmp-default-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-64kb-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-64kb-devel-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-devel-5.14.21-150400.24.170.1.noarch",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-docs-5.14.21-150400.24.170.1.noarch",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-macros-5.14.21-150400.24.170.1.noarch",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-source-5.14.21-150400.24.170.1.noarch",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.170.1.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.170.1.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.170.2.ppc64le",
          "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.170.2.s390x",
          "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.170.2.ppc64le",
          "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.170.2.s390x",
          "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_170-default-1-150400.9.3.2.ppc64le",
          "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_170-default-1-150400.9.3.2.s390x",
          "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_170-default-1-150400.9.3.2.x86_64",
          "SUSE Linux Enterprise Micro 5.3:kernel-default-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise Micro 5.3:kernel-default-5.14.21-150400.24.170.2.s390x",
          "SUSE Linux Enterprise Micro 5.3:kernel-default-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise Micro 5.3:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.aarch64",
          "SUSE Linux Enterprise Micro 5.3:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
          "SUSE Linux Enterprise Micro 5.4:kernel-default-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise Micro 5.4:kernel-default-5.14.21-150400.24.170.2.s390x",
          "SUSE Linux Enterprise Micro 5.4:kernel-default-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise Micro 5.4:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.aarch64",
          "SUSE Linux Enterprise Micro 5.4:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-64kb-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-64kb-devel-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-5.14.21-150400.24.170.2.ppc64le",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-5.14.21-150400.24.170.2.s390x",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.aarch64",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.ppc64le",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.170.2.ppc64le",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.170.2.s390x",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-devel-5.14.21-150400.24.170.1.noarch",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-docs-5.14.21-150400.24.170.1.noarch",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-macros-5.14.21-150400.24.170.1.noarch",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.170.2.ppc64le",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.170.2.s390x",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-source-5.14.21-150400.24.170.1.noarch",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.170.1.aarch64",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.170.1.ppc64le",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.170.1.s390x",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.170.1.x86_64",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-zfcpdump-5.14.21-150400.24.170.2.s390x",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.170.2.ppc64le",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.170.2.s390x",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-5.14.21-150400.24.170.2.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-devel-5.14.21-150400.24.170.2.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-devel-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-devel-5.14.21-150400.24.170.1.noarch",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-docs-5.14.21-150400.24.170.1.noarch",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-macros-5.14.21-150400.24.170.1.noarch",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-obs-build-5.14.21-150400.24.170.2.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-obs-build-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-source-5.14.21-150400.24.170.1.noarch",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-syms-5.14.21-150400.24.170.1.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-syms-5.14.21-150400.24.170.1.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.170.2.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.170.2.x86_64",
          "SUSE Manager Proxy 4.3:kernel-default-5.14.21-150400.24.170.2.x86_64",
          "SUSE Manager Proxy 4.3:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
          "SUSE Manager Proxy 4.3:kernel-default-devel-5.14.21-150400.24.170.2.x86_64",
          "SUSE Manager Proxy 4.3:kernel-devel-5.14.21-150400.24.170.1.noarch",
          "SUSE Manager Proxy 4.3:kernel-macros-5.14.21-150400.24.170.1.noarch",
          "SUSE Manager Proxy 4.3:kernel-source-5.14.21-150400.24.170.1.noarch",
          "SUSE Manager Proxy 4.3:kernel-syms-5.14.21-150400.24.170.1.x86_64",
          "SUSE Manager Server 4.3:kernel-default-5.14.21-150400.24.170.2.ppc64le",
          "SUSE Manager Server 4.3:kernel-default-5.14.21-150400.24.170.2.s390x",
          "SUSE Manager Server 4.3:kernel-default-5.14.21-150400.24.170.2.x86_64",
          "SUSE Manager Server 4.3:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.ppc64le",
          "SUSE Manager Server 4.3:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
          "SUSE Manager Server 4.3:kernel-default-devel-5.14.21-150400.24.170.2.ppc64le",
          "SUSE Manager Server 4.3:kernel-default-devel-5.14.21-150400.24.170.2.s390x",
          "SUSE Manager Server 4.3:kernel-default-devel-5.14.21-150400.24.170.2.x86_64",
          "SUSE Manager Server 4.3:kernel-devel-5.14.21-150400.24.170.1.noarch",
          "SUSE Manager Server 4.3:kernel-macros-5.14.21-150400.24.170.1.noarch",
          "SUSE Manager Server 4.3:kernel-source-5.14.21-150400.24.170.1.noarch",
          "SUSE Manager Server 4.3:kernel-syms-5.14.21-150400.24.170.1.ppc64le",
          "SUSE Manager Server 4.3:kernel-syms-5.14.21-150400.24.170.1.s390x",
          "SUSE Manager Server 4.3:kernel-syms-5.14.21-150400.24.170.1.x86_64",
          "SUSE Manager Server 4.3:kernel-zfcpdump-5.14.21-150400.24.170.2.s390x"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2022-49978",
          "url": "https://www.suse.com/security/cve/CVE-2022-49978"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1245195 for CVE-2022-49978",
          "url": "https://bugzilla.suse.com/1245195"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-64kb-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-64kb-devel-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-devel-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-devel-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-devel-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-docs-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-macros-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-obs-build-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-obs-build-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-source-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-syms-5.14.21-150400.24.170.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-syms-5.14.21-150400.24.170.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:reiserfs-kmp-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:reiserfs-kmp-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-64kb-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-64kb-devel-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-devel-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-docs-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-macros-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-source-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.170.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.170.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_170-default-1-150400.9.3.2.ppc64le",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_170-default-1-150400.9.3.2.s390x",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_170-default-1-150400.9.3.2.x86_64",
            "SUSE Linux Enterprise Micro 5.3:kernel-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise Micro 5.3:kernel-default-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise Micro 5.3:kernel-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Micro 5.3:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.aarch64",
            "SUSE Linux Enterprise Micro 5.3:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
            "SUSE Linux Enterprise Micro 5.4:kernel-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise Micro 5.4:kernel-default-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise Micro 5.4:kernel-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Micro 5.4:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.aarch64",
            "SUSE Linux Enterprise Micro 5.4:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-64kb-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-64kb-devel-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.aarch64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.ppc64le",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-devel-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-docs-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-macros-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-source-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.170.1.aarch64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.170.1.ppc64le",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.170.1.s390x",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.170.1.x86_64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-zfcpdump-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-devel-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-devel-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-devel-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-docs-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-macros-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-obs-build-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-obs-build-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-source-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-syms-5.14.21-150400.24.170.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-syms-5.14.21-150400.24.170.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Manager Proxy 4.3:kernel-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Manager Proxy 4.3:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
            "SUSE Manager Proxy 4.3:kernel-default-devel-5.14.21-150400.24.170.2.x86_64",
            "SUSE Manager Proxy 4.3:kernel-devel-5.14.21-150400.24.170.1.noarch",
            "SUSE Manager Proxy 4.3:kernel-macros-5.14.21-150400.24.170.1.noarch",
            "SUSE Manager Proxy 4.3:kernel-source-5.14.21-150400.24.170.1.noarch",
            "SUSE Manager Proxy 4.3:kernel-syms-5.14.21-150400.24.170.1.x86_64",
            "SUSE Manager Server 4.3:kernel-default-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Manager Server 4.3:kernel-default-5.14.21-150400.24.170.2.s390x",
            "SUSE Manager Server 4.3:kernel-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Manager Server 4.3:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.ppc64le",
            "SUSE Manager Server 4.3:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
            "SUSE Manager Server 4.3:kernel-default-devel-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Manager Server 4.3:kernel-default-devel-5.14.21-150400.24.170.2.s390x",
            "SUSE Manager Server 4.3:kernel-default-devel-5.14.21-150400.24.170.2.x86_64",
            "SUSE Manager Server 4.3:kernel-devel-5.14.21-150400.24.170.1.noarch",
            "SUSE Manager Server 4.3:kernel-macros-5.14.21-150400.24.170.1.noarch",
            "SUSE Manager Server 4.3:kernel-source-5.14.21-150400.24.170.1.noarch",
            "SUSE Manager Server 4.3:kernel-syms-5.14.21-150400.24.170.1.ppc64le",
            "SUSE Manager Server 4.3:kernel-syms-5.14.21-150400.24.170.1.s390x",
            "SUSE Manager Server 4.3:kernel-syms-5.14.21-150400.24.170.1.x86_64",
            "SUSE Manager Server 4.3:kernel-zfcpdump-5.14.21-150400.24.170.2.s390x"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 5.5,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
            "version": "3.1"
          },
          "products": [
            "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-64kb-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-64kb-devel-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-devel-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-devel-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-devel-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-docs-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-macros-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-obs-build-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-obs-build-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-source-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-syms-5.14.21-150400.24.170.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-syms-5.14.21-150400.24.170.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:reiserfs-kmp-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:reiserfs-kmp-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-64kb-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-64kb-devel-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-devel-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-docs-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-macros-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-source-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.170.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.170.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_170-default-1-150400.9.3.2.ppc64le",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_170-default-1-150400.9.3.2.s390x",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_170-default-1-150400.9.3.2.x86_64",
            "SUSE Linux Enterprise Micro 5.3:kernel-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise Micro 5.3:kernel-default-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise Micro 5.3:kernel-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Micro 5.3:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.aarch64",
            "SUSE Linux Enterprise Micro 5.3:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
            "SUSE Linux Enterprise Micro 5.4:kernel-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise Micro 5.4:kernel-default-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise Micro 5.4:kernel-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Micro 5.4:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.aarch64",
            "SUSE Linux Enterprise Micro 5.4:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-64kb-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-64kb-devel-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.aarch64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.ppc64le",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-devel-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-docs-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-macros-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-source-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.170.1.aarch64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.170.1.ppc64le",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.170.1.s390x",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.170.1.x86_64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-zfcpdump-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-devel-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-devel-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-devel-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-docs-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-macros-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-obs-build-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-obs-build-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-source-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-syms-5.14.21-150400.24.170.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-syms-5.14.21-150400.24.170.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Manager Proxy 4.3:kernel-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Manager Proxy 4.3:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
            "SUSE Manager Proxy 4.3:kernel-default-devel-5.14.21-150400.24.170.2.x86_64",
            "SUSE Manager Proxy 4.3:kernel-devel-5.14.21-150400.24.170.1.noarch",
            "SUSE Manager Proxy 4.3:kernel-macros-5.14.21-150400.24.170.1.noarch",
            "SUSE Manager Proxy 4.3:kernel-source-5.14.21-150400.24.170.1.noarch",
            "SUSE Manager Proxy 4.3:kernel-syms-5.14.21-150400.24.170.1.x86_64",
            "SUSE Manager Server 4.3:kernel-default-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Manager Server 4.3:kernel-default-5.14.21-150400.24.170.2.s390x",
            "SUSE Manager Server 4.3:kernel-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Manager Server 4.3:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.ppc64le",
            "SUSE Manager Server 4.3:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
            "SUSE Manager Server 4.3:kernel-default-devel-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Manager Server 4.3:kernel-default-devel-5.14.21-150400.24.170.2.s390x",
            "SUSE Manager Server 4.3:kernel-default-devel-5.14.21-150400.24.170.2.x86_64",
            "SUSE Manager Server 4.3:kernel-devel-5.14.21-150400.24.170.1.noarch",
            "SUSE Manager Server 4.3:kernel-macros-5.14.21-150400.24.170.1.noarch",
            "SUSE Manager Server 4.3:kernel-source-5.14.21-150400.24.170.1.noarch",
            "SUSE Manager Server 4.3:kernel-syms-5.14.21-150400.24.170.1.ppc64le",
            "SUSE Manager Server 4.3:kernel-syms-5.14.21-150400.24.170.1.s390x",
            "SUSE Manager Server 4.3:kernel-syms-5.14.21-150400.24.170.1.x86_64",
            "SUSE Manager Server 4.3:kernel-zfcpdump-5.14.21-150400.24.170.2.s390x"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2025-07-28T15:09:33Z",
          "details": "moderate"
        }
      ],
      "title": "CVE-2022-49978"
    },
    {
      "cve": "CVE-2022-49981",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2022-49981"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "In the Linux kernel, the following vulnerability has been resolved:\n\nHID: hidraw: fix memory leak in hidraw_release()\n\nFree the buffered reports before deleting the list entry.\n\nBUG: memory leak\nunreferenced object 0xffff88810e72f180 (size 32):\n  comm \"softirq\", pid 0, jiffies 4294945143 (age 16.080s)\n  hex dump (first 32 bytes):\n    64 f3 c6 6a d1 88 07 04 00 00 00 00 00 00 00 00  d..j............\n    00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00  ................\n  backtrace:\n    [\u003cffffffff814ac6c3\u003e] kmemdup+0x23/0x50 mm/util.c:128\n    [\u003cffffffff8357c1d2\u003e] kmemdup include/linux/fortify-string.h:440 [inline]\n    [\u003cffffffff8357c1d2\u003e] hidraw_report_event+0xa2/0x150 drivers/hid/hidraw.c:521\n    [\u003cffffffff8356ddad\u003e] hid_report_raw_event+0x27d/0x740 drivers/hid/hid-core.c:1992\n    [\u003cffffffff8356e41e\u003e] hid_input_report+0x1ae/0x270 drivers/hid/hid-core.c:2065\n    [\u003cffffffff835f0d3f\u003e] hid_irq_in+0x1ff/0x250 drivers/hid/usbhid/hid-core.c:284\n    [\u003cffffffff82d3c7f9\u003e] __usb_hcd_giveback_urb+0xf9/0x230 drivers/usb/core/hcd.c:1670\n    [\u003cffffffff82d3cc26\u003e] usb_hcd_giveback_urb+0x1b6/0x1d0 drivers/usb/core/hcd.c:1747\n    [\u003cffffffff82ef1e14\u003e] dummy_timer+0x8e4/0x14c0 drivers/usb/gadget/udc/dummy_hcd.c:1988\n    [\u003cffffffff812f50a8\u003e] call_timer_fn+0x38/0x200 kernel/time/timer.c:1474\n    [\u003cffffffff812f5586\u003e] expire_timers kernel/time/timer.c:1519 [inline]\n    [\u003cffffffff812f5586\u003e] __run_timers.part.0+0x316/0x430 kernel/time/timer.c:1790\n    [\u003cffffffff812f56e4\u003e] __run_timers kernel/time/timer.c:1768 [inline]\n    [\u003cffffffff812f56e4\u003e] run_timer_softirq+0x44/0x90 kernel/time/timer.c:1803\n    [\u003cffffffff848000e6\u003e] __do_softirq+0xe6/0x2ea kernel/softirq.c:571\n    [\u003cffffffff81246db0\u003e] invoke_softirq kernel/softirq.c:445 [inline]\n    [\u003cffffffff81246db0\u003e] __irq_exit_rcu kernel/softirq.c:650 [inline]\n    [\u003cffffffff81246db0\u003e] irq_exit_rcu+0xc0/0x110 kernel/softirq.c:662\n    [\u003cffffffff84574f02\u003e] sysvec_apic_timer_interrupt+0xa2/0xd0 arch/x86/kernel/apic/apic.c:1106\n    [\u003cffffffff84600c8b\u003e] asm_sysvec_apic_timer_interrupt+0x1b/0x20 arch/x86/include/asm/idtentry.h:649\n    [\u003cffffffff8458a070\u003e] native_safe_halt arch/x86/include/asm/irqflags.h:51 [inline]\n    [\u003cffffffff8458a070\u003e] arch_safe_halt arch/x86/include/asm/irqflags.h:89 [inline]\n    [\u003cffffffff8458a070\u003e] acpi_safe_halt drivers/acpi/processor_idle.c:111 [inline]\n    [\u003cffffffff8458a070\u003e] acpi_idle_do_entry+0xc0/0xd0 drivers/acpi/processor_idle.c:554",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.170.2.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.170.2.s390x",
          "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.170.2.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.170.2.s390x",
          "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.170.2.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.170.2.s390x",
          "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.170.2.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.170.2.s390x",
          "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-64kb-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-64kb-devel-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-devel-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-devel-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-devel-5.14.21-150400.24.170.1.noarch",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-docs-5.14.21-150400.24.170.1.noarch",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-macros-5.14.21-150400.24.170.1.noarch",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-obs-build-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-obs-build-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-source-5.14.21-150400.24.170.1.noarch",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-syms-5.14.21-150400.24.170.1.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-syms-5.14.21-150400.24.170.1.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:reiserfs-kmp-default-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:reiserfs-kmp-default-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-64kb-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-64kb-devel-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-devel-5.14.21-150400.24.170.1.noarch",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-docs-5.14.21-150400.24.170.1.noarch",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-macros-5.14.21-150400.24.170.1.noarch",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-source-5.14.21-150400.24.170.1.noarch",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.170.1.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.170.1.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.170.2.ppc64le",
          "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.170.2.s390x",
          "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.170.2.ppc64le",
          "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.170.2.s390x",
          "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_170-default-1-150400.9.3.2.ppc64le",
          "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_170-default-1-150400.9.3.2.s390x",
          "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_170-default-1-150400.9.3.2.x86_64",
          "SUSE Linux Enterprise Micro 5.3:kernel-default-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise Micro 5.3:kernel-default-5.14.21-150400.24.170.2.s390x",
          "SUSE Linux Enterprise Micro 5.3:kernel-default-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise Micro 5.3:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.aarch64",
          "SUSE Linux Enterprise Micro 5.3:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
          "SUSE Linux Enterprise Micro 5.4:kernel-default-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise Micro 5.4:kernel-default-5.14.21-150400.24.170.2.s390x",
          "SUSE Linux Enterprise Micro 5.4:kernel-default-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise Micro 5.4:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.aarch64",
          "SUSE Linux Enterprise Micro 5.4:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-64kb-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-64kb-devel-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-5.14.21-150400.24.170.2.ppc64le",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-5.14.21-150400.24.170.2.s390x",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.aarch64",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.ppc64le",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.170.2.ppc64le",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.170.2.s390x",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-devel-5.14.21-150400.24.170.1.noarch",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-docs-5.14.21-150400.24.170.1.noarch",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-macros-5.14.21-150400.24.170.1.noarch",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.170.2.ppc64le",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.170.2.s390x",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-source-5.14.21-150400.24.170.1.noarch",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.170.1.aarch64",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.170.1.ppc64le",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.170.1.s390x",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.170.1.x86_64",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-zfcpdump-5.14.21-150400.24.170.2.s390x",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.170.2.ppc64le",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.170.2.s390x",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-5.14.21-150400.24.170.2.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-devel-5.14.21-150400.24.170.2.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-devel-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-devel-5.14.21-150400.24.170.1.noarch",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-docs-5.14.21-150400.24.170.1.noarch",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-macros-5.14.21-150400.24.170.1.noarch",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-obs-build-5.14.21-150400.24.170.2.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-obs-build-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-source-5.14.21-150400.24.170.1.noarch",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-syms-5.14.21-150400.24.170.1.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-syms-5.14.21-150400.24.170.1.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.170.2.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.170.2.x86_64",
          "SUSE Manager Proxy 4.3:kernel-default-5.14.21-150400.24.170.2.x86_64",
          "SUSE Manager Proxy 4.3:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
          "SUSE Manager Proxy 4.3:kernel-default-devel-5.14.21-150400.24.170.2.x86_64",
          "SUSE Manager Proxy 4.3:kernel-devel-5.14.21-150400.24.170.1.noarch",
          "SUSE Manager Proxy 4.3:kernel-macros-5.14.21-150400.24.170.1.noarch",
          "SUSE Manager Proxy 4.3:kernel-source-5.14.21-150400.24.170.1.noarch",
          "SUSE Manager Proxy 4.3:kernel-syms-5.14.21-150400.24.170.1.x86_64",
          "SUSE Manager Server 4.3:kernel-default-5.14.21-150400.24.170.2.ppc64le",
          "SUSE Manager Server 4.3:kernel-default-5.14.21-150400.24.170.2.s390x",
          "SUSE Manager Server 4.3:kernel-default-5.14.21-150400.24.170.2.x86_64",
          "SUSE Manager Server 4.3:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.ppc64le",
          "SUSE Manager Server 4.3:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
          "SUSE Manager Server 4.3:kernel-default-devel-5.14.21-150400.24.170.2.ppc64le",
          "SUSE Manager Server 4.3:kernel-default-devel-5.14.21-150400.24.170.2.s390x",
          "SUSE Manager Server 4.3:kernel-default-devel-5.14.21-150400.24.170.2.x86_64",
          "SUSE Manager Server 4.3:kernel-devel-5.14.21-150400.24.170.1.noarch",
          "SUSE Manager Server 4.3:kernel-macros-5.14.21-150400.24.170.1.noarch",
          "SUSE Manager Server 4.3:kernel-source-5.14.21-150400.24.170.1.noarch",
          "SUSE Manager Server 4.3:kernel-syms-5.14.21-150400.24.170.1.ppc64le",
          "SUSE Manager Server 4.3:kernel-syms-5.14.21-150400.24.170.1.s390x",
          "SUSE Manager Server 4.3:kernel-syms-5.14.21-150400.24.170.1.x86_64",
          "SUSE Manager Server 4.3:kernel-zfcpdump-5.14.21-150400.24.170.2.s390x"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2022-49981",
          "url": "https://www.suse.com/security/cve/CVE-2022-49981"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1245072 for CVE-2022-49981",
          "url": "https://bugzilla.suse.com/1245072"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-64kb-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-64kb-devel-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-devel-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-devel-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-devel-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-docs-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-macros-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-obs-build-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-obs-build-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-source-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-syms-5.14.21-150400.24.170.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-syms-5.14.21-150400.24.170.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:reiserfs-kmp-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:reiserfs-kmp-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-64kb-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-64kb-devel-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-devel-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-docs-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-macros-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-source-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.170.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.170.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_170-default-1-150400.9.3.2.ppc64le",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_170-default-1-150400.9.3.2.s390x",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_170-default-1-150400.9.3.2.x86_64",
            "SUSE Linux Enterprise Micro 5.3:kernel-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise Micro 5.3:kernel-default-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise Micro 5.3:kernel-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Micro 5.3:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.aarch64",
            "SUSE Linux Enterprise Micro 5.3:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
            "SUSE Linux Enterprise Micro 5.4:kernel-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise Micro 5.4:kernel-default-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise Micro 5.4:kernel-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Micro 5.4:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.aarch64",
            "SUSE Linux Enterprise Micro 5.4:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-64kb-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-64kb-devel-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.aarch64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.ppc64le",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-devel-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-docs-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-macros-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-source-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.170.1.aarch64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.170.1.ppc64le",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.170.1.s390x",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.170.1.x86_64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-zfcpdump-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-devel-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-devel-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-devel-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-docs-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-macros-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-obs-build-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-obs-build-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-source-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-syms-5.14.21-150400.24.170.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-syms-5.14.21-150400.24.170.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Manager Proxy 4.3:kernel-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Manager Proxy 4.3:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
            "SUSE Manager Proxy 4.3:kernel-default-devel-5.14.21-150400.24.170.2.x86_64",
            "SUSE Manager Proxy 4.3:kernel-devel-5.14.21-150400.24.170.1.noarch",
            "SUSE Manager Proxy 4.3:kernel-macros-5.14.21-150400.24.170.1.noarch",
            "SUSE Manager Proxy 4.3:kernel-source-5.14.21-150400.24.170.1.noarch",
            "SUSE Manager Proxy 4.3:kernel-syms-5.14.21-150400.24.170.1.x86_64",
            "SUSE Manager Server 4.3:kernel-default-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Manager Server 4.3:kernel-default-5.14.21-150400.24.170.2.s390x",
            "SUSE Manager Server 4.3:kernel-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Manager Server 4.3:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.ppc64le",
            "SUSE Manager Server 4.3:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
            "SUSE Manager Server 4.3:kernel-default-devel-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Manager Server 4.3:kernel-default-devel-5.14.21-150400.24.170.2.s390x",
            "SUSE Manager Server 4.3:kernel-default-devel-5.14.21-150400.24.170.2.x86_64",
            "SUSE Manager Server 4.3:kernel-devel-5.14.21-150400.24.170.1.noarch",
            "SUSE Manager Server 4.3:kernel-macros-5.14.21-150400.24.170.1.noarch",
            "SUSE Manager Server 4.3:kernel-source-5.14.21-150400.24.170.1.noarch",
            "SUSE Manager Server 4.3:kernel-syms-5.14.21-150400.24.170.1.ppc64le",
            "SUSE Manager Server 4.3:kernel-syms-5.14.21-150400.24.170.1.s390x",
            "SUSE Manager Server 4.3:kernel-syms-5.14.21-150400.24.170.1.x86_64",
            "SUSE Manager Server 4.3:kernel-zfcpdump-5.14.21-150400.24.170.2.s390x"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 5.5,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
            "version": "3.1"
          },
          "products": [
            "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-64kb-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-64kb-devel-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-devel-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-devel-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-devel-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-docs-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-macros-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-obs-build-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-obs-build-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-source-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-syms-5.14.21-150400.24.170.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-syms-5.14.21-150400.24.170.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:reiserfs-kmp-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:reiserfs-kmp-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-64kb-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-64kb-devel-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-devel-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-docs-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-macros-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-source-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.170.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.170.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_170-default-1-150400.9.3.2.ppc64le",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_170-default-1-150400.9.3.2.s390x",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_170-default-1-150400.9.3.2.x86_64",
            "SUSE Linux Enterprise Micro 5.3:kernel-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise Micro 5.3:kernel-default-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise Micro 5.3:kernel-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Micro 5.3:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.aarch64",
            "SUSE Linux Enterprise Micro 5.3:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
            "SUSE Linux Enterprise Micro 5.4:kernel-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise Micro 5.4:kernel-default-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise Micro 5.4:kernel-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Micro 5.4:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.aarch64",
            "SUSE Linux Enterprise Micro 5.4:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-64kb-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-64kb-devel-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.aarch64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.ppc64le",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-devel-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-docs-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-macros-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-source-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.170.1.aarch64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.170.1.ppc64le",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.170.1.s390x",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.170.1.x86_64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-zfcpdump-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-devel-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-devel-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-devel-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-docs-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-macros-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-obs-build-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-obs-build-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-source-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-syms-5.14.21-150400.24.170.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-syms-5.14.21-150400.24.170.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Manager Proxy 4.3:kernel-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Manager Proxy 4.3:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
            "SUSE Manager Proxy 4.3:kernel-default-devel-5.14.21-150400.24.170.2.x86_64",
            "SUSE Manager Proxy 4.3:kernel-devel-5.14.21-150400.24.170.1.noarch",
            "SUSE Manager Proxy 4.3:kernel-macros-5.14.21-150400.24.170.1.noarch",
            "SUSE Manager Proxy 4.3:kernel-source-5.14.21-150400.24.170.1.noarch",
            "SUSE Manager Proxy 4.3:kernel-syms-5.14.21-150400.24.170.1.x86_64",
            "SUSE Manager Server 4.3:kernel-default-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Manager Server 4.3:kernel-default-5.14.21-150400.24.170.2.s390x",
            "SUSE Manager Server 4.3:kernel-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Manager Server 4.3:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.ppc64le",
            "SUSE Manager Server 4.3:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
            "SUSE Manager Server 4.3:kernel-default-devel-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Manager Server 4.3:kernel-default-devel-5.14.21-150400.24.170.2.s390x",
            "SUSE Manager Server 4.3:kernel-default-devel-5.14.21-150400.24.170.2.x86_64",
            "SUSE Manager Server 4.3:kernel-devel-5.14.21-150400.24.170.1.noarch",
            "SUSE Manager Server 4.3:kernel-macros-5.14.21-150400.24.170.1.noarch",
            "SUSE Manager Server 4.3:kernel-source-5.14.21-150400.24.170.1.noarch",
            "SUSE Manager Server 4.3:kernel-syms-5.14.21-150400.24.170.1.ppc64le",
            "SUSE Manager Server 4.3:kernel-syms-5.14.21-150400.24.170.1.s390x",
            "SUSE Manager Server 4.3:kernel-syms-5.14.21-150400.24.170.1.x86_64",
            "SUSE Manager Server 4.3:kernel-zfcpdump-5.14.21-150400.24.170.2.s390x"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2025-07-28T15:09:33Z",
          "details": "moderate"
        }
      ],
      "title": "CVE-2022-49981"
    },
    {
      "cve": "CVE-2022-49982",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2022-49982"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "In the Linux kernel, the following vulnerability has been resolved:\n\nmedia: pvrusb2: fix memory leak in pvr_probe\n\nThe error handling code in pvr2_hdw_create forgets to unregister the\nv4l2 device. When pvr2_hdw_create returns back to pvr2_context_create,\nit calls pvr2_context_destroy to destroy context, but mp-\u003ehdw is NULL,\nwhich leads to that pvr2_hdw_destroy directly returns.\n\nFix this by adding v4l2_device_unregister to decrease the refcount of\nusb interface.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.170.2.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.170.2.s390x",
          "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.170.2.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.170.2.s390x",
          "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.170.2.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.170.2.s390x",
          "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.170.2.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.170.2.s390x",
          "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-64kb-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-64kb-devel-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-devel-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-devel-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-devel-5.14.21-150400.24.170.1.noarch",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-docs-5.14.21-150400.24.170.1.noarch",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-macros-5.14.21-150400.24.170.1.noarch",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-obs-build-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-obs-build-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-source-5.14.21-150400.24.170.1.noarch",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-syms-5.14.21-150400.24.170.1.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-syms-5.14.21-150400.24.170.1.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:reiserfs-kmp-default-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:reiserfs-kmp-default-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-64kb-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-64kb-devel-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-devel-5.14.21-150400.24.170.1.noarch",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-docs-5.14.21-150400.24.170.1.noarch",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-macros-5.14.21-150400.24.170.1.noarch",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-source-5.14.21-150400.24.170.1.noarch",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.170.1.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.170.1.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.170.2.ppc64le",
          "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.170.2.s390x",
          "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.170.2.ppc64le",
          "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.170.2.s390x",
          "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_170-default-1-150400.9.3.2.ppc64le",
          "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_170-default-1-150400.9.3.2.s390x",
          "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_170-default-1-150400.9.3.2.x86_64",
          "SUSE Linux Enterprise Micro 5.3:kernel-default-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise Micro 5.3:kernel-default-5.14.21-150400.24.170.2.s390x",
          "SUSE Linux Enterprise Micro 5.3:kernel-default-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise Micro 5.3:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.aarch64",
          "SUSE Linux Enterprise Micro 5.3:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
          "SUSE Linux Enterprise Micro 5.4:kernel-default-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise Micro 5.4:kernel-default-5.14.21-150400.24.170.2.s390x",
          "SUSE Linux Enterprise Micro 5.4:kernel-default-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise Micro 5.4:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.aarch64",
          "SUSE Linux Enterprise Micro 5.4:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-64kb-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-64kb-devel-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-5.14.21-150400.24.170.2.ppc64le",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-5.14.21-150400.24.170.2.s390x",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.aarch64",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.ppc64le",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.170.2.ppc64le",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.170.2.s390x",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-devel-5.14.21-150400.24.170.1.noarch",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-docs-5.14.21-150400.24.170.1.noarch",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-macros-5.14.21-150400.24.170.1.noarch",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.170.2.ppc64le",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.170.2.s390x",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-source-5.14.21-150400.24.170.1.noarch",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.170.1.aarch64",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.170.1.ppc64le",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.170.1.s390x",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.170.1.x86_64",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-zfcpdump-5.14.21-150400.24.170.2.s390x",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.170.2.ppc64le",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.170.2.s390x",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-5.14.21-150400.24.170.2.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-devel-5.14.21-150400.24.170.2.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-devel-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-devel-5.14.21-150400.24.170.1.noarch",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-docs-5.14.21-150400.24.170.1.noarch",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-macros-5.14.21-150400.24.170.1.noarch",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-obs-build-5.14.21-150400.24.170.2.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-obs-build-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-source-5.14.21-150400.24.170.1.noarch",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-syms-5.14.21-150400.24.170.1.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-syms-5.14.21-150400.24.170.1.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.170.2.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.170.2.x86_64",
          "SUSE Manager Proxy 4.3:kernel-default-5.14.21-150400.24.170.2.x86_64",
          "SUSE Manager Proxy 4.3:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
          "SUSE Manager Proxy 4.3:kernel-default-devel-5.14.21-150400.24.170.2.x86_64",
          "SUSE Manager Proxy 4.3:kernel-devel-5.14.21-150400.24.170.1.noarch",
          "SUSE Manager Proxy 4.3:kernel-macros-5.14.21-150400.24.170.1.noarch",
          "SUSE Manager Proxy 4.3:kernel-source-5.14.21-150400.24.170.1.noarch",
          "SUSE Manager Proxy 4.3:kernel-syms-5.14.21-150400.24.170.1.x86_64",
          "SUSE Manager Server 4.3:kernel-default-5.14.21-150400.24.170.2.ppc64le",
          "SUSE Manager Server 4.3:kernel-default-5.14.21-150400.24.170.2.s390x",
          "SUSE Manager Server 4.3:kernel-default-5.14.21-150400.24.170.2.x86_64",
          "SUSE Manager Server 4.3:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.ppc64le",
          "SUSE Manager Server 4.3:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
          "SUSE Manager Server 4.3:kernel-default-devel-5.14.21-150400.24.170.2.ppc64le",
          "SUSE Manager Server 4.3:kernel-default-devel-5.14.21-150400.24.170.2.s390x",
          "SUSE Manager Server 4.3:kernel-default-devel-5.14.21-150400.24.170.2.x86_64",
          "SUSE Manager Server 4.3:kernel-devel-5.14.21-150400.24.170.1.noarch",
          "SUSE Manager Server 4.3:kernel-macros-5.14.21-150400.24.170.1.noarch",
          "SUSE Manager Server 4.3:kernel-source-5.14.21-150400.24.170.1.noarch",
          "SUSE Manager Server 4.3:kernel-syms-5.14.21-150400.24.170.1.ppc64le",
          "SUSE Manager Server 4.3:kernel-syms-5.14.21-150400.24.170.1.s390x",
          "SUSE Manager Server 4.3:kernel-syms-5.14.21-150400.24.170.1.x86_64",
          "SUSE Manager Server 4.3:kernel-zfcpdump-5.14.21-150400.24.170.2.s390x"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2022-49982",
          "url": "https://www.suse.com/security/cve/CVE-2022-49982"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1245069 for CVE-2022-49982",
          "url": "https://bugzilla.suse.com/1245069"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-64kb-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-64kb-devel-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-devel-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-devel-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-devel-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-docs-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-macros-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-obs-build-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-obs-build-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-source-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-syms-5.14.21-150400.24.170.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-syms-5.14.21-150400.24.170.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:reiserfs-kmp-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:reiserfs-kmp-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-64kb-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-64kb-devel-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-devel-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-docs-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-macros-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-source-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.170.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.170.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_170-default-1-150400.9.3.2.ppc64le",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_170-default-1-150400.9.3.2.s390x",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_170-default-1-150400.9.3.2.x86_64",
            "SUSE Linux Enterprise Micro 5.3:kernel-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise Micro 5.3:kernel-default-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise Micro 5.3:kernel-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Micro 5.3:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.aarch64",
            "SUSE Linux Enterprise Micro 5.3:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
            "SUSE Linux Enterprise Micro 5.4:kernel-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise Micro 5.4:kernel-default-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise Micro 5.4:kernel-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Micro 5.4:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.aarch64",
            "SUSE Linux Enterprise Micro 5.4:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-64kb-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-64kb-devel-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.aarch64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.ppc64le",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-devel-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-docs-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-macros-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-source-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.170.1.aarch64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.170.1.ppc64le",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.170.1.s390x",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.170.1.x86_64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-zfcpdump-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-devel-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-devel-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-devel-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-docs-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-macros-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-obs-build-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-obs-build-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-source-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-syms-5.14.21-150400.24.170.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-syms-5.14.21-150400.24.170.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Manager Proxy 4.3:kernel-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Manager Proxy 4.3:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
            "SUSE Manager Proxy 4.3:kernel-default-devel-5.14.21-150400.24.170.2.x86_64",
            "SUSE Manager Proxy 4.3:kernel-devel-5.14.21-150400.24.170.1.noarch",
            "SUSE Manager Proxy 4.3:kernel-macros-5.14.21-150400.24.170.1.noarch",
            "SUSE Manager Proxy 4.3:kernel-source-5.14.21-150400.24.170.1.noarch",
            "SUSE Manager Proxy 4.3:kernel-syms-5.14.21-150400.24.170.1.x86_64",
            "SUSE Manager Server 4.3:kernel-default-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Manager Server 4.3:kernel-default-5.14.21-150400.24.170.2.s390x",
            "SUSE Manager Server 4.3:kernel-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Manager Server 4.3:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.ppc64le",
            "SUSE Manager Server 4.3:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
            "SUSE Manager Server 4.3:kernel-default-devel-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Manager Server 4.3:kernel-default-devel-5.14.21-150400.24.170.2.s390x",
            "SUSE Manager Server 4.3:kernel-default-devel-5.14.21-150400.24.170.2.x86_64",
            "SUSE Manager Server 4.3:kernel-devel-5.14.21-150400.24.170.1.noarch",
            "SUSE Manager Server 4.3:kernel-macros-5.14.21-150400.24.170.1.noarch",
            "SUSE Manager Server 4.3:kernel-source-5.14.21-150400.24.170.1.noarch",
            "SUSE Manager Server 4.3:kernel-syms-5.14.21-150400.24.170.1.ppc64le",
            "SUSE Manager Server 4.3:kernel-syms-5.14.21-150400.24.170.1.s390x",
            "SUSE Manager Server 4.3:kernel-syms-5.14.21-150400.24.170.1.x86_64",
            "SUSE Manager Server 4.3:kernel-zfcpdump-5.14.21-150400.24.170.2.s390x"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 5.5,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
            "version": "3.1"
          },
          "products": [
            "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-64kb-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-64kb-devel-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-devel-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-devel-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-devel-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-docs-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-macros-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-obs-build-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-obs-build-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-source-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-syms-5.14.21-150400.24.170.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-syms-5.14.21-150400.24.170.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:reiserfs-kmp-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:reiserfs-kmp-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-64kb-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-64kb-devel-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-devel-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-docs-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-macros-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-source-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.170.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.170.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_170-default-1-150400.9.3.2.ppc64le",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_170-default-1-150400.9.3.2.s390x",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_170-default-1-150400.9.3.2.x86_64",
            "SUSE Linux Enterprise Micro 5.3:kernel-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise Micro 5.3:kernel-default-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise Micro 5.3:kernel-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Micro 5.3:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.aarch64",
            "SUSE Linux Enterprise Micro 5.3:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
            "SUSE Linux Enterprise Micro 5.4:kernel-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise Micro 5.4:kernel-default-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise Micro 5.4:kernel-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Micro 5.4:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.aarch64",
            "SUSE Linux Enterprise Micro 5.4:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-64kb-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-64kb-devel-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.aarch64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.ppc64le",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-devel-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-docs-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-macros-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-source-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.170.1.aarch64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.170.1.ppc64le",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.170.1.s390x",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.170.1.x86_64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-zfcpdump-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-devel-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-devel-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-devel-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-docs-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-macros-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-obs-build-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-obs-build-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-source-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-syms-5.14.21-150400.24.170.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-syms-5.14.21-150400.24.170.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Manager Proxy 4.3:kernel-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Manager Proxy 4.3:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
            "SUSE Manager Proxy 4.3:kernel-default-devel-5.14.21-150400.24.170.2.x86_64",
            "SUSE Manager Proxy 4.3:kernel-devel-5.14.21-150400.24.170.1.noarch",
            "SUSE Manager Proxy 4.3:kernel-macros-5.14.21-150400.24.170.1.noarch",
            "SUSE Manager Proxy 4.3:kernel-source-5.14.21-150400.24.170.1.noarch",
            "SUSE Manager Proxy 4.3:kernel-syms-5.14.21-150400.24.170.1.x86_64",
            "SUSE Manager Server 4.3:kernel-default-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Manager Server 4.3:kernel-default-5.14.21-150400.24.170.2.s390x",
            "SUSE Manager Server 4.3:kernel-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Manager Server 4.3:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.ppc64le",
            "SUSE Manager Server 4.3:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
            "SUSE Manager Server 4.3:kernel-default-devel-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Manager Server 4.3:kernel-default-devel-5.14.21-150400.24.170.2.s390x",
            "SUSE Manager Server 4.3:kernel-default-devel-5.14.21-150400.24.170.2.x86_64",
            "SUSE Manager Server 4.3:kernel-devel-5.14.21-150400.24.170.1.noarch",
            "SUSE Manager Server 4.3:kernel-macros-5.14.21-150400.24.170.1.noarch",
            "SUSE Manager Server 4.3:kernel-source-5.14.21-150400.24.170.1.noarch",
            "SUSE Manager Server 4.3:kernel-syms-5.14.21-150400.24.170.1.ppc64le",
            "SUSE Manager Server 4.3:kernel-syms-5.14.21-150400.24.170.1.s390x",
            "SUSE Manager Server 4.3:kernel-syms-5.14.21-150400.24.170.1.x86_64",
            "SUSE Manager Server 4.3:kernel-zfcpdump-5.14.21-150400.24.170.2.s390x"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2025-07-28T15:09:33Z",
          "details": "moderate"
        }
      ],
      "title": "CVE-2022-49982"
    },
    {
      "cve": "CVE-2022-49983",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2022-49983"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "In the Linux kernel, the following vulnerability has been resolved:\n\nudmabuf: Set the DMA mask for the udmabuf device (v2)\n\nIf the DMA mask is not set explicitly, the following warning occurs\nwhen the userspace tries to access the dma-buf via the CPU as\nreported by syzbot here:\n\nWARNING: CPU: 1 PID: 3595 at kernel/dma/mapping.c:188\n__dma_map_sg_attrs+0x181/0x1f0 kernel/dma/mapping.c:188\nModules linked in:\nCPU: 0 PID: 3595 Comm: syz-executor249 Not tainted\n5.17.0-rc2-syzkaller-00316-g0457e5153e0e #0\nHardware name: Google Google Compute Engine/Google Compute Engine, BIOS\nGoogle 01/01/2011\nRIP: 0010:__dma_map_sg_attrs+0x181/0x1f0 kernel/dma/mapping.c:188\nCode: 00 00 00 00 00 fc ff df 48 c1 e8 03 80 3c 10 00 75 71 4c 8b 3d c0\n83 b5 0d e9 db fe ff ff e8 b6 0f 13 00 0f 0b e8 af 0f 13 00 \u003c0f\u003e 0b 45\n   31 e4 e9 54 ff ff ff e8 a0 0f 13 00 49 8d 7f 50 48 b8 00\nRSP: 0018:ffffc90002a07d68 EFLAGS: 00010293\nRAX: 0000000000000000 RBX: 0000000000000000 RCX: 0000000000000000\nRDX: ffff88807e25e2c0 RSI: ffffffff81649e91 RDI: ffff88801b848408\nRBP: ffff88801b848000 R08: 0000000000000002 R09: ffff88801d86c74f\nR10: ffffffff81649d72 R11: 0000000000000001 R12: 0000000000000002\nR13: ffff88801d86c680 R14: 0000000000000001 R15: 0000000000000000\nFS:  0000555556e30300(0000) GS:ffff8880b9d00000(0000)\nknlGS:0000000000000000\nCS:  0010 DS: 0000 ES: 0000 CR0: 0000000080050033\nCR2: 00000000200000cc CR3: 000000001d74a000 CR4: 00000000003506e0\nDR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000\nDR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400\nCall Trace:\n \u003cTASK\u003e\n dma_map_sgtable+0x70/0xf0 kernel/dma/mapping.c:264\n get_sg_table.isra.0+0xe0/0x160 drivers/dma-buf/udmabuf.c:72\n begin_cpu_udmabuf+0x130/0x1d0 drivers/dma-buf/udmabuf.c:126\n dma_buf_begin_cpu_access+0xfd/0x1d0 drivers/dma-buf/dma-buf.c:1164\n dma_buf_ioctl+0x259/0x2b0 drivers/dma-buf/dma-buf.c:363\n vfs_ioctl fs/ioctl.c:51 [inline]\n __do_sys_ioctl fs/ioctl.c:874 [inline]\n __se_sys_ioctl fs/ioctl.c:860 [inline]\n __x64_sys_ioctl+0x193/0x200 fs/ioctl.c:860\n do_syscall_x64 arch/x86/entry/common.c:50 [inline]\n do_syscall_64+0x35/0xb0 arch/x86/entry/common.c:80\n entry_SYSCALL_64_after_hwframe+0x44/0xae\nRIP: 0033:0x7f62fcf530f9\nCode: 28 c3 e8 2a 14 00 00 66 2e 0f 1f 84 00 00 00 00 00 48 89 f8 48 89\nf7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 \u003c48\u003e 3d 01\nf0 ff ff 73 01 c3 48 c7 c1 c0 ff ff ff f7 d8 64 89 01 48\nRSP: 002b:00007ffe3edab9b8 EFLAGS: 00000246 ORIG_RAX: 0000000000000010\nRAX: ffffffffffffffda RBX: 0000000000000000 RCX: 00007f62fcf530f9\nRDX: 0000000020000200 RSI: 0000000040086200 RDI: 0000000000000006\nRBP: 00007f62fcf170e0 R08: 0000000000000000 R09: 0000000000000000\nR10: 0000000000000000 R11: 0000000000000246 R12: 00007f62fcf17170\nR13: 0000000000000000 R14: 0000000000000000 R15: 0000000000000000\n \u003c/TASK\u003e\n\nv2: Dont\u0027t forget to deregister if DMA mask setup fails.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.170.2.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.170.2.s390x",
          "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.170.2.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.170.2.s390x",
          "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.170.2.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.170.2.s390x",
          "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.170.2.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.170.2.s390x",
          "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-64kb-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-64kb-devel-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-devel-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-devel-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-devel-5.14.21-150400.24.170.1.noarch",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-docs-5.14.21-150400.24.170.1.noarch",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-macros-5.14.21-150400.24.170.1.noarch",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-obs-build-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-obs-build-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-source-5.14.21-150400.24.170.1.noarch",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-syms-5.14.21-150400.24.170.1.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-syms-5.14.21-150400.24.170.1.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:reiserfs-kmp-default-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:reiserfs-kmp-default-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-64kb-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-64kb-devel-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-devel-5.14.21-150400.24.170.1.noarch",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-docs-5.14.21-150400.24.170.1.noarch",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-macros-5.14.21-150400.24.170.1.noarch",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-source-5.14.21-150400.24.170.1.noarch",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.170.1.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.170.1.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.170.2.ppc64le",
          "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.170.2.s390x",
          "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.170.2.ppc64le",
          "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.170.2.s390x",
          "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_170-default-1-150400.9.3.2.ppc64le",
          "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_170-default-1-150400.9.3.2.s390x",
          "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_170-default-1-150400.9.3.2.x86_64",
          "SUSE Linux Enterprise Micro 5.3:kernel-default-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise Micro 5.3:kernel-default-5.14.21-150400.24.170.2.s390x",
          "SUSE Linux Enterprise Micro 5.3:kernel-default-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise Micro 5.3:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.aarch64",
          "SUSE Linux Enterprise Micro 5.3:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
          "SUSE Linux Enterprise Micro 5.4:kernel-default-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise Micro 5.4:kernel-default-5.14.21-150400.24.170.2.s390x",
          "SUSE Linux Enterprise Micro 5.4:kernel-default-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise Micro 5.4:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.aarch64",
          "SUSE Linux Enterprise Micro 5.4:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-64kb-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-64kb-devel-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-5.14.21-150400.24.170.2.ppc64le",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-5.14.21-150400.24.170.2.s390x",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.aarch64",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.ppc64le",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.170.2.ppc64le",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.170.2.s390x",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-devel-5.14.21-150400.24.170.1.noarch",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-docs-5.14.21-150400.24.170.1.noarch",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-macros-5.14.21-150400.24.170.1.noarch",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.170.2.ppc64le",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.170.2.s390x",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-source-5.14.21-150400.24.170.1.noarch",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.170.1.aarch64",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.170.1.ppc64le",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.170.1.s390x",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.170.1.x86_64",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-zfcpdump-5.14.21-150400.24.170.2.s390x",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.170.2.ppc64le",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.170.2.s390x",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-5.14.21-150400.24.170.2.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-devel-5.14.21-150400.24.170.2.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-devel-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-devel-5.14.21-150400.24.170.1.noarch",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-docs-5.14.21-150400.24.170.1.noarch",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-macros-5.14.21-150400.24.170.1.noarch",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-obs-build-5.14.21-150400.24.170.2.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-obs-build-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-source-5.14.21-150400.24.170.1.noarch",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-syms-5.14.21-150400.24.170.1.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-syms-5.14.21-150400.24.170.1.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.170.2.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.170.2.x86_64",
          "SUSE Manager Proxy 4.3:kernel-default-5.14.21-150400.24.170.2.x86_64",
          "SUSE Manager Proxy 4.3:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
          "SUSE Manager Proxy 4.3:kernel-default-devel-5.14.21-150400.24.170.2.x86_64",
          "SUSE Manager Proxy 4.3:kernel-devel-5.14.21-150400.24.170.1.noarch",
          "SUSE Manager Proxy 4.3:kernel-macros-5.14.21-150400.24.170.1.noarch",
          "SUSE Manager Proxy 4.3:kernel-source-5.14.21-150400.24.170.1.noarch",
          "SUSE Manager Proxy 4.3:kernel-syms-5.14.21-150400.24.170.1.x86_64",
          "SUSE Manager Server 4.3:kernel-default-5.14.21-150400.24.170.2.ppc64le",
          "SUSE Manager Server 4.3:kernel-default-5.14.21-150400.24.170.2.s390x",
          "SUSE Manager Server 4.3:kernel-default-5.14.21-150400.24.170.2.x86_64",
          "SUSE Manager Server 4.3:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.ppc64le",
          "SUSE Manager Server 4.3:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
          "SUSE Manager Server 4.3:kernel-default-devel-5.14.21-150400.24.170.2.ppc64le",
          "SUSE Manager Server 4.3:kernel-default-devel-5.14.21-150400.24.170.2.s390x",
          "SUSE Manager Server 4.3:kernel-default-devel-5.14.21-150400.24.170.2.x86_64",
          "SUSE Manager Server 4.3:kernel-devel-5.14.21-150400.24.170.1.noarch",
          "SUSE Manager Server 4.3:kernel-macros-5.14.21-150400.24.170.1.noarch",
          "SUSE Manager Server 4.3:kernel-source-5.14.21-150400.24.170.1.noarch",
          "SUSE Manager Server 4.3:kernel-syms-5.14.21-150400.24.170.1.ppc64le",
          "SUSE Manager Server 4.3:kernel-syms-5.14.21-150400.24.170.1.s390x",
          "SUSE Manager Server 4.3:kernel-syms-5.14.21-150400.24.170.1.x86_64",
          "SUSE Manager Server 4.3:kernel-zfcpdump-5.14.21-150400.24.170.2.s390x"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2022-49983",
          "url": "https://www.suse.com/security/cve/CVE-2022-49983"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1245092 for CVE-2022-49983",
          "url": "https://bugzilla.suse.com/1245092"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-64kb-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-64kb-devel-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-devel-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-devel-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-devel-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-docs-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-macros-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-obs-build-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-obs-build-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-source-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-syms-5.14.21-150400.24.170.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-syms-5.14.21-150400.24.170.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:reiserfs-kmp-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:reiserfs-kmp-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-64kb-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-64kb-devel-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-devel-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-docs-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-macros-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-source-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.170.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.170.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_170-default-1-150400.9.3.2.ppc64le",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_170-default-1-150400.9.3.2.s390x",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_170-default-1-150400.9.3.2.x86_64",
            "SUSE Linux Enterprise Micro 5.3:kernel-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise Micro 5.3:kernel-default-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise Micro 5.3:kernel-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Micro 5.3:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.aarch64",
            "SUSE Linux Enterprise Micro 5.3:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
            "SUSE Linux Enterprise Micro 5.4:kernel-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise Micro 5.4:kernel-default-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise Micro 5.4:kernel-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Micro 5.4:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.aarch64",
            "SUSE Linux Enterprise Micro 5.4:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-64kb-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-64kb-devel-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.aarch64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.ppc64le",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-devel-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-docs-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-macros-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-source-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.170.1.aarch64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.170.1.ppc64le",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.170.1.s390x",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.170.1.x86_64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-zfcpdump-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-devel-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-devel-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-devel-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-docs-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-macros-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-obs-build-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-obs-build-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-source-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-syms-5.14.21-150400.24.170.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-syms-5.14.21-150400.24.170.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Manager Proxy 4.3:kernel-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Manager Proxy 4.3:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
            "SUSE Manager Proxy 4.3:kernel-default-devel-5.14.21-150400.24.170.2.x86_64",
            "SUSE Manager Proxy 4.3:kernel-devel-5.14.21-150400.24.170.1.noarch",
            "SUSE Manager Proxy 4.3:kernel-macros-5.14.21-150400.24.170.1.noarch",
            "SUSE Manager Proxy 4.3:kernel-source-5.14.21-150400.24.170.1.noarch",
            "SUSE Manager Proxy 4.3:kernel-syms-5.14.21-150400.24.170.1.x86_64",
            "SUSE Manager Server 4.3:kernel-default-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Manager Server 4.3:kernel-default-5.14.21-150400.24.170.2.s390x",
            "SUSE Manager Server 4.3:kernel-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Manager Server 4.3:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.ppc64le",
            "SUSE Manager Server 4.3:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
            "SUSE Manager Server 4.3:kernel-default-devel-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Manager Server 4.3:kernel-default-devel-5.14.21-150400.24.170.2.s390x",
            "SUSE Manager Server 4.3:kernel-default-devel-5.14.21-150400.24.170.2.x86_64",
            "SUSE Manager Server 4.3:kernel-devel-5.14.21-150400.24.170.1.noarch",
            "SUSE Manager Server 4.3:kernel-macros-5.14.21-150400.24.170.1.noarch",
            "SUSE Manager Server 4.3:kernel-source-5.14.21-150400.24.170.1.noarch",
            "SUSE Manager Server 4.3:kernel-syms-5.14.21-150400.24.170.1.ppc64le",
            "SUSE Manager Server 4.3:kernel-syms-5.14.21-150400.24.170.1.s390x",
            "SUSE Manager Server 4.3:kernel-syms-5.14.21-150400.24.170.1.x86_64",
            "SUSE Manager Server 4.3:kernel-zfcpdump-5.14.21-150400.24.170.2.s390x"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 5.5,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
            "version": "3.1"
          },
          "products": [
            "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-64kb-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-64kb-devel-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-devel-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-devel-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-devel-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-docs-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-macros-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-obs-build-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-obs-build-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-source-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-syms-5.14.21-150400.24.170.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-syms-5.14.21-150400.24.170.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:reiserfs-kmp-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:reiserfs-kmp-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-64kb-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-64kb-devel-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-devel-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-docs-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-macros-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-source-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.170.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.170.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_170-default-1-150400.9.3.2.ppc64le",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_170-default-1-150400.9.3.2.s390x",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_170-default-1-150400.9.3.2.x86_64",
            "SUSE Linux Enterprise Micro 5.3:kernel-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise Micro 5.3:kernel-default-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise Micro 5.3:kernel-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Micro 5.3:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.aarch64",
            "SUSE Linux Enterprise Micro 5.3:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
            "SUSE Linux Enterprise Micro 5.4:kernel-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise Micro 5.4:kernel-default-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise Micro 5.4:kernel-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Micro 5.4:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.aarch64",
            "SUSE Linux Enterprise Micro 5.4:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-64kb-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-64kb-devel-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.aarch64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.ppc64le",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-devel-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-docs-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-macros-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-source-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.170.1.aarch64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.170.1.ppc64le",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.170.1.s390x",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.170.1.x86_64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-zfcpdump-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-devel-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-devel-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-devel-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-docs-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-macros-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-obs-build-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-obs-build-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-source-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-syms-5.14.21-150400.24.170.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-syms-5.14.21-150400.24.170.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Manager Proxy 4.3:kernel-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Manager Proxy 4.3:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
            "SUSE Manager Proxy 4.3:kernel-default-devel-5.14.21-150400.24.170.2.x86_64",
            "SUSE Manager Proxy 4.3:kernel-devel-5.14.21-150400.24.170.1.noarch",
            "SUSE Manager Proxy 4.3:kernel-macros-5.14.21-150400.24.170.1.noarch",
            "SUSE Manager Proxy 4.3:kernel-source-5.14.21-150400.24.170.1.noarch",
            "SUSE Manager Proxy 4.3:kernel-syms-5.14.21-150400.24.170.1.x86_64",
            "SUSE Manager Server 4.3:kernel-default-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Manager Server 4.3:kernel-default-5.14.21-150400.24.170.2.s390x",
            "SUSE Manager Server 4.3:kernel-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Manager Server 4.3:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.ppc64le",
            "SUSE Manager Server 4.3:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
            "SUSE Manager Server 4.3:kernel-default-devel-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Manager Server 4.3:kernel-default-devel-5.14.21-150400.24.170.2.s390x",
            "SUSE Manager Server 4.3:kernel-default-devel-5.14.21-150400.24.170.2.x86_64",
            "SUSE Manager Server 4.3:kernel-devel-5.14.21-150400.24.170.1.noarch",
            "SUSE Manager Server 4.3:kernel-macros-5.14.21-150400.24.170.1.noarch",
            "SUSE Manager Server 4.3:kernel-source-5.14.21-150400.24.170.1.noarch",
            "SUSE Manager Server 4.3:kernel-syms-5.14.21-150400.24.170.1.ppc64le",
            "SUSE Manager Server 4.3:kernel-syms-5.14.21-150400.24.170.1.s390x",
            "SUSE Manager Server 4.3:kernel-syms-5.14.21-150400.24.170.1.x86_64",
            "SUSE Manager Server 4.3:kernel-zfcpdump-5.14.21-150400.24.170.2.s390x"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2025-07-28T15:09:33Z",
          "details": "moderate"
        }
      ],
      "title": "CVE-2022-49983"
    },
    {
      "cve": "CVE-2022-49984",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2022-49984"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "In the Linux kernel, the following vulnerability has been resolved:\n\nHID: steam: Prevent NULL pointer dereference in steam_{recv,send}_report\n\nIt is possible for a malicious device to forgo submitting a Feature\nReport.  The HID Steam driver presently makes no prevision for this\nand de-references the \u0027struct hid_report\u0027 pointer obtained from the\nHID devices without first checking its validity.  Let\u0027s change that.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.170.2.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.170.2.s390x",
          "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.170.2.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.170.2.s390x",
          "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.170.2.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.170.2.s390x",
          "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.170.2.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.170.2.s390x",
          "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-64kb-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-64kb-devel-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-devel-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-devel-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-devel-5.14.21-150400.24.170.1.noarch",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-docs-5.14.21-150400.24.170.1.noarch",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-macros-5.14.21-150400.24.170.1.noarch",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-obs-build-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-obs-build-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-source-5.14.21-150400.24.170.1.noarch",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-syms-5.14.21-150400.24.170.1.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-syms-5.14.21-150400.24.170.1.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:reiserfs-kmp-default-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:reiserfs-kmp-default-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-64kb-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-64kb-devel-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-devel-5.14.21-150400.24.170.1.noarch",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-docs-5.14.21-150400.24.170.1.noarch",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-macros-5.14.21-150400.24.170.1.noarch",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-source-5.14.21-150400.24.170.1.noarch",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.170.1.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.170.1.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.170.2.ppc64le",
          "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.170.2.s390x",
          "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.170.2.ppc64le",
          "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.170.2.s390x",
          "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_170-default-1-150400.9.3.2.ppc64le",
          "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_170-default-1-150400.9.3.2.s390x",
          "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_170-default-1-150400.9.3.2.x86_64",
          "SUSE Linux Enterprise Micro 5.3:kernel-default-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise Micro 5.3:kernel-default-5.14.21-150400.24.170.2.s390x",
          "SUSE Linux Enterprise Micro 5.3:kernel-default-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise Micro 5.3:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.aarch64",
          "SUSE Linux Enterprise Micro 5.3:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
          "SUSE Linux Enterprise Micro 5.4:kernel-default-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise Micro 5.4:kernel-default-5.14.21-150400.24.170.2.s390x",
          "SUSE Linux Enterprise Micro 5.4:kernel-default-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise Micro 5.4:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.aarch64",
          "SUSE Linux Enterprise Micro 5.4:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-64kb-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-64kb-devel-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-5.14.21-150400.24.170.2.ppc64le",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-5.14.21-150400.24.170.2.s390x",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.aarch64",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.ppc64le",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.170.2.ppc64le",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.170.2.s390x",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-devel-5.14.21-150400.24.170.1.noarch",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-docs-5.14.21-150400.24.170.1.noarch",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-macros-5.14.21-150400.24.170.1.noarch",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.170.2.ppc64le",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.170.2.s390x",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-source-5.14.21-150400.24.170.1.noarch",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.170.1.aarch64",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.170.1.ppc64le",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.170.1.s390x",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.170.1.x86_64",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-zfcpdump-5.14.21-150400.24.170.2.s390x",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.170.2.ppc64le",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.170.2.s390x",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-5.14.21-150400.24.170.2.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-devel-5.14.21-150400.24.170.2.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-devel-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-devel-5.14.21-150400.24.170.1.noarch",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-docs-5.14.21-150400.24.170.1.noarch",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-macros-5.14.21-150400.24.170.1.noarch",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-obs-build-5.14.21-150400.24.170.2.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-obs-build-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-source-5.14.21-150400.24.170.1.noarch",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-syms-5.14.21-150400.24.170.1.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-syms-5.14.21-150400.24.170.1.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.170.2.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.170.2.x86_64",
          "SUSE Manager Proxy 4.3:kernel-default-5.14.21-150400.24.170.2.x86_64",
          "SUSE Manager Proxy 4.3:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
          "SUSE Manager Proxy 4.3:kernel-default-devel-5.14.21-150400.24.170.2.x86_64",
          "SUSE Manager Proxy 4.3:kernel-devel-5.14.21-150400.24.170.1.noarch",
          "SUSE Manager Proxy 4.3:kernel-macros-5.14.21-150400.24.170.1.noarch",
          "SUSE Manager Proxy 4.3:kernel-source-5.14.21-150400.24.170.1.noarch",
          "SUSE Manager Proxy 4.3:kernel-syms-5.14.21-150400.24.170.1.x86_64",
          "SUSE Manager Server 4.3:kernel-default-5.14.21-150400.24.170.2.ppc64le",
          "SUSE Manager Server 4.3:kernel-default-5.14.21-150400.24.170.2.s390x",
          "SUSE Manager Server 4.3:kernel-default-5.14.21-150400.24.170.2.x86_64",
          "SUSE Manager Server 4.3:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.ppc64le",
          "SUSE Manager Server 4.3:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
          "SUSE Manager Server 4.3:kernel-default-devel-5.14.21-150400.24.170.2.ppc64le",
          "SUSE Manager Server 4.3:kernel-default-devel-5.14.21-150400.24.170.2.s390x",
          "SUSE Manager Server 4.3:kernel-default-devel-5.14.21-150400.24.170.2.x86_64",
          "SUSE Manager Server 4.3:kernel-devel-5.14.21-150400.24.170.1.noarch",
          "SUSE Manager Server 4.3:kernel-macros-5.14.21-150400.24.170.1.noarch",
          "SUSE Manager Server 4.3:kernel-source-5.14.21-150400.24.170.1.noarch",
          "SUSE Manager Server 4.3:kernel-syms-5.14.21-150400.24.170.1.ppc64le",
          "SUSE Manager Server 4.3:kernel-syms-5.14.21-150400.24.170.1.s390x",
          "SUSE Manager Server 4.3:kernel-syms-5.14.21-150400.24.170.1.x86_64",
          "SUSE Manager Server 4.3:kernel-zfcpdump-5.14.21-150400.24.170.2.s390x"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2022-49984",
          "url": "https://www.suse.com/security/cve/CVE-2022-49984"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1244950 for CVE-2022-49984",
          "url": "https://bugzilla.suse.com/1244950"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-64kb-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-64kb-devel-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-devel-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-devel-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-devel-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-docs-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-macros-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-obs-build-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-obs-build-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-source-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-syms-5.14.21-150400.24.170.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-syms-5.14.21-150400.24.170.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:reiserfs-kmp-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:reiserfs-kmp-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-64kb-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-64kb-devel-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-devel-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-docs-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-macros-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-source-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.170.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.170.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_170-default-1-150400.9.3.2.ppc64le",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_170-default-1-150400.9.3.2.s390x",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_170-default-1-150400.9.3.2.x86_64",
            "SUSE Linux Enterprise Micro 5.3:kernel-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise Micro 5.3:kernel-default-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise Micro 5.3:kernel-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Micro 5.3:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.aarch64",
            "SUSE Linux Enterprise Micro 5.3:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
            "SUSE Linux Enterprise Micro 5.4:kernel-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise Micro 5.4:kernel-default-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise Micro 5.4:kernel-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Micro 5.4:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.aarch64",
            "SUSE Linux Enterprise Micro 5.4:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-64kb-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-64kb-devel-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.aarch64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.ppc64le",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-devel-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-docs-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-macros-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-source-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.170.1.aarch64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.170.1.ppc64le",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.170.1.s390x",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.170.1.x86_64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-zfcpdump-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-devel-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-devel-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-devel-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-docs-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-macros-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-obs-build-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-obs-build-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-source-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-syms-5.14.21-150400.24.170.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-syms-5.14.21-150400.24.170.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Manager Proxy 4.3:kernel-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Manager Proxy 4.3:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
            "SUSE Manager Proxy 4.3:kernel-default-devel-5.14.21-150400.24.170.2.x86_64",
            "SUSE Manager Proxy 4.3:kernel-devel-5.14.21-150400.24.170.1.noarch",
            "SUSE Manager Proxy 4.3:kernel-macros-5.14.21-150400.24.170.1.noarch",
            "SUSE Manager Proxy 4.3:kernel-source-5.14.21-150400.24.170.1.noarch",
            "SUSE Manager Proxy 4.3:kernel-syms-5.14.21-150400.24.170.1.x86_64",
            "SUSE Manager Server 4.3:kernel-default-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Manager Server 4.3:kernel-default-5.14.21-150400.24.170.2.s390x",
            "SUSE Manager Server 4.3:kernel-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Manager Server 4.3:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.ppc64le",
            "SUSE Manager Server 4.3:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
            "SUSE Manager Server 4.3:kernel-default-devel-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Manager Server 4.3:kernel-default-devel-5.14.21-150400.24.170.2.s390x",
            "SUSE Manager Server 4.3:kernel-default-devel-5.14.21-150400.24.170.2.x86_64",
            "SUSE Manager Server 4.3:kernel-devel-5.14.21-150400.24.170.1.noarch",
            "SUSE Manager Server 4.3:kernel-macros-5.14.21-150400.24.170.1.noarch",
            "SUSE Manager Server 4.3:kernel-source-5.14.21-150400.24.170.1.noarch",
            "SUSE Manager Server 4.3:kernel-syms-5.14.21-150400.24.170.1.ppc64le",
            "SUSE Manager Server 4.3:kernel-syms-5.14.21-150400.24.170.1.s390x",
            "SUSE Manager Server 4.3:kernel-syms-5.14.21-150400.24.170.1.x86_64",
            "SUSE Manager Server 4.3:kernel-zfcpdump-5.14.21-150400.24.170.2.s390x"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 5.5,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
            "version": "3.1"
          },
          "products": [
            "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-64kb-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-64kb-devel-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-devel-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-devel-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-devel-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-docs-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-macros-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-obs-build-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-obs-build-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-source-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-syms-5.14.21-150400.24.170.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-syms-5.14.21-150400.24.170.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:reiserfs-kmp-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:reiserfs-kmp-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-64kb-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-64kb-devel-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-devel-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-docs-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-macros-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-source-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.170.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.170.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_170-default-1-150400.9.3.2.ppc64le",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_170-default-1-150400.9.3.2.s390x",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_170-default-1-150400.9.3.2.x86_64",
            "SUSE Linux Enterprise Micro 5.3:kernel-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise Micro 5.3:kernel-default-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise Micro 5.3:kernel-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Micro 5.3:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.aarch64",
            "SUSE Linux Enterprise Micro 5.3:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
            "SUSE Linux Enterprise Micro 5.4:kernel-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise Micro 5.4:kernel-default-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise Micro 5.4:kernel-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Micro 5.4:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.aarch64",
            "SUSE Linux Enterprise Micro 5.4:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-64kb-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-64kb-devel-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.aarch64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.ppc64le",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-devel-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-docs-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-macros-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-source-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.170.1.aarch64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.170.1.ppc64le",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.170.1.s390x",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.170.1.x86_64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-zfcpdump-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-devel-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-devel-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-devel-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-docs-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-macros-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-obs-build-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-obs-build-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-source-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-syms-5.14.21-150400.24.170.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-syms-5.14.21-150400.24.170.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Manager Proxy 4.3:kernel-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Manager Proxy 4.3:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
            "SUSE Manager Proxy 4.3:kernel-default-devel-5.14.21-150400.24.170.2.x86_64",
            "SUSE Manager Proxy 4.3:kernel-devel-5.14.21-150400.24.170.1.noarch",
            "SUSE Manager Proxy 4.3:kernel-macros-5.14.21-150400.24.170.1.noarch",
            "SUSE Manager Proxy 4.3:kernel-source-5.14.21-150400.24.170.1.noarch",
            "SUSE Manager Proxy 4.3:kernel-syms-5.14.21-150400.24.170.1.x86_64",
            "SUSE Manager Server 4.3:kernel-default-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Manager Server 4.3:kernel-default-5.14.21-150400.24.170.2.s390x",
            "SUSE Manager Server 4.3:kernel-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Manager Server 4.3:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.ppc64le",
            "SUSE Manager Server 4.3:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
            "SUSE Manager Server 4.3:kernel-default-devel-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Manager Server 4.3:kernel-default-devel-5.14.21-150400.24.170.2.s390x",
            "SUSE Manager Server 4.3:kernel-default-devel-5.14.21-150400.24.170.2.x86_64",
            "SUSE Manager Server 4.3:kernel-devel-5.14.21-150400.24.170.1.noarch",
            "SUSE Manager Server 4.3:kernel-macros-5.14.21-150400.24.170.1.noarch",
            "SUSE Manager Server 4.3:kernel-source-5.14.21-150400.24.170.1.noarch",
            "SUSE Manager Server 4.3:kernel-syms-5.14.21-150400.24.170.1.ppc64le",
            "SUSE Manager Server 4.3:kernel-syms-5.14.21-150400.24.170.1.s390x",
            "SUSE Manager Server 4.3:kernel-syms-5.14.21-150400.24.170.1.x86_64",
            "SUSE Manager Server 4.3:kernel-zfcpdump-5.14.21-150400.24.170.2.s390x"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2025-07-28T15:09:33Z",
          "details": "moderate"
        }
      ],
      "title": "CVE-2022-49984"
    },
    {
      "cve": "CVE-2022-49985",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2022-49985"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "In the Linux kernel, the following vulnerability has been resolved:\n\nbpf: Don\u0027t use tnum_range on array range checking for poke descriptors\n\nHsin-Wei reported a KASAN splat triggered by their BPF runtime fuzzer which\nis based on a customized syzkaller:\n\n  BUG: KASAN: slab-out-of-bounds in bpf_int_jit_compile+0x1257/0x13f0\n  Read of size 8 at addr ffff888004e90b58 by task syz-executor.0/1489\n  CPU: 1 PID: 1489 Comm: syz-executor.0 Not tainted 5.19.0 #1\n  Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS\n  1.13.0-1ubuntu1.1 04/01/2014\n  Call Trace:\n   \u003cTASK\u003e\n   dump_stack_lvl+0x9c/0xc9\n   print_address_description.constprop.0+0x1f/0x1f0\n   ? bpf_int_jit_compile+0x1257/0x13f0\n   kasan_report.cold+0xeb/0x197\n   ? kvmalloc_node+0x170/0x200\n   ? bpf_int_jit_compile+0x1257/0x13f0\n   bpf_int_jit_compile+0x1257/0x13f0\n   ? arch_prepare_bpf_dispatcher+0xd0/0xd0\n   ? rcu_read_lock_sched_held+0x43/0x70\n   bpf_prog_select_runtime+0x3e8/0x640\n   ? bpf_obj_name_cpy+0x149/0x1b0\n   bpf_prog_load+0x102f/0x2220\n   ? __bpf_prog_put.constprop.0+0x220/0x220\n   ? find_held_lock+0x2c/0x110\n   ? __might_fault+0xd6/0x180\n   ? lock_downgrade+0x6e0/0x6e0\n   ? lock_is_held_type+0xa6/0x120\n   ? __might_fault+0x147/0x180\n   __sys_bpf+0x137b/0x6070\n   ? bpf_perf_link_attach+0x530/0x530\n   ? new_sync_read+0x600/0x600\n   ? __fget_files+0x255/0x450\n   ? lock_downgrade+0x6e0/0x6e0\n   ? fput+0x30/0x1a0\n   ? ksys_write+0x1a8/0x260\n   __x64_sys_bpf+0x7a/0xc0\n   ? syscall_enter_from_user_mode+0x21/0x70\n   do_syscall_64+0x3b/0x90\n   entry_SYSCALL_64_after_hwframe+0x63/0xcd\n  RIP: 0033:0x7f917c4e2c2d\n\nThe problem here is that a range of tnum_range(0, map-\u003emax_entries - 1) has\nlimited ability to represent the concrete tight range with the tnum as the\nset of resulting states from value + mask can result in a superset of the\nactual intended range, and as such a tnum_in(range, reg-\u003evar_off) check may\nyield true when it shouldn\u0027t, for example tnum_range(0, 2) would result in\n00XX -\u003e v = 0000, m = 0011 such that the intended set of {0, 1, 2} is here\nrepresented by a less precise superset of {0, 1, 2, 3}. As the register is\nknown const scalar, really just use the concrete reg-\u003evar_off.value for the\nupper index check.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.170.2.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.170.2.s390x",
          "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.170.2.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.170.2.s390x",
          "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.170.2.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.170.2.s390x",
          "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.170.2.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.170.2.s390x",
          "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-64kb-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-64kb-devel-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-devel-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-devel-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-devel-5.14.21-150400.24.170.1.noarch",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-docs-5.14.21-150400.24.170.1.noarch",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-macros-5.14.21-150400.24.170.1.noarch",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-obs-build-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-obs-build-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-source-5.14.21-150400.24.170.1.noarch",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-syms-5.14.21-150400.24.170.1.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-syms-5.14.21-150400.24.170.1.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:reiserfs-kmp-default-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:reiserfs-kmp-default-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-64kb-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-64kb-devel-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-devel-5.14.21-150400.24.170.1.noarch",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-docs-5.14.21-150400.24.170.1.noarch",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-macros-5.14.21-150400.24.170.1.noarch",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-source-5.14.21-150400.24.170.1.noarch",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.170.1.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.170.1.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.170.2.ppc64le",
          "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.170.2.s390x",
          "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.170.2.ppc64le",
          "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.170.2.s390x",
          "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_170-default-1-150400.9.3.2.ppc64le",
          "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_170-default-1-150400.9.3.2.s390x",
          "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_170-default-1-150400.9.3.2.x86_64",
          "SUSE Linux Enterprise Micro 5.3:kernel-default-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise Micro 5.3:kernel-default-5.14.21-150400.24.170.2.s390x",
          "SUSE Linux Enterprise Micro 5.3:kernel-default-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise Micro 5.3:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.aarch64",
          "SUSE Linux Enterprise Micro 5.3:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
          "SUSE Linux Enterprise Micro 5.4:kernel-default-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise Micro 5.4:kernel-default-5.14.21-150400.24.170.2.s390x",
          "SUSE Linux Enterprise Micro 5.4:kernel-default-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise Micro 5.4:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.aarch64",
          "SUSE Linux Enterprise Micro 5.4:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-64kb-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-64kb-devel-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-5.14.21-150400.24.170.2.ppc64le",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-5.14.21-150400.24.170.2.s390x",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.aarch64",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.ppc64le",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.170.2.ppc64le",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.170.2.s390x",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-devel-5.14.21-150400.24.170.1.noarch",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-docs-5.14.21-150400.24.170.1.noarch",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-macros-5.14.21-150400.24.170.1.noarch",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.170.2.ppc64le",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.170.2.s390x",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-source-5.14.21-150400.24.170.1.noarch",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.170.1.aarch64",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.170.1.ppc64le",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.170.1.s390x",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.170.1.x86_64",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-zfcpdump-5.14.21-150400.24.170.2.s390x",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.170.2.ppc64le",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.170.2.s390x",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-5.14.21-150400.24.170.2.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-devel-5.14.21-150400.24.170.2.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-devel-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-devel-5.14.21-150400.24.170.1.noarch",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-docs-5.14.21-150400.24.170.1.noarch",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-macros-5.14.21-150400.24.170.1.noarch",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-obs-build-5.14.21-150400.24.170.2.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-obs-build-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-source-5.14.21-150400.24.170.1.noarch",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-syms-5.14.21-150400.24.170.1.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-syms-5.14.21-150400.24.170.1.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.170.2.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.170.2.x86_64",
          "SUSE Manager Proxy 4.3:kernel-default-5.14.21-150400.24.170.2.x86_64",
          "SUSE Manager Proxy 4.3:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
          "SUSE Manager Proxy 4.3:kernel-default-devel-5.14.21-150400.24.170.2.x86_64",
          "SUSE Manager Proxy 4.3:kernel-devel-5.14.21-150400.24.170.1.noarch",
          "SUSE Manager Proxy 4.3:kernel-macros-5.14.21-150400.24.170.1.noarch",
          "SUSE Manager Proxy 4.3:kernel-source-5.14.21-150400.24.170.1.noarch",
          "SUSE Manager Proxy 4.3:kernel-syms-5.14.21-150400.24.170.1.x86_64",
          "SUSE Manager Server 4.3:kernel-default-5.14.21-150400.24.170.2.ppc64le",
          "SUSE Manager Server 4.3:kernel-default-5.14.21-150400.24.170.2.s390x",
          "SUSE Manager Server 4.3:kernel-default-5.14.21-150400.24.170.2.x86_64",
          "SUSE Manager Server 4.3:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.ppc64le",
          "SUSE Manager Server 4.3:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
          "SUSE Manager Server 4.3:kernel-default-devel-5.14.21-150400.24.170.2.ppc64le",
          "SUSE Manager Server 4.3:kernel-default-devel-5.14.21-150400.24.170.2.s390x",
          "SUSE Manager Server 4.3:kernel-default-devel-5.14.21-150400.24.170.2.x86_64",
          "SUSE Manager Server 4.3:kernel-devel-5.14.21-150400.24.170.1.noarch",
          "SUSE Manager Server 4.3:kernel-macros-5.14.21-150400.24.170.1.noarch",
          "SUSE Manager Server 4.3:kernel-source-5.14.21-150400.24.170.1.noarch",
          "SUSE Manager Server 4.3:kernel-syms-5.14.21-150400.24.170.1.ppc64le",
          "SUSE Manager Server 4.3:kernel-syms-5.14.21-150400.24.170.1.s390x",
          "SUSE Manager Server 4.3:kernel-syms-5.14.21-150400.24.170.1.x86_64",
          "SUSE Manager Server 4.3:kernel-zfcpdump-5.14.21-150400.24.170.2.s390x"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2022-49985",
          "url": "https://www.suse.com/security/cve/CVE-2022-49985"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1244956 for CVE-2022-49985",
          "url": "https://bugzilla.suse.com/1244956"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-64kb-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-64kb-devel-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-devel-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-devel-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-devel-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-docs-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-macros-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-obs-build-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-obs-build-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-source-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-syms-5.14.21-150400.24.170.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-syms-5.14.21-150400.24.170.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:reiserfs-kmp-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:reiserfs-kmp-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-64kb-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-64kb-devel-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-devel-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-docs-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-macros-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-source-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.170.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.170.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_170-default-1-150400.9.3.2.ppc64le",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_170-default-1-150400.9.3.2.s390x",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_170-default-1-150400.9.3.2.x86_64",
            "SUSE Linux Enterprise Micro 5.3:kernel-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise Micro 5.3:kernel-default-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise Micro 5.3:kernel-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Micro 5.3:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.aarch64",
            "SUSE Linux Enterprise Micro 5.3:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
            "SUSE Linux Enterprise Micro 5.4:kernel-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise Micro 5.4:kernel-default-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise Micro 5.4:kernel-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Micro 5.4:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.aarch64",
            "SUSE Linux Enterprise Micro 5.4:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-64kb-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-64kb-devel-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.aarch64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.ppc64le",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-devel-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-docs-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-macros-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-source-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.170.1.aarch64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.170.1.ppc64le",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.170.1.s390x",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.170.1.x86_64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-zfcpdump-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-devel-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-devel-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-devel-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-docs-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-macros-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-obs-build-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-obs-build-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-source-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-syms-5.14.21-150400.24.170.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-syms-5.14.21-150400.24.170.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Manager Proxy 4.3:kernel-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Manager Proxy 4.3:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
            "SUSE Manager Proxy 4.3:kernel-default-devel-5.14.21-150400.24.170.2.x86_64",
            "SUSE Manager Proxy 4.3:kernel-devel-5.14.21-150400.24.170.1.noarch",
            "SUSE Manager Proxy 4.3:kernel-macros-5.14.21-150400.24.170.1.noarch",
            "SUSE Manager Proxy 4.3:kernel-source-5.14.21-150400.24.170.1.noarch",
            "SUSE Manager Proxy 4.3:kernel-syms-5.14.21-150400.24.170.1.x86_64",
            "SUSE Manager Server 4.3:kernel-default-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Manager Server 4.3:kernel-default-5.14.21-150400.24.170.2.s390x",
            "SUSE Manager Server 4.3:kernel-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Manager Server 4.3:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.ppc64le",
            "SUSE Manager Server 4.3:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
            "SUSE Manager Server 4.3:kernel-default-devel-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Manager Server 4.3:kernel-default-devel-5.14.21-150400.24.170.2.s390x",
            "SUSE Manager Server 4.3:kernel-default-devel-5.14.21-150400.24.170.2.x86_64",
            "SUSE Manager Server 4.3:kernel-devel-5.14.21-150400.24.170.1.noarch",
            "SUSE Manager Server 4.3:kernel-macros-5.14.21-150400.24.170.1.noarch",
            "SUSE Manager Server 4.3:kernel-source-5.14.21-150400.24.170.1.noarch",
            "SUSE Manager Server 4.3:kernel-syms-5.14.21-150400.24.170.1.ppc64le",
            "SUSE Manager Server 4.3:kernel-syms-5.14.21-150400.24.170.1.s390x",
            "SUSE Manager Server 4.3:kernel-syms-5.14.21-150400.24.170.1.x86_64",
            "SUSE Manager Server 4.3:kernel-zfcpdump-5.14.21-150400.24.170.2.s390x"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 5.5,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
            "version": "3.1"
          },
          "products": [
            "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-64kb-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-64kb-devel-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-devel-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-devel-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-devel-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-docs-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-macros-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-obs-build-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-obs-build-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-source-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-syms-5.14.21-150400.24.170.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-syms-5.14.21-150400.24.170.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:reiserfs-kmp-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:reiserfs-kmp-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-64kb-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-64kb-devel-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-devel-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-docs-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-macros-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-source-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.170.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.170.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_170-default-1-150400.9.3.2.ppc64le",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_170-default-1-150400.9.3.2.s390x",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_170-default-1-150400.9.3.2.x86_64",
            "SUSE Linux Enterprise Micro 5.3:kernel-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise Micro 5.3:kernel-default-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise Micro 5.3:kernel-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Micro 5.3:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.aarch64",
            "SUSE Linux Enterprise Micro 5.3:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
            "SUSE Linux Enterprise Micro 5.4:kernel-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise Micro 5.4:kernel-default-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise Micro 5.4:kernel-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Micro 5.4:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.aarch64",
            "SUSE Linux Enterprise Micro 5.4:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-64kb-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-64kb-devel-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.aarch64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.ppc64le",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-devel-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-docs-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-macros-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-source-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.170.1.aarch64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.170.1.ppc64le",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.170.1.s390x",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.170.1.x86_64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-zfcpdump-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-devel-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-devel-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-devel-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-docs-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-macros-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-obs-build-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-obs-build-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-source-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-syms-5.14.21-150400.24.170.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-syms-5.14.21-150400.24.170.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Manager Proxy 4.3:kernel-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Manager Proxy 4.3:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
            "SUSE Manager Proxy 4.3:kernel-default-devel-5.14.21-150400.24.170.2.x86_64",
            "SUSE Manager Proxy 4.3:kernel-devel-5.14.21-150400.24.170.1.noarch",
            "SUSE Manager Proxy 4.3:kernel-macros-5.14.21-150400.24.170.1.noarch",
            "SUSE Manager Proxy 4.3:kernel-source-5.14.21-150400.24.170.1.noarch",
            "SUSE Manager Proxy 4.3:kernel-syms-5.14.21-150400.24.170.1.x86_64",
            "SUSE Manager Server 4.3:kernel-default-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Manager Server 4.3:kernel-default-5.14.21-150400.24.170.2.s390x",
            "SUSE Manager Server 4.3:kernel-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Manager Server 4.3:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.ppc64le",
            "SUSE Manager Server 4.3:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
            "SUSE Manager Server 4.3:kernel-default-devel-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Manager Server 4.3:kernel-default-devel-5.14.21-150400.24.170.2.s390x",
            "SUSE Manager Server 4.3:kernel-default-devel-5.14.21-150400.24.170.2.x86_64",
            "SUSE Manager Server 4.3:kernel-devel-5.14.21-150400.24.170.1.noarch",
            "SUSE Manager Server 4.3:kernel-macros-5.14.21-150400.24.170.1.noarch",
            "SUSE Manager Server 4.3:kernel-source-5.14.21-150400.24.170.1.noarch",
            "SUSE Manager Server 4.3:kernel-syms-5.14.21-150400.24.170.1.ppc64le",
            "SUSE Manager Server 4.3:kernel-syms-5.14.21-150400.24.170.1.s390x",
            "SUSE Manager Server 4.3:kernel-syms-5.14.21-150400.24.170.1.x86_64",
            "SUSE Manager Server 4.3:kernel-zfcpdump-5.14.21-150400.24.170.2.s390x"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2025-07-28T15:09:33Z",
          "details": "moderate"
        }
      ],
      "title": "CVE-2022-49985"
    },
    {
      "cve": "CVE-2022-49986",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2022-49986"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "In the Linux kernel, the following vulnerability has been resolved:\n\nscsi: storvsc: Remove WQ_MEM_RECLAIM from storvsc_error_wq\n\nstorvsc_error_wq workqueue should not be marked as WQ_MEM_RECLAIM as it\ndoesn\u0027t need to make forward progress under memory pressure.  Marking this\nworkqueue as WQ_MEM_RECLAIM may cause deadlock while flushing a\nnon-WQ_MEM_RECLAIM workqueue.  In the current state it causes the following\nwarning:\n\n[   14.506347] ------------[ cut here ]------------\n[   14.506354] workqueue: WQ_MEM_RECLAIM storvsc_error_wq_0:storvsc_remove_lun is flushing !WQ_MEM_RECLAIM events_freezable_power_:disk_events_workfn\n[   14.506360] WARNING: CPU: 0 PID: 8 at \u003c-snip-\u003ekernel/workqueue.c:2623 check_flush_dependency+0xb5/0x130\n[   14.506390] CPU: 0 PID: 8 Comm: kworker/u4:0 Not tainted 5.4.0-1086-azure #91~18.04.1-Ubuntu\n[   14.506391] Hardware name: Microsoft Corporation Virtual Machine/Virtual Machine, BIOS Hyper-V UEFI Release v4.1 05/09/2022\n[   14.506393] Workqueue: storvsc_error_wq_0 storvsc_remove_lun\n[   14.506395] RIP: 0010:check_flush_dependency+0xb5/0x130\n\t\t\u003c-snip-\u003e\n[   14.506408] Call Trace:\n[   14.506412]  __flush_work+0xf1/0x1c0\n[   14.506414]  __cancel_work_timer+0x12f/0x1b0\n[   14.506417]  ? kernfs_put+0xf0/0x190\n[   14.506418]  cancel_delayed_work_sync+0x13/0x20\n[   14.506420]  disk_block_events+0x78/0x80\n[   14.506421]  del_gendisk+0x3d/0x2f0\n[   14.506423]  sr_remove+0x28/0x70\n[   14.506427]  device_release_driver_internal+0xef/0x1c0\n[   14.506428]  device_release_driver+0x12/0x20\n[   14.506429]  bus_remove_device+0xe1/0x150\n[   14.506431]  device_del+0x167/0x380\n[   14.506432]  __scsi_remove_device+0x11d/0x150\n[   14.506433]  scsi_remove_device+0x26/0x40\n[   14.506434]  storvsc_remove_lun+0x40/0x60\n[   14.506436]  process_one_work+0x209/0x400\n[   14.506437]  worker_thread+0x34/0x400\n[   14.506439]  kthread+0x121/0x140\n[   14.506440]  ? process_one_work+0x400/0x400\n[   14.506441]  ? kthread_park+0x90/0x90\n[   14.506443]  ret_from_fork+0x35/0x40\n[   14.506445] ---[ end trace 2d9633159fdc6ee7 ]---",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.170.2.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.170.2.s390x",
          "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.170.2.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.170.2.s390x",
          "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.170.2.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.170.2.s390x",
          "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.170.2.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.170.2.s390x",
          "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-64kb-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-64kb-devel-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-devel-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-devel-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-devel-5.14.21-150400.24.170.1.noarch",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-docs-5.14.21-150400.24.170.1.noarch",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-macros-5.14.21-150400.24.170.1.noarch",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-obs-build-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-obs-build-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-source-5.14.21-150400.24.170.1.noarch",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-syms-5.14.21-150400.24.170.1.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-syms-5.14.21-150400.24.170.1.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:reiserfs-kmp-default-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:reiserfs-kmp-default-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-64kb-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-64kb-devel-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-devel-5.14.21-150400.24.170.1.noarch",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-docs-5.14.21-150400.24.170.1.noarch",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-macros-5.14.21-150400.24.170.1.noarch",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-source-5.14.21-150400.24.170.1.noarch",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.170.1.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.170.1.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.170.2.ppc64le",
          "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.170.2.s390x",
          "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.170.2.ppc64le",
          "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.170.2.s390x",
          "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_170-default-1-150400.9.3.2.ppc64le",
          "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_170-default-1-150400.9.3.2.s390x",
          "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_170-default-1-150400.9.3.2.x86_64",
          "SUSE Linux Enterprise Micro 5.3:kernel-default-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise Micro 5.3:kernel-default-5.14.21-150400.24.170.2.s390x",
          "SUSE Linux Enterprise Micro 5.3:kernel-default-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise Micro 5.3:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.aarch64",
          "SUSE Linux Enterprise Micro 5.3:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
          "SUSE Linux Enterprise Micro 5.4:kernel-default-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise Micro 5.4:kernel-default-5.14.21-150400.24.170.2.s390x",
          "SUSE Linux Enterprise Micro 5.4:kernel-default-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise Micro 5.4:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.aarch64",
          "SUSE Linux Enterprise Micro 5.4:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-64kb-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-64kb-devel-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-5.14.21-150400.24.170.2.ppc64le",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-5.14.21-150400.24.170.2.s390x",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.aarch64",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.ppc64le",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.170.2.ppc64le",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.170.2.s390x",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-devel-5.14.21-150400.24.170.1.noarch",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-docs-5.14.21-150400.24.170.1.noarch",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-macros-5.14.21-150400.24.170.1.noarch",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.170.2.ppc64le",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.170.2.s390x",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-source-5.14.21-150400.24.170.1.noarch",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.170.1.aarch64",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.170.1.ppc64le",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.170.1.s390x",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.170.1.x86_64",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-zfcpdump-5.14.21-150400.24.170.2.s390x",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.170.2.ppc64le",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.170.2.s390x",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-5.14.21-150400.24.170.2.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-devel-5.14.21-150400.24.170.2.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-devel-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-devel-5.14.21-150400.24.170.1.noarch",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-docs-5.14.21-150400.24.170.1.noarch",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-macros-5.14.21-150400.24.170.1.noarch",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-obs-build-5.14.21-150400.24.170.2.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-obs-build-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-source-5.14.21-150400.24.170.1.noarch",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-syms-5.14.21-150400.24.170.1.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-syms-5.14.21-150400.24.170.1.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.170.2.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.170.2.x86_64",
          "SUSE Manager Proxy 4.3:kernel-default-5.14.21-150400.24.170.2.x86_64",
          "SUSE Manager Proxy 4.3:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
          "SUSE Manager Proxy 4.3:kernel-default-devel-5.14.21-150400.24.170.2.x86_64",
          "SUSE Manager Proxy 4.3:kernel-devel-5.14.21-150400.24.170.1.noarch",
          "SUSE Manager Proxy 4.3:kernel-macros-5.14.21-150400.24.170.1.noarch",
          "SUSE Manager Proxy 4.3:kernel-source-5.14.21-150400.24.170.1.noarch",
          "SUSE Manager Proxy 4.3:kernel-syms-5.14.21-150400.24.170.1.x86_64",
          "SUSE Manager Server 4.3:kernel-default-5.14.21-150400.24.170.2.ppc64le",
          "SUSE Manager Server 4.3:kernel-default-5.14.21-150400.24.170.2.s390x",
          "SUSE Manager Server 4.3:kernel-default-5.14.21-150400.24.170.2.x86_64",
          "SUSE Manager Server 4.3:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.ppc64le",
          "SUSE Manager Server 4.3:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
          "SUSE Manager Server 4.3:kernel-default-devel-5.14.21-150400.24.170.2.ppc64le",
          "SUSE Manager Server 4.3:kernel-default-devel-5.14.21-150400.24.170.2.s390x",
          "SUSE Manager Server 4.3:kernel-default-devel-5.14.21-150400.24.170.2.x86_64",
          "SUSE Manager Server 4.3:kernel-devel-5.14.21-150400.24.170.1.noarch",
          "SUSE Manager Server 4.3:kernel-macros-5.14.21-150400.24.170.1.noarch",
          "SUSE Manager Server 4.3:kernel-source-5.14.21-150400.24.170.1.noarch",
          "SUSE Manager Server 4.3:kernel-syms-5.14.21-150400.24.170.1.ppc64le",
          "SUSE Manager Server 4.3:kernel-syms-5.14.21-150400.24.170.1.s390x",
          "SUSE Manager Server 4.3:kernel-syms-5.14.21-150400.24.170.1.x86_64",
          "SUSE Manager Server 4.3:kernel-zfcpdump-5.14.21-150400.24.170.2.s390x"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2022-49986",
          "url": "https://www.suse.com/security/cve/CVE-2022-49986"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1244948 for CVE-2022-49986",
          "url": "https://bugzilla.suse.com/1244948"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-64kb-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-64kb-devel-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-devel-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-devel-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-devel-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-docs-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-macros-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-obs-build-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-obs-build-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-source-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-syms-5.14.21-150400.24.170.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-syms-5.14.21-150400.24.170.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:reiserfs-kmp-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:reiserfs-kmp-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-64kb-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-64kb-devel-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-devel-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-docs-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-macros-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-source-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.170.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.170.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_170-default-1-150400.9.3.2.ppc64le",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_170-default-1-150400.9.3.2.s390x",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_170-default-1-150400.9.3.2.x86_64",
            "SUSE Linux Enterprise Micro 5.3:kernel-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise Micro 5.3:kernel-default-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise Micro 5.3:kernel-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Micro 5.3:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.aarch64",
            "SUSE Linux Enterprise Micro 5.3:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
            "SUSE Linux Enterprise Micro 5.4:kernel-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise Micro 5.4:kernel-default-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise Micro 5.4:kernel-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Micro 5.4:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.aarch64",
            "SUSE Linux Enterprise Micro 5.4:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-64kb-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-64kb-devel-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.aarch64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.ppc64le",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-devel-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-docs-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-macros-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-source-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.170.1.aarch64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.170.1.ppc64le",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.170.1.s390x",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.170.1.x86_64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-zfcpdump-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-devel-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-devel-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-devel-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-docs-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-macros-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-obs-build-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-obs-build-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-source-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-syms-5.14.21-150400.24.170.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-syms-5.14.21-150400.24.170.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Manager Proxy 4.3:kernel-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Manager Proxy 4.3:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
            "SUSE Manager Proxy 4.3:kernel-default-devel-5.14.21-150400.24.170.2.x86_64",
            "SUSE Manager Proxy 4.3:kernel-devel-5.14.21-150400.24.170.1.noarch",
            "SUSE Manager Proxy 4.3:kernel-macros-5.14.21-150400.24.170.1.noarch",
            "SUSE Manager Proxy 4.3:kernel-source-5.14.21-150400.24.170.1.noarch",
            "SUSE Manager Proxy 4.3:kernel-syms-5.14.21-150400.24.170.1.x86_64",
            "SUSE Manager Server 4.3:kernel-default-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Manager Server 4.3:kernel-default-5.14.21-150400.24.170.2.s390x",
            "SUSE Manager Server 4.3:kernel-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Manager Server 4.3:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.ppc64le",
            "SUSE Manager Server 4.3:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
            "SUSE Manager Server 4.3:kernel-default-devel-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Manager Server 4.3:kernel-default-devel-5.14.21-150400.24.170.2.s390x",
            "SUSE Manager Server 4.3:kernel-default-devel-5.14.21-150400.24.170.2.x86_64",
            "SUSE Manager Server 4.3:kernel-devel-5.14.21-150400.24.170.1.noarch",
            "SUSE Manager Server 4.3:kernel-macros-5.14.21-150400.24.170.1.noarch",
            "SUSE Manager Server 4.3:kernel-source-5.14.21-150400.24.170.1.noarch",
            "SUSE Manager Server 4.3:kernel-syms-5.14.21-150400.24.170.1.ppc64le",
            "SUSE Manager Server 4.3:kernel-syms-5.14.21-150400.24.170.1.s390x",
            "SUSE Manager Server 4.3:kernel-syms-5.14.21-150400.24.170.1.x86_64",
            "SUSE Manager Server 4.3:kernel-zfcpdump-5.14.21-150400.24.170.2.s390x"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 5.5,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
            "version": "3.1"
          },
          "products": [
            "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-64kb-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-64kb-devel-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-devel-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-devel-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-devel-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-docs-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-macros-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-obs-build-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-obs-build-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-source-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-syms-5.14.21-150400.24.170.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-syms-5.14.21-150400.24.170.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:reiserfs-kmp-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:reiserfs-kmp-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-64kb-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-64kb-devel-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-devel-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-docs-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-macros-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-source-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.170.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.170.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_170-default-1-150400.9.3.2.ppc64le",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_170-default-1-150400.9.3.2.s390x",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_170-default-1-150400.9.3.2.x86_64",
            "SUSE Linux Enterprise Micro 5.3:kernel-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise Micro 5.3:kernel-default-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise Micro 5.3:kernel-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Micro 5.3:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.aarch64",
            "SUSE Linux Enterprise Micro 5.3:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
            "SUSE Linux Enterprise Micro 5.4:kernel-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise Micro 5.4:kernel-default-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise Micro 5.4:kernel-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Micro 5.4:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.aarch64",
            "SUSE Linux Enterprise Micro 5.4:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-64kb-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-64kb-devel-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.aarch64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.ppc64le",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-devel-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-docs-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-macros-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-source-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.170.1.aarch64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.170.1.ppc64le",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.170.1.s390x",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.170.1.x86_64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-zfcpdump-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-devel-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-devel-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-devel-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-docs-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-macros-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-obs-build-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-obs-build-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-source-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-syms-5.14.21-150400.24.170.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-syms-5.14.21-150400.24.170.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Manager Proxy 4.3:kernel-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Manager Proxy 4.3:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
            "SUSE Manager Proxy 4.3:kernel-default-devel-5.14.21-150400.24.170.2.x86_64",
            "SUSE Manager Proxy 4.3:kernel-devel-5.14.21-150400.24.170.1.noarch",
            "SUSE Manager Proxy 4.3:kernel-macros-5.14.21-150400.24.170.1.noarch",
            "SUSE Manager Proxy 4.3:kernel-source-5.14.21-150400.24.170.1.noarch",
            "SUSE Manager Proxy 4.3:kernel-syms-5.14.21-150400.24.170.1.x86_64",
            "SUSE Manager Server 4.3:kernel-default-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Manager Server 4.3:kernel-default-5.14.21-150400.24.170.2.s390x",
            "SUSE Manager Server 4.3:kernel-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Manager Server 4.3:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.ppc64le",
            "SUSE Manager Server 4.3:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
            "SUSE Manager Server 4.3:kernel-default-devel-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Manager Server 4.3:kernel-default-devel-5.14.21-150400.24.170.2.s390x",
            "SUSE Manager Server 4.3:kernel-default-devel-5.14.21-150400.24.170.2.x86_64",
            "SUSE Manager Server 4.3:kernel-devel-5.14.21-150400.24.170.1.noarch",
            "SUSE Manager Server 4.3:kernel-macros-5.14.21-150400.24.170.1.noarch",
            "SUSE Manager Server 4.3:kernel-source-5.14.21-150400.24.170.1.noarch",
            "SUSE Manager Server 4.3:kernel-syms-5.14.21-150400.24.170.1.ppc64le",
            "SUSE Manager Server 4.3:kernel-syms-5.14.21-150400.24.170.1.s390x",
            "SUSE Manager Server 4.3:kernel-syms-5.14.21-150400.24.170.1.x86_64",
            "SUSE Manager Server 4.3:kernel-zfcpdump-5.14.21-150400.24.170.2.s390x"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2025-07-28T15:09:33Z",
          "details": "moderate"
        }
      ],
      "title": "CVE-2022-49986"
    },
    {
      "cve": "CVE-2022-49987",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2022-49987"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "In the Linux kernel, the following vulnerability has been resolved:\n\nmd: call __md_stop_writes in md_stop\n\nFrom the link [1], we can see raid1d was running even after the path\nraid_dtr -\u003e md_stop -\u003e __md_stop.\n\nLet\u0027s stop write first in destructor to align with normal md-raid to\nfix the KASAN issue.\n\n[1]. https://lore.kernel.org/linux-raid/CAPhsuW5gc4AakdGNdF8ubpezAuDLFOYUO_sfMZcec6hQFm8nhg@mail.gmail.com/T/#m7f12bf90481c02c6d2da68c64aeed4779b7df74a",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.170.2.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.170.2.s390x",
          "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.170.2.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.170.2.s390x",
          "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.170.2.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.170.2.s390x",
          "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.170.2.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.170.2.s390x",
          "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-64kb-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-64kb-devel-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-devel-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-devel-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-devel-5.14.21-150400.24.170.1.noarch",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-docs-5.14.21-150400.24.170.1.noarch",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-macros-5.14.21-150400.24.170.1.noarch",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-obs-build-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-obs-build-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-source-5.14.21-150400.24.170.1.noarch",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-syms-5.14.21-150400.24.170.1.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-syms-5.14.21-150400.24.170.1.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:reiserfs-kmp-default-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:reiserfs-kmp-default-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-64kb-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-64kb-devel-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-devel-5.14.21-150400.24.170.1.noarch",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-docs-5.14.21-150400.24.170.1.noarch",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-macros-5.14.21-150400.24.170.1.noarch",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-source-5.14.21-150400.24.170.1.noarch",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.170.1.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.170.1.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.170.2.ppc64le",
          "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.170.2.s390x",
          "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.170.2.ppc64le",
          "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.170.2.s390x",
          "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_170-default-1-150400.9.3.2.ppc64le",
          "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_170-default-1-150400.9.3.2.s390x",
          "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_170-default-1-150400.9.3.2.x86_64",
          "SUSE Linux Enterprise Micro 5.3:kernel-default-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise Micro 5.3:kernel-default-5.14.21-150400.24.170.2.s390x",
          "SUSE Linux Enterprise Micro 5.3:kernel-default-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise Micro 5.3:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.aarch64",
          "SUSE Linux Enterprise Micro 5.3:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
          "SUSE Linux Enterprise Micro 5.4:kernel-default-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise Micro 5.4:kernel-default-5.14.21-150400.24.170.2.s390x",
          "SUSE Linux Enterprise Micro 5.4:kernel-default-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise Micro 5.4:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.aarch64",
          "SUSE Linux Enterprise Micro 5.4:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-64kb-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-64kb-devel-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-5.14.21-150400.24.170.2.ppc64le",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-5.14.21-150400.24.170.2.s390x",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.aarch64",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.ppc64le",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.170.2.ppc64le",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.170.2.s390x",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-devel-5.14.21-150400.24.170.1.noarch",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-docs-5.14.21-150400.24.170.1.noarch",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-macros-5.14.21-150400.24.170.1.noarch",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.170.2.ppc64le",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.170.2.s390x",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-source-5.14.21-150400.24.170.1.noarch",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.170.1.aarch64",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.170.1.ppc64le",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.170.1.s390x",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.170.1.x86_64",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-zfcpdump-5.14.21-150400.24.170.2.s390x",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.170.2.ppc64le",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.170.2.s390x",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-5.14.21-150400.24.170.2.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-devel-5.14.21-150400.24.170.2.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-devel-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-devel-5.14.21-150400.24.170.1.noarch",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-docs-5.14.21-150400.24.170.1.noarch",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-macros-5.14.21-150400.24.170.1.noarch",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-obs-build-5.14.21-150400.24.170.2.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-obs-build-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-source-5.14.21-150400.24.170.1.noarch",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-syms-5.14.21-150400.24.170.1.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-syms-5.14.21-150400.24.170.1.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.170.2.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.170.2.x86_64",
          "SUSE Manager Proxy 4.3:kernel-default-5.14.21-150400.24.170.2.x86_64",
          "SUSE Manager Proxy 4.3:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
          "SUSE Manager Proxy 4.3:kernel-default-devel-5.14.21-150400.24.170.2.x86_64",
          "SUSE Manager Proxy 4.3:kernel-devel-5.14.21-150400.24.170.1.noarch",
          "SUSE Manager Proxy 4.3:kernel-macros-5.14.21-150400.24.170.1.noarch",
          "SUSE Manager Proxy 4.3:kernel-source-5.14.21-150400.24.170.1.noarch",
          "SUSE Manager Proxy 4.3:kernel-syms-5.14.21-150400.24.170.1.x86_64",
          "SUSE Manager Server 4.3:kernel-default-5.14.21-150400.24.170.2.ppc64le",
          "SUSE Manager Server 4.3:kernel-default-5.14.21-150400.24.170.2.s390x",
          "SUSE Manager Server 4.3:kernel-default-5.14.21-150400.24.170.2.x86_64",
          "SUSE Manager Server 4.3:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.ppc64le",
          "SUSE Manager Server 4.3:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
          "SUSE Manager Server 4.3:kernel-default-devel-5.14.21-150400.24.170.2.ppc64le",
          "SUSE Manager Server 4.3:kernel-default-devel-5.14.21-150400.24.170.2.s390x",
          "SUSE Manager Server 4.3:kernel-default-devel-5.14.21-150400.24.170.2.x86_64",
          "SUSE Manager Server 4.3:kernel-devel-5.14.21-150400.24.170.1.noarch",
          "SUSE Manager Server 4.3:kernel-macros-5.14.21-150400.24.170.1.noarch",
          "SUSE Manager Server 4.3:kernel-source-5.14.21-150400.24.170.1.noarch",
          "SUSE Manager Server 4.3:kernel-syms-5.14.21-150400.24.170.1.ppc64le",
          "SUSE Manager Server 4.3:kernel-syms-5.14.21-150400.24.170.1.s390x",
          "SUSE Manager Server 4.3:kernel-syms-5.14.21-150400.24.170.1.x86_64",
          "SUSE Manager Server 4.3:kernel-zfcpdump-5.14.21-150400.24.170.2.s390x"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2022-49987",
          "url": "https://www.suse.com/security/cve/CVE-2022-49987"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1245024 for CVE-2022-49987",
          "url": "https://bugzilla.suse.com/1245024"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-64kb-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-64kb-devel-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-devel-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-devel-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-devel-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-docs-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-macros-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-obs-build-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-obs-build-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-source-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-syms-5.14.21-150400.24.170.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-syms-5.14.21-150400.24.170.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:reiserfs-kmp-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:reiserfs-kmp-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-64kb-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-64kb-devel-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-devel-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-docs-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-macros-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-source-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.170.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.170.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_170-default-1-150400.9.3.2.ppc64le",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_170-default-1-150400.9.3.2.s390x",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_170-default-1-150400.9.3.2.x86_64",
            "SUSE Linux Enterprise Micro 5.3:kernel-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise Micro 5.3:kernel-default-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise Micro 5.3:kernel-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Micro 5.3:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.aarch64",
            "SUSE Linux Enterprise Micro 5.3:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
            "SUSE Linux Enterprise Micro 5.4:kernel-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise Micro 5.4:kernel-default-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise Micro 5.4:kernel-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Micro 5.4:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.aarch64",
            "SUSE Linux Enterprise Micro 5.4:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-64kb-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-64kb-devel-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.aarch64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.ppc64le",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-devel-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-docs-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-macros-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-source-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.170.1.aarch64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.170.1.ppc64le",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.170.1.s390x",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.170.1.x86_64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-zfcpdump-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-devel-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-devel-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-devel-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-docs-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-macros-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-obs-build-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-obs-build-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-source-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-syms-5.14.21-150400.24.170.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-syms-5.14.21-150400.24.170.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Manager Proxy 4.3:kernel-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Manager Proxy 4.3:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
            "SUSE Manager Proxy 4.3:kernel-default-devel-5.14.21-150400.24.170.2.x86_64",
            "SUSE Manager Proxy 4.3:kernel-devel-5.14.21-150400.24.170.1.noarch",
            "SUSE Manager Proxy 4.3:kernel-macros-5.14.21-150400.24.170.1.noarch",
            "SUSE Manager Proxy 4.3:kernel-source-5.14.21-150400.24.170.1.noarch",
            "SUSE Manager Proxy 4.3:kernel-syms-5.14.21-150400.24.170.1.x86_64",
            "SUSE Manager Server 4.3:kernel-default-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Manager Server 4.3:kernel-default-5.14.21-150400.24.170.2.s390x",
            "SUSE Manager Server 4.3:kernel-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Manager Server 4.3:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.ppc64le",
            "SUSE Manager Server 4.3:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
            "SUSE Manager Server 4.3:kernel-default-devel-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Manager Server 4.3:kernel-default-devel-5.14.21-150400.24.170.2.s390x",
            "SUSE Manager Server 4.3:kernel-default-devel-5.14.21-150400.24.170.2.x86_64",
            "SUSE Manager Server 4.3:kernel-devel-5.14.21-150400.24.170.1.noarch",
            "SUSE Manager Server 4.3:kernel-macros-5.14.21-150400.24.170.1.noarch",
            "SUSE Manager Server 4.3:kernel-source-5.14.21-150400.24.170.1.noarch",
            "SUSE Manager Server 4.3:kernel-syms-5.14.21-150400.24.170.1.ppc64le",
            "SUSE Manager Server 4.3:kernel-syms-5.14.21-150400.24.170.1.s390x",
            "SUSE Manager Server 4.3:kernel-syms-5.14.21-150400.24.170.1.x86_64",
            "SUSE Manager Server 4.3:kernel-zfcpdump-5.14.21-150400.24.170.2.s390x"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 5.5,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
            "version": "3.1"
          },
          "products": [
            "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-64kb-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-64kb-devel-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-devel-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-devel-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-devel-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-docs-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-macros-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-obs-build-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-obs-build-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-source-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-syms-5.14.21-150400.24.170.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-syms-5.14.21-150400.24.170.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:reiserfs-kmp-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:reiserfs-kmp-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-64kb-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-64kb-devel-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-devel-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-docs-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-macros-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-source-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.170.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.170.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_170-default-1-150400.9.3.2.ppc64le",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_170-default-1-150400.9.3.2.s390x",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_170-default-1-150400.9.3.2.x86_64",
            "SUSE Linux Enterprise Micro 5.3:kernel-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise Micro 5.3:kernel-default-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise Micro 5.3:kernel-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Micro 5.3:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.aarch64",
            "SUSE Linux Enterprise Micro 5.3:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
            "SUSE Linux Enterprise Micro 5.4:kernel-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise Micro 5.4:kernel-default-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise Micro 5.4:kernel-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Micro 5.4:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.aarch64",
            "SUSE Linux Enterprise Micro 5.4:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-64kb-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-64kb-devel-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.aarch64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.ppc64le",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-devel-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-docs-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-macros-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-source-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.170.1.aarch64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.170.1.ppc64le",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.170.1.s390x",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.170.1.x86_64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-zfcpdump-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-devel-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-devel-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-devel-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-docs-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-macros-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-obs-build-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-obs-build-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-source-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-syms-5.14.21-150400.24.170.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-syms-5.14.21-150400.24.170.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Manager Proxy 4.3:kernel-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Manager Proxy 4.3:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
            "SUSE Manager Proxy 4.3:kernel-default-devel-5.14.21-150400.24.170.2.x86_64",
            "SUSE Manager Proxy 4.3:kernel-devel-5.14.21-150400.24.170.1.noarch",
            "SUSE Manager Proxy 4.3:kernel-macros-5.14.21-150400.24.170.1.noarch",
            "SUSE Manager Proxy 4.3:kernel-source-5.14.21-150400.24.170.1.noarch",
            "SUSE Manager Proxy 4.3:kernel-syms-5.14.21-150400.24.170.1.x86_64",
            "SUSE Manager Server 4.3:kernel-default-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Manager Server 4.3:kernel-default-5.14.21-150400.24.170.2.s390x",
            "SUSE Manager Server 4.3:kernel-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Manager Server 4.3:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.ppc64le",
            "SUSE Manager Server 4.3:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
            "SUSE Manager Server 4.3:kernel-default-devel-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Manager Server 4.3:kernel-default-devel-5.14.21-150400.24.170.2.s390x",
            "SUSE Manager Server 4.3:kernel-default-devel-5.14.21-150400.24.170.2.x86_64",
            "SUSE Manager Server 4.3:kernel-devel-5.14.21-150400.24.170.1.noarch",
            "SUSE Manager Server 4.3:kernel-macros-5.14.21-150400.24.170.1.noarch",
            "SUSE Manager Server 4.3:kernel-source-5.14.21-150400.24.170.1.noarch",
            "SUSE Manager Server 4.3:kernel-syms-5.14.21-150400.24.170.1.ppc64le",
            "SUSE Manager Server 4.3:kernel-syms-5.14.21-150400.24.170.1.s390x",
            "SUSE Manager Server 4.3:kernel-syms-5.14.21-150400.24.170.1.x86_64",
            "SUSE Manager Server 4.3:kernel-zfcpdump-5.14.21-150400.24.170.2.s390x"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2025-07-28T15:09:33Z",
          "details": "moderate"
        }
      ],
      "title": "CVE-2022-49987"
    },
    {
      "cve": "CVE-2022-49989",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2022-49989"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "In the Linux kernel, the following vulnerability has been resolved:\n\nxen/privcmd: fix error exit of privcmd_ioctl_dm_op()\n\nThe error exit of privcmd_ioctl_dm_op() is calling unlock_pages()\npotentially with pages being NULL, leading to a NULL dereference.\n\nAdditionally lock_pages() doesn\u0027t check for pin_user_pages_fast()\nhaving been completely successful, resulting in potentially not\nlocking all pages into memory. This could result in sporadic failures\nwhen using the related memory in user mode.\n\nFix all of that by calling unlock_pages() always with the real number\nof pinned pages, which will be zero in case pages being NULL, and by\nchecking the number of pages pinned by pin_user_pages_fast() matching\nthe expected number of pages.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.170.2.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.170.2.s390x",
          "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.170.2.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.170.2.s390x",
          "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.170.2.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.170.2.s390x",
          "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.170.2.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.170.2.s390x",
          "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-64kb-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-64kb-devel-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-devel-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-devel-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-devel-5.14.21-150400.24.170.1.noarch",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-docs-5.14.21-150400.24.170.1.noarch",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-macros-5.14.21-150400.24.170.1.noarch",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-obs-build-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-obs-build-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-source-5.14.21-150400.24.170.1.noarch",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-syms-5.14.21-150400.24.170.1.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-syms-5.14.21-150400.24.170.1.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:reiserfs-kmp-default-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:reiserfs-kmp-default-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-64kb-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-64kb-devel-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-devel-5.14.21-150400.24.170.1.noarch",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-docs-5.14.21-150400.24.170.1.noarch",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-macros-5.14.21-150400.24.170.1.noarch",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-source-5.14.21-150400.24.170.1.noarch",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.170.1.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.170.1.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.170.2.ppc64le",
          "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.170.2.s390x",
          "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.170.2.ppc64le",
          "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.170.2.s390x",
          "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_170-default-1-150400.9.3.2.ppc64le",
          "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_170-default-1-150400.9.3.2.s390x",
          "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_170-default-1-150400.9.3.2.x86_64",
          "SUSE Linux Enterprise Micro 5.3:kernel-default-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise Micro 5.3:kernel-default-5.14.21-150400.24.170.2.s390x",
          "SUSE Linux Enterprise Micro 5.3:kernel-default-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise Micro 5.3:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.aarch64",
          "SUSE Linux Enterprise Micro 5.3:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
          "SUSE Linux Enterprise Micro 5.4:kernel-default-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise Micro 5.4:kernel-default-5.14.21-150400.24.170.2.s390x",
          "SUSE Linux Enterprise Micro 5.4:kernel-default-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise Micro 5.4:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.aarch64",
          "SUSE Linux Enterprise Micro 5.4:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-64kb-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-64kb-devel-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-5.14.21-150400.24.170.2.ppc64le",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-5.14.21-150400.24.170.2.s390x",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.aarch64",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.ppc64le",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.170.2.ppc64le",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.170.2.s390x",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-devel-5.14.21-150400.24.170.1.noarch",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-docs-5.14.21-150400.24.170.1.noarch",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-macros-5.14.21-150400.24.170.1.noarch",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.170.2.ppc64le",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.170.2.s390x",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-source-5.14.21-150400.24.170.1.noarch",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.170.1.aarch64",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.170.1.ppc64le",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.170.1.s390x",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.170.1.x86_64",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-zfcpdump-5.14.21-150400.24.170.2.s390x",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.170.2.ppc64le",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.170.2.s390x",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-5.14.21-150400.24.170.2.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-devel-5.14.21-150400.24.170.2.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-devel-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-devel-5.14.21-150400.24.170.1.noarch",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-docs-5.14.21-150400.24.170.1.noarch",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-macros-5.14.21-150400.24.170.1.noarch",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-obs-build-5.14.21-150400.24.170.2.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-obs-build-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-source-5.14.21-150400.24.170.1.noarch",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-syms-5.14.21-150400.24.170.1.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-syms-5.14.21-150400.24.170.1.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.170.2.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.170.2.x86_64",
          "SUSE Manager Proxy 4.3:kernel-default-5.14.21-150400.24.170.2.x86_64",
          "SUSE Manager Proxy 4.3:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
          "SUSE Manager Proxy 4.3:kernel-default-devel-5.14.21-150400.24.170.2.x86_64",
          "SUSE Manager Proxy 4.3:kernel-devel-5.14.21-150400.24.170.1.noarch",
          "SUSE Manager Proxy 4.3:kernel-macros-5.14.21-150400.24.170.1.noarch",
          "SUSE Manager Proxy 4.3:kernel-source-5.14.21-150400.24.170.1.noarch",
          "SUSE Manager Proxy 4.3:kernel-syms-5.14.21-150400.24.170.1.x86_64",
          "SUSE Manager Server 4.3:kernel-default-5.14.21-150400.24.170.2.ppc64le",
          "SUSE Manager Server 4.3:kernel-default-5.14.21-150400.24.170.2.s390x",
          "SUSE Manager Server 4.3:kernel-default-5.14.21-150400.24.170.2.x86_64",
          "SUSE Manager Server 4.3:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.ppc64le",
          "SUSE Manager Server 4.3:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
          "SUSE Manager Server 4.3:kernel-default-devel-5.14.21-150400.24.170.2.ppc64le",
          "SUSE Manager Server 4.3:kernel-default-devel-5.14.21-150400.24.170.2.s390x",
          "SUSE Manager Server 4.3:kernel-default-devel-5.14.21-150400.24.170.2.x86_64",
          "SUSE Manager Server 4.3:kernel-devel-5.14.21-150400.24.170.1.noarch",
          "SUSE Manager Server 4.3:kernel-macros-5.14.21-150400.24.170.1.noarch",
          "SUSE Manager Server 4.3:kernel-source-5.14.21-150400.24.170.1.noarch",
          "SUSE Manager Server 4.3:kernel-syms-5.14.21-150400.24.170.1.ppc64le",
          "SUSE Manager Server 4.3:kernel-syms-5.14.21-150400.24.170.1.s390x",
          "SUSE Manager Server 4.3:kernel-syms-5.14.21-150400.24.170.1.x86_64",
          "SUSE Manager Server 4.3:kernel-zfcpdump-5.14.21-150400.24.170.2.s390x"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2022-49989",
          "url": "https://www.suse.com/security/cve/CVE-2022-49989"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1245007 for CVE-2022-49989",
          "url": "https://bugzilla.suse.com/1245007"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-64kb-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-64kb-devel-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-devel-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-devel-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-devel-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-docs-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-macros-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-obs-build-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-obs-build-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-source-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-syms-5.14.21-150400.24.170.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-syms-5.14.21-150400.24.170.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:reiserfs-kmp-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:reiserfs-kmp-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-64kb-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-64kb-devel-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-devel-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-docs-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-macros-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-source-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.170.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.170.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_170-default-1-150400.9.3.2.ppc64le",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_170-default-1-150400.9.3.2.s390x",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_170-default-1-150400.9.3.2.x86_64",
            "SUSE Linux Enterprise Micro 5.3:kernel-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise Micro 5.3:kernel-default-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise Micro 5.3:kernel-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Micro 5.3:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.aarch64",
            "SUSE Linux Enterprise Micro 5.3:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
            "SUSE Linux Enterprise Micro 5.4:kernel-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise Micro 5.4:kernel-default-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise Micro 5.4:kernel-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Micro 5.4:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.aarch64",
            "SUSE Linux Enterprise Micro 5.4:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-64kb-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-64kb-devel-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.aarch64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.ppc64le",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-devel-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-docs-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-macros-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-source-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.170.1.aarch64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.170.1.ppc64le",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.170.1.s390x",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.170.1.x86_64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-zfcpdump-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-devel-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-devel-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-devel-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-docs-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-macros-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-obs-build-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-obs-build-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-source-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-syms-5.14.21-150400.24.170.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-syms-5.14.21-150400.24.170.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Manager Proxy 4.3:kernel-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Manager Proxy 4.3:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
            "SUSE Manager Proxy 4.3:kernel-default-devel-5.14.21-150400.24.170.2.x86_64",
            "SUSE Manager Proxy 4.3:kernel-devel-5.14.21-150400.24.170.1.noarch",
            "SUSE Manager Proxy 4.3:kernel-macros-5.14.21-150400.24.170.1.noarch",
            "SUSE Manager Proxy 4.3:kernel-source-5.14.21-150400.24.170.1.noarch",
            "SUSE Manager Proxy 4.3:kernel-syms-5.14.21-150400.24.170.1.x86_64",
            "SUSE Manager Server 4.3:kernel-default-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Manager Server 4.3:kernel-default-5.14.21-150400.24.170.2.s390x",
            "SUSE Manager Server 4.3:kernel-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Manager Server 4.3:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.ppc64le",
            "SUSE Manager Server 4.3:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
            "SUSE Manager Server 4.3:kernel-default-devel-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Manager Server 4.3:kernel-default-devel-5.14.21-150400.24.170.2.s390x",
            "SUSE Manager Server 4.3:kernel-default-devel-5.14.21-150400.24.170.2.x86_64",
            "SUSE Manager Server 4.3:kernel-devel-5.14.21-150400.24.170.1.noarch",
            "SUSE Manager Server 4.3:kernel-macros-5.14.21-150400.24.170.1.noarch",
            "SUSE Manager Server 4.3:kernel-source-5.14.21-150400.24.170.1.noarch",
            "SUSE Manager Server 4.3:kernel-syms-5.14.21-150400.24.170.1.ppc64le",
            "SUSE Manager Server 4.3:kernel-syms-5.14.21-150400.24.170.1.s390x",
            "SUSE Manager Server 4.3:kernel-syms-5.14.21-150400.24.170.1.x86_64",
            "SUSE Manager Server 4.3:kernel-zfcpdump-5.14.21-150400.24.170.2.s390x"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 5.5,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
            "version": "3.1"
          },
          "products": [
            "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-64kb-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-64kb-devel-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-devel-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-devel-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-devel-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-docs-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-macros-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-obs-build-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-obs-build-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-source-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-syms-5.14.21-150400.24.170.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-syms-5.14.21-150400.24.170.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:reiserfs-kmp-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:reiserfs-kmp-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-64kb-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-64kb-devel-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-devel-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-docs-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-macros-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-source-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.170.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.170.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_170-default-1-150400.9.3.2.ppc64le",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_170-default-1-150400.9.3.2.s390x",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_170-default-1-150400.9.3.2.x86_64",
            "SUSE Linux Enterprise Micro 5.3:kernel-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise Micro 5.3:kernel-default-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise Micro 5.3:kernel-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Micro 5.3:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.aarch64",
            "SUSE Linux Enterprise Micro 5.3:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
            "SUSE Linux Enterprise Micro 5.4:kernel-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise Micro 5.4:kernel-default-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise Micro 5.4:kernel-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Micro 5.4:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.aarch64",
            "SUSE Linux Enterprise Micro 5.4:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-64kb-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-64kb-devel-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.aarch64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.ppc64le",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-devel-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-docs-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-macros-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-source-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.170.1.aarch64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.170.1.ppc64le",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.170.1.s390x",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.170.1.x86_64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-zfcpdump-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-devel-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-devel-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-devel-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-docs-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-macros-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-obs-build-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-obs-build-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-source-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-syms-5.14.21-150400.24.170.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-syms-5.14.21-150400.24.170.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Manager Proxy 4.3:kernel-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Manager Proxy 4.3:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
            "SUSE Manager Proxy 4.3:kernel-default-devel-5.14.21-150400.24.170.2.x86_64",
            "SUSE Manager Proxy 4.3:kernel-devel-5.14.21-150400.24.170.1.noarch",
            "SUSE Manager Proxy 4.3:kernel-macros-5.14.21-150400.24.170.1.noarch",
            "SUSE Manager Proxy 4.3:kernel-source-5.14.21-150400.24.170.1.noarch",
            "SUSE Manager Proxy 4.3:kernel-syms-5.14.21-150400.24.170.1.x86_64",
            "SUSE Manager Server 4.3:kernel-default-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Manager Server 4.3:kernel-default-5.14.21-150400.24.170.2.s390x",
            "SUSE Manager Server 4.3:kernel-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Manager Server 4.3:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.ppc64le",
            "SUSE Manager Server 4.3:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
            "SUSE Manager Server 4.3:kernel-default-devel-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Manager Server 4.3:kernel-default-devel-5.14.21-150400.24.170.2.s390x",
            "SUSE Manager Server 4.3:kernel-default-devel-5.14.21-150400.24.170.2.x86_64",
            "SUSE Manager Server 4.3:kernel-devel-5.14.21-150400.24.170.1.noarch",
            "SUSE Manager Server 4.3:kernel-macros-5.14.21-150400.24.170.1.noarch",
            "SUSE Manager Server 4.3:kernel-source-5.14.21-150400.24.170.1.noarch",
            "SUSE Manager Server 4.3:kernel-syms-5.14.21-150400.24.170.1.ppc64le",
            "SUSE Manager Server 4.3:kernel-syms-5.14.21-150400.24.170.1.s390x",
            "SUSE Manager Server 4.3:kernel-syms-5.14.21-150400.24.170.1.x86_64",
            "SUSE Manager Server 4.3:kernel-zfcpdump-5.14.21-150400.24.170.2.s390x"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2025-07-28T15:09:33Z",
          "details": "moderate"
        }
      ],
      "title": "CVE-2022-49989"
    },
    {
      "cve": "CVE-2022-49990",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2022-49990"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "In the Linux kernel, the following vulnerability has been resolved:\n\ns390: fix double free of GS and RI CBs on fork() failure\n\nThe pointers for guarded storage and runtime instrumentation control\nblocks are stored in the thread_struct of the associated task. These\npointers are initially copied on fork() via arch_dup_task_struct()\nand then cleared via copy_thread() before fork() returns. If fork()\nhappens to fail after the initial task dup and before copy_thread(),\nthe newly allocated task and associated thread_struct memory are\nfreed via free_task() -\u003e arch_release_task_struct(). This results in\na double free of the guarded storage and runtime info structs\nbecause the fields in the failed task still refer to memory\nassociated with the source task.\n\nThis problem can manifest as a BUG_ON() in set_freepointer() (with\nCONFIG_SLAB_FREELIST_HARDENED enabled) or KASAN splat (if enabled)\nwhen running trinity syscall fuzz tests on s390x. To avoid this\nproblem, clear the associated pointer fields in\narch_dup_task_struct() immediately after the new task is copied.\nNote that the RI flag is still cleared in copy_thread() because it\nresides in thread stack memory and that is where stack info is\ncopied.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.170.2.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.170.2.s390x",
          "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.170.2.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.170.2.s390x",
          "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.170.2.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.170.2.s390x",
          "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.170.2.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.170.2.s390x",
          "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-64kb-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-64kb-devel-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-devel-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-devel-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-devel-5.14.21-150400.24.170.1.noarch",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-docs-5.14.21-150400.24.170.1.noarch",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-macros-5.14.21-150400.24.170.1.noarch",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-obs-build-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-obs-build-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-source-5.14.21-150400.24.170.1.noarch",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-syms-5.14.21-150400.24.170.1.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-syms-5.14.21-150400.24.170.1.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:reiserfs-kmp-default-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:reiserfs-kmp-default-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-64kb-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-64kb-devel-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-devel-5.14.21-150400.24.170.1.noarch",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-docs-5.14.21-150400.24.170.1.noarch",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-macros-5.14.21-150400.24.170.1.noarch",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-source-5.14.21-150400.24.170.1.noarch",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.170.1.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.170.1.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.170.2.ppc64le",
          "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.170.2.s390x",
          "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.170.2.ppc64le",
          "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.170.2.s390x",
          "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_170-default-1-150400.9.3.2.ppc64le",
          "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_170-default-1-150400.9.3.2.s390x",
          "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_170-default-1-150400.9.3.2.x86_64",
          "SUSE Linux Enterprise Micro 5.3:kernel-default-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise Micro 5.3:kernel-default-5.14.21-150400.24.170.2.s390x",
          "SUSE Linux Enterprise Micro 5.3:kernel-default-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise Micro 5.3:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.aarch64",
          "SUSE Linux Enterprise Micro 5.3:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
          "SUSE Linux Enterprise Micro 5.4:kernel-default-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise Micro 5.4:kernel-default-5.14.21-150400.24.170.2.s390x",
          "SUSE Linux Enterprise Micro 5.4:kernel-default-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise Micro 5.4:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.aarch64",
          "SUSE Linux Enterprise Micro 5.4:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-64kb-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-64kb-devel-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-5.14.21-150400.24.170.2.ppc64le",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-5.14.21-150400.24.170.2.s390x",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.aarch64",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.ppc64le",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.170.2.ppc64le",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.170.2.s390x",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-devel-5.14.21-150400.24.170.1.noarch",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-docs-5.14.21-150400.24.170.1.noarch",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-macros-5.14.21-150400.24.170.1.noarch",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.170.2.ppc64le",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.170.2.s390x",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-source-5.14.21-150400.24.170.1.noarch",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.170.1.aarch64",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.170.1.ppc64le",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.170.1.s390x",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.170.1.x86_64",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-zfcpdump-5.14.21-150400.24.170.2.s390x",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.170.2.ppc64le",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.170.2.s390x",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-5.14.21-150400.24.170.2.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-devel-5.14.21-150400.24.170.2.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-devel-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-devel-5.14.21-150400.24.170.1.noarch",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-docs-5.14.21-150400.24.170.1.noarch",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-macros-5.14.21-150400.24.170.1.noarch",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-obs-build-5.14.21-150400.24.170.2.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-obs-build-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-source-5.14.21-150400.24.170.1.noarch",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-syms-5.14.21-150400.24.170.1.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-syms-5.14.21-150400.24.170.1.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.170.2.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.170.2.x86_64",
          "SUSE Manager Proxy 4.3:kernel-default-5.14.21-150400.24.170.2.x86_64",
          "SUSE Manager Proxy 4.3:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
          "SUSE Manager Proxy 4.3:kernel-default-devel-5.14.21-150400.24.170.2.x86_64",
          "SUSE Manager Proxy 4.3:kernel-devel-5.14.21-150400.24.170.1.noarch",
          "SUSE Manager Proxy 4.3:kernel-macros-5.14.21-150400.24.170.1.noarch",
          "SUSE Manager Proxy 4.3:kernel-source-5.14.21-150400.24.170.1.noarch",
          "SUSE Manager Proxy 4.3:kernel-syms-5.14.21-150400.24.170.1.x86_64",
          "SUSE Manager Server 4.3:kernel-default-5.14.21-150400.24.170.2.ppc64le",
          "SUSE Manager Server 4.3:kernel-default-5.14.21-150400.24.170.2.s390x",
          "SUSE Manager Server 4.3:kernel-default-5.14.21-150400.24.170.2.x86_64",
          "SUSE Manager Server 4.3:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.ppc64le",
          "SUSE Manager Server 4.3:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
          "SUSE Manager Server 4.3:kernel-default-devel-5.14.21-150400.24.170.2.ppc64le",
          "SUSE Manager Server 4.3:kernel-default-devel-5.14.21-150400.24.170.2.s390x",
          "SUSE Manager Server 4.3:kernel-default-devel-5.14.21-150400.24.170.2.x86_64",
          "SUSE Manager Server 4.3:kernel-devel-5.14.21-150400.24.170.1.noarch",
          "SUSE Manager Server 4.3:kernel-macros-5.14.21-150400.24.170.1.noarch",
          "SUSE Manager Server 4.3:kernel-source-5.14.21-150400.24.170.1.noarch",
          "SUSE Manager Server 4.3:kernel-syms-5.14.21-150400.24.170.1.ppc64le",
          "SUSE Manager Server 4.3:kernel-syms-5.14.21-150400.24.170.1.s390x",
          "SUSE Manager Server 4.3:kernel-syms-5.14.21-150400.24.170.1.x86_64",
          "SUSE Manager Server 4.3:kernel-zfcpdump-5.14.21-150400.24.170.2.s390x"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2022-49990",
          "url": "https://www.suse.com/security/cve/CVE-2022-49990"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1245006 for CVE-2022-49990",
          "url": "https://bugzilla.suse.com/1245006"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-64kb-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-64kb-devel-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-devel-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-devel-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-devel-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-docs-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-macros-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-obs-build-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-obs-build-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-source-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-syms-5.14.21-150400.24.170.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-syms-5.14.21-150400.24.170.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:reiserfs-kmp-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:reiserfs-kmp-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-64kb-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-64kb-devel-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-devel-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-docs-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-macros-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-source-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.170.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.170.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_170-default-1-150400.9.3.2.ppc64le",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_170-default-1-150400.9.3.2.s390x",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_170-default-1-150400.9.3.2.x86_64",
            "SUSE Linux Enterprise Micro 5.3:kernel-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise Micro 5.3:kernel-default-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise Micro 5.3:kernel-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Micro 5.3:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.aarch64",
            "SUSE Linux Enterprise Micro 5.3:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
            "SUSE Linux Enterprise Micro 5.4:kernel-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise Micro 5.4:kernel-default-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise Micro 5.4:kernel-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Micro 5.4:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.aarch64",
            "SUSE Linux Enterprise Micro 5.4:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-64kb-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-64kb-devel-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.aarch64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.ppc64le",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-devel-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-docs-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-macros-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-source-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.170.1.aarch64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.170.1.ppc64le",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.170.1.s390x",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.170.1.x86_64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-zfcpdump-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-devel-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-devel-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-devel-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-docs-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-macros-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-obs-build-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-obs-build-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-source-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-syms-5.14.21-150400.24.170.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-syms-5.14.21-150400.24.170.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Manager Proxy 4.3:kernel-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Manager Proxy 4.3:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
            "SUSE Manager Proxy 4.3:kernel-default-devel-5.14.21-150400.24.170.2.x86_64",
            "SUSE Manager Proxy 4.3:kernel-devel-5.14.21-150400.24.170.1.noarch",
            "SUSE Manager Proxy 4.3:kernel-macros-5.14.21-150400.24.170.1.noarch",
            "SUSE Manager Proxy 4.3:kernel-source-5.14.21-150400.24.170.1.noarch",
            "SUSE Manager Proxy 4.3:kernel-syms-5.14.21-150400.24.170.1.x86_64",
            "SUSE Manager Server 4.3:kernel-default-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Manager Server 4.3:kernel-default-5.14.21-150400.24.170.2.s390x",
            "SUSE Manager Server 4.3:kernel-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Manager Server 4.3:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.ppc64le",
            "SUSE Manager Server 4.3:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
            "SUSE Manager Server 4.3:kernel-default-devel-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Manager Server 4.3:kernel-default-devel-5.14.21-150400.24.170.2.s390x",
            "SUSE Manager Server 4.3:kernel-default-devel-5.14.21-150400.24.170.2.x86_64",
            "SUSE Manager Server 4.3:kernel-devel-5.14.21-150400.24.170.1.noarch",
            "SUSE Manager Server 4.3:kernel-macros-5.14.21-150400.24.170.1.noarch",
            "SUSE Manager Server 4.3:kernel-source-5.14.21-150400.24.170.1.noarch",
            "SUSE Manager Server 4.3:kernel-syms-5.14.21-150400.24.170.1.ppc64le",
            "SUSE Manager Server 4.3:kernel-syms-5.14.21-150400.24.170.1.s390x",
            "SUSE Manager Server 4.3:kernel-syms-5.14.21-150400.24.170.1.x86_64",
            "SUSE Manager Server 4.3:kernel-zfcpdump-5.14.21-150400.24.170.2.s390x"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 5.5,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
            "version": "3.1"
          },
          "products": [
            "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-64kb-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-64kb-devel-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-devel-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-devel-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-devel-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-docs-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-macros-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-obs-build-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-obs-build-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-source-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-syms-5.14.21-150400.24.170.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-syms-5.14.21-150400.24.170.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:reiserfs-kmp-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:reiserfs-kmp-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-64kb-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-64kb-devel-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-devel-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-docs-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-macros-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-source-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.170.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.170.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_170-default-1-150400.9.3.2.ppc64le",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_170-default-1-150400.9.3.2.s390x",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_170-default-1-150400.9.3.2.x86_64",
            "SUSE Linux Enterprise Micro 5.3:kernel-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise Micro 5.3:kernel-default-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise Micro 5.3:kernel-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Micro 5.3:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.aarch64",
            "SUSE Linux Enterprise Micro 5.3:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
            "SUSE Linux Enterprise Micro 5.4:kernel-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise Micro 5.4:kernel-default-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise Micro 5.4:kernel-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Micro 5.4:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.aarch64",
            "SUSE Linux Enterprise Micro 5.4:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-64kb-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-64kb-devel-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.aarch64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.ppc64le",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-devel-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-docs-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-macros-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-source-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.170.1.aarch64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.170.1.ppc64le",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.170.1.s390x",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.170.1.x86_64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-zfcpdump-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-devel-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-devel-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-devel-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-docs-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-macros-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-obs-build-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-obs-build-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-source-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-syms-5.14.21-150400.24.170.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-syms-5.14.21-150400.24.170.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Manager Proxy 4.3:kernel-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Manager Proxy 4.3:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
            "SUSE Manager Proxy 4.3:kernel-default-devel-5.14.21-150400.24.170.2.x86_64",
            "SUSE Manager Proxy 4.3:kernel-devel-5.14.21-150400.24.170.1.noarch",
            "SUSE Manager Proxy 4.3:kernel-macros-5.14.21-150400.24.170.1.noarch",
            "SUSE Manager Proxy 4.3:kernel-source-5.14.21-150400.24.170.1.noarch",
            "SUSE Manager Proxy 4.3:kernel-syms-5.14.21-150400.24.170.1.x86_64",
            "SUSE Manager Server 4.3:kernel-default-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Manager Server 4.3:kernel-default-5.14.21-150400.24.170.2.s390x",
            "SUSE Manager Server 4.3:kernel-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Manager Server 4.3:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.ppc64le",
            "SUSE Manager Server 4.3:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
            "SUSE Manager Server 4.3:kernel-default-devel-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Manager Server 4.3:kernel-default-devel-5.14.21-150400.24.170.2.s390x",
            "SUSE Manager Server 4.3:kernel-default-devel-5.14.21-150400.24.170.2.x86_64",
            "SUSE Manager Server 4.3:kernel-devel-5.14.21-150400.24.170.1.noarch",
            "SUSE Manager Server 4.3:kernel-macros-5.14.21-150400.24.170.1.noarch",
            "SUSE Manager Server 4.3:kernel-source-5.14.21-150400.24.170.1.noarch",
            "SUSE Manager Server 4.3:kernel-syms-5.14.21-150400.24.170.1.ppc64le",
            "SUSE Manager Server 4.3:kernel-syms-5.14.21-150400.24.170.1.s390x",
            "SUSE Manager Server 4.3:kernel-syms-5.14.21-150400.24.170.1.x86_64",
            "SUSE Manager Server 4.3:kernel-zfcpdump-5.14.21-150400.24.170.2.s390x"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2025-07-28T15:09:33Z",
          "details": "moderate"
        }
      ],
      "title": "CVE-2022-49990"
    },
    {
      "cve": "CVE-2022-49993",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2022-49993"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "In the Linux kernel, the following vulnerability has been resolved:\n\nloop: Check for overflow while configuring loop\n\nThe userspace can configure a loop using an ioctl call, wherein\na configuration of type loop_config is passed (see lo_ioctl()\u0027s\ncase on line 1550 of drivers/block/loop.c). This proceeds to call\nloop_configure() which in turn calls loop_set_status_from_info()\n(see line 1050 of loop.c), passing \u0026config-\u003einfo which is of type\nloop_info64*. This function then sets the appropriate values, like\nthe offset.\n\nloop_device has lo_offset of type loff_t (see line 52 of loop.c),\nwhich is typdef-chained to long long, whereas loop_info64 has\nlo_offset of type __u64 (see line 56 of include/uapi/linux/loop.h).\n\nThe function directly copies offset from info to the device as\nfollows (See line 980 of loop.c):\n\tlo-\u003elo_offset = info-\u003elo_offset;\n\nThis results in an overflow, which triggers a warning in iomap_iter()\ndue to a call to iomap_iter_done() which has:\n\tWARN_ON_ONCE(iter-\u003eiomap.offset \u003e iter-\u003epos);\n\nThus, check for negative value during loop_set_status_from_info().\n\nBug report: https://syzkaller.appspot.com/bug?id=c620fe14aac810396d3c3edc9ad73848bf69a29e",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.170.2.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.170.2.s390x",
          "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.170.2.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.170.2.s390x",
          "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.170.2.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.170.2.s390x",
          "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.170.2.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.170.2.s390x",
          "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-64kb-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-64kb-devel-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-devel-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-devel-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-devel-5.14.21-150400.24.170.1.noarch",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-docs-5.14.21-150400.24.170.1.noarch",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-macros-5.14.21-150400.24.170.1.noarch",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-obs-build-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-obs-build-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-source-5.14.21-150400.24.170.1.noarch",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-syms-5.14.21-150400.24.170.1.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-syms-5.14.21-150400.24.170.1.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:reiserfs-kmp-default-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:reiserfs-kmp-default-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-64kb-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-64kb-devel-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-devel-5.14.21-150400.24.170.1.noarch",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-docs-5.14.21-150400.24.170.1.noarch",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-macros-5.14.21-150400.24.170.1.noarch",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-source-5.14.21-150400.24.170.1.noarch",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.170.1.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.170.1.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.170.2.ppc64le",
          "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.170.2.s390x",
          "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.170.2.ppc64le",
          "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.170.2.s390x",
          "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_170-default-1-150400.9.3.2.ppc64le",
          "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_170-default-1-150400.9.3.2.s390x",
          "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_170-default-1-150400.9.3.2.x86_64",
          "SUSE Linux Enterprise Micro 5.3:kernel-default-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise Micro 5.3:kernel-default-5.14.21-150400.24.170.2.s390x",
          "SUSE Linux Enterprise Micro 5.3:kernel-default-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise Micro 5.3:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.aarch64",
          "SUSE Linux Enterprise Micro 5.3:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
          "SUSE Linux Enterprise Micro 5.4:kernel-default-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise Micro 5.4:kernel-default-5.14.21-150400.24.170.2.s390x",
          "SUSE Linux Enterprise Micro 5.4:kernel-default-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise Micro 5.4:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.aarch64",
          "SUSE Linux Enterprise Micro 5.4:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-64kb-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-64kb-devel-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-5.14.21-150400.24.170.2.ppc64le",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-5.14.21-150400.24.170.2.s390x",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.aarch64",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.ppc64le",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.170.2.ppc64le",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.170.2.s390x",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-devel-5.14.21-150400.24.170.1.noarch",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-docs-5.14.21-150400.24.170.1.noarch",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-macros-5.14.21-150400.24.170.1.noarch",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.170.2.ppc64le",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.170.2.s390x",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-source-5.14.21-150400.24.170.1.noarch",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.170.1.aarch64",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.170.1.ppc64le",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.170.1.s390x",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.170.1.x86_64",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-zfcpdump-5.14.21-150400.24.170.2.s390x",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.170.2.ppc64le",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.170.2.s390x",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-5.14.21-150400.24.170.2.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-devel-5.14.21-150400.24.170.2.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-devel-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-devel-5.14.21-150400.24.170.1.noarch",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-docs-5.14.21-150400.24.170.1.noarch",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-macros-5.14.21-150400.24.170.1.noarch",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-obs-build-5.14.21-150400.24.170.2.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-obs-build-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-source-5.14.21-150400.24.170.1.noarch",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-syms-5.14.21-150400.24.170.1.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-syms-5.14.21-150400.24.170.1.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.170.2.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.170.2.x86_64",
          "SUSE Manager Proxy 4.3:kernel-default-5.14.21-150400.24.170.2.x86_64",
          "SUSE Manager Proxy 4.3:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
          "SUSE Manager Proxy 4.3:kernel-default-devel-5.14.21-150400.24.170.2.x86_64",
          "SUSE Manager Proxy 4.3:kernel-devel-5.14.21-150400.24.170.1.noarch",
          "SUSE Manager Proxy 4.3:kernel-macros-5.14.21-150400.24.170.1.noarch",
          "SUSE Manager Proxy 4.3:kernel-source-5.14.21-150400.24.170.1.noarch",
          "SUSE Manager Proxy 4.3:kernel-syms-5.14.21-150400.24.170.1.x86_64",
          "SUSE Manager Server 4.3:kernel-default-5.14.21-150400.24.170.2.ppc64le",
          "SUSE Manager Server 4.3:kernel-default-5.14.21-150400.24.170.2.s390x",
          "SUSE Manager Server 4.3:kernel-default-5.14.21-150400.24.170.2.x86_64",
          "SUSE Manager Server 4.3:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.ppc64le",
          "SUSE Manager Server 4.3:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
          "SUSE Manager Server 4.3:kernel-default-devel-5.14.21-150400.24.170.2.ppc64le",
          "SUSE Manager Server 4.3:kernel-default-devel-5.14.21-150400.24.170.2.s390x",
          "SUSE Manager Server 4.3:kernel-default-devel-5.14.21-150400.24.170.2.x86_64",
          "SUSE Manager Server 4.3:kernel-devel-5.14.21-150400.24.170.1.noarch",
          "SUSE Manager Server 4.3:kernel-macros-5.14.21-150400.24.170.1.noarch",
          "SUSE Manager Server 4.3:kernel-source-5.14.21-150400.24.170.1.noarch",
          "SUSE Manager Server 4.3:kernel-syms-5.14.21-150400.24.170.1.ppc64le",
          "SUSE Manager Server 4.3:kernel-syms-5.14.21-150400.24.170.1.s390x",
          "SUSE Manager Server 4.3:kernel-syms-5.14.21-150400.24.170.1.x86_64",
          "SUSE Manager Server 4.3:kernel-zfcpdump-5.14.21-150400.24.170.2.s390x"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2022-49993",
          "url": "https://www.suse.com/security/cve/CVE-2022-49993"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1245121 for CVE-2022-49993",
          "url": "https://bugzilla.suse.com/1245121"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-64kb-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-64kb-devel-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-devel-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-devel-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-devel-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-docs-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-macros-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-obs-build-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-obs-build-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-source-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-syms-5.14.21-150400.24.170.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-syms-5.14.21-150400.24.170.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:reiserfs-kmp-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:reiserfs-kmp-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-64kb-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-64kb-devel-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-devel-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-docs-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-macros-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-source-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.170.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.170.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_170-default-1-150400.9.3.2.ppc64le",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_170-default-1-150400.9.3.2.s390x",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_170-default-1-150400.9.3.2.x86_64",
            "SUSE Linux Enterprise Micro 5.3:kernel-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise Micro 5.3:kernel-default-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise Micro 5.3:kernel-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Micro 5.3:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.aarch64",
            "SUSE Linux Enterprise Micro 5.3:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
            "SUSE Linux Enterprise Micro 5.4:kernel-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise Micro 5.4:kernel-default-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise Micro 5.4:kernel-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Micro 5.4:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.aarch64",
            "SUSE Linux Enterprise Micro 5.4:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-64kb-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-64kb-devel-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.aarch64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.ppc64le",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-devel-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-docs-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-macros-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-source-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.170.1.aarch64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.170.1.ppc64le",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.170.1.s390x",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.170.1.x86_64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-zfcpdump-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-devel-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-devel-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-devel-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-docs-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-macros-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-obs-build-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-obs-build-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-source-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-syms-5.14.21-150400.24.170.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-syms-5.14.21-150400.24.170.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Manager Proxy 4.3:kernel-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Manager Proxy 4.3:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
            "SUSE Manager Proxy 4.3:kernel-default-devel-5.14.21-150400.24.170.2.x86_64",
            "SUSE Manager Proxy 4.3:kernel-devel-5.14.21-150400.24.170.1.noarch",
            "SUSE Manager Proxy 4.3:kernel-macros-5.14.21-150400.24.170.1.noarch",
            "SUSE Manager Proxy 4.3:kernel-source-5.14.21-150400.24.170.1.noarch",
            "SUSE Manager Proxy 4.3:kernel-syms-5.14.21-150400.24.170.1.x86_64",
            "SUSE Manager Server 4.3:kernel-default-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Manager Server 4.3:kernel-default-5.14.21-150400.24.170.2.s390x",
            "SUSE Manager Server 4.3:kernel-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Manager Server 4.3:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.ppc64le",
            "SUSE Manager Server 4.3:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
            "SUSE Manager Server 4.3:kernel-default-devel-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Manager Server 4.3:kernel-default-devel-5.14.21-150400.24.170.2.s390x",
            "SUSE Manager Server 4.3:kernel-default-devel-5.14.21-150400.24.170.2.x86_64",
            "SUSE Manager Server 4.3:kernel-devel-5.14.21-150400.24.170.1.noarch",
            "SUSE Manager Server 4.3:kernel-macros-5.14.21-150400.24.170.1.noarch",
            "SUSE Manager Server 4.3:kernel-source-5.14.21-150400.24.170.1.noarch",
            "SUSE Manager Server 4.3:kernel-syms-5.14.21-150400.24.170.1.ppc64le",
            "SUSE Manager Server 4.3:kernel-syms-5.14.21-150400.24.170.1.s390x",
            "SUSE Manager Server 4.3:kernel-syms-5.14.21-150400.24.170.1.x86_64",
            "SUSE Manager Server 4.3:kernel-zfcpdump-5.14.21-150400.24.170.2.s390x"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 5.5,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
            "version": "3.1"
          },
          "products": [
            "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-64kb-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-64kb-devel-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-devel-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-devel-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-devel-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-docs-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-macros-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-obs-build-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-obs-build-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-source-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-syms-5.14.21-150400.24.170.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-syms-5.14.21-150400.24.170.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:reiserfs-kmp-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:reiserfs-kmp-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-64kb-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-64kb-devel-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-devel-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-docs-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-macros-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-source-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.170.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.170.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_170-default-1-150400.9.3.2.ppc64le",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_170-default-1-150400.9.3.2.s390x",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_170-default-1-150400.9.3.2.x86_64",
            "SUSE Linux Enterprise Micro 5.3:kernel-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise Micro 5.3:kernel-default-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise Micro 5.3:kernel-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Micro 5.3:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.aarch64",
            "SUSE Linux Enterprise Micro 5.3:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
            "SUSE Linux Enterprise Micro 5.4:kernel-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise Micro 5.4:kernel-default-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise Micro 5.4:kernel-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Micro 5.4:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.aarch64",
            "SUSE Linux Enterprise Micro 5.4:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-64kb-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-64kb-devel-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.aarch64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.ppc64le",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-devel-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-docs-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-macros-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-source-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.170.1.aarch64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.170.1.ppc64le",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.170.1.s390x",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.170.1.x86_64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-zfcpdump-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-devel-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-devel-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-devel-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-docs-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-macros-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-obs-build-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-obs-build-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-source-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-syms-5.14.21-150400.24.170.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-syms-5.14.21-150400.24.170.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Manager Proxy 4.3:kernel-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Manager Proxy 4.3:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
            "SUSE Manager Proxy 4.3:kernel-default-devel-5.14.21-150400.24.170.2.x86_64",
            "SUSE Manager Proxy 4.3:kernel-devel-5.14.21-150400.24.170.1.noarch",
            "SUSE Manager Proxy 4.3:kernel-macros-5.14.21-150400.24.170.1.noarch",
            "SUSE Manager Proxy 4.3:kernel-source-5.14.21-150400.24.170.1.noarch",
            "SUSE Manager Proxy 4.3:kernel-syms-5.14.21-150400.24.170.1.x86_64",
            "SUSE Manager Server 4.3:kernel-default-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Manager Server 4.3:kernel-default-5.14.21-150400.24.170.2.s390x",
            "SUSE Manager Server 4.3:kernel-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Manager Server 4.3:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.ppc64le",
            "SUSE Manager Server 4.3:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
            "SUSE Manager Server 4.3:kernel-default-devel-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Manager Server 4.3:kernel-default-devel-5.14.21-150400.24.170.2.s390x",
            "SUSE Manager Server 4.3:kernel-default-devel-5.14.21-150400.24.170.2.x86_64",
            "SUSE Manager Server 4.3:kernel-devel-5.14.21-150400.24.170.1.noarch",
            "SUSE Manager Server 4.3:kernel-macros-5.14.21-150400.24.170.1.noarch",
            "SUSE Manager Server 4.3:kernel-source-5.14.21-150400.24.170.1.noarch",
            "SUSE Manager Server 4.3:kernel-syms-5.14.21-150400.24.170.1.ppc64le",
            "SUSE Manager Server 4.3:kernel-syms-5.14.21-150400.24.170.1.s390x",
            "SUSE Manager Server 4.3:kernel-syms-5.14.21-150400.24.170.1.x86_64",
            "SUSE Manager Server 4.3:kernel-zfcpdump-5.14.21-150400.24.170.2.s390x"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2025-07-28T15:09:33Z",
          "details": "moderate"
        }
      ],
      "title": "CVE-2022-49993"
    },
    {
      "cve": "CVE-2022-49995",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2022-49995"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "In the Linux kernel, the following vulnerability has been resolved:\n\nwriteback: avoid use-after-free after removing device\n\nWhen a disk is removed, bdi_unregister gets called to stop further\nwriteback and wait for associated delayed work to complete.  However,\nwb_inode_writeback_end() may schedule bandwidth estimation dwork after\nthis has completed, which can result in the timer attempting to access the\njust freed bdi_writeback.\n\nFix this by checking if the bdi_writeback is alive, similar to when\nscheduling writeback work.\n\nSince this requires wb-\u003ework_lock, and wb_inode_writeback_end() may get\ncalled from interrupt, switch wb-\u003ework_lock to an irqsafe lock.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.170.2.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.170.2.s390x",
          "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.170.2.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.170.2.s390x",
          "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.170.2.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.170.2.s390x",
          "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.170.2.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.170.2.s390x",
          "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-64kb-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-64kb-devel-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-devel-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-devel-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-devel-5.14.21-150400.24.170.1.noarch",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-docs-5.14.21-150400.24.170.1.noarch",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-macros-5.14.21-150400.24.170.1.noarch",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-obs-build-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-obs-build-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-source-5.14.21-150400.24.170.1.noarch",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-syms-5.14.21-150400.24.170.1.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-syms-5.14.21-150400.24.170.1.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:reiserfs-kmp-default-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:reiserfs-kmp-default-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-64kb-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-64kb-devel-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-devel-5.14.21-150400.24.170.1.noarch",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-docs-5.14.21-150400.24.170.1.noarch",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-macros-5.14.21-150400.24.170.1.noarch",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-source-5.14.21-150400.24.170.1.noarch",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.170.1.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.170.1.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.170.2.ppc64le",
          "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.170.2.s390x",
          "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.170.2.ppc64le",
          "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.170.2.s390x",
          "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_170-default-1-150400.9.3.2.ppc64le",
          "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_170-default-1-150400.9.3.2.s390x",
          "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_170-default-1-150400.9.3.2.x86_64",
          "SUSE Linux Enterprise Micro 5.3:kernel-default-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise Micro 5.3:kernel-default-5.14.21-150400.24.170.2.s390x",
          "SUSE Linux Enterprise Micro 5.3:kernel-default-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise Micro 5.3:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.aarch64",
          "SUSE Linux Enterprise Micro 5.3:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
          "SUSE Linux Enterprise Micro 5.4:kernel-default-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise Micro 5.4:kernel-default-5.14.21-150400.24.170.2.s390x",
          "SUSE Linux Enterprise Micro 5.4:kernel-default-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise Micro 5.4:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.aarch64",
          "SUSE Linux Enterprise Micro 5.4:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-64kb-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-64kb-devel-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-5.14.21-150400.24.170.2.ppc64le",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-5.14.21-150400.24.170.2.s390x",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.aarch64",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.ppc64le",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.170.2.ppc64le",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.170.2.s390x",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-devel-5.14.21-150400.24.170.1.noarch",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-docs-5.14.21-150400.24.170.1.noarch",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-macros-5.14.21-150400.24.170.1.noarch",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.170.2.ppc64le",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.170.2.s390x",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-source-5.14.21-150400.24.170.1.noarch",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.170.1.aarch64",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.170.1.ppc64le",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.170.1.s390x",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.170.1.x86_64",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-zfcpdump-5.14.21-150400.24.170.2.s390x",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.170.2.ppc64le",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.170.2.s390x",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-5.14.21-150400.24.170.2.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-devel-5.14.21-150400.24.170.2.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-devel-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-devel-5.14.21-150400.24.170.1.noarch",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-docs-5.14.21-150400.24.170.1.noarch",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-macros-5.14.21-150400.24.170.1.noarch",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-obs-build-5.14.21-150400.24.170.2.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-obs-build-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-source-5.14.21-150400.24.170.1.noarch",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-syms-5.14.21-150400.24.170.1.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-syms-5.14.21-150400.24.170.1.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.170.2.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.170.2.x86_64",
          "SUSE Manager Proxy 4.3:kernel-default-5.14.21-150400.24.170.2.x86_64",
          "SUSE Manager Proxy 4.3:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
          "SUSE Manager Proxy 4.3:kernel-default-devel-5.14.21-150400.24.170.2.x86_64",
          "SUSE Manager Proxy 4.3:kernel-devel-5.14.21-150400.24.170.1.noarch",
          "SUSE Manager Proxy 4.3:kernel-macros-5.14.21-150400.24.170.1.noarch",
          "SUSE Manager Proxy 4.3:kernel-source-5.14.21-150400.24.170.1.noarch",
          "SUSE Manager Proxy 4.3:kernel-syms-5.14.21-150400.24.170.1.x86_64",
          "SUSE Manager Server 4.3:kernel-default-5.14.21-150400.24.170.2.ppc64le",
          "SUSE Manager Server 4.3:kernel-default-5.14.21-150400.24.170.2.s390x",
          "SUSE Manager Server 4.3:kernel-default-5.14.21-150400.24.170.2.x86_64",
          "SUSE Manager Server 4.3:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.ppc64le",
          "SUSE Manager Server 4.3:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
          "SUSE Manager Server 4.3:kernel-default-devel-5.14.21-150400.24.170.2.ppc64le",
          "SUSE Manager Server 4.3:kernel-default-devel-5.14.21-150400.24.170.2.s390x",
          "SUSE Manager Server 4.3:kernel-default-devel-5.14.21-150400.24.170.2.x86_64",
          "SUSE Manager Server 4.3:kernel-devel-5.14.21-150400.24.170.1.noarch",
          "SUSE Manager Server 4.3:kernel-macros-5.14.21-150400.24.170.1.noarch",
          "SUSE Manager Server 4.3:kernel-source-5.14.21-150400.24.170.1.noarch",
          "SUSE Manager Server 4.3:kernel-syms-5.14.21-150400.24.170.1.ppc64le",
          "SUSE Manager Server 4.3:kernel-syms-5.14.21-150400.24.170.1.s390x",
          "SUSE Manager Server 4.3:kernel-syms-5.14.21-150400.24.170.1.x86_64",
          "SUSE Manager Server 4.3:kernel-zfcpdump-5.14.21-150400.24.170.2.s390x"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2022-49995",
          "url": "https://www.suse.com/security/cve/CVE-2022-49995"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1245012 for CVE-2022-49995",
          "url": "https://bugzilla.suse.com/1245012"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-64kb-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-64kb-devel-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-devel-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-devel-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-devel-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-docs-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-macros-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-obs-build-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-obs-build-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-source-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-syms-5.14.21-150400.24.170.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-syms-5.14.21-150400.24.170.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:reiserfs-kmp-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:reiserfs-kmp-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-64kb-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-64kb-devel-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-devel-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-docs-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-macros-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-source-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.170.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.170.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_170-default-1-150400.9.3.2.ppc64le",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_170-default-1-150400.9.3.2.s390x",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_170-default-1-150400.9.3.2.x86_64",
            "SUSE Linux Enterprise Micro 5.3:kernel-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise Micro 5.3:kernel-default-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise Micro 5.3:kernel-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Micro 5.3:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.aarch64",
            "SUSE Linux Enterprise Micro 5.3:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
            "SUSE Linux Enterprise Micro 5.4:kernel-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise Micro 5.4:kernel-default-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise Micro 5.4:kernel-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Micro 5.4:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.aarch64",
            "SUSE Linux Enterprise Micro 5.4:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-64kb-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-64kb-devel-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.aarch64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.ppc64le",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-devel-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-docs-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-macros-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-source-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.170.1.aarch64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.170.1.ppc64le",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.170.1.s390x",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.170.1.x86_64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-zfcpdump-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-devel-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-devel-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-devel-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-docs-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-macros-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-obs-build-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-obs-build-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-source-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-syms-5.14.21-150400.24.170.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-syms-5.14.21-150400.24.170.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Manager Proxy 4.3:kernel-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Manager Proxy 4.3:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
            "SUSE Manager Proxy 4.3:kernel-default-devel-5.14.21-150400.24.170.2.x86_64",
            "SUSE Manager Proxy 4.3:kernel-devel-5.14.21-150400.24.170.1.noarch",
            "SUSE Manager Proxy 4.3:kernel-macros-5.14.21-150400.24.170.1.noarch",
            "SUSE Manager Proxy 4.3:kernel-source-5.14.21-150400.24.170.1.noarch",
            "SUSE Manager Proxy 4.3:kernel-syms-5.14.21-150400.24.170.1.x86_64",
            "SUSE Manager Server 4.3:kernel-default-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Manager Server 4.3:kernel-default-5.14.21-150400.24.170.2.s390x",
            "SUSE Manager Server 4.3:kernel-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Manager Server 4.3:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.ppc64le",
            "SUSE Manager Server 4.3:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
            "SUSE Manager Server 4.3:kernel-default-devel-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Manager Server 4.3:kernel-default-devel-5.14.21-150400.24.170.2.s390x",
            "SUSE Manager Server 4.3:kernel-default-devel-5.14.21-150400.24.170.2.x86_64",
            "SUSE Manager Server 4.3:kernel-devel-5.14.21-150400.24.170.1.noarch",
            "SUSE Manager Server 4.3:kernel-macros-5.14.21-150400.24.170.1.noarch",
            "SUSE Manager Server 4.3:kernel-source-5.14.21-150400.24.170.1.noarch",
            "SUSE Manager Server 4.3:kernel-syms-5.14.21-150400.24.170.1.ppc64le",
            "SUSE Manager Server 4.3:kernel-syms-5.14.21-150400.24.170.1.s390x",
            "SUSE Manager Server 4.3:kernel-syms-5.14.21-150400.24.170.1.x86_64",
            "SUSE Manager Server 4.3:kernel-zfcpdump-5.14.21-150400.24.170.2.s390x"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 5.5,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
            "version": "3.1"
          },
          "products": [
            "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-64kb-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-64kb-devel-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-devel-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-devel-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-devel-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-docs-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-macros-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-obs-build-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-obs-build-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-source-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-syms-5.14.21-150400.24.170.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-syms-5.14.21-150400.24.170.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:reiserfs-kmp-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:reiserfs-kmp-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-64kb-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-64kb-devel-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-devel-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-docs-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-macros-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-source-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.170.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.170.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_170-default-1-150400.9.3.2.ppc64le",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_170-default-1-150400.9.3.2.s390x",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_170-default-1-150400.9.3.2.x86_64",
            "SUSE Linux Enterprise Micro 5.3:kernel-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise Micro 5.3:kernel-default-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise Micro 5.3:kernel-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Micro 5.3:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.aarch64",
            "SUSE Linux Enterprise Micro 5.3:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
            "SUSE Linux Enterprise Micro 5.4:kernel-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise Micro 5.4:kernel-default-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise Micro 5.4:kernel-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Micro 5.4:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.aarch64",
            "SUSE Linux Enterprise Micro 5.4:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-64kb-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-64kb-devel-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.aarch64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.ppc64le",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-devel-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-docs-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-macros-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-source-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.170.1.aarch64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.170.1.ppc64le",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.170.1.s390x",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.170.1.x86_64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-zfcpdump-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-devel-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-devel-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-devel-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-docs-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-macros-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-obs-build-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-obs-build-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-source-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-syms-5.14.21-150400.24.170.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-syms-5.14.21-150400.24.170.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Manager Proxy 4.3:kernel-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Manager Proxy 4.3:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
            "SUSE Manager Proxy 4.3:kernel-default-devel-5.14.21-150400.24.170.2.x86_64",
            "SUSE Manager Proxy 4.3:kernel-devel-5.14.21-150400.24.170.1.noarch",
            "SUSE Manager Proxy 4.3:kernel-macros-5.14.21-150400.24.170.1.noarch",
            "SUSE Manager Proxy 4.3:kernel-source-5.14.21-150400.24.170.1.noarch",
            "SUSE Manager Proxy 4.3:kernel-syms-5.14.21-150400.24.170.1.x86_64",
            "SUSE Manager Server 4.3:kernel-default-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Manager Server 4.3:kernel-default-5.14.21-150400.24.170.2.s390x",
            "SUSE Manager Server 4.3:kernel-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Manager Server 4.3:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.ppc64le",
            "SUSE Manager Server 4.3:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
            "SUSE Manager Server 4.3:kernel-default-devel-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Manager Server 4.3:kernel-default-devel-5.14.21-150400.24.170.2.s390x",
            "SUSE Manager Server 4.3:kernel-default-devel-5.14.21-150400.24.170.2.x86_64",
            "SUSE Manager Server 4.3:kernel-devel-5.14.21-150400.24.170.1.noarch",
            "SUSE Manager Server 4.3:kernel-macros-5.14.21-150400.24.170.1.noarch",
            "SUSE Manager Server 4.3:kernel-source-5.14.21-150400.24.170.1.noarch",
            "SUSE Manager Server 4.3:kernel-syms-5.14.21-150400.24.170.1.ppc64le",
            "SUSE Manager Server 4.3:kernel-syms-5.14.21-150400.24.170.1.s390x",
            "SUSE Manager Server 4.3:kernel-syms-5.14.21-150400.24.170.1.x86_64",
            "SUSE Manager Server 4.3:kernel-zfcpdump-5.14.21-150400.24.170.2.s390x"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2025-07-28T15:09:33Z",
          "details": "moderate"
        }
      ],
      "title": "CVE-2022-49995"
    },
    {
      "cve": "CVE-2022-49999",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2022-49999"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "In the Linux kernel, the following vulnerability has been resolved:\n\nbtrfs: fix space cache corruption and potential double allocations\n\nWhen testing space_cache v2 on a large set of machines, we encountered a\nfew symptoms:\n\n1. \"unable to add free space :-17\" (EEXIST) errors.\n2. Missing free space info items, sometimes caught with a \"missing free\n   space info for X\" error.\n3. Double-accounted space: ranges that were allocated in the extent tree\n   and also marked as free in the free space tree, ranges that were\n   marked as allocated twice in the extent tree, or ranges that were\n   marked as free twice in the free space tree. If the latter made it\n   onto disk, the next reboot would hit the BUG_ON() in\n   add_new_free_space().\n4. On some hosts with no on-disk corruption or error messages, the\n   in-memory space cache (dumped with drgn) disagreed with the free\n   space tree.\n\nAll of these symptoms have the same underlying cause: a race between\ncaching the free space for a block group and returning free space to the\nin-memory space cache for pinned extents causes us to double-add a free\nrange to the space cache. This race exists when free space is cached\nfrom the free space tree (space_cache=v2) or the extent tree\n(nospace_cache, or space_cache=v1 if the cache needs to be regenerated).\nstruct btrfs_block_group::last_byte_to_unpin and struct\nbtrfs_block_group::progress are supposed to protect against this race,\nbut commit d0c2f4fa555e (\"btrfs: make concurrent fsyncs wait less when\nwaiting for a transaction commit\") subtly broke this by allowing\nmultiple transactions to be unpinning extents at the same time.\n\nSpecifically, the race is as follows:\n\n1. An extent is deleted from an uncached block group in transaction A.\n2. btrfs_commit_transaction() is called for transaction A.\n3. btrfs_run_delayed_refs() -\u003e __btrfs_free_extent() runs the delayed\n   ref for the deleted extent.\n4. __btrfs_free_extent() -\u003e do_free_extent_accounting() -\u003e\n   add_to_free_space_tree() adds the deleted extent back to the free\n   space tree.\n5. do_free_extent_accounting() -\u003e btrfs_update_block_group() -\u003e\n   btrfs_cache_block_group() queues up the block group to get cached.\n   block_group-\u003eprogress is set to block_group-\u003estart.\n6. btrfs_commit_transaction() for transaction A calls\n   switch_commit_roots(). It sets block_group-\u003elast_byte_to_unpin to\n   block_group-\u003eprogress, which is block_group-\u003estart because the block\n   group hasn\u0027t been cached yet.\n7. The caching thread gets to our block group. Since the commit roots\n   were already switched, load_free_space_tree() sees the deleted extent\n   as free and adds it to the space cache. It finishes caching and sets\n   block_group-\u003eprogress to U64_MAX.\n8. btrfs_commit_transaction() advances transaction A to\n   TRANS_STATE_SUPER_COMMITTED.\n9. fsync calls btrfs_commit_transaction() for transaction B. Since\n   transaction A is already in TRANS_STATE_SUPER_COMMITTED and the\n   commit is for fsync, it advances.\n10. btrfs_commit_transaction() for transaction B calls\n    switch_commit_roots(). This time, the block group has already been\n    cached, so it sets block_group-\u003elast_byte_to_unpin to U64_MAX.\n11. btrfs_commit_transaction() for transaction A calls\n    btrfs_finish_extent_commit(), which calls unpin_extent_range() for\n    the deleted extent. It sees last_byte_to_unpin set to U64_MAX (by\n    transaction B!), so it adds the deleted extent to the space cache\n    again!\n\nThis explains all of our symptoms above:\n\n* If the sequence of events is exactly as described above, when the free\n  space is re-added in step 11, it will fail with EEXIST.\n* If another thread reallocates the deleted extent in between steps 7\n  and 11, then step 11 will silently re-add that space to the space\n  cache as free even though it is actually allocated. Then, if that\n  space is allocated *again*, the free space tree will be corrupted\n  (namely, the wrong item will be deleted).\n* If we don\u0027t catch this free space tree corr\n---truncated---",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.170.2.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.170.2.s390x",
          "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.170.2.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.170.2.s390x",
          "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.170.2.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.170.2.s390x",
          "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.170.2.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.170.2.s390x",
          "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-64kb-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-64kb-devel-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-devel-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-devel-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-devel-5.14.21-150400.24.170.1.noarch",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-docs-5.14.21-150400.24.170.1.noarch",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-macros-5.14.21-150400.24.170.1.noarch",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-obs-build-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-obs-build-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-source-5.14.21-150400.24.170.1.noarch",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-syms-5.14.21-150400.24.170.1.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-syms-5.14.21-150400.24.170.1.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:reiserfs-kmp-default-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:reiserfs-kmp-default-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-64kb-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-64kb-devel-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-devel-5.14.21-150400.24.170.1.noarch",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-docs-5.14.21-150400.24.170.1.noarch",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-macros-5.14.21-150400.24.170.1.noarch",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-source-5.14.21-150400.24.170.1.noarch",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.170.1.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.170.1.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.170.2.ppc64le",
          "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.170.2.s390x",
          "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.170.2.ppc64le",
          "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.170.2.s390x",
          "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_170-default-1-150400.9.3.2.ppc64le",
          "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_170-default-1-150400.9.3.2.s390x",
          "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_170-default-1-150400.9.3.2.x86_64",
          "SUSE Linux Enterprise Micro 5.3:kernel-default-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise Micro 5.3:kernel-default-5.14.21-150400.24.170.2.s390x",
          "SUSE Linux Enterprise Micro 5.3:kernel-default-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise Micro 5.3:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.aarch64",
          "SUSE Linux Enterprise Micro 5.3:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
          "SUSE Linux Enterprise Micro 5.4:kernel-default-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise Micro 5.4:kernel-default-5.14.21-150400.24.170.2.s390x",
          "SUSE Linux Enterprise Micro 5.4:kernel-default-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise Micro 5.4:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.aarch64",
          "SUSE Linux Enterprise Micro 5.4:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-64kb-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-64kb-devel-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-5.14.21-150400.24.170.2.ppc64le",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-5.14.21-150400.24.170.2.s390x",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.aarch64",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.ppc64le",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.170.2.ppc64le",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.170.2.s390x",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-devel-5.14.21-150400.24.170.1.noarch",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-docs-5.14.21-150400.24.170.1.noarch",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-macros-5.14.21-150400.24.170.1.noarch",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.170.2.ppc64le",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.170.2.s390x",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-source-5.14.21-150400.24.170.1.noarch",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.170.1.aarch64",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.170.1.ppc64le",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.170.1.s390x",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.170.1.x86_64",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-zfcpdump-5.14.21-150400.24.170.2.s390x",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.170.2.ppc64le",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.170.2.s390x",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-5.14.21-150400.24.170.2.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-devel-5.14.21-150400.24.170.2.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-devel-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-devel-5.14.21-150400.24.170.1.noarch",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-docs-5.14.21-150400.24.170.1.noarch",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-macros-5.14.21-150400.24.170.1.noarch",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-obs-build-5.14.21-150400.24.170.2.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-obs-build-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-source-5.14.21-150400.24.170.1.noarch",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-syms-5.14.21-150400.24.170.1.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-syms-5.14.21-150400.24.170.1.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.170.2.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.170.2.x86_64",
          "SUSE Manager Proxy 4.3:kernel-default-5.14.21-150400.24.170.2.x86_64",
          "SUSE Manager Proxy 4.3:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
          "SUSE Manager Proxy 4.3:kernel-default-devel-5.14.21-150400.24.170.2.x86_64",
          "SUSE Manager Proxy 4.3:kernel-devel-5.14.21-150400.24.170.1.noarch",
          "SUSE Manager Proxy 4.3:kernel-macros-5.14.21-150400.24.170.1.noarch",
          "SUSE Manager Proxy 4.3:kernel-source-5.14.21-150400.24.170.1.noarch",
          "SUSE Manager Proxy 4.3:kernel-syms-5.14.21-150400.24.170.1.x86_64",
          "SUSE Manager Server 4.3:kernel-default-5.14.21-150400.24.170.2.ppc64le",
          "SUSE Manager Server 4.3:kernel-default-5.14.21-150400.24.170.2.s390x",
          "SUSE Manager Server 4.3:kernel-default-5.14.21-150400.24.170.2.x86_64",
          "SUSE Manager Server 4.3:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.ppc64le",
          "SUSE Manager Server 4.3:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
          "SUSE Manager Server 4.3:kernel-default-devel-5.14.21-150400.24.170.2.ppc64le",
          "SUSE Manager Server 4.3:kernel-default-devel-5.14.21-150400.24.170.2.s390x",
          "SUSE Manager Server 4.3:kernel-default-devel-5.14.21-150400.24.170.2.x86_64",
          "SUSE Manager Server 4.3:kernel-devel-5.14.21-150400.24.170.1.noarch",
          "SUSE Manager Server 4.3:kernel-macros-5.14.21-150400.24.170.1.noarch",
          "SUSE Manager Server 4.3:kernel-source-5.14.21-150400.24.170.1.noarch",
          "SUSE Manager Server 4.3:kernel-syms-5.14.21-150400.24.170.1.ppc64le",
          "SUSE Manager Server 4.3:kernel-syms-5.14.21-150400.24.170.1.s390x",
          "SUSE Manager Server 4.3:kernel-syms-5.14.21-150400.24.170.1.x86_64",
          "SUSE Manager Server 4.3:kernel-zfcpdump-5.14.21-150400.24.170.2.s390x"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2022-49999",
          "url": "https://www.suse.com/security/cve/CVE-2022-49999"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1245019 for CVE-2022-49999",
          "url": "https://bugzilla.suse.com/1245019"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-64kb-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-64kb-devel-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-devel-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-devel-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-devel-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-docs-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-macros-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-obs-build-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-obs-build-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-source-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-syms-5.14.21-150400.24.170.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-syms-5.14.21-150400.24.170.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:reiserfs-kmp-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:reiserfs-kmp-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-64kb-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-64kb-devel-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-devel-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-docs-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-macros-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-source-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.170.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.170.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_170-default-1-150400.9.3.2.ppc64le",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_170-default-1-150400.9.3.2.s390x",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_170-default-1-150400.9.3.2.x86_64",
            "SUSE Linux Enterprise Micro 5.3:kernel-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise Micro 5.3:kernel-default-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise Micro 5.3:kernel-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Micro 5.3:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.aarch64",
            "SUSE Linux Enterprise Micro 5.3:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
            "SUSE Linux Enterprise Micro 5.4:kernel-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise Micro 5.4:kernel-default-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise Micro 5.4:kernel-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Micro 5.4:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.aarch64",
            "SUSE Linux Enterprise Micro 5.4:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-64kb-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-64kb-devel-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.aarch64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.ppc64le",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-devel-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-docs-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-macros-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-source-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.170.1.aarch64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.170.1.ppc64le",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.170.1.s390x",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.170.1.x86_64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-zfcpdump-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-devel-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-devel-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-devel-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-docs-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-macros-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-obs-build-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-obs-build-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-source-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-syms-5.14.21-150400.24.170.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-syms-5.14.21-150400.24.170.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Manager Proxy 4.3:kernel-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Manager Proxy 4.3:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
            "SUSE Manager Proxy 4.3:kernel-default-devel-5.14.21-150400.24.170.2.x86_64",
            "SUSE Manager Proxy 4.3:kernel-devel-5.14.21-150400.24.170.1.noarch",
            "SUSE Manager Proxy 4.3:kernel-macros-5.14.21-150400.24.170.1.noarch",
            "SUSE Manager Proxy 4.3:kernel-source-5.14.21-150400.24.170.1.noarch",
            "SUSE Manager Proxy 4.3:kernel-syms-5.14.21-150400.24.170.1.x86_64",
            "SUSE Manager Server 4.3:kernel-default-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Manager Server 4.3:kernel-default-5.14.21-150400.24.170.2.s390x",
            "SUSE Manager Server 4.3:kernel-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Manager Server 4.3:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.ppc64le",
            "SUSE Manager Server 4.3:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
            "SUSE Manager Server 4.3:kernel-default-devel-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Manager Server 4.3:kernel-default-devel-5.14.21-150400.24.170.2.s390x",
            "SUSE Manager Server 4.3:kernel-default-devel-5.14.21-150400.24.170.2.x86_64",
            "SUSE Manager Server 4.3:kernel-devel-5.14.21-150400.24.170.1.noarch",
            "SUSE Manager Server 4.3:kernel-macros-5.14.21-150400.24.170.1.noarch",
            "SUSE Manager Server 4.3:kernel-source-5.14.21-150400.24.170.1.noarch",
            "SUSE Manager Server 4.3:kernel-syms-5.14.21-150400.24.170.1.ppc64le",
            "SUSE Manager Server 4.3:kernel-syms-5.14.21-150400.24.170.1.s390x",
            "SUSE Manager Server 4.3:kernel-syms-5.14.21-150400.24.170.1.x86_64",
            "SUSE Manager Server 4.3:kernel-zfcpdump-5.14.21-150400.24.170.2.s390x"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 5.5,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
            "version": "3.1"
          },
          "products": [
            "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-64kb-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-64kb-devel-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-devel-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-devel-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-devel-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-docs-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-macros-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-obs-build-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-obs-build-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-source-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-syms-5.14.21-150400.24.170.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-syms-5.14.21-150400.24.170.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:reiserfs-kmp-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:reiserfs-kmp-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-64kb-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-64kb-devel-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-devel-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-docs-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-macros-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-source-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.170.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.170.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_170-default-1-150400.9.3.2.ppc64le",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_170-default-1-150400.9.3.2.s390x",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_170-default-1-150400.9.3.2.x86_64",
            "SUSE Linux Enterprise Micro 5.3:kernel-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise Micro 5.3:kernel-default-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise Micro 5.3:kernel-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Micro 5.3:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.aarch64",
            "SUSE Linux Enterprise Micro 5.3:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
            "SUSE Linux Enterprise Micro 5.4:kernel-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise Micro 5.4:kernel-default-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise Micro 5.4:kernel-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Micro 5.4:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.aarch64",
            "SUSE Linux Enterprise Micro 5.4:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-64kb-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-64kb-devel-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.aarch64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.ppc64le",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-devel-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-docs-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-macros-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-source-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.170.1.aarch64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.170.1.ppc64le",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.170.1.s390x",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.170.1.x86_64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-zfcpdump-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-devel-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-devel-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-devel-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-docs-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-macros-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-obs-build-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-obs-build-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-source-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-syms-5.14.21-150400.24.170.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-syms-5.14.21-150400.24.170.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Manager Proxy 4.3:kernel-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Manager Proxy 4.3:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
            "SUSE Manager Proxy 4.3:kernel-default-devel-5.14.21-150400.24.170.2.x86_64",
            "SUSE Manager Proxy 4.3:kernel-devel-5.14.21-150400.24.170.1.noarch",
            "SUSE Manager Proxy 4.3:kernel-macros-5.14.21-150400.24.170.1.noarch",
            "SUSE Manager Proxy 4.3:kernel-source-5.14.21-150400.24.170.1.noarch",
            "SUSE Manager Proxy 4.3:kernel-syms-5.14.21-150400.24.170.1.x86_64",
            "SUSE Manager Server 4.3:kernel-default-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Manager Server 4.3:kernel-default-5.14.21-150400.24.170.2.s390x",
            "SUSE Manager Server 4.3:kernel-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Manager Server 4.3:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.ppc64le",
            "SUSE Manager Server 4.3:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
            "SUSE Manager Server 4.3:kernel-default-devel-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Manager Server 4.3:kernel-default-devel-5.14.21-150400.24.170.2.s390x",
            "SUSE Manager Server 4.3:kernel-default-devel-5.14.21-150400.24.170.2.x86_64",
            "SUSE Manager Server 4.3:kernel-devel-5.14.21-150400.24.170.1.noarch",
            "SUSE Manager Server 4.3:kernel-macros-5.14.21-150400.24.170.1.noarch",
            "SUSE Manager Server 4.3:kernel-source-5.14.21-150400.24.170.1.noarch",
            "SUSE Manager Server 4.3:kernel-syms-5.14.21-150400.24.170.1.ppc64le",
            "SUSE Manager Server 4.3:kernel-syms-5.14.21-150400.24.170.1.s390x",
            "SUSE Manager Server 4.3:kernel-syms-5.14.21-150400.24.170.1.x86_64",
            "SUSE Manager Server 4.3:kernel-zfcpdump-5.14.21-150400.24.170.2.s390x"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2025-07-28T15:09:33Z",
          "details": "moderate"
        }
      ],
      "title": "CVE-2022-49999"
    },
    {
      "cve": "CVE-2022-50005",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2022-50005"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "In the Linux kernel, the following vulnerability has been resolved:\n\nnfc: pn533: Fix use-after-free bugs caused by pn532_cmd_timeout\n\nWhen the pn532 uart device is detaching, the pn532_uart_remove()\nis called. But there are no functions in pn532_uart_remove() that\ncould delete the cmd_timeout timer, which will cause use-after-free\nbugs. The process is shown below:\n\n    (thread 1)                  |        (thread 2)\n                                |  pn532_uart_send_frame\npn532_uart_remove               |    mod_timer(\u0026pn532-\u003ecmd_timeout,...)\n  ...                           |    (wait a time)\n  kfree(pn532) //FREE           |    pn532_cmd_timeout\n                                |      pn532_uart_send_frame\n                                |        pn532-\u003e... //USE\n\nThis patch adds del_timer_sync() in pn532_uart_remove() in order to\nprevent the use-after-free bugs. What\u0027s more, the pn53x_unregister_nfc()\nis well synchronized, it sets nfc_dev-\u003eshutting_down to true and there\nare no syscalls could restart the cmd_timeout timer.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.170.2.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.170.2.s390x",
          "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.170.2.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.170.2.s390x",
          "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.170.2.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.170.2.s390x",
          "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.170.2.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.170.2.s390x",
          "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-64kb-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-64kb-devel-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-devel-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-devel-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-devel-5.14.21-150400.24.170.1.noarch",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-docs-5.14.21-150400.24.170.1.noarch",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-macros-5.14.21-150400.24.170.1.noarch",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-obs-build-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-obs-build-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-source-5.14.21-150400.24.170.1.noarch",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-syms-5.14.21-150400.24.170.1.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-syms-5.14.21-150400.24.170.1.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:reiserfs-kmp-default-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:reiserfs-kmp-default-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-64kb-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-64kb-devel-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-devel-5.14.21-150400.24.170.1.noarch",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-docs-5.14.21-150400.24.170.1.noarch",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-macros-5.14.21-150400.24.170.1.noarch",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-source-5.14.21-150400.24.170.1.noarch",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.170.1.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.170.1.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.170.2.ppc64le",
          "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.170.2.s390x",
          "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.170.2.ppc64le",
          "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.170.2.s390x",
          "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_170-default-1-150400.9.3.2.ppc64le",
          "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_170-default-1-150400.9.3.2.s390x",
          "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_170-default-1-150400.9.3.2.x86_64",
          "SUSE Linux Enterprise Micro 5.3:kernel-default-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise Micro 5.3:kernel-default-5.14.21-150400.24.170.2.s390x",
          "SUSE Linux Enterprise Micro 5.3:kernel-default-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise Micro 5.3:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.aarch64",
          "SUSE Linux Enterprise Micro 5.3:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
          "SUSE Linux Enterprise Micro 5.4:kernel-default-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise Micro 5.4:kernel-default-5.14.21-150400.24.170.2.s390x",
          "SUSE Linux Enterprise Micro 5.4:kernel-default-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise Micro 5.4:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.aarch64",
          "SUSE Linux Enterprise Micro 5.4:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-64kb-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-64kb-devel-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-5.14.21-150400.24.170.2.ppc64le",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-5.14.21-150400.24.170.2.s390x",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.aarch64",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.ppc64le",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.170.2.ppc64le",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.170.2.s390x",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-devel-5.14.21-150400.24.170.1.noarch",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-docs-5.14.21-150400.24.170.1.noarch",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-macros-5.14.21-150400.24.170.1.noarch",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.170.2.ppc64le",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.170.2.s390x",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-source-5.14.21-150400.24.170.1.noarch",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.170.1.aarch64",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.170.1.ppc64le",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.170.1.s390x",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.170.1.x86_64",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-zfcpdump-5.14.21-150400.24.170.2.s390x",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.170.2.ppc64le",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.170.2.s390x",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-5.14.21-150400.24.170.2.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-devel-5.14.21-150400.24.170.2.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-devel-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-devel-5.14.21-150400.24.170.1.noarch",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-docs-5.14.21-150400.24.170.1.noarch",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-macros-5.14.21-150400.24.170.1.noarch",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-obs-build-5.14.21-150400.24.170.2.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-obs-build-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-source-5.14.21-150400.24.170.1.noarch",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-syms-5.14.21-150400.24.170.1.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-syms-5.14.21-150400.24.170.1.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.170.2.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.170.2.x86_64",
          "SUSE Manager Proxy 4.3:kernel-default-5.14.21-150400.24.170.2.x86_64",
          "SUSE Manager Proxy 4.3:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
          "SUSE Manager Proxy 4.3:kernel-default-devel-5.14.21-150400.24.170.2.x86_64",
          "SUSE Manager Proxy 4.3:kernel-devel-5.14.21-150400.24.170.1.noarch",
          "SUSE Manager Proxy 4.3:kernel-macros-5.14.21-150400.24.170.1.noarch",
          "SUSE Manager Proxy 4.3:kernel-source-5.14.21-150400.24.170.1.noarch",
          "SUSE Manager Proxy 4.3:kernel-syms-5.14.21-150400.24.170.1.x86_64",
          "SUSE Manager Server 4.3:kernel-default-5.14.21-150400.24.170.2.ppc64le",
          "SUSE Manager Server 4.3:kernel-default-5.14.21-150400.24.170.2.s390x",
          "SUSE Manager Server 4.3:kernel-default-5.14.21-150400.24.170.2.x86_64",
          "SUSE Manager Server 4.3:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.ppc64le",
          "SUSE Manager Server 4.3:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
          "SUSE Manager Server 4.3:kernel-default-devel-5.14.21-150400.24.170.2.ppc64le",
          "SUSE Manager Server 4.3:kernel-default-devel-5.14.21-150400.24.170.2.s390x",
          "SUSE Manager Server 4.3:kernel-default-devel-5.14.21-150400.24.170.2.x86_64",
          "SUSE Manager Server 4.3:kernel-devel-5.14.21-150400.24.170.1.noarch",
          "SUSE Manager Server 4.3:kernel-macros-5.14.21-150400.24.170.1.noarch",
          "SUSE Manager Server 4.3:kernel-source-5.14.21-150400.24.170.1.noarch",
          "SUSE Manager Server 4.3:kernel-syms-5.14.21-150400.24.170.1.ppc64le",
          "SUSE Manager Server 4.3:kernel-syms-5.14.21-150400.24.170.1.s390x",
          "SUSE Manager Server 4.3:kernel-syms-5.14.21-150400.24.170.1.x86_64",
          "SUSE Manager Server 4.3:kernel-zfcpdump-5.14.21-150400.24.170.2.s390x"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2022-50005",
          "url": "https://www.suse.com/security/cve/CVE-2022-50005"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1245011 for CVE-2022-50005",
          "url": "https://bugzilla.suse.com/1245011"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-64kb-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-64kb-devel-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-devel-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-devel-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-devel-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-docs-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-macros-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-obs-build-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-obs-build-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-source-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-syms-5.14.21-150400.24.170.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-syms-5.14.21-150400.24.170.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:reiserfs-kmp-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:reiserfs-kmp-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-64kb-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-64kb-devel-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-devel-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-docs-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-macros-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-source-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.170.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.170.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_170-default-1-150400.9.3.2.ppc64le",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_170-default-1-150400.9.3.2.s390x",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_170-default-1-150400.9.3.2.x86_64",
            "SUSE Linux Enterprise Micro 5.3:kernel-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise Micro 5.3:kernel-default-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise Micro 5.3:kernel-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Micro 5.3:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.aarch64",
            "SUSE Linux Enterprise Micro 5.3:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
            "SUSE Linux Enterprise Micro 5.4:kernel-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise Micro 5.4:kernel-default-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise Micro 5.4:kernel-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Micro 5.4:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.aarch64",
            "SUSE Linux Enterprise Micro 5.4:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-64kb-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-64kb-devel-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.aarch64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.ppc64le",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-devel-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-docs-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-macros-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-source-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.170.1.aarch64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.170.1.ppc64le",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.170.1.s390x",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.170.1.x86_64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-zfcpdump-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-devel-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-devel-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-devel-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-docs-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-macros-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-obs-build-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-obs-build-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-source-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-syms-5.14.21-150400.24.170.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-syms-5.14.21-150400.24.170.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Manager Proxy 4.3:kernel-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Manager Proxy 4.3:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
            "SUSE Manager Proxy 4.3:kernel-default-devel-5.14.21-150400.24.170.2.x86_64",
            "SUSE Manager Proxy 4.3:kernel-devel-5.14.21-150400.24.170.1.noarch",
            "SUSE Manager Proxy 4.3:kernel-macros-5.14.21-150400.24.170.1.noarch",
            "SUSE Manager Proxy 4.3:kernel-source-5.14.21-150400.24.170.1.noarch",
            "SUSE Manager Proxy 4.3:kernel-syms-5.14.21-150400.24.170.1.x86_64",
            "SUSE Manager Server 4.3:kernel-default-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Manager Server 4.3:kernel-default-5.14.21-150400.24.170.2.s390x",
            "SUSE Manager Server 4.3:kernel-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Manager Server 4.3:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.ppc64le",
            "SUSE Manager Server 4.3:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
            "SUSE Manager Server 4.3:kernel-default-devel-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Manager Server 4.3:kernel-default-devel-5.14.21-150400.24.170.2.s390x",
            "SUSE Manager Server 4.3:kernel-default-devel-5.14.21-150400.24.170.2.x86_64",
            "SUSE Manager Server 4.3:kernel-devel-5.14.21-150400.24.170.1.noarch",
            "SUSE Manager Server 4.3:kernel-macros-5.14.21-150400.24.170.1.noarch",
            "SUSE Manager Server 4.3:kernel-source-5.14.21-150400.24.170.1.noarch",
            "SUSE Manager Server 4.3:kernel-syms-5.14.21-150400.24.170.1.ppc64le",
            "SUSE Manager Server 4.3:kernel-syms-5.14.21-150400.24.170.1.s390x",
            "SUSE Manager Server 4.3:kernel-syms-5.14.21-150400.24.170.1.x86_64",
            "SUSE Manager Server 4.3:kernel-zfcpdump-5.14.21-150400.24.170.2.s390x"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 5.5,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
            "version": "3.1"
          },
          "products": [
            "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-64kb-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-64kb-devel-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-devel-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-devel-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-devel-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-docs-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-macros-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-obs-build-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-obs-build-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-source-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-syms-5.14.21-150400.24.170.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-syms-5.14.21-150400.24.170.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:reiserfs-kmp-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:reiserfs-kmp-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-64kb-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-64kb-devel-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-devel-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-docs-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-macros-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-source-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.170.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.170.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_170-default-1-150400.9.3.2.ppc64le",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_170-default-1-150400.9.3.2.s390x",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_170-default-1-150400.9.3.2.x86_64",
            "SUSE Linux Enterprise Micro 5.3:kernel-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise Micro 5.3:kernel-default-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise Micro 5.3:kernel-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Micro 5.3:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.aarch64",
            "SUSE Linux Enterprise Micro 5.3:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
            "SUSE Linux Enterprise Micro 5.4:kernel-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise Micro 5.4:kernel-default-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise Micro 5.4:kernel-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Micro 5.4:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.aarch64",
            "SUSE Linux Enterprise Micro 5.4:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-64kb-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-64kb-devel-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.aarch64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.ppc64le",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-devel-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-docs-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-macros-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-source-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.170.1.aarch64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.170.1.ppc64le",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.170.1.s390x",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.170.1.x86_64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-zfcpdump-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-devel-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-devel-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-devel-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-docs-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-macros-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-obs-build-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-obs-build-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-source-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-syms-5.14.21-150400.24.170.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-syms-5.14.21-150400.24.170.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Manager Proxy 4.3:kernel-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Manager Proxy 4.3:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
            "SUSE Manager Proxy 4.3:kernel-default-devel-5.14.21-150400.24.170.2.x86_64",
            "SUSE Manager Proxy 4.3:kernel-devel-5.14.21-150400.24.170.1.noarch",
            "SUSE Manager Proxy 4.3:kernel-macros-5.14.21-150400.24.170.1.noarch",
            "SUSE Manager Proxy 4.3:kernel-source-5.14.21-150400.24.170.1.noarch",
            "SUSE Manager Proxy 4.3:kernel-syms-5.14.21-150400.24.170.1.x86_64",
            "SUSE Manager Server 4.3:kernel-default-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Manager Server 4.3:kernel-default-5.14.21-150400.24.170.2.s390x",
            "SUSE Manager Server 4.3:kernel-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Manager Server 4.3:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.ppc64le",
            "SUSE Manager Server 4.3:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
            "SUSE Manager Server 4.3:kernel-default-devel-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Manager Server 4.3:kernel-default-devel-5.14.21-150400.24.170.2.s390x",
            "SUSE Manager Server 4.3:kernel-default-devel-5.14.21-150400.24.170.2.x86_64",
            "SUSE Manager Server 4.3:kernel-devel-5.14.21-150400.24.170.1.noarch",
            "SUSE Manager Server 4.3:kernel-macros-5.14.21-150400.24.170.1.noarch",
            "SUSE Manager Server 4.3:kernel-source-5.14.21-150400.24.170.1.noarch",
            "SUSE Manager Server 4.3:kernel-syms-5.14.21-150400.24.170.1.ppc64le",
            "SUSE Manager Server 4.3:kernel-syms-5.14.21-150400.24.170.1.s390x",
            "SUSE Manager Server 4.3:kernel-syms-5.14.21-150400.24.170.1.x86_64",
            "SUSE Manager Server 4.3:kernel-zfcpdump-5.14.21-150400.24.170.2.s390x"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2025-07-28T15:09:33Z",
          "details": "moderate"
        }
      ],
      "title": "CVE-2022-50005"
    },
    {
      "cve": "CVE-2022-50006",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2022-50006"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "In the Linux kernel, the following vulnerability has been resolved:\n\nNFSv4.2 fix problems with __nfs42_ssc_open\n\nA destination server while doing a COPY shouldn\u0027t accept using the\npassed in filehandle if its not a regular filehandle.\n\nIf alloc_file_pseudo() has failed, we need to decrement a reference\non the newly created inode, otherwise it leaks.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.170.2.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.170.2.s390x",
          "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.170.2.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.170.2.s390x",
          "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.170.2.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.170.2.s390x",
          "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.170.2.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.170.2.s390x",
          "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-64kb-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-64kb-devel-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-devel-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-devel-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-devel-5.14.21-150400.24.170.1.noarch",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-docs-5.14.21-150400.24.170.1.noarch",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-macros-5.14.21-150400.24.170.1.noarch",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-obs-build-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-obs-build-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-source-5.14.21-150400.24.170.1.noarch",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-syms-5.14.21-150400.24.170.1.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-syms-5.14.21-150400.24.170.1.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:reiserfs-kmp-default-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:reiserfs-kmp-default-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-64kb-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-64kb-devel-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-devel-5.14.21-150400.24.170.1.noarch",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-docs-5.14.21-150400.24.170.1.noarch",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-macros-5.14.21-150400.24.170.1.noarch",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-source-5.14.21-150400.24.170.1.noarch",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.170.1.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.170.1.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.170.2.ppc64le",
          "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.170.2.s390x",
          "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.170.2.ppc64le",
          "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.170.2.s390x",
          "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_170-default-1-150400.9.3.2.ppc64le",
          "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_170-default-1-150400.9.3.2.s390x",
          "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_170-default-1-150400.9.3.2.x86_64",
          "SUSE Linux Enterprise Micro 5.3:kernel-default-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise Micro 5.3:kernel-default-5.14.21-150400.24.170.2.s390x",
          "SUSE Linux Enterprise Micro 5.3:kernel-default-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise Micro 5.3:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.aarch64",
          "SUSE Linux Enterprise Micro 5.3:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
          "SUSE Linux Enterprise Micro 5.4:kernel-default-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise Micro 5.4:kernel-default-5.14.21-150400.24.170.2.s390x",
          "SUSE Linux Enterprise Micro 5.4:kernel-default-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise Micro 5.4:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.aarch64",
          "SUSE Linux Enterprise Micro 5.4:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-64kb-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-64kb-devel-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-5.14.21-150400.24.170.2.ppc64le",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-5.14.21-150400.24.170.2.s390x",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.aarch64",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.ppc64le",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.170.2.ppc64le",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.170.2.s390x",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-devel-5.14.21-150400.24.170.1.noarch",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-docs-5.14.21-150400.24.170.1.noarch",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-macros-5.14.21-150400.24.170.1.noarch",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.170.2.ppc64le",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.170.2.s390x",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-source-5.14.21-150400.24.170.1.noarch",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.170.1.aarch64",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.170.1.ppc64le",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.170.1.s390x",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.170.1.x86_64",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-zfcpdump-5.14.21-150400.24.170.2.s390x",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.170.2.ppc64le",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.170.2.s390x",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-5.14.21-150400.24.170.2.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-devel-5.14.21-150400.24.170.2.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-devel-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-devel-5.14.21-150400.24.170.1.noarch",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-docs-5.14.21-150400.24.170.1.noarch",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-macros-5.14.21-150400.24.170.1.noarch",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-obs-build-5.14.21-150400.24.170.2.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-obs-build-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-source-5.14.21-150400.24.170.1.noarch",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-syms-5.14.21-150400.24.170.1.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-syms-5.14.21-150400.24.170.1.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.170.2.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.170.2.x86_64",
          "SUSE Manager Proxy 4.3:kernel-default-5.14.21-150400.24.170.2.x86_64",
          "SUSE Manager Proxy 4.3:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
          "SUSE Manager Proxy 4.3:kernel-default-devel-5.14.21-150400.24.170.2.x86_64",
          "SUSE Manager Proxy 4.3:kernel-devel-5.14.21-150400.24.170.1.noarch",
          "SUSE Manager Proxy 4.3:kernel-macros-5.14.21-150400.24.170.1.noarch",
          "SUSE Manager Proxy 4.3:kernel-source-5.14.21-150400.24.170.1.noarch",
          "SUSE Manager Proxy 4.3:kernel-syms-5.14.21-150400.24.170.1.x86_64",
          "SUSE Manager Server 4.3:kernel-default-5.14.21-150400.24.170.2.ppc64le",
          "SUSE Manager Server 4.3:kernel-default-5.14.21-150400.24.170.2.s390x",
          "SUSE Manager Server 4.3:kernel-default-5.14.21-150400.24.170.2.x86_64",
          "SUSE Manager Server 4.3:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.ppc64le",
          "SUSE Manager Server 4.3:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
          "SUSE Manager Server 4.3:kernel-default-devel-5.14.21-150400.24.170.2.ppc64le",
          "SUSE Manager Server 4.3:kernel-default-devel-5.14.21-150400.24.170.2.s390x",
          "SUSE Manager Server 4.3:kernel-default-devel-5.14.21-150400.24.170.2.x86_64",
          "SUSE Manager Server 4.3:kernel-devel-5.14.21-150400.24.170.1.noarch",
          "SUSE Manager Server 4.3:kernel-macros-5.14.21-150400.24.170.1.noarch",
          "SUSE Manager Server 4.3:kernel-source-5.14.21-150400.24.170.1.noarch",
          "SUSE Manager Server 4.3:kernel-syms-5.14.21-150400.24.170.1.ppc64le",
          "SUSE Manager Server 4.3:kernel-syms-5.14.21-150400.24.170.1.s390x",
          "SUSE Manager Server 4.3:kernel-syms-5.14.21-150400.24.170.1.x86_64",
          "SUSE Manager Server 4.3:kernel-zfcpdump-5.14.21-150400.24.170.2.s390x"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2022-50006",
          "url": "https://www.suse.com/security/cve/CVE-2022-50006"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1245018 for CVE-2022-50006",
          "url": "https://bugzilla.suse.com/1245018"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-64kb-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-64kb-devel-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-devel-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-devel-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-devel-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-docs-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-macros-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-obs-build-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-obs-build-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-source-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-syms-5.14.21-150400.24.170.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-syms-5.14.21-150400.24.170.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:reiserfs-kmp-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:reiserfs-kmp-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-64kb-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-64kb-devel-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-devel-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-docs-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-macros-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-source-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.170.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.170.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_170-default-1-150400.9.3.2.ppc64le",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_170-default-1-150400.9.3.2.s390x",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_170-default-1-150400.9.3.2.x86_64",
            "SUSE Linux Enterprise Micro 5.3:kernel-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise Micro 5.3:kernel-default-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise Micro 5.3:kernel-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Micro 5.3:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.aarch64",
            "SUSE Linux Enterprise Micro 5.3:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
            "SUSE Linux Enterprise Micro 5.4:kernel-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise Micro 5.4:kernel-default-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise Micro 5.4:kernel-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Micro 5.4:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.aarch64",
            "SUSE Linux Enterprise Micro 5.4:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-64kb-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-64kb-devel-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.aarch64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.ppc64le",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-devel-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-docs-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-macros-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-source-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.170.1.aarch64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.170.1.ppc64le",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.170.1.s390x",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.170.1.x86_64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-zfcpdump-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-devel-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-devel-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-devel-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-docs-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-macros-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-obs-build-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-obs-build-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-source-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-syms-5.14.21-150400.24.170.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-syms-5.14.21-150400.24.170.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Manager Proxy 4.3:kernel-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Manager Proxy 4.3:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
            "SUSE Manager Proxy 4.3:kernel-default-devel-5.14.21-150400.24.170.2.x86_64",
            "SUSE Manager Proxy 4.3:kernel-devel-5.14.21-150400.24.170.1.noarch",
            "SUSE Manager Proxy 4.3:kernel-macros-5.14.21-150400.24.170.1.noarch",
            "SUSE Manager Proxy 4.3:kernel-source-5.14.21-150400.24.170.1.noarch",
            "SUSE Manager Proxy 4.3:kernel-syms-5.14.21-150400.24.170.1.x86_64",
            "SUSE Manager Server 4.3:kernel-default-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Manager Server 4.3:kernel-default-5.14.21-150400.24.170.2.s390x",
            "SUSE Manager Server 4.3:kernel-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Manager Server 4.3:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.ppc64le",
            "SUSE Manager Server 4.3:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
            "SUSE Manager Server 4.3:kernel-default-devel-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Manager Server 4.3:kernel-default-devel-5.14.21-150400.24.170.2.s390x",
            "SUSE Manager Server 4.3:kernel-default-devel-5.14.21-150400.24.170.2.x86_64",
            "SUSE Manager Server 4.3:kernel-devel-5.14.21-150400.24.170.1.noarch",
            "SUSE Manager Server 4.3:kernel-macros-5.14.21-150400.24.170.1.noarch",
            "SUSE Manager Server 4.3:kernel-source-5.14.21-150400.24.170.1.noarch",
            "SUSE Manager Server 4.3:kernel-syms-5.14.21-150400.24.170.1.ppc64le",
            "SUSE Manager Server 4.3:kernel-syms-5.14.21-150400.24.170.1.s390x",
            "SUSE Manager Server 4.3:kernel-syms-5.14.21-150400.24.170.1.x86_64",
            "SUSE Manager Server 4.3:kernel-zfcpdump-5.14.21-150400.24.170.2.s390x"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 5.5,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
            "version": "3.1"
          },
          "products": [
            "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-64kb-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-64kb-devel-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-devel-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-devel-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-devel-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-docs-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-macros-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-obs-build-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-obs-build-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-source-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-syms-5.14.21-150400.24.170.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-syms-5.14.21-150400.24.170.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:reiserfs-kmp-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:reiserfs-kmp-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-64kb-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-64kb-devel-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-devel-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-docs-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-macros-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-source-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.170.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.170.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_170-default-1-150400.9.3.2.ppc64le",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_170-default-1-150400.9.3.2.s390x",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_170-default-1-150400.9.3.2.x86_64",
            "SUSE Linux Enterprise Micro 5.3:kernel-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise Micro 5.3:kernel-default-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise Micro 5.3:kernel-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Micro 5.3:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.aarch64",
            "SUSE Linux Enterprise Micro 5.3:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
            "SUSE Linux Enterprise Micro 5.4:kernel-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise Micro 5.4:kernel-default-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise Micro 5.4:kernel-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Micro 5.4:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.aarch64",
            "SUSE Linux Enterprise Micro 5.4:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-64kb-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-64kb-devel-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.aarch64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.ppc64le",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-devel-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-docs-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-macros-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-source-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.170.1.aarch64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.170.1.ppc64le",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.170.1.s390x",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.170.1.x86_64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-zfcpdump-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-devel-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-devel-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-devel-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-docs-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-macros-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-obs-build-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-obs-build-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-source-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-syms-5.14.21-150400.24.170.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-syms-5.14.21-150400.24.170.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Manager Proxy 4.3:kernel-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Manager Proxy 4.3:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
            "SUSE Manager Proxy 4.3:kernel-default-devel-5.14.21-150400.24.170.2.x86_64",
            "SUSE Manager Proxy 4.3:kernel-devel-5.14.21-150400.24.170.1.noarch",
            "SUSE Manager Proxy 4.3:kernel-macros-5.14.21-150400.24.170.1.noarch",
            "SUSE Manager Proxy 4.3:kernel-source-5.14.21-150400.24.170.1.noarch",
            "SUSE Manager Proxy 4.3:kernel-syms-5.14.21-150400.24.170.1.x86_64",
            "SUSE Manager Server 4.3:kernel-default-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Manager Server 4.3:kernel-default-5.14.21-150400.24.170.2.s390x",
            "SUSE Manager Server 4.3:kernel-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Manager Server 4.3:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.ppc64le",
            "SUSE Manager Server 4.3:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
            "SUSE Manager Server 4.3:kernel-default-devel-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Manager Server 4.3:kernel-default-devel-5.14.21-150400.24.170.2.s390x",
            "SUSE Manager Server 4.3:kernel-default-devel-5.14.21-150400.24.170.2.x86_64",
            "SUSE Manager Server 4.3:kernel-devel-5.14.21-150400.24.170.1.noarch",
            "SUSE Manager Server 4.3:kernel-macros-5.14.21-150400.24.170.1.noarch",
            "SUSE Manager Server 4.3:kernel-source-5.14.21-150400.24.170.1.noarch",
            "SUSE Manager Server 4.3:kernel-syms-5.14.21-150400.24.170.1.ppc64le",
            "SUSE Manager Server 4.3:kernel-syms-5.14.21-150400.24.170.1.s390x",
            "SUSE Manager Server 4.3:kernel-syms-5.14.21-150400.24.170.1.x86_64",
            "SUSE Manager Server 4.3:kernel-zfcpdump-5.14.21-150400.24.170.2.s390x"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2025-07-28T15:09:33Z",
          "details": "moderate"
        }
      ],
      "title": "CVE-2022-50006"
    },
    {
      "cve": "CVE-2022-50008",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2022-50008"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "In the Linux kernel, the following vulnerability has been resolved:\n\nkprobes: don\u0027t call disarm_kprobe() for disabled kprobes\n\nThe assumption in __disable_kprobe() is wrong, and it could try to disarm\nan already disarmed kprobe and fire the WARN_ONCE() below. [0]  We can\neasily reproduce this issue.\n\n1. Write 0 to /sys/kernel/debug/kprobes/enabled.\n\n  # echo 0 \u003e /sys/kernel/debug/kprobes/enabled\n\n2. Run execsnoop.  At this time, one kprobe is disabled.\n\n  # /usr/share/bcc/tools/execsnoop \u0026\n  [1] 2460\n  PCOMM            PID    PPID   RET ARGS\n\n  # cat /sys/kernel/debug/kprobes/list\n  ffffffff91345650  r  __x64_sys_execve+0x0    [FTRACE]\n  ffffffff91345650  k  __x64_sys_execve+0x0    [DISABLED][FTRACE]\n\n3. Write 1 to /sys/kernel/debug/kprobes/enabled, which changes\n   kprobes_all_disarmed to false but does not arm the disabled kprobe.\n\n  # echo 1 \u003e /sys/kernel/debug/kprobes/enabled\n\n  # cat /sys/kernel/debug/kprobes/list\n  ffffffff91345650  r  __x64_sys_execve+0x0    [FTRACE]\n  ffffffff91345650  k  __x64_sys_execve+0x0    [DISABLED][FTRACE]\n\n4. Kill execsnoop, when __disable_kprobe() calls disarm_kprobe() for the\n   disabled kprobe and hits the WARN_ONCE() in __disarm_kprobe_ftrace().\n\n  # fg\n  /usr/share/bcc/tools/execsnoop\n  ^C\n\nActually, WARN_ONCE() is fired twice, and __unregister_kprobe_top() misses\nsome cleanups and leaves the aggregated kprobe in the hash table.  Then,\n__unregister_trace_kprobe() initialises tk-\u003erp.kp.list and creates an\ninfinite loop like this.\n\n  aggregated kprobe.list -\u003e kprobe.list -.\n                                     ^    |\n                                     \u0027.__.\u0027\n\nIn this situation, these commands fall into the infinite loop and result\nin RCU stall or soft lockup.\n\n  cat /sys/kernel/debug/kprobes/list : show_kprobe_addr() enters into the\n                                       infinite loop with RCU.\n\n  /usr/share/bcc/tools/execsnoop : warn_kprobe_rereg() holds kprobe_mutex,\n                                   and __get_valid_kprobe() is stuck in\n\t\t\t\t   the loop.\n\nTo avoid the issue, make sure we don\u0027t call disarm_kprobe() for disabled\nkprobes.\n\n[0]\nFailed to disarm kprobe-ftrace at __x64_sys_execve+0x0/0x40 (error -2)\nWARNING: CPU: 6 PID: 2460 at kernel/kprobes.c:1130 __disarm_kprobe_ftrace.isra.19 (kernel/kprobes.c:1129)\nModules linked in: ena\nCPU: 6 PID: 2460 Comm: execsnoop Not tainted 5.19.0+ #28\nHardware name: Amazon EC2 c5.2xlarge/, BIOS 1.0 10/16/2017\nRIP: 0010:__disarm_kprobe_ftrace.isra.19 (kernel/kprobes.c:1129)\nCode: 24 8b 02 eb c1 80 3d c4 83 f2 01 00 75 d4 48 8b 75 00 89 c2 48 c7 c7 90 fa 0f 92 89 04 24 c6 05 ab 83 01 e8 e4 94 f0 ff \u003c0f\u003e 0b 8b 04 24 eb b1 89 c6 48 c7 c7 60 fa 0f 92 89 04 24 e8 cc 94\nRSP: 0018:ffff9e6ec154bd98 EFLAGS: 00010282\nRAX: 0000000000000000 RBX: ffffffff930f7b00 RCX: 0000000000000001\nRDX: 0000000080000001 RSI: ffffffff921461c5 RDI: 00000000ffffffff\nRBP: ffff89c504286da8 R08: 0000000000000000 R09: c0000000fffeffff\nR10: 0000000000000000 R11: ffff9e6ec154bc28 R12: ffff89c502394e40\nR13: ffff89c502394c00 R14: ffff9e6ec154bc00 R15: 0000000000000000\nFS:  00007fe800398740(0000) GS:ffff89c812d80000(0000) knlGS:0000000000000000\nCS:  0010 DS: 0000 ES: 0000 CR0: 0000000080050033\nCR2: 000000c00057f010 CR3: 0000000103b54006 CR4: 00000000007706e0\nDR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000\nDR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400\nPKRU: 55555554\nCall Trace:\n\u003cTASK\u003e\n __disable_kprobe (kernel/kprobes.c:1716)\n disable_kprobe (kernel/kprobes.c:2392)\n __disable_trace_kprobe (kernel/trace/trace_kprobe.c:340)\n disable_trace_kprobe (kernel/trace/trace_kprobe.c:429)\n perf_trace_event_unreg.isra.2 (./include/linux/tracepoint.h:93 kernel/trace/trace_event_perf.c:168)\n perf_kprobe_destroy (kernel/trace/trace_event_perf.c:295)\n _free_event (kernel/events/core.c:4971)\n perf_event_release_kernel (kernel/events/core.c:5176)\n perf_release (kernel/events/core.c:5186)\n __fput (fs/file_table.c:321)\n task_work_run (./include/linux/\n---truncated---",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.170.2.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.170.2.s390x",
          "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.170.2.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.170.2.s390x",
          "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.170.2.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.170.2.s390x",
          "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.170.2.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.170.2.s390x",
          "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-64kb-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-64kb-devel-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-devel-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-devel-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-devel-5.14.21-150400.24.170.1.noarch",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-docs-5.14.21-150400.24.170.1.noarch",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-macros-5.14.21-150400.24.170.1.noarch",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-obs-build-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-obs-build-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-source-5.14.21-150400.24.170.1.noarch",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-syms-5.14.21-150400.24.170.1.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-syms-5.14.21-150400.24.170.1.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:reiserfs-kmp-default-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:reiserfs-kmp-default-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-64kb-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-64kb-devel-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-devel-5.14.21-150400.24.170.1.noarch",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-docs-5.14.21-150400.24.170.1.noarch",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-macros-5.14.21-150400.24.170.1.noarch",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-source-5.14.21-150400.24.170.1.noarch",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.170.1.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.170.1.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.170.2.ppc64le",
          "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.170.2.s390x",
          "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.170.2.ppc64le",
          "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.170.2.s390x",
          "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_170-default-1-150400.9.3.2.ppc64le",
          "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_170-default-1-150400.9.3.2.s390x",
          "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_170-default-1-150400.9.3.2.x86_64",
          "SUSE Linux Enterprise Micro 5.3:kernel-default-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise Micro 5.3:kernel-default-5.14.21-150400.24.170.2.s390x",
          "SUSE Linux Enterprise Micro 5.3:kernel-default-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise Micro 5.3:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.aarch64",
          "SUSE Linux Enterprise Micro 5.3:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
          "SUSE Linux Enterprise Micro 5.4:kernel-default-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise Micro 5.4:kernel-default-5.14.21-150400.24.170.2.s390x",
          "SUSE Linux Enterprise Micro 5.4:kernel-default-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise Micro 5.4:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.aarch64",
          "SUSE Linux Enterprise Micro 5.4:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-64kb-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-64kb-devel-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-5.14.21-150400.24.170.2.ppc64le",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-5.14.21-150400.24.170.2.s390x",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.aarch64",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.ppc64le",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.170.2.ppc64le",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.170.2.s390x",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-devel-5.14.21-150400.24.170.1.noarch",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-docs-5.14.21-150400.24.170.1.noarch",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-macros-5.14.21-150400.24.170.1.noarch",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.170.2.ppc64le",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.170.2.s390x",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-source-5.14.21-150400.24.170.1.noarch",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.170.1.aarch64",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.170.1.ppc64le",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.170.1.s390x",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.170.1.x86_64",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-zfcpdump-5.14.21-150400.24.170.2.s390x",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.170.2.ppc64le",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.170.2.s390x",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-5.14.21-150400.24.170.2.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-devel-5.14.21-150400.24.170.2.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-devel-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-devel-5.14.21-150400.24.170.1.noarch",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-docs-5.14.21-150400.24.170.1.noarch",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-macros-5.14.21-150400.24.170.1.noarch",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-obs-build-5.14.21-150400.24.170.2.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-obs-build-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-source-5.14.21-150400.24.170.1.noarch",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-syms-5.14.21-150400.24.170.1.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-syms-5.14.21-150400.24.170.1.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.170.2.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.170.2.x86_64",
          "SUSE Manager Proxy 4.3:kernel-default-5.14.21-150400.24.170.2.x86_64",
          "SUSE Manager Proxy 4.3:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
          "SUSE Manager Proxy 4.3:kernel-default-devel-5.14.21-150400.24.170.2.x86_64",
          "SUSE Manager Proxy 4.3:kernel-devel-5.14.21-150400.24.170.1.noarch",
          "SUSE Manager Proxy 4.3:kernel-macros-5.14.21-150400.24.170.1.noarch",
          "SUSE Manager Proxy 4.3:kernel-source-5.14.21-150400.24.170.1.noarch",
          "SUSE Manager Proxy 4.3:kernel-syms-5.14.21-150400.24.170.1.x86_64",
          "SUSE Manager Server 4.3:kernel-default-5.14.21-150400.24.170.2.ppc64le",
          "SUSE Manager Server 4.3:kernel-default-5.14.21-150400.24.170.2.s390x",
          "SUSE Manager Server 4.3:kernel-default-5.14.21-150400.24.170.2.x86_64",
          "SUSE Manager Server 4.3:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.ppc64le",
          "SUSE Manager Server 4.3:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
          "SUSE Manager Server 4.3:kernel-default-devel-5.14.21-150400.24.170.2.ppc64le",
          "SUSE Manager Server 4.3:kernel-default-devel-5.14.21-150400.24.170.2.s390x",
          "SUSE Manager Server 4.3:kernel-default-devel-5.14.21-150400.24.170.2.x86_64",
          "SUSE Manager Server 4.3:kernel-devel-5.14.21-150400.24.170.1.noarch",
          "SUSE Manager Server 4.3:kernel-macros-5.14.21-150400.24.170.1.noarch",
          "SUSE Manager Server 4.3:kernel-source-5.14.21-150400.24.170.1.noarch",
          "SUSE Manager Server 4.3:kernel-syms-5.14.21-150400.24.170.1.ppc64le",
          "SUSE Manager Server 4.3:kernel-syms-5.14.21-150400.24.170.1.s390x",
          "SUSE Manager Server 4.3:kernel-syms-5.14.21-150400.24.170.1.x86_64",
          "SUSE Manager Server 4.3:kernel-zfcpdump-5.14.21-150400.24.170.2.s390x"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2022-50008",
          "url": "https://www.suse.com/security/cve/CVE-2022-50008"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1245009 for CVE-2022-50008",
          "url": "https://bugzilla.suse.com/1245009"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-64kb-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-64kb-devel-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-devel-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-devel-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-devel-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-docs-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-macros-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-obs-build-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-obs-build-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-source-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-syms-5.14.21-150400.24.170.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-syms-5.14.21-150400.24.170.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:reiserfs-kmp-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:reiserfs-kmp-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-64kb-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-64kb-devel-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-devel-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-docs-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-macros-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-source-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.170.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.170.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_170-default-1-150400.9.3.2.ppc64le",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_170-default-1-150400.9.3.2.s390x",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_170-default-1-150400.9.3.2.x86_64",
            "SUSE Linux Enterprise Micro 5.3:kernel-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise Micro 5.3:kernel-default-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise Micro 5.3:kernel-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Micro 5.3:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.aarch64",
            "SUSE Linux Enterprise Micro 5.3:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
            "SUSE Linux Enterprise Micro 5.4:kernel-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise Micro 5.4:kernel-default-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise Micro 5.4:kernel-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Micro 5.4:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.aarch64",
            "SUSE Linux Enterprise Micro 5.4:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-64kb-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-64kb-devel-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.aarch64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.ppc64le",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-devel-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-docs-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-macros-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-source-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.170.1.aarch64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.170.1.ppc64le",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.170.1.s390x",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.170.1.x86_64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-zfcpdump-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-devel-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-devel-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-devel-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-docs-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-macros-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-obs-build-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-obs-build-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-source-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-syms-5.14.21-150400.24.170.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-syms-5.14.21-150400.24.170.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Manager Proxy 4.3:kernel-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Manager Proxy 4.3:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
            "SUSE Manager Proxy 4.3:kernel-default-devel-5.14.21-150400.24.170.2.x86_64",
            "SUSE Manager Proxy 4.3:kernel-devel-5.14.21-150400.24.170.1.noarch",
            "SUSE Manager Proxy 4.3:kernel-macros-5.14.21-150400.24.170.1.noarch",
            "SUSE Manager Proxy 4.3:kernel-source-5.14.21-150400.24.170.1.noarch",
            "SUSE Manager Proxy 4.3:kernel-syms-5.14.21-150400.24.170.1.x86_64",
            "SUSE Manager Server 4.3:kernel-default-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Manager Server 4.3:kernel-default-5.14.21-150400.24.170.2.s390x",
            "SUSE Manager Server 4.3:kernel-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Manager Server 4.3:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.ppc64le",
            "SUSE Manager Server 4.3:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
            "SUSE Manager Server 4.3:kernel-default-devel-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Manager Server 4.3:kernel-default-devel-5.14.21-150400.24.170.2.s390x",
            "SUSE Manager Server 4.3:kernel-default-devel-5.14.21-150400.24.170.2.x86_64",
            "SUSE Manager Server 4.3:kernel-devel-5.14.21-150400.24.170.1.noarch",
            "SUSE Manager Server 4.3:kernel-macros-5.14.21-150400.24.170.1.noarch",
            "SUSE Manager Server 4.3:kernel-source-5.14.21-150400.24.170.1.noarch",
            "SUSE Manager Server 4.3:kernel-syms-5.14.21-150400.24.170.1.ppc64le",
            "SUSE Manager Server 4.3:kernel-syms-5.14.21-150400.24.170.1.s390x",
            "SUSE Manager Server 4.3:kernel-syms-5.14.21-150400.24.170.1.x86_64",
            "SUSE Manager Server 4.3:kernel-zfcpdump-5.14.21-150400.24.170.2.s390x"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 5.5,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
            "version": "3.1"
          },
          "products": [
            "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-64kb-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-64kb-devel-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-devel-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-devel-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-devel-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-docs-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-macros-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-obs-build-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-obs-build-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-source-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-syms-5.14.21-150400.24.170.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-syms-5.14.21-150400.24.170.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:reiserfs-kmp-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:reiserfs-kmp-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-64kb-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-64kb-devel-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-devel-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-docs-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-macros-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-source-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.170.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.170.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_170-default-1-150400.9.3.2.ppc64le",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_170-default-1-150400.9.3.2.s390x",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_170-default-1-150400.9.3.2.x86_64",
            "SUSE Linux Enterprise Micro 5.3:kernel-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise Micro 5.3:kernel-default-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise Micro 5.3:kernel-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Micro 5.3:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.aarch64",
            "SUSE Linux Enterprise Micro 5.3:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
            "SUSE Linux Enterprise Micro 5.4:kernel-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise Micro 5.4:kernel-default-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise Micro 5.4:kernel-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Micro 5.4:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.aarch64",
            "SUSE Linux Enterprise Micro 5.4:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-64kb-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-64kb-devel-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.aarch64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.ppc64le",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-devel-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-docs-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-macros-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-source-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.170.1.aarch64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.170.1.ppc64le",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.170.1.s390x",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.170.1.x86_64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-zfcpdump-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-devel-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-devel-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-devel-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-docs-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-macros-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-obs-build-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-obs-build-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-source-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-syms-5.14.21-150400.24.170.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-syms-5.14.21-150400.24.170.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Manager Proxy 4.3:kernel-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Manager Proxy 4.3:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
            "SUSE Manager Proxy 4.3:kernel-default-devel-5.14.21-150400.24.170.2.x86_64",
            "SUSE Manager Proxy 4.3:kernel-devel-5.14.21-150400.24.170.1.noarch",
            "SUSE Manager Proxy 4.3:kernel-macros-5.14.21-150400.24.170.1.noarch",
            "SUSE Manager Proxy 4.3:kernel-source-5.14.21-150400.24.170.1.noarch",
            "SUSE Manager Proxy 4.3:kernel-syms-5.14.21-150400.24.170.1.x86_64",
            "SUSE Manager Server 4.3:kernel-default-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Manager Server 4.3:kernel-default-5.14.21-150400.24.170.2.s390x",
            "SUSE Manager Server 4.3:kernel-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Manager Server 4.3:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.ppc64le",
            "SUSE Manager Server 4.3:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
            "SUSE Manager Server 4.3:kernel-default-devel-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Manager Server 4.3:kernel-default-devel-5.14.21-150400.24.170.2.s390x",
            "SUSE Manager Server 4.3:kernel-default-devel-5.14.21-150400.24.170.2.x86_64",
            "SUSE Manager Server 4.3:kernel-devel-5.14.21-150400.24.170.1.noarch",
            "SUSE Manager Server 4.3:kernel-macros-5.14.21-150400.24.170.1.noarch",
            "SUSE Manager Server 4.3:kernel-source-5.14.21-150400.24.170.1.noarch",
            "SUSE Manager Server 4.3:kernel-syms-5.14.21-150400.24.170.1.ppc64le",
            "SUSE Manager Server 4.3:kernel-syms-5.14.21-150400.24.170.1.s390x",
            "SUSE Manager Server 4.3:kernel-syms-5.14.21-150400.24.170.1.x86_64",
            "SUSE Manager Server 4.3:kernel-zfcpdump-5.14.21-150400.24.170.2.s390x"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2025-07-28T15:09:33Z",
          "details": "moderate"
        }
      ],
      "title": "CVE-2022-50008"
    },
    {
      "cve": "CVE-2022-50010",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2022-50010"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "In the Linux kernel, the following vulnerability has been resolved:\n\nvideo: fbdev: i740fb: Check the argument of i740_calc_vclk()\n\nSince the user can control the arguments of the ioctl() from the user\nspace, under special arguments that may result in a divide-by-zero bug.\n\nIf the user provides an improper \u0027pixclock\u0027 value that makes the argumet\nof i740_calc_vclk() less than \u0027I740_RFREQ_FIX\u0027, it will cause a\ndivide-by-zero bug in:\n    drivers/video/fbdev/i740fb.c:353 p_best = min(15, ilog2(I740_MAX_VCO_FREQ / (freq / I740_RFREQ_FIX)));\n\nThe following log can reveal it:\n\ndivide error: 0000 [#1] PREEMPT SMP KASAN PTI\nRIP: 0010:i740_calc_vclk drivers/video/fbdev/i740fb.c:353 [inline]\nRIP: 0010:i740fb_decode_var drivers/video/fbdev/i740fb.c:646 [inline]\nRIP: 0010:i740fb_set_par+0x163f/0x3b70 drivers/video/fbdev/i740fb.c:742\nCall Trace:\n fb_set_var+0x604/0xeb0 drivers/video/fbdev/core/fbmem.c:1034\n do_fb_ioctl+0x234/0x670 drivers/video/fbdev/core/fbmem.c:1110\n fb_ioctl+0xdd/0x130 drivers/video/fbdev/core/fbmem.c:1189\n\nFix this by checking the argument of i740_calc_vclk() first.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.170.2.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.170.2.s390x",
          "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.170.2.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.170.2.s390x",
          "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.170.2.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.170.2.s390x",
          "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.170.2.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.170.2.s390x",
          "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-64kb-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-64kb-devel-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-devel-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-devel-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-devel-5.14.21-150400.24.170.1.noarch",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-docs-5.14.21-150400.24.170.1.noarch",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-macros-5.14.21-150400.24.170.1.noarch",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-obs-build-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-obs-build-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-source-5.14.21-150400.24.170.1.noarch",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-syms-5.14.21-150400.24.170.1.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-syms-5.14.21-150400.24.170.1.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:reiserfs-kmp-default-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:reiserfs-kmp-default-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-64kb-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-64kb-devel-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-devel-5.14.21-150400.24.170.1.noarch",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-docs-5.14.21-150400.24.170.1.noarch",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-macros-5.14.21-150400.24.170.1.noarch",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-source-5.14.21-150400.24.170.1.noarch",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.170.1.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.170.1.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.170.2.ppc64le",
          "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.170.2.s390x",
          "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.170.2.ppc64le",
          "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.170.2.s390x",
          "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_170-default-1-150400.9.3.2.ppc64le",
          "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_170-default-1-150400.9.3.2.s390x",
          "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_170-default-1-150400.9.3.2.x86_64",
          "SUSE Linux Enterprise Micro 5.3:kernel-default-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise Micro 5.3:kernel-default-5.14.21-150400.24.170.2.s390x",
          "SUSE Linux Enterprise Micro 5.3:kernel-default-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise Micro 5.3:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.aarch64",
          "SUSE Linux Enterprise Micro 5.3:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
          "SUSE Linux Enterprise Micro 5.4:kernel-default-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise Micro 5.4:kernel-default-5.14.21-150400.24.170.2.s390x",
          "SUSE Linux Enterprise Micro 5.4:kernel-default-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise Micro 5.4:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.aarch64",
          "SUSE Linux Enterprise Micro 5.4:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-64kb-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-64kb-devel-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-5.14.21-150400.24.170.2.ppc64le",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-5.14.21-150400.24.170.2.s390x",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.aarch64",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.ppc64le",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.170.2.ppc64le",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.170.2.s390x",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-devel-5.14.21-150400.24.170.1.noarch",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-docs-5.14.21-150400.24.170.1.noarch",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-macros-5.14.21-150400.24.170.1.noarch",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.170.2.ppc64le",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.170.2.s390x",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-source-5.14.21-150400.24.170.1.noarch",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.170.1.aarch64",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.170.1.ppc64le",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.170.1.s390x",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.170.1.x86_64",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-zfcpdump-5.14.21-150400.24.170.2.s390x",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.170.2.ppc64le",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.170.2.s390x",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-5.14.21-150400.24.170.2.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-devel-5.14.21-150400.24.170.2.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-devel-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-devel-5.14.21-150400.24.170.1.noarch",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-docs-5.14.21-150400.24.170.1.noarch",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-macros-5.14.21-150400.24.170.1.noarch",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-obs-build-5.14.21-150400.24.170.2.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-obs-build-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-source-5.14.21-150400.24.170.1.noarch",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-syms-5.14.21-150400.24.170.1.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-syms-5.14.21-150400.24.170.1.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.170.2.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.170.2.x86_64",
          "SUSE Manager Proxy 4.3:kernel-default-5.14.21-150400.24.170.2.x86_64",
          "SUSE Manager Proxy 4.3:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
          "SUSE Manager Proxy 4.3:kernel-default-devel-5.14.21-150400.24.170.2.x86_64",
          "SUSE Manager Proxy 4.3:kernel-devel-5.14.21-150400.24.170.1.noarch",
          "SUSE Manager Proxy 4.3:kernel-macros-5.14.21-150400.24.170.1.noarch",
          "SUSE Manager Proxy 4.3:kernel-source-5.14.21-150400.24.170.1.noarch",
          "SUSE Manager Proxy 4.3:kernel-syms-5.14.21-150400.24.170.1.x86_64",
          "SUSE Manager Server 4.3:kernel-default-5.14.21-150400.24.170.2.ppc64le",
          "SUSE Manager Server 4.3:kernel-default-5.14.21-150400.24.170.2.s390x",
          "SUSE Manager Server 4.3:kernel-default-5.14.21-150400.24.170.2.x86_64",
          "SUSE Manager Server 4.3:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.ppc64le",
          "SUSE Manager Server 4.3:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
          "SUSE Manager Server 4.3:kernel-default-devel-5.14.21-150400.24.170.2.ppc64le",
          "SUSE Manager Server 4.3:kernel-default-devel-5.14.21-150400.24.170.2.s390x",
          "SUSE Manager Server 4.3:kernel-default-devel-5.14.21-150400.24.170.2.x86_64",
          "SUSE Manager Server 4.3:kernel-devel-5.14.21-150400.24.170.1.noarch",
          "SUSE Manager Server 4.3:kernel-macros-5.14.21-150400.24.170.1.noarch",
          "SUSE Manager Server 4.3:kernel-source-5.14.21-150400.24.170.1.noarch",
          "SUSE Manager Server 4.3:kernel-syms-5.14.21-150400.24.170.1.ppc64le",
          "SUSE Manager Server 4.3:kernel-syms-5.14.21-150400.24.170.1.s390x",
          "SUSE Manager Server 4.3:kernel-syms-5.14.21-150400.24.170.1.x86_64",
          "SUSE Manager Server 4.3:kernel-zfcpdump-5.14.21-150400.24.170.2.s390x"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2022-50010",
          "url": "https://www.suse.com/security/cve/CVE-2022-50010"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1245122 for CVE-2022-50010",
          "url": "https://bugzilla.suse.com/1245122"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-64kb-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-64kb-devel-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-devel-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-devel-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-devel-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-docs-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-macros-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-obs-build-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-obs-build-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-source-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-syms-5.14.21-150400.24.170.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-syms-5.14.21-150400.24.170.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:reiserfs-kmp-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:reiserfs-kmp-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-64kb-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-64kb-devel-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-devel-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-docs-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-macros-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-source-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.170.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.170.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_170-default-1-150400.9.3.2.ppc64le",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_170-default-1-150400.9.3.2.s390x",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_170-default-1-150400.9.3.2.x86_64",
            "SUSE Linux Enterprise Micro 5.3:kernel-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise Micro 5.3:kernel-default-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise Micro 5.3:kernel-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Micro 5.3:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.aarch64",
            "SUSE Linux Enterprise Micro 5.3:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
            "SUSE Linux Enterprise Micro 5.4:kernel-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise Micro 5.4:kernel-default-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise Micro 5.4:kernel-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Micro 5.4:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.aarch64",
            "SUSE Linux Enterprise Micro 5.4:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-64kb-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-64kb-devel-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.aarch64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.ppc64le",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-devel-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-docs-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-macros-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-source-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.170.1.aarch64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.170.1.ppc64le",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.170.1.s390x",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.170.1.x86_64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-zfcpdump-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-devel-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-devel-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-devel-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-docs-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-macros-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-obs-build-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-obs-build-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-source-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-syms-5.14.21-150400.24.170.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-syms-5.14.21-150400.24.170.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Manager Proxy 4.3:kernel-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Manager Proxy 4.3:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
            "SUSE Manager Proxy 4.3:kernel-default-devel-5.14.21-150400.24.170.2.x86_64",
            "SUSE Manager Proxy 4.3:kernel-devel-5.14.21-150400.24.170.1.noarch",
            "SUSE Manager Proxy 4.3:kernel-macros-5.14.21-150400.24.170.1.noarch",
            "SUSE Manager Proxy 4.3:kernel-source-5.14.21-150400.24.170.1.noarch",
            "SUSE Manager Proxy 4.3:kernel-syms-5.14.21-150400.24.170.1.x86_64",
            "SUSE Manager Server 4.3:kernel-default-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Manager Server 4.3:kernel-default-5.14.21-150400.24.170.2.s390x",
            "SUSE Manager Server 4.3:kernel-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Manager Server 4.3:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.ppc64le",
            "SUSE Manager Server 4.3:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
            "SUSE Manager Server 4.3:kernel-default-devel-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Manager Server 4.3:kernel-default-devel-5.14.21-150400.24.170.2.s390x",
            "SUSE Manager Server 4.3:kernel-default-devel-5.14.21-150400.24.170.2.x86_64",
            "SUSE Manager Server 4.3:kernel-devel-5.14.21-150400.24.170.1.noarch",
            "SUSE Manager Server 4.3:kernel-macros-5.14.21-150400.24.170.1.noarch",
            "SUSE Manager Server 4.3:kernel-source-5.14.21-150400.24.170.1.noarch",
            "SUSE Manager Server 4.3:kernel-syms-5.14.21-150400.24.170.1.ppc64le",
            "SUSE Manager Server 4.3:kernel-syms-5.14.21-150400.24.170.1.s390x",
            "SUSE Manager Server 4.3:kernel-syms-5.14.21-150400.24.170.1.x86_64",
            "SUSE Manager Server 4.3:kernel-zfcpdump-5.14.21-150400.24.170.2.s390x"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 5.5,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
            "version": "3.1"
          },
          "products": [
            "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-64kb-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-64kb-devel-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-devel-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-devel-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-devel-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-docs-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-macros-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-obs-build-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-obs-build-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-source-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-syms-5.14.21-150400.24.170.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-syms-5.14.21-150400.24.170.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:reiserfs-kmp-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:reiserfs-kmp-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-64kb-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-64kb-devel-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-devel-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-docs-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-macros-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-source-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.170.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.170.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_170-default-1-150400.9.3.2.ppc64le",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_170-default-1-150400.9.3.2.s390x",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_170-default-1-150400.9.3.2.x86_64",
            "SUSE Linux Enterprise Micro 5.3:kernel-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise Micro 5.3:kernel-default-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise Micro 5.3:kernel-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Micro 5.3:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.aarch64",
            "SUSE Linux Enterprise Micro 5.3:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
            "SUSE Linux Enterprise Micro 5.4:kernel-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise Micro 5.4:kernel-default-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise Micro 5.4:kernel-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Micro 5.4:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.aarch64",
            "SUSE Linux Enterprise Micro 5.4:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-64kb-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-64kb-devel-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.aarch64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.ppc64le",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-devel-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-docs-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-macros-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-source-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.170.1.aarch64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.170.1.ppc64le",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.170.1.s390x",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.170.1.x86_64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-zfcpdump-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-devel-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-devel-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-devel-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-docs-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-macros-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-obs-build-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-obs-build-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-source-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-syms-5.14.21-150400.24.170.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-syms-5.14.21-150400.24.170.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Manager Proxy 4.3:kernel-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Manager Proxy 4.3:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
            "SUSE Manager Proxy 4.3:kernel-default-devel-5.14.21-150400.24.170.2.x86_64",
            "SUSE Manager Proxy 4.3:kernel-devel-5.14.21-150400.24.170.1.noarch",
            "SUSE Manager Proxy 4.3:kernel-macros-5.14.21-150400.24.170.1.noarch",
            "SUSE Manager Proxy 4.3:kernel-source-5.14.21-150400.24.170.1.noarch",
            "SUSE Manager Proxy 4.3:kernel-syms-5.14.21-150400.24.170.1.x86_64",
            "SUSE Manager Server 4.3:kernel-default-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Manager Server 4.3:kernel-default-5.14.21-150400.24.170.2.s390x",
            "SUSE Manager Server 4.3:kernel-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Manager Server 4.3:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.ppc64le",
            "SUSE Manager Server 4.3:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
            "SUSE Manager Server 4.3:kernel-default-devel-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Manager Server 4.3:kernel-default-devel-5.14.21-150400.24.170.2.s390x",
            "SUSE Manager Server 4.3:kernel-default-devel-5.14.21-150400.24.170.2.x86_64",
            "SUSE Manager Server 4.3:kernel-devel-5.14.21-150400.24.170.1.noarch",
            "SUSE Manager Server 4.3:kernel-macros-5.14.21-150400.24.170.1.noarch",
            "SUSE Manager Server 4.3:kernel-source-5.14.21-150400.24.170.1.noarch",
            "SUSE Manager Server 4.3:kernel-syms-5.14.21-150400.24.170.1.ppc64le",
            "SUSE Manager Server 4.3:kernel-syms-5.14.21-150400.24.170.1.s390x",
            "SUSE Manager Server 4.3:kernel-syms-5.14.21-150400.24.170.1.x86_64",
            "SUSE Manager Server 4.3:kernel-zfcpdump-5.14.21-150400.24.170.2.s390x"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2025-07-28T15:09:33Z",
          "details": "moderate"
        }
      ],
      "title": "CVE-2022-50010"
    },
    {
      "cve": "CVE-2022-50011",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2022-50011"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "In the Linux kernel, the following vulnerability has been resolved:\n\nvenus: pm_helpers: Fix warning in OPP during probe\n\nFix the following WARN triggered during Venus driver probe on\n5.19.0-rc8-next-20220728:\n\n WARNING: CPU: 7 PID: 339 at drivers/opp/core.c:2471 dev_pm_opp_set_config+0x49c/0x610\n Modules linked in: qcom_spmi_adc5 rtc_pm8xxx qcom_spmi_adc_tm5 leds_qcom_lpg led_class_multicolor\n  qcom_pon qcom_vadc_common venus_core(+) qcom_spmi_temp_alarm v4l2_mem2mem videobuf2_v4l2 msm(+)\n  videobuf2_common crct10dif_ce spi_geni_qcom snd_soc_sm8250 i2c_qcom_geni gpu_sched\n  snd_soc_qcom_common videodev qcom_q6v5_pas soundwire_qcom drm_dp_aux_bus qcom_stats\n  drm_display_helper qcom_pil_info soundwire_bus snd_soc_lpass_va_macro mc qcom_q6v5\n  phy_qcom_snps_femto_v2 qcom_rng snd_soc_lpass_macro_common snd_soc_lpass_wsa_macro\n  lpass_gfm_sm8250 slimbus qcom_sysmon qcom_common qcom_glink_smem qmi_helpers\n  qcom_wdt mdt_loader socinfo icc_osm_l3 display_connector\n  drm_kms_helper qnoc_sm8250 drm fuse ip_tables x_tables ipv6\n CPU: 7 PID: 339 Comm: systemd-udevd Not tainted 5.19.0-rc8-next-20220728 #4\n Hardware name: Qualcomm Technologies, Inc. Robotics RB5 (DT)\n pstate: 80400005 (Nzcv daif +PAN -UAO -TCO -DIT -SSBS BTYPE=--)\n pc : dev_pm_opp_set_config+0x49c/0x610\n lr : dev_pm_opp_set_config+0x58/0x610\n sp : ffff8000093c3710\n x29: ffff8000093c3710 x28: ffffbca3959d82b8 x27: ffff8000093c3d00\n x26: ffffbca3959d8e08 x25: ffff4396cac98118 x24: ffff4396c0e24810\n x23: ffff4396c4272c40 x22: ffff4396c0e24810 x21: ffff8000093c3810\n x20: ffff4396cac36800 x19: ffff4396cac96800 x18: 0000000000000000\n x17: 0000000000000003 x16: ffffbca3f4edf198 x15: 0000001cba64a858\n x14: 0000000000000180 x13: 000000000000017e x12: 0000000000000000\n x11: 0000000000000002 x10: 0000000000000a60 x9 : ffff8000093c35c0\n x8 : ffff4396c4273700 x7 : ffff43983efca6c0 x6 : ffff43983efca640\n x5 : 00000000410fd0d0 x4 : ffff4396c4272c40 x3 : ffffbca3f5d1e008\n x2 : 0000000000000000 x1 : ffff4396c2421600 x0 : ffff4396cac96860\n Call trace:\n  dev_pm_opp_set_config+0x49c/0x610\n  devm_pm_opp_set_config+0x18/0x70\n  vcodec_domains_get+0xb8/0x1638 [venus_core]\n  core_get_v4+0x1d8/0x218 [venus_core]\n  venus_probe+0xf4/0x468 [venus_core]\n  platform_probe+0x68/0xd8\n  really_probe+0xbc/0x2a8\n  __driver_probe_device+0x78/0xe0\n  driver_probe_device+0x3c/0xf0\n  __driver_attach+0x70/0x120\n  bus_for_each_dev+0x70/0xc0\n  driver_attach+0x24/0x30\n  bus_add_driver+0x150/0x200\n  driver_register+0x64/0x120\n  __platform_driver_register+0x28/0x38\n  qcom_venus_driver_init+0x24/0x1000 [venus_core]\n  do_one_initcall+0x54/0x1c8\n  do_init_module+0x44/0x1d0\n  load_module+0x16c8/0x1aa0\n  __do_sys_finit_module+0xbc/0x110\n  __arm64_sys_finit_module+0x20/0x30\n  invoke_syscall+0x44/0x108\n  el0_svc_common.constprop.0+0xcc/0xf0\n  do_el0_svc+0x2c/0xb8\n  el0_svc+0x2c/0x88\n  el0t_64_sync_handler+0xb8/0xc0\n  el0t_64_sync+0x18c/0x190\n  qcom-venus: probe of aa00000.video-codec failed with error -16\n\nThe fix is re-ordering the code related to OPP core. The OPP core\nexpects all configuration options to be provided before the OPP\ntable is added.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.170.2.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.170.2.s390x",
          "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.170.2.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.170.2.s390x",
          "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.170.2.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.170.2.s390x",
          "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.170.2.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.170.2.s390x",
          "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-64kb-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-64kb-devel-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-devel-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-devel-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-devel-5.14.21-150400.24.170.1.noarch",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-docs-5.14.21-150400.24.170.1.noarch",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-macros-5.14.21-150400.24.170.1.noarch",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-obs-build-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-obs-build-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-source-5.14.21-150400.24.170.1.noarch",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-syms-5.14.21-150400.24.170.1.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-syms-5.14.21-150400.24.170.1.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:reiserfs-kmp-default-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:reiserfs-kmp-default-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-64kb-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-64kb-devel-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-devel-5.14.21-150400.24.170.1.noarch",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-docs-5.14.21-150400.24.170.1.noarch",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-macros-5.14.21-150400.24.170.1.noarch",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-source-5.14.21-150400.24.170.1.noarch",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.170.1.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.170.1.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.170.2.ppc64le",
          "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.170.2.s390x",
          "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.170.2.ppc64le",
          "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.170.2.s390x",
          "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_170-default-1-150400.9.3.2.ppc64le",
          "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_170-default-1-150400.9.3.2.s390x",
          "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_170-default-1-150400.9.3.2.x86_64",
          "SUSE Linux Enterprise Micro 5.3:kernel-default-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise Micro 5.3:kernel-default-5.14.21-150400.24.170.2.s390x",
          "SUSE Linux Enterprise Micro 5.3:kernel-default-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise Micro 5.3:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.aarch64",
          "SUSE Linux Enterprise Micro 5.3:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
          "SUSE Linux Enterprise Micro 5.4:kernel-default-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise Micro 5.4:kernel-default-5.14.21-150400.24.170.2.s390x",
          "SUSE Linux Enterprise Micro 5.4:kernel-default-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise Micro 5.4:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.aarch64",
          "SUSE Linux Enterprise Micro 5.4:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-64kb-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-64kb-devel-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-5.14.21-150400.24.170.2.ppc64le",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-5.14.21-150400.24.170.2.s390x",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.aarch64",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.ppc64le",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.170.2.ppc64le",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.170.2.s390x",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-devel-5.14.21-150400.24.170.1.noarch",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-docs-5.14.21-150400.24.170.1.noarch",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-macros-5.14.21-150400.24.170.1.noarch",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.170.2.ppc64le",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.170.2.s390x",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-source-5.14.21-150400.24.170.1.noarch",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.170.1.aarch64",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.170.1.ppc64le",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.170.1.s390x",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.170.1.x86_64",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-zfcpdump-5.14.21-150400.24.170.2.s390x",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.170.2.ppc64le",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.170.2.s390x",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-5.14.21-150400.24.170.2.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-devel-5.14.21-150400.24.170.2.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-devel-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-devel-5.14.21-150400.24.170.1.noarch",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-docs-5.14.21-150400.24.170.1.noarch",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-macros-5.14.21-150400.24.170.1.noarch",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-obs-build-5.14.21-150400.24.170.2.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-obs-build-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-source-5.14.21-150400.24.170.1.noarch",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-syms-5.14.21-150400.24.170.1.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-syms-5.14.21-150400.24.170.1.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.170.2.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.170.2.x86_64",
          "SUSE Manager Proxy 4.3:kernel-default-5.14.21-150400.24.170.2.x86_64",
          "SUSE Manager Proxy 4.3:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
          "SUSE Manager Proxy 4.3:kernel-default-devel-5.14.21-150400.24.170.2.x86_64",
          "SUSE Manager Proxy 4.3:kernel-devel-5.14.21-150400.24.170.1.noarch",
          "SUSE Manager Proxy 4.3:kernel-macros-5.14.21-150400.24.170.1.noarch",
          "SUSE Manager Proxy 4.3:kernel-source-5.14.21-150400.24.170.1.noarch",
          "SUSE Manager Proxy 4.3:kernel-syms-5.14.21-150400.24.170.1.x86_64",
          "SUSE Manager Server 4.3:kernel-default-5.14.21-150400.24.170.2.ppc64le",
          "SUSE Manager Server 4.3:kernel-default-5.14.21-150400.24.170.2.s390x",
          "SUSE Manager Server 4.3:kernel-default-5.14.21-150400.24.170.2.x86_64",
          "SUSE Manager Server 4.3:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.ppc64le",
          "SUSE Manager Server 4.3:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
          "SUSE Manager Server 4.3:kernel-default-devel-5.14.21-150400.24.170.2.ppc64le",
          "SUSE Manager Server 4.3:kernel-default-devel-5.14.21-150400.24.170.2.s390x",
          "SUSE Manager Server 4.3:kernel-default-devel-5.14.21-150400.24.170.2.x86_64",
          "SUSE Manager Server 4.3:kernel-devel-5.14.21-150400.24.170.1.noarch",
          "SUSE Manager Server 4.3:kernel-macros-5.14.21-150400.24.170.1.noarch",
          "SUSE Manager Server 4.3:kernel-source-5.14.21-150400.24.170.1.noarch",
          "SUSE Manager Server 4.3:kernel-syms-5.14.21-150400.24.170.1.ppc64le",
          "SUSE Manager Server 4.3:kernel-syms-5.14.21-150400.24.170.1.s390x",
          "SUSE Manager Server 4.3:kernel-syms-5.14.21-150400.24.170.1.x86_64",
          "SUSE Manager Server 4.3:kernel-zfcpdump-5.14.21-150400.24.170.2.s390x"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2022-50011",
          "url": "https://www.suse.com/security/cve/CVE-2022-50011"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1244915 for CVE-2022-50011",
          "url": "https://bugzilla.suse.com/1244915"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-64kb-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-64kb-devel-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-devel-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-devel-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-devel-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-docs-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-macros-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-obs-build-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-obs-build-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-source-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-syms-5.14.21-150400.24.170.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-syms-5.14.21-150400.24.170.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:reiserfs-kmp-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:reiserfs-kmp-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-64kb-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-64kb-devel-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-devel-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-docs-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-macros-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-source-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.170.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.170.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_170-default-1-150400.9.3.2.ppc64le",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_170-default-1-150400.9.3.2.s390x",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_170-default-1-150400.9.3.2.x86_64",
            "SUSE Linux Enterprise Micro 5.3:kernel-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise Micro 5.3:kernel-default-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise Micro 5.3:kernel-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Micro 5.3:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.aarch64",
            "SUSE Linux Enterprise Micro 5.3:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
            "SUSE Linux Enterprise Micro 5.4:kernel-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise Micro 5.4:kernel-default-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise Micro 5.4:kernel-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Micro 5.4:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.aarch64",
            "SUSE Linux Enterprise Micro 5.4:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-64kb-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-64kb-devel-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.aarch64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.ppc64le",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-devel-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-docs-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-macros-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-source-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.170.1.aarch64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.170.1.ppc64le",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.170.1.s390x",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.170.1.x86_64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-zfcpdump-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-devel-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-devel-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-devel-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-docs-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-macros-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-obs-build-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-obs-build-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-source-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-syms-5.14.21-150400.24.170.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-syms-5.14.21-150400.24.170.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Manager Proxy 4.3:kernel-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Manager Proxy 4.3:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
            "SUSE Manager Proxy 4.3:kernel-default-devel-5.14.21-150400.24.170.2.x86_64",
            "SUSE Manager Proxy 4.3:kernel-devel-5.14.21-150400.24.170.1.noarch",
            "SUSE Manager Proxy 4.3:kernel-macros-5.14.21-150400.24.170.1.noarch",
            "SUSE Manager Proxy 4.3:kernel-source-5.14.21-150400.24.170.1.noarch",
            "SUSE Manager Proxy 4.3:kernel-syms-5.14.21-150400.24.170.1.x86_64",
            "SUSE Manager Server 4.3:kernel-default-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Manager Server 4.3:kernel-default-5.14.21-150400.24.170.2.s390x",
            "SUSE Manager Server 4.3:kernel-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Manager Server 4.3:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.ppc64le",
            "SUSE Manager Server 4.3:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
            "SUSE Manager Server 4.3:kernel-default-devel-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Manager Server 4.3:kernel-default-devel-5.14.21-150400.24.170.2.s390x",
            "SUSE Manager Server 4.3:kernel-default-devel-5.14.21-150400.24.170.2.x86_64",
            "SUSE Manager Server 4.3:kernel-devel-5.14.21-150400.24.170.1.noarch",
            "SUSE Manager Server 4.3:kernel-macros-5.14.21-150400.24.170.1.noarch",
            "SUSE Manager Server 4.3:kernel-source-5.14.21-150400.24.170.1.noarch",
            "SUSE Manager Server 4.3:kernel-syms-5.14.21-150400.24.170.1.ppc64le",
            "SUSE Manager Server 4.3:kernel-syms-5.14.21-150400.24.170.1.s390x",
            "SUSE Manager Server 4.3:kernel-syms-5.14.21-150400.24.170.1.x86_64",
            "SUSE Manager Server 4.3:kernel-zfcpdump-5.14.21-150400.24.170.2.s390x"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 5.5,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
            "version": "3.1"
          },
          "products": [
            "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-64kb-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-64kb-devel-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-devel-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-devel-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-devel-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-docs-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-macros-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-obs-build-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-obs-build-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-source-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-syms-5.14.21-150400.24.170.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-syms-5.14.21-150400.24.170.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:reiserfs-kmp-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:reiserfs-kmp-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-64kb-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-64kb-devel-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-devel-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-docs-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-macros-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-source-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.170.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.170.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_170-default-1-150400.9.3.2.ppc64le",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_170-default-1-150400.9.3.2.s390x",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_170-default-1-150400.9.3.2.x86_64",
            "SUSE Linux Enterprise Micro 5.3:kernel-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise Micro 5.3:kernel-default-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise Micro 5.3:kernel-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Micro 5.3:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.aarch64",
            "SUSE Linux Enterprise Micro 5.3:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
            "SUSE Linux Enterprise Micro 5.4:kernel-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise Micro 5.4:kernel-default-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise Micro 5.4:kernel-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Micro 5.4:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.aarch64",
            "SUSE Linux Enterprise Micro 5.4:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-64kb-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-64kb-devel-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.aarch64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.ppc64le",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-devel-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-docs-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-macros-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-source-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.170.1.aarch64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.170.1.ppc64le",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.170.1.s390x",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.170.1.x86_64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-zfcpdump-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-devel-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-devel-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-devel-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-docs-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-macros-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-obs-build-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-obs-build-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-source-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-syms-5.14.21-150400.24.170.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-syms-5.14.21-150400.24.170.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Manager Proxy 4.3:kernel-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Manager Proxy 4.3:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
            "SUSE Manager Proxy 4.3:kernel-default-devel-5.14.21-150400.24.170.2.x86_64",
            "SUSE Manager Proxy 4.3:kernel-devel-5.14.21-150400.24.170.1.noarch",
            "SUSE Manager Proxy 4.3:kernel-macros-5.14.21-150400.24.170.1.noarch",
            "SUSE Manager Proxy 4.3:kernel-source-5.14.21-150400.24.170.1.noarch",
            "SUSE Manager Proxy 4.3:kernel-syms-5.14.21-150400.24.170.1.x86_64",
            "SUSE Manager Server 4.3:kernel-default-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Manager Server 4.3:kernel-default-5.14.21-150400.24.170.2.s390x",
            "SUSE Manager Server 4.3:kernel-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Manager Server 4.3:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.ppc64le",
            "SUSE Manager Server 4.3:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
            "SUSE Manager Server 4.3:kernel-default-devel-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Manager Server 4.3:kernel-default-devel-5.14.21-150400.24.170.2.s390x",
            "SUSE Manager Server 4.3:kernel-default-devel-5.14.21-150400.24.170.2.x86_64",
            "SUSE Manager Server 4.3:kernel-devel-5.14.21-150400.24.170.1.noarch",
            "SUSE Manager Server 4.3:kernel-macros-5.14.21-150400.24.170.1.noarch",
            "SUSE Manager Server 4.3:kernel-source-5.14.21-150400.24.170.1.noarch",
            "SUSE Manager Server 4.3:kernel-syms-5.14.21-150400.24.170.1.ppc64le",
            "SUSE Manager Server 4.3:kernel-syms-5.14.21-150400.24.170.1.s390x",
            "SUSE Manager Server 4.3:kernel-syms-5.14.21-150400.24.170.1.x86_64",
            "SUSE Manager Server 4.3:kernel-zfcpdump-5.14.21-150400.24.170.2.s390x"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2025-07-28T15:09:33Z",
          "details": "moderate"
        }
      ],
      "title": "CVE-2022-50011"
    },
    {
      "cve": "CVE-2022-50012",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2022-50012"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "In the Linux kernel, the following vulnerability has been resolved:\n\npowerpc/64: Init jump labels before parse_early_param()\n\nOn 64-bit, calling jump_label_init() in setup_feature_keys() is too\nlate because static keys may be used in subroutines of\nparse_early_param() which is again subroutine of early_init_devtree().\n\nFor example booting with \"threadirqs\":\n\n  static_key_enable_cpuslocked(): static key \u00270xc000000002953260\u0027 used before call to jump_label_init()\n  WARNING: CPU: 0 PID: 0 at kernel/jump_label.c:166 static_key_enable_cpuslocked+0xfc/0x120\n  ...\n  NIP static_key_enable_cpuslocked+0xfc/0x120\n  LR  static_key_enable_cpuslocked+0xf8/0x120\n  Call Trace:\n    static_key_enable_cpuslocked+0xf8/0x120 (unreliable)\n    static_key_enable+0x30/0x50\n    setup_forced_irqthreads+0x28/0x40\n    do_early_param+0xa0/0x108\n    parse_args+0x290/0x4e0\n    parse_early_options+0x48/0x5c\n    parse_early_param+0x58/0x84\n    early_init_devtree+0xd4/0x518\n    early_setup+0xb4/0x214\n\nSo call jump_label_init() just before parse_early_param() in\nearly_init_devtree().\n\n[mpe: Add call trace to change log and minor wording edits.]",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.170.2.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.170.2.s390x",
          "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.170.2.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.170.2.s390x",
          "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.170.2.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.170.2.s390x",
          "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.170.2.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.170.2.s390x",
          "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-64kb-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-64kb-devel-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-devel-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-devel-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-devel-5.14.21-150400.24.170.1.noarch",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-docs-5.14.21-150400.24.170.1.noarch",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-macros-5.14.21-150400.24.170.1.noarch",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-obs-build-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-obs-build-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-source-5.14.21-150400.24.170.1.noarch",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-syms-5.14.21-150400.24.170.1.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-syms-5.14.21-150400.24.170.1.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:reiserfs-kmp-default-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:reiserfs-kmp-default-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-64kb-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-64kb-devel-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-devel-5.14.21-150400.24.170.1.noarch",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-docs-5.14.21-150400.24.170.1.noarch",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-macros-5.14.21-150400.24.170.1.noarch",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-source-5.14.21-150400.24.170.1.noarch",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.170.1.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.170.1.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.170.2.ppc64le",
          "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.170.2.s390x",
          "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.170.2.ppc64le",
          "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.170.2.s390x",
          "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_170-default-1-150400.9.3.2.ppc64le",
          "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_170-default-1-150400.9.3.2.s390x",
          "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_170-default-1-150400.9.3.2.x86_64",
          "SUSE Linux Enterprise Micro 5.3:kernel-default-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise Micro 5.3:kernel-default-5.14.21-150400.24.170.2.s390x",
          "SUSE Linux Enterprise Micro 5.3:kernel-default-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise Micro 5.3:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.aarch64",
          "SUSE Linux Enterprise Micro 5.3:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
          "SUSE Linux Enterprise Micro 5.4:kernel-default-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise Micro 5.4:kernel-default-5.14.21-150400.24.170.2.s390x",
          "SUSE Linux Enterprise Micro 5.4:kernel-default-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise Micro 5.4:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.aarch64",
          "SUSE Linux Enterprise Micro 5.4:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-64kb-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-64kb-devel-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-5.14.21-150400.24.170.2.ppc64le",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-5.14.21-150400.24.170.2.s390x",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.aarch64",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.ppc64le",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.170.2.ppc64le",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.170.2.s390x",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-devel-5.14.21-150400.24.170.1.noarch",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-docs-5.14.21-150400.24.170.1.noarch",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-macros-5.14.21-150400.24.170.1.noarch",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.170.2.ppc64le",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.170.2.s390x",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-source-5.14.21-150400.24.170.1.noarch",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.170.1.aarch64",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.170.1.ppc64le",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.170.1.s390x",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.170.1.x86_64",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-zfcpdump-5.14.21-150400.24.170.2.s390x",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.170.2.ppc64le",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.170.2.s390x",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-5.14.21-150400.24.170.2.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-devel-5.14.21-150400.24.170.2.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-devel-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-devel-5.14.21-150400.24.170.1.noarch",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-docs-5.14.21-150400.24.170.1.noarch",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-macros-5.14.21-150400.24.170.1.noarch",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-obs-build-5.14.21-150400.24.170.2.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-obs-build-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-source-5.14.21-150400.24.170.1.noarch",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-syms-5.14.21-150400.24.170.1.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-syms-5.14.21-150400.24.170.1.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.170.2.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.170.2.x86_64",
          "SUSE Manager Proxy 4.3:kernel-default-5.14.21-150400.24.170.2.x86_64",
          "SUSE Manager Proxy 4.3:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
          "SUSE Manager Proxy 4.3:kernel-default-devel-5.14.21-150400.24.170.2.x86_64",
          "SUSE Manager Proxy 4.3:kernel-devel-5.14.21-150400.24.170.1.noarch",
          "SUSE Manager Proxy 4.3:kernel-macros-5.14.21-150400.24.170.1.noarch",
          "SUSE Manager Proxy 4.3:kernel-source-5.14.21-150400.24.170.1.noarch",
          "SUSE Manager Proxy 4.3:kernel-syms-5.14.21-150400.24.170.1.x86_64",
          "SUSE Manager Server 4.3:kernel-default-5.14.21-150400.24.170.2.ppc64le",
          "SUSE Manager Server 4.3:kernel-default-5.14.21-150400.24.170.2.s390x",
          "SUSE Manager Server 4.3:kernel-default-5.14.21-150400.24.170.2.x86_64",
          "SUSE Manager Server 4.3:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.ppc64le",
          "SUSE Manager Server 4.3:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
          "SUSE Manager Server 4.3:kernel-default-devel-5.14.21-150400.24.170.2.ppc64le",
          "SUSE Manager Server 4.3:kernel-default-devel-5.14.21-150400.24.170.2.s390x",
          "SUSE Manager Server 4.3:kernel-default-devel-5.14.21-150400.24.170.2.x86_64",
          "SUSE Manager Server 4.3:kernel-devel-5.14.21-150400.24.170.1.noarch",
          "SUSE Manager Server 4.3:kernel-macros-5.14.21-150400.24.170.1.noarch",
          "SUSE Manager Server 4.3:kernel-source-5.14.21-150400.24.170.1.noarch",
          "SUSE Manager Server 4.3:kernel-syms-5.14.21-150400.24.170.1.ppc64le",
          "SUSE Manager Server 4.3:kernel-syms-5.14.21-150400.24.170.1.s390x",
          "SUSE Manager Server 4.3:kernel-syms-5.14.21-150400.24.170.1.x86_64",
          "SUSE Manager Server 4.3:kernel-zfcpdump-5.14.21-150400.24.170.2.s390x"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2022-50012",
          "url": "https://www.suse.com/security/cve/CVE-2022-50012"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1245125 for CVE-2022-50012",
          "url": "https://bugzilla.suse.com/1245125"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-64kb-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-64kb-devel-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-devel-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-devel-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-devel-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-docs-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-macros-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-obs-build-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-obs-build-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-source-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-syms-5.14.21-150400.24.170.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-syms-5.14.21-150400.24.170.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:reiserfs-kmp-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:reiserfs-kmp-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-64kb-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-64kb-devel-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-devel-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-docs-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-macros-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-source-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.170.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.170.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_170-default-1-150400.9.3.2.ppc64le",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_170-default-1-150400.9.3.2.s390x",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_170-default-1-150400.9.3.2.x86_64",
            "SUSE Linux Enterprise Micro 5.3:kernel-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise Micro 5.3:kernel-default-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise Micro 5.3:kernel-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Micro 5.3:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.aarch64",
            "SUSE Linux Enterprise Micro 5.3:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
            "SUSE Linux Enterprise Micro 5.4:kernel-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise Micro 5.4:kernel-default-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise Micro 5.4:kernel-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Micro 5.4:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.aarch64",
            "SUSE Linux Enterprise Micro 5.4:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-64kb-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-64kb-devel-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.aarch64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.ppc64le",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-devel-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-docs-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-macros-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-source-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.170.1.aarch64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.170.1.ppc64le",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.170.1.s390x",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.170.1.x86_64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-zfcpdump-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-devel-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-devel-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-devel-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-docs-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-macros-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-obs-build-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-obs-build-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-source-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-syms-5.14.21-150400.24.170.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-syms-5.14.21-150400.24.170.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Manager Proxy 4.3:kernel-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Manager Proxy 4.3:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
            "SUSE Manager Proxy 4.3:kernel-default-devel-5.14.21-150400.24.170.2.x86_64",
            "SUSE Manager Proxy 4.3:kernel-devel-5.14.21-150400.24.170.1.noarch",
            "SUSE Manager Proxy 4.3:kernel-macros-5.14.21-150400.24.170.1.noarch",
            "SUSE Manager Proxy 4.3:kernel-source-5.14.21-150400.24.170.1.noarch",
            "SUSE Manager Proxy 4.3:kernel-syms-5.14.21-150400.24.170.1.x86_64",
            "SUSE Manager Server 4.3:kernel-default-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Manager Server 4.3:kernel-default-5.14.21-150400.24.170.2.s390x",
            "SUSE Manager Server 4.3:kernel-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Manager Server 4.3:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.ppc64le",
            "SUSE Manager Server 4.3:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
            "SUSE Manager Server 4.3:kernel-default-devel-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Manager Server 4.3:kernel-default-devel-5.14.21-150400.24.170.2.s390x",
            "SUSE Manager Server 4.3:kernel-default-devel-5.14.21-150400.24.170.2.x86_64",
            "SUSE Manager Server 4.3:kernel-devel-5.14.21-150400.24.170.1.noarch",
            "SUSE Manager Server 4.3:kernel-macros-5.14.21-150400.24.170.1.noarch",
            "SUSE Manager Server 4.3:kernel-source-5.14.21-150400.24.170.1.noarch",
            "SUSE Manager Server 4.3:kernel-syms-5.14.21-150400.24.170.1.ppc64le",
            "SUSE Manager Server 4.3:kernel-syms-5.14.21-150400.24.170.1.s390x",
            "SUSE Manager Server 4.3:kernel-syms-5.14.21-150400.24.170.1.x86_64",
            "SUSE Manager Server 4.3:kernel-zfcpdump-5.14.21-150400.24.170.2.s390x"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 5.5,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
            "version": "3.1"
          },
          "products": [
            "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-64kb-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-64kb-devel-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-devel-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-devel-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-devel-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-docs-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-macros-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-obs-build-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-obs-build-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-source-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-syms-5.14.21-150400.24.170.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-syms-5.14.21-150400.24.170.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:reiserfs-kmp-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:reiserfs-kmp-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-64kb-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-64kb-devel-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-devel-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-docs-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-macros-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-source-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.170.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.170.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_170-default-1-150400.9.3.2.ppc64le",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_170-default-1-150400.9.3.2.s390x",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_170-default-1-150400.9.3.2.x86_64",
            "SUSE Linux Enterprise Micro 5.3:kernel-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise Micro 5.3:kernel-default-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise Micro 5.3:kernel-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Micro 5.3:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.aarch64",
            "SUSE Linux Enterprise Micro 5.3:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
            "SUSE Linux Enterprise Micro 5.4:kernel-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise Micro 5.4:kernel-default-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise Micro 5.4:kernel-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Micro 5.4:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.aarch64",
            "SUSE Linux Enterprise Micro 5.4:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-64kb-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-64kb-devel-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.aarch64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.ppc64le",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-devel-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-docs-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-macros-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-source-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.170.1.aarch64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.170.1.ppc64le",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.170.1.s390x",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.170.1.x86_64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-zfcpdump-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-devel-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-devel-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-devel-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-docs-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-macros-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-obs-build-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-obs-build-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-source-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-syms-5.14.21-150400.24.170.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-syms-5.14.21-150400.24.170.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Manager Proxy 4.3:kernel-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Manager Proxy 4.3:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
            "SUSE Manager Proxy 4.3:kernel-default-devel-5.14.21-150400.24.170.2.x86_64",
            "SUSE Manager Proxy 4.3:kernel-devel-5.14.21-150400.24.170.1.noarch",
            "SUSE Manager Proxy 4.3:kernel-macros-5.14.21-150400.24.170.1.noarch",
            "SUSE Manager Proxy 4.3:kernel-source-5.14.21-150400.24.170.1.noarch",
            "SUSE Manager Proxy 4.3:kernel-syms-5.14.21-150400.24.170.1.x86_64",
            "SUSE Manager Server 4.3:kernel-default-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Manager Server 4.3:kernel-default-5.14.21-150400.24.170.2.s390x",
            "SUSE Manager Server 4.3:kernel-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Manager Server 4.3:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.ppc64le",
            "SUSE Manager Server 4.3:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
            "SUSE Manager Server 4.3:kernel-default-devel-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Manager Server 4.3:kernel-default-devel-5.14.21-150400.24.170.2.s390x",
            "SUSE Manager Server 4.3:kernel-default-devel-5.14.21-150400.24.170.2.x86_64",
            "SUSE Manager Server 4.3:kernel-devel-5.14.21-150400.24.170.1.noarch",
            "SUSE Manager Server 4.3:kernel-macros-5.14.21-150400.24.170.1.noarch",
            "SUSE Manager Server 4.3:kernel-source-5.14.21-150400.24.170.1.noarch",
            "SUSE Manager Server 4.3:kernel-syms-5.14.21-150400.24.170.1.ppc64le",
            "SUSE Manager Server 4.3:kernel-syms-5.14.21-150400.24.170.1.s390x",
            "SUSE Manager Server 4.3:kernel-syms-5.14.21-150400.24.170.1.x86_64",
            "SUSE Manager Server 4.3:kernel-zfcpdump-5.14.21-150400.24.170.2.s390x"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2025-07-28T15:09:33Z",
          "details": "moderate"
        }
      ],
      "title": "CVE-2022-50012"
    },
    {
      "cve": "CVE-2022-50019",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2022-50019"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "In the Linux kernel, the following vulnerability has been resolved:\n\ntty: serial: Fix refcount leak bug in ucc_uart.c\n\nIn soc_info(), of_find_node_by_type() will return a node pointer\nwith refcount incremented. We should use of_node_put() when it is\nnot used anymore.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.170.2.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.170.2.s390x",
          "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.170.2.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.170.2.s390x",
          "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.170.2.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.170.2.s390x",
          "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.170.2.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.170.2.s390x",
          "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-64kb-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-64kb-devel-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-devel-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-devel-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-devel-5.14.21-150400.24.170.1.noarch",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-docs-5.14.21-150400.24.170.1.noarch",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-macros-5.14.21-150400.24.170.1.noarch",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-obs-build-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-obs-build-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-source-5.14.21-150400.24.170.1.noarch",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-syms-5.14.21-150400.24.170.1.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-syms-5.14.21-150400.24.170.1.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:reiserfs-kmp-default-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:reiserfs-kmp-default-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-64kb-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-64kb-devel-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-devel-5.14.21-150400.24.170.1.noarch",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-docs-5.14.21-150400.24.170.1.noarch",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-macros-5.14.21-150400.24.170.1.noarch",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-source-5.14.21-150400.24.170.1.noarch",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.170.1.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.170.1.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.170.2.ppc64le",
          "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.170.2.s390x",
          "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.170.2.ppc64le",
          "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.170.2.s390x",
          "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_170-default-1-150400.9.3.2.ppc64le",
          "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_170-default-1-150400.9.3.2.s390x",
          "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_170-default-1-150400.9.3.2.x86_64",
          "SUSE Linux Enterprise Micro 5.3:kernel-default-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise Micro 5.3:kernel-default-5.14.21-150400.24.170.2.s390x",
          "SUSE Linux Enterprise Micro 5.3:kernel-default-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise Micro 5.3:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.aarch64",
          "SUSE Linux Enterprise Micro 5.3:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
          "SUSE Linux Enterprise Micro 5.4:kernel-default-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise Micro 5.4:kernel-default-5.14.21-150400.24.170.2.s390x",
          "SUSE Linux Enterprise Micro 5.4:kernel-default-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise Micro 5.4:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.aarch64",
          "SUSE Linux Enterprise Micro 5.4:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-64kb-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-64kb-devel-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-5.14.21-150400.24.170.2.ppc64le",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-5.14.21-150400.24.170.2.s390x",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.aarch64",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.ppc64le",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.170.2.ppc64le",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.170.2.s390x",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-devel-5.14.21-150400.24.170.1.noarch",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-docs-5.14.21-150400.24.170.1.noarch",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-macros-5.14.21-150400.24.170.1.noarch",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.170.2.ppc64le",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.170.2.s390x",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-source-5.14.21-150400.24.170.1.noarch",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.170.1.aarch64",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.170.1.ppc64le",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.170.1.s390x",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.170.1.x86_64",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-zfcpdump-5.14.21-150400.24.170.2.s390x",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.170.2.ppc64le",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.170.2.s390x",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-5.14.21-150400.24.170.2.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-devel-5.14.21-150400.24.170.2.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-devel-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-devel-5.14.21-150400.24.170.1.noarch",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-docs-5.14.21-150400.24.170.1.noarch",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-macros-5.14.21-150400.24.170.1.noarch",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-obs-build-5.14.21-150400.24.170.2.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-obs-build-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-source-5.14.21-150400.24.170.1.noarch",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-syms-5.14.21-150400.24.170.1.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-syms-5.14.21-150400.24.170.1.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.170.2.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.170.2.x86_64",
          "SUSE Manager Proxy 4.3:kernel-default-5.14.21-150400.24.170.2.x86_64",
          "SUSE Manager Proxy 4.3:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
          "SUSE Manager Proxy 4.3:kernel-default-devel-5.14.21-150400.24.170.2.x86_64",
          "SUSE Manager Proxy 4.3:kernel-devel-5.14.21-150400.24.170.1.noarch",
          "SUSE Manager Proxy 4.3:kernel-macros-5.14.21-150400.24.170.1.noarch",
          "SUSE Manager Proxy 4.3:kernel-source-5.14.21-150400.24.170.1.noarch",
          "SUSE Manager Proxy 4.3:kernel-syms-5.14.21-150400.24.170.1.x86_64",
          "SUSE Manager Server 4.3:kernel-default-5.14.21-150400.24.170.2.ppc64le",
          "SUSE Manager Server 4.3:kernel-default-5.14.21-150400.24.170.2.s390x",
          "SUSE Manager Server 4.3:kernel-default-5.14.21-150400.24.170.2.x86_64",
          "SUSE Manager Server 4.3:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.ppc64le",
          "SUSE Manager Server 4.3:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
          "SUSE Manager Server 4.3:kernel-default-devel-5.14.21-150400.24.170.2.ppc64le",
          "SUSE Manager Server 4.3:kernel-default-devel-5.14.21-150400.24.170.2.s390x",
          "SUSE Manager Server 4.3:kernel-default-devel-5.14.21-150400.24.170.2.x86_64",
          "SUSE Manager Server 4.3:kernel-devel-5.14.21-150400.24.170.1.noarch",
          "SUSE Manager Server 4.3:kernel-macros-5.14.21-150400.24.170.1.noarch",
          "SUSE Manager Server 4.3:kernel-source-5.14.21-150400.24.170.1.noarch",
          "SUSE Manager Server 4.3:kernel-syms-5.14.21-150400.24.170.1.ppc64le",
          "SUSE Manager Server 4.3:kernel-syms-5.14.21-150400.24.170.1.s390x",
          "SUSE Manager Server 4.3:kernel-syms-5.14.21-150400.24.170.1.x86_64",
          "SUSE Manager Server 4.3:kernel-zfcpdump-5.14.21-150400.24.170.2.s390x"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2022-50019",
          "url": "https://www.suse.com/security/cve/CVE-2022-50019"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1245098 for CVE-2022-50019",
          "url": "https://bugzilla.suse.com/1245098"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-64kb-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-64kb-devel-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-devel-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-devel-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-devel-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-docs-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-macros-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-obs-build-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-obs-build-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-source-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-syms-5.14.21-150400.24.170.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-syms-5.14.21-150400.24.170.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:reiserfs-kmp-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:reiserfs-kmp-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-64kb-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-64kb-devel-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-devel-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-docs-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-macros-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-source-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.170.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.170.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_170-default-1-150400.9.3.2.ppc64le",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_170-default-1-150400.9.3.2.s390x",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_170-default-1-150400.9.3.2.x86_64",
            "SUSE Linux Enterprise Micro 5.3:kernel-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise Micro 5.3:kernel-default-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise Micro 5.3:kernel-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Micro 5.3:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.aarch64",
            "SUSE Linux Enterprise Micro 5.3:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
            "SUSE Linux Enterprise Micro 5.4:kernel-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise Micro 5.4:kernel-default-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise Micro 5.4:kernel-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Micro 5.4:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.aarch64",
            "SUSE Linux Enterprise Micro 5.4:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-64kb-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-64kb-devel-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.aarch64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.ppc64le",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-devel-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-docs-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-macros-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-source-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.170.1.aarch64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.170.1.ppc64le",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.170.1.s390x",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.170.1.x86_64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-zfcpdump-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-devel-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-devel-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-devel-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-docs-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-macros-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-obs-build-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-obs-build-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-source-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-syms-5.14.21-150400.24.170.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-syms-5.14.21-150400.24.170.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Manager Proxy 4.3:kernel-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Manager Proxy 4.3:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
            "SUSE Manager Proxy 4.3:kernel-default-devel-5.14.21-150400.24.170.2.x86_64",
            "SUSE Manager Proxy 4.3:kernel-devel-5.14.21-150400.24.170.1.noarch",
            "SUSE Manager Proxy 4.3:kernel-macros-5.14.21-150400.24.170.1.noarch",
            "SUSE Manager Proxy 4.3:kernel-source-5.14.21-150400.24.170.1.noarch",
            "SUSE Manager Proxy 4.3:kernel-syms-5.14.21-150400.24.170.1.x86_64",
            "SUSE Manager Server 4.3:kernel-default-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Manager Server 4.3:kernel-default-5.14.21-150400.24.170.2.s390x",
            "SUSE Manager Server 4.3:kernel-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Manager Server 4.3:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.ppc64le",
            "SUSE Manager Server 4.3:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
            "SUSE Manager Server 4.3:kernel-default-devel-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Manager Server 4.3:kernel-default-devel-5.14.21-150400.24.170.2.s390x",
            "SUSE Manager Server 4.3:kernel-default-devel-5.14.21-150400.24.170.2.x86_64",
            "SUSE Manager Server 4.3:kernel-devel-5.14.21-150400.24.170.1.noarch",
            "SUSE Manager Server 4.3:kernel-macros-5.14.21-150400.24.170.1.noarch",
            "SUSE Manager Server 4.3:kernel-source-5.14.21-150400.24.170.1.noarch",
            "SUSE Manager Server 4.3:kernel-syms-5.14.21-150400.24.170.1.ppc64le",
            "SUSE Manager Server 4.3:kernel-syms-5.14.21-150400.24.170.1.s390x",
            "SUSE Manager Server 4.3:kernel-syms-5.14.21-150400.24.170.1.x86_64",
            "SUSE Manager Server 4.3:kernel-zfcpdump-5.14.21-150400.24.170.2.s390x"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 5.5,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
            "version": "3.1"
          },
          "products": [
            "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-64kb-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-64kb-devel-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-devel-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-devel-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-devel-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-docs-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-macros-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-obs-build-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-obs-build-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-source-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-syms-5.14.21-150400.24.170.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-syms-5.14.21-150400.24.170.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:reiserfs-kmp-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:reiserfs-kmp-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-64kb-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-64kb-devel-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-devel-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-docs-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-macros-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-source-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.170.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.170.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_170-default-1-150400.9.3.2.ppc64le",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_170-default-1-150400.9.3.2.s390x",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_170-default-1-150400.9.3.2.x86_64",
            "SUSE Linux Enterprise Micro 5.3:kernel-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise Micro 5.3:kernel-default-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise Micro 5.3:kernel-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Micro 5.3:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.aarch64",
            "SUSE Linux Enterprise Micro 5.3:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
            "SUSE Linux Enterprise Micro 5.4:kernel-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise Micro 5.4:kernel-default-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise Micro 5.4:kernel-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Micro 5.4:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.aarch64",
            "SUSE Linux Enterprise Micro 5.4:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-64kb-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-64kb-devel-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.aarch64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.ppc64le",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-devel-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-docs-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-macros-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-source-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.170.1.aarch64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.170.1.ppc64le",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.170.1.s390x",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.170.1.x86_64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-zfcpdump-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-devel-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-devel-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-devel-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-docs-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-macros-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-obs-build-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-obs-build-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-source-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-syms-5.14.21-150400.24.170.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-syms-5.14.21-150400.24.170.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Manager Proxy 4.3:kernel-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Manager Proxy 4.3:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
            "SUSE Manager Proxy 4.3:kernel-default-devel-5.14.21-150400.24.170.2.x86_64",
            "SUSE Manager Proxy 4.3:kernel-devel-5.14.21-150400.24.170.1.noarch",
            "SUSE Manager Proxy 4.3:kernel-macros-5.14.21-150400.24.170.1.noarch",
            "SUSE Manager Proxy 4.3:kernel-source-5.14.21-150400.24.170.1.noarch",
            "SUSE Manager Proxy 4.3:kernel-syms-5.14.21-150400.24.170.1.x86_64",
            "SUSE Manager Server 4.3:kernel-default-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Manager Server 4.3:kernel-default-5.14.21-150400.24.170.2.s390x",
            "SUSE Manager Server 4.3:kernel-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Manager Server 4.3:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.ppc64le",
            "SUSE Manager Server 4.3:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
            "SUSE Manager Server 4.3:kernel-default-devel-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Manager Server 4.3:kernel-default-devel-5.14.21-150400.24.170.2.s390x",
            "SUSE Manager Server 4.3:kernel-default-devel-5.14.21-150400.24.170.2.x86_64",
            "SUSE Manager Server 4.3:kernel-devel-5.14.21-150400.24.170.1.noarch",
            "SUSE Manager Server 4.3:kernel-macros-5.14.21-150400.24.170.1.noarch",
            "SUSE Manager Server 4.3:kernel-source-5.14.21-150400.24.170.1.noarch",
            "SUSE Manager Server 4.3:kernel-syms-5.14.21-150400.24.170.1.ppc64le",
            "SUSE Manager Server 4.3:kernel-syms-5.14.21-150400.24.170.1.s390x",
            "SUSE Manager Server 4.3:kernel-syms-5.14.21-150400.24.170.1.x86_64",
            "SUSE Manager Server 4.3:kernel-zfcpdump-5.14.21-150400.24.170.2.s390x"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2025-07-28T15:09:33Z",
          "details": "moderate"
        }
      ],
      "title": "CVE-2022-50019"
    },
    {
      "cve": "CVE-2022-50020",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2022-50020"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "In the Linux kernel, the following vulnerability has been resolved:\n\next4: avoid resizing to a partial cluster size\n\nThis patch avoids an attempt to resize the filesystem to an\nunaligned cluster boundary.  An online resize to a size that is not\nintegral to cluster size results in the last iteration attempting to\ngrow the fs by a negative amount, which trips a BUG_ON and leaves the fs\nwith a corrupted in-memory superblock.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.170.2.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.170.2.s390x",
          "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.170.2.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.170.2.s390x",
          "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.170.2.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.170.2.s390x",
          "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.170.2.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.170.2.s390x",
          "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-64kb-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-64kb-devel-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-devel-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-devel-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-devel-5.14.21-150400.24.170.1.noarch",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-docs-5.14.21-150400.24.170.1.noarch",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-macros-5.14.21-150400.24.170.1.noarch",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-obs-build-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-obs-build-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-source-5.14.21-150400.24.170.1.noarch",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-syms-5.14.21-150400.24.170.1.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-syms-5.14.21-150400.24.170.1.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:reiserfs-kmp-default-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:reiserfs-kmp-default-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-64kb-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-64kb-devel-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-devel-5.14.21-150400.24.170.1.noarch",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-docs-5.14.21-150400.24.170.1.noarch",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-macros-5.14.21-150400.24.170.1.noarch",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-source-5.14.21-150400.24.170.1.noarch",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.170.1.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.170.1.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.170.2.ppc64le",
          "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.170.2.s390x",
          "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.170.2.ppc64le",
          "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.170.2.s390x",
          "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_170-default-1-150400.9.3.2.ppc64le",
          "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_170-default-1-150400.9.3.2.s390x",
          "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_170-default-1-150400.9.3.2.x86_64",
          "SUSE Linux Enterprise Micro 5.3:kernel-default-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise Micro 5.3:kernel-default-5.14.21-150400.24.170.2.s390x",
          "SUSE Linux Enterprise Micro 5.3:kernel-default-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise Micro 5.3:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.aarch64",
          "SUSE Linux Enterprise Micro 5.3:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
          "SUSE Linux Enterprise Micro 5.4:kernel-default-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise Micro 5.4:kernel-default-5.14.21-150400.24.170.2.s390x",
          "SUSE Linux Enterprise Micro 5.4:kernel-default-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise Micro 5.4:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.aarch64",
          "SUSE Linux Enterprise Micro 5.4:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-64kb-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-64kb-devel-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-5.14.21-150400.24.170.2.ppc64le",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-5.14.21-150400.24.170.2.s390x",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.aarch64",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.ppc64le",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.170.2.ppc64le",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.170.2.s390x",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-devel-5.14.21-150400.24.170.1.noarch",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-docs-5.14.21-150400.24.170.1.noarch",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-macros-5.14.21-150400.24.170.1.noarch",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.170.2.ppc64le",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.170.2.s390x",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-source-5.14.21-150400.24.170.1.noarch",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.170.1.aarch64",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.170.1.ppc64le",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.170.1.s390x",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.170.1.x86_64",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-zfcpdump-5.14.21-150400.24.170.2.s390x",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.170.2.ppc64le",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.170.2.s390x",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-5.14.21-150400.24.170.2.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-devel-5.14.21-150400.24.170.2.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-devel-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-devel-5.14.21-150400.24.170.1.noarch",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-docs-5.14.21-150400.24.170.1.noarch",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-macros-5.14.21-150400.24.170.1.noarch",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-obs-build-5.14.21-150400.24.170.2.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-obs-build-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-source-5.14.21-150400.24.170.1.noarch",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-syms-5.14.21-150400.24.170.1.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-syms-5.14.21-150400.24.170.1.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.170.2.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.170.2.x86_64",
          "SUSE Manager Proxy 4.3:kernel-default-5.14.21-150400.24.170.2.x86_64",
          "SUSE Manager Proxy 4.3:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
          "SUSE Manager Proxy 4.3:kernel-default-devel-5.14.21-150400.24.170.2.x86_64",
          "SUSE Manager Proxy 4.3:kernel-devel-5.14.21-150400.24.170.1.noarch",
          "SUSE Manager Proxy 4.3:kernel-macros-5.14.21-150400.24.170.1.noarch",
          "SUSE Manager Proxy 4.3:kernel-source-5.14.21-150400.24.170.1.noarch",
          "SUSE Manager Proxy 4.3:kernel-syms-5.14.21-150400.24.170.1.x86_64",
          "SUSE Manager Server 4.3:kernel-default-5.14.21-150400.24.170.2.ppc64le",
          "SUSE Manager Server 4.3:kernel-default-5.14.21-150400.24.170.2.s390x",
          "SUSE Manager Server 4.3:kernel-default-5.14.21-150400.24.170.2.x86_64",
          "SUSE Manager Server 4.3:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.ppc64le",
          "SUSE Manager Server 4.3:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
          "SUSE Manager Server 4.3:kernel-default-devel-5.14.21-150400.24.170.2.ppc64le",
          "SUSE Manager Server 4.3:kernel-default-devel-5.14.21-150400.24.170.2.s390x",
          "SUSE Manager Server 4.3:kernel-default-devel-5.14.21-150400.24.170.2.x86_64",
          "SUSE Manager Server 4.3:kernel-devel-5.14.21-150400.24.170.1.noarch",
          "SUSE Manager Server 4.3:kernel-macros-5.14.21-150400.24.170.1.noarch",
          "SUSE Manager Server 4.3:kernel-source-5.14.21-150400.24.170.1.noarch",
          "SUSE Manager Server 4.3:kernel-syms-5.14.21-150400.24.170.1.ppc64le",
          "SUSE Manager Server 4.3:kernel-syms-5.14.21-150400.24.170.1.s390x",
          "SUSE Manager Server 4.3:kernel-syms-5.14.21-150400.24.170.1.x86_64",
          "SUSE Manager Server 4.3:kernel-zfcpdump-5.14.21-150400.24.170.2.s390x"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2022-50020",
          "url": "https://www.suse.com/security/cve/CVE-2022-50020"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1245129 for CVE-2022-50020",
          "url": "https://bugzilla.suse.com/1245129"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1245130 for CVE-2022-50020",
          "url": "https://bugzilla.suse.com/1245130"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-64kb-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-64kb-devel-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-devel-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-devel-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-devel-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-docs-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-macros-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-obs-build-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-obs-build-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-source-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-syms-5.14.21-150400.24.170.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-syms-5.14.21-150400.24.170.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:reiserfs-kmp-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:reiserfs-kmp-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-64kb-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-64kb-devel-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-devel-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-docs-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-macros-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-source-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.170.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.170.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_170-default-1-150400.9.3.2.ppc64le",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_170-default-1-150400.9.3.2.s390x",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_170-default-1-150400.9.3.2.x86_64",
            "SUSE Linux Enterprise Micro 5.3:kernel-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise Micro 5.3:kernel-default-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise Micro 5.3:kernel-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Micro 5.3:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.aarch64",
            "SUSE Linux Enterprise Micro 5.3:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
            "SUSE Linux Enterprise Micro 5.4:kernel-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise Micro 5.4:kernel-default-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise Micro 5.4:kernel-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Micro 5.4:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.aarch64",
            "SUSE Linux Enterprise Micro 5.4:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-64kb-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-64kb-devel-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.aarch64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.ppc64le",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-devel-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-docs-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-macros-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-source-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.170.1.aarch64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.170.1.ppc64le",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.170.1.s390x",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.170.1.x86_64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-zfcpdump-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-devel-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-devel-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-devel-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-docs-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-macros-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-obs-build-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-obs-build-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-source-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-syms-5.14.21-150400.24.170.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-syms-5.14.21-150400.24.170.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Manager Proxy 4.3:kernel-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Manager Proxy 4.3:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
            "SUSE Manager Proxy 4.3:kernel-default-devel-5.14.21-150400.24.170.2.x86_64",
            "SUSE Manager Proxy 4.3:kernel-devel-5.14.21-150400.24.170.1.noarch",
            "SUSE Manager Proxy 4.3:kernel-macros-5.14.21-150400.24.170.1.noarch",
            "SUSE Manager Proxy 4.3:kernel-source-5.14.21-150400.24.170.1.noarch",
            "SUSE Manager Proxy 4.3:kernel-syms-5.14.21-150400.24.170.1.x86_64",
            "SUSE Manager Server 4.3:kernel-default-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Manager Server 4.3:kernel-default-5.14.21-150400.24.170.2.s390x",
            "SUSE Manager Server 4.3:kernel-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Manager Server 4.3:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.ppc64le",
            "SUSE Manager Server 4.3:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
            "SUSE Manager Server 4.3:kernel-default-devel-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Manager Server 4.3:kernel-default-devel-5.14.21-150400.24.170.2.s390x",
            "SUSE Manager Server 4.3:kernel-default-devel-5.14.21-150400.24.170.2.x86_64",
            "SUSE Manager Server 4.3:kernel-devel-5.14.21-150400.24.170.1.noarch",
            "SUSE Manager Server 4.3:kernel-macros-5.14.21-150400.24.170.1.noarch",
            "SUSE Manager Server 4.3:kernel-source-5.14.21-150400.24.170.1.noarch",
            "SUSE Manager Server 4.3:kernel-syms-5.14.21-150400.24.170.1.ppc64le",
            "SUSE Manager Server 4.3:kernel-syms-5.14.21-150400.24.170.1.s390x",
            "SUSE Manager Server 4.3:kernel-syms-5.14.21-150400.24.170.1.x86_64",
            "SUSE Manager Server 4.3:kernel-zfcpdump-5.14.21-150400.24.170.2.s390x"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 6,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:H/A:H",
            "version": "3.1"
          },
          "products": [
            "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-64kb-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-64kb-devel-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-devel-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-devel-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-devel-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-docs-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-macros-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-obs-build-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-obs-build-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-source-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-syms-5.14.21-150400.24.170.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-syms-5.14.21-150400.24.170.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:reiserfs-kmp-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:reiserfs-kmp-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-64kb-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-64kb-devel-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-devel-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-docs-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-macros-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-source-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.170.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.170.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_170-default-1-150400.9.3.2.ppc64le",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_170-default-1-150400.9.3.2.s390x",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_170-default-1-150400.9.3.2.x86_64",
            "SUSE Linux Enterprise Micro 5.3:kernel-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise Micro 5.3:kernel-default-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise Micro 5.3:kernel-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Micro 5.3:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.aarch64",
            "SUSE Linux Enterprise Micro 5.3:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
            "SUSE Linux Enterprise Micro 5.4:kernel-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise Micro 5.4:kernel-default-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise Micro 5.4:kernel-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Micro 5.4:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.aarch64",
            "SUSE Linux Enterprise Micro 5.4:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-64kb-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-64kb-devel-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.aarch64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.ppc64le",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-devel-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-docs-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-macros-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-source-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.170.1.aarch64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.170.1.ppc64le",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.170.1.s390x",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.170.1.x86_64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-zfcpdump-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-devel-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-devel-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-devel-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-docs-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-macros-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-obs-build-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-obs-build-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-source-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-syms-5.14.21-150400.24.170.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-syms-5.14.21-150400.24.170.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Manager Proxy 4.3:kernel-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Manager Proxy 4.3:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
            "SUSE Manager Proxy 4.3:kernel-default-devel-5.14.21-150400.24.170.2.x86_64",
            "SUSE Manager Proxy 4.3:kernel-devel-5.14.21-150400.24.170.1.noarch",
            "SUSE Manager Proxy 4.3:kernel-macros-5.14.21-150400.24.170.1.noarch",
            "SUSE Manager Proxy 4.3:kernel-source-5.14.21-150400.24.170.1.noarch",
            "SUSE Manager Proxy 4.3:kernel-syms-5.14.21-150400.24.170.1.x86_64",
            "SUSE Manager Server 4.3:kernel-default-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Manager Server 4.3:kernel-default-5.14.21-150400.24.170.2.s390x",
            "SUSE Manager Server 4.3:kernel-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Manager Server 4.3:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.ppc64le",
            "SUSE Manager Server 4.3:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
            "SUSE Manager Server 4.3:kernel-default-devel-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Manager Server 4.3:kernel-default-devel-5.14.21-150400.24.170.2.s390x",
            "SUSE Manager Server 4.3:kernel-default-devel-5.14.21-150400.24.170.2.x86_64",
            "SUSE Manager Server 4.3:kernel-devel-5.14.21-150400.24.170.1.noarch",
            "SUSE Manager Server 4.3:kernel-macros-5.14.21-150400.24.170.1.noarch",
            "SUSE Manager Server 4.3:kernel-source-5.14.21-150400.24.170.1.noarch",
            "SUSE Manager Server 4.3:kernel-syms-5.14.21-150400.24.170.1.ppc64le",
            "SUSE Manager Server 4.3:kernel-syms-5.14.21-150400.24.170.1.s390x",
            "SUSE Manager Server 4.3:kernel-syms-5.14.21-150400.24.170.1.x86_64",
            "SUSE Manager Server 4.3:kernel-zfcpdump-5.14.21-150400.24.170.2.s390x"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2025-07-28T15:09:33Z",
          "details": "moderate"
        }
      ],
      "title": "CVE-2022-50020"
    },
    {
      "cve": "CVE-2022-50021",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2022-50021"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "In the Linux kernel, the following vulnerability has been resolved:\n\next4: block range must be validated before use in ext4_mb_clear_bb()\n\nBlock range to free is validated in ext4_free_blocks() using\next4_inode_block_valid() and then it\u0027s passed to ext4_mb_clear_bb().\nHowever in some situations on bigalloc file system the range might be\nadjusted after the validation in ext4_free_blocks() which can lead to\ntroubles on corrupted file systems such as one found by syzkaller that\nresulted in the following BUG\n\nkernel BUG at fs/ext4/ext4.h:3319!\nPREEMPT SMP NOPTI\nCPU: 28 PID: 4243 Comm: repro Kdump: loaded Not tainted 5.19.0-rc6+ #1\nHardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.15.0-1.fc35 04/01/2014\nRIP: 0010:ext4_free_blocks+0x95e/0xa90\nCall Trace:\n \u003cTASK\u003e\n ? lock_timer_base+0x61/0x80\n ? __es_remove_extent+0x5a/0x760\n ? __mod_timer+0x256/0x380\n ? ext4_ind_truncate_ensure_credits+0x90/0x220\n ext4_clear_blocks+0x107/0x1b0\n ext4_free_data+0x15b/0x170\n ext4_ind_truncate+0x214/0x2c0\n ? _raw_spin_unlock+0x15/0x30\n ? ext4_discard_preallocations+0x15a/0x410\n ? ext4_journal_check_start+0xe/0x90\n ? __ext4_journal_start_sb+0x2f/0x110\n ext4_truncate+0x1b5/0x460\n ? __ext4_journal_start_sb+0x2f/0x110\n ext4_evict_inode+0x2b4/0x6f0\n evict+0xd0/0x1d0\n ext4_enable_quotas+0x11f/0x1f0\n ext4_orphan_cleanup+0x3de/0x430\n ? proc_create_seq_private+0x43/0x50\n ext4_fill_super+0x295f/0x3ae0\n ? snprintf+0x39/0x40\n ? sget_fc+0x19c/0x330\n ? ext4_reconfigure+0x850/0x850\n get_tree_bdev+0x16d/0x260\n vfs_get_tree+0x25/0xb0\n path_mount+0x431/0xa70\n __x64_sys_mount+0xe2/0x120\n do_syscall_64+0x5b/0x80\n ? do_user_addr_fault+0x1e2/0x670\n ? exc_page_fault+0x70/0x170\n entry_SYSCALL_64_after_hwframe+0x46/0xb0\nRIP: 0033:0x7fdf4e512ace\n\nFix it by making sure that the block range is properly validated before\nused every time it changes in ext4_free_blocks() or ext4_mb_clear_bb().",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.170.2.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.170.2.s390x",
          "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.170.2.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.170.2.s390x",
          "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.170.2.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.170.2.s390x",
          "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.170.2.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.170.2.s390x",
          "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-64kb-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-64kb-devel-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-devel-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-devel-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-devel-5.14.21-150400.24.170.1.noarch",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-docs-5.14.21-150400.24.170.1.noarch",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-macros-5.14.21-150400.24.170.1.noarch",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-obs-build-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-obs-build-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-source-5.14.21-150400.24.170.1.noarch",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-syms-5.14.21-150400.24.170.1.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-syms-5.14.21-150400.24.170.1.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:reiserfs-kmp-default-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:reiserfs-kmp-default-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-64kb-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-64kb-devel-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-devel-5.14.21-150400.24.170.1.noarch",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-docs-5.14.21-150400.24.170.1.noarch",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-macros-5.14.21-150400.24.170.1.noarch",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-source-5.14.21-150400.24.170.1.noarch",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.170.1.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.170.1.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.170.2.ppc64le",
          "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.170.2.s390x",
          "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.170.2.ppc64le",
          "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.170.2.s390x",
          "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_170-default-1-150400.9.3.2.ppc64le",
          "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_170-default-1-150400.9.3.2.s390x",
          "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_170-default-1-150400.9.3.2.x86_64",
          "SUSE Linux Enterprise Micro 5.3:kernel-default-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise Micro 5.3:kernel-default-5.14.21-150400.24.170.2.s390x",
          "SUSE Linux Enterprise Micro 5.3:kernel-default-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise Micro 5.3:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.aarch64",
          "SUSE Linux Enterprise Micro 5.3:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
          "SUSE Linux Enterprise Micro 5.4:kernel-default-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise Micro 5.4:kernel-default-5.14.21-150400.24.170.2.s390x",
          "SUSE Linux Enterprise Micro 5.4:kernel-default-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise Micro 5.4:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.aarch64",
          "SUSE Linux Enterprise Micro 5.4:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-64kb-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-64kb-devel-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-5.14.21-150400.24.170.2.ppc64le",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-5.14.21-150400.24.170.2.s390x",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.aarch64",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.ppc64le",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.170.2.ppc64le",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.170.2.s390x",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-devel-5.14.21-150400.24.170.1.noarch",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-docs-5.14.21-150400.24.170.1.noarch",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-macros-5.14.21-150400.24.170.1.noarch",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.170.2.ppc64le",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.170.2.s390x",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-source-5.14.21-150400.24.170.1.noarch",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.170.1.aarch64",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.170.1.ppc64le",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.170.1.s390x",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.170.1.x86_64",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-zfcpdump-5.14.21-150400.24.170.2.s390x",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.170.2.ppc64le",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.170.2.s390x",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-5.14.21-150400.24.170.2.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-devel-5.14.21-150400.24.170.2.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-devel-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-devel-5.14.21-150400.24.170.1.noarch",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-docs-5.14.21-150400.24.170.1.noarch",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-macros-5.14.21-150400.24.170.1.noarch",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-obs-build-5.14.21-150400.24.170.2.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-obs-build-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-source-5.14.21-150400.24.170.1.noarch",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-syms-5.14.21-150400.24.170.1.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-syms-5.14.21-150400.24.170.1.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.170.2.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.170.2.x86_64",
          "SUSE Manager Proxy 4.3:kernel-default-5.14.21-150400.24.170.2.x86_64",
          "SUSE Manager Proxy 4.3:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
          "SUSE Manager Proxy 4.3:kernel-default-devel-5.14.21-150400.24.170.2.x86_64",
          "SUSE Manager Proxy 4.3:kernel-devel-5.14.21-150400.24.170.1.noarch",
          "SUSE Manager Proxy 4.3:kernel-macros-5.14.21-150400.24.170.1.noarch",
          "SUSE Manager Proxy 4.3:kernel-source-5.14.21-150400.24.170.1.noarch",
          "SUSE Manager Proxy 4.3:kernel-syms-5.14.21-150400.24.170.1.x86_64",
          "SUSE Manager Server 4.3:kernel-default-5.14.21-150400.24.170.2.ppc64le",
          "SUSE Manager Server 4.3:kernel-default-5.14.21-150400.24.170.2.s390x",
          "SUSE Manager Server 4.3:kernel-default-5.14.21-150400.24.170.2.x86_64",
          "SUSE Manager Server 4.3:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.ppc64le",
          "SUSE Manager Server 4.3:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
          "SUSE Manager Server 4.3:kernel-default-devel-5.14.21-150400.24.170.2.ppc64le",
          "SUSE Manager Server 4.3:kernel-default-devel-5.14.21-150400.24.170.2.s390x",
          "SUSE Manager Server 4.3:kernel-default-devel-5.14.21-150400.24.170.2.x86_64",
          "SUSE Manager Server 4.3:kernel-devel-5.14.21-150400.24.170.1.noarch",
          "SUSE Manager Server 4.3:kernel-macros-5.14.21-150400.24.170.1.noarch",
          "SUSE Manager Server 4.3:kernel-source-5.14.21-150400.24.170.1.noarch",
          "SUSE Manager Server 4.3:kernel-syms-5.14.21-150400.24.170.1.ppc64le",
          "SUSE Manager Server 4.3:kernel-syms-5.14.21-150400.24.170.1.s390x",
          "SUSE Manager Server 4.3:kernel-syms-5.14.21-150400.24.170.1.x86_64",
          "SUSE Manager Server 4.3:kernel-zfcpdump-5.14.21-150400.24.170.2.s390x"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2022-50021",
          "url": "https://www.suse.com/security/cve/CVE-2022-50021"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1245180 for CVE-2022-50021",
          "url": "https://bugzilla.suse.com/1245180"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-64kb-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-64kb-devel-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-devel-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-devel-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-devel-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-docs-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-macros-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-obs-build-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-obs-build-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-source-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-syms-5.14.21-150400.24.170.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-syms-5.14.21-150400.24.170.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:reiserfs-kmp-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:reiserfs-kmp-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-64kb-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-64kb-devel-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-devel-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-docs-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-macros-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-source-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.170.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.170.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_170-default-1-150400.9.3.2.ppc64le",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_170-default-1-150400.9.3.2.s390x",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_170-default-1-150400.9.3.2.x86_64",
            "SUSE Linux Enterprise Micro 5.3:kernel-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise Micro 5.3:kernel-default-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise Micro 5.3:kernel-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Micro 5.3:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.aarch64",
            "SUSE Linux Enterprise Micro 5.3:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
            "SUSE Linux Enterprise Micro 5.4:kernel-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise Micro 5.4:kernel-default-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise Micro 5.4:kernel-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Micro 5.4:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.aarch64",
            "SUSE Linux Enterprise Micro 5.4:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-64kb-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-64kb-devel-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.aarch64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.ppc64le",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-devel-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-docs-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-macros-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-source-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.170.1.aarch64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.170.1.ppc64le",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.170.1.s390x",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.170.1.x86_64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-zfcpdump-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-devel-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-devel-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-devel-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-docs-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-macros-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-obs-build-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-obs-build-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-source-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-syms-5.14.21-150400.24.170.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-syms-5.14.21-150400.24.170.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Manager Proxy 4.3:kernel-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Manager Proxy 4.3:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
            "SUSE Manager Proxy 4.3:kernel-default-devel-5.14.21-150400.24.170.2.x86_64",
            "SUSE Manager Proxy 4.3:kernel-devel-5.14.21-150400.24.170.1.noarch",
            "SUSE Manager Proxy 4.3:kernel-macros-5.14.21-150400.24.170.1.noarch",
            "SUSE Manager Proxy 4.3:kernel-source-5.14.21-150400.24.170.1.noarch",
            "SUSE Manager Proxy 4.3:kernel-syms-5.14.21-150400.24.170.1.x86_64",
            "SUSE Manager Server 4.3:kernel-default-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Manager Server 4.3:kernel-default-5.14.21-150400.24.170.2.s390x",
            "SUSE Manager Server 4.3:kernel-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Manager Server 4.3:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.ppc64le",
            "SUSE Manager Server 4.3:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
            "SUSE Manager Server 4.3:kernel-default-devel-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Manager Server 4.3:kernel-default-devel-5.14.21-150400.24.170.2.s390x",
            "SUSE Manager Server 4.3:kernel-default-devel-5.14.21-150400.24.170.2.x86_64",
            "SUSE Manager Server 4.3:kernel-devel-5.14.21-150400.24.170.1.noarch",
            "SUSE Manager Server 4.3:kernel-macros-5.14.21-150400.24.170.1.noarch",
            "SUSE Manager Server 4.3:kernel-source-5.14.21-150400.24.170.1.noarch",
            "SUSE Manager Server 4.3:kernel-syms-5.14.21-150400.24.170.1.ppc64le",
            "SUSE Manager Server 4.3:kernel-syms-5.14.21-150400.24.170.1.s390x",
            "SUSE Manager Server 4.3:kernel-syms-5.14.21-150400.24.170.1.x86_64",
            "SUSE Manager Server 4.3:kernel-zfcpdump-5.14.21-150400.24.170.2.s390x"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 6.1,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:H",
            "version": "3.1"
          },
          "products": [
            "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-64kb-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-64kb-devel-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-devel-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-devel-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-devel-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-docs-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-macros-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-obs-build-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-obs-build-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-source-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-syms-5.14.21-150400.24.170.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-syms-5.14.21-150400.24.170.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:reiserfs-kmp-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:reiserfs-kmp-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-64kb-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-64kb-devel-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-devel-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-docs-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-macros-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-source-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.170.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.170.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_170-default-1-150400.9.3.2.ppc64le",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_170-default-1-150400.9.3.2.s390x",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_170-default-1-150400.9.3.2.x86_64",
            "SUSE Linux Enterprise Micro 5.3:kernel-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise Micro 5.3:kernel-default-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise Micro 5.3:kernel-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Micro 5.3:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.aarch64",
            "SUSE Linux Enterprise Micro 5.3:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
            "SUSE Linux Enterprise Micro 5.4:kernel-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise Micro 5.4:kernel-default-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise Micro 5.4:kernel-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Micro 5.4:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.aarch64",
            "SUSE Linux Enterprise Micro 5.4:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-64kb-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-64kb-devel-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.aarch64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.ppc64le",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-devel-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-docs-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-macros-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-source-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.170.1.aarch64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.170.1.ppc64le",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.170.1.s390x",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.170.1.x86_64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-zfcpdump-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-devel-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-devel-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-devel-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-docs-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-macros-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-obs-build-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-obs-build-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-source-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-syms-5.14.21-150400.24.170.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-syms-5.14.21-150400.24.170.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Manager Proxy 4.3:kernel-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Manager Proxy 4.3:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
            "SUSE Manager Proxy 4.3:kernel-default-devel-5.14.21-150400.24.170.2.x86_64",
            "SUSE Manager Proxy 4.3:kernel-devel-5.14.21-150400.24.170.1.noarch",
            "SUSE Manager Proxy 4.3:kernel-macros-5.14.21-150400.24.170.1.noarch",
            "SUSE Manager Proxy 4.3:kernel-source-5.14.21-150400.24.170.1.noarch",
            "SUSE Manager Proxy 4.3:kernel-syms-5.14.21-150400.24.170.1.x86_64",
            "SUSE Manager Server 4.3:kernel-default-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Manager Server 4.3:kernel-default-5.14.21-150400.24.170.2.s390x",
            "SUSE Manager Server 4.3:kernel-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Manager Server 4.3:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.ppc64le",
            "SUSE Manager Server 4.3:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
            "SUSE Manager Server 4.3:kernel-default-devel-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Manager Server 4.3:kernel-default-devel-5.14.21-150400.24.170.2.s390x",
            "SUSE Manager Server 4.3:kernel-default-devel-5.14.21-150400.24.170.2.x86_64",
            "SUSE Manager Server 4.3:kernel-devel-5.14.21-150400.24.170.1.noarch",
            "SUSE Manager Server 4.3:kernel-macros-5.14.21-150400.24.170.1.noarch",
            "SUSE Manager Server 4.3:kernel-source-5.14.21-150400.24.170.1.noarch",
            "SUSE Manager Server 4.3:kernel-syms-5.14.21-150400.24.170.1.ppc64le",
            "SUSE Manager Server 4.3:kernel-syms-5.14.21-150400.24.170.1.s390x",
            "SUSE Manager Server 4.3:kernel-syms-5.14.21-150400.24.170.1.x86_64",
            "SUSE Manager Server 4.3:kernel-zfcpdump-5.14.21-150400.24.170.2.s390x"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2025-07-28T15:09:33Z",
          "details": "moderate"
        }
      ],
      "title": "CVE-2022-50021"
    },
    {
      "cve": "CVE-2022-50022",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2022-50022"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "In the Linux kernel, the following vulnerability has been resolved:\n\ndrivers:md:fix a potential use-after-free bug\n\nIn line 2884, \"raid5_release_stripe(sh);\" drops the reference to sh and\nmay cause sh to be released. However, sh is subsequently used in lines\n2886 \"if (sh-\u003ebatch_head \u0026\u0026 sh != sh-\u003ebatch_head)\". This may result in an\nuse-after-free bug.\n\nIt can be fixed by moving \"raid5_release_stripe(sh);\" to the bottom of\nthe function.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.170.2.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.170.2.s390x",
          "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.170.2.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.170.2.s390x",
          "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.170.2.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.170.2.s390x",
          "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.170.2.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.170.2.s390x",
          "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-64kb-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-64kb-devel-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-devel-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-devel-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-devel-5.14.21-150400.24.170.1.noarch",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-docs-5.14.21-150400.24.170.1.noarch",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-macros-5.14.21-150400.24.170.1.noarch",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-obs-build-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-obs-build-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-source-5.14.21-150400.24.170.1.noarch",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-syms-5.14.21-150400.24.170.1.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-syms-5.14.21-150400.24.170.1.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:reiserfs-kmp-default-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:reiserfs-kmp-default-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-64kb-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-64kb-devel-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-devel-5.14.21-150400.24.170.1.noarch",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-docs-5.14.21-150400.24.170.1.noarch",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-macros-5.14.21-150400.24.170.1.noarch",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-source-5.14.21-150400.24.170.1.noarch",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.170.1.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.170.1.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.170.2.ppc64le",
          "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.170.2.s390x",
          "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.170.2.ppc64le",
          "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.170.2.s390x",
          "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_170-default-1-150400.9.3.2.ppc64le",
          "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_170-default-1-150400.9.3.2.s390x",
          "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_170-default-1-150400.9.3.2.x86_64",
          "SUSE Linux Enterprise Micro 5.3:kernel-default-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise Micro 5.3:kernel-default-5.14.21-150400.24.170.2.s390x",
          "SUSE Linux Enterprise Micro 5.3:kernel-default-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise Micro 5.3:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.aarch64",
          "SUSE Linux Enterprise Micro 5.3:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
          "SUSE Linux Enterprise Micro 5.4:kernel-default-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise Micro 5.4:kernel-default-5.14.21-150400.24.170.2.s390x",
          "SUSE Linux Enterprise Micro 5.4:kernel-default-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise Micro 5.4:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.aarch64",
          "SUSE Linux Enterprise Micro 5.4:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-64kb-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-64kb-devel-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-5.14.21-150400.24.170.2.ppc64le",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-5.14.21-150400.24.170.2.s390x",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.aarch64",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.ppc64le",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.170.2.ppc64le",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.170.2.s390x",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-devel-5.14.21-150400.24.170.1.noarch",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-docs-5.14.21-150400.24.170.1.noarch",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-macros-5.14.21-150400.24.170.1.noarch",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.170.2.ppc64le",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.170.2.s390x",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-source-5.14.21-150400.24.170.1.noarch",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.170.1.aarch64",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.170.1.ppc64le",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.170.1.s390x",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.170.1.x86_64",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-zfcpdump-5.14.21-150400.24.170.2.s390x",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.170.2.ppc64le",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.170.2.s390x",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-5.14.21-150400.24.170.2.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-devel-5.14.21-150400.24.170.2.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-devel-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-devel-5.14.21-150400.24.170.1.noarch",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-docs-5.14.21-150400.24.170.1.noarch",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-macros-5.14.21-150400.24.170.1.noarch",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-obs-build-5.14.21-150400.24.170.2.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-obs-build-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-source-5.14.21-150400.24.170.1.noarch",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-syms-5.14.21-150400.24.170.1.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-syms-5.14.21-150400.24.170.1.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.170.2.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.170.2.x86_64",
          "SUSE Manager Proxy 4.3:kernel-default-5.14.21-150400.24.170.2.x86_64",
          "SUSE Manager Proxy 4.3:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
          "SUSE Manager Proxy 4.3:kernel-default-devel-5.14.21-150400.24.170.2.x86_64",
          "SUSE Manager Proxy 4.3:kernel-devel-5.14.21-150400.24.170.1.noarch",
          "SUSE Manager Proxy 4.3:kernel-macros-5.14.21-150400.24.170.1.noarch",
          "SUSE Manager Proxy 4.3:kernel-source-5.14.21-150400.24.170.1.noarch",
          "SUSE Manager Proxy 4.3:kernel-syms-5.14.21-150400.24.170.1.x86_64",
          "SUSE Manager Server 4.3:kernel-default-5.14.21-150400.24.170.2.ppc64le",
          "SUSE Manager Server 4.3:kernel-default-5.14.21-150400.24.170.2.s390x",
          "SUSE Manager Server 4.3:kernel-default-5.14.21-150400.24.170.2.x86_64",
          "SUSE Manager Server 4.3:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.ppc64le",
          "SUSE Manager Server 4.3:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
          "SUSE Manager Server 4.3:kernel-default-devel-5.14.21-150400.24.170.2.ppc64le",
          "SUSE Manager Server 4.3:kernel-default-devel-5.14.21-150400.24.170.2.s390x",
          "SUSE Manager Server 4.3:kernel-default-devel-5.14.21-150400.24.170.2.x86_64",
          "SUSE Manager Server 4.3:kernel-devel-5.14.21-150400.24.170.1.noarch",
          "SUSE Manager Server 4.3:kernel-macros-5.14.21-150400.24.170.1.noarch",
          "SUSE Manager Server 4.3:kernel-source-5.14.21-150400.24.170.1.noarch",
          "SUSE Manager Server 4.3:kernel-syms-5.14.21-150400.24.170.1.ppc64le",
          "SUSE Manager Server 4.3:kernel-syms-5.14.21-150400.24.170.1.s390x",
          "SUSE Manager Server 4.3:kernel-syms-5.14.21-150400.24.170.1.x86_64",
          "SUSE Manager Server 4.3:kernel-zfcpdump-5.14.21-150400.24.170.2.s390x"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2022-50022",
          "url": "https://www.suse.com/security/cve/CVE-2022-50022"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1245131 for CVE-2022-50022",
          "url": "https://bugzilla.suse.com/1245131"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-64kb-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-64kb-devel-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-devel-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-devel-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-devel-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-docs-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-macros-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-obs-build-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-obs-build-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-source-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-syms-5.14.21-150400.24.170.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-syms-5.14.21-150400.24.170.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:reiserfs-kmp-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:reiserfs-kmp-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-64kb-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-64kb-devel-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-devel-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-docs-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-macros-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-source-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.170.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.170.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_170-default-1-150400.9.3.2.ppc64le",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_170-default-1-150400.9.3.2.s390x",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_170-default-1-150400.9.3.2.x86_64",
            "SUSE Linux Enterprise Micro 5.3:kernel-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise Micro 5.3:kernel-default-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise Micro 5.3:kernel-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Micro 5.3:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.aarch64",
            "SUSE Linux Enterprise Micro 5.3:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
            "SUSE Linux Enterprise Micro 5.4:kernel-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise Micro 5.4:kernel-default-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise Micro 5.4:kernel-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Micro 5.4:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.aarch64",
            "SUSE Linux Enterprise Micro 5.4:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-64kb-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-64kb-devel-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.aarch64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.ppc64le",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-devel-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-docs-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-macros-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-source-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.170.1.aarch64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.170.1.ppc64le",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.170.1.s390x",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.170.1.x86_64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-zfcpdump-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-devel-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-devel-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-devel-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-docs-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-macros-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-obs-build-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-obs-build-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-source-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-syms-5.14.21-150400.24.170.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-syms-5.14.21-150400.24.170.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Manager Proxy 4.3:kernel-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Manager Proxy 4.3:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
            "SUSE Manager Proxy 4.3:kernel-default-devel-5.14.21-150400.24.170.2.x86_64",
            "SUSE Manager Proxy 4.3:kernel-devel-5.14.21-150400.24.170.1.noarch",
            "SUSE Manager Proxy 4.3:kernel-macros-5.14.21-150400.24.170.1.noarch",
            "SUSE Manager Proxy 4.3:kernel-source-5.14.21-150400.24.170.1.noarch",
            "SUSE Manager Proxy 4.3:kernel-syms-5.14.21-150400.24.170.1.x86_64",
            "SUSE Manager Server 4.3:kernel-default-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Manager Server 4.3:kernel-default-5.14.21-150400.24.170.2.s390x",
            "SUSE Manager Server 4.3:kernel-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Manager Server 4.3:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.ppc64le",
            "SUSE Manager Server 4.3:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
            "SUSE Manager Server 4.3:kernel-default-devel-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Manager Server 4.3:kernel-default-devel-5.14.21-150400.24.170.2.s390x",
            "SUSE Manager Server 4.3:kernel-default-devel-5.14.21-150400.24.170.2.x86_64",
            "SUSE Manager Server 4.3:kernel-devel-5.14.21-150400.24.170.1.noarch",
            "SUSE Manager Server 4.3:kernel-macros-5.14.21-150400.24.170.1.noarch",
            "SUSE Manager Server 4.3:kernel-source-5.14.21-150400.24.170.1.noarch",
            "SUSE Manager Server 4.3:kernel-syms-5.14.21-150400.24.170.1.ppc64le",
            "SUSE Manager Server 4.3:kernel-syms-5.14.21-150400.24.170.1.s390x",
            "SUSE Manager Server 4.3:kernel-syms-5.14.21-150400.24.170.1.x86_64",
            "SUSE Manager Server 4.3:kernel-zfcpdump-5.14.21-150400.24.170.2.s390x"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 6.6,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:H",
            "version": "3.1"
          },
          "products": [
            "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-64kb-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-64kb-devel-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-devel-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-devel-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-devel-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-docs-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-macros-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-obs-build-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-obs-build-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-source-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-syms-5.14.21-150400.24.170.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-syms-5.14.21-150400.24.170.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:reiserfs-kmp-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:reiserfs-kmp-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-64kb-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-64kb-devel-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-devel-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-docs-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-macros-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-source-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.170.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.170.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_170-default-1-150400.9.3.2.ppc64le",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_170-default-1-150400.9.3.2.s390x",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_170-default-1-150400.9.3.2.x86_64",
            "SUSE Linux Enterprise Micro 5.3:kernel-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise Micro 5.3:kernel-default-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise Micro 5.3:kernel-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Micro 5.3:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.aarch64",
            "SUSE Linux Enterprise Micro 5.3:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
            "SUSE Linux Enterprise Micro 5.4:kernel-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise Micro 5.4:kernel-default-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise Micro 5.4:kernel-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Micro 5.4:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.aarch64",
            "SUSE Linux Enterprise Micro 5.4:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-64kb-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-64kb-devel-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.aarch64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.ppc64le",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-devel-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-docs-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-macros-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-source-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.170.1.aarch64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.170.1.ppc64le",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.170.1.s390x",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.170.1.x86_64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-zfcpdump-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-devel-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-devel-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-devel-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-docs-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-macros-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-obs-build-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-obs-build-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-source-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-syms-5.14.21-150400.24.170.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-syms-5.14.21-150400.24.170.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Manager Proxy 4.3:kernel-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Manager Proxy 4.3:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
            "SUSE Manager Proxy 4.3:kernel-default-devel-5.14.21-150400.24.170.2.x86_64",
            "SUSE Manager Proxy 4.3:kernel-devel-5.14.21-150400.24.170.1.noarch",
            "SUSE Manager Proxy 4.3:kernel-macros-5.14.21-150400.24.170.1.noarch",
            "SUSE Manager Proxy 4.3:kernel-source-5.14.21-150400.24.170.1.noarch",
            "SUSE Manager Proxy 4.3:kernel-syms-5.14.21-150400.24.170.1.x86_64",
            "SUSE Manager Server 4.3:kernel-default-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Manager Server 4.3:kernel-default-5.14.21-150400.24.170.2.s390x",
            "SUSE Manager Server 4.3:kernel-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Manager Server 4.3:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.ppc64le",
            "SUSE Manager Server 4.3:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
            "SUSE Manager Server 4.3:kernel-default-devel-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Manager Server 4.3:kernel-default-devel-5.14.21-150400.24.170.2.s390x",
            "SUSE Manager Server 4.3:kernel-default-devel-5.14.21-150400.24.170.2.x86_64",
            "SUSE Manager Server 4.3:kernel-devel-5.14.21-150400.24.170.1.noarch",
            "SUSE Manager Server 4.3:kernel-macros-5.14.21-150400.24.170.1.noarch",
            "SUSE Manager Server 4.3:kernel-source-5.14.21-150400.24.170.1.noarch",
            "SUSE Manager Server 4.3:kernel-syms-5.14.21-150400.24.170.1.ppc64le",
            "SUSE Manager Server 4.3:kernel-syms-5.14.21-150400.24.170.1.s390x",
            "SUSE Manager Server 4.3:kernel-syms-5.14.21-150400.24.170.1.x86_64",
            "SUSE Manager Server 4.3:kernel-zfcpdump-5.14.21-150400.24.170.2.s390x"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2025-07-28T15:09:33Z",
          "details": "moderate"
        }
      ],
      "title": "CVE-2022-50022"
    },
    {
      "cve": "CVE-2022-50023",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2022-50023"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "In the Linux kernel, the following vulnerability has been resolved:\n\ndmaengine: dw-axi-dmac: ignore interrupt if no descriptor\n\nIf the channel has no descriptor and the interrupt is raised then the\nkernel will OOPS. Check the result of vchan_next_desc() in the handler\naxi_chan_block_xfer_complete() to avoid the error happening.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.170.2.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.170.2.s390x",
          "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.170.2.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.170.2.s390x",
          "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.170.2.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.170.2.s390x",
          "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.170.2.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.170.2.s390x",
          "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-64kb-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-64kb-devel-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-devel-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-devel-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-devel-5.14.21-150400.24.170.1.noarch",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-docs-5.14.21-150400.24.170.1.noarch",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-macros-5.14.21-150400.24.170.1.noarch",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-obs-build-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-obs-build-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-source-5.14.21-150400.24.170.1.noarch",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-syms-5.14.21-150400.24.170.1.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-syms-5.14.21-150400.24.170.1.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:reiserfs-kmp-default-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:reiserfs-kmp-default-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-64kb-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-64kb-devel-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-devel-5.14.21-150400.24.170.1.noarch",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-docs-5.14.21-150400.24.170.1.noarch",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-macros-5.14.21-150400.24.170.1.noarch",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-source-5.14.21-150400.24.170.1.noarch",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.170.1.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.170.1.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.170.2.ppc64le",
          "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.170.2.s390x",
          "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.170.2.ppc64le",
          "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.170.2.s390x",
          "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_170-default-1-150400.9.3.2.ppc64le",
          "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_170-default-1-150400.9.3.2.s390x",
          "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_170-default-1-150400.9.3.2.x86_64",
          "SUSE Linux Enterprise Micro 5.3:kernel-default-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise Micro 5.3:kernel-default-5.14.21-150400.24.170.2.s390x",
          "SUSE Linux Enterprise Micro 5.3:kernel-default-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise Micro 5.3:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.aarch64",
          "SUSE Linux Enterprise Micro 5.3:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
          "SUSE Linux Enterprise Micro 5.4:kernel-default-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise Micro 5.4:kernel-default-5.14.21-150400.24.170.2.s390x",
          "SUSE Linux Enterprise Micro 5.4:kernel-default-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise Micro 5.4:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.aarch64",
          "SUSE Linux Enterprise Micro 5.4:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-64kb-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-64kb-devel-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-5.14.21-150400.24.170.2.ppc64le",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-5.14.21-150400.24.170.2.s390x",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.aarch64",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.ppc64le",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.170.2.ppc64le",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.170.2.s390x",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-devel-5.14.21-150400.24.170.1.noarch",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-docs-5.14.21-150400.24.170.1.noarch",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-macros-5.14.21-150400.24.170.1.noarch",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.170.2.ppc64le",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.170.2.s390x",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-source-5.14.21-150400.24.170.1.noarch",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.170.1.aarch64",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.170.1.ppc64le",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.170.1.s390x",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.170.1.x86_64",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-zfcpdump-5.14.21-150400.24.170.2.s390x",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.170.2.ppc64le",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.170.2.s390x",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-5.14.21-150400.24.170.2.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-devel-5.14.21-150400.24.170.2.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-devel-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-devel-5.14.21-150400.24.170.1.noarch",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-docs-5.14.21-150400.24.170.1.noarch",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-macros-5.14.21-150400.24.170.1.noarch",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-obs-build-5.14.21-150400.24.170.2.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-obs-build-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-source-5.14.21-150400.24.170.1.noarch",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-syms-5.14.21-150400.24.170.1.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-syms-5.14.21-150400.24.170.1.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.170.2.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.170.2.x86_64",
          "SUSE Manager Proxy 4.3:kernel-default-5.14.21-150400.24.170.2.x86_64",
          "SUSE Manager Proxy 4.3:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
          "SUSE Manager Proxy 4.3:kernel-default-devel-5.14.21-150400.24.170.2.x86_64",
          "SUSE Manager Proxy 4.3:kernel-devel-5.14.21-150400.24.170.1.noarch",
          "SUSE Manager Proxy 4.3:kernel-macros-5.14.21-150400.24.170.1.noarch",
          "SUSE Manager Proxy 4.3:kernel-source-5.14.21-150400.24.170.1.noarch",
          "SUSE Manager Proxy 4.3:kernel-syms-5.14.21-150400.24.170.1.x86_64",
          "SUSE Manager Server 4.3:kernel-default-5.14.21-150400.24.170.2.ppc64le",
          "SUSE Manager Server 4.3:kernel-default-5.14.21-150400.24.170.2.s390x",
          "SUSE Manager Server 4.3:kernel-default-5.14.21-150400.24.170.2.x86_64",
          "SUSE Manager Server 4.3:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.ppc64le",
          "SUSE Manager Server 4.3:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
          "SUSE Manager Server 4.3:kernel-default-devel-5.14.21-150400.24.170.2.ppc64le",
          "SUSE Manager Server 4.3:kernel-default-devel-5.14.21-150400.24.170.2.s390x",
          "SUSE Manager Server 4.3:kernel-default-devel-5.14.21-150400.24.170.2.x86_64",
          "SUSE Manager Server 4.3:kernel-devel-5.14.21-150400.24.170.1.noarch",
          "SUSE Manager Server 4.3:kernel-macros-5.14.21-150400.24.170.1.noarch",
          "SUSE Manager Server 4.3:kernel-source-5.14.21-150400.24.170.1.noarch",
          "SUSE Manager Server 4.3:kernel-syms-5.14.21-150400.24.170.1.ppc64le",
          "SUSE Manager Server 4.3:kernel-syms-5.14.21-150400.24.170.1.s390x",
          "SUSE Manager Server 4.3:kernel-syms-5.14.21-150400.24.170.1.x86_64",
          "SUSE Manager Server 4.3:kernel-zfcpdump-5.14.21-150400.24.170.2.s390x"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2022-50023",
          "url": "https://www.suse.com/security/cve/CVE-2022-50023"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1245134 for CVE-2022-50023",
          "url": "https://bugzilla.suse.com/1245134"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-64kb-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-64kb-devel-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-devel-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-devel-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-devel-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-docs-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-macros-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-obs-build-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-obs-build-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-source-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-syms-5.14.21-150400.24.170.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-syms-5.14.21-150400.24.170.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:reiserfs-kmp-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:reiserfs-kmp-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-64kb-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-64kb-devel-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-devel-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-docs-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-macros-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-source-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.170.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.170.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_170-default-1-150400.9.3.2.ppc64le",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_170-default-1-150400.9.3.2.s390x",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_170-default-1-150400.9.3.2.x86_64",
            "SUSE Linux Enterprise Micro 5.3:kernel-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise Micro 5.3:kernel-default-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise Micro 5.3:kernel-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Micro 5.3:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.aarch64",
            "SUSE Linux Enterprise Micro 5.3:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
            "SUSE Linux Enterprise Micro 5.4:kernel-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise Micro 5.4:kernel-default-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise Micro 5.4:kernel-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Micro 5.4:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.aarch64",
            "SUSE Linux Enterprise Micro 5.4:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-64kb-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-64kb-devel-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.aarch64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.ppc64le",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-devel-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-docs-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-macros-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-source-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.170.1.aarch64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.170.1.ppc64le",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.170.1.s390x",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.170.1.x86_64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-zfcpdump-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-devel-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-devel-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-devel-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-docs-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-macros-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-obs-build-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-obs-build-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-source-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-syms-5.14.21-150400.24.170.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-syms-5.14.21-150400.24.170.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Manager Proxy 4.3:kernel-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Manager Proxy 4.3:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
            "SUSE Manager Proxy 4.3:kernel-default-devel-5.14.21-150400.24.170.2.x86_64",
            "SUSE Manager Proxy 4.3:kernel-devel-5.14.21-150400.24.170.1.noarch",
            "SUSE Manager Proxy 4.3:kernel-macros-5.14.21-150400.24.170.1.noarch",
            "SUSE Manager Proxy 4.3:kernel-source-5.14.21-150400.24.170.1.noarch",
            "SUSE Manager Proxy 4.3:kernel-syms-5.14.21-150400.24.170.1.x86_64",
            "SUSE Manager Server 4.3:kernel-default-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Manager Server 4.3:kernel-default-5.14.21-150400.24.170.2.s390x",
            "SUSE Manager Server 4.3:kernel-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Manager Server 4.3:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.ppc64le",
            "SUSE Manager Server 4.3:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
            "SUSE Manager Server 4.3:kernel-default-devel-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Manager Server 4.3:kernel-default-devel-5.14.21-150400.24.170.2.s390x",
            "SUSE Manager Server 4.3:kernel-default-devel-5.14.21-150400.24.170.2.x86_64",
            "SUSE Manager Server 4.3:kernel-devel-5.14.21-150400.24.170.1.noarch",
            "SUSE Manager Server 4.3:kernel-macros-5.14.21-150400.24.170.1.noarch",
            "SUSE Manager Server 4.3:kernel-source-5.14.21-150400.24.170.1.noarch",
            "SUSE Manager Server 4.3:kernel-syms-5.14.21-150400.24.170.1.ppc64le",
            "SUSE Manager Server 4.3:kernel-syms-5.14.21-150400.24.170.1.s390x",
            "SUSE Manager Server 4.3:kernel-syms-5.14.21-150400.24.170.1.x86_64",
            "SUSE Manager Server 4.3:kernel-zfcpdump-5.14.21-150400.24.170.2.s390x"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 5.5,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
            "version": "3.1"
          },
          "products": [
            "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-64kb-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-64kb-devel-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-devel-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-devel-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-devel-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-docs-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-macros-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-obs-build-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-obs-build-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-source-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-syms-5.14.21-150400.24.170.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-syms-5.14.21-150400.24.170.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:reiserfs-kmp-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:reiserfs-kmp-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-64kb-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-64kb-devel-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-devel-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-docs-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-macros-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-source-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.170.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.170.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_170-default-1-150400.9.3.2.ppc64le",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_170-default-1-150400.9.3.2.s390x",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_170-default-1-150400.9.3.2.x86_64",
            "SUSE Linux Enterprise Micro 5.3:kernel-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise Micro 5.3:kernel-default-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise Micro 5.3:kernel-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Micro 5.3:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.aarch64",
            "SUSE Linux Enterprise Micro 5.3:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
            "SUSE Linux Enterprise Micro 5.4:kernel-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise Micro 5.4:kernel-default-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise Micro 5.4:kernel-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Micro 5.4:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.aarch64",
            "SUSE Linux Enterprise Micro 5.4:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-64kb-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-64kb-devel-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.aarch64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.ppc64le",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-devel-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-docs-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-macros-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-source-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.170.1.aarch64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.170.1.ppc64le",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.170.1.s390x",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.170.1.x86_64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-zfcpdump-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-devel-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-devel-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-devel-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-docs-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-macros-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-obs-build-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-obs-build-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-source-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-syms-5.14.21-150400.24.170.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-syms-5.14.21-150400.24.170.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Manager Proxy 4.3:kernel-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Manager Proxy 4.3:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
            "SUSE Manager Proxy 4.3:kernel-default-devel-5.14.21-150400.24.170.2.x86_64",
            "SUSE Manager Proxy 4.3:kernel-devel-5.14.21-150400.24.170.1.noarch",
            "SUSE Manager Proxy 4.3:kernel-macros-5.14.21-150400.24.170.1.noarch",
            "SUSE Manager Proxy 4.3:kernel-source-5.14.21-150400.24.170.1.noarch",
            "SUSE Manager Proxy 4.3:kernel-syms-5.14.21-150400.24.170.1.x86_64",
            "SUSE Manager Server 4.3:kernel-default-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Manager Server 4.3:kernel-default-5.14.21-150400.24.170.2.s390x",
            "SUSE Manager Server 4.3:kernel-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Manager Server 4.3:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.ppc64le",
            "SUSE Manager Server 4.3:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
            "SUSE Manager Server 4.3:kernel-default-devel-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Manager Server 4.3:kernel-default-devel-5.14.21-150400.24.170.2.s390x",
            "SUSE Manager Server 4.3:kernel-default-devel-5.14.21-150400.24.170.2.x86_64",
            "SUSE Manager Server 4.3:kernel-devel-5.14.21-150400.24.170.1.noarch",
            "SUSE Manager Server 4.3:kernel-macros-5.14.21-150400.24.170.1.noarch",
            "SUSE Manager Server 4.3:kernel-source-5.14.21-150400.24.170.1.noarch",
            "SUSE Manager Server 4.3:kernel-syms-5.14.21-150400.24.170.1.ppc64le",
            "SUSE Manager Server 4.3:kernel-syms-5.14.21-150400.24.170.1.s390x",
            "SUSE Manager Server 4.3:kernel-syms-5.14.21-150400.24.170.1.x86_64",
            "SUSE Manager Server 4.3:kernel-zfcpdump-5.14.21-150400.24.170.2.s390x"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2025-07-28T15:09:33Z",
          "details": "moderate"
        }
      ],
      "title": "CVE-2022-50023"
    },
    {
      "cve": "CVE-2022-50024",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2022-50024"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "In the Linux kernel, the following vulnerability has been resolved:\n\ndmaengine: dw-axi-dmac: do not print NULL LLI during error\n\nDuring debugging we have seen an issue where axi_chan_dump_lli()\nis passed a NULL LLI pointer which ends up causing an OOPS due\nto trying to get fields from it. Simply print NULL LLI and exit\nto avoid this.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.170.2.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.170.2.s390x",
          "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.170.2.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.170.2.s390x",
          "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.170.2.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.170.2.s390x",
          "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.170.2.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.170.2.s390x",
          "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-64kb-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-64kb-devel-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-devel-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-devel-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-devel-5.14.21-150400.24.170.1.noarch",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-docs-5.14.21-150400.24.170.1.noarch",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-macros-5.14.21-150400.24.170.1.noarch",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-obs-build-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-obs-build-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-source-5.14.21-150400.24.170.1.noarch",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-syms-5.14.21-150400.24.170.1.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-syms-5.14.21-150400.24.170.1.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:reiserfs-kmp-default-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:reiserfs-kmp-default-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-64kb-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-64kb-devel-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-devel-5.14.21-150400.24.170.1.noarch",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-docs-5.14.21-150400.24.170.1.noarch",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-macros-5.14.21-150400.24.170.1.noarch",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-source-5.14.21-150400.24.170.1.noarch",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.170.1.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.170.1.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.170.2.ppc64le",
          "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.170.2.s390x",
          "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.170.2.ppc64le",
          "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.170.2.s390x",
          "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_170-default-1-150400.9.3.2.ppc64le",
          "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_170-default-1-150400.9.3.2.s390x",
          "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_170-default-1-150400.9.3.2.x86_64",
          "SUSE Linux Enterprise Micro 5.3:kernel-default-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise Micro 5.3:kernel-default-5.14.21-150400.24.170.2.s390x",
          "SUSE Linux Enterprise Micro 5.3:kernel-default-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise Micro 5.3:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.aarch64",
          "SUSE Linux Enterprise Micro 5.3:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
          "SUSE Linux Enterprise Micro 5.4:kernel-default-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise Micro 5.4:kernel-default-5.14.21-150400.24.170.2.s390x",
          "SUSE Linux Enterprise Micro 5.4:kernel-default-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise Micro 5.4:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.aarch64",
          "SUSE Linux Enterprise Micro 5.4:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-64kb-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-64kb-devel-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-5.14.21-150400.24.170.2.ppc64le",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-5.14.21-150400.24.170.2.s390x",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.aarch64",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.ppc64le",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.170.2.ppc64le",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.170.2.s390x",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-devel-5.14.21-150400.24.170.1.noarch",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-docs-5.14.21-150400.24.170.1.noarch",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-macros-5.14.21-150400.24.170.1.noarch",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.170.2.ppc64le",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.170.2.s390x",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-source-5.14.21-150400.24.170.1.noarch",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.170.1.aarch64",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.170.1.ppc64le",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.170.1.s390x",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.170.1.x86_64",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-zfcpdump-5.14.21-150400.24.170.2.s390x",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.170.2.ppc64le",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.170.2.s390x",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-5.14.21-150400.24.170.2.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-devel-5.14.21-150400.24.170.2.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-devel-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-devel-5.14.21-150400.24.170.1.noarch",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-docs-5.14.21-150400.24.170.1.noarch",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-macros-5.14.21-150400.24.170.1.noarch",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-obs-build-5.14.21-150400.24.170.2.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-obs-build-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-source-5.14.21-150400.24.170.1.noarch",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-syms-5.14.21-150400.24.170.1.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-syms-5.14.21-150400.24.170.1.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.170.2.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.170.2.x86_64",
          "SUSE Manager Proxy 4.3:kernel-default-5.14.21-150400.24.170.2.x86_64",
          "SUSE Manager Proxy 4.3:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
          "SUSE Manager Proxy 4.3:kernel-default-devel-5.14.21-150400.24.170.2.x86_64",
          "SUSE Manager Proxy 4.3:kernel-devel-5.14.21-150400.24.170.1.noarch",
          "SUSE Manager Proxy 4.3:kernel-macros-5.14.21-150400.24.170.1.noarch",
          "SUSE Manager Proxy 4.3:kernel-source-5.14.21-150400.24.170.1.noarch",
          "SUSE Manager Proxy 4.3:kernel-syms-5.14.21-150400.24.170.1.x86_64",
          "SUSE Manager Server 4.3:kernel-default-5.14.21-150400.24.170.2.ppc64le",
          "SUSE Manager Server 4.3:kernel-default-5.14.21-150400.24.170.2.s390x",
          "SUSE Manager Server 4.3:kernel-default-5.14.21-150400.24.170.2.x86_64",
          "SUSE Manager Server 4.3:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.ppc64le",
          "SUSE Manager Server 4.3:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
          "SUSE Manager Server 4.3:kernel-default-devel-5.14.21-150400.24.170.2.ppc64le",
          "SUSE Manager Server 4.3:kernel-default-devel-5.14.21-150400.24.170.2.s390x",
          "SUSE Manager Server 4.3:kernel-default-devel-5.14.21-150400.24.170.2.x86_64",
          "SUSE Manager Server 4.3:kernel-devel-5.14.21-150400.24.170.1.noarch",
          "SUSE Manager Server 4.3:kernel-macros-5.14.21-150400.24.170.1.noarch",
          "SUSE Manager Server 4.3:kernel-source-5.14.21-150400.24.170.1.noarch",
          "SUSE Manager Server 4.3:kernel-syms-5.14.21-150400.24.170.1.ppc64le",
          "SUSE Manager Server 4.3:kernel-syms-5.14.21-150400.24.170.1.s390x",
          "SUSE Manager Server 4.3:kernel-syms-5.14.21-150400.24.170.1.x86_64",
          "SUSE Manager Server 4.3:kernel-zfcpdump-5.14.21-150400.24.170.2.s390x"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2022-50024",
          "url": "https://www.suse.com/security/cve/CVE-2022-50024"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1245133 for CVE-2022-50024",
          "url": "https://bugzilla.suse.com/1245133"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-64kb-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-64kb-devel-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-devel-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-devel-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-devel-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-docs-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-macros-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-obs-build-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-obs-build-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-source-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-syms-5.14.21-150400.24.170.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-syms-5.14.21-150400.24.170.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:reiserfs-kmp-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:reiserfs-kmp-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-64kb-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-64kb-devel-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-devel-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-docs-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-macros-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-source-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.170.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.170.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_170-default-1-150400.9.3.2.ppc64le",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_170-default-1-150400.9.3.2.s390x",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_170-default-1-150400.9.3.2.x86_64",
            "SUSE Linux Enterprise Micro 5.3:kernel-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise Micro 5.3:kernel-default-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise Micro 5.3:kernel-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Micro 5.3:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.aarch64",
            "SUSE Linux Enterprise Micro 5.3:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
            "SUSE Linux Enterprise Micro 5.4:kernel-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise Micro 5.4:kernel-default-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise Micro 5.4:kernel-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Micro 5.4:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.aarch64",
            "SUSE Linux Enterprise Micro 5.4:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-64kb-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-64kb-devel-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.aarch64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.ppc64le",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-devel-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-docs-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-macros-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-source-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.170.1.aarch64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.170.1.ppc64le",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.170.1.s390x",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.170.1.x86_64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-zfcpdump-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-devel-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-devel-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-devel-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-docs-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-macros-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-obs-build-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-obs-build-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-source-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-syms-5.14.21-150400.24.170.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-syms-5.14.21-150400.24.170.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Manager Proxy 4.3:kernel-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Manager Proxy 4.3:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
            "SUSE Manager Proxy 4.3:kernel-default-devel-5.14.21-150400.24.170.2.x86_64",
            "SUSE Manager Proxy 4.3:kernel-devel-5.14.21-150400.24.170.1.noarch",
            "SUSE Manager Proxy 4.3:kernel-macros-5.14.21-150400.24.170.1.noarch",
            "SUSE Manager Proxy 4.3:kernel-source-5.14.21-150400.24.170.1.noarch",
            "SUSE Manager Proxy 4.3:kernel-syms-5.14.21-150400.24.170.1.x86_64",
            "SUSE Manager Server 4.3:kernel-default-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Manager Server 4.3:kernel-default-5.14.21-150400.24.170.2.s390x",
            "SUSE Manager Server 4.3:kernel-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Manager Server 4.3:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.ppc64le",
            "SUSE Manager Server 4.3:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
            "SUSE Manager Server 4.3:kernel-default-devel-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Manager Server 4.3:kernel-default-devel-5.14.21-150400.24.170.2.s390x",
            "SUSE Manager Server 4.3:kernel-default-devel-5.14.21-150400.24.170.2.x86_64",
            "SUSE Manager Server 4.3:kernel-devel-5.14.21-150400.24.170.1.noarch",
            "SUSE Manager Server 4.3:kernel-macros-5.14.21-150400.24.170.1.noarch",
            "SUSE Manager Server 4.3:kernel-source-5.14.21-150400.24.170.1.noarch",
            "SUSE Manager Server 4.3:kernel-syms-5.14.21-150400.24.170.1.ppc64le",
            "SUSE Manager Server 4.3:kernel-syms-5.14.21-150400.24.170.1.s390x",
            "SUSE Manager Server 4.3:kernel-syms-5.14.21-150400.24.170.1.x86_64",
            "SUSE Manager Server 4.3:kernel-zfcpdump-5.14.21-150400.24.170.2.s390x"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 5.5,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
            "version": "3.1"
          },
          "products": [
            "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-64kb-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-64kb-devel-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-devel-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-devel-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-devel-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-docs-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-macros-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-obs-build-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-obs-build-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-source-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-syms-5.14.21-150400.24.170.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-syms-5.14.21-150400.24.170.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:reiserfs-kmp-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:reiserfs-kmp-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-64kb-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-64kb-devel-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-devel-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-docs-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-macros-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-source-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.170.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.170.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_170-default-1-150400.9.3.2.ppc64le",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_170-default-1-150400.9.3.2.s390x",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_170-default-1-150400.9.3.2.x86_64",
            "SUSE Linux Enterprise Micro 5.3:kernel-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise Micro 5.3:kernel-default-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise Micro 5.3:kernel-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Micro 5.3:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.aarch64",
            "SUSE Linux Enterprise Micro 5.3:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
            "SUSE Linux Enterprise Micro 5.4:kernel-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise Micro 5.4:kernel-default-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise Micro 5.4:kernel-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Micro 5.4:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.aarch64",
            "SUSE Linux Enterprise Micro 5.4:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-64kb-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-64kb-devel-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.aarch64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.ppc64le",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-devel-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-docs-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-macros-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-source-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.170.1.aarch64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.170.1.ppc64le",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.170.1.s390x",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.170.1.x86_64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-zfcpdump-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-devel-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-devel-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-devel-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-docs-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-macros-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-obs-build-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-obs-build-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-source-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-syms-5.14.21-150400.24.170.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-syms-5.14.21-150400.24.170.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Manager Proxy 4.3:kernel-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Manager Proxy 4.3:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
            "SUSE Manager Proxy 4.3:kernel-default-devel-5.14.21-150400.24.170.2.x86_64",
            "SUSE Manager Proxy 4.3:kernel-devel-5.14.21-150400.24.170.1.noarch",
            "SUSE Manager Proxy 4.3:kernel-macros-5.14.21-150400.24.170.1.noarch",
            "SUSE Manager Proxy 4.3:kernel-source-5.14.21-150400.24.170.1.noarch",
            "SUSE Manager Proxy 4.3:kernel-syms-5.14.21-150400.24.170.1.x86_64",
            "SUSE Manager Server 4.3:kernel-default-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Manager Server 4.3:kernel-default-5.14.21-150400.24.170.2.s390x",
            "SUSE Manager Server 4.3:kernel-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Manager Server 4.3:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.ppc64le",
            "SUSE Manager Server 4.3:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
            "SUSE Manager Server 4.3:kernel-default-devel-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Manager Server 4.3:kernel-default-devel-5.14.21-150400.24.170.2.s390x",
            "SUSE Manager Server 4.3:kernel-default-devel-5.14.21-150400.24.170.2.x86_64",
            "SUSE Manager Server 4.3:kernel-devel-5.14.21-150400.24.170.1.noarch",
            "SUSE Manager Server 4.3:kernel-macros-5.14.21-150400.24.170.1.noarch",
            "SUSE Manager Server 4.3:kernel-source-5.14.21-150400.24.170.1.noarch",
            "SUSE Manager Server 4.3:kernel-syms-5.14.21-150400.24.170.1.ppc64le",
            "SUSE Manager Server 4.3:kernel-syms-5.14.21-150400.24.170.1.s390x",
            "SUSE Manager Server 4.3:kernel-syms-5.14.21-150400.24.170.1.x86_64",
            "SUSE Manager Server 4.3:kernel-zfcpdump-5.14.21-150400.24.170.2.s390x"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2025-07-28T15:09:33Z",
          "details": "moderate"
        }
      ],
      "title": "CVE-2022-50024"
    },
    {
      "cve": "CVE-2022-50026",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2022-50026"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "In the Linux kernel, the following vulnerability has been resolved:\n\nhabanalabs/gaudi: fix shift out of bounds\n\nWhen validating NIC queues, queue offset calculation must be\nperformed only for NIC queues.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.170.2.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.170.2.s390x",
          "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.170.2.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.170.2.s390x",
          "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.170.2.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.170.2.s390x",
          "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.170.2.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.170.2.s390x",
          "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-64kb-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-64kb-devel-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-devel-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-devel-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-devel-5.14.21-150400.24.170.1.noarch",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-docs-5.14.21-150400.24.170.1.noarch",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-macros-5.14.21-150400.24.170.1.noarch",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-obs-build-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-obs-build-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-source-5.14.21-150400.24.170.1.noarch",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-syms-5.14.21-150400.24.170.1.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-syms-5.14.21-150400.24.170.1.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:reiserfs-kmp-default-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:reiserfs-kmp-default-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-64kb-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-64kb-devel-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-devel-5.14.21-150400.24.170.1.noarch",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-docs-5.14.21-150400.24.170.1.noarch",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-macros-5.14.21-150400.24.170.1.noarch",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-source-5.14.21-150400.24.170.1.noarch",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.170.1.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.170.1.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.170.2.ppc64le",
          "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.170.2.s390x",
          "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.170.2.ppc64le",
          "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.170.2.s390x",
          "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_170-default-1-150400.9.3.2.ppc64le",
          "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_170-default-1-150400.9.3.2.s390x",
          "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_170-default-1-150400.9.3.2.x86_64",
          "SUSE Linux Enterprise Micro 5.3:kernel-default-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise Micro 5.3:kernel-default-5.14.21-150400.24.170.2.s390x",
          "SUSE Linux Enterprise Micro 5.3:kernel-default-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise Micro 5.3:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.aarch64",
          "SUSE Linux Enterprise Micro 5.3:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
          "SUSE Linux Enterprise Micro 5.4:kernel-default-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise Micro 5.4:kernel-default-5.14.21-150400.24.170.2.s390x",
          "SUSE Linux Enterprise Micro 5.4:kernel-default-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise Micro 5.4:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.aarch64",
          "SUSE Linux Enterprise Micro 5.4:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-64kb-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-64kb-devel-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-5.14.21-150400.24.170.2.ppc64le",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-5.14.21-150400.24.170.2.s390x",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.aarch64",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.ppc64le",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.170.2.ppc64le",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.170.2.s390x",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-devel-5.14.21-150400.24.170.1.noarch",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-docs-5.14.21-150400.24.170.1.noarch",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-macros-5.14.21-150400.24.170.1.noarch",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.170.2.ppc64le",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.170.2.s390x",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-source-5.14.21-150400.24.170.1.noarch",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.170.1.aarch64",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.170.1.ppc64le",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.170.1.s390x",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.170.1.x86_64",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-zfcpdump-5.14.21-150400.24.170.2.s390x",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.170.2.ppc64le",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.170.2.s390x",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-5.14.21-150400.24.170.2.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-devel-5.14.21-150400.24.170.2.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-devel-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-devel-5.14.21-150400.24.170.1.noarch",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-docs-5.14.21-150400.24.170.1.noarch",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-macros-5.14.21-150400.24.170.1.noarch",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-obs-build-5.14.21-150400.24.170.2.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-obs-build-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-source-5.14.21-150400.24.170.1.noarch",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-syms-5.14.21-150400.24.170.1.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-syms-5.14.21-150400.24.170.1.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.170.2.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.170.2.x86_64",
          "SUSE Manager Proxy 4.3:kernel-default-5.14.21-150400.24.170.2.x86_64",
          "SUSE Manager Proxy 4.3:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
          "SUSE Manager Proxy 4.3:kernel-default-devel-5.14.21-150400.24.170.2.x86_64",
          "SUSE Manager Proxy 4.3:kernel-devel-5.14.21-150400.24.170.1.noarch",
          "SUSE Manager Proxy 4.3:kernel-macros-5.14.21-150400.24.170.1.noarch",
          "SUSE Manager Proxy 4.3:kernel-source-5.14.21-150400.24.170.1.noarch",
          "SUSE Manager Proxy 4.3:kernel-syms-5.14.21-150400.24.170.1.x86_64",
          "SUSE Manager Server 4.3:kernel-default-5.14.21-150400.24.170.2.ppc64le",
          "SUSE Manager Server 4.3:kernel-default-5.14.21-150400.24.170.2.s390x",
          "SUSE Manager Server 4.3:kernel-default-5.14.21-150400.24.170.2.x86_64",
          "SUSE Manager Server 4.3:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.ppc64le",
          "SUSE Manager Server 4.3:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
          "SUSE Manager Server 4.3:kernel-default-devel-5.14.21-150400.24.170.2.ppc64le",
          "SUSE Manager Server 4.3:kernel-default-devel-5.14.21-150400.24.170.2.s390x",
          "SUSE Manager Server 4.3:kernel-default-devel-5.14.21-150400.24.170.2.x86_64",
          "SUSE Manager Server 4.3:kernel-devel-5.14.21-150400.24.170.1.noarch",
          "SUSE Manager Server 4.3:kernel-macros-5.14.21-150400.24.170.1.noarch",
          "SUSE Manager Server 4.3:kernel-source-5.14.21-150400.24.170.1.noarch",
          "SUSE Manager Server 4.3:kernel-syms-5.14.21-150400.24.170.1.ppc64le",
          "SUSE Manager Server 4.3:kernel-syms-5.14.21-150400.24.170.1.s390x",
          "SUSE Manager Server 4.3:kernel-syms-5.14.21-150400.24.170.1.x86_64",
          "SUSE Manager Server 4.3:kernel-zfcpdump-5.14.21-150400.24.170.2.s390x"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2022-50026",
          "url": "https://www.suse.com/security/cve/CVE-2022-50026"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1245088 for CVE-2022-50026",
          "url": "https://bugzilla.suse.com/1245088"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-64kb-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-64kb-devel-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-devel-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-devel-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-devel-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-docs-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-macros-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-obs-build-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-obs-build-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-source-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-syms-5.14.21-150400.24.170.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-syms-5.14.21-150400.24.170.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:reiserfs-kmp-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:reiserfs-kmp-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-64kb-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-64kb-devel-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-devel-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-docs-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-macros-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-source-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.170.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.170.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_170-default-1-150400.9.3.2.ppc64le",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_170-default-1-150400.9.3.2.s390x",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_170-default-1-150400.9.3.2.x86_64",
            "SUSE Linux Enterprise Micro 5.3:kernel-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise Micro 5.3:kernel-default-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise Micro 5.3:kernel-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Micro 5.3:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.aarch64",
            "SUSE Linux Enterprise Micro 5.3:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
            "SUSE Linux Enterprise Micro 5.4:kernel-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise Micro 5.4:kernel-default-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise Micro 5.4:kernel-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Micro 5.4:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.aarch64",
            "SUSE Linux Enterprise Micro 5.4:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-64kb-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-64kb-devel-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.aarch64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.ppc64le",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-devel-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-docs-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-macros-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-source-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.170.1.aarch64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.170.1.ppc64le",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.170.1.s390x",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.170.1.x86_64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-zfcpdump-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-devel-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-devel-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-devel-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-docs-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-macros-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-obs-build-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-obs-build-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-source-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-syms-5.14.21-150400.24.170.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-syms-5.14.21-150400.24.170.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Manager Proxy 4.3:kernel-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Manager Proxy 4.3:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
            "SUSE Manager Proxy 4.3:kernel-default-devel-5.14.21-150400.24.170.2.x86_64",
            "SUSE Manager Proxy 4.3:kernel-devel-5.14.21-150400.24.170.1.noarch",
            "SUSE Manager Proxy 4.3:kernel-macros-5.14.21-150400.24.170.1.noarch",
            "SUSE Manager Proxy 4.3:kernel-source-5.14.21-150400.24.170.1.noarch",
            "SUSE Manager Proxy 4.3:kernel-syms-5.14.21-150400.24.170.1.x86_64",
            "SUSE Manager Server 4.3:kernel-default-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Manager Server 4.3:kernel-default-5.14.21-150400.24.170.2.s390x",
            "SUSE Manager Server 4.3:kernel-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Manager Server 4.3:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.ppc64le",
            "SUSE Manager Server 4.3:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
            "SUSE Manager Server 4.3:kernel-default-devel-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Manager Server 4.3:kernel-default-devel-5.14.21-150400.24.170.2.s390x",
            "SUSE Manager Server 4.3:kernel-default-devel-5.14.21-150400.24.170.2.x86_64",
            "SUSE Manager Server 4.3:kernel-devel-5.14.21-150400.24.170.1.noarch",
            "SUSE Manager Server 4.3:kernel-macros-5.14.21-150400.24.170.1.noarch",
            "SUSE Manager Server 4.3:kernel-source-5.14.21-150400.24.170.1.noarch",
            "SUSE Manager Server 4.3:kernel-syms-5.14.21-150400.24.170.1.ppc64le",
            "SUSE Manager Server 4.3:kernel-syms-5.14.21-150400.24.170.1.s390x",
            "SUSE Manager Server 4.3:kernel-syms-5.14.21-150400.24.170.1.x86_64",
            "SUSE Manager Server 4.3:kernel-zfcpdump-5.14.21-150400.24.170.2.s390x"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 5.5,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
            "version": "3.1"
          },
          "products": [
            "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-64kb-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-64kb-devel-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-devel-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-devel-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-devel-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-docs-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-macros-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-obs-build-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-obs-build-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-source-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-syms-5.14.21-150400.24.170.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-syms-5.14.21-150400.24.170.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:reiserfs-kmp-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:reiserfs-kmp-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-64kb-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-64kb-devel-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-devel-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-docs-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-macros-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-source-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.170.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.170.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_170-default-1-150400.9.3.2.ppc64le",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_170-default-1-150400.9.3.2.s390x",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_170-default-1-150400.9.3.2.x86_64",
            "SUSE Linux Enterprise Micro 5.3:kernel-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise Micro 5.3:kernel-default-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise Micro 5.3:kernel-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Micro 5.3:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.aarch64",
            "SUSE Linux Enterprise Micro 5.3:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
            "SUSE Linux Enterprise Micro 5.4:kernel-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise Micro 5.4:kernel-default-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise Micro 5.4:kernel-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Micro 5.4:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.aarch64",
            "SUSE Linux Enterprise Micro 5.4:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-64kb-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-64kb-devel-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.aarch64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.ppc64le",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-devel-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-docs-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-macros-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-source-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.170.1.aarch64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.170.1.ppc64le",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.170.1.s390x",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.170.1.x86_64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-zfcpdump-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-devel-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-devel-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-devel-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-docs-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-macros-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-obs-build-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-obs-build-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-source-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-syms-5.14.21-150400.24.170.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-syms-5.14.21-150400.24.170.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Manager Proxy 4.3:kernel-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Manager Proxy 4.3:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
            "SUSE Manager Proxy 4.3:kernel-default-devel-5.14.21-150400.24.170.2.x86_64",
            "SUSE Manager Proxy 4.3:kernel-devel-5.14.21-150400.24.170.1.noarch",
            "SUSE Manager Proxy 4.3:kernel-macros-5.14.21-150400.24.170.1.noarch",
            "SUSE Manager Proxy 4.3:kernel-source-5.14.21-150400.24.170.1.noarch",
            "SUSE Manager Proxy 4.3:kernel-syms-5.14.21-150400.24.170.1.x86_64",
            "SUSE Manager Server 4.3:kernel-default-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Manager Server 4.3:kernel-default-5.14.21-150400.24.170.2.s390x",
            "SUSE Manager Server 4.3:kernel-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Manager Server 4.3:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.ppc64le",
            "SUSE Manager Server 4.3:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
            "SUSE Manager Server 4.3:kernel-default-devel-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Manager Server 4.3:kernel-default-devel-5.14.21-150400.24.170.2.s390x",
            "SUSE Manager Server 4.3:kernel-default-devel-5.14.21-150400.24.170.2.x86_64",
            "SUSE Manager Server 4.3:kernel-devel-5.14.21-150400.24.170.1.noarch",
            "SUSE Manager Server 4.3:kernel-macros-5.14.21-150400.24.170.1.noarch",
            "SUSE Manager Server 4.3:kernel-source-5.14.21-150400.24.170.1.noarch",
            "SUSE Manager Server 4.3:kernel-syms-5.14.21-150400.24.170.1.ppc64le",
            "SUSE Manager Server 4.3:kernel-syms-5.14.21-150400.24.170.1.s390x",
            "SUSE Manager Server 4.3:kernel-syms-5.14.21-150400.24.170.1.x86_64",
            "SUSE Manager Server 4.3:kernel-zfcpdump-5.14.21-150400.24.170.2.s390x"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2025-07-28T15:09:33Z",
          "details": "moderate"
        }
      ],
      "title": "CVE-2022-50026"
    },
    {
      "cve": "CVE-2022-50027",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2022-50027"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "In the Linux kernel, the following vulnerability has been resolved:\n\nscsi: lpfc: Fix possible memory leak when failing to issue CMF WQE\n\nThere is no corresponding free routine if lpfc_sli4_issue_wqe fails to\nissue the CMF WQE in lpfc_issue_cmf_sync_wqe.\n\nIf ret_val is non-zero, then free the iocbq request structure.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.170.2.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.170.2.s390x",
          "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.170.2.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.170.2.s390x",
          "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.170.2.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.170.2.s390x",
          "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.170.2.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.170.2.s390x",
          "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-64kb-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-64kb-devel-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-devel-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-devel-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-devel-5.14.21-150400.24.170.1.noarch",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-docs-5.14.21-150400.24.170.1.noarch",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-macros-5.14.21-150400.24.170.1.noarch",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-obs-build-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-obs-build-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-source-5.14.21-150400.24.170.1.noarch",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-syms-5.14.21-150400.24.170.1.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-syms-5.14.21-150400.24.170.1.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:reiserfs-kmp-default-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:reiserfs-kmp-default-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-64kb-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-64kb-devel-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-devel-5.14.21-150400.24.170.1.noarch",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-docs-5.14.21-150400.24.170.1.noarch",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-macros-5.14.21-150400.24.170.1.noarch",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-source-5.14.21-150400.24.170.1.noarch",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.170.1.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.170.1.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.170.2.ppc64le",
          "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.170.2.s390x",
          "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.170.2.ppc64le",
          "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.170.2.s390x",
          "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_170-default-1-150400.9.3.2.ppc64le",
          "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_170-default-1-150400.9.3.2.s390x",
          "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_170-default-1-150400.9.3.2.x86_64",
          "SUSE Linux Enterprise Micro 5.3:kernel-default-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise Micro 5.3:kernel-default-5.14.21-150400.24.170.2.s390x",
          "SUSE Linux Enterprise Micro 5.3:kernel-default-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise Micro 5.3:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.aarch64",
          "SUSE Linux Enterprise Micro 5.3:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
          "SUSE Linux Enterprise Micro 5.4:kernel-default-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise Micro 5.4:kernel-default-5.14.21-150400.24.170.2.s390x",
          "SUSE Linux Enterprise Micro 5.4:kernel-default-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise Micro 5.4:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.aarch64",
          "SUSE Linux Enterprise Micro 5.4:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-64kb-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-64kb-devel-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-5.14.21-150400.24.170.2.ppc64le",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-5.14.21-150400.24.170.2.s390x",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.aarch64",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.ppc64le",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.170.2.ppc64le",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.170.2.s390x",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-devel-5.14.21-150400.24.170.1.noarch",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-docs-5.14.21-150400.24.170.1.noarch",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-macros-5.14.21-150400.24.170.1.noarch",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.170.2.ppc64le",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.170.2.s390x",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-source-5.14.21-150400.24.170.1.noarch",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.170.1.aarch64",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.170.1.ppc64le",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.170.1.s390x",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.170.1.x86_64",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-zfcpdump-5.14.21-150400.24.170.2.s390x",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.170.2.ppc64le",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.170.2.s390x",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-5.14.21-150400.24.170.2.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-devel-5.14.21-150400.24.170.2.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-devel-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-devel-5.14.21-150400.24.170.1.noarch",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-docs-5.14.21-150400.24.170.1.noarch",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-macros-5.14.21-150400.24.170.1.noarch",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-obs-build-5.14.21-150400.24.170.2.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-obs-build-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-source-5.14.21-150400.24.170.1.noarch",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-syms-5.14.21-150400.24.170.1.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-syms-5.14.21-150400.24.170.1.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.170.2.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.170.2.x86_64",
          "SUSE Manager Proxy 4.3:kernel-default-5.14.21-150400.24.170.2.x86_64",
          "SUSE Manager Proxy 4.3:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
          "SUSE Manager Proxy 4.3:kernel-default-devel-5.14.21-150400.24.170.2.x86_64",
          "SUSE Manager Proxy 4.3:kernel-devel-5.14.21-150400.24.170.1.noarch",
          "SUSE Manager Proxy 4.3:kernel-macros-5.14.21-150400.24.170.1.noarch",
          "SUSE Manager Proxy 4.3:kernel-source-5.14.21-150400.24.170.1.noarch",
          "SUSE Manager Proxy 4.3:kernel-syms-5.14.21-150400.24.170.1.x86_64",
          "SUSE Manager Server 4.3:kernel-default-5.14.21-150400.24.170.2.ppc64le",
          "SUSE Manager Server 4.3:kernel-default-5.14.21-150400.24.170.2.s390x",
          "SUSE Manager Server 4.3:kernel-default-5.14.21-150400.24.170.2.x86_64",
          "SUSE Manager Server 4.3:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.ppc64le",
          "SUSE Manager Server 4.3:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
          "SUSE Manager Server 4.3:kernel-default-devel-5.14.21-150400.24.170.2.ppc64le",
          "SUSE Manager Server 4.3:kernel-default-devel-5.14.21-150400.24.170.2.s390x",
          "SUSE Manager Server 4.3:kernel-default-devel-5.14.21-150400.24.170.2.x86_64",
          "SUSE Manager Server 4.3:kernel-devel-5.14.21-150400.24.170.1.noarch",
          "SUSE Manager Server 4.3:kernel-macros-5.14.21-150400.24.170.1.noarch",
          "SUSE Manager Server 4.3:kernel-source-5.14.21-150400.24.170.1.noarch",
          "SUSE Manager Server 4.3:kernel-syms-5.14.21-150400.24.170.1.ppc64le",
          "SUSE Manager Server 4.3:kernel-syms-5.14.21-150400.24.170.1.s390x",
          "SUSE Manager Server 4.3:kernel-syms-5.14.21-150400.24.170.1.x86_64",
          "SUSE Manager Server 4.3:kernel-zfcpdump-5.14.21-150400.24.170.2.s390x"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2022-50027",
          "url": "https://www.suse.com/security/cve/CVE-2022-50027"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1245073 for CVE-2022-50027",
          "url": "https://bugzilla.suse.com/1245073"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-64kb-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-64kb-devel-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-devel-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-devel-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-devel-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-docs-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-macros-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-obs-build-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-obs-build-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-source-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-syms-5.14.21-150400.24.170.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-syms-5.14.21-150400.24.170.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:reiserfs-kmp-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:reiserfs-kmp-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-64kb-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-64kb-devel-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-devel-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-docs-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-macros-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-source-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.170.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.170.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_170-default-1-150400.9.3.2.ppc64le",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_170-default-1-150400.9.3.2.s390x",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_170-default-1-150400.9.3.2.x86_64",
            "SUSE Linux Enterprise Micro 5.3:kernel-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise Micro 5.3:kernel-default-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise Micro 5.3:kernel-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Micro 5.3:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.aarch64",
            "SUSE Linux Enterprise Micro 5.3:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
            "SUSE Linux Enterprise Micro 5.4:kernel-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise Micro 5.4:kernel-default-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise Micro 5.4:kernel-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Micro 5.4:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.aarch64",
            "SUSE Linux Enterprise Micro 5.4:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-64kb-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-64kb-devel-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.aarch64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.ppc64le",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-devel-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-docs-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-macros-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-source-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.170.1.aarch64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.170.1.ppc64le",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.170.1.s390x",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.170.1.x86_64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-zfcpdump-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-devel-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-devel-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-devel-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-docs-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-macros-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-obs-build-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-obs-build-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-source-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-syms-5.14.21-150400.24.170.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-syms-5.14.21-150400.24.170.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Manager Proxy 4.3:kernel-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Manager Proxy 4.3:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
            "SUSE Manager Proxy 4.3:kernel-default-devel-5.14.21-150400.24.170.2.x86_64",
            "SUSE Manager Proxy 4.3:kernel-devel-5.14.21-150400.24.170.1.noarch",
            "SUSE Manager Proxy 4.3:kernel-macros-5.14.21-150400.24.170.1.noarch",
            "SUSE Manager Proxy 4.3:kernel-source-5.14.21-150400.24.170.1.noarch",
            "SUSE Manager Proxy 4.3:kernel-syms-5.14.21-150400.24.170.1.x86_64",
            "SUSE Manager Server 4.3:kernel-default-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Manager Server 4.3:kernel-default-5.14.21-150400.24.170.2.s390x",
            "SUSE Manager Server 4.3:kernel-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Manager Server 4.3:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.ppc64le",
            "SUSE Manager Server 4.3:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
            "SUSE Manager Server 4.3:kernel-default-devel-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Manager Server 4.3:kernel-default-devel-5.14.21-150400.24.170.2.s390x",
            "SUSE Manager Server 4.3:kernel-default-devel-5.14.21-150400.24.170.2.x86_64",
            "SUSE Manager Server 4.3:kernel-devel-5.14.21-150400.24.170.1.noarch",
            "SUSE Manager Server 4.3:kernel-macros-5.14.21-150400.24.170.1.noarch",
            "SUSE Manager Server 4.3:kernel-source-5.14.21-150400.24.170.1.noarch",
            "SUSE Manager Server 4.3:kernel-syms-5.14.21-150400.24.170.1.ppc64le",
            "SUSE Manager Server 4.3:kernel-syms-5.14.21-150400.24.170.1.s390x",
            "SUSE Manager Server 4.3:kernel-syms-5.14.21-150400.24.170.1.x86_64",
            "SUSE Manager Server 4.3:kernel-zfcpdump-5.14.21-150400.24.170.2.s390x"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 5.5,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
            "version": "3.1"
          },
          "products": [
            "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-64kb-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-64kb-devel-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-devel-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-devel-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-devel-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-docs-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-macros-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-obs-build-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-obs-build-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-source-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-syms-5.14.21-150400.24.170.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-syms-5.14.21-150400.24.170.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:reiserfs-kmp-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:reiserfs-kmp-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-64kb-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-64kb-devel-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-devel-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-docs-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-macros-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-source-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.170.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.170.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_170-default-1-150400.9.3.2.ppc64le",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_170-default-1-150400.9.3.2.s390x",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_170-default-1-150400.9.3.2.x86_64",
            "SUSE Linux Enterprise Micro 5.3:kernel-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise Micro 5.3:kernel-default-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise Micro 5.3:kernel-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Micro 5.3:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.aarch64",
            "SUSE Linux Enterprise Micro 5.3:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
            "SUSE Linux Enterprise Micro 5.4:kernel-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise Micro 5.4:kernel-default-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise Micro 5.4:kernel-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Micro 5.4:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.aarch64",
            "SUSE Linux Enterprise Micro 5.4:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-64kb-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-64kb-devel-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.aarch64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.ppc64le",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-devel-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-docs-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-macros-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-source-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.170.1.aarch64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.170.1.ppc64le",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.170.1.s390x",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.170.1.x86_64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-zfcpdump-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-devel-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-devel-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-devel-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-docs-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-macros-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-obs-build-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-obs-build-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-source-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-syms-5.14.21-150400.24.170.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-syms-5.14.21-150400.24.170.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Manager Proxy 4.3:kernel-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Manager Proxy 4.3:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
            "SUSE Manager Proxy 4.3:kernel-default-devel-5.14.21-150400.24.170.2.x86_64",
            "SUSE Manager Proxy 4.3:kernel-devel-5.14.21-150400.24.170.1.noarch",
            "SUSE Manager Proxy 4.3:kernel-macros-5.14.21-150400.24.170.1.noarch",
            "SUSE Manager Proxy 4.3:kernel-source-5.14.21-150400.24.170.1.noarch",
            "SUSE Manager Proxy 4.3:kernel-syms-5.14.21-150400.24.170.1.x86_64",
            "SUSE Manager Server 4.3:kernel-default-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Manager Server 4.3:kernel-default-5.14.21-150400.24.170.2.s390x",
            "SUSE Manager Server 4.3:kernel-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Manager Server 4.3:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.ppc64le",
            "SUSE Manager Server 4.3:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
            "SUSE Manager Server 4.3:kernel-default-devel-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Manager Server 4.3:kernel-default-devel-5.14.21-150400.24.170.2.s390x",
            "SUSE Manager Server 4.3:kernel-default-devel-5.14.21-150400.24.170.2.x86_64",
            "SUSE Manager Server 4.3:kernel-devel-5.14.21-150400.24.170.1.noarch",
            "SUSE Manager Server 4.3:kernel-macros-5.14.21-150400.24.170.1.noarch",
            "SUSE Manager Server 4.3:kernel-source-5.14.21-150400.24.170.1.noarch",
            "SUSE Manager Server 4.3:kernel-syms-5.14.21-150400.24.170.1.ppc64le",
            "SUSE Manager Server 4.3:kernel-syms-5.14.21-150400.24.170.1.s390x",
            "SUSE Manager Server 4.3:kernel-syms-5.14.21-150400.24.170.1.x86_64",
            "SUSE Manager Server 4.3:kernel-zfcpdump-5.14.21-150400.24.170.2.s390x"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2025-07-28T15:09:33Z",
          "details": "moderate"
        }
      ],
      "title": "CVE-2022-50027"
    },
    {
      "cve": "CVE-2022-50028",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2022-50028"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "In the Linux kernel, the following vulnerability has been resolved:\n\ngadgetfs: ep_io - wait until IRQ finishes\n\nafter usb_ep_queue() if wait_for_completion_interruptible() is\ninterrupted we need to wait until IRQ gets finished.\n\nOtherwise complete() from epio_complete() can corrupt stack.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.170.2.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.170.2.s390x",
          "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.170.2.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.170.2.s390x",
          "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.170.2.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.170.2.s390x",
          "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.170.2.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.170.2.s390x",
          "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-64kb-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-64kb-devel-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-devel-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-devel-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-devel-5.14.21-150400.24.170.1.noarch",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-docs-5.14.21-150400.24.170.1.noarch",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-macros-5.14.21-150400.24.170.1.noarch",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-obs-build-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-obs-build-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-source-5.14.21-150400.24.170.1.noarch",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-syms-5.14.21-150400.24.170.1.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-syms-5.14.21-150400.24.170.1.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:reiserfs-kmp-default-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:reiserfs-kmp-default-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-64kb-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-64kb-devel-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-devel-5.14.21-150400.24.170.1.noarch",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-docs-5.14.21-150400.24.170.1.noarch",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-macros-5.14.21-150400.24.170.1.noarch",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-source-5.14.21-150400.24.170.1.noarch",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.170.1.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.170.1.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.170.2.ppc64le",
          "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.170.2.s390x",
          "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.170.2.ppc64le",
          "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.170.2.s390x",
          "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_170-default-1-150400.9.3.2.ppc64le",
          "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_170-default-1-150400.9.3.2.s390x",
          "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_170-default-1-150400.9.3.2.x86_64",
          "SUSE Linux Enterprise Micro 5.3:kernel-default-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise Micro 5.3:kernel-default-5.14.21-150400.24.170.2.s390x",
          "SUSE Linux Enterprise Micro 5.3:kernel-default-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise Micro 5.3:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.aarch64",
          "SUSE Linux Enterprise Micro 5.3:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
          "SUSE Linux Enterprise Micro 5.4:kernel-default-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise Micro 5.4:kernel-default-5.14.21-150400.24.170.2.s390x",
          "SUSE Linux Enterprise Micro 5.4:kernel-default-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise Micro 5.4:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.aarch64",
          "SUSE Linux Enterprise Micro 5.4:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-64kb-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-64kb-devel-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-5.14.21-150400.24.170.2.ppc64le",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-5.14.21-150400.24.170.2.s390x",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.aarch64",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.ppc64le",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.170.2.ppc64le",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.170.2.s390x",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-devel-5.14.21-150400.24.170.1.noarch",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-docs-5.14.21-150400.24.170.1.noarch",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-macros-5.14.21-150400.24.170.1.noarch",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.170.2.ppc64le",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.170.2.s390x",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-source-5.14.21-150400.24.170.1.noarch",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.170.1.aarch64",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.170.1.ppc64le",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.170.1.s390x",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.170.1.x86_64",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-zfcpdump-5.14.21-150400.24.170.2.s390x",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.170.2.ppc64le",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.170.2.s390x",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-5.14.21-150400.24.170.2.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-devel-5.14.21-150400.24.170.2.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-devel-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-devel-5.14.21-150400.24.170.1.noarch",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-docs-5.14.21-150400.24.170.1.noarch",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-macros-5.14.21-150400.24.170.1.noarch",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-obs-build-5.14.21-150400.24.170.2.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-obs-build-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-source-5.14.21-150400.24.170.1.noarch",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-syms-5.14.21-150400.24.170.1.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-syms-5.14.21-150400.24.170.1.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.170.2.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.170.2.x86_64",
          "SUSE Manager Proxy 4.3:kernel-default-5.14.21-150400.24.170.2.x86_64",
          "SUSE Manager Proxy 4.3:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
          "SUSE Manager Proxy 4.3:kernel-default-devel-5.14.21-150400.24.170.2.x86_64",
          "SUSE Manager Proxy 4.3:kernel-devel-5.14.21-150400.24.170.1.noarch",
          "SUSE Manager Proxy 4.3:kernel-macros-5.14.21-150400.24.170.1.noarch",
          "SUSE Manager Proxy 4.3:kernel-source-5.14.21-150400.24.170.1.noarch",
          "SUSE Manager Proxy 4.3:kernel-syms-5.14.21-150400.24.170.1.x86_64",
          "SUSE Manager Server 4.3:kernel-default-5.14.21-150400.24.170.2.ppc64le",
          "SUSE Manager Server 4.3:kernel-default-5.14.21-150400.24.170.2.s390x",
          "SUSE Manager Server 4.3:kernel-default-5.14.21-150400.24.170.2.x86_64",
          "SUSE Manager Server 4.3:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.ppc64le",
          "SUSE Manager Server 4.3:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
          "SUSE Manager Server 4.3:kernel-default-devel-5.14.21-150400.24.170.2.ppc64le",
          "SUSE Manager Server 4.3:kernel-default-devel-5.14.21-150400.24.170.2.s390x",
          "SUSE Manager Server 4.3:kernel-default-devel-5.14.21-150400.24.170.2.x86_64",
          "SUSE Manager Server 4.3:kernel-devel-5.14.21-150400.24.170.1.noarch",
          "SUSE Manager Server 4.3:kernel-macros-5.14.21-150400.24.170.1.noarch",
          "SUSE Manager Server 4.3:kernel-source-5.14.21-150400.24.170.1.noarch",
          "SUSE Manager Server 4.3:kernel-syms-5.14.21-150400.24.170.1.ppc64le",
          "SUSE Manager Server 4.3:kernel-syms-5.14.21-150400.24.170.1.s390x",
          "SUSE Manager Server 4.3:kernel-syms-5.14.21-150400.24.170.1.x86_64",
          "SUSE Manager Server 4.3:kernel-zfcpdump-5.14.21-150400.24.170.2.s390x"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2022-50028",
          "url": "https://www.suse.com/security/cve/CVE-2022-50028"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1245135 for CVE-2022-50028",
          "url": "https://bugzilla.suse.com/1245135"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-64kb-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-64kb-devel-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-devel-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-devel-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-devel-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-docs-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-macros-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-obs-build-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-obs-build-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-source-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-syms-5.14.21-150400.24.170.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-syms-5.14.21-150400.24.170.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:reiserfs-kmp-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:reiserfs-kmp-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-64kb-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-64kb-devel-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-devel-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-docs-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-macros-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-source-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.170.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.170.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_170-default-1-150400.9.3.2.ppc64le",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_170-default-1-150400.9.3.2.s390x",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_170-default-1-150400.9.3.2.x86_64",
            "SUSE Linux Enterprise Micro 5.3:kernel-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise Micro 5.3:kernel-default-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise Micro 5.3:kernel-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Micro 5.3:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.aarch64",
            "SUSE Linux Enterprise Micro 5.3:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
            "SUSE Linux Enterprise Micro 5.4:kernel-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise Micro 5.4:kernel-default-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise Micro 5.4:kernel-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Micro 5.4:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.aarch64",
            "SUSE Linux Enterprise Micro 5.4:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-64kb-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-64kb-devel-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.aarch64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.ppc64le",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-devel-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-docs-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-macros-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-source-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.170.1.aarch64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.170.1.ppc64le",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.170.1.s390x",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.170.1.x86_64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-zfcpdump-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-devel-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-devel-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-devel-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-docs-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-macros-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-obs-build-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-obs-build-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-source-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-syms-5.14.21-150400.24.170.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-syms-5.14.21-150400.24.170.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Manager Proxy 4.3:kernel-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Manager Proxy 4.3:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
            "SUSE Manager Proxy 4.3:kernel-default-devel-5.14.21-150400.24.170.2.x86_64",
            "SUSE Manager Proxy 4.3:kernel-devel-5.14.21-150400.24.170.1.noarch",
            "SUSE Manager Proxy 4.3:kernel-macros-5.14.21-150400.24.170.1.noarch",
            "SUSE Manager Proxy 4.3:kernel-source-5.14.21-150400.24.170.1.noarch",
            "SUSE Manager Proxy 4.3:kernel-syms-5.14.21-150400.24.170.1.x86_64",
            "SUSE Manager Server 4.3:kernel-default-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Manager Server 4.3:kernel-default-5.14.21-150400.24.170.2.s390x",
            "SUSE Manager Server 4.3:kernel-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Manager Server 4.3:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.ppc64le",
            "SUSE Manager Server 4.3:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
            "SUSE Manager Server 4.3:kernel-default-devel-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Manager Server 4.3:kernel-default-devel-5.14.21-150400.24.170.2.s390x",
            "SUSE Manager Server 4.3:kernel-default-devel-5.14.21-150400.24.170.2.x86_64",
            "SUSE Manager Server 4.3:kernel-devel-5.14.21-150400.24.170.1.noarch",
            "SUSE Manager Server 4.3:kernel-macros-5.14.21-150400.24.170.1.noarch",
            "SUSE Manager Server 4.3:kernel-source-5.14.21-150400.24.170.1.noarch",
            "SUSE Manager Server 4.3:kernel-syms-5.14.21-150400.24.170.1.ppc64le",
            "SUSE Manager Server 4.3:kernel-syms-5.14.21-150400.24.170.1.s390x",
            "SUSE Manager Server 4.3:kernel-syms-5.14.21-150400.24.170.1.x86_64",
            "SUSE Manager Server 4.3:kernel-zfcpdump-5.14.21-150400.24.170.2.s390x"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 6.1,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:H",
            "version": "3.1"
          },
          "products": [
            "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-64kb-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-64kb-devel-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-devel-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-devel-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-devel-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-docs-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-macros-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-obs-build-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-obs-build-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-source-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-syms-5.14.21-150400.24.170.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-syms-5.14.21-150400.24.170.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:reiserfs-kmp-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:reiserfs-kmp-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-64kb-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-64kb-devel-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-devel-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-docs-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-macros-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-source-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.170.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.170.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_170-default-1-150400.9.3.2.ppc64le",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_170-default-1-150400.9.3.2.s390x",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_170-default-1-150400.9.3.2.x86_64",
            "SUSE Linux Enterprise Micro 5.3:kernel-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise Micro 5.3:kernel-default-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise Micro 5.3:kernel-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Micro 5.3:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.aarch64",
            "SUSE Linux Enterprise Micro 5.3:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
            "SUSE Linux Enterprise Micro 5.4:kernel-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise Micro 5.4:kernel-default-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise Micro 5.4:kernel-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Micro 5.4:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.aarch64",
            "SUSE Linux Enterprise Micro 5.4:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-64kb-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-64kb-devel-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.aarch64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.ppc64le",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-devel-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-docs-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-macros-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-source-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.170.1.aarch64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.170.1.ppc64le",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.170.1.s390x",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.170.1.x86_64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-zfcpdump-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-devel-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-devel-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-devel-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-docs-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-macros-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-obs-build-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-obs-build-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-source-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-syms-5.14.21-150400.24.170.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-syms-5.14.21-150400.24.170.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Manager Proxy 4.3:kernel-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Manager Proxy 4.3:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
            "SUSE Manager Proxy 4.3:kernel-default-devel-5.14.21-150400.24.170.2.x86_64",
            "SUSE Manager Proxy 4.3:kernel-devel-5.14.21-150400.24.170.1.noarch",
            "SUSE Manager Proxy 4.3:kernel-macros-5.14.21-150400.24.170.1.noarch",
            "SUSE Manager Proxy 4.3:kernel-source-5.14.21-150400.24.170.1.noarch",
            "SUSE Manager Proxy 4.3:kernel-syms-5.14.21-150400.24.170.1.x86_64",
            "SUSE Manager Server 4.3:kernel-default-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Manager Server 4.3:kernel-default-5.14.21-150400.24.170.2.s390x",
            "SUSE Manager Server 4.3:kernel-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Manager Server 4.3:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.ppc64le",
            "SUSE Manager Server 4.3:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
            "SUSE Manager Server 4.3:kernel-default-devel-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Manager Server 4.3:kernel-default-devel-5.14.21-150400.24.170.2.s390x",
            "SUSE Manager Server 4.3:kernel-default-devel-5.14.21-150400.24.170.2.x86_64",
            "SUSE Manager Server 4.3:kernel-devel-5.14.21-150400.24.170.1.noarch",
            "SUSE Manager Server 4.3:kernel-macros-5.14.21-150400.24.170.1.noarch",
            "SUSE Manager Server 4.3:kernel-source-5.14.21-150400.24.170.1.noarch",
            "SUSE Manager Server 4.3:kernel-syms-5.14.21-150400.24.170.1.ppc64le",
            "SUSE Manager Server 4.3:kernel-syms-5.14.21-150400.24.170.1.s390x",
            "SUSE Manager Server 4.3:kernel-syms-5.14.21-150400.24.170.1.x86_64",
            "SUSE Manager Server 4.3:kernel-zfcpdump-5.14.21-150400.24.170.2.s390x"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2025-07-28T15:09:33Z",
          "details": "moderate"
        }
      ],
      "title": "CVE-2022-50028"
    },
    {
      "cve": "CVE-2022-50029",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2022-50029"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "In the Linux kernel, the following vulnerability has been resolved:\n\nclk: qcom: ipq8074: dont disable gcc_sleep_clk_src\n\nOnce the usb sleep clocks are disabled, clock framework is trying to\ndisable the sleep clock source also.\n\nHowever, it seems that it cannot be disabled and trying to do so produces:\n[  245.436390] ------------[ cut here ]------------\n[  245.441233] gcc_sleep_clk_src status stuck at \u0027on\u0027\n[  245.441254] WARNING: CPU: 2 PID: 223 at clk_branch_wait+0x130/0x140\n[  245.450435] Modules linked in: xhci_plat_hcd xhci_hcd dwc3 dwc3_qcom leds_gpio\n[  245.456601] CPU: 2 PID: 223 Comm: sh Not tainted 5.18.0-rc4 #215\n[  245.463889] Hardware name: Xiaomi AX9000 (DT)\n[  245.470050] pstate: 204000c5 (nzCv daIF +PAN -UAO -TCO -DIT -SSBS BTYPE=--)\n[  245.474307] pc : clk_branch_wait+0x130/0x140\n[  245.481073] lr : clk_branch_wait+0x130/0x140\n[  245.485588] sp : ffffffc009f2bad0\n[  245.489838] x29: ffffffc009f2bad0 x28: ffffff8003e6c800 x27: 0000000000000000\n[  245.493057] x26: 0000000000000000 x25: 0000000000000000 x24: ffffff800226ef20\n[  245.500175] x23: ffffffc0089ff550 x22: 0000000000000000 x21: ffffffc008476ad0\n[  245.507294] x20: 0000000000000000 x19: ffffffc00965ac70 x18: fffffffffffc51a7\n[  245.514413] x17: 68702e3030303837 x16: 3a6d726f6674616c x15: ffffffc089f2b777\n[  245.521531] x14: ffffffc0095c9d18 x13: 0000000000000129 x12: 0000000000000129\n[  245.528649] x11: 00000000ffffffea x10: ffffffc009621d18 x9 : 0000000000000001\n[  245.535767] x8 : 0000000000000001 x7 : 0000000000017fe8 x6 : 0000000000000001\n[  245.542885] x5 : ffffff803fdca6d8 x4 : 0000000000000000 x3 : 0000000000000027\n[  245.550002] x2 : 0000000000000027 x1 : 0000000000000023 x0 : 0000000000000026\n[  245.557122] Call trace:\n[  245.564229]  clk_branch_wait+0x130/0x140\n[  245.566490]  clk_branch2_disable+0x2c/0x40\n[  245.570656]  clk_core_disable+0x60/0xb0\n[  245.574561]  clk_core_disable+0x68/0xb0\n[  245.578293]  clk_disable+0x30/0x50\n[  245.582113]  dwc3_qcom_remove+0x60/0xc0 [dwc3_qcom]\n[  245.585588]  platform_remove+0x28/0x60\n[  245.590361]  device_remove+0x4c/0x80\n[  245.594179]  device_release_driver_internal+0x1dc/0x230\n[  245.597914]  device_driver_detach+0x18/0x30\n[  245.602861]  unbind_store+0xec/0x110\n[  245.607027]  drv_attr_store+0x24/0x40\n[  245.610847]  sysfs_kf_write+0x44/0x60\n[  245.614405]  kernfs_fop_write_iter+0x128/0x1c0\n[  245.618052]  new_sync_write+0xc0/0x130\n[  245.622391]  vfs_write+0x1d4/0x2a0\n[  245.626123]  ksys_write+0x58/0xe0\n[  245.629508]  __arm64_sys_write+0x1c/0x30\n[  245.632895]  invoke_syscall.constprop.0+0x5c/0x110\n[  245.636890]  do_el0_svc+0xa0/0x150\n[  245.641488]  el0_svc+0x18/0x60\n[  245.644872]  el0t_64_sync_handler+0xa4/0x130\n[  245.647914]  el0t_64_sync+0x174/0x178\n[  245.652340] ---[ end trace 0000000000000000 ]---\n\nSo, add CLK_IS_CRITICAL flag to the clock so that the kernel won\u0027t try\nto disable the sleep clock.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.170.2.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.170.2.s390x",
          "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.170.2.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.170.2.s390x",
          "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.170.2.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.170.2.s390x",
          "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.170.2.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.170.2.s390x",
          "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-64kb-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-64kb-devel-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-devel-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-devel-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-devel-5.14.21-150400.24.170.1.noarch",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-docs-5.14.21-150400.24.170.1.noarch",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-macros-5.14.21-150400.24.170.1.noarch",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-obs-build-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-obs-build-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-source-5.14.21-150400.24.170.1.noarch",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-syms-5.14.21-150400.24.170.1.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-syms-5.14.21-150400.24.170.1.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:reiserfs-kmp-default-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:reiserfs-kmp-default-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-64kb-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-64kb-devel-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-devel-5.14.21-150400.24.170.1.noarch",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-docs-5.14.21-150400.24.170.1.noarch",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-macros-5.14.21-150400.24.170.1.noarch",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-source-5.14.21-150400.24.170.1.noarch",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.170.1.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.170.1.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.170.2.ppc64le",
          "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.170.2.s390x",
          "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.170.2.ppc64le",
          "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.170.2.s390x",
          "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_170-default-1-150400.9.3.2.ppc64le",
          "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_170-default-1-150400.9.3.2.s390x",
          "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_170-default-1-150400.9.3.2.x86_64",
          "SUSE Linux Enterprise Micro 5.3:kernel-default-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise Micro 5.3:kernel-default-5.14.21-150400.24.170.2.s390x",
          "SUSE Linux Enterprise Micro 5.3:kernel-default-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise Micro 5.3:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.aarch64",
          "SUSE Linux Enterprise Micro 5.3:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
          "SUSE Linux Enterprise Micro 5.4:kernel-default-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise Micro 5.4:kernel-default-5.14.21-150400.24.170.2.s390x",
          "SUSE Linux Enterprise Micro 5.4:kernel-default-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise Micro 5.4:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.aarch64",
          "SUSE Linux Enterprise Micro 5.4:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-64kb-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-64kb-devel-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-5.14.21-150400.24.170.2.ppc64le",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-5.14.21-150400.24.170.2.s390x",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.aarch64",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.ppc64le",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.170.2.ppc64le",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.170.2.s390x",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-devel-5.14.21-150400.24.170.1.noarch",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-docs-5.14.21-150400.24.170.1.noarch",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-macros-5.14.21-150400.24.170.1.noarch",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.170.2.ppc64le",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.170.2.s390x",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-source-5.14.21-150400.24.170.1.noarch",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.170.1.aarch64",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.170.1.ppc64le",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.170.1.s390x",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.170.1.x86_64",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-zfcpdump-5.14.21-150400.24.170.2.s390x",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.170.2.ppc64le",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.170.2.s390x",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-5.14.21-150400.24.170.2.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-devel-5.14.21-150400.24.170.2.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-devel-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-devel-5.14.21-150400.24.170.1.noarch",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-docs-5.14.21-150400.24.170.1.noarch",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-macros-5.14.21-150400.24.170.1.noarch",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-obs-build-5.14.21-150400.24.170.2.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-obs-build-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-source-5.14.21-150400.24.170.1.noarch",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-syms-5.14.21-150400.24.170.1.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-syms-5.14.21-150400.24.170.1.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.170.2.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.170.2.x86_64",
          "SUSE Manager Proxy 4.3:kernel-default-5.14.21-150400.24.170.2.x86_64",
          "SUSE Manager Proxy 4.3:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
          "SUSE Manager Proxy 4.3:kernel-default-devel-5.14.21-150400.24.170.2.x86_64",
          "SUSE Manager Proxy 4.3:kernel-devel-5.14.21-150400.24.170.1.noarch",
          "SUSE Manager Proxy 4.3:kernel-macros-5.14.21-150400.24.170.1.noarch",
          "SUSE Manager Proxy 4.3:kernel-source-5.14.21-150400.24.170.1.noarch",
          "SUSE Manager Proxy 4.3:kernel-syms-5.14.21-150400.24.170.1.x86_64",
          "SUSE Manager Server 4.3:kernel-default-5.14.21-150400.24.170.2.ppc64le",
          "SUSE Manager Server 4.3:kernel-default-5.14.21-150400.24.170.2.s390x",
          "SUSE Manager Server 4.3:kernel-default-5.14.21-150400.24.170.2.x86_64",
          "SUSE Manager Server 4.3:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.ppc64le",
          "SUSE Manager Server 4.3:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
          "SUSE Manager Server 4.3:kernel-default-devel-5.14.21-150400.24.170.2.ppc64le",
          "SUSE Manager Server 4.3:kernel-default-devel-5.14.21-150400.24.170.2.s390x",
          "SUSE Manager Server 4.3:kernel-default-devel-5.14.21-150400.24.170.2.x86_64",
          "SUSE Manager Server 4.3:kernel-devel-5.14.21-150400.24.170.1.noarch",
          "SUSE Manager Server 4.3:kernel-macros-5.14.21-150400.24.170.1.noarch",
          "SUSE Manager Server 4.3:kernel-source-5.14.21-150400.24.170.1.noarch",
          "SUSE Manager Server 4.3:kernel-syms-5.14.21-150400.24.170.1.ppc64le",
          "SUSE Manager Server 4.3:kernel-syms-5.14.21-150400.24.170.1.s390x",
          "SUSE Manager Server 4.3:kernel-syms-5.14.21-150400.24.170.1.x86_64",
          "SUSE Manager Server 4.3:kernel-zfcpdump-5.14.21-150400.24.170.2.s390x"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2022-50029",
          "url": "https://www.suse.com/security/cve/CVE-2022-50029"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1245146 for CVE-2022-50029",
          "url": "https://bugzilla.suse.com/1245146"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-64kb-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-64kb-devel-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-devel-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-devel-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-devel-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-docs-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-macros-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-obs-build-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-obs-build-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-source-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-syms-5.14.21-150400.24.170.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-syms-5.14.21-150400.24.170.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:reiserfs-kmp-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:reiserfs-kmp-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-64kb-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-64kb-devel-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-devel-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-docs-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-macros-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-source-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.170.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.170.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_170-default-1-150400.9.3.2.ppc64le",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_170-default-1-150400.9.3.2.s390x",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_170-default-1-150400.9.3.2.x86_64",
            "SUSE Linux Enterprise Micro 5.3:kernel-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise Micro 5.3:kernel-default-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise Micro 5.3:kernel-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Micro 5.3:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.aarch64",
            "SUSE Linux Enterprise Micro 5.3:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
            "SUSE Linux Enterprise Micro 5.4:kernel-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise Micro 5.4:kernel-default-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise Micro 5.4:kernel-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Micro 5.4:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.aarch64",
            "SUSE Linux Enterprise Micro 5.4:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-64kb-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-64kb-devel-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.aarch64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.ppc64le",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-devel-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-docs-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-macros-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-source-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.170.1.aarch64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.170.1.ppc64le",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.170.1.s390x",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.170.1.x86_64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-zfcpdump-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-devel-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-devel-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-devel-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-docs-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-macros-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-obs-build-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-obs-build-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-source-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-syms-5.14.21-150400.24.170.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-syms-5.14.21-150400.24.170.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Manager Proxy 4.3:kernel-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Manager Proxy 4.3:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
            "SUSE Manager Proxy 4.3:kernel-default-devel-5.14.21-150400.24.170.2.x86_64",
            "SUSE Manager Proxy 4.3:kernel-devel-5.14.21-150400.24.170.1.noarch",
            "SUSE Manager Proxy 4.3:kernel-macros-5.14.21-150400.24.170.1.noarch",
            "SUSE Manager Proxy 4.3:kernel-source-5.14.21-150400.24.170.1.noarch",
            "SUSE Manager Proxy 4.3:kernel-syms-5.14.21-150400.24.170.1.x86_64",
            "SUSE Manager Server 4.3:kernel-default-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Manager Server 4.3:kernel-default-5.14.21-150400.24.170.2.s390x",
            "SUSE Manager Server 4.3:kernel-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Manager Server 4.3:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.ppc64le",
            "SUSE Manager Server 4.3:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
            "SUSE Manager Server 4.3:kernel-default-devel-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Manager Server 4.3:kernel-default-devel-5.14.21-150400.24.170.2.s390x",
            "SUSE Manager Server 4.3:kernel-default-devel-5.14.21-150400.24.170.2.x86_64",
            "SUSE Manager Server 4.3:kernel-devel-5.14.21-150400.24.170.1.noarch",
            "SUSE Manager Server 4.3:kernel-macros-5.14.21-150400.24.170.1.noarch",
            "SUSE Manager Server 4.3:kernel-source-5.14.21-150400.24.170.1.noarch",
            "SUSE Manager Server 4.3:kernel-syms-5.14.21-150400.24.170.1.ppc64le",
            "SUSE Manager Server 4.3:kernel-syms-5.14.21-150400.24.170.1.s390x",
            "SUSE Manager Server 4.3:kernel-syms-5.14.21-150400.24.170.1.x86_64",
            "SUSE Manager Server 4.3:kernel-zfcpdump-5.14.21-150400.24.170.2.s390x"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 5.5,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
            "version": "3.1"
          },
          "products": [
            "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-64kb-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-64kb-devel-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-devel-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-devel-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-devel-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-docs-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-macros-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-obs-build-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-obs-build-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-source-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-syms-5.14.21-150400.24.170.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-syms-5.14.21-150400.24.170.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:reiserfs-kmp-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:reiserfs-kmp-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-64kb-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-64kb-devel-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-devel-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-docs-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-macros-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-source-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.170.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.170.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_170-default-1-150400.9.3.2.ppc64le",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_170-default-1-150400.9.3.2.s390x",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_170-default-1-150400.9.3.2.x86_64",
            "SUSE Linux Enterprise Micro 5.3:kernel-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise Micro 5.3:kernel-default-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise Micro 5.3:kernel-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Micro 5.3:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.aarch64",
            "SUSE Linux Enterprise Micro 5.3:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
            "SUSE Linux Enterprise Micro 5.4:kernel-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise Micro 5.4:kernel-default-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise Micro 5.4:kernel-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Micro 5.4:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.aarch64",
            "SUSE Linux Enterprise Micro 5.4:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-64kb-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-64kb-devel-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.aarch64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.ppc64le",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-devel-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-docs-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-macros-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-source-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.170.1.aarch64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.170.1.ppc64le",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.170.1.s390x",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.170.1.x86_64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-zfcpdump-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-devel-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-devel-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-devel-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-docs-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-macros-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-obs-build-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-obs-build-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-source-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-syms-5.14.21-150400.24.170.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-syms-5.14.21-150400.24.170.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Manager Proxy 4.3:kernel-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Manager Proxy 4.3:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
            "SUSE Manager Proxy 4.3:kernel-default-devel-5.14.21-150400.24.170.2.x86_64",
            "SUSE Manager Proxy 4.3:kernel-devel-5.14.21-150400.24.170.1.noarch",
            "SUSE Manager Proxy 4.3:kernel-macros-5.14.21-150400.24.170.1.noarch",
            "SUSE Manager Proxy 4.3:kernel-source-5.14.21-150400.24.170.1.noarch",
            "SUSE Manager Proxy 4.3:kernel-syms-5.14.21-150400.24.170.1.x86_64",
            "SUSE Manager Server 4.3:kernel-default-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Manager Server 4.3:kernel-default-5.14.21-150400.24.170.2.s390x",
            "SUSE Manager Server 4.3:kernel-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Manager Server 4.3:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.ppc64le",
            "SUSE Manager Server 4.3:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
            "SUSE Manager Server 4.3:kernel-default-devel-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Manager Server 4.3:kernel-default-devel-5.14.21-150400.24.170.2.s390x",
            "SUSE Manager Server 4.3:kernel-default-devel-5.14.21-150400.24.170.2.x86_64",
            "SUSE Manager Server 4.3:kernel-devel-5.14.21-150400.24.170.1.noarch",
            "SUSE Manager Server 4.3:kernel-macros-5.14.21-150400.24.170.1.noarch",
            "SUSE Manager Server 4.3:kernel-source-5.14.21-150400.24.170.1.noarch",
            "SUSE Manager Server 4.3:kernel-syms-5.14.21-150400.24.170.1.ppc64le",
            "SUSE Manager Server 4.3:kernel-syms-5.14.21-150400.24.170.1.s390x",
            "SUSE Manager Server 4.3:kernel-syms-5.14.21-150400.24.170.1.x86_64",
            "SUSE Manager Server 4.3:kernel-zfcpdump-5.14.21-150400.24.170.2.s390x"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2025-07-28T15:09:33Z",
          "details": "moderate"
        }
      ],
      "title": "CVE-2022-50029"
    },
    {
      "cve": "CVE-2022-50030",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2022-50030"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "In the Linux kernel, the following vulnerability has been resolved:\n\nscsi: lpfc: Prevent buffer overflow crashes in debugfs with malformed user input\n\nMalformed user input to debugfs results in buffer overflow crashes.  Adapt\ninput string lengths to fit within internal buffers, leaving space for NULL\nterminators.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.170.2.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.170.2.s390x",
          "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.170.2.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.170.2.s390x",
          "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.170.2.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.170.2.s390x",
          "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.170.2.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.170.2.s390x",
          "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-64kb-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-64kb-devel-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-devel-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-devel-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-devel-5.14.21-150400.24.170.1.noarch",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-docs-5.14.21-150400.24.170.1.noarch",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-macros-5.14.21-150400.24.170.1.noarch",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-obs-build-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-obs-build-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-source-5.14.21-150400.24.170.1.noarch",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-syms-5.14.21-150400.24.170.1.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-syms-5.14.21-150400.24.170.1.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:reiserfs-kmp-default-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:reiserfs-kmp-default-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-64kb-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-64kb-devel-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-devel-5.14.21-150400.24.170.1.noarch",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-docs-5.14.21-150400.24.170.1.noarch",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-macros-5.14.21-150400.24.170.1.noarch",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-source-5.14.21-150400.24.170.1.noarch",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.170.1.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.170.1.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.170.2.ppc64le",
          "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.170.2.s390x",
          "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.170.2.ppc64le",
          "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.170.2.s390x",
          "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_170-default-1-150400.9.3.2.ppc64le",
          "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_170-default-1-150400.9.3.2.s390x",
          "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_170-default-1-150400.9.3.2.x86_64",
          "SUSE Linux Enterprise Micro 5.3:kernel-default-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise Micro 5.3:kernel-default-5.14.21-150400.24.170.2.s390x",
          "SUSE Linux Enterprise Micro 5.3:kernel-default-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise Micro 5.3:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.aarch64",
          "SUSE Linux Enterprise Micro 5.3:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
          "SUSE Linux Enterprise Micro 5.4:kernel-default-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise Micro 5.4:kernel-default-5.14.21-150400.24.170.2.s390x",
          "SUSE Linux Enterprise Micro 5.4:kernel-default-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise Micro 5.4:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.aarch64",
          "SUSE Linux Enterprise Micro 5.4:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-64kb-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-64kb-devel-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-5.14.21-150400.24.170.2.ppc64le",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-5.14.21-150400.24.170.2.s390x",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.aarch64",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.ppc64le",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.170.2.ppc64le",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.170.2.s390x",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-devel-5.14.21-150400.24.170.1.noarch",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-docs-5.14.21-150400.24.170.1.noarch",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-macros-5.14.21-150400.24.170.1.noarch",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.170.2.ppc64le",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.170.2.s390x",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-source-5.14.21-150400.24.170.1.noarch",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.170.1.aarch64",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.170.1.ppc64le",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.170.1.s390x",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.170.1.x86_64",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-zfcpdump-5.14.21-150400.24.170.2.s390x",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.170.2.ppc64le",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.170.2.s390x",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-5.14.21-150400.24.170.2.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-devel-5.14.21-150400.24.170.2.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-devel-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-devel-5.14.21-150400.24.170.1.noarch",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-docs-5.14.21-150400.24.170.1.noarch",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-macros-5.14.21-150400.24.170.1.noarch",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-obs-build-5.14.21-150400.24.170.2.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-obs-build-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-source-5.14.21-150400.24.170.1.noarch",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-syms-5.14.21-150400.24.170.1.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-syms-5.14.21-150400.24.170.1.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.170.2.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.170.2.x86_64",
          "SUSE Manager Proxy 4.3:kernel-default-5.14.21-150400.24.170.2.x86_64",
          "SUSE Manager Proxy 4.3:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
          "SUSE Manager Proxy 4.3:kernel-default-devel-5.14.21-150400.24.170.2.x86_64",
          "SUSE Manager Proxy 4.3:kernel-devel-5.14.21-150400.24.170.1.noarch",
          "SUSE Manager Proxy 4.3:kernel-macros-5.14.21-150400.24.170.1.noarch",
          "SUSE Manager Proxy 4.3:kernel-source-5.14.21-150400.24.170.1.noarch",
          "SUSE Manager Proxy 4.3:kernel-syms-5.14.21-150400.24.170.1.x86_64",
          "SUSE Manager Server 4.3:kernel-default-5.14.21-150400.24.170.2.ppc64le",
          "SUSE Manager Server 4.3:kernel-default-5.14.21-150400.24.170.2.s390x",
          "SUSE Manager Server 4.3:kernel-default-5.14.21-150400.24.170.2.x86_64",
          "SUSE Manager Server 4.3:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.ppc64le",
          "SUSE Manager Server 4.3:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
          "SUSE Manager Server 4.3:kernel-default-devel-5.14.21-150400.24.170.2.ppc64le",
          "SUSE Manager Server 4.3:kernel-default-devel-5.14.21-150400.24.170.2.s390x",
          "SUSE Manager Server 4.3:kernel-default-devel-5.14.21-150400.24.170.2.x86_64",
          "SUSE Manager Server 4.3:kernel-devel-5.14.21-150400.24.170.1.noarch",
          "SUSE Manager Server 4.3:kernel-macros-5.14.21-150400.24.170.1.noarch",
          "SUSE Manager Server 4.3:kernel-source-5.14.21-150400.24.170.1.noarch",
          "SUSE Manager Server 4.3:kernel-syms-5.14.21-150400.24.170.1.ppc64le",
          "SUSE Manager Server 4.3:kernel-syms-5.14.21-150400.24.170.1.s390x",
          "SUSE Manager Server 4.3:kernel-syms-5.14.21-150400.24.170.1.x86_64",
          "SUSE Manager Server 4.3:kernel-zfcpdump-5.14.21-150400.24.170.2.s390x"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2022-50030",
          "url": "https://www.suse.com/security/cve/CVE-2022-50030"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1245265 for CVE-2022-50030",
          "url": "https://bugzilla.suse.com/1245265"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-64kb-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-64kb-devel-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-devel-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-devel-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-devel-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-docs-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-macros-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-obs-build-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-obs-build-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-source-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-syms-5.14.21-150400.24.170.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-syms-5.14.21-150400.24.170.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:reiserfs-kmp-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:reiserfs-kmp-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-64kb-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-64kb-devel-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-devel-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-docs-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-macros-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-source-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.170.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.170.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_170-default-1-150400.9.3.2.ppc64le",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_170-default-1-150400.9.3.2.s390x",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_170-default-1-150400.9.3.2.x86_64",
            "SUSE Linux Enterprise Micro 5.3:kernel-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise Micro 5.3:kernel-default-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise Micro 5.3:kernel-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Micro 5.3:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.aarch64",
            "SUSE Linux Enterprise Micro 5.3:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
            "SUSE Linux Enterprise Micro 5.4:kernel-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise Micro 5.4:kernel-default-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise Micro 5.4:kernel-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Micro 5.4:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.aarch64",
            "SUSE Linux Enterprise Micro 5.4:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-64kb-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-64kb-devel-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.aarch64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.ppc64le",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-devel-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-docs-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-macros-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-source-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.170.1.aarch64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.170.1.ppc64le",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.170.1.s390x",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.170.1.x86_64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-zfcpdump-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-devel-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-devel-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-devel-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-docs-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-macros-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-obs-build-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-obs-build-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-source-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-syms-5.14.21-150400.24.170.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-syms-5.14.21-150400.24.170.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Manager Proxy 4.3:kernel-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Manager Proxy 4.3:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
            "SUSE Manager Proxy 4.3:kernel-default-devel-5.14.21-150400.24.170.2.x86_64",
            "SUSE Manager Proxy 4.3:kernel-devel-5.14.21-150400.24.170.1.noarch",
            "SUSE Manager Proxy 4.3:kernel-macros-5.14.21-150400.24.170.1.noarch",
            "SUSE Manager Proxy 4.3:kernel-source-5.14.21-150400.24.170.1.noarch",
            "SUSE Manager Proxy 4.3:kernel-syms-5.14.21-150400.24.170.1.x86_64",
            "SUSE Manager Server 4.3:kernel-default-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Manager Server 4.3:kernel-default-5.14.21-150400.24.170.2.s390x",
            "SUSE Manager Server 4.3:kernel-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Manager Server 4.3:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.ppc64le",
            "SUSE Manager Server 4.3:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
            "SUSE Manager Server 4.3:kernel-default-devel-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Manager Server 4.3:kernel-default-devel-5.14.21-150400.24.170.2.s390x",
            "SUSE Manager Server 4.3:kernel-default-devel-5.14.21-150400.24.170.2.x86_64",
            "SUSE Manager Server 4.3:kernel-devel-5.14.21-150400.24.170.1.noarch",
            "SUSE Manager Server 4.3:kernel-macros-5.14.21-150400.24.170.1.noarch",
            "SUSE Manager Server 4.3:kernel-source-5.14.21-150400.24.170.1.noarch",
            "SUSE Manager Server 4.3:kernel-syms-5.14.21-150400.24.170.1.ppc64le",
            "SUSE Manager Server 4.3:kernel-syms-5.14.21-150400.24.170.1.s390x",
            "SUSE Manager Server 4.3:kernel-syms-5.14.21-150400.24.170.1.x86_64",
            "SUSE Manager Server 4.3:kernel-zfcpdump-5.14.21-150400.24.170.2.s390x"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 6.4,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H",
            "version": "3.1"
          },
          "products": [
            "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-64kb-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-64kb-devel-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-devel-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-devel-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-devel-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-docs-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-macros-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-obs-build-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-obs-build-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-source-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-syms-5.14.21-150400.24.170.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-syms-5.14.21-150400.24.170.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:reiserfs-kmp-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:reiserfs-kmp-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-64kb-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-64kb-devel-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-devel-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-docs-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-macros-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-source-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.170.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.170.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_170-default-1-150400.9.3.2.ppc64le",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_170-default-1-150400.9.3.2.s390x",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_170-default-1-150400.9.3.2.x86_64",
            "SUSE Linux Enterprise Micro 5.3:kernel-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise Micro 5.3:kernel-default-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise Micro 5.3:kernel-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Micro 5.3:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.aarch64",
            "SUSE Linux Enterprise Micro 5.3:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
            "SUSE Linux Enterprise Micro 5.4:kernel-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise Micro 5.4:kernel-default-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise Micro 5.4:kernel-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Micro 5.4:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.aarch64",
            "SUSE Linux Enterprise Micro 5.4:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-64kb-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-64kb-devel-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.aarch64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.ppc64le",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-devel-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-docs-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-macros-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-source-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.170.1.aarch64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.170.1.ppc64le",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.170.1.s390x",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.170.1.x86_64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-zfcpdump-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-devel-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-devel-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-devel-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-docs-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-macros-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-obs-build-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-obs-build-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-source-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-syms-5.14.21-150400.24.170.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-syms-5.14.21-150400.24.170.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Manager Proxy 4.3:kernel-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Manager Proxy 4.3:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
            "SUSE Manager Proxy 4.3:kernel-default-devel-5.14.21-150400.24.170.2.x86_64",
            "SUSE Manager Proxy 4.3:kernel-devel-5.14.21-150400.24.170.1.noarch",
            "SUSE Manager Proxy 4.3:kernel-macros-5.14.21-150400.24.170.1.noarch",
            "SUSE Manager Proxy 4.3:kernel-source-5.14.21-150400.24.170.1.noarch",
            "SUSE Manager Proxy 4.3:kernel-syms-5.14.21-150400.24.170.1.x86_64",
            "SUSE Manager Server 4.3:kernel-default-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Manager Server 4.3:kernel-default-5.14.21-150400.24.170.2.s390x",
            "SUSE Manager Server 4.3:kernel-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Manager Server 4.3:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.ppc64le",
            "SUSE Manager Server 4.3:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
            "SUSE Manager Server 4.3:kernel-default-devel-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Manager Server 4.3:kernel-default-devel-5.14.21-150400.24.170.2.s390x",
            "SUSE Manager Server 4.3:kernel-default-devel-5.14.21-150400.24.170.2.x86_64",
            "SUSE Manager Server 4.3:kernel-devel-5.14.21-150400.24.170.1.noarch",
            "SUSE Manager Server 4.3:kernel-macros-5.14.21-150400.24.170.1.noarch",
            "SUSE Manager Server 4.3:kernel-source-5.14.21-150400.24.170.1.noarch",
            "SUSE Manager Server 4.3:kernel-syms-5.14.21-150400.24.170.1.ppc64le",
            "SUSE Manager Server 4.3:kernel-syms-5.14.21-150400.24.170.1.s390x",
            "SUSE Manager Server 4.3:kernel-syms-5.14.21-150400.24.170.1.x86_64",
            "SUSE Manager Server 4.3:kernel-zfcpdump-5.14.21-150400.24.170.2.s390x"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2025-07-28T15:09:33Z",
          "details": "moderate"
        }
      ],
      "title": "CVE-2022-50030"
    },
    {
      "cve": "CVE-2022-50031",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2022-50031"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "In the Linux kernel, the following vulnerability has been resolved:\n\nscsi: iscsi: Fix HW conn removal use after free\n\nIf qla4xxx doesn\u0027t remove the connection before the session, the iSCSI\nclass tries to remove the connection for it. We were doing a\niscsi_put_conn() in the iter function which is not needed and will result\nin a use after free because iscsi_remove_conn() will free the connection.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.170.2.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.170.2.s390x",
          "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.170.2.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.170.2.s390x",
          "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.170.2.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.170.2.s390x",
          "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.170.2.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.170.2.s390x",
          "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-64kb-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-64kb-devel-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-devel-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-devel-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-devel-5.14.21-150400.24.170.1.noarch",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-docs-5.14.21-150400.24.170.1.noarch",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-macros-5.14.21-150400.24.170.1.noarch",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-obs-build-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-obs-build-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-source-5.14.21-150400.24.170.1.noarch",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-syms-5.14.21-150400.24.170.1.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-syms-5.14.21-150400.24.170.1.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:reiserfs-kmp-default-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:reiserfs-kmp-default-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-64kb-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-64kb-devel-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-devel-5.14.21-150400.24.170.1.noarch",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-docs-5.14.21-150400.24.170.1.noarch",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-macros-5.14.21-150400.24.170.1.noarch",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-source-5.14.21-150400.24.170.1.noarch",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.170.1.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.170.1.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.170.2.ppc64le",
          "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.170.2.s390x",
          "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.170.2.ppc64le",
          "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.170.2.s390x",
          "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_170-default-1-150400.9.3.2.ppc64le",
          "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_170-default-1-150400.9.3.2.s390x",
          "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_170-default-1-150400.9.3.2.x86_64",
          "SUSE Linux Enterprise Micro 5.3:kernel-default-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise Micro 5.3:kernel-default-5.14.21-150400.24.170.2.s390x",
          "SUSE Linux Enterprise Micro 5.3:kernel-default-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise Micro 5.3:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.aarch64",
          "SUSE Linux Enterprise Micro 5.3:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
          "SUSE Linux Enterprise Micro 5.4:kernel-default-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise Micro 5.4:kernel-default-5.14.21-150400.24.170.2.s390x",
          "SUSE Linux Enterprise Micro 5.4:kernel-default-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise Micro 5.4:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.aarch64",
          "SUSE Linux Enterprise Micro 5.4:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-64kb-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-64kb-devel-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-5.14.21-150400.24.170.2.ppc64le",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-5.14.21-150400.24.170.2.s390x",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.aarch64",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.ppc64le",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.170.2.ppc64le",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.170.2.s390x",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-devel-5.14.21-150400.24.170.1.noarch",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-docs-5.14.21-150400.24.170.1.noarch",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-macros-5.14.21-150400.24.170.1.noarch",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.170.2.ppc64le",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.170.2.s390x",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-source-5.14.21-150400.24.170.1.noarch",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.170.1.aarch64",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.170.1.ppc64le",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.170.1.s390x",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.170.1.x86_64",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-zfcpdump-5.14.21-150400.24.170.2.s390x",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.170.2.ppc64le",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.170.2.s390x",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-5.14.21-150400.24.170.2.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-devel-5.14.21-150400.24.170.2.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-devel-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-devel-5.14.21-150400.24.170.1.noarch",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-docs-5.14.21-150400.24.170.1.noarch",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-macros-5.14.21-150400.24.170.1.noarch",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-obs-build-5.14.21-150400.24.170.2.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-obs-build-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-source-5.14.21-150400.24.170.1.noarch",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-syms-5.14.21-150400.24.170.1.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-syms-5.14.21-150400.24.170.1.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.170.2.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.170.2.x86_64",
          "SUSE Manager Proxy 4.3:kernel-default-5.14.21-150400.24.170.2.x86_64",
          "SUSE Manager Proxy 4.3:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
          "SUSE Manager Proxy 4.3:kernel-default-devel-5.14.21-150400.24.170.2.x86_64",
          "SUSE Manager Proxy 4.3:kernel-devel-5.14.21-150400.24.170.1.noarch",
          "SUSE Manager Proxy 4.3:kernel-macros-5.14.21-150400.24.170.1.noarch",
          "SUSE Manager Proxy 4.3:kernel-source-5.14.21-150400.24.170.1.noarch",
          "SUSE Manager Proxy 4.3:kernel-syms-5.14.21-150400.24.170.1.x86_64",
          "SUSE Manager Server 4.3:kernel-default-5.14.21-150400.24.170.2.ppc64le",
          "SUSE Manager Server 4.3:kernel-default-5.14.21-150400.24.170.2.s390x",
          "SUSE Manager Server 4.3:kernel-default-5.14.21-150400.24.170.2.x86_64",
          "SUSE Manager Server 4.3:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.ppc64le",
          "SUSE Manager Server 4.3:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
          "SUSE Manager Server 4.3:kernel-default-devel-5.14.21-150400.24.170.2.ppc64le",
          "SUSE Manager Server 4.3:kernel-default-devel-5.14.21-150400.24.170.2.s390x",
          "SUSE Manager Server 4.3:kernel-default-devel-5.14.21-150400.24.170.2.x86_64",
          "SUSE Manager Server 4.3:kernel-devel-5.14.21-150400.24.170.1.noarch",
          "SUSE Manager Server 4.3:kernel-macros-5.14.21-150400.24.170.1.noarch",
          "SUSE Manager Server 4.3:kernel-source-5.14.21-150400.24.170.1.noarch",
          "SUSE Manager Server 4.3:kernel-syms-5.14.21-150400.24.170.1.ppc64le",
          "SUSE Manager Server 4.3:kernel-syms-5.14.21-150400.24.170.1.s390x",
          "SUSE Manager Server 4.3:kernel-syms-5.14.21-150400.24.170.1.x86_64",
          "SUSE Manager Server 4.3:kernel-zfcpdump-5.14.21-150400.24.170.2.s390x"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2022-50031",
          "url": "https://www.suse.com/security/cve/CVE-2022-50031"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1245118 for CVE-2022-50031",
          "url": "https://bugzilla.suse.com/1245118"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-64kb-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-64kb-devel-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-devel-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-devel-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-devel-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-docs-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-macros-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-obs-build-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-obs-build-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-source-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-syms-5.14.21-150400.24.170.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-syms-5.14.21-150400.24.170.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:reiserfs-kmp-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:reiserfs-kmp-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-64kb-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-64kb-devel-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-devel-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-docs-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-macros-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-source-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.170.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.170.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_170-default-1-150400.9.3.2.ppc64le",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_170-default-1-150400.9.3.2.s390x",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_170-default-1-150400.9.3.2.x86_64",
            "SUSE Linux Enterprise Micro 5.3:kernel-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise Micro 5.3:kernel-default-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise Micro 5.3:kernel-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Micro 5.3:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.aarch64",
            "SUSE Linux Enterprise Micro 5.3:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
            "SUSE Linux Enterprise Micro 5.4:kernel-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise Micro 5.4:kernel-default-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise Micro 5.4:kernel-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Micro 5.4:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.aarch64",
            "SUSE Linux Enterprise Micro 5.4:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-64kb-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-64kb-devel-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.aarch64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.ppc64le",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-devel-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-docs-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-macros-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-source-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.170.1.aarch64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.170.1.ppc64le",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.170.1.s390x",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.170.1.x86_64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-zfcpdump-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-devel-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-devel-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-devel-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-docs-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-macros-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-obs-build-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-obs-build-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-source-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-syms-5.14.21-150400.24.170.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-syms-5.14.21-150400.24.170.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Manager Proxy 4.3:kernel-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Manager Proxy 4.3:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
            "SUSE Manager Proxy 4.3:kernel-default-devel-5.14.21-150400.24.170.2.x86_64",
            "SUSE Manager Proxy 4.3:kernel-devel-5.14.21-150400.24.170.1.noarch",
            "SUSE Manager Proxy 4.3:kernel-macros-5.14.21-150400.24.170.1.noarch",
            "SUSE Manager Proxy 4.3:kernel-source-5.14.21-150400.24.170.1.noarch",
            "SUSE Manager Proxy 4.3:kernel-syms-5.14.21-150400.24.170.1.x86_64",
            "SUSE Manager Server 4.3:kernel-default-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Manager Server 4.3:kernel-default-5.14.21-150400.24.170.2.s390x",
            "SUSE Manager Server 4.3:kernel-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Manager Server 4.3:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.ppc64le",
            "SUSE Manager Server 4.3:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
            "SUSE Manager Server 4.3:kernel-default-devel-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Manager Server 4.3:kernel-default-devel-5.14.21-150400.24.170.2.s390x",
            "SUSE Manager Server 4.3:kernel-default-devel-5.14.21-150400.24.170.2.x86_64",
            "SUSE Manager Server 4.3:kernel-devel-5.14.21-150400.24.170.1.noarch",
            "SUSE Manager Server 4.3:kernel-macros-5.14.21-150400.24.170.1.noarch",
            "SUSE Manager Server 4.3:kernel-source-5.14.21-150400.24.170.1.noarch",
            "SUSE Manager Server 4.3:kernel-syms-5.14.21-150400.24.170.1.ppc64le",
            "SUSE Manager Server 4.3:kernel-syms-5.14.21-150400.24.170.1.s390x",
            "SUSE Manager Server 4.3:kernel-syms-5.14.21-150400.24.170.1.x86_64",
            "SUSE Manager Server 4.3:kernel-zfcpdump-5.14.21-150400.24.170.2.s390x"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 5.5,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
            "version": "3.1"
          },
          "products": [
            "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-64kb-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-64kb-devel-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-devel-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-devel-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-devel-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-docs-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-macros-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-obs-build-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-obs-build-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-source-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-syms-5.14.21-150400.24.170.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-syms-5.14.21-150400.24.170.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:reiserfs-kmp-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:reiserfs-kmp-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-64kb-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-64kb-devel-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-devel-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-docs-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-macros-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-source-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.170.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.170.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_170-default-1-150400.9.3.2.ppc64le",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_170-default-1-150400.9.3.2.s390x",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_170-default-1-150400.9.3.2.x86_64",
            "SUSE Linux Enterprise Micro 5.3:kernel-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise Micro 5.3:kernel-default-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise Micro 5.3:kernel-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Micro 5.3:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.aarch64",
            "SUSE Linux Enterprise Micro 5.3:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
            "SUSE Linux Enterprise Micro 5.4:kernel-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise Micro 5.4:kernel-default-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise Micro 5.4:kernel-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Micro 5.4:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.aarch64",
            "SUSE Linux Enterprise Micro 5.4:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-64kb-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-64kb-devel-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.aarch64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.ppc64le",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-devel-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-docs-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-macros-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-source-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.170.1.aarch64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.170.1.ppc64le",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.170.1.s390x",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.170.1.x86_64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-zfcpdump-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-devel-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-devel-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-devel-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-docs-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-macros-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-obs-build-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-obs-build-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-source-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-syms-5.14.21-150400.24.170.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-syms-5.14.21-150400.24.170.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Manager Proxy 4.3:kernel-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Manager Proxy 4.3:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
            "SUSE Manager Proxy 4.3:kernel-default-devel-5.14.21-150400.24.170.2.x86_64",
            "SUSE Manager Proxy 4.3:kernel-devel-5.14.21-150400.24.170.1.noarch",
            "SUSE Manager Proxy 4.3:kernel-macros-5.14.21-150400.24.170.1.noarch",
            "SUSE Manager Proxy 4.3:kernel-source-5.14.21-150400.24.170.1.noarch",
            "SUSE Manager Proxy 4.3:kernel-syms-5.14.21-150400.24.170.1.x86_64",
            "SUSE Manager Server 4.3:kernel-default-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Manager Server 4.3:kernel-default-5.14.21-150400.24.170.2.s390x",
            "SUSE Manager Server 4.3:kernel-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Manager Server 4.3:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.ppc64le",
            "SUSE Manager Server 4.3:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
            "SUSE Manager Server 4.3:kernel-default-devel-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Manager Server 4.3:kernel-default-devel-5.14.21-150400.24.170.2.s390x",
            "SUSE Manager Server 4.3:kernel-default-devel-5.14.21-150400.24.170.2.x86_64",
            "SUSE Manager Server 4.3:kernel-devel-5.14.21-150400.24.170.1.noarch",
            "SUSE Manager Server 4.3:kernel-macros-5.14.21-150400.24.170.1.noarch",
            "SUSE Manager Server 4.3:kernel-source-5.14.21-150400.24.170.1.noarch",
            "SUSE Manager Server 4.3:kernel-syms-5.14.21-150400.24.170.1.ppc64le",
            "SUSE Manager Server 4.3:kernel-syms-5.14.21-150400.24.170.1.s390x",
            "SUSE Manager Server 4.3:kernel-syms-5.14.21-150400.24.170.1.x86_64",
            "SUSE Manager Server 4.3:kernel-zfcpdump-5.14.21-150400.24.170.2.s390x"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2025-07-28T15:09:33Z",
          "details": "moderate"
        }
      ],
      "title": "CVE-2022-50031"
    },
    {
      "cve": "CVE-2022-50032",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2022-50032"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "In the Linux kernel, the following vulnerability has been resolved:\n\nusb: renesas: Fix refcount leak bug\n\nIn usbhs_rza1_hardware_init(), of_find_node_by_name() will return\na node pointer with refcount incremented. We should use of_node_put()\nwhen it is not used anymore.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.170.2.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.170.2.s390x",
          "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.170.2.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.170.2.s390x",
          "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.170.2.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.170.2.s390x",
          "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.170.2.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.170.2.s390x",
          "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-64kb-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-64kb-devel-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-devel-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-devel-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-devel-5.14.21-150400.24.170.1.noarch",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-docs-5.14.21-150400.24.170.1.noarch",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-macros-5.14.21-150400.24.170.1.noarch",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-obs-build-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-obs-build-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-source-5.14.21-150400.24.170.1.noarch",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-syms-5.14.21-150400.24.170.1.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-syms-5.14.21-150400.24.170.1.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:reiserfs-kmp-default-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:reiserfs-kmp-default-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-64kb-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-64kb-devel-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-devel-5.14.21-150400.24.170.1.noarch",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-docs-5.14.21-150400.24.170.1.noarch",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-macros-5.14.21-150400.24.170.1.noarch",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-source-5.14.21-150400.24.170.1.noarch",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.170.1.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.170.1.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.170.2.ppc64le",
          "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.170.2.s390x",
          "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.170.2.ppc64le",
          "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.170.2.s390x",
          "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_170-default-1-150400.9.3.2.ppc64le",
          "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_170-default-1-150400.9.3.2.s390x",
          "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_170-default-1-150400.9.3.2.x86_64",
          "SUSE Linux Enterprise Micro 5.3:kernel-default-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise Micro 5.3:kernel-default-5.14.21-150400.24.170.2.s390x",
          "SUSE Linux Enterprise Micro 5.3:kernel-default-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise Micro 5.3:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.aarch64",
          "SUSE Linux Enterprise Micro 5.3:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
          "SUSE Linux Enterprise Micro 5.4:kernel-default-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise Micro 5.4:kernel-default-5.14.21-150400.24.170.2.s390x",
          "SUSE Linux Enterprise Micro 5.4:kernel-default-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise Micro 5.4:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.aarch64",
          "SUSE Linux Enterprise Micro 5.4:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-64kb-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-64kb-devel-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-5.14.21-150400.24.170.2.ppc64le",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-5.14.21-150400.24.170.2.s390x",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.aarch64",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.ppc64le",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.170.2.ppc64le",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.170.2.s390x",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-devel-5.14.21-150400.24.170.1.noarch",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-docs-5.14.21-150400.24.170.1.noarch",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-macros-5.14.21-150400.24.170.1.noarch",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.170.2.ppc64le",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.170.2.s390x",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-source-5.14.21-150400.24.170.1.noarch",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.170.1.aarch64",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.170.1.ppc64le",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.170.1.s390x",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.170.1.x86_64",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-zfcpdump-5.14.21-150400.24.170.2.s390x",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.170.2.ppc64le",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.170.2.s390x",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-5.14.21-150400.24.170.2.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-devel-5.14.21-150400.24.170.2.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-devel-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-devel-5.14.21-150400.24.170.1.noarch",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-docs-5.14.21-150400.24.170.1.noarch",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-macros-5.14.21-150400.24.170.1.noarch",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-obs-build-5.14.21-150400.24.170.2.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-obs-build-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-source-5.14.21-150400.24.170.1.noarch",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-syms-5.14.21-150400.24.170.1.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-syms-5.14.21-150400.24.170.1.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.170.2.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.170.2.x86_64",
          "SUSE Manager Proxy 4.3:kernel-default-5.14.21-150400.24.170.2.x86_64",
          "SUSE Manager Proxy 4.3:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
          "SUSE Manager Proxy 4.3:kernel-default-devel-5.14.21-150400.24.170.2.x86_64",
          "SUSE Manager Proxy 4.3:kernel-devel-5.14.21-150400.24.170.1.noarch",
          "SUSE Manager Proxy 4.3:kernel-macros-5.14.21-150400.24.170.1.noarch",
          "SUSE Manager Proxy 4.3:kernel-source-5.14.21-150400.24.170.1.noarch",
          "SUSE Manager Proxy 4.3:kernel-syms-5.14.21-150400.24.170.1.x86_64",
          "SUSE Manager Server 4.3:kernel-default-5.14.21-150400.24.170.2.ppc64le",
          "SUSE Manager Server 4.3:kernel-default-5.14.21-150400.24.170.2.s390x",
          "SUSE Manager Server 4.3:kernel-default-5.14.21-150400.24.170.2.x86_64",
          "SUSE Manager Server 4.3:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.ppc64le",
          "SUSE Manager Server 4.3:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
          "SUSE Manager Server 4.3:kernel-default-devel-5.14.21-150400.24.170.2.ppc64le",
          "SUSE Manager Server 4.3:kernel-default-devel-5.14.21-150400.24.170.2.s390x",
          "SUSE Manager Server 4.3:kernel-default-devel-5.14.21-150400.24.170.2.x86_64",
          "SUSE Manager Server 4.3:kernel-devel-5.14.21-150400.24.170.1.noarch",
          "SUSE Manager Server 4.3:kernel-macros-5.14.21-150400.24.170.1.noarch",
          "SUSE Manager Server 4.3:kernel-source-5.14.21-150400.24.170.1.noarch",
          "SUSE Manager Server 4.3:kernel-syms-5.14.21-150400.24.170.1.ppc64le",
          "SUSE Manager Server 4.3:kernel-syms-5.14.21-150400.24.170.1.s390x",
          "SUSE Manager Server 4.3:kernel-syms-5.14.21-150400.24.170.1.x86_64",
          "SUSE Manager Server 4.3:kernel-zfcpdump-5.14.21-150400.24.170.2.s390x"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2022-50032",
          "url": "https://www.suse.com/security/cve/CVE-2022-50032"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1245103 for CVE-2022-50032",
          "url": "https://bugzilla.suse.com/1245103"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-64kb-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-64kb-devel-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-devel-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-devel-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-devel-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-docs-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-macros-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-obs-build-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-obs-build-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-source-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-syms-5.14.21-150400.24.170.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-syms-5.14.21-150400.24.170.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:reiserfs-kmp-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:reiserfs-kmp-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-64kb-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-64kb-devel-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-devel-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-docs-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-macros-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-source-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.170.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.170.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_170-default-1-150400.9.3.2.ppc64le",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_170-default-1-150400.9.3.2.s390x",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_170-default-1-150400.9.3.2.x86_64",
            "SUSE Linux Enterprise Micro 5.3:kernel-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise Micro 5.3:kernel-default-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise Micro 5.3:kernel-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Micro 5.3:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.aarch64",
            "SUSE Linux Enterprise Micro 5.3:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
            "SUSE Linux Enterprise Micro 5.4:kernel-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise Micro 5.4:kernel-default-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise Micro 5.4:kernel-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Micro 5.4:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.aarch64",
            "SUSE Linux Enterprise Micro 5.4:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-64kb-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-64kb-devel-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.aarch64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.ppc64le",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-devel-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-docs-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-macros-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-source-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.170.1.aarch64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.170.1.ppc64le",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.170.1.s390x",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.170.1.x86_64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-zfcpdump-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-devel-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-devel-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-devel-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-docs-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-macros-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-obs-build-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-obs-build-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-source-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-syms-5.14.21-150400.24.170.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-syms-5.14.21-150400.24.170.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Manager Proxy 4.3:kernel-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Manager Proxy 4.3:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
            "SUSE Manager Proxy 4.3:kernel-default-devel-5.14.21-150400.24.170.2.x86_64",
            "SUSE Manager Proxy 4.3:kernel-devel-5.14.21-150400.24.170.1.noarch",
            "SUSE Manager Proxy 4.3:kernel-macros-5.14.21-150400.24.170.1.noarch",
            "SUSE Manager Proxy 4.3:kernel-source-5.14.21-150400.24.170.1.noarch",
            "SUSE Manager Proxy 4.3:kernel-syms-5.14.21-150400.24.170.1.x86_64",
            "SUSE Manager Server 4.3:kernel-default-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Manager Server 4.3:kernel-default-5.14.21-150400.24.170.2.s390x",
            "SUSE Manager Server 4.3:kernel-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Manager Server 4.3:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.ppc64le",
            "SUSE Manager Server 4.3:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
            "SUSE Manager Server 4.3:kernel-default-devel-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Manager Server 4.3:kernel-default-devel-5.14.21-150400.24.170.2.s390x",
            "SUSE Manager Server 4.3:kernel-default-devel-5.14.21-150400.24.170.2.x86_64",
            "SUSE Manager Server 4.3:kernel-devel-5.14.21-150400.24.170.1.noarch",
            "SUSE Manager Server 4.3:kernel-macros-5.14.21-150400.24.170.1.noarch",
            "SUSE Manager Server 4.3:kernel-source-5.14.21-150400.24.170.1.noarch",
            "SUSE Manager Server 4.3:kernel-syms-5.14.21-150400.24.170.1.ppc64le",
            "SUSE Manager Server 4.3:kernel-syms-5.14.21-150400.24.170.1.s390x",
            "SUSE Manager Server 4.3:kernel-syms-5.14.21-150400.24.170.1.x86_64",
            "SUSE Manager Server 4.3:kernel-zfcpdump-5.14.21-150400.24.170.2.s390x"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 5.5,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
            "version": "3.1"
          },
          "products": [
            "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-64kb-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-64kb-devel-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-devel-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-devel-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-devel-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-docs-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-macros-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-obs-build-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-obs-build-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-source-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-syms-5.14.21-150400.24.170.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-syms-5.14.21-150400.24.170.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:reiserfs-kmp-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:reiserfs-kmp-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-64kb-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-64kb-devel-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-devel-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-docs-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-macros-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-source-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.170.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.170.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_170-default-1-150400.9.3.2.ppc64le",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_170-default-1-150400.9.3.2.s390x",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_170-default-1-150400.9.3.2.x86_64",
            "SUSE Linux Enterprise Micro 5.3:kernel-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise Micro 5.3:kernel-default-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise Micro 5.3:kernel-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Micro 5.3:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.aarch64",
            "SUSE Linux Enterprise Micro 5.3:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
            "SUSE Linux Enterprise Micro 5.4:kernel-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise Micro 5.4:kernel-default-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise Micro 5.4:kernel-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Micro 5.4:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.aarch64",
            "SUSE Linux Enterprise Micro 5.4:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-64kb-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-64kb-devel-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.aarch64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.ppc64le",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-devel-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-docs-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-macros-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-source-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.170.1.aarch64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.170.1.ppc64le",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.170.1.s390x",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.170.1.x86_64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-zfcpdump-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-devel-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-devel-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-devel-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-docs-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-macros-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-obs-build-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-obs-build-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-source-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-syms-5.14.21-150400.24.170.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-syms-5.14.21-150400.24.170.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Manager Proxy 4.3:kernel-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Manager Proxy 4.3:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
            "SUSE Manager Proxy 4.3:kernel-default-devel-5.14.21-150400.24.170.2.x86_64",
            "SUSE Manager Proxy 4.3:kernel-devel-5.14.21-150400.24.170.1.noarch",
            "SUSE Manager Proxy 4.3:kernel-macros-5.14.21-150400.24.170.1.noarch",
            "SUSE Manager Proxy 4.3:kernel-source-5.14.21-150400.24.170.1.noarch",
            "SUSE Manager Proxy 4.3:kernel-syms-5.14.21-150400.24.170.1.x86_64",
            "SUSE Manager Server 4.3:kernel-default-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Manager Server 4.3:kernel-default-5.14.21-150400.24.170.2.s390x",
            "SUSE Manager Server 4.3:kernel-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Manager Server 4.3:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.ppc64le",
            "SUSE Manager Server 4.3:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
            "SUSE Manager Server 4.3:kernel-default-devel-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Manager Server 4.3:kernel-default-devel-5.14.21-150400.24.170.2.s390x",
            "SUSE Manager Server 4.3:kernel-default-devel-5.14.21-150400.24.170.2.x86_64",
            "SUSE Manager Server 4.3:kernel-devel-5.14.21-150400.24.170.1.noarch",
            "SUSE Manager Server 4.3:kernel-macros-5.14.21-150400.24.170.1.noarch",
            "SUSE Manager Server 4.3:kernel-source-5.14.21-150400.24.170.1.noarch",
            "SUSE Manager Server 4.3:kernel-syms-5.14.21-150400.24.170.1.ppc64le",
            "SUSE Manager Server 4.3:kernel-syms-5.14.21-150400.24.170.1.s390x",
            "SUSE Manager Server 4.3:kernel-syms-5.14.21-150400.24.170.1.x86_64",
            "SUSE Manager Server 4.3:kernel-zfcpdump-5.14.21-150400.24.170.2.s390x"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2025-07-28T15:09:33Z",
          "details": "moderate"
        }
      ],
      "title": "CVE-2022-50032"
    },
    {
      "cve": "CVE-2022-50033",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2022-50033"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "In the Linux kernel, the following vulnerability has been resolved:\n\nusb: host: ohci-ppc-of: Fix refcount leak bug\n\nIn ohci_hcd_ppc_of_probe(), of_find_compatible_node() will return\na node pointer with refcount incremented. We should use of_node_put()\nwhen it is not used anymore.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.170.2.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.170.2.s390x",
          "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.170.2.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.170.2.s390x",
          "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.170.2.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.170.2.s390x",
          "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.170.2.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.170.2.s390x",
          "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-64kb-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-64kb-devel-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-devel-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-devel-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-devel-5.14.21-150400.24.170.1.noarch",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-docs-5.14.21-150400.24.170.1.noarch",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-macros-5.14.21-150400.24.170.1.noarch",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-obs-build-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-obs-build-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-source-5.14.21-150400.24.170.1.noarch",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-syms-5.14.21-150400.24.170.1.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-syms-5.14.21-150400.24.170.1.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:reiserfs-kmp-default-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:reiserfs-kmp-default-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-64kb-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-64kb-devel-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-devel-5.14.21-150400.24.170.1.noarch",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-docs-5.14.21-150400.24.170.1.noarch",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-macros-5.14.21-150400.24.170.1.noarch",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-source-5.14.21-150400.24.170.1.noarch",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.170.1.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.170.1.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.170.2.ppc64le",
          "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.170.2.s390x",
          "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.170.2.ppc64le",
          "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.170.2.s390x",
          "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_170-default-1-150400.9.3.2.ppc64le",
          "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_170-default-1-150400.9.3.2.s390x",
          "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_170-default-1-150400.9.3.2.x86_64",
          "SUSE Linux Enterprise Micro 5.3:kernel-default-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise Micro 5.3:kernel-default-5.14.21-150400.24.170.2.s390x",
          "SUSE Linux Enterprise Micro 5.3:kernel-default-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise Micro 5.3:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.aarch64",
          "SUSE Linux Enterprise Micro 5.3:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
          "SUSE Linux Enterprise Micro 5.4:kernel-default-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise Micro 5.4:kernel-default-5.14.21-150400.24.170.2.s390x",
          "SUSE Linux Enterprise Micro 5.4:kernel-default-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise Micro 5.4:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.aarch64",
          "SUSE Linux Enterprise Micro 5.4:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-64kb-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-64kb-devel-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-5.14.21-150400.24.170.2.ppc64le",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-5.14.21-150400.24.170.2.s390x",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.aarch64",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.ppc64le",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.170.2.ppc64le",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.170.2.s390x",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-devel-5.14.21-150400.24.170.1.noarch",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-docs-5.14.21-150400.24.170.1.noarch",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-macros-5.14.21-150400.24.170.1.noarch",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.170.2.ppc64le",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.170.2.s390x",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-source-5.14.21-150400.24.170.1.noarch",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.170.1.aarch64",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.170.1.ppc64le",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.170.1.s390x",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.170.1.x86_64",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-zfcpdump-5.14.21-150400.24.170.2.s390x",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.170.2.ppc64le",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.170.2.s390x",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-5.14.21-150400.24.170.2.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-devel-5.14.21-150400.24.170.2.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-devel-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-devel-5.14.21-150400.24.170.1.noarch",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-docs-5.14.21-150400.24.170.1.noarch",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-macros-5.14.21-150400.24.170.1.noarch",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-obs-build-5.14.21-150400.24.170.2.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-obs-build-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-source-5.14.21-150400.24.170.1.noarch",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-syms-5.14.21-150400.24.170.1.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-syms-5.14.21-150400.24.170.1.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.170.2.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.170.2.x86_64",
          "SUSE Manager Proxy 4.3:kernel-default-5.14.21-150400.24.170.2.x86_64",
          "SUSE Manager Proxy 4.3:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
          "SUSE Manager Proxy 4.3:kernel-default-devel-5.14.21-150400.24.170.2.x86_64",
          "SUSE Manager Proxy 4.3:kernel-devel-5.14.21-150400.24.170.1.noarch",
          "SUSE Manager Proxy 4.3:kernel-macros-5.14.21-150400.24.170.1.noarch",
          "SUSE Manager Proxy 4.3:kernel-source-5.14.21-150400.24.170.1.noarch",
          "SUSE Manager Proxy 4.3:kernel-syms-5.14.21-150400.24.170.1.x86_64",
          "SUSE Manager Server 4.3:kernel-default-5.14.21-150400.24.170.2.ppc64le",
          "SUSE Manager Server 4.3:kernel-default-5.14.21-150400.24.170.2.s390x",
          "SUSE Manager Server 4.3:kernel-default-5.14.21-150400.24.170.2.x86_64",
          "SUSE Manager Server 4.3:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.ppc64le",
          "SUSE Manager Server 4.3:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
          "SUSE Manager Server 4.3:kernel-default-devel-5.14.21-150400.24.170.2.ppc64le",
          "SUSE Manager Server 4.3:kernel-default-devel-5.14.21-150400.24.170.2.s390x",
          "SUSE Manager Server 4.3:kernel-default-devel-5.14.21-150400.24.170.2.x86_64",
          "SUSE Manager Server 4.3:kernel-devel-5.14.21-150400.24.170.1.noarch",
          "SUSE Manager Server 4.3:kernel-macros-5.14.21-150400.24.170.1.noarch",
          "SUSE Manager Server 4.3:kernel-source-5.14.21-150400.24.170.1.noarch",
          "SUSE Manager Server 4.3:kernel-syms-5.14.21-150400.24.170.1.ppc64le",
          "SUSE Manager Server 4.3:kernel-syms-5.14.21-150400.24.170.1.s390x",
          "SUSE Manager Server 4.3:kernel-syms-5.14.21-150400.24.170.1.x86_64",
          "SUSE Manager Server 4.3:kernel-zfcpdump-5.14.21-150400.24.170.2.s390x"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2022-50033",
          "url": "https://www.suse.com/security/cve/CVE-2022-50033"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1245139 for CVE-2022-50033",
          "url": "https://bugzilla.suse.com/1245139"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-64kb-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-64kb-devel-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-devel-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-devel-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-devel-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-docs-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-macros-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-obs-build-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-obs-build-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-source-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-syms-5.14.21-150400.24.170.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-syms-5.14.21-150400.24.170.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:reiserfs-kmp-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:reiserfs-kmp-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-64kb-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-64kb-devel-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-devel-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-docs-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-macros-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-source-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.170.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.170.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_170-default-1-150400.9.3.2.ppc64le",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_170-default-1-150400.9.3.2.s390x",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_170-default-1-150400.9.3.2.x86_64",
            "SUSE Linux Enterprise Micro 5.3:kernel-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise Micro 5.3:kernel-default-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise Micro 5.3:kernel-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Micro 5.3:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.aarch64",
            "SUSE Linux Enterprise Micro 5.3:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
            "SUSE Linux Enterprise Micro 5.4:kernel-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise Micro 5.4:kernel-default-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise Micro 5.4:kernel-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Micro 5.4:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.aarch64",
            "SUSE Linux Enterprise Micro 5.4:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-64kb-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-64kb-devel-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.aarch64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.ppc64le",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-devel-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-docs-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-macros-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-source-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.170.1.aarch64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.170.1.ppc64le",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.170.1.s390x",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.170.1.x86_64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-zfcpdump-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-devel-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-devel-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-devel-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-docs-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-macros-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-obs-build-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-obs-build-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-source-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-syms-5.14.21-150400.24.170.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-syms-5.14.21-150400.24.170.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Manager Proxy 4.3:kernel-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Manager Proxy 4.3:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
            "SUSE Manager Proxy 4.3:kernel-default-devel-5.14.21-150400.24.170.2.x86_64",
            "SUSE Manager Proxy 4.3:kernel-devel-5.14.21-150400.24.170.1.noarch",
            "SUSE Manager Proxy 4.3:kernel-macros-5.14.21-150400.24.170.1.noarch",
            "SUSE Manager Proxy 4.3:kernel-source-5.14.21-150400.24.170.1.noarch",
            "SUSE Manager Proxy 4.3:kernel-syms-5.14.21-150400.24.170.1.x86_64",
            "SUSE Manager Server 4.3:kernel-default-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Manager Server 4.3:kernel-default-5.14.21-150400.24.170.2.s390x",
            "SUSE Manager Server 4.3:kernel-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Manager Server 4.3:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.ppc64le",
            "SUSE Manager Server 4.3:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
            "SUSE Manager Server 4.3:kernel-default-devel-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Manager Server 4.3:kernel-default-devel-5.14.21-150400.24.170.2.s390x",
            "SUSE Manager Server 4.3:kernel-default-devel-5.14.21-150400.24.170.2.x86_64",
            "SUSE Manager Server 4.3:kernel-devel-5.14.21-150400.24.170.1.noarch",
            "SUSE Manager Server 4.3:kernel-macros-5.14.21-150400.24.170.1.noarch",
            "SUSE Manager Server 4.3:kernel-source-5.14.21-150400.24.170.1.noarch",
            "SUSE Manager Server 4.3:kernel-syms-5.14.21-150400.24.170.1.ppc64le",
            "SUSE Manager Server 4.3:kernel-syms-5.14.21-150400.24.170.1.s390x",
            "SUSE Manager Server 4.3:kernel-syms-5.14.21-150400.24.170.1.x86_64",
            "SUSE Manager Server 4.3:kernel-zfcpdump-5.14.21-150400.24.170.2.s390x"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 5.5,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
            "version": "3.1"
          },
          "products": [
            "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-64kb-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-64kb-devel-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-devel-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-devel-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-devel-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-docs-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-macros-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-obs-build-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-obs-build-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-source-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-syms-5.14.21-150400.24.170.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-syms-5.14.21-150400.24.170.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:reiserfs-kmp-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:reiserfs-kmp-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-64kb-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-64kb-devel-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-devel-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-docs-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-macros-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-source-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.170.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.170.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_170-default-1-150400.9.3.2.ppc64le",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_170-default-1-150400.9.3.2.s390x",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_170-default-1-150400.9.3.2.x86_64",
            "SUSE Linux Enterprise Micro 5.3:kernel-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise Micro 5.3:kernel-default-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise Micro 5.3:kernel-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Micro 5.3:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.aarch64",
            "SUSE Linux Enterprise Micro 5.3:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
            "SUSE Linux Enterprise Micro 5.4:kernel-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise Micro 5.4:kernel-default-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise Micro 5.4:kernel-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Micro 5.4:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.aarch64",
            "SUSE Linux Enterprise Micro 5.4:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-64kb-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-64kb-devel-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.aarch64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.ppc64le",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-devel-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-docs-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-macros-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-source-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.170.1.aarch64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.170.1.ppc64le",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.170.1.s390x",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.170.1.x86_64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-zfcpdump-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-devel-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-devel-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-devel-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-docs-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-macros-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-obs-build-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-obs-build-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-source-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-syms-5.14.21-150400.24.170.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-syms-5.14.21-150400.24.170.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Manager Proxy 4.3:kernel-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Manager Proxy 4.3:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
            "SUSE Manager Proxy 4.3:kernel-default-devel-5.14.21-150400.24.170.2.x86_64",
            "SUSE Manager Proxy 4.3:kernel-devel-5.14.21-150400.24.170.1.noarch",
            "SUSE Manager Proxy 4.3:kernel-macros-5.14.21-150400.24.170.1.noarch",
            "SUSE Manager Proxy 4.3:kernel-source-5.14.21-150400.24.170.1.noarch",
            "SUSE Manager Proxy 4.3:kernel-syms-5.14.21-150400.24.170.1.x86_64",
            "SUSE Manager Server 4.3:kernel-default-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Manager Server 4.3:kernel-default-5.14.21-150400.24.170.2.s390x",
            "SUSE Manager Server 4.3:kernel-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Manager Server 4.3:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.ppc64le",
            "SUSE Manager Server 4.3:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
            "SUSE Manager Server 4.3:kernel-default-devel-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Manager Server 4.3:kernel-default-devel-5.14.21-150400.24.170.2.s390x",
            "SUSE Manager Server 4.3:kernel-default-devel-5.14.21-150400.24.170.2.x86_64",
            "SUSE Manager Server 4.3:kernel-devel-5.14.21-150400.24.170.1.noarch",
            "SUSE Manager Server 4.3:kernel-macros-5.14.21-150400.24.170.1.noarch",
            "SUSE Manager Server 4.3:kernel-source-5.14.21-150400.24.170.1.noarch",
            "SUSE Manager Server 4.3:kernel-syms-5.14.21-150400.24.170.1.ppc64le",
            "SUSE Manager Server 4.3:kernel-syms-5.14.21-150400.24.170.1.s390x",
            "SUSE Manager Server 4.3:kernel-syms-5.14.21-150400.24.170.1.x86_64",
            "SUSE Manager Server 4.3:kernel-zfcpdump-5.14.21-150400.24.170.2.s390x"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2025-07-28T15:09:33Z",
          "details": "moderate"
        }
      ],
      "title": "CVE-2022-50033"
    },
    {
      "cve": "CVE-2022-50034",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2022-50034"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "In the Linux kernel, the following vulnerability has been resolved:\n\nusb: cdns3 fix use-after-free at workaround 2\n\nBUG: KFENCE: use-after-free read in __list_del_entry_valid+0x10/0xac\n\ncdns3_wa2_remove_old_request()\n{\n\t...\n\tkfree(priv_req-\u003erequest.buf);\n\tcdns3_gadget_ep_free_request(\u0026priv_ep-\u003eendpoint, \u0026priv_req-\u003erequest);\n\tlist_del_init(\u0026priv_req-\u003elist);\n\t^^^ use after free\n\t...\n}\n\ncdns3_gadget_ep_free_request() free the space pointed by priv_req,\nbut priv_req is used in the following list_del_init().\n\nThis patch move list_del_init() before cdns3_gadget_ep_free_request().",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.170.2.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.170.2.s390x",
          "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.170.2.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.170.2.s390x",
          "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.170.2.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.170.2.s390x",
          "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.170.2.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.170.2.s390x",
          "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-64kb-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-64kb-devel-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-devel-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-devel-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-devel-5.14.21-150400.24.170.1.noarch",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-docs-5.14.21-150400.24.170.1.noarch",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-macros-5.14.21-150400.24.170.1.noarch",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-obs-build-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-obs-build-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-source-5.14.21-150400.24.170.1.noarch",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-syms-5.14.21-150400.24.170.1.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-syms-5.14.21-150400.24.170.1.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:reiserfs-kmp-default-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:reiserfs-kmp-default-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-64kb-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-64kb-devel-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-devel-5.14.21-150400.24.170.1.noarch",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-docs-5.14.21-150400.24.170.1.noarch",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-macros-5.14.21-150400.24.170.1.noarch",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-source-5.14.21-150400.24.170.1.noarch",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.170.1.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.170.1.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.170.2.ppc64le",
          "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.170.2.s390x",
          "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.170.2.ppc64le",
          "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.170.2.s390x",
          "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_170-default-1-150400.9.3.2.ppc64le",
          "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_170-default-1-150400.9.3.2.s390x",
          "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_170-default-1-150400.9.3.2.x86_64",
          "SUSE Linux Enterprise Micro 5.3:kernel-default-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise Micro 5.3:kernel-default-5.14.21-150400.24.170.2.s390x",
          "SUSE Linux Enterprise Micro 5.3:kernel-default-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise Micro 5.3:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.aarch64",
          "SUSE Linux Enterprise Micro 5.3:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
          "SUSE Linux Enterprise Micro 5.4:kernel-default-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise Micro 5.4:kernel-default-5.14.21-150400.24.170.2.s390x",
          "SUSE Linux Enterprise Micro 5.4:kernel-default-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise Micro 5.4:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.aarch64",
          "SUSE Linux Enterprise Micro 5.4:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-64kb-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-64kb-devel-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-5.14.21-150400.24.170.2.ppc64le",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-5.14.21-150400.24.170.2.s390x",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.aarch64",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.ppc64le",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.170.2.ppc64le",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.170.2.s390x",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-devel-5.14.21-150400.24.170.1.noarch",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-docs-5.14.21-150400.24.170.1.noarch",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-macros-5.14.21-150400.24.170.1.noarch",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.170.2.ppc64le",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.170.2.s390x",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-source-5.14.21-150400.24.170.1.noarch",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.170.1.aarch64",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.170.1.ppc64le",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.170.1.s390x",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.170.1.x86_64",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-zfcpdump-5.14.21-150400.24.170.2.s390x",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.170.2.ppc64le",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.170.2.s390x",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-5.14.21-150400.24.170.2.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-devel-5.14.21-150400.24.170.2.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-devel-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-devel-5.14.21-150400.24.170.1.noarch",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-docs-5.14.21-150400.24.170.1.noarch",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-macros-5.14.21-150400.24.170.1.noarch",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-obs-build-5.14.21-150400.24.170.2.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-obs-build-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-source-5.14.21-150400.24.170.1.noarch",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-syms-5.14.21-150400.24.170.1.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-syms-5.14.21-150400.24.170.1.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.170.2.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.170.2.x86_64",
          "SUSE Manager Proxy 4.3:kernel-default-5.14.21-150400.24.170.2.x86_64",
          "SUSE Manager Proxy 4.3:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
          "SUSE Manager Proxy 4.3:kernel-default-devel-5.14.21-150400.24.170.2.x86_64",
          "SUSE Manager Proxy 4.3:kernel-devel-5.14.21-150400.24.170.1.noarch",
          "SUSE Manager Proxy 4.3:kernel-macros-5.14.21-150400.24.170.1.noarch",
          "SUSE Manager Proxy 4.3:kernel-source-5.14.21-150400.24.170.1.noarch",
          "SUSE Manager Proxy 4.3:kernel-syms-5.14.21-150400.24.170.1.x86_64",
          "SUSE Manager Server 4.3:kernel-default-5.14.21-150400.24.170.2.ppc64le",
          "SUSE Manager Server 4.3:kernel-default-5.14.21-150400.24.170.2.s390x",
          "SUSE Manager Server 4.3:kernel-default-5.14.21-150400.24.170.2.x86_64",
          "SUSE Manager Server 4.3:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.ppc64le",
          "SUSE Manager Server 4.3:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
          "SUSE Manager Server 4.3:kernel-default-devel-5.14.21-150400.24.170.2.ppc64le",
          "SUSE Manager Server 4.3:kernel-default-devel-5.14.21-150400.24.170.2.s390x",
          "SUSE Manager Server 4.3:kernel-default-devel-5.14.21-150400.24.170.2.x86_64",
          "SUSE Manager Server 4.3:kernel-devel-5.14.21-150400.24.170.1.noarch",
          "SUSE Manager Server 4.3:kernel-macros-5.14.21-150400.24.170.1.noarch",
          "SUSE Manager Server 4.3:kernel-source-5.14.21-150400.24.170.1.noarch",
          "SUSE Manager Server 4.3:kernel-syms-5.14.21-150400.24.170.1.ppc64le",
          "SUSE Manager Server 4.3:kernel-syms-5.14.21-150400.24.170.1.s390x",
          "SUSE Manager Server 4.3:kernel-syms-5.14.21-150400.24.170.1.x86_64",
          "SUSE Manager Server 4.3:kernel-zfcpdump-5.14.21-150400.24.170.2.s390x"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2022-50034",
          "url": "https://www.suse.com/security/cve/CVE-2022-50034"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1245089 for CVE-2022-50034",
          "url": "https://bugzilla.suse.com/1245089"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-64kb-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-64kb-devel-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-devel-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-devel-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-devel-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-docs-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-macros-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-obs-build-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-obs-build-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-source-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-syms-5.14.21-150400.24.170.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-syms-5.14.21-150400.24.170.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:reiserfs-kmp-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:reiserfs-kmp-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-64kb-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-64kb-devel-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-devel-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-docs-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-macros-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-source-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.170.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.170.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_170-default-1-150400.9.3.2.ppc64le",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_170-default-1-150400.9.3.2.s390x",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_170-default-1-150400.9.3.2.x86_64",
            "SUSE Linux Enterprise Micro 5.3:kernel-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise Micro 5.3:kernel-default-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise Micro 5.3:kernel-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Micro 5.3:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.aarch64",
            "SUSE Linux Enterprise Micro 5.3:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
            "SUSE Linux Enterprise Micro 5.4:kernel-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise Micro 5.4:kernel-default-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise Micro 5.4:kernel-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Micro 5.4:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.aarch64",
            "SUSE Linux Enterprise Micro 5.4:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-64kb-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-64kb-devel-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.aarch64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.ppc64le",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-devel-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-docs-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-macros-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-source-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.170.1.aarch64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.170.1.ppc64le",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.170.1.s390x",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.170.1.x86_64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-zfcpdump-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-devel-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-devel-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-devel-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-docs-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-macros-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-obs-build-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-obs-build-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-source-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-syms-5.14.21-150400.24.170.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-syms-5.14.21-150400.24.170.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Manager Proxy 4.3:kernel-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Manager Proxy 4.3:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
            "SUSE Manager Proxy 4.3:kernel-default-devel-5.14.21-150400.24.170.2.x86_64",
            "SUSE Manager Proxy 4.3:kernel-devel-5.14.21-150400.24.170.1.noarch",
            "SUSE Manager Proxy 4.3:kernel-macros-5.14.21-150400.24.170.1.noarch",
            "SUSE Manager Proxy 4.3:kernel-source-5.14.21-150400.24.170.1.noarch",
            "SUSE Manager Proxy 4.3:kernel-syms-5.14.21-150400.24.170.1.x86_64",
            "SUSE Manager Server 4.3:kernel-default-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Manager Server 4.3:kernel-default-5.14.21-150400.24.170.2.s390x",
            "SUSE Manager Server 4.3:kernel-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Manager Server 4.3:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.ppc64le",
            "SUSE Manager Server 4.3:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
            "SUSE Manager Server 4.3:kernel-default-devel-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Manager Server 4.3:kernel-default-devel-5.14.21-150400.24.170.2.s390x",
            "SUSE Manager Server 4.3:kernel-default-devel-5.14.21-150400.24.170.2.x86_64",
            "SUSE Manager Server 4.3:kernel-devel-5.14.21-150400.24.170.1.noarch",
            "SUSE Manager Server 4.3:kernel-macros-5.14.21-150400.24.170.1.noarch",
            "SUSE Manager Server 4.3:kernel-source-5.14.21-150400.24.170.1.noarch",
            "SUSE Manager Server 4.3:kernel-syms-5.14.21-150400.24.170.1.ppc64le",
            "SUSE Manager Server 4.3:kernel-syms-5.14.21-150400.24.170.1.s390x",
            "SUSE Manager Server 4.3:kernel-syms-5.14.21-150400.24.170.1.x86_64",
            "SUSE Manager Server 4.3:kernel-zfcpdump-5.14.21-150400.24.170.2.s390x"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 5.5,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
            "version": "3.1"
          },
          "products": [
            "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-64kb-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-64kb-devel-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-devel-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-devel-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-devel-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-docs-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-macros-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-obs-build-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-obs-build-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-source-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-syms-5.14.21-150400.24.170.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-syms-5.14.21-150400.24.170.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:reiserfs-kmp-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:reiserfs-kmp-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-64kb-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-64kb-devel-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-devel-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-docs-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-macros-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-source-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.170.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.170.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_170-default-1-150400.9.3.2.ppc64le",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_170-default-1-150400.9.3.2.s390x",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_170-default-1-150400.9.3.2.x86_64",
            "SUSE Linux Enterprise Micro 5.3:kernel-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise Micro 5.3:kernel-default-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise Micro 5.3:kernel-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Micro 5.3:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.aarch64",
            "SUSE Linux Enterprise Micro 5.3:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
            "SUSE Linux Enterprise Micro 5.4:kernel-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise Micro 5.4:kernel-default-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise Micro 5.4:kernel-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Micro 5.4:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.aarch64",
            "SUSE Linux Enterprise Micro 5.4:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-64kb-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-64kb-devel-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.aarch64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.ppc64le",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-devel-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-docs-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-macros-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-source-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.170.1.aarch64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.170.1.ppc64le",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.170.1.s390x",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.170.1.x86_64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-zfcpdump-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-devel-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-devel-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-devel-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-docs-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-macros-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-obs-build-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-obs-build-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-source-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-syms-5.14.21-150400.24.170.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-syms-5.14.21-150400.24.170.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Manager Proxy 4.3:kernel-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Manager Proxy 4.3:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
            "SUSE Manager Proxy 4.3:kernel-default-devel-5.14.21-150400.24.170.2.x86_64",
            "SUSE Manager Proxy 4.3:kernel-devel-5.14.21-150400.24.170.1.noarch",
            "SUSE Manager Proxy 4.3:kernel-macros-5.14.21-150400.24.170.1.noarch",
            "SUSE Manager Proxy 4.3:kernel-source-5.14.21-150400.24.170.1.noarch",
            "SUSE Manager Proxy 4.3:kernel-syms-5.14.21-150400.24.170.1.x86_64",
            "SUSE Manager Server 4.3:kernel-default-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Manager Server 4.3:kernel-default-5.14.21-150400.24.170.2.s390x",
            "SUSE Manager Server 4.3:kernel-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Manager Server 4.3:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.ppc64le",
            "SUSE Manager Server 4.3:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
            "SUSE Manager Server 4.3:kernel-default-devel-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Manager Server 4.3:kernel-default-devel-5.14.21-150400.24.170.2.s390x",
            "SUSE Manager Server 4.3:kernel-default-devel-5.14.21-150400.24.170.2.x86_64",
            "SUSE Manager Server 4.3:kernel-devel-5.14.21-150400.24.170.1.noarch",
            "SUSE Manager Server 4.3:kernel-macros-5.14.21-150400.24.170.1.noarch",
            "SUSE Manager Server 4.3:kernel-source-5.14.21-150400.24.170.1.noarch",
            "SUSE Manager Server 4.3:kernel-syms-5.14.21-150400.24.170.1.ppc64le",
            "SUSE Manager Server 4.3:kernel-syms-5.14.21-150400.24.170.1.s390x",
            "SUSE Manager Server 4.3:kernel-syms-5.14.21-150400.24.170.1.x86_64",
            "SUSE Manager Server 4.3:kernel-zfcpdump-5.14.21-150400.24.170.2.s390x"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2025-07-28T15:09:33Z",
          "details": "moderate"
        }
      ],
      "title": "CVE-2022-50034"
    },
    {
      "cve": "CVE-2022-50036",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2022-50036"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "In the Linux kernel, the following vulnerability has been resolved:\n\ndrm/sun4i: dsi: Prevent underflow when computing packet sizes\n\nCurrently, the packet overhead is subtracted using unsigned arithmetic.\nWith a short sync pulse, this could underflow and wrap around to near\nthe maximal u16 value. Fix this by using signed subtraction. The call to\nmax() will correctly handle any negative numbers that are produced.\n\nApply the same fix to the other timings, even though those subtractions\nare less likely to underflow.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.170.2.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.170.2.s390x",
          "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.170.2.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.170.2.s390x",
          "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.170.2.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.170.2.s390x",
          "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.170.2.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.170.2.s390x",
          "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-64kb-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-64kb-devel-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-devel-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-devel-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-devel-5.14.21-150400.24.170.1.noarch",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-docs-5.14.21-150400.24.170.1.noarch",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-macros-5.14.21-150400.24.170.1.noarch",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-obs-build-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-obs-build-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-source-5.14.21-150400.24.170.1.noarch",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-syms-5.14.21-150400.24.170.1.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-syms-5.14.21-150400.24.170.1.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:reiserfs-kmp-default-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:reiserfs-kmp-default-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-64kb-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-64kb-devel-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-devel-5.14.21-150400.24.170.1.noarch",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-docs-5.14.21-150400.24.170.1.noarch",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-macros-5.14.21-150400.24.170.1.noarch",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-source-5.14.21-150400.24.170.1.noarch",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.170.1.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.170.1.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.170.2.ppc64le",
          "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.170.2.s390x",
          "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.170.2.ppc64le",
          "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.170.2.s390x",
          "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_170-default-1-150400.9.3.2.ppc64le",
          "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_170-default-1-150400.9.3.2.s390x",
          "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_170-default-1-150400.9.3.2.x86_64",
          "SUSE Linux Enterprise Micro 5.3:kernel-default-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise Micro 5.3:kernel-default-5.14.21-150400.24.170.2.s390x",
          "SUSE Linux Enterprise Micro 5.3:kernel-default-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise Micro 5.3:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.aarch64",
          "SUSE Linux Enterprise Micro 5.3:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
          "SUSE Linux Enterprise Micro 5.4:kernel-default-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise Micro 5.4:kernel-default-5.14.21-150400.24.170.2.s390x",
          "SUSE Linux Enterprise Micro 5.4:kernel-default-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise Micro 5.4:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.aarch64",
          "SUSE Linux Enterprise Micro 5.4:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-64kb-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-64kb-devel-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-5.14.21-150400.24.170.2.ppc64le",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-5.14.21-150400.24.170.2.s390x",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.aarch64",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.ppc64le",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.170.2.ppc64le",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.170.2.s390x",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-devel-5.14.21-150400.24.170.1.noarch",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-docs-5.14.21-150400.24.170.1.noarch",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-macros-5.14.21-150400.24.170.1.noarch",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.170.2.ppc64le",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.170.2.s390x",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-source-5.14.21-150400.24.170.1.noarch",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.170.1.aarch64",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.170.1.ppc64le",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.170.1.s390x",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.170.1.x86_64",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-zfcpdump-5.14.21-150400.24.170.2.s390x",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.170.2.ppc64le",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.170.2.s390x",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-5.14.21-150400.24.170.2.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-devel-5.14.21-150400.24.170.2.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-devel-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-devel-5.14.21-150400.24.170.1.noarch",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-docs-5.14.21-150400.24.170.1.noarch",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-macros-5.14.21-150400.24.170.1.noarch",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-obs-build-5.14.21-150400.24.170.2.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-obs-build-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-source-5.14.21-150400.24.170.1.noarch",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-syms-5.14.21-150400.24.170.1.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-syms-5.14.21-150400.24.170.1.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.170.2.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.170.2.x86_64",
          "SUSE Manager Proxy 4.3:kernel-default-5.14.21-150400.24.170.2.x86_64",
          "SUSE Manager Proxy 4.3:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
          "SUSE Manager Proxy 4.3:kernel-default-devel-5.14.21-150400.24.170.2.x86_64",
          "SUSE Manager Proxy 4.3:kernel-devel-5.14.21-150400.24.170.1.noarch",
          "SUSE Manager Proxy 4.3:kernel-macros-5.14.21-150400.24.170.1.noarch",
          "SUSE Manager Proxy 4.3:kernel-source-5.14.21-150400.24.170.1.noarch",
          "SUSE Manager Proxy 4.3:kernel-syms-5.14.21-150400.24.170.1.x86_64",
          "SUSE Manager Server 4.3:kernel-default-5.14.21-150400.24.170.2.ppc64le",
          "SUSE Manager Server 4.3:kernel-default-5.14.21-150400.24.170.2.s390x",
          "SUSE Manager Server 4.3:kernel-default-5.14.21-150400.24.170.2.x86_64",
          "SUSE Manager Server 4.3:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.ppc64le",
          "SUSE Manager Server 4.3:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
          "SUSE Manager Server 4.3:kernel-default-devel-5.14.21-150400.24.170.2.ppc64le",
          "SUSE Manager Server 4.3:kernel-default-devel-5.14.21-150400.24.170.2.s390x",
          "SUSE Manager Server 4.3:kernel-default-devel-5.14.21-150400.24.170.2.x86_64",
          "SUSE Manager Server 4.3:kernel-devel-5.14.21-150400.24.170.1.noarch",
          "SUSE Manager Server 4.3:kernel-macros-5.14.21-150400.24.170.1.noarch",
          "SUSE Manager Server 4.3:kernel-source-5.14.21-150400.24.170.1.noarch",
          "SUSE Manager Server 4.3:kernel-syms-5.14.21-150400.24.170.1.ppc64le",
          "SUSE Manager Server 4.3:kernel-syms-5.14.21-150400.24.170.1.s390x",
          "SUSE Manager Server 4.3:kernel-syms-5.14.21-150400.24.170.1.x86_64",
          "SUSE Manager Server 4.3:kernel-zfcpdump-5.14.21-150400.24.170.2.s390x"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2022-50036",
          "url": "https://www.suse.com/security/cve/CVE-2022-50036"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1244941 for CVE-2022-50036",
          "url": "https://bugzilla.suse.com/1244941"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-64kb-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-64kb-devel-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-devel-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-devel-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-devel-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-docs-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-macros-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-obs-build-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-obs-build-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-source-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-syms-5.14.21-150400.24.170.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-syms-5.14.21-150400.24.170.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:reiserfs-kmp-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:reiserfs-kmp-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-64kb-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-64kb-devel-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-devel-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-docs-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-macros-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-source-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.170.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.170.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_170-default-1-150400.9.3.2.ppc64le",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_170-default-1-150400.9.3.2.s390x",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_170-default-1-150400.9.3.2.x86_64",
            "SUSE Linux Enterprise Micro 5.3:kernel-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise Micro 5.3:kernel-default-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise Micro 5.3:kernel-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Micro 5.3:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.aarch64",
            "SUSE Linux Enterprise Micro 5.3:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
            "SUSE Linux Enterprise Micro 5.4:kernel-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise Micro 5.4:kernel-default-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise Micro 5.4:kernel-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Micro 5.4:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.aarch64",
            "SUSE Linux Enterprise Micro 5.4:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-64kb-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-64kb-devel-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.aarch64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.ppc64le",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-devel-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-docs-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-macros-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-source-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.170.1.aarch64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.170.1.ppc64le",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.170.1.s390x",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.170.1.x86_64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-zfcpdump-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-devel-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-devel-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-devel-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-docs-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-macros-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-obs-build-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-obs-build-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-source-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-syms-5.14.21-150400.24.170.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-syms-5.14.21-150400.24.170.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Manager Proxy 4.3:kernel-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Manager Proxy 4.3:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
            "SUSE Manager Proxy 4.3:kernel-default-devel-5.14.21-150400.24.170.2.x86_64",
            "SUSE Manager Proxy 4.3:kernel-devel-5.14.21-150400.24.170.1.noarch",
            "SUSE Manager Proxy 4.3:kernel-macros-5.14.21-150400.24.170.1.noarch",
            "SUSE Manager Proxy 4.3:kernel-source-5.14.21-150400.24.170.1.noarch",
            "SUSE Manager Proxy 4.3:kernel-syms-5.14.21-150400.24.170.1.x86_64",
            "SUSE Manager Server 4.3:kernel-default-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Manager Server 4.3:kernel-default-5.14.21-150400.24.170.2.s390x",
            "SUSE Manager Server 4.3:kernel-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Manager Server 4.3:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.ppc64le",
            "SUSE Manager Server 4.3:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
            "SUSE Manager Server 4.3:kernel-default-devel-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Manager Server 4.3:kernel-default-devel-5.14.21-150400.24.170.2.s390x",
            "SUSE Manager Server 4.3:kernel-default-devel-5.14.21-150400.24.170.2.x86_64",
            "SUSE Manager Server 4.3:kernel-devel-5.14.21-150400.24.170.1.noarch",
            "SUSE Manager Server 4.3:kernel-macros-5.14.21-150400.24.170.1.noarch",
            "SUSE Manager Server 4.3:kernel-source-5.14.21-150400.24.170.1.noarch",
            "SUSE Manager Server 4.3:kernel-syms-5.14.21-150400.24.170.1.ppc64le",
            "SUSE Manager Server 4.3:kernel-syms-5.14.21-150400.24.170.1.s390x",
            "SUSE Manager Server 4.3:kernel-syms-5.14.21-150400.24.170.1.x86_64",
            "SUSE Manager Server 4.3:kernel-zfcpdump-5.14.21-150400.24.170.2.s390x"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 5.5,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
            "version": "3.1"
          },
          "products": [
            "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-64kb-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-64kb-devel-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-devel-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-devel-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-devel-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-docs-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-macros-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-obs-build-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-obs-build-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-source-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-syms-5.14.21-150400.24.170.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-syms-5.14.21-150400.24.170.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:reiserfs-kmp-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:reiserfs-kmp-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-64kb-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-64kb-devel-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-devel-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-docs-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-macros-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-source-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.170.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.170.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_170-default-1-150400.9.3.2.ppc64le",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_170-default-1-150400.9.3.2.s390x",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_170-default-1-150400.9.3.2.x86_64",
            "SUSE Linux Enterprise Micro 5.3:kernel-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise Micro 5.3:kernel-default-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise Micro 5.3:kernel-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Micro 5.3:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.aarch64",
            "SUSE Linux Enterprise Micro 5.3:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
            "SUSE Linux Enterprise Micro 5.4:kernel-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise Micro 5.4:kernel-default-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise Micro 5.4:kernel-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Micro 5.4:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.aarch64",
            "SUSE Linux Enterprise Micro 5.4:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-64kb-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-64kb-devel-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.aarch64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.ppc64le",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-devel-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-docs-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-macros-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-source-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.170.1.aarch64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.170.1.ppc64le",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.170.1.s390x",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.170.1.x86_64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-zfcpdump-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-devel-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-devel-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-devel-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-docs-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-macros-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-obs-build-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-obs-build-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-source-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-syms-5.14.21-150400.24.170.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-syms-5.14.21-150400.24.170.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Manager Proxy 4.3:kernel-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Manager Proxy 4.3:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
            "SUSE Manager Proxy 4.3:kernel-default-devel-5.14.21-150400.24.170.2.x86_64",
            "SUSE Manager Proxy 4.3:kernel-devel-5.14.21-150400.24.170.1.noarch",
            "SUSE Manager Proxy 4.3:kernel-macros-5.14.21-150400.24.170.1.noarch",
            "SUSE Manager Proxy 4.3:kernel-source-5.14.21-150400.24.170.1.noarch",
            "SUSE Manager Proxy 4.3:kernel-syms-5.14.21-150400.24.170.1.x86_64",
            "SUSE Manager Server 4.3:kernel-default-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Manager Server 4.3:kernel-default-5.14.21-150400.24.170.2.s390x",
            "SUSE Manager Server 4.3:kernel-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Manager Server 4.3:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.ppc64le",
            "SUSE Manager Server 4.3:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
            "SUSE Manager Server 4.3:kernel-default-devel-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Manager Server 4.3:kernel-default-devel-5.14.21-150400.24.170.2.s390x",
            "SUSE Manager Server 4.3:kernel-default-devel-5.14.21-150400.24.170.2.x86_64",
            "SUSE Manager Server 4.3:kernel-devel-5.14.21-150400.24.170.1.noarch",
            "SUSE Manager Server 4.3:kernel-macros-5.14.21-150400.24.170.1.noarch",
            "SUSE Manager Server 4.3:kernel-source-5.14.21-150400.24.170.1.noarch",
            "SUSE Manager Server 4.3:kernel-syms-5.14.21-150400.24.170.1.ppc64le",
            "SUSE Manager Server 4.3:kernel-syms-5.14.21-150400.24.170.1.s390x",
            "SUSE Manager Server 4.3:kernel-syms-5.14.21-150400.24.170.1.x86_64",
            "SUSE Manager Server 4.3:kernel-zfcpdump-5.14.21-150400.24.170.2.s390x"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2025-07-28T15:09:33Z",
          "details": "moderate"
        }
      ],
      "title": "CVE-2022-50036"
    },
    {
      "cve": "CVE-2022-50038",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2022-50038"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "In the Linux kernel, the following vulnerability has been resolved:\n\ndrm/meson: Fix refcount bugs in meson_vpu_has_available_connectors()\n\nIn this function, there are two refcount leak bugs:\n(1) when breaking out of for_each_endpoint_of_node(), we need call\nthe of_node_put() for the \u0027ep\u0027;\n(2) we should call of_node_put() for the reference returned by\nof_graph_get_remote_port() when it is not used anymore.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.170.2.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.170.2.s390x",
          "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.170.2.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.170.2.s390x",
          "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.170.2.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.170.2.s390x",
          "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.170.2.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.170.2.s390x",
          "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-64kb-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-64kb-devel-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-devel-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-devel-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-devel-5.14.21-150400.24.170.1.noarch",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-docs-5.14.21-150400.24.170.1.noarch",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-macros-5.14.21-150400.24.170.1.noarch",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-obs-build-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-obs-build-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-source-5.14.21-150400.24.170.1.noarch",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-syms-5.14.21-150400.24.170.1.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-syms-5.14.21-150400.24.170.1.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:reiserfs-kmp-default-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:reiserfs-kmp-default-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-64kb-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-64kb-devel-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-devel-5.14.21-150400.24.170.1.noarch",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-docs-5.14.21-150400.24.170.1.noarch",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-macros-5.14.21-150400.24.170.1.noarch",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-source-5.14.21-150400.24.170.1.noarch",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.170.1.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.170.1.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.170.2.ppc64le",
          "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.170.2.s390x",
          "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.170.2.ppc64le",
          "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.170.2.s390x",
          "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_170-default-1-150400.9.3.2.ppc64le",
          "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_170-default-1-150400.9.3.2.s390x",
          "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_170-default-1-150400.9.3.2.x86_64",
          "SUSE Linux Enterprise Micro 5.3:kernel-default-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise Micro 5.3:kernel-default-5.14.21-150400.24.170.2.s390x",
          "SUSE Linux Enterprise Micro 5.3:kernel-default-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise Micro 5.3:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.aarch64",
          "SUSE Linux Enterprise Micro 5.3:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
          "SUSE Linux Enterprise Micro 5.4:kernel-default-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise Micro 5.4:kernel-default-5.14.21-150400.24.170.2.s390x",
          "SUSE Linux Enterprise Micro 5.4:kernel-default-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise Micro 5.4:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.aarch64",
          "SUSE Linux Enterprise Micro 5.4:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-64kb-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-64kb-devel-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-5.14.21-150400.24.170.2.ppc64le",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-5.14.21-150400.24.170.2.s390x",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.aarch64",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.ppc64le",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.170.2.ppc64le",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.170.2.s390x",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-devel-5.14.21-150400.24.170.1.noarch",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-docs-5.14.21-150400.24.170.1.noarch",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-macros-5.14.21-150400.24.170.1.noarch",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.170.2.ppc64le",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.170.2.s390x",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-source-5.14.21-150400.24.170.1.noarch",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.170.1.aarch64",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.170.1.ppc64le",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.170.1.s390x",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.170.1.x86_64",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-zfcpdump-5.14.21-150400.24.170.2.s390x",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.170.2.ppc64le",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.170.2.s390x",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-5.14.21-150400.24.170.2.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-devel-5.14.21-150400.24.170.2.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-devel-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-devel-5.14.21-150400.24.170.1.noarch",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-docs-5.14.21-150400.24.170.1.noarch",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-macros-5.14.21-150400.24.170.1.noarch",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-obs-build-5.14.21-150400.24.170.2.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-obs-build-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-source-5.14.21-150400.24.170.1.noarch",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-syms-5.14.21-150400.24.170.1.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-syms-5.14.21-150400.24.170.1.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.170.2.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.170.2.x86_64",
          "SUSE Manager Proxy 4.3:kernel-default-5.14.21-150400.24.170.2.x86_64",
          "SUSE Manager Proxy 4.3:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
          "SUSE Manager Proxy 4.3:kernel-default-devel-5.14.21-150400.24.170.2.x86_64",
          "SUSE Manager Proxy 4.3:kernel-devel-5.14.21-150400.24.170.1.noarch",
          "SUSE Manager Proxy 4.3:kernel-macros-5.14.21-150400.24.170.1.noarch",
          "SUSE Manager Proxy 4.3:kernel-source-5.14.21-150400.24.170.1.noarch",
          "SUSE Manager Proxy 4.3:kernel-syms-5.14.21-150400.24.170.1.x86_64",
          "SUSE Manager Server 4.3:kernel-default-5.14.21-150400.24.170.2.ppc64le",
          "SUSE Manager Server 4.3:kernel-default-5.14.21-150400.24.170.2.s390x",
          "SUSE Manager Server 4.3:kernel-default-5.14.21-150400.24.170.2.x86_64",
          "SUSE Manager Server 4.3:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.ppc64le",
          "SUSE Manager Server 4.3:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
          "SUSE Manager Server 4.3:kernel-default-devel-5.14.21-150400.24.170.2.ppc64le",
          "SUSE Manager Server 4.3:kernel-default-devel-5.14.21-150400.24.170.2.s390x",
          "SUSE Manager Server 4.3:kernel-default-devel-5.14.21-150400.24.170.2.x86_64",
          "SUSE Manager Server 4.3:kernel-devel-5.14.21-150400.24.170.1.noarch",
          "SUSE Manager Server 4.3:kernel-macros-5.14.21-150400.24.170.1.noarch",
          "SUSE Manager Server 4.3:kernel-source-5.14.21-150400.24.170.1.noarch",
          "SUSE Manager Server 4.3:kernel-syms-5.14.21-150400.24.170.1.ppc64le",
          "SUSE Manager Server 4.3:kernel-syms-5.14.21-150400.24.170.1.s390x",
          "SUSE Manager Server 4.3:kernel-syms-5.14.21-150400.24.170.1.x86_64",
          "SUSE Manager Server 4.3:kernel-zfcpdump-5.14.21-150400.24.170.2.s390x"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2022-50038",
          "url": "https://www.suse.com/security/cve/CVE-2022-50038"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1244943 for CVE-2022-50038",
          "url": "https://bugzilla.suse.com/1244943"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-64kb-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-64kb-devel-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-devel-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-devel-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-devel-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-docs-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-macros-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-obs-build-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-obs-build-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-source-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-syms-5.14.21-150400.24.170.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-syms-5.14.21-150400.24.170.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:reiserfs-kmp-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:reiserfs-kmp-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-64kb-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-64kb-devel-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-devel-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-docs-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-macros-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-source-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.170.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.170.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_170-default-1-150400.9.3.2.ppc64le",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_170-default-1-150400.9.3.2.s390x",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_170-default-1-150400.9.3.2.x86_64",
            "SUSE Linux Enterprise Micro 5.3:kernel-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise Micro 5.3:kernel-default-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise Micro 5.3:kernel-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Micro 5.3:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.aarch64",
            "SUSE Linux Enterprise Micro 5.3:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
            "SUSE Linux Enterprise Micro 5.4:kernel-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise Micro 5.4:kernel-default-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise Micro 5.4:kernel-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Micro 5.4:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.aarch64",
            "SUSE Linux Enterprise Micro 5.4:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-64kb-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-64kb-devel-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.aarch64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.ppc64le",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-devel-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-docs-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-macros-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-source-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.170.1.aarch64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.170.1.ppc64le",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.170.1.s390x",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.170.1.x86_64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-zfcpdump-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-devel-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-devel-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-devel-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-docs-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-macros-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-obs-build-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-obs-build-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-source-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-syms-5.14.21-150400.24.170.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-syms-5.14.21-150400.24.170.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Manager Proxy 4.3:kernel-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Manager Proxy 4.3:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
            "SUSE Manager Proxy 4.3:kernel-default-devel-5.14.21-150400.24.170.2.x86_64",
            "SUSE Manager Proxy 4.3:kernel-devel-5.14.21-150400.24.170.1.noarch",
            "SUSE Manager Proxy 4.3:kernel-macros-5.14.21-150400.24.170.1.noarch",
            "SUSE Manager Proxy 4.3:kernel-source-5.14.21-150400.24.170.1.noarch",
            "SUSE Manager Proxy 4.3:kernel-syms-5.14.21-150400.24.170.1.x86_64",
            "SUSE Manager Server 4.3:kernel-default-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Manager Server 4.3:kernel-default-5.14.21-150400.24.170.2.s390x",
            "SUSE Manager Server 4.3:kernel-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Manager Server 4.3:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.ppc64le",
            "SUSE Manager Server 4.3:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
            "SUSE Manager Server 4.3:kernel-default-devel-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Manager Server 4.3:kernel-default-devel-5.14.21-150400.24.170.2.s390x",
            "SUSE Manager Server 4.3:kernel-default-devel-5.14.21-150400.24.170.2.x86_64",
            "SUSE Manager Server 4.3:kernel-devel-5.14.21-150400.24.170.1.noarch",
            "SUSE Manager Server 4.3:kernel-macros-5.14.21-150400.24.170.1.noarch",
            "SUSE Manager Server 4.3:kernel-source-5.14.21-150400.24.170.1.noarch",
            "SUSE Manager Server 4.3:kernel-syms-5.14.21-150400.24.170.1.ppc64le",
            "SUSE Manager Server 4.3:kernel-syms-5.14.21-150400.24.170.1.s390x",
            "SUSE Manager Server 4.3:kernel-syms-5.14.21-150400.24.170.1.x86_64",
            "SUSE Manager Server 4.3:kernel-zfcpdump-5.14.21-150400.24.170.2.s390x"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 5.5,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
            "version": "3.1"
          },
          "products": [
            "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-64kb-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-64kb-devel-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-devel-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-devel-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-devel-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-docs-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-macros-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-obs-build-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-obs-build-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-source-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-syms-5.14.21-150400.24.170.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-syms-5.14.21-150400.24.170.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:reiserfs-kmp-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:reiserfs-kmp-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-64kb-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-64kb-devel-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-devel-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-docs-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-macros-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-source-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.170.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.170.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_170-default-1-150400.9.3.2.ppc64le",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_170-default-1-150400.9.3.2.s390x",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_170-default-1-150400.9.3.2.x86_64",
            "SUSE Linux Enterprise Micro 5.3:kernel-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise Micro 5.3:kernel-default-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise Micro 5.3:kernel-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Micro 5.3:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.aarch64",
            "SUSE Linux Enterprise Micro 5.3:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
            "SUSE Linux Enterprise Micro 5.4:kernel-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise Micro 5.4:kernel-default-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise Micro 5.4:kernel-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Micro 5.4:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.aarch64",
            "SUSE Linux Enterprise Micro 5.4:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-64kb-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-64kb-devel-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.aarch64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.ppc64le",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-devel-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-docs-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-macros-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-source-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.170.1.aarch64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.170.1.ppc64le",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.170.1.s390x",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.170.1.x86_64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-zfcpdump-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-devel-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-devel-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-devel-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-docs-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-macros-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-obs-build-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-obs-build-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-source-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-syms-5.14.21-150400.24.170.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-syms-5.14.21-150400.24.170.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Manager Proxy 4.3:kernel-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Manager Proxy 4.3:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
            "SUSE Manager Proxy 4.3:kernel-default-devel-5.14.21-150400.24.170.2.x86_64",
            "SUSE Manager Proxy 4.3:kernel-devel-5.14.21-150400.24.170.1.noarch",
            "SUSE Manager Proxy 4.3:kernel-macros-5.14.21-150400.24.170.1.noarch",
            "SUSE Manager Proxy 4.3:kernel-source-5.14.21-150400.24.170.1.noarch",
            "SUSE Manager Proxy 4.3:kernel-syms-5.14.21-150400.24.170.1.x86_64",
            "SUSE Manager Server 4.3:kernel-default-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Manager Server 4.3:kernel-default-5.14.21-150400.24.170.2.s390x",
            "SUSE Manager Server 4.3:kernel-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Manager Server 4.3:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.ppc64le",
            "SUSE Manager Server 4.3:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
            "SUSE Manager Server 4.3:kernel-default-devel-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Manager Server 4.3:kernel-default-devel-5.14.21-150400.24.170.2.s390x",
            "SUSE Manager Server 4.3:kernel-default-devel-5.14.21-150400.24.170.2.x86_64",
            "SUSE Manager Server 4.3:kernel-devel-5.14.21-150400.24.170.1.noarch",
            "SUSE Manager Server 4.3:kernel-macros-5.14.21-150400.24.170.1.noarch",
            "SUSE Manager Server 4.3:kernel-source-5.14.21-150400.24.170.1.noarch",
            "SUSE Manager Server 4.3:kernel-syms-5.14.21-150400.24.170.1.ppc64le",
            "SUSE Manager Server 4.3:kernel-syms-5.14.21-150400.24.170.1.s390x",
            "SUSE Manager Server 4.3:kernel-syms-5.14.21-150400.24.170.1.x86_64",
            "SUSE Manager Server 4.3:kernel-zfcpdump-5.14.21-150400.24.170.2.s390x"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2025-07-28T15:09:33Z",
          "details": "moderate"
        }
      ],
      "title": "CVE-2022-50038"
    },
    {
      "cve": "CVE-2022-50039",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2022-50039"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "In the Linux kernel, the following vulnerability has been resolved:\n\nstmmac: intel: Add a missing clk_disable_unprepare() call in intel_eth_pci_remove()\n\nCommit 09f012e64e4b (\"stmmac: intel: Fix clock handling on error and remove\npaths\") removed this clk_disable_unprepare()\n\nThis was partly revert by commit ac322f86b56c (\"net: stmmac: Fix clock\nhandling on remove path\") which removed this clk_disable_unprepare()\nbecause:\n\"\n   While unloading the dwmac-intel driver, clk_disable_unprepare() is\n   being called twice in stmmac_dvr_remove() and\n   intel_eth_pci_remove(). This causes kernel panic on the second call.\n\"\n\nHowever later on, commit 5ec55823438e8 (\"net: stmmac: add clocks management\nfor gmac driver\") has updated stmmac_dvr_remove() which do not call\nclk_disable_unprepare() anymore.\n\nSo this call should now be called from intel_eth_pci_remove().",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.170.2.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.170.2.s390x",
          "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.170.2.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.170.2.s390x",
          "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.170.2.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.170.2.s390x",
          "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.170.2.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.170.2.s390x",
          "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-64kb-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-64kb-devel-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-devel-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-devel-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-devel-5.14.21-150400.24.170.1.noarch",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-docs-5.14.21-150400.24.170.1.noarch",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-macros-5.14.21-150400.24.170.1.noarch",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-obs-build-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-obs-build-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-source-5.14.21-150400.24.170.1.noarch",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-syms-5.14.21-150400.24.170.1.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-syms-5.14.21-150400.24.170.1.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:reiserfs-kmp-default-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:reiserfs-kmp-default-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-64kb-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-64kb-devel-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-devel-5.14.21-150400.24.170.1.noarch",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-docs-5.14.21-150400.24.170.1.noarch",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-macros-5.14.21-150400.24.170.1.noarch",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-source-5.14.21-150400.24.170.1.noarch",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.170.1.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.170.1.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.170.2.ppc64le",
          "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.170.2.s390x",
          "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.170.2.ppc64le",
          "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.170.2.s390x",
          "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_170-default-1-150400.9.3.2.ppc64le",
          "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_170-default-1-150400.9.3.2.s390x",
          "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_170-default-1-150400.9.3.2.x86_64",
          "SUSE Linux Enterprise Micro 5.3:kernel-default-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise Micro 5.3:kernel-default-5.14.21-150400.24.170.2.s390x",
          "SUSE Linux Enterprise Micro 5.3:kernel-default-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise Micro 5.3:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.aarch64",
          "SUSE Linux Enterprise Micro 5.3:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
          "SUSE Linux Enterprise Micro 5.4:kernel-default-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise Micro 5.4:kernel-default-5.14.21-150400.24.170.2.s390x",
          "SUSE Linux Enterprise Micro 5.4:kernel-default-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise Micro 5.4:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.aarch64",
          "SUSE Linux Enterprise Micro 5.4:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-64kb-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-64kb-devel-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-5.14.21-150400.24.170.2.ppc64le",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-5.14.21-150400.24.170.2.s390x",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.aarch64",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.ppc64le",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.170.2.ppc64le",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.170.2.s390x",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-devel-5.14.21-150400.24.170.1.noarch",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-docs-5.14.21-150400.24.170.1.noarch",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-macros-5.14.21-150400.24.170.1.noarch",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.170.2.ppc64le",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.170.2.s390x",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-source-5.14.21-150400.24.170.1.noarch",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.170.1.aarch64",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.170.1.ppc64le",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.170.1.s390x",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.170.1.x86_64",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-zfcpdump-5.14.21-150400.24.170.2.s390x",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.170.2.ppc64le",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.170.2.s390x",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-5.14.21-150400.24.170.2.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-devel-5.14.21-150400.24.170.2.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-devel-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-devel-5.14.21-150400.24.170.1.noarch",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-docs-5.14.21-150400.24.170.1.noarch",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-macros-5.14.21-150400.24.170.1.noarch",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-obs-build-5.14.21-150400.24.170.2.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-obs-build-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-source-5.14.21-150400.24.170.1.noarch",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-syms-5.14.21-150400.24.170.1.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-syms-5.14.21-150400.24.170.1.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.170.2.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.170.2.x86_64",
          "SUSE Manager Proxy 4.3:kernel-default-5.14.21-150400.24.170.2.x86_64",
          "SUSE Manager Proxy 4.3:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
          "SUSE Manager Proxy 4.3:kernel-default-devel-5.14.21-150400.24.170.2.x86_64",
          "SUSE Manager Proxy 4.3:kernel-devel-5.14.21-150400.24.170.1.noarch",
          "SUSE Manager Proxy 4.3:kernel-macros-5.14.21-150400.24.170.1.noarch",
          "SUSE Manager Proxy 4.3:kernel-source-5.14.21-150400.24.170.1.noarch",
          "SUSE Manager Proxy 4.3:kernel-syms-5.14.21-150400.24.170.1.x86_64",
          "SUSE Manager Server 4.3:kernel-default-5.14.21-150400.24.170.2.ppc64le",
          "SUSE Manager Server 4.3:kernel-default-5.14.21-150400.24.170.2.s390x",
          "SUSE Manager Server 4.3:kernel-default-5.14.21-150400.24.170.2.x86_64",
          "SUSE Manager Server 4.3:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.ppc64le",
          "SUSE Manager Server 4.3:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
          "SUSE Manager Server 4.3:kernel-default-devel-5.14.21-150400.24.170.2.ppc64le",
          "SUSE Manager Server 4.3:kernel-default-devel-5.14.21-150400.24.170.2.s390x",
          "SUSE Manager Server 4.3:kernel-default-devel-5.14.21-150400.24.170.2.x86_64",
          "SUSE Manager Server 4.3:kernel-devel-5.14.21-150400.24.170.1.noarch",
          "SUSE Manager Server 4.3:kernel-macros-5.14.21-150400.24.170.1.noarch",
          "SUSE Manager Server 4.3:kernel-source-5.14.21-150400.24.170.1.noarch",
          "SUSE Manager Server 4.3:kernel-syms-5.14.21-150400.24.170.1.ppc64le",
          "SUSE Manager Server 4.3:kernel-syms-5.14.21-150400.24.170.1.s390x",
          "SUSE Manager Server 4.3:kernel-syms-5.14.21-150400.24.170.1.x86_64",
          "SUSE Manager Server 4.3:kernel-zfcpdump-5.14.21-150400.24.170.2.s390x"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2022-50039",
          "url": "https://www.suse.com/security/cve/CVE-2022-50039"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1244942 for CVE-2022-50039",
          "url": "https://bugzilla.suse.com/1244942"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-64kb-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-64kb-devel-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-devel-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-devel-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-devel-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-docs-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-macros-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-obs-build-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-obs-build-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-source-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-syms-5.14.21-150400.24.170.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-syms-5.14.21-150400.24.170.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:reiserfs-kmp-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:reiserfs-kmp-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-64kb-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-64kb-devel-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-devel-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-docs-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-macros-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-source-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.170.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.170.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_170-default-1-150400.9.3.2.ppc64le",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_170-default-1-150400.9.3.2.s390x",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_170-default-1-150400.9.3.2.x86_64",
            "SUSE Linux Enterprise Micro 5.3:kernel-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise Micro 5.3:kernel-default-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise Micro 5.3:kernel-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Micro 5.3:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.aarch64",
            "SUSE Linux Enterprise Micro 5.3:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
            "SUSE Linux Enterprise Micro 5.4:kernel-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise Micro 5.4:kernel-default-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise Micro 5.4:kernel-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Micro 5.4:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.aarch64",
            "SUSE Linux Enterprise Micro 5.4:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-64kb-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-64kb-devel-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.aarch64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.ppc64le",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-devel-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-docs-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-macros-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-source-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.170.1.aarch64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.170.1.ppc64le",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.170.1.s390x",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.170.1.x86_64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-zfcpdump-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-devel-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-devel-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-devel-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-docs-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-macros-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-obs-build-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-obs-build-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-source-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-syms-5.14.21-150400.24.170.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-syms-5.14.21-150400.24.170.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Manager Proxy 4.3:kernel-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Manager Proxy 4.3:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
            "SUSE Manager Proxy 4.3:kernel-default-devel-5.14.21-150400.24.170.2.x86_64",
            "SUSE Manager Proxy 4.3:kernel-devel-5.14.21-150400.24.170.1.noarch",
            "SUSE Manager Proxy 4.3:kernel-macros-5.14.21-150400.24.170.1.noarch",
            "SUSE Manager Proxy 4.3:kernel-source-5.14.21-150400.24.170.1.noarch",
            "SUSE Manager Proxy 4.3:kernel-syms-5.14.21-150400.24.170.1.x86_64",
            "SUSE Manager Server 4.3:kernel-default-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Manager Server 4.3:kernel-default-5.14.21-150400.24.170.2.s390x",
            "SUSE Manager Server 4.3:kernel-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Manager Server 4.3:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.ppc64le",
            "SUSE Manager Server 4.3:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
            "SUSE Manager Server 4.3:kernel-default-devel-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Manager Server 4.3:kernel-default-devel-5.14.21-150400.24.170.2.s390x",
            "SUSE Manager Server 4.3:kernel-default-devel-5.14.21-150400.24.170.2.x86_64",
            "SUSE Manager Server 4.3:kernel-devel-5.14.21-150400.24.170.1.noarch",
            "SUSE Manager Server 4.3:kernel-macros-5.14.21-150400.24.170.1.noarch",
            "SUSE Manager Server 4.3:kernel-source-5.14.21-150400.24.170.1.noarch",
            "SUSE Manager Server 4.3:kernel-syms-5.14.21-150400.24.170.1.ppc64le",
            "SUSE Manager Server 4.3:kernel-syms-5.14.21-150400.24.170.1.s390x",
            "SUSE Manager Server 4.3:kernel-syms-5.14.21-150400.24.170.1.x86_64",
            "SUSE Manager Server 4.3:kernel-zfcpdump-5.14.21-150400.24.170.2.s390x"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 5.5,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
            "version": "3.1"
          },
          "products": [
            "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-64kb-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-64kb-devel-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-devel-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-devel-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-devel-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-docs-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-macros-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-obs-build-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-obs-build-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-source-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-syms-5.14.21-150400.24.170.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-syms-5.14.21-150400.24.170.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:reiserfs-kmp-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:reiserfs-kmp-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-64kb-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-64kb-devel-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-devel-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-docs-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-macros-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-source-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.170.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.170.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_170-default-1-150400.9.3.2.ppc64le",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_170-default-1-150400.9.3.2.s390x",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_170-default-1-150400.9.3.2.x86_64",
            "SUSE Linux Enterprise Micro 5.3:kernel-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise Micro 5.3:kernel-default-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise Micro 5.3:kernel-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Micro 5.3:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.aarch64",
            "SUSE Linux Enterprise Micro 5.3:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
            "SUSE Linux Enterprise Micro 5.4:kernel-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise Micro 5.4:kernel-default-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise Micro 5.4:kernel-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Micro 5.4:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.aarch64",
            "SUSE Linux Enterprise Micro 5.4:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-64kb-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-64kb-devel-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.aarch64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.ppc64le",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-devel-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-docs-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-macros-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-source-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.170.1.aarch64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.170.1.ppc64le",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.170.1.s390x",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.170.1.x86_64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-zfcpdump-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-devel-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-devel-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-devel-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-docs-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-macros-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-obs-build-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-obs-build-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-source-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-syms-5.14.21-150400.24.170.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-syms-5.14.21-150400.24.170.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Manager Proxy 4.3:kernel-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Manager Proxy 4.3:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
            "SUSE Manager Proxy 4.3:kernel-default-devel-5.14.21-150400.24.170.2.x86_64",
            "SUSE Manager Proxy 4.3:kernel-devel-5.14.21-150400.24.170.1.noarch",
            "SUSE Manager Proxy 4.3:kernel-macros-5.14.21-150400.24.170.1.noarch",
            "SUSE Manager Proxy 4.3:kernel-source-5.14.21-150400.24.170.1.noarch",
            "SUSE Manager Proxy 4.3:kernel-syms-5.14.21-150400.24.170.1.x86_64",
            "SUSE Manager Server 4.3:kernel-default-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Manager Server 4.3:kernel-default-5.14.21-150400.24.170.2.s390x",
            "SUSE Manager Server 4.3:kernel-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Manager Server 4.3:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.ppc64le",
            "SUSE Manager Server 4.3:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
            "SUSE Manager Server 4.3:kernel-default-devel-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Manager Server 4.3:kernel-default-devel-5.14.21-150400.24.170.2.s390x",
            "SUSE Manager Server 4.3:kernel-default-devel-5.14.21-150400.24.170.2.x86_64",
            "SUSE Manager Server 4.3:kernel-devel-5.14.21-150400.24.170.1.noarch",
            "SUSE Manager Server 4.3:kernel-macros-5.14.21-150400.24.170.1.noarch",
            "SUSE Manager Server 4.3:kernel-source-5.14.21-150400.24.170.1.noarch",
            "SUSE Manager Server 4.3:kernel-syms-5.14.21-150400.24.170.1.ppc64le",
            "SUSE Manager Server 4.3:kernel-syms-5.14.21-150400.24.170.1.s390x",
            "SUSE Manager Server 4.3:kernel-syms-5.14.21-150400.24.170.1.x86_64",
            "SUSE Manager Server 4.3:kernel-zfcpdump-5.14.21-150400.24.170.2.s390x"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2025-07-28T15:09:33Z",
          "details": "moderate"
        }
      ],
      "title": "CVE-2022-50039"
    },
    {
      "cve": "CVE-2022-50040",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2022-50040"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "In the Linux kernel, the following vulnerability has been resolved:\n\nnet: dsa: sja1105: fix buffer overflow in sja1105_setup_devlink_regions()\n\nIf an error occurs in dsa_devlink_region_create(), then \u0027priv-\u003eregions\u0027\narray will be accessed by negative index \u0027-1\u0027.\n\nFound by Linux Verification Center (linuxtesting.org) with SVACE.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.170.2.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.170.2.s390x",
          "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.170.2.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.170.2.s390x",
          "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.170.2.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.170.2.s390x",
          "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.170.2.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.170.2.s390x",
          "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-64kb-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-64kb-devel-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-devel-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-devel-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-devel-5.14.21-150400.24.170.1.noarch",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-docs-5.14.21-150400.24.170.1.noarch",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-macros-5.14.21-150400.24.170.1.noarch",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-obs-build-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-obs-build-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-source-5.14.21-150400.24.170.1.noarch",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-syms-5.14.21-150400.24.170.1.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-syms-5.14.21-150400.24.170.1.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:reiserfs-kmp-default-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:reiserfs-kmp-default-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-64kb-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-64kb-devel-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-devel-5.14.21-150400.24.170.1.noarch",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-docs-5.14.21-150400.24.170.1.noarch",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-macros-5.14.21-150400.24.170.1.noarch",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-source-5.14.21-150400.24.170.1.noarch",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.170.1.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.170.1.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.170.2.ppc64le",
          "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.170.2.s390x",
          "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.170.2.ppc64le",
          "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.170.2.s390x",
          "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_170-default-1-150400.9.3.2.ppc64le",
          "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_170-default-1-150400.9.3.2.s390x",
          "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_170-default-1-150400.9.3.2.x86_64",
          "SUSE Linux Enterprise Micro 5.3:kernel-default-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise Micro 5.3:kernel-default-5.14.21-150400.24.170.2.s390x",
          "SUSE Linux Enterprise Micro 5.3:kernel-default-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise Micro 5.3:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.aarch64",
          "SUSE Linux Enterprise Micro 5.3:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
          "SUSE Linux Enterprise Micro 5.4:kernel-default-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise Micro 5.4:kernel-default-5.14.21-150400.24.170.2.s390x",
          "SUSE Linux Enterprise Micro 5.4:kernel-default-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise Micro 5.4:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.aarch64",
          "SUSE Linux Enterprise Micro 5.4:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-64kb-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-64kb-devel-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-5.14.21-150400.24.170.2.ppc64le",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-5.14.21-150400.24.170.2.s390x",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.aarch64",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.ppc64le",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.170.2.ppc64le",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.170.2.s390x",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-devel-5.14.21-150400.24.170.1.noarch",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-docs-5.14.21-150400.24.170.1.noarch",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-macros-5.14.21-150400.24.170.1.noarch",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.170.2.ppc64le",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.170.2.s390x",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-source-5.14.21-150400.24.170.1.noarch",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.170.1.aarch64",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.170.1.ppc64le",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.170.1.s390x",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.170.1.x86_64",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-zfcpdump-5.14.21-150400.24.170.2.s390x",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.170.2.ppc64le",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.170.2.s390x",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-5.14.21-150400.24.170.2.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-devel-5.14.21-150400.24.170.2.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-devel-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-devel-5.14.21-150400.24.170.1.noarch",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-docs-5.14.21-150400.24.170.1.noarch",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-macros-5.14.21-150400.24.170.1.noarch",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-obs-build-5.14.21-150400.24.170.2.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-obs-build-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-source-5.14.21-150400.24.170.1.noarch",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-syms-5.14.21-150400.24.170.1.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-syms-5.14.21-150400.24.170.1.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.170.2.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.170.2.x86_64",
          "SUSE Manager Proxy 4.3:kernel-default-5.14.21-150400.24.170.2.x86_64",
          "SUSE Manager Proxy 4.3:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
          "SUSE Manager Proxy 4.3:kernel-default-devel-5.14.21-150400.24.170.2.x86_64",
          "SUSE Manager Proxy 4.3:kernel-devel-5.14.21-150400.24.170.1.noarch",
          "SUSE Manager Proxy 4.3:kernel-macros-5.14.21-150400.24.170.1.noarch",
          "SUSE Manager Proxy 4.3:kernel-source-5.14.21-150400.24.170.1.noarch",
          "SUSE Manager Proxy 4.3:kernel-syms-5.14.21-150400.24.170.1.x86_64",
          "SUSE Manager Server 4.3:kernel-default-5.14.21-150400.24.170.2.ppc64le",
          "SUSE Manager Server 4.3:kernel-default-5.14.21-150400.24.170.2.s390x",
          "SUSE Manager Server 4.3:kernel-default-5.14.21-150400.24.170.2.x86_64",
          "SUSE Manager Server 4.3:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.ppc64le",
          "SUSE Manager Server 4.3:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
          "SUSE Manager Server 4.3:kernel-default-devel-5.14.21-150400.24.170.2.ppc64le",
          "SUSE Manager Server 4.3:kernel-default-devel-5.14.21-150400.24.170.2.s390x",
          "SUSE Manager Server 4.3:kernel-default-devel-5.14.21-150400.24.170.2.x86_64",
          "SUSE Manager Server 4.3:kernel-devel-5.14.21-150400.24.170.1.noarch",
          "SUSE Manager Server 4.3:kernel-macros-5.14.21-150400.24.170.1.noarch",
          "SUSE Manager Server 4.3:kernel-source-5.14.21-150400.24.170.1.noarch",
          "SUSE Manager Server 4.3:kernel-syms-5.14.21-150400.24.170.1.ppc64le",
          "SUSE Manager Server 4.3:kernel-syms-5.14.21-150400.24.170.1.s390x",
          "SUSE Manager Server 4.3:kernel-syms-5.14.21-150400.24.170.1.x86_64",
          "SUSE Manager Server 4.3:kernel-zfcpdump-5.14.21-150400.24.170.2.s390x"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2022-50040",
          "url": "https://www.suse.com/security/cve/CVE-2022-50040"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1244949 for CVE-2022-50040",
          "url": "https://bugzilla.suse.com/1244949"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-64kb-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-64kb-devel-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-devel-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-devel-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-devel-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-docs-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-macros-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-obs-build-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-obs-build-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-source-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-syms-5.14.21-150400.24.170.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-syms-5.14.21-150400.24.170.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:reiserfs-kmp-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:reiserfs-kmp-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-64kb-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-64kb-devel-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-devel-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-docs-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-macros-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-source-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.170.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.170.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_170-default-1-150400.9.3.2.ppc64le",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_170-default-1-150400.9.3.2.s390x",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_170-default-1-150400.9.3.2.x86_64",
            "SUSE Linux Enterprise Micro 5.3:kernel-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise Micro 5.3:kernel-default-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise Micro 5.3:kernel-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Micro 5.3:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.aarch64",
            "SUSE Linux Enterprise Micro 5.3:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
            "SUSE Linux Enterprise Micro 5.4:kernel-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise Micro 5.4:kernel-default-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise Micro 5.4:kernel-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Micro 5.4:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.aarch64",
            "SUSE Linux Enterprise Micro 5.4:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-64kb-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-64kb-devel-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.aarch64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.ppc64le",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-devel-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-docs-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-macros-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-source-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.170.1.aarch64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.170.1.ppc64le",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.170.1.s390x",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.170.1.x86_64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-zfcpdump-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-devel-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-devel-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-devel-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-docs-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-macros-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-obs-build-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-obs-build-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-source-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-syms-5.14.21-150400.24.170.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-syms-5.14.21-150400.24.170.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Manager Proxy 4.3:kernel-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Manager Proxy 4.3:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
            "SUSE Manager Proxy 4.3:kernel-default-devel-5.14.21-150400.24.170.2.x86_64",
            "SUSE Manager Proxy 4.3:kernel-devel-5.14.21-150400.24.170.1.noarch",
            "SUSE Manager Proxy 4.3:kernel-macros-5.14.21-150400.24.170.1.noarch",
            "SUSE Manager Proxy 4.3:kernel-source-5.14.21-150400.24.170.1.noarch",
            "SUSE Manager Proxy 4.3:kernel-syms-5.14.21-150400.24.170.1.x86_64",
            "SUSE Manager Server 4.3:kernel-default-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Manager Server 4.3:kernel-default-5.14.21-150400.24.170.2.s390x",
            "SUSE Manager Server 4.3:kernel-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Manager Server 4.3:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.ppc64le",
            "SUSE Manager Server 4.3:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
            "SUSE Manager Server 4.3:kernel-default-devel-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Manager Server 4.3:kernel-default-devel-5.14.21-150400.24.170.2.s390x",
            "SUSE Manager Server 4.3:kernel-default-devel-5.14.21-150400.24.170.2.x86_64",
            "SUSE Manager Server 4.3:kernel-devel-5.14.21-150400.24.170.1.noarch",
            "SUSE Manager Server 4.3:kernel-macros-5.14.21-150400.24.170.1.noarch",
            "SUSE Manager Server 4.3:kernel-source-5.14.21-150400.24.170.1.noarch",
            "SUSE Manager Server 4.3:kernel-syms-5.14.21-150400.24.170.1.ppc64le",
            "SUSE Manager Server 4.3:kernel-syms-5.14.21-150400.24.170.1.s390x",
            "SUSE Manager Server 4.3:kernel-syms-5.14.21-150400.24.170.1.x86_64",
            "SUSE Manager Server 4.3:kernel-zfcpdump-5.14.21-150400.24.170.2.s390x"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 5.5,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
            "version": "3.1"
          },
          "products": [
            "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-64kb-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-64kb-devel-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-devel-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-devel-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-devel-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-docs-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-macros-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-obs-build-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-obs-build-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-source-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-syms-5.14.21-150400.24.170.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-syms-5.14.21-150400.24.170.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:reiserfs-kmp-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:reiserfs-kmp-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-64kb-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-64kb-devel-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-devel-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-docs-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-macros-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-source-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.170.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.170.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_170-default-1-150400.9.3.2.ppc64le",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_170-default-1-150400.9.3.2.s390x",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_170-default-1-150400.9.3.2.x86_64",
            "SUSE Linux Enterprise Micro 5.3:kernel-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise Micro 5.3:kernel-default-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise Micro 5.3:kernel-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Micro 5.3:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.aarch64",
            "SUSE Linux Enterprise Micro 5.3:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
            "SUSE Linux Enterprise Micro 5.4:kernel-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise Micro 5.4:kernel-default-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise Micro 5.4:kernel-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Micro 5.4:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.aarch64",
            "SUSE Linux Enterprise Micro 5.4:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-64kb-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-64kb-devel-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.aarch64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.ppc64le",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-devel-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-docs-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-macros-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-source-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.170.1.aarch64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.170.1.ppc64le",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.170.1.s390x",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.170.1.x86_64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-zfcpdump-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-devel-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-devel-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-devel-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-docs-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-macros-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-obs-build-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-obs-build-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-source-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-syms-5.14.21-150400.24.170.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-syms-5.14.21-150400.24.170.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Manager Proxy 4.3:kernel-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Manager Proxy 4.3:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
            "SUSE Manager Proxy 4.3:kernel-default-devel-5.14.21-150400.24.170.2.x86_64",
            "SUSE Manager Proxy 4.3:kernel-devel-5.14.21-150400.24.170.1.noarch",
            "SUSE Manager Proxy 4.3:kernel-macros-5.14.21-150400.24.170.1.noarch",
            "SUSE Manager Proxy 4.3:kernel-source-5.14.21-150400.24.170.1.noarch",
            "SUSE Manager Proxy 4.3:kernel-syms-5.14.21-150400.24.170.1.x86_64",
            "SUSE Manager Server 4.3:kernel-default-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Manager Server 4.3:kernel-default-5.14.21-150400.24.170.2.s390x",
            "SUSE Manager Server 4.3:kernel-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Manager Server 4.3:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.ppc64le",
            "SUSE Manager Server 4.3:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
            "SUSE Manager Server 4.3:kernel-default-devel-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Manager Server 4.3:kernel-default-devel-5.14.21-150400.24.170.2.s390x",
            "SUSE Manager Server 4.3:kernel-default-devel-5.14.21-150400.24.170.2.x86_64",
            "SUSE Manager Server 4.3:kernel-devel-5.14.21-150400.24.170.1.noarch",
            "SUSE Manager Server 4.3:kernel-macros-5.14.21-150400.24.170.1.noarch",
            "SUSE Manager Server 4.3:kernel-source-5.14.21-150400.24.170.1.noarch",
            "SUSE Manager Server 4.3:kernel-syms-5.14.21-150400.24.170.1.ppc64le",
            "SUSE Manager Server 4.3:kernel-syms-5.14.21-150400.24.170.1.s390x",
            "SUSE Manager Server 4.3:kernel-syms-5.14.21-150400.24.170.1.x86_64",
            "SUSE Manager Server 4.3:kernel-zfcpdump-5.14.21-150400.24.170.2.s390x"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2025-07-28T15:09:33Z",
          "details": "moderate"
        }
      ],
      "title": "CVE-2022-50040"
    },
    {
      "cve": "CVE-2022-50045",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2022-50045"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "In the Linux kernel, the following vulnerability has been resolved:\n\npowerpc/pci: Fix get_phb_number() locking\n\nThe recent change to get_phb_number() causes a DEBUG_ATOMIC_SLEEP\nwarning on some systems:\n\n  BUG: sleeping function called from invalid context at kernel/locking/mutex.c:580\n  in_atomic(): 1, irqs_disabled(): 0, non_block: 0, pid: 1, name: swapper\n  preempt_count: 1, expected: 0\n  RCU nest depth: 0, expected: 0\n  1 lock held by swapper/1:\n   #0: c157efb0 (hose_spinlock){+.+.}-{2:2}, at: pcibios_alloc_controller+0x64/0x220\n  Preemption disabled at:\n  [\u003c00000000\u003e] 0x0\n  CPU: 0 PID: 1 Comm: swapper Not tainted 5.19.0-yocto-standard+ #1\n  Call Trace:\n  [d101dc90] [c073b264] dump_stack_lvl+0x50/0x8c (unreliable)\n  [d101dcb0] [c0093b70] __might_resched+0x258/0x2a8\n  [d101dcd0] [c0d3e634] __mutex_lock+0x6c/0x6ec\n  [d101dd50] [c0a84174] of_alias_get_id+0x50/0xf4\n  [d101dd80] [c002ec78] pcibios_alloc_controller+0x1b8/0x220\n  [d101ddd0] [c140c9dc] pmac_pci_init+0x198/0x784\n  [d101de50] [c140852c] discover_phbs+0x30/0x4c\n  [d101de60] [c0007fd4] do_one_initcall+0x94/0x344\n  [d101ded0] [c1403b40] kernel_init_freeable+0x1a8/0x22c\n  [d101df10] [c00086e0] kernel_init+0x34/0x160\n  [d101df30] [c001b334] ret_from_kernel_thread+0x5c/0x64\n\nThis is because pcibios_alloc_controller() holds hose_spinlock but\nof_alias_get_id() takes of_mutex which can sleep.\n\nThe hose_spinlock protects the phb_bitmap, and also the hose_list, but\nit doesn\u0027t need to be held while get_phb_number() calls the OF routines,\nbecause those are only looking up information in the device tree.\n\nSo fix it by having get_phb_number() take the hose_spinlock itself, only\nwhere required, and then dropping the lock before returning.\npcibios_alloc_controller() then needs to take the lock again before the\nlist_add() but that\u0027s safe, the order of the list is not important.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.170.2.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.170.2.s390x",
          "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.170.2.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.170.2.s390x",
          "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.170.2.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.170.2.s390x",
          "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.170.2.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.170.2.s390x",
          "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-64kb-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-64kb-devel-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-devel-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-devel-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-devel-5.14.21-150400.24.170.1.noarch",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-docs-5.14.21-150400.24.170.1.noarch",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-macros-5.14.21-150400.24.170.1.noarch",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-obs-build-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-obs-build-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-source-5.14.21-150400.24.170.1.noarch",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-syms-5.14.21-150400.24.170.1.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-syms-5.14.21-150400.24.170.1.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:reiserfs-kmp-default-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:reiserfs-kmp-default-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-64kb-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-64kb-devel-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-devel-5.14.21-150400.24.170.1.noarch",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-docs-5.14.21-150400.24.170.1.noarch",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-macros-5.14.21-150400.24.170.1.noarch",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-source-5.14.21-150400.24.170.1.noarch",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.170.1.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.170.1.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.170.2.ppc64le",
          "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.170.2.s390x",
          "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.170.2.ppc64le",
          "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.170.2.s390x",
          "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_170-default-1-150400.9.3.2.ppc64le",
          "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_170-default-1-150400.9.3.2.s390x",
          "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_170-default-1-150400.9.3.2.x86_64",
          "SUSE Linux Enterprise Micro 5.3:kernel-default-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise Micro 5.3:kernel-default-5.14.21-150400.24.170.2.s390x",
          "SUSE Linux Enterprise Micro 5.3:kernel-default-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise Micro 5.3:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.aarch64",
          "SUSE Linux Enterprise Micro 5.3:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
          "SUSE Linux Enterprise Micro 5.4:kernel-default-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise Micro 5.4:kernel-default-5.14.21-150400.24.170.2.s390x",
          "SUSE Linux Enterprise Micro 5.4:kernel-default-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise Micro 5.4:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.aarch64",
          "SUSE Linux Enterprise Micro 5.4:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-64kb-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-64kb-devel-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-5.14.21-150400.24.170.2.ppc64le",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-5.14.21-150400.24.170.2.s390x",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.aarch64",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.ppc64le",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.170.2.ppc64le",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.170.2.s390x",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-devel-5.14.21-150400.24.170.1.noarch",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-docs-5.14.21-150400.24.170.1.noarch",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-macros-5.14.21-150400.24.170.1.noarch",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.170.2.ppc64le",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.170.2.s390x",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-source-5.14.21-150400.24.170.1.noarch",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.170.1.aarch64",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.170.1.ppc64le",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.170.1.s390x",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.170.1.x86_64",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-zfcpdump-5.14.21-150400.24.170.2.s390x",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.170.2.ppc64le",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.170.2.s390x",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-5.14.21-150400.24.170.2.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-devel-5.14.21-150400.24.170.2.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-devel-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-devel-5.14.21-150400.24.170.1.noarch",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-docs-5.14.21-150400.24.170.1.noarch",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-macros-5.14.21-150400.24.170.1.noarch",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-obs-build-5.14.21-150400.24.170.2.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-obs-build-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-source-5.14.21-150400.24.170.1.noarch",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-syms-5.14.21-150400.24.170.1.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-syms-5.14.21-150400.24.170.1.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.170.2.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.170.2.x86_64",
          "SUSE Manager Proxy 4.3:kernel-default-5.14.21-150400.24.170.2.x86_64",
          "SUSE Manager Proxy 4.3:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
          "SUSE Manager Proxy 4.3:kernel-default-devel-5.14.21-150400.24.170.2.x86_64",
          "SUSE Manager Proxy 4.3:kernel-devel-5.14.21-150400.24.170.1.noarch",
          "SUSE Manager Proxy 4.3:kernel-macros-5.14.21-150400.24.170.1.noarch",
          "SUSE Manager Proxy 4.3:kernel-source-5.14.21-150400.24.170.1.noarch",
          "SUSE Manager Proxy 4.3:kernel-syms-5.14.21-150400.24.170.1.x86_64",
          "SUSE Manager Server 4.3:kernel-default-5.14.21-150400.24.170.2.ppc64le",
          "SUSE Manager Server 4.3:kernel-default-5.14.21-150400.24.170.2.s390x",
          "SUSE Manager Server 4.3:kernel-default-5.14.21-150400.24.170.2.x86_64",
          "SUSE Manager Server 4.3:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.ppc64le",
          "SUSE Manager Server 4.3:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
          "SUSE Manager Server 4.3:kernel-default-devel-5.14.21-150400.24.170.2.ppc64le",
          "SUSE Manager Server 4.3:kernel-default-devel-5.14.21-150400.24.170.2.s390x",
          "SUSE Manager Server 4.3:kernel-default-devel-5.14.21-150400.24.170.2.x86_64",
          "SUSE Manager Server 4.3:kernel-devel-5.14.21-150400.24.170.1.noarch",
          "SUSE Manager Server 4.3:kernel-macros-5.14.21-150400.24.170.1.noarch",
          "SUSE Manager Server 4.3:kernel-source-5.14.21-150400.24.170.1.noarch",
          "SUSE Manager Server 4.3:kernel-syms-5.14.21-150400.24.170.1.ppc64le",
          "SUSE Manager Server 4.3:kernel-syms-5.14.21-150400.24.170.1.s390x",
          "SUSE Manager Server 4.3:kernel-syms-5.14.21-150400.24.170.1.x86_64",
          "SUSE Manager Server 4.3:kernel-zfcpdump-5.14.21-150400.24.170.2.s390x"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2022-50045",
          "url": "https://www.suse.com/security/cve/CVE-2022-50045"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1244967 for CVE-2022-50045",
          "url": "https://bugzilla.suse.com/1244967"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-64kb-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-64kb-devel-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-devel-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-devel-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-devel-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-docs-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-macros-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-obs-build-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-obs-build-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-source-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-syms-5.14.21-150400.24.170.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-syms-5.14.21-150400.24.170.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:reiserfs-kmp-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:reiserfs-kmp-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-64kb-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-64kb-devel-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-devel-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-docs-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-macros-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-source-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.170.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.170.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_170-default-1-150400.9.3.2.ppc64le",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_170-default-1-150400.9.3.2.s390x",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_170-default-1-150400.9.3.2.x86_64",
            "SUSE Linux Enterprise Micro 5.3:kernel-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise Micro 5.3:kernel-default-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise Micro 5.3:kernel-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Micro 5.3:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.aarch64",
            "SUSE Linux Enterprise Micro 5.3:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
            "SUSE Linux Enterprise Micro 5.4:kernel-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise Micro 5.4:kernel-default-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise Micro 5.4:kernel-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Micro 5.4:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.aarch64",
            "SUSE Linux Enterprise Micro 5.4:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-64kb-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-64kb-devel-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.aarch64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.ppc64le",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-devel-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-docs-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-macros-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-source-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.170.1.aarch64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.170.1.ppc64le",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.170.1.s390x",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.170.1.x86_64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-zfcpdump-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-devel-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-devel-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-devel-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-docs-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-macros-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-obs-build-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-obs-build-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-source-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-syms-5.14.21-150400.24.170.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-syms-5.14.21-150400.24.170.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Manager Proxy 4.3:kernel-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Manager Proxy 4.3:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
            "SUSE Manager Proxy 4.3:kernel-default-devel-5.14.21-150400.24.170.2.x86_64",
            "SUSE Manager Proxy 4.3:kernel-devel-5.14.21-150400.24.170.1.noarch",
            "SUSE Manager Proxy 4.3:kernel-macros-5.14.21-150400.24.170.1.noarch",
            "SUSE Manager Proxy 4.3:kernel-source-5.14.21-150400.24.170.1.noarch",
            "SUSE Manager Proxy 4.3:kernel-syms-5.14.21-150400.24.170.1.x86_64",
            "SUSE Manager Server 4.3:kernel-default-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Manager Server 4.3:kernel-default-5.14.21-150400.24.170.2.s390x",
            "SUSE Manager Server 4.3:kernel-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Manager Server 4.3:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.ppc64le",
            "SUSE Manager Server 4.3:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
            "SUSE Manager Server 4.3:kernel-default-devel-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Manager Server 4.3:kernel-default-devel-5.14.21-150400.24.170.2.s390x",
            "SUSE Manager Server 4.3:kernel-default-devel-5.14.21-150400.24.170.2.x86_64",
            "SUSE Manager Server 4.3:kernel-devel-5.14.21-150400.24.170.1.noarch",
            "SUSE Manager Server 4.3:kernel-macros-5.14.21-150400.24.170.1.noarch",
            "SUSE Manager Server 4.3:kernel-source-5.14.21-150400.24.170.1.noarch",
            "SUSE Manager Server 4.3:kernel-syms-5.14.21-150400.24.170.1.ppc64le",
            "SUSE Manager Server 4.3:kernel-syms-5.14.21-150400.24.170.1.s390x",
            "SUSE Manager Server 4.3:kernel-syms-5.14.21-150400.24.170.1.x86_64",
            "SUSE Manager Server 4.3:kernel-zfcpdump-5.14.21-150400.24.170.2.s390x"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 5.5,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
            "version": "3.1"
          },
          "products": [
            "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-64kb-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-64kb-devel-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-devel-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-devel-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-devel-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-docs-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-macros-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-obs-build-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-obs-build-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-source-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-syms-5.14.21-150400.24.170.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-syms-5.14.21-150400.24.170.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:reiserfs-kmp-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:reiserfs-kmp-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-64kb-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-64kb-devel-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-devel-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-docs-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-macros-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-source-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.170.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.170.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_170-default-1-150400.9.3.2.ppc64le",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_170-default-1-150400.9.3.2.s390x",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_170-default-1-150400.9.3.2.x86_64",
            "SUSE Linux Enterprise Micro 5.3:kernel-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise Micro 5.3:kernel-default-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise Micro 5.3:kernel-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Micro 5.3:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.aarch64",
            "SUSE Linux Enterprise Micro 5.3:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
            "SUSE Linux Enterprise Micro 5.4:kernel-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise Micro 5.4:kernel-default-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise Micro 5.4:kernel-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Micro 5.4:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.aarch64",
            "SUSE Linux Enterprise Micro 5.4:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-64kb-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-64kb-devel-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.aarch64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.ppc64le",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-devel-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-docs-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-macros-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-source-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.170.1.aarch64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.170.1.ppc64le",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.170.1.s390x",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.170.1.x86_64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-zfcpdump-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-devel-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-devel-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-devel-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-docs-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-macros-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-obs-build-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-obs-build-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-source-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-syms-5.14.21-150400.24.170.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-syms-5.14.21-150400.24.170.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Manager Proxy 4.3:kernel-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Manager Proxy 4.3:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
            "SUSE Manager Proxy 4.3:kernel-default-devel-5.14.21-150400.24.170.2.x86_64",
            "SUSE Manager Proxy 4.3:kernel-devel-5.14.21-150400.24.170.1.noarch",
            "SUSE Manager Proxy 4.3:kernel-macros-5.14.21-150400.24.170.1.noarch",
            "SUSE Manager Proxy 4.3:kernel-source-5.14.21-150400.24.170.1.noarch",
            "SUSE Manager Proxy 4.3:kernel-syms-5.14.21-150400.24.170.1.x86_64",
            "SUSE Manager Server 4.3:kernel-default-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Manager Server 4.3:kernel-default-5.14.21-150400.24.170.2.s390x",
            "SUSE Manager Server 4.3:kernel-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Manager Server 4.3:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.ppc64le",
            "SUSE Manager Server 4.3:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
            "SUSE Manager Server 4.3:kernel-default-devel-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Manager Server 4.3:kernel-default-devel-5.14.21-150400.24.170.2.s390x",
            "SUSE Manager Server 4.3:kernel-default-devel-5.14.21-150400.24.170.2.x86_64",
            "SUSE Manager Server 4.3:kernel-devel-5.14.21-150400.24.170.1.noarch",
            "SUSE Manager Server 4.3:kernel-macros-5.14.21-150400.24.170.1.noarch",
            "SUSE Manager Server 4.3:kernel-source-5.14.21-150400.24.170.1.noarch",
            "SUSE Manager Server 4.3:kernel-syms-5.14.21-150400.24.170.1.ppc64le",
            "SUSE Manager Server 4.3:kernel-syms-5.14.21-150400.24.170.1.s390x",
            "SUSE Manager Server 4.3:kernel-syms-5.14.21-150400.24.170.1.x86_64",
            "SUSE Manager Server 4.3:kernel-zfcpdump-5.14.21-150400.24.170.2.s390x"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2025-07-28T15:09:33Z",
          "details": "moderate"
        }
      ],
      "title": "CVE-2022-50045"
    },
    {
      "cve": "CVE-2022-50046",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2022-50046"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "In the Linux kernel, the following vulnerability has been resolved:\n\nnet/sunrpc: fix potential memory leaks in rpc_sysfs_xprt_state_change()\n\nThe issue happens on some error handling paths. When the function\nfails to grab the object `xprt`, it simply returns 0, forgetting to\ndecrease the reference count of another object `xps`, which is\nincreased by rpc_sysfs_xprt_kobj_get_xprt_switch(), causing refcount\nleaks. Also, the function forgets to check whether `xps` is valid\nbefore using it, which may result in NULL-dereferencing issues.\n\nFix it by adding proper error handling code when either `xprt` or\n`xps` is NULL.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.170.2.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.170.2.s390x",
          "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.170.2.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.170.2.s390x",
          "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.170.2.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.170.2.s390x",
          "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.170.2.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.170.2.s390x",
          "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-64kb-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-64kb-devel-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-devel-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-devel-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-devel-5.14.21-150400.24.170.1.noarch",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-docs-5.14.21-150400.24.170.1.noarch",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-macros-5.14.21-150400.24.170.1.noarch",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-obs-build-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-obs-build-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-source-5.14.21-150400.24.170.1.noarch",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-syms-5.14.21-150400.24.170.1.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-syms-5.14.21-150400.24.170.1.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:reiserfs-kmp-default-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:reiserfs-kmp-default-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-64kb-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-64kb-devel-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-devel-5.14.21-150400.24.170.1.noarch",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-docs-5.14.21-150400.24.170.1.noarch",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-macros-5.14.21-150400.24.170.1.noarch",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-source-5.14.21-150400.24.170.1.noarch",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.170.1.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.170.1.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.170.2.ppc64le",
          "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.170.2.s390x",
          "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.170.2.ppc64le",
          "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.170.2.s390x",
          "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_170-default-1-150400.9.3.2.ppc64le",
          "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_170-default-1-150400.9.3.2.s390x",
          "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_170-default-1-150400.9.3.2.x86_64",
          "SUSE Linux Enterprise Micro 5.3:kernel-default-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise Micro 5.3:kernel-default-5.14.21-150400.24.170.2.s390x",
          "SUSE Linux Enterprise Micro 5.3:kernel-default-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise Micro 5.3:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.aarch64",
          "SUSE Linux Enterprise Micro 5.3:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
          "SUSE Linux Enterprise Micro 5.4:kernel-default-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise Micro 5.4:kernel-default-5.14.21-150400.24.170.2.s390x",
          "SUSE Linux Enterprise Micro 5.4:kernel-default-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise Micro 5.4:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.aarch64",
          "SUSE Linux Enterprise Micro 5.4:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-64kb-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-64kb-devel-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-5.14.21-150400.24.170.2.ppc64le",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-5.14.21-150400.24.170.2.s390x",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.aarch64",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.ppc64le",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.170.2.ppc64le",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.170.2.s390x",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-devel-5.14.21-150400.24.170.1.noarch",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-docs-5.14.21-150400.24.170.1.noarch",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-macros-5.14.21-150400.24.170.1.noarch",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.170.2.ppc64le",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.170.2.s390x",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-source-5.14.21-150400.24.170.1.noarch",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.170.1.aarch64",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.170.1.ppc64le",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.170.1.s390x",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.170.1.x86_64",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-zfcpdump-5.14.21-150400.24.170.2.s390x",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.170.2.ppc64le",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.170.2.s390x",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-5.14.21-150400.24.170.2.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-devel-5.14.21-150400.24.170.2.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-devel-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-devel-5.14.21-150400.24.170.1.noarch",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-docs-5.14.21-150400.24.170.1.noarch",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-macros-5.14.21-150400.24.170.1.noarch",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-obs-build-5.14.21-150400.24.170.2.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-obs-build-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-source-5.14.21-150400.24.170.1.noarch",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-syms-5.14.21-150400.24.170.1.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-syms-5.14.21-150400.24.170.1.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.170.2.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.170.2.x86_64",
          "SUSE Manager Proxy 4.3:kernel-default-5.14.21-150400.24.170.2.x86_64",
          "SUSE Manager Proxy 4.3:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
          "SUSE Manager Proxy 4.3:kernel-default-devel-5.14.21-150400.24.170.2.x86_64",
          "SUSE Manager Proxy 4.3:kernel-devel-5.14.21-150400.24.170.1.noarch",
          "SUSE Manager Proxy 4.3:kernel-macros-5.14.21-150400.24.170.1.noarch",
          "SUSE Manager Proxy 4.3:kernel-source-5.14.21-150400.24.170.1.noarch",
          "SUSE Manager Proxy 4.3:kernel-syms-5.14.21-150400.24.170.1.x86_64",
          "SUSE Manager Server 4.3:kernel-default-5.14.21-150400.24.170.2.ppc64le",
          "SUSE Manager Server 4.3:kernel-default-5.14.21-150400.24.170.2.s390x",
          "SUSE Manager Server 4.3:kernel-default-5.14.21-150400.24.170.2.x86_64",
          "SUSE Manager Server 4.3:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.ppc64le",
          "SUSE Manager Server 4.3:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
          "SUSE Manager Server 4.3:kernel-default-devel-5.14.21-150400.24.170.2.ppc64le",
          "SUSE Manager Server 4.3:kernel-default-devel-5.14.21-150400.24.170.2.s390x",
          "SUSE Manager Server 4.3:kernel-default-devel-5.14.21-150400.24.170.2.x86_64",
          "SUSE Manager Server 4.3:kernel-devel-5.14.21-150400.24.170.1.noarch",
          "SUSE Manager Server 4.3:kernel-macros-5.14.21-150400.24.170.1.noarch",
          "SUSE Manager Server 4.3:kernel-source-5.14.21-150400.24.170.1.noarch",
          "SUSE Manager Server 4.3:kernel-syms-5.14.21-150400.24.170.1.ppc64le",
          "SUSE Manager Server 4.3:kernel-syms-5.14.21-150400.24.170.1.s390x",
          "SUSE Manager Server 4.3:kernel-syms-5.14.21-150400.24.170.1.x86_64",
          "SUSE Manager Server 4.3:kernel-zfcpdump-5.14.21-150400.24.170.2.s390x"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2022-50046",
          "url": "https://www.suse.com/security/cve/CVE-2022-50046"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1244991 for CVE-2022-50046",
          "url": "https://bugzilla.suse.com/1244991"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-64kb-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-64kb-devel-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-devel-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-devel-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-devel-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-docs-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-macros-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-obs-build-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-obs-build-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-source-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-syms-5.14.21-150400.24.170.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-syms-5.14.21-150400.24.170.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:reiserfs-kmp-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:reiserfs-kmp-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-64kb-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-64kb-devel-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-devel-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-docs-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-macros-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-source-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.170.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.170.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_170-default-1-150400.9.3.2.ppc64le",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_170-default-1-150400.9.3.2.s390x",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_170-default-1-150400.9.3.2.x86_64",
            "SUSE Linux Enterprise Micro 5.3:kernel-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise Micro 5.3:kernel-default-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise Micro 5.3:kernel-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Micro 5.3:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.aarch64",
            "SUSE Linux Enterprise Micro 5.3:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
            "SUSE Linux Enterprise Micro 5.4:kernel-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise Micro 5.4:kernel-default-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise Micro 5.4:kernel-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Micro 5.4:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.aarch64",
            "SUSE Linux Enterprise Micro 5.4:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-64kb-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-64kb-devel-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.aarch64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.ppc64le",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-devel-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-docs-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-macros-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-source-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.170.1.aarch64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.170.1.ppc64le",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.170.1.s390x",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.170.1.x86_64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-zfcpdump-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-devel-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-devel-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-devel-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-docs-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-macros-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-obs-build-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-obs-build-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-source-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-syms-5.14.21-150400.24.170.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-syms-5.14.21-150400.24.170.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Manager Proxy 4.3:kernel-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Manager Proxy 4.3:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
            "SUSE Manager Proxy 4.3:kernel-default-devel-5.14.21-150400.24.170.2.x86_64",
            "SUSE Manager Proxy 4.3:kernel-devel-5.14.21-150400.24.170.1.noarch",
            "SUSE Manager Proxy 4.3:kernel-macros-5.14.21-150400.24.170.1.noarch",
            "SUSE Manager Proxy 4.3:kernel-source-5.14.21-150400.24.170.1.noarch",
            "SUSE Manager Proxy 4.3:kernel-syms-5.14.21-150400.24.170.1.x86_64",
            "SUSE Manager Server 4.3:kernel-default-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Manager Server 4.3:kernel-default-5.14.21-150400.24.170.2.s390x",
            "SUSE Manager Server 4.3:kernel-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Manager Server 4.3:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.ppc64le",
            "SUSE Manager Server 4.3:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
            "SUSE Manager Server 4.3:kernel-default-devel-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Manager Server 4.3:kernel-default-devel-5.14.21-150400.24.170.2.s390x",
            "SUSE Manager Server 4.3:kernel-default-devel-5.14.21-150400.24.170.2.x86_64",
            "SUSE Manager Server 4.3:kernel-devel-5.14.21-150400.24.170.1.noarch",
            "SUSE Manager Server 4.3:kernel-macros-5.14.21-150400.24.170.1.noarch",
            "SUSE Manager Server 4.3:kernel-source-5.14.21-150400.24.170.1.noarch",
            "SUSE Manager Server 4.3:kernel-syms-5.14.21-150400.24.170.1.ppc64le",
            "SUSE Manager Server 4.3:kernel-syms-5.14.21-150400.24.170.1.s390x",
            "SUSE Manager Server 4.3:kernel-syms-5.14.21-150400.24.170.1.x86_64",
            "SUSE Manager Server 4.3:kernel-zfcpdump-5.14.21-150400.24.170.2.s390x"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 5.5,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
            "version": "3.1"
          },
          "products": [
            "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-64kb-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-64kb-devel-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-devel-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-devel-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-devel-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-docs-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-macros-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-obs-build-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-obs-build-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-source-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-syms-5.14.21-150400.24.170.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-syms-5.14.21-150400.24.170.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:reiserfs-kmp-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:reiserfs-kmp-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-64kb-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-64kb-devel-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-devel-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-docs-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-macros-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-source-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.170.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.170.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_170-default-1-150400.9.3.2.ppc64le",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_170-default-1-150400.9.3.2.s390x",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_170-default-1-150400.9.3.2.x86_64",
            "SUSE Linux Enterprise Micro 5.3:kernel-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise Micro 5.3:kernel-default-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise Micro 5.3:kernel-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Micro 5.3:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.aarch64",
            "SUSE Linux Enterprise Micro 5.3:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
            "SUSE Linux Enterprise Micro 5.4:kernel-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise Micro 5.4:kernel-default-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise Micro 5.4:kernel-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Micro 5.4:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.aarch64",
            "SUSE Linux Enterprise Micro 5.4:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-64kb-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-64kb-devel-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.aarch64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.ppc64le",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-devel-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-docs-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-macros-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-source-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.170.1.aarch64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.170.1.ppc64le",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.170.1.s390x",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.170.1.x86_64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-zfcpdump-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-devel-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-devel-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-devel-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-docs-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-macros-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-obs-build-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-obs-build-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-source-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-syms-5.14.21-150400.24.170.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-syms-5.14.21-150400.24.170.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Manager Proxy 4.3:kernel-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Manager Proxy 4.3:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
            "SUSE Manager Proxy 4.3:kernel-default-devel-5.14.21-150400.24.170.2.x86_64",
            "SUSE Manager Proxy 4.3:kernel-devel-5.14.21-150400.24.170.1.noarch",
            "SUSE Manager Proxy 4.3:kernel-macros-5.14.21-150400.24.170.1.noarch",
            "SUSE Manager Proxy 4.3:kernel-source-5.14.21-150400.24.170.1.noarch",
            "SUSE Manager Proxy 4.3:kernel-syms-5.14.21-150400.24.170.1.x86_64",
            "SUSE Manager Server 4.3:kernel-default-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Manager Server 4.3:kernel-default-5.14.21-150400.24.170.2.s390x",
            "SUSE Manager Server 4.3:kernel-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Manager Server 4.3:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.ppc64le",
            "SUSE Manager Server 4.3:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
            "SUSE Manager Server 4.3:kernel-default-devel-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Manager Server 4.3:kernel-default-devel-5.14.21-150400.24.170.2.s390x",
            "SUSE Manager Server 4.3:kernel-default-devel-5.14.21-150400.24.170.2.x86_64",
            "SUSE Manager Server 4.3:kernel-devel-5.14.21-150400.24.170.1.noarch",
            "SUSE Manager Server 4.3:kernel-macros-5.14.21-150400.24.170.1.noarch",
            "SUSE Manager Server 4.3:kernel-source-5.14.21-150400.24.170.1.noarch",
            "SUSE Manager Server 4.3:kernel-syms-5.14.21-150400.24.170.1.ppc64le",
            "SUSE Manager Server 4.3:kernel-syms-5.14.21-150400.24.170.1.s390x",
            "SUSE Manager Server 4.3:kernel-syms-5.14.21-150400.24.170.1.x86_64",
            "SUSE Manager Server 4.3:kernel-zfcpdump-5.14.21-150400.24.170.2.s390x"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2025-07-28T15:09:33Z",
          "details": "moderate"
        }
      ],
      "title": "CVE-2022-50046"
    },
    {
      "cve": "CVE-2022-50047",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2022-50047"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "In the Linux kernel, the following vulnerability has been resolved:\n\nnet: dsa: mv88e6060: prevent crash on an unused port\n\nIf the port isn\u0027t a CPU port nor a user port, \u0027cpu_dp\u0027\nis a null pointer and a crash happened on dereferencing\nit in mv88e6060_setup_port():\n\n[    9.575872] Unable to handle kernel NULL pointer dereference at virtual address 00000014\n...\n[    9.942216]  mv88e6060_setup from dsa_register_switch+0x814/0xe84\n[    9.948616]  dsa_register_switch from mdio_probe+0x2c/0x54\n[    9.954433]  mdio_probe from really_probe.part.0+0x98/0x2a0\n[    9.960375]  really_probe.part.0 from driver_probe_device+0x30/0x10c\n[    9.967029]  driver_probe_device from __device_attach_driver+0xb8/0x13c\n[    9.973946]  __device_attach_driver from bus_for_each_drv+0x90/0xe0\n[    9.980509]  bus_for_each_drv from __device_attach+0x110/0x184\n[    9.986632]  __device_attach from bus_probe_device+0x8c/0x94\n[    9.992577]  bus_probe_device from deferred_probe_work_func+0x78/0xa8\n[    9.999311]  deferred_probe_work_func from process_one_work+0x290/0x73c\n[   10.006292]  process_one_work from worker_thread+0x30/0x4b8\n[   10.012155]  worker_thread from kthread+0xd4/0x10c\n[   10.017238]  kthread from ret_from_fork+0x14/0x3c",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.170.2.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.170.2.s390x",
          "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.170.2.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.170.2.s390x",
          "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.170.2.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.170.2.s390x",
          "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.170.2.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.170.2.s390x",
          "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-64kb-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-64kb-devel-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-devel-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-devel-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-devel-5.14.21-150400.24.170.1.noarch",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-docs-5.14.21-150400.24.170.1.noarch",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-macros-5.14.21-150400.24.170.1.noarch",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-obs-build-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-obs-build-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-source-5.14.21-150400.24.170.1.noarch",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-syms-5.14.21-150400.24.170.1.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-syms-5.14.21-150400.24.170.1.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:reiserfs-kmp-default-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:reiserfs-kmp-default-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-64kb-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-64kb-devel-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-devel-5.14.21-150400.24.170.1.noarch",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-docs-5.14.21-150400.24.170.1.noarch",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-macros-5.14.21-150400.24.170.1.noarch",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-source-5.14.21-150400.24.170.1.noarch",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.170.1.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.170.1.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.170.2.ppc64le",
          "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.170.2.s390x",
          "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.170.2.ppc64le",
          "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.170.2.s390x",
          "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_170-default-1-150400.9.3.2.ppc64le",
          "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_170-default-1-150400.9.3.2.s390x",
          "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_170-default-1-150400.9.3.2.x86_64",
          "SUSE Linux Enterprise Micro 5.3:kernel-default-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise Micro 5.3:kernel-default-5.14.21-150400.24.170.2.s390x",
          "SUSE Linux Enterprise Micro 5.3:kernel-default-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise Micro 5.3:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.aarch64",
          "SUSE Linux Enterprise Micro 5.3:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
          "SUSE Linux Enterprise Micro 5.4:kernel-default-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise Micro 5.4:kernel-default-5.14.21-150400.24.170.2.s390x",
          "SUSE Linux Enterprise Micro 5.4:kernel-default-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise Micro 5.4:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.aarch64",
          "SUSE Linux Enterprise Micro 5.4:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-64kb-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-64kb-devel-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-5.14.21-150400.24.170.2.ppc64le",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-5.14.21-150400.24.170.2.s390x",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.aarch64",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.ppc64le",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.170.2.ppc64le",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.170.2.s390x",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-devel-5.14.21-150400.24.170.1.noarch",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-docs-5.14.21-150400.24.170.1.noarch",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-macros-5.14.21-150400.24.170.1.noarch",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.170.2.ppc64le",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.170.2.s390x",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-source-5.14.21-150400.24.170.1.noarch",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.170.1.aarch64",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.170.1.ppc64le",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.170.1.s390x",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.170.1.x86_64",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-zfcpdump-5.14.21-150400.24.170.2.s390x",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.170.2.ppc64le",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.170.2.s390x",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-5.14.21-150400.24.170.2.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-devel-5.14.21-150400.24.170.2.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-devel-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-devel-5.14.21-150400.24.170.1.noarch",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-docs-5.14.21-150400.24.170.1.noarch",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-macros-5.14.21-150400.24.170.1.noarch",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-obs-build-5.14.21-150400.24.170.2.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-obs-build-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-source-5.14.21-150400.24.170.1.noarch",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-syms-5.14.21-150400.24.170.1.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-syms-5.14.21-150400.24.170.1.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.170.2.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.170.2.x86_64",
          "SUSE Manager Proxy 4.3:kernel-default-5.14.21-150400.24.170.2.x86_64",
          "SUSE Manager Proxy 4.3:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
          "SUSE Manager Proxy 4.3:kernel-default-devel-5.14.21-150400.24.170.2.x86_64",
          "SUSE Manager Proxy 4.3:kernel-devel-5.14.21-150400.24.170.1.noarch",
          "SUSE Manager Proxy 4.3:kernel-macros-5.14.21-150400.24.170.1.noarch",
          "SUSE Manager Proxy 4.3:kernel-source-5.14.21-150400.24.170.1.noarch",
          "SUSE Manager Proxy 4.3:kernel-syms-5.14.21-150400.24.170.1.x86_64",
          "SUSE Manager Server 4.3:kernel-default-5.14.21-150400.24.170.2.ppc64le",
          "SUSE Manager Server 4.3:kernel-default-5.14.21-150400.24.170.2.s390x",
          "SUSE Manager Server 4.3:kernel-default-5.14.21-150400.24.170.2.x86_64",
          "SUSE Manager Server 4.3:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.ppc64le",
          "SUSE Manager Server 4.3:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
          "SUSE Manager Server 4.3:kernel-default-devel-5.14.21-150400.24.170.2.ppc64le",
          "SUSE Manager Server 4.3:kernel-default-devel-5.14.21-150400.24.170.2.s390x",
          "SUSE Manager Server 4.3:kernel-default-devel-5.14.21-150400.24.170.2.x86_64",
          "SUSE Manager Server 4.3:kernel-devel-5.14.21-150400.24.170.1.noarch",
          "SUSE Manager Server 4.3:kernel-macros-5.14.21-150400.24.170.1.noarch",
          "SUSE Manager Server 4.3:kernel-source-5.14.21-150400.24.170.1.noarch",
          "SUSE Manager Server 4.3:kernel-syms-5.14.21-150400.24.170.1.ppc64le",
          "SUSE Manager Server 4.3:kernel-syms-5.14.21-150400.24.170.1.s390x",
          "SUSE Manager Server 4.3:kernel-syms-5.14.21-150400.24.170.1.x86_64",
          "SUSE Manager Server 4.3:kernel-zfcpdump-5.14.21-150400.24.170.2.s390x"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2022-50047",
          "url": "https://www.suse.com/security/cve/CVE-2022-50047"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1244993 for CVE-2022-50047",
          "url": "https://bugzilla.suse.com/1244993"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-64kb-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-64kb-devel-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-devel-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-devel-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-devel-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-docs-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-macros-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-obs-build-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-obs-build-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-source-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-syms-5.14.21-150400.24.170.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-syms-5.14.21-150400.24.170.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:reiserfs-kmp-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:reiserfs-kmp-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-64kb-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-64kb-devel-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-devel-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-docs-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-macros-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-source-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.170.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.170.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_170-default-1-150400.9.3.2.ppc64le",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_170-default-1-150400.9.3.2.s390x",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_170-default-1-150400.9.3.2.x86_64",
            "SUSE Linux Enterprise Micro 5.3:kernel-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise Micro 5.3:kernel-default-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise Micro 5.3:kernel-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Micro 5.3:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.aarch64",
            "SUSE Linux Enterprise Micro 5.3:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
            "SUSE Linux Enterprise Micro 5.4:kernel-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise Micro 5.4:kernel-default-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise Micro 5.4:kernel-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Micro 5.4:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.aarch64",
            "SUSE Linux Enterprise Micro 5.4:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-64kb-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-64kb-devel-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.aarch64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.ppc64le",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-devel-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-docs-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-macros-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-source-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.170.1.aarch64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.170.1.ppc64le",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.170.1.s390x",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.170.1.x86_64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-zfcpdump-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-devel-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-devel-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-devel-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-docs-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-macros-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-obs-build-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-obs-build-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-source-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-syms-5.14.21-150400.24.170.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-syms-5.14.21-150400.24.170.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Manager Proxy 4.3:kernel-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Manager Proxy 4.3:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
            "SUSE Manager Proxy 4.3:kernel-default-devel-5.14.21-150400.24.170.2.x86_64",
            "SUSE Manager Proxy 4.3:kernel-devel-5.14.21-150400.24.170.1.noarch",
            "SUSE Manager Proxy 4.3:kernel-macros-5.14.21-150400.24.170.1.noarch",
            "SUSE Manager Proxy 4.3:kernel-source-5.14.21-150400.24.170.1.noarch",
            "SUSE Manager Proxy 4.3:kernel-syms-5.14.21-150400.24.170.1.x86_64",
            "SUSE Manager Server 4.3:kernel-default-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Manager Server 4.3:kernel-default-5.14.21-150400.24.170.2.s390x",
            "SUSE Manager Server 4.3:kernel-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Manager Server 4.3:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.ppc64le",
            "SUSE Manager Server 4.3:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
            "SUSE Manager Server 4.3:kernel-default-devel-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Manager Server 4.3:kernel-default-devel-5.14.21-150400.24.170.2.s390x",
            "SUSE Manager Server 4.3:kernel-default-devel-5.14.21-150400.24.170.2.x86_64",
            "SUSE Manager Server 4.3:kernel-devel-5.14.21-150400.24.170.1.noarch",
            "SUSE Manager Server 4.3:kernel-macros-5.14.21-150400.24.170.1.noarch",
            "SUSE Manager Server 4.3:kernel-source-5.14.21-150400.24.170.1.noarch",
            "SUSE Manager Server 4.3:kernel-syms-5.14.21-150400.24.170.1.ppc64le",
            "SUSE Manager Server 4.3:kernel-syms-5.14.21-150400.24.170.1.s390x",
            "SUSE Manager Server 4.3:kernel-syms-5.14.21-150400.24.170.1.x86_64",
            "SUSE Manager Server 4.3:kernel-zfcpdump-5.14.21-150400.24.170.2.s390x"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 5.5,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
            "version": "3.1"
          },
          "products": [
            "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-64kb-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-64kb-devel-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-devel-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-devel-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-devel-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-docs-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-macros-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-obs-build-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-obs-build-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-source-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-syms-5.14.21-150400.24.170.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-syms-5.14.21-150400.24.170.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:reiserfs-kmp-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:reiserfs-kmp-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-64kb-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-64kb-devel-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-devel-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-docs-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-macros-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-source-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.170.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.170.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_170-default-1-150400.9.3.2.ppc64le",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_170-default-1-150400.9.3.2.s390x",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_170-default-1-150400.9.3.2.x86_64",
            "SUSE Linux Enterprise Micro 5.3:kernel-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise Micro 5.3:kernel-default-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise Micro 5.3:kernel-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Micro 5.3:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.aarch64",
            "SUSE Linux Enterprise Micro 5.3:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
            "SUSE Linux Enterprise Micro 5.4:kernel-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise Micro 5.4:kernel-default-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise Micro 5.4:kernel-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Micro 5.4:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.aarch64",
            "SUSE Linux Enterprise Micro 5.4:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-64kb-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-64kb-devel-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.aarch64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.ppc64le",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-devel-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-docs-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-macros-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-source-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.170.1.aarch64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.170.1.ppc64le",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.170.1.s390x",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.170.1.x86_64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-zfcpdump-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-devel-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-devel-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-devel-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-docs-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-macros-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-obs-build-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-obs-build-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-source-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-syms-5.14.21-150400.24.170.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-syms-5.14.21-150400.24.170.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Manager Proxy 4.3:kernel-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Manager Proxy 4.3:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
            "SUSE Manager Proxy 4.3:kernel-default-devel-5.14.21-150400.24.170.2.x86_64",
            "SUSE Manager Proxy 4.3:kernel-devel-5.14.21-150400.24.170.1.noarch",
            "SUSE Manager Proxy 4.3:kernel-macros-5.14.21-150400.24.170.1.noarch",
            "SUSE Manager Proxy 4.3:kernel-source-5.14.21-150400.24.170.1.noarch",
            "SUSE Manager Proxy 4.3:kernel-syms-5.14.21-150400.24.170.1.x86_64",
            "SUSE Manager Server 4.3:kernel-default-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Manager Server 4.3:kernel-default-5.14.21-150400.24.170.2.s390x",
            "SUSE Manager Server 4.3:kernel-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Manager Server 4.3:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.ppc64le",
            "SUSE Manager Server 4.3:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
            "SUSE Manager Server 4.3:kernel-default-devel-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Manager Server 4.3:kernel-default-devel-5.14.21-150400.24.170.2.s390x",
            "SUSE Manager Server 4.3:kernel-default-devel-5.14.21-150400.24.170.2.x86_64",
            "SUSE Manager Server 4.3:kernel-devel-5.14.21-150400.24.170.1.noarch",
            "SUSE Manager Server 4.3:kernel-macros-5.14.21-150400.24.170.1.noarch",
            "SUSE Manager Server 4.3:kernel-source-5.14.21-150400.24.170.1.noarch",
            "SUSE Manager Server 4.3:kernel-syms-5.14.21-150400.24.170.1.ppc64le",
            "SUSE Manager Server 4.3:kernel-syms-5.14.21-150400.24.170.1.s390x",
            "SUSE Manager Server 4.3:kernel-syms-5.14.21-150400.24.170.1.x86_64",
            "SUSE Manager Server 4.3:kernel-zfcpdump-5.14.21-150400.24.170.2.s390x"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2025-07-28T15:09:33Z",
          "details": "moderate"
        }
      ],
      "title": "CVE-2022-50047"
    },
    {
      "cve": "CVE-2022-50051",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2022-50051"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "In the Linux kernel, the following vulnerability has been resolved:\n\nASoC: SOF: debug: Fix potential buffer overflow by snprintf()\n\nsnprintf() returns the would-be-filled size when the string overflows\nthe given buffer size, hence using this value may result in the buffer\noverflow (although it\u0027s unrealistic).\n\nThis patch replaces with a safer version, scnprintf() for papering\nover such a potential issue.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.170.2.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.170.2.s390x",
          "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.170.2.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.170.2.s390x",
          "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.170.2.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.170.2.s390x",
          "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.170.2.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.170.2.s390x",
          "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-64kb-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-64kb-devel-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-devel-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-devel-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-devel-5.14.21-150400.24.170.1.noarch",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-docs-5.14.21-150400.24.170.1.noarch",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-macros-5.14.21-150400.24.170.1.noarch",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-obs-build-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-obs-build-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-source-5.14.21-150400.24.170.1.noarch",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-syms-5.14.21-150400.24.170.1.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-syms-5.14.21-150400.24.170.1.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:reiserfs-kmp-default-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:reiserfs-kmp-default-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-64kb-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-64kb-devel-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-devel-5.14.21-150400.24.170.1.noarch",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-docs-5.14.21-150400.24.170.1.noarch",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-macros-5.14.21-150400.24.170.1.noarch",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-source-5.14.21-150400.24.170.1.noarch",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.170.1.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.170.1.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.170.2.ppc64le",
          "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.170.2.s390x",
          "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.170.2.ppc64le",
          "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.170.2.s390x",
          "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_170-default-1-150400.9.3.2.ppc64le",
          "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_170-default-1-150400.9.3.2.s390x",
          "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_170-default-1-150400.9.3.2.x86_64",
          "SUSE Linux Enterprise Micro 5.3:kernel-default-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise Micro 5.3:kernel-default-5.14.21-150400.24.170.2.s390x",
          "SUSE Linux Enterprise Micro 5.3:kernel-default-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise Micro 5.3:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.aarch64",
          "SUSE Linux Enterprise Micro 5.3:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
          "SUSE Linux Enterprise Micro 5.4:kernel-default-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise Micro 5.4:kernel-default-5.14.21-150400.24.170.2.s390x",
          "SUSE Linux Enterprise Micro 5.4:kernel-default-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise Micro 5.4:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.aarch64",
          "SUSE Linux Enterprise Micro 5.4:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-64kb-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-64kb-devel-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-5.14.21-150400.24.170.2.ppc64le",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-5.14.21-150400.24.170.2.s390x",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.aarch64",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.ppc64le",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.170.2.ppc64le",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.170.2.s390x",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-devel-5.14.21-150400.24.170.1.noarch",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-docs-5.14.21-150400.24.170.1.noarch",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-macros-5.14.21-150400.24.170.1.noarch",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.170.2.ppc64le",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.170.2.s390x",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-source-5.14.21-150400.24.170.1.noarch",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.170.1.aarch64",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.170.1.ppc64le",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.170.1.s390x",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.170.1.x86_64",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-zfcpdump-5.14.21-150400.24.170.2.s390x",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.170.2.ppc64le",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.170.2.s390x",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-5.14.21-150400.24.170.2.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-devel-5.14.21-150400.24.170.2.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-devel-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-devel-5.14.21-150400.24.170.1.noarch",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-docs-5.14.21-150400.24.170.1.noarch",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-macros-5.14.21-150400.24.170.1.noarch",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-obs-build-5.14.21-150400.24.170.2.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-obs-build-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-source-5.14.21-150400.24.170.1.noarch",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-syms-5.14.21-150400.24.170.1.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-syms-5.14.21-150400.24.170.1.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.170.2.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.170.2.x86_64",
          "SUSE Manager Proxy 4.3:kernel-default-5.14.21-150400.24.170.2.x86_64",
          "SUSE Manager Proxy 4.3:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
          "SUSE Manager Proxy 4.3:kernel-default-devel-5.14.21-150400.24.170.2.x86_64",
          "SUSE Manager Proxy 4.3:kernel-devel-5.14.21-150400.24.170.1.noarch",
          "SUSE Manager Proxy 4.3:kernel-macros-5.14.21-150400.24.170.1.noarch",
          "SUSE Manager Proxy 4.3:kernel-source-5.14.21-150400.24.170.1.noarch",
          "SUSE Manager Proxy 4.3:kernel-syms-5.14.21-150400.24.170.1.x86_64",
          "SUSE Manager Server 4.3:kernel-default-5.14.21-150400.24.170.2.ppc64le",
          "SUSE Manager Server 4.3:kernel-default-5.14.21-150400.24.170.2.s390x",
          "SUSE Manager Server 4.3:kernel-default-5.14.21-150400.24.170.2.x86_64",
          "SUSE Manager Server 4.3:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.ppc64le",
          "SUSE Manager Server 4.3:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
          "SUSE Manager Server 4.3:kernel-default-devel-5.14.21-150400.24.170.2.ppc64le",
          "SUSE Manager Server 4.3:kernel-default-devel-5.14.21-150400.24.170.2.s390x",
          "SUSE Manager Server 4.3:kernel-default-devel-5.14.21-150400.24.170.2.x86_64",
          "SUSE Manager Server 4.3:kernel-devel-5.14.21-150400.24.170.1.noarch",
          "SUSE Manager Server 4.3:kernel-macros-5.14.21-150400.24.170.1.noarch",
          "SUSE Manager Server 4.3:kernel-source-5.14.21-150400.24.170.1.noarch",
          "SUSE Manager Server 4.3:kernel-syms-5.14.21-150400.24.170.1.ppc64le",
          "SUSE Manager Server 4.3:kernel-syms-5.14.21-150400.24.170.1.s390x",
          "SUSE Manager Server 4.3:kernel-syms-5.14.21-150400.24.170.1.x86_64",
          "SUSE Manager Server 4.3:kernel-zfcpdump-5.14.21-150400.24.170.2.s390x"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2022-50051",
          "url": "https://www.suse.com/security/cve/CVE-2022-50051"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1245041 for CVE-2022-50051",
          "url": "https://bugzilla.suse.com/1245041"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-64kb-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-64kb-devel-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-devel-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-devel-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-devel-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-docs-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-macros-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-obs-build-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-obs-build-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-source-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-syms-5.14.21-150400.24.170.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-syms-5.14.21-150400.24.170.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:reiserfs-kmp-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:reiserfs-kmp-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-64kb-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-64kb-devel-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-devel-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-docs-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-macros-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-source-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.170.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.170.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_170-default-1-150400.9.3.2.ppc64le",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_170-default-1-150400.9.3.2.s390x",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_170-default-1-150400.9.3.2.x86_64",
            "SUSE Linux Enterprise Micro 5.3:kernel-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise Micro 5.3:kernel-default-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise Micro 5.3:kernel-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Micro 5.3:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.aarch64",
            "SUSE Linux Enterprise Micro 5.3:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
            "SUSE Linux Enterprise Micro 5.4:kernel-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise Micro 5.4:kernel-default-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise Micro 5.4:kernel-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Micro 5.4:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.aarch64",
            "SUSE Linux Enterprise Micro 5.4:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-64kb-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-64kb-devel-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.aarch64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.ppc64le",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-devel-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-docs-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-macros-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-source-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.170.1.aarch64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.170.1.ppc64le",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.170.1.s390x",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.170.1.x86_64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-zfcpdump-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-devel-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-devel-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-devel-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-docs-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-macros-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-obs-build-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-obs-build-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-source-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-syms-5.14.21-150400.24.170.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-syms-5.14.21-150400.24.170.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Manager Proxy 4.3:kernel-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Manager Proxy 4.3:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
            "SUSE Manager Proxy 4.3:kernel-default-devel-5.14.21-150400.24.170.2.x86_64",
            "SUSE Manager Proxy 4.3:kernel-devel-5.14.21-150400.24.170.1.noarch",
            "SUSE Manager Proxy 4.3:kernel-macros-5.14.21-150400.24.170.1.noarch",
            "SUSE Manager Proxy 4.3:kernel-source-5.14.21-150400.24.170.1.noarch",
            "SUSE Manager Proxy 4.3:kernel-syms-5.14.21-150400.24.170.1.x86_64",
            "SUSE Manager Server 4.3:kernel-default-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Manager Server 4.3:kernel-default-5.14.21-150400.24.170.2.s390x",
            "SUSE Manager Server 4.3:kernel-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Manager Server 4.3:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.ppc64le",
            "SUSE Manager Server 4.3:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
            "SUSE Manager Server 4.3:kernel-default-devel-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Manager Server 4.3:kernel-default-devel-5.14.21-150400.24.170.2.s390x",
            "SUSE Manager Server 4.3:kernel-default-devel-5.14.21-150400.24.170.2.x86_64",
            "SUSE Manager Server 4.3:kernel-devel-5.14.21-150400.24.170.1.noarch",
            "SUSE Manager Server 4.3:kernel-macros-5.14.21-150400.24.170.1.noarch",
            "SUSE Manager Server 4.3:kernel-source-5.14.21-150400.24.170.1.noarch",
            "SUSE Manager Server 4.3:kernel-syms-5.14.21-150400.24.170.1.ppc64le",
            "SUSE Manager Server 4.3:kernel-syms-5.14.21-150400.24.170.1.s390x",
            "SUSE Manager Server 4.3:kernel-syms-5.14.21-150400.24.170.1.x86_64",
            "SUSE Manager Server 4.3:kernel-zfcpdump-5.14.21-150400.24.170.2.s390x"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 5.5,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
            "version": "3.1"
          },
          "products": [
            "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-64kb-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-64kb-devel-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-devel-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-devel-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-devel-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-docs-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-macros-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-obs-build-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-obs-build-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-source-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-syms-5.14.21-150400.24.170.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-syms-5.14.21-150400.24.170.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:reiserfs-kmp-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:reiserfs-kmp-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-64kb-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-64kb-devel-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-devel-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-docs-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-macros-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-source-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.170.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.170.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_170-default-1-150400.9.3.2.ppc64le",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_170-default-1-150400.9.3.2.s390x",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_170-default-1-150400.9.3.2.x86_64",
            "SUSE Linux Enterprise Micro 5.3:kernel-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise Micro 5.3:kernel-default-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise Micro 5.3:kernel-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Micro 5.3:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.aarch64",
            "SUSE Linux Enterprise Micro 5.3:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
            "SUSE Linux Enterprise Micro 5.4:kernel-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise Micro 5.4:kernel-default-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise Micro 5.4:kernel-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Micro 5.4:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.aarch64",
            "SUSE Linux Enterprise Micro 5.4:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-64kb-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-64kb-devel-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.aarch64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.ppc64le",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-devel-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-docs-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-macros-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-source-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.170.1.aarch64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.170.1.ppc64le",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.170.1.s390x",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.170.1.x86_64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-zfcpdump-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-devel-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-devel-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-devel-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-docs-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-macros-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-obs-build-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-obs-build-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-source-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-syms-5.14.21-150400.24.170.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-syms-5.14.21-150400.24.170.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Manager Proxy 4.3:kernel-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Manager Proxy 4.3:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
            "SUSE Manager Proxy 4.3:kernel-default-devel-5.14.21-150400.24.170.2.x86_64",
            "SUSE Manager Proxy 4.3:kernel-devel-5.14.21-150400.24.170.1.noarch",
            "SUSE Manager Proxy 4.3:kernel-macros-5.14.21-150400.24.170.1.noarch",
            "SUSE Manager Proxy 4.3:kernel-source-5.14.21-150400.24.170.1.noarch",
            "SUSE Manager Proxy 4.3:kernel-syms-5.14.21-150400.24.170.1.x86_64",
            "SUSE Manager Server 4.3:kernel-default-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Manager Server 4.3:kernel-default-5.14.21-150400.24.170.2.s390x",
            "SUSE Manager Server 4.3:kernel-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Manager Server 4.3:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.ppc64le",
            "SUSE Manager Server 4.3:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
            "SUSE Manager Server 4.3:kernel-default-devel-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Manager Server 4.3:kernel-default-devel-5.14.21-150400.24.170.2.s390x",
            "SUSE Manager Server 4.3:kernel-default-devel-5.14.21-150400.24.170.2.x86_64",
            "SUSE Manager Server 4.3:kernel-devel-5.14.21-150400.24.170.1.noarch",
            "SUSE Manager Server 4.3:kernel-macros-5.14.21-150400.24.170.1.noarch",
            "SUSE Manager Server 4.3:kernel-source-5.14.21-150400.24.170.1.noarch",
            "SUSE Manager Server 4.3:kernel-syms-5.14.21-150400.24.170.1.ppc64le",
            "SUSE Manager Server 4.3:kernel-syms-5.14.21-150400.24.170.1.s390x",
            "SUSE Manager Server 4.3:kernel-syms-5.14.21-150400.24.170.1.x86_64",
            "SUSE Manager Server 4.3:kernel-zfcpdump-5.14.21-150400.24.170.2.s390x"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2025-07-28T15:09:33Z",
          "details": "moderate"
        }
      ],
      "title": "CVE-2022-50051"
    },
    {
      "cve": "CVE-2022-50053",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2022-50053"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "In the Linux kernel, the following vulnerability has been resolved:\n\niavf: Fix reset error handling\n\nDo not call iavf_close in iavf_reset_task error handling. Doing so can\nlead to double call of napi_disable, which can lead to deadlock there.\nRemoving VF would lead to iavf_remove task being stuck, because it\nrequires crit_lock, which is held by iavf_close.\nCall iavf_disable_vf if reset fail, so that driver will clean up\nremaining invalid resources.\nDuring rapid VF resets, HW can fail to setup VF mailbox. Wrong\nerror handling can lead to iavf_remove being stuck with:\n[ 5218.999087] iavf 0000:82:01.0: Failed to init adminq: -53\n...\n[ 5267.189211] INFO: task repro.sh:11219 blocked for more than 30 seconds.\n[ 5267.189520]       Tainted: G S          E     5.18.0-04958-ga54ce3703613-dirty #1\n[ 5267.189764] \"echo 0 \u003e /proc/sys/kernel/hung_task_timeout_secs\" disables this message.\n[ 5267.190062] task:repro.sh        state:D stack:    0 pid:11219 ppid:  8162 flags:0x00000000\n[ 5267.190347] Call Trace:\n[ 5267.190647]  \u003cTASK\u003e\n[ 5267.190927]  __schedule+0x460/0x9f0\n[ 5267.191264]  schedule+0x44/0xb0\n[ 5267.191563]  schedule_preempt_disabled+0x14/0x20\n[ 5267.191890]  __mutex_lock.isra.12+0x6e3/0xac0\n[ 5267.192237]  ? iavf_remove+0xf9/0x6c0 [iavf]\n[ 5267.192565]  iavf_remove+0x12a/0x6c0 [iavf]\n[ 5267.192911]  ? _raw_spin_unlock_irqrestore+0x1e/0x40\n[ 5267.193285]  pci_device_remove+0x36/0xb0\n[ 5267.193619]  device_release_driver_internal+0xc1/0x150\n[ 5267.193974]  pci_stop_bus_device+0x69/0x90\n[ 5267.194361]  pci_stop_and_remove_bus_device+0xe/0x20\n[ 5267.194735]  pci_iov_remove_virtfn+0xba/0x120\n[ 5267.195130]  sriov_disable+0x2f/0xe0\n[ 5267.195506]  ice_free_vfs+0x7d/0x2f0 [ice]\n[ 5267.196056]  ? pci_get_device+0x4f/0x70\n[ 5267.196496]  ice_sriov_configure+0x78/0x1a0 [ice]\n[ 5267.196995]  sriov_numvfs_store+0xfe/0x140\n[ 5267.197466]  kernfs_fop_write_iter+0x12e/0x1c0\n[ 5267.197918]  new_sync_write+0x10c/0x190\n[ 5267.198404]  vfs_write+0x24e/0x2d0\n[ 5267.198886]  ksys_write+0x5c/0xd0\n[ 5267.199367]  do_syscall_64+0x3a/0x80\n[ 5267.199827]  entry_SYSCALL_64_after_hwframe+0x46/0xb0\n[ 5267.200317] RIP: 0033:0x7f5b381205c8\n[ 5267.200814] RSP: 002b:00007fff8c7e8c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000001\n[ 5267.201981] RAX: ffffffffffffffda RBX: 0000000000000002 RCX: 00007f5b381205c8\n[ 5267.202620] RDX: 0000000000000002 RSI: 00005569420ee900 RDI: 0000000000000001\n[ 5267.203426] RBP: 00005569420ee900 R08: 000000000000000a R09: 00007f5b38180820\n[ 5267.204327] R10: 000000000000000a R11: 0000000000000246 R12: 00007f5b383c06e0\n[ 5267.205193] R13: 0000000000000002 R14: 00007f5b383bb880 R15: 0000000000000002\n[ 5267.206041]  \u003c/TASK\u003e\n[ 5267.206970] Kernel panic - not syncing: hung_task: blocked tasks\n[ 5267.207809] CPU: 48 PID: 551 Comm: khungtaskd Kdump: loaded Tainted: G S          E     5.18.0-04958-ga54ce3703613-dirty #1\n[ 5267.208726] Hardware name: Dell Inc. PowerEdge R730/0WCJNT, BIOS 2.11.0 11/02/2019\n[ 5267.209623] Call Trace:\n[ 5267.210569]  \u003cTASK\u003e\n[ 5267.211480]  dump_stack_lvl+0x33/0x42\n[ 5267.212472]  panic+0x107/0x294\n[ 5267.213467]  watchdog.cold.8+0xc/0xbb\n[ 5267.214413]  ? proc_dohung_task_timeout_secs+0x30/0x30\n[ 5267.215511]  kthread+0xf4/0x120\n[ 5267.216459]  ? kthread_complete_and_exit+0x20/0x20\n[ 5267.217505]  ret_from_fork+0x22/0x30\n[ 5267.218459]  \u003c/TASK\u003e",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.170.2.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.170.2.s390x",
          "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.170.2.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.170.2.s390x",
          "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.170.2.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.170.2.s390x",
          "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.170.2.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.170.2.s390x",
          "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-64kb-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-64kb-devel-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-devel-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-devel-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-devel-5.14.21-150400.24.170.1.noarch",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-docs-5.14.21-150400.24.170.1.noarch",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-macros-5.14.21-150400.24.170.1.noarch",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-obs-build-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-obs-build-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-source-5.14.21-150400.24.170.1.noarch",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-syms-5.14.21-150400.24.170.1.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-syms-5.14.21-150400.24.170.1.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:reiserfs-kmp-default-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:reiserfs-kmp-default-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-64kb-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-64kb-devel-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-devel-5.14.21-150400.24.170.1.noarch",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-docs-5.14.21-150400.24.170.1.noarch",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-macros-5.14.21-150400.24.170.1.noarch",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-source-5.14.21-150400.24.170.1.noarch",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.170.1.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.170.1.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.170.2.ppc64le",
          "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.170.2.s390x",
          "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.170.2.ppc64le",
          "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.170.2.s390x",
          "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_170-default-1-150400.9.3.2.ppc64le",
          "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_170-default-1-150400.9.3.2.s390x",
          "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_170-default-1-150400.9.3.2.x86_64",
          "SUSE Linux Enterprise Micro 5.3:kernel-default-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise Micro 5.3:kernel-default-5.14.21-150400.24.170.2.s390x",
          "SUSE Linux Enterprise Micro 5.3:kernel-default-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise Micro 5.3:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.aarch64",
          "SUSE Linux Enterprise Micro 5.3:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
          "SUSE Linux Enterprise Micro 5.4:kernel-default-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise Micro 5.4:kernel-default-5.14.21-150400.24.170.2.s390x",
          "SUSE Linux Enterprise Micro 5.4:kernel-default-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise Micro 5.4:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.aarch64",
          "SUSE Linux Enterprise Micro 5.4:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-64kb-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-64kb-devel-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-5.14.21-150400.24.170.2.ppc64le",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-5.14.21-150400.24.170.2.s390x",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.aarch64",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.ppc64le",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.170.2.ppc64le",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.170.2.s390x",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-devel-5.14.21-150400.24.170.1.noarch",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-docs-5.14.21-150400.24.170.1.noarch",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-macros-5.14.21-150400.24.170.1.noarch",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.170.2.ppc64le",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.170.2.s390x",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-source-5.14.21-150400.24.170.1.noarch",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.170.1.aarch64",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.170.1.ppc64le",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.170.1.s390x",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.170.1.x86_64",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-zfcpdump-5.14.21-150400.24.170.2.s390x",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.170.2.ppc64le",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.170.2.s390x",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-5.14.21-150400.24.170.2.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-devel-5.14.21-150400.24.170.2.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-devel-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-devel-5.14.21-150400.24.170.1.noarch",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-docs-5.14.21-150400.24.170.1.noarch",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-macros-5.14.21-150400.24.170.1.noarch",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-obs-build-5.14.21-150400.24.170.2.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-obs-build-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-source-5.14.21-150400.24.170.1.noarch",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-syms-5.14.21-150400.24.170.1.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-syms-5.14.21-150400.24.170.1.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.170.2.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.170.2.x86_64",
          "SUSE Manager Proxy 4.3:kernel-default-5.14.21-150400.24.170.2.x86_64",
          "SUSE Manager Proxy 4.3:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
          "SUSE Manager Proxy 4.3:kernel-default-devel-5.14.21-150400.24.170.2.x86_64",
          "SUSE Manager Proxy 4.3:kernel-devel-5.14.21-150400.24.170.1.noarch",
          "SUSE Manager Proxy 4.3:kernel-macros-5.14.21-150400.24.170.1.noarch",
          "SUSE Manager Proxy 4.3:kernel-source-5.14.21-150400.24.170.1.noarch",
          "SUSE Manager Proxy 4.3:kernel-syms-5.14.21-150400.24.170.1.x86_64",
          "SUSE Manager Server 4.3:kernel-default-5.14.21-150400.24.170.2.ppc64le",
          "SUSE Manager Server 4.3:kernel-default-5.14.21-150400.24.170.2.s390x",
          "SUSE Manager Server 4.3:kernel-default-5.14.21-150400.24.170.2.x86_64",
          "SUSE Manager Server 4.3:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.ppc64le",
          "SUSE Manager Server 4.3:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
          "SUSE Manager Server 4.3:kernel-default-devel-5.14.21-150400.24.170.2.ppc64le",
          "SUSE Manager Server 4.3:kernel-default-devel-5.14.21-150400.24.170.2.s390x",
          "SUSE Manager Server 4.3:kernel-default-devel-5.14.21-150400.24.170.2.x86_64",
          "SUSE Manager Server 4.3:kernel-devel-5.14.21-150400.24.170.1.noarch",
          "SUSE Manager Server 4.3:kernel-macros-5.14.21-150400.24.170.1.noarch",
          "SUSE Manager Server 4.3:kernel-source-5.14.21-150400.24.170.1.noarch",
          "SUSE Manager Server 4.3:kernel-syms-5.14.21-150400.24.170.1.ppc64le",
          "SUSE Manager Server 4.3:kernel-syms-5.14.21-150400.24.170.1.s390x",
          "SUSE Manager Server 4.3:kernel-syms-5.14.21-150400.24.170.1.x86_64",
          "SUSE Manager Server 4.3:kernel-zfcpdump-5.14.21-150400.24.170.2.s390x"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2022-50053",
          "url": "https://www.suse.com/security/cve/CVE-2022-50053"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1245038 for CVE-2022-50053",
          "url": "https://bugzilla.suse.com/1245038"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-64kb-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-64kb-devel-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-devel-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-devel-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-devel-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-docs-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-macros-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-obs-build-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-obs-build-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-source-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-syms-5.14.21-150400.24.170.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-syms-5.14.21-150400.24.170.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:reiserfs-kmp-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:reiserfs-kmp-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-64kb-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-64kb-devel-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-devel-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-docs-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-macros-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-source-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.170.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.170.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_170-default-1-150400.9.3.2.ppc64le",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_170-default-1-150400.9.3.2.s390x",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_170-default-1-150400.9.3.2.x86_64",
            "SUSE Linux Enterprise Micro 5.3:kernel-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise Micro 5.3:kernel-default-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise Micro 5.3:kernel-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Micro 5.3:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.aarch64",
            "SUSE Linux Enterprise Micro 5.3:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
            "SUSE Linux Enterprise Micro 5.4:kernel-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise Micro 5.4:kernel-default-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise Micro 5.4:kernel-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Micro 5.4:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.aarch64",
            "SUSE Linux Enterprise Micro 5.4:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-64kb-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-64kb-devel-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.aarch64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.ppc64le",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-devel-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-docs-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-macros-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-source-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.170.1.aarch64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.170.1.ppc64le",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.170.1.s390x",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.170.1.x86_64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-zfcpdump-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-devel-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-devel-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-devel-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-docs-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-macros-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-obs-build-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-obs-build-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-source-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-syms-5.14.21-150400.24.170.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-syms-5.14.21-150400.24.170.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Manager Proxy 4.3:kernel-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Manager Proxy 4.3:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
            "SUSE Manager Proxy 4.3:kernel-default-devel-5.14.21-150400.24.170.2.x86_64",
            "SUSE Manager Proxy 4.3:kernel-devel-5.14.21-150400.24.170.1.noarch",
            "SUSE Manager Proxy 4.3:kernel-macros-5.14.21-150400.24.170.1.noarch",
            "SUSE Manager Proxy 4.3:kernel-source-5.14.21-150400.24.170.1.noarch",
            "SUSE Manager Proxy 4.3:kernel-syms-5.14.21-150400.24.170.1.x86_64",
            "SUSE Manager Server 4.3:kernel-default-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Manager Server 4.3:kernel-default-5.14.21-150400.24.170.2.s390x",
            "SUSE Manager Server 4.3:kernel-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Manager Server 4.3:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.ppc64le",
            "SUSE Manager Server 4.3:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
            "SUSE Manager Server 4.3:kernel-default-devel-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Manager Server 4.3:kernel-default-devel-5.14.21-150400.24.170.2.s390x",
            "SUSE Manager Server 4.3:kernel-default-devel-5.14.21-150400.24.170.2.x86_64",
            "SUSE Manager Server 4.3:kernel-devel-5.14.21-150400.24.170.1.noarch",
            "SUSE Manager Server 4.3:kernel-macros-5.14.21-150400.24.170.1.noarch",
            "SUSE Manager Server 4.3:kernel-source-5.14.21-150400.24.170.1.noarch",
            "SUSE Manager Server 4.3:kernel-syms-5.14.21-150400.24.170.1.ppc64le",
            "SUSE Manager Server 4.3:kernel-syms-5.14.21-150400.24.170.1.s390x",
            "SUSE Manager Server 4.3:kernel-syms-5.14.21-150400.24.170.1.x86_64",
            "SUSE Manager Server 4.3:kernel-zfcpdump-5.14.21-150400.24.170.2.s390x"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 5.5,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
            "version": "3.1"
          },
          "products": [
            "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-64kb-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-64kb-devel-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-devel-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-devel-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-devel-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-docs-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-macros-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-obs-build-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-obs-build-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-source-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-syms-5.14.21-150400.24.170.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-syms-5.14.21-150400.24.170.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:reiserfs-kmp-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:reiserfs-kmp-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-64kb-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-64kb-devel-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-devel-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-docs-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-macros-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-source-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.170.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.170.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_170-default-1-150400.9.3.2.ppc64le",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_170-default-1-150400.9.3.2.s390x",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_170-default-1-150400.9.3.2.x86_64",
            "SUSE Linux Enterprise Micro 5.3:kernel-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise Micro 5.3:kernel-default-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise Micro 5.3:kernel-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Micro 5.3:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.aarch64",
            "SUSE Linux Enterprise Micro 5.3:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
            "SUSE Linux Enterprise Micro 5.4:kernel-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise Micro 5.4:kernel-default-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise Micro 5.4:kernel-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Micro 5.4:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.aarch64",
            "SUSE Linux Enterprise Micro 5.4:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-64kb-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-64kb-devel-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.aarch64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.ppc64le",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-devel-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-docs-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-macros-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-source-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.170.1.aarch64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.170.1.ppc64le",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.170.1.s390x",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.170.1.x86_64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-zfcpdump-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-devel-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-devel-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-devel-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-docs-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-macros-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-obs-build-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-obs-build-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-source-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-syms-5.14.21-150400.24.170.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-syms-5.14.21-150400.24.170.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Manager Proxy 4.3:kernel-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Manager Proxy 4.3:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
            "SUSE Manager Proxy 4.3:kernel-default-devel-5.14.21-150400.24.170.2.x86_64",
            "SUSE Manager Proxy 4.3:kernel-devel-5.14.21-150400.24.170.1.noarch",
            "SUSE Manager Proxy 4.3:kernel-macros-5.14.21-150400.24.170.1.noarch",
            "SUSE Manager Proxy 4.3:kernel-source-5.14.21-150400.24.170.1.noarch",
            "SUSE Manager Proxy 4.3:kernel-syms-5.14.21-150400.24.170.1.x86_64",
            "SUSE Manager Server 4.3:kernel-default-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Manager Server 4.3:kernel-default-5.14.21-150400.24.170.2.s390x",
            "SUSE Manager Server 4.3:kernel-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Manager Server 4.3:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.ppc64le",
            "SUSE Manager Server 4.3:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
            "SUSE Manager Server 4.3:kernel-default-devel-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Manager Server 4.3:kernel-default-devel-5.14.21-150400.24.170.2.s390x",
            "SUSE Manager Server 4.3:kernel-default-devel-5.14.21-150400.24.170.2.x86_64",
            "SUSE Manager Server 4.3:kernel-devel-5.14.21-150400.24.170.1.noarch",
            "SUSE Manager Server 4.3:kernel-macros-5.14.21-150400.24.170.1.noarch",
            "SUSE Manager Server 4.3:kernel-source-5.14.21-150400.24.170.1.noarch",
            "SUSE Manager Server 4.3:kernel-syms-5.14.21-150400.24.170.1.ppc64le",
            "SUSE Manager Server 4.3:kernel-syms-5.14.21-150400.24.170.1.s390x",
            "SUSE Manager Server 4.3:kernel-syms-5.14.21-150400.24.170.1.x86_64",
            "SUSE Manager Server 4.3:kernel-zfcpdump-5.14.21-150400.24.170.2.s390x"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2025-07-28T15:09:33Z",
          "details": "moderate"
        }
      ],
      "title": "CVE-2022-50053"
    },
    {
      "cve": "CVE-2022-50055",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2022-50055"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "In the Linux kernel, the following vulnerability has been resolved:\n\niavf: Fix adminq error handling\n\niavf_alloc_asq_bufs/iavf_alloc_arq_bufs allocates with dma_alloc_coherent\nmemory for VF mailbox.\nFree DMA regions for both ASQ and ARQ in case error happens during\nconfiguration of ASQ/ARQ registers.\nWithout this change it is possible to see when unloading interface:\n74626.583369: dma_debug_device_change: device driver has pending DMA allocations while released from device [count=32]\nOne of leaked entries details: [device address=0x0000000b27ff9000] [size=4096 bytes] [mapped with DMA_BIDIRECTIONAL] [mapped as coherent]",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.170.2.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.170.2.s390x",
          "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.170.2.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.170.2.s390x",
          "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.170.2.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.170.2.s390x",
          "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.170.2.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.170.2.s390x",
          "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-64kb-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-64kb-devel-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-devel-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-devel-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-devel-5.14.21-150400.24.170.1.noarch",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-docs-5.14.21-150400.24.170.1.noarch",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-macros-5.14.21-150400.24.170.1.noarch",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-obs-build-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-obs-build-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-source-5.14.21-150400.24.170.1.noarch",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-syms-5.14.21-150400.24.170.1.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-syms-5.14.21-150400.24.170.1.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:reiserfs-kmp-default-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:reiserfs-kmp-default-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-64kb-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-64kb-devel-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-devel-5.14.21-150400.24.170.1.noarch",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-docs-5.14.21-150400.24.170.1.noarch",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-macros-5.14.21-150400.24.170.1.noarch",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-source-5.14.21-150400.24.170.1.noarch",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.170.1.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.170.1.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.170.2.ppc64le",
          "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.170.2.s390x",
          "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.170.2.ppc64le",
          "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.170.2.s390x",
          "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_170-default-1-150400.9.3.2.ppc64le",
          "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_170-default-1-150400.9.3.2.s390x",
          "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_170-default-1-150400.9.3.2.x86_64",
          "SUSE Linux Enterprise Micro 5.3:kernel-default-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise Micro 5.3:kernel-default-5.14.21-150400.24.170.2.s390x",
          "SUSE Linux Enterprise Micro 5.3:kernel-default-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise Micro 5.3:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.aarch64",
          "SUSE Linux Enterprise Micro 5.3:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
          "SUSE Linux Enterprise Micro 5.4:kernel-default-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise Micro 5.4:kernel-default-5.14.21-150400.24.170.2.s390x",
          "SUSE Linux Enterprise Micro 5.4:kernel-default-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise Micro 5.4:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.aarch64",
          "SUSE Linux Enterprise Micro 5.4:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-64kb-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-64kb-devel-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-5.14.21-150400.24.170.2.ppc64le",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-5.14.21-150400.24.170.2.s390x",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.aarch64",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.ppc64le",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.170.2.ppc64le",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.170.2.s390x",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-devel-5.14.21-150400.24.170.1.noarch",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-docs-5.14.21-150400.24.170.1.noarch",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-macros-5.14.21-150400.24.170.1.noarch",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.170.2.ppc64le",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.170.2.s390x",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-source-5.14.21-150400.24.170.1.noarch",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.170.1.aarch64",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.170.1.ppc64le",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.170.1.s390x",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.170.1.x86_64",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-zfcpdump-5.14.21-150400.24.170.2.s390x",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.170.2.ppc64le",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.170.2.s390x",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-5.14.21-150400.24.170.2.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-devel-5.14.21-150400.24.170.2.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-devel-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-devel-5.14.21-150400.24.170.1.noarch",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-docs-5.14.21-150400.24.170.1.noarch",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-macros-5.14.21-150400.24.170.1.noarch",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-obs-build-5.14.21-150400.24.170.2.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-obs-build-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-source-5.14.21-150400.24.170.1.noarch",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-syms-5.14.21-150400.24.170.1.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-syms-5.14.21-150400.24.170.1.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.170.2.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.170.2.x86_64",
          "SUSE Manager Proxy 4.3:kernel-default-5.14.21-150400.24.170.2.x86_64",
          "SUSE Manager Proxy 4.3:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
          "SUSE Manager Proxy 4.3:kernel-default-devel-5.14.21-150400.24.170.2.x86_64",
          "SUSE Manager Proxy 4.3:kernel-devel-5.14.21-150400.24.170.1.noarch",
          "SUSE Manager Proxy 4.3:kernel-macros-5.14.21-150400.24.170.1.noarch",
          "SUSE Manager Proxy 4.3:kernel-source-5.14.21-150400.24.170.1.noarch",
          "SUSE Manager Proxy 4.3:kernel-syms-5.14.21-150400.24.170.1.x86_64",
          "SUSE Manager Server 4.3:kernel-default-5.14.21-150400.24.170.2.ppc64le",
          "SUSE Manager Server 4.3:kernel-default-5.14.21-150400.24.170.2.s390x",
          "SUSE Manager Server 4.3:kernel-default-5.14.21-150400.24.170.2.x86_64",
          "SUSE Manager Server 4.3:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.ppc64le",
          "SUSE Manager Server 4.3:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
          "SUSE Manager Server 4.3:kernel-default-devel-5.14.21-150400.24.170.2.ppc64le",
          "SUSE Manager Server 4.3:kernel-default-devel-5.14.21-150400.24.170.2.s390x",
          "SUSE Manager Server 4.3:kernel-default-devel-5.14.21-150400.24.170.2.x86_64",
          "SUSE Manager Server 4.3:kernel-devel-5.14.21-150400.24.170.1.noarch",
          "SUSE Manager Server 4.3:kernel-macros-5.14.21-150400.24.170.1.noarch",
          "SUSE Manager Server 4.3:kernel-source-5.14.21-150400.24.170.1.noarch",
          "SUSE Manager Server 4.3:kernel-syms-5.14.21-150400.24.170.1.ppc64le",
          "SUSE Manager Server 4.3:kernel-syms-5.14.21-150400.24.170.1.s390x",
          "SUSE Manager Server 4.3:kernel-syms-5.14.21-150400.24.170.1.x86_64",
          "SUSE Manager Server 4.3:kernel-zfcpdump-5.14.21-150400.24.170.2.s390x"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2022-50055",
          "url": "https://www.suse.com/security/cve/CVE-2022-50055"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1245039 for CVE-2022-50055",
          "url": "https://bugzilla.suse.com/1245039"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-64kb-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-64kb-devel-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-devel-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-devel-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-devel-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-docs-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-macros-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-obs-build-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-obs-build-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-source-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-syms-5.14.21-150400.24.170.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-syms-5.14.21-150400.24.170.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:reiserfs-kmp-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:reiserfs-kmp-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-64kb-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-64kb-devel-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-devel-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-docs-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-macros-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-source-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.170.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.170.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_170-default-1-150400.9.3.2.ppc64le",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_170-default-1-150400.9.3.2.s390x",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_170-default-1-150400.9.3.2.x86_64",
            "SUSE Linux Enterprise Micro 5.3:kernel-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise Micro 5.3:kernel-default-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise Micro 5.3:kernel-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Micro 5.3:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.aarch64",
            "SUSE Linux Enterprise Micro 5.3:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
            "SUSE Linux Enterprise Micro 5.4:kernel-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise Micro 5.4:kernel-default-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise Micro 5.4:kernel-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Micro 5.4:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.aarch64",
            "SUSE Linux Enterprise Micro 5.4:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-64kb-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-64kb-devel-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.aarch64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.ppc64le",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-devel-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-docs-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-macros-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-source-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.170.1.aarch64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.170.1.ppc64le",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.170.1.s390x",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.170.1.x86_64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-zfcpdump-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-devel-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-devel-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-devel-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-docs-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-macros-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-obs-build-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-obs-build-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-source-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-syms-5.14.21-150400.24.170.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-syms-5.14.21-150400.24.170.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Manager Proxy 4.3:kernel-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Manager Proxy 4.3:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
            "SUSE Manager Proxy 4.3:kernel-default-devel-5.14.21-150400.24.170.2.x86_64",
            "SUSE Manager Proxy 4.3:kernel-devel-5.14.21-150400.24.170.1.noarch",
            "SUSE Manager Proxy 4.3:kernel-macros-5.14.21-150400.24.170.1.noarch",
            "SUSE Manager Proxy 4.3:kernel-source-5.14.21-150400.24.170.1.noarch",
            "SUSE Manager Proxy 4.3:kernel-syms-5.14.21-150400.24.170.1.x86_64",
            "SUSE Manager Server 4.3:kernel-default-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Manager Server 4.3:kernel-default-5.14.21-150400.24.170.2.s390x",
            "SUSE Manager Server 4.3:kernel-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Manager Server 4.3:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.ppc64le",
            "SUSE Manager Server 4.3:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
            "SUSE Manager Server 4.3:kernel-default-devel-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Manager Server 4.3:kernel-default-devel-5.14.21-150400.24.170.2.s390x",
            "SUSE Manager Server 4.3:kernel-default-devel-5.14.21-150400.24.170.2.x86_64",
            "SUSE Manager Server 4.3:kernel-devel-5.14.21-150400.24.170.1.noarch",
            "SUSE Manager Server 4.3:kernel-macros-5.14.21-150400.24.170.1.noarch",
            "SUSE Manager Server 4.3:kernel-source-5.14.21-150400.24.170.1.noarch",
            "SUSE Manager Server 4.3:kernel-syms-5.14.21-150400.24.170.1.ppc64le",
            "SUSE Manager Server 4.3:kernel-syms-5.14.21-150400.24.170.1.s390x",
            "SUSE Manager Server 4.3:kernel-syms-5.14.21-150400.24.170.1.x86_64",
            "SUSE Manager Server 4.3:kernel-zfcpdump-5.14.21-150400.24.170.2.s390x"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 5.5,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
            "version": "3.1"
          },
          "products": [
            "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-64kb-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-64kb-devel-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-devel-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-devel-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-devel-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-docs-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-macros-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-obs-build-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-obs-build-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-source-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-syms-5.14.21-150400.24.170.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-syms-5.14.21-150400.24.170.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:reiserfs-kmp-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:reiserfs-kmp-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-64kb-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-64kb-devel-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-devel-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-docs-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-macros-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-source-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.170.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.170.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_170-default-1-150400.9.3.2.ppc64le",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_170-default-1-150400.9.3.2.s390x",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_170-default-1-150400.9.3.2.x86_64",
            "SUSE Linux Enterprise Micro 5.3:kernel-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise Micro 5.3:kernel-default-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise Micro 5.3:kernel-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Micro 5.3:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.aarch64",
            "SUSE Linux Enterprise Micro 5.3:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
            "SUSE Linux Enterprise Micro 5.4:kernel-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise Micro 5.4:kernel-default-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise Micro 5.4:kernel-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Micro 5.4:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.aarch64",
            "SUSE Linux Enterprise Micro 5.4:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-64kb-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-64kb-devel-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.aarch64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.ppc64le",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-devel-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-docs-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-macros-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-source-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.170.1.aarch64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.170.1.ppc64le",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.170.1.s390x",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.170.1.x86_64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-zfcpdump-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-devel-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-devel-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-devel-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-docs-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-macros-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-obs-build-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-obs-build-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-source-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-syms-5.14.21-150400.24.170.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-syms-5.14.21-150400.24.170.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Manager Proxy 4.3:kernel-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Manager Proxy 4.3:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
            "SUSE Manager Proxy 4.3:kernel-default-devel-5.14.21-150400.24.170.2.x86_64",
            "SUSE Manager Proxy 4.3:kernel-devel-5.14.21-150400.24.170.1.noarch",
            "SUSE Manager Proxy 4.3:kernel-macros-5.14.21-150400.24.170.1.noarch",
            "SUSE Manager Proxy 4.3:kernel-source-5.14.21-150400.24.170.1.noarch",
            "SUSE Manager Proxy 4.3:kernel-syms-5.14.21-150400.24.170.1.x86_64",
            "SUSE Manager Server 4.3:kernel-default-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Manager Server 4.3:kernel-default-5.14.21-150400.24.170.2.s390x",
            "SUSE Manager Server 4.3:kernel-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Manager Server 4.3:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.ppc64le",
            "SUSE Manager Server 4.3:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
            "SUSE Manager Server 4.3:kernel-default-devel-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Manager Server 4.3:kernel-default-devel-5.14.21-150400.24.170.2.s390x",
            "SUSE Manager Server 4.3:kernel-default-devel-5.14.21-150400.24.170.2.x86_64",
            "SUSE Manager Server 4.3:kernel-devel-5.14.21-150400.24.170.1.noarch",
            "SUSE Manager Server 4.3:kernel-macros-5.14.21-150400.24.170.1.noarch",
            "SUSE Manager Server 4.3:kernel-source-5.14.21-150400.24.170.1.noarch",
            "SUSE Manager Server 4.3:kernel-syms-5.14.21-150400.24.170.1.ppc64le",
            "SUSE Manager Server 4.3:kernel-syms-5.14.21-150400.24.170.1.s390x",
            "SUSE Manager Server 4.3:kernel-syms-5.14.21-150400.24.170.1.x86_64",
            "SUSE Manager Server 4.3:kernel-zfcpdump-5.14.21-150400.24.170.2.s390x"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2025-07-28T15:09:33Z",
          "details": "moderate"
        }
      ],
      "title": "CVE-2022-50055"
    },
    {
      "cve": "CVE-2022-50059",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2022-50059"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "In the Linux kernel, the following vulnerability has been resolved:\n\nceph: don\u0027t leak snap_rwsem in handle_cap_grant\n\nWhen handle_cap_grant is called on an IMPORT op, then the snap_rwsem is\nheld and the function is expected to release it before returning. It\ncurrently fails to do that in all cases which could lead to a deadlock.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.170.2.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.170.2.s390x",
          "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.170.2.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.170.2.s390x",
          "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.170.2.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.170.2.s390x",
          "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.170.2.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.170.2.s390x",
          "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-64kb-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-64kb-devel-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-devel-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-devel-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-devel-5.14.21-150400.24.170.1.noarch",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-docs-5.14.21-150400.24.170.1.noarch",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-macros-5.14.21-150400.24.170.1.noarch",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-obs-build-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-obs-build-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-source-5.14.21-150400.24.170.1.noarch",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-syms-5.14.21-150400.24.170.1.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-syms-5.14.21-150400.24.170.1.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:reiserfs-kmp-default-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:reiserfs-kmp-default-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-64kb-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-64kb-devel-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-devel-5.14.21-150400.24.170.1.noarch",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-docs-5.14.21-150400.24.170.1.noarch",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-macros-5.14.21-150400.24.170.1.noarch",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-source-5.14.21-150400.24.170.1.noarch",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.170.1.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.170.1.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.170.2.ppc64le",
          "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.170.2.s390x",
          "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.170.2.ppc64le",
          "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.170.2.s390x",
          "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_170-default-1-150400.9.3.2.ppc64le",
          "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_170-default-1-150400.9.3.2.s390x",
          "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_170-default-1-150400.9.3.2.x86_64",
          "SUSE Linux Enterprise Micro 5.3:kernel-default-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise Micro 5.3:kernel-default-5.14.21-150400.24.170.2.s390x",
          "SUSE Linux Enterprise Micro 5.3:kernel-default-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise Micro 5.3:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.aarch64",
          "SUSE Linux Enterprise Micro 5.3:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
          "SUSE Linux Enterprise Micro 5.4:kernel-default-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise Micro 5.4:kernel-default-5.14.21-150400.24.170.2.s390x",
          "SUSE Linux Enterprise Micro 5.4:kernel-default-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise Micro 5.4:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.aarch64",
          "SUSE Linux Enterprise Micro 5.4:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-64kb-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-64kb-devel-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-5.14.21-150400.24.170.2.ppc64le",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-5.14.21-150400.24.170.2.s390x",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.aarch64",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.ppc64le",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.170.2.ppc64le",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.170.2.s390x",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-devel-5.14.21-150400.24.170.1.noarch",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-docs-5.14.21-150400.24.170.1.noarch",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-macros-5.14.21-150400.24.170.1.noarch",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.170.2.ppc64le",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.170.2.s390x",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-source-5.14.21-150400.24.170.1.noarch",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.170.1.aarch64",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.170.1.ppc64le",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.170.1.s390x",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.170.1.x86_64",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-zfcpdump-5.14.21-150400.24.170.2.s390x",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.170.2.ppc64le",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.170.2.s390x",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-5.14.21-150400.24.170.2.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-devel-5.14.21-150400.24.170.2.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-devel-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-devel-5.14.21-150400.24.170.1.noarch",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-docs-5.14.21-150400.24.170.1.noarch",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-macros-5.14.21-150400.24.170.1.noarch",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-obs-build-5.14.21-150400.24.170.2.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-obs-build-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-source-5.14.21-150400.24.170.1.noarch",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-syms-5.14.21-150400.24.170.1.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-syms-5.14.21-150400.24.170.1.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.170.2.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.170.2.x86_64",
          "SUSE Manager Proxy 4.3:kernel-default-5.14.21-150400.24.170.2.x86_64",
          "SUSE Manager Proxy 4.3:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
          "SUSE Manager Proxy 4.3:kernel-default-devel-5.14.21-150400.24.170.2.x86_64",
          "SUSE Manager Proxy 4.3:kernel-devel-5.14.21-150400.24.170.1.noarch",
          "SUSE Manager Proxy 4.3:kernel-macros-5.14.21-150400.24.170.1.noarch",
          "SUSE Manager Proxy 4.3:kernel-source-5.14.21-150400.24.170.1.noarch",
          "SUSE Manager Proxy 4.3:kernel-syms-5.14.21-150400.24.170.1.x86_64",
          "SUSE Manager Server 4.3:kernel-default-5.14.21-150400.24.170.2.ppc64le",
          "SUSE Manager Server 4.3:kernel-default-5.14.21-150400.24.170.2.s390x",
          "SUSE Manager Server 4.3:kernel-default-5.14.21-150400.24.170.2.x86_64",
          "SUSE Manager Server 4.3:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.ppc64le",
          "SUSE Manager Server 4.3:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
          "SUSE Manager Server 4.3:kernel-default-devel-5.14.21-150400.24.170.2.ppc64le",
          "SUSE Manager Server 4.3:kernel-default-devel-5.14.21-150400.24.170.2.s390x",
          "SUSE Manager Server 4.3:kernel-default-devel-5.14.21-150400.24.170.2.x86_64",
          "SUSE Manager Server 4.3:kernel-devel-5.14.21-150400.24.170.1.noarch",
          "SUSE Manager Server 4.3:kernel-macros-5.14.21-150400.24.170.1.noarch",
          "SUSE Manager Server 4.3:kernel-source-5.14.21-150400.24.170.1.noarch",
          "SUSE Manager Server 4.3:kernel-syms-5.14.21-150400.24.170.1.ppc64le",
          "SUSE Manager Server 4.3:kernel-syms-5.14.21-150400.24.170.1.s390x",
          "SUSE Manager Server 4.3:kernel-syms-5.14.21-150400.24.170.1.x86_64",
          "SUSE Manager Server 4.3:kernel-zfcpdump-5.14.21-150400.24.170.2.s390x"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2022-50059",
          "url": "https://www.suse.com/security/cve/CVE-2022-50059"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1245031 for CVE-2022-50059",
          "url": "https://bugzilla.suse.com/1245031"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-64kb-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-64kb-devel-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-devel-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-devel-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-devel-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-docs-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-macros-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-obs-build-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-obs-build-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-source-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-syms-5.14.21-150400.24.170.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-syms-5.14.21-150400.24.170.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:reiserfs-kmp-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:reiserfs-kmp-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-64kb-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-64kb-devel-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-devel-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-docs-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-macros-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-source-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.170.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.170.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_170-default-1-150400.9.3.2.ppc64le",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_170-default-1-150400.9.3.2.s390x",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_170-default-1-150400.9.3.2.x86_64",
            "SUSE Linux Enterprise Micro 5.3:kernel-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise Micro 5.3:kernel-default-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise Micro 5.3:kernel-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Micro 5.3:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.aarch64",
            "SUSE Linux Enterprise Micro 5.3:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
            "SUSE Linux Enterprise Micro 5.4:kernel-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise Micro 5.4:kernel-default-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise Micro 5.4:kernel-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Micro 5.4:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.aarch64",
            "SUSE Linux Enterprise Micro 5.4:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-64kb-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-64kb-devel-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.aarch64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.ppc64le",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-devel-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-docs-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-macros-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-source-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.170.1.aarch64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.170.1.ppc64le",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.170.1.s390x",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.170.1.x86_64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-zfcpdump-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-devel-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-devel-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-devel-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-docs-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-macros-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-obs-build-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-obs-build-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-source-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-syms-5.14.21-150400.24.170.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-syms-5.14.21-150400.24.170.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Manager Proxy 4.3:kernel-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Manager Proxy 4.3:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
            "SUSE Manager Proxy 4.3:kernel-default-devel-5.14.21-150400.24.170.2.x86_64",
            "SUSE Manager Proxy 4.3:kernel-devel-5.14.21-150400.24.170.1.noarch",
            "SUSE Manager Proxy 4.3:kernel-macros-5.14.21-150400.24.170.1.noarch",
            "SUSE Manager Proxy 4.3:kernel-source-5.14.21-150400.24.170.1.noarch",
            "SUSE Manager Proxy 4.3:kernel-syms-5.14.21-150400.24.170.1.x86_64",
            "SUSE Manager Server 4.3:kernel-default-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Manager Server 4.3:kernel-default-5.14.21-150400.24.170.2.s390x",
            "SUSE Manager Server 4.3:kernel-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Manager Server 4.3:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.ppc64le",
            "SUSE Manager Server 4.3:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
            "SUSE Manager Server 4.3:kernel-default-devel-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Manager Server 4.3:kernel-default-devel-5.14.21-150400.24.170.2.s390x",
            "SUSE Manager Server 4.3:kernel-default-devel-5.14.21-150400.24.170.2.x86_64",
            "SUSE Manager Server 4.3:kernel-devel-5.14.21-150400.24.170.1.noarch",
            "SUSE Manager Server 4.3:kernel-macros-5.14.21-150400.24.170.1.noarch",
            "SUSE Manager Server 4.3:kernel-source-5.14.21-150400.24.170.1.noarch",
            "SUSE Manager Server 4.3:kernel-syms-5.14.21-150400.24.170.1.ppc64le",
            "SUSE Manager Server 4.3:kernel-syms-5.14.21-150400.24.170.1.s390x",
            "SUSE Manager Server 4.3:kernel-syms-5.14.21-150400.24.170.1.x86_64",
            "SUSE Manager Server 4.3:kernel-zfcpdump-5.14.21-150400.24.170.2.s390x"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 5.5,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
            "version": "3.1"
          },
          "products": [
            "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-64kb-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-64kb-devel-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-devel-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-devel-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-devel-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-docs-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-macros-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-obs-build-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-obs-build-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-source-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-syms-5.14.21-150400.24.170.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-syms-5.14.21-150400.24.170.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:reiserfs-kmp-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:reiserfs-kmp-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-64kb-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-64kb-devel-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-devel-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-docs-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-macros-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-source-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.170.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.170.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_170-default-1-150400.9.3.2.ppc64le",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_170-default-1-150400.9.3.2.s390x",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_170-default-1-150400.9.3.2.x86_64",
            "SUSE Linux Enterprise Micro 5.3:kernel-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise Micro 5.3:kernel-default-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise Micro 5.3:kernel-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Micro 5.3:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.aarch64",
            "SUSE Linux Enterprise Micro 5.3:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
            "SUSE Linux Enterprise Micro 5.4:kernel-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise Micro 5.4:kernel-default-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise Micro 5.4:kernel-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Micro 5.4:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.aarch64",
            "SUSE Linux Enterprise Micro 5.4:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-64kb-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-64kb-devel-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.aarch64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.ppc64le",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-devel-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-docs-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-macros-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-source-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.170.1.aarch64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.170.1.ppc64le",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.170.1.s390x",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.170.1.x86_64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-zfcpdump-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-devel-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-devel-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-devel-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-docs-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-macros-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-obs-build-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-obs-build-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-source-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-syms-5.14.21-150400.24.170.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-syms-5.14.21-150400.24.170.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Manager Proxy 4.3:kernel-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Manager Proxy 4.3:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
            "SUSE Manager Proxy 4.3:kernel-default-devel-5.14.21-150400.24.170.2.x86_64",
            "SUSE Manager Proxy 4.3:kernel-devel-5.14.21-150400.24.170.1.noarch",
            "SUSE Manager Proxy 4.3:kernel-macros-5.14.21-150400.24.170.1.noarch",
            "SUSE Manager Proxy 4.3:kernel-source-5.14.21-150400.24.170.1.noarch",
            "SUSE Manager Proxy 4.3:kernel-syms-5.14.21-150400.24.170.1.x86_64",
            "SUSE Manager Server 4.3:kernel-default-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Manager Server 4.3:kernel-default-5.14.21-150400.24.170.2.s390x",
            "SUSE Manager Server 4.3:kernel-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Manager Server 4.3:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.ppc64le",
            "SUSE Manager Server 4.3:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
            "SUSE Manager Server 4.3:kernel-default-devel-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Manager Server 4.3:kernel-default-devel-5.14.21-150400.24.170.2.s390x",
            "SUSE Manager Server 4.3:kernel-default-devel-5.14.21-150400.24.170.2.x86_64",
            "SUSE Manager Server 4.3:kernel-devel-5.14.21-150400.24.170.1.noarch",
            "SUSE Manager Server 4.3:kernel-macros-5.14.21-150400.24.170.1.noarch",
            "SUSE Manager Server 4.3:kernel-source-5.14.21-150400.24.170.1.noarch",
            "SUSE Manager Server 4.3:kernel-syms-5.14.21-150400.24.170.1.ppc64le",
            "SUSE Manager Server 4.3:kernel-syms-5.14.21-150400.24.170.1.s390x",
            "SUSE Manager Server 4.3:kernel-syms-5.14.21-150400.24.170.1.x86_64",
            "SUSE Manager Server 4.3:kernel-zfcpdump-5.14.21-150400.24.170.2.s390x"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2025-07-28T15:09:33Z",
          "details": "moderate"
        }
      ],
      "title": "CVE-2022-50059"
    },
    {
      "cve": "CVE-2022-50060",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2022-50060"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "In the Linux kernel, the following vulnerability has been resolved:\n\nocteontx2-af: Fix mcam entry resource leak\n\nThe teardown sequence in FLR handler returns if no NIX LF\nis attached to PF/VF because it indicates that graceful\nshutdown of resources already happened. But there is a\nchance of all allocated MCAM entries not being freed by\nPF/VF. Hence free mcam entries even in case of detached LF.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.170.2.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.170.2.s390x",
          "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.170.2.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.170.2.s390x",
          "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.170.2.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.170.2.s390x",
          "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.170.2.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.170.2.s390x",
          "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-64kb-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-64kb-devel-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-devel-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-devel-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-devel-5.14.21-150400.24.170.1.noarch",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-docs-5.14.21-150400.24.170.1.noarch",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-macros-5.14.21-150400.24.170.1.noarch",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-obs-build-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-obs-build-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-source-5.14.21-150400.24.170.1.noarch",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-syms-5.14.21-150400.24.170.1.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-syms-5.14.21-150400.24.170.1.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:reiserfs-kmp-default-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:reiserfs-kmp-default-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-64kb-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-64kb-devel-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-devel-5.14.21-150400.24.170.1.noarch",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-docs-5.14.21-150400.24.170.1.noarch",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-macros-5.14.21-150400.24.170.1.noarch",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-source-5.14.21-150400.24.170.1.noarch",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.170.1.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.170.1.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.170.2.ppc64le",
          "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.170.2.s390x",
          "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.170.2.ppc64le",
          "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.170.2.s390x",
          "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_170-default-1-150400.9.3.2.ppc64le",
          "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_170-default-1-150400.9.3.2.s390x",
          "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_170-default-1-150400.9.3.2.x86_64",
          "SUSE Linux Enterprise Micro 5.3:kernel-default-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise Micro 5.3:kernel-default-5.14.21-150400.24.170.2.s390x",
          "SUSE Linux Enterprise Micro 5.3:kernel-default-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise Micro 5.3:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.aarch64",
          "SUSE Linux Enterprise Micro 5.3:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
          "SUSE Linux Enterprise Micro 5.4:kernel-default-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise Micro 5.4:kernel-default-5.14.21-150400.24.170.2.s390x",
          "SUSE Linux Enterprise Micro 5.4:kernel-default-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise Micro 5.4:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.aarch64",
          "SUSE Linux Enterprise Micro 5.4:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-64kb-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-64kb-devel-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-5.14.21-150400.24.170.2.ppc64le",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-5.14.21-150400.24.170.2.s390x",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.aarch64",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.ppc64le",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.170.2.ppc64le",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.170.2.s390x",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-devel-5.14.21-150400.24.170.1.noarch",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-docs-5.14.21-150400.24.170.1.noarch",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-macros-5.14.21-150400.24.170.1.noarch",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.170.2.ppc64le",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.170.2.s390x",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-source-5.14.21-150400.24.170.1.noarch",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.170.1.aarch64",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.170.1.ppc64le",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.170.1.s390x",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.170.1.x86_64",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-zfcpdump-5.14.21-150400.24.170.2.s390x",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.170.2.ppc64le",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.170.2.s390x",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-5.14.21-150400.24.170.2.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-devel-5.14.21-150400.24.170.2.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-devel-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-devel-5.14.21-150400.24.170.1.noarch",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-docs-5.14.21-150400.24.170.1.noarch",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-macros-5.14.21-150400.24.170.1.noarch",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-obs-build-5.14.21-150400.24.170.2.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-obs-build-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-source-5.14.21-150400.24.170.1.noarch",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-syms-5.14.21-150400.24.170.1.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-syms-5.14.21-150400.24.170.1.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.170.2.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.170.2.x86_64",
          "SUSE Manager Proxy 4.3:kernel-default-5.14.21-150400.24.170.2.x86_64",
          "SUSE Manager Proxy 4.3:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
          "SUSE Manager Proxy 4.3:kernel-default-devel-5.14.21-150400.24.170.2.x86_64",
          "SUSE Manager Proxy 4.3:kernel-devel-5.14.21-150400.24.170.1.noarch",
          "SUSE Manager Proxy 4.3:kernel-macros-5.14.21-150400.24.170.1.noarch",
          "SUSE Manager Proxy 4.3:kernel-source-5.14.21-150400.24.170.1.noarch",
          "SUSE Manager Proxy 4.3:kernel-syms-5.14.21-150400.24.170.1.x86_64",
          "SUSE Manager Server 4.3:kernel-default-5.14.21-150400.24.170.2.ppc64le",
          "SUSE Manager Server 4.3:kernel-default-5.14.21-150400.24.170.2.s390x",
          "SUSE Manager Server 4.3:kernel-default-5.14.21-150400.24.170.2.x86_64",
          "SUSE Manager Server 4.3:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.ppc64le",
          "SUSE Manager Server 4.3:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
          "SUSE Manager Server 4.3:kernel-default-devel-5.14.21-150400.24.170.2.ppc64le",
          "SUSE Manager Server 4.3:kernel-default-devel-5.14.21-150400.24.170.2.s390x",
          "SUSE Manager Server 4.3:kernel-default-devel-5.14.21-150400.24.170.2.x86_64",
          "SUSE Manager Server 4.3:kernel-devel-5.14.21-150400.24.170.1.noarch",
          "SUSE Manager Server 4.3:kernel-macros-5.14.21-150400.24.170.1.noarch",
          "SUSE Manager Server 4.3:kernel-source-5.14.21-150400.24.170.1.noarch",
          "SUSE Manager Server 4.3:kernel-syms-5.14.21-150400.24.170.1.ppc64le",
          "SUSE Manager Server 4.3:kernel-syms-5.14.21-150400.24.170.1.s390x",
          "SUSE Manager Server 4.3:kernel-syms-5.14.21-150400.24.170.1.x86_64",
          "SUSE Manager Server 4.3:kernel-zfcpdump-5.14.21-150400.24.170.2.s390x"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2022-50060",
          "url": "https://www.suse.com/security/cve/CVE-2022-50060"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1245032 for CVE-2022-50060",
          "url": "https://bugzilla.suse.com/1245032"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-64kb-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-64kb-devel-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-devel-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-devel-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-devel-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-docs-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-macros-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-obs-build-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-obs-build-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-source-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-syms-5.14.21-150400.24.170.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-syms-5.14.21-150400.24.170.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:reiserfs-kmp-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:reiserfs-kmp-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-64kb-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-64kb-devel-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-devel-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-docs-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-macros-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-source-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.170.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.170.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_170-default-1-150400.9.3.2.ppc64le",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_170-default-1-150400.9.3.2.s390x",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_170-default-1-150400.9.3.2.x86_64",
            "SUSE Linux Enterprise Micro 5.3:kernel-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise Micro 5.3:kernel-default-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise Micro 5.3:kernel-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Micro 5.3:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.aarch64",
            "SUSE Linux Enterprise Micro 5.3:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
            "SUSE Linux Enterprise Micro 5.4:kernel-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise Micro 5.4:kernel-default-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise Micro 5.4:kernel-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Micro 5.4:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.aarch64",
            "SUSE Linux Enterprise Micro 5.4:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-64kb-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-64kb-devel-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.aarch64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.ppc64le",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-devel-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-docs-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-macros-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-source-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.170.1.aarch64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.170.1.ppc64le",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.170.1.s390x",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.170.1.x86_64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-zfcpdump-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-devel-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-devel-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-devel-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-docs-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-macros-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-obs-build-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-obs-build-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-source-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-syms-5.14.21-150400.24.170.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-syms-5.14.21-150400.24.170.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Manager Proxy 4.3:kernel-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Manager Proxy 4.3:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
            "SUSE Manager Proxy 4.3:kernel-default-devel-5.14.21-150400.24.170.2.x86_64",
            "SUSE Manager Proxy 4.3:kernel-devel-5.14.21-150400.24.170.1.noarch",
            "SUSE Manager Proxy 4.3:kernel-macros-5.14.21-150400.24.170.1.noarch",
            "SUSE Manager Proxy 4.3:kernel-source-5.14.21-150400.24.170.1.noarch",
            "SUSE Manager Proxy 4.3:kernel-syms-5.14.21-150400.24.170.1.x86_64",
            "SUSE Manager Server 4.3:kernel-default-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Manager Server 4.3:kernel-default-5.14.21-150400.24.170.2.s390x",
            "SUSE Manager Server 4.3:kernel-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Manager Server 4.3:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.ppc64le",
            "SUSE Manager Server 4.3:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
            "SUSE Manager Server 4.3:kernel-default-devel-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Manager Server 4.3:kernel-default-devel-5.14.21-150400.24.170.2.s390x",
            "SUSE Manager Server 4.3:kernel-default-devel-5.14.21-150400.24.170.2.x86_64",
            "SUSE Manager Server 4.3:kernel-devel-5.14.21-150400.24.170.1.noarch",
            "SUSE Manager Server 4.3:kernel-macros-5.14.21-150400.24.170.1.noarch",
            "SUSE Manager Server 4.3:kernel-source-5.14.21-150400.24.170.1.noarch",
            "SUSE Manager Server 4.3:kernel-syms-5.14.21-150400.24.170.1.ppc64le",
            "SUSE Manager Server 4.3:kernel-syms-5.14.21-150400.24.170.1.s390x",
            "SUSE Manager Server 4.3:kernel-syms-5.14.21-150400.24.170.1.x86_64",
            "SUSE Manager Server 4.3:kernel-zfcpdump-5.14.21-150400.24.170.2.s390x"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 5.5,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
            "version": "3.1"
          },
          "products": [
            "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-64kb-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-64kb-devel-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-devel-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-devel-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-devel-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-docs-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-macros-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-obs-build-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-obs-build-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-source-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-syms-5.14.21-150400.24.170.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-syms-5.14.21-150400.24.170.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:reiserfs-kmp-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:reiserfs-kmp-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-64kb-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-64kb-devel-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-devel-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-docs-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-macros-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-source-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.170.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.170.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_170-default-1-150400.9.3.2.ppc64le",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_170-default-1-150400.9.3.2.s390x",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_170-default-1-150400.9.3.2.x86_64",
            "SUSE Linux Enterprise Micro 5.3:kernel-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise Micro 5.3:kernel-default-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise Micro 5.3:kernel-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Micro 5.3:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.aarch64",
            "SUSE Linux Enterprise Micro 5.3:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
            "SUSE Linux Enterprise Micro 5.4:kernel-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise Micro 5.4:kernel-default-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise Micro 5.4:kernel-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Micro 5.4:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.aarch64",
            "SUSE Linux Enterprise Micro 5.4:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-64kb-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-64kb-devel-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.aarch64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.ppc64le",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-devel-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-docs-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-macros-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-source-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.170.1.aarch64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.170.1.ppc64le",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.170.1.s390x",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.170.1.x86_64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-zfcpdump-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-devel-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-devel-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-devel-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-docs-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-macros-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-obs-build-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-obs-build-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-source-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-syms-5.14.21-150400.24.170.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-syms-5.14.21-150400.24.170.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Manager Proxy 4.3:kernel-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Manager Proxy 4.3:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
            "SUSE Manager Proxy 4.3:kernel-default-devel-5.14.21-150400.24.170.2.x86_64",
            "SUSE Manager Proxy 4.3:kernel-devel-5.14.21-150400.24.170.1.noarch",
            "SUSE Manager Proxy 4.3:kernel-macros-5.14.21-150400.24.170.1.noarch",
            "SUSE Manager Proxy 4.3:kernel-source-5.14.21-150400.24.170.1.noarch",
            "SUSE Manager Proxy 4.3:kernel-syms-5.14.21-150400.24.170.1.x86_64",
            "SUSE Manager Server 4.3:kernel-default-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Manager Server 4.3:kernel-default-5.14.21-150400.24.170.2.s390x",
            "SUSE Manager Server 4.3:kernel-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Manager Server 4.3:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.ppc64le",
            "SUSE Manager Server 4.3:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
            "SUSE Manager Server 4.3:kernel-default-devel-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Manager Server 4.3:kernel-default-devel-5.14.21-150400.24.170.2.s390x",
            "SUSE Manager Server 4.3:kernel-default-devel-5.14.21-150400.24.170.2.x86_64",
            "SUSE Manager Server 4.3:kernel-devel-5.14.21-150400.24.170.1.noarch",
            "SUSE Manager Server 4.3:kernel-macros-5.14.21-150400.24.170.1.noarch",
            "SUSE Manager Server 4.3:kernel-source-5.14.21-150400.24.170.1.noarch",
            "SUSE Manager Server 4.3:kernel-syms-5.14.21-150400.24.170.1.ppc64le",
            "SUSE Manager Server 4.3:kernel-syms-5.14.21-150400.24.170.1.s390x",
            "SUSE Manager Server 4.3:kernel-syms-5.14.21-150400.24.170.1.x86_64",
            "SUSE Manager Server 4.3:kernel-zfcpdump-5.14.21-150400.24.170.2.s390x"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2025-07-28T15:09:33Z",
          "details": "moderate"
        }
      ],
      "title": "CVE-2022-50060"
    },
    {
      "cve": "CVE-2022-50061",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2022-50061"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "In the Linux kernel, the following vulnerability has been resolved:\n\npinctrl: nomadik: Fix refcount leak in nmk_pinctrl_dt_subnode_to_map\n\nof_parse_phandle() returns a node pointer with refcount\nincremented, we should use of_node_put() on it when not need anymore.\nAdd missing of_node_put() to avoid refcount leak.\"",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.170.2.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.170.2.s390x",
          "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.170.2.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.170.2.s390x",
          "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.170.2.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.170.2.s390x",
          "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.170.2.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.170.2.s390x",
          "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-64kb-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-64kb-devel-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-devel-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-devel-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-devel-5.14.21-150400.24.170.1.noarch",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-docs-5.14.21-150400.24.170.1.noarch",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-macros-5.14.21-150400.24.170.1.noarch",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-obs-build-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-obs-build-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-source-5.14.21-150400.24.170.1.noarch",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-syms-5.14.21-150400.24.170.1.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-syms-5.14.21-150400.24.170.1.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:reiserfs-kmp-default-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:reiserfs-kmp-default-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-64kb-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-64kb-devel-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-devel-5.14.21-150400.24.170.1.noarch",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-docs-5.14.21-150400.24.170.1.noarch",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-macros-5.14.21-150400.24.170.1.noarch",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-source-5.14.21-150400.24.170.1.noarch",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.170.1.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.170.1.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.170.2.ppc64le",
          "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.170.2.s390x",
          "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.170.2.ppc64le",
          "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.170.2.s390x",
          "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_170-default-1-150400.9.3.2.ppc64le",
          "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_170-default-1-150400.9.3.2.s390x",
          "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_170-default-1-150400.9.3.2.x86_64",
          "SUSE Linux Enterprise Micro 5.3:kernel-default-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise Micro 5.3:kernel-default-5.14.21-150400.24.170.2.s390x",
          "SUSE Linux Enterprise Micro 5.3:kernel-default-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise Micro 5.3:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.aarch64",
          "SUSE Linux Enterprise Micro 5.3:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
          "SUSE Linux Enterprise Micro 5.4:kernel-default-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise Micro 5.4:kernel-default-5.14.21-150400.24.170.2.s390x",
          "SUSE Linux Enterprise Micro 5.4:kernel-default-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise Micro 5.4:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.aarch64",
          "SUSE Linux Enterprise Micro 5.4:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-64kb-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-64kb-devel-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-5.14.21-150400.24.170.2.ppc64le",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-5.14.21-150400.24.170.2.s390x",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.aarch64",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.ppc64le",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.170.2.ppc64le",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.170.2.s390x",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-devel-5.14.21-150400.24.170.1.noarch",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-docs-5.14.21-150400.24.170.1.noarch",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-macros-5.14.21-150400.24.170.1.noarch",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.170.2.ppc64le",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.170.2.s390x",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-source-5.14.21-150400.24.170.1.noarch",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.170.1.aarch64",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.170.1.ppc64le",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.170.1.s390x",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.170.1.x86_64",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-zfcpdump-5.14.21-150400.24.170.2.s390x",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.170.2.ppc64le",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.170.2.s390x",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-5.14.21-150400.24.170.2.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-devel-5.14.21-150400.24.170.2.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-devel-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-devel-5.14.21-150400.24.170.1.noarch",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-docs-5.14.21-150400.24.170.1.noarch",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-macros-5.14.21-150400.24.170.1.noarch",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-obs-build-5.14.21-150400.24.170.2.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-obs-build-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-source-5.14.21-150400.24.170.1.noarch",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-syms-5.14.21-150400.24.170.1.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-syms-5.14.21-150400.24.170.1.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.170.2.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.170.2.x86_64",
          "SUSE Manager Proxy 4.3:kernel-default-5.14.21-150400.24.170.2.x86_64",
          "SUSE Manager Proxy 4.3:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
          "SUSE Manager Proxy 4.3:kernel-default-devel-5.14.21-150400.24.170.2.x86_64",
          "SUSE Manager Proxy 4.3:kernel-devel-5.14.21-150400.24.170.1.noarch",
          "SUSE Manager Proxy 4.3:kernel-macros-5.14.21-150400.24.170.1.noarch",
          "SUSE Manager Proxy 4.3:kernel-source-5.14.21-150400.24.170.1.noarch",
          "SUSE Manager Proxy 4.3:kernel-syms-5.14.21-150400.24.170.1.x86_64",
          "SUSE Manager Server 4.3:kernel-default-5.14.21-150400.24.170.2.ppc64le",
          "SUSE Manager Server 4.3:kernel-default-5.14.21-150400.24.170.2.s390x",
          "SUSE Manager Server 4.3:kernel-default-5.14.21-150400.24.170.2.x86_64",
          "SUSE Manager Server 4.3:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.ppc64le",
          "SUSE Manager Server 4.3:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
          "SUSE Manager Server 4.3:kernel-default-devel-5.14.21-150400.24.170.2.ppc64le",
          "SUSE Manager Server 4.3:kernel-default-devel-5.14.21-150400.24.170.2.s390x",
          "SUSE Manager Server 4.3:kernel-default-devel-5.14.21-150400.24.170.2.x86_64",
          "SUSE Manager Server 4.3:kernel-devel-5.14.21-150400.24.170.1.noarch",
          "SUSE Manager Server 4.3:kernel-macros-5.14.21-150400.24.170.1.noarch",
          "SUSE Manager Server 4.3:kernel-source-5.14.21-150400.24.170.1.noarch",
          "SUSE Manager Server 4.3:kernel-syms-5.14.21-150400.24.170.1.ppc64le",
          "SUSE Manager Server 4.3:kernel-syms-5.14.21-150400.24.170.1.s390x",
          "SUSE Manager Server 4.3:kernel-syms-5.14.21-150400.24.170.1.x86_64",
          "SUSE Manager Server 4.3:kernel-zfcpdump-5.14.21-150400.24.170.2.s390x"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2022-50061",
          "url": "https://www.suse.com/security/cve/CVE-2022-50061"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1245033 for CVE-2022-50061",
          "url": "https://bugzilla.suse.com/1245033"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-64kb-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-64kb-devel-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-devel-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-devel-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-devel-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-docs-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-macros-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-obs-build-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-obs-build-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-source-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-syms-5.14.21-150400.24.170.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-syms-5.14.21-150400.24.170.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:reiserfs-kmp-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:reiserfs-kmp-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-64kb-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-64kb-devel-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-devel-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-docs-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-macros-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-source-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.170.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.170.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_170-default-1-150400.9.3.2.ppc64le",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_170-default-1-150400.9.3.2.s390x",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_170-default-1-150400.9.3.2.x86_64",
            "SUSE Linux Enterprise Micro 5.3:kernel-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise Micro 5.3:kernel-default-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise Micro 5.3:kernel-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Micro 5.3:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.aarch64",
            "SUSE Linux Enterprise Micro 5.3:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
            "SUSE Linux Enterprise Micro 5.4:kernel-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise Micro 5.4:kernel-default-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise Micro 5.4:kernel-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Micro 5.4:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.aarch64",
            "SUSE Linux Enterprise Micro 5.4:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-64kb-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-64kb-devel-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.aarch64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.ppc64le",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-devel-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-docs-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-macros-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-source-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.170.1.aarch64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.170.1.ppc64le",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.170.1.s390x",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.170.1.x86_64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-zfcpdump-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-devel-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-devel-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-devel-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-docs-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-macros-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-obs-build-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-obs-build-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-source-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-syms-5.14.21-150400.24.170.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-syms-5.14.21-150400.24.170.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Manager Proxy 4.3:kernel-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Manager Proxy 4.3:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
            "SUSE Manager Proxy 4.3:kernel-default-devel-5.14.21-150400.24.170.2.x86_64",
            "SUSE Manager Proxy 4.3:kernel-devel-5.14.21-150400.24.170.1.noarch",
            "SUSE Manager Proxy 4.3:kernel-macros-5.14.21-150400.24.170.1.noarch",
            "SUSE Manager Proxy 4.3:kernel-source-5.14.21-150400.24.170.1.noarch",
            "SUSE Manager Proxy 4.3:kernel-syms-5.14.21-150400.24.170.1.x86_64",
            "SUSE Manager Server 4.3:kernel-default-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Manager Server 4.3:kernel-default-5.14.21-150400.24.170.2.s390x",
            "SUSE Manager Server 4.3:kernel-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Manager Server 4.3:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.ppc64le",
            "SUSE Manager Server 4.3:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
            "SUSE Manager Server 4.3:kernel-default-devel-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Manager Server 4.3:kernel-default-devel-5.14.21-150400.24.170.2.s390x",
            "SUSE Manager Server 4.3:kernel-default-devel-5.14.21-150400.24.170.2.x86_64",
            "SUSE Manager Server 4.3:kernel-devel-5.14.21-150400.24.170.1.noarch",
            "SUSE Manager Server 4.3:kernel-macros-5.14.21-150400.24.170.1.noarch",
            "SUSE Manager Server 4.3:kernel-source-5.14.21-150400.24.170.1.noarch",
            "SUSE Manager Server 4.3:kernel-syms-5.14.21-150400.24.170.1.ppc64le",
            "SUSE Manager Server 4.3:kernel-syms-5.14.21-150400.24.170.1.s390x",
            "SUSE Manager Server 4.3:kernel-syms-5.14.21-150400.24.170.1.x86_64",
            "SUSE Manager Server 4.3:kernel-zfcpdump-5.14.21-150400.24.170.2.s390x"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 5.5,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
            "version": "3.1"
          },
          "products": [
            "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-64kb-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-64kb-devel-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-devel-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-devel-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-devel-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-docs-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-macros-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-obs-build-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-obs-build-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-source-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-syms-5.14.21-150400.24.170.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-syms-5.14.21-150400.24.170.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:reiserfs-kmp-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:reiserfs-kmp-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-64kb-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-64kb-devel-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-devel-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-docs-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-macros-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-source-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.170.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.170.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_170-default-1-150400.9.3.2.ppc64le",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_170-default-1-150400.9.3.2.s390x",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_170-default-1-150400.9.3.2.x86_64",
            "SUSE Linux Enterprise Micro 5.3:kernel-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise Micro 5.3:kernel-default-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise Micro 5.3:kernel-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Micro 5.3:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.aarch64",
            "SUSE Linux Enterprise Micro 5.3:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
            "SUSE Linux Enterprise Micro 5.4:kernel-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise Micro 5.4:kernel-default-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise Micro 5.4:kernel-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Micro 5.4:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.aarch64",
            "SUSE Linux Enterprise Micro 5.4:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-64kb-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-64kb-devel-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.aarch64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.ppc64le",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-devel-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-docs-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-macros-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-source-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.170.1.aarch64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.170.1.ppc64le",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.170.1.s390x",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.170.1.x86_64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-zfcpdump-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-devel-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-devel-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-devel-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-docs-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-macros-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-obs-build-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-obs-build-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-source-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-syms-5.14.21-150400.24.170.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-syms-5.14.21-150400.24.170.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Manager Proxy 4.3:kernel-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Manager Proxy 4.3:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
            "SUSE Manager Proxy 4.3:kernel-default-devel-5.14.21-150400.24.170.2.x86_64",
            "SUSE Manager Proxy 4.3:kernel-devel-5.14.21-150400.24.170.1.noarch",
            "SUSE Manager Proxy 4.3:kernel-macros-5.14.21-150400.24.170.1.noarch",
            "SUSE Manager Proxy 4.3:kernel-source-5.14.21-150400.24.170.1.noarch",
            "SUSE Manager Proxy 4.3:kernel-syms-5.14.21-150400.24.170.1.x86_64",
            "SUSE Manager Server 4.3:kernel-default-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Manager Server 4.3:kernel-default-5.14.21-150400.24.170.2.s390x",
            "SUSE Manager Server 4.3:kernel-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Manager Server 4.3:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.ppc64le",
            "SUSE Manager Server 4.3:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
            "SUSE Manager Server 4.3:kernel-default-devel-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Manager Server 4.3:kernel-default-devel-5.14.21-150400.24.170.2.s390x",
            "SUSE Manager Server 4.3:kernel-default-devel-5.14.21-150400.24.170.2.x86_64",
            "SUSE Manager Server 4.3:kernel-devel-5.14.21-150400.24.170.1.noarch",
            "SUSE Manager Server 4.3:kernel-macros-5.14.21-150400.24.170.1.noarch",
            "SUSE Manager Server 4.3:kernel-source-5.14.21-150400.24.170.1.noarch",
            "SUSE Manager Server 4.3:kernel-syms-5.14.21-150400.24.170.1.ppc64le",
            "SUSE Manager Server 4.3:kernel-syms-5.14.21-150400.24.170.1.s390x",
            "SUSE Manager Server 4.3:kernel-syms-5.14.21-150400.24.170.1.x86_64",
            "SUSE Manager Server 4.3:kernel-zfcpdump-5.14.21-150400.24.170.2.s390x"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2025-07-28T15:09:33Z",
          "details": "moderate"
        }
      ],
      "title": "CVE-2022-50061"
    },
    {
      "cve": "CVE-2022-50062",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2022-50062"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "In the Linux kernel, the following vulnerability has been resolved:\n\nnet: bgmac: Fix a BUG triggered by wrong bytes_compl\n\nOn one of our machines we got:\n\nkernel BUG at lib/dynamic_queue_limits.c:27!\nInternal error: Oops - BUG: 0 [#1] PREEMPT SMP ARM\nCPU: 0 PID: 1166 Comm: irq/41-bgmac Tainted: G        W  O    4.14.275-rt132 #1\nHardware name: BRCM XGS iProc\ntask: ee3415c0 task.stack: ee32a000\nPC is at dql_completed+0x168/0x178\nLR is at bgmac_poll+0x18c/0x6d8\npc : [\u003cc03b9430\u003e]    lr : [\u003cc04b5a18\u003e]    psr: 800a0313\nsp : ee32be14  ip : 000005ea  fp : 00000bd4\nr10: ee558500  r9 : c0116298  r8 : 00000002\nr7 : 00000000  r6 : ef128810  r5 : 01993267  r4 : 01993851\nr3 : ee558000  r2 : 000070e1  r1 : 00000bd4  r0 : ee52c180\nFlags: Nzcv  IRQs on  FIQs on  Mode SVC_32  ISA ARM  Segment none\nControl: 12c5387d  Table: 8e88c04a  DAC: 00000051\nProcess irq/41-bgmac (pid: 1166, stack limit = 0xee32a210)\nStack: (0xee32be14 to 0xee32c000)\nbe00:                                              ee558520 ee52c100 ef128810\nbe20: 00000000 00000002 c0116298 c04b5a18 00000000 c0a0c8c4 c0951780 00000040\nbe40: c0701780 ee558500 ee55d520 ef05b340 ef6f9780 ee558520 00000001 00000040\nbe60: ffffe000 c0a56878 ef6fa040 c0952040 0000012c c0528744 ef6f97b0 fffcfb6a\nbe80: c0a04104 2eda8000 c0a0c4ec c0a0d368 ee32bf44 c0153534 ee32be98 ee32be98\nbea0: ee32bea0 ee32bea0 ee32bea8 ee32bea8 00000000 c01462e4 ffffe000 ef6f22a8\nbec0: ffffe000 00000008 ee32bee4 c0147430 ffffe000 c094a2a8 00000003 ffffe000\nbee0: c0a54528 00208040 0000000c c0a0c8c4 c0a65980 c0124d3c 00000008 ee558520\nbf00: c094a23c c0a02080 00000000 c07a9910 ef136970 ef136970 ee30a440 ef136900\nbf20: ee30a440 00000001 ef136900 ee30a440 c016d990 00000000 c0108db0 c012500c\nbf40: ef136900 c016da14 ee30a464 ffffe000 00000001 c016dd14 00000000 c016db28\nbf60: ffffe000 ee21a080 ee30a400 00000000 ee32a000 ee30a440 c016dbfc ee25fd70\nbf80: ee21a09c c013edcc ee32a000 ee30a400 c013ec7c 00000000 00000000 00000000\nbfa0: 00000000 00000000 00000000 c0108470 00000000 00000000 00000000 00000000\nbfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000\nbfe0: 00000000 00000000 00000000 00000000 00000013 00000000 00000000 00000000\n[\u003cc03b9430\u003e] (dql_completed) from [\u003cc04b5a18\u003e] (bgmac_poll+0x18c/0x6d8)\n[\u003cc04b5a18\u003e] (bgmac_poll) from [\u003cc0528744\u003e] (net_rx_action+0x1c4/0x494)\n[\u003cc0528744\u003e] (net_rx_action) from [\u003cc0124d3c\u003e] (do_current_softirqs+0x1ec/0x43c)\n[\u003cc0124d3c\u003e] (do_current_softirqs) from [\u003cc012500c\u003e] (__local_bh_enable+0x80/0x98)\n[\u003cc012500c\u003e] (__local_bh_enable) from [\u003cc016da14\u003e] (irq_forced_thread_fn+0x84/0x98)\n[\u003cc016da14\u003e] (irq_forced_thread_fn) from [\u003cc016dd14\u003e] (irq_thread+0x118/0x1c0)\n[\u003cc016dd14\u003e] (irq_thread) from [\u003cc013edcc\u003e] (kthread+0x150/0x158)\n[\u003cc013edcc\u003e] (kthread) from [\u003cc0108470\u003e] (ret_from_fork+0x14/0x24)\nCode: a83f15e0 0200001a 0630a0e1 c3ffffea (f201f0e7)\n\nThe issue seems similar to commit 90b3b339364c (\"net: hisilicon: Fix a BUG\ntrigered by wrong bytes_compl\") and potentially introduced by commit\nb38c83dd0866 (\"bgmac: simplify tx ring index handling\").\n\nIf there is an RX interrupt between setting ring-\u003eend\nand netdev_sent_queue() we can hit the BUG_ON as bgmac_dma_tx_free()\ncan miscalculate the queue size while called from bgmac_poll().\n\nThe machine which triggered the BUG runs a v4.14 RT kernel - but the issue\nseems present in mainline too.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.170.2.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.170.2.s390x",
          "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.170.2.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.170.2.s390x",
          "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.170.2.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.170.2.s390x",
          "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.170.2.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.170.2.s390x",
          "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-64kb-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-64kb-devel-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-devel-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-devel-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-devel-5.14.21-150400.24.170.1.noarch",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-docs-5.14.21-150400.24.170.1.noarch",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-macros-5.14.21-150400.24.170.1.noarch",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-obs-build-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-obs-build-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-source-5.14.21-150400.24.170.1.noarch",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-syms-5.14.21-150400.24.170.1.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-syms-5.14.21-150400.24.170.1.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:reiserfs-kmp-default-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:reiserfs-kmp-default-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-64kb-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-64kb-devel-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-devel-5.14.21-150400.24.170.1.noarch",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-docs-5.14.21-150400.24.170.1.noarch",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-macros-5.14.21-150400.24.170.1.noarch",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-source-5.14.21-150400.24.170.1.noarch",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.170.1.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.170.1.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.170.2.ppc64le",
          "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.170.2.s390x",
          "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.170.2.ppc64le",
          "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.170.2.s390x",
          "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_170-default-1-150400.9.3.2.ppc64le",
          "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_170-default-1-150400.9.3.2.s390x",
          "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_170-default-1-150400.9.3.2.x86_64",
          "SUSE Linux Enterprise Micro 5.3:kernel-default-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise Micro 5.3:kernel-default-5.14.21-150400.24.170.2.s390x",
          "SUSE Linux Enterprise Micro 5.3:kernel-default-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise Micro 5.3:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.aarch64",
          "SUSE Linux Enterprise Micro 5.3:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
          "SUSE Linux Enterprise Micro 5.4:kernel-default-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise Micro 5.4:kernel-default-5.14.21-150400.24.170.2.s390x",
          "SUSE Linux Enterprise Micro 5.4:kernel-default-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise Micro 5.4:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.aarch64",
          "SUSE Linux Enterprise Micro 5.4:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-64kb-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-64kb-devel-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-5.14.21-150400.24.170.2.ppc64le",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-5.14.21-150400.24.170.2.s390x",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.aarch64",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.ppc64le",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.170.2.ppc64le",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.170.2.s390x",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-devel-5.14.21-150400.24.170.1.noarch",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-docs-5.14.21-150400.24.170.1.noarch",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-macros-5.14.21-150400.24.170.1.noarch",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.170.2.ppc64le",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.170.2.s390x",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-source-5.14.21-150400.24.170.1.noarch",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.170.1.aarch64",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.170.1.ppc64le",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.170.1.s390x",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.170.1.x86_64",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-zfcpdump-5.14.21-150400.24.170.2.s390x",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.170.2.ppc64le",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.170.2.s390x",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-5.14.21-150400.24.170.2.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-devel-5.14.21-150400.24.170.2.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-devel-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-devel-5.14.21-150400.24.170.1.noarch",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-docs-5.14.21-150400.24.170.1.noarch",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-macros-5.14.21-150400.24.170.1.noarch",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-obs-build-5.14.21-150400.24.170.2.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-obs-build-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-source-5.14.21-150400.24.170.1.noarch",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-syms-5.14.21-150400.24.170.1.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-syms-5.14.21-150400.24.170.1.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.170.2.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.170.2.x86_64",
          "SUSE Manager Proxy 4.3:kernel-default-5.14.21-150400.24.170.2.x86_64",
          "SUSE Manager Proxy 4.3:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
          "SUSE Manager Proxy 4.3:kernel-default-devel-5.14.21-150400.24.170.2.x86_64",
          "SUSE Manager Proxy 4.3:kernel-devel-5.14.21-150400.24.170.1.noarch",
          "SUSE Manager Proxy 4.3:kernel-macros-5.14.21-150400.24.170.1.noarch",
          "SUSE Manager Proxy 4.3:kernel-source-5.14.21-150400.24.170.1.noarch",
          "SUSE Manager Proxy 4.3:kernel-syms-5.14.21-150400.24.170.1.x86_64",
          "SUSE Manager Server 4.3:kernel-default-5.14.21-150400.24.170.2.ppc64le",
          "SUSE Manager Server 4.3:kernel-default-5.14.21-150400.24.170.2.s390x",
          "SUSE Manager Server 4.3:kernel-default-5.14.21-150400.24.170.2.x86_64",
          "SUSE Manager Server 4.3:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.ppc64le",
          "SUSE Manager Server 4.3:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
          "SUSE Manager Server 4.3:kernel-default-devel-5.14.21-150400.24.170.2.ppc64le",
          "SUSE Manager Server 4.3:kernel-default-devel-5.14.21-150400.24.170.2.s390x",
          "SUSE Manager Server 4.3:kernel-default-devel-5.14.21-150400.24.170.2.x86_64",
          "SUSE Manager Server 4.3:kernel-devel-5.14.21-150400.24.170.1.noarch",
          "SUSE Manager Server 4.3:kernel-macros-5.14.21-150400.24.170.1.noarch",
          "SUSE Manager Server 4.3:kernel-source-5.14.21-150400.24.170.1.noarch",
          "SUSE Manager Server 4.3:kernel-syms-5.14.21-150400.24.170.1.ppc64le",
          "SUSE Manager Server 4.3:kernel-syms-5.14.21-150400.24.170.1.s390x",
          "SUSE Manager Server 4.3:kernel-syms-5.14.21-150400.24.170.1.x86_64",
          "SUSE Manager Server 4.3:kernel-zfcpdump-5.14.21-150400.24.170.2.s390x"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2022-50062",
          "url": "https://www.suse.com/security/cve/CVE-2022-50062"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1245028 for CVE-2022-50062",
          "url": "https://bugzilla.suse.com/1245028"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-64kb-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-64kb-devel-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-devel-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-devel-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-devel-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-docs-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-macros-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-obs-build-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-obs-build-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-source-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-syms-5.14.21-150400.24.170.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-syms-5.14.21-150400.24.170.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:reiserfs-kmp-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:reiserfs-kmp-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-64kb-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-64kb-devel-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-devel-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-docs-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-macros-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-source-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.170.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.170.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_170-default-1-150400.9.3.2.ppc64le",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_170-default-1-150400.9.3.2.s390x",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_170-default-1-150400.9.3.2.x86_64",
            "SUSE Linux Enterprise Micro 5.3:kernel-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise Micro 5.3:kernel-default-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise Micro 5.3:kernel-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Micro 5.3:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.aarch64",
            "SUSE Linux Enterprise Micro 5.3:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
            "SUSE Linux Enterprise Micro 5.4:kernel-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise Micro 5.4:kernel-default-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise Micro 5.4:kernel-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Micro 5.4:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.aarch64",
            "SUSE Linux Enterprise Micro 5.4:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-64kb-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-64kb-devel-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.aarch64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.ppc64le",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-devel-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-docs-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-macros-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-source-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.170.1.aarch64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.170.1.ppc64le",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.170.1.s390x",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.170.1.x86_64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-zfcpdump-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-devel-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-devel-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-devel-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-docs-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-macros-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-obs-build-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-obs-build-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-source-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-syms-5.14.21-150400.24.170.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-syms-5.14.21-150400.24.170.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Manager Proxy 4.3:kernel-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Manager Proxy 4.3:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
            "SUSE Manager Proxy 4.3:kernel-default-devel-5.14.21-150400.24.170.2.x86_64",
            "SUSE Manager Proxy 4.3:kernel-devel-5.14.21-150400.24.170.1.noarch",
            "SUSE Manager Proxy 4.3:kernel-macros-5.14.21-150400.24.170.1.noarch",
            "SUSE Manager Proxy 4.3:kernel-source-5.14.21-150400.24.170.1.noarch",
            "SUSE Manager Proxy 4.3:kernel-syms-5.14.21-150400.24.170.1.x86_64",
            "SUSE Manager Server 4.3:kernel-default-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Manager Server 4.3:kernel-default-5.14.21-150400.24.170.2.s390x",
            "SUSE Manager Server 4.3:kernel-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Manager Server 4.3:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.ppc64le",
            "SUSE Manager Server 4.3:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
            "SUSE Manager Server 4.3:kernel-default-devel-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Manager Server 4.3:kernel-default-devel-5.14.21-150400.24.170.2.s390x",
            "SUSE Manager Server 4.3:kernel-default-devel-5.14.21-150400.24.170.2.x86_64",
            "SUSE Manager Server 4.3:kernel-devel-5.14.21-150400.24.170.1.noarch",
            "SUSE Manager Server 4.3:kernel-macros-5.14.21-150400.24.170.1.noarch",
            "SUSE Manager Server 4.3:kernel-source-5.14.21-150400.24.170.1.noarch",
            "SUSE Manager Server 4.3:kernel-syms-5.14.21-150400.24.170.1.ppc64le",
            "SUSE Manager Server 4.3:kernel-syms-5.14.21-150400.24.170.1.s390x",
            "SUSE Manager Server 4.3:kernel-syms-5.14.21-150400.24.170.1.x86_64",
            "SUSE Manager Server 4.3:kernel-zfcpdump-5.14.21-150400.24.170.2.s390x"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 5.5,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
            "version": "3.1"
          },
          "products": [
            "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-64kb-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-64kb-devel-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-devel-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-devel-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-devel-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-docs-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-macros-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-obs-build-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-obs-build-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-source-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-syms-5.14.21-150400.24.170.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-syms-5.14.21-150400.24.170.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:reiserfs-kmp-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:reiserfs-kmp-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-64kb-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-64kb-devel-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-devel-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-docs-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-macros-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-source-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.170.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.170.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_170-default-1-150400.9.3.2.ppc64le",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_170-default-1-150400.9.3.2.s390x",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_170-default-1-150400.9.3.2.x86_64",
            "SUSE Linux Enterprise Micro 5.3:kernel-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise Micro 5.3:kernel-default-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise Micro 5.3:kernel-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Micro 5.3:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.aarch64",
            "SUSE Linux Enterprise Micro 5.3:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
            "SUSE Linux Enterprise Micro 5.4:kernel-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise Micro 5.4:kernel-default-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise Micro 5.4:kernel-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Micro 5.4:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.aarch64",
            "SUSE Linux Enterprise Micro 5.4:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-64kb-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-64kb-devel-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.aarch64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.ppc64le",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-devel-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-docs-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-macros-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-source-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.170.1.aarch64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.170.1.ppc64le",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.170.1.s390x",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.170.1.x86_64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-zfcpdump-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-devel-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-devel-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-devel-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-docs-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-macros-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-obs-build-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-obs-build-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-source-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-syms-5.14.21-150400.24.170.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-syms-5.14.21-150400.24.170.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Manager Proxy 4.3:kernel-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Manager Proxy 4.3:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
            "SUSE Manager Proxy 4.3:kernel-default-devel-5.14.21-150400.24.170.2.x86_64",
            "SUSE Manager Proxy 4.3:kernel-devel-5.14.21-150400.24.170.1.noarch",
            "SUSE Manager Proxy 4.3:kernel-macros-5.14.21-150400.24.170.1.noarch",
            "SUSE Manager Proxy 4.3:kernel-source-5.14.21-150400.24.170.1.noarch",
            "SUSE Manager Proxy 4.3:kernel-syms-5.14.21-150400.24.170.1.x86_64",
            "SUSE Manager Server 4.3:kernel-default-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Manager Server 4.3:kernel-default-5.14.21-150400.24.170.2.s390x",
            "SUSE Manager Server 4.3:kernel-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Manager Server 4.3:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.ppc64le",
            "SUSE Manager Server 4.3:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
            "SUSE Manager Server 4.3:kernel-default-devel-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Manager Server 4.3:kernel-default-devel-5.14.21-150400.24.170.2.s390x",
            "SUSE Manager Server 4.3:kernel-default-devel-5.14.21-150400.24.170.2.x86_64",
            "SUSE Manager Server 4.3:kernel-devel-5.14.21-150400.24.170.1.noarch",
            "SUSE Manager Server 4.3:kernel-macros-5.14.21-150400.24.170.1.noarch",
            "SUSE Manager Server 4.3:kernel-source-5.14.21-150400.24.170.1.noarch",
            "SUSE Manager Server 4.3:kernel-syms-5.14.21-150400.24.170.1.ppc64le",
            "SUSE Manager Server 4.3:kernel-syms-5.14.21-150400.24.170.1.s390x",
            "SUSE Manager Server 4.3:kernel-syms-5.14.21-150400.24.170.1.x86_64",
            "SUSE Manager Server 4.3:kernel-zfcpdump-5.14.21-150400.24.170.2.s390x"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2025-07-28T15:09:33Z",
          "details": "moderate"
        }
      ],
      "title": "CVE-2022-50062"
    },
    {
      "cve": "CVE-2022-50065",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2022-50065"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "In the Linux kernel, the following vulnerability has been resolved:\n\nvirtio_net: fix memory leak inside XPD_TX with mergeable\n\nWhen we call xdp_convert_buff_to_frame() to get xdpf, if it returns\nNULL, we should check if xdp_page was allocated by xdp_linearize_page().\nIf it is newly allocated, it should be freed here alone. Just like any\nother \"goto err_xdp\".",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.170.2.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.170.2.s390x",
          "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.170.2.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.170.2.s390x",
          "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.170.2.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.170.2.s390x",
          "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.170.2.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.170.2.s390x",
          "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-64kb-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-64kb-devel-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-devel-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-devel-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-devel-5.14.21-150400.24.170.1.noarch",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-docs-5.14.21-150400.24.170.1.noarch",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-macros-5.14.21-150400.24.170.1.noarch",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-obs-build-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-obs-build-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-source-5.14.21-150400.24.170.1.noarch",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-syms-5.14.21-150400.24.170.1.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-syms-5.14.21-150400.24.170.1.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:reiserfs-kmp-default-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:reiserfs-kmp-default-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-64kb-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-64kb-devel-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-devel-5.14.21-150400.24.170.1.noarch",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-docs-5.14.21-150400.24.170.1.noarch",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-macros-5.14.21-150400.24.170.1.noarch",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-source-5.14.21-150400.24.170.1.noarch",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.170.1.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.170.1.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.170.2.ppc64le",
          "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.170.2.s390x",
          "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.170.2.ppc64le",
          "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.170.2.s390x",
          "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_170-default-1-150400.9.3.2.ppc64le",
          "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_170-default-1-150400.9.3.2.s390x",
          "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_170-default-1-150400.9.3.2.x86_64",
          "SUSE Linux Enterprise Micro 5.3:kernel-default-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise Micro 5.3:kernel-default-5.14.21-150400.24.170.2.s390x",
          "SUSE Linux Enterprise Micro 5.3:kernel-default-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise Micro 5.3:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.aarch64",
          "SUSE Linux Enterprise Micro 5.3:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
          "SUSE Linux Enterprise Micro 5.4:kernel-default-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise Micro 5.4:kernel-default-5.14.21-150400.24.170.2.s390x",
          "SUSE Linux Enterprise Micro 5.4:kernel-default-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise Micro 5.4:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.aarch64",
          "SUSE Linux Enterprise Micro 5.4:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-64kb-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-64kb-devel-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-5.14.21-150400.24.170.2.ppc64le",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-5.14.21-150400.24.170.2.s390x",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.aarch64",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.ppc64le",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.170.2.ppc64le",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.170.2.s390x",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-devel-5.14.21-150400.24.170.1.noarch",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-docs-5.14.21-150400.24.170.1.noarch",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-macros-5.14.21-150400.24.170.1.noarch",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.170.2.ppc64le",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.170.2.s390x",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-source-5.14.21-150400.24.170.1.noarch",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.170.1.aarch64",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.170.1.ppc64le",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.170.1.s390x",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.170.1.x86_64",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-zfcpdump-5.14.21-150400.24.170.2.s390x",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.170.2.ppc64le",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.170.2.s390x",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-5.14.21-150400.24.170.2.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-devel-5.14.21-150400.24.170.2.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-devel-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-devel-5.14.21-150400.24.170.1.noarch",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-docs-5.14.21-150400.24.170.1.noarch",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-macros-5.14.21-150400.24.170.1.noarch",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-obs-build-5.14.21-150400.24.170.2.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-obs-build-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-source-5.14.21-150400.24.170.1.noarch",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-syms-5.14.21-150400.24.170.1.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-syms-5.14.21-150400.24.170.1.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.170.2.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.170.2.x86_64",
          "SUSE Manager Proxy 4.3:kernel-default-5.14.21-150400.24.170.2.x86_64",
          "SUSE Manager Proxy 4.3:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
          "SUSE Manager Proxy 4.3:kernel-default-devel-5.14.21-150400.24.170.2.x86_64",
          "SUSE Manager Proxy 4.3:kernel-devel-5.14.21-150400.24.170.1.noarch",
          "SUSE Manager Proxy 4.3:kernel-macros-5.14.21-150400.24.170.1.noarch",
          "SUSE Manager Proxy 4.3:kernel-source-5.14.21-150400.24.170.1.noarch",
          "SUSE Manager Proxy 4.3:kernel-syms-5.14.21-150400.24.170.1.x86_64",
          "SUSE Manager Server 4.3:kernel-default-5.14.21-150400.24.170.2.ppc64le",
          "SUSE Manager Server 4.3:kernel-default-5.14.21-150400.24.170.2.s390x",
          "SUSE Manager Server 4.3:kernel-default-5.14.21-150400.24.170.2.x86_64",
          "SUSE Manager Server 4.3:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.ppc64le",
          "SUSE Manager Server 4.3:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
          "SUSE Manager Server 4.3:kernel-default-devel-5.14.21-150400.24.170.2.ppc64le",
          "SUSE Manager Server 4.3:kernel-default-devel-5.14.21-150400.24.170.2.s390x",
          "SUSE Manager Server 4.3:kernel-default-devel-5.14.21-150400.24.170.2.x86_64",
          "SUSE Manager Server 4.3:kernel-devel-5.14.21-150400.24.170.1.noarch",
          "SUSE Manager Server 4.3:kernel-macros-5.14.21-150400.24.170.1.noarch",
          "SUSE Manager Server 4.3:kernel-source-5.14.21-150400.24.170.1.noarch",
          "SUSE Manager Server 4.3:kernel-syms-5.14.21-150400.24.170.1.ppc64le",
          "SUSE Manager Server 4.3:kernel-syms-5.14.21-150400.24.170.1.s390x",
          "SUSE Manager Server 4.3:kernel-syms-5.14.21-150400.24.170.1.x86_64",
          "SUSE Manager Server 4.3:kernel-zfcpdump-5.14.21-150400.24.170.2.s390x"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2022-50065",
          "url": "https://www.suse.com/security/cve/CVE-2022-50065"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1244986 for CVE-2022-50065",
          "url": "https://bugzilla.suse.com/1244986"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-64kb-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-64kb-devel-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-devel-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-devel-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-devel-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-docs-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-macros-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-obs-build-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-obs-build-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-source-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-syms-5.14.21-150400.24.170.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-syms-5.14.21-150400.24.170.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:reiserfs-kmp-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:reiserfs-kmp-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-64kb-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-64kb-devel-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-devel-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-docs-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-macros-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-source-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.170.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.170.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_170-default-1-150400.9.3.2.ppc64le",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_170-default-1-150400.9.3.2.s390x",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_170-default-1-150400.9.3.2.x86_64",
            "SUSE Linux Enterprise Micro 5.3:kernel-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise Micro 5.3:kernel-default-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise Micro 5.3:kernel-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Micro 5.3:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.aarch64",
            "SUSE Linux Enterprise Micro 5.3:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
            "SUSE Linux Enterprise Micro 5.4:kernel-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise Micro 5.4:kernel-default-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise Micro 5.4:kernel-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Micro 5.4:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.aarch64",
            "SUSE Linux Enterprise Micro 5.4:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-64kb-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-64kb-devel-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.aarch64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.ppc64le",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-devel-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-docs-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-macros-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-source-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.170.1.aarch64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.170.1.ppc64le",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.170.1.s390x",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.170.1.x86_64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-zfcpdump-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-devel-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-devel-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-devel-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-docs-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-macros-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-obs-build-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-obs-build-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-source-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-syms-5.14.21-150400.24.170.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-syms-5.14.21-150400.24.170.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Manager Proxy 4.3:kernel-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Manager Proxy 4.3:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
            "SUSE Manager Proxy 4.3:kernel-default-devel-5.14.21-150400.24.170.2.x86_64",
            "SUSE Manager Proxy 4.3:kernel-devel-5.14.21-150400.24.170.1.noarch",
            "SUSE Manager Proxy 4.3:kernel-macros-5.14.21-150400.24.170.1.noarch",
            "SUSE Manager Proxy 4.3:kernel-source-5.14.21-150400.24.170.1.noarch",
            "SUSE Manager Proxy 4.3:kernel-syms-5.14.21-150400.24.170.1.x86_64",
            "SUSE Manager Server 4.3:kernel-default-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Manager Server 4.3:kernel-default-5.14.21-150400.24.170.2.s390x",
            "SUSE Manager Server 4.3:kernel-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Manager Server 4.3:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.ppc64le",
            "SUSE Manager Server 4.3:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
            "SUSE Manager Server 4.3:kernel-default-devel-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Manager Server 4.3:kernel-default-devel-5.14.21-150400.24.170.2.s390x",
            "SUSE Manager Server 4.3:kernel-default-devel-5.14.21-150400.24.170.2.x86_64",
            "SUSE Manager Server 4.3:kernel-devel-5.14.21-150400.24.170.1.noarch",
            "SUSE Manager Server 4.3:kernel-macros-5.14.21-150400.24.170.1.noarch",
            "SUSE Manager Server 4.3:kernel-source-5.14.21-150400.24.170.1.noarch",
            "SUSE Manager Server 4.3:kernel-syms-5.14.21-150400.24.170.1.ppc64le",
            "SUSE Manager Server 4.3:kernel-syms-5.14.21-150400.24.170.1.s390x",
            "SUSE Manager Server 4.3:kernel-syms-5.14.21-150400.24.170.1.x86_64",
            "SUSE Manager Server 4.3:kernel-zfcpdump-5.14.21-150400.24.170.2.s390x"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 5.5,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
            "version": "3.1"
          },
          "products": [
            "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-64kb-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-64kb-devel-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-devel-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-devel-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-devel-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-docs-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-macros-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-obs-build-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-obs-build-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-source-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-syms-5.14.21-150400.24.170.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-syms-5.14.21-150400.24.170.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:reiserfs-kmp-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:reiserfs-kmp-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-64kb-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-64kb-devel-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-devel-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-docs-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-macros-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-source-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.170.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.170.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_170-default-1-150400.9.3.2.ppc64le",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_170-default-1-150400.9.3.2.s390x",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_170-default-1-150400.9.3.2.x86_64",
            "SUSE Linux Enterprise Micro 5.3:kernel-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise Micro 5.3:kernel-default-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise Micro 5.3:kernel-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Micro 5.3:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.aarch64",
            "SUSE Linux Enterprise Micro 5.3:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
            "SUSE Linux Enterprise Micro 5.4:kernel-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise Micro 5.4:kernel-default-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise Micro 5.4:kernel-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Micro 5.4:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.aarch64",
            "SUSE Linux Enterprise Micro 5.4:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-64kb-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-64kb-devel-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.aarch64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.ppc64le",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-devel-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-docs-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-macros-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-source-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.170.1.aarch64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.170.1.ppc64le",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.170.1.s390x",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.170.1.x86_64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-zfcpdump-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-devel-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-devel-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-devel-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-docs-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-macros-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-obs-build-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-obs-build-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-source-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-syms-5.14.21-150400.24.170.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-syms-5.14.21-150400.24.170.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Manager Proxy 4.3:kernel-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Manager Proxy 4.3:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
            "SUSE Manager Proxy 4.3:kernel-default-devel-5.14.21-150400.24.170.2.x86_64",
            "SUSE Manager Proxy 4.3:kernel-devel-5.14.21-150400.24.170.1.noarch",
            "SUSE Manager Proxy 4.3:kernel-macros-5.14.21-150400.24.170.1.noarch",
            "SUSE Manager Proxy 4.3:kernel-source-5.14.21-150400.24.170.1.noarch",
            "SUSE Manager Proxy 4.3:kernel-syms-5.14.21-150400.24.170.1.x86_64",
            "SUSE Manager Server 4.3:kernel-default-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Manager Server 4.3:kernel-default-5.14.21-150400.24.170.2.s390x",
            "SUSE Manager Server 4.3:kernel-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Manager Server 4.3:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.ppc64le",
            "SUSE Manager Server 4.3:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
            "SUSE Manager Server 4.3:kernel-default-devel-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Manager Server 4.3:kernel-default-devel-5.14.21-150400.24.170.2.s390x",
            "SUSE Manager Server 4.3:kernel-default-devel-5.14.21-150400.24.170.2.x86_64",
            "SUSE Manager Server 4.3:kernel-devel-5.14.21-150400.24.170.1.noarch",
            "SUSE Manager Server 4.3:kernel-macros-5.14.21-150400.24.170.1.noarch",
            "SUSE Manager Server 4.3:kernel-source-5.14.21-150400.24.170.1.noarch",
            "SUSE Manager Server 4.3:kernel-syms-5.14.21-150400.24.170.1.ppc64le",
            "SUSE Manager Server 4.3:kernel-syms-5.14.21-150400.24.170.1.s390x",
            "SUSE Manager Server 4.3:kernel-syms-5.14.21-150400.24.170.1.x86_64",
            "SUSE Manager Server 4.3:kernel-zfcpdump-5.14.21-150400.24.170.2.s390x"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2025-07-28T15:09:33Z",
          "details": "moderate"
        }
      ],
      "title": "CVE-2022-50065"
    },
    {
      "cve": "CVE-2022-50066",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2022-50066"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "In the Linux kernel, the following vulnerability has been resolved:\n\nnet: atlantic: fix aq_vec index out of range error\n\nThe final update statement of the for loop exceeds the array range, the\ndereference of self-\u003eaq_vec[i] is not checked and then leads to the\nindex out of range error.\nAlso fixed this kind of coding style in other for loop.\n\n[   97.937604] UBSAN: array-index-out-of-bounds in drivers/net/ethernet/aquantia/atlantic/aq_nic.c:1404:48\n[   97.937607] index 8 is out of range for type \u0027aq_vec_s *[8]\u0027\n[   97.937608] CPU: 38 PID: 3767 Comm: kworker/u256:18 Not tainted 5.19.0+ #2\n[   97.937610] Hardware name: Dell Inc. Precision 7865 Tower/, BIOS 1.0.0 06/12/2022\n[   97.937611] Workqueue: events_unbound async_run_entry_fn\n[   97.937616] Call Trace:\n[   97.937617]  \u003cTASK\u003e\n[   97.937619]  dump_stack_lvl+0x49/0x63\n[   97.937624]  dump_stack+0x10/0x16\n[   97.937626]  ubsan_epilogue+0x9/0x3f\n[   97.937627]  __ubsan_handle_out_of_bounds.cold+0x44/0x49\n[   97.937629]  ? __scm_send+0x348/0x440\n[   97.937632]  ? aq_vec_stop+0x72/0x80 [atlantic]\n[   97.937639]  aq_nic_stop+0x1b6/0x1c0 [atlantic]\n[   97.937644]  aq_suspend_common+0x88/0x90 [atlantic]\n[   97.937648]  aq_pm_suspend_poweroff+0xe/0x20 [atlantic]\n[   97.937653]  pci_pm_suspend+0x7e/0x1a0\n[   97.937655]  ? pci_pm_suspend_noirq+0x2b0/0x2b0\n[   97.937657]  dpm_run_callback+0x54/0x190\n[   97.937660]  __device_suspend+0x14c/0x4d0\n[   97.937661]  async_suspend+0x23/0x70\n[   97.937663]  async_run_entry_fn+0x33/0x120\n[   97.937664]  process_one_work+0x21f/0x3f0\n[   97.937666]  worker_thread+0x4a/0x3c0\n[   97.937668]  ? process_one_work+0x3f0/0x3f0\n[   97.937669]  kthread+0xf0/0x120\n[   97.937671]  ? kthread_complete_and_exit+0x20/0x20\n[   97.937672]  ret_from_fork+0x22/0x30\n[   97.937676]  \u003c/TASK\u003e\n\nv2. fixed \"warning: variable \u0027aq_vec\u0027 set but not used\"\n\nv3. simplified a for loop",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.170.2.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.170.2.s390x",
          "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.170.2.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.170.2.s390x",
          "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.170.2.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.170.2.s390x",
          "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.170.2.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.170.2.s390x",
          "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-64kb-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-64kb-devel-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-devel-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-devel-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-devel-5.14.21-150400.24.170.1.noarch",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-docs-5.14.21-150400.24.170.1.noarch",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-macros-5.14.21-150400.24.170.1.noarch",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-obs-build-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-obs-build-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-source-5.14.21-150400.24.170.1.noarch",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-syms-5.14.21-150400.24.170.1.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-syms-5.14.21-150400.24.170.1.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:reiserfs-kmp-default-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:reiserfs-kmp-default-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-64kb-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-64kb-devel-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-devel-5.14.21-150400.24.170.1.noarch",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-docs-5.14.21-150400.24.170.1.noarch",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-macros-5.14.21-150400.24.170.1.noarch",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-source-5.14.21-150400.24.170.1.noarch",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.170.1.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.170.1.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.170.2.ppc64le",
          "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.170.2.s390x",
          "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.170.2.ppc64le",
          "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.170.2.s390x",
          "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_170-default-1-150400.9.3.2.ppc64le",
          "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_170-default-1-150400.9.3.2.s390x",
          "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_170-default-1-150400.9.3.2.x86_64",
          "SUSE Linux Enterprise Micro 5.3:kernel-default-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise Micro 5.3:kernel-default-5.14.21-150400.24.170.2.s390x",
          "SUSE Linux Enterprise Micro 5.3:kernel-default-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise Micro 5.3:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.aarch64",
          "SUSE Linux Enterprise Micro 5.3:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
          "SUSE Linux Enterprise Micro 5.4:kernel-default-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise Micro 5.4:kernel-default-5.14.21-150400.24.170.2.s390x",
          "SUSE Linux Enterprise Micro 5.4:kernel-default-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise Micro 5.4:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.aarch64",
          "SUSE Linux Enterprise Micro 5.4:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-64kb-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-64kb-devel-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-5.14.21-150400.24.170.2.ppc64le",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-5.14.21-150400.24.170.2.s390x",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.aarch64",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.ppc64le",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.170.2.ppc64le",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.170.2.s390x",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-devel-5.14.21-150400.24.170.1.noarch",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-docs-5.14.21-150400.24.170.1.noarch",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-macros-5.14.21-150400.24.170.1.noarch",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.170.2.ppc64le",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.170.2.s390x",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-source-5.14.21-150400.24.170.1.noarch",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.170.1.aarch64",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.170.1.ppc64le",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.170.1.s390x",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.170.1.x86_64",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-zfcpdump-5.14.21-150400.24.170.2.s390x",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.170.2.ppc64le",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.170.2.s390x",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-5.14.21-150400.24.170.2.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-devel-5.14.21-150400.24.170.2.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-devel-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-devel-5.14.21-150400.24.170.1.noarch",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-docs-5.14.21-150400.24.170.1.noarch",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-macros-5.14.21-150400.24.170.1.noarch",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-obs-build-5.14.21-150400.24.170.2.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-obs-build-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-source-5.14.21-150400.24.170.1.noarch",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-syms-5.14.21-150400.24.170.1.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-syms-5.14.21-150400.24.170.1.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.170.2.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.170.2.x86_64",
          "SUSE Manager Proxy 4.3:kernel-default-5.14.21-150400.24.170.2.x86_64",
          "SUSE Manager Proxy 4.3:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
          "SUSE Manager Proxy 4.3:kernel-default-devel-5.14.21-150400.24.170.2.x86_64",
          "SUSE Manager Proxy 4.3:kernel-devel-5.14.21-150400.24.170.1.noarch",
          "SUSE Manager Proxy 4.3:kernel-macros-5.14.21-150400.24.170.1.noarch",
          "SUSE Manager Proxy 4.3:kernel-source-5.14.21-150400.24.170.1.noarch",
          "SUSE Manager Proxy 4.3:kernel-syms-5.14.21-150400.24.170.1.x86_64",
          "SUSE Manager Server 4.3:kernel-default-5.14.21-150400.24.170.2.ppc64le",
          "SUSE Manager Server 4.3:kernel-default-5.14.21-150400.24.170.2.s390x",
          "SUSE Manager Server 4.3:kernel-default-5.14.21-150400.24.170.2.x86_64",
          "SUSE Manager Server 4.3:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.ppc64le",
          "SUSE Manager Server 4.3:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
          "SUSE Manager Server 4.3:kernel-default-devel-5.14.21-150400.24.170.2.ppc64le",
          "SUSE Manager Server 4.3:kernel-default-devel-5.14.21-150400.24.170.2.s390x",
          "SUSE Manager Server 4.3:kernel-default-devel-5.14.21-150400.24.170.2.x86_64",
          "SUSE Manager Server 4.3:kernel-devel-5.14.21-150400.24.170.1.noarch",
          "SUSE Manager Server 4.3:kernel-macros-5.14.21-150400.24.170.1.noarch",
          "SUSE Manager Server 4.3:kernel-source-5.14.21-150400.24.170.1.noarch",
          "SUSE Manager Server 4.3:kernel-syms-5.14.21-150400.24.170.1.ppc64le",
          "SUSE Manager Server 4.3:kernel-syms-5.14.21-150400.24.170.1.s390x",
          "SUSE Manager Server 4.3:kernel-syms-5.14.21-150400.24.170.1.x86_64",
          "SUSE Manager Server 4.3:kernel-zfcpdump-5.14.21-150400.24.170.2.s390x"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2022-50066",
          "url": "https://www.suse.com/security/cve/CVE-2022-50066"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1244985 for CVE-2022-50066",
          "url": "https://bugzilla.suse.com/1244985"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-64kb-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-64kb-devel-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-devel-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-devel-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-devel-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-docs-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-macros-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-obs-build-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-obs-build-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-source-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-syms-5.14.21-150400.24.170.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-syms-5.14.21-150400.24.170.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:reiserfs-kmp-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:reiserfs-kmp-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-64kb-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-64kb-devel-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-devel-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-docs-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-macros-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-source-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.170.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.170.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_170-default-1-150400.9.3.2.ppc64le",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_170-default-1-150400.9.3.2.s390x",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_170-default-1-150400.9.3.2.x86_64",
            "SUSE Linux Enterprise Micro 5.3:kernel-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise Micro 5.3:kernel-default-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise Micro 5.3:kernel-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Micro 5.3:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.aarch64",
            "SUSE Linux Enterprise Micro 5.3:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
            "SUSE Linux Enterprise Micro 5.4:kernel-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise Micro 5.4:kernel-default-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise Micro 5.4:kernel-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Micro 5.4:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.aarch64",
            "SUSE Linux Enterprise Micro 5.4:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-64kb-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-64kb-devel-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.aarch64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.ppc64le",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-devel-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-docs-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-macros-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-source-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.170.1.aarch64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.170.1.ppc64le",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.170.1.s390x",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.170.1.x86_64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-zfcpdump-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-devel-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-devel-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-devel-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-docs-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-macros-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-obs-build-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-obs-build-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-source-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-syms-5.14.21-150400.24.170.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-syms-5.14.21-150400.24.170.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Manager Proxy 4.3:kernel-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Manager Proxy 4.3:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
            "SUSE Manager Proxy 4.3:kernel-default-devel-5.14.21-150400.24.170.2.x86_64",
            "SUSE Manager Proxy 4.3:kernel-devel-5.14.21-150400.24.170.1.noarch",
            "SUSE Manager Proxy 4.3:kernel-macros-5.14.21-150400.24.170.1.noarch",
            "SUSE Manager Proxy 4.3:kernel-source-5.14.21-150400.24.170.1.noarch",
            "SUSE Manager Proxy 4.3:kernel-syms-5.14.21-150400.24.170.1.x86_64",
            "SUSE Manager Server 4.3:kernel-default-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Manager Server 4.3:kernel-default-5.14.21-150400.24.170.2.s390x",
            "SUSE Manager Server 4.3:kernel-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Manager Server 4.3:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.ppc64le",
            "SUSE Manager Server 4.3:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
            "SUSE Manager Server 4.3:kernel-default-devel-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Manager Server 4.3:kernel-default-devel-5.14.21-150400.24.170.2.s390x",
            "SUSE Manager Server 4.3:kernel-default-devel-5.14.21-150400.24.170.2.x86_64",
            "SUSE Manager Server 4.3:kernel-devel-5.14.21-150400.24.170.1.noarch",
            "SUSE Manager Server 4.3:kernel-macros-5.14.21-150400.24.170.1.noarch",
            "SUSE Manager Server 4.3:kernel-source-5.14.21-150400.24.170.1.noarch",
            "SUSE Manager Server 4.3:kernel-syms-5.14.21-150400.24.170.1.ppc64le",
            "SUSE Manager Server 4.3:kernel-syms-5.14.21-150400.24.170.1.s390x",
            "SUSE Manager Server 4.3:kernel-syms-5.14.21-150400.24.170.1.x86_64",
            "SUSE Manager Server 4.3:kernel-zfcpdump-5.14.21-150400.24.170.2.s390x"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 5.5,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
            "version": "3.1"
          },
          "products": [
            "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-64kb-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-64kb-devel-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-devel-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-devel-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-devel-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-docs-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-macros-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-obs-build-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-obs-build-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-source-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-syms-5.14.21-150400.24.170.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-syms-5.14.21-150400.24.170.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:reiserfs-kmp-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:reiserfs-kmp-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-64kb-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-64kb-devel-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-devel-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-docs-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-macros-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-source-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.170.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.170.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_170-default-1-150400.9.3.2.ppc64le",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_170-default-1-150400.9.3.2.s390x",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_170-default-1-150400.9.3.2.x86_64",
            "SUSE Linux Enterprise Micro 5.3:kernel-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise Micro 5.3:kernel-default-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise Micro 5.3:kernel-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Micro 5.3:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.aarch64",
            "SUSE Linux Enterprise Micro 5.3:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
            "SUSE Linux Enterprise Micro 5.4:kernel-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise Micro 5.4:kernel-default-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise Micro 5.4:kernel-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Micro 5.4:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.aarch64",
            "SUSE Linux Enterprise Micro 5.4:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-64kb-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-64kb-devel-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.aarch64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.ppc64le",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-devel-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-docs-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-macros-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-source-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.170.1.aarch64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.170.1.ppc64le",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.170.1.s390x",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.170.1.x86_64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-zfcpdump-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-devel-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-devel-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-devel-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-docs-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-macros-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-obs-build-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-obs-build-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-source-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-syms-5.14.21-150400.24.170.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-syms-5.14.21-150400.24.170.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Manager Proxy 4.3:kernel-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Manager Proxy 4.3:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
            "SUSE Manager Proxy 4.3:kernel-default-devel-5.14.21-150400.24.170.2.x86_64",
            "SUSE Manager Proxy 4.3:kernel-devel-5.14.21-150400.24.170.1.noarch",
            "SUSE Manager Proxy 4.3:kernel-macros-5.14.21-150400.24.170.1.noarch",
            "SUSE Manager Proxy 4.3:kernel-source-5.14.21-150400.24.170.1.noarch",
            "SUSE Manager Proxy 4.3:kernel-syms-5.14.21-150400.24.170.1.x86_64",
            "SUSE Manager Server 4.3:kernel-default-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Manager Server 4.3:kernel-default-5.14.21-150400.24.170.2.s390x",
            "SUSE Manager Server 4.3:kernel-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Manager Server 4.3:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.ppc64le",
            "SUSE Manager Server 4.3:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
            "SUSE Manager Server 4.3:kernel-default-devel-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Manager Server 4.3:kernel-default-devel-5.14.21-150400.24.170.2.s390x",
            "SUSE Manager Server 4.3:kernel-default-devel-5.14.21-150400.24.170.2.x86_64",
            "SUSE Manager Server 4.3:kernel-devel-5.14.21-150400.24.170.1.noarch",
            "SUSE Manager Server 4.3:kernel-macros-5.14.21-150400.24.170.1.noarch",
            "SUSE Manager Server 4.3:kernel-source-5.14.21-150400.24.170.1.noarch",
            "SUSE Manager Server 4.3:kernel-syms-5.14.21-150400.24.170.1.ppc64le",
            "SUSE Manager Server 4.3:kernel-syms-5.14.21-150400.24.170.1.s390x",
            "SUSE Manager Server 4.3:kernel-syms-5.14.21-150400.24.170.1.x86_64",
            "SUSE Manager Server 4.3:kernel-zfcpdump-5.14.21-150400.24.170.2.s390x"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2025-07-28T15:09:33Z",
          "details": "moderate"
        }
      ],
      "title": "CVE-2022-50066"
    },
    {
      "cve": "CVE-2022-50067",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2022-50067"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "In the Linux kernel, the following vulnerability has been resolved:\n\nbtrfs: unset reloc control if transaction commit fails in prepare_to_relocate()\n\nIn btrfs_relocate_block_group(), the rc is allocated.  Then\nbtrfs_relocate_block_group() calls\n\nrelocate_block_group()\n  prepare_to_relocate()\n    set_reloc_control()\n\nthat assigns rc to the variable fs_info-\u003ereloc_ctl. When\nprepare_to_relocate() returns, it calls\n\nbtrfs_commit_transaction()\n  btrfs_start_dirty_block_groups()\n    btrfs_alloc_path()\n      kmem_cache_zalloc()\n\nwhich may fail for example (or other errors could happen). When the\nfailure occurs, btrfs_relocate_block_group() detects the error and frees\nrc and doesn\u0027t set fs_info-\u003ereloc_ctl to NULL. After that, in\nbtrfs_init_reloc_root(), rc is retrieved from fs_info-\u003ereloc_ctl and\nthen used, which may cause a use-after-free bug.\n\nThis possible bug can be triggered by calling btrfs_ioctl_balance()\nbefore calling btrfs_ioctl_defrag().\n\nTo fix this possible bug, in prepare_to_relocate(), check if\nbtrfs_commit_transaction() fails. If the failure occurs,\nunset_reloc_control() is called to set fs_info-\u003ereloc_ctl to NULL.\n\nThe error log in our fault-injection testing is shown as follows:\n\n  [   58.751070] BUG: KASAN: use-after-free in btrfs_init_reloc_root+0x7ca/0x920 [btrfs]\n  ...\n  [   58.753577] Call Trace:\n  ...\n  [   58.755800]  kasan_report+0x45/0x60\n  [   58.756066]  btrfs_init_reloc_root+0x7ca/0x920 [btrfs]\n  [   58.757304]  record_root_in_trans+0x792/0xa10 [btrfs]\n  [   58.757748]  btrfs_record_root_in_trans+0x463/0x4f0 [btrfs]\n  [   58.758231]  start_transaction+0x896/0x2950 [btrfs]\n  [   58.758661]  btrfs_defrag_root+0x250/0xc00 [btrfs]\n  [   58.759083]  btrfs_ioctl_defrag+0x467/0xa00 [btrfs]\n  [   58.759513]  btrfs_ioctl+0x3c95/0x114e0 [btrfs]\n  ...\n  [   58.768510] Allocated by task 23683:\n  [   58.768777]  ____kasan_kmalloc+0xb5/0xf0\n  [   58.769069]  __kmalloc+0x227/0x3d0\n  [   58.769325]  alloc_reloc_control+0x10a/0x3d0 [btrfs]\n  [   58.769755]  btrfs_relocate_block_group+0x7aa/0x1e20 [btrfs]\n  [   58.770228]  btrfs_relocate_chunk+0xf1/0x760 [btrfs]\n  [   58.770655]  __btrfs_balance+0x1326/0x1f10 [btrfs]\n  [   58.771071]  btrfs_balance+0x3150/0x3d30 [btrfs]\n  [   58.771472]  btrfs_ioctl_balance+0xd84/0x1410 [btrfs]\n  [   58.771902]  btrfs_ioctl+0x4caa/0x114e0 [btrfs]\n  ...\n  [   58.773337] Freed by task 23683:\n  ...\n  [   58.774815]  kfree+0xda/0x2b0\n  [   58.775038]  free_reloc_control+0x1d6/0x220 [btrfs]\n  [   58.775465]  btrfs_relocate_block_group+0x115c/0x1e20 [btrfs]\n  [   58.775944]  btrfs_relocate_chunk+0xf1/0x760 [btrfs]\n  [   58.776369]  __btrfs_balance+0x1326/0x1f10 [btrfs]\n  [   58.776784]  btrfs_balance+0x3150/0x3d30 [btrfs]\n  [   58.777185]  btrfs_ioctl_balance+0xd84/0x1410 [btrfs]\n  [   58.777621]  btrfs_ioctl+0x4caa/0x114e0 [btrfs]\n  ...",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.170.2.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.170.2.s390x",
          "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.170.2.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.170.2.s390x",
          "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.170.2.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.170.2.s390x",
          "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.170.2.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.170.2.s390x",
          "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-64kb-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-64kb-devel-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-devel-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-devel-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-devel-5.14.21-150400.24.170.1.noarch",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-docs-5.14.21-150400.24.170.1.noarch",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-macros-5.14.21-150400.24.170.1.noarch",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-obs-build-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-obs-build-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-source-5.14.21-150400.24.170.1.noarch",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-syms-5.14.21-150400.24.170.1.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-syms-5.14.21-150400.24.170.1.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:reiserfs-kmp-default-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:reiserfs-kmp-default-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-64kb-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-64kb-devel-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-devel-5.14.21-150400.24.170.1.noarch",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-docs-5.14.21-150400.24.170.1.noarch",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-macros-5.14.21-150400.24.170.1.noarch",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-source-5.14.21-150400.24.170.1.noarch",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.170.1.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.170.1.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.170.2.ppc64le",
          "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.170.2.s390x",
          "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.170.2.ppc64le",
          "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.170.2.s390x",
          "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_170-default-1-150400.9.3.2.ppc64le",
          "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_170-default-1-150400.9.3.2.s390x",
          "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_170-default-1-150400.9.3.2.x86_64",
          "SUSE Linux Enterprise Micro 5.3:kernel-default-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise Micro 5.3:kernel-default-5.14.21-150400.24.170.2.s390x",
          "SUSE Linux Enterprise Micro 5.3:kernel-default-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise Micro 5.3:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.aarch64",
          "SUSE Linux Enterprise Micro 5.3:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
          "SUSE Linux Enterprise Micro 5.4:kernel-default-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise Micro 5.4:kernel-default-5.14.21-150400.24.170.2.s390x",
          "SUSE Linux Enterprise Micro 5.4:kernel-default-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise Micro 5.4:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.aarch64",
          "SUSE Linux Enterprise Micro 5.4:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-64kb-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-64kb-devel-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-5.14.21-150400.24.170.2.ppc64le",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-5.14.21-150400.24.170.2.s390x",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.aarch64",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.ppc64le",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.170.2.ppc64le",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.170.2.s390x",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-devel-5.14.21-150400.24.170.1.noarch",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-docs-5.14.21-150400.24.170.1.noarch",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-macros-5.14.21-150400.24.170.1.noarch",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.170.2.ppc64le",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.170.2.s390x",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-source-5.14.21-150400.24.170.1.noarch",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.170.1.aarch64",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.170.1.ppc64le",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.170.1.s390x",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.170.1.x86_64",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-zfcpdump-5.14.21-150400.24.170.2.s390x",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.170.2.ppc64le",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.170.2.s390x",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-5.14.21-150400.24.170.2.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-devel-5.14.21-150400.24.170.2.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-devel-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-devel-5.14.21-150400.24.170.1.noarch",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-docs-5.14.21-150400.24.170.1.noarch",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-macros-5.14.21-150400.24.170.1.noarch",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-obs-build-5.14.21-150400.24.170.2.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-obs-build-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-source-5.14.21-150400.24.170.1.noarch",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-syms-5.14.21-150400.24.170.1.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-syms-5.14.21-150400.24.170.1.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.170.2.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.170.2.x86_64",
          "SUSE Manager Proxy 4.3:kernel-default-5.14.21-150400.24.170.2.x86_64",
          "SUSE Manager Proxy 4.3:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
          "SUSE Manager Proxy 4.3:kernel-default-devel-5.14.21-150400.24.170.2.x86_64",
          "SUSE Manager Proxy 4.3:kernel-devel-5.14.21-150400.24.170.1.noarch",
          "SUSE Manager Proxy 4.3:kernel-macros-5.14.21-150400.24.170.1.noarch",
          "SUSE Manager Proxy 4.3:kernel-source-5.14.21-150400.24.170.1.noarch",
          "SUSE Manager Proxy 4.3:kernel-syms-5.14.21-150400.24.170.1.x86_64",
          "SUSE Manager Server 4.3:kernel-default-5.14.21-150400.24.170.2.ppc64le",
          "SUSE Manager Server 4.3:kernel-default-5.14.21-150400.24.170.2.s390x",
          "SUSE Manager Server 4.3:kernel-default-5.14.21-150400.24.170.2.x86_64",
          "SUSE Manager Server 4.3:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.ppc64le",
          "SUSE Manager Server 4.3:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
          "SUSE Manager Server 4.3:kernel-default-devel-5.14.21-150400.24.170.2.ppc64le",
          "SUSE Manager Server 4.3:kernel-default-devel-5.14.21-150400.24.170.2.s390x",
          "SUSE Manager Server 4.3:kernel-default-devel-5.14.21-150400.24.170.2.x86_64",
          "SUSE Manager Server 4.3:kernel-devel-5.14.21-150400.24.170.1.noarch",
          "SUSE Manager Server 4.3:kernel-macros-5.14.21-150400.24.170.1.noarch",
          "SUSE Manager Server 4.3:kernel-source-5.14.21-150400.24.170.1.noarch",
          "SUSE Manager Server 4.3:kernel-syms-5.14.21-150400.24.170.1.ppc64le",
          "SUSE Manager Server 4.3:kernel-syms-5.14.21-150400.24.170.1.s390x",
          "SUSE Manager Server 4.3:kernel-syms-5.14.21-150400.24.170.1.x86_64",
          "SUSE Manager Server 4.3:kernel-zfcpdump-5.14.21-150400.24.170.2.s390x"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2022-50067",
          "url": "https://www.suse.com/security/cve/CVE-2022-50067"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1245047 for CVE-2022-50067",
          "url": "https://bugzilla.suse.com/1245047"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-64kb-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-64kb-devel-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-devel-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-devel-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-devel-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-docs-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-macros-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-obs-build-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-obs-build-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-source-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-syms-5.14.21-150400.24.170.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-syms-5.14.21-150400.24.170.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:reiserfs-kmp-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:reiserfs-kmp-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-64kb-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-64kb-devel-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-devel-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-docs-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-macros-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-source-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.170.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.170.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_170-default-1-150400.9.3.2.ppc64le",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_170-default-1-150400.9.3.2.s390x",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_170-default-1-150400.9.3.2.x86_64",
            "SUSE Linux Enterprise Micro 5.3:kernel-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise Micro 5.3:kernel-default-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise Micro 5.3:kernel-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Micro 5.3:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.aarch64",
            "SUSE Linux Enterprise Micro 5.3:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
            "SUSE Linux Enterprise Micro 5.4:kernel-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise Micro 5.4:kernel-default-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise Micro 5.4:kernel-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Micro 5.4:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.aarch64",
            "SUSE Linux Enterprise Micro 5.4:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-64kb-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-64kb-devel-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.aarch64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.ppc64le",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-devel-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-docs-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-macros-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-source-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.170.1.aarch64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.170.1.ppc64le",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.170.1.s390x",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.170.1.x86_64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-zfcpdump-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-devel-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-devel-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-devel-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-docs-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-macros-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-obs-build-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-obs-build-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-source-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-syms-5.14.21-150400.24.170.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-syms-5.14.21-150400.24.170.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Manager Proxy 4.3:kernel-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Manager Proxy 4.3:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
            "SUSE Manager Proxy 4.3:kernel-default-devel-5.14.21-150400.24.170.2.x86_64",
            "SUSE Manager Proxy 4.3:kernel-devel-5.14.21-150400.24.170.1.noarch",
            "SUSE Manager Proxy 4.3:kernel-macros-5.14.21-150400.24.170.1.noarch",
            "SUSE Manager Proxy 4.3:kernel-source-5.14.21-150400.24.170.1.noarch",
            "SUSE Manager Proxy 4.3:kernel-syms-5.14.21-150400.24.170.1.x86_64",
            "SUSE Manager Server 4.3:kernel-default-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Manager Server 4.3:kernel-default-5.14.21-150400.24.170.2.s390x",
            "SUSE Manager Server 4.3:kernel-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Manager Server 4.3:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.ppc64le",
            "SUSE Manager Server 4.3:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
            "SUSE Manager Server 4.3:kernel-default-devel-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Manager Server 4.3:kernel-default-devel-5.14.21-150400.24.170.2.s390x",
            "SUSE Manager Server 4.3:kernel-default-devel-5.14.21-150400.24.170.2.x86_64",
            "SUSE Manager Server 4.3:kernel-devel-5.14.21-150400.24.170.1.noarch",
            "SUSE Manager Server 4.3:kernel-macros-5.14.21-150400.24.170.1.noarch",
            "SUSE Manager Server 4.3:kernel-source-5.14.21-150400.24.170.1.noarch",
            "SUSE Manager Server 4.3:kernel-syms-5.14.21-150400.24.170.1.ppc64le",
            "SUSE Manager Server 4.3:kernel-syms-5.14.21-150400.24.170.1.s390x",
            "SUSE Manager Server 4.3:kernel-syms-5.14.21-150400.24.170.1.x86_64",
            "SUSE Manager Server 4.3:kernel-zfcpdump-5.14.21-150400.24.170.2.s390x"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 5.5,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
            "version": "3.1"
          },
          "products": [
            "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-64kb-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-64kb-devel-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-devel-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-devel-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-devel-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-docs-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-macros-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-obs-build-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-obs-build-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-source-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-syms-5.14.21-150400.24.170.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-syms-5.14.21-150400.24.170.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:reiserfs-kmp-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:reiserfs-kmp-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-64kb-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-64kb-devel-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-devel-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-docs-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-macros-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-source-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.170.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.170.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_170-default-1-150400.9.3.2.ppc64le",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_170-default-1-150400.9.3.2.s390x",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_170-default-1-150400.9.3.2.x86_64",
            "SUSE Linux Enterprise Micro 5.3:kernel-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise Micro 5.3:kernel-default-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise Micro 5.3:kernel-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Micro 5.3:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.aarch64",
            "SUSE Linux Enterprise Micro 5.3:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
            "SUSE Linux Enterprise Micro 5.4:kernel-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise Micro 5.4:kernel-default-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise Micro 5.4:kernel-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Micro 5.4:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.aarch64",
            "SUSE Linux Enterprise Micro 5.4:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-64kb-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-64kb-devel-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.aarch64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.ppc64le",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-devel-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-docs-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-macros-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-source-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.170.1.aarch64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.170.1.ppc64le",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.170.1.s390x",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.170.1.x86_64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-zfcpdump-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-devel-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-devel-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-devel-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-docs-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-macros-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-obs-build-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-obs-build-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-source-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-syms-5.14.21-150400.24.170.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-syms-5.14.21-150400.24.170.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Manager Proxy 4.3:kernel-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Manager Proxy 4.3:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
            "SUSE Manager Proxy 4.3:kernel-default-devel-5.14.21-150400.24.170.2.x86_64",
            "SUSE Manager Proxy 4.3:kernel-devel-5.14.21-150400.24.170.1.noarch",
            "SUSE Manager Proxy 4.3:kernel-macros-5.14.21-150400.24.170.1.noarch",
            "SUSE Manager Proxy 4.3:kernel-source-5.14.21-150400.24.170.1.noarch",
            "SUSE Manager Proxy 4.3:kernel-syms-5.14.21-150400.24.170.1.x86_64",
            "SUSE Manager Server 4.3:kernel-default-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Manager Server 4.3:kernel-default-5.14.21-150400.24.170.2.s390x",
            "SUSE Manager Server 4.3:kernel-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Manager Server 4.3:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.ppc64le",
            "SUSE Manager Server 4.3:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
            "SUSE Manager Server 4.3:kernel-default-devel-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Manager Server 4.3:kernel-default-devel-5.14.21-150400.24.170.2.s390x",
            "SUSE Manager Server 4.3:kernel-default-devel-5.14.21-150400.24.170.2.x86_64",
            "SUSE Manager Server 4.3:kernel-devel-5.14.21-150400.24.170.1.noarch",
            "SUSE Manager Server 4.3:kernel-macros-5.14.21-150400.24.170.1.noarch",
            "SUSE Manager Server 4.3:kernel-source-5.14.21-150400.24.170.1.noarch",
            "SUSE Manager Server 4.3:kernel-syms-5.14.21-150400.24.170.1.ppc64le",
            "SUSE Manager Server 4.3:kernel-syms-5.14.21-150400.24.170.1.s390x",
            "SUSE Manager Server 4.3:kernel-syms-5.14.21-150400.24.170.1.x86_64",
            "SUSE Manager Server 4.3:kernel-zfcpdump-5.14.21-150400.24.170.2.s390x"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2025-07-28T15:09:33Z",
          "details": "moderate"
        }
      ],
      "title": "CVE-2022-50067"
    },
    {
      "cve": "CVE-2022-50068",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2022-50068"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "In the Linux kernel, the following vulnerability has been resolved:\n\ndrm/ttm: Fix dummy res NULL ptr deref bug\n\nCheck the bo-\u003eresource value before accessing the resource\nmem_type.\n\nv2: Fix commit description unwrapped warning\n\n\u003clog snip\u003e\n[   40.191227][  T184] general protection fault, probably for non-canonical address 0xdffffc0000000002: 0000 [#1] SMP KASAN PTI\n[   40.192995][  T184] KASAN: null-ptr-deref in range [0x0000000000000010-0x0000000000000017]\n[   40.194411][  T184] CPU: 1 PID: 184 Comm: systemd-udevd Not tainted 5.19.0-rc4-00721-gb297c22b7070 #1\n[   40.196063][  T184] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.16.0-debian-1.16.0-4 04/01/2014\n[   40.199605][  T184] RIP: 0010:ttm_bo_validate+0x1b3/0x240 [ttm]\n[   40.200754][  T184] Code: e8 72 c5 ff ff 83 f8 b8 74 d4 85 c0 75 54 49 8b 9e 58 01 00 00 48 b8 00 00 00 00 00 fc ff df 48 8d 7b 10 48 89 fa 48 c1 ea 03 \u003c0f\u003e b6 04 02 84 c0 74 04 3c 03 7e 44 8b 53 10 31 c0 85 d2 0f 85 58\n[   40.203685][  T184] RSP: 0018:ffffc900006df0c8 EFLAGS: 00010202\n[   40.204630][  T184] RAX: dffffc0000000000 RBX: 0000000000000000 RCX: 1ffff1102f4bb71b\n[   40.205864][  T184] RDX: 0000000000000002 RSI: ffffc900006df208 RDI: 0000000000000010\n[   40.207102][  T184] RBP: 1ffff920000dbe1a R08: ffffc900006df208 R09: 0000000000000000\n[   40.208394][  T184] R10: ffff88817a5f0000 R11: 0000000000000001 R12: ffffc900006df110\n[   40.209692][  T184] R13: ffffc900006df0f0 R14: ffff88817a5db800 R15: ffffc900006df208\n[   40.210862][  T184] FS:  00007f6b1d16e8c0(0000) GS:ffff88839d700000(0000) knlGS:0000000000000000\n[   40.212250][  T184] CS:  0010 DS: 0000 ES: 0000 CR0: 0000000080050033\n[   40.213275][  T184] CR2: 000055a1001d4ff0 CR3: 00000001700f4000 CR4: 00000000000006e0\n[   40.214469][  T184] Call Trace:\n[   40.214974][  T184]  \u003cTASK\u003e\n[   40.215438][  T184]  ? ttm_bo_bounce_temp_buffer+0x140/0x140 [ttm]\n[   40.216572][  T184]  ? mutex_spin_on_owner+0x240/0x240\n[   40.217456][  T184]  ? drm_vma_offset_add+0xaa/0x100 [drm]\n[   40.218457][  T184]  ttm_bo_init_reserved+0x3d6/0x540 [ttm]\n[   40.219410][  T184]  ? shmem_get_inode+0x744/0x980\n[   40.220231][  T184]  ttm_bo_init_validate+0xb1/0x200 [ttm]\n[   40.221172][  T184]  ? bo_driver_evict_flags+0x340/0x340 [drm_vram_helper]\n[   40.222530][  T184]  ? ttm_bo_init_reserved+0x540/0x540 [ttm]\n[   40.223643][  T184]  ? __do_sys_finit_module+0x11a/0x1c0\n[   40.224654][  T184]  ? __shmem_file_setup+0x102/0x280\n[   40.234764][  T184]  drm_gem_vram_create+0x305/0x480 [drm_vram_helper]\n[   40.235766][  T184]  ? bo_driver_evict_flags+0x340/0x340 [drm_vram_helper]\n[   40.236846][  T184]  ? __kasan_slab_free+0x108/0x180\n[   40.237650][  T184]  drm_gem_vram_fill_create_dumb+0x134/0x340 [drm_vram_helper]\n[   40.238864][  T184]  ? local_pci_probe+0xdf/0x180\n[   40.239674][  T184]  ? drmm_vram_helper_init+0x400/0x400 [drm_vram_helper]\n[   40.240826][  T184]  drm_client_framebuffer_create+0x19c/0x400 [drm]\n[   40.241955][  T184]  ? drm_client_buffer_delete+0x200/0x200 [drm]\n[   40.243001][  T184]  ? drm_client_pick_crtcs+0x554/0xb80 [drm]\n[   40.244030][  T184]  drm_fb_helper_generic_probe+0x23f/0x940 [drm_kms_helper]\n[   40.245226][  T184]  ? __cond_resched+0x1c/0xc0\n[   40.245987][  T184]  ? drm_fb_helper_memory_range_to_clip+0x180/0x180 [drm_kms_helper]\n[   40.247316][  T184]  ? mutex_unlock+0x80/0x100\n[   40.248005][  T184]  ? __mutex_unlock_slowpath+0x2c0/0x2c0\n[   40.249083][  T184]  drm_fb_helper_single_fb_probe+0x907/0xf00 [drm_kms_helper]\n[   40.250314][  T184]  ? drm_fb_helper_check_var+0x1180/0x1180 [drm_kms_helper]\n[   40.251540][  T184]  ? __cond_resched+0x1c/0xc0\n[   40.252321][  T184]  ? mutex_lock+0x9f/0x100\n[   40.253062][  T184]  __drm_fb_helper_initial_config_and_unlock+0xb9/0x2c0 [drm_kms_helper]\n[   40.254394][  T184]  drm_fbdev_client_hotplug+0x56f/0x840 [drm_kms_helper]\n[   40.255477][  T184]  drm_fbdev_generic_setup+0x165/0x3c0 [drm_kms_helper]\n[   40.256607][  T184]  bochs_pci_probe+0x6b7/0x900 [bochs]\n[   \n---truncated---",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.170.2.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.170.2.s390x",
          "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.170.2.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.170.2.s390x",
          "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.170.2.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.170.2.s390x",
          "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.170.2.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.170.2.s390x",
          "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-64kb-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-64kb-devel-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-devel-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-devel-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-devel-5.14.21-150400.24.170.1.noarch",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-docs-5.14.21-150400.24.170.1.noarch",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-macros-5.14.21-150400.24.170.1.noarch",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-obs-build-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-obs-build-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-source-5.14.21-150400.24.170.1.noarch",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-syms-5.14.21-150400.24.170.1.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-syms-5.14.21-150400.24.170.1.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:reiserfs-kmp-default-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:reiserfs-kmp-default-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-64kb-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-64kb-devel-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-devel-5.14.21-150400.24.170.1.noarch",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-docs-5.14.21-150400.24.170.1.noarch",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-macros-5.14.21-150400.24.170.1.noarch",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-source-5.14.21-150400.24.170.1.noarch",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.170.1.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.170.1.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.170.2.ppc64le",
          "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.170.2.s390x",
          "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.170.2.ppc64le",
          "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.170.2.s390x",
          "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_170-default-1-150400.9.3.2.ppc64le",
          "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_170-default-1-150400.9.3.2.s390x",
          "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_170-default-1-150400.9.3.2.x86_64",
          "SUSE Linux Enterprise Micro 5.3:kernel-default-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise Micro 5.3:kernel-default-5.14.21-150400.24.170.2.s390x",
          "SUSE Linux Enterprise Micro 5.3:kernel-default-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise Micro 5.3:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.aarch64",
          "SUSE Linux Enterprise Micro 5.3:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
          "SUSE Linux Enterprise Micro 5.4:kernel-default-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise Micro 5.4:kernel-default-5.14.21-150400.24.170.2.s390x",
          "SUSE Linux Enterprise Micro 5.4:kernel-default-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise Micro 5.4:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.aarch64",
          "SUSE Linux Enterprise Micro 5.4:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-64kb-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-64kb-devel-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-5.14.21-150400.24.170.2.ppc64le",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-5.14.21-150400.24.170.2.s390x",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.aarch64",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.ppc64le",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.170.2.ppc64le",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.170.2.s390x",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-devel-5.14.21-150400.24.170.1.noarch",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-docs-5.14.21-150400.24.170.1.noarch",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-macros-5.14.21-150400.24.170.1.noarch",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.170.2.ppc64le",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.170.2.s390x",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-source-5.14.21-150400.24.170.1.noarch",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.170.1.aarch64",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.170.1.ppc64le",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.170.1.s390x",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.170.1.x86_64",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-zfcpdump-5.14.21-150400.24.170.2.s390x",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.170.2.ppc64le",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.170.2.s390x",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-5.14.21-150400.24.170.2.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-devel-5.14.21-150400.24.170.2.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-devel-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-devel-5.14.21-150400.24.170.1.noarch",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-docs-5.14.21-150400.24.170.1.noarch",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-macros-5.14.21-150400.24.170.1.noarch",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-obs-build-5.14.21-150400.24.170.2.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-obs-build-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-source-5.14.21-150400.24.170.1.noarch",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-syms-5.14.21-150400.24.170.1.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-syms-5.14.21-150400.24.170.1.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.170.2.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.170.2.x86_64",
          "SUSE Manager Proxy 4.3:kernel-default-5.14.21-150400.24.170.2.x86_64",
          "SUSE Manager Proxy 4.3:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
          "SUSE Manager Proxy 4.3:kernel-default-devel-5.14.21-150400.24.170.2.x86_64",
          "SUSE Manager Proxy 4.3:kernel-devel-5.14.21-150400.24.170.1.noarch",
          "SUSE Manager Proxy 4.3:kernel-macros-5.14.21-150400.24.170.1.noarch",
          "SUSE Manager Proxy 4.3:kernel-source-5.14.21-150400.24.170.1.noarch",
          "SUSE Manager Proxy 4.3:kernel-syms-5.14.21-150400.24.170.1.x86_64",
          "SUSE Manager Server 4.3:kernel-default-5.14.21-150400.24.170.2.ppc64le",
          "SUSE Manager Server 4.3:kernel-default-5.14.21-150400.24.170.2.s390x",
          "SUSE Manager Server 4.3:kernel-default-5.14.21-150400.24.170.2.x86_64",
          "SUSE Manager Server 4.3:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.ppc64le",
          "SUSE Manager Server 4.3:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
          "SUSE Manager Server 4.3:kernel-default-devel-5.14.21-150400.24.170.2.ppc64le",
          "SUSE Manager Server 4.3:kernel-default-devel-5.14.21-150400.24.170.2.s390x",
          "SUSE Manager Server 4.3:kernel-default-devel-5.14.21-150400.24.170.2.x86_64",
          "SUSE Manager Server 4.3:kernel-devel-5.14.21-150400.24.170.1.noarch",
          "SUSE Manager Server 4.3:kernel-macros-5.14.21-150400.24.170.1.noarch",
          "SUSE Manager Server 4.3:kernel-source-5.14.21-150400.24.170.1.noarch",
          "SUSE Manager Server 4.3:kernel-syms-5.14.21-150400.24.170.1.ppc64le",
          "SUSE Manager Server 4.3:kernel-syms-5.14.21-150400.24.170.1.s390x",
          "SUSE Manager Server 4.3:kernel-syms-5.14.21-150400.24.170.1.x86_64",
          "SUSE Manager Server 4.3:kernel-zfcpdump-5.14.21-150400.24.170.2.s390x"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2022-50068",
          "url": "https://www.suse.com/security/cve/CVE-2022-50068"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1245142 for CVE-2022-50068",
          "url": "https://bugzilla.suse.com/1245142"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-64kb-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-64kb-devel-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-devel-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-devel-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-devel-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-docs-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-macros-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-obs-build-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-obs-build-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-source-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-syms-5.14.21-150400.24.170.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-syms-5.14.21-150400.24.170.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:reiserfs-kmp-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:reiserfs-kmp-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-64kb-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-64kb-devel-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-devel-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-docs-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-macros-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-source-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.170.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.170.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_170-default-1-150400.9.3.2.ppc64le",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_170-default-1-150400.9.3.2.s390x",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_170-default-1-150400.9.3.2.x86_64",
            "SUSE Linux Enterprise Micro 5.3:kernel-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise Micro 5.3:kernel-default-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise Micro 5.3:kernel-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Micro 5.3:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.aarch64",
            "SUSE Linux Enterprise Micro 5.3:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
            "SUSE Linux Enterprise Micro 5.4:kernel-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise Micro 5.4:kernel-default-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise Micro 5.4:kernel-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Micro 5.4:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.aarch64",
            "SUSE Linux Enterprise Micro 5.4:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-64kb-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-64kb-devel-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.aarch64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.ppc64le",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-devel-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-docs-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-macros-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-source-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.170.1.aarch64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.170.1.ppc64le",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.170.1.s390x",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.170.1.x86_64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-zfcpdump-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-devel-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-devel-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-devel-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-docs-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-macros-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-obs-build-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-obs-build-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-source-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-syms-5.14.21-150400.24.170.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-syms-5.14.21-150400.24.170.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Manager Proxy 4.3:kernel-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Manager Proxy 4.3:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
            "SUSE Manager Proxy 4.3:kernel-default-devel-5.14.21-150400.24.170.2.x86_64",
            "SUSE Manager Proxy 4.3:kernel-devel-5.14.21-150400.24.170.1.noarch",
            "SUSE Manager Proxy 4.3:kernel-macros-5.14.21-150400.24.170.1.noarch",
            "SUSE Manager Proxy 4.3:kernel-source-5.14.21-150400.24.170.1.noarch",
            "SUSE Manager Proxy 4.3:kernel-syms-5.14.21-150400.24.170.1.x86_64",
            "SUSE Manager Server 4.3:kernel-default-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Manager Server 4.3:kernel-default-5.14.21-150400.24.170.2.s390x",
            "SUSE Manager Server 4.3:kernel-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Manager Server 4.3:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.ppc64le",
            "SUSE Manager Server 4.3:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
            "SUSE Manager Server 4.3:kernel-default-devel-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Manager Server 4.3:kernel-default-devel-5.14.21-150400.24.170.2.s390x",
            "SUSE Manager Server 4.3:kernel-default-devel-5.14.21-150400.24.170.2.x86_64",
            "SUSE Manager Server 4.3:kernel-devel-5.14.21-150400.24.170.1.noarch",
            "SUSE Manager Server 4.3:kernel-macros-5.14.21-150400.24.170.1.noarch",
            "SUSE Manager Server 4.3:kernel-source-5.14.21-150400.24.170.1.noarch",
            "SUSE Manager Server 4.3:kernel-syms-5.14.21-150400.24.170.1.ppc64le",
            "SUSE Manager Server 4.3:kernel-syms-5.14.21-150400.24.170.1.s390x",
            "SUSE Manager Server 4.3:kernel-syms-5.14.21-150400.24.170.1.x86_64",
            "SUSE Manager Server 4.3:kernel-zfcpdump-5.14.21-150400.24.170.2.s390x"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 5.5,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
            "version": "3.1"
          },
          "products": [
            "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-64kb-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-64kb-devel-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-devel-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-devel-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-devel-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-docs-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-macros-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-obs-build-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-obs-build-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-source-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-syms-5.14.21-150400.24.170.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-syms-5.14.21-150400.24.170.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:reiserfs-kmp-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:reiserfs-kmp-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-64kb-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-64kb-devel-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-devel-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-docs-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-macros-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-source-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.170.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.170.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_170-default-1-150400.9.3.2.ppc64le",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_170-default-1-150400.9.3.2.s390x",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_170-default-1-150400.9.3.2.x86_64",
            "SUSE Linux Enterprise Micro 5.3:kernel-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise Micro 5.3:kernel-default-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise Micro 5.3:kernel-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Micro 5.3:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.aarch64",
            "SUSE Linux Enterprise Micro 5.3:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
            "SUSE Linux Enterprise Micro 5.4:kernel-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise Micro 5.4:kernel-default-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise Micro 5.4:kernel-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Micro 5.4:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.aarch64",
            "SUSE Linux Enterprise Micro 5.4:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-64kb-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-64kb-devel-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.aarch64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.ppc64le",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-devel-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-docs-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-macros-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-source-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.170.1.aarch64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.170.1.ppc64le",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.170.1.s390x",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.170.1.x86_64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-zfcpdump-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-devel-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-devel-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-devel-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-docs-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-macros-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-obs-build-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-obs-build-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-source-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-syms-5.14.21-150400.24.170.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-syms-5.14.21-150400.24.170.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Manager Proxy 4.3:kernel-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Manager Proxy 4.3:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
            "SUSE Manager Proxy 4.3:kernel-default-devel-5.14.21-150400.24.170.2.x86_64",
            "SUSE Manager Proxy 4.3:kernel-devel-5.14.21-150400.24.170.1.noarch",
            "SUSE Manager Proxy 4.3:kernel-macros-5.14.21-150400.24.170.1.noarch",
            "SUSE Manager Proxy 4.3:kernel-source-5.14.21-150400.24.170.1.noarch",
            "SUSE Manager Proxy 4.3:kernel-syms-5.14.21-150400.24.170.1.x86_64",
            "SUSE Manager Server 4.3:kernel-default-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Manager Server 4.3:kernel-default-5.14.21-150400.24.170.2.s390x",
            "SUSE Manager Server 4.3:kernel-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Manager Server 4.3:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.ppc64le",
            "SUSE Manager Server 4.3:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
            "SUSE Manager Server 4.3:kernel-default-devel-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Manager Server 4.3:kernel-default-devel-5.14.21-150400.24.170.2.s390x",
            "SUSE Manager Server 4.3:kernel-default-devel-5.14.21-150400.24.170.2.x86_64",
            "SUSE Manager Server 4.3:kernel-devel-5.14.21-150400.24.170.1.noarch",
            "SUSE Manager Server 4.3:kernel-macros-5.14.21-150400.24.170.1.noarch",
            "SUSE Manager Server 4.3:kernel-source-5.14.21-150400.24.170.1.noarch",
            "SUSE Manager Server 4.3:kernel-syms-5.14.21-150400.24.170.1.ppc64le",
            "SUSE Manager Server 4.3:kernel-syms-5.14.21-150400.24.170.1.s390x",
            "SUSE Manager Server 4.3:kernel-syms-5.14.21-150400.24.170.1.x86_64",
            "SUSE Manager Server 4.3:kernel-zfcpdump-5.14.21-150400.24.170.2.s390x"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2025-07-28T15:09:33Z",
          "details": "moderate"
        }
      ],
      "title": "CVE-2022-50068"
    },
    {
      "cve": "CVE-2022-50072",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2022-50072"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "In the Linux kernel, the following vulnerability has been resolved:\n\nNFSv4/pnfs: Fix a use-after-free bug in open\n\nIf someone cancels the open RPC call, then we must not try to free\neither the open slot or the layoutget operation arguments, since they\nare likely still in use by the hung RPC call.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.170.2.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.170.2.s390x",
          "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.170.2.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.170.2.s390x",
          "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.170.2.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.170.2.s390x",
          "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.170.2.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.170.2.s390x",
          "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-64kb-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-64kb-devel-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-devel-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-devel-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-devel-5.14.21-150400.24.170.1.noarch",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-docs-5.14.21-150400.24.170.1.noarch",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-macros-5.14.21-150400.24.170.1.noarch",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-obs-build-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-obs-build-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-source-5.14.21-150400.24.170.1.noarch",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-syms-5.14.21-150400.24.170.1.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-syms-5.14.21-150400.24.170.1.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:reiserfs-kmp-default-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:reiserfs-kmp-default-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-64kb-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-64kb-devel-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-devel-5.14.21-150400.24.170.1.noarch",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-docs-5.14.21-150400.24.170.1.noarch",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-macros-5.14.21-150400.24.170.1.noarch",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-source-5.14.21-150400.24.170.1.noarch",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.170.1.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.170.1.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.170.2.ppc64le",
          "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.170.2.s390x",
          "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.170.2.ppc64le",
          "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.170.2.s390x",
          "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_170-default-1-150400.9.3.2.ppc64le",
          "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_170-default-1-150400.9.3.2.s390x",
          "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_170-default-1-150400.9.3.2.x86_64",
          "SUSE Linux Enterprise Micro 5.3:kernel-default-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise Micro 5.3:kernel-default-5.14.21-150400.24.170.2.s390x",
          "SUSE Linux Enterprise Micro 5.3:kernel-default-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise Micro 5.3:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.aarch64",
          "SUSE Linux Enterprise Micro 5.3:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
          "SUSE Linux Enterprise Micro 5.4:kernel-default-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise Micro 5.4:kernel-default-5.14.21-150400.24.170.2.s390x",
          "SUSE Linux Enterprise Micro 5.4:kernel-default-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise Micro 5.4:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.aarch64",
          "SUSE Linux Enterprise Micro 5.4:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-64kb-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-64kb-devel-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-5.14.21-150400.24.170.2.ppc64le",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-5.14.21-150400.24.170.2.s390x",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.aarch64",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.ppc64le",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.170.2.ppc64le",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.170.2.s390x",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-devel-5.14.21-150400.24.170.1.noarch",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-docs-5.14.21-150400.24.170.1.noarch",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-macros-5.14.21-150400.24.170.1.noarch",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.170.2.ppc64le",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.170.2.s390x",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-source-5.14.21-150400.24.170.1.noarch",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.170.1.aarch64",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.170.1.ppc64le",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.170.1.s390x",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.170.1.x86_64",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-zfcpdump-5.14.21-150400.24.170.2.s390x",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.170.2.ppc64le",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.170.2.s390x",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-5.14.21-150400.24.170.2.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-devel-5.14.21-150400.24.170.2.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-devel-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-devel-5.14.21-150400.24.170.1.noarch",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-docs-5.14.21-150400.24.170.1.noarch",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-macros-5.14.21-150400.24.170.1.noarch",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-obs-build-5.14.21-150400.24.170.2.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-obs-build-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-source-5.14.21-150400.24.170.1.noarch",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-syms-5.14.21-150400.24.170.1.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-syms-5.14.21-150400.24.170.1.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.170.2.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.170.2.x86_64",
          "SUSE Manager Proxy 4.3:kernel-default-5.14.21-150400.24.170.2.x86_64",
          "SUSE Manager Proxy 4.3:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
          "SUSE Manager Proxy 4.3:kernel-default-devel-5.14.21-150400.24.170.2.x86_64",
          "SUSE Manager Proxy 4.3:kernel-devel-5.14.21-150400.24.170.1.noarch",
          "SUSE Manager Proxy 4.3:kernel-macros-5.14.21-150400.24.170.1.noarch",
          "SUSE Manager Proxy 4.3:kernel-source-5.14.21-150400.24.170.1.noarch",
          "SUSE Manager Proxy 4.3:kernel-syms-5.14.21-150400.24.170.1.x86_64",
          "SUSE Manager Server 4.3:kernel-default-5.14.21-150400.24.170.2.ppc64le",
          "SUSE Manager Server 4.3:kernel-default-5.14.21-150400.24.170.2.s390x",
          "SUSE Manager Server 4.3:kernel-default-5.14.21-150400.24.170.2.x86_64",
          "SUSE Manager Server 4.3:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.ppc64le",
          "SUSE Manager Server 4.3:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
          "SUSE Manager Server 4.3:kernel-default-devel-5.14.21-150400.24.170.2.ppc64le",
          "SUSE Manager Server 4.3:kernel-default-devel-5.14.21-150400.24.170.2.s390x",
          "SUSE Manager Server 4.3:kernel-default-devel-5.14.21-150400.24.170.2.x86_64",
          "SUSE Manager Server 4.3:kernel-devel-5.14.21-150400.24.170.1.noarch",
          "SUSE Manager Server 4.3:kernel-macros-5.14.21-150400.24.170.1.noarch",
          "SUSE Manager Server 4.3:kernel-source-5.14.21-150400.24.170.1.noarch",
          "SUSE Manager Server 4.3:kernel-syms-5.14.21-150400.24.170.1.ppc64le",
          "SUSE Manager Server 4.3:kernel-syms-5.14.21-150400.24.170.1.s390x",
          "SUSE Manager Server 4.3:kernel-syms-5.14.21-150400.24.170.1.x86_64",
          "SUSE Manager Server 4.3:kernel-zfcpdump-5.14.21-150400.24.170.2.s390x"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2022-50072",
          "url": "https://www.suse.com/security/cve/CVE-2022-50072"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1244979 for CVE-2022-50072",
          "url": "https://bugzilla.suse.com/1244979"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-64kb-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-64kb-devel-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-devel-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-devel-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-devel-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-docs-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-macros-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-obs-build-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-obs-build-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-source-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-syms-5.14.21-150400.24.170.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-syms-5.14.21-150400.24.170.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:reiserfs-kmp-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:reiserfs-kmp-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-64kb-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-64kb-devel-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-devel-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-docs-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-macros-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-source-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.170.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.170.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_170-default-1-150400.9.3.2.ppc64le",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_170-default-1-150400.9.3.2.s390x",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_170-default-1-150400.9.3.2.x86_64",
            "SUSE Linux Enterprise Micro 5.3:kernel-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise Micro 5.3:kernel-default-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise Micro 5.3:kernel-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Micro 5.3:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.aarch64",
            "SUSE Linux Enterprise Micro 5.3:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
            "SUSE Linux Enterprise Micro 5.4:kernel-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise Micro 5.4:kernel-default-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise Micro 5.4:kernel-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Micro 5.4:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.aarch64",
            "SUSE Linux Enterprise Micro 5.4:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-64kb-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-64kb-devel-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.aarch64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.ppc64le",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-devel-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-docs-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-macros-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-source-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.170.1.aarch64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.170.1.ppc64le",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.170.1.s390x",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.170.1.x86_64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-zfcpdump-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-devel-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-devel-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-devel-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-docs-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-macros-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-obs-build-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-obs-build-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-source-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-syms-5.14.21-150400.24.170.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-syms-5.14.21-150400.24.170.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Manager Proxy 4.3:kernel-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Manager Proxy 4.3:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
            "SUSE Manager Proxy 4.3:kernel-default-devel-5.14.21-150400.24.170.2.x86_64",
            "SUSE Manager Proxy 4.3:kernel-devel-5.14.21-150400.24.170.1.noarch",
            "SUSE Manager Proxy 4.3:kernel-macros-5.14.21-150400.24.170.1.noarch",
            "SUSE Manager Proxy 4.3:kernel-source-5.14.21-150400.24.170.1.noarch",
            "SUSE Manager Proxy 4.3:kernel-syms-5.14.21-150400.24.170.1.x86_64",
            "SUSE Manager Server 4.3:kernel-default-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Manager Server 4.3:kernel-default-5.14.21-150400.24.170.2.s390x",
            "SUSE Manager Server 4.3:kernel-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Manager Server 4.3:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.ppc64le",
            "SUSE Manager Server 4.3:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
            "SUSE Manager Server 4.3:kernel-default-devel-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Manager Server 4.3:kernel-default-devel-5.14.21-150400.24.170.2.s390x",
            "SUSE Manager Server 4.3:kernel-default-devel-5.14.21-150400.24.170.2.x86_64",
            "SUSE Manager Server 4.3:kernel-devel-5.14.21-150400.24.170.1.noarch",
            "SUSE Manager Server 4.3:kernel-macros-5.14.21-150400.24.170.1.noarch",
            "SUSE Manager Server 4.3:kernel-source-5.14.21-150400.24.170.1.noarch",
            "SUSE Manager Server 4.3:kernel-syms-5.14.21-150400.24.170.1.ppc64le",
            "SUSE Manager Server 4.3:kernel-syms-5.14.21-150400.24.170.1.s390x",
            "SUSE Manager Server 4.3:kernel-syms-5.14.21-150400.24.170.1.x86_64",
            "SUSE Manager Server 4.3:kernel-zfcpdump-5.14.21-150400.24.170.2.s390x"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 5.5,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
            "version": "3.1"
          },
          "products": [
            "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-64kb-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-64kb-devel-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-devel-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-devel-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-devel-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-docs-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-macros-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-obs-build-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-obs-build-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-source-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-syms-5.14.21-150400.24.170.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-syms-5.14.21-150400.24.170.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:reiserfs-kmp-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:reiserfs-kmp-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-64kb-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-64kb-devel-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-devel-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-docs-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-macros-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-source-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.170.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.170.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_170-default-1-150400.9.3.2.ppc64le",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_170-default-1-150400.9.3.2.s390x",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_170-default-1-150400.9.3.2.x86_64",
            "SUSE Linux Enterprise Micro 5.3:kernel-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise Micro 5.3:kernel-default-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise Micro 5.3:kernel-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Micro 5.3:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.aarch64",
            "SUSE Linux Enterprise Micro 5.3:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
            "SUSE Linux Enterprise Micro 5.4:kernel-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise Micro 5.4:kernel-default-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise Micro 5.4:kernel-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Micro 5.4:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.aarch64",
            "SUSE Linux Enterprise Micro 5.4:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-64kb-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-64kb-devel-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.aarch64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.ppc64le",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-devel-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-docs-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-macros-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-source-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.170.1.aarch64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.170.1.ppc64le",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.170.1.s390x",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.170.1.x86_64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-zfcpdump-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-devel-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-devel-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-devel-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-docs-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-macros-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-obs-build-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-obs-build-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-source-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-syms-5.14.21-150400.24.170.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-syms-5.14.21-150400.24.170.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Manager Proxy 4.3:kernel-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Manager Proxy 4.3:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
            "SUSE Manager Proxy 4.3:kernel-default-devel-5.14.21-150400.24.170.2.x86_64",
            "SUSE Manager Proxy 4.3:kernel-devel-5.14.21-150400.24.170.1.noarch",
            "SUSE Manager Proxy 4.3:kernel-macros-5.14.21-150400.24.170.1.noarch",
            "SUSE Manager Proxy 4.3:kernel-source-5.14.21-150400.24.170.1.noarch",
            "SUSE Manager Proxy 4.3:kernel-syms-5.14.21-150400.24.170.1.x86_64",
            "SUSE Manager Server 4.3:kernel-default-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Manager Server 4.3:kernel-default-5.14.21-150400.24.170.2.s390x",
            "SUSE Manager Server 4.3:kernel-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Manager Server 4.3:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.ppc64le",
            "SUSE Manager Server 4.3:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
            "SUSE Manager Server 4.3:kernel-default-devel-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Manager Server 4.3:kernel-default-devel-5.14.21-150400.24.170.2.s390x",
            "SUSE Manager Server 4.3:kernel-default-devel-5.14.21-150400.24.170.2.x86_64",
            "SUSE Manager Server 4.3:kernel-devel-5.14.21-150400.24.170.1.noarch",
            "SUSE Manager Server 4.3:kernel-macros-5.14.21-150400.24.170.1.noarch",
            "SUSE Manager Server 4.3:kernel-source-5.14.21-150400.24.170.1.noarch",
            "SUSE Manager Server 4.3:kernel-syms-5.14.21-150400.24.170.1.ppc64le",
            "SUSE Manager Server 4.3:kernel-syms-5.14.21-150400.24.170.1.s390x",
            "SUSE Manager Server 4.3:kernel-syms-5.14.21-150400.24.170.1.x86_64",
            "SUSE Manager Server 4.3:kernel-zfcpdump-5.14.21-150400.24.170.2.s390x"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2025-07-28T15:09:33Z",
          "details": "moderate"
        }
      ],
      "title": "CVE-2022-50072"
    },
    {
      "cve": "CVE-2022-50073",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2022-50073"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "In the Linux kernel, the following vulnerability has been resolved:\n\nnet: tap: NULL pointer derefence in dev_parse_header_protocol when skb-\u003edev is null\n\nFixes a NULL pointer derefence bug triggered from tap driver.\nWhen tap_get_user calls virtio_net_hdr_to_skb the skb-\u003edev is null\n(in tap.c skb-\u003edev is set after the call to virtio_net_hdr_to_skb)\nvirtio_net_hdr_to_skb calls dev_parse_header_protocol which\nneeds skb-\u003edev field to be valid.\n\nThe line that trigers the bug is in dev_parse_header_protocol\n(dev is at offset 0x10 from skb and is stored in RAX register)\n  if (!dev-\u003eheader_ops || !dev-\u003eheader_ops-\u003eparse_protocol)\n  22e1:   mov    0x10(%rbx),%rax\n  22e5:\t  mov    0x230(%rax),%rax\n\nSetting skb-\u003edev before the call in tap.c fixes the issue.\n\nBUG: kernel NULL pointer dereference, address: 0000000000000230\nRIP: 0010:virtio_net_hdr_to_skb.constprop.0+0x335/0x410 [tap]\nCode: c0 0f 85 b7 fd ff ff eb d4 41 39 c6 77 cf 29 c6 48 89 df 44 01 f6 e8 7a 79 83 c1 48 85 c0 0f 85 d9 fd ff ff eb b7 48 8b 43 10 \u003c48\u003e 8b 80 30 02 00 00 48 85 c0 74 55 48 8b 40 28 48 85 c0 74 4c 48\nRSP: 0018:ffffc90005c27c38 EFLAGS: 00010246\nRAX: 0000000000000000 RBX: ffff888298f25300 RCX: 0000000000000010\nRDX: 0000000000000005 RSI: ffffc90005c27cb6 RDI: ffff888298f25300\nRBP: ffffc90005c27c80 R08: 00000000ffffffea R09: 00000000000007e8\nR10: ffff88858ec77458 R11: 0000000000000000 R12: 0000000000000001\nR13: 0000000000000014 R14: ffffc90005c27e08 R15: ffffc90005c27cb6\nFS:  0000000000000000(0000) GS:ffff88858ec40000(0000) knlGS:0000000000000000\nCS:  0010 DS: 0000 ES: 0000 CR0: 0000000080050033\nCR2: 0000000000000230 CR3: 0000000281408006 CR4: 00000000003706e0\nCall Trace:\n tap_get_user+0x3f1/0x540 [tap]\n tap_sendmsg+0x56/0x362 [tap]\n ? get_tx_bufs+0xc2/0x1e0 [vhost_net]\n handle_tx_copy+0x114/0x670 [vhost_net]\n handle_tx+0xb0/0xe0 [vhost_net]\n handle_tx_kick+0x15/0x20 [vhost_net]\n vhost_worker+0x7b/0xc0 [vhost]\n ? vhost_vring_call_reset+0x40/0x40 [vhost]\n kthread+0xfa/0x120\n ? kthread_complete_and_exit+0x20/0x20\n ret_from_fork+0x1f/0x30",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.170.2.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.170.2.s390x",
          "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.170.2.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.170.2.s390x",
          "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.170.2.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.170.2.s390x",
          "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.170.2.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.170.2.s390x",
          "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-64kb-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-64kb-devel-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-devel-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-devel-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-devel-5.14.21-150400.24.170.1.noarch",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-docs-5.14.21-150400.24.170.1.noarch",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-macros-5.14.21-150400.24.170.1.noarch",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-obs-build-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-obs-build-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-source-5.14.21-150400.24.170.1.noarch",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-syms-5.14.21-150400.24.170.1.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-syms-5.14.21-150400.24.170.1.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:reiserfs-kmp-default-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:reiserfs-kmp-default-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-64kb-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-64kb-devel-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-devel-5.14.21-150400.24.170.1.noarch",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-docs-5.14.21-150400.24.170.1.noarch",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-macros-5.14.21-150400.24.170.1.noarch",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-source-5.14.21-150400.24.170.1.noarch",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.170.1.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.170.1.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.170.2.ppc64le",
          "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.170.2.s390x",
          "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.170.2.ppc64le",
          "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.170.2.s390x",
          "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_170-default-1-150400.9.3.2.ppc64le",
          "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_170-default-1-150400.9.3.2.s390x",
          "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_170-default-1-150400.9.3.2.x86_64",
          "SUSE Linux Enterprise Micro 5.3:kernel-default-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise Micro 5.3:kernel-default-5.14.21-150400.24.170.2.s390x",
          "SUSE Linux Enterprise Micro 5.3:kernel-default-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise Micro 5.3:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.aarch64",
          "SUSE Linux Enterprise Micro 5.3:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
          "SUSE Linux Enterprise Micro 5.4:kernel-default-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise Micro 5.4:kernel-default-5.14.21-150400.24.170.2.s390x",
          "SUSE Linux Enterprise Micro 5.4:kernel-default-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise Micro 5.4:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.aarch64",
          "SUSE Linux Enterprise Micro 5.4:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-64kb-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-64kb-devel-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-5.14.21-150400.24.170.2.ppc64le",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-5.14.21-150400.24.170.2.s390x",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.aarch64",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.ppc64le",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.170.2.ppc64le",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.170.2.s390x",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-devel-5.14.21-150400.24.170.1.noarch",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-docs-5.14.21-150400.24.170.1.noarch",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-macros-5.14.21-150400.24.170.1.noarch",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.170.2.ppc64le",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.170.2.s390x",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-source-5.14.21-150400.24.170.1.noarch",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.170.1.aarch64",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.170.1.ppc64le",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.170.1.s390x",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.170.1.x86_64",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-zfcpdump-5.14.21-150400.24.170.2.s390x",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.170.2.ppc64le",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.170.2.s390x",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-5.14.21-150400.24.170.2.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-devel-5.14.21-150400.24.170.2.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-devel-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-devel-5.14.21-150400.24.170.1.noarch",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-docs-5.14.21-150400.24.170.1.noarch",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-macros-5.14.21-150400.24.170.1.noarch",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-obs-build-5.14.21-150400.24.170.2.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-obs-build-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-source-5.14.21-150400.24.170.1.noarch",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-syms-5.14.21-150400.24.170.1.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-syms-5.14.21-150400.24.170.1.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.170.2.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.170.2.x86_64",
          "SUSE Manager Proxy 4.3:kernel-default-5.14.21-150400.24.170.2.x86_64",
          "SUSE Manager Proxy 4.3:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
          "SUSE Manager Proxy 4.3:kernel-default-devel-5.14.21-150400.24.170.2.x86_64",
          "SUSE Manager Proxy 4.3:kernel-devel-5.14.21-150400.24.170.1.noarch",
          "SUSE Manager Proxy 4.3:kernel-macros-5.14.21-150400.24.170.1.noarch",
          "SUSE Manager Proxy 4.3:kernel-source-5.14.21-150400.24.170.1.noarch",
          "SUSE Manager Proxy 4.3:kernel-syms-5.14.21-150400.24.170.1.x86_64",
          "SUSE Manager Server 4.3:kernel-default-5.14.21-150400.24.170.2.ppc64le",
          "SUSE Manager Server 4.3:kernel-default-5.14.21-150400.24.170.2.s390x",
          "SUSE Manager Server 4.3:kernel-default-5.14.21-150400.24.170.2.x86_64",
          "SUSE Manager Server 4.3:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.ppc64le",
          "SUSE Manager Server 4.3:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
          "SUSE Manager Server 4.3:kernel-default-devel-5.14.21-150400.24.170.2.ppc64le",
          "SUSE Manager Server 4.3:kernel-default-devel-5.14.21-150400.24.170.2.s390x",
          "SUSE Manager Server 4.3:kernel-default-devel-5.14.21-150400.24.170.2.x86_64",
          "SUSE Manager Server 4.3:kernel-devel-5.14.21-150400.24.170.1.noarch",
          "SUSE Manager Server 4.3:kernel-macros-5.14.21-150400.24.170.1.noarch",
          "SUSE Manager Server 4.3:kernel-source-5.14.21-150400.24.170.1.noarch",
          "SUSE Manager Server 4.3:kernel-syms-5.14.21-150400.24.170.1.ppc64le",
          "SUSE Manager Server 4.3:kernel-syms-5.14.21-150400.24.170.1.s390x",
          "SUSE Manager Server 4.3:kernel-syms-5.14.21-150400.24.170.1.x86_64",
          "SUSE Manager Server 4.3:kernel-zfcpdump-5.14.21-150400.24.170.2.s390x"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2022-50073",
          "url": "https://www.suse.com/security/cve/CVE-2022-50073"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1244978 for CVE-2022-50073",
          "url": "https://bugzilla.suse.com/1244978"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-64kb-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-64kb-devel-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-devel-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-devel-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-devel-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-docs-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-macros-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-obs-build-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-obs-build-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-source-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-syms-5.14.21-150400.24.170.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-syms-5.14.21-150400.24.170.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:reiserfs-kmp-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:reiserfs-kmp-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-64kb-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-64kb-devel-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-devel-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-docs-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-macros-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-source-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.170.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.170.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_170-default-1-150400.9.3.2.ppc64le",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_170-default-1-150400.9.3.2.s390x",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_170-default-1-150400.9.3.2.x86_64",
            "SUSE Linux Enterprise Micro 5.3:kernel-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise Micro 5.3:kernel-default-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise Micro 5.3:kernel-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Micro 5.3:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.aarch64",
            "SUSE Linux Enterprise Micro 5.3:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
            "SUSE Linux Enterprise Micro 5.4:kernel-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise Micro 5.4:kernel-default-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise Micro 5.4:kernel-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Micro 5.4:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.aarch64",
            "SUSE Linux Enterprise Micro 5.4:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-64kb-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-64kb-devel-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.aarch64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.ppc64le",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-devel-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-docs-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-macros-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-source-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.170.1.aarch64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.170.1.ppc64le",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.170.1.s390x",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.170.1.x86_64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-zfcpdump-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-devel-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-devel-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-devel-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-docs-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-macros-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-obs-build-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-obs-build-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-source-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-syms-5.14.21-150400.24.170.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-syms-5.14.21-150400.24.170.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Manager Proxy 4.3:kernel-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Manager Proxy 4.3:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
            "SUSE Manager Proxy 4.3:kernel-default-devel-5.14.21-150400.24.170.2.x86_64",
            "SUSE Manager Proxy 4.3:kernel-devel-5.14.21-150400.24.170.1.noarch",
            "SUSE Manager Proxy 4.3:kernel-macros-5.14.21-150400.24.170.1.noarch",
            "SUSE Manager Proxy 4.3:kernel-source-5.14.21-150400.24.170.1.noarch",
            "SUSE Manager Proxy 4.3:kernel-syms-5.14.21-150400.24.170.1.x86_64",
            "SUSE Manager Server 4.3:kernel-default-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Manager Server 4.3:kernel-default-5.14.21-150400.24.170.2.s390x",
            "SUSE Manager Server 4.3:kernel-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Manager Server 4.3:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.ppc64le",
            "SUSE Manager Server 4.3:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
            "SUSE Manager Server 4.3:kernel-default-devel-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Manager Server 4.3:kernel-default-devel-5.14.21-150400.24.170.2.s390x",
            "SUSE Manager Server 4.3:kernel-default-devel-5.14.21-150400.24.170.2.x86_64",
            "SUSE Manager Server 4.3:kernel-devel-5.14.21-150400.24.170.1.noarch",
            "SUSE Manager Server 4.3:kernel-macros-5.14.21-150400.24.170.1.noarch",
            "SUSE Manager Server 4.3:kernel-source-5.14.21-150400.24.170.1.noarch",
            "SUSE Manager Server 4.3:kernel-syms-5.14.21-150400.24.170.1.ppc64le",
            "SUSE Manager Server 4.3:kernel-syms-5.14.21-150400.24.170.1.s390x",
            "SUSE Manager Server 4.3:kernel-syms-5.14.21-150400.24.170.1.x86_64",
            "SUSE Manager Server 4.3:kernel-zfcpdump-5.14.21-150400.24.170.2.s390x"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 5.5,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
            "version": "3.1"
          },
          "products": [
            "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-64kb-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-64kb-devel-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-devel-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-devel-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-devel-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-docs-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-macros-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-obs-build-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-obs-build-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-source-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-syms-5.14.21-150400.24.170.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-syms-5.14.21-150400.24.170.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:reiserfs-kmp-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:reiserfs-kmp-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-64kb-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-64kb-devel-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-devel-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-docs-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-macros-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-source-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.170.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.170.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_170-default-1-150400.9.3.2.ppc64le",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_170-default-1-150400.9.3.2.s390x",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_170-default-1-150400.9.3.2.x86_64",
            "SUSE Linux Enterprise Micro 5.3:kernel-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise Micro 5.3:kernel-default-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise Micro 5.3:kernel-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Micro 5.3:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.aarch64",
            "SUSE Linux Enterprise Micro 5.3:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
            "SUSE Linux Enterprise Micro 5.4:kernel-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise Micro 5.4:kernel-default-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise Micro 5.4:kernel-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Micro 5.4:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.aarch64",
            "SUSE Linux Enterprise Micro 5.4:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-64kb-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-64kb-devel-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.aarch64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.ppc64le",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-devel-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-docs-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-macros-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-source-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.170.1.aarch64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.170.1.ppc64le",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.170.1.s390x",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.170.1.x86_64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-zfcpdump-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-devel-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-devel-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-devel-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-docs-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-macros-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-obs-build-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-obs-build-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-source-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-syms-5.14.21-150400.24.170.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-syms-5.14.21-150400.24.170.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Manager Proxy 4.3:kernel-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Manager Proxy 4.3:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
            "SUSE Manager Proxy 4.3:kernel-default-devel-5.14.21-150400.24.170.2.x86_64",
            "SUSE Manager Proxy 4.3:kernel-devel-5.14.21-150400.24.170.1.noarch",
            "SUSE Manager Proxy 4.3:kernel-macros-5.14.21-150400.24.170.1.noarch",
            "SUSE Manager Proxy 4.3:kernel-source-5.14.21-150400.24.170.1.noarch",
            "SUSE Manager Proxy 4.3:kernel-syms-5.14.21-150400.24.170.1.x86_64",
            "SUSE Manager Server 4.3:kernel-default-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Manager Server 4.3:kernel-default-5.14.21-150400.24.170.2.s390x",
            "SUSE Manager Server 4.3:kernel-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Manager Server 4.3:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.ppc64le",
            "SUSE Manager Server 4.3:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
            "SUSE Manager Server 4.3:kernel-default-devel-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Manager Server 4.3:kernel-default-devel-5.14.21-150400.24.170.2.s390x",
            "SUSE Manager Server 4.3:kernel-default-devel-5.14.21-150400.24.170.2.x86_64",
            "SUSE Manager Server 4.3:kernel-devel-5.14.21-150400.24.170.1.noarch",
            "SUSE Manager Server 4.3:kernel-macros-5.14.21-150400.24.170.1.noarch",
            "SUSE Manager Server 4.3:kernel-source-5.14.21-150400.24.170.1.noarch",
            "SUSE Manager Server 4.3:kernel-syms-5.14.21-150400.24.170.1.ppc64le",
            "SUSE Manager Server 4.3:kernel-syms-5.14.21-150400.24.170.1.s390x",
            "SUSE Manager Server 4.3:kernel-syms-5.14.21-150400.24.170.1.x86_64",
            "SUSE Manager Server 4.3:kernel-zfcpdump-5.14.21-150400.24.170.2.s390x"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2025-07-28T15:09:33Z",
          "details": "moderate"
        }
      ],
      "title": "CVE-2022-50073"
    },
    {
      "cve": "CVE-2022-50074",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2022-50074"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "In the Linux kernel, the following vulnerability has been resolved:\n\napparmor: Fix memleak in aa_simple_write_to_buffer()\n\nWhen copy_from_user failed, the memory is freed by kvfree. however the\nmanagement struct and data blob are allocated independently, so only\nkvfree(data) cause a memleak issue here. Use aa_put_loaddata(data) to\nfix this issue.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.170.2.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.170.2.s390x",
          "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.170.2.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.170.2.s390x",
          "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.170.2.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.170.2.s390x",
          "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.170.2.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.170.2.s390x",
          "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-64kb-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-64kb-devel-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-devel-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-devel-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-devel-5.14.21-150400.24.170.1.noarch",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-docs-5.14.21-150400.24.170.1.noarch",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-macros-5.14.21-150400.24.170.1.noarch",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-obs-build-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-obs-build-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-source-5.14.21-150400.24.170.1.noarch",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-syms-5.14.21-150400.24.170.1.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-syms-5.14.21-150400.24.170.1.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:reiserfs-kmp-default-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:reiserfs-kmp-default-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-64kb-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-64kb-devel-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-devel-5.14.21-150400.24.170.1.noarch",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-docs-5.14.21-150400.24.170.1.noarch",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-macros-5.14.21-150400.24.170.1.noarch",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-source-5.14.21-150400.24.170.1.noarch",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.170.1.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.170.1.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.170.2.ppc64le",
          "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.170.2.s390x",
          "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.170.2.ppc64le",
          "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.170.2.s390x",
          "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_170-default-1-150400.9.3.2.ppc64le",
          "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_170-default-1-150400.9.3.2.s390x",
          "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_170-default-1-150400.9.3.2.x86_64",
          "SUSE Linux Enterprise Micro 5.3:kernel-default-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise Micro 5.3:kernel-default-5.14.21-150400.24.170.2.s390x",
          "SUSE Linux Enterprise Micro 5.3:kernel-default-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise Micro 5.3:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.aarch64",
          "SUSE Linux Enterprise Micro 5.3:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
          "SUSE Linux Enterprise Micro 5.4:kernel-default-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise Micro 5.4:kernel-default-5.14.21-150400.24.170.2.s390x",
          "SUSE Linux Enterprise Micro 5.4:kernel-default-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise Micro 5.4:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.aarch64",
          "SUSE Linux Enterprise Micro 5.4:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-64kb-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-64kb-devel-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-5.14.21-150400.24.170.2.ppc64le",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-5.14.21-150400.24.170.2.s390x",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.aarch64",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.ppc64le",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.170.2.ppc64le",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.170.2.s390x",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-devel-5.14.21-150400.24.170.1.noarch",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-docs-5.14.21-150400.24.170.1.noarch",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-macros-5.14.21-150400.24.170.1.noarch",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.170.2.ppc64le",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.170.2.s390x",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-source-5.14.21-150400.24.170.1.noarch",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.170.1.aarch64",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.170.1.ppc64le",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.170.1.s390x",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.170.1.x86_64",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-zfcpdump-5.14.21-150400.24.170.2.s390x",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.170.2.ppc64le",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.170.2.s390x",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-5.14.21-150400.24.170.2.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-devel-5.14.21-150400.24.170.2.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-devel-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-devel-5.14.21-150400.24.170.1.noarch",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-docs-5.14.21-150400.24.170.1.noarch",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-macros-5.14.21-150400.24.170.1.noarch",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-obs-build-5.14.21-150400.24.170.2.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-obs-build-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-source-5.14.21-150400.24.170.1.noarch",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-syms-5.14.21-150400.24.170.1.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-syms-5.14.21-150400.24.170.1.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.170.2.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.170.2.x86_64",
          "SUSE Manager Proxy 4.3:kernel-default-5.14.21-150400.24.170.2.x86_64",
          "SUSE Manager Proxy 4.3:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
          "SUSE Manager Proxy 4.3:kernel-default-devel-5.14.21-150400.24.170.2.x86_64",
          "SUSE Manager Proxy 4.3:kernel-devel-5.14.21-150400.24.170.1.noarch",
          "SUSE Manager Proxy 4.3:kernel-macros-5.14.21-150400.24.170.1.noarch",
          "SUSE Manager Proxy 4.3:kernel-source-5.14.21-150400.24.170.1.noarch",
          "SUSE Manager Proxy 4.3:kernel-syms-5.14.21-150400.24.170.1.x86_64",
          "SUSE Manager Server 4.3:kernel-default-5.14.21-150400.24.170.2.ppc64le",
          "SUSE Manager Server 4.3:kernel-default-5.14.21-150400.24.170.2.s390x",
          "SUSE Manager Server 4.3:kernel-default-5.14.21-150400.24.170.2.x86_64",
          "SUSE Manager Server 4.3:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.ppc64le",
          "SUSE Manager Server 4.3:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
          "SUSE Manager Server 4.3:kernel-default-devel-5.14.21-150400.24.170.2.ppc64le",
          "SUSE Manager Server 4.3:kernel-default-devel-5.14.21-150400.24.170.2.s390x",
          "SUSE Manager Server 4.3:kernel-default-devel-5.14.21-150400.24.170.2.x86_64",
          "SUSE Manager Server 4.3:kernel-devel-5.14.21-150400.24.170.1.noarch",
          "SUSE Manager Server 4.3:kernel-macros-5.14.21-150400.24.170.1.noarch",
          "SUSE Manager Server 4.3:kernel-source-5.14.21-150400.24.170.1.noarch",
          "SUSE Manager Server 4.3:kernel-syms-5.14.21-150400.24.170.1.ppc64le",
          "SUSE Manager Server 4.3:kernel-syms-5.14.21-150400.24.170.1.s390x",
          "SUSE Manager Server 4.3:kernel-syms-5.14.21-150400.24.170.1.x86_64",
          "SUSE Manager Server 4.3:kernel-zfcpdump-5.14.21-150400.24.170.2.s390x"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2022-50074",
          "url": "https://www.suse.com/security/cve/CVE-2022-50074"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1244965 for CVE-2022-50074",
          "url": "https://bugzilla.suse.com/1244965"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-64kb-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-64kb-devel-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-devel-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-devel-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-devel-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-docs-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-macros-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-obs-build-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-obs-build-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-source-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-syms-5.14.21-150400.24.170.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-syms-5.14.21-150400.24.170.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:reiserfs-kmp-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:reiserfs-kmp-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-64kb-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-64kb-devel-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-devel-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-docs-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-macros-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-source-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.170.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.170.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_170-default-1-150400.9.3.2.ppc64le",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_170-default-1-150400.9.3.2.s390x",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_170-default-1-150400.9.3.2.x86_64",
            "SUSE Linux Enterprise Micro 5.3:kernel-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise Micro 5.3:kernel-default-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise Micro 5.3:kernel-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Micro 5.3:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.aarch64",
            "SUSE Linux Enterprise Micro 5.3:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
            "SUSE Linux Enterprise Micro 5.4:kernel-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise Micro 5.4:kernel-default-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise Micro 5.4:kernel-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Micro 5.4:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.aarch64",
            "SUSE Linux Enterprise Micro 5.4:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-64kb-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-64kb-devel-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.aarch64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.ppc64le",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-devel-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-docs-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-macros-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-source-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.170.1.aarch64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.170.1.ppc64le",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.170.1.s390x",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.170.1.x86_64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-zfcpdump-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-devel-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-devel-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-devel-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-docs-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-macros-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-obs-build-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-obs-build-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-source-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-syms-5.14.21-150400.24.170.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-syms-5.14.21-150400.24.170.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Manager Proxy 4.3:kernel-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Manager Proxy 4.3:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
            "SUSE Manager Proxy 4.3:kernel-default-devel-5.14.21-150400.24.170.2.x86_64",
            "SUSE Manager Proxy 4.3:kernel-devel-5.14.21-150400.24.170.1.noarch",
            "SUSE Manager Proxy 4.3:kernel-macros-5.14.21-150400.24.170.1.noarch",
            "SUSE Manager Proxy 4.3:kernel-source-5.14.21-150400.24.170.1.noarch",
            "SUSE Manager Proxy 4.3:kernel-syms-5.14.21-150400.24.170.1.x86_64",
            "SUSE Manager Server 4.3:kernel-default-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Manager Server 4.3:kernel-default-5.14.21-150400.24.170.2.s390x",
            "SUSE Manager Server 4.3:kernel-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Manager Server 4.3:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.ppc64le",
            "SUSE Manager Server 4.3:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
            "SUSE Manager Server 4.3:kernel-default-devel-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Manager Server 4.3:kernel-default-devel-5.14.21-150400.24.170.2.s390x",
            "SUSE Manager Server 4.3:kernel-default-devel-5.14.21-150400.24.170.2.x86_64",
            "SUSE Manager Server 4.3:kernel-devel-5.14.21-150400.24.170.1.noarch",
            "SUSE Manager Server 4.3:kernel-macros-5.14.21-150400.24.170.1.noarch",
            "SUSE Manager Server 4.3:kernel-source-5.14.21-150400.24.170.1.noarch",
            "SUSE Manager Server 4.3:kernel-syms-5.14.21-150400.24.170.1.ppc64le",
            "SUSE Manager Server 4.3:kernel-syms-5.14.21-150400.24.170.1.s390x",
            "SUSE Manager Server 4.3:kernel-syms-5.14.21-150400.24.170.1.x86_64",
            "SUSE Manager Server 4.3:kernel-zfcpdump-5.14.21-150400.24.170.2.s390x"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 5.5,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
            "version": "3.1"
          },
          "products": [
            "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-64kb-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-64kb-devel-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-devel-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-devel-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-devel-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-docs-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-macros-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-obs-build-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-obs-build-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-source-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-syms-5.14.21-150400.24.170.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-syms-5.14.21-150400.24.170.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:reiserfs-kmp-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:reiserfs-kmp-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-64kb-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-64kb-devel-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-devel-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-docs-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-macros-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-source-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.170.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.170.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_170-default-1-150400.9.3.2.ppc64le",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_170-default-1-150400.9.3.2.s390x",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_170-default-1-150400.9.3.2.x86_64",
            "SUSE Linux Enterprise Micro 5.3:kernel-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise Micro 5.3:kernel-default-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise Micro 5.3:kernel-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Micro 5.3:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.aarch64",
            "SUSE Linux Enterprise Micro 5.3:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
            "SUSE Linux Enterprise Micro 5.4:kernel-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise Micro 5.4:kernel-default-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise Micro 5.4:kernel-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Micro 5.4:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.aarch64",
            "SUSE Linux Enterprise Micro 5.4:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-64kb-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-64kb-devel-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.aarch64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.ppc64le",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-devel-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-docs-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-macros-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-source-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.170.1.aarch64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.170.1.ppc64le",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.170.1.s390x",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.170.1.x86_64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-zfcpdump-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-devel-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-devel-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-devel-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-docs-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-macros-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-obs-build-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-obs-build-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-source-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-syms-5.14.21-150400.24.170.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-syms-5.14.21-150400.24.170.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Manager Proxy 4.3:kernel-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Manager Proxy 4.3:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
            "SUSE Manager Proxy 4.3:kernel-default-devel-5.14.21-150400.24.170.2.x86_64",
            "SUSE Manager Proxy 4.3:kernel-devel-5.14.21-150400.24.170.1.noarch",
            "SUSE Manager Proxy 4.3:kernel-macros-5.14.21-150400.24.170.1.noarch",
            "SUSE Manager Proxy 4.3:kernel-source-5.14.21-150400.24.170.1.noarch",
            "SUSE Manager Proxy 4.3:kernel-syms-5.14.21-150400.24.170.1.x86_64",
            "SUSE Manager Server 4.3:kernel-default-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Manager Server 4.3:kernel-default-5.14.21-150400.24.170.2.s390x",
            "SUSE Manager Server 4.3:kernel-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Manager Server 4.3:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.ppc64le",
            "SUSE Manager Server 4.3:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
            "SUSE Manager Server 4.3:kernel-default-devel-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Manager Server 4.3:kernel-default-devel-5.14.21-150400.24.170.2.s390x",
            "SUSE Manager Server 4.3:kernel-default-devel-5.14.21-150400.24.170.2.x86_64",
            "SUSE Manager Server 4.3:kernel-devel-5.14.21-150400.24.170.1.noarch",
            "SUSE Manager Server 4.3:kernel-macros-5.14.21-150400.24.170.1.noarch",
            "SUSE Manager Server 4.3:kernel-source-5.14.21-150400.24.170.1.noarch",
            "SUSE Manager Server 4.3:kernel-syms-5.14.21-150400.24.170.1.ppc64le",
            "SUSE Manager Server 4.3:kernel-syms-5.14.21-150400.24.170.1.s390x",
            "SUSE Manager Server 4.3:kernel-syms-5.14.21-150400.24.170.1.x86_64",
            "SUSE Manager Server 4.3:kernel-zfcpdump-5.14.21-150400.24.170.2.s390x"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2025-07-28T15:09:33Z",
          "details": "moderate"
        }
      ],
      "title": "CVE-2022-50074"
    },
    {
      "cve": "CVE-2022-50076",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2022-50076"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "In the Linux kernel, the following vulnerability has been resolved:\n\ncifs: Fix memory leak on the deferred close\n\nxfstests on smb21 report kmemleak as below:\n\n  unreferenced object 0xffff8881767d6200 (size 64):\n    comm \"xfs_io\", pid 1284, jiffies 4294777434 (age 20.789s)\n    hex dump (first 32 bytes):\n      80 5a d0 11 81 88 ff ff 78 8a aa 63 81 88 ff ff  .Z......x..c....\n      00 71 99 76 81 88 ff ff 00 00 00 00 00 00 00 00  .q.v............\n    backtrace:\n      [\u003c00000000ad04e6ea\u003e] cifs_close+0x92/0x2c0\n      [\u003c0000000028b93c82\u003e] __fput+0xff/0x3f0\n      [\u003c00000000d8116851\u003e] task_work_run+0x85/0xc0\n      [\u003c0000000027e14f9e\u003e] do_exit+0x5e5/0x1240\n      [\u003c00000000fb492b95\u003e] do_group_exit+0x58/0xe0\n      [\u003c00000000129a32d9\u003e] __x64_sys_exit_group+0x28/0x30\n      [\u003c00000000e3f7d8e9\u003e] do_syscall_64+0x35/0x80\n      [\u003c00000000102e8a0b\u003e] entry_SYSCALL_64_after_hwframe+0x46/0xb0\n\nWhen cancel the deferred close work, we should also cleanup the struct\ncifs_deferred_close.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.170.2.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.170.2.s390x",
          "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.170.2.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.170.2.s390x",
          "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.170.2.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.170.2.s390x",
          "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.170.2.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.170.2.s390x",
          "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-64kb-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-64kb-devel-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-devel-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-devel-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-devel-5.14.21-150400.24.170.1.noarch",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-docs-5.14.21-150400.24.170.1.noarch",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-macros-5.14.21-150400.24.170.1.noarch",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-obs-build-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-obs-build-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-source-5.14.21-150400.24.170.1.noarch",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-syms-5.14.21-150400.24.170.1.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-syms-5.14.21-150400.24.170.1.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:reiserfs-kmp-default-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:reiserfs-kmp-default-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-64kb-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-64kb-devel-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-devel-5.14.21-150400.24.170.1.noarch",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-docs-5.14.21-150400.24.170.1.noarch",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-macros-5.14.21-150400.24.170.1.noarch",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-source-5.14.21-150400.24.170.1.noarch",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.170.1.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.170.1.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.170.2.ppc64le",
          "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.170.2.s390x",
          "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.170.2.ppc64le",
          "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.170.2.s390x",
          "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_170-default-1-150400.9.3.2.ppc64le",
          "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_170-default-1-150400.9.3.2.s390x",
          "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_170-default-1-150400.9.3.2.x86_64",
          "SUSE Linux Enterprise Micro 5.3:kernel-default-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise Micro 5.3:kernel-default-5.14.21-150400.24.170.2.s390x",
          "SUSE Linux Enterprise Micro 5.3:kernel-default-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise Micro 5.3:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.aarch64",
          "SUSE Linux Enterprise Micro 5.3:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
          "SUSE Linux Enterprise Micro 5.4:kernel-default-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise Micro 5.4:kernel-default-5.14.21-150400.24.170.2.s390x",
          "SUSE Linux Enterprise Micro 5.4:kernel-default-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise Micro 5.4:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.aarch64",
          "SUSE Linux Enterprise Micro 5.4:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-64kb-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-64kb-devel-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-5.14.21-150400.24.170.2.ppc64le",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-5.14.21-150400.24.170.2.s390x",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.aarch64",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.ppc64le",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.170.2.ppc64le",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.170.2.s390x",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-devel-5.14.21-150400.24.170.1.noarch",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-docs-5.14.21-150400.24.170.1.noarch",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-macros-5.14.21-150400.24.170.1.noarch",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.170.2.ppc64le",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.170.2.s390x",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-source-5.14.21-150400.24.170.1.noarch",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.170.1.aarch64",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.170.1.ppc64le",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.170.1.s390x",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.170.1.x86_64",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-zfcpdump-5.14.21-150400.24.170.2.s390x",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.170.2.ppc64le",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.170.2.s390x",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-5.14.21-150400.24.170.2.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-devel-5.14.21-150400.24.170.2.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-devel-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-devel-5.14.21-150400.24.170.1.noarch",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-docs-5.14.21-150400.24.170.1.noarch",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-macros-5.14.21-150400.24.170.1.noarch",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-obs-build-5.14.21-150400.24.170.2.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-obs-build-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-source-5.14.21-150400.24.170.1.noarch",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-syms-5.14.21-150400.24.170.1.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-syms-5.14.21-150400.24.170.1.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.170.2.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.170.2.x86_64",
          "SUSE Manager Proxy 4.3:kernel-default-5.14.21-150400.24.170.2.x86_64",
          "SUSE Manager Proxy 4.3:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
          "SUSE Manager Proxy 4.3:kernel-default-devel-5.14.21-150400.24.170.2.x86_64",
          "SUSE Manager Proxy 4.3:kernel-devel-5.14.21-150400.24.170.1.noarch",
          "SUSE Manager Proxy 4.3:kernel-macros-5.14.21-150400.24.170.1.noarch",
          "SUSE Manager Proxy 4.3:kernel-source-5.14.21-150400.24.170.1.noarch",
          "SUSE Manager Proxy 4.3:kernel-syms-5.14.21-150400.24.170.1.x86_64",
          "SUSE Manager Server 4.3:kernel-default-5.14.21-150400.24.170.2.ppc64le",
          "SUSE Manager Server 4.3:kernel-default-5.14.21-150400.24.170.2.s390x",
          "SUSE Manager Server 4.3:kernel-default-5.14.21-150400.24.170.2.x86_64",
          "SUSE Manager Server 4.3:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.ppc64le",
          "SUSE Manager Server 4.3:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
          "SUSE Manager Server 4.3:kernel-default-devel-5.14.21-150400.24.170.2.ppc64le",
          "SUSE Manager Server 4.3:kernel-default-devel-5.14.21-150400.24.170.2.s390x",
          "SUSE Manager Server 4.3:kernel-default-devel-5.14.21-150400.24.170.2.x86_64",
          "SUSE Manager Server 4.3:kernel-devel-5.14.21-150400.24.170.1.noarch",
          "SUSE Manager Server 4.3:kernel-macros-5.14.21-150400.24.170.1.noarch",
          "SUSE Manager Server 4.3:kernel-source-5.14.21-150400.24.170.1.noarch",
          "SUSE Manager Server 4.3:kernel-syms-5.14.21-150400.24.170.1.ppc64le",
          "SUSE Manager Server 4.3:kernel-syms-5.14.21-150400.24.170.1.s390x",
          "SUSE Manager Server 4.3:kernel-syms-5.14.21-150400.24.170.1.x86_64",
          "SUSE Manager Server 4.3:kernel-zfcpdump-5.14.21-150400.24.170.2.s390x"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2022-50076",
          "url": "https://www.suse.com/security/cve/CVE-2022-50076"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1244983 for CVE-2022-50076",
          "url": "https://bugzilla.suse.com/1244983"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-64kb-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-64kb-devel-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-devel-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-devel-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-devel-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-docs-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-macros-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-obs-build-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-obs-build-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-source-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-syms-5.14.21-150400.24.170.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-syms-5.14.21-150400.24.170.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:reiserfs-kmp-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:reiserfs-kmp-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-64kb-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-64kb-devel-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-devel-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-docs-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-macros-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-source-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.170.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.170.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_170-default-1-150400.9.3.2.ppc64le",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_170-default-1-150400.9.3.2.s390x",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_170-default-1-150400.9.3.2.x86_64",
            "SUSE Linux Enterprise Micro 5.3:kernel-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise Micro 5.3:kernel-default-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise Micro 5.3:kernel-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Micro 5.3:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.aarch64",
            "SUSE Linux Enterprise Micro 5.3:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
            "SUSE Linux Enterprise Micro 5.4:kernel-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise Micro 5.4:kernel-default-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise Micro 5.4:kernel-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Micro 5.4:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.aarch64",
            "SUSE Linux Enterprise Micro 5.4:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-64kb-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-64kb-devel-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.aarch64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.ppc64le",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-devel-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-docs-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-macros-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-source-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.170.1.aarch64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.170.1.ppc64le",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.170.1.s390x",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.170.1.x86_64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-zfcpdump-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-devel-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-devel-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-devel-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-docs-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-macros-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-obs-build-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-obs-build-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-source-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-syms-5.14.21-150400.24.170.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-syms-5.14.21-150400.24.170.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Manager Proxy 4.3:kernel-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Manager Proxy 4.3:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
            "SUSE Manager Proxy 4.3:kernel-default-devel-5.14.21-150400.24.170.2.x86_64",
            "SUSE Manager Proxy 4.3:kernel-devel-5.14.21-150400.24.170.1.noarch",
            "SUSE Manager Proxy 4.3:kernel-macros-5.14.21-150400.24.170.1.noarch",
            "SUSE Manager Proxy 4.3:kernel-source-5.14.21-150400.24.170.1.noarch",
            "SUSE Manager Proxy 4.3:kernel-syms-5.14.21-150400.24.170.1.x86_64",
            "SUSE Manager Server 4.3:kernel-default-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Manager Server 4.3:kernel-default-5.14.21-150400.24.170.2.s390x",
            "SUSE Manager Server 4.3:kernel-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Manager Server 4.3:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.ppc64le",
            "SUSE Manager Server 4.3:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
            "SUSE Manager Server 4.3:kernel-default-devel-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Manager Server 4.3:kernel-default-devel-5.14.21-150400.24.170.2.s390x",
            "SUSE Manager Server 4.3:kernel-default-devel-5.14.21-150400.24.170.2.x86_64",
            "SUSE Manager Server 4.3:kernel-devel-5.14.21-150400.24.170.1.noarch",
            "SUSE Manager Server 4.3:kernel-macros-5.14.21-150400.24.170.1.noarch",
            "SUSE Manager Server 4.3:kernel-source-5.14.21-150400.24.170.1.noarch",
            "SUSE Manager Server 4.3:kernel-syms-5.14.21-150400.24.170.1.ppc64le",
            "SUSE Manager Server 4.3:kernel-syms-5.14.21-150400.24.170.1.s390x",
            "SUSE Manager Server 4.3:kernel-syms-5.14.21-150400.24.170.1.x86_64",
            "SUSE Manager Server 4.3:kernel-zfcpdump-5.14.21-150400.24.170.2.s390x"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 5.5,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
            "version": "3.1"
          },
          "products": [
            "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-64kb-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-64kb-devel-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-devel-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-devel-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-devel-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-docs-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-macros-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-obs-build-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-obs-build-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-source-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-syms-5.14.21-150400.24.170.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-syms-5.14.21-150400.24.170.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:reiserfs-kmp-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:reiserfs-kmp-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-64kb-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-64kb-devel-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-devel-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-docs-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-macros-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-source-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.170.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.170.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_170-default-1-150400.9.3.2.ppc64le",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_170-default-1-150400.9.3.2.s390x",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_170-default-1-150400.9.3.2.x86_64",
            "SUSE Linux Enterprise Micro 5.3:kernel-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise Micro 5.3:kernel-default-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise Micro 5.3:kernel-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Micro 5.3:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.aarch64",
            "SUSE Linux Enterprise Micro 5.3:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
            "SUSE Linux Enterprise Micro 5.4:kernel-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise Micro 5.4:kernel-default-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise Micro 5.4:kernel-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Micro 5.4:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.aarch64",
            "SUSE Linux Enterprise Micro 5.4:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-64kb-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-64kb-devel-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.aarch64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.ppc64le",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-devel-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-docs-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-macros-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-source-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.170.1.aarch64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.170.1.ppc64le",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.170.1.s390x",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.170.1.x86_64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-zfcpdump-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-devel-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-devel-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-devel-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-docs-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-macros-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-obs-build-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-obs-build-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-source-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-syms-5.14.21-150400.24.170.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-syms-5.14.21-150400.24.170.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Manager Proxy 4.3:kernel-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Manager Proxy 4.3:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
            "SUSE Manager Proxy 4.3:kernel-default-devel-5.14.21-150400.24.170.2.x86_64",
            "SUSE Manager Proxy 4.3:kernel-devel-5.14.21-150400.24.170.1.noarch",
            "SUSE Manager Proxy 4.3:kernel-macros-5.14.21-150400.24.170.1.noarch",
            "SUSE Manager Proxy 4.3:kernel-source-5.14.21-150400.24.170.1.noarch",
            "SUSE Manager Proxy 4.3:kernel-syms-5.14.21-150400.24.170.1.x86_64",
            "SUSE Manager Server 4.3:kernel-default-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Manager Server 4.3:kernel-default-5.14.21-150400.24.170.2.s390x",
            "SUSE Manager Server 4.3:kernel-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Manager Server 4.3:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.ppc64le",
            "SUSE Manager Server 4.3:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
            "SUSE Manager Server 4.3:kernel-default-devel-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Manager Server 4.3:kernel-default-devel-5.14.21-150400.24.170.2.s390x",
            "SUSE Manager Server 4.3:kernel-default-devel-5.14.21-150400.24.170.2.x86_64",
            "SUSE Manager Server 4.3:kernel-devel-5.14.21-150400.24.170.1.noarch",
            "SUSE Manager Server 4.3:kernel-macros-5.14.21-150400.24.170.1.noarch",
            "SUSE Manager Server 4.3:kernel-source-5.14.21-150400.24.170.1.noarch",
            "SUSE Manager Server 4.3:kernel-syms-5.14.21-150400.24.170.1.ppc64le",
            "SUSE Manager Server 4.3:kernel-syms-5.14.21-150400.24.170.1.s390x",
            "SUSE Manager Server 4.3:kernel-syms-5.14.21-150400.24.170.1.x86_64",
            "SUSE Manager Server 4.3:kernel-zfcpdump-5.14.21-150400.24.170.2.s390x"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2025-07-28T15:09:33Z",
          "details": "moderate"
        }
      ],
      "title": "CVE-2022-50076"
    },
    {
      "cve": "CVE-2022-50077",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2022-50077"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "In the Linux kernel, the following vulnerability has been resolved:\n\napparmor: fix reference count leak in aa_pivotroot()\n\nThe aa_pivotroot() function has a reference counting bug in a specific\npath. When aa_replace_current_label() returns on success, the function\nforgets to decrement the reference count of \"target\", which is\nincreased earlier by build_pivotroot(), causing a reference leak.\n\nFix it by decreasing the refcount of \"target\" in that path.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.170.2.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.170.2.s390x",
          "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.170.2.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.170.2.s390x",
          "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.170.2.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.170.2.s390x",
          "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.170.2.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.170.2.s390x",
          "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-64kb-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-64kb-devel-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-devel-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-devel-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-devel-5.14.21-150400.24.170.1.noarch",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-docs-5.14.21-150400.24.170.1.noarch",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-macros-5.14.21-150400.24.170.1.noarch",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-obs-build-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-obs-build-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-source-5.14.21-150400.24.170.1.noarch",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-syms-5.14.21-150400.24.170.1.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-syms-5.14.21-150400.24.170.1.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:reiserfs-kmp-default-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:reiserfs-kmp-default-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-64kb-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-64kb-devel-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-devel-5.14.21-150400.24.170.1.noarch",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-docs-5.14.21-150400.24.170.1.noarch",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-macros-5.14.21-150400.24.170.1.noarch",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-source-5.14.21-150400.24.170.1.noarch",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.170.1.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.170.1.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.170.2.ppc64le",
          "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.170.2.s390x",
          "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.170.2.ppc64le",
          "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.170.2.s390x",
          "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_170-default-1-150400.9.3.2.ppc64le",
          "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_170-default-1-150400.9.3.2.s390x",
          "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_170-default-1-150400.9.3.2.x86_64",
          "SUSE Linux Enterprise Micro 5.3:kernel-default-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise Micro 5.3:kernel-default-5.14.21-150400.24.170.2.s390x",
          "SUSE Linux Enterprise Micro 5.3:kernel-default-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise Micro 5.3:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.aarch64",
          "SUSE Linux Enterprise Micro 5.3:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
          "SUSE Linux Enterprise Micro 5.4:kernel-default-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise Micro 5.4:kernel-default-5.14.21-150400.24.170.2.s390x",
          "SUSE Linux Enterprise Micro 5.4:kernel-default-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise Micro 5.4:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.aarch64",
          "SUSE Linux Enterprise Micro 5.4:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-64kb-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-64kb-devel-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-5.14.21-150400.24.170.2.ppc64le",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-5.14.21-150400.24.170.2.s390x",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.aarch64",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.ppc64le",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.170.2.ppc64le",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.170.2.s390x",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-devel-5.14.21-150400.24.170.1.noarch",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-docs-5.14.21-150400.24.170.1.noarch",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-macros-5.14.21-150400.24.170.1.noarch",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.170.2.ppc64le",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.170.2.s390x",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-source-5.14.21-150400.24.170.1.noarch",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.170.1.aarch64",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.170.1.ppc64le",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.170.1.s390x",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.170.1.x86_64",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-zfcpdump-5.14.21-150400.24.170.2.s390x",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.170.2.ppc64le",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.170.2.s390x",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-5.14.21-150400.24.170.2.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-devel-5.14.21-150400.24.170.2.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-devel-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-devel-5.14.21-150400.24.170.1.noarch",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-docs-5.14.21-150400.24.170.1.noarch",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-macros-5.14.21-150400.24.170.1.noarch",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-obs-build-5.14.21-150400.24.170.2.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-obs-build-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-source-5.14.21-150400.24.170.1.noarch",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-syms-5.14.21-150400.24.170.1.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-syms-5.14.21-150400.24.170.1.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.170.2.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.170.2.x86_64",
          "SUSE Manager Proxy 4.3:kernel-default-5.14.21-150400.24.170.2.x86_64",
          "SUSE Manager Proxy 4.3:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
          "SUSE Manager Proxy 4.3:kernel-default-devel-5.14.21-150400.24.170.2.x86_64",
          "SUSE Manager Proxy 4.3:kernel-devel-5.14.21-150400.24.170.1.noarch",
          "SUSE Manager Proxy 4.3:kernel-macros-5.14.21-150400.24.170.1.noarch",
          "SUSE Manager Proxy 4.3:kernel-source-5.14.21-150400.24.170.1.noarch",
          "SUSE Manager Proxy 4.3:kernel-syms-5.14.21-150400.24.170.1.x86_64",
          "SUSE Manager Server 4.3:kernel-default-5.14.21-150400.24.170.2.ppc64le",
          "SUSE Manager Server 4.3:kernel-default-5.14.21-150400.24.170.2.s390x",
          "SUSE Manager Server 4.3:kernel-default-5.14.21-150400.24.170.2.x86_64",
          "SUSE Manager Server 4.3:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.ppc64le",
          "SUSE Manager Server 4.3:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
          "SUSE Manager Server 4.3:kernel-default-devel-5.14.21-150400.24.170.2.ppc64le",
          "SUSE Manager Server 4.3:kernel-default-devel-5.14.21-150400.24.170.2.s390x",
          "SUSE Manager Server 4.3:kernel-default-devel-5.14.21-150400.24.170.2.x86_64",
          "SUSE Manager Server 4.3:kernel-devel-5.14.21-150400.24.170.1.noarch",
          "SUSE Manager Server 4.3:kernel-macros-5.14.21-150400.24.170.1.noarch",
          "SUSE Manager Server 4.3:kernel-source-5.14.21-150400.24.170.1.noarch",
          "SUSE Manager Server 4.3:kernel-syms-5.14.21-150400.24.170.1.ppc64le",
          "SUSE Manager Server 4.3:kernel-syms-5.14.21-150400.24.170.1.s390x",
          "SUSE Manager Server 4.3:kernel-syms-5.14.21-150400.24.170.1.x86_64",
          "SUSE Manager Server 4.3:kernel-zfcpdump-5.14.21-150400.24.170.2.s390x"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2022-50077",
          "url": "https://www.suse.com/security/cve/CVE-2022-50077"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1244977 for CVE-2022-50077",
          "url": "https://bugzilla.suse.com/1244977"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-64kb-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-64kb-devel-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-devel-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-devel-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-devel-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-docs-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-macros-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-obs-build-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-obs-build-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-source-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-syms-5.14.21-150400.24.170.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-syms-5.14.21-150400.24.170.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:reiserfs-kmp-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:reiserfs-kmp-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-64kb-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-64kb-devel-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-devel-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-docs-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-macros-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-source-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.170.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.170.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_170-default-1-150400.9.3.2.ppc64le",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_170-default-1-150400.9.3.2.s390x",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_170-default-1-150400.9.3.2.x86_64",
            "SUSE Linux Enterprise Micro 5.3:kernel-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise Micro 5.3:kernel-default-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise Micro 5.3:kernel-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Micro 5.3:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.aarch64",
            "SUSE Linux Enterprise Micro 5.3:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
            "SUSE Linux Enterprise Micro 5.4:kernel-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise Micro 5.4:kernel-default-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise Micro 5.4:kernel-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Micro 5.4:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.aarch64",
            "SUSE Linux Enterprise Micro 5.4:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-64kb-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-64kb-devel-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.aarch64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.ppc64le",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-devel-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-docs-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-macros-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-source-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.170.1.aarch64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.170.1.ppc64le",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.170.1.s390x",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.170.1.x86_64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-zfcpdump-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-devel-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-devel-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-devel-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-docs-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-macros-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-obs-build-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-obs-build-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-source-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-syms-5.14.21-150400.24.170.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-syms-5.14.21-150400.24.170.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Manager Proxy 4.3:kernel-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Manager Proxy 4.3:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
            "SUSE Manager Proxy 4.3:kernel-default-devel-5.14.21-150400.24.170.2.x86_64",
            "SUSE Manager Proxy 4.3:kernel-devel-5.14.21-150400.24.170.1.noarch",
            "SUSE Manager Proxy 4.3:kernel-macros-5.14.21-150400.24.170.1.noarch",
            "SUSE Manager Proxy 4.3:kernel-source-5.14.21-150400.24.170.1.noarch",
            "SUSE Manager Proxy 4.3:kernel-syms-5.14.21-150400.24.170.1.x86_64",
            "SUSE Manager Server 4.3:kernel-default-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Manager Server 4.3:kernel-default-5.14.21-150400.24.170.2.s390x",
            "SUSE Manager Server 4.3:kernel-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Manager Server 4.3:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.ppc64le",
            "SUSE Manager Server 4.3:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
            "SUSE Manager Server 4.3:kernel-default-devel-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Manager Server 4.3:kernel-default-devel-5.14.21-150400.24.170.2.s390x",
            "SUSE Manager Server 4.3:kernel-default-devel-5.14.21-150400.24.170.2.x86_64",
            "SUSE Manager Server 4.3:kernel-devel-5.14.21-150400.24.170.1.noarch",
            "SUSE Manager Server 4.3:kernel-macros-5.14.21-150400.24.170.1.noarch",
            "SUSE Manager Server 4.3:kernel-source-5.14.21-150400.24.170.1.noarch",
            "SUSE Manager Server 4.3:kernel-syms-5.14.21-150400.24.170.1.ppc64le",
            "SUSE Manager Server 4.3:kernel-syms-5.14.21-150400.24.170.1.s390x",
            "SUSE Manager Server 4.3:kernel-syms-5.14.21-150400.24.170.1.x86_64",
            "SUSE Manager Server 4.3:kernel-zfcpdump-5.14.21-150400.24.170.2.s390x"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 5.5,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
            "version": "3.1"
          },
          "products": [
            "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-64kb-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-64kb-devel-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-devel-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-devel-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-devel-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-docs-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-macros-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-obs-build-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-obs-build-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-source-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-syms-5.14.21-150400.24.170.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-syms-5.14.21-150400.24.170.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:reiserfs-kmp-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:reiserfs-kmp-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-64kb-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-64kb-devel-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-devel-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-docs-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-macros-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-source-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.170.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.170.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_170-default-1-150400.9.3.2.ppc64le",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_170-default-1-150400.9.3.2.s390x",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_170-default-1-150400.9.3.2.x86_64",
            "SUSE Linux Enterprise Micro 5.3:kernel-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise Micro 5.3:kernel-default-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise Micro 5.3:kernel-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Micro 5.3:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.aarch64",
            "SUSE Linux Enterprise Micro 5.3:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
            "SUSE Linux Enterprise Micro 5.4:kernel-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise Micro 5.4:kernel-default-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise Micro 5.4:kernel-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Micro 5.4:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.aarch64",
            "SUSE Linux Enterprise Micro 5.4:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-64kb-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-64kb-devel-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.aarch64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.ppc64le",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-devel-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-docs-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-macros-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-source-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.170.1.aarch64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.170.1.ppc64le",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.170.1.s390x",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.170.1.x86_64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-zfcpdump-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-devel-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-devel-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-devel-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-docs-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-macros-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-obs-build-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-obs-build-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-source-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-syms-5.14.21-150400.24.170.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-syms-5.14.21-150400.24.170.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Manager Proxy 4.3:kernel-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Manager Proxy 4.3:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
            "SUSE Manager Proxy 4.3:kernel-default-devel-5.14.21-150400.24.170.2.x86_64",
            "SUSE Manager Proxy 4.3:kernel-devel-5.14.21-150400.24.170.1.noarch",
            "SUSE Manager Proxy 4.3:kernel-macros-5.14.21-150400.24.170.1.noarch",
            "SUSE Manager Proxy 4.3:kernel-source-5.14.21-150400.24.170.1.noarch",
            "SUSE Manager Proxy 4.3:kernel-syms-5.14.21-150400.24.170.1.x86_64",
            "SUSE Manager Server 4.3:kernel-default-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Manager Server 4.3:kernel-default-5.14.21-150400.24.170.2.s390x",
            "SUSE Manager Server 4.3:kernel-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Manager Server 4.3:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.ppc64le",
            "SUSE Manager Server 4.3:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
            "SUSE Manager Server 4.3:kernel-default-devel-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Manager Server 4.3:kernel-default-devel-5.14.21-150400.24.170.2.s390x",
            "SUSE Manager Server 4.3:kernel-default-devel-5.14.21-150400.24.170.2.x86_64",
            "SUSE Manager Server 4.3:kernel-devel-5.14.21-150400.24.170.1.noarch",
            "SUSE Manager Server 4.3:kernel-macros-5.14.21-150400.24.170.1.noarch",
            "SUSE Manager Server 4.3:kernel-source-5.14.21-150400.24.170.1.noarch",
            "SUSE Manager Server 4.3:kernel-syms-5.14.21-150400.24.170.1.ppc64le",
            "SUSE Manager Server 4.3:kernel-syms-5.14.21-150400.24.170.1.s390x",
            "SUSE Manager Server 4.3:kernel-syms-5.14.21-150400.24.170.1.x86_64",
            "SUSE Manager Server 4.3:kernel-zfcpdump-5.14.21-150400.24.170.2.s390x"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2025-07-28T15:09:33Z",
          "details": "moderate"
        }
      ],
      "title": "CVE-2022-50077"
    },
    {
      "cve": "CVE-2022-50079",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2022-50079"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "In the Linux kernel, the following vulnerability has been resolved:\n\ndrm/amd/display: Check correct bounds for stream encoder instances for DCN303\n\n[Why \u0026 How]\neng_id for DCN303 cannot be more than 1, since we have only two\ninstances of stream encoders.\n\nCheck the correct boundary condition for engine ID for DCN303 prevent\nthe potential out of bounds access.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.170.2.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.170.2.s390x",
          "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.170.2.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.170.2.s390x",
          "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.170.2.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.170.2.s390x",
          "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.170.2.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.170.2.s390x",
          "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-64kb-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-64kb-devel-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-devel-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-devel-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-devel-5.14.21-150400.24.170.1.noarch",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-docs-5.14.21-150400.24.170.1.noarch",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-macros-5.14.21-150400.24.170.1.noarch",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-obs-build-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-obs-build-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-source-5.14.21-150400.24.170.1.noarch",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-syms-5.14.21-150400.24.170.1.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-syms-5.14.21-150400.24.170.1.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:reiserfs-kmp-default-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:reiserfs-kmp-default-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-64kb-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-64kb-devel-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-devel-5.14.21-150400.24.170.1.noarch",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-docs-5.14.21-150400.24.170.1.noarch",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-macros-5.14.21-150400.24.170.1.noarch",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-source-5.14.21-150400.24.170.1.noarch",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.170.1.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.170.1.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.170.2.ppc64le",
          "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.170.2.s390x",
          "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.170.2.ppc64le",
          "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.170.2.s390x",
          "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_170-default-1-150400.9.3.2.ppc64le",
          "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_170-default-1-150400.9.3.2.s390x",
          "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_170-default-1-150400.9.3.2.x86_64",
          "SUSE Linux Enterprise Micro 5.3:kernel-default-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise Micro 5.3:kernel-default-5.14.21-150400.24.170.2.s390x",
          "SUSE Linux Enterprise Micro 5.3:kernel-default-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise Micro 5.3:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.aarch64",
          "SUSE Linux Enterprise Micro 5.3:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
          "SUSE Linux Enterprise Micro 5.4:kernel-default-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise Micro 5.4:kernel-default-5.14.21-150400.24.170.2.s390x",
          "SUSE Linux Enterprise Micro 5.4:kernel-default-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise Micro 5.4:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.aarch64",
          "SUSE Linux Enterprise Micro 5.4:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-64kb-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-64kb-devel-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-5.14.21-150400.24.170.2.ppc64le",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-5.14.21-150400.24.170.2.s390x",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.aarch64",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.ppc64le",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.170.2.ppc64le",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.170.2.s390x",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-devel-5.14.21-150400.24.170.1.noarch",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-docs-5.14.21-150400.24.170.1.noarch",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-macros-5.14.21-150400.24.170.1.noarch",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.170.2.ppc64le",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.170.2.s390x",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-source-5.14.21-150400.24.170.1.noarch",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.170.1.aarch64",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.170.1.ppc64le",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.170.1.s390x",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.170.1.x86_64",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-zfcpdump-5.14.21-150400.24.170.2.s390x",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.170.2.ppc64le",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.170.2.s390x",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-5.14.21-150400.24.170.2.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-devel-5.14.21-150400.24.170.2.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-devel-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-devel-5.14.21-150400.24.170.1.noarch",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-docs-5.14.21-150400.24.170.1.noarch",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-macros-5.14.21-150400.24.170.1.noarch",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-obs-build-5.14.21-150400.24.170.2.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-obs-build-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-source-5.14.21-150400.24.170.1.noarch",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-syms-5.14.21-150400.24.170.1.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-syms-5.14.21-150400.24.170.1.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.170.2.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.170.2.x86_64",
          "SUSE Manager Proxy 4.3:kernel-default-5.14.21-150400.24.170.2.x86_64",
          "SUSE Manager Proxy 4.3:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
          "SUSE Manager Proxy 4.3:kernel-default-devel-5.14.21-150400.24.170.2.x86_64",
          "SUSE Manager Proxy 4.3:kernel-devel-5.14.21-150400.24.170.1.noarch",
          "SUSE Manager Proxy 4.3:kernel-macros-5.14.21-150400.24.170.1.noarch",
          "SUSE Manager Proxy 4.3:kernel-source-5.14.21-150400.24.170.1.noarch",
          "SUSE Manager Proxy 4.3:kernel-syms-5.14.21-150400.24.170.1.x86_64",
          "SUSE Manager Server 4.3:kernel-default-5.14.21-150400.24.170.2.ppc64le",
          "SUSE Manager Server 4.3:kernel-default-5.14.21-150400.24.170.2.s390x",
          "SUSE Manager Server 4.3:kernel-default-5.14.21-150400.24.170.2.x86_64",
          "SUSE Manager Server 4.3:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.ppc64le",
          "SUSE Manager Server 4.3:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
          "SUSE Manager Server 4.3:kernel-default-devel-5.14.21-150400.24.170.2.ppc64le",
          "SUSE Manager Server 4.3:kernel-default-devel-5.14.21-150400.24.170.2.s390x",
          "SUSE Manager Server 4.3:kernel-default-devel-5.14.21-150400.24.170.2.x86_64",
          "SUSE Manager Server 4.3:kernel-devel-5.14.21-150400.24.170.1.noarch",
          "SUSE Manager Server 4.3:kernel-macros-5.14.21-150400.24.170.1.noarch",
          "SUSE Manager Server 4.3:kernel-source-5.14.21-150400.24.170.1.noarch",
          "SUSE Manager Server 4.3:kernel-syms-5.14.21-150400.24.170.1.ppc64le",
          "SUSE Manager Server 4.3:kernel-syms-5.14.21-150400.24.170.1.s390x",
          "SUSE Manager Server 4.3:kernel-syms-5.14.21-150400.24.170.1.x86_64",
          "SUSE Manager Server 4.3:kernel-zfcpdump-5.14.21-150400.24.170.2.s390x"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2022-50079",
          "url": "https://www.suse.com/security/cve/CVE-2022-50079"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1244970 for CVE-2022-50079",
          "url": "https://bugzilla.suse.com/1244970"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-64kb-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-64kb-devel-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-devel-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-devel-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-devel-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-docs-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-macros-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-obs-build-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-obs-build-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-source-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-syms-5.14.21-150400.24.170.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-syms-5.14.21-150400.24.170.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:reiserfs-kmp-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:reiserfs-kmp-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-64kb-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-64kb-devel-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-devel-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-docs-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-macros-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-source-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.170.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.170.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_170-default-1-150400.9.3.2.ppc64le",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_170-default-1-150400.9.3.2.s390x",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_170-default-1-150400.9.3.2.x86_64",
            "SUSE Linux Enterprise Micro 5.3:kernel-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise Micro 5.3:kernel-default-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise Micro 5.3:kernel-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Micro 5.3:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.aarch64",
            "SUSE Linux Enterprise Micro 5.3:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
            "SUSE Linux Enterprise Micro 5.4:kernel-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise Micro 5.4:kernel-default-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise Micro 5.4:kernel-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Micro 5.4:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.aarch64",
            "SUSE Linux Enterprise Micro 5.4:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-64kb-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-64kb-devel-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.aarch64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.ppc64le",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-devel-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-docs-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-macros-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-source-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.170.1.aarch64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.170.1.ppc64le",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.170.1.s390x",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.170.1.x86_64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-zfcpdump-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-devel-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-devel-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-devel-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-docs-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-macros-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-obs-build-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-obs-build-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-source-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-syms-5.14.21-150400.24.170.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-syms-5.14.21-150400.24.170.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Manager Proxy 4.3:kernel-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Manager Proxy 4.3:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
            "SUSE Manager Proxy 4.3:kernel-default-devel-5.14.21-150400.24.170.2.x86_64",
            "SUSE Manager Proxy 4.3:kernel-devel-5.14.21-150400.24.170.1.noarch",
            "SUSE Manager Proxy 4.3:kernel-macros-5.14.21-150400.24.170.1.noarch",
            "SUSE Manager Proxy 4.3:kernel-source-5.14.21-150400.24.170.1.noarch",
            "SUSE Manager Proxy 4.3:kernel-syms-5.14.21-150400.24.170.1.x86_64",
            "SUSE Manager Server 4.3:kernel-default-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Manager Server 4.3:kernel-default-5.14.21-150400.24.170.2.s390x",
            "SUSE Manager Server 4.3:kernel-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Manager Server 4.3:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.ppc64le",
            "SUSE Manager Server 4.3:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
            "SUSE Manager Server 4.3:kernel-default-devel-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Manager Server 4.3:kernel-default-devel-5.14.21-150400.24.170.2.s390x",
            "SUSE Manager Server 4.3:kernel-default-devel-5.14.21-150400.24.170.2.x86_64",
            "SUSE Manager Server 4.3:kernel-devel-5.14.21-150400.24.170.1.noarch",
            "SUSE Manager Server 4.3:kernel-macros-5.14.21-150400.24.170.1.noarch",
            "SUSE Manager Server 4.3:kernel-source-5.14.21-150400.24.170.1.noarch",
            "SUSE Manager Server 4.3:kernel-syms-5.14.21-150400.24.170.1.ppc64le",
            "SUSE Manager Server 4.3:kernel-syms-5.14.21-150400.24.170.1.s390x",
            "SUSE Manager Server 4.3:kernel-syms-5.14.21-150400.24.170.1.x86_64",
            "SUSE Manager Server 4.3:kernel-zfcpdump-5.14.21-150400.24.170.2.s390x"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 5.5,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
            "version": "3.1"
          },
          "products": [
            "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-64kb-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-64kb-devel-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-devel-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-devel-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-devel-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-docs-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-macros-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-obs-build-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-obs-build-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-source-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-syms-5.14.21-150400.24.170.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-syms-5.14.21-150400.24.170.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:reiserfs-kmp-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:reiserfs-kmp-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-64kb-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-64kb-devel-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-devel-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-docs-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-macros-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-source-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.170.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.170.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_170-default-1-150400.9.3.2.ppc64le",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_170-default-1-150400.9.3.2.s390x",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_170-default-1-150400.9.3.2.x86_64",
            "SUSE Linux Enterprise Micro 5.3:kernel-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise Micro 5.3:kernel-default-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise Micro 5.3:kernel-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Micro 5.3:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.aarch64",
            "SUSE Linux Enterprise Micro 5.3:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
            "SUSE Linux Enterprise Micro 5.4:kernel-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise Micro 5.4:kernel-default-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise Micro 5.4:kernel-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Micro 5.4:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.aarch64",
            "SUSE Linux Enterprise Micro 5.4:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-64kb-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-64kb-devel-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.aarch64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.ppc64le",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-devel-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-docs-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-macros-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-source-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.170.1.aarch64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.170.1.ppc64le",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.170.1.s390x",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.170.1.x86_64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-zfcpdump-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-devel-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-devel-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-devel-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-docs-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-macros-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-obs-build-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-obs-build-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-source-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-syms-5.14.21-150400.24.170.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-syms-5.14.21-150400.24.170.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Manager Proxy 4.3:kernel-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Manager Proxy 4.3:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
            "SUSE Manager Proxy 4.3:kernel-default-devel-5.14.21-150400.24.170.2.x86_64",
            "SUSE Manager Proxy 4.3:kernel-devel-5.14.21-150400.24.170.1.noarch",
            "SUSE Manager Proxy 4.3:kernel-macros-5.14.21-150400.24.170.1.noarch",
            "SUSE Manager Proxy 4.3:kernel-source-5.14.21-150400.24.170.1.noarch",
            "SUSE Manager Proxy 4.3:kernel-syms-5.14.21-150400.24.170.1.x86_64",
            "SUSE Manager Server 4.3:kernel-default-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Manager Server 4.3:kernel-default-5.14.21-150400.24.170.2.s390x",
            "SUSE Manager Server 4.3:kernel-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Manager Server 4.3:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.ppc64le",
            "SUSE Manager Server 4.3:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
            "SUSE Manager Server 4.3:kernel-default-devel-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Manager Server 4.3:kernel-default-devel-5.14.21-150400.24.170.2.s390x",
            "SUSE Manager Server 4.3:kernel-default-devel-5.14.21-150400.24.170.2.x86_64",
            "SUSE Manager Server 4.3:kernel-devel-5.14.21-150400.24.170.1.noarch",
            "SUSE Manager Server 4.3:kernel-macros-5.14.21-150400.24.170.1.noarch",
            "SUSE Manager Server 4.3:kernel-source-5.14.21-150400.24.170.1.noarch",
            "SUSE Manager Server 4.3:kernel-syms-5.14.21-150400.24.170.1.ppc64le",
            "SUSE Manager Server 4.3:kernel-syms-5.14.21-150400.24.170.1.s390x",
            "SUSE Manager Server 4.3:kernel-syms-5.14.21-150400.24.170.1.x86_64",
            "SUSE Manager Server 4.3:kernel-zfcpdump-5.14.21-150400.24.170.2.s390x"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2025-07-28T15:09:33Z",
          "details": "moderate"
        }
      ],
      "title": "CVE-2022-50079"
    },
    {
      "cve": "CVE-2022-50083",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2022-50083"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "In the Linux kernel, the following vulnerability has been resolved:\n\next4: add EXT4_INODE_HAS_XATTR_SPACE macro in xattr.h\n\nWhen adding an xattr to an inode, we must ensure that the inode_size is\nnot less than EXT4_GOOD_OLD_INODE_SIZE + extra_isize + pad. Otherwise,\nthe end position may be greater than the start position, resulting in UAF.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.170.2.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.170.2.s390x",
          "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.170.2.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.170.2.s390x",
          "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.170.2.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.170.2.s390x",
          "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.170.2.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.170.2.s390x",
          "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-64kb-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-64kb-devel-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-devel-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-devel-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-devel-5.14.21-150400.24.170.1.noarch",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-docs-5.14.21-150400.24.170.1.noarch",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-macros-5.14.21-150400.24.170.1.noarch",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-obs-build-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-obs-build-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-source-5.14.21-150400.24.170.1.noarch",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-syms-5.14.21-150400.24.170.1.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-syms-5.14.21-150400.24.170.1.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:reiserfs-kmp-default-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:reiserfs-kmp-default-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-64kb-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-64kb-devel-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-devel-5.14.21-150400.24.170.1.noarch",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-docs-5.14.21-150400.24.170.1.noarch",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-macros-5.14.21-150400.24.170.1.noarch",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-source-5.14.21-150400.24.170.1.noarch",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.170.1.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.170.1.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.170.2.ppc64le",
          "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.170.2.s390x",
          "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.170.2.ppc64le",
          "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.170.2.s390x",
          "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_170-default-1-150400.9.3.2.ppc64le",
          "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_170-default-1-150400.9.3.2.s390x",
          "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_170-default-1-150400.9.3.2.x86_64",
          "SUSE Linux Enterprise Micro 5.3:kernel-default-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise Micro 5.3:kernel-default-5.14.21-150400.24.170.2.s390x",
          "SUSE Linux Enterprise Micro 5.3:kernel-default-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise Micro 5.3:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.aarch64",
          "SUSE Linux Enterprise Micro 5.3:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
          "SUSE Linux Enterprise Micro 5.4:kernel-default-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise Micro 5.4:kernel-default-5.14.21-150400.24.170.2.s390x",
          "SUSE Linux Enterprise Micro 5.4:kernel-default-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise Micro 5.4:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.aarch64",
          "SUSE Linux Enterprise Micro 5.4:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-64kb-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-64kb-devel-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-5.14.21-150400.24.170.2.ppc64le",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-5.14.21-150400.24.170.2.s390x",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.aarch64",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.ppc64le",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.170.2.ppc64le",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.170.2.s390x",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-devel-5.14.21-150400.24.170.1.noarch",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-docs-5.14.21-150400.24.170.1.noarch",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-macros-5.14.21-150400.24.170.1.noarch",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.170.2.ppc64le",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.170.2.s390x",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-source-5.14.21-150400.24.170.1.noarch",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.170.1.aarch64",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.170.1.ppc64le",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.170.1.s390x",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.170.1.x86_64",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-zfcpdump-5.14.21-150400.24.170.2.s390x",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.170.2.ppc64le",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.170.2.s390x",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-5.14.21-150400.24.170.2.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-devel-5.14.21-150400.24.170.2.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-devel-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-devel-5.14.21-150400.24.170.1.noarch",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-docs-5.14.21-150400.24.170.1.noarch",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-macros-5.14.21-150400.24.170.1.noarch",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-obs-build-5.14.21-150400.24.170.2.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-obs-build-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-source-5.14.21-150400.24.170.1.noarch",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-syms-5.14.21-150400.24.170.1.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-syms-5.14.21-150400.24.170.1.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.170.2.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.170.2.x86_64",
          "SUSE Manager Proxy 4.3:kernel-default-5.14.21-150400.24.170.2.x86_64",
          "SUSE Manager Proxy 4.3:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
          "SUSE Manager Proxy 4.3:kernel-default-devel-5.14.21-150400.24.170.2.x86_64",
          "SUSE Manager Proxy 4.3:kernel-devel-5.14.21-150400.24.170.1.noarch",
          "SUSE Manager Proxy 4.3:kernel-macros-5.14.21-150400.24.170.1.noarch",
          "SUSE Manager Proxy 4.3:kernel-source-5.14.21-150400.24.170.1.noarch",
          "SUSE Manager Proxy 4.3:kernel-syms-5.14.21-150400.24.170.1.x86_64",
          "SUSE Manager Server 4.3:kernel-default-5.14.21-150400.24.170.2.ppc64le",
          "SUSE Manager Server 4.3:kernel-default-5.14.21-150400.24.170.2.s390x",
          "SUSE Manager Server 4.3:kernel-default-5.14.21-150400.24.170.2.x86_64",
          "SUSE Manager Server 4.3:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.ppc64le",
          "SUSE Manager Server 4.3:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
          "SUSE Manager Server 4.3:kernel-default-devel-5.14.21-150400.24.170.2.ppc64le",
          "SUSE Manager Server 4.3:kernel-default-devel-5.14.21-150400.24.170.2.s390x",
          "SUSE Manager Server 4.3:kernel-default-devel-5.14.21-150400.24.170.2.x86_64",
          "SUSE Manager Server 4.3:kernel-devel-5.14.21-150400.24.170.1.noarch",
          "SUSE Manager Server 4.3:kernel-macros-5.14.21-150400.24.170.1.noarch",
          "SUSE Manager Server 4.3:kernel-source-5.14.21-150400.24.170.1.noarch",
          "SUSE Manager Server 4.3:kernel-syms-5.14.21-150400.24.170.1.ppc64le",
          "SUSE Manager Server 4.3:kernel-syms-5.14.21-150400.24.170.1.s390x",
          "SUSE Manager Server 4.3:kernel-syms-5.14.21-150400.24.170.1.x86_64",
          "SUSE Manager Server 4.3:kernel-zfcpdump-5.14.21-150400.24.170.2.s390x"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2022-50083",
          "url": "https://www.suse.com/security/cve/CVE-2022-50083"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1244968 for CVE-2022-50083",
          "url": "https://bugzilla.suse.com/1244968"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-64kb-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-64kb-devel-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-devel-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-devel-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-devel-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-docs-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-macros-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-obs-build-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-obs-build-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-source-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-syms-5.14.21-150400.24.170.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-syms-5.14.21-150400.24.170.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:reiserfs-kmp-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:reiserfs-kmp-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-64kb-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-64kb-devel-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-devel-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-docs-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-macros-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-source-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.170.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.170.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_170-default-1-150400.9.3.2.ppc64le",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_170-default-1-150400.9.3.2.s390x",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_170-default-1-150400.9.3.2.x86_64",
            "SUSE Linux Enterprise Micro 5.3:kernel-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise Micro 5.3:kernel-default-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise Micro 5.3:kernel-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Micro 5.3:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.aarch64",
            "SUSE Linux Enterprise Micro 5.3:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
            "SUSE Linux Enterprise Micro 5.4:kernel-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise Micro 5.4:kernel-default-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise Micro 5.4:kernel-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Micro 5.4:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.aarch64",
            "SUSE Linux Enterprise Micro 5.4:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-64kb-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-64kb-devel-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.aarch64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.ppc64le",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-devel-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-docs-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-macros-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-source-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.170.1.aarch64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.170.1.ppc64le",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.170.1.s390x",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.170.1.x86_64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-zfcpdump-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-devel-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-devel-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-devel-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-docs-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-macros-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-obs-build-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-obs-build-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-source-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-syms-5.14.21-150400.24.170.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-syms-5.14.21-150400.24.170.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Manager Proxy 4.3:kernel-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Manager Proxy 4.3:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
            "SUSE Manager Proxy 4.3:kernel-default-devel-5.14.21-150400.24.170.2.x86_64",
            "SUSE Manager Proxy 4.3:kernel-devel-5.14.21-150400.24.170.1.noarch",
            "SUSE Manager Proxy 4.3:kernel-macros-5.14.21-150400.24.170.1.noarch",
            "SUSE Manager Proxy 4.3:kernel-source-5.14.21-150400.24.170.1.noarch",
            "SUSE Manager Proxy 4.3:kernel-syms-5.14.21-150400.24.170.1.x86_64",
            "SUSE Manager Server 4.3:kernel-default-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Manager Server 4.3:kernel-default-5.14.21-150400.24.170.2.s390x",
            "SUSE Manager Server 4.3:kernel-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Manager Server 4.3:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.ppc64le",
            "SUSE Manager Server 4.3:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
            "SUSE Manager Server 4.3:kernel-default-devel-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Manager Server 4.3:kernel-default-devel-5.14.21-150400.24.170.2.s390x",
            "SUSE Manager Server 4.3:kernel-default-devel-5.14.21-150400.24.170.2.x86_64",
            "SUSE Manager Server 4.3:kernel-devel-5.14.21-150400.24.170.1.noarch",
            "SUSE Manager Server 4.3:kernel-macros-5.14.21-150400.24.170.1.noarch",
            "SUSE Manager Server 4.3:kernel-source-5.14.21-150400.24.170.1.noarch",
            "SUSE Manager Server 4.3:kernel-syms-5.14.21-150400.24.170.1.ppc64le",
            "SUSE Manager Server 4.3:kernel-syms-5.14.21-150400.24.170.1.s390x",
            "SUSE Manager Server 4.3:kernel-syms-5.14.21-150400.24.170.1.x86_64",
            "SUSE Manager Server 4.3:kernel-zfcpdump-5.14.21-150400.24.170.2.s390x"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 5.5,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
            "version": "3.1"
          },
          "products": [
            "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-64kb-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-64kb-devel-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-devel-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-devel-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-devel-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-docs-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-macros-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-obs-build-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-obs-build-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-source-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-syms-5.14.21-150400.24.170.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-syms-5.14.21-150400.24.170.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:reiserfs-kmp-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:reiserfs-kmp-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-64kb-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-64kb-devel-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-devel-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-docs-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-macros-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-source-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.170.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.170.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_170-default-1-150400.9.3.2.ppc64le",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_170-default-1-150400.9.3.2.s390x",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_170-default-1-150400.9.3.2.x86_64",
            "SUSE Linux Enterprise Micro 5.3:kernel-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise Micro 5.3:kernel-default-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise Micro 5.3:kernel-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Micro 5.3:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.aarch64",
            "SUSE Linux Enterprise Micro 5.3:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
            "SUSE Linux Enterprise Micro 5.4:kernel-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise Micro 5.4:kernel-default-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise Micro 5.4:kernel-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Micro 5.4:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.aarch64",
            "SUSE Linux Enterprise Micro 5.4:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-64kb-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-64kb-devel-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.aarch64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.ppc64le",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-devel-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-docs-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-macros-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-source-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.170.1.aarch64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.170.1.ppc64le",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.170.1.s390x",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.170.1.x86_64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-zfcpdump-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-devel-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-devel-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-devel-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-docs-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-macros-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-obs-build-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-obs-build-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-source-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-syms-5.14.21-150400.24.170.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-syms-5.14.21-150400.24.170.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Manager Proxy 4.3:kernel-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Manager Proxy 4.3:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
            "SUSE Manager Proxy 4.3:kernel-default-devel-5.14.21-150400.24.170.2.x86_64",
            "SUSE Manager Proxy 4.3:kernel-devel-5.14.21-150400.24.170.1.noarch",
            "SUSE Manager Proxy 4.3:kernel-macros-5.14.21-150400.24.170.1.noarch",
            "SUSE Manager Proxy 4.3:kernel-source-5.14.21-150400.24.170.1.noarch",
            "SUSE Manager Proxy 4.3:kernel-syms-5.14.21-150400.24.170.1.x86_64",
            "SUSE Manager Server 4.3:kernel-default-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Manager Server 4.3:kernel-default-5.14.21-150400.24.170.2.s390x",
            "SUSE Manager Server 4.3:kernel-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Manager Server 4.3:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.ppc64le",
            "SUSE Manager Server 4.3:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
            "SUSE Manager Server 4.3:kernel-default-devel-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Manager Server 4.3:kernel-default-devel-5.14.21-150400.24.170.2.s390x",
            "SUSE Manager Server 4.3:kernel-default-devel-5.14.21-150400.24.170.2.x86_64",
            "SUSE Manager Server 4.3:kernel-devel-5.14.21-150400.24.170.1.noarch",
            "SUSE Manager Server 4.3:kernel-macros-5.14.21-150400.24.170.1.noarch",
            "SUSE Manager Server 4.3:kernel-source-5.14.21-150400.24.170.1.noarch",
            "SUSE Manager Server 4.3:kernel-syms-5.14.21-150400.24.170.1.ppc64le",
            "SUSE Manager Server 4.3:kernel-syms-5.14.21-150400.24.170.1.s390x",
            "SUSE Manager Server 4.3:kernel-syms-5.14.21-150400.24.170.1.x86_64",
            "SUSE Manager Server 4.3:kernel-zfcpdump-5.14.21-150400.24.170.2.s390x"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2025-07-28T15:09:33Z",
          "details": "moderate"
        }
      ],
      "title": "CVE-2022-50083"
    },
    {
      "cve": "CVE-2022-50084",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2022-50084"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "In the Linux kernel, the following vulnerability has been resolved:\n\ndm raid: fix address sanitizer warning in raid_status\n\nThere is this warning when using a kernel with the address sanitizer\nand running this testsuite:\nhttps://gitlab.com/cki-project/kernel-tests/-/tree/main/storage/swraid/scsi_raid\n\n==================================================================\nBUG: KASAN: slab-out-of-bounds in raid_status+0x1747/0x2820 [dm_raid]\nRead of size 4 at addr ffff888079d2c7e8 by task lvcreate/13319\nCPU: 0 PID: 13319 Comm: lvcreate Not tainted 5.18.0-0.rc3.\u003csnip\u003e #1\nHardware name: Red Hat KVM, BIOS 0.5.1 01/01/2011\nCall Trace:\n \u003cTASK\u003e\n dump_stack_lvl+0x6a/0x9c\n print_address_description.constprop.0+0x1f/0x1e0\n print_report.cold+0x55/0x244\n kasan_report+0xc9/0x100\n raid_status+0x1747/0x2820 [dm_raid]\n dm_ima_measure_on_table_load+0x4b8/0xca0 [dm_mod]\n table_load+0x35c/0x630 [dm_mod]\n ctl_ioctl+0x411/0x630 [dm_mod]\n dm_ctl_ioctl+0xa/0x10 [dm_mod]\n __x64_sys_ioctl+0x12a/0x1a0\n do_syscall_64+0x5b/0x80\n\nThe warning is caused by reading conf-\u003emax_nr_stripes in raid_status. The\ncode in raid_status reads mddev-\u003eprivate, casts it to struct r5conf and\nreads the entry max_nr_stripes.\n\nHowever, if we have different raid type than 4/5/6, mddev-\u003eprivate\ndoesn\u0027t point to struct r5conf; it may point to struct r0conf, struct\nr1conf, struct r10conf or struct mpconf. If we cast a pointer to one\nof these structs to struct r5conf, we will be reading invalid memory\nand KASAN warns about it.\n\nFix this bug by reading struct r5conf only if raid type is 4, 5 or 6.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.170.2.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.170.2.s390x",
          "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.170.2.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.170.2.s390x",
          "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.170.2.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.170.2.s390x",
          "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.170.2.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.170.2.s390x",
          "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-64kb-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-64kb-devel-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-devel-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-devel-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-devel-5.14.21-150400.24.170.1.noarch",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-docs-5.14.21-150400.24.170.1.noarch",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-macros-5.14.21-150400.24.170.1.noarch",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-obs-build-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-obs-build-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-source-5.14.21-150400.24.170.1.noarch",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-syms-5.14.21-150400.24.170.1.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-syms-5.14.21-150400.24.170.1.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:reiserfs-kmp-default-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:reiserfs-kmp-default-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-64kb-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-64kb-devel-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-devel-5.14.21-150400.24.170.1.noarch",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-docs-5.14.21-150400.24.170.1.noarch",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-macros-5.14.21-150400.24.170.1.noarch",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-source-5.14.21-150400.24.170.1.noarch",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.170.1.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.170.1.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.170.2.ppc64le",
          "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.170.2.s390x",
          "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.170.2.ppc64le",
          "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.170.2.s390x",
          "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_170-default-1-150400.9.3.2.ppc64le",
          "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_170-default-1-150400.9.3.2.s390x",
          "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_170-default-1-150400.9.3.2.x86_64",
          "SUSE Linux Enterprise Micro 5.3:kernel-default-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise Micro 5.3:kernel-default-5.14.21-150400.24.170.2.s390x",
          "SUSE Linux Enterprise Micro 5.3:kernel-default-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise Micro 5.3:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.aarch64",
          "SUSE Linux Enterprise Micro 5.3:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
          "SUSE Linux Enterprise Micro 5.4:kernel-default-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise Micro 5.4:kernel-default-5.14.21-150400.24.170.2.s390x",
          "SUSE Linux Enterprise Micro 5.4:kernel-default-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise Micro 5.4:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.aarch64",
          "SUSE Linux Enterprise Micro 5.4:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-64kb-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-64kb-devel-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-5.14.21-150400.24.170.2.ppc64le",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-5.14.21-150400.24.170.2.s390x",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.aarch64",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.ppc64le",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.170.2.ppc64le",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.170.2.s390x",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-devel-5.14.21-150400.24.170.1.noarch",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-docs-5.14.21-150400.24.170.1.noarch",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-macros-5.14.21-150400.24.170.1.noarch",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.170.2.ppc64le",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.170.2.s390x",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-source-5.14.21-150400.24.170.1.noarch",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.170.1.aarch64",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.170.1.ppc64le",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.170.1.s390x",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.170.1.x86_64",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-zfcpdump-5.14.21-150400.24.170.2.s390x",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.170.2.ppc64le",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.170.2.s390x",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-5.14.21-150400.24.170.2.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-devel-5.14.21-150400.24.170.2.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-devel-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-devel-5.14.21-150400.24.170.1.noarch",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-docs-5.14.21-150400.24.170.1.noarch",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-macros-5.14.21-150400.24.170.1.noarch",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-obs-build-5.14.21-150400.24.170.2.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-obs-build-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-source-5.14.21-150400.24.170.1.noarch",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-syms-5.14.21-150400.24.170.1.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-syms-5.14.21-150400.24.170.1.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.170.2.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.170.2.x86_64",
          "SUSE Manager Proxy 4.3:kernel-default-5.14.21-150400.24.170.2.x86_64",
          "SUSE Manager Proxy 4.3:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
          "SUSE Manager Proxy 4.3:kernel-default-devel-5.14.21-150400.24.170.2.x86_64",
          "SUSE Manager Proxy 4.3:kernel-devel-5.14.21-150400.24.170.1.noarch",
          "SUSE Manager Proxy 4.3:kernel-macros-5.14.21-150400.24.170.1.noarch",
          "SUSE Manager Proxy 4.3:kernel-source-5.14.21-150400.24.170.1.noarch",
          "SUSE Manager Proxy 4.3:kernel-syms-5.14.21-150400.24.170.1.x86_64",
          "SUSE Manager Server 4.3:kernel-default-5.14.21-150400.24.170.2.ppc64le",
          "SUSE Manager Server 4.3:kernel-default-5.14.21-150400.24.170.2.s390x",
          "SUSE Manager Server 4.3:kernel-default-5.14.21-150400.24.170.2.x86_64",
          "SUSE Manager Server 4.3:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.ppc64le",
          "SUSE Manager Server 4.3:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
          "SUSE Manager Server 4.3:kernel-default-devel-5.14.21-150400.24.170.2.ppc64le",
          "SUSE Manager Server 4.3:kernel-default-devel-5.14.21-150400.24.170.2.s390x",
          "SUSE Manager Server 4.3:kernel-default-devel-5.14.21-150400.24.170.2.x86_64",
          "SUSE Manager Server 4.3:kernel-devel-5.14.21-150400.24.170.1.noarch",
          "SUSE Manager Server 4.3:kernel-macros-5.14.21-150400.24.170.1.noarch",
          "SUSE Manager Server 4.3:kernel-source-5.14.21-150400.24.170.1.noarch",
          "SUSE Manager Server 4.3:kernel-syms-5.14.21-150400.24.170.1.ppc64le",
          "SUSE Manager Server 4.3:kernel-syms-5.14.21-150400.24.170.1.s390x",
          "SUSE Manager Server 4.3:kernel-syms-5.14.21-150400.24.170.1.x86_64",
          "SUSE Manager Server 4.3:kernel-zfcpdump-5.14.21-150400.24.170.2.s390x"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2022-50084",
          "url": "https://www.suse.com/security/cve/CVE-2022-50084"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1245117 for CVE-2022-50084",
          "url": "https://bugzilla.suse.com/1245117"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-64kb-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-64kb-devel-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-devel-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-devel-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-devel-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-docs-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-macros-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-obs-build-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-obs-build-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-source-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-syms-5.14.21-150400.24.170.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-syms-5.14.21-150400.24.170.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:reiserfs-kmp-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:reiserfs-kmp-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-64kb-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-64kb-devel-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-devel-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-docs-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-macros-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-source-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.170.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.170.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_170-default-1-150400.9.3.2.ppc64le",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_170-default-1-150400.9.3.2.s390x",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_170-default-1-150400.9.3.2.x86_64",
            "SUSE Linux Enterprise Micro 5.3:kernel-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise Micro 5.3:kernel-default-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise Micro 5.3:kernel-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Micro 5.3:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.aarch64",
            "SUSE Linux Enterprise Micro 5.3:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
            "SUSE Linux Enterprise Micro 5.4:kernel-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise Micro 5.4:kernel-default-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise Micro 5.4:kernel-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Micro 5.4:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.aarch64",
            "SUSE Linux Enterprise Micro 5.4:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-64kb-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-64kb-devel-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.aarch64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.ppc64le",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-devel-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-docs-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-macros-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-source-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.170.1.aarch64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.170.1.ppc64le",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.170.1.s390x",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.170.1.x86_64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-zfcpdump-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-devel-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-devel-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-devel-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-docs-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-macros-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-obs-build-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-obs-build-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-source-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-syms-5.14.21-150400.24.170.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-syms-5.14.21-150400.24.170.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Manager Proxy 4.3:kernel-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Manager Proxy 4.3:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
            "SUSE Manager Proxy 4.3:kernel-default-devel-5.14.21-150400.24.170.2.x86_64",
            "SUSE Manager Proxy 4.3:kernel-devel-5.14.21-150400.24.170.1.noarch",
            "SUSE Manager Proxy 4.3:kernel-macros-5.14.21-150400.24.170.1.noarch",
            "SUSE Manager Proxy 4.3:kernel-source-5.14.21-150400.24.170.1.noarch",
            "SUSE Manager Proxy 4.3:kernel-syms-5.14.21-150400.24.170.1.x86_64",
            "SUSE Manager Server 4.3:kernel-default-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Manager Server 4.3:kernel-default-5.14.21-150400.24.170.2.s390x",
            "SUSE Manager Server 4.3:kernel-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Manager Server 4.3:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.ppc64le",
            "SUSE Manager Server 4.3:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
            "SUSE Manager Server 4.3:kernel-default-devel-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Manager Server 4.3:kernel-default-devel-5.14.21-150400.24.170.2.s390x",
            "SUSE Manager Server 4.3:kernel-default-devel-5.14.21-150400.24.170.2.x86_64",
            "SUSE Manager Server 4.3:kernel-devel-5.14.21-150400.24.170.1.noarch",
            "SUSE Manager Server 4.3:kernel-macros-5.14.21-150400.24.170.1.noarch",
            "SUSE Manager Server 4.3:kernel-source-5.14.21-150400.24.170.1.noarch",
            "SUSE Manager Server 4.3:kernel-syms-5.14.21-150400.24.170.1.ppc64le",
            "SUSE Manager Server 4.3:kernel-syms-5.14.21-150400.24.170.1.s390x",
            "SUSE Manager Server 4.3:kernel-syms-5.14.21-150400.24.170.1.x86_64",
            "SUSE Manager Server 4.3:kernel-zfcpdump-5.14.21-150400.24.170.2.s390x"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 5.5,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
            "version": "3.1"
          },
          "products": [
            "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-64kb-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-64kb-devel-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-devel-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-devel-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-devel-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-docs-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-macros-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-obs-build-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-obs-build-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-source-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-syms-5.14.21-150400.24.170.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-syms-5.14.21-150400.24.170.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:reiserfs-kmp-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:reiserfs-kmp-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-64kb-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-64kb-devel-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-devel-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-docs-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-macros-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-source-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.170.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.170.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_170-default-1-150400.9.3.2.ppc64le",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_170-default-1-150400.9.3.2.s390x",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_170-default-1-150400.9.3.2.x86_64",
            "SUSE Linux Enterprise Micro 5.3:kernel-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise Micro 5.3:kernel-default-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise Micro 5.3:kernel-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Micro 5.3:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.aarch64",
            "SUSE Linux Enterprise Micro 5.3:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
            "SUSE Linux Enterprise Micro 5.4:kernel-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise Micro 5.4:kernel-default-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise Micro 5.4:kernel-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Micro 5.4:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.aarch64",
            "SUSE Linux Enterprise Micro 5.4:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-64kb-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-64kb-devel-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.aarch64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.ppc64le",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-devel-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-docs-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-macros-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-source-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.170.1.aarch64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.170.1.ppc64le",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.170.1.s390x",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.170.1.x86_64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-zfcpdump-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-devel-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-devel-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-devel-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-docs-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-macros-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-obs-build-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-obs-build-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-source-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-syms-5.14.21-150400.24.170.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-syms-5.14.21-150400.24.170.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Manager Proxy 4.3:kernel-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Manager Proxy 4.3:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
            "SUSE Manager Proxy 4.3:kernel-default-devel-5.14.21-150400.24.170.2.x86_64",
            "SUSE Manager Proxy 4.3:kernel-devel-5.14.21-150400.24.170.1.noarch",
            "SUSE Manager Proxy 4.3:kernel-macros-5.14.21-150400.24.170.1.noarch",
            "SUSE Manager Proxy 4.3:kernel-source-5.14.21-150400.24.170.1.noarch",
            "SUSE Manager Proxy 4.3:kernel-syms-5.14.21-150400.24.170.1.x86_64",
            "SUSE Manager Server 4.3:kernel-default-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Manager Server 4.3:kernel-default-5.14.21-150400.24.170.2.s390x",
            "SUSE Manager Server 4.3:kernel-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Manager Server 4.3:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.ppc64le",
            "SUSE Manager Server 4.3:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
            "SUSE Manager Server 4.3:kernel-default-devel-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Manager Server 4.3:kernel-default-devel-5.14.21-150400.24.170.2.s390x",
            "SUSE Manager Server 4.3:kernel-default-devel-5.14.21-150400.24.170.2.x86_64",
            "SUSE Manager Server 4.3:kernel-devel-5.14.21-150400.24.170.1.noarch",
            "SUSE Manager Server 4.3:kernel-macros-5.14.21-150400.24.170.1.noarch",
            "SUSE Manager Server 4.3:kernel-source-5.14.21-150400.24.170.1.noarch",
            "SUSE Manager Server 4.3:kernel-syms-5.14.21-150400.24.170.1.ppc64le",
            "SUSE Manager Server 4.3:kernel-syms-5.14.21-150400.24.170.1.s390x",
            "SUSE Manager Server 4.3:kernel-syms-5.14.21-150400.24.170.1.x86_64",
            "SUSE Manager Server 4.3:kernel-zfcpdump-5.14.21-150400.24.170.2.s390x"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2025-07-28T15:09:33Z",
          "details": "moderate"
        }
      ],
      "title": "CVE-2022-50084"
    },
    {
      "cve": "CVE-2022-50085",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2022-50085"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "In the Linux kernel, the following vulnerability has been resolved:\n\ndm raid: fix address sanitizer warning in raid_resume\n\nThere is a KASAN warning in raid_resume when running the lvm test\nlvconvert-raid.sh. The reason for the warning is that mddev-\u003eraid_disks\nis greater than rs-\u003eraid_disks, so the loop touches one entry beyond\nthe allocated length.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.170.2.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.170.2.s390x",
          "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.170.2.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.170.2.s390x",
          "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.170.2.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.170.2.s390x",
          "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.170.2.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.170.2.s390x",
          "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-64kb-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-64kb-devel-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-devel-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-devel-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-devel-5.14.21-150400.24.170.1.noarch",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-docs-5.14.21-150400.24.170.1.noarch",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-macros-5.14.21-150400.24.170.1.noarch",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-obs-build-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-obs-build-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-source-5.14.21-150400.24.170.1.noarch",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-syms-5.14.21-150400.24.170.1.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-syms-5.14.21-150400.24.170.1.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:reiserfs-kmp-default-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:reiserfs-kmp-default-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-64kb-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-64kb-devel-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-devel-5.14.21-150400.24.170.1.noarch",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-docs-5.14.21-150400.24.170.1.noarch",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-macros-5.14.21-150400.24.170.1.noarch",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-source-5.14.21-150400.24.170.1.noarch",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.170.1.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.170.1.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.170.2.ppc64le",
          "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.170.2.s390x",
          "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.170.2.ppc64le",
          "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.170.2.s390x",
          "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_170-default-1-150400.9.3.2.ppc64le",
          "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_170-default-1-150400.9.3.2.s390x",
          "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_170-default-1-150400.9.3.2.x86_64",
          "SUSE Linux Enterprise Micro 5.3:kernel-default-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise Micro 5.3:kernel-default-5.14.21-150400.24.170.2.s390x",
          "SUSE Linux Enterprise Micro 5.3:kernel-default-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise Micro 5.3:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.aarch64",
          "SUSE Linux Enterprise Micro 5.3:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
          "SUSE Linux Enterprise Micro 5.4:kernel-default-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise Micro 5.4:kernel-default-5.14.21-150400.24.170.2.s390x",
          "SUSE Linux Enterprise Micro 5.4:kernel-default-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise Micro 5.4:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.aarch64",
          "SUSE Linux Enterprise Micro 5.4:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-64kb-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-64kb-devel-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-5.14.21-150400.24.170.2.ppc64le",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-5.14.21-150400.24.170.2.s390x",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.aarch64",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.ppc64le",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.170.2.ppc64le",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.170.2.s390x",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-devel-5.14.21-150400.24.170.1.noarch",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-docs-5.14.21-150400.24.170.1.noarch",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-macros-5.14.21-150400.24.170.1.noarch",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.170.2.ppc64le",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.170.2.s390x",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-source-5.14.21-150400.24.170.1.noarch",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.170.1.aarch64",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.170.1.ppc64le",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.170.1.s390x",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.170.1.x86_64",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-zfcpdump-5.14.21-150400.24.170.2.s390x",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.170.2.ppc64le",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.170.2.s390x",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-5.14.21-150400.24.170.2.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-devel-5.14.21-150400.24.170.2.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-devel-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-devel-5.14.21-150400.24.170.1.noarch",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-docs-5.14.21-150400.24.170.1.noarch",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-macros-5.14.21-150400.24.170.1.noarch",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-obs-build-5.14.21-150400.24.170.2.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-obs-build-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-source-5.14.21-150400.24.170.1.noarch",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-syms-5.14.21-150400.24.170.1.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-syms-5.14.21-150400.24.170.1.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.170.2.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.170.2.x86_64",
          "SUSE Manager Proxy 4.3:kernel-default-5.14.21-150400.24.170.2.x86_64",
          "SUSE Manager Proxy 4.3:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
          "SUSE Manager Proxy 4.3:kernel-default-devel-5.14.21-150400.24.170.2.x86_64",
          "SUSE Manager Proxy 4.3:kernel-devel-5.14.21-150400.24.170.1.noarch",
          "SUSE Manager Proxy 4.3:kernel-macros-5.14.21-150400.24.170.1.noarch",
          "SUSE Manager Proxy 4.3:kernel-source-5.14.21-150400.24.170.1.noarch",
          "SUSE Manager Proxy 4.3:kernel-syms-5.14.21-150400.24.170.1.x86_64",
          "SUSE Manager Server 4.3:kernel-default-5.14.21-150400.24.170.2.ppc64le",
          "SUSE Manager Server 4.3:kernel-default-5.14.21-150400.24.170.2.s390x",
          "SUSE Manager Server 4.3:kernel-default-5.14.21-150400.24.170.2.x86_64",
          "SUSE Manager Server 4.3:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.ppc64le",
          "SUSE Manager Server 4.3:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
          "SUSE Manager Server 4.3:kernel-default-devel-5.14.21-150400.24.170.2.ppc64le",
          "SUSE Manager Server 4.3:kernel-default-devel-5.14.21-150400.24.170.2.s390x",
          "SUSE Manager Server 4.3:kernel-default-devel-5.14.21-150400.24.170.2.x86_64",
          "SUSE Manager Server 4.3:kernel-devel-5.14.21-150400.24.170.1.noarch",
          "SUSE Manager Server 4.3:kernel-macros-5.14.21-150400.24.170.1.noarch",
          "SUSE Manager Server 4.3:kernel-source-5.14.21-150400.24.170.1.noarch",
          "SUSE Manager Server 4.3:kernel-syms-5.14.21-150400.24.170.1.ppc64le",
          "SUSE Manager Server 4.3:kernel-syms-5.14.21-150400.24.170.1.s390x",
          "SUSE Manager Server 4.3:kernel-syms-5.14.21-150400.24.170.1.x86_64",
          "SUSE Manager Server 4.3:kernel-zfcpdump-5.14.21-150400.24.170.2.s390x"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2022-50085",
          "url": "https://www.suse.com/security/cve/CVE-2022-50085"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1245147 for CVE-2022-50085",
          "url": "https://bugzilla.suse.com/1245147"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-64kb-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-64kb-devel-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-devel-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-devel-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-devel-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-docs-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-macros-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-obs-build-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-obs-build-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-source-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-syms-5.14.21-150400.24.170.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-syms-5.14.21-150400.24.170.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:reiserfs-kmp-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:reiserfs-kmp-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-64kb-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-64kb-devel-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-devel-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-docs-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-macros-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-source-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.170.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.170.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_170-default-1-150400.9.3.2.ppc64le",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_170-default-1-150400.9.3.2.s390x",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_170-default-1-150400.9.3.2.x86_64",
            "SUSE Linux Enterprise Micro 5.3:kernel-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise Micro 5.3:kernel-default-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise Micro 5.3:kernel-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Micro 5.3:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.aarch64",
            "SUSE Linux Enterprise Micro 5.3:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
            "SUSE Linux Enterprise Micro 5.4:kernel-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise Micro 5.4:kernel-default-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise Micro 5.4:kernel-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Micro 5.4:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.aarch64",
            "SUSE Linux Enterprise Micro 5.4:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-64kb-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-64kb-devel-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.aarch64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.ppc64le",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-devel-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-docs-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-macros-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-source-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.170.1.aarch64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.170.1.ppc64le",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.170.1.s390x",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.170.1.x86_64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-zfcpdump-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-devel-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-devel-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-devel-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-docs-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-macros-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-obs-build-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-obs-build-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-source-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-syms-5.14.21-150400.24.170.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-syms-5.14.21-150400.24.170.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Manager Proxy 4.3:kernel-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Manager Proxy 4.3:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
            "SUSE Manager Proxy 4.3:kernel-default-devel-5.14.21-150400.24.170.2.x86_64",
            "SUSE Manager Proxy 4.3:kernel-devel-5.14.21-150400.24.170.1.noarch",
            "SUSE Manager Proxy 4.3:kernel-macros-5.14.21-150400.24.170.1.noarch",
            "SUSE Manager Proxy 4.3:kernel-source-5.14.21-150400.24.170.1.noarch",
            "SUSE Manager Proxy 4.3:kernel-syms-5.14.21-150400.24.170.1.x86_64",
            "SUSE Manager Server 4.3:kernel-default-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Manager Server 4.3:kernel-default-5.14.21-150400.24.170.2.s390x",
            "SUSE Manager Server 4.3:kernel-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Manager Server 4.3:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.ppc64le",
            "SUSE Manager Server 4.3:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
            "SUSE Manager Server 4.3:kernel-default-devel-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Manager Server 4.3:kernel-default-devel-5.14.21-150400.24.170.2.s390x",
            "SUSE Manager Server 4.3:kernel-default-devel-5.14.21-150400.24.170.2.x86_64",
            "SUSE Manager Server 4.3:kernel-devel-5.14.21-150400.24.170.1.noarch",
            "SUSE Manager Server 4.3:kernel-macros-5.14.21-150400.24.170.1.noarch",
            "SUSE Manager Server 4.3:kernel-source-5.14.21-150400.24.170.1.noarch",
            "SUSE Manager Server 4.3:kernel-syms-5.14.21-150400.24.170.1.ppc64le",
            "SUSE Manager Server 4.3:kernel-syms-5.14.21-150400.24.170.1.s390x",
            "SUSE Manager Server 4.3:kernel-syms-5.14.21-150400.24.170.1.x86_64",
            "SUSE Manager Server 4.3:kernel-zfcpdump-5.14.21-150400.24.170.2.s390x"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 6.6,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:P/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
            "version": "3.1"
          },
          "products": [
            "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-64kb-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-64kb-devel-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-devel-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-devel-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-devel-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-docs-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-macros-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-obs-build-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-obs-build-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-source-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-syms-5.14.21-150400.24.170.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-syms-5.14.21-150400.24.170.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:reiserfs-kmp-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:reiserfs-kmp-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-64kb-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-64kb-devel-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-devel-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-docs-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-macros-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-source-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.170.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.170.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_170-default-1-150400.9.3.2.ppc64le",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_170-default-1-150400.9.3.2.s390x",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_170-default-1-150400.9.3.2.x86_64",
            "SUSE Linux Enterprise Micro 5.3:kernel-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise Micro 5.3:kernel-default-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise Micro 5.3:kernel-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Micro 5.3:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.aarch64",
            "SUSE Linux Enterprise Micro 5.3:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
            "SUSE Linux Enterprise Micro 5.4:kernel-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise Micro 5.4:kernel-default-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise Micro 5.4:kernel-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Micro 5.4:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.aarch64",
            "SUSE Linux Enterprise Micro 5.4:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-64kb-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-64kb-devel-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.aarch64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.ppc64le",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-devel-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-docs-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-macros-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-source-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.170.1.aarch64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.170.1.ppc64le",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.170.1.s390x",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.170.1.x86_64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-zfcpdump-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-devel-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-devel-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-devel-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-docs-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-macros-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-obs-build-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-obs-build-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-source-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-syms-5.14.21-150400.24.170.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-syms-5.14.21-150400.24.170.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Manager Proxy 4.3:kernel-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Manager Proxy 4.3:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
            "SUSE Manager Proxy 4.3:kernel-default-devel-5.14.21-150400.24.170.2.x86_64",
            "SUSE Manager Proxy 4.3:kernel-devel-5.14.21-150400.24.170.1.noarch",
            "SUSE Manager Proxy 4.3:kernel-macros-5.14.21-150400.24.170.1.noarch",
            "SUSE Manager Proxy 4.3:kernel-source-5.14.21-150400.24.170.1.noarch",
            "SUSE Manager Proxy 4.3:kernel-syms-5.14.21-150400.24.170.1.x86_64",
            "SUSE Manager Server 4.3:kernel-default-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Manager Server 4.3:kernel-default-5.14.21-150400.24.170.2.s390x",
            "SUSE Manager Server 4.3:kernel-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Manager Server 4.3:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.ppc64le",
            "SUSE Manager Server 4.3:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
            "SUSE Manager Server 4.3:kernel-default-devel-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Manager Server 4.3:kernel-default-devel-5.14.21-150400.24.170.2.s390x",
            "SUSE Manager Server 4.3:kernel-default-devel-5.14.21-150400.24.170.2.x86_64",
            "SUSE Manager Server 4.3:kernel-devel-5.14.21-150400.24.170.1.noarch",
            "SUSE Manager Server 4.3:kernel-macros-5.14.21-150400.24.170.1.noarch",
            "SUSE Manager Server 4.3:kernel-source-5.14.21-150400.24.170.1.noarch",
            "SUSE Manager Server 4.3:kernel-syms-5.14.21-150400.24.170.1.ppc64le",
            "SUSE Manager Server 4.3:kernel-syms-5.14.21-150400.24.170.1.s390x",
            "SUSE Manager Server 4.3:kernel-syms-5.14.21-150400.24.170.1.x86_64",
            "SUSE Manager Server 4.3:kernel-zfcpdump-5.14.21-150400.24.170.2.s390x"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2025-07-28T15:09:33Z",
          "details": "moderate"
        }
      ],
      "title": "CVE-2022-50085"
    },
    {
      "cve": "CVE-2022-50087",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2022-50087"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "In the Linux kernel, the following vulnerability has been resolved:\n\nfirmware: arm_scpi: Ensure scpi_info is not assigned if the probe fails\n\nWhen scpi probe fails, at any point, we need to ensure that the scpi_info\nis not set and will remain NULL until the probe succeeds. If it is not\ntaken care, then it could result use-after-free as the value is exported\nvia get_scpi_ops() and could refer to a memory allocated via devm_kzalloc()\nbut freed when the probe fails.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.170.2.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.170.2.s390x",
          "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.170.2.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.170.2.s390x",
          "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.170.2.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.170.2.s390x",
          "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.170.2.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.170.2.s390x",
          "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-64kb-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-64kb-devel-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-devel-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-devel-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-devel-5.14.21-150400.24.170.1.noarch",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-docs-5.14.21-150400.24.170.1.noarch",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-macros-5.14.21-150400.24.170.1.noarch",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-obs-build-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-obs-build-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-source-5.14.21-150400.24.170.1.noarch",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-syms-5.14.21-150400.24.170.1.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-syms-5.14.21-150400.24.170.1.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:reiserfs-kmp-default-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:reiserfs-kmp-default-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-64kb-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-64kb-devel-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-devel-5.14.21-150400.24.170.1.noarch",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-docs-5.14.21-150400.24.170.1.noarch",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-macros-5.14.21-150400.24.170.1.noarch",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-source-5.14.21-150400.24.170.1.noarch",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.170.1.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.170.1.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.170.2.ppc64le",
          "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.170.2.s390x",
          "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.170.2.ppc64le",
          "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.170.2.s390x",
          "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_170-default-1-150400.9.3.2.ppc64le",
          "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_170-default-1-150400.9.3.2.s390x",
          "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_170-default-1-150400.9.3.2.x86_64",
          "SUSE Linux Enterprise Micro 5.3:kernel-default-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise Micro 5.3:kernel-default-5.14.21-150400.24.170.2.s390x",
          "SUSE Linux Enterprise Micro 5.3:kernel-default-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise Micro 5.3:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.aarch64",
          "SUSE Linux Enterprise Micro 5.3:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
          "SUSE Linux Enterprise Micro 5.4:kernel-default-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise Micro 5.4:kernel-default-5.14.21-150400.24.170.2.s390x",
          "SUSE Linux Enterprise Micro 5.4:kernel-default-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise Micro 5.4:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.aarch64",
          "SUSE Linux Enterprise Micro 5.4:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-64kb-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-64kb-devel-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-5.14.21-150400.24.170.2.ppc64le",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-5.14.21-150400.24.170.2.s390x",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.aarch64",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.ppc64le",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.170.2.ppc64le",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.170.2.s390x",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-devel-5.14.21-150400.24.170.1.noarch",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-docs-5.14.21-150400.24.170.1.noarch",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-macros-5.14.21-150400.24.170.1.noarch",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.170.2.ppc64le",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.170.2.s390x",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-source-5.14.21-150400.24.170.1.noarch",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.170.1.aarch64",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.170.1.ppc64le",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.170.1.s390x",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.170.1.x86_64",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-zfcpdump-5.14.21-150400.24.170.2.s390x",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.170.2.ppc64le",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.170.2.s390x",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-5.14.21-150400.24.170.2.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-devel-5.14.21-150400.24.170.2.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-devel-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-devel-5.14.21-150400.24.170.1.noarch",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-docs-5.14.21-150400.24.170.1.noarch",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-macros-5.14.21-150400.24.170.1.noarch",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-obs-build-5.14.21-150400.24.170.2.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-obs-build-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-source-5.14.21-150400.24.170.1.noarch",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-syms-5.14.21-150400.24.170.1.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-syms-5.14.21-150400.24.170.1.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.170.2.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.170.2.x86_64",
          "SUSE Manager Proxy 4.3:kernel-default-5.14.21-150400.24.170.2.x86_64",
          "SUSE Manager Proxy 4.3:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
          "SUSE Manager Proxy 4.3:kernel-default-devel-5.14.21-150400.24.170.2.x86_64",
          "SUSE Manager Proxy 4.3:kernel-devel-5.14.21-150400.24.170.1.noarch",
          "SUSE Manager Proxy 4.3:kernel-macros-5.14.21-150400.24.170.1.noarch",
          "SUSE Manager Proxy 4.3:kernel-source-5.14.21-150400.24.170.1.noarch",
          "SUSE Manager Proxy 4.3:kernel-syms-5.14.21-150400.24.170.1.x86_64",
          "SUSE Manager Server 4.3:kernel-default-5.14.21-150400.24.170.2.ppc64le",
          "SUSE Manager Server 4.3:kernel-default-5.14.21-150400.24.170.2.s390x",
          "SUSE Manager Server 4.3:kernel-default-5.14.21-150400.24.170.2.x86_64",
          "SUSE Manager Server 4.3:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.ppc64le",
          "SUSE Manager Server 4.3:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
          "SUSE Manager Server 4.3:kernel-default-devel-5.14.21-150400.24.170.2.ppc64le",
          "SUSE Manager Server 4.3:kernel-default-devel-5.14.21-150400.24.170.2.s390x",
          "SUSE Manager Server 4.3:kernel-default-devel-5.14.21-150400.24.170.2.x86_64",
          "SUSE Manager Server 4.3:kernel-devel-5.14.21-150400.24.170.1.noarch",
          "SUSE Manager Server 4.3:kernel-macros-5.14.21-150400.24.170.1.noarch",
          "SUSE Manager Server 4.3:kernel-source-5.14.21-150400.24.170.1.noarch",
          "SUSE Manager Server 4.3:kernel-syms-5.14.21-150400.24.170.1.ppc64le",
          "SUSE Manager Server 4.3:kernel-syms-5.14.21-150400.24.170.1.s390x",
          "SUSE Manager Server 4.3:kernel-syms-5.14.21-150400.24.170.1.x86_64",
          "SUSE Manager Server 4.3:kernel-zfcpdump-5.14.21-150400.24.170.2.s390x"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2022-50087",
          "url": "https://www.suse.com/security/cve/CVE-2022-50087"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1245119 for CVE-2022-50087",
          "url": "https://bugzilla.suse.com/1245119"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1245294 for CVE-2022-50087",
          "url": "https://bugzilla.suse.com/1245294"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-64kb-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-64kb-devel-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-devel-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-devel-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-devel-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-docs-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-macros-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-obs-build-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-obs-build-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-source-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-syms-5.14.21-150400.24.170.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-syms-5.14.21-150400.24.170.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:reiserfs-kmp-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:reiserfs-kmp-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-64kb-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-64kb-devel-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-devel-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-docs-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-macros-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-source-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.170.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.170.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_170-default-1-150400.9.3.2.ppc64le",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_170-default-1-150400.9.3.2.s390x",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_170-default-1-150400.9.3.2.x86_64",
            "SUSE Linux Enterprise Micro 5.3:kernel-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise Micro 5.3:kernel-default-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise Micro 5.3:kernel-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Micro 5.3:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.aarch64",
            "SUSE Linux Enterprise Micro 5.3:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
            "SUSE Linux Enterprise Micro 5.4:kernel-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise Micro 5.4:kernel-default-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise Micro 5.4:kernel-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Micro 5.4:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.aarch64",
            "SUSE Linux Enterprise Micro 5.4:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-64kb-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-64kb-devel-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.aarch64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.ppc64le",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-devel-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-docs-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-macros-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-source-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.170.1.aarch64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.170.1.ppc64le",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.170.1.s390x",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.170.1.x86_64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-zfcpdump-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-devel-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-devel-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-devel-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-docs-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-macros-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-obs-build-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-obs-build-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-source-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-syms-5.14.21-150400.24.170.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-syms-5.14.21-150400.24.170.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Manager Proxy 4.3:kernel-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Manager Proxy 4.3:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
            "SUSE Manager Proxy 4.3:kernel-default-devel-5.14.21-150400.24.170.2.x86_64",
            "SUSE Manager Proxy 4.3:kernel-devel-5.14.21-150400.24.170.1.noarch",
            "SUSE Manager Proxy 4.3:kernel-macros-5.14.21-150400.24.170.1.noarch",
            "SUSE Manager Proxy 4.3:kernel-source-5.14.21-150400.24.170.1.noarch",
            "SUSE Manager Proxy 4.3:kernel-syms-5.14.21-150400.24.170.1.x86_64",
            "SUSE Manager Server 4.3:kernel-default-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Manager Server 4.3:kernel-default-5.14.21-150400.24.170.2.s390x",
            "SUSE Manager Server 4.3:kernel-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Manager Server 4.3:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.ppc64le",
            "SUSE Manager Server 4.3:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
            "SUSE Manager Server 4.3:kernel-default-devel-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Manager Server 4.3:kernel-default-devel-5.14.21-150400.24.170.2.s390x",
            "SUSE Manager Server 4.3:kernel-default-devel-5.14.21-150400.24.170.2.x86_64",
            "SUSE Manager Server 4.3:kernel-devel-5.14.21-150400.24.170.1.noarch",
            "SUSE Manager Server 4.3:kernel-macros-5.14.21-150400.24.170.1.noarch",
            "SUSE Manager Server 4.3:kernel-source-5.14.21-150400.24.170.1.noarch",
            "SUSE Manager Server 4.3:kernel-syms-5.14.21-150400.24.170.1.ppc64le",
            "SUSE Manager Server 4.3:kernel-syms-5.14.21-150400.24.170.1.s390x",
            "SUSE Manager Server 4.3:kernel-syms-5.14.21-150400.24.170.1.x86_64",
            "SUSE Manager Server 4.3:kernel-zfcpdump-5.14.21-150400.24.170.2.s390x"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 7,
            "baseSeverity": "HIGH",
            "vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H",
            "version": "3.1"
          },
          "products": [
            "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-64kb-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-64kb-devel-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-devel-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-devel-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-devel-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-docs-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-macros-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-obs-build-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-obs-build-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-source-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-syms-5.14.21-150400.24.170.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-syms-5.14.21-150400.24.170.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:reiserfs-kmp-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:reiserfs-kmp-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-64kb-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-64kb-devel-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-devel-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-docs-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-macros-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-source-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.170.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.170.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_170-default-1-150400.9.3.2.ppc64le",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_170-default-1-150400.9.3.2.s390x",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_170-default-1-150400.9.3.2.x86_64",
            "SUSE Linux Enterprise Micro 5.3:kernel-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise Micro 5.3:kernel-default-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise Micro 5.3:kernel-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Micro 5.3:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.aarch64",
            "SUSE Linux Enterprise Micro 5.3:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
            "SUSE Linux Enterprise Micro 5.4:kernel-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise Micro 5.4:kernel-default-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise Micro 5.4:kernel-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Micro 5.4:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.aarch64",
            "SUSE Linux Enterprise Micro 5.4:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-64kb-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-64kb-devel-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.aarch64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.ppc64le",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-devel-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-docs-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-macros-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-source-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.170.1.aarch64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.170.1.ppc64le",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.170.1.s390x",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.170.1.x86_64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-zfcpdump-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-devel-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-devel-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-devel-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-docs-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-macros-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-obs-build-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-obs-build-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-source-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-syms-5.14.21-150400.24.170.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-syms-5.14.21-150400.24.170.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Manager Proxy 4.3:kernel-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Manager Proxy 4.3:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
            "SUSE Manager Proxy 4.3:kernel-default-devel-5.14.21-150400.24.170.2.x86_64",
            "SUSE Manager Proxy 4.3:kernel-devel-5.14.21-150400.24.170.1.noarch",
            "SUSE Manager Proxy 4.3:kernel-macros-5.14.21-150400.24.170.1.noarch",
            "SUSE Manager Proxy 4.3:kernel-source-5.14.21-150400.24.170.1.noarch",
            "SUSE Manager Proxy 4.3:kernel-syms-5.14.21-150400.24.170.1.x86_64",
            "SUSE Manager Server 4.3:kernel-default-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Manager Server 4.3:kernel-default-5.14.21-150400.24.170.2.s390x",
            "SUSE Manager Server 4.3:kernel-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Manager Server 4.3:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.ppc64le",
            "SUSE Manager Server 4.3:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
            "SUSE Manager Server 4.3:kernel-default-devel-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Manager Server 4.3:kernel-default-devel-5.14.21-150400.24.170.2.s390x",
            "SUSE Manager Server 4.3:kernel-default-devel-5.14.21-150400.24.170.2.x86_64",
            "SUSE Manager Server 4.3:kernel-devel-5.14.21-150400.24.170.1.noarch",
            "SUSE Manager Server 4.3:kernel-macros-5.14.21-150400.24.170.1.noarch",
            "SUSE Manager Server 4.3:kernel-source-5.14.21-150400.24.170.1.noarch",
            "SUSE Manager Server 4.3:kernel-syms-5.14.21-150400.24.170.1.ppc64le",
            "SUSE Manager Server 4.3:kernel-syms-5.14.21-150400.24.170.1.s390x",
            "SUSE Manager Server 4.3:kernel-syms-5.14.21-150400.24.170.1.x86_64",
            "SUSE Manager Server 4.3:kernel-zfcpdump-5.14.21-150400.24.170.2.s390x"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2025-07-28T15:09:33Z",
          "details": "moderate"
        }
      ],
      "title": "CVE-2022-50087"
    },
    {
      "cve": "CVE-2022-50092",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2022-50092"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "In the Linux kernel, the following vulnerability has been resolved:\n\ndm thin: fix use-after-free crash in dm_sm_register_threshold_callback\n\nFault inject on pool metadata device reports:\n  BUG: KASAN: use-after-free in dm_pool_register_metadata_threshold+0x40/0x80\n  Read of size 8 at addr ffff8881b9d50068 by task dmsetup/950\n\n  CPU: 7 PID: 950 Comm: dmsetup Tainted: G        W         5.19.0-rc6 #1\n  Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.14.0-1.fc33 04/01/2014\n  Call Trace:\n   \u003cTASK\u003e\n   dump_stack_lvl+0x34/0x44\n   print_address_description.constprop.0.cold+0xeb/0x3f4\n   kasan_report.cold+0xe6/0x147\n   dm_pool_register_metadata_threshold+0x40/0x80\n   pool_ctr+0xa0a/0x1150\n   dm_table_add_target+0x2c8/0x640\n   table_load+0x1fd/0x430\n   ctl_ioctl+0x2c4/0x5a0\n   dm_ctl_ioctl+0xa/0x10\n   __x64_sys_ioctl+0xb3/0xd0\n   do_syscall_64+0x35/0x80\n   entry_SYSCALL_64_after_hwframe+0x46/0xb0\n\nThis can be easily reproduced using:\n  echo offline \u003e /sys/block/sda/device/state\n  dd if=/dev/zero of=/dev/mapper/thin bs=4k count=10\n  dmsetup load pool --table \"0 20971520 thin-pool /dev/sda /dev/sdb 128 0 0\"\n\nIf a metadata commit fails, the transaction will be aborted and the\nmetadata space maps will be destroyed. If a DM table reload then\nhappens for this failed thin-pool, a use-after-free will occur in\ndm_sm_register_threshold_callback (called from\ndm_pool_register_metadata_threshold).\n\nFix this by in dm_pool_register_metadata_threshold() by returning the\n-EINVAL error if the thin-pool is in fail mode. Also fail pool_ctr()\nwith a new error message: \"Error registering metadata threshold\".",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.170.2.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.170.2.s390x",
          "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.170.2.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.170.2.s390x",
          "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.170.2.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.170.2.s390x",
          "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.170.2.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.170.2.s390x",
          "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-64kb-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-64kb-devel-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-devel-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-devel-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-devel-5.14.21-150400.24.170.1.noarch",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-docs-5.14.21-150400.24.170.1.noarch",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-macros-5.14.21-150400.24.170.1.noarch",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-obs-build-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-obs-build-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-source-5.14.21-150400.24.170.1.noarch",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-syms-5.14.21-150400.24.170.1.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-syms-5.14.21-150400.24.170.1.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:reiserfs-kmp-default-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:reiserfs-kmp-default-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-64kb-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-64kb-devel-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-devel-5.14.21-150400.24.170.1.noarch",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-docs-5.14.21-150400.24.170.1.noarch",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-macros-5.14.21-150400.24.170.1.noarch",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-source-5.14.21-150400.24.170.1.noarch",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.170.1.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.170.1.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.170.2.ppc64le",
          "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.170.2.s390x",
          "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.170.2.ppc64le",
          "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.170.2.s390x",
          "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_170-default-1-150400.9.3.2.ppc64le",
          "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_170-default-1-150400.9.3.2.s390x",
          "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_170-default-1-150400.9.3.2.x86_64",
          "SUSE Linux Enterprise Micro 5.3:kernel-default-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise Micro 5.3:kernel-default-5.14.21-150400.24.170.2.s390x",
          "SUSE Linux Enterprise Micro 5.3:kernel-default-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise Micro 5.3:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.aarch64",
          "SUSE Linux Enterprise Micro 5.3:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
          "SUSE Linux Enterprise Micro 5.4:kernel-default-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise Micro 5.4:kernel-default-5.14.21-150400.24.170.2.s390x",
          "SUSE Linux Enterprise Micro 5.4:kernel-default-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise Micro 5.4:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.aarch64",
          "SUSE Linux Enterprise Micro 5.4:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-64kb-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-64kb-devel-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-5.14.21-150400.24.170.2.ppc64le",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-5.14.21-150400.24.170.2.s390x",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.aarch64",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.ppc64le",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.170.2.ppc64le",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.170.2.s390x",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-devel-5.14.21-150400.24.170.1.noarch",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-docs-5.14.21-150400.24.170.1.noarch",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-macros-5.14.21-150400.24.170.1.noarch",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.170.2.ppc64le",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.170.2.s390x",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-source-5.14.21-150400.24.170.1.noarch",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.170.1.aarch64",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.170.1.ppc64le",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.170.1.s390x",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.170.1.x86_64",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-zfcpdump-5.14.21-150400.24.170.2.s390x",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.170.2.ppc64le",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.170.2.s390x",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-5.14.21-150400.24.170.2.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-devel-5.14.21-150400.24.170.2.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-devel-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-devel-5.14.21-150400.24.170.1.noarch",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-docs-5.14.21-150400.24.170.1.noarch",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-macros-5.14.21-150400.24.170.1.noarch",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-obs-build-5.14.21-150400.24.170.2.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-obs-build-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-source-5.14.21-150400.24.170.1.noarch",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-syms-5.14.21-150400.24.170.1.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-syms-5.14.21-150400.24.170.1.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.170.2.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.170.2.x86_64",
          "SUSE Manager Proxy 4.3:kernel-default-5.14.21-150400.24.170.2.x86_64",
          "SUSE Manager Proxy 4.3:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
          "SUSE Manager Proxy 4.3:kernel-default-devel-5.14.21-150400.24.170.2.x86_64",
          "SUSE Manager Proxy 4.3:kernel-devel-5.14.21-150400.24.170.1.noarch",
          "SUSE Manager Proxy 4.3:kernel-macros-5.14.21-150400.24.170.1.noarch",
          "SUSE Manager Proxy 4.3:kernel-source-5.14.21-150400.24.170.1.noarch",
          "SUSE Manager Proxy 4.3:kernel-syms-5.14.21-150400.24.170.1.x86_64",
          "SUSE Manager Server 4.3:kernel-default-5.14.21-150400.24.170.2.ppc64le",
          "SUSE Manager Server 4.3:kernel-default-5.14.21-150400.24.170.2.s390x",
          "SUSE Manager Server 4.3:kernel-default-5.14.21-150400.24.170.2.x86_64",
          "SUSE Manager Server 4.3:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.ppc64le",
          "SUSE Manager Server 4.3:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
          "SUSE Manager Server 4.3:kernel-default-devel-5.14.21-150400.24.170.2.ppc64le",
          "SUSE Manager Server 4.3:kernel-default-devel-5.14.21-150400.24.170.2.s390x",
          "SUSE Manager Server 4.3:kernel-default-devel-5.14.21-150400.24.170.2.x86_64",
          "SUSE Manager Server 4.3:kernel-devel-5.14.21-150400.24.170.1.noarch",
          "SUSE Manager Server 4.3:kernel-macros-5.14.21-150400.24.170.1.noarch",
          "SUSE Manager Server 4.3:kernel-source-5.14.21-150400.24.170.1.noarch",
          "SUSE Manager Server 4.3:kernel-syms-5.14.21-150400.24.170.1.ppc64le",
          "SUSE Manager Server 4.3:kernel-syms-5.14.21-150400.24.170.1.s390x",
          "SUSE Manager Server 4.3:kernel-syms-5.14.21-150400.24.170.1.x86_64",
          "SUSE Manager Server 4.3:kernel-zfcpdump-5.14.21-150400.24.170.2.s390x"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2022-50092",
          "url": "https://www.suse.com/security/cve/CVE-2022-50092"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1244848 for CVE-2022-50092",
          "url": "https://bugzilla.suse.com/1244848"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-64kb-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-64kb-devel-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-devel-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-devel-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-devel-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-docs-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-macros-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-obs-build-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-obs-build-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-source-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-syms-5.14.21-150400.24.170.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-syms-5.14.21-150400.24.170.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:reiserfs-kmp-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:reiserfs-kmp-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-64kb-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-64kb-devel-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-devel-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-docs-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-macros-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-source-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.170.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.170.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_170-default-1-150400.9.3.2.ppc64le",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_170-default-1-150400.9.3.2.s390x",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_170-default-1-150400.9.3.2.x86_64",
            "SUSE Linux Enterprise Micro 5.3:kernel-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise Micro 5.3:kernel-default-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise Micro 5.3:kernel-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Micro 5.3:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.aarch64",
            "SUSE Linux Enterprise Micro 5.3:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
            "SUSE Linux Enterprise Micro 5.4:kernel-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise Micro 5.4:kernel-default-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise Micro 5.4:kernel-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Micro 5.4:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.aarch64",
            "SUSE Linux Enterprise Micro 5.4:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-64kb-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-64kb-devel-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.aarch64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.ppc64le",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-devel-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-docs-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-macros-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-source-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.170.1.aarch64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.170.1.ppc64le",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.170.1.s390x",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.170.1.x86_64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-zfcpdump-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-devel-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-devel-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-devel-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-docs-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-macros-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-obs-build-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-obs-build-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-source-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-syms-5.14.21-150400.24.170.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-syms-5.14.21-150400.24.170.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Manager Proxy 4.3:kernel-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Manager Proxy 4.3:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
            "SUSE Manager Proxy 4.3:kernel-default-devel-5.14.21-150400.24.170.2.x86_64",
            "SUSE Manager Proxy 4.3:kernel-devel-5.14.21-150400.24.170.1.noarch",
            "SUSE Manager Proxy 4.3:kernel-macros-5.14.21-150400.24.170.1.noarch",
            "SUSE Manager Proxy 4.3:kernel-source-5.14.21-150400.24.170.1.noarch",
            "SUSE Manager Proxy 4.3:kernel-syms-5.14.21-150400.24.170.1.x86_64",
            "SUSE Manager Server 4.3:kernel-default-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Manager Server 4.3:kernel-default-5.14.21-150400.24.170.2.s390x",
            "SUSE Manager Server 4.3:kernel-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Manager Server 4.3:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.ppc64le",
            "SUSE Manager Server 4.3:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
            "SUSE Manager Server 4.3:kernel-default-devel-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Manager Server 4.3:kernel-default-devel-5.14.21-150400.24.170.2.s390x",
            "SUSE Manager Server 4.3:kernel-default-devel-5.14.21-150400.24.170.2.x86_64",
            "SUSE Manager Server 4.3:kernel-devel-5.14.21-150400.24.170.1.noarch",
            "SUSE Manager Server 4.3:kernel-macros-5.14.21-150400.24.170.1.noarch",
            "SUSE Manager Server 4.3:kernel-source-5.14.21-150400.24.170.1.noarch",
            "SUSE Manager Server 4.3:kernel-syms-5.14.21-150400.24.170.1.ppc64le",
            "SUSE Manager Server 4.3:kernel-syms-5.14.21-150400.24.170.1.s390x",
            "SUSE Manager Server 4.3:kernel-syms-5.14.21-150400.24.170.1.x86_64",
            "SUSE Manager Server 4.3:kernel-zfcpdump-5.14.21-150400.24.170.2.s390x"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 5.5,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
            "version": "3.1"
          },
          "products": [
            "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-64kb-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-64kb-devel-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-devel-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-devel-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-devel-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-docs-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-macros-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-obs-build-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-obs-build-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-source-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-syms-5.14.21-150400.24.170.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-syms-5.14.21-150400.24.170.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:reiserfs-kmp-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:reiserfs-kmp-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-64kb-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-64kb-devel-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-devel-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-docs-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-macros-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-source-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.170.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.170.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_170-default-1-150400.9.3.2.ppc64le",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_170-default-1-150400.9.3.2.s390x",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_170-default-1-150400.9.3.2.x86_64",
            "SUSE Linux Enterprise Micro 5.3:kernel-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise Micro 5.3:kernel-default-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise Micro 5.3:kernel-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Micro 5.3:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.aarch64",
            "SUSE Linux Enterprise Micro 5.3:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
            "SUSE Linux Enterprise Micro 5.4:kernel-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise Micro 5.4:kernel-default-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise Micro 5.4:kernel-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Micro 5.4:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.aarch64",
            "SUSE Linux Enterprise Micro 5.4:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-64kb-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-64kb-devel-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.aarch64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.ppc64le",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-devel-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-docs-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-macros-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-source-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.170.1.aarch64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.170.1.ppc64le",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.170.1.s390x",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.170.1.x86_64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-zfcpdump-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-devel-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-devel-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-devel-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-docs-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-macros-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-obs-build-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-obs-build-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-source-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-syms-5.14.21-150400.24.170.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-syms-5.14.21-150400.24.170.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Manager Proxy 4.3:kernel-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Manager Proxy 4.3:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
            "SUSE Manager Proxy 4.3:kernel-default-devel-5.14.21-150400.24.170.2.x86_64",
            "SUSE Manager Proxy 4.3:kernel-devel-5.14.21-150400.24.170.1.noarch",
            "SUSE Manager Proxy 4.3:kernel-macros-5.14.21-150400.24.170.1.noarch",
            "SUSE Manager Proxy 4.3:kernel-source-5.14.21-150400.24.170.1.noarch",
            "SUSE Manager Proxy 4.3:kernel-syms-5.14.21-150400.24.170.1.x86_64",
            "SUSE Manager Server 4.3:kernel-default-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Manager Server 4.3:kernel-default-5.14.21-150400.24.170.2.s390x",
            "SUSE Manager Server 4.3:kernel-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Manager Server 4.3:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.ppc64le",
            "SUSE Manager Server 4.3:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
            "SUSE Manager Server 4.3:kernel-default-devel-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Manager Server 4.3:kernel-default-devel-5.14.21-150400.24.170.2.s390x",
            "SUSE Manager Server 4.3:kernel-default-devel-5.14.21-150400.24.170.2.x86_64",
            "SUSE Manager Server 4.3:kernel-devel-5.14.21-150400.24.170.1.noarch",
            "SUSE Manager Server 4.3:kernel-macros-5.14.21-150400.24.170.1.noarch",
            "SUSE Manager Server 4.3:kernel-source-5.14.21-150400.24.170.1.noarch",
            "SUSE Manager Server 4.3:kernel-syms-5.14.21-150400.24.170.1.ppc64le",
            "SUSE Manager Server 4.3:kernel-syms-5.14.21-150400.24.170.1.s390x",
            "SUSE Manager Server 4.3:kernel-syms-5.14.21-150400.24.170.1.x86_64",
            "SUSE Manager Server 4.3:kernel-zfcpdump-5.14.21-150400.24.170.2.s390x"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2025-07-28T15:09:33Z",
          "details": "moderate"
        }
      ],
      "title": "CVE-2022-50092"
    },
    {
      "cve": "CVE-2022-50093",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2022-50093"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "In the Linux kernel, the following vulnerability has been resolved:\n\niommu/vt-d: avoid invalid memory access via node_online(NUMA_NO_NODE)\n\nKASAN reports:\n\n[ 4.668325][ T0] BUG: KASAN: wild-memory-access in dmar_parse_one_rhsa (arch/x86/include/asm/bitops.h:214 arch/x86/include/asm/bitops.h:226 include/asm-generic/bitops/instrumented-non-atomic.h:142 include/linux/nodemask.h:415 drivers/iommu/intel/dmar.c:497)\n[    4.676149][    T0] Read of size 8 at addr 1fffffff85115558 by task swapper/0/0\n[    4.683454][    T0]\n[    4.685638][    T0] CPU: 0 PID: 0 Comm: swapper/0 Not tainted 5.19.0-rc3-00004-g0e862838f290 #1\n[    4.694331][    T0] Hardware name: Supermicro SYS-5018D-FN4T/X10SDV-8C-TLN4F, BIOS 1.1 03/02/2016\n[    4.703196][    T0] Call Trace:\n[    4.706334][    T0]  \u003cTASK\u003e\n[ 4.709133][ T0] ? dmar_parse_one_rhsa (arch/x86/include/asm/bitops.h:214 arch/x86/include/asm/bitops.h:226 include/asm-generic/bitops/instrumented-non-atomic.h:142 include/linux/nodemask.h:415 drivers/iommu/intel/dmar.c:497)\n\nafter converting the type of the first argument (@nr, bit number)\nof arch_test_bit() from `long` to `unsigned long`[0].\n\nUnder certain conditions (for example, when ACPI NUMA is disabled\nvia command line), pxm_to_node() can return %NUMA_NO_NODE (-1).\nIt is valid \u0027magic\u0027 number of NUMA node, but not valid bit number\nto use in bitops.\nnode_online() eventually descends to test_bit() without checking\nfor the input, assuming it\u0027s on caller side (which might be good\nfor perf-critical tasks). There, -1 becomes %ULONG_MAX which leads\nto an insane array index when calculating bit position in memory.\n\nFor now, add an explicit check for @node being not %NUMA_NO_NODE\nbefore calling test_bit(). The actual logics didn\u0027t change here\nat all.\n\n[0] https://github.com/norov/linux/commit/0e862838f290147ea9c16db852d8d494b552d38d",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.170.2.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.170.2.s390x",
          "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.170.2.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.170.2.s390x",
          "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.170.2.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.170.2.s390x",
          "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.170.2.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.170.2.s390x",
          "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-64kb-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-64kb-devel-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-devel-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-devel-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-devel-5.14.21-150400.24.170.1.noarch",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-docs-5.14.21-150400.24.170.1.noarch",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-macros-5.14.21-150400.24.170.1.noarch",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-obs-build-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-obs-build-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-source-5.14.21-150400.24.170.1.noarch",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-syms-5.14.21-150400.24.170.1.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-syms-5.14.21-150400.24.170.1.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:reiserfs-kmp-default-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:reiserfs-kmp-default-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-64kb-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-64kb-devel-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-devel-5.14.21-150400.24.170.1.noarch",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-docs-5.14.21-150400.24.170.1.noarch",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-macros-5.14.21-150400.24.170.1.noarch",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-source-5.14.21-150400.24.170.1.noarch",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.170.1.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.170.1.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.170.2.ppc64le",
          "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.170.2.s390x",
          "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.170.2.ppc64le",
          "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.170.2.s390x",
          "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_170-default-1-150400.9.3.2.ppc64le",
          "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_170-default-1-150400.9.3.2.s390x",
          "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_170-default-1-150400.9.3.2.x86_64",
          "SUSE Linux Enterprise Micro 5.3:kernel-default-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise Micro 5.3:kernel-default-5.14.21-150400.24.170.2.s390x",
          "SUSE Linux Enterprise Micro 5.3:kernel-default-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise Micro 5.3:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.aarch64",
          "SUSE Linux Enterprise Micro 5.3:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
          "SUSE Linux Enterprise Micro 5.4:kernel-default-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise Micro 5.4:kernel-default-5.14.21-150400.24.170.2.s390x",
          "SUSE Linux Enterprise Micro 5.4:kernel-default-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise Micro 5.4:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.aarch64",
          "SUSE Linux Enterprise Micro 5.4:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-64kb-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-64kb-devel-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-5.14.21-150400.24.170.2.ppc64le",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-5.14.21-150400.24.170.2.s390x",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.aarch64",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.ppc64le",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.170.2.ppc64le",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.170.2.s390x",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-devel-5.14.21-150400.24.170.1.noarch",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-docs-5.14.21-150400.24.170.1.noarch",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-macros-5.14.21-150400.24.170.1.noarch",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.170.2.ppc64le",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.170.2.s390x",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-source-5.14.21-150400.24.170.1.noarch",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.170.1.aarch64",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.170.1.ppc64le",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.170.1.s390x",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.170.1.x86_64",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-zfcpdump-5.14.21-150400.24.170.2.s390x",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.170.2.ppc64le",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.170.2.s390x",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-5.14.21-150400.24.170.2.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-devel-5.14.21-150400.24.170.2.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-devel-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-devel-5.14.21-150400.24.170.1.noarch",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-docs-5.14.21-150400.24.170.1.noarch",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-macros-5.14.21-150400.24.170.1.noarch",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-obs-build-5.14.21-150400.24.170.2.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-obs-build-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-source-5.14.21-150400.24.170.1.noarch",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-syms-5.14.21-150400.24.170.1.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-syms-5.14.21-150400.24.170.1.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.170.2.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.170.2.x86_64",
          "SUSE Manager Proxy 4.3:kernel-default-5.14.21-150400.24.170.2.x86_64",
          "SUSE Manager Proxy 4.3:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
          "SUSE Manager Proxy 4.3:kernel-default-devel-5.14.21-150400.24.170.2.x86_64",
          "SUSE Manager Proxy 4.3:kernel-devel-5.14.21-150400.24.170.1.noarch",
          "SUSE Manager Proxy 4.3:kernel-macros-5.14.21-150400.24.170.1.noarch",
          "SUSE Manager Proxy 4.3:kernel-source-5.14.21-150400.24.170.1.noarch",
          "SUSE Manager Proxy 4.3:kernel-syms-5.14.21-150400.24.170.1.x86_64",
          "SUSE Manager Server 4.3:kernel-default-5.14.21-150400.24.170.2.ppc64le",
          "SUSE Manager Server 4.3:kernel-default-5.14.21-150400.24.170.2.s390x",
          "SUSE Manager Server 4.3:kernel-default-5.14.21-150400.24.170.2.x86_64",
          "SUSE Manager Server 4.3:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.ppc64le",
          "SUSE Manager Server 4.3:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
          "SUSE Manager Server 4.3:kernel-default-devel-5.14.21-150400.24.170.2.ppc64le",
          "SUSE Manager Server 4.3:kernel-default-devel-5.14.21-150400.24.170.2.s390x",
          "SUSE Manager Server 4.3:kernel-default-devel-5.14.21-150400.24.170.2.x86_64",
          "SUSE Manager Server 4.3:kernel-devel-5.14.21-150400.24.170.1.noarch",
          "SUSE Manager Server 4.3:kernel-macros-5.14.21-150400.24.170.1.noarch",
          "SUSE Manager Server 4.3:kernel-source-5.14.21-150400.24.170.1.noarch",
          "SUSE Manager Server 4.3:kernel-syms-5.14.21-150400.24.170.1.ppc64le",
          "SUSE Manager Server 4.3:kernel-syms-5.14.21-150400.24.170.1.s390x",
          "SUSE Manager Server 4.3:kernel-syms-5.14.21-150400.24.170.1.x86_64",
          "SUSE Manager Server 4.3:kernel-zfcpdump-5.14.21-150400.24.170.2.s390x"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2022-50093",
          "url": "https://www.suse.com/security/cve/CVE-2022-50093"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1244849 for CVE-2022-50093",
          "url": "https://bugzilla.suse.com/1244849"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-64kb-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-64kb-devel-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-devel-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-devel-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-devel-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-docs-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-macros-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-obs-build-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-obs-build-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-source-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-syms-5.14.21-150400.24.170.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-syms-5.14.21-150400.24.170.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:reiserfs-kmp-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:reiserfs-kmp-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-64kb-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-64kb-devel-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-devel-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-docs-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-macros-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-source-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.170.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.170.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_170-default-1-150400.9.3.2.ppc64le",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_170-default-1-150400.9.3.2.s390x",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_170-default-1-150400.9.3.2.x86_64",
            "SUSE Linux Enterprise Micro 5.3:kernel-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise Micro 5.3:kernel-default-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise Micro 5.3:kernel-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Micro 5.3:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.aarch64",
            "SUSE Linux Enterprise Micro 5.3:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
            "SUSE Linux Enterprise Micro 5.4:kernel-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise Micro 5.4:kernel-default-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise Micro 5.4:kernel-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Micro 5.4:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.aarch64",
            "SUSE Linux Enterprise Micro 5.4:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-64kb-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-64kb-devel-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.aarch64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.ppc64le",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-devel-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-docs-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-macros-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-source-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.170.1.aarch64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.170.1.ppc64le",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.170.1.s390x",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.170.1.x86_64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-zfcpdump-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-devel-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-devel-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-devel-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-docs-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-macros-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-obs-build-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-obs-build-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-source-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-syms-5.14.21-150400.24.170.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-syms-5.14.21-150400.24.170.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Manager Proxy 4.3:kernel-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Manager Proxy 4.3:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
            "SUSE Manager Proxy 4.3:kernel-default-devel-5.14.21-150400.24.170.2.x86_64",
            "SUSE Manager Proxy 4.3:kernel-devel-5.14.21-150400.24.170.1.noarch",
            "SUSE Manager Proxy 4.3:kernel-macros-5.14.21-150400.24.170.1.noarch",
            "SUSE Manager Proxy 4.3:kernel-source-5.14.21-150400.24.170.1.noarch",
            "SUSE Manager Proxy 4.3:kernel-syms-5.14.21-150400.24.170.1.x86_64",
            "SUSE Manager Server 4.3:kernel-default-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Manager Server 4.3:kernel-default-5.14.21-150400.24.170.2.s390x",
            "SUSE Manager Server 4.3:kernel-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Manager Server 4.3:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.ppc64le",
            "SUSE Manager Server 4.3:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
            "SUSE Manager Server 4.3:kernel-default-devel-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Manager Server 4.3:kernel-default-devel-5.14.21-150400.24.170.2.s390x",
            "SUSE Manager Server 4.3:kernel-default-devel-5.14.21-150400.24.170.2.x86_64",
            "SUSE Manager Server 4.3:kernel-devel-5.14.21-150400.24.170.1.noarch",
            "SUSE Manager Server 4.3:kernel-macros-5.14.21-150400.24.170.1.noarch",
            "SUSE Manager Server 4.3:kernel-source-5.14.21-150400.24.170.1.noarch",
            "SUSE Manager Server 4.3:kernel-syms-5.14.21-150400.24.170.1.ppc64le",
            "SUSE Manager Server 4.3:kernel-syms-5.14.21-150400.24.170.1.s390x",
            "SUSE Manager Server 4.3:kernel-syms-5.14.21-150400.24.170.1.x86_64",
            "SUSE Manager Server 4.3:kernel-zfcpdump-5.14.21-150400.24.170.2.s390x"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 5.5,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
            "version": "3.1"
          },
          "products": [
            "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-64kb-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-64kb-devel-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-devel-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-devel-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-devel-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-docs-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-macros-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-obs-build-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-obs-build-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-source-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-syms-5.14.21-150400.24.170.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-syms-5.14.21-150400.24.170.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:reiserfs-kmp-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:reiserfs-kmp-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-64kb-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-64kb-devel-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-devel-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-docs-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-macros-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-source-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.170.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.170.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_170-default-1-150400.9.3.2.ppc64le",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_170-default-1-150400.9.3.2.s390x",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_170-default-1-150400.9.3.2.x86_64",
            "SUSE Linux Enterprise Micro 5.3:kernel-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise Micro 5.3:kernel-default-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise Micro 5.3:kernel-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Micro 5.3:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.aarch64",
            "SUSE Linux Enterprise Micro 5.3:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
            "SUSE Linux Enterprise Micro 5.4:kernel-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise Micro 5.4:kernel-default-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise Micro 5.4:kernel-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Micro 5.4:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.aarch64",
            "SUSE Linux Enterprise Micro 5.4:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-64kb-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-64kb-devel-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.aarch64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.ppc64le",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-devel-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-docs-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-macros-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-source-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.170.1.aarch64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.170.1.ppc64le",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.170.1.s390x",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.170.1.x86_64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-zfcpdump-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-devel-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-devel-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-devel-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-docs-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-macros-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-obs-build-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-obs-build-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-source-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-syms-5.14.21-150400.24.170.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-syms-5.14.21-150400.24.170.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Manager Proxy 4.3:kernel-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Manager Proxy 4.3:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
            "SUSE Manager Proxy 4.3:kernel-default-devel-5.14.21-150400.24.170.2.x86_64",
            "SUSE Manager Proxy 4.3:kernel-devel-5.14.21-150400.24.170.1.noarch",
            "SUSE Manager Proxy 4.3:kernel-macros-5.14.21-150400.24.170.1.noarch",
            "SUSE Manager Proxy 4.3:kernel-source-5.14.21-150400.24.170.1.noarch",
            "SUSE Manager Proxy 4.3:kernel-syms-5.14.21-150400.24.170.1.x86_64",
            "SUSE Manager Server 4.3:kernel-default-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Manager Server 4.3:kernel-default-5.14.21-150400.24.170.2.s390x",
            "SUSE Manager Server 4.3:kernel-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Manager Server 4.3:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.ppc64le",
            "SUSE Manager Server 4.3:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
            "SUSE Manager Server 4.3:kernel-default-devel-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Manager Server 4.3:kernel-default-devel-5.14.21-150400.24.170.2.s390x",
            "SUSE Manager Server 4.3:kernel-default-devel-5.14.21-150400.24.170.2.x86_64",
            "SUSE Manager Server 4.3:kernel-devel-5.14.21-150400.24.170.1.noarch",
            "SUSE Manager Server 4.3:kernel-macros-5.14.21-150400.24.170.1.noarch",
            "SUSE Manager Server 4.3:kernel-source-5.14.21-150400.24.170.1.noarch",
            "SUSE Manager Server 4.3:kernel-syms-5.14.21-150400.24.170.1.ppc64le",
            "SUSE Manager Server 4.3:kernel-syms-5.14.21-150400.24.170.1.s390x",
            "SUSE Manager Server 4.3:kernel-syms-5.14.21-150400.24.170.1.x86_64",
            "SUSE Manager Server 4.3:kernel-zfcpdump-5.14.21-150400.24.170.2.s390x"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2025-07-28T15:09:33Z",
          "details": "moderate"
        }
      ],
      "title": "CVE-2022-50093"
    },
    {
      "cve": "CVE-2022-50094",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2022-50094"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "In the Linux kernel, the following vulnerability has been resolved:\n\nspmi: trace: fix stack-out-of-bound access in SPMI tracing functions\n\ntrace_spmi_write_begin() and trace_spmi_read_end() both call\nmemcpy() with a length of \"len + 1\".  This leads to one extra\nbyte being read beyond the end of the specified buffer.  Fix\nthis out-of-bound memory access by using a length of \"len\"\ninstead.\n\nHere is a KASAN log showing the issue:\n\nBUG: KASAN: stack-out-of-bounds in trace_event_raw_event_spmi_read_end+0x1d0/0x234\nRead of size 2 at addr ffffffc0265b7540 by task thermal@2.0-ser/1314\n...\nCall trace:\n dump_backtrace+0x0/0x3e8\n show_stack+0x2c/0x3c\n dump_stack_lvl+0xdc/0x11c\n print_address_description+0x74/0x384\n kasan_report+0x188/0x268\n kasan_check_range+0x270/0x2b0\n memcpy+0x90/0xe8\n trace_event_raw_event_spmi_read_end+0x1d0/0x234\n spmi_read_cmd+0x294/0x3ac\n spmi_ext_register_readl+0x84/0x9c\n regmap_spmi_ext_read+0x144/0x1b0 [regmap_spmi]\n _regmap_raw_read+0x40c/0x754\n regmap_raw_read+0x3a0/0x514\n regmap_bulk_read+0x418/0x494\n adc5_gen3_poll_wait_hs+0xe8/0x1e0 [qcom_spmi_adc5_gen3]\n ...\n __arm64_sys_read+0x4c/0x60\n invoke_syscall+0x80/0x218\n el0_svc_common+0xec/0x1c8\n ...\n\naddr ffffffc0265b7540 is located in stack of task thermal@2.0-ser/1314 at offset 32 in frame:\n adc5_gen3_poll_wait_hs+0x0/0x1e0 [qcom_spmi_adc5_gen3]\n\nthis frame has 1 object:\n [32, 33) \u0027status\u0027\n\nMemory state around the buggy address:\n ffffffc0265b7400: 00 00 00 00 00 00 00 00 00 00 00 00 f1 f1 f1 f1\n ffffffc0265b7480: 04 f3 f3 f3 00 00 00 00 00 00 00 00 00 00 00 00\n\u003effffffc0265b7500: 00 00 00 00 f1 f1 f1 f1 01 f3 f3 f3 00 00 00 00\n                                           ^\n ffffffc0265b7580: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00\n ffffffc0265b7600: f1 f1 f1 f1 01 f2 07 f2 f2 f2 01 f3 00 00 00 00\n==================================================================",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.170.2.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.170.2.s390x",
          "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.170.2.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.170.2.s390x",
          "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.170.2.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.170.2.s390x",
          "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.170.2.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.170.2.s390x",
          "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-64kb-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-64kb-devel-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-devel-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-devel-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-devel-5.14.21-150400.24.170.1.noarch",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-docs-5.14.21-150400.24.170.1.noarch",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-macros-5.14.21-150400.24.170.1.noarch",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-obs-build-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-obs-build-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-source-5.14.21-150400.24.170.1.noarch",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-syms-5.14.21-150400.24.170.1.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-syms-5.14.21-150400.24.170.1.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:reiserfs-kmp-default-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:reiserfs-kmp-default-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-64kb-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-64kb-devel-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-devel-5.14.21-150400.24.170.1.noarch",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-docs-5.14.21-150400.24.170.1.noarch",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-macros-5.14.21-150400.24.170.1.noarch",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-source-5.14.21-150400.24.170.1.noarch",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.170.1.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.170.1.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.170.2.ppc64le",
          "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.170.2.s390x",
          "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.170.2.ppc64le",
          "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.170.2.s390x",
          "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_170-default-1-150400.9.3.2.ppc64le",
          "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_170-default-1-150400.9.3.2.s390x",
          "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_170-default-1-150400.9.3.2.x86_64",
          "SUSE Linux Enterprise Micro 5.3:kernel-default-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise Micro 5.3:kernel-default-5.14.21-150400.24.170.2.s390x",
          "SUSE Linux Enterprise Micro 5.3:kernel-default-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise Micro 5.3:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.aarch64",
          "SUSE Linux Enterprise Micro 5.3:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
          "SUSE Linux Enterprise Micro 5.4:kernel-default-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise Micro 5.4:kernel-default-5.14.21-150400.24.170.2.s390x",
          "SUSE Linux Enterprise Micro 5.4:kernel-default-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise Micro 5.4:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.aarch64",
          "SUSE Linux Enterprise Micro 5.4:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-64kb-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-64kb-devel-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-5.14.21-150400.24.170.2.ppc64le",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-5.14.21-150400.24.170.2.s390x",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.aarch64",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.ppc64le",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.170.2.ppc64le",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.170.2.s390x",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-devel-5.14.21-150400.24.170.1.noarch",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-docs-5.14.21-150400.24.170.1.noarch",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-macros-5.14.21-150400.24.170.1.noarch",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.170.2.ppc64le",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.170.2.s390x",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-source-5.14.21-150400.24.170.1.noarch",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.170.1.aarch64",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.170.1.ppc64le",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.170.1.s390x",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.170.1.x86_64",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-zfcpdump-5.14.21-150400.24.170.2.s390x",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.170.2.ppc64le",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.170.2.s390x",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-5.14.21-150400.24.170.2.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-devel-5.14.21-150400.24.170.2.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-devel-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-devel-5.14.21-150400.24.170.1.noarch",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-docs-5.14.21-150400.24.170.1.noarch",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-macros-5.14.21-150400.24.170.1.noarch",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-obs-build-5.14.21-150400.24.170.2.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-obs-build-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-source-5.14.21-150400.24.170.1.noarch",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-syms-5.14.21-150400.24.170.1.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-syms-5.14.21-150400.24.170.1.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.170.2.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.170.2.x86_64",
          "SUSE Manager Proxy 4.3:kernel-default-5.14.21-150400.24.170.2.x86_64",
          "SUSE Manager Proxy 4.3:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
          "SUSE Manager Proxy 4.3:kernel-default-devel-5.14.21-150400.24.170.2.x86_64",
          "SUSE Manager Proxy 4.3:kernel-devel-5.14.21-150400.24.170.1.noarch",
          "SUSE Manager Proxy 4.3:kernel-macros-5.14.21-150400.24.170.1.noarch",
          "SUSE Manager Proxy 4.3:kernel-source-5.14.21-150400.24.170.1.noarch",
          "SUSE Manager Proxy 4.3:kernel-syms-5.14.21-150400.24.170.1.x86_64",
          "SUSE Manager Server 4.3:kernel-default-5.14.21-150400.24.170.2.ppc64le",
          "SUSE Manager Server 4.3:kernel-default-5.14.21-150400.24.170.2.s390x",
          "SUSE Manager Server 4.3:kernel-default-5.14.21-150400.24.170.2.x86_64",
          "SUSE Manager Server 4.3:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.ppc64le",
          "SUSE Manager Server 4.3:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
          "SUSE Manager Server 4.3:kernel-default-devel-5.14.21-150400.24.170.2.ppc64le",
          "SUSE Manager Server 4.3:kernel-default-devel-5.14.21-150400.24.170.2.s390x",
          "SUSE Manager Server 4.3:kernel-default-devel-5.14.21-150400.24.170.2.x86_64",
          "SUSE Manager Server 4.3:kernel-devel-5.14.21-150400.24.170.1.noarch",
          "SUSE Manager Server 4.3:kernel-macros-5.14.21-150400.24.170.1.noarch",
          "SUSE Manager Server 4.3:kernel-source-5.14.21-150400.24.170.1.noarch",
          "SUSE Manager Server 4.3:kernel-syms-5.14.21-150400.24.170.1.ppc64le",
          "SUSE Manager Server 4.3:kernel-syms-5.14.21-150400.24.170.1.s390x",
          "SUSE Manager Server 4.3:kernel-syms-5.14.21-150400.24.170.1.x86_64",
          "SUSE Manager Server 4.3:kernel-zfcpdump-5.14.21-150400.24.170.2.s390x"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2022-50094",
          "url": "https://www.suse.com/security/cve/CVE-2022-50094"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1244851 for CVE-2022-50094",
          "url": "https://bugzilla.suse.com/1244851"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-64kb-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-64kb-devel-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-devel-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-devel-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-devel-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-docs-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-macros-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-obs-build-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-obs-build-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-source-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-syms-5.14.21-150400.24.170.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-syms-5.14.21-150400.24.170.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:reiserfs-kmp-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:reiserfs-kmp-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-64kb-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-64kb-devel-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-devel-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-docs-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-macros-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-source-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.170.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.170.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_170-default-1-150400.9.3.2.ppc64le",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_170-default-1-150400.9.3.2.s390x",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_170-default-1-150400.9.3.2.x86_64",
            "SUSE Linux Enterprise Micro 5.3:kernel-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise Micro 5.3:kernel-default-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise Micro 5.3:kernel-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Micro 5.3:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.aarch64",
            "SUSE Linux Enterprise Micro 5.3:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
            "SUSE Linux Enterprise Micro 5.4:kernel-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise Micro 5.4:kernel-default-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise Micro 5.4:kernel-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Micro 5.4:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.aarch64",
            "SUSE Linux Enterprise Micro 5.4:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-64kb-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-64kb-devel-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.aarch64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.ppc64le",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-devel-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-docs-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-macros-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-source-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.170.1.aarch64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.170.1.ppc64le",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.170.1.s390x",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.170.1.x86_64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-zfcpdump-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-devel-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-devel-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-devel-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-docs-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-macros-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-obs-build-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-obs-build-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-source-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-syms-5.14.21-150400.24.170.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-syms-5.14.21-150400.24.170.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Manager Proxy 4.3:kernel-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Manager Proxy 4.3:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
            "SUSE Manager Proxy 4.3:kernel-default-devel-5.14.21-150400.24.170.2.x86_64",
            "SUSE Manager Proxy 4.3:kernel-devel-5.14.21-150400.24.170.1.noarch",
            "SUSE Manager Proxy 4.3:kernel-macros-5.14.21-150400.24.170.1.noarch",
            "SUSE Manager Proxy 4.3:kernel-source-5.14.21-150400.24.170.1.noarch",
            "SUSE Manager Proxy 4.3:kernel-syms-5.14.21-150400.24.170.1.x86_64",
            "SUSE Manager Server 4.3:kernel-default-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Manager Server 4.3:kernel-default-5.14.21-150400.24.170.2.s390x",
            "SUSE Manager Server 4.3:kernel-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Manager Server 4.3:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.ppc64le",
            "SUSE Manager Server 4.3:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
            "SUSE Manager Server 4.3:kernel-default-devel-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Manager Server 4.3:kernel-default-devel-5.14.21-150400.24.170.2.s390x",
            "SUSE Manager Server 4.3:kernel-default-devel-5.14.21-150400.24.170.2.x86_64",
            "SUSE Manager Server 4.3:kernel-devel-5.14.21-150400.24.170.1.noarch",
            "SUSE Manager Server 4.3:kernel-macros-5.14.21-150400.24.170.1.noarch",
            "SUSE Manager Server 4.3:kernel-source-5.14.21-150400.24.170.1.noarch",
            "SUSE Manager Server 4.3:kernel-syms-5.14.21-150400.24.170.1.ppc64le",
            "SUSE Manager Server 4.3:kernel-syms-5.14.21-150400.24.170.1.s390x",
            "SUSE Manager Server 4.3:kernel-syms-5.14.21-150400.24.170.1.x86_64",
            "SUSE Manager Server 4.3:kernel-zfcpdump-5.14.21-150400.24.170.2.s390x"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 5.5,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
            "version": "3.1"
          },
          "products": [
            "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-64kb-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-64kb-devel-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-devel-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-devel-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-devel-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-docs-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-macros-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-obs-build-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-obs-build-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-source-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-syms-5.14.21-150400.24.170.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-syms-5.14.21-150400.24.170.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:reiserfs-kmp-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:reiserfs-kmp-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-64kb-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-64kb-devel-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-devel-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-docs-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-macros-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-source-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.170.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.170.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_170-default-1-150400.9.3.2.ppc64le",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_170-default-1-150400.9.3.2.s390x",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_170-default-1-150400.9.3.2.x86_64",
            "SUSE Linux Enterprise Micro 5.3:kernel-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise Micro 5.3:kernel-default-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise Micro 5.3:kernel-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Micro 5.3:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.aarch64",
            "SUSE Linux Enterprise Micro 5.3:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
            "SUSE Linux Enterprise Micro 5.4:kernel-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise Micro 5.4:kernel-default-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise Micro 5.4:kernel-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Micro 5.4:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.aarch64",
            "SUSE Linux Enterprise Micro 5.4:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-64kb-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-64kb-devel-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.aarch64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.ppc64le",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-devel-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-docs-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-macros-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-source-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.170.1.aarch64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.170.1.ppc64le",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.170.1.s390x",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.170.1.x86_64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-zfcpdump-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-devel-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-devel-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-devel-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-docs-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-macros-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-obs-build-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-obs-build-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-source-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-syms-5.14.21-150400.24.170.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-syms-5.14.21-150400.24.170.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Manager Proxy 4.3:kernel-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Manager Proxy 4.3:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
            "SUSE Manager Proxy 4.3:kernel-default-devel-5.14.21-150400.24.170.2.x86_64",
            "SUSE Manager Proxy 4.3:kernel-devel-5.14.21-150400.24.170.1.noarch",
            "SUSE Manager Proxy 4.3:kernel-macros-5.14.21-150400.24.170.1.noarch",
            "SUSE Manager Proxy 4.3:kernel-source-5.14.21-150400.24.170.1.noarch",
            "SUSE Manager Proxy 4.3:kernel-syms-5.14.21-150400.24.170.1.x86_64",
            "SUSE Manager Server 4.3:kernel-default-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Manager Server 4.3:kernel-default-5.14.21-150400.24.170.2.s390x",
            "SUSE Manager Server 4.3:kernel-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Manager Server 4.3:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.ppc64le",
            "SUSE Manager Server 4.3:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
            "SUSE Manager Server 4.3:kernel-default-devel-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Manager Server 4.3:kernel-default-devel-5.14.21-150400.24.170.2.s390x",
            "SUSE Manager Server 4.3:kernel-default-devel-5.14.21-150400.24.170.2.x86_64",
            "SUSE Manager Server 4.3:kernel-devel-5.14.21-150400.24.170.1.noarch",
            "SUSE Manager Server 4.3:kernel-macros-5.14.21-150400.24.170.1.noarch",
            "SUSE Manager Server 4.3:kernel-source-5.14.21-150400.24.170.1.noarch",
            "SUSE Manager Server 4.3:kernel-syms-5.14.21-150400.24.170.1.ppc64le",
            "SUSE Manager Server 4.3:kernel-syms-5.14.21-150400.24.170.1.s390x",
            "SUSE Manager Server 4.3:kernel-syms-5.14.21-150400.24.170.1.x86_64",
            "SUSE Manager Server 4.3:kernel-zfcpdump-5.14.21-150400.24.170.2.s390x"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2025-07-28T15:09:33Z",
          "details": "moderate"
        }
      ],
      "title": "CVE-2022-50094"
    },
    {
      "cve": "CVE-2022-50095",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2022-50095"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "In the Linux kernel, the following vulnerability has been resolved:\n\nposix-cpu-timers: Cleanup CPU timers before freeing them during exec\n\nCommit 55e8c8eb2c7b (\"posix-cpu-timers: Store a reference to a pid not a\ntask\") started looking up tasks by PID when deleting a CPU timer.\n\nWhen a non-leader thread calls execve, it will switch PIDs with the leader\nprocess. Then, as it calls exit_itimers, posix_cpu_timer_del cannot find\nthe task because the timer still points out to the old PID.\n\nThat means that armed timers won\u0027t be disarmed, that is, they won\u0027t be\nremoved from the timerqueue_list. exit_itimers will still release their\nmemory, and when that list is later processed, it leads to a\nuse-after-free.\n\nClean up the timers from the de-threaded task before freeing them. This\nprevents a reported use-after-free.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.170.2.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.170.2.s390x",
          "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.170.2.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.170.2.s390x",
          "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.170.2.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.170.2.s390x",
          "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.170.2.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.170.2.s390x",
          "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-64kb-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-64kb-devel-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-devel-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-devel-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-devel-5.14.21-150400.24.170.1.noarch",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-docs-5.14.21-150400.24.170.1.noarch",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-macros-5.14.21-150400.24.170.1.noarch",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-obs-build-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-obs-build-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-source-5.14.21-150400.24.170.1.noarch",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-syms-5.14.21-150400.24.170.1.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-syms-5.14.21-150400.24.170.1.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:reiserfs-kmp-default-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:reiserfs-kmp-default-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-64kb-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-64kb-devel-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-devel-5.14.21-150400.24.170.1.noarch",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-docs-5.14.21-150400.24.170.1.noarch",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-macros-5.14.21-150400.24.170.1.noarch",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-source-5.14.21-150400.24.170.1.noarch",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.170.1.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.170.1.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.170.2.ppc64le",
          "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.170.2.s390x",
          "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.170.2.ppc64le",
          "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.170.2.s390x",
          "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_170-default-1-150400.9.3.2.ppc64le",
          "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_170-default-1-150400.9.3.2.s390x",
          "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_170-default-1-150400.9.3.2.x86_64",
          "SUSE Linux Enterprise Micro 5.3:kernel-default-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise Micro 5.3:kernel-default-5.14.21-150400.24.170.2.s390x",
          "SUSE Linux Enterprise Micro 5.3:kernel-default-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise Micro 5.3:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.aarch64",
          "SUSE Linux Enterprise Micro 5.3:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
          "SUSE Linux Enterprise Micro 5.4:kernel-default-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise Micro 5.4:kernel-default-5.14.21-150400.24.170.2.s390x",
          "SUSE Linux Enterprise Micro 5.4:kernel-default-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise Micro 5.4:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.aarch64",
          "SUSE Linux Enterprise Micro 5.4:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-64kb-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-64kb-devel-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-5.14.21-150400.24.170.2.ppc64le",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-5.14.21-150400.24.170.2.s390x",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.aarch64",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.ppc64le",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.170.2.ppc64le",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.170.2.s390x",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-devel-5.14.21-150400.24.170.1.noarch",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-docs-5.14.21-150400.24.170.1.noarch",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-macros-5.14.21-150400.24.170.1.noarch",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.170.2.ppc64le",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.170.2.s390x",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-source-5.14.21-150400.24.170.1.noarch",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.170.1.aarch64",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.170.1.ppc64le",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.170.1.s390x",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.170.1.x86_64",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-zfcpdump-5.14.21-150400.24.170.2.s390x",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.170.2.ppc64le",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.170.2.s390x",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-5.14.21-150400.24.170.2.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-devel-5.14.21-150400.24.170.2.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-devel-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-devel-5.14.21-150400.24.170.1.noarch",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-docs-5.14.21-150400.24.170.1.noarch",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-macros-5.14.21-150400.24.170.1.noarch",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-obs-build-5.14.21-150400.24.170.2.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-obs-build-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-source-5.14.21-150400.24.170.1.noarch",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-syms-5.14.21-150400.24.170.1.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-syms-5.14.21-150400.24.170.1.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.170.2.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.170.2.x86_64",
          "SUSE Manager Proxy 4.3:kernel-default-5.14.21-150400.24.170.2.x86_64",
          "SUSE Manager Proxy 4.3:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
          "SUSE Manager Proxy 4.3:kernel-default-devel-5.14.21-150400.24.170.2.x86_64",
          "SUSE Manager Proxy 4.3:kernel-devel-5.14.21-150400.24.170.1.noarch",
          "SUSE Manager Proxy 4.3:kernel-macros-5.14.21-150400.24.170.1.noarch",
          "SUSE Manager Proxy 4.3:kernel-source-5.14.21-150400.24.170.1.noarch",
          "SUSE Manager Proxy 4.3:kernel-syms-5.14.21-150400.24.170.1.x86_64",
          "SUSE Manager Server 4.3:kernel-default-5.14.21-150400.24.170.2.ppc64le",
          "SUSE Manager Server 4.3:kernel-default-5.14.21-150400.24.170.2.s390x",
          "SUSE Manager Server 4.3:kernel-default-5.14.21-150400.24.170.2.x86_64",
          "SUSE Manager Server 4.3:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.ppc64le",
          "SUSE Manager Server 4.3:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
          "SUSE Manager Server 4.3:kernel-default-devel-5.14.21-150400.24.170.2.ppc64le",
          "SUSE Manager Server 4.3:kernel-default-devel-5.14.21-150400.24.170.2.s390x",
          "SUSE Manager Server 4.3:kernel-default-devel-5.14.21-150400.24.170.2.x86_64",
          "SUSE Manager Server 4.3:kernel-devel-5.14.21-150400.24.170.1.noarch",
          "SUSE Manager Server 4.3:kernel-macros-5.14.21-150400.24.170.1.noarch",
          "SUSE Manager Server 4.3:kernel-source-5.14.21-150400.24.170.1.noarch",
          "SUSE Manager Server 4.3:kernel-syms-5.14.21-150400.24.170.1.ppc64le",
          "SUSE Manager Server 4.3:kernel-syms-5.14.21-150400.24.170.1.s390x",
          "SUSE Manager Server 4.3:kernel-syms-5.14.21-150400.24.170.1.x86_64",
          "SUSE Manager Server 4.3:kernel-zfcpdump-5.14.21-150400.24.170.2.s390x"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2022-50095",
          "url": "https://www.suse.com/security/cve/CVE-2022-50095"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1244846 for CVE-2022-50095",
          "url": "https://bugzilla.suse.com/1244846"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-64kb-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-64kb-devel-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-devel-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-devel-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-devel-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-docs-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-macros-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-obs-build-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-obs-build-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-source-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-syms-5.14.21-150400.24.170.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-syms-5.14.21-150400.24.170.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:reiserfs-kmp-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:reiserfs-kmp-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-64kb-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-64kb-devel-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-devel-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-docs-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-macros-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-source-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.170.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.170.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_170-default-1-150400.9.3.2.ppc64le",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_170-default-1-150400.9.3.2.s390x",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_170-default-1-150400.9.3.2.x86_64",
            "SUSE Linux Enterprise Micro 5.3:kernel-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise Micro 5.3:kernel-default-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise Micro 5.3:kernel-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Micro 5.3:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.aarch64",
            "SUSE Linux Enterprise Micro 5.3:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
            "SUSE Linux Enterprise Micro 5.4:kernel-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise Micro 5.4:kernel-default-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise Micro 5.4:kernel-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Micro 5.4:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.aarch64",
            "SUSE Linux Enterprise Micro 5.4:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-64kb-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-64kb-devel-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.aarch64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.ppc64le",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-devel-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-docs-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-macros-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-source-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.170.1.aarch64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.170.1.ppc64le",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.170.1.s390x",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.170.1.x86_64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-zfcpdump-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-devel-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-devel-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-devel-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-docs-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-macros-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-obs-build-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-obs-build-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-source-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-syms-5.14.21-150400.24.170.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-syms-5.14.21-150400.24.170.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Manager Proxy 4.3:kernel-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Manager Proxy 4.3:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
            "SUSE Manager Proxy 4.3:kernel-default-devel-5.14.21-150400.24.170.2.x86_64",
            "SUSE Manager Proxy 4.3:kernel-devel-5.14.21-150400.24.170.1.noarch",
            "SUSE Manager Proxy 4.3:kernel-macros-5.14.21-150400.24.170.1.noarch",
            "SUSE Manager Proxy 4.3:kernel-source-5.14.21-150400.24.170.1.noarch",
            "SUSE Manager Proxy 4.3:kernel-syms-5.14.21-150400.24.170.1.x86_64",
            "SUSE Manager Server 4.3:kernel-default-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Manager Server 4.3:kernel-default-5.14.21-150400.24.170.2.s390x",
            "SUSE Manager Server 4.3:kernel-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Manager Server 4.3:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.ppc64le",
            "SUSE Manager Server 4.3:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
            "SUSE Manager Server 4.3:kernel-default-devel-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Manager Server 4.3:kernel-default-devel-5.14.21-150400.24.170.2.s390x",
            "SUSE Manager Server 4.3:kernel-default-devel-5.14.21-150400.24.170.2.x86_64",
            "SUSE Manager Server 4.3:kernel-devel-5.14.21-150400.24.170.1.noarch",
            "SUSE Manager Server 4.3:kernel-macros-5.14.21-150400.24.170.1.noarch",
            "SUSE Manager Server 4.3:kernel-source-5.14.21-150400.24.170.1.noarch",
            "SUSE Manager Server 4.3:kernel-syms-5.14.21-150400.24.170.1.ppc64le",
            "SUSE Manager Server 4.3:kernel-syms-5.14.21-150400.24.170.1.s390x",
            "SUSE Manager Server 4.3:kernel-syms-5.14.21-150400.24.170.1.x86_64",
            "SUSE Manager Server 4.3:kernel-zfcpdump-5.14.21-150400.24.170.2.s390x"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 5.5,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
            "version": "3.1"
          },
          "products": [
            "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-64kb-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-64kb-devel-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-devel-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-devel-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-devel-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-docs-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-macros-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-obs-build-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-obs-build-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-source-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-syms-5.14.21-150400.24.170.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-syms-5.14.21-150400.24.170.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:reiserfs-kmp-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:reiserfs-kmp-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-64kb-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-64kb-devel-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-devel-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-docs-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-macros-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-source-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.170.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.170.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_170-default-1-150400.9.3.2.ppc64le",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_170-default-1-150400.9.3.2.s390x",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_170-default-1-150400.9.3.2.x86_64",
            "SUSE Linux Enterprise Micro 5.3:kernel-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise Micro 5.3:kernel-default-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise Micro 5.3:kernel-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Micro 5.3:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.aarch64",
            "SUSE Linux Enterprise Micro 5.3:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
            "SUSE Linux Enterprise Micro 5.4:kernel-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise Micro 5.4:kernel-default-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise Micro 5.4:kernel-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Micro 5.4:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.aarch64",
            "SUSE Linux Enterprise Micro 5.4:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-64kb-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-64kb-devel-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.aarch64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.ppc64le",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-devel-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-docs-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-macros-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-source-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.170.1.aarch64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.170.1.ppc64le",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.170.1.s390x",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.170.1.x86_64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-zfcpdump-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-devel-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-devel-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-devel-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-docs-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-macros-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-obs-build-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-obs-build-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-source-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-syms-5.14.21-150400.24.170.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-syms-5.14.21-150400.24.170.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Manager Proxy 4.3:kernel-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Manager Proxy 4.3:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
            "SUSE Manager Proxy 4.3:kernel-default-devel-5.14.21-150400.24.170.2.x86_64",
            "SUSE Manager Proxy 4.3:kernel-devel-5.14.21-150400.24.170.1.noarch",
            "SUSE Manager Proxy 4.3:kernel-macros-5.14.21-150400.24.170.1.noarch",
            "SUSE Manager Proxy 4.3:kernel-source-5.14.21-150400.24.170.1.noarch",
            "SUSE Manager Proxy 4.3:kernel-syms-5.14.21-150400.24.170.1.x86_64",
            "SUSE Manager Server 4.3:kernel-default-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Manager Server 4.3:kernel-default-5.14.21-150400.24.170.2.s390x",
            "SUSE Manager Server 4.3:kernel-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Manager Server 4.3:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.ppc64le",
            "SUSE Manager Server 4.3:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
            "SUSE Manager Server 4.3:kernel-default-devel-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Manager Server 4.3:kernel-default-devel-5.14.21-150400.24.170.2.s390x",
            "SUSE Manager Server 4.3:kernel-default-devel-5.14.21-150400.24.170.2.x86_64",
            "SUSE Manager Server 4.3:kernel-devel-5.14.21-150400.24.170.1.noarch",
            "SUSE Manager Server 4.3:kernel-macros-5.14.21-150400.24.170.1.noarch",
            "SUSE Manager Server 4.3:kernel-source-5.14.21-150400.24.170.1.noarch",
            "SUSE Manager Server 4.3:kernel-syms-5.14.21-150400.24.170.1.ppc64le",
            "SUSE Manager Server 4.3:kernel-syms-5.14.21-150400.24.170.1.s390x",
            "SUSE Manager Server 4.3:kernel-syms-5.14.21-150400.24.170.1.x86_64",
            "SUSE Manager Server 4.3:kernel-zfcpdump-5.14.21-150400.24.170.2.s390x"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2025-07-28T15:09:33Z",
          "details": "moderate"
        }
      ],
      "title": "CVE-2022-50095"
    },
    {
      "cve": "CVE-2022-50097",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2022-50097"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "In the Linux kernel, the following vulnerability has been resolved:\n\nvideo: fbdev: s3fb: Check the size of screen before memset_io()\n\nIn the function s3fb_set_par(), the value of \u0027screen_size\u0027 is\ncalculated by the user input. If the user provides the improper value,\nthe value of \u0027screen_size\u0027 may larger than \u0027info-\u003escreen_size\u0027, which\nmay cause the following bug:\n\n[   54.083733] BUG: unable to handle page fault for address: ffffc90003000000\n[   54.083742] #PF: supervisor write access in kernel mode\n[   54.083744] #PF: error_code(0x0002) - not-present page\n[   54.083760] RIP: 0010:memset_orig+0x33/0xb0\n[   54.083782] Call Trace:\n[   54.083788]  s3fb_set_par+0x1ec6/0x4040\n[   54.083806]  fb_set_var+0x604/0xeb0\n[   54.083836]  do_fb_ioctl+0x234/0x670\n\nFix the this by checking the value of \u0027screen_size\u0027 before memset_io().",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.170.2.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.170.2.s390x",
          "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.170.2.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.170.2.s390x",
          "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.170.2.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.170.2.s390x",
          "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.170.2.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.170.2.s390x",
          "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-64kb-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-64kb-devel-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-devel-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-devel-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-devel-5.14.21-150400.24.170.1.noarch",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-docs-5.14.21-150400.24.170.1.noarch",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-macros-5.14.21-150400.24.170.1.noarch",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-obs-build-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-obs-build-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-source-5.14.21-150400.24.170.1.noarch",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-syms-5.14.21-150400.24.170.1.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-syms-5.14.21-150400.24.170.1.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:reiserfs-kmp-default-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:reiserfs-kmp-default-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-64kb-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-64kb-devel-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-devel-5.14.21-150400.24.170.1.noarch",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-docs-5.14.21-150400.24.170.1.noarch",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-macros-5.14.21-150400.24.170.1.noarch",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-source-5.14.21-150400.24.170.1.noarch",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.170.1.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.170.1.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.170.2.ppc64le",
          "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.170.2.s390x",
          "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.170.2.ppc64le",
          "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.170.2.s390x",
          "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_170-default-1-150400.9.3.2.ppc64le",
          "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_170-default-1-150400.9.3.2.s390x",
          "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_170-default-1-150400.9.3.2.x86_64",
          "SUSE Linux Enterprise Micro 5.3:kernel-default-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise Micro 5.3:kernel-default-5.14.21-150400.24.170.2.s390x",
          "SUSE Linux Enterprise Micro 5.3:kernel-default-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise Micro 5.3:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.aarch64",
          "SUSE Linux Enterprise Micro 5.3:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
          "SUSE Linux Enterprise Micro 5.4:kernel-default-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise Micro 5.4:kernel-default-5.14.21-150400.24.170.2.s390x",
          "SUSE Linux Enterprise Micro 5.4:kernel-default-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise Micro 5.4:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.aarch64",
          "SUSE Linux Enterprise Micro 5.4:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-64kb-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-64kb-devel-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-5.14.21-150400.24.170.2.ppc64le",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-5.14.21-150400.24.170.2.s390x",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.aarch64",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.ppc64le",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.170.2.ppc64le",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.170.2.s390x",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-devel-5.14.21-150400.24.170.1.noarch",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-docs-5.14.21-150400.24.170.1.noarch",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-macros-5.14.21-150400.24.170.1.noarch",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.170.2.ppc64le",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.170.2.s390x",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-source-5.14.21-150400.24.170.1.noarch",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.170.1.aarch64",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.170.1.ppc64le",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.170.1.s390x",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.170.1.x86_64",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-zfcpdump-5.14.21-150400.24.170.2.s390x",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.170.2.ppc64le",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.170.2.s390x",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-5.14.21-150400.24.170.2.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-devel-5.14.21-150400.24.170.2.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-devel-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-devel-5.14.21-150400.24.170.1.noarch",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-docs-5.14.21-150400.24.170.1.noarch",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-macros-5.14.21-150400.24.170.1.noarch",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-obs-build-5.14.21-150400.24.170.2.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-obs-build-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-source-5.14.21-150400.24.170.1.noarch",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-syms-5.14.21-150400.24.170.1.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-syms-5.14.21-150400.24.170.1.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.170.2.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.170.2.x86_64",
          "SUSE Manager Proxy 4.3:kernel-default-5.14.21-150400.24.170.2.x86_64",
          "SUSE Manager Proxy 4.3:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
          "SUSE Manager Proxy 4.3:kernel-default-devel-5.14.21-150400.24.170.2.x86_64",
          "SUSE Manager Proxy 4.3:kernel-devel-5.14.21-150400.24.170.1.noarch",
          "SUSE Manager Proxy 4.3:kernel-macros-5.14.21-150400.24.170.1.noarch",
          "SUSE Manager Proxy 4.3:kernel-source-5.14.21-150400.24.170.1.noarch",
          "SUSE Manager Proxy 4.3:kernel-syms-5.14.21-150400.24.170.1.x86_64",
          "SUSE Manager Server 4.3:kernel-default-5.14.21-150400.24.170.2.ppc64le",
          "SUSE Manager Server 4.3:kernel-default-5.14.21-150400.24.170.2.s390x",
          "SUSE Manager Server 4.3:kernel-default-5.14.21-150400.24.170.2.x86_64",
          "SUSE Manager Server 4.3:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.ppc64le",
          "SUSE Manager Server 4.3:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
          "SUSE Manager Server 4.3:kernel-default-devel-5.14.21-150400.24.170.2.ppc64le",
          "SUSE Manager Server 4.3:kernel-default-devel-5.14.21-150400.24.170.2.s390x",
          "SUSE Manager Server 4.3:kernel-default-devel-5.14.21-150400.24.170.2.x86_64",
          "SUSE Manager Server 4.3:kernel-devel-5.14.21-150400.24.170.1.noarch",
          "SUSE Manager Server 4.3:kernel-macros-5.14.21-150400.24.170.1.noarch",
          "SUSE Manager Server 4.3:kernel-source-5.14.21-150400.24.170.1.noarch",
          "SUSE Manager Server 4.3:kernel-syms-5.14.21-150400.24.170.1.ppc64le",
          "SUSE Manager Server 4.3:kernel-syms-5.14.21-150400.24.170.1.s390x",
          "SUSE Manager Server 4.3:kernel-syms-5.14.21-150400.24.170.1.x86_64",
          "SUSE Manager Server 4.3:kernel-zfcpdump-5.14.21-150400.24.170.2.s390x"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2022-50097",
          "url": "https://www.suse.com/security/cve/CVE-2022-50097"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1244845 for CVE-2022-50097",
          "url": "https://bugzilla.suse.com/1244845"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-64kb-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-64kb-devel-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-devel-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-devel-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-devel-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-docs-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-macros-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-obs-build-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-obs-build-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-source-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-syms-5.14.21-150400.24.170.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-syms-5.14.21-150400.24.170.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:reiserfs-kmp-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:reiserfs-kmp-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-64kb-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-64kb-devel-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-devel-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-docs-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-macros-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-source-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.170.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.170.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_170-default-1-150400.9.3.2.ppc64le",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_170-default-1-150400.9.3.2.s390x",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_170-default-1-150400.9.3.2.x86_64",
            "SUSE Linux Enterprise Micro 5.3:kernel-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise Micro 5.3:kernel-default-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise Micro 5.3:kernel-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Micro 5.3:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.aarch64",
            "SUSE Linux Enterprise Micro 5.3:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
            "SUSE Linux Enterprise Micro 5.4:kernel-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise Micro 5.4:kernel-default-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise Micro 5.4:kernel-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Micro 5.4:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.aarch64",
            "SUSE Linux Enterprise Micro 5.4:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-64kb-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-64kb-devel-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.aarch64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.ppc64le",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-devel-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-docs-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-macros-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-source-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.170.1.aarch64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.170.1.ppc64le",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.170.1.s390x",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.170.1.x86_64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-zfcpdump-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-devel-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-devel-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-devel-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-docs-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-macros-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-obs-build-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-obs-build-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-source-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-syms-5.14.21-150400.24.170.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-syms-5.14.21-150400.24.170.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Manager Proxy 4.3:kernel-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Manager Proxy 4.3:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
            "SUSE Manager Proxy 4.3:kernel-default-devel-5.14.21-150400.24.170.2.x86_64",
            "SUSE Manager Proxy 4.3:kernel-devel-5.14.21-150400.24.170.1.noarch",
            "SUSE Manager Proxy 4.3:kernel-macros-5.14.21-150400.24.170.1.noarch",
            "SUSE Manager Proxy 4.3:kernel-source-5.14.21-150400.24.170.1.noarch",
            "SUSE Manager Proxy 4.3:kernel-syms-5.14.21-150400.24.170.1.x86_64",
            "SUSE Manager Server 4.3:kernel-default-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Manager Server 4.3:kernel-default-5.14.21-150400.24.170.2.s390x",
            "SUSE Manager Server 4.3:kernel-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Manager Server 4.3:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.ppc64le",
            "SUSE Manager Server 4.3:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
            "SUSE Manager Server 4.3:kernel-default-devel-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Manager Server 4.3:kernel-default-devel-5.14.21-150400.24.170.2.s390x",
            "SUSE Manager Server 4.3:kernel-default-devel-5.14.21-150400.24.170.2.x86_64",
            "SUSE Manager Server 4.3:kernel-devel-5.14.21-150400.24.170.1.noarch",
            "SUSE Manager Server 4.3:kernel-macros-5.14.21-150400.24.170.1.noarch",
            "SUSE Manager Server 4.3:kernel-source-5.14.21-150400.24.170.1.noarch",
            "SUSE Manager Server 4.3:kernel-syms-5.14.21-150400.24.170.1.ppc64le",
            "SUSE Manager Server 4.3:kernel-syms-5.14.21-150400.24.170.1.s390x",
            "SUSE Manager Server 4.3:kernel-syms-5.14.21-150400.24.170.1.x86_64",
            "SUSE Manager Server 4.3:kernel-zfcpdump-5.14.21-150400.24.170.2.s390x"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 5.5,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
            "version": "3.1"
          },
          "products": [
            "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-64kb-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-64kb-devel-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-devel-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-devel-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-devel-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-docs-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-macros-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-obs-build-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-obs-build-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-source-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-syms-5.14.21-150400.24.170.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-syms-5.14.21-150400.24.170.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:reiserfs-kmp-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:reiserfs-kmp-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-64kb-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-64kb-devel-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-devel-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-docs-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-macros-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-source-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.170.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.170.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_170-default-1-150400.9.3.2.ppc64le",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_170-default-1-150400.9.3.2.s390x",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_170-default-1-150400.9.3.2.x86_64",
            "SUSE Linux Enterprise Micro 5.3:kernel-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise Micro 5.3:kernel-default-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise Micro 5.3:kernel-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Micro 5.3:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.aarch64",
            "SUSE Linux Enterprise Micro 5.3:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
            "SUSE Linux Enterprise Micro 5.4:kernel-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise Micro 5.4:kernel-default-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise Micro 5.4:kernel-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Micro 5.4:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.aarch64",
            "SUSE Linux Enterprise Micro 5.4:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-64kb-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-64kb-devel-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.aarch64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.ppc64le",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-devel-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-docs-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-macros-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-source-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.170.1.aarch64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.170.1.ppc64le",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.170.1.s390x",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.170.1.x86_64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-zfcpdump-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-devel-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-devel-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-devel-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-docs-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-macros-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-obs-build-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-obs-build-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-source-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-syms-5.14.21-150400.24.170.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-syms-5.14.21-150400.24.170.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Manager Proxy 4.3:kernel-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Manager Proxy 4.3:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
            "SUSE Manager Proxy 4.3:kernel-default-devel-5.14.21-150400.24.170.2.x86_64",
            "SUSE Manager Proxy 4.3:kernel-devel-5.14.21-150400.24.170.1.noarch",
            "SUSE Manager Proxy 4.3:kernel-macros-5.14.21-150400.24.170.1.noarch",
            "SUSE Manager Proxy 4.3:kernel-source-5.14.21-150400.24.170.1.noarch",
            "SUSE Manager Proxy 4.3:kernel-syms-5.14.21-150400.24.170.1.x86_64",
            "SUSE Manager Server 4.3:kernel-default-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Manager Server 4.3:kernel-default-5.14.21-150400.24.170.2.s390x",
            "SUSE Manager Server 4.3:kernel-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Manager Server 4.3:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.ppc64le",
            "SUSE Manager Server 4.3:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
            "SUSE Manager Server 4.3:kernel-default-devel-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Manager Server 4.3:kernel-default-devel-5.14.21-150400.24.170.2.s390x",
            "SUSE Manager Server 4.3:kernel-default-devel-5.14.21-150400.24.170.2.x86_64",
            "SUSE Manager Server 4.3:kernel-devel-5.14.21-150400.24.170.1.noarch",
            "SUSE Manager Server 4.3:kernel-macros-5.14.21-150400.24.170.1.noarch",
            "SUSE Manager Server 4.3:kernel-source-5.14.21-150400.24.170.1.noarch",
            "SUSE Manager Server 4.3:kernel-syms-5.14.21-150400.24.170.1.ppc64le",
            "SUSE Manager Server 4.3:kernel-syms-5.14.21-150400.24.170.1.s390x",
            "SUSE Manager Server 4.3:kernel-syms-5.14.21-150400.24.170.1.x86_64",
            "SUSE Manager Server 4.3:kernel-zfcpdump-5.14.21-150400.24.170.2.s390x"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2025-07-28T15:09:33Z",
          "details": "moderate"
        }
      ],
      "title": "CVE-2022-50097"
    },
    {
      "cve": "CVE-2022-50098",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2022-50098"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "In the Linux kernel, the following vulnerability has been resolved:\n\nscsi: qla2xxx: Fix crash due to stale SRB access around I/O timeouts\n\nEnsure SRB is returned during I/O timeout error escalation. If that is not\npossible fail the escalation path.\n\nFollowing crash stack was seen:\n\nBUG: unable to handle kernel paging request at 0000002f56aa90f8\nIP: qla_chk_edif_rx_sa_delete_pending+0x14/0x30 [qla2xxx]\nCall Trace:\n ? qla2x00_status_entry+0x19f/0x1c50 [qla2xxx]\n ? qla2x00_start_sp+0x116/0x1170 [qla2xxx]\n ? dma_pool_alloc+0x1d6/0x210\n ? mempool_alloc+0x54/0x130\n ? qla24xx_process_response_queue+0x548/0x12b0 [qla2xxx]\n ? qla_do_work+0x2d/0x40 [qla2xxx]\n ? process_one_work+0x14c/0x390",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.170.2.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.170.2.s390x",
          "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.170.2.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.170.2.s390x",
          "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.170.2.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.170.2.s390x",
          "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.170.2.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.170.2.s390x",
          "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-64kb-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-64kb-devel-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-devel-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-devel-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-devel-5.14.21-150400.24.170.1.noarch",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-docs-5.14.21-150400.24.170.1.noarch",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-macros-5.14.21-150400.24.170.1.noarch",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-obs-build-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-obs-build-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-source-5.14.21-150400.24.170.1.noarch",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-syms-5.14.21-150400.24.170.1.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-syms-5.14.21-150400.24.170.1.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:reiserfs-kmp-default-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:reiserfs-kmp-default-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-64kb-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-64kb-devel-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-devel-5.14.21-150400.24.170.1.noarch",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-docs-5.14.21-150400.24.170.1.noarch",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-macros-5.14.21-150400.24.170.1.noarch",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-source-5.14.21-150400.24.170.1.noarch",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.170.1.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.170.1.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.170.2.ppc64le",
          "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.170.2.s390x",
          "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.170.2.ppc64le",
          "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.170.2.s390x",
          "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_170-default-1-150400.9.3.2.ppc64le",
          "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_170-default-1-150400.9.3.2.s390x",
          "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_170-default-1-150400.9.3.2.x86_64",
          "SUSE Linux Enterprise Micro 5.3:kernel-default-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise Micro 5.3:kernel-default-5.14.21-150400.24.170.2.s390x",
          "SUSE Linux Enterprise Micro 5.3:kernel-default-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise Micro 5.3:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.aarch64",
          "SUSE Linux Enterprise Micro 5.3:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
          "SUSE Linux Enterprise Micro 5.4:kernel-default-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise Micro 5.4:kernel-default-5.14.21-150400.24.170.2.s390x",
          "SUSE Linux Enterprise Micro 5.4:kernel-default-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise Micro 5.4:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.aarch64",
          "SUSE Linux Enterprise Micro 5.4:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-64kb-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-64kb-devel-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-5.14.21-150400.24.170.2.ppc64le",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-5.14.21-150400.24.170.2.s390x",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.aarch64",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.ppc64le",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.170.2.ppc64le",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.170.2.s390x",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-devel-5.14.21-150400.24.170.1.noarch",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-docs-5.14.21-150400.24.170.1.noarch",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-macros-5.14.21-150400.24.170.1.noarch",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.170.2.ppc64le",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.170.2.s390x",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-source-5.14.21-150400.24.170.1.noarch",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.170.1.aarch64",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.170.1.ppc64le",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.170.1.s390x",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.170.1.x86_64",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-zfcpdump-5.14.21-150400.24.170.2.s390x",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.170.2.ppc64le",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.170.2.s390x",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-5.14.21-150400.24.170.2.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-devel-5.14.21-150400.24.170.2.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-devel-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-devel-5.14.21-150400.24.170.1.noarch",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-docs-5.14.21-150400.24.170.1.noarch",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-macros-5.14.21-150400.24.170.1.noarch",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-obs-build-5.14.21-150400.24.170.2.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-obs-build-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-source-5.14.21-150400.24.170.1.noarch",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-syms-5.14.21-150400.24.170.1.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-syms-5.14.21-150400.24.170.1.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.170.2.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.170.2.x86_64",
          "SUSE Manager Proxy 4.3:kernel-default-5.14.21-150400.24.170.2.x86_64",
          "SUSE Manager Proxy 4.3:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
          "SUSE Manager Proxy 4.3:kernel-default-devel-5.14.21-150400.24.170.2.x86_64",
          "SUSE Manager Proxy 4.3:kernel-devel-5.14.21-150400.24.170.1.noarch",
          "SUSE Manager Proxy 4.3:kernel-macros-5.14.21-150400.24.170.1.noarch",
          "SUSE Manager Proxy 4.3:kernel-source-5.14.21-150400.24.170.1.noarch",
          "SUSE Manager Proxy 4.3:kernel-syms-5.14.21-150400.24.170.1.x86_64",
          "SUSE Manager Server 4.3:kernel-default-5.14.21-150400.24.170.2.ppc64le",
          "SUSE Manager Server 4.3:kernel-default-5.14.21-150400.24.170.2.s390x",
          "SUSE Manager Server 4.3:kernel-default-5.14.21-150400.24.170.2.x86_64",
          "SUSE Manager Server 4.3:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.ppc64le",
          "SUSE Manager Server 4.3:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
          "SUSE Manager Server 4.3:kernel-default-devel-5.14.21-150400.24.170.2.ppc64le",
          "SUSE Manager Server 4.3:kernel-default-devel-5.14.21-150400.24.170.2.s390x",
          "SUSE Manager Server 4.3:kernel-default-devel-5.14.21-150400.24.170.2.x86_64",
          "SUSE Manager Server 4.3:kernel-devel-5.14.21-150400.24.170.1.noarch",
          "SUSE Manager Server 4.3:kernel-macros-5.14.21-150400.24.170.1.noarch",
          "SUSE Manager Server 4.3:kernel-source-5.14.21-150400.24.170.1.noarch",
          "SUSE Manager Server 4.3:kernel-syms-5.14.21-150400.24.170.1.ppc64le",
          "SUSE Manager Server 4.3:kernel-syms-5.14.21-150400.24.170.1.s390x",
          "SUSE Manager Server 4.3:kernel-syms-5.14.21-150400.24.170.1.x86_64",
          "SUSE Manager Server 4.3:kernel-zfcpdump-5.14.21-150400.24.170.2.s390x"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2022-50098",
          "url": "https://www.suse.com/security/cve/CVE-2022-50098"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1244841 for CVE-2022-50098",
          "url": "https://bugzilla.suse.com/1244841"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-64kb-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-64kb-devel-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-devel-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-devel-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-devel-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-docs-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-macros-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-obs-build-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-obs-build-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-source-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-syms-5.14.21-150400.24.170.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-syms-5.14.21-150400.24.170.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:reiserfs-kmp-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:reiserfs-kmp-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-64kb-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-64kb-devel-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-devel-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-docs-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-macros-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-source-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.170.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.170.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_170-default-1-150400.9.3.2.ppc64le",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_170-default-1-150400.9.3.2.s390x",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_170-default-1-150400.9.3.2.x86_64",
            "SUSE Linux Enterprise Micro 5.3:kernel-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise Micro 5.3:kernel-default-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise Micro 5.3:kernel-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Micro 5.3:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.aarch64",
            "SUSE Linux Enterprise Micro 5.3:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
            "SUSE Linux Enterprise Micro 5.4:kernel-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise Micro 5.4:kernel-default-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise Micro 5.4:kernel-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Micro 5.4:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.aarch64",
            "SUSE Linux Enterprise Micro 5.4:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-64kb-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-64kb-devel-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.aarch64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.ppc64le",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-devel-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-docs-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-macros-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-source-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.170.1.aarch64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.170.1.ppc64le",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.170.1.s390x",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.170.1.x86_64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-zfcpdump-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-devel-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-devel-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-devel-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-docs-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-macros-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-obs-build-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-obs-build-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-source-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-syms-5.14.21-150400.24.170.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-syms-5.14.21-150400.24.170.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Manager Proxy 4.3:kernel-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Manager Proxy 4.3:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
            "SUSE Manager Proxy 4.3:kernel-default-devel-5.14.21-150400.24.170.2.x86_64",
            "SUSE Manager Proxy 4.3:kernel-devel-5.14.21-150400.24.170.1.noarch",
            "SUSE Manager Proxy 4.3:kernel-macros-5.14.21-150400.24.170.1.noarch",
            "SUSE Manager Proxy 4.3:kernel-source-5.14.21-150400.24.170.1.noarch",
            "SUSE Manager Proxy 4.3:kernel-syms-5.14.21-150400.24.170.1.x86_64",
            "SUSE Manager Server 4.3:kernel-default-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Manager Server 4.3:kernel-default-5.14.21-150400.24.170.2.s390x",
            "SUSE Manager Server 4.3:kernel-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Manager Server 4.3:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.ppc64le",
            "SUSE Manager Server 4.3:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
            "SUSE Manager Server 4.3:kernel-default-devel-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Manager Server 4.3:kernel-default-devel-5.14.21-150400.24.170.2.s390x",
            "SUSE Manager Server 4.3:kernel-default-devel-5.14.21-150400.24.170.2.x86_64",
            "SUSE Manager Server 4.3:kernel-devel-5.14.21-150400.24.170.1.noarch",
            "SUSE Manager Server 4.3:kernel-macros-5.14.21-150400.24.170.1.noarch",
            "SUSE Manager Server 4.3:kernel-source-5.14.21-150400.24.170.1.noarch",
            "SUSE Manager Server 4.3:kernel-syms-5.14.21-150400.24.170.1.ppc64le",
            "SUSE Manager Server 4.3:kernel-syms-5.14.21-150400.24.170.1.s390x",
            "SUSE Manager Server 4.3:kernel-syms-5.14.21-150400.24.170.1.x86_64",
            "SUSE Manager Server 4.3:kernel-zfcpdump-5.14.21-150400.24.170.2.s390x"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 5.5,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
            "version": "3.1"
          },
          "products": [
            "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-64kb-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-64kb-devel-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-devel-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-devel-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-devel-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-docs-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-macros-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-obs-build-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-obs-build-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-source-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-syms-5.14.21-150400.24.170.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-syms-5.14.21-150400.24.170.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:reiserfs-kmp-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:reiserfs-kmp-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-64kb-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-64kb-devel-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-devel-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-docs-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-macros-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-source-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.170.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.170.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_170-default-1-150400.9.3.2.ppc64le",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_170-default-1-150400.9.3.2.s390x",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_170-default-1-150400.9.3.2.x86_64",
            "SUSE Linux Enterprise Micro 5.3:kernel-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise Micro 5.3:kernel-default-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise Micro 5.3:kernel-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Micro 5.3:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.aarch64",
            "SUSE Linux Enterprise Micro 5.3:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
            "SUSE Linux Enterprise Micro 5.4:kernel-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise Micro 5.4:kernel-default-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise Micro 5.4:kernel-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Micro 5.4:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.aarch64",
            "SUSE Linux Enterprise Micro 5.4:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-64kb-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-64kb-devel-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.aarch64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.ppc64le",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-devel-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-docs-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-macros-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-source-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.170.1.aarch64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.170.1.ppc64le",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.170.1.s390x",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.170.1.x86_64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-zfcpdump-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-devel-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-devel-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-devel-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-docs-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-macros-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-obs-build-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-obs-build-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-source-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-syms-5.14.21-150400.24.170.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-syms-5.14.21-150400.24.170.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Manager Proxy 4.3:kernel-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Manager Proxy 4.3:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
            "SUSE Manager Proxy 4.3:kernel-default-devel-5.14.21-150400.24.170.2.x86_64",
            "SUSE Manager Proxy 4.3:kernel-devel-5.14.21-150400.24.170.1.noarch",
            "SUSE Manager Proxy 4.3:kernel-macros-5.14.21-150400.24.170.1.noarch",
            "SUSE Manager Proxy 4.3:kernel-source-5.14.21-150400.24.170.1.noarch",
            "SUSE Manager Proxy 4.3:kernel-syms-5.14.21-150400.24.170.1.x86_64",
            "SUSE Manager Server 4.3:kernel-default-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Manager Server 4.3:kernel-default-5.14.21-150400.24.170.2.s390x",
            "SUSE Manager Server 4.3:kernel-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Manager Server 4.3:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.ppc64le",
            "SUSE Manager Server 4.3:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
            "SUSE Manager Server 4.3:kernel-default-devel-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Manager Server 4.3:kernel-default-devel-5.14.21-150400.24.170.2.s390x",
            "SUSE Manager Server 4.3:kernel-default-devel-5.14.21-150400.24.170.2.x86_64",
            "SUSE Manager Server 4.3:kernel-devel-5.14.21-150400.24.170.1.noarch",
            "SUSE Manager Server 4.3:kernel-macros-5.14.21-150400.24.170.1.noarch",
            "SUSE Manager Server 4.3:kernel-source-5.14.21-150400.24.170.1.noarch",
            "SUSE Manager Server 4.3:kernel-syms-5.14.21-150400.24.170.1.ppc64le",
            "SUSE Manager Server 4.3:kernel-syms-5.14.21-150400.24.170.1.s390x",
            "SUSE Manager Server 4.3:kernel-syms-5.14.21-150400.24.170.1.x86_64",
            "SUSE Manager Server 4.3:kernel-zfcpdump-5.14.21-150400.24.170.2.s390x"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2025-07-28T15:09:33Z",
          "details": "moderate"
        }
      ],
      "title": "CVE-2022-50098"
    },
    {
      "cve": "CVE-2022-50099",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2022-50099"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "In the Linux kernel, the following vulnerability has been resolved:\n\nvideo: fbdev: arkfb: Check the size of screen before memset_io()\n\nIn the function arkfb_set_par(), the value of \u0027screen_size\u0027 is\ncalculated by the user input. If the user provides the improper value,\nthe value of \u0027screen_size\u0027 may larger than \u0027info-\u003escreen_size\u0027, which\nmay cause the following bug:\n\n[  659.399066] BUG: unable to handle page fault for address: ffffc90003000000\n[  659.399077] #PF: supervisor write access in kernel mode\n[  659.399079] #PF: error_code(0x0002) - not-present page\n[  659.399094] RIP: 0010:memset_orig+0x33/0xb0\n[  659.399116] Call Trace:\n[  659.399122]  arkfb_set_par+0x143f/0x24c0\n[  659.399130]  fb_set_var+0x604/0xeb0\n[  659.399161]  do_fb_ioctl+0x234/0x670\n[  659.399189]  fb_ioctl+0xdd/0x130\n\nFix the this by checking the value of \u0027screen_size\u0027 before memset_io().",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.170.2.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.170.2.s390x",
          "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.170.2.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.170.2.s390x",
          "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.170.2.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.170.2.s390x",
          "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.170.2.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.170.2.s390x",
          "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-64kb-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-64kb-devel-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-devel-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-devel-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-devel-5.14.21-150400.24.170.1.noarch",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-docs-5.14.21-150400.24.170.1.noarch",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-macros-5.14.21-150400.24.170.1.noarch",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-obs-build-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-obs-build-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-source-5.14.21-150400.24.170.1.noarch",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-syms-5.14.21-150400.24.170.1.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-syms-5.14.21-150400.24.170.1.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:reiserfs-kmp-default-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:reiserfs-kmp-default-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-64kb-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-64kb-devel-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-devel-5.14.21-150400.24.170.1.noarch",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-docs-5.14.21-150400.24.170.1.noarch",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-macros-5.14.21-150400.24.170.1.noarch",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-source-5.14.21-150400.24.170.1.noarch",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.170.1.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.170.1.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.170.2.ppc64le",
          "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.170.2.s390x",
          "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.170.2.ppc64le",
          "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.170.2.s390x",
          "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_170-default-1-150400.9.3.2.ppc64le",
          "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_170-default-1-150400.9.3.2.s390x",
          "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_170-default-1-150400.9.3.2.x86_64",
          "SUSE Linux Enterprise Micro 5.3:kernel-default-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise Micro 5.3:kernel-default-5.14.21-150400.24.170.2.s390x",
          "SUSE Linux Enterprise Micro 5.3:kernel-default-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise Micro 5.3:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.aarch64",
          "SUSE Linux Enterprise Micro 5.3:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
          "SUSE Linux Enterprise Micro 5.4:kernel-default-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise Micro 5.4:kernel-default-5.14.21-150400.24.170.2.s390x",
          "SUSE Linux Enterprise Micro 5.4:kernel-default-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise Micro 5.4:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.aarch64",
          "SUSE Linux Enterprise Micro 5.4:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-64kb-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-64kb-devel-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-5.14.21-150400.24.170.2.ppc64le",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-5.14.21-150400.24.170.2.s390x",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.aarch64",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.ppc64le",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.170.2.ppc64le",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.170.2.s390x",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-devel-5.14.21-150400.24.170.1.noarch",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-docs-5.14.21-150400.24.170.1.noarch",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-macros-5.14.21-150400.24.170.1.noarch",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.170.2.ppc64le",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.170.2.s390x",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-source-5.14.21-150400.24.170.1.noarch",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.170.1.aarch64",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.170.1.ppc64le",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.170.1.s390x",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.170.1.x86_64",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-zfcpdump-5.14.21-150400.24.170.2.s390x",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.170.2.ppc64le",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.170.2.s390x",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-5.14.21-150400.24.170.2.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-devel-5.14.21-150400.24.170.2.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-devel-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-devel-5.14.21-150400.24.170.1.noarch",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-docs-5.14.21-150400.24.170.1.noarch",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-macros-5.14.21-150400.24.170.1.noarch",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-obs-build-5.14.21-150400.24.170.2.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-obs-build-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-source-5.14.21-150400.24.170.1.noarch",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-syms-5.14.21-150400.24.170.1.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-syms-5.14.21-150400.24.170.1.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.170.2.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.170.2.x86_64",
          "SUSE Manager Proxy 4.3:kernel-default-5.14.21-150400.24.170.2.x86_64",
          "SUSE Manager Proxy 4.3:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
          "SUSE Manager Proxy 4.3:kernel-default-devel-5.14.21-150400.24.170.2.x86_64",
          "SUSE Manager Proxy 4.3:kernel-devel-5.14.21-150400.24.170.1.noarch",
          "SUSE Manager Proxy 4.3:kernel-macros-5.14.21-150400.24.170.1.noarch",
          "SUSE Manager Proxy 4.3:kernel-source-5.14.21-150400.24.170.1.noarch",
          "SUSE Manager Proxy 4.3:kernel-syms-5.14.21-150400.24.170.1.x86_64",
          "SUSE Manager Server 4.3:kernel-default-5.14.21-150400.24.170.2.ppc64le",
          "SUSE Manager Server 4.3:kernel-default-5.14.21-150400.24.170.2.s390x",
          "SUSE Manager Server 4.3:kernel-default-5.14.21-150400.24.170.2.x86_64",
          "SUSE Manager Server 4.3:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.ppc64le",
          "SUSE Manager Server 4.3:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
          "SUSE Manager Server 4.3:kernel-default-devel-5.14.21-150400.24.170.2.ppc64le",
          "SUSE Manager Server 4.3:kernel-default-devel-5.14.21-150400.24.170.2.s390x",
          "SUSE Manager Server 4.3:kernel-default-devel-5.14.21-150400.24.170.2.x86_64",
          "SUSE Manager Server 4.3:kernel-devel-5.14.21-150400.24.170.1.noarch",
          "SUSE Manager Server 4.3:kernel-macros-5.14.21-150400.24.170.1.noarch",
          "SUSE Manager Server 4.3:kernel-source-5.14.21-150400.24.170.1.noarch",
          "SUSE Manager Server 4.3:kernel-syms-5.14.21-150400.24.170.1.ppc64le",
          "SUSE Manager Server 4.3:kernel-syms-5.14.21-150400.24.170.1.s390x",
          "SUSE Manager Server 4.3:kernel-syms-5.14.21-150400.24.170.1.x86_64",
          "SUSE Manager Server 4.3:kernel-zfcpdump-5.14.21-150400.24.170.2.s390x"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2022-50099",
          "url": "https://www.suse.com/security/cve/CVE-2022-50099"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1244842 for CVE-2022-50099",
          "url": "https://bugzilla.suse.com/1244842"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-64kb-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-64kb-devel-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-devel-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-devel-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-devel-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-docs-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-macros-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-obs-build-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-obs-build-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-source-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-syms-5.14.21-150400.24.170.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-syms-5.14.21-150400.24.170.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:reiserfs-kmp-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:reiserfs-kmp-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-64kb-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-64kb-devel-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-devel-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-docs-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-macros-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-source-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.170.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.170.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_170-default-1-150400.9.3.2.ppc64le",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_170-default-1-150400.9.3.2.s390x",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_170-default-1-150400.9.3.2.x86_64",
            "SUSE Linux Enterprise Micro 5.3:kernel-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise Micro 5.3:kernel-default-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise Micro 5.3:kernel-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Micro 5.3:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.aarch64",
            "SUSE Linux Enterprise Micro 5.3:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
            "SUSE Linux Enterprise Micro 5.4:kernel-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise Micro 5.4:kernel-default-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise Micro 5.4:kernel-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Micro 5.4:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.aarch64",
            "SUSE Linux Enterprise Micro 5.4:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-64kb-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-64kb-devel-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.aarch64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.ppc64le",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-devel-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-docs-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-macros-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-source-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.170.1.aarch64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.170.1.ppc64le",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.170.1.s390x",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.170.1.x86_64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-zfcpdump-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-devel-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-devel-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-devel-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-docs-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-macros-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-obs-build-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-obs-build-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-source-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-syms-5.14.21-150400.24.170.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-syms-5.14.21-150400.24.170.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Manager Proxy 4.3:kernel-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Manager Proxy 4.3:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
            "SUSE Manager Proxy 4.3:kernel-default-devel-5.14.21-150400.24.170.2.x86_64",
            "SUSE Manager Proxy 4.3:kernel-devel-5.14.21-150400.24.170.1.noarch",
            "SUSE Manager Proxy 4.3:kernel-macros-5.14.21-150400.24.170.1.noarch",
            "SUSE Manager Proxy 4.3:kernel-source-5.14.21-150400.24.170.1.noarch",
            "SUSE Manager Proxy 4.3:kernel-syms-5.14.21-150400.24.170.1.x86_64",
            "SUSE Manager Server 4.3:kernel-default-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Manager Server 4.3:kernel-default-5.14.21-150400.24.170.2.s390x",
            "SUSE Manager Server 4.3:kernel-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Manager Server 4.3:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.ppc64le",
            "SUSE Manager Server 4.3:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
            "SUSE Manager Server 4.3:kernel-default-devel-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Manager Server 4.3:kernel-default-devel-5.14.21-150400.24.170.2.s390x",
            "SUSE Manager Server 4.3:kernel-default-devel-5.14.21-150400.24.170.2.x86_64",
            "SUSE Manager Server 4.3:kernel-devel-5.14.21-150400.24.170.1.noarch",
            "SUSE Manager Server 4.3:kernel-macros-5.14.21-150400.24.170.1.noarch",
            "SUSE Manager Server 4.3:kernel-source-5.14.21-150400.24.170.1.noarch",
            "SUSE Manager Server 4.3:kernel-syms-5.14.21-150400.24.170.1.ppc64le",
            "SUSE Manager Server 4.3:kernel-syms-5.14.21-150400.24.170.1.s390x",
            "SUSE Manager Server 4.3:kernel-syms-5.14.21-150400.24.170.1.x86_64",
            "SUSE Manager Server 4.3:kernel-zfcpdump-5.14.21-150400.24.170.2.s390x"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 5.5,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
            "version": "3.1"
          },
          "products": [
            "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-64kb-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-64kb-devel-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-devel-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-devel-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-devel-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-docs-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-macros-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-obs-build-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-obs-build-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-source-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-syms-5.14.21-150400.24.170.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-syms-5.14.21-150400.24.170.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:reiserfs-kmp-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:reiserfs-kmp-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-64kb-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-64kb-devel-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-devel-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-docs-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-macros-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-source-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.170.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.170.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_170-default-1-150400.9.3.2.ppc64le",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_170-default-1-150400.9.3.2.s390x",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_170-default-1-150400.9.3.2.x86_64",
            "SUSE Linux Enterprise Micro 5.3:kernel-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise Micro 5.3:kernel-default-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise Micro 5.3:kernel-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Micro 5.3:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.aarch64",
            "SUSE Linux Enterprise Micro 5.3:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
            "SUSE Linux Enterprise Micro 5.4:kernel-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise Micro 5.4:kernel-default-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise Micro 5.4:kernel-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Micro 5.4:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.aarch64",
            "SUSE Linux Enterprise Micro 5.4:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-64kb-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-64kb-devel-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.aarch64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.ppc64le",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-devel-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-docs-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-macros-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-source-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.170.1.aarch64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.170.1.ppc64le",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.170.1.s390x",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.170.1.x86_64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-zfcpdump-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-devel-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-devel-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-devel-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-docs-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-macros-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-obs-build-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-obs-build-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-source-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-syms-5.14.21-150400.24.170.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-syms-5.14.21-150400.24.170.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Manager Proxy 4.3:kernel-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Manager Proxy 4.3:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
            "SUSE Manager Proxy 4.3:kernel-default-devel-5.14.21-150400.24.170.2.x86_64",
            "SUSE Manager Proxy 4.3:kernel-devel-5.14.21-150400.24.170.1.noarch",
            "SUSE Manager Proxy 4.3:kernel-macros-5.14.21-150400.24.170.1.noarch",
            "SUSE Manager Proxy 4.3:kernel-source-5.14.21-150400.24.170.1.noarch",
            "SUSE Manager Proxy 4.3:kernel-syms-5.14.21-150400.24.170.1.x86_64",
            "SUSE Manager Server 4.3:kernel-default-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Manager Server 4.3:kernel-default-5.14.21-150400.24.170.2.s390x",
            "SUSE Manager Server 4.3:kernel-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Manager Server 4.3:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.ppc64le",
            "SUSE Manager Server 4.3:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
            "SUSE Manager Server 4.3:kernel-default-devel-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Manager Server 4.3:kernel-default-devel-5.14.21-150400.24.170.2.s390x",
            "SUSE Manager Server 4.3:kernel-default-devel-5.14.21-150400.24.170.2.x86_64",
            "SUSE Manager Server 4.3:kernel-devel-5.14.21-150400.24.170.1.noarch",
            "SUSE Manager Server 4.3:kernel-macros-5.14.21-150400.24.170.1.noarch",
            "SUSE Manager Server 4.3:kernel-source-5.14.21-150400.24.170.1.noarch",
            "SUSE Manager Server 4.3:kernel-syms-5.14.21-150400.24.170.1.ppc64le",
            "SUSE Manager Server 4.3:kernel-syms-5.14.21-150400.24.170.1.s390x",
            "SUSE Manager Server 4.3:kernel-syms-5.14.21-150400.24.170.1.x86_64",
            "SUSE Manager Server 4.3:kernel-zfcpdump-5.14.21-150400.24.170.2.s390x"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2025-07-28T15:09:33Z",
          "details": "moderate"
        }
      ],
      "title": "CVE-2022-50099"
    },
    {
      "cve": "CVE-2022-50100",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2022-50100"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "In the Linux kernel, the following vulnerability has been resolved:\n\nsched/core: Do not requeue task on CPU excluded from cpus_mask\n\nThe following warning was triggered on a large machine early in boot on\na distribution kernel but the same problem should also affect mainline.\n\n   WARNING: CPU: 439 PID: 10 at ../kernel/workqueue.c:2231 process_one_work+0x4d/0x440\n   Call Trace:\n    \u003cTASK\u003e\n    rescuer_thread+0x1f6/0x360\n    kthread+0x156/0x180\n    ret_from_fork+0x22/0x30\n    \u003c/TASK\u003e\n\nCommit c6e7bd7afaeb (\"sched/core: Optimize ttwu() spinning on p-\u003eon_cpu\")\noptimises ttwu by queueing a task that is descheduling on the wakelist,\nbut does not check if the task descheduling is still allowed to run on that CPU.\n\nIn this warning, the problematic task is a workqueue rescue thread which\nchecks if the rescue is for a per-cpu workqueue and running on the wrong CPU.\nWhile this is early in boot and it should be possible to create workers,\nthe rescue thread may still used if the MAYDAY_INITIAL_TIMEOUT is reached\nor MAYDAY_INTERVAL and on a sufficiently large machine, the rescue\nthread is being used frequently.\n\nTracing confirmed that the task should have migrated properly using the\nstopper thread to handle the migration. However, a parallel wakeup from udev\nrunning on another CPU that does not share CPU cache observes p-\u003eon_cpu and\nuses task_cpu(p), queues the task on the old CPU and triggers the warning.\n\nCheck that the wakee task that is descheduling is still allowed to run\non its current CPU and if not, wait for the descheduling to complete\nand select an allowed CPU.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.170.2.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.170.2.s390x",
          "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.170.2.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.170.2.s390x",
          "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.170.2.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.170.2.s390x",
          "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.170.2.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.170.2.s390x",
          "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-64kb-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-64kb-devel-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-devel-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-devel-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-devel-5.14.21-150400.24.170.1.noarch",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-docs-5.14.21-150400.24.170.1.noarch",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-macros-5.14.21-150400.24.170.1.noarch",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-obs-build-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-obs-build-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-source-5.14.21-150400.24.170.1.noarch",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-syms-5.14.21-150400.24.170.1.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-syms-5.14.21-150400.24.170.1.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:reiserfs-kmp-default-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:reiserfs-kmp-default-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-64kb-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-64kb-devel-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-devel-5.14.21-150400.24.170.1.noarch",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-docs-5.14.21-150400.24.170.1.noarch",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-macros-5.14.21-150400.24.170.1.noarch",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-source-5.14.21-150400.24.170.1.noarch",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.170.1.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.170.1.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.170.2.ppc64le",
          "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.170.2.s390x",
          "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.170.2.ppc64le",
          "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.170.2.s390x",
          "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_170-default-1-150400.9.3.2.ppc64le",
          "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_170-default-1-150400.9.3.2.s390x",
          "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_170-default-1-150400.9.3.2.x86_64",
          "SUSE Linux Enterprise Micro 5.3:kernel-default-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise Micro 5.3:kernel-default-5.14.21-150400.24.170.2.s390x",
          "SUSE Linux Enterprise Micro 5.3:kernel-default-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise Micro 5.3:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.aarch64",
          "SUSE Linux Enterprise Micro 5.3:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
          "SUSE Linux Enterprise Micro 5.4:kernel-default-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise Micro 5.4:kernel-default-5.14.21-150400.24.170.2.s390x",
          "SUSE Linux Enterprise Micro 5.4:kernel-default-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise Micro 5.4:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.aarch64",
          "SUSE Linux Enterprise Micro 5.4:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-64kb-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-64kb-devel-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-5.14.21-150400.24.170.2.ppc64le",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-5.14.21-150400.24.170.2.s390x",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.aarch64",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.ppc64le",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.170.2.ppc64le",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.170.2.s390x",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-devel-5.14.21-150400.24.170.1.noarch",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-docs-5.14.21-150400.24.170.1.noarch",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-macros-5.14.21-150400.24.170.1.noarch",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.170.2.ppc64le",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.170.2.s390x",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-source-5.14.21-150400.24.170.1.noarch",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.170.1.aarch64",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.170.1.ppc64le",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.170.1.s390x",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.170.1.x86_64",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-zfcpdump-5.14.21-150400.24.170.2.s390x",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.170.2.ppc64le",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.170.2.s390x",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-5.14.21-150400.24.170.2.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-devel-5.14.21-150400.24.170.2.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-devel-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-devel-5.14.21-150400.24.170.1.noarch",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-docs-5.14.21-150400.24.170.1.noarch",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-macros-5.14.21-150400.24.170.1.noarch",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-obs-build-5.14.21-150400.24.170.2.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-obs-build-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-source-5.14.21-150400.24.170.1.noarch",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-syms-5.14.21-150400.24.170.1.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-syms-5.14.21-150400.24.170.1.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.170.2.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.170.2.x86_64",
          "SUSE Manager Proxy 4.3:kernel-default-5.14.21-150400.24.170.2.x86_64",
          "SUSE Manager Proxy 4.3:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
          "SUSE Manager Proxy 4.3:kernel-default-devel-5.14.21-150400.24.170.2.x86_64",
          "SUSE Manager Proxy 4.3:kernel-devel-5.14.21-150400.24.170.1.noarch",
          "SUSE Manager Proxy 4.3:kernel-macros-5.14.21-150400.24.170.1.noarch",
          "SUSE Manager Proxy 4.3:kernel-source-5.14.21-150400.24.170.1.noarch",
          "SUSE Manager Proxy 4.3:kernel-syms-5.14.21-150400.24.170.1.x86_64",
          "SUSE Manager Server 4.3:kernel-default-5.14.21-150400.24.170.2.ppc64le",
          "SUSE Manager Server 4.3:kernel-default-5.14.21-150400.24.170.2.s390x",
          "SUSE Manager Server 4.3:kernel-default-5.14.21-150400.24.170.2.x86_64",
          "SUSE Manager Server 4.3:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.ppc64le",
          "SUSE Manager Server 4.3:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
          "SUSE Manager Server 4.3:kernel-default-devel-5.14.21-150400.24.170.2.ppc64le",
          "SUSE Manager Server 4.3:kernel-default-devel-5.14.21-150400.24.170.2.s390x",
          "SUSE Manager Server 4.3:kernel-default-devel-5.14.21-150400.24.170.2.x86_64",
          "SUSE Manager Server 4.3:kernel-devel-5.14.21-150400.24.170.1.noarch",
          "SUSE Manager Server 4.3:kernel-macros-5.14.21-150400.24.170.1.noarch",
          "SUSE Manager Server 4.3:kernel-source-5.14.21-150400.24.170.1.noarch",
          "SUSE Manager Server 4.3:kernel-syms-5.14.21-150400.24.170.1.ppc64le",
          "SUSE Manager Server 4.3:kernel-syms-5.14.21-150400.24.170.1.s390x",
          "SUSE Manager Server 4.3:kernel-syms-5.14.21-150400.24.170.1.x86_64",
          "SUSE Manager Server 4.3:kernel-zfcpdump-5.14.21-150400.24.170.2.s390x"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2022-50100",
          "url": "https://www.suse.com/security/cve/CVE-2022-50100"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1244843 for CVE-2022-50100",
          "url": "https://bugzilla.suse.com/1244843"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-64kb-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-64kb-devel-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-devel-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-devel-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-devel-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-docs-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-macros-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-obs-build-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-obs-build-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-source-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-syms-5.14.21-150400.24.170.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-syms-5.14.21-150400.24.170.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:reiserfs-kmp-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:reiserfs-kmp-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-64kb-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-64kb-devel-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-devel-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-docs-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-macros-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-source-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.170.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.170.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_170-default-1-150400.9.3.2.ppc64le",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_170-default-1-150400.9.3.2.s390x",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_170-default-1-150400.9.3.2.x86_64",
            "SUSE Linux Enterprise Micro 5.3:kernel-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise Micro 5.3:kernel-default-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise Micro 5.3:kernel-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Micro 5.3:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.aarch64",
            "SUSE Linux Enterprise Micro 5.3:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
            "SUSE Linux Enterprise Micro 5.4:kernel-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise Micro 5.4:kernel-default-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise Micro 5.4:kernel-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Micro 5.4:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.aarch64",
            "SUSE Linux Enterprise Micro 5.4:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-64kb-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-64kb-devel-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.aarch64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.ppc64le",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-devel-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-docs-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-macros-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-source-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.170.1.aarch64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.170.1.ppc64le",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.170.1.s390x",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.170.1.x86_64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-zfcpdump-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-devel-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-devel-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-devel-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-docs-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-macros-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-obs-build-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-obs-build-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-source-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-syms-5.14.21-150400.24.170.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-syms-5.14.21-150400.24.170.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Manager Proxy 4.3:kernel-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Manager Proxy 4.3:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
            "SUSE Manager Proxy 4.3:kernel-default-devel-5.14.21-150400.24.170.2.x86_64",
            "SUSE Manager Proxy 4.3:kernel-devel-5.14.21-150400.24.170.1.noarch",
            "SUSE Manager Proxy 4.3:kernel-macros-5.14.21-150400.24.170.1.noarch",
            "SUSE Manager Proxy 4.3:kernel-source-5.14.21-150400.24.170.1.noarch",
            "SUSE Manager Proxy 4.3:kernel-syms-5.14.21-150400.24.170.1.x86_64",
            "SUSE Manager Server 4.3:kernel-default-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Manager Server 4.3:kernel-default-5.14.21-150400.24.170.2.s390x",
            "SUSE Manager Server 4.3:kernel-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Manager Server 4.3:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.ppc64le",
            "SUSE Manager Server 4.3:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
            "SUSE Manager Server 4.3:kernel-default-devel-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Manager Server 4.3:kernel-default-devel-5.14.21-150400.24.170.2.s390x",
            "SUSE Manager Server 4.3:kernel-default-devel-5.14.21-150400.24.170.2.x86_64",
            "SUSE Manager Server 4.3:kernel-devel-5.14.21-150400.24.170.1.noarch",
            "SUSE Manager Server 4.3:kernel-macros-5.14.21-150400.24.170.1.noarch",
            "SUSE Manager Server 4.3:kernel-source-5.14.21-150400.24.170.1.noarch",
            "SUSE Manager Server 4.3:kernel-syms-5.14.21-150400.24.170.1.ppc64le",
            "SUSE Manager Server 4.3:kernel-syms-5.14.21-150400.24.170.1.s390x",
            "SUSE Manager Server 4.3:kernel-syms-5.14.21-150400.24.170.1.x86_64",
            "SUSE Manager Server 4.3:kernel-zfcpdump-5.14.21-150400.24.170.2.s390x"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 5.5,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
            "version": "3.1"
          },
          "products": [
            "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-64kb-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-64kb-devel-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-devel-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-devel-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-devel-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-docs-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-macros-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-obs-build-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-obs-build-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-source-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-syms-5.14.21-150400.24.170.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-syms-5.14.21-150400.24.170.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:reiserfs-kmp-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:reiserfs-kmp-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-64kb-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-64kb-devel-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-devel-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-docs-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-macros-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-source-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.170.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.170.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_170-default-1-150400.9.3.2.ppc64le",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_170-default-1-150400.9.3.2.s390x",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_170-default-1-150400.9.3.2.x86_64",
            "SUSE Linux Enterprise Micro 5.3:kernel-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise Micro 5.3:kernel-default-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise Micro 5.3:kernel-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Micro 5.3:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.aarch64",
            "SUSE Linux Enterprise Micro 5.3:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
            "SUSE Linux Enterprise Micro 5.4:kernel-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise Micro 5.4:kernel-default-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise Micro 5.4:kernel-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Micro 5.4:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.aarch64",
            "SUSE Linux Enterprise Micro 5.4:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-64kb-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-64kb-devel-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.aarch64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.ppc64le",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-devel-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-docs-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-macros-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-source-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.170.1.aarch64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.170.1.ppc64le",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.170.1.s390x",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.170.1.x86_64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-zfcpdump-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-devel-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-devel-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-devel-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-docs-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-macros-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-obs-build-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-obs-build-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-source-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-syms-5.14.21-150400.24.170.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-syms-5.14.21-150400.24.170.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Manager Proxy 4.3:kernel-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Manager Proxy 4.3:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
            "SUSE Manager Proxy 4.3:kernel-default-devel-5.14.21-150400.24.170.2.x86_64",
            "SUSE Manager Proxy 4.3:kernel-devel-5.14.21-150400.24.170.1.noarch",
            "SUSE Manager Proxy 4.3:kernel-macros-5.14.21-150400.24.170.1.noarch",
            "SUSE Manager Proxy 4.3:kernel-source-5.14.21-150400.24.170.1.noarch",
            "SUSE Manager Proxy 4.3:kernel-syms-5.14.21-150400.24.170.1.x86_64",
            "SUSE Manager Server 4.3:kernel-default-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Manager Server 4.3:kernel-default-5.14.21-150400.24.170.2.s390x",
            "SUSE Manager Server 4.3:kernel-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Manager Server 4.3:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.ppc64le",
            "SUSE Manager Server 4.3:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
            "SUSE Manager Server 4.3:kernel-default-devel-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Manager Server 4.3:kernel-default-devel-5.14.21-150400.24.170.2.s390x",
            "SUSE Manager Server 4.3:kernel-default-devel-5.14.21-150400.24.170.2.x86_64",
            "SUSE Manager Server 4.3:kernel-devel-5.14.21-150400.24.170.1.noarch",
            "SUSE Manager Server 4.3:kernel-macros-5.14.21-150400.24.170.1.noarch",
            "SUSE Manager Server 4.3:kernel-source-5.14.21-150400.24.170.1.noarch",
            "SUSE Manager Server 4.3:kernel-syms-5.14.21-150400.24.170.1.ppc64le",
            "SUSE Manager Server 4.3:kernel-syms-5.14.21-150400.24.170.1.s390x",
            "SUSE Manager Server 4.3:kernel-syms-5.14.21-150400.24.170.1.x86_64",
            "SUSE Manager Server 4.3:kernel-zfcpdump-5.14.21-150400.24.170.2.s390x"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2025-07-28T15:09:33Z",
          "details": "moderate"
        }
      ],
      "title": "CVE-2022-50100"
    },
    {
      "cve": "CVE-2022-50101",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2022-50101"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "In the Linux kernel, the following vulnerability has been resolved:\n\nvideo: fbdev: vt8623fb: Check the size of screen before memset_io()\n\nIn the function vt8623fb_set_par(), the value of \u0027screen_size\u0027 is\ncalculated by the user input. If the user provides the improper value,\nthe value of \u0027screen_size\u0027 may larger than \u0027info-\u003escreen_size\u0027, which\nmay cause the following bug:\n\n[  583.339036] BUG: unable to handle page fault for address: ffffc90005000000\n[  583.339049] #PF: supervisor write access in kernel mode\n[  583.339052] #PF: error_code(0x0002) - not-present page\n[  583.339074] RIP: 0010:memset_orig+0x33/0xb0\n[  583.339110] Call Trace:\n[  583.339118]  vt8623fb_set_par+0x11cd/0x21e0\n[  583.339146]  fb_set_var+0x604/0xeb0\n[  583.339181]  do_fb_ioctl+0x234/0x670\n[  583.339209]  fb_ioctl+0xdd/0x130\n\nFix the this by checking the value of \u0027screen_size\u0027 before memset_io().",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.170.2.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.170.2.s390x",
          "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.170.2.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.170.2.s390x",
          "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.170.2.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.170.2.s390x",
          "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.170.2.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.170.2.s390x",
          "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-64kb-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-64kb-devel-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-devel-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-devel-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-devel-5.14.21-150400.24.170.1.noarch",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-docs-5.14.21-150400.24.170.1.noarch",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-macros-5.14.21-150400.24.170.1.noarch",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-obs-build-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-obs-build-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-source-5.14.21-150400.24.170.1.noarch",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-syms-5.14.21-150400.24.170.1.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-syms-5.14.21-150400.24.170.1.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:reiserfs-kmp-default-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:reiserfs-kmp-default-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-64kb-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-64kb-devel-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-devel-5.14.21-150400.24.170.1.noarch",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-docs-5.14.21-150400.24.170.1.noarch",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-macros-5.14.21-150400.24.170.1.noarch",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-source-5.14.21-150400.24.170.1.noarch",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.170.1.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.170.1.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.170.2.ppc64le",
          "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.170.2.s390x",
          "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.170.2.ppc64le",
          "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.170.2.s390x",
          "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_170-default-1-150400.9.3.2.ppc64le",
          "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_170-default-1-150400.9.3.2.s390x",
          "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_170-default-1-150400.9.3.2.x86_64",
          "SUSE Linux Enterprise Micro 5.3:kernel-default-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise Micro 5.3:kernel-default-5.14.21-150400.24.170.2.s390x",
          "SUSE Linux Enterprise Micro 5.3:kernel-default-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise Micro 5.3:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.aarch64",
          "SUSE Linux Enterprise Micro 5.3:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
          "SUSE Linux Enterprise Micro 5.4:kernel-default-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise Micro 5.4:kernel-default-5.14.21-150400.24.170.2.s390x",
          "SUSE Linux Enterprise Micro 5.4:kernel-default-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise Micro 5.4:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.aarch64",
          "SUSE Linux Enterprise Micro 5.4:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-64kb-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-64kb-devel-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-5.14.21-150400.24.170.2.ppc64le",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-5.14.21-150400.24.170.2.s390x",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.aarch64",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.ppc64le",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.170.2.ppc64le",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.170.2.s390x",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-devel-5.14.21-150400.24.170.1.noarch",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-docs-5.14.21-150400.24.170.1.noarch",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-macros-5.14.21-150400.24.170.1.noarch",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.170.2.ppc64le",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.170.2.s390x",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-source-5.14.21-150400.24.170.1.noarch",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.170.1.aarch64",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.170.1.ppc64le",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.170.1.s390x",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.170.1.x86_64",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-zfcpdump-5.14.21-150400.24.170.2.s390x",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.170.2.ppc64le",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.170.2.s390x",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-5.14.21-150400.24.170.2.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-devel-5.14.21-150400.24.170.2.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-devel-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-devel-5.14.21-150400.24.170.1.noarch",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-docs-5.14.21-150400.24.170.1.noarch",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-macros-5.14.21-150400.24.170.1.noarch",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-obs-build-5.14.21-150400.24.170.2.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-obs-build-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-source-5.14.21-150400.24.170.1.noarch",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-syms-5.14.21-150400.24.170.1.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-syms-5.14.21-150400.24.170.1.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.170.2.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.170.2.x86_64",
          "SUSE Manager Proxy 4.3:kernel-default-5.14.21-150400.24.170.2.x86_64",
          "SUSE Manager Proxy 4.3:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
          "SUSE Manager Proxy 4.3:kernel-default-devel-5.14.21-150400.24.170.2.x86_64",
          "SUSE Manager Proxy 4.3:kernel-devel-5.14.21-150400.24.170.1.noarch",
          "SUSE Manager Proxy 4.3:kernel-macros-5.14.21-150400.24.170.1.noarch",
          "SUSE Manager Proxy 4.3:kernel-source-5.14.21-150400.24.170.1.noarch",
          "SUSE Manager Proxy 4.3:kernel-syms-5.14.21-150400.24.170.1.x86_64",
          "SUSE Manager Server 4.3:kernel-default-5.14.21-150400.24.170.2.ppc64le",
          "SUSE Manager Server 4.3:kernel-default-5.14.21-150400.24.170.2.s390x",
          "SUSE Manager Server 4.3:kernel-default-5.14.21-150400.24.170.2.x86_64",
          "SUSE Manager Server 4.3:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.ppc64le",
          "SUSE Manager Server 4.3:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
          "SUSE Manager Server 4.3:kernel-default-devel-5.14.21-150400.24.170.2.ppc64le",
          "SUSE Manager Server 4.3:kernel-default-devel-5.14.21-150400.24.170.2.s390x",
          "SUSE Manager Server 4.3:kernel-default-devel-5.14.21-150400.24.170.2.x86_64",
          "SUSE Manager Server 4.3:kernel-devel-5.14.21-150400.24.170.1.noarch",
          "SUSE Manager Server 4.3:kernel-macros-5.14.21-150400.24.170.1.noarch",
          "SUSE Manager Server 4.3:kernel-source-5.14.21-150400.24.170.1.noarch",
          "SUSE Manager Server 4.3:kernel-syms-5.14.21-150400.24.170.1.ppc64le",
          "SUSE Manager Server 4.3:kernel-syms-5.14.21-150400.24.170.1.s390x",
          "SUSE Manager Server 4.3:kernel-syms-5.14.21-150400.24.170.1.x86_64",
          "SUSE Manager Server 4.3:kernel-zfcpdump-5.14.21-150400.24.170.2.s390x"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2022-50101",
          "url": "https://www.suse.com/security/cve/CVE-2022-50101"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1244839 for CVE-2022-50101",
          "url": "https://bugzilla.suse.com/1244839"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-64kb-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-64kb-devel-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-devel-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-devel-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-devel-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-docs-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-macros-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-obs-build-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-obs-build-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-source-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-syms-5.14.21-150400.24.170.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-syms-5.14.21-150400.24.170.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:reiserfs-kmp-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:reiserfs-kmp-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-64kb-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-64kb-devel-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-devel-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-docs-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-macros-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-source-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.170.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.170.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_170-default-1-150400.9.3.2.ppc64le",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_170-default-1-150400.9.3.2.s390x",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_170-default-1-150400.9.3.2.x86_64",
            "SUSE Linux Enterprise Micro 5.3:kernel-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise Micro 5.3:kernel-default-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise Micro 5.3:kernel-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Micro 5.3:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.aarch64",
            "SUSE Linux Enterprise Micro 5.3:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
            "SUSE Linux Enterprise Micro 5.4:kernel-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise Micro 5.4:kernel-default-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise Micro 5.4:kernel-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Micro 5.4:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.aarch64",
            "SUSE Linux Enterprise Micro 5.4:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-64kb-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-64kb-devel-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.aarch64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.ppc64le",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-devel-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-docs-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-macros-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-source-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.170.1.aarch64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.170.1.ppc64le",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.170.1.s390x",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.170.1.x86_64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-zfcpdump-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-devel-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-devel-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-devel-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-docs-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-macros-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-obs-build-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-obs-build-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-source-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-syms-5.14.21-150400.24.170.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-syms-5.14.21-150400.24.170.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Manager Proxy 4.3:kernel-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Manager Proxy 4.3:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
            "SUSE Manager Proxy 4.3:kernel-default-devel-5.14.21-150400.24.170.2.x86_64",
            "SUSE Manager Proxy 4.3:kernel-devel-5.14.21-150400.24.170.1.noarch",
            "SUSE Manager Proxy 4.3:kernel-macros-5.14.21-150400.24.170.1.noarch",
            "SUSE Manager Proxy 4.3:kernel-source-5.14.21-150400.24.170.1.noarch",
            "SUSE Manager Proxy 4.3:kernel-syms-5.14.21-150400.24.170.1.x86_64",
            "SUSE Manager Server 4.3:kernel-default-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Manager Server 4.3:kernel-default-5.14.21-150400.24.170.2.s390x",
            "SUSE Manager Server 4.3:kernel-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Manager Server 4.3:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.ppc64le",
            "SUSE Manager Server 4.3:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
            "SUSE Manager Server 4.3:kernel-default-devel-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Manager Server 4.3:kernel-default-devel-5.14.21-150400.24.170.2.s390x",
            "SUSE Manager Server 4.3:kernel-default-devel-5.14.21-150400.24.170.2.x86_64",
            "SUSE Manager Server 4.3:kernel-devel-5.14.21-150400.24.170.1.noarch",
            "SUSE Manager Server 4.3:kernel-macros-5.14.21-150400.24.170.1.noarch",
            "SUSE Manager Server 4.3:kernel-source-5.14.21-150400.24.170.1.noarch",
            "SUSE Manager Server 4.3:kernel-syms-5.14.21-150400.24.170.1.ppc64le",
            "SUSE Manager Server 4.3:kernel-syms-5.14.21-150400.24.170.1.s390x",
            "SUSE Manager Server 4.3:kernel-syms-5.14.21-150400.24.170.1.x86_64",
            "SUSE Manager Server 4.3:kernel-zfcpdump-5.14.21-150400.24.170.2.s390x"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 5.5,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
            "version": "3.1"
          },
          "products": [
            "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-64kb-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-64kb-devel-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-devel-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-devel-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-devel-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-docs-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-macros-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-obs-build-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-obs-build-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-source-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-syms-5.14.21-150400.24.170.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-syms-5.14.21-150400.24.170.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:reiserfs-kmp-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:reiserfs-kmp-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-64kb-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-64kb-devel-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-devel-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-docs-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-macros-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-source-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.170.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.170.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_170-default-1-150400.9.3.2.ppc64le",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_170-default-1-150400.9.3.2.s390x",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_170-default-1-150400.9.3.2.x86_64",
            "SUSE Linux Enterprise Micro 5.3:kernel-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise Micro 5.3:kernel-default-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise Micro 5.3:kernel-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Micro 5.3:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.aarch64",
            "SUSE Linux Enterprise Micro 5.3:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
            "SUSE Linux Enterprise Micro 5.4:kernel-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise Micro 5.4:kernel-default-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise Micro 5.4:kernel-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Micro 5.4:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.aarch64",
            "SUSE Linux Enterprise Micro 5.4:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-64kb-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-64kb-devel-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.aarch64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.ppc64le",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-devel-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-docs-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-macros-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-source-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.170.1.aarch64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.170.1.ppc64le",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.170.1.s390x",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.170.1.x86_64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-zfcpdump-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-devel-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-devel-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-devel-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-docs-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-macros-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-obs-build-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-obs-build-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-source-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-syms-5.14.21-150400.24.170.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-syms-5.14.21-150400.24.170.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Manager Proxy 4.3:kernel-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Manager Proxy 4.3:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
            "SUSE Manager Proxy 4.3:kernel-default-devel-5.14.21-150400.24.170.2.x86_64",
            "SUSE Manager Proxy 4.3:kernel-devel-5.14.21-150400.24.170.1.noarch",
            "SUSE Manager Proxy 4.3:kernel-macros-5.14.21-150400.24.170.1.noarch",
            "SUSE Manager Proxy 4.3:kernel-source-5.14.21-150400.24.170.1.noarch",
            "SUSE Manager Proxy 4.3:kernel-syms-5.14.21-150400.24.170.1.x86_64",
            "SUSE Manager Server 4.3:kernel-default-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Manager Server 4.3:kernel-default-5.14.21-150400.24.170.2.s390x",
            "SUSE Manager Server 4.3:kernel-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Manager Server 4.3:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.ppc64le",
            "SUSE Manager Server 4.3:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
            "SUSE Manager Server 4.3:kernel-default-devel-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Manager Server 4.3:kernel-default-devel-5.14.21-150400.24.170.2.s390x",
            "SUSE Manager Server 4.3:kernel-default-devel-5.14.21-150400.24.170.2.x86_64",
            "SUSE Manager Server 4.3:kernel-devel-5.14.21-150400.24.170.1.noarch",
            "SUSE Manager Server 4.3:kernel-macros-5.14.21-150400.24.170.1.noarch",
            "SUSE Manager Server 4.3:kernel-source-5.14.21-150400.24.170.1.noarch",
            "SUSE Manager Server 4.3:kernel-syms-5.14.21-150400.24.170.1.ppc64le",
            "SUSE Manager Server 4.3:kernel-syms-5.14.21-150400.24.170.1.s390x",
            "SUSE Manager Server 4.3:kernel-syms-5.14.21-150400.24.170.1.x86_64",
            "SUSE Manager Server 4.3:kernel-zfcpdump-5.14.21-150400.24.170.2.s390x"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2025-07-28T15:09:33Z",
          "details": "moderate"
        }
      ],
      "title": "CVE-2022-50101"
    },
    {
      "cve": "CVE-2022-50102",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2022-50102"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "In the Linux kernel, the following vulnerability has been resolved:\n\nvideo: fbdev: arkfb: Fix a divide-by-zero bug in ark_set_pixclock()\n\nSince the user can control the arguments of the ioctl() from the user\nspace, under special arguments that may result in a divide-by-zero bug\nin:\n  drivers/video/fbdev/arkfb.c:784: ark_set_pixclock(info, (hdiv * info-\u003evar.pixclock) / hmul);\nwith hdiv=1, pixclock=1 and hmul=2 you end up with (1*1)/2 = (int) 0.\nand then in:\n  drivers/video/fbdev/arkfb.c:504: rv = dac_set_freq(par-\u003edac, 0, 1000000000 / pixclock);\nwe\u0027ll get a division-by-zero.\n\nThe following log can reveal it:\n\ndivide error: 0000 [#1] PREEMPT SMP KASAN PTI\nRIP: 0010:ark_set_pixclock drivers/video/fbdev/arkfb.c:504 [inline]\nRIP: 0010:arkfb_set_par+0x10fc/0x24c0 drivers/video/fbdev/arkfb.c:784\nCall Trace:\n fb_set_var+0x604/0xeb0 drivers/video/fbdev/core/fbmem.c:1034\n do_fb_ioctl+0x234/0x670 drivers/video/fbdev/core/fbmem.c:1110\n fb_ioctl+0xdd/0x130 drivers/video/fbdev/core/fbmem.c:1189\n\nFix this by checking the argument of ark_set_pixclock() first.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.170.2.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.170.2.s390x",
          "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.170.2.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.170.2.s390x",
          "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.170.2.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.170.2.s390x",
          "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.170.2.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.170.2.s390x",
          "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-64kb-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-64kb-devel-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-devel-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-devel-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-devel-5.14.21-150400.24.170.1.noarch",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-docs-5.14.21-150400.24.170.1.noarch",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-macros-5.14.21-150400.24.170.1.noarch",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-obs-build-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-obs-build-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-source-5.14.21-150400.24.170.1.noarch",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-syms-5.14.21-150400.24.170.1.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-syms-5.14.21-150400.24.170.1.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:reiserfs-kmp-default-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:reiserfs-kmp-default-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-64kb-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-64kb-devel-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-devel-5.14.21-150400.24.170.1.noarch",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-docs-5.14.21-150400.24.170.1.noarch",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-macros-5.14.21-150400.24.170.1.noarch",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-source-5.14.21-150400.24.170.1.noarch",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.170.1.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.170.1.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.170.2.ppc64le",
          "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.170.2.s390x",
          "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.170.2.ppc64le",
          "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.170.2.s390x",
          "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_170-default-1-150400.9.3.2.ppc64le",
          "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_170-default-1-150400.9.3.2.s390x",
          "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_170-default-1-150400.9.3.2.x86_64",
          "SUSE Linux Enterprise Micro 5.3:kernel-default-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise Micro 5.3:kernel-default-5.14.21-150400.24.170.2.s390x",
          "SUSE Linux Enterprise Micro 5.3:kernel-default-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise Micro 5.3:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.aarch64",
          "SUSE Linux Enterprise Micro 5.3:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
          "SUSE Linux Enterprise Micro 5.4:kernel-default-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise Micro 5.4:kernel-default-5.14.21-150400.24.170.2.s390x",
          "SUSE Linux Enterprise Micro 5.4:kernel-default-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise Micro 5.4:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.aarch64",
          "SUSE Linux Enterprise Micro 5.4:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-64kb-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-64kb-devel-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-5.14.21-150400.24.170.2.ppc64le",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-5.14.21-150400.24.170.2.s390x",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.aarch64",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.ppc64le",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.170.2.ppc64le",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.170.2.s390x",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-devel-5.14.21-150400.24.170.1.noarch",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-docs-5.14.21-150400.24.170.1.noarch",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-macros-5.14.21-150400.24.170.1.noarch",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.170.2.ppc64le",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.170.2.s390x",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-source-5.14.21-150400.24.170.1.noarch",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.170.1.aarch64",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.170.1.ppc64le",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.170.1.s390x",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.170.1.x86_64",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-zfcpdump-5.14.21-150400.24.170.2.s390x",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.170.2.ppc64le",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.170.2.s390x",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-5.14.21-150400.24.170.2.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-devel-5.14.21-150400.24.170.2.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-devel-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-devel-5.14.21-150400.24.170.1.noarch",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-docs-5.14.21-150400.24.170.1.noarch",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-macros-5.14.21-150400.24.170.1.noarch",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-obs-build-5.14.21-150400.24.170.2.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-obs-build-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-source-5.14.21-150400.24.170.1.noarch",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-syms-5.14.21-150400.24.170.1.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-syms-5.14.21-150400.24.170.1.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.170.2.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.170.2.x86_64",
          "SUSE Manager Proxy 4.3:kernel-default-5.14.21-150400.24.170.2.x86_64",
          "SUSE Manager Proxy 4.3:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
          "SUSE Manager Proxy 4.3:kernel-default-devel-5.14.21-150400.24.170.2.x86_64",
          "SUSE Manager Proxy 4.3:kernel-devel-5.14.21-150400.24.170.1.noarch",
          "SUSE Manager Proxy 4.3:kernel-macros-5.14.21-150400.24.170.1.noarch",
          "SUSE Manager Proxy 4.3:kernel-source-5.14.21-150400.24.170.1.noarch",
          "SUSE Manager Proxy 4.3:kernel-syms-5.14.21-150400.24.170.1.x86_64",
          "SUSE Manager Server 4.3:kernel-default-5.14.21-150400.24.170.2.ppc64le",
          "SUSE Manager Server 4.3:kernel-default-5.14.21-150400.24.170.2.s390x",
          "SUSE Manager Server 4.3:kernel-default-5.14.21-150400.24.170.2.x86_64",
          "SUSE Manager Server 4.3:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.ppc64le",
          "SUSE Manager Server 4.3:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
          "SUSE Manager Server 4.3:kernel-default-devel-5.14.21-150400.24.170.2.ppc64le",
          "SUSE Manager Server 4.3:kernel-default-devel-5.14.21-150400.24.170.2.s390x",
          "SUSE Manager Server 4.3:kernel-default-devel-5.14.21-150400.24.170.2.x86_64",
          "SUSE Manager Server 4.3:kernel-devel-5.14.21-150400.24.170.1.noarch",
          "SUSE Manager Server 4.3:kernel-macros-5.14.21-150400.24.170.1.noarch",
          "SUSE Manager Server 4.3:kernel-source-5.14.21-150400.24.170.1.noarch",
          "SUSE Manager Server 4.3:kernel-syms-5.14.21-150400.24.170.1.ppc64le",
          "SUSE Manager Server 4.3:kernel-syms-5.14.21-150400.24.170.1.s390x",
          "SUSE Manager Server 4.3:kernel-syms-5.14.21-150400.24.170.1.x86_64",
          "SUSE Manager Server 4.3:kernel-zfcpdump-5.14.21-150400.24.170.2.s390x"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2022-50102",
          "url": "https://www.suse.com/security/cve/CVE-2022-50102"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1244838 for CVE-2022-50102",
          "url": "https://bugzilla.suse.com/1244838"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-64kb-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-64kb-devel-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-devel-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-devel-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-devel-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-docs-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-macros-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-obs-build-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-obs-build-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-source-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-syms-5.14.21-150400.24.170.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-syms-5.14.21-150400.24.170.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:reiserfs-kmp-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:reiserfs-kmp-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-64kb-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-64kb-devel-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-devel-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-docs-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-macros-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-source-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.170.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.170.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_170-default-1-150400.9.3.2.ppc64le",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_170-default-1-150400.9.3.2.s390x",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_170-default-1-150400.9.3.2.x86_64",
            "SUSE Linux Enterprise Micro 5.3:kernel-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise Micro 5.3:kernel-default-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise Micro 5.3:kernel-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Micro 5.3:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.aarch64",
            "SUSE Linux Enterprise Micro 5.3:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
            "SUSE Linux Enterprise Micro 5.4:kernel-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise Micro 5.4:kernel-default-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise Micro 5.4:kernel-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Micro 5.4:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.aarch64",
            "SUSE Linux Enterprise Micro 5.4:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-64kb-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-64kb-devel-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.aarch64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.ppc64le",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-devel-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-docs-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-macros-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-source-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.170.1.aarch64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.170.1.ppc64le",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.170.1.s390x",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.170.1.x86_64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-zfcpdump-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-devel-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-devel-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-devel-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-docs-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-macros-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-obs-build-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-obs-build-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-source-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-syms-5.14.21-150400.24.170.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-syms-5.14.21-150400.24.170.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Manager Proxy 4.3:kernel-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Manager Proxy 4.3:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
            "SUSE Manager Proxy 4.3:kernel-default-devel-5.14.21-150400.24.170.2.x86_64",
            "SUSE Manager Proxy 4.3:kernel-devel-5.14.21-150400.24.170.1.noarch",
            "SUSE Manager Proxy 4.3:kernel-macros-5.14.21-150400.24.170.1.noarch",
            "SUSE Manager Proxy 4.3:kernel-source-5.14.21-150400.24.170.1.noarch",
            "SUSE Manager Proxy 4.3:kernel-syms-5.14.21-150400.24.170.1.x86_64",
            "SUSE Manager Server 4.3:kernel-default-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Manager Server 4.3:kernel-default-5.14.21-150400.24.170.2.s390x",
            "SUSE Manager Server 4.3:kernel-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Manager Server 4.3:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.ppc64le",
            "SUSE Manager Server 4.3:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
            "SUSE Manager Server 4.3:kernel-default-devel-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Manager Server 4.3:kernel-default-devel-5.14.21-150400.24.170.2.s390x",
            "SUSE Manager Server 4.3:kernel-default-devel-5.14.21-150400.24.170.2.x86_64",
            "SUSE Manager Server 4.3:kernel-devel-5.14.21-150400.24.170.1.noarch",
            "SUSE Manager Server 4.3:kernel-macros-5.14.21-150400.24.170.1.noarch",
            "SUSE Manager Server 4.3:kernel-source-5.14.21-150400.24.170.1.noarch",
            "SUSE Manager Server 4.3:kernel-syms-5.14.21-150400.24.170.1.ppc64le",
            "SUSE Manager Server 4.3:kernel-syms-5.14.21-150400.24.170.1.s390x",
            "SUSE Manager Server 4.3:kernel-syms-5.14.21-150400.24.170.1.x86_64",
            "SUSE Manager Server 4.3:kernel-zfcpdump-5.14.21-150400.24.170.2.s390x"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 5.5,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
            "version": "3.1"
          },
          "products": [
            "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-64kb-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-64kb-devel-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-devel-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-devel-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-devel-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-docs-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-macros-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-obs-build-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-obs-build-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-source-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-syms-5.14.21-150400.24.170.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-syms-5.14.21-150400.24.170.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:reiserfs-kmp-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:reiserfs-kmp-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-64kb-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-64kb-devel-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-devel-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-docs-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-macros-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-source-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.170.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.170.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_170-default-1-150400.9.3.2.ppc64le",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_170-default-1-150400.9.3.2.s390x",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_170-default-1-150400.9.3.2.x86_64",
            "SUSE Linux Enterprise Micro 5.3:kernel-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise Micro 5.3:kernel-default-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise Micro 5.3:kernel-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Micro 5.3:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.aarch64",
            "SUSE Linux Enterprise Micro 5.3:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
            "SUSE Linux Enterprise Micro 5.4:kernel-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise Micro 5.4:kernel-default-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise Micro 5.4:kernel-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Micro 5.4:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.aarch64",
            "SUSE Linux Enterprise Micro 5.4:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-64kb-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-64kb-devel-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.aarch64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.ppc64le",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-devel-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-docs-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-macros-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-source-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.170.1.aarch64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.170.1.ppc64le",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.170.1.s390x",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.170.1.x86_64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-zfcpdump-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-devel-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-devel-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-devel-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-docs-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-macros-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-obs-build-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-obs-build-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-source-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-syms-5.14.21-150400.24.170.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-syms-5.14.21-150400.24.170.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Manager Proxy 4.3:kernel-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Manager Proxy 4.3:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
            "SUSE Manager Proxy 4.3:kernel-default-devel-5.14.21-150400.24.170.2.x86_64",
            "SUSE Manager Proxy 4.3:kernel-devel-5.14.21-150400.24.170.1.noarch",
            "SUSE Manager Proxy 4.3:kernel-macros-5.14.21-150400.24.170.1.noarch",
            "SUSE Manager Proxy 4.3:kernel-source-5.14.21-150400.24.170.1.noarch",
            "SUSE Manager Proxy 4.3:kernel-syms-5.14.21-150400.24.170.1.x86_64",
            "SUSE Manager Server 4.3:kernel-default-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Manager Server 4.3:kernel-default-5.14.21-150400.24.170.2.s390x",
            "SUSE Manager Server 4.3:kernel-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Manager Server 4.3:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.ppc64le",
            "SUSE Manager Server 4.3:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
            "SUSE Manager Server 4.3:kernel-default-devel-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Manager Server 4.3:kernel-default-devel-5.14.21-150400.24.170.2.s390x",
            "SUSE Manager Server 4.3:kernel-default-devel-5.14.21-150400.24.170.2.x86_64",
            "SUSE Manager Server 4.3:kernel-devel-5.14.21-150400.24.170.1.noarch",
            "SUSE Manager Server 4.3:kernel-macros-5.14.21-150400.24.170.1.noarch",
            "SUSE Manager Server 4.3:kernel-source-5.14.21-150400.24.170.1.noarch",
            "SUSE Manager Server 4.3:kernel-syms-5.14.21-150400.24.170.1.ppc64le",
            "SUSE Manager Server 4.3:kernel-syms-5.14.21-150400.24.170.1.s390x",
            "SUSE Manager Server 4.3:kernel-syms-5.14.21-150400.24.170.1.x86_64",
            "SUSE Manager Server 4.3:kernel-zfcpdump-5.14.21-150400.24.170.2.s390x"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2025-07-28T15:09:33Z",
          "details": "moderate"
        }
      ],
      "title": "CVE-2022-50102"
    },
    {
      "cve": "CVE-2022-50103",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2022-50103"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "In the Linux kernel, the following vulnerability has been resolved:\n\nsched, cpuset: Fix dl_cpu_busy() panic due to empty cs-\u003ecpus_allowed\n\nWith cgroup v2, the cpuset\u0027s cpus_allowed mask can be empty indicating\nthat the cpuset will just use the effective CPUs of its parent. So\ncpuset_can_attach() can call task_can_attach() with an empty mask.\nThis can lead to cpumask_any_and() returns nr_cpu_ids causing the call\nto dl_bw_of() to crash due to percpu value access of an out of bound\nCPU value. For example:\n\n\t[80468.182258] BUG: unable to handle page fault for address: ffffffff8b6648b0\n\t  :\n\t[80468.191019] RIP: 0010:dl_cpu_busy+0x30/0x2b0\n\t  :\n\t[80468.207946] Call Trace:\n\t[80468.208947]  cpuset_can_attach+0xa0/0x140\n\t[80468.209953]  cgroup_migrate_execute+0x8c/0x490\n\t[80468.210931]  cgroup_update_dfl_csses+0x254/0x270\n\t[80468.211898]  cgroup_subtree_control_write+0x322/0x400\n\t[80468.212854]  kernfs_fop_write_iter+0x11c/0x1b0\n\t[80468.213777]  new_sync_write+0x11f/0x1b0\n\t[80468.214689]  vfs_write+0x1eb/0x280\n\t[80468.215592]  ksys_write+0x5f/0xe0\n\t[80468.216463]  do_syscall_64+0x5c/0x80\n\t[80468.224287]  entry_SYSCALL_64_after_hwframe+0x44/0xae\n\nFix that by using effective_cpus instead. For cgroup v1, effective_cpus\nis the same as cpus_allowed. For v2, effective_cpus is the real cpumask\nto be used by tasks within the cpuset anyway.\n\nAlso update task_can_attach()\u0027s 2nd argument name to cs_effective_cpus to\nreflect the change. In addition, a check is added to task_can_attach()\nto guard against the possibility that cpumask_any_and() may return a\nvalue \u003e= nr_cpu_ids.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.170.2.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.170.2.s390x",
          "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.170.2.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.170.2.s390x",
          "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.170.2.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.170.2.s390x",
          "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.170.2.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.170.2.s390x",
          "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-64kb-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-64kb-devel-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-devel-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-devel-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-devel-5.14.21-150400.24.170.1.noarch",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-docs-5.14.21-150400.24.170.1.noarch",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-macros-5.14.21-150400.24.170.1.noarch",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-obs-build-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-obs-build-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-source-5.14.21-150400.24.170.1.noarch",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-syms-5.14.21-150400.24.170.1.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-syms-5.14.21-150400.24.170.1.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:reiserfs-kmp-default-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:reiserfs-kmp-default-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-64kb-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-64kb-devel-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-devel-5.14.21-150400.24.170.1.noarch",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-docs-5.14.21-150400.24.170.1.noarch",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-macros-5.14.21-150400.24.170.1.noarch",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-source-5.14.21-150400.24.170.1.noarch",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.170.1.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.170.1.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.170.2.ppc64le",
          "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.170.2.s390x",
          "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.170.2.ppc64le",
          "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.170.2.s390x",
          "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_170-default-1-150400.9.3.2.ppc64le",
          "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_170-default-1-150400.9.3.2.s390x",
          "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_170-default-1-150400.9.3.2.x86_64",
          "SUSE Linux Enterprise Micro 5.3:kernel-default-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise Micro 5.3:kernel-default-5.14.21-150400.24.170.2.s390x",
          "SUSE Linux Enterprise Micro 5.3:kernel-default-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise Micro 5.3:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.aarch64",
          "SUSE Linux Enterprise Micro 5.3:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
          "SUSE Linux Enterprise Micro 5.4:kernel-default-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise Micro 5.4:kernel-default-5.14.21-150400.24.170.2.s390x",
          "SUSE Linux Enterprise Micro 5.4:kernel-default-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise Micro 5.4:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.aarch64",
          "SUSE Linux Enterprise Micro 5.4:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-64kb-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-64kb-devel-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-5.14.21-150400.24.170.2.ppc64le",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-5.14.21-150400.24.170.2.s390x",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.aarch64",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.ppc64le",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.170.2.ppc64le",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.170.2.s390x",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-devel-5.14.21-150400.24.170.1.noarch",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-docs-5.14.21-150400.24.170.1.noarch",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-macros-5.14.21-150400.24.170.1.noarch",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.170.2.ppc64le",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.170.2.s390x",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-source-5.14.21-150400.24.170.1.noarch",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.170.1.aarch64",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.170.1.ppc64le",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.170.1.s390x",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.170.1.x86_64",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-zfcpdump-5.14.21-150400.24.170.2.s390x",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.170.2.ppc64le",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.170.2.s390x",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-5.14.21-150400.24.170.2.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-devel-5.14.21-150400.24.170.2.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-devel-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-devel-5.14.21-150400.24.170.1.noarch",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-docs-5.14.21-150400.24.170.1.noarch",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-macros-5.14.21-150400.24.170.1.noarch",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-obs-build-5.14.21-150400.24.170.2.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-obs-build-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-source-5.14.21-150400.24.170.1.noarch",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-syms-5.14.21-150400.24.170.1.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-syms-5.14.21-150400.24.170.1.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.170.2.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.170.2.x86_64",
          "SUSE Manager Proxy 4.3:kernel-default-5.14.21-150400.24.170.2.x86_64",
          "SUSE Manager Proxy 4.3:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
          "SUSE Manager Proxy 4.3:kernel-default-devel-5.14.21-150400.24.170.2.x86_64",
          "SUSE Manager Proxy 4.3:kernel-devel-5.14.21-150400.24.170.1.noarch",
          "SUSE Manager Proxy 4.3:kernel-macros-5.14.21-150400.24.170.1.noarch",
          "SUSE Manager Proxy 4.3:kernel-source-5.14.21-150400.24.170.1.noarch",
          "SUSE Manager Proxy 4.3:kernel-syms-5.14.21-150400.24.170.1.x86_64",
          "SUSE Manager Server 4.3:kernel-default-5.14.21-150400.24.170.2.ppc64le",
          "SUSE Manager Server 4.3:kernel-default-5.14.21-150400.24.170.2.s390x",
          "SUSE Manager Server 4.3:kernel-default-5.14.21-150400.24.170.2.x86_64",
          "SUSE Manager Server 4.3:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.ppc64le",
          "SUSE Manager Server 4.3:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
          "SUSE Manager Server 4.3:kernel-default-devel-5.14.21-150400.24.170.2.ppc64le",
          "SUSE Manager Server 4.3:kernel-default-devel-5.14.21-150400.24.170.2.s390x",
          "SUSE Manager Server 4.3:kernel-default-devel-5.14.21-150400.24.170.2.x86_64",
          "SUSE Manager Server 4.3:kernel-devel-5.14.21-150400.24.170.1.noarch",
          "SUSE Manager Server 4.3:kernel-macros-5.14.21-150400.24.170.1.noarch",
          "SUSE Manager Server 4.3:kernel-source-5.14.21-150400.24.170.1.noarch",
          "SUSE Manager Server 4.3:kernel-syms-5.14.21-150400.24.170.1.ppc64le",
          "SUSE Manager Server 4.3:kernel-syms-5.14.21-150400.24.170.1.s390x",
          "SUSE Manager Server 4.3:kernel-syms-5.14.21-150400.24.170.1.x86_64",
          "SUSE Manager Server 4.3:kernel-zfcpdump-5.14.21-150400.24.170.2.s390x"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2022-50103",
          "url": "https://www.suse.com/security/cve/CVE-2022-50103"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1244840 for CVE-2022-50103",
          "url": "https://bugzilla.suse.com/1244840"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-64kb-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-64kb-devel-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-devel-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-devel-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-devel-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-docs-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-macros-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-obs-build-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-obs-build-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-source-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-syms-5.14.21-150400.24.170.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-syms-5.14.21-150400.24.170.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:reiserfs-kmp-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:reiserfs-kmp-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-64kb-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-64kb-devel-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-devel-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-docs-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-macros-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-source-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.170.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.170.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_170-default-1-150400.9.3.2.ppc64le",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_170-default-1-150400.9.3.2.s390x",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_170-default-1-150400.9.3.2.x86_64",
            "SUSE Linux Enterprise Micro 5.3:kernel-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise Micro 5.3:kernel-default-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise Micro 5.3:kernel-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Micro 5.3:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.aarch64",
            "SUSE Linux Enterprise Micro 5.3:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
            "SUSE Linux Enterprise Micro 5.4:kernel-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise Micro 5.4:kernel-default-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise Micro 5.4:kernel-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Micro 5.4:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.aarch64",
            "SUSE Linux Enterprise Micro 5.4:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-64kb-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-64kb-devel-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.aarch64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.ppc64le",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-devel-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-docs-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-macros-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-source-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.170.1.aarch64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.170.1.ppc64le",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.170.1.s390x",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.170.1.x86_64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-zfcpdump-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-devel-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-devel-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-devel-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-docs-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-macros-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-obs-build-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-obs-build-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-source-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-syms-5.14.21-150400.24.170.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-syms-5.14.21-150400.24.170.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Manager Proxy 4.3:kernel-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Manager Proxy 4.3:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
            "SUSE Manager Proxy 4.3:kernel-default-devel-5.14.21-150400.24.170.2.x86_64",
            "SUSE Manager Proxy 4.3:kernel-devel-5.14.21-150400.24.170.1.noarch",
            "SUSE Manager Proxy 4.3:kernel-macros-5.14.21-150400.24.170.1.noarch",
            "SUSE Manager Proxy 4.3:kernel-source-5.14.21-150400.24.170.1.noarch",
            "SUSE Manager Proxy 4.3:kernel-syms-5.14.21-150400.24.170.1.x86_64",
            "SUSE Manager Server 4.3:kernel-default-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Manager Server 4.3:kernel-default-5.14.21-150400.24.170.2.s390x",
            "SUSE Manager Server 4.3:kernel-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Manager Server 4.3:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.ppc64le",
            "SUSE Manager Server 4.3:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
            "SUSE Manager Server 4.3:kernel-default-devel-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Manager Server 4.3:kernel-default-devel-5.14.21-150400.24.170.2.s390x",
            "SUSE Manager Server 4.3:kernel-default-devel-5.14.21-150400.24.170.2.x86_64",
            "SUSE Manager Server 4.3:kernel-devel-5.14.21-150400.24.170.1.noarch",
            "SUSE Manager Server 4.3:kernel-macros-5.14.21-150400.24.170.1.noarch",
            "SUSE Manager Server 4.3:kernel-source-5.14.21-150400.24.170.1.noarch",
            "SUSE Manager Server 4.3:kernel-syms-5.14.21-150400.24.170.1.ppc64le",
            "SUSE Manager Server 4.3:kernel-syms-5.14.21-150400.24.170.1.s390x",
            "SUSE Manager Server 4.3:kernel-syms-5.14.21-150400.24.170.1.x86_64",
            "SUSE Manager Server 4.3:kernel-zfcpdump-5.14.21-150400.24.170.2.s390x"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 5.5,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
            "version": "3.1"
          },
          "products": [
            "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-64kb-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-64kb-devel-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-devel-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-devel-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-devel-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-docs-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-macros-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-obs-build-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-obs-build-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-source-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-syms-5.14.21-150400.24.170.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-syms-5.14.21-150400.24.170.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:reiserfs-kmp-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:reiserfs-kmp-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-64kb-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-64kb-devel-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-devel-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-docs-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-macros-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-source-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.170.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.170.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_170-default-1-150400.9.3.2.ppc64le",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_170-default-1-150400.9.3.2.s390x",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_170-default-1-150400.9.3.2.x86_64",
            "SUSE Linux Enterprise Micro 5.3:kernel-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise Micro 5.3:kernel-default-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise Micro 5.3:kernel-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Micro 5.3:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.aarch64",
            "SUSE Linux Enterprise Micro 5.3:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
            "SUSE Linux Enterprise Micro 5.4:kernel-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise Micro 5.4:kernel-default-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise Micro 5.4:kernel-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Micro 5.4:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.aarch64",
            "SUSE Linux Enterprise Micro 5.4:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-64kb-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-64kb-devel-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.aarch64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.ppc64le",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-devel-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-docs-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-macros-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-source-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.170.1.aarch64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.170.1.ppc64le",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.170.1.s390x",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.170.1.x86_64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-zfcpdump-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-devel-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-devel-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-devel-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-docs-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-macros-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-obs-build-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-obs-build-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-source-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-syms-5.14.21-150400.24.170.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-syms-5.14.21-150400.24.170.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Manager Proxy 4.3:kernel-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Manager Proxy 4.3:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
            "SUSE Manager Proxy 4.3:kernel-default-devel-5.14.21-150400.24.170.2.x86_64",
            "SUSE Manager Proxy 4.3:kernel-devel-5.14.21-150400.24.170.1.noarch",
            "SUSE Manager Proxy 4.3:kernel-macros-5.14.21-150400.24.170.1.noarch",
            "SUSE Manager Proxy 4.3:kernel-source-5.14.21-150400.24.170.1.noarch",
            "SUSE Manager Proxy 4.3:kernel-syms-5.14.21-150400.24.170.1.x86_64",
            "SUSE Manager Server 4.3:kernel-default-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Manager Server 4.3:kernel-default-5.14.21-150400.24.170.2.s390x",
            "SUSE Manager Server 4.3:kernel-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Manager Server 4.3:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.ppc64le",
            "SUSE Manager Server 4.3:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
            "SUSE Manager Server 4.3:kernel-default-devel-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Manager Server 4.3:kernel-default-devel-5.14.21-150400.24.170.2.s390x",
            "SUSE Manager Server 4.3:kernel-default-devel-5.14.21-150400.24.170.2.x86_64",
            "SUSE Manager Server 4.3:kernel-devel-5.14.21-150400.24.170.1.noarch",
            "SUSE Manager Server 4.3:kernel-macros-5.14.21-150400.24.170.1.noarch",
            "SUSE Manager Server 4.3:kernel-source-5.14.21-150400.24.170.1.noarch",
            "SUSE Manager Server 4.3:kernel-syms-5.14.21-150400.24.170.1.ppc64le",
            "SUSE Manager Server 4.3:kernel-syms-5.14.21-150400.24.170.1.s390x",
            "SUSE Manager Server 4.3:kernel-syms-5.14.21-150400.24.170.1.x86_64",
            "SUSE Manager Server 4.3:kernel-zfcpdump-5.14.21-150400.24.170.2.s390x"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2025-07-28T15:09:33Z",
          "details": "moderate"
        }
      ],
      "title": "CVE-2022-50103"
    },
    {
      "cve": "CVE-2022-50104",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2022-50104"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "In the Linux kernel, the following vulnerability has been resolved:\n\npowerpc/xive: Fix refcount leak in xive_get_max_prio\n\nof_find_node_by_path() returns a node pointer with\nrefcount incremented, we should use of_node_put() on it when done.\nAdd missing of_node_put() to avoid refcount leak.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.170.2.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.170.2.s390x",
          "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.170.2.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.170.2.s390x",
          "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.170.2.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.170.2.s390x",
          "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.170.2.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.170.2.s390x",
          "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-64kb-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-64kb-devel-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-devel-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-devel-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-devel-5.14.21-150400.24.170.1.noarch",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-docs-5.14.21-150400.24.170.1.noarch",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-macros-5.14.21-150400.24.170.1.noarch",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-obs-build-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-obs-build-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-source-5.14.21-150400.24.170.1.noarch",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-syms-5.14.21-150400.24.170.1.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-syms-5.14.21-150400.24.170.1.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:reiserfs-kmp-default-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:reiserfs-kmp-default-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-64kb-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-64kb-devel-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-devel-5.14.21-150400.24.170.1.noarch",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-docs-5.14.21-150400.24.170.1.noarch",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-macros-5.14.21-150400.24.170.1.noarch",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-source-5.14.21-150400.24.170.1.noarch",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.170.1.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.170.1.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.170.2.ppc64le",
          "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.170.2.s390x",
          "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.170.2.ppc64le",
          "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.170.2.s390x",
          "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_170-default-1-150400.9.3.2.ppc64le",
          "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_170-default-1-150400.9.3.2.s390x",
          "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_170-default-1-150400.9.3.2.x86_64",
          "SUSE Linux Enterprise Micro 5.3:kernel-default-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise Micro 5.3:kernel-default-5.14.21-150400.24.170.2.s390x",
          "SUSE Linux Enterprise Micro 5.3:kernel-default-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise Micro 5.3:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.aarch64",
          "SUSE Linux Enterprise Micro 5.3:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
          "SUSE Linux Enterprise Micro 5.4:kernel-default-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise Micro 5.4:kernel-default-5.14.21-150400.24.170.2.s390x",
          "SUSE Linux Enterprise Micro 5.4:kernel-default-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise Micro 5.4:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.aarch64",
          "SUSE Linux Enterprise Micro 5.4:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-64kb-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-64kb-devel-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-5.14.21-150400.24.170.2.ppc64le",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-5.14.21-150400.24.170.2.s390x",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.aarch64",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.ppc64le",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.170.2.ppc64le",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.170.2.s390x",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-devel-5.14.21-150400.24.170.1.noarch",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-docs-5.14.21-150400.24.170.1.noarch",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-macros-5.14.21-150400.24.170.1.noarch",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.170.2.ppc64le",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.170.2.s390x",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-source-5.14.21-150400.24.170.1.noarch",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.170.1.aarch64",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.170.1.ppc64le",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.170.1.s390x",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.170.1.x86_64",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-zfcpdump-5.14.21-150400.24.170.2.s390x",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.170.2.ppc64le",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.170.2.s390x",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-5.14.21-150400.24.170.2.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-devel-5.14.21-150400.24.170.2.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-devel-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-devel-5.14.21-150400.24.170.1.noarch",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-docs-5.14.21-150400.24.170.1.noarch",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-macros-5.14.21-150400.24.170.1.noarch",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-obs-build-5.14.21-150400.24.170.2.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-obs-build-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-source-5.14.21-150400.24.170.1.noarch",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-syms-5.14.21-150400.24.170.1.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-syms-5.14.21-150400.24.170.1.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.170.2.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.170.2.x86_64",
          "SUSE Manager Proxy 4.3:kernel-default-5.14.21-150400.24.170.2.x86_64",
          "SUSE Manager Proxy 4.3:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
          "SUSE Manager Proxy 4.3:kernel-default-devel-5.14.21-150400.24.170.2.x86_64",
          "SUSE Manager Proxy 4.3:kernel-devel-5.14.21-150400.24.170.1.noarch",
          "SUSE Manager Proxy 4.3:kernel-macros-5.14.21-150400.24.170.1.noarch",
          "SUSE Manager Proxy 4.3:kernel-source-5.14.21-150400.24.170.1.noarch",
          "SUSE Manager Proxy 4.3:kernel-syms-5.14.21-150400.24.170.1.x86_64",
          "SUSE Manager Server 4.3:kernel-default-5.14.21-150400.24.170.2.ppc64le",
          "SUSE Manager Server 4.3:kernel-default-5.14.21-150400.24.170.2.s390x",
          "SUSE Manager Server 4.3:kernel-default-5.14.21-150400.24.170.2.x86_64",
          "SUSE Manager Server 4.3:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.ppc64le",
          "SUSE Manager Server 4.3:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
          "SUSE Manager Server 4.3:kernel-default-devel-5.14.21-150400.24.170.2.ppc64le",
          "SUSE Manager Server 4.3:kernel-default-devel-5.14.21-150400.24.170.2.s390x",
          "SUSE Manager Server 4.3:kernel-default-devel-5.14.21-150400.24.170.2.x86_64",
          "SUSE Manager Server 4.3:kernel-devel-5.14.21-150400.24.170.1.noarch",
          "SUSE Manager Server 4.3:kernel-macros-5.14.21-150400.24.170.1.noarch",
          "SUSE Manager Server 4.3:kernel-source-5.14.21-150400.24.170.1.noarch",
          "SUSE Manager Server 4.3:kernel-syms-5.14.21-150400.24.170.1.ppc64le",
          "SUSE Manager Server 4.3:kernel-syms-5.14.21-150400.24.170.1.s390x",
          "SUSE Manager Server 4.3:kernel-syms-5.14.21-150400.24.170.1.x86_64",
          "SUSE Manager Server 4.3:kernel-zfcpdump-5.14.21-150400.24.170.2.s390x"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2022-50104",
          "url": "https://www.suse.com/security/cve/CVE-2022-50104"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1244836 for CVE-2022-50104",
          "url": "https://bugzilla.suse.com/1244836"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-64kb-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-64kb-devel-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-devel-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-devel-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-devel-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-docs-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-macros-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-obs-build-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-obs-build-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-source-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-syms-5.14.21-150400.24.170.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-syms-5.14.21-150400.24.170.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:reiserfs-kmp-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:reiserfs-kmp-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-64kb-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-64kb-devel-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-devel-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-docs-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-macros-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-source-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.170.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.170.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_170-default-1-150400.9.3.2.ppc64le",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_170-default-1-150400.9.3.2.s390x",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_170-default-1-150400.9.3.2.x86_64",
            "SUSE Linux Enterprise Micro 5.3:kernel-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise Micro 5.3:kernel-default-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise Micro 5.3:kernel-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Micro 5.3:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.aarch64",
            "SUSE Linux Enterprise Micro 5.3:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
            "SUSE Linux Enterprise Micro 5.4:kernel-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise Micro 5.4:kernel-default-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise Micro 5.4:kernel-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Micro 5.4:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.aarch64",
            "SUSE Linux Enterprise Micro 5.4:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-64kb-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-64kb-devel-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.aarch64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.ppc64le",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-devel-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-docs-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-macros-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-source-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.170.1.aarch64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.170.1.ppc64le",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.170.1.s390x",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.170.1.x86_64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-zfcpdump-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-devel-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-devel-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-devel-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-docs-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-macros-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-obs-build-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-obs-build-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-source-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-syms-5.14.21-150400.24.170.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-syms-5.14.21-150400.24.170.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Manager Proxy 4.3:kernel-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Manager Proxy 4.3:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
            "SUSE Manager Proxy 4.3:kernel-default-devel-5.14.21-150400.24.170.2.x86_64",
            "SUSE Manager Proxy 4.3:kernel-devel-5.14.21-150400.24.170.1.noarch",
            "SUSE Manager Proxy 4.3:kernel-macros-5.14.21-150400.24.170.1.noarch",
            "SUSE Manager Proxy 4.3:kernel-source-5.14.21-150400.24.170.1.noarch",
            "SUSE Manager Proxy 4.3:kernel-syms-5.14.21-150400.24.170.1.x86_64",
            "SUSE Manager Server 4.3:kernel-default-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Manager Server 4.3:kernel-default-5.14.21-150400.24.170.2.s390x",
            "SUSE Manager Server 4.3:kernel-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Manager Server 4.3:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.ppc64le",
            "SUSE Manager Server 4.3:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
            "SUSE Manager Server 4.3:kernel-default-devel-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Manager Server 4.3:kernel-default-devel-5.14.21-150400.24.170.2.s390x",
            "SUSE Manager Server 4.3:kernel-default-devel-5.14.21-150400.24.170.2.x86_64",
            "SUSE Manager Server 4.3:kernel-devel-5.14.21-150400.24.170.1.noarch",
            "SUSE Manager Server 4.3:kernel-macros-5.14.21-150400.24.170.1.noarch",
            "SUSE Manager Server 4.3:kernel-source-5.14.21-150400.24.170.1.noarch",
            "SUSE Manager Server 4.3:kernel-syms-5.14.21-150400.24.170.1.ppc64le",
            "SUSE Manager Server 4.3:kernel-syms-5.14.21-150400.24.170.1.s390x",
            "SUSE Manager Server 4.3:kernel-syms-5.14.21-150400.24.170.1.x86_64",
            "SUSE Manager Server 4.3:kernel-zfcpdump-5.14.21-150400.24.170.2.s390x"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 5.5,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
            "version": "3.1"
          },
          "products": [
            "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-64kb-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-64kb-devel-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-devel-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-devel-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-devel-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-docs-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-macros-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-obs-build-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-obs-build-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-source-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-syms-5.14.21-150400.24.170.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-syms-5.14.21-150400.24.170.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:reiserfs-kmp-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:reiserfs-kmp-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-64kb-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-64kb-devel-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-devel-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-docs-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-macros-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-source-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.170.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.170.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_170-default-1-150400.9.3.2.ppc64le",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_170-default-1-150400.9.3.2.s390x",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_170-default-1-150400.9.3.2.x86_64",
            "SUSE Linux Enterprise Micro 5.3:kernel-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise Micro 5.3:kernel-default-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise Micro 5.3:kernel-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Micro 5.3:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.aarch64",
            "SUSE Linux Enterprise Micro 5.3:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
            "SUSE Linux Enterprise Micro 5.4:kernel-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise Micro 5.4:kernel-default-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise Micro 5.4:kernel-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Micro 5.4:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.aarch64",
            "SUSE Linux Enterprise Micro 5.4:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-64kb-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-64kb-devel-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.aarch64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.ppc64le",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-devel-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-docs-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-macros-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-source-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.170.1.aarch64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.170.1.ppc64le",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.170.1.s390x",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.170.1.x86_64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-zfcpdump-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-devel-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-devel-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-devel-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-docs-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-macros-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-obs-build-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-obs-build-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-source-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-syms-5.14.21-150400.24.170.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-syms-5.14.21-150400.24.170.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Manager Proxy 4.3:kernel-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Manager Proxy 4.3:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
            "SUSE Manager Proxy 4.3:kernel-default-devel-5.14.21-150400.24.170.2.x86_64",
            "SUSE Manager Proxy 4.3:kernel-devel-5.14.21-150400.24.170.1.noarch",
            "SUSE Manager Proxy 4.3:kernel-macros-5.14.21-150400.24.170.1.noarch",
            "SUSE Manager Proxy 4.3:kernel-source-5.14.21-150400.24.170.1.noarch",
            "SUSE Manager Proxy 4.3:kernel-syms-5.14.21-150400.24.170.1.x86_64",
            "SUSE Manager Server 4.3:kernel-default-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Manager Server 4.3:kernel-default-5.14.21-150400.24.170.2.s390x",
            "SUSE Manager Server 4.3:kernel-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Manager Server 4.3:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.ppc64le",
            "SUSE Manager Server 4.3:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
            "SUSE Manager Server 4.3:kernel-default-devel-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Manager Server 4.3:kernel-default-devel-5.14.21-150400.24.170.2.s390x",
            "SUSE Manager Server 4.3:kernel-default-devel-5.14.21-150400.24.170.2.x86_64",
            "SUSE Manager Server 4.3:kernel-devel-5.14.21-150400.24.170.1.noarch",
            "SUSE Manager Server 4.3:kernel-macros-5.14.21-150400.24.170.1.noarch",
            "SUSE Manager Server 4.3:kernel-source-5.14.21-150400.24.170.1.noarch",
            "SUSE Manager Server 4.3:kernel-syms-5.14.21-150400.24.170.1.ppc64le",
            "SUSE Manager Server 4.3:kernel-syms-5.14.21-150400.24.170.1.s390x",
            "SUSE Manager Server 4.3:kernel-syms-5.14.21-150400.24.170.1.x86_64",
            "SUSE Manager Server 4.3:kernel-zfcpdump-5.14.21-150400.24.170.2.s390x"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2025-07-28T15:09:33Z",
          "details": "moderate"
        }
      ],
      "title": "CVE-2022-50104"
    },
    {
      "cve": "CVE-2022-50108",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2022-50108"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "In the Linux kernel, the following vulnerability has been resolved:\n\nmfd: max77620: Fix refcount leak in max77620_initialise_fps\n\nof_get_child_by_name() returns a node pointer with refcount\nincremented, we should use of_node_put() on it when not need anymore.\nAdd missing of_node_put() to avoid refcount leak.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.170.2.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.170.2.s390x",
          "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.170.2.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.170.2.s390x",
          "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.170.2.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.170.2.s390x",
          "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.170.2.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.170.2.s390x",
          "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-64kb-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-64kb-devel-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-devel-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-devel-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-devel-5.14.21-150400.24.170.1.noarch",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-docs-5.14.21-150400.24.170.1.noarch",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-macros-5.14.21-150400.24.170.1.noarch",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-obs-build-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-obs-build-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-source-5.14.21-150400.24.170.1.noarch",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-syms-5.14.21-150400.24.170.1.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-syms-5.14.21-150400.24.170.1.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:reiserfs-kmp-default-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:reiserfs-kmp-default-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-64kb-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-64kb-devel-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-devel-5.14.21-150400.24.170.1.noarch",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-docs-5.14.21-150400.24.170.1.noarch",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-macros-5.14.21-150400.24.170.1.noarch",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-source-5.14.21-150400.24.170.1.noarch",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.170.1.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.170.1.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.170.2.ppc64le",
          "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.170.2.s390x",
          "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.170.2.ppc64le",
          "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.170.2.s390x",
          "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_170-default-1-150400.9.3.2.ppc64le",
          "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_170-default-1-150400.9.3.2.s390x",
          "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_170-default-1-150400.9.3.2.x86_64",
          "SUSE Linux Enterprise Micro 5.3:kernel-default-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise Micro 5.3:kernel-default-5.14.21-150400.24.170.2.s390x",
          "SUSE Linux Enterprise Micro 5.3:kernel-default-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise Micro 5.3:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.aarch64",
          "SUSE Linux Enterprise Micro 5.3:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
          "SUSE Linux Enterprise Micro 5.4:kernel-default-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise Micro 5.4:kernel-default-5.14.21-150400.24.170.2.s390x",
          "SUSE Linux Enterprise Micro 5.4:kernel-default-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise Micro 5.4:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.aarch64",
          "SUSE Linux Enterprise Micro 5.4:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-64kb-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-64kb-devel-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-5.14.21-150400.24.170.2.ppc64le",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-5.14.21-150400.24.170.2.s390x",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.aarch64",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.ppc64le",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.170.2.ppc64le",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.170.2.s390x",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-devel-5.14.21-150400.24.170.1.noarch",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-docs-5.14.21-150400.24.170.1.noarch",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-macros-5.14.21-150400.24.170.1.noarch",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.170.2.ppc64le",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.170.2.s390x",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-source-5.14.21-150400.24.170.1.noarch",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.170.1.aarch64",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.170.1.ppc64le",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.170.1.s390x",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.170.1.x86_64",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-zfcpdump-5.14.21-150400.24.170.2.s390x",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.170.2.ppc64le",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.170.2.s390x",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-5.14.21-150400.24.170.2.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-devel-5.14.21-150400.24.170.2.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-devel-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-devel-5.14.21-150400.24.170.1.noarch",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-docs-5.14.21-150400.24.170.1.noarch",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-macros-5.14.21-150400.24.170.1.noarch",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-obs-build-5.14.21-150400.24.170.2.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-obs-build-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-source-5.14.21-150400.24.170.1.noarch",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-syms-5.14.21-150400.24.170.1.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-syms-5.14.21-150400.24.170.1.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.170.2.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.170.2.x86_64",
          "SUSE Manager Proxy 4.3:kernel-default-5.14.21-150400.24.170.2.x86_64",
          "SUSE Manager Proxy 4.3:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
          "SUSE Manager Proxy 4.3:kernel-default-devel-5.14.21-150400.24.170.2.x86_64",
          "SUSE Manager Proxy 4.3:kernel-devel-5.14.21-150400.24.170.1.noarch",
          "SUSE Manager Proxy 4.3:kernel-macros-5.14.21-150400.24.170.1.noarch",
          "SUSE Manager Proxy 4.3:kernel-source-5.14.21-150400.24.170.1.noarch",
          "SUSE Manager Proxy 4.3:kernel-syms-5.14.21-150400.24.170.1.x86_64",
          "SUSE Manager Server 4.3:kernel-default-5.14.21-150400.24.170.2.ppc64le",
          "SUSE Manager Server 4.3:kernel-default-5.14.21-150400.24.170.2.s390x",
          "SUSE Manager Server 4.3:kernel-default-5.14.21-150400.24.170.2.x86_64",
          "SUSE Manager Server 4.3:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.ppc64le",
          "SUSE Manager Server 4.3:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
          "SUSE Manager Server 4.3:kernel-default-devel-5.14.21-150400.24.170.2.ppc64le",
          "SUSE Manager Server 4.3:kernel-default-devel-5.14.21-150400.24.170.2.s390x",
          "SUSE Manager Server 4.3:kernel-default-devel-5.14.21-150400.24.170.2.x86_64",
          "SUSE Manager Server 4.3:kernel-devel-5.14.21-150400.24.170.1.noarch",
          "SUSE Manager Server 4.3:kernel-macros-5.14.21-150400.24.170.1.noarch",
          "SUSE Manager Server 4.3:kernel-source-5.14.21-150400.24.170.1.noarch",
          "SUSE Manager Server 4.3:kernel-syms-5.14.21-150400.24.170.1.ppc64le",
          "SUSE Manager Server 4.3:kernel-syms-5.14.21-150400.24.170.1.s390x",
          "SUSE Manager Server 4.3:kernel-syms-5.14.21-150400.24.170.1.x86_64",
          "SUSE Manager Server 4.3:kernel-zfcpdump-5.14.21-150400.24.170.2.s390x"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2022-50108",
          "url": "https://www.suse.com/security/cve/CVE-2022-50108"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1244834 for CVE-2022-50108",
          "url": "https://bugzilla.suse.com/1244834"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-64kb-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-64kb-devel-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-devel-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-devel-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-devel-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-docs-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-macros-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-obs-build-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-obs-build-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-source-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-syms-5.14.21-150400.24.170.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-syms-5.14.21-150400.24.170.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:reiserfs-kmp-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:reiserfs-kmp-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-64kb-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-64kb-devel-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-devel-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-docs-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-macros-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-source-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.170.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.170.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_170-default-1-150400.9.3.2.ppc64le",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_170-default-1-150400.9.3.2.s390x",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_170-default-1-150400.9.3.2.x86_64",
            "SUSE Linux Enterprise Micro 5.3:kernel-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise Micro 5.3:kernel-default-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise Micro 5.3:kernel-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Micro 5.3:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.aarch64",
            "SUSE Linux Enterprise Micro 5.3:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
            "SUSE Linux Enterprise Micro 5.4:kernel-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise Micro 5.4:kernel-default-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise Micro 5.4:kernel-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Micro 5.4:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.aarch64",
            "SUSE Linux Enterprise Micro 5.4:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-64kb-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-64kb-devel-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.aarch64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.ppc64le",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-devel-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-docs-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-macros-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-source-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.170.1.aarch64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.170.1.ppc64le",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.170.1.s390x",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.170.1.x86_64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-zfcpdump-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-devel-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-devel-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-devel-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-docs-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-macros-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-obs-build-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-obs-build-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-source-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-syms-5.14.21-150400.24.170.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-syms-5.14.21-150400.24.170.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Manager Proxy 4.3:kernel-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Manager Proxy 4.3:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
            "SUSE Manager Proxy 4.3:kernel-default-devel-5.14.21-150400.24.170.2.x86_64",
            "SUSE Manager Proxy 4.3:kernel-devel-5.14.21-150400.24.170.1.noarch",
            "SUSE Manager Proxy 4.3:kernel-macros-5.14.21-150400.24.170.1.noarch",
            "SUSE Manager Proxy 4.3:kernel-source-5.14.21-150400.24.170.1.noarch",
            "SUSE Manager Proxy 4.3:kernel-syms-5.14.21-150400.24.170.1.x86_64",
            "SUSE Manager Server 4.3:kernel-default-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Manager Server 4.3:kernel-default-5.14.21-150400.24.170.2.s390x",
            "SUSE Manager Server 4.3:kernel-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Manager Server 4.3:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.ppc64le",
            "SUSE Manager Server 4.3:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
            "SUSE Manager Server 4.3:kernel-default-devel-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Manager Server 4.3:kernel-default-devel-5.14.21-150400.24.170.2.s390x",
            "SUSE Manager Server 4.3:kernel-default-devel-5.14.21-150400.24.170.2.x86_64",
            "SUSE Manager Server 4.3:kernel-devel-5.14.21-150400.24.170.1.noarch",
            "SUSE Manager Server 4.3:kernel-macros-5.14.21-150400.24.170.1.noarch",
            "SUSE Manager Server 4.3:kernel-source-5.14.21-150400.24.170.1.noarch",
            "SUSE Manager Server 4.3:kernel-syms-5.14.21-150400.24.170.1.ppc64le",
            "SUSE Manager Server 4.3:kernel-syms-5.14.21-150400.24.170.1.s390x",
            "SUSE Manager Server 4.3:kernel-syms-5.14.21-150400.24.170.1.x86_64",
            "SUSE Manager Server 4.3:kernel-zfcpdump-5.14.21-150400.24.170.2.s390x"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 5.5,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
            "version": "3.1"
          },
          "products": [
            "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-64kb-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-64kb-devel-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-devel-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-devel-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-devel-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-docs-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-macros-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-obs-build-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-obs-build-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-source-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-syms-5.14.21-150400.24.170.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-syms-5.14.21-150400.24.170.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:reiserfs-kmp-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:reiserfs-kmp-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-64kb-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-64kb-devel-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-devel-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-docs-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-macros-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-source-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.170.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.170.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_170-default-1-150400.9.3.2.ppc64le",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_170-default-1-150400.9.3.2.s390x",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_170-default-1-150400.9.3.2.x86_64",
            "SUSE Linux Enterprise Micro 5.3:kernel-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise Micro 5.3:kernel-default-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise Micro 5.3:kernel-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Micro 5.3:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.aarch64",
            "SUSE Linux Enterprise Micro 5.3:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
            "SUSE Linux Enterprise Micro 5.4:kernel-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise Micro 5.4:kernel-default-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise Micro 5.4:kernel-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Micro 5.4:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.aarch64",
            "SUSE Linux Enterprise Micro 5.4:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-64kb-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-64kb-devel-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.aarch64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.ppc64le",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-devel-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-docs-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-macros-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-source-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.170.1.aarch64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.170.1.ppc64le",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.170.1.s390x",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.170.1.x86_64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-zfcpdump-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-devel-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-devel-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-devel-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-docs-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-macros-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-obs-build-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-obs-build-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-source-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-syms-5.14.21-150400.24.170.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-syms-5.14.21-150400.24.170.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Manager Proxy 4.3:kernel-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Manager Proxy 4.3:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
            "SUSE Manager Proxy 4.3:kernel-default-devel-5.14.21-150400.24.170.2.x86_64",
            "SUSE Manager Proxy 4.3:kernel-devel-5.14.21-150400.24.170.1.noarch",
            "SUSE Manager Proxy 4.3:kernel-macros-5.14.21-150400.24.170.1.noarch",
            "SUSE Manager Proxy 4.3:kernel-source-5.14.21-150400.24.170.1.noarch",
            "SUSE Manager Proxy 4.3:kernel-syms-5.14.21-150400.24.170.1.x86_64",
            "SUSE Manager Server 4.3:kernel-default-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Manager Server 4.3:kernel-default-5.14.21-150400.24.170.2.s390x",
            "SUSE Manager Server 4.3:kernel-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Manager Server 4.3:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.ppc64le",
            "SUSE Manager Server 4.3:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
            "SUSE Manager Server 4.3:kernel-default-devel-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Manager Server 4.3:kernel-default-devel-5.14.21-150400.24.170.2.s390x",
            "SUSE Manager Server 4.3:kernel-default-devel-5.14.21-150400.24.170.2.x86_64",
            "SUSE Manager Server 4.3:kernel-devel-5.14.21-150400.24.170.1.noarch",
            "SUSE Manager Server 4.3:kernel-macros-5.14.21-150400.24.170.1.noarch",
            "SUSE Manager Server 4.3:kernel-source-5.14.21-150400.24.170.1.noarch",
            "SUSE Manager Server 4.3:kernel-syms-5.14.21-150400.24.170.1.ppc64le",
            "SUSE Manager Server 4.3:kernel-syms-5.14.21-150400.24.170.1.s390x",
            "SUSE Manager Server 4.3:kernel-syms-5.14.21-150400.24.170.1.x86_64",
            "SUSE Manager Server 4.3:kernel-zfcpdump-5.14.21-150400.24.170.2.s390x"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2025-07-28T15:09:33Z",
          "details": "moderate"
        }
      ],
      "title": "CVE-2022-50108"
    },
    {
      "cve": "CVE-2022-50109",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2022-50109"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "In the Linux kernel, the following vulnerability has been resolved:\n\nvideo: fbdev: amba-clcd: Fix refcount leak bugs\n\nIn clcdfb_of_init_display(), we should call of_node_put() for the\nreferences returned by of_graph_get_next_endpoint() and\nof_graph_get_remote_port_parent() which have increased the refcount.\n\nBesides, we should call of_node_put() both in fail path or when\nthe references are not used anymore.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.170.2.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.170.2.s390x",
          "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.170.2.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.170.2.s390x",
          "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.170.2.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.170.2.s390x",
          "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.170.2.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.170.2.s390x",
          "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-64kb-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-64kb-devel-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-devel-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-devel-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-devel-5.14.21-150400.24.170.1.noarch",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-docs-5.14.21-150400.24.170.1.noarch",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-macros-5.14.21-150400.24.170.1.noarch",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-obs-build-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-obs-build-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-source-5.14.21-150400.24.170.1.noarch",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-syms-5.14.21-150400.24.170.1.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-syms-5.14.21-150400.24.170.1.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:reiserfs-kmp-default-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:reiserfs-kmp-default-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-64kb-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-64kb-devel-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-devel-5.14.21-150400.24.170.1.noarch",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-docs-5.14.21-150400.24.170.1.noarch",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-macros-5.14.21-150400.24.170.1.noarch",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-source-5.14.21-150400.24.170.1.noarch",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.170.1.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.170.1.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.170.2.ppc64le",
          "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.170.2.s390x",
          "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.170.2.ppc64le",
          "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.170.2.s390x",
          "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_170-default-1-150400.9.3.2.ppc64le",
          "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_170-default-1-150400.9.3.2.s390x",
          "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_170-default-1-150400.9.3.2.x86_64",
          "SUSE Linux Enterprise Micro 5.3:kernel-default-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise Micro 5.3:kernel-default-5.14.21-150400.24.170.2.s390x",
          "SUSE Linux Enterprise Micro 5.3:kernel-default-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise Micro 5.3:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.aarch64",
          "SUSE Linux Enterprise Micro 5.3:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
          "SUSE Linux Enterprise Micro 5.4:kernel-default-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise Micro 5.4:kernel-default-5.14.21-150400.24.170.2.s390x",
          "SUSE Linux Enterprise Micro 5.4:kernel-default-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise Micro 5.4:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.aarch64",
          "SUSE Linux Enterprise Micro 5.4:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-64kb-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-64kb-devel-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-5.14.21-150400.24.170.2.ppc64le",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-5.14.21-150400.24.170.2.s390x",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.aarch64",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.ppc64le",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.170.2.ppc64le",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.170.2.s390x",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-devel-5.14.21-150400.24.170.1.noarch",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-docs-5.14.21-150400.24.170.1.noarch",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-macros-5.14.21-150400.24.170.1.noarch",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.170.2.ppc64le",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.170.2.s390x",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-source-5.14.21-150400.24.170.1.noarch",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.170.1.aarch64",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.170.1.ppc64le",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.170.1.s390x",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.170.1.x86_64",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-zfcpdump-5.14.21-150400.24.170.2.s390x",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.170.2.ppc64le",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.170.2.s390x",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-5.14.21-150400.24.170.2.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-devel-5.14.21-150400.24.170.2.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-devel-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-devel-5.14.21-150400.24.170.1.noarch",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-docs-5.14.21-150400.24.170.1.noarch",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-macros-5.14.21-150400.24.170.1.noarch",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-obs-build-5.14.21-150400.24.170.2.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-obs-build-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-source-5.14.21-150400.24.170.1.noarch",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-syms-5.14.21-150400.24.170.1.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-syms-5.14.21-150400.24.170.1.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.170.2.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.170.2.x86_64",
          "SUSE Manager Proxy 4.3:kernel-default-5.14.21-150400.24.170.2.x86_64",
          "SUSE Manager Proxy 4.3:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
          "SUSE Manager Proxy 4.3:kernel-default-devel-5.14.21-150400.24.170.2.x86_64",
          "SUSE Manager Proxy 4.3:kernel-devel-5.14.21-150400.24.170.1.noarch",
          "SUSE Manager Proxy 4.3:kernel-macros-5.14.21-150400.24.170.1.noarch",
          "SUSE Manager Proxy 4.3:kernel-source-5.14.21-150400.24.170.1.noarch",
          "SUSE Manager Proxy 4.3:kernel-syms-5.14.21-150400.24.170.1.x86_64",
          "SUSE Manager Server 4.3:kernel-default-5.14.21-150400.24.170.2.ppc64le",
          "SUSE Manager Server 4.3:kernel-default-5.14.21-150400.24.170.2.s390x",
          "SUSE Manager Server 4.3:kernel-default-5.14.21-150400.24.170.2.x86_64",
          "SUSE Manager Server 4.3:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.ppc64le",
          "SUSE Manager Server 4.3:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
          "SUSE Manager Server 4.3:kernel-default-devel-5.14.21-150400.24.170.2.ppc64le",
          "SUSE Manager Server 4.3:kernel-default-devel-5.14.21-150400.24.170.2.s390x",
          "SUSE Manager Server 4.3:kernel-default-devel-5.14.21-150400.24.170.2.x86_64",
          "SUSE Manager Server 4.3:kernel-devel-5.14.21-150400.24.170.1.noarch",
          "SUSE Manager Server 4.3:kernel-macros-5.14.21-150400.24.170.1.noarch",
          "SUSE Manager Server 4.3:kernel-source-5.14.21-150400.24.170.1.noarch",
          "SUSE Manager Server 4.3:kernel-syms-5.14.21-150400.24.170.1.ppc64le",
          "SUSE Manager Server 4.3:kernel-syms-5.14.21-150400.24.170.1.s390x",
          "SUSE Manager Server 4.3:kernel-syms-5.14.21-150400.24.170.1.x86_64",
          "SUSE Manager Server 4.3:kernel-zfcpdump-5.14.21-150400.24.170.2.s390x"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2022-50109",
          "url": "https://www.suse.com/security/cve/CVE-2022-50109"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1244884 for CVE-2022-50109",
          "url": "https://bugzilla.suse.com/1244884"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-64kb-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-64kb-devel-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-devel-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-devel-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-devel-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-docs-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-macros-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-obs-build-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-obs-build-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-source-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-syms-5.14.21-150400.24.170.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-syms-5.14.21-150400.24.170.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:reiserfs-kmp-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:reiserfs-kmp-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-64kb-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-64kb-devel-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-devel-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-docs-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-macros-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-source-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.170.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.170.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_170-default-1-150400.9.3.2.ppc64le",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_170-default-1-150400.9.3.2.s390x",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_170-default-1-150400.9.3.2.x86_64",
            "SUSE Linux Enterprise Micro 5.3:kernel-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise Micro 5.3:kernel-default-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise Micro 5.3:kernel-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Micro 5.3:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.aarch64",
            "SUSE Linux Enterprise Micro 5.3:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
            "SUSE Linux Enterprise Micro 5.4:kernel-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise Micro 5.4:kernel-default-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise Micro 5.4:kernel-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Micro 5.4:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.aarch64",
            "SUSE Linux Enterprise Micro 5.4:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-64kb-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-64kb-devel-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.aarch64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.ppc64le",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-devel-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-docs-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-macros-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-source-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.170.1.aarch64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.170.1.ppc64le",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.170.1.s390x",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.170.1.x86_64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-zfcpdump-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-devel-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-devel-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-devel-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-docs-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-macros-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-obs-build-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-obs-build-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-source-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-syms-5.14.21-150400.24.170.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-syms-5.14.21-150400.24.170.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Manager Proxy 4.3:kernel-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Manager Proxy 4.3:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
            "SUSE Manager Proxy 4.3:kernel-default-devel-5.14.21-150400.24.170.2.x86_64",
            "SUSE Manager Proxy 4.3:kernel-devel-5.14.21-150400.24.170.1.noarch",
            "SUSE Manager Proxy 4.3:kernel-macros-5.14.21-150400.24.170.1.noarch",
            "SUSE Manager Proxy 4.3:kernel-source-5.14.21-150400.24.170.1.noarch",
            "SUSE Manager Proxy 4.3:kernel-syms-5.14.21-150400.24.170.1.x86_64",
            "SUSE Manager Server 4.3:kernel-default-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Manager Server 4.3:kernel-default-5.14.21-150400.24.170.2.s390x",
            "SUSE Manager Server 4.3:kernel-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Manager Server 4.3:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.ppc64le",
            "SUSE Manager Server 4.3:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
            "SUSE Manager Server 4.3:kernel-default-devel-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Manager Server 4.3:kernel-default-devel-5.14.21-150400.24.170.2.s390x",
            "SUSE Manager Server 4.3:kernel-default-devel-5.14.21-150400.24.170.2.x86_64",
            "SUSE Manager Server 4.3:kernel-devel-5.14.21-150400.24.170.1.noarch",
            "SUSE Manager Server 4.3:kernel-macros-5.14.21-150400.24.170.1.noarch",
            "SUSE Manager Server 4.3:kernel-source-5.14.21-150400.24.170.1.noarch",
            "SUSE Manager Server 4.3:kernel-syms-5.14.21-150400.24.170.1.ppc64le",
            "SUSE Manager Server 4.3:kernel-syms-5.14.21-150400.24.170.1.s390x",
            "SUSE Manager Server 4.3:kernel-syms-5.14.21-150400.24.170.1.x86_64",
            "SUSE Manager Server 4.3:kernel-zfcpdump-5.14.21-150400.24.170.2.s390x"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 5.5,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
            "version": "3.1"
          },
          "products": [
            "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-64kb-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-64kb-devel-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-devel-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-devel-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-devel-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-docs-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-macros-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-obs-build-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-obs-build-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-source-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-syms-5.14.21-150400.24.170.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-syms-5.14.21-150400.24.170.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:reiserfs-kmp-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:reiserfs-kmp-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-64kb-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-64kb-devel-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-devel-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-docs-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-macros-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-source-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.170.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.170.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_170-default-1-150400.9.3.2.ppc64le",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_170-default-1-150400.9.3.2.s390x",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_170-default-1-150400.9.3.2.x86_64",
            "SUSE Linux Enterprise Micro 5.3:kernel-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise Micro 5.3:kernel-default-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise Micro 5.3:kernel-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Micro 5.3:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.aarch64",
            "SUSE Linux Enterprise Micro 5.3:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
            "SUSE Linux Enterprise Micro 5.4:kernel-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise Micro 5.4:kernel-default-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise Micro 5.4:kernel-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Micro 5.4:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.aarch64",
            "SUSE Linux Enterprise Micro 5.4:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-64kb-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-64kb-devel-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.aarch64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.ppc64le",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-devel-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-docs-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-macros-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-source-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.170.1.aarch64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.170.1.ppc64le",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.170.1.s390x",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.170.1.x86_64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-zfcpdump-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-devel-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-devel-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-devel-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-docs-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-macros-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-obs-build-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-obs-build-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-source-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-syms-5.14.21-150400.24.170.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-syms-5.14.21-150400.24.170.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Manager Proxy 4.3:kernel-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Manager Proxy 4.3:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
            "SUSE Manager Proxy 4.3:kernel-default-devel-5.14.21-150400.24.170.2.x86_64",
            "SUSE Manager Proxy 4.3:kernel-devel-5.14.21-150400.24.170.1.noarch",
            "SUSE Manager Proxy 4.3:kernel-macros-5.14.21-150400.24.170.1.noarch",
            "SUSE Manager Proxy 4.3:kernel-source-5.14.21-150400.24.170.1.noarch",
            "SUSE Manager Proxy 4.3:kernel-syms-5.14.21-150400.24.170.1.x86_64",
            "SUSE Manager Server 4.3:kernel-default-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Manager Server 4.3:kernel-default-5.14.21-150400.24.170.2.s390x",
            "SUSE Manager Server 4.3:kernel-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Manager Server 4.3:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.ppc64le",
            "SUSE Manager Server 4.3:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
            "SUSE Manager Server 4.3:kernel-default-devel-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Manager Server 4.3:kernel-default-devel-5.14.21-150400.24.170.2.s390x",
            "SUSE Manager Server 4.3:kernel-default-devel-5.14.21-150400.24.170.2.x86_64",
            "SUSE Manager Server 4.3:kernel-devel-5.14.21-150400.24.170.1.noarch",
            "SUSE Manager Server 4.3:kernel-macros-5.14.21-150400.24.170.1.noarch",
            "SUSE Manager Server 4.3:kernel-source-5.14.21-150400.24.170.1.noarch",
            "SUSE Manager Server 4.3:kernel-syms-5.14.21-150400.24.170.1.ppc64le",
            "SUSE Manager Server 4.3:kernel-syms-5.14.21-150400.24.170.1.s390x",
            "SUSE Manager Server 4.3:kernel-syms-5.14.21-150400.24.170.1.x86_64",
            "SUSE Manager Server 4.3:kernel-zfcpdump-5.14.21-150400.24.170.2.s390x"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2025-07-28T15:09:33Z",
          "details": "moderate"
        }
      ],
      "title": "CVE-2022-50109"
    },
    {
      "cve": "CVE-2022-50110",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2022-50110"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "In the Linux kernel, the following vulnerability has been resolved:\n\nwatchdog: sp5100_tco: Fix a memory leak of EFCH MMIO resource\n\nUnlike release_mem_region(), a call to release_resource() does not\nfree the resource, so it has to be freed explicitly to avoid a memory\nleak.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.170.2.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.170.2.s390x",
          "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.170.2.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.170.2.s390x",
          "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.170.2.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.170.2.s390x",
          "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.170.2.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.170.2.s390x",
          "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-64kb-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-64kb-devel-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-devel-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-devel-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-devel-5.14.21-150400.24.170.1.noarch",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-docs-5.14.21-150400.24.170.1.noarch",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-macros-5.14.21-150400.24.170.1.noarch",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-obs-build-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-obs-build-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-source-5.14.21-150400.24.170.1.noarch",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-syms-5.14.21-150400.24.170.1.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-syms-5.14.21-150400.24.170.1.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:reiserfs-kmp-default-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:reiserfs-kmp-default-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-64kb-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-64kb-devel-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-devel-5.14.21-150400.24.170.1.noarch",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-docs-5.14.21-150400.24.170.1.noarch",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-macros-5.14.21-150400.24.170.1.noarch",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-source-5.14.21-150400.24.170.1.noarch",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.170.1.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.170.1.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.170.2.ppc64le",
          "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.170.2.s390x",
          "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.170.2.ppc64le",
          "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.170.2.s390x",
          "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_170-default-1-150400.9.3.2.ppc64le",
          "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_170-default-1-150400.9.3.2.s390x",
          "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_170-default-1-150400.9.3.2.x86_64",
          "SUSE Linux Enterprise Micro 5.3:kernel-default-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise Micro 5.3:kernel-default-5.14.21-150400.24.170.2.s390x",
          "SUSE Linux Enterprise Micro 5.3:kernel-default-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise Micro 5.3:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.aarch64",
          "SUSE Linux Enterprise Micro 5.3:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
          "SUSE Linux Enterprise Micro 5.4:kernel-default-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise Micro 5.4:kernel-default-5.14.21-150400.24.170.2.s390x",
          "SUSE Linux Enterprise Micro 5.4:kernel-default-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise Micro 5.4:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.aarch64",
          "SUSE Linux Enterprise Micro 5.4:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-64kb-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-64kb-devel-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-5.14.21-150400.24.170.2.ppc64le",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-5.14.21-150400.24.170.2.s390x",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.aarch64",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.ppc64le",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.170.2.ppc64le",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.170.2.s390x",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-devel-5.14.21-150400.24.170.1.noarch",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-docs-5.14.21-150400.24.170.1.noarch",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-macros-5.14.21-150400.24.170.1.noarch",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.170.2.ppc64le",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.170.2.s390x",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-source-5.14.21-150400.24.170.1.noarch",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.170.1.aarch64",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.170.1.ppc64le",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.170.1.s390x",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.170.1.x86_64",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-zfcpdump-5.14.21-150400.24.170.2.s390x",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.170.2.ppc64le",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.170.2.s390x",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-5.14.21-150400.24.170.2.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-devel-5.14.21-150400.24.170.2.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-devel-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-devel-5.14.21-150400.24.170.1.noarch",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-docs-5.14.21-150400.24.170.1.noarch",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-macros-5.14.21-150400.24.170.1.noarch",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-obs-build-5.14.21-150400.24.170.2.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-obs-build-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-source-5.14.21-150400.24.170.1.noarch",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-syms-5.14.21-150400.24.170.1.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-syms-5.14.21-150400.24.170.1.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.170.2.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.170.2.x86_64",
          "SUSE Manager Proxy 4.3:kernel-default-5.14.21-150400.24.170.2.x86_64",
          "SUSE Manager Proxy 4.3:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
          "SUSE Manager Proxy 4.3:kernel-default-devel-5.14.21-150400.24.170.2.x86_64",
          "SUSE Manager Proxy 4.3:kernel-devel-5.14.21-150400.24.170.1.noarch",
          "SUSE Manager Proxy 4.3:kernel-macros-5.14.21-150400.24.170.1.noarch",
          "SUSE Manager Proxy 4.3:kernel-source-5.14.21-150400.24.170.1.noarch",
          "SUSE Manager Proxy 4.3:kernel-syms-5.14.21-150400.24.170.1.x86_64",
          "SUSE Manager Server 4.3:kernel-default-5.14.21-150400.24.170.2.ppc64le",
          "SUSE Manager Server 4.3:kernel-default-5.14.21-150400.24.170.2.s390x",
          "SUSE Manager Server 4.3:kernel-default-5.14.21-150400.24.170.2.x86_64",
          "SUSE Manager Server 4.3:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.ppc64le",
          "SUSE Manager Server 4.3:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
          "SUSE Manager Server 4.3:kernel-default-devel-5.14.21-150400.24.170.2.ppc64le",
          "SUSE Manager Server 4.3:kernel-default-devel-5.14.21-150400.24.170.2.s390x",
          "SUSE Manager Server 4.3:kernel-default-devel-5.14.21-150400.24.170.2.x86_64",
          "SUSE Manager Server 4.3:kernel-devel-5.14.21-150400.24.170.1.noarch",
          "SUSE Manager Server 4.3:kernel-macros-5.14.21-150400.24.170.1.noarch",
          "SUSE Manager Server 4.3:kernel-source-5.14.21-150400.24.170.1.noarch",
          "SUSE Manager Server 4.3:kernel-syms-5.14.21-150400.24.170.1.ppc64le",
          "SUSE Manager Server 4.3:kernel-syms-5.14.21-150400.24.170.1.s390x",
          "SUSE Manager Server 4.3:kernel-syms-5.14.21-150400.24.170.1.x86_64",
          "SUSE Manager Server 4.3:kernel-zfcpdump-5.14.21-150400.24.170.2.s390x"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2022-50110",
          "url": "https://www.suse.com/security/cve/CVE-2022-50110"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1244830 for CVE-2022-50110",
          "url": "https://bugzilla.suse.com/1244830"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-64kb-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-64kb-devel-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-devel-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-devel-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-devel-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-docs-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-macros-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-obs-build-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-obs-build-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-source-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-syms-5.14.21-150400.24.170.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-syms-5.14.21-150400.24.170.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:reiserfs-kmp-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:reiserfs-kmp-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-64kb-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-64kb-devel-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-devel-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-docs-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-macros-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-source-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.170.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.170.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_170-default-1-150400.9.3.2.ppc64le",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_170-default-1-150400.9.3.2.s390x",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_170-default-1-150400.9.3.2.x86_64",
            "SUSE Linux Enterprise Micro 5.3:kernel-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise Micro 5.3:kernel-default-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise Micro 5.3:kernel-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Micro 5.3:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.aarch64",
            "SUSE Linux Enterprise Micro 5.3:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
            "SUSE Linux Enterprise Micro 5.4:kernel-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise Micro 5.4:kernel-default-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise Micro 5.4:kernel-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Micro 5.4:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.aarch64",
            "SUSE Linux Enterprise Micro 5.4:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-64kb-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-64kb-devel-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.aarch64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.ppc64le",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-devel-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-docs-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-macros-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-source-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.170.1.aarch64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.170.1.ppc64le",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.170.1.s390x",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.170.1.x86_64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-zfcpdump-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-devel-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-devel-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-devel-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-docs-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-macros-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-obs-build-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-obs-build-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-source-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-syms-5.14.21-150400.24.170.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-syms-5.14.21-150400.24.170.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Manager Proxy 4.3:kernel-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Manager Proxy 4.3:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
            "SUSE Manager Proxy 4.3:kernel-default-devel-5.14.21-150400.24.170.2.x86_64",
            "SUSE Manager Proxy 4.3:kernel-devel-5.14.21-150400.24.170.1.noarch",
            "SUSE Manager Proxy 4.3:kernel-macros-5.14.21-150400.24.170.1.noarch",
            "SUSE Manager Proxy 4.3:kernel-source-5.14.21-150400.24.170.1.noarch",
            "SUSE Manager Proxy 4.3:kernel-syms-5.14.21-150400.24.170.1.x86_64",
            "SUSE Manager Server 4.3:kernel-default-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Manager Server 4.3:kernel-default-5.14.21-150400.24.170.2.s390x",
            "SUSE Manager Server 4.3:kernel-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Manager Server 4.3:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.ppc64le",
            "SUSE Manager Server 4.3:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
            "SUSE Manager Server 4.3:kernel-default-devel-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Manager Server 4.3:kernel-default-devel-5.14.21-150400.24.170.2.s390x",
            "SUSE Manager Server 4.3:kernel-default-devel-5.14.21-150400.24.170.2.x86_64",
            "SUSE Manager Server 4.3:kernel-devel-5.14.21-150400.24.170.1.noarch",
            "SUSE Manager Server 4.3:kernel-macros-5.14.21-150400.24.170.1.noarch",
            "SUSE Manager Server 4.3:kernel-source-5.14.21-150400.24.170.1.noarch",
            "SUSE Manager Server 4.3:kernel-syms-5.14.21-150400.24.170.1.ppc64le",
            "SUSE Manager Server 4.3:kernel-syms-5.14.21-150400.24.170.1.s390x",
            "SUSE Manager Server 4.3:kernel-syms-5.14.21-150400.24.170.1.x86_64",
            "SUSE Manager Server 4.3:kernel-zfcpdump-5.14.21-150400.24.170.2.s390x"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 5.5,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
            "version": "3.1"
          },
          "products": [
            "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-64kb-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-64kb-devel-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-devel-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-devel-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-devel-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-docs-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-macros-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-obs-build-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-obs-build-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-source-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-syms-5.14.21-150400.24.170.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-syms-5.14.21-150400.24.170.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:reiserfs-kmp-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:reiserfs-kmp-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-64kb-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-64kb-devel-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-devel-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-docs-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-macros-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-source-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.170.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.170.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_170-default-1-150400.9.3.2.ppc64le",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_170-default-1-150400.9.3.2.s390x",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_170-default-1-150400.9.3.2.x86_64",
            "SUSE Linux Enterprise Micro 5.3:kernel-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise Micro 5.3:kernel-default-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise Micro 5.3:kernel-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Micro 5.3:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.aarch64",
            "SUSE Linux Enterprise Micro 5.3:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
            "SUSE Linux Enterprise Micro 5.4:kernel-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise Micro 5.4:kernel-default-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise Micro 5.4:kernel-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Micro 5.4:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.aarch64",
            "SUSE Linux Enterprise Micro 5.4:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-64kb-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-64kb-devel-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.aarch64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.ppc64le",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-devel-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-docs-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-macros-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-source-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.170.1.aarch64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.170.1.ppc64le",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.170.1.s390x",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.170.1.x86_64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-zfcpdump-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-devel-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-devel-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-devel-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-docs-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-macros-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-obs-build-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-obs-build-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-source-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-syms-5.14.21-150400.24.170.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-syms-5.14.21-150400.24.170.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Manager Proxy 4.3:kernel-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Manager Proxy 4.3:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
            "SUSE Manager Proxy 4.3:kernel-default-devel-5.14.21-150400.24.170.2.x86_64",
            "SUSE Manager Proxy 4.3:kernel-devel-5.14.21-150400.24.170.1.noarch",
            "SUSE Manager Proxy 4.3:kernel-macros-5.14.21-150400.24.170.1.noarch",
            "SUSE Manager Proxy 4.3:kernel-source-5.14.21-150400.24.170.1.noarch",
            "SUSE Manager Proxy 4.3:kernel-syms-5.14.21-150400.24.170.1.x86_64",
            "SUSE Manager Server 4.3:kernel-default-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Manager Server 4.3:kernel-default-5.14.21-150400.24.170.2.s390x",
            "SUSE Manager Server 4.3:kernel-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Manager Server 4.3:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.ppc64le",
            "SUSE Manager Server 4.3:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
            "SUSE Manager Server 4.3:kernel-default-devel-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Manager Server 4.3:kernel-default-devel-5.14.21-150400.24.170.2.s390x",
            "SUSE Manager Server 4.3:kernel-default-devel-5.14.21-150400.24.170.2.x86_64",
            "SUSE Manager Server 4.3:kernel-devel-5.14.21-150400.24.170.1.noarch",
            "SUSE Manager Server 4.3:kernel-macros-5.14.21-150400.24.170.1.noarch",
            "SUSE Manager Server 4.3:kernel-source-5.14.21-150400.24.170.1.noarch",
            "SUSE Manager Server 4.3:kernel-syms-5.14.21-150400.24.170.1.ppc64le",
            "SUSE Manager Server 4.3:kernel-syms-5.14.21-150400.24.170.1.s390x",
            "SUSE Manager Server 4.3:kernel-syms-5.14.21-150400.24.170.1.x86_64",
            "SUSE Manager Server 4.3:kernel-zfcpdump-5.14.21-150400.24.170.2.s390x"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2025-07-28T15:09:33Z",
          "details": "moderate"
        }
      ],
      "title": "CVE-2022-50110"
    },
    {
      "cve": "CVE-2022-50111",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2022-50111"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "In the Linux kernel, the following vulnerability has been resolved:\n\nASoC: mt6359: Fix refcount leak bug\n\nIn mt6359_parse_dt() and mt6359_accdet_parse_dt(), we should call\nof_node_put() for the reference returned by of_get_child_by_name()\nwhich has increased the refcount.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.170.2.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.170.2.s390x",
          "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.170.2.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.170.2.s390x",
          "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.170.2.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.170.2.s390x",
          "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.170.2.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.170.2.s390x",
          "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-64kb-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-64kb-devel-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-devel-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-devel-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-devel-5.14.21-150400.24.170.1.noarch",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-docs-5.14.21-150400.24.170.1.noarch",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-macros-5.14.21-150400.24.170.1.noarch",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-obs-build-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-obs-build-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-source-5.14.21-150400.24.170.1.noarch",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-syms-5.14.21-150400.24.170.1.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-syms-5.14.21-150400.24.170.1.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:reiserfs-kmp-default-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:reiserfs-kmp-default-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-64kb-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-64kb-devel-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-devel-5.14.21-150400.24.170.1.noarch",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-docs-5.14.21-150400.24.170.1.noarch",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-macros-5.14.21-150400.24.170.1.noarch",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-source-5.14.21-150400.24.170.1.noarch",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.170.1.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.170.1.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.170.2.ppc64le",
          "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.170.2.s390x",
          "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.170.2.ppc64le",
          "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.170.2.s390x",
          "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_170-default-1-150400.9.3.2.ppc64le",
          "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_170-default-1-150400.9.3.2.s390x",
          "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_170-default-1-150400.9.3.2.x86_64",
          "SUSE Linux Enterprise Micro 5.3:kernel-default-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise Micro 5.3:kernel-default-5.14.21-150400.24.170.2.s390x",
          "SUSE Linux Enterprise Micro 5.3:kernel-default-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise Micro 5.3:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.aarch64",
          "SUSE Linux Enterprise Micro 5.3:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
          "SUSE Linux Enterprise Micro 5.4:kernel-default-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise Micro 5.4:kernel-default-5.14.21-150400.24.170.2.s390x",
          "SUSE Linux Enterprise Micro 5.4:kernel-default-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise Micro 5.4:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.aarch64",
          "SUSE Linux Enterprise Micro 5.4:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-64kb-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-64kb-devel-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-5.14.21-150400.24.170.2.ppc64le",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-5.14.21-150400.24.170.2.s390x",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.aarch64",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.ppc64le",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.170.2.ppc64le",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.170.2.s390x",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-devel-5.14.21-150400.24.170.1.noarch",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-docs-5.14.21-150400.24.170.1.noarch",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-macros-5.14.21-150400.24.170.1.noarch",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.170.2.ppc64le",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.170.2.s390x",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-source-5.14.21-150400.24.170.1.noarch",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.170.1.aarch64",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.170.1.ppc64le",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.170.1.s390x",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.170.1.x86_64",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-zfcpdump-5.14.21-150400.24.170.2.s390x",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.170.2.ppc64le",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.170.2.s390x",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-5.14.21-150400.24.170.2.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-devel-5.14.21-150400.24.170.2.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-devel-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-devel-5.14.21-150400.24.170.1.noarch",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-docs-5.14.21-150400.24.170.1.noarch",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-macros-5.14.21-150400.24.170.1.noarch",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-obs-build-5.14.21-150400.24.170.2.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-obs-build-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-source-5.14.21-150400.24.170.1.noarch",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-syms-5.14.21-150400.24.170.1.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-syms-5.14.21-150400.24.170.1.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.170.2.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.170.2.x86_64",
          "SUSE Manager Proxy 4.3:kernel-default-5.14.21-150400.24.170.2.x86_64",
          "SUSE Manager Proxy 4.3:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
          "SUSE Manager Proxy 4.3:kernel-default-devel-5.14.21-150400.24.170.2.x86_64",
          "SUSE Manager Proxy 4.3:kernel-devel-5.14.21-150400.24.170.1.noarch",
          "SUSE Manager Proxy 4.3:kernel-macros-5.14.21-150400.24.170.1.noarch",
          "SUSE Manager Proxy 4.3:kernel-source-5.14.21-150400.24.170.1.noarch",
          "SUSE Manager Proxy 4.3:kernel-syms-5.14.21-150400.24.170.1.x86_64",
          "SUSE Manager Server 4.3:kernel-default-5.14.21-150400.24.170.2.ppc64le",
          "SUSE Manager Server 4.3:kernel-default-5.14.21-150400.24.170.2.s390x",
          "SUSE Manager Server 4.3:kernel-default-5.14.21-150400.24.170.2.x86_64",
          "SUSE Manager Server 4.3:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.ppc64le",
          "SUSE Manager Server 4.3:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
          "SUSE Manager Server 4.3:kernel-default-devel-5.14.21-150400.24.170.2.ppc64le",
          "SUSE Manager Server 4.3:kernel-default-devel-5.14.21-150400.24.170.2.s390x",
          "SUSE Manager Server 4.3:kernel-default-devel-5.14.21-150400.24.170.2.x86_64",
          "SUSE Manager Server 4.3:kernel-devel-5.14.21-150400.24.170.1.noarch",
          "SUSE Manager Server 4.3:kernel-macros-5.14.21-150400.24.170.1.noarch",
          "SUSE Manager Server 4.3:kernel-source-5.14.21-150400.24.170.1.noarch",
          "SUSE Manager Server 4.3:kernel-syms-5.14.21-150400.24.170.1.ppc64le",
          "SUSE Manager Server 4.3:kernel-syms-5.14.21-150400.24.170.1.s390x",
          "SUSE Manager Server 4.3:kernel-syms-5.14.21-150400.24.170.1.x86_64",
          "SUSE Manager Server 4.3:kernel-zfcpdump-5.14.21-150400.24.170.2.s390x"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2022-50111",
          "url": "https://www.suse.com/security/cve/CVE-2022-50111"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1244831 for CVE-2022-50111",
          "url": "https://bugzilla.suse.com/1244831"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-64kb-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-64kb-devel-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-devel-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-devel-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-devel-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-docs-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-macros-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-obs-build-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-obs-build-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-source-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-syms-5.14.21-150400.24.170.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-syms-5.14.21-150400.24.170.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:reiserfs-kmp-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:reiserfs-kmp-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-64kb-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-64kb-devel-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-devel-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-docs-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-macros-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-source-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.170.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.170.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_170-default-1-150400.9.3.2.ppc64le",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_170-default-1-150400.9.3.2.s390x",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_170-default-1-150400.9.3.2.x86_64",
            "SUSE Linux Enterprise Micro 5.3:kernel-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise Micro 5.3:kernel-default-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise Micro 5.3:kernel-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Micro 5.3:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.aarch64",
            "SUSE Linux Enterprise Micro 5.3:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
            "SUSE Linux Enterprise Micro 5.4:kernel-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise Micro 5.4:kernel-default-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise Micro 5.4:kernel-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Micro 5.4:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.aarch64",
            "SUSE Linux Enterprise Micro 5.4:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-64kb-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-64kb-devel-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.aarch64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.ppc64le",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-devel-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-docs-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-macros-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-source-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.170.1.aarch64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.170.1.ppc64le",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.170.1.s390x",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.170.1.x86_64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-zfcpdump-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-devel-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-devel-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-devel-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-docs-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-macros-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-obs-build-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-obs-build-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-source-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-syms-5.14.21-150400.24.170.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-syms-5.14.21-150400.24.170.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Manager Proxy 4.3:kernel-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Manager Proxy 4.3:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
            "SUSE Manager Proxy 4.3:kernel-default-devel-5.14.21-150400.24.170.2.x86_64",
            "SUSE Manager Proxy 4.3:kernel-devel-5.14.21-150400.24.170.1.noarch",
            "SUSE Manager Proxy 4.3:kernel-macros-5.14.21-150400.24.170.1.noarch",
            "SUSE Manager Proxy 4.3:kernel-source-5.14.21-150400.24.170.1.noarch",
            "SUSE Manager Proxy 4.3:kernel-syms-5.14.21-150400.24.170.1.x86_64",
            "SUSE Manager Server 4.3:kernel-default-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Manager Server 4.3:kernel-default-5.14.21-150400.24.170.2.s390x",
            "SUSE Manager Server 4.3:kernel-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Manager Server 4.3:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.ppc64le",
            "SUSE Manager Server 4.3:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
            "SUSE Manager Server 4.3:kernel-default-devel-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Manager Server 4.3:kernel-default-devel-5.14.21-150400.24.170.2.s390x",
            "SUSE Manager Server 4.3:kernel-default-devel-5.14.21-150400.24.170.2.x86_64",
            "SUSE Manager Server 4.3:kernel-devel-5.14.21-150400.24.170.1.noarch",
            "SUSE Manager Server 4.3:kernel-macros-5.14.21-150400.24.170.1.noarch",
            "SUSE Manager Server 4.3:kernel-source-5.14.21-150400.24.170.1.noarch",
            "SUSE Manager Server 4.3:kernel-syms-5.14.21-150400.24.170.1.ppc64le",
            "SUSE Manager Server 4.3:kernel-syms-5.14.21-150400.24.170.1.s390x",
            "SUSE Manager Server 4.3:kernel-syms-5.14.21-150400.24.170.1.x86_64",
            "SUSE Manager Server 4.3:kernel-zfcpdump-5.14.21-150400.24.170.2.s390x"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 5.5,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
            "version": "3.1"
          },
          "products": [
            "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-64kb-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-64kb-devel-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-devel-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-devel-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-devel-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-docs-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-macros-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-obs-build-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-obs-build-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-source-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-syms-5.14.21-150400.24.170.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-syms-5.14.21-150400.24.170.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:reiserfs-kmp-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:reiserfs-kmp-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-64kb-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-64kb-devel-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-devel-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-docs-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-macros-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-source-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.170.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.170.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_170-default-1-150400.9.3.2.ppc64le",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_170-default-1-150400.9.3.2.s390x",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_170-default-1-150400.9.3.2.x86_64",
            "SUSE Linux Enterprise Micro 5.3:kernel-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise Micro 5.3:kernel-default-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise Micro 5.3:kernel-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Micro 5.3:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.aarch64",
            "SUSE Linux Enterprise Micro 5.3:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
            "SUSE Linux Enterprise Micro 5.4:kernel-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise Micro 5.4:kernel-default-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise Micro 5.4:kernel-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Micro 5.4:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.aarch64",
            "SUSE Linux Enterprise Micro 5.4:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-64kb-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-64kb-devel-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.aarch64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.ppc64le",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-devel-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-docs-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-macros-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-source-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.170.1.aarch64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.170.1.ppc64le",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.170.1.s390x",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.170.1.x86_64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-zfcpdump-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-devel-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-devel-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-devel-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-docs-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-macros-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-obs-build-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-obs-build-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-source-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-syms-5.14.21-150400.24.170.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-syms-5.14.21-150400.24.170.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Manager Proxy 4.3:kernel-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Manager Proxy 4.3:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
            "SUSE Manager Proxy 4.3:kernel-default-devel-5.14.21-150400.24.170.2.x86_64",
            "SUSE Manager Proxy 4.3:kernel-devel-5.14.21-150400.24.170.1.noarch",
            "SUSE Manager Proxy 4.3:kernel-macros-5.14.21-150400.24.170.1.noarch",
            "SUSE Manager Proxy 4.3:kernel-source-5.14.21-150400.24.170.1.noarch",
            "SUSE Manager Proxy 4.3:kernel-syms-5.14.21-150400.24.170.1.x86_64",
            "SUSE Manager Server 4.3:kernel-default-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Manager Server 4.3:kernel-default-5.14.21-150400.24.170.2.s390x",
            "SUSE Manager Server 4.3:kernel-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Manager Server 4.3:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.ppc64le",
            "SUSE Manager Server 4.3:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
            "SUSE Manager Server 4.3:kernel-default-devel-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Manager Server 4.3:kernel-default-devel-5.14.21-150400.24.170.2.s390x",
            "SUSE Manager Server 4.3:kernel-default-devel-5.14.21-150400.24.170.2.x86_64",
            "SUSE Manager Server 4.3:kernel-devel-5.14.21-150400.24.170.1.noarch",
            "SUSE Manager Server 4.3:kernel-macros-5.14.21-150400.24.170.1.noarch",
            "SUSE Manager Server 4.3:kernel-source-5.14.21-150400.24.170.1.noarch",
            "SUSE Manager Server 4.3:kernel-syms-5.14.21-150400.24.170.1.ppc64le",
            "SUSE Manager Server 4.3:kernel-syms-5.14.21-150400.24.170.1.s390x",
            "SUSE Manager Server 4.3:kernel-syms-5.14.21-150400.24.170.1.x86_64",
            "SUSE Manager Server 4.3:kernel-zfcpdump-5.14.21-150400.24.170.2.s390x"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2025-07-28T15:09:33Z",
          "details": "moderate"
        }
      ],
      "title": "CVE-2022-50111"
    },
    {
      "cve": "CVE-2022-50112",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2022-50112"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "In the Linux kernel, the following vulnerability has been resolved:\n\nrpmsg: qcom_smd: Fix refcount leak in qcom_smd_parse_edge\n\nof_parse_phandle() returns a node pointer with refcount\nincremented, we should use of_node_put() on it when done.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.170.2.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.170.2.s390x",
          "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.170.2.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.170.2.s390x",
          "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.170.2.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.170.2.s390x",
          "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.170.2.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.170.2.s390x",
          "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-64kb-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-64kb-devel-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-devel-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-devel-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-devel-5.14.21-150400.24.170.1.noarch",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-docs-5.14.21-150400.24.170.1.noarch",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-macros-5.14.21-150400.24.170.1.noarch",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-obs-build-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-obs-build-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-source-5.14.21-150400.24.170.1.noarch",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-syms-5.14.21-150400.24.170.1.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-syms-5.14.21-150400.24.170.1.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:reiserfs-kmp-default-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:reiserfs-kmp-default-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-64kb-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-64kb-devel-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-devel-5.14.21-150400.24.170.1.noarch",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-docs-5.14.21-150400.24.170.1.noarch",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-macros-5.14.21-150400.24.170.1.noarch",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-source-5.14.21-150400.24.170.1.noarch",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.170.1.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.170.1.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.170.2.ppc64le",
          "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.170.2.s390x",
          "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.170.2.ppc64le",
          "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.170.2.s390x",
          "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_170-default-1-150400.9.3.2.ppc64le",
          "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_170-default-1-150400.9.3.2.s390x",
          "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_170-default-1-150400.9.3.2.x86_64",
          "SUSE Linux Enterprise Micro 5.3:kernel-default-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise Micro 5.3:kernel-default-5.14.21-150400.24.170.2.s390x",
          "SUSE Linux Enterprise Micro 5.3:kernel-default-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise Micro 5.3:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.aarch64",
          "SUSE Linux Enterprise Micro 5.3:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
          "SUSE Linux Enterprise Micro 5.4:kernel-default-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise Micro 5.4:kernel-default-5.14.21-150400.24.170.2.s390x",
          "SUSE Linux Enterprise Micro 5.4:kernel-default-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise Micro 5.4:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.aarch64",
          "SUSE Linux Enterprise Micro 5.4:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-64kb-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-64kb-devel-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-5.14.21-150400.24.170.2.ppc64le",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-5.14.21-150400.24.170.2.s390x",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.aarch64",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.ppc64le",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.170.2.ppc64le",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.170.2.s390x",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-devel-5.14.21-150400.24.170.1.noarch",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-docs-5.14.21-150400.24.170.1.noarch",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-macros-5.14.21-150400.24.170.1.noarch",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.170.2.ppc64le",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.170.2.s390x",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-source-5.14.21-150400.24.170.1.noarch",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.170.1.aarch64",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.170.1.ppc64le",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.170.1.s390x",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.170.1.x86_64",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-zfcpdump-5.14.21-150400.24.170.2.s390x",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.170.2.ppc64le",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.170.2.s390x",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-5.14.21-150400.24.170.2.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-devel-5.14.21-150400.24.170.2.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-devel-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-devel-5.14.21-150400.24.170.1.noarch",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-docs-5.14.21-150400.24.170.1.noarch",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-macros-5.14.21-150400.24.170.1.noarch",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-obs-build-5.14.21-150400.24.170.2.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-obs-build-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-source-5.14.21-150400.24.170.1.noarch",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-syms-5.14.21-150400.24.170.1.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-syms-5.14.21-150400.24.170.1.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.170.2.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.170.2.x86_64",
          "SUSE Manager Proxy 4.3:kernel-default-5.14.21-150400.24.170.2.x86_64",
          "SUSE Manager Proxy 4.3:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
          "SUSE Manager Proxy 4.3:kernel-default-devel-5.14.21-150400.24.170.2.x86_64",
          "SUSE Manager Proxy 4.3:kernel-devel-5.14.21-150400.24.170.1.noarch",
          "SUSE Manager Proxy 4.3:kernel-macros-5.14.21-150400.24.170.1.noarch",
          "SUSE Manager Proxy 4.3:kernel-source-5.14.21-150400.24.170.1.noarch",
          "SUSE Manager Proxy 4.3:kernel-syms-5.14.21-150400.24.170.1.x86_64",
          "SUSE Manager Server 4.3:kernel-default-5.14.21-150400.24.170.2.ppc64le",
          "SUSE Manager Server 4.3:kernel-default-5.14.21-150400.24.170.2.s390x",
          "SUSE Manager Server 4.3:kernel-default-5.14.21-150400.24.170.2.x86_64",
          "SUSE Manager Server 4.3:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.ppc64le",
          "SUSE Manager Server 4.3:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
          "SUSE Manager Server 4.3:kernel-default-devel-5.14.21-150400.24.170.2.ppc64le",
          "SUSE Manager Server 4.3:kernel-default-devel-5.14.21-150400.24.170.2.s390x",
          "SUSE Manager Server 4.3:kernel-default-devel-5.14.21-150400.24.170.2.x86_64",
          "SUSE Manager Server 4.3:kernel-devel-5.14.21-150400.24.170.1.noarch",
          "SUSE Manager Server 4.3:kernel-macros-5.14.21-150400.24.170.1.noarch",
          "SUSE Manager Server 4.3:kernel-source-5.14.21-150400.24.170.1.noarch",
          "SUSE Manager Server 4.3:kernel-syms-5.14.21-150400.24.170.1.ppc64le",
          "SUSE Manager Server 4.3:kernel-syms-5.14.21-150400.24.170.1.s390x",
          "SUSE Manager Server 4.3:kernel-syms-5.14.21-150400.24.170.1.x86_64",
          "SUSE Manager Server 4.3:kernel-zfcpdump-5.14.21-150400.24.170.2.s390x"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2022-50112",
          "url": "https://www.suse.com/security/cve/CVE-2022-50112"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1244832 for CVE-2022-50112",
          "url": "https://bugzilla.suse.com/1244832"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-64kb-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-64kb-devel-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-devel-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-devel-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-devel-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-docs-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-macros-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-obs-build-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-obs-build-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-source-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-syms-5.14.21-150400.24.170.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-syms-5.14.21-150400.24.170.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:reiserfs-kmp-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:reiserfs-kmp-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-64kb-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-64kb-devel-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-devel-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-docs-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-macros-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-source-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.170.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.170.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_170-default-1-150400.9.3.2.ppc64le",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_170-default-1-150400.9.3.2.s390x",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_170-default-1-150400.9.3.2.x86_64",
            "SUSE Linux Enterprise Micro 5.3:kernel-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise Micro 5.3:kernel-default-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise Micro 5.3:kernel-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Micro 5.3:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.aarch64",
            "SUSE Linux Enterprise Micro 5.3:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
            "SUSE Linux Enterprise Micro 5.4:kernel-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise Micro 5.4:kernel-default-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise Micro 5.4:kernel-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Micro 5.4:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.aarch64",
            "SUSE Linux Enterprise Micro 5.4:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-64kb-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-64kb-devel-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.aarch64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.ppc64le",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-devel-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-docs-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-macros-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-source-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.170.1.aarch64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.170.1.ppc64le",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.170.1.s390x",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.170.1.x86_64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-zfcpdump-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-devel-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-devel-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-devel-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-docs-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-macros-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-obs-build-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-obs-build-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-source-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-syms-5.14.21-150400.24.170.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-syms-5.14.21-150400.24.170.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Manager Proxy 4.3:kernel-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Manager Proxy 4.3:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
            "SUSE Manager Proxy 4.3:kernel-default-devel-5.14.21-150400.24.170.2.x86_64",
            "SUSE Manager Proxy 4.3:kernel-devel-5.14.21-150400.24.170.1.noarch",
            "SUSE Manager Proxy 4.3:kernel-macros-5.14.21-150400.24.170.1.noarch",
            "SUSE Manager Proxy 4.3:kernel-source-5.14.21-150400.24.170.1.noarch",
            "SUSE Manager Proxy 4.3:kernel-syms-5.14.21-150400.24.170.1.x86_64",
            "SUSE Manager Server 4.3:kernel-default-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Manager Server 4.3:kernel-default-5.14.21-150400.24.170.2.s390x",
            "SUSE Manager Server 4.3:kernel-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Manager Server 4.3:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.ppc64le",
            "SUSE Manager Server 4.3:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
            "SUSE Manager Server 4.3:kernel-default-devel-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Manager Server 4.3:kernel-default-devel-5.14.21-150400.24.170.2.s390x",
            "SUSE Manager Server 4.3:kernel-default-devel-5.14.21-150400.24.170.2.x86_64",
            "SUSE Manager Server 4.3:kernel-devel-5.14.21-150400.24.170.1.noarch",
            "SUSE Manager Server 4.3:kernel-macros-5.14.21-150400.24.170.1.noarch",
            "SUSE Manager Server 4.3:kernel-source-5.14.21-150400.24.170.1.noarch",
            "SUSE Manager Server 4.3:kernel-syms-5.14.21-150400.24.170.1.ppc64le",
            "SUSE Manager Server 4.3:kernel-syms-5.14.21-150400.24.170.1.s390x",
            "SUSE Manager Server 4.3:kernel-syms-5.14.21-150400.24.170.1.x86_64",
            "SUSE Manager Server 4.3:kernel-zfcpdump-5.14.21-150400.24.170.2.s390x"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 5.5,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
            "version": "3.1"
          },
          "products": [
            "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-64kb-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-64kb-devel-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-devel-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-devel-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-devel-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-docs-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-macros-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-obs-build-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-obs-build-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-source-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-syms-5.14.21-150400.24.170.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-syms-5.14.21-150400.24.170.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:reiserfs-kmp-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:reiserfs-kmp-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-64kb-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-64kb-devel-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-devel-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-docs-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-macros-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-source-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.170.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.170.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_170-default-1-150400.9.3.2.ppc64le",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_170-default-1-150400.9.3.2.s390x",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_170-default-1-150400.9.3.2.x86_64",
            "SUSE Linux Enterprise Micro 5.3:kernel-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise Micro 5.3:kernel-default-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise Micro 5.3:kernel-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Micro 5.3:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.aarch64",
            "SUSE Linux Enterprise Micro 5.3:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
            "SUSE Linux Enterprise Micro 5.4:kernel-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise Micro 5.4:kernel-default-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise Micro 5.4:kernel-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Micro 5.4:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.aarch64",
            "SUSE Linux Enterprise Micro 5.4:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-64kb-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-64kb-devel-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.aarch64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.ppc64le",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-devel-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-docs-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-macros-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-source-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.170.1.aarch64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.170.1.ppc64le",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.170.1.s390x",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.170.1.x86_64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-zfcpdump-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-devel-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-devel-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-devel-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-docs-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-macros-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-obs-build-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-obs-build-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-source-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-syms-5.14.21-150400.24.170.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-syms-5.14.21-150400.24.170.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Manager Proxy 4.3:kernel-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Manager Proxy 4.3:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
            "SUSE Manager Proxy 4.3:kernel-default-devel-5.14.21-150400.24.170.2.x86_64",
            "SUSE Manager Proxy 4.3:kernel-devel-5.14.21-150400.24.170.1.noarch",
            "SUSE Manager Proxy 4.3:kernel-macros-5.14.21-150400.24.170.1.noarch",
            "SUSE Manager Proxy 4.3:kernel-source-5.14.21-150400.24.170.1.noarch",
            "SUSE Manager Proxy 4.3:kernel-syms-5.14.21-150400.24.170.1.x86_64",
            "SUSE Manager Server 4.3:kernel-default-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Manager Server 4.3:kernel-default-5.14.21-150400.24.170.2.s390x",
            "SUSE Manager Server 4.3:kernel-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Manager Server 4.3:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.ppc64le",
            "SUSE Manager Server 4.3:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
            "SUSE Manager Server 4.3:kernel-default-devel-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Manager Server 4.3:kernel-default-devel-5.14.21-150400.24.170.2.s390x",
            "SUSE Manager Server 4.3:kernel-default-devel-5.14.21-150400.24.170.2.x86_64",
            "SUSE Manager Server 4.3:kernel-devel-5.14.21-150400.24.170.1.noarch",
            "SUSE Manager Server 4.3:kernel-macros-5.14.21-150400.24.170.1.noarch",
            "SUSE Manager Server 4.3:kernel-source-5.14.21-150400.24.170.1.noarch",
            "SUSE Manager Server 4.3:kernel-syms-5.14.21-150400.24.170.1.ppc64le",
            "SUSE Manager Server 4.3:kernel-syms-5.14.21-150400.24.170.1.s390x",
            "SUSE Manager Server 4.3:kernel-syms-5.14.21-150400.24.170.1.x86_64",
            "SUSE Manager Server 4.3:kernel-zfcpdump-5.14.21-150400.24.170.2.s390x"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2025-07-28T15:09:33Z",
          "details": "moderate"
        }
      ],
      "title": "CVE-2022-50112"
    },
    {
      "cve": "CVE-2022-50116",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2022-50116"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "In the Linux kernel, the following vulnerability has been resolved:\n\ntty: n_gsm: fix deadlock and link starvation in outgoing data path\n\nThe current implementation queues up new control and user packets as needed\nand processes this queue down to the ldisc in the same code path.\nThat means that the upper and the lower layer are hard coupled in the code.\nDue to this deadlocks can happen as seen below while transmitting data,\nespecially during ldisc congestion. Furthermore, the data channels starve\nthe control channel on high transmission load on the ldisc.\n\nIntroduce an additional control channel data queue to prevent timeouts and\nlink hangups during ldisc congestion. This is being processed before the\nuser channel data queue in gsm_data_kick(), i.e. with the highest priority.\nPut the queue to ldisc data path into a workqueue and trigger it whenever\nnew data has been put into the transmission queue. Change\ngsm_dlci_data_sweep() accordingly to fill up the transmission queue until\nTX_THRESH_HI. This solves the locking issue, keeps latency low and provides\ngood performance on high data load.\nNote that now all packets from a DLCI are removed from the internal queue\nif the associated DLCI was closed. This ensures that no data is sent by the\nintroduced write task to an already closed DLCI.\n\nBUG: spinlock recursion on CPU#0, test_v24_loop/124\n lock: serial8250_ports+0x3a8/0x7500, .magic: dead4ead, .owner: test_v24_loop/124, .owner_cpu: 0\nCPU: 0 PID: 124 Comm: test_v24_loop Tainted: G           O      5.18.0-rc2 #3\nHardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.15.0-1 04/01/2014\nCall Trace:\n \u003cIRQ\u003e\n dump_stack_lvl+0x34/0x44\n do_raw_spin_lock+0x76/0xa0\n _raw_spin_lock_irqsave+0x72/0x80\n uart_write_room+0x3b/0xc0\n gsm_data_kick+0x14b/0x240 [n_gsm]\n gsmld_write_wakeup+0x35/0x70 [n_gsm]\n tty_wakeup+0x53/0x60\n tty_port_default_wakeup+0x1b/0x30\n serial8250_tx_chars+0x12f/0x220\n serial8250_handle_irq.part.0+0xfe/0x150\n serial8250_default_handle_irq+0x48/0x80\n serial8250_interrupt+0x56/0xa0\n __handle_irq_event_percpu+0x78/0x1f0\n handle_irq_event+0x34/0x70\n handle_fasteoi_irq+0x90/0x1e0\n __common_interrupt+0x69/0x100\n common_interrupt+0x48/0xc0\n asm_common_interrupt+0x1e/0x40\nRIP: 0010:__do_softirq+0x83/0x34e\nCode: 2a 0a ff 0f b7 ed c7 44 24 10 0a 00 00 00 48 c7 c7 51 2a 64 82 e8 2d\ne2 d5 ff 65 66 c7 05 83 af 1e 7e 00 00 fb b8 ff ff ff ff \u003c49\u003e c7 c2 40 61\n80 82 0f bc c5 41 89 c4 41 83 c4 01 0f 84 e6 00 00\nRSP: 0018:ffffc90000003f98 EFLAGS: 00000286\nRAX: 00000000ffffffff RBX: 0000000000000000 RCX: 0000000000000000\nRDX: 0000000000000000 RSI: ffffffff82642a51 RDI: ffffffff825bb5e7\nRBP: 0000000000000200 R08: 00000008de3271a8 R09: 0000000000000000\nR10: 0000000000000001 R11: 0000000000000000 R12: 0000000000000000\nR13: 0000000000000030 R14: 0000000000000000 R15: 0000000000000000\n ? __do_softirq+0x73/0x34e\n irq_exit_rcu+0xb5/0x100\n common_interrupt+0xa4/0xc0\n \u003c/IRQ\u003e\n \u003cTASK\u003e\n asm_common_interrupt+0x1e/0x40\nRIP: 0010:_raw_spin_unlock_irqrestore+0x2e/0x50\nCode: 00 55 48 89 fd 48 83 c7 18 53 48 89 f3 48 8b 74 24 10 e8 85 28 36 ff\n48 89 ef e8 cd 58 36 ff 80 e7 02 74 01 fb bf 01 00 00 00 \u003ce8\u003e 3d 97 33 ff\n65 8b 05 96 23 2b 7e 85 c0 74 03 5b 5d c3 0f 1f 44\nRSP: 0018:ffffc9000020fd08 EFLAGS: 00000202\nRAX: 0000000000000000 RBX: 0000000000000246 RCX: 0000000000000000\nRDX: 0000000000000004 RSI: ffffffff8257fd74 RDI: 0000000000000001\nRBP: ffff8880057de3a0 R08: 00000008de233000 R09: 0000000000000000\nR10: 0000000000000001 R11: 0000000000000000 R12: 0000000000000000\nR13: 0000000000000100 R14: 0000000000000202 R15: ffff8880057df0b8\n ? _raw_spin_unlock_irqrestore+0x23/0x50\n gsmtty_write+0x65/0x80 [n_gsm]\n n_tty_write+0x33f/0x530\n ? swake_up_all+0xe0/0xe0\n file_tty_write.constprop.0+0x1b1/0x320\n ? n_tty_flush_buffer+0xb0/0xb0\n new_sync_write+0x10c/0x190\n vfs_write+0x282/0x310\n ksys_write+0x68/0xe0\n do_syscall_64+0x3b/0x90\n entry_SYSCALL_64_after_hwframe+0x44/0xae\nRIP: 0033:0x7f3e5e35c15c\nCode: 8b 7c 24 08 89 c5 e8 c5 ff ff ff 89 ef 89 44 24\n---truncated---",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.170.2.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.170.2.s390x",
          "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.170.2.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.170.2.s390x",
          "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.170.2.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.170.2.s390x",
          "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.170.2.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.170.2.s390x",
          "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-64kb-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-64kb-devel-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-devel-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-devel-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-devel-5.14.21-150400.24.170.1.noarch",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-docs-5.14.21-150400.24.170.1.noarch",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-macros-5.14.21-150400.24.170.1.noarch",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-obs-build-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-obs-build-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-source-5.14.21-150400.24.170.1.noarch",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-syms-5.14.21-150400.24.170.1.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-syms-5.14.21-150400.24.170.1.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:reiserfs-kmp-default-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:reiserfs-kmp-default-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-64kb-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-64kb-devel-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-devel-5.14.21-150400.24.170.1.noarch",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-docs-5.14.21-150400.24.170.1.noarch",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-macros-5.14.21-150400.24.170.1.noarch",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-source-5.14.21-150400.24.170.1.noarch",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.170.1.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.170.1.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.170.2.ppc64le",
          "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.170.2.s390x",
          "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.170.2.ppc64le",
          "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.170.2.s390x",
          "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_170-default-1-150400.9.3.2.ppc64le",
          "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_170-default-1-150400.9.3.2.s390x",
          "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_170-default-1-150400.9.3.2.x86_64",
          "SUSE Linux Enterprise Micro 5.3:kernel-default-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise Micro 5.3:kernel-default-5.14.21-150400.24.170.2.s390x",
          "SUSE Linux Enterprise Micro 5.3:kernel-default-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise Micro 5.3:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.aarch64",
          "SUSE Linux Enterprise Micro 5.3:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
          "SUSE Linux Enterprise Micro 5.4:kernel-default-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise Micro 5.4:kernel-default-5.14.21-150400.24.170.2.s390x",
          "SUSE Linux Enterprise Micro 5.4:kernel-default-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise Micro 5.4:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.aarch64",
          "SUSE Linux Enterprise Micro 5.4:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-64kb-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-64kb-devel-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-5.14.21-150400.24.170.2.ppc64le",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-5.14.21-150400.24.170.2.s390x",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.aarch64",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.ppc64le",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.170.2.ppc64le",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.170.2.s390x",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-devel-5.14.21-150400.24.170.1.noarch",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-docs-5.14.21-150400.24.170.1.noarch",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-macros-5.14.21-150400.24.170.1.noarch",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.170.2.ppc64le",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.170.2.s390x",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-source-5.14.21-150400.24.170.1.noarch",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.170.1.aarch64",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.170.1.ppc64le",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.170.1.s390x",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.170.1.x86_64",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-zfcpdump-5.14.21-150400.24.170.2.s390x",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.170.2.ppc64le",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.170.2.s390x",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-5.14.21-150400.24.170.2.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-devel-5.14.21-150400.24.170.2.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-devel-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-devel-5.14.21-150400.24.170.1.noarch",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-docs-5.14.21-150400.24.170.1.noarch",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-macros-5.14.21-150400.24.170.1.noarch",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-obs-build-5.14.21-150400.24.170.2.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-obs-build-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-source-5.14.21-150400.24.170.1.noarch",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-syms-5.14.21-150400.24.170.1.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-syms-5.14.21-150400.24.170.1.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.170.2.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.170.2.x86_64",
          "SUSE Manager Proxy 4.3:kernel-default-5.14.21-150400.24.170.2.x86_64",
          "SUSE Manager Proxy 4.3:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
          "SUSE Manager Proxy 4.3:kernel-default-devel-5.14.21-150400.24.170.2.x86_64",
          "SUSE Manager Proxy 4.3:kernel-devel-5.14.21-150400.24.170.1.noarch",
          "SUSE Manager Proxy 4.3:kernel-macros-5.14.21-150400.24.170.1.noarch",
          "SUSE Manager Proxy 4.3:kernel-source-5.14.21-150400.24.170.1.noarch",
          "SUSE Manager Proxy 4.3:kernel-syms-5.14.21-150400.24.170.1.x86_64",
          "SUSE Manager Server 4.3:kernel-default-5.14.21-150400.24.170.2.ppc64le",
          "SUSE Manager Server 4.3:kernel-default-5.14.21-150400.24.170.2.s390x",
          "SUSE Manager Server 4.3:kernel-default-5.14.21-150400.24.170.2.x86_64",
          "SUSE Manager Server 4.3:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.ppc64le",
          "SUSE Manager Server 4.3:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
          "SUSE Manager Server 4.3:kernel-default-devel-5.14.21-150400.24.170.2.ppc64le",
          "SUSE Manager Server 4.3:kernel-default-devel-5.14.21-150400.24.170.2.s390x",
          "SUSE Manager Server 4.3:kernel-default-devel-5.14.21-150400.24.170.2.x86_64",
          "SUSE Manager Server 4.3:kernel-devel-5.14.21-150400.24.170.1.noarch",
          "SUSE Manager Server 4.3:kernel-macros-5.14.21-150400.24.170.1.noarch",
          "SUSE Manager Server 4.3:kernel-source-5.14.21-150400.24.170.1.noarch",
          "SUSE Manager Server 4.3:kernel-syms-5.14.21-150400.24.170.1.ppc64le",
          "SUSE Manager Server 4.3:kernel-syms-5.14.21-150400.24.170.1.s390x",
          "SUSE Manager Server 4.3:kernel-syms-5.14.21-150400.24.170.1.x86_64",
          "SUSE Manager Server 4.3:kernel-zfcpdump-5.14.21-150400.24.170.2.s390x"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2022-50116",
          "url": "https://www.suse.com/security/cve/CVE-2022-50116"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1244824 for CVE-2022-50116",
          "url": "https://bugzilla.suse.com/1244824"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-64kb-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-64kb-devel-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-devel-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-devel-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-devel-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-docs-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-macros-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-obs-build-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-obs-build-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-source-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-syms-5.14.21-150400.24.170.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-syms-5.14.21-150400.24.170.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:reiserfs-kmp-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:reiserfs-kmp-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-64kb-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-64kb-devel-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-devel-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-docs-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-macros-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-source-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.170.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.170.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_170-default-1-150400.9.3.2.ppc64le",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_170-default-1-150400.9.3.2.s390x",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_170-default-1-150400.9.3.2.x86_64",
            "SUSE Linux Enterprise Micro 5.3:kernel-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise Micro 5.3:kernel-default-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise Micro 5.3:kernel-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Micro 5.3:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.aarch64",
            "SUSE Linux Enterprise Micro 5.3:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
            "SUSE Linux Enterprise Micro 5.4:kernel-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise Micro 5.4:kernel-default-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise Micro 5.4:kernel-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Micro 5.4:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.aarch64",
            "SUSE Linux Enterprise Micro 5.4:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-64kb-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-64kb-devel-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.aarch64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.ppc64le",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-devel-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-docs-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-macros-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-source-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.170.1.aarch64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.170.1.ppc64le",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.170.1.s390x",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.170.1.x86_64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-zfcpdump-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-devel-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-devel-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-devel-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-docs-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-macros-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-obs-build-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-obs-build-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-source-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-syms-5.14.21-150400.24.170.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-syms-5.14.21-150400.24.170.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Manager Proxy 4.3:kernel-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Manager Proxy 4.3:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
            "SUSE Manager Proxy 4.3:kernel-default-devel-5.14.21-150400.24.170.2.x86_64",
            "SUSE Manager Proxy 4.3:kernel-devel-5.14.21-150400.24.170.1.noarch",
            "SUSE Manager Proxy 4.3:kernel-macros-5.14.21-150400.24.170.1.noarch",
            "SUSE Manager Proxy 4.3:kernel-source-5.14.21-150400.24.170.1.noarch",
            "SUSE Manager Proxy 4.3:kernel-syms-5.14.21-150400.24.170.1.x86_64",
            "SUSE Manager Server 4.3:kernel-default-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Manager Server 4.3:kernel-default-5.14.21-150400.24.170.2.s390x",
            "SUSE Manager Server 4.3:kernel-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Manager Server 4.3:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.ppc64le",
            "SUSE Manager Server 4.3:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
            "SUSE Manager Server 4.3:kernel-default-devel-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Manager Server 4.3:kernel-default-devel-5.14.21-150400.24.170.2.s390x",
            "SUSE Manager Server 4.3:kernel-default-devel-5.14.21-150400.24.170.2.x86_64",
            "SUSE Manager Server 4.3:kernel-devel-5.14.21-150400.24.170.1.noarch",
            "SUSE Manager Server 4.3:kernel-macros-5.14.21-150400.24.170.1.noarch",
            "SUSE Manager Server 4.3:kernel-source-5.14.21-150400.24.170.1.noarch",
            "SUSE Manager Server 4.3:kernel-syms-5.14.21-150400.24.170.1.ppc64le",
            "SUSE Manager Server 4.3:kernel-syms-5.14.21-150400.24.170.1.s390x",
            "SUSE Manager Server 4.3:kernel-syms-5.14.21-150400.24.170.1.x86_64",
            "SUSE Manager Server 4.3:kernel-zfcpdump-5.14.21-150400.24.170.2.s390x"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 5.5,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
            "version": "3.1"
          },
          "products": [
            "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-64kb-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-64kb-devel-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-devel-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-devel-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-devel-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-docs-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-macros-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-obs-build-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-obs-build-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-source-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-syms-5.14.21-150400.24.170.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-syms-5.14.21-150400.24.170.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:reiserfs-kmp-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:reiserfs-kmp-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-64kb-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-64kb-devel-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-devel-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-docs-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-macros-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-source-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.170.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.170.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_170-default-1-150400.9.3.2.ppc64le",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_170-default-1-150400.9.3.2.s390x",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_170-default-1-150400.9.3.2.x86_64",
            "SUSE Linux Enterprise Micro 5.3:kernel-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise Micro 5.3:kernel-default-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise Micro 5.3:kernel-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Micro 5.3:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.aarch64",
            "SUSE Linux Enterprise Micro 5.3:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
            "SUSE Linux Enterprise Micro 5.4:kernel-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise Micro 5.4:kernel-default-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise Micro 5.4:kernel-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Micro 5.4:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.aarch64",
            "SUSE Linux Enterprise Micro 5.4:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-64kb-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-64kb-devel-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.aarch64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.ppc64le",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-devel-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-docs-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-macros-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-source-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.170.1.aarch64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.170.1.ppc64le",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.170.1.s390x",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.170.1.x86_64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-zfcpdump-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-devel-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-devel-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-devel-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-docs-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-macros-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-obs-build-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-obs-build-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-source-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-syms-5.14.21-150400.24.170.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-syms-5.14.21-150400.24.170.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Manager Proxy 4.3:kernel-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Manager Proxy 4.3:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
            "SUSE Manager Proxy 4.3:kernel-default-devel-5.14.21-150400.24.170.2.x86_64",
            "SUSE Manager Proxy 4.3:kernel-devel-5.14.21-150400.24.170.1.noarch",
            "SUSE Manager Proxy 4.3:kernel-macros-5.14.21-150400.24.170.1.noarch",
            "SUSE Manager Proxy 4.3:kernel-source-5.14.21-150400.24.170.1.noarch",
            "SUSE Manager Proxy 4.3:kernel-syms-5.14.21-150400.24.170.1.x86_64",
            "SUSE Manager Server 4.3:kernel-default-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Manager Server 4.3:kernel-default-5.14.21-150400.24.170.2.s390x",
            "SUSE Manager Server 4.3:kernel-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Manager Server 4.3:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.ppc64le",
            "SUSE Manager Server 4.3:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
            "SUSE Manager Server 4.3:kernel-default-devel-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Manager Server 4.3:kernel-default-devel-5.14.21-150400.24.170.2.s390x",
            "SUSE Manager Server 4.3:kernel-default-devel-5.14.21-150400.24.170.2.x86_64",
            "SUSE Manager Server 4.3:kernel-devel-5.14.21-150400.24.170.1.noarch",
            "SUSE Manager Server 4.3:kernel-macros-5.14.21-150400.24.170.1.noarch",
            "SUSE Manager Server 4.3:kernel-source-5.14.21-150400.24.170.1.noarch",
            "SUSE Manager Server 4.3:kernel-syms-5.14.21-150400.24.170.1.ppc64le",
            "SUSE Manager Server 4.3:kernel-syms-5.14.21-150400.24.170.1.s390x",
            "SUSE Manager Server 4.3:kernel-syms-5.14.21-150400.24.170.1.x86_64",
            "SUSE Manager Server 4.3:kernel-zfcpdump-5.14.21-150400.24.170.2.s390x"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2025-07-28T15:09:33Z",
          "details": "moderate"
        }
      ],
      "title": "CVE-2022-50116"
    },
    {
      "cve": "CVE-2022-50118",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2022-50118"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "In the Linux kernel, the following vulnerability has been resolved:\n\npowerpc/perf: Optimize clearing the pending PMI and remove WARN_ON for PMI check in power_pmu_disable\n\ncommit 2c9ac51b850d (\"powerpc/perf: Fix PMU callbacks to clear\npending PMI before resetting an overflown PMC\") added a new\nfunction \"pmi_irq_pending\" in hw_irq.h. This function is to check\nif there is a PMI marked as pending in Paca (PACA_IRQ_PMI).This is\nused in power_pmu_disable in a WARN_ON. The intention here is to\nprovide a warning if there is PMI pending, but no counter is found\noverflown.\n\nDuring some of the perf runs, below warning is hit:\n\nWARNING: CPU: 36 PID: 0 at arch/powerpc/perf/core-book3s.c:1332 power_pmu_disable+0x25c/0x2c0\n Modules linked in:\n -----\n\n NIP [c000000000141c3c] power_pmu_disable+0x25c/0x2c0\n LR [c000000000141c8c] power_pmu_disable+0x2ac/0x2c0\n Call Trace:\n [c000000baffcfb90] [c000000000141c8c] power_pmu_disable+0x2ac/0x2c0 (unreliable)\n [c000000baffcfc10] [c0000000003e2f8c] perf_pmu_disable+0x4c/0x60\n [c000000baffcfc30] [c0000000003e3344] group_sched_out.part.124+0x44/0x100\n [c000000baffcfc80] [c0000000003e353c] __perf_event_disable+0x13c/0x240\n [c000000baffcfcd0] [c0000000003dd334] event_function+0xc4/0x140\n [c000000baffcfd20] [c0000000003d855c] remote_function+0x7c/0xa0\n [c000000baffcfd50] [c00000000026c394] flush_smp_call_function_queue+0xd4/0x300\n [c000000baffcfde0] [c000000000065b24] smp_ipi_demux_relaxed+0xa4/0x100\n [c000000baffcfe20] [c0000000000cb2b0] xive_muxed_ipi_action+0x20/0x40\n [c000000baffcfe40] [c000000000207c3c] __handle_irq_event_percpu+0x8c/0x250\n [c000000baffcfee0] [c000000000207e2c] handle_irq_event_percpu+0x2c/0xa0\n [c000000baffcff10] [c000000000210a04] handle_percpu_irq+0x84/0xc0\n [c000000baffcff40] [c000000000205f14] generic_handle_irq+0x54/0x80\n [c000000baffcff60] [c000000000015740] __do_irq+0x90/0x1d0\n [c000000baffcff90] [c000000000016990] __do_IRQ+0xc0/0x140\n [c0000009732f3940] [c000000bafceaca8] 0xc000000bafceaca8\n [c0000009732f39d0] [c000000000016b78] do_IRQ+0x168/0x1c0\n [c0000009732f3a00] [c0000000000090c8] hardware_interrupt_common_virt+0x218/0x220\n\nThis means that there is no PMC overflown among the active events\nin the PMU, but there is a PMU pending in Paca. The function\n\"any_pmc_overflown\" checks the PMCs on active events in\ncpuhw-\u003en_events. Code snippet:\n\n\u003c\u003c\u003e\u003e\nif (any_pmc_overflown(cpuhw))\n \tclear_pmi_irq_pending();\n else\n \tWARN_ON(pmi_irq_pending());\n\u003c\u003c\u003e\u003e\n\nHere the PMC overflown is not from active event. Example: When we do\nperf record, default cycles and instructions will be running on PMC6\nand PMC5 respectively. It could happen that overflowed event is currently\nnot active and pending PMI is for the inactive event. Debug logs from\ntrace_printk:\n\n\u003c\u003c\u003e\u003e\nany_pmc_overflown: idx is 5: pmc value is 0xd9a\npower_pmu_disable: PMC1: 0x0, PMC2: 0x0, PMC3: 0x0, PMC4: 0x0, PMC5: 0xd9a, PMC6: 0x80002011\n\u003c\u003c\u003e\u003e\n\nHere active PMC (from idx) is PMC5 , but overflown PMC is PMC6(0x80002011).\nWhen we handle PMI interrupt for such cases, if the PMC overflown is\nfrom inactive event, it will be ignored. Reference commit:\ncommit bc09c219b2e6 (\"powerpc/perf: Fix finding overflowed PMC in interrupt\")\n\nPatch addresses two changes:\n1) Fix 1 : Removal of warning ( WARN_ON(pmi_irq_pending()); )\n   We were printing warning if no PMC is found overflown among active PMU\n   events, but PMI pending in PACA. But this could happen in cases where\n   PMC overflown is not in active PMC. An inactive event could have caused\n   the overflow. Hence the warning is not needed. To know pending PMI is\n   from an inactive event, we need to loop through all PMC\u0027s which will\n   cause more SPR reads via mfspr and increase in context switch. Also in\n   existing function: perf_event_interrupt, already we ignore PMI\u0027s\n   overflown when it is from an inactive PMC.\n\n2) Fix 2: optimization in clearing pending PMI.\n   Currently we check for any active PMC overflown before clearing PMI\n   pending in Paca. This is causing additional SP\n---truncated---",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.170.2.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.170.2.s390x",
          "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.170.2.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.170.2.s390x",
          "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.170.2.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.170.2.s390x",
          "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.170.2.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.170.2.s390x",
          "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-64kb-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-64kb-devel-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-devel-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-devel-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-devel-5.14.21-150400.24.170.1.noarch",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-docs-5.14.21-150400.24.170.1.noarch",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-macros-5.14.21-150400.24.170.1.noarch",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-obs-build-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-obs-build-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-source-5.14.21-150400.24.170.1.noarch",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-syms-5.14.21-150400.24.170.1.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-syms-5.14.21-150400.24.170.1.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:reiserfs-kmp-default-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:reiserfs-kmp-default-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-64kb-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-64kb-devel-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-devel-5.14.21-150400.24.170.1.noarch",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-docs-5.14.21-150400.24.170.1.noarch",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-macros-5.14.21-150400.24.170.1.noarch",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-source-5.14.21-150400.24.170.1.noarch",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.170.1.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.170.1.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.170.2.ppc64le",
          "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.170.2.s390x",
          "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.170.2.ppc64le",
          "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.170.2.s390x",
          "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_170-default-1-150400.9.3.2.ppc64le",
          "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_170-default-1-150400.9.3.2.s390x",
          "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_170-default-1-150400.9.3.2.x86_64",
          "SUSE Linux Enterprise Micro 5.3:kernel-default-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise Micro 5.3:kernel-default-5.14.21-150400.24.170.2.s390x",
          "SUSE Linux Enterprise Micro 5.3:kernel-default-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise Micro 5.3:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.aarch64",
          "SUSE Linux Enterprise Micro 5.3:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
          "SUSE Linux Enterprise Micro 5.4:kernel-default-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise Micro 5.4:kernel-default-5.14.21-150400.24.170.2.s390x",
          "SUSE Linux Enterprise Micro 5.4:kernel-default-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise Micro 5.4:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.aarch64",
          "SUSE Linux Enterprise Micro 5.4:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-64kb-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-64kb-devel-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-5.14.21-150400.24.170.2.ppc64le",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-5.14.21-150400.24.170.2.s390x",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.aarch64",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.ppc64le",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.170.2.ppc64le",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.170.2.s390x",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-devel-5.14.21-150400.24.170.1.noarch",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-docs-5.14.21-150400.24.170.1.noarch",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-macros-5.14.21-150400.24.170.1.noarch",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.170.2.ppc64le",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.170.2.s390x",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-source-5.14.21-150400.24.170.1.noarch",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.170.1.aarch64",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.170.1.ppc64le",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.170.1.s390x",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.170.1.x86_64",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-zfcpdump-5.14.21-150400.24.170.2.s390x",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.170.2.ppc64le",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.170.2.s390x",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-5.14.21-150400.24.170.2.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-devel-5.14.21-150400.24.170.2.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-devel-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-devel-5.14.21-150400.24.170.1.noarch",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-docs-5.14.21-150400.24.170.1.noarch",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-macros-5.14.21-150400.24.170.1.noarch",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-obs-build-5.14.21-150400.24.170.2.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-obs-build-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-source-5.14.21-150400.24.170.1.noarch",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-syms-5.14.21-150400.24.170.1.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-syms-5.14.21-150400.24.170.1.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.170.2.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.170.2.x86_64",
          "SUSE Manager Proxy 4.3:kernel-default-5.14.21-150400.24.170.2.x86_64",
          "SUSE Manager Proxy 4.3:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
          "SUSE Manager Proxy 4.3:kernel-default-devel-5.14.21-150400.24.170.2.x86_64",
          "SUSE Manager Proxy 4.3:kernel-devel-5.14.21-150400.24.170.1.noarch",
          "SUSE Manager Proxy 4.3:kernel-macros-5.14.21-150400.24.170.1.noarch",
          "SUSE Manager Proxy 4.3:kernel-source-5.14.21-150400.24.170.1.noarch",
          "SUSE Manager Proxy 4.3:kernel-syms-5.14.21-150400.24.170.1.x86_64",
          "SUSE Manager Server 4.3:kernel-default-5.14.21-150400.24.170.2.ppc64le",
          "SUSE Manager Server 4.3:kernel-default-5.14.21-150400.24.170.2.s390x",
          "SUSE Manager Server 4.3:kernel-default-5.14.21-150400.24.170.2.x86_64",
          "SUSE Manager Server 4.3:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.ppc64le",
          "SUSE Manager Server 4.3:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
          "SUSE Manager Server 4.3:kernel-default-devel-5.14.21-150400.24.170.2.ppc64le",
          "SUSE Manager Server 4.3:kernel-default-devel-5.14.21-150400.24.170.2.s390x",
          "SUSE Manager Server 4.3:kernel-default-devel-5.14.21-150400.24.170.2.x86_64",
          "SUSE Manager Server 4.3:kernel-devel-5.14.21-150400.24.170.1.noarch",
          "SUSE Manager Server 4.3:kernel-macros-5.14.21-150400.24.170.1.noarch",
          "SUSE Manager Server 4.3:kernel-source-5.14.21-150400.24.170.1.noarch",
          "SUSE Manager Server 4.3:kernel-syms-5.14.21-150400.24.170.1.ppc64le",
          "SUSE Manager Server 4.3:kernel-syms-5.14.21-150400.24.170.1.s390x",
          "SUSE Manager Server 4.3:kernel-syms-5.14.21-150400.24.170.1.x86_64",
          "SUSE Manager Server 4.3:kernel-zfcpdump-5.14.21-150400.24.170.2.s390x"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2022-50118",
          "url": "https://www.suse.com/security/cve/CVE-2022-50118"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1244825 for CVE-2022-50118",
          "url": "https://bugzilla.suse.com/1244825"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-64kb-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-64kb-devel-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-devel-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-devel-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-devel-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-docs-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-macros-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-obs-build-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-obs-build-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-source-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-syms-5.14.21-150400.24.170.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-syms-5.14.21-150400.24.170.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:reiserfs-kmp-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:reiserfs-kmp-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-64kb-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-64kb-devel-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-devel-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-docs-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-macros-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-source-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.170.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.170.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_170-default-1-150400.9.3.2.ppc64le",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_170-default-1-150400.9.3.2.s390x",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_170-default-1-150400.9.3.2.x86_64",
            "SUSE Linux Enterprise Micro 5.3:kernel-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise Micro 5.3:kernel-default-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise Micro 5.3:kernel-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Micro 5.3:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.aarch64",
            "SUSE Linux Enterprise Micro 5.3:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
            "SUSE Linux Enterprise Micro 5.4:kernel-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise Micro 5.4:kernel-default-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise Micro 5.4:kernel-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Micro 5.4:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.aarch64",
            "SUSE Linux Enterprise Micro 5.4:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-64kb-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-64kb-devel-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.aarch64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.ppc64le",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-devel-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-docs-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-macros-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-source-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.170.1.aarch64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.170.1.ppc64le",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.170.1.s390x",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.170.1.x86_64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-zfcpdump-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-devel-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-devel-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-devel-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-docs-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-macros-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-obs-build-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-obs-build-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-source-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-syms-5.14.21-150400.24.170.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-syms-5.14.21-150400.24.170.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Manager Proxy 4.3:kernel-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Manager Proxy 4.3:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
            "SUSE Manager Proxy 4.3:kernel-default-devel-5.14.21-150400.24.170.2.x86_64",
            "SUSE Manager Proxy 4.3:kernel-devel-5.14.21-150400.24.170.1.noarch",
            "SUSE Manager Proxy 4.3:kernel-macros-5.14.21-150400.24.170.1.noarch",
            "SUSE Manager Proxy 4.3:kernel-source-5.14.21-150400.24.170.1.noarch",
            "SUSE Manager Proxy 4.3:kernel-syms-5.14.21-150400.24.170.1.x86_64",
            "SUSE Manager Server 4.3:kernel-default-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Manager Server 4.3:kernel-default-5.14.21-150400.24.170.2.s390x",
            "SUSE Manager Server 4.3:kernel-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Manager Server 4.3:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.ppc64le",
            "SUSE Manager Server 4.3:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
            "SUSE Manager Server 4.3:kernel-default-devel-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Manager Server 4.3:kernel-default-devel-5.14.21-150400.24.170.2.s390x",
            "SUSE Manager Server 4.3:kernel-default-devel-5.14.21-150400.24.170.2.x86_64",
            "SUSE Manager Server 4.3:kernel-devel-5.14.21-150400.24.170.1.noarch",
            "SUSE Manager Server 4.3:kernel-macros-5.14.21-150400.24.170.1.noarch",
            "SUSE Manager Server 4.3:kernel-source-5.14.21-150400.24.170.1.noarch",
            "SUSE Manager Server 4.3:kernel-syms-5.14.21-150400.24.170.1.ppc64le",
            "SUSE Manager Server 4.3:kernel-syms-5.14.21-150400.24.170.1.s390x",
            "SUSE Manager Server 4.3:kernel-syms-5.14.21-150400.24.170.1.x86_64",
            "SUSE Manager Server 4.3:kernel-zfcpdump-5.14.21-150400.24.170.2.s390x"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 5.5,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
            "version": "3.1"
          },
          "products": [
            "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-64kb-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-64kb-devel-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-devel-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-devel-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-devel-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-docs-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-macros-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-obs-build-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-obs-build-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-source-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-syms-5.14.21-150400.24.170.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-syms-5.14.21-150400.24.170.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:reiserfs-kmp-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:reiserfs-kmp-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-64kb-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-64kb-devel-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-devel-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-docs-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-macros-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-source-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.170.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.170.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_170-default-1-150400.9.3.2.ppc64le",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_170-default-1-150400.9.3.2.s390x",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_170-default-1-150400.9.3.2.x86_64",
            "SUSE Linux Enterprise Micro 5.3:kernel-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise Micro 5.3:kernel-default-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise Micro 5.3:kernel-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Micro 5.3:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.aarch64",
            "SUSE Linux Enterprise Micro 5.3:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
            "SUSE Linux Enterprise Micro 5.4:kernel-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise Micro 5.4:kernel-default-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise Micro 5.4:kernel-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Micro 5.4:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.aarch64",
            "SUSE Linux Enterprise Micro 5.4:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-64kb-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-64kb-devel-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.aarch64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.ppc64le",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-devel-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-docs-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-macros-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-source-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.170.1.aarch64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.170.1.ppc64le",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.170.1.s390x",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.170.1.x86_64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-zfcpdump-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-devel-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-devel-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-devel-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-docs-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-macros-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-obs-build-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-obs-build-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-source-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-syms-5.14.21-150400.24.170.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-syms-5.14.21-150400.24.170.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Manager Proxy 4.3:kernel-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Manager Proxy 4.3:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
            "SUSE Manager Proxy 4.3:kernel-default-devel-5.14.21-150400.24.170.2.x86_64",
            "SUSE Manager Proxy 4.3:kernel-devel-5.14.21-150400.24.170.1.noarch",
            "SUSE Manager Proxy 4.3:kernel-macros-5.14.21-150400.24.170.1.noarch",
            "SUSE Manager Proxy 4.3:kernel-source-5.14.21-150400.24.170.1.noarch",
            "SUSE Manager Proxy 4.3:kernel-syms-5.14.21-150400.24.170.1.x86_64",
            "SUSE Manager Server 4.3:kernel-default-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Manager Server 4.3:kernel-default-5.14.21-150400.24.170.2.s390x",
            "SUSE Manager Server 4.3:kernel-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Manager Server 4.3:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.ppc64le",
            "SUSE Manager Server 4.3:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
            "SUSE Manager Server 4.3:kernel-default-devel-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Manager Server 4.3:kernel-default-devel-5.14.21-150400.24.170.2.s390x",
            "SUSE Manager Server 4.3:kernel-default-devel-5.14.21-150400.24.170.2.x86_64",
            "SUSE Manager Server 4.3:kernel-devel-5.14.21-150400.24.170.1.noarch",
            "SUSE Manager Server 4.3:kernel-macros-5.14.21-150400.24.170.1.noarch",
            "SUSE Manager Server 4.3:kernel-source-5.14.21-150400.24.170.1.noarch",
            "SUSE Manager Server 4.3:kernel-syms-5.14.21-150400.24.170.1.ppc64le",
            "SUSE Manager Server 4.3:kernel-syms-5.14.21-150400.24.170.1.s390x",
            "SUSE Manager Server 4.3:kernel-syms-5.14.21-150400.24.170.1.x86_64",
            "SUSE Manager Server 4.3:kernel-zfcpdump-5.14.21-150400.24.170.2.s390x"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2025-07-28T15:09:33Z",
          "details": "moderate"
        }
      ],
      "title": "CVE-2022-50118"
    },
    {
      "cve": "CVE-2022-50120",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2022-50120"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "In the Linux kernel, the following vulnerability has been resolved:\n\nremoteproc: imx_rproc: Fix refcount leak in imx_rproc_addr_init\n\nof_parse_phandle() returns a node pointer with refcount\nincremented, we should use of_node_put() on it when not needed anymore.\nThis function has two paths missing of_node_put().",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.170.2.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.170.2.s390x",
          "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.170.2.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.170.2.s390x",
          "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.170.2.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.170.2.s390x",
          "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.170.2.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.170.2.s390x",
          "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-64kb-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-64kb-devel-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-devel-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-devel-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-devel-5.14.21-150400.24.170.1.noarch",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-docs-5.14.21-150400.24.170.1.noarch",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-macros-5.14.21-150400.24.170.1.noarch",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-obs-build-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-obs-build-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-source-5.14.21-150400.24.170.1.noarch",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-syms-5.14.21-150400.24.170.1.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-syms-5.14.21-150400.24.170.1.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:reiserfs-kmp-default-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:reiserfs-kmp-default-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-64kb-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-64kb-devel-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-devel-5.14.21-150400.24.170.1.noarch",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-docs-5.14.21-150400.24.170.1.noarch",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-macros-5.14.21-150400.24.170.1.noarch",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-source-5.14.21-150400.24.170.1.noarch",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.170.1.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.170.1.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.170.2.ppc64le",
          "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.170.2.s390x",
          "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.170.2.ppc64le",
          "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.170.2.s390x",
          "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_170-default-1-150400.9.3.2.ppc64le",
          "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_170-default-1-150400.9.3.2.s390x",
          "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_170-default-1-150400.9.3.2.x86_64",
          "SUSE Linux Enterprise Micro 5.3:kernel-default-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise Micro 5.3:kernel-default-5.14.21-150400.24.170.2.s390x",
          "SUSE Linux Enterprise Micro 5.3:kernel-default-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise Micro 5.3:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.aarch64",
          "SUSE Linux Enterprise Micro 5.3:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
          "SUSE Linux Enterprise Micro 5.4:kernel-default-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise Micro 5.4:kernel-default-5.14.21-150400.24.170.2.s390x",
          "SUSE Linux Enterprise Micro 5.4:kernel-default-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise Micro 5.4:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.aarch64",
          "SUSE Linux Enterprise Micro 5.4:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-64kb-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-64kb-devel-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-5.14.21-150400.24.170.2.ppc64le",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-5.14.21-150400.24.170.2.s390x",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.aarch64",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.ppc64le",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.170.2.ppc64le",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.170.2.s390x",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-devel-5.14.21-150400.24.170.1.noarch",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-docs-5.14.21-150400.24.170.1.noarch",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-macros-5.14.21-150400.24.170.1.noarch",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.170.2.ppc64le",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.170.2.s390x",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-source-5.14.21-150400.24.170.1.noarch",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.170.1.aarch64",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.170.1.ppc64le",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.170.1.s390x",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.170.1.x86_64",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-zfcpdump-5.14.21-150400.24.170.2.s390x",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.170.2.ppc64le",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.170.2.s390x",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-5.14.21-150400.24.170.2.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-devel-5.14.21-150400.24.170.2.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-devel-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-devel-5.14.21-150400.24.170.1.noarch",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-docs-5.14.21-150400.24.170.1.noarch",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-macros-5.14.21-150400.24.170.1.noarch",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-obs-build-5.14.21-150400.24.170.2.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-obs-build-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-source-5.14.21-150400.24.170.1.noarch",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-syms-5.14.21-150400.24.170.1.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-syms-5.14.21-150400.24.170.1.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.170.2.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.170.2.x86_64",
          "SUSE Manager Proxy 4.3:kernel-default-5.14.21-150400.24.170.2.x86_64",
          "SUSE Manager Proxy 4.3:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
          "SUSE Manager Proxy 4.3:kernel-default-devel-5.14.21-150400.24.170.2.x86_64",
          "SUSE Manager Proxy 4.3:kernel-devel-5.14.21-150400.24.170.1.noarch",
          "SUSE Manager Proxy 4.3:kernel-macros-5.14.21-150400.24.170.1.noarch",
          "SUSE Manager Proxy 4.3:kernel-source-5.14.21-150400.24.170.1.noarch",
          "SUSE Manager Proxy 4.3:kernel-syms-5.14.21-150400.24.170.1.x86_64",
          "SUSE Manager Server 4.3:kernel-default-5.14.21-150400.24.170.2.ppc64le",
          "SUSE Manager Server 4.3:kernel-default-5.14.21-150400.24.170.2.s390x",
          "SUSE Manager Server 4.3:kernel-default-5.14.21-150400.24.170.2.x86_64",
          "SUSE Manager Server 4.3:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.ppc64le",
          "SUSE Manager Server 4.3:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
          "SUSE Manager Server 4.3:kernel-default-devel-5.14.21-150400.24.170.2.ppc64le",
          "SUSE Manager Server 4.3:kernel-default-devel-5.14.21-150400.24.170.2.s390x",
          "SUSE Manager Server 4.3:kernel-default-devel-5.14.21-150400.24.170.2.x86_64",
          "SUSE Manager Server 4.3:kernel-devel-5.14.21-150400.24.170.1.noarch",
          "SUSE Manager Server 4.3:kernel-macros-5.14.21-150400.24.170.1.noarch",
          "SUSE Manager Server 4.3:kernel-source-5.14.21-150400.24.170.1.noarch",
          "SUSE Manager Server 4.3:kernel-syms-5.14.21-150400.24.170.1.ppc64le",
          "SUSE Manager Server 4.3:kernel-syms-5.14.21-150400.24.170.1.s390x",
          "SUSE Manager Server 4.3:kernel-syms-5.14.21-150400.24.170.1.x86_64",
          "SUSE Manager Server 4.3:kernel-zfcpdump-5.14.21-150400.24.170.2.s390x"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2022-50120",
          "url": "https://www.suse.com/security/cve/CVE-2022-50120"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1244819 for CVE-2022-50120",
          "url": "https://bugzilla.suse.com/1244819"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-64kb-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-64kb-devel-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-devel-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-devel-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-devel-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-docs-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-macros-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-obs-build-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-obs-build-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-source-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-syms-5.14.21-150400.24.170.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-syms-5.14.21-150400.24.170.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:reiserfs-kmp-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:reiserfs-kmp-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-64kb-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-64kb-devel-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-devel-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-docs-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-macros-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-source-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.170.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.170.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_170-default-1-150400.9.3.2.ppc64le",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_170-default-1-150400.9.3.2.s390x",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_170-default-1-150400.9.3.2.x86_64",
            "SUSE Linux Enterprise Micro 5.3:kernel-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise Micro 5.3:kernel-default-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise Micro 5.3:kernel-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Micro 5.3:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.aarch64",
            "SUSE Linux Enterprise Micro 5.3:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
            "SUSE Linux Enterprise Micro 5.4:kernel-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise Micro 5.4:kernel-default-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise Micro 5.4:kernel-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Micro 5.4:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.aarch64",
            "SUSE Linux Enterprise Micro 5.4:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-64kb-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-64kb-devel-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.aarch64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.ppc64le",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-devel-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-docs-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-macros-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-source-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.170.1.aarch64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.170.1.ppc64le",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.170.1.s390x",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.170.1.x86_64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-zfcpdump-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-devel-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-devel-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-devel-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-docs-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-macros-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-obs-build-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-obs-build-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-source-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-syms-5.14.21-150400.24.170.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-syms-5.14.21-150400.24.170.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Manager Proxy 4.3:kernel-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Manager Proxy 4.3:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
            "SUSE Manager Proxy 4.3:kernel-default-devel-5.14.21-150400.24.170.2.x86_64",
            "SUSE Manager Proxy 4.3:kernel-devel-5.14.21-150400.24.170.1.noarch",
            "SUSE Manager Proxy 4.3:kernel-macros-5.14.21-150400.24.170.1.noarch",
            "SUSE Manager Proxy 4.3:kernel-source-5.14.21-150400.24.170.1.noarch",
            "SUSE Manager Proxy 4.3:kernel-syms-5.14.21-150400.24.170.1.x86_64",
            "SUSE Manager Server 4.3:kernel-default-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Manager Server 4.3:kernel-default-5.14.21-150400.24.170.2.s390x",
            "SUSE Manager Server 4.3:kernel-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Manager Server 4.3:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.ppc64le",
            "SUSE Manager Server 4.3:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
            "SUSE Manager Server 4.3:kernel-default-devel-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Manager Server 4.3:kernel-default-devel-5.14.21-150400.24.170.2.s390x",
            "SUSE Manager Server 4.3:kernel-default-devel-5.14.21-150400.24.170.2.x86_64",
            "SUSE Manager Server 4.3:kernel-devel-5.14.21-150400.24.170.1.noarch",
            "SUSE Manager Server 4.3:kernel-macros-5.14.21-150400.24.170.1.noarch",
            "SUSE Manager Server 4.3:kernel-source-5.14.21-150400.24.170.1.noarch",
            "SUSE Manager Server 4.3:kernel-syms-5.14.21-150400.24.170.1.ppc64le",
            "SUSE Manager Server 4.3:kernel-syms-5.14.21-150400.24.170.1.s390x",
            "SUSE Manager Server 4.3:kernel-syms-5.14.21-150400.24.170.1.x86_64",
            "SUSE Manager Server 4.3:kernel-zfcpdump-5.14.21-150400.24.170.2.s390x"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 5.5,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
            "version": "3.1"
          },
          "products": [
            "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-64kb-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-64kb-devel-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-devel-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-devel-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-devel-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-docs-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-macros-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-obs-build-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-obs-build-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-source-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-syms-5.14.21-150400.24.170.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-syms-5.14.21-150400.24.170.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:reiserfs-kmp-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:reiserfs-kmp-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-64kb-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-64kb-devel-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-devel-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-docs-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-macros-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-source-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.170.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.170.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_170-default-1-150400.9.3.2.ppc64le",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_170-default-1-150400.9.3.2.s390x",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_170-default-1-150400.9.3.2.x86_64",
            "SUSE Linux Enterprise Micro 5.3:kernel-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise Micro 5.3:kernel-default-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise Micro 5.3:kernel-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Micro 5.3:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.aarch64",
            "SUSE Linux Enterprise Micro 5.3:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
            "SUSE Linux Enterprise Micro 5.4:kernel-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise Micro 5.4:kernel-default-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise Micro 5.4:kernel-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Micro 5.4:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.aarch64",
            "SUSE Linux Enterprise Micro 5.4:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-64kb-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-64kb-devel-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.aarch64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.ppc64le",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-devel-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-docs-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-macros-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-source-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.170.1.aarch64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.170.1.ppc64le",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.170.1.s390x",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.170.1.x86_64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-zfcpdump-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-devel-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-devel-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-devel-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-docs-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-macros-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-obs-build-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-obs-build-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-source-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-syms-5.14.21-150400.24.170.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-syms-5.14.21-150400.24.170.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Manager Proxy 4.3:kernel-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Manager Proxy 4.3:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
            "SUSE Manager Proxy 4.3:kernel-default-devel-5.14.21-150400.24.170.2.x86_64",
            "SUSE Manager Proxy 4.3:kernel-devel-5.14.21-150400.24.170.1.noarch",
            "SUSE Manager Proxy 4.3:kernel-macros-5.14.21-150400.24.170.1.noarch",
            "SUSE Manager Proxy 4.3:kernel-source-5.14.21-150400.24.170.1.noarch",
            "SUSE Manager Proxy 4.3:kernel-syms-5.14.21-150400.24.170.1.x86_64",
            "SUSE Manager Server 4.3:kernel-default-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Manager Server 4.3:kernel-default-5.14.21-150400.24.170.2.s390x",
            "SUSE Manager Server 4.3:kernel-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Manager Server 4.3:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.ppc64le",
            "SUSE Manager Server 4.3:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
            "SUSE Manager Server 4.3:kernel-default-devel-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Manager Server 4.3:kernel-default-devel-5.14.21-150400.24.170.2.s390x",
            "SUSE Manager Server 4.3:kernel-default-devel-5.14.21-150400.24.170.2.x86_64",
            "SUSE Manager Server 4.3:kernel-devel-5.14.21-150400.24.170.1.noarch",
            "SUSE Manager Server 4.3:kernel-macros-5.14.21-150400.24.170.1.noarch",
            "SUSE Manager Server 4.3:kernel-source-5.14.21-150400.24.170.1.noarch",
            "SUSE Manager Server 4.3:kernel-syms-5.14.21-150400.24.170.1.ppc64le",
            "SUSE Manager Server 4.3:kernel-syms-5.14.21-150400.24.170.1.s390x",
            "SUSE Manager Server 4.3:kernel-syms-5.14.21-150400.24.170.1.x86_64",
            "SUSE Manager Server 4.3:kernel-zfcpdump-5.14.21-150400.24.170.2.s390x"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2025-07-28T15:09:33Z",
          "details": "moderate"
        }
      ],
      "title": "CVE-2022-50120"
    },
    {
      "cve": "CVE-2022-50121",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2022-50121"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "In the Linux kernel, the following vulnerability has been resolved:\n\nremoteproc: k3-r5: Fix refcount leak in k3_r5_cluster_of_init\n\nEvery iteration of for_each_available_child_of_node() decrements\nthe reference count of the previous node.\nWhen breaking early from a for_each_available_child_of_node() loop,\nwe need to explicitly call of_node_put() on the child node.\nAdd missing of_node_put() to avoid refcount leak.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.170.2.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.170.2.s390x",
          "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.170.2.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.170.2.s390x",
          "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.170.2.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.170.2.s390x",
          "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.170.2.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.170.2.s390x",
          "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-64kb-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-64kb-devel-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-devel-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-devel-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-devel-5.14.21-150400.24.170.1.noarch",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-docs-5.14.21-150400.24.170.1.noarch",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-macros-5.14.21-150400.24.170.1.noarch",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-obs-build-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-obs-build-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-source-5.14.21-150400.24.170.1.noarch",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-syms-5.14.21-150400.24.170.1.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-syms-5.14.21-150400.24.170.1.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:reiserfs-kmp-default-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:reiserfs-kmp-default-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-64kb-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-64kb-devel-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-devel-5.14.21-150400.24.170.1.noarch",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-docs-5.14.21-150400.24.170.1.noarch",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-macros-5.14.21-150400.24.170.1.noarch",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-source-5.14.21-150400.24.170.1.noarch",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.170.1.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.170.1.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.170.2.ppc64le",
          "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.170.2.s390x",
          "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.170.2.ppc64le",
          "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.170.2.s390x",
          "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_170-default-1-150400.9.3.2.ppc64le",
          "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_170-default-1-150400.9.3.2.s390x",
          "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_170-default-1-150400.9.3.2.x86_64",
          "SUSE Linux Enterprise Micro 5.3:kernel-default-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise Micro 5.3:kernel-default-5.14.21-150400.24.170.2.s390x",
          "SUSE Linux Enterprise Micro 5.3:kernel-default-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise Micro 5.3:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.aarch64",
          "SUSE Linux Enterprise Micro 5.3:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
          "SUSE Linux Enterprise Micro 5.4:kernel-default-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise Micro 5.4:kernel-default-5.14.21-150400.24.170.2.s390x",
          "SUSE Linux Enterprise Micro 5.4:kernel-default-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise Micro 5.4:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.aarch64",
          "SUSE Linux Enterprise Micro 5.4:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-64kb-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-64kb-devel-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-5.14.21-150400.24.170.2.ppc64le",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-5.14.21-150400.24.170.2.s390x",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.aarch64",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.ppc64le",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.170.2.ppc64le",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.170.2.s390x",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-devel-5.14.21-150400.24.170.1.noarch",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-docs-5.14.21-150400.24.170.1.noarch",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-macros-5.14.21-150400.24.170.1.noarch",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.170.2.ppc64le",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.170.2.s390x",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-source-5.14.21-150400.24.170.1.noarch",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.170.1.aarch64",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.170.1.ppc64le",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.170.1.s390x",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.170.1.x86_64",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-zfcpdump-5.14.21-150400.24.170.2.s390x",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.170.2.ppc64le",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.170.2.s390x",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-5.14.21-150400.24.170.2.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-devel-5.14.21-150400.24.170.2.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-devel-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-devel-5.14.21-150400.24.170.1.noarch",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-docs-5.14.21-150400.24.170.1.noarch",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-macros-5.14.21-150400.24.170.1.noarch",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-obs-build-5.14.21-150400.24.170.2.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-obs-build-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-source-5.14.21-150400.24.170.1.noarch",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-syms-5.14.21-150400.24.170.1.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-syms-5.14.21-150400.24.170.1.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.170.2.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.170.2.x86_64",
          "SUSE Manager Proxy 4.3:kernel-default-5.14.21-150400.24.170.2.x86_64",
          "SUSE Manager Proxy 4.3:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
          "SUSE Manager Proxy 4.3:kernel-default-devel-5.14.21-150400.24.170.2.x86_64",
          "SUSE Manager Proxy 4.3:kernel-devel-5.14.21-150400.24.170.1.noarch",
          "SUSE Manager Proxy 4.3:kernel-macros-5.14.21-150400.24.170.1.noarch",
          "SUSE Manager Proxy 4.3:kernel-source-5.14.21-150400.24.170.1.noarch",
          "SUSE Manager Proxy 4.3:kernel-syms-5.14.21-150400.24.170.1.x86_64",
          "SUSE Manager Server 4.3:kernel-default-5.14.21-150400.24.170.2.ppc64le",
          "SUSE Manager Server 4.3:kernel-default-5.14.21-150400.24.170.2.s390x",
          "SUSE Manager Server 4.3:kernel-default-5.14.21-150400.24.170.2.x86_64",
          "SUSE Manager Server 4.3:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.ppc64le",
          "SUSE Manager Server 4.3:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
          "SUSE Manager Server 4.3:kernel-default-devel-5.14.21-150400.24.170.2.ppc64le",
          "SUSE Manager Server 4.3:kernel-default-devel-5.14.21-150400.24.170.2.s390x",
          "SUSE Manager Server 4.3:kernel-default-devel-5.14.21-150400.24.170.2.x86_64",
          "SUSE Manager Server 4.3:kernel-devel-5.14.21-150400.24.170.1.noarch",
          "SUSE Manager Server 4.3:kernel-macros-5.14.21-150400.24.170.1.noarch",
          "SUSE Manager Server 4.3:kernel-source-5.14.21-150400.24.170.1.noarch",
          "SUSE Manager Server 4.3:kernel-syms-5.14.21-150400.24.170.1.ppc64le",
          "SUSE Manager Server 4.3:kernel-syms-5.14.21-150400.24.170.1.s390x",
          "SUSE Manager Server 4.3:kernel-syms-5.14.21-150400.24.170.1.x86_64",
          "SUSE Manager Server 4.3:kernel-zfcpdump-5.14.21-150400.24.170.2.s390x"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2022-50121",
          "url": "https://www.suse.com/security/cve/CVE-2022-50121"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1244823 for CVE-2022-50121",
          "url": "https://bugzilla.suse.com/1244823"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-64kb-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-64kb-devel-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-devel-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-devel-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-devel-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-docs-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-macros-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-obs-build-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-obs-build-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-source-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-syms-5.14.21-150400.24.170.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-syms-5.14.21-150400.24.170.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:reiserfs-kmp-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:reiserfs-kmp-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-64kb-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-64kb-devel-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-devel-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-docs-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-macros-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-source-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.170.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.170.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_170-default-1-150400.9.3.2.ppc64le",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_170-default-1-150400.9.3.2.s390x",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_170-default-1-150400.9.3.2.x86_64",
            "SUSE Linux Enterprise Micro 5.3:kernel-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise Micro 5.3:kernel-default-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise Micro 5.3:kernel-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Micro 5.3:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.aarch64",
            "SUSE Linux Enterprise Micro 5.3:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
            "SUSE Linux Enterprise Micro 5.4:kernel-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise Micro 5.4:kernel-default-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise Micro 5.4:kernel-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Micro 5.4:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.aarch64",
            "SUSE Linux Enterprise Micro 5.4:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-64kb-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-64kb-devel-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.aarch64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.ppc64le",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-devel-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-docs-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-macros-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-source-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.170.1.aarch64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.170.1.ppc64le",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.170.1.s390x",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.170.1.x86_64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-zfcpdump-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-devel-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-devel-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-devel-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-docs-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-macros-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-obs-build-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-obs-build-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-source-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-syms-5.14.21-150400.24.170.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-syms-5.14.21-150400.24.170.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Manager Proxy 4.3:kernel-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Manager Proxy 4.3:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
            "SUSE Manager Proxy 4.3:kernel-default-devel-5.14.21-150400.24.170.2.x86_64",
            "SUSE Manager Proxy 4.3:kernel-devel-5.14.21-150400.24.170.1.noarch",
            "SUSE Manager Proxy 4.3:kernel-macros-5.14.21-150400.24.170.1.noarch",
            "SUSE Manager Proxy 4.3:kernel-source-5.14.21-150400.24.170.1.noarch",
            "SUSE Manager Proxy 4.3:kernel-syms-5.14.21-150400.24.170.1.x86_64",
            "SUSE Manager Server 4.3:kernel-default-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Manager Server 4.3:kernel-default-5.14.21-150400.24.170.2.s390x",
            "SUSE Manager Server 4.3:kernel-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Manager Server 4.3:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.ppc64le",
            "SUSE Manager Server 4.3:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
            "SUSE Manager Server 4.3:kernel-default-devel-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Manager Server 4.3:kernel-default-devel-5.14.21-150400.24.170.2.s390x",
            "SUSE Manager Server 4.3:kernel-default-devel-5.14.21-150400.24.170.2.x86_64",
            "SUSE Manager Server 4.3:kernel-devel-5.14.21-150400.24.170.1.noarch",
            "SUSE Manager Server 4.3:kernel-macros-5.14.21-150400.24.170.1.noarch",
            "SUSE Manager Server 4.3:kernel-source-5.14.21-150400.24.170.1.noarch",
            "SUSE Manager Server 4.3:kernel-syms-5.14.21-150400.24.170.1.ppc64le",
            "SUSE Manager Server 4.3:kernel-syms-5.14.21-150400.24.170.1.s390x",
            "SUSE Manager Server 4.3:kernel-syms-5.14.21-150400.24.170.1.x86_64",
            "SUSE Manager Server 4.3:kernel-zfcpdump-5.14.21-150400.24.170.2.s390x"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 5.5,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
            "version": "3.1"
          },
          "products": [
            "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-64kb-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-64kb-devel-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-devel-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-devel-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-devel-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-docs-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-macros-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-obs-build-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-obs-build-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-source-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-syms-5.14.21-150400.24.170.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-syms-5.14.21-150400.24.170.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:reiserfs-kmp-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:reiserfs-kmp-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-64kb-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-64kb-devel-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-devel-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-docs-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-macros-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-source-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.170.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.170.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_170-default-1-150400.9.3.2.ppc64le",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_170-default-1-150400.9.3.2.s390x",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_170-default-1-150400.9.3.2.x86_64",
            "SUSE Linux Enterprise Micro 5.3:kernel-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise Micro 5.3:kernel-default-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise Micro 5.3:kernel-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Micro 5.3:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.aarch64",
            "SUSE Linux Enterprise Micro 5.3:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
            "SUSE Linux Enterprise Micro 5.4:kernel-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise Micro 5.4:kernel-default-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise Micro 5.4:kernel-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Micro 5.4:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.aarch64",
            "SUSE Linux Enterprise Micro 5.4:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-64kb-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-64kb-devel-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.aarch64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.ppc64le",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-devel-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-docs-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-macros-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-source-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.170.1.aarch64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.170.1.ppc64le",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.170.1.s390x",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.170.1.x86_64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-zfcpdump-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-devel-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-devel-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-devel-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-docs-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-macros-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-obs-build-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-obs-build-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-source-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-syms-5.14.21-150400.24.170.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-syms-5.14.21-150400.24.170.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Manager Proxy 4.3:kernel-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Manager Proxy 4.3:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
            "SUSE Manager Proxy 4.3:kernel-default-devel-5.14.21-150400.24.170.2.x86_64",
            "SUSE Manager Proxy 4.3:kernel-devel-5.14.21-150400.24.170.1.noarch",
            "SUSE Manager Proxy 4.3:kernel-macros-5.14.21-150400.24.170.1.noarch",
            "SUSE Manager Proxy 4.3:kernel-source-5.14.21-150400.24.170.1.noarch",
            "SUSE Manager Proxy 4.3:kernel-syms-5.14.21-150400.24.170.1.x86_64",
            "SUSE Manager Server 4.3:kernel-default-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Manager Server 4.3:kernel-default-5.14.21-150400.24.170.2.s390x",
            "SUSE Manager Server 4.3:kernel-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Manager Server 4.3:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.ppc64le",
            "SUSE Manager Server 4.3:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
            "SUSE Manager Server 4.3:kernel-default-devel-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Manager Server 4.3:kernel-default-devel-5.14.21-150400.24.170.2.s390x",
            "SUSE Manager Server 4.3:kernel-default-devel-5.14.21-150400.24.170.2.x86_64",
            "SUSE Manager Server 4.3:kernel-devel-5.14.21-150400.24.170.1.noarch",
            "SUSE Manager Server 4.3:kernel-macros-5.14.21-150400.24.170.1.noarch",
            "SUSE Manager Server 4.3:kernel-source-5.14.21-150400.24.170.1.noarch",
            "SUSE Manager Server 4.3:kernel-syms-5.14.21-150400.24.170.1.ppc64le",
            "SUSE Manager Server 4.3:kernel-syms-5.14.21-150400.24.170.1.s390x",
            "SUSE Manager Server 4.3:kernel-syms-5.14.21-150400.24.170.1.x86_64",
            "SUSE Manager Server 4.3:kernel-zfcpdump-5.14.21-150400.24.170.2.s390x"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2025-07-28T15:09:33Z",
          "details": "moderate"
        }
      ],
      "title": "CVE-2022-50121"
    },
    {
      "cve": "CVE-2022-50124",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2022-50124"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "In the Linux kernel, the following vulnerability has been resolved:\n\nASoC: mt6797-mt6351: Fix refcount leak in mt6797_mt6351_dev_probe\n\nof_parse_phandle() returns a node pointer with refcount\nincremented, we should use of_node_put() on it when not need anymore.\nAdd missing of_node_put() to avoid refcount leak.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.170.2.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.170.2.s390x",
          "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.170.2.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.170.2.s390x",
          "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.170.2.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.170.2.s390x",
          "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.170.2.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.170.2.s390x",
          "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-64kb-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-64kb-devel-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-devel-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-devel-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-devel-5.14.21-150400.24.170.1.noarch",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-docs-5.14.21-150400.24.170.1.noarch",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-macros-5.14.21-150400.24.170.1.noarch",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-obs-build-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-obs-build-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-source-5.14.21-150400.24.170.1.noarch",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-syms-5.14.21-150400.24.170.1.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-syms-5.14.21-150400.24.170.1.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:reiserfs-kmp-default-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:reiserfs-kmp-default-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-64kb-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-64kb-devel-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-devel-5.14.21-150400.24.170.1.noarch",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-docs-5.14.21-150400.24.170.1.noarch",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-macros-5.14.21-150400.24.170.1.noarch",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-source-5.14.21-150400.24.170.1.noarch",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.170.1.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.170.1.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.170.2.ppc64le",
          "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.170.2.s390x",
          "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.170.2.ppc64le",
          "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.170.2.s390x",
          "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_170-default-1-150400.9.3.2.ppc64le",
          "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_170-default-1-150400.9.3.2.s390x",
          "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_170-default-1-150400.9.3.2.x86_64",
          "SUSE Linux Enterprise Micro 5.3:kernel-default-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise Micro 5.3:kernel-default-5.14.21-150400.24.170.2.s390x",
          "SUSE Linux Enterprise Micro 5.3:kernel-default-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise Micro 5.3:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.aarch64",
          "SUSE Linux Enterprise Micro 5.3:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
          "SUSE Linux Enterprise Micro 5.4:kernel-default-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise Micro 5.4:kernel-default-5.14.21-150400.24.170.2.s390x",
          "SUSE Linux Enterprise Micro 5.4:kernel-default-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise Micro 5.4:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.aarch64",
          "SUSE Linux Enterprise Micro 5.4:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-64kb-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-64kb-devel-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-5.14.21-150400.24.170.2.ppc64le",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-5.14.21-150400.24.170.2.s390x",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.aarch64",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.ppc64le",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.170.2.ppc64le",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.170.2.s390x",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-devel-5.14.21-150400.24.170.1.noarch",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-docs-5.14.21-150400.24.170.1.noarch",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-macros-5.14.21-150400.24.170.1.noarch",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.170.2.ppc64le",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.170.2.s390x",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-source-5.14.21-150400.24.170.1.noarch",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.170.1.aarch64",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.170.1.ppc64le",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.170.1.s390x",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.170.1.x86_64",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-zfcpdump-5.14.21-150400.24.170.2.s390x",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.170.2.ppc64le",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.170.2.s390x",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-5.14.21-150400.24.170.2.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-devel-5.14.21-150400.24.170.2.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-devel-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-devel-5.14.21-150400.24.170.1.noarch",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-docs-5.14.21-150400.24.170.1.noarch",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-macros-5.14.21-150400.24.170.1.noarch",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-obs-build-5.14.21-150400.24.170.2.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-obs-build-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-source-5.14.21-150400.24.170.1.noarch",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-syms-5.14.21-150400.24.170.1.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-syms-5.14.21-150400.24.170.1.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.170.2.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.170.2.x86_64",
          "SUSE Manager Proxy 4.3:kernel-default-5.14.21-150400.24.170.2.x86_64",
          "SUSE Manager Proxy 4.3:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
          "SUSE Manager Proxy 4.3:kernel-default-devel-5.14.21-150400.24.170.2.x86_64",
          "SUSE Manager Proxy 4.3:kernel-devel-5.14.21-150400.24.170.1.noarch",
          "SUSE Manager Proxy 4.3:kernel-macros-5.14.21-150400.24.170.1.noarch",
          "SUSE Manager Proxy 4.3:kernel-source-5.14.21-150400.24.170.1.noarch",
          "SUSE Manager Proxy 4.3:kernel-syms-5.14.21-150400.24.170.1.x86_64",
          "SUSE Manager Server 4.3:kernel-default-5.14.21-150400.24.170.2.ppc64le",
          "SUSE Manager Server 4.3:kernel-default-5.14.21-150400.24.170.2.s390x",
          "SUSE Manager Server 4.3:kernel-default-5.14.21-150400.24.170.2.x86_64",
          "SUSE Manager Server 4.3:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.ppc64le",
          "SUSE Manager Server 4.3:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
          "SUSE Manager Server 4.3:kernel-default-devel-5.14.21-150400.24.170.2.ppc64le",
          "SUSE Manager Server 4.3:kernel-default-devel-5.14.21-150400.24.170.2.s390x",
          "SUSE Manager Server 4.3:kernel-default-devel-5.14.21-150400.24.170.2.x86_64",
          "SUSE Manager Server 4.3:kernel-devel-5.14.21-150400.24.170.1.noarch",
          "SUSE Manager Server 4.3:kernel-macros-5.14.21-150400.24.170.1.noarch",
          "SUSE Manager Server 4.3:kernel-source-5.14.21-150400.24.170.1.noarch",
          "SUSE Manager Server 4.3:kernel-syms-5.14.21-150400.24.170.1.ppc64le",
          "SUSE Manager Server 4.3:kernel-syms-5.14.21-150400.24.170.1.s390x",
          "SUSE Manager Server 4.3:kernel-syms-5.14.21-150400.24.170.1.x86_64",
          "SUSE Manager Server 4.3:kernel-zfcpdump-5.14.21-150400.24.170.2.s390x"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2022-50124",
          "url": "https://www.suse.com/security/cve/CVE-2022-50124"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1244816 for CVE-2022-50124",
          "url": "https://bugzilla.suse.com/1244816"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-64kb-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-64kb-devel-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-devel-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-devel-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-devel-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-docs-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-macros-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-obs-build-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-obs-build-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-source-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-syms-5.14.21-150400.24.170.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-syms-5.14.21-150400.24.170.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:reiserfs-kmp-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:reiserfs-kmp-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-64kb-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-64kb-devel-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-devel-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-docs-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-macros-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-source-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.170.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.170.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_170-default-1-150400.9.3.2.ppc64le",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_170-default-1-150400.9.3.2.s390x",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_170-default-1-150400.9.3.2.x86_64",
            "SUSE Linux Enterprise Micro 5.3:kernel-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise Micro 5.3:kernel-default-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise Micro 5.3:kernel-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Micro 5.3:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.aarch64",
            "SUSE Linux Enterprise Micro 5.3:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
            "SUSE Linux Enterprise Micro 5.4:kernel-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise Micro 5.4:kernel-default-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise Micro 5.4:kernel-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Micro 5.4:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.aarch64",
            "SUSE Linux Enterprise Micro 5.4:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-64kb-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-64kb-devel-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.aarch64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.ppc64le",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-devel-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-docs-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-macros-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-source-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.170.1.aarch64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.170.1.ppc64le",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.170.1.s390x",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.170.1.x86_64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-zfcpdump-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-devel-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-devel-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-devel-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-docs-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-macros-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-obs-build-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-obs-build-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-source-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-syms-5.14.21-150400.24.170.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-syms-5.14.21-150400.24.170.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Manager Proxy 4.3:kernel-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Manager Proxy 4.3:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
            "SUSE Manager Proxy 4.3:kernel-default-devel-5.14.21-150400.24.170.2.x86_64",
            "SUSE Manager Proxy 4.3:kernel-devel-5.14.21-150400.24.170.1.noarch",
            "SUSE Manager Proxy 4.3:kernel-macros-5.14.21-150400.24.170.1.noarch",
            "SUSE Manager Proxy 4.3:kernel-source-5.14.21-150400.24.170.1.noarch",
            "SUSE Manager Proxy 4.3:kernel-syms-5.14.21-150400.24.170.1.x86_64",
            "SUSE Manager Server 4.3:kernel-default-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Manager Server 4.3:kernel-default-5.14.21-150400.24.170.2.s390x",
            "SUSE Manager Server 4.3:kernel-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Manager Server 4.3:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.ppc64le",
            "SUSE Manager Server 4.3:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
            "SUSE Manager Server 4.3:kernel-default-devel-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Manager Server 4.3:kernel-default-devel-5.14.21-150400.24.170.2.s390x",
            "SUSE Manager Server 4.3:kernel-default-devel-5.14.21-150400.24.170.2.x86_64",
            "SUSE Manager Server 4.3:kernel-devel-5.14.21-150400.24.170.1.noarch",
            "SUSE Manager Server 4.3:kernel-macros-5.14.21-150400.24.170.1.noarch",
            "SUSE Manager Server 4.3:kernel-source-5.14.21-150400.24.170.1.noarch",
            "SUSE Manager Server 4.3:kernel-syms-5.14.21-150400.24.170.1.ppc64le",
            "SUSE Manager Server 4.3:kernel-syms-5.14.21-150400.24.170.1.s390x",
            "SUSE Manager Server 4.3:kernel-syms-5.14.21-150400.24.170.1.x86_64",
            "SUSE Manager Server 4.3:kernel-zfcpdump-5.14.21-150400.24.170.2.s390x"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 5.5,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
            "version": "3.1"
          },
          "products": [
            "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-64kb-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-64kb-devel-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-devel-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-devel-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-devel-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-docs-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-macros-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-obs-build-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-obs-build-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-source-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-syms-5.14.21-150400.24.170.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-syms-5.14.21-150400.24.170.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:reiserfs-kmp-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:reiserfs-kmp-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-64kb-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-64kb-devel-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-devel-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-docs-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-macros-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-source-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.170.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.170.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_170-default-1-150400.9.3.2.ppc64le",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_170-default-1-150400.9.3.2.s390x",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_170-default-1-150400.9.3.2.x86_64",
            "SUSE Linux Enterprise Micro 5.3:kernel-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise Micro 5.3:kernel-default-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise Micro 5.3:kernel-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Micro 5.3:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.aarch64",
            "SUSE Linux Enterprise Micro 5.3:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
            "SUSE Linux Enterprise Micro 5.4:kernel-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise Micro 5.4:kernel-default-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise Micro 5.4:kernel-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Micro 5.4:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.aarch64",
            "SUSE Linux Enterprise Micro 5.4:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-64kb-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-64kb-devel-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.aarch64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.ppc64le",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-devel-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-docs-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-macros-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-source-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.170.1.aarch64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.170.1.ppc64le",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.170.1.s390x",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.170.1.x86_64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-zfcpdump-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-devel-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-devel-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-devel-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-docs-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-macros-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-obs-build-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-obs-build-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-source-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-syms-5.14.21-150400.24.170.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-syms-5.14.21-150400.24.170.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Manager Proxy 4.3:kernel-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Manager Proxy 4.3:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
            "SUSE Manager Proxy 4.3:kernel-default-devel-5.14.21-150400.24.170.2.x86_64",
            "SUSE Manager Proxy 4.3:kernel-devel-5.14.21-150400.24.170.1.noarch",
            "SUSE Manager Proxy 4.3:kernel-macros-5.14.21-150400.24.170.1.noarch",
            "SUSE Manager Proxy 4.3:kernel-source-5.14.21-150400.24.170.1.noarch",
            "SUSE Manager Proxy 4.3:kernel-syms-5.14.21-150400.24.170.1.x86_64",
            "SUSE Manager Server 4.3:kernel-default-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Manager Server 4.3:kernel-default-5.14.21-150400.24.170.2.s390x",
            "SUSE Manager Server 4.3:kernel-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Manager Server 4.3:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.ppc64le",
            "SUSE Manager Server 4.3:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
            "SUSE Manager Server 4.3:kernel-default-devel-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Manager Server 4.3:kernel-default-devel-5.14.21-150400.24.170.2.s390x",
            "SUSE Manager Server 4.3:kernel-default-devel-5.14.21-150400.24.170.2.x86_64",
            "SUSE Manager Server 4.3:kernel-devel-5.14.21-150400.24.170.1.noarch",
            "SUSE Manager Server 4.3:kernel-macros-5.14.21-150400.24.170.1.noarch",
            "SUSE Manager Server 4.3:kernel-source-5.14.21-150400.24.170.1.noarch",
            "SUSE Manager Server 4.3:kernel-syms-5.14.21-150400.24.170.1.ppc64le",
            "SUSE Manager Server 4.3:kernel-syms-5.14.21-150400.24.170.1.s390x",
            "SUSE Manager Server 4.3:kernel-syms-5.14.21-150400.24.170.1.x86_64",
            "SUSE Manager Server 4.3:kernel-zfcpdump-5.14.21-150400.24.170.2.s390x"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2025-07-28T15:09:33Z",
          "details": "moderate"
        }
      ],
      "title": "CVE-2022-50124"
    },
    {
      "cve": "CVE-2022-50125",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2022-50125"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "In the Linux kernel, the following vulnerability has been resolved:\n\nASoC: cros_ec_codec: Fix refcount leak in cros_ec_codec_platform_probe\n\nof_parse_phandle() returns a node pointer with refcount\nincremented, we should use of_node_put() on it when not need anymore.\nAdd missing of_node_put() to avoid refcount leak.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.170.2.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.170.2.s390x",
          "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.170.2.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.170.2.s390x",
          "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.170.2.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.170.2.s390x",
          "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.170.2.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.170.2.s390x",
          "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-64kb-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-64kb-devel-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-devel-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-devel-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-devel-5.14.21-150400.24.170.1.noarch",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-docs-5.14.21-150400.24.170.1.noarch",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-macros-5.14.21-150400.24.170.1.noarch",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-obs-build-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-obs-build-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-source-5.14.21-150400.24.170.1.noarch",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-syms-5.14.21-150400.24.170.1.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-syms-5.14.21-150400.24.170.1.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:reiserfs-kmp-default-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:reiserfs-kmp-default-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-64kb-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-64kb-devel-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-devel-5.14.21-150400.24.170.1.noarch",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-docs-5.14.21-150400.24.170.1.noarch",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-macros-5.14.21-150400.24.170.1.noarch",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-source-5.14.21-150400.24.170.1.noarch",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.170.1.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.170.1.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.170.2.ppc64le",
          "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.170.2.s390x",
          "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.170.2.ppc64le",
          "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.170.2.s390x",
          "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_170-default-1-150400.9.3.2.ppc64le",
          "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_170-default-1-150400.9.3.2.s390x",
          "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_170-default-1-150400.9.3.2.x86_64",
          "SUSE Linux Enterprise Micro 5.3:kernel-default-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise Micro 5.3:kernel-default-5.14.21-150400.24.170.2.s390x",
          "SUSE Linux Enterprise Micro 5.3:kernel-default-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise Micro 5.3:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.aarch64",
          "SUSE Linux Enterprise Micro 5.3:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
          "SUSE Linux Enterprise Micro 5.4:kernel-default-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise Micro 5.4:kernel-default-5.14.21-150400.24.170.2.s390x",
          "SUSE Linux Enterprise Micro 5.4:kernel-default-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise Micro 5.4:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.aarch64",
          "SUSE Linux Enterprise Micro 5.4:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-64kb-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-64kb-devel-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-5.14.21-150400.24.170.2.ppc64le",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-5.14.21-150400.24.170.2.s390x",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.aarch64",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.ppc64le",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.170.2.ppc64le",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.170.2.s390x",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-devel-5.14.21-150400.24.170.1.noarch",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-docs-5.14.21-150400.24.170.1.noarch",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-macros-5.14.21-150400.24.170.1.noarch",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.170.2.ppc64le",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.170.2.s390x",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-source-5.14.21-150400.24.170.1.noarch",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.170.1.aarch64",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.170.1.ppc64le",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.170.1.s390x",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.170.1.x86_64",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-zfcpdump-5.14.21-150400.24.170.2.s390x",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.170.2.ppc64le",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.170.2.s390x",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-5.14.21-150400.24.170.2.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-devel-5.14.21-150400.24.170.2.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-devel-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-devel-5.14.21-150400.24.170.1.noarch",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-docs-5.14.21-150400.24.170.1.noarch",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-macros-5.14.21-150400.24.170.1.noarch",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-obs-build-5.14.21-150400.24.170.2.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-obs-build-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-source-5.14.21-150400.24.170.1.noarch",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-syms-5.14.21-150400.24.170.1.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-syms-5.14.21-150400.24.170.1.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.170.2.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.170.2.x86_64",
          "SUSE Manager Proxy 4.3:kernel-default-5.14.21-150400.24.170.2.x86_64",
          "SUSE Manager Proxy 4.3:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
          "SUSE Manager Proxy 4.3:kernel-default-devel-5.14.21-150400.24.170.2.x86_64",
          "SUSE Manager Proxy 4.3:kernel-devel-5.14.21-150400.24.170.1.noarch",
          "SUSE Manager Proxy 4.3:kernel-macros-5.14.21-150400.24.170.1.noarch",
          "SUSE Manager Proxy 4.3:kernel-source-5.14.21-150400.24.170.1.noarch",
          "SUSE Manager Proxy 4.3:kernel-syms-5.14.21-150400.24.170.1.x86_64",
          "SUSE Manager Server 4.3:kernel-default-5.14.21-150400.24.170.2.ppc64le",
          "SUSE Manager Server 4.3:kernel-default-5.14.21-150400.24.170.2.s390x",
          "SUSE Manager Server 4.3:kernel-default-5.14.21-150400.24.170.2.x86_64",
          "SUSE Manager Server 4.3:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.ppc64le",
          "SUSE Manager Server 4.3:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
          "SUSE Manager Server 4.3:kernel-default-devel-5.14.21-150400.24.170.2.ppc64le",
          "SUSE Manager Server 4.3:kernel-default-devel-5.14.21-150400.24.170.2.s390x",
          "SUSE Manager Server 4.3:kernel-default-devel-5.14.21-150400.24.170.2.x86_64",
          "SUSE Manager Server 4.3:kernel-devel-5.14.21-150400.24.170.1.noarch",
          "SUSE Manager Server 4.3:kernel-macros-5.14.21-150400.24.170.1.noarch",
          "SUSE Manager Server 4.3:kernel-source-5.14.21-150400.24.170.1.noarch",
          "SUSE Manager Server 4.3:kernel-syms-5.14.21-150400.24.170.1.ppc64le",
          "SUSE Manager Server 4.3:kernel-syms-5.14.21-150400.24.170.1.s390x",
          "SUSE Manager Server 4.3:kernel-syms-5.14.21-150400.24.170.1.x86_64",
          "SUSE Manager Server 4.3:kernel-zfcpdump-5.14.21-150400.24.170.2.s390x"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2022-50125",
          "url": "https://www.suse.com/security/cve/CVE-2022-50125"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1244814 for CVE-2022-50125",
          "url": "https://bugzilla.suse.com/1244814"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-64kb-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-64kb-devel-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-devel-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-devel-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-devel-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-docs-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-macros-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-obs-build-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-obs-build-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-source-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-syms-5.14.21-150400.24.170.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-syms-5.14.21-150400.24.170.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:reiserfs-kmp-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:reiserfs-kmp-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-64kb-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-64kb-devel-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-devel-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-docs-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-macros-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-source-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.170.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.170.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_170-default-1-150400.9.3.2.ppc64le",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_170-default-1-150400.9.3.2.s390x",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_170-default-1-150400.9.3.2.x86_64",
            "SUSE Linux Enterprise Micro 5.3:kernel-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise Micro 5.3:kernel-default-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise Micro 5.3:kernel-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Micro 5.3:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.aarch64",
            "SUSE Linux Enterprise Micro 5.3:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
            "SUSE Linux Enterprise Micro 5.4:kernel-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise Micro 5.4:kernel-default-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise Micro 5.4:kernel-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Micro 5.4:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.aarch64",
            "SUSE Linux Enterprise Micro 5.4:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-64kb-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-64kb-devel-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.aarch64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.ppc64le",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-devel-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-docs-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-macros-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-source-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.170.1.aarch64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.170.1.ppc64le",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.170.1.s390x",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.170.1.x86_64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-zfcpdump-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-devel-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-devel-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-devel-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-docs-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-macros-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-obs-build-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-obs-build-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-source-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-syms-5.14.21-150400.24.170.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-syms-5.14.21-150400.24.170.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Manager Proxy 4.3:kernel-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Manager Proxy 4.3:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
            "SUSE Manager Proxy 4.3:kernel-default-devel-5.14.21-150400.24.170.2.x86_64",
            "SUSE Manager Proxy 4.3:kernel-devel-5.14.21-150400.24.170.1.noarch",
            "SUSE Manager Proxy 4.3:kernel-macros-5.14.21-150400.24.170.1.noarch",
            "SUSE Manager Proxy 4.3:kernel-source-5.14.21-150400.24.170.1.noarch",
            "SUSE Manager Proxy 4.3:kernel-syms-5.14.21-150400.24.170.1.x86_64",
            "SUSE Manager Server 4.3:kernel-default-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Manager Server 4.3:kernel-default-5.14.21-150400.24.170.2.s390x",
            "SUSE Manager Server 4.3:kernel-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Manager Server 4.3:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.ppc64le",
            "SUSE Manager Server 4.3:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
            "SUSE Manager Server 4.3:kernel-default-devel-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Manager Server 4.3:kernel-default-devel-5.14.21-150400.24.170.2.s390x",
            "SUSE Manager Server 4.3:kernel-default-devel-5.14.21-150400.24.170.2.x86_64",
            "SUSE Manager Server 4.3:kernel-devel-5.14.21-150400.24.170.1.noarch",
            "SUSE Manager Server 4.3:kernel-macros-5.14.21-150400.24.170.1.noarch",
            "SUSE Manager Server 4.3:kernel-source-5.14.21-150400.24.170.1.noarch",
            "SUSE Manager Server 4.3:kernel-syms-5.14.21-150400.24.170.1.ppc64le",
            "SUSE Manager Server 4.3:kernel-syms-5.14.21-150400.24.170.1.s390x",
            "SUSE Manager Server 4.3:kernel-syms-5.14.21-150400.24.170.1.x86_64",
            "SUSE Manager Server 4.3:kernel-zfcpdump-5.14.21-150400.24.170.2.s390x"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 5.5,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
            "version": "3.1"
          },
          "products": [
            "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-64kb-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-64kb-devel-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-devel-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-devel-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-devel-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-docs-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-macros-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-obs-build-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-obs-build-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-source-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-syms-5.14.21-150400.24.170.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-syms-5.14.21-150400.24.170.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:reiserfs-kmp-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:reiserfs-kmp-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-64kb-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-64kb-devel-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-devel-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-docs-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-macros-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-source-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.170.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.170.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_170-default-1-150400.9.3.2.ppc64le",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_170-default-1-150400.9.3.2.s390x",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_170-default-1-150400.9.3.2.x86_64",
            "SUSE Linux Enterprise Micro 5.3:kernel-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise Micro 5.3:kernel-default-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise Micro 5.3:kernel-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Micro 5.3:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.aarch64",
            "SUSE Linux Enterprise Micro 5.3:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
            "SUSE Linux Enterprise Micro 5.4:kernel-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise Micro 5.4:kernel-default-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise Micro 5.4:kernel-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Micro 5.4:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.aarch64",
            "SUSE Linux Enterprise Micro 5.4:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-64kb-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-64kb-devel-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.aarch64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.ppc64le",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-devel-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-docs-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-macros-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-source-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.170.1.aarch64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.170.1.ppc64le",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.170.1.s390x",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.170.1.x86_64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-zfcpdump-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-devel-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-devel-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-devel-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-docs-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-macros-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-obs-build-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-obs-build-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-source-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-syms-5.14.21-150400.24.170.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-syms-5.14.21-150400.24.170.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Manager Proxy 4.3:kernel-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Manager Proxy 4.3:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
            "SUSE Manager Proxy 4.3:kernel-default-devel-5.14.21-150400.24.170.2.x86_64",
            "SUSE Manager Proxy 4.3:kernel-devel-5.14.21-150400.24.170.1.noarch",
            "SUSE Manager Proxy 4.3:kernel-macros-5.14.21-150400.24.170.1.noarch",
            "SUSE Manager Proxy 4.3:kernel-source-5.14.21-150400.24.170.1.noarch",
            "SUSE Manager Proxy 4.3:kernel-syms-5.14.21-150400.24.170.1.x86_64",
            "SUSE Manager Server 4.3:kernel-default-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Manager Server 4.3:kernel-default-5.14.21-150400.24.170.2.s390x",
            "SUSE Manager Server 4.3:kernel-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Manager Server 4.3:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.ppc64le",
            "SUSE Manager Server 4.3:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
            "SUSE Manager Server 4.3:kernel-default-devel-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Manager Server 4.3:kernel-default-devel-5.14.21-150400.24.170.2.s390x",
            "SUSE Manager Server 4.3:kernel-default-devel-5.14.21-150400.24.170.2.x86_64",
            "SUSE Manager Server 4.3:kernel-devel-5.14.21-150400.24.170.1.noarch",
            "SUSE Manager Server 4.3:kernel-macros-5.14.21-150400.24.170.1.noarch",
            "SUSE Manager Server 4.3:kernel-source-5.14.21-150400.24.170.1.noarch",
            "SUSE Manager Server 4.3:kernel-syms-5.14.21-150400.24.170.1.ppc64le",
            "SUSE Manager Server 4.3:kernel-syms-5.14.21-150400.24.170.1.s390x",
            "SUSE Manager Server 4.3:kernel-syms-5.14.21-150400.24.170.1.x86_64",
            "SUSE Manager Server 4.3:kernel-zfcpdump-5.14.21-150400.24.170.2.s390x"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2025-07-28T15:09:33Z",
          "details": "moderate"
        }
      ],
      "title": "CVE-2022-50125"
    },
    {
      "cve": "CVE-2022-50126",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2022-50126"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "In the Linux kernel, the following vulnerability has been resolved:\n\njbd2: fix assertion \u0027jh-\u003eb_frozen_data == NULL\u0027 failure when journal aborted\n\nFollowing process will fail assertion \u0027jh-\u003eb_frozen_data == NULL\u0027 in\njbd2_journal_dirty_metadata():\n\n                   jbd2_journal_commit_transaction\nunlink(dir/a)\n jh-\u003eb_transaction = trans1\n jh-\u003eb_jlist = BJ_Metadata\n                    journal-\u003ej_running_transaction = NULL\n                    trans1-\u003et_state = T_COMMIT\nunlink(dir/b)\n handle-\u003eh_trans = trans2\n do_get_write_access\n  jh-\u003eb_modified = 0\n  jh-\u003eb_frozen_data = frozen_buffer\n  jh-\u003eb_next_transaction = trans2\n jbd2_journal_dirty_metadata\n  is_handle_aborted\n   is_journal_aborted // return false\n\n           --\u003e jbd2 abort \u003c--\n\n                     while (commit_transaction-\u003et_buffers)\n                      if (is_journal_aborted)\n                       jbd2_journal_refile_buffer\n                        __jbd2_journal_refile_buffer\n                         WRITE_ONCE(jh-\u003eb_transaction,\n\t\t\t\t\t\tjh-\u003eb_next_transaction)\n                         WRITE_ONCE(jh-\u003eb_next_transaction, NULL)\n                         __jbd2_journal_file_buffer(jh, BJ_Reserved)\n        J_ASSERT_JH(jh, jh-\u003eb_frozen_data == NULL) // assertion failure !\n\nThe reproducer (See detail in [Link]) reports:\n ------------[ cut here ]------------\n kernel BUG at fs/jbd2/transaction.c:1629!\n invalid opcode: 0000 [#1] PREEMPT SMP\n CPU: 2 PID: 584 Comm: unlink Tainted: G        W\n 5.19.0-rc6-00115-g4a57a8400075-dirty #697\n RIP: 0010:jbd2_journal_dirty_metadata+0x3c5/0x470\n RSP: 0018:ffffc90000be7ce0 EFLAGS: 00010202\n Call Trace:\n  \u003cTASK\u003e\n  __ext4_handle_dirty_metadata+0xa0/0x290\n  ext4_handle_dirty_dirblock+0x10c/0x1d0\n  ext4_delete_entry+0x104/0x200\n  __ext4_unlink+0x22b/0x360\n  ext4_unlink+0x275/0x390\n  vfs_unlink+0x20b/0x4c0\n  do_unlinkat+0x42f/0x4c0\n  __x64_sys_unlink+0x37/0x50\n  do_syscall_64+0x35/0x80\n\nAfter journal aborting, __jbd2_journal_refile_buffer() is executed with\nholding @jh-\u003eb_state_lock, we can fix it by moving \u0027is_handle_aborted()\u0027\ninto the area protected by @jh-\u003eb_state_lock.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.170.2.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.170.2.s390x",
          "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.170.2.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.170.2.s390x",
          "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.170.2.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.170.2.s390x",
          "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.170.2.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.170.2.s390x",
          "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-64kb-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-64kb-devel-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-devel-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-devel-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-devel-5.14.21-150400.24.170.1.noarch",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-docs-5.14.21-150400.24.170.1.noarch",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-macros-5.14.21-150400.24.170.1.noarch",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-obs-build-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-obs-build-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-source-5.14.21-150400.24.170.1.noarch",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-syms-5.14.21-150400.24.170.1.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-syms-5.14.21-150400.24.170.1.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:reiserfs-kmp-default-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:reiserfs-kmp-default-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-64kb-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-64kb-devel-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-devel-5.14.21-150400.24.170.1.noarch",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-docs-5.14.21-150400.24.170.1.noarch",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-macros-5.14.21-150400.24.170.1.noarch",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-source-5.14.21-150400.24.170.1.noarch",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.170.1.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.170.1.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.170.2.ppc64le",
          "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.170.2.s390x",
          "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.170.2.ppc64le",
          "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.170.2.s390x",
          "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_170-default-1-150400.9.3.2.ppc64le",
          "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_170-default-1-150400.9.3.2.s390x",
          "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_170-default-1-150400.9.3.2.x86_64",
          "SUSE Linux Enterprise Micro 5.3:kernel-default-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise Micro 5.3:kernel-default-5.14.21-150400.24.170.2.s390x",
          "SUSE Linux Enterprise Micro 5.3:kernel-default-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise Micro 5.3:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.aarch64",
          "SUSE Linux Enterprise Micro 5.3:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
          "SUSE Linux Enterprise Micro 5.4:kernel-default-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise Micro 5.4:kernel-default-5.14.21-150400.24.170.2.s390x",
          "SUSE Linux Enterprise Micro 5.4:kernel-default-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise Micro 5.4:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.aarch64",
          "SUSE Linux Enterprise Micro 5.4:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-64kb-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-64kb-devel-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-5.14.21-150400.24.170.2.ppc64le",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-5.14.21-150400.24.170.2.s390x",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.aarch64",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.ppc64le",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.170.2.ppc64le",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.170.2.s390x",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-devel-5.14.21-150400.24.170.1.noarch",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-docs-5.14.21-150400.24.170.1.noarch",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-macros-5.14.21-150400.24.170.1.noarch",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.170.2.ppc64le",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.170.2.s390x",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-source-5.14.21-150400.24.170.1.noarch",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.170.1.aarch64",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.170.1.ppc64le",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.170.1.s390x",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.170.1.x86_64",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-zfcpdump-5.14.21-150400.24.170.2.s390x",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.170.2.ppc64le",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.170.2.s390x",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-5.14.21-150400.24.170.2.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-devel-5.14.21-150400.24.170.2.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-devel-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-devel-5.14.21-150400.24.170.1.noarch",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-docs-5.14.21-150400.24.170.1.noarch",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-macros-5.14.21-150400.24.170.1.noarch",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-obs-build-5.14.21-150400.24.170.2.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-obs-build-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-source-5.14.21-150400.24.170.1.noarch",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-syms-5.14.21-150400.24.170.1.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-syms-5.14.21-150400.24.170.1.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.170.2.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.170.2.x86_64",
          "SUSE Manager Proxy 4.3:kernel-default-5.14.21-150400.24.170.2.x86_64",
          "SUSE Manager Proxy 4.3:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
          "SUSE Manager Proxy 4.3:kernel-default-devel-5.14.21-150400.24.170.2.x86_64",
          "SUSE Manager Proxy 4.3:kernel-devel-5.14.21-150400.24.170.1.noarch",
          "SUSE Manager Proxy 4.3:kernel-macros-5.14.21-150400.24.170.1.noarch",
          "SUSE Manager Proxy 4.3:kernel-source-5.14.21-150400.24.170.1.noarch",
          "SUSE Manager Proxy 4.3:kernel-syms-5.14.21-150400.24.170.1.x86_64",
          "SUSE Manager Server 4.3:kernel-default-5.14.21-150400.24.170.2.ppc64le",
          "SUSE Manager Server 4.3:kernel-default-5.14.21-150400.24.170.2.s390x",
          "SUSE Manager Server 4.3:kernel-default-5.14.21-150400.24.170.2.x86_64",
          "SUSE Manager Server 4.3:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.ppc64le",
          "SUSE Manager Server 4.3:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
          "SUSE Manager Server 4.3:kernel-default-devel-5.14.21-150400.24.170.2.ppc64le",
          "SUSE Manager Server 4.3:kernel-default-devel-5.14.21-150400.24.170.2.s390x",
          "SUSE Manager Server 4.3:kernel-default-devel-5.14.21-150400.24.170.2.x86_64",
          "SUSE Manager Server 4.3:kernel-devel-5.14.21-150400.24.170.1.noarch",
          "SUSE Manager Server 4.3:kernel-macros-5.14.21-150400.24.170.1.noarch",
          "SUSE Manager Server 4.3:kernel-source-5.14.21-150400.24.170.1.noarch",
          "SUSE Manager Server 4.3:kernel-syms-5.14.21-150400.24.170.1.ppc64le",
          "SUSE Manager Server 4.3:kernel-syms-5.14.21-150400.24.170.1.s390x",
          "SUSE Manager Server 4.3:kernel-syms-5.14.21-150400.24.170.1.x86_64",
          "SUSE Manager Server 4.3:kernel-zfcpdump-5.14.21-150400.24.170.2.s390x"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2022-50126",
          "url": "https://www.suse.com/security/cve/CVE-2022-50126"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1244813 for CVE-2022-50126",
          "url": "https://bugzilla.suse.com/1244813"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-64kb-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-64kb-devel-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-devel-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-devel-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-devel-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-docs-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-macros-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-obs-build-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-obs-build-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-source-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-syms-5.14.21-150400.24.170.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-syms-5.14.21-150400.24.170.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:reiserfs-kmp-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:reiserfs-kmp-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-64kb-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-64kb-devel-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-devel-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-docs-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-macros-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-source-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.170.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.170.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_170-default-1-150400.9.3.2.ppc64le",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_170-default-1-150400.9.3.2.s390x",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_170-default-1-150400.9.3.2.x86_64",
            "SUSE Linux Enterprise Micro 5.3:kernel-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise Micro 5.3:kernel-default-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise Micro 5.3:kernel-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Micro 5.3:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.aarch64",
            "SUSE Linux Enterprise Micro 5.3:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
            "SUSE Linux Enterprise Micro 5.4:kernel-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise Micro 5.4:kernel-default-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise Micro 5.4:kernel-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Micro 5.4:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.aarch64",
            "SUSE Linux Enterprise Micro 5.4:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-64kb-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-64kb-devel-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.aarch64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.ppc64le",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-devel-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-docs-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-macros-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-source-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.170.1.aarch64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.170.1.ppc64le",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.170.1.s390x",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.170.1.x86_64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-zfcpdump-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-devel-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-devel-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-devel-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-docs-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-macros-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-obs-build-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-obs-build-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-source-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-syms-5.14.21-150400.24.170.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-syms-5.14.21-150400.24.170.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Manager Proxy 4.3:kernel-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Manager Proxy 4.3:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
            "SUSE Manager Proxy 4.3:kernel-default-devel-5.14.21-150400.24.170.2.x86_64",
            "SUSE Manager Proxy 4.3:kernel-devel-5.14.21-150400.24.170.1.noarch",
            "SUSE Manager Proxy 4.3:kernel-macros-5.14.21-150400.24.170.1.noarch",
            "SUSE Manager Proxy 4.3:kernel-source-5.14.21-150400.24.170.1.noarch",
            "SUSE Manager Proxy 4.3:kernel-syms-5.14.21-150400.24.170.1.x86_64",
            "SUSE Manager Server 4.3:kernel-default-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Manager Server 4.3:kernel-default-5.14.21-150400.24.170.2.s390x",
            "SUSE Manager Server 4.3:kernel-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Manager Server 4.3:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.ppc64le",
            "SUSE Manager Server 4.3:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
            "SUSE Manager Server 4.3:kernel-default-devel-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Manager Server 4.3:kernel-default-devel-5.14.21-150400.24.170.2.s390x",
            "SUSE Manager Server 4.3:kernel-default-devel-5.14.21-150400.24.170.2.x86_64",
            "SUSE Manager Server 4.3:kernel-devel-5.14.21-150400.24.170.1.noarch",
            "SUSE Manager Server 4.3:kernel-macros-5.14.21-150400.24.170.1.noarch",
            "SUSE Manager Server 4.3:kernel-source-5.14.21-150400.24.170.1.noarch",
            "SUSE Manager Server 4.3:kernel-syms-5.14.21-150400.24.170.1.ppc64le",
            "SUSE Manager Server 4.3:kernel-syms-5.14.21-150400.24.170.1.s390x",
            "SUSE Manager Server 4.3:kernel-syms-5.14.21-150400.24.170.1.x86_64",
            "SUSE Manager Server 4.3:kernel-zfcpdump-5.14.21-150400.24.170.2.s390x"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 5.5,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
            "version": "3.1"
          },
          "products": [
            "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-64kb-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-64kb-devel-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-devel-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-devel-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-devel-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-docs-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-macros-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-obs-build-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-obs-build-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-source-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-syms-5.14.21-150400.24.170.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-syms-5.14.21-150400.24.170.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:reiserfs-kmp-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:reiserfs-kmp-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-64kb-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-64kb-devel-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-devel-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-docs-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-macros-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-source-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.170.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.170.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_170-default-1-150400.9.3.2.ppc64le",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_170-default-1-150400.9.3.2.s390x",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_170-default-1-150400.9.3.2.x86_64",
            "SUSE Linux Enterprise Micro 5.3:kernel-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise Micro 5.3:kernel-default-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise Micro 5.3:kernel-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Micro 5.3:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.aarch64",
            "SUSE Linux Enterprise Micro 5.3:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
            "SUSE Linux Enterprise Micro 5.4:kernel-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise Micro 5.4:kernel-default-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise Micro 5.4:kernel-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Micro 5.4:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.aarch64",
            "SUSE Linux Enterprise Micro 5.4:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-64kb-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-64kb-devel-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.aarch64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.ppc64le",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-devel-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-docs-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-macros-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-source-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.170.1.aarch64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.170.1.ppc64le",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.170.1.s390x",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.170.1.x86_64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-zfcpdump-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-devel-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-devel-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-devel-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-docs-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-macros-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-obs-build-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-obs-build-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-source-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-syms-5.14.21-150400.24.170.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-syms-5.14.21-150400.24.170.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Manager Proxy 4.3:kernel-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Manager Proxy 4.3:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
            "SUSE Manager Proxy 4.3:kernel-default-devel-5.14.21-150400.24.170.2.x86_64",
            "SUSE Manager Proxy 4.3:kernel-devel-5.14.21-150400.24.170.1.noarch",
            "SUSE Manager Proxy 4.3:kernel-macros-5.14.21-150400.24.170.1.noarch",
            "SUSE Manager Proxy 4.3:kernel-source-5.14.21-150400.24.170.1.noarch",
            "SUSE Manager Proxy 4.3:kernel-syms-5.14.21-150400.24.170.1.x86_64",
            "SUSE Manager Server 4.3:kernel-default-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Manager Server 4.3:kernel-default-5.14.21-150400.24.170.2.s390x",
            "SUSE Manager Server 4.3:kernel-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Manager Server 4.3:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.ppc64le",
            "SUSE Manager Server 4.3:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
            "SUSE Manager Server 4.3:kernel-default-devel-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Manager Server 4.3:kernel-default-devel-5.14.21-150400.24.170.2.s390x",
            "SUSE Manager Server 4.3:kernel-default-devel-5.14.21-150400.24.170.2.x86_64",
            "SUSE Manager Server 4.3:kernel-devel-5.14.21-150400.24.170.1.noarch",
            "SUSE Manager Server 4.3:kernel-macros-5.14.21-150400.24.170.1.noarch",
            "SUSE Manager Server 4.3:kernel-source-5.14.21-150400.24.170.1.noarch",
            "SUSE Manager Server 4.3:kernel-syms-5.14.21-150400.24.170.1.ppc64le",
            "SUSE Manager Server 4.3:kernel-syms-5.14.21-150400.24.170.1.s390x",
            "SUSE Manager Server 4.3:kernel-syms-5.14.21-150400.24.170.1.x86_64",
            "SUSE Manager Server 4.3:kernel-zfcpdump-5.14.21-150400.24.170.2.s390x"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2025-07-28T15:09:33Z",
          "details": "moderate"
        }
      ],
      "title": "CVE-2022-50126"
    },
    {
      "cve": "CVE-2022-50127",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2022-50127"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "In the Linux kernel, the following vulnerability has been resolved:\n\nRDMA/rxe: Fix error unwind in rxe_create_qp()\n\nIn the function rxe_create_qp(), rxe_qp_from_init() is called to\ninitialize qp, internally things like the spin locks are not setup until\nrxe_qp_init_req().\n\nIf an error occures before this point then the unwind will call\nrxe_cleanup() and eventually to rxe_qp_do_cleanup()/rxe_cleanup_task()\nwhich will oops when trying to access the uninitialized spinlock.\n\nMove the spinlock initializations earlier before any failures.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.170.2.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.170.2.s390x",
          "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.170.2.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.170.2.s390x",
          "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.170.2.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.170.2.s390x",
          "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.170.2.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.170.2.s390x",
          "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-64kb-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-64kb-devel-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-devel-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-devel-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-devel-5.14.21-150400.24.170.1.noarch",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-docs-5.14.21-150400.24.170.1.noarch",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-macros-5.14.21-150400.24.170.1.noarch",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-obs-build-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-obs-build-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-source-5.14.21-150400.24.170.1.noarch",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-syms-5.14.21-150400.24.170.1.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-syms-5.14.21-150400.24.170.1.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:reiserfs-kmp-default-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:reiserfs-kmp-default-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-64kb-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-64kb-devel-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-devel-5.14.21-150400.24.170.1.noarch",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-docs-5.14.21-150400.24.170.1.noarch",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-macros-5.14.21-150400.24.170.1.noarch",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-source-5.14.21-150400.24.170.1.noarch",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.170.1.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.170.1.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.170.2.ppc64le",
          "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.170.2.s390x",
          "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.170.2.ppc64le",
          "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.170.2.s390x",
          "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_170-default-1-150400.9.3.2.ppc64le",
          "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_170-default-1-150400.9.3.2.s390x",
          "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_170-default-1-150400.9.3.2.x86_64",
          "SUSE Linux Enterprise Micro 5.3:kernel-default-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise Micro 5.3:kernel-default-5.14.21-150400.24.170.2.s390x",
          "SUSE Linux Enterprise Micro 5.3:kernel-default-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise Micro 5.3:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.aarch64",
          "SUSE Linux Enterprise Micro 5.3:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
          "SUSE Linux Enterprise Micro 5.4:kernel-default-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise Micro 5.4:kernel-default-5.14.21-150400.24.170.2.s390x",
          "SUSE Linux Enterprise Micro 5.4:kernel-default-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise Micro 5.4:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.aarch64",
          "SUSE Linux Enterprise Micro 5.4:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-64kb-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-64kb-devel-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-5.14.21-150400.24.170.2.ppc64le",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-5.14.21-150400.24.170.2.s390x",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.aarch64",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.ppc64le",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.170.2.ppc64le",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.170.2.s390x",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-devel-5.14.21-150400.24.170.1.noarch",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-docs-5.14.21-150400.24.170.1.noarch",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-macros-5.14.21-150400.24.170.1.noarch",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.170.2.ppc64le",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.170.2.s390x",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-source-5.14.21-150400.24.170.1.noarch",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.170.1.aarch64",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.170.1.ppc64le",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.170.1.s390x",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.170.1.x86_64",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-zfcpdump-5.14.21-150400.24.170.2.s390x",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.170.2.ppc64le",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.170.2.s390x",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-5.14.21-150400.24.170.2.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-devel-5.14.21-150400.24.170.2.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-devel-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-devel-5.14.21-150400.24.170.1.noarch",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-docs-5.14.21-150400.24.170.1.noarch",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-macros-5.14.21-150400.24.170.1.noarch",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-obs-build-5.14.21-150400.24.170.2.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-obs-build-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-source-5.14.21-150400.24.170.1.noarch",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-syms-5.14.21-150400.24.170.1.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-syms-5.14.21-150400.24.170.1.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.170.2.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.170.2.x86_64",
          "SUSE Manager Proxy 4.3:kernel-default-5.14.21-150400.24.170.2.x86_64",
          "SUSE Manager Proxy 4.3:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
          "SUSE Manager Proxy 4.3:kernel-default-devel-5.14.21-150400.24.170.2.x86_64",
          "SUSE Manager Proxy 4.3:kernel-devel-5.14.21-150400.24.170.1.noarch",
          "SUSE Manager Proxy 4.3:kernel-macros-5.14.21-150400.24.170.1.noarch",
          "SUSE Manager Proxy 4.3:kernel-source-5.14.21-150400.24.170.1.noarch",
          "SUSE Manager Proxy 4.3:kernel-syms-5.14.21-150400.24.170.1.x86_64",
          "SUSE Manager Server 4.3:kernel-default-5.14.21-150400.24.170.2.ppc64le",
          "SUSE Manager Server 4.3:kernel-default-5.14.21-150400.24.170.2.s390x",
          "SUSE Manager Server 4.3:kernel-default-5.14.21-150400.24.170.2.x86_64",
          "SUSE Manager Server 4.3:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.ppc64le",
          "SUSE Manager Server 4.3:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
          "SUSE Manager Server 4.3:kernel-default-devel-5.14.21-150400.24.170.2.ppc64le",
          "SUSE Manager Server 4.3:kernel-default-devel-5.14.21-150400.24.170.2.s390x",
          "SUSE Manager Server 4.3:kernel-default-devel-5.14.21-150400.24.170.2.x86_64",
          "SUSE Manager Server 4.3:kernel-devel-5.14.21-150400.24.170.1.noarch",
          "SUSE Manager Server 4.3:kernel-macros-5.14.21-150400.24.170.1.noarch",
          "SUSE Manager Server 4.3:kernel-source-5.14.21-150400.24.170.1.noarch",
          "SUSE Manager Server 4.3:kernel-syms-5.14.21-150400.24.170.1.ppc64le",
          "SUSE Manager Server 4.3:kernel-syms-5.14.21-150400.24.170.1.s390x",
          "SUSE Manager Server 4.3:kernel-syms-5.14.21-150400.24.170.1.x86_64",
          "SUSE Manager Server 4.3:kernel-zfcpdump-5.14.21-150400.24.170.2.s390x"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2022-50127",
          "url": "https://www.suse.com/security/cve/CVE-2022-50127"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1244815 for CVE-2022-50127",
          "url": "https://bugzilla.suse.com/1244815"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-64kb-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-64kb-devel-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-devel-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-devel-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-devel-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-docs-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-macros-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-obs-build-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-obs-build-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-source-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-syms-5.14.21-150400.24.170.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-syms-5.14.21-150400.24.170.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:reiserfs-kmp-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:reiserfs-kmp-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-64kb-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-64kb-devel-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-devel-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-docs-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-macros-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-source-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.170.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.170.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_170-default-1-150400.9.3.2.ppc64le",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_170-default-1-150400.9.3.2.s390x",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_170-default-1-150400.9.3.2.x86_64",
            "SUSE Linux Enterprise Micro 5.3:kernel-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise Micro 5.3:kernel-default-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise Micro 5.3:kernel-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Micro 5.3:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.aarch64",
            "SUSE Linux Enterprise Micro 5.3:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
            "SUSE Linux Enterprise Micro 5.4:kernel-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise Micro 5.4:kernel-default-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise Micro 5.4:kernel-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Micro 5.4:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.aarch64",
            "SUSE Linux Enterprise Micro 5.4:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-64kb-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-64kb-devel-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.aarch64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.ppc64le",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-devel-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-docs-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-macros-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-source-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.170.1.aarch64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.170.1.ppc64le",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.170.1.s390x",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.170.1.x86_64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-zfcpdump-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-devel-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-devel-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-devel-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-docs-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-macros-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-obs-build-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-obs-build-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-source-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-syms-5.14.21-150400.24.170.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-syms-5.14.21-150400.24.170.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Manager Proxy 4.3:kernel-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Manager Proxy 4.3:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
            "SUSE Manager Proxy 4.3:kernel-default-devel-5.14.21-150400.24.170.2.x86_64",
            "SUSE Manager Proxy 4.3:kernel-devel-5.14.21-150400.24.170.1.noarch",
            "SUSE Manager Proxy 4.3:kernel-macros-5.14.21-150400.24.170.1.noarch",
            "SUSE Manager Proxy 4.3:kernel-source-5.14.21-150400.24.170.1.noarch",
            "SUSE Manager Proxy 4.3:kernel-syms-5.14.21-150400.24.170.1.x86_64",
            "SUSE Manager Server 4.3:kernel-default-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Manager Server 4.3:kernel-default-5.14.21-150400.24.170.2.s390x",
            "SUSE Manager Server 4.3:kernel-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Manager Server 4.3:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.ppc64le",
            "SUSE Manager Server 4.3:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
            "SUSE Manager Server 4.3:kernel-default-devel-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Manager Server 4.3:kernel-default-devel-5.14.21-150400.24.170.2.s390x",
            "SUSE Manager Server 4.3:kernel-default-devel-5.14.21-150400.24.170.2.x86_64",
            "SUSE Manager Server 4.3:kernel-devel-5.14.21-150400.24.170.1.noarch",
            "SUSE Manager Server 4.3:kernel-macros-5.14.21-150400.24.170.1.noarch",
            "SUSE Manager Server 4.3:kernel-source-5.14.21-150400.24.170.1.noarch",
            "SUSE Manager Server 4.3:kernel-syms-5.14.21-150400.24.170.1.ppc64le",
            "SUSE Manager Server 4.3:kernel-syms-5.14.21-150400.24.170.1.s390x",
            "SUSE Manager Server 4.3:kernel-syms-5.14.21-150400.24.170.1.x86_64",
            "SUSE Manager Server 4.3:kernel-zfcpdump-5.14.21-150400.24.170.2.s390x"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 5.5,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
            "version": "3.1"
          },
          "products": [
            "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-64kb-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-64kb-devel-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-devel-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-devel-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-devel-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-docs-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-macros-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-obs-build-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-obs-build-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-source-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-syms-5.14.21-150400.24.170.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-syms-5.14.21-150400.24.170.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:reiserfs-kmp-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:reiserfs-kmp-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-64kb-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-64kb-devel-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-devel-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-docs-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-macros-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-source-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.170.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.170.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_170-default-1-150400.9.3.2.ppc64le",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_170-default-1-150400.9.3.2.s390x",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_170-default-1-150400.9.3.2.x86_64",
            "SUSE Linux Enterprise Micro 5.3:kernel-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise Micro 5.3:kernel-default-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise Micro 5.3:kernel-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Micro 5.3:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.aarch64",
            "SUSE Linux Enterprise Micro 5.3:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
            "SUSE Linux Enterprise Micro 5.4:kernel-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise Micro 5.4:kernel-default-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise Micro 5.4:kernel-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Micro 5.4:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.aarch64",
            "SUSE Linux Enterprise Micro 5.4:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-64kb-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-64kb-devel-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.aarch64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.ppc64le",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-devel-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-docs-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-macros-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-source-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.170.1.aarch64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.170.1.ppc64le",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.170.1.s390x",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.170.1.x86_64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-zfcpdump-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-devel-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-devel-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-devel-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-docs-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-macros-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-obs-build-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-obs-build-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-source-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-syms-5.14.21-150400.24.170.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-syms-5.14.21-150400.24.170.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Manager Proxy 4.3:kernel-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Manager Proxy 4.3:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
            "SUSE Manager Proxy 4.3:kernel-default-devel-5.14.21-150400.24.170.2.x86_64",
            "SUSE Manager Proxy 4.3:kernel-devel-5.14.21-150400.24.170.1.noarch",
            "SUSE Manager Proxy 4.3:kernel-macros-5.14.21-150400.24.170.1.noarch",
            "SUSE Manager Proxy 4.3:kernel-source-5.14.21-150400.24.170.1.noarch",
            "SUSE Manager Proxy 4.3:kernel-syms-5.14.21-150400.24.170.1.x86_64",
            "SUSE Manager Server 4.3:kernel-default-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Manager Server 4.3:kernel-default-5.14.21-150400.24.170.2.s390x",
            "SUSE Manager Server 4.3:kernel-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Manager Server 4.3:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.ppc64le",
            "SUSE Manager Server 4.3:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
            "SUSE Manager Server 4.3:kernel-default-devel-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Manager Server 4.3:kernel-default-devel-5.14.21-150400.24.170.2.s390x",
            "SUSE Manager Server 4.3:kernel-default-devel-5.14.21-150400.24.170.2.x86_64",
            "SUSE Manager Server 4.3:kernel-devel-5.14.21-150400.24.170.1.noarch",
            "SUSE Manager Server 4.3:kernel-macros-5.14.21-150400.24.170.1.noarch",
            "SUSE Manager Server 4.3:kernel-source-5.14.21-150400.24.170.1.noarch",
            "SUSE Manager Server 4.3:kernel-syms-5.14.21-150400.24.170.1.ppc64le",
            "SUSE Manager Server 4.3:kernel-syms-5.14.21-150400.24.170.1.s390x",
            "SUSE Manager Server 4.3:kernel-syms-5.14.21-150400.24.170.1.x86_64",
            "SUSE Manager Server 4.3:kernel-zfcpdump-5.14.21-150400.24.170.2.s390x"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2025-07-28T15:09:33Z",
          "details": "moderate"
        }
      ],
      "title": "CVE-2022-50127"
    },
    {
      "cve": "CVE-2022-50129",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2022-50129"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "In the Linux kernel, the following vulnerability has been resolved:\n\nRDMA/srpt: Fix a use-after-free\n\nChange the LIO port members inside struct srpt_port from regular members\ninto pointers. Allocate the LIO port data structures from inside\nsrpt_make_tport() and free these from inside srpt_make_tport(). Keep\nstruct srpt_device as long as either an RDMA port or a LIO target port is\nassociated with it. This patch decouples the lifetime of struct srpt_port\n(controlled by the RDMA core) and struct srpt_port_id (controlled by LIO).\nThis patch fixes the following KASAN complaint:\n\n  BUG: KASAN: use-after-free in srpt_enable_tpg+0x31/0x70 [ib_srpt]\n  Read of size 8 at addr ffff888141cc34b8 by task check/5093\n\n  Call Trace:\n   \u003cTASK\u003e\n   show_stack+0x4e/0x53\n   dump_stack_lvl+0x51/0x66\n   print_address_description.constprop.0.cold+0xea/0x41e\n   print_report.cold+0x90/0x205\n   kasan_report+0xb9/0xf0\n   __asan_load8+0x69/0x90\n   srpt_enable_tpg+0x31/0x70 [ib_srpt]\n   target_fabric_tpg_base_enable_store+0xe2/0x140 [target_core_mod]\n   configfs_write_iter+0x18b/0x210\n   new_sync_write+0x1f2/0x2f0\n   vfs_write+0x3e3/0x540\n   ksys_write+0xbb/0x140\n   __x64_sys_write+0x42/0x50\n   do_syscall_64+0x34/0x80\n   entry_SYSCALL_64_after_hwframe+0x46/0xb0\n   \u003c/TASK\u003e",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.170.2.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.170.2.s390x",
          "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.170.2.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.170.2.s390x",
          "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.170.2.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.170.2.s390x",
          "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.170.2.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.170.2.s390x",
          "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-64kb-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-64kb-devel-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-devel-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-devel-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-devel-5.14.21-150400.24.170.1.noarch",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-docs-5.14.21-150400.24.170.1.noarch",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-macros-5.14.21-150400.24.170.1.noarch",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-obs-build-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-obs-build-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-source-5.14.21-150400.24.170.1.noarch",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-syms-5.14.21-150400.24.170.1.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-syms-5.14.21-150400.24.170.1.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:reiserfs-kmp-default-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:reiserfs-kmp-default-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-64kb-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-64kb-devel-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-devel-5.14.21-150400.24.170.1.noarch",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-docs-5.14.21-150400.24.170.1.noarch",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-macros-5.14.21-150400.24.170.1.noarch",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-source-5.14.21-150400.24.170.1.noarch",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.170.1.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.170.1.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.170.2.ppc64le",
          "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.170.2.s390x",
          "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.170.2.ppc64le",
          "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.170.2.s390x",
          "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_170-default-1-150400.9.3.2.ppc64le",
          "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_170-default-1-150400.9.3.2.s390x",
          "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_170-default-1-150400.9.3.2.x86_64",
          "SUSE Linux Enterprise Micro 5.3:kernel-default-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise Micro 5.3:kernel-default-5.14.21-150400.24.170.2.s390x",
          "SUSE Linux Enterprise Micro 5.3:kernel-default-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise Micro 5.3:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.aarch64",
          "SUSE Linux Enterprise Micro 5.3:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
          "SUSE Linux Enterprise Micro 5.4:kernel-default-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise Micro 5.4:kernel-default-5.14.21-150400.24.170.2.s390x",
          "SUSE Linux Enterprise Micro 5.4:kernel-default-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise Micro 5.4:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.aarch64",
          "SUSE Linux Enterprise Micro 5.4:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-64kb-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-64kb-devel-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-5.14.21-150400.24.170.2.ppc64le",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-5.14.21-150400.24.170.2.s390x",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.aarch64",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.ppc64le",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.170.2.ppc64le",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.170.2.s390x",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-devel-5.14.21-150400.24.170.1.noarch",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-docs-5.14.21-150400.24.170.1.noarch",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-macros-5.14.21-150400.24.170.1.noarch",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.170.2.ppc64le",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.170.2.s390x",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-source-5.14.21-150400.24.170.1.noarch",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.170.1.aarch64",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.170.1.ppc64le",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.170.1.s390x",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.170.1.x86_64",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-zfcpdump-5.14.21-150400.24.170.2.s390x",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.170.2.ppc64le",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.170.2.s390x",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-5.14.21-150400.24.170.2.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-devel-5.14.21-150400.24.170.2.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-devel-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-devel-5.14.21-150400.24.170.1.noarch",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-docs-5.14.21-150400.24.170.1.noarch",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-macros-5.14.21-150400.24.170.1.noarch",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-obs-build-5.14.21-150400.24.170.2.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-obs-build-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-source-5.14.21-150400.24.170.1.noarch",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-syms-5.14.21-150400.24.170.1.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-syms-5.14.21-150400.24.170.1.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.170.2.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.170.2.x86_64",
          "SUSE Manager Proxy 4.3:kernel-default-5.14.21-150400.24.170.2.x86_64",
          "SUSE Manager Proxy 4.3:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
          "SUSE Manager Proxy 4.3:kernel-default-devel-5.14.21-150400.24.170.2.x86_64",
          "SUSE Manager Proxy 4.3:kernel-devel-5.14.21-150400.24.170.1.noarch",
          "SUSE Manager Proxy 4.3:kernel-macros-5.14.21-150400.24.170.1.noarch",
          "SUSE Manager Proxy 4.3:kernel-source-5.14.21-150400.24.170.1.noarch",
          "SUSE Manager Proxy 4.3:kernel-syms-5.14.21-150400.24.170.1.x86_64",
          "SUSE Manager Server 4.3:kernel-default-5.14.21-150400.24.170.2.ppc64le",
          "SUSE Manager Server 4.3:kernel-default-5.14.21-150400.24.170.2.s390x",
          "SUSE Manager Server 4.3:kernel-default-5.14.21-150400.24.170.2.x86_64",
          "SUSE Manager Server 4.3:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.ppc64le",
          "SUSE Manager Server 4.3:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
          "SUSE Manager Server 4.3:kernel-default-devel-5.14.21-150400.24.170.2.ppc64le",
          "SUSE Manager Server 4.3:kernel-default-devel-5.14.21-150400.24.170.2.s390x",
          "SUSE Manager Server 4.3:kernel-default-devel-5.14.21-150400.24.170.2.x86_64",
          "SUSE Manager Server 4.3:kernel-devel-5.14.21-150400.24.170.1.noarch",
          "SUSE Manager Server 4.3:kernel-macros-5.14.21-150400.24.170.1.noarch",
          "SUSE Manager Server 4.3:kernel-source-5.14.21-150400.24.170.1.noarch",
          "SUSE Manager Server 4.3:kernel-syms-5.14.21-150400.24.170.1.ppc64le",
          "SUSE Manager Server 4.3:kernel-syms-5.14.21-150400.24.170.1.s390x",
          "SUSE Manager Server 4.3:kernel-syms-5.14.21-150400.24.170.1.x86_64",
          "SUSE Manager Server 4.3:kernel-zfcpdump-5.14.21-150400.24.170.2.s390x"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2022-50129",
          "url": "https://www.suse.com/security/cve/CVE-2022-50129"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1244811 for CVE-2022-50129",
          "url": "https://bugzilla.suse.com/1244811"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-64kb-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-64kb-devel-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-devel-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-devel-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-devel-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-docs-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-macros-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-obs-build-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-obs-build-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-source-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-syms-5.14.21-150400.24.170.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-syms-5.14.21-150400.24.170.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:reiserfs-kmp-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:reiserfs-kmp-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-64kb-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-64kb-devel-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-devel-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-docs-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-macros-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-source-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.170.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.170.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_170-default-1-150400.9.3.2.ppc64le",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_170-default-1-150400.9.3.2.s390x",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_170-default-1-150400.9.3.2.x86_64",
            "SUSE Linux Enterprise Micro 5.3:kernel-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise Micro 5.3:kernel-default-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise Micro 5.3:kernel-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Micro 5.3:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.aarch64",
            "SUSE Linux Enterprise Micro 5.3:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
            "SUSE Linux Enterprise Micro 5.4:kernel-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise Micro 5.4:kernel-default-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise Micro 5.4:kernel-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Micro 5.4:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.aarch64",
            "SUSE Linux Enterprise Micro 5.4:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-64kb-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-64kb-devel-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.aarch64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.ppc64le",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-devel-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-docs-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-macros-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-source-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.170.1.aarch64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.170.1.ppc64le",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.170.1.s390x",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.170.1.x86_64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-zfcpdump-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-devel-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-devel-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-devel-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-docs-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-macros-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-obs-build-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-obs-build-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-source-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-syms-5.14.21-150400.24.170.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-syms-5.14.21-150400.24.170.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Manager Proxy 4.3:kernel-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Manager Proxy 4.3:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
            "SUSE Manager Proxy 4.3:kernel-default-devel-5.14.21-150400.24.170.2.x86_64",
            "SUSE Manager Proxy 4.3:kernel-devel-5.14.21-150400.24.170.1.noarch",
            "SUSE Manager Proxy 4.3:kernel-macros-5.14.21-150400.24.170.1.noarch",
            "SUSE Manager Proxy 4.3:kernel-source-5.14.21-150400.24.170.1.noarch",
            "SUSE Manager Proxy 4.3:kernel-syms-5.14.21-150400.24.170.1.x86_64",
            "SUSE Manager Server 4.3:kernel-default-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Manager Server 4.3:kernel-default-5.14.21-150400.24.170.2.s390x",
            "SUSE Manager Server 4.3:kernel-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Manager Server 4.3:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.ppc64le",
            "SUSE Manager Server 4.3:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
            "SUSE Manager Server 4.3:kernel-default-devel-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Manager Server 4.3:kernel-default-devel-5.14.21-150400.24.170.2.s390x",
            "SUSE Manager Server 4.3:kernel-default-devel-5.14.21-150400.24.170.2.x86_64",
            "SUSE Manager Server 4.3:kernel-devel-5.14.21-150400.24.170.1.noarch",
            "SUSE Manager Server 4.3:kernel-macros-5.14.21-150400.24.170.1.noarch",
            "SUSE Manager Server 4.3:kernel-source-5.14.21-150400.24.170.1.noarch",
            "SUSE Manager Server 4.3:kernel-syms-5.14.21-150400.24.170.1.ppc64le",
            "SUSE Manager Server 4.3:kernel-syms-5.14.21-150400.24.170.1.s390x",
            "SUSE Manager Server 4.3:kernel-syms-5.14.21-150400.24.170.1.x86_64",
            "SUSE Manager Server 4.3:kernel-zfcpdump-5.14.21-150400.24.170.2.s390x"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 5.5,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
            "version": "3.1"
          },
          "products": [
            "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-64kb-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-64kb-devel-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-devel-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-devel-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-devel-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-docs-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-macros-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-obs-build-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-obs-build-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-source-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-syms-5.14.21-150400.24.170.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-syms-5.14.21-150400.24.170.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:reiserfs-kmp-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:reiserfs-kmp-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-64kb-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-64kb-devel-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-devel-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-docs-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-macros-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-source-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.170.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.170.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_170-default-1-150400.9.3.2.ppc64le",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_170-default-1-150400.9.3.2.s390x",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_170-default-1-150400.9.3.2.x86_64",
            "SUSE Linux Enterprise Micro 5.3:kernel-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise Micro 5.3:kernel-default-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise Micro 5.3:kernel-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Micro 5.3:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.aarch64",
            "SUSE Linux Enterprise Micro 5.3:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
            "SUSE Linux Enterprise Micro 5.4:kernel-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise Micro 5.4:kernel-default-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise Micro 5.4:kernel-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Micro 5.4:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.aarch64",
            "SUSE Linux Enterprise Micro 5.4:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-64kb-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-64kb-devel-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.aarch64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.ppc64le",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-devel-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-docs-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-macros-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-source-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.170.1.aarch64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.170.1.ppc64le",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.170.1.s390x",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.170.1.x86_64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-zfcpdump-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-devel-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-devel-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-devel-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-docs-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-macros-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-obs-build-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-obs-build-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-source-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-syms-5.14.21-150400.24.170.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-syms-5.14.21-150400.24.170.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Manager Proxy 4.3:kernel-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Manager Proxy 4.3:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
            "SUSE Manager Proxy 4.3:kernel-default-devel-5.14.21-150400.24.170.2.x86_64",
            "SUSE Manager Proxy 4.3:kernel-devel-5.14.21-150400.24.170.1.noarch",
            "SUSE Manager Proxy 4.3:kernel-macros-5.14.21-150400.24.170.1.noarch",
            "SUSE Manager Proxy 4.3:kernel-source-5.14.21-150400.24.170.1.noarch",
            "SUSE Manager Proxy 4.3:kernel-syms-5.14.21-150400.24.170.1.x86_64",
            "SUSE Manager Server 4.3:kernel-default-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Manager Server 4.3:kernel-default-5.14.21-150400.24.170.2.s390x",
            "SUSE Manager Server 4.3:kernel-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Manager Server 4.3:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.ppc64le",
            "SUSE Manager Server 4.3:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
            "SUSE Manager Server 4.3:kernel-default-devel-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Manager Server 4.3:kernel-default-devel-5.14.21-150400.24.170.2.s390x",
            "SUSE Manager Server 4.3:kernel-default-devel-5.14.21-150400.24.170.2.x86_64",
            "SUSE Manager Server 4.3:kernel-devel-5.14.21-150400.24.170.1.noarch",
            "SUSE Manager Server 4.3:kernel-macros-5.14.21-150400.24.170.1.noarch",
            "SUSE Manager Server 4.3:kernel-source-5.14.21-150400.24.170.1.noarch",
            "SUSE Manager Server 4.3:kernel-syms-5.14.21-150400.24.170.1.ppc64le",
            "SUSE Manager Server 4.3:kernel-syms-5.14.21-150400.24.170.1.s390x",
            "SUSE Manager Server 4.3:kernel-syms-5.14.21-150400.24.170.1.x86_64",
            "SUSE Manager Server 4.3:kernel-zfcpdump-5.14.21-150400.24.170.2.s390x"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2025-07-28T15:09:33Z",
          "details": "moderate"
        }
      ],
      "title": "CVE-2022-50129"
    },
    {
      "cve": "CVE-2022-50131",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2022-50131"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "In the Linux kernel, the following vulnerability has been resolved:\n\nHID: mcp2221: prevent a buffer overflow in mcp_smbus_write()\n\nSmatch Warning:\ndrivers/hid/hid-mcp2221.c:388 mcp_smbus_write() error: __memcpy()\n\u0027\u0026mcp-\u003etxbuf[5]\u0027 too small (59 vs 255)\ndrivers/hid/hid-mcp2221.c:388 mcp_smbus_write() error: __memcpy() \u0027buf\u0027\ntoo small (34 vs 255)\n\nThe \u0027len\u0027 variable can take a value between 0-255 as it can come from\ndata-\u003eblock[0] and it is user data. So add an bound check to prevent a\nbuffer overflow in memcpy().",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.170.2.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.170.2.s390x",
          "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.170.2.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.170.2.s390x",
          "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.170.2.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.170.2.s390x",
          "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.170.2.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.170.2.s390x",
          "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-64kb-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-64kb-devel-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-devel-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-devel-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-devel-5.14.21-150400.24.170.1.noarch",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-docs-5.14.21-150400.24.170.1.noarch",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-macros-5.14.21-150400.24.170.1.noarch",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-obs-build-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-obs-build-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-source-5.14.21-150400.24.170.1.noarch",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-syms-5.14.21-150400.24.170.1.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-syms-5.14.21-150400.24.170.1.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:reiserfs-kmp-default-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:reiserfs-kmp-default-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-64kb-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-64kb-devel-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-devel-5.14.21-150400.24.170.1.noarch",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-docs-5.14.21-150400.24.170.1.noarch",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-macros-5.14.21-150400.24.170.1.noarch",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-source-5.14.21-150400.24.170.1.noarch",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.170.1.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.170.1.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.170.2.ppc64le",
          "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.170.2.s390x",
          "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.170.2.ppc64le",
          "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.170.2.s390x",
          "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_170-default-1-150400.9.3.2.ppc64le",
          "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_170-default-1-150400.9.3.2.s390x",
          "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_170-default-1-150400.9.3.2.x86_64",
          "SUSE Linux Enterprise Micro 5.3:kernel-default-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise Micro 5.3:kernel-default-5.14.21-150400.24.170.2.s390x",
          "SUSE Linux Enterprise Micro 5.3:kernel-default-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise Micro 5.3:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.aarch64",
          "SUSE Linux Enterprise Micro 5.3:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
          "SUSE Linux Enterprise Micro 5.4:kernel-default-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise Micro 5.4:kernel-default-5.14.21-150400.24.170.2.s390x",
          "SUSE Linux Enterprise Micro 5.4:kernel-default-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise Micro 5.4:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.aarch64",
          "SUSE Linux Enterprise Micro 5.4:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-64kb-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-64kb-devel-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-5.14.21-150400.24.170.2.ppc64le",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-5.14.21-150400.24.170.2.s390x",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.aarch64",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.ppc64le",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.170.2.ppc64le",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.170.2.s390x",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-devel-5.14.21-150400.24.170.1.noarch",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-docs-5.14.21-150400.24.170.1.noarch",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-macros-5.14.21-150400.24.170.1.noarch",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.170.2.ppc64le",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.170.2.s390x",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-source-5.14.21-150400.24.170.1.noarch",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.170.1.aarch64",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.170.1.ppc64le",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.170.1.s390x",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.170.1.x86_64",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-zfcpdump-5.14.21-150400.24.170.2.s390x",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.170.2.ppc64le",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.170.2.s390x",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-5.14.21-150400.24.170.2.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-devel-5.14.21-150400.24.170.2.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-devel-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-devel-5.14.21-150400.24.170.1.noarch",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-docs-5.14.21-150400.24.170.1.noarch",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-macros-5.14.21-150400.24.170.1.noarch",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-obs-build-5.14.21-150400.24.170.2.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-obs-build-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-source-5.14.21-150400.24.170.1.noarch",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-syms-5.14.21-150400.24.170.1.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-syms-5.14.21-150400.24.170.1.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.170.2.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.170.2.x86_64",
          "SUSE Manager Proxy 4.3:kernel-default-5.14.21-150400.24.170.2.x86_64",
          "SUSE Manager Proxy 4.3:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
          "SUSE Manager Proxy 4.3:kernel-default-devel-5.14.21-150400.24.170.2.x86_64",
          "SUSE Manager Proxy 4.3:kernel-devel-5.14.21-150400.24.170.1.noarch",
          "SUSE Manager Proxy 4.3:kernel-macros-5.14.21-150400.24.170.1.noarch",
          "SUSE Manager Proxy 4.3:kernel-source-5.14.21-150400.24.170.1.noarch",
          "SUSE Manager Proxy 4.3:kernel-syms-5.14.21-150400.24.170.1.x86_64",
          "SUSE Manager Server 4.3:kernel-default-5.14.21-150400.24.170.2.ppc64le",
          "SUSE Manager Server 4.3:kernel-default-5.14.21-150400.24.170.2.s390x",
          "SUSE Manager Server 4.3:kernel-default-5.14.21-150400.24.170.2.x86_64",
          "SUSE Manager Server 4.3:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.ppc64le",
          "SUSE Manager Server 4.3:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
          "SUSE Manager Server 4.3:kernel-default-devel-5.14.21-150400.24.170.2.ppc64le",
          "SUSE Manager Server 4.3:kernel-default-devel-5.14.21-150400.24.170.2.s390x",
          "SUSE Manager Server 4.3:kernel-default-devel-5.14.21-150400.24.170.2.x86_64",
          "SUSE Manager Server 4.3:kernel-devel-5.14.21-150400.24.170.1.noarch",
          "SUSE Manager Server 4.3:kernel-macros-5.14.21-150400.24.170.1.noarch",
          "SUSE Manager Server 4.3:kernel-source-5.14.21-150400.24.170.1.noarch",
          "SUSE Manager Server 4.3:kernel-syms-5.14.21-150400.24.170.1.ppc64le",
          "SUSE Manager Server 4.3:kernel-syms-5.14.21-150400.24.170.1.s390x",
          "SUSE Manager Server 4.3:kernel-syms-5.14.21-150400.24.170.1.x86_64",
          "SUSE Manager Server 4.3:kernel-zfcpdump-5.14.21-150400.24.170.2.s390x"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2022-50131",
          "url": "https://www.suse.com/security/cve/CVE-2022-50131"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1244807 for CVE-2022-50131",
          "url": "https://bugzilla.suse.com/1244807"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-64kb-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-64kb-devel-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-devel-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-devel-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-devel-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-docs-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-macros-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-obs-build-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-obs-build-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-source-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-syms-5.14.21-150400.24.170.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-syms-5.14.21-150400.24.170.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:reiserfs-kmp-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:reiserfs-kmp-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-64kb-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-64kb-devel-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-devel-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-docs-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-macros-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-source-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.170.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.170.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_170-default-1-150400.9.3.2.ppc64le",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_170-default-1-150400.9.3.2.s390x",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_170-default-1-150400.9.3.2.x86_64",
            "SUSE Linux Enterprise Micro 5.3:kernel-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise Micro 5.3:kernel-default-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise Micro 5.3:kernel-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Micro 5.3:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.aarch64",
            "SUSE Linux Enterprise Micro 5.3:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
            "SUSE Linux Enterprise Micro 5.4:kernel-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise Micro 5.4:kernel-default-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise Micro 5.4:kernel-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Micro 5.4:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.aarch64",
            "SUSE Linux Enterprise Micro 5.4:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-64kb-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-64kb-devel-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.aarch64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.ppc64le",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-devel-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-docs-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-macros-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-source-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.170.1.aarch64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.170.1.ppc64le",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.170.1.s390x",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.170.1.x86_64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-zfcpdump-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-devel-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-devel-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-devel-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-docs-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-macros-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-obs-build-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-obs-build-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-source-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-syms-5.14.21-150400.24.170.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-syms-5.14.21-150400.24.170.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Manager Proxy 4.3:kernel-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Manager Proxy 4.3:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
            "SUSE Manager Proxy 4.3:kernel-default-devel-5.14.21-150400.24.170.2.x86_64",
            "SUSE Manager Proxy 4.3:kernel-devel-5.14.21-150400.24.170.1.noarch",
            "SUSE Manager Proxy 4.3:kernel-macros-5.14.21-150400.24.170.1.noarch",
            "SUSE Manager Proxy 4.3:kernel-source-5.14.21-150400.24.170.1.noarch",
            "SUSE Manager Proxy 4.3:kernel-syms-5.14.21-150400.24.170.1.x86_64",
            "SUSE Manager Server 4.3:kernel-default-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Manager Server 4.3:kernel-default-5.14.21-150400.24.170.2.s390x",
            "SUSE Manager Server 4.3:kernel-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Manager Server 4.3:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.ppc64le",
            "SUSE Manager Server 4.3:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
            "SUSE Manager Server 4.3:kernel-default-devel-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Manager Server 4.3:kernel-default-devel-5.14.21-150400.24.170.2.s390x",
            "SUSE Manager Server 4.3:kernel-default-devel-5.14.21-150400.24.170.2.x86_64",
            "SUSE Manager Server 4.3:kernel-devel-5.14.21-150400.24.170.1.noarch",
            "SUSE Manager Server 4.3:kernel-macros-5.14.21-150400.24.170.1.noarch",
            "SUSE Manager Server 4.3:kernel-source-5.14.21-150400.24.170.1.noarch",
            "SUSE Manager Server 4.3:kernel-syms-5.14.21-150400.24.170.1.ppc64le",
            "SUSE Manager Server 4.3:kernel-syms-5.14.21-150400.24.170.1.s390x",
            "SUSE Manager Server 4.3:kernel-syms-5.14.21-150400.24.170.1.x86_64",
            "SUSE Manager Server 4.3:kernel-zfcpdump-5.14.21-150400.24.170.2.s390x"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 5.5,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
            "version": "3.1"
          },
          "products": [
            "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-64kb-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-64kb-devel-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-devel-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-devel-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-devel-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-docs-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-macros-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-obs-build-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-obs-build-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-source-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-syms-5.14.21-150400.24.170.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-syms-5.14.21-150400.24.170.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:reiserfs-kmp-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:reiserfs-kmp-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-64kb-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-64kb-devel-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-devel-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-docs-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-macros-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-source-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.170.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.170.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_170-default-1-150400.9.3.2.ppc64le",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_170-default-1-150400.9.3.2.s390x",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_170-default-1-150400.9.3.2.x86_64",
            "SUSE Linux Enterprise Micro 5.3:kernel-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise Micro 5.3:kernel-default-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise Micro 5.3:kernel-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Micro 5.3:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.aarch64",
            "SUSE Linux Enterprise Micro 5.3:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
            "SUSE Linux Enterprise Micro 5.4:kernel-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise Micro 5.4:kernel-default-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise Micro 5.4:kernel-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Micro 5.4:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.aarch64",
            "SUSE Linux Enterprise Micro 5.4:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-64kb-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-64kb-devel-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.aarch64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.ppc64le",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-devel-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-docs-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-macros-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-source-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.170.1.aarch64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.170.1.ppc64le",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.170.1.s390x",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.170.1.x86_64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-zfcpdump-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-devel-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-devel-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-devel-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-docs-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-macros-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-obs-build-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-obs-build-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-source-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-syms-5.14.21-150400.24.170.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-syms-5.14.21-150400.24.170.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Manager Proxy 4.3:kernel-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Manager Proxy 4.3:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
            "SUSE Manager Proxy 4.3:kernel-default-devel-5.14.21-150400.24.170.2.x86_64",
            "SUSE Manager Proxy 4.3:kernel-devel-5.14.21-150400.24.170.1.noarch",
            "SUSE Manager Proxy 4.3:kernel-macros-5.14.21-150400.24.170.1.noarch",
            "SUSE Manager Proxy 4.3:kernel-source-5.14.21-150400.24.170.1.noarch",
            "SUSE Manager Proxy 4.3:kernel-syms-5.14.21-150400.24.170.1.x86_64",
            "SUSE Manager Server 4.3:kernel-default-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Manager Server 4.3:kernel-default-5.14.21-150400.24.170.2.s390x",
            "SUSE Manager Server 4.3:kernel-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Manager Server 4.3:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.ppc64le",
            "SUSE Manager Server 4.3:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
            "SUSE Manager Server 4.3:kernel-default-devel-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Manager Server 4.3:kernel-default-devel-5.14.21-150400.24.170.2.s390x",
            "SUSE Manager Server 4.3:kernel-default-devel-5.14.21-150400.24.170.2.x86_64",
            "SUSE Manager Server 4.3:kernel-devel-5.14.21-150400.24.170.1.noarch",
            "SUSE Manager Server 4.3:kernel-macros-5.14.21-150400.24.170.1.noarch",
            "SUSE Manager Server 4.3:kernel-source-5.14.21-150400.24.170.1.noarch",
            "SUSE Manager Server 4.3:kernel-syms-5.14.21-150400.24.170.1.ppc64le",
            "SUSE Manager Server 4.3:kernel-syms-5.14.21-150400.24.170.1.s390x",
            "SUSE Manager Server 4.3:kernel-syms-5.14.21-150400.24.170.1.x86_64",
            "SUSE Manager Server 4.3:kernel-zfcpdump-5.14.21-150400.24.170.2.s390x"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2025-07-28T15:09:33Z",
          "details": "moderate"
        }
      ],
      "title": "CVE-2022-50131"
    },
    {
      "cve": "CVE-2022-50132",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2022-50132"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "In the Linux kernel, the following vulnerability has been resolved:\n\nusb: cdns3: change place of \u0027priv_ep\u0027 assignment in cdns3_gadget_ep_dequeue(), cdns3_gadget_ep_enable()\n\nIf \u0027ep\u0027 is NULL, result of ep_to_cdns3_ep(ep) is invalid pointer\nand its dereference with priv_ep-\u003ecdns3_dev may cause panic.\n\nFound by Linux Verification Center (linuxtesting.org) with SVACE.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.170.2.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.170.2.s390x",
          "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.170.2.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.170.2.s390x",
          "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.170.2.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.170.2.s390x",
          "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.170.2.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.170.2.s390x",
          "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-64kb-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-64kb-devel-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-devel-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-devel-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-devel-5.14.21-150400.24.170.1.noarch",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-docs-5.14.21-150400.24.170.1.noarch",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-macros-5.14.21-150400.24.170.1.noarch",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-obs-build-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-obs-build-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-source-5.14.21-150400.24.170.1.noarch",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-syms-5.14.21-150400.24.170.1.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-syms-5.14.21-150400.24.170.1.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:reiserfs-kmp-default-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:reiserfs-kmp-default-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-64kb-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-64kb-devel-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-devel-5.14.21-150400.24.170.1.noarch",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-docs-5.14.21-150400.24.170.1.noarch",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-macros-5.14.21-150400.24.170.1.noarch",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-source-5.14.21-150400.24.170.1.noarch",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.170.1.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.170.1.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.170.2.ppc64le",
          "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.170.2.s390x",
          "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.170.2.ppc64le",
          "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.170.2.s390x",
          "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_170-default-1-150400.9.3.2.ppc64le",
          "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_170-default-1-150400.9.3.2.s390x",
          "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_170-default-1-150400.9.3.2.x86_64",
          "SUSE Linux Enterprise Micro 5.3:kernel-default-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise Micro 5.3:kernel-default-5.14.21-150400.24.170.2.s390x",
          "SUSE Linux Enterprise Micro 5.3:kernel-default-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise Micro 5.3:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.aarch64",
          "SUSE Linux Enterprise Micro 5.3:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
          "SUSE Linux Enterprise Micro 5.4:kernel-default-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise Micro 5.4:kernel-default-5.14.21-150400.24.170.2.s390x",
          "SUSE Linux Enterprise Micro 5.4:kernel-default-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise Micro 5.4:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.aarch64",
          "SUSE Linux Enterprise Micro 5.4:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-64kb-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-64kb-devel-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-5.14.21-150400.24.170.2.ppc64le",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-5.14.21-150400.24.170.2.s390x",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.aarch64",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.ppc64le",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.170.2.ppc64le",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.170.2.s390x",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-devel-5.14.21-150400.24.170.1.noarch",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-docs-5.14.21-150400.24.170.1.noarch",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-macros-5.14.21-150400.24.170.1.noarch",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.170.2.ppc64le",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.170.2.s390x",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-source-5.14.21-150400.24.170.1.noarch",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.170.1.aarch64",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.170.1.ppc64le",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.170.1.s390x",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.170.1.x86_64",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-zfcpdump-5.14.21-150400.24.170.2.s390x",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.170.2.ppc64le",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.170.2.s390x",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-5.14.21-150400.24.170.2.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-devel-5.14.21-150400.24.170.2.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-devel-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-devel-5.14.21-150400.24.170.1.noarch",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-docs-5.14.21-150400.24.170.1.noarch",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-macros-5.14.21-150400.24.170.1.noarch",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-obs-build-5.14.21-150400.24.170.2.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-obs-build-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-source-5.14.21-150400.24.170.1.noarch",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-syms-5.14.21-150400.24.170.1.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-syms-5.14.21-150400.24.170.1.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.170.2.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.170.2.x86_64",
          "SUSE Manager Proxy 4.3:kernel-default-5.14.21-150400.24.170.2.x86_64",
          "SUSE Manager Proxy 4.3:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
          "SUSE Manager Proxy 4.3:kernel-default-devel-5.14.21-150400.24.170.2.x86_64",
          "SUSE Manager Proxy 4.3:kernel-devel-5.14.21-150400.24.170.1.noarch",
          "SUSE Manager Proxy 4.3:kernel-macros-5.14.21-150400.24.170.1.noarch",
          "SUSE Manager Proxy 4.3:kernel-source-5.14.21-150400.24.170.1.noarch",
          "SUSE Manager Proxy 4.3:kernel-syms-5.14.21-150400.24.170.1.x86_64",
          "SUSE Manager Server 4.3:kernel-default-5.14.21-150400.24.170.2.ppc64le",
          "SUSE Manager Server 4.3:kernel-default-5.14.21-150400.24.170.2.s390x",
          "SUSE Manager Server 4.3:kernel-default-5.14.21-150400.24.170.2.x86_64",
          "SUSE Manager Server 4.3:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.ppc64le",
          "SUSE Manager Server 4.3:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
          "SUSE Manager Server 4.3:kernel-default-devel-5.14.21-150400.24.170.2.ppc64le",
          "SUSE Manager Server 4.3:kernel-default-devel-5.14.21-150400.24.170.2.s390x",
          "SUSE Manager Server 4.3:kernel-default-devel-5.14.21-150400.24.170.2.x86_64",
          "SUSE Manager Server 4.3:kernel-devel-5.14.21-150400.24.170.1.noarch",
          "SUSE Manager Server 4.3:kernel-macros-5.14.21-150400.24.170.1.noarch",
          "SUSE Manager Server 4.3:kernel-source-5.14.21-150400.24.170.1.noarch",
          "SUSE Manager Server 4.3:kernel-syms-5.14.21-150400.24.170.1.ppc64le",
          "SUSE Manager Server 4.3:kernel-syms-5.14.21-150400.24.170.1.s390x",
          "SUSE Manager Server 4.3:kernel-syms-5.14.21-150400.24.170.1.x86_64",
          "SUSE Manager Server 4.3:kernel-zfcpdump-5.14.21-150400.24.170.2.s390x"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2022-50132",
          "url": "https://www.suse.com/security/cve/CVE-2022-50132"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1244808 for CVE-2022-50132",
          "url": "https://bugzilla.suse.com/1244808"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-64kb-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-64kb-devel-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-devel-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-devel-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-devel-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-docs-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-macros-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-obs-build-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-obs-build-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-source-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-syms-5.14.21-150400.24.170.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-syms-5.14.21-150400.24.170.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:reiserfs-kmp-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:reiserfs-kmp-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-64kb-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-64kb-devel-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-devel-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-docs-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-macros-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-source-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.170.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.170.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_170-default-1-150400.9.3.2.ppc64le",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_170-default-1-150400.9.3.2.s390x",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_170-default-1-150400.9.3.2.x86_64",
            "SUSE Linux Enterprise Micro 5.3:kernel-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise Micro 5.3:kernel-default-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise Micro 5.3:kernel-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Micro 5.3:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.aarch64",
            "SUSE Linux Enterprise Micro 5.3:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
            "SUSE Linux Enterprise Micro 5.4:kernel-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise Micro 5.4:kernel-default-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise Micro 5.4:kernel-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Micro 5.4:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.aarch64",
            "SUSE Linux Enterprise Micro 5.4:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-64kb-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-64kb-devel-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.aarch64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.ppc64le",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-devel-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-docs-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-macros-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-source-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.170.1.aarch64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.170.1.ppc64le",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.170.1.s390x",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.170.1.x86_64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-zfcpdump-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-devel-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-devel-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-devel-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-docs-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-macros-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-obs-build-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-obs-build-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-source-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-syms-5.14.21-150400.24.170.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-syms-5.14.21-150400.24.170.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Manager Proxy 4.3:kernel-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Manager Proxy 4.3:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
            "SUSE Manager Proxy 4.3:kernel-default-devel-5.14.21-150400.24.170.2.x86_64",
            "SUSE Manager Proxy 4.3:kernel-devel-5.14.21-150400.24.170.1.noarch",
            "SUSE Manager Proxy 4.3:kernel-macros-5.14.21-150400.24.170.1.noarch",
            "SUSE Manager Proxy 4.3:kernel-source-5.14.21-150400.24.170.1.noarch",
            "SUSE Manager Proxy 4.3:kernel-syms-5.14.21-150400.24.170.1.x86_64",
            "SUSE Manager Server 4.3:kernel-default-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Manager Server 4.3:kernel-default-5.14.21-150400.24.170.2.s390x",
            "SUSE Manager Server 4.3:kernel-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Manager Server 4.3:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.ppc64le",
            "SUSE Manager Server 4.3:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
            "SUSE Manager Server 4.3:kernel-default-devel-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Manager Server 4.3:kernel-default-devel-5.14.21-150400.24.170.2.s390x",
            "SUSE Manager Server 4.3:kernel-default-devel-5.14.21-150400.24.170.2.x86_64",
            "SUSE Manager Server 4.3:kernel-devel-5.14.21-150400.24.170.1.noarch",
            "SUSE Manager Server 4.3:kernel-macros-5.14.21-150400.24.170.1.noarch",
            "SUSE Manager Server 4.3:kernel-source-5.14.21-150400.24.170.1.noarch",
            "SUSE Manager Server 4.3:kernel-syms-5.14.21-150400.24.170.1.ppc64le",
            "SUSE Manager Server 4.3:kernel-syms-5.14.21-150400.24.170.1.s390x",
            "SUSE Manager Server 4.3:kernel-syms-5.14.21-150400.24.170.1.x86_64",
            "SUSE Manager Server 4.3:kernel-zfcpdump-5.14.21-150400.24.170.2.s390x"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 5.5,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
            "version": "3.1"
          },
          "products": [
            "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-64kb-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-64kb-devel-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-devel-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-devel-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-devel-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-docs-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-macros-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-obs-build-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-obs-build-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-source-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-syms-5.14.21-150400.24.170.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-syms-5.14.21-150400.24.170.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:reiserfs-kmp-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:reiserfs-kmp-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-64kb-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-64kb-devel-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-devel-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-docs-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-macros-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-source-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.170.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.170.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_170-default-1-150400.9.3.2.ppc64le",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_170-default-1-150400.9.3.2.s390x",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_170-default-1-150400.9.3.2.x86_64",
            "SUSE Linux Enterprise Micro 5.3:kernel-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise Micro 5.3:kernel-default-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise Micro 5.3:kernel-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Micro 5.3:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.aarch64",
            "SUSE Linux Enterprise Micro 5.3:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
            "SUSE Linux Enterprise Micro 5.4:kernel-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise Micro 5.4:kernel-default-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise Micro 5.4:kernel-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Micro 5.4:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.aarch64",
            "SUSE Linux Enterprise Micro 5.4:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-64kb-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-64kb-devel-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.aarch64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.ppc64le",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-devel-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-docs-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-macros-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-source-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.170.1.aarch64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.170.1.ppc64le",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.170.1.s390x",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.170.1.x86_64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-zfcpdump-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-devel-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-devel-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-devel-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-docs-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-macros-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-obs-build-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-obs-build-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-source-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-syms-5.14.21-150400.24.170.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-syms-5.14.21-150400.24.170.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Manager Proxy 4.3:kernel-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Manager Proxy 4.3:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
            "SUSE Manager Proxy 4.3:kernel-default-devel-5.14.21-150400.24.170.2.x86_64",
            "SUSE Manager Proxy 4.3:kernel-devel-5.14.21-150400.24.170.1.noarch",
            "SUSE Manager Proxy 4.3:kernel-macros-5.14.21-150400.24.170.1.noarch",
            "SUSE Manager Proxy 4.3:kernel-source-5.14.21-150400.24.170.1.noarch",
            "SUSE Manager Proxy 4.3:kernel-syms-5.14.21-150400.24.170.1.x86_64",
            "SUSE Manager Server 4.3:kernel-default-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Manager Server 4.3:kernel-default-5.14.21-150400.24.170.2.s390x",
            "SUSE Manager Server 4.3:kernel-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Manager Server 4.3:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.ppc64le",
            "SUSE Manager Server 4.3:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
            "SUSE Manager Server 4.3:kernel-default-devel-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Manager Server 4.3:kernel-default-devel-5.14.21-150400.24.170.2.s390x",
            "SUSE Manager Server 4.3:kernel-default-devel-5.14.21-150400.24.170.2.x86_64",
            "SUSE Manager Server 4.3:kernel-devel-5.14.21-150400.24.170.1.noarch",
            "SUSE Manager Server 4.3:kernel-macros-5.14.21-150400.24.170.1.noarch",
            "SUSE Manager Server 4.3:kernel-source-5.14.21-150400.24.170.1.noarch",
            "SUSE Manager Server 4.3:kernel-syms-5.14.21-150400.24.170.1.ppc64le",
            "SUSE Manager Server 4.3:kernel-syms-5.14.21-150400.24.170.1.s390x",
            "SUSE Manager Server 4.3:kernel-syms-5.14.21-150400.24.170.1.x86_64",
            "SUSE Manager Server 4.3:kernel-zfcpdump-5.14.21-150400.24.170.2.s390x"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2025-07-28T15:09:33Z",
          "details": "moderate"
        }
      ],
      "title": "CVE-2022-50132"
    },
    {
      "cve": "CVE-2022-50134",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2022-50134"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "In the Linux kernel, the following vulnerability has been resolved:\n\nRDMA/hfi1: fix potential memory leak in setup_base_ctxt()\n\nsetup_base_ctxt() allocates a memory chunk for uctxt-\u003egroups with\nhfi1_alloc_ctxt_rcv_groups(). When init_user_ctxt() fails, uctxt-\u003egroups\nis not released, which will lead to a memory leak.\n\nWe should release the uctxt-\u003egroups with hfi1_free_ctxt_rcv_groups()\nwhen init_user_ctxt() fails.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.170.2.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.170.2.s390x",
          "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.170.2.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.170.2.s390x",
          "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.170.2.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.170.2.s390x",
          "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.170.2.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.170.2.s390x",
          "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-64kb-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-64kb-devel-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-devel-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-devel-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-devel-5.14.21-150400.24.170.1.noarch",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-docs-5.14.21-150400.24.170.1.noarch",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-macros-5.14.21-150400.24.170.1.noarch",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-obs-build-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-obs-build-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-source-5.14.21-150400.24.170.1.noarch",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-syms-5.14.21-150400.24.170.1.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-syms-5.14.21-150400.24.170.1.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:reiserfs-kmp-default-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:reiserfs-kmp-default-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-64kb-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-64kb-devel-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-devel-5.14.21-150400.24.170.1.noarch",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-docs-5.14.21-150400.24.170.1.noarch",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-macros-5.14.21-150400.24.170.1.noarch",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-source-5.14.21-150400.24.170.1.noarch",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.170.1.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.170.1.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.170.2.ppc64le",
          "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.170.2.s390x",
          "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.170.2.ppc64le",
          "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.170.2.s390x",
          "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_170-default-1-150400.9.3.2.ppc64le",
          "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_170-default-1-150400.9.3.2.s390x",
          "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_170-default-1-150400.9.3.2.x86_64",
          "SUSE Linux Enterprise Micro 5.3:kernel-default-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise Micro 5.3:kernel-default-5.14.21-150400.24.170.2.s390x",
          "SUSE Linux Enterprise Micro 5.3:kernel-default-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise Micro 5.3:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.aarch64",
          "SUSE Linux Enterprise Micro 5.3:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
          "SUSE Linux Enterprise Micro 5.4:kernel-default-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise Micro 5.4:kernel-default-5.14.21-150400.24.170.2.s390x",
          "SUSE Linux Enterprise Micro 5.4:kernel-default-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise Micro 5.4:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.aarch64",
          "SUSE Linux Enterprise Micro 5.4:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-64kb-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-64kb-devel-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-5.14.21-150400.24.170.2.ppc64le",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-5.14.21-150400.24.170.2.s390x",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.aarch64",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.ppc64le",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.170.2.ppc64le",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.170.2.s390x",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-devel-5.14.21-150400.24.170.1.noarch",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-docs-5.14.21-150400.24.170.1.noarch",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-macros-5.14.21-150400.24.170.1.noarch",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.170.2.ppc64le",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.170.2.s390x",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-source-5.14.21-150400.24.170.1.noarch",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.170.1.aarch64",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.170.1.ppc64le",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.170.1.s390x",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.170.1.x86_64",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-zfcpdump-5.14.21-150400.24.170.2.s390x",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.170.2.ppc64le",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.170.2.s390x",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-5.14.21-150400.24.170.2.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-devel-5.14.21-150400.24.170.2.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-devel-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-devel-5.14.21-150400.24.170.1.noarch",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-docs-5.14.21-150400.24.170.1.noarch",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-macros-5.14.21-150400.24.170.1.noarch",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-obs-build-5.14.21-150400.24.170.2.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-obs-build-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-source-5.14.21-150400.24.170.1.noarch",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-syms-5.14.21-150400.24.170.1.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-syms-5.14.21-150400.24.170.1.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.170.2.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.170.2.x86_64",
          "SUSE Manager Proxy 4.3:kernel-default-5.14.21-150400.24.170.2.x86_64",
          "SUSE Manager Proxy 4.3:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
          "SUSE Manager Proxy 4.3:kernel-default-devel-5.14.21-150400.24.170.2.x86_64",
          "SUSE Manager Proxy 4.3:kernel-devel-5.14.21-150400.24.170.1.noarch",
          "SUSE Manager Proxy 4.3:kernel-macros-5.14.21-150400.24.170.1.noarch",
          "SUSE Manager Proxy 4.3:kernel-source-5.14.21-150400.24.170.1.noarch",
          "SUSE Manager Proxy 4.3:kernel-syms-5.14.21-150400.24.170.1.x86_64",
          "SUSE Manager Server 4.3:kernel-default-5.14.21-150400.24.170.2.ppc64le",
          "SUSE Manager Server 4.3:kernel-default-5.14.21-150400.24.170.2.s390x",
          "SUSE Manager Server 4.3:kernel-default-5.14.21-150400.24.170.2.x86_64",
          "SUSE Manager Server 4.3:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.ppc64le",
          "SUSE Manager Server 4.3:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
          "SUSE Manager Server 4.3:kernel-default-devel-5.14.21-150400.24.170.2.ppc64le",
          "SUSE Manager Server 4.3:kernel-default-devel-5.14.21-150400.24.170.2.s390x",
          "SUSE Manager Server 4.3:kernel-default-devel-5.14.21-150400.24.170.2.x86_64",
          "SUSE Manager Server 4.3:kernel-devel-5.14.21-150400.24.170.1.noarch",
          "SUSE Manager Server 4.3:kernel-macros-5.14.21-150400.24.170.1.noarch",
          "SUSE Manager Server 4.3:kernel-source-5.14.21-150400.24.170.1.noarch",
          "SUSE Manager Server 4.3:kernel-syms-5.14.21-150400.24.170.1.ppc64le",
          "SUSE Manager Server 4.3:kernel-syms-5.14.21-150400.24.170.1.s390x",
          "SUSE Manager Server 4.3:kernel-syms-5.14.21-150400.24.170.1.x86_64",
          "SUSE Manager Server 4.3:kernel-zfcpdump-5.14.21-150400.24.170.2.s390x"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2022-50134",
          "url": "https://www.suse.com/security/cve/CVE-2022-50134"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1244802 for CVE-2022-50134",
          "url": "https://bugzilla.suse.com/1244802"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-64kb-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-64kb-devel-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-devel-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-devel-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-devel-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-docs-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-macros-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-obs-build-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-obs-build-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-source-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-syms-5.14.21-150400.24.170.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-syms-5.14.21-150400.24.170.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:reiserfs-kmp-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:reiserfs-kmp-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-64kb-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-64kb-devel-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-devel-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-docs-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-macros-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-source-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.170.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.170.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_170-default-1-150400.9.3.2.ppc64le",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_170-default-1-150400.9.3.2.s390x",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_170-default-1-150400.9.3.2.x86_64",
            "SUSE Linux Enterprise Micro 5.3:kernel-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise Micro 5.3:kernel-default-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise Micro 5.3:kernel-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Micro 5.3:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.aarch64",
            "SUSE Linux Enterprise Micro 5.3:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
            "SUSE Linux Enterprise Micro 5.4:kernel-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise Micro 5.4:kernel-default-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise Micro 5.4:kernel-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Micro 5.4:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.aarch64",
            "SUSE Linux Enterprise Micro 5.4:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-64kb-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-64kb-devel-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.aarch64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.ppc64le",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-devel-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-docs-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-macros-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-source-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.170.1.aarch64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.170.1.ppc64le",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.170.1.s390x",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.170.1.x86_64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-zfcpdump-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-devel-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-devel-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-devel-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-docs-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-macros-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-obs-build-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-obs-build-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-source-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-syms-5.14.21-150400.24.170.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-syms-5.14.21-150400.24.170.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Manager Proxy 4.3:kernel-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Manager Proxy 4.3:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
            "SUSE Manager Proxy 4.3:kernel-default-devel-5.14.21-150400.24.170.2.x86_64",
            "SUSE Manager Proxy 4.3:kernel-devel-5.14.21-150400.24.170.1.noarch",
            "SUSE Manager Proxy 4.3:kernel-macros-5.14.21-150400.24.170.1.noarch",
            "SUSE Manager Proxy 4.3:kernel-source-5.14.21-150400.24.170.1.noarch",
            "SUSE Manager Proxy 4.3:kernel-syms-5.14.21-150400.24.170.1.x86_64",
            "SUSE Manager Server 4.3:kernel-default-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Manager Server 4.3:kernel-default-5.14.21-150400.24.170.2.s390x",
            "SUSE Manager Server 4.3:kernel-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Manager Server 4.3:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.ppc64le",
            "SUSE Manager Server 4.3:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
            "SUSE Manager Server 4.3:kernel-default-devel-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Manager Server 4.3:kernel-default-devel-5.14.21-150400.24.170.2.s390x",
            "SUSE Manager Server 4.3:kernel-default-devel-5.14.21-150400.24.170.2.x86_64",
            "SUSE Manager Server 4.3:kernel-devel-5.14.21-150400.24.170.1.noarch",
            "SUSE Manager Server 4.3:kernel-macros-5.14.21-150400.24.170.1.noarch",
            "SUSE Manager Server 4.3:kernel-source-5.14.21-150400.24.170.1.noarch",
            "SUSE Manager Server 4.3:kernel-syms-5.14.21-150400.24.170.1.ppc64le",
            "SUSE Manager Server 4.3:kernel-syms-5.14.21-150400.24.170.1.s390x",
            "SUSE Manager Server 4.3:kernel-syms-5.14.21-150400.24.170.1.x86_64",
            "SUSE Manager Server 4.3:kernel-zfcpdump-5.14.21-150400.24.170.2.s390x"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 5.5,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
            "version": "3.1"
          },
          "products": [
            "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-64kb-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-64kb-devel-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-devel-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-devel-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-devel-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-docs-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-macros-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-obs-build-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-obs-build-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-source-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-syms-5.14.21-150400.24.170.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-syms-5.14.21-150400.24.170.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:reiserfs-kmp-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:reiserfs-kmp-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-64kb-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-64kb-devel-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-devel-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-docs-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-macros-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-source-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.170.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.170.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_170-default-1-150400.9.3.2.ppc64le",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_170-default-1-150400.9.3.2.s390x",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_170-default-1-150400.9.3.2.x86_64",
            "SUSE Linux Enterprise Micro 5.3:kernel-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise Micro 5.3:kernel-default-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise Micro 5.3:kernel-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Micro 5.3:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.aarch64",
            "SUSE Linux Enterprise Micro 5.3:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
            "SUSE Linux Enterprise Micro 5.4:kernel-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise Micro 5.4:kernel-default-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise Micro 5.4:kernel-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Micro 5.4:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.aarch64",
            "SUSE Linux Enterprise Micro 5.4:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-64kb-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-64kb-devel-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.aarch64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.ppc64le",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-devel-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-docs-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-macros-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-source-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.170.1.aarch64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.170.1.ppc64le",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.170.1.s390x",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.170.1.x86_64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-zfcpdump-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-devel-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-devel-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-devel-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-docs-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-macros-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-obs-build-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-obs-build-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-source-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-syms-5.14.21-150400.24.170.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-syms-5.14.21-150400.24.170.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Manager Proxy 4.3:kernel-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Manager Proxy 4.3:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
            "SUSE Manager Proxy 4.3:kernel-default-devel-5.14.21-150400.24.170.2.x86_64",
            "SUSE Manager Proxy 4.3:kernel-devel-5.14.21-150400.24.170.1.noarch",
            "SUSE Manager Proxy 4.3:kernel-macros-5.14.21-150400.24.170.1.noarch",
            "SUSE Manager Proxy 4.3:kernel-source-5.14.21-150400.24.170.1.noarch",
            "SUSE Manager Proxy 4.3:kernel-syms-5.14.21-150400.24.170.1.x86_64",
            "SUSE Manager Server 4.3:kernel-default-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Manager Server 4.3:kernel-default-5.14.21-150400.24.170.2.s390x",
            "SUSE Manager Server 4.3:kernel-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Manager Server 4.3:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.ppc64le",
            "SUSE Manager Server 4.3:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
            "SUSE Manager Server 4.3:kernel-default-devel-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Manager Server 4.3:kernel-default-devel-5.14.21-150400.24.170.2.s390x",
            "SUSE Manager Server 4.3:kernel-default-devel-5.14.21-150400.24.170.2.x86_64",
            "SUSE Manager Server 4.3:kernel-devel-5.14.21-150400.24.170.1.noarch",
            "SUSE Manager Server 4.3:kernel-macros-5.14.21-150400.24.170.1.noarch",
            "SUSE Manager Server 4.3:kernel-source-5.14.21-150400.24.170.1.noarch",
            "SUSE Manager Server 4.3:kernel-syms-5.14.21-150400.24.170.1.ppc64le",
            "SUSE Manager Server 4.3:kernel-syms-5.14.21-150400.24.170.1.s390x",
            "SUSE Manager Server 4.3:kernel-syms-5.14.21-150400.24.170.1.x86_64",
            "SUSE Manager Server 4.3:kernel-zfcpdump-5.14.21-150400.24.170.2.s390x"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2025-07-28T15:09:33Z",
          "details": "moderate"
        }
      ],
      "title": "CVE-2022-50134"
    },
    {
      "cve": "CVE-2022-50136",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2022-50136"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "In the Linux kernel, the following vulnerability has been resolved:\n\nRDMA/siw: Fix duplicated reported IW_CM_EVENT_CONNECT_REPLY event\n\nIf siw_recv_mpa_rr returns -EAGAIN, it means that the MPA reply hasn\u0027t\nbeen received completely, and should not report IW_CM_EVENT_CONNECT_REPLY\nin this case. This may trigger a call trace in iw_cm. A simple way to\ntrigger this:\n server: ib_send_lat\n client: ib_send_lat -R \u003cserver_ip\u003e\n\nThe call trace looks like this:\n\n kernel BUG at drivers/infiniband/core/iwcm.c:894!\n invalid opcode: 0000 [#1] PREEMPT SMP NOPTI\n \u003c...\u003e\n Workqueue: iw_cm_wq cm_work_handler [iw_cm]\n Call Trace:\n  \u003cTASK\u003e\n  cm_work_handler+0x1dd/0x370 [iw_cm]\n  process_one_work+0x1e2/0x3b0\n  worker_thread+0x49/0x2e0\n  ? rescuer_thread+0x370/0x370\n  kthread+0xe5/0x110\n  ? kthread_complete_and_exit+0x20/0x20\n  ret_from_fork+0x1f/0x30\n  \u003c/TASK\u003e",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.170.2.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.170.2.s390x",
          "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.170.2.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.170.2.s390x",
          "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.170.2.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.170.2.s390x",
          "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.170.2.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.170.2.s390x",
          "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-64kb-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-64kb-devel-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-devel-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-devel-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-devel-5.14.21-150400.24.170.1.noarch",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-docs-5.14.21-150400.24.170.1.noarch",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-macros-5.14.21-150400.24.170.1.noarch",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-obs-build-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-obs-build-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-source-5.14.21-150400.24.170.1.noarch",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-syms-5.14.21-150400.24.170.1.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-syms-5.14.21-150400.24.170.1.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:reiserfs-kmp-default-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:reiserfs-kmp-default-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-64kb-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-64kb-devel-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-devel-5.14.21-150400.24.170.1.noarch",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-docs-5.14.21-150400.24.170.1.noarch",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-macros-5.14.21-150400.24.170.1.noarch",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-source-5.14.21-150400.24.170.1.noarch",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.170.1.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.170.1.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.170.2.ppc64le",
          "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.170.2.s390x",
          "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.170.2.ppc64le",
          "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.170.2.s390x",
          "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_170-default-1-150400.9.3.2.ppc64le",
          "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_170-default-1-150400.9.3.2.s390x",
          "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_170-default-1-150400.9.3.2.x86_64",
          "SUSE Linux Enterprise Micro 5.3:kernel-default-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise Micro 5.3:kernel-default-5.14.21-150400.24.170.2.s390x",
          "SUSE Linux Enterprise Micro 5.3:kernel-default-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise Micro 5.3:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.aarch64",
          "SUSE Linux Enterprise Micro 5.3:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
          "SUSE Linux Enterprise Micro 5.4:kernel-default-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise Micro 5.4:kernel-default-5.14.21-150400.24.170.2.s390x",
          "SUSE Linux Enterprise Micro 5.4:kernel-default-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise Micro 5.4:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.aarch64",
          "SUSE Linux Enterprise Micro 5.4:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-64kb-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-64kb-devel-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-5.14.21-150400.24.170.2.ppc64le",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-5.14.21-150400.24.170.2.s390x",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.aarch64",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.ppc64le",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.170.2.ppc64le",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.170.2.s390x",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-devel-5.14.21-150400.24.170.1.noarch",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-docs-5.14.21-150400.24.170.1.noarch",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-macros-5.14.21-150400.24.170.1.noarch",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.170.2.ppc64le",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.170.2.s390x",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-source-5.14.21-150400.24.170.1.noarch",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.170.1.aarch64",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.170.1.ppc64le",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.170.1.s390x",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.170.1.x86_64",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-zfcpdump-5.14.21-150400.24.170.2.s390x",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.170.2.ppc64le",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.170.2.s390x",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-5.14.21-150400.24.170.2.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-devel-5.14.21-150400.24.170.2.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-devel-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-devel-5.14.21-150400.24.170.1.noarch",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-docs-5.14.21-150400.24.170.1.noarch",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-macros-5.14.21-150400.24.170.1.noarch",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-obs-build-5.14.21-150400.24.170.2.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-obs-build-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-source-5.14.21-150400.24.170.1.noarch",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-syms-5.14.21-150400.24.170.1.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-syms-5.14.21-150400.24.170.1.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.170.2.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.170.2.x86_64",
          "SUSE Manager Proxy 4.3:kernel-default-5.14.21-150400.24.170.2.x86_64",
          "SUSE Manager Proxy 4.3:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
          "SUSE Manager Proxy 4.3:kernel-default-devel-5.14.21-150400.24.170.2.x86_64",
          "SUSE Manager Proxy 4.3:kernel-devel-5.14.21-150400.24.170.1.noarch",
          "SUSE Manager Proxy 4.3:kernel-macros-5.14.21-150400.24.170.1.noarch",
          "SUSE Manager Proxy 4.3:kernel-source-5.14.21-150400.24.170.1.noarch",
          "SUSE Manager Proxy 4.3:kernel-syms-5.14.21-150400.24.170.1.x86_64",
          "SUSE Manager Server 4.3:kernel-default-5.14.21-150400.24.170.2.ppc64le",
          "SUSE Manager Server 4.3:kernel-default-5.14.21-150400.24.170.2.s390x",
          "SUSE Manager Server 4.3:kernel-default-5.14.21-150400.24.170.2.x86_64",
          "SUSE Manager Server 4.3:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.ppc64le",
          "SUSE Manager Server 4.3:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
          "SUSE Manager Server 4.3:kernel-default-devel-5.14.21-150400.24.170.2.ppc64le",
          "SUSE Manager Server 4.3:kernel-default-devel-5.14.21-150400.24.170.2.s390x",
          "SUSE Manager Server 4.3:kernel-default-devel-5.14.21-150400.24.170.2.x86_64",
          "SUSE Manager Server 4.3:kernel-devel-5.14.21-150400.24.170.1.noarch",
          "SUSE Manager Server 4.3:kernel-macros-5.14.21-150400.24.170.1.noarch",
          "SUSE Manager Server 4.3:kernel-source-5.14.21-150400.24.170.1.noarch",
          "SUSE Manager Server 4.3:kernel-syms-5.14.21-150400.24.170.1.ppc64le",
          "SUSE Manager Server 4.3:kernel-syms-5.14.21-150400.24.170.1.s390x",
          "SUSE Manager Server 4.3:kernel-syms-5.14.21-150400.24.170.1.x86_64",
          "SUSE Manager Server 4.3:kernel-zfcpdump-5.14.21-150400.24.170.2.s390x"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2022-50136",
          "url": "https://www.suse.com/security/cve/CVE-2022-50136"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1244804 for CVE-2022-50136",
          "url": "https://bugzilla.suse.com/1244804"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-64kb-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-64kb-devel-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-devel-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-devel-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-devel-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-docs-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-macros-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-obs-build-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-obs-build-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-source-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-syms-5.14.21-150400.24.170.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-syms-5.14.21-150400.24.170.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:reiserfs-kmp-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:reiserfs-kmp-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-64kb-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-64kb-devel-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-devel-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-docs-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-macros-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-source-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.170.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.170.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_170-default-1-150400.9.3.2.ppc64le",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_170-default-1-150400.9.3.2.s390x",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_170-default-1-150400.9.3.2.x86_64",
            "SUSE Linux Enterprise Micro 5.3:kernel-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise Micro 5.3:kernel-default-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise Micro 5.3:kernel-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Micro 5.3:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.aarch64",
            "SUSE Linux Enterprise Micro 5.3:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
            "SUSE Linux Enterprise Micro 5.4:kernel-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise Micro 5.4:kernel-default-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise Micro 5.4:kernel-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Micro 5.4:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.aarch64",
            "SUSE Linux Enterprise Micro 5.4:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-64kb-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-64kb-devel-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.aarch64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.ppc64le",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-devel-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-docs-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-macros-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-source-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.170.1.aarch64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.170.1.ppc64le",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.170.1.s390x",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.170.1.x86_64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-zfcpdump-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-devel-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-devel-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-devel-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-docs-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-macros-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-obs-build-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-obs-build-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-source-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-syms-5.14.21-150400.24.170.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-syms-5.14.21-150400.24.170.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Manager Proxy 4.3:kernel-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Manager Proxy 4.3:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
            "SUSE Manager Proxy 4.3:kernel-default-devel-5.14.21-150400.24.170.2.x86_64",
            "SUSE Manager Proxy 4.3:kernel-devel-5.14.21-150400.24.170.1.noarch",
            "SUSE Manager Proxy 4.3:kernel-macros-5.14.21-150400.24.170.1.noarch",
            "SUSE Manager Proxy 4.3:kernel-source-5.14.21-150400.24.170.1.noarch",
            "SUSE Manager Proxy 4.3:kernel-syms-5.14.21-150400.24.170.1.x86_64",
            "SUSE Manager Server 4.3:kernel-default-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Manager Server 4.3:kernel-default-5.14.21-150400.24.170.2.s390x",
            "SUSE Manager Server 4.3:kernel-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Manager Server 4.3:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.ppc64le",
            "SUSE Manager Server 4.3:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
            "SUSE Manager Server 4.3:kernel-default-devel-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Manager Server 4.3:kernel-default-devel-5.14.21-150400.24.170.2.s390x",
            "SUSE Manager Server 4.3:kernel-default-devel-5.14.21-150400.24.170.2.x86_64",
            "SUSE Manager Server 4.3:kernel-devel-5.14.21-150400.24.170.1.noarch",
            "SUSE Manager Server 4.3:kernel-macros-5.14.21-150400.24.170.1.noarch",
            "SUSE Manager Server 4.3:kernel-source-5.14.21-150400.24.170.1.noarch",
            "SUSE Manager Server 4.3:kernel-syms-5.14.21-150400.24.170.1.ppc64le",
            "SUSE Manager Server 4.3:kernel-syms-5.14.21-150400.24.170.1.s390x",
            "SUSE Manager Server 4.3:kernel-syms-5.14.21-150400.24.170.1.x86_64",
            "SUSE Manager Server 4.3:kernel-zfcpdump-5.14.21-150400.24.170.2.s390x"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 5.5,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
            "version": "3.1"
          },
          "products": [
            "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-64kb-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-64kb-devel-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-devel-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-devel-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-devel-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-docs-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-macros-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-obs-build-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-obs-build-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-source-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-syms-5.14.21-150400.24.170.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-syms-5.14.21-150400.24.170.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:reiserfs-kmp-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:reiserfs-kmp-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-64kb-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-64kb-devel-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-devel-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-docs-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-macros-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-source-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.170.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.170.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_170-default-1-150400.9.3.2.ppc64le",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_170-default-1-150400.9.3.2.s390x",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_170-default-1-150400.9.3.2.x86_64",
            "SUSE Linux Enterprise Micro 5.3:kernel-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise Micro 5.3:kernel-default-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise Micro 5.3:kernel-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Micro 5.3:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.aarch64",
            "SUSE Linux Enterprise Micro 5.3:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
            "SUSE Linux Enterprise Micro 5.4:kernel-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise Micro 5.4:kernel-default-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise Micro 5.4:kernel-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Micro 5.4:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.aarch64",
            "SUSE Linux Enterprise Micro 5.4:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-64kb-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-64kb-devel-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.aarch64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.ppc64le",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-devel-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-docs-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-macros-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-source-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.170.1.aarch64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.170.1.ppc64le",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.170.1.s390x",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.170.1.x86_64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-zfcpdump-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-devel-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-devel-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-devel-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-docs-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-macros-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-obs-build-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-obs-build-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-source-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-syms-5.14.21-150400.24.170.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-syms-5.14.21-150400.24.170.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Manager Proxy 4.3:kernel-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Manager Proxy 4.3:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
            "SUSE Manager Proxy 4.3:kernel-default-devel-5.14.21-150400.24.170.2.x86_64",
            "SUSE Manager Proxy 4.3:kernel-devel-5.14.21-150400.24.170.1.noarch",
            "SUSE Manager Proxy 4.3:kernel-macros-5.14.21-150400.24.170.1.noarch",
            "SUSE Manager Proxy 4.3:kernel-source-5.14.21-150400.24.170.1.noarch",
            "SUSE Manager Proxy 4.3:kernel-syms-5.14.21-150400.24.170.1.x86_64",
            "SUSE Manager Server 4.3:kernel-default-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Manager Server 4.3:kernel-default-5.14.21-150400.24.170.2.s390x",
            "SUSE Manager Server 4.3:kernel-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Manager Server 4.3:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.ppc64le",
            "SUSE Manager Server 4.3:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
            "SUSE Manager Server 4.3:kernel-default-devel-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Manager Server 4.3:kernel-default-devel-5.14.21-150400.24.170.2.s390x",
            "SUSE Manager Server 4.3:kernel-default-devel-5.14.21-150400.24.170.2.x86_64",
            "SUSE Manager Server 4.3:kernel-devel-5.14.21-150400.24.170.1.noarch",
            "SUSE Manager Server 4.3:kernel-macros-5.14.21-150400.24.170.1.noarch",
            "SUSE Manager Server 4.3:kernel-source-5.14.21-150400.24.170.1.noarch",
            "SUSE Manager Server 4.3:kernel-syms-5.14.21-150400.24.170.1.ppc64le",
            "SUSE Manager Server 4.3:kernel-syms-5.14.21-150400.24.170.1.s390x",
            "SUSE Manager Server 4.3:kernel-syms-5.14.21-150400.24.170.1.x86_64",
            "SUSE Manager Server 4.3:kernel-zfcpdump-5.14.21-150400.24.170.2.s390x"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2025-07-28T15:09:33Z",
          "details": "moderate"
        }
      ],
      "title": "CVE-2022-50136"
    },
    {
      "cve": "CVE-2022-50137",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2022-50137"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "In the Linux kernel, the following vulnerability has been resolved:\n\nRDMA/irdma: Fix a window for use-after-free\n\nDuring a destroy CQ an interrupt may cause processing of a CQE after CQ\nresources are freed by irdma_cq_free_rsrc(). Fix this by moving the call\nto irdma_cq_free_rsrc() after the irdma_sc_cleanup_ceqes(), which is\ncalled under the cq_lock.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.170.2.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.170.2.s390x",
          "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.170.2.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.170.2.s390x",
          "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.170.2.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.170.2.s390x",
          "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.170.2.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.170.2.s390x",
          "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-64kb-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-64kb-devel-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-devel-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-devel-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-devel-5.14.21-150400.24.170.1.noarch",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-docs-5.14.21-150400.24.170.1.noarch",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-macros-5.14.21-150400.24.170.1.noarch",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-obs-build-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-obs-build-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-source-5.14.21-150400.24.170.1.noarch",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-syms-5.14.21-150400.24.170.1.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-syms-5.14.21-150400.24.170.1.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:reiserfs-kmp-default-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:reiserfs-kmp-default-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-64kb-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-64kb-devel-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-devel-5.14.21-150400.24.170.1.noarch",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-docs-5.14.21-150400.24.170.1.noarch",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-macros-5.14.21-150400.24.170.1.noarch",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-source-5.14.21-150400.24.170.1.noarch",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.170.1.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.170.1.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.170.2.ppc64le",
          "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.170.2.s390x",
          "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.170.2.ppc64le",
          "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.170.2.s390x",
          "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_170-default-1-150400.9.3.2.ppc64le",
          "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_170-default-1-150400.9.3.2.s390x",
          "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_170-default-1-150400.9.3.2.x86_64",
          "SUSE Linux Enterprise Micro 5.3:kernel-default-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise Micro 5.3:kernel-default-5.14.21-150400.24.170.2.s390x",
          "SUSE Linux Enterprise Micro 5.3:kernel-default-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise Micro 5.3:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.aarch64",
          "SUSE Linux Enterprise Micro 5.3:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
          "SUSE Linux Enterprise Micro 5.4:kernel-default-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise Micro 5.4:kernel-default-5.14.21-150400.24.170.2.s390x",
          "SUSE Linux Enterprise Micro 5.4:kernel-default-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise Micro 5.4:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.aarch64",
          "SUSE Linux Enterprise Micro 5.4:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-64kb-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-64kb-devel-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-5.14.21-150400.24.170.2.ppc64le",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-5.14.21-150400.24.170.2.s390x",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.aarch64",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.ppc64le",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.170.2.ppc64le",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.170.2.s390x",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-devel-5.14.21-150400.24.170.1.noarch",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-docs-5.14.21-150400.24.170.1.noarch",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-macros-5.14.21-150400.24.170.1.noarch",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.170.2.ppc64le",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.170.2.s390x",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-source-5.14.21-150400.24.170.1.noarch",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.170.1.aarch64",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.170.1.ppc64le",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.170.1.s390x",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.170.1.x86_64",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-zfcpdump-5.14.21-150400.24.170.2.s390x",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.170.2.ppc64le",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.170.2.s390x",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-5.14.21-150400.24.170.2.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-devel-5.14.21-150400.24.170.2.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-devel-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-devel-5.14.21-150400.24.170.1.noarch",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-docs-5.14.21-150400.24.170.1.noarch",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-macros-5.14.21-150400.24.170.1.noarch",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-obs-build-5.14.21-150400.24.170.2.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-obs-build-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-source-5.14.21-150400.24.170.1.noarch",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-syms-5.14.21-150400.24.170.1.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-syms-5.14.21-150400.24.170.1.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.170.2.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.170.2.x86_64",
          "SUSE Manager Proxy 4.3:kernel-default-5.14.21-150400.24.170.2.x86_64",
          "SUSE Manager Proxy 4.3:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
          "SUSE Manager Proxy 4.3:kernel-default-devel-5.14.21-150400.24.170.2.x86_64",
          "SUSE Manager Proxy 4.3:kernel-devel-5.14.21-150400.24.170.1.noarch",
          "SUSE Manager Proxy 4.3:kernel-macros-5.14.21-150400.24.170.1.noarch",
          "SUSE Manager Proxy 4.3:kernel-source-5.14.21-150400.24.170.1.noarch",
          "SUSE Manager Proxy 4.3:kernel-syms-5.14.21-150400.24.170.1.x86_64",
          "SUSE Manager Server 4.3:kernel-default-5.14.21-150400.24.170.2.ppc64le",
          "SUSE Manager Server 4.3:kernel-default-5.14.21-150400.24.170.2.s390x",
          "SUSE Manager Server 4.3:kernel-default-5.14.21-150400.24.170.2.x86_64",
          "SUSE Manager Server 4.3:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.ppc64le",
          "SUSE Manager Server 4.3:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
          "SUSE Manager Server 4.3:kernel-default-devel-5.14.21-150400.24.170.2.ppc64le",
          "SUSE Manager Server 4.3:kernel-default-devel-5.14.21-150400.24.170.2.s390x",
          "SUSE Manager Server 4.3:kernel-default-devel-5.14.21-150400.24.170.2.x86_64",
          "SUSE Manager Server 4.3:kernel-devel-5.14.21-150400.24.170.1.noarch",
          "SUSE Manager Server 4.3:kernel-macros-5.14.21-150400.24.170.1.noarch",
          "SUSE Manager Server 4.3:kernel-source-5.14.21-150400.24.170.1.noarch",
          "SUSE Manager Server 4.3:kernel-syms-5.14.21-150400.24.170.1.ppc64le",
          "SUSE Manager Server 4.3:kernel-syms-5.14.21-150400.24.170.1.s390x",
          "SUSE Manager Server 4.3:kernel-syms-5.14.21-150400.24.170.1.x86_64",
          "SUSE Manager Server 4.3:kernel-zfcpdump-5.14.21-150400.24.170.2.s390x"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2022-50137",
          "url": "https://www.suse.com/security/cve/CVE-2022-50137"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1244800 for CVE-2022-50137",
          "url": "https://bugzilla.suse.com/1244800"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-64kb-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-64kb-devel-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-devel-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-devel-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-devel-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-docs-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-macros-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-obs-build-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-obs-build-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-source-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-syms-5.14.21-150400.24.170.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-syms-5.14.21-150400.24.170.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:reiserfs-kmp-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:reiserfs-kmp-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-64kb-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-64kb-devel-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-devel-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-docs-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-macros-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-source-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.170.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.170.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_170-default-1-150400.9.3.2.ppc64le",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_170-default-1-150400.9.3.2.s390x",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_170-default-1-150400.9.3.2.x86_64",
            "SUSE Linux Enterprise Micro 5.3:kernel-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise Micro 5.3:kernel-default-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise Micro 5.3:kernel-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Micro 5.3:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.aarch64",
            "SUSE Linux Enterprise Micro 5.3:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
            "SUSE Linux Enterprise Micro 5.4:kernel-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise Micro 5.4:kernel-default-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise Micro 5.4:kernel-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Micro 5.4:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.aarch64",
            "SUSE Linux Enterprise Micro 5.4:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-64kb-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-64kb-devel-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.aarch64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.ppc64le",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-devel-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-docs-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-macros-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-source-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.170.1.aarch64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.170.1.ppc64le",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.170.1.s390x",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.170.1.x86_64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-zfcpdump-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-devel-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-devel-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-devel-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-docs-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-macros-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-obs-build-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-obs-build-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-source-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-syms-5.14.21-150400.24.170.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-syms-5.14.21-150400.24.170.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Manager Proxy 4.3:kernel-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Manager Proxy 4.3:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
            "SUSE Manager Proxy 4.3:kernel-default-devel-5.14.21-150400.24.170.2.x86_64",
            "SUSE Manager Proxy 4.3:kernel-devel-5.14.21-150400.24.170.1.noarch",
            "SUSE Manager Proxy 4.3:kernel-macros-5.14.21-150400.24.170.1.noarch",
            "SUSE Manager Proxy 4.3:kernel-source-5.14.21-150400.24.170.1.noarch",
            "SUSE Manager Proxy 4.3:kernel-syms-5.14.21-150400.24.170.1.x86_64",
            "SUSE Manager Server 4.3:kernel-default-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Manager Server 4.3:kernel-default-5.14.21-150400.24.170.2.s390x",
            "SUSE Manager Server 4.3:kernel-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Manager Server 4.3:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.ppc64le",
            "SUSE Manager Server 4.3:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
            "SUSE Manager Server 4.3:kernel-default-devel-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Manager Server 4.3:kernel-default-devel-5.14.21-150400.24.170.2.s390x",
            "SUSE Manager Server 4.3:kernel-default-devel-5.14.21-150400.24.170.2.x86_64",
            "SUSE Manager Server 4.3:kernel-devel-5.14.21-150400.24.170.1.noarch",
            "SUSE Manager Server 4.3:kernel-macros-5.14.21-150400.24.170.1.noarch",
            "SUSE Manager Server 4.3:kernel-source-5.14.21-150400.24.170.1.noarch",
            "SUSE Manager Server 4.3:kernel-syms-5.14.21-150400.24.170.1.ppc64le",
            "SUSE Manager Server 4.3:kernel-syms-5.14.21-150400.24.170.1.s390x",
            "SUSE Manager Server 4.3:kernel-syms-5.14.21-150400.24.170.1.x86_64",
            "SUSE Manager Server 4.3:kernel-zfcpdump-5.14.21-150400.24.170.2.s390x"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 5.5,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
            "version": "3.1"
          },
          "products": [
            "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-64kb-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-64kb-devel-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-devel-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-devel-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-devel-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-docs-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-macros-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-obs-build-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-obs-build-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-source-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-syms-5.14.21-150400.24.170.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-syms-5.14.21-150400.24.170.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:reiserfs-kmp-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:reiserfs-kmp-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-64kb-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-64kb-devel-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-devel-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-docs-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-macros-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-source-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.170.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.170.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_170-default-1-150400.9.3.2.ppc64le",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_170-default-1-150400.9.3.2.s390x",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_170-default-1-150400.9.3.2.x86_64",
            "SUSE Linux Enterprise Micro 5.3:kernel-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise Micro 5.3:kernel-default-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise Micro 5.3:kernel-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Micro 5.3:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.aarch64",
            "SUSE Linux Enterprise Micro 5.3:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
            "SUSE Linux Enterprise Micro 5.4:kernel-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise Micro 5.4:kernel-default-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise Micro 5.4:kernel-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Micro 5.4:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.aarch64",
            "SUSE Linux Enterprise Micro 5.4:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-64kb-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-64kb-devel-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.aarch64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.ppc64le",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-devel-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-docs-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-macros-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-source-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.170.1.aarch64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.170.1.ppc64le",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.170.1.s390x",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.170.1.x86_64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-zfcpdump-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-devel-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-devel-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-devel-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-docs-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-macros-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-obs-build-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-obs-build-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-source-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-syms-5.14.21-150400.24.170.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-syms-5.14.21-150400.24.170.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Manager Proxy 4.3:kernel-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Manager Proxy 4.3:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
            "SUSE Manager Proxy 4.3:kernel-default-devel-5.14.21-150400.24.170.2.x86_64",
            "SUSE Manager Proxy 4.3:kernel-devel-5.14.21-150400.24.170.1.noarch",
            "SUSE Manager Proxy 4.3:kernel-macros-5.14.21-150400.24.170.1.noarch",
            "SUSE Manager Proxy 4.3:kernel-source-5.14.21-150400.24.170.1.noarch",
            "SUSE Manager Proxy 4.3:kernel-syms-5.14.21-150400.24.170.1.x86_64",
            "SUSE Manager Server 4.3:kernel-default-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Manager Server 4.3:kernel-default-5.14.21-150400.24.170.2.s390x",
            "SUSE Manager Server 4.3:kernel-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Manager Server 4.3:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.ppc64le",
            "SUSE Manager Server 4.3:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
            "SUSE Manager Server 4.3:kernel-default-devel-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Manager Server 4.3:kernel-default-devel-5.14.21-150400.24.170.2.s390x",
            "SUSE Manager Server 4.3:kernel-default-devel-5.14.21-150400.24.170.2.x86_64",
            "SUSE Manager Server 4.3:kernel-devel-5.14.21-150400.24.170.1.noarch",
            "SUSE Manager Server 4.3:kernel-macros-5.14.21-150400.24.170.1.noarch",
            "SUSE Manager Server 4.3:kernel-source-5.14.21-150400.24.170.1.noarch",
            "SUSE Manager Server 4.3:kernel-syms-5.14.21-150400.24.170.1.ppc64le",
            "SUSE Manager Server 4.3:kernel-syms-5.14.21-150400.24.170.1.s390x",
            "SUSE Manager Server 4.3:kernel-syms-5.14.21-150400.24.170.1.x86_64",
            "SUSE Manager Server 4.3:kernel-zfcpdump-5.14.21-150400.24.170.2.s390x"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2025-07-28T15:09:33Z",
          "details": "moderate"
        }
      ],
      "title": "CVE-2022-50137"
    },
    {
      "cve": "CVE-2022-50138",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2022-50138"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "In the Linux kernel, the following vulnerability has been resolved:\n\nRDMA/qedr: Fix potential memory leak in __qedr_alloc_mr()\n\n__qedr_alloc_mr() allocates a memory chunk for \"mr-\u003einfo.pbl_table\" with\ninit_mr_info(). When rdma_alloc_tid() and rdma_register_tid() fail, \"mr\"\nis released while \"mr-\u003einfo.pbl_table\" is not released, which will lead\nto a memory leak.\n\nWe should release the \"mr-\u003einfo.pbl_table\" with qedr_free_pbl() when error\noccurs to fix the memory leak.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.170.2.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.170.2.s390x",
          "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.170.2.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.170.2.s390x",
          "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.170.2.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.170.2.s390x",
          "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.170.2.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.170.2.s390x",
          "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-64kb-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-64kb-devel-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-devel-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-devel-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-devel-5.14.21-150400.24.170.1.noarch",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-docs-5.14.21-150400.24.170.1.noarch",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-macros-5.14.21-150400.24.170.1.noarch",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-obs-build-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-obs-build-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-source-5.14.21-150400.24.170.1.noarch",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-syms-5.14.21-150400.24.170.1.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-syms-5.14.21-150400.24.170.1.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:reiserfs-kmp-default-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:reiserfs-kmp-default-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-64kb-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-64kb-devel-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-devel-5.14.21-150400.24.170.1.noarch",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-docs-5.14.21-150400.24.170.1.noarch",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-macros-5.14.21-150400.24.170.1.noarch",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-source-5.14.21-150400.24.170.1.noarch",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.170.1.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.170.1.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.170.2.ppc64le",
          "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.170.2.s390x",
          "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.170.2.ppc64le",
          "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.170.2.s390x",
          "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_170-default-1-150400.9.3.2.ppc64le",
          "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_170-default-1-150400.9.3.2.s390x",
          "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_170-default-1-150400.9.3.2.x86_64",
          "SUSE Linux Enterprise Micro 5.3:kernel-default-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise Micro 5.3:kernel-default-5.14.21-150400.24.170.2.s390x",
          "SUSE Linux Enterprise Micro 5.3:kernel-default-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise Micro 5.3:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.aarch64",
          "SUSE Linux Enterprise Micro 5.3:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
          "SUSE Linux Enterprise Micro 5.4:kernel-default-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise Micro 5.4:kernel-default-5.14.21-150400.24.170.2.s390x",
          "SUSE Linux Enterprise Micro 5.4:kernel-default-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise Micro 5.4:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.aarch64",
          "SUSE Linux Enterprise Micro 5.4:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-64kb-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-64kb-devel-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-5.14.21-150400.24.170.2.ppc64le",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-5.14.21-150400.24.170.2.s390x",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.aarch64",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.ppc64le",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.170.2.ppc64le",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.170.2.s390x",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-devel-5.14.21-150400.24.170.1.noarch",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-docs-5.14.21-150400.24.170.1.noarch",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-macros-5.14.21-150400.24.170.1.noarch",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.170.2.ppc64le",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.170.2.s390x",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-source-5.14.21-150400.24.170.1.noarch",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.170.1.aarch64",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.170.1.ppc64le",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.170.1.s390x",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.170.1.x86_64",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-zfcpdump-5.14.21-150400.24.170.2.s390x",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.170.2.ppc64le",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.170.2.s390x",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-5.14.21-150400.24.170.2.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-devel-5.14.21-150400.24.170.2.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-devel-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-devel-5.14.21-150400.24.170.1.noarch",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-docs-5.14.21-150400.24.170.1.noarch",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-macros-5.14.21-150400.24.170.1.noarch",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-obs-build-5.14.21-150400.24.170.2.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-obs-build-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-source-5.14.21-150400.24.170.1.noarch",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-syms-5.14.21-150400.24.170.1.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-syms-5.14.21-150400.24.170.1.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.170.2.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.170.2.x86_64",
          "SUSE Manager Proxy 4.3:kernel-default-5.14.21-150400.24.170.2.x86_64",
          "SUSE Manager Proxy 4.3:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
          "SUSE Manager Proxy 4.3:kernel-default-devel-5.14.21-150400.24.170.2.x86_64",
          "SUSE Manager Proxy 4.3:kernel-devel-5.14.21-150400.24.170.1.noarch",
          "SUSE Manager Proxy 4.3:kernel-macros-5.14.21-150400.24.170.1.noarch",
          "SUSE Manager Proxy 4.3:kernel-source-5.14.21-150400.24.170.1.noarch",
          "SUSE Manager Proxy 4.3:kernel-syms-5.14.21-150400.24.170.1.x86_64",
          "SUSE Manager Server 4.3:kernel-default-5.14.21-150400.24.170.2.ppc64le",
          "SUSE Manager Server 4.3:kernel-default-5.14.21-150400.24.170.2.s390x",
          "SUSE Manager Server 4.3:kernel-default-5.14.21-150400.24.170.2.x86_64",
          "SUSE Manager Server 4.3:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.ppc64le",
          "SUSE Manager Server 4.3:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
          "SUSE Manager Server 4.3:kernel-default-devel-5.14.21-150400.24.170.2.ppc64le",
          "SUSE Manager Server 4.3:kernel-default-devel-5.14.21-150400.24.170.2.s390x",
          "SUSE Manager Server 4.3:kernel-default-devel-5.14.21-150400.24.170.2.x86_64",
          "SUSE Manager Server 4.3:kernel-devel-5.14.21-150400.24.170.1.noarch",
          "SUSE Manager Server 4.3:kernel-macros-5.14.21-150400.24.170.1.noarch",
          "SUSE Manager Server 4.3:kernel-source-5.14.21-150400.24.170.1.noarch",
          "SUSE Manager Server 4.3:kernel-syms-5.14.21-150400.24.170.1.ppc64le",
          "SUSE Manager Server 4.3:kernel-syms-5.14.21-150400.24.170.1.s390x",
          "SUSE Manager Server 4.3:kernel-syms-5.14.21-150400.24.170.1.x86_64",
          "SUSE Manager Server 4.3:kernel-zfcpdump-5.14.21-150400.24.170.2.s390x"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2022-50138",
          "url": "https://www.suse.com/security/cve/CVE-2022-50138"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1244797 for CVE-2022-50138",
          "url": "https://bugzilla.suse.com/1244797"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-64kb-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-64kb-devel-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-devel-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-devel-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-devel-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-docs-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-macros-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-obs-build-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-obs-build-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-source-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-syms-5.14.21-150400.24.170.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-syms-5.14.21-150400.24.170.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:reiserfs-kmp-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:reiserfs-kmp-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-64kb-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-64kb-devel-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-devel-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-docs-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-macros-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-source-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.170.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.170.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_170-default-1-150400.9.3.2.ppc64le",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_170-default-1-150400.9.3.2.s390x",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_170-default-1-150400.9.3.2.x86_64",
            "SUSE Linux Enterprise Micro 5.3:kernel-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise Micro 5.3:kernel-default-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise Micro 5.3:kernel-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Micro 5.3:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.aarch64",
            "SUSE Linux Enterprise Micro 5.3:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
            "SUSE Linux Enterprise Micro 5.4:kernel-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise Micro 5.4:kernel-default-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise Micro 5.4:kernel-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Micro 5.4:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.aarch64",
            "SUSE Linux Enterprise Micro 5.4:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-64kb-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-64kb-devel-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.aarch64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.ppc64le",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-devel-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-docs-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-macros-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-source-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.170.1.aarch64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.170.1.ppc64le",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.170.1.s390x",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.170.1.x86_64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-zfcpdump-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-devel-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-devel-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-devel-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-docs-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-macros-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-obs-build-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-obs-build-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-source-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-syms-5.14.21-150400.24.170.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-syms-5.14.21-150400.24.170.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Manager Proxy 4.3:kernel-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Manager Proxy 4.3:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
            "SUSE Manager Proxy 4.3:kernel-default-devel-5.14.21-150400.24.170.2.x86_64",
            "SUSE Manager Proxy 4.3:kernel-devel-5.14.21-150400.24.170.1.noarch",
            "SUSE Manager Proxy 4.3:kernel-macros-5.14.21-150400.24.170.1.noarch",
            "SUSE Manager Proxy 4.3:kernel-source-5.14.21-150400.24.170.1.noarch",
            "SUSE Manager Proxy 4.3:kernel-syms-5.14.21-150400.24.170.1.x86_64",
            "SUSE Manager Server 4.3:kernel-default-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Manager Server 4.3:kernel-default-5.14.21-150400.24.170.2.s390x",
            "SUSE Manager Server 4.3:kernel-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Manager Server 4.3:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.ppc64le",
            "SUSE Manager Server 4.3:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
            "SUSE Manager Server 4.3:kernel-default-devel-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Manager Server 4.3:kernel-default-devel-5.14.21-150400.24.170.2.s390x",
            "SUSE Manager Server 4.3:kernel-default-devel-5.14.21-150400.24.170.2.x86_64",
            "SUSE Manager Server 4.3:kernel-devel-5.14.21-150400.24.170.1.noarch",
            "SUSE Manager Server 4.3:kernel-macros-5.14.21-150400.24.170.1.noarch",
            "SUSE Manager Server 4.3:kernel-source-5.14.21-150400.24.170.1.noarch",
            "SUSE Manager Server 4.3:kernel-syms-5.14.21-150400.24.170.1.ppc64le",
            "SUSE Manager Server 4.3:kernel-syms-5.14.21-150400.24.170.1.s390x",
            "SUSE Manager Server 4.3:kernel-syms-5.14.21-150400.24.170.1.x86_64",
            "SUSE Manager Server 4.3:kernel-zfcpdump-5.14.21-150400.24.170.2.s390x"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 5.5,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
            "version": "3.1"
          },
          "products": [
            "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-64kb-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-64kb-devel-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-devel-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-devel-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-devel-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-docs-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-macros-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-obs-build-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-obs-build-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-source-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-syms-5.14.21-150400.24.170.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-syms-5.14.21-150400.24.170.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:reiserfs-kmp-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:reiserfs-kmp-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-64kb-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-64kb-devel-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-devel-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-docs-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-macros-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-source-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.170.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.170.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_170-default-1-150400.9.3.2.ppc64le",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_170-default-1-150400.9.3.2.s390x",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_170-default-1-150400.9.3.2.x86_64",
            "SUSE Linux Enterprise Micro 5.3:kernel-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise Micro 5.3:kernel-default-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise Micro 5.3:kernel-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Micro 5.3:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.aarch64",
            "SUSE Linux Enterprise Micro 5.3:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
            "SUSE Linux Enterprise Micro 5.4:kernel-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise Micro 5.4:kernel-default-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise Micro 5.4:kernel-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Micro 5.4:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.aarch64",
            "SUSE Linux Enterprise Micro 5.4:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-64kb-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-64kb-devel-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.aarch64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.ppc64le",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-devel-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-docs-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-macros-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-source-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.170.1.aarch64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.170.1.ppc64le",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.170.1.s390x",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.170.1.x86_64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-zfcpdump-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-devel-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-devel-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-devel-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-docs-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-macros-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-obs-build-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-obs-build-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-source-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-syms-5.14.21-150400.24.170.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-syms-5.14.21-150400.24.170.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Manager Proxy 4.3:kernel-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Manager Proxy 4.3:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
            "SUSE Manager Proxy 4.3:kernel-default-devel-5.14.21-150400.24.170.2.x86_64",
            "SUSE Manager Proxy 4.3:kernel-devel-5.14.21-150400.24.170.1.noarch",
            "SUSE Manager Proxy 4.3:kernel-macros-5.14.21-150400.24.170.1.noarch",
            "SUSE Manager Proxy 4.3:kernel-source-5.14.21-150400.24.170.1.noarch",
            "SUSE Manager Proxy 4.3:kernel-syms-5.14.21-150400.24.170.1.x86_64",
            "SUSE Manager Server 4.3:kernel-default-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Manager Server 4.3:kernel-default-5.14.21-150400.24.170.2.s390x",
            "SUSE Manager Server 4.3:kernel-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Manager Server 4.3:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.ppc64le",
            "SUSE Manager Server 4.3:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
            "SUSE Manager Server 4.3:kernel-default-devel-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Manager Server 4.3:kernel-default-devel-5.14.21-150400.24.170.2.s390x",
            "SUSE Manager Server 4.3:kernel-default-devel-5.14.21-150400.24.170.2.x86_64",
            "SUSE Manager Server 4.3:kernel-devel-5.14.21-150400.24.170.1.noarch",
            "SUSE Manager Server 4.3:kernel-macros-5.14.21-150400.24.170.1.noarch",
            "SUSE Manager Server 4.3:kernel-source-5.14.21-150400.24.170.1.noarch",
            "SUSE Manager Server 4.3:kernel-syms-5.14.21-150400.24.170.1.ppc64le",
            "SUSE Manager Server 4.3:kernel-syms-5.14.21-150400.24.170.1.s390x",
            "SUSE Manager Server 4.3:kernel-syms-5.14.21-150400.24.170.1.x86_64",
            "SUSE Manager Server 4.3:kernel-zfcpdump-5.14.21-150400.24.170.2.s390x"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2025-07-28T15:09:33Z",
          "details": "moderate"
        }
      ],
      "title": "CVE-2022-50138"
    },
    {
      "cve": "CVE-2022-50139",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2022-50139"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "In the Linux kernel, the following vulnerability has been resolved:\n\nusb: aspeed-vhub: Fix refcount leak bug in ast_vhub_init_desc()\n\nWe should call of_node_put() for the reference returned by\nof_get_child_by_name() which has increased the refcount.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.170.2.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.170.2.s390x",
          "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.170.2.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.170.2.s390x",
          "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.170.2.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.170.2.s390x",
          "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.170.2.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.170.2.s390x",
          "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-64kb-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-64kb-devel-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-devel-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-devel-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-devel-5.14.21-150400.24.170.1.noarch",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-docs-5.14.21-150400.24.170.1.noarch",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-macros-5.14.21-150400.24.170.1.noarch",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-obs-build-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-obs-build-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-source-5.14.21-150400.24.170.1.noarch",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-syms-5.14.21-150400.24.170.1.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-syms-5.14.21-150400.24.170.1.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:reiserfs-kmp-default-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:reiserfs-kmp-default-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-64kb-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-64kb-devel-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-devel-5.14.21-150400.24.170.1.noarch",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-docs-5.14.21-150400.24.170.1.noarch",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-macros-5.14.21-150400.24.170.1.noarch",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-source-5.14.21-150400.24.170.1.noarch",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.170.1.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.170.1.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.170.2.ppc64le",
          "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.170.2.s390x",
          "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.170.2.ppc64le",
          "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.170.2.s390x",
          "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_170-default-1-150400.9.3.2.ppc64le",
          "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_170-default-1-150400.9.3.2.s390x",
          "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_170-default-1-150400.9.3.2.x86_64",
          "SUSE Linux Enterprise Micro 5.3:kernel-default-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise Micro 5.3:kernel-default-5.14.21-150400.24.170.2.s390x",
          "SUSE Linux Enterprise Micro 5.3:kernel-default-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise Micro 5.3:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.aarch64",
          "SUSE Linux Enterprise Micro 5.3:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
          "SUSE Linux Enterprise Micro 5.4:kernel-default-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise Micro 5.4:kernel-default-5.14.21-150400.24.170.2.s390x",
          "SUSE Linux Enterprise Micro 5.4:kernel-default-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise Micro 5.4:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.aarch64",
          "SUSE Linux Enterprise Micro 5.4:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-64kb-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-64kb-devel-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-5.14.21-150400.24.170.2.ppc64le",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-5.14.21-150400.24.170.2.s390x",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.aarch64",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.ppc64le",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.170.2.ppc64le",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.170.2.s390x",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-devel-5.14.21-150400.24.170.1.noarch",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-docs-5.14.21-150400.24.170.1.noarch",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-macros-5.14.21-150400.24.170.1.noarch",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.170.2.ppc64le",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.170.2.s390x",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-source-5.14.21-150400.24.170.1.noarch",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.170.1.aarch64",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.170.1.ppc64le",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.170.1.s390x",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.170.1.x86_64",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-zfcpdump-5.14.21-150400.24.170.2.s390x",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.170.2.ppc64le",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.170.2.s390x",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-5.14.21-150400.24.170.2.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-devel-5.14.21-150400.24.170.2.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-devel-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-devel-5.14.21-150400.24.170.1.noarch",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-docs-5.14.21-150400.24.170.1.noarch",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-macros-5.14.21-150400.24.170.1.noarch",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-obs-build-5.14.21-150400.24.170.2.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-obs-build-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-source-5.14.21-150400.24.170.1.noarch",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-syms-5.14.21-150400.24.170.1.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-syms-5.14.21-150400.24.170.1.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.170.2.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.170.2.x86_64",
          "SUSE Manager Proxy 4.3:kernel-default-5.14.21-150400.24.170.2.x86_64",
          "SUSE Manager Proxy 4.3:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
          "SUSE Manager Proxy 4.3:kernel-default-devel-5.14.21-150400.24.170.2.x86_64",
          "SUSE Manager Proxy 4.3:kernel-devel-5.14.21-150400.24.170.1.noarch",
          "SUSE Manager Proxy 4.3:kernel-macros-5.14.21-150400.24.170.1.noarch",
          "SUSE Manager Proxy 4.3:kernel-source-5.14.21-150400.24.170.1.noarch",
          "SUSE Manager Proxy 4.3:kernel-syms-5.14.21-150400.24.170.1.x86_64",
          "SUSE Manager Server 4.3:kernel-default-5.14.21-150400.24.170.2.ppc64le",
          "SUSE Manager Server 4.3:kernel-default-5.14.21-150400.24.170.2.s390x",
          "SUSE Manager Server 4.3:kernel-default-5.14.21-150400.24.170.2.x86_64",
          "SUSE Manager Server 4.3:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.ppc64le",
          "SUSE Manager Server 4.3:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
          "SUSE Manager Server 4.3:kernel-default-devel-5.14.21-150400.24.170.2.ppc64le",
          "SUSE Manager Server 4.3:kernel-default-devel-5.14.21-150400.24.170.2.s390x",
          "SUSE Manager Server 4.3:kernel-default-devel-5.14.21-150400.24.170.2.x86_64",
          "SUSE Manager Server 4.3:kernel-devel-5.14.21-150400.24.170.1.noarch",
          "SUSE Manager Server 4.3:kernel-macros-5.14.21-150400.24.170.1.noarch",
          "SUSE Manager Server 4.3:kernel-source-5.14.21-150400.24.170.1.noarch",
          "SUSE Manager Server 4.3:kernel-syms-5.14.21-150400.24.170.1.ppc64le",
          "SUSE Manager Server 4.3:kernel-syms-5.14.21-150400.24.170.1.s390x",
          "SUSE Manager Server 4.3:kernel-syms-5.14.21-150400.24.170.1.x86_64",
          "SUSE Manager Server 4.3:kernel-zfcpdump-5.14.21-150400.24.170.2.s390x"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2022-50139",
          "url": "https://www.suse.com/security/cve/CVE-2022-50139"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1244798 for CVE-2022-50139",
          "url": "https://bugzilla.suse.com/1244798"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-64kb-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-64kb-devel-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-devel-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-devel-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-devel-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-docs-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-macros-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-obs-build-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-obs-build-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-source-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-syms-5.14.21-150400.24.170.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-syms-5.14.21-150400.24.170.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:reiserfs-kmp-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:reiserfs-kmp-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-64kb-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-64kb-devel-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-devel-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-docs-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-macros-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-source-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.170.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.170.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_170-default-1-150400.9.3.2.ppc64le",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_170-default-1-150400.9.3.2.s390x",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_170-default-1-150400.9.3.2.x86_64",
            "SUSE Linux Enterprise Micro 5.3:kernel-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise Micro 5.3:kernel-default-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise Micro 5.3:kernel-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Micro 5.3:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.aarch64",
            "SUSE Linux Enterprise Micro 5.3:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
            "SUSE Linux Enterprise Micro 5.4:kernel-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise Micro 5.4:kernel-default-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise Micro 5.4:kernel-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Micro 5.4:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.aarch64",
            "SUSE Linux Enterprise Micro 5.4:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-64kb-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-64kb-devel-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.aarch64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.ppc64le",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-devel-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-docs-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-macros-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-source-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.170.1.aarch64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.170.1.ppc64le",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.170.1.s390x",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.170.1.x86_64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-zfcpdump-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-devel-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-devel-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-devel-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-docs-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-macros-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-obs-build-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-obs-build-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-source-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-syms-5.14.21-150400.24.170.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-syms-5.14.21-150400.24.170.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Manager Proxy 4.3:kernel-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Manager Proxy 4.3:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
            "SUSE Manager Proxy 4.3:kernel-default-devel-5.14.21-150400.24.170.2.x86_64",
            "SUSE Manager Proxy 4.3:kernel-devel-5.14.21-150400.24.170.1.noarch",
            "SUSE Manager Proxy 4.3:kernel-macros-5.14.21-150400.24.170.1.noarch",
            "SUSE Manager Proxy 4.3:kernel-source-5.14.21-150400.24.170.1.noarch",
            "SUSE Manager Proxy 4.3:kernel-syms-5.14.21-150400.24.170.1.x86_64",
            "SUSE Manager Server 4.3:kernel-default-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Manager Server 4.3:kernel-default-5.14.21-150400.24.170.2.s390x",
            "SUSE Manager Server 4.3:kernel-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Manager Server 4.3:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.ppc64le",
            "SUSE Manager Server 4.3:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
            "SUSE Manager Server 4.3:kernel-default-devel-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Manager Server 4.3:kernel-default-devel-5.14.21-150400.24.170.2.s390x",
            "SUSE Manager Server 4.3:kernel-default-devel-5.14.21-150400.24.170.2.x86_64",
            "SUSE Manager Server 4.3:kernel-devel-5.14.21-150400.24.170.1.noarch",
            "SUSE Manager Server 4.3:kernel-macros-5.14.21-150400.24.170.1.noarch",
            "SUSE Manager Server 4.3:kernel-source-5.14.21-150400.24.170.1.noarch",
            "SUSE Manager Server 4.3:kernel-syms-5.14.21-150400.24.170.1.ppc64le",
            "SUSE Manager Server 4.3:kernel-syms-5.14.21-150400.24.170.1.s390x",
            "SUSE Manager Server 4.3:kernel-syms-5.14.21-150400.24.170.1.x86_64",
            "SUSE Manager Server 4.3:kernel-zfcpdump-5.14.21-150400.24.170.2.s390x"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 5.5,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
            "version": "3.1"
          },
          "products": [
            "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-64kb-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-64kb-devel-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-devel-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-devel-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-devel-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-docs-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-macros-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-obs-build-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-obs-build-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-source-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-syms-5.14.21-150400.24.170.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-syms-5.14.21-150400.24.170.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:reiserfs-kmp-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:reiserfs-kmp-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-64kb-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-64kb-devel-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-devel-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-docs-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-macros-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-source-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.170.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.170.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_170-default-1-150400.9.3.2.ppc64le",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_170-default-1-150400.9.3.2.s390x",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_170-default-1-150400.9.3.2.x86_64",
            "SUSE Linux Enterprise Micro 5.3:kernel-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise Micro 5.3:kernel-default-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise Micro 5.3:kernel-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Micro 5.3:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.aarch64",
            "SUSE Linux Enterprise Micro 5.3:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
            "SUSE Linux Enterprise Micro 5.4:kernel-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise Micro 5.4:kernel-default-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise Micro 5.4:kernel-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Micro 5.4:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.aarch64",
            "SUSE Linux Enterprise Micro 5.4:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-64kb-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-64kb-devel-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.aarch64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.ppc64le",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-devel-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-docs-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-macros-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-source-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.170.1.aarch64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.170.1.ppc64le",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.170.1.s390x",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.170.1.x86_64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-zfcpdump-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-devel-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-devel-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-devel-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-docs-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-macros-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-obs-build-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-obs-build-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-source-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-syms-5.14.21-150400.24.170.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-syms-5.14.21-150400.24.170.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Manager Proxy 4.3:kernel-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Manager Proxy 4.3:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
            "SUSE Manager Proxy 4.3:kernel-default-devel-5.14.21-150400.24.170.2.x86_64",
            "SUSE Manager Proxy 4.3:kernel-devel-5.14.21-150400.24.170.1.noarch",
            "SUSE Manager Proxy 4.3:kernel-macros-5.14.21-150400.24.170.1.noarch",
            "SUSE Manager Proxy 4.3:kernel-source-5.14.21-150400.24.170.1.noarch",
            "SUSE Manager Proxy 4.3:kernel-syms-5.14.21-150400.24.170.1.x86_64",
            "SUSE Manager Server 4.3:kernel-default-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Manager Server 4.3:kernel-default-5.14.21-150400.24.170.2.s390x",
            "SUSE Manager Server 4.3:kernel-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Manager Server 4.3:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.ppc64le",
            "SUSE Manager Server 4.3:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
            "SUSE Manager Server 4.3:kernel-default-devel-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Manager Server 4.3:kernel-default-devel-5.14.21-150400.24.170.2.s390x",
            "SUSE Manager Server 4.3:kernel-default-devel-5.14.21-150400.24.170.2.x86_64",
            "SUSE Manager Server 4.3:kernel-devel-5.14.21-150400.24.170.1.noarch",
            "SUSE Manager Server 4.3:kernel-macros-5.14.21-150400.24.170.1.noarch",
            "SUSE Manager Server 4.3:kernel-source-5.14.21-150400.24.170.1.noarch",
            "SUSE Manager Server 4.3:kernel-syms-5.14.21-150400.24.170.1.ppc64le",
            "SUSE Manager Server 4.3:kernel-syms-5.14.21-150400.24.170.1.s390x",
            "SUSE Manager Server 4.3:kernel-syms-5.14.21-150400.24.170.1.x86_64",
            "SUSE Manager Server 4.3:kernel-zfcpdump-5.14.21-150400.24.170.2.s390x"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2025-07-28T15:09:33Z",
          "details": "moderate"
        }
      ],
      "title": "CVE-2022-50139"
    },
    {
      "cve": "CVE-2022-50140",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2022-50140"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "In the Linux kernel, the following vulnerability has been resolved:\n\nmemstick/ms_block: Fix a memory leak\n\n\u0027erased_blocks_bitmap\u0027 is never freed. As it is allocated at the same time\nas \u0027used_blocks_bitmap\u0027, it is likely that it should be freed also at the\nsame time.\n\nAdd the corresponding bitmap_free() in msb_data_clear().",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.170.2.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.170.2.s390x",
          "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.170.2.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.170.2.s390x",
          "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.170.2.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.170.2.s390x",
          "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.170.2.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.170.2.s390x",
          "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-64kb-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-64kb-devel-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-devel-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-devel-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-devel-5.14.21-150400.24.170.1.noarch",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-docs-5.14.21-150400.24.170.1.noarch",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-macros-5.14.21-150400.24.170.1.noarch",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-obs-build-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-obs-build-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-source-5.14.21-150400.24.170.1.noarch",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-syms-5.14.21-150400.24.170.1.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-syms-5.14.21-150400.24.170.1.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:reiserfs-kmp-default-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:reiserfs-kmp-default-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-64kb-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-64kb-devel-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-devel-5.14.21-150400.24.170.1.noarch",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-docs-5.14.21-150400.24.170.1.noarch",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-macros-5.14.21-150400.24.170.1.noarch",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-source-5.14.21-150400.24.170.1.noarch",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.170.1.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.170.1.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.170.2.ppc64le",
          "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.170.2.s390x",
          "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.170.2.ppc64le",
          "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.170.2.s390x",
          "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_170-default-1-150400.9.3.2.ppc64le",
          "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_170-default-1-150400.9.3.2.s390x",
          "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_170-default-1-150400.9.3.2.x86_64",
          "SUSE Linux Enterprise Micro 5.3:kernel-default-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise Micro 5.3:kernel-default-5.14.21-150400.24.170.2.s390x",
          "SUSE Linux Enterprise Micro 5.3:kernel-default-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise Micro 5.3:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.aarch64",
          "SUSE Linux Enterprise Micro 5.3:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
          "SUSE Linux Enterprise Micro 5.4:kernel-default-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise Micro 5.4:kernel-default-5.14.21-150400.24.170.2.s390x",
          "SUSE Linux Enterprise Micro 5.4:kernel-default-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise Micro 5.4:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.aarch64",
          "SUSE Linux Enterprise Micro 5.4:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-64kb-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-64kb-devel-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-5.14.21-150400.24.170.2.ppc64le",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-5.14.21-150400.24.170.2.s390x",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.aarch64",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.ppc64le",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.170.2.ppc64le",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.170.2.s390x",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-devel-5.14.21-150400.24.170.1.noarch",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-docs-5.14.21-150400.24.170.1.noarch",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-macros-5.14.21-150400.24.170.1.noarch",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.170.2.ppc64le",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.170.2.s390x",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-source-5.14.21-150400.24.170.1.noarch",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.170.1.aarch64",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.170.1.ppc64le",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.170.1.s390x",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.170.1.x86_64",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-zfcpdump-5.14.21-150400.24.170.2.s390x",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.170.2.ppc64le",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.170.2.s390x",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-5.14.21-150400.24.170.2.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-devel-5.14.21-150400.24.170.2.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-devel-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-devel-5.14.21-150400.24.170.1.noarch",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-docs-5.14.21-150400.24.170.1.noarch",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-macros-5.14.21-150400.24.170.1.noarch",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-obs-build-5.14.21-150400.24.170.2.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-obs-build-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-source-5.14.21-150400.24.170.1.noarch",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-syms-5.14.21-150400.24.170.1.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-syms-5.14.21-150400.24.170.1.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.170.2.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.170.2.x86_64",
          "SUSE Manager Proxy 4.3:kernel-default-5.14.21-150400.24.170.2.x86_64",
          "SUSE Manager Proxy 4.3:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
          "SUSE Manager Proxy 4.3:kernel-default-devel-5.14.21-150400.24.170.2.x86_64",
          "SUSE Manager Proxy 4.3:kernel-devel-5.14.21-150400.24.170.1.noarch",
          "SUSE Manager Proxy 4.3:kernel-macros-5.14.21-150400.24.170.1.noarch",
          "SUSE Manager Proxy 4.3:kernel-source-5.14.21-150400.24.170.1.noarch",
          "SUSE Manager Proxy 4.3:kernel-syms-5.14.21-150400.24.170.1.x86_64",
          "SUSE Manager Server 4.3:kernel-default-5.14.21-150400.24.170.2.ppc64le",
          "SUSE Manager Server 4.3:kernel-default-5.14.21-150400.24.170.2.s390x",
          "SUSE Manager Server 4.3:kernel-default-5.14.21-150400.24.170.2.x86_64",
          "SUSE Manager Server 4.3:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.ppc64le",
          "SUSE Manager Server 4.3:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
          "SUSE Manager Server 4.3:kernel-default-devel-5.14.21-150400.24.170.2.ppc64le",
          "SUSE Manager Server 4.3:kernel-default-devel-5.14.21-150400.24.170.2.s390x",
          "SUSE Manager Server 4.3:kernel-default-devel-5.14.21-150400.24.170.2.x86_64",
          "SUSE Manager Server 4.3:kernel-devel-5.14.21-150400.24.170.1.noarch",
          "SUSE Manager Server 4.3:kernel-macros-5.14.21-150400.24.170.1.noarch",
          "SUSE Manager Server 4.3:kernel-source-5.14.21-150400.24.170.1.noarch",
          "SUSE Manager Server 4.3:kernel-syms-5.14.21-150400.24.170.1.ppc64le",
          "SUSE Manager Server 4.3:kernel-syms-5.14.21-150400.24.170.1.s390x",
          "SUSE Manager Server 4.3:kernel-syms-5.14.21-150400.24.170.1.x86_64",
          "SUSE Manager Server 4.3:kernel-zfcpdump-5.14.21-150400.24.170.2.s390x"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2022-50140",
          "url": "https://www.suse.com/security/cve/CVE-2022-50140"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1244793 for CVE-2022-50140",
          "url": "https://bugzilla.suse.com/1244793"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-64kb-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-64kb-devel-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-devel-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-devel-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-devel-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-docs-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-macros-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-obs-build-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-obs-build-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-source-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-syms-5.14.21-150400.24.170.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-syms-5.14.21-150400.24.170.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:reiserfs-kmp-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:reiserfs-kmp-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-64kb-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-64kb-devel-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-devel-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-docs-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-macros-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-source-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.170.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.170.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_170-default-1-150400.9.3.2.ppc64le",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_170-default-1-150400.9.3.2.s390x",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_170-default-1-150400.9.3.2.x86_64",
            "SUSE Linux Enterprise Micro 5.3:kernel-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise Micro 5.3:kernel-default-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise Micro 5.3:kernel-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Micro 5.3:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.aarch64",
            "SUSE Linux Enterprise Micro 5.3:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
            "SUSE Linux Enterprise Micro 5.4:kernel-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise Micro 5.4:kernel-default-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise Micro 5.4:kernel-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Micro 5.4:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.aarch64",
            "SUSE Linux Enterprise Micro 5.4:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-64kb-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-64kb-devel-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.aarch64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.ppc64le",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-devel-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-docs-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-macros-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-source-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.170.1.aarch64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.170.1.ppc64le",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.170.1.s390x",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.170.1.x86_64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-zfcpdump-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-devel-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-devel-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-devel-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-docs-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-macros-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-obs-build-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-obs-build-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-source-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-syms-5.14.21-150400.24.170.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-syms-5.14.21-150400.24.170.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Manager Proxy 4.3:kernel-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Manager Proxy 4.3:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
            "SUSE Manager Proxy 4.3:kernel-default-devel-5.14.21-150400.24.170.2.x86_64",
            "SUSE Manager Proxy 4.3:kernel-devel-5.14.21-150400.24.170.1.noarch",
            "SUSE Manager Proxy 4.3:kernel-macros-5.14.21-150400.24.170.1.noarch",
            "SUSE Manager Proxy 4.3:kernel-source-5.14.21-150400.24.170.1.noarch",
            "SUSE Manager Proxy 4.3:kernel-syms-5.14.21-150400.24.170.1.x86_64",
            "SUSE Manager Server 4.3:kernel-default-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Manager Server 4.3:kernel-default-5.14.21-150400.24.170.2.s390x",
            "SUSE Manager Server 4.3:kernel-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Manager Server 4.3:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.ppc64le",
            "SUSE Manager Server 4.3:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
            "SUSE Manager Server 4.3:kernel-default-devel-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Manager Server 4.3:kernel-default-devel-5.14.21-150400.24.170.2.s390x",
            "SUSE Manager Server 4.3:kernel-default-devel-5.14.21-150400.24.170.2.x86_64",
            "SUSE Manager Server 4.3:kernel-devel-5.14.21-150400.24.170.1.noarch",
            "SUSE Manager Server 4.3:kernel-macros-5.14.21-150400.24.170.1.noarch",
            "SUSE Manager Server 4.3:kernel-source-5.14.21-150400.24.170.1.noarch",
            "SUSE Manager Server 4.3:kernel-syms-5.14.21-150400.24.170.1.ppc64le",
            "SUSE Manager Server 4.3:kernel-syms-5.14.21-150400.24.170.1.s390x",
            "SUSE Manager Server 4.3:kernel-syms-5.14.21-150400.24.170.1.x86_64",
            "SUSE Manager Server 4.3:kernel-zfcpdump-5.14.21-150400.24.170.2.s390x"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 5.5,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
            "version": "3.1"
          },
          "products": [
            "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-64kb-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-64kb-devel-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-devel-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-devel-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-devel-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-docs-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-macros-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-obs-build-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-obs-build-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-source-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-syms-5.14.21-150400.24.170.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-syms-5.14.21-150400.24.170.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:reiserfs-kmp-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:reiserfs-kmp-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-64kb-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-64kb-devel-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-devel-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-docs-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-macros-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-source-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.170.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.170.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_170-default-1-150400.9.3.2.ppc64le",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_170-default-1-150400.9.3.2.s390x",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_170-default-1-150400.9.3.2.x86_64",
            "SUSE Linux Enterprise Micro 5.3:kernel-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise Micro 5.3:kernel-default-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise Micro 5.3:kernel-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Micro 5.3:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.aarch64",
            "SUSE Linux Enterprise Micro 5.3:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
            "SUSE Linux Enterprise Micro 5.4:kernel-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise Micro 5.4:kernel-default-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise Micro 5.4:kernel-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Micro 5.4:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.aarch64",
            "SUSE Linux Enterprise Micro 5.4:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-64kb-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-64kb-devel-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.aarch64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.ppc64le",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-devel-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-docs-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-macros-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-source-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.170.1.aarch64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.170.1.ppc64le",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.170.1.s390x",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.170.1.x86_64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-zfcpdump-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-devel-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-devel-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-devel-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-docs-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-macros-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-obs-build-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-obs-build-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-source-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-syms-5.14.21-150400.24.170.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-syms-5.14.21-150400.24.170.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Manager Proxy 4.3:kernel-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Manager Proxy 4.3:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
            "SUSE Manager Proxy 4.3:kernel-default-devel-5.14.21-150400.24.170.2.x86_64",
            "SUSE Manager Proxy 4.3:kernel-devel-5.14.21-150400.24.170.1.noarch",
            "SUSE Manager Proxy 4.3:kernel-macros-5.14.21-150400.24.170.1.noarch",
            "SUSE Manager Proxy 4.3:kernel-source-5.14.21-150400.24.170.1.noarch",
            "SUSE Manager Proxy 4.3:kernel-syms-5.14.21-150400.24.170.1.x86_64",
            "SUSE Manager Server 4.3:kernel-default-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Manager Server 4.3:kernel-default-5.14.21-150400.24.170.2.s390x",
            "SUSE Manager Server 4.3:kernel-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Manager Server 4.3:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.ppc64le",
            "SUSE Manager Server 4.3:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
            "SUSE Manager Server 4.3:kernel-default-devel-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Manager Server 4.3:kernel-default-devel-5.14.21-150400.24.170.2.s390x",
            "SUSE Manager Server 4.3:kernel-default-devel-5.14.21-150400.24.170.2.x86_64",
            "SUSE Manager Server 4.3:kernel-devel-5.14.21-150400.24.170.1.noarch",
            "SUSE Manager Server 4.3:kernel-macros-5.14.21-150400.24.170.1.noarch",
            "SUSE Manager Server 4.3:kernel-source-5.14.21-150400.24.170.1.noarch",
            "SUSE Manager Server 4.3:kernel-syms-5.14.21-150400.24.170.1.ppc64le",
            "SUSE Manager Server 4.3:kernel-syms-5.14.21-150400.24.170.1.s390x",
            "SUSE Manager Server 4.3:kernel-syms-5.14.21-150400.24.170.1.x86_64",
            "SUSE Manager Server 4.3:kernel-zfcpdump-5.14.21-150400.24.170.2.s390x"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2025-07-28T15:09:33Z",
          "details": "moderate"
        }
      ],
      "title": "CVE-2022-50140"
    },
    {
      "cve": "CVE-2022-50141",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2022-50141"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "In the Linux kernel, the following vulnerability has been resolved:\n\nmmc: sdhci-of-esdhc: Fix refcount leak in esdhc_signal_voltage_switch\n\nof_find_matching_node() returns a node pointer with refcount\nincremented, we should use of_node_put() on it when not need anymore.\nAdd missing of_node_put() to avoid refcount leak.\nof_node_put() checks null pointer.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.170.2.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.170.2.s390x",
          "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.170.2.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.170.2.s390x",
          "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.170.2.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.170.2.s390x",
          "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.170.2.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.170.2.s390x",
          "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-64kb-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-64kb-devel-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-devel-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-devel-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-devel-5.14.21-150400.24.170.1.noarch",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-docs-5.14.21-150400.24.170.1.noarch",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-macros-5.14.21-150400.24.170.1.noarch",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-obs-build-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-obs-build-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-source-5.14.21-150400.24.170.1.noarch",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-syms-5.14.21-150400.24.170.1.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-syms-5.14.21-150400.24.170.1.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:reiserfs-kmp-default-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:reiserfs-kmp-default-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-64kb-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-64kb-devel-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-devel-5.14.21-150400.24.170.1.noarch",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-docs-5.14.21-150400.24.170.1.noarch",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-macros-5.14.21-150400.24.170.1.noarch",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-source-5.14.21-150400.24.170.1.noarch",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.170.1.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.170.1.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.170.2.ppc64le",
          "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.170.2.s390x",
          "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.170.2.ppc64le",
          "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.170.2.s390x",
          "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_170-default-1-150400.9.3.2.ppc64le",
          "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_170-default-1-150400.9.3.2.s390x",
          "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_170-default-1-150400.9.3.2.x86_64",
          "SUSE Linux Enterprise Micro 5.3:kernel-default-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise Micro 5.3:kernel-default-5.14.21-150400.24.170.2.s390x",
          "SUSE Linux Enterprise Micro 5.3:kernel-default-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise Micro 5.3:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.aarch64",
          "SUSE Linux Enterprise Micro 5.3:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
          "SUSE Linux Enterprise Micro 5.4:kernel-default-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise Micro 5.4:kernel-default-5.14.21-150400.24.170.2.s390x",
          "SUSE Linux Enterprise Micro 5.4:kernel-default-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise Micro 5.4:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.aarch64",
          "SUSE Linux Enterprise Micro 5.4:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-64kb-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-64kb-devel-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-5.14.21-150400.24.170.2.ppc64le",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-5.14.21-150400.24.170.2.s390x",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.aarch64",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.ppc64le",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.170.2.ppc64le",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.170.2.s390x",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-devel-5.14.21-150400.24.170.1.noarch",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-docs-5.14.21-150400.24.170.1.noarch",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-macros-5.14.21-150400.24.170.1.noarch",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.170.2.ppc64le",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.170.2.s390x",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-source-5.14.21-150400.24.170.1.noarch",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.170.1.aarch64",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.170.1.ppc64le",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.170.1.s390x",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.170.1.x86_64",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-zfcpdump-5.14.21-150400.24.170.2.s390x",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.170.2.ppc64le",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.170.2.s390x",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-5.14.21-150400.24.170.2.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-devel-5.14.21-150400.24.170.2.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-devel-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-devel-5.14.21-150400.24.170.1.noarch",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-docs-5.14.21-150400.24.170.1.noarch",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-macros-5.14.21-150400.24.170.1.noarch",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-obs-build-5.14.21-150400.24.170.2.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-obs-build-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-source-5.14.21-150400.24.170.1.noarch",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-syms-5.14.21-150400.24.170.1.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-syms-5.14.21-150400.24.170.1.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.170.2.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.170.2.x86_64",
          "SUSE Manager Proxy 4.3:kernel-default-5.14.21-150400.24.170.2.x86_64",
          "SUSE Manager Proxy 4.3:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
          "SUSE Manager Proxy 4.3:kernel-default-devel-5.14.21-150400.24.170.2.x86_64",
          "SUSE Manager Proxy 4.3:kernel-devel-5.14.21-150400.24.170.1.noarch",
          "SUSE Manager Proxy 4.3:kernel-macros-5.14.21-150400.24.170.1.noarch",
          "SUSE Manager Proxy 4.3:kernel-source-5.14.21-150400.24.170.1.noarch",
          "SUSE Manager Proxy 4.3:kernel-syms-5.14.21-150400.24.170.1.x86_64",
          "SUSE Manager Server 4.3:kernel-default-5.14.21-150400.24.170.2.ppc64le",
          "SUSE Manager Server 4.3:kernel-default-5.14.21-150400.24.170.2.s390x",
          "SUSE Manager Server 4.3:kernel-default-5.14.21-150400.24.170.2.x86_64",
          "SUSE Manager Server 4.3:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.ppc64le",
          "SUSE Manager Server 4.3:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
          "SUSE Manager Server 4.3:kernel-default-devel-5.14.21-150400.24.170.2.ppc64le",
          "SUSE Manager Server 4.3:kernel-default-devel-5.14.21-150400.24.170.2.s390x",
          "SUSE Manager Server 4.3:kernel-default-devel-5.14.21-150400.24.170.2.x86_64",
          "SUSE Manager Server 4.3:kernel-devel-5.14.21-150400.24.170.1.noarch",
          "SUSE Manager Server 4.3:kernel-macros-5.14.21-150400.24.170.1.noarch",
          "SUSE Manager Server 4.3:kernel-source-5.14.21-150400.24.170.1.noarch",
          "SUSE Manager Server 4.3:kernel-syms-5.14.21-150400.24.170.1.ppc64le",
          "SUSE Manager Server 4.3:kernel-syms-5.14.21-150400.24.170.1.s390x",
          "SUSE Manager Server 4.3:kernel-syms-5.14.21-150400.24.170.1.x86_64",
          "SUSE Manager Server 4.3:kernel-zfcpdump-5.14.21-150400.24.170.2.s390x"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2022-50141",
          "url": "https://www.suse.com/security/cve/CVE-2022-50141"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1244794 for CVE-2022-50141",
          "url": "https://bugzilla.suse.com/1244794"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-64kb-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-64kb-devel-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-devel-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-devel-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-devel-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-docs-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-macros-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-obs-build-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-obs-build-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-source-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-syms-5.14.21-150400.24.170.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-syms-5.14.21-150400.24.170.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:reiserfs-kmp-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:reiserfs-kmp-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-64kb-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-64kb-devel-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-devel-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-docs-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-macros-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-source-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.170.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.170.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_170-default-1-150400.9.3.2.ppc64le",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_170-default-1-150400.9.3.2.s390x",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_170-default-1-150400.9.3.2.x86_64",
            "SUSE Linux Enterprise Micro 5.3:kernel-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise Micro 5.3:kernel-default-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise Micro 5.3:kernel-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Micro 5.3:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.aarch64",
            "SUSE Linux Enterprise Micro 5.3:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
            "SUSE Linux Enterprise Micro 5.4:kernel-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise Micro 5.4:kernel-default-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise Micro 5.4:kernel-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Micro 5.4:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.aarch64",
            "SUSE Linux Enterprise Micro 5.4:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-64kb-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-64kb-devel-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.aarch64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.ppc64le",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-devel-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-docs-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-macros-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-source-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.170.1.aarch64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.170.1.ppc64le",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.170.1.s390x",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.170.1.x86_64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-zfcpdump-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-devel-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-devel-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-devel-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-docs-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-macros-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-obs-build-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-obs-build-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-source-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-syms-5.14.21-150400.24.170.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-syms-5.14.21-150400.24.170.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Manager Proxy 4.3:kernel-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Manager Proxy 4.3:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
            "SUSE Manager Proxy 4.3:kernel-default-devel-5.14.21-150400.24.170.2.x86_64",
            "SUSE Manager Proxy 4.3:kernel-devel-5.14.21-150400.24.170.1.noarch",
            "SUSE Manager Proxy 4.3:kernel-macros-5.14.21-150400.24.170.1.noarch",
            "SUSE Manager Proxy 4.3:kernel-source-5.14.21-150400.24.170.1.noarch",
            "SUSE Manager Proxy 4.3:kernel-syms-5.14.21-150400.24.170.1.x86_64",
            "SUSE Manager Server 4.3:kernel-default-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Manager Server 4.3:kernel-default-5.14.21-150400.24.170.2.s390x",
            "SUSE Manager Server 4.3:kernel-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Manager Server 4.3:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.ppc64le",
            "SUSE Manager Server 4.3:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
            "SUSE Manager Server 4.3:kernel-default-devel-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Manager Server 4.3:kernel-default-devel-5.14.21-150400.24.170.2.s390x",
            "SUSE Manager Server 4.3:kernel-default-devel-5.14.21-150400.24.170.2.x86_64",
            "SUSE Manager Server 4.3:kernel-devel-5.14.21-150400.24.170.1.noarch",
            "SUSE Manager Server 4.3:kernel-macros-5.14.21-150400.24.170.1.noarch",
            "SUSE Manager Server 4.3:kernel-source-5.14.21-150400.24.170.1.noarch",
            "SUSE Manager Server 4.3:kernel-syms-5.14.21-150400.24.170.1.ppc64le",
            "SUSE Manager Server 4.3:kernel-syms-5.14.21-150400.24.170.1.s390x",
            "SUSE Manager Server 4.3:kernel-syms-5.14.21-150400.24.170.1.x86_64",
            "SUSE Manager Server 4.3:kernel-zfcpdump-5.14.21-150400.24.170.2.s390x"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 5.5,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
            "version": "3.1"
          },
          "products": [
            "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-64kb-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-64kb-devel-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-devel-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-devel-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-devel-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-docs-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-macros-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-obs-build-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-obs-build-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-source-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-syms-5.14.21-150400.24.170.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-syms-5.14.21-150400.24.170.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:reiserfs-kmp-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:reiserfs-kmp-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-64kb-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-64kb-devel-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-devel-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-docs-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-macros-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-source-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.170.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.170.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_170-default-1-150400.9.3.2.ppc64le",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_170-default-1-150400.9.3.2.s390x",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_170-default-1-150400.9.3.2.x86_64",
            "SUSE Linux Enterprise Micro 5.3:kernel-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise Micro 5.3:kernel-default-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise Micro 5.3:kernel-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Micro 5.3:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.aarch64",
            "SUSE Linux Enterprise Micro 5.3:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
            "SUSE Linux Enterprise Micro 5.4:kernel-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise Micro 5.4:kernel-default-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise Micro 5.4:kernel-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Micro 5.4:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.aarch64",
            "SUSE Linux Enterprise Micro 5.4:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-64kb-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-64kb-devel-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.aarch64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.ppc64le",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-devel-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-docs-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-macros-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-source-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.170.1.aarch64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.170.1.ppc64le",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.170.1.s390x",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.170.1.x86_64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-zfcpdump-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-devel-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-devel-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-devel-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-docs-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-macros-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-obs-build-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-obs-build-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-source-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-syms-5.14.21-150400.24.170.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-syms-5.14.21-150400.24.170.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Manager Proxy 4.3:kernel-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Manager Proxy 4.3:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
            "SUSE Manager Proxy 4.3:kernel-default-devel-5.14.21-150400.24.170.2.x86_64",
            "SUSE Manager Proxy 4.3:kernel-devel-5.14.21-150400.24.170.1.noarch",
            "SUSE Manager Proxy 4.3:kernel-macros-5.14.21-150400.24.170.1.noarch",
            "SUSE Manager Proxy 4.3:kernel-source-5.14.21-150400.24.170.1.noarch",
            "SUSE Manager Proxy 4.3:kernel-syms-5.14.21-150400.24.170.1.x86_64",
            "SUSE Manager Server 4.3:kernel-default-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Manager Server 4.3:kernel-default-5.14.21-150400.24.170.2.s390x",
            "SUSE Manager Server 4.3:kernel-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Manager Server 4.3:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.ppc64le",
            "SUSE Manager Server 4.3:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
            "SUSE Manager Server 4.3:kernel-default-devel-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Manager Server 4.3:kernel-default-devel-5.14.21-150400.24.170.2.s390x",
            "SUSE Manager Server 4.3:kernel-default-devel-5.14.21-150400.24.170.2.x86_64",
            "SUSE Manager Server 4.3:kernel-devel-5.14.21-150400.24.170.1.noarch",
            "SUSE Manager Server 4.3:kernel-macros-5.14.21-150400.24.170.1.noarch",
            "SUSE Manager Server 4.3:kernel-source-5.14.21-150400.24.170.1.noarch",
            "SUSE Manager Server 4.3:kernel-syms-5.14.21-150400.24.170.1.ppc64le",
            "SUSE Manager Server 4.3:kernel-syms-5.14.21-150400.24.170.1.s390x",
            "SUSE Manager Server 4.3:kernel-syms-5.14.21-150400.24.170.1.x86_64",
            "SUSE Manager Server 4.3:kernel-zfcpdump-5.14.21-150400.24.170.2.s390x"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2025-07-28T15:09:33Z",
          "details": "moderate"
        }
      ],
      "title": "CVE-2022-50141"
    },
    {
      "cve": "CVE-2022-50142",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2022-50142"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "In the Linux kernel, the following vulnerability has been resolved:\n\nintel_th: msu: Fix vmalloced buffers\n\nAfter commit f5ff79fddf0e (\"dma-mapping: remove CONFIG_DMA_REMAP\") there\u0027s\na chance of DMA buffer getting allocated via vmalloc(), which messes up\nthe mmapping code:\n\n\u003e RIP: msc_mmap_fault [intel_th_msu]\n\u003e Call Trace:\n\u003e  \u003cTASK\u003e\n\u003e  __do_fault\n\u003e  do_fault\n...\n\nFix this by accounting for vmalloc possibility.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.170.2.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.170.2.s390x",
          "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.170.2.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.170.2.s390x",
          "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.170.2.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.170.2.s390x",
          "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.170.2.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.170.2.s390x",
          "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-64kb-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-64kb-devel-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-devel-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-devel-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-devel-5.14.21-150400.24.170.1.noarch",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-docs-5.14.21-150400.24.170.1.noarch",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-macros-5.14.21-150400.24.170.1.noarch",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-obs-build-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-obs-build-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-source-5.14.21-150400.24.170.1.noarch",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-syms-5.14.21-150400.24.170.1.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-syms-5.14.21-150400.24.170.1.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:reiserfs-kmp-default-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:reiserfs-kmp-default-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-64kb-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-64kb-devel-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-devel-5.14.21-150400.24.170.1.noarch",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-docs-5.14.21-150400.24.170.1.noarch",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-macros-5.14.21-150400.24.170.1.noarch",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-source-5.14.21-150400.24.170.1.noarch",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.170.1.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.170.1.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.170.2.ppc64le",
          "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.170.2.s390x",
          "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.170.2.ppc64le",
          "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.170.2.s390x",
          "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_170-default-1-150400.9.3.2.ppc64le",
          "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_170-default-1-150400.9.3.2.s390x",
          "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_170-default-1-150400.9.3.2.x86_64",
          "SUSE Linux Enterprise Micro 5.3:kernel-default-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise Micro 5.3:kernel-default-5.14.21-150400.24.170.2.s390x",
          "SUSE Linux Enterprise Micro 5.3:kernel-default-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise Micro 5.3:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.aarch64",
          "SUSE Linux Enterprise Micro 5.3:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
          "SUSE Linux Enterprise Micro 5.4:kernel-default-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise Micro 5.4:kernel-default-5.14.21-150400.24.170.2.s390x",
          "SUSE Linux Enterprise Micro 5.4:kernel-default-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise Micro 5.4:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.aarch64",
          "SUSE Linux Enterprise Micro 5.4:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-64kb-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-64kb-devel-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-5.14.21-150400.24.170.2.ppc64le",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-5.14.21-150400.24.170.2.s390x",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.aarch64",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.ppc64le",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.170.2.ppc64le",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.170.2.s390x",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-devel-5.14.21-150400.24.170.1.noarch",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-docs-5.14.21-150400.24.170.1.noarch",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-macros-5.14.21-150400.24.170.1.noarch",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.170.2.ppc64le",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.170.2.s390x",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-source-5.14.21-150400.24.170.1.noarch",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.170.1.aarch64",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.170.1.ppc64le",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.170.1.s390x",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.170.1.x86_64",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-zfcpdump-5.14.21-150400.24.170.2.s390x",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.170.2.ppc64le",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.170.2.s390x",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-5.14.21-150400.24.170.2.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-devel-5.14.21-150400.24.170.2.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-devel-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-devel-5.14.21-150400.24.170.1.noarch",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-docs-5.14.21-150400.24.170.1.noarch",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-macros-5.14.21-150400.24.170.1.noarch",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-obs-build-5.14.21-150400.24.170.2.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-obs-build-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-source-5.14.21-150400.24.170.1.noarch",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-syms-5.14.21-150400.24.170.1.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-syms-5.14.21-150400.24.170.1.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.170.2.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.170.2.x86_64",
          "SUSE Manager Proxy 4.3:kernel-default-5.14.21-150400.24.170.2.x86_64",
          "SUSE Manager Proxy 4.3:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
          "SUSE Manager Proxy 4.3:kernel-default-devel-5.14.21-150400.24.170.2.x86_64",
          "SUSE Manager Proxy 4.3:kernel-devel-5.14.21-150400.24.170.1.noarch",
          "SUSE Manager Proxy 4.3:kernel-macros-5.14.21-150400.24.170.1.noarch",
          "SUSE Manager Proxy 4.3:kernel-source-5.14.21-150400.24.170.1.noarch",
          "SUSE Manager Proxy 4.3:kernel-syms-5.14.21-150400.24.170.1.x86_64",
          "SUSE Manager Server 4.3:kernel-default-5.14.21-150400.24.170.2.ppc64le",
          "SUSE Manager Server 4.3:kernel-default-5.14.21-150400.24.170.2.s390x",
          "SUSE Manager Server 4.3:kernel-default-5.14.21-150400.24.170.2.x86_64",
          "SUSE Manager Server 4.3:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.ppc64le",
          "SUSE Manager Server 4.3:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
          "SUSE Manager Server 4.3:kernel-default-devel-5.14.21-150400.24.170.2.ppc64le",
          "SUSE Manager Server 4.3:kernel-default-devel-5.14.21-150400.24.170.2.s390x",
          "SUSE Manager Server 4.3:kernel-default-devel-5.14.21-150400.24.170.2.x86_64",
          "SUSE Manager Server 4.3:kernel-devel-5.14.21-150400.24.170.1.noarch",
          "SUSE Manager Server 4.3:kernel-macros-5.14.21-150400.24.170.1.noarch",
          "SUSE Manager Server 4.3:kernel-source-5.14.21-150400.24.170.1.noarch",
          "SUSE Manager Server 4.3:kernel-syms-5.14.21-150400.24.170.1.ppc64le",
          "SUSE Manager Server 4.3:kernel-syms-5.14.21-150400.24.170.1.s390x",
          "SUSE Manager Server 4.3:kernel-syms-5.14.21-150400.24.170.1.x86_64",
          "SUSE Manager Server 4.3:kernel-zfcpdump-5.14.21-150400.24.170.2.s390x"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2022-50142",
          "url": "https://www.suse.com/security/cve/CVE-2022-50142"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1244796 for CVE-2022-50142",
          "url": "https://bugzilla.suse.com/1244796"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-64kb-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-64kb-devel-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-devel-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-devel-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-devel-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-docs-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-macros-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-obs-build-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-obs-build-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-source-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-syms-5.14.21-150400.24.170.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-syms-5.14.21-150400.24.170.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:reiserfs-kmp-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:reiserfs-kmp-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-64kb-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-64kb-devel-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-devel-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-docs-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-macros-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-source-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.170.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.170.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_170-default-1-150400.9.3.2.ppc64le",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_170-default-1-150400.9.3.2.s390x",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_170-default-1-150400.9.3.2.x86_64",
            "SUSE Linux Enterprise Micro 5.3:kernel-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise Micro 5.3:kernel-default-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise Micro 5.3:kernel-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Micro 5.3:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.aarch64",
            "SUSE Linux Enterprise Micro 5.3:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
            "SUSE Linux Enterprise Micro 5.4:kernel-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise Micro 5.4:kernel-default-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise Micro 5.4:kernel-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Micro 5.4:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.aarch64",
            "SUSE Linux Enterprise Micro 5.4:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-64kb-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-64kb-devel-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.aarch64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.ppc64le",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-devel-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-docs-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-macros-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-source-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.170.1.aarch64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.170.1.ppc64le",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.170.1.s390x",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.170.1.x86_64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-zfcpdump-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-devel-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-devel-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-devel-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-docs-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-macros-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-obs-build-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-obs-build-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-source-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-syms-5.14.21-150400.24.170.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-syms-5.14.21-150400.24.170.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Manager Proxy 4.3:kernel-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Manager Proxy 4.3:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
            "SUSE Manager Proxy 4.3:kernel-default-devel-5.14.21-150400.24.170.2.x86_64",
            "SUSE Manager Proxy 4.3:kernel-devel-5.14.21-150400.24.170.1.noarch",
            "SUSE Manager Proxy 4.3:kernel-macros-5.14.21-150400.24.170.1.noarch",
            "SUSE Manager Proxy 4.3:kernel-source-5.14.21-150400.24.170.1.noarch",
            "SUSE Manager Proxy 4.3:kernel-syms-5.14.21-150400.24.170.1.x86_64",
            "SUSE Manager Server 4.3:kernel-default-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Manager Server 4.3:kernel-default-5.14.21-150400.24.170.2.s390x",
            "SUSE Manager Server 4.3:kernel-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Manager Server 4.3:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.ppc64le",
            "SUSE Manager Server 4.3:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
            "SUSE Manager Server 4.3:kernel-default-devel-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Manager Server 4.3:kernel-default-devel-5.14.21-150400.24.170.2.s390x",
            "SUSE Manager Server 4.3:kernel-default-devel-5.14.21-150400.24.170.2.x86_64",
            "SUSE Manager Server 4.3:kernel-devel-5.14.21-150400.24.170.1.noarch",
            "SUSE Manager Server 4.3:kernel-macros-5.14.21-150400.24.170.1.noarch",
            "SUSE Manager Server 4.3:kernel-source-5.14.21-150400.24.170.1.noarch",
            "SUSE Manager Server 4.3:kernel-syms-5.14.21-150400.24.170.1.ppc64le",
            "SUSE Manager Server 4.3:kernel-syms-5.14.21-150400.24.170.1.s390x",
            "SUSE Manager Server 4.3:kernel-syms-5.14.21-150400.24.170.1.x86_64",
            "SUSE Manager Server 4.3:kernel-zfcpdump-5.14.21-150400.24.170.2.s390x"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 5.5,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
            "version": "3.1"
          },
          "products": [
            "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-64kb-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-64kb-devel-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-devel-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-devel-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-devel-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-docs-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-macros-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-obs-build-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-obs-build-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-source-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-syms-5.14.21-150400.24.170.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-syms-5.14.21-150400.24.170.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:reiserfs-kmp-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:reiserfs-kmp-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-64kb-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-64kb-devel-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-devel-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-docs-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-macros-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-source-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.170.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.170.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_170-default-1-150400.9.3.2.ppc64le",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_170-default-1-150400.9.3.2.s390x",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_170-default-1-150400.9.3.2.x86_64",
            "SUSE Linux Enterprise Micro 5.3:kernel-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise Micro 5.3:kernel-default-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise Micro 5.3:kernel-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Micro 5.3:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.aarch64",
            "SUSE Linux Enterprise Micro 5.3:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
            "SUSE Linux Enterprise Micro 5.4:kernel-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise Micro 5.4:kernel-default-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise Micro 5.4:kernel-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Micro 5.4:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.aarch64",
            "SUSE Linux Enterprise Micro 5.4:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-64kb-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-64kb-devel-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.aarch64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.ppc64le",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-devel-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-docs-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-macros-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-source-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.170.1.aarch64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.170.1.ppc64le",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.170.1.s390x",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.170.1.x86_64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-zfcpdump-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-devel-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-devel-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-devel-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-docs-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-macros-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-obs-build-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-obs-build-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-source-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-syms-5.14.21-150400.24.170.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-syms-5.14.21-150400.24.170.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Manager Proxy 4.3:kernel-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Manager Proxy 4.3:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
            "SUSE Manager Proxy 4.3:kernel-default-devel-5.14.21-150400.24.170.2.x86_64",
            "SUSE Manager Proxy 4.3:kernel-devel-5.14.21-150400.24.170.1.noarch",
            "SUSE Manager Proxy 4.3:kernel-macros-5.14.21-150400.24.170.1.noarch",
            "SUSE Manager Proxy 4.3:kernel-source-5.14.21-150400.24.170.1.noarch",
            "SUSE Manager Proxy 4.3:kernel-syms-5.14.21-150400.24.170.1.x86_64",
            "SUSE Manager Server 4.3:kernel-default-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Manager Server 4.3:kernel-default-5.14.21-150400.24.170.2.s390x",
            "SUSE Manager Server 4.3:kernel-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Manager Server 4.3:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.ppc64le",
            "SUSE Manager Server 4.3:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
            "SUSE Manager Server 4.3:kernel-default-devel-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Manager Server 4.3:kernel-default-devel-5.14.21-150400.24.170.2.s390x",
            "SUSE Manager Server 4.3:kernel-default-devel-5.14.21-150400.24.170.2.x86_64",
            "SUSE Manager Server 4.3:kernel-devel-5.14.21-150400.24.170.1.noarch",
            "SUSE Manager Server 4.3:kernel-macros-5.14.21-150400.24.170.1.noarch",
            "SUSE Manager Server 4.3:kernel-source-5.14.21-150400.24.170.1.noarch",
            "SUSE Manager Server 4.3:kernel-syms-5.14.21-150400.24.170.1.ppc64le",
            "SUSE Manager Server 4.3:kernel-syms-5.14.21-150400.24.170.1.s390x",
            "SUSE Manager Server 4.3:kernel-syms-5.14.21-150400.24.170.1.x86_64",
            "SUSE Manager Server 4.3:kernel-zfcpdump-5.14.21-150400.24.170.2.s390x"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2025-07-28T15:09:33Z",
          "details": "moderate"
        }
      ],
      "title": "CVE-2022-50142"
    },
    {
      "cve": "CVE-2022-50143",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2022-50143"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "In the Linux kernel, the following vulnerability has been resolved:\n\nintel_th: Fix a resource leak in an error handling path\n\nIf an error occurs after calling \u0027pci_alloc_irq_vectors()\u0027,\n\u0027pci_free_irq_vectors()\u0027 must be called as already done in the remove\nfunction.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.170.2.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.170.2.s390x",
          "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.170.2.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.170.2.s390x",
          "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.170.2.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.170.2.s390x",
          "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.170.2.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.170.2.s390x",
          "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-64kb-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-64kb-devel-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-devel-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-devel-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-devel-5.14.21-150400.24.170.1.noarch",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-docs-5.14.21-150400.24.170.1.noarch",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-macros-5.14.21-150400.24.170.1.noarch",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-obs-build-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-obs-build-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-source-5.14.21-150400.24.170.1.noarch",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-syms-5.14.21-150400.24.170.1.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-syms-5.14.21-150400.24.170.1.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:reiserfs-kmp-default-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:reiserfs-kmp-default-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-64kb-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-64kb-devel-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-devel-5.14.21-150400.24.170.1.noarch",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-docs-5.14.21-150400.24.170.1.noarch",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-macros-5.14.21-150400.24.170.1.noarch",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-source-5.14.21-150400.24.170.1.noarch",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.170.1.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.170.1.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.170.2.ppc64le",
          "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.170.2.s390x",
          "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.170.2.ppc64le",
          "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.170.2.s390x",
          "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_170-default-1-150400.9.3.2.ppc64le",
          "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_170-default-1-150400.9.3.2.s390x",
          "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_170-default-1-150400.9.3.2.x86_64",
          "SUSE Linux Enterprise Micro 5.3:kernel-default-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise Micro 5.3:kernel-default-5.14.21-150400.24.170.2.s390x",
          "SUSE Linux Enterprise Micro 5.3:kernel-default-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise Micro 5.3:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.aarch64",
          "SUSE Linux Enterprise Micro 5.3:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
          "SUSE Linux Enterprise Micro 5.4:kernel-default-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise Micro 5.4:kernel-default-5.14.21-150400.24.170.2.s390x",
          "SUSE Linux Enterprise Micro 5.4:kernel-default-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise Micro 5.4:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.aarch64",
          "SUSE Linux Enterprise Micro 5.4:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-64kb-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-64kb-devel-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-5.14.21-150400.24.170.2.ppc64le",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-5.14.21-150400.24.170.2.s390x",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.aarch64",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.ppc64le",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.170.2.ppc64le",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.170.2.s390x",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-devel-5.14.21-150400.24.170.1.noarch",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-docs-5.14.21-150400.24.170.1.noarch",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-macros-5.14.21-150400.24.170.1.noarch",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.170.2.ppc64le",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.170.2.s390x",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-source-5.14.21-150400.24.170.1.noarch",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.170.1.aarch64",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.170.1.ppc64le",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.170.1.s390x",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.170.1.x86_64",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-zfcpdump-5.14.21-150400.24.170.2.s390x",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.170.2.ppc64le",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.170.2.s390x",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-5.14.21-150400.24.170.2.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-devel-5.14.21-150400.24.170.2.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-devel-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-devel-5.14.21-150400.24.170.1.noarch",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-docs-5.14.21-150400.24.170.1.noarch",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-macros-5.14.21-150400.24.170.1.noarch",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-obs-build-5.14.21-150400.24.170.2.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-obs-build-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-source-5.14.21-150400.24.170.1.noarch",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-syms-5.14.21-150400.24.170.1.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-syms-5.14.21-150400.24.170.1.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.170.2.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.170.2.x86_64",
          "SUSE Manager Proxy 4.3:kernel-default-5.14.21-150400.24.170.2.x86_64",
          "SUSE Manager Proxy 4.3:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
          "SUSE Manager Proxy 4.3:kernel-default-devel-5.14.21-150400.24.170.2.x86_64",
          "SUSE Manager Proxy 4.3:kernel-devel-5.14.21-150400.24.170.1.noarch",
          "SUSE Manager Proxy 4.3:kernel-macros-5.14.21-150400.24.170.1.noarch",
          "SUSE Manager Proxy 4.3:kernel-source-5.14.21-150400.24.170.1.noarch",
          "SUSE Manager Proxy 4.3:kernel-syms-5.14.21-150400.24.170.1.x86_64",
          "SUSE Manager Server 4.3:kernel-default-5.14.21-150400.24.170.2.ppc64le",
          "SUSE Manager Server 4.3:kernel-default-5.14.21-150400.24.170.2.s390x",
          "SUSE Manager Server 4.3:kernel-default-5.14.21-150400.24.170.2.x86_64",
          "SUSE Manager Server 4.3:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.ppc64le",
          "SUSE Manager Server 4.3:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
          "SUSE Manager Server 4.3:kernel-default-devel-5.14.21-150400.24.170.2.ppc64le",
          "SUSE Manager Server 4.3:kernel-default-devel-5.14.21-150400.24.170.2.s390x",
          "SUSE Manager Server 4.3:kernel-default-devel-5.14.21-150400.24.170.2.x86_64",
          "SUSE Manager Server 4.3:kernel-devel-5.14.21-150400.24.170.1.noarch",
          "SUSE Manager Server 4.3:kernel-macros-5.14.21-150400.24.170.1.noarch",
          "SUSE Manager Server 4.3:kernel-source-5.14.21-150400.24.170.1.noarch",
          "SUSE Manager Server 4.3:kernel-syms-5.14.21-150400.24.170.1.ppc64le",
          "SUSE Manager Server 4.3:kernel-syms-5.14.21-150400.24.170.1.s390x",
          "SUSE Manager Server 4.3:kernel-syms-5.14.21-150400.24.170.1.x86_64",
          "SUSE Manager Server 4.3:kernel-zfcpdump-5.14.21-150400.24.170.2.s390x"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2022-50143",
          "url": "https://www.suse.com/security/cve/CVE-2022-50143"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1244790 for CVE-2022-50143",
          "url": "https://bugzilla.suse.com/1244790"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-64kb-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-64kb-devel-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-devel-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-devel-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-devel-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-docs-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-macros-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-obs-build-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-obs-build-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-source-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-syms-5.14.21-150400.24.170.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-syms-5.14.21-150400.24.170.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:reiserfs-kmp-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:reiserfs-kmp-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-64kb-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-64kb-devel-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-devel-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-docs-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-macros-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-source-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.170.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.170.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_170-default-1-150400.9.3.2.ppc64le",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_170-default-1-150400.9.3.2.s390x",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_170-default-1-150400.9.3.2.x86_64",
            "SUSE Linux Enterprise Micro 5.3:kernel-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise Micro 5.3:kernel-default-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise Micro 5.3:kernel-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Micro 5.3:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.aarch64",
            "SUSE Linux Enterprise Micro 5.3:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
            "SUSE Linux Enterprise Micro 5.4:kernel-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise Micro 5.4:kernel-default-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise Micro 5.4:kernel-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Micro 5.4:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.aarch64",
            "SUSE Linux Enterprise Micro 5.4:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-64kb-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-64kb-devel-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.aarch64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.ppc64le",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-devel-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-docs-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-macros-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-source-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.170.1.aarch64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.170.1.ppc64le",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.170.1.s390x",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.170.1.x86_64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-zfcpdump-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-devel-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-devel-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-devel-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-docs-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-macros-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-obs-build-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-obs-build-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-source-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-syms-5.14.21-150400.24.170.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-syms-5.14.21-150400.24.170.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Manager Proxy 4.3:kernel-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Manager Proxy 4.3:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
            "SUSE Manager Proxy 4.3:kernel-default-devel-5.14.21-150400.24.170.2.x86_64",
            "SUSE Manager Proxy 4.3:kernel-devel-5.14.21-150400.24.170.1.noarch",
            "SUSE Manager Proxy 4.3:kernel-macros-5.14.21-150400.24.170.1.noarch",
            "SUSE Manager Proxy 4.3:kernel-source-5.14.21-150400.24.170.1.noarch",
            "SUSE Manager Proxy 4.3:kernel-syms-5.14.21-150400.24.170.1.x86_64",
            "SUSE Manager Server 4.3:kernel-default-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Manager Server 4.3:kernel-default-5.14.21-150400.24.170.2.s390x",
            "SUSE Manager Server 4.3:kernel-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Manager Server 4.3:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.ppc64le",
            "SUSE Manager Server 4.3:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
            "SUSE Manager Server 4.3:kernel-default-devel-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Manager Server 4.3:kernel-default-devel-5.14.21-150400.24.170.2.s390x",
            "SUSE Manager Server 4.3:kernel-default-devel-5.14.21-150400.24.170.2.x86_64",
            "SUSE Manager Server 4.3:kernel-devel-5.14.21-150400.24.170.1.noarch",
            "SUSE Manager Server 4.3:kernel-macros-5.14.21-150400.24.170.1.noarch",
            "SUSE Manager Server 4.3:kernel-source-5.14.21-150400.24.170.1.noarch",
            "SUSE Manager Server 4.3:kernel-syms-5.14.21-150400.24.170.1.ppc64le",
            "SUSE Manager Server 4.3:kernel-syms-5.14.21-150400.24.170.1.s390x",
            "SUSE Manager Server 4.3:kernel-syms-5.14.21-150400.24.170.1.x86_64",
            "SUSE Manager Server 4.3:kernel-zfcpdump-5.14.21-150400.24.170.2.s390x"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 5.5,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
            "version": "3.1"
          },
          "products": [
            "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-64kb-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-64kb-devel-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-devel-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-devel-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-devel-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-docs-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-macros-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-obs-build-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-obs-build-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-source-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-syms-5.14.21-150400.24.170.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-syms-5.14.21-150400.24.170.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:reiserfs-kmp-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:reiserfs-kmp-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-64kb-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-64kb-devel-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-devel-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-docs-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-macros-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-source-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.170.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.170.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_170-default-1-150400.9.3.2.ppc64le",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_170-default-1-150400.9.3.2.s390x",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_170-default-1-150400.9.3.2.x86_64",
            "SUSE Linux Enterprise Micro 5.3:kernel-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise Micro 5.3:kernel-default-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise Micro 5.3:kernel-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Micro 5.3:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.aarch64",
            "SUSE Linux Enterprise Micro 5.3:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
            "SUSE Linux Enterprise Micro 5.4:kernel-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise Micro 5.4:kernel-default-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise Micro 5.4:kernel-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Micro 5.4:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.aarch64",
            "SUSE Linux Enterprise Micro 5.4:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-64kb-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-64kb-devel-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.aarch64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.ppc64le",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-devel-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-docs-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-macros-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-source-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.170.1.aarch64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.170.1.ppc64le",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.170.1.s390x",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.170.1.x86_64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-zfcpdump-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-devel-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-devel-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-devel-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-docs-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-macros-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-obs-build-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-obs-build-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-source-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-syms-5.14.21-150400.24.170.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-syms-5.14.21-150400.24.170.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Manager Proxy 4.3:kernel-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Manager Proxy 4.3:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
            "SUSE Manager Proxy 4.3:kernel-default-devel-5.14.21-150400.24.170.2.x86_64",
            "SUSE Manager Proxy 4.3:kernel-devel-5.14.21-150400.24.170.1.noarch",
            "SUSE Manager Proxy 4.3:kernel-macros-5.14.21-150400.24.170.1.noarch",
            "SUSE Manager Proxy 4.3:kernel-source-5.14.21-150400.24.170.1.noarch",
            "SUSE Manager Proxy 4.3:kernel-syms-5.14.21-150400.24.170.1.x86_64",
            "SUSE Manager Server 4.3:kernel-default-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Manager Server 4.3:kernel-default-5.14.21-150400.24.170.2.s390x",
            "SUSE Manager Server 4.3:kernel-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Manager Server 4.3:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.ppc64le",
            "SUSE Manager Server 4.3:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
            "SUSE Manager Server 4.3:kernel-default-devel-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Manager Server 4.3:kernel-default-devel-5.14.21-150400.24.170.2.s390x",
            "SUSE Manager Server 4.3:kernel-default-devel-5.14.21-150400.24.170.2.x86_64",
            "SUSE Manager Server 4.3:kernel-devel-5.14.21-150400.24.170.1.noarch",
            "SUSE Manager Server 4.3:kernel-macros-5.14.21-150400.24.170.1.noarch",
            "SUSE Manager Server 4.3:kernel-source-5.14.21-150400.24.170.1.noarch",
            "SUSE Manager Server 4.3:kernel-syms-5.14.21-150400.24.170.1.ppc64le",
            "SUSE Manager Server 4.3:kernel-syms-5.14.21-150400.24.170.1.s390x",
            "SUSE Manager Server 4.3:kernel-syms-5.14.21-150400.24.170.1.x86_64",
            "SUSE Manager Server 4.3:kernel-zfcpdump-5.14.21-150400.24.170.2.s390x"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2025-07-28T15:09:33Z",
          "details": "moderate"
        }
      ],
      "title": "CVE-2022-50143"
    },
    {
      "cve": "CVE-2022-50145",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2022-50145"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "In the Linux kernel, the following vulnerability has been resolved:\n\ndmaengine: sf-pdma: Add multithread support for a DMA channel\n\nWhen we get a DMA channel and try to use it in multiple threads it\nwill cause oops and hanging the system.\n\n% echo 64 \u003e /sys/module/dmatest/parameters/threads_per_chan\n% echo 10000 \u003e /sys/module/dmatest/parameters/iterations\n% echo 1 \u003e /sys/module/dmatest/parameters/run\n[   89.480664] Unable to handle kernel NULL pointer dereference at virtual\n               address 00000000000000a0\n[   89.488725] Oops [#1]\n[   89.494708] CPU: 2 PID: 1008 Comm: dma0chan0-copy0 Not tainted\n               5.17.0-rc5\n[   89.509385] epc : vchan_find_desc+0x32/0x46\n[   89.513553]  ra : sf_pdma_tx_status+0xca/0xd6\n\nThis happens because of data race. Each thread rewrite channels\u0027s\ndescriptor as soon as device_prep_dma_memcpy() is called. It leads to the\nsituation when the driver thinks that it uses right descriptor that\nactually is freed or substituted for other one.\n\nWith current fixes a descriptor changes its value only when it has\nbeen used. A new descriptor is acquired from vc-\u003edesc_issued queue that\nis already filled with descriptors that are ready to be sent. Threads\nhave no direct access to DMA channel descriptor. Now it is just possible\nto queue a descriptor for further processing.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.170.2.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.170.2.s390x",
          "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.170.2.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.170.2.s390x",
          "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.170.2.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.170.2.s390x",
          "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.170.2.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.170.2.s390x",
          "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-64kb-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-64kb-devel-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-devel-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-devel-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-devel-5.14.21-150400.24.170.1.noarch",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-docs-5.14.21-150400.24.170.1.noarch",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-macros-5.14.21-150400.24.170.1.noarch",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-obs-build-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-obs-build-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-source-5.14.21-150400.24.170.1.noarch",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-syms-5.14.21-150400.24.170.1.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-syms-5.14.21-150400.24.170.1.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:reiserfs-kmp-default-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:reiserfs-kmp-default-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-64kb-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-64kb-devel-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-devel-5.14.21-150400.24.170.1.noarch",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-docs-5.14.21-150400.24.170.1.noarch",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-macros-5.14.21-150400.24.170.1.noarch",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-source-5.14.21-150400.24.170.1.noarch",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.170.1.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.170.1.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.170.2.ppc64le",
          "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.170.2.s390x",
          "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.170.2.ppc64le",
          "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.170.2.s390x",
          "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_170-default-1-150400.9.3.2.ppc64le",
          "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_170-default-1-150400.9.3.2.s390x",
          "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_170-default-1-150400.9.3.2.x86_64",
          "SUSE Linux Enterprise Micro 5.3:kernel-default-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise Micro 5.3:kernel-default-5.14.21-150400.24.170.2.s390x",
          "SUSE Linux Enterprise Micro 5.3:kernel-default-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise Micro 5.3:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.aarch64",
          "SUSE Linux Enterprise Micro 5.3:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
          "SUSE Linux Enterprise Micro 5.4:kernel-default-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise Micro 5.4:kernel-default-5.14.21-150400.24.170.2.s390x",
          "SUSE Linux Enterprise Micro 5.4:kernel-default-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise Micro 5.4:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.aarch64",
          "SUSE Linux Enterprise Micro 5.4:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-64kb-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-64kb-devel-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-5.14.21-150400.24.170.2.ppc64le",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-5.14.21-150400.24.170.2.s390x",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.aarch64",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.ppc64le",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.170.2.ppc64le",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.170.2.s390x",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-devel-5.14.21-150400.24.170.1.noarch",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-docs-5.14.21-150400.24.170.1.noarch",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-macros-5.14.21-150400.24.170.1.noarch",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.170.2.ppc64le",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.170.2.s390x",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-source-5.14.21-150400.24.170.1.noarch",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.170.1.aarch64",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.170.1.ppc64le",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.170.1.s390x",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.170.1.x86_64",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-zfcpdump-5.14.21-150400.24.170.2.s390x",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.170.2.ppc64le",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.170.2.s390x",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-5.14.21-150400.24.170.2.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-devel-5.14.21-150400.24.170.2.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-devel-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-devel-5.14.21-150400.24.170.1.noarch",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-docs-5.14.21-150400.24.170.1.noarch",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-macros-5.14.21-150400.24.170.1.noarch",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-obs-build-5.14.21-150400.24.170.2.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-obs-build-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-source-5.14.21-150400.24.170.1.noarch",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-syms-5.14.21-150400.24.170.1.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-syms-5.14.21-150400.24.170.1.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.170.2.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.170.2.x86_64",
          "SUSE Manager Proxy 4.3:kernel-default-5.14.21-150400.24.170.2.x86_64",
          "SUSE Manager Proxy 4.3:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
          "SUSE Manager Proxy 4.3:kernel-default-devel-5.14.21-150400.24.170.2.x86_64",
          "SUSE Manager Proxy 4.3:kernel-devel-5.14.21-150400.24.170.1.noarch",
          "SUSE Manager Proxy 4.3:kernel-macros-5.14.21-150400.24.170.1.noarch",
          "SUSE Manager Proxy 4.3:kernel-source-5.14.21-150400.24.170.1.noarch",
          "SUSE Manager Proxy 4.3:kernel-syms-5.14.21-150400.24.170.1.x86_64",
          "SUSE Manager Server 4.3:kernel-default-5.14.21-150400.24.170.2.ppc64le",
          "SUSE Manager Server 4.3:kernel-default-5.14.21-150400.24.170.2.s390x",
          "SUSE Manager Server 4.3:kernel-default-5.14.21-150400.24.170.2.x86_64",
          "SUSE Manager Server 4.3:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.ppc64le",
          "SUSE Manager Server 4.3:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
          "SUSE Manager Server 4.3:kernel-default-devel-5.14.21-150400.24.170.2.ppc64le",
          "SUSE Manager Server 4.3:kernel-default-devel-5.14.21-150400.24.170.2.s390x",
          "SUSE Manager Server 4.3:kernel-default-devel-5.14.21-150400.24.170.2.x86_64",
          "SUSE Manager Server 4.3:kernel-devel-5.14.21-150400.24.170.1.noarch",
          "SUSE Manager Server 4.3:kernel-macros-5.14.21-150400.24.170.1.noarch",
          "SUSE Manager Server 4.3:kernel-source-5.14.21-150400.24.170.1.noarch",
          "SUSE Manager Server 4.3:kernel-syms-5.14.21-150400.24.170.1.ppc64le",
          "SUSE Manager Server 4.3:kernel-syms-5.14.21-150400.24.170.1.s390x",
          "SUSE Manager Server 4.3:kernel-syms-5.14.21-150400.24.170.1.x86_64",
          "SUSE Manager Server 4.3:kernel-zfcpdump-5.14.21-150400.24.170.2.s390x"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2022-50145",
          "url": "https://www.suse.com/security/cve/CVE-2022-50145"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1244787 for CVE-2022-50145",
          "url": "https://bugzilla.suse.com/1244787"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-64kb-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-64kb-devel-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-devel-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-devel-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-devel-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-docs-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-macros-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-obs-build-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-obs-build-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-source-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-syms-5.14.21-150400.24.170.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-syms-5.14.21-150400.24.170.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:reiserfs-kmp-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:reiserfs-kmp-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-64kb-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-64kb-devel-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-devel-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-docs-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-macros-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-source-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.170.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.170.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_170-default-1-150400.9.3.2.ppc64le",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_170-default-1-150400.9.3.2.s390x",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_170-default-1-150400.9.3.2.x86_64",
            "SUSE Linux Enterprise Micro 5.3:kernel-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise Micro 5.3:kernel-default-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise Micro 5.3:kernel-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Micro 5.3:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.aarch64",
            "SUSE Linux Enterprise Micro 5.3:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
            "SUSE Linux Enterprise Micro 5.4:kernel-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise Micro 5.4:kernel-default-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise Micro 5.4:kernel-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Micro 5.4:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.aarch64",
            "SUSE Linux Enterprise Micro 5.4:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-64kb-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-64kb-devel-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.aarch64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.ppc64le",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-devel-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-docs-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-macros-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-source-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.170.1.aarch64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.170.1.ppc64le",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.170.1.s390x",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.170.1.x86_64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-zfcpdump-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-devel-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-devel-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-devel-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-docs-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-macros-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-obs-build-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-obs-build-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-source-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-syms-5.14.21-150400.24.170.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-syms-5.14.21-150400.24.170.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Manager Proxy 4.3:kernel-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Manager Proxy 4.3:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
            "SUSE Manager Proxy 4.3:kernel-default-devel-5.14.21-150400.24.170.2.x86_64",
            "SUSE Manager Proxy 4.3:kernel-devel-5.14.21-150400.24.170.1.noarch",
            "SUSE Manager Proxy 4.3:kernel-macros-5.14.21-150400.24.170.1.noarch",
            "SUSE Manager Proxy 4.3:kernel-source-5.14.21-150400.24.170.1.noarch",
            "SUSE Manager Proxy 4.3:kernel-syms-5.14.21-150400.24.170.1.x86_64",
            "SUSE Manager Server 4.3:kernel-default-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Manager Server 4.3:kernel-default-5.14.21-150400.24.170.2.s390x",
            "SUSE Manager Server 4.3:kernel-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Manager Server 4.3:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.ppc64le",
            "SUSE Manager Server 4.3:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
            "SUSE Manager Server 4.3:kernel-default-devel-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Manager Server 4.3:kernel-default-devel-5.14.21-150400.24.170.2.s390x",
            "SUSE Manager Server 4.3:kernel-default-devel-5.14.21-150400.24.170.2.x86_64",
            "SUSE Manager Server 4.3:kernel-devel-5.14.21-150400.24.170.1.noarch",
            "SUSE Manager Server 4.3:kernel-macros-5.14.21-150400.24.170.1.noarch",
            "SUSE Manager Server 4.3:kernel-source-5.14.21-150400.24.170.1.noarch",
            "SUSE Manager Server 4.3:kernel-syms-5.14.21-150400.24.170.1.ppc64le",
            "SUSE Manager Server 4.3:kernel-syms-5.14.21-150400.24.170.1.s390x",
            "SUSE Manager Server 4.3:kernel-syms-5.14.21-150400.24.170.1.x86_64",
            "SUSE Manager Server 4.3:kernel-zfcpdump-5.14.21-150400.24.170.2.s390x"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 5.5,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
            "version": "3.1"
          },
          "products": [
            "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-64kb-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-64kb-devel-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-devel-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-devel-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-devel-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-docs-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-macros-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-obs-build-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-obs-build-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-source-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-syms-5.14.21-150400.24.170.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-syms-5.14.21-150400.24.170.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:reiserfs-kmp-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:reiserfs-kmp-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-64kb-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-64kb-devel-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-devel-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-docs-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-macros-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-source-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.170.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.170.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_170-default-1-150400.9.3.2.ppc64le",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_170-default-1-150400.9.3.2.s390x",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_170-default-1-150400.9.3.2.x86_64",
            "SUSE Linux Enterprise Micro 5.3:kernel-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise Micro 5.3:kernel-default-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise Micro 5.3:kernel-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Micro 5.3:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.aarch64",
            "SUSE Linux Enterprise Micro 5.3:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
            "SUSE Linux Enterprise Micro 5.4:kernel-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise Micro 5.4:kernel-default-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise Micro 5.4:kernel-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Micro 5.4:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.aarch64",
            "SUSE Linux Enterprise Micro 5.4:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-64kb-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-64kb-devel-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.aarch64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.ppc64le",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-devel-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-docs-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-macros-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-source-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.170.1.aarch64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.170.1.ppc64le",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.170.1.s390x",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.170.1.x86_64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-zfcpdump-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-devel-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-devel-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-devel-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-docs-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-macros-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-obs-build-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-obs-build-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-source-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-syms-5.14.21-150400.24.170.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-syms-5.14.21-150400.24.170.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Manager Proxy 4.3:kernel-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Manager Proxy 4.3:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
            "SUSE Manager Proxy 4.3:kernel-default-devel-5.14.21-150400.24.170.2.x86_64",
            "SUSE Manager Proxy 4.3:kernel-devel-5.14.21-150400.24.170.1.noarch",
            "SUSE Manager Proxy 4.3:kernel-macros-5.14.21-150400.24.170.1.noarch",
            "SUSE Manager Proxy 4.3:kernel-source-5.14.21-150400.24.170.1.noarch",
            "SUSE Manager Proxy 4.3:kernel-syms-5.14.21-150400.24.170.1.x86_64",
            "SUSE Manager Server 4.3:kernel-default-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Manager Server 4.3:kernel-default-5.14.21-150400.24.170.2.s390x",
            "SUSE Manager Server 4.3:kernel-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Manager Server 4.3:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.ppc64le",
            "SUSE Manager Server 4.3:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
            "SUSE Manager Server 4.3:kernel-default-devel-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Manager Server 4.3:kernel-default-devel-5.14.21-150400.24.170.2.s390x",
            "SUSE Manager Server 4.3:kernel-default-devel-5.14.21-150400.24.170.2.x86_64",
            "SUSE Manager Server 4.3:kernel-devel-5.14.21-150400.24.170.1.noarch",
            "SUSE Manager Server 4.3:kernel-macros-5.14.21-150400.24.170.1.noarch",
            "SUSE Manager Server 4.3:kernel-source-5.14.21-150400.24.170.1.noarch",
            "SUSE Manager Server 4.3:kernel-syms-5.14.21-150400.24.170.1.ppc64le",
            "SUSE Manager Server 4.3:kernel-syms-5.14.21-150400.24.170.1.s390x",
            "SUSE Manager Server 4.3:kernel-syms-5.14.21-150400.24.170.1.x86_64",
            "SUSE Manager Server 4.3:kernel-zfcpdump-5.14.21-150400.24.170.2.s390x"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2025-07-28T15:09:33Z",
          "details": "moderate"
        }
      ],
      "title": "CVE-2022-50145"
    },
    {
      "cve": "CVE-2022-50146",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2022-50146"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "In the Linux kernel, the following vulnerability has been resolved:\n\nPCI: dwc: Deallocate EPC memory on dw_pcie_ep_init() errors\n\nIf dw_pcie_ep_init() fails to perform any action after the EPC memory is\ninitialized and the MSI memory region is allocated, the latter parts won\u0027t\nbe undone thus causing a memory leak.  Add a cleanup-on-error path to fix\nthese leaks.\n\n[bhelgaas: commit log]",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.170.2.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.170.2.s390x",
          "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.170.2.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.170.2.s390x",
          "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.170.2.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.170.2.s390x",
          "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.170.2.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.170.2.s390x",
          "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-64kb-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-64kb-devel-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-devel-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-devel-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-devel-5.14.21-150400.24.170.1.noarch",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-docs-5.14.21-150400.24.170.1.noarch",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-macros-5.14.21-150400.24.170.1.noarch",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-obs-build-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-obs-build-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-source-5.14.21-150400.24.170.1.noarch",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-syms-5.14.21-150400.24.170.1.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-syms-5.14.21-150400.24.170.1.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:reiserfs-kmp-default-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:reiserfs-kmp-default-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-64kb-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-64kb-devel-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-devel-5.14.21-150400.24.170.1.noarch",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-docs-5.14.21-150400.24.170.1.noarch",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-macros-5.14.21-150400.24.170.1.noarch",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-source-5.14.21-150400.24.170.1.noarch",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.170.1.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.170.1.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.170.2.ppc64le",
          "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.170.2.s390x",
          "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.170.2.ppc64le",
          "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.170.2.s390x",
          "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_170-default-1-150400.9.3.2.ppc64le",
          "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_170-default-1-150400.9.3.2.s390x",
          "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_170-default-1-150400.9.3.2.x86_64",
          "SUSE Linux Enterprise Micro 5.3:kernel-default-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise Micro 5.3:kernel-default-5.14.21-150400.24.170.2.s390x",
          "SUSE Linux Enterprise Micro 5.3:kernel-default-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise Micro 5.3:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.aarch64",
          "SUSE Linux Enterprise Micro 5.3:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
          "SUSE Linux Enterprise Micro 5.4:kernel-default-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise Micro 5.4:kernel-default-5.14.21-150400.24.170.2.s390x",
          "SUSE Linux Enterprise Micro 5.4:kernel-default-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise Micro 5.4:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.aarch64",
          "SUSE Linux Enterprise Micro 5.4:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-64kb-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-64kb-devel-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-5.14.21-150400.24.170.2.ppc64le",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-5.14.21-150400.24.170.2.s390x",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.aarch64",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.ppc64le",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.170.2.ppc64le",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.170.2.s390x",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-devel-5.14.21-150400.24.170.1.noarch",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-docs-5.14.21-150400.24.170.1.noarch",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-macros-5.14.21-150400.24.170.1.noarch",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.170.2.ppc64le",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.170.2.s390x",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-source-5.14.21-150400.24.170.1.noarch",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.170.1.aarch64",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.170.1.ppc64le",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.170.1.s390x",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.170.1.x86_64",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-zfcpdump-5.14.21-150400.24.170.2.s390x",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.170.2.ppc64le",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.170.2.s390x",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-5.14.21-150400.24.170.2.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-devel-5.14.21-150400.24.170.2.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-devel-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-devel-5.14.21-150400.24.170.1.noarch",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-docs-5.14.21-150400.24.170.1.noarch",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-macros-5.14.21-150400.24.170.1.noarch",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-obs-build-5.14.21-150400.24.170.2.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-obs-build-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-source-5.14.21-150400.24.170.1.noarch",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-syms-5.14.21-150400.24.170.1.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-syms-5.14.21-150400.24.170.1.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.170.2.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.170.2.x86_64",
          "SUSE Manager Proxy 4.3:kernel-default-5.14.21-150400.24.170.2.x86_64",
          "SUSE Manager Proxy 4.3:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
          "SUSE Manager Proxy 4.3:kernel-default-devel-5.14.21-150400.24.170.2.x86_64",
          "SUSE Manager Proxy 4.3:kernel-devel-5.14.21-150400.24.170.1.noarch",
          "SUSE Manager Proxy 4.3:kernel-macros-5.14.21-150400.24.170.1.noarch",
          "SUSE Manager Proxy 4.3:kernel-source-5.14.21-150400.24.170.1.noarch",
          "SUSE Manager Proxy 4.3:kernel-syms-5.14.21-150400.24.170.1.x86_64",
          "SUSE Manager Server 4.3:kernel-default-5.14.21-150400.24.170.2.ppc64le",
          "SUSE Manager Server 4.3:kernel-default-5.14.21-150400.24.170.2.s390x",
          "SUSE Manager Server 4.3:kernel-default-5.14.21-150400.24.170.2.x86_64",
          "SUSE Manager Server 4.3:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.ppc64le",
          "SUSE Manager Server 4.3:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
          "SUSE Manager Server 4.3:kernel-default-devel-5.14.21-150400.24.170.2.ppc64le",
          "SUSE Manager Server 4.3:kernel-default-devel-5.14.21-150400.24.170.2.s390x",
          "SUSE Manager Server 4.3:kernel-default-devel-5.14.21-150400.24.170.2.x86_64",
          "SUSE Manager Server 4.3:kernel-devel-5.14.21-150400.24.170.1.noarch",
          "SUSE Manager Server 4.3:kernel-macros-5.14.21-150400.24.170.1.noarch",
          "SUSE Manager Server 4.3:kernel-source-5.14.21-150400.24.170.1.noarch",
          "SUSE Manager Server 4.3:kernel-syms-5.14.21-150400.24.170.1.ppc64le",
          "SUSE Manager Server 4.3:kernel-syms-5.14.21-150400.24.170.1.s390x",
          "SUSE Manager Server 4.3:kernel-syms-5.14.21-150400.24.170.1.x86_64",
          "SUSE Manager Server 4.3:kernel-zfcpdump-5.14.21-150400.24.170.2.s390x"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2022-50146",
          "url": "https://www.suse.com/security/cve/CVE-2022-50146"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1244788 for CVE-2022-50146",
          "url": "https://bugzilla.suse.com/1244788"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-64kb-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-64kb-devel-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-devel-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-devel-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-devel-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-docs-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-macros-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-obs-build-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-obs-build-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-source-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-syms-5.14.21-150400.24.170.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-syms-5.14.21-150400.24.170.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:reiserfs-kmp-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:reiserfs-kmp-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-64kb-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-64kb-devel-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-devel-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-docs-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-macros-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-source-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.170.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.170.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_170-default-1-150400.9.3.2.ppc64le",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_170-default-1-150400.9.3.2.s390x",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_170-default-1-150400.9.3.2.x86_64",
            "SUSE Linux Enterprise Micro 5.3:kernel-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise Micro 5.3:kernel-default-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise Micro 5.3:kernel-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Micro 5.3:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.aarch64",
            "SUSE Linux Enterprise Micro 5.3:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
            "SUSE Linux Enterprise Micro 5.4:kernel-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise Micro 5.4:kernel-default-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise Micro 5.4:kernel-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Micro 5.4:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.aarch64",
            "SUSE Linux Enterprise Micro 5.4:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-64kb-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-64kb-devel-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.aarch64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.ppc64le",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-devel-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-docs-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-macros-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-source-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.170.1.aarch64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.170.1.ppc64le",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.170.1.s390x",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.170.1.x86_64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-zfcpdump-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-devel-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-devel-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-devel-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-docs-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-macros-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-obs-build-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-obs-build-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-source-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-syms-5.14.21-150400.24.170.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-syms-5.14.21-150400.24.170.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Manager Proxy 4.3:kernel-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Manager Proxy 4.3:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
            "SUSE Manager Proxy 4.3:kernel-default-devel-5.14.21-150400.24.170.2.x86_64",
            "SUSE Manager Proxy 4.3:kernel-devel-5.14.21-150400.24.170.1.noarch",
            "SUSE Manager Proxy 4.3:kernel-macros-5.14.21-150400.24.170.1.noarch",
            "SUSE Manager Proxy 4.3:kernel-source-5.14.21-150400.24.170.1.noarch",
            "SUSE Manager Proxy 4.3:kernel-syms-5.14.21-150400.24.170.1.x86_64",
            "SUSE Manager Server 4.3:kernel-default-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Manager Server 4.3:kernel-default-5.14.21-150400.24.170.2.s390x",
            "SUSE Manager Server 4.3:kernel-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Manager Server 4.3:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.ppc64le",
            "SUSE Manager Server 4.3:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
            "SUSE Manager Server 4.3:kernel-default-devel-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Manager Server 4.3:kernel-default-devel-5.14.21-150400.24.170.2.s390x",
            "SUSE Manager Server 4.3:kernel-default-devel-5.14.21-150400.24.170.2.x86_64",
            "SUSE Manager Server 4.3:kernel-devel-5.14.21-150400.24.170.1.noarch",
            "SUSE Manager Server 4.3:kernel-macros-5.14.21-150400.24.170.1.noarch",
            "SUSE Manager Server 4.3:kernel-source-5.14.21-150400.24.170.1.noarch",
            "SUSE Manager Server 4.3:kernel-syms-5.14.21-150400.24.170.1.ppc64le",
            "SUSE Manager Server 4.3:kernel-syms-5.14.21-150400.24.170.1.s390x",
            "SUSE Manager Server 4.3:kernel-syms-5.14.21-150400.24.170.1.x86_64",
            "SUSE Manager Server 4.3:kernel-zfcpdump-5.14.21-150400.24.170.2.s390x"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 5.5,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
            "version": "3.1"
          },
          "products": [
            "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-64kb-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-64kb-devel-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-devel-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-devel-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-devel-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-docs-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-macros-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-obs-build-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-obs-build-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-source-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-syms-5.14.21-150400.24.170.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-syms-5.14.21-150400.24.170.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:reiserfs-kmp-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:reiserfs-kmp-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-64kb-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-64kb-devel-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-devel-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-docs-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-macros-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-source-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.170.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.170.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_170-default-1-150400.9.3.2.ppc64le",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_170-default-1-150400.9.3.2.s390x",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_170-default-1-150400.9.3.2.x86_64",
            "SUSE Linux Enterprise Micro 5.3:kernel-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise Micro 5.3:kernel-default-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise Micro 5.3:kernel-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Micro 5.3:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.aarch64",
            "SUSE Linux Enterprise Micro 5.3:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
            "SUSE Linux Enterprise Micro 5.4:kernel-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise Micro 5.4:kernel-default-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise Micro 5.4:kernel-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Micro 5.4:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.aarch64",
            "SUSE Linux Enterprise Micro 5.4:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-64kb-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-64kb-devel-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.aarch64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.ppc64le",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-devel-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-docs-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-macros-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-source-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.170.1.aarch64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.170.1.ppc64le",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.170.1.s390x",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.170.1.x86_64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-zfcpdump-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-devel-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-devel-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-devel-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-docs-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-macros-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-obs-build-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-obs-build-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-source-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-syms-5.14.21-150400.24.170.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-syms-5.14.21-150400.24.170.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Manager Proxy 4.3:kernel-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Manager Proxy 4.3:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
            "SUSE Manager Proxy 4.3:kernel-default-devel-5.14.21-150400.24.170.2.x86_64",
            "SUSE Manager Proxy 4.3:kernel-devel-5.14.21-150400.24.170.1.noarch",
            "SUSE Manager Proxy 4.3:kernel-macros-5.14.21-150400.24.170.1.noarch",
            "SUSE Manager Proxy 4.3:kernel-source-5.14.21-150400.24.170.1.noarch",
            "SUSE Manager Proxy 4.3:kernel-syms-5.14.21-150400.24.170.1.x86_64",
            "SUSE Manager Server 4.3:kernel-default-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Manager Server 4.3:kernel-default-5.14.21-150400.24.170.2.s390x",
            "SUSE Manager Server 4.3:kernel-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Manager Server 4.3:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.ppc64le",
            "SUSE Manager Server 4.3:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
            "SUSE Manager Server 4.3:kernel-default-devel-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Manager Server 4.3:kernel-default-devel-5.14.21-150400.24.170.2.s390x",
            "SUSE Manager Server 4.3:kernel-default-devel-5.14.21-150400.24.170.2.x86_64",
            "SUSE Manager Server 4.3:kernel-devel-5.14.21-150400.24.170.1.noarch",
            "SUSE Manager Server 4.3:kernel-macros-5.14.21-150400.24.170.1.noarch",
            "SUSE Manager Server 4.3:kernel-source-5.14.21-150400.24.170.1.noarch",
            "SUSE Manager Server 4.3:kernel-syms-5.14.21-150400.24.170.1.ppc64le",
            "SUSE Manager Server 4.3:kernel-syms-5.14.21-150400.24.170.1.s390x",
            "SUSE Manager Server 4.3:kernel-syms-5.14.21-150400.24.170.1.x86_64",
            "SUSE Manager Server 4.3:kernel-zfcpdump-5.14.21-150400.24.170.2.s390x"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2025-07-28T15:09:33Z",
          "details": "moderate"
        }
      ],
      "title": "CVE-2022-50146"
    },
    {
      "cve": "CVE-2022-50149",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2022-50149"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "In the Linux kernel, the following vulnerability has been resolved:\n\ndriver core: fix potential deadlock in __driver_attach\n\nIn __driver_attach function, There are also AA deadlock problem,\nlike the commit b232b02bf3c2 (\"driver core: fix deadlock in\n__device_attach\").\n\nstack like commit b232b02bf3c2 (\"driver core: fix deadlock in\n__device_attach\").\nlist below:\n    In __driver_attach function, The lock holding logic is as follows:\n    ...\n    __driver_attach\n    if (driver_allows_async_probing(drv))\n      device_lock(dev)      // get lock dev\n        async_schedule_dev(__driver_attach_async_helper, dev); // func\n          async_schedule_node\n            async_schedule_node_domain(func)\n              entry = kzalloc(sizeof(struct async_entry), GFP_ATOMIC);\n              /* when fail or work limit, sync to execute func, but\n                 __driver_attach_async_helper will get lock dev as\n                 will, which will lead to A-A deadlock.  */\n              if (!entry || atomic_read(\u0026entry_count) \u003e MAX_WORK) {\n                func;\n              else\n                queue_work_node(node, system_unbound_wq, \u0026entry-\u003ework)\n      device_unlock(dev)\n\n    As above show, when it is allowed to do async probes, because of\n    out of memory or work limit, async work is not be allowed, to do\n    sync execute instead. it will lead to A-A deadlock because of\n    __driver_attach_async_helper getting lock dev.\n\nReproduce:\nand it can be reproduce by make the condition\n(if (!entry || atomic_read(\u0026entry_count) \u003e MAX_WORK)) untenable, like\nbelow:\n\n[  370.785650] \"echo 0 \u003e /proc/sys/kernel/hung_task_timeout_secs\" disables\nthis message.\n[  370.787154] task:swapper/0       state:D stack:    0 pid:    1 ppid:\n0 flags:0x00004000\n[  370.788865] Call Trace:\n[  370.789374]  \u003cTASK\u003e\n[  370.789841]  __schedule+0x482/0x1050\n[  370.790613]  schedule+0x92/0x1a0\n[  370.791290]  schedule_preempt_disabled+0x2c/0x50\n[  370.792256]  __mutex_lock.isra.0+0x757/0xec0\n[  370.793158]  __mutex_lock_slowpath+0x1f/0x30\n[  370.794079]  mutex_lock+0x50/0x60\n[  370.794795]  __device_driver_lock+0x2f/0x70\n[  370.795677]  ? driver_probe_device+0xd0/0xd0\n[  370.796576]  __driver_attach_async_helper+0x1d/0xd0\n[  370.797318]  ? driver_probe_device+0xd0/0xd0\n[  370.797957]  async_schedule_node_domain+0xa5/0xc0\n[  370.798652]  async_schedule_node+0x19/0x30\n[  370.799243]  __driver_attach+0x246/0x290\n[  370.799828]  ? driver_allows_async_probing+0xa0/0xa0\n[  370.800548]  bus_for_each_dev+0x9d/0x130\n[  370.801132]  driver_attach+0x22/0x30\n[  370.801666]  bus_add_driver+0x290/0x340\n[  370.802246]  driver_register+0x88/0x140\n[  370.802817]  ? virtio_scsi_init+0x116/0x116\n[  370.803425]  scsi_register_driver+0x1a/0x30\n[  370.804057]  init_sd+0x184/0x226\n[  370.804533]  do_one_initcall+0x71/0x3a0\n[  370.805107]  kernel_init_freeable+0x39a/0x43a\n[  370.805759]  ? rest_init+0x150/0x150\n[  370.806283]  kernel_init+0x26/0x230\n[  370.806799]  ret_from_fork+0x1f/0x30\n\nTo fix the deadlock, move the async_schedule_dev outside device_lock,\nas we can see, in async_schedule_node_domain, the parameter of\nqueue_work_node is system_unbound_wq, so it can accept concurrent\noperations. which will also not change the code logic, and will\nnot lead to deadlock.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.170.2.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.170.2.s390x",
          "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.170.2.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.170.2.s390x",
          "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.170.2.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.170.2.s390x",
          "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.170.2.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.170.2.s390x",
          "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-64kb-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-64kb-devel-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-devel-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-devel-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-devel-5.14.21-150400.24.170.1.noarch",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-docs-5.14.21-150400.24.170.1.noarch",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-macros-5.14.21-150400.24.170.1.noarch",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-obs-build-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-obs-build-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-source-5.14.21-150400.24.170.1.noarch",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-syms-5.14.21-150400.24.170.1.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-syms-5.14.21-150400.24.170.1.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:reiserfs-kmp-default-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:reiserfs-kmp-default-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-64kb-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-64kb-devel-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-devel-5.14.21-150400.24.170.1.noarch",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-docs-5.14.21-150400.24.170.1.noarch",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-macros-5.14.21-150400.24.170.1.noarch",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-source-5.14.21-150400.24.170.1.noarch",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.170.1.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.170.1.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.170.2.ppc64le",
          "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.170.2.s390x",
          "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.170.2.ppc64le",
          "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.170.2.s390x",
          "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_170-default-1-150400.9.3.2.ppc64le",
          "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_170-default-1-150400.9.3.2.s390x",
          "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_170-default-1-150400.9.3.2.x86_64",
          "SUSE Linux Enterprise Micro 5.3:kernel-default-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise Micro 5.3:kernel-default-5.14.21-150400.24.170.2.s390x",
          "SUSE Linux Enterprise Micro 5.3:kernel-default-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise Micro 5.3:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.aarch64",
          "SUSE Linux Enterprise Micro 5.3:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
          "SUSE Linux Enterprise Micro 5.4:kernel-default-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise Micro 5.4:kernel-default-5.14.21-150400.24.170.2.s390x",
          "SUSE Linux Enterprise Micro 5.4:kernel-default-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise Micro 5.4:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.aarch64",
          "SUSE Linux Enterprise Micro 5.4:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-64kb-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-64kb-devel-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-5.14.21-150400.24.170.2.ppc64le",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-5.14.21-150400.24.170.2.s390x",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.aarch64",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.ppc64le",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.170.2.ppc64le",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.170.2.s390x",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-devel-5.14.21-150400.24.170.1.noarch",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-docs-5.14.21-150400.24.170.1.noarch",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-macros-5.14.21-150400.24.170.1.noarch",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.170.2.ppc64le",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.170.2.s390x",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-source-5.14.21-150400.24.170.1.noarch",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.170.1.aarch64",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.170.1.ppc64le",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.170.1.s390x",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.170.1.x86_64",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-zfcpdump-5.14.21-150400.24.170.2.s390x",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.170.2.ppc64le",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.170.2.s390x",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-5.14.21-150400.24.170.2.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-devel-5.14.21-150400.24.170.2.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-devel-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-devel-5.14.21-150400.24.170.1.noarch",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-docs-5.14.21-150400.24.170.1.noarch",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-macros-5.14.21-150400.24.170.1.noarch",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-obs-build-5.14.21-150400.24.170.2.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-obs-build-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-source-5.14.21-150400.24.170.1.noarch",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-syms-5.14.21-150400.24.170.1.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-syms-5.14.21-150400.24.170.1.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.170.2.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.170.2.x86_64",
          "SUSE Manager Proxy 4.3:kernel-default-5.14.21-150400.24.170.2.x86_64",
          "SUSE Manager Proxy 4.3:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
          "SUSE Manager Proxy 4.3:kernel-default-devel-5.14.21-150400.24.170.2.x86_64",
          "SUSE Manager Proxy 4.3:kernel-devel-5.14.21-150400.24.170.1.noarch",
          "SUSE Manager Proxy 4.3:kernel-macros-5.14.21-150400.24.170.1.noarch",
          "SUSE Manager Proxy 4.3:kernel-source-5.14.21-150400.24.170.1.noarch",
          "SUSE Manager Proxy 4.3:kernel-syms-5.14.21-150400.24.170.1.x86_64",
          "SUSE Manager Server 4.3:kernel-default-5.14.21-150400.24.170.2.ppc64le",
          "SUSE Manager Server 4.3:kernel-default-5.14.21-150400.24.170.2.s390x",
          "SUSE Manager Server 4.3:kernel-default-5.14.21-150400.24.170.2.x86_64",
          "SUSE Manager Server 4.3:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.ppc64le",
          "SUSE Manager Server 4.3:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
          "SUSE Manager Server 4.3:kernel-default-devel-5.14.21-150400.24.170.2.ppc64le",
          "SUSE Manager Server 4.3:kernel-default-devel-5.14.21-150400.24.170.2.s390x",
          "SUSE Manager Server 4.3:kernel-default-devel-5.14.21-150400.24.170.2.x86_64",
          "SUSE Manager Server 4.3:kernel-devel-5.14.21-150400.24.170.1.noarch",
          "SUSE Manager Server 4.3:kernel-macros-5.14.21-150400.24.170.1.noarch",
          "SUSE Manager Server 4.3:kernel-source-5.14.21-150400.24.170.1.noarch",
          "SUSE Manager Server 4.3:kernel-syms-5.14.21-150400.24.170.1.ppc64le",
          "SUSE Manager Server 4.3:kernel-syms-5.14.21-150400.24.170.1.s390x",
          "SUSE Manager Server 4.3:kernel-syms-5.14.21-150400.24.170.1.x86_64",
          "SUSE Manager Server 4.3:kernel-zfcpdump-5.14.21-150400.24.170.2.s390x"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2022-50149",
          "url": "https://www.suse.com/security/cve/CVE-2022-50149"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1244883 for CVE-2022-50149",
          "url": "https://bugzilla.suse.com/1244883"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-64kb-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-64kb-devel-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-devel-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-devel-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-devel-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-docs-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-macros-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-obs-build-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-obs-build-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-source-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-syms-5.14.21-150400.24.170.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-syms-5.14.21-150400.24.170.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:reiserfs-kmp-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:reiserfs-kmp-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-64kb-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-64kb-devel-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-devel-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-docs-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-macros-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-source-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.170.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.170.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_170-default-1-150400.9.3.2.ppc64le",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_170-default-1-150400.9.3.2.s390x",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_170-default-1-150400.9.3.2.x86_64",
            "SUSE Linux Enterprise Micro 5.3:kernel-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise Micro 5.3:kernel-default-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise Micro 5.3:kernel-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Micro 5.3:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.aarch64",
            "SUSE Linux Enterprise Micro 5.3:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
            "SUSE Linux Enterprise Micro 5.4:kernel-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise Micro 5.4:kernel-default-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise Micro 5.4:kernel-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Micro 5.4:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.aarch64",
            "SUSE Linux Enterprise Micro 5.4:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-64kb-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-64kb-devel-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.aarch64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.ppc64le",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-devel-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-docs-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-macros-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-source-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.170.1.aarch64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.170.1.ppc64le",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.170.1.s390x",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.170.1.x86_64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-zfcpdump-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-devel-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-devel-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-devel-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-docs-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-macros-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-obs-build-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-obs-build-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-source-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-syms-5.14.21-150400.24.170.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-syms-5.14.21-150400.24.170.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Manager Proxy 4.3:kernel-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Manager Proxy 4.3:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
            "SUSE Manager Proxy 4.3:kernel-default-devel-5.14.21-150400.24.170.2.x86_64",
            "SUSE Manager Proxy 4.3:kernel-devel-5.14.21-150400.24.170.1.noarch",
            "SUSE Manager Proxy 4.3:kernel-macros-5.14.21-150400.24.170.1.noarch",
            "SUSE Manager Proxy 4.3:kernel-source-5.14.21-150400.24.170.1.noarch",
            "SUSE Manager Proxy 4.3:kernel-syms-5.14.21-150400.24.170.1.x86_64",
            "SUSE Manager Server 4.3:kernel-default-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Manager Server 4.3:kernel-default-5.14.21-150400.24.170.2.s390x",
            "SUSE Manager Server 4.3:kernel-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Manager Server 4.3:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.ppc64le",
            "SUSE Manager Server 4.3:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
            "SUSE Manager Server 4.3:kernel-default-devel-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Manager Server 4.3:kernel-default-devel-5.14.21-150400.24.170.2.s390x",
            "SUSE Manager Server 4.3:kernel-default-devel-5.14.21-150400.24.170.2.x86_64",
            "SUSE Manager Server 4.3:kernel-devel-5.14.21-150400.24.170.1.noarch",
            "SUSE Manager Server 4.3:kernel-macros-5.14.21-150400.24.170.1.noarch",
            "SUSE Manager Server 4.3:kernel-source-5.14.21-150400.24.170.1.noarch",
            "SUSE Manager Server 4.3:kernel-syms-5.14.21-150400.24.170.1.ppc64le",
            "SUSE Manager Server 4.3:kernel-syms-5.14.21-150400.24.170.1.s390x",
            "SUSE Manager Server 4.3:kernel-syms-5.14.21-150400.24.170.1.x86_64",
            "SUSE Manager Server 4.3:kernel-zfcpdump-5.14.21-150400.24.170.2.s390x"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 5.5,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
            "version": "3.1"
          },
          "products": [
            "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-64kb-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-64kb-devel-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-devel-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-devel-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-devel-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-docs-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-macros-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-obs-build-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-obs-build-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-source-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-syms-5.14.21-150400.24.170.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-syms-5.14.21-150400.24.170.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:reiserfs-kmp-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:reiserfs-kmp-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-64kb-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-64kb-devel-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-devel-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-docs-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-macros-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-source-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.170.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.170.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_170-default-1-150400.9.3.2.ppc64le",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_170-default-1-150400.9.3.2.s390x",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_170-default-1-150400.9.3.2.x86_64",
            "SUSE Linux Enterprise Micro 5.3:kernel-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise Micro 5.3:kernel-default-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise Micro 5.3:kernel-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Micro 5.3:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.aarch64",
            "SUSE Linux Enterprise Micro 5.3:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
            "SUSE Linux Enterprise Micro 5.4:kernel-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise Micro 5.4:kernel-default-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise Micro 5.4:kernel-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Micro 5.4:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.aarch64",
            "SUSE Linux Enterprise Micro 5.4:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-64kb-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-64kb-devel-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.aarch64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.ppc64le",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-devel-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-docs-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-macros-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-source-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.170.1.aarch64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.170.1.ppc64le",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.170.1.s390x",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.170.1.x86_64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-zfcpdump-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-devel-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-devel-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-devel-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-docs-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-macros-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-obs-build-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-obs-build-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-source-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-syms-5.14.21-150400.24.170.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-syms-5.14.21-150400.24.170.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Manager Proxy 4.3:kernel-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Manager Proxy 4.3:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
            "SUSE Manager Proxy 4.3:kernel-default-devel-5.14.21-150400.24.170.2.x86_64",
            "SUSE Manager Proxy 4.3:kernel-devel-5.14.21-150400.24.170.1.noarch",
            "SUSE Manager Proxy 4.3:kernel-macros-5.14.21-150400.24.170.1.noarch",
            "SUSE Manager Proxy 4.3:kernel-source-5.14.21-150400.24.170.1.noarch",
            "SUSE Manager Proxy 4.3:kernel-syms-5.14.21-150400.24.170.1.x86_64",
            "SUSE Manager Server 4.3:kernel-default-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Manager Server 4.3:kernel-default-5.14.21-150400.24.170.2.s390x",
            "SUSE Manager Server 4.3:kernel-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Manager Server 4.3:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.ppc64le",
            "SUSE Manager Server 4.3:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
            "SUSE Manager Server 4.3:kernel-default-devel-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Manager Server 4.3:kernel-default-devel-5.14.21-150400.24.170.2.s390x",
            "SUSE Manager Server 4.3:kernel-default-devel-5.14.21-150400.24.170.2.x86_64",
            "SUSE Manager Server 4.3:kernel-devel-5.14.21-150400.24.170.1.noarch",
            "SUSE Manager Server 4.3:kernel-macros-5.14.21-150400.24.170.1.noarch",
            "SUSE Manager Server 4.3:kernel-source-5.14.21-150400.24.170.1.noarch",
            "SUSE Manager Server 4.3:kernel-syms-5.14.21-150400.24.170.1.ppc64le",
            "SUSE Manager Server 4.3:kernel-syms-5.14.21-150400.24.170.1.s390x",
            "SUSE Manager Server 4.3:kernel-syms-5.14.21-150400.24.170.1.x86_64",
            "SUSE Manager Server 4.3:kernel-zfcpdump-5.14.21-150400.24.170.2.s390x"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2025-07-28T15:09:33Z",
          "details": "moderate"
        }
      ],
      "title": "CVE-2022-50149"
    },
    {
      "cve": "CVE-2022-50151",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2022-50151"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "In the Linux kernel, the following vulnerability has been resolved:\n\nusb: cdns3: fix random warning message when driver load\n\nWarning log:\n[    4.141392] Unexpected gfp: 0x4 (GFP_DMA32). Fixing up to gfp: 0xa20 (GFP_ATOMIC). Fix your code!\n[    4.150340] CPU: 1 PID: 175 Comm: 1-0050 Not tainted 5.15.5-00039-g2fd9ae1b568c #20\n[    4.158010] Hardware name: Freescale i.MX8QXP MEK (DT)\n[    4.163155] Call trace:\n[    4.165600]  dump_backtrace+0x0/0x1b0\n[    4.169286]  show_stack+0x18/0x68\n[    4.172611]  dump_stack_lvl+0x68/0x84\n[    4.176286]  dump_stack+0x18/0x34\n[    4.179613]  kmalloc_fix_flags+0x60/0x88\n[    4.183550]  new_slab+0x334/0x370\n[    4.186878]  ___slab_alloc.part.108+0x4d4/0x748\n[    4.191419]  __slab_alloc.isra.109+0x30/0x78\n[    4.195702]  kmem_cache_alloc+0x40c/0x420\n[    4.199725]  dma_pool_alloc+0xac/0x1f8\n[    4.203486]  cdns3_allocate_trb_pool+0xb4/0xd0\n\npool_alloc_page(struct dma_pool *pool, gfp_t mem_flags)\n{\n\t...\n\tpage = kmalloc(sizeof(*page), mem_flags);\n\tpage-\u003evaddr = dma_alloc_coherent(pool-\u003edev, pool-\u003eallocation,\n\t\t\t\t\t \u0026page-\u003edma, mem_flags);\n\t...\n}\n\nkmalloc was called with mem_flags, which is passed down in\ncdns3_allocate_trb_pool() and have GFP_DMA32 flags.\nkmall_fix_flags() report warning.\n\nGFP_DMA32 is not useful at all. dma_alloc_coherent() will handle\nDMA memory region correctly by pool-\u003edev. GFP_DMA32 can be removed\nsafely.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.170.2.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.170.2.s390x",
          "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.170.2.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.170.2.s390x",
          "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.170.2.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.170.2.s390x",
          "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.170.2.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.170.2.s390x",
          "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-64kb-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-64kb-devel-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-devel-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-devel-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-devel-5.14.21-150400.24.170.1.noarch",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-docs-5.14.21-150400.24.170.1.noarch",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-macros-5.14.21-150400.24.170.1.noarch",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-obs-build-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-obs-build-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-source-5.14.21-150400.24.170.1.noarch",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-syms-5.14.21-150400.24.170.1.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-syms-5.14.21-150400.24.170.1.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:reiserfs-kmp-default-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:reiserfs-kmp-default-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-64kb-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-64kb-devel-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-devel-5.14.21-150400.24.170.1.noarch",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-docs-5.14.21-150400.24.170.1.noarch",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-macros-5.14.21-150400.24.170.1.noarch",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-source-5.14.21-150400.24.170.1.noarch",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.170.1.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.170.1.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.170.2.ppc64le",
          "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.170.2.s390x",
          "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.170.2.ppc64le",
          "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.170.2.s390x",
          "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_170-default-1-150400.9.3.2.ppc64le",
          "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_170-default-1-150400.9.3.2.s390x",
          "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_170-default-1-150400.9.3.2.x86_64",
          "SUSE Linux Enterprise Micro 5.3:kernel-default-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise Micro 5.3:kernel-default-5.14.21-150400.24.170.2.s390x",
          "SUSE Linux Enterprise Micro 5.3:kernel-default-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise Micro 5.3:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.aarch64",
          "SUSE Linux Enterprise Micro 5.3:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
          "SUSE Linux Enterprise Micro 5.4:kernel-default-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise Micro 5.4:kernel-default-5.14.21-150400.24.170.2.s390x",
          "SUSE Linux Enterprise Micro 5.4:kernel-default-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise Micro 5.4:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.aarch64",
          "SUSE Linux Enterprise Micro 5.4:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-64kb-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-64kb-devel-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-5.14.21-150400.24.170.2.ppc64le",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-5.14.21-150400.24.170.2.s390x",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.aarch64",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.ppc64le",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.170.2.ppc64le",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.170.2.s390x",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-devel-5.14.21-150400.24.170.1.noarch",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-docs-5.14.21-150400.24.170.1.noarch",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-macros-5.14.21-150400.24.170.1.noarch",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.170.2.ppc64le",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.170.2.s390x",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-source-5.14.21-150400.24.170.1.noarch",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.170.1.aarch64",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.170.1.ppc64le",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.170.1.s390x",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.170.1.x86_64",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-zfcpdump-5.14.21-150400.24.170.2.s390x",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.170.2.ppc64le",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.170.2.s390x",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-5.14.21-150400.24.170.2.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-devel-5.14.21-150400.24.170.2.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-devel-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-devel-5.14.21-150400.24.170.1.noarch",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-docs-5.14.21-150400.24.170.1.noarch",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-macros-5.14.21-150400.24.170.1.noarch",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-obs-build-5.14.21-150400.24.170.2.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-obs-build-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-source-5.14.21-150400.24.170.1.noarch",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-syms-5.14.21-150400.24.170.1.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-syms-5.14.21-150400.24.170.1.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.170.2.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.170.2.x86_64",
          "SUSE Manager Proxy 4.3:kernel-default-5.14.21-150400.24.170.2.x86_64",
          "SUSE Manager Proxy 4.3:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
          "SUSE Manager Proxy 4.3:kernel-default-devel-5.14.21-150400.24.170.2.x86_64",
          "SUSE Manager Proxy 4.3:kernel-devel-5.14.21-150400.24.170.1.noarch",
          "SUSE Manager Proxy 4.3:kernel-macros-5.14.21-150400.24.170.1.noarch",
          "SUSE Manager Proxy 4.3:kernel-source-5.14.21-150400.24.170.1.noarch",
          "SUSE Manager Proxy 4.3:kernel-syms-5.14.21-150400.24.170.1.x86_64",
          "SUSE Manager Server 4.3:kernel-default-5.14.21-150400.24.170.2.ppc64le",
          "SUSE Manager Server 4.3:kernel-default-5.14.21-150400.24.170.2.s390x",
          "SUSE Manager Server 4.3:kernel-default-5.14.21-150400.24.170.2.x86_64",
          "SUSE Manager Server 4.3:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.ppc64le",
          "SUSE Manager Server 4.3:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
          "SUSE Manager Server 4.3:kernel-default-devel-5.14.21-150400.24.170.2.ppc64le",
          "SUSE Manager Server 4.3:kernel-default-devel-5.14.21-150400.24.170.2.s390x",
          "SUSE Manager Server 4.3:kernel-default-devel-5.14.21-150400.24.170.2.x86_64",
          "SUSE Manager Server 4.3:kernel-devel-5.14.21-150400.24.170.1.noarch",
          "SUSE Manager Server 4.3:kernel-macros-5.14.21-150400.24.170.1.noarch",
          "SUSE Manager Server 4.3:kernel-source-5.14.21-150400.24.170.1.noarch",
          "SUSE Manager Server 4.3:kernel-syms-5.14.21-150400.24.170.1.ppc64le",
          "SUSE Manager Server 4.3:kernel-syms-5.14.21-150400.24.170.1.s390x",
          "SUSE Manager Server 4.3:kernel-syms-5.14.21-150400.24.170.1.x86_64",
          "SUSE Manager Server 4.3:kernel-zfcpdump-5.14.21-150400.24.170.2.s390x"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2022-50151",
          "url": "https://www.suse.com/security/cve/CVE-2022-50151"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1245093 for CVE-2022-50151",
          "url": "https://bugzilla.suse.com/1245093"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-64kb-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-64kb-devel-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-devel-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-devel-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-devel-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-docs-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-macros-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-obs-build-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-obs-build-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-source-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-syms-5.14.21-150400.24.170.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-syms-5.14.21-150400.24.170.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:reiserfs-kmp-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:reiserfs-kmp-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-64kb-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-64kb-devel-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-devel-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-docs-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-macros-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-source-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.170.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.170.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_170-default-1-150400.9.3.2.ppc64le",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_170-default-1-150400.9.3.2.s390x",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_170-default-1-150400.9.3.2.x86_64",
            "SUSE Linux Enterprise Micro 5.3:kernel-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise Micro 5.3:kernel-default-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise Micro 5.3:kernel-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Micro 5.3:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.aarch64",
            "SUSE Linux Enterprise Micro 5.3:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
            "SUSE Linux Enterprise Micro 5.4:kernel-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise Micro 5.4:kernel-default-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise Micro 5.4:kernel-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Micro 5.4:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.aarch64",
            "SUSE Linux Enterprise Micro 5.4:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-64kb-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-64kb-devel-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.aarch64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.ppc64le",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-devel-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-docs-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-macros-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-source-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.170.1.aarch64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.170.1.ppc64le",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.170.1.s390x",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.170.1.x86_64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-zfcpdump-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-devel-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-devel-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-devel-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-docs-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-macros-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-obs-build-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-obs-build-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-source-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-syms-5.14.21-150400.24.170.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-syms-5.14.21-150400.24.170.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Manager Proxy 4.3:kernel-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Manager Proxy 4.3:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
            "SUSE Manager Proxy 4.3:kernel-default-devel-5.14.21-150400.24.170.2.x86_64",
            "SUSE Manager Proxy 4.3:kernel-devel-5.14.21-150400.24.170.1.noarch",
            "SUSE Manager Proxy 4.3:kernel-macros-5.14.21-150400.24.170.1.noarch",
            "SUSE Manager Proxy 4.3:kernel-source-5.14.21-150400.24.170.1.noarch",
            "SUSE Manager Proxy 4.3:kernel-syms-5.14.21-150400.24.170.1.x86_64",
            "SUSE Manager Server 4.3:kernel-default-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Manager Server 4.3:kernel-default-5.14.21-150400.24.170.2.s390x",
            "SUSE Manager Server 4.3:kernel-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Manager Server 4.3:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.ppc64le",
            "SUSE Manager Server 4.3:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
            "SUSE Manager Server 4.3:kernel-default-devel-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Manager Server 4.3:kernel-default-devel-5.14.21-150400.24.170.2.s390x",
            "SUSE Manager Server 4.3:kernel-default-devel-5.14.21-150400.24.170.2.x86_64",
            "SUSE Manager Server 4.3:kernel-devel-5.14.21-150400.24.170.1.noarch",
            "SUSE Manager Server 4.3:kernel-macros-5.14.21-150400.24.170.1.noarch",
            "SUSE Manager Server 4.3:kernel-source-5.14.21-150400.24.170.1.noarch",
            "SUSE Manager Server 4.3:kernel-syms-5.14.21-150400.24.170.1.ppc64le",
            "SUSE Manager Server 4.3:kernel-syms-5.14.21-150400.24.170.1.s390x",
            "SUSE Manager Server 4.3:kernel-syms-5.14.21-150400.24.170.1.x86_64",
            "SUSE Manager Server 4.3:kernel-zfcpdump-5.14.21-150400.24.170.2.s390x"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 5.5,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
            "version": "3.1"
          },
          "products": [
            "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-64kb-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-64kb-devel-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-devel-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-devel-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-devel-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-docs-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-macros-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-obs-build-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-obs-build-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-source-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-syms-5.14.21-150400.24.170.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-syms-5.14.21-150400.24.170.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:reiserfs-kmp-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:reiserfs-kmp-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-64kb-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-64kb-devel-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-devel-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-docs-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-macros-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-source-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.170.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.170.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_170-default-1-150400.9.3.2.ppc64le",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_170-default-1-150400.9.3.2.s390x",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_170-default-1-150400.9.3.2.x86_64",
            "SUSE Linux Enterprise Micro 5.3:kernel-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise Micro 5.3:kernel-default-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise Micro 5.3:kernel-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Micro 5.3:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.aarch64",
            "SUSE Linux Enterprise Micro 5.3:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
            "SUSE Linux Enterprise Micro 5.4:kernel-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise Micro 5.4:kernel-default-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise Micro 5.4:kernel-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Micro 5.4:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.aarch64",
            "SUSE Linux Enterprise Micro 5.4:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-64kb-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-64kb-devel-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.aarch64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.ppc64le",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-devel-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-docs-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-macros-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-source-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.170.1.aarch64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.170.1.ppc64le",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.170.1.s390x",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.170.1.x86_64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-zfcpdump-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-devel-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-devel-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-devel-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-docs-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-macros-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-obs-build-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-obs-build-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-source-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-syms-5.14.21-150400.24.170.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-syms-5.14.21-150400.24.170.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Manager Proxy 4.3:kernel-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Manager Proxy 4.3:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
            "SUSE Manager Proxy 4.3:kernel-default-devel-5.14.21-150400.24.170.2.x86_64",
            "SUSE Manager Proxy 4.3:kernel-devel-5.14.21-150400.24.170.1.noarch",
            "SUSE Manager Proxy 4.3:kernel-macros-5.14.21-150400.24.170.1.noarch",
            "SUSE Manager Proxy 4.3:kernel-source-5.14.21-150400.24.170.1.noarch",
            "SUSE Manager Proxy 4.3:kernel-syms-5.14.21-150400.24.170.1.x86_64",
            "SUSE Manager Server 4.3:kernel-default-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Manager Server 4.3:kernel-default-5.14.21-150400.24.170.2.s390x",
            "SUSE Manager Server 4.3:kernel-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Manager Server 4.3:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.ppc64le",
            "SUSE Manager Server 4.3:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
            "SUSE Manager Server 4.3:kernel-default-devel-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Manager Server 4.3:kernel-default-devel-5.14.21-150400.24.170.2.s390x",
            "SUSE Manager Server 4.3:kernel-default-devel-5.14.21-150400.24.170.2.x86_64",
            "SUSE Manager Server 4.3:kernel-devel-5.14.21-150400.24.170.1.noarch",
            "SUSE Manager Server 4.3:kernel-macros-5.14.21-150400.24.170.1.noarch",
            "SUSE Manager Server 4.3:kernel-source-5.14.21-150400.24.170.1.noarch",
            "SUSE Manager Server 4.3:kernel-syms-5.14.21-150400.24.170.1.ppc64le",
            "SUSE Manager Server 4.3:kernel-syms-5.14.21-150400.24.170.1.s390x",
            "SUSE Manager Server 4.3:kernel-syms-5.14.21-150400.24.170.1.x86_64",
            "SUSE Manager Server 4.3:kernel-zfcpdump-5.14.21-150400.24.170.2.s390x"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2025-07-28T15:09:33Z",
          "details": "moderate"
        }
      ],
      "title": "CVE-2022-50151"
    },
    {
      "cve": "CVE-2022-50152",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2022-50152"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "In the Linux kernel, the following vulnerability has been resolved:\n\nusb: ohci-nxp: Fix refcount leak in ohci_hcd_nxp_probe\n\nof_parse_phandle() returns a node pointer with refcount\nincremented, we should use of_node_put() on it when not need anymore.\nAdd missing of_node_put() to avoid refcount leak.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.170.2.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.170.2.s390x",
          "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.170.2.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.170.2.s390x",
          "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.170.2.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.170.2.s390x",
          "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.170.2.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.170.2.s390x",
          "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-64kb-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-64kb-devel-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-devel-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-devel-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-devel-5.14.21-150400.24.170.1.noarch",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-docs-5.14.21-150400.24.170.1.noarch",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-macros-5.14.21-150400.24.170.1.noarch",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-obs-build-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-obs-build-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-source-5.14.21-150400.24.170.1.noarch",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-syms-5.14.21-150400.24.170.1.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-syms-5.14.21-150400.24.170.1.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:reiserfs-kmp-default-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:reiserfs-kmp-default-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-64kb-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-64kb-devel-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-devel-5.14.21-150400.24.170.1.noarch",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-docs-5.14.21-150400.24.170.1.noarch",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-macros-5.14.21-150400.24.170.1.noarch",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-source-5.14.21-150400.24.170.1.noarch",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.170.1.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.170.1.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.170.2.ppc64le",
          "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.170.2.s390x",
          "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.170.2.ppc64le",
          "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.170.2.s390x",
          "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_170-default-1-150400.9.3.2.ppc64le",
          "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_170-default-1-150400.9.3.2.s390x",
          "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_170-default-1-150400.9.3.2.x86_64",
          "SUSE Linux Enterprise Micro 5.3:kernel-default-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise Micro 5.3:kernel-default-5.14.21-150400.24.170.2.s390x",
          "SUSE Linux Enterprise Micro 5.3:kernel-default-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise Micro 5.3:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.aarch64",
          "SUSE Linux Enterprise Micro 5.3:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
          "SUSE Linux Enterprise Micro 5.4:kernel-default-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise Micro 5.4:kernel-default-5.14.21-150400.24.170.2.s390x",
          "SUSE Linux Enterprise Micro 5.4:kernel-default-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise Micro 5.4:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.aarch64",
          "SUSE Linux Enterprise Micro 5.4:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-64kb-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-64kb-devel-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-5.14.21-150400.24.170.2.ppc64le",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-5.14.21-150400.24.170.2.s390x",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.aarch64",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.ppc64le",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.170.2.ppc64le",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.170.2.s390x",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-devel-5.14.21-150400.24.170.1.noarch",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-docs-5.14.21-150400.24.170.1.noarch",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-macros-5.14.21-150400.24.170.1.noarch",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.170.2.ppc64le",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.170.2.s390x",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-source-5.14.21-150400.24.170.1.noarch",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.170.1.aarch64",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.170.1.ppc64le",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.170.1.s390x",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.170.1.x86_64",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-zfcpdump-5.14.21-150400.24.170.2.s390x",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.170.2.ppc64le",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.170.2.s390x",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-5.14.21-150400.24.170.2.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-devel-5.14.21-150400.24.170.2.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-devel-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-devel-5.14.21-150400.24.170.1.noarch",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-docs-5.14.21-150400.24.170.1.noarch",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-macros-5.14.21-150400.24.170.1.noarch",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-obs-build-5.14.21-150400.24.170.2.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-obs-build-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-source-5.14.21-150400.24.170.1.noarch",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-syms-5.14.21-150400.24.170.1.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-syms-5.14.21-150400.24.170.1.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.170.2.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.170.2.x86_64",
          "SUSE Manager Proxy 4.3:kernel-default-5.14.21-150400.24.170.2.x86_64",
          "SUSE Manager Proxy 4.3:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
          "SUSE Manager Proxy 4.3:kernel-default-devel-5.14.21-150400.24.170.2.x86_64",
          "SUSE Manager Proxy 4.3:kernel-devel-5.14.21-150400.24.170.1.noarch",
          "SUSE Manager Proxy 4.3:kernel-macros-5.14.21-150400.24.170.1.noarch",
          "SUSE Manager Proxy 4.3:kernel-source-5.14.21-150400.24.170.1.noarch",
          "SUSE Manager Proxy 4.3:kernel-syms-5.14.21-150400.24.170.1.x86_64",
          "SUSE Manager Server 4.3:kernel-default-5.14.21-150400.24.170.2.ppc64le",
          "SUSE Manager Server 4.3:kernel-default-5.14.21-150400.24.170.2.s390x",
          "SUSE Manager Server 4.3:kernel-default-5.14.21-150400.24.170.2.x86_64",
          "SUSE Manager Server 4.3:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.ppc64le",
          "SUSE Manager Server 4.3:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
          "SUSE Manager Server 4.3:kernel-default-devel-5.14.21-150400.24.170.2.ppc64le",
          "SUSE Manager Server 4.3:kernel-default-devel-5.14.21-150400.24.170.2.s390x",
          "SUSE Manager Server 4.3:kernel-default-devel-5.14.21-150400.24.170.2.x86_64",
          "SUSE Manager Server 4.3:kernel-devel-5.14.21-150400.24.170.1.noarch",
          "SUSE Manager Server 4.3:kernel-macros-5.14.21-150400.24.170.1.noarch",
          "SUSE Manager Server 4.3:kernel-source-5.14.21-150400.24.170.1.noarch",
          "SUSE Manager Server 4.3:kernel-syms-5.14.21-150400.24.170.1.ppc64le",
          "SUSE Manager Server 4.3:kernel-syms-5.14.21-150400.24.170.1.s390x",
          "SUSE Manager Server 4.3:kernel-syms-5.14.21-150400.24.170.1.x86_64",
          "SUSE Manager Server 4.3:kernel-zfcpdump-5.14.21-150400.24.170.2.s390x"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2022-50152",
          "url": "https://www.suse.com/security/cve/CVE-2022-50152"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1244783 for CVE-2022-50152",
          "url": "https://bugzilla.suse.com/1244783"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-64kb-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-64kb-devel-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-devel-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-devel-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-devel-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-docs-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-macros-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-obs-build-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-obs-build-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-source-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-syms-5.14.21-150400.24.170.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-syms-5.14.21-150400.24.170.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:reiserfs-kmp-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:reiserfs-kmp-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-64kb-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-64kb-devel-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-devel-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-docs-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-macros-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-source-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.170.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.170.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_170-default-1-150400.9.3.2.ppc64le",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_170-default-1-150400.9.3.2.s390x",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_170-default-1-150400.9.3.2.x86_64",
            "SUSE Linux Enterprise Micro 5.3:kernel-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise Micro 5.3:kernel-default-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise Micro 5.3:kernel-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Micro 5.3:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.aarch64",
            "SUSE Linux Enterprise Micro 5.3:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
            "SUSE Linux Enterprise Micro 5.4:kernel-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise Micro 5.4:kernel-default-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise Micro 5.4:kernel-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Micro 5.4:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.aarch64",
            "SUSE Linux Enterprise Micro 5.4:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-64kb-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-64kb-devel-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.aarch64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.ppc64le",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-devel-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-docs-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-macros-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-source-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.170.1.aarch64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.170.1.ppc64le",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.170.1.s390x",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.170.1.x86_64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-zfcpdump-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-devel-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-devel-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-devel-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-docs-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-macros-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-obs-build-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-obs-build-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-source-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-syms-5.14.21-150400.24.170.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-syms-5.14.21-150400.24.170.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Manager Proxy 4.3:kernel-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Manager Proxy 4.3:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
            "SUSE Manager Proxy 4.3:kernel-default-devel-5.14.21-150400.24.170.2.x86_64",
            "SUSE Manager Proxy 4.3:kernel-devel-5.14.21-150400.24.170.1.noarch",
            "SUSE Manager Proxy 4.3:kernel-macros-5.14.21-150400.24.170.1.noarch",
            "SUSE Manager Proxy 4.3:kernel-source-5.14.21-150400.24.170.1.noarch",
            "SUSE Manager Proxy 4.3:kernel-syms-5.14.21-150400.24.170.1.x86_64",
            "SUSE Manager Server 4.3:kernel-default-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Manager Server 4.3:kernel-default-5.14.21-150400.24.170.2.s390x",
            "SUSE Manager Server 4.3:kernel-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Manager Server 4.3:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.ppc64le",
            "SUSE Manager Server 4.3:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
            "SUSE Manager Server 4.3:kernel-default-devel-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Manager Server 4.3:kernel-default-devel-5.14.21-150400.24.170.2.s390x",
            "SUSE Manager Server 4.3:kernel-default-devel-5.14.21-150400.24.170.2.x86_64",
            "SUSE Manager Server 4.3:kernel-devel-5.14.21-150400.24.170.1.noarch",
            "SUSE Manager Server 4.3:kernel-macros-5.14.21-150400.24.170.1.noarch",
            "SUSE Manager Server 4.3:kernel-source-5.14.21-150400.24.170.1.noarch",
            "SUSE Manager Server 4.3:kernel-syms-5.14.21-150400.24.170.1.ppc64le",
            "SUSE Manager Server 4.3:kernel-syms-5.14.21-150400.24.170.1.s390x",
            "SUSE Manager Server 4.3:kernel-syms-5.14.21-150400.24.170.1.x86_64",
            "SUSE Manager Server 4.3:kernel-zfcpdump-5.14.21-150400.24.170.2.s390x"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 5.5,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
            "version": "3.1"
          },
          "products": [
            "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-64kb-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-64kb-devel-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-devel-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-devel-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-devel-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-docs-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-macros-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-obs-build-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-obs-build-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-source-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-syms-5.14.21-150400.24.170.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-syms-5.14.21-150400.24.170.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:reiserfs-kmp-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:reiserfs-kmp-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-64kb-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-64kb-devel-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-devel-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-docs-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-macros-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-source-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.170.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.170.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_170-default-1-150400.9.3.2.ppc64le",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_170-default-1-150400.9.3.2.s390x",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_170-default-1-150400.9.3.2.x86_64",
            "SUSE Linux Enterprise Micro 5.3:kernel-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise Micro 5.3:kernel-default-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise Micro 5.3:kernel-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Micro 5.3:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.aarch64",
            "SUSE Linux Enterprise Micro 5.3:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
            "SUSE Linux Enterprise Micro 5.4:kernel-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise Micro 5.4:kernel-default-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise Micro 5.4:kernel-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Micro 5.4:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.aarch64",
            "SUSE Linux Enterprise Micro 5.4:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-64kb-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-64kb-devel-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.aarch64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.ppc64le",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-devel-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-docs-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-macros-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-source-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.170.1.aarch64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.170.1.ppc64le",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.170.1.s390x",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.170.1.x86_64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-zfcpdump-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-devel-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-devel-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-devel-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-docs-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-macros-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-obs-build-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-obs-build-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-source-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-syms-5.14.21-150400.24.170.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-syms-5.14.21-150400.24.170.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Manager Proxy 4.3:kernel-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Manager Proxy 4.3:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
            "SUSE Manager Proxy 4.3:kernel-default-devel-5.14.21-150400.24.170.2.x86_64",
            "SUSE Manager Proxy 4.3:kernel-devel-5.14.21-150400.24.170.1.noarch",
            "SUSE Manager Proxy 4.3:kernel-macros-5.14.21-150400.24.170.1.noarch",
            "SUSE Manager Proxy 4.3:kernel-source-5.14.21-150400.24.170.1.noarch",
            "SUSE Manager Proxy 4.3:kernel-syms-5.14.21-150400.24.170.1.x86_64",
            "SUSE Manager Server 4.3:kernel-default-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Manager Server 4.3:kernel-default-5.14.21-150400.24.170.2.s390x",
            "SUSE Manager Server 4.3:kernel-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Manager Server 4.3:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.ppc64le",
            "SUSE Manager Server 4.3:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
            "SUSE Manager Server 4.3:kernel-default-devel-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Manager Server 4.3:kernel-default-devel-5.14.21-150400.24.170.2.s390x",
            "SUSE Manager Server 4.3:kernel-default-devel-5.14.21-150400.24.170.2.x86_64",
            "SUSE Manager Server 4.3:kernel-devel-5.14.21-150400.24.170.1.noarch",
            "SUSE Manager Server 4.3:kernel-macros-5.14.21-150400.24.170.1.noarch",
            "SUSE Manager Server 4.3:kernel-source-5.14.21-150400.24.170.1.noarch",
            "SUSE Manager Server 4.3:kernel-syms-5.14.21-150400.24.170.1.ppc64le",
            "SUSE Manager Server 4.3:kernel-syms-5.14.21-150400.24.170.1.s390x",
            "SUSE Manager Server 4.3:kernel-syms-5.14.21-150400.24.170.1.x86_64",
            "SUSE Manager Server 4.3:kernel-zfcpdump-5.14.21-150400.24.170.2.s390x"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2025-07-28T15:09:33Z",
          "details": "moderate"
        }
      ],
      "title": "CVE-2022-50152"
    },
    {
      "cve": "CVE-2022-50153",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2022-50153"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "In the Linux kernel, the following vulnerability has been resolved:\n\nusb: host: Fix refcount leak in ehci_hcd_ppc_of_probe\n\nof_find_compatible_node() returns a node pointer with refcount\nincremented, we should use of_node_put() on it when done.\nAdd missing of_node_put() to avoid refcount leak.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.170.2.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.170.2.s390x",
          "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.170.2.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.170.2.s390x",
          "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.170.2.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.170.2.s390x",
          "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.170.2.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.170.2.s390x",
          "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-64kb-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-64kb-devel-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-devel-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-devel-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-devel-5.14.21-150400.24.170.1.noarch",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-docs-5.14.21-150400.24.170.1.noarch",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-macros-5.14.21-150400.24.170.1.noarch",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-obs-build-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-obs-build-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-source-5.14.21-150400.24.170.1.noarch",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-syms-5.14.21-150400.24.170.1.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-syms-5.14.21-150400.24.170.1.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:reiserfs-kmp-default-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:reiserfs-kmp-default-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-64kb-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-64kb-devel-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-devel-5.14.21-150400.24.170.1.noarch",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-docs-5.14.21-150400.24.170.1.noarch",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-macros-5.14.21-150400.24.170.1.noarch",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-source-5.14.21-150400.24.170.1.noarch",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.170.1.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.170.1.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.170.2.ppc64le",
          "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.170.2.s390x",
          "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.170.2.ppc64le",
          "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.170.2.s390x",
          "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_170-default-1-150400.9.3.2.ppc64le",
          "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_170-default-1-150400.9.3.2.s390x",
          "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_170-default-1-150400.9.3.2.x86_64",
          "SUSE Linux Enterprise Micro 5.3:kernel-default-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise Micro 5.3:kernel-default-5.14.21-150400.24.170.2.s390x",
          "SUSE Linux Enterprise Micro 5.3:kernel-default-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise Micro 5.3:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.aarch64",
          "SUSE Linux Enterprise Micro 5.3:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
          "SUSE Linux Enterprise Micro 5.4:kernel-default-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise Micro 5.4:kernel-default-5.14.21-150400.24.170.2.s390x",
          "SUSE Linux Enterprise Micro 5.4:kernel-default-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise Micro 5.4:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.aarch64",
          "SUSE Linux Enterprise Micro 5.4:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-64kb-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-64kb-devel-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-5.14.21-150400.24.170.2.ppc64le",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-5.14.21-150400.24.170.2.s390x",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.aarch64",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.ppc64le",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.170.2.ppc64le",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.170.2.s390x",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-devel-5.14.21-150400.24.170.1.noarch",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-docs-5.14.21-150400.24.170.1.noarch",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-macros-5.14.21-150400.24.170.1.noarch",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.170.2.ppc64le",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.170.2.s390x",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-source-5.14.21-150400.24.170.1.noarch",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.170.1.aarch64",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.170.1.ppc64le",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.170.1.s390x",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.170.1.x86_64",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-zfcpdump-5.14.21-150400.24.170.2.s390x",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.170.2.ppc64le",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.170.2.s390x",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-5.14.21-150400.24.170.2.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-devel-5.14.21-150400.24.170.2.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-devel-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-devel-5.14.21-150400.24.170.1.noarch",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-docs-5.14.21-150400.24.170.1.noarch",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-macros-5.14.21-150400.24.170.1.noarch",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-obs-build-5.14.21-150400.24.170.2.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-obs-build-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-source-5.14.21-150400.24.170.1.noarch",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-syms-5.14.21-150400.24.170.1.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-syms-5.14.21-150400.24.170.1.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.170.2.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.170.2.x86_64",
          "SUSE Manager Proxy 4.3:kernel-default-5.14.21-150400.24.170.2.x86_64",
          "SUSE Manager Proxy 4.3:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
          "SUSE Manager Proxy 4.3:kernel-default-devel-5.14.21-150400.24.170.2.x86_64",
          "SUSE Manager Proxy 4.3:kernel-devel-5.14.21-150400.24.170.1.noarch",
          "SUSE Manager Proxy 4.3:kernel-macros-5.14.21-150400.24.170.1.noarch",
          "SUSE Manager Proxy 4.3:kernel-source-5.14.21-150400.24.170.1.noarch",
          "SUSE Manager Proxy 4.3:kernel-syms-5.14.21-150400.24.170.1.x86_64",
          "SUSE Manager Server 4.3:kernel-default-5.14.21-150400.24.170.2.ppc64le",
          "SUSE Manager Server 4.3:kernel-default-5.14.21-150400.24.170.2.s390x",
          "SUSE Manager Server 4.3:kernel-default-5.14.21-150400.24.170.2.x86_64",
          "SUSE Manager Server 4.3:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.ppc64le",
          "SUSE Manager Server 4.3:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
          "SUSE Manager Server 4.3:kernel-default-devel-5.14.21-150400.24.170.2.ppc64le",
          "SUSE Manager Server 4.3:kernel-default-devel-5.14.21-150400.24.170.2.s390x",
          "SUSE Manager Server 4.3:kernel-default-devel-5.14.21-150400.24.170.2.x86_64",
          "SUSE Manager Server 4.3:kernel-devel-5.14.21-150400.24.170.1.noarch",
          "SUSE Manager Server 4.3:kernel-macros-5.14.21-150400.24.170.1.noarch",
          "SUSE Manager Server 4.3:kernel-source-5.14.21-150400.24.170.1.noarch",
          "SUSE Manager Server 4.3:kernel-syms-5.14.21-150400.24.170.1.ppc64le",
          "SUSE Manager Server 4.3:kernel-syms-5.14.21-150400.24.170.1.s390x",
          "SUSE Manager Server 4.3:kernel-syms-5.14.21-150400.24.170.1.x86_64",
          "SUSE Manager Server 4.3:kernel-zfcpdump-5.14.21-150400.24.170.2.s390x"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2022-50153",
          "url": "https://www.suse.com/security/cve/CVE-2022-50153"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1244786 for CVE-2022-50153",
          "url": "https://bugzilla.suse.com/1244786"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-64kb-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-64kb-devel-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-devel-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-devel-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-devel-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-docs-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-macros-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-obs-build-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-obs-build-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-source-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-syms-5.14.21-150400.24.170.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-syms-5.14.21-150400.24.170.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:reiserfs-kmp-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:reiserfs-kmp-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-64kb-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-64kb-devel-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-devel-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-docs-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-macros-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-source-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.170.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.170.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_170-default-1-150400.9.3.2.ppc64le",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_170-default-1-150400.9.3.2.s390x",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_170-default-1-150400.9.3.2.x86_64",
            "SUSE Linux Enterprise Micro 5.3:kernel-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise Micro 5.3:kernel-default-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise Micro 5.3:kernel-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Micro 5.3:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.aarch64",
            "SUSE Linux Enterprise Micro 5.3:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
            "SUSE Linux Enterprise Micro 5.4:kernel-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise Micro 5.4:kernel-default-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise Micro 5.4:kernel-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Micro 5.4:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.aarch64",
            "SUSE Linux Enterprise Micro 5.4:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-64kb-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-64kb-devel-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.aarch64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.ppc64le",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-devel-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-docs-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-macros-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-source-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.170.1.aarch64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.170.1.ppc64le",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.170.1.s390x",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.170.1.x86_64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-zfcpdump-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-devel-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-devel-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-devel-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-docs-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-macros-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-obs-build-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-obs-build-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-source-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-syms-5.14.21-150400.24.170.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-syms-5.14.21-150400.24.170.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Manager Proxy 4.3:kernel-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Manager Proxy 4.3:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
            "SUSE Manager Proxy 4.3:kernel-default-devel-5.14.21-150400.24.170.2.x86_64",
            "SUSE Manager Proxy 4.3:kernel-devel-5.14.21-150400.24.170.1.noarch",
            "SUSE Manager Proxy 4.3:kernel-macros-5.14.21-150400.24.170.1.noarch",
            "SUSE Manager Proxy 4.3:kernel-source-5.14.21-150400.24.170.1.noarch",
            "SUSE Manager Proxy 4.3:kernel-syms-5.14.21-150400.24.170.1.x86_64",
            "SUSE Manager Server 4.3:kernel-default-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Manager Server 4.3:kernel-default-5.14.21-150400.24.170.2.s390x",
            "SUSE Manager Server 4.3:kernel-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Manager Server 4.3:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.ppc64le",
            "SUSE Manager Server 4.3:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
            "SUSE Manager Server 4.3:kernel-default-devel-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Manager Server 4.3:kernel-default-devel-5.14.21-150400.24.170.2.s390x",
            "SUSE Manager Server 4.3:kernel-default-devel-5.14.21-150400.24.170.2.x86_64",
            "SUSE Manager Server 4.3:kernel-devel-5.14.21-150400.24.170.1.noarch",
            "SUSE Manager Server 4.3:kernel-macros-5.14.21-150400.24.170.1.noarch",
            "SUSE Manager Server 4.3:kernel-source-5.14.21-150400.24.170.1.noarch",
            "SUSE Manager Server 4.3:kernel-syms-5.14.21-150400.24.170.1.ppc64le",
            "SUSE Manager Server 4.3:kernel-syms-5.14.21-150400.24.170.1.s390x",
            "SUSE Manager Server 4.3:kernel-syms-5.14.21-150400.24.170.1.x86_64",
            "SUSE Manager Server 4.3:kernel-zfcpdump-5.14.21-150400.24.170.2.s390x"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 5.5,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
            "version": "3.1"
          },
          "products": [
            "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-64kb-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-64kb-devel-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-devel-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-devel-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-devel-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-docs-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-macros-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-obs-build-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-obs-build-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-source-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-syms-5.14.21-150400.24.170.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-syms-5.14.21-150400.24.170.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:reiserfs-kmp-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:reiserfs-kmp-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-64kb-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-64kb-devel-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-devel-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-docs-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-macros-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-source-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.170.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.170.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_170-default-1-150400.9.3.2.ppc64le",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_170-default-1-150400.9.3.2.s390x",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_170-default-1-150400.9.3.2.x86_64",
            "SUSE Linux Enterprise Micro 5.3:kernel-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise Micro 5.3:kernel-default-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise Micro 5.3:kernel-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Micro 5.3:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.aarch64",
            "SUSE Linux Enterprise Micro 5.3:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
            "SUSE Linux Enterprise Micro 5.4:kernel-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise Micro 5.4:kernel-default-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise Micro 5.4:kernel-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Micro 5.4:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.aarch64",
            "SUSE Linux Enterprise Micro 5.4:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-64kb-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-64kb-devel-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.aarch64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.ppc64le",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-devel-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-docs-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-macros-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-source-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.170.1.aarch64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.170.1.ppc64le",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.170.1.s390x",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.170.1.x86_64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-zfcpdump-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-devel-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-devel-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-devel-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-docs-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-macros-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-obs-build-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-obs-build-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-source-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-syms-5.14.21-150400.24.170.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-syms-5.14.21-150400.24.170.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Manager Proxy 4.3:kernel-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Manager Proxy 4.3:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
            "SUSE Manager Proxy 4.3:kernel-default-devel-5.14.21-150400.24.170.2.x86_64",
            "SUSE Manager Proxy 4.3:kernel-devel-5.14.21-150400.24.170.1.noarch",
            "SUSE Manager Proxy 4.3:kernel-macros-5.14.21-150400.24.170.1.noarch",
            "SUSE Manager Proxy 4.3:kernel-source-5.14.21-150400.24.170.1.noarch",
            "SUSE Manager Proxy 4.3:kernel-syms-5.14.21-150400.24.170.1.x86_64",
            "SUSE Manager Server 4.3:kernel-default-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Manager Server 4.3:kernel-default-5.14.21-150400.24.170.2.s390x",
            "SUSE Manager Server 4.3:kernel-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Manager Server 4.3:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.ppc64le",
            "SUSE Manager Server 4.3:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
            "SUSE Manager Server 4.3:kernel-default-devel-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Manager Server 4.3:kernel-default-devel-5.14.21-150400.24.170.2.s390x",
            "SUSE Manager Server 4.3:kernel-default-devel-5.14.21-150400.24.170.2.x86_64",
            "SUSE Manager Server 4.3:kernel-devel-5.14.21-150400.24.170.1.noarch",
            "SUSE Manager Server 4.3:kernel-macros-5.14.21-150400.24.170.1.noarch",
            "SUSE Manager Server 4.3:kernel-source-5.14.21-150400.24.170.1.noarch",
            "SUSE Manager Server 4.3:kernel-syms-5.14.21-150400.24.170.1.ppc64le",
            "SUSE Manager Server 4.3:kernel-syms-5.14.21-150400.24.170.1.s390x",
            "SUSE Manager Server 4.3:kernel-syms-5.14.21-150400.24.170.1.x86_64",
            "SUSE Manager Server 4.3:kernel-zfcpdump-5.14.21-150400.24.170.2.s390x"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2025-07-28T15:09:33Z",
          "details": "moderate"
        }
      ],
      "title": "CVE-2022-50153"
    },
    {
      "cve": "CVE-2022-50154",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2022-50154"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "In the Linux kernel, the following vulnerability has been resolved:\n\nPCI: mediatek-gen3: Fix refcount leak in mtk_pcie_init_irq_domains()\n\nof_get_child_by_name() returns a node pointer with refcount incremented, so\nwe should use of_node_put() on it when we don\u0027t need it anymore.\n\nAdd missing of_node_put() to avoid refcount leak.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.170.2.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.170.2.s390x",
          "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.170.2.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.170.2.s390x",
          "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.170.2.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.170.2.s390x",
          "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.170.2.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.170.2.s390x",
          "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-64kb-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-64kb-devel-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-devel-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-devel-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-devel-5.14.21-150400.24.170.1.noarch",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-docs-5.14.21-150400.24.170.1.noarch",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-macros-5.14.21-150400.24.170.1.noarch",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-obs-build-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-obs-build-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-source-5.14.21-150400.24.170.1.noarch",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-syms-5.14.21-150400.24.170.1.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-syms-5.14.21-150400.24.170.1.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:reiserfs-kmp-default-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:reiserfs-kmp-default-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-64kb-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-64kb-devel-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-devel-5.14.21-150400.24.170.1.noarch",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-docs-5.14.21-150400.24.170.1.noarch",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-macros-5.14.21-150400.24.170.1.noarch",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-source-5.14.21-150400.24.170.1.noarch",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.170.1.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.170.1.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.170.2.ppc64le",
          "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.170.2.s390x",
          "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.170.2.ppc64le",
          "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.170.2.s390x",
          "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_170-default-1-150400.9.3.2.ppc64le",
          "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_170-default-1-150400.9.3.2.s390x",
          "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_170-default-1-150400.9.3.2.x86_64",
          "SUSE Linux Enterprise Micro 5.3:kernel-default-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise Micro 5.3:kernel-default-5.14.21-150400.24.170.2.s390x",
          "SUSE Linux Enterprise Micro 5.3:kernel-default-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise Micro 5.3:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.aarch64",
          "SUSE Linux Enterprise Micro 5.3:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
          "SUSE Linux Enterprise Micro 5.4:kernel-default-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise Micro 5.4:kernel-default-5.14.21-150400.24.170.2.s390x",
          "SUSE Linux Enterprise Micro 5.4:kernel-default-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise Micro 5.4:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.aarch64",
          "SUSE Linux Enterprise Micro 5.4:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-64kb-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-64kb-devel-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-5.14.21-150400.24.170.2.ppc64le",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-5.14.21-150400.24.170.2.s390x",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.aarch64",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.ppc64le",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.170.2.ppc64le",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.170.2.s390x",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-devel-5.14.21-150400.24.170.1.noarch",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-docs-5.14.21-150400.24.170.1.noarch",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-macros-5.14.21-150400.24.170.1.noarch",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.170.2.ppc64le",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.170.2.s390x",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-source-5.14.21-150400.24.170.1.noarch",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.170.1.aarch64",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.170.1.ppc64le",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.170.1.s390x",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.170.1.x86_64",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-zfcpdump-5.14.21-150400.24.170.2.s390x",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.170.2.ppc64le",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.170.2.s390x",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-5.14.21-150400.24.170.2.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-devel-5.14.21-150400.24.170.2.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-devel-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-devel-5.14.21-150400.24.170.1.noarch",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-docs-5.14.21-150400.24.170.1.noarch",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-macros-5.14.21-150400.24.170.1.noarch",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-obs-build-5.14.21-150400.24.170.2.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-obs-build-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-source-5.14.21-150400.24.170.1.noarch",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-syms-5.14.21-150400.24.170.1.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-syms-5.14.21-150400.24.170.1.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.170.2.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.170.2.x86_64",
          "SUSE Manager Proxy 4.3:kernel-default-5.14.21-150400.24.170.2.x86_64",
          "SUSE Manager Proxy 4.3:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
          "SUSE Manager Proxy 4.3:kernel-default-devel-5.14.21-150400.24.170.2.x86_64",
          "SUSE Manager Proxy 4.3:kernel-devel-5.14.21-150400.24.170.1.noarch",
          "SUSE Manager Proxy 4.3:kernel-macros-5.14.21-150400.24.170.1.noarch",
          "SUSE Manager Proxy 4.3:kernel-source-5.14.21-150400.24.170.1.noarch",
          "SUSE Manager Proxy 4.3:kernel-syms-5.14.21-150400.24.170.1.x86_64",
          "SUSE Manager Server 4.3:kernel-default-5.14.21-150400.24.170.2.ppc64le",
          "SUSE Manager Server 4.3:kernel-default-5.14.21-150400.24.170.2.s390x",
          "SUSE Manager Server 4.3:kernel-default-5.14.21-150400.24.170.2.x86_64",
          "SUSE Manager Server 4.3:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.ppc64le",
          "SUSE Manager Server 4.3:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
          "SUSE Manager Server 4.3:kernel-default-devel-5.14.21-150400.24.170.2.ppc64le",
          "SUSE Manager Server 4.3:kernel-default-devel-5.14.21-150400.24.170.2.s390x",
          "SUSE Manager Server 4.3:kernel-default-devel-5.14.21-150400.24.170.2.x86_64",
          "SUSE Manager Server 4.3:kernel-devel-5.14.21-150400.24.170.1.noarch",
          "SUSE Manager Server 4.3:kernel-macros-5.14.21-150400.24.170.1.noarch",
          "SUSE Manager Server 4.3:kernel-source-5.14.21-150400.24.170.1.noarch",
          "SUSE Manager Server 4.3:kernel-syms-5.14.21-150400.24.170.1.ppc64le",
          "SUSE Manager Server 4.3:kernel-syms-5.14.21-150400.24.170.1.s390x",
          "SUSE Manager Server 4.3:kernel-syms-5.14.21-150400.24.170.1.x86_64",
          "SUSE Manager Server 4.3:kernel-zfcpdump-5.14.21-150400.24.170.2.s390x"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2022-50154",
          "url": "https://www.suse.com/security/cve/CVE-2022-50154"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1244784 for CVE-2022-50154",
          "url": "https://bugzilla.suse.com/1244784"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-64kb-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-64kb-devel-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-devel-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-devel-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-devel-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-docs-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-macros-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-obs-build-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-obs-build-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-source-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-syms-5.14.21-150400.24.170.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-syms-5.14.21-150400.24.170.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:reiserfs-kmp-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:reiserfs-kmp-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-64kb-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-64kb-devel-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-devel-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-docs-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-macros-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-source-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.170.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.170.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_170-default-1-150400.9.3.2.ppc64le",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_170-default-1-150400.9.3.2.s390x",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_170-default-1-150400.9.3.2.x86_64",
            "SUSE Linux Enterprise Micro 5.3:kernel-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise Micro 5.3:kernel-default-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise Micro 5.3:kernel-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Micro 5.3:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.aarch64",
            "SUSE Linux Enterprise Micro 5.3:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
            "SUSE Linux Enterprise Micro 5.4:kernel-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise Micro 5.4:kernel-default-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise Micro 5.4:kernel-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Micro 5.4:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.aarch64",
            "SUSE Linux Enterprise Micro 5.4:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-64kb-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-64kb-devel-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.aarch64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.ppc64le",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-devel-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-docs-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-macros-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-source-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.170.1.aarch64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.170.1.ppc64le",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.170.1.s390x",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.170.1.x86_64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-zfcpdump-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-devel-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-devel-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-devel-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-docs-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-macros-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-obs-build-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-obs-build-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-source-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-syms-5.14.21-150400.24.170.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-syms-5.14.21-150400.24.170.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Manager Proxy 4.3:kernel-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Manager Proxy 4.3:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
            "SUSE Manager Proxy 4.3:kernel-default-devel-5.14.21-150400.24.170.2.x86_64",
            "SUSE Manager Proxy 4.3:kernel-devel-5.14.21-150400.24.170.1.noarch",
            "SUSE Manager Proxy 4.3:kernel-macros-5.14.21-150400.24.170.1.noarch",
            "SUSE Manager Proxy 4.3:kernel-source-5.14.21-150400.24.170.1.noarch",
            "SUSE Manager Proxy 4.3:kernel-syms-5.14.21-150400.24.170.1.x86_64",
            "SUSE Manager Server 4.3:kernel-default-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Manager Server 4.3:kernel-default-5.14.21-150400.24.170.2.s390x",
            "SUSE Manager Server 4.3:kernel-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Manager Server 4.3:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.ppc64le",
            "SUSE Manager Server 4.3:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
            "SUSE Manager Server 4.3:kernel-default-devel-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Manager Server 4.3:kernel-default-devel-5.14.21-150400.24.170.2.s390x",
            "SUSE Manager Server 4.3:kernel-default-devel-5.14.21-150400.24.170.2.x86_64",
            "SUSE Manager Server 4.3:kernel-devel-5.14.21-150400.24.170.1.noarch",
            "SUSE Manager Server 4.3:kernel-macros-5.14.21-150400.24.170.1.noarch",
            "SUSE Manager Server 4.3:kernel-source-5.14.21-150400.24.170.1.noarch",
            "SUSE Manager Server 4.3:kernel-syms-5.14.21-150400.24.170.1.ppc64le",
            "SUSE Manager Server 4.3:kernel-syms-5.14.21-150400.24.170.1.s390x",
            "SUSE Manager Server 4.3:kernel-syms-5.14.21-150400.24.170.1.x86_64",
            "SUSE Manager Server 4.3:kernel-zfcpdump-5.14.21-150400.24.170.2.s390x"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 5.5,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
            "version": "3.1"
          },
          "products": [
            "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-64kb-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-64kb-devel-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-devel-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-devel-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-devel-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-docs-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-macros-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-obs-build-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-obs-build-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-source-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-syms-5.14.21-150400.24.170.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-syms-5.14.21-150400.24.170.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:reiserfs-kmp-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:reiserfs-kmp-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-64kb-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-64kb-devel-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-devel-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-docs-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-macros-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-source-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.170.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.170.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_170-default-1-150400.9.3.2.ppc64le",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_170-default-1-150400.9.3.2.s390x",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_170-default-1-150400.9.3.2.x86_64",
            "SUSE Linux Enterprise Micro 5.3:kernel-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise Micro 5.3:kernel-default-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise Micro 5.3:kernel-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Micro 5.3:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.aarch64",
            "SUSE Linux Enterprise Micro 5.3:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
            "SUSE Linux Enterprise Micro 5.4:kernel-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise Micro 5.4:kernel-default-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise Micro 5.4:kernel-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Micro 5.4:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.aarch64",
            "SUSE Linux Enterprise Micro 5.4:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-64kb-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-64kb-devel-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.aarch64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.ppc64le",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-devel-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-docs-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-macros-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-source-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.170.1.aarch64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.170.1.ppc64le",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.170.1.s390x",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.170.1.x86_64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-zfcpdump-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-devel-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-devel-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-devel-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-docs-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-macros-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-obs-build-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-obs-build-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-source-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-syms-5.14.21-150400.24.170.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-syms-5.14.21-150400.24.170.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Manager Proxy 4.3:kernel-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Manager Proxy 4.3:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
            "SUSE Manager Proxy 4.3:kernel-default-devel-5.14.21-150400.24.170.2.x86_64",
            "SUSE Manager Proxy 4.3:kernel-devel-5.14.21-150400.24.170.1.noarch",
            "SUSE Manager Proxy 4.3:kernel-macros-5.14.21-150400.24.170.1.noarch",
            "SUSE Manager Proxy 4.3:kernel-source-5.14.21-150400.24.170.1.noarch",
            "SUSE Manager Proxy 4.3:kernel-syms-5.14.21-150400.24.170.1.x86_64",
            "SUSE Manager Server 4.3:kernel-default-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Manager Server 4.3:kernel-default-5.14.21-150400.24.170.2.s390x",
            "SUSE Manager Server 4.3:kernel-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Manager Server 4.3:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.ppc64le",
            "SUSE Manager Server 4.3:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
            "SUSE Manager Server 4.3:kernel-default-devel-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Manager Server 4.3:kernel-default-devel-5.14.21-150400.24.170.2.s390x",
            "SUSE Manager Server 4.3:kernel-default-devel-5.14.21-150400.24.170.2.x86_64",
            "SUSE Manager Server 4.3:kernel-devel-5.14.21-150400.24.170.1.noarch",
            "SUSE Manager Server 4.3:kernel-macros-5.14.21-150400.24.170.1.noarch",
            "SUSE Manager Server 4.3:kernel-source-5.14.21-150400.24.170.1.noarch",
            "SUSE Manager Server 4.3:kernel-syms-5.14.21-150400.24.170.1.ppc64le",
            "SUSE Manager Server 4.3:kernel-syms-5.14.21-150400.24.170.1.s390x",
            "SUSE Manager Server 4.3:kernel-syms-5.14.21-150400.24.170.1.x86_64",
            "SUSE Manager Server 4.3:kernel-zfcpdump-5.14.21-150400.24.170.2.s390x"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2025-07-28T15:09:33Z",
          "details": "moderate"
        }
      ],
      "title": "CVE-2022-50154"
    },
    {
      "cve": "CVE-2022-50155",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2022-50155"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "In the Linux kernel, the following vulnerability has been resolved:\n\nmtd: parsers: ofpart: Fix refcount leak in bcm4908_partitions_fw_offset\n\nof_find_node_by_path() returns a node pointer with refcount incremented,\nwe should use of_node_put() on it when not need anymore.\nAdd missing of_node_put() to avoid refcount leak.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.170.2.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.170.2.s390x",
          "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.170.2.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.170.2.s390x",
          "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.170.2.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.170.2.s390x",
          "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.170.2.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.170.2.s390x",
          "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-64kb-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-64kb-devel-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-devel-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-devel-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-devel-5.14.21-150400.24.170.1.noarch",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-docs-5.14.21-150400.24.170.1.noarch",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-macros-5.14.21-150400.24.170.1.noarch",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-obs-build-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-obs-build-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-source-5.14.21-150400.24.170.1.noarch",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-syms-5.14.21-150400.24.170.1.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-syms-5.14.21-150400.24.170.1.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:reiserfs-kmp-default-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:reiserfs-kmp-default-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-64kb-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-64kb-devel-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-devel-5.14.21-150400.24.170.1.noarch",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-docs-5.14.21-150400.24.170.1.noarch",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-macros-5.14.21-150400.24.170.1.noarch",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-source-5.14.21-150400.24.170.1.noarch",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.170.1.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.170.1.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.170.2.ppc64le",
          "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.170.2.s390x",
          "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.170.2.ppc64le",
          "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.170.2.s390x",
          "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_170-default-1-150400.9.3.2.ppc64le",
          "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_170-default-1-150400.9.3.2.s390x",
          "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_170-default-1-150400.9.3.2.x86_64",
          "SUSE Linux Enterprise Micro 5.3:kernel-default-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise Micro 5.3:kernel-default-5.14.21-150400.24.170.2.s390x",
          "SUSE Linux Enterprise Micro 5.3:kernel-default-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise Micro 5.3:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.aarch64",
          "SUSE Linux Enterprise Micro 5.3:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
          "SUSE Linux Enterprise Micro 5.4:kernel-default-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise Micro 5.4:kernel-default-5.14.21-150400.24.170.2.s390x",
          "SUSE Linux Enterprise Micro 5.4:kernel-default-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise Micro 5.4:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.aarch64",
          "SUSE Linux Enterprise Micro 5.4:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-64kb-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-64kb-devel-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-5.14.21-150400.24.170.2.ppc64le",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-5.14.21-150400.24.170.2.s390x",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.aarch64",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.ppc64le",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.170.2.ppc64le",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.170.2.s390x",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-devel-5.14.21-150400.24.170.1.noarch",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-docs-5.14.21-150400.24.170.1.noarch",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-macros-5.14.21-150400.24.170.1.noarch",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.170.2.ppc64le",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.170.2.s390x",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-source-5.14.21-150400.24.170.1.noarch",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.170.1.aarch64",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.170.1.ppc64le",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.170.1.s390x",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.170.1.x86_64",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-zfcpdump-5.14.21-150400.24.170.2.s390x",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.170.2.ppc64le",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.170.2.s390x",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-5.14.21-150400.24.170.2.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-devel-5.14.21-150400.24.170.2.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-devel-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-devel-5.14.21-150400.24.170.1.noarch",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-docs-5.14.21-150400.24.170.1.noarch",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-macros-5.14.21-150400.24.170.1.noarch",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-obs-build-5.14.21-150400.24.170.2.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-obs-build-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-source-5.14.21-150400.24.170.1.noarch",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-syms-5.14.21-150400.24.170.1.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-syms-5.14.21-150400.24.170.1.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.170.2.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.170.2.x86_64",
          "SUSE Manager Proxy 4.3:kernel-default-5.14.21-150400.24.170.2.x86_64",
          "SUSE Manager Proxy 4.3:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
          "SUSE Manager Proxy 4.3:kernel-default-devel-5.14.21-150400.24.170.2.x86_64",
          "SUSE Manager Proxy 4.3:kernel-devel-5.14.21-150400.24.170.1.noarch",
          "SUSE Manager Proxy 4.3:kernel-macros-5.14.21-150400.24.170.1.noarch",
          "SUSE Manager Proxy 4.3:kernel-source-5.14.21-150400.24.170.1.noarch",
          "SUSE Manager Proxy 4.3:kernel-syms-5.14.21-150400.24.170.1.x86_64",
          "SUSE Manager Server 4.3:kernel-default-5.14.21-150400.24.170.2.ppc64le",
          "SUSE Manager Server 4.3:kernel-default-5.14.21-150400.24.170.2.s390x",
          "SUSE Manager Server 4.3:kernel-default-5.14.21-150400.24.170.2.x86_64",
          "SUSE Manager Server 4.3:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.ppc64le",
          "SUSE Manager Server 4.3:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
          "SUSE Manager Server 4.3:kernel-default-devel-5.14.21-150400.24.170.2.ppc64le",
          "SUSE Manager Server 4.3:kernel-default-devel-5.14.21-150400.24.170.2.s390x",
          "SUSE Manager Server 4.3:kernel-default-devel-5.14.21-150400.24.170.2.x86_64",
          "SUSE Manager Server 4.3:kernel-devel-5.14.21-150400.24.170.1.noarch",
          "SUSE Manager Server 4.3:kernel-macros-5.14.21-150400.24.170.1.noarch",
          "SUSE Manager Server 4.3:kernel-source-5.14.21-150400.24.170.1.noarch",
          "SUSE Manager Server 4.3:kernel-syms-5.14.21-150400.24.170.1.ppc64le",
          "SUSE Manager Server 4.3:kernel-syms-5.14.21-150400.24.170.1.s390x",
          "SUSE Manager Server 4.3:kernel-syms-5.14.21-150400.24.170.1.x86_64",
          "SUSE Manager Server 4.3:kernel-zfcpdump-5.14.21-150400.24.170.2.s390x"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2022-50155",
          "url": "https://www.suse.com/security/cve/CVE-2022-50155"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1244781 for CVE-2022-50155",
          "url": "https://bugzilla.suse.com/1244781"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-64kb-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-64kb-devel-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-devel-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-devel-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-devel-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-docs-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-macros-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-obs-build-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-obs-build-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-source-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-syms-5.14.21-150400.24.170.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-syms-5.14.21-150400.24.170.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:reiserfs-kmp-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:reiserfs-kmp-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-64kb-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-64kb-devel-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-devel-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-docs-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-macros-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-source-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.170.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.170.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_170-default-1-150400.9.3.2.ppc64le",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_170-default-1-150400.9.3.2.s390x",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_170-default-1-150400.9.3.2.x86_64",
            "SUSE Linux Enterprise Micro 5.3:kernel-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise Micro 5.3:kernel-default-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise Micro 5.3:kernel-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Micro 5.3:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.aarch64",
            "SUSE Linux Enterprise Micro 5.3:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
            "SUSE Linux Enterprise Micro 5.4:kernel-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise Micro 5.4:kernel-default-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise Micro 5.4:kernel-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Micro 5.4:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.aarch64",
            "SUSE Linux Enterprise Micro 5.4:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-64kb-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-64kb-devel-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.aarch64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.ppc64le",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-devel-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-docs-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-macros-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-source-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.170.1.aarch64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.170.1.ppc64le",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.170.1.s390x",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.170.1.x86_64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-zfcpdump-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-devel-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-devel-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-devel-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-docs-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-macros-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-obs-build-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-obs-build-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-source-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-syms-5.14.21-150400.24.170.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-syms-5.14.21-150400.24.170.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Manager Proxy 4.3:kernel-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Manager Proxy 4.3:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
            "SUSE Manager Proxy 4.3:kernel-default-devel-5.14.21-150400.24.170.2.x86_64",
            "SUSE Manager Proxy 4.3:kernel-devel-5.14.21-150400.24.170.1.noarch",
            "SUSE Manager Proxy 4.3:kernel-macros-5.14.21-150400.24.170.1.noarch",
            "SUSE Manager Proxy 4.3:kernel-source-5.14.21-150400.24.170.1.noarch",
            "SUSE Manager Proxy 4.3:kernel-syms-5.14.21-150400.24.170.1.x86_64",
            "SUSE Manager Server 4.3:kernel-default-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Manager Server 4.3:kernel-default-5.14.21-150400.24.170.2.s390x",
            "SUSE Manager Server 4.3:kernel-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Manager Server 4.3:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.ppc64le",
            "SUSE Manager Server 4.3:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
            "SUSE Manager Server 4.3:kernel-default-devel-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Manager Server 4.3:kernel-default-devel-5.14.21-150400.24.170.2.s390x",
            "SUSE Manager Server 4.3:kernel-default-devel-5.14.21-150400.24.170.2.x86_64",
            "SUSE Manager Server 4.3:kernel-devel-5.14.21-150400.24.170.1.noarch",
            "SUSE Manager Server 4.3:kernel-macros-5.14.21-150400.24.170.1.noarch",
            "SUSE Manager Server 4.3:kernel-source-5.14.21-150400.24.170.1.noarch",
            "SUSE Manager Server 4.3:kernel-syms-5.14.21-150400.24.170.1.ppc64le",
            "SUSE Manager Server 4.3:kernel-syms-5.14.21-150400.24.170.1.s390x",
            "SUSE Manager Server 4.3:kernel-syms-5.14.21-150400.24.170.1.x86_64",
            "SUSE Manager Server 4.3:kernel-zfcpdump-5.14.21-150400.24.170.2.s390x"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 5.5,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
            "version": "3.1"
          },
          "products": [
            "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-64kb-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-64kb-devel-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-devel-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-devel-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-devel-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-docs-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-macros-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-obs-build-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-obs-build-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-source-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-syms-5.14.21-150400.24.170.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-syms-5.14.21-150400.24.170.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:reiserfs-kmp-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:reiserfs-kmp-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-64kb-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-64kb-devel-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-devel-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-docs-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-macros-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-source-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.170.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.170.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_170-default-1-150400.9.3.2.ppc64le",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_170-default-1-150400.9.3.2.s390x",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_170-default-1-150400.9.3.2.x86_64",
            "SUSE Linux Enterprise Micro 5.3:kernel-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise Micro 5.3:kernel-default-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise Micro 5.3:kernel-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Micro 5.3:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.aarch64",
            "SUSE Linux Enterprise Micro 5.3:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
            "SUSE Linux Enterprise Micro 5.4:kernel-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise Micro 5.4:kernel-default-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise Micro 5.4:kernel-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Micro 5.4:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.aarch64",
            "SUSE Linux Enterprise Micro 5.4:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-64kb-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-64kb-devel-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.aarch64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.ppc64le",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-devel-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-docs-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-macros-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-source-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.170.1.aarch64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.170.1.ppc64le",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.170.1.s390x",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.170.1.x86_64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-zfcpdump-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-devel-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-devel-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-devel-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-docs-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-macros-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-obs-build-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-obs-build-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-source-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-syms-5.14.21-150400.24.170.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-syms-5.14.21-150400.24.170.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Manager Proxy 4.3:kernel-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Manager Proxy 4.3:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
            "SUSE Manager Proxy 4.3:kernel-default-devel-5.14.21-150400.24.170.2.x86_64",
            "SUSE Manager Proxy 4.3:kernel-devel-5.14.21-150400.24.170.1.noarch",
            "SUSE Manager Proxy 4.3:kernel-macros-5.14.21-150400.24.170.1.noarch",
            "SUSE Manager Proxy 4.3:kernel-source-5.14.21-150400.24.170.1.noarch",
            "SUSE Manager Proxy 4.3:kernel-syms-5.14.21-150400.24.170.1.x86_64",
            "SUSE Manager Server 4.3:kernel-default-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Manager Server 4.3:kernel-default-5.14.21-150400.24.170.2.s390x",
            "SUSE Manager Server 4.3:kernel-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Manager Server 4.3:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.ppc64le",
            "SUSE Manager Server 4.3:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
            "SUSE Manager Server 4.3:kernel-default-devel-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Manager Server 4.3:kernel-default-devel-5.14.21-150400.24.170.2.s390x",
            "SUSE Manager Server 4.3:kernel-default-devel-5.14.21-150400.24.170.2.x86_64",
            "SUSE Manager Server 4.3:kernel-devel-5.14.21-150400.24.170.1.noarch",
            "SUSE Manager Server 4.3:kernel-macros-5.14.21-150400.24.170.1.noarch",
            "SUSE Manager Server 4.3:kernel-source-5.14.21-150400.24.170.1.noarch",
            "SUSE Manager Server 4.3:kernel-syms-5.14.21-150400.24.170.1.ppc64le",
            "SUSE Manager Server 4.3:kernel-syms-5.14.21-150400.24.170.1.s390x",
            "SUSE Manager Server 4.3:kernel-syms-5.14.21-150400.24.170.1.x86_64",
            "SUSE Manager Server 4.3:kernel-zfcpdump-5.14.21-150400.24.170.2.s390x"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2025-07-28T15:09:33Z",
          "details": "moderate"
        }
      ],
      "title": "CVE-2022-50155"
    },
    {
      "cve": "CVE-2022-50156",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2022-50156"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "In the Linux kernel, the following vulnerability has been resolved:\n\nHID: cp2112: prevent a buffer overflow in cp2112_xfer()\n\nSmatch warnings:\ndrivers/hid/hid-cp2112.c:793 cp2112_xfer() error: __memcpy()\n\u0027data-\u003eblock[1]\u0027 too small (33 vs 255)\ndrivers/hid/hid-cp2112.c:793 cp2112_xfer() error: __memcpy() \u0027buf\u0027 too\nsmall (64 vs 255)\n\nThe \u0027read_length\u0027 variable is provided by \u0027data-\u003eblock[0]\u0027 which comes\nfrom user and it(read_length) can take a value between 0-255. Add an\nupper bound to \u0027read_length\u0027 variable to prevent a buffer overflow in\nmemcpy().",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.170.2.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.170.2.s390x",
          "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.170.2.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.170.2.s390x",
          "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.170.2.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.170.2.s390x",
          "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.170.2.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.170.2.s390x",
          "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-64kb-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-64kb-devel-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-devel-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-devel-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-devel-5.14.21-150400.24.170.1.noarch",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-docs-5.14.21-150400.24.170.1.noarch",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-macros-5.14.21-150400.24.170.1.noarch",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-obs-build-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-obs-build-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-source-5.14.21-150400.24.170.1.noarch",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-syms-5.14.21-150400.24.170.1.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-syms-5.14.21-150400.24.170.1.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:reiserfs-kmp-default-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:reiserfs-kmp-default-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-64kb-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-64kb-devel-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-devel-5.14.21-150400.24.170.1.noarch",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-docs-5.14.21-150400.24.170.1.noarch",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-macros-5.14.21-150400.24.170.1.noarch",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-source-5.14.21-150400.24.170.1.noarch",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.170.1.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.170.1.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.170.2.ppc64le",
          "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.170.2.s390x",
          "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.170.2.ppc64le",
          "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.170.2.s390x",
          "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_170-default-1-150400.9.3.2.ppc64le",
          "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_170-default-1-150400.9.3.2.s390x",
          "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_170-default-1-150400.9.3.2.x86_64",
          "SUSE Linux Enterprise Micro 5.3:kernel-default-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise Micro 5.3:kernel-default-5.14.21-150400.24.170.2.s390x",
          "SUSE Linux Enterprise Micro 5.3:kernel-default-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise Micro 5.3:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.aarch64",
          "SUSE Linux Enterprise Micro 5.3:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
          "SUSE Linux Enterprise Micro 5.4:kernel-default-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise Micro 5.4:kernel-default-5.14.21-150400.24.170.2.s390x",
          "SUSE Linux Enterprise Micro 5.4:kernel-default-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise Micro 5.4:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.aarch64",
          "SUSE Linux Enterprise Micro 5.4:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-64kb-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-64kb-devel-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-5.14.21-150400.24.170.2.ppc64le",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-5.14.21-150400.24.170.2.s390x",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.aarch64",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.ppc64le",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.170.2.ppc64le",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.170.2.s390x",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-devel-5.14.21-150400.24.170.1.noarch",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-docs-5.14.21-150400.24.170.1.noarch",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-macros-5.14.21-150400.24.170.1.noarch",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.170.2.ppc64le",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.170.2.s390x",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-source-5.14.21-150400.24.170.1.noarch",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.170.1.aarch64",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.170.1.ppc64le",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.170.1.s390x",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.170.1.x86_64",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-zfcpdump-5.14.21-150400.24.170.2.s390x",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.170.2.ppc64le",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.170.2.s390x",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-5.14.21-150400.24.170.2.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-devel-5.14.21-150400.24.170.2.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-devel-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-devel-5.14.21-150400.24.170.1.noarch",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-docs-5.14.21-150400.24.170.1.noarch",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-macros-5.14.21-150400.24.170.1.noarch",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-obs-build-5.14.21-150400.24.170.2.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-obs-build-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-source-5.14.21-150400.24.170.1.noarch",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-syms-5.14.21-150400.24.170.1.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-syms-5.14.21-150400.24.170.1.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.170.2.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.170.2.x86_64",
          "SUSE Manager Proxy 4.3:kernel-default-5.14.21-150400.24.170.2.x86_64",
          "SUSE Manager Proxy 4.3:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
          "SUSE Manager Proxy 4.3:kernel-default-devel-5.14.21-150400.24.170.2.x86_64",
          "SUSE Manager Proxy 4.3:kernel-devel-5.14.21-150400.24.170.1.noarch",
          "SUSE Manager Proxy 4.3:kernel-macros-5.14.21-150400.24.170.1.noarch",
          "SUSE Manager Proxy 4.3:kernel-source-5.14.21-150400.24.170.1.noarch",
          "SUSE Manager Proxy 4.3:kernel-syms-5.14.21-150400.24.170.1.x86_64",
          "SUSE Manager Server 4.3:kernel-default-5.14.21-150400.24.170.2.ppc64le",
          "SUSE Manager Server 4.3:kernel-default-5.14.21-150400.24.170.2.s390x",
          "SUSE Manager Server 4.3:kernel-default-5.14.21-150400.24.170.2.x86_64",
          "SUSE Manager Server 4.3:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.ppc64le",
          "SUSE Manager Server 4.3:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
          "SUSE Manager Server 4.3:kernel-default-devel-5.14.21-150400.24.170.2.ppc64le",
          "SUSE Manager Server 4.3:kernel-default-devel-5.14.21-150400.24.170.2.s390x",
          "SUSE Manager Server 4.3:kernel-default-devel-5.14.21-150400.24.170.2.x86_64",
          "SUSE Manager Server 4.3:kernel-devel-5.14.21-150400.24.170.1.noarch",
          "SUSE Manager Server 4.3:kernel-macros-5.14.21-150400.24.170.1.noarch",
          "SUSE Manager Server 4.3:kernel-source-5.14.21-150400.24.170.1.noarch",
          "SUSE Manager Server 4.3:kernel-syms-5.14.21-150400.24.170.1.ppc64le",
          "SUSE Manager Server 4.3:kernel-syms-5.14.21-150400.24.170.1.s390x",
          "SUSE Manager Server 4.3:kernel-syms-5.14.21-150400.24.170.1.x86_64",
          "SUSE Manager Server 4.3:kernel-zfcpdump-5.14.21-150400.24.170.2.s390x"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2022-50156",
          "url": "https://www.suse.com/security/cve/CVE-2022-50156"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1244782 for CVE-2022-50156",
          "url": "https://bugzilla.suse.com/1244782"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-64kb-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-64kb-devel-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-devel-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-devel-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-devel-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-docs-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-macros-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-obs-build-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-obs-build-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-source-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-syms-5.14.21-150400.24.170.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-syms-5.14.21-150400.24.170.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:reiserfs-kmp-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:reiserfs-kmp-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-64kb-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-64kb-devel-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-devel-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-docs-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-macros-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-source-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.170.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.170.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_170-default-1-150400.9.3.2.ppc64le",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_170-default-1-150400.9.3.2.s390x",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_170-default-1-150400.9.3.2.x86_64",
            "SUSE Linux Enterprise Micro 5.3:kernel-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise Micro 5.3:kernel-default-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise Micro 5.3:kernel-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Micro 5.3:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.aarch64",
            "SUSE Linux Enterprise Micro 5.3:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
            "SUSE Linux Enterprise Micro 5.4:kernel-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise Micro 5.4:kernel-default-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise Micro 5.4:kernel-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Micro 5.4:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.aarch64",
            "SUSE Linux Enterprise Micro 5.4:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-64kb-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-64kb-devel-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.aarch64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.ppc64le",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-devel-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-docs-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-macros-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-source-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.170.1.aarch64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.170.1.ppc64le",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.170.1.s390x",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.170.1.x86_64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-zfcpdump-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-devel-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-devel-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-devel-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-docs-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-macros-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-obs-build-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-obs-build-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-source-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-syms-5.14.21-150400.24.170.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-syms-5.14.21-150400.24.170.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Manager Proxy 4.3:kernel-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Manager Proxy 4.3:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
            "SUSE Manager Proxy 4.3:kernel-default-devel-5.14.21-150400.24.170.2.x86_64",
            "SUSE Manager Proxy 4.3:kernel-devel-5.14.21-150400.24.170.1.noarch",
            "SUSE Manager Proxy 4.3:kernel-macros-5.14.21-150400.24.170.1.noarch",
            "SUSE Manager Proxy 4.3:kernel-source-5.14.21-150400.24.170.1.noarch",
            "SUSE Manager Proxy 4.3:kernel-syms-5.14.21-150400.24.170.1.x86_64",
            "SUSE Manager Server 4.3:kernel-default-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Manager Server 4.3:kernel-default-5.14.21-150400.24.170.2.s390x",
            "SUSE Manager Server 4.3:kernel-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Manager Server 4.3:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.ppc64le",
            "SUSE Manager Server 4.3:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
            "SUSE Manager Server 4.3:kernel-default-devel-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Manager Server 4.3:kernel-default-devel-5.14.21-150400.24.170.2.s390x",
            "SUSE Manager Server 4.3:kernel-default-devel-5.14.21-150400.24.170.2.x86_64",
            "SUSE Manager Server 4.3:kernel-devel-5.14.21-150400.24.170.1.noarch",
            "SUSE Manager Server 4.3:kernel-macros-5.14.21-150400.24.170.1.noarch",
            "SUSE Manager Server 4.3:kernel-source-5.14.21-150400.24.170.1.noarch",
            "SUSE Manager Server 4.3:kernel-syms-5.14.21-150400.24.170.1.ppc64le",
            "SUSE Manager Server 4.3:kernel-syms-5.14.21-150400.24.170.1.s390x",
            "SUSE Manager Server 4.3:kernel-syms-5.14.21-150400.24.170.1.x86_64",
            "SUSE Manager Server 4.3:kernel-zfcpdump-5.14.21-150400.24.170.2.s390x"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 5.5,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
            "version": "3.1"
          },
          "products": [
            "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-64kb-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-64kb-devel-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-devel-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-devel-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-devel-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-docs-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-macros-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-obs-build-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-obs-build-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-source-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-syms-5.14.21-150400.24.170.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-syms-5.14.21-150400.24.170.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:reiserfs-kmp-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:reiserfs-kmp-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-64kb-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-64kb-devel-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-devel-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-docs-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-macros-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-source-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.170.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.170.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_170-default-1-150400.9.3.2.ppc64le",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_170-default-1-150400.9.3.2.s390x",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_170-default-1-150400.9.3.2.x86_64",
            "SUSE Linux Enterprise Micro 5.3:kernel-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise Micro 5.3:kernel-default-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise Micro 5.3:kernel-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Micro 5.3:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.aarch64",
            "SUSE Linux Enterprise Micro 5.3:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
            "SUSE Linux Enterprise Micro 5.4:kernel-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise Micro 5.4:kernel-default-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise Micro 5.4:kernel-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Micro 5.4:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.aarch64",
            "SUSE Linux Enterprise Micro 5.4:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-64kb-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-64kb-devel-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.aarch64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.ppc64le",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-devel-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-docs-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-macros-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-source-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.170.1.aarch64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.170.1.ppc64le",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.170.1.s390x",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.170.1.x86_64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-zfcpdump-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-devel-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-devel-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-devel-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-docs-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-macros-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-obs-build-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-obs-build-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-source-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-syms-5.14.21-150400.24.170.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-syms-5.14.21-150400.24.170.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Manager Proxy 4.3:kernel-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Manager Proxy 4.3:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
            "SUSE Manager Proxy 4.3:kernel-default-devel-5.14.21-150400.24.170.2.x86_64",
            "SUSE Manager Proxy 4.3:kernel-devel-5.14.21-150400.24.170.1.noarch",
            "SUSE Manager Proxy 4.3:kernel-macros-5.14.21-150400.24.170.1.noarch",
            "SUSE Manager Proxy 4.3:kernel-source-5.14.21-150400.24.170.1.noarch",
            "SUSE Manager Proxy 4.3:kernel-syms-5.14.21-150400.24.170.1.x86_64",
            "SUSE Manager Server 4.3:kernel-default-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Manager Server 4.3:kernel-default-5.14.21-150400.24.170.2.s390x",
            "SUSE Manager Server 4.3:kernel-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Manager Server 4.3:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.ppc64le",
            "SUSE Manager Server 4.3:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
            "SUSE Manager Server 4.3:kernel-default-devel-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Manager Server 4.3:kernel-default-devel-5.14.21-150400.24.170.2.s390x",
            "SUSE Manager Server 4.3:kernel-default-devel-5.14.21-150400.24.170.2.x86_64",
            "SUSE Manager Server 4.3:kernel-devel-5.14.21-150400.24.170.1.noarch",
            "SUSE Manager Server 4.3:kernel-macros-5.14.21-150400.24.170.1.noarch",
            "SUSE Manager Server 4.3:kernel-source-5.14.21-150400.24.170.1.noarch",
            "SUSE Manager Server 4.3:kernel-syms-5.14.21-150400.24.170.1.ppc64le",
            "SUSE Manager Server 4.3:kernel-syms-5.14.21-150400.24.170.1.s390x",
            "SUSE Manager Server 4.3:kernel-syms-5.14.21-150400.24.170.1.x86_64",
            "SUSE Manager Server 4.3:kernel-zfcpdump-5.14.21-150400.24.170.2.s390x"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2025-07-28T15:09:33Z",
          "details": "moderate"
        }
      ],
      "title": "CVE-2022-50156"
    },
    {
      "cve": "CVE-2022-50157",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2022-50157"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "In the Linux kernel, the following vulnerability has been resolved:\n\nPCI: microchip: Fix refcount leak in mc_pcie_init_irq_domains()\n\nof_get_next_child() returns a node pointer with refcount incremented, so we\nshould use of_node_put() on it when we don\u0027t need it anymore.\n\nmc_pcie_init_irq_domains() only calls of_node_put() in the normal path,\nmissing it in some error paths.  Add missing of_node_put() to avoid\nrefcount leak.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.170.2.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.170.2.s390x",
          "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.170.2.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.170.2.s390x",
          "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.170.2.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.170.2.s390x",
          "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.170.2.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.170.2.s390x",
          "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-64kb-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-64kb-devel-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-devel-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-devel-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-devel-5.14.21-150400.24.170.1.noarch",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-docs-5.14.21-150400.24.170.1.noarch",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-macros-5.14.21-150400.24.170.1.noarch",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-obs-build-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-obs-build-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-source-5.14.21-150400.24.170.1.noarch",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-syms-5.14.21-150400.24.170.1.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-syms-5.14.21-150400.24.170.1.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:reiserfs-kmp-default-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:reiserfs-kmp-default-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-64kb-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-64kb-devel-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-devel-5.14.21-150400.24.170.1.noarch",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-docs-5.14.21-150400.24.170.1.noarch",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-macros-5.14.21-150400.24.170.1.noarch",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-source-5.14.21-150400.24.170.1.noarch",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.170.1.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.170.1.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.170.2.ppc64le",
          "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.170.2.s390x",
          "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.170.2.ppc64le",
          "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.170.2.s390x",
          "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_170-default-1-150400.9.3.2.ppc64le",
          "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_170-default-1-150400.9.3.2.s390x",
          "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_170-default-1-150400.9.3.2.x86_64",
          "SUSE Linux Enterprise Micro 5.3:kernel-default-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise Micro 5.3:kernel-default-5.14.21-150400.24.170.2.s390x",
          "SUSE Linux Enterprise Micro 5.3:kernel-default-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise Micro 5.3:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.aarch64",
          "SUSE Linux Enterprise Micro 5.3:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
          "SUSE Linux Enterprise Micro 5.4:kernel-default-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise Micro 5.4:kernel-default-5.14.21-150400.24.170.2.s390x",
          "SUSE Linux Enterprise Micro 5.4:kernel-default-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise Micro 5.4:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.aarch64",
          "SUSE Linux Enterprise Micro 5.4:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-64kb-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-64kb-devel-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-5.14.21-150400.24.170.2.ppc64le",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-5.14.21-150400.24.170.2.s390x",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.aarch64",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.ppc64le",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.170.2.ppc64le",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.170.2.s390x",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-devel-5.14.21-150400.24.170.1.noarch",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-docs-5.14.21-150400.24.170.1.noarch",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-macros-5.14.21-150400.24.170.1.noarch",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.170.2.ppc64le",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.170.2.s390x",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-source-5.14.21-150400.24.170.1.noarch",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.170.1.aarch64",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.170.1.ppc64le",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.170.1.s390x",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.170.1.x86_64",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-zfcpdump-5.14.21-150400.24.170.2.s390x",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.170.2.ppc64le",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.170.2.s390x",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-5.14.21-150400.24.170.2.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-devel-5.14.21-150400.24.170.2.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-devel-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-devel-5.14.21-150400.24.170.1.noarch",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-docs-5.14.21-150400.24.170.1.noarch",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-macros-5.14.21-150400.24.170.1.noarch",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-obs-build-5.14.21-150400.24.170.2.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-obs-build-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-source-5.14.21-150400.24.170.1.noarch",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-syms-5.14.21-150400.24.170.1.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-syms-5.14.21-150400.24.170.1.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.170.2.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.170.2.x86_64",
          "SUSE Manager Proxy 4.3:kernel-default-5.14.21-150400.24.170.2.x86_64",
          "SUSE Manager Proxy 4.3:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
          "SUSE Manager Proxy 4.3:kernel-default-devel-5.14.21-150400.24.170.2.x86_64",
          "SUSE Manager Proxy 4.3:kernel-devel-5.14.21-150400.24.170.1.noarch",
          "SUSE Manager Proxy 4.3:kernel-macros-5.14.21-150400.24.170.1.noarch",
          "SUSE Manager Proxy 4.3:kernel-source-5.14.21-150400.24.170.1.noarch",
          "SUSE Manager Proxy 4.3:kernel-syms-5.14.21-150400.24.170.1.x86_64",
          "SUSE Manager Server 4.3:kernel-default-5.14.21-150400.24.170.2.ppc64le",
          "SUSE Manager Server 4.3:kernel-default-5.14.21-150400.24.170.2.s390x",
          "SUSE Manager Server 4.3:kernel-default-5.14.21-150400.24.170.2.x86_64",
          "SUSE Manager Server 4.3:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.ppc64le",
          "SUSE Manager Server 4.3:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
          "SUSE Manager Server 4.3:kernel-default-devel-5.14.21-150400.24.170.2.ppc64le",
          "SUSE Manager Server 4.3:kernel-default-devel-5.14.21-150400.24.170.2.s390x",
          "SUSE Manager Server 4.3:kernel-default-devel-5.14.21-150400.24.170.2.x86_64",
          "SUSE Manager Server 4.3:kernel-devel-5.14.21-150400.24.170.1.noarch",
          "SUSE Manager Server 4.3:kernel-macros-5.14.21-150400.24.170.1.noarch",
          "SUSE Manager Server 4.3:kernel-source-5.14.21-150400.24.170.1.noarch",
          "SUSE Manager Server 4.3:kernel-syms-5.14.21-150400.24.170.1.ppc64le",
          "SUSE Manager Server 4.3:kernel-syms-5.14.21-150400.24.170.1.s390x",
          "SUSE Manager Server 4.3:kernel-syms-5.14.21-150400.24.170.1.x86_64",
          "SUSE Manager Server 4.3:kernel-zfcpdump-5.14.21-150400.24.170.2.s390x"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2022-50157",
          "url": "https://www.suse.com/security/cve/CVE-2022-50157"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1244780 for CVE-2022-50157",
          "url": "https://bugzilla.suse.com/1244780"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-64kb-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-64kb-devel-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-devel-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-devel-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-devel-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-docs-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-macros-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-obs-build-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-obs-build-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-source-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-syms-5.14.21-150400.24.170.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-syms-5.14.21-150400.24.170.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:reiserfs-kmp-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:reiserfs-kmp-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-64kb-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-64kb-devel-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-devel-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-docs-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-macros-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-source-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.170.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.170.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_170-default-1-150400.9.3.2.ppc64le",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_170-default-1-150400.9.3.2.s390x",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_170-default-1-150400.9.3.2.x86_64",
            "SUSE Linux Enterprise Micro 5.3:kernel-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise Micro 5.3:kernel-default-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise Micro 5.3:kernel-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Micro 5.3:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.aarch64",
            "SUSE Linux Enterprise Micro 5.3:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
            "SUSE Linux Enterprise Micro 5.4:kernel-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise Micro 5.4:kernel-default-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise Micro 5.4:kernel-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Micro 5.4:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.aarch64",
            "SUSE Linux Enterprise Micro 5.4:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-64kb-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-64kb-devel-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.aarch64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.ppc64le",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-devel-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-docs-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-macros-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-source-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.170.1.aarch64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.170.1.ppc64le",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.170.1.s390x",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.170.1.x86_64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-zfcpdump-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-devel-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-devel-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-devel-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-docs-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-macros-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-obs-build-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-obs-build-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-source-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-syms-5.14.21-150400.24.170.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-syms-5.14.21-150400.24.170.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Manager Proxy 4.3:kernel-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Manager Proxy 4.3:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
            "SUSE Manager Proxy 4.3:kernel-default-devel-5.14.21-150400.24.170.2.x86_64",
            "SUSE Manager Proxy 4.3:kernel-devel-5.14.21-150400.24.170.1.noarch",
            "SUSE Manager Proxy 4.3:kernel-macros-5.14.21-150400.24.170.1.noarch",
            "SUSE Manager Proxy 4.3:kernel-source-5.14.21-150400.24.170.1.noarch",
            "SUSE Manager Proxy 4.3:kernel-syms-5.14.21-150400.24.170.1.x86_64",
            "SUSE Manager Server 4.3:kernel-default-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Manager Server 4.3:kernel-default-5.14.21-150400.24.170.2.s390x",
            "SUSE Manager Server 4.3:kernel-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Manager Server 4.3:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.ppc64le",
            "SUSE Manager Server 4.3:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
            "SUSE Manager Server 4.3:kernel-default-devel-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Manager Server 4.3:kernel-default-devel-5.14.21-150400.24.170.2.s390x",
            "SUSE Manager Server 4.3:kernel-default-devel-5.14.21-150400.24.170.2.x86_64",
            "SUSE Manager Server 4.3:kernel-devel-5.14.21-150400.24.170.1.noarch",
            "SUSE Manager Server 4.3:kernel-macros-5.14.21-150400.24.170.1.noarch",
            "SUSE Manager Server 4.3:kernel-source-5.14.21-150400.24.170.1.noarch",
            "SUSE Manager Server 4.3:kernel-syms-5.14.21-150400.24.170.1.ppc64le",
            "SUSE Manager Server 4.3:kernel-syms-5.14.21-150400.24.170.1.s390x",
            "SUSE Manager Server 4.3:kernel-syms-5.14.21-150400.24.170.1.x86_64",
            "SUSE Manager Server 4.3:kernel-zfcpdump-5.14.21-150400.24.170.2.s390x"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 5.5,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
            "version": "3.1"
          },
          "products": [
            "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-64kb-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-64kb-devel-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-devel-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-devel-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-devel-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-docs-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-macros-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-obs-build-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-obs-build-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-source-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-syms-5.14.21-150400.24.170.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-syms-5.14.21-150400.24.170.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:reiserfs-kmp-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:reiserfs-kmp-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-64kb-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-64kb-devel-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-devel-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-docs-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-macros-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-source-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.170.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.170.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_170-default-1-150400.9.3.2.ppc64le",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_170-default-1-150400.9.3.2.s390x",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_170-default-1-150400.9.3.2.x86_64",
            "SUSE Linux Enterprise Micro 5.3:kernel-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise Micro 5.3:kernel-default-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise Micro 5.3:kernel-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Micro 5.3:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.aarch64",
            "SUSE Linux Enterprise Micro 5.3:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
            "SUSE Linux Enterprise Micro 5.4:kernel-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise Micro 5.4:kernel-default-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise Micro 5.4:kernel-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Micro 5.4:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.aarch64",
            "SUSE Linux Enterprise Micro 5.4:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-64kb-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-64kb-devel-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.aarch64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.ppc64le",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-devel-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-docs-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-macros-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-source-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.170.1.aarch64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.170.1.ppc64le",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.170.1.s390x",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.170.1.x86_64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-zfcpdump-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-devel-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-devel-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-devel-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-docs-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-macros-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-obs-build-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-obs-build-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-source-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-syms-5.14.21-150400.24.170.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-syms-5.14.21-150400.24.170.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Manager Proxy 4.3:kernel-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Manager Proxy 4.3:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
            "SUSE Manager Proxy 4.3:kernel-default-devel-5.14.21-150400.24.170.2.x86_64",
            "SUSE Manager Proxy 4.3:kernel-devel-5.14.21-150400.24.170.1.noarch",
            "SUSE Manager Proxy 4.3:kernel-macros-5.14.21-150400.24.170.1.noarch",
            "SUSE Manager Proxy 4.3:kernel-source-5.14.21-150400.24.170.1.noarch",
            "SUSE Manager Proxy 4.3:kernel-syms-5.14.21-150400.24.170.1.x86_64",
            "SUSE Manager Server 4.3:kernel-default-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Manager Server 4.3:kernel-default-5.14.21-150400.24.170.2.s390x",
            "SUSE Manager Server 4.3:kernel-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Manager Server 4.3:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.ppc64le",
            "SUSE Manager Server 4.3:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
            "SUSE Manager Server 4.3:kernel-default-devel-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Manager Server 4.3:kernel-default-devel-5.14.21-150400.24.170.2.s390x",
            "SUSE Manager Server 4.3:kernel-default-devel-5.14.21-150400.24.170.2.x86_64",
            "SUSE Manager Server 4.3:kernel-devel-5.14.21-150400.24.170.1.noarch",
            "SUSE Manager Server 4.3:kernel-macros-5.14.21-150400.24.170.1.noarch",
            "SUSE Manager Server 4.3:kernel-source-5.14.21-150400.24.170.1.noarch",
            "SUSE Manager Server 4.3:kernel-syms-5.14.21-150400.24.170.1.ppc64le",
            "SUSE Manager Server 4.3:kernel-syms-5.14.21-150400.24.170.1.s390x",
            "SUSE Manager Server 4.3:kernel-syms-5.14.21-150400.24.170.1.x86_64",
            "SUSE Manager Server 4.3:kernel-zfcpdump-5.14.21-150400.24.170.2.s390x"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2025-07-28T15:09:33Z",
          "details": "moderate"
        }
      ],
      "title": "CVE-2022-50157"
    },
    {
      "cve": "CVE-2022-50158",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2022-50158"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "In the Linux kernel, the following vulnerability has been resolved:\n\nmtd: partitions: Fix refcount leak in parse_redboot_of\n\nof_get_child_by_name() returns a node pointer with refcount\nincremented, we should use of_node_put() on it when not need anymore.\nAdd missing of_node_put() to avoid refcount leak.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.170.2.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.170.2.s390x",
          "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.170.2.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.170.2.s390x",
          "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.170.2.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.170.2.s390x",
          "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.170.2.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.170.2.s390x",
          "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-64kb-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-64kb-devel-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-devel-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-devel-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-devel-5.14.21-150400.24.170.1.noarch",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-docs-5.14.21-150400.24.170.1.noarch",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-macros-5.14.21-150400.24.170.1.noarch",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-obs-build-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-obs-build-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-source-5.14.21-150400.24.170.1.noarch",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-syms-5.14.21-150400.24.170.1.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-syms-5.14.21-150400.24.170.1.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:reiserfs-kmp-default-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:reiserfs-kmp-default-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-64kb-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-64kb-devel-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-devel-5.14.21-150400.24.170.1.noarch",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-docs-5.14.21-150400.24.170.1.noarch",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-macros-5.14.21-150400.24.170.1.noarch",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-source-5.14.21-150400.24.170.1.noarch",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.170.1.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.170.1.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.170.2.ppc64le",
          "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.170.2.s390x",
          "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.170.2.ppc64le",
          "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.170.2.s390x",
          "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_170-default-1-150400.9.3.2.ppc64le",
          "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_170-default-1-150400.9.3.2.s390x",
          "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_170-default-1-150400.9.3.2.x86_64",
          "SUSE Linux Enterprise Micro 5.3:kernel-default-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise Micro 5.3:kernel-default-5.14.21-150400.24.170.2.s390x",
          "SUSE Linux Enterprise Micro 5.3:kernel-default-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise Micro 5.3:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.aarch64",
          "SUSE Linux Enterprise Micro 5.3:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
          "SUSE Linux Enterprise Micro 5.4:kernel-default-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise Micro 5.4:kernel-default-5.14.21-150400.24.170.2.s390x",
          "SUSE Linux Enterprise Micro 5.4:kernel-default-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise Micro 5.4:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.aarch64",
          "SUSE Linux Enterprise Micro 5.4:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-64kb-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-64kb-devel-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-5.14.21-150400.24.170.2.ppc64le",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-5.14.21-150400.24.170.2.s390x",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.aarch64",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.ppc64le",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.170.2.ppc64le",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.170.2.s390x",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-devel-5.14.21-150400.24.170.1.noarch",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-docs-5.14.21-150400.24.170.1.noarch",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-macros-5.14.21-150400.24.170.1.noarch",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.170.2.ppc64le",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.170.2.s390x",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-source-5.14.21-150400.24.170.1.noarch",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.170.1.aarch64",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.170.1.ppc64le",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.170.1.s390x",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.170.1.x86_64",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-zfcpdump-5.14.21-150400.24.170.2.s390x",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.170.2.ppc64le",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.170.2.s390x",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-5.14.21-150400.24.170.2.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-devel-5.14.21-150400.24.170.2.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-devel-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-devel-5.14.21-150400.24.170.1.noarch",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-docs-5.14.21-150400.24.170.1.noarch",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-macros-5.14.21-150400.24.170.1.noarch",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-obs-build-5.14.21-150400.24.170.2.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-obs-build-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-source-5.14.21-150400.24.170.1.noarch",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-syms-5.14.21-150400.24.170.1.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-syms-5.14.21-150400.24.170.1.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.170.2.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.170.2.x86_64",
          "SUSE Manager Proxy 4.3:kernel-default-5.14.21-150400.24.170.2.x86_64",
          "SUSE Manager Proxy 4.3:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
          "SUSE Manager Proxy 4.3:kernel-default-devel-5.14.21-150400.24.170.2.x86_64",
          "SUSE Manager Proxy 4.3:kernel-devel-5.14.21-150400.24.170.1.noarch",
          "SUSE Manager Proxy 4.3:kernel-macros-5.14.21-150400.24.170.1.noarch",
          "SUSE Manager Proxy 4.3:kernel-source-5.14.21-150400.24.170.1.noarch",
          "SUSE Manager Proxy 4.3:kernel-syms-5.14.21-150400.24.170.1.x86_64",
          "SUSE Manager Server 4.3:kernel-default-5.14.21-150400.24.170.2.ppc64le",
          "SUSE Manager Server 4.3:kernel-default-5.14.21-150400.24.170.2.s390x",
          "SUSE Manager Server 4.3:kernel-default-5.14.21-150400.24.170.2.x86_64",
          "SUSE Manager Server 4.3:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.ppc64le",
          "SUSE Manager Server 4.3:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
          "SUSE Manager Server 4.3:kernel-default-devel-5.14.21-150400.24.170.2.ppc64le",
          "SUSE Manager Server 4.3:kernel-default-devel-5.14.21-150400.24.170.2.s390x",
          "SUSE Manager Server 4.3:kernel-default-devel-5.14.21-150400.24.170.2.x86_64",
          "SUSE Manager Server 4.3:kernel-devel-5.14.21-150400.24.170.1.noarch",
          "SUSE Manager Server 4.3:kernel-macros-5.14.21-150400.24.170.1.noarch",
          "SUSE Manager Server 4.3:kernel-source-5.14.21-150400.24.170.1.noarch",
          "SUSE Manager Server 4.3:kernel-syms-5.14.21-150400.24.170.1.ppc64le",
          "SUSE Manager Server 4.3:kernel-syms-5.14.21-150400.24.170.1.s390x",
          "SUSE Manager Server 4.3:kernel-syms-5.14.21-150400.24.170.1.x86_64",
          "SUSE Manager Server 4.3:kernel-zfcpdump-5.14.21-150400.24.170.2.s390x"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2022-50158",
          "url": "https://www.suse.com/security/cve/CVE-2022-50158"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1244779 for CVE-2022-50158",
          "url": "https://bugzilla.suse.com/1244779"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-64kb-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-64kb-devel-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-devel-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-devel-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-devel-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-docs-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-macros-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-obs-build-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-obs-build-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-source-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-syms-5.14.21-150400.24.170.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-syms-5.14.21-150400.24.170.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:reiserfs-kmp-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:reiserfs-kmp-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-64kb-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-64kb-devel-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-devel-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-docs-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-macros-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-source-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.170.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.170.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_170-default-1-150400.9.3.2.ppc64le",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_170-default-1-150400.9.3.2.s390x",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_170-default-1-150400.9.3.2.x86_64",
            "SUSE Linux Enterprise Micro 5.3:kernel-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise Micro 5.3:kernel-default-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise Micro 5.3:kernel-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Micro 5.3:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.aarch64",
            "SUSE Linux Enterprise Micro 5.3:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
            "SUSE Linux Enterprise Micro 5.4:kernel-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise Micro 5.4:kernel-default-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise Micro 5.4:kernel-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Micro 5.4:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.aarch64",
            "SUSE Linux Enterprise Micro 5.4:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-64kb-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-64kb-devel-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.aarch64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.ppc64le",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-devel-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-docs-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-macros-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-source-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.170.1.aarch64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.170.1.ppc64le",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.170.1.s390x",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.170.1.x86_64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-zfcpdump-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-devel-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-devel-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-devel-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-docs-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-macros-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-obs-build-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-obs-build-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-source-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-syms-5.14.21-150400.24.170.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-syms-5.14.21-150400.24.170.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Manager Proxy 4.3:kernel-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Manager Proxy 4.3:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
            "SUSE Manager Proxy 4.3:kernel-default-devel-5.14.21-150400.24.170.2.x86_64",
            "SUSE Manager Proxy 4.3:kernel-devel-5.14.21-150400.24.170.1.noarch",
            "SUSE Manager Proxy 4.3:kernel-macros-5.14.21-150400.24.170.1.noarch",
            "SUSE Manager Proxy 4.3:kernel-source-5.14.21-150400.24.170.1.noarch",
            "SUSE Manager Proxy 4.3:kernel-syms-5.14.21-150400.24.170.1.x86_64",
            "SUSE Manager Server 4.3:kernel-default-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Manager Server 4.3:kernel-default-5.14.21-150400.24.170.2.s390x",
            "SUSE Manager Server 4.3:kernel-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Manager Server 4.3:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.ppc64le",
            "SUSE Manager Server 4.3:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
            "SUSE Manager Server 4.3:kernel-default-devel-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Manager Server 4.3:kernel-default-devel-5.14.21-150400.24.170.2.s390x",
            "SUSE Manager Server 4.3:kernel-default-devel-5.14.21-150400.24.170.2.x86_64",
            "SUSE Manager Server 4.3:kernel-devel-5.14.21-150400.24.170.1.noarch",
            "SUSE Manager Server 4.3:kernel-macros-5.14.21-150400.24.170.1.noarch",
            "SUSE Manager Server 4.3:kernel-source-5.14.21-150400.24.170.1.noarch",
            "SUSE Manager Server 4.3:kernel-syms-5.14.21-150400.24.170.1.ppc64le",
            "SUSE Manager Server 4.3:kernel-syms-5.14.21-150400.24.170.1.s390x",
            "SUSE Manager Server 4.3:kernel-syms-5.14.21-150400.24.170.1.x86_64",
            "SUSE Manager Server 4.3:kernel-zfcpdump-5.14.21-150400.24.170.2.s390x"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 5.5,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
            "version": "3.1"
          },
          "products": [
            "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-64kb-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-64kb-devel-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-devel-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-devel-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-devel-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-docs-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-macros-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-obs-build-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-obs-build-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-source-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-syms-5.14.21-150400.24.170.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-syms-5.14.21-150400.24.170.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:reiserfs-kmp-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:reiserfs-kmp-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-64kb-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-64kb-devel-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-devel-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-docs-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-macros-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-source-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.170.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.170.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_170-default-1-150400.9.3.2.ppc64le",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_170-default-1-150400.9.3.2.s390x",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_170-default-1-150400.9.3.2.x86_64",
            "SUSE Linux Enterprise Micro 5.3:kernel-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise Micro 5.3:kernel-default-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise Micro 5.3:kernel-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Micro 5.3:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.aarch64",
            "SUSE Linux Enterprise Micro 5.3:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
            "SUSE Linux Enterprise Micro 5.4:kernel-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise Micro 5.4:kernel-default-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise Micro 5.4:kernel-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Micro 5.4:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.aarch64",
            "SUSE Linux Enterprise Micro 5.4:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-64kb-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-64kb-devel-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.aarch64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.ppc64le",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-devel-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-docs-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-macros-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-source-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.170.1.aarch64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.170.1.ppc64le",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.170.1.s390x",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.170.1.x86_64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-zfcpdump-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-devel-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-devel-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-devel-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-docs-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-macros-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-obs-build-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-obs-build-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-source-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-syms-5.14.21-150400.24.170.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-syms-5.14.21-150400.24.170.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Manager Proxy 4.3:kernel-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Manager Proxy 4.3:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
            "SUSE Manager Proxy 4.3:kernel-default-devel-5.14.21-150400.24.170.2.x86_64",
            "SUSE Manager Proxy 4.3:kernel-devel-5.14.21-150400.24.170.1.noarch",
            "SUSE Manager Proxy 4.3:kernel-macros-5.14.21-150400.24.170.1.noarch",
            "SUSE Manager Proxy 4.3:kernel-source-5.14.21-150400.24.170.1.noarch",
            "SUSE Manager Proxy 4.3:kernel-syms-5.14.21-150400.24.170.1.x86_64",
            "SUSE Manager Server 4.3:kernel-default-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Manager Server 4.3:kernel-default-5.14.21-150400.24.170.2.s390x",
            "SUSE Manager Server 4.3:kernel-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Manager Server 4.3:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.ppc64le",
            "SUSE Manager Server 4.3:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
            "SUSE Manager Server 4.3:kernel-default-devel-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Manager Server 4.3:kernel-default-devel-5.14.21-150400.24.170.2.s390x",
            "SUSE Manager Server 4.3:kernel-default-devel-5.14.21-150400.24.170.2.x86_64",
            "SUSE Manager Server 4.3:kernel-devel-5.14.21-150400.24.170.1.noarch",
            "SUSE Manager Server 4.3:kernel-macros-5.14.21-150400.24.170.1.noarch",
            "SUSE Manager Server 4.3:kernel-source-5.14.21-150400.24.170.1.noarch",
            "SUSE Manager Server 4.3:kernel-syms-5.14.21-150400.24.170.1.ppc64le",
            "SUSE Manager Server 4.3:kernel-syms-5.14.21-150400.24.170.1.s390x",
            "SUSE Manager Server 4.3:kernel-syms-5.14.21-150400.24.170.1.x86_64",
            "SUSE Manager Server 4.3:kernel-zfcpdump-5.14.21-150400.24.170.2.s390x"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2025-07-28T15:09:33Z",
          "details": "moderate"
        }
      ],
      "title": "CVE-2022-50158"
    },
    {
      "cve": "CVE-2022-50160",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2022-50160"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "In the Linux kernel, the following vulnerability has been resolved:\n\nmtd: maps: Fix refcount leak in ap_flash_init\n\nof_find_matching_node() returns a node pointer with refcount\nincremented, we should use of_node_put() on it when not need anymore.\nAdd missing of_node_put() to avoid refcount leak.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.170.2.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.170.2.s390x",
          "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.170.2.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.170.2.s390x",
          "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.170.2.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.170.2.s390x",
          "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.170.2.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.170.2.s390x",
          "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-64kb-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-64kb-devel-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-devel-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-devel-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-devel-5.14.21-150400.24.170.1.noarch",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-docs-5.14.21-150400.24.170.1.noarch",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-macros-5.14.21-150400.24.170.1.noarch",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-obs-build-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-obs-build-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-source-5.14.21-150400.24.170.1.noarch",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-syms-5.14.21-150400.24.170.1.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-syms-5.14.21-150400.24.170.1.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:reiserfs-kmp-default-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:reiserfs-kmp-default-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-64kb-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-64kb-devel-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-devel-5.14.21-150400.24.170.1.noarch",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-docs-5.14.21-150400.24.170.1.noarch",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-macros-5.14.21-150400.24.170.1.noarch",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-source-5.14.21-150400.24.170.1.noarch",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.170.1.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.170.1.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.170.2.ppc64le",
          "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.170.2.s390x",
          "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.170.2.ppc64le",
          "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.170.2.s390x",
          "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_170-default-1-150400.9.3.2.ppc64le",
          "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_170-default-1-150400.9.3.2.s390x",
          "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_170-default-1-150400.9.3.2.x86_64",
          "SUSE Linux Enterprise Micro 5.3:kernel-default-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise Micro 5.3:kernel-default-5.14.21-150400.24.170.2.s390x",
          "SUSE Linux Enterprise Micro 5.3:kernel-default-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise Micro 5.3:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.aarch64",
          "SUSE Linux Enterprise Micro 5.3:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
          "SUSE Linux Enterprise Micro 5.4:kernel-default-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise Micro 5.4:kernel-default-5.14.21-150400.24.170.2.s390x",
          "SUSE Linux Enterprise Micro 5.4:kernel-default-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise Micro 5.4:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.aarch64",
          "SUSE Linux Enterprise Micro 5.4:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-64kb-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-64kb-devel-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-5.14.21-150400.24.170.2.ppc64le",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-5.14.21-150400.24.170.2.s390x",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.aarch64",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.ppc64le",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.170.2.ppc64le",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.170.2.s390x",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-devel-5.14.21-150400.24.170.1.noarch",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-docs-5.14.21-150400.24.170.1.noarch",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-macros-5.14.21-150400.24.170.1.noarch",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.170.2.ppc64le",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.170.2.s390x",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-source-5.14.21-150400.24.170.1.noarch",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.170.1.aarch64",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.170.1.ppc64le",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.170.1.s390x",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.170.1.x86_64",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-zfcpdump-5.14.21-150400.24.170.2.s390x",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.170.2.ppc64le",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.170.2.s390x",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-5.14.21-150400.24.170.2.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-devel-5.14.21-150400.24.170.2.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-devel-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-devel-5.14.21-150400.24.170.1.noarch",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-docs-5.14.21-150400.24.170.1.noarch",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-macros-5.14.21-150400.24.170.1.noarch",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-obs-build-5.14.21-150400.24.170.2.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-obs-build-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-source-5.14.21-150400.24.170.1.noarch",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-syms-5.14.21-150400.24.170.1.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-syms-5.14.21-150400.24.170.1.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.170.2.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.170.2.x86_64",
          "SUSE Manager Proxy 4.3:kernel-default-5.14.21-150400.24.170.2.x86_64",
          "SUSE Manager Proxy 4.3:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
          "SUSE Manager Proxy 4.3:kernel-default-devel-5.14.21-150400.24.170.2.x86_64",
          "SUSE Manager Proxy 4.3:kernel-devel-5.14.21-150400.24.170.1.noarch",
          "SUSE Manager Proxy 4.3:kernel-macros-5.14.21-150400.24.170.1.noarch",
          "SUSE Manager Proxy 4.3:kernel-source-5.14.21-150400.24.170.1.noarch",
          "SUSE Manager Proxy 4.3:kernel-syms-5.14.21-150400.24.170.1.x86_64",
          "SUSE Manager Server 4.3:kernel-default-5.14.21-150400.24.170.2.ppc64le",
          "SUSE Manager Server 4.3:kernel-default-5.14.21-150400.24.170.2.s390x",
          "SUSE Manager Server 4.3:kernel-default-5.14.21-150400.24.170.2.x86_64",
          "SUSE Manager Server 4.3:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.ppc64le",
          "SUSE Manager Server 4.3:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
          "SUSE Manager Server 4.3:kernel-default-devel-5.14.21-150400.24.170.2.ppc64le",
          "SUSE Manager Server 4.3:kernel-default-devel-5.14.21-150400.24.170.2.s390x",
          "SUSE Manager Server 4.3:kernel-default-devel-5.14.21-150400.24.170.2.x86_64",
          "SUSE Manager Server 4.3:kernel-devel-5.14.21-150400.24.170.1.noarch",
          "SUSE Manager Server 4.3:kernel-macros-5.14.21-150400.24.170.1.noarch",
          "SUSE Manager Server 4.3:kernel-source-5.14.21-150400.24.170.1.noarch",
          "SUSE Manager Server 4.3:kernel-syms-5.14.21-150400.24.170.1.ppc64le",
          "SUSE Manager Server 4.3:kernel-syms-5.14.21-150400.24.170.1.s390x",
          "SUSE Manager Server 4.3:kernel-syms-5.14.21-150400.24.170.1.x86_64",
          "SUSE Manager Server 4.3:kernel-zfcpdump-5.14.21-150400.24.170.2.s390x"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2022-50160",
          "url": "https://www.suse.com/security/cve/CVE-2022-50160"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1244776 for CVE-2022-50160",
          "url": "https://bugzilla.suse.com/1244776"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-64kb-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-64kb-devel-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-devel-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-devel-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-devel-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-docs-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-macros-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-obs-build-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-obs-build-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-source-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-syms-5.14.21-150400.24.170.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-syms-5.14.21-150400.24.170.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:reiserfs-kmp-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:reiserfs-kmp-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-64kb-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-64kb-devel-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-devel-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-docs-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-macros-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-source-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.170.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.170.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_170-default-1-150400.9.3.2.ppc64le",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_170-default-1-150400.9.3.2.s390x",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_170-default-1-150400.9.3.2.x86_64",
            "SUSE Linux Enterprise Micro 5.3:kernel-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise Micro 5.3:kernel-default-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise Micro 5.3:kernel-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Micro 5.3:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.aarch64",
            "SUSE Linux Enterprise Micro 5.3:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
            "SUSE Linux Enterprise Micro 5.4:kernel-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise Micro 5.4:kernel-default-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise Micro 5.4:kernel-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Micro 5.4:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.aarch64",
            "SUSE Linux Enterprise Micro 5.4:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-64kb-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-64kb-devel-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.aarch64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.ppc64le",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-devel-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-docs-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-macros-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-source-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.170.1.aarch64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.170.1.ppc64le",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.170.1.s390x",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.170.1.x86_64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-zfcpdump-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-devel-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-devel-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-devel-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-docs-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-macros-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-obs-build-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-obs-build-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-source-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-syms-5.14.21-150400.24.170.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-syms-5.14.21-150400.24.170.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Manager Proxy 4.3:kernel-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Manager Proxy 4.3:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
            "SUSE Manager Proxy 4.3:kernel-default-devel-5.14.21-150400.24.170.2.x86_64",
            "SUSE Manager Proxy 4.3:kernel-devel-5.14.21-150400.24.170.1.noarch",
            "SUSE Manager Proxy 4.3:kernel-macros-5.14.21-150400.24.170.1.noarch",
            "SUSE Manager Proxy 4.3:kernel-source-5.14.21-150400.24.170.1.noarch",
            "SUSE Manager Proxy 4.3:kernel-syms-5.14.21-150400.24.170.1.x86_64",
            "SUSE Manager Server 4.3:kernel-default-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Manager Server 4.3:kernel-default-5.14.21-150400.24.170.2.s390x",
            "SUSE Manager Server 4.3:kernel-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Manager Server 4.3:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.ppc64le",
            "SUSE Manager Server 4.3:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
            "SUSE Manager Server 4.3:kernel-default-devel-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Manager Server 4.3:kernel-default-devel-5.14.21-150400.24.170.2.s390x",
            "SUSE Manager Server 4.3:kernel-default-devel-5.14.21-150400.24.170.2.x86_64",
            "SUSE Manager Server 4.3:kernel-devel-5.14.21-150400.24.170.1.noarch",
            "SUSE Manager Server 4.3:kernel-macros-5.14.21-150400.24.170.1.noarch",
            "SUSE Manager Server 4.3:kernel-source-5.14.21-150400.24.170.1.noarch",
            "SUSE Manager Server 4.3:kernel-syms-5.14.21-150400.24.170.1.ppc64le",
            "SUSE Manager Server 4.3:kernel-syms-5.14.21-150400.24.170.1.s390x",
            "SUSE Manager Server 4.3:kernel-syms-5.14.21-150400.24.170.1.x86_64",
            "SUSE Manager Server 4.3:kernel-zfcpdump-5.14.21-150400.24.170.2.s390x"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 5.5,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
            "version": "3.1"
          },
          "products": [
            "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-64kb-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-64kb-devel-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-devel-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-devel-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-devel-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-docs-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-macros-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-obs-build-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-obs-build-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-source-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-syms-5.14.21-150400.24.170.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-syms-5.14.21-150400.24.170.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:reiserfs-kmp-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:reiserfs-kmp-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-64kb-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-64kb-devel-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-devel-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-docs-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-macros-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-source-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.170.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.170.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_170-default-1-150400.9.3.2.ppc64le",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_170-default-1-150400.9.3.2.s390x",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_170-default-1-150400.9.3.2.x86_64",
            "SUSE Linux Enterprise Micro 5.3:kernel-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise Micro 5.3:kernel-default-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise Micro 5.3:kernel-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Micro 5.3:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.aarch64",
            "SUSE Linux Enterprise Micro 5.3:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
            "SUSE Linux Enterprise Micro 5.4:kernel-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise Micro 5.4:kernel-default-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise Micro 5.4:kernel-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Micro 5.4:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.aarch64",
            "SUSE Linux Enterprise Micro 5.4:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-64kb-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-64kb-devel-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.aarch64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.ppc64le",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-devel-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-docs-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-macros-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-source-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.170.1.aarch64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.170.1.ppc64le",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.170.1.s390x",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.170.1.x86_64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-zfcpdump-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-devel-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-devel-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-devel-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-docs-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-macros-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-obs-build-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-obs-build-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-source-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-syms-5.14.21-150400.24.170.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-syms-5.14.21-150400.24.170.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Manager Proxy 4.3:kernel-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Manager Proxy 4.3:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
            "SUSE Manager Proxy 4.3:kernel-default-devel-5.14.21-150400.24.170.2.x86_64",
            "SUSE Manager Proxy 4.3:kernel-devel-5.14.21-150400.24.170.1.noarch",
            "SUSE Manager Proxy 4.3:kernel-macros-5.14.21-150400.24.170.1.noarch",
            "SUSE Manager Proxy 4.3:kernel-source-5.14.21-150400.24.170.1.noarch",
            "SUSE Manager Proxy 4.3:kernel-syms-5.14.21-150400.24.170.1.x86_64",
            "SUSE Manager Server 4.3:kernel-default-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Manager Server 4.3:kernel-default-5.14.21-150400.24.170.2.s390x",
            "SUSE Manager Server 4.3:kernel-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Manager Server 4.3:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.ppc64le",
            "SUSE Manager Server 4.3:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
            "SUSE Manager Server 4.3:kernel-default-devel-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Manager Server 4.3:kernel-default-devel-5.14.21-150400.24.170.2.s390x",
            "SUSE Manager Server 4.3:kernel-default-devel-5.14.21-150400.24.170.2.x86_64",
            "SUSE Manager Server 4.3:kernel-devel-5.14.21-150400.24.170.1.noarch",
            "SUSE Manager Server 4.3:kernel-macros-5.14.21-150400.24.170.1.noarch",
            "SUSE Manager Server 4.3:kernel-source-5.14.21-150400.24.170.1.noarch",
            "SUSE Manager Server 4.3:kernel-syms-5.14.21-150400.24.170.1.ppc64le",
            "SUSE Manager Server 4.3:kernel-syms-5.14.21-150400.24.170.1.s390x",
            "SUSE Manager Server 4.3:kernel-syms-5.14.21-150400.24.170.1.x86_64",
            "SUSE Manager Server 4.3:kernel-zfcpdump-5.14.21-150400.24.170.2.s390x"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2025-07-28T15:09:33Z",
          "details": "moderate"
        }
      ],
      "title": "CVE-2022-50160"
    },
    {
      "cve": "CVE-2022-50161",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2022-50161"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "In the Linux kernel, the following vulnerability has been resolved:\n\nmtd: maps: Fix refcount leak in of_flash_probe_versatile\n\nof_find_matching_node_and_match() returns a node pointer with refcount\nincremented, we should use of_node_put() on it when not need anymore.\nAdd missing of_node_put() to avoid refcount leak.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.170.2.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.170.2.s390x",
          "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.170.2.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.170.2.s390x",
          "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.170.2.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.170.2.s390x",
          "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.170.2.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.170.2.s390x",
          "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-64kb-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-64kb-devel-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-devel-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-devel-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-devel-5.14.21-150400.24.170.1.noarch",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-docs-5.14.21-150400.24.170.1.noarch",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-macros-5.14.21-150400.24.170.1.noarch",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-obs-build-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-obs-build-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-source-5.14.21-150400.24.170.1.noarch",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-syms-5.14.21-150400.24.170.1.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-syms-5.14.21-150400.24.170.1.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:reiserfs-kmp-default-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:reiserfs-kmp-default-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-64kb-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-64kb-devel-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-devel-5.14.21-150400.24.170.1.noarch",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-docs-5.14.21-150400.24.170.1.noarch",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-macros-5.14.21-150400.24.170.1.noarch",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-source-5.14.21-150400.24.170.1.noarch",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.170.1.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.170.1.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.170.2.ppc64le",
          "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.170.2.s390x",
          "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.170.2.ppc64le",
          "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.170.2.s390x",
          "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_170-default-1-150400.9.3.2.ppc64le",
          "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_170-default-1-150400.9.3.2.s390x",
          "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_170-default-1-150400.9.3.2.x86_64",
          "SUSE Linux Enterprise Micro 5.3:kernel-default-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise Micro 5.3:kernel-default-5.14.21-150400.24.170.2.s390x",
          "SUSE Linux Enterprise Micro 5.3:kernel-default-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise Micro 5.3:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.aarch64",
          "SUSE Linux Enterprise Micro 5.3:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
          "SUSE Linux Enterprise Micro 5.4:kernel-default-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise Micro 5.4:kernel-default-5.14.21-150400.24.170.2.s390x",
          "SUSE Linux Enterprise Micro 5.4:kernel-default-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise Micro 5.4:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.aarch64",
          "SUSE Linux Enterprise Micro 5.4:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-64kb-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-64kb-devel-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-5.14.21-150400.24.170.2.ppc64le",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-5.14.21-150400.24.170.2.s390x",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.aarch64",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.ppc64le",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.170.2.ppc64le",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.170.2.s390x",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-devel-5.14.21-150400.24.170.1.noarch",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-docs-5.14.21-150400.24.170.1.noarch",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-macros-5.14.21-150400.24.170.1.noarch",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.170.2.ppc64le",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.170.2.s390x",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-source-5.14.21-150400.24.170.1.noarch",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.170.1.aarch64",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.170.1.ppc64le",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.170.1.s390x",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.170.1.x86_64",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-zfcpdump-5.14.21-150400.24.170.2.s390x",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.170.2.ppc64le",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.170.2.s390x",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-5.14.21-150400.24.170.2.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-devel-5.14.21-150400.24.170.2.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-devel-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-devel-5.14.21-150400.24.170.1.noarch",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-docs-5.14.21-150400.24.170.1.noarch",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-macros-5.14.21-150400.24.170.1.noarch",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-obs-build-5.14.21-150400.24.170.2.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-obs-build-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-source-5.14.21-150400.24.170.1.noarch",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-syms-5.14.21-150400.24.170.1.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-syms-5.14.21-150400.24.170.1.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.170.2.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.170.2.x86_64",
          "SUSE Manager Proxy 4.3:kernel-default-5.14.21-150400.24.170.2.x86_64",
          "SUSE Manager Proxy 4.3:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
          "SUSE Manager Proxy 4.3:kernel-default-devel-5.14.21-150400.24.170.2.x86_64",
          "SUSE Manager Proxy 4.3:kernel-devel-5.14.21-150400.24.170.1.noarch",
          "SUSE Manager Proxy 4.3:kernel-macros-5.14.21-150400.24.170.1.noarch",
          "SUSE Manager Proxy 4.3:kernel-source-5.14.21-150400.24.170.1.noarch",
          "SUSE Manager Proxy 4.3:kernel-syms-5.14.21-150400.24.170.1.x86_64",
          "SUSE Manager Server 4.3:kernel-default-5.14.21-150400.24.170.2.ppc64le",
          "SUSE Manager Server 4.3:kernel-default-5.14.21-150400.24.170.2.s390x",
          "SUSE Manager Server 4.3:kernel-default-5.14.21-150400.24.170.2.x86_64",
          "SUSE Manager Server 4.3:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.ppc64le",
          "SUSE Manager Server 4.3:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
          "SUSE Manager Server 4.3:kernel-default-devel-5.14.21-150400.24.170.2.ppc64le",
          "SUSE Manager Server 4.3:kernel-default-devel-5.14.21-150400.24.170.2.s390x",
          "SUSE Manager Server 4.3:kernel-default-devel-5.14.21-150400.24.170.2.x86_64",
          "SUSE Manager Server 4.3:kernel-devel-5.14.21-150400.24.170.1.noarch",
          "SUSE Manager Server 4.3:kernel-macros-5.14.21-150400.24.170.1.noarch",
          "SUSE Manager Server 4.3:kernel-source-5.14.21-150400.24.170.1.noarch",
          "SUSE Manager Server 4.3:kernel-syms-5.14.21-150400.24.170.1.ppc64le",
          "SUSE Manager Server 4.3:kernel-syms-5.14.21-150400.24.170.1.s390x",
          "SUSE Manager Server 4.3:kernel-syms-5.14.21-150400.24.170.1.x86_64",
          "SUSE Manager Server 4.3:kernel-zfcpdump-5.14.21-150400.24.170.2.s390x"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2022-50161",
          "url": "https://www.suse.com/security/cve/CVE-2022-50161"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1244774 for CVE-2022-50161",
          "url": "https://bugzilla.suse.com/1244774"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-64kb-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-64kb-devel-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-devel-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-devel-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-devel-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-docs-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-macros-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-obs-build-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-obs-build-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-source-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-syms-5.14.21-150400.24.170.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-syms-5.14.21-150400.24.170.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:reiserfs-kmp-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:reiserfs-kmp-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-64kb-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-64kb-devel-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-devel-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-docs-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-macros-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-source-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.170.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.170.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_170-default-1-150400.9.3.2.ppc64le",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_170-default-1-150400.9.3.2.s390x",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_170-default-1-150400.9.3.2.x86_64",
            "SUSE Linux Enterprise Micro 5.3:kernel-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise Micro 5.3:kernel-default-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise Micro 5.3:kernel-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Micro 5.3:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.aarch64",
            "SUSE Linux Enterprise Micro 5.3:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
            "SUSE Linux Enterprise Micro 5.4:kernel-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise Micro 5.4:kernel-default-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise Micro 5.4:kernel-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Micro 5.4:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.aarch64",
            "SUSE Linux Enterprise Micro 5.4:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-64kb-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-64kb-devel-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.aarch64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.ppc64le",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-devel-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-docs-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-macros-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-source-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.170.1.aarch64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.170.1.ppc64le",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.170.1.s390x",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.170.1.x86_64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-zfcpdump-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-devel-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-devel-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-devel-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-docs-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-macros-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-obs-build-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-obs-build-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-source-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-syms-5.14.21-150400.24.170.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-syms-5.14.21-150400.24.170.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Manager Proxy 4.3:kernel-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Manager Proxy 4.3:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
            "SUSE Manager Proxy 4.3:kernel-default-devel-5.14.21-150400.24.170.2.x86_64",
            "SUSE Manager Proxy 4.3:kernel-devel-5.14.21-150400.24.170.1.noarch",
            "SUSE Manager Proxy 4.3:kernel-macros-5.14.21-150400.24.170.1.noarch",
            "SUSE Manager Proxy 4.3:kernel-source-5.14.21-150400.24.170.1.noarch",
            "SUSE Manager Proxy 4.3:kernel-syms-5.14.21-150400.24.170.1.x86_64",
            "SUSE Manager Server 4.3:kernel-default-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Manager Server 4.3:kernel-default-5.14.21-150400.24.170.2.s390x",
            "SUSE Manager Server 4.3:kernel-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Manager Server 4.3:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.ppc64le",
            "SUSE Manager Server 4.3:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
            "SUSE Manager Server 4.3:kernel-default-devel-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Manager Server 4.3:kernel-default-devel-5.14.21-150400.24.170.2.s390x",
            "SUSE Manager Server 4.3:kernel-default-devel-5.14.21-150400.24.170.2.x86_64",
            "SUSE Manager Server 4.3:kernel-devel-5.14.21-150400.24.170.1.noarch",
            "SUSE Manager Server 4.3:kernel-macros-5.14.21-150400.24.170.1.noarch",
            "SUSE Manager Server 4.3:kernel-source-5.14.21-150400.24.170.1.noarch",
            "SUSE Manager Server 4.3:kernel-syms-5.14.21-150400.24.170.1.ppc64le",
            "SUSE Manager Server 4.3:kernel-syms-5.14.21-150400.24.170.1.s390x",
            "SUSE Manager Server 4.3:kernel-syms-5.14.21-150400.24.170.1.x86_64",
            "SUSE Manager Server 4.3:kernel-zfcpdump-5.14.21-150400.24.170.2.s390x"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 5.5,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
            "version": "3.1"
          },
          "products": [
            "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-64kb-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-64kb-devel-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-devel-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-devel-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-devel-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-docs-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-macros-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-obs-build-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-obs-build-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-source-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-syms-5.14.21-150400.24.170.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-syms-5.14.21-150400.24.170.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:reiserfs-kmp-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:reiserfs-kmp-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-64kb-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-64kb-devel-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-devel-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-docs-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-macros-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-source-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.170.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.170.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_170-default-1-150400.9.3.2.ppc64le",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_170-default-1-150400.9.3.2.s390x",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_170-default-1-150400.9.3.2.x86_64",
            "SUSE Linux Enterprise Micro 5.3:kernel-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise Micro 5.3:kernel-default-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise Micro 5.3:kernel-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Micro 5.3:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.aarch64",
            "SUSE Linux Enterprise Micro 5.3:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
            "SUSE Linux Enterprise Micro 5.4:kernel-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise Micro 5.4:kernel-default-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise Micro 5.4:kernel-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Micro 5.4:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.aarch64",
            "SUSE Linux Enterprise Micro 5.4:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-64kb-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-64kb-devel-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.aarch64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.ppc64le",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-devel-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-docs-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-macros-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-source-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.170.1.aarch64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.170.1.ppc64le",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.170.1.s390x",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.170.1.x86_64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-zfcpdump-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-devel-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-devel-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-devel-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-docs-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-macros-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-obs-build-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-obs-build-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-source-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-syms-5.14.21-150400.24.170.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-syms-5.14.21-150400.24.170.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Manager Proxy 4.3:kernel-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Manager Proxy 4.3:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
            "SUSE Manager Proxy 4.3:kernel-default-devel-5.14.21-150400.24.170.2.x86_64",
            "SUSE Manager Proxy 4.3:kernel-devel-5.14.21-150400.24.170.1.noarch",
            "SUSE Manager Proxy 4.3:kernel-macros-5.14.21-150400.24.170.1.noarch",
            "SUSE Manager Proxy 4.3:kernel-source-5.14.21-150400.24.170.1.noarch",
            "SUSE Manager Proxy 4.3:kernel-syms-5.14.21-150400.24.170.1.x86_64",
            "SUSE Manager Server 4.3:kernel-default-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Manager Server 4.3:kernel-default-5.14.21-150400.24.170.2.s390x",
            "SUSE Manager Server 4.3:kernel-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Manager Server 4.3:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.ppc64le",
            "SUSE Manager Server 4.3:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
            "SUSE Manager Server 4.3:kernel-default-devel-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Manager Server 4.3:kernel-default-devel-5.14.21-150400.24.170.2.s390x",
            "SUSE Manager Server 4.3:kernel-default-devel-5.14.21-150400.24.170.2.x86_64",
            "SUSE Manager Server 4.3:kernel-devel-5.14.21-150400.24.170.1.noarch",
            "SUSE Manager Server 4.3:kernel-macros-5.14.21-150400.24.170.1.noarch",
            "SUSE Manager Server 4.3:kernel-source-5.14.21-150400.24.170.1.noarch",
            "SUSE Manager Server 4.3:kernel-syms-5.14.21-150400.24.170.1.ppc64le",
            "SUSE Manager Server 4.3:kernel-syms-5.14.21-150400.24.170.1.s390x",
            "SUSE Manager Server 4.3:kernel-syms-5.14.21-150400.24.170.1.x86_64",
            "SUSE Manager Server 4.3:kernel-zfcpdump-5.14.21-150400.24.170.2.s390x"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2025-07-28T15:09:33Z",
          "details": "moderate"
        }
      ],
      "title": "CVE-2022-50161"
    },
    {
      "cve": "CVE-2022-50162",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2022-50162"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "In the Linux kernel, the following vulnerability has been resolved:\n\nwifi: libertas: Fix possible refcount leak in if_usb_probe()\n\nusb_get_dev will be called before lbs_get_firmware_async which means that\nusb_put_dev need to be called when lbs_get_firmware_async fails.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.170.2.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.170.2.s390x",
          "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.170.2.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.170.2.s390x",
          "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.170.2.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.170.2.s390x",
          "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.170.2.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.170.2.s390x",
          "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-64kb-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-64kb-devel-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-devel-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-devel-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-devel-5.14.21-150400.24.170.1.noarch",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-docs-5.14.21-150400.24.170.1.noarch",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-macros-5.14.21-150400.24.170.1.noarch",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-obs-build-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-obs-build-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-source-5.14.21-150400.24.170.1.noarch",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-syms-5.14.21-150400.24.170.1.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-syms-5.14.21-150400.24.170.1.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:reiserfs-kmp-default-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:reiserfs-kmp-default-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-64kb-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-64kb-devel-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-devel-5.14.21-150400.24.170.1.noarch",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-docs-5.14.21-150400.24.170.1.noarch",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-macros-5.14.21-150400.24.170.1.noarch",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-source-5.14.21-150400.24.170.1.noarch",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.170.1.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.170.1.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.170.2.ppc64le",
          "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.170.2.s390x",
          "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.170.2.ppc64le",
          "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.170.2.s390x",
          "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_170-default-1-150400.9.3.2.ppc64le",
          "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_170-default-1-150400.9.3.2.s390x",
          "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_170-default-1-150400.9.3.2.x86_64",
          "SUSE Linux Enterprise Micro 5.3:kernel-default-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise Micro 5.3:kernel-default-5.14.21-150400.24.170.2.s390x",
          "SUSE Linux Enterprise Micro 5.3:kernel-default-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise Micro 5.3:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.aarch64",
          "SUSE Linux Enterprise Micro 5.3:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
          "SUSE Linux Enterprise Micro 5.4:kernel-default-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise Micro 5.4:kernel-default-5.14.21-150400.24.170.2.s390x",
          "SUSE Linux Enterprise Micro 5.4:kernel-default-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise Micro 5.4:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.aarch64",
          "SUSE Linux Enterprise Micro 5.4:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-64kb-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-64kb-devel-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-5.14.21-150400.24.170.2.ppc64le",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-5.14.21-150400.24.170.2.s390x",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.aarch64",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.ppc64le",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.170.2.ppc64le",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.170.2.s390x",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-devel-5.14.21-150400.24.170.1.noarch",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-docs-5.14.21-150400.24.170.1.noarch",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-macros-5.14.21-150400.24.170.1.noarch",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.170.2.ppc64le",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.170.2.s390x",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-source-5.14.21-150400.24.170.1.noarch",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.170.1.aarch64",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.170.1.ppc64le",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.170.1.s390x",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.170.1.x86_64",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-zfcpdump-5.14.21-150400.24.170.2.s390x",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.170.2.ppc64le",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.170.2.s390x",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-5.14.21-150400.24.170.2.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-devel-5.14.21-150400.24.170.2.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-devel-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-devel-5.14.21-150400.24.170.1.noarch",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-docs-5.14.21-150400.24.170.1.noarch",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-macros-5.14.21-150400.24.170.1.noarch",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-obs-build-5.14.21-150400.24.170.2.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-obs-build-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-source-5.14.21-150400.24.170.1.noarch",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-syms-5.14.21-150400.24.170.1.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-syms-5.14.21-150400.24.170.1.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.170.2.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.170.2.x86_64",
          "SUSE Manager Proxy 4.3:kernel-default-5.14.21-150400.24.170.2.x86_64",
          "SUSE Manager Proxy 4.3:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
          "SUSE Manager Proxy 4.3:kernel-default-devel-5.14.21-150400.24.170.2.x86_64",
          "SUSE Manager Proxy 4.3:kernel-devel-5.14.21-150400.24.170.1.noarch",
          "SUSE Manager Proxy 4.3:kernel-macros-5.14.21-150400.24.170.1.noarch",
          "SUSE Manager Proxy 4.3:kernel-source-5.14.21-150400.24.170.1.noarch",
          "SUSE Manager Proxy 4.3:kernel-syms-5.14.21-150400.24.170.1.x86_64",
          "SUSE Manager Server 4.3:kernel-default-5.14.21-150400.24.170.2.ppc64le",
          "SUSE Manager Server 4.3:kernel-default-5.14.21-150400.24.170.2.s390x",
          "SUSE Manager Server 4.3:kernel-default-5.14.21-150400.24.170.2.x86_64",
          "SUSE Manager Server 4.3:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.ppc64le",
          "SUSE Manager Server 4.3:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
          "SUSE Manager Server 4.3:kernel-default-devel-5.14.21-150400.24.170.2.ppc64le",
          "SUSE Manager Server 4.3:kernel-default-devel-5.14.21-150400.24.170.2.s390x",
          "SUSE Manager Server 4.3:kernel-default-devel-5.14.21-150400.24.170.2.x86_64",
          "SUSE Manager Server 4.3:kernel-devel-5.14.21-150400.24.170.1.noarch",
          "SUSE Manager Server 4.3:kernel-macros-5.14.21-150400.24.170.1.noarch",
          "SUSE Manager Server 4.3:kernel-source-5.14.21-150400.24.170.1.noarch",
          "SUSE Manager Server 4.3:kernel-syms-5.14.21-150400.24.170.1.ppc64le",
          "SUSE Manager Server 4.3:kernel-syms-5.14.21-150400.24.170.1.s390x",
          "SUSE Manager Server 4.3:kernel-syms-5.14.21-150400.24.170.1.x86_64",
          "SUSE Manager Server 4.3:kernel-zfcpdump-5.14.21-150400.24.170.2.s390x"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2022-50162",
          "url": "https://www.suse.com/security/cve/CVE-2022-50162"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1244773 for CVE-2022-50162",
          "url": "https://bugzilla.suse.com/1244773"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-64kb-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-64kb-devel-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-devel-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-devel-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-devel-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-docs-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-macros-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-obs-build-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-obs-build-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-source-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-syms-5.14.21-150400.24.170.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-syms-5.14.21-150400.24.170.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:reiserfs-kmp-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:reiserfs-kmp-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-64kb-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-64kb-devel-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-devel-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-docs-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-macros-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-source-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.170.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.170.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_170-default-1-150400.9.3.2.ppc64le",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_170-default-1-150400.9.3.2.s390x",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_170-default-1-150400.9.3.2.x86_64",
            "SUSE Linux Enterprise Micro 5.3:kernel-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise Micro 5.3:kernel-default-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise Micro 5.3:kernel-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Micro 5.3:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.aarch64",
            "SUSE Linux Enterprise Micro 5.3:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
            "SUSE Linux Enterprise Micro 5.4:kernel-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise Micro 5.4:kernel-default-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise Micro 5.4:kernel-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Micro 5.4:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.aarch64",
            "SUSE Linux Enterprise Micro 5.4:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-64kb-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-64kb-devel-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.aarch64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.ppc64le",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-devel-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-docs-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-macros-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-source-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.170.1.aarch64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.170.1.ppc64le",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.170.1.s390x",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.170.1.x86_64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-zfcpdump-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-devel-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-devel-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-devel-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-docs-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-macros-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-obs-build-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-obs-build-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-source-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-syms-5.14.21-150400.24.170.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-syms-5.14.21-150400.24.170.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Manager Proxy 4.3:kernel-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Manager Proxy 4.3:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
            "SUSE Manager Proxy 4.3:kernel-default-devel-5.14.21-150400.24.170.2.x86_64",
            "SUSE Manager Proxy 4.3:kernel-devel-5.14.21-150400.24.170.1.noarch",
            "SUSE Manager Proxy 4.3:kernel-macros-5.14.21-150400.24.170.1.noarch",
            "SUSE Manager Proxy 4.3:kernel-source-5.14.21-150400.24.170.1.noarch",
            "SUSE Manager Proxy 4.3:kernel-syms-5.14.21-150400.24.170.1.x86_64",
            "SUSE Manager Server 4.3:kernel-default-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Manager Server 4.3:kernel-default-5.14.21-150400.24.170.2.s390x",
            "SUSE Manager Server 4.3:kernel-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Manager Server 4.3:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.ppc64le",
            "SUSE Manager Server 4.3:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
            "SUSE Manager Server 4.3:kernel-default-devel-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Manager Server 4.3:kernel-default-devel-5.14.21-150400.24.170.2.s390x",
            "SUSE Manager Server 4.3:kernel-default-devel-5.14.21-150400.24.170.2.x86_64",
            "SUSE Manager Server 4.3:kernel-devel-5.14.21-150400.24.170.1.noarch",
            "SUSE Manager Server 4.3:kernel-macros-5.14.21-150400.24.170.1.noarch",
            "SUSE Manager Server 4.3:kernel-source-5.14.21-150400.24.170.1.noarch",
            "SUSE Manager Server 4.3:kernel-syms-5.14.21-150400.24.170.1.ppc64le",
            "SUSE Manager Server 4.3:kernel-syms-5.14.21-150400.24.170.1.s390x",
            "SUSE Manager Server 4.3:kernel-syms-5.14.21-150400.24.170.1.x86_64",
            "SUSE Manager Server 4.3:kernel-zfcpdump-5.14.21-150400.24.170.2.s390x"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 5.5,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
            "version": "3.1"
          },
          "products": [
            "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-64kb-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-64kb-devel-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-devel-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-devel-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-devel-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-docs-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-macros-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-obs-build-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-obs-build-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-source-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-syms-5.14.21-150400.24.170.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-syms-5.14.21-150400.24.170.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:reiserfs-kmp-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:reiserfs-kmp-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-64kb-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-64kb-devel-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-devel-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-docs-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-macros-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-source-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.170.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.170.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_170-default-1-150400.9.3.2.ppc64le",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_170-default-1-150400.9.3.2.s390x",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_170-default-1-150400.9.3.2.x86_64",
            "SUSE Linux Enterprise Micro 5.3:kernel-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise Micro 5.3:kernel-default-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise Micro 5.3:kernel-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Micro 5.3:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.aarch64",
            "SUSE Linux Enterprise Micro 5.3:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
            "SUSE Linux Enterprise Micro 5.4:kernel-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise Micro 5.4:kernel-default-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise Micro 5.4:kernel-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Micro 5.4:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.aarch64",
            "SUSE Linux Enterprise Micro 5.4:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-64kb-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-64kb-devel-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.aarch64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.ppc64le",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-devel-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-docs-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-macros-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-source-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.170.1.aarch64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.170.1.ppc64le",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.170.1.s390x",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.170.1.x86_64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-zfcpdump-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-devel-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-devel-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-devel-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-docs-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-macros-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-obs-build-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-obs-build-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-source-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-syms-5.14.21-150400.24.170.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-syms-5.14.21-150400.24.170.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Manager Proxy 4.3:kernel-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Manager Proxy 4.3:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
            "SUSE Manager Proxy 4.3:kernel-default-devel-5.14.21-150400.24.170.2.x86_64",
            "SUSE Manager Proxy 4.3:kernel-devel-5.14.21-150400.24.170.1.noarch",
            "SUSE Manager Proxy 4.3:kernel-macros-5.14.21-150400.24.170.1.noarch",
            "SUSE Manager Proxy 4.3:kernel-source-5.14.21-150400.24.170.1.noarch",
            "SUSE Manager Proxy 4.3:kernel-syms-5.14.21-150400.24.170.1.x86_64",
            "SUSE Manager Server 4.3:kernel-default-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Manager Server 4.3:kernel-default-5.14.21-150400.24.170.2.s390x",
            "SUSE Manager Server 4.3:kernel-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Manager Server 4.3:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.ppc64le",
            "SUSE Manager Server 4.3:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
            "SUSE Manager Server 4.3:kernel-default-devel-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Manager Server 4.3:kernel-default-devel-5.14.21-150400.24.170.2.s390x",
            "SUSE Manager Server 4.3:kernel-default-devel-5.14.21-150400.24.170.2.x86_64",
            "SUSE Manager Server 4.3:kernel-devel-5.14.21-150400.24.170.1.noarch",
            "SUSE Manager Server 4.3:kernel-macros-5.14.21-150400.24.170.1.noarch",
            "SUSE Manager Server 4.3:kernel-source-5.14.21-150400.24.170.1.noarch",
            "SUSE Manager Server 4.3:kernel-syms-5.14.21-150400.24.170.1.ppc64le",
            "SUSE Manager Server 4.3:kernel-syms-5.14.21-150400.24.170.1.s390x",
            "SUSE Manager Server 4.3:kernel-syms-5.14.21-150400.24.170.1.x86_64",
            "SUSE Manager Server 4.3:kernel-zfcpdump-5.14.21-150400.24.170.2.s390x"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2025-07-28T15:09:33Z",
          "details": "moderate"
        }
      ],
      "title": "CVE-2022-50162"
    },
    {
      "cve": "CVE-2022-50164",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2022-50164"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "In the Linux kernel, the following vulnerability has been resolved:\n\nwifi: iwlwifi: mvm: fix double list_add at iwl_mvm_mac_wake_tx_queue\n\nAfter successfull station association, if station queues are disabled for\nsome reason, the related lists are not emptied. So if some new element is\nadded to the list in iwl_mvm_mac_wake_tx_queue, it can match with the old\none and produce a BUG like this:\n\n[   46.535263] list_add corruption. prev-\u003enext should be next (ffff94c1c318a360), but was 0000000000000000. (prev=ffff94c1d02d3388).\n[   46.535283] ------------[ cut here ]------------\n[   46.535284] kernel BUG at lib/list_debug.c:26!\n[   46.535290] invalid opcode: 0000 [#1] PREEMPT SMP PTI\n[   46.585304] CPU: 0 PID: 623 Comm: wpa_supplicant Not tainted 5.19.0-rc3+ #1\n[   46.592380] Hardware name: Dell Inc. Inspiron 660s/0478VN       , BIOS A07 08/24/2012\n[   46.600336] RIP: 0010:__list_add_valid.cold+0x3d/0x3f\n[   46.605475] Code: f2 4c 89 c1 48 89 fe 48 c7 c7 c8 40 67 93 e8 20 cc fd ff 0f 0b 48 89 d1 4c 89 c6 4c 89 ca 48 c7 c7 70 40 67 93 e8 09 cc fd ff \u003c0f\u003e 0b 48 89 fe 48 c7 c7 00 41 67 93 e8 f8 cb fd ff 0f 0b 48 89 d1\n[   46.624469] RSP: 0018:ffffb20800ab76d8 EFLAGS: 00010286\n[   46.629854] RAX: 0000000000000075 RBX: ffff94c1c318a0e0 RCX: 0000000000000000\n[   46.637105] RDX: 0000000000000201 RSI: ffffffff9365e100 RDI: 00000000ffffffff\n[   46.644356] RBP: ffff94c1c5f43370 R08: 0000000000000075 R09: 3064316334396666\n[   46.651607] R10: 3364323064316334 R11: 39666666663d7665 R12: ffff94c1c5f43388\n[   46.658857] R13: ffff94c1d02d3388 R14: ffff94c1c318a360 R15: ffff94c1cf2289c0\n[   46.666108] FS:  00007f65634ff7c0(0000) GS:ffff94c1da200000(0000) knlGS:0000000000000000\n[   46.674331] CS:  0010 DS: 0000 ES: 0000 CR0: 0000000080050033\n[   46.680170] CR2: 00007f7dfe984460 CR3: 000000010e894003 CR4: 00000000000606f0\n[   46.687422] Call Trace:\n[   46.689906]  \u003cTASK\u003e\n[   46.691950]  iwl_mvm_mac_wake_tx_queue+0xec/0x15c [iwlmvm]\n[   46.697601]  ieee80211_queue_skb+0x4b3/0x720 [mac80211]\n[   46.702973]  ? sta_info_get+0x46/0x60 [mac80211]\n[   46.707703]  ieee80211_tx+0xad/0x110 [mac80211]\n[   46.712355]  __ieee80211_tx_skb_tid_band+0x71/0x90 [mac80211]\n...\n\nIn order to avoid this problem, we must also remove the related lists when\nstation queues are disabled.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.170.2.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.170.2.s390x",
          "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.170.2.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.170.2.s390x",
          "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.170.2.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.170.2.s390x",
          "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.170.2.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.170.2.s390x",
          "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-64kb-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-64kb-devel-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-devel-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-devel-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-devel-5.14.21-150400.24.170.1.noarch",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-docs-5.14.21-150400.24.170.1.noarch",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-macros-5.14.21-150400.24.170.1.noarch",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-obs-build-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-obs-build-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-source-5.14.21-150400.24.170.1.noarch",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-syms-5.14.21-150400.24.170.1.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-syms-5.14.21-150400.24.170.1.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:reiserfs-kmp-default-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:reiserfs-kmp-default-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-64kb-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-64kb-devel-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-devel-5.14.21-150400.24.170.1.noarch",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-docs-5.14.21-150400.24.170.1.noarch",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-macros-5.14.21-150400.24.170.1.noarch",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-source-5.14.21-150400.24.170.1.noarch",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.170.1.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.170.1.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.170.2.ppc64le",
          "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.170.2.s390x",
          "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.170.2.ppc64le",
          "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.170.2.s390x",
          "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_170-default-1-150400.9.3.2.ppc64le",
          "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_170-default-1-150400.9.3.2.s390x",
          "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_170-default-1-150400.9.3.2.x86_64",
          "SUSE Linux Enterprise Micro 5.3:kernel-default-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise Micro 5.3:kernel-default-5.14.21-150400.24.170.2.s390x",
          "SUSE Linux Enterprise Micro 5.3:kernel-default-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise Micro 5.3:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.aarch64",
          "SUSE Linux Enterprise Micro 5.3:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
          "SUSE Linux Enterprise Micro 5.4:kernel-default-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise Micro 5.4:kernel-default-5.14.21-150400.24.170.2.s390x",
          "SUSE Linux Enterprise Micro 5.4:kernel-default-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise Micro 5.4:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.aarch64",
          "SUSE Linux Enterprise Micro 5.4:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-64kb-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-64kb-devel-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-5.14.21-150400.24.170.2.ppc64le",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-5.14.21-150400.24.170.2.s390x",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.aarch64",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.ppc64le",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.170.2.ppc64le",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.170.2.s390x",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-devel-5.14.21-150400.24.170.1.noarch",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-docs-5.14.21-150400.24.170.1.noarch",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-macros-5.14.21-150400.24.170.1.noarch",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.170.2.ppc64le",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.170.2.s390x",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-source-5.14.21-150400.24.170.1.noarch",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.170.1.aarch64",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.170.1.ppc64le",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.170.1.s390x",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.170.1.x86_64",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-zfcpdump-5.14.21-150400.24.170.2.s390x",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.170.2.ppc64le",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.170.2.s390x",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-5.14.21-150400.24.170.2.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-devel-5.14.21-150400.24.170.2.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-devel-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-devel-5.14.21-150400.24.170.1.noarch",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-docs-5.14.21-150400.24.170.1.noarch",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-macros-5.14.21-150400.24.170.1.noarch",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-obs-build-5.14.21-150400.24.170.2.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-obs-build-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-source-5.14.21-150400.24.170.1.noarch",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-syms-5.14.21-150400.24.170.1.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-syms-5.14.21-150400.24.170.1.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.170.2.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.170.2.x86_64",
          "SUSE Manager Proxy 4.3:kernel-default-5.14.21-150400.24.170.2.x86_64",
          "SUSE Manager Proxy 4.3:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
          "SUSE Manager Proxy 4.3:kernel-default-devel-5.14.21-150400.24.170.2.x86_64",
          "SUSE Manager Proxy 4.3:kernel-devel-5.14.21-150400.24.170.1.noarch",
          "SUSE Manager Proxy 4.3:kernel-macros-5.14.21-150400.24.170.1.noarch",
          "SUSE Manager Proxy 4.3:kernel-source-5.14.21-150400.24.170.1.noarch",
          "SUSE Manager Proxy 4.3:kernel-syms-5.14.21-150400.24.170.1.x86_64",
          "SUSE Manager Server 4.3:kernel-default-5.14.21-150400.24.170.2.ppc64le",
          "SUSE Manager Server 4.3:kernel-default-5.14.21-150400.24.170.2.s390x",
          "SUSE Manager Server 4.3:kernel-default-5.14.21-150400.24.170.2.x86_64",
          "SUSE Manager Server 4.3:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.ppc64le",
          "SUSE Manager Server 4.3:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
          "SUSE Manager Server 4.3:kernel-default-devel-5.14.21-150400.24.170.2.ppc64le",
          "SUSE Manager Server 4.3:kernel-default-devel-5.14.21-150400.24.170.2.s390x",
          "SUSE Manager Server 4.3:kernel-default-devel-5.14.21-150400.24.170.2.x86_64",
          "SUSE Manager Server 4.3:kernel-devel-5.14.21-150400.24.170.1.noarch",
          "SUSE Manager Server 4.3:kernel-macros-5.14.21-150400.24.170.1.noarch",
          "SUSE Manager Server 4.3:kernel-source-5.14.21-150400.24.170.1.noarch",
          "SUSE Manager Server 4.3:kernel-syms-5.14.21-150400.24.170.1.ppc64le",
          "SUSE Manager Server 4.3:kernel-syms-5.14.21-150400.24.170.1.s390x",
          "SUSE Manager Server 4.3:kernel-syms-5.14.21-150400.24.170.1.x86_64",
          "SUSE Manager Server 4.3:kernel-zfcpdump-5.14.21-150400.24.170.2.s390x"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2022-50164",
          "url": "https://www.suse.com/security/cve/CVE-2022-50164"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1244770 for CVE-2022-50164",
          "url": "https://bugzilla.suse.com/1244770"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-64kb-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-64kb-devel-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-devel-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-devel-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-devel-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-docs-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-macros-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-obs-build-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-obs-build-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-source-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-syms-5.14.21-150400.24.170.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-syms-5.14.21-150400.24.170.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:reiserfs-kmp-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:reiserfs-kmp-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-64kb-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-64kb-devel-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-devel-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-docs-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-macros-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-source-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.170.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.170.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_170-default-1-150400.9.3.2.ppc64le",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_170-default-1-150400.9.3.2.s390x",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_170-default-1-150400.9.3.2.x86_64",
            "SUSE Linux Enterprise Micro 5.3:kernel-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise Micro 5.3:kernel-default-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise Micro 5.3:kernel-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Micro 5.3:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.aarch64",
            "SUSE Linux Enterprise Micro 5.3:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
            "SUSE Linux Enterprise Micro 5.4:kernel-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise Micro 5.4:kernel-default-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise Micro 5.4:kernel-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Micro 5.4:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.aarch64",
            "SUSE Linux Enterprise Micro 5.4:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-64kb-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-64kb-devel-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.aarch64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.ppc64le",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-devel-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-docs-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-macros-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-source-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.170.1.aarch64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.170.1.ppc64le",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.170.1.s390x",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.170.1.x86_64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-zfcpdump-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-devel-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-devel-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-devel-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-docs-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-macros-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-obs-build-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-obs-build-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-source-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-syms-5.14.21-150400.24.170.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-syms-5.14.21-150400.24.170.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Manager Proxy 4.3:kernel-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Manager Proxy 4.3:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
            "SUSE Manager Proxy 4.3:kernel-default-devel-5.14.21-150400.24.170.2.x86_64",
            "SUSE Manager Proxy 4.3:kernel-devel-5.14.21-150400.24.170.1.noarch",
            "SUSE Manager Proxy 4.3:kernel-macros-5.14.21-150400.24.170.1.noarch",
            "SUSE Manager Proxy 4.3:kernel-source-5.14.21-150400.24.170.1.noarch",
            "SUSE Manager Proxy 4.3:kernel-syms-5.14.21-150400.24.170.1.x86_64",
            "SUSE Manager Server 4.3:kernel-default-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Manager Server 4.3:kernel-default-5.14.21-150400.24.170.2.s390x",
            "SUSE Manager Server 4.3:kernel-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Manager Server 4.3:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.ppc64le",
            "SUSE Manager Server 4.3:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
            "SUSE Manager Server 4.3:kernel-default-devel-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Manager Server 4.3:kernel-default-devel-5.14.21-150400.24.170.2.s390x",
            "SUSE Manager Server 4.3:kernel-default-devel-5.14.21-150400.24.170.2.x86_64",
            "SUSE Manager Server 4.3:kernel-devel-5.14.21-150400.24.170.1.noarch",
            "SUSE Manager Server 4.3:kernel-macros-5.14.21-150400.24.170.1.noarch",
            "SUSE Manager Server 4.3:kernel-source-5.14.21-150400.24.170.1.noarch",
            "SUSE Manager Server 4.3:kernel-syms-5.14.21-150400.24.170.1.ppc64le",
            "SUSE Manager Server 4.3:kernel-syms-5.14.21-150400.24.170.1.s390x",
            "SUSE Manager Server 4.3:kernel-syms-5.14.21-150400.24.170.1.x86_64",
            "SUSE Manager Server 4.3:kernel-zfcpdump-5.14.21-150400.24.170.2.s390x"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 5.5,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
            "version": "3.1"
          },
          "products": [
            "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-64kb-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-64kb-devel-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-devel-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-devel-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-devel-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-docs-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-macros-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-obs-build-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-obs-build-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-source-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-syms-5.14.21-150400.24.170.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-syms-5.14.21-150400.24.170.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:reiserfs-kmp-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:reiserfs-kmp-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-64kb-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-64kb-devel-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-devel-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-docs-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-macros-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-source-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.170.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.170.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_170-default-1-150400.9.3.2.ppc64le",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_170-default-1-150400.9.3.2.s390x",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_170-default-1-150400.9.3.2.x86_64",
            "SUSE Linux Enterprise Micro 5.3:kernel-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise Micro 5.3:kernel-default-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise Micro 5.3:kernel-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Micro 5.3:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.aarch64",
            "SUSE Linux Enterprise Micro 5.3:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
            "SUSE Linux Enterprise Micro 5.4:kernel-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise Micro 5.4:kernel-default-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise Micro 5.4:kernel-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Micro 5.4:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.aarch64",
            "SUSE Linux Enterprise Micro 5.4:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-64kb-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-64kb-devel-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.aarch64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.ppc64le",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-devel-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-docs-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-macros-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-source-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.170.1.aarch64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.170.1.ppc64le",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.170.1.s390x",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.170.1.x86_64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-zfcpdump-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-devel-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-devel-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-devel-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-docs-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-macros-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-obs-build-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-obs-build-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-source-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-syms-5.14.21-150400.24.170.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-syms-5.14.21-150400.24.170.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Manager Proxy 4.3:kernel-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Manager Proxy 4.3:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
            "SUSE Manager Proxy 4.3:kernel-default-devel-5.14.21-150400.24.170.2.x86_64",
            "SUSE Manager Proxy 4.3:kernel-devel-5.14.21-150400.24.170.1.noarch",
            "SUSE Manager Proxy 4.3:kernel-macros-5.14.21-150400.24.170.1.noarch",
            "SUSE Manager Proxy 4.3:kernel-source-5.14.21-150400.24.170.1.noarch",
            "SUSE Manager Proxy 4.3:kernel-syms-5.14.21-150400.24.170.1.x86_64",
            "SUSE Manager Server 4.3:kernel-default-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Manager Server 4.3:kernel-default-5.14.21-150400.24.170.2.s390x",
            "SUSE Manager Server 4.3:kernel-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Manager Server 4.3:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.ppc64le",
            "SUSE Manager Server 4.3:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
            "SUSE Manager Server 4.3:kernel-default-devel-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Manager Server 4.3:kernel-default-devel-5.14.21-150400.24.170.2.s390x",
            "SUSE Manager Server 4.3:kernel-default-devel-5.14.21-150400.24.170.2.x86_64",
            "SUSE Manager Server 4.3:kernel-devel-5.14.21-150400.24.170.1.noarch",
            "SUSE Manager Server 4.3:kernel-macros-5.14.21-150400.24.170.1.noarch",
            "SUSE Manager Server 4.3:kernel-source-5.14.21-150400.24.170.1.noarch",
            "SUSE Manager Server 4.3:kernel-syms-5.14.21-150400.24.170.1.ppc64le",
            "SUSE Manager Server 4.3:kernel-syms-5.14.21-150400.24.170.1.s390x",
            "SUSE Manager Server 4.3:kernel-syms-5.14.21-150400.24.170.1.x86_64",
            "SUSE Manager Server 4.3:kernel-zfcpdump-5.14.21-150400.24.170.2.s390x"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2025-07-28T15:09:33Z",
          "details": "moderate"
        }
      ],
      "title": "CVE-2022-50164"
    },
    {
      "cve": "CVE-2022-50165",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2022-50165"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "In the Linux kernel, the following vulnerability has been resolved:\n\nwifi: wil6210: debugfs: fix uninitialized variable use in `wil_write_file_wmi()`\n\nCommit 7a4836560a61 changes simple_write_to_buffer() with memdup_user()\nbut it forgets to change the value to be returned that came from\nsimple_write_to_buffer() call. It results in the following warning:\n\n  warning: variable \u0027rc\u0027 is uninitialized when used here [-Wuninitialized]\n           return rc;\n                  ^~\n\nRemove rc variable and just return the passed in length if the\nmemdup_user() succeeds.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.170.2.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.170.2.s390x",
          "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.170.2.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.170.2.s390x",
          "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.170.2.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.170.2.s390x",
          "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.170.2.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.170.2.s390x",
          "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-64kb-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-64kb-devel-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-devel-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-devel-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-devel-5.14.21-150400.24.170.1.noarch",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-docs-5.14.21-150400.24.170.1.noarch",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-macros-5.14.21-150400.24.170.1.noarch",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-obs-build-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-obs-build-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-source-5.14.21-150400.24.170.1.noarch",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-syms-5.14.21-150400.24.170.1.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-syms-5.14.21-150400.24.170.1.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:reiserfs-kmp-default-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:reiserfs-kmp-default-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-64kb-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-64kb-devel-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-devel-5.14.21-150400.24.170.1.noarch",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-docs-5.14.21-150400.24.170.1.noarch",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-macros-5.14.21-150400.24.170.1.noarch",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-source-5.14.21-150400.24.170.1.noarch",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.170.1.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.170.1.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.170.2.ppc64le",
          "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.170.2.s390x",
          "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.170.2.ppc64le",
          "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.170.2.s390x",
          "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_170-default-1-150400.9.3.2.ppc64le",
          "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_170-default-1-150400.9.3.2.s390x",
          "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_170-default-1-150400.9.3.2.x86_64",
          "SUSE Linux Enterprise Micro 5.3:kernel-default-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise Micro 5.3:kernel-default-5.14.21-150400.24.170.2.s390x",
          "SUSE Linux Enterprise Micro 5.3:kernel-default-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise Micro 5.3:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.aarch64",
          "SUSE Linux Enterprise Micro 5.3:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
          "SUSE Linux Enterprise Micro 5.4:kernel-default-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise Micro 5.4:kernel-default-5.14.21-150400.24.170.2.s390x",
          "SUSE Linux Enterprise Micro 5.4:kernel-default-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise Micro 5.4:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.aarch64",
          "SUSE Linux Enterprise Micro 5.4:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-64kb-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-64kb-devel-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-5.14.21-150400.24.170.2.ppc64le",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-5.14.21-150400.24.170.2.s390x",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.aarch64",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.ppc64le",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.170.2.ppc64le",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.170.2.s390x",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-devel-5.14.21-150400.24.170.1.noarch",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-docs-5.14.21-150400.24.170.1.noarch",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-macros-5.14.21-150400.24.170.1.noarch",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.170.2.ppc64le",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.170.2.s390x",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-source-5.14.21-150400.24.170.1.noarch",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.170.1.aarch64",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.170.1.ppc64le",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.170.1.s390x",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.170.1.x86_64",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-zfcpdump-5.14.21-150400.24.170.2.s390x",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.170.2.ppc64le",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.170.2.s390x",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-5.14.21-150400.24.170.2.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-devel-5.14.21-150400.24.170.2.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-devel-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-devel-5.14.21-150400.24.170.1.noarch",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-docs-5.14.21-150400.24.170.1.noarch",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-macros-5.14.21-150400.24.170.1.noarch",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-obs-build-5.14.21-150400.24.170.2.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-obs-build-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-source-5.14.21-150400.24.170.1.noarch",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-syms-5.14.21-150400.24.170.1.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-syms-5.14.21-150400.24.170.1.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.170.2.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.170.2.x86_64",
          "SUSE Manager Proxy 4.3:kernel-default-5.14.21-150400.24.170.2.x86_64",
          "SUSE Manager Proxy 4.3:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
          "SUSE Manager Proxy 4.3:kernel-default-devel-5.14.21-150400.24.170.2.x86_64",
          "SUSE Manager Proxy 4.3:kernel-devel-5.14.21-150400.24.170.1.noarch",
          "SUSE Manager Proxy 4.3:kernel-macros-5.14.21-150400.24.170.1.noarch",
          "SUSE Manager Proxy 4.3:kernel-source-5.14.21-150400.24.170.1.noarch",
          "SUSE Manager Proxy 4.3:kernel-syms-5.14.21-150400.24.170.1.x86_64",
          "SUSE Manager Server 4.3:kernel-default-5.14.21-150400.24.170.2.ppc64le",
          "SUSE Manager Server 4.3:kernel-default-5.14.21-150400.24.170.2.s390x",
          "SUSE Manager Server 4.3:kernel-default-5.14.21-150400.24.170.2.x86_64",
          "SUSE Manager Server 4.3:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.ppc64le",
          "SUSE Manager Server 4.3:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
          "SUSE Manager Server 4.3:kernel-default-devel-5.14.21-150400.24.170.2.ppc64le",
          "SUSE Manager Server 4.3:kernel-default-devel-5.14.21-150400.24.170.2.s390x",
          "SUSE Manager Server 4.3:kernel-default-devel-5.14.21-150400.24.170.2.x86_64",
          "SUSE Manager Server 4.3:kernel-devel-5.14.21-150400.24.170.1.noarch",
          "SUSE Manager Server 4.3:kernel-macros-5.14.21-150400.24.170.1.noarch",
          "SUSE Manager Server 4.3:kernel-source-5.14.21-150400.24.170.1.noarch",
          "SUSE Manager Server 4.3:kernel-syms-5.14.21-150400.24.170.1.ppc64le",
          "SUSE Manager Server 4.3:kernel-syms-5.14.21-150400.24.170.1.s390x",
          "SUSE Manager Server 4.3:kernel-syms-5.14.21-150400.24.170.1.x86_64",
          "SUSE Manager Server 4.3:kernel-zfcpdump-5.14.21-150400.24.170.2.s390x"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2022-50165",
          "url": "https://www.suse.com/security/cve/CVE-2022-50165"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1244771 for CVE-2022-50165",
          "url": "https://bugzilla.suse.com/1244771"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-64kb-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-64kb-devel-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-devel-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-devel-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-devel-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-docs-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-macros-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-obs-build-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-obs-build-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-source-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-syms-5.14.21-150400.24.170.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-syms-5.14.21-150400.24.170.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:reiserfs-kmp-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:reiserfs-kmp-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-64kb-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-64kb-devel-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-devel-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-docs-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-macros-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-source-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.170.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.170.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_170-default-1-150400.9.3.2.ppc64le",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_170-default-1-150400.9.3.2.s390x",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_170-default-1-150400.9.3.2.x86_64",
            "SUSE Linux Enterprise Micro 5.3:kernel-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise Micro 5.3:kernel-default-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise Micro 5.3:kernel-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Micro 5.3:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.aarch64",
            "SUSE Linux Enterprise Micro 5.3:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
            "SUSE Linux Enterprise Micro 5.4:kernel-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise Micro 5.4:kernel-default-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise Micro 5.4:kernel-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Micro 5.4:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.aarch64",
            "SUSE Linux Enterprise Micro 5.4:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-64kb-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-64kb-devel-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.aarch64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.ppc64le",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-devel-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-docs-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-macros-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-source-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.170.1.aarch64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.170.1.ppc64le",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.170.1.s390x",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.170.1.x86_64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-zfcpdump-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-devel-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-devel-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-devel-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-docs-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-macros-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-obs-build-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-obs-build-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-source-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-syms-5.14.21-150400.24.170.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-syms-5.14.21-150400.24.170.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Manager Proxy 4.3:kernel-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Manager Proxy 4.3:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
            "SUSE Manager Proxy 4.3:kernel-default-devel-5.14.21-150400.24.170.2.x86_64",
            "SUSE Manager Proxy 4.3:kernel-devel-5.14.21-150400.24.170.1.noarch",
            "SUSE Manager Proxy 4.3:kernel-macros-5.14.21-150400.24.170.1.noarch",
            "SUSE Manager Proxy 4.3:kernel-source-5.14.21-150400.24.170.1.noarch",
            "SUSE Manager Proxy 4.3:kernel-syms-5.14.21-150400.24.170.1.x86_64",
            "SUSE Manager Server 4.3:kernel-default-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Manager Server 4.3:kernel-default-5.14.21-150400.24.170.2.s390x",
            "SUSE Manager Server 4.3:kernel-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Manager Server 4.3:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.ppc64le",
            "SUSE Manager Server 4.3:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
            "SUSE Manager Server 4.3:kernel-default-devel-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Manager Server 4.3:kernel-default-devel-5.14.21-150400.24.170.2.s390x",
            "SUSE Manager Server 4.3:kernel-default-devel-5.14.21-150400.24.170.2.x86_64",
            "SUSE Manager Server 4.3:kernel-devel-5.14.21-150400.24.170.1.noarch",
            "SUSE Manager Server 4.3:kernel-macros-5.14.21-150400.24.170.1.noarch",
            "SUSE Manager Server 4.3:kernel-source-5.14.21-150400.24.170.1.noarch",
            "SUSE Manager Server 4.3:kernel-syms-5.14.21-150400.24.170.1.ppc64le",
            "SUSE Manager Server 4.3:kernel-syms-5.14.21-150400.24.170.1.s390x",
            "SUSE Manager Server 4.3:kernel-syms-5.14.21-150400.24.170.1.x86_64",
            "SUSE Manager Server 4.3:kernel-zfcpdump-5.14.21-150400.24.170.2.s390x"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 4.4,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H",
            "version": "3.1"
          },
          "products": [
            "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-64kb-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-64kb-devel-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-devel-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-devel-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-devel-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-docs-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-macros-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-obs-build-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-obs-build-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-source-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-syms-5.14.21-150400.24.170.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-syms-5.14.21-150400.24.170.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:reiserfs-kmp-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:reiserfs-kmp-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-64kb-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-64kb-devel-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-devel-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-docs-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-macros-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-source-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.170.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.170.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_170-default-1-150400.9.3.2.ppc64le",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_170-default-1-150400.9.3.2.s390x",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_170-default-1-150400.9.3.2.x86_64",
            "SUSE Linux Enterprise Micro 5.3:kernel-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise Micro 5.3:kernel-default-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise Micro 5.3:kernel-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Micro 5.3:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.aarch64",
            "SUSE Linux Enterprise Micro 5.3:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
            "SUSE Linux Enterprise Micro 5.4:kernel-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise Micro 5.4:kernel-default-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise Micro 5.4:kernel-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Micro 5.4:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.aarch64",
            "SUSE Linux Enterprise Micro 5.4:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-64kb-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-64kb-devel-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.aarch64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.ppc64le",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-devel-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-docs-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-macros-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-source-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.170.1.aarch64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.170.1.ppc64le",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.170.1.s390x",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.170.1.x86_64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-zfcpdump-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-devel-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-devel-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-devel-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-docs-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-macros-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-obs-build-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-obs-build-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-source-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-syms-5.14.21-150400.24.170.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-syms-5.14.21-150400.24.170.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Manager Proxy 4.3:kernel-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Manager Proxy 4.3:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
            "SUSE Manager Proxy 4.3:kernel-default-devel-5.14.21-150400.24.170.2.x86_64",
            "SUSE Manager Proxy 4.3:kernel-devel-5.14.21-150400.24.170.1.noarch",
            "SUSE Manager Proxy 4.3:kernel-macros-5.14.21-150400.24.170.1.noarch",
            "SUSE Manager Proxy 4.3:kernel-source-5.14.21-150400.24.170.1.noarch",
            "SUSE Manager Proxy 4.3:kernel-syms-5.14.21-150400.24.170.1.x86_64",
            "SUSE Manager Server 4.3:kernel-default-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Manager Server 4.3:kernel-default-5.14.21-150400.24.170.2.s390x",
            "SUSE Manager Server 4.3:kernel-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Manager Server 4.3:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.ppc64le",
            "SUSE Manager Server 4.3:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
            "SUSE Manager Server 4.3:kernel-default-devel-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Manager Server 4.3:kernel-default-devel-5.14.21-150400.24.170.2.s390x",
            "SUSE Manager Server 4.3:kernel-default-devel-5.14.21-150400.24.170.2.x86_64",
            "SUSE Manager Server 4.3:kernel-devel-5.14.21-150400.24.170.1.noarch",
            "SUSE Manager Server 4.3:kernel-macros-5.14.21-150400.24.170.1.noarch",
            "SUSE Manager Server 4.3:kernel-source-5.14.21-150400.24.170.1.noarch",
            "SUSE Manager Server 4.3:kernel-syms-5.14.21-150400.24.170.1.ppc64le",
            "SUSE Manager Server 4.3:kernel-syms-5.14.21-150400.24.170.1.s390x",
            "SUSE Manager Server 4.3:kernel-syms-5.14.21-150400.24.170.1.x86_64",
            "SUSE Manager Server 4.3:kernel-zfcpdump-5.14.21-150400.24.170.2.s390x"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2025-07-28T15:09:33Z",
          "details": "moderate"
        }
      ],
      "title": "CVE-2022-50165"
    },
    {
      "cve": "CVE-2022-50169",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2022-50169"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "In the Linux kernel, the following vulnerability has been resolved:\n\nwifi: wil6210: debugfs: fix info leak in wil_write_file_wmi()\n\nThe simple_write_to_buffer() function will succeed if even a single\nbyte is initialized.  However, we need to initialize the whole buffer\nto prevent information leaks.  Just use memdup_user().",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.170.2.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.170.2.s390x",
          "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.170.2.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.170.2.s390x",
          "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.170.2.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.170.2.s390x",
          "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.170.2.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.170.2.s390x",
          "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-64kb-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-64kb-devel-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-devel-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-devel-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-devel-5.14.21-150400.24.170.1.noarch",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-docs-5.14.21-150400.24.170.1.noarch",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-macros-5.14.21-150400.24.170.1.noarch",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-obs-build-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-obs-build-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-source-5.14.21-150400.24.170.1.noarch",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-syms-5.14.21-150400.24.170.1.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-syms-5.14.21-150400.24.170.1.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:reiserfs-kmp-default-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:reiserfs-kmp-default-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-64kb-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-64kb-devel-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-devel-5.14.21-150400.24.170.1.noarch",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-docs-5.14.21-150400.24.170.1.noarch",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-macros-5.14.21-150400.24.170.1.noarch",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-source-5.14.21-150400.24.170.1.noarch",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.170.1.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.170.1.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.170.2.ppc64le",
          "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.170.2.s390x",
          "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.170.2.ppc64le",
          "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.170.2.s390x",
          "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_170-default-1-150400.9.3.2.ppc64le",
          "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_170-default-1-150400.9.3.2.s390x",
          "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_170-default-1-150400.9.3.2.x86_64",
          "SUSE Linux Enterprise Micro 5.3:kernel-default-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise Micro 5.3:kernel-default-5.14.21-150400.24.170.2.s390x",
          "SUSE Linux Enterprise Micro 5.3:kernel-default-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise Micro 5.3:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.aarch64",
          "SUSE Linux Enterprise Micro 5.3:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
          "SUSE Linux Enterprise Micro 5.4:kernel-default-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise Micro 5.4:kernel-default-5.14.21-150400.24.170.2.s390x",
          "SUSE Linux Enterprise Micro 5.4:kernel-default-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise Micro 5.4:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.aarch64",
          "SUSE Linux Enterprise Micro 5.4:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-64kb-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-64kb-devel-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-5.14.21-150400.24.170.2.ppc64le",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-5.14.21-150400.24.170.2.s390x",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.aarch64",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.ppc64le",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.170.2.ppc64le",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.170.2.s390x",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-devel-5.14.21-150400.24.170.1.noarch",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-docs-5.14.21-150400.24.170.1.noarch",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-macros-5.14.21-150400.24.170.1.noarch",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.170.2.ppc64le",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.170.2.s390x",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-source-5.14.21-150400.24.170.1.noarch",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.170.1.aarch64",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.170.1.ppc64le",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.170.1.s390x",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.170.1.x86_64",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-zfcpdump-5.14.21-150400.24.170.2.s390x",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.170.2.ppc64le",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.170.2.s390x",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-5.14.21-150400.24.170.2.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-devel-5.14.21-150400.24.170.2.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-devel-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-devel-5.14.21-150400.24.170.1.noarch",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-docs-5.14.21-150400.24.170.1.noarch",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-macros-5.14.21-150400.24.170.1.noarch",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-obs-build-5.14.21-150400.24.170.2.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-obs-build-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-source-5.14.21-150400.24.170.1.noarch",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-syms-5.14.21-150400.24.170.1.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-syms-5.14.21-150400.24.170.1.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.170.2.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.170.2.x86_64",
          "SUSE Manager Proxy 4.3:kernel-default-5.14.21-150400.24.170.2.x86_64",
          "SUSE Manager Proxy 4.3:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
          "SUSE Manager Proxy 4.3:kernel-default-devel-5.14.21-150400.24.170.2.x86_64",
          "SUSE Manager Proxy 4.3:kernel-devel-5.14.21-150400.24.170.1.noarch",
          "SUSE Manager Proxy 4.3:kernel-macros-5.14.21-150400.24.170.1.noarch",
          "SUSE Manager Proxy 4.3:kernel-source-5.14.21-150400.24.170.1.noarch",
          "SUSE Manager Proxy 4.3:kernel-syms-5.14.21-150400.24.170.1.x86_64",
          "SUSE Manager Server 4.3:kernel-default-5.14.21-150400.24.170.2.ppc64le",
          "SUSE Manager Server 4.3:kernel-default-5.14.21-150400.24.170.2.s390x",
          "SUSE Manager Server 4.3:kernel-default-5.14.21-150400.24.170.2.x86_64",
          "SUSE Manager Server 4.3:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.ppc64le",
          "SUSE Manager Server 4.3:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
          "SUSE Manager Server 4.3:kernel-default-devel-5.14.21-150400.24.170.2.ppc64le",
          "SUSE Manager Server 4.3:kernel-default-devel-5.14.21-150400.24.170.2.s390x",
          "SUSE Manager Server 4.3:kernel-default-devel-5.14.21-150400.24.170.2.x86_64",
          "SUSE Manager Server 4.3:kernel-devel-5.14.21-150400.24.170.1.noarch",
          "SUSE Manager Server 4.3:kernel-macros-5.14.21-150400.24.170.1.noarch",
          "SUSE Manager Server 4.3:kernel-source-5.14.21-150400.24.170.1.noarch",
          "SUSE Manager Server 4.3:kernel-syms-5.14.21-150400.24.170.1.ppc64le",
          "SUSE Manager Server 4.3:kernel-syms-5.14.21-150400.24.170.1.s390x",
          "SUSE Manager Server 4.3:kernel-syms-5.14.21-150400.24.170.1.x86_64",
          "SUSE Manager Server 4.3:kernel-zfcpdump-5.14.21-150400.24.170.2.s390x"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2022-50169",
          "url": "https://www.suse.com/security/cve/CVE-2022-50169"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1244767 for CVE-2022-50169",
          "url": "https://bugzilla.suse.com/1244767"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-64kb-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-64kb-devel-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-devel-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-devel-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-devel-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-docs-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-macros-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-obs-build-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-obs-build-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-source-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-syms-5.14.21-150400.24.170.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-syms-5.14.21-150400.24.170.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:reiserfs-kmp-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:reiserfs-kmp-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-64kb-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-64kb-devel-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-devel-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-docs-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-macros-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-source-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.170.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.170.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_170-default-1-150400.9.3.2.ppc64le",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_170-default-1-150400.9.3.2.s390x",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_170-default-1-150400.9.3.2.x86_64",
            "SUSE Linux Enterprise Micro 5.3:kernel-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise Micro 5.3:kernel-default-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise Micro 5.3:kernel-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Micro 5.3:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.aarch64",
            "SUSE Linux Enterprise Micro 5.3:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
            "SUSE Linux Enterprise Micro 5.4:kernel-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise Micro 5.4:kernel-default-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise Micro 5.4:kernel-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Micro 5.4:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.aarch64",
            "SUSE Linux Enterprise Micro 5.4:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-64kb-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-64kb-devel-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.aarch64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.ppc64le",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-devel-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-docs-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-macros-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-source-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.170.1.aarch64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.170.1.ppc64le",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.170.1.s390x",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.170.1.x86_64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-zfcpdump-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-devel-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-devel-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-devel-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-docs-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-macros-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-obs-build-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-obs-build-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-source-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-syms-5.14.21-150400.24.170.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-syms-5.14.21-150400.24.170.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Manager Proxy 4.3:kernel-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Manager Proxy 4.3:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
            "SUSE Manager Proxy 4.3:kernel-default-devel-5.14.21-150400.24.170.2.x86_64",
            "SUSE Manager Proxy 4.3:kernel-devel-5.14.21-150400.24.170.1.noarch",
            "SUSE Manager Proxy 4.3:kernel-macros-5.14.21-150400.24.170.1.noarch",
            "SUSE Manager Proxy 4.3:kernel-source-5.14.21-150400.24.170.1.noarch",
            "SUSE Manager Proxy 4.3:kernel-syms-5.14.21-150400.24.170.1.x86_64",
            "SUSE Manager Server 4.3:kernel-default-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Manager Server 4.3:kernel-default-5.14.21-150400.24.170.2.s390x",
            "SUSE Manager Server 4.3:kernel-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Manager Server 4.3:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.ppc64le",
            "SUSE Manager Server 4.3:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
            "SUSE Manager Server 4.3:kernel-default-devel-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Manager Server 4.3:kernel-default-devel-5.14.21-150400.24.170.2.s390x",
            "SUSE Manager Server 4.3:kernel-default-devel-5.14.21-150400.24.170.2.x86_64",
            "SUSE Manager Server 4.3:kernel-devel-5.14.21-150400.24.170.1.noarch",
            "SUSE Manager Server 4.3:kernel-macros-5.14.21-150400.24.170.1.noarch",
            "SUSE Manager Server 4.3:kernel-source-5.14.21-150400.24.170.1.noarch",
            "SUSE Manager Server 4.3:kernel-syms-5.14.21-150400.24.170.1.ppc64le",
            "SUSE Manager Server 4.3:kernel-syms-5.14.21-150400.24.170.1.s390x",
            "SUSE Manager Server 4.3:kernel-syms-5.14.21-150400.24.170.1.x86_64",
            "SUSE Manager Server 4.3:kernel-zfcpdump-5.14.21-150400.24.170.2.s390x"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 5.5,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
            "version": "3.1"
          },
          "products": [
            "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-64kb-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-64kb-devel-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-devel-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-devel-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-devel-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-docs-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-macros-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-obs-build-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-obs-build-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-source-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-syms-5.14.21-150400.24.170.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-syms-5.14.21-150400.24.170.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:reiserfs-kmp-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:reiserfs-kmp-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-64kb-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-64kb-devel-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-devel-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-docs-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-macros-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-source-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.170.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.170.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_170-default-1-150400.9.3.2.ppc64le",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_170-default-1-150400.9.3.2.s390x",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_170-default-1-150400.9.3.2.x86_64",
            "SUSE Linux Enterprise Micro 5.3:kernel-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise Micro 5.3:kernel-default-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise Micro 5.3:kernel-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Micro 5.3:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.aarch64",
            "SUSE Linux Enterprise Micro 5.3:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
            "SUSE Linux Enterprise Micro 5.4:kernel-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise Micro 5.4:kernel-default-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise Micro 5.4:kernel-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Micro 5.4:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.aarch64",
            "SUSE Linux Enterprise Micro 5.4:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-64kb-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-64kb-devel-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.aarch64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.ppc64le",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-devel-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-docs-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-macros-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-source-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.170.1.aarch64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.170.1.ppc64le",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.170.1.s390x",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.170.1.x86_64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-zfcpdump-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-devel-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-devel-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-devel-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-docs-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-macros-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-obs-build-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-obs-build-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-source-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-syms-5.14.21-150400.24.170.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-syms-5.14.21-150400.24.170.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Manager Proxy 4.3:kernel-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Manager Proxy 4.3:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
            "SUSE Manager Proxy 4.3:kernel-default-devel-5.14.21-150400.24.170.2.x86_64",
            "SUSE Manager Proxy 4.3:kernel-devel-5.14.21-150400.24.170.1.noarch",
            "SUSE Manager Proxy 4.3:kernel-macros-5.14.21-150400.24.170.1.noarch",
            "SUSE Manager Proxy 4.3:kernel-source-5.14.21-150400.24.170.1.noarch",
            "SUSE Manager Proxy 4.3:kernel-syms-5.14.21-150400.24.170.1.x86_64",
            "SUSE Manager Server 4.3:kernel-default-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Manager Server 4.3:kernel-default-5.14.21-150400.24.170.2.s390x",
            "SUSE Manager Server 4.3:kernel-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Manager Server 4.3:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.ppc64le",
            "SUSE Manager Server 4.3:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
            "SUSE Manager Server 4.3:kernel-default-devel-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Manager Server 4.3:kernel-default-devel-5.14.21-150400.24.170.2.s390x",
            "SUSE Manager Server 4.3:kernel-default-devel-5.14.21-150400.24.170.2.x86_64",
            "SUSE Manager Server 4.3:kernel-devel-5.14.21-150400.24.170.1.noarch",
            "SUSE Manager Server 4.3:kernel-macros-5.14.21-150400.24.170.1.noarch",
            "SUSE Manager Server 4.3:kernel-source-5.14.21-150400.24.170.1.noarch",
            "SUSE Manager Server 4.3:kernel-syms-5.14.21-150400.24.170.1.ppc64le",
            "SUSE Manager Server 4.3:kernel-syms-5.14.21-150400.24.170.1.s390x",
            "SUSE Manager Server 4.3:kernel-syms-5.14.21-150400.24.170.1.x86_64",
            "SUSE Manager Server 4.3:kernel-zfcpdump-5.14.21-150400.24.170.2.s390x"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2025-07-28T15:09:33Z",
          "details": "moderate"
        }
      ],
      "title": "CVE-2022-50169"
    },
    {
      "cve": "CVE-2022-50171",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2022-50171"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "In the Linux kernel, the following vulnerability has been resolved:\n\ncrypto: hisilicon/sec - don\u0027t sleep when in softirq\n\nWhen kunpeng920 encryption driver is used to deencrypt and decrypt\npackets during the softirq, it is not allowed to use mutex lock. The\nkernel will report the following error:\n\nBUG: scheduling while atomic: swapper/57/0/0x00000300\nCall trace:\ndump_backtrace+0x0/0x1e4\nshow_stack+0x20/0x2c\ndump_stack+0xd8/0x140\n__schedule_bug+0x68/0x80\n__schedule+0x728/0x840\nschedule+0x50/0xe0\nschedule_preempt_disabled+0x18/0x24\n__mutex_lock.constprop.0+0x594/0x5dc\n__mutex_lock_slowpath+0x1c/0x30\nmutex_lock+0x50/0x60\nsec_request_init+0x8c/0x1a0 [hisi_sec2]\nsec_process+0x28/0x1ac [hisi_sec2]\nsec_skcipher_crypto+0xf4/0x1d4 [hisi_sec2]\nsec_skcipher_encrypt+0x1c/0x30 [hisi_sec2]\ncrypto_skcipher_encrypt+0x2c/0x40\ncrypto_authenc_encrypt+0xc8/0xfc [authenc]\ncrypto_aead_encrypt+0x2c/0x40\nechainiv_encrypt+0x144/0x1a0 [echainiv]\ncrypto_aead_encrypt+0x2c/0x40\nesp_output_tail+0x348/0x5c0 [esp4]\nesp_output+0x120/0x19c [esp4]\nxfrm_output_one+0x25c/0x4d4\nxfrm_output_resume+0x6c/0x1fc\nxfrm_output+0xac/0x3c0\nxfrm4_output+0x64/0x130\nip_build_and_send_pkt+0x158/0x20c\ntcp_v4_send_synack+0xdc/0x1f0\ntcp_conn_request+0x7d0/0x994\ntcp_v4_conn_request+0x58/0x6c\ntcp_v6_conn_request+0xf0/0x100\ntcp_rcv_state_process+0x1cc/0xd60\ntcp_v4_do_rcv+0x10c/0x250\ntcp_v4_rcv+0xfc4/0x10a4\nip_protocol_deliver_rcu+0xf4/0x200\nip_local_deliver_finish+0x58/0x70\nip_local_deliver+0x68/0x120\nip_sublist_rcv_finish+0x70/0x94\nip_list_rcv_finish.constprop.0+0x17c/0x1d0\nip_sublist_rcv+0x40/0xb0\nip_list_rcv+0x140/0x1dc\n__netif_receive_skb_list_core+0x154/0x28c\n__netif_receive_skb_list+0x120/0x1a0\nnetif_receive_skb_list_internal+0xe4/0x1f0\nnapi_complete_done+0x70/0x1f0\ngro_cell_poll+0x9c/0xb0\nnapi_poll+0xcc/0x264\nnet_rx_action+0xd4/0x21c\n__do_softirq+0x130/0x358\nirq_exit+0x11c/0x13c\n__handle_domain_irq+0x88/0xf0\ngic_handle_irq+0x78/0x2c0\nel1_irq+0xb8/0x140\narch_cpu_idle+0x18/0x40\ndefault_idle_call+0x5c/0x1c0\ncpuidle_idle_call+0x174/0x1b0\ndo_idle+0xc8/0x160\ncpu_startup_entry+0x30/0x11c\nsecondary_start_kernel+0x158/0x1e4\nsoftirq: huh, entered softirq 3 NET_RX 0000000093774ee4 with\npreempt_count 00000100, exited with fffffe00?",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.170.2.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.170.2.s390x",
          "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.170.2.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.170.2.s390x",
          "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.170.2.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.170.2.s390x",
          "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.170.2.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.170.2.s390x",
          "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-64kb-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-64kb-devel-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-devel-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-devel-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-devel-5.14.21-150400.24.170.1.noarch",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-docs-5.14.21-150400.24.170.1.noarch",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-macros-5.14.21-150400.24.170.1.noarch",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-obs-build-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-obs-build-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-source-5.14.21-150400.24.170.1.noarch",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-syms-5.14.21-150400.24.170.1.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-syms-5.14.21-150400.24.170.1.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:reiserfs-kmp-default-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:reiserfs-kmp-default-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-64kb-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-64kb-devel-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-devel-5.14.21-150400.24.170.1.noarch",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-docs-5.14.21-150400.24.170.1.noarch",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-macros-5.14.21-150400.24.170.1.noarch",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-source-5.14.21-150400.24.170.1.noarch",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.170.1.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.170.1.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.170.2.ppc64le",
          "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.170.2.s390x",
          "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.170.2.ppc64le",
          "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.170.2.s390x",
          "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_170-default-1-150400.9.3.2.ppc64le",
          "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_170-default-1-150400.9.3.2.s390x",
          "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_170-default-1-150400.9.3.2.x86_64",
          "SUSE Linux Enterprise Micro 5.3:kernel-default-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise Micro 5.3:kernel-default-5.14.21-150400.24.170.2.s390x",
          "SUSE Linux Enterprise Micro 5.3:kernel-default-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise Micro 5.3:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.aarch64",
          "SUSE Linux Enterprise Micro 5.3:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
          "SUSE Linux Enterprise Micro 5.4:kernel-default-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise Micro 5.4:kernel-default-5.14.21-150400.24.170.2.s390x",
          "SUSE Linux Enterprise Micro 5.4:kernel-default-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise Micro 5.4:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.aarch64",
          "SUSE Linux Enterprise Micro 5.4:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-64kb-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-64kb-devel-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-5.14.21-150400.24.170.2.ppc64le",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-5.14.21-150400.24.170.2.s390x",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.aarch64",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.ppc64le",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.170.2.ppc64le",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.170.2.s390x",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-devel-5.14.21-150400.24.170.1.noarch",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-docs-5.14.21-150400.24.170.1.noarch",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-macros-5.14.21-150400.24.170.1.noarch",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.170.2.ppc64le",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.170.2.s390x",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-source-5.14.21-150400.24.170.1.noarch",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.170.1.aarch64",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.170.1.ppc64le",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.170.1.s390x",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.170.1.x86_64",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-zfcpdump-5.14.21-150400.24.170.2.s390x",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.170.2.ppc64le",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.170.2.s390x",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-5.14.21-150400.24.170.2.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-devel-5.14.21-150400.24.170.2.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-devel-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-devel-5.14.21-150400.24.170.1.noarch",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-docs-5.14.21-150400.24.170.1.noarch",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-macros-5.14.21-150400.24.170.1.noarch",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-obs-build-5.14.21-150400.24.170.2.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-obs-build-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-source-5.14.21-150400.24.170.1.noarch",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-syms-5.14.21-150400.24.170.1.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-syms-5.14.21-150400.24.170.1.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.170.2.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.170.2.x86_64",
          "SUSE Manager Proxy 4.3:kernel-default-5.14.21-150400.24.170.2.x86_64",
          "SUSE Manager Proxy 4.3:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
          "SUSE Manager Proxy 4.3:kernel-default-devel-5.14.21-150400.24.170.2.x86_64",
          "SUSE Manager Proxy 4.3:kernel-devel-5.14.21-150400.24.170.1.noarch",
          "SUSE Manager Proxy 4.3:kernel-macros-5.14.21-150400.24.170.1.noarch",
          "SUSE Manager Proxy 4.3:kernel-source-5.14.21-150400.24.170.1.noarch",
          "SUSE Manager Proxy 4.3:kernel-syms-5.14.21-150400.24.170.1.x86_64",
          "SUSE Manager Server 4.3:kernel-default-5.14.21-150400.24.170.2.ppc64le",
          "SUSE Manager Server 4.3:kernel-default-5.14.21-150400.24.170.2.s390x",
          "SUSE Manager Server 4.3:kernel-default-5.14.21-150400.24.170.2.x86_64",
          "SUSE Manager Server 4.3:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.ppc64le",
          "SUSE Manager Server 4.3:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
          "SUSE Manager Server 4.3:kernel-default-devel-5.14.21-150400.24.170.2.ppc64le",
          "SUSE Manager Server 4.3:kernel-default-devel-5.14.21-150400.24.170.2.s390x",
          "SUSE Manager Server 4.3:kernel-default-devel-5.14.21-150400.24.170.2.x86_64",
          "SUSE Manager Server 4.3:kernel-devel-5.14.21-150400.24.170.1.noarch",
          "SUSE Manager Server 4.3:kernel-macros-5.14.21-150400.24.170.1.noarch",
          "SUSE Manager Server 4.3:kernel-source-5.14.21-150400.24.170.1.noarch",
          "SUSE Manager Server 4.3:kernel-syms-5.14.21-150400.24.170.1.ppc64le",
          "SUSE Manager Server 4.3:kernel-syms-5.14.21-150400.24.170.1.s390x",
          "SUSE Manager Server 4.3:kernel-syms-5.14.21-150400.24.170.1.x86_64",
          "SUSE Manager Server 4.3:kernel-zfcpdump-5.14.21-150400.24.170.2.s390x"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2022-50171",
          "url": "https://www.suse.com/security/cve/CVE-2022-50171"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1244765 for CVE-2022-50171",
          "url": "https://bugzilla.suse.com/1244765"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-64kb-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-64kb-devel-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-devel-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-devel-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-devel-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-docs-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-macros-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-obs-build-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-obs-build-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-source-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-syms-5.14.21-150400.24.170.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-syms-5.14.21-150400.24.170.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:reiserfs-kmp-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:reiserfs-kmp-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-64kb-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-64kb-devel-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-devel-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-docs-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-macros-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-source-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.170.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.170.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_170-default-1-150400.9.3.2.ppc64le",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_170-default-1-150400.9.3.2.s390x",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_170-default-1-150400.9.3.2.x86_64",
            "SUSE Linux Enterprise Micro 5.3:kernel-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise Micro 5.3:kernel-default-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise Micro 5.3:kernel-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Micro 5.3:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.aarch64",
            "SUSE Linux Enterprise Micro 5.3:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
            "SUSE Linux Enterprise Micro 5.4:kernel-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise Micro 5.4:kernel-default-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise Micro 5.4:kernel-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Micro 5.4:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.aarch64",
            "SUSE Linux Enterprise Micro 5.4:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-64kb-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-64kb-devel-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.aarch64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.ppc64le",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-devel-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-docs-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-macros-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-source-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.170.1.aarch64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.170.1.ppc64le",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.170.1.s390x",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.170.1.x86_64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-zfcpdump-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-devel-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-devel-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-devel-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-docs-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-macros-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-obs-build-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-obs-build-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-source-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-syms-5.14.21-150400.24.170.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-syms-5.14.21-150400.24.170.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Manager Proxy 4.3:kernel-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Manager Proxy 4.3:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
            "SUSE Manager Proxy 4.3:kernel-default-devel-5.14.21-150400.24.170.2.x86_64",
            "SUSE Manager Proxy 4.3:kernel-devel-5.14.21-150400.24.170.1.noarch",
            "SUSE Manager Proxy 4.3:kernel-macros-5.14.21-150400.24.170.1.noarch",
            "SUSE Manager Proxy 4.3:kernel-source-5.14.21-150400.24.170.1.noarch",
            "SUSE Manager Proxy 4.3:kernel-syms-5.14.21-150400.24.170.1.x86_64",
            "SUSE Manager Server 4.3:kernel-default-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Manager Server 4.3:kernel-default-5.14.21-150400.24.170.2.s390x",
            "SUSE Manager Server 4.3:kernel-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Manager Server 4.3:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.ppc64le",
            "SUSE Manager Server 4.3:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
            "SUSE Manager Server 4.3:kernel-default-devel-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Manager Server 4.3:kernel-default-devel-5.14.21-150400.24.170.2.s390x",
            "SUSE Manager Server 4.3:kernel-default-devel-5.14.21-150400.24.170.2.x86_64",
            "SUSE Manager Server 4.3:kernel-devel-5.14.21-150400.24.170.1.noarch",
            "SUSE Manager Server 4.3:kernel-macros-5.14.21-150400.24.170.1.noarch",
            "SUSE Manager Server 4.3:kernel-source-5.14.21-150400.24.170.1.noarch",
            "SUSE Manager Server 4.3:kernel-syms-5.14.21-150400.24.170.1.ppc64le",
            "SUSE Manager Server 4.3:kernel-syms-5.14.21-150400.24.170.1.s390x",
            "SUSE Manager Server 4.3:kernel-syms-5.14.21-150400.24.170.1.x86_64",
            "SUSE Manager Server 4.3:kernel-zfcpdump-5.14.21-150400.24.170.2.s390x"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 5.5,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
            "version": "3.1"
          },
          "products": [
            "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-64kb-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-64kb-devel-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-devel-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-devel-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-devel-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-docs-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-macros-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-obs-build-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-obs-build-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-source-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-syms-5.14.21-150400.24.170.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-syms-5.14.21-150400.24.170.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:reiserfs-kmp-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:reiserfs-kmp-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-64kb-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-64kb-devel-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-devel-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-docs-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-macros-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-source-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.170.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.170.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_170-default-1-150400.9.3.2.ppc64le",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_170-default-1-150400.9.3.2.s390x",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_170-default-1-150400.9.3.2.x86_64",
            "SUSE Linux Enterprise Micro 5.3:kernel-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise Micro 5.3:kernel-default-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise Micro 5.3:kernel-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Micro 5.3:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.aarch64",
            "SUSE Linux Enterprise Micro 5.3:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
            "SUSE Linux Enterprise Micro 5.4:kernel-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise Micro 5.4:kernel-default-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise Micro 5.4:kernel-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Micro 5.4:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.aarch64",
            "SUSE Linux Enterprise Micro 5.4:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-64kb-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-64kb-devel-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.aarch64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.ppc64le",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-devel-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-docs-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-macros-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-source-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.170.1.aarch64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.170.1.ppc64le",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.170.1.s390x",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.170.1.x86_64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-zfcpdump-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-devel-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-devel-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-devel-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-docs-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-macros-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-obs-build-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-obs-build-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-source-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-syms-5.14.21-150400.24.170.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-syms-5.14.21-150400.24.170.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Manager Proxy 4.3:kernel-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Manager Proxy 4.3:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
            "SUSE Manager Proxy 4.3:kernel-default-devel-5.14.21-150400.24.170.2.x86_64",
            "SUSE Manager Proxy 4.3:kernel-devel-5.14.21-150400.24.170.1.noarch",
            "SUSE Manager Proxy 4.3:kernel-macros-5.14.21-150400.24.170.1.noarch",
            "SUSE Manager Proxy 4.3:kernel-source-5.14.21-150400.24.170.1.noarch",
            "SUSE Manager Proxy 4.3:kernel-syms-5.14.21-150400.24.170.1.x86_64",
            "SUSE Manager Server 4.3:kernel-default-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Manager Server 4.3:kernel-default-5.14.21-150400.24.170.2.s390x",
            "SUSE Manager Server 4.3:kernel-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Manager Server 4.3:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.ppc64le",
            "SUSE Manager Server 4.3:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
            "SUSE Manager Server 4.3:kernel-default-devel-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Manager Server 4.3:kernel-default-devel-5.14.21-150400.24.170.2.s390x",
            "SUSE Manager Server 4.3:kernel-default-devel-5.14.21-150400.24.170.2.x86_64",
            "SUSE Manager Server 4.3:kernel-devel-5.14.21-150400.24.170.1.noarch",
            "SUSE Manager Server 4.3:kernel-macros-5.14.21-150400.24.170.1.noarch",
            "SUSE Manager Server 4.3:kernel-source-5.14.21-150400.24.170.1.noarch",
            "SUSE Manager Server 4.3:kernel-syms-5.14.21-150400.24.170.1.ppc64le",
            "SUSE Manager Server 4.3:kernel-syms-5.14.21-150400.24.170.1.s390x",
            "SUSE Manager Server 4.3:kernel-syms-5.14.21-150400.24.170.1.x86_64",
            "SUSE Manager Server 4.3:kernel-zfcpdump-5.14.21-150400.24.170.2.s390x"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2025-07-28T15:09:33Z",
          "details": "moderate"
        }
      ],
      "title": "CVE-2022-50171"
    },
    {
      "cve": "CVE-2022-50172",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2022-50172"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "In the Linux kernel, the following vulnerability has been resolved:\n\nmt76: mt76x02u: fix possible memory leak in __mt76x02u_mcu_send_msg\n\nFree the skb if mt76u_bulk_msg fails in __mt76x02u_mcu_send_msg routine.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.170.2.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.170.2.s390x",
          "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.170.2.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.170.2.s390x",
          "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.170.2.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.170.2.s390x",
          "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.170.2.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.170.2.s390x",
          "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-64kb-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-64kb-devel-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-devel-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-devel-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-devel-5.14.21-150400.24.170.1.noarch",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-docs-5.14.21-150400.24.170.1.noarch",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-macros-5.14.21-150400.24.170.1.noarch",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-obs-build-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-obs-build-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-source-5.14.21-150400.24.170.1.noarch",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-syms-5.14.21-150400.24.170.1.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-syms-5.14.21-150400.24.170.1.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:reiserfs-kmp-default-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:reiserfs-kmp-default-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-64kb-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-64kb-devel-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-devel-5.14.21-150400.24.170.1.noarch",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-docs-5.14.21-150400.24.170.1.noarch",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-macros-5.14.21-150400.24.170.1.noarch",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-source-5.14.21-150400.24.170.1.noarch",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.170.1.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.170.1.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.170.2.ppc64le",
          "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.170.2.s390x",
          "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.170.2.ppc64le",
          "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.170.2.s390x",
          "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_170-default-1-150400.9.3.2.ppc64le",
          "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_170-default-1-150400.9.3.2.s390x",
          "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_170-default-1-150400.9.3.2.x86_64",
          "SUSE Linux Enterprise Micro 5.3:kernel-default-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise Micro 5.3:kernel-default-5.14.21-150400.24.170.2.s390x",
          "SUSE Linux Enterprise Micro 5.3:kernel-default-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise Micro 5.3:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.aarch64",
          "SUSE Linux Enterprise Micro 5.3:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
          "SUSE Linux Enterprise Micro 5.4:kernel-default-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise Micro 5.4:kernel-default-5.14.21-150400.24.170.2.s390x",
          "SUSE Linux Enterprise Micro 5.4:kernel-default-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise Micro 5.4:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.aarch64",
          "SUSE Linux Enterprise Micro 5.4:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-64kb-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-64kb-devel-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-5.14.21-150400.24.170.2.ppc64le",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-5.14.21-150400.24.170.2.s390x",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.aarch64",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.ppc64le",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.170.2.ppc64le",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.170.2.s390x",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-devel-5.14.21-150400.24.170.1.noarch",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-docs-5.14.21-150400.24.170.1.noarch",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-macros-5.14.21-150400.24.170.1.noarch",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.170.2.ppc64le",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.170.2.s390x",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-source-5.14.21-150400.24.170.1.noarch",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.170.1.aarch64",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.170.1.ppc64le",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.170.1.s390x",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.170.1.x86_64",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-zfcpdump-5.14.21-150400.24.170.2.s390x",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.170.2.ppc64le",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.170.2.s390x",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-5.14.21-150400.24.170.2.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-devel-5.14.21-150400.24.170.2.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-devel-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-devel-5.14.21-150400.24.170.1.noarch",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-docs-5.14.21-150400.24.170.1.noarch",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-macros-5.14.21-150400.24.170.1.noarch",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-obs-build-5.14.21-150400.24.170.2.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-obs-build-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-source-5.14.21-150400.24.170.1.noarch",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-syms-5.14.21-150400.24.170.1.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-syms-5.14.21-150400.24.170.1.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.170.2.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.170.2.x86_64",
          "SUSE Manager Proxy 4.3:kernel-default-5.14.21-150400.24.170.2.x86_64",
          "SUSE Manager Proxy 4.3:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
          "SUSE Manager Proxy 4.3:kernel-default-devel-5.14.21-150400.24.170.2.x86_64",
          "SUSE Manager Proxy 4.3:kernel-devel-5.14.21-150400.24.170.1.noarch",
          "SUSE Manager Proxy 4.3:kernel-macros-5.14.21-150400.24.170.1.noarch",
          "SUSE Manager Proxy 4.3:kernel-source-5.14.21-150400.24.170.1.noarch",
          "SUSE Manager Proxy 4.3:kernel-syms-5.14.21-150400.24.170.1.x86_64",
          "SUSE Manager Server 4.3:kernel-default-5.14.21-150400.24.170.2.ppc64le",
          "SUSE Manager Server 4.3:kernel-default-5.14.21-150400.24.170.2.s390x",
          "SUSE Manager Server 4.3:kernel-default-5.14.21-150400.24.170.2.x86_64",
          "SUSE Manager Server 4.3:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.ppc64le",
          "SUSE Manager Server 4.3:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
          "SUSE Manager Server 4.3:kernel-default-devel-5.14.21-150400.24.170.2.ppc64le",
          "SUSE Manager Server 4.3:kernel-default-devel-5.14.21-150400.24.170.2.s390x",
          "SUSE Manager Server 4.3:kernel-default-devel-5.14.21-150400.24.170.2.x86_64",
          "SUSE Manager Server 4.3:kernel-devel-5.14.21-150400.24.170.1.noarch",
          "SUSE Manager Server 4.3:kernel-macros-5.14.21-150400.24.170.1.noarch",
          "SUSE Manager Server 4.3:kernel-source-5.14.21-150400.24.170.1.noarch",
          "SUSE Manager Server 4.3:kernel-syms-5.14.21-150400.24.170.1.ppc64le",
          "SUSE Manager Server 4.3:kernel-syms-5.14.21-150400.24.170.1.s390x",
          "SUSE Manager Server 4.3:kernel-syms-5.14.21-150400.24.170.1.x86_64",
          "SUSE Manager Server 4.3:kernel-zfcpdump-5.14.21-150400.24.170.2.s390x"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2022-50172",
          "url": "https://www.suse.com/security/cve/CVE-2022-50172"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1244764 for CVE-2022-50172",
          "url": "https://bugzilla.suse.com/1244764"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-64kb-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-64kb-devel-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-devel-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-devel-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-devel-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-docs-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-macros-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-obs-build-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-obs-build-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-source-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-syms-5.14.21-150400.24.170.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-syms-5.14.21-150400.24.170.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:reiserfs-kmp-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:reiserfs-kmp-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-64kb-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-64kb-devel-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-devel-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-docs-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-macros-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-source-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.170.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.170.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_170-default-1-150400.9.3.2.ppc64le",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_170-default-1-150400.9.3.2.s390x",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_170-default-1-150400.9.3.2.x86_64",
            "SUSE Linux Enterprise Micro 5.3:kernel-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise Micro 5.3:kernel-default-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise Micro 5.3:kernel-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Micro 5.3:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.aarch64",
            "SUSE Linux Enterprise Micro 5.3:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
            "SUSE Linux Enterprise Micro 5.4:kernel-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise Micro 5.4:kernel-default-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise Micro 5.4:kernel-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Micro 5.4:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.aarch64",
            "SUSE Linux Enterprise Micro 5.4:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-64kb-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-64kb-devel-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.aarch64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.ppc64le",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-devel-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-docs-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-macros-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-source-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.170.1.aarch64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.170.1.ppc64le",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.170.1.s390x",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.170.1.x86_64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-zfcpdump-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-devel-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-devel-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-devel-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-docs-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-macros-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-obs-build-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-obs-build-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-source-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-syms-5.14.21-150400.24.170.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-syms-5.14.21-150400.24.170.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Manager Proxy 4.3:kernel-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Manager Proxy 4.3:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
            "SUSE Manager Proxy 4.3:kernel-default-devel-5.14.21-150400.24.170.2.x86_64",
            "SUSE Manager Proxy 4.3:kernel-devel-5.14.21-150400.24.170.1.noarch",
            "SUSE Manager Proxy 4.3:kernel-macros-5.14.21-150400.24.170.1.noarch",
            "SUSE Manager Proxy 4.3:kernel-source-5.14.21-150400.24.170.1.noarch",
            "SUSE Manager Proxy 4.3:kernel-syms-5.14.21-150400.24.170.1.x86_64",
            "SUSE Manager Server 4.3:kernel-default-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Manager Server 4.3:kernel-default-5.14.21-150400.24.170.2.s390x",
            "SUSE Manager Server 4.3:kernel-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Manager Server 4.3:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.ppc64le",
            "SUSE Manager Server 4.3:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
            "SUSE Manager Server 4.3:kernel-default-devel-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Manager Server 4.3:kernel-default-devel-5.14.21-150400.24.170.2.s390x",
            "SUSE Manager Server 4.3:kernel-default-devel-5.14.21-150400.24.170.2.x86_64",
            "SUSE Manager Server 4.3:kernel-devel-5.14.21-150400.24.170.1.noarch",
            "SUSE Manager Server 4.3:kernel-macros-5.14.21-150400.24.170.1.noarch",
            "SUSE Manager Server 4.3:kernel-source-5.14.21-150400.24.170.1.noarch",
            "SUSE Manager Server 4.3:kernel-syms-5.14.21-150400.24.170.1.ppc64le",
            "SUSE Manager Server 4.3:kernel-syms-5.14.21-150400.24.170.1.s390x",
            "SUSE Manager Server 4.3:kernel-syms-5.14.21-150400.24.170.1.x86_64",
            "SUSE Manager Server 4.3:kernel-zfcpdump-5.14.21-150400.24.170.2.s390x"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 5.5,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
            "version": "3.1"
          },
          "products": [
            "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-64kb-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-64kb-devel-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-devel-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-devel-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-devel-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-docs-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-macros-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-obs-build-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-obs-build-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-source-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-syms-5.14.21-150400.24.170.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-syms-5.14.21-150400.24.170.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:reiserfs-kmp-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:reiserfs-kmp-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-64kb-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-64kb-devel-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-devel-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-docs-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-macros-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-source-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.170.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.170.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_170-default-1-150400.9.3.2.ppc64le",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_170-default-1-150400.9.3.2.s390x",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_170-default-1-150400.9.3.2.x86_64",
            "SUSE Linux Enterprise Micro 5.3:kernel-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise Micro 5.3:kernel-default-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise Micro 5.3:kernel-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Micro 5.3:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.aarch64",
            "SUSE Linux Enterprise Micro 5.3:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
            "SUSE Linux Enterprise Micro 5.4:kernel-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise Micro 5.4:kernel-default-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise Micro 5.4:kernel-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Micro 5.4:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.aarch64",
            "SUSE Linux Enterprise Micro 5.4:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-64kb-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-64kb-devel-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.aarch64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.ppc64le",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-devel-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-docs-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-macros-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-source-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.170.1.aarch64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.170.1.ppc64le",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.170.1.s390x",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.170.1.x86_64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-zfcpdump-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-devel-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-devel-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-devel-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-docs-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-macros-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-obs-build-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-obs-build-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-source-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-syms-5.14.21-150400.24.170.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-syms-5.14.21-150400.24.170.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Manager Proxy 4.3:kernel-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Manager Proxy 4.3:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
            "SUSE Manager Proxy 4.3:kernel-default-devel-5.14.21-150400.24.170.2.x86_64",
            "SUSE Manager Proxy 4.3:kernel-devel-5.14.21-150400.24.170.1.noarch",
            "SUSE Manager Proxy 4.3:kernel-macros-5.14.21-150400.24.170.1.noarch",
            "SUSE Manager Proxy 4.3:kernel-source-5.14.21-150400.24.170.1.noarch",
            "SUSE Manager Proxy 4.3:kernel-syms-5.14.21-150400.24.170.1.x86_64",
            "SUSE Manager Server 4.3:kernel-default-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Manager Server 4.3:kernel-default-5.14.21-150400.24.170.2.s390x",
            "SUSE Manager Server 4.3:kernel-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Manager Server 4.3:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.ppc64le",
            "SUSE Manager Server 4.3:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
            "SUSE Manager Server 4.3:kernel-default-devel-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Manager Server 4.3:kernel-default-devel-5.14.21-150400.24.170.2.s390x",
            "SUSE Manager Server 4.3:kernel-default-devel-5.14.21-150400.24.170.2.x86_64",
            "SUSE Manager Server 4.3:kernel-devel-5.14.21-150400.24.170.1.noarch",
            "SUSE Manager Server 4.3:kernel-macros-5.14.21-150400.24.170.1.noarch",
            "SUSE Manager Server 4.3:kernel-source-5.14.21-150400.24.170.1.noarch",
            "SUSE Manager Server 4.3:kernel-syms-5.14.21-150400.24.170.1.ppc64le",
            "SUSE Manager Server 4.3:kernel-syms-5.14.21-150400.24.170.1.s390x",
            "SUSE Manager Server 4.3:kernel-syms-5.14.21-150400.24.170.1.x86_64",
            "SUSE Manager Server 4.3:kernel-zfcpdump-5.14.21-150400.24.170.2.s390x"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2025-07-28T15:09:33Z",
          "details": "moderate"
        }
      ],
      "title": "CVE-2022-50172"
    },
    {
      "cve": "CVE-2022-50173",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2022-50173"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "In the Linux kernel, the following vulnerability has been resolved:\n\ndrm/msm/mdp5: Fix global state lock backoff\n\nWe need to grab the lock after the early return for !hwpipe case.\nOtherwise, we could have hit contention yet still returned 0.\n\nFixes an issue that the new CONFIG_DRM_DEBUG_MODESET_LOCK stuff flagged\nin CI:\n\n   WARNING: CPU: 0 PID: 282 at drivers/gpu/drm/drm_modeset_lock.c:296 drm_modeset_lock+0xf8/0x154\n   Modules linked in:\n   CPU: 0 PID: 282 Comm: kms_cursor_lega Tainted: G        W         5.19.0-rc2-15930-g875cc8bc536a #1\n   Hardware name: Qualcomm Technologies, Inc. DB820c (DT)\n   pstate: 60000005 (nZCv daif -PAN -UAO -TCO -DIT -SSBS BTYPE=--)\n   pc : drm_modeset_lock+0xf8/0x154\n   lr : drm_atomic_get_private_obj_state+0x84/0x170\n   sp : ffff80000cfab6a0\n   x29: ffff80000cfab6a0 x28: 0000000000000000 x27: ffff000083bc4d00\n   x26: 0000000000000038 x25: 0000000000000000 x24: ffff80000957ca58\n   x23: 0000000000000000 x22: ffff000081ace080 x21: 0000000000000001\n   x20: ffff000081acec18 x19: ffff80000cfabb80 x18: 0000000000000038\n   x17: 0000000000000000 x16: 0000000000000000 x15: fffffffffffea0d0\n   x14: 0000000000000000 x13: 284e4f5f4e524157 x12: 5f534b434f4c5f47\n   x11: ffff80000a386aa8 x10: 0000000000000029 x9 : ffff80000cfab610\n   x8 : 0000000000000029 x7 : 0000000000000014 x6 : 0000000000000000\n   x5 : 0000000000000001 x4 : ffff8000081ad904 x3 : 0000000000000029\n   x2 : ffff0000801db4c0 x1 : ffff80000cfabb80 x0 : ffff000081aceb58\n   Call trace:\n    drm_modeset_lock+0xf8/0x154\n    drm_atomic_get_private_obj_state+0x84/0x170\n    mdp5_get_global_state+0x54/0x6c\n    mdp5_pipe_release+0x2c/0xd4\n    mdp5_plane_atomic_check+0x2ec/0x414\n    drm_atomic_helper_check_planes+0xd8/0x210\n    drm_atomic_helper_check+0x54/0xb0\n    ...\n   ---[ end trace 0000000000000000 ]---\n   drm_modeset_lock attempting to lock a contended lock without backoff:\n      drm_modeset_lock+0x148/0x154\n      mdp5_get_global_state+0x30/0x6c\n      mdp5_pipe_release+0x2c/0xd4\n      mdp5_plane_atomic_check+0x290/0x414\n      drm_atomic_helper_check_planes+0xd8/0x210\n      drm_atomic_helper_check+0x54/0xb0\n      drm_atomic_check_only+0x4b0/0x8f4\n      drm_atomic_commit+0x68/0xe0\n\nPatchwork: https://patchwork.freedesktop.org/patch/492701/",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.170.2.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.170.2.s390x",
          "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.170.2.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.170.2.s390x",
          "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.170.2.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.170.2.s390x",
          "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.170.2.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.170.2.s390x",
          "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-64kb-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-64kb-devel-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-devel-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-devel-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-devel-5.14.21-150400.24.170.1.noarch",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-docs-5.14.21-150400.24.170.1.noarch",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-macros-5.14.21-150400.24.170.1.noarch",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-obs-build-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-obs-build-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-source-5.14.21-150400.24.170.1.noarch",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-syms-5.14.21-150400.24.170.1.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-syms-5.14.21-150400.24.170.1.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:reiserfs-kmp-default-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:reiserfs-kmp-default-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-64kb-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-64kb-devel-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-devel-5.14.21-150400.24.170.1.noarch",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-docs-5.14.21-150400.24.170.1.noarch",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-macros-5.14.21-150400.24.170.1.noarch",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-source-5.14.21-150400.24.170.1.noarch",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.170.1.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.170.1.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.170.2.ppc64le",
          "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.170.2.s390x",
          "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.170.2.ppc64le",
          "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.170.2.s390x",
          "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_170-default-1-150400.9.3.2.ppc64le",
          "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_170-default-1-150400.9.3.2.s390x",
          "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_170-default-1-150400.9.3.2.x86_64",
          "SUSE Linux Enterprise Micro 5.3:kernel-default-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise Micro 5.3:kernel-default-5.14.21-150400.24.170.2.s390x",
          "SUSE Linux Enterprise Micro 5.3:kernel-default-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise Micro 5.3:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.aarch64",
          "SUSE Linux Enterprise Micro 5.3:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
          "SUSE Linux Enterprise Micro 5.4:kernel-default-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise Micro 5.4:kernel-default-5.14.21-150400.24.170.2.s390x",
          "SUSE Linux Enterprise Micro 5.4:kernel-default-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise Micro 5.4:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.aarch64",
          "SUSE Linux Enterprise Micro 5.4:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-64kb-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-64kb-devel-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-5.14.21-150400.24.170.2.ppc64le",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-5.14.21-150400.24.170.2.s390x",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.aarch64",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.ppc64le",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.170.2.ppc64le",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.170.2.s390x",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-devel-5.14.21-150400.24.170.1.noarch",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-docs-5.14.21-150400.24.170.1.noarch",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-macros-5.14.21-150400.24.170.1.noarch",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.170.2.ppc64le",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.170.2.s390x",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-source-5.14.21-150400.24.170.1.noarch",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.170.1.aarch64",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.170.1.ppc64le",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.170.1.s390x",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.170.1.x86_64",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-zfcpdump-5.14.21-150400.24.170.2.s390x",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.170.2.ppc64le",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.170.2.s390x",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-5.14.21-150400.24.170.2.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-devel-5.14.21-150400.24.170.2.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-devel-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-devel-5.14.21-150400.24.170.1.noarch",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-docs-5.14.21-150400.24.170.1.noarch",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-macros-5.14.21-150400.24.170.1.noarch",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-obs-build-5.14.21-150400.24.170.2.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-obs-build-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-source-5.14.21-150400.24.170.1.noarch",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-syms-5.14.21-150400.24.170.1.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-syms-5.14.21-150400.24.170.1.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.170.2.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.170.2.x86_64",
          "SUSE Manager Proxy 4.3:kernel-default-5.14.21-150400.24.170.2.x86_64",
          "SUSE Manager Proxy 4.3:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
          "SUSE Manager Proxy 4.3:kernel-default-devel-5.14.21-150400.24.170.2.x86_64",
          "SUSE Manager Proxy 4.3:kernel-devel-5.14.21-150400.24.170.1.noarch",
          "SUSE Manager Proxy 4.3:kernel-macros-5.14.21-150400.24.170.1.noarch",
          "SUSE Manager Proxy 4.3:kernel-source-5.14.21-150400.24.170.1.noarch",
          "SUSE Manager Proxy 4.3:kernel-syms-5.14.21-150400.24.170.1.x86_64",
          "SUSE Manager Server 4.3:kernel-default-5.14.21-150400.24.170.2.ppc64le",
          "SUSE Manager Server 4.3:kernel-default-5.14.21-150400.24.170.2.s390x",
          "SUSE Manager Server 4.3:kernel-default-5.14.21-150400.24.170.2.x86_64",
          "SUSE Manager Server 4.3:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.ppc64le",
          "SUSE Manager Server 4.3:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
          "SUSE Manager Server 4.3:kernel-default-devel-5.14.21-150400.24.170.2.ppc64le",
          "SUSE Manager Server 4.3:kernel-default-devel-5.14.21-150400.24.170.2.s390x",
          "SUSE Manager Server 4.3:kernel-default-devel-5.14.21-150400.24.170.2.x86_64",
          "SUSE Manager Server 4.3:kernel-devel-5.14.21-150400.24.170.1.noarch",
          "SUSE Manager Server 4.3:kernel-macros-5.14.21-150400.24.170.1.noarch",
          "SUSE Manager Server 4.3:kernel-source-5.14.21-150400.24.170.1.noarch",
          "SUSE Manager Server 4.3:kernel-syms-5.14.21-150400.24.170.1.ppc64le",
          "SUSE Manager Server 4.3:kernel-syms-5.14.21-150400.24.170.1.s390x",
          "SUSE Manager Server 4.3:kernel-syms-5.14.21-150400.24.170.1.x86_64",
          "SUSE Manager Server 4.3:kernel-zfcpdump-5.14.21-150400.24.170.2.s390x"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2022-50173",
          "url": "https://www.suse.com/security/cve/CVE-2022-50173"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1244992 for CVE-2022-50173",
          "url": "https://bugzilla.suse.com/1244992"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-64kb-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-64kb-devel-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-devel-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-devel-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-devel-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-docs-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-macros-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-obs-build-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-obs-build-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-source-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-syms-5.14.21-150400.24.170.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-syms-5.14.21-150400.24.170.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:reiserfs-kmp-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:reiserfs-kmp-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-64kb-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-64kb-devel-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-devel-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-docs-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-macros-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-source-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.170.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.170.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_170-default-1-150400.9.3.2.ppc64le",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_170-default-1-150400.9.3.2.s390x",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_170-default-1-150400.9.3.2.x86_64",
            "SUSE Linux Enterprise Micro 5.3:kernel-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise Micro 5.3:kernel-default-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise Micro 5.3:kernel-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Micro 5.3:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.aarch64",
            "SUSE Linux Enterprise Micro 5.3:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
            "SUSE Linux Enterprise Micro 5.4:kernel-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise Micro 5.4:kernel-default-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise Micro 5.4:kernel-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Micro 5.4:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.aarch64",
            "SUSE Linux Enterprise Micro 5.4:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-64kb-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-64kb-devel-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.aarch64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.ppc64le",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-devel-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-docs-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-macros-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-source-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.170.1.aarch64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.170.1.ppc64le",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.170.1.s390x",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.170.1.x86_64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-zfcpdump-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-devel-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-devel-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-devel-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-docs-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-macros-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-obs-build-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-obs-build-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-source-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-syms-5.14.21-150400.24.170.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-syms-5.14.21-150400.24.170.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Manager Proxy 4.3:kernel-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Manager Proxy 4.3:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
            "SUSE Manager Proxy 4.3:kernel-default-devel-5.14.21-150400.24.170.2.x86_64",
            "SUSE Manager Proxy 4.3:kernel-devel-5.14.21-150400.24.170.1.noarch",
            "SUSE Manager Proxy 4.3:kernel-macros-5.14.21-150400.24.170.1.noarch",
            "SUSE Manager Proxy 4.3:kernel-source-5.14.21-150400.24.170.1.noarch",
            "SUSE Manager Proxy 4.3:kernel-syms-5.14.21-150400.24.170.1.x86_64",
            "SUSE Manager Server 4.3:kernel-default-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Manager Server 4.3:kernel-default-5.14.21-150400.24.170.2.s390x",
            "SUSE Manager Server 4.3:kernel-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Manager Server 4.3:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.ppc64le",
            "SUSE Manager Server 4.3:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
            "SUSE Manager Server 4.3:kernel-default-devel-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Manager Server 4.3:kernel-default-devel-5.14.21-150400.24.170.2.s390x",
            "SUSE Manager Server 4.3:kernel-default-devel-5.14.21-150400.24.170.2.x86_64",
            "SUSE Manager Server 4.3:kernel-devel-5.14.21-150400.24.170.1.noarch",
            "SUSE Manager Server 4.3:kernel-macros-5.14.21-150400.24.170.1.noarch",
            "SUSE Manager Server 4.3:kernel-source-5.14.21-150400.24.170.1.noarch",
            "SUSE Manager Server 4.3:kernel-syms-5.14.21-150400.24.170.1.ppc64le",
            "SUSE Manager Server 4.3:kernel-syms-5.14.21-150400.24.170.1.s390x",
            "SUSE Manager Server 4.3:kernel-syms-5.14.21-150400.24.170.1.x86_64",
            "SUSE Manager Server 4.3:kernel-zfcpdump-5.14.21-150400.24.170.2.s390x"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 5.5,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
            "version": "3.1"
          },
          "products": [
            "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-64kb-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-64kb-devel-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-devel-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-devel-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-devel-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-docs-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-macros-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-obs-build-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-obs-build-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-source-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-syms-5.14.21-150400.24.170.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-syms-5.14.21-150400.24.170.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:reiserfs-kmp-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:reiserfs-kmp-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-64kb-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-64kb-devel-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-devel-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-docs-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-macros-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-source-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.170.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.170.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_170-default-1-150400.9.3.2.ppc64le",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_170-default-1-150400.9.3.2.s390x",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_170-default-1-150400.9.3.2.x86_64",
            "SUSE Linux Enterprise Micro 5.3:kernel-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise Micro 5.3:kernel-default-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise Micro 5.3:kernel-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Micro 5.3:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.aarch64",
            "SUSE Linux Enterprise Micro 5.3:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
            "SUSE Linux Enterprise Micro 5.4:kernel-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise Micro 5.4:kernel-default-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise Micro 5.4:kernel-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Micro 5.4:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.aarch64",
            "SUSE Linux Enterprise Micro 5.4:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-64kb-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-64kb-devel-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.aarch64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.ppc64le",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-devel-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-docs-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-macros-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-source-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.170.1.aarch64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.170.1.ppc64le",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.170.1.s390x",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.170.1.x86_64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-zfcpdump-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-devel-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-devel-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-devel-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-docs-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-macros-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-obs-build-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-obs-build-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-source-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-syms-5.14.21-150400.24.170.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-syms-5.14.21-150400.24.170.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Manager Proxy 4.3:kernel-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Manager Proxy 4.3:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
            "SUSE Manager Proxy 4.3:kernel-default-devel-5.14.21-150400.24.170.2.x86_64",
            "SUSE Manager Proxy 4.3:kernel-devel-5.14.21-150400.24.170.1.noarch",
            "SUSE Manager Proxy 4.3:kernel-macros-5.14.21-150400.24.170.1.noarch",
            "SUSE Manager Proxy 4.3:kernel-source-5.14.21-150400.24.170.1.noarch",
            "SUSE Manager Proxy 4.3:kernel-syms-5.14.21-150400.24.170.1.x86_64",
            "SUSE Manager Server 4.3:kernel-default-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Manager Server 4.3:kernel-default-5.14.21-150400.24.170.2.s390x",
            "SUSE Manager Server 4.3:kernel-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Manager Server 4.3:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.ppc64le",
            "SUSE Manager Server 4.3:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
            "SUSE Manager Server 4.3:kernel-default-devel-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Manager Server 4.3:kernel-default-devel-5.14.21-150400.24.170.2.s390x",
            "SUSE Manager Server 4.3:kernel-default-devel-5.14.21-150400.24.170.2.x86_64",
            "SUSE Manager Server 4.3:kernel-devel-5.14.21-150400.24.170.1.noarch",
            "SUSE Manager Server 4.3:kernel-macros-5.14.21-150400.24.170.1.noarch",
            "SUSE Manager Server 4.3:kernel-source-5.14.21-150400.24.170.1.noarch",
            "SUSE Manager Server 4.3:kernel-syms-5.14.21-150400.24.170.1.ppc64le",
            "SUSE Manager Server 4.3:kernel-syms-5.14.21-150400.24.170.1.s390x",
            "SUSE Manager Server 4.3:kernel-syms-5.14.21-150400.24.170.1.x86_64",
            "SUSE Manager Server 4.3:kernel-zfcpdump-5.14.21-150400.24.170.2.s390x"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2025-07-28T15:09:33Z",
          "details": "moderate"
        }
      ],
      "title": "CVE-2022-50173"
    },
    {
      "cve": "CVE-2022-50175",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2022-50175"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "In the Linux kernel, the following vulnerability has been resolved:\n\nmedia: tw686x: Fix memory leak in tw686x_video_init\n\nvideo_device_alloc() allocates memory for vdev,\nwhen video_register_device() fails, it doesn\u0027t release the memory and\nleads to memory leak, call video_device_release() to fix this.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.170.2.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.170.2.s390x",
          "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.170.2.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.170.2.s390x",
          "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.170.2.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.170.2.s390x",
          "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.170.2.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.170.2.s390x",
          "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-64kb-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-64kb-devel-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-devel-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-devel-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-devel-5.14.21-150400.24.170.1.noarch",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-docs-5.14.21-150400.24.170.1.noarch",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-macros-5.14.21-150400.24.170.1.noarch",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-obs-build-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-obs-build-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-source-5.14.21-150400.24.170.1.noarch",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-syms-5.14.21-150400.24.170.1.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-syms-5.14.21-150400.24.170.1.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:reiserfs-kmp-default-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:reiserfs-kmp-default-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-64kb-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-64kb-devel-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-devel-5.14.21-150400.24.170.1.noarch",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-docs-5.14.21-150400.24.170.1.noarch",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-macros-5.14.21-150400.24.170.1.noarch",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-source-5.14.21-150400.24.170.1.noarch",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.170.1.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.170.1.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.170.2.ppc64le",
          "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.170.2.s390x",
          "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.170.2.ppc64le",
          "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.170.2.s390x",
          "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_170-default-1-150400.9.3.2.ppc64le",
          "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_170-default-1-150400.9.3.2.s390x",
          "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_170-default-1-150400.9.3.2.x86_64",
          "SUSE Linux Enterprise Micro 5.3:kernel-default-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise Micro 5.3:kernel-default-5.14.21-150400.24.170.2.s390x",
          "SUSE Linux Enterprise Micro 5.3:kernel-default-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise Micro 5.3:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.aarch64",
          "SUSE Linux Enterprise Micro 5.3:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
          "SUSE Linux Enterprise Micro 5.4:kernel-default-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise Micro 5.4:kernel-default-5.14.21-150400.24.170.2.s390x",
          "SUSE Linux Enterprise Micro 5.4:kernel-default-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise Micro 5.4:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.aarch64",
          "SUSE Linux Enterprise Micro 5.4:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-64kb-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-64kb-devel-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-5.14.21-150400.24.170.2.ppc64le",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-5.14.21-150400.24.170.2.s390x",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.aarch64",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.ppc64le",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.170.2.ppc64le",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.170.2.s390x",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-devel-5.14.21-150400.24.170.1.noarch",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-docs-5.14.21-150400.24.170.1.noarch",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-macros-5.14.21-150400.24.170.1.noarch",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.170.2.ppc64le",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.170.2.s390x",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-source-5.14.21-150400.24.170.1.noarch",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.170.1.aarch64",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.170.1.ppc64le",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.170.1.s390x",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.170.1.x86_64",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-zfcpdump-5.14.21-150400.24.170.2.s390x",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.170.2.ppc64le",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.170.2.s390x",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-5.14.21-150400.24.170.2.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-devel-5.14.21-150400.24.170.2.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-devel-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-devel-5.14.21-150400.24.170.1.noarch",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-docs-5.14.21-150400.24.170.1.noarch",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-macros-5.14.21-150400.24.170.1.noarch",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-obs-build-5.14.21-150400.24.170.2.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-obs-build-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-source-5.14.21-150400.24.170.1.noarch",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-syms-5.14.21-150400.24.170.1.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-syms-5.14.21-150400.24.170.1.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.170.2.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.170.2.x86_64",
          "SUSE Manager Proxy 4.3:kernel-default-5.14.21-150400.24.170.2.x86_64",
          "SUSE Manager Proxy 4.3:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
          "SUSE Manager Proxy 4.3:kernel-default-devel-5.14.21-150400.24.170.2.x86_64",
          "SUSE Manager Proxy 4.3:kernel-devel-5.14.21-150400.24.170.1.noarch",
          "SUSE Manager Proxy 4.3:kernel-macros-5.14.21-150400.24.170.1.noarch",
          "SUSE Manager Proxy 4.3:kernel-source-5.14.21-150400.24.170.1.noarch",
          "SUSE Manager Proxy 4.3:kernel-syms-5.14.21-150400.24.170.1.x86_64",
          "SUSE Manager Server 4.3:kernel-default-5.14.21-150400.24.170.2.ppc64le",
          "SUSE Manager Server 4.3:kernel-default-5.14.21-150400.24.170.2.s390x",
          "SUSE Manager Server 4.3:kernel-default-5.14.21-150400.24.170.2.x86_64",
          "SUSE Manager Server 4.3:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.ppc64le",
          "SUSE Manager Server 4.3:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
          "SUSE Manager Server 4.3:kernel-default-devel-5.14.21-150400.24.170.2.ppc64le",
          "SUSE Manager Server 4.3:kernel-default-devel-5.14.21-150400.24.170.2.s390x",
          "SUSE Manager Server 4.3:kernel-default-devel-5.14.21-150400.24.170.2.x86_64",
          "SUSE Manager Server 4.3:kernel-devel-5.14.21-150400.24.170.1.noarch",
          "SUSE Manager Server 4.3:kernel-macros-5.14.21-150400.24.170.1.noarch",
          "SUSE Manager Server 4.3:kernel-source-5.14.21-150400.24.170.1.noarch",
          "SUSE Manager Server 4.3:kernel-syms-5.14.21-150400.24.170.1.ppc64le",
          "SUSE Manager Server 4.3:kernel-syms-5.14.21-150400.24.170.1.s390x",
          "SUSE Manager Server 4.3:kernel-syms-5.14.21-150400.24.170.1.x86_64",
          "SUSE Manager Server 4.3:kernel-zfcpdump-5.14.21-150400.24.170.2.s390x"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2022-50175",
          "url": "https://www.suse.com/security/cve/CVE-2022-50175"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1244903 for CVE-2022-50175",
          "url": "https://bugzilla.suse.com/1244903"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-64kb-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-64kb-devel-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-devel-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-devel-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-devel-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-docs-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-macros-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-obs-build-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-obs-build-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-source-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-syms-5.14.21-150400.24.170.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-syms-5.14.21-150400.24.170.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:reiserfs-kmp-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:reiserfs-kmp-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-64kb-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-64kb-devel-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-devel-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-docs-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-macros-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-source-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.170.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.170.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_170-default-1-150400.9.3.2.ppc64le",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_170-default-1-150400.9.3.2.s390x",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_170-default-1-150400.9.3.2.x86_64",
            "SUSE Linux Enterprise Micro 5.3:kernel-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise Micro 5.3:kernel-default-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise Micro 5.3:kernel-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Micro 5.3:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.aarch64",
            "SUSE Linux Enterprise Micro 5.3:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
            "SUSE Linux Enterprise Micro 5.4:kernel-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise Micro 5.4:kernel-default-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise Micro 5.4:kernel-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Micro 5.4:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.aarch64",
            "SUSE Linux Enterprise Micro 5.4:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-64kb-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-64kb-devel-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.aarch64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.ppc64le",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-devel-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-docs-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-macros-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-source-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.170.1.aarch64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.170.1.ppc64le",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.170.1.s390x",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.170.1.x86_64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-zfcpdump-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-devel-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-devel-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-devel-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-docs-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-macros-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-obs-build-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-obs-build-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-source-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-syms-5.14.21-150400.24.170.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-syms-5.14.21-150400.24.170.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Manager Proxy 4.3:kernel-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Manager Proxy 4.3:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
            "SUSE Manager Proxy 4.3:kernel-default-devel-5.14.21-150400.24.170.2.x86_64",
            "SUSE Manager Proxy 4.3:kernel-devel-5.14.21-150400.24.170.1.noarch",
            "SUSE Manager Proxy 4.3:kernel-macros-5.14.21-150400.24.170.1.noarch",
            "SUSE Manager Proxy 4.3:kernel-source-5.14.21-150400.24.170.1.noarch",
            "SUSE Manager Proxy 4.3:kernel-syms-5.14.21-150400.24.170.1.x86_64",
            "SUSE Manager Server 4.3:kernel-default-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Manager Server 4.3:kernel-default-5.14.21-150400.24.170.2.s390x",
            "SUSE Manager Server 4.3:kernel-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Manager Server 4.3:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.ppc64le",
            "SUSE Manager Server 4.3:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
            "SUSE Manager Server 4.3:kernel-default-devel-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Manager Server 4.3:kernel-default-devel-5.14.21-150400.24.170.2.s390x",
            "SUSE Manager Server 4.3:kernel-default-devel-5.14.21-150400.24.170.2.x86_64",
            "SUSE Manager Server 4.3:kernel-devel-5.14.21-150400.24.170.1.noarch",
            "SUSE Manager Server 4.3:kernel-macros-5.14.21-150400.24.170.1.noarch",
            "SUSE Manager Server 4.3:kernel-source-5.14.21-150400.24.170.1.noarch",
            "SUSE Manager Server 4.3:kernel-syms-5.14.21-150400.24.170.1.ppc64le",
            "SUSE Manager Server 4.3:kernel-syms-5.14.21-150400.24.170.1.s390x",
            "SUSE Manager Server 4.3:kernel-syms-5.14.21-150400.24.170.1.x86_64",
            "SUSE Manager Server 4.3:kernel-zfcpdump-5.14.21-150400.24.170.2.s390x"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 5.5,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
            "version": "3.1"
          },
          "products": [
            "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-64kb-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-64kb-devel-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-devel-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-devel-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-devel-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-docs-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-macros-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-obs-build-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-obs-build-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-source-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-syms-5.14.21-150400.24.170.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-syms-5.14.21-150400.24.170.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:reiserfs-kmp-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:reiserfs-kmp-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-64kb-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-64kb-devel-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-devel-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-docs-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-macros-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-source-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.170.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.170.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_170-default-1-150400.9.3.2.ppc64le",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_170-default-1-150400.9.3.2.s390x",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_170-default-1-150400.9.3.2.x86_64",
            "SUSE Linux Enterprise Micro 5.3:kernel-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise Micro 5.3:kernel-default-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise Micro 5.3:kernel-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Micro 5.3:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.aarch64",
            "SUSE Linux Enterprise Micro 5.3:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
            "SUSE Linux Enterprise Micro 5.4:kernel-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise Micro 5.4:kernel-default-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise Micro 5.4:kernel-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Micro 5.4:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.aarch64",
            "SUSE Linux Enterprise Micro 5.4:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-64kb-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-64kb-devel-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.aarch64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.ppc64le",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-devel-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-docs-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-macros-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-source-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.170.1.aarch64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.170.1.ppc64le",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.170.1.s390x",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.170.1.x86_64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-zfcpdump-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-devel-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-devel-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-devel-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-docs-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-macros-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-obs-build-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-obs-build-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-source-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-syms-5.14.21-150400.24.170.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-syms-5.14.21-150400.24.170.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Manager Proxy 4.3:kernel-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Manager Proxy 4.3:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
            "SUSE Manager Proxy 4.3:kernel-default-devel-5.14.21-150400.24.170.2.x86_64",
            "SUSE Manager Proxy 4.3:kernel-devel-5.14.21-150400.24.170.1.noarch",
            "SUSE Manager Proxy 4.3:kernel-macros-5.14.21-150400.24.170.1.noarch",
            "SUSE Manager Proxy 4.3:kernel-source-5.14.21-150400.24.170.1.noarch",
            "SUSE Manager Proxy 4.3:kernel-syms-5.14.21-150400.24.170.1.x86_64",
            "SUSE Manager Server 4.3:kernel-default-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Manager Server 4.3:kernel-default-5.14.21-150400.24.170.2.s390x",
            "SUSE Manager Server 4.3:kernel-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Manager Server 4.3:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.ppc64le",
            "SUSE Manager Server 4.3:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
            "SUSE Manager Server 4.3:kernel-default-devel-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Manager Server 4.3:kernel-default-devel-5.14.21-150400.24.170.2.s390x",
            "SUSE Manager Server 4.3:kernel-default-devel-5.14.21-150400.24.170.2.x86_64",
            "SUSE Manager Server 4.3:kernel-devel-5.14.21-150400.24.170.1.noarch",
            "SUSE Manager Server 4.3:kernel-macros-5.14.21-150400.24.170.1.noarch",
            "SUSE Manager Server 4.3:kernel-source-5.14.21-150400.24.170.1.noarch",
            "SUSE Manager Server 4.3:kernel-syms-5.14.21-150400.24.170.1.ppc64le",
            "SUSE Manager Server 4.3:kernel-syms-5.14.21-150400.24.170.1.s390x",
            "SUSE Manager Server 4.3:kernel-syms-5.14.21-150400.24.170.1.x86_64",
            "SUSE Manager Server 4.3:kernel-zfcpdump-5.14.21-150400.24.170.2.s390x"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2025-07-28T15:09:33Z",
          "details": "moderate"
        }
      ],
      "title": "CVE-2022-50175"
    },
    {
      "cve": "CVE-2022-50176",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2022-50176"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "In the Linux kernel, the following vulnerability has been resolved:\n\ndrm/mcde: Fix refcount leak in mcde_dsi_bind\n\nEvery iteration of for_each_available_child_of_node() decrements\nthe reference counter of the previous node. There is no decrement\nwhen break out from the loop and results in refcount leak.\nAdd missing of_node_put() to fix this.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.170.2.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.170.2.s390x",
          "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.170.2.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.170.2.s390x",
          "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.170.2.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.170.2.s390x",
          "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.170.2.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.170.2.s390x",
          "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-64kb-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-64kb-devel-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-devel-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-devel-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-devel-5.14.21-150400.24.170.1.noarch",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-docs-5.14.21-150400.24.170.1.noarch",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-macros-5.14.21-150400.24.170.1.noarch",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-obs-build-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-obs-build-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-source-5.14.21-150400.24.170.1.noarch",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-syms-5.14.21-150400.24.170.1.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-syms-5.14.21-150400.24.170.1.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:reiserfs-kmp-default-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:reiserfs-kmp-default-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-64kb-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-64kb-devel-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-devel-5.14.21-150400.24.170.1.noarch",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-docs-5.14.21-150400.24.170.1.noarch",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-macros-5.14.21-150400.24.170.1.noarch",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-source-5.14.21-150400.24.170.1.noarch",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.170.1.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.170.1.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.170.2.ppc64le",
          "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.170.2.s390x",
          "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.170.2.ppc64le",
          "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.170.2.s390x",
          "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_170-default-1-150400.9.3.2.ppc64le",
          "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_170-default-1-150400.9.3.2.s390x",
          "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_170-default-1-150400.9.3.2.x86_64",
          "SUSE Linux Enterprise Micro 5.3:kernel-default-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise Micro 5.3:kernel-default-5.14.21-150400.24.170.2.s390x",
          "SUSE Linux Enterprise Micro 5.3:kernel-default-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise Micro 5.3:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.aarch64",
          "SUSE Linux Enterprise Micro 5.3:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
          "SUSE Linux Enterprise Micro 5.4:kernel-default-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise Micro 5.4:kernel-default-5.14.21-150400.24.170.2.s390x",
          "SUSE Linux Enterprise Micro 5.4:kernel-default-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise Micro 5.4:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.aarch64",
          "SUSE Linux Enterprise Micro 5.4:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-64kb-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-64kb-devel-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-5.14.21-150400.24.170.2.ppc64le",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-5.14.21-150400.24.170.2.s390x",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.aarch64",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.ppc64le",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.170.2.ppc64le",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.170.2.s390x",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-devel-5.14.21-150400.24.170.1.noarch",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-docs-5.14.21-150400.24.170.1.noarch",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-macros-5.14.21-150400.24.170.1.noarch",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.170.2.ppc64le",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.170.2.s390x",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-source-5.14.21-150400.24.170.1.noarch",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.170.1.aarch64",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.170.1.ppc64le",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.170.1.s390x",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.170.1.x86_64",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-zfcpdump-5.14.21-150400.24.170.2.s390x",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.170.2.ppc64le",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.170.2.s390x",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-5.14.21-150400.24.170.2.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-devel-5.14.21-150400.24.170.2.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-devel-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-devel-5.14.21-150400.24.170.1.noarch",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-docs-5.14.21-150400.24.170.1.noarch",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-macros-5.14.21-150400.24.170.1.noarch",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-obs-build-5.14.21-150400.24.170.2.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-obs-build-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-source-5.14.21-150400.24.170.1.noarch",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-syms-5.14.21-150400.24.170.1.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-syms-5.14.21-150400.24.170.1.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.170.2.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.170.2.x86_64",
          "SUSE Manager Proxy 4.3:kernel-default-5.14.21-150400.24.170.2.x86_64",
          "SUSE Manager Proxy 4.3:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
          "SUSE Manager Proxy 4.3:kernel-default-devel-5.14.21-150400.24.170.2.x86_64",
          "SUSE Manager Proxy 4.3:kernel-devel-5.14.21-150400.24.170.1.noarch",
          "SUSE Manager Proxy 4.3:kernel-macros-5.14.21-150400.24.170.1.noarch",
          "SUSE Manager Proxy 4.3:kernel-source-5.14.21-150400.24.170.1.noarch",
          "SUSE Manager Proxy 4.3:kernel-syms-5.14.21-150400.24.170.1.x86_64",
          "SUSE Manager Server 4.3:kernel-default-5.14.21-150400.24.170.2.ppc64le",
          "SUSE Manager Server 4.3:kernel-default-5.14.21-150400.24.170.2.s390x",
          "SUSE Manager Server 4.3:kernel-default-5.14.21-150400.24.170.2.x86_64",
          "SUSE Manager Server 4.3:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.ppc64le",
          "SUSE Manager Server 4.3:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
          "SUSE Manager Server 4.3:kernel-default-devel-5.14.21-150400.24.170.2.ppc64le",
          "SUSE Manager Server 4.3:kernel-default-devel-5.14.21-150400.24.170.2.s390x",
          "SUSE Manager Server 4.3:kernel-default-devel-5.14.21-150400.24.170.2.x86_64",
          "SUSE Manager Server 4.3:kernel-devel-5.14.21-150400.24.170.1.noarch",
          "SUSE Manager Server 4.3:kernel-macros-5.14.21-150400.24.170.1.noarch",
          "SUSE Manager Server 4.3:kernel-source-5.14.21-150400.24.170.1.noarch",
          "SUSE Manager Server 4.3:kernel-syms-5.14.21-150400.24.170.1.ppc64le",
          "SUSE Manager Server 4.3:kernel-syms-5.14.21-150400.24.170.1.s390x",
          "SUSE Manager Server 4.3:kernel-syms-5.14.21-150400.24.170.1.x86_64",
          "SUSE Manager Server 4.3:kernel-zfcpdump-5.14.21-150400.24.170.2.s390x"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2022-50176",
          "url": "https://www.suse.com/security/cve/CVE-2022-50176"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1244902 for CVE-2022-50176",
          "url": "https://bugzilla.suse.com/1244902"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-64kb-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-64kb-devel-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-devel-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-devel-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-devel-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-docs-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-macros-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-obs-build-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-obs-build-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-source-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-syms-5.14.21-150400.24.170.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-syms-5.14.21-150400.24.170.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:reiserfs-kmp-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:reiserfs-kmp-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-64kb-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-64kb-devel-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-devel-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-docs-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-macros-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-source-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.170.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.170.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_170-default-1-150400.9.3.2.ppc64le",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_170-default-1-150400.9.3.2.s390x",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_170-default-1-150400.9.3.2.x86_64",
            "SUSE Linux Enterprise Micro 5.3:kernel-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise Micro 5.3:kernel-default-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise Micro 5.3:kernel-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Micro 5.3:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.aarch64",
            "SUSE Linux Enterprise Micro 5.3:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
            "SUSE Linux Enterprise Micro 5.4:kernel-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise Micro 5.4:kernel-default-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise Micro 5.4:kernel-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Micro 5.4:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.aarch64",
            "SUSE Linux Enterprise Micro 5.4:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-64kb-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-64kb-devel-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.aarch64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.ppc64le",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-devel-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-docs-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-macros-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-source-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.170.1.aarch64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.170.1.ppc64le",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.170.1.s390x",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.170.1.x86_64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-zfcpdump-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-devel-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-devel-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-devel-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-docs-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-macros-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-obs-build-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-obs-build-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-source-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-syms-5.14.21-150400.24.170.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-syms-5.14.21-150400.24.170.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Manager Proxy 4.3:kernel-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Manager Proxy 4.3:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
            "SUSE Manager Proxy 4.3:kernel-default-devel-5.14.21-150400.24.170.2.x86_64",
            "SUSE Manager Proxy 4.3:kernel-devel-5.14.21-150400.24.170.1.noarch",
            "SUSE Manager Proxy 4.3:kernel-macros-5.14.21-150400.24.170.1.noarch",
            "SUSE Manager Proxy 4.3:kernel-source-5.14.21-150400.24.170.1.noarch",
            "SUSE Manager Proxy 4.3:kernel-syms-5.14.21-150400.24.170.1.x86_64",
            "SUSE Manager Server 4.3:kernel-default-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Manager Server 4.3:kernel-default-5.14.21-150400.24.170.2.s390x",
            "SUSE Manager Server 4.3:kernel-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Manager Server 4.3:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.ppc64le",
            "SUSE Manager Server 4.3:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
            "SUSE Manager Server 4.3:kernel-default-devel-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Manager Server 4.3:kernel-default-devel-5.14.21-150400.24.170.2.s390x",
            "SUSE Manager Server 4.3:kernel-default-devel-5.14.21-150400.24.170.2.x86_64",
            "SUSE Manager Server 4.3:kernel-devel-5.14.21-150400.24.170.1.noarch",
            "SUSE Manager Server 4.3:kernel-macros-5.14.21-150400.24.170.1.noarch",
            "SUSE Manager Server 4.3:kernel-source-5.14.21-150400.24.170.1.noarch",
            "SUSE Manager Server 4.3:kernel-syms-5.14.21-150400.24.170.1.ppc64le",
            "SUSE Manager Server 4.3:kernel-syms-5.14.21-150400.24.170.1.s390x",
            "SUSE Manager Server 4.3:kernel-syms-5.14.21-150400.24.170.1.x86_64",
            "SUSE Manager Server 4.3:kernel-zfcpdump-5.14.21-150400.24.170.2.s390x"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 5.5,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
            "version": "3.1"
          },
          "products": [
            "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-64kb-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-64kb-devel-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-devel-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-devel-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-devel-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-docs-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-macros-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-obs-build-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-obs-build-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-source-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-syms-5.14.21-150400.24.170.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-syms-5.14.21-150400.24.170.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:reiserfs-kmp-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:reiserfs-kmp-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-64kb-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-64kb-devel-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-devel-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-docs-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-macros-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-source-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.170.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.170.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_170-default-1-150400.9.3.2.ppc64le",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_170-default-1-150400.9.3.2.s390x",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_170-default-1-150400.9.3.2.x86_64",
            "SUSE Linux Enterprise Micro 5.3:kernel-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise Micro 5.3:kernel-default-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise Micro 5.3:kernel-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Micro 5.3:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.aarch64",
            "SUSE Linux Enterprise Micro 5.3:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
            "SUSE Linux Enterprise Micro 5.4:kernel-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise Micro 5.4:kernel-default-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise Micro 5.4:kernel-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Micro 5.4:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.aarch64",
            "SUSE Linux Enterprise Micro 5.4:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-64kb-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-64kb-devel-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.aarch64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.ppc64le",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-devel-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-docs-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-macros-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-source-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.170.1.aarch64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.170.1.ppc64le",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.170.1.s390x",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.170.1.x86_64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-zfcpdump-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-devel-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-devel-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-devel-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-docs-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-macros-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-obs-build-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-obs-build-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-source-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-syms-5.14.21-150400.24.170.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-syms-5.14.21-150400.24.170.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Manager Proxy 4.3:kernel-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Manager Proxy 4.3:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
            "SUSE Manager Proxy 4.3:kernel-default-devel-5.14.21-150400.24.170.2.x86_64",
            "SUSE Manager Proxy 4.3:kernel-devel-5.14.21-150400.24.170.1.noarch",
            "SUSE Manager Proxy 4.3:kernel-macros-5.14.21-150400.24.170.1.noarch",
            "SUSE Manager Proxy 4.3:kernel-source-5.14.21-150400.24.170.1.noarch",
            "SUSE Manager Proxy 4.3:kernel-syms-5.14.21-150400.24.170.1.x86_64",
            "SUSE Manager Server 4.3:kernel-default-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Manager Server 4.3:kernel-default-5.14.21-150400.24.170.2.s390x",
            "SUSE Manager Server 4.3:kernel-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Manager Server 4.3:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.ppc64le",
            "SUSE Manager Server 4.3:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
            "SUSE Manager Server 4.3:kernel-default-devel-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Manager Server 4.3:kernel-default-devel-5.14.21-150400.24.170.2.s390x",
            "SUSE Manager Server 4.3:kernel-default-devel-5.14.21-150400.24.170.2.x86_64",
            "SUSE Manager Server 4.3:kernel-devel-5.14.21-150400.24.170.1.noarch",
            "SUSE Manager Server 4.3:kernel-macros-5.14.21-150400.24.170.1.noarch",
            "SUSE Manager Server 4.3:kernel-source-5.14.21-150400.24.170.1.noarch",
            "SUSE Manager Server 4.3:kernel-syms-5.14.21-150400.24.170.1.ppc64le",
            "SUSE Manager Server 4.3:kernel-syms-5.14.21-150400.24.170.1.s390x",
            "SUSE Manager Server 4.3:kernel-syms-5.14.21-150400.24.170.1.x86_64",
            "SUSE Manager Server 4.3:kernel-zfcpdump-5.14.21-150400.24.170.2.s390x"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2025-07-28T15:09:33Z",
          "details": "moderate"
        }
      ],
      "title": "CVE-2022-50176"
    },
    {
      "cve": "CVE-2022-50178",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2022-50178"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "In the Linux kernel, the following vulnerability has been resolved:\n\nwifi: rtw89: 8852a: rfk: fix div 0 exception\n\nThe DPK is a kind of RF calibration whose algorithm is to fine tune\nparameters and calibrate, and check the result. If the result isn\u0027t good\nenough, it could adjust parameters and try again.\n\nThis issue is to read and show the result, but it could be a negative\ncalibration result that causes divisor 0 and core dump. So, fix it by\nphy_div() that does division only if divisor isn\u0027t zero; otherwise,\nzero is adopted.\n\n  divide error: 0000 [#1] PREEMPT SMP NOPTI\n  CPU: 1 PID: 728 Comm: wpa_supplicant Not tainted 5.10.114-16019-g462a1661811a #1 \u003cHASH:d024 28\u003e\n  RIP: 0010:rtw8852a_dpk+0x14ae/0x288f [rtw89_core]\n  RSP: 0018:ffffa9bb412a7520 EFLAGS: 00010246\n  RAX: 0000000000000000 RBX: 0000000000000000 RCX: 0000000000000000\n  RDX: 0000000000000000 RSI: 00000000000180fc RDI: ffffa141d01023c0\n  RBP: ffffa9bb412a76a0 R08: 0000000000001319 R09: 00000000ffffff92\n  R10: ffffffffc0292de3 R11: ffffffffc00d2f51 R12: 0000000000000000\n  R13: ffffa141d01023c0 R14: ffffffffc0290250 R15: ffffa141d0102638\n  FS:  00007fa99f5c2740(0000) GS:ffffa142e5e80000(0000) knlGS:0000000000000000\n  CS:  0010 DS: 0000 ES: 0000 CR0: 0000000080050033\n  CR2: 0000000013e8e010 CR3: 0000000110d2c000 CR4: 0000000000750ee0\n  PKRU: 55555554\n  Call Trace:\n   rtw89_core_sta_add+0x95/0x9c [rtw89_core \u003cHASH:d239 29\u003e]\n   rtw89_ops_sta_state+0x5d/0x108 [rtw89_core \u003cHASH:d239 29\u003e]\n   drv_sta_state+0x115/0x66f [mac80211 \u003cHASH:81fe 30\u003e]\n   sta_info_insert_rcu+0x45c/0x713 [mac80211 \u003cHASH:81fe 30\u003e]\n   sta_info_insert+0xf/0x1b [mac80211 \u003cHASH:81fe 30\u003e]\n   ieee80211_prep_connection+0x9d6/0xb0c [mac80211 \u003cHASH:81fe 30\u003e]\n   ieee80211_mgd_auth+0x2aa/0x352 [mac80211 \u003cHASH:81fe 30\u003e]\n   cfg80211_mlme_auth+0x160/0x1f6 [cfg80211 \u003cHASH:00cd 31\u003e]\n   nl80211_authenticate+0x2e5/0x306 [cfg80211 \u003cHASH:00cd 31\u003e]\n   genl_rcv_msg+0x371/0x3a1\n   ? nl80211_stop_sched_scan+0xe5/0xe5 [cfg80211 \u003cHASH:00cd 31\u003e]\n   ? genl_rcv+0x36/0x36\n   netlink_rcv_skb+0x8a/0xf9\n   genl_rcv+0x28/0x36\n   netlink_unicast+0x27b/0x3a0\n   netlink_sendmsg+0x2aa/0x469\n   sock_sendmsg_nosec+0x49/0x4d\n   ____sys_sendmsg+0xe5/0x213\n   __sys_sendmsg+0xec/0x157\n   ? syscall_enter_from_user_mode+0xd7/0x116\n   do_syscall_64+0x43/0x55\n   entry_SYSCALL_64_after_hwframe+0x44/0xa9\n  RIP: 0033:0x7fa99f6e689b",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.170.2.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.170.2.s390x",
          "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.170.2.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.170.2.s390x",
          "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.170.2.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.170.2.s390x",
          "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.170.2.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.170.2.s390x",
          "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-64kb-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-64kb-devel-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-devel-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-devel-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-devel-5.14.21-150400.24.170.1.noarch",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-docs-5.14.21-150400.24.170.1.noarch",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-macros-5.14.21-150400.24.170.1.noarch",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-obs-build-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-obs-build-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-source-5.14.21-150400.24.170.1.noarch",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-syms-5.14.21-150400.24.170.1.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-syms-5.14.21-150400.24.170.1.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:reiserfs-kmp-default-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:reiserfs-kmp-default-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-64kb-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-64kb-devel-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-devel-5.14.21-150400.24.170.1.noarch",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-docs-5.14.21-150400.24.170.1.noarch",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-macros-5.14.21-150400.24.170.1.noarch",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-source-5.14.21-150400.24.170.1.noarch",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.170.1.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.170.1.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.170.2.ppc64le",
          "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.170.2.s390x",
          "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.170.2.ppc64le",
          "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.170.2.s390x",
          "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_170-default-1-150400.9.3.2.ppc64le",
          "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_170-default-1-150400.9.3.2.s390x",
          "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_170-default-1-150400.9.3.2.x86_64",
          "SUSE Linux Enterprise Micro 5.3:kernel-default-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise Micro 5.3:kernel-default-5.14.21-150400.24.170.2.s390x",
          "SUSE Linux Enterprise Micro 5.3:kernel-default-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise Micro 5.3:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.aarch64",
          "SUSE Linux Enterprise Micro 5.3:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
          "SUSE Linux Enterprise Micro 5.4:kernel-default-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise Micro 5.4:kernel-default-5.14.21-150400.24.170.2.s390x",
          "SUSE Linux Enterprise Micro 5.4:kernel-default-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise Micro 5.4:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.aarch64",
          "SUSE Linux Enterprise Micro 5.4:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-64kb-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-64kb-devel-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-5.14.21-150400.24.170.2.ppc64le",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-5.14.21-150400.24.170.2.s390x",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.aarch64",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.ppc64le",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.170.2.ppc64le",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.170.2.s390x",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-devel-5.14.21-150400.24.170.1.noarch",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-docs-5.14.21-150400.24.170.1.noarch",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-macros-5.14.21-150400.24.170.1.noarch",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.170.2.ppc64le",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.170.2.s390x",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-source-5.14.21-150400.24.170.1.noarch",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.170.1.aarch64",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.170.1.ppc64le",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.170.1.s390x",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.170.1.x86_64",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-zfcpdump-5.14.21-150400.24.170.2.s390x",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.170.2.ppc64le",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.170.2.s390x",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-5.14.21-150400.24.170.2.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-devel-5.14.21-150400.24.170.2.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-devel-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-devel-5.14.21-150400.24.170.1.noarch",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-docs-5.14.21-150400.24.170.1.noarch",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-macros-5.14.21-150400.24.170.1.noarch",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-obs-build-5.14.21-150400.24.170.2.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-obs-build-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-source-5.14.21-150400.24.170.1.noarch",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-syms-5.14.21-150400.24.170.1.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-syms-5.14.21-150400.24.170.1.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.170.2.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.170.2.x86_64",
          "SUSE Manager Proxy 4.3:kernel-default-5.14.21-150400.24.170.2.x86_64",
          "SUSE Manager Proxy 4.3:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
          "SUSE Manager Proxy 4.3:kernel-default-devel-5.14.21-150400.24.170.2.x86_64",
          "SUSE Manager Proxy 4.3:kernel-devel-5.14.21-150400.24.170.1.noarch",
          "SUSE Manager Proxy 4.3:kernel-macros-5.14.21-150400.24.170.1.noarch",
          "SUSE Manager Proxy 4.3:kernel-source-5.14.21-150400.24.170.1.noarch",
          "SUSE Manager Proxy 4.3:kernel-syms-5.14.21-150400.24.170.1.x86_64",
          "SUSE Manager Server 4.3:kernel-default-5.14.21-150400.24.170.2.ppc64le",
          "SUSE Manager Server 4.3:kernel-default-5.14.21-150400.24.170.2.s390x",
          "SUSE Manager Server 4.3:kernel-default-5.14.21-150400.24.170.2.x86_64",
          "SUSE Manager Server 4.3:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.ppc64le",
          "SUSE Manager Server 4.3:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
          "SUSE Manager Server 4.3:kernel-default-devel-5.14.21-150400.24.170.2.ppc64le",
          "SUSE Manager Server 4.3:kernel-default-devel-5.14.21-150400.24.170.2.s390x",
          "SUSE Manager Server 4.3:kernel-default-devel-5.14.21-150400.24.170.2.x86_64",
          "SUSE Manager Server 4.3:kernel-devel-5.14.21-150400.24.170.1.noarch",
          "SUSE Manager Server 4.3:kernel-macros-5.14.21-150400.24.170.1.noarch",
          "SUSE Manager Server 4.3:kernel-source-5.14.21-150400.24.170.1.noarch",
          "SUSE Manager Server 4.3:kernel-syms-5.14.21-150400.24.170.1.ppc64le",
          "SUSE Manager Server 4.3:kernel-syms-5.14.21-150400.24.170.1.s390x",
          "SUSE Manager Server 4.3:kernel-syms-5.14.21-150400.24.170.1.x86_64",
          "SUSE Manager Server 4.3:kernel-zfcpdump-5.14.21-150400.24.170.2.s390x"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2022-50178",
          "url": "https://www.suse.com/security/cve/CVE-2022-50178"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1244900 for CVE-2022-50178",
          "url": "https://bugzilla.suse.com/1244900"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-64kb-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-64kb-devel-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-devel-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-devel-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-devel-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-docs-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-macros-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-obs-build-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-obs-build-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-source-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-syms-5.14.21-150400.24.170.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-syms-5.14.21-150400.24.170.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:reiserfs-kmp-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:reiserfs-kmp-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-64kb-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-64kb-devel-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-devel-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-docs-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-macros-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-source-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.170.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.170.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_170-default-1-150400.9.3.2.ppc64le",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_170-default-1-150400.9.3.2.s390x",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_170-default-1-150400.9.3.2.x86_64",
            "SUSE Linux Enterprise Micro 5.3:kernel-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise Micro 5.3:kernel-default-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise Micro 5.3:kernel-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Micro 5.3:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.aarch64",
            "SUSE Linux Enterprise Micro 5.3:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
            "SUSE Linux Enterprise Micro 5.4:kernel-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise Micro 5.4:kernel-default-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise Micro 5.4:kernel-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Micro 5.4:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.aarch64",
            "SUSE Linux Enterprise Micro 5.4:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-64kb-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-64kb-devel-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.aarch64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.ppc64le",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-devel-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-docs-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-macros-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-source-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.170.1.aarch64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.170.1.ppc64le",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.170.1.s390x",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.170.1.x86_64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-zfcpdump-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-devel-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-devel-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-devel-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-docs-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-macros-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-obs-build-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-obs-build-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-source-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-syms-5.14.21-150400.24.170.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-syms-5.14.21-150400.24.170.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Manager Proxy 4.3:kernel-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Manager Proxy 4.3:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
            "SUSE Manager Proxy 4.3:kernel-default-devel-5.14.21-150400.24.170.2.x86_64",
            "SUSE Manager Proxy 4.3:kernel-devel-5.14.21-150400.24.170.1.noarch",
            "SUSE Manager Proxy 4.3:kernel-macros-5.14.21-150400.24.170.1.noarch",
            "SUSE Manager Proxy 4.3:kernel-source-5.14.21-150400.24.170.1.noarch",
            "SUSE Manager Proxy 4.3:kernel-syms-5.14.21-150400.24.170.1.x86_64",
            "SUSE Manager Server 4.3:kernel-default-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Manager Server 4.3:kernel-default-5.14.21-150400.24.170.2.s390x",
            "SUSE Manager Server 4.3:kernel-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Manager Server 4.3:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.ppc64le",
            "SUSE Manager Server 4.3:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
            "SUSE Manager Server 4.3:kernel-default-devel-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Manager Server 4.3:kernel-default-devel-5.14.21-150400.24.170.2.s390x",
            "SUSE Manager Server 4.3:kernel-default-devel-5.14.21-150400.24.170.2.x86_64",
            "SUSE Manager Server 4.3:kernel-devel-5.14.21-150400.24.170.1.noarch",
            "SUSE Manager Server 4.3:kernel-macros-5.14.21-150400.24.170.1.noarch",
            "SUSE Manager Server 4.3:kernel-source-5.14.21-150400.24.170.1.noarch",
            "SUSE Manager Server 4.3:kernel-syms-5.14.21-150400.24.170.1.ppc64le",
            "SUSE Manager Server 4.3:kernel-syms-5.14.21-150400.24.170.1.s390x",
            "SUSE Manager Server 4.3:kernel-syms-5.14.21-150400.24.170.1.x86_64",
            "SUSE Manager Server 4.3:kernel-zfcpdump-5.14.21-150400.24.170.2.s390x"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 5.5,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
            "version": "3.1"
          },
          "products": [
            "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-64kb-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-64kb-devel-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-devel-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-devel-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-devel-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-docs-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-macros-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-obs-build-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-obs-build-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-source-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-syms-5.14.21-150400.24.170.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-syms-5.14.21-150400.24.170.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:reiserfs-kmp-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:reiserfs-kmp-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-64kb-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-64kb-devel-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-devel-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-docs-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-macros-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-source-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.170.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.170.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_170-default-1-150400.9.3.2.ppc64le",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_170-default-1-150400.9.3.2.s390x",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_170-default-1-150400.9.3.2.x86_64",
            "SUSE Linux Enterprise Micro 5.3:kernel-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise Micro 5.3:kernel-default-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise Micro 5.3:kernel-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Micro 5.3:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.aarch64",
            "SUSE Linux Enterprise Micro 5.3:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
            "SUSE Linux Enterprise Micro 5.4:kernel-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise Micro 5.4:kernel-default-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise Micro 5.4:kernel-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Micro 5.4:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.aarch64",
            "SUSE Linux Enterprise Micro 5.4:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-64kb-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-64kb-devel-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.aarch64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.ppc64le",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-devel-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-docs-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-macros-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-source-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.170.1.aarch64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.170.1.ppc64le",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.170.1.s390x",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.170.1.x86_64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-zfcpdump-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-devel-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-devel-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-devel-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-docs-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-macros-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-obs-build-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-obs-build-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-source-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-syms-5.14.21-150400.24.170.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-syms-5.14.21-150400.24.170.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Manager Proxy 4.3:kernel-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Manager Proxy 4.3:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
            "SUSE Manager Proxy 4.3:kernel-default-devel-5.14.21-150400.24.170.2.x86_64",
            "SUSE Manager Proxy 4.3:kernel-devel-5.14.21-150400.24.170.1.noarch",
            "SUSE Manager Proxy 4.3:kernel-macros-5.14.21-150400.24.170.1.noarch",
            "SUSE Manager Proxy 4.3:kernel-source-5.14.21-150400.24.170.1.noarch",
            "SUSE Manager Proxy 4.3:kernel-syms-5.14.21-150400.24.170.1.x86_64",
            "SUSE Manager Server 4.3:kernel-default-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Manager Server 4.3:kernel-default-5.14.21-150400.24.170.2.s390x",
            "SUSE Manager Server 4.3:kernel-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Manager Server 4.3:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.ppc64le",
            "SUSE Manager Server 4.3:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
            "SUSE Manager Server 4.3:kernel-default-devel-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Manager Server 4.3:kernel-default-devel-5.14.21-150400.24.170.2.s390x",
            "SUSE Manager Server 4.3:kernel-default-devel-5.14.21-150400.24.170.2.x86_64",
            "SUSE Manager Server 4.3:kernel-devel-5.14.21-150400.24.170.1.noarch",
            "SUSE Manager Server 4.3:kernel-macros-5.14.21-150400.24.170.1.noarch",
            "SUSE Manager Server 4.3:kernel-source-5.14.21-150400.24.170.1.noarch",
            "SUSE Manager Server 4.3:kernel-syms-5.14.21-150400.24.170.1.ppc64le",
            "SUSE Manager Server 4.3:kernel-syms-5.14.21-150400.24.170.1.s390x",
            "SUSE Manager Server 4.3:kernel-syms-5.14.21-150400.24.170.1.x86_64",
            "SUSE Manager Server 4.3:kernel-zfcpdump-5.14.21-150400.24.170.2.s390x"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2025-07-28T15:09:33Z",
          "details": "moderate"
        }
      ],
      "title": "CVE-2022-50178"
    },
    {
      "cve": "CVE-2022-50179",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2022-50179"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "In the Linux kernel, the following vulnerability has been resolved:\n\nath9k: fix use-after-free in ath9k_hif_usb_rx_cb\n\nSyzbot reported use-after-free Read in ath9k_hif_usb_rx_cb() [0]. The\nproblem was in incorrect htc_handle-\u003edrv_priv initialization.\n\nProbable call trace which can trigger use-after-free:\n\nath9k_htc_probe_device()\n  /* htc_handle-\u003edrv_priv = priv; */\n  ath9k_htc_wait_for_target()      \u003c--- Failed\n  ieee80211_free_hw()\t\t   \u003c--- priv pointer is freed\n\n\u003cIRQ\u003e\n...\nath9k_hif_usb_rx_cb()\n  ath9k_hif_usb_rx_stream()\n   RX_STAT_INC()\t\t\u003c--- htc_handle-\u003edrv_priv access\n\nIn order to not add fancy protection for drv_priv we can move\nhtc_handle-\u003edrv_priv initialization at the end of the\nath9k_htc_probe_device() and add helper macro to make\nall *_STAT_* macros NULL safe, since syzbot has reported related NULL\nderef in that macros [1]",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.170.2.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.170.2.s390x",
          "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.170.2.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.170.2.s390x",
          "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.170.2.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.170.2.s390x",
          "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.170.2.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.170.2.s390x",
          "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-64kb-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-64kb-devel-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-devel-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-devel-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-devel-5.14.21-150400.24.170.1.noarch",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-docs-5.14.21-150400.24.170.1.noarch",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-macros-5.14.21-150400.24.170.1.noarch",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-obs-build-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-obs-build-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-source-5.14.21-150400.24.170.1.noarch",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-syms-5.14.21-150400.24.170.1.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-syms-5.14.21-150400.24.170.1.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:reiserfs-kmp-default-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:reiserfs-kmp-default-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-64kb-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-64kb-devel-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-devel-5.14.21-150400.24.170.1.noarch",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-docs-5.14.21-150400.24.170.1.noarch",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-macros-5.14.21-150400.24.170.1.noarch",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-source-5.14.21-150400.24.170.1.noarch",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.170.1.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.170.1.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.170.2.ppc64le",
          "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.170.2.s390x",
          "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.170.2.ppc64le",
          "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.170.2.s390x",
          "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_170-default-1-150400.9.3.2.ppc64le",
          "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_170-default-1-150400.9.3.2.s390x",
          "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_170-default-1-150400.9.3.2.x86_64",
          "SUSE Linux Enterprise Micro 5.3:kernel-default-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise Micro 5.3:kernel-default-5.14.21-150400.24.170.2.s390x",
          "SUSE Linux Enterprise Micro 5.3:kernel-default-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise Micro 5.3:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.aarch64",
          "SUSE Linux Enterprise Micro 5.3:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
          "SUSE Linux Enterprise Micro 5.4:kernel-default-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise Micro 5.4:kernel-default-5.14.21-150400.24.170.2.s390x",
          "SUSE Linux Enterprise Micro 5.4:kernel-default-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise Micro 5.4:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.aarch64",
          "SUSE Linux Enterprise Micro 5.4:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-64kb-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-64kb-devel-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-5.14.21-150400.24.170.2.ppc64le",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-5.14.21-150400.24.170.2.s390x",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.aarch64",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.ppc64le",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.170.2.ppc64le",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.170.2.s390x",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-devel-5.14.21-150400.24.170.1.noarch",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-docs-5.14.21-150400.24.170.1.noarch",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-macros-5.14.21-150400.24.170.1.noarch",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.170.2.ppc64le",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.170.2.s390x",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-source-5.14.21-150400.24.170.1.noarch",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.170.1.aarch64",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.170.1.ppc64le",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.170.1.s390x",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.170.1.x86_64",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-zfcpdump-5.14.21-150400.24.170.2.s390x",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.170.2.ppc64le",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.170.2.s390x",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-5.14.21-150400.24.170.2.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-devel-5.14.21-150400.24.170.2.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-devel-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-devel-5.14.21-150400.24.170.1.noarch",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-docs-5.14.21-150400.24.170.1.noarch",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-macros-5.14.21-150400.24.170.1.noarch",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-obs-build-5.14.21-150400.24.170.2.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-obs-build-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-source-5.14.21-150400.24.170.1.noarch",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-syms-5.14.21-150400.24.170.1.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-syms-5.14.21-150400.24.170.1.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.170.2.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.170.2.x86_64",
          "SUSE Manager Proxy 4.3:kernel-default-5.14.21-150400.24.170.2.x86_64",
          "SUSE Manager Proxy 4.3:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
          "SUSE Manager Proxy 4.3:kernel-default-devel-5.14.21-150400.24.170.2.x86_64",
          "SUSE Manager Proxy 4.3:kernel-devel-5.14.21-150400.24.170.1.noarch",
          "SUSE Manager Proxy 4.3:kernel-macros-5.14.21-150400.24.170.1.noarch",
          "SUSE Manager Proxy 4.3:kernel-source-5.14.21-150400.24.170.1.noarch",
          "SUSE Manager Proxy 4.3:kernel-syms-5.14.21-150400.24.170.1.x86_64",
          "SUSE Manager Server 4.3:kernel-default-5.14.21-150400.24.170.2.ppc64le",
          "SUSE Manager Server 4.3:kernel-default-5.14.21-150400.24.170.2.s390x",
          "SUSE Manager Server 4.3:kernel-default-5.14.21-150400.24.170.2.x86_64",
          "SUSE Manager Server 4.3:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.ppc64le",
          "SUSE Manager Server 4.3:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
          "SUSE Manager Server 4.3:kernel-default-devel-5.14.21-150400.24.170.2.ppc64le",
          "SUSE Manager Server 4.3:kernel-default-devel-5.14.21-150400.24.170.2.s390x",
          "SUSE Manager Server 4.3:kernel-default-devel-5.14.21-150400.24.170.2.x86_64",
          "SUSE Manager Server 4.3:kernel-devel-5.14.21-150400.24.170.1.noarch",
          "SUSE Manager Server 4.3:kernel-macros-5.14.21-150400.24.170.1.noarch",
          "SUSE Manager Server 4.3:kernel-source-5.14.21-150400.24.170.1.noarch",
          "SUSE Manager Server 4.3:kernel-syms-5.14.21-150400.24.170.1.ppc64le",
          "SUSE Manager Server 4.3:kernel-syms-5.14.21-150400.24.170.1.s390x",
          "SUSE Manager Server 4.3:kernel-syms-5.14.21-150400.24.170.1.x86_64",
          "SUSE Manager Server 4.3:kernel-zfcpdump-5.14.21-150400.24.170.2.s390x"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2022-50179",
          "url": "https://www.suse.com/security/cve/CVE-2022-50179"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1244886 for CVE-2022-50179",
          "url": "https://bugzilla.suse.com/1244886"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-64kb-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-64kb-devel-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-devel-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-devel-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-devel-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-docs-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-macros-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-obs-build-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-obs-build-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-source-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-syms-5.14.21-150400.24.170.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-syms-5.14.21-150400.24.170.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:reiserfs-kmp-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:reiserfs-kmp-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-64kb-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-64kb-devel-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-devel-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-docs-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-macros-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-source-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.170.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.170.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_170-default-1-150400.9.3.2.ppc64le",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_170-default-1-150400.9.3.2.s390x",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_170-default-1-150400.9.3.2.x86_64",
            "SUSE Linux Enterprise Micro 5.3:kernel-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise Micro 5.3:kernel-default-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise Micro 5.3:kernel-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Micro 5.3:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.aarch64",
            "SUSE Linux Enterprise Micro 5.3:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
            "SUSE Linux Enterprise Micro 5.4:kernel-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise Micro 5.4:kernel-default-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise Micro 5.4:kernel-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Micro 5.4:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.aarch64",
            "SUSE Linux Enterprise Micro 5.4:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-64kb-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-64kb-devel-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.aarch64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.ppc64le",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-devel-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-docs-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-macros-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-source-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.170.1.aarch64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.170.1.ppc64le",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.170.1.s390x",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.170.1.x86_64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-zfcpdump-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-devel-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-devel-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-devel-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-docs-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-macros-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-obs-build-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-obs-build-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-source-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-syms-5.14.21-150400.24.170.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-syms-5.14.21-150400.24.170.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Manager Proxy 4.3:kernel-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Manager Proxy 4.3:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
            "SUSE Manager Proxy 4.3:kernel-default-devel-5.14.21-150400.24.170.2.x86_64",
            "SUSE Manager Proxy 4.3:kernel-devel-5.14.21-150400.24.170.1.noarch",
            "SUSE Manager Proxy 4.3:kernel-macros-5.14.21-150400.24.170.1.noarch",
            "SUSE Manager Proxy 4.3:kernel-source-5.14.21-150400.24.170.1.noarch",
            "SUSE Manager Proxy 4.3:kernel-syms-5.14.21-150400.24.170.1.x86_64",
            "SUSE Manager Server 4.3:kernel-default-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Manager Server 4.3:kernel-default-5.14.21-150400.24.170.2.s390x",
            "SUSE Manager Server 4.3:kernel-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Manager Server 4.3:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.ppc64le",
            "SUSE Manager Server 4.3:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
            "SUSE Manager Server 4.3:kernel-default-devel-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Manager Server 4.3:kernel-default-devel-5.14.21-150400.24.170.2.s390x",
            "SUSE Manager Server 4.3:kernel-default-devel-5.14.21-150400.24.170.2.x86_64",
            "SUSE Manager Server 4.3:kernel-devel-5.14.21-150400.24.170.1.noarch",
            "SUSE Manager Server 4.3:kernel-macros-5.14.21-150400.24.170.1.noarch",
            "SUSE Manager Server 4.3:kernel-source-5.14.21-150400.24.170.1.noarch",
            "SUSE Manager Server 4.3:kernel-syms-5.14.21-150400.24.170.1.ppc64le",
            "SUSE Manager Server 4.3:kernel-syms-5.14.21-150400.24.170.1.s390x",
            "SUSE Manager Server 4.3:kernel-syms-5.14.21-150400.24.170.1.x86_64",
            "SUSE Manager Server 4.3:kernel-zfcpdump-5.14.21-150400.24.170.2.s390x"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 5.5,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
            "version": "3.1"
          },
          "products": [
            "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-64kb-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-64kb-devel-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-devel-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-devel-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-devel-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-docs-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-macros-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-obs-build-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-obs-build-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-source-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-syms-5.14.21-150400.24.170.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-syms-5.14.21-150400.24.170.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:reiserfs-kmp-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:reiserfs-kmp-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-64kb-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-64kb-devel-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-devel-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-docs-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-macros-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-source-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.170.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.170.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_170-default-1-150400.9.3.2.ppc64le",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_170-default-1-150400.9.3.2.s390x",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_170-default-1-150400.9.3.2.x86_64",
            "SUSE Linux Enterprise Micro 5.3:kernel-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise Micro 5.3:kernel-default-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise Micro 5.3:kernel-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Micro 5.3:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.aarch64",
            "SUSE Linux Enterprise Micro 5.3:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
            "SUSE Linux Enterprise Micro 5.4:kernel-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise Micro 5.4:kernel-default-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise Micro 5.4:kernel-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Micro 5.4:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.aarch64",
            "SUSE Linux Enterprise Micro 5.4:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-64kb-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-64kb-devel-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.aarch64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.ppc64le",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-devel-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-docs-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-macros-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-source-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.170.1.aarch64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.170.1.ppc64le",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.170.1.s390x",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.170.1.x86_64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-zfcpdump-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-devel-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-devel-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-devel-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-docs-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-macros-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-obs-build-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-obs-build-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-source-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-syms-5.14.21-150400.24.170.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-syms-5.14.21-150400.24.170.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Manager Proxy 4.3:kernel-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Manager Proxy 4.3:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
            "SUSE Manager Proxy 4.3:kernel-default-devel-5.14.21-150400.24.170.2.x86_64",
            "SUSE Manager Proxy 4.3:kernel-devel-5.14.21-150400.24.170.1.noarch",
            "SUSE Manager Proxy 4.3:kernel-macros-5.14.21-150400.24.170.1.noarch",
            "SUSE Manager Proxy 4.3:kernel-source-5.14.21-150400.24.170.1.noarch",
            "SUSE Manager Proxy 4.3:kernel-syms-5.14.21-150400.24.170.1.x86_64",
            "SUSE Manager Server 4.3:kernel-default-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Manager Server 4.3:kernel-default-5.14.21-150400.24.170.2.s390x",
            "SUSE Manager Server 4.3:kernel-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Manager Server 4.3:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.ppc64le",
            "SUSE Manager Server 4.3:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
            "SUSE Manager Server 4.3:kernel-default-devel-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Manager Server 4.3:kernel-default-devel-5.14.21-150400.24.170.2.s390x",
            "SUSE Manager Server 4.3:kernel-default-devel-5.14.21-150400.24.170.2.x86_64",
            "SUSE Manager Server 4.3:kernel-devel-5.14.21-150400.24.170.1.noarch",
            "SUSE Manager Server 4.3:kernel-macros-5.14.21-150400.24.170.1.noarch",
            "SUSE Manager Server 4.3:kernel-source-5.14.21-150400.24.170.1.noarch",
            "SUSE Manager Server 4.3:kernel-syms-5.14.21-150400.24.170.1.ppc64le",
            "SUSE Manager Server 4.3:kernel-syms-5.14.21-150400.24.170.1.s390x",
            "SUSE Manager Server 4.3:kernel-syms-5.14.21-150400.24.170.1.x86_64",
            "SUSE Manager Server 4.3:kernel-zfcpdump-5.14.21-150400.24.170.2.s390x"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2025-07-28T15:09:33Z",
          "details": "moderate"
        }
      ],
      "title": "CVE-2022-50179"
    },
    {
      "cve": "CVE-2022-50181",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2022-50181"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "In the Linux kernel, the following vulnerability has been resolved:\n\nvirtio-gpu: fix a missing check to avoid NULL dereference\n\n\u0027cache_ent\u0027 could be set NULL inside virtio_gpu_cmd_get_capset()\nand it will lead to a NULL dereference by a lately use of it\n(i.e., ptr = cache_ent-\u003ecaps_cache). Fix it with a NULL check.\n\n\n[ kraxel: minor codestyle fixup ]",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.170.2.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.170.2.s390x",
          "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.170.2.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.170.2.s390x",
          "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.170.2.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.170.2.s390x",
          "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.170.2.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.170.2.s390x",
          "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-64kb-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-64kb-devel-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-devel-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-devel-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-devel-5.14.21-150400.24.170.1.noarch",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-docs-5.14.21-150400.24.170.1.noarch",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-macros-5.14.21-150400.24.170.1.noarch",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-obs-build-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-obs-build-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-source-5.14.21-150400.24.170.1.noarch",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-syms-5.14.21-150400.24.170.1.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-syms-5.14.21-150400.24.170.1.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:reiserfs-kmp-default-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:reiserfs-kmp-default-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-64kb-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-64kb-devel-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-devel-5.14.21-150400.24.170.1.noarch",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-docs-5.14.21-150400.24.170.1.noarch",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-macros-5.14.21-150400.24.170.1.noarch",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-source-5.14.21-150400.24.170.1.noarch",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.170.1.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.170.1.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.170.2.ppc64le",
          "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.170.2.s390x",
          "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.170.2.ppc64le",
          "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.170.2.s390x",
          "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_170-default-1-150400.9.3.2.ppc64le",
          "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_170-default-1-150400.9.3.2.s390x",
          "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_170-default-1-150400.9.3.2.x86_64",
          "SUSE Linux Enterprise Micro 5.3:kernel-default-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise Micro 5.3:kernel-default-5.14.21-150400.24.170.2.s390x",
          "SUSE Linux Enterprise Micro 5.3:kernel-default-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise Micro 5.3:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.aarch64",
          "SUSE Linux Enterprise Micro 5.3:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
          "SUSE Linux Enterprise Micro 5.4:kernel-default-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise Micro 5.4:kernel-default-5.14.21-150400.24.170.2.s390x",
          "SUSE Linux Enterprise Micro 5.4:kernel-default-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise Micro 5.4:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.aarch64",
          "SUSE Linux Enterprise Micro 5.4:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-64kb-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-64kb-devel-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-5.14.21-150400.24.170.2.ppc64le",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-5.14.21-150400.24.170.2.s390x",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.aarch64",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.ppc64le",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.170.2.ppc64le",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.170.2.s390x",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-devel-5.14.21-150400.24.170.1.noarch",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-docs-5.14.21-150400.24.170.1.noarch",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-macros-5.14.21-150400.24.170.1.noarch",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.170.2.ppc64le",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.170.2.s390x",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-source-5.14.21-150400.24.170.1.noarch",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.170.1.aarch64",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.170.1.ppc64le",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.170.1.s390x",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.170.1.x86_64",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-zfcpdump-5.14.21-150400.24.170.2.s390x",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.170.2.ppc64le",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.170.2.s390x",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-5.14.21-150400.24.170.2.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-devel-5.14.21-150400.24.170.2.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-devel-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-devel-5.14.21-150400.24.170.1.noarch",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-docs-5.14.21-150400.24.170.1.noarch",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-macros-5.14.21-150400.24.170.1.noarch",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-obs-build-5.14.21-150400.24.170.2.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-obs-build-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-source-5.14.21-150400.24.170.1.noarch",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-syms-5.14.21-150400.24.170.1.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-syms-5.14.21-150400.24.170.1.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.170.2.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.170.2.x86_64",
          "SUSE Manager Proxy 4.3:kernel-default-5.14.21-150400.24.170.2.x86_64",
          "SUSE Manager Proxy 4.3:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
          "SUSE Manager Proxy 4.3:kernel-default-devel-5.14.21-150400.24.170.2.x86_64",
          "SUSE Manager Proxy 4.3:kernel-devel-5.14.21-150400.24.170.1.noarch",
          "SUSE Manager Proxy 4.3:kernel-macros-5.14.21-150400.24.170.1.noarch",
          "SUSE Manager Proxy 4.3:kernel-source-5.14.21-150400.24.170.1.noarch",
          "SUSE Manager Proxy 4.3:kernel-syms-5.14.21-150400.24.170.1.x86_64",
          "SUSE Manager Server 4.3:kernel-default-5.14.21-150400.24.170.2.ppc64le",
          "SUSE Manager Server 4.3:kernel-default-5.14.21-150400.24.170.2.s390x",
          "SUSE Manager Server 4.3:kernel-default-5.14.21-150400.24.170.2.x86_64",
          "SUSE Manager Server 4.3:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.ppc64le",
          "SUSE Manager Server 4.3:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
          "SUSE Manager Server 4.3:kernel-default-devel-5.14.21-150400.24.170.2.ppc64le",
          "SUSE Manager Server 4.3:kernel-default-devel-5.14.21-150400.24.170.2.s390x",
          "SUSE Manager Server 4.3:kernel-default-devel-5.14.21-150400.24.170.2.x86_64",
          "SUSE Manager Server 4.3:kernel-devel-5.14.21-150400.24.170.1.noarch",
          "SUSE Manager Server 4.3:kernel-macros-5.14.21-150400.24.170.1.noarch",
          "SUSE Manager Server 4.3:kernel-source-5.14.21-150400.24.170.1.noarch",
          "SUSE Manager Server 4.3:kernel-syms-5.14.21-150400.24.170.1.ppc64le",
          "SUSE Manager Server 4.3:kernel-syms-5.14.21-150400.24.170.1.s390x",
          "SUSE Manager Server 4.3:kernel-syms-5.14.21-150400.24.170.1.x86_64",
          "SUSE Manager Server 4.3:kernel-zfcpdump-5.14.21-150400.24.170.2.s390x"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2022-50181",
          "url": "https://www.suse.com/security/cve/CVE-2022-50181"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1244901 for CVE-2022-50181",
          "url": "https://bugzilla.suse.com/1244901"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-64kb-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-64kb-devel-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-devel-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-devel-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-devel-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-docs-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-macros-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-obs-build-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-obs-build-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-source-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-syms-5.14.21-150400.24.170.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-syms-5.14.21-150400.24.170.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:reiserfs-kmp-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:reiserfs-kmp-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-64kb-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-64kb-devel-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-devel-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-docs-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-macros-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-source-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.170.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.170.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_170-default-1-150400.9.3.2.ppc64le",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_170-default-1-150400.9.3.2.s390x",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_170-default-1-150400.9.3.2.x86_64",
            "SUSE Linux Enterprise Micro 5.3:kernel-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise Micro 5.3:kernel-default-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise Micro 5.3:kernel-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Micro 5.3:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.aarch64",
            "SUSE Linux Enterprise Micro 5.3:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
            "SUSE Linux Enterprise Micro 5.4:kernel-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise Micro 5.4:kernel-default-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise Micro 5.4:kernel-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Micro 5.4:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.aarch64",
            "SUSE Linux Enterprise Micro 5.4:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-64kb-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-64kb-devel-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.aarch64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.ppc64le",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-devel-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-docs-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-macros-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-source-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.170.1.aarch64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.170.1.ppc64le",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.170.1.s390x",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.170.1.x86_64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-zfcpdump-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-devel-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-devel-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-devel-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-docs-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-macros-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-obs-build-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-obs-build-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-source-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-syms-5.14.21-150400.24.170.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-syms-5.14.21-150400.24.170.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Manager Proxy 4.3:kernel-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Manager Proxy 4.3:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
            "SUSE Manager Proxy 4.3:kernel-default-devel-5.14.21-150400.24.170.2.x86_64",
            "SUSE Manager Proxy 4.3:kernel-devel-5.14.21-150400.24.170.1.noarch",
            "SUSE Manager Proxy 4.3:kernel-macros-5.14.21-150400.24.170.1.noarch",
            "SUSE Manager Proxy 4.3:kernel-source-5.14.21-150400.24.170.1.noarch",
            "SUSE Manager Proxy 4.3:kernel-syms-5.14.21-150400.24.170.1.x86_64",
            "SUSE Manager Server 4.3:kernel-default-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Manager Server 4.3:kernel-default-5.14.21-150400.24.170.2.s390x",
            "SUSE Manager Server 4.3:kernel-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Manager Server 4.3:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.ppc64le",
            "SUSE Manager Server 4.3:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
            "SUSE Manager Server 4.3:kernel-default-devel-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Manager Server 4.3:kernel-default-devel-5.14.21-150400.24.170.2.s390x",
            "SUSE Manager Server 4.3:kernel-default-devel-5.14.21-150400.24.170.2.x86_64",
            "SUSE Manager Server 4.3:kernel-devel-5.14.21-150400.24.170.1.noarch",
            "SUSE Manager Server 4.3:kernel-macros-5.14.21-150400.24.170.1.noarch",
            "SUSE Manager Server 4.3:kernel-source-5.14.21-150400.24.170.1.noarch",
            "SUSE Manager Server 4.3:kernel-syms-5.14.21-150400.24.170.1.ppc64le",
            "SUSE Manager Server 4.3:kernel-syms-5.14.21-150400.24.170.1.s390x",
            "SUSE Manager Server 4.3:kernel-syms-5.14.21-150400.24.170.1.x86_64",
            "SUSE Manager Server 4.3:kernel-zfcpdump-5.14.21-150400.24.170.2.s390x"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 5.5,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
            "version": "3.1"
          },
          "products": [
            "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-64kb-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-64kb-devel-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-devel-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-devel-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-devel-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-docs-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-macros-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-obs-build-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-obs-build-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-source-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-syms-5.14.21-150400.24.170.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-syms-5.14.21-150400.24.170.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:reiserfs-kmp-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:reiserfs-kmp-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-64kb-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-64kb-devel-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-devel-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-docs-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-macros-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-source-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.170.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.170.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_170-default-1-150400.9.3.2.ppc64le",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_170-default-1-150400.9.3.2.s390x",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_170-default-1-150400.9.3.2.x86_64",
            "SUSE Linux Enterprise Micro 5.3:kernel-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise Micro 5.3:kernel-default-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise Micro 5.3:kernel-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Micro 5.3:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.aarch64",
            "SUSE Linux Enterprise Micro 5.3:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
            "SUSE Linux Enterprise Micro 5.4:kernel-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise Micro 5.4:kernel-default-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise Micro 5.4:kernel-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Micro 5.4:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.aarch64",
            "SUSE Linux Enterprise Micro 5.4:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-64kb-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-64kb-devel-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.aarch64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.ppc64le",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-devel-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-docs-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-macros-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-source-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.170.1.aarch64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.170.1.ppc64le",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.170.1.s390x",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.170.1.x86_64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-zfcpdump-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-devel-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-devel-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-devel-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-docs-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-macros-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-obs-build-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-obs-build-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-source-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-syms-5.14.21-150400.24.170.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-syms-5.14.21-150400.24.170.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Manager Proxy 4.3:kernel-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Manager Proxy 4.3:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
            "SUSE Manager Proxy 4.3:kernel-default-devel-5.14.21-150400.24.170.2.x86_64",
            "SUSE Manager Proxy 4.3:kernel-devel-5.14.21-150400.24.170.1.noarch",
            "SUSE Manager Proxy 4.3:kernel-macros-5.14.21-150400.24.170.1.noarch",
            "SUSE Manager Proxy 4.3:kernel-source-5.14.21-150400.24.170.1.noarch",
            "SUSE Manager Proxy 4.3:kernel-syms-5.14.21-150400.24.170.1.x86_64",
            "SUSE Manager Server 4.3:kernel-default-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Manager Server 4.3:kernel-default-5.14.21-150400.24.170.2.s390x",
            "SUSE Manager Server 4.3:kernel-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Manager Server 4.3:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.ppc64le",
            "SUSE Manager Server 4.3:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
            "SUSE Manager Server 4.3:kernel-default-devel-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Manager Server 4.3:kernel-default-devel-5.14.21-150400.24.170.2.s390x",
            "SUSE Manager Server 4.3:kernel-default-devel-5.14.21-150400.24.170.2.x86_64",
            "SUSE Manager Server 4.3:kernel-devel-5.14.21-150400.24.170.1.noarch",
            "SUSE Manager Server 4.3:kernel-macros-5.14.21-150400.24.170.1.noarch",
            "SUSE Manager Server 4.3:kernel-source-5.14.21-150400.24.170.1.noarch",
            "SUSE Manager Server 4.3:kernel-syms-5.14.21-150400.24.170.1.ppc64le",
            "SUSE Manager Server 4.3:kernel-syms-5.14.21-150400.24.170.1.s390x",
            "SUSE Manager Server 4.3:kernel-syms-5.14.21-150400.24.170.1.x86_64",
            "SUSE Manager Server 4.3:kernel-zfcpdump-5.14.21-150400.24.170.2.s390x"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2025-07-28T15:09:33Z",
          "details": "moderate"
        }
      ],
      "title": "CVE-2022-50181"
    },
    {
      "cve": "CVE-2022-50185",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2022-50185"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "In the Linux kernel, the following vulnerability has been resolved:\n\ndrm/radeon: fix potential buffer overflow in ni_set_mc_special_registers()\n\nThe last case label can write two buffers \u0027mc_reg_address[j]\u0027 and\n\u0027mc_data[j]\u0027 with \u0027j\u0027 offset equal to SMC_NISLANDS_MC_REGISTER_ARRAY_SIZE\nsince there are no checks for this value in both case labels after the\nlast \u0027j++\u0027.\n\nInstead of changing \u0027\u003e\u0027 to \u0027\u003e=\u0027 there, add the bounds check at the start\nof the second \u0027case\u0027 (the first one already has it).\n\nAlso, remove redundant last checks for \u0027j\u0027 index bigger than array size.\nThe expression is always false. Moreover, before or after the patch\n\u0027table-\u003elast\u0027 can be equal to SMC_NISLANDS_MC_REGISTER_ARRAY_SIZE and it\nseems it can be a valid value.\n\nDetected using the static analysis tool - Svace.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.170.2.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.170.2.s390x",
          "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.170.2.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.170.2.s390x",
          "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.170.2.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.170.2.s390x",
          "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.170.2.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.170.2.s390x",
          "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-64kb-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-64kb-devel-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-devel-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-devel-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-devel-5.14.21-150400.24.170.1.noarch",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-docs-5.14.21-150400.24.170.1.noarch",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-macros-5.14.21-150400.24.170.1.noarch",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-obs-build-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-obs-build-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-source-5.14.21-150400.24.170.1.noarch",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-syms-5.14.21-150400.24.170.1.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-syms-5.14.21-150400.24.170.1.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:reiserfs-kmp-default-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:reiserfs-kmp-default-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-64kb-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-64kb-devel-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-devel-5.14.21-150400.24.170.1.noarch",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-docs-5.14.21-150400.24.170.1.noarch",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-macros-5.14.21-150400.24.170.1.noarch",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-source-5.14.21-150400.24.170.1.noarch",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.170.1.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.170.1.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.170.2.ppc64le",
          "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.170.2.s390x",
          "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.170.2.ppc64le",
          "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.170.2.s390x",
          "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_170-default-1-150400.9.3.2.ppc64le",
          "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_170-default-1-150400.9.3.2.s390x",
          "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_170-default-1-150400.9.3.2.x86_64",
          "SUSE Linux Enterprise Micro 5.3:kernel-default-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise Micro 5.3:kernel-default-5.14.21-150400.24.170.2.s390x",
          "SUSE Linux Enterprise Micro 5.3:kernel-default-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise Micro 5.3:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.aarch64",
          "SUSE Linux Enterprise Micro 5.3:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
          "SUSE Linux Enterprise Micro 5.4:kernel-default-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise Micro 5.4:kernel-default-5.14.21-150400.24.170.2.s390x",
          "SUSE Linux Enterprise Micro 5.4:kernel-default-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise Micro 5.4:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.aarch64",
          "SUSE Linux Enterprise Micro 5.4:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-64kb-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-64kb-devel-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-5.14.21-150400.24.170.2.ppc64le",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-5.14.21-150400.24.170.2.s390x",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.aarch64",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.ppc64le",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.170.2.ppc64le",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.170.2.s390x",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-devel-5.14.21-150400.24.170.1.noarch",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-docs-5.14.21-150400.24.170.1.noarch",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-macros-5.14.21-150400.24.170.1.noarch",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.170.2.ppc64le",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.170.2.s390x",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-source-5.14.21-150400.24.170.1.noarch",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.170.1.aarch64",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.170.1.ppc64le",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.170.1.s390x",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.170.1.x86_64",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-zfcpdump-5.14.21-150400.24.170.2.s390x",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.170.2.ppc64le",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.170.2.s390x",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-5.14.21-150400.24.170.2.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-devel-5.14.21-150400.24.170.2.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-devel-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-devel-5.14.21-150400.24.170.1.noarch",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-docs-5.14.21-150400.24.170.1.noarch",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-macros-5.14.21-150400.24.170.1.noarch",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-obs-build-5.14.21-150400.24.170.2.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-obs-build-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-source-5.14.21-150400.24.170.1.noarch",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-syms-5.14.21-150400.24.170.1.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-syms-5.14.21-150400.24.170.1.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.170.2.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.170.2.x86_64",
          "SUSE Manager Proxy 4.3:kernel-default-5.14.21-150400.24.170.2.x86_64",
          "SUSE Manager Proxy 4.3:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
          "SUSE Manager Proxy 4.3:kernel-default-devel-5.14.21-150400.24.170.2.x86_64",
          "SUSE Manager Proxy 4.3:kernel-devel-5.14.21-150400.24.170.1.noarch",
          "SUSE Manager Proxy 4.3:kernel-macros-5.14.21-150400.24.170.1.noarch",
          "SUSE Manager Proxy 4.3:kernel-source-5.14.21-150400.24.170.1.noarch",
          "SUSE Manager Proxy 4.3:kernel-syms-5.14.21-150400.24.170.1.x86_64",
          "SUSE Manager Server 4.3:kernel-default-5.14.21-150400.24.170.2.ppc64le",
          "SUSE Manager Server 4.3:kernel-default-5.14.21-150400.24.170.2.s390x",
          "SUSE Manager Server 4.3:kernel-default-5.14.21-150400.24.170.2.x86_64",
          "SUSE Manager Server 4.3:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.ppc64le",
          "SUSE Manager Server 4.3:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
          "SUSE Manager Server 4.3:kernel-default-devel-5.14.21-150400.24.170.2.ppc64le",
          "SUSE Manager Server 4.3:kernel-default-devel-5.14.21-150400.24.170.2.s390x",
          "SUSE Manager Server 4.3:kernel-default-devel-5.14.21-150400.24.170.2.x86_64",
          "SUSE Manager Server 4.3:kernel-devel-5.14.21-150400.24.170.1.noarch",
          "SUSE Manager Server 4.3:kernel-macros-5.14.21-150400.24.170.1.noarch",
          "SUSE Manager Server 4.3:kernel-source-5.14.21-150400.24.170.1.noarch",
          "SUSE Manager Server 4.3:kernel-syms-5.14.21-150400.24.170.1.ppc64le",
          "SUSE Manager Server 4.3:kernel-syms-5.14.21-150400.24.170.1.s390x",
          "SUSE Manager Server 4.3:kernel-syms-5.14.21-150400.24.170.1.x86_64",
          "SUSE Manager Server 4.3:kernel-zfcpdump-5.14.21-150400.24.170.2.s390x"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2022-50185",
          "url": "https://www.suse.com/security/cve/CVE-2022-50185"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1244887 for CVE-2022-50185",
          "url": "https://bugzilla.suse.com/1244887"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-64kb-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-64kb-devel-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-devel-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-devel-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-devel-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-docs-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-macros-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-obs-build-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-obs-build-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-source-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-syms-5.14.21-150400.24.170.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-syms-5.14.21-150400.24.170.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:reiserfs-kmp-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:reiserfs-kmp-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-64kb-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-64kb-devel-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-devel-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-docs-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-macros-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-source-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.170.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.170.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_170-default-1-150400.9.3.2.ppc64le",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_170-default-1-150400.9.3.2.s390x",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_170-default-1-150400.9.3.2.x86_64",
            "SUSE Linux Enterprise Micro 5.3:kernel-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise Micro 5.3:kernel-default-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise Micro 5.3:kernel-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Micro 5.3:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.aarch64",
            "SUSE Linux Enterprise Micro 5.3:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
            "SUSE Linux Enterprise Micro 5.4:kernel-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise Micro 5.4:kernel-default-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise Micro 5.4:kernel-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Micro 5.4:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.aarch64",
            "SUSE Linux Enterprise Micro 5.4:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-64kb-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-64kb-devel-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.aarch64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.ppc64le",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-devel-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-docs-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-macros-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-source-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.170.1.aarch64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.170.1.ppc64le",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.170.1.s390x",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.170.1.x86_64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-zfcpdump-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-devel-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-devel-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-devel-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-docs-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-macros-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-obs-build-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-obs-build-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-source-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-syms-5.14.21-150400.24.170.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-syms-5.14.21-150400.24.170.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Manager Proxy 4.3:kernel-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Manager Proxy 4.3:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
            "SUSE Manager Proxy 4.3:kernel-default-devel-5.14.21-150400.24.170.2.x86_64",
            "SUSE Manager Proxy 4.3:kernel-devel-5.14.21-150400.24.170.1.noarch",
            "SUSE Manager Proxy 4.3:kernel-macros-5.14.21-150400.24.170.1.noarch",
            "SUSE Manager Proxy 4.3:kernel-source-5.14.21-150400.24.170.1.noarch",
            "SUSE Manager Proxy 4.3:kernel-syms-5.14.21-150400.24.170.1.x86_64",
            "SUSE Manager Server 4.3:kernel-default-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Manager Server 4.3:kernel-default-5.14.21-150400.24.170.2.s390x",
            "SUSE Manager Server 4.3:kernel-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Manager Server 4.3:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.ppc64le",
            "SUSE Manager Server 4.3:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
            "SUSE Manager Server 4.3:kernel-default-devel-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Manager Server 4.3:kernel-default-devel-5.14.21-150400.24.170.2.s390x",
            "SUSE Manager Server 4.3:kernel-default-devel-5.14.21-150400.24.170.2.x86_64",
            "SUSE Manager Server 4.3:kernel-devel-5.14.21-150400.24.170.1.noarch",
            "SUSE Manager Server 4.3:kernel-macros-5.14.21-150400.24.170.1.noarch",
            "SUSE Manager Server 4.3:kernel-source-5.14.21-150400.24.170.1.noarch",
            "SUSE Manager Server 4.3:kernel-syms-5.14.21-150400.24.170.1.ppc64le",
            "SUSE Manager Server 4.3:kernel-syms-5.14.21-150400.24.170.1.s390x",
            "SUSE Manager Server 4.3:kernel-syms-5.14.21-150400.24.170.1.x86_64",
            "SUSE Manager Server 4.3:kernel-zfcpdump-5.14.21-150400.24.170.2.s390x"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 5.5,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
            "version": "3.1"
          },
          "products": [
            "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-64kb-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-64kb-devel-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-devel-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-devel-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-devel-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-docs-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-macros-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-obs-build-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-obs-build-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-source-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-syms-5.14.21-150400.24.170.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-syms-5.14.21-150400.24.170.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:reiserfs-kmp-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:reiserfs-kmp-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-64kb-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-64kb-devel-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-devel-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-docs-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-macros-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-source-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.170.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.170.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_170-default-1-150400.9.3.2.ppc64le",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_170-default-1-150400.9.3.2.s390x",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_170-default-1-150400.9.3.2.x86_64",
            "SUSE Linux Enterprise Micro 5.3:kernel-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise Micro 5.3:kernel-default-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise Micro 5.3:kernel-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Micro 5.3:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.aarch64",
            "SUSE Linux Enterprise Micro 5.3:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
            "SUSE Linux Enterprise Micro 5.4:kernel-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise Micro 5.4:kernel-default-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise Micro 5.4:kernel-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Micro 5.4:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.aarch64",
            "SUSE Linux Enterprise Micro 5.4:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-64kb-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-64kb-devel-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.aarch64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.ppc64le",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-devel-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-docs-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-macros-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-source-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.170.1.aarch64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.170.1.ppc64le",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.170.1.s390x",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.170.1.x86_64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-zfcpdump-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-devel-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-devel-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-devel-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-docs-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-macros-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-obs-build-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-obs-build-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-source-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-syms-5.14.21-150400.24.170.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-syms-5.14.21-150400.24.170.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Manager Proxy 4.3:kernel-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Manager Proxy 4.3:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
            "SUSE Manager Proxy 4.3:kernel-default-devel-5.14.21-150400.24.170.2.x86_64",
            "SUSE Manager Proxy 4.3:kernel-devel-5.14.21-150400.24.170.1.noarch",
            "SUSE Manager Proxy 4.3:kernel-macros-5.14.21-150400.24.170.1.noarch",
            "SUSE Manager Proxy 4.3:kernel-source-5.14.21-150400.24.170.1.noarch",
            "SUSE Manager Proxy 4.3:kernel-syms-5.14.21-150400.24.170.1.x86_64",
            "SUSE Manager Server 4.3:kernel-default-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Manager Server 4.3:kernel-default-5.14.21-150400.24.170.2.s390x",
            "SUSE Manager Server 4.3:kernel-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Manager Server 4.3:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.ppc64le",
            "SUSE Manager Server 4.3:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
            "SUSE Manager Server 4.3:kernel-default-devel-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Manager Server 4.3:kernel-default-devel-5.14.21-150400.24.170.2.s390x",
            "SUSE Manager Server 4.3:kernel-default-devel-5.14.21-150400.24.170.2.x86_64",
            "SUSE Manager Server 4.3:kernel-devel-5.14.21-150400.24.170.1.noarch",
            "SUSE Manager Server 4.3:kernel-macros-5.14.21-150400.24.170.1.noarch",
            "SUSE Manager Server 4.3:kernel-source-5.14.21-150400.24.170.1.noarch",
            "SUSE Manager Server 4.3:kernel-syms-5.14.21-150400.24.170.1.ppc64le",
            "SUSE Manager Server 4.3:kernel-syms-5.14.21-150400.24.170.1.s390x",
            "SUSE Manager Server 4.3:kernel-syms-5.14.21-150400.24.170.1.x86_64",
            "SUSE Manager Server 4.3:kernel-zfcpdump-5.14.21-150400.24.170.2.s390x"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2025-07-28T15:09:33Z",
          "details": "moderate"
        }
      ],
      "title": "CVE-2022-50185"
    },
    {
      "cve": "CVE-2022-50187",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2022-50187"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "In the Linux kernel, the following vulnerability has been resolved:\n\nath11k: fix netdev open race\n\nMake sure to allocate resources needed before registering the device.\n\nThis specifically avoids having a racing open() trigger a BUG_ON() in\nmod_timer() when ath11k_mac_op_start() is called before the\nmon_reap_timer as been set up.\n\nI did not see this issue with next-20220310, but I hit it on every probe\nwith next-20220511. Perhaps some timing changed in between.\n\nHere\u0027s the backtrace:\n\n[   51.346947] kernel BUG at kernel/time/timer.c:990!\n[   51.346958] Internal error: Oops - BUG: 0 [#1] PREEMPT SMP\n...\n[   51.578225] Call trace:\n[   51.583293]  __mod_timer+0x298/0x390\n[   51.589518]  mod_timer+0x14/0x20\n[   51.595368]  ath11k_mac_op_start+0x41c/0x4a0 [ath11k]\n[   51.603165]  drv_start+0x38/0x60 [mac80211]\n[   51.610110]  ieee80211_do_open+0x29c/0x7d0 [mac80211]\n[   51.617945]  ieee80211_open+0x60/0xb0 [mac80211]\n[   51.625311]  __dev_open+0x100/0x1c0\n[   51.631420]  __dev_change_flags+0x194/0x210\n[   51.638214]  dev_change_flags+0x24/0x70\n[   51.644646]  do_setlink+0x228/0xdb0\n[   51.650723]  __rtnl_newlink+0x460/0x830\n[   51.657162]  rtnl_newlink+0x4c/0x80\n[   51.663229]  rtnetlink_rcv_msg+0x124/0x390\n[   51.669917]  netlink_rcv_skb+0x58/0x130\n[   51.676314]  rtnetlink_rcv+0x18/0x30\n[   51.682460]  netlink_unicast+0x250/0x310\n[   51.688960]  netlink_sendmsg+0x19c/0x3e0\n[   51.695458]  ____sys_sendmsg+0x220/0x290\n[   51.701938]  ___sys_sendmsg+0x7c/0xc0\n[   51.708148]  __sys_sendmsg+0x68/0xd0\n[   51.714254]  __arm64_sys_sendmsg+0x28/0x40\n[   51.720900]  invoke_syscall+0x48/0x120\n\nTested-on: WCN6855 hw2.0 PCI WLAN.HSP.1.1-03125-QCAHSPSWPL_V1_V2_SILICONZ_LITE-3",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.170.2.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.170.2.s390x",
          "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.170.2.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.170.2.s390x",
          "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.170.2.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.170.2.s390x",
          "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.170.2.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.170.2.s390x",
          "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-64kb-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-64kb-devel-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-devel-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-devel-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-devel-5.14.21-150400.24.170.1.noarch",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-docs-5.14.21-150400.24.170.1.noarch",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-macros-5.14.21-150400.24.170.1.noarch",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-obs-build-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-obs-build-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-source-5.14.21-150400.24.170.1.noarch",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-syms-5.14.21-150400.24.170.1.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-syms-5.14.21-150400.24.170.1.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:reiserfs-kmp-default-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:reiserfs-kmp-default-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-64kb-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-64kb-devel-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-devel-5.14.21-150400.24.170.1.noarch",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-docs-5.14.21-150400.24.170.1.noarch",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-macros-5.14.21-150400.24.170.1.noarch",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-source-5.14.21-150400.24.170.1.noarch",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.170.1.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.170.1.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.170.2.ppc64le",
          "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.170.2.s390x",
          "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.170.2.ppc64le",
          "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.170.2.s390x",
          "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_170-default-1-150400.9.3.2.ppc64le",
          "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_170-default-1-150400.9.3.2.s390x",
          "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_170-default-1-150400.9.3.2.x86_64",
          "SUSE Linux Enterprise Micro 5.3:kernel-default-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise Micro 5.3:kernel-default-5.14.21-150400.24.170.2.s390x",
          "SUSE Linux Enterprise Micro 5.3:kernel-default-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise Micro 5.3:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.aarch64",
          "SUSE Linux Enterprise Micro 5.3:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
          "SUSE Linux Enterprise Micro 5.4:kernel-default-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise Micro 5.4:kernel-default-5.14.21-150400.24.170.2.s390x",
          "SUSE Linux Enterprise Micro 5.4:kernel-default-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise Micro 5.4:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.aarch64",
          "SUSE Linux Enterprise Micro 5.4:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-64kb-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-64kb-devel-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-5.14.21-150400.24.170.2.ppc64le",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-5.14.21-150400.24.170.2.s390x",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.aarch64",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.ppc64le",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.170.2.ppc64le",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.170.2.s390x",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-devel-5.14.21-150400.24.170.1.noarch",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-docs-5.14.21-150400.24.170.1.noarch",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-macros-5.14.21-150400.24.170.1.noarch",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.170.2.ppc64le",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.170.2.s390x",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-source-5.14.21-150400.24.170.1.noarch",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.170.1.aarch64",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.170.1.ppc64le",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.170.1.s390x",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.170.1.x86_64",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-zfcpdump-5.14.21-150400.24.170.2.s390x",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.170.2.ppc64le",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.170.2.s390x",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-5.14.21-150400.24.170.2.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-devel-5.14.21-150400.24.170.2.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-devel-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-devel-5.14.21-150400.24.170.1.noarch",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-docs-5.14.21-150400.24.170.1.noarch",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-macros-5.14.21-150400.24.170.1.noarch",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-obs-build-5.14.21-150400.24.170.2.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-obs-build-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-source-5.14.21-150400.24.170.1.noarch",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-syms-5.14.21-150400.24.170.1.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-syms-5.14.21-150400.24.170.1.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.170.2.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.170.2.x86_64",
          "SUSE Manager Proxy 4.3:kernel-default-5.14.21-150400.24.170.2.x86_64",
          "SUSE Manager Proxy 4.3:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
          "SUSE Manager Proxy 4.3:kernel-default-devel-5.14.21-150400.24.170.2.x86_64",
          "SUSE Manager Proxy 4.3:kernel-devel-5.14.21-150400.24.170.1.noarch",
          "SUSE Manager Proxy 4.3:kernel-macros-5.14.21-150400.24.170.1.noarch",
          "SUSE Manager Proxy 4.3:kernel-source-5.14.21-150400.24.170.1.noarch",
          "SUSE Manager Proxy 4.3:kernel-syms-5.14.21-150400.24.170.1.x86_64",
          "SUSE Manager Server 4.3:kernel-default-5.14.21-150400.24.170.2.ppc64le",
          "SUSE Manager Server 4.3:kernel-default-5.14.21-150400.24.170.2.s390x",
          "SUSE Manager Server 4.3:kernel-default-5.14.21-150400.24.170.2.x86_64",
          "SUSE Manager Server 4.3:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.ppc64le",
          "SUSE Manager Server 4.3:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
          "SUSE Manager Server 4.3:kernel-default-devel-5.14.21-150400.24.170.2.ppc64le",
          "SUSE Manager Server 4.3:kernel-default-devel-5.14.21-150400.24.170.2.s390x",
          "SUSE Manager Server 4.3:kernel-default-devel-5.14.21-150400.24.170.2.x86_64",
          "SUSE Manager Server 4.3:kernel-devel-5.14.21-150400.24.170.1.noarch",
          "SUSE Manager Server 4.3:kernel-macros-5.14.21-150400.24.170.1.noarch",
          "SUSE Manager Server 4.3:kernel-source-5.14.21-150400.24.170.1.noarch",
          "SUSE Manager Server 4.3:kernel-syms-5.14.21-150400.24.170.1.ppc64le",
          "SUSE Manager Server 4.3:kernel-syms-5.14.21-150400.24.170.1.s390x",
          "SUSE Manager Server 4.3:kernel-syms-5.14.21-150400.24.170.1.x86_64",
          "SUSE Manager Server 4.3:kernel-zfcpdump-5.14.21-150400.24.170.2.s390x"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2022-50187",
          "url": "https://www.suse.com/security/cve/CVE-2022-50187"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1244890 for CVE-2022-50187",
          "url": "https://bugzilla.suse.com/1244890"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-64kb-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-64kb-devel-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-devel-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-devel-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-devel-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-docs-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-macros-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-obs-build-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-obs-build-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-source-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-syms-5.14.21-150400.24.170.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-syms-5.14.21-150400.24.170.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:reiserfs-kmp-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:reiserfs-kmp-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-64kb-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-64kb-devel-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-devel-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-docs-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-macros-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-source-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.170.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.170.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_170-default-1-150400.9.3.2.ppc64le",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_170-default-1-150400.9.3.2.s390x",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_170-default-1-150400.9.3.2.x86_64",
            "SUSE Linux Enterprise Micro 5.3:kernel-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise Micro 5.3:kernel-default-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise Micro 5.3:kernel-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Micro 5.3:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.aarch64",
            "SUSE Linux Enterprise Micro 5.3:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
            "SUSE Linux Enterprise Micro 5.4:kernel-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise Micro 5.4:kernel-default-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise Micro 5.4:kernel-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Micro 5.4:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.aarch64",
            "SUSE Linux Enterprise Micro 5.4:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-64kb-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-64kb-devel-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.aarch64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.ppc64le",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-devel-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-docs-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-macros-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-source-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.170.1.aarch64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.170.1.ppc64le",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.170.1.s390x",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.170.1.x86_64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-zfcpdump-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-devel-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-devel-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-devel-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-docs-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-macros-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-obs-build-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-obs-build-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-source-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-syms-5.14.21-150400.24.170.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-syms-5.14.21-150400.24.170.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Manager Proxy 4.3:kernel-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Manager Proxy 4.3:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
            "SUSE Manager Proxy 4.3:kernel-default-devel-5.14.21-150400.24.170.2.x86_64",
            "SUSE Manager Proxy 4.3:kernel-devel-5.14.21-150400.24.170.1.noarch",
            "SUSE Manager Proxy 4.3:kernel-macros-5.14.21-150400.24.170.1.noarch",
            "SUSE Manager Proxy 4.3:kernel-source-5.14.21-150400.24.170.1.noarch",
            "SUSE Manager Proxy 4.3:kernel-syms-5.14.21-150400.24.170.1.x86_64",
            "SUSE Manager Server 4.3:kernel-default-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Manager Server 4.3:kernel-default-5.14.21-150400.24.170.2.s390x",
            "SUSE Manager Server 4.3:kernel-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Manager Server 4.3:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.ppc64le",
            "SUSE Manager Server 4.3:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
            "SUSE Manager Server 4.3:kernel-default-devel-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Manager Server 4.3:kernel-default-devel-5.14.21-150400.24.170.2.s390x",
            "SUSE Manager Server 4.3:kernel-default-devel-5.14.21-150400.24.170.2.x86_64",
            "SUSE Manager Server 4.3:kernel-devel-5.14.21-150400.24.170.1.noarch",
            "SUSE Manager Server 4.3:kernel-macros-5.14.21-150400.24.170.1.noarch",
            "SUSE Manager Server 4.3:kernel-source-5.14.21-150400.24.170.1.noarch",
            "SUSE Manager Server 4.3:kernel-syms-5.14.21-150400.24.170.1.ppc64le",
            "SUSE Manager Server 4.3:kernel-syms-5.14.21-150400.24.170.1.s390x",
            "SUSE Manager Server 4.3:kernel-syms-5.14.21-150400.24.170.1.x86_64",
            "SUSE Manager Server 4.3:kernel-zfcpdump-5.14.21-150400.24.170.2.s390x"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 5.5,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
            "version": "3.1"
          },
          "products": [
            "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-64kb-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-64kb-devel-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-devel-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-devel-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-devel-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-docs-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-macros-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-obs-build-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-obs-build-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-source-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-syms-5.14.21-150400.24.170.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-syms-5.14.21-150400.24.170.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:reiserfs-kmp-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:reiserfs-kmp-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-64kb-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-64kb-devel-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-devel-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-docs-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-macros-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-source-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.170.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.170.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_170-default-1-150400.9.3.2.ppc64le",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_170-default-1-150400.9.3.2.s390x",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_170-default-1-150400.9.3.2.x86_64",
            "SUSE Linux Enterprise Micro 5.3:kernel-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise Micro 5.3:kernel-default-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise Micro 5.3:kernel-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Micro 5.3:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.aarch64",
            "SUSE Linux Enterprise Micro 5.3:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
            "SUSE Linux Enterprise Micro 5.4:kernel-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise Micro 5.4:kernel-default-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise Micro 5.4:kernel-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Micro 5.4:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.aarch64",
            "SUSE Linux Enterprise Micro 5.4:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-64kb-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-64kb-devel-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.aarch64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.ppc64le",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-devel-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-docs-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-macros-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-source-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.170.1.aarch64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.170.1.ppc64le",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.170.1.s390x",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.170.1.x86_64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-zfcpdump-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-devel-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-devel-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-devel-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-docs-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-macros-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-obs-build-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-obs-build-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-source-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-syms-5.14.21-150400.24.170.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-syms-5.14.21-150400.24.170.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Manager Proxy 4.3:kernel-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Manager Proxy 4.3:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
            "SUSE Manager Proxy 4.3:kernel-default-devel-5.14.21-150400.24.170.2.x86_64",
            "SUSE Manager Proxy 4.3:kernel-devel-5.14.21-150400.24.170.1.noarch",
            "SUSE Manager Proxy 4.3:kernel-macros-5.14.21-150400.24.170.1.noarch",
            "SUSE Manager Proxy 4.3:kernel-source-5.14.21-150400.24.170.1.noarch",
            "SUSE Manager Proxy 4.3:kernel-syms-5.14.21-150400.24.170.1.x86_64",
            "SUSE Manager Server 4.3:kernel-default-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Manager Server 4.3:kernel-default-5.14.21-150400.24.170.2.s390x",
            "SUSE Manager Server 4.3:kernel-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Manager Server 4.3:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.ppc64le",
            "SUSE Manager Server 4.3:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
            "SUSE Manager Server 4.3:kernel-default-devel-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Manager Server 4.3:kernel-default-devel-5.14.21-150400.24.170.2.s390x",
            "SUSE Manager Server 4.3:kernel-default-devel-5.14.21-150400.24.170.2.x86_64",
            "SUSE Manager Server 4.3:kernel-devel-5.14.21-150400.24.170.1.noarch",
            "SUSE Manager Server 4.3:kernel-macros-5.14.21-150400.24.170.1.noarch",
            "SUSE Manager Server 4.3:kernel-source-5.14.21-150400.24.170.1.noarch",
            "SUSE Manager Server 4.3:kernel-syms-5.14.21-150400.24.170.1.ppc64le",
            "SUSE Manager Server 4.3:kernel-syms-5.14.21-150400.24.170.1.s390x",
            "SUSE Manager Server 4.3:kernel-syms-5.14.21-150400.24.170.1.x86_64",
            "SUSE Manager Server 4.3:kernel-zfcpdump-5.14.21-150400.24.170.2.s390x"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2025-07-28T15:09:33Z",
          "details": "moderate"
        }
      ],
      "title": "CVE-2022-50187"
    },
    {
      "cve": "CVE-2022-50190",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2022-50190"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "In the Linux kernel, the following vulnerability has been resolved:\n\nspi: Fix simplification of devm_spi_register_controller\n\nThis reverts commit 59ebbe40fb51 (\"spi: simplify\ndevm_spi_register_controller\").\n\nIf devm_add_action() fails in devm_add_action_or_reset(),\ndevm_spi_unregister() will be called, it decreases the\nrefcount of \u0027ctlr-\u003edev\u0027 to 0, then it will cause uaf in\nthe drivers that calling spi_put_controller() in error path.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.170.2.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.170.2.s390x",
          "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.170.2.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.170.2.s390x",
          "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.170.2.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.170.2.s390x",
          "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.170.2.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.170.2.s390x",
          "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-64kb-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-64kb-devel-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-devel-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-devel-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-devel-5.14.21-150400.24.170.1.noarch",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-docs-5.14.21-150400.24.170.1.noarch",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-macros-5.14.21-150400.24.170.1.noarch",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-obs-build-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-obs-build-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-source-5.14.21-150400.24.170.1.noarch",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-syms-5.14.21-150400.24.170.1.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-syms-5.14.21-150400.24.170.1.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:reiserfs-kmp-default-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:reiserfs-kmp-default-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-64kb-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-64kb-devel-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-devel-5.14.21-150400.24.170.1.noarch",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-docs-5.14.21-150400.24.170.1.noarch",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-macros-5.14.21-150400.24.170.1.noarch",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-source-5.14.21-150400.24.170.1.noarch",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.170.1.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.170.1.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.170.2.ppc64le",
          "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.170.2.s390x",
          "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.170.2.ppc64le",
          "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.170.2.s390x",
          "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_170-default-1-150400.9.3.2.ppc64le",
          "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_170-default-1-150400.9.3.2.s390x",
          "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_170-default-1-150400.9.3.2.x86_64",
          "SUSE Linux Enterprise Micro 5.3:kernel-default-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise Micro 5.3:kernel-default-5.14.21-150400.24.170.2.s390x",
          "SUSE Linux Enterprise Micro 5.3:kernel-default-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise Micro 5.3:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.aarch64",
          "SUSE Linux Enterprise Micro 5.3:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
          "SUSE Linux Enterprise Micro 5.4:kernel-default-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise Micro 5.4:kernel-default-5.14.21-150400.24.170.2.s390x",
          "SUSE Linux Enterprise Micro 5.4:kernel-default-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise Micro 5.4:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.aarch64",
          "SUSE Linux Enterprise Micro 5.4:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-64kb-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-64kb-devel-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-5.14.21-150400.24.170.2.ppc64le",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-5.14.21-150400.24.170.2.s390x",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.aarch64",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.ppc64le",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.170.2.ppc64le",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.170.2.s390x",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-devel-5.14.21-150400.24.170.1.noarch",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-docs-5.14.21-150400.24.170.1.noarch",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-macros-5.14.21-150400.24.170.1.noarch",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.170.2.ppc64le",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.170.2.s390x",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-source-5.14.21-150400.24.170.1.noarch",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.170.1.aarch64",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.170.1.ppc64le",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.170.1.s390x",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.170.1.x86_64",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-zfcpdump-5.14.21-150400.24.170.2.s390x",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.170.2.ppc64le",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.170.2.s390x",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-5.14.21-150400.24.170.2.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-devel-5.14.21-150400.24.170.2.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-devel-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-devel-5.14.21-150400.24.170.1.noarch",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-docs-5.14.21-150400.24.170.1.noarch",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-macros-5.14.21-150400.24.170.1.noarch",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-obs-build-5.14.21-150400.24.170.2.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-obs-build-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-source-5.14.21-150400.24.170.1.noarch",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-syms-5.14.21-150400.24.170.1.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-syms-5.14.21-150400.24.170.1.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.170.2.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.170.2.x86_64",
          "SUSE Manager Proxy 4.3:kernel-default-5.14.21-150400.24.170.2.x86_64",
          "SUSE Manager Proxy 4.3:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
          "SUSE Manager Proxy 4.3:kernel-default-devel-5.14.21-150400.24.170.2.x86_64",
          "SUSE Manager Proxy 4.3:kernel-devel-5.14.21-150400.24.170.1.noarch",
          "SUSE Manager Proxy 4.3:kernel-macros-5.14.21-150400.24.170.1.noarch",
          "SUSE Manager Proxy 4.3:kernel-source-5.14.21-150400.24.170.1.noarch",
          "SUSE Manager Proxy 4.3:kernel-syms-5.14.21-150400.24.170.1.x86_64",
          "SUSE Manager Server 4.3:kernel-default-5.14.21-150400.24.170.2.ppc64le",
          "SUSE Manager Server 4.3:kernel-default-5.14.21-150400.24.170.2.s390x",
          "SUSE Manager Server 4.3:kernel-default-5.14.21-150400.24.170.2.x86_64",
          "SUSE Manager Server 4.3:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.ppc64le",
          "SUSE Manager Server 4.3:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
          "SUSE Manager Server 4.3:kernel-default-devel-5.14.21-150400.24.170.2.ppc64le",
          "SUSE Manager Server 4.3:kernel-default-devel-5.14.21-150400.24.170.2.s390x",
          "SUSE Manager Server 4.3:kernel-default-devel-5.14.21-150400.24.170.2.x86_64",
          "SUSE Manager Server 4.3:kernel-devel-5.14.21-150400.24.170.1.noarch",
          "SUSE Manager Server 4.3:kernel-macros-5.14.21-150400.24.170.1.noarch",
          "SUSE Manager Server 4.3:kernel-source-5.14.21-150400.24.170.1.noarch",
          "SUSE Manager Server 4.3:kernel-syms-5.14.21-150400.24.170.1.ppc64le",
          "SUSE Manager Server 4.3:kernel-syms-5.14.21-150400.24.170.1.s390x",
          "SUSE Manager Server 4.3:kernel-syms-5.14.21-150400.24.170.1.x86_64",
          "SUSE Manager Server 4.3:kernel-zfcpdump-5.14.21-150400.24.170.2.s390x"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2022-50190",
          "url": "https://www.suse.com/security/cve/CVE-2022-50190"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1244895 for CVE-2022-50190",
          "url": "https://bugzilla.suse.com/1244895"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-64kb-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-64kb-devel-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-devel-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-devel-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-devel-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-docs-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-macros-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-obs-build-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-obs-build-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-source-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-syms-5.14.21-150400.24.170.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-syms-5.14.21-150400.24.170.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:reiserfs-kmp-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:reiserfs-kmp-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-64kb-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-64kb-devel-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-devel-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-docs-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-macros-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-source-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.170.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.170.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_170-default-1-150400.9.3.2.ppc64le",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_170-default-1-150400.9.3.2.s390x",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_170-default-1-150400.9.3.2.x86_64",
            "SUSE Linux Enterprise Micro 5.3:kernel-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise Micro 5.3:kernel-default-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise Micro 5.3:kernel-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Micro 5.3:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.aarch64",
            "SUSE Linux Enterprise Micro 5.3:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
            "SUSE Linux Enterprise Micro 5.4:kernel-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise Micro 5.4:kernel-default-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise Micro 5.4:kernel-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Micro 5.4:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.aarch64",
            "SUSE Linux Enterprise Micro 5.4:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-64kb-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-64kb-devel-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.aarch64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.ppc64le",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-devel-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-docs-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-macros-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-source-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.170.1.aarch64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.170.1.ppc64le",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.170.1.s390x",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.170.1.x86_64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-zfcpdump-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-devel-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-devel-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-devel-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-docs-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-macros-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-obs-build-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-obs-build-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-source-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-syms-5.14.21-150400.24.170.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-syms-5.14.21-150400.24.170.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Manager Proxy 4.3:kernel-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Manager Proxy 4.3:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
            "SUSE Manager Proxy 4.3:kernel-default-devel-5.14.21-150400.24.170.2.x86_64",
            "SUSE Manager Proxy 4.3:kernel-devel-5.14.21-150400.24.170.1.noarch",
            "SUSE Manager Proxy 4.3:kernel-macros-5.14.21-150400.24.170.1.noarch",
            "SUSE Manager Proxy 4.3:kernel-source-5.14.21-150400.24.170.1.noarch",
            "SUSE Manager Proxy 4.3:kernel-syms-5.14.21-150400.24.170.1.x86_64",
            "SUSE Manager Server 4.3:kernel-default-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Manager Server 4.3:kernel-default-5.14.21-150400.24.170.2.s390x",
            "SUSE Manager Server 4.3:kernel-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Manager Server 4.3:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.ppc64le",
            "SUSE Manager Server 4.3:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
            "SUSE Manager Server 4.3:kernel-default-devel-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Manager Server 4.3:kernel-default-devel-5.14.21-150400.24.170.2.s390x",
            "SUSE Manager Server 4.3:kernel-default-devel-5.14.21-150400.24.170.2.x86_64",
            "SUSE Manager Server 4.3:kernel-devel-5.14.21-150400.24.170.1.noarch",
            "SUSE Manager Server 4.3:kernel-macros-5.14.21-150400.24.170.1.noarch",
            "SUSE Manager Server 4.3:kernel-source-5.14.21-150400.24.170.1.noarch",
            "SUSE Manager Server 4.3:kernel-syms-5.14.21-150400.24.170.1.ppc64le",
            "SUSE Manager Server 4.3:kernel-syms-5.14.21-150400.24.170.1.s390x",
            "SUSE Manager Server 4.3:kernel-syms-5.14.21-150400.24.170.1.x86_64",
            "SUSE Manager Server 4.3:kernel-zfcpdump-5.14.21-150400.24.170.2.s390x"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 5.5,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
            "version": "3.1"
          },
          "products": [
            "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-64kb-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-64kb-devel-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-devel-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-devel-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-devel-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-docs-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-macros-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-obs-build-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-obs-build-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-source-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-syms-5.14.21-150400.24.170.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-syms-5.14.21-150400.24.170.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:reiserfs-kmp-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:reiserfs-kmp-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-64kb-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-64kb-devel-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-devel-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-docs-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-macros-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-source-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.170.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.170.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_170-default-1-150400.9.3.2.ppc64le",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_170-default-1-150400.9.3.2.s390x",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_170-default-1-150400.9.3.2.x86_64",
            "SUSE Linux Enterprise Micro 5.3:kernel-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise Micro 5.3:kernel-default-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise Micro 5.3:kernel-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Micro 5.3:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.aarch64",
            "SUSE Linux Enterprise Micro 5.3:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
            "SUSE Linux Enterprise Micro 5.4:kernel-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise Micro 5.4:kernel-default-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise Micro 5.4:kernel-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Micro 5.4:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.aarch64",
            "SUSE Linux Enterprise Micro 5.4:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-64kb-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-64kb-devel-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.aarch64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.ppc64le",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-devel-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-docs-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-macros-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-source-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.170.1.aarch64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.170.1.ppc64le",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.170.1.s390x",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.170.1.x86_64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-zfcpdump-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-devel-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-devel-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-devel-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-docs-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-macros-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-obs-build-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-obs-build-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-source-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-syms-5.14.21-150400.24.170.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-syms-5.14.21-150400.24.170.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Manager Proxy 4.3:kernel-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Manager Proxy 4.3:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
            "SUSE Manager Proxy 4.3:kernel-default-devel-5.14.21-150400.24.170.2.x86_64",
            "SUSE Manager Proxy 4.3:kernel-devel-5.14.21-150400.24.170.1.noarch",
            "SUSE Manager Proxy 4.3:kernel-macros-5.14.21-150400.24.170.1.noarch",
            "SUSE Manager Proxy 4.3:kernel-source-5.14.21-150400.24.170.1.noarch",
            "SUSE Manager Proxy 4.3:kernel-syms-5.14.21-150400.24.170.1.x86_64",
            "SUSE Manager Server 4.3:kernel-default-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Manager Server 4.3:kernel-default-5.14.21-150400.24.170.2.s390x",
            "SUSE Manager Server 4.3:kernel-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Manager Server 4.3:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.ppc64le",
            "SUSE Manager Server 4.3:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
            "SUSE Manager Server 4.3:kernel-default-devel-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Manager Server 4.3:kernel-default-devel-5.14.21-150400.24.170.2.s390x",
            "SUSE Manager Server 4.3:kernel-default-devel-5.14.21-150400.24.170.2.x86_64",
            "SUSE Manager Server 4.3:kernel-devel-5.14.21-150400.24.170.1.noarch",
            "SUSE Manager Server 4.3:kernel-macros-5.14.21-150400.24.170.1.noarch",
            "SUSE Manager Server 4.3:kernel-source-5.14.21-150400.24.170.1.noarch",
            "SUSE Manager Server 4.3:kernel-syms-5.14.21-150400.24.170.1.ppc64le",
            "SUSE Manager Server 4.3:kernel-syms-5.14.21-150400.24.170.1.s390x",
            "SUSE Manager Server 4.3:kernel-syms-5.14.21-150400.24.170.1.x86_64",
            "SUSE Manager Server 4.3:kernel-zfcpdump-5.14.21-150400.24.170.2.s390x"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2025-07-28T15:09:33Z",
          "details": "moderate"
        }
      ],
      "title": "CVE-2022-50190"
    },
    {
      "cve": "CVE-2022-50191",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2022-50191"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "In the Linux kernel, the following vulnerability has been resolved:\n\nregulator: of: Fix refcount leak bug in of_get_regulation_constraints()\n\nWe should call the of_node_put() for the reference returned by\nof_get_child_by_name() which has increased the refcount.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.170.2.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.170.2.s390x",
          "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.170.2.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.170.2.s390x",
          "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.170.2.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.170.2.s390x",
          "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.170.2.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.170.2.s390x",
          "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-64kb-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-64kb-devel-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-devel-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-devel-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-devel-5.14.21-150400.24.170.1.noarch",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-docs-5.14.21-150400.24.170.1.noarch",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-macros-5.14.21-150400.24.170.1.noarch",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-obs-build-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-obs-build-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-source-5.14.21-150400.24.170.1.noarch",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-syms-5.14.21-150400.24.170.1.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-syms-5.14.21-150400.24.170.1.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:reiserfs-kmp-default-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:reiserfs-kmp-default-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-64kb-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-64kb-devel-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-devel-5.14.21-150400.24.170.1.noarch",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-docs-5.14.21-150400.24.170.1.noarch",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-macros-5.14.21-150400.24.170.1.noarch",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-source-5.14.21-150400.24.170.1.noarch",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.170.1.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.170.1.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.170.2.ppc64le",
          "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.170.2.s390x",
          "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.170.2.ppc64le",
          "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.170.2.s390x",
          "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_170-default-1-150400.9.3.2.ppc64le",
          "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_170-default-1-150400.9.3.2.s390x",
          "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_170-default-1-150400.9.3.2.x86_64",
          "SUSE Linux Enterprise Micro 5.3:kernel-default-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise Micro 5.3:kernel-default-5.14.21-150400.24.170.2.s390x",
          "SUSE Linux Enterprise Micro 5.3:kernel-default-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise Micro 5.3:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.aarch64",
          "SUSE Linux Enterprise Micro 5.3:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
          "SUSE Linux Enterprise Micro 5.4:kernel-default-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise Micro 5.4:kernel-default-5.14.21-150400.24.170.2.s390x",
          "SUSE Linux Enterprise Micro 5.4:kernel-default-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise Micro 5.4:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.aarch64",
          "SUSE Linux Enterprise Micro 5.4:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-64kb-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-64kb-devel-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-5.14.21-150400.24.170.2.ppc64le",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-5.14.21-150400.24.170.2.s390x",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.aarch64",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.ppc64le",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.170.2.ppc64le",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.170.2.s390x",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-devel-5.14.21-150400.24.170.1.noarch",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-docs-5.14.21-150400.24.170.1.noarch",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-macros-5.14.21-150400.24.170.1.noarch",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.170.2.ppc64le",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.170.2.s390x",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-source-5.14.21-150400.24.170.1.noarch",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.170.1.aarch64",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.170.1.ppc64le",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.170.1.s390x",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.170.1.x86_64",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-zfcpdump-5.14.21-150400.24.170.2.s390x",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.170.2.ppc64le",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.170.2.s390x",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-5.14.21-150400.24.170.2.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-devel-5.14.21-150400.24.170.2.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-devel-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-devel-5.14.21-150400.24.170.1.noarch",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-docs-5.14.21-150400.24.170.1.noarch",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-macros-5.14.21-150400.24.170.1.noarch",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-obs-build-5.14.21-150400.24.170.2.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-obs-build-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-source-5.14.21-150400.24.170.1.noarch",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-syms-5.14.21-150400.24.170.1.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-syms-5.14.21-150400.24.170.1.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.170.2.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.170.2.x86_64",
          "SUSE Manager Proxy 4.3:kernel-default-5.14.21-150400.24.170.2.x86_64",
          "SUSE Manager Proxy 4.3:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
          "SUSE Manager Proxy 4.3:kernel-default-devel-5.14.21-150400.24.170.2.x86_64",
          "SUSE Manager Proxy 4.3:kernel-devel-5.14.21-150400.24.170.1.noarch",
          "SUSE Manager Proxy 4.3:kernel-macros-5.14.21-150400.24.170.1.noarch",
          "SUSE Manager Proxy 4.3:kernel-source-5.14.21-150400.24.170.1.noarch",
          "SUSE Manager Proxy 4.3:kernel-syms-5.14.21-150400.24.170.1.x86_64",
          "SUSE Manager Server 4.3:kernel-default-5.14.21-150400.24.170.2.ppc64le",
          "SUSE Manager Server 4.3:kernel-default-5.14.21-150400.24.170.2.s390x",
          "SUSE Manager Server 4.3:kernel-default-5.14.21-150400.24.170.2.x86_64",
          "SUSE Manager Server 4.3:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.ppc64le",
          "SUSE Manager Server 4.3:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
          "SUSE Manager Server 4.3:kernel-default-devel-5.14.21-150400.24.170.2.ppc64le",
          "SUSE Manager Server 4.3:kernel-default-devel-5.14.21-150400.24.170.2.s390x",
          "SUSE Manager Server 4.3:kernel-default-devel-5.14.21-150400.24.170.2.x86_64",
          "SUSE Manager Server 4.3:kernel-devel-5.14.21-150400.24.170.1.noarch",
          "SUSE Manager Server 4.3:kernel-macros-5.14.21-150400.24.170.1.noarch",
          "SUSE Manager Server 4.3:kernel-source-5.14.21-150400.24.170.1.noarch",
          "SUSE Manager Server 4.3:kernel-syms-5.14.21-150400.24.170.1.ppc64le",
          "SUSE Manager Server 4.3:kernel-syms-5.14.21-150400.24.170.1.s390x",
          "SUSE Manager Server 4.3:kernel-syms-5.14.21-150400.24.170.1.x86_64",
          "SUSE Manager Server 4.3:kernel-zfcpdump-5.14.21-150400.24.170.2.s390x"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2022-50191",
          "url": "https://www.suse.com/security/cve/CVE-2022-50191"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1244899 for CVE-2022-50191",
          "url": "https://bugzilla.suse.com/1244899"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-64kb-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-64kb-devel-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-devel-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-devel-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-devel-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-docs-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-macros-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-obs-build-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-obs-build-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-source-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-syms-5.14.21-150400.24.170.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-syms-5.14.21-150400.24.170.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:reiserfs-kmp-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:reiserfs-kmp-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-64kb-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-64kb-devel-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-devel-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-docs-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-macros-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-source-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.170.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.170.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_170-default-1-150400.9.3.2.ppc64le",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_170-default-1-150400.9.3.2.s390x",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_170-default-1-150400.9.3.2.x86_64",
            "SUSE Linux Enterprise Micro 5.3:kernel-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise Micro 5.3:kernel-default-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise Micro 5.3:kernel-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Micro 5.3:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.aarch64",
            "SUSE Linux Enterprise Micro 5.3:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
            "SUSE Linux Enterprise Micro 5.4:kernel-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise Micro 5.4:kernel-default-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise Micro 5.4:kernel-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Micro 5.4:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.aarch64",
            "SUSE Linux Enterprise Micro 5.4:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-64kb-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-64kb-devel-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.aarch64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.ppc64le",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-devel-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-docs-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-macros-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-source-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.170.1.aarch64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.170.1.ppc64le",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.170.1.s390x",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.170.1.x86_64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-zfcpdump-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-devel-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-devel-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-devel-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-docs-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-macros-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-obs-build-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-obs-build-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-source-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-syms-5.14.21-150400.24.170.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-syms-5.14.21-150400.24.170.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Manager Proxy 4.3:kernel-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Manager Proxy 4.3:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
            "SUSE Manager Proxy 4.3:kernel-default-devel-5.14.21-150400.24.170.2.x86_64",
            "SUSE Manager Proxy 4.3:kernel-devel-5.14.21-150400.24.170.1.noarch",
            "SUSE Manager Proxy 4.3:kernel-macros-5.14.21-150400.24.170.1.noarch",
            "SUSE Manager Proxy 4.3:kernel-source-5.14.21-150400.24.170.1.noarch",
            "SUSE Manager Proxy 4.3:kernel-syms-5.14.21-150400.24.170.1.x86_64",
            "SUSE Manager Server 4.3:kernel-default-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Manager Server 4.3:kernel-default-5.14.21-150400.24.170.2.s390x",
            "SUSE Manager Server 4.3:kernel-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Manager Server 4.3:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.ppc64le",
            "SUSE Manager Server 4.3:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
            "SUSE Manager Server 4.3:kernel-default-devel-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Manager Server 4.3:kernel-default-devel-5.14.21-150400.24.170.2.s390x",
            "SUSE Manager Server 4.3:kernel-default-devel-5.14.21-150400.24.170.2.x86_64",
            "SUSE Manager Server 4.3:kernel-devel-5.14.21-150400.24.170.1.noarch",
            "SUSE Manager Server 4.3:kernel-macros-5.14.21-150400.24.170.1.noarch",
            "SUSE Manager Server 4.3:kernel-source-5.14.21-150400.24.170.1.noarch",
            "SUSE Manager Server 4.3:kernel-syms-5.14.21-150400.24.170.1.ppc64le",
            "SUSE Manager Server 4.3:kernel-syms-5.14.21-150400.24.170.1.s390x",
            "SUSE Manager Server 4.3:kernel-syms-5.14.21-150400.24.170.1.x86_64",
            "SUSE Manager Server 4.3:kernel-zfcpdump-5.14.21-150400.24.170.2.s390x"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 5.5,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
            "version": "3.1"
          },
          "products": [
            "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-64kb-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-64kb-devel-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-devel-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-devel-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-devel-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-docs-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-macros-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-obs-build-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-obs-build-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-source-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-syms-5.14.21-150400.24.170.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-syms-5.14.21-150400.24.170.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:reiserfs-kmp-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:reiserfs-kmp-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-64kb-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-64kb-devel-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-devel-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-docs-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-macros-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-source-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.170.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.170.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_170-default-1-150400.9.3.2.ppc64le",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_170-default-1-150400.9.3.2.s390x",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_170-default-1-150400.9.3.2.x86_64",
            "SUSE Linux Enterprise Micro 5.3:kernel-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise Micro 5.3:kernel-default-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise Micro 5.3:kernel-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Micro 5.3:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.aarch64",
            "SUSE Linux Enterprise Micro 5.3:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
            "SUSE Linux Enterprise Micro 5.4:kernel-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise Micro 5.4:kernel-default-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise Micro 5.4:kernel-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Micro 5.4:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.aarch64",
            "SUSE Linux Enterprise Micro 5.4:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-64kb-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-64kb-devel-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.aarch64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.ppc64le",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-devel-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-docs-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-macros-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-source-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.170.1.aarch64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.170.1.ppc64le",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.170.1.s390x",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.170.1.x86_64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-zfcpdump-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-devel-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-devel-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-devel-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-docs-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-macros-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-obs-build-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-obs-build-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-source-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-syms-5.14.21-150400.24.170.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-syms-5.14.21-150400.24.170.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Manager Proxy 4.3:kernel-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Manager Proxy 4.3:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
            "SUSE Manager Proxy 4.3:kernel-default-devel-5.14.21-150400.24.170.2.x86_64",
            "SUSE Manager Proxy 4.3:kernel-devel-5.14.21-150400.24.170.1.noarch",
            "SUSE Manager Proxy 4.3:kernel-macros-5.14.21-150400.24.170.1.noarch",
            "SUSE Manager Proxy 4.3:kernel-source-5.14.21-150400.24.170.1.noarch",
            "SUSE Manager Proxy 4.3:kernel-syms-5.14.21-150400.24.170.1.x86_64",
            "SUSE Manager Server 4.3:kernel-default-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Manager Server 4.3:kernel-default-5.14.21-150400.24.170.2.s390x",
            "SUSE Manager Server 4.3:kernel-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Manager Server 4.3:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.ppc64le",
            "SUSE Manager Server 4.3:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
            "SUSE Manager Server 4.3:kernel-default-devel-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Manager Server 4.3:kernel-default-devel-5.14.21-150400.24.170.2.s390x",
            "SUSE Manager Server 4.3:kernel-default-devel-5.14.21-150400.24.170.2.x86_64",
            "SUSE Manager Server 4.3:kernel-devel-5.14.21-150400.24.170.1.noarch",
            "SUSE Manager Server 4.3:kernel-macros-5.14.21-150400.24.170.1.noarch",
            "SUSE Manager Server 4.3:kernel-source-5.14.21-150400.24.170.1.noarch",
            "SUSE Manager Server 4.3:kernel-syms-5.14.21-150400.24.170.1.ppc64le",
            "SUSE Manager Server 4.3:kernel-syms-5.14.21-150400.24.170.1.s390x",
            "SUSE Manager Server 4.3:kernel-syms-5.14.21-150400.24.170.1.x86_64",
            "SUSE Manager Server 4.3:kernel-zfcpdump-5.14.21-150400.24.170.2.s390x"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2025-07-28T15:09:33Z",
          "details": "moderate"
        }
      ],
      "title": "CVE-2022-50191"
    },
    {
      "cve": "CVE-2022-50192",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2022-50192"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "In the Linux kernel, the following vulnerability has been resolved:\n\nspi: tegra20-slink: fix UAF in tegra_slink_remove()\n\nAfter calling spi_unregister_master(), the refcount of master will\nbe decrease to 0, and it will be freed in spi_controller_release(),\nthe device data also will be freed, so it will lead a UAF when using\n\u0027tspi\u0027. To fix this, get the master before unregister and put it when\nfinish using it.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.170.2.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.170.2.s390x",
          "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.170.2.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.170.2.s390x",
          "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.170.2.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.170.2.s390x",
          "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.170.2.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.170.2.s390x",
          "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-64kb-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-64kb-devel-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-devel-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-devel-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-devel-5.14.21-150400.24.170.1.noarch",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-docs-5.14.21-150400.24.170.1.noarch",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-macros-5.14.21-150400.24.170.1.noarch",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-obs-build-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-obs-build-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-source-5.14.21-150400.24.170.1.noarch",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-syms-5.14.21-150400.24.170.1.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-syms-5.14.21-150400.24.170.1.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:reiserfs-kmp-default-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:reiserfs-kmp-default-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-64kb-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-64kb-devel-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-devel-5.14.21-150400.24.170.1.noarch",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-docs-5.14.21-150400.24.170.1.noarch",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-macros-5.14.21-150400.24.170.1.noarch",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-source-5.14.21-150400.24.170.1.noarch",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.170.1.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.170.1.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.170.2.ppc64le",
          "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.170.2.s390x",
          "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.170.2.ppc64le",
          "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.170.2.s390x",
          "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_170-default-1-150400.9.3.2.ppc64le",
          "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_170-default-1-150400.9.3.2.s390x",
          "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_170-default-1-150400.9.3.2.x86_64",
          "SUSE Linux Enterprise Micro 5.3:kernel-default-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise Micro 5.3:kernel-default-5.14.21-150400.24.170.2.s390x",
          "SUSE Linux Enterprise Micro 5.3:kernel-default-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise Micro 5.3:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.aarch64",
          "SUSE Linux Enterprise Micro 5.3:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
          "SUSE Linux Enterprise Micro 5.4:kernel-default-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise Micro 5.4:kernel-default-5.14.21-150400.24.170.2.s390x",
          "SUSE Linux Enterprise Micro 5.4:kernel-default-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise Micro 5.4:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.aarch64",
          "SUSE Linux Enterprise Micro 5.4:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-64kb-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-64kb-devel-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-5.14.21-150400.24.170.2.ppc64le",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-5.14.21-150400.24.170.2.s390x",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.aarch64",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.ppc64le",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.170.2.ppc64le",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.170.2.s390x",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-devel-5.14.21-150400.24.170.1.noarch",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-docs-5.14.21-150400.24.170.1.noarch",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-macros-5.14.21-150400.24.170.1.noarch",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.170.2.ppc64le",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.170.2.s390x",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-source-5.14.21-150400.24.170.1.noarch",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.170.1.aarch64",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.170.1.ppc64le",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.170.1.s390x",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.170.1.x86_64",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-zfcpdump-5.14.21-150400.24.170.2.s390x",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.170.2.ppc64le",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.170.2.s390x",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-5.14.21-150400.24.170.2.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-devel-5.14.21-150400.24.170.2.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-devel-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-devel-5.14.21-150400.24.170.1.noarch",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-docs-5.14.21-150400.24.170.1.noarch",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-macros-5.14.21-150400.24.170.1.noarch",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-obs-build-5.14.21-150400.24.170.2.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-obs-build-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-source-5.14.21-150400.24.170.1.noarch",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-syms-5.14.21-150400.24.170.1.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-syms-5.14.21-150400.24.170.1.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.170.2.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.170.2.x86_64",
          "SUSE Manager Proxy 4.3:kernel-default-5.14.21-150400.24.170.2.x86_64",
          "SUSE Manager Proxy 4.3:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
          "SUSE Manager Proxy 4.3:kernel-default-devel-5.14.21-150400.24.170.2.x86_64",
          "SUSE Manager Proxy 4.3:kernel-devel-5.14.21-150400.24.170.1.noarch",
          "SUSE Manager Proxy 4.3:kernel-macros-5.14.21-150400.24.170.1.noarch",
          "SUSE Manager Proxy 4.3:kernel-source-5.14.21-150400.24.170.1.noarch",
          "SUSE Manager Proxy 4.3:kernel-syms-5.14.21-150400.24.170.1.x86_64",
          "SUSE Manager Server 4.3:kernel-default-5.14.21-150400.24.170.2.ppc64le",
          "SUSE Manager Server 4.3:kernel-default-5.14.21-150400.24.170.2.s390x",
          "SUSE Manager Server 4.3:kernel-default-5.14.21-150400.24.170.2.x86_64",
          "SUSE Manager Server 4.3:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.ppc64le",
          "SUSE Manager Server 4.3:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
          "SUSE Manager Server 4.3:kernel-default-devel-5.14.21-150400.24.170.2.ppc64le",
          "SUSE Manager Server 4.3:kernel-default-devel-5.14.21-150400.24.170.2.s390x",
          "SUSE Manager Server 4.3:kernel-default-devel-5.14.21-150400.24.170.2.x86_64",
          "SUSE Manager Server 4.3:kernel-devel-5.14.21-150400.24.170.1.noarch",
          "SUSE Manager Server 4.3:kernel-macros-5.14.21-150400.24.170.1.noarch",
          "SUSE Manager Server 4.3:kernel-source-5.14.21-150400.24.170.1.noarch",
          "SUSE Manager Server 4.3:kernel-syms-5.14.21-150400.24.170.1.ppc64le",
          "SUSE Manager Server 4.3:kernel-syms-5.14.21-150400.24.170.1.s390x",
          "SUSE Manager Server 4.3:kernel-syms-5.14.21-150400.24.170.1.x86_64",
          "SUSE Manager Server 4.3:kernel-zfcpdump-5.14.21-150400.24.170.2.s390x"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2022-50192",
          "url": "https://www.suse.com/security/cve/CVE-2022-50192"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1244879 for CVE-2022-50192",
          "url": "https://bugzilla.suse.com/1244879"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-64kb-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-64kb-devel-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-devel-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-devel-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-devel-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-docs-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-macros-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-obs-build-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-obs-build-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-source-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-syms-5.14.21-150400.24.170.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-syms-5.14.21-150400.24.170.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:reiserfs-kmp-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:reiserfs-kmp-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-64kb-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-64kb-devel-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-devel-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-docs-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-macros-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-source-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.170.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.170.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_170-default-1-150400.9.3.2.ppc64le",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_170-default-1-150400.9.3.2.s390x",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_170-default-1-150400.9.3.2.x86_64",
            "SUSE Linux Enterprise Micro 5.3:kernel-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise Micro 5.3:kernel-default-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise Micro 5.3:kernel-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Micro 5.3:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.aarch64",
            "SUSE Linux Enterprise Micro 5.3:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
            "SUSE Linux Enterprise Micro 5.4:kernel-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise Micro 5.4:kernel-default-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise Micro 5.4:kernel-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Micro 5.4:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.aarch64",
            "SUSE Linux Enterprise Micro 5.4:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-64kb-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-64kb-devel-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.aarch64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.ppc64le",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-devel-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-docs-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-macros-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-source-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.170.1.aarch64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.170.1.ppc64le",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.170.1.s390x",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.170.1.x86_64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-zfcpdump-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-devel-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-devel-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-devel-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-docs-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-macros-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-obs-build-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-obs-build-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-source-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-syms-5.14.21-150400.24.170.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-syms-5.14.21-150400.24.170.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Manager Proxy 4.3:kernel-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Manager Proxy 4.3:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
            "SUSE Manager Proxy 4.3:kernel-default-devel-5.14.21-150400.24.170.2.x86_64",
            "SUSE Manager Proxy 4.3:kernel-devel-5.14.21-150400.24.170.1.noarch",
            "SUSE Manager Proxy 4.3:kernel-macros-5.14.21-150400.24.170.1.noarch",
            "SUSE Manager Proxy 4.3:kernel-source-5.14.21-150400.24.170.1.noarch",
            "SUSE Manager Proxy 4.3:kernel-syms-5.14.21-150400.24.170.1.x86_64",
            "SUSE Manager Server 4.3:kernel-default-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Manager Server 4.3:kernel-default-5.14.21-150400.24.170.2.s390x",
            "SUSE Manager Server 4.3:kernel-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Manager Server 4.3:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.ppc64le",
            "SUSE Manager Server 4.3:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
            "SUSE Manager Server 4.3:kernel-default-devel-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Manager Server 4.3:kernel-default-devel-5.14.21-150400.24.170.2.s390x",
            "SUSE Manager Server 4.3:kernel-default-devel-5.14.21-150400.24.170.2.x86_64",
            "SUSE Manager Server 4.3:kernel-devel-5.14.21-150400.24.170.1.noarch",
            "SUSE Manager Server 4.3:kernel-macros-5.14.21-150400.24.170.1.noarch",
            "SUSE Manager Server 4.3:kernel-source-5.14.21-150400.24.170.1.noarch",
            "SUSE Manager Server 4.3:kernel-syms-5.14.21-150400.24.170.1.ppc64le",
            "SUSE Manager Server 4.3:kernel-syms-5.14.21-150400.24.170.1.s390x",
            "SUSE Manager Server 4.3:kernel-syms-5.14.21-150400.24.170.1.x86_64",
            "SUSE Manager Server 4.3:kernel-zfcpdump-5.14.21-150400.24.170.2.s390x"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 5.5,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
            "version": "3.1"
          },
          "products": [
            "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-64kb-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-64kb-devel-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-devel-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-devel-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-devel-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-docs-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-macros-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-obs-build-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-obs-build-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-source-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-syms-5.14.21-150400.24.170.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-syms-5.14.21-150400.24.170.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:reiserfs-kmp-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:reiserfs-kmp-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-64kb-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-64kb-devel-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-devel-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-docs-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-macros-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-source-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.170.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.170.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_170-default-1-150400.9.3.2.ppc64le",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_170-default-1-150400.9.3.2.s390x",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_170-default-1-150400.9.3.2.x86_64",
            "SUSE Linux Enterprise Micro 5.3:kernel-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise Micro 5.3:kernel-default-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise Micro 5.3:kernel-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Micro 5.3:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.aarch64",
            "SUSE Linux Enterprise Micro 5.3:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
            "SUSE Linux Enterprise Micro 5.4:kernel-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise Micro 5.4:kernel-default-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise Micro 5.4:kernel-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Micro 5.4:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.aarch64",
            "SUSE Linux Enterprise Micro 5.4:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-64kb-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-64kb-devel-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.aarch64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.ppc64le",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-devel-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-docs-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-macros-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-source-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.170.1.aarch64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.170.1.ppc64le",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.170.1.s390x",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.170.1.x86_64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-zfcpdump-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-devel-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-devel-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-devel-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-docs-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-macros-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-obs-build-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-obs-build-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-source-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-syms-5.14.21-150400.24.170.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-syms-5.14.21-150400.24.170.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Manager Proxy 4.3:kernel-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Manager Proxy 4.3:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
            "SUSE Manager Proxy 4.3:kernel-default-devel-5.14.21-150400.24.170.2.x86_64",
            "SUSE Manager Proxy 4.3:kernel-devel-5.14.21-150400.24.170.1.noarch",
            "SUSE Manager Proxy 4.3:kernel-macros-5.14.21-150400.24.170.1.noarch",
            "SUSE Manager Proxy 4.3:kernel-source-5.14.21-150400.24.170.1.noarch",
            "SUSE Manager Proxy 4.3:kernel-syms-5.14.21-150400.24.170.1.x86_64",
            "SUSE Manager Server 4.3:kernel-default-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Manager Server 4.3:kernel-default-5.14.21-150400.24.170.2.s390x",
            "SUSE Manager Server 4.3:kernel-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Manager Server 4.3:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.ppc64le",
            "SUSE Manager Server 4.3:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
            "SUSE Manager Server 4.3:kernel-default-devel-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Manager Server 4.3:kernel-default-devel-5.14.21-150400.24.170.2.s390x",
            "SUSE Manager Server 4.3:kernel-default-devel-5.14.21-150400.24.170.2.x86_64",
            "SUSE Manager Server 4.3:kernel-devel-5.14.21-150400.24.170.1.noarch",
            "SUSE Manager Server 4.3:kernel-macros-5.14.21-150400.24.170.1.noarch",
            "SUSE Manager Server 4.3:kernel-source-5.14.21-150400.24.170.1.noarch",
            "SUSE Manager Server 4.3:kernel-syms-5.14.21-150400.24.170.1.ppc64le",
            "SUSE Manager Server 4.3:kernel-syms-5.14.21-150400.24.170.1.s390x",
            "SUSE Manager Server 4.3:kernel-syms-5.14.21-150400.24.170.1.x86_64",
            "SUSE Manager Server 4.3:kernel-zfcpdump-5.14.21-150400.24.170.2.s390x"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2025-07-28T15:09:33Z",
          "details": "moderate"
        }
      ],
      "title": "CVE-2022-50192"
    },
    {
      "cve": "CVE-2022-50194",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2022-50194"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "In the Linux kernel, the following vulnerability has been resolved:\n\nsoc: qcom: aoss: Fix refcount leak in qmp_cooling_devices_register\n\nEvery iteration of for_each_available_child_of_node() decrements\nthe reference count of the previous node.\nWhen breaking early from a for_each_available_child_of_node() loop,\nwe need to explicitly call of_node_put() on the child node.\nAdd missing of_node_put() to avoid refcount leak.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.170.2.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.170.2.s390x",
          "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.170.2.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.170.2.s390x",
          "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.170.2.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.170.2.s390x",
          "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.170.2.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.170.2.s390x",
          "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-64kb-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-64kb-devel-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-devel-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-devel-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-devel-5.14.21-150400.24.170.1.noarch",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-docs-5.14.21-150400.24.170.1.noarch",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-macros-5.14.21-150400.24.170.1.noarch",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-obs-build-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-obs-build-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-source-5.14.21-150400.24.170.1.noarch",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-syms-5.14.21-150400.24.170.1.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-syms-5.14.21-150400.24.170.1.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:reiserfs-kmp-default-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:reiserfs-kmp-default-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-64kb-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-64kb-devel-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-devel-5.14.21-150400.24.170.1.noarch",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-docs-5.14.21-150400.24.170.1.noarch",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-macros-5.14.21-150400.24.170.1.noarch",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-source-5.14.21-150400.24.170.1.noarch",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.170.1.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.170.1.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.170.2.ppc64le",
          "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.170.2.s390x",
          "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.170.2.ppc64le",
          "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.170.2.s390x",
          "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_170-default-1-150400.9.3.2.ppc64le",
          "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_170-default-1-150400.9.3.2.s390x",
          "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_170-default-1-150400.9.3.2.x86_64",
          "SUSE Linux Enterprise Micro 5.3:kernel-default-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise Micro 5.3:kernel-default-5.14.21-150400.24.170.2.s390x",
          "SUSE Linux Enterprise Micro 5.3:kernel-default-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise Micro 5.3:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.aarch64",
          "SUSE Linux Enterprise Micro 5.3:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
          "SUSE Linux Enterprise Micro 5.4:kernel-default-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise Micro 5.4:kernel-default-5.14.21-150400.24.170.2.s390x",
          "SUSE Linux Enterprise Micro 5.4:kernel-default-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise Micro 5.4:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.aarch64",
          "SUSE Linux Enterprise Micro 5.4:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-64kb-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-64kb-devel-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-5.14.21-150400.24.170.2.ppc64le",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-5.14.21-150400.24.170.2.s390x",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.aarch64",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.ppc64le",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.170.2.ppc64le",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.170.2.s390x",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-devel-5.14.21-150400.24.170.1.noarch",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-docs-5.14.21-150400.24.170.1.noarch",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-macros-5.14.21-150400.24.170.1.noarch",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.170.2.ppc64le",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.170.2.s390x",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-source-5.14.21-150400.24.170.1.noarch",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.170.1.aarch64",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.170.1.ppc64le",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.170.1.s390x",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.170.1.x86_64",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-zfcpdump-5.14.21-150400.24.170.2.s390x",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.170.2.ppc64le",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.170.2.s390x",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-5.14.21-150400.24.170.2.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-devel-5.14.21-150400.24.170.2.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-devel-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-devel-5.14.21-150400.24.170.1.noarch",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-docs-5.14.21-150400.24.170.1.noarch",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-macros-5.14.21-150400.24.170.1.noarch",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-obs-build-5.14.21-150400.24.170.2.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-obs-build-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-source-5.14.21-150400.24.170.1.noarch",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-syms-5.14.21-150400.24.170.1.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-syms-5.14.21-150400.24.170.1.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.170.2.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.170.2.x86_64",
          "SUSE Manager Proxy 4.3:kernel-default-5.14.21-150400.24.170.2.x86_64",
          "SUSE Manager Proxy 4.3:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
          "SUSE Manager Proxy 4.3:kernel-default-devel-5.14.21-150400.24.170.2.x86_64",
          "SUSE Manager Proxy 4.3:kernel-devel-5.14.21-150400.24.170.1.noarch",
          "SUSE Manager Proxy 4.3:kernel-macros-5.14.21-150400.24.170.1.noarch",
          "SUSE Manager Proxy 4.3:kernel-source-5.14.21-150400.24.170.1.noarch",
          "SUSE Manager Proxy 4.3:kernel-syms-5.14.21-150400.24.170.1.x86_64",
          "SUSE Manager Server 4.3:kernel-default-5.14.21-150400.24.170.2.ppc64le",
          "SUSE Manager Server 4.3:kernel-default-5.14.21-150400.24.170.2.s390x",
          "SUSE Manager Server 4.3:kernel-default-5.14.21-150400.24.170.2.x86_64",
          "SUSE Manager Server 4.3:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.ppc64le",
          "SUSE Manager Server 4.3:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
          "SUSE Manager Server 4.3:kernel-default-devel-5.14.21-150400.24.170.2.ppc64le",
          "SUSE Manager Server 4.3:kernel-default-devel-5.14.21-150400.24.170.2.s390x",
          "SUSE Manager Server 4.3:kernel-default-devel-5.14.21-150400.24.170.2.x86_64",
          "SUSE Manager Server 4.3:kernel-devel-5.14.21-150400.24.170.1.noarch",
          "SUSE Manager Server 4.3:kernel-macros-5.14.21-150400.24.170.1.noarch",
          "SUSE Manager Server 4.3:kernel-source-5.14.21-150400.24.170.1.noarch",
          "SUSE Manager Server 4.3:kernel-syms-5.14.21-150400.24.170.1.ppc64le",
          "SUSE Manager Server 4.3:kernel-syms-5.14.21-150400.24.170.1.s390x",
          "SUSE Manager Server 4.3:kernel-syms-5.14.21-150400.24.170.1.x86_64",
          "SUSE Manager Server 4.3:kernel-zfcpdump-5.14.21-150400.24.170.2.s390x"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2022-50194",
          "url": "https://www.suse.com/security/cve/CVE-2022-50194"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1244878 for CVE-2022-50194",
          "url": "https://bugzilla.suse.com/1244878"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-64kb-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-64kb-devel-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-devel-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-devel-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-devel-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-docs-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-macros-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-obs-build-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-obs-build-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-source-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-syms-5.14.21-150400.24.170.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-syms-5.14.21-150400.24.170.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:reiserfs-kmp-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:reiserfs-kmp-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-64kb-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-64kb-devel-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-devel-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-docs-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-macros-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-source-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.170.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.170.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_170-default-1-150400.9.3.2.ppc64le",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_170-default-1-150400.9.3.2.s390x",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_170-default-1-150400.9.3.2.x86_64",
            "SUSE Linux Enterprise Micro 5.3:kernel-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise Micro 5.3:kernel-default-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise Micro 5.3:kernel-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Micro 5.3:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.aarch64",
            "SUSE Linux Enterprise Micro 5.3:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
            "SUSE Linux Enterprise Micro 5.4:kernel-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise Micro 5.4:kernel-default-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise Micro 5.4:kernel-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Micro 5.4:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.aarch64",
            "SUSE Linux Enterprise Micro 5.4:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-64kb-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-64kb-devel-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.aarch64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.ppc64le",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-devel-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-docs-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-macros-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-source-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.170.1.aarch64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.170.1.ppc64le",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.170.1.s390x",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.170.1.x86_64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-zfcpdump-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-devel-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-devel-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-devel-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-docs-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-macros-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-obs-build-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-obs-build-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-source-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-syms-5.14.21-150400.24.170.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-syms-5.14.21-150400.24.170.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Manager Proxy 4.3:kernel-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Manager Proxy 4.3:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
            "SUSE Manager Proxy 4.3:kernel-default-devel-5.14.21-150400.24.170.2.x86_64",
            "SUSE Manager Proxy 4.3:kernel-devel-5.14.21-150400.24.170.1.noarch",
            "SUSE Manager Proxy 4.3:kernel-macros-5.14.21-150400.24.170.1.noarch",
            "SUSE Manager Proxy 4.3:kernel-source-5.14.21-150400.24.170.1.noarch",
            "SUSE Manager Proxy 4.3:kernel-syms-5.14.21-150400.24.170.1.x86_64",
            "SUSE Manager Server 4.3:kernel-default-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Manager Server 4.3:kernel-default-5.14.21-150400.24.170.2.s390x",
            "SUSE Manager Server 4.3:kernel-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Manager Server 4.3:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.ppc64le",
            "SUSE Manager Server 4.3:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
            "SUSE Manager Server 4.3:kernel-default-devel-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Manager Server 4.3:kernel-default-devel-5.14.21-150400.24.170.2.s390x",
            "SUSE Manager Server 4.3:kernel-default-devel-5.14.21-150400.24.170.2.x86_64",
            "SUSE Manager Server 4.3:kernel-devel-5.14.21-150400.24.170.1.noarch",
            "SUSE Manager Server 4.3:kernel-macros-5.14.21-150400.24.170.1.noarch",
            "SUSE Manager Server 4.3:kernel-source-5.14.21-150400.24.170.1.noarch",
            "SUSE Manager Server 4.3:kernel-syms-5.14.21-150400.24.170.1.ppc64le",
            "SUSE Manager Server 4.3:kernel-syms-5.14.21-150400.24.170.1.s390x",
            "SUSE Manager Server 4.3:kernel-syms-5.14.21-150400.24.170.1.x86_64",
            "SUSE Manager Server 4.3:kernel-zfcpdump-5.14.21-150400.24.170.2.s390x"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 5.5,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
            "version": "3.1"
          },
          "products": [
            "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-64kb-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-64kb-devel-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-devel-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-devel-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-devel-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-docs-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-macros-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-obs-build-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-obs-build-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-source-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-syms-5.14.21-150400.24.170.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-syms-5.14.21-150400.24.170.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:reiserfs-kmp-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:reiserfs-kmp-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-64kb-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-64kb-devel-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-devel-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-docs-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-macros-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-source-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.170.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.170.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_170-default-1-150400.9.3.2.ppc64le",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_170-default-1-150400.9.3.2.s390x",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_170-default-1-150400.9.3.2.x86_64",
            "SUSE Linux Enterprise Micro 5.3:kernel-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise Micro 5.3:kernel-default-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise Micro 5.3:kernel-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Micro 5.3:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.aarch64",
            "SUSE Linux Enterprise Micro 5.3:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
            "SUSE Linux Enterprise Micro 5.4:kernel-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise Micro 5.4:kernel-default-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise Micro 5.4:kernel-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Micro 5.4:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.aarch64",
            "SUSE Linux Enterprise Micro 5.4:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-64kb-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-64kb-devel-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.aarch64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.ppc64le",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-devel-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-docs-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-macros-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-source-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.170.1.aarch64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.170.1.ppc64le",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.170.1.s390x",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.170.1.x86_64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-zfcpdump-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-devel-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-devel-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-devel-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-docs-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-macros-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-obs-build-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-obs-build-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-source-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-syms-5.14.21-150400.24.170.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-syms-5.14.21-150400.24.170.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Manager Proxy 4.3:kernel-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Manager Proxy 4.3:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
            "SUSE Manager Proxy 4.3:kernel-default-devel-5.14.21-150400.24.170.2.x86_64",
            "SUSE Manager Proxy 4.3:kernel-devel-5.14.21-150400.24.170.1.noarch",
            "SUSE Manager Proxy 4.3:kernel-macros-5.14.21-150400.24.170.1.noarch",
            "SUSE Manager Proxy 4.3:kernel-source-5.14.21-150400.24.170.1.noarch",
            "SUSE Manager Proxy 4.3:kernel-syms-5.14.21-150400.24.170.1.x86_64",
            "SUSE Manager Server 4.3:kernel-default-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Manager Server 4.3:kernel-default-5.14.21-150400.24.170.2.s390x",
            "SUSE Manager Server 4.3:kernel-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Manager Server 4.3:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.ppc64le",
            "SUSE Manager Server 4.3:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
            "SUSE Manager Server 4.3:kernel-default-devel-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Manager Server 4.3:kernel-default-devel-5.14.21-150400.24.170.2.s390x",
            "SUSE Manager Server 4.3:kernel-default-devel-5.14.21-150400.24.170.2.x86_64",
            "SUSE Manager Server 4.3:kernel-devel-5.14.21-150400.24.170.1.noarch",
            "SUSE Manager Server 4.3:kernel-macros-5.14.21-150400.24.170.1.noarch",
            "SUSE Manager Server 4.3:kernel-source-5.14.21-150400.24.170.1.noarch",
            "SUSE Manager Server 4.3:kernel-syms-5.14.21-150400.24.170.1.ppc64le",
            "SUSE Manager Server 4.3:kernel-syms-5.14.21-150400.24.170.1.s390x",
            "SUSE Manager Server 4.3:kernel-syms-5.14.21-150400.24.170.1.x86_64",
            "SUSE Manager Server 4.3:kernel-zfcpdump-5.14.21-150400.24.170.2.s390x"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2025-07-28T15:09:33Z",
          "details": "moderate"
        }
      ],
      "title": "CVE-2022-50194"
    },
    {
      "cve": "CVE-2022-50196",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2022-50196"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "In the Linux kernel, the following vulnerability has been resolved:\n\nsoc: qcom: ocmem: Fix refcount leak in of_get_ocmem\n\nof_parse_phandle() returns a node pointer with refcount\nincremented, we should use of_node_put() on it when not need anymore.\nAdd missing of_node_put() to avoid refcount leak.\nof_node_put() will check NULL pointer.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.170.2.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.170.2.s390x",
          "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.170.2.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.170.2.s390x",
          "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.170.2.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.170.2.s390x",
          "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.170.2.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.170.2.s390x",
          "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-64kb-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-64kb-devel-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-devel-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-devel-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-devel-5.14.21-150400.24.170.1.noarch",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-docs-5.14.21-150400.24.170.1.noarch",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-macros-5.14.21-150400.24.170.1.noarch",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-obs-build-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-obs-build-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-source-5.14.21-150400.24.170.1.noarch",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-syms-5.14.21-150400.24.170.1.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-syms-5.14.21-150400.24.170.1.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:reiserfs-kmp-default-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:reiserfs-kmp-default-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-64kb-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-64kb-devel-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-devel-5.14.21-150400.24.170.1.noarch",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-docs-5.14.21-150400.24.170.1.noarch",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-macros-5.14.21-150400.24.170.1.noarch",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-source-5.14.21-150400.24.170.1.noarch",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.170.1.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.170.1.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.170.2.ppc64le",
          "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.170.2.s390x",
          "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.170.2.ppc64le",
          "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.170.2.s390x",
          "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_170-default-1-150400.9.3.2.ppc64le",
          "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_170-default-1-150400.9.3.2.s390x",
          "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_170-default-1-150400.9.3.2.x86_64",
          "SUSE Linux Enterprise Micro 5.3:kernel-default-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise Micro 5.3:kernel-default-5.14.21-150400.24.170.2.s390x",
          "SUSE Linux Enterprise Micro 5.3:kernel-default-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise Micro 5.3:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.aarch64",
          "SUSE Linux Enterprise Micro 5.3:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
          "SUSE Linux Enterprise Micro 5.4:kernel-default-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise Micro 5.4:kernel-default-5.14.21-150400.24.170.2.s390x",
          "SUSE Linux Enterprise Micro 5.4:kernel-default-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise Micro 5.4:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.aarch64",
          "SUSE Linux Enterprise Micro 5.4:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-64kb-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-64kb-devel-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-5.14.21-150400.24.170.2.ppc64le",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-5.14.21-150400.24.170.2.s390x",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.aarch64",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.ppc64le",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.170.2.ppc64le",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.170.2.s390x",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-devel-5.14.21-150400.24.170.1.noarch",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-docs-5.14.21-150400.24.170.1.noarch",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-macros-5.14.21-150400.24.170.1.noarch",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.170.2.ppc64le",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.170.2.s390x",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-source-5.14.21-150400.24.170.1.noarch",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.170.1.aarch64",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.170.1.ppc64le",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.170.1.s390x",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.170.1.x86_64",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-zfcpdump-5.14.21-150400.24.170.2.s390x",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.170.2.ppc64le",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.170.2.s390x",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-5.14.21-150400.24.170.2.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-devel-5.14.21-150400.24.170.2.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-devel-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-devel-5.14.21-150400.24.170.1.noarch",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-docs-5.14.21-150400.24.170.1.noarch",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-macros-5.14.21-150400.24.170.1.noarch",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-obs-build-5.14.21-150400.24.170.2.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-obs-build-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-source-5.14.21-150400.24.170.1.noarch",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-syms-5.14.21-150400.24.170.1.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-syms-5.14.21-150400.24.170.1.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.170.2.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.170.2.x86_64",
          "SUSE Manager Proxy 4.3:kernel-default-5.14.21-150400.24.170.2.x86_64",
          "SUSE Manager Proxy 4.3:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
          "SUSE Manager Proxy 4.3:kernel-default-devel-5.14.21-150400.24.170.2.x86_64",
          "SUSE Manager Proxy 4.3:kernel-devel-5.14.21-150400.24.170.1.noarch",
          "SUSE Manager Proxy 4.3:kernel-macros-5.14.21-150400.24.170.1.noarch",
          "SUSE Manager Proxy 4.3:kernel-source-5.14.21-150400.24.170.1.noarch",
          "SUSE Manager Proxy 4.3:kernel-syms-5.14.21-150400.24.170.1.x86_64",
          "SUSE Manager Server 4.3:kernel-default-5.14.21-150400.24.170.2.ppc64le",
          "SUSE Manager Server 4.3:kernel-default-5.14.21-150400.24.170.2.s390x",
          "SUSE Manager Server 4.3:kernel-default-5.14.21-150400.24.170.2.x86_64",
          "SUSE Manager Server 4.3:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.ppc64le",
          "SUSE Manager Server 4.3:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
          "SUSE Manager Server 4.3:kernel-default-devel-5.14.21-150400.24.170.2.ppc64le",
          "SUSE Manager Server 4.3:kernel-default-devel-5.14.21-150400.24.170.2.s390x",
          "SUSE Manager Server 4.3:kernel-default-devel-5.14.21-150400.24.170.2.x86_64",
          "SUSE Manager Server 4.3:kernel-devel-5.14.21-150400.24.170.1.noarch",
          "SUSE Manager Server 4.3:kernel-macros-5.14.21-150400.24.170.1.noarch",
          "SUSE Manager Server 4.3:kernel-source-5.14.21-150400.24.170.1.noarch",
          "SUSE Manager Server 4.3:kernel-syms-5.14.21-150400.24.170.1.ppc64le",
          "SUSE Manager Server 4.3:kernel-syms-5.14.21-150400.24.170.1.s390x",
          "SUSE Manager Server 4.3:kernel-syms-5.14.21-150400.24.170.1.x86_64",
          "SUSE Manager Server 4.3:kernel-zfcpdump-5.14.21-150400.24.170.2.s390x"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2022-50196",
          "url": "https://www.suse.com/security/cve/CVE-2022-50196"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1244875 for CVE-2022-50196",
          "url": "https://bugzilla.suse.com/1244875"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-64kb-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-64kb-devel-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-devel-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-devel-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-devel-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-docs-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-macros-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-obs-build-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-obs-build-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-source-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-syms-5.14.21-150400.24.170.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-syms-5.14.21-150400.24.170.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:reiserfs-kmp-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:reiserfs-kmp-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-64kb-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-64kb-devel-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-devel-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-docs-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-macros-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-source-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.170.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.170.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_170-default-1-150400.9.3.2.ppc64le",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_170-default-1-150400.9.3.2.s390x",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_170-default-1-150400.9.3.2.x86_64",
            "SUSE Linux Enterprise Micro 5.3:kernel-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise Micro 5.3:kernel-default-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise Micro 5.3:kernel-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Micro 5.3:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.aarch64",
            "SUSE Linux Enterprise Micro 5.3:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
            "SUSE Linux Enterprise Micro 5.4:kernel-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise Micro 5.4:kernel-default-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise Micro 5.4:kernel-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Micro 5.4:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.aarch64",
            "SUSE Linux Enterprise Micro 5.4:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-64kb-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-64kb-devel-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.aarch64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.ppc64le",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-devel-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-docs-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-macros-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-source-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.170.1.aarch64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.170.1.ppc64le",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.170.1.s390x",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.170.1.x86_64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-zfcpdump-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-devel-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-devel-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-devel-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-docs-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-macros-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-obs-build-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-obs-build-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-source-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-syms-5.14.21-150400.24.170.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-syms-5.14.21-150400.24.170.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Manager Proxy 4.3:kernel-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Manager Proxy 4.3:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
            "SUSE Manager Proxy 4.3:kernel-default-devel-5.14.21-150400.24.170.2.x86_64",
            "SUSE Manager Proxy 4.3:kernel-devel-5.14.21-150400.24.170.1.noarch",
            "SUSE Manager Proxy 4.3:kernel-macros-5.14.21-150400.24.170.1.noarch",
            "SUSE Manager Proxy 4.3:kernel-source-5.14.21-150400.24.170.1.noarch",
            "SUSE Manager Proxy 4.3:kernel-syms-5.14.21-150400.24.170.1.x86_64",
            "SUSE Manager Server 4.3:kernel-default-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Manager Server 4.3:kernel-default-5.14.21-150400.24.170.2.s390x",
            "SUSE Manager Server 4.3:kernel-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Manager Server 4.3:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.ppc64le",
            "SUSE Manager Server 4.3:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
            "SUSE Manager Server 4.3:kernel-default-devel-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Manager Server 4.3:kernel-default-devel-5.14.21-150400.24.170.2.s390x",
            "SUSE Manager Server 4.3:kernel-default-devel-5.14.21-150400.24.170.2.x86_64",
            "SUSE Manager Server 4.3:kernel-devel-5.14.21-150400.24.170.1.noarch",
            "SUSE Manager Server 4.3:kernel-macros-5.14.21-150400.24.170.1.noarch",
            "SUSE Manager Server 4.3:kernel-source-5.14.21-150400.24.170.1.noarch",
            "SUSE Manager Server 4.3:kernel-syms-5.14.21-150400.24.170.1.ppc64le",
            "SUSE Manager Server 4.3:kernel-syms-5.14.21-150400.24.170.1.s390x",
            "SUSE Manager Server 4.3:kernel-syms-5.14.21-150400.24.170.1.x86_64",
            "SUSE Manager Server 4.3:kernel-zfcpdump-5.14.21-150400.24.170.2.s390x"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 5.5,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
            "version": "3.1"
          },
          "products": [
            "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-64kb-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-64kb-devel-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-devel-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-devel-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-devel-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-docs-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-macros-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-obs-build-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-obs-build-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-source-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-syms-5.14.21-150400.24.170.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-syms-5.14.21-150400.24.170.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:reiserfs-kmp-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:reiserfs-kmp-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-64kb-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-64kb-devel-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-devel-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-docs-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-macros-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-source-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.170.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.170.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_170-default-1-150400.9.3.2.ppc64le",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_170-default-1-150400.9.3.2.s390x",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_170-default-1-150400.9.3.2.x86_64",
            "SUSE Linux Enterprise Micro 5.3:kernel-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise Micro 5.3:kernel-default-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise Micro 5.3:kernel-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Micro 5.3:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.aarch64",
            "SUSE Linux Enterprise Micro 5.3:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
            "SUSE Linux Enterprise Micro 5.4:kernel-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise Micro 5.4:kernel-default-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise Micro 5.4:kernel-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Micro 5.4:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.aarch64",
            "SUSE Linux Enterprise Micro 5.4:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-64kb-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-64kb-devel-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.aarch64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.ppc64le",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-devel-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-docs-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-macros-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-source-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.170.1.aarch64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.170.1.ppc64le",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.170.1.s390x",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.170.1.x86_64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-zfcpdump-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-devel-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-devel-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-devel-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-docs-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-macros-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-obs-build-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-obs-build-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-source-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-syms-5.14.21-150400.24.170.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-syms-5.14.21-150400.24.170.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Manager Proxy 4.3:kernel-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Manager Proxy 4.3:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
            "SUSE Manager Proxy 4.3:kernel-default-devel-5.14.21-150400.24.170.2.x86_64",
            "SUSE Manager Proxy 4.3:kernel-devel-5.14.21-150400.24.170.1.noarch",
            "SUSE Manager Proxy 4.3:kernel-macros-5.14.21-150400.24.170.1.noarch",
            "SUSE Manager Proxy 4.3:kernel-source-5.14.21-150400.24.170.1.noarch",
            "SUSE Manager Proxy 4.3:kernel-syms-5.14.21-150400.24.170.1.x86_64",
            "SUSE Manager Server 4.3:kernel-default-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Manager Server 4.3:kernel-default-5.14.21-150400.24.170.2.s390x",
            "SUSE Manager Server 4.3:kernel-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Manager Server 4.3:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.ppc64le",
            "SUSE Manager Server 4.3:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
            "SUSE Manager Server 4.3:kernel-default-devel-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Manager Server 4.3:kernel-default-devel-5.14.21-150400.24.170.2.s390x",
            "SUSE Manager Server 4.3:kernel-default-devel-5.14.21-150400.24.170.2.x86_64",
            "SUSE Manager Server 4.3:kernel-devel-5.14.21-150400.24.170.1.noarch",
            "SUSE Manager Server 4.3:kernel-macros-5.14.21-150400.24.170.1.noarch",
            "SUSE Manager Server 4.3:kernel-source-5.14.21-150400.24.170.1.noarch",
            "SUSE Manager Server 4.3:kernel-syms-5.14.21-150400.24.170.1.ppc64le",
            "SUSE Manager Server 4.3:kernel-syms-5.14.21-150400.24.170.1.s390x",
            "SUSE Manager Server 4.3:kernel-syms-5.14.21-150400.24.170.1.x86_64",
            "SUSE Manager Server 4.3:kernel-zfcpdump-5.14.21-150400.24.170.2.s390x"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2025-07-28T15:09:33Z",
          "details": "moderate"
        }
      ],
      "title": "CVE-2022-50196"
    },
    {
      "cve": "CVE-2022-50197",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2022-50197"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "In the Linux kernel, the following vulnerability has been resolved:\n\ncpufreq: zynq: Fix refcount leak in zynq_get_revision\n\nof_find_compatible_node() returns a node pointer with refcount\nincremented, we should use of_node_put() on it when done.\nAdd missing of_node_put() to avoid refcount leak.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.170.2.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.170.2.s390x",
          "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.170.2.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.170.2.s390x",
          "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.170.2.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.170.2.s390x",
          "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.170.2.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.170.2.s390x",
          "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-64kb-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-64kb-devel-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-devel-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-devel-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-devel-5.14.21-150400.24.170.1.noarch",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-docs-5.14.21-150400.24.170.1.noarch",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-macros-5.14.21-150400.24.170.1.noarch",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-obs-build-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-obs-build-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-source-5.14.21-150400.24.170.1.noarch",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-syms-5.14.21-150400.24.170.1.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-syms-5.14.21-150400.24.170.1.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:reiserfs-kmp-default-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:reiserfs-kmp-default-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-64kb-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-64kb-devel-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-devel-5.14.21-150400.24.170.1.noarch",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-docs-5.14.21-150400.24.170.1.noarch",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-macros-5.14.21-150400.24.170.1.noarch",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-source-5.14.21-150400.24.170.1.noarch",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.170.1.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.170.1.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.170.2.ppc64le",
          "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.170.2.s390x",
          "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.170.2.ppc64le",
          "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.170.2.s390x",
          "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_170-default-1-150400.9.3.2.ppc64le",
          "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_170-default-1-150400.9.3.2.s390x",
          "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_170-default-1-150400.9.3.2.x86_64",
          "SUSE Linux Enterprise Micro 5.3:kernel-default-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise Micro 5.3:kernel-default-5.14.21-150400.24.170.2.s390x",
          "SUSE Linux Enterprise Micro 5.3:kernel-default-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise Micro 5.3:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.aarch64",
          "SUSE Linux Enterprise Micro 5.3:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
          "SUSE Linux Enterprise Micro 5.4:kernel-default-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise Micro 5.4:kernel-default-5.14.21-150400.24.170.2.s390x",
          "SUSE Linux Enterprise Micro 5.4:kernel-default-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise Micro 5.4:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.aarch64",
          "SUSE Linux Enterprise Micro 5.4:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-64kb-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-64kb-devel-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-5.14.21-150400.24.170.2.ppc64le",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-5.14.21-150400.24.170.2.s390x",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.aarch64",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.ppc64le",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.170.2.ppc64le",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.170.2.s390x",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-devel-5.14.21-150400.24.170.1.noarch",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-docs-5.14.21-150400.24.170.1.noarch",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-macros-5.14.21-150400.24.170.1.noarch",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.170.2.ppc64le",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.170.2.s390x",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-source-5.14.21-150400.24.170.1.noarch",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.170.1.aarch64",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.170.1.ppc64le",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.170.1.s390x",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.170.1.x86_64",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-zfcpdump-5.14.21-150400.24.170.2.s390x",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.170.2.ppc64le",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.170.2.s390x",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-5.14.21-150400.24.170.2.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-devel-5.14.21-150400.24.170.2.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-devel-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-devel-5.14.21-150400.24.170.1.noarch",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-docs-5.14.21-150400.24.170.1.noarch",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-macros-5.14.21-150400.24.170.1.noarch",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-obs-build-5.14.21-150400.24.170.2.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-obs-build-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-source-5.14.21-150400.24.170.1.noarch",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-syms-5.14.21-150400.24.170.1.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-syms-5.14.21-150400.24.170.1.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.170.2.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.170.2.x86_64",
          "SUSE Manager Proxy 4.3:kernel-default-5.14.21-150400.24.170.2.x86_64",
          "SUSE Manager Proxy 4.3:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
          "SUSE Manager Proxy 4.3:kernel-default-devel-5.14.21-150400.24.170.2.x86_64",
          "SUSE Manager Proxy 4.3:kernel-devel-5.14.21-150400.24.170.1.noarch",
          "SUSE Manager Proxy 4.3:kernel-macros-5.14.21-150400.24.170.1.noarch",
          "SUSE Manager Proxy 4.3:kernel-source-5.14.21-150400.24.170.1.noarch",
          "SUSE Manager Proxy 4.3:kernel-syms-5.14.21-150400.24.170.1.x86_64",
          "SUSE Manager Server 4.3:kernel-default-5.14.21-150400.24.170.2.ppc64le",
          "SUSE Manager Server 4.3:kernel-default-5.14.21-150400.24.170.2.s390x",
          "SUSE Manager Server 4.3:kernel-default-5.14.21-150400.24.170.2.x86_64",
          "SUSE Manager Server 4.3:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.ppc64le",
          "SUSE Manager Server 4.3:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
          "SUSE Manager Server 4.3:kernel-default-devel-5.14.21-150400.24.170.2.ppc64le",
          "SUSE Manager Server 4.3:kernel-default-devel-5.14.21-150400.24.170.2.s390x",
          "SUSE Manager Server 4.3:kernel-default-devel-5.14.21-150400.24.170.2.x86_64",
          "SUSE Manager Server 4.3:kernel-devel-5.14.21-150400.24.170.1.noarch",
          "SUSE Manager Server 4.3:kernel-macros-5.14.21-150400.24.170.1.noarch",
          "SUSE Manager Server 4.3:kernel-source-5.14.21-150400.24.170.1.noarch",
          "SUSE Manager Server 4.3:kernel-syms-5.14.21-150400.24.170.1.ppc64le",
          "SUSE Manager Server 4.3:kernel-syms-5.14.21-150400.24.170.1.s390x",
          "SUSE Manager Server 4.3:kernel-syms-5.14.21-150400.24.170.1.x86_64",
          "SUSE Manager Server 4.3:kernel-zfcpdump-5.14.21-150400.24.170.2.s390x"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2022-50197",
          "url": "https://www.suse.com/security/cve/CVE-2022-50197"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1244876 for CVE-2022-50197",
          "url": "https://bugzilla.suse.com/1244876"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-64kb-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-64kb-devel-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-devel-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-devel-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-devel-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-docs-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-macros-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-obs-build-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-obs-build-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-source-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-syms-5.14.21-150400.24.170.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-syms-5.14.21-150400.24.170.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:reiserfs-kmp-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:reiserfs-kmp-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-64kb-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-64kb-devel-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-devel-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-docs-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-macros-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-source-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.170.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.170.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_170-default-1-150400.9.3.2.ppc64le",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_170-default-1-150400.9.3.2.s390x",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_170-default-1-150400.9.3.2.x86_64",
            "SUSE Linux Enterprise Micro 5.3:kernel-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise Micro 5.3:kernel-default-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise Micro 5.3:kernel-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Micro 5.3:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.aarch64",
            "SUSE Linux Enterprise Micro 5.3:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
            "SUSE Linux Enterprise Micro 5.4:kernel-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise Micro 5.4:kernel-default-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise Micro 5.4:kernel-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Micro 5.4:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.aarch64",
            "SUSE Linux Enterprise Micro 5.4:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-64kb-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-64kb-devel-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.aarch64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.ppc64le",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-devel-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-docs-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-macros-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-source-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.170.1.aarch64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.170.1.ppc64le",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.170.1.s390x",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.170.1.x86_64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-zfcpdump-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-devel-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-devel-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-devel-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-docs-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-macros-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-obs-build-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-obs-build-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-source-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-syms-5.14.21-150400.24.170.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-syms-5.14.21-150400.24.170.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Manager Proxy 4.3:kernel-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Manager Proxy 4.3:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
            "SUSE Manager Proxy 4.3:kernel-default-devel-5.14.21-150400.24.170.2.x86_64",
            "SUSE Manager Proxy 4.3:kernel-devel-5.14.21-150400.24.170.1.noarch",
            "SUSE Manager Proxy 4.3:kernel-macros-5.14.21-150400.24.170.1.noarch",
            "SUSE Manager Proxy 4.3:kernel-source-5.14.21-150400.24.170.1.noarch",
            "SUSE Manager Proxy 4.3:kernel-syms-5.14.21-150400.24.170.1.x86_64",
            "SUSE Manager Server 4.3:kernel-default-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Manager Server 4.3:kernel-default-5.14.21-150400.24.170.2.s390x",
            "SUSE Manager Server 4.3:kernel-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Manager Server 4.3:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.ppc64le",
            "SUSE Manager Server 4.3:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
            "SUSE Manager Server 4.3:kernel-default-devel-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Manager Server 4.3:kernel-default-devel-5.14.21-150400.24.170.2.s390x",
            "SUSE Manager Server 4.3:kernel-default-devel-5.14.21-150400.24.170.2.x86_64",
            "SUSE Manager Server 4.3:kernel-devel-5.14.21-150400.24.170.1.noarch",
            "SUSE Manager Server 4.3:kernel-macros-5.14.21-150400.24.170.1.noarch",
            "SUSE Manager Server 4.3:kernel-source-5.14.21-150400.24.170.1.noarch",
            "SUSE Manager Server 4.3:kernel-syms-5.14.21-150400.24.170.1.ppc64le",
            "SUSE Manager Server 4.3:kernel-syms-5.14.21-150400.24.170.1.s390x",
            "SUSE Manager Server 4.3:kernel-syms-5.14.21-150400.24.170.1.x86_64",
            "SUSE Manager Server 4.3:kernel-zfcpdump-5.14.21-150400.24.170.2.s390x"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 5.5,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
            "version": "3.1"
          },
          "products": [
            "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-64kb-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-64kb-devel-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-devel-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-devel-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-devel-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-docs-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-macros-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-obs-build-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-obs-build-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-source-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-syms-5.14.21-150400.24.170.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-syms-5.14.21-150400.24.170.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:reiserfs-kmp-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:reiserfs-kmp-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-64kb-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-64kb-devel-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-devel-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-docs-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-macros-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-source-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.170.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.170.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_170-default-1-150400.9.3.2.ppc64le",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_170-default-1-150400.9.3.2.s390x",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_170-default-1-150400.9.3.2.x86_64",
            "SUSE Linux Enterprise Micro 5.3:kernel-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise Micro 5.3:kernel-default-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise Micro 5.3:kernel-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Micro 5.3:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.aarch64",
            "SUSE Linux Enterprise Micro 5.3:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
            "SUSE Linux Enterprise Micro 5.4:kernel-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise Micro 5.4:kernel-default-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise Micro 5.4:kernel-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Micro 5.4:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.aarch64",
            "SUSE Linux Enterprise Micro 5.4:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-64kb-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-64kb-devel-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.aarch64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.ppc64le",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-devel-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-docs-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-macros-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-source-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.170.1.aarch64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.170.1.ppc64le",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.170.1.s390x",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.170.1.x86_64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-zfcpdump-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-devel-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-devel-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-devel-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-docs-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-macros-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-obs-build-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-obs-build-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-source-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-syms-5.14.21-150400.24.170.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-syms-5.14.21-150400.24.170.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Manager Proxy 4.3:kernel-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Manager Proxy 4.3:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
            "SUSE Manager Proxy 4.3:kernel-default-devel-5.14.21-150400.24.170.2.x86_64",
            "SUSE Manager Proxy 4.3:kernel-devel-5.14.21-150400.24.170.1.noarch",
            "SUSE Manager Proxy 4.3:kernel-macros-5.14.21-150400.24.170.1.noarch",
            "SUSE Manager Proxy 4.3:kernel-source-5.14.21-150400.24.170.1.noarch",
            "SUSE Manager Proxy 4.3:kernel-syms-5.14.21-150400.24.170.1.x86_64",
            "SUSE Manager Server 4.3:kernel-default-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Manager Server 4.3:kernel-default-5.14.21-150400.24.170.2.s390x",
            "SUSE Manager Server 4.3:kernel-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Manager Server 4.3:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.ppc64le",
            "SUSE Manager Server 4.3:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
            "SUSE Manager Server 4.3:kernel-default-devel-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Manager Server 4.3:kernel-default-devel-5.14.21-150400.24.170.2.s390x",
            "SUSE Manager Server 4.3:kernel-default-devel-5.14.21-150400.24.170.2.x86_64",
            "SUSE Manager Server 4.3:kernel-devel-5.14.21-150400.24.170.1.noarch",
            "SUSE Manager Server 4.3:kernel-macros-5.14.21-150400.24.170.1.noarch",
            "SUSE Manager Server 4.3:kernel-source-5.14.21-150400.24.170.1.noarch",
            "SUSE Manager Server 4.3:kernel-syms-5.14.21-150400.24.170.1.ppc64le",
            "SUSE Manager Server 4.3:kernel-syms-5.14.21-150400.24.170.1.s390x",
            "SUSE Manager Server 4.3:kernel-syms-5.14.21-150400.24.170.1.x86_64",
            "SUSE Manager Server 4.3:kernel-zfcpdump-5.14.21-150400.24.170.2.s390x"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2025-07-28T15:09:33Z",
          "details": "moderate"
        }
      ],
      "title": "CVE-2022-50197"
    },
    {
      "cve": "CVE-2022-50198",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2022-50198"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "In the Linux kernel, the following vulnerability has been resolved:\n\nARM: OMAP2+: Fix refcount leak in omap3xxx_prm_late_init\n\nof_find_matching_node() returns a node pointer with refcount\nincremented, we should use of_node_put() on it when not need anymore.\nAdd missing of_node_put() to avoid refcount leak.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.170.2.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.170.2.s390x",
          "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.170.2.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.170.2.s390x",
          "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.170.2.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.170.2.s390x",
          "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.170.2.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.170.2.s390x",
          "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-64kb-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-64kb-devel-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-devel-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-devel-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-devel-5.14.21-150400.24.170.1.noarch",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-docs-5.14.21-150400.24.170.1.noarch",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-macros-5.14.21-150400.24.170.1.noarch",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-obs-build-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-obs-build-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-source-5.14.21-150400.24.170.1.noarch",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-syms-5.14.21-150400.24.170.1.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-syms-5.14.21-150400.24.170.1.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:reiserfs-kmp-default-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:reiserfs-kmp-default-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-64kb-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-64kb-devel-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-devel-5.14.21-150400.24.170.1.noarch",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-docs-5.14.21-150400.24.170.1.noarch",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-macros-5.14.21-150400.24.170.1.noarch",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-source-5.14.21-150400.24.170.1.noarch",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.170.1.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.170.1.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.170.2.ppc64le",
          "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.170.2.s390x",
          "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.170.2.ppc64le",
          "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.170.2.s390x",
          "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_170-default-1-150400.9.3.2.ppc64le",
          "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_170-default-1-150400.9.3.2.s390x",
          "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_170-default-1-150400.9.3.2.x86_64",
          "SUSE Linux Enterprise Micro 5.3:kernel-default-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise Micro 5.3:kernel-default-5.14.21-150400.24.170.2.s390x",
          "SUSE Linux Enterprise Micro 5.3:kernel-default-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise Micro 5.3:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.aarch64",
          "SUSE Linux Enterprise Micro 5.3:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
          "SUSE Linux Enterprise Micro 5.4:kernel-default-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise Micro 5.4:kernel-default-5.14.21-150400.24.170.2.s390x",
          "SUSE Linux Enterprise Micro 5.4:kernel-default-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise Micro 5.4:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.aarch64",
          "SUSE Linux Enterprise Micro 5.4:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-64kb-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-64kb-devel-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-5.14.21-150400.24.170.2.ppc64le",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-5.14.21-150400.24.170.2.s390x",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.aarch64",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.ppc64le",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.170.2.ppc64le",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.170.2.s390x",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-devel-5.14.21-150400.24.170.1.noarch",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-docs-5.14.21-150400.24.170.1.noarch",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-macros-5.14.21-150400.24.170.1.noarch",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.170.2.ppc64le",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.170.2.s390x",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-source-5.14.21-150400.24.170.1.noarch",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.170.1.aarch64",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.170.1.ppc64le",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.170.1.s390x",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.170.1.x86_64",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-zfcpdump-5.14.21-150400.24.170.2.s390x",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.170.2.ppc64le",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.170.2.s390x",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-5.14.21-150400.24.170.2.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-devel-5.14.21-150400.24.170.2.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-devel-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-devel-5.14.21-150400.24.170.1.noarch",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-docs-5.14.21-150400.24.170.1.noarch",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-macros-5.14.21-150400.24.170.1.noarch",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-obs-build-5.14.21-150400.24.170.2.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-obs-build-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-source-5.14.21-150400.24.170.1.noarch",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-syms-5.14.21-150400.24.170.1.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-syms-5.14.21-150400.24.170.1.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.170.2.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.170.2.x86_64",
          "SUSE Manager Proxy 4.3:kernel-default-5.14.21-150400.24.170.2.x86_64",
          "SUSE Manager Proxy 4.3:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
          "SUSE Manager Proxy 4.3:kernel-default-devel-5.14.21-150400.24.170.2.x86_64",
          "SUSE Manager Proxy 4.3:kernel-devel-5.14.21-150400.24.170.1.noarch",
          "SUSE Manager Proxy 4.3:kernel-macros-5.14.21-150400.24.170.1.noarch",
          "SUSE Manager Proxy 4.3:kernel-source-5.14.21-150400.24.170.1.noarch",
          "SUSE Manager Proxy 4.3:kernel-syms-5.14.21-150400.24.170.1.x86_64",
          "SUSE Manager Server 4.3:kernel-default-5.14.21-150400.24.170.2.ppc64le",
          "SUSE Manager Server 4.3:kernel-default-5.14.21-150400.24.170.2.s390x",
          "SUSE Manager Server 4.3:kernel-default-5.14.21-150400.24.170.2.x86_64",
          "SUSE Manager Server 4.3:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.ppc64le",
          "SUSE Manager Server 4.3:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
          "SUSE Manager Server 4.3:kernel-default-devel-5.14.21-150400.24.170.2.ppc64le",
          "SUSE Manager Server 4.3:kernel-default-devel-5.14.21-150400.24.170.2.s390x",
          "SUSE Manager Server 4.3:kernel-default-devel-5.14.21-150400.24.170.2.x86_64",
          "SUSE Manager Server 4.3:kernel-devel-5.14.21-150400.24.170.1.noarch",
          "SUSE Manager Server 4.3:kernel-macros-5.14.21-150400.24.170.1.noarch",
          "SUSE Manager Server 4.3:kernel-source-5.14.21-150400.24.170.1.noarch",
          "SUSE Manager Server 4.3:kernel-syms-5.14.21-150400.24.170.1.ppc64le",
          "SUSE Manager Server 4.3:kernel-syms-5.14.21-150400.24.170.1.s390x",
          "SUSE Manager Server 4.3:kernel-syms-5.14.21-150400.24.170.1.x86_64",
          "SUSE Manager Server 4.3:kernel-zfcpdump-5.14.21-150400.24.170.2.s390x"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2022-50198",
          "url": "https://www.suse.com/security/cve/CVE-2022-50198"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1244872 for CVE-2022-50198",
          "url": "https://bugzilla.suse.com/1244872"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-64kb-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-64kb-devel-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-devel-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-devel-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-devel-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-docs-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-macros-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-obs-build-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-obs-build-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-source-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-syms-5.14.21-150400.24.170.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-syms-5.14.21-150400.24.170.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:reiserfs-kmp-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:reiserfs-kmp-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-64kb-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-64kb-devel-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-devel-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-docs-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-macros-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-source-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.170.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.170.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_170-default-1-150400.9.3.2.ppc64le",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_170-default-1-150400.9.3.2.s390x",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_170-default-1-150400.9.3.2.x86_64",
            "SUSE Linux Enterprise Micro 5.3:kernel-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise Micro 5.3:kernel-default-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise Micro 5.3:kernel-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Micro 5.3:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.aarch64",
            "SUSE Linux Enterprise Micro 5.3:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
            "SUSE Linux Enterprise Micro 5.4:kernel-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise Micro 5.4:kernel-default-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise Micro 5.4:kernel-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Micro 5.4:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.aarch64",
            "SUSE Linux Enterprise Micro 5.4:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-64kb-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-64kb-devel-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.aarch64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.ppc64le",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-devel-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-docs-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-macros-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-source-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.170.1.aarch64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.170.1.ppc64le",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.170.1.s390x",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.170.1.x86_64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-zfcpdump-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-devel-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-devel-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-devel-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-docs-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-macros-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-obs-build-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-obs-build-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-source-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-syms-5.14.21-150400.24.170.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-syms-5.14.21-150400.24.170.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Manager Proxy 4.3:kernel-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Manager Proxy 4.3:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
            "SUSE Manager Proxy 4.3:kernel-default-devel-5.14.21-150400.24.170.2.x86_64",
            "SUSE Manager Proxy 4.3:kernel-devel-5.14.21-150400.24.170.1.noarch",
            "SUSE Manager Proxy 4.3:kernel-macros-5.14.21-150400.24.170.1.noarch",
            "SUSE Manager Proxy 4.3:kernel-source-5.14.21-150400.24.170.1.noarch",
            "SUSE Manager Proxy 4.3:kernel-syms-5.14.21-150400.24.170.1.x86_64",
            "SUSE Manager Server 4.3:kernel-default-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Manager Server 4.3:kernel-default-5.14.21-150400.24.170.2.s390x",
            "SUSE Manager Server 4.3:kernel-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Manager Server 4.3:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.ppc64le",
            "SUSE Manager Server 4.3:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
            "SUSE Manager Server 4.3:kernel-default-devel-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Manager Server 4.3:kernel-default-devel-5.14.21-150400.24.170.2.s390x",
            "SUSE Manager Server 4.3:kernel-default-devel-5.14.21-150400.24.170.2.x86_64",
            "SUSE Manager Server 4.3:kernel-devel-5.14.21-150400.24.170.1.noarch",
            "SUSE Manager Server 4.3:kernel-macros-5.14.21-150400.24.170.1.noarch",
            "SUSE Manager Server 4.3:kernel-source-5.14.21-150400.24.170.1.noarch",
            "SUSE Manager Server 4.3:kernel-syms-5.14.21-150400.24.170.1.ppc64le",
            "SUSE Manager Server 4.3:kernel-syms-5.14.21-150400.24.170.1.s390x",
            "SUSE Manager Server 4.3:kernel-syms-5.14.21-150400.24.170.1.x86_64",
            "SUSE Manager Server 4.3:kernel-zfcpdump-5.14.21-150400.24.170.2.s390x"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 5.5,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
            "version": "3.1"
          },
          "products": [
            "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-64kb-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-64kb-devel-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-devel-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-devel-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-devel-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-docs-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-macros-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-obs-build-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-obs-build-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-source-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-syms-5.14.21-150400.24.170.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-syms-5.14.21-150400.24.170.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:reiserfs-kmp-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:reiserfs-kmp-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-64kb-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-64kb-devel-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-devel-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-docs-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-macros-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-source-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.170.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.170.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_170-default-1-150400.9.3.2.ppc64le",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_170-default-1-150400.9.3.2.s390x",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_170-default-1-150400.9.3.2.x86_64",
            "SUSE Linux Enterprise Micro 5.3:kernel-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise Micro 5.3:kernel-default-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise Micro 5.3:kernel-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Micro 5.3:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.aarch64",
            "SUSE Linux Enterprise Micro 5.3:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
            "SUSE Linux Enterprise Micro 5.4:kernel-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise Micro 5.4:kernel-default-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise Micro 5.4:kernel-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Micro 5.4:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.aarch64",
            "SUSE Linux Enterprise Micro 5.4:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-64kb-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-64kb-devel-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.aarch64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.ppc64le",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-devel-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-docs-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-macros-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-source-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.170.1.aarch64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.170.1.ppc64le",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.170.1.s390x",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.170.1.x86_64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-zfcpdump-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-devel-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-devel-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-devel-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-docs-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-macros-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-obs-build-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-obs-build-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-source-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-syms-5.14.21-150400.24.170.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-syms-5.14.21-150400.24.170.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Manager Proxy 4.3:kernel-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Manager Proxy 4.3:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
            "SUSE Manager Proxy 4.3:kernel-default-devel-5.14.21-150400.24.170.2.x86_64",
            "SUSE Manager Proxy 4.3:kernel-devel-5.14.21-150400.24.170.1.noarch",
            "SUSE Manager Proxy 4.3:kernel-macros-5.14.21-150400.24.170.1.noarch",
            "SUSE Manager Proxy 4.3:kernel-source-5.14.21-150400.24.170.1.noarch",
            "SUSE Manager Proxy 4.3:kernel-syms-5.14.21-150400.24.170.1.x86_64",
            "SUSE Manager Server 4.3:kernel-default-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Manager Server 4.3:kernel-default-5.14.21-150400.24.170.2.s390x",
            "SUSE Manager Server 4.3:kernel-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Manager Server 4.3:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.ppc64le",
            "SUSE Manager Server 4.3:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
            "SUSE Manager Server 4.3:kernel-default-devel-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Manager Server 4.3:kernel-default-devel-5.14.21-150400.24.170.2.s390x",
            "SUSE Manager Server 4.3:kernel-default-devel-5.14.21-150400.24.170.2.x86_64",
            "SUSE Manager Server 4.3:kernel-devel-5.14.21-150400.24.170.1.noarch",
            "SUSE Manager Server 4.3:kernel-macros-5.14.21-150400.24.170.1.noarch",
            "SUSE Manager Server 4.3:kernel-source-5.14.21-150400.24.170.1.noarch",
            "SUSE Manager Server 4.3:kernel-syms-5.14.21-150400.24.170.1.ppc64le",
            "SUSE Manager Server 4.3:kernel-syms-5.14.21-150400.24.170.1.s390x",
            "SUSE Manager Server 4.3:kernel-syms-5.14.21-150400.24.170.1.x86_64",
            "SUSE Manager Server 4.3:kernel-zfcpdump-5.14.21-150400.24.170.2.s390x"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2025-07-28T15:09:33Z",
          "details": "moderate"
        }
      ],
      "title": "CVE-2022-50198"
    },
    {
      "cve": "CVE-2022-50199",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2022-50199"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "In the Linux kernel, the following vulnerability has been resolved:\n\nARM: OMAP2+: Fix refcount leak in omapdss_init_of\n\nomapdss_find_dss_of_node() calls of_find_compatible_node() to get device\nnode. of_find_compatible_node() returns a node pointer with refcount\nincremented, we should use of_node_put() on it when done.\nAdd missing of_node_put() in later error path and normal path.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.170.2.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.170.2.s390x",
          "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.170.2.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.170.2.s390x",
          "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.170.2.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.170.2.s390x",
          "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.170.2.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.170.2.s390x",
          "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-64kb-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-64kb-devel-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-devel-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-devel-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-devel-5.14.21-150400.24.170.1.noarch",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-docs-5.14.21-150400.24.170.1.noarch",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-macros-5.14.21-150400.24.170.1.noarch",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-obs-build-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-obs-build-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-source-5.14.21-150400.24.170.1.noarch",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-syms-5.14.21-150400.24.170.1.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-syms-5.14.21-150400.24.170.1.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:reiserfs-kmp-default-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:reiserfs-kmp-default-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-64kb-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-64kb-devel-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-devel-5.14.21-150400.24.170.1.noarch",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-docs-5.14.21-150400.24.170.1.noarch",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-macros-5.14.21-150400.24.170.1.noarch",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-source-5.14.21-150400.24.170.1.noarch",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.170.1.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.170.1.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.170.2.ppc64le",
          "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.170.2.s390x",
          "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.170.2.ppc64le",
          "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.170.2.s390x",
          "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_170-default-1-150400.9.3.2.ppc64le",
          "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_170-default-1-150400.9.3.2.s390x",
          "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_170-default-1-150400.9.3.2.x86_64",
          "SUSE Linux Enterprise Micro 5.3:kernel-default-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise Micro 5.3:kernel-default-5.14.21-150400.24.170.2.s390x",
          "SUSE Linux Enterprise Micro 5.3:kernel-default-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise Micro 5.3:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.aarch64",
          "SUSE Linux Enterprise Micro 5.3:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
          "SUSE Linux Enterprise Micro 5.4:kernel-default-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise Micro 5.4:kernel-default-5.14.21-150400.24.170.2.s390x",
          "SUSE Linux Enterprise Micro 5.4:kernel-default-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise Micro 5.4:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.aarch64",
          "SUSE Linux Enterprise Micro 5.4:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-64kb-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-64kb-devel-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-5.14.21-150400.24.170.2.ppc64le",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-5.14.21-150400.24.170.2.s390x",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.aarch64",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.ppc64le",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.170.2.ppc64le",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.170.2.s390x",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-devel-5.14.21-150400.24.170.1.noarch",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-docs-5.14.21-150400.24.170.1.noarch",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-macros-5.14.21-150400.24.170.1.noarch",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.170.2.ppc64le",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.170.2.s390x",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-source-5.14.21-150400.24.170.1.noarch",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.170.1.aarch64",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.170.1.ppc64le",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.170.1.s390x",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.170.1.x86_64",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-zfcpdump-5.14.21-150400.24.170.2.s390x",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.170.2.ppc64le",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.170.2.s390x",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-5.14.21-150400.24.170.2.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-devel-5.14.21-150400.24.170.2.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-devel-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-devel-5.14.21-150400.24.170.1.noarch",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-docs-5.14.21-150400.24.170.1.noarch",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-macros-5.14.21-150400.24.170.1.noarch",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-obs-build-5.14.21-150400.24.170.2.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-obs-build-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-source-5.14.21-150400.24.170.1.noarch",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-syms-5.14.21-150400.24.170.1.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-syms-5.14.21-150400.24.170.1.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.170.2.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.170.2.x86_64",
          "SUSE Manager Proxy 4.3:kernel-default-5.14.21-150400.24.170.2.x86_64",
          "SUSE Manager Proxy 4.3:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
          "SUSE Manager Proxy 4.3:kernel-default-devel-5.14.21-150400.24.170.2.x86_64",
          "SUSE Manager Proxy 4.3:kernel-devel-5.14.21-150400.24.170.1.noarch",
          "SUSE Manager Proxy 4.3:kernel-macros-5.14.21-150400.24.170.1.noarch",
          "SUSE Manager Proxy 4.3:kernel-source-5.14.21-150400.24.170.1.noarch",
          "SUSE Manager Proxy 4.3:kernel-syms-5.14.21-150400.24.170.1.x86_64",
          "SUSE Manager Server 4.3:kernel-default-5.14.21-150400.24.170.2.ppc64le",
          "SUSE Manager Server 4.3:kernel-default-5.14.21-150400.24.170.2.s390x",
          "SUSE Manager Server 4.3:kernel-default-5.14.21-150400.24.170.2.x86_64",
          "SUSE Manager Server 4.3:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.ppc64le",
          "SUSE Manager Server 4.3:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
          "SUSE Manager Server 4.3:kernel-default-devel-5.14.21-150400.24.170.2.ppc64le",
          "SUSE Manager Server 4.3:kernel-default-devel-5.14.21-150400.24.170.2.s390x",
          "SUSE Manager Server 4.3:kernel-default-devel-5.14.21-150400.24.170.2.x86_64",
          "SUSE Manager Server 4.3:kernel-devel-5.14.21-150400.24.170.1.noarch",
          "SUSE Manager Server 4.3:kernel-macros-5.14.21-150400.24.170.1.noarch",
          "SUSE Manager Server 4.3:kernel-source-5.14.21-150400.24.170.1.noarch",
          "SUSE Manager Server 4.3:kernel-syms-5.14.21-150400.24.170.1.ppc64le",
          "SUSE Manager Server 4.3:kernel-syms-5.14.21-150400.24.170.1.s390x",
          "SUSE Manager Server 4.3:kernel-syms-5.14.21-150400.24.170.1.x86_64",
          "SUSE Manager Server 4.3:kernel-zfcpdump-5.14.21-150400.24.170.2.s390x"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2022-50199",
          "url": "https://www.suse.com/security/cve/CVE-2022-50199"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1244873 for CVE-2022-50199",
          "url": "https://bugzilla.suse.com/1244873"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-64kb-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-64kb-devel-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-devel-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-devel-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-devel-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-docs-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-macros-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-obs-build-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-obs-build-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-source-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-syms-5.14.21-150400.24.170.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-syms-5.14.21-150400.24.170.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:reiserfs-kmp-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:reiserfs-kmp-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-64kb-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-64kb-devel-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-devel-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-docs-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-macros-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-source-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.170.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.170.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_170-default-1-150400.9.3.2.ppc64le",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_170-default-1-150400.9.3.2.s390x",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_170-default-1-150400.9.3.2.x86_64",
            "SUSE Linux Enterprise Micro 5.3:kernel-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise Micro 5.3:kernel-default-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise Micro 5.3:kernel-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Micro 5.3:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.aarch64",
            "SUSE Linux Enterprise Micro 5.3:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
            "SUSE Linux Enterprise Micro 5.4:kernel-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise Micro 5.4:kernel-default-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise Micro 5.4:kernel-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Micro 5.4:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.aarch64",
            "SUSE Linux Enterprise Micro 5.4:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-64kb-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-64kb-devel-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.aarch64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.ppc64le",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-devel-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-docs-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-macros-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-source-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.170.1.aarch64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.170.1.ppc64le",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.170.1.s390x",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.170.1.x86_64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-zfcpdump-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-devel-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-devel-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-devel-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-docs-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-macros-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-obs-build-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-obs-build-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-source-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-syms-5.14.21-150400.24.170.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-syms-5.14.21-150400.24.170.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Manager Proxy 4.3:kernel-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Manager Proxy 4.3:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
            "SUSE Manager Proxy 4.3:kernel-default-devel-5.14.21-150400.24.170.2.x86_64",
            "SUSE Manager Proxy 4.3:kernel-devel-5.14.21-150400.24.170.1.noarch",
            "SUSE Manager Proxy 4.3:kernel-macros-5.14.21-150400.24.170.1.noarch",
            "SUSE Manager Proxy 4.3:kernel-source-5.14.21-150400.24.170.1.noarch",
            "SUSE Manager Proxy 4.3:kernel-syms-5.14.21-150400.24.170.1.x86_64",
            "SUSE Manager Server 4.3:kernel-default-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Manager Server 4.3:kernel-default-5.14.21-150400.24.170.2.s390x",
            "SUSE Manager Server 4.3:kernel-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Manager Server 4.3:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.ppc64le",
            "SUSE Manager Server 4.3:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
            "SUSE Manager Server 4.3:kernel-default-devel-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Manager Server 4.3:kernel-default-devel-5.14.21-150400.24.170.2.s390x",
            "SUSE Manager Server 4.3:kernel-default-devel-5.14.21-150400.24.170.2.x86_64",
            "SUSE Manager Server 4.3:kernel-devel-5.14.21-150400.24.170.1.noarch",
            "SUSE Manager Server 4.3:kernel-macros-5.14.21-150400.24.170.1.noarch",
            "SUSE Manager Server 4.3:kernel-source-5.14.21-150400.24.170.1.noarch",
            "SUSE Manager Server 4.3:kernel-syms-5.14.21-150400.24.170.1.ppc64le",
            "SUSE Manager Server 4.3:kernel-syms-5.14.21-150400.24.170.1.s390x",
            "SUSE Manager Server 4.3:kernel-syms-5.14.21-150400.24.170.1.x86_64",
            "SUSE Manager Server 4.3:kernel-zfcpdump-5.14.21-150400.24.170.2.s390x"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 5.5,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
            "version": "3.1"
          },
          "products": [
            "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-64kb-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-64kb-devel-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-devel-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-devel-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-devel-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-docs-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-macros-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-obs-build-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-obs-build-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-source-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-syms-5.14.21-150400.24.170.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-syms-5.14.21-150400.24.170.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:reiserfs-kmp-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:reiserfs-kmp-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-64kb-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-64kb-devel-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-devel-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-docs-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-macros-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-source-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.170.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.170.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_170-default-1-150400.9.3.2.ppc64le",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_170-default-1-150400.9.3.2.s390x",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_170-default-1-150400.9.3.2.x86_64",
            "SUSE Linux Enterprise Micro 5.3:kernel-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise Micro 5.3:kernel-default-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise Micro 5.3:kernel-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Micro 5.3:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.aarch64",
            "SUSE Linux Enterprise Micro 5.3:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
            "SUSE Linux Enterprise Micro 5.4:kernel-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise Micro 5.4:kernel-default-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise Micro 5.4:kernel-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Micro 5.4:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.aarch64",
            "SUSE Linux Enterprise Micro 5.4:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-64kb-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-64kb-devel-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.aarch64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.ppc64le",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-devel-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-docs-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-macros-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-source-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.170.1.aarch64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.170.1.ppc64le",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.170.1.s390x",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.170.1.x86_64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-zfcpdump-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-devel-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-devel-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-devel-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-docs-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-macros-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-obs-build-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-obs-build-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-source-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-syms-5.14.21-150400.24.170.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-syms-5.14.21-150400.24.170.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Manager Proxy 4.3:kernel-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Manager Proxy 4.3:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
            "SUSE Manager Proxy 4.3:kernel-default-devel-5.14.21-150400.24.170.2.x86_64",
            "SUSE Manager Proxy 4.3:kernel-devel-5.14.21-150400.24.170.1.noarch",
            "SUSE Manager Proxy 4.3:kernel-macros-5.14.21-150400.24.170.1.noarch",
            "SUSE Manager Proxy 4.3:kernel-source-5.14.21-150400.24.170.1.noarch",
            "SUSE Manager Proxy 4.3:kernel-syms-5.14.21-150400.24.170.1.x86_64",
            "SUSE Manager Server 4.3:kernel-default-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Manager Server 4.3:kernel-default-5.14.21-150400.24.170.2.s390x",
            "SUSE Manager Server 4.3:kernel-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Manager Server 4.3:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.ppc64le",
            "SUSE Manager Server 4.3:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
            "SUSE Manager Server 4.3:kernel-default-devel-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Manager Server 4.3:kernel-default-devel-5.14.21-150400.24.170.2.s390x",
            "SUSE Manager Server 4.3:kernel-default-devel-5.14.21-150400.24.170.2.x86_64",
            "SUSE Manager Server 4.3:kernel-devel-5.14.21-150400.24.170.1.noarch",
            "SUSE Manager Server 4.3:kernel-macros-5.14.21-150400.24.170.1.noarch",
            "SUSE Manager Server 4.3:kernel-source-5.14.21-150400.24.170.1.noarch",
            "SUSE Manager Server 4.3:kernel-syms-5.14.21-150400.24.170.1.ppc64le",
            "SUSE Manager Server 4.3:kernel-syms-5.14.21-150400.24.170.1.s390x",
            "SUSE Manager Server 4.3:kernel-syms-5.14.21-150400.24.170.1.x86_64",
            "SUSE Manager Server 4.3:kernel-zfcpdump-5.14.21-150400.24.170.2.s390x"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2025-07-28T15:09:33Z",
          "details": "moderate"
        }
      ],
      "title": "CVE-2022-50199"
    },
    {
      "cve": "CVE-2022-50200",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2022-50200"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "In the Linux kernel, the following vulnerability has been resolved:\n\nselinux: Add boundary check in put_entry()\n\nJust like next_entry(), boundary check is necessary to prevent memory\nout-of-bound access.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.170.2.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.170.2.s390x",
          "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.170.2.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.170.2.s390x",
          "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.170.2.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.170.2.s390x",
          "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.170.2.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.170.2.s390x",
          "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-64kb-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-64kb-devel-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-devel-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-devel-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-devel-5.14.21-150400.24.170.1.noarch",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-docs-5.14.21-150400.24.170.1.noarch",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-macros-5.14.21-150400.24.170.1.noarch",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-obs-build-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-obs-build-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-source-5.14.21-150400.24.170.1.noarch",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-syms-5.14.21-150400.24.170.1.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-syms-5.14.21-150400.24.170.1.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:reiserfs-kmp-default-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:reiserfs-kmp-default-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-64kb-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-64kb-devel-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-devel-5.14.21-150400.24.170.1.noarch",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-docs-5.14.21-150400.24.170.1.noarch",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-macros-5.14.21-150400.24.170.1.noarch",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-source-5.14.21-150400.24.170.1.noarch",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.170.1.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.170.1.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.170.2.ppc64le",
          "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.170.2.s390x",
          "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.170.2.ppc64le",
          "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.170.2.s390x",
          "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_170-default-1-150400.9.3.2.ppc64le",
          "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_170-default-1-150400.9.3.2.s390x",
          "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_170-default-1-150400.9.3.2.x86_64",
          "SUSE Linux Enterprise Micro 5.3:kernel-default-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise Micro 5.3:kernel-default-5.14.21-150400.24.170.2.s390x",
          "SUSE Linux Enterprise Micro 5.3:kernel-default-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise Micro 5.3:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.aarch64",
          "SUSE Linux Enterprise Micro 5.3:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
          "SUSE Linux Enterprise Micro 5.4:kernel-default-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise Micro 5.4:kernel-default-5.14.21-150400.24.170.2.s390x",
          "SUSE Linux Enterprise Micro 5.4:kernel-default-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise Micro 5.4:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.aarch64",
          "SUSE Linux Enterprise Micro 5.4:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-64kb-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-64kb-devel-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-5.14.21-150400.24.170.2.ppc64le",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-5.14.21-150400.24.170.2.s390x",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.aarch64",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.ppc64le",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.170.2.ppc64le",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.170.2.s390x",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-devel-5.14.21-150400.24.170.1.noarch",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-docs-5.14.21-150400.24.170.1.noarch",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-macros-5.14.21-150400.24.170.1.noarch",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.170.2.ppc64le",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.170.2.s390x",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-source-5.14.21-150400.24.170.1.noarch",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.170.1.aarch64",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.170.1.ppc64le",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.170.1.s390x",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.170.1.x86_64",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-zfcpdump-5.14.21-150400.24.170.2.s390x",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.170.2.ppc64le",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.170.2.s390x",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-5.14.21-150400.24.170.2.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-devel-5.14.21-150400.24.170.2.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-devel-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-devel-5.14.21-150400.24.170.1.noarch",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-docs-5.14.21-150400.24.170.1.noarch",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-macros-5.14.21-150400.24.170.1.noarch",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-obs-build-5.14.21-150400.24.170.2.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-obs-build-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-source-5.14.21-150400.24.170.1.noarch",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-syms-5.14.21-150400.24.170.1.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-syms-5.14.21-150400.24.170.1.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.170.2.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.170.2.x86_64",
          "SUSE Manager Proxy 4.3:kernel-default-5.14.21-150400.24.170.2.x86_64",
          "SUSE Manager Proxy 4.3:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
          "SUSE Manager Proxy 4.3:kernel-default-devel-5.14.21-150400.24.170.2.x86_64",
          "SUSE Manager Proxy 4.3:kernel-devel-5.14.21-150400.24.170.1.noarch",
          "SUSE Manager Proxy 4.3:kernel-macros-5.14.21-150400.24.170.1.noarch",
          "SUSE Manager Proxy 4.3:kernel-source-5.14.21-150400.24.170.1.noarch",
          "SUSE Manager Proxy 4.3:kernel-syms-5.14.21-150400.24.170.1.x86_64",
          "SUSE Manager Server 4.3:kernel-default-5.14.21-150400.24.170.2.ppc64le",
          "SUSE Manager Server 4.3:kernel-default-5.14.21-150400.24.170.2.s390x",
          "SUSE Manager Server 4.3:kernel-default-5.14.21-150400.24.170.2.x86_64",
          "SUSE Manager Server 4.3:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.ppc64le",
          "SUSE Manager Server 4.3:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
          "SUSE Manager Server 4.3:kernel-default-devel-5.14.21-150400.24.170.2.ppc64le",
          "SUSE Manager Server 4.3:kernel-default-devel-5.14.21-150400.24.170.2.s390x",
          "SUSE Manager Server 4.3:kernel-default-devel-5.14.21-150400.24.170.2.x86_64",
          "SUSE Manager Server 4.3:kernel-devel-5.14.21-150400.24.170.1.noarch",
          "SUSE Manager Server 4.3:kernel-macros-5.14.21-150400.24.170.1.noarch",
          "SUSE Manager Server 4.3:kernel-source-5.14.21-150400.24.170.1.noarch",
          "SUSE Manager Server 4.3:kernel-syms-5.14.21-150400.24.170.1.ppc64le",
          "SUSE Manager Server 4.3:kernel-syms-5.14.21-150400.24.170.1.s390x",
          "SUSE Manager Server 4.3:kernel-syms-5.14.21-150400.24.170.1.x86_64",
          "SUSE Manager Server 4.3:kernel-zfcpdump-5.14.21-150400.24.170.2.s390x"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2022-50200",
          "url": "https://www.suse.com/security/cve/CVE-2022-50200"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1245149 for CVE-2022-50200",
          "url": "https://bugzilla.suse.com/1245149"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-64kb-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-64kb-devel-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-devel-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-devel-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-devel-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-docs-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-macros-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-obs-build-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-obs-build-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-source-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-syms-5.14.21-150400.24.170.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-syms-5.14.21-150400.24.170.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:reiserfs-kmp-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:reiserfs-kmp-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-64kb-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-64kb-devel-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-devel-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-docs-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-macros-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-source-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.170.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.170.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_170-default-1-150400.9.3.2.ppc64le",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_170-default-1-150400.9.3.2.s390x",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_170-default-1-150400.9.3.2.x86_64",
            "SUSE Linux Enterprise Micro 5.3:kernel-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise Micro 5.3:kernel-default-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise Micro 5.3:kernel-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Micro 5.3:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.aarch64",
            "SUSE Linux Enterprise Micro 5.3:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
            "SUSE Linux Enterprise Micro 5.4:kernel-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise Micro 5.4:kernel-default-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise Micro 5.4:kernel-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Micro 5.4:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.aarch64",
            "SUSE Linux Enterprise Micro 5.4:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-64kb-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-64kb-devel-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.aarch64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.ppc64le",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-devel-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-docs-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-macros-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-source-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.170.1.aarch64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.170.1.ppc64le",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.170.1.s390x",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.170.1.x86_64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-zfcpdump-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-devel-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-devel-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-devel-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-docs-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-macros-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-obs-build-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-obs-build-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-source-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-syms-5.14.21-150400.24.170.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-syms-5.14.21-150400.24.170.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Manager Proxy 4.3:kernel-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Manager Proxy 4.3:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
            "SUSE Manager Proxy 4.3:kernel-default-devel-5.14.21-150400.24.170.2.x86_64",
            "SUSE Manager Proxy 4.3:kernel-devel-5.14.21-150400.24.170.1.noarch",
            "SUSE Manager Proxy 4.3:kernel-macros-5.14.21-150400.24.170.1.noarch",
            "SUSE Manager Proxy 4.3:kernel-source-5.14.21-150400.24.170.1.noarch",
            "SUSE Manager Proxy 4.3:kernel-syms-5.14.21-150400.24.170.1.x86_64",
            "SUSE Manager Server 4.3:kernel-default-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Manager Server 4.3:kernel-default-5.14.21-150400.24.170.2.s390x",
            "SUSE Manager Server 4.3:kernel-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Manager Server 4.3:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.ppc64le",
            "SUSE Manager Server 4.3:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
            "SUSE Manager Server 4.3:kernel-default-devel-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Manager Server 4.3:kernel-default-devel-5.14.21-150400.24.170.2.s390x",
            "SUSE Manager Server 4.3:kernel-default-devel-5.14.21-150400.24.170.2.x86_64",
            "SUSE Manager Server 4.3:kernel-devel-5.14.21-150400.24.170.1.noarch",
            "SUSE Manager Server 4.3:kernel-macros-5.14.21-150400.24.170.1.noarch",
            "SUSE Manager Server 4.3:kernel-source-5.14.21-150400.24.170.1.noarch",
            "SUSE Manager Server 4.3:kernel-syms-5.14.21-150400.24.170.1.ppc64le",
            "SUSE Manager Server 4.3:kernel-syms-5.14.21-150400.24.170.1.s390x",
            "SUSE Manager Server 4.3:kernel-syms-5.14.21-150400.24.170.1.x86_64",
            "SUSE Manager Server 4.3:kernel-zfcpdump-5.14.21-150400.24.170.2.s390x"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 7.8,
            "baseSeverity": "HIGH",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
            "version": "3.1"
          },
          "products": [
            "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-64kb-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-64kb-devel-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-devel-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-devel-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-devel-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-docs-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-macros-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-obs-build-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-obs-build-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-source-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-syms-5.14.21-150400.24.170.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-syms-5.14.21-150400.24.170.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:reiserfs-kmp-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:reiserfs-kmp-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-64kb-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-64kb-devel-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-devel-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-docs-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-macros-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-source-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.170.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.170.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_170-default-1-150400.9.3.2.ppc64le",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_170-default-1-150400.9.3.2.s390x",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_170-default-1-150400.9.3.2.x86_64",
            "SUSE Linux Enterprise Micro 5.3:kernel-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise Micro 5.3:kernel-default-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise Micro 5.3:kernel-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Micro 5.3:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.aarch64",
            "SUSE Linux Enterprise Micro 5.3:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
            "SUSE Linux Enterprise Micro 5.4:kernel-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise Micro 5.4:kernel-default-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise Micro 5.4:kernel-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Micro 5.4:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.aarch64",
            "SUSE Linux Enterprise Micro 5.4:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-64kb-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-64kb-devel-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.aarch64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.ppc64le",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-devel-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-docs-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-macros-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-source-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.170.1.aarch64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.170.1.ppc64le",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.170.1.s390x",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.170.1.x86_64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-zfcpdump-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-devel-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-devel-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-devel-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-docs-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-macros-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-obs-build-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-obs-build-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-source-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-syms-5.14.21-150400.24.170.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-syms-5.14.21-150400.24.170.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Manager Proxy 4.3:kernel-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Manager Proxy 4.3:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
            "SUSE Manager Proxy 4.3:kernel-default-devel-5.14.21-150400.24.170.2.x86_64",
            "SUSE Manager Proxy 4.3:kernel-devel-5.14.21-150400.24.170.1.noarch",
            "SUSE Manager Proxy 4.3:kernel-macros-5.14.21-150400.24.170.1.noarch",
            "SUSE Manager Proxy 4.3:kernel-source-5.14.21-150400.24.170.1.noarch",
            "SUSE Manager Proxy 4.3:kernel-syms-5.14.21-150400.24.170.1.x86_64",
            "SUSE Manager Server 4.3:kernel-default-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Manager Server 4.3:kernel-default-5.14.21-150400.24.170.2.s390x",
            "SUSE Manager Server 4.3:kernel-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Manager Server 4.3:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.ppc64le",
            "SUSE Manager Server 4.3:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
            "SUSE Manager Server 4.3:kernel-default-devel-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Manager Server 4.3:kernel-default-devel-5.14.21-150400.24.170.2.s390x",
            "SUSE Manager Server 4.3:kernel-default-devel-5.14.21-150400.24.170.2.x86_64",
            "SUSE Manager Server 4.3:kernel-devel-5.14.21-150400.24.170.1.noarch",
            "SUSE Manager Server 4.3:kernel-macros-5.14.21-150400.24.170.1.noarch",
            "SUSE Manager Server 4.3:kernel-source-5.14.21-150400.24.170.1.noarch",
            "SUSE Manager Server 4.3:kernel-syms-5.14.21-150400.24.170.1.ppc64le",
            "SUSE Manager Server 4.3:kernel-syms-5.14.21-150400.24.170.1.s390x",
            "SUSE Manager Server 4.3:kernel-syms-5.14.21-150400.24.170.1.x86_64",
            "SUSE Manager Server 4.3:kernel-zfcpdump-5.14.21-150400.24.170.2.s390x"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2025-07-28T15:09:33Z",
          "details": "important"
        }
      ],
      "title": "CVE-2022-50200"
    },
    {
      "cve": "CVE-2022-50201",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2022-50201"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "In the Linux kernel, the following vulnerability has been resolved:\n\nselinux: fix memleak in security_read_state_kernel()\n\nIn this function, it directly returns the result of __security_read_policy\nwithout freeing the allocated memory in *data, cause memory leak issue,\nso free the memory if __security_read_policy failed.\n\n[PM: subject line tweak]",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.170.2.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.170.2.s390x",
          "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.170.2.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.170.2.s390x",
          "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.170.2.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.170.2.s390x",
          "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.170.2.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.170.2.s390x",
          "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-64kb-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-64kb-devel-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-devel-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-devel-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-devel-5.14.21-150400.24.170.1.noarch",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-docs-5.14.21-150400.24.170.1.noarch",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-macros-5.14.21-150400.24.170.1.noarch",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-obs-build-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-obs-build-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-source-5.14.21-150400.24.170.1.noarch",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-syms-5.14.21-150400.24.170.1.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-syms-5.14.21-150400.24.170.1.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:reiserfs-kmp-default-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:reiserfs-kmp-default-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-64kb-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-64kb-devel-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-devel-5.14.21-150400.24.170.1.noarch",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-docs-5.14.21-150400.24.170.1.noarch",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-macros-5.14.21-150400.24.170.1.noarch",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-source-5.14.21-150400.24.170.1.noarch",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.170.1.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.170.1.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.170.2.ppc64le",
          "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.170.2.s390x",
          "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.170.2.ppc64le",
          "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.170.2.s390x",
          "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_170-default-1-150400.9.3.2.ppc64le",
          "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_170-default-1-150400.9.3.2.s390x",
          "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_170-default-1-150400.9.3.2.x86_64",
          "SUSE Linux Enterprise Micro 5.3:kernel-default-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise Micro 5.3:kernel-default-5.14.21-150400.24.170.2.s390x",
          "SUSE Linux Enterprise Micro 5.3:kernel-default-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise Micro 5.3:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.aarch64",
          "SUSE Linux Enterprise Micro 5.3:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
          "SUSE Linux Enterprise Micro 5.4:kernel-default-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise Micro 5.4:kernel-default-5.14.21-150400.24.170.2.s390x",
          "SUSE Linux Enterprise Micro 5.4:kernel-default-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise Micro 5.4:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.aarch64",
          "SUSE Linux Enterprise Micro 5.4:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-64kb-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-64kb-devel-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-5.14.21-150400.24.170.2.ppc64le",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-5.14.21-150400.24.170.2.s390x",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.aarch64",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.ppc64le",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.170.2.ppc64le",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.170.2.s390x",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-devel-5.14.21-150400.24.170.1.noarch",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-docs-5.14.21-150400.24.170.1.noarch",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-macros-5.14.21-150400.24.170.1.noarch",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.170.2.ppc64le",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.170.2.s390x",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-source-5.14.21-150400.24.170.1.noarch",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.170.1.aarch64",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.170.1.ppc64le",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.170.1.s390x",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.170.1.x86_64",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-zfcpdump-5.14.21-150400.24.170.2.s390x",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.170.2.ppc64le",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.170.2.s390x",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-5.14.21-150400.24.170.2.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-devel-5.14.21-150400.24.170.2.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-devel-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-devel-5.14.21-150400.24.170.1.noarch",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-docs-5.14.21-150400.24.170.1.noarch",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-macros-5.14.21-150400.24.170.1.noarch",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-obs-build-5.14.21-150400.24.170.2.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-obs-build-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-source-5.14.21-150400.24.170.1.noarch",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-syms-5.14.21-150400.24.170.1.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-syms-5.14.21-150400.24.170.1.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.170.2.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.170.2.x86_64",
          "SUSE Manager Proxy 4.3:kernel-default-5.14.21-150400.24.170.2.x86_64",
          "SUSE Manager Proxy 4.3:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
          "SUSE Manager Proxy 4.3:kernel-default-devel-5.14.21-150400.24.170.2.x86_64",
          "SUSE Manager Proxy 4.3:kernel-devel-5.14.21-150400.24.170.1.noarch",
          "SUSE Manager Proxy 4.3:kernel-macros-5.14.21-150400.24.170.1.noarch",
          "SUSE Manager Proxy 4.3:kernel-source-5.14.21-150400.24.170.1.noarch",
          "SUSE Manager Proxy 4.3:kernel-syms-5.14.21-150400.24.170.1.x86_64",
          "SUSE Manager Server 4.3:kernel-default-5.14.21-150400.24.170.2.ppc64le",
          "SUSE Manager Server 4.3:kernel-default-5.14.21-150400.24.170.2.s390x",
          "SUSE Manager Server 4.3:kernel-default-5.14.21-150400.24.170.2.x86_64",
          "SUSE Manager Server 4.3:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.ppc64le",
          "SUSE Manager Server 4.3:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
          "SUSE Manager Server 4.3:kernel-default-devel-5.14.21-150400.24.170.2.ppc64le",
          "SUSE Manager Server 4.3:kernel-default-devel-5.14.21-150400.24.170.2.s390x",
          "SUSE Manager Server 4.3:kernel-default-devel-5.14.21-150400.24.170.2.x86_64",
          "SUSE Manager Server 4.3:kernel-devel-5.14.21-150400.24.170.1.noarch",
          "SUSE Manager Server 4.3:kernel-macros-5.14.21-150400.24.170.1.noarch",
          "SUSE Manager Server 4.3:kernel-source-5.14.21-150400.24.170.1.noarch",
          "SUSE Manager Server 4.3:kernel-syms-5.14.21-150400.24.170.1.ppc64le",
          "SUSE Manager Server 4.3:kernel-syms-5.14.21-150400.24.170.1.s390x",
          "SUSE Manager Server 4.3:kernel-syms-5.14.21-150400.24.170.1.x86_64",
          "SUSE Manager Server 4.3:kernel-zfcpdump-5.14.21-150400.24.170.2.s390x"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2022-50201",
          "url": "https://www.suse.com/security/cve/CVE-2022-50201"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1245197 for CVE-2022-50201",
          "url": "https://bugzilla.suse.com/1245197"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-64kb-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-64kb-devel-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-devel-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-devel-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-devel-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-docs-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-macros-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-obs-build-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-obs-build-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-source-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-syms-5.14.21-150400.24.170.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-syms-5.14.21-150400.24.170.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:reiserfs-kmp-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:reiserfs-kmp-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-64kb-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-64kb-devel-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-devel-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-docs-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-macros-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-source-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.170.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.170.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_170-default-1-150400.9.3.2.ppc64le",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_170-default-1-150400.9.3.2.s390x",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_170-default-1-150400.9.3.2.x86_64",
            "SUSE Linux Enterprise Micro 5.3:kernel-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise Micro 5.3:kernel-default-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise Micro 5.3:kernel-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Micro 5.3:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.aarch64",
            "SUSE Linux Enterprise Micro 5.3:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
            "SUSE Linux Enterprise Micro 5.4:kernel-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise Micro 5.4:kernel-default-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise Micro 5.4:kernel-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Micro 5.4:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.aarch64",
            "SUSE Linux Enterprise Micro 5.4:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-64kb-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-64kb-devel-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.aarch64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.ppc64le",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-devel-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-docs-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-macros-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-source-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.170.1.aarch64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.170.1.ppc64le",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.170.1.s390x",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.170.1.x86_64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-zfcpdump-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-devel-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-devel-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-devel-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-docs-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-macros-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-obs-build-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-obs-build-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-source-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-syms-5.14.21-150400.24.170.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-syms-5.14.21-150400.24.170.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Manager Proxy 4.3:kernel-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Manager Proxy 4.3:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
            "SUSE Manager Proxy 4.3:kernel-default-devel-5.14.21-150400.24.170.2.x86_64",
            "SUSE Manager Proxy 4.3:kernel-devel-5.14.21-150400.24.170.1.noarch",
            "SUSE Manager Proxy 4.3:kernel-macros-5.14.21-150400.24.170.1.noarch",
            "SUSE Manager Proxy 4.3:kernel-source-5.14.21-150400.24.170.1.noarch",
            "SUSE Manager Proxy 4.3:kernel-syms-5.14.21-150400.24.170.1.x86_64",
            "SUSE Manager Server 4.3:kernel-default-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Manager Server 4.3:kernel-default-5.14.21-150400.24.170.2.s390x",
            "SUSE Manager Server 4.3:kernel-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Manager Server 4.3:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.ppc64le",
            "SUSE Manager Server 4.3:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
            "SUSE Manager Server 4.3:kernel-default-devel-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Manager Server 4.3:kernel-default-devel-5.14.21-150400.24.170.2.s390x",
            "SUSE Manager Server 4.3:kernel-default-devel-5.14.21-150400.24.170.2.x86_64",
            "SUSE Manager Server 4.3:kernel-devel-5.14.21-150400.24.170.1.noarch",
            "SUSE Manager Server 4.3:kernel-macros-5.14.21-150400.24.170.1.noarch",
            "SUSE Manager Server 4.3:kernel-source-5.14.21-150400.24.170.1.noarch",
            "SUSE Manager Server 4.3:kernel-syms-5.14.21-150400.24.170.1.ppc64le",
            "SUSE Manager Server 4.3:kernel-syms-5.14.21-150400.24.170.1.s390x",
            "SUSE Manager Server 4.3:kernel-syms-5.14.21-150400.24.170.1.x86_64",
            "SUSE Manager Server 4.3:kernel-zfcpdump-5.14.21-150400.24.170.2.s390x"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 4.4,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H",
            "version": "3.1"
          },
          "products": [
            "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-64kb-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-64kb-devel-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-devel-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-devel-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-devel-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-docs-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-macros-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-obs-build-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-obs-build-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-source-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-syms-5.14.21-150400.24.170.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-syms-5.14.21-150400.24.170.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:reiserfs-kmp-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:reiserfs-kmp-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-64kb-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-64kb-devel-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-devel-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-docs-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-macros-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-source-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.170.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.170.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_170-default-1-150400.9.3.2.ppc64le",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_170-default-1-150400.9.3.2.s390x",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_170-default-1-150400.9.3.2.x86_64",
            "SUSE Linux Enterprise Micro 5.3:kernel-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise Micro 5.3:kernel-default-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise Micro 5.3:kernel-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Micro 5.3:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.aarch64",
            "SUSE Linux Enterprise Micro 5.3:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
            "SUSE Linux Enterprise Micro 5.4:kernel-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise Micro 5.4:kernel-default-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise Micro 5.4:kernel-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Micro 5.4:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.aarch64",
            "SUSE Linux Enterprise Micro 5.4:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-64kb-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-64kb-devel-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.aarch64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.ppc64le",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-devel-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-docs-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-macros-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-source-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.170.1.aarch64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.170.1.ppc64le",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.170.1.s390x",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.170.1.x86_64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-zfcpdump-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-devel-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-devel-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-devel-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-docs-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-macros-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-obs-build-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-obs-build-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-source-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-syms-5.14.21-150400.24.170.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-syms-5.14.21-150400.24.170.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Manager Proxy 4.3:kernel-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Manager Proxy 4.3:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
            "SUSE Manager Proxy 4.3:kernel-default-devel-5.14.21-150400.24.170.2.x86_64",
            "SUSE Manager Proxy 4.3:kernel-devel-5.14.21-150400.24.170.1.noarch",
            "SUSE Manager Proxy 4.3:kernel-macros-5.14.21-150400.24.170.1.noarch",
            "SUSE Manager Proxy 4.3:kernel-source-5.14.21-150400.24.170.1.noarch",
            "SUSE Manager Proxy 4.3:kernel-syms-5.14.21-150400.24.170.1.x86_64",
            "SUSE Manager Server 4.3:kernel-default-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Manager Server 4.3:kernel-default-5.14.21-150400.24.170.2.s390x",
            "SUSE Manager Server 4.3:kernel-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Manager Server 4.3:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.ppc64le",
            "SUSE Manager Server 4.3:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
            "SUSE Manager Server 4.3:kernel-default-devel-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Manager Server 4.3:kernel-default-devel-5.14.21-150400.24.170.2.s390x",
            "SUSE Manager Server 4.3:kernel-default-devel-5.14.21-150400.24.170.2.x86_64",
            "SUSE Manager Server 4.3:kernel-devel-5.14.21-150400.24.170.1.noarch",
            "SUSE Manager Server 4.3:kernel-macros-5.14.21-150400.24.170.1.noarch",
            "SUSE Manager Server 4.3:kernel-source-5.14.21-150400.24.170.1.noarch",
            "SUSE Manager Server 4.3:kernel-syms-5.14.21-150400.24.170.1.ppc64le",
            "SUSE Manager Server 4.3:kernel-syms-5.14.21-150400.24.170.1.s390x",
            "SUSE Manager Server 4.3:kernel-syms-5.14.21-150400.24.170.1.x86_64",
            "SUSE Manager Server 4.3:kernel-zfcpdump-5.14.21-150400.24.170.2.s390x"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2025-07-28T15:09:33Z",
          "details": "moderate"
        }
      ],
      "title": "CVE-2022-50201"
    },
    {
      "cve": "CVE-2022-50202",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2022-50202"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "In the Linux kernel, the following vulnerability has been resolved:\n\nPM: hibernate: defer device probing when resuming from hibernation\n\nsyzbot is reporting hung task at misc_open() [1], for there is a race\nwindow of AB-BA deadlock which involves probe_count variable. Currently\nwait_for_device_probe() from snapshot_open() from misc_open() can sleep\nforever with misc_mtx held if probe_count cannot become 0.\n\nWhen a device is probed by hub_event() work function, probe_count is\nincremented before the probe function starts, and probe_count is\ndecremented after the probe function completed.\n\nThere are three cases that can prevent probe_count from dropping to 0.\n\n  (a) A device being probed stopped responding (i.e. broken/malicious\n      hardware).\n\n  (b) A process emulating a USB device using /dev/raw-gadget interface\n      stopped responding for some reason.\n\n  (c) New device probe requests keeps coming in before existing device\n      probe requests complete.\n\nThe phenomenon syzbot is reporting is (b). A process which is holding\nsystem_transition_mutex and misc_mtx is waiting for probe_count to become\n0 inside wait_for_device_probe(), but the probe function which is called\n from hub_event() work function is waiting for the processes which are\nblocked at mutex_lock(\u0026misc_mtx) to respond via /dev/raw-gadget interface.\n\nThis patch mitigates (b) by deferring wait_for_device_probe() from\nsnapshot_open() to snapshot_write() and snapshot_ioctl(). Please note that\nthe possibility of (b) remains as long as any thread which is emulating a\nUSB device via /dev/raw-gadget interface can be blocked by uninterruptible\nblocking operations (e.g. mutex_lock()).\n\nPlease also note that (a) and (c) are not addressed. Regarding (c), we\nshould change the code to wait for only one device which contains the\nimage for resuming from hibernation. I don\u0027t know how to address (a), for\nuse of timeout for wait_for_device_probe() might result in loss of user\ndata in the image. Maybe we should require the userland to wait for the\nimage device before opening /dev/snapshot interface.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.170.2.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.170.2.s390x",
          "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.170.2.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.170.2.s390x",
          "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.170.2.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.170.2.s390x",
          "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.170.2.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.170.2.s390x",
          "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-64kb-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-64kb-devel-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-devel-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-devel-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-devel-5.14.21-150400.24.170.1.noarch",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-docs-5.14.21-150400.24.170.1.noarch",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-macros-5.14.21-150400.24.170.1.noarch",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-obs-build-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-obs-build-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-source-5.14.21-150400.24.170.1.noarch",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-syms-5.14.21-150400.24.170.1.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-syms-5.14.21-150400.24.170.1.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:reiserfs-kmp-default-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:reiserfs-kmp-default-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-64kb-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-64kb-devel-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-devel-5.14.21-150400.24.170.1.noarch",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-docs-5.14.21-150400.24.170.1.noarch",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-macros-5.14.21-150400.24.170.1.noarch",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-source-5.14.21-150400.24.170.1.noarch",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.170.1.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.170.1.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.170.2.ppc64le",
          "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.170.2.s390x",
          "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.170.2.ppc64le",
          "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.170.2.s390x",
          "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_170-default-1-150400.9.3.2.ppc64le",
          "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_170-default-1-150400.9.3.2.s390x",
          "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_170-default-1-150400.9.3.2.x86_64",
          "SUSE Linux Enterprise Micro 5.3:kernel-default-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise Micro 5.3:kernel-default-5.14.21-150400.24.170.2.s390x",
          "SUSE Linux Enterprise Micro 5.3:kernel-default-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise Micro 5.3:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.aarch64",
          "SUSE Linux Enterprise Micro 5.3:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
          "SUSE Linux Enterprise Micro 5.4:kernel-default-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise Micro 5.4:kernel-default-5.14.21-150400.24.170.2.s390x",
          "SUSE Linux Enterprise Micro 5.4:kernel-default-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise Micro 5.4:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.aarch64",
          "SUSE Linux Enterprise Micro 5.4:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-64kb-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-64kb-devel-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-5.14.21-150400.24.170.2.ppc64le",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-5.14.21-150400.24.170.2.s390x",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.aarch64",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.ppc64le",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.170.2.ppc64le",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.170.2.s390x",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-devel-5.14.21-150400.24.170.1.noarch",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-docs-5.14.21-150400.24.170.1.noarch",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-macros-5.14.21-150400.24.170.1.noarch",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.170.2.ppc64le",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.170.2.s390x",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-source-5.14.21-150400.24.170.1.noarch",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.170.1.aarch64",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.170.1.ppc64le",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.170.1.s390x",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.170.1.x86_64",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-zfcpdump-5.14.21-150400.24.170.2.s390x",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.170.2.ppc64le",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.170.2.s390x",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-5.14.21-150400.24.170.2.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-devel-5.14.21-150400.24.170.2.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-devel-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-devel-5.14.21-150400.24.170.1.noarch",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-docs-5.14.21-150400.24.170.1.noarch",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-macros-5.14.21-150400.24.170.1.noarch",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-obs-build-5.14.21-150400.24.170.2.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-obs-build-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-source-5.14.21-150400.24.170.1.noarch",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-syms-5.14.21-150400.24.170.1.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-syms-5.14.21-150400.24.170.1.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.170.2.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.170.2.x86_64",
          "SUSE Manager Proxy 4.3:kernel-default-5.14.21-150400.24.170.2.x86_64",
          "SUSE Manager Proxy 4.3:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
          "SUSE Manager Proxy 4.3:kernel-default-devel-5.14.21-150400.24.170.2.x86_64",
          "SUSE Manager Proxy 4.3:kernel-devel-5.14.21-150400.24.170.1.noarch",
          "SUSE Manager Proxy 4.3:kernel-macros-5.14.21-150400.24.170.1.noarch",
          "SUSE Manager Proxy 4.3:kernel-source-5.14.21-150400.24.170.1.noarch",
          "SUSE Manager Proxy 4.3:kernel-syms-5.14.21-150400.24.170.1.x86_64",
          "SUSE Manager Server 4.3:kernel-default-5.14.21-150400.24.170.2.ppc64le",
          "SUSE Manager Server 4.3:kernel-default-5.14.21-150400.24.170.2.s390x",
          "SUSE Manager Server 4.3:kernel-default-5.14.21-150400.24.170.2.x86_64",
          "SUSE Manager Server 4.3:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.ppc64le",
          "SUSE Manager Server 4.3:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
          "SUSE Manager Server 4.3:kernel-default-devel-5.14.21-150400.24.170.2.ppc64le",
          "SUSE Manager Server 4.3:kernel-default-devel-5.14.21-150400.24.170.2.s390x",
          "SUSE Manager Server 4.3:kernel-default-devel-5.14.21-150400.24.170.2.x86_64",
          "SUSE Manager Server 4.3:kernel-devel-5.14.21-150400.24.170.1.noarch",
          "SUSE Manager Server 4.3:kernel-macros-5.14.21-150400.24.170.1.noarch",
          "SUSE Manager Server 4.3:kernel-source-5.14.21-150400.24.170.1.noarch",
          "SUSE Manager Server 4.3:kernel-syms-5.14.21-150400.24.170.1.ppc64le",
          "SUSE Manager Server 4.3:kernel-syms-5.14.21-150400.24.170.1.s390x",
          "SUSE Manager Server 4.3:kernel-syms-5.14.21-150400.24.170.1.x86_64",
          "SUSE Manager Server 4.3:kernel-zfcpdump-5.14.21-150400.24.170.2.s390x"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2022-50202",
          "url": "https://www.suse.com/security/cve/CVE-2022-50202"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1245154 for CVE-2022-50202",
          "url": "https://bugzilla.suse.com/1245154"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-64kb-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-64kb-devel-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-devel-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-devel-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-devel-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-docs-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-macros-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-obs-build-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-obs-build-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-source-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-syms-5.14.21-150400.24.170.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-syms-5.14.21-150400.24.170.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:reiserfs-kmp-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:reiserfs-kmp-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-64kb-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-64kb-devel-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-devel-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-docs-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-macros-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-source-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.170.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.170.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_170-default-1-150400.9.3.2.ppc64le",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_170-default-1-150400.9.3.2.s390x",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_170-default-1-150400.9.3.2.x86_64",
            "SUSE Linux Enterprise Micro 5.3:kernel-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise Micro 5.3:kernel-default-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise Micro 5.3:kernel-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Micro 5.3:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.aarch64",
            "SUSE Linux Enterprise Micro 5.3:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
            "SUSE Linux Enterprise Micro 5.4:kernel-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise Micro 5.4:kernel-default-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise Micro 5.4:kernel-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Micro 5.4:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.aarch64",
            "SUSE Linux Enterprise Micro 5.4:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-64kb-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-64kb-devel-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.aarch64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.ppc64le",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-devel-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-docs-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-macros-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-source-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.170.1.aarch64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.170.1.ppc64le",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.170.1.s390x",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.170.1.x86_64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-zfcpdump-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-devel-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-devel-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-devel-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-docs-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-macros-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-obs-build-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-obs-build-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-source-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-syms-5.14.21-150400.24.170.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-syms-5.14.21-150400.24.170.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Manager Proxy 4.3:kernel-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Manager Proxy 4.3:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
            "SUSE Manager Proxy 4.3:kernel-default-devel-5.14.21-150400.24.170.2.x86_64",
            "SUSE Manager Proxy 4.3:kernel-devel-5.14.21-150400.24.170.1.noarch",
            "SUSE Manager Proxy 4.3:kernel-macros-5.14.21-150400.24.170.1.noarch",
            "SUSE Manager Proxy 4.3:kernel-source-5.14.21-150400.24.170.1.noarch",
            "SUSE Manager Proxy 4.3:kernel-syms-5.14.21-150400.24.170.1.x86_64",
            "SUSE Manager Server 4.3:kernel-default-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Manager Server 4.3:kernel-default-5.14.21-150400.24.170.2.s390x",
            "SUSE Manager Server 4.3:kernel-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Manager Server 4.3:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.ppc64le",
            "SUSE Manager Server 4.3:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
            "SUSE Manager Server 4.3:kernel-default-devel-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Manager Server 4.3:kernel-default-devel-5.14.21-150400.24.170.2.s390x",
            "SUSE Manager Server 4.3:kernel-default-devel-5.14.21-150400.24.170.2.x86_64",
            "SUSE Manager Server 4.3:kernel-devel-5.14.21-150400.24.170.1.noarch",
            "SUSE Manager Server 4.3:kernel-macros-5.14.21-150400.24.170.1.noarch",
            "SUSE Manager Server 4.3:kernel-source-5.14.21-150400.24.170.1.noarch",
            "SUSE Manager Server 4.3:kernel-syms-5.14.21-150400.24.170.1.ppc64le",
            "SUSE Manager Server 4.3:kernel-syms-5.14.21-150400.24.170.1.s390x",
            "SUSE Manager Server 4.3:kernel-syms-5.14.21-150400.24.170.1.x86_64",
            "SUSE Manager Server 4.3:kernel-zfcpdump-5.14.21-150400.24.170.2.s390x"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 4.1,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:N/I:N/A:H",
            "version": "3.1"
          },
          "products": [
            "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-64kb-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-64kb-devel-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-devel-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-devel-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-devel-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-docs-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-macros-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-obs-build-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-obs-build-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-source-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-syms-5.14.21-150400.24.170.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-syms-5.14.21-150400.24.170.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:reiserfs-kmp-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:reiserfs-kmp-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-64kb-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-64kb-devel-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-devel-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-docs-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-macros-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-source-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.170.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.170.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_170-default-1-150400.9.3.2.ppc64le",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_170-default-1-150400.9.3.2.s390x",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_170-default-1-150400.9.3.2.x86_64",
            "SUSE Linux Enterprise Micro 5.3:kernel-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise Micro 5.3:kernel-default-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise Micro 5.3:kernel-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Micro 5.3:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.aarch64",
            "SUSE Linux Enterprise Micro 5.3:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
            "SUSE Linux Enterprise Micro 5.4:kernel-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise Micro 5.4:kernel-default-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise Micro 5.4:kernel-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Micro 5.4:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.aarch64",
            "SUSE Linux Enterprise Micro 5.4:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-64kb-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-64kb-devel-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.aarch64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.ppc64le",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-devel-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-docs-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-macros-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-source-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.170.1.aarch64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.170.1.ppc64le",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.170.1.s390x",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.170.1.x86_64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-zfcpdump-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-devel-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-devel-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-devel-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-docs-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-macros-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-obs-build-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-obs-build-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-source-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-syms-5.14.21-150400.24.170.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-syms-5.14.21-150400.24.170.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Manager Proxy 4.3:kernel-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Manager Proxy 4.3:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
            "SUSE Manager Proxy 4.3:kernel-default-devel-5.14.21-150400.24.170.2.x86_64",
            "SUSE Manager Proxy 4.3:kernel-devel-5.14.21-150400.24.170.1.noarch",
            "SUSE Manager Proxy 4.3:kernel-macros-5.14.21-150400.24.170.1.noarch",
            "SUSE Manager Proxy 4.3:kernel-source-5.14.21-150400.24.170.1.noarch",
            "SUSE Manager Proxy 4.3:kernel-syms-5.14.21-150400.24.170.1.x86_64",
            "SUSE Manager Server 4.3:kernel-default-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Manager Server 4.3:kernel-default-5.14.21-150400.24.170.2.s390x",
            "SUSE Manager Server 4.3:kernel-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Manager Server 4.3:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.ppc64le",
            "SUSE Manager Server 4.3:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
            "SUSE Manager Server 4.3:kernel-default-devel-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Manager Server 4.3:kernel-default-devel-5.14.21-150400.24.170.2.s390x",
            "SUSE Manager Server 4.3:kernel-default-devel-5.14.21-150400.24.170.2.x86_64",
            "SUSE Manager Server 4.3:kernel-devel-5.14.21-150400.24.170.1.noarch",
            "SUSE Manager Server 4.3:kernel-macros-5.14.21-150400.24.170.1.noarch",
            "SUSE Manager Server 4.3:kernel-source-5.14.21-150400.24.170.1.noarch",
            "SUSE Manager Server 4.3:kernel-syms-5.14.21-150400.24.170.1.ppc64le",
            "SUSE Manager Server 4.3:kernel-syms-5.14.21-150400.24.170.1.s390x",
            "SUSE Manager Server 4.3:kernel-syms-5.14.21-150400.24.170.1.x86_64",
            "SUSE Manager Server 4.3:kernel-zfcpdump-5.14.21-150400.24.170.2.s390x"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2025-07-28T15:09:33Z",
          "details": "moderate"
        }
      ],
      "title": "CVE-2022-50202"
    },
    {
      "cve": "CVE-2022-50203",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2022-50203"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "In the Linux kernel, the following vulnerability has been resolved:\n\nARM: OMAP2+: display: Fix refcount leak bug\n\nIn omapdss_init_fbdev(), of_find_node_by_name() will return a node\npointer with refcount incremented. We should use of_node_put() when\nit is not used anymore.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.170.2.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.170.2.s390x",
          "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.170.2.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.170.2.s390x",
          "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.170.2.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.170.2.s390x",
          "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.170.2.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.170.2.s390x",
          "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-64kb-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-64kb-devel-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-devel-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-devel-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-devel-5.14.21-150400.24.170.1.noarch",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-docs-5.14.21-150400.24.170.1.noarch",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-macros-5.14.21-150400.24.170.1.noarch",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-obs-build-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-obs-build-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-source-5.14.21-150400.24.170.1.noarch",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-syms-5.14.21-150400.24.170.1.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-syms-5.14.21-150400.24.170.1.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:reiserfs-kmp-default-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:reiserfs-kmp-default-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-64kb-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-64kb-devel-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-devel-5.14.21-150400.24.170.1.noarch",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-docs-5.14.21-150400.24.170.1.noarch",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-macros-5.14.21-150400.24.170.1.noarch",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-source-5.14.21-150400.24.170.1.noarch",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.170.1.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.170.1.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.170.2.ppc64le",
          "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.170.2.s390x",
          "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.170.2.ppc64le",
          "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.170.2.s390x",
          "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_170-default-1-150400.9.3.2.ppc64le",
          "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_170-default-1-150400.9.3.2.s390x",
          "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_170-default-1-150400.9.3.2.x86_64",
          "SUSE Linux Enterprise Micro 5.3:kernel-default-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise Micro 5.3:kernel-default-5.14.21-150400.24.170.2.s390x",
          "SUSE Linux Enterprise Micro 5.3:kernel-default-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise Micro 5.3:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.aarch64",
          "SUSE Linux Enterprise Micro 5.3:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
          "SUSE Linux Enterprise Micro 5.4:kernel-default-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise Micro 5.4:kernel-default-5.14.21-150400.24.170.2.s390x",
          "SUSE Linux Enterprise Micro 5.4:kernel-default-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise Micro 5.4:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.aarch64",
          "SUSE Linux Enterprise Micro 5.4:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-64kb-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-64kb-devel-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-5.14.21-150400.24.170.2.ppc64le",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-5.14.21-150400.24.170.2.s390x",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.aarch64",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.ppc64le",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.170.2.ppc64le",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.170.2.s390x",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-devel-5.14.21-150400.24.170.1.noarch",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-docs-5.14.21-150400.24.170.1.noarch",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-macros-5.14.21-150400.24.170.1.noarch",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.170.2.ppc64le",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.170.2.s390x",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-source-5.14.21-150400.24.170.1.noarch",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.170.1.aarch64",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.170.1.ppc64le",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.170.1.s390x",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.170.1.x86_64",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-zfcpdump-5.14.21-150400.24.170.2.s390x",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.170.2.ppc64le",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.170.2.s390x",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-5.14.21-150400.24.170.2.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-devel-5.14.21-150400.24.170.2.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-devel-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-devel-5.14.21-150400.24.170.1.noarch",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-docs-5.14.21-150400.24.170.1.noarch",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-macros-5.14.21-150400.24.170.1.noarch",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-obs-build-5.14.21-150400.24.170.2.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-obs-build-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-source-5.14.21-150400.24.170.1.noarch",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-syms-5.14.21-150400.24.170.1.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-syms-5.14.21-150400.24.170.1.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.170.2.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.170.2.x86_64",
          "SUSE Manager Proxy 4.3:kernel-default-5.14.21-150400.24.170.2.x86_64",
          "SUSE Manager Proxy 4.3:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
          "SUSE Manager Proxy 4.3:kernel-default-devel-5.14.21-150400.24.170.2.x86_64",
          "SUSE Manager Proxy 4.3:kernel-devel-5.14.21-150400.24.170.1.noarch",
          "SUSE Manager Proxy 4.3:kernel-macros-5.14.21-150400.24.170.1.noarch",
          "SUSE Manager Proxy 4.3:kernel-source-5.14.21-150400.24.170.1.noarch",
          "SUSE Manager Proxy 4.3:kernel-syms-5.14.21-150400.24.170.1.x86_64",
          "SUSE Manager Server 4.3:kernel-default-5.14.21-150400.24.170.2.ppc64le",
          "SUSE Manager Server 4.3:kernel-default-5.14.21-150400.24.170.2.s390x",
          "SUSE Manager Server 4.3:kernel-default-5.14.21-150400.24.170.2.x86_64",
          "SUSE Manager Server 4.3:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.ppc64le",
          "SUSE Manager Server 4.3:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
          "SUSE Manager Server 4.3:kernel-default-devel-5.14.21-150400.24.170.2.ppc64le",
          "SUSE Manager Server 4.3:kernel-default-devel-5.14.21-150400.24.170.2.s390x",
          "SUSE Manager Server 4.3:kernel-default-devel-5.14.21-150400.24.170.2.x86_64",
          "SUSE Manager Server 4.3:kernel-devel-5.14.21-150400.24.170.1.noarch",
          "SUSE Manager Server 4.3:kernel-macros-5.14.21-150400.24.170.1.noarch",
          "SUSE Manager Server 4.3:kernel-source-5.14.21-150400.24.170.1.noarch",
          "SUSE Manager Server 4.3:kernel-syms-5.14.21-150400.24.170.1.ppc64le",
          "SUSE Manager Server 4.3:kernel-syms-5.14.21-150400.24.170.1.s390x",
          "SUSE Manager Server 4.3:kernel-syms-5.14.21-150400.24.170.1.x86_64",
          "SUSE Manager Server 4.3:kernel-zfcpdump-5.14.21-150400.24.170.2.s390x"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2022-50203",
          "url": "https://www.suse.com/security/cve/CVE-2022-50203"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1245189 for CVE-2022-50203",
          "url": "https://bugzilla.suse.com/1245189"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-64kb-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-64kb-devel-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-devel-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-devel-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-devel-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-docs-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-macros-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-obs-build-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-obs-build-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-source-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-syms-5.14.21-150400.24.170.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-syms-5.14.21-150400.24.170.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:reiserfs-kmp-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:reiserfs-kmp-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-64kb-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-64kb-devel-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-devel-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-docs-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-macros-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-source-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.170.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.170.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_170-default-1-150400.9.3.2.ppc64le",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_170-default-1-150400.9.3.2.s390x",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_170-default-1-150400.9.3.2.x86_64",
            "SUSE Linux Enterprise Micro 5.3:kernel-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise Micro 5.3:kernel-default-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise Micro 5.3:kernel-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Micro 5.3:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.aarch64",
            "SUSE Linux Enterprise Micro 5.3:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
            "SUSE Linux Enterprise Micro 5.4:kernel-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise Micro 5.4:kernel-default-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise Micro 5.4:kernel-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Micro 5.4:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.aarch64",
            "SUSE Linux Enterprise Micro 5.4:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-64kb-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-64kb-devel-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.aarch64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.ppc64le",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-devel-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-docs-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-macros-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-source-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.170.1.aarch64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.170.1.ppc64le",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.170.1.s390x",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.170.1.x86_64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-zfcpdump-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-devel-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-devel-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-devel-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-docs-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-macros-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-obs-build-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-obs-build-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-source-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-syms-5.14.21-150400.24.170.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-syms-5.14.21-150400.24.170.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Manager Proxy 4.3:kernel-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Manager Proxy 4.3:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
            "SUSE Manager Proxy 4.3:kernel-default-devel-5.14.21-150400.24.170.2.x86_64",
            "SUSE Manager Proxy 4.3:kernel-devel-5.14.21-150400.24.170.1.noarch",
            "SUSE Manager Proxy 4.3:kernel-macros-5.14.21-150400.24.170.1.noarch",
            "SUSE Manager Proxy 4.3:kernel-source-5.14.21-150400.24.170.1.noarch",
            "SUSE Manager Proxy 4.3:kernel-syms-5.14.21-150400.24.170.1.x86_64",
            "SUSE Manager Server 4.3:kernel-default-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Manager Server 4.3:kernel-default-5.14.21-150400.24.170.2.s390x",
            "SUSE Manager Server 4.3:kernel-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Manager Server 4.3:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.ppc64le",
            "SUSE Manager Server 4.3:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
            "SUSE Manager Server 4.3:kernel-default-devel-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Manager Server 4.3:kernel-default-devel-5.14.21-150400.24.170.2.s390x",
            "SUSE Manager Server 4.3:kernel-default-devel-5.14.21-150400.24.170.2.x86_64",
            "SUSE Manager Server 4.3:kernel-devel-5.14.21-150400.24.170.1.noarch",
            "SUSE Manager Server 4.3:kernel-macros-5.14.21-150400.24.170.1.noarch",
            "SUSE Manager Server 4.3:kernel-source-5.14.21-150400.24.170.1.noarch",
            "SUSE Manager Server 4.3:kernel-syms-5.14.21-150400.24.170.1.ppc64le",
            "SUSE Manager Server 4.3:kernel-syms-5.14.21-150400.24.170.1.s390x",
            "SUSE Manager Server 4.3:kernel-syms-5.14.21-150400.24.170.1.x86_64",
            "SUSE Manager Server 4.3:kernel-zfcpdump-5.14.21-150400.24.170.2.s390x"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 5.5,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
            "version": "3.1"
          },
          "products": [
            "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-64kb-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-64kb-devel-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-devel-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-devel-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-devel-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-docs-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-macros-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-obs-build-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-obs-build-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-source-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-syms-5.14.21-150400.24.170.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-syms-5.14.21-150400.24.170.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:reiserfs-kmp-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:reiserfs-kmp-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-64kb-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-64kb-devel-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-devel-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-docs-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-macros-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-source-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.170.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.170.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_170-default-1-150400.9.3.2.ppc64le",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_170-default-1-150400.9.3.2.s390x",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_170-default-1-150400.9.3.2.x86_64",
            "SUSE Linux Enterprise Micro 5.3:kernel-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise Micro 5.3:kernel-default-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise Micro 5.3:kernel-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Micro 5.3:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.aarch64",
            "SUSE Linux Enterprise Micro 5.3:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
            "SUSE Linux Enterprise Micro 5.4:kernel-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise Micro 5.4:kernel-default-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise Micro 5.4:kernel-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Micro 5.4:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.aarch64",
            "SUSE Linux Enterprise Micro 5.4:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-64kb-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-64kb-devel-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.aarch64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.ppc64le",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-devel-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-docs-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-macros-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-source-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.170.1.aarch64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.170.1.ppc64le",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.170.1.s390x",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.170.1.x86_64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-zfcpdump-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-devel-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-devel-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-devel-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-docs-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-macros-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-obs-build-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-obs-build-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-source-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-syms-5.14.21-150400.24.170.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-syms-5.14.21-150400.24.170.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Manager Proxy 4.3:kernel-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Manager Proxy 4.3:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
            "SUSE Manager Proxy 4.3:kernel-default-devel-5.14.21-150400.24.170.2.x86_64",
            "SUSE Manager Proxy 4.3:kernel-devel-5.14.21-150400.24.170.1.noarch",
            "SUSE Manager Proxy 4.3:kernel-macros-5.14.21-150400.24.170.1.noarch",
            "SUSE Manager Proxy 4.3:kernel-source-5.14.21-150400.24.170.1.noarch",
            "SUSE Manager Proxy 4.3:kernel-syms-5.14.21-150400.24.170.1.x86_64",
            "SUSE Manager Server 4.3:kernel-default-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Manager Server 4.3:kernel-default-5.14.21-150400.24.170.2.s390x",
            "SUSE Manager Server 4.3:kernel-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Manager Server 4.3:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.ppc64le",
            "SUSE Manager Server 4.3:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
            "SUSE Manager Server 4.3:kernel-default-devel-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Manager Server 4.3:kernel-default-devel-5.14.21-150400.24.170.2.s390x",
            "SUSE Manager Server 4.3:kernel-default-devel-5.14.21-150400.24.170.2.x86_64",
            "SUSE Manager Server 4.3:kernel-devel-5.14.21-150400.24.170.1.noarch",
            "SUSE Manager Server 4.3:kernel-macros-5.14.21-150400.24.170.1.noarch",
            "SUSE Manager Server 4.3:kernel-source-5.14.21-150400.24.170.1.noarch",
            "SUSE Manager Server 4.3:kernel-syms-5.14.21-150400.24.170.1.ppc64le",
            "SUSE Manager Server 4.3:kernel-syms-5.14.21-150400.24.170.1.s390x",
            "SUSE Manager Server 4.3:kernel-syms-5.14.21-150400.24.170.1.x86_64",
            "SUSE Manager Server 4.3:kernel-zfcpdump-5.14.21-150400.24.170.2.s390x"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2025-07-28T15:09:33Z",
          "details": "moderate"
        }
      ],
      "title": "CVE-2022-50203"
    },
    {
      "cve": "CVE-2022-50204",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2022-50204"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "In the Linux kernel, the following vulnerability has been resolved:\n\nARM: OMAP2+: pdata-quirks: Fix refcount leak bug\n\nIn pdata_quirks_init_clocks(), the loop contains\nof_find_node_by_name() but without corresponding of_node_put().",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.170.2.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.170.2.s390x",
          "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.170.2.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.170.2.s390x",
          "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.170.2.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.170.2.s390x",
          "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.170.2.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.170.2.s390x",
          "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-64kb-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-64kb-devel-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-devel-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-devel-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-devel-5.14.21-150400.24.170.1.noarch",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-docs-5.14.21-150400.24.170.1.noarch",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-macros-5.14.21-150400.24.170.1.noarch",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-obs-build-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-obs-build-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-source-5.14.21-150400.24.170.1.noarch",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-syms-5.14.21-150400.24.170.1.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-syms-5.14.21-150400.24.170.1.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:reiserfs-kmp-default-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:reiserfs-kmp-default-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-64kb-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-64kb-devel-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-devel-5.14.21-150400.24.170.1.noarch",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-docs-5.14.21-150400.24.170.1.noarch",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-macros-5.14.21-150400.24.170.1.noarch",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-source-5.14.21-150400.24.170.1.noarch",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.170.1.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.170.1.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.170.2.ppc64le",
          "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.170.2.s390x",
          "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.170.2.ppc64le",
          "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.170.2.s390x",
          "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_170-default-1-150400.9.3.2.ppc64le",
          "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_170-default-1-150400.9.3.2.s390x",
          "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_170-default-1-150400.9.3.2.x86_64",
          "SUSE Linux Enterprise Micro 5.3:kernel-default-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise Micro 5.3:kernel-default-5.14.21-150400.24.170.2.s390x",
          "SUSE Linux Enterprise Micro 5.3:kernel-default-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise Micro 5.3:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.aarch64",
          "SUSE Linux Enterprise Micro 5.3:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
          "SUSE Linux Enterprise Micro 5.4:kernel-default-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise Micro 5.4:kernel-default-5.14.21-150400.24.170.2.s390x",
          "SUSE Linux Enterprise Micro 5.4:kernel-default-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise Micro 5.4:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.aarch64",
          "SUSE Linux Enterprise Micro 5.4:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-64kb-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-64kb-devel-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-5.14.21-150400.24.170.2.ppc64le",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-5.14.21-150400.24.170.2.s390x",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.aarch64",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.ppc64le",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.170.2.ppc64le",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.170.2.s390x",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-devel-5.14.21-150400.24.170.1.noarch",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-docs-5.14.21-150400.24.170.1.noarch",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-macros-5.14.21-150400.24.170.1.noarch",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.170.2.ppc64le",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.170.2.s390x",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-source-5.14.21-150400.24.170.1.noarch",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.170.1.aarch64",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.170.1.ppc64le",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.170.1.s390x",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.170.1.x86_64",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-zfcpdump-5.14.21-150400.24.170.2.s390x",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.170.2.ppc64le",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.170.2.s390x",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-5.14.21-150400.24.170.2.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-devel-5.14.21-150400.24.170.2.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-devel-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-devel-5.14.21-150400.24.170.1.noarch",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-docs-5.14.21-150400.24.170.1.noarch",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-macros-5.14.21-150400.24.170.1.noarch",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-obs-build-5.14.21-150400.24.170.2.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-obs-build-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-source-5.14.21-150400.24.170.1.noarch",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-syms-5.14.21-150400.24.170.1.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-syms-5.14.21-150400.24.170.1.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.170.2.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.170.2.x86_64",
          "SUSE Manager Proxy 4.3:kernel-default-5.14.21-150400.24.170.2.x86_64",
          "SUSE Manager Proxy 4.3:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
          "SUSE Manager Proxy 4.3:kernel-default-devel-5.14.21-150400.24.170.2.x86_64",
          "SUSE Manager Proxy 4.3:kernel-devel-5.14.21-150400.24.170.1.noarch",
          "SUSE Manager Proxy 4.3:kernel-macros-5.14.21-150400.24.170.1.noarch",
          "SUSE Manager Proxy 4.3:kernel-source-5.14.21-150400.24.170.1.noarch",
          "SUSE Manager Proxy 4.3:kernel-syms-5.14.21-150400.24.170.1.x86_64",
          "SUSE Manager Server 4.3:kernel-default-5.14.21-150400.24.170.2.ppc64le",
          "SUSE Manager Server 4.3:kernel-default-5.14.21-150400.24.170.2.s390x",
          "SUSE Manager Server 4.3:kernel-default-5.14.21-150400.24.170.2.x86_64",
          "SUSE Manager Server 4.3:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.ppc64le",
          "SUSE Manager Server 4.3:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
          "SUSE Manager Server 4.3:kernel-default-devel-5.14.21-150400.24.170.2.ppc64le",
          "SUSE Manager Server 4.3:kernel-default-devel-5.14.21-150400.24.170.2.s390x",
          "SUSE Manager Server 4.3:kernel-default-devel-5.14.21-150400.24.170.2.x86_64",
          "SUSE Manager Server 4.3:kernel-devel-5.14.21-150400.24.170.1.noarch",
          "SUSE Manager Server 4.3:kernel-macros-5.14.21-150400.24.170.1.noarch",
          "SUSE Manager Server 4.3:kernel-source-5.14.21-150400.24.170.1.noarch",
          "SUSE Manager Server 4.3:kernel-syms-5.14.21-150400.24.170.1.ppc64le",
          "SUSE Manager Server 4.3:kernel-syms-5.14.21-150400.24.170.1.s390x",
          "SUSE Manager Server 4.3:kernel-syms-5.14.21-150400.24.170.1.x86_64",
          "SUSE Manager Server 4.3:kernel-zfcpdump-5.14.21-150400.24.170.2.s390x"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2022-50204",
          "url": "https://www.suse.com/security/cve/CVE-2022-50204"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1245191 for CVE-2022-50204",
          "url": "https://bugzilla.suse.com/1245191"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-64kb-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-64kb-devel-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-devel-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-devel-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-devel-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-docs-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-macros-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-obs-build-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-obs-build-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-source-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-syms-5.14.21-150400.24.170.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-syms-5.14.21-150400.24.170.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:reiserfs-kmp-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:reiserfs-kmp-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-64kb-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-64kb-devel-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-devel-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-docs-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-macros-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-source-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.170.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.170.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_170-default-1-150400.9.3.2.ppc64le",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_170-default-1-150400.9.3.2.s390x",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_170-default-1-150400.9.3.2.x86_64",
            "SUSE Linux Enterprise Micro 5.3:kernel-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise Micro 5.3:kernel-default-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise Micro 5.3:kernel-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Micro 5.3:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.aarch64",
            "SUSE Linux Enterprise Micro 5.3:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
            "SUSE Linux Enterprise Micro 5.4:kernel-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise Micro 5.4:kernel-default-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise Micro 5.4:kernel-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Micro 5.4:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.aarch64",
            "SUSE Linux Enterprise Micro 5.4:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-64kb-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-64kb-devel-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.aarch64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.ppc64le",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-devel-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-docs-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-macros-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-source-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.170.1.aarch64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.170.1.ppc64le",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.170.1.s390x",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.170.1.x86_64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-zfcpdump-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-devel-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-devel-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-devel-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-docs-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-macros-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-obs-build-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-obs-build-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-source-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-syms-5.14.21-150400.24.170.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-syms-5.14.21-150400.24.170.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Manager Proxy 4.3:kernel-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Manager Proxy 4.3:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
            "SUSE Manager Proxy 4.3:kernel-default-devel-5.14.21-150400.24.170.2.x86_64",
            "SUSE Manager Proxy 4.3:kernel-devel-5.14.21-150400.24.170.1.noarch",
            "SUSE Manager Proxy 4.3:kernel-macros-5.14.21-150400.24.170.1.noarch",
            "SUSE Manager Proxy 4.3:kernel-source-5.14.21-150400.24.170.1.noarch",
            "SUSE Manager Proxy 4.3:kernel-syms-5.14.21-150400.24.170.1.x86_64",
            "SUSE Manager Server 4.3:kernel-default-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Manager Server 4.3:kernel-default-5.14.21-150400.24.170.2.s390x",
            "SUSE Manager Server 4.3:kernel-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Manager Server 4.3:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.ppc64le",
            "SUSE Manager Server 4.3:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
            "SUSE Manager Server 4.3:kernel-default-devel-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Manager Server 4.3:kernel-default-devel-5.14.21-150400.24.170.2.s390x",
            "SUSE Manager Server 4.3:kernel-default-devel-5.14.21-150400.24.170.2.x86_64",
            "SUSE Manager Server 4.3:kernel-devel-5.14.21-150400.24.170.1.noarch",
            "SUSE Manager Server 4.3:kernel-macros-5.14.21-150400.24.170.1.noarch",
            "SUSE Manager Server 4.3:kernel-source-5.14.21-150400.24.170.1.noarch",
            "SUSE Manager Server 4.3:kernel-syms-5.14.21-150400.24.170.1.ppc64le",
            "SUSE Manager Server 4.3:kernel-syms-5.14.21-150400.24.170.1.s390x",
            "SUSE Manager Server 4.3:kernel-syms-5.14.21-150400.24.170.1.x86_64",
            "SUSE Manager Server 4.3:kernel-zfcpdump-5.14.21-150400.24.170.2.s390x"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 5.5,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
            "version": "3.1"
          },
          "products": [
            "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-64kb-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-64kb-devel-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-devel-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-devel-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-devel-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-docs-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-macros-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-obs-build-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-obs-build-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-source-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-syms-5.14.21-150400.24.170.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-syms-5.14.21-150400.24.170.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:reiserfs-kmp-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:reiserfs-kmp-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-64kb-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-64kb-devel-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-devel-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-docs-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-macros-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-source-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.170.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.170.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_170-default-1-150400.9.3.2.ppc64le",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_170-default-1-150400.9.3.2.s390x",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_170-default-1-150400.9.3.2.x86_64",
            "SUSE Linux Enterprise Micro 5.3:kernel-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise Micro 5.3:kernel-default-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise Micro 5.3:kernel-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Micro 5.3:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.aarch64",
            "SUSE Linux Enterprise Micro 5.3:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
            "SUSE Linux Enterprise Micro 5.4:kernel-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise Micro 5.4:kernel-default-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise Micro 5.4:kernel-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Micro 5.4:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.aarch64",
            "SUSE Linux Enterprise Micro 5.4:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-64kb-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-64kb-devel-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.aarch64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.ppc64le",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-devel-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-docs-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-macros-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-source-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.170.1.aarch64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.170.1.ppc64le",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.170.1.s390x",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.170.1.x86_64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-zfcpdump-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-devel-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-devel-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-devel-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-docs-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-macros-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-obs-build-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-obs-build-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-source-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-syms-5.14.21-150400.24.170.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-syms-5.14.21-150400.24.170.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Manager Proxy 4.3:kernel-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Manager Proxy 4.3:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
            "SUSE Manager Proxy 4.3:kernel-default-devel-5.14.21-150400.24.170.2.x86_64",
            "SUSE Manager Proxy 4.3:kernel-devel-5.14.21-150400.24.170.1.noarch",
            "SUSE Manager Proxy 4.3:kernel-macros-5.14.21-150400.24.170.1.noarch",
            "SUSE Manager Proxy 4.3:kernel-source-5.14.21-150400.24.170.1.noarch",
            "SUSE Manager Proxy 4.3:kernel-syms-5.14.21-150400.24.170.1.x86_64",
            "SUSE Manager Server 4.3:kernel-default-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Manager Server 4.3:kernel-default-5.14.21-150400.24.170.2.s390x",
            "SUSE Manager Server 4.3:kernel-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Manager Server 4.3:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.ppc64le",
            "SUSE Manager Server 4.3:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
            "SUSE Manager Server 4.3:kernel-default-devel-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Manager Server 4.3:kernel-default-devel-5.14.21-150400.24.170.2.s390x",
            "SUSE Manager Server 4.3:kernel-default-devel-5.14.21-150400.24.170.2.x86_64",
            "SUSE Manager Server 4.3:kernel-devel-5.14.21-150400.24.170.1.noarch",
            "SUSE Manager Server 4.3:kernel-macros-5.14.21-150400.24.170.1.noarch",
            "SUSE Manager Server 4.3:kernel-source-5.14.21-150400.24.170.1.noarch",
            "SUSE Manager Server 4.3:kernel-syms-5.14.21-150400.24.170.1.ppc64le",
            "SUSE Manager Server 4.3:kernel-syms-5.14.21-150400.24.170.1.s390x",
            "SUSE Manager Server 4.3:kernel-syms-5.14.21-150400.24.170.1.x86_64",
            "SUSE Manager Server 4.3:kernel-zfcpdump-5.14.21-150400.24.170.2.s390x"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2025-07-28T15:09:33Z",
          "details": "moderate"
        }
      ],
      "title": "CVE-2022-50204"
    },
    {
      "cve": "CVE-2022-50206",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2022-50206"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "In the Linux kernel, the following vulnerability has been resolved:\n\narm64: fix oops in concurrently setting insn_emulation sysctls\n\nemulation_proc_handler() changes table-\u003edata for proc_dointvec_minmax\nand can generate the following Oops if called concurrently with itself:\n\n | Unable to handle kernel NULL pointer dereference at virtual address 0000000000000010\n | Internal error: Oops: 96000006 [#1] SMP\n | Call trace:\n | update_insn_emulation_mode+0xc0/0x148\n | emulation_proc_handler+0x64/0xb8\n | proc_sys_call_handler+0x9c/0xf8\n | proc_sys_write+0x18/0x20\n | __vfs_write+0x20/0x48\n | vfs_write+0xe4/0x1d0\n | ksys_write+0x70/0xf8\n | __arm64_sys_write+0x20/0x28\n | el0_svc_common.constprop.0+0x7c/0x1c0\n | el0_svc_handler+0x2c/0xa0\n | el0_svc+0x8/0x200\n\nTo fix this issue, keep the table-\u003edata as \u0026insn-\u003ecurrent_mode and\nuse container_of() to retrieve the insn pointer. Another mutex is\nused to protect against the current_mode update but not for retrieving\ninsn_emulation as table-\u003edata is no longer changing.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.170.2.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.170.2.s390x",
          "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.170.2.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.170.2.s390x",
          "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.170.2.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.170.2.s390x",
          "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.170.2.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.170.2.s390x",
          "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-64kb-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-64kb-devel-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-devel-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-devel-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-devel-5.14.21-150400.24.170.1.noarch",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-docs-5.14.21-150400.24.170.1.noarch",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-macros-5.14.21-150400.24.170.1.noarch",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-obs-build-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-obs-build-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-source-5.14.21-150400.24.170.1.noarch",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-syms-5.14.21-150400.24.170.1.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-syms-5.14.21-150400.24.170.1.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:reiserfs-kmp-default-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:reiserfs-kmp-default-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-64kb-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-64kb-devel-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-devel-5.14.21-150400.24.170.1.noarch",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-docs-5.14.21-150400.24.170.1.noarch",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-macros-5.14.21-150400.24.170.1.noarch",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-source-5.14.21-150400.24.170.1.noarch",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.170.1.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.170.1.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.170.2.ppc64le",
          "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.170.2.s390x",
          "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.170.2.ppc64le",
          "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.170.2.s390x",
          "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_170-default-1-150400.9.3.2.ppc64le",
          "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_170-default-1-150400.9.3.2.s390x",
          "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_170-default-1-150400.9.3.2.x86_64",
          "SUSE Linux Enterprise Micro 5.3:kernel-default-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise Micro 5.3:kernel-default-5.14.21-150400.24.170.2.s390x",
          "SUSE Linux Enterprise Micro 5.3:kernel-default-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise Micro 5.3:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.aarch64",
          "SUSE Linux Enterprise Micro 5.3:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
          "SUSE Linux Enterprise Micro 5.4:kernel-default-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise Micro 5.4:kernel-default-5.14.21-150400.24.170.2.s390x",
          "SUSE Linux Enterprise Micro 5.4:kernel-default-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise Micro 5.4:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.aarch64",
          "SUSE Linux Enterprise Micro 5.4:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-64kb-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-64kb-devel-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-5.14.21-150400.24.170.2.ppc64le",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-5.14.21-150400.24.170.2.s390x",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.aarch64",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.ppc64le",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.170.2.ppc64le",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.170.2.s390x",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-devel-5.14.21-150400.24.170.1.noarch",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-docs-5.14.21-150400.24.170.1.noarch",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-macros-5.14.21-150400.24.170.1.noarch",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.170.2.ppc64le",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.170.2.s390x",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-source-5.14.21-150400.24.170.1.noarch",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.170.1.aarch64",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.170.1.ppc64le",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.170.1.s390x",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.170.1.x86_64",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-zfcpdump-5.14.21-150400.24.170.2.s390x",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.170.2.ppc64le",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.170.2.s390x",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-5.14.21-150400.24.170.2.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-devel-5.14.21-150400.24.170.2.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-devel-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-devel-5.14.21-150400.24.170.1.noarch",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-docs-5.14.21-150400.24.170.1.noarch",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-macros-5.14.21-150400.24.170.1.noarch",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-obs-build-5.14.21-150400.24.170.2.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-obs-build-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-source-5.14.21-150400.24.170.1.noarch",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-syms-5.14.21-150400.24.170.1.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-syms-5.14.21-150400.24.170.1.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.170.2.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.170.2.x86_64",
          "SUSE Manager Proxy 4.3:kernel-default-5.14.21-150400.24.170.2.x86_64",
          "SUSE Manager Proxy 4.3:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
          "SUSE Manager Proxy 4.3:kernel-default-devel-5.14.21-150400.24.170.2.x86_64",
          "SUSE Manager Proxy 4.3:kernel-devel-5.14.21-150400.24.170.1.noarch",
          "SUSE Manager Proxy 4.3:kernel-macros-5.14.21-150400.24.170.1.noarch",
          "SUSE Manager Proxy 4.3:kernel-source-5.14.21-150400.24.170.1.noarch",
          "SUSE Manager Proxy 4.3:kernel-syms-5.14.21-150400.24.170.1.x86_64",
          "SUSE Manager Server 4.3:kernel-default-5.14.21-150400.24.170.2.ppc64le",
          "SUSE Manager Server 4.3:kernel-default-5.14.21-150400.24.170.2.s390x",
          "SUSE Manager Server 4.3:kernel-default-5.14.21-150400.24.170.2.x86_64",
          "SUSE Manager Server 4.3:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.ppc64le",
          "SUSE Manager Server 4.3:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
          "SUSE Manager Server 4.3:kernel-default-devel-5.14.21-150400.24.170.2.ppc64le",
          "SUSE Manager Server 4.3:kernel-default-devel-5.14.21-150400.24.170.2.s390x",
          "SUSE Manager Server 4.3:kernel-default-devel-5.14.21-150400.24.170.2.x86_64",
          "SUSE Manager Server 4.3:kernel-devel-5.14.21-150400.24.170.1.noarch",
          "SUSE Manager Server 4.3:kernel-macros-5.14.21-150400.24.170.1.noarch",
          "SUSE Manager Server 4.3:kernel-source-5.14.21-150400.24.170.1.noarch",
          "SUSE Manager Server 4.3:kernel-syms-5.14.21-150400.24.170.1.ppc64le",
          "SUSE Manager Server 4.3:kernel-syms-5.14.21-150400.24.170.1.s390x",
          "SUSE Manager Server 4.3:kernel-syms-5.14.21-150400.24.170.1.x86_64",
          "SUSE Manager Server 4.3:kernel-zfcpdump-5.14.21-150400.24.170.2.s390x"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2022-50206",
          "url": "https://www.suse.com/security/cve/CVE-2022-50206"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1245152 for CVE-2022-50206",
          "url": "https://bugzilla.suse.com/1245152"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-64kb-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-64kb-devel-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-devel-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-devel-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-devel-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-docs-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-macros-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-obs-build-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-obs-build-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-source-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-syms-5.14.21-150400.24.170.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-syms-5.14.21-150400.24.170.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:reiserfs-kmp-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:reiserfs-kmp-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-64kb-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-64kb-devel-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-devel-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-docs-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-macros-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-source-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.170.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.170.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_170-default-1-150400.9.3.2.ppc64le",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_170-default-1-150400.9.3.2.s390x",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_170-default-1-150400.9.3.2.x86_64",
            "SUSE Linux Enterprise Micro 5.3:kernel-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise Micro 5.3:kernel-default-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise Micro 5.3:kernel-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Micro 5.3:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.aarch64",
            "SUSE Linux Enterprise Micro 5.3:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
            "SUSE Linux Enterprise Micro 5.4:kernel-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise Micro 5.4:kernel-default-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise Micro 5.4:kernel-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Micro 5.4:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.aarch64",
            "SUSE Linux Enterprise Micro 5.4:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-64kb-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-64kb-devel-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.aarch64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.ppc64le",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-devel-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-docs-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-macros-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-source-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.170.1.aarch64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.170.1.ppc64le",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.170.1.s390x",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.170.1.x86_64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-zfcpdump-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-devel-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-devel-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-devel-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-docs-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-macros-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-obs-build-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-obs-build-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-source-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-syms-5.14.21-150400.24.170.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-syms-5.14.21-150400.24.170.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Manager Proxy 4.3:kernel-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Manager Proxy 4.3:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
            "SUSE Manager Proxy 4.3:kernel-default-devel-5.14.21-150400.24.170.2.x86_64",
            "SUSE Manager Proxy 4.3:kernel-devel-5.14.21-150400.24.170.1.noarch",
            "SUSE Manager Proxy 4.3:kernel-macros-5.14.21-150400.24.170.1.noarch",
            "SUSE Manager Proxy 4.3:kernel-source-5.14.21-150400.24.170.1.noarch",
            "SUSE Manager Proxy 4.3:kernel-syms-5.14.21-150400.24.170.1.x86_64",
            "SUSE Manager Server 4.3:kernel-default-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Manager Server 4.3:kernel-default-5.14.21-150400.24.170.2.s390x",
            "SUSE Manager Server 4.3:kernel-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Manager Server 4.3:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.ppc64le",
            "SUSE Manager Server 4.3:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
            "SUSE Manager Server 4.3:kernel-default-devel-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Manager Server 4.3:kernel-default-devel-5.14.21-150400.24.170.2.s390x",
            "SUSE Manager Server 4.3:kernel-default-devel-5.14.21-150400.24.170.2.x86_64",
            "SUSE Manager Server 4.3:kernel-devel-5.14.21-150400.24.170.1.noarch",
            "SUSE Manager Server 4.3:kernel-macros-5.14.21-150400.24.170.1.noarch",
            "SUSE Manager Server 4.3:kernel-source-5.14.21-150400.24.170.1.noarch",
            "SUSE Manager Server 4.3:kernel-syms-5.14.21-150400.24.170.1.ppc64le",
            "SUSE Manager Server 4.3:kernel-syms-5.14.21-150400.24.170.1.s390x",
            "SUSE Manager Server 4.3:kernel-syms-5.14.21-150400.24.170.1.x86_64",
            "SUSE Manager Server 4.3:kernel-zfcpdump-5.14.21-150400.24.170.2.s390x"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 4.7,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H",
            "version": "3.1"
          },
          "products": [
            "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-64kb-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-64kb-devel-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-devel-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-devel-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-devel-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-docs-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-macros-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-obs-build-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-obs-build-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-source-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-syms-5.14.21-150400.24.170.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-syms-5.14.21-150400.24.170.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:reiserfs-kmp-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:reiserfs-kmp-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-64kb-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-64kb-devel-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-devel-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-docs-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-macros-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-source-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.170.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.170.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_170-default-1-150400.9.3.2.ppc64le",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_170-default-1-150400.9.3.2.s390x",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_170-default-1-150400.9.3.2.x86_64",
            "SUSE Linux Enterprise Micro 5.3:kernel-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise Micro 5.3:kernel-default-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise Micro 5.3:kernel-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Micro 5.3:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.aarch64",
            "SUSE Linux Enterprise Micro 5.3:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
            "SUSE Linux Enterprise Micro 5.4:kernel-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise Micro 5.4:kernel-default-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise Micro 5.4:kernel-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Micro 5.4:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.aarch64",
            "SUSE Linux Enterprise Micro 5.4:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-64kb-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-64kb-devel-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.aarch64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.ppc64le",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-devel-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-docs-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-macros-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-source-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.170.1.aarch64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.170.1.ppc64le",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.170.1.s390x",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.170.1.x86_64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-zfcpdump-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-devel-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-devel-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-devel-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-docs-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-macros-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-obs-build-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-obs-build-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-source-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-syms-5.14.21-150400.24.170.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-syms-5.14.21-150400.24.170.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Manager Proxy 4.3:kernel-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Manager Proxy 4.3:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
            "SUSE Manager Proxy 4.3:kernel-default-devel-5.14.21-150400.24.170.2.x86_64",
            "SUSE Manager Proxy 4.3:kernel-devel-5.14.21-150400.24.170.1.noarch",
            "SUSE Manager Proxy 4.3:kernel-macros-5.14.21-150400.24.170.1.noarch",
            "SUSE Manager Proxy 4.3:kernel-source-5.14.21-150400.24.170.1.noarch",
            "SUSE Manager Proxy 4.3:kernel-syms-5.14.21-150400.24.170.1.x86_64",
            "SUSE Manager Server 4.3:kernel-default-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Manager Server 4.3:kernel-default-5.14.21-150400.24.170.2.s390x",
            "SUSE Manager Server 4.3:kernel-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Manager Server 4.3:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.ppc64le",
            "SUSE Manager Server 4.3:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
            "SUSE Manager Server 4.3:kernel-default-devel-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Manager Server 4.3:kernel-default-devel-5.14.21-150400.24.170.2.s390x",
            "SUSE Manager Server 4.3:kernel-default-devel-5.14.21-150400.24.170.2.x86_64",
            "SUSE Manager Server 4.3:kernel-devel-5.14.21-150400.24.170.1.noarch",
            "SUSE Manager Server 4.3:kernel-macros-5.14.21-150400.24.170.1.noarch",
            "SUSE Manager Server 4.3:kernel-source-5.14.21-150400.24.170.1.noarch",
            "SUSE Manager Server 4.3:kernel-syms-5.14.21-150400.24.170.1.ppc64le",
            "SUSE Manager Server 4.3:kernel-syms-5.14.21-150400.24.170.1.s390x",
            "SUSE Manager Server 4.3:kernel-syms-5.14.21-150400.24.170.1.x86_64",
            "SUSE Manager Server 4.3:kernel-zfcpdump-5.14.21-150400.24.170.2.s390x"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2025-07-28T15:09:33Z",
          "details": "moderate"
        }
      ],
      "title": "CVE-2022-50206"
    },
    {
      "cve": "CVE-2022-50207",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2022-50207"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "In the Linux kernel, the following vulnerability has been resolved:\n\nARM: bcm: Fix refcount leak in bcm_kona_smc_init\n\nof_find_matching_node() returns a node pointer with refcount\nincremented, we should use of_node_put() on it when not need anymore.\nAdd missing of_node_put() to avoid refcount leak.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.170.2.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.170.2.s390x",
          "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.170.2.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.170.2.s390x",
          "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.170.2.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.170.2.s390x",
          "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.170.2.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.170.2.s390x",
          "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-64kb-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-64kb-devel-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-devel-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-devel-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-devel-5.14.21-150400.24.170.1.noarch",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-docs-5.14.21-150400.24.170.1.noarch",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-macros-5.14.21-150400.24.170.1.noarch",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-obs-build-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-obs-build-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-source-5.14.21-150400.24.170.1.noarch",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-syms-5.14.21-150400.24.170.1.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-syms-5.14.21-150400.24.170.1.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:reiserfs-kmp-default-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:reiserfs-kmp-default-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-64kb-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-64kb-devel-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-devel-5.14.21-150400.24.170.1.noarch",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-docs-5.14.21-150400.24.170.1.noarch",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-macros-5.14.21-150400.24.170.1.noarch",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-source-5.14.21-150400.24.170.1.noarch",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.170.1.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.170.1.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.170.2.ppc64le",
          "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.170.2.s390x",
          "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.170.2.ppc64le",
          "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.170.2.s390x",
          "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_170-default-1-150400.9.3.2.ppc64le",
          "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_170-default-1-150400.9.3.2.s390x",
          "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_170-default-1-150400.9.3.2.x86_64",
          "SUSE Linux Enterprise Micro 5.3:kernel-default-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise Micro 5.3:kernel-default-5.14.21-150400.24.170.2.s390x",
          "SUSE Linux Enterprise Micro 5.3:kernel-default-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise Micro 5.3:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.aarch64",
          "SUSE Linux Enterprise Micro 5.3:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
          "SUSE Linux Enterprise Micro 5.4:kernel-default-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise Micro 5.4:kernel-default-5.14.21-150400.24.170.2.s390x",
          "SUSE Linux Enterprise Micro 5.4:kernel-default-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise Micro 5.4:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.aarch64",
          "SUSE Linux Enterprise Micro 5.4:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-64kb-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-64kb-devel-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-5.14.21-150400.24.170.2.ppc64le",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-5.14.21-150400.24.170.2.s390x",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.aarch64",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.ppc64le",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.170.2.ppc64le",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.170.2.s390x",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-devel-5.14.21-150400.24.170.1.noarch",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-docs-5.14.21-150400.24.170.1.noarch",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-macros-5.14.21-150400.24.170.1.noarch",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.170.2.ppc64le",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.170.2.s390x",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-source-5.14.21-150400.24.170.1.noarch",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.170.1.aarch64",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.170.1.ppc64le",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.170.1.s390x",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.170.1.x86_64",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-zfcpdump-5.14.21-150400.24.170.2.s390x",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.170.2.ppc64le",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.170.2.s390x",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-5.14.21-150400.24.170.2.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-devel-5.14.21-150400.24.170.2.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-devel-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-devel-5.14.21-150400.24.170.1.noarch",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-docs-5.14.21-150400.24.170.1.noarch",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-macros-5.14.21-150400.24.170.1.noarch",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-obs-build-5.14.21-150400.24.170.2.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-obs-build-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-source-5.14.21-150400.24.170.1.noarch",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-syms-5.14.21-150400.24.170.1.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-syms-5.14.21-150400.24.170.1.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.170.2.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.170.2.x86_64",
          "SUSE Manager Proxy 4.3:kernel-default-5.14.21-150400.24.170.2.x86_64",
          "SUSE Manager Proxy 4.3:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
          "SUSE Manager Proxy 4.3:kernel-default-devel-5.14.21-150400.24.170.2.x86_64",
          "SUSE Manager Proxy 4.3:kernel-devel-5.14.21-150400.24.170.1.noarch",
          "SUSE Manager Proxy 4.3:kernel-macros-5.14.21-150400.24.170.1.noarch",
          "SUSE Manager Proxy 4.3:kernel-source-5.14.21-150400.24.170.1.noarch",
          "SUSE Manager Proxy 4.3:kernel-syms-5.14.21-150400.24.170.1.x86_64",
          "SUSE Manager Server 4.3:kernel-default-5.14.21-150400.24.170.2.ppc64le",
          "SUSE Manager Server 4.3:kernel-default-5.14.21-150400.24.170.2.s390x",
          "SUSE Manager Server 4.3:kernel-default-5.14.21-150400.24.170.2.x86_64",
          "SUSE Manager Server 4.3:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.ppc64le",
          "SUSE Manager Server 4.3:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
          "SUSE Manager Server 4.3:kernel-default-devel-5.14.21-150400.24.170.2.ppc64le",
          "SUSE Manager Server 4.3:kernel-default-devel-5.14.21-150400.24.170.2.s390x",
          "SUSE Manager Server 4.3:kernel-default-devel-5.14.21-150400.24.170.2.x86_64",
          "SUSE Manager Server 4.3:kernel-devel-5.14.21-150400.24.170.1.noarch",
          "SUSE Manager Server 4.3:kernel-macros-5.14.21-150400.24.170.1.noarch",
          "SUSE Manager Server 4.3:kernel-source-5.14.21-150400.24.170.1.noarch",
          "SUSE Manager Server 4.3:kernel-syms-5.14.21-150400.24.170.1.ppc64le",
          "SUSE Manager Server 4.3:kernel-syms-5.14.21-150400.24.170.1.s390x",
          "SUSE Manager Server 4.3:kernel-syms-5.14.21-150400.24.170.1.x86_64",
          "SUSE Manager Server 4.3:kernel-zfcpdump-5.14.21-150400.24.170.2.s390x"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2022-50207",
          "url": "https://www.suse.com/security/cve/CVE-2022-50207"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1244871 for CVE-2022-50207",
          "url": "https://bugzilla.suse.com/1244871"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-64kb-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-64kb-devel-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-devel-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-devel-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-devel-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-docs-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-macros-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-obs-build-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-obs-build-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-source-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-syms-5.14.21-150400.24.170.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-syms-5.14.21-150400.24.170.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:reiserfs-kmp-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:reiserfs-kmp-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-64kb-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-64kb-devel-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-devel-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-docs-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-macros-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-source-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.170.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.170.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_170-default-1-150400.9.3.2.ppc64le",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_170-default-1-150400.9.3.2.s390x",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_170-default-1-150400.9.3.2.x86_64",
            "SUSE Linux Enterprise Micro 5.3:kernel-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise Micro 5.3:kernel-default-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise Micro 5.3:kernel-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Micro 5.3:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.aarch64",
            "SUSE Linux Enterprise Micro 5.3:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
            "SUSE Linux Enterprise Micro 5.4:kernel-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise Micro 5.4:kernel-default-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise Micro 5.4:kernel-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Micro 5.4:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.aarch64",
            "SUSE Linux Enterprise Micro 5.4:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-64kb-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-64kb-devel-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.aarch64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.ppc64le",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-devel-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-docs-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-macros-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-source-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.170.1.aarch64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.170.1.ppc64le",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.170.1.s390x",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.170.1.x86_64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-zfcpdump-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-devel-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-devel-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-devel-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-docs-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-macros-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-obs-build-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-obs-build-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-source-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-syms-5.14.21-150400.24.170.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-syms-5.14.21-150400.24.170.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Manager Proxy 4.3:kernel-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Manager Proxy 4.3:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
            "SUSE Manager Proxy 4.3:kernel-default-devel-5.14.21-150400.24.170.2.x86_64",
            "SUSE Manager Proxy 4.3:kernel-devel-5.14.21-150400.24.170.1.noarch",
            "SUSE Manager Proxy 4.3:kernel-macros-5.14.21-150400.24.170.1.noarch",
            "SUSE Manager Proxy 4.3:kernel-source-5.14.21-150400.24.170.1.noarch",
            "SUSE Manager Proxy 4.3:kernel-syms-5.14.21-150400.24.170.1.x86_64",
            "SUSE Manager Server 4.3:kernel-default-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Manager Server 4.3:kernel-default-5.14.21-150400.24.170.2.s390x",
            "SUSE Manager Server 4.3:kernel-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Manager Server 4.3:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.ppc64le",
            "SUSE Manager Server 4.3:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
            "SUSE Manager Server 4.3:kernel-default-devel-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Manager Server 4.3:kernel-default-devel-5.14.21-150400.24.170.2.s390x",
            "SUSE Manager Server 4.3:kernel-default-devel-5.14.21-150400.24.170.2.x86_64",
            "SUSE Manager Server 4.3:kernel-devel-5.14.21-150400.24.170.1.noarch",
            "SUSE Manager Server 4.3:kernel-macros-5.14.21-150400.24.170.1.noarch",
            "SUSE Manager Server 4.3:kernel-source-5.14.21-150400.24.170.1.noarch",
            "SUSE Manager Server 4.3:kernel-syms-5.14.21-150400.24.170.1.ppc64le",
            "SUSE Manager Server 4.3:kernel-syms-5.14.21-150400.24.170.1.s390x",
            "SUSE Manager Server 4.3:kernel-syms-5.14.21-150400.24.170.1.x86_64",
            "SUSE Manager Server 4.3:kernel-zfcpdump-5.14.21-150400.24.170.2.s390x"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 5.5,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
            "version": "3.1"
          },
          "products": [
            "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-64kb-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-64kb-devel-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-devel-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-devel-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-devel-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-docs-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-macros-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-obs-build-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-obs-build-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-source-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-syms-5.14.21-150400.24.170.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-syms-5.14.21-150400.24.170.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:reiserfs-kmp-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:reiserfs-kmp-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-64kb-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-64kb-devel-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-devel-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-docs-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-macros-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-source-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.170.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.170.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_170-default-1-150400.9.3.2.ppc64le",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_170-default-1-150400.9.3.2.s390x",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_170-default-1-150400.9.3.2.x86_64",
            "SUSE Linux Enterprise Micro 5.3:kernel-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise Micro 5.3:kernel-default-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise Micro 5.3:kernel-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Micro 5.3:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.aarch64",
            "SUSE Linux Enterprise Micro 5.3:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
            "SUSE Linux Enterprise Micro 5.4:kernel-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise Micro 5.4:kernel-default-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise Micro 5.4:kernel-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Micro 5.4:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.aarch64",
            "SUSE Linux Enterprise Micro 5.4:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-64kb-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-64kb-devel-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.aarch64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.ppc64le",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-devel-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-docs-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-macros-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-source-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.170.1.aarch64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.170.1.ppc64le",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.170.1.s390x",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.170.1.x86_64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-zfcpdump-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-devel-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-devel-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-devel-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-docs-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-macros-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-obs-build-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-obs-build-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-source-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-syms-5.14.21-150400.24.170.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-syms-5.14.21-150400.24.170.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Manager Proxy 4.3:kernel-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Manager Proxy 4.3:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
            "SUSE Manager Proxy 4.3:kernel-default-devel-5.14.21-150400.24.170.2.x86_64",
            "SUSE Manager Proxy 4.3:kernel-devel-5.14.21-150400.24.170.1.noarch",
            "SUSE Manager Proxy 4.3:kernel-macros-5.14.21-150400.24.170.1.noarch",
            "SUSE Manager Proxy 4.3:kernel-source-5.14.21-150400.24.170.1.noarch",
            "SUSE Manager Proxy 4.3:kernel-syms-5.14.21-150400.24.170.1.x86_64",
            "SUSE Manager Server 4.3:kernel-default-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Manager Server 4.3:kernel-default-5.14.21-150400.24.170.2.s390x",
            "SUSE Manager Server 4.3:kernel-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Manager Server 4.3:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.ppc64le",
            "SUSE Manager Server 4.3:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
            "SUSE Manager Server 4.3:kernel-default-devel-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Manager Server 4.3:kernel-default-devel-5.14.21-150400.24.170.2.s390x",
            "SUSE Manager Server 4.3:kernel-default-devel-5.14.21-150400.24.170.2.x86_64",
            "SUSE Manager Server 4.3:kernel-devel-5.14.21-150400.24.170.1.noarch",
            "SUSE Manager Server 4.3:kernel-macros-5.14.21-150400.24.170.1.noarch",
            "SUSE Manager Server 4.3:kernel-source-5.14.21-150400.24.170.1.noarch",
            "SUSE Manager Server 4.3:kernel-syms-5.14.21-150400.24.170.1.ppc64le",
            "SUSE Manager Server 4.3:kernel-syms-5.14.21-150400.24.170.1.s390x",
            "SUSE Manager Server 4.3:kernel-syms-5.14.21-150400.24.170.1.x86_64",
            "SUSE Manager Server 4.3:kernel-zfcpdump-5.14.21-150400.24.170.2.s390x"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2025-07-28T15:09:33Z",
          "details": "moderate"
        }
      ],
      "title": "CVE-2022-50207"
    },
    {
      "cve": "CVE-2022-50208",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2022-50208"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "In the Linux kernel, the following vulnerability has been resolved:\n\nsoc: amlogic: Fix refcount leak in meson-secure-pwrc.c\n\nIn meson_secure_pwrc_probe(), there is a refcount leak in one fail\npath.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.170.2.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.170.2.s390x",
          "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.170.2.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.170.2.s390x",
          "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.170.2.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.170.2.s390x",
          "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.170.2.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.170.2.s390x",
          "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-64kb-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-64kb-devel-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-devel-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-devel-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-devel-5.14.21-150400.24.170.1.noarch",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-docs-5.14.21-150400.24.170.1.noarch",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-macros-5.14.21-150400.24.170.1.noarch",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-obs-build-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-obs-build-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-source-5.14.21-150400.24.170.1.noarch",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-syms-5.14.21-150400.24.170.1.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-syms-5.14.21-150400.24.170.1.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:reiserfs-kmp-default-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:reiserfs-kmp-default-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-64kb-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-64kb-devel-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-devel-5.14.21-150400.24.170.1.noarch",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-docs-5.14.21-150400.24.170.1.noarch",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-macros-5.14.21-150400.24.170.1.noarch",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-source-5.14.21-150400.24.170.1.noarch",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.170.1.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.170.1.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.170.2.ppc64le",
          "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.170.2.s390x",
          "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.170.2.ppc64le",
          "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.170.2.s390x",
          "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_170-default-1-150400.9.3.2.ppc64le",
          "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_170-default-1-150400.9.3.2.s390x",
          "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_170-default-1-150400.9.3.2.x86_64",
          "SUSE Linux Enterprise Micro 5.3:kernel-default-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise Micro 5.3:kernel-default-5.14.21-150400.24.170.2.s390x",
          "SUSE Linux Enterprise Micro 5.3:kernel-default-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise Micro 5.3:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.aarch64",
          "SUSE Linux Enterprise Micro 5.3:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
          "SUSE Linux Enterprise Micro 5.4:kernel-default-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise Micro 5.4:kernel-default-5.14.21-150400.24.170.2.s390x",
          "SUSE Linux Enterprise Micro 5.4:kernel-default-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise Micro 5.4:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.aarch64",
          "SUSE Linux Enterprise Micro 5.4:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-64kb-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-64kb-devel-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-5.14.21-150400.24.170.2.ppc64le",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-5.14.21-150400.24.170.2.s390x",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.aarch64",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.ppc64le",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.170.2.ppc64le",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.170.2.s390x",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-devel-5.14.21-150400.24.170.1.noarch",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-docs-5.14.21-150400.24.170.1.noarch",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-macros-5.14.21-150400.24.170.1.noarch",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.170.2.ppc64le",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.170.2.s390x",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-source-5.14.21-150400.24.170.1.noarch",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.170.1.aarch64",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.170.1.ppc64le",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.170.1.s390x",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.170.1.x86_64",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-zfcpdump-5.14.21-150400.24.170.2.s390x",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.170.2.ppc64le",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.170.2.s390x",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-5.14.21-150400.24.170.2.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-devel-5.14.21-150400.24.170.2.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-devel-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-devel-5.14.21-150400.24.170.1.noarch",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-docs-5.14.21-150400.24.170.1.noarch",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-macros-5.14.21-150400.24.170.1.noarch",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-obs-build-5.14.21-150400.24.170.2.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-obs-build-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-source-5.14.21-150400.24.170.1.noarch",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-syms-5.14.21-150400.24.170.1.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-syms-5.14.21-150400.24.170.1.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.170.2.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.170.2.x86_64",
          "SUSE Manager Proxy 4.3:kernel-default-5.14.21-150400.24.170.2.x86_64",
          "SUSE Manager Proxy 4.3:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
          "SUSE Manager Proxy 4.3:kernel-default-devel-5.14.21-150400.24.170.2.x86_64",
          "SUSE Manager Proxy 4.3:kernel-devel-5.14.21-150400.24.170.1.noarch",
          "SUSE Manager Proxy 4.3:kernel-macros-5.14.21-150400.24.170.1.noarch",
          "SUSE Manager Proxy 4.3:kernel-source-5.14.21-150400.24.170.1.noarch",
          "SUSE Manager Proxy 4.3:kernel-syms-5.14.21-150400.24.170.1.x86_64",
          "SUSE Manager Server 4.3:kernel-default-5.14.21-150400.24.170.2.ppc64le",
          "SUSE Manager Server 4.3:kernel-default-5.14.21-150400.24.170.2.s390x",
          "SUSE Manager Server 4.3:kernel-default-5.14.21-150400.24.170.2.x86_64",
          "SUSE Manager Server 4.3:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.ppc64le",
          "SUSE Manager Server 4.3:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
          "SUSE Manager Server 4.3:kernel-default-devel-5.14.21-150400.24.170.2.ppc64le",
          "SUSE Manager Server 4.3:kernel-default-devel-5.14.21-150400.24.170.2.s390x",
          "SUSE Manager Server 4.3:kernel-default-devel-5.14.21-150400.24.170.2.x86_64",
          "SUSE Manager Server 4.3:kernel-devel-5.14.21-150400.24.170.1.noarch",
          "SUSE Manager Server 4.3:kernel-macros-5.14.21-150400.24.170.1.noarch",
          "SUSE Manager Server 4.3:kernel-source-5.14.21-150400.24.170.1.noarch",
          "SUSE Manager Server 4.3:kernel-syms-5.14.21-150400.24.170.1.ppc64le",
          "SUSE Manager Server 4.3:kernel-syms-5.14.21-150400.24.170.1.s390x",
          "SUSE Manager Server 4.3:kernel-syms-5.14.21-150400.24.170.1.x86_64",
          "SUSE Manager Server 4.3:kernel-zfcpdump-5.14.21-150400.24.170.2.s390x"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2022-50208",
          "url": "https://www.suse.com/security/cve/CVE-2022-50208"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1244870 for CVE-2022-50208",
          "url": "https://bugzilla.suse.com/1244870"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-64kb-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-64kb-devel-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-devel-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-devel-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-devel-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-docs-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-macros-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-obs-build-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-obs-build-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-source-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-syms-5.14.21-150400.24.170.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-syms-5.14.21-150400.24.170.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:reiserfs-kmp-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:reiserfs-kmp-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-64kb-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-64kb-devel-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-devel-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-docs-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-macros-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-source-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.170.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.170.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_170-default-1-150400.9.3.2.ppc64le",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_170-default-1-150400.9.3.2.s390x",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_170-default-1-150400.9.3.2.x86_64",
            "SUSE Linux Enterprise Micro 5.3:kernel-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise Micro 5.3:kernel-default-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise Micro 5.3:kernel-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Micro 5.3:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.aarch64",
            "SUSE Linux Enterprise Micro 5.3:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
            "SUSE Linux Enterprise Micro 5.4:kernel-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise Micro 5.4:kernel-default-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise Micro 5.4:kernel-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Micro 5.4:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.aarch64",
            "SUSE Linux Enterprise Micro 5.4:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-64kb-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-64kb-devel-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.aarch64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.ppc64le",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-devel-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-docs-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-macros-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-source-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.170.1.aarch64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.170.1.ppc64le",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.170.1.s390x",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.170.1.x86_64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-zfcpdump-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-devel-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-devel-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-devel-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-docs-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-macros-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-obs-build-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-obs-build-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-source-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-syms-5.14.21-150400.24.170.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-syms-5.14.21-150400.24.170.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Manager Proxy 4.3:kernel-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Manager Proxy 4.3:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
            "SUSE Manager Proxy 4.3:kernel-default-devel-5.14.21-150400.24.170.2.x86_64",
            "SUSE Manager Proxy 4.3:kernel-devel-5.14.21-150400.24.170.1.noarch",
            "SUSE Manager Proxy 4.3:kernel-macros-5.14.21-150400.24.170.1.noarch",
            "SUSE Manager Proxy 4.3:kernel-source-5.14.21-150400.24.170.1.noarch",
            "SUSE Manager Proxy 4.3:kernel-syms-5.14.21-150400.24.170.1.x86_64",
            "SUSE Manager Server 4.3:kernel-default-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Manager Server 4.3:kernel-default-5.14.21-150400.24.170.2.s390x",
            "SUSE Manager Server 4.3:kernel-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Manager Server 4.3:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.ppc64le",
            "SUSE Manager Server 4.3:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
            "SUSE Manager Server 4.3:kernel-default-devel-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Manager Server 4.3:kernel-default-devel-5.14.21-150400.24.170.2.s390x",
            "SUSE Manager Server 4.3:kernel-default-devel-5.14.21-150400.24.170.2.x86_64",
            "SUSE Manager Server 4.3:kernel-devel-5.14.21-150400.24.170.1.noarch",
            "SUSE Manager Server 4.3:kernel-macros-5.14.21-150400.24.170.1.noarch",
            "SUSE Manager Server 4.3:kernel-source-5.14.21-150400.24.170.1.noarch",
            "SUSE Manager Server 4.3:kernel-syms-5.14.21-150400.24.170.1.ppc64le",
            "SUSE Manager Server 4.3:kernel-syms-5.14.21-150400.24.170.1.s390x",
            "SUSE Manager Server 4.3:kernel-syms-5.14.21-150400.24.170.1.x86_64",
            "SUSE Manager Server 4.3:kernel-zfcpdump-5.14.21-150400.24.170.2.s390x"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 5.5,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
            "version": "3.1"
          },
          "products": [
            "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-64kb-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-64kb-devel-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-devel-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-devel-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-devel-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-docs-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-macros-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-obs-build-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-obs-build-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-source-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-syms-5.14.21-150400.24.170.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-syms-5.14.21-150400.24.170.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:reiserfs-kmp-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:reiserfs-kmp-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-64kb-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-64kb-devel-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-devel-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-docs-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-macros-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-source-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.170.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.170.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_170-default-1-150400.9.3.2.ppc64le",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_170-default-1-150400.9.3.2.s390x",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_170-default-1-150400.9.3.2.x86_64",
            "SUSE Linux Enterprise Micro 5.3:kernel-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise Micro 5.3:kernel-default-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise Micro 5.3:kernel-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Micro 5.3:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.aarch64",
            "SUSE Linux Enterprise Micro 5.3:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
            "SUSE Linux Enterprise Micro 5.4:kernel-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise Micro 5.4:kernel-default-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise Micro 5.4:kernel-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Micro 5.4:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.aarch64",
            "SUSE Linux Enterprise Micro 5.4:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-64kb-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-64kb-devel-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.aarch64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.ppc64le",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-devel-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-docs-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-macros-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-source-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.170.1.aarch64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.170.1.ppc64le",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.170.1.s390x",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.170.1.x86_64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-zfcpdump-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-devel-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-devel-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-devel-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-docs-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-macros-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-obs-build-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-obs-build-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-source-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-syms-5.14.21-150400.24.170.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-syms-5.14.21-150400.24.170.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Manager Proxy 4.3:kernel-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Manager Proxy 4.3:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
            "SUSE Manager Proxy 4.3:kernel-default-devel-5.14.21-150400.24.170.2.x86_64",
            "SUSE Manager Proxy 4.3:kernel-devel-5.14.21-150400.24.170.1.noarch",
            "SUSE Manager Proxy 4.3:kernel-macros-5.14.21-150400.24.170.1.noarch",
            "SUSE Manager Proxy 4.3:kernel-source-5.14.21-150400.24.170.1.noarch",
            "SUSE Manager Proxy 4.3:kernel-syms-5.14.21-150400.24.170.1.x86_64",
            "SUSE Manager Server 4.3:kernel-default-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Manager Server 4.3:kernel-default-5.14.21-150400.24.170.2.s390x",
            "SUSE Manager Server 4.3:kernel-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Manager Server 4.3:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.ppc64le",
            "SUSE Manager Server 4.3:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
            "SUSE Manager Server 4.3:kernel-default-devel-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Manager Server 4.3:kernel-default-devel-5.14.21-150400.24.170.2.s390x",
            "SUSE Manager Server 4.3:kernel-default-devel-5.14.21-150400.24.170.2.x86_64",
            "SUSE Manager Server 4.3:kernel-devel-5.14.21-150400.24.170.1.noarch",
            "SUSE Manager Server 4.3:kernel-macros-5.14.21-150400.24.170.1.noarch",
            "SUSE Manager Server 4.3:kernel-source-5.14.21-150400.24.170.1.noarch",
            "SUSE Manager Server 4.3:kernel-syms-5.14.21-150400.24.170.1.ppc64le",
            "SUSE Manager Server 4.3:kernel-syms-5.14.21-150400.24.170.1.s390x",
            "SUSE Manager Server 4.3:kernel-syms-5.14.21-150400.24.170.1.x86_64",
            "SUSE Manager Server 4.3:kernel-zfcpdump-5.14.21-150400.24.170.2.s390x"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2025-07-28T15:09:33Z",
          "details": "moderate"
        }
      ],
      "title": "CVE-2022-50208"
    },
    {
      "cve": "CVE-2022-50209",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2022-50209"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "In the Linux kernel, the following vulnerability has been resolved:\n\nmeson-mx-socinfo: Fix refcount leak in meson_mx_socinfo_init\n\nof_find_matching_node() returns a node pointer with refcount\nincremented, we should use of_node_put() on it when not need anymore.\nAdd missing of_node_put() to avoid refcount leak.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.170.2.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.170.2.s390x",
          "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.170.2.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.170.2.s390x",
          "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.170.2.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.170.2.s390x",
          "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.170.2.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.170.2.s390x",
          "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-64kb-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-64kb-devel-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-devel-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-devel-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-devel-5.14.21-150400.24.170.1.noarch",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-docs-5.14.21-150400.24.170.1.noarch",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-macros-5.14.21-150400.24.170.1.noarch",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-obs-build-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-obs-build-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-source-5.14.21-150400.24.170.1.noarch",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-syms-5.14.21-150400.24.170.1.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-syms-5.14.21-150400.24.170.1.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:reiserfs-kmp-default-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:reiserfs-kmp-default-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-64kb-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-64kb-devel-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-devel-5.14.21-150400.24.170.1.noarch",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-docs-5.14.21-150400.24.170.1.noarch",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-macros-5.14.21-150400.24.170.1.noarch",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-source-5.14.21-150400.24.170.1.noarch",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.170.1.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.170.1.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.170.2.ppc64le",
          "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.170.2.s390x",
          "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.170.2.ppc64le",
          "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.170.2.s390x",
          "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_170-default-1-150400.9.3.2.ppc64le",
          "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_170-default-1-150400.9.3.2.s390x",
          "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_170-default-1-150400.9.3.2.x86_64",
          "SUSE Linux Enterprise Micro 5.3:kernel-default-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise Micro 5.3:kernel-default-5.14.21-150400.24.170.2.s390x",
          "SUSE Linux Enterprise Micro 5.3:kernel-default-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise Micro 5.3:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.aarch64",
          "SUSE Linux Enterprise Micro 5.3:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
          "SUSE Linux Enterprise Micro 5.4:kernel-default-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise Micro 5.4:kernel-default-5.14.21-150400.24.170.2.s390x",
          "SUSE Linux Enterprise Micro 5.4:kernel-default-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise Micro 5.4:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.aarch64",
          "SUSE Linux Enterprise Micro 5.4:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-64kb-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-64kb-devel-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-5.14.21-150400.24.170.2.ppc64le",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-5.14.21-150400.24.170.2.s390x",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.aarch64",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.ppc64le",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.170.2.ppc64le",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.170.2.s390x",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-devel-5.14.21-150400.24.170.1.noarch",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-docs-5.14.21-150400.24.170.1.noarch",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-macros-5.14.21-150400.24.170.1.noarch",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.170.2.ppc64le",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.170.2.s390x",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-source-5.14.21-150400.24.170.1.noarch",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.170.1.aarch64",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.170.1.ppc64le",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.170.1.s390x",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.170.1.x86_64",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-zfcpdump-5.14.21-150400.24.170.2.s390x",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.170.2.ppc64le",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.170.2.s390x",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-5.14.21-150400.24.170.2.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-devel-5.14.21-150400.24.170.2.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-devel-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-devel-5.14.21-150400.24.170.1.noarch",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-docs-5.14.21-150400.24.170.1.noarch",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-macros-5.14.21-150400.24.170.1.noarch",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-obs-build-5.14.21-150400.24.170.2.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-obs-build-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-source-5.14.21-150400.24.170.1.noarch",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-syms-5.14.21-150400.24.170.1.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-syms-5.14.21-150400.24.170.1.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.170.2.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.170.2.x86_64",
          "SUSE Manager Proxy 4.3:kernel-default-5.14.21-150400.24.170.2.x86_64",
          "SUSE Manager Proxy 4.3:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
          "SUSE Manager Proxy 4.3:kernel-default-devel-5.14.21-150400.24.170.2.x86_64",
          "SUSE Manager Proxy 4.3:kernel-devel-5.14.21-150400.24.170.1.noarch",
          "SUSE Manager Proxy 4.3:kernel-macros-5.14.21-150400.24.170.1.noarch",
          "SUSE Manager Proxy 4.3:kernel-source-5.14.21-150400.24.170.1.noarch",
          "SUSE Manager Proxy 4.3:kernel-syms-5.14.21-150400.24.170.1.x86_64",
          "SUSE Manager Server 4.3:kernel-default-5.14.21-150400.24.170.2.ppc64le",
          "SUSE Manager Server 4.3:kernel-default-5.14.21-150400.24.170.2.s390x",
          "SUSE Manager Server 4.3:kernel-default-5.14.21-150400.24.170.2.x86_64",
          "SUSE Manager Server 4.3:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.ppc64le",
          "SUSE Manager Server 4.3:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
          "SUSE Manager Server 4.3:kernel-default-devel-5.14.21-150400.24.170.2.ppc64le",
          "SUSE Manager Server 4.3:kernel-default-devel-5.14.21-150400.24.170.2.s390x",
          "SUSE Manager Server 4.3:kernel-default-devel-5.14.21-150400.24.170.2.x86_64",
          "SUSE Manager Server 4.3:kernel-devel-5.14.21-150400.24.170.1.noarch",
          "SUSE Manager Server 4.3:kernel-macros-5.14.21-150400.24.170.1.noarch",
          "SUSE Manager Server 4.3:kernel-source-5.14.21-150400.24.170.1.noarch",
          "SUSE Manager Server 4.3:kernel-syms-5.14.21-150400.24.170.1.ppc64le",
          "SUSE Manager Server 4.3:kernel-syms-5.14.21-150400.24.170.1.s390x",
          "SUSE Manager Server 4.3:kernel-syms-5.14.21-150400.24.170.1.x86_64",
          "SUSE Manager Server 4.3:kernel-zfcpdump-5.14.21-150400.24.170.2.s390x"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2022-50209",
          "url": "https://www.suse.com/security/cve/CVE-2022-50209"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1244868 for CVE-2022-50209",
          "url": "https://bugzilla.suse.com/1244868"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-64kb-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-64kb-devel-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-devel-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-devel-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-devel-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-docs-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-macros-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-obs-build-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-obs-build-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-source-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-syms-5.14.21-150400.24.170.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-syms-5.14.21-150400.24.170.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:reiserfs-kmp-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:reiserfs-kmp-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-64kb-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-64kb-devel-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-devel-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-docs-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-macros-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-source-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.170.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.170.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_170-default-1-150400.9.3.2.ppc64le",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_170-default-1-150400.9.3.2.s390x",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_170-default-1-150400.9.3.2.x86_64",
            "SUSE Linux Enterprise Micro 5.3:kernel-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise Micro 5.3:kernel-default-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise Micro 5.3:kernel-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Micro 5.3:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.aarch64",
            "SUSE Linux Enterprise Micro 5.3:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
            "SUSE Linux Enterprise Micro 5.4:kernel-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise Micro 5.4:kernel-default-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise Micro 5.4:kernel-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Micro 5.4:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.aarch64",
            "SUSE Linux Enterprise Micro 5.4:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-64kb-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-64kb-devel-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.aarch64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.ppc64le",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-devel-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-docs-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-macros-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-source-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.170.1.aarch64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.170.1.ppc64le",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.170.1.s390x",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.170.1.x86_64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-zfcpdump-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-devel-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-devel-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-devel-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-docs-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-macros-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-obs-build-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-obs-build-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-source-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-syms-5.14.21-150400.24.170.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-syms-5.14.21-150400.24.170.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Manager Proxy 4.3:kernel-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Manager Proxy 4.3:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
            "SUSE Manager Proxy 4.3:kernel-default-devel-5.14.21-150400.24.170.2.x86_64",
            "SUSE Manager Proxy 4.3:kernel-devel-5.14.21-150400.24.170.1.noarch",
            "SUSE Manager Proxy 4.3:kernel-macros-5.14.21-150400.24.170.1.noarch",
            "SUSE Manager Proxy 4.3:kernel-source-5.14.21-150400.24.170.1.noarch",
            "SUSE Manager Proxy 4.3:kernel-syms-5.14.21-150400.24.170.1.x86_64",
            "SUSE Manager Server 4.3:kernel-default-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Manager Server 4.3:kernel-default-5.14.21-150400.24.170.2.s390x",
            "SUSE Manager Server 4.3:kernel-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Manager Server 4.3:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.ppc64le",
            "SUSE Manager Server 4.3:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
            "SUSE Manager Server 4.3:kernel-default-devel-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Manager Server 4.3:kernel-default-devel-5.14.21-150400.24.170.2.s390x",
            "SUSE Manager Server 4.3:kernel-default-devel-5.14.21-150400.24.170.2.x86_64",
            "SUSE Manager Server 4.3:kernel-devel-5.14.21-150400.24.170.1.noarch",
            "SUSE Manager Server 4.3:kernel-macros-5.14.21-150400.24.170.1.noarch",
            "SUSE Manager Server 4.3:kernel-source-5.14.21-150400.24.170.1.noarch",
            "SUSE Manager Server 4.3:kernel-syms-5.14.21-150400.24.170.1.ppc64le",
            "SUSE Manager Server 4.3:kernel-syms-5.14.21-150400.24.170.1.s390x",
            "SUSE Manager Server 4.3:kernel-syms-5.14.21-150400.24.170.1.x86_64",
            "SUSE Manager Server 4.3:kernel-zfcpdump-5.14.21-150400.24.170.2.s390x"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 5.5,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
            "version": "3.1"
          },
          "products": [
            "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-64kb-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-64kb-devel-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-devel-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-devel-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-devel-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-docs-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-macros-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-obs-build-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-obs-build-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-source-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-syms-5.14.21-150400.24.170.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-syms-5.14.21-150400.24.170.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:reiserfs-kmp-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:reiserfs-kmp-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-64kb-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-64kb-devel-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-devel-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-docs-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-macros-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-source-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.170.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.170.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_170-default-1-150400.9.3.2.ppc64le",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_170-default-1-150400.9.3.2.s390x",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_170-default-1-150400.9.3.2.x86_64",
            "SUSE Linux Enterprise Micro 5.3:kernel-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise Micro 5.3:kernel-default-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise Micro 5.3:kernel-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Micro 5.3:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.aarch64",
            "SUSE Linux Enterprise Micro 5.3:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
            "SUSE Linux Enterprise Micro 5.4:kernel-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise Micro 5.4:kernel-default-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise Micro 5.4:kernel-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Micro 5.4:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.aarch64",
            "SUSE Linux Enterprise Micro 5.4:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-64kb-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-64kb-devel-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.aarch64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.ppc64le",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-devel-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-docs-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-macros-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-source-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.170.1.aarch64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.170.1.ppc64le",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.170.1.s390x",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.170.1.x86_64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-zfcpdump-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-devel-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-devel-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-devel-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-docs-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-macros-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-obs-build-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-obs-build-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-source-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-syms-5.14.21-150400.24.170.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-syms-5.14.21-150400.24.170.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Manager Proxy 4.3:kernel-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Manager Proxy 4.3:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
            "SUSE Manager Proxy 4.3:kernel-default-devel-5.14.21-150400.24.170.2.x86_64",
            "SUSE Manager Proxy 4.3:kernel-devel-5.14.21-150400.24.170.1.noarch",
            "SUSE Manager Proxy 4.3:kernel-macros-5.14.21-150400.24.170.1.noarch",
            "SUSE Manager Proxy 4.3:kernel-source-5.14.21-150400.24.170.1.noarch",
            "SUSE Manager Proxy 4.3:kernel-syms-5.14.21-150400.24.170.1.x86_64",
            "SUSE Manager Server 4.3:kernel-default-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Manager Server 4.3:kernel-default-5.14.21-150400.24.170.2.s390x",
            "SUSE Manager Server 4.3:kernel-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Manager Server 4.3:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.ppc64le",
            "SUSE Manager Server 4.3:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
            "SUSE Manager Server 4.3:kernel-default-devel-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Manager Server 4.3:kernel-default-devel-5.14.21-150400.24.170.2.s390x",
            "SUSE Manager Server 4.3:kernel-default-devel-5.14.21-150400.24.170.2.x86_64",
            "SUSE Manager Server 4.3:kernel-devel-5.14.21-150400.24.170.1.noarch",
            "SUSE Manager Server 4.3:kernel-macros-5.14.21-150400.24.170.1.noarch",
            "SUSE Manager Server 4.3:kernel-source-5.14.21-150400.24.170.1.noarch",
            "SUSE Manager Server 4.3:kernel-syms-5.14.21-150400.24.170.1.ppc64le",
            "SUSE Manager Server 4.3:kernel-syms-5.14.21-150400.24.170.1.s390x",
            "SUSE Manager Server 4.3:kernel-syms-5.14.21-150400.24.170.1.x86_64",
            "SUSE Manager Server 4.3:kernel-zfcpdump-5.14.21-150400.24.170.2.s390x"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2025-07-28T15:09:33Z",
          "details": "moderate"
        }
      ],
      "title": "CVE-2022-50209"
    },
    {
      "cve": "CVE-2022-50211",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2022-50211"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "In the Linux kernel, the following vulnerability has been resolved:\n\nmd-raid10: fix KASAN warning\n\nThere\u0027s a KASAN warning in raid10_remove_disk when running the lvm\ntest lvconvert-raid-reshape.sh. We fix this warning by verifying that the\nvalue \"number\" is valid.\n\nBUG: KASAN: slab-out-of-bounds in raid10_remove_disk+0x61/0x2a0 [raid10]\nRead of size 8 at addr ffff889108f3d300 by task mdX_raid10/124682\n\nCPU: 3 PID: 124682 Comm: mdX_raid10 Not tainted 5.19.0-rc6 #1\nHardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.14.0-2 04/01/2014\nCall Trace:\n \u003cTASK\u003e\n dump_stack_lvl+0x34/0x44\n print_report.cold+0x45/0x57a\n ? __lock_text_start+0x18/0x18\n ? raid10_remove_disk+0x61/0x2a0 [raid10]\n kasan_report+0xa8/0xe0\n ? raid10_remove_disk+0x61/0x2a0 [raid10]\n raid10_remove_disk+0x61/0x2a0 [raid10]\nBuffer I/O error on dev dm-76, logical block 15344, async page read\n ? __mutex_unlock_slowpath.constprop.0+0x1e0/0x1e0\n remove_and_add_spares+0x367/0x8a0 [md_mod]\n ? super_written+0x1c0/0x1c0 [md_mod]\n ? mutex_trylock+0xac/0x120\n ? _raw_spin_lock+0x72/0xc0\n ? _raw_spin_lock_bh+0xc0/0xc0\n md_check_recovery+0x848/0x960 [md_mod]\n raid10d+0xcf/0x3360 [raid10]\n ? sched_clock_cpu+0x185/0x1a0\n ? rb_erase+0x4d4/0x620\n ? var_wake_function+0xe0/0xe0\n ? psi_group_change+0x411/0x500\n ? preempt_count_sub+0xf/0xc0\n ? _raw_spin_lock_irqsave+0x78/0xc0\n ? __lock_text_start+0x18/0x18\n ? raid10_sync_request+0x36c0/0x36c0 [raid10]\n ? preempt_count_sub+0xf/0xc0\n ? _raw_spin_unlock_irqrestore+0x19/0x40\n ? del_timer_sync+0xa9/0x100\n ? try_to_del_timer_sync+0xc0/0xc0\n ? _raw_spin_lock_irqsave+0x78/0xc0\n ? __lock_text_start+0x18/0x18\n ? _raw_spin_unlock_irq+0x11/0x24\n ? __list_del_entry_valid+0x68/0xa0\n ? finish_wait+0xa3/0x100\n md_thread+0x161/0x260 [md_mod]\n ? unregister_md_personality+0xa0/0xa0 [md_mod]\n ? _raw_spin_lock_irqsave+0x78/0xc0\n ? prepare_to_wait_event+0x2c0/0x2c0\n ? unregister_md_personality+0xa0/0xa0 [md_mod]\n kthread+0x148/0x180\n ? kthread_complete_and_exit+0x20/0x20\n ret_from_fork+0x1f/0x30\n \u003c/TASK\u003e\n\nAllocated by task 124495:\n kasan_save_stack+0x1e/0x40\n __kasan_kmalloc+0x80/0xa0\n setup_conf+0x140/0x5c0 [raid10]\n raid10_run+0x4cd/0x740 [raid10]\n md_run+0x6f9/0x1300 [md_mod]\n raid_ctr+0x2531/0x4ac0 [dm_raid]\n dm_table_add_target+0x2b0/0x620 [dm_mod]\n table_load+0x1c8/0x400 [dm_mod]\n ctl_ioctl+0x29e/0x560 [dm_mod]\n dm_compat_ctl_ioctl+0x7/0x20 [dm_mod]\n __do_compat_sys_ioctl+0xfa/0x160\n do_syscall_64+0x90/0xc0\n entry_SYSCALL_64_after_hwframe+0x46/0xb0\n\nLast potentially related work creation:\n kasan_save_stack+0x1e/0x40\n __kasan_record_aux_stack+0x9e/0xc0\n kvfree_call_rcu+0x84/0x480\n timerfd_release+0x82/0x140\nL __fput+0xfa/0x400\n task_work_run+0x80/0xc0\n exit_to_user_mode_prepare+0x155/0x160\n syscall_exit_to_user_mode+0x12/0x40\n do_syscall_64+0x42/0xc0\n entry_SYSCALL_64_after_hwframe+0x46/0xb0\n\nSecond to last potentially related work creation:\n kasan_save_stack+0x1e/0x40\n __kasan_record_aux_stack+0x9e/0xc0\n kvfree_call_rcu+0x84/0x480\n timerfd_release+0x82/0x140\n __fput+0xfa/0x400\n task_work_run+0x80/0xc0\n exit_to_user_mode_prepare+0x155/0x160\n syscall_exit_to_user_mode+0x12/0x40\n do_syscall_64+0x42/0xc0\n entry_SYSCALL_64_after_hwframe+0x46/0xb0\n\nThe buggy address belongs to the object at ffff889108f3d200\n which belongs to the cache kmalloc-256 of size 256\nThe buggy address is located 0 bytes to the right of\n 256-byte region [ffff889108f3d200, ffff889108f3d300)\n\nThe buggy address belongs to the physical page:\npage:000000007ef2a34c refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1108f3c\nhead:000000007ef2a34c order:2 compound_mapcount:0 compound_pincount:0\nflags: 0x4000000000010200(slab|head|zone=2)\nraw: 4000000000010200 0000000000000000 dead000000000001 ffff889100042b40\nraw: 0000000000000000 0000000080200020 00000001ffffffff 0000000000000000\npage dumped because: kasan: bad access detected\n\nMemory state around the buggy address:\n ffff889108f3d200: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00\n ffff889108f3d280: 00 00\n---truncated---",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.170.2.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.170.2.s390x",
          "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.170.2.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.170.2.s390x",
          "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.170.2.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.170.2.s390x",
          "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.170.2.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.170.2.s390x",
          "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-64kb-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-64kb-devel-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-devel-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-devel-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-devel-5.14.21-150400.24.170.1.noarch",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-docs-5.14.21-150400.24.170.1.noarch",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-macros-5.14.21-150400.24.170.1.noarch",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-obs-build-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-obs-build-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-source-5.14.21-150400.24.170.1.noarch",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-syms-5.14.21-150400.24.170.1.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-syms-5.14.21-150400.24.170.1.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:reiserfs-kmp-default-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:reiserfs-kmp-default-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-64kb-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-64kb-devel-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-devel-5.14.21-150400.24.170.1.noarch",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-docs-5.14.21-150400.24.170.1.noarch",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-macros-5.14.21-150400.24.170.1.noarch",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-source-5.14.21-150400.24.170.1.noarch",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.170.1.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.170.1.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.170.2.ppc64le",
          "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.170.2.s390x",
          "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.170.2.ppc64le",
          "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.170.2.s390x",
          "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_170-default-1-150400.9.3.2.ppc64le",
          "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_170-default-1-150400.9.3.2.s390x",
          "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_170-default-1-150400.9.3.2.x86_64",
          "SUSE Linux Enterprise Micro 5.3:kernel-default-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise Micro 5.3:kernel-default-5.14.21-150400.24.170.2.s390x",
          "SUSE Linux Enterprise Micro 5.3:kernel-default-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise Micro 5.3:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.aarch64",
          "SUSE Linux Enterprise Micro 5.3:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
          "SUSE Linux Enterprise Micro 5.4:kernel-default-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise Micro 5.4:kernel-default-5.14.21-150400.24.170.2.s390x",
          "SUSE Linux Enterprise Micro 5.4:kernel-default-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise Micro 5.4:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.aarch64",
          "SUSE Linux Enterprise Micro 5.4:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-64kb-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-64kb-devel-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-5.14.21-150400.24.170.2.ppc64le",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-5.14.21-150400.24.170.2.s390x",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.aarch64",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.ppc64le",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.170.2.ppc64le",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.170.2.s390x",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-devel-5.14.21-150400.24.170.1.noarch",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-docs-5.14.21-150400.24.170.1.noarch",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-macros-5.14.21-150400.24.170.1.noarch",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.170.2.ppc64le",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.170.2.s390x",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-source-5.14.21-150400.24.170.1.noarch",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.170.1.aarch64",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.170.1.ppc64le",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.170.1.s390x",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.170.1.x86_64",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-zfcpdump-5.14.21-150400.24.170.2.s390x",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.170.2.ppc64le",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.170.2.s390x",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-5.14.21-150400.24.170.2.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-devel-5.14.21-150400.24.170.2.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-devel-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-devel-5.14.21-150400.24.170.1.noarch",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-docs-5.14.21-150400.24.170.1.noarch",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-macros-5.14.21-150400.24.170.1.noarch",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-obs-build-5.14.21-150400.24.170.2.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-obs-build-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-source-5.14.21-150400.24.170.1.noarch",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-syms-5.14.21-150400.24.170.1.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-syms-5.14.21-150400.24.170.1.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.170.2.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.170.2.x86_64",
          "SUSE Manager Proxy 4.3:kernel-default-5.14.21-150400.24.170.2.x86_64",
          "SUSE Manager Proxy 4.3:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
          "SUSE Manager Proxy 4.3:kernel-default-devel-5.14.21-150400.24.170.2.x86_64",
          "SUSE Manager Proxy 4.3:kernel-devel-5.14.21-150400.24.170.1.noarch",
          "SUSE Manager Proxy 4.3:kernel-macros-5.14.21-150400.24.170.1.noarch",
          "SUSE Manager Proxy 4.3:kernel-source-5.14.21-150400.24.170.1.noarch",
          "SUSE Manager Proxy 4.3:kernel-syms-5.14.21-150400.24.170.1.x86_64",
          "SUSE Manager Server 4.3:kernel-default-5.14.21-150400.24.170.2.ppc64le",
          "SUSE Manager Server 4.3:kernel-default-5.14.21-150400.24.170.2.s390x",
          "SUSE Manager Server 4.3:kernel-default-5.14.21-150400.24.170.2.x86_64",
          "SUSE Manager Server 4.3:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.ppc64le",
          "SUSE Manager Server 4.3:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
          "SUSE Manager Server 4.3:kernel-default-devel-5.14.21-150400.24.170.2.ppc64le",
          "SUSE Manager Server 4.3:kernel-default-devel-5.14.21-150400.24.170.2.s390x",
          "SUSE Manager Server 4.3:kernel-default-devel-5.14.21-150400.24.170.2.x86_64",
          "SUSE Manager Server 4.3:kernel-devel-5.14.21-150400.24.170.1.noarch",
          "SUSE Manager Server 4.3:kernel-macros-5.14.21-150400.24.170.1.noarch",
          "SUSE Manager Server 4.3:kernel-source-5.14.21-150400.24.170.1.noarch",
          "SUSE Manager Server 4.3:kernel-syms-5.14.21-150400.24.170.1.ppc64le",
          "SUSE Manager Server 4.3:kernel-syms-5.14.21-150400.24.170.1.s390x",
          "SUSE Manager Server 4.3:kernel-syms-5.14.21-150400.24.170.1.x86_64",
          "SUSE Manager Server 4.3:kernel-zfcpdump-5.14.21-150400.24.170.2.s390x"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2022-50211",
          "url": "https://www.suse.com/security/cve/CVE-2022-50211"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1245140 for CVE-2022-50211",
          "url": "https://bugzilla.suse.com/1245140"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1245141 for CVE-2022-50211",
          "url": "https://bugzilla.suse.com/1245141"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-64kb-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-64kb-devel-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-devel-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-devel-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-devel-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-docs-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-macros-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-obs-build-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-obs-build-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-source-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-syms-5.14.21-150400.24.170.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-syms-5.14.21-150400.24.170.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:reiserfs-kmp-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:reiserfs-kmp-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-64kb-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-64kb-devel-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-devel-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-docs-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-macros-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-source-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.170.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.170.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_170-default-1-150400.9.3.2.ppc64le",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_170-default-1-150400.9.3.2.s390x",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_170-default-1-150400.9.3.2.x86_64",
            "SUSE Linux Enterprise Micro 5.3:kernel-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise Micro 5.3:kernel-default-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise Micro 5.3:kernel-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Micro 5.3:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.aarch64",
            "SUSE Linux Enterprise Micro 5.3:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
            "SUSE Linux Enterprise Micro 5.4:kernel-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise Micro 5.4:kernel-default-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise Micro 5.4:kernel-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Micro 5.4:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.aarch64",
            "SUSE Linux Enterprise Micro 5.4:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-64kb-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-64kb-devel-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.aarch64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.ppc64le",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-devel-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-docs-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-macros-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-source-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.170.1.aarch64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.170.1.ppc64le",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.170.1.s390x",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.170.1.x86_64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-zfcpdump-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-devel-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-devel-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-devel-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-docs-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-macros-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-obs-build-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-obs-build-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-source-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-syms-5.14.21-150400.24.170.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-syms-5.14.21-150400.24.170.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Manager Proxy 4.3:kernel-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Manager Proxy 4.3:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
            "SUSE Manager Proxy 4.3:kernel-default-devel-5.14.21-150400.24.170.2.x86_64",
            "SUSE Manager Proxy 4.3:kernel-devel-5.14.21-150400.24.170.1.noarch",
            "SUSE Manager Proxy 4.3:kernel-macros-5.14.21-150400.24.170.1.noarch",
            "SUSE Manager Proxy 4.3:kernel-source-5.14.21-150400.24.170.1.noarch",
            "SUSE Manager Proxy 4.3:kernel-syms-5.14.21-150400.24.170.1.x86_64",
            "SUSE Manager Server 4.3:kernel-default-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Manager Server 4.3:kernel-default-5.14.21-150400.24.170.2.s390x",
            "SUSE Manager Server 4.3:kernel-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Manager Server 4.3:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.ppc64le",
            "SUSE Manager Server 4.3:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
            "SUSE Manager Server 4.3:kernel-default-devel-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Manager Server 4.3:kernel-default-devel-5.14.21-150400.24.170.2.s390x",
            "SUSE Manager Server 4.3:kernel-default-devel-5.14.21-150400.24.170.2.x86_64",
            "SUSE Manager Server 4.3:kernel-devel-5.14.21-150400.24.170.1.noarch",
            "SUSE Manager Server 4.3:kernel-macros-5.14.21-150400.24.170.1.noarch",
            "SUSE Manager Server 4.3:kernel-source-5.14.21-150400.24.170.1.noarch",
            "SUSE Manager Server 4.3:kernel-syms-5.14.21-150400.24.170.1.ppc64le",
            "SUSE Manager Server 4.3:kernel-syms-5.14.21-150400.24.170.1.s390x",
            "SUSE Manager Server 4.3:kernel-syms-5.14.21-150400.24.170.1.x86_64",
            "SUSE Manager Server 4.3:kernel-zfcpdump-5.14.21-150400.24.170.2.s390x"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 7.8,
            "baseSeverity": "HIGH",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
            "version": "3.1"
          },
          "products": [
            "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-64kb-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-64kb-devel-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-devel-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-devel-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-devel-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-docs-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-macros-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-obs-build-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-obs-build-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-source-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-syms-5.14.21-150400.24.170.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-syms-5.14.21-150400.24.170.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:reiserfs-kmp-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:reiserfs-kmp-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-64kb-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-64kb-devel-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-devel-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-docs-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-macros-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-source-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.170.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.170.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_170-default-1-150400.9.3.2.ppc64le",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_170-default-1-150400.9.3.2.s390x",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_170-default-1-150400.9.3.2.x86_64",
            "SUSE Linux Enterprise Micro 5.3:kernel-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise Micro 5.3:kernel-default-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise Micro 5.3:kernel-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Micro 5.3:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.aarch64",
            "SUSE Linux Enterprise Micro 5.3:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
            "SUSE Linux Enterprise Micro 5.4:kernel-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise Micro 5.4:kernel-default-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise Micro 5.4:kernel-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Micro 5.4:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.aarch64",
            "SUSE Linux Enterprise Micro 5.4:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-64kb-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-64kb-devel-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.aarch64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.ppc64le",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-devel-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-docs-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-macros-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-source-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.170.1.aarch64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.170.1.ppc64le",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.170.1.s390x",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.170.1.x86_64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-zfcpdump-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-devel-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-devel-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-devel-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-docs-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-macros-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-obs-build-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-obs-build-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-source-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-syms-5.14.21-150400.24.170.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-syms-5.14.21-150400.24.170.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Manager Proxy 4.3:kernel-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Manager Proxy 4.3:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
            "SUSE Manager Proxy 4.3:kernel-default-devel-5.14.21-150400.24.170.2.x86_64",
            "SUSE Manager Proxy 4.3:kernel-devel-5.14.21-150400.24.170.1.noarch",
            "SUSE Manager Proxy 4.3:kernel-macros-5.14.21-150400.24.170.1.noarch",
            "SUSE Manager Proxy 4.3:kernel-source-5.14.21-150400.24.170.1.noarch",
            "SUSE Manager Proxy 4.3:kernel-syms-5.14.21-150400.24.170.1.x86_64",
            "SUSE Manager Server 4.3:kernel-default-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Manager Server 4.3:kernel-default-5.14.21-150400.24.170.2.s390x",
            "SUSE Manager Server 4.3:kernel-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Manager Server 4.3:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.ppc64le",
            "SUSE Manager Server 4.3:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
            "SUSE Manager Server 4.3:kernel-default-devel-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Manager Server 4.3:kernel-default-devel-5.14.21-150400.24.170.2.s390x",
            "SUSE Manager Server 4.3:kernel-default-devel-5.14.21-150400.24.170.2.x86_64",
            "SUSE Manager Server 4.3:kernel-devel-5.14.21-150400.24.170.1.noarch",
            "SUSE Manager Server 4.3:kernel-macros-5.14.21-150400.24.170.1.noarch",
            "SUSE Manager Server 4.3:kernel-source-5.14.21-150400.24.170.1.noarch",
            "SUSE Manager Server 4.3:kernel-syms-5.14.21-150400.24.170.1.ppc64le",
            "SUSE Manager Server 4.3:kernel-syms-5.14.21-150400.24.170.1.s390x",
            "SUSE Manager Server 4.3:kernel-syms-5.14.21-150400.24.170.1.x86_64",
            "SUSE Manager Server 4.3:kernel-zfcpdump-5.14.21-150400.24.170.2.s390x"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2025-07-28T15:09:33Z",
          "details": "important"
        }
      ],
      "title": "CVE-2022-50211"
    },
    {
      "cve": "CVE-2022-50212",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2022-50212"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "In the Linux kernel, the following vulnerability has been resolved:\n\nnetfilter: nf_tables: do not allow CHAIN_ID to refer to another table\n\nWhen doing lookups for chains on the same batch by using its ID, a chain\nfrom a different table can be used. If a rule is added to a table but\nrefers to a chain in a different table, it will be linked to the chain in\ntable2, but would have expressions referring to objects in table1.\n\nThen, when table1 is removed, the rule will not be removed as its linked to\na chain in table2. When expressions in the rule are processed or removed,\nthat will lead to a use-after-free.\n\nWhen looking for chains by ID, use the table that was used for the lookup\nby name, and only return chains belonging to that same table.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.170.2.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.170.2.s390x",
          "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.170.2.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.170.2.s390x",
          "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.170.2.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.170.2.s390x",
          "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.170.2.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.170.2.s390x",
          "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-64kb-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-64kb-devel-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-devel-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-devel-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-devel-5.14.21-150400.24.170.1.noarch",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-docs-5.14.21-150400.24.170.1.noarch",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-macros-5.14.21-150400.24.170.1.noarch",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-obs-build-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-obs-build-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-source-5.14.21-150400.24.170.1.noarch",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-syms-5.14.21-150400.24.170.1.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-syms-5.14.21-150400.24.170.1.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:reiserfs-kmp-default-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:reiserfs-kmp-default-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-64kb-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-64kb-devel-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-devel-5.14.21-150400.24.170.1.noarch",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-docs-5.14.21-150400.24.170.1.noarch",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-macros-5.14.21-150400.24.170.1.noarch",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-source-5.14.21-150400.24.170.1.noarch",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.170.1.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.170.1.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.170.2.ppc64le",
          "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.170.2.s390x",
          "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.170.2.ppc64le",
          "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.170.2.s390x",
          "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_170-default-1-150400.9.3.2.ppc64le",
          "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_170-default-1-150400.9.3.2.s390x",
          "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_170-default-1-150400.9.3.2.x86_64",
          "SUSE Linux Enterprise Micro 5.3:kernel-default-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise Micro 5.3:kernel-default-5.14.21-150400.24.170.2.s390x",
          "SUSE Linux Enterprise Micro 5.3:kernel-default-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise Micro 5.3:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.aarch64",
          "SUSE Linux Enterprise Micro 5.3:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
          "SUSE Linux Enterprise Micro 5.4:kernel-default-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise Micro 5.4:kernel-default-5.14.21-150400.24.170.2.s390x",
          "SUSE Linux Enterprise Micro 5.4:kernel-default-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise Micro 5.4:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.aarch64",
          "SUSE Linux Enterprise Micro 5.4:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-64kb-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-64kb-devel-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-5.14.21-150400.24.170.2.ppc64le",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-5.14.21-150400.24.170.2.s390x",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.aarch64",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.ppc64le",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.170.2.ppc64le",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.170.2.s390x",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-devel-5.14.21-150400.24.170.1.noarch",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-docs-5.14.21-150400.24.170.1.noarch",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-macros-5.14.21-150400.24.170.1.noarch",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.170.2.ppc64le",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.170.2.s390x",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-source-5.14.21-150400.24.170.1.noarch",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.170.1.aarch64",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.170.1.ppc64le",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.170.1.s390x",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.170.1.x86_64",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-zfcpdump-5.14.21-150400.24.170.2.s390x",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.170.2.ppc64le",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.170.2.s390x",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-5.14.21-150400.24.170.2.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-devel-5.14.21-150400.24.170.2.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-devel-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-devel-5.14.21-150400.24.170.1.noarch",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-docs-5.14.21-150400.24.170.1.noarch",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-macros-5.14.21-150400.24.170.1.noarch",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-obs-build-5.14.21-150400.24.170.2.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-obs-build-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-source-5.14.21-150400.24.170.1.noarch",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-syms-5.14.21-150400.24.170.1.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-syms-5.14.21-150400.24.170.1.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.170.2.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.170.2.x86_64",
          "SUSE Manager Proxy 4.3:kernel-default-5.14.21-150400.24.170.2.x86_64",
          "SUSE Manager Proxy 4.3:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
          "SUSE Manager Proxy 4.3:kernel-default-devel-5.14.21-150400.24.170.2.x86_64",
          "SUSE Manager Proxy 4.3:kernel-devel-5.14.21-150400.24.170.1.noarch",
          "SUSE Manager Proxy 4.3:kernel-macros-5.14.21-150400.24.170.1.noarch",
          "SUSE Manager Proxy 4.3:kernel-source-5.14.21-150400.24.170.1.noarch",
          "SUSE Manager Proxy 4.3:kernel-syms-5.14.21-150400.24.170.1.x86_64",
          "SUSE Manager Server 4.3:kernel-default-5.14.21-150400.24.170.2.ppc64le",
          "SUSE Manager Server 4.3:kernel-default-5.14.21-150400.24.170.2.s390x",
          "SUSE Manager Server 4.3:kernel-default-5.14.21-150400.24.170.2.x86_64",
          "SUSE Manager Server 4.3:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.ppc64le",
          "SUSE Manager Server 4.3:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
          "SUSE Manager Server 4.3:kernel-default-devel-5.14.21-150400.24.170.2.ppc64le",
          "SUSE Manager Server 4.3:kernel-default-devel-5.14.21-150400.24.170.2.s390x",
          "SUSE Manager Server 4.3:kernel-default-devel-5.14.21-150400.24.170.2.x86_64",
          "SUSE Manager Server 4.3:kernel-devel-5.14.21-150400.24.170.1.noarch",
          "SUSE Manager Server 4.3:kernel-macros-5.14.21-150400.24.170.1.noarch",
          "SUSE Manager Server 4.3:kernel-source-5.14.21-150400.24.170.1.noarch",
          "SUSE Manager Server 4.3:kernel-syms-5.14.21-150400.24.170.1.ppc64le",
          "SUSE Manager Server 4.3:kernel-syms-5.14.21-150400.24.170.1.s390x",
          "SUSE Manager Server 4.3:kernel-syms-5.14.21-150400.24.170.1.x86_64",
          "SUSE Manager Server 4.3:kernel-zfcpdump-5.14.21-150400.24.170.2.s390x"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2022-50212",
          "url": "https://www.suse.com/security/cve/CVE-2022-50212"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1244869 for CVE-2022-50212",
          "url": "https://bugzilla.suse.com/1244869"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-64kb-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-64kb-devel-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-devel-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-devel-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-devel-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-docs-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-macros-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-obs-build-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-obs-build-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-source-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-syms-5.14.21-150400.24.170.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-syms-5.14.21-150400.24.170.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:reiserfs-kmp-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:reiserfs-kmp-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-64kb-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-64kb-devel-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-devel-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-docs-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-macros-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-source-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.170.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.170.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_170-default-1-150400.9.3.2.ppc64le",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_170-default-1-150400.9.3.2.s390x",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_170-default-1-150400.9.3.2.x86_64",
            "SUSE Linux Enterprise Micro 5.3:kernel-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise Micro 5.3:kernel-default-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise Micro 5.3:kernel-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Micro 5.3:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.aarch64",
            "SUSE Linux Enterprise Micro 5.3:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
            "SUSE Linux Enterprise Micro 5.4:kernel-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise Micro 5.4:kernel-default-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise Micro 5.4:kernel-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Micro 5.4:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.aarch64",
            "SUSE Linux Enterprise Micro 5.4:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-64kb-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-64kb-devel-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.aarch64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.ppc64le",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-devel-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-docs-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-macros-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-source-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.170.1.aarch64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.170.1.ppc64le",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.170.1.s390x",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.170.1.x86_64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-zfcpdump-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-devel-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-devel-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-devel-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-docs-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-macros-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-obs-build-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-obs-build-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-source-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-syms-5.14.21-150400.24.170.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-syms-5.14.21-150400.24.170.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Manager Proxy 4.3:kernel-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Manager Proxy 4.3:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
            "SUSE Manager Proxy 4.3:kernel-default-devel-5.14.21-150400.24.170.2.x86_64",
            "SUSE Manager Proxy 4.3:kernel-devel-5.14.21-150400.24.170.1.noarch",
            "SUSE Manager Proxy 4.3:kernel-macros-5.14.21-150400.24.170.1.noarch",
            "SUSE Manager Proxy 4.3:kernel-source-5.14.21-150400.24.170.1.noarch",
            "SUSE Manager Proxy 4.3:kernel-syms-5.14.21-150400.24.170.1.x86_64",
            "SUSE Manager Server 4.3:kernel-default-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Manager Server 4.3:kernel-default-5.14.21-150400.24.170.2.s390x",
            "SUSE Manager Server 4.3:kernel-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Manager Server 4.3:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.ppc64le",
            "SUSE Manager Server 4.3:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
            "SUSE Manager Server 4.3:kernel-default-devel-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Manager Server 4.3:kernel-default-devel-5.14.21-150400.24.170.2.s390x",
            "SUSE Manager Server 4.3:kernel-default-devel-5.14.21-150400.24.170.2.x86_64",
            "SUSE Manager Server 4.3:kernel-devel-5.14.21-150400.24.170.1.noarch",
            "SUSE Manager Server 4.3:kernel-macros-5.14.21-150400.24.170.1.noarch",
            "SUSE Manager Server 4.3:kernel-source-5.14.21-150400.24.170.1.noarch",
            "SUSE Manager Server 4.3:kernel-syms-5.14.21-150400.24.170.1.ppc64le",
            "SUSE Manager Server 4.3:kernel-syms-5.14.21-150400.24.170.1.s390x",
            "SUSE Manager Server 4.3:kernel-syms-5.14.21-150400.24.170.1.x86_64",
            "SUSE Manager Server 4.3:kernel-zfcpdump-5.14.21-150400.24.170.2.s390x"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 5.5,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
            "version": "3.1"
          },
          "products": [
            "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-64kb-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-64kb-devel-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-devel-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-devel-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-devel-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-docs-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-macros-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-obs-build-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-obs-build-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-source-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-syms-5.14.21-150400.24.170.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-syms-5.14.21-150400.24.170.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:reiserfs-kmp-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:reiserfs-kmp-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-64kb-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-64kb-devel-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-devel-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-docs-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-macros-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-source-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.170.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.170.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_170-default-1-150400.9.3.2.ppc64le",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_170-default-1-150400.9.3.2.s390x",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_170-default-1-150400.9.3.2.x86_64",
            "SUSE Linux Enterprise Micro 5.3:kernel-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise Micro 5.3:kernel-default-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise Micro 5.3:kernel-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Micro 5.3:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.aarch64",
            "SUSE Linux Enterprise Micro 5.3:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
            "SUSE Linux Enterprise Micro 5.4:kernel-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise Micro 5.4:kernel-default-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise Micro 5.4:kernel-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Micro 5.4:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.aarch64",
            "SUSE Linux Enterprise Micro 5.4:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-64kb-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-64kb-devel-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.aarch64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.ppc64le",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-devel-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-docs-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-macros-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-source-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.170.1.aarch64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.170.1.ppc64le",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.170.1.s390x",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.170.1.x86_64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-zfcpdump-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-devel-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-devel-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-devel-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-docs-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-macros-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-obs-build-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-obs-build-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-source-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-syms-5.14.21-150400.24.170.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-syms-5.14.21-150400.24.170.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Manager Proxy 4.3:kernel-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Manager Proxy 4.3:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
            "SUSE Manager Proxy 4.3:kernel-default-devel-5.14.21-150400.24.170.2.x86_64",
            "SUSE Manager Proxy 4.3:kernel-devel-5.14.21-150400.24.170.1.noarch",
            "SUSE Manager Proxy 4.3:kernel-macros-5.14.21-150400.24.170.1.noarch",
            "SUSE Manager Proxy 4.3:kernel-source-5.14.21-150400.24.170.1.noarch",
            "SUSE Manager Proxy 4.3:kernel-syms-5.14.21-150400.24.170.1.x86_64",
            "SUSE Manager Server 4.3:kernel-default-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Manager Server 4.3:kernel-default-5.14.21-150400.24.170.2.s390x",
            "SUSE Manager Server 4.3:kernel-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Manager Server 4.3:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.ppc64le",
            "SUSE Manager Server 4.3:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
            "SUSE Manager Server 4.3:kernel-default-devel-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Manager Server 4.3:kernel-default-devel-5.14.21-150400.24.170.2.s390x",
            "SUSE Manager Server 4.3:kernel-default-devel-5.14.21-150400.24.170.2.x86_64",
            "SUSE Manager Server 4.3:kernel-devel-5.14.21-150400.24.170.1.noarch",
            "SUSE Manager Server 4.3:kernel-macros-5.14.21-150400.24.170.1.noarch",
            "SUSE Manager Server 4.3:kernel-source-5.14.21-150400.24.170.1.noarch",
            "SUSE Manager Server 4.3:kernel-syms-5.14.21-150400.24.170.1.ppc64le",
            "SUSE Manager Server 4.3:kernel-syms-5.14.21-150400.24.170.1.s390x",
            "SUSE Manager Server 4.3:kernel-syms-5.14.21-150400.24.170.1.x86_64",
            "SUSE Manager Server 4.3:kernel-zfcpdump-5.14.21-150400.24.170.2.s390x"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2025-07-28T15:09:33Z",
          "details": "moderate"
        }
      ],
      "title": "CVE-2022-50212"
    },
    {
      "cve": "CVE-2022-50213",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2022-50213"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "In the Linux kernel, the following vulnerability has been resolved:\n\nnetfilter: nf_tables: do not allow SET_ID to refer to another table\n\nWhen doing lookups for sets on the same batch by using its ID, a set from a\ndifferent table can be used.\n\nThen, when the table is removed, a reference to the set may be kept after\nthe set is freed, leading to a potential use-after-free.\n\nWhen looking for sets by ID, use the table that was used for the lookup by\nname, and only return sets belonging to that same table.\n\nThis fixes CVE-2022-2586, also reported as ZDI-CAN-17470.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.170.2.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.170.2.s390x",
          "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.170.2.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.170.2.s390x",
          "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.170.2.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.170.2.s390x",
          "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.170.2.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.170.2.s390x",
          "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-64kb-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-64kb-devel-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-devel-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-devel-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-devel-5.14.21-150400.24.170.1.noarch",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-docs-5.14.21-150400.24.170.1.noarch",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-macros-5.14.21-150400.24.170.1.noarch",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-obs-build-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-obs-build-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-source-5.14.21-150400.24.170.1.noarch",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-syms-5.14.21-150400.24.170.1.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-syms-5.14.21-150400.24.170.1.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:reiserfs-kmp-default-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:reiserfs-kmp-default-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-64kb-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-64kb-devel-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-devel-5.14.21-150400.24.170.1.noarch",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-docs-5.14.21-150400.24.170.1.noarch",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-macros-5.14.21-150400.24.170.1.noarch",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-source-5.14.21-150400.24.170.1.noarch",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.170.1.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.170.1.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.170.2.ppc64le",
          "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.170.2.s390x",
          "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.170.2.ppc64le",
          "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.170.2.s390x",
          "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_170-default-1-150400.9.3.2.ppc64le",
          "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_170-default-1-150400.9.3.2.s390x",
          "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_170-default-1-150400.9.3.2.x86_64",
          "SUSE Linux Enterprise Micro 5.3:kernel-default-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise Micro 5.3:kernel-default-5.14.21-150400.24.170.2.s390x",
          "SUSE Linux Enterprise Micro 5.3:kernel-default-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise Micro 5.3:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.aarch64",
          "SUSE Linux Enterprise Micro 5.3:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
          "SUSE Linux Enterprise Micro 5.4:kernel-default-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise Micro 5.4:kernel-default-5.14.21-150400.24.170.2.s390x",
          "SUSE Linux Enterprise Micro 5.4:kernel-default-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise Micro 5.4:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.aarch64",
          "SUSE Linux Enterprise Micro 5.4:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-64kb-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-64kb-devel-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-5.14.21-150400.24.170.2.ppc64le",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-5.14.21-150400.24.170.2.s390x",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.aarch64",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.ppc64le",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.170.2.ppc64le",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.170.2.s390x",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-devel-5.14.21-150400.24.170.1.noarch",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-docs-5.14.21-150400.24.170.1.noarch",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-macros-5.14.21-150400.24.170.1.noarch",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.170.2.ppc64le",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.170.2.s390x",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-source-5.14.21-150400.24.170.1.noarch",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.170.1.aarch64",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.170.1.ppc64le",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.170.1.s390x",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.170.1.x86_64",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-zfcpdump-5.14.21-150400.24.170.2.s390x",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.170.2.ppc64le",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.170.2.s390x",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-5.14.21-150400.24.170.2.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-devel-5.14.21-150400.24.170.2.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-devel-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-devel-5.14.21-150400.24.170.1.noarch",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-docs-5.14.21-150400.24.170.1.noarch",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-macros-5.14.21-150400.24.170.1.noarch",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-obs-build-5.14.21-150400.24.170.2.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-obs-build-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-source-5.14.21-150400.24.170.1.noarch",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-syms-5.14.21-150400.24.170.1.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-syms-5.14.21-150400.24.170.1.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.170.2.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.170.2.x86_64",
          "SUSE Manager Proxy 4.3:kernel-default-5.14.21-150400.24.170.2.x86_64",
          "SUSE Manager Proxy 4.3:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
          "SUSE Manager Proxy 4.3:kernel-default-devel-5.14.21-150400.24.170.2.x86_64",
          "SUSE Manager Proxy 4.3:kernel-devel-5.14.21-150400.24.170.1.noarch",
          "SUSE Manager Proxy 4.3:kernel-macros-5.14.21-150400.24.170.1.noarch",
          "SUSE Manager Proxy 4.3:kernel-source-5.14.21-150400.24.170.1.noarch",
          "SUSE Manager Proxy 4.3:kernel-syms-5.14.21-150400.24.170.1.x86_64",
          "SUSE Manager Server 4.3:kernel-default-5.14.21-150400.24.170.2.ppc64le",
          "SUSE Manager Server 4.3:kernel-default-5.14.21-150400.24.170.2.s390x",
          "SUSE Manager Server 4.3:kernel-default-5.14.21-150400.24.170.2.x86_64",
          "SUSE Manager Server 4.3:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.ppc64le",
          "SUSE Manager Server 4.3:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
          "SUSE Manager Server 4.3:kernel-default-devel-5.14.21-150400.24.170.2.ppc64le",
          "SUSE Manager Server 4.3:kernel-default-devel-5.14.21-150400.24.170.2.s390x",
          "SUSE Manager Server 4.3:kernel-default-devel-5.14.21-150400.24.170.2.x86_64",
          "SUSE Manager Server 4.3:kernel-devel-5.14.21-150400.24.170.1.noarch",
          "SUSE Manager Server 4.3:kernel-macros-5.14.21-150400.24.170.1.noarch",
          "SUSE Manager Server 4.3:kernel-source-5.14.21-150400.24.170.1.noarch",
          "SUSE Manager Server 4.3:kernel-syms-5.14.21-150400.24.170.1.ppc64le",
          "SUSE Manager Server 4.3:kernel-syms-5.14.21-150400.24.170.1.s390x",
          "SUSE Manager Server 4.3:kernel-syms-5.14.21-150400.24.170.1.x86_64",
          "SUSE Manager Server 4.3:kernel-zfcpdump-5.14.21-150400.24.170.2.s390x"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2022-50213",
          "url": "https://www.suse.com/security/cve/CVE-2022-50213"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1244867 for CVE-2022-50213",
          "url": "https://bugzilla.suse.com/1244867"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-64kb-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-64kb-devel-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-devel-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-devel-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-devel-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-docs-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-macros-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-obs-build-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-obs-build-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-source-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-syms-5.14.21-150400.24.170.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-syms-5.14.21-150400.24.170.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:reiserfs-kmp-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:reiserfs-kmp-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-64kb-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-64kb-devel-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-devel-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-docs-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-macros-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-source-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.170.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.170.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_170-default-1-150400.9.3.2.ppc64le",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_170-default-1-150400.9.3.2.s390x",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_170-default-1-150400.9.3.2.x86_64",
            "SUSE Linux Enterprise Micro 5.3:kernel-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise Micro 5.3:kernel-default-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise Micro 5.3:kernel-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Micro 5.3:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.aarch64",
            "SUSE Linux Enterprise Micro 5.3:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
            "SUSE Linux Enterprise Micro 5.4:kernel-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise Micro 5.4:kernel-default-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise Micro 5.4:kernel-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Micro 5.4:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.aarch64",
            "SUSE Linux Enterprise Micro 5.4:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-64kb-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-64kb-devel-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.aarch64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.ppc64le",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-devel-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-docs-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-macros-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-source-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.170.1.aarch64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.170.1.ppc64le",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.170.1.s390x",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.170.1.x86_64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-zfcpdump-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-devel-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-devel-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-devel-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-docs-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-macros-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-obs-build-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-obs-build-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-source-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-syms-5.14.21-150400.24.170.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-syms-5.14.21-150400.24.170.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Manager Proxy 4.3:kernel-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Manager Proxy 4.3:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
            "SUSE Manager Proxy 4.3:kernel-default-devel-5.14.21-150400.24.170.2.x86_64",
            "SUSE Manager Proxy 4.3:kernel-devel-5.14.21-150400.24.170.1.noarch",
            "SUSE Manager Proxy 4.3:kernel-macros-5.14.21-150400.24.170.1.noarch",
            "SUSE Manager Proxy 4.3:kernel-source-5.14.21-150400.24.170.1.noarch",
            "SUSE Manager Proxy 4.3:kernel-syms-5.14.21-150400.24.170.1.x86_64",
            "SUSE Manager Server 4.3:kernel-default-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Manager Server 4.3:kernel-default-5.14.21-150400.24.170.2.s390x",
            "SUSE Manager Server 4.3:kernel-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Manager Server 4.3:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.ppc64le",
            "SUSE Manager Server 4.3:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
            "SUSE Manager Server 4.3:kernel-default-devel-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Manager Server 4.3:kernel-default-devel-5.14.21-150400.24.170.2.s390x",
            "SUSE Manager Server 4.3:kernel-default-devel-5.14.21-150400.24.170.2.x86_64",
            "SUSE Manager Server 4.3:kernel-devel-5.14.21-150400.24.170.1.noarch",
            "SUSE Manager Server 4.3:kernel-macros-5.14.21-150400.24.170.1.noarch",
            "SUSE Manager Server 4.3:kernel-source-5.14.21-150400.24.170.1.noarch",
            "SUSE Manager Server 4.3:kernel-syms-5.14.21-150400.24.170.1.ppc64le",
            "SUSE Manager Server 4.3:kernel-syms-5.14.21-150400.24.170.1.s390x",
            "SUSE Manager Server 4.3:kernel-syms-5.14.21-150400.24.170.1.x86_64",
            "SUSE Manager Server 4.3:kernel-zfcpdump-5.14.21-150400.24.170.2.s390x"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 5.5,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
            "version": "3.1"
          },
          "products": [
            "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-64kb-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-64kb-devel-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-devel-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-devel-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-devel-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-docs-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-macros-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-obs-build-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-obs-build-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-source-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-syms-5.14.21-150400.24.170.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-syms-5.14.21-150400.24.170.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:reiserfs-kmp-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:reiserfs-kmp-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-64kb-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-64kb-devel-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-devel-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-docs-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-macros-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-source-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.170.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.170.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_170-default-1-150400.9.3.2.ppc64le",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_170-default-1-150400.9.3.2.s390x",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_170-default-1-150400.9.3.2.x86_64",
            "SUSE Linux Enterprise Micro 5.3:kernel-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise Micro 5.3:kernel-default-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise Micro 5.3:kernel-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Micro 5.3:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.aarch64",
            "SUSE Linux Enterprise Micro 5.3:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
            "SUSE Linux Enterprise Micro 5.4:kernel-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise Micro 5.4:kernel-default-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise Micro 5.4:kernel-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Micro 5.4:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.aarch64",
            "SUSE Linux Enterprise Micro 5.4:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-64kb-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-64kb-devel-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.aarch64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.ppc64le",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-devel-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-docs-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-macros-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-source-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.170.1.aarch64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.170.1.ppc64le",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.170.1.s390x",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.170.1.x86_64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-zfcpdump-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-devel-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-devel-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-devel-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-docs-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-macros-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-obs-build-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-obs-build-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-source-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-syms-5.14.21-150400.24.170.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-syms-5.14.21-150400.24.170.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Manager Proxy 4.3:kernel-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Manager Proxy 4.3:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
            "SUSE Manager Proxy 4.3:kernel-default-devel-5.14.21-150400.24.170.2.x86_64",
            "SUSE Manager Proxy 4.3:kernel-devel-5.14.21-150400.24.170.1.noarch",
            "SUSE Manager Proxy 4.3:kernel-macros-5.14.21-150400.24.170.1.noarch",
            "SUSE Manager Proxy 4.3:kernel-source-5.14.21-150400.24.170.1.noarch",
            "SUSE Manager Proxy 4.3:kernel-syms-5.14.21-150400.24.170.1.x86_64",
            "SUSE Manager Server 4.3:kernel-default-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Manager Server 4.3:kernel-default-5.14.21-150400.24.170.2.s390x",
            "SUSE Manager Server 4.3:kernel-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Manager Server 4.3:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.ppc64le",
            "SUSE Manager Server 4.3:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
            "SUSE Manager Server 4.3:kernel-default-devel-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Manager Server 4.3:kernel-default-devel-5.14.21-150400.24.170.2.s390x",
            "SUSE Manager Server 4.3:kernel-default-devel-5.14.21-150400.24.170.2.x86_64",
            "SUSE Manager Server 4.3:kernel-devel-5.14.21-150400.24.170.1.noarch",
            "SUSE Manager Server 4.3:kernel-macros-5.14.21-150400.24.170.1.noarch",
            "SUSE Manager Server 4.3:kernel-source-5.14.21-150400.24.170.1.noarch",
            "SUSE Manager Server 4.3:kernel-syms-5.14.21-150400.24.170.1.ppc64le",
            "SUSE Manager Server 4.3:kernel-syms-5.14.21-150400.24.170.1.s390x",
            "SUSE Manager Server 4.3:kernel-syms-5.14.21-150400.24.170.1.x86_64",
            "SUSE Manager Server 4.3:kernel-zfcpdump-5.14.21-150400.24.170.2.s390x"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2025-07-28T15:09:33Z",
          "details": "moderate"
        }
      ],
      "title": "CVE-2022-50213"
    },
    {
      "cve": "CVE-2022-50215",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2022-50215"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "In the Linux kernel, the following vulnerability has been resolved:\n\nscsi: sg: Allow waiting for commands to complete on removed device\n\nWhen a SCSI device is removed while in active use, currently sg will\nimmediately return -ENODEV on any attempt to wait for active commands that\nwere sent before the removal.  This is problematic for commands that use\nSG_FLAG_DIRECT_IO since the data buffer may still be in use by the kernel\nwhen userspace frees or reuses it after getting ENODEV, leading to\ncorrupted userspace memory (in the case of READ-type commands) or corrupted\ndata being sent to the device (in the case of WRITE-type commands).  This\nhas been seen in practice when logging out of a iscsi_tcp session, where\nthe iSCSI driver may still be processing commands after the device has been\nmarked for removal.\n\nChange the policy to allow userspace to wait for active sg commands even\nwhen the device is being removed.  Return -ENODEV only when there are no\nmore responses to read.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.170.2.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.170.2.s390x",
          "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.170.2.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.170.2.s390x",
          "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.170.2.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.170.2.s390x",
          "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.170.2.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.170.2.s390x",
          "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-64kb-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-64kb-devel-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-devel-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-devel-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-devel-5.14.21-150400.24.170.1.noarch",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-docs-5.14.21-150400.24.170.1.noarch",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-macros-5.14.21-150400.24.170.1.noarch",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-obs-build-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-obs-build-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-source-5.14.21-150400.24.170.1.noarch",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-syms-5.14.21-150400.24.170.1.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-syms-5.14.21-150400.24.170.1.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:reiserfs-kmp-default-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:reiserfs-kmp-default-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-64kb-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-64kb-devel-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-devel-5.14.21-150400.24.170.1.noarch",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-docs-5.14.21-150400.24.170.1.noarch",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-macros-5.14.21-150400.24.170.1.noarch",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-source-5.14.21-150400.24.170.1.noarch",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.170.1.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.170.1.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.170.2.ppc64le",
          "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.170.2.s390x",
          "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.170.2.ppc64le",
          "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.170.2.s390x",
          "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_170-default-1-150400.9.3.2.ppc64le",
          "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_170-default-1-150400.9.3.2.s390x",
          "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_170-default-1-150400.9.3.2.x86_64",
          "SUSE Linux Enterprise Micro 5.3:kernel-default-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise Micro 5.3:kernel-default-5.14.21-150400.24.170.2.s390x",
          "SUSE Linux Enterprise Micro 5.3:kernel-default-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise Micro 5.3:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.aarch64",
          "SUSE Linux Enterprise Micro 5.3:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
          "SUSE Linux Enterprise Micro 5.4:kernel-default-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise Micro 5.4:kernel-default-5.14.21-150400.24.170.2.s390x",
          "SUSE Linux Enterprise Micro 5.4:kernel-default-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise Micro 5.4:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.aarch64",
          "SUSE Linux Enterprise Micro 5.4:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-64kb-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-64kb-devel-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-5.14.21-150400.24.170.2.ppc64le",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-5.14.21-150400.24.170.2.s390x",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.aarch64",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.ppc64le",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.170.2.ppc64le",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.170.2.s390x",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-devel-5.14.21-150400.24.170.1.noarch",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-docs-5.14.21-150400.24.170.1.noarch",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-macros-5.14.21-150400.24.170.1.noarch",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.170.2.ppc64le",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.170.2.s390x",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-source-5.14.21-150400.24.170.1.noarch",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.170.1.aarch64",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.170.1.ppc64le",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.170.1.s390x",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.170.1.x86_64",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-zfcpdump-5.14.21-150400.24.170.2.s390x",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.170.2.ppc64le",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.170.2.s390x",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-5.14.21-150400.24.170.2.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-devel-5.14.21-150400.24.170.2.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-devel-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-devel-5.14.21-150400.24.170.1.noarch",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-docs-5.14.21-150400.24.170.1.noarch",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-macros-5.14.21-150400.24.170.1.noarch",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-obs-build-5.14.21-150400.24.170.2.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-obs-build-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-source-5.14.21-150400.24.170.1.noarch",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-syms-5.14.21-150400.24.170.1.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-syms-5.14.21-150400.24.170.1.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.170.2.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.170.2.x86_64",
          "SUSE Manager Proxy 4.3:kernel-default-5.14.21-150400.24.170.2.x86_64",
          "SUSE Manager Proxy 4.3:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
          "SUSE Manager Proxy 4.3:kernel-default-devel-5.14.21-150400.24.170.2.x86_64",
          "SUSE Manager Proxy 4.3:kernel-devel-5.14.21-150400.24.170.1.noarch",
          "SUSE Manager Proxy 4.3:kernel-macros-5.14.21-150400.24.170.1.noarch",
          "SUSE Manager Proxy 4.3:kernel-source-5.14.21-150400.24.170.1.noarch",
          "SUSE Manager Proxy 4.3:kernel-syms-5.14.21-150400.24.170.1.x86_64",
          "SUSE Manager Server 4.3:kernel-default-5.14.21-150400.24.170.2.ppc64le",
          "SUSE Manager Server 4.3:kernel-default-5.14.21-150400.24.170.2.s390x",
          "SUSE Manager Server 4.3:kernel-default-5.14.21-150400.24.170.2.x86_64",
          "SUSE Manager Server 4.3:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.ppc64le",
          "SUSE Manager Server 4.3:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
          "SUSE Manager Server 4.3:kernel-default-devel-5.14.21-150400.24.170.2.ppc64le",
          "SUSE Manager Server 4.3:kernel-default-devel-5.14.21-150400.24.170.2.s390x",
          "SUSE Manager Server 4.3:kernel-default-devel-5.14.21-150400.24.170.2.x86_64",
          "SUSE Manager Server 4.3:kernel-devel-5.14.21-150400.24.170.1.noarch",
          "SUSE Manager Server 4.3:kernel-macros-5.14.21-150400.24.170.1.noarch",
          "SUSE Manager Server 4.3:kernel-source-5.14.21-150400.24.170.1.noarch",
          "SUSE Manager Server 4.3:kernel-syms-5.14.21-150400.24.170.1.ppc64le",
          "SUSE Manager Server 4.3:kernel-syms-5.14.21-150400.24.170.1.s390x",
          "SUSE Manager Server 4.3:kernel-syms-5.14.21-150400.24.170.1.x86_64",
          "SUSE Manager Server 4.3:kernel-zfcpdump-5.14.21-150400.24.170.2.s390x"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2022-50215",
          "url": "https://www.suse.com/security/cve/CVE-2022-50215"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1245138 for CVE-2022-50215",
          "url": "https://bugzilla.suse.com/1245138"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-64kb-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-64kb-devel-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-devel-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-devel-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-devel-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-docs-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-macros-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-obs-build-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-obs-build-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-source-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-syms-5.14.21-150400.24.170.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-syms-5.14.21-150400.24.170.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:reiserfs-kmp-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:reiserfs-kmp-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-64kb-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-64kb-devel-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-devel-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-docs-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-macros-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-source-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.170.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.170.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_170-default-1-150400.9.3.2.ppc64le",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_170-default-1-150400.9.3.2.s390x",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_170-default-1-150400.9.3.2.x86_64",
            "SUSE Linux Enterprise Micro 5.3:kernel-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise Micro 5.3:kernel-default-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise Micro 5.3:kernel-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Micro 5.3:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.aarch64",
            "SUSE Linux Enterprise Micro 5.3:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
            "SUSE Linux Enterprise Micro 5.4:kernel-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise Micro 5.4:kernel-default-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise Micro 5.4:kernel-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Micro 5.4:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.aarch64",
            "SUSE Linux Enterprise Micro 5.4:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-64kb-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-64kb-devel-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.aarch64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.ppc64le",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-devel-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-docs-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-macros-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-source-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.170.1.aarch64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.170.1.ppc64le",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.170.1.s390x",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.170.1.x86_64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-zfcpdump-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-devel-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-devel-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-devel-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-docs-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-macros-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-obs-build-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-obs-build-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-source-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-syms-5.14.21-150400.24.170.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-syms-5.14.21-150400.24.170.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Manager Proxy 4.3:kernel-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Manager Proxy 4.3:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
            "SUSE Manager Proxy 4.3:kernel-default-devel-5.14.21-150400.24.170.2.x86_64",
            "SUSE Manager Proxy 4.3:kernel-devel-5.14.21-150400.24.170.1.noarch",
            "SUSE Manager Proxy 4.3:kernel-macros-5.14.21-150400.24.170.1.noarch",
            "SUSE Manager Proxy 4.3:kernel-source-5.14.21-150400.24.170.1.noarch",
            "SUSE Manager Proxy 4.3:kernel-syms-5.14.21-150400.24.170.1.x86_64",
            "SUSE Manager Server 4.3:kernel-default-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Manager Server 4.3:kernel-default-5.14.21-150400.24.170.2.s390x",
            "SUSE Manager Server 4.3:kernel-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Manager Server 4.3:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.ppc64le",
            "SUSE Manager Server 4.3:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
            "SUSE Manager Server 4.3:kernel-default-devel-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Manager Server 4.3:kernel-default-devel-5.14.21-150400.24.170.2.s390x",
            "SUSE Manager Server 4.3:kernel-default-devel-5.14.21-150400.24.170.2.x86_64",
            "SUSE Manager Server 4.3:kernel-devel-5.14.21-150400.24.170.1.noarch",
            "SUSE Manager Server 4.3:kernel-macros-5.14.21-150400.24.170.1.noarch",
            "SUSE Manager Server 4.3:kernel-source-5.14.21-150400.24.170.1.noarch",
            "SUSE Manager Server 4.3:kernel-syms-5.14.21-150400.24.170.1.ppc64le",
            "SUSE Manager Server 4.3:kernel-syms-5.14.21-150400.24.170.1.s390x",
            "SUSE Manager Server 4.3:kernel-syms-5.14.21-150400.24.170.1.x86_64",
            "SUSE Manager Server 4.3:kernel-zfcpdump-5.14.21-150400.24.170.2.s390x"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 6.1,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:H",
            "version": "3.1"
          },
          "products": [
            "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-64kb-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-64kb-devel-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-devel-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-devel-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-devel-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-docs-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-macros-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-obs-build-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-obs-build-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-source-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-syms-5.14.21-150400.24.170.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-syms-5.14.21-150400.24.170.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:reiserfs-kmp-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:reiserfs-kmp-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-64kb-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-64kb-devel-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-devel-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-docs-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-macros-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-source-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.170.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.170.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_170-default-1-150400.9.3.2.ppc64le",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_170-default-1-150400.9.3.2.s390x",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_170-default-1-150400.9.3.2.x86_64",
            "SUSE Linux Enterprise Micro 5.3:kernel-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise Micro 5.3:kernel-default-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise Micro 5.3:kernel-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Micro 5.3:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.aarch64",
            "SUSE Linux Enterprise Micro 5.3:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
            "SUSE Linux Enterprise Micro 5.4:kernel-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise Micro 5.4:kernel-default-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise Micro 5.4:kernel-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Micro 5.4:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.aarch64",
            "SUSE Linux Enterprise Micro 5.4:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-64kb-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-64kb-devel-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.aarch64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.ppc64le",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-devel-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-docs-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-macros-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-source-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.170.1.aarch64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.170.1.ppc64le",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.170.1.s390x",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.170.1.x86_64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-zfcpdump-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-devel-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-devel-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-devel-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-docs-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-macros-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-obs-build-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-obs-build-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-source-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-syms-5.14.21-150400.24.170.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-syms-5.14.21-150400.24.170.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Manager Proxy 4.3:kernel-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Manager Proxy 4.3:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
            "SUSE Manager Proxy 4.3:kernel-default-devel-5.14.21-150400.24.170.2.x86_64",
            "SUSE Manager Proxy 4.3:kernel-devel-5.14.21-150400.24.170.1.noarch",
            "SUSE Manager Proxy 4.3:kernel-macros-5.14.21-150400.24.170.1.noarch",
            "SUSE Manager Proxy 4.3:kernel-source-5.14.21-150400.24.170.1.noarch",
            "SUSE Manager Proxy 4.3:kernel-syms-5.14.21-150400.24.170.1.x86_64",
            "SUSE Manager Server 4.3:kernel-default-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Manager Server 4.3:kernel-default-5.14.21-150400.24.170.2.s390x",
            "SUSE Manager Server 4.3:kernel-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Manager Server 4.3:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.ppc64le",
            "SUSE Manager Server 4.3:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
            "SUSE Manager Server 4.3:kernel-default-devel-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Manager Server 4.3:kernel-default-devel-5.14.21-150400.24.170.2.s390x",
            "SUSE Manager Server 4.3:kernel-default-devel-5.14.21-150400.24.170.2.x86_64",
            "SUSE Manager Server 4.3:kernel-devel-5.14.21-150400.24.170.1.noarch",
            "SUSE Manager Server 4.3:kernel-macros-5.14.21-150400.24.170.1.noarch",
            "SUSE Manager Server 4.3:kernel-source-5.14.21-150400.24.170.1.noarch",
            "SUSE Manager Server 4.3:kernel-syms-5.14.21-150400.24.170.1.ppc64le",
            "SUSE Manager Server 4.3:kernel-syms-5.14.21-150400.24.170.1.s390x",
            "SUSE Manager Server 4.3:kernel-syms-5.14.21-150400.24.170.1.x86_64",
            "SUSE Manager Server 4.3:kernel-zfcpdump-5.14.21-150400.24.170.2.s390x"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2025-07-28T15:09:33Z",
          "details": "moderate"
        }
      ],
      "title": "CVE-2022-50215"
    },
    {
      "cve": "CVE-2022-50218",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2022-50218"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "In the Linux kernel, the following vulnerability has been resolved:\n\niio: light: isl29028: Fix the warning in isl29028_remove()\n\nThe driver use the non-managed form of the register function in\nisl29028_remove(). To keep the release order as mirroring the ordering\nin probe, the driver should use non-managed form in probe, too.\n\nThe following log reveals it:\n\n[   32.374955] isl29028 0-0010: remove\n[   32.376861] general protection fault, probably for non-canonical address 0xdffffc0000000006: 0000 [#1] PREEMPT SMP KASAN PTI\n[   32.377676] KASAN: null-ptr-deref in range [0x0000000000000030-0x0000000000000037]\n[   32.379432] RIP: 0010:kernfs_find_and_get_ns+0x28/0xe0\n[   32.385461] Call Trace:\n[   32.385807]  sysfs_unmerge_group+0x59/0x110\n[   32.386110]  dpm_sysfs_remove+0x58/0xc0\n[   32.386391]  device_del+0x296/0xe50\n[   32.386959]  cdev_device_del+0x1d/0xd0\n[   32.387231]  devm_iio_device_unreg+0x27/0xb0\n[   32.387542]  devres_release_group+0x319/0x3d0\n[   32.388162]  i2c_device_remove+0x93/0x1f0",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.170.2.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.170.2.s390x",
          "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.170.2.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.170.2.s390x",
          "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.170.2.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.170.2.s390x",
          "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.170.2.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.170.2.s390x",
          "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-64kb-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-64kb-devel-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-devel-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-devel-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-devel-5.14.21-150400.24.170.1.noarch",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-docs-5.14.21-150400.24.170.1.noarch",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-macros-5.14.21-150400.24.170.1.noarch",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-obs-build-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-obs-build-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-source-5.14.21-150400.24.170.1.noarch",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-syms-5.14.21-150400.24.170.1.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-syms-5.14.21-150400.24.170.1.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:reiserfs-kmp-default-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:reiserfs-kmp-default-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-64kb-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-64kb-devel-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-devel-5.14.21-150400.24.170.1.noarch",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-docs-5.14.21-150400.24.170.1.noarch",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-macros-5.14.21-150400.24.170.1.noarch",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-source-5.14.21-150400.24.170.1.noarch",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.170.1.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.170.1.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.170.2.ppc64le",
          "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.170.2.s390x",
          "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.170.2.ppc64le",
          "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.170.2.s390x",
          "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_170-default-1-150400.9.3.2.ppc64le",
          "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_170-default-1-150400.9.3.2.s390x",
          "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_170-default-1-150400.9.3.2.x86_64",
          "SUSE Linux Enterprise Micro 5.3:kernel-default-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise Micro 5.3:kernel-default-5.14.21-150400.24.170.2.s390x",
          "SUSE Linux Enterprise Micro 5.3:kernel-default-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise Micro 5.3:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.aarch64",
          "SUSE Linux Enterprise Micro 5.3:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
          "SUSE Linux Enterprise Micro 5.4:kernel-default-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise Micro 5.4:kernel-default-5.14.21-150400.24.170.2.s390x",
          "SUSE Linux Enterprise Micro 5.4:kernel-default-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise Micro 5.4:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.aarch64",
          "SUSE Linux Enterprise Micro 5.4:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-64kb-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-64kb-devel-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-5.14.21-150400.24.170.2.ppc64le",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-5.14.21-150400.24.170.2.s390x",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.aarch64",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.ppc64le",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.170.2.ppc64le",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.170.2.s390x",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-devel-5.14.21-150400.24.170.1.noarch",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-docs-5.14.21-150400.24.170.1.noarch",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-macros-5.14.21-150400.24.170.1.noarch",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.170.2.ppc64le",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.170.2.s390x",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-source-5.14.21-150400.24.170.1.noarch",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.170.1.aarch64",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.170.1.ppc64le",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.170.1.s390x",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.170.1.x86_64",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-zfcpdump-5.14.21-150400.24.170.2.s390x",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.170.2.ppc64le",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.170.2.s390x",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-5.14.21-150400.24.170.2.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-devel-5.14.21-150400.24.170.2.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-devel-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-devel-5.14.21-150400.24.170.1.noarch",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-docs-5.14.21-150400.24.170.1.noarch",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-macros-5.14.21-150400.24.170.1.noarch",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-obs-build-5.14.21-150400.24.170.2.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-obs-build-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-source-5.14.21-150400.24.170.1.noarch",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-syms-5.14.21-150400.24.170.1.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-syms-5.14.21-150400.24.170.1.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.170.2.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.170.2.x86_64",
          "SUSE Manager Proxy 4.3:kernel-default-5.14.21-150400.24.170.2.x86_64",
          "SUSE Manager Proxy 4.3:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
          "SUSE Manager Proxy 4.3:kernel-default-devel-5.14.21-150400.24.170.2.x86_64",
          "SUSE Manager Proxy 4.3:kernel-devel-5.14.21-150400.24.170.1.noarch",
          "SUSE Manager Proxy 4.3:kernel-macros-5.14.21-150400.24.170.1.noarch",
          "SUSE Manager Proxy 4.3:kernel-source-5.14.21-150400.24.170.1.noarch",
          "SUSE Manager Proxy 4.3:kernel-syms-5.14.21-150400.24.170.1.x86_64",
          "SUSE Manager Server 4.3:kernel-default-5.14.21-150400.24.170.2.ppc64le",
          "SUSE Manager Server 4.3:kernel-default-5.14.21-150400.24.170.2.s390x",
          "SUSE Manager Server 4.3:kernel-default-5.14.21-150400.24.170.2.x86_64",
          "SUSE Manager Server 4.3:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.ppc64le",
          "SUSE Manager Server 4.3:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
          "SUSE Manager Server 4.3:kernel-default-devel-5.14.21-150400.24.170.2.ppc64le",
          "SUSE Manager Server 4.3:kernel-default-devel-5.14.21-150400.24.170.2.s390x",
          "SUSE Manager Server 4.3:kernel-default-devel-5.14.21-150400.24.170.2.x86_64",
          "SUSE Manager Server 4.3:kernel-devel-5.14.21-150400.24.170.1.noarch",
          "SUSE Manager Server 4.3:kernel-macros-5.14.21-150400.24.170.1.noarch",
          "SUSE Manager Server 4.3:kernel-source-5.14.21-150400.24.170.1.noarch",
          "SUSE Manager Server 4.3:kernel-syms-5.14.21-150400.24.170.1.ppc64le",
          "SUSE Manager Server 4.3:kernel-syms-5.14.21-150400.24.170.1.s390x",
          "SUSE Manager Server 4.3:kernel-syms-5.14.21-150400.24.170.1.x86_64",
          "SUSE Manager Server 4.3:kernel-zfcpdump-5.14.21-150400.24.170.2.s390x"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2022-50218",
          "url": "https://www.suse.com/security/cve/CVE-2022-50218"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1244861 for CVE-2022-50218",
          "url": "https://bugzilla.suse.com/1244861"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-64kb-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-64kb-devel-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-devel-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-devel-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-devel-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-docs-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-macros-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-obs-build-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-obs-build-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-source-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-syms-5.14.21-150400.24.170.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-syms-5.14.21-150400.24.170.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:reiserfs-kmp-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:reiserfs-kmp-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-64kb-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-64kb-devel-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-devel-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-docs-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-macros-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-source-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.170.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.170.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_170-default-1-150400.9.3.2.ppc64le",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_170-default-1-150400.9.3.2.s390x",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_170-default-1-150400.9.3.2.x86_64",
            "SUSE Linux Enterprise Micro 5.3:kernel-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise Micro 5.3:kernel-default-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise Micro 5.3:kernel-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Micro 5.3:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.aarch64",
            "SUSE Linux Enterprise Micro 5.3:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
            "SUSE Linux Enterprise Micro 5.4:kernel-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise Micro 5.4:kernel-default-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise Micro 5.4:kernel-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Micro 5.4:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.aarch64",
            "SUSE Linux Enterprise Micro 5.4:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-64kb-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-64kb-devel-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.aarch64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.ppc64le",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-devel-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-docs-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-macros-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-source-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.170.1.aarch64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.170.1.ppc64le",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.170.1.s390x",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.170.1.x86_64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-zfcpdump-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-devel-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-devel-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-devel-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-docs-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-macros-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-obs-build-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-obs-build-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-source-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-syms-5.14.21-150400.24.170.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-syms-5.14.21-150400.24.170.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Manager Proxy 4.3:kernel-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Manager Proxy 4.3:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
            "SUSE Manager Proxy 4.3:kernel-default-devel-5.14.21-150400.24.170.2.x86_64",
            "SUSE Manager Proxy 4.3:kernel-devel-5.14.21-150400.24.170.1.noarch",
            "SUSE Manager Proxy 4.3:kernel-macros-5.14.21-150400.24.170.1.noarch",
            "SUSE Manager Proxy 4.3:kernel-source-5.14.21-150400.24.170.1.noarch",
            "SUSE Manager Proxy 4.3:kernel-syms-5.14.21-150400.24.170.1.x86_64",
            "SUSE Manager Server 4.3:kernel-default-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Manager Server 4.3:kernel-default-5.14.21-150400.24.170.2.s390x",
            "SUSE Manager Server 4.3:kernel-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Manager Server 4.3:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.ppc64le",
            "SUSE Manager Server 4.3:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
            "SUSE Manager Server 4.3:kernel-default-devel-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Manager Server 4.3:kernel-default-devel-5.14.21-150400.24.170.2.s390x",
            "SUSE Manager Server 4.3:kernel-default-devel-5.14.21-150400.24.170.2.x86_64",
            "SUSE Manager Server 4.3:kernel-devel-5.14.21-150400.24.170.1.noarch",
            "SUSE Manager Server 4.3:kernel-macros-5.14.21-150400.24.170.1.noarch",
            "SUSE Manager Server 4.3:kernel-source-5.14.21-150400.24.170.1.noarch",
            "SUSE Manager Server 4.3:kernel-syms-5.14.21-150400.24.170.1.ppc64le",
            "SUSE Manager Server 4.3:kernel-syms-5.14.21-150400.24.170.1.s390x",
            "SUSE Manager Server 4.3:kernel-syms-5.14.21-150400.24.170.1.x86_64",
            "SUSE Manager Server 4.3:kernel-zfcpdump-5.14.21-150400.24.170.2.s390x"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 5.5,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
            "version": "3.1"
          },
          "products": [
            "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-64kb-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-64kb-devel-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-devel-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-devel-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-devel-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-docs-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-macros-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-obs-build-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-obs-build-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-source-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-syms-5.14.21-150400.24.170.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-syms-5.14.21-150400.24.170.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:reiserfs-kmp-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:reiserfs-kmp-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-64kb-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-64kb-devel-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-devel-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-docs-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-macros-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-source-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.170.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.170.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_170-default-1-150400.9.3.2.ppc64le",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_170-default-1-150400.9.3.2.s390x",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_170-default-1-150400.9.3.2.x86_64",
            "SUSE Linux Enterprise Micro 5.3:kernel-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise Micro 5.3:kernel-default-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise Micro 5.3:kernel-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Micro 5.3:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.aarch64",
            "SUSE Linux Enterprise Micro 5.3:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
            "SUSE Linux Enterprise Micro 5.4:kernel-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise Micro 5.4:kernel-default-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise Micro 5.4:kernel-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Micro 5.4:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.aarch64",
            "SUSE Linux Enterprise Micro 5.4:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-64kb-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-64kb-devel-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.aarch64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.ppc64le",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-devel-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-docs-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-macros-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-source-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.170.1.aarch64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.170.1.ppc64le",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.170.1.s390x",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.170.1.x86_64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-zfcpdump-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-devel-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-devel-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-devel-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-docs-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-macros-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-obs-build-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-obs-build-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-source-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-syms-5.14.21-150400.24.170.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-syms-5.14.21-150400.24.170.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Manager Proxy 4.3:kernel-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Manager Proxy 4.3:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
            "SUSE Manager Proxy 4.3:kernel-default-devel-5.14.21-150400.24.170.2.x86_64",
            "SUSE Manager Proxy 4.3:kernel-devel-5.14.21-150400.24.170.1.noarch",
            "SUSE Manager Proxy 4.3:kernel-macros-5.14.21-150400.24.170.1.noarch",
            "SUSE Manager Proxy 4.3:kernel-source-5.14.21-150400.24.170.1.noarch",
            "SUSE Manager Proxy 4.3:kernel-syms-5.14.21-150400.24.170.1.x86_64",
            "SUSE Manager Server 4.3:kernel-default-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Manager Server 4.3:kernel-default-5.14.21-150400.24.170.2.s390x",
            "SUSE Manager Server 4.3:kernel-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Manager Server 4.3:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.ppc64le",
            "SUSE Manager Server 4.3:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
            "SUSE Manager Server 4.3:kernel-default-devel-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Manager Server 4.3:kernel-default-devel-5.14.21-150400.24.170.2.s390x",
            "SUSE Manager Server 4.3:kernel-default-devel-5.14.21-150400.24.170.2.x86_64",
            "SUSE Manager Server 4.3:kernel-devel-5.14.21-150400.24.170.1.noarch",
            "SUSE Manager Server 4.3:kernel-macros-5.14.21-150400.24.170.1.noarch",
            "SUSE Manager Server 4.3:kernel-source-5.14.21-150400.24.170.1.noarch",
            "SUSE Manager Server 4.3:kernel-syms-5.14.21-150400.24.170.1.ppc64le",
            "SUSE Manager Server 4.3:kernel-syms-5.14.21-150400.24.170.1.s390x",
            "SUSE Manager Server 4.3:kernel-syms-5.14.21-150400.24.170.1.x86_64",
            "SUSE Manager Server 4.3:kernel-zfcpdump-5.14.21-150400.24.170.2.s390x"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2025-07-28T15:09:33Z",
          "details": "moderate"
        }
      ],
      "title": "CVE-2022-50218"
    },
    {
      "cve": "CVE-2022-50220",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2022-50220"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "In the Linux kernel, the following vulnerability has been resolved:\n\nusbnet: Fix linkwatch use-after-free on disconnect\n\nusbnet uses the work usbnet_deferred_kevent() to perform tasks which may\nsleep.  On disconnect, completion of the work was originally awaited in\n-\u003endo_stop().  But in 2003, that was moved to -\u003edisconnect() by historic\ncommit \"[PATCH] USB: usbnet, prevent exotic rtnl deadlock\":\n\n  https://git.kernel.org/tglx/history/c/0f138bbfd83c\n\nThe change was made because back then, the kernel\u0027s workqueue\nimplementation did not allow waiting for a single work.  One had to wait\nfor completion of *all* work by calling flush_scheduled_work(), and that\ncould deadlock when waiting for usbnet_deferred_kevent() with rtnl_mutex\nheld in -\u003endo_stop().\n\nThe commit solved one problem but created another:  It causes a\nuse-after-free in USB Ethernet drivers aqc111.c, asix_devices.c,\nax88179_178a.c, ch9200.c and smsc75xx.c:\n\n* If the drivers receive a link change interrupt immediately before\n  disconnect, they raise EVENT_LINK_RESET in their (non-sleepable)\n  -\u003estatus() callback and schedule usbnet_deferred_kevent().\n* usbnet_deferred_kevent() invokes the driver\u0027s -\u003elink_reset() callback,\n  which calls netif_carrier_{on,off}().\n* That in turn schedules the work linkwatch_event().\n\nBecause usbnet_deferred_kevent() is awaited after unregister_netdev(),\nnetif_carrier_{on,off}() may operate on an unregistered netdev and\nlinkwatch_event() may run after free_netdev(), causing a use-after-free.\n\nIn 2010, usbnet was changed to only wait for a single instance of\nusbnet_deferred_kevent() instead of *all* work by commit 23f333a2bfaf\n(\"drivers/net: don\u0027t use flush_scheduled_work()\").\n\nUnfortunately the commit neglected to move the wait back to\n-\u003endo_stop().  Rectify that omission at long last.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.170.2.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.170.2.s390x",
          "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.170.2.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.170.2.s390x",
          "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.170.2.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.170.2.s390x",
          "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.170.2.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.170.2.s390x",
          "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-64kb-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-64kb-devel-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-devel-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-devel-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-devel-5.14.21-150400.24.170.1.noarch",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-docs-5.14.21-150400.24.170.1.noarch",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-macros-5.14.21-150400.24.170.1.noarch",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-obs-build-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-obs-build-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-source-5.14.21-150400.24.170.1.noarch",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-syms-5.14.21-150400.24.170.1.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-syms-5.14.21-150400.24.170.1.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:reiserfs-kmp-default-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:reiserfs-kmp-default-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-64kb-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-64kb-devel-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-devel-5.14.21-150400.24.170.1.noarch",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-docs-5.14.21-150400.24.170.1.noarch",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-macros-5.14.21-150400.24.170.1.noarch",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-source-5.14.21-150400.24.170.1.noarch",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.170.1.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.170.1.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.170.2.ppc64le",
          "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.170.2.s390x",
          "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.170.2.ppc64le",
          "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.170.2.s390x",
          "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_170-default-1-150400.9.3.2.ppc64le",
          "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_170-default-1-150400.9.3.2.s390x",
          "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_170-default-1-150400.9.3.2.x86_64",
          "SUSE Linux Enterprise Micro 5.3:kernel-default-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise Micro 5.3:kernel-default-5.14.21-150400.24.170.2.s390x",
          "SUSE Linux Enterprise Micro 5.3:kernel-default-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise Micro 5.3:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.aarch64",
          "SUSE Linux Enterprise Micro 5.3:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
          "SUSE Linux Enterprise Micro 5.4:kernel-default-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise Micro 5.4:kernel-default-5.14.21-150400.24.170.2.s390x",
          "SUSE Linux Enterprise Micro 5.4:kernel-default-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise Micro 5.4:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.aarch64",
          "SUSE Linux Enterprise Micro 5.4:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-64kb-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-64kb-devel-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-5.14.21-150400.24.170.2.ppc64le",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-5.14.21-150400.24.170.2.s390x",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.aarch64",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.ppc64le",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.170.2.ppc64le",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.170.2.s390x",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-devel-5.14.21-150400.24.170.1.noarch",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-docs-5.14.21-150400.24.170.1.noarch",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-macros-5.14.21-150400.24.170.1.noarch",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.170.2.ppc64le",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.170.2.s390x",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-source-5.14.21-150400.24.170.1.noarch",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.170.1.aarch64",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.170.1.ppc64le",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.170.1.s390x",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.170.1.x86_64",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-zfcpdump-5.14.21-150400.24.170.2.s390x",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.170.2.ppc64le",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.170.2.s390x",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-5.14.21-150400.24.170.2.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-devel-5.14.21-150400.24.170.2.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-devel-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-devel-5.14.21-150400.24.170.1.noarch",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-docs-5.14.21-150400.24.170.1.noarch",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-macros-5.14.21-150400.24.170.1.noarch",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-obs-build-5.14.21-150400.24.170.2.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-obs-build-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-source-5.14.21-150400.24.170.1.noarch",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-syms-5.14.21-150400.24.170.1.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-syms-5.14.21-150400.24.170.1.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.170.2.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.170.2.x86_64",
          "SUSE Manager Proxy 4.3:kernel-default-5.14.21-150400.24.170.2.x86_64",
          "SUSE Manager Proxy 4.3:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
          "SUSE Manager Proxy 4.3:kernel-default-devel-5.14.21-150400.24.170.2.x86_64",
          "SUSE Manager Proxy 4.3:kernel-devel-5.14.21-150400.24.170.1.noarch",
          "SUSE Manager Proxy 4.3:kernel-macros-5.14.21-150400.24.170.1.noarch",
          "SUSE Manager Proxy 4.3:kernel-source-5.14.21-150400.24.170.1.noarch",
          "SUSE Manager Proxy 4.3:kernel-syms-5.14.21-150400.24.170.1.x86_64",
          "SUSE Manager Server 4.3:kernel-default-5.14.21-150400.24.170.2.ppc64le",
          "SUSE Manager Server 4.3:kernel-default-5.14.21-150400.24.170.2.s390x",
          "SUSE Manager Server 4.3:kernel-default-5.14.21-150400.24.170.2.x86_64",
          "SUSE Manager Server 4.3:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.ppc64le",
          "SUSE Manager Server 4.3:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
          "SUSE Manager Server 4.3:kernel-default-devel-5.14.21-150400.24.170.2.ppc64le",
          "SUSE Manager Server 4.3:kernel-default-devel-5.14.21-150400.24.170.2.s390x",
          "SUSE Manager Server 4.3:kernel-default-devel-5.14.21-150400.24.170.2.x86_64",
          "SUSE Manager Server 4.3:kernel-devel-5.14.21-150400.24.170.1.noarch",
          "SUSE Manager Server 4.3:kernel-macros-5.14.21-150400.24.170.1.noarch",
          "SUSE Manager Server 4.3:kernel-source-5.14.21-150400.24.170.1.noarch",
          "SUSE Manager Server 4.3:kernel-syms-5.14.21-150400.24.170.1.ppc64le",
          "SUSE Manager Server 4.3:kernel-syms-5.14.21-150400.24.170.1.s390x",
          "SUSE Manager Server 4.3:kernel-syms-5.14.21-150400.24.170.1.x86_64",
          "SUSE Manager Server 4.3:kernel-zfcpdump-5.14.21-150400.24.170.2.s390x"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2022-50220",
          "url": "https://www.suse.com/security/cve/CVE-2022-50220"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1245348 for CVE-2022-50220",
          "url": "https://bugzilla.suse.com/1245348"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-64kb-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-64kb-devel-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-devel-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-devel-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-devel-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-docs-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-macros-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-obs-build-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-obs-build-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-source-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-syms-5.14.21-150400.24.170.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-syms-5.14.21-150400.24.170.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:reiserfs-kmp-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:reiserfs-kmp-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-64kb-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-64kb-devel-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-devel-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-docs-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-macros-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-source-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.170.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.170.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_170-default-1-150400.9.3.2.ppc64le",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_170-default-1-150400.9.3.2.s390x",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_170-default-1-150400.9.3.2.x86_64",
            "SUSE Linux Enterprise Micro 5.3:kernel-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise Micro 5.3:kernel-default-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise Micro 5.3:kernel-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Micro 5.3:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.aarch64",
            "SUSE Linux Enterprise Micro 5.3:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
            "SUSE Linux Enterprise Micro 5.4:kernel-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise Micro 5.4:kernel-default-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise Micro 5.4:kernel-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Micro 5.4:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.aarch64",
            "SUSE Linux Enterprise Micro 5.4:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-64kb-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-64kb-devel-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.aarch64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.ppc64le",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-devel-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-docs-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-macros-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-source-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.170.1.aarch64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.170.1.ppc64le",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.170.1.s390x",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.170.1.x86_64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-zfcpdump-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-devel-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-devel-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-devel-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-docs-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-macros-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-obs-build-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-obs-build-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-source-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-syms-5.14.21-150400.24.170.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-syms-5.14.21-150400.24.170.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Manager Proxy 4.3:kernel-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Manager Proxy 4.3:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
            "SUSE Manager Proxy 4.3:kernel-default-devel-5.14.21-150400.24.170.2.x86_64",
            "SUSE Manager Proxy 4.3:kernel-devel-5.14.21-150400.24.170.1.noarch",
            "SUSE Manager Proxy 4.3:kernel-macros-5.14.21-150400.24.170.1.noarch",
            "SUSE Manager Proxy 4.3:kernel-source-5.14.21-150400.24.170.1.noarch",
            "SUSE Manager Proxy 4.3:kernel-syms-5.14.21-150400.24.170.1.x86_64",
            "SUSE Manager Server 4.3:kernel-default-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Manager Server 4.3:kernel-default-5.14.21-150400.24.170.2.s390x",
            "SUSE Manager Server 4.3:kernel-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Manager Server 4.3:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.ppc64le",
            "SUSE Manager Server 4.3:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
            "SUSE Manager Server 4.3:kernel-default-devel-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Manager Server 4.3:kernel-default-devel-5.14.21-150400.24.170.2.s390x",
            "SUSE Manager Server 4.3:kernel-default-devel-5.14.21-150400.24.170.2.x86_64",
            "SUSE Manager Server 4.3:kernel-devel-5.14.21-150400.24.170.1.noarch",
            "SUSE Manager Server 4.3:kernel-macros-5.14.21-150400.24.170.1.noarch",
            "SUSE Manager Server 4.3:kernel-source-5.14.21-150400.24.170.1.noarch",
            "SUSE Manager Server 4.3:kernel-syms-5.14.21-150400.24.170.1.ppc64le",
            "SUSE Manager Server 4.3:kernel-syms-5.14.21-150400.24.170.1.s390x",
            "SUSE Manager Server 4.3:kernel-syms-5.14.21-150400.24.170.1.x86_64",
            "SUSE Manager Server 4.3:kernel-zfcpdump-5.14.21-150400.24.170.2.s390x"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 6.5,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:L/I:H/A:H",
            "version": "3.1"
          },
          "products": [
            "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-64kb-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-64kb-devel-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-devel-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-devel-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-devel-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-docs-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-macros-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-obs-build-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-obs-build-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-source-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-syms-5.14.21-150400.24.170.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-syms-5.14.21-150400.24.170.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:reiserfs-kmp-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:reiserfs-kmp-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-64kb-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-64kb-devel-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-devel-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-docs-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-macros-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-source-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.170.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.170.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_170-default-1-150400.9.3.2.ppc64le",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_170-default-1-150400.9.3.2.s390x",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_170-default-1-150400.9.3.2.x86_64",
            "SUSE Linux Enterprise Micro 5.3:kernel-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise Micro 5.3:kernel-default-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise Micro 5.3:kernel-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Micro 5.3:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.aarch64",
            "SUSE Linux Enterprise Micro 5.3:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
            "SUSE Linux Enterprise Micro 5.4:kernel-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise Micro 5.4:kernel-default-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise Micro 5.4:kernel-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Micro 5.4:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.aarch64",
            "SUSE Linux Enterprise Micro 5.4:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-64kb-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-64kb-devel-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.aarch64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.ppc64le",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-devel-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-docs-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-macros-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-source-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.170.1.aarch64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.170.1.ppc64le",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.170.1.s390x",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.170.1.x86_64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-zfcpdump-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-devel-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-devel-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-devel-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-docs-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-macros-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-obs-build-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-obs-build-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-source-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-syms-5.14.21-150400.24.170.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-syms-5.14.21-150400.24.170.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Manager Proxy 4.3:kernel-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Manager Proxy 4.3:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
            "SUSE Manager Proxy 4.3:kernel-default-devel-5.14.21-150400.24.170.2.x86_64",
            "SUSE Manager Proxy 4.3:kernel-devel-5.14.21-150400.24.170.1.noarch",
            "SUSE Manager Proxy 4.3:kernel-macros-5.14.21-150400.24.170.1.noarch",
            "SUSE Manager Proxy 4.3:kernel-source-5.14.21-150400.24.170.1.noarch",
            "SUSE Manager Proxy 4.3:kernel-syms-5.14.21-150400.24.170.1.x86_64",
            "SUSE Manager Server 4.3:kernel-default-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Manager Server 4.3:kernel-default-5.14.21-150400.24.170.2.s390x",
            "SUSE Manager Server 4.3:kernel-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Manager Server 4.3:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.ppc64le",
            "SUSE Manager Server 4.3:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
            "SUSE Manager Server 4.3:kernel-default-devel-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Manager Server 4.3:kernel-default-devel-5.14.21-150400.24.170.2.s390x",
            "SUSE Manager Server 4.3:kernel-default-devel-5.14.21-150400.24.170.2.x86_64",
            "SUSE Manager Server 4.3:kernel-devel-5.14.21-150400.24.170.1.noarch",
            "SUSE Manager Server 4.3:kernel-macros-5.14.21-150400.24.170.1.noarch",
            "SUSE Manager Server 4.3:kernel-source-5.14.21-150400.24.170.1.noarch",
            "SUSE Manager Server 4.3:kernel-syms-5.14.21-150400.24.170.1.ppc64le",
            "SUSE Manager Server 4.3:kernel-syms-5.14.21-150400.24.170.1.s390x",
            "SUSE Manager Server 4.3:kernel-syms-5.14.21-150400.24.170.1.x86_64",
            "SUSE Manager Server 4.3:kernel-zfcpdump-5.14.21-150400.24.170.2.s390x"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2025-07-28T15:09:33Z",
          "details": "moderate"
        }
      ],
      "title": "CVE-2022-50220"
    },
    {
      "cve": "CVE-2022-50222",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2022-50222"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "In the Linux kernel, the following vulnerability has been resolved:\n\ntty: vt: initialize unicode screen buffer\n\nsyzbot reports kernel infoleak at vcs_read() [1], for buffer can be read\nimmediately after resize operation. Initialize buffer using kzalloc().\n\n  ----------\n  #include \u003cfcntl.h\u003e\n  #include \u003cunistd.h\u003e\n  #include \u003csys/ioctl.h\u003e\n  #include \u003clinux/fb.h\u003e\n\n  int main(int argc, char *argv[])\n  {\n    struct fb_var_screeninfo var = { };\n    const int fb_fd = open(\"/dev/fb0\", 3);\n    ioctl(fb_fd, FBIOGET_VSCREENINFO, \u0026var);\n    var.yres = 0x21;\n    ioctl(fb_fd, FBIOPUT_VSCREENINFO, \u0026var);\n    return read(open(\"/dev/vcsu\", O_RDONLY), \u0026var, sizeof(var)) == -1;\n  }\n  ----------",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.170.2.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.170.2.s390x",
          "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.170.2.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.170.2.s390x",
          "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.170.2.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.170.2.s390x",
          "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.170.2.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.170.2.s390x",
          "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-64kb-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-64kb-devel-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-devel-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-devel-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-devel-5.14.21-150400.24.170.1.noarch",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-docs-5.14.21-150400.24.170.1.noarch",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-macros-5.14.21-150400.24.170.1.noarch",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-obs-build-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-obs-build-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-source-5.14.21-150400.24.170.1.noarch",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-syms-5.14.21-150400.24.170.1.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-syms-5.14.21-150400.24.170.1.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:reiserfs-kmp-default-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:reiserfs-kmp-default-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-64kb-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-64kb-devel-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-devel-5.14.21-150400.24.170.1.noarch",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-docs-5.14.21-150400.24.170.1.noarch",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-macros-5.14.21-150400.24.170.1.noarch",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-source-5.14.21-150400.24.170.1.noarch",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.170.1.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.170.1.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.170.2.ppc64le",
          "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.170.2.s390x",
          "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.170.2.ppc64le",
          "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.170.2.s390x",
          "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_170-default-1-150400.9.3.2.ppc64le",
          "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_170-default-1-150400.9.3.2.s390x",
          "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_170-default-1-150400.9.3.2.x86_64",
          "SUSE Linux Enterprise Micro 5.3:kernel-default-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise Micro 5.3:kernel-default-5.14.21-150400.24.170.2.s390x",
          "SUSE Linux Enterprise Micro 5.3:kernel-default-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise Micro 5.3:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.aarch64",
          "SUSE Linux Enterprise Micro 5.3:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
          "SUSE Linux Enterprise Micro 5.4:kernel-default-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise Micro 5.4:kernel-default-5.14.21-150400.24.170.2.s390x",
          "SUSE Linux Enterprise Micro 5.4:kernel-default-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise Micro 5.4:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.aarch64",
          "SUSE Linux Enterprise Micro 5.4:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-64kb-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-64kb-devel-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-5.14.21-150400.24.170.2.ppc64le",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-5.14.21-150400.24.170.2.s390x",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.aarch64",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.ppc64le",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.170.2.ppc64le",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.170.2.s390x",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-devel-5.14.21-150400.24.170.1.noarch",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-docs-5.14.21-150400.24.170.1.noarch",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-macros-5.14.21-150400.24.170.1.noarch",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.170.2.ppc64le",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.170.2.s390x",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-source-5.14.21-150400.24.170.1.noarch",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.170.1.aarch64",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.170.1.ppc64le",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.170.1.s390x",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.170.1.x86_64",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-zfcpdump-5.14.21-150400.24.170.2.s390x",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.170.2.ppc64le",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.170.2.s390x",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-5.14.21-150400.24.170.2.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-devel-5.14.21-150400.24.170.2.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-devel-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-devel-5.14.21-150400.24.170.1.noarch",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-docs-5.14.21-150400.24.170.1.noarch",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-macros-5.14.21-150400.24.170.1.noarch",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-obs-build-5.14.21-150400.24.170.2.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-obs-build-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-source-5.14.21-150400.24.170.1.noarch",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-syms-5.14.21-150400.24.170.1.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-syms-5.14.21-150400.24.170.1.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.170.2.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.170.2.x86_64",
          "SUSE Manager Proxy 4.3:kernel-default-5.14.21-150400.24.170.2.x86_64",
          "SUSE Manager Proxy 4.3:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
          "SUSE Manager Proxy 4.3:kernel-default-devel-5.14.21-150400.24.170.2.x86_64",
          "SUSE Manager Proxy 4.3:kernel-devel-5.14.21-150400.24.170.1.noarch",
          "SUSE Manager Proxy 4.3:kernel-macros-5.14.21-150400.24.170.1.noarch",
          "SUSE Manager Proxy 4.3:kernel-source-5.14.21-150400.24.170.1.noarch",
          "SUSE Manager Proxy 4.3:kernel-syms-5.14.21-150400.24.170.1.x86_64",
          "SUSE Manager Server 4.3:kernel-default-5.14.21-150400.24.170.2.ppc64le",
          "SUSE Manager Server 4.3:kernel-default-5.14.21-150400.24.170.2.s390x",
          "SUSE Manager Server 4.3:kernel-default-5.14.21-150400.24.170.2.x86_64",
          "SUSE Manager Server 4.3:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.ppc64le",
          "SUSE Manager Server 4.3:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
          "SUSE Manager Server 4.3:kernel-default-devel-5.14.21-150400.24.170.2.ppc64le",
          "SUSE Manager Server 4.3:kernel-default-devel-5.14.21-150400.24.170.2.s390x",
          "SUSE Manager Server 4.3:kernel-default-devel-5.14.21-150400.24.170.2.x86_64",
          "SUSE Manager Server 4.3:kernel-devel-5.14.21-150400.24.170.1.noarch",
          "SUSE Manager Server 4.3:kernel-macros-5.14.21-150400.24.170.1.noarch",
          "SUSE Manager Server 4.3:kernel-source-5.14.21-150400.24.170.1.noarch",
          "SUSE Manager Server 4.3:kernel-syms-5.14.21-150400.24.170.1.ppc64le",
          "SUSE Manager Server 4.3:kernel-syms-5.14.21-150400.24.170.1.s390x",
          "SUSE Manager Server 4.3:kernel-syms-5.14.21-150400.24.170.1.x86_64",
          "SUSE Manager Server 4.3:kernel-zfcpdump-5.14.21-150400.24.170.2.s390x"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2022-50222",
          "url": "https://www.suse.com/security/cve/CVE-2022-50222"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1245136 for CVE-2022-50222",
          "url": "https://bugzilla.suse.com/1245136"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-64kb-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-64kb-devel-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-devel-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-devel-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-devel-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-docs-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-macros-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-obs-build-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-obs-build-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-source-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-syms-5.14.21-150400.24.170.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-syms-5.14.21-150400.24.170.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:reiserfs-kmp-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:reiserfs-kmp-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-64kb-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-64kb-devel-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-devel-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-docs-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-macros-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-source-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.170.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.170.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_170-default-1-150400.9.3.2.ppc64le",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_170-default-1-150400.9.3.2.s390x",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_170-default-1-150400.9.3.2.x86_64",
            "SUSE Linux Enterprise Micro 5.3:kernel-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise Micro 5.3:kernel-default-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise Micro 5.3:kernel-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Micro 5.3:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.aarch64",
            "SUSE Linux Enterprise Micro 5.3:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
            "SUSE Linux Enterprise Micro 5.4:kernel-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise Micro 5.4:kernel-default-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise Micro 5.4:kernel-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Micro 5.4:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.aarch64",
            "SUSE Linux Enterprise Micro 5.4:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-64kb-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-64kb-devel-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.aarch64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.ppc64le",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-devel-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-docs-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-macros-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-source-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.170.1.aarch64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.170.1.ppc64le",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.170.1.s390x",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.170.1.x86_64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-zfcpdump-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-devel-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-devel-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-devel-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-docs-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-macros-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-obs-build-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-obs-build-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-source-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-syms-5.14.21-150400.24.170.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-syms-5.14.21-150400.24.170.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Manager Proxy 4.3:kernel-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Manager Proxy 4.3:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
            "SUSE Manager Proxy 4.3:kernel-default-devel-5.14.21-150400.24.170.2.x86_64",
            "SUSE Manager Proxy 4.3:kernel-devel-5.14.21-150400.24.170.1.noarch",
            "SUSE Manager Proxy 4.3:kernel-macros-5.14.21-150400.24.170.1.noarch",
            "SUSE Manager Proxy 4.3:kernel-source-5.14.21-150400.24.170.1.noarch",
            "SUSE Manager Proxy 4.3:kernel-syms-5.14.21-150400.24.170.1.x86_64",
            "SUSE Manager Server 4.3:kernel-default-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Manager Server 4.3:kernel-default-5.14.21-150400.24.170.2.s390x",
            "SUSE Manager Server 4.3:kernel-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Manager Server 4.3:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.ppc64le",
            "SUSE Manager Server 4.3:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
            "SUSE Manager Server 4.3:kernel-default-devel-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Manager Server 4.3:kernel-default-devel-5.14.21-150400.24.170.2.s390x",
            "SUSE Manager Server 4.3:kernel-default-devel-5.14.21-150400.24.170.2.x86_64",
            "SUSE Manager Server 4.3:kernel-devel-5.14.21-150400.24.170.1.noarch",
            "SUSE Manager Server 4.3:kernel-macros-5.14.21-150400.24.170.1.noarch",
            "SUSE Manager Server 4.3:kernel-source-5.14.21-150400.24.170.1.noarch",
            "SUSE Manager Server 4.3:kernel-syms-5.14.21-150400.24.170.1.ppc64le",
            "SUSE Manager Server 4.3:kernel-syms-5.14.21-150400.24.170.1.s390x",
            "SUSE Manager Server 4.3:kernel-syms-5.14.21-150400.24.170.1.x86_64",
            "SUSE Manager Server 4.3:kernel-zfcpdump-5.14.21-150400.24.170.2.s390x"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 3.3,
            "baseSeverity": "LOW",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N",
            "version": "3.1"
          },
          "products": [
            "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-64kb-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-64kb-devel-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-devel-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-devel-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-devel-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-docs-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-macros-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-obs-build-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-obs-build-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-source-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-syms-5.14.21-150400.24.170.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-syms-5.14.21-150400.24.170.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:reiserfs-kmp-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:reiserfs-kmp-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-64kb-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-64kb-devel-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-devel-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-docs-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-macros-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-source-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.170.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.170.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_170-default-1-150400.9.3.2.ppc64le",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_170-default-1-150400.9.3.2.s390x",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_170-default-1-150400.9.3.2.x86_64",
            "SUSE Linux Enterprise Micro 5.3:kernel-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise Micro 5.3:kernel-default-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise Micro 5.3:kernel-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Micro 5.3:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.aarch64",
            "SUSE Linux Enterprise Micro 5.3:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
            "SUSE Linux Enterprise Micro 5.4:kernel-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise Micro 5.4:kernel-default-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise Micro 5.4:kernel-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Micro 5.4:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.aarch64",
            "SUSE Linux Enterprise Micro 5.4:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-64kb-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-64kb-devel-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.aarch64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.ppc64le",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-devel-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-docs-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-macros-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-source-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.170.1.aarch64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.170.1.ppc64le",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.170.1.s390x",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.170.1.x86_64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-zfcpdump-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-devel-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-devel-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-devel-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-docs-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-macros-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-obs-build-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-obs-build-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-source-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-syms-5.14.21-150400.24.170.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-syms-5.14.21-150400.24.170.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Manager Proxy 4.3:kernel-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Manager Proxy 4.3:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
            "SUSE Manager Proxy 4.3:kernel-default-devel-5.14.21-150400.24.170.2.x86_64",
            "SUSE Manager Proxy 4.3:kernel-devel-5.14.21-150400.24.170.1.noarch",
            "SUSE Manager Proxy 4.3:kernel-macros-5.14.21-150400.24.170.1.noarch",
            "SUSE Manager Proxy 4.3:kernel-source-5.14.21-150400.24.170.1.noarch",
            "SUSE Manager Proxy 4.3:kernel-syms-5.14.21-150400.24.170.1.x86_64",
            "SUSE Manager Server 4.3:kernel-default-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Manager Server 4.3:kernel-default-5.14.21-150400.24.170.2.s390x",
            "SUSE Manager Server 4.3:kernel-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Manager Server 4.3:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.ppc64le",
            "SUSE Manager Server 4.3:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
            "SUSE Manager Server 4.3:kernel-default-devel-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Manager Server 4.3:kernel-default-devel-5.14.21-150400.24.170.2.s390x",
            "SUSE Manager Server 4.3:kernel-default-devel-5.14.21-150400.24.170.2.x86_64",
            "SUSE Manager Server 4.3:kernel-devel-5.14.21-150400.24.170.1.noarch",
            "SUSE Manager Server 4.3:kernel-macros-5.14.21-150400.24.170.1.noarch",
            "SUSE Manager Server 4.3:kernel-source-5.14.21-150400.24.170.1.noarch",
            "SUSE Manager Server 4.3:kernel-syms-5.14.21-150400.24.170.1.ppc64le",
            "SUSE Manager Server 4.3:kernel-syms-5.14.21-150400.24.170.1.s390x",
            "SUSE Manager Server 4.3:kernel-syms-5.14.21-150400.24.170.1.x86_64",
            "SUSE Manager Server 4.3:kernel-zfcpdump-5.14.21-150400.24.170.2.s390x"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2025-07-28T15:09:33Z",
          "details": "low"
        }
      ],
      "title": "CVE-2022-50222"
    },
    {
      "cve": "CVE-2022-50226",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2022-50226"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "In the Linux kernel, the following vulnerability has been resolved:\n\ncrypto: ccp - Use kzalloc for sev ioctl interfaces to prevent kernel memory leak\n\nFor some sev ioctl interfaces, input may be passed that is less than or\nequal to SEV_FW_BLOB_MAX_SIZE, but larger than the data that PSP\nfirmware returns. In this case, kmalloc will allocate memory that is the\nsize of the input rather than the size of the data. Since PSP firmware\ndoesn\u0027t fully overwrite the buffer, the sev ioctl interfaces with the\nissue may return uninitialized slab memory.\n\nCurrently, all of the ioctl interfaces in the ccp driver are safe, but\nto prevent future problems, change all ioctl interfaces that allocate\nmemory with kmalloc to use kzalloc and memset the data buffer to zero\nin sev_ioctl_do_platform_status.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.170.2.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.170.2.s390x",
          "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.170.2.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.170.2.s390x",
          "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.170.2.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.170.2.s390x",
          "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.170.2.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.170.2.s390x",
          "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-64kb-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-64kb-devel-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-devel-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-devel-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-devel-5.14.21-150400.24.170.1.noarch",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-docs-5.14.21-150400.24.170.1.noarch",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-macros-5.14.21-150400.24.170.1.noarch",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-obs-build-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-obs-build-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-source-5.14.21-150400.24.170.1.noarch",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-syms-5.14.21-150400.24.170.1.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-syms-5.14.21-150400.24.170.1.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:reiserfs-kmp-default-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:reiserfs-kmp-default-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-64kb-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-64kb-devel-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-devel-5.14.21-150400.24.170.1.noarch",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-docs-5.14.21-150400.24.170.1.noarch",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-macros-5.14.21-150400.24.170.1.noarch",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-source-5.14.21-150400.24.170.1.noarch",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.170.1.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.170.1.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.170.2.ppc64le",
          "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.170.2.s390x",
          "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.170.2.ppc64le",
          "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.170.2.s390x",
          "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_170-default-1-150400.9.3.2.ppc64le",
          "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_170-default-1-150400.9.3.2.s390x",
          "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_170-default-1-150400.9.3.2.x86_64",
          "SUSE Linux Enterprise Micro 5.3:kernel-default-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise Micro 5.3:kernel-default-5.14.21-150400.24.170.2.s390x",
          "SUSE Linux Enterprise Micro 5.3:kernel-default-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise Micro 5.3:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.aarch64",
          "SUSE Linux Enterprise Micro 5.3:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
          "SUSE Linux Enterprise Micro 5.4:kernel-default-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise Micro 5.4:kernel-default-5.14.21-150400.24.170.2.s390x",
          "SUSE Linux Enterprise Micro 5.4:kernel-default-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise Micro 5.4:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.aarch64",
          "SUSE Linux Enterprise Micro 5.4:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-64kb-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-64kb-devel-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-5.14.21-150400.24.170.2.ppc64le",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-5.14.21-150400.24.170.2.s390x",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.aarch64",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.ppc64le",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.170.2.ppc64le",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.170.2.s390x",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-devel-5.14.21-150400.24.170.1.noarch",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-docs-5.14.21-150400.24.170.1.noarch",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-macros-5.14.21-150400.24.170.1.noarch",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.170.2.ppc64le",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.170.2.s390x",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-source-5.14.21-150400.24.170.1.noarch",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.170.1.aarch64",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.170.1.ppc64le",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.170.1.s390x",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.170.1.x86_64",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-zfcpdump-5.14.21-150400.24.170.2.s390x",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.170.2.ppc64le",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.170.2.s390x",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-5.14.21-150400.24.170.2.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-devel-5.14.21-150400.24.170.2.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-devel-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-devel-5.14.21-150400.24.170.1.noarch",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-docs-5.14.21-150400.24.170.1.noarch",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-macros-5.14.21-150400.24.170.1.noarch",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-obs-build-5.14.21-150400.24.170.2.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-obs-build-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-source-5.14.21-150400.24.170.1.noarch",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-syms-5.14.21-150400.24.170.1.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-syms-5.14.21-150400.24.170.1.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.170.2.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.170.2.x86_64",
          "SUSE Manager Proxy 4.3:kernel-default-5.14.21-150400.24.170.2.x86_64",
          "SUSE Manager Proxy 4.3:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
          "SUSE Manager Proxy 4.3:kernel-default-devel-5.14.21-150400.24.170.2.x86_64",
          "SUSE Manager Proxy 4.3:kernel-devel-5.14.21-150400.24.170.1.noarch",
          "SUSE Manager Proxy 4.3:kernel-macros-5.14.21-150400.24.170.1.noarch",
          "SUSE Manager Proxy 4.3:kernel-source-5.14.21-150400.24.170.1.noarch",
          "SUSE Manager Proxy 4.3:kernel-syms-5.14.21-150400.24.170.1.x86_64",
          "SUSE Manager Server 4.3:kernel-default-5.14.21-150400.24.170.2.ppc64le",
          "SUSE Manager Server 4.3:kernel-default-5.14.21-150400.24.170.2.s390x",
          "SUSE Manager Server 4.3:kernel-default-5.14.21-150400.24.170.2.x86_64",
          "SUSE Manager Server 4.3:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.ppc64le",
          "SUSE Manager Server 4.3:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
          "SUSE Manager Server 4.3:kernel-default-devel-5.14.21-150400.24.170.2.ppc64le",
          "SUSE Manager Server 4.3:kernel-default-devel-5.14.21-150400.24.170.2.s390x",
          "SUSE Manager Server 4.3:kernel-default-devel-5.14.21-150400.24.170.2.x86_64",
          "SUSE Manager Server 4.3:kernel-devel-5.14.21-150400.24.170.1.noarch",
          "SUSE Manager Server 4.3:kernel-macros-5.14.21-150400.24.170.1.noarch",
          "SUSE Manager Server 4.3:kernel-source-5.14.21-150400.24.170.1.noarch",
          "SUSE Manager Server 4.3:kernel-syms-5.14.21-150400.24.170.1.ppc64le",
          "SUSE Manager Server 4.3:kernel-syms-5.14.21-150400.24.170.1.s390x",
          "SUSE Manager Server 4.3:kernel-syms-5.14.21-150400.24.170.1.x86_64",
          "SUSE Manager Server 4.3:kernel-zfcpdump-5.14.21-150400.24.170.2.s390x"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2022-50226",
          "url": "https://www.suse.com/security/cve/CVE-2022-50226"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1244860 for CVE-2022-50226",
          "url": "https://bugzilla.suse.com/1244860"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-64kb-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-64kb-devel-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-devel-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-devel-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-devel-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-docs-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-macros-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-obs-build-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-obs-build-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-source-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-syms-5.14.21-150400.24.170.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-syms-5.14.21-150400.24.170.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:reiserfs-kmp-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:reiserfs-kmp-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-64kb-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-64kb-devel-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-devel-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-docs-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-macros-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-source-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.170.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.170.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_170-default-1-150400.9.3.2.ppc64le",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_170-default-1-150400.9.3.2.s390x",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_170-default-1-150400.9.3.2.x86_64",
            "SUSE Linux Enterprise Micro 5.3:kernel-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise Micro 5.3:kernel-default-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise Micro 5.3:kernel-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Micro 5.3:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.aarch64",
            "SUSE Linux Enterprise Micro 5.3:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
            "SUSE Linux Enterprise Micro 5.4:kernel-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise Micro 5.4:kernel-default-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise Micro 5.4:kernel-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Micro 5.4:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.aarch64",
            "SUSE Linux Enterprise Micro 5.4:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-64kb-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-64kb-devel-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.aarch64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.ppc64le",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-devel-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-docs-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-macros-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-source-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.170.1.aarch64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.170.1.ppc64le",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.170.1.s390x",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.170.1.x86_64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-zfcpdump-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-devel-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-devel-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-devel-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-docs-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-macros-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-obs-build-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-obs-build-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-source-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-syms-5.14.21-150400.24.170.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-syms-5.14.21-150400.24.170.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Manager Proxy 4.3:kernel-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Manager Proxy 4.3:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
            "SUSE Manager Proxy 4.3:kernel-default-devel-5.14.21-150400.24.170.2.x86_64",
            "SUSE Manager Proxy 4.3:kernel-devel-5.14.21-150400.24.170.1.noarch",
            "SUSE Manager Proxy 4.3:kernel-macros-5.14.21-150400.24.170.1.noarch",
            "SUSE Manager Proxy 4.3:kernel-source-5.14.21-150400.24.170.1.noarch",
            "SUSE Manager Proxy 4.3:kernel-syms-5.14.21-150400.24.170.1.x86_64",
            "SUSE Manager Server 4.3:kernel-default-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Manager Server 4.3:kernel-default-5.14.21-150400.24.170.2.s390x",
            "SUSE Manager Server 4.3:kernel-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Manager Server 4.3:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.ppc64le",
            "SUSE Manager Server 4.3:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
            "SUSE Manager Server 4.3:kernel-default-devel-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Manager Server 4.3:kernel-default-devel-5.14.21-150400.24.170.2.s390x",
            "SUSE Manager Server 4.3:kernel-default-devel-5.14.21-150400.24.170.2.x86_64",
            "SUSE Manager Server 4.3:kernel-devel-5.14.21-150400.24.170.1.noarch",
            "SUSE Manager Server 4.3:kernel-macros-5.14.21-150400.24.170.1.noarch",
            "SUSE Manager Server 4.3:kernel-source-5.14.21-150400.24.170.1.noarch",
            "SUSE Manager Server 4.3:kernel-syms-5.14.21-150400.24.170.1.ppc64le",
            "SUSE Manager Server 4.3:kernel-syms-5.14.21-150400.24.170.1.s390x",
            "SUSE Manager Server 4.3:kernel-syms-5.14.21-150400.24.170.1.x86_64",
            "SUSE Manager Server 4.3:kernel-zfcpdump-5.14.21-150400.24.170.2.s390x"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 5.5,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
            "version": "3.1"
          },
          "products": [
            "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-64kb-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-64kb-devel-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-devel-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-devel-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-devel-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-docs-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-macros-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-obs-build-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-obs-build-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-source-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-syms-5.14.21-150400.24.170.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-syms-5.14.21-150400.24.170.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:reiserfs-kmp-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:reiserfs-kmp-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-64kb-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-64kb-devel-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-devel-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-docs-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-macros-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-source-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.170.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.170.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_170-default-1-150400.9.3.2.ppc64le",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_170-default-1-150400.9.3.2.s390x",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_170-default-1-150400.9.3.2.x86_64",
            "SUSE Linux Enterprise Micro 5.3:kernel-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise Micro 5.3:kernel-default-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise Micro 5.3:kernel-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Micro 5.3:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.aarch64",
            "SUSE Linux Enterprise Micro 5.3:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
            "SUSE Linux Enterprise Micro 5.4:kernel-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise Micro 5.4:kernel-default-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise Micro 5.4:kernel-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Micro 5.4:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.aarch64",
            "SUSE Linux Enterprise Micro 5.4:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-64kb-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-64kb-devel-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.aarch64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.ppc64le",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-devel-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-docs-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-macros-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-source-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.170.1.aarch64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.170.1.ppc64le",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.170.1.s390x",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.170.1.x86_64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-zfcpdump-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-devel-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-devel-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-devel-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-docs-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-macros-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-obs-build-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-obs-build-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-source-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-syms-5.14.21-150400.24.170.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-syms-5.14.21-150400.24.170.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Manager Proxy 4.3:kernel-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Manager Proxy 4.3:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
            "SUSE Manager Proxy 4.3:kernel-default-devel-5.14.21-150400.24.170.2.x86_64",
            "SUSE Manager Proxy 4.3:kernel-devel-5.14.21-150400.24.170.1.noarch",
            "SUSE Manager Proxy 4.3:kernel-macros-5.14.21-150400.24.170.1.noarch",
            "SUSE Manager Proxy 4.3:kernel-source-5.14.21-150400.24.170.1.noarch",
            "SUSE Manager Proxy 4.3:kernel-syms-5.14.21-150400.24.170.1.x86_64",
            "SUSE Manager Server 4.3:kernel-default-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Manager Server 4.3:kernel-default-5.14.21-150400.24.170.2.s390x",
            "SUSE Manager Server 4.3:kernel-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Manager Server 4.3:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.ppc64le",
            "SUSE Manager Server 4.3:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
            "SUSE Manager Server 4.3:kernel-default-devel-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Manager Server 4.3:kernel-default-devel-5.14.21-150400.24.170.2.s390x",
            "SUSE Manager Server 4.3:kernel-default-devel-5.14.21-150400.24.170.2.x86_64",
            "SUSE Manager Server 4.3:kernel-devel-5.14.21-150400.24.170.1.noarch",
            "SUSE Manager Server 4.3:kernel-macros-5.14.21-150400.24.170.1.noarch",
            "SUSE Manager Server 4.3:kernel-source-5.14.21-150400.24.170.1.noarch",
            "SUSE Manager Server 4.3:kernel-syms-5.14.21-150400.24.170.1.ppc64le",
            "SUSE Manager Server 4.3:kernel-syms-5.14.21-150400.24.170.1.s390x",
            "SUSE Manager Server 4.3:kernel-syms-5.14.21-150400.24.170.1.x86_64",
            "SUSE Manager Server 4.3:kernel-zfcpdump-5.14.21-150400.24.170.2.s390x"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2025-07-28T15:09:33Z",
          "details": "moderate"
        }
      ],
      "title": "CVE-2022-50226"
    },
    {
      "cve": "CVE-2022-50228",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2022-50228"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "In the Linux kernel, the following vulnerability has been resolved:\n\nKVM: SVM: Don\u0027t BUG if userspace injects an interrupt with GIF=0\n\nDon\u0027t BUG/WARN on interrupt injection due to GIF being cleared,\nsince it\u0027s trivial for userspace to force the situation via\nKVM_SET_VCPU_EVENTS (even if having at least a WARN there would be correct\nfor KVM internally generated injections).\n\n  kernel BUG at arch/x86/kvm/svm/svm.c:3386!\n  invalid opcode: 0000 [#1] SMP\n  CPU: 15 PID: 926 Comm: smm_test Not tainted 5.17.0-rc3+ #264\n  Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 0.0.0 02/06/2015\n  RIP: 0010:svm_inject_irq+0xab/0xb0 [kvm_amd]\n  Code: \u003c0f\u003e 0b 0f 1f 00 0f 1f 44 00 00 80 3d ac b3 01 00 00 55 48 89 f5 53\n  RSP: 0018:ffffc90000b37d88 EFLAGS: 00010246\n  RAX: 0000000000000000 RBX: ffff88810a234ac0 RCX: 0000000000000006\n  RDX: 0000000000000000 RSI: ffffc90000b37df7 RDI: ffff88810a234ac0\n  RBP: ffffc90000b37df7 R08: ffff88810a1fa410 R09: 0000000000000000\n  R10: 0000000000000000 R11: 0000000000000000 R12: 0000000000000000\n  R13: ffff888109571000 R14: ffff88810a234ac0 R15: 0000000000000000\n  FS:  0000000001821380(0000) GS:ffff88846fdc0000(0000) knlGS:0000000000000000\n  CS:  0010 DS: 0000 ES: 0000 CR0: 0000000080050033\n  CR2: 00007f74fc550008 CR3: 000000010a6fe000 CR4: 0000000000350ea0\n  Call Trace:\n   \u003cTASK\u003e\n   inject_pending_event+0x2f7/0x4c0 [kvm]\n   kvm_arch_vcpu_ioctl_run+0x791/0x17a0 [kvm]\n   kvm_vcpu_ioctl+0x26d/0x650 [kvm]\n   __x64_sys_ioctl+0x82/0xb0\n   do_syscall_64+0x3b/0xc0\n   entry_SYSCALL_64_after_hwframe+0x44/0xae\n   \u003c/TASK\u003e",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.170.2.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.170.2.s390x",
          "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.170.2.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.170.2.s390x",
          "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.170.2.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.170.2.s390x",
          "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.170.2.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.170.2.s390x",
          "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-64kb-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-64kb-devel-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-devel-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-devel-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-devel-5.14.21-150400.24.170.1.noarch",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-docs-5.14.21-150400.24.170.1.noarch",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-macros-5.14.21-150400.24.170.1.noarch",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-obs-build-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-obs-build-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-source-5.14.21-150400.24.170.1.noarch",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-syms-5.14.21-150400.24.170.1.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-syms-5.14.21-150400.24.170.1.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:reiserfs-kmp-default-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:reiserfs-kmp-default-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-64kb-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-64kb-devel-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-devel-5.14.21-150400.24.170.1.noarch",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-docs-5.14.21-150400.24.170.1.noarch",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-macros-5.14.21-150400.24.170.1.noarch",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-source-5.14.21-150400.24.170.1.noarch",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.170.1.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.170.1.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.170.2.ppc64le",
          "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.170.2.s390x",
          "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.170.2.ppc64le",
          "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.170.2.s390x",
          "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_170-default-1-150400.9.3.2.ppc64le",
          "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_170-default-1-150400.9.3.2.s390x",
          "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_170-default-1-150400.9.3.2.x86_64",
          "SUSE Linux Enterprise Micro 5.3:kernel-default-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise Micro 5.3:kernel-default-5.14.21-150400.24.170.2.s390x",
          "SUSE Linux Enterprise Micro 5.3:kernel-default-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise Micro 5.3:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.aarch64",
          "SUSE Linux Enterprise Micro 5.3:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
          "SUSE Linux Enterprise Micro 5.4:kernel-default-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise Micro 5.4:kernel-default-5.14.21-150400.24.170.2.s390x",
          "SUSE Linux Enterprise Micro 5.4:kernel-default-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise Micro 5.4:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.aarch64",
          "SUSE Linux Enterprise Micro 5.4:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-64kb-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-64kb-devel-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-5.14.21-150400.24.170.2.ppc64le",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-5.14.21-150400.24.170.2.s390x",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.aarch64",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.ppc64le",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.170.2.ppc64le",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.170.2.s390x",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-devel-5.14.21-150400.24.170.1.noarch",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-docs-5.14.21-150400.24.170.1.noarch",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-macros-5.14.21-150400.24.170.1.noarch",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.170.2.ppc64le",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.170.2.s390x",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-source-5.14.21-150400.24.170.1.noarch",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.170.1.aarch64",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.170.1.ppc64le",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.170.1.s390x",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.170.1.x86_64",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-zfcpdump-5.14.21-150400.24.170.2.s390x",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.170.2.ppc64le",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.170.2.s390x",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-5.14.21-150400.24.170.2.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-devel-5.14.21-150400.24.170.2.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-devel-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-devel-5.14.21-150400.24.170.1.noarch",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-docs-5.14.21-150400.24.170.1.noarch",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-macros-5.14.21-150400.24.170.1.noarch",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-obs-build-5.14.21-150400.24.170.2.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-obs-build-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-source-5.14.21-150400.24.170.1.noarch",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-syms-5.14.21-150400.24.170.1.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-syms-5.14.21-150400.24.170.1.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.170.2.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.170.2.x86_64",
          "SUSE Manager Proxy 4.3:kernel-default-5.14.21-150400.24.170.2.x86_64",
          "SUSE Manager Proxy 4.3:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
          "SUSE Manager Proxy 4.3:kernel-default-devel-5.14.21-150400.24.170.2.x86_64",
          "SUSE Manager Proxy 4.3:kernel-devel-5.14.21-150400.24.170.1.noarch",
          "SUSE Manager Proxy 4.3:kernel-macros-5.14.21-150400.24.170.1.noarch",
          "SUSE Manager Proxy 4.3:kernel-source-5.14.21-150400.24.170.1.noarch",
          "SUSE Manager Proxy 4.3:kernel-syms-5.14.21-150400.24.170.1.x86_64",
          "SUSE Manager Server 4.3:kernel-default-5.14.21-150400.24.170.2.ppc64le",
          "SUSE Manager Server 4.3:kernel-default-5.14.21-150400.24.170.2.s390x",
          "SUSE Manager Server 4.3:kernel-default-5.14.21-150400.24.170.2.x86_64",
          "SUSE Manager Server 4.3:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.ppc64le",
          "SUSE Manager Server 4.3:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
          "SUSE Manager Server 4.3:kernel-default-devel-5.14.21-150400.24.170.2.ppc64le",
          "SUSE Manager Server 4.3:kernel-default-devel-5.14.21-150400.24.170.2.s390x",
          "SUSE Manager Server 4.3:kernel-default-devel-5.14.21-150400.24.170.2.x86_64",
          "SUSE Manager Server 4.3:kernel-devel-5.14.21-150400.24.170.1.noarch",
          "SUSE Manager Server 4.3:kernel-macros-5.14.21-150400.24.170.1.noarch",
          "SUSE Manager Server 4.3:kernel-source-5.14.21-150400.24.170.1.noarch",
          "SUSE Manager Server 4.3:kernel-syms-5.14.21-150400.24.170.1.ppc64le",
          "SUSE Manager Server 4.3:kernel-syms-5.14.21-150400.24.170.1.s390x",
          "SUSE Manager Server 4.3:kernel-syms-5.14.21-150400.24.170.1.x86_64",
          "SUSE Manager Server 4.3:kernel-zfcpdump-5.14.21-150400.24.170.2.s390x"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2022-50228",
          "url": "https://www.suse.com/security/cve/CVE-2022-50228"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1244854 for CVE-2022-50228",
          "url": "https://bugzilla.suse.com/1244854"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-64kb-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-64kb-devel-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-devel-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-devel-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-devel-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-docs-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-macros-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-obs-build-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-obs-build-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-source-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-syms-5.14.21-150400.24.170.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-syms-5.14.21-150400.24.170.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:reiserfs-kmp-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:reiserfs-kmp-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-64kb-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-64kb-devel-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-devel-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-docs-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-macros-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-source-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.170.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.170.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_170-default-1-150400.9.3.2.ppc64le",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_170-default-1-150400.9.3.2.s390x",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_170-default-1-150400.9.3.2.x86_64",
            "SUSE Linux Enterprise Micro 5.3:kernel-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise Micro 5.3:kernel-default-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise Micro 5.3:kernel-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Micro 5.3:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.aarch64",
            "SUSE Linux Enterprise Micro 5.3:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
            "SUSE Linux Enterprise Micro 5.4:kernel-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise Micro 5.4:kernel-default-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise Micro 5.4:kernel-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Micro 5.4:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.aarch64",
            "SUSE Linux Enterprise Micro 5.4:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-64kb-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-64kb-devel-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.aarch64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.ppc64le",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-devel-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-docs-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-macros-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-source-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.170.1.aarch64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.170.1.ppc64le",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.170.1.s390x",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.170.1.x86_64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-zfcpdump-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-devel-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-devel-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-devel-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-docs-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-macros-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-obs-build-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-obs-build-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-source-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-syms-5.14.21-150400.24.170.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-syms-5.14.21-150400.24.170.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Manager Proxy 4.3:kernel-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Manager Proxy 4.3:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
            "SUSE Manager Proxy 4.3:kernel-default-devel-5.14.21-150400.24.170.2.x86_64",
            "SUSE Manager Proxy 4.3:kernel-devel-5.14.21-150400.24.170.1.noarch",
            "SUSE Manager Proxy 4.3:kernel-macros-5.14.21-150400.24.170.1.noarch",
            "SUSE Manager Proxy 4.3:kernel-source-5.14.21-150400.24.170.1.noarch",
            "SUSE Manager Proxy 4.3:kernel-syms-5.14.21-150400.24.170.1.x86_64",
            "SUSE Manager Server 4.3:kernel-default-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Manager Server 4.3:kernel-default-5.14.21-150400.24.170.2.s390x",
            "SUSE Manager Server 4.3:kernel-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Manager Server 4.3:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.ppc64le",
            "SUSE Manager Server 4.3:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
            "SUSE Manager Server 4.3:kernel-default-devel-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Manager Server 4.3:kernel-default-devel-5.14.21-150400.24.170.2.s390x",
            "SUSE Manager Server 4.3:kernel-default-devel-5.14.21-150400.24.170.2.x86_64",
            "SUSE Manager Server 4.3:kernel-devel-5.14.21-150400.24.170.1.noarch",
            "SUSE Manager Server 4.3:kernel-macros-5.14.21-150400.24.170.1.noarch",
            "SUSE Manager Server 4.3:kernel-source-5.14.21-150400.24.170.1.noarch",
            "SUSE Manager Server 4.3:kernel-syms-5.14.21-150400.24.170.1.ppc64le",
            "SUSE Manager Server 4.3:kernel-syms-5.14.21-150400.24.170.1.s390x",
            "SUSE Manager Server 4.3:kernel-syms-5.14.21-150400.24.170.1.x86_64",
            "SUSE Manager Server 4.3:kernel-zfcpdump-5.14.21-150400.24.170.2.s390x"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 5.5,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
            "version": "3.1"
          },
          "products": [
            "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-64kb-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-64kb-devel-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-devel-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-devel-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-devel-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-docs-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-macros-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-obs-build-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-obs-build-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-source-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-syms-5.14.21-150400.24.170.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-syms-5.14.21-150400.24.170.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:reiserfs-kmp-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:reiserfs-kmp-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-64kb-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-64kb-devel-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-devel-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-docs-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-macros-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-source-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.170.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.170.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_170-default-1-150400.9.3.2.ppc64le",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_170-default-1-150400.9.3.2.s390x",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_170-default-1-150400.9.3.2.x86_64",
            "SUSE Linux Enterprise Micro 5.3:kernel-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise Micro 5.3:kernel-default-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise Micro 5.3:kernel-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Micro 5.3:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.aarch64",
            "SUSE Linux Enterprise Micro 5.3:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
            "SUSE Linux Enterprise Micro 5.4:kernel-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise Micro 5.4:kernel-default-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise Micro 5.4:kernel-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Micro 5.4:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.aarch64",
            "SUSE Linux Enterprise Micro 5.4:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-64kb-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-64kb-devel-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.aarch64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.ppc64le",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-devel-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-docs-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-macros-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-source-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.170.1.aarch64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.170.1.ppc64le",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.170.1.s390x",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.170.1.x86_64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-zfcpdump-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-devel-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-devel-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-devel-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-docs-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-macros-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-obs-build-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-obs-build-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-source-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-syms-5.14.21-150400.24.170.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-syms-5.14.21-150400.24.170.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Manager Proxy 4.3:kernel-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Manager Proxy 4.3:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
            "SUSE Manager Proxy 4.3:kernel-default-devel-5.14.21-150400.24.170.2.x86_64",
            "SUSE Manager Proxy 4.3:kernel-devel-5.14.21-150400.24.170.1.noarch",
            "SUSE Manager Proxy 4.3:kernel-macros-5.14.21-150400.24.170.1.noarch",
            "SUSE Manager Proxy 4.3:kernel-source-5.14.21-150400.24.170.1.noarch",
            "SUSE Manager Proxy 4.3:kernel-syms-5.14.21-150400.24.170.1.x86_64",
            "SUSE Manager Server 4.3:kernel-default-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Manager Server 4.3:kernel-default-5.14.21-150400.24.170.2.s390x",
            "SUSE Manager Server 4.3:kernel-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Manager Server 4.3:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.ppc64le",
            "SUSE Manager Server 4.3:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
            "SUSE Manager Server 4.3:kernel-default-devel-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Manager Server 4.3:kernel-default-devel-5.14.21-150400.24.170.2.s390x",
            "SUSE Manager Server 4.3:kernel-default-devel-5.14.21-150400.24.170.2.x86_64",
            "SUSE Manager Server 4.3:kernel-devel-5.14.21-150400.24.170.1.noarch",
            "SUSE Manager Server 4.3:kernel-macros-5.14.21-150400.24.170.1.noarch",
            "SUSE Manager Server 4.3:kernel-source-5.14.21-150400.24.170.1.noarch",
            "SUSE Manager Server 4.3:kernel-syms-5.14.21-150400.24.170.1.ppc64le",
            "SUSE Manager Server 4.3:kernel-syms-5.14.21-150400.24.170.1.s390x",
            "SUSE Manager Server 4.3:kernel-syms-5.14.21-150400.24.170.1.x86_64",
            "SUSE Manager Server 4.3:kernel-zfcpdump-5.14.21-150400.24.170.2.s390x"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2025-07-28T15:09:33Z",
          "details": "moderate"
        }
      ],
      "title": "CVE-2022-50228"
    },
    {
      "cve": "CVE-2022-50229",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2022-50229"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "In the Linux kernel, the following vulnerability has been resolved:\n\nALSA: bcd2000: Fix a UAF bug on the error path of probing\n\nWhen the driver fails in snd_card_register() at probe time, it will free\nthe \u0027bcd2k-\u003emidi_out_urb\u0027 before killing it, which may cause a UAF bug.\n\nThe following log can reveal it:\n\n[   50.727020] BUG: KASAN: use-after-free in bcd2000_input_complete+0x1f1/0x2e0 [snd_bcd2000]\n[   50.727623] Read of size 8 at addr ffff88810fab0e88 by task swapper/4/0\n[   50.729530] Call Trace:\n[   50.732899]  bcd2000_input_complete+0x1f1/0x2e0 [snd_bcd2000]\n\nFix this by adding usb_kill_urb() before usb_free_urb().",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.170.2.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.170.2.s390x",
          "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.170.2.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.170.2.s390x",
          "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.170.2.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.170.2.s390x",
          "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.170.2.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.170.2.s390x",
          "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-64kb-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-64kb-devel-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-devel-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-devel-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-devel-5.14.21-150400.24.170.1.noarch",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-docs-5.14.21-150400.24.170.1.noarch",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-macros-5.14.21-150400.24.170.1.noarch",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-obs-build-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-obs-build-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-source-5.14.21-150400.24.170.1.noarch",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-syms-5.14.21-150400.24.170.1.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-syms-5.14.21-150400.24.170.1.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:reiserfs-kmp-default-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:reiserfs-kmp-default-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-64kb-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-64kb-devel-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-devel-5.14.21-150400.24.170.1.noarch",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-docs-5.14.21-150400.24.170.1.noarch",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-macros-5.14.21-150400.24.170.1.noarch",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-source-5.14.21-150400.24.170.1.noarch",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.170.1.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.170.1.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.170.2.ppc64le",
          "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.170.2.s390x",
          "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.170.2.ppc64le",
          "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.170.2.s390x",
          "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_170-default-1-150400.9.3.2.ppc64le",
          "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_170-default-1-150400.9.3.2.s390x",
          "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_170-default-1-150400.9.3.2.x86_64",
          "SUSE Linux Enterprise Micro 5.3:kernel-default-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise Micro 5.3:kernel-default-5.14.21-150400.24.170.2.s390x",
          "SUSE Linux Enterprise Micro 5.3:kernel-default-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise Micro 5.3:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.aarch64",
          "SUSE Linux Enterprise Micro 5.3:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
          "SUSE Linux Enterprise Micro 5.4:kernel-default-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise Micro 5.4:kernel-default-5.14.21-150400.24.170.2.s390x",
          "SUSE Linux Enterprise Micro 5.4:kernel-default-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise Micro 5.4:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.aarch64",
          "SUSE Linux Enterprise Micro 5.4:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-64kb-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-64kb-devel-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-5.14.21-150400.24.170.2.ppc64le",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-5.14.21-150400.24.170.2.s390x",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.aarch64",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.ppc64le",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.170.2.ppc64le",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.170.2.s390x",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-devel-5.14.21-150400.24.170.1.noarch",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-docs-5.14.21-150400.24.170.1.noarch",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-macros-5.14.21-150400.24.170.1.noarch",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.170.2.ppc64le",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.170.2.s390x",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-source-5.14.21-150400.24.170.1.noarch",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.170.1.aarch64",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.170.1.ppc64le",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.170.1.s390x",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.170.1.x86_64",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-zfcpdump-5.14.21-150400.24.170.2.s390x",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.170.2.ppc64le",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.170.2.s390x",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-5.14.21-150400.24.170.2.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-devel-5.14.21-150400.24.170.2.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-devel-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-devel-5.14.21-150400.24.170.1.noarch",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-docs-5.14.21-150400.24.170.1.noarch",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-macros-5.14.21-150400.24.170.1.noarch",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-obs-build-5.14.21-150400.24.170.2.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-obs-build-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-source-5.14.21-150400.24.170.1.noarch",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-syms-5.14.21-150400.24.170.1.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-syms-5.14.21-150400.24.170.1.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.170.2.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.170.2.x86_64",
          "SUSE Manager Proxy 4.3:kernel-default-5.14.21-150400.24.170.2.x86_64",
          "SUSE Manager Proxy 4.3:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
          "SUSE Manager Proxy 4.3:kernel-default-devel-5.14.21-150400.24.170.2.x86_64",
          "SUSE Manager Proxy 4.3:kernel-devel-5.14.21-150400.24.170.1.noarch",
          "SUSE Manager Proxy 4.3:kernel-macros-5.14.21-150400.24.170.1.noarch",
          "SUSE Manager Proxy 4.3:kernel-source-5.14.21-150400.24.170.1.noarch",
          "SUSE Manager Proxy 4.3:kernel-syms-5.14.21-150400.24.170.1.x86_64",
          "SUSE Manager Server 4.3:kernel-default-5.14.21-150400.24.170.2.ppc64le",
          "SUSE Manager Server 4.3:kernel-default-5.14.21-150400.24.170.2.s390x",
          "SUSE Manager Server 4.3:kernel-default-5.14.21-150400.24.170.2.x86_64",
          "SUSE Manager Server 4.3:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.ppc64le",
          "SUSE Manager Server 4.3:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
          "SUSE Manager Server 4.3:kernel-default-devel-5.14.21-150400.24.170.2.ppc64le",
          "SUSE Manager Server 4.3:kernel-default-devel-5.14.21-150400.24.170.2.s390x",
          "SUSE Manager Server 4.3:kernel-default-devel-5.14.21-150400.24.170.2.x86_64",
          "SUSE Manager Server 4.3:kernel-devel-5.14.21-150400.24.170.1.noarch",
          "SUSE Manager Server 4.3:kernel-macros-5.14.21-150400.24.170.1.noarch",
          "SUSE Manager Server 4.3:kernel-source-5.14.21-150400.24.170.1.noarch",
          "SUSE Manager Server 4.3:kernel-syms-5.14.21-150400.24.170.1.ppc64le",
          "SUSE Manager Server 4.3:kernel-syms-5.14.21-150400.24.170.1.s390x",
          "SUSE Manager Server 4.3:kernel-syms-5.14.21-150400.24.170.1.x86_64",
          "SUSE Manager Server 4.3:kernel-zfcpdump-5.14.21-150400.24.170.2.s390x"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2022-50229",
          "url": "https://www.suse.com/security/cve/CVE-2022-50229"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1244856 for CVE-2022-50229",
          "url": "https://bugzilla.suse.com/1244856"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-64kb-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-64kb-devel-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-devel-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-devel-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-devel-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-docs-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-macros-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-obs-build-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-obs-build-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-source-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-syms-5.14.21-150400.24.170.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-syms-5.14.21-150400.24.170.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:reiserfs-kmp-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:reiserfs-kmp-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-64kb-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-64kb-devel-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-devel-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-docs-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-macros-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-source-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.170.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.170.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_170-default-1-150400.9.3.2.ppc64le",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_170-default-1-150400.9.3.2.s390x",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_170-default-1-150400.9.3.2.x86_64",
            "SUSE Linux Enterprise Micro 5.3:kernel-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise Micro 5.3:kernel-default-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise Micro 5.3:kernel-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Micro 5.3:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.aarch64",
            "SUSE Linux Enterprise Micro 5.3:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
            "SUSE Linux Enterprise Micro 5.4:kernel-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise Micro 5.4:kernel-default-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise Micro 5.4:kernel-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Micro 5.4:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.aarch64",
            "SUSE Linux Enterprise Micro 5.4:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-64kb-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-64kb-devel-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.aarch64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.ppc64le",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-devel-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-docs-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-macros-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-source-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.170.1.aarch64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.170.1.ppc64le",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.170.1.s390x",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.170.1.x86_64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-zfcpdump-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-devel-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-devel-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-devel-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-docs-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-macros-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-obs-build-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-obs-build-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-source-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-syms-5.14.21-150400.24.170.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-syms-5.14.21-150400.24.170.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Manager Proxy 4.3:kernel-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Manager Proxy 4.3:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
            "SUSE Manager Proxy 4.3:kernel-default-devel-5.14.21-150400.24.170.2.x86_64",
            "SUSE Manager Proxy 4.3:kernel-devel-5.14.21-150400.24.170.1.noarch",
            "SUSE Manager Proxy 4.3:kernel-macros-5.14.21-150400.24.170.1.noarch",
            "SUSE Manager Proxy 4.3:kernel-source-5.14.21-150400.24.170.1.noarch",
            "SUSE Manager Proxy 4.3:kernel-syms-5.14.21-150400.24.170.1.x86_64",
            "SUSE Manager Server 4.3:kernel-default-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Manager Server 4.3:kernel-default-5.14.21-150400.24.170.2.s390x",
            "SUSE Manager Server 4.3:kernel-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Manager Server 4.3:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.ppc64le",
            "SUSE Manager Server 4.3:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
            "SUSE Manager Server 4.3:kernel-default-devel-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Manager Server 4.3:kernel-default-devel-5.14.21-150400.24.170.2.s390x",
            "SUSE Manager Server 4.3:kernel-default-devel-5.14.21-150400.24.170.2.x86_64",
            "SUSE Manager Server 4.3:kernel-devel-5.14.21-150400.24.170.1.noarch",
            "SUSE Manager Server 4.3:kernel-macros-5.14.21-150400.24.170.1.noarch",
            "SUSE Manager Server 4.3:kernel-source-5.14.21-150400.24.170.1.noarch",
            "SUSE Manager Server 4.3:kernel-syms-5.14.21-150400.24.170.1.ppc64le",
            "SUSE Manager Server 4.3:kernel-syms-5.14.21-150400.24.170.1.s390x",
            "SUSE Manager Server 4.3:kernel-syms-5.14.21-150400.24.170.1.x86_64",
            "SUSE Manager Server 4.3:kernel-zfcpdump-5.14.21-150400.24.170.2.s390x"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 5.5,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
            "version": "3.1"
          },
          "products": [
            "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-64kb-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-64kb-devel-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-devel-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-devel-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-devel-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-docs-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-macros-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-obs-build-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-obs-build-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-source-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-syms-5.14.21-150400.24.170.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-syms-5.14.21-150400.24.170.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:reiserfs-kmp-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:reiserfs-kmp-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-64kb-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-64kb-devel-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-devel-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-docs-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-macros-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-source-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.170.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.170.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_170-default-1-150400.9.3.2.ppc64le",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_170-default-1-150400.9.3.2.s390x",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_170-default-1-150400.9.3.2.x86_64",
            "SUSE Linux Enterprise Micro 5.3:kernel-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise Micro 5.3:kernel-default-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise Micro 5.3:kernel-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Micro 5.3:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.aarch64",
            "SUSE Linux Enterprise Micro 5.3:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
            "SUSE Linux Enterprise Micro 5.4:kernel-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise Micro 5.4:kernel-default-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise Micro 5.4:kernel-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Micro 5.4:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.aarch64",
            "SUSE Linux Enterprise Micro 5.4:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-64kb-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-64kb-devel-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.aarch64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.ppc64le",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-devel-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-docs-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-macros-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-source-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.170.1.aarch64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.170.1.ppc64le",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.170.1.s390x",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.170.1.x86_64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-zfcpdump-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-devel-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-devel-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-devel-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-docs-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-macros-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-obs-build-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-obs-build-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-source-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-syms-5.14.21-150400.24.170.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-syms-5.14.21-150400.24.170.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Manager Proxy 4.3:kernel-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Manager Proxy 4.3:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
            "SUSE Manager Proxy 4.3:kernel-default-devel-5.14.21-150400.24.170.2.x86_64",
            "SUSE Manager Proxy 4.3:kernel-devel-5.14.21-150400.24.170.1.noarch",
            "SUSE Manager Proxy 4.3:kernel-macros-5.14.21-150400.24.170.1.noarch",
            "SUSE Manager Proxy 4.3:kernel-source-5.14.21-150400.24.170.1.noarch",
            "SUSE Manager Proxy 4.3:kernel-syms-5.14.21-150400.24.170.1.x86_64",
            "SUSE Manager Server 4.3:kernel-default-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Manager Server 4.3:kernel-default-5.14.21-150400.24.170.2.s390x",
            "SUSE Manager Server 4.3:kernel-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Manager Server 4.3:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.ppc64le",
            "SUSE Manager Server 4.3:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
            "SUSE Manager Server 4.3:kernel-default-devel-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Manager Server 4.3:kernel-default-devel-5.14.21-150400.24.170.2.s390x",
            "SUSE Manager Server 4.3:kernel-default-devel-5.14.21-150400.24.170.2.x86_64",
            "SUSE Manager Server 4.3:kernel-devel-5.14.21-150400.24.170.1.noarch",
            "SUSE Manager Server 4.3:kernel-macros-5.14.21-150400.24.170.1.noarch",
            "SUSE Manager Server 4.3:kernel-source-5.14.21-150400.24.170.1.noarch",
            "SUSE Manager Server 4.3:kernel-syms-5.14.21-150400.24.170.1.ppc64le",
            "SUSE Manager Server 4.3:kernel-syms-5.14.21-150400.24.170.1.s390x",
            "SUSE Manager Server 4.3:kernel-syms-5.14.21-150400.24.170.1.x86_64",
            "SUSE Manager Server 4.3:kernel-zfcpdump-5.14.21-150400.24.170.2.s390x"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2025-07-28T15:09:33Z",
          "details": "moderate"
        }
      ],
      "title": "CVE-2022-50229"
    },
    {
      "cve": "CVE-2022-50231",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2022-50231"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "In the Linux kernel, the following vulnerability has been resolved:\n\ncrypto: arm64/poly1305 - fix a read out-of-bound\n\nA kasan error was reported during fuzzing:\n\nBUG: KASAN: slab-out-of-bounds in neon_poly1305_blocks.constprop.0+0x1b4/0x250 [poly1305_neon]\nRead of size 4 at addr ffff0010e293f010 by task syz-executor.5/1646715\nCPU: 4 PID: 1646715 Comm: syz-executor.5 Kdump: loaded Not tainted 5.10.0.aarch64 #1\nHardware name: Huawei TaiShan 2280 /BC11SPCD, BIOS 1.59 01/31/2019\nCall trace:\n dump_backtrace+0x0/0x394\n show_stack+0x34/0x4c arch/arm64/kernel/stacktrace.c:196\n __dump_stack lib/dump_stack.c:77 [inline]\n dump_stack+0x158/0x1e4 lib/dump_stack.c:118\n print_address_description.constprop.0+0x68/0x204 mm/kasan/report.c:387\n __kasan_report+0xe0/0x140 mm/kasan/report.c:547\n kasan_report+0x44/0xe0 mm/kasan/report.c:564\n check_memory_region_inline mm/kasan/generic.c:187 [inline]\n __asan_load4+0x94/0xd0 mm/kasan/generic.c:252\n neon_poly1305_blocks.constprop.0+0x1b4/0x250 [poly1305_neon]\n neon_poly1305_do_update+0x6c/0x15c [poly1305_neon]\n neon_poly1305_update+0x9c/0x1c4 [poly1305_neon]\n crypto_shash_update crypto/shash.c:131 [inline]\n shash_finup_unaligned+0x84/0x15c crypto/shash.c:179\n crypto_shash_finup+0x8c/0x140 crypto/shash.c:193\n shash_digest_unaligned+0xb8/0xe4 crypto/shash.c:201\n crypto_shash_digest+0xa4/0xfc crypto/shash.c:217\n crypto_shash_tfm_digest+0xb4/0x150 crypto/shash.c:229\n essiv_skcipher_setkey+0x164/0x200 [essiv]\n crypto_skcipher_setkey+0xb0/0x160 crypto/skcipher.c:612\n skcipher_setkey+0x3c/0x50 crypto/algif_skcipher.c:305\n alg_setkey+0x114/0x2a0 crypto/af_alg.c:220\n alg_setsockopt+0x19c/0x210 crypto/af_alg.c:253\n __sys_setsockopt+0x190/0x2e0 net/socket.c:2123\n __do_sys_setsockopt net/socket.c:2134 [inline]\n __se_sys_setsockopt net/socket.c:2131 [inline]\n __arm64_sys_setsockopt+0x78/0x94 net/socket.c:2131\n __invoke_syscall arch/arm64/kernel/syscall.c:36 [inline]\n invoke_syscall+0x64/0x100 arch/arm64/kernel/syscall.c:48\n el0_svc_common.constprop.0+0x220/0x230 arch/arm64/kernel/syscall.c:155\n do_el0_svc+0xb4/0xd4 arch/arm64/kernel/syscall.c:217\n el0_svc+0x24/0x3c arch/arm64/kernel/entry-common.c:353\n el0_sync_handler+0x160/0x164 arch/arm64/kernel/entry-common.c:369\n el0_sync+0x160/0x180 arch/arm64/kernel/entry.S:683\n\nThis error can be reproduced by the following code compiled as ko on a\nsystem with kasan enabled:\n\n#include \u003clinux/module.h\u003e\n#include \u003clinux/crypto.h\u003e\n#include \u003ccrypto/hash.h\u003e\n#include \u003ccrypto/poly1305.h\u003e\n\nchar test_data[] = \"\\x00\\x01\\x02\\x03\\x04\\x05\\x06\\x07\"\n                   \"\\x08\\x09\\x0a\\x0b\\x0c\\x0d\\x0e\\x0f\"\n                   \"\\x10\\x11\\x12\\x13\\x14\\x15\\x16\\x17\"\n                   \"\\x18\\x19\\x1a\\x1b\\x1c\\x1d\\x1e\";\n\nint init(void)\n{\n        struct crypto_shash *tfm = NULL;\n        char *data = NULL, *out = NULL;\n\n        tfm = crypto_alloc_shash(\"poly1305\", 0, 0);\n        data = kmalloc(POLY1305_KEY_SIZE - 1, GFP_KERNEL);\n        out = kmalloc(POLY1305_DIGEST_SIZE, GFP_KERNEL);\n        memcpy(data, test_data, POLY1305_KEY_SIZE - 1);\n        crypto_shash_tfm_digest(tfm, data, POLY1305_KEY_SIZE - 1, out);\n\n        kfree(data);\n        kfree(out);\n        return 0;\n}\n\nvoid deinit(void)\n{\n}\n\nmodule_init(init)\nmodule_exit(deinit)\nMODULE_LICENSE(\"GPL\");\n\nThe root cause of the bug sits in neon_poly1305_blocks. The logic\nneon_poly1305_blocks() performed is that if it was called with both s[]\nand r[] uninitialized, it will first try to initialize them with the\ndata from the first \"block\" that it believed to be 32 bytes in length.\nFirst 16 bytes are used as the key and the next 16 bytes for s[]. This\nwould lead to the aforementioned read out-of-bound. However, after\ncalling poly1305_init_arch(), only 16 bytes were deducted from the input\nand s[] is initialized yet again with the following 16 bytes. The second\ninitialization of s[] is certainly redundent which indicates that the\nfirst initialization should be for r[] only.\n\nThis patch fixes the issue by calling poly1305_init_arm64() instead o\n---truncated---",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.170.2.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.170.2.s390x",
          "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.170.2.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.170.2.s390x",
          "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.170.2.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.170.2.s390x",
          "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.170.2.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.170.2.s390x",
          "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-64kb-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-64kb-devel-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-devel-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-devel-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-devel-5.14.21-150400.24.170.1.noarch",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-docs-5.14.21-150400.24.170.1.noarch",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-macros-5.14.21-150400.24.170.1.noarch",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-obs-build-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-obs-build-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-source-5.14.21-150400.24.170.1.noarch",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-syms-5.14.21-150400.24.170.1.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-syms-5.14.21-150400.24.170.1.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:reiserfs-kmp-default-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:reiserfs-kmp-default-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-64kb-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-64kb-devel-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-devel-5.14.21-150400.24.170.1.noarch",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-docs-5.14.21-150400.24.170.1.noarch",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-macros-5.14.21-150400.24.170.1.noarch",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-source-5.14.21-150400.24.170.1.noarch",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.170.1.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.170.1.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.170.2.ppc64le",
          "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.170.2.s390x",
          "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.170.2.ppc64le",
          "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.170.2.s390x",
          "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_170-default-1-150400.9.3.2.ppc64le",
          "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_170-default-1-150400.9.3.2.s390x",
          "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_170-default-1-150400.9.3.2.x86_64",
          "SUSE Linux Enterprise Micro 5.3:kernel-default-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise Micro 5.3:kernel-default-5.14.21-150400.24.170.2.s390x",
          "SUSE Linux Enterprise Micro 5.3:kernel-default-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise Micro 5.3:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.aarch64",
          "SUSE Linux Enterprise Micro 5.3:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
          "SUSE Linux Enterprise Micro 5.4:kernel-default-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise Micro 5.4:kernel-default-5.14.21-150400.24.170.2.s390x",
          "SUSE Linux Enterprise Micro 5.4:kernel-default-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise Micro 5.4:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.aarch64",
          "SUSE Linux Enterprise Micro 5.4:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-64kb-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-64kb-devel-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-5.14.21-150400.24.170.2.ppc64le",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-5.14.21-150400.24.170.2.s390x",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.aarch64",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.ppc64le",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.170.2.ppc64le",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.170.2.s390x",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-devel-5.14.21-150400.24.170.1.noarch",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-docs-5.14.21-150400.24.170.1.noarch",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-macros-5.14.21-150400.24.170.1.noarch",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.170.2.ppc64le",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.170.2.s390x",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-source-5.14.21-150400.24.170.1.noarch",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.170.1.aarch64",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.170.1.ppc64le",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.170.1.s390x",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.170.1.x86_64",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-zfcpdump-5.14.21-150400.24.170.2.s390x",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.170.2.ppc64le",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.170.2.s390x",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-5.14.21-150400.24.170.2.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-devel-5.14.21-150400.24.170.2.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-devel-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-devel-5.14.21-150400.24.170.1.noarch",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-docs-5.14.21-150400.24.170.1.noarch",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-macros-5.14.21-150400.24.170.1.noarch",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-obs-build-5.14.21-150400.24.170.2.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-obs-build-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-source-5.14.21-150400.24.170.1.noarch",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-syms-5.14.21-150400.24.170.1.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-syms-5.14.21-150400.24.170.1.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.170.2.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.170.2.x86_64",
          "SUSE Manager Proxy 4.3:kernel-default-5.14.21-150400.24.170.2.x86_64",
          "SUSE Manager Proxy 4.3:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
          "SUSE Manager Proxy 4.3:kernel-default-devel-5.14.21-150400.24.170.2.x86_64",
          "SUSE Manager Proxy 4.3:kernel-devel-5.14.21-150400.24.170.1.noarch",
          "SUSE Manager Proxy 4.3:kernel-macros-5.14.21-150400.24.170.1.noarch",
          "SUSE Manager Proxy 4.3:kernel-source-5.14.21-150400.24.170.1.noarch",
          "SUSE Manager Proxy 4.3:kernel-syms-5.14.21-150400.24.170.1.x86_64",
          "SUSE Manager Server 4.3:kernel-default-5.14.21-150400.24.170.2.ppc64le",
          "SUSE Manager Server 4.3:kernel-default-5.14.21-150400.24.170.2.s390x",
          "SUSE Manager Server 4.3:kernel-default-5.14.21-150400.24.170.2.x86_64",
          "SUSE Manager Server 4.3:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.ppc64le",
          "SUSE Manager Server 4.3:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
          "SUSE Manager Server 4.3:kernel-default-devel-5.14.21-150400.24.170.2.ppc64le",
          "SUSE Manager Server 4.3:kernel-default-devel-5.14.21-150400.24.170.2.s390x",
          "SUSE Manager Server 4.3:kernel-default-devel-5.14.21-150400.24.170.2.x86_64",
          "SUSE Manager Server 4.3:kernel-devel-5.14.21-150400.24.170.1.noarch",
          "SUSE Manager Server 4.3:kernel-macros-5.14.21-150400.24.170.1.noarch",
          "SUSE Manager Server 4.3:kernel-source-5.14.21-150400.24.170.1.noarch",
          "SUSE Manager Server 4.3:kernel-syms-5.14.21-150400.24.170.1.ppc64le",
          "SUSE Manager Server 4.3:kernel-syms-5.14.21-150400.24.170.1.s390x",
          "SUSE Manager Server 4.3:kernel-syms-5.14.21-150400.24.170.1.x86_64",
          "SUSE Manager Server 4.3:kernel-zfcpdump-5.14.21-150400.24.170.2.s390x"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2022-50231",
          "url": "https://www.suse.com/security/cve/CVE-2022-50231"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1244853 for CVE-2022-50231",
          "url": "https://bugzilla.suse.com/1244853"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-64kb-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-64kb-devel-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-devel-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-devel-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-devel-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-docs-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-macros-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-obs-build-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-obs-build-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-source-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-syms-5.14.21-150400.24.170.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-syms-5.14.21-150400.24.170.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:reiserfs-kmp-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:reiserfs-kmp-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-64kb-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-64kb-devel-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-devel-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-docs-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-macros-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-source-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.170.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.170.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_170-default-1-150400.9.3.2.ppc64le",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_170-default-1-150400.9.3.2.s390x",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_170-default-1-150400.9.3.2.x86_64",
            "SUSE Linux Enterprise Micro 5.3:kernel-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise Micro 5.3:kernel-default-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise Micro 5.3:kernel-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Micro 5.3:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.aarch64",
            "SUSE Linux Enterprise Micro 5.3:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
            "SUSE Linux Enterprise Micro 5.4:kernel-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise Micro 5.4:kernel-default-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise Micro 5.4:kernel-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Micro 5.4:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.aarch64",
            "SUSE Linux Enterprise Micro 5.4:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-64kb-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-64kb-devel-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.aarch64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.ppc64le",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-devel-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-docs-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-macros-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-source-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.170.1.aarch64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.170.1.ppc64le",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.170.1.s390x",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.170.1.x86_64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-zfcpdump-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-devel-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-devel-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-devel-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-docs-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-macros-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-obs-build-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-obs-build-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-source-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-syms-5.14.21-150400.24.170.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-syms-5.14.21-150400.24.170.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Manager Proxy 4.3:kernel-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Manager Proxy 4.3:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
            "SUSE Manager Proxy 4.3:kernel-default-devel-5.14.21-150400.24.170.2.x86_64",
            "SUSE Manager Proxy 4.3:kernel-devel-5.14.21-150400.24.170.1.noarch",
            "SUSE Manager Proxy 4.3:kernel-macros-5.14.21-150400.24.170.1.noarch",
            "SUSE Manager Proxy 4.3:kernel-source-5.14.21-150400.24.170.1.noarch",
            "SUSE Manager Proxy 4.3:kernel-syms-5.14.21-150400.24.170.1.x86_64",
            "SUSE Manager Server 4.3:kernel-default-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Manager Server 4.3:kernel-default-5.14.21-150400.24.170.2.s390x",
            "SUSE Manager Server 4.3:kernel-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Manager Server 4.3:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.ppc64le",
            "SUSE Manager Server 4.3:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
            "SUSE Manager Server 4.3:kernel-default-devel-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Manager Server 4.3:kernel-default-devel-5.14.21-150400.24.170.2.s390x",
            "SUSE Manager Server 4.3:kernel-default-devel-5.14.21-150400.24.170.2.x86_64",
            "SUSE Manager Server 4.3:kernel-devel-5.14.21-150400.24.170.1.noarch",
            "SUSE Manager Server 4.3:kernel-macros-5.14.21-150400.24.170.1.noarch",
            "SUSE Manager Server 4.3:kernel-source-5.14.21-150400.24.170.1.noarch",
            "SUSE Manager Server 4.3:kernel-syms-5.14.21-150400.24.170.1.ppc64le",
            "SUSE Manager Server 4.3:kernel-syms-5.14.21-150400.24.170.1.s390x",
            "SUSE Manager Server 4.3:kernel-syms-5.14.21-150400.24.170.1.x86_64",
            "SUSE Manager Server 4.3:kernel-zfcpdump-5.14.21-150400.24.170.2.s390x"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 5.5,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
            "version": "3.1"
          },
          "products": [
            "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-64kb-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-64kb-devel-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-devel-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-devel-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-devel-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-docs-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-macros-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-obs-build-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-obs-build-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-source-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-syms-5.14.21-150400.24.170.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-syms-5.14.21-150400.24.170.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:reiserfs-kmp-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:reiserfs-kmp-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-64kb-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-64kb-devel-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-devel-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-docs-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-macros-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-source-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.170.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.170.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_170-default-1-150400.9.3.2.ppc64le",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_170-default-1-150400.9.3.2.s390x",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_170-default-1-150400.9.3.2.x86_64",
            "SUSE Linux Enterprise Micro 5.3:kernel-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise Micro 5.3:kernel-default-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise Micro 5.3:kernel-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Micro 5.3:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.aarch64",
            "SUSE Linux Enterprise Micro 5.3:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
            "SUSE Linux Enterprise Micro 5.4:kernel-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise Micro 5.4:kernel-default-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise Micro 5.4:kernel-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Micro 5.4:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.aarch64",
            "SUSE Linux Enterprise Micro 5.4:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-64kb-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-64kb-devel-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.aarch64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.ppc64le",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-devel-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-docs-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-macros-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-source-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.170.1.aarch64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.170.1.ppc64le",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.170.1.s390x",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.170.1.x86_64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-zfcpdump-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-devel-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-devel-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-devel-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-docs-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-macros-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-obs-build-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-obs-build-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-source-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-syms-5.14.21-150400.24.170.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-syms-5.14.21-150400.24.170.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Manager Proxy 4.3:kernel-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Manager Proxy 4.3:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
            "SUSE Manager Proxy 4.3:kernel-default-devel-5.14.21-150400.24.170.2.x86_64",
            "SUSE Manager Proxy 4.3:kernel-devel-5.14.21-150400.24.170.1.noarch",
            "SUSE Manager Proxy 4.3:kernel-macros-5.14.21-150400.24.170.1.noarch",
            "SUSE Manager Proxy 4.3:kernel-source-5.14.21-150400.24.170.1.noarch",
            "SUSE Manager Proxy 4.3:kernel-syms-5.14.21-150400.24.170.1.x86_64",
            "SUSE Manager Server 4.3:kernel-default-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Manager Server 4.3:kernel-default-5.14.21-150400.24.170.2.s390x",
            "SUSE Manager Server 4.3:kernel-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Manager Server 4.3:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.ppc64le",
            "SUSE Manager Server 4.3:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
            "SUSE Manager Server 4.3:kernel-default-devel-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Manager Server 4.3:kernel-default-devel-5.14.21-150400.24.170.2.s390x",
            "SUSE Manager Server 4.3:kernel-default-devel-5.14.21-150400.24.170.2.x86_64",
            "SUSE Manager Server 4.3:kernel-devel-5.14.21-150400.24.170.1.noarch",
            "SUSE Manager Server 4.3:kernel-macros-5.14.21-150400.24.170.1.noarch",
            "SUSE Manager Server 4.3:kernel-source-5.14.21-150400.24.170.1.noarch",
            "SUSE Manager Server 4.3:kernel-syms-5.14.21-150400.24.170.1.ppc64le",
            "SUSE Manager Server 4.3:kernel-syms-5.14.21-150400.24.170.1.s390x",
            "SUSE Manager Server 4.3:kernel-syms-5.14.21-150400.24.170.1.x86_64",
            "SUSE Manager Server 4.3:kernel-zfcpdump-5.14.21-150400.24.170.2.s390x"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2025-07-28T15:09:33Z",
          "details": "moderate"
        }
      ],
      "title": "CVE-2022-50231"
    },
    {
      "cve": "CVE-2023-3111",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2023-3111"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "A use after free vulnerability was found in prepare_to_relocate in fs/btrfs/relocation.c in btrfs in the Linux Kernel. This possible flaw can be triggered by calling btrfs_ioctl_balance() before calling btrfs_ioctl_defrag().",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.170.2.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.170.2.s390x",
          "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.170.2.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.170.2.s390x",
          "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.170.2.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.170.2.s390x",
          "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.170.2.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.170.2.s390x",
          "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-64kb-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-64kb-devel-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-devel-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-devel-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-devel-5.14.21-150400.24.170.1.noarch",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-docs-5.14.21-150400.24.170.1.noarch",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-macros-5.14.21-150400.24.170.1.noarch",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-obs-build-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-obs-build-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-source-5.14.21-150400.24.170.1.noarch",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-syms-5.14.21-150400.24.170.1.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-syms-5.14.21-150400.24.170.1.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:reiserfs-kmp-default-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:reiserfs-kmp-default-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-64kb-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-64kb-devel-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-devel-5.14.21-150400.24.170.1.noarch",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-docs-5.14.21-150400.24.170.1.noarch",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-macros-5.14.21-150400.24.170.1.noarch",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-source-5.14.21-150400.24.170.1.noarch",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.170.1.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.170.1.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.170.2.ppc64le",
          "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.170.2.s390x",
          "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.170.2.ppc64le",
          "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.170.2.s390x",
          "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_170-default-1-150400.9.3.2.ppc64le",
          "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_170-default-1-150400.9.3.2.s390x",
          "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_170-default-1-150400.9.3.2.x86_64",
          "SUSE Linux Enterprise Micro 5.3:kernel-default-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise Micro 5.3:kernel-default-5.14.21-150400.24.170.2.s390x",
          "SUSE Linux Enterprise Micro 5.3:kernel-default-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise Micro 5.3:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.aarch64",
          "SUSE Linux Enterprise Micro 5.3:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
          "SUSE Linux Enterprise Micro 5.4:kernel-default-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise Micro 5.4:kernel-default-5.14.21-150400.24.170.2.s390x",
          "SUSE Linux Enterprise Micro 5.4:kernel-default-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise Micro 5.4:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.aarch64",
          "SUSE Linux Enterprise Micro 5.4:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-64kb-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-64kb-devel-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-5.14.21-150400.24.170.2.ppc64le",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-5.14.21-150400.24.170.2.s390x",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.aarch64",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.ppc64le",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.170.2.ppc64le",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.170.2.s390x",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-devel-5.14.21-150400.24.170.1.noarch",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-docs-5.14.21-150400.24.170.1.noarch",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-macros-5.14.21-150400.24.170.1.noarch",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.170.2.ppc64le",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.170.2.s390x",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-source-5.14.21-150400.24.170.1.noarch",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.170.1.aarch64",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.170.1.ppc64le",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.170.1.s390x",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.170.1.x86_64",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-zfcpdump-5.14.21-150400.24.170.2.s390x",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.170.2.ppc64le",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.170.2.s390x",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-5.14.21-150400.24.170.2.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-devel-5.14.21-150400.24.170.2.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-devel-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-devel-5.14.21-150400.24.170.1.noarch",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-docs-5.14.21-150400.24.170.1.noarch",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-macros-5.14.21-150400.24.170.1.noarch",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-obs-build-5.14.21-150400.24.170.2.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-obs-build-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-source-5.14.21-150400.24.170.1.noarch",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-syms-5.14.21-150400.24.170.1.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-syms-5.14.21-150400.24.170.1.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.170.2.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.170.2.x86_64",
          "SUSE Manager Proxy 4.3:kernel-default-5.14.21-150400.24.170.2.x86_64",
          "SUSE Manager Proxy 4.3:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
          "SUSE Manager Proxy 4.3:kernel-default-devel-5.14.21-150400.24.170.2.x86_64",
          "SUSE Manager Proxy 4.3:kernel-devel-5.14.21-150400.24.170.1.noarch",
          "SUSE Manager Proxy 4.3:kernel-macros-5.14.21-150400.24.170.1.noarch",
          "SUSE Manager Proxy 4.3:kernel-source-5.14.21-150400.24.170.1.noarch",
          "SUSE Manager Proxy 4.3:kernel-syms-5.14.21-150400.24.170.1.x86_64",
          "SUSE Manager Server 4.3:kernel-default-5.14.21-150400.24.170.2.ppc64le",
          "SUSE Manager Server 4.3:kernel-default-5.14.21-150400.24.170.2.s390x",
          "SUSE Manager Server 4.3:kernel-default-5.14.21-150400.24.170.2.x86_64",
          "SUSE Manager Server 4.3:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.ppc64le",
          "SUSE Manager Server 4.3:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
          "SUSE Manager Server 4.3:kernel-default-devel-5.14.21-150400.24.170.2.ppc64le",
          "SUSE Manager Server 4.3:kernel-default-devel-5.14.21-150400.24.170.2.s390x",
          "SUSE Manager Server 4.3:kernel-default-devel-5.14.21-150400.24.170.2.x86_64",
          "SUSE Manager Server 4.3:kernel-devel-5.14.21-150400.24.170.1.noarch",
          "SUSE Manager Server 4.3:kernel-macros-5.14.21-150400.24.170.1.noarch",
          "SUSE Manager Server 4.3:kernel-source-5.14.21-150400.24.170.1.noarch",
          "SUSE Manager Server 4.3:kernel-syms-5.14.21-150400.24.170.1.ppc64le",
          "SUSE Manager Server 4.3:kernel-syms-5.14.21-150400.24.170.1.s390x",
          "SUSE Manager Server 4.3:kernel-syms-5.14.21-150400.24.170.1.x86_64",
          "SUSE Manager Server 4.3:kernel-zfcpdump-5.14.21-150400.24.170.2.s390x"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2023-3111",
          "url": "https://www.suse.com/security/cve/CVE-2023-3111"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1212051 for CVE-2023-3111",
          "url": "https://bugzilla.suse.com/1212051"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1220015 for CVE-2023-3111",
          "url": "https://bugzilla.suse.com/1220015"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-64kb-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-64kb-devel-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-devel-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-devel-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-devel-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-docs-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-macros-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-obs-build-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-obs-build-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-source-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-syms-5.14.21-150400.24.170.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-syms-5.14.21-150400.24.170.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:reiserfs-kmp-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:reiserfs-kmp-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-64kb-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-64kb-devel-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-devel-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-docs-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-macros-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-source-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.170.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.170.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_170-default-1-150400.9.3.2.ppc64le",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_170-default-1-150400.9.3.2.s390x",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_170-default-1-150400.9.3.2.x86_64",
            "SUSE Linux Enterprise Micro 5.3:kernel-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise Micro 5.3:kernel-default-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise Micro 5.3:kernel-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Micro 5.3:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.aarch64",
            "SUSE Linux Enterprise Micro 5.3:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
            "SUSE Linux Enterprise Micro 5.4:kernel-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise Micro 5.4:kernel-default-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise Micro 5.4:kernel-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Micro 5.4:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.aarch64",
            "SUSE Linux Enterprise Micro 5.4:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-64kb-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-64kb-devel-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.aarch64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.ppc64le",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-devel-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-docs-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-macros-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-source-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.170.1.aarch64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.170.1.ppc64le",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.170.1.s390x",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.170.1.x86_64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-zfcpdump-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-devel-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-devel-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-devel-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-docs-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-macros-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-obs-build-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-obs-build-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-source-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-syms-5.14.21-150400.24.170.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-syms-5.14.21-150400.24.170.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Manager Proxy 4.3:kernel-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Manager Proxy 4.3:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
            "SUSE Manager Proxy 4.3:kernel-default-devel-5.14.21-150400.24.170.2.x86_64",
            "SUSE Manager Proxy 4.3:kernel-devel-5.14.21-150400.24.170.1.noarch",
            "SUSE Manager Proxy 4.3:kernel-macros-5.14.21-150400.24.170.1.noarch",
            "SUSE Manager Proxy 4.3:kernel-source-5.14.21-150400.24.170.1.noarch",
            "SUSE Manager Proxy 4.3:kernel-syms-5.14.21-150400.24.170.1.x86_64",
            "SUSE Manager Server 4.3:kernel-default-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Manager Server 4.3:kernel-default-5.14.21-150400.24.170.2.s390x",
            "SUSE Manager Server 4.3:kernel-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Manager Server 4.3:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.ppc64le",
            "SUSE Manager Server 4.3:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
            "SUSE Manager Server 4.3:kernel-default-devel-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Manager Server 4.3:kernel-default-devel-5.14.21-150400.24.170.2.s390x",
            "SUSE Manager Server 4.3:kernel-default-devel-5.14.21-150400.24.170.2.x86_64",
            "SUSE Manager Server 4.3:kernel-devel-5.14.21-150400.24.170.1.noarch",
            "SUSE Manager Server 4.3:kernel-macros-5.14.21-150400.24.170.1.noarch",
            "SUSE Manager Server 4.3:kernel-source-5.14.21-150400.24.170.1.noarch",
            "SUSE Manager Server 4.3:kernel-syms-5.14.21-150400.24.170.1.ppc64le",
            "SUSE Manager Server 4.3:kernel-syms-5.14.21-150400.24.170.1.s390x",
            "SUSE Manager Server 4.3:kernel-syms-5.14.21-150400.24.170.1.x86_64",
            "SUSE Manager Server 4.3:kernel-zfcpdump-5.14.21-150400.24.170.2.s390x"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 6.7,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H",
            "version": "3.1"
          },
          "products": [
            "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-64kb-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-64kb-devel-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-devel-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-devel-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-devel-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-docs-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-macros-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-obs-build-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-obs-build-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-source-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-syms-5.14.21-150400.24.170.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-syms-5.14.21-150400.24.170.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:reiserfs-kmp-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:reiserfs-kmp-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-64kb-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-64kb-devel-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-devel-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-docs-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-macros-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-source-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.170.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.170.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_170-default-1-150400.9.3.2.ppc64le",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_170-default-1-150400.9.3.2.s390x",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_170-default-1-150400.9.3.2.x86_64",
            "SUSE Linux Enterprise Micro 5.3:kernel-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise Micro 5.3:kernel-default-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise Micro 5.3:kernel-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Micro 5.3:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.aarch64",
            "SUSE Linux Enterprise Micro 5.3:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
            "SUSE Linux Enterprise Micro 5.4:kernel-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise Micro 5.4:kernel-default-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise Micro 5.4:kernel-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Micro 5.4:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.aarch64",
            "SUSE Linux Enterprise Micro 5.4:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-64kb-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-64kb-devel-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.aarch64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.ppc64le",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-devel-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-docs-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-macros-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-source-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.170.1.aarch64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.170.1.ppc64le",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.170.1.s390x",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.170.1.x86_64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-zfcpdump-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-devel-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-devel-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-devel-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-docs-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-macros-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-obs-build-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-obs-build-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-source-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-syms-5.14.21-150400.24.170.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-syms-5.14.21-150400.24.170.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Manager Proxy 4.3:kernel-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Manager Proxy 4.3:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
            "SUSE Manager Proxy 4.3:kernel-default-devel-5.14.21-150400.24.170.2.x86_64",
            "SUSE Manager Proxy 4.3:kernel-devel-5.14.21-150400.24.170.1.noarch",
            "SUSE Manager Proxy 4.3:kernel-macros-5.14.21-150400.24.170.1.noarch",
            "SUSE Manager Proxy 4.3:kernel-source-5.14.21-150400.24.170.1.noarch",
            "SUSE Manager Proxy 4.3:kernel-syms-5.14.21-150400.24.170.1.x86_64",
            "SUSE Manager Server 4.3:kernel-default-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Manager Server 4.3:kernel-default-5.14.21-150400.24.170.2.s390x",
            "SUSE Manager Server 4.3:kernel-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Manager Server 4.3:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.ppc64le",
            "SUSE Manager Server 4.3:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
            "SUSE Manager Server 4.3:kernel-default-devel-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Manager Server 4.3:kernel-default-devel-5.14.21-150400.24.170.2.s390x",
            "SUSE Manager Server 4.3:kernel-default-devel-5.14.21-150400.24.170.2.x86_64",
            "SUSE Manager Server 4.3:kernel-devel-5.14.21-150400.24.170.1.noarch",
            "SUSE Manager Server 4.3:kernel-macros-5.14.21-150400.24.170.1.noarch",
            "SUSE Manager Server 4.3:kernel-source-5.14.21-150400.24.170.1.noarch",
            "SUSE Manager Server 4.3:kernel-syms-5.14.21-150400.24.170.1.ppc64le",
            "SUSE Manager Server 4.3:kernel-syms-5.14.21-150400.24.170.1.s390x",
            "SUSE Manager Server 4.3:kernel-syms-5.14.21-150400.24.170.1.x86_64",
            "SUSE Manager Server 4.3:kernel-zfcpdump-5.14.21-150400.24.170.2.s390x"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2025-07-28T15:09:33Z",
          "details": "moderate"
        }
      ],
      "title": "CVE-2023-3111"
    },
    {
      "cve": "CVE-2023-52924",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2023-52924"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "In the Linux kernel, the following vulnerability has been resolved:\n\nnetfilter: nf_tables: don\u0027t skip expired elements during walk\n\nThere is an asymmetry between commit/abort and preparation phase if the\nfollowing conditions are met:\n\n1. set is a verdict map (\"1.2.3.4 : jump foo\")\n2. timeouts are enabled\n\nIn this case, following sequence is problematic:\n\n1. element E in set S refers to chain C\n2. userspace requests removal of set S\n3. kernel does a set walk to decrement chain-\u003euse count for all elements\n   from preparation phase\n4. kernel does another set walk to remove elements from the commit phase\n   (or another walk to do a chain-\u003euse increment for all elements from\n    abort phase)\n\nIf E has already expired in 1), it will be ignored during list walk, so its use count\nwon\u0027t have been changed.\n\nThen, when set is culled, -\u003edestroy callback will zap the element via\nnf_tables_set_elem_destroy(), but this function is only safe for\nelements that have been deactivated earlier from the preparation phase:\nlack of earlier deactivate removes the element but leaks the chain use\ncount, which results in a WARN splat when the chain gets removed later,\nplus a leak of the nft_chain structure.\n\nUpdate pipapo_get() not to skip expired elements, otherwise flush\ncommand reports bogus ENOENT errors.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.170.2.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.170.2.s390x",
          "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.170.2.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.170.2.s390x",
          "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.170.2.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.170.2.s390x",
          "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.170.2.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.170.2.s390x",
          "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-64kb-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-64kb-devel-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-devel-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-devel-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-devel-5.14.21-150400.24.170.1.noarch",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-docs-5.14.21-150400.24.170.1.noarch",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-macros-5.14.21-150400.24.170.1.noarch",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-obs-build-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-obs-build-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-source-5.14.21-150400.24.170.1.noarch",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-syms-5.14.21-150400.24.170.1.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-syms-5.14.21-150400.24.170.1.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:reiserfs-kmp-default-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:reiserfs-kmp-default-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-64kb-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-64kb-devel-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-devel-5.14.21-150400.24.170.1.noarch",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-docs-5.14.21-150400.24.170.1.noarch",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-macros-5.14.21-150400.24.170.1.noarch",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-source-5.14.21-150400.24.170.1.noarch",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.170.1.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.170.1.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.170.2.ppc64le",
          "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.170.2.s390x",
          "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.170.2.ppc64le",
          "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.170.2.s390x",
          "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_170-default-1-150400.9.3.2.ppc64le",
          "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_170-default-1-150400.9.3.2.s390x",
          "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_170-default-1-150400.9.3.2.x86_64",
          "SUSE Linux Enterprise Micro 5.3:kernel-default-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise Micro 5.3:kernel-default-5.14.21-150400.24.170.2.s390x",
          "SUSE Linux Enterprise Micro 5.3:kernel-default-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise Micro 5.3:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.aarch64",
          "SUSE Linux Enterprise Micro 5.3:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
          "SUSE Linux Enterprise Micro 5.4:kernel-default-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise Micro 5.4:kernel-default-5.14.21-150400.24.170.2.s390x",
          "SUSE Linux Enterprise Micro 5.4:kernel-default-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise Micro 5.4:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.aarch64",
          "SUSE Linux Enterprise Micro 5.4:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-64kb-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-64kb-devel-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-5.14.21-150400.24.170.2.ppc64le",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-5.14.21-150400.24.170.2.s390x",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.aarch64",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.ppc64le",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.170.2.ppc64le",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.170.2.s390x",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-devel-5.14.21-150400.24.170.1.noarch",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-docs-5.14.21-150400.24.170.1.noarch",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-macros-5.14.21-150400.24.170.1.noarch",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.170.2.ppc64le",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.170.2.s390x",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-source-5.14.21-150400.24.170.1.noarch",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.170.1.aarch64",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.170.1.ppc64le",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.170.1.s390x",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.170.1.x86_64",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-zfcpdump-5.14.21-150400.24.170.2.s390x",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.170.2.ppc64le",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.170.2.s390x",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-5.14.21-150400.24.170.2.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-devel-5.14.21-150400.24.170.2.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-devel-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-devel-5.14.21-150400.24.170.1.noarch",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-docs-5.14.21-150400.24.170.1.noarch",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-macros-5.14.21-150400.24.170.1.noarch",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-obs-build-5.14.21-150400.24.170.2.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-obs-build-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-source-5.14.21-150400.24.170.1.noarch",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-syms-5.14.21-150400.24.170.1.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-syms-5.14.21-150400.24.170.1.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.170.2.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.170.2.x86_64",
          "SUSE Manager Proxy 4.3:kernel-default-5.14.21-150400.24.170.2.x86_64",
          "SUSE Manager Proxy 4.3:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
          "SUSE Manager Proxy 4.3:kernel-default-devel-5.14.21-150400.24.170.2.x86_64",
          "SUSE Manager Proxy 4.3:kernel-devel-5.14.21-150400.24.170.1.noarch",
          "SUSE Manager Proxy 4.3:kernel-macros-5.14.21-150400.24.170.1.noarch",
          "SUSE Manager Proxy 4.3:kernel-source-5.14.21-150400.24.170.1.noarch",
          "SUSE Manager Proxy 4.3:kernel-syms-5.14.21-150400.24.170.1.x86_64",
          "SUSE Manager Server 4.3:kernel-default-5.14.21-150400.24.170.2.ppc64le",
          "SUSE Manager Server 4.3:kernel-default-5.14.21-150400.24.170.2.s390x",
          "SUSE Manager Server 4.3:kernel-default-5.14.21-150400.24.170.2.x86_64",
          "SUSE Manager Server 4.3:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.ppc64le",
          "SUSE Manager Server 4.3:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
          "SUSE Manager Server 4.3:kernel-default-devel-5.14.21-150400.24.170.2.ppc64le",
          "SUSE Manager Server 4.3:kernel-default-devel-5.14.21-150400.24.170.2.s390x",
          "SUSE Manager Server 4.3:kernel-default-devel-5.14.21-150400.24.170.2.x86_64",
          "SUSE Manager Server 4.3:kernel-devel-5.14.21-150400.24.170.1.noarch",
          "SUSE Manager Server 4.3:kernel-macros-5.14.21-150400.24.170.1.noarch",
          "SUSE Manager Server 4.3:kernel-source-5.14.21-150400.24.170.1.noarch",
          "SUSE Manager Server 4.3:kernel-syms-5.14.21-150400.24.170.1.ppc64le",
          "SUSE Manager Server 4.3:kernel-syms-5.14.21-150400.24.170.1.s390x",
          "SUSE Manager Server 4.3:kernel-syms-5.14.21-150400.24.170.1.x86_64",
          "SUSE Manager Server 4.3:kernel-zfcpdump-5.14.21-150400.24.170.2.s390x"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2023-52924",
          "url": "https://www.suse.com/security/cve/CVE-2023-52924"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1236821 for CVE-2023-52924",
          "url": "https://bugzilla.suse.com/1236821"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1244630 for CVE-2023-52924",
          "url": "https://bugzilla.suse.com/1244630"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-64kb-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-64kb-devel-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-devel-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-devel-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-devel-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-docs-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-macros-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-obs-build-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-obs-build-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-source-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-syms-5.14.21-150400.24.170.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-syms-5.14.21-150400.24.170.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:reiserfs-kmp-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:reiserfs-kmp-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-64kb-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-64kb-devel-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-devel-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-docs-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-macros-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-source-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.170.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.170.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_170-default-1-150400.9.3.2.ppc64le",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_170-default-1-150400.9.3.2.s390x",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_170-default-1-150400.9.3.2.x86_64",
            "SUSE Linux Enterprise Micro 5.3:kernel-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise Micro 5.3:kernel-default-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise Micro 5.3:kernel-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Micro 5.3:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.aarch64",
            "SUSE Linux Enterprise Micro 5.3:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
            "SUSE Linux Enterprise Micro 5.4:kernel-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise Micro 5.4:kernel-default-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise Micro 5.4:kernel-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Micro 5.4:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.aarch64",
            "SUSE Linux Enterprise Micro 5.4:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-64kb-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-64kb-devel-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.aarch64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.ppc64le",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-devel-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-docs-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-macros-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-source-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.170.1.aarch64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.170.1.ppc64le",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.170.1.s390x",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.170.1.x86_64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-zfcpdump-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-devel-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-devel-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-devel-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-docs-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-macros-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-obs-build-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-obs-build-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-source-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-syms-5.14.21-150400.24.170.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-syms-5.14.21-150400.24.170.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Manager Proxy 4.3:kernel-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Manager Proxy 4.3:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
            "SUSE Manager Proxy 4.3:kernel-default-devel-5.14.21-150400.24.170.2.x86_64",
            "SUSE Manager Proxy 4.3:kernel-devel-5.14.21-150400.24.170.1.noarch",
            "SUSE Manager Proxy 4.3:kernel-macros-5.14.21-150400.24.170.1.noarch",
            "SUSE Manager Proxy 4.3:kernel-source-5.14.21-150400.24.170.1.noarch",
            "SUSE Manager Proxy 4.3:kernel-syms-5.14.21-150400.24.170.1.x86_64",
            "SUSE Manager Server 4.3:kernel-default-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Manager Server 4.3:kernel-default-5.14.21-150400.24.170.2.s390x",
            "SUSE Manager Server 4.3:kernel-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Manager Server 4.3:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.ppc64le",
            "SUSE Manager Server 4.3:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
            "SUSE Manager Server 4.3:kernel-default-devel-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Manager Server 4.3:kernel-default-devel-5.14.21-150400.24.170.2.s390x",
            "SUSE Manager Server 4.3:kernel-default-devel-5.14.21-150400.24.170.2.x86_64",
            "SUSE Manager Server 4.3:kernel-devel-5.14.21-150400.24.170.1.noarch",
            "SUSE Manager Server 4.3:kernel-macros-5.14.21-150400.24.170.1.noarch",
            "SUSE Manager Server 4.3:kernel-source-5.14.21-150400.24.170.1.noarch",
            "SUSE Manager Server 4.3:kernel-syms-5.14.21-150400.24.170.1.ppc64le",
            "SUSE Manager Server 4.3:kernel-syms-5.14.21-150400.24.170.1.s390x",
            "SUSE Manager Server 4.3:kernel-syms-5.14.21-150400.24.170.1.x86_64",
            "SUSE Manager Server 4.3:kernel-zfcpdump-5.14.21-150400.24.170.2.s390x"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 7.8,
            "baseSeverity": "HIGH",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
            "version": "3.1"
          },
          "products": [
            "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-64kb-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-64kb-devel-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-devel-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-devel-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-devel-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-docs-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-macros-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-obs-build-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-obs-build-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-source-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-syms-5.14.21-150400.24.170.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-syms-5.14.21-150400.24.170.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:reiserfs-kmp-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:reiserfs-kmp-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-64kb-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-64kb-devel-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-devel-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-docs-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-macros-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-source-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.170.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.170.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_170-default-1-150400.9.3.2.ppc64le",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_170-default-1-150400.9.3.2.s390x",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_170-default-1-150400.9.3.2.x86_64",
            "SUSE Linux Enterprise Micro 5.3:kernel-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise Micro 5.3:kernel-default-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise Micro 5.3:kernel-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Micro 5.3:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.aarch64",
            "SUSE Linux Enterprise Micro 5.3:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
            "SUSE Linux Enterprise Micro 5.4:kernel-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise Micro 5.4:kernel-default-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise Micro 5.4:kernel-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Micro 5.4:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.aarch64",
            "SUSE Linux Enterprise Micro 5.4:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-64kb-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-64kb-devel-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.aarch64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.ppc64le",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-devel-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-docs-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-macros-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-source-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.170.1.aarch64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.170.1.ppc64le",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.170.1.s390x",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.170.1.x86_64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-zfcpdump-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-devel-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-devel-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-devel-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-docs-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-macros-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-obs-build-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-obs-build-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-source-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-syms-5.14.21-150400.24.170.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-syms-5.14.21-150400.24.170.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Manager Proxy 4.3:kernel-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Manager Proxy 4.3:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
            "SUSE Manager Proxy 4.3:kernel-default-devel-5.14.21-150400.24.170.2.x86_64",
            "SUSE Manager Proxy 4.3:kernel-devel-5.14.21-150400.24.170.1.noarch",
            "SUSE Manager Proxy 4.3:kernel-macros-5.14.21-150400.24.170.1.noarch",
            "SUSE Manager Proxy 4.3:kernel-source-5.14.21-150400.24.170.1.noarch",
            "SUSE Manager Proxy 4.3:kernel-syms-5.14.21-150400.24.170.1.x86_64",
            "SUSE Manager Server 4.3:kernel-default-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Manager Server 4.3:kernel-default-5.14.21-150400.24.170.2.s390x",
            "SUSE Manager Server 4.3:kernel-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Manager Server 4.3:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.ppc64le",
            "SUSE Manager Server 4.3:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
            "SUSE Manager Server 4.3:kernel-default-devel-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Manager Server 4.3:kernel-default-devel-5.14.21-150400.24.170.2.s390x",
            "SUSE Manager Server 4.3:kernel-default-devel-5.14.21-150400.24.170.2.x86_64",
            "SUSE Manager Server 4.3:kernel-devel-5.14.21-150400.24.170.1.noarch",
            "SUSE Manager Server 4.3:kernel-macros-5.14.21-150400.24.170.1.noarch",
            "SUSE Manager Server 4.3:kernel-source-5.14.21-150400.24.170.1.noarch",
            "SUSE Manager Server 4.3:kernel-syms-5.14.21-150400.24.170.1.ppc64le",
            "SUSE Manager Server 4.3:kernel-syms-5.14.21-150400.24.170.1.s390x",
            "SUSE Manager Server 4.3:kernel-syms-5.14.21-150400.24.170.1.x86_64",
            "SUSE Manager Server 4.3:kernel-zfcpdump-5.14.21-150400.24.170.2.s390x"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2025-07-28T15:09:33Z",
          "details": "important"
        }
      ],
      "title": "CVE-2023-52924"
    },
    {
      "cve": "CVE-2023-52925",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2023-52925"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "In the Linux kernel, the following vulnerability has been resolved:\n\nnetfilter: nf_tables: don\u0027t fail inserts if duplicate has expired\n\nnftables selftests fail:\nrun-tests.sh testcases/sets/0044interval_overlap_0\nExpected: 0-2 . 0-3, got:\nW: [FAILED]     ./testcases/sets/0044interval_overlap_0: got 1\n\nInsertion must ignore duplicate but expired entries.\n\nMoreover, there is a strange asymmetry in nft_pipapo_activate:\n\nIt refetches the current element, whereas the other -\u003eactivate callbacks\n(bitmap, hash, rhash, rbtree) use elem-\u003epriv.\nSame for .remove: other set implementations take elem-\u003epriv,\nnft_pipapo_remove fetches elem-\u003epriv, then does a relookup,\nremove this.\n\nI suspect this was the reason for the change that prompted the\nremoval of the expired check in pipapo_get() in the first place,\nbut skipping exired elements there makes no sense to me, this helper\nis used for normal get requests, insertions (duplicate check)\nand deactivate callback.\n\nIn first two cases expired elements must be skipped.\n\nFor -\u003edeactivate(), this gets called for DELSETELEM, so it\nseems to me that expired elements should be skipped as well, i.e.\ndelete request should fail with -ENOENT error.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.170.2.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.170.2.s390x",
          "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.170.2.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.170.2.s390x",
          "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.170.2.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.170.2.s390x",
          "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.170.2.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.170.2.s390x",
          "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-64kb-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-64kb-devel-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-devel-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-devel-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-devel-5.14.21-150400.24.170.1.noarch",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-docs-5.14.21-150400.24.170.1.noarch",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-macros-5.14.21-150400.24.170.1.noarch",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-obs-build-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-obs-build-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-source-5.14.21-150400.24.170.1.noarch",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-syms-5.14.21-150400.24.170.1.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-syms-5.14.21-150400.24.170.1.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:reiserfs-kmp-default-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:reiserfs-kmp-default-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-64kb-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-64kb-devel-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-devel-5.14.21-150400.24.170.1.noarch",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-docs-5.14.21-150400.24.170.1.noarch",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-macros-5.14.21-150400.24.170.1.noarch",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-source-5.14.21-150400.24.170.1.noarch",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.170.1.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.170.1.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.170.2.ppc64le",
          "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.170.2.s390x",
          "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.170.2.ppc64le",
          "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.170.2.s390x",
          "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_170-default-1-150400.9.3.2.ppc64le",
          "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_170-default-1-150400.9.3.2.s390x",
          "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_170-default-1-150400.9.3.2.x86_64",
          "SUSE Linux Enterprise Micro 5.3:kernel-default-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise Micro 5.3:kernel-default-5.14.21-150400.24.170.2.s390x",
          "SUSE Linux Enterprise Micro 5.3:kernel-default-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise Micro 5.3:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.aarch64",
          "SUSE Linux Enterprise Micro 5.3:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
          "SUSE Linux Enterprise Micro 5.4:kernel-default-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise Micro 5.4:kernel-default-5.14.21-150400.24.170.2.s390x",
          "SUSE Linux Enterprise Micro 5.4:kernel-default-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise Micro 5.4:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.aarch64",
          "SUSE Linux Enterprise Micro 5.4:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-64kb-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-64kb-devel-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-5.14.21-150400.24.170.2.ppc64le",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-5.14.21-150400.24.170.2.s390x",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.aarch64",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.ppc64le",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.170.2.ppc64le",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.170.2.s390x",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-devel-5.14.21-150400.24.170.1.noarch",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-docs-5.14.21-150400.24.170.1.noarch",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-macros-5.14.21-150400.24.170.1.noarch",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.170.2.ppc64le",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.170.2.s390x",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-source-5.14.21-150400.24.170.1.noarch",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.170.1.aarch64",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.170.1.ppc64le",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.170.1.s390x",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.170.1.x86_64",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-zfcpdump-5.14.21-150400.24.170.2.s390x",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.170.2.ppc64le",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.170.2.s390x",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-5.14.21-150400.24.170.2.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-devel-5.14.21-150400.24.170.2.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-devel-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-devel-5.14.21-150400.24.170.1.noarch",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-docs-5.14.21-150400.24.170.1.noarch",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-macros-5.14.21-150400.24.170.1.noarch",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-obs-build-5.14.21-150400.24.170.2.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-obs-build-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-source-5.14.21-150400.24.170.1.noarch",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-syms-5.14.21-150400.24.170.1.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-syms-5.14.21-150400.24.170.1.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.170.2.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.170.2.x86_64",
          "SUSE Manager Proxy 4.3:kernel-default-5.14.21-150400.24.170.2.x86_64",
          "SUSE Manager Proxy 4.3:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
          "SUSE Manager Proxy 4.3:kernel-default-devel-5.14.21-150400.24.170.2.x86_64",
          "SUSE Manager Proxy 4.3:kernel-devel-5.14.21-150400.24.170.1.noarch",
          "SUSE Manager Proxy 4.3:kernel-macros-5.14.21-150400.24.170.1.noarch",
          "SUSE Manager Proxy 4.3:kernel-source-5.14.21-150400.24.170.1.noarch",
          "SUSE Manager Proxy 4.3:kernel-syms-5.14.21-150400.24.170.1.x86_64",
          "SUSE Manager Server 4.3:kernel-default-5.14.21-150400.24.170.2.ppc64le",
          "SUSE Manager Server 4.3:kernel-default-5.14.21-150400.24.170.2.s390x",
          "SUSE Manager Server 4.3:kernel-default-5.14.21-150400.24.170.2.x86_64",
          "SUSE Manager Server 4.3:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.ppc64le",
          "SUSE Manager Server 4.3:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
          "SUSE Manager Server 4.3:kernel-default-devel-5.14.21-150400.24.170.2.ppc64le",
          "SUSE Manager Server 4.3:kernel-default-devel-5.14.21-150400.24.170.2.s390x",
          "SUSE Manager Server 4.3:kernel-default-devel-5.14.21-150400.24.170.2.x86_64",
          "SUSE Manager Server 4.3:kernel-devel-5.14.21-150400.24.170.1.noarch",
          "SUSE Manager Server 4.3:kernel-macros-5.14.21-150400.24.170.1.noarch",
          "SUSE Manager Server 4.3:kernel-source-5.14.21-150400.24.170.1.noarch",
          "SUSE Manager Server 4.3:kernel-syms-5.14.21-150400.24.170.1.ppc64le",
          "SUSE Manager Server 4.3:kernel-syms-5.14.21-150400.24.170.1.s390x",
          "SUSE Manager Server 4.3:kernel-syms-5.14.21-150400.24.170.1.x86_64",
          "SUSE Manager Server 4.3:kernel-zfcpdump-5.14.21-150400.24.170.2.s390x"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2023-52925",
          "url": "https://www.suse.com/security/cve/CVE-2023-52925"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1236822 for CVE-2023-52925",
          "url": "https://bugzilla.suse.com/1236822"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-64kb-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-64kb-devel-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-devel-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-devel-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-devel-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-docs-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-macros-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-obs-build-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-obs-build-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-source-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-syms-5.14.21-150400.24.170.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-syms-5.14.21-150400.24.170.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:reiserfs-kmp-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:reiserfs-kmp-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-64kb-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-64kb-devel-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-devel-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-docs-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-macros-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-source-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.170.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.170.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_170-default-1-150400.9.3.2.ppc64le",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_170-default-1-150400.9.3.2.s390x",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_170-default-1-150400.9.3.2.x86_64",
            "SUSE Linux Enterprise Micro 5.3:kernel-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise Micro 5.3:kernel-default-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise Micro 5.3:kernel-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Micro 5.3:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.aarch64",
            "SUSE Linux Enterprise Micro 5.3:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
            "SUSE Linux Enterprise Micro 5.4:kernel-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise Micro 5.4:kernel-default-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise Micro 5.4:kernel-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Micro 5.4:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.aarch64",
            "SUSE Linux Enterprise Micro 5.4:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-64kb-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-64kb-devel-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.aarch64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.ppc64le",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-devel-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-docs-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-macros-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-source-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.170.1.aarch64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.170.1.ppc64le",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.170.1.s390x",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.170.1.x86_64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-zfcpdump-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-devel-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-devel-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-devel-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-docs-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-macros-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-obs-build-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-obs-build-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-source-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-syms-5.14.21-150400.24.170.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-syms-5.14.21-150400.24.170.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Manager Proxy 4.3:kernel-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Manager Proxy 4.3:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
            "SUSE Manager Proxy 4.3:kernel-default-devel-5.14.21-150400.24.170.2.x86_64",
            "SUSE Manager Proxy 4.3:kernel-devel-5.14.21-150400.24.170.1.noarch",
            "SUSE Manager Proxy 4.3:kernel-macros-5.14.21-150400.24.170.1.noarch",
            "SUSE Manager Proxy 4.3:kernel-source-5.14.21-150400.24.170.1.noarch",
            "SUSE Manager Proxy 4.3:kernel-syms-5.14.21-150400.24.170.1.x86_64",
            "SUSE Manager Server 4.3:kernel-default-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Manager Server 4.3:kernel-default-5.14.21-150400.24.170.2.s390x",
            "SUSE Manager Server 4.3:kernel-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Manager Server 4.3:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.ppc64le",
            "SUSE Manager Server 4.3:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
            "SUSE Manager Server 4.3:kernel-default-devel-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Manager Server 4.3:kernel-default-devel-5.14.21-150400.24.170.2.s390x",
            "SUSE Manager Server 4.3:kernel-default-devel-5.14.21-150400.24.170.2.x86_64",
            "SUSE Manager Server 4.3:kernel-devel-5.14.21-150400.24.170.1.noarch",
            "SUSE Manager Server 4.3:kernel-macros-5.14.21-150400.24.170.1.noarch",
            "SUSE Manager Server 4.3:kernel-source-5.14.21-150400.24.170.1.noarch",
            "SUSE Manager Server 4.3:kernel-syms-5.14.21-150400.24.170.1.ppc64le",
            "SUSE Manager Server 4.3:kernel-syms-5.14.21-150400.24.170.1.s390x",
            "SUSE Manager Server 4.3:kernel-syms-5.14.21-150400.24.170.1.x86_64",
            "SUSE Manager Server 4.3:kernel-zfcpdump-5.14.21-150400.24.170.2.s390x"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 7.8,
            "baseSeverity": "HIGH",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
            "version": "3.1"
          },
          "products": [
            "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-64kb-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-64kb-devel-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-devel-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-devel-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-devel-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-docs-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-macros-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-obs-build-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-obs-build-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-source-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-syms-5.14.21-150400.24.170.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-syms-5.14.21-150400.24.170.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:reiserfs-kmp-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:reiserfs-kmp-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-64kb-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-64kb-devel-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-devel-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-docs-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-macros-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-source-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.170.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.170.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_170-default-1-150400.9.3.2.ppc64le",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_170-default-1-150400.9.3.2.s390x",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_170-default-1-150400.9.3.2.x86_64",
            "SUSE Linux Enterprise Micro 5.3:kernel-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise Micro 5.3:kernel-default-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise Micro 5.3:kernel-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Micro 5.3:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.aarch64",
            "SUSE Linux Enterprise Micro 5.3:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
            "SUSE Linux Enterprise Micro 5.4:kernel-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise Micro 5.4:kernel-default-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise Micro 5.4:kernel-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Micro 5.4:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.aarch64",
            "SUSE Linux Enterprise Micro 5.4:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-64kb-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-64kb-devel-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.aarch64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.ppc64le",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-devel-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-docs-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-macros-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-source-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.170.1.aarch64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.170.1.ppc64le",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.170.1.s390x",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.170.1.x86_64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-zfcpdump-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-devel-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-devel-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-devel-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-docs-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-macros-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-obs-build-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-obs-build-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-source-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-syms-5.14.21-150400.24.170.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-syms-5.14.21-150400.24.170.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Manager Proxy 4.3:kernel-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Manager Proxy 4.3:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
            "SUSE Manager Proxy 4.3:kernel-default-devel-5.14.21-150400.24.170.2.x86_64",
            "SUSE Manager Proxy 4.3:kernel-devel-5.14.21-150400.24.170.1.noarch",
            "SUSE Manager Proxy 4.3:kernel-macros-5.14.21-150400.24.170.1.noarch",
            "SUSE Manager Proxy 4.3:kernel-source-5.14.21-150400.24.170.1.noarch",
            "SUSE Manager Proxy 4.3:kernel-syms-5.14.21-150400.24.170.1.x86_64",
            "SUSE Manager Server 4.3:kernel-default-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Manager Server 4.3:kernel-default-5.14.21-150400.24.170.2.s390x",
            "SUSE Manager Server 4.3:kernel-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Manager Server 4.3:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.ppc64le",
            "SUSE Manager Server 4.3:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
            "SUSE Manager Server 4.3:kernel-default-devel-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Manager Server 4.3:kernel-default-devel-5.14.21-150400.24.170.2.s390x",
            "SUSE Manager Server 4.3:kernel-default-devel-5.14.21-150400.24.170.2.x86_64",
            "SUSE Manager Server 4.3:kernel-devel-5.14.21-150400.24.170.1.noarch",
            "SUSE Manager Server 4.3:kernel-macros-5.14.21-150400.24.170.1.noarch",
            "SUSE Manager Server 4.3:kernel-source-5.14.21-150400.24.170.1.noarch",
            "SUSE Manager Server 4.3:kernel-syms-5.14.21-150400.24.170.1.ppc64le",
            "SUSE Manager Server 4.3:kernel-syms-5.14.21-150400.24.170.1.s390x",
            "SUSE Manager Server 4.3:kernel-syms-5.14.21-150400.24.170.1.x86_64",
            "SUSE Manager Server 4.3:kernel-zfcpdump-5.14.21-150400.24.170.2.s390x"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2025-07-28T15:09:33Z",
          "details": "important"
        }
      ],
      "title": "CVE-2023-52925"
    },
    {
      "cve": "CVE-2023-53048",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2023-53048"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "In the Linux kernel, the following vulnerability has been resolved:\n\nusb: typec: tcpm: fix warning when handle discover_identity message\n\nSince both source and sink device can send discover_identity message in\nPD3, kernel may dump below warning:\n\n------------[ cut here ]------------\nWARNING: CPU: 0 PID: 169 at drivers/usb/typec/tcpm/tcpm.c:1446 tcpm_queue_vdm+0xe0/0xf0\nModules linked in:\nCPU: 0 PID: 169 Comm: 1-0050 Not tainted 6.1.1-00038-g6a3c36cf1da2-dirty #567\nHardware name: NXP i.MX8MPlus EVK board (DT)\npstate: 20000005 (nzCv daif -PAN -UAO -TCO -DIT -SSBS BTYPE=--)\npc : tcpm_queue_vdm+0xe0/0xf0\nlr : tcpm_queue_vdm+0x2c/0xf0\nsp : ffff80000c19bcd0\nx29: ffff80000c19bcd0 x28: 0000000000000001 x27: ffff0000d11c8ab8\nx26: ffff0000d11cc000 x25: 0000000000000000 x24: 00000000ff008081\nx23: 0000000000000001 x22: 00000000ff00a081 x21: ffff80000c19bdbc\nx20: 0000000000000000 x19: ffff0000d11c8080 x18: ffffffffffffffff\nx17: 0000000000000000 x16: 0000000000000000 x15: ffff0000d716f580\nx14: 0000000000000001 x13: ffff0000d716f507 x12: 0000000000000001\nx11: 0000000000000000 x10: 0000000000000020 x9 : 00000000000ee098\nx8 : 00000000ffffffff x7 : 000000000000001c x6 : ffff0000d716f580\nx5 : 0000000000000000 x4 : 0000000000000000 x3 : 0000000000000000\nx2 : ffff80000c19bdbc x1 : 00000000ff00a081 x0 : 0000000000000004\nCall trace:\ntcpm_queue_vdm+0xe0/0xf0\ntcpm_pd_rx_handler+0x340/0x1ab0\nkthread_worker_fn+0xcc/0x18c\nkthread+0x10c/0x110\nret_from_fork+0x10/0x20\n---[ end trace 0000000000000000 ]---\n\nBelow sequences may trigger this warning:\n\ntcpm_send_discover_work(work)\n  tcpm_send_vdm(port, USB_SID_PD, CMD_DISCOVER_IDENT, NULL, 0);\n   tcpm_queue_vdm(port, header, data, count);\n    port-\u003evdm_state = VDM_STATE_READY;\n\nvdm_state_machine_work(work);\n\t\t\t\u003c-- received discover_identity from partner\n vdm_run_state_machine(port);\n  port-\u003evdm_state = VDM_STATE_SEND_MESSAGE;\n   mod_vdm_delayed_work(port, x);\n\ntcpm_pd_rx_handler(work);\n tcpm_pd_data_request(port, msg);\n  tcpm_handle_vdm_request(port, msg-\u003epayload, cnt);\n   tcpm_queue_vdm(port, response[0], \u0026response[1], rlen - 1);\n--\u003e WARN_ON(port-\u003evdm_state \u003e VDM_STATE_DONE);\n\nFor this case, the state machine could still send out discover\nidentity message later if we skip current discover_identity message.\nSo we should handle the received message firstly and override the pending\ndiscover_identity message without warning in this case. Then, a delayed\nsend_discover work will send discover_identity message again.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.170.2.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.170.2.s390x",
          "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.170.2.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.170.2.s390x",
          "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.170.2.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.170.2.s390x",
          "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.170.2.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.170.2.s390x",
          "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-64kb-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-64kb-devel-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-devel-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-devel-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-devel-5.14.21-150400.24.170.1.noarch",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-docs-5.14.21-150400.24.170.1.noarch",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-macros-5.14.21-150400.24.170.1.noarch",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-obs-build-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-obs-build-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-source-5.14.21-150400.24.170.1.noarch",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-syms-5.14.21-150400.24.170.1.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-syms-5.14.21-150400.24.170.1.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:reiserfs-kmp-default-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:reiserfs-kmp-default-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-64kb-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-64kb-devel-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-devel-5.14.21-150400.24.170.1.noarch",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-docs-5.14.21-150400.24.170.1.noarch",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-macros-5.14.21-150400.24.170.1.noarch",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-source-5.14.21-150400.24.170.1.noarch",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.170.1.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.170.1.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.170.2.ppc64le",
          "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.170.2.s390x",
          "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.170.2.ppc64le",
          "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.170.2.s390x",
          "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_170-default-1-150400.9.3.2.ppc64le",
          "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_170-default-1-150400.9.3.2.s390x",
          "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_170-default-1-150400.9.3.2.x86_64",
          "SUSE Linux Enterprise Micro 5.3:kernel-default-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise Micro 5.3:kernel-default-5.14.21-150400.24.170.2.s390x",
          "SUSE Linux Enterprise Micro 5.3:kernel-default-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise Micro 5.3:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.aarch64",
          "SUSE Linux Enterprise Micro 5.3:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
          "SUSE Linux Enterprise Micro 5.4:kernel-default-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise Micro 5.4:kernel-default-5.14.21-150400.24.170.2.s390x",
          "SUSE Linux Enterprise Micro 5.4:kernel-default-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise Micro 5.4:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.aarch64",
          "SUSE Linux Enterprise Micro 5.4:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-64kb-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-64kb-devel-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-5.14.21-150400.24.170.2.ppc64le",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-5.14.21-150400.24.170.2.s390x",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.aarch64",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.ppc64le",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.170.2.ppc64le",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.170.2.s390x",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-devel-5.14.21-150400.24.170.1.noarch",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-docs-5.14.21-150400.24.170.1.noarch",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-macros-5.14.21-150400.24.170.1.noarch",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.170.2.ppc64le",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.170.2.s390x",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-source-5.14.21-150400.24.170.1.noarch",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.170.1.aarch64",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.170.1.ppc64le",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.170.1.s390x",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.170.1.x86_64",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-zfcpdump-5.14.21-150400.24.170.2.s390x",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.170.2.ppc64le",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.170.2.s390x",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-5.14.21-150400.24.170.2.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-devel-5.14.21-150400.24.170.2.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-devel-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-devel-5.14.21-150400.24.170.1.noarch",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-docs-5.14.21-150400.24.170.1.noarch",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-macros-5.14.21-150400.24.170.1.noarch",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-obs-build-5.14.21-150400.24.170.2.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-obs-build-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-source-5.14.21-150400.24.170.1.noarch",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-syms-5.14.21-150400.24.170.1.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-syms-5.14.21-150400.24.170.1.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.170.2.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.170.2.x86_64",
          "SUSE Manager Proxy 4.3:kernel-default-5.14.21-150400.24.170.2.x86_64",
          "SUSE Manager Proxy 4.3:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
          "SUSE Manager Proxy 4.3:kernel-default-devel-5.14.21-150400.24.170.2.x86_64",
          "SUSE Manager Proxy 4.3:kernel-devel-5.14.21-150400.24.170.1.noarch",
          "SUSE Manager Proxy 4.3:kernel-macros-5.14.21-150400.24.170.1.noarch",
          "SUSE Manager Proxy 4.3:kernel-source-5.14.21-150400.24.170.1.noarch",
          "SUSE Manager Proxy 4.3:kernel-syms-5.14.21-150400.24.170.1.x86_64",
          "SUSE Manager Server 4.3:kernel-default-5.14.21-150400.24.170.2.ppc64le",
          "SUSE Manager Server 4.3:kernel-default-5.14.21-150400.24.170.2.s390x",
          "SUSE Manager Server 4.3:kernel-default-5.14.21-150400.24.170.2.x86_64",
          "SUSE Manager Server 4.3:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.ppc64le",
          "SUSE Manager Server 4.3:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
          "SUSE Manager Server 4.3:kernel-default-devel-5.14.21-150400.24.170.2.ppc64le",
          "SUSE Manager Server 4.3:kernel-default-devel-5.14.21-150400.24.170.2.s390x",
          "SUSE Manager Server 4.3:kernel-default-devel-5.14.21-150400.24.170.2.x86_64",
          "SUSE Manager Server 4.3:kernel-devel-5.14.21-150400.24.170.1.noarch",
          "SUSE Manager Server 4.3:kernel-macros-5.14.21-150400.24.170.1.noarch",
          "SUSE Manager Server 4.3:kernel-source-5.14.21-150400.24.170.1.noarch",
          "SUSE Manager Server 4.3:kernel-syms-5.14.21-150400.24.170.1.ppc64le",
          "SUSE Manager Server 4.3:kernel-syms-5.14.21-150400.24.170.1.s390x",
          "SUSE Manager Server 4.3:kernel-syms-5.14.21-150400.24.170.1.x86_64",
          "SUSE Manager Server 4.3:kernel-zfcpdump-5.14.21-150400.24.170.2.s390x"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2023-53048",
          "url": "https://www.suse.com/security/cve/CVE-2023-53048"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1244179 for CVE-2023-53048",
          "url": "https://bugzilla.suse.com/1244179"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-64kb-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-64kb-devel-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-devel-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-devel-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-devel-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-docs-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-macros-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-obs-build-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-obs-build-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-source-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-syms-5.14.21-150400.24.170.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-syms-5.14.21-150400.24.170.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:reiserfs-kmp-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:reiserfs-kmp-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-64kb-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-64kb-devel-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-devel-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-docs-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-macros-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-source-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.170.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.170.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_170-default-1-150400.9.3.2.ppc64le",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_170-default-1-150400.9.3.2.s390x",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_170-default-1-150400.9.3.2.x86_64",
            "SUSE Linux Enterprise Micro 5.3:kernel-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise Micro 5.3:kernel-default-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise Micro 5.3:kernel-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Micro 5.3:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.aarch64",
            "SUSE Linux Enterprise Micro 5.3:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
            "SUSE Linux Enterprise Micro 5.4:kernel-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise Micro 5.4:kernel-default-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise Micro 5.4:kernel-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Micro 5.4:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.aarch64",
            "SUSE Linux Enterprise Micro 5.4:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-64kb-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-64kb-devel-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.aarch64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.ppc64le",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-devel-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-docs-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-macros-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-source-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.170.1.aarch64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.170.1.ppc64le",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.170.1.s390x",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.170.1.x86_64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-zfcpdump-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-devel-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-devel-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-devel-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-docs-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-macros-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-obs-build-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-obs-build-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-source-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-syms-5.14.21-150400.24.170.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-syms-5.14.21-150400.24.170.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Manager Proxy 4.3:kernel-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Manager Proxy 4.3:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
            "SUSE Manager Proxy 4.3:kernel-default-devel-5.14.21-150400.24.170.2.x86_64",
            "SUSE Manager Proxy 4.3:kernel-devel-5.14.21-150400.24.170.1.noarch",
            "SUSE Manager Proxy 4.3:kernel-macros-5.14.21-150400.24.170.1.noarch",
            "SUSE Manager Proxy 4.3:kernel-source-5.14.21-150400.24.170.1.noarch",
            "SUSE Manager Proxy 4.3:kernel-syms-5.14.21-150400.24.170.1.x86_64",
            "SUSE Manager Server 4.3:kernel-default-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Manager Server 4.3:kernel-default-5.14.21-150400.24.170.2.s390x",
            "SUSE Manager Server 4.3:kernel-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Manager Server 4.3:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.ppc64le",
            "SUSE Manager Server 4.3:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
            "SUSE Manager Server 4.3:kernel-default-devel-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Manager Server 4.3:kernel-default-devel-5.14.21-150400.24.170.2.s390x",
            "SUSE Manager Server 4.3:kernel-default-devel-5.14.21-150400.24.170.2.x86_64",
            "SUSE Manager Server 4.3:kernel-devel-5.14.21-150400.24.170.1.noarch",
            "SUSE Manager Server 4.3:kernel-macros-5.14.21-150400.24.170.1.noarch",
            "SUSE Manager Server 4.3:kernel-source-5.14.21-150400.24.170.1.noarch",
            "SUSE Manager Server 4.3:kernel-syms-5.14.21-150400.24.170.1.ppc64le",
            "SUSE Manager Server 4.3:kernel-syms-5.14.21-150400.24.170.1.s390x",
            "SUSE Manager Server 4.3:kernel-syms-5.14.21-150400.24.170.1.x86_64",
            "SUSE Manager Server 4.3:kernel-zfcpdump-5.14.21-150400.24.170.2.s390x"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 5.5,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
            "version": "3.1"
          },
          "products": [
            "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-64kb-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-64kb-devel-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-devel-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-devel-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-devel-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-docs-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-macros-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-obs-build-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-obs-build-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-source-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-syms-5.14.21-150400.24.170.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-syms-5.14.21-150400.24.170.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:reiserfs-kmp-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:reiserfs-kmp-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-64kb-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-64kb-devel-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-devel-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-docs-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-macros-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-source-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.170.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.170.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_170-default-1-150400.9.3.2.ppc64le",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_170-default-1-150400.9.3.2.s390x",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_170-default-1-150400.9.3.2.x86_64",
            "SUSE Linux Enterprise Micro 5.3:kernel-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise Micro 5.3:kernel-default-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise Micro 5.3:kernel-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Micro 5.3:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.aarch64",
            "SUSE Linux Enterprise Micro 5.3:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
            "SUSE Linux Enterprise Micro 5.4:kernel-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise Micro 5.4:kernel-default-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise Micro 5.4:kernel-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Micro 5.4:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.aarch64",
            "SUSE Linux Enterprise Micro 5.4:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-64kb-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-64kb-devel-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.aarch64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.ppc64le",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-devel-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-docs-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-macros-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-source-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.170.1.aarch64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.170.1.ppc64le",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.170.1.s390x",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.170.1.x86_64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-zfcpdump-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-devel-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-devel-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-devel-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-docs-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-macros-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-obs-build-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-obs-build-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-source-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-syms-5.14.21-150400.24.170.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-syms-5.14.21-150400.24.170.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Manager Proxy 4.3:kernel-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Manager Proxy 4.3:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
            "SUSE Manager Proxy 4.3:kernel-default-devel-5.14.21-150400.24.170.2.x86_64",
            "SUSE Manager Proxy 4.3:kernel-devel-5.14.21-150400.24.170.1.noarch",
            "SUSE Manager Proxy 4.3:kernel-macros-5.14.21-150400.24.170.1.noarch",
            "SUSE Manager Proxy 4.3:kernel-source-5.14.21-150400.24.170.1.noarch",
            "SUSE Manager Proxy 4.3:kernel-syms-5.14.21-150400.24.170.1.x86_64",
            "SUSE Manager Server 4.3:kernel-default-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Manager Server 4.3:kernel-default-5.14.21-150400.24.170.2.s390x",
            "SUSE Manager Server 4.3:kernel-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Manager Server 4.3:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.ppc64le",
            "SUSE Manager Server 4.3:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
            "SUSE Manager Server 4.3:kernel-default-devel-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Manager Server 4.3:kernel-default-devel-5.14.21-150400.24.170.2.s390x",
            "SUSE Manager Server 4.3:kernel-default-devel-5.14.21-150400.24.170.2.x86_64",
            "SUSE Manager Server 4.3:kernel-devel-5.14.21-150400.24.170.1.noarch",
            "SUSE Manager Server 4.3:kernel-macros-5.14.21-150400.24.170.1.noarch",
            "SUSE Manager Server 4.3:kernel-source-5.14.21-150400.24.170.1.noarch",
            "SUSE Manager Server 4.3:kernel-syms-5.14.21-150400.24.170.1.ppc64le",
            "SUSE Manager Server 4.3:kernel-syms-5.14.21-150400.24.170.1.s390x",
            "SUSE Manager Server 4.3:kernel-syms-5.14.21-150400.24.170.1.x86_64",
            "SUSE Manager Server 4.3:kernel-zfcpdump-5.14.21-150400.24.170.2.s390x"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2025-07-28T15:09:33Z",
          "details": "moderate"
        }
      ],
      "title": "CVE-2023-53048"
    },
    {
      "cve": "CVE-2023-53076",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2023-53076"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "This CVE ID has been rejected or withdrawn by its CVE Numbering Authority.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.170.2.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.170.2.s390x",
          "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.170.2.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.170.2.s390x",
          "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.170.2.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.170.2.s390x",
          "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.170.2.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.170.2.s390x",
          "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-64kb-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-64kb-devel-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-devel-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-devel-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-devel-5.14.21-150400.24.170.1.noarch",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-docs-5.14.21-150400.24.170.1.noarch",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-macros-5.14.21-150400.24.170.1.noarch",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-obs-build-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-obs-build-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-source-5.14.21-150400.24.170.1.noarch",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-syms-5.14.21-150400.24.170.1.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-syms-5.14.21-150400.24.170.1.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:reiserfs-kmp-default-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:reiserfs-kmp-default-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-64kb-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-64kb-devel-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-devel-5.14.21-150400.24.170.1.noarch",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-docs-5.14.21-150400.24.170.1.noarch",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-macros-5.14.21-150400.24.170.1.noarch",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-source-5.14.21-150400.24.170.1.noarch",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.170.1.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.170.1.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.170.2.ppc64le",
          "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.170.2.s390x",
          "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.170.2.ppc64le",
          "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.170.2.s390x",
          "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_170-default-1-150400.9.3.2.ppc64le",
          "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_170-default-1-150400.9.3.2.s390x",
          "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_170-default-1-150400.9.3.2.x86_64",
          "SUSE Linux Enterprise Micro 5.3:kernel-default-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise Micro 5.3:kernel-default-5.14.21-150400.24.170.2.s390x",
          "SUSE Linux Enterprise Micro 5.3:kernel-default-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise Micro 5.3:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.aarch64",
          "SUSE Linux Enterprise Micro 5.3:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
          "SUSE Linux Enterprise Micro 5.4:kernel-default-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise Micro 5.4:kernel-default-5.14.21-150400.24.170.2.s390x",
          "SUSE Linux Enterprise Micro 5.4:kernel-default-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise Micro 5.4:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.aarch64",
          "SUSE Linux Enterprise Micro 5.4:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-64kb-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-64kb-devel-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-5.14.21-150400.24.170.2.ppc64le",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-5.14.21-150400.24.170.2.s390x",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.aarch64",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.ppc64le",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.170.2.ppc64le",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.170.2.s390x",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-devel-5.14.21-150400.24.170.1.noarch",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-docs-5.14.21-150400.24.170.1.noarch",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-macros-5.14.21-150400.24.170.1.noarch",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.170.2.ppc64le",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.170.2.s390x",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-source-5.14.21-150400.24.170.1.noarch",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.170.1.aarch64",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.170.1.ppc64le",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.170.1.s390x",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.170.1.x86_64",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-zfcpdump-5.14.21-150400.24.170.2.s390x",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.170.2.ppc64le",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.170.2.s390x",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-5.14.21-150400.24.170.2.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-devel-5.14.21-150400.24.170.2.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-devel-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-devel-5.14.21-150400.24.170.1.noarch",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-docs-5.14.21-150400.24.170.1.noarch",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-macros-5.14.21-150400.24.170.1.noarch",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-obs-build-5.14.21-150400.24.170.2.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-obs-build-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-source-5.14.21-150400.24.170.1.noarch",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-syms-5.14.21-150400.24.170.1.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-syms-5.14.21-150400.24.170.1.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.170.2.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.170.2.x86_64",
          "SUSE Manager Proxy 4.3:kernel-default-5.14.21-150400.24.170.2.x86_64",
          "SUSE Manager Proxy 4.3:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
          "SUSE Manager Proxy 4.3:kernel-default-devel-5.14.21-150400.24.170.2.x86_64",
          "SUSE Manager Proxy 4.3:kernel-devel-5.14.21-150400.24.170.1.noarch",
          "SUSE Manager Proxy 4.3:kernel-macros-5.14.21-150400.24.170.1.noarch",
          "SUSE Manager Proxy 4.3:kernel-source-5.14.21-150400.24.170.1.noarch",
          "SUSE Manager Proxy 4.3:kernel-syms-5.14.21-150400.24.170.1.x86_64",
          "SUSE Manager Server 4.3:kernel-default-5.14.21-150400.24.170.2.ppc64le",
          "SUSE Manager Server 4.3:kernel-default-5.14.21-150400.24.170.2.s390x",
          "SUSE Manager Server 4.3:kernel-default-5.14.21-150400.24.170.2.x86_64",
          "SUSE Manager Server 4.3:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.ppc64le",
          "SUSE Manager Server 4.3:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
          "SUSE Manager Server 4.3:kernel-default-devel-5.14.21-150400.24.170.2.ppc64le",
          "SUSE Manager Server 4.3:kernel-default-devel-5.14.21-150400.24.170.2.s390x",
          "SUSE Manager Server 4.3:kernel-default-devel-5.14.21-150400.24.170.2.x86_64",
          "SUSE Manager Server 4.3:kernel-devel-5.14.21-150400.24.170.1.noarch",
          "SUSE Manager Server 4.3:kernel-macros-5.14.21-150400.24.170.1.noarch",
          "SUSE Manager Server 4.3:kernel-source-5.14.21-150400.24.170.1.noarch",
          "SUSE Manager Server 4.3:kernel-syms-5.14.21-150400.24.170.1.ppc64le",
          "SUSE Manager Server 4.3:kernel-syms-5.14.21-150400.24.170.1.s390x",
          "SUSE Manager Server 4.3:kernel-syms-5.14.21-150400.24.170.1.x86_64",
          "SUSE Manager Server 4.3:kernel-zfcpdump-5.14.21-150400.24.170.2.s390x"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2023-53076",
          "url": "https://www.suse.com/security/cve/CVE-2023-53076"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1242221 for CVE-2023-53076",
          "url": "https://bugzilla.suse.com/1242221"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-64kb-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-64kb-devel-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-devel-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-devel-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-devel-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-docs-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-macros-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-obs-build-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-obs-build-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-source-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-syms-5.14.21-150400.24.170.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-syms-5.14.21-150400.24.170.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:reiserfs-kmp-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:reiserfs-kmp-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-64kb-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-64kb-devel-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-devel-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-docs-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-macros-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-source-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.170.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.170.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_170-default-1-150400.9.3.2.ppc64le",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_170-default-1-150400.9.3.2.s390x",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_170-default-1-150400.9.3.2.x86_64",
            "SUSE Linux Enterprise Micro 5.3:kernel-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise Micro 5.3:kernel-default-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise Micro 5.3:kernel-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Micro 5.3:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.aarch64",
            "SUSE Linux Enterprise Micro 5.3:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
            "SUSE Linux Enterprise Micro 5.4:kernel-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise Micro 5.4:kernel-default-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise Micro 5.4:kernel-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Micro 5.4:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.aarch64",
            "SUSE Linux Enterprise Micro 5.4:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-64kb-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-64kb-devel-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.aarch64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.ppc64le",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-devel-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-docs-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-macros-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-source-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.170.1.aarch64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.170.1.ppc64le",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.170.1.s390x",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.170.1.x86_64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-zfcpdump-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-devel-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-devel-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-devel-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-docs-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-macros-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-obs-build-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-obs-build-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-source-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-syms-5.14.21-150400.24.170.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-syms-5.14.21-150400.24.170.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Manager Proxy 4.3:kernel-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Manager Proxy 4.3:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
            "SUSE Manager Proxy 4.3:kernel-default-devel-5.14.21-150400.24.170.2.x86_64",
            "SUSE Manager Proxy 4.3:kernel-devel-5.14.21-150400.24.170.1.noarch",
            "SUSE Manager Proxy 4.3:kernel-macros-5.14.21-150400.24.170.1.noarch",
            "SUSE Manager Proxy 4.3:kernel-source-5.14.21-150400.24.170.1.noarch",
            "SUSE Manager Proxy 4.3:kernel-syms-5.14.21-150400.24.170.1.x86_64",
            "SUSE Manager Server 4.3:kernel-default-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Manager Server 4.3:kernel-default-5.14.21-150400.24.170.2.s390x",
            "SUSE Manager Server 4.3:kernel-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Manager Server 4.3:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.ppc64le",
            "SUSE Manager Server 4.3:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
            "SUSE Manager Server 4.3:kernel-default-devel-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Manager Server 4.3:kernel-default-devel-5.14.21-150400.24.170.2.s390x",
            "SUSE Manager Server 4.3:kernel-default-devel-5.14.21-150400.24.170.2.x86_64",
            "SUSE Manager Server 4.3:kernel-devel-5.14.21-150400.24.170.1.noarch",
            "SUSE Manager Server 4.3:kernel-macros-5.14.21-150400.24.170.1.noarch",
            "SUSE Manager Server 4.3:kernel-source-5.14.21-150400.24.170.1.noarch",
            "SUSE Manager Server 4.3:kernel-syms-5.14.21-150400.24.170.1.ppc64le",
            "SUSE Manager Server 4.3:kernel-syms-5.14.21-150400.24.170.1.s390x",
            "SUSE Manager Server 4.3:kernel-syms-5.14.21-150400.24.170.1.x86_64",
            "SUSE Manager Server 4.3:kernel-zfcpdump-5.14.21-150400.24.170.2.s390x"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 5.5,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
            "version": "3.1"
          },
          "products": [
            "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-64kb-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-64kb-devel-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-devel-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-devel-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-devel-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-docs-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-macros-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-obs-build-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-obs-build-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-source-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-syms-5.14.21-150400.24.170.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-syms-5.14.21-150400.24.170.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:reiserfs-kmp-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:reiserfs-kmp-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-64kb-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-64kb-devel-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-devel-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-docs-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-macros-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-source-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.170.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.170.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_170-default-1-150400.9.3.2.ppc64le",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_170-default-1-150400.9.3.2.s390x",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_170-default-1-150400.9.3.2.x86_64",
            "SUSE Linux Enterprise Micro 5.3:kernel-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise Micro 5.3:kernel-default-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise Micro 5.3:kernel-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Micro 5.3:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.aarch64",
            "SUSE Linux Enterprise Micro 5.3:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
            "SUSE Linux Enterprise Micro 5.4:kernel-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise Micro 5.4:kernel-default-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise Micro 5.4:kernel-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Micro 5.4:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.aarch64",
            "SUSE Linux Enterprise Micro 5.4:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-64kb-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-64kb-devel-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.aarch64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.ppc64le",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-devel-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-docs-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-macros-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-source-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.170.1.aarch64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.170.1.ppc64le",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.170.1.s390x",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.170.1.x86_64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-zfcpdump-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-devel-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-devel-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-devel-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-docs-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-macros-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-obs-build-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-obs-build-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-source-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-syms-5.14.21-150400.24.170.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-syms-5.14.21-150400.24.170.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Manager Proxy 4.3:kernel-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Manager Proxy 4.3:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
            "SUSE Manager Proxy 4.3:kernel-default-devel-5.14.21-150400.24.170.2.x86_64",
            "SUSE Manager Proxy 4.3:kernel-devel-5.14.21-150400.24.170.1.noarch",
            "SUSE Manager Proxy 4.3:kernel-macros-5.14.21-150400.24.170.1.noarch",
            "SUSE Manager Proxy 4.3:kernel-source-5.14.21-150400.24.170.1.noarch",
            "SUSE Manager Proxy 4.3:kernel-syms-5.14.21-150400.24.170.1.x86_64",
            "SUSE Manager Server 4.3:kernel-default-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Manager Server 4.3:kernel-default-5.14.21-150400.24.170.2.s390x",
            "SUSE Manager Server 4.3:kernel-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Manager Server 4.3:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.ppc64le",
            "SUSE Manager Server 4.3:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
            "SUSE Manager Server 4.3:kernel-default-devel-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Manager Server 4.3:kernel-default-devel-5.14.21-150400.24.170.2.s390x",
            "SUSE Manager Server 4.3:kernel-default-devel-5.14.21-150400.24.170.2.x86_64",
            "SUSE Manager Server 4.3:kernel-devel-5.14.21-150400.24.170.1.noarch",
            "SUSE Manager Server 4.3:kernel-macros-5.14.21-150400.24.170.1.noarch",
            "SUSE Manager Server 4.3:kernel-source-5.14.21-150400.24.170.1.noarch",
            "SUSE Manager Server 4.3:kernel-syms-5.14.21-150400.24.170.1.ppc64le",
            "SUSE Manager Server 4.3:kernel-syms-5.14.21-150400.24.170.1.s390x",
            "SUSE Manager Server 4.3:kernel-syms-5.14.21-150400.24.170.1.x86_64",
            "SUSE Manager Server 4.3:kernel-zfcpdump-5.14.21-150400.24.170.2.s390x"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2025-07-28T15:09:33Z",
          "details": "moderate"
        }
      ],
      "title": "CVE-2023-53076"
    },
    {
      "cve": "CVE-2023-53097",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2023-53097"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "In the Linux kernel, the following vulnerability has been resolved:\n\npowerpc/iommu: fix memory leak with using debugfs_lookup()\n\nWhen calling debugfs_lookup() the result must have dput() called on it,\notherwise the memory will leak over time.  To make things simpler, just\ncall debugfs_lookup_and_remove() instead which handles all of the logic\nat once.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.170.2.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.170.2.s390x",
          "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.170.2.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.170.2.s390x",
          "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.170.2.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.170.2.s390x",
          "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.170.2.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.170.2.s390x",
          "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-64kb-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-64kb-devel-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-devel-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-devel-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-devel-5.14.21-150400.24.170.1.noarch",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-docs-5.14.21-150400.24.170.1.noarch",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-macros-5.14.21-150400.24.170.1.noarch",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-obs-build-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-obs-build-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-source-5.14.21-150400.24.170.1.noarch",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-syms-5.14.21-150400.24.170.1.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-syms-5.14.21-150400.24.170.1.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:reiserfs-kmp-default-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:reiserfs-kmp-default-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-64kb-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-64kb-devel-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-devel-5.14.21-150400.24.170.1.noarch",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-docs-5.14.21-150400.24.170.1.noarch",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-macros-5.14.21-150400.24.170.1.noarch",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-source-5.14.21-150400.24.170.1.noarch",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.170.1.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.170.1.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.170.2.ppc64le",
          "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.170.2.s390x",
          "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.170.2.ppc64le",
          "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.170.2.s390x",
          "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_170-default-1-150400.9.3.2.ppc64le",
          "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_170-default-1-150400.9.3.2.s390x",
          "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_170-default-1-150400.9.3.2.x86_64",
          "SUSE Linux Enterprise Micro 5.3:kernel-default-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise Micro 5.3:kernel-default-5.14.21-150400.24.170.2.s390x",
          "SUSE Linux Enterprise Micro 5.3:kernel-default-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise Micro 5.3:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.aarch64",
          "SUSE Linux Enterprise Micro 5.3:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
          "SUSE Linux Enterprise Micro 5.4:kernel-default-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise Micro 5.4:kernel-default-5.14.21-150400.24.170.2.s390x",
          "SUSE Linux Enterprise Micro 5.4:kernel-default-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise Micro 5.4:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.aarch64",
          "SUSE Linux Enterprise Micro 5.4:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-64kb-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-64kb-devel-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-5.14.21-150400.24.170.2.ppc64le",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-5.14.21-150400.24.170.2.s390x",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.aarch64",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.ppc64le",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.170.2.ppc64le",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.170.2.s390x",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-devel-5.14.21-150400.24.170.1.noarch",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-docs-5.14.21-150400.24.170.1.noarch",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-macros-5.14.21-150400.24.170.1.noarch",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.170.2.ppc64le",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.170.2.s390x",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-source-5.14.21-150400.24.170.1.noarch",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.170.1.aarch64",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.170.1.ppc64le",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.170.1.s390x",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.170.1.x86_64",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-zfcpdump-5.14.21-150400.24.170.2.s390x",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.170.2.ppc64le",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.170.2.s390x",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-5.14.21-150400.24.170.2.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-devel-5.14.21-150400.24.170.2.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-devel-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-devel-5.14.21-150400.24.170.1.noarch",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-docs-5.14.21-150400.24.170.1.noarch",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-macros-5.14.21-150400.24.170.1.noarch",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-obs-build-5.14.21-150400.24.170.2.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-obs-build-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-source-5.14.21-150400.24.170.1.noarch",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-syms-5.14.21-150400.24.170.1.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-syms-5.14.21-150400.24.170.1.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.170.2.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.170.2.x86_64",
          "SUSE Manager Proxy 4.3:kernel-default-5.14.21-150400.24.170.2.x86_64",
          "SUSE Manager Proxy 4.3:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
          "SUSE Manager Proxy 4.3:kernel-default-devel-5.14.21-150400.24.170.2.x86_64",
          "SUSE Manager Proxy 4.3:kernel-devel-5.14.21-150400.24.170.1.noarch",
          "SUSE Manager Proxy 4.3:kernel-macros-5.14.21-150400.24.170.1.noarch",
          "SUSE Manager Proxy 4.3:kernel-source-5.14.21-150400.24.170.1.noarch",
          "SUSE Manager Proxy 4.3:kernel-syms-5.14.21-150400.24.170.1.x86_64",
          "SUSE Manager Server 4.3:kernel-default-5.14.21-150400.24.170.2.ppc64le",
          "SUSE Manager Server 4.3:kernel-default-5.14.21-150400.24.170.2.s390x",
          "SUSE Manager Server 4.3:kernel-default-5.14.21-150400.24.170.2.x86_64",
          "SUSE Manager Server 4.3:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.ppc64le",
          "SUSE Manager Server 4.3:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
          "SUSE Manager Server 4.3:kernel-default-devel-5.14.21-150400.24.170.2.ppc64le",
          "SUSE Manager Server 4.3:kernel-default-devel-5.14.21-150400.24.170.2.s390x",
          "SUSE Manager Server 4.3:kernel-default-devel-5.14.21-150400.24.170.2.x86_64",
          "SUSE Manager Server 4.3:kernel-devel-5.14.21-150400.24.170.1.noarch",
          "SUSE Manager Server 4.3:kernel-macros-5.14.21-150400.24.170.1.noarch",
          "SUSE Manager Server 4.3:kernel-source-5.14.21-150400.24.170.1.noarch",
          "SUSE Manager Server 4.3:kernel-syms-5.14.21-150400.24.170.1.ppc64le",
          "SUSE Manager Server 4.3:kernel-syms-5.14.21-150400.24.170.1.s390x",
          "SUSE Manager Server 4.3:kernel-syms-5.14.21-150400.24.170.1.x86_64",
          "SUSE Manager Server 4.3:kernel-zfcpdump-5.14.21-150400.24.170.2.s390x"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2023-53097",
          "url": "https://www.suse.com/security/cve/CVE-2023-53097"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1244114 for CVE-2023-53097",
          "url": "https://bugzilla.suse.com/1244114"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-64kb-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-64kb-devel-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-devel-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-devel-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-devel-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-docs-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-macros-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-obs-build-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-obs-build-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-source-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-syms-5.14.21-150400.24.170.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-syms-5.14.21-150400.24.170.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:reiserfs-kmp-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:reiserfs-kmp-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-64kb-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-64kb-devel-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-devel-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-docs-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-macros-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-source-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.170.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.170.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_170-default-1-150400.9.3.2.ppc64le",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_170-default-1-150400.9.3.2.s390x",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_170-default-1-150400.9.3.2.x86_64",
            "SUSE Linux Enterprise Micro 5.3:kernel-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise Micro 5.3:kernel-default-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise Micro 5.3:kernel-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Micro 5.3:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.aarch64",
            "SUSE Linux Enterprise Micro 5.3:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
            "SUSE Linux Enterprise Micro 5.4:kernel-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise Micro 5.4:kernel-default-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise Micro 5.4:kernel-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Micro 5.4:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.aarch64",
            "SUSE Linux Enterprise Micro 5.4:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-64kb-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-64kb-devel-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.aarch64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.ppc64le",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-devel-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-docs-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-macros-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-source-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.170.1.aarch64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.170.1.ppc64le",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.170.1.s390x",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.170.1.x86_64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-zfcpdump-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-devel-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-devel-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-devel-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-docs-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-macros-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-obs-build-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-obs-build-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-source-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-syms-5.14.21-150400.24.170.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-syms-5.14.21-150400.24.170.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Manager Proxy 4.3:kernel-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Manager Proxy 4.3:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
            "SUSE Manager Proxy 4.3:kernel-default-devel-5.14.21-150400.24.170.2.x86_64",
            "SUSE Manager Proxy 4.3:kernel-devel-5.14.21-150400.24.170.1.noarch",
            "SUSE Manager Proxy 4.3:kernel-macros-5.14.21-150400.24.170.1.noarch",
            "SUSE Manager Proxy 4.3:kernel-source-5.14.21-150400.24.170.1.noarch",
            "SUSE Manager Proxy 4.3:kernel-syms-5.14.21-150400.24.170.1.x86_64",
            "SUSE Manager Server 4.3:kernel-default-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Manager Server 4.3:kernel-default-5.14.21-150400.24.170.2.s390x",
            "SUSE Manager Server 4.3:kernel-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Manager Server 4.3:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.ppc64le",
            "SUSE Manager Server 4.3:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
            "SUSE Manager Server 4.3:kernel-default-devel-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Manager Server 4.3:kernel-default-devel-5.14.21-150400.24.170.2.s390x",
            "SUSE Manager Server 4.3:kernel-default-devel-5.14.21-150400.24.170.2.x86_64",
            "SUSE Manager Server 4.3:kernel-devel-5.14.21-150400.24.170.1.noarch",
            "SUSE Manager Server 4.3:kernel-macros-5.14.21-150400.24.170.1.noarch",
            "SUSE Manager Server 4.3:kernel-source-5.14.21-150400.24.170.1.noarch",
            "SUSE Manager Server 4.3:kernel-syms-5.14.21-150400.24.170.1.ppc64le",
            "SUSE Manager Server 4.3:kernel-syms-5.14.21-150400.24.170.1.s390x",
            "SUSE Manager Server 4.3:kernel-syms-5.14.21-150400.24.170.1.x86_64",
            "SUSE Manager Server 4.3:kernel-zfcpdump-5.14.21-150400.24.170.2.s390x"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 5.5,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
            "version": "3.1"
          },
          "products": [
            "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-64kb-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-64kb-devel-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-devel-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-devel-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-devel-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-docs-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-macros-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-obs-build-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-obs-build-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-source-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-syms-5.14.21-150400.24.170.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-syms-5.14.21-150400.24.170.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:reiserfs-kmp-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:reiserfs-kmp-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-64kb-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-64kb-devel-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-devel-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-docs-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-macros-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-source-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.170.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.170.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_170-default-1-150400.9.3.2.ppc64le",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_170-default-1-150400.9.3.2.s390x",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_170-default-1-150400.9.3.2.x86_64",
            "SUSE Linux Enterprise Micro 5.3:kernel-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise Micro 5.3:kernel-default-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise Micro 5.3:kernel-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Micro 5.3:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.aarch64",
            "SUSE Linux Enterprise Micro 5.3:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
            "SUSE Linux Enterprise Micro 5.4:kernel-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise Micro 5.4:kernel-default-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise Micro 5.4:kernel-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Micro 5.4:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.aarch64",
            "SUSE Linux Enterprise Micro 5.4:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-64kb-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-64kb-devel-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.aarch64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.ppc64le",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-devel-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-docs-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-macros-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-source-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.170.1.aarch64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.170.1.ppc64le",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.170.1.s390x",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.170.1.x86_64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-zfcpdump-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-devel-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-devel-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-devel-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-docs-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-macros-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-obs-build-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-obs-build-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-source-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-syms-5.14.21-150400.24.170.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-syms-5.14.21-150400.24.170.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Manager Proxy 4.3:kernel-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Manager Proxy 4.3:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
            "SUSE Manager Proxy 4.3:kernel-default-devel-5.14.21-150400.24.170.2.x86_64",
            "SUSE Manager Proxy 4.3:kernel-devel-5.14.21-150400.24.170.1.noarch",
            "SUSE Manager Proxy 4.3:kernel-macros-5.14.21-150400.24.170.1.noarch",
            "SUSE Manager Proxy 4.3:kernel-source-5.14.21-150400.24.170.1.noarch",
            "SUSE Manager Proxy 4.3:kernel-syms-5.14.21-150400.24.170.1.x86_64",
            "SUSE Manager Server 4.3:kernel-default-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Manager Server 4.3:kernel-default-5.14.21-150400.24.170.2.s390x",
            "SUSE Manager Server 4.3:kernel-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Manager Server 4.3:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.ppc64le",
            "SUSE Manager Server 4.3:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
            "SUSE Manager Server 4.3:kernel-default-devel-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Manager Server 4.3:kernel-default-devel-5.14.21-150400.24.170.2.s390x",
            "SUSE Manager Server 4.3:kernel-default-devel-5.14.21-150400.24.170.2.x86_64",
            "SUSE Manager Server 4.3:kernel-devel-5.14.21-150400.24.170.1.noarch",
            "SUSE Manager Server 4.3:kernel-macros-5.14.21-150400.24.170.1.noarch",
            "SUSE Manager Server 4.3:kernel-source-5.14.21-150400.24.170.1.noarch",
            "SUSE Manager Server 4.3:kernel-syms-5.14.21-150400.24.170.1.ppc64le",
            "SUSE Manager Server 4.3:kernel-syms-5.14.21-150400.24.170.1.s390x",
            "SUSE Manager Server 4.3:kernel-syms-5.14.21-150400.24.170.1.x86_64",
            "SUSE Manager Server 4.3:kernel-zfcpdump-5.14.21-150400.24.170.2.s390x"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2025-07-28T15:09:33Z",
          "details": "moderate"
        }
      ],
      "title": "CVE-2023-53097"
    },
    {
      "cve": "CVE-2024-26808",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2024-26808"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "In the Linux kernel, the following vulnerability has been resolved:\n\nnetfilter: nft_chain_filter: handle NETDEV_UNREGISTER for inet/ingress basechain\n\nRemove netdevice from inet/ingress basechain in case NETDEV_UNREGISTER\nevent is reported, otherwise a stale reference to netdevice remains in\nthe hook list.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.170.2.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.170.2.s390x",
          "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.170.2.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.170.2.s390x",
          "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.170.2.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.170.2.s390x",
          "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.170.2.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.170.2.s390x",
          "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-64kb-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-64kb-devel-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-devel-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-devel-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-devel-5.14.21-150400.24.170.1.noarch",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-docs-5.14.21-150400.24.170.1.noarch",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-macros-5.14.21-150400.24.170.1.noarch",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-obs-build-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-obs-build-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-source-5.14.21-150400.24.170.1.noarch",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-syms-5.14.21-150400.24.170.1.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-syms-5.14.21-150400.24.170.1.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:reiserfs-kmp-default-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:reiserfs-kmp-default-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-64kb-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-64kb-devel-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-devel-5.14.21-150400.24.170.1.noarch",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-docs-5.14.21-150400.24.170.1.noarch",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-macros-5.14.21-150400.24.170.1.noarch",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-source-5.14.21-150400.24.170.1.noarch",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.170.1.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.170.1.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.170.2.ppc64le",
          "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.170.2.s390x",
          "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.170.2.ppc64le",
          "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.170.2.s390x",
          "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_170-default-1-150400.9.3.2.ppc64le",
          "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_170-default-1-150400.9.3.2.s390x",
          "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_170-default-1-150400.9.3.2.x86_64",
          "SUSE Linux Enterprise Micro 5.3:kernel-default-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise Micro 5.3:kernel-default-5.14.21-150400.24.170.2.s390x",
          "SUSE Linux Enterprise Micro 5.3:kernel-default-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise Micro 5.3:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.aarch64",
          "SUSE Linux Enterprise Micro 5.3:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
          "SUSE Linux Enterprise Micro 5.4:kernel-default-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise Micro 5.4:kernel-default-5.14.21-150400.24.170.2.s390x",
          "SUSE Linux Enterprise Micro 5.4:kernel-default-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise Micro 5.4:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.aarch64",
          "SUSE Linux Enterprise Micro 5.4:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-64kb-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-64kb-devel-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-5.14.21-150400.24.170.2.ppc64le",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-5.14.21-150400.24.170.2.s390x",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.aarch64",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.ppc64le",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.170.2.ppc64le",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.170.2.s390x",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-devel-5.14.21-150400.24.170.1.noarch",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-docs-5.14.21-150400.24.170.1.noarch",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-macros-5.14.21-150400.24.170.1.noarch",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.170.2.ppc64le",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.170.2.s390x",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-source-5.14.21-150400.24.170.1.noarch",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.170.1.aarch64",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.170.1.ppc64le",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.170.1.s390x",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.170.1.x86_64",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-zfcpdump-5.14.21-150400.24.170.2.s390x",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.170.2.ppc64le",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.170.2.s390x",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-5.14.21-150400.24.170.2.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-devel-5.14.21-150400.24.170.2.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-devel-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-devel-5.14.21-150400.24.170.1.noarch",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-docs-5.14.21-150400.24.170.1.noarch",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-macros-5.14.21-150400.24.170.1.noarch",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-obs-build-5.14.21-150400.24.170.2.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-obs-build-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-source-5.14.21-150400.24.170.1.noarch",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-syms-5.14.21-150400.24.170.1.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-syms-5.14.21-150400.24.170.1.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.170.2.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.170.2.x86_64",
          "SUSE Manager Proxy 4.3:kernel-default-5.14.21-150400.24.170.2.x86_64",
          "SUSE Manager Proxy 4.3:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
          "SUSE Manager Proxy 4.3:kernel-default-devel-5.14.21-150400.24.170.2.x86_64",
          "SUSE Manager Proxy 4.3:kernel-devel-5.14.21-150400.24.170.1.noarch",
          "SUSE Manager Proxy 4.3:kernel-macros-5.14.21-150400.24.170.1.noarch",
          "SUSE Manager Proxy 4.3:kernel-source-5.14.21-150400.24.170.1.noarch",
          "SUSE Manager Proxy 4.3:kernel-syms-5.14.21-150400.24.170.1.x86_64",
          "SUSE Manager Server 4.3:kernel-default-5.14.21-150400.24.170.2.ppc64le",
          "SUSE Manager Server 4.3:kernel-default-5.14.21-150400.24.170.2.s390x",
          "SUSE Manager Server 4.3:kernel-default-5.14.21-150400.24.170.2.x86_64",
          "SUSE Manager Server 4.3:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.ppc64le",
          "SUSE Manager Server 4.3:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
          "SUSE Manager Server 4.3:kernel-default-devel-5.14.21-150400.24.170.2.ppc64le",
          "SUSE Manager Server 4.3:kernel-default-devel-5.14.21-150400.24.170.2.s390x",
          "SUSE Manager Server 4.3:kernel-default-devel-5.14.21-150400.24.170.2.x86_64",
          "SUSE Manager Server 4.3:kernel-devel-5.14.21-150400.24.170.1.noarch",
          "SUSE Manager Server 4.3:kernel-macros-5.14.21-150400.24.170.1.noarch",
          "SUSE Manager Server 4.3:kernel-source-5.14.21-150400.24.170.1.noarch",
          "SUSE Manager Server 4.3:kernel-syms-5.14.21-150400.24.170.1.ppc64le",
          "SUSE Manager Server 4.3:kernel-syms-5.14.21-150400.24.170.1.s390x",
          "SUSE Manager Server 4.3:kernel-syms-5.14.21-150400.24.170.1.x86_64",
          "SUSE Manager Server 4.3:kernel-zfcpdump-5.14.21-150400.24.170.2.s390x"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2024-26808",
          "url": "https://www.suse.com/security/cve/CVE-2024-26808"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1222634 for CVE-2024-26808",
          "url": "https://bugzilla.suse.com/1222634"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-64kb-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-64kb-devel-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-devel-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-devel-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-devel-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-docs-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-macros-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-obs-build-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-obs-build-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-source-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-syms-5.14.21-150400.24.170.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-syms-5.14.21-150400.24.170.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:reiserfs-kmp-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:reiserfs-kmp-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-64kb-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-64kb-devel-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-devel-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-docs-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-macros-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-source-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.170.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.170.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_170-default-1-150400.9.3.2.ppc64le",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_170-default-1-150400.9.3.2.s390x",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_170-default-1-150400.9.3.2.x86_64",
            "SUSE Linux Enterprise Micro 5.3:kernel-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise Micro 5.3:kernel-default-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise Micro 5.3:kernel-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Micro 5.3:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.aarch64",
            "SUSE Linux Enterprise Micro 5.3:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
            "SUSE Linux Enterprise Micro 5.4:kernel-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise Micro 5.4:kernel-default-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise Micro 5.4:kernel-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Micro 5.4:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.aarch64",
            "SUSE Linux Enterprise Micro 5.4:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-64kb-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-64kb-devel-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.aarch64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.ppc64le",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-devel-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-docs-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-macros-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-source-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.170.1.aarch64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.170.1.ppc64le",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.170.1.s390x",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.170.1.x86_64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-zfcpdump-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-devel-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-devel-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-devel-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-docs-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-macros-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-obs-build-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-obs-build-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-source-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-syms-5.14.21-150400.24.170.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-syms-5.14.21-150400.24.170.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Manager Proxy 4.3:kernel-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Manager Proxy 4.3:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
            "SUSE Manager Proxy 4.3:kernel-default-devel-5.14.21-150400.24.170.2.x86_64",
            "SUSE Manager Proxy 4.3:kernel-devel-5.14.21-150400.24.170.1.noarch",
            "SUSE Manager Proxy 4.3:kernel-macros-5.14.21-150400.24.170.1.noarch",
            "SUSE Manager Proxy 4.3:kernel-source-5.14.21-150400.24.170.1.noarch",
            "SUSE Manager Proxy 4.3:kernel-syms-5.14.21-150400.24.170.1.x86_64",
            "SUSE Manager Server 4.3:kernel-default-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Manager Server 4.3:kernel-default-5.14.21-150400.24.170.2.s390x",
            "SUSE Manager Server 4.3:kernel-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Manager Server 4.3:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.ppc64le",
            "SUSE Manager Server 4.3:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
            "SUSE Manager Server 4.3:kernel-default-devel-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Manager Server 4.3:kernel-default-devel-5.14.21-150400.24.170.2.s390x",
            "SUSE Manager Server 4.3:kernel-default-devel-5.14.21-150400.24.170.2.x86_64",
            "SUSE Manager Server 4.3:kernel-devel-5.14.21-150400.24.170.1.noarch",
            "SUSE Manager Server 4.3:kernel-macros-5.14.21-150400.24.170.1.noarch",
            "SUSE Manager Server 4.3:kernel-source-5.14.21-150400.24.170.1.noarch",
            "SUSE Manager Server 4.3:kernel-syms-5.14.21-150400.24.170.1.ppc64le",
            "SUSE Manager Server 4.3:kernel-syms-5.14.21-150400.24.170.1.s390x",
            "SUSE Manager Server 4.3:kernel-syms-5.14.21-150400.24.170.1.x86_64",
            "SUSE Manager Server 4.3:kernel-zfcpdump-5.14.21-150400.24.170.2.s390x"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 7.8,
            "baseSeverity": "HIGH",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
            "version": "3.1"
          },
          "products": [
            "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-64kb-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-64kb-devel-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-devel-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-devel-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-devel-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-docs-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-macros-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-obs-build-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-obs-build-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-source-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-syms-5.14.21-150400.24.170.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-syms-5.14.21-150400.24.170.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:reiserfs-kmp-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:reiserfs-kmp-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-64kb-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-64kb-devel-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-devel-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-docs-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-macros-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-source-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.170.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.170.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_170-default-1-150400.9.3.2.ppc64le",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_170-default-1-150400.9.3.2.s390x",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_170-default-1-150400.9.3.2.x86_64",
            "SUSE Linux Enterprise Micro 5.3:kernel-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise Micro 5.3:kernel-default-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise Micro 5.3:kernel-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Micro 5.3:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.aarch64",
            "SUSE Linux Enterprise Micro 5.3:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
            "SUSE Linux Enterprise Micro 5.4:kernel-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise Micro 5.4:kernel-default-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise Micro 5.4:kernel-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Micro 5.4:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.aarch64",
            "SUSE Linux Enterprise Micro 5.4:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-64kb-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-64kb-devel-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.aarch64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.ppc64le",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-devel-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-docs-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-macros-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-source-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.170.1.aarch64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.170.1.ppc64le",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.170.1.s390x",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.170.1.x86_64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-zfcpdump-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-devel-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-devel-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-devel-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-docs-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-macros-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-obs-build-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-obs-build-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-source-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-syms-5.14.21-150400.24.170.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-syms-5.14.21-150400.24.170.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Manager Proxy 4.3:kernel-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Manager Proxy 4.3:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
            "SUSE Manager Proxy 4.3:kernel-default-devel-5.14.21-150400.24.170.2.x86_64",
            "SUSE Manager Proxy 4.3:kernel-devel-5.14.21-150400.24.170.1.noarch",
            "SUSE Manager Proxy 4.3:kernel-macros-5.14.21-150400.24.170.1.noarch",
            "SUSE Manager Proxy 4.3:kernel-source-5.14.21-150400.24.170.1.noarch",
            "SUSE Manager Proxy 4.3:kernel-syms-5.14.21-150400.24.170.1.x86_64",
            "SUSE Manager Server 4.3:kernel-default-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Manager Server 4.3:kernel-default-5.14.21-150400.24.170.2.s390x",
            "SUSE Manager Server 4.3:kernel-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Manager Server 4.3:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.ppc64le",
            "SUSE Manager Server 4.3:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
            "SUSE Manager Server 4.3:kernel-default-devel-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Manager Server 4.3:kernel-default-devel-5.14.21-150400.24.170.2.s390x",
            "SUSE Manager Server 4.3:kernel-default-devel-5.14.21-150400.24.170.2.x86_64",
            "SUSE Manager Server 4.3:kernel-devel-5.14.21-150400.24.170.1.noarch",
            "SUSE Manager Server 4.3:kernel-macros-5.14.21-150400.24.170.1.noarch",
            "SUSE Manager Server 4.3:kernel-source-5.14.21-150400.24.170.1.noarch",
            "SUSE Manager Server 4.3:kernel-syms-5.14.21-150400.24.170.1.ppc64le",
            "SUSE Manager Server 4.3:kernel-syms-5.14.21-150400.24.170.1.s390x",
            "SUSE Manager Server 4.3:kernel-syms-5.14.21-150400.24.170.1.x86_64",
            "SUSE Manager Server 4.3:kernel-zfcpdump-5.14.21-150400.24.170.2.s390x"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2025-07-28T15:09:33Z",
          "details": "important"
        }
      ],
      "title": "CVE-2024-26808"
    },
    {
      "cve": "CVE-2024-26924",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2024-26924"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "In the Linux kernel, the following vulnerability has been resolved:\n\nnetfilter: nft_set_pipapo: do not free live element\n\nPablo reports a crash with large batches of elements with a\nback-to-back add/remove pattern.  Quoting Pablo:\n\n  add_elem(\"00000000\") timeout 100 ms\n  ...\n  add_elem(\"0000000X\") timeout 100 ms\n  del_elem(\"0000000X\") \u003c---------------- delete one that was just added\n  ...\n  add_elem(\"00005000\") timeout 100 ms\n\n  1) nft_pipapo_remove() removes element 0000000X\n  Then, KASAN shows a splat.\n\nLooking at the remove function there is a chance that we will drop a\nrule that maps to a non-deactivated element.\n\nRemoval happens in two steps, first we do a lookup for key k and return the\nto-be-removed element and mark it as inactive in the next generation.\nThen, in a second step, the element gets removed from the set/map.\n\nThe _remove function does not work correctly if we have more than one\nelement that share the same key.\n\nThis can happen if we insert an element into a set when the set already\nholds an element with same key, but the element mapping to the existing\nkey has timed out or is not active in the next generation.\n\nIn such case its possible that removal will unmap the wrong element.\nIf this happens, we will leak the non-deactivated element, it becomes\nunreachable.\n\nThe element that got deactivated (and will be freed later) will\nremain reachable in the set data structure, this can result in\na crash when such an element is retrieved during lookup (stale\npointer).\n\nAdd a check that the fully matching key does in fact map to the element\nthat we have marked as inactive in the deactivation step.\nIf not, we need to continue searching.\n\nAdd a bug/warn trap at the end of the function as well, the remove\nfunction must not ever be called with an invisible/unreachable/non-existent\nelement.\n\nv2: avoid uneeded temporary variable (Stefano)",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.170.2.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.170.2.s390x",
          "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.170.2.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.170.2.s390x",
          "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.170.2.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.170.2.s390x",
          "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.170.2.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.170.2.s390x",
          "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-64kb-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-64kb-devel-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-devel-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-devel-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-devel-5.14.21-150400.24.170.1.noarch",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-docs-5.14.21-150400.24.170.1.noarch",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-macros-5.14.21-150400.24.170.1.noarch",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-obs-build-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-obs-build-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-source-5.14.21-150400.24.170.1.noarch",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-syms-5.14.21-150400.24.170.1.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-syms-5.14.21-150400.24.170.1.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:reiserfs-kmp-default-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:reiserfs-kmp-default-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-64kb-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-64kb-devel-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-devel-5.14.21-150400.24.170.1.noarch",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-docs-5.14.21-150400.24.170.1.noarch",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-macros-5.14.21-150400.24.170.1.noarch",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-source-5.14.21-150400.24.170.1.noarch",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.170.1.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.170.1.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.170.2.ppc64le",
          "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.170.2.s390x",
          "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.170.2.ppc64le",
          "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.170.2.s390x",
          "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_170-default-1-150400.9.3.2.ppc64le",
          "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_170-default-1-150400.9.3.2.s390x",
          "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_170-default-1-150400.9.3.2.x86_64",
          "SUSE Linux Enterprise Micro 5.3:kernel-default-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise Micro 5.3:kernel-default-5.14.21-150400.24.170.2.s390x",
          "SUSE Linux Enterprise Micro 5.3:kernel-default-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise Micro 5.3:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.aarch64",
          "SUSE Linux Enterprise Micro 5.3:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
          "SUSE Linux Enterprise Micro 5.4:kernel-default-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise Micro 5.4:kernel-default-5.14.21-150400.24.170.2.s390x",
          "SUSE Linux Enterprise Micro 5.4:kernel-default-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise Micro 5.4:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.aarch64",
          "SUSE Linux Enterprise Micro 5.4:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-64kb-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-64kb-devel-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-5.14.21-150400.24.170.2.ppc64le",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-5.14.21-150400.24.170.2.s390x",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.aarch64",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.ppc64le",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.170.2.ppc64le",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.170.2.s390x",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-devel-5.14.21-150400.24.170.1.noarch",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-docs-5.14.21-150400.24.170.1.noarch",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-macros-5.14.21-150400.24.170.1.noarch",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.170.2.ppc64le",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.170.2.s390x",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-source-5.14.21-150400.24.170.1.noarch",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.170.1.aarch64",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.170.1.ppc64le",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.170.1.s390x",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.170.1.x86_64",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-zfcpdump-5.14.21-150400.24.170.2.s390x",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.170.2.ppc64le",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.170.2.s390x",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-5.14.21-150400.24.170.2.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-devel-5.14.21-150400.24.170.2.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-devel-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-devel-5.14.21-150400.24.170.1.noarch",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-docs-5.14.21-150400.24.170.1.noarch",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-macros-5.14.21-150400.24.170.1.noarch",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-obs-build-5.14.21-150400.24.170.2.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-obs-build-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-source-5.14.21-150400.24.170.1.noarch",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-syms-5.14.21-150400.24.170.1.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-syms-5.14.21-150400.24.170.1.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.170.2.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.170.2.x86_64",
          "SUSE Manager Proxy 4.3:kernel-default-5.14.21-150400.24.170.2.x86_64",
          "SUSE Manager Proxy 4.3:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
          "SUSE Manager Proxy 4.3:kernel-default-devel-5.14.21-150400.24.170.2.x86_64",
          "SUSE Manager Proxy 4.3:kernel-devel-5.14.21-150400.24.170.1.noarch",
          "SUSE Manager Proxy 4.3:kernel-macros-5.14.21-150400.24.170.1.noarch",
          "SUSE Manager Proxy 4.3:kernel-source-5.14.21-150400.24.170.1.noarch",
          "SUSE Manager Proxy 4.3:kernel-syms-5.14.21-150400.24.170.1.x86_64",
          "SUSE Manager Server 4.3:kernel-default-5.14.21-150400.24.170.2.ppc64le",
          "SUSE Manager Server 4.3:kernel-default-5.14.21-150400.24.170.2.s390x",
          "SUSE Manager Server 4.3:kernel-default-5.14.21-150400.24.170.2.x86_64",
          "SUSE Manager Server 4.3:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.ppc64le",
          "SUSE Manager Server 4.3:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
          "SUSE Manager Server 4.3:kernel-default-devel-5.14.21-150400.24.170.2.ppc64le",
          "SUSE Manager Server 4.3:kernel-default-devel-5.14.21-150400.24.170.2.s390x",
          "SUSE Manager Server 4.3:kernel-default-devel-5.14.21-150400.24.170.2.x86_64",
          "SUSE Manager Server 4.3:kernel-devel-5.14.21-150400.24.170.1.noarch",
          "SUSE Manager Server 4.3:kernel-macros-5.14.21-150400.24.170.1.noarch",
          "SUSE Manager Server 4.3:kernel-source-5.14.21-150400.24.170.1.noarch",
          "SUSE Manager Server 4.3:kernel-syms-5.14.21-150400.24.170.1.ppc64le",
          "SUSE Manager Server 4.3:kernel-syms-5.14.21-150400.24.170.1.s390x",
          "SUSE Manager Server 4.3:kernel-syms-5.14.21-150400.24.170.1.x86_64",
          "SUSE Manager Server 4.3:kernel-zfcpdump-5.14.21-150400.24.170.2.s390x"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2024-26924",
          "url": "https://www.suse.com/security/cve/CVE-2024-26924"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1223387 for CVE-2024-26924",
          "url": "https://bugzilla.suse.com/1223387"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-64kb-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-64kb-devel-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-devel-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-devel-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-devel-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-docs-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-macros-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-obs-build-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-obs-build-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-source-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-syms-5.14.21-150400.24.170.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-syms-5.14.21-150400.24.170.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:reiserfs-kmp-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:reiserfs-kmp-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-64kb-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-64kb-devel-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-devel-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-docs-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-macros-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-source-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.170.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.170.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_170-default-1-150400.9.3.2.ppc64le",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_170-default-1-150400.9.3.2.s390x",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_170-default-1-150400.9.3.2.x86_64",
            "SUSE Linux Enterprise Micro 5.3:kernel-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise Micro 5.3:kernel-default-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise Micro 5.3:kernel-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Micro 5.3:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.aarch64",
            "SUSE Linux Enterprise Micro 5.3:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
            "SUSE Linux Enterprise Micro 5.4:kernel-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise Micro 5.4:kernel-default-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise Micro 5.4:kernel-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Micro 5.4:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.aarch64",
            "SUSE Linux Enterprise Micro 5.4:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-64kb-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-64kb-devel-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.aarch64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.ppc64le",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-devel-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-docs-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-macros-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-source-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.170.1.aarch64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.170.1.ppc64le",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.170.1.s390x",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.170.1.x86_64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-zfcpdump-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-devel-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-devel-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-devel-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-docs-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-macros-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-obs-build-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-obs-build-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-source-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-syms-5.14.21-150400.24.170.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-syms-5.14.21-150400.24.170.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Manager Proxy 4.3:kernel-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Manager Proxy 4.3:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
            "SUSE Manager Proxy 4.3:kernel-default-devel-5.14.21-150400.24.170.2.x86_64",
            "SUSE Manager Proxy 4.3:kernel-devel-5.14.21-150400.24.170.1.noarch",
            "SUSE Manager Proxy 4.3:kernel-macros-5.14.21-150400.24.170.1.noarch",
            "SUSE Manager Proxy 4.3:kernel-source-5.14.21-150400.24.170.1.noarch",
            "SUSE Manager Proxy 4.3:kernel-syms-5.14.21-150400.24.170.1.x86_64",
            "SUSE Manager Server 4.3:kernel-default-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Manager Server 4.3:kernel-default-5.14.21-150400.24.170.2.s390x",
            "SUSE Manager Server 4.3:kernel-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Manager Server 4.3:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.ppc64le",
            "SUSE Manager Server 4.3:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
            "SUSE Manager Server 4.3:kernel-default-devel-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Manager Server 4.3:kernel-default-devel-5.14.21-150400.24.170.2.s390x",
            "SUSE Manager Server 4.3:kernel-default-devel-5.14.21-150400.24.170.2.x86_64",
            "SUSE Manager Server 4.3:kernel-devel-5.14.21-150400.24.170.1.noarch",
            "SUSE Manager Server 4.3:kernel-macros-5.14.21-150400.24.170.1.noarch",
            "SUSE Manager Server 4.3:kernel-source-5.14.21-150400.24.170.1.noarch",
            "SUSE Manager Server 4.3:kernel-syms-5.14.21-150400.24.170.1.ppc64le",
            "SUSE Manager Server 4.3:kernel-syms-5.14.21-150400.24.170.1.s390x",
            "SUSE Manager Server 4.3:kernel-syms-5.14.21-150400.24.170.1.x86_64",
            "SUSE Manager Server 4.3:kernel-zfcpdump-5.14.21-150400.24.170.2.s390x"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 6.7,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H",
            "version": "3.1"
          },
          "products": [
            "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-64kb-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-64kb-devel-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-devel-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-devel-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-devel-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-docs-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-macros-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-obs-build-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-obs-build-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-source-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-syms-5.14.21-150400.24.170.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-syms-5.14.21-150400.24.170.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:reiserfs-kmp-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:reiserfs-kmp-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-64kb-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-64kb-devel-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-devel-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-docs-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-macros-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-source-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.170.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.170.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_170-default-1-150400.9.3.2.ppc64le",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_170-default-1-150400.9.3.2.s390x",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_170-default-1-150400.9.3.2.x86_64",
            "SUSE Linux Enterprise Micro 5.3:kernel-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise Micro 5.3:kernel-default-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise Micro 5.3:kernel-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Micro 5.3:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.aarch64",
            "SUSE Linux Enterprise Micro 5.3:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
            "SUSE Linux Enterprise Micro 5.4:kernel-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise Micro 5.4:kernel-default-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise Micro 5.4:kernel-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Micro 5.4:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.aarch64",
            "SUSE Linux Enterprise Micro 5.4:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-64kb-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-64kb-devel-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.aarch64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.ppc64le",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-devel-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-docs-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-macros-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-source-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.170.1.aarch64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.170.1.ppc64le",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.170.1.s390x",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.170.1.x86_64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-zfcpdump-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-devel-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-devel-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-devel-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-docs-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-macros-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-obs-build-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-obs-build-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-source-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-syms-5.14.21-150400.24.170.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-syms-5.14.21-150400.24.170.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Manager Proxy 4.3:kernel-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Manager Proxy 4.3:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
            "SUSE Manager Proxy 4.3:kernel-default-devel-5.14.21-150400.24.170.2.x86_64",
            "SUSE Manager Proxy 4.3:kernel-devel-5.14.21-150400.24.170.1.noarch",
            "SUSE Manager Proxy 4.3:kernel-macros-5.14.21-150400.24.170.1.noarch",
            "SUSE Manager Proxy 4.3:kernel-source-5.14.21-150400.24.170.1.noarch",
            "SUSE Manager Proxy 4.3:kernel-syms-5.14.21-150400.24.170.1.x86_64",
            "SUSE Manager Server 4.3:kernel-default-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Manager Server 4.3:kernel-default-5.14.21-150400.24.170.2.s390x",
            "SUSE Manager Server 4.3:kernel-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Manager Server 4.3:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.ppc64le",
            "SUSE Manager Server 4.3:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
            "SUSE Manager Server 4.3:kernel-default-devel-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Manager Server 4.3:kernel-default-devel-5.14.21-150400.24.170.2.s390x",
            "SUSE Manager Server 4.3:kernel-default-devel-5.14.21-150400.24.170.2.x86_64",
            "SUSE Manager Server 4.3:kernel-devel-5.14.21-150400.24.170.1.noarch",
            "SUSE Manager Server 4.3:kernel-macros-5.14.21-150400.24.170.1.noarch",
            "SUSE Manager Server 4.3:kernel-source-5.14.21-150400.24.170.1.noarch",
            "SUSE Manager Server 4.3:kernel-syms-5.14.21-150400.24.170.1.ppc64le",
            "SUSE Manager Server 4.3:kernel-syms-5.14.21-150400.24.170.1.s390x",
            "SUSE Manager Server 4.3:kernel-syms-5.14.21-150400.24.170.1.x86_64",
            "SUSE Manager Server 4.3:kernel-zfcpdump-5.14.21-150400.24.170.2.s390x"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2025-07-28T15:09:33Z",
          "details": "moderate"
        }
      ],
      "title": "CVE-2024-26924"
    },
    {
      "cve": "CVE-2024-26935",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2024-26935"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "In the Linux kernel, the following vulnerability has been resolved:\n\nscsi: core: Fix unremoved procfs host directory regression\n\nCommit fc663711b944 (\"scsi: core: Remove the /proc/scsi/${proc_name}\ndirectory earlier\") fixed a bug related to modules loading/unloading, by\nadding a call to scsi_proc_hostdir_rm() on scsi_remove_host(). But that led\nto a potential duplicate call to the hostdir_rm() routine, since it\u0027s also\ncalled from scsi_host_dev_release(). That triggered a regression report,\nwhich was then fixed by commit be03df3d4bfe (\"scsi: core: Fix a procfs host\ndirectory removal regression\"). The fix just dropped the hostdir_rm() call\nfrom dev_release().\n\nBut it happens that this proc directory is created on scsi_host_alloc(),\nand that function \"pairs\" with scsi_host_dev_release(), while\nscsi_remove_host() pairs with scsi_add_host(). In other words, it seems the\nreason for removing the proc directory on dev_release() was meant to cover\ncases in which a SCSI host structure was allocated, but the call to\nscsi_add_host() didn\u0027t happen. And that pattern happens to exist in some\nerror paths, for example.\n\nSyzkaller causes that by using USB raw gadget device, error\u0027ing on\nusb-storage driver, at usb_stor_probe2(). By checking that path, we can see\nthat the BadDevice label leads to a scsi_host_put() after a SCSI host\nallocation, but there\u0027s no call to scsi_add_host() in such path. That leads\nto messages like this in dmesg (and a leak of the SCSI host proc\nstructure):\n\nusb-storage 4-1:87.51: USB Mass Storage device detected\nproc_dir_entry \u0027scsi/usb-storage\u0027 already registered\nWARNING: CPU: 1 PID: 3519 at fs/proc/generic.c:377 proc_register+0x347/0x4e0 fs/proc/generic.c:376\n\nThe proper fix seems to still call scsi_proc_hostdir_rm() on dev_release(),\nbut guard that with the state check for SHOST_CREATED; there is even a\ncomment in scsi_host_dev_release() detailing that: such conditional is\nmeant for cases where the SCSI host was allocated but there was no calls to\n{add,remove}_host(), like the usb-storage case.\n\nThis is what we propose here and with that, the error path of usb-storage\ndoes not trigger the warning anymore.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.170.2.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.170.2.s390x",
          "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.170.2.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.170.2.s390x",
          "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.170.2.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.170.2.s390x",
          "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.170.2.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.170.2.s390x",
          "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-64kb-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-64kb-devel-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-devel-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-devel-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-devel-5.14.21-150400.24.170.1.noarch",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-docs-5.14.21-150400.24.170.1.noarch",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-macros-5.14.21-150400.24.170.1.noarch",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-obs-build-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-obs-build-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-source-5.14.21-150400.24.170.1.noarch",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-syms-5.14.21-150400.24.170.1.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-syms-5.14.21-150400.24.170.1.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:reiserfs-kmp-default-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:reiserfs-kmp-default-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-64kb-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-64kb-devel-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-devel-5.14.21-150400.24.170.1.noarch",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-docs-5.14.21-150400.24.170.1.noarch",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-macros-5.14.21-150400.24.170.1.noarch",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-source-5.14.21-150400.24.170.1.noarch",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.170.1.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.170.1.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.170.2.ppc64le",
          "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.170.2.s390x",
          "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.170.2.ppc64le",
          "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.170.2.s390x",
          "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_170-default-1-150400.9.3.2.ppc64le",
          "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_170-default-1-150400.9.3.2.s390x",
          "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_170-default-1-150400.9.3.2.x86_64",
          "SUSE Linux Enterprise Micro 5.3:kernel-default-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise Micro 5.3:kernel-default-5.14.21-150400.24.170.2.s390x",
          "SUSE Linux Enterprise Micro 5.3:kernel-default-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise Micro 5.3:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.aarch64",
          "SUSE Linux Enterprise Micro 5.3:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
          "SUSE Linux Enterprise Micro 5.4:kernel-default-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise Micro 5.4:kernel-default-5.14.21-150400.24.170.2.s390x",
          "SUSE Linux Enterprise Micro 5.4:kernel-default-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise Micro 5.4:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.aarch64",
          "SUSE Linux Enterprise Micro 5.4:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-64kb-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-64kb-devel-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-5.14.21-150400.24.170.2.ppc64le",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-5.14.21-150400.24.170.2.s390x",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.aarch64",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.ppc64le",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.170.2.ppc64le",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.170.2.s390x",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-devel-5.14.21-150400.24.170.1.noarch",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-docs-5.14.21-150400.24.170.1.noarch",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-macros-5.14.21-150400.24.170.1.noarch",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.170.2.ppc64le",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.170.2.s390x",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-source-5.14.21-150400.24.170.1.noarch",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.170.1.aarch64",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.170.1.ppc64le",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.170.1.s390x",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.170.1.x86_64",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-zfcpdump-5.14.21-150400.24.170.2.s390x",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.170.2.ppc64le",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.170.2.s390x",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-5.14.21-150400.24.170.2.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-devel-5.14.21-150400.24.170.2.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-devel-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-devel-5.14.21-150400.24.170.1.noarch",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-docs-5.14.21-150400.24.170.1.noarch",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-macros-5.14.21-150400.24.170.1.noarch",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-obs-build-5.14.21-150400.24.170.2.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-obs-build-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-source-5.14.21-150400.24.170.1.noarch",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-syms-5.14.21-150400.24.170.1.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-syms-5.14.21-150400.24.170.1.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.170.2.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.170.2.x86_64",
          "SUSE Manager Proxy 4.3:kernel-default-5.14.21-150400.24.170.2.x86_64",
          "SUSE Manager Proxy 4.3:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
          "SUSE Manager Proxy 4.3:kernel-default-devel-5.14.21-150400.24.170.2.x86_64",
          "SUSE Manager Proxy 4.3:kernel-devel-5.14.21-150400.24.170.1.noarch",
          "SUSE Manager Proxy 4.3:kernel-macros-5.14.21-150400.24.170.1.noarch",
          "SUSE Manager Proxy 4.3:kernel-source-5.14.21-150400.24.170.1.noarch",
          "SUSE Manager Proxy 4.3:kernel-syms-5.14.21-150400.24.170.1.x86_64",
          "SUSE Manager Server 4.3:kernel-default-5.14.21-150400.24.170.2.ppc64le",
          "SUSE Manager Server 4.3:kernel-default-5.14.21-150400.24.170.2.s390x",
          "SUSE Manager Server 4.3:kernel-default-5.14.21-150400.24.170.2.x86_64",
          "SUSE Manager Server 4.3:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.ppc64le",
          "SUSE Manager Server 4.3:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
          "SUSE Manager Server 4.3:kernel-default-devel-5.14.21-150400.24.170.2.ppc64le",
          "SUSE Manager Server 4.3:kernel-default-devel-5.14.21-150400.24.170.2.s390x",
          "SUSE Manager Server 4.3:kernel-default-devel-5.14.21-150400.24.170.2.x86_64",
          "SUSE Manager Server 4.3:kernel-devel-5.14.21-150400.24.170.1.noarch",
          "SUSE Manager Server 4.3:kernel-macros-5.14.21-150400.24.170.1.noarch",
          "SUSE Manager Server 4.3:kernel-source-5.14.21-150400.24.170.1.noarch",
          "SUSE Manager Server 4.3:kernel-syms-5.14.21-150400.24.170.1.ppc64le",
          "SUSE Manager Server 4.3:kernel-syms-5.14.21-150400.24.170.1.s390x",
          "SUSE Manager Server 4.3:kernel-syms-5.14.21-150400.24.170.1.x86_64",
          "SUSE Manager Server 4.3:kernel-zfcpdump-5.14.21-150400.24.170.2.s390x"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2024-26935",
          "url": "https://www.suse.com/security/cve/CVE-2024-26935"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1223675 for CVE-2024-26935",
          "url": "https://bugzilla.suse.com/1223675"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-64kb-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-64kb-devel-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-devel-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-devel-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-devel-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-docs-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-macros-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-obs-build-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-obs-build-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-source-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-syms-5.14.21-150400.24.170.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-syms-5.14.21-150400.24.170.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:reiserfs-kmp-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:reiserfs-kmp-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-64kb-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-64kb-devel-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-devel-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-docs-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-macros-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-source-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.170.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.170.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_170-default-1-150400.9.3.2.ppc64le",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_170-default-1-150400.9.3.2.s390x",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_170-default-1-150400.9.3.2.x86_64",
            "SUSE Linux Enterprise Micro 5.3:kernel-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise Micro 5.3:kernel-default-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise Micro 5.3:kernel-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Micro 5.3:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.aarch64",
            "SUSE Linux Enterprise Micro 5.3:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
            "SUSE Linux Enterprise Micro 5.4:kernel-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise Micro 5.4:kernel-default-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise Micro 5.4:kernel-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Micro 5.4:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.aarch64",
            "SUSE Linux Enterprise Micro 5.4:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-64kb-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-64kb-devel-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.aarch64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.ppc64le",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-devel-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-docs-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-macros-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-source-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.170.1.aarch64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.170.1.ppc64le",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.170.1.s390x",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.170.1.x86_64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-zfcpdump-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-devel-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-devel-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-devel-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-docs-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-macros-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-obs-build-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-obs-build-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-source-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-syms-5.14.21-150400.24.170.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-syms-5.14.21-150400.24.170.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Manager Proxy 4.3:kernel-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Manager Proxy 4.3:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
            "SUSE Manager Proxy 4.3:kernel-default-devel-5.14.21-150400.24.170.2.x86_64",
            "SUSE Manager Proxy 4.3:kernel-devel-5.14.21-150400.24.170.1.noarch",
            "SUSE Manager Proxy 4.3:kernel-macros-5.14.21-150400.24.170.1.noarch",
            "SUSE Manager Proxy 4.3:kernel-source-5.14.21-150400.24.170.1.noarch",
            "SUSE Manager Proxy 4.3:kernel-syms-5.14.21-150400.24.170.1.x86_64",
            "SUSE Manager Server 4.3:kernel-default-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Manager Server 4.3:kernel-default-5.14.21-150400.24.170.2.s390x",
            "SUSE Manager Server 4.3:kernel-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Manager Server 4.3:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.ppc64le",
            "SUSE Manager Server 4.3:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
            "SUSE Manager Server 4.3:kernel-default-devel-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Manager Server 4.3:kernel-default-devel-5.14.21-150400.24.170.2.s390x",
            "SUSE Manager Server 4.3:kernel-default-devel-5.14.21-150400.24.170.2.x86_64",
            "SUSE Manager Server 4.3:kernel-devel-5.14.21-150400.24.170.1.noarch",
            "SUSE Manager Server 4.3:kernel-macros-5.14.21-150400.24.170.1.noarch",
            "SUSE Manager Server 4.3:kernel-source-5.14.21-150400.24.170.1.noarch",
            "SUSE Manager Server 4.3:kernel-syms-5.14.21-150400.24.170.1.ppc64le",
            "SUSE Manager Server 4.3:kernel-syms-5.14.21-150400.24.170.1.s390x",
            "SUSE Manager Server 4.3:kernel-syms-5.14.21-150400.24.170.1.x86_64",
            "SUSE Manager Server 4.3:kernel-zfcpdump-5.14.21-150400.24.170.2.s390x"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 3.3,
            "baseSeverity": "LOW",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L",
            "version": "3.1"
          },
          "products": [
            "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-64kb-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-64kb-devel-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-devel-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-devel-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-devel-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-docs-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-macros-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-obs-build-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-obs-build-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-source-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-syms-5.14.21-150400.24.170.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-syms-5.14.21-150400.24.170.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:reiserfs-kmp-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:reiserfs-kmp-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-64kb-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-64kb-devel-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-devel-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-docs-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-macros-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-source-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.170.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.170.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_170-default-1-150400.9.3.2.ppc64le",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_170-default-1-150400.9.3.2.s390x",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_170-default-1-150400.9.3.2.x86_64",
            "SUSE Linux Enterprise Micro 5.3:kernel-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise Micro 5.3:kernel-default-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise Micro 5.3:kernel-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Micro 5.3:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.aarch64",
            "SUSE Linux Enterprise Micro 5.3:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
            "SUSE Linux Enterprise Micro 5.4:kernel-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise Micro 5.4:kernel-default-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise Micro 5.4:kernel-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Micro 5.4:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.aarch64",
            "SUSE Linux Enterprise Micro 5.4:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-64kb-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-64kb-devel-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.aarch64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.ppc64le",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-devel-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-docs-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-macros-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-source-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.170.1.aarch64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.170.1.ppc64le",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.170.1.s390x",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.170.1.x86_64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-zfcpdump-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-devel-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-devel-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-devel-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-docs-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-macros-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-obs-build-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-obs-build-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-source-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-syms-5.14.21-150400.24.170.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-syms-5.14.21-150400.24.170.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Manager Proxy 4.3:kernel-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Manager Proxy 4.3:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
            "SUSE Manager Proxy 4.3:kernel-default-devel-5.14.21-150400.24.170.2.x86_64",
            "SUSE Manager Proxy 4.3:kernel-devel-5.14.21-150400.24.170.1.noarch",
            "SUSE Manager Proxy 4.3:kernel-macros-5.14.21-150400.24.170.1.noarch",
            "SUSE Manager Proxy 4.3:kernel-source-5.14.21-150400.24.170.1.noarch",
            "SUSE Manager Proxy 4.3:kernel-syms-5.14.21-150400.24.170.1.x86_64",
            "SUSE Manager Server 4.3:kernel-default-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Manager Server 4.3:kernel-default-5.14.21-150400.24.170.2.s390x",
            "SUSE Manager Server 4.3:kernel-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Manager Server 4.3:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.ppc64le",
            "SUSE Manager Server 4.3:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
            "SUSE Manager Server 4.3:kernel-default-devel-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Manager Server 4.3:kernel-default-devel-5.14.21-150400.24.170.2.s390x",
            "SUSE Manager Server 4.3:kernel-default-devel-5.14.21-150400.24.170.2.x86_64",
            "SUSE Manager Server 4.3:kernel-devel-5.14.21-150400.24.170.1.noarch",
            "SUSE Manager Server 4.3:kernel-macros-5.14.21-150400.24.170.1.noarch",
            "SUSE Manager Server 4.3:kernel-source-5.14.21-150400.24.170.1.noarch",
            "SUSE Manager Server 4.3:kernel-syms-5.14.21-150400.24.170.1.ppc64le",
            "SUSE Manager Server 4.3:kernel-syms-5.14.21-150400.24.170.1.s390x",
            "SUSE Manager Server 4.3:kernel-syms-5.14.21-150400.24.170.1.x86_64",
            "SUSE Manager Server 4.3:kernel-zfcpdump-5.14.21-150400.24.170.2.s390x"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2025-07-28T15:09:33Z",
          "details": "low"
        }
      ],
      "title": "CVE-2024-26935"
    },
    {
      "cve": "CVE-2024-27397",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2024-27397"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "In the Linux kernel, the following vulnerability has been resolved:\n\nnetfilter: nf_tables: use timestamp to check for set element timeout\n\nAdd a timestamp field at the beginning of the transaction, store it\nin the nftables per-netns area.\n\nUpdate set backend .insert, .deactivate and sync gc path to use the\ntimestamp, this avoids that an element expires while control plane\ntransaction is still unfinished.\n\n.lookup and .update, which are used from packet path, still use the\ncurrent time to check if the element has expired. And .get path and dump\nalso since this runs lockless under rcu read size lock. Then, there is\nasync gc which also needs to check the current time since it runs\nasynchronously from a workqueue.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.170.2.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.170.2.s390x",
          "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.170.2.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.170.2.s390x",
          "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.170.2.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.170.2.s390x",
          "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.170.2.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.170.2.s390x",
          "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-64kb-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-64kb-devel-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-devel-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-devel-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-devel-5.14.21-150400.24.170.1.noarch",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-docs-5.14.21-150400.24.170.1.noarch",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-macros-5.14.21-150400.24.170.1.noarch",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-obs-build-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-obs-build-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-source-5.14.21-150400.24.170.1.noarch",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-syms-5.14.21-150400.24.170.1.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-syms-5.14.21-150400.24.170.1.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:reiserfs-kmp-default-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:reiserfs-kmp-default-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-64kb-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-64kb-devel-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-devel-5.14.21-150400.24.170.1.noarch",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-docs-5.14.21-150400.24.170.1.noarch",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-macros-5.14.21-150400.24.170.1.noarch",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-source-5.14.21-150400.24.170.1.noarch",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.170.1.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.170.1.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.170.2.ppc64le",
          "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.170.2.s390x",
          "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.170.2.ppc64le",
          "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.170.2.s390x",
          "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_170-default-1-150400.9.3.2.ppc64le",
          "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_170-default-1-150400.9.3.2.s390x",
          "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_170-default-1-150400.9.3.2.x86_64",
          "SUSE Linux Enterprise Micro 5.3:kernel-default-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise Micro 5.3:kernel-default-5.14.21-150400.24.170.2.s390x",
          "SUSE Linux Enterprise Micro 5.3:kernel-default-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise Micro 5.3:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.aarch64",
          "SUSE Linux Enterprise Micro 5.3:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
          "SUSE Linux Enterprise Micro 5.4:kernel-default-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise Micro 5.4:kernel-default-5.14.21-150400.24.170.2.s390x",
          "SUSE Linux Enterprise Micro 5.4:kernel-default-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise Micro 5.4:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.aarch64",
          "SUSE Linux Enterprise Micro 5.4:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-64kb-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-64kb-devel-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-5.14.21-150400.24.170.2.ppc64le",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-5.14.21-150400.24.170.2.s390x",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.aarch64",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.ppc64le",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.170.2.ppc64le",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.170.2.s390x",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-devel-5.14.21-150400.24.170.1.noarch",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-docs-5.14.21-150400.24.170.1.noarch",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-macros-5.14.21-150400.24.170.1.noarch",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.170.2.ppc64le",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.170.2.s390x",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-source-5.14.21-150400.24.170.1.noarch",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.170.1.aarch64",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.170.1.ppc64le",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.170.1.s390x",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.170.1.x86_64",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-zfcpdump-5.14.21-150400.24.170.2.s390x",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.170.2.ppc64le",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.170.2.s390x",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-5.14.21-150400.24.170.2.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-devel-5.14.21-150400.24.170.2.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-devel-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-devel-5.14.21-150400.24.170.1.noarch",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-docs-5.14.21-150400.24.170.1.noarch",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-macros-5.14.21-150400.24.170.1.noarch",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-obs-build-5.14.21-150400.24.170.2.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-obs-build-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-source-5.14.21-150400.24.170.1.noarch",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-syms-5.14.21-150400.24.170.1.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-syms-5.14.21-150400.24.170.1.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.170.2.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.170.2.x86_64",
          "SUSE Manager Proxy 4.3:kernel-default-5.14.21-150400.24.170.2.x86_64",
          "SUSE Manager Proxy 4.3:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
          "SUSE Manager Proxy 4.3:kernel-default-devel-5.14.21-150400.24.170.2.x86_64",
          "SUSE Manager Proxy 4.3:kernel-devel-5.14.21-150400.24.170.1.noarch",
          "SUSE Manager Proxy 4.3:kernel-macros-5.14.21-150400.24.170.1.noarch",
          "SUSE Manager Proxy 4.3:kernel-source-5.14.21-150400.24.170.1.noarch",
          "SUSE Manager Proxy 4.3:kernel-syms-5.14.21-150400.24.170.1.x86_64",
          "SUSE Manager Server 4.3:kernel-default-5.14.21-150400.24.170.2.ppc64le",
          "SUSE Manager Server 4.3:kernel-default-5.14.21-150400.24.170.2.s390x",
          "SUSE Manager Server 4.3:kernel-default-5.14.21-150400.24.170.2.x86_64",
          "SUSE Manager Server 4.3:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.ppc64le",
          "SUSE Manager Server 4.3:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
          "SUSE Manager Server 4.3:kernel-default-devel-5.14.21-150400.24.170.2.ppc64le",
          "SUSE Manager Server 4.3:kernel-default-devel-5.14.21-150400.24.170.2.s390x",
          "SUSE Manager Server 4.3:kernel-default-devel-5.14.21-150400.24.170.2.x86_64",
          "SUSE Manager Server 4.3:kernel-devel-5.14.21-150400.24.170.1.noarch",
          "SUSE Manager Server 4.3:kernel-macros-5.14.21-150400.24.170.1.noarch",
          "SUSE Manager Server 4.3:kernel-source-5.14.21-150400.24.170.1.noarch",
          "SUSE Manager Server 4.3:kernel-syms-5.14.21-150400.24.170.1.ppc64le",
          "SUSE Manager Server 4.3:kernel-syms-5.14.21-150400.24.170.1.s390x",
          "SUSE Manager Server 4.3:kernel-syms-5.14.21-150400.24.170.1.x86_64",
          "SUSE Manager Server 4.3:kernel-zfcpdump-5.14.21-150400.24.170.2.s390x"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2024-27397",
          "url": "https://www.suse.com/security/cve/CVE-2024-27397"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1224095 for CVE-2024-27397",
          "url": "https://bugzilla.suse.com/1224095"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-64kb-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-64kb-devel-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-devel-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-devel-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-devel-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-docs-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-macros-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-obs-build-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-obs-build-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-source-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-syms-5.14.21-150400.24.170.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-syms-5.14.21-150400.24.170.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:reiserfs-kmp-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:reiserfs-kmp-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-64kb-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-64kb-devel-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-devel-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-docs-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-macros-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-source-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.170.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.170.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_170-default-1-150400.9.3.2.ppc64le",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_170-default-1-150400.9.3.2.s390x",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_170-default-1-150400.9.3.2.x86_64",
            "SUSE Linux Enterprise Micro 5.3:kernel-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise Micro 5.3:kernel-default-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise Micro 5.3:kernel-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Micro 5.3:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.aarch64",
            "SUSE Linux Enterprise Micro 5.3:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
            "SUSE Linux Enterprise Micro 5.4:kernel-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise Micro 5.4:kernel-default-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise Micro 5.4:kernel-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Micro 5.4:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.aarch64",
            "SUSE Linux Enterprise Micro 5.4:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-64kb-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-64kb-devel-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.aarch64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.ppc64le",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-devel-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-docs-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-macros-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-source-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.170.1.aarch64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.170.1.ppc64le",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.170.1.s390x",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.170.1.x86_64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-zfcpdump-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-devel-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-devel-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-devel-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-docs-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-macros-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-obs-build-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-obs-build-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-source-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-syms-5.14.21-150400.24.170.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-syms-5.14.21-150400.24.170.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Manager Proxy 4.3:kernel-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Manager Proxy 4.3:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
            "SUSE Manager Proxy 4.3:kernel-default-devel-5.14.21-150400.24.170.2.x86_64",
            "SUSE Manager Proxy 4.3:kernel-devel-5.14.21-150400.24.170.1.noarch",
            "SUSE Manager Proxy 4.3:kernel-macros-5.14.21-150400.24.170.1.noarch",
            "SUSE Manager Proxy 4.3:kernel-source-5.14.21-150400.24.170.1.noarch",
            "SUSE Manager Proxy 4.3:kernel-syms-5.14.21-150400.24.170.1.x86_64",
            "SUSE Manager Server 4.3:kernel-default-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Manager Server 4.3:kernel-default-5.14.21-150400.24.170.2.s390x",
            "SUSE Manager Server 4.3:kernel-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Manager Server 4.3:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.ppc64le",
            "SUSE Manager Server 4.3:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
            "SUSE Manager Server 4.3:kernel-default-devel-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Manager Server 4.3:kernel-default-devel-5.14.21-150400.24.170.2.s390x",
            "SUSE Manager Server 4.3:kernel-default-devel-5.14.21-150400.24.170.2.x86_64",
            "SUSE Manager Server 4.3:kernel-devel-5.14.21-150400.24.170.1.noarch",
            "SUSE Manager Server 4.3:kernel-macros-5.14.21-150400.24.170.1.noarch",
            "SUSE Manager Server 4.3:kernel-source-5.14.21-150400.24.170.1.noarch",
            "SUSE Manager Server 4.3:kernel-syms-5.14.21-150400.24.170.1.ppc64le",
            "SUSE Manager Server 4.3:kernel-syms-5.14.21-150400.24.170.1.s390x",
            "SUSE Manager Server 4.3:kernel-syms-5.14.21-150400.24.170.1.x86_64",
            "SUSE Manager Server 4.3:kernel-zfcpdump-5.14.21-150400.24.170.2.s390x"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 6.7,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H",
            "version": "3.1"
          },
          "products": [
            "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-64kb-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-64kb-devel-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-devel-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-devel-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-devel-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-docs-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-macros-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-obs-build-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-obs-build-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-source-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-syms-5.14.21-150400.24.170.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-syms-5.14.21-150400.24.170.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:reiserfs-kmp-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:reiserfs-kmp-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-64kb-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-64kb-devel-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-devel-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-docs-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-macros-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-source-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.170.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.170.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_170-default-1-150400.9.3.2.ppc64le",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_170-default-1-150400.9.3.2.s390x",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_170-default-1-150400.9.3.2.x86_64",
            "SUSE Linux Enterprise Micro 5.3:kernel-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise Micro 5.3:kernel-default-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise Micro 5.3:kernel-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Micro 5.3:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.aarch64",
            "SUSE Linux Enterprise Micro 5.3:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
            "SUSE Linux Enterprise Micro 5.4:kernel-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise Micro 5.4:kernel-default-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise Micro 5.4:kernel-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Micro 5.4:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.aarch64",
            "SUSE Linux Enterprise Micro 5.4:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-64kb-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-64kb-devel-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.aarch64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.ppc64le",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-devel-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-docs-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-macros-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-source-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.170.1.aarch64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.170.1.ppc64le",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.170.1.s390x",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.170.1.x86_64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-zfcpdump-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-devel-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-devel-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-devel-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-docs-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-macros-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-obs-build-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-obs-build-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-source-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-syms-5.14.21-150400.24.170.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-syms-5.14.21-150400.24.170.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Manager Proxy 4.3:kernel-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Manager Proxy 4.3:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
            "SUSE Manager Proxy 4.3:kernel-default-devel-5.14.21-150400.24.170.2.x86_64",
            "SUSE Manager Proxy 4.3:kernel-devel-5.14.21-150400.24.170.1.noarch",
            "SUSE Manager Proxy 4.3:kernel-macros-5.14.21-150400.24.170.1.noarch",
            "SUSE Manager Proxy 4.3:kernel-source-5.14.21-150400.24.170.1.noarch",
            "SUSE Manager Proxy 4.3:kernel-syms-5.14.21-150400.24.170.1.x86_64",
            "SUSE Manager Server 4.3:kernel-default-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Manager Server 4.3:kernel-default-5.14.21-150400.24.170.2.s390x",
            "SUSE Manager Server 4.3:kernel-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Manager Server 4.3:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.ppc64le",
            "SUSE Manager Server 4.3:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
            "SUSE Manager Server 4.3:kernel-default-devel-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Manager Server 4.3:kernel-default-devel-5.14.21-150400.24.170.2.s390x",
            "SUSE Manager Server 4.3:kernel-default-devel-5.14.21-150400.24.170.2.x86_64",
            "SUSE Manager Server 4.3:kernel-devel-5.14.21-150400.24.170.1.noarch",
            "SUSE Manager Server 4.3:kernel-macros-5.14.21-150400.24.170.1.noarch",
            "SUSE Manager Server 4.3:kernel-source-5.14.21-150400.24.170.1.noarch",
            "SUSE Manager Server 4.3:kernel-syms-5.14.21-150400.24.170.1.ppc64le",
            "SUSE Manager Server 4.3:kernel-syms-5.14.21-150400.24.170.1.s390x",
            "SUSE Manager Server 4.3:kernel-syms-5.14.21-150400.24.170.1.x86_64",
            "SUSE Manager Server 4.3:kernel-zfcpdump-5.14.21-150400.24.170.2.s390x"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2025-07-28T15:09:33Z",
          "details": "moderate"
        }
      ],
      "title": "CVE-2024-27397"
    },
    {
      "cve": "CVE-2024-35840",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2024-35840"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "In the Linux kernel, the following vulnerability has been resolved:\n\nmptcp: use OPTION_MPTCP_MPJ_SYNACK in subflow_finish_connect()\n\nsubflow_finish_connect() uses four fields (backup, join_id, thmac, none)\nthat may contain garbage unless OPTION_MPTCP_MPJ_SYNACK has been set\nin mptcp_parse_option()",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.170.2.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.170.2.s390x",
          "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.170.2.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.170.2.s390x",
          "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.170.2.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.170.2.s390x",
          "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.170.2.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.170.2.s390x",
          "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-64kb-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-64kb-devel-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-devel-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-devel-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-devel-5.14.21-150400.24.170.1.noarch",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-docs-5.14.21-150400.24.170.1.noarch",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-macros-5.14.21-150400.24.170.1.noarch",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-obs-build-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-obs-build-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-source-5.14.21-150400.24.170.1.noarch",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-syms-5.14.21-150400.24.170.1.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-syms-5.14.21-150400.24.170.1.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:reiserfs-kmp-default-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:reiserfs-kmp-default-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-64kb-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-64kb-devel-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-devel-5.14.21-150400.24.170.1.noarch",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-docs-5.14.21-150400.24.170.1.noarch",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-macros-5.14.21-150400.24.170.1.noarch",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-source-5.14.21-150400.24.170.1.noarch",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.170.1.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.170.1.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.170.2.ppc64le",
          "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.170.2.s390x",
          "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.170.2.ppc64le",
          "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.170.2.s390x",
          "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_170-default-1-150400.9.3.2.ppc64le",
          "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_170-default-1-150400.9.3.2.s390x",
          "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_170-default-1-150400.9.3.2.x86_64",
          "SUSE Linux Enterprise Micro 5.3:kernel-default-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise Micro 5.3:kernel-default-5.14.21-150400.24.170.2.s390x",
          "SUSE Linux Enterprise Micro 5.3:kernel-default-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise Micro 5.3:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.aarch64",
          "SUSE Linux Enterprise Micro 5.3:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
          "SUSE Linux Enterprise Micro 5.4:kernel-default-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise Micro 5.4:kernel-default-5.14.21-150400.24.170.2.s390x",
          "SUSE Linux Enterprise Micro 5.4:kernel-default-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise Micro 5.4:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.aarch64",
          "SUSE Linux Enterprise Micro 5.4:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-64kb-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-64kb-devel-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-5.14.21-150400.24.170.2.ppc64le",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-5.14.21-150400.24.170.2.s390x",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.aarch64",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.ppc64le",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.170.2.ppc64le",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.170.2.s390x",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-devel-5.14.21-150400.24.170.1.noarch",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-docs-5.14.21-150400.24.170.1.noarch",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-macros-5.14.21-150400.24.170.1.noarch",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.170.2.ppc64le",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.170.2.s390x",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-source-5.14.21-150400.24.170.1.noarch",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.170.1.aarch64",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.170.1.ppc64le",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.170.1.s390x",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.170.1.x86_64",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-zfcpdump-5.14.21-150400.24.170.2.s390x",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.170.2.ppc64le",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.170.2.s390x",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-5.14.21-150400.24.170.2.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-devel-5.14.21-150400.24.170.2.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-devel-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-devel-5.14.21-150400.24.170.1.noarch",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-docs-5.14.21-150400.24.170.1.noarch",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-macros-5.14.21-150400.24.170.1.noarch",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-obs-build-5.14.21-150400.24.170.2.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-obs-build-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-source-5.14.21-150400.24.170.1.noarch",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-syms-5.14.21-150400.24.170.1.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-syms-5.14.21-150400.24.170.1.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.170.2.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.170.2.x86_64",
          "SUSE Manager Proxy 4.3:kernel-default-5.14.21-150400.24.170.2.x86_64",
          "SUSE Manager Proxy 4.3:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
          "SUSE Manager Proxy 4.3:kernel-default-devel-5.14.21-150400.24.170.2.x86_64",
          "SUSE Manager Proxy 4.3:kernel-devel-5.14.21-150400.24.170.1.noarch",
          "SUSE Manager Proxy 4.3:kernel-macros-5.14.21-150400.24.170.1.noarch",
          "SUSE Manager Proxy 4.3:kernel-source-5.14.21-150400.24.170.1.noarch",
          "SUSE Manager Proxy 4.3:kernel-syms-5.14.21-150400.24.170.1.x86_64",
          "SUSE Manager Server 4.3:kernel-default-5.14.21-150400.24.170.2.ppc64le",
          "SUSE Manager Server 4.3:kernel-default-5.14.21-150400.24.170.2.s390x",
          "SUSE Manager Server 4.3:kernel-default-5.14.21-150400.24.170.2.x86_64",
          "SUSE Manager Server 4.3:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.ppc64le",
          "SUSE Manager Server 4.3:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
          "SUSE Manager Server 4.3:kernel-default-devel-5.14.21-150400.24.170.2.ppc64le",
          "SUSE Manager Server 4.3:kernel-default-devel-5.14.21-150400.24.170.2.s390x",
          "SUSE Manager Server 4.3:kernel-default-devel-5.14.21-150400.24.170.2.x86_64",
          "SUSE Manager Server 4.3:kernel-devel-5.14.21-150400.24.170.1.noarch",
          "SUSE Manager Server 4.3:kernel-macros-5.14.21-150400.24.170.1.noarch",
          "SUSE Manager Server 4.3:kernel-source-5.14.21-150400.24.170.1.noarch",
          "SUSE Manager Server 4.3:kernel-syms-5.14.21-150400.24.170.1.ppc64le",
          "SUSE Manager Server 4.3:kernel-syms-5.14.21-150400.24.170.1.s390x",
          "SUSE Manager Server 4.3:kernel-syms-5.14.21-150400.24.170.1.x86_64",
          "SUSE Manager Server 4.3:kernel-zfcpdump-5.14.21-150400.24.170.2.s390x"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2024-35840",
          "url": "https://www.suse.com/security/cve/CVE-2024-35840"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1224597 for CVE-2024-35840",
          "url": "https://bugzilla.suse.com/1224597"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-64kb-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-64kb-devel-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-devel-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-devel-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-devel-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-docs-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-macros-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-obs-build-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-obs-build-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-source-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-syms-5.14.21-150400.24.170.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-syms-5.14.21-150400.24.170.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:reiserfs-kmp-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:reiserfs-kmp-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-64kb-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-64kb-devel-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-devel-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-docs-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-macros-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-source-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.170.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.170.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_170-default-1-150400.9.3.2.ppc64le",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_170-default-1-150400.9.3.2.s390x",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_170-default-1-150400.9.3.2.x86_64",
            "SUSE Linux Enterprise Micro 5.3:kernel-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise Micro 5.3:kernel-default-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise Micro 5.3:kernel-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Micro 5.3:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.aarch64",
            "SUSE Linux Enterprise Micro 5.3:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
            "SUSE Linux Enterprise Micro 5.4:kernel-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise Micro 5.4:kernel-default-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise Micro 5.4:kernel-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Micro 5.4:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.aarch64",
            "SUSE Linux Enterprise Micro 5.4:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-64kb-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-64kb-devel-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.aarch64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.ppc64le",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-devel-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-docs-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-macros-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-source-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.170.1.aarch64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.170.1.ppc64le",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.170.1.s390x",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.170.1.x86_64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-zfcpdump-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-devel-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-devel-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-devel-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-docs-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-macros-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-obs-build-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-obs-build-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-source-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-syms-5.14.21-150400.24.170.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-syms-5.14.21-150400.24.170.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Manager Proxy 4.3:kernel-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Manager Proxy 4.3:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
            "SUSE Manager Proxy 4.3:kernel-default-devel-5.14.21-150400.24.170.2.x86_64",
            "SUSE Manager Proxy 4.3:kernel-devel-5.14.21-150400.24.170.1.noarch",
            "SUSE Manager Proxy 4.3:kernel-macros-5.14.21-150400.24.170.1.noarch",
            "SUSE Manager Proxy 4.3:kernel-source-5.14.21-150400.24.170.1.noarch",
            "SUSE Manager Proxy 4.3:kernel-syms-5.14.21-150400.24.170.1.x86_64",
            "SUSE Manager Server 4.3:kernel-default-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Manager Server 4.3:kernel-default-5.14.21-150400.24.170.2.s390x",
            "SUSE Manager Server 4.3:kernel-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Manager Server 4.3:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.ppc64le",
            "SUSE Manager Server 4.3:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
            "SUSE Manager Server 4.3:kernel-default-devel-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Manager Server 4.3:kernel-default-devel-5.14.21-150400.24.170.2.s390x",
            "SUSE Manager Server 4.3:kernel-default-devel-5.14.21-150400.24.170.2.x86_64",
            "SUSE Manager Server 4.3:kernel-devel-5.14.21-150400.24.170.1.noarch",
            "SUSE Manager Server 4.3:kernel-macros-5.14.21-150400.24.170.1.noarch",
            "SUSE Manager Server 4.3:kernel-source-5.14.21-150400.24.170.1.noarch",
            "SUSE Manager Server 4.3:kernel-syms-5.14.21-150400.24.170.1.ppc64le",
            "SUSE Manager Server 4.3:kernel-syms-5.14.21-150400.24.170.1.s390x",
            "SUSE Manager Server 4.3:kernel-syms-5.14.21-150400.24.170.1.x86_64",
            "SUSE Manager Server 4.3:kernel-zfcpdump-5.14.21-150400.24.170.2.s390x"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 5.5,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
            "version": "3.1"
          },
          "products": [
            "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-64kb-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-64kb-devel-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-devel-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-devel-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-devel-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-docs-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-macros-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-obs-build-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-obs-build-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-source-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-syms-5.14.21-150400.24.170.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-syms-5.14.21-150400.24.170.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:reiserfs-kmp-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:reiserfs-kmp-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-64kb-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-64kb-devel-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-devel-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-docs-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-macros-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-source-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.170.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.170.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_170-default-1-150400.9.3.2.ppc64le",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_170-default-1-150400.9.3.2.s390x",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_170-default-1-150400.9.3.2.x86_64",
            "SUSE Linux Enterprise Micro 5.3:kernel-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise Micro 5.3:kernel-default-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise Micro 5.3:kernel-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Micro 5.3:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.aarch64",
            "SUSE Linux Enterprise Micro 5.3:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
            "SUSE Linux Enterprise Micro 5.4:kernel-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise Micro 5.4:kernel-default-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise Micro 5.4:kernel-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Micro 5.4:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.aarch64",
            "SUSE Linux Enterprise Micro 5.4:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-64kb-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-64kb-devel-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.aarch64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.ppc64le",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-devel-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-docs-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-macros-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-source-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.170.1.aarch64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.170.1.ppc64le",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.170.1.s390x",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.170.1.x86_64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-zfcpdump-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-devel-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-devel-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-devel-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-docs-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-macros-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-obs-build-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-obs-build-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-source-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-syms-5.14.21-150400.24.170.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-syms-5.14.21-150400.24.170.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Manager Proxy 4.3:kernel-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Manager Proxy 4.3:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
            "SUSE Manager Proxy 4.3:kernel-default-devel-5.14.21-150400.24.170.2.x86_64",
            "SUSE Manager Proxy 4.3:kernel-devel-5.14.21-150400.24.170.1.noarch",
            "SUSE Manager Proxy 4.3:kernel-macros-5.14.21-150400.24.170.1.noarch",
            "SUSE Manager Proxy 4.3:kernel-source-5.14.21-150400.24.170.1.noarch",
            "SUSE Manager Proxy 4.3:kernel-syms-5.14.21-150400.24.170.1.x86_64",
            "SUSE Manager Server 4.3:kernel-default-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Manager Server 4.3:kernel-default-5.14.21-150400.24.170.2.s390x",
            "SUSE Manager Server 4.3:kernel-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Manager Server 4.3:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.ppc64le",
            "SUSE Manager Server 4.3:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
            "SUSE Manager Server 4.3:kernel-default-devel-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Manager Server 4.3:kernel-default-devel-5.14.21-150400.24.170.2.s390x",
            "SUSE Manager Server 4.3:kernel-default-devel-5.14.21-150400.24.170.2.x86_64",
            "SUSE Manager Server 4.3:kernel-devel-5.14.21-150400.24.170.1.noarch",
            "SUSE Manager Server 4.3:kernel-macros-5.14.21-150400.24.170.1.noarch",
            "SUSE Manager Server 4.3:kernel-source-5.14.21-150400.24.170.1.noarch",
            "SUSE Manager Server 4.3:kernel-syms-5.14.21-150400.24.170.1.ppc64le",
            "SUSE Manager Server 4.3:kernel-syms-5.14.21-150400.24.170.1.s390x",
            "SUSE Manager Server 4.3:kernel-syms-5.14.21-150400.24.170.1.x86_64",
            "SUSE Manager Server 4.3:kernel-zfcpdump-5.14.21-150400.24.170.2.s390x"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2025-07-28T15:09:33Z",
          "details": "moderate"
        }
      ],
      "title": "CVE-2024-35840"
    },
    {
      "cve": "CVE-2024-36978",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2024-36978"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "In the Linux kernel, the following vulnerability has been resolved:\n\nnet: sched: sch_multiq: fix possible OOB write in multiq_tune()\n\nq-\u003ebands will be assigned to qopt-\u003ebands to execute subsequent code logic\nafter kmalloc. So the old q-\u003ebands should not be used in kmalloc.\nOtherwise, an out-of-bounds write will occur.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.170.2.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.170.2.s390x",
          "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.170.2.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.170.2.s390x",
          "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.170.2.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.170.2.s390x",
          "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.170.2.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.170.2.s390x",
          "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-64kb-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-64kb-devel-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-devel-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-devel-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-devel-5.14.21-150400.24.170.1.noarch",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-docs-5.14.21-150400.24.170.1.noarch",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-macros-5.14.21-150400.24.170.1.noarch",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-obs-build-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-obs-build-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-source-5.14.21-150400.24.170.1.noarch",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-syms-5.14.21-150400.24.170.1.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-syms-5.14.21-150400.24.170.1.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:reiserfs-kmp-default-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:reiserfs-kmp-default-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-64kb-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-64kb-devel-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-devel-5.14.21-150400.24.170.1.noarch",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-docs-5.14.21-150400.24.170.1.noarch",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-macros-5.14.21-150400.24.170.1.noarch",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-source-5.14.21-150400.24.170.1.noarch",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.170.1.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.170.1.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.170.2.ppc64le",
          "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.170.2.s390x",
          "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.170.2.ppc64le",
          "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.170.2.s390x",
          "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_170-default-1-150400.9.3.2.ppc64le",
          "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_170-default-1-150400.9.3.2.s390x",
          "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_170-default-1-150400.9.3.2.x86_64",
          "SUSE Linux Enterprise Micro 5.3:kernel-default-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise Micro 5.3:kernel-default-5.14.21-150400.24.170.2.s390x",
          "SUSE Linux Enterprise Micro 5.3:kernel-default-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise Micro 5.3:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.aarch64",
          "SUSE Linux Enterprise Micro 5.3:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
          "SUSE Linux Enterprise Micro 5.4:kernel-default-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise Micro 5.4:kernel-default-5.14.21-150400.24.170.2.s390x",
          "SUSE Linux Enterprise Micro 5.4:kernel-default-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise Micro 5.4:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.aarch64",
          "SUSE Linux Enterprise Micro 5.4:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-64kb-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-64kb-devel-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-5.14.21-150400.24.170.2.ppc64le",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-5.14.21-150400.24.170.2.s390x",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.aarch64",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.ppc64le",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.170.2.ppc64le",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.170.2.s390x",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-devel-5.14.21-150400.24.170.1.noarch",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-docs-5.14.21-150400.24.170.1.noarch",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-macros-5.14.21-150400.24.170.1.noarch",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.170.2.ppc64le",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.170.2.s390x",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-source-5.14.21-150400.24.170.1.noarch",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.170.1.aarch64",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.170.1.ppc64le",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.170.1.s390x",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.170.1.x86_64",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-zfcpdump-5.14.21-150400.24.170.2.s390x",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.170.2.ppc64le",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.170.2.s390x",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-5.14.21-150400.24.170.2.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-devel-5.14.21-150400.24.170.2.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-devel-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-devel-5.14.21-150400.24.170.1.noarch",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-docs-5.14.21-150400.24.170.1.noarch",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-macros-5.14.21-150400.24.170.1.noarch",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-obs-build-5.14.21-150400.24.170.2.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-obs-build-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-source-5.14.21-150400.24.170.1.noarch",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-syms-5.14.21-150400.24.170.1.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-syms-5.14.21-150400.24.170.1.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.170.2.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.170.2.x86_64",
          "SUSE Manager Proxy 4.3:kernel-default-5.14.21-150400.24.170.2.x86_64",
          "SUSE Manager Proxy 4.3:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
          "SUSE Manager Proxy 4.3:kernel-default-devel-5.14.21-150400.24.170.2.x86_64",
          "SUSE Manager Proxy 4.3:kernel-devel-5.14.21-150400.24.170.1.noarch",
          "SUSE Manager Proxy 4.3:kernel-macros-5.14.21-150400.24.170.1.noarch",
          "SUSE Manager Proxy 4.3:kernel-source-5.14.21-150400.24.170.1.noarch",
          "SUSE Manager Proxy 4.3:kernel-syms-5.14.21-150400.24.170.1.x86_64",
          "SUSE Manager Server 4.3:kernel-default-5.14.21-150400.24.170.2.ppc64le",
          "SUSE Manager Server 4.3:kernel-default-5.14.21-150400.24.170.2.s390x",
          "SUSE Manager Server 4.3:kernel-default-5.14.21-150400.24.170.2.x86_64",
          "SUSE Manager Server 4.3:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.ppc64le",
          "SUSE Manager Server 4.3:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
          "SUSE Manager Server 4.3:kernel-default-devel-5.14.21-150400.24.170.2.ppc64le",
          "SUSE Manager Server 4.3:kernel-default-devel-5.14.21-150400.24.170.2.s390x",
          "SUSE Manager Server 4.3:kernel-default-devel-5.14.21-150400.24.170.2.x86_64",
          "SUSE Manager Server 4.3:kernel-devel-5.14.21-150400.24.170.1.noarch",
          "SUSE Manager Server 4.3:kernel-macros-5.14.21-150400.24.170.1.noarch",
          "SUSE Manager Server 4.3:kernel-source-5.14.21-150400.24.170.1.noarch",
          "SUSE Manager Server 4.3:kernel-syms-5.14.21-150400.24.170.1.ppc64le",
          "SUSE Manager Server 4.3:kernel-syms-5.14.21-150400.24.170.1.s390x",
          "SUSE Manager Server 4.3:kernel-syms-5.14.21-150400.24.170.1.x86_64",
          "SUSE Manager Server 4.3:kernel-zfcpdump-5.14.21-150400.24.170.2.s390x"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2024-36978",
          "url": "https://www.suse.com/security/cve/CVE-2024-36978"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1226514 for CVE-2024-36978",
          "url": "https://bugzilla.suse.com/1226514"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1244631 for CVE-2024-36978",
          "url": "https://bugzilla.suse.com/1244631"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-64kb-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-64kb-devel-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-devel-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-devel-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-devel-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-docs-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-macros-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-obs-build-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-obs-build-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-source-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-syms-5.14.21-150400.24.170.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-syms-5.14.21-150400.24.170.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:reiserfs-kmp-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:reiserfs-kmp-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-64kb-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-64kb-devel-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-devel-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-docs-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-macros-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-source-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.170.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.170.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_170-default-1-150400.9.3.2.ppc64le",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_170-default-1-150400.9.3.2.s390x",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_170-default-1-150400.9.3.2.x86_64",
            "SUSE Linux Enterprise Micro 5.3:kernel-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise Micro 5.3:kernel-default-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise Micro 5.3:kernel-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Micro 5.3:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.aarch64",
            "SUSE Linux Enterprise Micro 5.3:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
            "SUSE Linux Enterprise Micro 5.4:kernel-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise Micro 5.4:kernel-default-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise Micro 5.4:kernel-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Micro 5.4:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.aarch64",
            "SUSE Linux Enterprise Micro 5.4:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-64kb-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-64kb-devel-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.aarch64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.ppc64le",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-devel-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-docs-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-macros-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-source-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.170.1.aarch64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.170.1.ppc64le",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.170.1.s390x",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.170.1.x86_64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-zfcpdump-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-devel-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-devel-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-devel-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-docs-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-macros-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-obs-build-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-obs-build-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-source-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-syms-5.14.21-150400.24.170.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-syms-5.14.21-150400.24.170.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Manager Proxy 4.3:kernel-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Manager Proxy 4.3:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
            "SUSE Manager Proxy 4.3:kernel-default-devel-5.14.21-150400.24.170.2.x86_64",
            "SUSE Manager Proxy 4.3:kernel-devel-5.14.21-150400.24.170.1.noarch",
            "SUSE Manager Proxy 4.3:kernel-macros-5.14.21-150400.24.170.1.noarch",
            "SUSE Manager Proxy 4.3:kernel-source-5.14.21-150400.24.170.1.noarch",
            "SUSE Manager Proxy 4.3:kernel-syms-5.14.21-150400.24.170.1.x86_64",
            "SUSE Manager Server 4.3:kernel-default-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Manager Server 4.3:kernel-default-5.14.21-150400.24.170.2.s390x",
            "SUSE Manager Server 4.3:kernel-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Manager Server 4.3:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.ppc64le",
            "SUSE Manager Server 4.3:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
            "SUSE Manager Server 4.3:kernel-default-devel-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Manager Server 4.3:kernel-default-devel-5.14.21-150400.24.170.2.s390x",
            "SUSE Manager Server 4.3:kernel-default-devel-5.14.21-150400.24.170.2.x86_64",
            "SUSE Manager Server 4.3:kernel-devel-5.14.21-150400.24.170.1.noarch",
            "SUSE Manager Server 4.3:kernel-macros-5.14.21-150400.24.170.1.noarch",
            "SUSE Manager Server 4.3:kernel-source-5.14.21-150400.24.170.1.noarch",
            "SUSE Manager Server 4.3:kernel-syms-5.14.21-150400.24.170.1.ppc64le",
            "SUSE Manager Server 4.3:kernel-syms-5.14.21-150400.24.170.1.s390x",
            "SUSE Manager Server 4.3:kernel-syms-5.14.21-150400.24.170.1.x86_64",
            "SUSE Manager Server 4.3:kernel-zfcpdump-5.14.21-150400.24.170.2.s390x"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 7.8,
            "baseSeverity": "HIGH",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
            "version": "3.1"
          },
          "products": [
            "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-64kb-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-64kb-devel-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-devel-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-devel-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-devel-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-docs-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-macros-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-obs-build-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-obs-build-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-source-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-syms-5.14.21-150400.24.170.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-syms-5.14.21-150400.24.170.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:reiserfs-kmp-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:reiserfs-kmp-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-64kb-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-64kb-devel-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-devel-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-docs-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-macros-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-source-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.170.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.170.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_170-default-1-150400.9.3.2.ppc64le",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_170-default-1-150400.9.3.2.s390x",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_170-default-1-150400.9.3.2.x86_64",
            "SUSE Linux Enterprise Micro 5.3:kernel-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise Micro 5.3:kernel-default-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise Micro 5.3:kernel-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Micro 5.3:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.aarch64",
            "SUSE Linux Enterprise Micro 5.3:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
            "SUSE Linux Enterprise Micro 5.4:kernel-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise Micro 5.4:kernel-default-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise Micro 5.4:kernel-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Micro 5.4:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.aarch64",
            "SUSE Linux Enterprise Micro 5.4:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-64kb-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-64kb-devel-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.aarch64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.ppc64le",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-devel-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-docs-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-macros-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-source-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.170.1.aarch64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.170.1.ppc64le",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.170.1.s390x",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.170.1.x86_64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-zfcpdump-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-devel-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-devel-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-devel-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-docs-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-macros-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-obs-build-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-obs-build-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-source-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-syms-5.14.21-150400.24.170.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-syms-5.14.21-150400.24.170.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Manager Proxy 4.3:kernel-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Manager Proxy 4.3:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
            "SUSE Manager Proxy 4.3:kernel-default-devel-5.14.21-150400.24.170.2.x86_64",
            "SUSE Manager Proxy 4.3:kernel-devel-5.14.21-150400.24.170.1.noarch",
            "SUSE Manager Proxy 4.3:kernel-macros-5.14.21-150400.24.170.1.noarch",
            "SUSE Manager Proxy 4.3:kernel-source-5.14.21-150400.24.170.1.noarch",
            "SUSE Manager Proxy 4.3:kernel-syms-5.14.21-150400.24.170.1.x86_64",
            "SUSE Manager Server 4.3:kernel-default-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Manager Server 4.3:kernel-default-5.14.21-150400.24.170.2.s390x",
            "SUSE Manager Server 4.3:kernel-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Manager Server 4.3:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.ppc64le",
            "SUSE Manager Server 4.3:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
            "SUSE Manager Server 4.3:kernel-default-devel-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Manager Server 4.3:kernel-default-devel-5.14.21-150400.24.170.2.s390x",
            "SUSE Manager Server 4.3:kernel-default-devel-5.14.21-150400.24.170.2.x86_64",
            "SUSE Manager Server 4.3:kernel-devel-5.14.21-150400.24.170.1.noarch",
            "SUSE Manager Server 4.3:kernel-macros-5.14.21-150400.24.170.1.noarch",
            "SUSE Manager Server 4.3:kernel-source-5.14.21-150400.24.170.1.noarch",
            "SUSE Manager Server 4.3:kernel-syms-5.14.21-150400.24.170.1.ppc64le",
            "SUSE Manager Server 4.3:kernel-syms-5.14.21-150400.24.170.1.s390x",
            "SUSE Manager Server 4.3:kernel-syms-5.14.21-150400.24.170.1.x86_64",
            "SUSE Manager Server 4.3:kernel-zfcpdump-5.14.21-150400.24.170.2.s390x"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2025-07-28T15:09:33Z",
          "details": "important"
        }
      ],
      "title": "CVE-2024-36978"
    },
    {
      "cve": "CVE-2024-46800",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2024-46800"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "In the Linux kernel, the following vulnerability has been resolved:\n\nsch/netem: fix use after free in netem_dequeue\n\nIf netem_dequeue() enqueues packet to inner qdisc and that qdisc\nreturns __NET_XMIT_STOLEN. The packet is dropped but\nqdisc_tree_reduce_backlog() is not called to update the parent\u0027s\nq.qlen, leading to the similar use-after-free as Commit\ne04991a48dbaf382 (\"netem: fix return value if duplicate enqueue\nfails\")\n\nCommands to trigger KASAN UaF:\n\nip link add type dummy\nip link set lo up\nip link set dummy0 up\ntc qdisc add dev lo parent root handle 1: drr\ntc filter add dev lo parent 1: basic classid 1:1\ntc class add dev lo classid 1:1 drr\ntc qdisc add dev lo parent 1:1 handle 2: netem\ntc qdisc add dev lo parent 2: handle 3: drr\ntc filter add dev lo parent 3: basic classid 3:1 action mirred egress\nredirect dev dummy0\ntc class add dev lo classid 3:1 drr\nping -c1 -W0.01 localhost # Trigger bug\ntc class del dev lo classid 1:1\ntc class add dev lo classid 1:1 drr\nping -c1 -W0.01 localhost # UaF",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.170.2.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.170.2.s390x",
          "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.170.2.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.170.2.s390x",
          "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.170.2.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.170.2.s390x",
          "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.170.2.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.170.2.s390x",
          "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-64kb-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-64kb-devel-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-devel-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-devel-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-devel-5.14.21-150400.24.170.1.noarch",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-docs-5.14.21-150400.24.170.1.noarch",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-macros-5.14.21-150400.24.170.1.noarch",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-obs-build-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-obs-build-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-source-5.14.21-150400.24.170.1.noarch",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-syms-5.14.21-150400.24.170.1.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-syms-5.14.21-150400.24.170.1.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:reiserfs-kmp-default-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:reiserfs-kmp-default-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-64kb-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-64kb-devel-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-devel-5.14.21-150400.24.170.1.noarch",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-docs-5.14.21-150400.24.170.1.noarch",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-macros-5.14.21-150400.24.170.1.noarch",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-source-5.14.21-150400.24.170.1.noarch",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.170.1.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.170.1.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.170.2.ppc64le",
          "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.170.2.s390x",
          "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.170.2.ppc64le",
          "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.170.2.s390x",
          "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_170-default-1-150400.9.3.2.ppc64le",
          "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_170-default-1-150400.9.3.2.s390x",
          "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_170-default-1-150400.9.3.2.x86_64",
          "SUSE Linux Enterprise Micro 5.3:kernel-default-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise Micro 5.3:kernel-default-5.14.21-150400.24.170.2.s390x",
          "SUSE Linux Enterprise Micro 5.3:kernel-default-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise Micro 5.3:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.aarch64",
          "SUSE Linux Enterprise Micro 5.3:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
          "SUSE Linux Enterprise Micro 5.4:kernel-default-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise Micro 5.4:kernel-default-5.14.21-150400.24.170.2.s390x",
          "SUSE Linux Enterprise Micro 5.4:kernel-default-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise Micro 5.4:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.aarch64",
          "SUSE Linux Enterprise Micro 5.4:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-64kb-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-64kb-devel-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-5.14.21-150400.24.170.2.ppc64le",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-5.14.21-150400.24.170.2.s390x",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.aarch64",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.ppc64le",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.170.2.ppc64le",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.170.2.s390x",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-devel-5.14.21-150400.24.170.1.noarch",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-docs-5.14.21-150400.24.170.1.noarch",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-macros-5.14.21-150400.24.170.1.noarch",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.170.2.ppc64le",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.170.2.s390x",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-source-5.14.21-150400.24.170.1.noarch",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.170.1.aarch64",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.170.1.ppc64le",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.170.1.s390x",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.170.1.x86_64",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-zfcpdump-5.14.21-150400.24.170.2.s390x",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.170.2.ppc64le",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.170.2.s390x",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-5.14.21-150400.24.170.2.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-devel-5.14.21-150400.24.170.2.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-devel-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-devel-5.14.21-150400.24.170.1.noarch",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-docs-5.14.21-150400.24.170.1.noarch",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-macros-5.14.21-150400.24.170.1.noarch",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-obs-build-5.14.21-150400.24.170.2.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-obs-build-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-source-5.14.21-150400.24.170.1.noarch",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-syms-5.14.21-150400.24.170.1.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-syms-5.14.21-150400.24.170.1.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.170.2.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.170.2.x86_64",
          "SUSE Manager Proxy 4.3:kernel-default-5.14.21-150400.24.170.2.x86_64",
          "SUSE Manager Proxy 4.3:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
          "SUSE Manager Proxy 4.3:kernel-default-devel-5.14.21-150400.24.170.2.x86_64",
          "SUSE Manager Proxy 4.3:kernel-devel-5.14.21-150400.24.170.1.noarch",
          "SUSE Manager Proxy 4.3:kernel-macros-5.14.21-150400.24.170.1.noarch",
          "SUSE Manager Proxy 4.3:kernel-source-5.14.21-150400.24.170.1.noarch",
          "SUSE Manager Proxy 4.3:kernel-syms-5.14.21-150400.24.170.1.x86_64",
          "SUSE Manager Server 4.3:kernel-default-5.14.21-150400.24.170.2.ppc64le",
          "SUSE Manager Server 4.3:kernel-default-5.14.21-150400.24.170.2.s390x",
          "SUSE Manager Server 4.3:kernel-default-5.14.21-150400.24.170.2.x86_64",
          "SUSE Manager Server 4.3:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.ppc64le",
          "SUSE Manager Server 4.3:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
          "SUSE Manager Server 4.3:kernel-default-devel-5.14.21-150400.24.170.2.ppc64le",
          "SUSE Manager Server 4.3:kernel-default-devel-5.14.21-150400.24.170.2.s390x",
          "SUSE Manager Server 4.3:kernel-default-devel-5.14.21-150400.24.170.2.x86_64",
          "SUSE Manager Server 4.3:kernel-devel-5.14.21-150400.24.170.1.noarch",
          "SUSE Manager Server 4.3:kernel-macros-5.14.21-150400.24.170.1.noarch",
          "SUSE Manager Server 4.3:kernel-source-5.14.21-150400.24.170.1.noarch",
          "SUSE Manager Server 4.3:kernel-syms-5.14.21-150400.24.170.1.ppc64le",
          "SUSE Manager Server 4.3:kernel-syms-5.14.21-150400.24.170.1.s390x",
          "SUSE Manager Server 4.3:kernel-syms-5.14.21-150400.24.170.1.x86_64",
          "SUSE Manager Server 4.3:kernel-zfcpdump-5.14.21-150400.24.170.2.s390x"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2024-46800",
          "url": "https://www.suse.com/security/cve/CVE-2024-46800"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1230827 for CVE-2024-46800",
          "url": "https://bugzilla.suse.com/1230827"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-64kb-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-64kb-devel-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-devel-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-devel-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-devel-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-docs-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-macros-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-obs-build-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-obs-build-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-source-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-syms-5.14.21-150400.24.170.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-syms-5.14.21-150400.24.170.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:reiserfs-kmp-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:reiserfs-kmp-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-64kb-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-64kb-devel-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-devel-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-docs-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-macros-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-source-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.170.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.170.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_170-default-1-150400.9.3.2.ppc64le",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_170-default-1-150400.9.3.2.s390x",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_170-default-1-150400.9.3.2.x86_64",
            "SUSE Linux Enterprise Micro 5.3:kernel-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise Micro 5.3:kernel-default-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise Micro 5.3:kernel-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Micro 5.3:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.aarch64",
            "SUSE Linux Enterprise Micro 5.3:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
            "SUSE Linux Enterprise Micro 5.4:kernel-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise Micro 5.4:kernel-default-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise Micro 5.4:kernel-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Micro 5.4:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.aarch64",
            "SUSE Linux Enterprise Micro 5.4:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-64kb-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-64kb-devel-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.aarch64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.ppc64le",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-devel-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-docs-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-macros-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-source-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.170.1.aarch64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.170.1.ppc64le",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.170.1.s390x",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.170.1.x86_64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-zfcpdump-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-devel-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-devel-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-devel-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-docs-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-macros-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-obs-build-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-obs-build-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-source-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-syms-5.14.21-150400.24.170.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-syms-5.14.21-150400.24.170.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Manager Proxy 4.3:kernel-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Manager Proxy 4.3:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
            "SUSE Manager Proxy 4.3:kernel-default-devel-5.14.21-150400.24.170.2.x86_64",
            "SUSE Manager Proxy 4.3:kernel-devel-5.14.21-150400.24.170.1.noarch",
            "SUSE Manager Proxy 4.3:kernel-macros-5.14.21-150400.24.170.1.noarch",
            "SUSE Manager Proxy 4.3:kernel-source-5.14.21-150400.24.170.1.noarch",
            "SUSE Manager Proxy 4.3:kernel-syms-5.14.21-150400.24.170.1.x86_64",
            "SUSE Manager Server 4.3:kernel-default-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Manager Server 4.3:kernel-default-5.14.21-150400.24.170.2.s390x",
            "SUSE Manager Server 4.3:kernel-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Manager Server 4.3:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.ppc64le",
            "SUSE Manager Server 4.3:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
            "SUSE Manager Server 4.3:kernel-default-devel-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Manager Server 4.3:kernel-default-devel-5.14.21-150400.24.170.2.s390x",
            "SUSE Manager Server 4.3:kernel-default-devel-5.14.21-150400.24.170.2.x86_64",
            "SUSE Manager Server 4.3:kernel-devel-5.14.21-150400.24.170.1.noarch",
            "SUSE Manager Server 4.3:kernel-macros-5.14.21-150400.24.170.1.noarch",
            "SUSE Manager Server 4.3:kernel-source-5.14.21-150400.24.170.1.noarch",
            "SUSE Manager Server 4.3:kernel-syms-5.14.21-150400.24.170.1.ppc64le",
            "SUSE Manager Server 4.3:kernel-syms-5.14.21-150400.24.170.1.s390x",
            "SUSE Manager Server 4.3:kernel-syms-5.14.21-150400.24.170.1.x86_64",
            "SUSE Manager Server 4.3:kernel-zfcpdump-5.14.21-150400.24.170.2.s390x"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 5.5,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
            "version": "3.1"
          },
          "products": [
            "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-64kb-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-64kb-devel-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-devel-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-devel-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-devel-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-docs-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-macros-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-obs-build-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-obs-build-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-source-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-syms-5.14.21-150400.24.170.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-syms-5.14.21-150400.24.170.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:reiserfs-kmp-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:reiserfs-kmp-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-64kb-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-64kb-devel-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-devel-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-docs-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-macros-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-source-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.170.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.170.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_170-default-1-150400.9.3.2.ppc64le",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_170-default-1-150400.9.3.2.s390x",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_170-default-1-150400.9.3.2.x86_64",
            "SUSE Linux Enterprise Micro 5.3:kernel-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise Micro 5.3:kernel-default-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise Micro 5.3:kernel-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Micro 5.3:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.aarch64",
            "SUSE Linux Enterprise Micro 5.3:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
            "SUSE Linux Enterprise Micro 5.4:kernel-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise Micro 5.4:kernel-default-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise Micro 5.4:kernel-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Micro 5.4:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.aarch64",
            "SUSE Linux Enterprise Micro 5.4:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-64kb-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-64kb-devel-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.aarch64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.ppc64le",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-devel-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-docs-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-macros-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-source-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.170.1.aarch64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.170.1.ppc64le",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.170.1.s390x",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.170.1.x86_64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-zfcpdump-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-devel-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-devel-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-devel-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-docs-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-macros-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-obs-build-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-obs-build-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-source-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-syms-5.14.21-150400.24.170.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-syms-5.14.21-150400.24.170.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Manager Proxy 4.3:kernel-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Manager Proxy 4.3:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
            "SUSE Manager Proxy 4.3:kernel-default-devel-5.14.21-150400.24.170.2.x86_64",
            "SUSE Manager Proxy 4.3:kernel-devel-5.14.21-150400.24.170.1.noarch",
            "SUSE Manager Proxy 4.3:kernel-macros-5.14.21-150400.24.170.1.noarch",
            "SUSE Manager Proxy 4.3:kernel-source-5.14.21-150400.24.170.1.noarch",
            "SUSE Manager Proxy 4.3:kernel-syms-5.14.21-150400.24.170.1.x86_64",
            "SUSE Manager Server 4.3:kernel-default-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Manager Server 4.3:kernel-default-5.14.21-150400.24.170.2.s390x",
            "SUSE Manager Server 4.3:kernel-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Manager Server 4.3:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.ppc64le",
            "SUSE Manager Server 4.3:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
            "SUSE Manager Server 4.3:kernel-default-devel-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Manager Server 4.3:kernel-default-devel-5.14.21-150400.24.170.2.s390x",
            "SUSE Manager Server 4.3:kernel-default-devel-5.14.21-150400.24.170.2.x86_64",
            "SUSE Manager Server 4.3:kernel-devel-5.14.21-150400.24.170.1.noarch",
            "SUSE Manager Server 4.3:kernel-macros-5.14.21-150400.24.170.1.noarch",
            "SUSE Manager Server 4.3:kernel-source-5.14.21-150400.24.170.1.noarch",
            "SUSE Manager Server 4.3:kernel-syms-5.14.21-150400.24.170.1.ppc64le",
            "SUSE Manager Server 4.3:kernel-syms-5.14.21-150400.24.170.1.s390x",
            "SUSE Manager Server 4.3:kernel-syms-5.14.21-150400.24.170.1.x86_64",
            "SUSE Manager Server 4.3:kernel-zfcpdump-5.14.21-150400.24.170.2.s390x"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2025-07-28T15:09:33Z",
          "details": "moderate"
        }
      ],
      "title": "CVE-2024-46800"
    },
    {
      "cve": "CVE-2024-53057",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2024-53057"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "In the Linux kernel, the following vulnerability has been resolved:\n\nnet/sched: stop qdisc_tree_reduce_backlog on TC_H_ROOT\n\nIn qdisc_tree_reduce_backlog, Qdiscs with major handle ffff: are assumed\nto be either root or ingress. This assumption is bogus since it\u0027s valid\nto create egress qdiscs with major handle ffff:\nBudimir Markovic found that for qdiscs like DRR that maintain an active\nclass list, it will cause a UAF with a dangling class pointer.\n\nIn 066a3b5b2346, the concern was to avoid iterating over the ingress\nqdisc since its parent is itself. The proper fix is to stop when parent\nTC_H_ROOT is reached because the only way to retrieve ingress is when a\nhierarchy which does not contain a ffff: major handle call into\nqdisc_lookup with TC_H_MAJ(TC_H_ROOT).\n\nIn the scenario where major ffff: is an egress qdisc in any of the tree\nlevels, the updates will also propagate to TC_H_ROOT, which then the\niteration must stop.\n\n\n net/sched/sch_api.c | 2 +-\n 1 file changed, 1 insertion(+), 1 deletion(-)",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.170.2.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.170.2.s390x",
          "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.170.2.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.170.2.s390x",
          "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.170.2.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.170.2.s390x",
          "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.170.2.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.170.2.s390x",
          "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-64kb-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-64kb-devel-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-devel-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-devel-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-devel-5.14.21-150400.24.170.1.noarch",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-docs-5.14.21-150400.24.170.1.noarch",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-macros-5.14.21-150400.24.170.1.noarch",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-obs-build-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-obs-build-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-source-5.14.21-150400.24.170.1.noarch",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-syms-5.14.21-150400.24.170.1.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-syms-5.14.21-150400.24.170.1.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:reiserfs-kmp-default-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:reiserfs-kmp-default-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-64kb-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-64kb-devel-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-devel-5.14.21-150400.24.170.1.noarch",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-docs-5.14.21-150400.24.170.1.noarch",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-macros-5.14.21-150400.24.170.1.noarch",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-source-5.14.21-150400.24.170.1.noarch",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.170.1.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.170.1.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.170.2.ppc64le",
          "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.170.2.s390x",
          "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.170.2.ppc64le",
          "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.170.2.s390x",
          "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_170-default-1-150400.9.3.2.ppc64le",
          "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_170-default-1-150400.9.3.2.s390x",
          "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_170-default-1-150400.9.3.2.x86_64",
          "SUSE Linux Enterprise Micro 5.3:kernel-default-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise Micro 5.3:kernel-default-5.14.21-150400.24.170.2.s390x",
          "SUSE Linux Enterprise Micro 5.3:kernel-default-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise Micro 5.3:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.aarch64",
          "SUSE Linux Enterprise Micro 5.3:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
          "SUSE Linux Enterprise Micro 5.4:kernel-default-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise Micro 5.4:kernel-default-5.14.21-150400.24.170.2.s390x",
          "SUSE Linux Enterprise Micro 5.4:kernel-default-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise Micro 5.4:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.aarch64",
          "SUSE Linux Enterprise Micro 5.4:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-64kb-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-64kb-devel-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-5.14.21-150400.24.170.2.ppc64le",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-5.14.21-150400.24.170.2.s390x",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.aarch64",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.ppc64le",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.170.2.ppc64le",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.170.2.s390x",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-devel-5.14.21-150400.24.170.1.noarch",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-docs-5.14.21-150400.24.170.1.noarch",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-macros-5.14.21-150400.24.170.1.noarch",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.170.2.ppc64le",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.170.2.s390x",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-source-5.14.21-150400.24.170.1.noarch",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.170.1.aarch64",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.170.1.ppc64le",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.170.1.s390x",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.170.1.x86_64",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-zfcpdump-5.14.21-150400.24.170.2.s390x",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.170.2.ppc64le",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.170.2.s390x",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-5.14.21-150400.24.170.2.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-devel-5.14.21-150400.24.170.2.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-devel-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-devel-5.14.21-150400.24.170.1.noarch",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-docs-5.14.21-150400.24.170.1.noarch",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-macros-5.14.21-150400.24.170.1.noarch",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-obs-build-5.14.21-150400.24.170.2.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-obs-build-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-source-5.14.21-150400.24.170.1.noarch",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-syms-5.14.21-150400.24.170.1.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-syms-5.14.21-150400.24.170.1.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.170.2.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.170.2.x86_64",
          "SUSE Manager Proxy 4.3:kernel-default-5.14.21-150400.24.170.2.x86_64",
          "SUSE Manager Proxy 4.3:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
          "SUSE Manager Proxy 4.3:kernel-default-devel-5.14.21-150400.24.170.2.x86_64",
          "SUSE Manager Proxy 4.3:kernel-devel-5.14.21-150400.24.170.1.noarch",
          "SUSE Manager Proxy 4.3:kernel-macros-5.14.21-150400.24.170.1.noarch",
          "SUSE Manager Proxy 4.3:kernel-source-5.14.21-150400.24.170.1.noarch",
          "SUSE Manager Proxy 4.3:kernel-syms-5.14.21-150400.24.170.1.x86_64",
          "SUSE Manager Server 4.3:kernel-default-5.14.21-150400.24.170.2.ppc64le",
          "SUSE Manager Server 4.3:kernel-default-5.14.21-150400.24.170.2.s390x",
          "SUSE Manager Server 4.3:kernel-default-5.14.21-150400.24.170.2.x86_64",
          "SUSE Manager Server 4.3:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.ppc64le",
          "SUSE Manager Server 4.3:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
          "SUSE Manager Server 4.3:kernel-default-devel-5.14.21-150400.24.170.2.ppc64le",
          "SUSE Manager Server 4.3:kernel-default-devel-5.14.21-150400.24.170.2.s390x",
          "SUSE Manager Server 4.3:kernel-default-devel-5.14.21-150400.24.170.2.x86_64",
          "SUSE Manager Server 4.3:kernel-devel-5.14.21-150400.24.170.1.noarch",
          "SUSE Manager Server 4.3:kernel-macros-5.14.21-150400.24.170.1.noarch",
          "SUSE Manager Server 4.3:kernel-source-5.14.21-150400.24.170.1.noarch",
          "SUSE Manager Server 4.3:kernel-syms-5.14.21-150400.24.170.1.ppc64le",
          "SUSE Manager Server 4.3:kernel-syms-5.14.21-150400.24.170.1.s390x",
          "SUSE Manager Server 4.3:kernel-syms-5.14.21-150400.24.170.1.x86_64",
          "SUSE Manager Server 4.3:kernel-zfcpdump-5.14.21-150400.24.170.2.s390x"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2024-53057",
          "url": "https://www.suse.com/security/cve/CVE-2024-53057"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1233551 for CVE-2024-53057",
          "url": "https://bugzilla.suse.com/1233551"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1245816 for CVE-2024-53057",
          "url": "https://bugzilla.suse.com/1245816"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-64kb-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-64kb-devel-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-devel-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-devel-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-devel-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-docs-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-macros-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-obs-build-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-obs-build-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-source-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-syms-5.14.21-150400.24.170.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-syms-5.14.21-150400.24.170.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:reiserfs-kmp-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:reiserfs-kmp-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-64kb-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-64kb-devel-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-devel-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-docs-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-macros-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-source-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.170.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.170.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_170-default-1-150400.9.3.2.ppc64le",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_170-default-1-150400.9.3.2.s390x",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_170-default-1-150400.9.3.2.x86_64",
            "SUSE Linux Enterprise Micro 5.3:kernel-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise Micro 5.3:kernel-default-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise Micro 5.3:kernel-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Micro 5.3:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.aarch64",
            "SUSE Linux Enterprise Micro 5.3:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
            "SUSE Linux Enterprise Micro 5.4:kernel-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise Micro 5.4:kernel-default-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise Micro 5.4:kernel-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Micro 5.4:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.aarch64",
            "SUSE Linux Enterprise Micro 5.4:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-64kb-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-64kb-devel-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.aarch64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.ppc64le",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-devel-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-docs-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-macros-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-source-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.170.1.aarch64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.170.1.ppc64le",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.170.1.s390x",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.170.1.x86_64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-zfcpdump-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-devel-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-devel-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-devel-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-docs-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-macros-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-obs-build-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-obs-build-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-source-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-syms-5.14.21-150400.24.170.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-syms-5.14.21-150400.24.170.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Manager Proxy 4.3:kernel-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Manager Proxy 4.3:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
            "SUSE Manager Proxy 4.3:kernel-default-devel-5.14.21-150400.24.170.2.x86_64",
            "SUSE Manager Proxy 4.3:kernel-devel-5.14.21-150400.24.170.1.noarch",
            "SUSE Manager Proxy 4.3:kernel-macros-5.14.21-150400.24.170.1.noarch",
            "SUSE Manager Proxy 4.3:kernel-source-5.14.21-150400.24.170.1.noarch",
            "SUSE Manager Proxy 4.3:kernel-syms-5.14.21-150400.24.170.1.x86_64",
            "SUSE Manager Server 4.3:kernel-default-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Manager Server 4.3:kernel-default-5.14.21-150400.24.170.2.s390x",
            "SUSE Manager Server 4.3:kernel-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Manager Server 4.3:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.ppc64le",
            "SUSE Manager Server 4.3:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
            "SUSE Manager Server 4.3:kernel-default-devel-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Manager Server 4.3:kernel-default-devel-5.14.21-150400.24.170.2.s390x",
            "SUSE Manager Server 4.3:kernel-default-devel-5.14.21-150400.24.170.2.x86_64",
            "SUSE Manager Server 4.3:kernel-devel-5.14.21-150400.24.170.1.noarch",
            "SUSE Manager Server 4.3:kernel-macros-5.14.21-150400.24.170.1.noarch",
            "SUSE Manager Server 4.3:kernel-source-5.14.21-150400.24.170.1.noarch",
            "SUSE Manager Server 4.3:kernel-syms-5.14.21-150400.24.170.1.ppc64le",
            "SUSE Manager Server 4.3:kernel-syms-5.14.21-150400.24.170.1.s390x",
            "SUSE Manager Server 4.3:kernel-syms-5.14.21-150400.24.170.1.x86_64",
            "SUSE Manager Server 4.3:kernel-zfcpdump-5.14.21-150400.24.170.2.s390x"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 7.8,
            "baseSeverity": "HIGH",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
            "version": "3.1"
          },
          "products": [
            "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-64kb-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-64kb-devel-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-devel-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-devel-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-devel-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-docs-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-macros-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-obs-build-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-obs-build-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-source-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-syms-5.14.21-150400.24.170.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-syms-5.14.21-150400.24.170.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:reiserfs-kmp-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:reiserfs-kmp-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-64kb-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-64kb-devel-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-devel-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-docs-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-macros-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-source-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.170.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.170.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_170-default-1-150400.9.3.2.ppc64le",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_170-default-1-150400.9.3.2.s390x",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_170-default-1-150400.9.3.2.x86_64",
            "SUSE Linux Enterprise Micro 5.3:kernel-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise Micro 5.3:kernel-default-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise Micro 5.3:kernel-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Micro 5.3:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.aarch64",
            "SUSE Linux Enterprise Micro 5.3:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
            "SUSE Linux Enterprise Micro 5.4:kernel-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise Micro 5.4:kernel-default-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise Micro 5.4:kernel-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Micro 5.4:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.aarch64",
            "SUSE Linux Enterprise Micro 5.4:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-64kb-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-64kb-devel-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.aarch64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.ppc64le",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-devel-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-docs-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-macros-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-source-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.170.1.aarch64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.170.1.ppc64le",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.170.1.s390x",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.170.1.x86_64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-zfcpdump-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-devel-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-devel-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-devel-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-docs-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-macros-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-obs-build-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-obs-build-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-source-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-syms-5.14.21-150400.24.170.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-syms-5.14.21-150400.24.170.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Manager Proxy 4.3:kernel-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Manager Proxy 4.3:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
            "SUSE Manager Proxy 4.3:kernel-default-devel-5.14.21-150400.24.170.2.x86_64",
            "SUSE Manager Proxy 4.3:kernel-devel-5.14.21-150400.24.170.1.noarch",
            "SUSE Manager Proxy 4.3:kernel-macros-5.14.21-150400.24.170.1.noarch",
            "SUSE Manager Proxy 4.3:kernel-source-5.14.21-150400.24.170.1.noarch",
            "SUSE Manager Proxy 4.3:kernel-syms-5.14.21-150400.24.170.1.x86_64",
            "SUSE Manager Server 4.3:kernel-default-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Manager Server 4.3:kernel-default-5.14.21-150400.24.170.2.s390x",
            "SUSE Manager Server 4.3:kernel-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Manager Server 4.3:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.ppc64le",
            "SUSE Manager Server 4.3:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
            "SUSE Manager Server 4.3:kernel-default-devel-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Manager Server 4.3:kernel-default-devel-5.14.21-150400.24.170.2.s390x",
            "SUSE Manager Server 4.3:kernel-default-devel-5.14.21-150400.24.170.2.x86_64",
            "SUSE Manager Server 4.3:kernel-devel-5.14.21-150400.24.170.1.noarch",
            "SUSE Manager Server 4.3:kernel-macros-5.14.21-150400.24.170.1.noarch",
            "SUSE Manager Server 4.3:kernel-source-5.14.21-150400.24.170.1.noarch",
            "SUSE Manager Server 4.3:kernel-syms-5.14.21-150400.24.170.1.ppc64le",
            "SUSE Manager Server 4.3:kernel-syms-5.14.21-150400.24.170.1.s390x",
            "SUSE Manager Server 4.3:kernel-syms-5.14.21-150400.24.170.1.x86_64",
            "SUSE Manager Server 4.3:kernel-zfcpdump-5.14.21-150400.24.170.2.s390x"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2025-07-28T15:09:33Z",
          "details": "important"
        }
      ],
      "title": "CVE-2024-53057"
    },
    {
      "cve": "CVE-2024-53125",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2024-53125"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "In the Linux kernel, the following vulnerability has been resolved:\n\nbpf: sync_linked_regs() must preserve subreg_def\n\nRange propagation must not affect subreg_def marks, otherwise the\nfollowing example is rewritten by verifier incorrectly when\nBPF_F_TEST_RND_HI32 flag is set:\n\n  0: call bpf_ktime_get_ns                   call bpf_ktime_get_ns\n  1: r0 \u0026= 0x7fffffff       after verifier   r0 \u0026= 0x7fffffff\n  2: w1 = w0                rewrites         w1 = w0\n  3: if w0 \u003c 10 goto +0     --------------\u003e  r11 = 0x2f5674a6     (r)\n  4: r1 \u003e\u003e= 32                               r11 \u003c\u003c= 32           (r)\n  5: r0 = r1                                 r1 |= r11            (r)\n  6: exit;                                   if w0 \u003c 0xa goto pc+0\n                                             r1 \u003e\u003e= 32\n                                             r0 = r1\n                                             exit\n\n(or zero extension of w1 at (2) is missing for architectures that\n require zero extension for upper register half).\n\nThe following happens w/o this patch:\n- r0 is marked as not a subreg at (0);\n- w1 is marked as subreg at (2);\n- w1 subreg_def is overridden at (3) by copy_register_state();\n- w1 is read at (5) but mark_insn_zext() does not mark (2)\n  for zero extension, because w1 subreg_def is not set;\n- because of BPF_F_TEST_RND_HI32 flag verifier inserts random\n  value for hi32 bits of (2) (marked (r));\n- this random value is read at (5).",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.170.2.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.170.2.s390x",
          "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.170.2.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.170.2.s390x",
          "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.170.2.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.170.2.s390x",
          "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.170.2.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.170.2.s390x",
          "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-64kb-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-64kb-devel-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-devel-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-devel-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-devel-5.14.21-150400.24.170.1.noarch",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-docs-5.14.21-150400.24.170.1.noarch",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-macros-5.14.21-150400.24.170.1.noarch",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-obs-build-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-obs-build-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-source-5.14.21-150400.24.170.1.noarch",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-syms-5.14.21-150400.24.170.1.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-syms-5.14.21-150400.24.170.1.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:reiserfs-kmp-default-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:reiserfs-kmp-default-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-64kb-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-64kb-devel-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-devel-5.14.21-150400.24.170.1.noarch",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-docs-5.14.21-150400.24.170.1.noarch",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-macros-5.14.21-150400.24.170.1.noarch",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-source-5.14.21-150400.24.170.1.noarch",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.170.1.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.170.1.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.170.2.ppc64le",
          "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.170.2.s390x",
          "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.170.2.ppc64le",
          "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.170.2.s390x",
          "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_170-default-1-150400.9.3.2.ppc64le",
          "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_170-default-1-150400.9.3.2.s390x",
          "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_170-default-1-150400.9.3.2.x86_64",
          "SUSE Linux Enterprise Micro 5.3:kernel-default-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise Micro 5.3:kernel-default-5.14.21-150400.24.170.2.s390x",
          "SUSE Linux Enterprise Micro 5.3:kernel-default-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise Micro 5.3:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.aarch64",
          "SUSE Linux Enterprise Micro 5.3:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
          "SUSE Linux Enterprise Micro 5.4:kernel-default-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise Micro 5.4:kernel-default-5.14.21-150400.24.170.2.s390x",
          "SUSE Linux Enterprise Micro 5.4:kernel-default-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise Micro 5.4:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.aarch64",
          "SUSE Linux Enterprise Micro 5.4:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-64kb-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-64kb-devel-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-5.14.21-150400.24.170.2.ppc64le",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-5.14.21-150400.24.170.2.s390x",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.aarch64",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.ppc64le",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.170.2.ppc64le",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.170.2.s390x",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-devel-5.14.21-150400.24.170.1.noarch",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-docs-5.14.21-150400.24.170.1.noarch",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-macros-5.14.21-150400.24.170.1.noarch",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.170.2.ppc64le",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.170.2.s390x",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-source-5.14.21-150400.24.170.1.noarch",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.170.1.aarch64",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.170.1.ppc64le",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.170.1.s390x",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.170.1.x86_64",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-zfcpdump-5.14.21-150400.24.170.2.s390x",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.170.2.ppc64le",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.170.2.s390x",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-5.14.21-150400.24.170.2.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-devel-5.14.21-150400.24.170.2.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-devel-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-devel-5.14.21-150400.24.170.1.noarch",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-docs-5.14.21-150400.24.170.1.noarch",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-macros-5.14.21-150400.24.170.1.noarch",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-obs-build-5.14.21-150400.24.170.2.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-obs-build-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-source-5.14.21-150400.24.170.1.noarch",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-syms-5.14.21-150400.24.170.1.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-syms-5.14.21-150400.24.170.1.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.170.2.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.170.2.x86_64",
          "SUSE Manager Proxy 4.3:kernel-default-5.14.21-150400.24.170.2.x86_64",
          "SUSE Manager Proxy 4.3:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
          "SUSE Manager Proxy 4.3:kernel-default-devel-5.14.21-150400.24.170.2.x86_64",
          "SUSE Manager Proxy 4.3:kernel-devel-5.14.21-150400.24.170.1.noarch",
          "SUSE Manager Proxy 4.3:kernel-macros-5.14.21-150400.24.170.1.noarch",
          "SUSE Manager Proxy 4.3:kernel-source-5.14.21-150400.24.170.1.noarch",
          "SUSE Manager Proxy 4.3:kernel-syms-5.14.21-150400.24.170.1.x86_64",
          "SUSE Manager Server 4.3:kernel-default-5.14.21-150400.24.170.2.ppc64le",
          "SUSE Manager Server 4.3:kernel-default-5.14.21-150400.24.170.2.s390x",
          "SUSE Manager Server 4.3:kernel-default-5.14.21-150400.24.170.2.x86_64",
          "SUSE Manager Server 4.3:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.ppc64le",
          "SUSE Manager Server 4.3:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
          "SUSE Manager Server 4.3:kernel-default-devel-5.14.21-150400.24.170.2.ppc64le",
          "SUSE Manager Server 4.3:kernel-default-devel-5.14.21-150400.24.170.2.s390x",
          "SUSE Manager Server 4.3:kernel-default-devel-5.14.21-150400.24.170.2.x86_64",
          "SUSE Manager Server 4.3:kernel-devel-5.14.21-150400.24.170.1.noarch",
          "SUSE Manager Server 4.3:kernel-macros-5.14.21-150400.24.170.1.noarch",
          "SUSE Manager Server 4.3:kernel-source-5.14.21-150400.24.170.1.noarch",
          "SUSE Manager Server 4.3:kernel-syms-5.14.21-150400.24.170.1.ppc64le",
          "SUSE Manager Server 4.3:kernel-syms-5.14.21-150400.24.170.1.s390x",
          "SUSE Manager Server 4.3:kernel-syms-5.14.21-150400.24.170.1.x86_64",
          "SUSE Manager Server 4.3:kernel-zfcpdump-5.14.21-150400.24.170.2.s390x"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2024-53125",
          "url": "https://www.suse.com/security/cve/CVE-2024-53125"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1234156 for CVE-2024-53125",
          "url": "https://bugzilla.suse.com/1234156"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-64kb-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-64kb-devel-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-devel-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-devel-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-devel-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-docs-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-macros-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-obs-build-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-obs-build-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-source-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-syms-5.14.21-150400.24.170.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-syms-5.14.21-150400.24.170.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:reiserfs-kmp-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:reiserfs-kmp-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-64kb-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-64kb-devel-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-devel-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-docs-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-macros-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-source-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.170.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.170.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_170-default-1-150400.9.3.2.ppc64le",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_170-default-1-150400.9.3.2.s390x",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_170-default-1-150400.9.3.2.x86_64",
            "SUSE Linux Enterprise Micro 5.3:kernel-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise Micro 5.3:kernel-default-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise Micro 5.3:kernel-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Micro 5.3:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.aarch64",
            "SUSE Linux Enterprise Micro 5.3:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
            "SUSE Linux Enterprise Micro 5.4:kernel-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise Micro 5.4:kernel-default-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise Micro 5.4:kernel-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Micro 5.4:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.aarch64",
            "SUSE Linux Enterprise Micro 5.4:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-64kb-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-64kb-devel-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.aarch64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.ppc64le",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-devel-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-docs-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-macros-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-source-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.170.1.aarch64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.170.1.ppc64le",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.170.1.s390x",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.170.1.x86_64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-zfcpdump-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-devel-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-devel-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-devel-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-docs-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-macros-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-obs-build-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-obs-build-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-source-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-syms-5.14.21-150400.24.170.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-syms-5.14.21-150400.24.170.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Manager Proxy 4.3:kernel-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Manager Proxy 4.3:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
            "SUSE Manager Proxy 4.3:kernel-default-devel-5.14.21-150400.24.170.2.x86_64",
            "SUSE Manager Proxy 4.3:kernel-devel-5.14.21-150400.24.170.1.noarch",
            "SUSE Manager Proxy 4.3:kernel-macros-5.14.21-150400.24.170.1.noarch",
            "SUSE Manager Proxy 4.3:kernel-source-5.14.21-150400.24.170.1.noarch",
            "SUSE Manager Proxy 4.3:kernel-syms-5.14.21-150400.24.170.1.x86_64",
            "SUSE Manager Server 4.3:kernel-default-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Manager Server 4.3:kernel-default-5.14.21-150400.24.170.2.s390x",
            "SUSE Manager Server 4.3:kernel-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Manager Server 4.3:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.ppc64le",
            "SUSE Manager Server 4.3:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
            "SUSE Manager Server 4.3:kernel-default-devel-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Manager Server 4.3:kernel-default-devel-5.14.21-150400.24.170.2.s390x",
            "SUSE Manager Server 4.3:kernel-default-devel-5.14.21-150400.24.170.2.x86_64",
            "SUSE Manager Server 4.3:kernel-devel-5.14.21-150400.24.170.1.noarch",
            "SUSE Manager Server 4.3:kernel-macros-5.14.21-150400.24.170.1.noarch",
            "SUSE Manager Server 4.3:kernel-source-5.14.21-150400.24.170.1.noarch",
            "SUSE Manager Server 4.3:kernel-syms-5.14.21-150400.24.170.1.ppc64le",
            "SUSE Manager Server 4.3:kernel-syms-5.14.21-150400.24.170.1.s390x",
            "SUSE Manager Server 4.3:kernel-syms-5.14.21-150400.24.170.1.x86_64",
            "SUSE Manager Server 4.3:kernel-zfcpdump-5.14.21-150400.24.170.2.s390x"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 7.8,
            "baseSeverity": "HIGH",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
            "version": "3.1"
          },
          "products": [
            "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-64kb-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-64kb-devel-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-devel-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-devel-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-devel-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-docs-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-macros-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-obs-build-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-obs-build-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-source-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-syms-5.14.21-150400.24.170.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-syms-5.14.21-150400.24.170.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:reiserfs-kmp-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:reiserfs-kmp-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-64kb-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-64kb-devel-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-devel-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-docs-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-macros-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-source-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.170.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.170.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_170-default-1-150400.9.3.2.ppc64le",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_170-default-1-150400.9.3.2.s390x",
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_170-default-1-150400.9.3.2.x86_64",
            "SUSE Linux Enterprise Micro 5.3:kernel-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise Micro 5.3:kernel-default-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise Micro 5.3:kernel-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Micro 5.3:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.aarch64",
            "SUSE Linux Enterprise Micro 5.3:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
            "SUSE Linux Enterprise Micro 5.4:kernel-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise Micro 5.4:kernel-default-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise Micro 5.4:kernel-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Micro 5.4:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.aarch64",
            "SUSE Linux Enterprise Micro 5.4:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-64kb-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-64kb-devel-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.aarch64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.ppc64le",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-devel-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-docs-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-macros-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-source-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.170.1.aarch64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.170.1.ppc64le",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.170.1.s390x",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.170.1.x86_64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-zfcpdump-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.170.2.aarch64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.170.2.s390x",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-devel-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-devel-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-devel-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-docs-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-macros-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-obs-build-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-obs-build-5.14.21-150400.24.170.2.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-source-5.14.21-150400.24.170.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-syms-5.14.21-150400.24.170.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-syms-5.14.21-150400.24.170.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Manager Proxy 4.3:kernel-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Manager Proxy 4.3:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
            "SUSE Manager Proxy 4.3:kernel-default-devel-5.14.21-150400.24.170.2.x86_64",
            "SUSE Manager Proxy 4.3:kernel-devel-5.14.21-150400.24.170.1.noarch",
            "SUSE Manager Proxy 4.3:kernel-macros-5.14.21-150400.24.170.1.noarch",
            "SUSE Manager Proxy 4.3:kernel-source-5.14.21-150400.24.170.1.noarch",
            "SUSE Manager Proxy 4.3:kernel-syms-5.14.21-150400.24.170.1.x86_64",
            "SUSE Manager Server 4.3:kernel-default-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Manager Server 4.3:kernel-default-5.14.21-150400.24.170.2.s390x",
            "SUSE Manager Server 4.3:kernel-default-5.14.21-150400.24.170.2.x86_64",
            "SUSE Manager Server 4.3:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.ppc64le",
            "SUSE Manager Server 4.3:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
            "SUSE Manager Server 4.3:kernel-default-devel-5.14.21-150400.24.170.2.ppc64le",
            "SUSE Manager Server 4.3:kernel-default-devel-5.14.21-150400.24.170.2.s390x",
            "SUSE Manager Server 4.3:kernel-default-devel-5.14.21-150400.24.170.2.x86_64",
            "SUSE Manager Server 4.3:kernel-devel-5.14.21-150400.24.170.1.noarch",
            "SUSE Manager Server 4.3:kernel-macros-5.14.21-150400.24.170.1.noarch",
            "SUSE Manager Server 4.3:kernel-source-5.14.21-150400.24.170.1.noarch",
            "SUSE Manager Server 4.3:kernel-syms-5.14.21-150400.24.170.1.ppc64le",
            "SUSE Manager Server 4.3:kernel-syms-5.14.21-150400.24.170.1.s390x",
            "SUSE Manager Server 4.3:kernel-syms-5.14.21-150400.24.170.1.x86_64",
            "SUSE Manager Server 4.3:kernel-zfcpdump-5.14.21-150400.24.170.2.s390x"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2025-07-28T15:09:33Z",
          "details": "important"
        }
      ],
      "title": "CVE-2024-53125"
    },
    {
      "cve": "CVE-2024-53141",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2024-53141"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "In the Linux kernel, the following vulnerability has been resolved:\n\nnetfilter: ipset: add missing range check in bitmap_ip_uadt\n\nWhen tb[IPSET_ATTR_IP_TO] is not present but tb[IPSET_ATTR_CIDR] exists,\nthe values of ip and ip_to are slightly swapped. Therefore, the range check\nfor ip should be done later, but this part is missing and it seems that the\nvulnerability occurs.\n\nSo we should add missing range checks and remove unnecessary range checks.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.170.2.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.170.2.s390x",
          "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.170.2.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.170.2.s390x",
          "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.170.2.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.170.2.s390x",
          "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.170.2.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.170.2.s390x",
          "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-64kb-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-64kb-devel-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-devel-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-devel-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-devel-5.14.21-150400.24.170.1.noarch",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-docs-5.14.21-150400.24.170.1.noarch",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-macros-5.14.21-150400.24.170.1.noarch",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-obs-build-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-obs-build-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-source-5.14.21-150400.24.170.1.noarch",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-syms-5.14.21-150400.24.170.1.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-syms-5.14.21-150400.24.170.1.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:reiserfs-kmp-default-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:reiserfs-kmp-default-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-64kb-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-64kb-devel-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-devel-5.14.21-150400.24.170.1.noarch",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-docs-5.14.21-150400.24.170.1.noarch",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-macros-5.14.21-150400.24.170.1.noarch",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-source-5.14.21-150400.24.170.1.noarch",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.170.1.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.170.1.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:reiserfs-kmp-default-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.170.2.ppc64le",
          "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.170.2.s390x",
          "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.170.2.ppc64le",
          "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.170.2.s390x",
          "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_170-default-1-150400.9.3.2.ppc64le",
          "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_170-default-1-150400.9.3.2.s390x",
          "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_170-default-1-150400.9.3.2.x86_64",
          "SUSE Linux Enterprise Micro 5.3:kernel-default-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise Micro 5.3:kernel-default-5.14.21-150400.24.170.2.s390x",
          "SUSE Linux Enterprise Micro 5.3:kernel-default-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise Micro 5.3:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.aarch64",
          "SUSE Linux Enterprise Micro 5.3:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
          "SUSE Linux Enterprise Micro 5.4:kernel-default-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise Micro 5.4:kernel-default-5.14.21-150400.24.170.2.s390x",
          "SUSE Linux Enterprise Micro 5.4:kernel-default-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise Micro 5.4:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.aarch64",
          "SUSE Linux Enterprise Micro 5.4:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-64kb-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-64kb-devel-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-5.14.21-150400.24.170.2.ppc64le",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-5.14.21-150400.24.170.2.s390x",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.aarch64",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.ppc64le",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2.x86_64",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.170.2.ppc64le",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.170.2.s390x",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-devel-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-devel-5.14.21-150400.24.170.1.noarch",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-docs-5.14.21-150400.24.170.1.noarch",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-macros-5.14.21-150400.24.170.1.noarch",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.170.2.aarch64",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.170.2.ppc64le",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.170.2.s390x",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-obs-build-5.14.21-150400.24.170.2.x86_64",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-source-5.14.21-150400.24.170.1.noarch",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.170.1.aarch64",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.170.1.ppc64le",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.170.1.s390x",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-syms-5.14.21-150400.24.170.1.x86_64",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-zfcpdump-5.14.21-150400.24.170.2.s390x",
          "SUSE Li